1 /* $NetBSD: t_ptrace_exec_wait.h,v 1.1 2020/05/05 00:23:12 kamil Exp $ */
2
3 /*-
4 * Copyright (c) 2016, 2017, 2018, 2019, 2020 The NetBSD Foundation, Inc.
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 *
16 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
17 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
18 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
20 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
21 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
22 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
23 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
24 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
25 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
26 * POSSIBILITY OF SUCH DAMAGE.
27 */
28
29 static void
traceme_vfork_exec(bool masked,bool ignored)30 traceme_vfork_exec(bool masked, bool ignored)
31 {
32 const int sigval = SIGTRAP;
33 pid_t child, wpid;
34 #if defined(TWAIT_HAVE_STATUS)
35 int status;
36 #endif
37 struct sigaction sa;
38 struct ptrace_siginfo info;
39 sigset_t intmask;
40 struct kinfo_proc2 kp;
41 size_t len = sizeof(kp);
42
43 int name[6];
44 const size_t namelen = __arraycount(name);
45 ki_sigset_t kp_sigmask;
46 ki_sigset_t kp_sigignore;
47
48 memset(&info, 0, sizeof(info));
49
50 DPRINTF("Before forking process PID=%d\n", getpid());
51 SYSCALL_REQUIRE((child = vfork()) != -1);
52 if (child == 0) {
53 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
54 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
55
56 if (masked) {
57 sigemptyset(&intmask);
58 sigaddset(&intmask, sigval);
59 sigprocmask(SIG_BLOCK, &intmask, NULL);
60 }
61
62 if (ignored) {
63 memset(&sa, 0, sizeof(sa));
64 sa.sa_handler = SIG_IGN;
65 sigemptyset(&sa.sa_mask);
66 FORKEE_ASSERT(sigaction(sigval, &sa, NULL) != -1);
67 }
68
69 DPRINTF("Before calling execve(2) from child\n");
70 execlp("/bin/echo", "/bin/echo", NULL);
71
72 /* NOTREACHED */
73 FORKEE_ASSERTX(0 && "Not reached");
74 }
75 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
76
77 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
78 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
79
80 validate_status_stopped(status, sigval);
81
82 name[0] = CTL_KERN,
83 name[1] = KERN_PROC2,
84 name[2] = KERN_PROC_PID;
85 name[3] = getpid();
86 name[4] = sizeof(kp);
87 name[5] = 1;
88
89 ATF_REQUIRE_EQ(sysctl(name, namelen, &kp, &len, NULL, 0), 0);
90
91 if (masked)
92 kp_sigmask = kp.p_sigmask;
93
94 if (ignored)
95 kp_sigignore = kp.p_sigignore;
96
97 name[3] = getpid();
98
99 ATF_REQUIRE_EQ(sysctl(name, namelen, &kp, &len, NULL, 0), 0);
100
101 if (masked) {
102 DPRINTF("kp_sigmask="
103 "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
104 kp_sigmask.__bits[0], kp_sigmask.__bits[1],
105 kp_sigmask.__bits[2], kp_sigmask.__bits[3]);
106
107 DPRINTF("kp.p_sigmask="
108 "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
109 kp.p_sigmask.__bits[0], kp.p_sigmask.__bits[1],
110 kp.p_sigmask.__bits[2], kp.p_sigmask.__bits[3]);
111
112 ATF_REQUIRE(!memcmp(&kp_sigmask, &kp.p_sigmask,
113 sizeof(kp_sigmask)));
114 }
115
116 if (ignored) {
117 DPRINTF("kp_sigignore="
118 "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
119 kp_sigignore.__bits[0], kp_sigignore.__bits[1],
120 kp_sigignore.__bits[2], kp_sigignore.__bits[3]);
121
122 DPRINTF("kp.p_sigignore="
123 "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
124 kp.p_sigignore.__bits[0], kp.p_sigignore.__bits[1],
125 kp.p_sigignore.__bits[2], kp.p_sigignore.__bits[3]);
126
127 ATF_REQUIRE(!memcmp(&kp_sigignore, &kp.p_sigignore,
128 sizeof(kp_sigignore)));
129 }
130
131 DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
132 SYSCALL_REQUIRE(
133 ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
134
135 DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
136 DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
137 info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
138 info.psi_siginfo.si_errno);
139
140 ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, sigval);
141 ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_EXEC);
142
143 DPRINTF("Before resuming the child process where it left off and "
144 "without signal to be sent\n");
145 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
146
147 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
148 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
149
150 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
151 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
152 }
153
154 #define TRACEME_VFORK_EXEC(test, masked, ignored) \
155 ATF_TC(test); \
156 ATF_TC_HEAD(test, tc) \
157 { \
158 atf_tc_set_md_var(tc, "descr", \
159 "Verify PT_TRACE_ME followed by exec(3) in a vfork(2)ed " \
160 "child%s%s", masked ? " with masked signal" : "", \
161 masked ? " with ignored signal" : ""); \
162 } \
163 \
164 ATF_TC_BODY(test, tc) \
165 { \
166 \
167 traceme_vfork_exec(masked, ignored); \
168 }
169
TRACEME_VFORK_EXEC(traceme_vfork_exec,false,false)170 TRACEME_VFORK_EXEC(traceme_vfork_exec, false, false)
171 TRACEME_VFORK_EXEC(traceme_vfork_signalmasked_exec, true, false)
172 TRACEME_VFORK_EXEC(traceme_vfork_signalignored_exec, false, true)
173
174 /// ----------------------------------------------------------------------------
175
176 static void
177 traceme_exec(bool masked, bool ignored)
178 {
179 const int sigval = SIGTRAP;
180 pid_t child, wpid;
181 #if defined(TWAIT_HAVE_STATUS)
182 int status;
183 #endif
184 struct sigaction sa;
185 struct ptrace_siginfo info;
186 sigset_t intmask;
187 struct kinfo_proc2 kp;
188 size_t len = sizeof(kp);
189
190 int name[6];
191 const size_t namelen = __arraycount(name);
192 ki_sigset_t kp_sigmask;
193 ki_sigset_t kp_sigignore;
194
195 memset(&info, 0, sizeof(info));
196
197 DPRINTF("Before forking process PID=%d\n", getpid());
198 SYSCALL_REQUIRE((child = fork()) != -1);
199 if (child == 0) {
200 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
201 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
202
203 if (masked) {
204 sigemptyset(&intmask);
205 sigaddset(&intmask, sigval);
206 sigprocmask(SIG_BLOCK, &intmask, NULL);
207 }
208
209 if (ignored) {
210 memset(&sa, 0, sizeof(sa));
211 sa.sa_handler = SIG_IGN;
212 sigemptyset(&sa.sa_mask);
213 FORKEE_ASSERT(sigaction(sigval, &sa, NULL) != -1);
214 }
215
216 DPRINTF("Before calling execve(2) from child\n");
217 execlp("/bin/echo", "/bin/echo", NULL);
218
219 FORKEE_ASSERT(0 && "Not reached");
220 }
221 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
222
223 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
224 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
225
226 validate_status_stopped(status, sigval);
227
228 name[0] = CTL_KERN,
229 name[1] = KERN_PROC2,
230 name[2] = KERN_PROC_PID;
231 name[3] = getpid();
232 name[4] = sizeof(kp);
233 name[5] = 1;
234
235 ATF_REQUIRE_EQ(sysctl(name, namelen, &kp, &len, NULL, 0), 0);
236
237 if (masked)
238 kp_sigmask = kp.p_sigmask;
239
240 if (ignored)
241 kp_sigignore = kp.p_sigignore;
242
243 name[3] = getpid();
244
245 ATF_REQUIRE_EQ(sysctl(name, namelen, &kp, &len, NULL, 0), 0);
246
247 if (masked) {
248 DPRINTF("kp_sigmask="
249 "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
250 kp_sigmask.__bits[0], kp_sigmask.__bits[1],
251 kp_sigmask.__bits[2], kp_sigmask.__bits[3]);
252
253 DPRINTF("kp.p_sigmask="
254 "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
255 kp.p_sigmask.__bits[0], kp.p_sigmask.__bits[1],
256 kp.p_sigmask.__bits[2], kp.p_sigmask.__bits[3]);
257
258 ATF_REQUIRE(!memcmp(&kp_sigmask, &kp.p_sigmask,
259 sizeof(kp_sigmask)));
260 }
261
262 if (ignored) {
263 DPRINTF("kp_sigignore="
264 "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
265 kp_sigignore.__bits[0], kp_sigignore.__bits[1],
266 kp_sigignore.__bits[2], kp_sigignore.__bits[3]);
267
268 DPRINTF("kp.p_sigignore="
269 "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
270 kp.p_sigignore.__bits[0], kp.p_sigignore.__bits[1],
271 kp.p_sigignore.__bits[2], kp.p_sigignore.__bits[3]);
272
273 ATF_REQUIRE(!memcmp(&kp_sigignore, &kp.p_sigignore,
274 sizeof(kp_sigignore)));
275 }
276
277 DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
278 SYSCALL_REQUIRE(
279 ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
280
281 DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
282 DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
283 info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
284 info.psi_siginfo.si_errno);
285
286 ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, sigval);
287 ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_EXEC);
288
289 DPRINTF("Before resuming the child process where it left off and "
290 "without signal to be sent\n");
291 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
292
293 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
294 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
295
296 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
297 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
298 }
299
300 #define TRACEME_EXEC(test, masked, ignored) \
301 ATF_TC(test); \
302 ATF_TC_HEAD(test, tc) \
303 { \
304 atf_tc_set_md_var(tc, "descr", \
305 "Detect SIGTRAP TRAP_EXEC from " \
306 "child%s%s", masked ? " with masked signal" : "", \
307 masked ? " with ignored signal" : ""); \
308 } \
309 \
310 ATF_TC_BODY(test, tc) \
311 { \
312 \
313 traceme_exec(masked, ignored); \
314 }
315
316 TRACEME_EXEC(traceme_exec, false, false)
317 TRACEME_EXEC(traceme_signalmasked_exec, true, false)
318 TRACEME_EXEC(traceme_signalignored_exec, false, true)
319
320 #define ATF_TP_ADD_TCS_PTRACE_WAIT_EXEC() \
321 ATF_TP_ADD_TC(tp, traceme_vfork_exec); \
322 ATF_TP_ADD_TC(tp, traceme_vfork_signalmasked_exec); \
323 ATF_TP_ADD_TC(tp, traceme_vfork_signalignored_exec); \
324 ATF_TP_ADD_TC(tp, traceme_exec); \
325 ATF_TP_ADD_TC(tp, traceme_signalmasked_exec); \
326 ATF_TP_ADD_TC(tp, traceme_signalignored_exec);
327