xref: /netbsd-src/tests/lib/libc/sys/t_ptrace_exec_wait.h (revision 6afb1960b8081a2675d1e1a9e22aeba1c136ced8)
1 /*	$NetBSD: t_ptrace_exec_wait.h,v 1.1 2020/05/05 00:23:12 kamil Exp $	*/
2 
3 /*-
4  * Copyright (c) 2016, 2017, 2018, 2019, 2020 The NetBSD Foundation, Inc.
5  * All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  *
16  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
17  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
18  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
20  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
21  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
22  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
23  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
24  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
25  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
26  * POSSIBILITY OF SUCH DAMAGE.
27  */
28 
29 static void
traceme_vfork_exec(bool masked,bool ignored)30 traceme_vfork_exec(bool masked, bool ignored)
31 {
32 	const int sigval = SIGTRAP;
33 	pid_t child, wpid;
34 #if defined(TWAIT_HAVE_STATUS)
35 	int status;
36 #endif
37 	struct sigaction sa;
38 	struct ptrace_siginfo info;
39 	sigset_t intmask;
40 	struct kinfo_proc2 kp;
41 	size_t len = sizeof(kp);
42 
43 	int name[6];
44 	const size_t namelen = __arraycount(name);
45 	ki_sigset_t kp_sigmask;
46 	ki_sigset_t kp_sigignore;
47 
48 	memset(&info, 0, sizeof(info));
49 
50 	DPRINTF("Before forking process PID=%d\n", getpid());
51 	SYSCALL_REQUIRE((child = vfork()) != -1);
52 	if (child == 0) {
53 		DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
54 		FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
55 
56 		if (masked) {
57 			sigemptyset(&intmask);
58 			sigaddset(&intmask, sigval);
59 			sigprocmask(SIG_BLOCK, &intmask, NULL);
60 		}
61 
62 		if (ignored) {
63 			memset(&sa, 0, sizeof(sa));
64 			sa.sa_handler = SIG_IGN;
65 			sigemptyset(&sa.sa_mask);
66 			FORKEE_ASSERT(sigaction(sigval, &sa, NULL) != -1);
67 		}
68 
69 		DPRINTF("Before calling execve(2) from child\n");
70 		execlp("/bin/echo", "/bin/echo", NULL);
71 
72 		/* NOTREACHED */
73 		FORKEE_ASSERTX(0 && "Not reached");
74 	}
75 	DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
76 
77 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
78 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
79 
80 	validate_status_stopped(status, sigval);
81 
82 	name[0] = CTL_KERN,
83 	name[1] = KERN_PROC2,
84 	name[2] = KERN_PROC_PID;
85 	name[3] = getpid();
86 	name[4] = sizeof(kp);
87 	name[5] = 1;
88 
89 	ATF_REQUIRE_EQ(sysctl(name, namelen, &kp, &len, NULL, 0), 0);
90 
91 	if (masked)
92 		kp_sigmask = kp.p_sigmask;
93 
94 	if (ignored)
95 		kp_sigignore = kp.p_sigignore;
96 
97 	name[3] = getpid();
98 
99 	ATF_REQUIRE_EQ(sysctl(name, namelen, &kp, &len, NULL, 0), 0);
100 
101 	if (masked) {
102 		DPRINTF("kp_sigmask="
103 		    "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
104 		    kp_sigmask.__bits[0], kp_sigmask.__bits[1],
105 		    kp_sigmask.__bits[2], kp_sigmask.__bits[3]);
106 
107 	        DPRINTF("kp.p_sigmask="
108 	            "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
109 	            kp.p_sigmask.__bits[0], kp.p_sigmask.__bits[1],
110 	            kp.p_sigmask.__bits[2], kp.p_sigmask.__bits[3]);
111 
112 		ATF_REQUIRE(!memcmp(&kp_sigmask, &kp.p_sigmask,
113 		    sizeof(kp_sigmask)));
114 	}
115 
116 	if (ignored) {
117 		DPRINTF("kp_sigignore="
118 		    "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
119 		    kp_sigignore.__bits[0], kp_sigignore.__bits[1],
120 		    kp_sigignore.__bits[2], kp_sigignore.__bits[3]);
121 
122 	        DPRINTF("kp.p_sigignore="
123 	            "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
124 	            kp.p_sigignore.__bits[0], kp.p_sigignore.__bits[1],
125 	            kp.p_sigignore.__bits[2], kp.p_sigignore.__bits[3]);
126 
127 		ATF_REQUIRE(!memcmp(&kp_sigignore, &kp.p_sigignore,
128 		    sizeof(kp_sigignore)));
129 	}
130 
131 	DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
132 	SYSCALL_REQUIRE(
133 	    ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
134 
135 	DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
136 	DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
137 	    info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
138 	    info.psi_siginfo.si_errno);
139 
140 	ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, sigval);
141 	ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_EXEC);
142 
143 	DPRINTF("Before resuming the child process where it left off and "
144 	    "without signal to be sent\n");
145 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
146 
147 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
148 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
149 
150 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
151 	TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
152 }
153 
154 #define TRACEME_VFORK_EXEC(test, masked, ignored)			\
155 ATF_TC(test);								\
156 ATF_TC_HEAD(test, tc)							\
157 {									\
158 	atf_tc_set_md_var(tc, "descr",					\
159 	    "Verify PT_TRACE_ME followed by exec(3) in a vfork(2)ed "	\
160 	    "child%s%s", masked ? " with masked signal" : "",		\
161 	    masked ? " with ignored signal" : "");			\
162 }									\
163 									\
164 ATF_TC_BODY(test, tc)							\
165 {									\
166 									\
167 	traceme_vfork_exec(masked, ignored);				\
168 }
169 
TRACEME_VFORK_EXEC(traceme_vfork_exec,false,false)170 TRACEME_VFORK_EXEC(traceme_vfork_exec, false, false)
171 TRACEME_VFORK_EXEC(traceme_vfork_signalmasked_exec, true, false)
172 TRACEME_VFORK_EXEC(traceme_vfork_signalignored_exec, false, true)
173 
174 /// ----------------------------------------------------------------------------
175 
176 static void
177 traceme_exec(bool masked, bool ignored)
178 {
179 	const int sigval = SIGTRAP;
180 	pid_t child, wpid;
181 #if defined(TWAIT_HAVE_STATUS)
182 	int status;
183 #endif
184 	struct sigaction sa;
185 	struct ptrace_siginfo info;
186 	sigset_t intmask;
187 	struct kinfo_proc2 kp;
188 	size_t len = sizeof(kp);
189 
190 	int name[6];
191 	const size_t namelen = __arraycount(name);
192 	ki_sigset_t kp_sigmask;
193 	ki_sigset_t kp_sigignore;
194 
195 	memset(&info, 0, sizeof(info));
196 
197 	DPRINTF("Before forking process PID=%d\n", getpid());
198 	SYSCALL_REQUIRE((child = fork()) != -1);
199 	if (child == 0) {
200 		DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
201 		FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
202 
203 		if (masked) {
204 			sigemptyset(&intmask);
205 			sigaddset(&intmask, sigval);
206 			sigprocmask(SIG_BLOCK, &intmask, NULL);
207 		}
208 
209 		if (ignored) {
210 			memset(&sa, 0, sizeof(sa));
211 			sa.sa_handler = SIG_IGN;
212 			sigemptyset(&sa.sa_mask);
213 			FORKEE_ASSERT(sigaction(sigval, &sa, NULL) != -1);
214 		}
215 
216 		DPRINTF("Before calling execve(2) from child\n");
217 		execlp("/bin/echo", "/bin/echo", NULL);
218 
219 		FORKEE_ASSERT(0 && "Not reached");
220 	}
221 	DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
222 
223 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
224 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
225 
226 	validate_status_stopped(status, sigval);
227 
228 	name[0] = CTL_KERN,
229 	name[1] = KERN_PROC2,
230 	name[2] = KERN_PROC_PID;
231 	name[3] = getpid();
232 	name[4] = sizeof(kp);
233 	name[5] = 1;
234 
235 	ATF_REQUIRE_EQ(sysctl(name, namelen, &kp, &len, NULL, 0), 0);
236 
237 	if (masked)
238 		kp_sigmask = kp.p_sigmask;
239 
240 	if (ignored)
241 		kp_sigignore = kp.p_sigignore;
242 
243 	name[3] = getpid();
244 
245 	ATF_REQUIRE_EQ(sysctl(name, namelen, &kp, &len, NULL, 0), 0);
246 
247 	if (masked) {
248 		DPRINTF("kp_sigmask="
249 		    "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
250 		    kp_sigmask.__bits[0], kp_sigmask.__bits[1],
251 		    kp_sigmask.__bits[2], kp_sigmask.__bits[3]);
252 
253 		DPRINTF("kp.p_sigmask="
254 		    "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
255 		    kp.p_sigmask.__bits[0], kp.p_sigmask.__bits[1],
256 		    kp.p_sigmask.__bits[2], kp.p_sigmask.__bits[3]);
257 
258 		ATF_REQUIRE(!memcmp(&kp_sigmask, &kp.p_sigmask,
259 		    sizeof(kp_sigmask)));
260 	}
261 
262 	if (ignored) {
263 		DPRINTF("kp_sigignore="
264 		    "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
265 		    kp_sigignore.__bits[0], kp_sigignore.__bits[1],
266 		    kp_sigignore.__bits[2], kp_sigignore.__bits[3]);
267 
268 		DPRINTF("kp.p_sigignore="
269 		    "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
270 		    kp.p_sigignore.__bits[0], kp.p_sigignore.__bits[1],
271 		    kp.p_sigignore.__bits[2], kp.p_sigignore.__bits[3]);
272 
273 		ATF_REQUIRE(!memcmp(&kp_sigignore, &kp.p_sigignore,
274 		    sizeof(kp_sigignore)));
275 	}
276 
277 	DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
278 	SYSCALL_REQUIRE(
279 	    ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
280 
281 	DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
282 	DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
283 	    info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
284 	    info.psi_siginfo.si_errno);
285 
286 	ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, sigval);
287 	ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_EXEC);
288 
289 	DPRINTF("Before resuming the child process where it left off and "
290 	    "without signal to be sent\n");
291 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
292 
293 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
294 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
295 
296 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
297 	TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
298 }
299 
300 #define TRACEME_EXEC(test, masked, ignored)				\
301 ATF_TC(test);								\
302 ATF_TC_HEAD(test, tc)							\
303 {									\
304        atf_tc_set_md_var(tc, "descr",					\
305            "Detect SIGTRAP TRAP_EXEC from "				\
306            "child%s%s", masked ? " with masked signal" : "",		\
307            masked ? " with ignored signal" : "");			\
308 }									\
309 									\
310 ATF_TC_BODY(test, tc)							\
311 {									\
312 									\
313        traceme_exec(masked, ignored);					\
314 }
315 
316 TRACEME_EXEC(traceme_exec, false, false)
317 TRACEME_EXEC(traceme_signalmasked_exec, true, false)
318 TRACEME_EXEC(traceme_signalignored_exec, false, true)
319 
320 #define ATF_TP_ADD_TCS_PTRACE_WAIT_EXEC() \
321 	ATF_TP_ADD_TC(tp, traceme_vfork_exec); \
322 	ATF_TP_ADD_TC(tp, traceme_vfork_signalmasked_exec); \
323 	ATF_TP_ADD_TC(tp, traceme_vfork_signalignored_exec); \
324 	ATF_TP_ADD_TC(tp, traceme_exec); \
325 	ATF_TP_ADD_TC(tp, traceme_signalmasked_exec); \
326 	ATF_TP_ADD_TC(tp, traceme_signalignored_exec);
327