Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(683)

Unified Diff: third_party/crashpad/crashpad/util/linux/scoped_ptrace_attach_test.cc

Issue 2814043003: Update Crashpad to 1f28a123a4c9449e3d7ddad4ff00dacd366d5216 (Closed)
Patch Set: Add missing GN config to fix compile/link. Created 3 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: third_party/crashpad/crashpad/util/linux/scoped_ptrace_attach_test.cc
diff --git a/third_party/crashpad/crashpad/util/linux/scoped_ptrace_attach_test.cc b/third_party/crashpad/crashpad/util/linux/scoped_ptrace_attach_test.cc
new file mode 100644
index 0000000000000000000000000000000000000000..99072e4c7c7dcfb73263bf1156774d143079a1d6
--- /dev/null
+++ b/third_party/crashpad/crashpad/util/linux/scoped_ptrace_attach_test.cc
@@ -0,0 +1,204 @@
+// Copyright 2017 The Crashpad Authors. All rights reserved.
+//
+// Licensed under the Apache License, Version 2.0 (the "License");
+// you may not use this file except in compliance with the License.
+// You may obtain a copy of the License at
+//
+// http://www.apache.org/licenses/LICENSE-2.0
+//
+// Unless required by applicable law or agreed to in writing, software
+// distributed under the License is distributed on an "AS IS" BASIS,
+// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+// See the License for the specific language governing permissions and
+// limitations under the License.
+
+#include "util/linux/scoped_ptrace_attach.h"
+
+#include <errno.h>
+#include <sys/prctl.h>
+#include <sys/ptrace.h>
+#include <unistd.h>
+
+#include "gtest/gtest.h"
+#include "test/errors.h"
+#include "test/multiprocess.h"
+#include "util/file/file_io.h"
+
+namespace crashpad {
+namespace test {
+namespace {
+
+class ScopedPrSetPtracer {
+ public:
+ explicit ScopedPrSetPtracer(pid_t pid) {
+ // PR_SET_PTRACER is only supported if the Yama Linux security module (LSM)
+ // is enabled. Otherwise, this prctl() call fails with EINVAL. See
+ // linux-4.9.20/security/yama/yama_lsm.c yama_task_prctl() and
+ // linux-4.9.20/kernel/sys.c [sys_]prctl().
+ //
+ // If Yama is not enabled, the default ptrace restrictions should be
+ // sufficient for these tests.
+ //
+ // If Yama is enabled, then /proc/sys/kernel/yama/ptrace_scope must be 0
+ // (YAMA_SCOPE_DISABLED, in which case this prctl() is not necessary) or 1
+ // (YAMA_SCOPE_RELATIONAL) for these tests to succeed. If it is 2
+ // (YAMA_SCOPE_CAPABILITY) then the test requires CAP_SYS_PTRACE, and if it
+ // is 3 (YAMA_SCOPE_NO_ATTACH), these tests will fail.
+ success_ = prctl(PR_SET_PTRACER, pid, 0, 0, 0) == 0;
+ if (!success_) {
+ EXPECT_EQ(errno, EINVAL) << ErrnoMessage("prctl");
+ }
+ }
+
+ ~ScopedPrSetPtracer() {
+ if (success_) {
+ EXPECT_EQ(prctl(PR_SET_PTRACER, 0, 0, 0, 0), 0) << ErrnoMessage("prctl");
+ }
+ }
+
+ private:
+ bool success_;
+
+ DISALLOW_COPY_AND_ASSIGN(ScopedPrSetPtracer);
+};
+
+class AttachTest : public Multiprocess {
+ public:
+ AttachTest() : Multiprocess() {}
+ ~AttachTest() {}
+
+ protected:
+ const long kWord = 42;
+
+ private:
+ DISALLOW_COPY_AND_ASSIGN(AttachTest);
+};
+
+class AttachToChildTest : public AttachTest {
+ public:
+ AttachToChildTest() : AttachTest() {}
+ ~AttachToChildTest() {}
+
+ private:
+ void MultiprocessParent() override {
+ // Wait for the child to set the parent as its ptracer.
+ char c;
+ CheckedReadFileExactly(ReadPipeHandle(), &c, sizeof(c));
+
+ pid_t pid = ChildPID();
+
+ ASSERT_EQ(ptrace(PTRACE_PEEKDATA, pid, &kWord, nullptr), -1);
+ EXPECT_EQ(errno, ESRCH) << ErrnoMessage("ptrace");
+
+ ScopedPtraceAttach attachment;
+ ASSERT_EQ(attachment.ResetAttach(pid), true);
+ EXPECT_EQ(ptrace(PTRACE_PEEKDATA, pid, &kWord, nullptr), kWord)
+ << ErrnoMessage("ptrace");
+ attachment.Reset();
+
+ ASSERT_EQ(ptrace(PTRACE_PEEKDATA, pid, &kWord, nullptr), -1);
+ EXPECT_EQ(errno, ESRCH) << ErrnoMessage("ptrace");
+ }
+
+ void MultiprocessChild() override {
+ ScopedPrSetPtracer set_ptracer(getppid());
+
+ char c = '\0';
+ CheckedWriteFile(WritePipeHandle(), &c, sizeof(c));
+
+ CheckedReadFileAtEOF(ReadPipeHandle());
+ }
+
+ DISALLOW_COPY_AND_ASSIGN(AttachToChildTest);
+};
+
+TEST(ScopedPtraceAttach, AttachChild) {
+ AttachToChildTest test;
+ test.Run();
+}
+
+class AttachToParentResetTest : public AttachTest {
+ public:
+ AttachToParentResetTest() : AttachTest() {}
+ ~AttachToParentResetTest() {}
+
+ private:
+ void MultiprocessParent() override {
+ ScopedPrSetPtracer set_ptracer(ChildPID());
+ char c = '\0';
+ CheckedWriteFile(WritePipeHandle(), &c, sizeof(c));
+
+ CheckedReadFileAtEOF(ReadPipeHandle());
+ }
+
+ void MultiprocessChild() override {
+ // Wait for the parent to set the child as its ptracer.
+ char c;
+ CheckedReadFileExactly(ReadPipeHandle(), &c, sizeof(c));
+
+ pid_t pid = getppid();
+
+ ASSERT_EQ(ptrace(PTRACE_PEEKDATA, pid, &kWord, nullptr), -1);
+ EXPECT_EQ(errno, ESRCH) << ErrnoMessage("ptrace");
+
+ ScopedPtraceAttach attachment;
+ ASSERT_EQ(attachment.ResetAttach(pid), true);
+ EXPECT_EQ(ptrace(PTRACE_PEEKDATA, pid, &kWord, nullptr), kWord)
+ << ErrnoMessage("ptrace");
+ attachment.Reset();
+
+ ASSERT_EQ(ptrace(PTRACE_PEEKDATA, pid, &kWord, nullptr), -1);
+ EXPECT_EQ(errno, ESRCH) << ErrnoMessage("ptrace");
+ }
+
+ DISALLOW_COPY_AND_ASSIGN(AttachToParentResetTest);
+};
+
+TEST(ScopedPtraceAttach, AttachParentReset) {
+ AttachToParentResetTest test;
+ test.Run();
+}
+
+class AttachToParentDestructorTest : public AttachTest {
+ public:
+ AttachToParentDestructorTest() : AttachTest() {}
+ ~AttachToParentDestructorTest() {}
+
+ private:
+ void MultiprocessParent() override {
+ ScopedPrSetPtracer set_ptracer(ChildPID());
+ char c = '\0';
+ CheckedWriteFile(WritePipeHandle(), &c, sizeof(c));
+
+ CheckedReadFileAtEOF(ReadPipeHandle());
+ }
+
+ void MultiprocessChild() override {
+ // Wait for the parent to set the child as its ptracer.
+ char c;
+ CheckedReadFileExactly(ReadPipeHandle(), &c, sizeof(c));
+
+ pid_t pid = getppid();
+ ASSERT_EQ(ptrace(PTRACE_PEEKDATA, pid, &kWord, nullptr), -1);
+ EXPECT_EQ(errno, ESRCH) << ErrnoMessage("ptrace");
+ {
+ ScopedPtraceAttach attachment;
+ ASSERT_EQ(attachment.ResetAttach(pid), true);
+ EXPECT_EQ(ptrace(PTRACE_PEEKDATA, pid, &kWord, nullptr), kWord)
+ << ErrnoMessage("ptrace");
+ }
+ ASSERT_EQ(ptrace(PTRACE_PEEKDATA, pid, &kWord, nullptr), -1);
+ EXPECT_EQ(errno, ESRCH) << ErrnoMessage("ptrace");
+ }
+
+ DISALLOW_COPY_AND_ASSIGN(AttachToParentDestructorTest);
+};
+
+TEST(ScopedPtraceAttach, AttachParentDestructor) {
+ AttachToParentDestructorTest test;
+ test.Run();
+}
+
+} // namespace
+} // namespace test
+} // namespace crashpad

Powered by Google App Engine
This is Rietveld 408576698