| Index: third_party/crashpad/crashpad/util/linux/scoped_ptrace_attach_test.cc
|
| diff --git a/third_party/crashpad/crashpad/util/linux/scoped_ptrace_attach_test.cc b/third_party/crashpad/crashpad/util/linux/scoped_ptrace_attach_test.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..99072e4c7c7dcfb73263bf1156774d143079a1d6
|
| --- /dev/null
|
| +++ b/third_party/crashpad/crashpad/util/linux/scoped_ptrace_attach_test.cc
|
| @@ -0,0 +1,204 @@
|
| +// Copyright 2017 The Crashpad Authors. All rights reserved.
|
| +//
|
| +// Licensed under the Apache License, Version 2.0 (the "License");
|
| +// you may not use this file except in compliance with the License.
|
| +// You may obtain a copy of the License at
|
| +//
|
| +// http://www.apache.org/licenses/LICENSE-2.0
|
| +//
|
| +// Unless required by applicable law or agreed to in writing, software
|
| +// distributed under the License is distributed on an "AS IS" BASIS,
|
| +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
| +// See the License for the specific language governing permissions and
|
| +// limitations under the License.
|
| +
|
| +#include "util/linux/scoped_ptrace_attach.h"
|
| +
|
| +#include <errno.h>
|
| +#include <sys/prctl.h>
|
| +#include <sys/ptrace.h>
|
| +#include <unistd.h>
|
| +
|
| +#include "gtest/gtest.h"
|
| +#include "test/errors.h"
|
| +#include "test/multiprocess.h"
|
| +#include "util/file/file_io.h"
|
| +
|
| +namespace crashpad {
|
| +namespace test {
|
| +namespace {
|
| +
|
| +class ScopedPrSetPtracer {
|
| + public:
|
| + explicit ScopedPrSetPtracer(pid_t pid) {
|
| + // PR_SET_PTRACER is only supported if the Yama Linux security module (LSM)
|
| + // is enabled. Otherwise, this prctl() call fails with EINVAL. See
|
| + // linux-4.9.20/security/yama/yama_lsm.c yama_task_prctl() and
|
| + // linux-4.9.20/kernel/sys.c [sys_]prctl().
|
| + //
|
| + // If Yama is not enabled, the default ptrace restrictions should be
|
| + // sufficient for these tests.
|
| + //
|
| + // If Yama is enabled, then /proc/sys/kernel/yama/ptrace_scope must be 0
|
| + // (YAMA_SCOPE_DISABLED, in which case this prctl() is not necessary) or 1
|
| + // (YAMA_SCOPE_RELATIONAL) for these tests to succeed. If it is 2
|
| + // (YAMA_SCOPE_CAPABILITY) then the test requires CAP_SYS_PTRACE, and if it
|
| + // is 3 (YAMA_SCOPE_NO_ATTACH), these tests will fail.
|
| + success_ = prctl(PR_SET_PTRACER, pid, 0, 0, 0) == 0;
|
| + if (!success_) {
|
| + EXPECT_EQ(errno, EINVAL) << ErrnoMessage("prctl");
|
| + }
|
| + }
|
| +
|
| + ~ScopedPrSetPtracer() {
|
| + if (success_) {
|
| + EXPECT_EQ(prctl(PR_SET_PTRACER, 0, 0, 0, 0), 0) << ErrnoMessage("prctl");
|
| + }
|
| + }
|
| +
|
| + private:
|
| + bool success_;
|
| +
|
| + DISALLOW_COPY_AND_ASSIGN(ScopedPrSetPtracer);
|
| +};
|
| +
|
| +class AttachTest : public Multiprocess {
|
| + public:
|
| + AttachTest() : Multiprocess() {}
|
| + ~AttachTest() {}
|
| +
|
| + protected:
|
| + const long kWord = 42;
|
| +
|
| + private:
|
| + DISALLOW_COPY_AND_ASSIGN(AttachTest);
|
| +};
|
| +
|
| +class AttachToChildTest : public AttachTest {
|
| + public:
|
| + AttachToChildTest() : AttachTest() {}
|
| + ~AttachToChildTest() {}
|
| +
|
| + private:
|
| + void MultiprocessParent() override {
|
| + // Wait for the child to set the parent as its ptracer.
|
| + char c;
|
| + CheckedReadFileExactly(ReadPipeHandle(), &c, sizeof(c));
|
| +
|
| + pid_t pid = ChildPID();
|
| +
|
| + ASSERT_EQ(ptrace(PTRACE_PEEKDATA, pid, &kWord, nullptr), -1);
|
| + EXPECT_EQ(errno, ESRCH) << ErrnoMessage("ptrace");
|
| +
|
| + ScopedPtraceAttach attachment;
|
| + ASSERT_EQ(attachment.ResetAttach(pid), true);
|
| + EXPECT_EQ(ptrace(PTRACE_PEEKDATA, pid, &kWord, nullptr), kWord)
|
| + << ErrnoMessage("ptrace");
|
| + attachment.Reset();
|
| +
|
| + ASSERT_EQ(ptrace(PTRACE_PEEKDATA, pid, &kWord, nullptr), -1);
|
| + EXPECT_EQ(errno, ESRCH) << ErrnoMessage("ptrace");
|
| + }
|
| +
|
| + void MultiprocessChild() override {
|
| + ScopedPrSetPtracer set_ptracer(getppid());
|
| +
|
| + char c = '\0';
|
| + CheckedWriteFile(WritePipeHandle(), &c, sizeof(c));
|
| +
|
| + CheckedReadFileAtEOF(ReadPipeHandle());
|
| + }
|
| +
|
| + DISALLOW_COPY_AND_ASSIGN(AttachToChildTest);
|
| +};
|
| +
|
| +TEST(ScopedPtraceAttach, AttachChild) {
|
| + AttachToChildTest test;
|
| + test.Run();
|
| +}
|
| +
|
| +class AttachToParentResetTest : public AttachTest {
|
| + public:
|
| + AttachToParentResetTest() : AttachTest() {}
|
| + ~AttachToParentResetTest() {}
|
| +
|
| + private:
|
| + void MultiprocessParent() override {
|
| + ScopedPrSetPtracer set_ptracer(ChildPID());
|
| + char c = '\0';
|
| + CheckedWriteFile(WritePipeHandle(), &c, sizeof(c));
|
| +
|
| + CheckedReadFileAtEOF(ReadPipeHandle());
|
| + }
|
| +
|
| + void MultiprocessChild() override {
|
| + // Wait for the parent to set the child as its ptracer.
|
| + char c;
|
| + CheckedReadFileExactly(ReadPipeHandle(), &c, sizeof(c));
|
| +
|
| + pid_t pid = getppid();
|
| +
|
| + ASSERT_EQ(ptrace(PTRACE_PEEKDATA, pid, &kWord, nullptr), -1);
|
| + EXPECT_EQ(errno, ESRCH) << ErrnoMessage("ptrace");
|
| +
|
| + ScopedPtraceAttach attachment;
|
| + ASSERT_EQ(attachment.ResetAttach(pid), true);
|
| + EXPECT_EQ(ptrace(PTRACE_PEEKDATA, pid, &kWord, nullptr), kWord)
|
| + << ErrnoMessage("ptrace");
|
| + attachment.Reset();
|
| +
|
| + ASSERT_EQ(ptrace(PTRACE_PEEKDATA, pid, &kWord, nullptr), -1);
|
| + EXPECT_EQ(errno, ESRCH) << ErrnoMessage("ptrace");
|
| + }
|
| +
|
| + DISALLOW_COPY_AND_ASSIGN(AttachToParentResetTest);
|
| +};
|
| +
|
| +TEST(ScopedPtraceAttach, AttachParentReset) {
|
| + AttachToParentResetTest test;
|
| + test.Run();
|
| +}
|
| +
|
| +class AttachToParentDestructorTest : public AttachTest {
|
| + public:
|
| + AttachToParentDestructorTest() : AttachTest() {}
|
| + ~AttachToParentDestructorTest() {}
|
| +
|
| + private:
|
| + void MultiprocessParent() override {
|
| + ScopedPrSetPtracer set_ptracer(ChildPID());
|
| + char c = '\0';
|
| + CheckedWriteFile(WritePipeHandle(), &c, sizeof(c));
|
| +
|
| + CheckedReadFileAtEOF(ReadPipeHandle());
|
| + }
|
| +
|
| + void MultiprocessChild() override {
|
| + // Wait for the parent to set the child as its ptracer.
|
| + char c;
|
| + CheckedReadFileExactly(ReadPipeHandle(), &c, sizeof(c));
|
| +
|
| + pid_t pid = getppid();
|
| + ASSERT_EQ(ptrace(PTRACE_PEEKDATA, pid, &kWord, nullptr), -1);
|
| + EXPECT_EQ(errno, ESRCH) << ErrnoMessage("ptrace");
|
| + {
|
| + ScopedPtraceAttach attachment;
|
| + ASSERT_EQ(attachment.ResetAttach(pid), true);
|
| + EXPECT_EQ(ptrace(PTRACE_PEEKDATA, pid, &kWord, nullptr), kWord)
|
| + << ErrnoMessage("ptrace");
|
| + }
|
| + ASSERT_EQ(ptrace(PTRACE_PEEKDATA, pid, &kWord, nullptr), -1);
|
| + EXPECT_EQ(errno, ESRCH) << ErrnoMessage("ptrace");
|
| + }
|
| +
|
| + DISALLOW_COPY_AND_ASSIGN(AttachToParentDestructorTest);
|
| +};
|
| +
|
| +TEST(ScopedPtraceAttach, AttachParentDestructor) {
|
| + AttachToParentDestructorTest test;
|
| + test.Run();
|
| +}
|
| +
|
| +} // namespace
|
| +} // namespace test
|
| +} // namespace crashpad
|
|
|