• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (C) 2016 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 #include <sys/ptrace.h>
18 
19 #include <elf.h>
20 #include <err.h>
21 #include <fcntl.h>
22 #include <sched.h>
23 #include <sys/prctl.h>
24 #include <sys/ptrace.h>
25 #include <sys/uio.h>
26 #include <sys/user.h>
27 #include <sys/wait.h>
28 #include <unistd.h>
29 
30 #include <chrono>
31 #include <thread>
32 
33 #include <gtest/gtest.h>
34 
35 #include <android-base/macros.h>
36 #include <android-base/unique_fd.h>
37 
38 #include "utils.h"
39 
40 using namespace std::chrono_literals;
41 
42 using android::base::unique_fd;
43 
44 // Host libc does not define this.
45 #ifndef TRAP_HWBKPT
46 #define TRAP_HWBKPT 4
47 #endif
48 
49 class ChildGuard {
50  public:
ChildGuard(pid_t pid)51   explicit ChildGuard(pid_t pid) : pid(pid) {}
52 
~ChildGuard()53   ~ChildGuard() {
54     kill(pid, SIGKILL);
55     int status;
56     TEMP_FAILURE_RETRY(waitpid(pid, &status, 0));
57   }
58 
59  private:
60   pid_t pid;
61 };
62 
63 enum class HwFeature { Watchpoint, Breakpoint };
64 
check_hw_feature_supported(pid_t child,HwFeature feature)65 static void check_hw_feature_supported(pid_t child, HwFeature feature) {
66 #if defined(__arm__)
67   long capabilities;
68   long result = ptrace(PTRACE_GETHBPREGS, child, 0, &capabilities);
69   if (result == -1) {
70     EXPECT_EQ(EIO, errno);
71     GTEST_SKIP() << "Hardware debug support disabled at kernel configuration time";
72   }
73   uint8_t hb_count = capabilities & 0xff;
74   capabilities >>= 8;
75   uint8_t wp_count = capabilities & 0xff;
76   capabilities >>= 8;
77   uint8_t max_wp_size = capabilities & 0xff;
78   if (max_wp_size == 0) {
79     GTEST_SKIP() << "Kernel reports zero maximum watchpoint size";
80   } else if (feature == HwFeature::Watchpoint && wp_count == 0) {
81     GTEST_SKIP() << "Kernel reports zero hardware watchpoints";
82   } else if (feature == HwFeature::Breakpoint && hb_count == 0) {
83     GTEST_SKIP() << "Kernel reports zero hardware breakpoints";
84   }
85 #elif defined(__aarch64__)
86   user_hwdebug_state dreg_state;
87   iovec iov;
88   iov.iov_base = &dreg_state;
89   iov.iov_len = sizeof(dreg_state);
90 
91   long result = ptrace(PTRACE_GETREGSET, child,
92                        feature == HwFeature::Watchpoint ? NT_ARM_HW_WATCH : NT_ARM_HW_BREAK, &iov);
93   if (result == -1) {
94     ASSERT_EQ(EINVAL, errno);
95   }
96   if ((dreg_state.dbg_info & 0xff) == 0) GTEST_SKIP() << "hardware support missing";
97 #else
98   // We assume watchpoints and breakpoints are always supported on x86.
99   UNUSED(child);
100   UNUSED(feature);
101 #endif
102 }
103 
set_watchpoint(pid_t child,uintptr_t address,size_t size)104 static void set_watchpoint(pid_t child, uintptr_t address, size_t size) {
105   ASSERT_EQ(0u, address & 0x7) << "address: " << address;
106 #if defined(__arm__) || defined(__aarch64__)
107   const unsigned byte_mask = (1 << size) - 1;
108   const unsigned type = 2; // Write.
109   const unsigned enable = 1;
110   const unsigned control = byte_mask << 5 | type << 3 | enable;
111 
112 #ifdef __arm__
113   ASSERT_EQ(0, ptrace(PTRACE_SETHBPREGS, child, -1, &address)) << strerror(errno);
114   ASSERT_EQ(0, ptrace(PTRACE_SETHBPREGS, child, -2, &control)) << strerror(errno);
115 #else // aarch64
116   user_hwdebug_state dreg_state;
117   memset(&dreg_state, 0, sizeof dreg_state);
118   dreg_state.dbg_regs[0].addr = address;
119   dreg_state.dbg_regs[0].ctrl = control;
120 
121   iovec iov;
122   iov.iov_base = &dreg_state;
123   iov.iov_len = offsetof(user_hwdebug_state, dbg_regs) + sizeof(dreg_state.dbg_regs[0]);
124 
125   ASSERT_EQ(0, ptrace(PTRACE_SETREGSET, child, NT_ARM_HW_WATCH, &iov)) << strerror(errno);
126 #endif
127 #elif defined(__i386__) || defined(__x86_64__)
128   ASSERT_EQ(0, ptrace(PTRACE_POKEUSER, child, offsetof(user, u_debugreg[0]), address)) << strerror(errno);
129   errno = 0;
130   unsigned data = ptrace(PTRACE_PEEKUSER, child, offsetof(user, u_debugreg[7]), nullptr);
131   ASSERT_EQ(0, errno);
132 
133   const unsigned size_flag = (size == 8) ? 2 : size - 1;
134   const unsigned enable = 1;
135   const unsigned type = 1; // Write.
136 
137   const unsigned mask = 3 << 18 | 3 << 16 | 1;
138   const unsigned value = size_flag << 18 | type << 16 | enable;
139   data &= mask;
140   data |= value;
141   ASSERT_EQ(0, ptrace(PTRACE_POKEUSER, child, offsetof(user, u_debugreg[7]), data)) << strerror(errno);
142 #else
143   UNUSED(child);
144   UNUSED(address);
145   UNUSED(size);
146 #endif
147 }
148 
149 template <typename T>
run_watchpoint_test(std::function<void (T &)> child_func,size_t offset,size_t size)150 static void run_watchpoint_test(std::function<void(T&)> child_func, size_t offset, size_t size) {
151   alignas(16) T data{};
152 
153   pid_t child = fork();
154   ASSERT_NE(-1, child) << strerror(errno);
155   if (child == 0) {
156     // Extra precaution: make sure we go away if anything happens to our parent.
157     if (prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0) == -1) {
158       perror("prctl(PR_SET_PDEATHSIG)");
159       _exit(1);
160     }
161 
162     if (ptrace(PTRACE_TRACEME, 0, nullptr, nullptr) == -1) {
163       perror("ptrace(PTRACE_TRACEME)");
164       _exit(2);
165     }
166 
167     child_func(data);
168     _exit(0);
169   }
170 
171   ChildGuard guard(child);
172 
173   int status;
174   ASSERT_EQ(child, TEMP_FAILURE_RETRY(waitpid(child, &status, __WALL))) << strerror(errno);
175   ASSERT_TRUE(WIFSTOPPED(status)) << "Status was: " << status;
176   ASSERT_EQ(SIGSTOP, WSTOPSIG(status)) << "Status was: " << status;
177 
178   check_hw_feature_supported(child, HwFeature::Watchpoint);
179 
180   set_watchpoint(child, uintptr_t(untag_address(&data)) + offset, size);
181 
182   ASSERT_EQ(0, ptrace(PTRACE_CONT, child, nullptr, nullptr)) << strerror(errno);
183   ASSERT_EQ(child, TEMP_FAILURE_RETRY(waitpid(child, &status, __WALL))) << strerror(errno);
184   ASSERT_TRUE(WIFSTOPPED(status)) << "Status was: " << status;
185   ASSERT_EQ(SIGTRAP, WSTOPSIG(status)) << "Status was: " << status;
186 
187   siginfo_t siginfo;
188   ASSERT_EQ(0, ptrace(PTRACE_GETSIGINFO, child, nullptr, &siginfo)) << strerror(errno);
189   ASSERT_EQ(TRAP_HWBKPT, siginfo.si_code);
190 #if defined(__arm__) || defined(__aarch64__)
191   ASSERT_LE(&data, siginfo.si_addr);
192   ASSERT_GT((&data) + 1, siginfo.si_addr);
193 #endif
194 }
195 
196 template <typename T>
watchpoint_stress_child(unsigned cpu,T & data)197 static void watchpoint_stress_child(unsigned cpu, T& data) {
198   cpu_set_t cpus;
199   CPU_ZERO(&cpus);
200   CPU_SET(cpu, &cpus);
201   if (sched_setaffinity(0, sizeof cpus, &cpus) == -1) {
202     perror("sched_setaffinity");
203     _exit(3);
204   }
205   raise(SIGSTOP);  // Synchronize with the tracer, let it set the watchpoint.
206 
207   data = 1;  // Now trigger the watchpoint.
208 }
209 
210 template <typename T>
run_watchpoint_stress(size_t cpu)211 static void run_watchpoint_stress(size_t cpu) {
212   run_watchpoint_test<T>(std::bind(watchpoint_stress_child<T>, cpu, std::placeholders::_1), 0,
213                          sizeof(T));
214 }
215 
216 // Test watchpoint API. The test is considered successful if our watchpoints get hit OR the
217 // system reports that watchpoint support is not present. We run the test for different
218 // watchpoint sizes, while pinning the process to each cpu in turn, for better coverage.
TEST(sys_ptrace,watchpoint_stress)219 TEST(sys_ptrace, watchpoint_stress) {
220   cpu_set_t available_cpus;
221   ASSERT_EQ(0, sched_getaffinity(0, sizeof available_cpus, &available_cpus));
222 
223   for (size_t cpu = 0; cpu < CPU_SETSIZE; ++cpu) {
224     if (!CPU_ISSET(cpu, &available_cpus)) continue;
225 
226     run_watchpoint_stress<uint8_t>(cpu);
227     run_watchpoint_stress<uint16_t>(cpu);
228     run_watchpoint_stress<uint32_t>(cpu);
229 #if defined(__LP64__)
230     run_watchpoint_stress<uint64_t>(cpu);
231 #endif
232   }
233 }
234 
235 struct Uint128_t {
236   uint64_t data[2];
237 };
watchpoint_imprecise_child(Uint128_t & data)238 static void watchpoint_imprecise_child(Uint128_t& data) {
239   raise(SIGSTOP);  // Synchronize with the tracer, let it set the watchpoint.
240 
241 #if defined(__i386__) || defined(__x86_64__)
242   asm volatile("movdqa %%xmm0, %0" : : "m"(data));
243 #elif defined(__arm__)
244   asm volatile("stm %0, { r0, r1, r2, r3 }" : : "r"(&data));
245 #elif defined(__aarch64__)
246   asm volatile("stp x0, x1, %0" : : "m"(data));
247 #elif defined(__mips__)
248 // TODO
249   UNUSED(data);
250 #endif
251 }
252 
253 // Test that the kernel is able to handle the case when the instruction writes
254 // to a larger block of memory than the one we are watching. If you see this
255 // test fail on arm64, you will likely need to cherry-pick fdfeff0f into your
256 // kernel.
TEST(sys_ptrace,watchpoint_imprecise)257 TEST(sys_ptrace, watchpoint_imprecise) {
258   // This test relies on the infrastructure to timeout if the test hangs.
259   run_watchpoint_test<Uint128_t>(watchpoint_imprecise_child, 8, sizeof(void*));
260 }
261 
breakpoint_func()262 static void __attribute__((noinline)) breakpoint_func() {
263   asm volatile("");
264 }
265 
breakpoint_fork_child()266 static void __attribute__((noreturn)) breakpoint_fork_child() {
267   // Extra precaution: make sure we go away if anything happens to our parent.
268   if (prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0) == -1) {
269     perror("prctl(PR_SET_PDEATHSIG)");
270     _exit(1);
271   }
272 
273   if (ptrace(PTRACE_TRACEME, 0, nullptr, nullptr) == -1) {
274     perror("ptrace(PTRACE_TRACEME)");
275     _exit(2);
276   }
277 
278   raise(SIGSTOP);  // Synchronize with the tracer, let it set the breakpoint.
279 
280   breakpoint_func();  // Now trigger the breakpoint.
281 
282   _exit(0);
283 }
284 
set_breakpoint(pid_t child)285 static void set_breakpoint(pid_t child) {
286   uintptr_t address = uintptr_t(breakpoint_func);
287 #if defined(__arm__) || defined(__aarch64__)
288   address &= ~3;
289   const unsigned byte_mask = 0xf;
290   const unsigned enable = 1;
291   const unsigned control = byte_mask << 5 | enable;
292 
293 #ifdef __arm__
294   ASSERT_EQ(0, ptrace(PTRACE_SETHBPREGS, child, 1, &address)) << strerror(errno);
295   ASSERT_EQ(0, ptrace(PTRACE_SETHBPREGS, child, 2, &control)) << strerror(errno);
296 #else  // aarch64
297   user_hwdebug_state dreg_state;
298   memset(&dreg_state, 0, sizeof dreg_state);
299   dreg_state.dbg_regs[0].addr = reinterpret_cast<uintptr_t>(address);
300   dreg_state.dbg_regs[0].ctrl = control;
301 
302   iovec iov;
303   iov.iov_base = &dreg_state;
304   iov.iov_len = offsetof(user_hwdebug_state, dbg_regs) + sizeof(dreg_state.dbg_regs[0]);
305 
306   ASSERT_EQ(0, ptrace(PTRACE_SETREGSET, child, NT_ARM_HW_BREAK, &iov)) << strerror(errno);
307 #endif
308 #elif defined(__i386__) || defined(__x86_64__)
309   ASSERT_EQ(0, ptrace(PTRACE_POKEUSER, child, offsetof(user, u_debugreg[0]), address))
310       << strerror(errno);
311   errno = 0;
312   unsigned data = ptrace(PTRACE_PEEKUSER, child, offsetof(user, u_debugreg[7]), nullptr);
313   ASSERT_EQ(0, errno);
314 
315   const unsigned size = 0;
316   const unsigned enable = 1;
317   const unsigned type = 0;  // Execute
318 
319   const unsigned mask = 3 << 18 | 3 << 16 | 1;
320   const unsigned value = size << 18 | type << 16 | enable;
321   data &= mask;
322   data |= value;
323   ASSERT_EQ(0, ptrace(PTRACE_POKEUSER, child, offsetof(user, u_debugreg[7]), data))
324       << strerror(errno);
325 #else
326   UNUSED(child);
327   UNUSED(address);
328 #endif
329 }
330 
331 // Test hardware breakpoint API. The test is considered successful if the breakpoints get hit OR the
332 // system reports that hardware breakpoint support is not present.
TEST(sys_ptrace,hardware_breakpoint)333 TEST(sys_ptrace, hardware_breakpoint) {
334   pid_t child = fork();
335   ASSERT_NE(-1, child) << strerror(errno);
336   if (child == 0) breakpoint_fork_child();
337 
338   ChildGuard guard(child);
339 
340   int status;
341   ASSERT_EQ(child, TEMP_FAILURE_RETRY(waitpid(child, &status, __WALL))) << strerror(errno);
342   ASSERT_TRUE(WIFSTOPPED(status)) << "Status was: " << status;
343   ASSERT_EQ(SIGSTOP, WSTOPSIG(status)) << "Status was: " << status;
344 
345   check_hw_feature_supported(child, HwFeature::Breakpoint);
346 
347   set_breakpoint(child);
348 
349   ASSERT_EQ(0, ptrace(PTRACE_CONT, child, nullptr, nullptr)) << strerror(errno);
350   ASSERT_EQ(child, TEMP_FAILURE_RETRY(waitpid(child, &status, __WALL))) << strerror(errno);
351   ASSERT_TRUE(WIFSTOPPED(status)) << "Status was: " << status;
352   ASSERT_EQ(SIGTRAP, WSTOPSIG(status)) << "Status was: " << status;
353 
354   siginfo_t siginfo;
355   ASSERT_EQ(0, ptrace(PTRACE_GETSIGINFO, child, nullptr, &siginfo)) << strerror(errno);
356   ASSERT_EQ(TRAP_HWBKPT, siginfo.si_code);
357 }
358 
359 class PtraceResumptionTest : public ::testing::Test {
360  public:
361   unique_fd worker_pipe_write;
362 
363   pid_t worker = -1;
364   pid_t tracer = -1;
365 
PtraceResumptionTest()366   PtraceResumptionTest() {
367     unique_fd worker_pipe_read;
368     if (!android::base::Pipe(&worker_pipe_read, &worker_pipe_write)) {
369       err(1, "failed to create pipe");
370     }
371 
372     // Second pipe to synchronize the Yama ptracer setup.
373     unique_fd worker_pipe_setup_read, worker_pipe_setup_write;
374     if (!android::base::Pipe(&worker_pipe_setup_read, &worker_pipe_setup_write)) {
375       err(1, "failed to create pipe");
376     }
377 
378     worker = fork();
379     if (worker == -1) {
380       err(1, "failed to fork worker");
381     } else if (worker == 0) {
382       char buf;
383       // Allow the tracer process, which is not a direct process ancestor, to
384       // be able to use ptrace(2) on this process when Yama LSM is active.
385       if (prctl(PR_SET_PTRACER, PR_SET_PTRACER_ANY, 0, 0, 0) == -1) {
386         // if Yama is off prctl(PR_SET_PTRACER) returns EINVAL - don't log in this
387         // case since it's expected behaviour.
388         if (errno != EINVAL) {
389           err(1, "prctl(PR_SET_PTRACER, PR_SET_PTRACER_ANY) failed for pid %d", getpid());
390         }
391       }
392       worker_pipe_setup_write.reset();
393 
394       worker_pipe_write.reset();
395       TEMP_FAILURE_RETRY(read(worker_pipe_read.get(), &buf, sizeof(buf)));
396       exit(0);
397     } else {
398       // Wait until the Yama ptracer is setup.
399       char buf;
400       worker_pipe_setup_write.reset();
401       TEMP_FAILURE_RETRY(read(worker_pipe_setup_read.get(), &buf, sizeof(buf)));
402     }
403   }
404 
~PtraceResumptionTest()405   ~PtraceResumptionTest() override {
406   }
407 
408   void AssertDeath(int signo);
409 
StartTracer(std::function<void ()> f)410   void StartTracer(std::function<void()> f) {
411     tracer = fork();
412     ASSERT_NE(-1, tracer);
413     if (tracer == 0) {
414       f();
415       if (HasFatalFailure()) {
416         exit(1);
417       }
418       exit(0);
419     }
420   }
421 
WaitForTracer()422   bool WaitForTracer() {
423     if (tracer == -1) {
424       errx(1, "tracer not started");
425     }
426 
427     int result;
428     pid_t rc = TEMP_FAILURE_RETRY(waitpid(tracer, &result, 0));
429     if (rc != tracer) {
430       printf("waitpid returned %d (%s)\n", rc, strerror(errno));
431       return false;
432     }
433 
434     if (!WIFEXITED(result) && !WIFSIGNALED(result)) {
435       printf("!WIFEXITED && !WIFSIGNALED\n");
436       return false;
437     }
438 
439     if (WIFEXITED(result)) {
440       if (WEXITSTATUS(result) != 0) {
441         printf("tracer failed\n");
442         return false;
443       }
444     }
445 
446     return true;
447   }
448 
WaitForWorker()449   bool WaitForWorker() {
450     if (worker == -1) {
451       errx(1, "worker not started");
452     }
453 
454     int result;
455     pid_t rc = TEMP_FAILURE_RETRY(waitpid(worker, &result, WNOHANG));
456     if (rc != 0) {
457       printf("worker exited prematurely\n");
458       return false;
459     }
460 
461     worker_pipe_write.reset();
462 
463     rc = TEMP_FAILURE_RETRY(waitpid(worker, &result, 0));
464     if (rc != worker) {
465       printf("waitpid for worker returned %d (%s)\n", rc, strerror(errno));
466       return false;
467     }
468 
469     if (!WIFEXITED(result)) {
470       printf("worker didn't exit\n");
471       return false;
472     }
473 
474     if (WEXITSTATUS(result) != 0) {
475       printf("worker exited with status %d\n", WEXITSTATUS(result));
476       return false;
477     }
478 
479     return true;
480   }
481 };
482 
wait_for_ptrace_stop(pid_t pid)483 static void wait_for_ptrace_stop(pid_t pid) {
484   while (true) {
485     int status;
486     pid_t rc = TEMP_FAILURE_RETRY(waitpid(pid, &status, __WALL));
487     if (rc != pid) {
488       abort();
489     }
490     if (WIFSTOPPED(status)) {
491       return;
492     }
493   }
494 }
495 
TEST_F(PtraceResumptionTest,smoke)496 TEST_F(PtraceResumptionTest, smoke) {
497   // Make sure that the worker doesn't exit before the tracer stops tracing.
498   StartTracer([this]() {
499     ASSERT_EQ(0, ptrace(PTRACE_SEIZE, worker, 0, 0)) << strerror(errno);
500     ASSERT_EQ(0, ptrace(PTRACE_INTERRUPT, worker, 0, 0)) << strerror(errno);
501     wait_for_ptrace_stop(worker);
502     std::this_thread::sleep_for(500ms);
503   });
504 
505   worker_pipe_write.reset();
506   std::this_thread::sleep_for(250ms);
507 
508   int result;
509   ASSERT_EQ(0, TEMP_FAILURE_RETRY(waitpid(worker, &result, WNOHANG)));
510   ASSERT_TRUE(WaitForTracer());
511   ASSERT_EQ(worker, TEMP_FAILURE_RETRY(waitpid(worker, &result, 0)));
512 }
513 
TEST_F(PtraceResumptionTest,seize)514 TEST_F(PtraceResumptionTest, seize) {
515   StartTracer([this]() { ASSERT_EQ(0, ptrace(PTRACE_SEIZE, worker, 0, 0)) << strerror(errno); });
516   ASSERT_TRUE(WaitForTracer());
517   ASSERT_TRUE(WaitForWorker());
518 }
519 
TEST_F(PtraceResumptionTest,seize_interrupt)520 TEST_F(PtraceResumptionTest, seize_interrupt) {
521   StartTracer([this]() {
522     ASSERT_EQ(0, ptrace(PTRACE_SEIZE, worker, 0, 0)) << strerror(errno);
523     ASSERT_EQ(0, ptrace(PTRACE_INTERRUPT, worker, 0, 0)) << strerror(errno);
524     wait_for_ptrace_stop(worker);
525   });
526   ASSERT_TRUE(WaitForTracer());
527   ASSERT_TRUE(WaitForWorker());
528 }
529 
TEST_F(PtraceResumptionTest,seize_interrupt_cont)530 TEST_F(PtraceResumptionTest, seize_interrupt_cont) {
531   StartTracer([this]() {
532     ASSERT_EQ(0, ptrace(PTRACE_SEIZE, worker, 0, 0)) << strerror(errno);
533     ASSERT_EQ(0, ptrace(PTRACE_INTERRUPT, worker, 0, 0)) << strerror(errno);
534     wait_for_ptrace_stop(worker);
535     ASSERT_EQ(0, ptrace(PTRACE_CONT, worker, 0, 0)) << strerror(errno);
536   });
537   ASSERT_TRUE(WaitForTracer());
538   ASSERT_TRUE(WaitForWorker());
539 }
540 
TEST_F(PtraceResumptionTest,zombie_seize)541 TEST_F(PtraceResumptionTest, zombie_seize) {
542   StartTracer([this]() { ASSERT_EQ(0, ptrace(PTRACE_SEIZE, worker, 0, 0)) << strerror(errno); });
543   ASSERT_TRUE(WaitForWorker());
544   ASSERT_TRUE(WaitForTracer());
545 }
546 
TEST_F(PtraceResumptionTest,zombie_seize_interrupt)547 TEST_F(PtraceResumptionTest, zombie_seize_interrupt) {
548   StartTracer([this]() {
549     ASSERT_EQ(0, ptrace(PTRACE_SEIZE, worker, 0, 0)) << strerror(errno);
550     ASSERT_EQ(0, ptrace(PTRACE_INTERRUPT, worker, 0, 0)) << strerror(errno);
551     wait_for_ptrace_stop(worker);
552   });
553   ASSERT_TRUE(WaitForWorker());
554   ASSERT_TRUE(WaitForTracer());
555 }
556 
TEST_F(PtraceResumptionTest,zombie_seize_interrupt_cont)557 TEST_F(PtraceResumptionTest, zombie_seize_interrupt_cont) {
558   StartTracer([this]() {
559     ASSERT_EQ(0, ptrace(PTRACE_SEIZE, worker, 0, 0)) << strerror(errno);
560     ASSERT_EQ(0, ptrace(PTRACE_INTERRUPT, worker, 0, 0)) << strerror(errno);
561     wait_for_ptrace_stop(worker);
562     ASSERT_EQ(0, ptrace(PTRACE_CONT, worker, 0, 0)) << strerror(errno);
563   });
564   ASSERT_TRUE(WaitForWorker());
565   ASSERT_TRUE(WaitForTracer());
566 }
567