• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (C) 2016 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 #include <sys/ptrace.h>
18 
19 #include <elf.h>
20 #include <err.h>
21 #include <fcntl.h>
22 #include <sched.h>
23 #include <sys/prctl.h>
24 #include <sys/ptrace.h>
25 #include <sys/uio.h>
26 #include <sys/user.h>
27 #include <sys/wait.h>
28 #include <unistd.h>
29 
30 #include <chrono>
31 #include <thread>
32 
33 #include <gtest/gtest.h>
34 
35 #include <android-base/macros.h>
36 #include <android-base/unique_fd.h>
37 
38 #include "utils.h"
39 
40 using namespace std::chrono_literals;
41 
42 using android::base::unique_fd;
43 
44 // Host libc does not define this.
45 #ifndef TRAP_HWBKPT
46 #define TRAP_HWBKPT 4
47 #endif
48 
49 class ChildGuard {
50  public:
ChildGuard(pid_t pid)51   explicit ChildGuard(pid_t pid) : pid(pid) {}
52 
~ChildGuard()53   ~ChildGuard() {
54     kill(pid, SIGKILL);
55     int status;
56     TEMP_FAILURE_RETRY(waitpid(pid, &status, 0));
57   }
58 
59  private:
60   pid_t pid;
61 };
62 
63 enum class HwFeature { Watchpoint, Breakpoint };
64 
check_hw_feature_supported(pid_t child,HwFeature feature)65 static void check_hw_feature_supported(pid_t child, HwFeature feature) {
66 #if defined(__arm__)
67   long capabilities;
68   long result = ptrace(PTRACE_GETHBPREGS, child, 0, &capabilities);
69   if (result == -1) {
70     EXPECT_EQ(EIO, errno);
71     GTEST_SKIP() << "Hardware debug support disabled at kernel configuration time";
72   }
73   uint8_t hb_count = capabilities & 0xff;
74   capabilities >>= 8;
75   uint8_t wp_count = capabilities & 0xff;
76   capabilities >>= 8;
77   uint8_t max_wp_size = capabilities & 0xff;
78   if (max_wp_size == 0) {
79     GTEST_SKIP() << "Kernel reports zero maximum watchpoint size";
80   } else if (feature == HwFeature::Watchpoint && wp_count == 0) {
81     GTEST_SKIP() << "Kernel reports zero hardware watchpoints";
82   } else if (feature == HwFeature::Breakpoint && hb_count == 0) {
83     GTEST_SKIP() << "Kernel reports zero hardware breakpoints";
84   }
85 #elif defined(__aarch64__)
86   user_hwdebug_state dreg_state;
87   iovec iov;
88   iov.iov_base = &dreg_state;
89   iov.iov_len = sizeof(dreg_state);
90 
91   long result = ptrace(PTRACE_GETREGSET, child,
92                        feature == HwFeature::Watchpoint ? NT_ARM_HW_WATCH : NT_ARM_HW_BREAK, &iov);
93   if (result == -1) {
94     ASSERT_EQ(EINVAL, errno);
95     GTEST_SKIP() << "Hardware support missing";
96   } else if ((dreg_state.dbg_info & 0xff) == 0) {
97     if (feature == HwFeature::Watchpoint) {
98       GTEST_SKIP() << "Kernel reports zero hardware watchpoints";
99     } else {
100       GTEST_SKIP() << "Kernel reports zero hardware breakpoints";
101     }
102   }
103 #else
104   // We assume watchpoints and breakpoints are always supported on x86.
105   UNUSED(child);
106   UNUSED(feature);
107 #endif
108 }
109 
set_watchpoint(pid_t child,uintptr_t address,size_t size)110 static void set_watchpoint(pid_t child, uintptr_t address, size_t size) {
111   ASSERT_EQ(0u, address & 0x7) << "address: " << address;
112 #if defined(__arm__) || defined(__aarch64__)
113   const unsigned byte_mask = (1 << size) - 1;
114   const unsigned type = 2; // Write.
115   const unsigned enable = 1;
116   const unsigned control = byte_mask << 5 | type << 3 | enable;
117 
118 #ifdef __arm__
119   ASSERT_EQ(0, ptrace(PTRACE_SETHBPREGS, child, -1, &address)) << strerror(errno);
120   ASSERT_EQ(0, ptrace(PTRACE_SETHBPREGS, child, -2, &control)) << strerror(errno);
121 #else // aarch64
122   user_hwdebug_state dreg_state;
123   memset(&dreg_state, 0, sizeof dreg_state);
124   dreg_state.dbg_regs[0].addr = address;
125   dreg_state.dbg_regs[0].ctrl = control;
126 
127   iovec iov;
128   iov.iov_base = &dreg_state;
129   iov.iov_len = offsetof(user_hwdebug_state, dbg_regs) + sizeof(dreg_state.dbg_regs[0]);
130 
131   ASSERT_EQ(0, ptrace(PTRACE_SETREGSET, child, NT_ARM_HW_WATCH, &iov)) << strerror(errno);
132 #endif
133 #elif defined(__i386__) || defined(__x86_64__)
134   ASSERT_EQ(0, ptrace(PTRACE_POKEUSER, child, offsetof(user, u_debugreg[0]), address)) << strerror(errno);
135   errno = 0;
136   unsigned data = ptrace(PTRACE_PEEKUSER, child, offsetof(user, u_debugreg[7]), nullptr);
137   ASSERT_EQ(0, errno);
138 
139   const unsigned size_flag = (size == 8) ? 2 : size - 1;
140   const unsigned enable = 1;
141   const unsigned type = 1; // Write.
142 
143   const unsigned mask = 3 << 18 | 3 << 16 | 1;
144   const unsigned value = size_flag << 18 | type << 16 | enable;
145   data &= mask;
146   data |= value;
147   ASSERT_EQ(0, ptrace(PTRACE_POKEUSER, child, offsetof(user, u_debugreg[7]), data)) << strerror(errno);
148 #else
149   UNUSED(child);
150   UNUSED(address);
151   UNUSED(size);
152 #endif
153 }
154 
155 template <typename T>
run_watchpoint_test(std::function<void (T &)> child_func,size_t offset,size_t size)156 static void run_watchpoint_test(std::function<void(T&)> child_func, size_t offset, size_t size) {
157   alignas(16) T data{};
158 
159   pid_t child = fork();
160   ASSERT_NE(-1, child) << strerror(errno);
161   if (child == 0) {
162     // Extra precaution: make sure we go away if anything happens to our parent.
163     if (prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0) == -1) {
164       perror("prctl(PR_SET_PDEATHSIG)");
165       _exit(1);
166     }
167 
168     if (ptrace(PTRACE_TRACEME, 0, nullptr, nullptr) == -1) {
169       perror("ptrace(PTRACE_TRACEME)");
170       _exit(2);
171     }
172 
173     child_func(data);
174     _exit(0);
175   }
176 
177   ChildGuard guard(child);
178 
179   int status;
180   ASSERT_EQ(child, TEMP_FAILURE_RETRY(waitpid(child, &status, __WALL))) << strerror(errno);
181   ASSERT_TRUE(WIFSTOPPED(status)) << "Status was: " << status;
182   ASSERT_EQ(SIGSTOP, WSTOPSIG(status)) << "Status was: " << status;
183 
184   check_hw_feature_supported(child, HwFeature::Watchpoint);
185   if (::testing::Test::IsSkipped()) {
186     return;
187   }
188 
189   set_watchpoint(child, uintptr_t(untag_address(&data)) + offset, size);
190 
191   ASSERT_EQ(0, ptrace(PTRACE_CONT, child, nullptr, nullptr)) << strerror(errno);
192   ASSERT_EQ(child, TEMP_FAILURE_RETRY(waitpid(child, &status, __WALL))) << strerror(errno);
193   ASSERT_TRUE(WIFSTOPPED(status)) << "Status was: " << status;
194   ASSERT_EQ(SIGTRAP, WSTOPSIG(status)) << "Status was: " << status;
195 
196   siginfo_t siginfo;
197   ASSERT_EQ(0, ptrace(PTRACE_GETSIGINFO, child, nullptr, &siginfo)) << strerror(errno);
198   ASSERT_EQ(TRAP_HWBKPT, siginfo.si_code);
199 #if defined(__arm__) || defined(__aarch64__)
200   ASSERT_LE(&data, siginfo.si_addr);
201   ASSERT_GT((&data) + 1, siginfo.si_addr);
202 #endif
203 }
204 
205 template <typename T>
watchpoint_stress_child(unsigned cpu,T & data)206 static void watchpoint_stress_child(unsigned cpu, T& data) {
207   cpu_set_t cpus;
208   CPU_ZERO(&cpus);
209   CPU_SET(cpu, &cpus);
210   if (sched_setaffinity(0, sizeof cpus, &cpus) == -1) {
211     perror("sched_setaffinity");
212     _exit(3);
213   }
214   raise(SIGSTOP);  // Synchronize with the tracer, let it set the watchpoint.
215 
216   data = 1;  // Now trigger the watchpoint.
217 }
218 
219 template <typename T>
run_watchpoint_stress(size_t cpu)220 static void run_watchpoint_stress(size_t cpu) {
221   run_watchpoint_test<T>(std::bind(watchpoint_stress_child<T>, cpu, std::placeholders::_1), 0,
222                          sizeof(T));
223 }
224 
225 // Test watchpoint API. The test is considered successful if our watchpoints get hit OR the
226 // system reports that watchpoint support is not present. We run the test for different
227 // watchpoint sizes, while pinning the process to each cpu in turn, for better coverage.
TEST(sys_ptrace,watchpoint_stress)228 TEST(sys_ptrace, watchpoint_stress) {
229   cpu_set_t available_cpus;
230   ASSERT_EQ(0, sched_getaffinity(0, sizeof available_cpus, &available_cpus));
231 
232   for (size_t cpu = 0; cpu < CPU_SETSIZE; ++cpu) {
233     if (!CPU_ISSET(cpu, &available_cpus)) continue;
234 
235     run_watchpoint_stress<uint8_t>(cpu);
236     if (::testing::Test::IsSkipped()) {
237       // Only check first case, since all others would skip for same reason.
238       return;
239     }
240     run_watchpoint_stress<uint16_t>(cpu);
241     run_watchpoint_stress<uint32_t>(cpu);
242 #if defined(__LP64__)
243     run_watchpoint_stress<uint64_t>(cpu);
244 #endif
245   }
246 }
247 
248 struct Uint128_t {
249   uint64_t data[2];
250 };
watchpoint_imprecise_child(Uint128_t & data)251 static void watchpoint_imprecise_child(Uint128_t& data) {
252   raise(SIGSTOP);  // Synchronize with the tracer, let it set the watchpoint.
253 
254 #if defined(__i386__) || defined(__x86_64__)
255   asm volatile("movdqa %%xmm0, %0" : : "m"(data));
256 #elif defined(__arm__)
257   asm volatile("stm %0, { r0, r1, r2, r3 }" : : "r"(&data));
258 #elif defined(__aarch64__)
259   asm volatile("stp x0, x1, %0" : : "m"(data));
260 #elif defined(__riscv)
261   UNUSED(data);
262   GTEST_LOG_(INFO) << "missing riscv64 instruction to store > 64 bits in one instruction";
263 #endif
264 }
265 
266 // Test that the kernel is able to handle the case when the instruction writes
267 // to a larger block of memory than the one we are watching. If you see this
268 // test fail on arm64, you will likely need to cherry-pick fdfeff0f into your
269 // kernel.
TEST(sys_ptrace,watchpoint_imprecise)270 TEST(sys_ptrace, watchpoint_imprecise) {
271   // This test relies on the infrastructure to timeout if the test hangs.
272   run_watchpoint_test<Uint128_t>(watchpoint_imprecise_child, 8, sizeof(void*));
273 }
274 
breakpoint_func()275 static void __attribute__((noinline)) breakpoint_func() {
276   asm volatile("");
277 }
278 
breakpoint_fork_child()279 static void __attribute__((noreturn)) breakpoint_fork_child() {
280   // Extra precaution: make sure we go away if anything happens to our parent.
281   if (prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0) == -1) {
282     perror("prctl(PR_SET_PDEATHSIG)");
283     _exit(1);
284   }
285 
286   if (ptrace(PTRACE_TRACEME, 0, nullptr, nullptr) == -1) {
287     perror("ptrace(PTRACE_TRACEME)");
288     _exit(2);
289   }
290 
291   raise(SIGSTOP);  // Synchronize with the tracer, let it set the breakpoint.
292 
293   breakpoint_func();  // Now trigger the breakpoint.
294 
295   _exit(0);
296 }
297 
set_breakpoint(pid_t child)298 static void set_breakpoint(pid_t child) {
299   uintptr_t address = uintptr_t(breakpoint_func);
300 #if defined(__arm__) || defined(__aarch64__)
301   address &= ~3;
302   const unsigned byte_mask = 0xf;
303   const unsigned enable = 1;
304   const unsigned control = byte_mask << 5 | enable;
305 
306 #ifdef __arm__
307   ASSERT_EQ(0, ptrace(PTRACE_SETHBPREGS, child, 1, &address)) << strerror(errno);
308   ASSERT_EQ(0, ptrace(PTRACE_SETHBPREGS, child, 2, &control)) << strerror(errno);
309 #else  // aarch64
310   user_hwdebug_state dreg_state;
311   memset(&dreg_state, 0, sizeof dreg_state);
312   dreg_state.dbg_regs[0].addr = reinterpret_cast<uintptr_t>(address);
313   dreg_state.dbg_regs[0].ctrl = control;
314 
315   iovec iov;
316   iov.iov_base = &dreg_state;
317   iov.iov_len = offsetof(user_hwdebug_state, dbg_regs) + sizeof(dreg_state.dbg_regs[0]);
318 
319   ASSERT_EQ(0, ptrace(PTRACE_SETREGSET, child, NT_ARM_HW_BREAK, &iov)) << strerror(errno);
320 #endif
321 #elif defined(__i386__) || defined(__x86_64__)
322   ASSERT_EQ(0, ptrace(PTRACE_POKEUSER, child, offsetof(user, u_debugreg[0]), address))
323       << strerror(errno);
324   errno = 0;
325   unsigned data = ptrace(PTRACE_PEEKUSER, child, offsetof(user, u_debugreg[7]), nullptr);
326   ASSERT_EQ(0, errno);
327 
328   const unsigned size = 0;
329   const unsigned enable = 1;
330   const unsigned type = 0;  // Execute
331 
332   const unsigned mask = 3 << 18 | 3 << 16 | 1;
333   const unsigned value = size << 18 | type << 16 | enable;
334   data &= mask;
335   data |= value;
336   ASSERT_EQ(0, ptrace(PTRACE_POKEUSER, child, offsetof(user, u_debugreg[7]), data))
337       << strerror(errno);
338 #else
339   UNUSED(child);
340   UNUSED(address);
341 #endif
342 }
343 
344 // Test hardware breakpoint API. The test is considered successful if the breakpoints get hit OR the
345 // system reports that hardware breakpoint support is not present.
TEST(sys_ptrace,hardware_breakpoint)346 TEST(sys_ptrace, hardware_breakpoint) {
347   pid_t child = fork();
348   ASSERT_NE(-1, child) << strerror(errno);
349   if (child == 0) breakpoint_fork_child();
350 
351   ChildGuard guard(child);
352 
353   int status;
354   ASSERT_EQ(child, TEMP_FAILURE_RETRY(waitpid(child, &status, __WALL))) << strerror(errno);
355   ASSERT_TRUE(WIFSTOPPED(status)) << "Status was: " << status;
356   ASSERT_EQ(SIGSTOP, WSTOPSIG(status)) << "Status was: " << status;
357 
358   check_hw_feature_supported(child, HwFeature::Breakpoint);
359   if (::testing::Test::IsSkipped()) {
360     return;
361   }
362 
363   set_breakpoint(child);
364 
365   ASSERT_EQ(0, ptrace(PTRACE_CONT, child, nullptr, nullptr)) << strerror(errno);
366   ASSERT_EQ(child, TEMP_FAILURE_RETRY(waitpid(child, &status, __WALL))) << strerror(errno);
367   ASSERT_TRUE(WIFSTOPPED(status)) << "Status was: " << status;
368   ASSERT_EQ(SIGTRAP, WSTOPSIG(status)) << "Status was: " << status;
369 
370   siginfo_t siginfo;
371   ASSERT_EQ(0, ptrace(PTRACE_GETSIGINFO, child, nullptr, &siginfo)) << strerror(errno);
372   ASSERT_EQ(TRAP_HWBKPT, siginfo.si_code);
373 }
374 
375 class PtraceResumptionTest : public ::testing::Test {
376  public:
377   unique_fd worker_pipe_write;
378 
379   pid_t worker = -1;
380   pid_t tracer = -1;
381 
PtraceResumptionTest()382   PtraceResumptionTest() {
383     unique_fd worker_pipe_read;
384     if (!android::base::Pipe(&worker_pipe_read, &worker_pipe_write)) {
385       err(1, "failed to create pipe");
386     }
387 
388     // Second pipe to synchronize the Yama ptracer setup.
389     unique_fd worker_pipe_setup_read, worker_pipe_setup_write;
390     if (!android::base::Pipe(&worker_pipe_setup_read, &worker_pipe_setup_write)) {
391       err(1, "failed to create pipe");
392     }
393 
394     worker = fork();
395     if (worker == -1) {
396       err(1, "failed to fork worker");
397     } else if (worker == 0) {
398       char buf;
399       // Allow the tracer process, which is not a direct process ancestor, to
400       // be able to use ptrace(2) on this process when Yama LSM is active.
401       if (prctl(PR_SET_PTRACER, PR_SET_PTRACER_ANY, 0, 0, 0) == -1) {
402         // if Yama is off prctl(PR_SET_PTRACER) returns EINVAL - don't log in this
403         // case since it's expected behaviour.
404         if (errno != EINVAL) {
405           err(1, "prctl(PR_SET_PTRACER, PR_SET_PTRACER_ANY) failed for pid %d", getpid());
406         }
407       }
408       worker_pipe_setup_write.reset();
409 
410       worker_pipe_write.reset();
411       TEMP_FAILURE_RETRY(read(worker_pipe_read.get(), &buf, sizeof(buf)));
412       exit(0);
413     } else {
414       // Wait until the Yama ptracer is setup.
415       char buf;
416       worker_pipe_setup_write.reset();
417       TEMP_FAILURE_RETRY(read(worker_pipe_setup_read.get(), &buf, sizeof(buf)));
418     }
419   }
420 
~PtraceResumptionTest()421   ~PtraceResumptionTest() override {
422   }
423 
424   void AssertDeath(int signo);
425 
StartTracer(std::function<void ()> f)426   void StartTracer(std::function<void()> f) {
427     tracer = fork();
428     ASSERT_NE(-1, tracer);
429     if (tracer == 0) {
430       f();
431       if (HasFatalFailure()) {
432         exit(1);
433       }
434       exit(0);
435     }
436   }
437 
WaitForTracer()438   bool WaitForTracer() {
439     if (tracer == -1) {
440       errx(1, "tracer not started");
441     }
442 
443     int result;
444     pid_t rc = TEMP_FAILURE_RETRY(waitpid(tracer, &result, 0));
445     if (rc != tracer) {
446       printf("waitpid returned %d (%s)\n", rc, strerror(errno));
447       return false;
448     }
449 
450     if (!WIFEXITED(result) && !WIFSIGNALED(result)) {
451       printf("!WIFEXITED && !WIFSIGNALED\n");
452       return false;
453     }
454 
455     if (WIFEXITED(result)) {
456       if (WEXITSTATUS(result) != 0) {
457         printf("tracer failed\n");
458         return false;
459       }
460     }
461 
462     return true;
463   }
464 
WaitForWorker()465   bool WaitForWorker() {
466     if (worker == -1) {
467       errx(1, "worker not started");
468     }
469 
470     int result;
471     pid_t rc = TEMP_FAILURE_RETRY(waitpid(worker, &result, WNOHANG));
472     if (rc != 0) {
473       printf("worker exited prematurely\n");
474       return false;
475     }
476 
477     worker_pipe_write.reset();
478 
479     rc = TEMP_FAILURE_RETRY(waitpid(worker, &result, 0));
480     if (rc != worker) {
481       printf("waitpid for worker returned %d (%s)\n", rc, strerror(errno));
482       return false;
483     }
484 
485     if (!WIFEXITED(result)) {
486       printf("worker didn't exit\n");
487       return false;
488     }
489 
490     if (WEXITSTATUS(result) != 0) {
491       printf("worker exited with status %d\n", WEXITSTATUS(result));
492       return false;
493     }
494 
495     return true;
496   }
497 };
498 
wait_for_ptrace_stop(pid_t pid)499 static void wait_for_ptrace_stop(pid_t pid) {
500   while (true) {
501     int status;
502     pid_t rc = TEMP_FAILURE_RETRY(waitpid(pid, &status, __WALL));
503     if (rc != pid) {
504       abort();
505     }
506     if (WIFSTOPPED(status)) {
507       return;
508     }
509   }
510 }
511 
TEST_F(PtraceResumptionTest,smoke)512 TEST_F(PtraceResumptionTest, smoke) {
513   // Make sure that the worker doesn't exit before the tracer stops tracing.
514   StartTracer([this]() {
515     ASSERT_EQ(0, ptrace(PTRACE_SEIZE, worker, 0, 0)) << strerror(errno);
516     ASSERT_EQ(0, ptrace(PTRACE_INTERRUPT, worker, 0, 0)) << strerror(errno);
517     wait_for_ptrace_stop(worker);
518     std::this_thread::sleep_for(500ms);
519   });
520 
521   worker_pipe_write.reset();
522   std::this_thread::sleep_for(250ms);
523 
524   int result;
525   ASSERT_EQ(0, TEMP_FAILURE_RETRY(waitpid(worker, &result, WNOHANG)));
526   ASSERT_TRUE(WaitForTracer());
527   ASSERT_EQ(worker, TEMP_FAILURE_RETRY(waitpid(worker, &result, 0)));
528 }
529 
TEST_F(PtraceResumptionTest,seize)530 TEST_F(PtraceResumptionTest, seize) {
531   StartTracer([this]() { ASSERT_EQ(0, ptrace(PTRACE_SEIZE, worker, 0, 0)) << strerror(errno); });
532   ASSERT_TRUE(WaitForTracer());
533   ASSERT_TRUE(WaitForWorker());
534 }
535 
TEST_F(PtraceResumptionTest,seize_interrupt)536 TEST_F(PtraceResumptionTest, seize_interrupt) {
537   StartTracer([this]() {
538     ASSERT_EQ(0, ptrace(PTRACE_SEIZE, worker, 0, 0)) << strerror(errno);
539     ASSERT_EQ(0, ptrace(PTRACE_INTERRUPT, worker, 0, 0)) << strerror(errno);
540     wait_for_ptrace_stop(worker);
541   });
542   ASSERT_TRUE(WaitForTracer());
543   ASSERT_TRUE(WaitForWorker());
544 }
545 
TEST_F(PtraceResumptionTest,seize_interrupt_cont)546 TEST_F(PtraceResumptionTest, seize_interrupt_cont) {
547   StartTracer([this]() {
548     ASSERT_EQ(0, ptrace(PTRACE_SEIZE, worker, 0, 0)) << strerror(errno);
549     ASSERT_EQ(0, ptrace(PTRACE_INTERRUPT, worker, 0, 0)) << strerror(errno);
550     wait_for_ptrace_stop(worker);
551     ASSERT_EQ(0, ptrace(PTRACE_CONT, worker, 0, 0)) << strerror(errno);
552   });
553   ASSERT_TRUE(WaitForTracer());
554   ASSERT_TRUE(WaitForWorker());
555 }
556 
TEST_F(PtraceResumptionTest,zombie_seize)557 TEST_F(PtraceResumptionTest, zombie_seize) {
558   StartTracer([this]() { ASSERT_EQ(0, ptrace(PTRACE_SEIZE, worker, 0, 0)) << strerror(errno); });
559   ASSERT_TRUE(WaitForWorker());
560   ASSERT_TRUE(WaitForTracer());
561 }
562 
TEST_F(PtraceResumptionTest,zombie_seize_interrupt)563 TEST_F(PtraceResumptionTest, zombie_seize_interrupt) {
564   StartTracer([this]() {
565     ASSERT_EQ(0, ptrace(PTRACE_SEIZE, worker, 0, 0)) << strerror(errno);
566     ASSERT_EQ(0, ptrace(PTRACE_INTERRUPT, worker, 0, 0)) << strerror(errno);
567     wait_for_ptrace_stop(worker);
568   });
569   ASSERT_TRUE(WaitForWorker());
570   ASSERT_TRUE(WaitForTracer());
571 }
572 
TEST_F(PtraceResumptionTest,zombie_seize_interrupt_cont)573 TEST_F(PtraceResumptionTest, zombie_seize_interrupt_cont) {
574   StartTracer([this]() {
575     ASSERT_EQ(0, ptrace(PTRACE_SEIZE, worker, 0, 0)) << strerror(errno);
576     ASSERT_EQ(0, ptrace(PTRACE_INTERRUPT, worker, 0, 0)) << strerror(errno);
577     wait_for_ptrace_stop(worker);
578     ASSERT_EQ(0, ptrace(PTRACE_CONT, worker, 0, 0)) << strerror(errno);
579   });
580   ASSERT_TRUE(WaitForWorker());
581   ASSERT_TRUE(WaitForTracer());
582 }
583