blob: 4043a6e03df665b7983f82921f5b94a7b87bfc38 [file] [log] [blame]
Mark Salyzyncfd5b082016-10-17 14:28:00 -07001/*
2 * Copyright 2006, The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#define LOG_TAG "crasher"
18
Elliott Hughesda6b2e22014-04-23 14:57:32 -070019#include <assert.h>
Elliott Hughes400628a2016-12-14 17:33:46 -080020#include <dirent.h>
Elliott Hughesda6b2e22014-04-23 14:57:32 -070021#include <errno.h>
Josh Gao218f7fb2016-10-07 16:42:05 -070022#include <fcntl.h>
Elliott Hughesda6b2e22014-04-23 14:57:32 -070023#include <pthread.h>
Elliott Hughesda6b2e22014-04-23 14:57:32 -070024#include <signal.h>
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080025#include <stdio.h>
26#include <stdlib.h>
27#include <string.h>
Brigid Smith8606eaa2014-07-07 12:33:50 -070028#include <sys/mman.h>
Josh Gao91ad6532017-02-09 12:37:39 -080029#include <sys/prctl.h>
Elliott Hughesda6b2e22014-04-23 14:57:32 -070030#include <unistd.h>
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080031
Elliott Hughes400628a2016-12-14 17:33:46 -080032// We test both kinds of logging.
Elliott Hughes400628a2016-12-14 17:33:46 -080033#include <android-base/logging.h>
Mark Salyzyn51c33b72017-01-12 15:44:06 -080034#include <log/log.h>
Mark Salyzynf1a8dfa2014-04-30 09:24:08 -070035
Elliott Hughes12b71292017-03-02 19:01:20 -080036#include "seccomp_policy.h"
37
Josh Gao9c02dc52016-06-15 17:29:00 -070038#if defined(STATIC_CRASHER)
Josh Gaocbe70cb2016-10-18 18:17:52 -070039#include "debuggerd/handler.h"
Josh Gao9c02dc52016-06-15 17:29:00 -070040#endif
41
Christopher Ferris4f600fe2022-04-13 14:55:36 -070042extern "C" void android_set_abort_message(const char* msg);
43
Elliott Hughes0ba53592017-02-01 16:59:15 -080044#if defined(__arm__)
45// See https://www.kernel.org/doc/Documentation/arm/kernel_user_helpers.txt for details.
46#define __kuser_helper_version (*(int32_t*) 0xffff0ffc)
47typedef void * (__kuser_get_tls_t)(void);
48#define __kuser_get_tls (*(__kuser_get_tls_t*) 0xffff0fe0)
49typedef int (__kuser_cmpxchg_t)(int oldval, int newval, volatile int *ptr);
50#define __kuser_cmpxchg (*(__kuser_cmpxchg_t*) 0xffff0fc0)
51typedef void (__kuser_dmb_t)(void);
52#define __kuser_dmb (*(__kuser_dmb_t*) 0xffff0fa0)
53typedef int (__kuser_cmpxchg64_t)(const int64_t*, const int64_t*, volatile int64_t*);
54#define __kuser_cmpxchg64 (*(__kuser_cmpxchg64_t*) 0xffff0f60)
55#endif
56
Elliott Hughes400628a2016-12-14 17:33:46 -080057#define noinline __attribute__((__noinline__))
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080058
Elliott Hughes400628a2016-12-14 17:33:46 -080059// Avoid name mangling so that stacks are more readable.
60extern "C" {
Elliott Hughes3808c4e2013-04-23 17:14:56 -070061
Elliott Hughes400628a2016-12-14 17:33:46 -080062void crash1(void);
63void crashnostack(void);
Elliott Hughes23d1cad2016-05-10 13:29:58 -070064
Elliott Hughes400628a2016-12-14 17:33:46 -080065int do_action(const char* arg);
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080066
Elliott Hughes400628a2016-12-14 17:33:46 -080067noinline void maybe_abort() {
Elliott Hughesda6b2e22014-04-23 14:57:32 -070068 if (time(0) != 42) {
Elliott Hughes6f40caf2013-06-12 14:04:34 -070069 abort();
70 }
71}
72
Elliott Hughes400628a2016-12-14 17:33:46 -080073char* smash_stack_dummy_buf;
74noinline void smash_stack_dummy_function(volatile int* plen) {
Yabin Cui2331b952014-12-11 17:46:33 -080075 smash_stack_dummy_buf[*plen] = 0;
76}
77
78// This must be marked with "__attribute__ ((noinline))", to ensure the
79// compiler generates the proper stack guards around this function.
80// Assign local array address to global variable to force stack guards.
81// Use another noinline function to corrupt the stack.
Elliott Hughes400628a2016-12-14 17:33:46 -080082noinline int smash_stack(volatile int* plen) {
83 printf("%s: deliberately corrupting stack...\n", getprogname());
Yabin Cui2331b952014-12-11 17:46:33 -080084
85 char buf[128];
86 smash_stack_dummy_buf = buf;
87 // This should corrupt stack guards and make process abort.
88 smash_stack_dummy_function(plen);
89 return 0;
Elliott Hughesdf4200e2013-02-14 14:41:57 -080090}
91
Stephen Hines18395cb2015-09-29 23:55:14 -070092#pragma clang diagnostic push
93#pragma clang diagnostic ignored "-Winfinite-recursion"
94
Elliott Hughes400628a2016-12-14 17:33:46 -080095void* global = 0; // So GCC doesn't optimize the tail recursion out of overflow_stack.
Elliott Hughesb1be27e2013-07-15 17:19:02 -070096
Elliott Hughes400628a2016-12-14 17:33:46 -080097noinline void overflow_stack(void* p) {
Elliott Hughes3808c4e2013-04-23 17:14:56 -070098 void* buf[1];
99 buf[0] = p;
Elliott Hughesb1be27e2013-07-15 17:19:02 -0700100 global = buf;
Elliott Hughes3808c4e2013-04-23 17:14:56 -0700101 overflow_stack(&buf);
102}
103
Stephen Hines18395cb2015-09-29 23:55:14 -0700104#pragma clang diagnostic pop
105
Elliott Hughes400628a2016-12-14 17:33:46 -0800106noinline void* thread_callback(void* raw_arg) {
107 const char* arg = reinterpret_cast<const char*>(raw_arg);
108 return reinterpret_cast<void*>(static_cast<uintptr_t>(do_action(arg)));
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800109}
110
Elliott Hughes400628a2016-12-14 17:33:46 -0800111noinline int do_action_on_thread(const char* arg) {
Elliott Hughesaa421302012-12-10 14:15:42 -0800112 pthread_t t;
Elliott Hughes400628a2016-12-14 17:33:46 -0800113 pthread_create(&t, nullptr, thread_callback, const_cast<char*>(arg));
114 void* result = nullptr;
Elliott Hughesaa421302012-12-10 14:15:42 -0800115 pthread_join(t, &result);
Elliott Hughes400628a2016-12-14 17:33:46 -0800116 return reinterpret_cast<uintptr_t>(result);
Elliott Hughesaa421302012-12-10 14:15:42 -0800117}
118
Christopher Ferrisb9de87f2017-09-20 13:37:24 -0700119noinline int crash_null() {
120 int (*null_func)() = nullptr;
121 return null_func();
122}
123
Elliott Hughes400628a2016-12-14 17:33:46 -0800124noinline int crash3(int a) {
125 *reinterpret_cast<int*>(0xdead) = a;
Elliott Hughes6f40caf2013-06-12 14:04:34 -0700126 return a*4;
Pavel Chupinaf2cb362013-03-08 13:17:35 +0400127}
128
Elliott Hughes400628a2016-12-14 17:33:46 -0800129noinline int crash2(int a) {
Elliott Hughes6f40caf2013-06-12 14:04:34 -0700130 a = crash3(a) + 2;
131 return a*3;
Pavel Chupinaf2cb362013-03-08 13:17:35 +0400132}
133
Elliott Hughes400628a2016-12-14 17:33:46 -0800134noinline int crash(int a) {
Elliott Hughes6f40caf2013-06-12 14:04:34 -0700135 a = crash2(a) + 1;
136 return a*2;
Pavel Chupinaf2cb362013-03-08 13:17:35 +0400137}
138
Pirama Arumuga Nainar982e2a52021-03-16 16:22:52 -0700139#pragma clang diagnostic push
140#pragma clang diagnostic ignored "-Wfree-nonheap-object"
141
Elliott Hughes400628a2016-12-14 17:33:46 -0800142noinline void abuse_heap() {
Elliott Hughes6f40caf2013-06-12 14:04:34 -0700143 char buf[16];
Elliott Hughes400628a2016-12-14 17:33:46 -0800144 free(buf); // GCC is smart enough to warn about this, but we're doing it deliberately.
Elliott Hughes6f40caf2013-06-12 14:04:34 -0700145}
Pirama Arumuga Nainar982e2a52021-03-16 16:22:52 -0700146#pragma clang diagnostic pop
Elliott Hughes6f40caf2013-06-12 14:04:34 -0700147
Josh Gao399b4ee2017-06-30 12:46:31 -0700148noinline void leak() {
149 while (true) {
150 void* mapping =
151 mmap(nullptr, PAGE_SIZE, PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
152 static_cast<volatile char*>(mapping)[0] = 'a';
153 }
154}
155
Elliott Hughes400628a2016-12-14 17:33:46 -0800156noinline void sigsegv_non_null() {
Brigid Smith7b2078e2014-06-17 14:55:47 -0700157 int* a = (int *)(&do_action);
158 *a = 42;
159}
160
Elliott Hughes400628a2016-12-14 17:33:46 -0800161noinline void fprintf_null() {
zijunzhaof5e15332023-03-03 01:33:28 +0000162 FILE* sneaky_null = nullptr;
163 fprintf(sneaky_null, "oops");
Elliott Hughes400628a2016-12-14 17:33:46 -0800164}
Elliott Hughes3808c4e2013-04-23 17:14:56 -0700165
Elliott Hughes400628a2016-12-14 17:33:46 -0800166noinline void readdir_null() {
167 readdir(nullptr);
168}
169
170noinline int strlen_null() {
171 char* sneaky_null = nullptr;
172 return strlen(sneaky_null);
173}
174
175static int usage() {
176 fprintf(stderr, "usage: %s KIND\n", getprogname());
177 fprintf(stderr, "\n");
178 fprintf(stderr, "where KIND is:\n");
179 fprintf(stderr, " smash-stack overwrite a -fstack-protector guard\n");
180 fprintf(stderr, " stack-overflow recurse until the stack overflows\n");
Elliott Hughes0ba53592017-02-01 16:59:15 -0800181 fprintf(stderr, " nostack crash with a NULL stack pointer\n");
182 fprintf(stderr, "\n");
Elliott Hughes400628a2016-12-14 17:33:46 -0800183 fprintf(stderr, " heap-usage cause a libc abort by abusing a heap function\n");
Christopher Ferrisb9de87f2017-09-20 13:37:24 -0700184 fprintf(stderr, " call-null cause a crash by calling through a nullptr\n");
Josh Gao399b4ee2017-06-30 12:46:31 -0700185 fprintf(stderr, " leak leak memory until we get OOM-killed\n");
Elliott Hughes0ba53592017-02-01 16:59:15 -0800186 fprintf(stderr, "\n");
Elliott Hughes400628a2016-12-14 17:33:46 -0800187 fprintf(stderr, " abort call abort()\n");
Christopher Ferris4f600fe2022-04-13 14:55:36 -0700188 fprintf(stderr, " abort_with_msg call abort() setting an abort message\n");
189 fprintf(stderr, " abort_with_null_msg call abort() setting a null abort message\n");
Elliott Hughes400628a2016-12-14 17:33:46 -0800190 fprintf(stderr, " assert call assert() without a function\n");
191 fprintf(stderr, " assert2 call assert() with a function\n");
192 fprintf(stderr, " exit call exit(1)\n");
Elliott Hughes0ba53592017-02-01 16:59:15 -0800193 fprintf(stderr, "\n");
Elliott Hughes400628a2016-12-14 17:33:46 -0800194 fprintf(stderr, " fortify fail a _FORTIFY_SOURCE check\n");
Josh Gao3fa96372018-06-01 16:35:47 -0700195 fprintf(stderr, " fdsan_file close a file descriptor that's owned by a FILE*\n");
196 fprintf(stderr, " fdsan_dir close a file descriptor that's owned by a DIR*\n");
Elliott Hughes0ba53592017-02-01 16:59:15 -0800197 fprintf(stderr, " seccomp fail a seccomp check\n");
198#if defined(__arm__)
199 fprintf(stderr, " kuser_helper_version call kuser_helper_version\n");
200 fprintf(stderr, " kuser_get_tls call kuser_get_tls\n");
201 fprintf(stderr, " kuser_cmpxchg call kuser_cmpxchg\n");
202 fprintf(stderr, " kuser_memory_barrier call kuser_memory_barrier\n");
203 fprintf(stderr, " kuser_cmpxchg64 call kuser_cmpxchg64\n");
204#endif
Elliott Hughesdd04c652019-04-15 13:03:48 -0700205 fprintf(stderr, " xom read execute-only memory\n");
Elliott Hughes0ba53592017-02-01 16:59:15 -0800206 fprintf(stderr, "\n");
Elliott Hughes400628a2016-12-14 17:33:46 -0800207 fprintf(stderr, " LOG_ALWAYS_FATAL call liblog LOG_ALWAYS_FATAL\n");
208 fprintf(stderr, " LOG_ALWAYS_FATAL_IF call liblog LOG_ALWAYS_FATAL_IF\n");
209 fprintf(stderr, " LOG-FATAL call libbase LOG(FATAL)\n");
Elliott Hughes0ba53592017-02-01 16:59:15 -0800210 fprintf(stderr, "\n");
Elliott Hughes400628a2016-12-14 17:33:46 -0800211 fprintf(stderr, " SIGFPE cause a SIGFPE\n");
Elliott Hughes2baf4432018-05-30 12:55:04 -0700212 fprintf(stderr, " SIGILL cause a SIGILL\n");
Elliott Hughes400628a2016-12-14 17:33:46 -0800213 fprintf(stderr, " SIGSEGV cause a SIGSEGV at address 0x0 (synonym: crash)\n");
214 fprintf(stderr, " SIGSEGV-non-null cause a SIGSEGV at a non-zero address\n");
215 fprintf(stderr, " SIGSEGV-unmapped mmap/munmap a region of memory and then attempt to access it\n");
216 fprintf(stderr, " SIGTRAP cause a SIGTRAP\n");
Elliott Hughes0ba53592017-02-01 16:59:15 -0800217 fprintf(stderr, "\n");
Elliott Hughes400628a2016-12-14 17:33:46 -0800218 fprintf(stderr, " fprintf-NULL pass a null pointer to fprintf\n");
219 fprintf(stderr, " readdir-NULL pass a null pointer to readdir\n");
220 fprintf(stderr, " strlen-NULL pass a null pointer to strlen\n");
Elliott Hughesda9e3952017-02-17 10:26:48 -0800221 fprintf(stderr, " pthread_join-NULL pass a null pointer to pthread_join\n");
Elliott Hughes400628a2016-12-14 17:33:46 -0800222 fprintf(stderr, "\n");
Josh Gao91ad6532017-02-09 12:37:39 -0800223 fprintf(stderr, " no_new_privs set PR_SET_NO_NEW_PRIVS and then abort\n");
224 fprintf(stderr, "\n");
Elliott Hughes400628a2016-12-14 17:33:46 -0800225 fprintf(stderr, "prefix any of the above with 'thread-' to run on a new thread\n");
226 fprintf(stderr, "prefix any of the above with 'exhaustfd-' to exhaust\n");
227 fprintf(stderr, "all available file descriptors before crashing.\n");
228 fprintf(stderr, "prefix any of the above with 'wait-' to wait until input is received on stdin\n");
229
230 return EXIT_FAILURE;
231}
232
233noinline int do_action(const char* arg) {
234 // Prefixes.
Josh Gao100ce392016-10-31 17:37:37 -0700235 if (!strncmp(arg, "wait-", strlen("wait-"))) {
236 char buf[1];
Stephen Hines8395de62018-09-24 13:03:25 -0700237 UNUSED(TEMP_FAILURE_RETRY(read(STDIN_FILENO, buf, sizeof(buf))));
Josh Gao100ce392016-10-31 17:37:37 -0700238 return do_action(arg + strlen("wait-"));
239 } else if (!strncmp(arg, "exhaustfd-", strlen("exhaustfd-"))) {
Josh Gao218f7fb2016-10-07 16:42:05 -0700240 errno = 0;
241 while (errno != EMFILE) {
242 open("/dev/null", O_RDONLY);
243 }
244 return do_action(arg + strlen("exhaustfd-"));
245 } else if (!strncmp(arg, "thread-", strlen("thread-"))) {
Elliott Hughesaa421302012-12-10 14:15:42 -0800246 return do_action_on_thread(arg + strlen("thread-"));
Elliott Hughes400628a2016-12-14 17:33:46 -0800247 }
248
249 // Actions.
250 if (!strcasecmp(arg, "SIGSEGV-non-null")) {
Josh Gao3fa96372018-06-01 16:35:47 -0700251 sigsegv_non_null();
Elliott Hughes400628a2016-12-14 17:33:46 -0800252 } else if (!strcasecmp(arg, "smash-stack")) {
Josh Gao3fa96372018-06-01 16:35:47 -0700253 volatile int len = 128;
254 return smash_stack(&len);
Elliott Hughes400628a2016-12-14 17:33:46 -0800255 } else if (!strcasecmp(arg, "stack-overflow")) {
Josh Gao3fa96372018-06-01 16:35:47 -0700256 overflow_stack(nullptr);
Elliott Hughes400628a2016-12-14 17:33:46 -0800257 } else if (!strcasecmp(arg, "nostack")) {
Josh Gao3fa96372018-06-01 16:35:47 -0700258 crashnostack();
Elliott Hughes400628a2016-12-14 17:33:46 -0800259 } else if (!strcasecmp(arg, "exit")) {
Josh Gao3fa96372018-06-01 16:35:47 -0700260 exit(1);
Christopher Ferrisb9de87f2017-09-20 13:37:24 -0700261 } else if (!strcasecmp(arg, "call-null")) {
262 return crash_null();
Elliott Hughes400628a2016-12-14 17:33:46 -0800263 } else if (!strcasecmp(arg, "crash") || !strcmp(arg, "SIGSEGV")) {
Josh Gao3fa96372018-06-01 16:35:47 -0700264 return crash(42);
Elliott Hughes400628a2016-12-14 17:33:46 -0800265 } else if (!strcasecmp(arg, "abort")) {
Josh Gao3fa96372018-06-01 16:35:47 -0700266 maybe_abort();
Christopher Ferris4f600fe2022-04-13 14:55:36 -0700267 } else if (!strcasecmp(arg, "abort_with_msg")) {
268 android_set_abort_message("Aborting due to crasher");
269 maybe_abort();
270 } else if (!strcasecmp(arg, "abort_with_null")) {
271 android_set_abort_message(nullptr);
272 maybe_abort();
Elliott Hughes400628a2016-12-14 17:33:46 -0800273 } else if (!strcasecmp(arg, "assert")) {
Josh Gao3fa96372018-06-01 16:35:47 -0700274 __assert("some_file.c", 123, "false");
Elliott Hughes400628a2016-12-14 17:33:46 -0800275 } else if (!strcasecmp(arg, "assert2")) {
Josh Gao3fa96372018-06-01 16:35:47 -0700276 __assert2("some_file.c", 123, "some_function", "false");
Stephen Hines8395de62018-09-24 13:03:25 -0700277#if !defined(__clang_analyzer__)
Elliott Hughes400628a2016-12-14 17:33:46 -0800278 } else if (!strcasecmp(arg, "fortify")) {
Stephen Hines8395de62018-09-24 13:03:25 -0700279 // FORTIFY is disabled when running clang-tidy and other tools, so this
280 // shouldn't depend on internal implementation details of it.
Josh Gao3fa96372018-06-01 16:35:47 -0700281 char buf[10];
282 __read_chk(-1, buf, 32, 10);
283 while (true) pause();
Stephen Hines8395de62018-09-24 13:03:25 -0700284#endif
Josh Gao3fa96372018-06-01 16:35:47 -0700285 } else if (!strcasecmp(arg, "fdsan_file")) {
286 FILE* f = fopen("/dev/null", "r");
287 close(fileno(f));
288 } else if (!strcasecmp(arg, "fdsan_dir")) {
289 DIR* d = opendir("/dev/");
290 close(dirfd(d));
Elliott Hughes400628a2016-12-14 17:33:46 -0800291 } else if (!strcasecmp(arg, "LOG(FATAL)")) {
Josh Gao3fa96372018-06-01 16:35:47 -0700292 LOG(FATAL) << "hello " << 123;
Elliott Hughes400628a2016-12-14 17:33:46 -0800293 } else if (!strcasecmp(arg, "LOG_ALWAYS_FATAL")) {
Josh Gao3fa96372018-06-01 16:35:47 -0700294 LOG_ALWAYS_FATAL("hello %s", "world");
Elliott Hughes400628a2016-12-14 17:33:46 -0800295 } else if (!strcasecmp(arg, "LOG_ALWAYS_FATAL_IF")) {
Josh Gao3fa96372018-06-01 16:35:47 -0700296 LOG_ALWAYS_FATAL_IF(true, "hello %s", "world");
Elliott Hughes400628a2016-12-14 17:33:46 -0800297 } else if (!strcasecmp(arg, "SIGFPE")) {
Josh Gao3fa96372018-06-01 16:35:47 -0700298 raise(SIGFPE);
299 return EXIT_SUCCESS;
Elliott Hughes2baf4432018-05-30 12:55:04 -0700300 } else if (!strcasecmp(arg, "SIGILL")) {
301#if defined(__aarch64__)
302 __asm__ volatile(".word 0\n");
303#elif defined(__arm__)
304 __asm__ volatile(".word 0xe7f0def0\n");
305#elif defined(__i386__) || defined(__x86_64__)
306 __asm__ volatile("ud2\n");
Xia Lifangb13a10b2022-10-12 22:27:54 +0800307#elif defined(__riscv)
308 __asm__ volatile("unimp\n");
Elliott Hughes2baf4432018-05-30 12:55:04 -0700309#else
310#error
311#endif
Elliott Hughes400628a2016-12-14 17:33:46 -0800312 } else if (!strcasecmp(arg, "SIGTRAP")) {
Josh Gao3fa96372018-06-01 16:35:47 -0700313 raise(SIGTRAP);
314 return EXIT_SUCCESS;
Elliott Hughes400628a2016-12-14 17:33:46 -0800315 } else if (!strcasecmp(arg, "fprintf-NULL")) {
Josh Gao3fa96372018-06-01 16:35:47 -0700316 fprintf_null();
Elliott Hughes400628a2016-12-14 17:33:46 -0800317 } else if (!strcasecmp(arg, "readdir-NULL")) {
Josh Gao3fa96372018-06-01 16:35:47 -0700318 readdir_null();
Elliott Hughes400628a2016-12-14 17:33:46 -0800319 } else if (!strcasecmp(arg, "strlen-NULL")) {
Josh Gao3fa96372018-06-01 16:35:47 -0700320 return strlen_null();
Elliott Hughesda9e3952017-02-17 10:26:48 -0800321 } else if (!strcasecmp(arg, "pthread_join-NULL")) {
Josh Gao3fa96372018-06-01 16:35:47 -0700322 return pthread_join(0, nullptr);
Elliott Hughes400628a2016-12-14 17:33:46 -0800323 } else if (!strcasecmp(arg, "heap-usage")) {
Josh Gao3fa96372018-06-01 16:35:47 -0700324 abuse_heap();
Josh Gao399b4ee2017-06-30 12:46:31 -0700325 } else if (!strcasecmp(arg, "leak")) {
Josh Gao3fa96372018-06-01 16:35:47 -0700326 leak();
Elliott Hughes400628a2016-12-14 17:33:46 -0800327 } else if (!strcasecmp(arg, "SIGSEGV-unmapped")) {
Josh Gao3fa96372018-06-01 16:35:47 -0700328 char* map = reinterpret_cast<char*>(
329 mmap(nullptr, sizeof(int), PROT_READ | PROT_WRITE, MAP_SHARED | MAP_ANONYMOUS, -1, 0));
330 munmap(map, sizeof(int));
331 map[0] = '8';
Elliott Hughes0ba53592017-02-01 16:59:15 -0800332 } else if (!strcasecmp(arg, "seccomp")) {
Josh Gao3fa96372018-06-01 16:35:47 -0700333 set_system_seccomp_filter();
334 syscall(99999);
Elliott Hughesdd04c652019-04-15 13:03:48 -0700335#if defined(__LP64__)
336 } else if (!strcasecmp(arg, "xom")) {
337 // Try to read part of our code, which will fail if XOM is active.
338 printf("*%lx = %lx\n", reinterpret_cast<long>(usage), *reinterpret_cast<long*>(usage));
339#endif
Elliott Hughes0ba53592017-02-01 16:59:15 -0800340#if defined(__arm__)
341 } else if (!strcasecmp(arg, "kuser_helper_version")) {
342 return __kuser_helper_version;
343 } else if (!strcasecmp(arg, "kuser_get_tls")) {
344 return !__kuser_get_tls();
345 } else if (!strcasecmp(arg, "kuser_cmpxchg")) {
346 return __kuser_cmpxchg(0, 0, 0);
347 } else if (!strcasecmp(arg, "kuser_memory_barrier")) {
348 __kuser_dmb();
349 } else if (!strcasecmp(arg, "kuser_cmpxchg64")) {
350 return __kuser_cmpxchg64(0, 0, 0);
351#endif
Josh Gao91ad6532017-02-09 12:37:39 -0800352 } else if (!strcasecmp(arg, "no_new_privs")) {
353 if (prctl(PR_SET_NO_NEW_PRIVS, 1) != 0) {
354 fprintf(stderr, "prctl(PR_SET_NO_NEW_PRIVS, 1) failed: %s\n", strerror(errno));
355 return EXIT_SUCCESS;
356 }
357 abort();
Elliott Hughes400628a2016-12-14 17:33:46 -0800358 } else {
359 return usage();
Elliott Hughesaa421302012-12-10 14:15:42 -0800360 }
361
Elliott Hughes400628a2016-12-14 17:33:46 -0800362 fprintf(stderr, "%s: exiting normally!\n", getprogname());
Elliott Hughes3808c4e2013-04-23 17:14:56 -0700363 return EXIT_SUCCESS;
Elliott Hughesaa421302012-12-10 14:15:42 -0800364}
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800365
Elliott Hughes400628a2016-12-14 17:33:46 -0800366int main(int argc, char** argv) {
Josh Gao9c02dc52016-06-15 17:29:00 -0700367#if defined(STATIC_CRASHER)
368 debuggerd_callbacks_t callbacks = {
Peter Collingbournef3d542f2020-03-05 16:46:15 -0800369 .get_process_info = []() {
Josh Gao9c02dc52016-06-15 17:29:00 -0700370 static struct {
371 size_t size;
372 char msg[32];
373 } msg;
374
375 msg.size = strlen("dummy abort message");
376 memcpy(msg.msg, "dummy abort message", strlen("dummy abort message"));
Peter Collingbournef3d542f2020-03-05 16:46:15 -0800377 return debugger_process_info{
378 .abort_msg = reinterpret_cast<void*>(&msg),
379 };
Josh Gao9c02dc52016-06-15 17:29:00 -0700380 },
381 .post_dump = nullptr
382 };
383 debuggerd_init(&callbacks);
384#endif
385
Elliott Hughes400628a2016-12-14 17:33:46 -0800386 if (argc == 1) crash1();
387 else if (argc == 2) return do_action(argv[1]);
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800388
Elliott Hughes400628a2016-12-14 17:33:46 -0800389 return usage();
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800390}
Elliott Hughes400628a2016-12-14 17:33:46 -0800391
392};