Mark Salyzyn | cfd5b08 | 2016-10-17 14:28:00 -0700 | [diff] [blame] | 1 | /* |
| 2 | * Copyright 2006, The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
| 17 | #define LOG_TAG "crasher" |
| 18 | |
Elliott Hughes | da6b2e2 | 2014-04-23 14:57:32 -0700 | [diff] [blame] | 19 | #include <assert.h> |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 20 | #include <dirent.h> |
Elliott Hughes | da6b2e2 | 2014-04-23 14:57:32 -0700 | [diff] [blame] | 21 | #include <errno.h> |
Josh Gao | 218f7fb | 2016-10-07 16:42:05 -0700 | [diff] [blame] | 22 | #include <fcntl.h> |
Elliott Hughes | da6b2e2 | 2014-04-23 14:57:32 -0700 | [diff] [blame] | 23 | #include <pthread.h> |
Elliott Hughes | da6b2e2 | 2014-04-23 14:57:32 -0700 | [diff] [blame] | 24 | #include <signal.h> |
The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 25 | #include <stdio.h> |
| 26 | #include <stdlib.h> |
| 27 | #include <string.h> |
Brigid Smith | 8606eaa | 2014-07-07 12:33:50 -0700 | [diff] [blame] | 28 | #include <sys/mman.h> |
Josh Gao | 91ad653 | 2017-02-09 12:37:39 -0800 | [diff] [blame] | 29 | #include <sys/prctl.h> |
Elliott Hughes | da6b2e2 | 2014-04-23 14:57:32 -0700 | [diff] [blame] | 30 | #include <unistd.h> |
The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 31 | |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 32 | // We test both kinds of logging. |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 33 | #include <android-base/logging.h> |
Mark Salyzyn | 51c33b7 | 2017-01-12 15:44:06 -0800 | [diff] [blame] | 34 | #include <log/log.h> |
Mark Salyzyn | f1a8dfa | 2014-04-30 09:24:08 -0700 | [diff] [blame] | 35 | |
Elliott Hughes | 12b7129 | 2017-03-02 19:01:20 -0800 | [diff] [blame] | 36 | #include "seccomp_policy.h" |
| 37 | |
Josh Gao | 9c02dc5 | 2016-06-15 17:29:00 -0700 | [diff] [blame] | 38 | #if defined(STATIC_CRASHER) |
Josh Gao | cbe70cb | 2016-10-18 18:17:52 -0700 | [diff] [blame] | 39 | #include "debuggerd/handler.h" |
Josh Gao | 9c02dc5 | 2016-06-15 17:29:00 -0700 | [diff] [blame] | 40 | #endif |
| 41 | |
Christopher Ferris | 4f600fe | 2022-04-13 14:55:36 -0700 | [diff] [blame] | 42 | extern "C" void android_set_abort_message(const char* msg); |
| 43 | |
Elliott Hughes | 0ba5359 | 2017-02-01 16:59:15 -0800 | [diff] [blame] | 44 | #if defined(__arm__) |
| 45 | // See https://www.kernel.org/doc/Documentation/arm/kernel_user_helpers.txt for details. |
| 46 | #define __kuser_helper_version (*(int32_t*) 0xffff0ffc) |
| 47 | typedef void * (__kuser_get_tls_t)(void); |
| 48 | #define __kuser_get_tls (*(__kuser_get_tls_t*) 0xffff0fe0) |
| 49 | typedef int (__kuser_cmpxchg_t)(int oldval, int newval, volatile int *ptr); |
| 50 | #define __kuser_cmpxchg (*(__kuser_cmpxchg_t*) 0xffff0fc0) |
| 51 | typedef void (__kuser_dmb_t)(void); |
| 52 | #define __kuser_dmb (*(__kuser_dmb_t*) 0xffff0fa0) |
| 53 | typedef int (__kuser_cmpxchg64_t)(const int64_t*, const int64_t*, volatile int64_t*); |
| 54 | #define __kuser_cmpxchg64 (*(__kuser_cmpxchg64_t*) 0xffff0f60) |
| 55 | #endif |
| 56 | |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 57 | #define noinline __attribute__((__noinline__)) |
The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 58 | |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 59 | // Avoid name mangling so that stacks are more readable. |
| 60 | extern "C" { |
Elliott Hughes | 3808c4e | 2013-04-23 17:14:56 -0700 | [diff] [blame] | 61 | |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 62 | void crash1(void); |
| 63 | void crashnostack(void); |
Elliott Hughes | 23d1cad | 2016-05-10 13:29:58 -0700 | [diff] [blame] | 64 | |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 65 | int do_action(const char* arg); |
The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 66 | |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 67 | noinline void maybe_abort() { |
Elliott Hughes | da6b2e2 | 2014-04-23 14:57:32 -0700 | [diff] [blame] | 68 | if (time(0) != 42) { |
Elliott Hughes | 6f40caf | 2013-06-12 14:04:34 -0700 | [diff] [blame] | 69 | abort(); |
| 70 | } |
| 71 | } |
| 72 | |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 73 | char* smash_stack_dummy_buf; |
| 74 | noinline void smash_stack_dummy_function(volatile int* plen) { |
Yabin Cui | 2331b95 | 2014-12-11 17:46:33 -0800 | [diff] [blame] | 75 | smash_stack_dummy_buf[*plen] = 0; |
| 76 | } |
| 77 | |
| 78 | // This must be marked with "__attribute__ ((noinline))", to ensure the |
| 79 | // compiler generates the proper stack guards around this function. |
| 80 | // Assign local array address to global variable to force stack guards. |
| 81 | // Use another noinline function to corrupt the stack. |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 82 | noinline int smash_stack(volatile int* plen) { |
| 83 | printf("%s: deliberately corrupting stack...\n", getprogname()); |
Yabin Cui | 2331b95 | 2014-12-11 17:46:33 -0800 | [diff] [blame] | 84 | |
| 85 | char buf[128]; |
| 86 | smash_stack_dummy_buf = buf; |
| 87 | // This should corrupt stack guards and make process abort. |
| 88 | smash_stack_dummy_function(plen); |
| 89 | return 0; |
Elliott Hughes | df4200e | 2013-02-14 14:41:57 -0800 | [diff] [blame] | 90 | } |
| 91 | |
Stephen Hines | 18395cb | 2015-09-29 23:55:14 -0700 | [diff] [blame] | 92 | #pragma clang diagnostic push |
| 93 | #pragma clang diagnostic ignored "-Winfinite-recursion" |
| 94 | |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 95 | void* global = 0; // So GCC doesn't optimize the tail recursion out of overflow_stack. |
Elliott Hughes | b1be27e | 2013-07-15 17:19:02 -0700 | [diff] [blame] | 96 | |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 97 | noinline void overflow_stack(void* p) { |
Elliott Hughes | 3808c4e | 2013-04-23 17:14:56 -0700 | [diff] [blame] | 98 | void* buf[1]; |
| 99 | buf[0] = p; |
Elliott Hughes | b1be27e | 2013-07-15 17:19:02 -0700 | [diff] [blame] | 100 | global = buf; |
Elliott Hughes | 3808c4e | 2013-04-23 17:14:56 -0700 | [diff] [blame] | 101 | overflow_stack(&buf); |
| 102 | } |
| 103 | |
Stephen Hines | 18395cb | 2015-09-29 23:55:14 -0700 | [diff] [blame] | 104 | #pragma clang diagnostic pop |
| 105 | |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 106 | noinline void* thread_callback(void* raw_arg) { |
| 107 | const char* arg = reinterpret_cast<const char*>(raw_arg); |
| 108 | return reinterpret_cast<void*>(static_cast<uintptr_t>(do_action(arg))); |
The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 109 | } |
| 110 | |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 111 | noinline int do_action_on_thread(const char* arg) { |
Elliott Hughes | aa42130 | 2012-12-10 14:15:42 -0800 | [diff] [blame] | 112 | pthread_t t; |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 113 | pthread_create(&t, nullptr, thread_callback, const_cast<char*>(arg)); |
| 114 | void* result = nullptr; |
Elliott Hughes | aa42130 | 2012-12-10 14:15:42 -0800 | [diff] [blame] | 115 | pthread_join(t, &result); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 116 | return reinterpret_cast<uintptr_t>(result); |
Elliott Hughes | aa42130 | 2012-12-10 14:15:42 -0800 | [diff] [blame] | 117 | } |
| 118 | |
Christopher Ferris | b9de87f | 2017-09-20 13:37:24 -0700 | [diff] [blame] | 119 | noinline int crash_null() { |
| 120 | int (*null_func)() = nullptr; |
| 121 | return null_func(); |
| 122 | } |
| 123 | |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 124 | noinline int crash3(int a) { |
| 125 | *reinterpret_cast<int*>(0xdead) = a; |
Elliott Hughes | 6f40caf | 2013-06-12 14:04:34 -0700 | [diff] [blame] | 126 | return a*4; |
Pavel Chupin | af2cb36 | 2013-03-08 13:17:35 +0400 | [diff] [blame] | 127 | } |
| 128 | |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 129 | noinline int crash2(int a) { |
Elliott Hughes | 6f40caf | 2013-06-12 14:04:34 -0700 | [diff] [blame] | 130 | a = crash3(a) + 2; |
| 131 | return a*3; |
Pavel Chupin | af2cb36 | 2013-03-08 13:17:35 +0400 | [diff] [blame] | 132 | } |
| 133 | |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 134 | noinline int crash(int a) { |
Elliott Hughes | 6f40caf | 2013-06-12 14:04:34 -0700 | [diff] [blame] | 135 | a = crash2(a) + 1; |
| 136 | return a*2; |
Pavel Chupin | af2cb36 | 2013-03-08 13:17:35 +0400 | [diff] [blame] | 137 | } |
| 138 | |
Pirama Arumuga Nainar | 982e2a5 | 2021-03-16 16:22:52 -0700 | [diff] [blame] | 139 | #pragma clang diagnostic push |
| 140 | #pragma clang diagnostic ignored "-Wfree-nonheap-object" |
| 141 | |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 142 | noinline void abuse_heap() { |
Elliott Hughes | 6f40caf | 2013-06-12 14:04:34 -0700 | [diff] [blame] | 143 | char buf[16]; |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 144 | free(buf); // GCC is smart enough to warn about this, but we're doing it deliberately. |
Elliott Hughes | 6f40caf | 2013-06-12 14:04:34 -0700 | [diff] [blame] | 145 | } |
Pirama Arumuga Nainar | 982e2a5 | 2021-03-16 16:22:52 -0700 | [diff] [blame] | 146 | #pragma clang diagnostic pop |
Elliott Hughes | 6f40caf | 2013-06-12 14:04:34 -0700 | [diff] [blame] | 147 | |
Josh Gao | 399b4ee | 2017-06-30 12:46:31 -0700 | [diff] [blame] | 148 | noinline void leak() { |
| 149 | while (true) { |
| 150 | void* mapping = |
| 151 | mmap(nullptr, PAGE_SIZE, PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0); |
| 152 | static_cast<volatile char*>(mapping)[0] = 'a'; |
| 153 | } |
| 154 | } |
| 155 | |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 156 | noinline void sigsegv_non_null() { |
Brigid Smith | 7b2078e | 2014-06-17 14:55:47 -0700 | [diff] [blame] | 157 | int* a = (int *)(&do_action); |
| 158 | *a = 42; |
| 159 | } |
| 160 | |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 161 | noinline void fprintf_null() { |
zijunzhao | f5e1533 | 2023-03-03 01:33:28 +0000 | [diff] [blame] | 162 | FILE* sneaky_null = nullptr; |
| 163 | fprintf(sneaky_null, "oops"); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 164 | } |
Elliott Hughes | 3808c4e | 2013-04-23 17:14:56 -0700 | [diff] [blame] | 165 | |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 166 | noinline void readdir_null() { |
zijunzhao | fa8037c | 2023-03-31 23:50:37 +0000 | [diff] [blame^] | 167 | DIR* sneaky_null = nullptr; |
| 168 | readdir(sneaky_null); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 169 | } |
| 170 | |
| 171 | noinline int strlen_null() { |
| 172 | char* sneaky_null = nullptr; |
| 173 | return strlen(sneaky_null); |
| 174 | } |
| 175 | |
| 176 | static int usage() { |
| 177 | fprintf(stderr, "usage: %s KIND\n", getprogname()); |
| 178 | fprintf(stderr, "\n"); |
| 179 | fprintf(stderr, "where KIND is:\n"); |
| 180 | fprintf(stderr, " smash-stack overwrite a -fstack-protector guard\n"); |
| 181 | fprintf(stderr, " stack-overflow recurse until the stack overflows\n"); |
Elliott Hughes | 0ba5359 | 2017-02-01 16:59:15 -0800 | [diff] [blame] | 182 | fprintf(stderr, " nostack crash with a NULL stack pointer\n"); |
| 183 | fprintf(stderr, "\n"); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 184 | fprintf(stderr, " heap-usage cause a libc abort by abusing a heap function\n"); |
Christopher Ferris | b9de87f | 2017-09-20 13:37:24 -0700 | [diff] [blame] | 185 | fprintf(stderr, " call-null cause a crash by calling through a nullptr\n"); |
Josh Gao | 399b4ee | 2017-06-30 12:46:31 -0700 | [diff] [blame] | 186 | fprintf(stderr, " leak leak memory until we get OOM-killed\n"); |
Elliott Hughes | 0ba5359 | 2017-02-01 16:59:15 -0800 | [diff] [blame] | 187 | fprintf(stderr, "\n"); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 188 | fprintf(stderr, " abort call abort()\n"); |
Christopher Ferris | 4f600fe | 2022-04-13 14:55:36 -0700 | [diff] [blame] | 189 | fprintf(stderr, " abort_with_msg call abort() setting an abort message\n"); |
| 190 | fprintf(stderr, " abort_with_null_msg call abort() setting a null abort message\n"); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 191 | fprintf(stderr, " assert call assert() without a function\n"); |
| 192 | fprintf(stderr, " assert2 call assert() with a function\n"); |
| 193 | fprintf(stderr, " exit call exit(1)\n"); |
Elliott Hughes | 0ba5359 | 2017-02-01 16:59:15 -0800 | [diff] [blame] | 194 | fprintf(stderr, "\n"); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 195 | fprintf(stderr, " fortify fail a _FORTIFY_SOURCE check\n"); |
Josh Gao | 3fa9637 | 2018-06-01 16:35:47 -0700 | [diff] [blame] | 196 | fprintf(stderr, " fdsan_file close a file descriptor that's owned by a FILE*\n"); |
| 197 | fprintf(stderr, " fdsan_dir close a file descriptor that's owned by a DIR*\n"); |
Elliott Hughes | 0ba5359 | 2017-02-01 16:59:15 -0800 | [diff] [blame] | 198 | fprintf(stderr, " seccomp fail a seccomp check\n"); |
| 199 | #if defined(__arm__) |
| 200 | fprintf(stderr, " kuser_helper_version call kuser_helper_version\n"); |
| 201 | fprintf(stderr, " kuser_get_tls call kuser_get_tls\n"); |
| 202 | fprintf(stderr, " kuser_cmpxchg call kuser_cmpxchg\n"); |
| 203 | fprintf(stderr, " kuser_memory_barrier call kuser_memory_barrier\n"); |
| 204 | fprintf(stderr, " kuser_cmpxchg64 call kuser_cmpxchg64\n"); |
| 205 | #endif |
Elliott Hughes | dd04c65 | 2019-04-15 13:03:48 -0700 | [diff] [blame] | 206 | fprintf(stderr, " xom read execute-only memory\n"); |
Elliott Hughes | 0ba5359 | 2017-02-01 16:59:15 -0800 | [diff] [blame] | 207 | fprintf(stderr, "\n"); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 208 | fprintf(stderr, " LOG_ALWAYS_FATAL call liblog LOG_ALWAYS_FATAL\n"); |
| 209 | fprintf(stderr, " LOG_ALWAYS_FATAL_IF call liblog LOG_ALWAYS_FATAL_IF\n"); |
| 210 | fprintf(stderr, " LOG-FATAL call libbase LOG(FATAL)\n"); |
Elliott Hughes | 0ba5359 | 2017-02-01 16:59:15 -0800 | [diff] [blame] | 211 | fprintf(stderr, "\n"); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 212 | fprintf(stderr, " SIGFPE cause a SIGFPE\n"); |
Elliott Hughes | 2baf443 | 2018-05-30 12:55:04 -0700 | [diff] [blame] | 213 | fprintf(stderr, " SIGILL cause a SIGILL\n"); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 214 | fprintf(stderr, " SIGSEGV cause a SIGSEGV at address 0x0 (synonym: crash)\n"); |
| 215 | fprintf(stderr, " SIGSEGV-non-null cause a SIGSEGV at a non-zero address\n"); |
| 216 | fprintf(stderr, " SIGSEGV-unmapped mmap/munmap a region of memory and then attempt to access it\n"); |
| 217 | fprintf(stderr, " SIGTRAP cause a SIGTRAP\n"); |
Elliott Hughes | 0ba5359 | 2017-02-01 16:59:15 -0800 | [diff] [blame] | 218 | fprintf(stderr, "\n"); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 219 | fprintf(stderr, " fprintf-NULL pass a null pointer to fprintf\n"); |
| 220 | fprintf(stderr, " readdir-NULL pass a null pointer to readdir\n"); |
| 221 | fprintf(stderr, " strlen-NULL pass a null pointer to strlen\n"); |
Elliott Hughes | da9e395 | 2017-02-17 10:26:48 -0800 | [diff] [blame] | 222 | fprintf(stderr, " pthread_join-NULL pass a null pointer to pthread_join\n"); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 223 | fprintf(stderr, "\n"); |
Josh Gao | 91ad653 | 2017-02-09 12:37:39 -0800 | [diff] [blame] | 224 | fprintf(stderr, " no_new_privs set PR_SET_NO_NEW_PRIVS and then abort\n"); |
| 225 | fprintf(stderr, "\n"); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 226 | fprintf(stderr, "prefix any of the above with 'thread-' to run on a new thread\n"); |
| 227 | fprintf(stderr, "prefix any of the above with 'exhaustfd-' to exhaust\n"); |
| 228 | fprintf(stderr, "all available file descriptors before crashing.\n"); |
| 229 | fprintf(stderr, "prefix any of the above with 'wait-' to wait until input is received on stdin\n"); |
| 230 | |
| 231 | return EXIT_FAILURE; |
| 232 | } |
| 233 | |
| 234 | noinline int do_action(const char* arg) { |
| 235 | // Prefixes. |
Josh Gao | 100ce39 | 2016-10-31 17:37:37 -0700 | [diff] [blame] | 236 | if (!strncmp(arg, "wait-", strlen("wait-"))) { |
| 237 | char buf[1]; |
Stephen Hines | 8395de6 | 2018-09-24 13:03:25 -0700 | [diff] [blame] | 238 | UNUSED(TEMP_FAILURE_RETRY(read(STDIN_FILENO, buf, sizeof(buf)))); |
Josh Gao | 100ce39 | 2016-10-31 17:37:37 -0700 | [diff] [blame] | 239 | return do_action(arg + strlen("wait-")); |
| 240 | } else if (!strncmp(arg, "exhaustfd-", strlen("exhaustfd-"))) { |
Josh Gao | 218f7fb | 2016-10-07 16:42:05 -0700 | [diff] [blame] | 241 | errno = 0; |
| 242 | while (errno != EMFILE) { |
| 243 | open("/dev/null", O_RDONLY); |
| 244 | } |
| 245 | return do_action(arg + strlen("exhaustfd-")); |
| 246 | } else if (!strncmp(arg, "thread-", strlen("thread-"))) { |
Elliott Hughes | aa42130 | 2012-12-10 14:15:42 -0800 | [diff] [blame] | 247 | return do_action_on_thread(arg + strlen("thread-")); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 248 | } |
| 249 | |
| 250 | // Actions. |
| 251 | if (!strcasecmp(arg, "SIGSEGV-non-null")) { |
Josh Gao | 3fa9637 | 2018-06-01 16:35:47 -0700 | [diff] [blame] | 252 | sigsegv_non_null(); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 253 | } else if (!strcasecmp(arg, "smash-stack")) { |
Josh Gao | 3fa9637 | 2018-06-01 16:35:47 -0700 | [diff] [blame] | 254 | volatile int len = 128; |
| 255 | return smash_stack(&len); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 256 | } else if (!strcasecmp(arg, "stack-overflow")) { |
Josh Gao | 3fa9637 | 2018-06-01 16:35:47 -0700 | [diff] [blame] | 257 | overflow_stack(nullptr); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 258 | } else if (!strcasecmp(arg, "nostack")) { |
Josh Gao | 3fa9637 | 2018-06-01 16:35:47 -0700 | [diff] [blame] | 259 | crashnostack(); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 260 | } else if (!strcasecmp(arg, "exit")) { |
Josh Gao | 3fa9637 | 2018-06-01 16:35:47 -0700 | [diff] [blame] | 261 | exit(1); |
Christopher Ferris | b9de87f | 2017-09-20 13:37:24 -0700 | [diff] [blame] | 262 | } else if (!strcasecmp(arg, "call-null")) { |
| 263 | return crash_null(); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 264 | } else if (!strcasecmp(arg, "crash") || !strcmp(arg, "SIGSEGV")) { |
Josh Gao | 3fa9637 | 2018-06-01 16:35:47 -0700 | [diff] [blame] | 265 | return crash(42); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 266 | } else if (!strcasecmp(arg, "abort")) { |
Josh Gao | 3fa9637 | 2018-06-01 16:35:47 -0700 | [diff] [blame] | 267 | maybe_abort(); |
Christopher Ferris | 4f600fe | 2022-04-13 14:55:36 -0700 | [diff] [blame] | 268 | } else if (!strcasecmp(arg, "abort_with_msg")) { |
| 269 | android_set_abort_message("Aborting due to crasher"); |
| 270 | maybe_abort(); |
| 271 | } else if (!strcasecmp(arg, "abort_with_null")) { |
| 272 | android_set_abort_message(nullptr); |
| 273 | maybe_abort(); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 274 | } else if (!strcasecmp(arg, "assert")) { |
Josh Gao | 3fa9637 | 2018-06-01 16:35:47 -0700 | [diff] [blame] | 275 | __assert("some_file.c", 123, "false"); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 276 | } else if (!strcasecmp(arg, "assert2")) { |
Josh Gao | 3fa9637 | 2018-06-01 16:35:47 -0700 | [diff] [blame] | 277 | __assert2("some_file.c", 123, "some_function", "false"); |
Stephen Hines | 8395de6 | 2018-09-24 13:03:25 -0700 | [diff] [blame] | 278 | #if !defined(__clang_analyzer__) |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 279 | } else if (!strcasecmp(arg, "fortify")) { |
Stephen Hines | 8395de6 | 2018-09-24 13:03:25 -0700 | [diff] [blame] | 280 | // FORTIFY is disabled when running clang-tidy and other tools, so this |
| 281 | // shouldn't depend on internal implementation details of it. |
Josh Gao | 3fa9637 | 2018-06-01 16:35:47 -0700 | [diff] [blame] | 282 | char buf[10]; |
| 283 | __read_chk(-1, buf, 32, 10); |
| 284 | while (true) pause(); |
Stephen Hines | 8395de6 | 2018-09-24 13:03:25 -0700 | [diff] [blame] | 285 | #endif |
Josh Gao | 3fa9637 | 2018-06-01 16:35:47 -0700 | [diff] [blame] | 286 | } else if (!strcasecmp(arg, "fdsan_file")) { |
| 287 | FILE* f = fopen("/dev/null", "r"); |
| 288 | close(fileno(f)); |
| 289 | } else if (!strcasecmp(arg, "fdsan_dir")) { |
| 290 | DIR* d = opendir("/dev/"); |
| 291 | close(dirfd(d)); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 292 | } else if (!strcasecmp(arg, "LOG(FATAL)")) { |
Josh Gao | 3fa9637 | 2018-06-01 16:35:47 -0700 | [diff] [blame] | 293 | LOG(FATAL) << "hello " << 123; |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 294 | } else if (!strcasecmp(arg, "LOG_ALWAYS_FATAL")) { |
Josh Gao | 3fa9637 | 2018-06-01 16:35:47 -0700 | [diff] [blame] | 295 | LOG_ALWAYS_FATAL("hello %s", "world"); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 296 | } else if (!strcasecmp(arg, "LOG_ALWAYS_FATAL_IF")) { |
Josh Gao | 3fa9637 | 2018-06-01 16:35:47 -0700 | [diff] [blame] | 297 | LOG_ALWAYS_FATAL_IF(true, "hello %s", "world"); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 298 | } else if (!strcasecmp(arg, "SIGFPE")) { |
Josh Gao | 3fa9637 | 2018-06-01 16:35:47 -0700 | [diff] [blame] | 299 | raise(SIGFPE); |
| 300 | return EXIT_SUCCESS; |
Elliott Hughes | 2baf443 | 2018-05-30 12:55:04 -0700 | [diff] [blame] | 301 | } else if (!strcasecmp(arg, "SIGILL")) { |
| 302 | #if defined(__aarch64__) |
| 303 | __asm__ volatile(".word 0\n"); |
| 304 | #elif defined(__arm__) |
| 305 | __asm__ volatile(".word 0xe7f0def0\n"); |
| 306 | #elif defined(__i386__) || defined(__x86_64__) |
| 307 | __asm__ volatile("ud2\n"); |
Xia Lifang | b13a10b | 2022-10-12 22:27:54 +0800 | [diff] [blame] | 308 | #elif defined(__riscv) |
| 309 | __asm__ volatile("unimp\n"); |
Elliott Hughes | 2baf443 | 2018-05-30 12:55:04 -0700 | [diff] [blame] | 310 | #else |
| 311 | #error |
| 312 | #endif |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 313 | } else if (!strcasecmp(arg, "SIGTRAP")) { |
Josh Gao | 3fa9637 | 2018-06-01 16:35:47 -0700 | [diff] [blame] | 314 | raise(SIGTRAP); |
| 315 | return EXIT_SUCCESS; |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 316 | } else if (!strcasecmp(arg, "fprintf-NULL")) { |
Josh Gao | 3fa9637 | 2018-06-01 16:35:47 -0700 | [diff] [blame] | 317 | fprintf_null(); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 318 | } else if (!strcasecmp(arg, "readdir-NULL")) { |
Josh Gao | 3fa9637 | 2018-06-01 16:35:47 -0700 | [diff] [blame] | 319 | readdir_null(); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 320 | } else if (!strcasecmp(arg, "strlen-NULL")) { |
Josh Gao | 3fa9637 | 2018-06-01 16:35:47 -0700 | [diff] [blame] | 321 | return strlen_null(); |
Elliott Hughes | da9e395 | 2017-02-17 10:26:48 -0800 | [diff] [blame] | 322 | } else if (!strcasecmp(arg, "pthread_join-NULL")) { |
Josh Gao | 3fa9637 | 2018-06-01 16:35:47 -0700 | [diff] [blame] | 323 | return pthread_join(0, nullptr); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 324 | } else if (!strcasecmp(arg, "heap-usage")) { |
Josh Gao | 3fa9637 | 2018-06-01 16:35:47 -0700 | [diff] [blame] | 325 | abuse_heap(); |
Josh Gao | 399b4ee | 2017-06-30 12:46:31 -0700 | [diff] [blame] | 326 | } else if (!strcasecmp(arg, "leak")) { |
Josh Gao | 3fa9637 | 2018-06-01 16:35:47 -0700 | [diff] [blame] | 327 | leak(); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 328 | } else if (!strcasecmp(arg, "SIGSEGV-unmapped")) { |
Josh Gao | 3fa9637 | 2018-06-01 16:35:47 -0700 | [diff] [blame] | 329 | char* map = reinterpret_cast<char*>( |
| 330 | mmap(nullptr, sizeof(int), PROT_READ | PROT_WRITE, MAP_SHARED | MAP_ANONYMOUS, -1, 0)); |
| 331 | munmap(map, sizeof(int)); |
| 332 | map[0] = '8'; |
Elliott Hughes | 0ba5359 | 2017-02-01 16:59:15 -0800 | [diff] [blame] | 333 | } else if (!strcasecmp(arg, "seccomp")) { |
Josh Gao | 3fa9637 | 2018-06-01 16:35:47 -0700 | [diff] [blame] | 334 | set_system_seccomp_filter(); |
| 335 | syscall(99999); |
Elliott Hughes | dd04c65 | 2019-04-15 13:03:48 -0700 | [diff] [blame] | 336 | #if defined(__LP64__) |
| 337 | } else if (!strcasecmp(arg, "xom")) { |
| 338 | // Try to read part of our code, which will fail if XOM is active. |
| 339 | printf("*%lx = %lx\n", reinterpret_cast<long>(usage), *reinterpret_cast<long*>(usage)); |
| 340 | #endif |
Elliott Hughes | 0ba5359 | 2017-02-01 16:59:15 -0800 | [diff] [blame] | 341 | #if defined(__arm__) |
| 342 | } else if (!strcasecmp(arg, "kuser_helper_version")) { |
| 343 | return __kuser_helper_version; |
| 344 | } else if (!strcasecmp(arg, "kuser_get_tls")) { |
| 345 | return !__kuser_get_tls(); |
| 346 | } else if (!strcasecmp(arg, "kuser_cmpxchg")) { |
| 347 | return __kuser_cmpxchg(0, 0, 0); |
| 348 | } else if (!strcasecmp(arg, "kuser_memory_barrier")) { |
| 349 | __kuser_dmb(); |
| 350 | } else if (!strcasecmp(arg, "kuser_cmpxchg64")) { |
| 351 | return __kuser_cmpxchg64(0, 0, 0); |
| 352 | #endif |
Josh Gao | 91ad653 | 2017-02-09 12:37:39 -0800 | [diff] [blame] | 353 | } else if (!strcasecmp(arg, "no_new_privs")) { |
| 354 | if (prctl(PR_SET_NO_NEW_PRIVS, 1) != 0) { |
| 355 | fprintf(stderr, "prctl(PR_SET_NO_NEW_PRIVS, 1) failed: %s\n", strerror(errno)); |
| 356 | return EXIT_SUCCESS; |
| 357 | } |
| 358 | abort(); |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 359 | } else { |
| 360 | return usage(); |
Elliott Hughes | aa42130 | 2012-12-10 14:15:42 -0800 | [diff] [blame] | 361 | } |
| 362 | |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 363 | fprintf(stderr, "%s: exiting normally!\n", getprogname()); |
Elliott Hughes | 3808c4e | 2013-04-23 17:14:56 -0700 | [diff] [blame] | 364 | return EXIT_SUCCESS; |
Elliott Hughes | aa42130 | 2012-12-10 14:15:42 -0800 | [diff] [blame] | 365 | } |
The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 366 | |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 367 | int main(int argc, char** argv) { |
Josh Gao | 9c02dc5 | 2016-06-15 17:29:00 -0700 | [diff] [blame] | 368 | #if defined(STATIC_CRASHER) |
| 369 | debuggerd_callbacks_t callbacks = { |
Peter Collingbourne | f3d542f | 2020-03-05 16:46:15 -0800 | [diff] [blame] | 370 | .get_process_info = []() { |
Josh Gao | 9c02dc5 | 2016-06-15 17:29:00 -0700 | [diff] [blame] | 371 | static struct { |
| 372 | size_t size; |
| 373 | char msg[32]; |
| 374 | } msg; |
| 375 | |
| 376 | msg.size = strlen("dummy abort message"); |
| 377 | memcpy(msg.msg, "dummy abort message", strlen("dummy abort message")); |
Peter Collingbourne | f3d542f | 2020-03-05 16:46:15 -0800 | [diff] [blame] | 378 | return debugger_process_info{ |
| 379 | .abort_msg = reinterpret_cast<void*>(&msg), |
| 380 | }; |
Josh Gao | 9c02dc5 | 2016-06-15 17:29:00 -0700 | [diff] [blame] | 381 | }, |
| 382 | .post_dump = nullptr |
| 383 | }; |
| 384 | debuggerd_init(&callbacks); |
| 385 | #endif |
| 386 | |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 387 | if (argc == 1) crash1(); |
| 388 | else if (argc == 2) return do_action(argv[1]); |
The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 389 | |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 390 | return usage(); |
The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 391 | } |
Elliott Hughes | 400628a | 2016-12-14 17:33:46 -0800 | [diff] [blame] | 392 | |
| 393 | }; |