1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429
|
/*
* Copyright 2006, The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#define LOG_TAG "crasher"
#include <assert.h>
#include <dirent.h>
#include <errno.h>
#include <error.h>
#include <fcntl.h>
#include <pthread.h>
#include <signal.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/mman.h>
#include <sys/prctl.h>
#include <unistd.h>
#include <android-base/file.h>
#include <android-base/strings.h>
// We test both kinds of logging.
#include <android-base/logging.h>
#include <log/log.h>
#include "seccomp_policy.h"
#if defined(STATIC_CRASHER)
#include "debuggerd/handler.h"
#endif
extern "C" void android_set_abort_message(const char* msg);
#if defined(__arm__)
// See https://www.kernel.org/doc/Documentation/arm/kernel_user_helpers.txt for details.
#define __kuser_helper_version (*(int32_t*) 0xffff0ffc)
typedef void * (__kuser_get_tls_t)(void);
#define __kuser_get_tls (*(__kuser_get_tls_t*) 0xffff0fe0)
typedef int (__kuser_cmpxchg_t)(int oldval, int newval, volatile int *ptr);
#define __kuser_cmpxchg (*(__kuser_cmpxchg_t*) 0xffff0fc0)
typedef void (__kuser_dmb_t)(void);
#define __kuser_dmb (*(__kuser_dmb_t*) 0xffff0fa0)
typedef int (__kuser_cmpxchg64_t)(const int64_t*, const int64_t*, volatile int64_t*);
#define __kuser_cmpxchg64 (*(__kuser_cmpxchg64_t*) 0xffff0f60)
#endif
#define noinline __attribute__((__noinline__))
// Avoid name mangling so that stacks are more readable.
extern "C" {
void crash1();
void crash_no_stack();
void crash_bti();
void crash_pac();
int do_action(const char* arg);
noinline void maybe_abort() {
if (time(0) != 42) {
abort();
}
}
char* smash_stack_dummy_buf;
noinline void smash_stack_dummy_function(volatile int* plen) {
smash_stack_dummy_buf[*plen] = 0;
}
// This must be marked with "__attribute__ ((noinline))", to ensure the
// compiler generates the proper stack guards around this function.
// Assign local array address to global variable to force stack guards.
// Use another noinline function to corrupt the stack.
noinline int smash_stack(volatile int* plen) {
printf("%s: deliberately corrupting stack...\n", getprogname());
char buf[128];
smash_stack_dummy_buf = buf;
// This should corrupt stack guards and make process abort.
smash_stack_dummy_function(plen);
return 0;
}
#pragma clang diagnostic push
#pragma clang diagnostic ignored "-Winfinite-recursion"
void* global = 0; // So GCC doesn't optimize the tail recursion out of overflow_stack.
noinline void overflow_stack(void* p) {
void* buf[1];
buf[0] = p;
global = buf;
overflow_stack(&buf);
}
#pragma clang diagnostic pop
noinline void* thread_callback(void* raw_arg) {
const char* arg = reinterpret_cast<const char*>(raw_arg);
return reinterpret_cast<void*>(static_cast<uintptr_t>(do_action(arg)));
}
noinline int do_action_on_thread(const char* arg) {
pthread_t t;
pthread_create(&t, nullptr, thread_callback, const_cast<char*>(arg));
void* result = nullptr;
pthread_join(t, &result);
return reinterpret_cast<uintptr_t>(result);
}
noinline int crash_null() {
int (*null_func)() = nullptr;
return null_func();
}
noinline int crash3(int a) {
*reinterpret_cast<int*>(0xdead) = a;
return a*4;
}
noinline int crash2(int a) {
a = crash3(a) + 2;
return a*3;
}
noinline int crash(int a) {
a = crash2(a) + 1;
return a*2;
}
#pragma clang diagnostic push
#pragma clang diagnostic ignored "-Wfree-nonheap-object"
noinline void abuse_heap() {
char buf[16];
free(buf); // GCC is smart enough to warn about this, but we're doing it deliberately.
}
#pragma clang diagnostic pop
noinline void leak() {
while (true) {
void* mapping =
mmap(nullptr, getpagesize(), PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
static_cast<volatile char*>(mapping)[0] = 'a';
}
}
noinline void sigsegv_non_null() {
int* a = (int *)(&do_action);
*a = 42;
}
noinline void fprintf_null() {
FILE* sneaky_null = nullptr;
fprintf(sneaky_null, "oops");
}
noinline void readdir_null() {
DIR* sneaky_null = nullptr;
readdir(sneaky_null);
}
noinline int strlen_null() {
char* sneaky_null = nullptr;
return strlen(sneaky_null);
}
static int usage() {
fprintf(stderr, "usage: %s KIND\n", getprogname());
fprintf(stderr, "\n");
fprintf(stderr, "where KIND is:\n");
fprintf(stderr, " smash-stack overwrite a -fstack-protector guard\n");
fprintf(stderr, " stack-overflow recurse until the stack overflows\n");
fprintf(stderr, " nostack crash with a NULL stack pointer\n");
fprintf(stderr, "\n");
fprintf(stderr, " heap-usage cause a libc abort by abusing a heap function\n");
fprintf(stderr, " call-null cause a crash by calling through a nullptr\n");
fprintf(stderr, " leak leak memory until we get OOM-killed\n");
fprintf(stderr, "\n");
fprintf(stderr, " abort call abort()\n");
fprintf(stderr, " abort_with_msg call abort() setting an abort message\n");
fprintf(stderr, " abort_with_null_msg call abort() setting a null abort message\n");
fprintf(stderr, " assert call assert() without a function\n");
fprintf(stderr, " assert2 call assert() with a function\n");
fprintf(stderr, " exit call exit(1)\n");
fprintf(stderr, "\n");
fprintf(stderr, " fortify fail a _FORTIFY_SOURCE check\n");
fprintf(stderr, " fdsan_file close a file descriptor that's owned by a FILE*\n");
fprintf(stderr, " fdsan_dir close a file descriptor that's owned by a DIR*\n");
fprintf(stderr, " seccomp fail a seccomp check\n");
fprintf(stderr, " xom read execute-only memory\n");
fprintf(stderr, "\n");
fprintf(stderr, " LOG_ALWAYS_FATAL call liblog LOG_ALWAYS_FATAL\n");
fprintf(stderr, " LOG_ALWAYS_FATAL_IF call liblog LOG_ALWAYS_FATAL_IF\n");
fprintf(stderr, " LOG-FATAL call libbase LOG(FATAL)\n");
fprintf(stderr, "\n");
fprintf(stderr, " SIGFPE cause a SIGFPE\n");
fprintf(stderr, " SIGILL cause a SIGILL\n");
fprintf(stderr, " SIGSEGV cause a SIGSEGV at address 0x0 (synonym: crash)\n");
fprintf(stderr, " SIGSEGV-non-null cause a SIGSEGV at a non-zero address\n");
fprintf(stderr, " SIGSEGV-unmapped mmap/munmap a region of memory and then attempt to access it\n");
fprintf(stderr, " SIGTRAP cause a SIGTRAP\n");
fprintf(stderr, "\n");
fprintf(stderr, " fprintf-NULL pass a null pointer to fprintf\n");
fprintf(stderr, " readdir-NULL pass a null pointer to readdir\n");
fprintf(stderr, " strlen-NULL pass a null pointer to strlen\n");
fprintf(stderr, " pthread_join-NULL pass a null pointer to pthread_join\n");
fprintf(stderr, "\n");
fprintf(stderr, " no_new_privs set PR_SET_NO_NEW_PRIVS and then abort\n");
fprintf(stderr, "\n");
#if defined(__arm__)
fprintf(stderr, "Also, since this is an arm32 binary:\n");
fprintf(stderr, " kuser_helper_version call kuser_helper_version\n");
fprintf(stderr, " kuser_get_tls call kuser_get_tls\n");
fprintf(stderr, " kuser_cmpxchg call kuser_cmpxchg\n");
fprintf(stderr, " kuser_memory_barrier call kuser_memory_barrier\n");
fprintf(stderr, " kuser_cmpxchg64 call kuser_cmpxchg64\n");
#endif
#if defined(__aarch64__)
fprintf(stderr, "Also, since this is an arm64 binary:\n");
fprintf(stderr, " bti fail a branch target identification (BTI) check\n");
fprintf(stderr, " pac fail a pointer authentication (PAC) check\n");
#endif
fprintf(stderr, "\n");
fprintf(stderr, "prefix any of the above with 'thread-' to run on a new thread\n");
fprintf(stderr, "prefix any of the above with 'exhaustfd-' to exhaust\n");
fprintf(stderr, "all available file descriptors before crashing.\n");
fprintf(stderr, "prefix any of the above with 'wait-' to wait until input is received on stdin\n");
return EXIT_FAILURE;
}
[[maybe_unused]] static void CheckCpuFeature(const std::string& name) {
std::string cpuinfo;
if (!android::base::ReadFileToString("/proc/cpuinfo", &cpuinfo)) {
error(1, errno, "couldn't read /proc/cpuinfo");
}
std::vector<std::string> lines = android::base::Split(cpuinfo, "\n");
for (std::string_view line : lines) {
if (!android::base::ConsumePrefix(&line, "Features\t:")) continue;
std::vector<std::string> features = android::base::Split(std::string(line), " ");
if (std::find(features.begin(), features.end(), name) == features.end()) {
error(1, 0, "/proc/cpuinfo does not report feature '%s'", name.c_str());
}
}
}
noinline int do_action(const char* arg) {
// Prefixes.
if (!strncmp(arg, "wait-", strlen("wait-"))) {
char buf[1];
UNUSED(TEMP_FAILURE_RETRY(read(STDIN_FILENO, buf, sizeof(buf))));
return do_action(arg + strlen("wait-"));
} else if (!strncmp(arg, "exhaustfd-", strlen("exhaustfd-"))) {
errno = 0;
while (errno != EMFILE) {
open("/dev/null", O_RDONLY);
}
return do_action(arg + strlen("exhaustfd-"));
} else if (!strncmp(arg, "thread-", strlen("thread-"))) {
return do_action_on_thread(arg + strlen("thread-"));
}
// Actions.
if (!strcasecmp(arg, "SIGSEGV-non-null")) {
sigsegv_non_null();
} else if (!strcasecmp(arg, "smash-stack")) {
volatile int len = 128;
return smash_stack(&len);
} else if (!strcasecmp(arg, "stack-overflow")) {
overflow_stack(nullptr);
} else if (!strcasecmp(arg, "nostack")) {
crash_no_stack();
} else if (!strcasecmp(arg, "exit")) {
exit(1);
} else if (!strcasecmp(arg, "call-null")) {
return crash_null();
} else if (!strcasecmp(arg, "crash") || !strcmp(arg, "SIGSEGV")) {
return crash(42);
} else if (!strcasecmp(arg, "abort")) {
maybe_abort();
} else if (!strcasecmp(arg, "abort_with_msg")) {
android_set_abort_message("Aborting due to crasher");
maybe_abort();
} else if (!strcasecmp(arg, "abort_with_null")) {
android_set_abort_message(nullptr);
maybe_abort();
} else if (!strcasecmp(arg, "assert")) {
__assert("some_file.c", 123, "false");
} else if (!strcasecmp(arg, "assert2")) {
__assert2("some_file.c", 123, "some_function", "false");
#if !defined(__clang_analyzer__)
} else if (!strcasecmp(arg, "fortify")) {
// FORTIFY is disabled when running clang-tidy and other tools, so this
// shouldn't depend on internal implementation details of it.
char buf[10];
__read_chk(-1, buf, 32, 10);
while (true) pause();
#endif
} else if (!strcasecmp(arg, "fdsan_file")) {
FILE* f = fopen("/dev/null", "r");
close(fileno(f));
} else if (!strcasecmp(arg, "fdsan_dir")) {
DIR* d = opendir("/dev/");
close(dirfd(d));
} else if (!strcasecmp(arg, "LOG(FATAL)")) {
LOG(FATAL) << "hello " << 123;
} else if (!strcasecmp(arg, "LOG_ALWAYS_FATAL")) {
LOG_ALWAYS_FATAL("hello %s", "world");
} else if (!strcasecmp(arg, "LOG_ALWAYS_FATAL_IF")) {
LOG_ALWAYS_FATAL_IF(true, "hello %s", "world");
} else if (!strcasecmp(arg, "SIGFPE")) {
raise(SIGFPE);
return EXIT_SUCCESS;
} else if (!strcasecmp(arg, "SIGILL")) {
#if defined(__aarch64__)
__asm__ volatile(".word 0\n");
#elif defined(__arm__)
__asm__ volatile(".word 0xe7f0def0\n");
#elif defined(__i386__) || defined(__x86_64__)
__asm__ volatile("ud2\n");
#elif defined(__riscv)
__asm__ volatile("unimp\n");
#else
#error
#endif
} else if (!strcasecmp(arg, "SIGTRAP")) {
raise(SIGTRAP);
return EXIT_SUCCESS;
} else if (!strcasecmp(arg, "fprintf-NULL")) {
fprintf_null();
} else if (!strcasecmp(arg, "readdir-NULL")) {
readdir_null();
} else if (!strcasecmp(arg, "strlen-NULL")) {
return strlen_null();
} else if (!strcasecmp(arg, "pthread_join-NULL")) {
return pthread_join(0, nullptr);
} else if (!strcasecmp(arg, "heap-usage")) {
abuse_heap();
} else if (!strcasecmp(arg, "leak")) {
leak();
} else if (!strcasecmp(arg, "SIGSEGV-unmapped")) {
char* map = reinterpret_cast<char*>(
mmap(nullptr, sizeof(int), PROT_READ | PROT_WRITE, MAP_SHARED | MAP_ANONYMOUS, -1, 0));
munmap(map, sizeof(int));
map[0] = '8';
} else if (!strcasecmp(arg, "seccomp")) {
set_system_seccomp_filter();
syscall(99999);
#if defined(__LP64__)
} else if (!strcasecmp(arg, "xom")) {
// Try to read part of our code, which will fail if XOM is active.
printf("*%lx = %lx\n", reinterpret_cast<long>(usage), *reinterpret_cast<long*>(usage));
#endif
#if defined(__arm__)
} else if (!strcasecmp(arg, "kuser_helper_version")) {
return __kuser_helper_version;
} else if (!strcasecmp(arg, "kuser_get_tls")) {
return !__kuser_get_tls();
} else if (!strcasecmp(arg, "kuser_cmpxchg")) {
return __kuser_cmpxchg(0, 0, 0);
} else if (!strcasecmp(arg, "kuser_memory_barrier")) {
__kuser_dmb();
} else if (!strcasecmp(arg, "kuser_cmpxchg64")) {
return __kuser_cmpxchg64(0, 0, 0);
#endif
#if defined(__aarch64__)
} else if (!strcasecmp(arg, "bti")) {
CheckCpuFeature("bti");
crash_bti();
} else if (!strcasecmp(arg, "pac")) {
CheckCpuFeature("paca");
crash_pac();
#endif
} else if (!strcasecmp(arg, "no_new_privs")) {
if (prctl(PR_SET_NO_NEW_PRIVS, 1) != 0) {
fprintf(stderr, "prctl(PR_SET_NO_NEW_PRIVS, 1) failed: %s\n", strerror(errno));
return EXIT_SUCCESS;
}
abort();
} else {
return usage();
}
fprintf(stderr, "%s: exiting normally!\n", getprogname());
return EXIT_SUCCESS;
}
int main(int argc, char** argv) {
#if defined(STATIC_CRASHER)
debuggerd_callbacks_t callbacks = {
.get_process_info = []() {
static struct {
size_t size;
char msg[32];
} msg;
msg.size = strlen("dummy abort message");
memcpy(msg.msg, "dummy abort message", strlen("dummy abort message"));
return debugger_process_info{
.abort_msg = reinterpret_cast<void*>(&msg),
};
},
.post_dump = nullptr
};
debuggerd_init(&callbacks);
#endif
if (argc == 1) crash1();
else if (argc == 2) return do_action(argv[1]);
return usage();
}
};
|