1 /*
2  * Copyright (C) 2018 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 #include <dirent.h>
18 #include <poll.h>
19 #include <sys/prctl.h>
20 #include <sys/ptrace.h>
21 #include <sys/types.h>
22 #include <sys/wait.h>
23 #include <unistd.h>
24 
25 #include <csignal>
26 #include <cstdlib>
27 #include <cstring>
28 #include <iostream>
29 #include <thread>
30 #include <memory>
31 #include <set>
32 #include <string>
33 
34 #include <android-base/file.h>
35 #include <android-base/logging.h>
36 #include <android-base/macros.h>
37 #include <android-base/stringprintf.h>
38 #include <android-base/strings.h>
39 #include <android-base/unique_fd.h>
40 #include <backtrace/Backtrace.h>
41 #include <backtrace/BacktraceMap.h>
42 
43 namespace art {
44 namespace {
45 
46 using android::base::StringPrintf;
47 using android::base::unique_fd;
48 
49 constexpr bool kUseAddr2line = true;
50 
51 namespace timeout_signal {
52 
53 class SignalSet {
54  public:
SignalSet()55   SignalSet() {
56     if (sigemptyset(&set_) == -1) {
57       PLOG(FATAL) << "sigemptyset failed";
58     }
59   }
60 
Add(int signal)61   void Add(int signal) {
62     if (sigaddset(&set_, signal) == -1) {
63       PLOG(FATAL) << "sigaddset " << signal << " failed";
64     }
65   }
66 
Block()67   void Block() {
68     if (pthread_sigmask(SIG_BLOCK, &set_, nullptr) != 0) {
69       PLOG(FATAL) << "pthread_sigmask failed";
70     }
71   }
72 
Wait()73   int Wait() {
74     // Sleep in sigwait() until a signal arrives. gdb causes EINTR failures.
75     int signal_number;
76     int rc = TEMP_FAILURE_RETRY(sigwait(&set_, &signal_number));
77     if (rc != 0) {
78       PLOG(FATAL) << "sigwait failed";
79     }
80     return signal_number;
81   }
82 
83  private:
84   sigset_t set_;
85 };
86 
GetTimeoutSignal()87 int GetTimeoutSignal() {
88   return SIGRTMIN + 2;
89 }
90 
91 }  // namespace timeout_signal
92 
93 namespace addr2line {
94 
95 constexpr const char* kAddr2linePath =
96     "/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.17-4.8/bin/x86_64-linux-addr2line";
97 
FindAddr2line()98 std::unique_ptr<std::string> FindAddr2line() {
99   const char* env_value = getenv("ANDROID_BUILD_TOP");
100   if (env_value != nullptr) {
101     std::string path = std::string(env_value) + kAddr2linePath;
102     if (access(path.c_str(), X_OK) == 0) {
103       return std::make_unique<std::string>(path);
104     }
105   }
106 
107   {
108     std::string path = std::string(".") + kAddr2linePath;
109     if (access(path.c_str(), X_OK) == 0) {
110       return std::make_unique<std::string>(path);
111     }
112   }
113 
114   {
115     using android::base::Dirname;
116 
117     std::string exec_dir = android::base::GetExecutableDirectory();
118     std::string derived_top = Dirname(Dirname(Dirname(Dirname(exec_dir))));
119     std::string path = derived_top + kAddr2linePath;
120     if (access(path.c_str(), X_OK) == 0) {
121       return std::make_unique<std::string>(path);
122     }
123   }
124 
125   constexpr const char* kHostAddr2line = "/usr/bin/addr2line";
126   if (access(kHostAddr2line, F_OK) == 0) {
127     return std::make_unique<std::string>(kHostAddr2line);
128   }
129 
130   return nullptr;
131 }
132 
133 // The state of an open pipe to addr2line. In "server" mode, addr2line takes input on stdin
134 // and prints the result to stdout. This struct keeps the state of the open connection.
135 struct Addr2linePipe {
Addr2linePipeart::__anon44fba0de0111::addr2line::Addr2linePipe136   Addr2linePipe(int in_fd, int out_fd, const std::string& file_name, pid_t pid)
137       : in(in_fd), out(out_fd), file(file_name), child_pid(pid), odd(true) {}
138 
~Addr2linePipeart::__anon44fba0de0111::addr2line::Addr2linePipe139   ~Addr2linePipe() {
140     kill(child_pid, SIGKILL);
141   }
142 
143   unique_fd in;      // The file descriptor that is connected to the output of addr2line.
144   unique_fd out;     // The file descriptor that is connected to the input of addr2line.
145 
146   const std::string file;     // The file addr2line is working on, so that we know when to close
147                               // and restart.
148   const pid_t child_pid;      // The pid of the child, which we should kill when we're done.
149   bool odd;                   // Print state for indentation of lines.
150 };
151 
Connect(const std::string & name,const char * args[])152 std::unique_ptr<Addr2linePipe> Connect(const std::string& name, const char* args[]) {
153   int caller_to_addr2line[2];
154   int addr2line_to_caller[2];
155 
156   if (pipe(caller_to_addr2line) == -1) {
157     return nullptr;
158   }
159   if (pipe(addr2line_to_caller) == -1) {
160     close(caller_to_addr2line[0]);
161     close(caller_to_addr2line[1]);
162     return nullptr;
163   }
164 
165   pid_t pid = fork();
166   if (pid == -1) {
167     close(caller_to_addr2line[0]);
168     close(caller_to_addr2line[1]);
169     close(addr2line_to_caller[0]);
170     close(addr2line_to_caller[1]);
171     return nullptr;
172   }
173 
174   if (pid == 0) {
175     dup2(caller_to_addr2line[0], STDIN_FILENO);
176     dup2(addr2line_to_caller[1], STDOUT_FILENO);
177 
178     close(caller_to_addr2line[0]);
179     close(caller_to_addr2line[1]);
180     close(addr2line_to_caller[0]);
181     close(addr2line_to_caller[1]);
182 
183     execv(args[0], const_cast<char* const*>(args));
184     exit(1);
185   } else {
186     close(caller_to_addr2line[0]);
187     close(addr2line_to_caller[1]);
188     return std::make_unique<Addr2linePipe>(addr2line_to_caller[0],
189                                            caller_to_addr2line[1],
190                                            name,
191                                            pid);
192   }
193 }
194 
WritePrefix(std::ostream & os,const char * prefix,bool odd)195 void WritePrefix(std::ostream& os, const char* prefix, bool odd) {
196   if (prefix != nullptr) {
197     os << prefix;
198   }
199   os << "  ";
200   if (!odd) {
201     os << " ";
202   }
203 }
204 
Drain(size_t expected,const char * prefix,std::unique_ptr<Addr2linePipe> * pipe,std::ostream & os)205 void Drain(size_t expected,
206            const char* prefix,
207            std::unique_ptr<Addr2linePipe>* pipe /* inout */,
208            std::ostream& os) {
209   DCHECK(pipe != nullptr);
210   DCHECK(pipe->get() != nullptr);
211   int in = pipe->get()->in.get();
212   DCHECK_GE(in, 0);
213 
214   bool prefix_written = false;
215 
216   for (;;) {
217     constexpr uint32_t kWaitTimeExpectedMilli = 500;
218     constexpr uint32_t kWaitTimeUnexpectedMilli = 50;
219 
220     int timeout = expected > 0 ? kWaitTimeExpectedMilli : kWaitTimeUnexpectedMilli;
221     struct pollfd read_fd{in, POLLIN, 0};
222     int retval = TEMP_FAILURE_RETRY(poll(&read_fd, 1, timeout));
223     if (retval == -1) {
224       // An error occurred.
225       pipe->reset();
226       return;
227     }
228 
229     if (retval == 0) {
230       // Timeout.
231       return;
232     }
233 
234     if (!(read_fd.revents & POLLIN)) {
235       // addr2line call exited.
236       pipe->reset();
237       return;
238     }
239 
240     constexpr size_t kMaxBuffer = 128;  // Relatively small buffer. Should be OK as we're on an
241     // alt stack, but just to be sure...
242     char buffer[kMaxBuffer];
243     memset(buffer, 0, kMaxBuffer);
244     int bytes_read = TEMP_FAILURE_RETRY(read(in, buffer, kMaxBuffer - 1));
245     if (bytes_read <= 0) {
246       // This should not really happen...
247       pipe->reset();
248       return;
249     }
250     buffer[bytes_read] = '\0';
251 
252     char* tmp = buffer;
253     while (*tmp != 0) {
254       if (!prefix_written) {
255         WritePrefix(os, prefix, (*pipe)->odd);
256         prefix_written = true;
257       }
258       char* new_line = strchr(tmp, '\n');
259       if (new_line == nullptr) {
260         os << tmp;
261 
262         break;
263       } else {
264         os << std::string(tmp, new_line - tmp + 1);
265 
266         tmp = new_line + 1;
267         prefix_written = false;
268         (*pipe)->odd = !(*pipe)->odd;
269 
270         if (expected > 0) {
271           expected--;
272         }
273       }
274     }
275   }
276 }
277 
Addr2line(const std::string & addr2line,const std::string & map_src,uintptr_t offset,std::ostream & os,const char * prefix,std::unique_ptr<Addr2linePipe> * pipe)278 void Addr2line(const std::string& addr2line,
279                const std::string& map_src,
280                uintptr_t offset,
281                std::ostream& os,
282                const char* prefix,
283                std::unique_ptr<Addr2linePipe>* pipe /* inout */) {
284   DCHECK(pipe != nullptr);
285 
286   if (map_src == "[vdso]" || android::base::EndsWith(map_src, ".vdex")) {
287     // addr2line will not work on the vdso.
288     // vdex files are special frames injected for the interpreter
289     // so they don't have any line number information available.
290     return;
291   }
292 
293   if (*pipe == nullptr || (*pipe)->file != map_src) {
294     if (*pipe != nullptr) {
295       Drain(0, prefix, pipe, os);
296     }
297     pipe->reset();  // Close early.
298 
299     const char* args[] = {
300         addr2line.c_str(),
301         "--functions",
302         "--inlines",
303         "--demangle",
304         "-e",
305         map_src.c_str(),
306         nullptr
307     };
308     *pipe = Connect(map_src, args);
309   }
310 
311   Addr2linePipe* pipe_ptr = pipe->get();
312   if (pipe_ptr == nullptr) {
313     // Failed...
314     return;
315   }
316 
317   // Send the offset.
318   const std::string hex_offset = StringPrintf("%zx\n", offset);
319 
320   if (!android::base::WriteFully(pipe_ptr->out.get(), hex_offset.data(), hex_offset.length())) {
321     // Error. :-(
322     pipe->reset();
323     return;
324   }
325 
326   // Now drain (expecting two lines).
327   Drain(2U, prefix, pipe, os);
328 }
329 
330 }  // namespace addr2line
331 
332 namespace ptrace {
333 
PtraceSiblings(pid_t pid)334 std::set<pid_t> PtraceSiblings(pid_t pid) {
335   std::set<pid_t> ret;
336   std::string task_path = android::base::StringPrintf("/proc/%d/task", pid);
337 
338   std::unique_ptr<DIR, int (*)(DIR*)> d(opendir(task_path.c_str()), closedir);
339 
340   // Bail early if the task directory cannot be opened.
341   if (d == nullptr) {
342     PLOG(ERROR) << "Failed to scan task folder";
343     return ret;
344   }
345 
346   struct dirent* de;
347   while ((de = readdir(d.get())) != nullptr) {
348     // Ignore "." and "..".
349     if (!strcmp(de->d_name, ".") || !strcmp(de->d_name, "..")) {
350       continue;
351     }
352 
353     char* end;
354     pid_t tid = strtoul(de->d_name, &end, 10);
355     if (*end) {
356       continue;
357     }
358 
359     if (tid == pid) {
360       continue;
361     }
362 
363     if (::ptrace(PTRACE_ATTACH, tid, 0, 0) != 0) {
364       PLOG(ERROR) << "Failed to attach to tid " << tid;
365       continue;
366     }
367 
368     ret.insert(tid);
369   }
370   return ret;
371 }
372 
DumpABI(pid_t forked_pid)373 void DumpABI(pid_t forked_pid) {
374   enum class ABI { kArm, kArm64, kMips, kMips64, kX86, kX86_64 };
375 #if defined(__arm__)
376   constexpr ABI kDumperABI = ABI::kArm;
377 #elif defined(__aarch64__)
378   constexpr ABI kDumperABI = ABI::kArm64;
379 #elif defined(__mips__) && !defined(__LP64__)
380   constexpr ABI kDumperABI = ABI::kMips;
381 #elif defined(__mips__) && defined(__LP64__)
382   constexpr ABI kDumperABI = ABI::kMips64;
383 #elif defined(__i386__)
384   constexpr ABI kDumperABI = ABI::kX86;
385 #elif defined(__x86_64__)
386   constexpr ABI kDumperABI = ABI::kX86_64;
387 #else
388 #error Unsupported architecture
389 #endif
390 
391   char data[1024];  // Should be more than enough.
392   struct iovec io_vec;
393   io_vec.iov_base = &data;
394   io_vec.iov_len = 1024;
395   ABI to_print;
396   if (0 != ::ptrace(PTRACE_GETREGSET, forked_pid, /* NT_PRSTATUS */ 1, &io_vec)) {
397     LOG(ERROR) << "Could not get registers to determine abi.";
398     // Use 64-bit as default.
399     switch (kDumperABI) {
400       case ABI::kArm:
401       case ABI::kArm64:
402         to_print = ABI::kArm64;
403         break;
404       case ABI::kMips:
405       case ABI::kMips64:
406         to_print = ABI::kMips64;
407         break;
408       case ABI::kX86:
409       case ABI::kX86_64:
410         to_print = ABI::kX86_64;
411         break;
412       default:
413         __builtin_unreachable();
414     }
415   } else {
416     // Check the length of the data. Assume that it's the same arch as the tool.
417     switch (kDumperABI) {
418       case ABI::kArm:
419       case ABI::kArm64:
420         to_print = io_vec.iov_len == 18 * sizeof(uint32_t) ? ABI::kArm : ABI::kArm64;
421         break;
422       case ABI::kMips:
423       case ABI::kMips64:
424         to_print = ABI::kMips64;  // TODO Figure out how this should work.
425         break;
426       case ABI::kX86:
427       case ABI::kX86_64:
428         to_print = io_vec.iov_len == 17 * sizeof(uint32_t) ? ABI::kX86 : ABI::kX86_64;
429         break;
430       default:
431         __builtin_unreachable();
432     }
433   }
434   std::string abi_str;
435   switch (to_print) {
436     case ABI::kArm:
437       abi_str = "arm";
438       break;
439     case ABI::kArm64:
440       abi_str = "arm64";
441       break;
442     case ABI::kMips:
443       abi_str = "mips";
444       break;
445     case ABI::kMips64:
446       abi_str = "mips64";
447       break;
448     case ABI::kX86:
449       abi_str = "x86";
450       break;
451     case ABI::kX86_64:
452       abi_str = "x86_64";
453       break;
454   }
455   std::cerr << "ABI: '" << abi_str << "'" << std::endl;
456 }
457 
458 }  // namespace ptrace
459 
460 template <typename T>
WaitLoop(uint32_t max_wait_micros,const T & handler)461 bool WaitLoop(uint32_t max_wait_micros, const T& handler) {
462   constexpr uint32_t kWaitMicros = 10;
463   const size_t kMaxLoopCount = max_wait_micros / kWaitMicros;
464 
465   for (size_t loop_count = 1; loop_count <= kMaxLoopCount; ++loop_count) {
466     bool ret;
467     if (handler(&ret)) {
468       return ret;
469     }
470     usleep(kWaitMicros);
471   }
472   return false;
473 }
474 
WaitForMainSigStop(const std::atomic<bool> & saw_wif_stopped_for_main)475 bool WaitForMainSigStop(const std::atomic<bool>& saw_wif_stopped_for_main) {
476   auto handler = [&](bool* res) {
477     if (saw_wif_stopped_for_main) {
478       *res = true;
479       return true;
480     }
481     return false;
482   };
483   constexpr uint32_t kMaxWaitMicros = 30 * 1000 * 1000;  // 30s wait.
484   return WaitLoop(kMaxWaitMicros, handler);
485 }
486 
WaitForSigStopped(pid_t pid,uint32_t max_wait_micros)487 bool WaitForSigStopped(pid_t pid, uint32_t max_wait_micros) {
488   auto handler = [&](bool* res) {
489     int status;
490     pid_t rc = TEMP_FAILURE_RETRY(waitpid(pid, &status, WNOHANG));
491     if (rc == -1) {
492       PLOG(ERROR) << "Failed to waitpid for " << pid;
493       *res = false;
494       return true;
495     }
496     if (rc == pid) {
497       if (!(WIFSTOPPED(status))) {
498         LOG(ERROR) << "Did not get expected stopped signal for " << pid;
499         *res = false;
500       } else {
501         *res = true;
502       }
503       return true;
504     }
505     return false;
506   };
507   return WaitLoop(max_wait_micros, handler);
508 }
509 
510 #ifdef __LP64__
511 constexpr bool kIs64Bit = true;
512 #else
513 constexpr bool kIs64Bit = false;
514 #endif
515 
DumpThread(pid_t pid,pid_t tid,const std::string * addr2line_path,const char * prefix,BacktraceMap * map)516 void DumpThread(pid_t pid,
517                 pid_t tid,
518                 const std::string* addr2line_path,
519                 const char* prefix,
520                 BacktraceMap* map) {
521   // Use std::cerr to avoid the LOG prefix.
522   std::cerr << std::endl << "=== pid: " << pid << " tid: " << tid << " ===" << std::endl;
523 
524   constexpr uint32_t kMaxWaitMicros = 1000 * 1000;  // 1s.
525   if (pid != tid && !WaitForSigStopped(tid, kMaxWaitMicros)) {
526     LOG(ERROR) << "Failed to wait for sigstop on " << tid;
527   }
528 
529   std::unique_ptr<Backtrace> backtrace(Backtrace::Create(pid, tid, map));
530   if (backtrace == nullptr) {
531     LOG(ERROR) << prefix << "(failed to create Backtrace for thread " << tid << ")";
532     return;
533   }
534   backtrace->SetSkipFrames(false);
535   if (!backtrace->Unwind(0, nullptr)) {
536     LOG(ERROR) << prefix << "(backtrace::Unwind failed for thread " << tid
537                << ": " <<  backtrace->GetErrorString(backtrace->GetError()) << ")";
538     return;
539   }
540   if (backtrace->NumFrames() == 0) {
541     LOG(ERROR) << prefix << "(no native stack frames for thread " << tid << ")";
542     return;
543   }
544 
545   std::unique_ptr<addr2line::Addr2linePipe> addr2line_state;
546 
547   for (Backtrace::const_iterator it = backtrace->begin();
548       it != backtrace->end(); ++it) {
549     std::ostringstream oss;
550     oss << prefix << StringPrintf("#%02zu pc ", it->num);
551     bool try_addr2line = false;
552     if (!BacktraceMap::IsValid(it->map)) {
553       oss << StringPrintf(kIs64Bit ? "%016" PRIx64 "  ???" : "%08" PRIx64 "  ???", it->pc);
554     } else {
555       oss << StringPrintf(kIs64Bit ? "%016" PRIx64 "  " : "%08" PRIx64 "  ", it->rel_pc);
556       if (it->map.name.empty()) {
557         oss << StringPrintf("<anonymous:%" PRIx64 ">", it->map.start);
558       } else {
559         oss << it->map.name;
560       }
561       if (it->map.offset != 0) {
562         oss << StringPrintf(" (offset %" PRIx64 ")", it->map.offset);
563       }
564       oss << " (";
565       if (!it->func_name.empty()) {
566         oss << it->func_name;
567         if (it->func_offset != 0) {
568           oss << "+" << it->func_offset;
569         }
570         // Functions found using the gdb jit interface will be in an empty
571         // map that cannot be found using addr2line.
572         if (!it->map.name.empty()) {
573           try_addr2line = true;
574         }
575       } else {
576         oss << "???";
577       }
578       oss << ")";
579     }
580     std::cerr << oss.str() << std::endl;
581     if (try_addr2line && addr2line_path != nullptr) {
582       addr2line::Addr2line(*addr2line_path,
583                            it->map.name,
584                            it->rel_pc,
585                            std::cerr,
586                            prefix,
587                            &addr2line_state);
588     }
589   }
590 
591   if (addr2line_state != nullptr) {
592     addr2line::Drain(0, prefix, &addr2line_state, std::cerr);
593   }
594 }
595 
DumpProcess(pid_t forked_pid,const std::atomic<bool> & saw_wif_stopped_for_main)596 void DumpProcess(pid_t forked_pid, const std::atomic<bool>& saw_wif_stopped_for_main) {
597   LOG(ERROR) << "Timeout for process " << forked_pid;
598 
599   CHECK_EQ(0, ::ptrace(PTRACE_ATTACH, forked_pid, 0, 0));
600   std::set<pid_t> tids = ptrace::PtraceSiblings(forked_pid);
601   tids.insert(forked_pid);
602 
603   ptrace::DumpABI(forked_pid);
604 
605   // Check whether we have and should use addr2line.
606   std::unique_ptr<std::string> addr2line_path;
607   if (kUseAddr2line) {
608     addr2line_path = addr2line::FindAddr2line();
609     if (addr2line_path == nullptr) {
610       LOG(ERROR) << "Did not find usable addr2line";
611     }
612   }
613 
614   if (!WaitForMainSigStop(saw_wif_stopped_for_main)) {
615     LOG(ERROR) << "Did not receive SIGSTOP for pid " << forked_pid;
616   }
617 
618   std::unique_ptr<BacktraceMap> backtrace_map(BacktraceMap::Create(forked_pid));
619   if (backtrace_map == nullptr) {
620     LOG(ERROR) << "Could not create BacktraceMap";
621     return;
622   }
623 
624   for (pid_t tid : tids) {
625     DumpThread(forked_pid, tid, addr2line_path.get(), "  ", backtrace_map.get());
626   }
627 }
628 
629 [[noreturn]]
WaitMainLoop(pid_t forked_pid,std::atomic<bool> * saw_wif_stopped_for_main)630 void WaitMainLoop(pid_t forked_pid, std::atomic<bool>* saw_wif_stopped_for_main) {
631   for (;;) {
632     // Consider switching to waitid to not get woken up for WIFSTOPPED.
633     int status;
634     pid_t res = TEMP_FAILURE_RETRY(waitpid(forked_pid, &status, 0));
635     if (res == -1) {
636       PLOG(FATAL) << "Failure during waitpid";
637       __builtin_unreachable();
638     }
639 
640     if (WIFEXITED(status)) {
641       _exit(WEXITSTATUS(status));
642       __builtin_unreachable();
643     }
644     if (WIFSIGNALED(status)) {
645       _exit(1);
646       __builtin_unreachable();
647     }
648     if (WIFSTOPPED(status)) {
649       *saw_wif_stopped_for_main = true;
650       continue;
651     }
652     if (WIFCONTINUED(status)) {
653       continue;
654     }
655 
656     LOG(FATAL) << "Unknown status " << std::hex << status;
657   }
658 }
659 
660 [[noreturn]]
SetupAndWait(pid_t forked_pid)661 void SetupAndWait(pid_t forked_pid) {
662   timeout_signal::SignalSet signals;
663   signals.Add(timeout_signal::GetTimeoutSignal());
664   signals.Block();
665 
666   std::atomic<bool> saw_wif_stopped_for_main(false);
667 
668   std::thread signal_catcher([&]() {
669     signals.Block();
670     int sig = signals.Wait();
671     CHECK_EQ(sig, timeout_signal::GetTimeoutSignal());
672 
673     DumpProcess(forked_pid, saw_wif_stopped_for_main);
674 
675     // Don't clean up. Just kill the child and exit.
676     kill(forked_pid, SIGKILL);
677     _exit(1);
678   });
679 
680   WaitMainLoop(forked_pid, &saw_wif_stopped_for_main);
681 }
682 
683 }  // namespace
684 }  // namespace art
685 
main(int argc ATTRIBUTE_UNUSED,char ** argv)686 int main(int argc ATTRIBUTE_UNUSED, char** argv) {
687   pid_t orig_ppid = getpid();
688 
689   pid_t pid = fork();
690   if (pid == 0) {
691     if (prctl(PR_SET_PDEATHSIG, SIGTERM) == -1) {
692       _exit(1);
693     }
694 
695     if (getppid() != orig_ppid) {
696       _exit(2);
697     }
698 
699     execvp(argv[1], &argv[1]);
700 
701     _exit(3);
702     __builtin_unreachable();
703   }
704 
705   art::SetupAndWait(pid);
706   __builtin_unreachable();
707 }
708