1 | #[cfg (all( |
2 | target_os = "linux" , |
3 | any(target_arch = "x86_64" , target_arch = "x86" ), |
4 | target_env = "gnu" |
5 | ))] |
6 | use memoffset::offset_of; |
7 | use nix::errno::Errno; |
8 | use nix::sys::ptrace; |
9 | #[cfg (any(target_os = "android" , target_os = "linux" ))] |
10 | use nix::sys::ptrace::Options; |
11 | use nix::unistd::getpid; |
12 | |
13 | #[cfg (any(target_os = "android" , target_os = "linux" ))] |
14 | use std::mem; |
15 | |
16 | use crate::*; |
17 | |
18 | #[test] |
19 | fn test_ptrace() { |
20 | // Just make sure ptrace can be called at all, for now. |
21 | // FIXME: qemu-user doesn't implement ptrace on all arches, so permit ENOSYS |
22 | require_capability!("test_ptrace" , CAP_SYS_PTRACE); |
23 | let err = ptrace::attach(getpid()).unwrap_err(); |
24 | assert!( |
25 | err == Errno::EPERM || err == Errno::EINVAL || err == Errno::ENOSYS |
26 | ); |
27 | } |
28 | |
29 | // Just make sure ptrace_setoptions can be called at all, for now. |
30 | #[test] |
31 | #[cfg (any(target_os = "android" , target_os = "linux" ))] |
32 | fn test_ptrace_setoptions() { |
33 | require_capability!("test_ptrace_setoptions" , CAP_SYS_PTRACE); |
34 | let err = ptrace::setoptions(getpid(), Options::PTRACE_O_TRACESYSGOOD) |
35 | .unwrap_err(); |
36 | assert_ne!(err, Errno::EOPNOTSUPP); |
37 | } |
38 | |
39 | // Just make sure ptrace_getevent can be called at all, for now. |
40 | #[test] |
41 | #[cfg (any(target_os = "android" , target_os = "linux" ))] |
42 | fn test_ptrace_getevent() { |
43 | require_capability!("test_ptrace_getevent" , CAP_SYS_PTRACE); |
44 | let err = ptrace::getevent(getpid()).unwrap_err(); |
45 | assert_ne!(err, Errno::EOPNOTSUPP); |
46 | } |
47 | |
48 | // Just make sure ptrace_getsiginfo can be called at all, for now. |
49 | #[test] |
50 | #[cfg (any(target_os = "android" , target_os = "linux" ))] |
51 | fn test_ptrace_getsiginfo() { |
52 | require_capability!("test_ptrace_getsiginfo" , CAP_SYS_PTRACE); |
53 | if let Err(Errno::EOPNOTSUPP) = ptrace::getsiginfo(getpid()) { |
54 | panic!("ptrace_getsiginfo returns Errno::EOPNOTSUPP!" ); |
55 | } |
56 | } |
57 | |
58 | // Just make sure ptrace_setsiginfo can be called at all, for now. |
59 | #[test] |
60 | #[cfg (any(target_os = "android" , target_os = "linux" ))] |
61 | fn test_ptrace_setsiginfo() { |
62 | require_capability!("test_ptrace_setsiginfo" , CAP_SYS_PTRACE); |
63 | let siginfo = unsafe { mem::zeroed() }; |
64 | if let Err(Errno::EOPNOTSUPP) = ptrace::setsiginfo(getpid(), &siginfo) { |
65 | panic!("ptrace_setsiginfo returns Errno::EOPNOTSUPP!" ); |
66 | } |
67 | } |
68 | |
69 | #[test] |
70 | fn test_ptrace_cont() { |
71 | use nix::sys::ptrace; |
72 | use nix::sys::signal::{raise, Signal}; |
73 | use nix::sys::wait::{waitpid, WaitPidFlag, WaitStatus}; |
74 | use nix::unistd::fork; |
75 | use nix::unistd::ForkResult::*; |
76 | |
77 | require_capability!("test_ptrace_cont" , CAP_SYS_PTRACE); |
78 | |
79 | let _m = crate::FORK_MTX.lock(); |
80 | |
81 | // FIXME: qemu-user doesn't implement ptrace on all architectures |
82 | // and returns ENOSYS in this case. |
83 | // We (ab)use this behavior to detect the affected platforms |
84 | // and skip the test then. |
85 | // On valid platforms the ptrace call should return Errno::EPERM, this |
86 | // is already tested by `test_ptrace`. |
87 | let err = ptrace::attach(getpid()).unwrap_err(); |
88 | if err == Errno::ENOSYS { |
89 | return; |
90 | } |
91 | |
92 | match unsafe { fork() }.expect("Error: Fork Failed" ) { |
93 | Child => { |
94 | ptrace::traceme().unwrap(); |
95 | // As recommended by ptrace(2), raise SIGTRAP to pause the child |
96 | // until the parent is ready to continue |
97 | loop { |
98 | raise(Signal::SIGTRAP).unwrap(); |
99 | } |
100 | } |
101 | Parent { child } => { |
102 | assert_eq!( |
103 | waitpid(child, None), |
104 | Ok(WaitStatus::Stopped(child, Signal::SIGTRAP)) |
105 | ); |
106 | ptrace::cont(child, None).unwrap(); |
107 | assert_eq!( |
108 | waitpid(child, None), |
109 | Ok(WaitStatus::Stopped(child, Signal::SIGTRAP)) |
110 | ); |
111 | ptrace::cont(child, Some(Signal::SIGKILL)).unwrap(); |
112 | match waitpid(child, None) { |
113 | Ok(WaitStatus::Signaled(pid, Signal::SIGKILL, _)) |
114 | if pid == child => |
115 | { |
116 | // FIXME It's been observed on some systems (apple) the |
117 | // tracee may not be killed but remain as a zombie process |
118 | // affecting other wait based tests. Add an extra kill just |
119 | // to make sure there are no zombies. |
120 | let _ = waitpid(child, Some(WaitPidFlag::WNOHANG)); |
121 | while ptrace::cont(child, Some(Signal::SIGKILL)).is_ok() { |
122 | let _ = waitpid(child, Some(WaitPidFlag::WNOHANG)); |
123 | } |
124 | } |
125 | _ => panic!("The process should have been killed" ), |
126 | } |
127 | } |
128 | } |
129 | } |
130 | |
131 | #[cfg (target_os = "linux" )] |
132 | #[test] |
133 | fn test_ptrace_interrupt() { |
134 | use nix::sys::ptrace; |
135 | use nix::sys::signal::Signal; |
136 | use nix::sys::wait::{waitpid, WaitPidFlag, WaitStatus}; |
137 | use nix::unistd::fork; |
138 | use nix::unistd::ForkResult::*; |
139 | use std::thread::sleep; |
140 | use std::time::Duration; |
141 | |
142 | require_capability!("test_ptrace_interrupt" , CAP_SYS_PTRACE); |
143 | |
144 | let _m = crate::FORK_MTX.lock(); |
145 | |
146 | match unsafe { fork() }.expect("Error: Fork Failed" ) { |
147 | Child => loop { |
148 | sleep(Duration::from_millis(1000)); |
149 | }, |
150 | Parent { child } => { |
151 | ptrace::seize(child, ptrace::Options::PTRACE_O_TRACESYSGOOD) |
152 | .unwrap(); |
153 | ptrace::interrupt(child).unwrap(); |
154 | assert_eq!( |
155 | waitpid(child, None), |
156 | Ok(WaitStatus::PtraceEvent(child, Signal::SIGTRAP, 128)) |
157 | ); |
158 | ptrace::syscall(child, None).unwrap(); |
159 | assert_eq!( |
160 | waitpid(child, None), |
161 | Ok(WaitStatus::PtraceSyscall(child)) |
162 | ); |
163 | ptrace::detach(child, Some(Signal::SIGKILL)).unwrap(); |
164 | match waitpid(child, None) { |
165 | Ok(WaitStatus::Signaled(pid, Signal::SIGKILL, _)) |
166 | if pid == child => |
167 | { |
168 | let _ = waitpid(child, Some(WaitPidFlag::WNOHANG)); |
169 | while ptrace::cont(child, Some(Signal::SIGKILL)).is_ok() { |
170 | let _ = waitpid(child, Some(WaitPidFlag::WNOHANG)); |
171 | } |
172 | } |
173 | _ => panic!("The process should have been killed" ), |
174 | } |
175 | } |
176 | } |
177 | } |
178 | |
179 | // ptrace::{setoptions, getregs} are only available in these platforms |
180 | #[cfg (all( |
181 | target_os = "linux" , |
182 | any(target_arch = "x86_64" , target_arch = "x86" ), |
183 | target_env = "gnu" |
184 | ))] |
185 | #[test] |
186 | fn test_ptrace_syscall() { |
187 | use nix::sys::ptrace; |
188 | use nix::sys::signal::kill; |
189 | use nix::sys::signal::Signal; |
190 | use nix::sys::wait::{waitpid, WaitStatus}; |
191 | use nix::unistd::fork; |
192 | use nix::unistd::getpid; |
193 | use nix::unistd::ForkResult::*; |
194 | |
195 | require_capability!("test_ptrace_syscall" , CAP_SYS_PTRACE); |
196 | |
197 | let _m = crate::FORK_MTX.lock(); |
198 | |
199 | match unsafe { fork() }.expect("Error: Fork Failed" ) { |
200 | Child => { |
201 | ptrace::traceme().unwrap(); |
202 | // first sigstop until parent is ready to continue |
203 | let pid = getpid(); |
204 | kill(pid, Signal::SIGSTOP).unwrap(); |
205 | kill(pid, Signal::SIGTERM).unwrap(); |
206 | unsafe { |
207 | ::libc::_exit(0); |
208 | } |
209 | } |
210 | |
211 | Parent { child } => { |
212 | assert_eq!( |
213 | waitpid(child, None), |
214 | Ok(WaitStatus::Stopped(child, Signal::SIGSTOP)) |
215 | ); |
216 | |
217 | // set this option to recognize syscall-stops |
218 | ptrace::setoptions(child, ptrace::Options::PTRACE_O_TRACESYSGOOD) |
219 | .unwrap(); |
220 | |
221 | #[cfg (target_arch = "x86_64" )] |
222 | let get_syscall_id = |
223 | || ptrace::getregs(child).unwrap().orig_rax as libc::c_long; |
224 | |
225 | #[cfg (target_arch = "x86" )] |
226 | let get_syscall_id = |
227 | || ptrace::getregs(child).unwrap().orig_eax as libc::c_long; |
228 | |
229 | // this duplicates `get_syscall_id` for the purpose of testing `ptrace::read_user`. |
230 | #[cfg (target_arch = "x86_64" )] |
231 | let rax_offset = offset_of!(libc::user_regs_struct, orig_rax); |
232 | #[cfg (target_arch = "x86" )] |
233 | let rax_offset = offset_of!(libc::user_regs_struct, orig_eax); |
234 | |
235 | let get_syscall_from_user_area = || { |
236 | // Find the offset of `user.regs.rax` (or `user.regs.eax` for x86) |
237 | let rax_offset = offset_of!(libc::user, regs) + rax_offset; |
238 | ptrace::read_user(child, rax_offset as _).unwrap() |
239 | as libc::c_long |
240 | }; |
241 | |
242 | // kill entry |
243 | ptrace::syscall(child, None).unwrap(); |
244 | assert_eq!( |
245 | waitpid(child, None), |
246 | Ok(WaitStatus::PtraceSyscall(child)) |
247 | ); |
248 | assert_eq!(get_syscall_id(), ::libc::SYS_kill); |
249 | assert_eq!(get_syscall_from_user_area(), ::libc::SYS_kill); |
250 | |
251 | // kill exit |
252 | ptrace::syscall(child, None).unwrap(); |
253 | assert_eq!( |
254 | waitpid(child, None), |
255 | Ok(WaitStatus::PtraceSyscall(child)) |
256 | ); |
257 | assert_eq!(get_syscall_id(), ::libc::SYS_kill); |
258 | assert_eq!(get_syscall_from_user_area(), ::libc::SYS_kill); |
259 | |
260 | // receive signal |
261 | ptrace::syscall(child, None).unwrap(); |
262 | assert_eq!( |
263 | waitpid(child, None), |
264 | Ok(WaitStatus::Stopped(child, Signal::SIGTERM)) |
265 | ); |
266 | |
267 | // inject signal |
268 | ptrace::syscall(child, Signal::SIGTERM).unwrap(); |
269 | assert_eq!( |
270 | waitpid(child, None), |
271 | Ok(WaitStatus::Signaled(child, Signal::SIGTERM, false)) |
272 | ); |
273 | } |
274 | } |
275 | } |
276 | |