reverie/tests/suppression.rs
Jason White deac8c4140 Add test to check that syscalls are suppressed successfully
Summary: This checks that intercepted syscalls are actually skipped (by setting the syscall to -1). This was found to not be working on aarch64 and is fixed in the next diff.

Reviewed By: VladimirMakaev

Differential Revision: D40867424

fbshipit-source-id: 7ac514c060a2611aac8cc4a8bb7540aa3d7302fb
2022-11-01 10:11:35 -07:00

60 lines
1.5 KiB
Rust

/*
* Copyright (c) Meta Platforms, Inc. and affiliates.
* All rights reserved.
*
* This source code is licensed under the BSD-style license found in the
* LICENSE file in the root directory of this source tree.
*/
//! Tests that syscall suppression works. That is, when we intercept a syscall,
//! we should not run the real syscall.
use reverie::syscalls::Syscall;
use reverie::Error;
use reverie::Guest;
use reverie::Tool;
use serde::Deserialize;
use serde::Serialize;
#[derive(Debug, Serialize, Deserialize, Default, Clone)]
struct TestTool;
#[reverie::tool]
impl Tool for TestTool {
async fn handle_syscall_event<T: Guest<Self>>(
&self,
guest: &mut T,
syscall: Syscall,
) -> Result<i64, Error> {
match syscall {
Syscall::Tgkill(_) => {
// Suppress this syscall. This thread shall not be killed.
Ok(0)
}
_ => guest.tail_inject(syscall).await,
}
}
}
#[cfg(all(not(sanitized), test))]
mod tests {
use reverie_ptrace::testing::check_fn;
use syscalls::syscall;
use syscalls::Sysno;
use super::*;
#[test]
fn suppress_tgkill() {
check_fn::<TestTool, _>(|| {
let pid = unsafe { syscall!(Sysno::getpid) }.unwrap();
let tid = unsafe { syscall!(Sysno::gettid) }.unwrap();
// This shouldn't work.
for _ in 0..100 {
let ret = unsafe { syscall!(Sysno::tgkill, pid, tid, libc::SIGTERM) };
assert_eq!(ret, Ok(0));
}
});
}
}