Hi, On Sat, Dec 24, 2016 at 01:29:24PM +0100, Seraphime Kirkovski wrote: > Hello straces devs ! > > Recently, I had to do some reverse engineering on a malware for > a somewhat exotic platform. As the malware had its .text encrypted my > only possibility was strace. As always, it helped me to > understand the binary, but after I knew what it did, I couldn't do much > more because I couldn't see the decrypted code section. What I would > have liked to do is send a coredump-ing signal when I think the code is > completely decrypted, i.e. before a call to munmap, after an open call > or something like this, or simply stop the process in order to attach > gdb. (This isn't always possible: often, malware writers fork() before > the main routine, which makes it more difficult to attach a debugger, as > the pid changes, furthermore, if the text section is not decrypted the > debugger would mess up checksums/keys/whatever.) > > So I thought of extending strace like this: > > strace -e sigonsys=<before|after>:<SYSCALL>:<SIG> ./a.out > > sigonsys: specifies the signal SIG to be sent before or after a syscall > SYSCALL is done. > > Example: > > strace -f -e sigonsys=after:open:SIGSEGV ./a.out > > This sends a SIGSEGV after a call to open(2). > > I've already taken a shot at it. And I've identified some limitations > that > 1) probably cannot be overcome from userpace > 2) are due to the racy nature of what I'm trying to do > 3) show some flaws in the kernel > > First, the before parameter doesn't change anything in practice. In most > cases the offending syscall will be executed, checking at the very end > of the kernel procedure whether there are any pending signals. This > yields some strange results. For instance, > > int main(void) > { > puts("hello"); > } > > run with strace -e sigonsys=before:write:SIGSEGV, gives the following > result: > > ... > write(1, "hello\n", 6) hello > > = -ERESTARTSYS > > That it is, the syscall succeeds, it writes "hello" to stdout and before > returning to userspace it checks for pending signals, there is one, so > it returns ERESTARTSYS, which is apparently stupid. > > Another problem I found is related to the fact that signals are not > delivered immediately. Consider the following program > > int main(void) > { > puts("aaaa"); > puts("bbbb"); > } > > Strace outputs: > > .. > write(1, "aaaa\n", 5) aaaa = -ERESTARTSYS > bbbb > --- SIGNAL SIGSEGV --- >
> Or even worse, > > int main(void) > { > puts("aaaa"); > _exit(0); > puts("bbbb"); > } > > when run with > > strace -e sigonsys=before:write:SIGSEGV ./a.out > > yields as expected: > > write(1, "aaaa\n", 5) aaaa = -RESTARTSYS > --- SIGNAL SIGSEGV --- > > But when piped like so > > strace -e sigonsys=before:write:SIGSEGV ./a.out | less > > gives: > group_exit(0) = ??? (no write at all) > > ( I ran those examples on x86_64 and 4.7.0-1 kernel ) That's because of the test program itself, ./a.out | cat won't produce any output either. > That being said, I think this option may help kernel developers as well. > > What are your thoughts on extending strace like this ? Is it worth it ? > Do you have any ideas how I may overcome some of these difficulties ? I'd rather extended new -efault= syntax with :signal= option. > Currently, I modified the sources so the signal is send through > ptrace(<GET|SET>SIGINFO... and ptrace_restart afterwards. I tried adding There is no need to do additional PTRACE_SETSIGINFO calls, one can pass the signal along with PTRACE_SYSCALL call in restart_tracee. -- ldv
pgpgkFNJuBLvZ.pgp
Description: PGP signature
------------------------------------------------------------------------------ Developer Access Program for Intel Xeon Phi Processors Access to Intel Xeon Phi processor-based developer platforms. With one year of Intel Parallel Studio XE. Training and support from Colfax. Order your platform today.http://sdm.link/intel
_______________________________________________ Strace-devel mailing list Strace-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/strace-devel