Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (c) 2011, Comtrol Corp. |
| 3 | * All rights reserved. |
| 4 | * |
| 5 | * Redistribution and use in source and binary forms, with or without |
| 6 | * modification, are permitted provided that the following conditions |
| 7 | * are met: |
| 8 | * 1. Redistributions of source code must retain the above copyright |
| 9 | * notice, this list of conditions and the following disclaimer. |
| 10 | * 2. Redistributions in binary form must reproduce the above copyright |
| 11 | * notice, this list of conditions and the following disclaimer in the |
| 12 | * documentation and/or other materials provided with the distribution. |
| 13 | * 3. The name of the author may not be used to endorse or promote products |
| 14 | * derived from this software without specific prior written permission. |
| 15 | * |
| 16 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
| 17 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
| 18 | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
| 19 | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
| 20 | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
| 21 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| 22 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| 23 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| 24 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
| 25 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| 26 | * |
| 27 | */ |
| 28 | |
| 29 | #include "defs.h" |
Dmitry V. Levin | b038a43 | 2011-08-30 16:05:26 +0000 | [diff] [blame] | 30 | #include <sys/param.h> |
Dmitry V. Levin | 80d5e01 | 2015-07-30 16:23:58 +0000 | [diff] [blame] | 31 | #include <poll.h> |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 32 | |
| 33 | #include "syscall.h" |
| 34 | |
Denys Vlasenko | 38cfe7c | 2013-03-05 16:01:53 +0100 | [diff] [blame] | 35 | const char **paths_selected = NULL; |
Denys Vlasenko | 7239dbc | 2013-03-05 15:46:34 +0100 | [diff] [blame] | 36 | static unsigned num_selected = 0; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 37 | |
| 38 | /* |
| 39 | * Return true if specified path matches one that we're tracing. |
| 40 | */ |
| 41 | static int |
| 42 | pathmatch(const char *path) |
| 43 | { |
Denys Vlasenko | 7239dbc | 2013-03-05 15:46:34 +0100 | [diff] [blame] | 44 | unsigned i; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 45 | |
Denys Vlasenko | 7239dbc | 2013-03-05 15:46:34 +0100 | [diff] [blame] | 46 | for (i = 0; i < num_selected; ++i) { |
Denys Vlasenko | 38cfe7c | 2013-03-05 16:01:53 +0100 | [diff] [blame] | 47 | if (strcmp(path, paths_selected[i]) == 0) |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 48 | return 1; |
| 49 | } |
| 50 | return 0; |
| 51 | } |
| 52 | |
| 53 | /* |
| 54 | * Return true if specified path (in user-space) matches. |
| 55 | */ |
| 56 | static int |
| 57 | upathmatch(struct tcb *tcp, unsigned long upath) |
| 58 | { |
Denys Vlasenko | 7b609d5 | 2011-06-22 14:32:43 +0200 | [diff] [blame] | 59 | char path[PATH_MAX + 1]; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 60 | |
Dmitry V. Levin | 1a880cf | 2013-02-26 19:23:27 +0000 | [diff] [blame] | 61 | return umovestr(tcp, upath, sizeof path, path) > 0 && |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 62 | pathmatch(path); |
| 63 | } |
| 64 | |
| 65 | /* |
| 66 | * Return true if specified fd maps to a path we're tracing. |
| 67 | */ |
| 68 | static int |
| 69 | fdmatch(struct tcb *tcp, int fd) |
| 70 | { |
Denys Vlasenko | 61ad0a4 | 2013-03-06 18:24:34 +0100 | [diff] [blame] | 71 | char path[PATH_MAX + 1]; |
| 72 | int n = getfdpath(tcp, fd, path, sizeof(path)); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 73 | |
Denys Vlasenko | 61ad0a4 | 2013-03-06 18:24:34 +0100 | [diff] [blame] | 74 | return n >= 0 && pathmatch(path); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 75 | } |
| 76 | |
| 77 | /* |
| 78 | * Add a path to the set we're tracing. |
Philippe Ombredanne | 894c7e3 | 2014-02-01 09:57:45 -0800 | [diff] [blame] | 79 | * Specifying NULL will delete all paths. |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 80 | */ |
Denys Vlasenko | 7239dbc | 2013-03-05 15:46:34 +0100 | [diff] [blame] | 81 | static void |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 82 | storepath(const char *path) |
| 83 | { |
Denys Vlasenko | 7239dbc | 2013-03-05 15:46:34 +0100 | [diff] [blame] | 84 | unsigned i; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 85 | |
Denys Vlasenko | 7239dbc | 2013-03-05 15:46:34 +0100 | [diff] [blame] | 86 | if (pathmatch(path)) |
| 87 | return; /* already in table */ |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 88 | |
Denys Vlasenko | 7239dbc | 2013-03-05 15:46:34 +0100 | [diff] [blame] | 89 | i = num_selected++; |
Dmitry V. Levin | 3e9d71f | 2015-05-25 20:41:02 +0000 | [diff] [blame] | 90 | paths_selected = xreallocarray(paths_selected, num_selected, |
| 91 | sizeof(paths_selected[0])); |
Denys Vlasenko | 38cfe7c | 2013-03-05 16:01:53 +0100 | [diff] [blame] | 92 | paths_selected[i] = path; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 93 | } |
| 94 | |
| 95 | /* |
| 96 | * Get path associated with fd. |
| 97 | */ |
Denys Vlasenko | 61ad0a4 | 2013-03-06 18:24:34 +0100 | [diff] [blame] | 98 | int |
| 99 | getfdpath(struct tcb *tcp, int fd, char *buf, unsigned bufsize) |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 100 | { |
Denys Vlasenko | 384b0ad | 2012-03-15 18:11:51 +0100 | [diff] [blame] | 101 | char linkpath[sizeof("/proc/%u/fd/%u") + 2 * sizeof(int)*3]; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 102 | ssize_t n; |
| 103 | |
| 104 | if (fd < 0) |
Denys Vlasenko | 61ad0a4 | 2013-03-06 18:24:34 +0100 | [diff] [blame] | 105 | return -1; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 106 | |
Denys Vlasenko | 29865e7 | 2012-03-15 18:03:56 +0100 | [diff] [blame] | 107 | sprintf(linkpath, "/proc/%u/fd/%u", tcp->pid, fd); |
Denys Vlasenko | 61ad0a4 | 2013-03-06 18:24:34 +0100 | [diff] [blame] | 108 | n = readlink(linkpath, buf, bufsize - 1); |
| 109 | /* |
| 110 | * NB: if buf is too small, readlink doesn't fail, |
| 111 | * it returns truncated result (IOW: n == bufsize - 1). |
| 112 | */ |
| 113 | if (n >= 0) |
| 114 | buf[n] = '\0'; |
| 115 | return n; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 116 | } |
| 117 | |
| 118 | /* |
| 119 | * Add a path to the set we're tracing. Also add the canonicalized |
| 120 | * version of the path. Secifying NULL will delete all paths. |
| 121 | */ |
Denys Vlasenko | 7239dbc | 2013-03-05 15:46:34 +0100 | [diff] [blame] | 122 | void |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 123 | pathtrace_select(const char *path) |
| 124 | { |
Denys Vlasenko | 29865e7 | 2012-03-15 18:03:56 +0100 | [diff] [blame] | 125 | char *rpath; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 126 | |
Denys Vlasenko | 7239dbc | 2013-03-05 15:46:34 +0100 | [diff] [blame] | 127 | storepath(path); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 128 | |
| 129 | rpath = realpath(path, NULL); |
| 130 | |
| 131 | if (rpath == NULL) |
Denys Vlasenko | 7239dbc | 2013-03-05 15:46:34 +0100 | [diff] [blame] | 132 | return; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 133 | |
| 134 | /* if realpath and specified path are same, we're done */ |
Denys Vlasenko | 29865e7 | 2012-03-15 18:03:56 +0100 | [diff] [blame] | 135 | if (strcmp(path, rpath) == 0) { |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 136 | free(rpath); |
Denys Vlasenko | 7239dbc | 2013-03-05 15:46:34 +0100 | [diff] [blame] | 137 | return; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 138 | } |
| 139 | |
Dmitry V. Levin | 6c8ef05 | 2015-05-25 22:51:19 +0000 | [diff] [blame] | 140 | error_msg("Requested path '%s' resolved into '%s'", path, rpath); |
Denys Vlasenko | 7239dbc | 2013-03-05 15:46:34 +0100 | [diff] [blame] | 141 | storepath(rpath); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 142 | } |
| 143 | |
| 144 | /* |
| 145 | * Return true if syscall accesses a selected path |
| 146 | * (or if no paths have been specified for tracing). |
| 147 | */ |
| 148 | int |
| 149 | pathtrace_match(struct tcb *tcp) |
| 150 | { |
Denys Vlasenko | a9fe13c | 2013-02-22 13:26:10 +0100 | [diff] [blame] | 151 | const struct_sysent *s; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 152 | |
Denys Vlasenko | 74ec14f | 2013-02-21 16:13:47 +0100 | [diff] [blame] | 153 | s = tcp->s_ent; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 154 | |
Philippe Ombredanne | 894c7e3 | 2014-02-01 09:57:45 -0800 | [diff] [blame] | 155 | if (!(s->sys_flags & (TRACE_FILE | TRACE_DESC | TRACE_NETWORK))) |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 156 | return 0; |
| 157 | |
| 158 | /* |
| 159 | * Check for special cases where we need to do something |
| 160 | * other than test arg[0]. |
| 161 | */ |
| 162 | |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 163 | switch (s->sen) { |
| 164 | case SEN_dup2: |
| 165 | case SEN_dup3: |
Dmitry V. Levin | ea19705 | 2015-11-22 18:51:05 +0000 | [diff] [blame] | 166 | case SEN_kexec_file_load: |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 167 | case SEN_sendfile: |
| 168 | case SEN_sendfile64: |
| 169 | case SEN_tee: |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 170 | /* fd, fd */ |
| 171 | return fdmatch(tcp, tcp->u_arg[0]) || |
| 172 | fdmatch(tcp, tcp->u_arg[1]); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 173 | |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 174 | case SEN_faccessat: |
| 175 | case SEN_fchmodat: |
| 176 | case SEN_fchownat: |
| 177 | case SEN_futimesat: |
| 178 | case SEN_inotify_add_watch: |
| 179 | case SEN_mkdirat: |
| 180 | case SEN_mknodat: |
Dmitry V. Levin | 4b3a170 | 2015-11-22 21:29:32 +0000 | [diff] [blame] | 181 | case SEN_name_to_handle_at: |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 182 | case SEN_newfstatat: |
| 183 | case SEN_openat: |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 184 | case SEN_readlinkat: |
| 185 | case SEN_unlinkat: |
| 186 | case SEN_utimensat: |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 187 | /* fd, path */ |
| 188 | return fdmatch(tcp, tcp->u_arg[0]) || |
| 189 | upathmatch(tcp, tcp->u_arg[1]); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 190 | |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 191 | case SEN_link: |
| 192 | case SEN_mount: |
| 193 | case SEN_pivotroot: |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 194 | /* path, path */ |
| 195 | return upathmatch(tcp, tcp->u_arg[0]) || |
| 196 | upathmatch(tcp, tcp->u_arg[1]); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 197 | |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 198 | case SEN_quotactl: |
Dmitry V. Levin | 7943966 | 2012-10-26 23:43:13 +0000 | [diff] [blame] | 199 | /* x, path */ |
| 200 | return upathmatch(tcp, tcp->u_arg[1]); |
Dmitry V. Levin | 7943966 | 2012-10-26 23:43:13 +0000 | [diff] [blame] | 201 | |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 202 | case SEN_linkat: |
| 203 | case SEN_renameat2: |
| 204 | case SEN_renameat: |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 205 | /* fd, path, fd, path */ |
| 206 | return fdmatch(tcp, tcp->u_arg[0]) || |
| 207 | fdmatch(tcp, tcp->u_arg[2]) || |
| 208 | upathmatch(tcp, tcp->u_arg[1]) || |
| 209 | upathmatch(tcp, tcp->u_arg[3]); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 210 | |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 211 | case SEN_old_mmap: |
Denys Vlasenko | 1ba8543 | 2013-02-19 11:28:20 +0100 | [diff] [blame] | 212 | #if defined(S390) |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 213 | case SEN_old_mmap_pgoff: |
Denys Vlasenko | 1ba8543 | 2013-02-19 11:28:20 +0100 | [diff] [blame] | 214 | #endif |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 215 | case SEN_mmap: |
| 216 | case SEN_mmap_4koff: |
| 217 | case SEN_mmap_pgoff: |
Dmitry V. Levin | dd1a80c | 2015-12-24 15:40:55 +0000 | [diff] [blame] | 218 | case SEN_ARCH_mmap: |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 219 | /* x, x, x, x, fd */ |
| 220 | return fdmatch(tcp, tcp->u_arg[4]); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 221 | |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 222 | case SEN_symlinkat: |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 223 | /* path, fd, path */ |
| 224 | return fdmatch(tcp, tcp->u_arg[1]) || |
| 225 | upathmatch(tcp, tcp->u_arg[0]) || |
Denys Vlasenko | b63256e | 2011-06-07 12:13:24 +0200 | [diff] [blame] | 226 | upathmatch(tcp, tcp->u_arg[2]); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 227 | |
Dmitry V. Levin | c1f99f5 | 2016-02-13 03:45:32 +0000 | [diff] [blame] | 228 | case SEN_copy_file_range: |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 229 | case SEN_splice: |
Dmitry V. Levin | c1f99f5 | 2016-02-13 03:45:32 +0000 | [diff] [blame] | 230 | /* fd, x, fd, x, x, x */ |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 231 | return fdmatch(tcp, tcp->u_arg[0]) || |
| 232 | fdmatch(tcp, tcp->u_arg[2]); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 233 | |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 234 | case SEN_epoll_ctl: |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 235 | /* x, x, fd, x */ |
| 236 | return fdmatch(tcp, tcp->u_arg[2]); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 237 | |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 238 | |
| 239 | case SEN_fanotify_mark: |
Dmitry V. Levin | 99db95d | 2014-02-05 04:13:18 +0000 | [diff] [blame] | 240 | /* x, x, x, fd, path */ |
| 241 | return fdmatch(tcp, tcp->u_arg[3]) || |
| 242 | upathmatch(tcp, tcp->u_arg[4]); |
Dmitry V. Levin | 99db95d | 2014-02-05 04:13:18 +0000 | [diff] [blame] | 243 | |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 244 | case SEN_oldselect: |
| 245 | case SEN_pselect6: |
| 246 | case SEN_select: |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 247 | { |
Denys Vlasenko | 79a79ea | 2011-09-01 16:35:44 +0200 | [diff] [blame] | 248 | int i, j; |
Denys Vlasenko | 64778cb | 2013-11-09 20:46:55 +0100 | [diff] [blame] | 249 | int nfds; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 250 | long *args, oldargs[5]; |
| 251 | unsigned fdsize; |
| 252 | fd_set *fds; |
| 253 | |
Denys Vlasenko | 64778cb | 2013-11-09 20:46:55 +0100 | [diff] [blame] | 254 | args = tcp->u_arg; |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 255 | if (SEN_oldselect == s->sen) { |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 256 | if (umoven(tcp, tcp->u_arg[0], sizeof oldargs, |
Denys Vlasenko | 7e69ed9 | 2015-03-21 19:50:53 +0100 | [diff] [blame] | 257 | oldargs) < 0) |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 258 | { |
Dmitry V. Levin | 6c8ef05 | 2015-05-25 22:51:19 +0000 | [diff] [blame] | 259 | error_msg("umoven() failed"); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 260 | return 0; |
| 261 | } |
| 262 | args = oldargs; |
Denys Vlasenko | 64778cb | 2013-11-09 20:46:55 +0100 | [diff] [blame] | 263 | } |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 264 | |
Denys Vlasenko | 64778cb | 2013-11-09 20:46:55 +0100 | [diff] [blame] | 265 | /* Kernel truncates arg[0] to int, we do the same. */ |
| 266 | nfds = (int) args[0]; |
| 267 | /* Kernel rejects negative nfds, so we don't parse it either. */ |
| 268 | if (nfds <= 0) |
| 269 | return 0; |
Denys Vlasenko | 79a79ea | 2011-09-01 16:35:44 +0200 | [diff] [blame] | 270 | /* Beware of select(2^31-1, NULL, NULL, NULL) and similar... */ |
Denys Vlasenko | 64778cb | 2013-11-09 20:46:55 +0100 | [diff] [blame] | 271 | if (nfds > 1024*1024) |
Denys Vlasenko | 79a79ea | 2011-09-01 16:35:44 +0200 | [diff] [blame] | 272 | nfds = 1024*1024; |
Denys Vlasenko | 64778cb | 2013-11-09 20:46:55 +0100 | [diff] [blame] | 273 | fdsize = (((nfds + 7) / 8) + current_wordsize-1) & -current_wordsize; |
Dmitry V. Levin | 3e9d71f | 2015-05-25 20:41:02 +0000 | [diff] [blame] | 274 | fds = xmalloc(fdsize); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 275 | |
Denys Vlasenko | 7b609d5 | 2011-06-22 14:32:43 +0200 | [diff] [blame] | 276 | for (i = 1; i <= 3; ++i) { |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 277 | if (args[i] == 0) |
| 278 | continue; |
Denys Vlasenko | 7e69ed9 | 2015-03-21 19:50:53 +0100 | [diff] [blame] | 279 | if (umoven(tcp, args[i], fdsize, fds) < 0) { |
Dmitry V. Levin | 6c8ef05 | 2015-05-25 22:51:19 +0000 | [diff] [blame] | 280 | error_msg("umoven() failed"); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 281 | continue; |
| 282 | } |
Denys Vlasenko | 64778cb | 2013-11-09 20:46:55 +0100 | [diff] [blame] | 283 | for (j = 0;; j++) { |
| 284 | j = next_set_bit(fds, j, nfds); |
| 285 | if (j < 0) |
| 286 | break; |
| 287 | if (fdmatch(tcp, j)) { |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 288 | free(fds); |
| 289 | return 1; |
| 290 | } |
Denys Vlasenko | 64778cb | 2013-11-09 20:46:55 +0100 | [diff] [blame] | 291 | } |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 292 | } |
| 293 | free(fds); |
| 294 | return 0; |
| 295 | } |
| 296 | |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 297 | case SEN_poll: |
| 298 | case SEN_ppoll: |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 299 | { |
| 300 | struct pollfd fds; |
| 301 | unsigned nfds; |
| 302 | unsigned long start, cur, end; |
| 303 | |
| 304 | start = tcp->u_arg[0]; |
| 305 | nfds = tcp->u_arg[1]; |
| 306 | |
| 307 | end = start + sizeof(fds) * nfds; |
| 308 | |
| 309 | if (nfds == 0 || end < start) |
| 310 | return 0; |
| 311 | |
| 312 | for (cur = start; cur < end; cur += sizeof(fds)) |
Denys Vlasenko | 7e69ed9 | 2015-03-21 19:50:53 +0100 | [diff] [blame] | 313 | if ((umoven(tcp, cur, sizeof fds, &fds) == 0) |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 314 | && fdmatch(tcp, fds.fd)) |
| 315 | return 1; |
| 316 | |
| 317 | return 0; |
| 318 | } |
| 319 | |
Dmitry V. Levin | ddb53dd | 2015-07-25 23:55:51 +0000 | [diff] [blame] | 320 | case SEN_bpf: |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 321 | case SEN_epoll_create: |
Dmitry V. Levin | 2716346 | 2015-08-01 23:07:19 +0000 | [diff] [blame] | 322 | case SEN_epoll_create1: |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 323 | case SEN_eventfd2: |
| 324 | case SEN_eventfd: |
| 325 | case SEN_fanotify_init: |
| 326 | case SEN_inotify_init1: |
Dmitry V. Levin | 95b84ea | 2015-07-28 23:03:41 +0000 | [diff] [blame] | 327 | case SEN_memfd_create: |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 328 | case SEN_perf_event_open: |
| 329 | case SEN_pipe: |
Dmitry V. Levin | f9f04f7 | 2016-02-12 16:15:23 +0000 | [diff] [blame] | 330 | case SEN_pipe2: |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 331 | case SEN_printargs: |
| 332 | case SEN_socket: |
| 333 | case SEN_socketpair: |
| 334 | case SEN_timerfd_create: |
| 335 | case SEN_timerfd_gettime: |
| 336 | case SEN_timerfd_settime: |
Dmitry V. Levin | 87d64ed | 2015-11-22 19:56:00 +0000 | [diff] [blame] | 337 | case SEN_userfaultfd: |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 338 | /* |
Philippe Ombredanne | 894c7e3 | 2014-02-01 09:57:45 -0800 | [diff] [blame] | 339 | * These have TRACE_FILE or TRACE_DESCRIPTOR or TRACE_NETWORK set, |
| 340 | * but they don't have any file descriptor or path args to test. |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 341 | */ |
| 342 | return 0; |
| 343 | } |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 344 | |
| 345 | /* |
| 346 | * Our fallback position for calls that haven't already |
| 347 | * been handled is to just check arg[0]. |
| 348 | */ |
| 349 | |
| 350 | if (s->sys_flags & TRACE_FILE) |
| 351 | return upathmatch(tcp, tcp->u_arg[0]); |
| 352 | |
Philippe Ombredanne | 894c7e3 | 2014-02-01 09:57:45 -0800 | [diff] [blame] | 353 | if (s->sys_flags & (TRACE_DESC | TRACE_NETWORK)) |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 354 | return fdmatch(tcp, tcp->u_arg[0]); |
| 355 | |
| 356 | return 0; |
| 357 | } |