Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (c) 2011, Comtrol Corp. |
| 3 | * All rights reserved. |
| 4 | * |
| 5 | * Redistribution and use in source and binary forms, with or without |
| 6 | * modification, are permitted provided that the following conditions |
| 7 | * are met: |
| 8 | * 1. Redistributions of source code must retain the above copyright |
| 9 | * notice, this list of conditions and the following disclaimer. |
| 10 | * 2. Redistributions in binary form must reproduce the above copyright |
| 11 | * notice, this list of conditions and the following disclaimer in the |
| 12 | * documentation and/or other materials provided with the distribution. |
| 13 | * 3. The name of the author may not be used to endorse or promote products |
| 14 | * derived from this software without specific prior written permission. |
| 15 | * |
| 16 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
| 17 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
| 18 | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
| 19 | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
| 20 | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
| 21 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| 22 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| 23 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| 24 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
| 25 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| 26 | * |
| 27 | */ |
| 28 | |
| 29 | #include "defs.h" |
Dmitry V. Levin | b038a43 | 2011-08-30 16:05:26 +0000 | [diff] [blame] | 30 | #include <sys/param.h> |
Dmitry V. Levin | d64a7e4 | 2013-11-06 01:17:05 +0000 | [diff] [blame] | 31 | #if defined HAVE_POLL_H |
Denys Vlasenko | a6d91de | 2012-03-16 12:02:22 +0100 | [diff] [blame] | 32 | # include <poll.h> |
Dmitry V. Levin | d64a7e4 | 2013-11-06 01:17:05 +0000 | [diff] [blame] | 33 | #elif defined HAVE_SYS_POLL_H |
Denys Vlasenko | a6d91de | 2012-03-16 12:02:22 +0100 | [diff] [blame] | 34 | # include <sys/poll.h> |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 35 | #endif |
| 36 | |
| 37 | #include "syscall.h" |
| 38 | |
Denys Vlasenko | 38cfe7c | 2013-03-05 16:01:53 +0100 | [diff] [blame] | 39 | const char **paths_selected = NULL; |
Denys Vlasenko | 7239dbc | 2013-03-05 15:46:34 +0100 | [diff] [blame] | 40 | static unsigned num_selected = 0; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 41 | |
| 42 | /* |
| 43 | * Return true if specified path matches one that we're tracing. |
| 44 | */ |
| 45 | static int |
| 46 | pathmatch(const char *path) |
| 47 | { |
Denys Vlasenko | 7239dbc | 2013-03-05 15:46:34 +0100 | [diff] [blame] | 48 | unsigned i; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 49 | |
Denys Vlasenko | 7239dbc | 2013-03-05 15:46:34 +0100 | [diff] [blame] | 50 | for (i = 0; i < num_selected; ++i) { |
Denys Vlasenko | 38cfe7c | 2013-03-05 16:01:53 +0100 | [diff] [blame] | 51 | if (strcmp(path, paths_selected[i]) == 0) |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 52 | return 1; |
| 53 | } |
| 54 | return 0; |
| 55 | } |
| 56 | |
| 57 | /* |
| 58 | * Return true if specified path (in user-space) matches. |
| 59 | */ |
| 60 | static int |
| 61 | upathmatch(struct tcb *tcp, unsigned long upath) |
| 62 | { |
Denys Vlasenko | 7b609d5 | 2011-06-22 14:32:43 +0200 | [diff] [blame] | 63 | char path[PATH_MAX + 1]; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 64 | |
Dmitry V. Levin | 1a880cf | 2013-02-26 19:23:27 +0000 | [diff] [blame] | 65 | return umovestr(tcp, upath, sizeof path, path) > 0 && |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 66 | pathmatch(path); |
| 67 | } |
| 68 | |
| 69 | /* |
| 70 | * Return true if specified fd maps to a path we're tracing. |
| 71 | */ |
| 72 | static int |
| 73 | fdmatch(struct tcb *tcp, int fd) |
| 74 | { |
Denys Vlasenko | 61ad0a4 | 2013-03-06 18:24:34 +0100 | [diff] [blame] | 75 | char path[PATH_MAX + 1]; |
| 76 | int n = getfdpath(tcp, fd, path, sizeof(path)); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 77 | |
Denys Vlasenko | 61ad0a4 | 2013-03-06 18:24:34 +0100 | [diff] [blame] | 78 | return n >= 0 && pathmatch(path); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 79 | } |
| 80 | |
| 81 | /* |
| 82 | * Add a path to the set we're tracing. |
Philippe Ombredanne | 894c7e3 | 2014-02-01 09:57:45 -0800 | [diff] [blame] | 83 | * Specifying NULL will delete all paths. |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 84 | */ |
Denys Vlasenko | 7239dbc | 2013-03-05 15:46:34 +0100 | [diff] [blame] | 85 | static void |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 86 | storepath(const char *path) |
| 87 | { |
Denys Vlasenko | 7239dbc | 2013-03-05 15:46:34 +0100 | [diff] [blame] | 88 | unsigned i; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 89 | |
Denys Vlasenko | 7239dbc | 2013-03-05 15:46:34 +0100 | [diff] [blame] | 90 | if (pathmatch(path)) |
| 91 | return; /* already in table */ |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 92 | |
Denys Vlasenko | 7239dbc | 2013-03-05 15:46:34 +0100 | [diff] [blame] | 93 | i = num_selected++; |
Dmitry V. Levin | 3e9d71f | 2015-05-25 20:41:02 +0000 | [diff] [blame] | 94 | paths_selected = xreallocarray(paths_selected, num_selected, |
| 95 | sizeof(paths_selected[0])); |
Denys Vlasenko | 38cfe7c | 2013-03-05 16:01:53 +0100 | [diff] [blame] | 96 | paths_selected[i] = path; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 97 | } |
| 98 | |
| 99 | /* |
| 100 | * Get path associated with fd. |
| 101 | */ |
Denys Vlasenko | 61ad0a4 | 2013-03-06 18:24:34 +0100 | [diff] [blame] | 102 | int |
| 103 | getfdpath(struct tcb *tcp, int fd, char *buf, unsigned bufsize) |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 104 | { |
Denys Vlasenko | 384b0ad | 2012-03-15 18:11:51 +0100 | [diff] [blame] | 105 | char linkpath[sizeof("/proc/%u/fd/%u") + 2 * sizeof(int)*3]; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 106 | ssize_t n; |
| 107 | |
| 108 | if (fd < 0) |
Denys Vlasenko | 61ad0a4 | 2013-03-06 18:24:34 +0100 | [diff] [blame] | 109 | return -1; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 110 | |
Denys Vlasenko | 29865e7 | 2012-03-15 18:03:56 +0100 | [diff] [blame] | 111 | sprintf(linkpath, "/proc/%u/fd/%u", tcp->pid, fd); |
Denys Vlasenko | 61ad0a4 | 2013-03-06 18:24:34 +0100 | [diff] [blame] | 112 | n = readlink(linkpath, buf, bufsize - 1); |
| 113 | /* |
| 114 | * NB: if buf is too small, readlink doesn't fail, |
| 115 | * it returns truncated result (IOW: n == bufsize - 1). |
| 116 | */ |
| 117 | if (n >= 0) |
| 118 | buf[n] = '\0'; |
| 119 | return n; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 120 | } |
| 121 | |
| 122 | /* |
| 123 | * Add a path to the set we're tracing. Also add the canonicalized |
| 124 | * version of the path. Secifying NULL will delete all paths. |
| 125 | */ |
Denys Vlasenko | 7239dbc | 2013-03-05 15:46:34 +0100 | [diff] [blame] | 126 | void |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 127 | pathtrace_select(const char *path) |
| 128 | { |
Denys Vlasenko | 29865e7 | 2012-03-15 18:03:56 +0100 | [diff] [blame] | 129 | char *rpath; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 130 | |
Denys Vlasenko | 7239dbc | 2013-03-05 15:46:34 +0100 | [diff] [blame] | 131 | storepath(path); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 132 | |
| 133 | rpath = realpath(path, NULL); |
| 134 | |
| 135 | if (rpath == NULL) |
Denys Vlasenko | 7239dbc | 2013-03-05 15:46:34 +0100 | [diff] [blame] | 136 | return; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 137 | |
| 138 | /* if realpath and specified path are same, we're done */ |
Denys Vlasenko | 29865e7 | 2012-03-15 18:03:56 +0100 | [diff] [blame] | 139 | if (strcmp(path, rpath) == 0) { |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 140 | free(rpath); |
Denys Vlasenko | 7239dbc | 2013-03-05 15:46:34 +0100 | [diff] [blame] | 141 | return; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 142 | } |
| 143 | |
Dmitry V. Levin | 6c8ef05 | 2015-05-25 22:51:19 +0000 | [diff] [blame] | 144 | error_msg("Requested path '%s' resolved into '%s'", path, rpath); |
Denys Vlasenko | 7239dbc | 2013-03-05 15:46:34 +0100 | [diff] [blame] | 145 | storepath(rpath); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 146 | } |
| 147 | |
| 148 | /* |
| 149 | * Return true if syscall accesses a selected path |
| 150 | * (or if no paths have been specified for tracing). |
| 151 | */ |
| 152 | int |
| 153 | pathtrace_match(struct tcb *tcp) |
| 154 | { |
Denys Vlasenko | a9fe13c | 2013-02-22 13:26:10 +0100 | [diff] [blame] | 155 | const struct_sysent *s; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 156 | |
Denys Vlasenko | 74ec14f | 2013-02-21 16:13:47 +0100 | [diff] [blame] | 157 | s = tcp->s_ent; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 158 | |
Philippe Ombredanne | 894c7e3 | 2014-02-01 09:57:45 -0800 | [diff] [blame] | 159 | if (!(s->sys_flags & (TRACE_FILE | TRACE_DESC | TRACE_NETWORK))) |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 160 | return 0; |
| 161 | |
| 162 | /* |
| 163 | * Check for special cases where we need to do something |
| 164 | * other than test arg[0]. |
| 165 | */ |
| 166 | |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 167 | switch (s->sen) { |
| 168 | case SEN_dup2: |
| 169 | case SEN_dup3: |
| 170 | case SEN_sendfile: |
| 171 | case SEN_sendfile64: |
| 172 | case SEN_tee: |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 173 | /* fd, fd */ |
| 174 | return fdmatch(tcp, tcp->u_arg[0]) || |
| 175 | fdmatch(tcp, tcp->u_arg[1]); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 176 | |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 177 | case SEN_faccessat: |
| 178 | case SEN_fchmodat: |
| 179 | case SEN_fchownat: |
| 180 | case SEN_futimesat: |
| 181 | case SEN_inotify_add_watch: |
| 182 | case SEN_mkdirat: |
| 183 | case SEN_mknodat: |
| 184 | case SEN_newfstatat: |
| 185 | case SEN_openat: |
| 186 | case SEN_pipe2: |
| 187 | case SEN_readlinkat: |
| 188 | case SEN_unlinkat: |
| 189 | case SEN_utimensat: |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 190 | /* fd, path */ |
| 191 | return fdmatch(tcp, tcp->u_arg[0]) || |
| 192 | upathmatch(tcp, tcp->u_arg[1]); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 193 | |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 194 | case SEN_link: |
| 195 | case SEN_mount: |
| 196 | case SEN_pivotroot: |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 197 | /* path, path */ |
| 198 | return upathmatch(tcp, tcp->u_arg[0]) || |
| 199 | upathmatch(tcp, tcp->u_arg[1]); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 200 | |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 201 | case SEN_quotactl: |
Dmitry V. Levin | 7943966 | 2012-10-26 23:43:13 +0000 | [diff] [blame] | 202 | /* x, path */ |
| 203 | return upathmatch(tcp, tcp->u_arg[1]); |
Dmitry V. Levin | 7943966 | 2012-10-26 23:43:13 +0000 | [diff] [blame] | 204 | |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 205 | case SEN_linkat: |
| 206 | case SEN_renameat2: |
| 207 | case SEN_renameat: |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 208 | /* fd, path, fd, path */ |
| 209 | return fdmatch(tcp, tcp->u_arg[0]) || |
| 210 | fdmatch(tcp, tcp->u_arg[2]) || |
| 211 | upathmatch(tcp, tcp->u_arg[1]) || |
| 212 | upathmatch(tcp, tcp->u_arg[3]); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 213 | |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 214 | case SEN_old_mmap: |
Denys Vlasenko | 1ba8543 | 2013-02-19 11:28:20 +0100 | [diff] [blame] | 215 | #if defined(S390) |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 216 | case SEN_old_mmap_pgoff: |
Denys Vlasenko | 1ba8543 | 2013-02-19 11:28:20 +0100 | [diff] [blame] | 217 | #endif |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 218 | case SEN_mmap: |
| 219 | case SEN_mmap_4koff: |
| 220 | case SEN_mmap_pgoff: |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 221 | /* x, x, x, x, fd */ |
| 222 | return fdmatch(tcp, tcp->u_arg[4]); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 223 | |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 224 | case SEN_symlinkat: |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 225 | /* path, fd, path */ |
| 226 | return fdmatch(tcp, tcp->u_arg[1]) || |
| 227 | upathmatch(tcp, tcp->u_arg[0]) || |
Denys Vlasenko | b63256e | 2011-06-07 12:13:24 +0200 | [diff] [blame] | 228 | upathmatch(tcp, tcp->u_arg[2]); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 229 | |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 230 | case SEN_splice: |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 231 | /* fd, x, fd, x, x */ |
| 232 | return fdmatch(tcp, tcp->u_arg[0]) || |
| 233 | fdmatch(tcp, tcp->u_arg[2]); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 234 | |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 235 | case SEN_epoll_ctl: |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 236 | /* x, x, fd, x */ |
| 237 | return fdmatch(tcp, tcp->u_arg[2]); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 238 | |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 239 | |
| 240 | case SEN_fanotify_mark: |
Dmitry V. Levin | 99db95d | 2014-02-05 04:13:18 +0000 | [diff] [blame] | 241 | /* x, x, x, fd, path */ |
| 242 | return fdmatch(tcp, tcp->u_arg[3]) || |
| 243 | upathmatch(tcp, tcp->u_arg[4]); |
Dmitry V. Levin | 99db95d | 2014-02-05 04:13:18 +0000 | [diff] [blame] | 244 | |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 245 | case SEN_oldselect: |
| 246 | case SEN_pselect6: |
| 247 | case SEN_select: |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 248 | { |
Denys Vlasenko | 79a79ea | 2011-09-01 16:35:44 +0200 | [diff] [blame] | 249 | int i, j; |
Denys Vlasenko | 64778cb | 2013-11-09 20:46:55 +0100 | [diff] [blame] | 250 | int nfds; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 251 | long *args, oldargs[5]; |
| 252 | unsigned fdsize; |
| 253 | fd_set *fds; |
| 254 | |
Denys Vlasenko | 64778cb | 2013-11-09 20:46:55 +0100 | [diff] [blame] | 255 | args = tcp->u_arg; |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 256 | if (SEN_oldselect == s->sen) { |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 257 | if (umoven(tcp, tcp->u_arg[0], sizeof oldargs, |
Denys Vlasenko | 7e69ed9 | 2015-03-21 19:50:53 +0100 | [diff] [blame] | 258 | oldargs) < 0) |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 259 | { |
Dmitry V. Levin | 6c8ef05 | 2015-05-25 22:51:19 +0000 | [diff] [blame] | 260 | error_msg("umoven() failed"); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 261 | return 0; |
| 262 | } |
| 263 | args = oldargs; |
Denys Vlasenko | 64778cb | 2013-11-09 20:46:55 +0100 | [diff] [blame] | 264 | } |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 265 | |
Denys Vlasenko | 64778cb | 2013-11-09 20:46:55 +0100 | [diff] [blame] | 266 | /* Kernel truncates arg[0] to int, we do the same. */ |
| 267 | nfds = (int) args[0]; |
| 268 | /* Kernel rejects negative nfds, so we don't parse it either. */ |
| 269 | if (nfds <= 0) |
| 270 | return 0; |
Denys Vlasenko | 79a79ea | 2011-09-01 16:35:44 +0200 | [diff] [blame] | 271 | /* Beware of select(2^31-1, NULL, NULL, NULL) and similar... */ |
Denys Vlasenko | 64778cb | 2013-11-09 20:46:55 +0100 | [diff] [blame] | 272 | if (nfds > 1024*1024) |
Denys Vlasenko | 79a79ea | 2011-09-01 16:35:44 +0200 | [diff] [blame] | 273 | nfds = 1024*1024; |
Denys Vlasenko | 64778cb | 2013-11-09 20:46:55 +0100 | [diff] [blame] | 274 | fdsize = (((nfds + 7) / 8) + current_wordsize-1) & -current_wordsize; |
Dmitry V. Levin | 3e9d71f | 2015-05-25 20:41:02 +0000 | [diff] [blame] | 275 | fds = xmalloc(fdsize); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 276 | |
Denys Vlasenko | 7b609d5 | 2011-06-22 14:32:43 +0200 | [diff] [blame] | 277 | for (i = 1; i <= 3; ++i) { |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 278 | if (args[i] == 0) |
| 279 | continue; |
Denys Vlasenko | 7e69ed9 | 2015-03-21 19:50:53 +0100 | [diff] [blame] | 280 | if (umoven(tcp, args[i], fdsize, fds) < 0) { |
Dmitry V. Levin | 6c8ef05 | 2015-05-25 22:51:19 +0000 | [diff] [blame] | 281 | error_msg("umoven() failed"); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 282 | continue; |
| 283 | } |
Denys Vlasenko | 64778cb | 2013-11-09 20:46:55 +0100 | [diff] [blame] | 284 | for (j = 0;; j++) { |
| 285 | j = next_set_bit(fds, j, nfds); |
| 286 | if (j < 0) |
| 287 | break; |
| 288 | if (fdmatch(tcp, j)) { |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 289 | free(fds); |
| 290 | return 1; |
| 291 | } |
Denys Vlasenko | 64778cb | 2013-11-09 20:46:55 +0100 | [diff] [blame] | 292 | } |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 293 | } |
| 294 | free(fds); |
| 295 | return 0; |
| 296 | } |
| 297 | |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 298 | case SEN_poll: |
| 299 | case SEN_ppoll: |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 300 | { |
| 301 | struct pollfd fds; |
| 302 | unsigned nfds; |
| 303 | unsigned long start, cur, end; |
| 304 | |
| 305 | start = tcp->u_arg[0]; |
| 306 | nfds = tcp->u_arg[1]; |
| 307 | |
| 308 | end = start + sizeof(fds) * nfds; |
| 309 | |
| 310 | if (nfds == 0 || end < start) |
| 311 | return 0; |
| 312 | |
| 313 | for (cur = start; cur < end; cur += sizeof(fds)) |
Denys Vlasenko | 7e69ed9 | 2015-03-21 19:50:53 +0100 | [diff] [blame] | 314 | if ((umoven(tcp, cur, sizeof fds, &fds) == 0) |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 315 | && fdmatch(tcp, fds.fd)) |
| 316 | return 1; |
| 317 | |
| 318 | return 0; |
| 319 | } |
| 320 | |
Dmitry V. Levin | ddb53dd | 2015-07-25 23:55:51 +0000 | [diff] [blame] | 321 | case SEN_bpf: |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 322 | case SEN_epoll_create: |
| 323 | case SEN_eventfd2: |
| 324 | case SEN_eventfd: |
| 325 | case SEN_fanotify_init: |
| 326 | case SEN_inotify_init1: |
Dmitry V. Levin | 95b84ea | 2015-07-28 23:03:41 +0000 | [diff] [blame] | 327 | case SEN_memfd_create: |
Elvira Khabirova | 483c15f | 2015-07-10 22:24:58 +0300 | [diff] [blame] | 328 | case SEN_perf_event_open: |
| 329 | case SEN_pipe: |
| 330 | case SEN_printargs: |
| 331 | case SEN_socket: |
| 332 | case SEN_socketpair: |
| 333 | case SEN_timerfd_create: |
| 334 | case SEN_timerfd_gettime: |
| 335 | case SEN_timerfd_settime: |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 336 | /* |
Philippe Ombredanne | 894c7e3 | 2014-02-01 09:57:45 -0800 | [diff] [blame] | 337 | * These have TRACE_FILE or TRACE_DESCRIPTOR or TRACE_NETWORK set, |
| 338 | * but they don't have any file descriptor or path args to test. |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 339 | */ |
| 340 | return 0; |
| 341 | } |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 342 | |
| 343 | /* |
| 344 | * Our fallback position for calls that haven't already |
| 345 | * been handled is to just check arg[0]. |
| 346 | */ |
| 347 | |
| 348 | if (s->sys_flags & TRACE_FILE) |
| 349 | return upathmatch(tcp, tcp->u_arg[0]); |
| 350 | |
Philippe Ombredanne | 894c7e3 | 2014-02-01 09:57:45 -0800 | [diff] [blame] | 351 | if (s->sys_flags & (TRACE_DESC | TRACE_NETWORK)) |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 352 | return fdmatch(tcp, tcp->u_arg[0]); |
| 353 | |
| 354 | return 0; |
| 355 | } |