Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (c) 2011, Comtrol Corp. |
| 3 | * All rights reserved. |
| 4 | * |
| 5 | * Redistribution and use in source and binary forms, with or without |
| 6 | * modification, are permitted provided that the following conditions |
| 7 | * are met: |
| 8 | * 1. Redistributions of source code must retain the above copyright |
| 9 | * notice, this list of conditions and the following disclaimer. |
| 10 | * 2. Redistributions in binary form must reproduce the above copyright |
| 11 | * notice, this list of conditions and the following disclaimer in the |
| 12 | * documentation and/or other materials provided with the distribution. |
| 13 | * 3. The name of the author may not be used to endorse or promote products |
| 14 | * derived from this software without specific prior written permission. |
| 15 | * |
| 16 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
| 17 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
| 18 | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
| 19 | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
| 20 | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
| 21 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| 22 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| 23 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| 24 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
| 25 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| 26 | * |
| 27 | */ |
| 28 | |
| 29 | #include "defs.h" |
Dmitry V. Levin | b038a43 | 2011-08-30 16:05:26 +0000 | [diff] [blame] | 30 | #include <sys/param.h> |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 31 | #ifdef HAVE_POLL_H |
Denys Vlasenko | a6d91de | 2012-03-16 12:02:22 +0100 | [diff] [blame^] | 32 | # include <poll.h> |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 33 | #endif |
| 34 | #ifdef HAVE_SYS_POLL_H |
Denys Vlasenko | a6d91de | 2012-03-16 12:02:22 +0100 | [diff] [blame^] | 35 | # include <sys/poll.h> |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 36 | #endif |
| 37 | |
| 38 | #include "syscall.h" |
| 39 | |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 40 | #define MAXSELECTED 256 /* max number of "selected" paths */ |
| 41 | static const char *selected[MAXSELECTED]; /* paths selected for tracing */ |
| 42 | |
| 43 | /* |
| 44 | * Return true if specified path matches one that we're tracing. |
| 45 | */ |
| 46 | static int |
| 47 | pathmatch(const char *path) |
| 48 | { |
Dmitry V. Levin | fcda7a5 | 2011-06-13 21:58:43 +0000 | [diff] [blame] | 49 | unsigned int i; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 50 | |
Denys Vlasenko | 7b609d5 | 2011-06-22 14:32:43 +0200 | [diff] [blame] | 51 | for (i = 0; i < ARRAY_SIZE(selected); ++i) { |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 52 | if (selected[i] == NULL) |
| 53 | return 0; |
Denys Vlasenko | 29865e7 | 2012-03-15 18:03:56 +0100 | [diff] [blame] | 54 | if (strcmp(path, selected[i]) == 0) |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 55 | return 1; |
| 56 | } |
| 57 | return 0; |
| 58 | } |
| 59 | |
| 60 | /* |
| 61 | * Return true if specified path (in user-space) matches. |
| 62 | */ |
| 63 | static int |
| 64 | upathmatch(struct tcb *tcp, unsigned long upath) |
| 65 | { |
Denys Vlasenko | 7b609d5 | 2011-06-22 14:32:43 +0200 | [diff] [blame] | 66 | char path[PATH_MAX + 1]; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 67 | |
Denys Vlasenko | 6cecba5 | 2012-01-20 11:56:00 +0100 | [diff] [blame] | 68 | return umovestr(tcp, upath, sizeof path, path) >= 0 && |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 69 | pathmatch(path); |
| 70 | } |
| 71 | |
| 72 | /* |
| 73 | * Return true if specified fd maps to a path we're tracing. |
| 74 | */ |
| 75 | static int |
| 76 | fdmatch(struct tcb *tcp, int fd) |
| 77 | { |
| 78 | const char *path = getfdpath(tcp, fd); |
| 79 | |
| 80 | return path && pathmatch(path); |
| 81 | } |
| 82 | |
| 83 | /* |
| 84 | * Add a path to the set we're tracing. |
| 85 | * Secifying NULL will delete all paths. |
| 86 | */ |
| 87 | static int |
| 88 | storepath(const char *path) |
| 89 | { |
Dmitry V. Levin | fcda7a5 | 2011-06-13 21:58:43 +0000 | [diff] [blame] | 90 | unsigned int i; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 91 | |
Denys Vlasenko | 29865e7 | 2012-03-15 18:03:56 +0100 | [diff] [blame] | 92 | for (i = 0; i < ARRAY_SIZE(selected); ++i) { |
Denys Vlasenko | 7b609d5 | 2011-06-22 14:32:43 +0200 | [diff] [blame] | 93 | if (!selected[i]) { |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 94 | selected[i] = path; |
| 95 | return 0; |
| 96 | } |
Denys Vlasenko | 29865e7 | 2012-03-15 18:03:56 +0100 | [diff] [blame] | 97 | } |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 98 | |
Dmitry V. Levin | fcda7a5 | 2011-06-13 21:58:43 +0000 | [diff] [blame] | 99 | fprintf(stderr, "Max trace paths exceeded, only using first %u\n", |
| 100 | (unsigned int) ARRAY_SIZE(selected)); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 101 | return -1; |
| 102 | } |
| 103 | |
| 104 | /* |
| 105 | * Get path associated with fd. |
| 106 | */ |
Denys Vlasenko | 29865e7 | 2012-03-15 18:03:56 +0100 | [diff] [blame] | 107 | const char * |
| 108 | getfdpath(struct tcb *tcp, int fd) |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 109 | { |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 110 | static char path[PATH_MAX+1]; |
Denys Vlasenko | 384b0ad | 2012-03-15 18:11:51 +0100 | [diff] [blame] | 111 | char linkpath[sizeof("/proc/%u/fd/%u") + 2 * sizeof(int)*3]; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 112 | ssize_t n; |
| 113 | |
| 114 | if (fd < 0) |
| 115 | return NULL; |
| 116 | |
Denys Vlasenko | 29865e7 | 2012-03-15 18:03:56 +0100 | [diff] [blame] | 117 | sprintf(linkpath, "/proc/%u/fd/%u", tcp->pid, fd); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 118 | n = readlink(linkpath, path, (sizeof path) - 1); |
| 119 | if (n <= 0) |
| 120 | return NULL; |
| 121 | path[n] = '\0'; |
| 122 | return path; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 123 | } |
| 124 | |
| 125 | /* |
| 126 | * Add a path to the set we're tracing. Also add the canonicalized |
| 127 | * version of the path. Secifying NULL will delete all paths. |
| 128 | */ |
| 129 | int |
| 130 | pathtrace_select(const char *path) |
| 131 | { |
Denys Vlasenko | 29865e7 | 2012-03-15 18:03:56 +0100 | [diff] [blame] | 132 | char *rpath; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 133 | |
| 134 | if (storepath(path)) |
| 135 | return -1; |
| 136 | |
| 137 | rpath = realpath(path, NULL); |
| 138 | |
| 139 | if (rpath == NULL) |
| 140 | return 0; |
| 141 | |
| 142 | /* if realpath and specified path are same, we're done */ |
Denys Vlasenko | 29865e7 | 2012-03-15 18:03:56 +0100 | [diff] [blame] | 143 | if (strcmp(path, rpath) == 0) { |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 144 | free(rpath); |
| 145 | return 0; |
| 146 | } |
| 147 | |
| 148 | fprintf(stderr, "Requested path '%s' resolved into '%s'\n", |
| 149 | path, rpath); |
| 150 | return storepath(rpath); |
| 151 | } |
| 152 | |
| 153 | /* |
| 154 | * Return true if syscall accesses a selected path |
| 155 | * (or if no paths have been specified for tracing). |
| 156 | */ |
| 157 | int |
| 158 | pathtrace_match(struct tcb *tcp) |
| 159 | { |
| 160 | const struct sysent *s; |
| 161 | |
| 162 | if (selected[0] == NULL) |
| 163 | return 1; |
| 164 | |
Dmitry V. Levin | bdec9cb | 2012-02-06 17:13:59 +0000 | [diff] [blame] | 165 | if (!SCNO_IN_RANGE(tcp->scno)) |
| 166 | return 0; |
| 167 | |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 168 | s = &sysent[tcp->scno]; |
| 169 | |
| 170 | if (!(s->sys_flags & (TRACE_FILE | TRACE_DESC))) |
| 171 | return 0; |
| 172 | |
| 173 | /* |
| 174 | * Check for special cases where we need to do something |
| 175 | * other than test arg[0]. |
| 176 | */ |
| 177 | |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 178 | if (s->sys_func == sys_dup2 || |
| 179 | s->sys_func == sys_dup3 || |
| 180 | s->sys_func == sys_sendfile || |
| 181 | s->sys_func == sys_sendfile64 || |
Dmitry V. Levin | ad178c0 | 2011-11-28 22:48:53 +0000 | [diff] [blame] | 182 | s->sys_func == sys_tee) |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 183 | { |
| 184 | /* fd, fd */ |
| 185 | return fdmatch(tcp, tcp->u_arg[0]) || |
| 186 | fdmatch(tcp, tcp->u_arg[1]); |
| 187 | } |
| 188 | |
| 189 | if (s->sys_func == sys_inotify_add_watch || |
| 190 | s->sys_func == sys_faccessat || |
| 191 | s->sys_func == sys_fchmodat || |
| 192 | s->sys_func == sys_futimesat || |
| 193 | s->sys_func == sys_mkdirat || |
| 194 | s->sys_func == sys_unlinkat || |
| 195 | s->sys_func == sys_newfstatat || |
| 196 | s->sys_func == sys_mknodat || |
| 197 | s->sys_func == sys_openat || |
| 198 | s->sys_func == sys_readlinkat || |
| 199 | s->sys_func == sys_utimensat || |
| 200 | s->sys_func == sys_fchownat || |
Denys Vlasenko | b63256e | 2011-06-07 12:13:24 +0200 | [diff] [blame] | 201 | s->sys_func == sys_pipe2) |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 202 | { |
| 203 | /* fd, path */ |
| 204 | return fdmatch(tcp, tcp->u_arg[0]) || |
| 205 | upathmatch(tcp, tcp->u_arg[1]); |
| 206 | } |
| 207 | |
| 208 | if (s->sys_func == sys_link || |
Denys Vlasenko | b63256e | 2011-06-07 12:13:24 +0200 | [diff] [blame] | 209 | s->sys_func == sys_mount) |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 210 | { |
| 211 | /* path, path */ |
| 212 | return upathmatch(tcp, tcp->u_arg[0]) || |
| 213 | upathmatch(tcp, tcp->u_arg[1]); |
| 214 | } |
| 215 | |
| 216 | if (s->sys_func == sys_renameat || |
Denys Vlasenko | b63256e | 2011-06-07 12:13:24 +0200 | [diff] [blame] | 217 | s->sys_func == sys_linkat) |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 218 | { |
| 219 | /* fd, path, fd, path */ |
| 220 | return fdmatch(tcp, tcp->u_arg[0]) || |
| 221 | fdmatch(tcp, tcp->u_arg[2]) || |
| 222 | upathmatch(tcp, tcp->u_arg[1]) || |
| 223 | upathmatch(tcp, tcp->u_arg[3]); |
| 224 | } |
| 225 | |
Denys Vlasenko | 7b609d5 | 2011-06-22 14:32:43 +0200 | [diff] [blame] | 226 | if (s->sys_func == sys_old_mmap || s->sys_func == sys_mmap) { |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 227 | /* x, x, x, x, fd */ |
| 228 | return fdmatch(tcp, tcp->u_arg[4]); |
| 229 | } |
| 230 | |
Denys Vlasenko | 7b609d5 | 2011-06-22 14:32:43 +0200 | [diff] [blame] | 231 | if (s->sys_func == sys_symlinkat) { |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 232 | /* path, fd, path */ |
| 233 | return fdmatch(tcp, tcp->u_arg[1]) || |
| 234 | upathmatch(tcp, tcp->u_arg[0]) || |
Denys Vlasenko | b63256e | 2011-06-07 12:13:24 +0200 | [diff] [blame] | 235 | upathmatch(tcp, tcp->u_arg[2]); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 236 | } |
| 237 | |
Dmitry V. Levin | ad178c0 | 2011-11-28 22:48:53 +0000 | [diff] [blame] | 238 | if (s->sys_func == sys_splice) { |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 239 | /* fd, x, fd, x, x */ |
| 240 | return fdmatch(tcp, tcp->u_arg[0]) || |
| 241 | fdmatch(tcp, tcp->u_arg[2]); |
| 242 | } |
| 243 | |
Denys Vlasenko | 7b609d5 | 2011-06-22 14:32:43 +0200 | [diff] [blame] | 244 | if (s->sys_func == sys_epoll_ctl) { |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 245 | /* x, x, fd, x */ |
| 246 | return fdmatch(tcp, tcp->u_arg[2]); |
| 247 | } |
| 248 | |
| 249 | if (s->sys_func == sys_select || |
| 250 | s->sys_func == sys_oldselect || |
Denys Vlasenko | b63256e | 2011-06-07 12:13:24 +0200 | [diff] [blame] | 251 | s->sys_func == sys_pselect6) |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 252 | { |
Denys Vlasenko | 79a79ea | 2011-09-01 16:35:44 +0200 | [diff] [blame] | 253 | int i, j; |
| 254 | unsigned nfds; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 255 | long *args, oldargs[5]; |
| 256 | unsigned fdsize; |
| 257 | fd_set *fds; |
| 258 | |
Denys Vlasenko | 7b609d5 | 2011-06-22 14:32:43 +0200 | [diff] [blame] | 259 | if (s->sys_func == sys_oldselect) { |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 260 | if (umoven(tcp, tcp->u_arg[0], sizeof oldargs, |
| 261 | (char*) oldargs) < 0) |
| 262 | { |
| 263 | fprintf(stderr, "umoven() failed\n"); |
| 264 | return 0; |
| 265 | } |
| 266 | args = oldargs; |
| 267 | } else |
| 268 | args = tcp->u_arg; |
| 269 | |
| 270 | nfds = args[0]; |
Denys Vlasenko | 79a79ea | 2011-09-01 16:35:44 +0200 | [diff] [blame] | 271 | /* Beware of select(2^31-1, NULL, NULL, NULL) and similar... */ |
| 272 | if (args[0] > 1024*1024) |
| 273 | nfds = 1024*1024; |
| 274 | if (args[0] < 0) |
| 275 | nfds = 0; |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 276 | fdsize = ((((nfds + 7) / 8) + sizeof(long) - 1) |
| 277 | & -sizeof(long)); |
| 278 | fds = malloc(fdsize); |
Denys Vlasenko | 1d46ba5 | 2011-08-31 14:00:02 +0200 | [diff] [blame] | 279 | if (!fds) |
| 280 | die_out_of_memory(); |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 281 | |
Denys Vlasenko | 7b609d5 | 2011-06-22 14:32:43 +0200 | [diff] [blame] | 282 | for (i = 1; i <= 3; ++i) { |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 283 | if (args[i] == 0) |
| 284 | continue; |
| 285 | |
Denys Vlasenko | 7b609d5 | 2011-06-22 14:32:43 +0200 | [diff] [blame] | 286 | if (umoven(tcp, args[i], fdsize, (char *) fds) < 0) { |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 287 | fprintf(stderr, "umoven() failed\n"); |
| 288 | continue; |
| 289 | } |
| 290 | |
| 291 | for (j = 0; j < nfds; ++j) |
Denys Vlasenko | 7b609d5 | 2011-06-22 14:32:43 +0200 | [diff] [blame] | 292 | if (FD_ISSET(j, fds) && fdmatch(tcp, j)) { |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 293 | free(fds); |
| 294 | return 1; |
| 295 | } |
| 296 | } |
| 297 | free(fds); |
| 298 | return 0; |
| 299 | } |
| 300 | |
| 301 | if (s->sys_func == sys_poll || |
Denys Vlasenko | b63256e | 2011-06-07 12:13:24 +0200 | [diff] [blame] | 302 | s->sys_func == sys_ppoll) |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 303 | { |
| 304 | struct pollfd fds; |
| 305 | unsigned nfds; |
| 306 | unsigned long start, cur, end; |
| 307 | |
| 308 | start = tcp->u_arg[0]; |
| 309 | nfds = tcp->u_arg[1]; |
| 310 | |
| 311 | end = start + sizeof(fds) * nfds; |
| 312 | |
| 313 | if (nfds == 0 || end < start) |
| 314 | return 0; |
| 315 | |
| 316 | for (cur = start; cur < end; cur += sizeof(fds)) |
| 317 | if ((umoven(tcp, cur, sizeof fds, (char *) &fds) == 0) |
| 318 | && fdmatch(tcp, fds.fd)) |
| 319 | return 1; |
| 320 | |
| 321 | return 0; |
| 322 | } |
| 323 | |
| 324 | if (s->sys_func == printargs || |
| 325 | s->sys_func == sys_pipe || |
| 326 | s->sys_func == sys_pipe2 || |
| 327 | s->sys_func == sys_eventfd2 || |
| 328 | s->sys_func == sys_eventfd || |
| 329 | s->sys_func == sys_inotify_init1 || |
| 330 | s->sys_func == sys_timerfd_create || |
| 331 | s->sys_func == sys_timerfd_settime || |
| 332 | s->sys_func == sys_timerfd_gettime || |
| 333 | s->sys_func == sys_epoll_create || |
Denys Vlasenko | 29865e7 | 2012-03-15 18:03:56 +0100 | [diff] [blame] | 334 | strcmp(s->sys_name, "fanotify_init") == 0) |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 335 | { |
| 336 | /* |
| 337 | * These have TRACE_FILE or TRACE_DESCRIPTOR set, but they |
| 338 | * don't have any file descriptor or path args to test. |
| 339 | */ |
| 340 | return 0; |
| 341 | } |
Grant Edwards | 8a08277 | 2011-04-07 20:25:40 +0000 | [diff] [blame] | 342 | |
| 343 | /* |
| 344 | * Our fallback position for calls that haven't already |
| 345 | * been handled is to just check arg[0]. |
| 346 | */ |
| 347 | |
| 348 | if (s->sys_flags & TRACE_FILE) |
| 349 | return upathmatch(tcp, tcp->u_arg[0]); |
| 350 | |
| 351 | if (s->sys_flags & TRACE_DESC) |
| 352 | return fdmatch(tcp, tcp->u_arg[0]); |
| 353 | |
| 354 | return 0; |
| 355 | } |