302f2d16d0
* defs.h (QUAL_STACKTRACE): Add new qual flag. (stacktrace): Add macro for checking QUAL_STACKTRACE. (stack_trace_enabled): Change description. * filter.h (DECL_FILTER_ACTION): Declare stacktrace filter action type. * filter_action.c (action_types): Add stacktrace filter action type. (add_action): Update stack_trace_enabled. * strace.c (stack_trace_enabled): Change description. (init): Use filtering_parse for -k option. * syscall.c (syscall_entering_trace, syscall_exiting_decode, syscall_exiting_trace): Use stacktrace macro instead of stack_trace_enabled. * unwind.c (apply_stacktrace): Add filter action function.
241 lines
7.2 KiB
C
241 lines
7.2 KiB
C
/*
|
|
* Copyright (c) 2017 Nikolay Marchuk <marchuk.nikolay.a@gmail.com>
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. The name of the author may not be used to endorse or promote products
|
|
* derived from this software without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
#include "defs.h"
|
|
#include "filter.h"
|
|
|
|
#define FILTER_ACTION_TYPE(NAME, PRIORITY, FLAG, PARSER, PREFILTER) \
|
|
{#NAME, PRIORITY, FLAG, parse_ ## PARSER, PREFILTER, apply_ ## NAME}
|
|
/* End of FILTER_ACTION_TYPE definition. */
|
|
|
|
static const struct filter_action_type {
|
|
const char *name;
|
|
/* The highest priority is 0. */
|
|
unsigned int priority;
|
|
unsigned int qual_flg;
|
|
void * (*parse_args)(const char *);
|
|
bool (*prefilter)(struct tcb *);
|
|
void (*apply)(struct tcb *, void *);
|
|
} action_types[] = {
|
|
FILTER_ACTION_TYPE(trace, 0, QUAL_TRACE, null, NULL),
|
|
FILTER_ACTION_TYPE(inject, 1, QUAL_INJECT, inject, not_injected),
|
|
FILTER_ACTION_TYPE(fault, 1, QUAL_INJECT, fault, not_injected),
|
|
FILTER_ACTION_TYPE(raw, 2, QUAL_RAW, null, is_traced),
|
|
FILTER_ACTION_TYPE(abbrev, 2, QUAL_ABBREV, null, is_traced),
|
|
FILTER_ACTION_TYPE(verbose, 2, QUAL_VERBOSE, null, is_traced),
|
|
FILTER_ACTION_TYPE(read, 2, QUAL_READ, null, is_traced),
|
|
FILTER_ACTION_TYPE(write, 2, QUAL_WRITE, null, is_traced),
|
|
# ifdef USE_LIBUNWIND
|
|
FILTER_ACTION_TYPE(stacktrace, 2, QUAL_STACKTRACE, null, is_traced),
|
|
# endif
|
|
};
|
|
#undef FILTER_ACTION_TYPE
|
|
|
|
struct filter_action {
|
|
/* Used to correct order of actions with the same priority. */
|
|
unsigned int id;
|
|
const struct filter_action_type *type;
|
|
struct bool_expression *expr;
|
|
unsigned int nfilters;
|
|
struct filter *filters;
|
|
void *priv_data;
|
|
};
|
|
|
|
static unsigned int default_flags = DEFAULT_QUAL_FLAGS;
|
|
static struct filter_action *filter_actions;
|
|
static unsigned int nfilter_actions;
|
|
|
|
static bool *variables_buf;
|
|
|
|
/*
|
|
* Compares action priorities. If actions have the same priority,
|
|
* uses LIFO order.
|
|
*/
|
|
static int
|
|
compare_action_priority(const void *a, const void *b)
|
|
{
|
|
const struct filter_action *action_a = a;
|
|
const struct filter_action *action_b = b;
|
|
unsigned int priority_a = action_a->type->priority;
|
|
unsigned int priority_b = action_b->type->priority;
|
|
|
|
if (priority_a != priority_b) {
|
|
return (priority_a < priority_b) ? -1 : 1;
|
|
} else {
|
|
return (action_a->id > action_b->id) ? -1 : 1;
|
|
}
|
|
}
|
|
|
|
static void
|
|
inject_path_tracing(void)
|
|
{
|
|
struct filter_action *action = find_or_add_action("trace");
|
|
struct filter *path_filter;
|
|
|
|
if (!action->nfilters)
|
|
filtering_parse("trace=all");
|
|
path_filter = add_filter_to_array(&action->filters, &action->nfilters,
|
|
"path");
|
|
set_filter_priv_data(path_filter, &global_path_set);
|
|
expression_add_filter_and(action->expr, action->nfilters - 1);
|
|
}
|
|
|
|
void
|
|
filtering_parsing_finish(void)
|
|
{
|
|
unsigned int maxfilters = 0;
|
|
unsigned int i;
|
|
|
|
/* Inject path filter into trace action. */
|
|
if (tracing_paths)
|
|
inject_path_tracing();
|
|
|
|
/* Sort actions by priority */
|
|
if (nfilter_actions == 0)
|
|
return;
|
|
qsort(filter_actions, nfilter_actions, sizeof(struct filter_action),
|
|
&compare_action_priority);
|
|
|
|
/* Allocate variables_buf sufficient for any action */
|
|
for (i = 0; i < nfilter_actions; ++i) {
|
|
if (filter_actions[i].nfilters > maxfilters)
|
|
maxfilters = filter_actions[i].nfilters;
|
|
}
|
|
variables_buf = xcalloc(maxfilters, sizeof(bool));
|
|
}
|
|
|
|
static const struct filter_action_type *
|
|
lookup_filter_action_type(const char *str)
|
|
{
|
|
unsigned int i;
|
|
|
|
for (i = 0; i < ARRAY_SIZE(action_types); ++i) {
|
|
if (!strcmp(action_types[i].name, str))
|
|
return &action_types[i];
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
static struct filter_action *
|
|
add_action(const struct filter_action_type *type)
|
|
{
|
|
struct filter_action *action;
|
|
|
|
/* Update default_flags */
|
|
if (default_flags & type->qual_flg)
|
|
default_flags &= ~type->qual_flg;
|
|
|
|
/* Enable stack tracing. */
|
|
#ifdef USE_LIBUNWIND
|
|
if (type->qual_flg & QUAL_STACKTRACE)
|
|
stack_trace_enabled = true;
|
|
#endif
|
|
|
|
filter_actions = xreallocarray(filter_actions, ++nfilter_actions,
|
|
sizeof(struct filter_action));
|
|
action = &filter_actions[nfilter_actions - 1];
|
|
memset(action, 0, sizeof(*action));
|
|
action->id = nfilter_actions - 1;
|
|
action->type = type;
|
|
action->expr = create_expression();
|
|
return action;
|
|
}
|
|
|
|
struct filter_action *
|
|
find_or_add_action(const char *name)
|
|
{
|
|
const struct filter_action_type *type = lookup_filter_action_type(name);
|
|
unsigned int i;
|
|
|
|
if (!type)
|
|
error_msg_and_die("invalid filter action '%s'", name);
|
|
/* If action takes arguments, add new action */
|
|
if (type->parse_args != &parse_null)
|
|
return add_action(type);
|
|
|
|
for (i = 0; i < nfilter_actions; ++i) {
|
|
if (filter_actions[i].type == type)
|
|
return &filter_actions[i];
|
|
}
|
|
return add_action(type);
|
|
}
|
|
|
|
void
|
|
parse_filter_action(const char *action_name, const char *expr, const char *args)
|
|
{
|
|
struct filter_action *action = find_or_add_action(action_name);
|
|
|
|
parse_filter_expression(action->expr, expr, action, action->nfilters);
|
|
if (args && action->type->parse_args == &parse_null)
|
|
error_msg("%s action takes no arguments, ignored arguments "
|
|
"'%s'", action->type->name, args);
|
|
action->priv_data = action->type->parse_args(args);
|
|
}
|
|
|
|
|
|
static void
|
|
run_filter_action(struct tcb *tcp, struct filter_action *action)
|
|
{
|
|
if (action->type->prefilter && !action->type->prefilter(tcp))
|
|
return;
|
|
run_filters(tcp, action->filters, action->nfilters, variables_buf);
|
|
if (run_expression(action->expr, variables_buf, action->nfilters))
|
|
action->type->apply(tcp, action->priv_data);
|
|
}
|
|
|
|
struct filter *
|
|
create_filter(struct filter_action *action, const char *name)
|
|
{
|
|
return add_filter_to_array(&action->filters, &action->nfilters, name);
|
|
}
|
|
|
|
void
|
|
set_qualify_mode(struct filter_action *action, unsigned int filters_left)
|
|
{
|
|
set_filters_qualify_mode(&action->filters, &action->nfilters,
|
|
filters_left);
|
|
set_expression_qualify_mode(action->expr, filters_left);
|
|
|
|
}
|
|
|
|
void
|
|
filter_syscall(struct tcb *tcp)
|
|
{
|
|
unsigned int i;
|
|
|
|
tcp->qual_flg |= default_flags;
|
|
for (i = 0; i < nfilter_actions; ++i)
|
|
run_filter_action(tcp, &filter_actions[i]);
|
|
}
|
|
|
|
void
|
|
set_filter_action_priv_data(struct filter_action *action, void *priv_data)
|
|
{
|
|
if (action)
|
|
action->priv_data = priv_data;
|
|
}
|