[PATCH v4 1/1] Initial support for LuaJIT scripting
Victor Krapivensky
krapivenskiy.va at phystech.edu
Fri Jun 23 15:05:34 UTC 2017
* Makefile.am: Build with LuaJIT if configured so.
(strace_SOURCES): Add defs_shared.h, ffi.h, syscall_class.h.
* configure.ac: Add new --with-luajit configure option.
* defs.h (TCB_AD_HOC_INJECT): new TCB flag.
(QUAL_HOOK_ENTRY, QUAL_HOOK_EXIT): new qual flags.
(struct tcb): If built with LuaJIT support, include currpers field even
if SUPPORTED_PERSONALITIES is 0.
If built with LuaJIT support, include new ad_hoc_inject_opts field.
Move definitions that need to be fed to LuaJIT's FFI to...
* defs_shared.h: ...new file.
* ffi.h: New file.
* luajit.h: Likewise.
* luajit_funcs.h: Likewise.
* luajit_lib.h: Likewise.
* mpers_type.h (STRINGIFY): Rename to MPERS_STRINGIFY so that it does
not pollute the global namespace.
* qualify.c (syscall_classes): move syscall classes list to the global
scope, terminate it with a null entry.
(hook_entry_set, hook_exit_set): New sets (if built with LuaJIT
support).
(lookup_class): Use global, null entry-terminated list of syscall
classes.
(qual_flags): If built with LuaJIT support, return QUAL_HOOK_ENTRY and
QUAL_HOOK_EXIT flags.
(set_hook_qual): New function.
* strace.c (alloctcb): update the condition of presence of currpers
field.
(droptcb): If built with LuaJIT support, free ad_hoc_inject_opts.
(init): New -l option (if built with LuaJIT support).
(main): run Lua script, if built with LuaJIT support and a script
was provided.
* syscall.c (errnoent_vec, nerrnoent_vec, signalent_vec,
nsignalent_vec, ioctlent_vec, nioctlent_vec): New global variables.
(tcb_inject_opts): introduce a second argument indicating whether tcp's
inject_vec should be copied from the global inject_vec if needed.
If built with LuaJIT support and TCB_AD_HOC_INJECT flag is set, return
tcp's ad_hoc_inject_opts.
(tamper_with_syscall_entering): Don't copy inject_vec here; instead,
pass true as a second argument to tcb_inject_opts.
(tamper_with_syscall_exiting): Pass false as a second argument to
tcb_inject_opts.
(syscall_ad_hoc_inject): New function.
(syscall_entering_trace): perform ad hoc injection even if the syscall
is not traced.
(syscall_exiting_decode): don't return 0 ("bail out") if exiting hook is
set up for this syscall, or if an ad hoc injection was performed.
Call tamper_with_syscall_exiting on success.
(syscall_exiting_trace): Don't call tamper_with_syscall_exiting, check
if the syscall is not traced again.
(syscall_exiting_finish): Clear TCB_AD_HOC_INJECT bit.
* syscall_class.h: New file.
* sysent.h: Modify to support inclusion with FFI_CDEF.
---
Makefile.am | 9 ++
configure.ac | 36 ++++++++
defs.h | 52 +++--------
defs_shared.h | 58 ++++++++++++
ffi.h | 18 ++++
luajit.h | 269 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++
luajit_funcs.h | 28 ++++++
luajit_lib.h | 224 ++++++++++++++++++++++++++++++++++++++++++++++
mpers_type.h | 4 +-
qualify.c | 85 +++++++++++-------
strace.c | 39 +++++++-
syscall.c | 117 ++++++++++++++++++++----
syscall_class.h | 19 ++++
sysent.h | 23 ++++-
14 files changed, 887 insertions(+), 94 deletions(-)
create mode 100644 defs_shared.h
create mode 100644 ffi.h
create mode 100644 luajit.h
create mode 100644 luajit_funcs.h
create mode 100644 luajit_lib.h
create mode 100644 syscall_class.h
diff --git a/Makefile.am b/Makefile.am
index f9e78ed1..a77b77e2 100644
--- a/Makefile.am
+++ b/Makefile.am
@@ -100,6 +100,7 @@ strace_SOURCES = \
copy_file_range.c \
count.c \
defs.h \
+ defs_shared.h \
desc.c \
dirent.c \
dirent64.c \
@@ -122,6 +123,7 @@ strace_SOURCES = \
fetch_struct_stat.c \
fetch_struct_stat64.c \
fetch_struct_statfs.c \
+ ffi.h \
file_handle.c \
file_ioctl.c \
fs_x_ioctl.c \
@@ -244,6 +246,7 @@ strace_SOURCES = \
strace.c \
swapon.c \
syscall.c \
+ syscall_class.h \
sysctl.c \
sysent.h \
sysinfo.c \
@@ -279,6 +282,12 @@ strace_LDFLAGS += $(libunwind_LDFLAGS)
strace_LDADD += $(libunwind_LIBS)
endif
+if USE_LUAJIT
+strace_SOURCES += luajit.h luajit_lib.h luajit_funcs.h
+strace_CPPFLAGS += $(LUAJIT_CFLAGS)
+strace_LDADD += $(LUAJIT_LIBS)
+endif
+
@CODE_COVERAGE_RULES@
CODE_COVERAGE_BRANCH_COVERAGE = 1
CODE_COVERAGE_GENHTML_OPTIONS = $(CODE_COVERAGE_GENHTML_OPTIONS_DEFAULT) \
diff --git a/configure.ac b/configure.ac
index bc7b637d..0e27936f 100644
--- a/configure.ac
+++ b/configure.ac
@@ -717,6 +717,42 @@ AC_SUBST(dl_LIBS)
AC_PATH_PROG([PERL], [perl])
+dnl LuaJIT scripting support
+use_luajit=no
+force_luajit=no
+luajit_lib=luajit
+LUAJIT_LIBS=
+LUAJIT_CFLAGS=
+AC_ARG_WITH([luajit],
+ [AS_HELP_STRING([--with-luajit],
+ [build with LuaJIT scripting support])],
+ [case "${withval}" in
+ yes) force_luajit=yes ;;
+ check) ;;
+ *) force_luajit=yes; luajit_lib="${withval}" ;;
+ esac],
+ [:]
+)
+AS_IF([test "x$luajit_lib" != xno],
+ [PKG_CHECK_MODULES([LUAJIT],
+ [$luajit_lib],
+ [use_luajit=yes],
+ [AS_IF([test "x$force_luajit" = xyes],
+ [AC_MSG_ERROR([cannot find luajit library: $luajit_lib])]
+ )]
+ )]
+)
+
+dnl enable LuaJIT
+AC_MSG_CHECKING([whether to enable Lua scripting])
+if test "x$use_luajit" = xyes; then
+ AC_DEFINE([USE_LUAJIT], 1, [Enable Lua scripting support])
+ AC_SUBST(LUAJIT_LIBS)
+ AC_SUBST(LUAJIT_CFLAGS)
+fi
+AM_CONDITIONAL([USE_LUAJIT], [test "x$use_luajit" = xyes])
+AC_MSG_RESULT([$use_luajit])
+
dnl stack trace with libunwind
libunwind_CPPFLAGS=
libunwind_LDFLAGS=
diff --git a/defs.h b/defs.h
index 29a681b9..c95e5ebe 100644
--- a/defs.h
+++ b/defs.h
@@ -193,11 +193,6 @@ extern char *stpcpy(char *dst, const char *src);
# define PERSONALITY2_INCLUDE_FUNCS "empty.h"
#endif
-typedef struct ioctlent {
- const char *symbol;
- unsigned int code;
-} struct_ioctlent;
-
struct inject_opts {
uint16_t first;
uint16_t step;
@@ -208,39 +203,7 @@ struct inject_opts {
#define MAX_ERRNO_VALUE 4095
#define INJECT_OPTS_RVAL_DEFAULT (-(MAX_ERRNO_VALUE + 1))
-/* Trace Control Block */
-struct tcb {
- int flags; /* See below for TCB_ values */
- int pid; /* If 0, this tcb is free */
- int qual_flg; /* qual_flags[scno] or DEFAULT_QUAL_FLAGS + RAW */
- unsigned long u_error; /* Error code */
- kernel_ulong_t scno; /* System call number */
- kernel_ulong_t u_arg[MAX_ARGS]; /* System call arguments */
- kernel_long_t u_rval; /* Return value */
-#if SUPPORTED_PERSONALITIES > 1
- unsigned int currpers; /* Personality at the time of scno update */
-#endif
- int sys_func_rval; /* Syscall entry parser's return value */
- int curcol; /* Output column for this process */
- FILE *outf; /* Output file for this process */
- const char *auxstr; /* Auxiliary info from syscall (see RVAL_STR) */
- void *_priv_data; /* Private data for syscall decoding functions */
- void (*_free_priv_data)(void *); /* Callback for freeing priv_data */
- const struct_sysent *s_ent; /* sysent[scno] or dummy struct for bad scno */
- const struct_sysent *s_prev_ent; /* for "resuming interrupted SYSCALL" msg */
- struct inject_opts *inject_vec[SUPPORTED_PERSONALITIES];
- struct timeval stime; /* System time usage as of last process wait */
- struct timeval dtime; /* Delta for system time usage */
- struct timeval etime; /* Syscall entry time */
-
-#ifdef USE_LIBUNWIND
- struct UPT_info *libunwind_ui;
- struct mmap_cache_t *mmap_cache;
- unsigned int mmap_cache_size;
- unsigned int mmap_cache_generation;
- struct queue_t *queue;
-#endif
-};
+#include "defs_shared.h"
/* TCB flags */
/* We have attached to this process, but did not see it stopping yet */
@@ -264,6 +227,7 @@ struct tcb {
#define TCB_TAMPERED 0x40 /* A syscall has been tampered with */
#define TCB_HIDE_LOG 0x80 /* We should hide everything (until execve) */
#define TCB_SKIP_DETACH_ON_FIRST_EXEC 0x100 /* -b execve should skip detach on first execve */
+#define TCB_AD_HOC_INJECT 0x200 /* an ad hoc injection was performed by Lua script */
/* qualifier flags */
#define QUAL_TRACE 0x001 /* this system call should be traced */
@@ -274,6 +238,8 @@ struct tcb {
#define QUAL_SIGNAL 0x100 /* report events with this signal */
#define QUAL_READ 0x200 /* dump data read from this file descriptor */
#define QUAL_WRITE 0x400 /* dump data written to this file descriptor */
+#define QUAL_HOOK_ENTRY 0x800 /* return this syscall on entry from next_sc() */
+#define QUAL_HOOK_EXIT 0x1000 /* return this syscall on exit from next_sc() */
#define DEFAULT_QUAL_FLAGS (QUAL_TRACE | QUAL_ABBREV | QUAL_VERBOSE)
@@ -672,6 +638,9 @@ extern struct number_set signal_set;
extern bool is_number_in_set(unsigned int number, const struct number_set *);
extern void qualify(const char *);
extern unsigned int qual_flags(const unsigned int);
+#ifdef USE_LUAJIT
+extern void set_hook_qual(unsigned int scno, unsigned int pers, bool entry_hook, bool exit_hook);
+#endif
#define DECL_IOCTL(name) \
extern int \
@@ -952,6 +921,13 @@ extern const char *const errnoent0[];
extern const char *const signalent0[];
extern const struct_ioctlent ioctlent0[];
+extern const char *const *errnoent_vec[SUPPORTED_PERSONALITIES];
+extern const char *const *signalent_vec[SUPPORTED_PERSONALITIES];
+extern const struct_ioctlent *const ioctlent_vec[SUPPORTED_PERSONALITIES];
+extern const unsigned int nerrnoent_vec[SUPPORTED_PERSONALITIES];
+extern const unsigned int nsignalent_vec[SUPPORTED_PERSONALITIES];
+extern const unsigned int nioctlent_vec[SUPPORTED_PERSONALITIES];
+
#if SUPPORTED_PERSONALITIES > 1
extern const struct_sysent *sysent;
extern const char *const *errnoent;
diff --git a/defs_shared.h b/defs_shared.h
new file mode 100644
index 00000000..9129eb7e
--- /dev/null
+++ b/defs_shared.h
@@ -0,0 +1,58 @@
+/*
+ * Should only be included without FFI_CDEF from defs.h, so no include guards.
+ */
+
+#include "ffi.h"
+
+FFI_CONTENT(
+typedef struct ioctlent {
+ const char *symbol;
+ unsigned int code;
+} struct_ioctlent;
+)
+
+FFI_CONTENT(
+struct tcb {
+ int flags; /* See below for TCB_ values */
+ int pid; /* If 0, this tcb is free */
+ int qual_flg; /* qual_flags[scno] or DEFAULT_QUAL_FLAGS + RAW */
+ unsigned long u_error; /* Error code */
+ kernel_ulong_t scno; /* System call number */
+ kernel_ulong_t u_arg[MAX_ARGS]; /* System call arguments */
+ kernel_long_t u_rval; /* Return value */
+)
+
+#if defined(USE_LUAJIT) || SUPPORTED_PERSONALITIES > 1
+FFI_CONTENT(
+ unsigned int currpers; /* Personality at the time of scno update */
+)
+#endif
+
+#ifndef FFI_CDEF
+ int sys_func_rval; /* Syscall entry parser's return value */
+ int curcol; /* Output column for this process */
+ FILE *outf; /* Output file for this process */
+ const char *auxstr; /* Auxiliary info from syscall (see RVAL_STR) */
+ void *_priv_data; /* Private data for syscall decoding functions */
+ void (*_free_priv_data)(void *); /* Callback for freeing priv_data */
+ const struct_sysent *s_ent; /* sysent[scno] or dummy struct for bad scno */
+ const struct_sysent *s_prev_ent; /* for "resuming interrupted SYSCALL" msg */
+# ifdef USE_LUAJIT
+ struct inject_opts *ad_hoc_inject_opts;
+# endif
+ struct inject_opts *inject_vec[SUPPORTED_PERSONALITIES];
+ struct timeval stime; /* System time usage as of last process wait */
+ struct timeval dtime; /* Delta for system time usage */
+ struct timeval etime; /* Syscall entry time */
+# ifdef USE_LIBUNWIND
+ struct UPT_info *libunwind_ui;
+ struct mmap_cache_t *mmap_cache;
+ unsigned int mmap_cache_size;
+ unsigned int mmap_cache_generation;
+ struct queue_t *queue;
+# endif
+#endif /* !FFI_CDEF */
+
+FFI_CONTENT(
+};
+)
diff --git a/ffi.h b/ffi.h
new file mode 100644
index 00000000..96dc977f
--- /dev/null
+++ b/ffi.h
@@ -0,0 +1,18 @@
+#ifndef STRACE_FFI_H
+#define STRACE_FFI_H
+
+#define FFI_STRINGIFY(...) #__VA_ARGS__
+#define FFI_CONCAT(a, b) a ## b
+#define FFI_CONCAT2(a, b) FFI_CONCAT(a, b)
+
+/*
+ * FFI_CONTENT expands to FFI_CONTENT_ (which strigifies its arguments) when
+ * FFI_CDEF is defined, and to FFI_CONTENT_FFI_CDEF (which simply expands to its
+ * arguments) when it is not.
+ */
+#define FFI_CONTENT FFI_CONCAT2(FFI_CONTENT_, FFI_CDEF)
+
+#define FFI_CONTENT_(...) FFI_STRINGIFY(__VA_ARGS__)
+#define FFI_CONTENT_FFI_CDEF(...) __VA_ARGS__
+
+#endif /* !STRACE_FFI_H */
diff --git a/luajit.h b/luajit.h
new file mode 100644
index 00000000..d9885ebe
--- /dev/null
+++ b/luajit.h
@@ -0,0 +1,269 @@
+/*
+ * Should only be included from strace.c, so no include guards.
+ */
+
+#include "luajit_funcs.h"
+#include <signal.h>
+
+#define L script_L
+
+#define LUAJIT_FUNC(name) luajit_func_ ## name
+#define luajit_func_umoven umoven
+#define luajit_func_umovestr umovestr
+
+static struct tcb *
+LUAJIT_FUNC(next_sc)(void)
+{
+ static struct timeval tv = {};
+ static bool first = true;
+
+#define MBRESTART(res, sig) \
+ if ((res) >= 0 && ptrace_restart(PTRACE_SYSCALL, current_tcp, sig) < 0) { \
+ /* Note: ptrace_restart emitted error message */ \
+ exit_code = 1; \
+ return NULL; \
+ }
+
+ if (!first) {
+ unsigned int sig = 0;
+ int res;
+ if (entering(current_tcp)) {
+ res = syscall_entering_trace(current_tcp, &sig);
+ syscall_entering_finish(current_tcp, res);
+ } else {
+ res = syscall_exiting_trace(current_tcp, tv, 1);
+ syscall_exiting_finish(current_tcp);
+ }
+ MBRESTART(res, sig);
+ }
+ first = false;
+
+ while (1) {
+ int status;
+ siginfo_t si;
+ enum trace_event ret = next_event(&status, &si);
+ if (ret == TE_SYSCALL_STOP) {
+ unsigned int sig = 0;
+ int res;
+ if (entering(current_tcp)) {
+ res = syscall_entering_decode(current_tcp);
+ switch (res) {
+ case 0:
+ break;
+ case 1:
+ if (current_tcp->qual_flg & QUAL_HOOK_ENTRY)
+ return current_tcp;
+ res = syscall_entering_trace(current_tcp, &sig);
+ /* fall through */
+ default:
+ syscall_entering_finish(current_tcp, res);
+ }
+ } else {
+ res = syscall_exiting_decode(current_tcp, &tv);
+ switch (res) {
+ case 0:
+ break;
+ case 1:
+ if (current_tcp->qual_flg & QUAL_HOOK_EXIT)
+ return current_tcp;
+ /* fall through */
+ default:
+ res = syscall_exiting_trace(current_tcp, tv, res);
+ }
+ syscall_exiting_finish(current_tcp);
+ }
+ MBRESTART(res, sig);
+ } else {
+ if (!dispatch_event(ret, &status, &si)) {
+ return NULL;
+ }
+ }
+ }
+#undef MBRESTART
+}
+
+static bool
+LUAJIT_FUNC(monitor)(unsigned int scno, unsigned int pers, bool entry_hook, bool exit_hook)
+{
+ if (pers >= SUPPORTED_PERSONALITIES || scno >= nsyscall_vec[pers])
+ return false;
+ set_hook_qual(scno, pers, entry_hook, exit_hook);
+ return true;
+}
+
+static void
+prepare_ad_hoc_inject(struct tcb *tcp)
+{
+ if (!tcp->ad_hoc_inject_opts) {
+ tcp->ad_hoc_inject_opts = xmalloc(sizeof(*tcp->ad_hoc_inject_opts));
+ tcp->ad_hoc_inject_opts->first = 1;
+ tcp->ad_hoc_inject_opts->step = 1;
+ }
+ if (!(tcp->flags & TCB_AD_HOC_INJECT)) {
+ tcp->ad_hoc_inject_opts->signo = 0;
+ tcp->ad_hoc_inject_opts->rval = INJECT_OPTS_RVAL_DEFAULT;
+ tcp->qual_flg |= QUAL_INJECT;
+ tcp->flags |= TCB_AD_HOC_INJECT;
+ }
+}
+
+static bool
+LUAJIT_FUNC(inject_signo)(struct tcb *tcp, int signo)
+{
+ if (exiting(tcp))
+ /* Too late! */
+ return false;
+ if (signo <= 0 || signo > SIGRTMAX)
+ return false;
+ prepare_ad_hoc_inject(tcp);
+ tcp->ad_hoc_inject_opts->signo = signo;
+ return true;
+}
+
+static bool
+LUAJIT_FUNC(inject_retval)(struct tcb *tcp, int retval)
+{
+ if (exiting(tcp))
+ /* Too late! */
+ return false;
+ if (retval < -MAX_ERRNO_VALUE)
+ return false;
+ prepare_ad_hoc_inject(tcp);
+ tcp->ad_hoc_inject_opts->rval = retval;
+ return true;
+}
+
+static const char *
+get_lua_msg(void)
+{
+ const char *msg = lua_tostring(L, -1);
+ return msg ? msg : "(error object can't be converted to string)";
+}
+
+static void
+assert_lua_impl(int ret, const char *expr, const char *file, int line)
+{
+ if (ret == 0)
+ return;
+ error_msg_and_die("assert_lua(%s) failed at %s:%d: %s", expr, file,
+ line, get_lua_msg());
+}
+
+#define assert_lua(expr) assert_lua_impl(expr, #expr, __FILE__, __LINE__)
+
+static void
+check_lua(int ret)
+{
+ if (ret == 0)
+ return;
+ error_msg_and_die("lua: %s", get_lua_msg());
+}
+
+static void
+init_luajit(const char *scriptfile)
+{
+ static struct strace_luajit_funcs funcs = {
+#define X(rettype, name, ...) LUAJIT_FUNC(name),
+LUAJIT_FUNCS_XPAND()
+#undef X
+ };
+
+ if (L)
+ /* already initialized? */
+ error_msg_and_help("multiple -l arguments");
+
+ if (!(L = luaL_newstate()))
+ die_out_of_memory();
+
+ luaL_openlibs(L);
+ /* L: - */
+ assert_lua(luaL_loadfile(L, scriptfile)); /* L: chunk */
+ lua_getglobal(L, "require"); /* L: chunk require */
+ lua_pushstring(L, "ffi"); /* L: chunk require "ffi" */
+ assert_lua(lua_pcall(L, 1, 1, 0)); /* L: chunk ffi */
+ lua_getfield(L, -1, "cdef"); /* L: chunk ffi cdef */
+ luaL_Buffer b;
+ luaL_buffinit(L, &b); /* L: chunk ffi cdef ? */
+ {
+ char buf[128];
+ snprintf(buf, sizeof(buf),
+ "typedef int%d_t kernel_long_t;"
+ "typedef uint%d_t kernel_ulong_t;",
+ (int) sizeof(kernel_long_t) * 8,
+ (int) sizeof(kernel_ulong_t) * 8);
+ luaL_addstring(&b, buf); /* L: chunk ffi cdef ? */
+ }
+ luaL_addstring(&b,
+#define FFI_CDEF
+#include "sysent.h"
+#include "defs_shared.h"
+#include "luajit_funcs.h"
+#include "syscall_class.h"
+#undef FFI_CDEF
+ ); /* L: chunk ffi cdef ? */
+ luaL_pushresult(&b); /* L: chunk ffi cdef str */
+ assert_lua(lua_pcall(L, 1, 0, 0)); /* L: chunk ffi */
+ lua_newtable(L); /* L: chunk ffi table */
+ lua_getfield(L, -2, "cast"); /* L: chunk ffi table cast */
+ lua_pushstring(L, "struct strace_luajit_funcs *"); /* L: chunk ffi table cast str */
+ lua_pushlightuserdata(L, &funcs); /* L: chunk ffi table cast str ptr */
+
+ assert_lua(lua_pcall(L, 2, 1, 0)); /* L: chunk ffi table funcs */
+
+#define X(rettype, name, ...) \
+ lua_getfield(L, -1, #name); /* L: chunk ffi table funcs func */ \
+ lua_setfield(L, -3, #name); /* L: chunk ffi table funcs */
+LUAJIT_FUNCS_XPAND()
+#undef X
+
+ lua_pop(L, 1); /* L: chunk ffi table */
+
+ lua_pushinteger(L, SUPPORTED_PERSONALITIES); /* L: chunk ffi table number */
+ lua_setfield(L, -2, "npersonalities"); /* L: chunk ffi table */
+
+#define EXPOSE(type, ptr, name) \
+ lua_getfield(L, -2, "cast"); /* L: chunk ffi table cast */ \
+ lua_pushstring(L, type); /* L: chunk ffi table cast str */ \
+ lua_pushlightuserdata(L, (void *) ptr); /* L: chunk ffi table cast str ptr */ \
+ assert_lua(lua_pcall(L, 2, 1, 0)); /* L: chunk ffi table value */ \
+ lua_setfield(L, -2, name); /* L: chunk ffi table */
+
+ EXPOSE("const struct_sysent **", sysent_vec, "sysent_vec")
+ EXPOSE("const char ***", errnoent_vec, "errnoent_vec")
+ EXPOSE("const char ***", signalent_vec, "signalent_vec")
+ EXPOSE("const struct_ioctlent **", ioctlent_vec, "ioctlent_vec");
+
+ EXPOSE("const unsigned int *", nsyscall_vec, /*(!)*/ "nsysent_vec")
+ EXPOSE("const unsigned int *", nerrnoent_vec, "nerrnoent_vec")
+ EXPOSE("const unsigned int *", nsignalent_vec, "nsignalent_vec")
+ EXPOSE("const unsigned int *", nioctlent_vec, "nioctlent_vec")
+
+ EXPOSE("const struct syscall_class *", syscall_classes, "syscall_classes")
+
+#undef EXPOSE
+
+ lua_setglobal(L, "strace"); /* L: chunk ffi */
+ lua_pop(L, 1); /* L: chunk */
+
+ const char *code =
+#include "luajit_lib.h"
+ ;
+ assert_lua(luaL_dostring(L, code));
+}
+
+static void ATTRIBUTE_NORETURN
+run_luajit(void)
+{
+ /* L: chunk */
+ check_lua(lua_pcall(L, 0, 0, 0)); /* L: - */
+
+ lua_getglobal(L, "strace"); /* L: strace */
+ lua_getfield(L, -1, "_run"); /* L: strace _run */
+ check_lua(lua_pcall(L, 0, 0, 0)); /* L: strace */
+
+ terminate();
+}
+
+#undef assert_lua
+#undef LUAJIT_FUNC
+#undef L
diff --git a/luajit_funcs.h b/luajit_funcs.h
new file mode 100644
index 00000000..599a5c9a
--- /dev/null
+++ b/luajit_funcs.h
@@ -0,0 +1,28 @@
+#if !defined(STRACE_LUAJIT_FUNCS_H) || defined(FFI_CDEF)
+#ifndef FFI_CDEF
+# define STRACE_LUAJIT_FUNCS_H
+#endif
+
+#include "ffi.h"
+
+#define LUAJIT_FUNCS_XPAND() \
+ X(struct tcb *, next_sc, void) \
+ X(bool, monitor, unsigned int scno, unsigned int pers, \
+ bool entry_hook, bool exit_hook) \
+ X(bool, inject_signo, struct tcb *, int signo) \
+ X(bool, inject_retval, struct tcb *, int val) \
+ X(int, umoven, struct tcb *, kernel_ulong_t addr, \
+ unsigned int len, void *laddr) \
+ X(int, umovestr, struct tcb *, kernel_ulong_t addr, \
+ unsigned int len, char *laddr) \
+ /* end */
+
+#define X(rettype, name, ...) rettype (*name)(__VA_ARGS__);
+FFI_CONTENT(
+struct strace_luajit_funcs {
+ LUAJIT_FUNCS_XPAND()
+};
+)
+#undef X
+
+#endif /* !defined(STRACE_LUAJIT_FUNCS_H) || defined(FFI_CDEF) */
diff --git a/luajit_lib.h b/luajit_lib.h
new file mode 100644
index 00000000..0b60f57d
--- /dev/null
+++ b/luajit_lib.h
@@ -0,0 +1,224 @@
+#define STRINGIFY(...) #__VA_ARGS__
+#define STRVAL(...) STRINGIFY(__VA_ARGS__)
+
+"do\n\
+ local ffi = require 'ffi'\n\
+ local bit = require 'bit'\n\
+ strace._en, strace._ex = {}, {}\n\
+ for p = 0, strace.npersonalities - 1 do\n\
+ strace._en[p] = {}\n\
+ strace._ex[p] = {}\n\
+ end\n\
+ local function chain(f, g)\n\
+ if not f then return g end\n\
+ return function(...)\n\
+ f(...)\n\
+ g(...)\n\
+ end\n\
+ end\n\
+ function strace.entering(tcp)\n\
+ return bit.band(tcp.flags, " STRVAL(TCB_INSYSCALL) ") == 0\n\
+ end\n\
+ function strace.exiting(tcp)\n\
+ return bit.band(tcp.flags, " STRVAL(TCB_INSYSCALL) ") ~= 0\n\
+ end\n\
+\n\
+ -- `arg' defaults to true.\n\
+ local function alter_trace_opt(flagbit, tcp, arg)\n\
+ if strace.exiting(tcp) then\n\
+ error('altering tracing options must be done on syscall entering')\n\
+ end\n\
+ -- we want to support custom boolean-like objects, so check for nil explicitly\n\
+ if type(arg) == 'nil' or arg then\n\
+ tcp.qual_flg = bit.bor(tcp.qual_flg, flagbit)\n\
+ else\n\
+ tcp.qual_flg = bit.band(tcp.qual_flg, bit.bnot(flagbit))\n\
+ end\n\
+ end\n\
+ function strace.trace (tcp, arg) alter_trace_opt(" STRVAL(QUAL_TRACE) ", tcp, arg) end\n\
+ function strace.abbrev (tcp, arg) alter_trace_opt(" STRVAL(QUAL_ABBREV) ", tcp, arg) end\n\
+ function strace.verbose(tcp, arg) alter_trace_opt(" STRVAL(QUAL_VERBOSE) ", tcp, arg) end\n\
+ function strace.raw (tcp, arg) alter_trace_opt(" STRVAL(QUAL_RAW) ", tcp, arg) end\n\
+\n\
+ function strace.ptr_to_kulong(v)\n\
+ return ffi.cast('kernel_ulong_t', ffi.cast('unsigned long', v))\n\
+ end\n\
+ function strace.at_exit(f)\n\
+ strace._at_exit = chain(strace._at_exit, f)\n\
+ end\n\
+ function strace.get_err_name(err, pers)\n\
+ pers = pers or 0\n\
+ if err < 0 or err > strace.nerrnoent_vec[pers] then\n\
+ return nil\n\
+ end\n\
+ local s = strace.errnoent_vec[pers][err]\n\
+ if s ~= nil then\n\
+ return ffi.string(s)\n\
+ end\n\
+ return nil\n\
+ end\n\
+ function strace.get_sc_name(scno, pers)\n\
+ pers = pers or 0\n\
+ if scno < 0 or scno >= strace.nsysent_vec[pers] then\n\
+ return nil\n\
+ end\n\
+ local s = strace.sysent_vec[pers][scno].sys_name\n\
+ if s ~= nil then\n\
+ return ffi.string(s)\n\
+ end\n\
+ return nil\n\
+ end\n\
+ function strace.get_scno(scname, pers)\n\
+ pers = pers or 0\n\
+ for i = 0, tonumber(strace.nsysent_vec[pers]) - 1 do\n\
+ local s = strace.sysent_vec[pers][i].sys_name\n\
+ if s ~= nil and ffi.string(s) == scname then\n\
+ return i\n\
+ end\n\
+ end\n\
+ return nil\n\
+ end\n\
+ function strace.get_ioctl_name(code, pers)\n\
+ pers = pers or 0\n\
+ -- we could have provided a definition for stdlib's bsearch() and used it, but LuaJIT's FFI manual\n\
+ -- says generated callbacks are a limited resource and also slow. So implement binary search ourselves.\n\
+ local lb, rb = ffi.cast('unsigned int', 0), strace.nioctlent_vec[pers]\n\
+ if rb == 0 then\n\
+ return nil\n\
+ end\n\
+ local arr = strace.ioctlent_vec[pers]\n\
+ while rb - lb > 1 do\n\
+ local mid = lb + (rb - lb) / 2\n\
+ if arr[mid].code <= code then\n\
+ lb = mid\n\
+ else\n\
+ rb = mid\n\
+ end\n\
+ end\n\
+ if arr[lb].code == code then\n\
+ return ffi.string(arr[lb].symbol)\n\
+ end\n\
+ return nil\n\
+ end\n\
+ function strace.get_signo(signame, pers)\n\
+ pers = pers or 0\n\
+ for i = 0, tonumber(strace.nsignalent_vec[pers]) - 1 do\n\
+ local s = strace.signalent_vec[pers][i]\n\
+ if s ~= nil and ffi.string(s) == signame then\n\
+ return i\n\
+ end\n\
+ end\n\
+ return nil\n\
+ end\n\
+ function strace.inject_signal(tcp, sig)\n\
+ if type(sig) == 'string' then\n\
+ sig = strace.get_signo(sig, tcp.currpers)\n\
+ if not sig then\n\
+ error('signal not found')\n\
+ end\n\
+ end\n\
+ if not strace.inject_signo(tcp, sig) then\n\
+ error('cannot inject signal')\n\
+ end\n\
+ end\n\
+ function strace.get_errno(errname, pers)\n\
+ pers = pers or 0\n\
+ for i = 0, tonumber(strace.nerrnoent_vec[pers]) - 1 do\n\
+ local s = strace.errnoent_vec[pers][i]\n\
+ if s ~= nil and ffi.string(s) == errname then\n\
+ return i\n\
+ end\n\
+ end\n\
+ return nil\n\
+ end\n\
+ function strace.inject_error(tcp, err)\n\
+ if type(err) == 'string' then\n\
+ err = strace.get_errno(err, tcp.currpers)\n\
+ if not err then\n\
+ error('error not found')\n\
+ end\n\
+ end\n\
+ if err <= 0 then\n\
+ error('err must be positive')\n\
+ end\n\
+ if not strace.inject_retval(tcp, -err) then\n\
+ error('cannot inject error')\n\
+ end\n\
+ end\n\
+ local function register_hook(scno, pers, en, ex, cb)\n\
+ assert(not not strace.monitor(scno, pers, en, ex))\n\
+ if en then\n\
+ strace._en[pers][scno] = chain(strace._en[pers][scno], cb)\n\
+ end\n\
+ if ex then\n\
+ strace._ex[pers][scno] = chain(strace._ex[pers][scno], cb)\n\
+ end\n\
+ end\n\
+ local function parse_when(when)\n\
+ if when == 'entering' then\n\
+ return true, false\n\
+ elseif when == 'exiting' then\n\
+ return false, true\n\
+ elseif when == 'both' then\n\
+ return true, true\n\
+ else\n\
+ error('unknown \"when\" value')\n\
+ end\n\
+ end\n\
+ function strace.hook(scname, when, cb)\n\
+ local en, ex = parse_when(when)\n\
+ local found = false\n\
+ for p = 0, strace.npersonalities - 1 do\n\
+ local scno = strace.get_scno(scname, p)\n\
+ if scno then\n\
+ register_hook(scno, p, en, ex, cb)\n\
+ found = true\n\
+ end\n\
+ end\n\
+ if not found then\n\
+ error('syscall not found')\n\
+ end\n\
+ end\n\
+ function strace.hook_class(clsname, when, cb)\n\
+ local en, ex = parse_when(when)\n\
+ local flag = nil\n\
+ local ptr = strace.syscall_classes\n\
+ while ptr.name ~= nil do\n\
+ if ffi.string(ptr.name) == clsname then\n\
+ flag = ptr.value\n\
+ break\n\
+ end\n\
+ ptr = ptr + 1\n\
+ end\n\
+ if not flag then\n\
+ error('syscall class not found')\n\
+ end\n\
+ for p = 0, strace.npersonalities - 1 do\n\
+ for i = 0, tonumber(strace.nsysent_vec[p]) - 1 do\n\
+ if bit.band(strace.sysent_vec[p][i].sys_flags, flag) ~= 0 then\n\
+ register_hook(i, p, en, ex, cb)\n\
+ end\n\
+ end\n\
+ end\n\
+ end\n\
+ function strace._run()\n\
+ while true do\n\
+ local tcp = strace.next_sc()\n\
+ if tcp == nil then break end\n\
+ local cb = (strace.entering(tcp) and strace._en or strace._ex)[tonumber(tcp.currpers)][tonumber(tcp.scno)]\n\
+ cb(tcp)\n\
+ end\n\
+ if strace._at_exit then strace._at_exit() end\n\
+ end\n\
+ function print(...)\n\
+ local sep = ''\n\
+ for i = 1, select('#', ...) do\n\
+ io.stderr:write(sep .. tostring(select(i, ...)))\n\
+ sep = '\\t'\n\
+ end\n\
+ io.stderr:write('\\n')\n\
+ end\n\
+end"
+
+#undef STRINGIFY
+#undef STRVAL
diff --git a/mpers_type.h b/mpers_type.h
index ecb1efa8..26c00767 100644
--- a/mpers_type.h
+++ b/mpers_type.h
@@ -31,8 +31,8 @@
#define STRACE_MPERS_TYPE_H
#ifdef IN_MPERS
-# define STRINGIFY(a) #a
-# define DEF_MPERS_TYPE(args) STRINGIFY(args.h)
+# define MPERS_STRINGIFY(a) #a
+# define DEF_MPERS_TYPE(args) MPERS_STRINGIFY(args.h)
# ifdef MPERS_IS_m32
# define MPERS_PREFIX m32_
# define MPERS_DEFS "m32_type_defs.h"
diff --git a/qualify.c b/qualify.c
index 3df4805a..894d002b 100644
--- a/qualify.c
+++ b/qualify.c
@@ -28,8 +28,34 @@
#include "defs.h"
#include "nsig.h"
+#include "syscall_class.h"
#include <regex.h>
+const struct syscall_class syscall_classes[] = {
+ { "desc", TRACE_DESC },
+ { "file", TRACE_FILE },
+ { "memory", TRACE_MEMORY },
+ { "process", TRACE_PROCESS },
+ { "signal", TRACE_SIGNAL },
+ { "ipc", TRACE_IPC },
+ { "network", TRACE_NETWORK },
+ { "%desc", TRACE_DESC },
+ { "%file", TRACE_FILE },
+ { "%memory", TRACE_MEMORY },
+ { "%process", TRACE_PROCESS },
+ { "%signal", TRACE_SIGNAL },
+ { "%ipc", TRACE_IPC },
+ { "%network", TRACE_NETWORK },
+ { "%stat", TRACE_STAT },
+ { "%lstat", TRACE_LSTAT },
+ { "%fstat", TRACE_FSTAT },
+ { "%%stat", TRACE_STAT_LIKE },
+ { "%statfs", TRACE_STATFS },
+ { "%fstatfs", TRACE_FSTATFS },
+ { "%%statfs", TRACE_STATFS_LIKE },
+ {}
+};
+
typedef unsigned int number_slot_t;
#define BITS_PER_SLOT (sizeof(number_slot_t) * 8)
@@ -48,6 +74,10 @@ static struct number_set inject_set[SUPPORTED_PERSONALITIES];
static struct number_set raw_set[SUPPORTED_PERSONALITIES];
static struct number_set trace_set[SUPPORTED_PERSONALITIES];
static struct number_set verbose_set[SUPPORTED_PERSONALITIES];
+#ifdef USE_LUAJIT
+static struct number_set hook_entry_set[SUPPORTED_PERSONALITIES];
+static struct number_set hook_exit_set[SUPPORTED_PERSONALITIES];
+#endif
static void
number_setbit(const unsigned int i, number_slot_t *const vec)
@@ -245,37 +275,10 @@ qualify_syscall_regex(const char *s, struct number_set *set)
static unsigned int
lookup_class(const char *s)
{
- static const struct {
- const char *name;
- unsigned int value;
- } syscall_class[] = {
- { "desc", TRACE_DESC },
- { "file", TRACE_FILE },
- { "memory", TRACE_MEMORY },
- { "process", TRACE_PROCESS },
- { "signal", TRACE_SIGNAL },
- { "ipc", TRACE_IPC },
- { "network", TRACE_NETWORK },
- { "%desc", TRACE_DESC },
- { "%file", TRACE_FILE },
- { "%memory", TRACE_MEMORY },
- { "%process", TRACE_PROCESS },
- { "%signal", TRACE_SIGNAL },
- { "%ipc", TRACE_IPC },
- { "%network", TRACE_NETWORK },
- { "%stat", TRACE_STAT },
- { "%lstat", TRACE_LSTAT },
- { "%fstat", TRACE_FSTAT },
- { "%%stat", TRACE_STAT_LIKE },
- { "%statfs", TRACE_STATFS },
- { "%fstatfs", TRACE_FSTATFS },
- { "%%statfs", TRACE_STATFS_LIKE },
- };
-
- unsigned int i;
- for (i = 0; i < ARRAY_SIZE(syscall_class); ++i) {
- if (strcmp(s, syscall_class[i].name) == 0) {
- return syscall_class[i].value;
+ const struct syscall_class *c;
+ for (c = syscall_classes; c->name; ++c) {
+ if (strcmp(s, c->name) == 0) {
+ return c->value;
}
}
@@ -693,5 +696,23 @@ qual_flags(const unsigned int scno)
| (is_number_in_set(scno, &raw_set[current_personality])
? QUAL_RAW : 0)
| (is_number_in_set(scno, &inject_set[current_personality])
- ? QUAL_INJECT : 0);
+ ? QUAL_INJECT : 0)
+#ifdef USE_LUAJIT
+ | (is_number_in_set(scno, &hook_entry_set[current_personality])
+ ? QUAL_HOOK_ENTRY : 0)
+ | (is_number_in_set(scno, &hook_exit_set[current_personality])
+ ? QUAL_HOOK_EXIT : 0)
+#endif
+ ;
+}
+
+#ifdef USE_LUAJIT
+void
+set_hook_qual(unsigned int scno, unsigned int pers, bool entry_hook, bool exit_hook)
+{
+ if (entry_hook)
+ add_number_to_set(scno, &hook_entry_set[pers]);
+ if (exit_hook)
+ add_number_to_set(scno, &hook_exit_set[pers]);
}
+#endif
diff --git a/strace.c b/strace.c
index 614ab9ec..8bf9d822 100644
--- a/strace.c
+++ b/strace.c
@@ -45,10 +45,16 @@
# include <sys/prctl.h>
#endif
#include <asm/unistd.h>
+#ifdef USE_LUAJIT
+# include <lua.h>
+# include <lualib.h>
+# include <lauxlib.h>
+#endif
#include "scno.h"
#include "ptrace.h"
#include "printsiginfo.h"
+#include "syscall_class.h"
/* In some libc, these aren't declared. Do it ourself: */
extern char **environ;
@@ -166,6 +172,11 @@ static volatile sig_atomic_t interrupted;
static volatile int interrupted;
#endif
+#ifdef USE_LUAJIT
+static lua_State *script_L = NULL;
+static void init_luajit(const char *scriptfile);
+#endif
+
#ifndef HAVE_STRERROR
#if !HAVE_DECL_SYS_ERRLIST
@@ -216,6 +227,11 @@ Output format:\n\
-k obtain stack trace between each syscall (experimental)\n\
"
#endif
+#ifdef USE_LUAJIT
+"\
+ -l file run a Lua script from FILE\n\
+"
+#endif
"\
-o file send trace output to FILE instead of stderr\n\
-q suppress messages about attaching, detaching, etc.\n\
@@ -766,7 +782,7 @@ alloctcb(int pid)
if (!tcp->pid) {
memset(tcp, 0, sizeof(*tcp));
tcp->pid = pid;
-#if SUPPORTED_PERSONALITIES > 1
+#if defined(USE_LUAJIT) || SUPPORTED_PERSONALITIES > 1
tcp->currpers = current_personality;
#endif
@@ -822,6 +838,10 @@ droptcb(struct tcb *tcp)
if (tcp->pid == 0)
return;
+#ifdef USE_LUAJIT
+ free(tcp->ad_hoc_inject_opts);
+#endif
+
int p;
for (p = 0; p < SUPPORTED_PERSONALITIES; ++p)
free(tcp->inject_vec[p]);
@@ -1638,6 +1658,9 @@ init(int argc, char *argv[])
#ifdef USE_LIBUNWIND
"k"
#endif
+#ifdef USE_LUAJIT
+ "l:"
+#endif
"D"
"a:e:o:O:p:s:S:u:E:P:I:")) != EOF) {
switch (c) {
@@ -1748,6 +1771,11 @@ init(int argc, char *argv[])
stack_trace_enabled = true;
break;
#endif
+#ifdef USE_LUAJIT
+ case 'l':
+ init_luajit(optarg);
+ break;
+#endif
case 'E':
if (putenv(optarg) < 0)
die_out_of_memory();
@@ -2628,6 +2656,10 @@ terminate(void)
exit(exit_code);
}
+#ifdef USE_LUAJIT
+# include "luajit.h"
+#endif
+
int
main(int argc, char *argv[])
{
@@ -2635,6 +2667,11 @@ main(int argc, char *argv[])
exit_code = !nprocs;
+#ifdef USE_LUAJIT
+ if (script_L)
+ run_luajit();
+#endif
+
int status;
siginfo_t si;
while (dispatch_event(next_event(&status, &si), &status, &si))
diff --git a/syscall.c b/syscall.c
index 02626c73..955ed2f4 100644
--- a/syscall.c
+++ b/syscall.c
@@ -196,6 +196,16 @@ enum {
#endif
};
+const char *const *errnoent_vec[SUPPORTED_PERSONALITIES] = {
+ errnoent0,
+#if SUPPORTED_PERSONALITIES > 1
+ errnoent1,
+# if SUPPORTED_PERSONALITIES > 2
+ errnoent2,
+# endif
+#endif
+};
+
enum {
nerrnos0 = ARRAY_SIZE(errnoent0)
#if SUPPORTED_PERSONALITIES > 1
@@ -206,6 +216,16 @@ enum {
#endif
};
+const unsigned int nerrnoent_vec[] = {
+ nerrnos0,
+#if SUPPORTED_PERSONALITIES > 1
+ nerrnos1,
+# if SUPPORTED_PERSONALITIES > 2
+ nerrnos2,
+# endif
+#endif
+};
+
enum {
nsignals0 = ARRAY_SIZE(signalent0)
#if SUPPORTED_PERSONALITIES > 1
@@ -216,6 +236,26 @@ enum {
#endif
};
+const char *const *signalent_vec[SUPPORTED_PERSONALITIES] = {
+ signalent0,
+#if SUPPORTED_PERSONALITIES > 1
+ signalent1,
+# if SUPPORTED_PERSONALITIES > 2
+ signalent2,
+# endif
+#endif
+};
+
+const unsigned int nsignalent_vec[] = {
+ nsignals0,
+#if SUPPORTED_PERSONALITIES > 1
+ nsignals1,
+# if SUPPORTED_PERSONALITIES > 2
+ nsignals2,
+# endif
+#endif
+};
+
enum {
nioctlents0 = ARRAY_SIZE(ioctlent0)
#if SUPPORTED_PERSONALITIES > 1
@@ -226,6 +266,26 @@ enum {
#endif
};
+const unsigned int nioctlent_vec[] = {
+ nioctlents0,
+#if SUPPORTED_PERSONALITIES > 1
+ nioctlents1,
+# if SUPPORTED_PERSONALITIES > 2
+ nioctlents2,
+# endif
+#endif
+};
+
+const struct_ioctlent *const ioctlent_vec[SUPPORTED_PERSONALITIES] = {
+ ioctlent0,
+#if SUPPORTED_PERSONALITIES > 1
+ ioctlent1,
+# if SUPPORTED_PERSONALITIES > 2
+ ioctlent2,
+# endif
+#endif
+};
+
#if SUPPORTED_PERSONALITIES > 1
const struct_sysent *sysent = sysent0;
const char *const *errnoent = errnoent0;
@@ -580,8 +640,19 @@ static int arch_set_success(struct tcb *);
struct inject_opts *inject_vec[SUPPORTED_PERSONALITIES];
static struct inject_opts *
-tcb_inject_opts(struct tcb *tcp)
+tcb_inject_opts(struct tcb *tcp, bool copy_if_needed)
{
+#ifdef USE_LUAJIT
+ if (tcp->flags & TCB_AD_HOC_INJECT)
+ return tcp->ad_hoc_inject_opts;
+#endif
+ if (copy_if_needed && !tcp->inject_vec[current_personality]) {
+ tcp->inject_vec[current_personality] =
+ xcalloc(nsyscalls, sizeof(**inject_vec));
+ memcpy(tcp->inject_vec[current_personality],
+ inject_vec[current_personality],
+ nsyscalls * sizeof(**inject_vec));
+ }
return (scno_in_range(tcp->scno) && tcp->inject_vec[current_personality])
? &tcp->inject_vec[current_personality][tcp->scno] : NULL;
}
@@ -590,15 +661,7 @@ tcb_inject_opts(struct tcb *tcp)
static long
tamper_with_syscall_entering(struct tcb *tcp, unsigned int *signo)
{
- if (!tcp->inject_vec[current_personality]) {
- tcp->inject_vec[current_personality] =
- xcalloc(nsyscalls, sizeof(**inject_vec));
- memcpy(tcp->inject_vec[current_personality],
- inject_vec[current_personality],
- nsyscalls * sizeof(**inject_vec));
- }
-
- struct inject_opts *opts = tcb_inject_opts(tcp);
+ struct inject_opts *opts = tcb_inject_opts(tcp, true);
if (!opts || opts->first == 0)
return 0;
@@ -621,7 +684,7 @@ tamper_with_syscall_entering(struct tcb *tcp, unsigned int *signo)
static long
tamper_with_syscall_exiting(struct tcb *tcp)
{
- struct inject_opts *opts = tcb_inject_opts(tcp);
+ struct inject_opts *opts = tcb_inject_opts(tcp, false);
if (!opts)
return 0;
@@ -699,6 +762,12 @@ syscall_entering_decode(struct tcb *tcp)
return 1;
}
+static bool
+syscall_ad_hoc_injected(struct tcb *tcp)
+{
+ return (tcp->qual_flg & QUAL_INJECT) && (tcp->flags & TCB_AD_HOC_INJECT);
+}
+
int
syscall_entering_trace(struct tcb *tcp, unsigned int *sig)
{
@@ -721,13 +790,13 @@ syscall_entering_trace(struct tcb *tcp, unsigned int *sig)
|| (tracing_paths && !pathtrace_match(tcp))
) {
tcp->flags |= TCB_FILTERED;
- return 0;
+ goto maybe_ad_hoc_tamper;
}
tcp->flags &= ~TCB_FILTERED;
if (hide_log(tcp)) {
- return 0;
+ goto maybe_ad_hoc_tamper;
}
if (tcp->qual_flg & QUAL_INJECT)
@@ -750,6 +819,11 @@ syscall_entering_trace(struct tcb *tcp, unsigned int *sig)
? printargs(tcp) : tcp->s_ent->sys_func(tcp);
fflush(tcp->outf);
return res;
+
+maybe_ad_hoc_tamper:
+ if (syscall_ad_hoc_injected(tcp))
+ tamper_with_syscall_entering(tcp, sig);
+ return 0;
}
void
@@ -790,21 +864,28 @@ syscall_exiting_decode(struct tcb *tcp, struct timeval *ptv)
}
#endif
- if (filtered(tcp) || hide_log(tcp))
+ if ((filtered(tcp) || hide_log(tcp))
+ && !(tcp->qual_flg & QUAL_HOOK_EXIT) && !syscall_ad_hoc_injected(tcp))
return 0;
get_regs(tcp->pid);
#if SUPPORTED_PERSONALITIES > 1
update_personality(tcp, tcp->currpers);
#endif
- return get_regs_error ? -1 : get_syscall_result(tcp);
+ if (get_regs_error || get_syscall_result(tcp) == -1)
+ return -1;
+
+ if (syserror(tcp) && syscall_tampered(tcp))
+ tamper_with_syscall_exiting(tcp);
+
+ return 1;
}
int
syscall_exiting_trace(struct tcb *tcp, struct timeval tv, int res)
{
- if (syserror(tcp) && syscall_tampered(tcp))
- tamper_with_syscall_exiting(tcp);
+ if (filtered(tcp) || hide_log(tcp))
+ return 0;
if (cflag) {
count_syscall(tcp, &tv);
@@ -1013,7 +1094,7 @@ syscall_exiting_trace(struct tcb *tcp, struct timeval tv, int res)
void
syscall_exiting_finish(struct tcb *tcp)
{
- tcp->flags &= ~(TCB_INSYSCALL | TCB_TAMPERED);
+ tcp->flags &= ~(TCB_INSYSCALL | TCB_TAMPERED | TCB_AD_HOC_INJECT);
tcp->sys_func_rval = 0;
free_tcb_priv_data(tcp);
}
diff --git a/syscall_class.h b/syscall_class.h
new file mode 100644
index 00000000..7bdd0cb2
--- /dev/null
+++ b/syscall_class.h
@@ -0,0 +1,19 @@
+#if !defined(STRACE_SYSCALL_CLASS_H) || defined(FFI_CDEF)
+#ifndef FFI_CDEF
+# define STRACE_SYSCALL_CLASS_H
+#endif
+
+#include "ffi.h"
+
+FFI_CONTENT(
+struct syscall_class {
+ const char *name;
+ unsigned int value;
+};
+)
+
+#ifndef FFI_CDEF
+extern const struct syscall_class syscall_classes[];
+#endif
+
+#endif /* !defined(STRACE_SYSCALL_CLASS_H) || defined(FFI_CDEF) */
diff --git a/sysent.h b/sysent.h
index 92de7468..3409d296 100644
--- a/sysent.h
+++ b/sysent.h
@@ -1,13 +1,30 @@
-#ifndef STRACE_SYSENT_H
-#define STRACE_SYSENT_H
+#if !defined(STRACE_SYSENT_H) || defined(FFI_CDEF)
+#ifndef FFI_CDEF
+# define STRACE_SYSENT_H
+#endif
+#include "ffi.h"
+
+FFI_CONTENT(
typedef struct sysent {
unsigned nargs;
int sys_flags;
int sen;
+)
+/* We don't want to expose sys_func to LuaJIT */
+#ifdef FFI_CDEF
+FFI_CONTENT(
+ void *priv;
+)
+#else
+FFI_CONTENT(
int (*sys_func)();
+)
+#endif
+FFI_CONTENT(
const char *sys_name;
} struct_sysent;
+)
#define TRACE_FILE 00000001 /* Trace file-related syscalls. */
#define TRACE_IPC 00000002 /* Trace IPC-related syscalls. */
@@ -29,4 +46,4 @@ typedef struct sysent {
#define TRACE_FSTAT 00400000 /* Trace *fstat{,at}{,64} syscalls. */
#define TRACE_STAT_LIKE 01000000 /* Trace *{,l,f}stat{,x,at}{,64} syscalls. */
-#endif /* !STRACE_SYSENT_H */
+#endif /* !defined(STRACE_SYSENT_H) || defined(FFI_CDEF) */
--
2.11.0
More information about the Strace-devel
mailing list