On Fri, Jul 14, 2017 at 09:55:31PM +0700, Nikolay Marchuk wrote: > This change introduces new filtering architecture primitives: filter, > filter_action and bool_expression. It also changes processing of -e > strace option. In which way? My understanding was that only implementation is what has changed, not the behaviour.
> Now, filtering is done after decoding of syscall and > tcp->qual_flg stores filtering results. Also this change moves testing "This change also moves" > syscall set syntax into separate file. "testing of syscall set syntax" "into a separate file" Btw, I see no reason for this test split being part of this commit; it's better to move this change in a separate commit. > > * basic_actions.c: New file. > * basic_filters.c: Rename functions, add new filters' functions. "Rename qualify_* functions to parse_*. Add {parse,run,free}_{syscall,fd}_filter functions." or, better: "(qualify_syscall_number): Rename to parse_syscall_number. (qualify_syscall_regex): Rename to parse_syscall_regex. (qualify_syscall_class): Rename to parse_syscall_class. (qualify_syscall_name): Rename to parse_syscall_name. (qualify_syscall): Rename to parse_syscall. (qualify_syscall_tokens): Rename to parse_syscall_set, make static, remove "name" argument (assume "system call"). (qualify_tokes): Rename to parse_set. (qualify_read): Rename to parse_read. (qualify_write): Rename to parse_write. (qualify_trace): Rename to parse_trace. (qualify_abbrev): Rename to parse_abbrev. (qualify_verbose): Rename to parse_verbose. (qualify_raw): Rename to parse_raw. (qualify_inject_common): Rename to parse_inject_common. (qualify_fault): Rename to parse_fault. (qualify_inject): Rename to parse_inject. (parse_syscall_filter, parse_fd_filter, run_syscall_filter, run_fd_filter, free_syscall_filter, free_fd_filter): New functions." There's also the fact that add_number_to_set is now static is missing. Btw, there are two mentions of qualify_syscall function left in basic_filters.c which look odd now. > * defs.h (struct inject_opts): Add init flag. > (QUAL_READ, QUAL_WRITE): Change description. > (read_set, write_set): Remove global set variables. > (qualify, qual_flags): Remove old declarations ... > (filter_syscall, parse_qualify_filter, > filtering_parsing_finish): ... and add new declarations. > * filter.c: New file. > * filter.h: Change declarations. > * filter_action.c: New file. > * filter_expression.c: Likewise. > * filter_qualify.c: Generate new filters. Change inject/fault parsing. > * Makefile.am (strace_SOURCES): Add new files. > * strace.c (init): Use new filtering for -e option. > (trace_syscall): Add filtering after syscall decoding. > * syscall.c (decode_socket_subcall): Remove qual_flags from decoder. > (decode_ipc_subcall): Likewise. > (decode_mips_subcall): Likewise. > (get_scno): Likewise. > (inject_vec, tcb_inject_opts, tamper_with_syscall_entering, > tamper_with_syscall_exiting): Remove inject_vec support code. > (dumpio): Check tcp->qual_flg instead of global set. > * tests/qual_fault-syntax.test: Remove syscall set syntax testing > * tests/qual_inject-syntax.test: Likewise. > * tests/filtering_syscall-syntax.test: Add new file. > * tests/Makefile.am (MISC_TESTS): Add filtering_syscall-syntax.test. Changes in tests/options-syntax.test are not mentioned here. > --- > Makefile.am | 4 + > basic_actions.c | 144 +++++++++++++++++++++++ > basic_filters.c | 96 ++++++++++++---- > defs.h | 14 ++- > filter.c | 142 +++++++++++++++++++++++ > filter.h | 39 ++++++- > filter_action.c | 215 +++++++++++++++++++++++++++++++++++ > filter_expression.c | 132 +++++++++++++++++++++ > filter_qualify.c | 221 > +++++++++++++++--------------------- > strace.c | 20 ++-- > syscall.c | 20 +--- > tests/Makefile.am | 1 + > tests/filtering_syscall-syntax.test | 105 +++++++++++++++++ > tests/options-syntax.test | 17 --- > tests/qual_fault-syntax.test | 17 +-- > tests/qual_inject-syntax.test | 18 +-- > 16 files changed, 970 insertions(+), 235 deletions(-) > create mode 100644 basic_actions.c > create mode 100644 filter.c > create mode 100644 filter_action.c > create mode 100644 filter_expression.c > create mode 100755 tests/filtering_syscall-syntax.test > > diff --git a/Makefile.am b/Makefile.am > index 3d85d79..ddc1fed 100644 > --- a/Makefile.am > +++ b/Makefile.am > @@ -86,6 +86,7 @@ strace_SOURCES = \ > affinity.c \ > aio.c \ > alpha.c \ > + basic_actions.c \ > basic_filters.c \ > bind.c \ > bjm.c \ > @@ -131,7 +132,10 @@ strace_SOURCES = \ > fetch_struct_statfs.c \ > file_handle.c \ > file_ioctl.c \ > + filter_action.c \ > + filter_expression.c \ > filter_qualify.c \ > + filter.c \ > filter.h \ > flock.c \ > flock.h \ > diff --git a/basic_actions.c b/basic_actions.c > new file mode 100644 > index 0000000..ae65059 > --- /dev/null > +++ b/basic_actions.c > @@ -0,0 +1,143 @@ > +/* > + * Copyright (c) 2017 Nikolay Marchuk <marchuk.nikola...@gmail.com> > + * All rights reserved. > + * > + * Redistribution and use in source and binary forms, with or without > + * modification, are permitted provided that the following conditions > + * are met: > + * 1. Redistributions of source code must retain the above copyright > + * notice, this list of conditions and the following disclaimer. > + * 2. Redistributions in binary form must reproduce the above copyright > + * notice, this list of conditions and the following disclaimer in the > + * documentation and/or other materials provided with the distribution. > + * 3. The name of the author may not be used to endorse or promote products > + * derived from this software without specific prior written permission. > + * > + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR > + * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES > + * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. > + * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, > + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT > + * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, > + * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY > + * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT > + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF > + * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. > + */ > +#include "defs.h" > +#include "filter.h" > + > +bool > +is_traced(struct tcb *tcp) > +{ > + return (tcp->qual_flg & QUAL_TRACE); > +} > + > +bool > +not_injected(struct tcb *tcp) > +{ > + return !(tcp->qual_flg & QUAL_INJECT); > +} > + > +void * > +parse_null(const char *str) > +{ > + return NULL; > +} > + > +void > +free_null(void *_priv_data) > +{ > + return; > +} > + > +void > +apply_trace(struct tcb *tcp, void *_priv_data) > +{ > + tcp->qual_flg |= QUAL_TRACE; > +} > + > +void > +apply_inject(struct tcb *tcp, void *_priv_data) > +{ > + struct inject_opts *opts = _priv_data; Missing empty line after declarations. > + tcp->qual_flg |= QUAL_INJECT; > + if (!tcp->inject_vec[current_personality]) > + tcp->inject_vec[current_personality] = > + xcalloc(nsyscalls, sizeof(struct inject_opts)); > + if (scno_in_range(tcp->scno) > + && !tcp->inject_vec[current_personality][tcp->scno].init) > + tcp->inject_vec[current_personality][tcp->scno] = *opts; > +} > + > +static void * > +parse_inject_common(const char *str, bool fault_tokens_only, > + const char *description) > +{ > + struct inject_opts *opts = xmalloc(sizeof(struct inject_opts)); > + char *buf = xstrdup(str); Missing empty line after declarations. > + parse_inject_common_args(buf, opts, ";", fault_tokens_only); > + if (!opts->init) > + error_msg_and_die("invalid %s '%s'", description, str); > + free(buf); > + return opts; > +} > + > +void * > +parse_inject(const char *str) > +{ > + return parse_inject_common(str, false, "inject argument"); > +} > + > +void free_inject(void *_priv_data) > +{ > + free(_priv_data); > +} > + > +void > +apply_fault(struct tcb *tcp, void *_priv_data) > +{ > + apply_inject(tcp, _priv_data); > +} > + > +void * > +parse_fault(const char *str) > +{ > + return parse_inject_common(str, true, "fault argument"); > +} > + > +void > +free_fault(void *_priv_data) > +{ > + free_inject(_priv_data); > +} > + > +void > +apply_read(struct tcb *tcp, void *_priv_data) > +{ > + tcp->qual_flg |= QUAL_READ; > +} > + > +void > +apply_write(struct tcb *tcp, void *_priv_data) > +{ > + tcp->qual_flg |= QUAL_WRITE; > +} > + > +void > +apply_raw(struct tcb *tcp, void *_priv_data) > +{ > + tcp->qual_flg |= QUAL_RAW; > +} > + > +void > +apply_abbrev(struct tcb *tcp, void *_priv_data) > +{ > + tcp->qual_flg |= QUAL_ABBREV; > +} > + > +void > +apply_verbose(struct tcb *tcp, void *_priv_data) > +{ > + tcp->qual_flg |= QUAL_VERBOSE; > +} > diff --git a/basic_filters.c b/basic_filters.c > index 316b733..d8842b5 100644 > --- a/basic_filters.c > +++ b/basic_filters.c > @@ -48,7 +48,8 @@ number_setbit(const unsigned int i, number_slot_t *const > vec) > static bool > number_isset(const unsigned int i, const number_slot_t *const vec) > { > - return vec[i / BITS_PER_SLOT] & ((number_slot_t) 1 << (i % > BITS_PER_SLOT)); > + return (vec[i / BITS_PER_SLOT] > + & ((number_slot_t) 1 << (i % BITS_PER_SLOT))) ? true : false; > } > > static void > @@ -62,7 +63,7 @@ reallocate_number_set(struct number_set *const set, const > unsigned int new_nslot > set->nslots = new_nslots; > } > > -void > +static void > add_number_to_set(const unsigned int number, struct number_set *const set) > { > reallocate_number_set(set, number / BITS_PER_SLOT + 1); > @@ -77,7 +78,7 @@ is_number_in_set(const unsigned int number, const struct > number_set *const set) > } > > static bool > -qualify_syscall_number(const char *s, struct number_set *set) > +parse_syscall_number(const char *s, struct number_set *set) > { > int n = string_to_uint(s); > if (n < 0) > @@ -108,7 +109,7 @@ regerror_msg_and_die(int errcode, const regex_t *preg, > } > > static bool > -qualify_syscall_regex(const char *s, struct number_set *set) > +parse_syscall_regex(const char *s, struct number_set *set) > { > regex_t preg; > int rc; > @@ -180,7 +181,7 @@ lookup_class(const char *s) > } > > static bool > -qualify_syscall_class(const char *s, struct number_set *set) > +parse_syscall_class(const char *s, struct number_set *set) > { > const unsigned int n = lookup_class(s); > if (!n) > @@ -203,7 +204,7 @@ qualify_syscall_class(const char *s, struct number_set > *set) > } > > static bool > -qualify_syscall_name(const char *s, struct number_set *set) > +parse_syscall_name(const char *s, struct number_set *set) > { > unsigned int p; > bool found = false; > @@ -225,7 +226,7 @@ qualify_syscall_name(const char *s, struct number_set > *set) > } > > static bool > -qualify_syscall(const char *token, struct number_set *set) > +parse_syscall(const char *token, struct number_set *set) > { > bool ignore_fail = false; > > @@ -234,11 +235,11 @@ qualify_syscall(const char *token, struct number_set > *set) > ignore_fail = true; > } > if (*token >= '0' && *token <= '9') > - return qualify_syscall_number(token, set) || ignore_fail; > + return parse_syscall_number(token, set) || ignore_fail; > if (*token == '/') > - return qualify_syscall_regex(token + 1, set) || ignore_fail; > - return qualify_syscall_class(token, set) > - || qualify_syscall_name(token, set) > + return parse_syscall_regex(token + 1, set) || ignore_fail; > + return parse_syscall_class(token, set) > + || parse_syscall_name(token, set) > || ignore_fail; > } > > @@ -246,9 +247,8 @@ qualify_syscall(const char *token, struct number_set *set) > * Add syscall numbers to SETs for each supported personality > * according to STR specification. > */ > -void > -qualify_syscall_tokens(const char *const str, struct number_set *const set, > - const char *const name) > +static void > +parse_syscall_set(const char *const str, struct number_set *const set) > { > /* Clear all sets. */ > unsigned int p; > @@ -298,25 +298,49 @@ handle_inversion: > > for (token = strtok_r(copy, ",", &saveptr); token; > token = strtok_r(NULL, ",", &saveptr)) { > - done = qualify_syscall(token, set); > + done = parse_syscall(token, set); > if (!done) { > - error_msg_and_die("invalid %s '%s'", name, token); > + error_msg_and_die("invalid system call '%s'", token); > } > } > > free(copy); > > if (!done) { > - error_msg_and_die("invalid %s '%s'", name, str); > + error_msg_and_die("invalid system call '%s'", str); > } > } > > -/* > - * Add numbers to SET according to STR specification. > - */ > +void* > +parse_syscall_filter(const char *str) > +{ > + struct number_set *set = xcalloc(SUPPORTED_PERSONALITIES, > + sizeof(struct number_set)); Missing empty line after declaration. > + parse_syscall_set(str, set); > + return set; > +} > + > +bool > +run_syscall_filter(struct tcb *tcp, void *_priv_data) > +{ > + struct number_set *set = _priv_data; Missing empty line after declaration. > + return is_number_in_set(tcp->scno, &set[current_personality]); > +} > + > +void > +free_syscall_filter(void *_priv_data) > +{ > + struct number_set *set = _priv_data; > + unsigned int p; Missing empty line after declarations. > + for (p = 0; p < SUPPORTED_PERSONALITIES; ++p) { > + free(set[p].vec); > + } > + free(set); > +} > + > void > -qualify_tokens(const char *const str, struct number_set *const set, > - string_to_uint_func func, const char *const name) > +parse_set(const char *const str, struct number_set *const set, > + string_to_uint_func func, const char *const name) > { > /* Clear the set. */ > if (set->nslots) > @@ -373,3 +397,31 @@ handle_inversion: > error_msg_and_die("invalid %s '%s'", name, str); > } > } > + > +void* > +parse_fd_filter(const char *str) > +{ > + struct number_set *set = xmalloc(sizeof(struct number_set)); Missing empty line after declaration. > + memset(set, 0, sizeof(struct number_set)); > + parse_set(str, set, string_to_uint, "descriptor"); > + return set; > +} > + > +bool > +run_fd_filter(struct tcb *tcp, void *_priv_data) > +{ > + int fd = tcp->u_arg[0]; Missing empty line after declaration. > + if (fd < 0) > + return false; > + struct number_set *set = _priv_data; > + return is_number_in_set(fd, set); > +} > + > +void > +free_fd_filter(void *_priv_data) > +{ > + struct number_set *set = _priv_data; Missing empty line after declaration. > + free(set->vec); > + free(set); > + return; > +} > diff --git a/defs.h b/defs.h > index 21f1704..b03693d 100644 > --- a/defs.h > +++ b/defs.h > @@ -202,6 +202,7 @@ struct inject_opts { > uint16_t step; > uint16_t signo; > int rval; > + bool init; > }; > > #define MAX_ERRNO_VALUE 4095 > @@ -271,8 +272,8 @@ struct tcb { > #define QUAL_RAW 0x008 /* print all args in hex for this syscall */ > #define QUAL_INJECT 0x010 /* tamper with this system call on purpose */ > #define QUAL_SIGNAL 0x100 /* report events with this signal */ > -#define QUAL_READ 0x200 /* dump data read from this file descriptor */ > -#define QUAL_WRITE 0x400 /* dump data written to this file descriptor */ > +#define QUAL_READ 0x200 /* dump data read in this syscall */ > +#define QUAL_WRITE 0x400 /* dump data written in this syscall */ > > #define DEFAULT_QUAL_FLAGS (QUAL_TRACE | QUAL_ABBREV | QUAL_VERBOSE) > > @@ -281,6 +282,8 @@ struct tcb { > #define syserror(tcp) ((tcp)->u_error != 0) > #define verbose(tcp) ((tcp)->qual_flg & QUAL_VERBOSE) > #define abbrev(tcp) ((tcp)->qual_flg & QUAL_ABBREV) > +#define dump_read(tcp) ((tcp)->qual_flg & QUAL_READ) > +#define dump_write(tcp) ((tcp)->qual_flg & QUAL_WRITE) > #define filtered(tcp) ((tcp)->flags & TCB_FILTERED) > #define hide_log(tcp) ((tcp)->flags & TCB_HIDE_LOG) > > @@ -676,13 +679,12 @@ print_struct_statfs64(struct tcb *, kernel_ulong_t > addr, kernel_ulong_t size); > extern void print_ifindex(unsigned int); > > struct number_set; > -extern struct number_set read_set; > -extern struct number_set write_set; > extern struct number_set signal_set; > > extern bool is_number_in_set(unsigned int number, const struct number_set *); > -extern void qualify(const char *); > -extern unsigned int qual_flags(const unsigned int); > +extern void filtering_parsing_finish(void); > +extern void filter_syscall(struct tcb *); > +extern void parse_qualify_filter(const char *); > > #define DECL_IOCTL(name) \ > extern int \ > diff --git a/filter.c b/filter.c > new file mode 100644 > index 0000000..05382b7 > --- /dev/null > +++ b/filter.c > @@ -0,0 +1,142 @@ > +/* > + * Copyright (c) 2017 Nikolay Marchuk <marchuk.nikola...@gmail.com> > + * All rights reserved. > + * > + * Redistribution and use in source and binary forms, with or without > + * modification, are permitted provided that the following conditions > + * are met: > + * 1. Redistributions of source code must retain the above copyright > + * notice, this list of conditions and the following disclaimer. > + * 2. Redistributions in binary form must reproduce the above copyright > + * notice, this list of conditions and the following disclaimer in the > + * documentation and/or other materials provided with the distribution. > + * 3. The name of the author may not be used to endorse or promote products > + * derived from this software without specific prior written permission. > + * > + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR > + * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES > + * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. > + * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, > + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT > + * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, > + * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY > + * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT > + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF > + * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. > + */ > +#include "defs.h" > +#include <ctype.h> > +#include "filter.h" > + > +#define DECL_FILTER(name) \ > +extern void * > \ > +parse_ ## name ## _filter(const char *); \ > +extern bool \ > +run_ ## name ## _filter(struct tcb *, void *); > \ > +extern void \ > +free_ ## name ## _filter(void *) Missing indentation of the macro definition. > +DECL_FILTER(syscall); > +DECL_FILTER(fd); > +#undef DECL_FILTER > + > +#define FILTER_TYPE(name) \ > +{#name, parse_ ## name ## _filter, run_ ## name ## _filter, \ > + free_ ## name ## _filter} Missing indentation of the macro definition. > + > +static const struct filter_type { > + const char *name; > + void *(*parse_filter)(const char *); > + bool (*run_filter)(struct tcb *, void *); > + void (*free_priv_data)(void *); > +} filter_types[] = { > + FILTER_TYPE(syscall), > + FILTER_TYPE(fd) > +}; > + > +#undef FILTER_TYPE > + > +struct filter { > + const struct filter_type *type; > + void *_priv_data; > +}; > + > +static const struct filter_type * > +lookup_filter_type(const char *str) > +{ > + unsigned int i; Missing empty line after declaration. > + for (i = 0; i < ARRAY_SIZE(filter_types); i++) { > + const char *name = filter_types[i].name; Missing empty line after declaration. > + if (!strcmp(name, str)) { > + return &filter_types[i]; > + } Curly braces may be omitted here. > + } > + return NULL; > +} > + > +struct filter * > +add_filter_to_array(struct filter **filters, unsigned int *nfilters, > + const char *name) > +{ > + const struct filter_type *type = lookup_filter_type(name); Missing empty line after declaration. > + if (!type) > + error_msg_and_die("invalid filter '%s'", name); > + *filters = xreallocarray(*filters, ++(*nfilters), > + sizeof(struct filter)); > + struct filter *filter = &((*filters)[*nfilters - 1]); > + filter->type = type; > + return filter; > +} > + > +void > +parse_filter(struct filter *filter, const char *str) > +{ > + filter->_priv_data = filter->type->parse_filter(str); > +} > + > +static bool > +run_filter(struct tcb *tcp, struct filter *filter) > +{ > + return filter->type->run_filter(tcp, filter->_priv_data); > +} > + > +void > +run_filters(struct tcb *tcp, struct filter *filters, unsigned int nfilters) > +{ > + unsigned int i; Missing empty line after declaration. > + for (i = 0; i < nfilters; ++i) { > + variables_buf[i] = run_filter(tcp, &filters[i]); > + } Curly braces may be omitted here. > +} > + > +void > +free_filter(struct filter *filter) > +{ > + if (!filter) > + return; > + filter->type->free_priv_data(filter->_priv_data); > +} > + > +void * > +get_filter_priv_data(struct filter *filter) > +{ > + return filter ? filter->_priv_data : NULL; > +} > + > +void > +set_filter_priv_data(struct filter *filter, void *_priv_data) > +{ > + if (filter) > + filter->_priv_data = _priv_data; > +} > + > +void > +set_filters_qualify_mode(struct filter **filters, unsigned int *nfilters) > +{ > + unsigned int i; Missing empty line after declaration. > + for (i = 0; i < *nfilters - 1; ++i) { > + free_filter(*filters + i); > + } Curly braces may be omitted here. > + (*filters)[0] = (*filters)[*nfilters - 1]; > + *filters = xreallocarray(*filters, 1, sizeof(struct filter)); > + *nfilters = 1; > +} > diff --git a/filter.h b/filter.h > index a798199..7525b15 100644 > --- a/filter.h > +++ b/filter.h > @@ -28,11 +28,40 @@ > # define STRACE_FILTER_H > # include "defs.h" > > +struct filter; > + > +struct filter_action; > + > +struct bool_expression; > + > +extern bool *variables_buf; > + > typedef int (*string_to_uint_func)(const char *); > +void parse_set(const char *const, struct number_set *const, > + string_to_uint_func, const char *const); > +void parse_inject_common_args(char *, struct inject_opts *, const char > *delim, > + const bool fault_tokens_only); > + > +/* filter api */ > +struct filter* add_filter_to_array(struct filter **, unsigned int *nfilters, > + const char *name); > +void parse_filter(struct filter *, const char *str); > +void run_filters(struct tcb *, struct filter *, unsigned int); > +void free_filter(struct filter *); > +void *get_filter_priv_data(struct filter *); > +void set_filter_priv_data(struct filter *, void *); > +void set_filters_qualify_mode(struct filter **, unsigned int *nfilters); > + > +/* filter action api */ > +struct filter *create_filter(struct filter_action *, const char *name); > +struct filter_action *find_or_add_action(const char *); > +void *get_filter_action_priv_data(struct filter_action *); > +void set_filter_action_priv_data(struct filter_action *, void *); > +void set_qualify_mode(struct filter_action *); > + > +/* filter expression api */ > +struct bool_expression *create_expression(); > +bool run_expression(struct bool_expression *, unsigned int, bool *); > +void set_expression_qualify_mode(struct bool_expression *); > > -void add_number_to_set(const unsigned int, struct number_set *const); > -void qualify_tokens(const char *const, struct number_set *const, > - string_to_uint_func, const char *const); > -void qualify_syscall_tokens(const char *const, struct number_set *const, > - const char *const); > #endif > diff --git a/filter_action.c b/filter_action.c > new file mode 100644 > index 0000000..3bd3d0c > --- /dev/null > +++ b/filter_action.c > @@ -0,0 +1,215 @@ > +/* > + * Copyright (c) 2017 Nikolay Marchuk <marchuk.nikola...@gmail.com> > + * All rights reserved. > + * > + * Redistribution and use in source and binary forms, with or without > + * modification, are permitted provided that the following conditions > + * are met: > + * 1. Redistributions of source code must retain the above copyright > + * notice, this list of conditions and the following disclaimer. > + * 2. Redistributions in binary form must reproduce the above copyright > + * notice, this list of conditions and the following disclaimer in the > + * documentation and/or other materials provided with the distribution. > + * 3. The name of the author may not be used to endorse or promote products > + * derived from this software without specific prior written permission. > + * > + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR > + * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES > + * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. > + * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, > + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT > + * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, > + * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY > + * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT > + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF > + * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. > + */ Missing empty line. > +#include "defs.h" > +#include <ctype.h> > +#include "filter.h" > + > +#define DECL_FILTER_ACTION(name) \ > +extern void \ > +apply_ ## name(struct tcb *, void *) Missing indentation of the macro definition. > +DECL_FILTER_ACTION(trace); > +DECL_FILTER_ACTION(inject); > +DECL_FILTER_ACTION(fault); > +DECL_FILTER_ACTION(read); > +DECL_FILTER_ACTION(write); > +DECL_FILTER_ACTION(raw); > +DECL_FILTER_ACTION(abbrev); > +DECL_FILTER_ACTION(verbose); > +#undef DECL_FILTER_ACTION > + > +extern bool is_traced(struct tcb *); > +extern bool not_injected(struct tcb *); > + > +#define DECL_FILTER_ACTION_PARSER(name) > \ > +extern void * > \ > +parse_ ## name(const char *); > \ > +extern void \ > +free_ ## name(void *) Missing indentation of the macro definitions. > +DECL_FILTER_ACTION_PARSER(null); > +DECL_FILTER_ACTION_PARSER(inject); > +DECL_FILTER_ACTION_PARSER(fault); > +#undef DECL_FILTER_ACTION_PARSER > + > +#define FILTER_ACTION_TYPE(NAME, PRIORITY, PARSER, PREFILTER) > \ > +{#NAME, PRIORITY, parse_ ## PARSER, free_ ## PARSER, PREFILTER, apply_ ## > NAME} Missing indentation of the macro definition. > + > +static const struct filter_action_type { > + const char *name; > + unsigned int priority; > + void *(*parse_args)(const char *); > + void (*free_priv_data)(void *); > + bool (*prefilter)(struct tcb *); > + void (*apply)(struct tcb *, void *); > +} action_types[] = { > + FILTER_ACTION_TYPE(trace, 2, null, NULL), > + FILTER_ACTION_TYPE(inject, 2, inject, not_injected), > + FILTER_ACTION_TYPE(fault, 2, fault, not_injected), So, it is not allowed to write fault(open; when=+3), fault(open; when=+5)? That's a bummer. Well, yet another reason for converting syscall invocation counter from injection-specific option to general filter. > + FILTER_ACTION_TYPE(read, 1, null, is_traced), > + FILTER_ACTION_TYPE(write, 1, null, is_traced), > + FILTER_ACTION_TYPE(raw, 1, null, is_traced), > + FILTER_ACTION_TYPE(abbrev, 1, null, is_traced), > + FILTER_ACTION_TYPE(verbose, 1, null, is_traced) C99 allows for trailing commas in array initialisations, and it may be useful for cleaner future patches. > +}; > + > +#undef FILTER_ACTION_TYPE > + > +struct filter_action { > + /* Used to correct order of actions with same priority. */ > + unsigned int id; > + const struct filter_action_type *type; > + struct bool_expression *expr; > + unsigned int nfilters; > + struct filter *filters; > + void* _priv_data; void *_priv_data; > +}; > + > +static struct filter_action *filter_actions; > +static unsigned int nfilter_actions; > + > +bool *variables_buf; > + > +/* Compares actions priority. If actions have same priority, uses LIFO order > */ > +static int > +compare_action_priority(const void *a, const void *b) > +{ > + const struct filter_action *action_a = a; > + const struct filter_action *action_b = b; > + unsigned int priority_a = action_a->type->priority; > + unsigned int priority_b = action_b->type->priority; Missing empty line after declarations. > + if (priority_a != priority_b) { > + return (priority_a > priority_b) ? -1 : 1; > + } else { > + return (action_a->id > action_b->id) ? -1 : 1; > + } > +} > + > +void > +filtering_parsing_finish(void) > +{ > + qsort(filter_actions, nfilter_actions, sizeof(struct filter_action), > + &compare_action_priority); > + /* Allocate variables_buf sufficient for any action */ > + unsigned int maxfilters = 0; > + unsigned int i; Missing empty line after declarations. > + for (i = 0; i < nfilter_actions; ++i) { > + if (filter_actions[i].nfilters > maxfilters) > + maxfilters = filter_actions[i].nfilters; > + } > + variables_buf = xcalloc(maxfilters, sizeof(bool)); > +} > + > +static const struct filter_action_type * > +lookup_filter_action_type(const char *str) > +{ > + unsigned int i; Missing empty line after declaration. > + for (i = 0; i < ARRAY_SIZE(action_types); ++i) { > + const char *name = action_types[i].name; Missing empty line after declaration. > + if (!strcmp(name, str)) { > + return &action_types[i]; > + } Curly braces may be omitted here. > + } > + return NULL; > +} > + > +static struct filter_action * > +add_action(const struct filter_action_type *type) > +{ > + filter_actions = xreallocarray(filter_actions, ++nfilter_actions, > + sizeof(struct filter_action)); > + struct filter_action *action = &filter_actions[nfilter_actions - 1]; > + memset(action, 0, sizeof(*action)); > + action->id = nfilter_actions - 1; > + action->type = type; > + action->expr = create_expression(); > + return action; > +} > + > +struct filter_action * > +find_or_add_action(const char *name) > +{ > + const struct filter_action_type *type = lookup_filter_action_type(name); Missing empty line after declaration. > + if (!type) > + error_msg_and_die("invalid filter action '%s'", name); > + /* If action takes arguments, add new action */ > + if (type->parse_args != &parse_null) > + return add_action(type); > + unsigned int i; > + for (i = 0; i < nfilter_actions; i++) { > + if (filter_actions[i].type == type) > + return &filter_actions[i]; > + } > + return add_action(type); > +} > + > +static void > +run_filter_action(struct tcb *tcp, struct filter_action *action) > +{ > + if (action->type->prefilter && !action->type->prefilter(tcp)) > + return; > + run_filters(tcp, action->filters, action->nfilters); > + bool res = run_expression(action->expr, action->nfilters, > + variables_buf); > + if (res) { > + action->type->apply(tcp, action->_priv_data); > + } Missing empty line after declarations. > +} > + > +struct filter * > +create_filter(struct filter_action *action, const char *name) > +{ > + return add_filter_to_array(&action->filters, > + &action->nfilters, name); > +} > + > +void > +set_qualify_mode(struct filter_action *action) > +{ > + set_filters_qualify_mode(&action->filters, &action->nfilters); > + set_expression_qualify_mode(action->expr); > +} > + > +void > +filter_syscall(struct tcb *tcp) > +{ > + unsigned int i; Missing empty line after declaration. > + for (i = 0; i < nfilter_actions; i++) { > + run_filter_action(tcp, &filter_actions[i]); > + } Curly braces may be omitted here. > +} > + > +void * > +get_filter_action_priv_data(struct filter_action *action) > +{ > + return action ? action->_priv_data : NULL; > +} > + > +void > +set_filter_action_priv_data(struct filter_action *action, void *_priv_data) > +{ > + if (action) > + action->_priv_data = _priv_data; > +} > diff --git a/filter_expression.c b/filter_expression.c > new file mode 100644 > index 0000000..8a41783 > --- /dev/null > +++ b/filter_expression.c > @@ -0,0 +1,132 @@ > +/* > + * Copyright (c) 2017 Nikolay Marchuk <marchuk.nikola...@gmail.com> > + * All rights reserved. > + * > + * Redistribution and use in source and binary forms, with or without > + * modification, are permitted provided that the following conditions > + * are met: > + * 1. Redistributions of source code must retain the above copyright > + * notice, this list of conditions and the following disclaimer. > + * 2. Redistributions in binary form must reproduce the above copyright > + * notice, this list of conditions and the following disclaimer in the > + * documentation and/or other materials provided with the distribution. > + * 3. The name of the author may not be used to endorse or promote products > + * derived from this software without specific prior written permission. > + * > + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR > + * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES > + * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. > + * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, > + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT > + * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, > + * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY > + * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT > + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF > + * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. > + */ > +#include "defs.h" > + > +struct expression_token { > + enum token_type { > + TOK_VARIABLE, > + TOK_OPERATOR > + } type; > + union token_data { > + unsigned int variable_id; > + enum operator_type { > + OP_NOT, > + OP_AND, > + OP_OR > + } operator_id; > + } data; > +}; > + > +struct bool_expression { > + unsigned int ntokens; > + struct expression_token *tokens; > +}; > + > +struct bool_expression * > +create_expression(void) > +{ > + struct bool_expression *expr = xmalloc(sizeof(struct bool_expression)); > + memset(expr, 0, sizeof(struct bool_expression)); > + return expr; > +} > + > +static void > +reallocate_expression(struct bool_expression *const expr, > + const unsigned int new_ntokens) > +{ > + if (new_ntokens <= expr->ntokens) > + return; > + expr->tokens = xreallocarray(expr->tokens, new_ntokens, > + sizeof(*expr->tokens)); > + memset(expr->tokens + expr->ntokens, 0, > + sizeof(*expr->tokens) * (new_ntokens - expr->ntokens)); > + expr->ntokens = new_ntokens; > +} > + > +#define STACK_SIZE 32 > +static bool stack[STACK_SIZE]; > + > +void > +set_expression_qualify_mode(struct bool_expression *expr) > +{ > + if (!expr) > + error_msg_and_die("invalid expression"); > + reallocate_expression(expr, 1); > + expr->tokens[0].type = TOK_VARIABLE; > + expr->tokens[0].data.variable_id = 0; > +} > + > +bool > +run_expression(struct bool_expression *expr, > + unsigned int variables_num, bool *variables) > +{ > + /* Current stack index */ > + unsigned int index = 0; > + struct expression_token *tok = expr->tokens; > + struct expression_token *const tok_end = expr->tokens + expr->ntokens; Missing empty line after declarations. > + for (; tok != tok_end; ++tok) { You can initialize tok here. > + switch (tok->type) { > + case TOK_VARIABLE: > + if (index == STACK_SIZE) > + error_msg_and_die("stack overflow"); > + if (tok->data.variable_id >= variables_num) > + error_msg_and_die("corrupted filter " > + "expression"); > + stack[index] = variables[tok->data.variable_id]; > + index++; > + break; > + case TOK_OPERATOR: > + switch (tok->data.operator_id) { > + case OP_NOT: > + if (index == 0) > + error_msg_and_die("corrupted filter " > + "expression"); > + stack[index - 1] = !stack[index - 1]; > + break; > + case OP_AND: > + if (index < 2) > + error_msg_and_die("corrupted filter " > + "expression"); > + stack[index - 2] = stack[index - 2] > + && stack[index - 1]; > + --index; > + break; > + case OP_OR: > + if (index < 2) > + error_msg_and_die("corrupted filter " > + "expression"); > + stack[index - 2] = stack[index - 2] > + || stack[index - 1]; > + --index; > + break; > + } > + } > + } > + if (index != 1) It's not "index", but rather stack size. Index would be one less than that. > + error_msg_and_die("corrupted filter expression"); Taking into the account current state of filter expression parser, the only message "corrupted filter expression" doesn't seem to be helpful for figuring out what went wrong, It's probably a good idea to create error handler which prints stack/expression/position/etc along with more specific error message. > + return stack[0]; > +} > diff --git a/filter_qualify.c b/filter_qualify.c > index 32db332..7d65963 100644 > --- a/filter_qualify.c > +++ b/filter_qualify.c > @@ -38,16 +38,8 @@ struct number_set { > bool not; > }; > > -struct number_set read_set; > -struct number_set write_set; > struct number_set signal_set; > > -static struct number_set abbrev_set[SUPPORTED_PERSONALITIES]; > -static struct number_set inject_set[SUPPORTED_PERSONALITIES]; > -static struct number_set raw_set[SUPPORTED_PERSONALITIES]; > -static struct number_set trace_set[SUPPORTED_PERSONALITIES]; > -static struct number_set verbose_set[SUPPORTED_PERSONALITIES]; > - > static int > find_errno_by_name(const char *name) > { > @@ -156,174 +148,162 @@ parse_inject_token(const char *const token, struct > inject_opts *const fopts, > return true; > } > > -static char * > -parse_inject_expression(const char *const s, char **buf, > - struct inject_opts *const fopts, > - const bool fault_tokens_only) > +void > +parse_inject_common_args(char *str, struct inject_opts *const opts, > + const char *delim, const bool fault_tokens_only) > { > + opts->first = 1; > + opts->step = 1; > + opts->rval = INJECT_OPTS_RVAL_DEFAULT; > + opts->signo = 0; > + opts->init = false; Why code before declarations? > char *saveptr = NULL; > - char *name = NULL; > char *token; > - Why removing empty line after declarations? > - *buf = xstrdup(s); > - for (token = strtok_r(*buf, ":", &saveptr); token; > - token = strtok_r(NULL, ":", &saveptr)) { > - if (!name) > - name = token; > - else if (!parse_inject_token(token, fopts, fault_tokens_only)) > - goto parse_error; > + for (token = strtok_r(str, delim, &saveptr); token; > + token = strtok_r(NULL, delim, &saveptr)) { > + if (!parse_inject_token(token, opts, fault_tokens_only)) > + return; > } > - > - if (name) > - return name; > - > -parse_error: > - free(*buf); > - return *buf = NULL; > + /* If neither of retval, error, or signal is specified, then ... */ > + if (opts->rval == INJECT_OPTS_RVAL_DEFAULT && !opts->signo) { > + if (fault_tokens_only) { > + /* in fault= syntax the default error code is ENOSYS. */ > + opts->rval = -ENOSYS; > + } else { > + /* in inject= syntax this is not allowed. */ > + return; > + } > + } > + opts->init = true; > } > > static void > -qualify_read(const char *const str) > +parse_read(const char *const str) > { > - qualify_tokens(str, &read_set, string_to_uint, "descriptor"); > + struct filter_action *action = find_or_add_action("read"); > + struct filter *filter = create_filter(action, "fd"); Missing empty line after declarations. > + parse_filter(filter, str); > + set_qualify_mode(action); > } > > static void > -qualify_write(const char *const str) > +parse_write(const char *const str) > { > - qualify_tokens(str, &write_set, string_to_uint, "descriptor"); > + struct filter_action *action = find_or_add_action("write"); > + struct filter *filter = create_filter(action, "fd"); Missing empty line after declarations. > + parse_filter(filter, str); > + set_qualify_mode(action); > } > > static void > qualify_signals(const char *const str) > { > - qualify_tokens(str, &signal_set, sigstr_to_uint, "signal"); > + parse_set(str, &signal_set, sigstr_to_uint, "signal"); > } > > static void > -qualify_trace(const char *const str) > +parse_trace(const char *const str) > { > - qualify_syscall_tokens(str, trace_set, "system call"); > + struct filter_action *action = find_or_add_action("trace"); > + struct filter *filter = create_filter(action, "syscall"); Missing empty line after declarations. > + parse_filter(filter, str); > + set_qualify_mode(action); > } > > static void > -qualify_abbrev(const char *const str) > +parse_abbrev(const char *const str) > { > - qualify_syscall_tokens(str, abbrev_set, "system call"); > + struct filter_action *action = find_or_add_action("abbrev"); > + struct filter *filter = create_filter(action, "syscall"); Missing empty line after declarations. > + parse_filter(filter, str); > + set_qualify_mode(action); > } > > static void > -qualify_verbose(const char *const str) > +parse_verbose(const char *const str) > { > - qualify_syscall_tokens(str, verbose_set, "system call"); > + struct filter_action *action = find_or_add_action("verbose"); > + struct filter *filter = create_filter(action, "syscall"); Missing empty line after declarations. > + parse_filter(filter, str); > + set_qualify_mode(action); > } > > static void > -qualify_raw(const char *const str) > +parse_raw(const char *const str) > { > - qualify_syscall_tokens(str, raw_set, "system call"); > + struct filter_action *action = find_or_add_action("raw"); > + struct filter *filter = create_filter(action, "syscall"); Missing empty line after declarations. > + parse_filter(filter, str); > + set_qualify_mode(action); > } > > static void > -qualify_inject_common(const char *const str, > +parse_inject_common(const char *const str, > const bool fault_tokens_only, > const char *const description) Indentation of line continuations should be adjusted. > { > - struct inject_opts opts = { > - .first = 1, > - .step = 1, > - .rval = INJECT_OPTS_RVAL_DEFAULT, > - .signo = 0 > - }; > - char *buf = NULL; > - char *name = parse_inject_expression(str, &buf, &opts, > fault_tokens_only); > - if (!name) { > - error_msg_and_die("invalid %s '%s'", description, str); > - } > - > - /* If neither of retval, error, or signal is specified, then ... */ > - if (opts.rval == INJECT_OPTS_RVAL_DEFAULT && !opts.signo) { > - if (fault_tokens_only) { > - /* in fault= syntax the default error code is ENOSYS. */ > - opts.rval = -ENOSYS; > - } else { > - /* in inject= syntax this is not allowed. */ > - error_msg_and_die("invalid %s '%s'", description, str); > - } > + struct inject_opts *opts = xmalloc(sizeof(struct inject_opts)); > + char *buf = xstrdup(str); > + char *name = buf; > + char *args = strchr(buf, ':'); Missing empty line after declarations. > + if (!args) { > + args = NULL; Why setting args to NULL if it is 0 already? > + } else { > + *(args++) = '\0'; > } > > - struct number_set tmp_set[SUPPORTED_PERSONALITIES]; > - memset(tmp_set, 0, sizeof(tmp_set)); > - qualify_syscall_tokens(name, tmp_set, description); > - > - free(buf); > + struct filter_action *action = find_or_add_action("inject"); > + struct filter *filter = create_filter(action, "syscall"); > + parse_filter(filter, name); > + set_qualify_mode(action); > > - /* > - * Initialize inject_vec accourding to tmp_set. > - * Merge tmp_set into inject_set. > - */ > - unsigned int p; > - for (p = 0; p < SUPPORTED_PERSONALITIES; ++p) { > - if (!tmp_set[p].nslots && !tmp_set[p].not) { > - continue; > - } > - > - if (!inject_vec[p]) { > - inject_vec[p] = xcalloc(nsyscall_vec[p], > - sizeof(*inject_vec[p])); > - } > - > - unsigned int i; > - for (i = 0; i < nsyscall_vec[p]; ++i) { > - if (is_number_in_set(i, &tmp_set[p])) { > - add_number_to_set(i, &inject_set[p]); > - inject_vec[p][i] = opts; > - } > - } > - > - free(tmp_set[p].vec); > + parse_inject_common_args(args, opts, ":", fault_tokens_only); > + if (!opts->init) { > + error_msg_and_die("invalid %s '%s'", description, args); > } Curly braces may be omitted here. > + free(buf); > + set_filter_action_priv_data(action, opts); > } > > static void > -qualify_fault(const char *const str) > +parse_fault(const char *const str) > { > - qualify_inject_common(str, true, "fault argument"); > + parse_inject_common(str, true, "fault argument"); > } > > static void > -qualify_inject(const char *const str) > +parse_inject(const char *const str) > { > - qualify_inject_common(str, false, "inject argument"); > + parse_inject_common(str, false, "inject argument"); > } > > static const struct qual_options { > const char *name; > void (*qualify)(const char *); > } qual_options[] = { > - { "trace", qualify_trace }, > - { "t", qualify_trace }, > - { "abbrev", qualify_abbrev }, > - { "a", qualify_abbrev }, > - { "verbose", qualify_verbose }, > - { "v", qualify_verbose }, > - { "raw", qualify_raw }, > - { "x", qualify_raw }, > + { "trace", parse_trace }, > + { "t", parse_trace }, > + { "abbrev", parse_abbrev }, > + { "a", parse_abbrev }, > + { "verbose", parse_verbose }, > + { "v", parse_verbose }, > + { "raw", parse_raw }, > + { "x", parse_raw }, > { "signal", qualify_signals }, > { "signals", qualify_signals }, > { "s", qualify_signals }, > - { "read", qualify_read }, > - { "reads", qualify_read }, > - { "r", qualify_read }, > - { "write", qualify_write }, > - { "writes", qualify_write }, > - { "w", qualify_write }, > - { "fault", qualify_fault }, > - { "inject", qualify_inject }, > + { "read", parse_read }, > + { "reads", parse_read }, > + { "r", parse_read }, > + { "write", parse_write }, > + { "writes", parse_write }, > + { "w", parse_write }, > + { "fault", parse_fault }, > + { "inject", parse_inject }, > }; > > void > -qualify(const char *str) > +parse_qualify_filter(const char *str) > { > const struct qual_options *opt = qual_options; > unsigned int i; > @@ -342,18 +322,3 @@ qualify(const char *str) > > opt->qualify(str); > } > - > -unsigned int > -qual_flags(const unsigned int scno) > -{ > - return (is_number_in_set(scno, &trace_set[current_personality]) > - ? QUAL_TRACE : 0) > - | (is_number_in_set(scno, &abbrev_set[current_personality]) > - ? QUAL_ABBREV : 0) > - | (is_number_in_set(scno, &verbose_set[current_personality]) > - ? QUAL_VERBOSE : 0) > - | (is_number_in_set(scno, &raw_set[current_personality]) > - ? QUAL_RAW : 0) > - | (is_number_in_set(scno, &inject_set[current_personality]) > - ? QUAL_INJECT : 0); > -} > diff --git a/strace.c b/strace.c > index 955a1c9..6ad367a 100644 > --- a/strace.c > +++ b/strace.c > @@ -827,10 +827,11 @@ droptcb(struct tcb *tcp) > { > if (tcp->pid == 0) > return; > - > int p; > for (p = 0; p < SUPPORTED_PERSONALITIES; ++p) > - free(tcp->inject_vec[p]); > + if (tcp->inject_vec[p]) > + free(tcp->inject_vec[p]); > + > > free_tcb_priv_data(tcp); > > @@ -1636,13 +1637,13 @@ init(int argc, char *argv[]) > shared_log = stderr; > set_sortby(DEFAULT_SORTBY); > set_personality(DEFAULT_PERSONALITY); > - qualify("trace=all"); > - qualify("abbrev=all"); > - qualify("verbose=all"); > + parse_qualify_filter("trace=all"); > + parse_qualify_filter("abbrev=all"); > + parse_qualify_filter("verbose=all"); > #if DEFAULT_QUAL_FLAGS != (QUAL_TRACE | QUAL_ABBREV | QUAL_VERBOSE) > # error Bug in DEFAULT_QUAL_FLAGS > #endif > - qualify("signal=all"); > + parse_qualify_filter("signal=all"); > while ((c = getopt(argc, argv, > "+b:cCdfFhiqrtTvVwxyz" > #ifdef USE_LIBUNWIND > @@ -1709,7 +1710,7 @@ init(int argc, char *argv[]) > show_fd_path++; > break; > case 'v': > - qualify("abbrev=none"); > + parse_qualify_filter("abbrev=none"); > break; > case 'V': > print_version(); > @@ -1724,7 +1725,7 @@ init(int argc, char *argv[]) > error_opt_arg(c, optarg); > break; > case 'e': > - qualify(optarg); > + parse_qualify_filter(optarg); > break; > case 'o': > outfname = xstrdup(optarg); > @@ -1772,6 +1773,7 @@ init(int argc, char *argv[]) > break; > } > } > + filtering_parsing_finish(); > > argv += optind; > argc -= optind; > @@ -2470,6 +2472,8 @@ trace_syscall(struct tcb *tcp, unsigned int *sig) > case 0: > return 0; > case 1: > + if (!tcp->qual_flg) > + filter_syscall(tcp); > res = syscall_entering_trace(tcp, sig); > } > syscall_entering_finish(tcp, res); > diff --git a/syscall.c b/syscall.c > index 02626c7..07157f1 100644 > --- a/syscall.c > +++ b/syscall.c > @@ -382,7 +382,6 @@ decode_socket_subcall(struct tcb *tcp) > return; > > tcp->scno = scno; > - tcp->qual_flg = qual_flags(scno); > tcp->s_ent = &sysent[scno]; > > unsigned int i; > @@ -422,7 +421,6 @@ decode_ipc_subcall(struct tcb *tcp) > } > > tcp->scno = SYS_ipc_subcall + call; > - tcp->qual_flg = qual_flags(tcp->scno); > tcp->s_ent = &sysent[tcp->scno]; > > const unsigned int n = tcp->s_ent->nargs; > @@ -439,7 +437,6 @@ decode_mips_subcall(struct tcb *tcp) > if (!scno_is_valid(tcp->u_arg[0])) > return; > tcp->scno = tcp->u_arg[0]; > - tcp->qual_flg = qual_flags(tcp->scno); > tcp->s_ent = &sysent[tcp->scno]; > memmove(&tcp->u_arg[0], &tcp->u_arg[1], > sizeof(tcp->u_arg) - sizeof(tcp->u_arg[0])); > @@ -468,7 +465,7 @@ dumpio(struct tcb *tcp) > if (fd < 0) > return; > > - if (is_number_in_set(fd, &read_set)) { > + if (dump_read(tcp)) { > switch (tcp->s_ent->sen) { > case SEN_read: > case SEN_pread: > @@ -491,7 +488,7 @@ dumpio(struct tcb *tcp) > return; > } > } > - if (is_number_in_set(fd, &write_set)) { > + if (dump_write(tcp)) { > switch (tcp->s_ent->sen) { > case SEN_write: > case SEN_pwrite: > @@ -577,8 +574,6 @@ static void get_error(struct tcb *, const bool); > static int arch_set_error(struct tcb *); > static int arch_set_success(struct tcb *); > > -struct inject_opts *inject_vec[SUPPORTED_PERSONALITIES]; > - > static struct inject_opts * > tcb_inject_opts(struct tcb *tcp) > { > @@ -590,14 +585,6 @@ tcb_inject_opts(struct tcb *tcp) > static long > tamper_with_syscall_entering(struct tcb *tcp, unsigned int *signo) > { > - if (!tcp->inject_vec[current_personality]) { > - tcp->inject_vec[current_personality] = > - xcalloc(nsyscalls, sizeof(**inject_vec)); > - memcpy(tcp->inject_vec[current_personality], > - inject_vec[current_personality], > - nsyscalls * sizeof(**inject_vec)); > - } > - > struct inject_opts *opts = tcb_inject_opts(tcp); > > if (!opts || opts->first == 0) > @@ -1258,7 +1245,8 @@ get_scno(struct tcb *tcp) > > if (scno_is_valid(tcp->scno)) { > tcp->s_ent = &sysent[tcp->scno]; > - tcp->qual_flg = qual_flags(tcp->scno); > + /* Clear qual_flg to differ valid syscall from printargs */ > + tcp->qual_flg = 0; > } else { > struct sysent_buf *s = xcalloc(1, sizeof(*s)); > > diff --git a/tests/Makefile.am b/tests/Makefile.am > index 579c78a..0fdafe1 100644 > --- a/tests/Makefile.am > +++ b/tests/Makefile.am > @@ -247,6 +247,7 @@ MISC_TESTS = \ > detach-sleeping.test \ > detach-stopped.test \ > filter-unavailable.test \ > + filtering_syscall-syntax.test \ > get_regs.test \ > interactive_block.test \ > ksysent.test \ > diff --git a/tests/filtering_syscall-syntax.test > b/tests/filtering_syscall-syntax.test > new file mode 100755 > index 0000000..8f4158f > --- /dev/null > +++ b/tests/filtering_syscall-syntax.test > @@ -0,0 +1,105 @@ > +#!/bin/sh > +# > +# Check syscall set parsing syntax. > +# > +# Copyright (c) 2016-2017 Dmitry V. Levin <l...@altlinux.org> > +# Copyright (c) 2017 Nikolay Marchuk <marchuk.nikola...@gmail.com> > +# All rights reserved. > +# > +# Redistribution and use in source and binary forms, with or without > +# modification, are permitted provided that the following conditions > +# are met: > +# 1. Redistributions of source code must retain the above copyright > +# notice, this list of conditions and the following disclaimer. > +# 2. Redistributions in binary form must reproduce the above copyright > +# notice, this list of conditions and the following disclaimer in the > +# documentation and/or other materials provided with the distribution. > +# 3. The name of the author may not be used to endorse or promote products > +# derived from this software without specific prior written permission. > +# > +# THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR > +# IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES > +# OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. > +# IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, > +# INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT > +# NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, > +# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY > +# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT > +# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF > +# THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. > +. "${srcdir=.}/init.sh" > + > +check_exit_status_and_stderr() > +{ > + $STRACE "$@" 2> "$LOG" && > + dump_log_and_fail_with \ > + "strace $* failed to handle the error properly" > + match_diff "$LOG" "$EXP" || > + dump_log_and_fail_with \ > + "strace $* failed to print expected diagnostics" > +} > + > +check_exit_status_and_stderr_using_grep() > +{ > + $STRACE "$@" 2> "$LOG" && > + dump_log_and_fail_with \ > + "strace $* failed to handle the error properly" > + match_grep "$LOG" "$EXP" || > + dump_log_and_fail_with \ > + "strace $* failed to print expected diagnostics" > +} Since these two functions are used in more than one place now and look fairly general, they can be moved to init.sh. > + > +strace_exp="${STRACE##* }" > + > +check_e() > +{ > + local pattern="$1"; shift > + cat > "$EXP" << __EOF__ > +$strace_exp: $pattern > +__EOF__ > + check_exit_status_and_stderr "$@" > +} > + > +check_e_using_grep() > +{ > + local pattern="$1"; shift > + cat > "$EXP" << __EOF__ > +$strace_exp: $pattern > +__EOF__ > + check_exit_status_and_stderr_using_grep "$@" > +} > + > +# invalid syscall > +for arg in '' , ,, ,,, \! % \!, \ > + invalid_syscall_name \ > + -1 -2 -3 -4 -5\ > + 32767 \ > + 2147483647 \ > + 2147483648 \ > + 4294967295 \ > + 4294967296 \ > + /non_syscall \ > + %not_a_class \ > + ; do > + check_e "invalid system call '$arg'" -e "$arg" > +done > + > +# invalid syscall, multiple syscall > +for arg in file,nonsense \ > + \!desc,nonsense \ > + chdir,nonsense \ > + \!chdir,nonsense \ > + 1,nonsense \ > + \!1,nonsense \ > + ; do > + check_e "invalid system call 'nonsense'" -e "$arg" > +done > + > +# special cases > +check_e "invalid system call '!'" -e 1,\! This check is new, it should probably be mentioned. > + > +check_e_using_grep 'regcomp: \+id: [[:alpha:]].+' -e trace='/+id' > +check_e_using_grep 'regcomp: \*id: [[:alpha:]].+' -e trace='/*id' > +check_e_using_grep 'regcomp: \{id: [[:alpha:]].+' -e trace='/{id' > +check_e_using_grep 'regcomp: \(id: [[:alpha:]].+' -e trace='/(id' > +check_e_using_grep 'regcomp: \[id: [[:alpha:]].+' -e trace='/[id' > diff --git a/tests/options-syntax.test b/tests/options-syntax.test > index 7cfc579..6d8d91c 100755 > --- a/tests/options-syntax.test > +++ b/tests/options-syntax.test > @@ -87,17 +87,6 @@ check_e "Invalid process id: 'a'" -p 1,a > check_e "Syscall 'chdir' for -b isn't supported" -b chdir > check_e "Syscall 'chdir' for -b isn't supported" -b execve -b chdir > > -check_e "invalid system call '-1'" -e-1 > -check_e "invalid system call '-2'" -e -2 > -check_e "invalid system call '-3'" -etrace=-3 > -check_e "invalid system call '-4'" -e trace=-4 > -check_e "invalid system call '-5'" -e trace=1,-5 Note that these checks also check for various -e syntax variants. I do not see them in the new test. > -check_e "invalid system call '/non_syscall'" -e trace=/non_syscall > -check_e "invalid system call '2147483647'" -e 2147483647 > -check_e "invalid system call '2147483648'" -e 2147483648 > -check_e "invalid system call '4294967295'" -e 4294967295 > -check_e "invalid system call '4294967296'" -e 4294967296 > - > check_e "invalid descriptor '-1'" -eread=-1 > check_e "invalid descriptor '-42'" -ewrite=-42 > check_e "invalid descriptor '2147483648'" -eread=2147483648 > @@ -109,12 +98,6 @@ check_e "invalid descriptor '!'" -ewrite='!' > check_e "invalid descriptor '!'" -eread='0,!' > check_e "invalid descriptor '!,'" -ewrite='!,' > > -check_e_using_grep 'regcomp: \+id: [[:alpha:]].+' -e trace='/+id' > -check_e_using_grep 'regcomp: \*id: [[:alpha:]].+' -e trace='/*id' > -check_e_using_grep 'regcomp: \{id: [[:alpha:]].+' -e trace='/{id' > -check_e_using_grep 'regcomp: \(id: [[:alpha:]].+' -e trace='/(id' > -check_e_using_grep 'regcomp: \[id: [[:alpha:]].+' -e trace='/[id' > - > check_h 'must have PROG [ARGS] or -p PID' > check_h 'PROG [ARGS] must be specified with -D' -D -p $$ > check_h '-c and -C are mutually exclusive' -c -C true > diff --git a/tests/qual_fault-syntax.test b/tests/qual_fault-syntax.test > index 0cce539..384fcff 100755 > --- a/tests/qual_fault-syntax.test > +++ b/tests/qual_fault-syntax.test > @@ -40,16 +40,7 @@ fail_with() > "strace -e fault=$* failed to handle an argument error properly" > } > > -for arg in '' , ,, ,,, : :: ::: \! \!, \!: \ > - invalid_syscall_name \ > - invalid_syscall_name:when=3 \ > - -1 \!-1 \ > - -1:when=4 \ > - -2 \ > - -2:when=5 \ > - 32767 \!32767 \ > - 32767:when=6 \ I do not see these checks in the new test (as well as "'' , ,, ,,, : :: ::: \! \!, \!:"). > - chdir:42 \!chdir:42 \ > +for arg in chdir:42 \!chdir:42 \ > chdir:42:when=7 \ > chdir:invalid \ > chdir:invalid:when=8 \ > @@ -92,12 +83,6 @@ for arg in '' , ,, ,,, : :: ::: \! \!, \!: \ > chdir:when=65536:error=30 \ > chdir:when=1+65536 \ > chdir:when=1+65536:error=31 \ > - file,nonsense \ > - \!desc,nonsense \ > - chdir,nonsense \ > - \!chdir,nonsense \ > - 1,nonsense \ > - \!1,nonsense \ > chdir:retval=0 \ > chdir:signal=1 \ > chdir:error=1:error=2 \ > diff --git a/tests/qual_inject-syntax.test b/tests/qual_inject-syntax.test > index a9e44d7..19d589d 100755 > --- a/tests/qual_inject-syntax.test > +++ b/tests/qual_inject-syntax.test > @@ -40,17 +40,7 @@ fail_with() > "strace -e inject=$* failed to handle an argument error > properly" > } > > -for arg in '' , ,, ,,, : :: ::: \! \!, \!: \ > - invalid_syscall_name \ > - invalid_syscall_name:when=3 \ > - -1 \!-1 \ > - -1:when=4 \ > - -2 \ > - -2:when=5 \ > - 32767 \!32767 \ > - 32767:when=6 \ > - 42 \ Ditto here. > - chdir \ > +for arg in chdir \ > chdir:42 \!chdir:42 \ > chdir:42:when=7 \ > chdir:invalid \ > @@ -94,12 +84,6 @@ for arg in '' , ,, ,,, : :: ::: \! \!, \!: \ > chdir:when=65536:error=30 \ > chdir:when=1+65536 \ > chdir:when=1+65536:error=31 \ > - file,nonsense \ > - \!desc,nonsense \ > - chdir,nonsense \ > - \!chdir,nonsense \ > - 1,nonsense \ > - \!1,nonsense \ > chdir:retval=-1 \ > chdir:signal=0 \ > chdir:signal=129 \ > -- > 2.1.4 ------------------------------------------------------------------------------ Check out the vibrant tech community on one of the world's most engaging tech sites, Slashdot.org! http://sdm.link/slashdot _______________________________________________ Strace-devel mailing list Strace-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/strace-devel