On Thu, 2006-04-20 at 16:17 +0200, Bodo Stroesser wrote: > Heiko Carstens wrote: > >>Add PTRACE_SYSCALL_MASK, which allows system calls to be selectively > >>traced. It takes a bitmask and a length. A system call is traced > >>if its bit is one. Otherwise, it executes normally, and is > >>invisible to the ptracing parent. > >>[...] > >>+int set_syscall_mask(struct task_struct *child, char __user *mask, > >>+ unsigned long len) > >>+{ > >>+ int i, n = (NR_syscalls + 7) / 8; > >>+ char c; > >>+ > >>+ if(len > n){ > >>+ for(i = NR_syscalls; i < len * 8; i++){ > >>+ get_user(c, &mask[i / 8]); > >>+ if(!(c & (1 << (i % 8)))){ > >>+ printk("Out of range syscall at %d\n", i); > >>+ return -EINVAL; > >>+ } > >>+ } > >>+ > >>+ len = n; > >>+ } > > > > > > Since it's quite likely that len > n will be true (e.g. after installing the > > latest version of your debug tool) it would be better to silently ignore all > > bits not within the range of NR_syscalls. > > There is no point in flooding the console. The tracing process won't see any > > of the non existant syscalls it requested to see anyway. > > Shouldn't 'len' better be the number of bits in the mask than the number of > chars? > Assume a syscall newly added to UML would be a candidate for processing on > the host, > but the incremented NR_syscalls still would result in the same number of > bytes. Also > assume, host doesn't yet have that new syscall. Current implementation > doesn't catch > the fact, that host can't execute that syscall. > > OTOH, I think UML shouldn't send the entire mask, but relevant part only. The > missing > end is filled with 0xff by host anyway. So it would be enough to send the > mask up to the > highest bit representing a syscall, that needs to be executed by host. > (currently, that > is __NR_gettimeofday). If UML would do so, no more problem results from UML > having > a higher NR_syscall than the host (as long as the new syscalls are to be > intercepted > and executed by UML) > > A greater problem might be a process in UML, that calls an invalid syscall > number. AFAICS > syscall number (orig_eax) isn't checked before it is used in do_syscall_trace > to address > syscall_mask. This might result in a crash. I have a similar local patch that I've been using. I think it would be worthwhile to have an extra bit in the bitmap that says what to do with calls that fall outside the range [0, __NR_syscall]. That way the ptrace monitor can decide whether it is useful to get informed of these "bogus" calls.
Charles ------------------------------------------------------- Using Tomcat but need to do more? Need to support web services, security? Get stuff done quickly with pre-integrated technology to make your job easier Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642 _______________________________________________ User-mode-linux-devel mailing list User-mode-linux-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/user-mode-linux-devel