| // SPDX-License-Identifier: GPL-2.0 |
| /* |
| * Augment syscalls with the contents of the pointer arguments. |
| * |
| * Test it with: |
| * |
| * perf trace -e tools/perf/examples/bpf/augmented_syscalls.c cat /etc/passwd > /dev/null |
| * |
| * It'll catch some openat syscalls related to the dynamic linked and |
| * the last one should be the one for '/etc/passwd'. |
| * |
| * This matches what is marshalled into the raw_syscall:sys_enter payload |
| * expected by the 'perf trace' beautifiers, and can be used by them, that will |
| * check if perf_sample->raw_data is more than what is expected for each |
| * syscalls:sys_{enter,exit}_SYSCALL tracepoint, uing the extra data as the |
| * contents of pointer arguments. |
| */ |
| |
| #include <stdio.h> |
| #include <linux/socket.h> |
| |
| /* bpf-output associated map */ |
| bpf_map(__augmented_syscalls__, PERF_EVENT_ARRAY, int, u32, __NR_CPUS__); |
| |
| struct syscall_exit_args { |
| unsigned long long common_tp_fields; |
| long syscall_nr; |
| long ret; |
| }; |
| |
| struct augmented_filename { |
| unsigned int size; |
| int reserved; |
| char value[256]; |
| }; |
| |
| #define augmented_filename_syscall(syscall) \ |
| struct augmented_enter_##syscall##_args { \ |
| struct syscall_enter_##syscall##_args args; \ |
| struct augmented_filename filename; \ |
| }; \ |
| int syscall_enter(syscall)(struct syscall_enter_##syscall##_args *args) \ |
| { \ |
| struct augmented_enter_##syscall##_args augmented_args = { .filename.reserved = 0, }; \ |
| unsigned int len = sizeof(augmented_args); \ |
| probe_read(&augmented_args.args, sizeof(augmented_args.args), args); \ |
| augmented_args.filename.size = probe_read_str(&augmented_args.filename.value, \ |
| sizeof(augmented_args.filename.value), \ |
| args->filename_ptr); \ |
| if (augmented_args.filename.size < sizeof(augmented_args.filename.value)) { \ |
| len -= sizeof(augmented_args.filename.value) - augmented_args.filename.size; \ |
| len &= sizeof(augmented_args.filename.value) - 1; \ |
| } \ |
| /* If perf_event_output fails, return non-zero so that it gets recorded unaugmented */ \ |
| return perf_event_output(args, &__augmented_syscalls__, BPF_F_CURRENT_CPU, \ |
| &augmented_args, len); \ |
| } \ |
| int syscall_exit(syscall)(struct syscall_exit_args *args) \ |
| { \ |
| return 1; /* 0 as soon as we start copying data returned by the kernel, e.g. 'read' */ \ |
| } |
| |
| struct syscall_enter_openat_args { |
| unsigned long long common_tp_fields; |
| long syscall_nr; |
| long dfd; |
| char *filename_ptr; |
| long flags; |
| long mode; |
| }; |
| |
| augmented_filename_syscall(openat); |
| |
| struct syscall_enter_open_args { |
| unsigned long long common_tp_fields; |
| long syscall_nr; |
| char *filename_ptr; |
| long flags; |
| long mode; |
| }; |
| |
| augmented_filename_syscall(open); |
| |
| struct syscall_enter_inotify_add_watch_args { |
| unsigned long long common_tp_fields; |
| long syscall_nr; |
| long fd; |
| char *filename_ptr; |
| long mask; |
| }; |
| |
| augmented_filename_syscall(inotify_add_watch); |
| |
| struct statbuf; |
| |
| struct syscall_enter_newstat_args { |
| unsigned long long common_tp_fields; |
| long syscall_nr; |
| char *filename_ptr; |
| struct stat *statbuf; |
| }; |
| |
| augmented_filename_syscall(newstat); |
| |
| #ifndef _K_SS_MAXSIZE |
| #define _K_SS_MAXSIZE 128 |
| #endif |
| |
| #define augmented_sockaddr_syscall(syscall) \ |
| struct augmented_enter_##syscall##_args { \ |
| struct syscall_enter_##syscall##_args args; \ |
| struct sockaddr_storage addr; \ |
| }; \ |
| int syscall_enter(syscall)(struct syscall_enter_##syscall##_args *args) \ |
| { \ |
| struct augmented_enter_##syscall##_args augmented_args; \ |
| unsigned long addrlen = sizeof(augmented_args.addr); \ |
| probe_read(&augmented_args.args, sizeof(augmented_args.args), args); \ |
| /* FIXME_CLANG_OPTIMIZATION_THAT_ACCESSES_USER_CONTROLLED_ADDRLEN_DESPITE_THIS_CHECK */ \ |
| /* if (addrlen > augmented_args.args.addrlen) */ \ |
| /* addrlen = augmented_args.args.addrlen; */ \ |
| /* */ \ |
| probe_read(&augmented_args.addr, addrlen, args->addr_ptr); \ |
| /* If perf_event_output fails, return non-zero so that it gets recorded unaugmented */ \ |
| return perf_event_output(args, &__augmented_syscalls__, BPF_F_CURRENT_CPU, \ |
| &augmented_args, \ |
| sizeof(augmented_args) - sizeof(augmented_args.addr) + addrlen);\ |
| } \ |
| int syscall_exit(syscall)(struct syscall_exit_args *args) \ |
| { \ |
| return 1; /* 0 as soon as we start copying data returned by the kernel, e.g. 'read' */ \ |
| } |
| |
| struct sockaddr; |
| |
| struct syscall_enter_bind_args { |
| unsigned long long common_tp_fields; |
| long syscall_nr; |
| long fd; |
| struct sockaddr *addr_ptr; |
| unsigned long addrlen; |
| }; |
| |
| augmented_sockaddr_syscall(bind); |
| |
| struct syscall_enter_connect_args { |
| unsigned long long common_tp_fields; |
| long syscall_nr; |
| long fd; |
| struct sockaddr *addr_ptr; |
| unsigned long addrlen; |
| }; |
| |
| augmented_sockaddr_syscall(connect); |
| |
| struct syscall_enter_sendto_args { |
| unsigned long long common_tp_fields; |
| long syscall_nr; |
| long fd; |
| void *buff; |
| long len; |
| unsigned long flags; |
| struct sockaddr *addr_ptr; |
| long addr_len; |
| }; |
| |
| augmented_sockaddr_syscall(sendto); |
| |
| license(GPL); |