]>
git.saurik.com Git - apple/xnu.git/blob - bsd/kern/kern_ktrace.c
2 * Copyright (c) 2000-2004 Apple Computer, Inc. All rights reserved.
4 * @APPLE_LICENSE_HEADER_START@
6 * The contents of this file constitute Original Code as defined in and
7 * are subject to the Apple Public Source License Version 1.1 (the
8 * "License"). You may not use this file except in compliance with the
9 * License. Please obtain a copy of the License at
10 * http://www.apple.com/publicsource and read it before using this file.
12 * This Original Code and all software distributed under the License are
13 * distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, EITHER
14 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
15 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
16 * FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT. Please see the
17 * License for the specific language governing rights and limitations
20 * @APPLE_LICENSE_HEADER_END@
22 /* Copyright (c) 1995 NeXT Computer, Inc. All Rights Reserved */
24 * Copyright (c) 1989, 1993
25 * The Regents of the University of California. All rights reserved.
27 * Redistribution and use in source and binary forms, with or without
28 * modification, are permitted provided that the following conditions
30 * 1. Redistributions of source code must retain the above copyright
31 * notice, this list of conditions and the following disclaimer.
32 * 2. Redistributions in binary form must reproduce the above copyright
33 * notice, this list of conditions and the following disclaimer in the
34 * documentation and/or other materials provided with the distribution.
35 * 3. All advertising materials mentioning features or use of this software
36 * must display the following acknowledgement:
37 * This product includes software developed by the University of
38 * California, Berkeley and its contributors.
39 * 4. Neither the name of the University nor the names of its contributors
40 * may be used to endorse or promote products derived from this software
41 * without specific prior written permission.
43 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
44 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
45 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
46 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
47 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
48 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
49 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
50 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
51 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
52 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
55 * @(#)kern_ktrace.c 8.2 (Berkeley) 9/23/93
56 * $FreeBSD: src/sys/kern/kern_ktrace.c,v 1.35.2.4 2001/03/05 13:09:01 obrien Exp $
60 #include <sys/param.h>
61 #include <sys/systm.h>
62 #include <sys/types.h>
65 #include <sys/namei.h>
66 #include <sys/vnode.h>
68 #include <sys/ktrace.h>
70 #include <sys/malloc.h>
71 #include <sys/syslog.h>
74 #include <bsm/audit_kernel.h>
77 static struct ktr_header
*ktrgetheader
__P((int type
));
78 static void ktrwrite
__P((struct vnode
*, struct ktr_header
*,
80 static int ktrcanset
__P((struct proc
*,struct proc
*));
81 static int ktrsetchildren
__P((struct proc
*,struct proc
*,
82 int, int, struct vnode
*));
83 static int ktrops
__P((struct proc
*,struct proc
*,int,int,struct vnode
*));
86 static struct ktr_header
*
90 register struct ktr_header
*kth
;
91 struct proc
*p
= current_proc(); /* XXX */
93 MALLOC(kth
, struct ktr_header
*, sizeof (struct ktr_header
),
96 microtime(&kth
->ktr_time
);
97 kth
->ktr_pid
= p
->p_pid
;
98 bcopy(p
->p_comm
, kth
->ktr_comm
, MAXCOMLEN
);
104 ktrsyscall(p
, code
, narg
, args
, funnel_type
)
112 struct ktr_header
*kth
;
113 struct ktr_syscall
*ktp
;
118 if (!KTRPOINT(p
, KTR_SYSCALL
))
122 len
= __offsetof(struct ktr_syscall
, ktr_args
) +
123 (narg
* sizeof(register_t
));
124 p
->p_traceflag
|= KTRFAC_ACTIVE
;
125 kth
= ktrgetheader(KTR_SYSCALL
);
126 MALLOC(ktp
, struct ktr_syscall
*, len
, M_KTRACE
, M_WAITOK
);
127 ktp
->ktr_code
= code
;
128 ktp
->ktr_narg
= narg
;
129 argp
= &ktp
->ktr_args
[0];
130 for (i
= 0; i
< narg
; i
++)
132 kth
->ktr_buf
= (caddr_t
)ktp
;
134 ktrwrite(vp
, kth
, NULL
, funnel_type
);
137 p
->p_traceflag
&= ~KTRFAC_ACTIVE
;
144 ktrsysret(p
, code
, error
, retval
, funnel_type
)
152 struct ktr_header
*kth
;
153 struct ktr_sysret ktp
;
155 if (!KTRPOINT(p
, KTR_SYSRET
))
159 p
->p_traceflag
|= KTRFAC_ACTIVE
;
160 kth
= ktrgetheader(KTR_SYSRET
);
162 ktp
.ktr_error
= error
;
163 ktp
.ktr_retval
= retval
; /* what about val2 ? */
165 kth
->ktr_buf
= (caddr_t
)&ktp
;
166 kth
->ktr_len
= sizeof(struct ktr_sysret
);
168 ktrwrite(vp
, kth
, NULL
, funnel_type
);
170 p
->p_traceflag
&= ~KTRFAC_ACTIVE
;
182 struct ktr_header
*kth
;
183 struct proc
*p
= current_proc(); /* XXX */
185 p
->p_traceflag
|= KTRFAC_ACTIVE
;
186 kth
= ktrgetheader(KTR_NAMEI
);
187 kth
->ktr_len
= strlen(path
);
190 ktrwrite(vp
, kth
, NULL
, KERNEL_FUNNEL
);
192 p
->p_traceflag
&= ~KTRFAC_ACTIVE
;
196 ktrgenio(vp
, fd
, rw
, uio
, error
, funnel_type
)
204 struct ktr_header
*kth
;
205 struct ktr_genio ktg
;
206 struct proc
*p
= current_proc(); /* XXX */
211 p
->p_traceflag
|= KTRFAC_ACTIVE
;
212 kth
= ktrgetheader(KTR_GENIO
);
215 kth
->ktr_buf
= (caddr_t
)&ktg
;
216 kth
->ktr_len
= sizeof(struct ktr_genio
);
218 uio
->uio_rw
= UIO_WRITE
;
220 ktrwrite(vp
, kth
, uio
, funnel_type
);
222 p
->p_traceflag
&= ~KTRFAC_ACTIVE
;
226 ktrpsig(vp
, sig
, action
, mask
, code
, funnel_type
)
234 struct ktr_header
*kth
;
236 struct proc
*p
= current_proc(); /* XXX */
238 p
->p_traceflag
|= KTRFAC_ACTIVE
;
239 kth
= ktrgetheader(KTR_PSIG
);
240 kp
.signo
= (char)sig
;
244 kth
->ktr_buf
= (caddr_t
)&kp
;
245 kth
->ktr_len
= sizeof (struct ktr_psig
);
247 ktrwrite(vp
, kth
, NULL
, funnel_type
);
249 p
->p_traceflag
&= ~KTRFAC_ACTIVE
;
253 ktrcsw(vp
, out
, user
, funnel_type
)
258 struct ktr_header
*kth
;
260 struct proc
*p
= current_proc(); /* XXX */
262 p
->p_traceflag
|= KTRFAC_ACTIVE
;
263 kth
= ktrgetheader(KTR_CSW
);
266 kth
->ktr_buf
= (caddr_t
)&kc
;
267 kth
->ktr_len
= sizeof (struct ktr_csw
);
269 ktrwrite(vp
, kth
, NULL
, funnel_type
);
271 p
->p_traceflag
&= ~KTRFAC_ACTIVE
;
275 /* Interface and common routines */
288 ktrace(curp
, uap
, retval
)
290 register struct ktrace_args
*uap
;
294 register struct vnode
*vp
= NULL
;
295 register struct proc
*p
;
297 int facs
= uap
->facs
& ~KTRFAC_ROOT
;
298 int ops
= KTROP(uap
->ops
);
299 int descend
= uap
->ops
& KTRFLAG_DESCEND
;
304 AUDIT_ARG(cmd
, uap
->ops
);
305 AUDIT_ARG(pid
, uap
->pid
);
306 AUDIT_ARG(value
, uap
->facs
);
307 curp
->p_traceflag
|= KTRFAC_ACTIVE
;
308 if (ops
!= KTROP_CLEAR
) {
310 * an operation which requires a file argument.
312 NDINIT(&nd
, LOOKUP
, (NOFOLLOW
|LOCKLEAF
), UIO_USERSPACE
, uap
->fname
, curp
);
313 error
= vn_open(&nd
, FREAD
|FWRITE
|O_NOFOLLOW
, 0);
315 curp
->p_traceflag
&= ~KTRFAC_ACTIVE
;
319 VOP_UNLOCK(vp
, 0, curp
);
320 if (vp
->v_type
!= VREG
) {
321 (void) vn_close(vp
, FREAD
|FWRITE
, curp
->p_ucred
, curp
);
322 curp
->p_traceflag
&= ~KTRFAC_ACTIVE
;
327 * Clear all uses of the tracefile
329 if (ops
== KTROP_CLEARFILE
) {
330 LIST_FOREACH(p
, &allproc
, p_list
) {
331 if (p
->p_tracep
== vp
) {
332 if (ktrcanset(curp
, p
)) {
333 struct vnode
*tvp
= p
->p_tracep
;
334 /* no more tracing */
339 VOP_CLOSE(vp
, FREAD
|FWRITE
, curp
->p_ucred
, curp
);
351 * need something to (un)trace (XXX - why is this here?)
364 pg
= pgfind(-uap
->pid
);
369 LIST_FOREACH(p
, &pg
->pg_members
, p_pglist
)
371 ret
|= ktrsetchildren(curp
, p
, ops
, facs
, vp
);
373 ret
|= ktrops(curp
, p
, ops
, facs
, vp
);
384 AUDIT_ARG(process
, p
);
386 ret
|= ktrsetchildren(curp
, p
, ops
, facs
, vp
);
388 ret
|= ktrops(curp
, p
, ops
, facs
, vp
);
394 (void) vn_close(vp
, FWRITE
, curp
->p_ucred
, curp
);
395 curp
->p_traceflag
&= ~KTRFAC_ACTIVE
;
412 utrace(curp
, uap
, retval
)
414 register struct utrace_args
*uap
;
418 struct ktr_header
*kth
;
419 struct proc
*p
= current_proc(); /* XXX */
422 if (!KTRPOINT(p
, KTR_USER
))
424 if (uap
->len
> KTR_USER_MAXLEN
)
426 p
->p_traceflag
|= KTRFAC_ACTIVE
;
427 kth
= ktrgetheader(KTR_USER
);
428 MALLOC(cp
, caddr_t
, uap
->len
, M_KTRACE
, M_WAITOK
);
429 if (!copyin((caddr_t
)uap
->addr
, cp
, uap
->len
)) {
431 kth
->ktr_len
= uap
->len
;
432 ktrwrite(p
->p_tracep
, kth
, NULL
, KERNEL_FUNNEL
);
436 p
->p_traceflag
&= ~KTRFAC_ACTIVE
;
446 ktrops(curp
, p
, ops
, facs
, vp
)
447 struct proc
*p
, *curp
;
453 if (!ktrcanset(curp
, p
))
455 if (ops
== KTROP_SET
) {
456 if (p
->p_tracep
!= vp
) {
458 * if trace file already in use, relinquish
462 if (UBCINFOEXISTS(vp
))
468 VOP_CLOSE(tvp
, FREAD
|FWRITE
, p
->p_ucred
, p
);
473 p
->p_traceflag
|= facs
;
474 if (curp
->p_ucred
->cr_uid
== 0)
475 p
->p_traceflag
|= KTRFAC_ROOT
;
478 if (((p
->p_traceflag
&= ~facs
) & KTRFAC_MASK
) == 0) {
479 /* no more tracing */
485 VOP_CLOSE(tvp
, FREAD
|FWRITE
, p
->p_ucred
, p
);
496 ktrsetchildren(curp
, top
, ops
, facs
, vp
)
497 struct proc
*curp
, *top
;
501 register struct proc
*p
;
502 register int ret
= 0;
506 ret
|= ktrops(curp
, p
, ops
, facs
, vp
);
508 * If this process has children, descend to them next,
509 * otherwise do any siblings, and if done with this level,
510 * follow back up the tree (but not past top).
512 if (!LIST_EMPTY(&p
->p_children
))
513 p
= LIST_FIRST(&p
->p_children
);
517 if (LIST_NEXT(p
, p_sibling
)) {
518 p
= LIST_NEXT(p
, p_sibling
);
528 ktrwrite(vp
, kth
, uio
, funnel_type
)
530 register struct ktr_header
*kth
;
534 struct iovec aiov
[2];
535 register struct proc
*p
= current_proc(); /* XXX */
541 if (funnel_type
== -1) {
542 funnel_t
*f
= thread_funnel_get();
543 if(f
== THR_FUNNEL_NULL
)
544 funnel_type
= NO_FUNNEL
;
545 else if (f
== (funnel_t
*)network_flock
)
546 funnel_type
= NETWORK_FUNNEL
;
547 else if (f
== (funnel_t
*)kernel_flock
)
548 funnel_type
= KERNEL_FUNNEL
;
551 switch (funnel_type
) {
553 /* Nothing more to do */
556 thread_funnel_switch(NETWORK_FUNNEL
, KERNEL_FUNNEL
);
559 (void) thread_funnel_set(kernel_flock
, TRUE
);
562 panic("Invalid funnel (%)", funnel_type
);
564 auio
.uio_iov
= &aiov
[0];
566 auio
.uio_segflg
= UIO_SYSSPACE
;
567 auio
.uio_rw
= UIO_WRITE
;
568 aiov
[0].iov_base
= (caddr_t
)kth
;
569 aiov
[0].iov_len
= sizeof(struct ktr_header
);
570 auio
.uio_resid
= sizeof(struct ktr_header
);
572 auio
.uio_procp
= current_proc();
573 if (kth
->ktr_len
> 0) {
575 aiov
[1].iov_base
= kth
->ktr_buf
;
576 aiov
[1].iov_len
= kth
->ktr_len
;
577 auio
.uio_resid
+= kth
->ktr_len
;
579 kth
->ktr_len
+= uio
->uio_resid
;
581 error
= vn_lock(vp
, LK_EXCLUSIVE
| LK_RETRY
, p
);
584 (void)VOP_LEASE(vp
, p
, p
->p_ucred
, LEASE_WRITE
);
585 error
= VOP_WRITE(vp
, &auio
, IO_UNIT
| IO_APPEND
, p
->p_ucred
);
586 if (error
== 0 && uio
!= NULL
) {
587 (void)VOP_LEASE(vp
, p
, p
->p_ucred
, LEASE_WRITE
);
588 error
= VOP_WRITE(vp
, uio
, IO_UNIT
| IO_APPEND
, p
->p_ucred
);
590 VOP_UNLOCK(vp
, 0, p
);
592 switch (funnel_type
) {
594 /* Nothing more to do */
597 thread_funnel_switch(KERNEL_FUNNEL
, NETWORK_FUNNEL
);
598 /* switch funnel to NETWORK_FUNNEL */
601 (void) thread_funnel_set(kernel_flock
, FALSE
);
604 panic("Invalid funnel (%)", funnel_type
);
611 * If error encountered, give up tracing on this vnode.
613 log(LOG_NOTICE
, "ktrace write failed, errno %d, tracing stopped\n",
615 LIST_FOREACH(p
, &allproc
, p_list
) {
616 if (p
->p_tracep
== vp
) {
620 VOP_CLOSE(vp
, FREAD
|FWRITE
, p
->p_ucred
, p
);
626 switch (funnel_type
) {
628 /* Nothing more to do */
631 thread_funnel_switch(KERNEL_FUNNEL
, NETWORK_FUNNEL
);
632 /* switch funnel to NETWORK_FUNNEL */
635 (void) thread_funnel_set(kernel_flock
, FALSE
);
638 panic("Invalid funnel (%)", funnel_type
);
643 * Return true if caller has permission to set the ktracing state
644 * of target. Essentially, the target can't possess any
645 * more permissions than the caller. KTRFAC_ROOT signifies that
646 * root previously set the tracing status on the target process, and
647 * so, only root may further change it.
649 * TODO: check groups. use caller effective gid.
652 ktrcanset(callp
, targetp
)
653 struct proc
*callp
, *targetp
;
655 register struct pcred
*caller
= callp
->p_cred
;
656 register struct pcred
*target
= targetp
->p_cred
;
658 if (!PRISON_CHECK(callp
, targetp
))
660 if ((caller
->pc_ucred
->cr_uid
== target
->p_ruid
&&
661 target
->p_ruid
== target
->p_svuid
&&
662 caller
->p_rgid
== target
->p_rgid
&& /* XXX */
663 target
->p_rgid
== target
->p_svgid
&&
664 (targetp
->p_traceflag
& KTRFAC_ROOT
) == 0 &&
665 (targetp
->p_flag
& P_SUGID
) == 0) ||
666 caller
->pc_ucred
->cr_uid
== 0)