Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

perf trace: Pretty print seccomp() args

E.g:

# trace -e seccomp
200.061 (0.009 ms): :2441/2441 seccomp(op: FILTER, flags: TSYNC ) = -1 EFAULT Bad address
200.910 (0.121 ms): :2441/2441 seccomp(op: FILTER, flags: TSYNC, uargs: 0x7fff57479fe0) = 0

Cc: Adrian Hunter <adrian.hunter@intel.com>
Cc: David Ahern <dsahern@gmail.com>
Cc: Jiri Olsa <jolsa@kernel.org>
Cc: Milian Wolff <milian.wolff@kdab.com>
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: Wang Nan <wangnan0@huawei.com>
Link: http://lkml.kernel.org/n/tip-t369uckshlwp4evkks4bcoo7@git.kernel.org
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>

+47
+47
tools/perf/builtin-trace.c
··· 40 40 #include <sys/mman.h> 41 41 #include <linux/futex.h> 42 42 #include <linux/err.h> 43 + #include <linux/seccomp.h> 44 + #include <linux/filter.h> 45 + #include <linux/audit.h> 46 + #include <sys/ptrace.h> 43 47 44 48 /* For older distros: */ 45 49 #ifndef MAP_STACK ··· 1005 1001 static DEFINE_STRARRAY_OFFSET(tioctls, 0x5401); 1006 1002 #endif /* defined(__i386__) || defined(__x86_64__) */ 1007 1003 1004 + static size_t syscall_arg__scnprintf_seccomp_op(char *bf, size_t size, struct syscall_arg *arg) 1005 + { 1006 + int op = arg->val; 1007 + size_t printed = 0; 1008 + 1009 + switch (op) { 1010 + #define P_SECCOMP_SET_MODE_OP(n) case SECCOMP_SET_MODE_##n: printed = scnprintf(bf, size, #n); break 1011 + P_SECCOMP_SET_MODE_OP(STRICT); 1012 + P_SECCOMP_SET_MODE_OP(FILTER); 1013 + #undef P_SECCOMP_SET_MODE_OP 1014 + default: printed = scnprintf(bf, size, "%#x", op); break; 1015 + } 1016 + 1017 + return printed; 1018 + } 1019 + 1020 + #define SCA_SECCOMP_OP syscall_arg__scnprintf_seccomp_op 1021 + 1022 + static size_t syscall_arg__scnprintf_seccomp_flags(char *bf, size_t size, 1023 + struct syscall_arg *arg) 1024 + { 1025 + int printed = 0, flags = arg->val; 1026 + 1027 + #define P_FLAG(n) \ 1028 + if (flags & SECCOMP_FILTER_FLAG_##n) { \ 1029 + printed += scnprintf(bf + printed, size - printed, "%s%s", printed ? "|" : "", #n); \ 1030 + flags &= ~SECCOMP_FILTER_FLAG_##n; \ 1031 + } 1032 + 1033 + P_FLAG(TSYNC); 1034 + #undef P_FLAG 1035 + 1036 + if (flags) 1037 + printed += scnprintf(bf + printed, size - printed, "%s%#x", printed ? "|" : "", flags); 1038 + 1039 + return printed; 1040 + } 1041 + 1042 + #define SCA_SECCOMP_FLAGS syscall_arg__scnprintf_seccomp_flags 1043 + 1008 1044 #define STRARRAY(arg, name, array) \ 1009 1045 .arg_scnprintf = { [arg] = SCA_STRARRAY, }, \ 1010 1046 .arg_parm = { [arg] = &strarray__##array, } ··· 1278 1234 .arg_scnprintf = { [1] = SCA_SIGNUM, /* sig */ }, }, 1279 1235 { .name = "rt_tgsigqueueinfo", .errmsg = true, 1280 1236 .arg_scnprintf = { [2] = SCA_SIGNUM, /* sig */ }, }, 1237 + { .name = "seccomp", .errmsg = true, 1238 + .arg_scnprintf = { [0] = SCA_SECCOMP_OP, /* op */ 1239 + [1] = SCA_SECCOMP_FLAGS, /* flags */ }, }, 1281 1240 { .name = "select", .errmsg = true, .timeout = true, }, 1282 1241 { .name = "sendmmsg", .errmsg = true, 1283 1242 .arg_scnprintf = { [0] = SCA_FD, /* fd */