mirror of
https://github.com/Zenithsiz/ftmemsim-valgrind.git
synced 2026-02-03 18:13:01 +00:00
from skin's view, replacing all instances with ThreadId. Much cleaner. Had to change the way VG_(get_ExeContext)() worked a little. Changed the core/skin major interface because this breaks the old version. Also fixed a few minor related things here and there. git-svn-id: svn://svn.valgrind.org/valgrind/trunk@1782
3623 lines
145 KiB
C
3623 lines
145 KiB
C
|
|
/*--------------------------------------------------------------------*/
|
|
/*--- Update the byte permission maps following a system call. ---*/
|
|
/*--- vg_syscall_mem.c ---*/
|
|
/*--------------------------------------------------------------------*/
|
|
|
|
/*
|
|
This file is part of Valgrind, an extensible x86 protected-mode
|
|
emulator for monitoring program execution on x86-Unixes.
|
|
|
|
Copyright (C) 2000-2003 Julian Seward
|
|
jseward@acm.org
|
|
|
|
This program is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU General Public License as
|
|
published by the Free Software Foundation; either version 2 of the
|
|
License, or (at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful, but
|
|
WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
|
|
02111-1307, USA.
|
|
|
|
The GNU General Public License is contained in the file COPYING.
|
|
*/
|
|
|
|
#include "vg_include.h"
|
|
|
|
/* vg_unsafe.h should NOT be included into any file except this
|
|
one. */
|
|
#include "vg_unsafe.h"
|
|
|
|
|
|
/* All system calls are channelled through here, doing two things:
|
|
|
|
* notify the skin of the memory events (reads, writes) happening
|
|
|
|
* perform the syscall, usually by passing it along to the kernel
|
|
unmodified. However, because we simulate signals ourselves,
|
|
signal-related syscalls are routed to vg_signal.c, and are not
|
|
delivered to the kernel.
|
|
|
|
A magical piece of assembly code, vg_do_syscall(), in vg_syscall.S
|
|
does the tricky bit of passing a syscall to the kernel, whilst
|
|
having the simulator retain control.
|
|
*/
|
|
|
|
#define SYSCALL_TRACK(fn, args...) VG_TRACK(fn, Vg_CoreSysCall, ## args)
|
|
|
|
#define MAYBE_PRINTF(format, args...) \
|
|
if (VG_(clo_trace_syscalls)) \
|
|
VG_(printf)(format, ## args)
|
|
|
|
/* ---------------------------------------------------------------------
|
|
Doing mmap, munmap, mremap, mprotect
|
|
------------------------------------------------------------------ */
|
|
|
|
// Nb: this isn't done as precisely as possible, but it seems that programs
|
|
// are usually sufficiently well-behaved that the more obscure corner cases
|
|
// aren't important. Various comments in the few functions below give more
|
|
// details... njn 2002-Sep-17
|
|
|
|
/* AFAICT from kernel sources (mm/mprotect.c) and general experimentation,
|
|
munmap, mprotect (and mremap??) work at the page level. So addresses
|
|
and lengths must be adjusted for this. */
|
|
|
|
/* Mash around start and length so that the area exactly covers
|
|
an integral number of pages. If we don't do that, memcheck's
|
|
idea of addressible memory diverges from that of the
|
|
kernel's, which causes the leak detector to crash. */
|
|
static
|
|
void mash_addr_and_len( Addr* a, UInt* len)
|
|
{
|
|
while (( *a % VKI_BYTES_PER_PAGE) > 0) { (*a)--; (*len)++; }
|
|
while (((*a + *len) % VKI_BYTES_PER_PAGE) > 0) { (*len)++; }
|
|
}
|
|
|
|
static
|
|
void mmap_segment ( Addr a, UInt len, UInt prot, Int fd )
|
|
{
|
|
Bool rr, ww, xx;
|
|
|
|
/* Records segment, reads debug symbols if necessary */
|
|
if ((prot & PROT_EXEC) && fd != -1)
|
|
VG_(new_exe_segment) ( a, len );
|
|
|
|
rr = prot & PROT_READ;
|
|
ww = prot & PROT_WRITE;
|
|
xx = prot & PROT_EXEC;
|
|
|
|
VG_TRACK( new_mem_mmap, a, len, rr, ww, xx );
|
|
}
|
|
|
|
static
|
|
void munmap_segment ( Addr a, UInt len )
|
|
{
|
|
/* Addr orig_a = a;
|
|
Addr orig_len = len; */
|
|
|
|
mash_addr_and_len(&a, &len);
|
|
/*
|
|
VG_(printf)("MUNMAP: correct (%p for %d) to (%p for %d) %s\n",
|
|
orig_a, orig_len, a, len, (orig_a!=start || orig_len!=length)
|
|
? "CHANGE" : "");
|
|
*/
|
|
|
|
/* Invalidate translations as necessary (also discarding any basic
|
|
block-specific info retained by the skin) and unload any debug
|
|
symbols. */
|
|
// This doesn't handle partial unmapping of exe segs correctly, if that
|
|
// ever happens...
|
|
VG_(remove_if_exe_segment) ( a, len );
|
|
|
|
VG_TRACK( die_mem_munmap, a, len );
|
|
}
|
|
|
|
static
|
|
void mprotect_segment ( Addr a, UInt len, Int prot )
|
|
{
|
|
Bool rr, ww, xx;
|
|
|
|
rr = prot & PROT_READ;
|
|
ww = prot & PROT_WRITE;
|
|
xx = prot & PROT_EXEC;
|
|
|
|
// if removing exe permission, should check and remove from exe_seg list
|
|
// if adding, should check and add to exe_seg list
|
|
// easier to ignore both cases -- both v. unlikely?
|
|
mash_addr_and_len(&a, &len);
|
|
VG_TRACK( change_mem_mprotect, a, len, rr, ww, xx );
|
|
}
|
|
|
|
static
|
|
void mremap_segment ( Addr old_addr, UInt old_size, Addr new_addr,
|
|
UInt new_size )
|
|
{
|
|
/* If the block moves, assume new and old blocks can't overlap; seems to
|
|
* be valid judging from Linux kernel code in mm/mremap.c */
|
|
vg_assert(old_addr == new_addr ||
|
|
old_addr+old_size < new_addr ||
|
|
new_addr+new_size < old_addr);
|
|
|
|
if (new_size < old_size) {
|
|
// if exe_seg
|
|
// unmap old symbols from old_addr+new_size..old_addr+new_size
|
|
// update exe_seg size = new_size
|
|
// update exe_seg addr = new_addr...
|
|
VG_TRACK( copy_mem_remap, old_addr, new_addr, new_size );
|
|
VG_TRACK( die_mem_munmap, old_addr+new_size, old_size-new_size );
|
|
|
|
} else {
|
|
// if exe_seg
|
|
// map new symbols from new_addr+old_size..new_addr+new_size
|
|
// update exe_seg size = new_size
|
|
// update exe_seg addr = new_addr...
|
|
VG_TRACK( copy_mem_remap, old_addr, new_addr, old_size );
|
|
// what should the permissions on the new extended part be??
|
|
// using 'rwx'
|
|
VG_TRACK( new_mem_mmap, new_addr+old_size, new_size-old_size,
|
|
True, True, True );
|
|
}
|
|
}
|
|
|
|
|
|
/* Is this a Linux kernel error return value? */
|
|
/* From:
|
|
http://sources.redhat.com/cgi-bin/cvsweb.cgi/libc/sysdeps/unix/sysv/
|
|
linux/i386/sysdep.h?
|
|
rev=1.28&content-type=text/x-cvsweb-markup&cvsroot=glibc
|
|
|
|
\begin{quote}:
|
|
|
|
Linux uses a negative return value to indicate syscall errors,
|
|
unlike most Unices, which use the condition codes' carry flag.
|
|
|
|
Since version 2.1 the return value of a system call might be
|
|
negative even if the call succeeded. E.g., the `lseek' system call
|
|
might return a large offset. Therefore we must not anymore test
|
|
for < 0, but test for a real error by making sure the value in %eax
|
|
is a real error number. Linus said he will make sure the no syscall
|
|
returns a value in -1 .. -4095 as a valid result so we can safely
|
|
test with -4095.
|
|
|
|
END QUOTE
|
|
*/
|
|
Bool VG_(is_kerror) ( Int res )
|
|
{
|
|
if (res >= -4095 && res <= -1)
|
|
return True;
|
|
else
|
|
return False;
|
|
}
|
|
|
|
static
|
|
UInt get_shm_size ( Int shmid )
|
|
{
|
|
struct shmid_ds buf;
|
|
long __res;
|
|
__asm__ volatile ( "int $0x80"
|
|
: "=a" (__res)
|
|
: "0" (__NR_ipc),
|
|
"b" ((long)(24) /*IPCOP_shmctl*/),
|
|
"c" ((long)(shmid)),
|
|
"d" ((long)(IPC_STAT)),
|
|
"S" ((long)(0)),
|
|
"D" ((long)(&buf)) );
|
|
if ( VG_(is_kerror) ( __res ) )
|
|
return 0;
|
|
|
|
return buf.shm_segsz;
|
|
}
|
|
|
|
static
|
|
Char *strdupcat ( const Char *s1, const Char *s2, ArenaId aid )
|
|
{
|
|
UInt len = VG_(strlen) ( s1 ) + VG_(strlen) ( s2 ) + 1;
|
|
Char *result = VG_(arena_malloc) ( aid, len );
|
|
VG_(strcpy) ( result, s1 );
|
|
VG_(strcat) ( result, s2 );
|
|
return result;
|
|
}
|
|
|
|
static
|
|
void pre_mem_read_sendmsg ( ThreadId tid, Char *msg, UInt base, UInt size )
|
|
{
|
|
Char *outmsg = strdupcat ( "socketcall.sendmsg", msg, VG_AR_TRANSIENT );
|
|
SYSCALL_TRACK( pre_mem_read, tid, outmsg, base, size );
|
|
|
|
VG_(arena_free) ( VG_AR_TRANSIENT, outmsg );
|
|
}
|
|
|
|
static
|
|
void pre_mem_write_recvmsg ( ThreadId tid, Char *msg, UInt base, UInt size )
|
|
{
|
|
Char *outmsg = strdupcat ( "socketcall.recvmsg", msg, VG_AR_TRANSIENT );
|
|
SYSCALL_TRACK( pre_mem_write, tid, outmsg, base, size );
|
|
VG_(arena_free) ( VG_AR_TRANSIENT, outmsg );
|
|
}
|
|
|
|
static
|
|
void post_mem_write_recvmsg ( ThreadId tid,
|
|
Char *fieldName, UInt base, UInt size )
|
|
{
|
|
VG_TRACK( post_mem_write, base, size );
|
|
}
|
|
|
|
static
|
|
void msghdr_foreachfield (
|
|
ThreadId tid,
|
|
struct msghdr *msg,
|
|
void (*foreach_func)( ThreadId, Char *, UInt, UInt )
|
|
)
|
|
{
|
|
if ( !msg )
|
|
return;
|
|
|
|
foreach_func ( tid, "(msg)", (Addr)msg, sizeof( struct msghdr ) );
|
|
|
|
if ( msg->msg_name )
|
|
foreach_func ( tid,
|
|
"(msg.msg_name)",
|
|
(Addr)msg->msg_name, msg->msg_namelen );
|
|
|
|
if ( msg->msg_iov ) {
|
|
struct iovec *iov = msg->msg_iov;
|
|
UInt i;
|
|
|
|
foreach_func ( tid,
|
|
"(msg.msg_iov)",
|
|
(Addr)iov, msg->msg_iovlen * sizeof( struct iovec ) );
|
|
|
|
for ( i = 0; i < msg->msg_iovlen; ++i, ++iov )
|
|
foreach_func ( tid,
|
|
"(msg.msg_iov[i]",
|
|
(Addr)iov->iov_base, iov->iov_len );
|
|
}
|
|
|
|
if ( msg->msg_control )
|
|
foreach_func ( tid,
|
|
"(msg.msg_control)",
|
|
(Addr)msg->msg_control, msg->msg_controllen );
|
|
}
|
|
|
|
static
|
|
void pre_mem_read_sockaddr ( ThreadId tid, Char *description,
|
|
struct sockaddr *sa, UInt salen )
|
|
{
|
|
Char *outmsg;
|
|
|
|
/* NULL/zero-length sockaddrs are legal */
|
|
if ( sa == NULL || salen == 0 ) return;
|
|
|
|
outmsg = VG_(arena_malloc) ( VG_AR_TRANSIENT,
|
|
strlen( description ) + 30 );
|
|
|
|
VG_(sprintf) ( outmsg, description, ".sa_family" );
|
|
SYSCALL_TRACK( pre_mem_read, tid, outmsg,
|
|
(UInt) &sa->sa_family, sizeof (sa_family_t));
|
|
|
|
switch (sa->sa_family) {
|
|
|
|
case AF_UNIX:
|
|
VG_(sprintf) ( outmsg, description, ".sun_path" );
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, outmsg,
|
|
(UInt) ((struct sockaddr_un *) sa)->sun_path);
|
|
break;
|
|
|
|
case AF_INET:
|
|
VG_(sprintf) ( outmsg, description, ".sin_port" );
|
|
SYSCALL_TRACK( pre_mem_read, tid, outmsg,
|
|
(UInt) &((struct sockaddr_in *) sa)->sin_port,
|
|
sizeof (((struct sockaddr_in *) sa)->sin_port));
|
|
VG_(sprintf) ( outmsg, description, ".sin_addr" );
|
|
SYSCALL_TRACK( pre_mem_read, tid, outmsg,
|
|
(UInt) &((struct sockaddr_in *) sa)->sin_addr,
|
|
sizeof (struct in_addr));
|
|
break;
|
|
|
|
case AF_INET6:
|
|
VG_(sprintf) ( outmsg, description, ".sin6_port" );
|
|
SYSCALL_TRACK( pre_mem_read, tid, outmsg,
|
|
(UInt) &((struct sockaddr_in6 *) sa)->sin6_port,
|
|
sizeof (((struct sockaddr_in6 *) sa)->sin6_port));
|
|
VG_(sprintf) ( outmsg, description, ".sin6_flowinfo" );
|
|
SYSCALL_TRACK( pre_mem_read, tid, outmsg,
|
|
(UInt) &((struct sockaddr_in6 *) sa)->sin6_flowinfo,
|
|
sizeof (uint32_t));
|
|
VG_(sprintf) ( outmsg, description, ".sin6_addr" );
|
|
SYSCALL_TRACK( pre_mem_read, tid, outmsg,
|
|
(UInt) &((struct sockaddr_in6 *) sa)->sin6_addr,
|
|
sizeof (struct in6_addr));
|
|
# ifndef GLIBC_2_1
|
|
VG_(sprintf) ( outmsg, description, ".sin6_scope_id" );
|
|
SYSCALL_TRACK( pre_mem_read, tid, outmsg,
|
|
(UInt) &((struct sockaddr_in6 *) sa)->sin6_scope_id,
|
|
sizeof (uint32_t));
|
|
# endif
|
|
break;
|
|
|
|
default:
|
|
VG_(sprintf) ( outmsg, description, "" );
|
|
SYSCALL_TRACK( pre_mem_read, tid, outmsg, (UInt) sa, salen );
|
|
break;
|
|
}
|
|
|
|
VG_(arena_free) ( VG_AR_TRANSIENT, outmsg );
|
|
}
|
|
|
|
/* Dereference a pointer to a UInt. */
|
|
static UInt deref_UInt ( ThreadId tid, Addr a, Char* s )
|
|
{
|
|
UInt* a_p = (UInt*)a;
|
|
SYSCALL_TRACK( pre_mem_read, tid, s, (Addr)a_p, sizeof(UInt) );
|
|
if (a_p == NULL)
|
|
return 0;
|
|
else
|
|
return *a_p;
|
|
}
|
|
|
|
/* Dereference a pointer to a pointer. */
|
|
static Addr deref_Addr ( ThreadId tid, Addr a, Char* s )
|
|
{
|
|
Addr* a_p = (Addr*)a;
|
|
SYSCALL_TRACK( pre_mem_read, tid, s, (Addr)a_p, sizeof(Addr) );
|
|
return *a_p;
|
|
}
|
|
|
|
static
|
|
void buf_and_len_pre_check( ThreadId tid, Addr buf_p, Addr buflen_p,
|
|
Char* buf_s, Char* buflen_s )
|
|
{
|
|
if (VG_(track_events).pre_mem_write) {
|
|
UInt buflen_in = deref_UInt( tid, buflen_p, buflen_s);
|
|
if (buflen_in > 0) {
|
|
VG_(track_events).pre_mem_write ( Vg_CoreSysCall,
|
|
tid, buf_s, buf_p, buflen_in );
|
|
}
|
|
}
|
|
}
|
|
|
|
static
|
|
void buf_and_len_post_check( ThreadId tid, Int res,
|
|
Addr buf_p, Addr buflen_p, Char* s )
|
|
{
|
|
if (!VG_(is_kerror)(res) && VG_(track_events).post_mem_write) {
|
|
UInt buflen_out = deref_UInt( tid, buflen_p, s);
|
|
if (buflen_out > 0 && buf_p != (Addr)NULL) {
|
|
VG_(track_events).post_mem_write ( buf_p, buflen_out );
|
|
}
|
|
}
|
|
}
|
|
|
|
/* ---------------------------------------------------------------------
|
|
Data seg end, for brk()
|
|
------------------------------------------------------------------ */
|
|
|
|
/* Records the current end of the data segment so we can make sense of
|
|
calls to brk(). */
|
|
static
|
|
Addr curr_dataseg_end;
|
|
|
|
void VG_(init_dataseg_end_for_brk) ( void )
|
|
{
|
|
curr_dataseg_end = (Addr)VG_(brk)(0);
|
|
if (curr_dataseg_end == (Addr)(-1))
|
|
VG_(core_panic)("can't determine data-seg end for brk()");
|
|
if (0)
|
|
VG_(printf)("DS END is %p\n", (void*)curr_dataseg_end);
|
|
}
|
|
|
|
/* ---------------------------------------------------------------------
|
|
The Main Entertainment ...
|
|
------------------------------------------------------------------ */
|
|
|
|
void VG_(perform_assumed_nonblocking_syscall) ( ThreadId tid )
|
|
{
|
|
ThreadState* tst;
|
|
UInt syscallno, arg1, arg2, arg3, arg4, arg5;
|
|
/* Do not make this unsigned! */
|
|
Int res;
|
|
void* pre_res = 0; /* shut gcc up */
|
|
|
|
VGP_PUSHCC(VgpCoreSysWrap);
|
|
|
|
vg_assert(VG_(is_valid_tid)(tid));
|
|
tst = & VG_(threads)[tid];
|
|
syscallno = tst->m_eax;
|
|
arg1 = tst->m_ebx;
|
|
arg2 = tst->m_ecx;
|
|
arg3 = tst->m_edx;
|
|
arg4 = tst->m_esi;
|
|
arg5 = tst->m_edi;
|
|
|
|
/* Do any pre-syscall actions */
|
|
if (VG_(needs).syscall_wrapper) {
|
|
VGP_PUSHCC(VgpSkinSysWrap);
|
|
pre_res = SK_(pre_syscall)(tid, syscallno, /*isBlocking*/False);
|
|
VGP_POPCC(VgpSkinSysWrap);
|
|
}
|
|
|
|
/* the syscall no is in %eax. For syscalls with <= 5 args,
|
|
args 1 .. 5 to the syscall are in %ebx %ecx %edx %esi %edi.
|
|
For calls with > 5 args, %ebx points to a lump of memory
|
|
containing the args.
|
|
|
|
The result is returned in %eax. If this value >= 0, the call
|
|
succeeded, and this is the return value. If < 0, it failed, and
|
|
the negation of this value is errno. To be more specific,
|
|
if res is in the range -EMEDIUMTYPE (-124) .. -EPERM (-1)
|
|
(kernel 2.4.9 sources, include/asm-i386/errno.h)
|
|
then it indicates an error. Otherwise it doesn't.
|
|
|
|
Dirk Mueller (mueller@kde.org) says that values -4095 .. -1
|
|
(inclusive?) indicate error returns. Not sure where the -4095
|
|
comes from.
|
|
*/
|
|
|
|
MAYBE_PRINTF("SYSCALL[%d,%d](%3d): ",
|
|
VG_(getpid)(), tid, syscallno);
|
|
|
|
switch (syscallno) {
|
|
|
|
# if defined(__NR_exit_group)
|
|
case __NR_exit_group:
|
|
VG_(core_panic)("syscall exit_group() not caught by the scheduler?!");
|
|
break;
|
|
# endif
|
|
|
|
case __NR_exit:
|
|
VG_(core_panic)("syscall exit() not caught by the scheduler?!");
|
|
break;
|
|
|
|
case __NR_clone:
|
|
VG_(unimplemented)
|
|
("clone(): not supported by Valgrind.\n "
|
|
"We do now support programs linked against\n "
|
|
"libpthread.so, though. Re-run with -v and ensure that\n "
|
|
"you are picking up Valgrind's implementation of libpthread.so.");
|
|
break;
|
|
|
|
/* !!!!!!!!!! New, untested syscalls !!!!!!!!!!!!!!!!!!!!! */
|
|
|
|
# if defined(__NR_ptrace)
|
|
case __NR_ptrace: { /* syscall 26 */
|
|
/* long ptrace (enum __ptrace_request request, pid_t pid,
|
|
void *addr, void *data); ... sort of. */
|
|
/* Sigh ... the /usr/include/sys/user.h on R H 6.2 doesn't
|
|
define struct user_fpxregs_struct. On the basis that it
|
|
is defined as follows on my R H 7.2 (glibc-2.2.4) box,
|
|
I kludge it.
|
|
|
|
struct user_fpxregs_struct
|
|
{
|
|
unsigned short int cwd;
|
|
unsigned short int swd;
|
|
unsigned short int twd;
|
|
unsigned short int fop;
|
|
long int fip;
|
|
long int fcs;
|
|
long int foo;
|
|
long int fos;
|
|
long int mxcsr;
|
|
long int reserved;
|
|
long int st_space[32]; 8*16 bytes for each FP-reg = 128 bytes
|
|
long int xmm_space[32]; 8*16 bytes for each XMM-reg = 128 bytes
|
|
long int padding[56];
|
|
};
|
|
*/
|
|
const Int sizeof_struct_user_fpxregs_struct
|
|
= sizeof(unsigned short) * (1 + 1 + 1 + 1)
|
|
+ sizeof(long int) * (1 + 1 + 1 + 1 + 1 + 1 + 32 + 32 + 56);
|
|
|
|
MAYBE_PRINTF("ptrace ( %d, %d, %p, %p )\n", arg1,arg2,arg3,arg4);
|
|
switch (arg1) {
|
|
case 12: /* PTRACE_GETREGS */
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ptrace(getregs)", arg4,
|
|
sizeof (struct user_regs_struct));
|
|
break;
|
|
case 14: /* PTRACE_GETFPREGS */
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ptrace(getfpregs)", arg4,
|
|
sizeof (struct user_fpregs_struct));
|
|
break;
|
|
case 18: /* PTRACE_GETFPXREGS */
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ptrace(getfpxregs)", arg4,
|
|
sizeof_struct_user_fpxregs_struct);
|
|
break;
|
|
case 1: case 2: case 3: /* PTRACE_PEEK{TEXT,DATA,USER} */
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ptrace(peek)", arg4,
|
|
sizeof (long));
|
|
break;
|
|
case 13: /* PTRACE_SETREGS */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ptrace(setregs)", arg4,
|
|
sizeof (struct user_regs_struct));
|
|
break;
|
|
case 15: /* PTRACE_SETFPREGS */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ptrace(setfpregs)", arg4,
|
|
sizeof (struct user_fpregs_struct));
|
|
break;
|
|
case 19: /* PTRACE_SETFPXREGS */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ptrace(setfpxregs)", arg4,
|
|
sizeof_struct_user_fpxregs_struct);
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
KERNEL_DO_SYSCALL(tid, res);
|
|
if (!VG_(is_kerror)(res)) {
|
|
switch (arg1) {
|
|
case 12: /* PTRACE_GETREGS */
|
|
VG_TRACK( post_mem_write, arg4,
|
|
sizeof (struct user_regs_struct));
|
|
break;
|
|
case 14: /* PTRACE_GETFPREGS */
|
|
VG_TRACK( post_mem_write, arg4,
|
|
sizeof (struct user_fpregs_struct));
|
|
break;
|
|
case 18: /* PTRACE_GETFPXREGS */
|
|
VG_TRACK( post_mem_write, arg4,
|
|
sizeof_struct_user_fpxregs_struct);
|
|
break;
|
|
case 1: case 2: case 3: /* PTRACE_PEEK{TEXT,DATA,USER} */
|
|
VG_TRACK( post_mem_write, arg4, sizeof (long));
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_mount)
|
|
case __NR_mount: /* syscall 21 */
|
|
/* int mount(const char *specialfile, const char *dir,
|
|
const char *filesystemtype, unsigned long rwflag,
|
|
const void *data); */
|
|
MAYBE_PRINTF( "mount( %p, %p, %p )\n" ,arg1,arg2,arg3);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid,"mount(specialfile)",arg1);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid,"mount(dir)",arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid,"mount(filesystemtype)",arg3);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_umount)
|
|
case __NR_umount: /* syscall 22 */
|
|
/* int umount(const char *path) */
|
|
MAYBE_PRINTF("umount( %p )\n", arg1);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid,"umount(path)",arg1);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_modify_ldt)
|
|
case __NR_modify_ldt: /* syscall 123 */
|
|
/* int modify_ldt(int func, void *ptr,
|
|
unsigned long bytecount); */
|
|
MAYBE_PRINTF("modify_ldt ( %d, %p, %d )\n", arg1,arg2,arg3);
|
|
if (arg1 == 0) {
|
|
/* read the LDT into ptr */
|
|
SYSCALL_TRACK( pre_mem_write, tid,
|
|
"modify_ldt(ptr)(func=0)", arg2, arg3 );
|
|
}
|
|
if (arg1 == 1 || arg1 == 0x11) {
|
|
/* write the LDT with the entry pointed at by ptr */
|
|
SYSCALL_TRACK( pre_mem_read, tid,
|
|
"modify_ldt(ptr)(func=1 or 0x11)", arg2,
|
|
sizeof(struct vki_modify_ldt_ldt_s) );
|
|
}
|
|
/* "do" the syscall ourselves; the kernel never sees it */
|
|
res = VG_(sys_modify_ldt)( tid, arg1, (void*)arg2, arg3 );
|
|
SET_SYSCALL_RETVAL(tid, res);
|
|
if (arg1 == 0 && !VG_(is_kerror)(res) && res > 0) {
|
|
VG_TRACK( post_mem_write, arg2, res );
|
|
}
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_setresgid)
|
|
case __NR_setresgid: /* syscall 170 */
|
|
/* int setresgid(gid_t rgid, gid_t egid, gid_t sgid); */
|
|
MAYBE_PRINTF("setresgid ( %d, %d, %d )\n", arg1, arg2, arg3);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_vhangup)
|
|
case __NR_vhangup: /* syscall 111 */
|
|
/* int vhangup(void); */
|
|
MAYBE_PRINTF("vhangup()\n");
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_iopl)
|
|
case __NR_iopl: /* syscall 110 */
|
|
/* int iopl(int level); */
|
|
MAYBE_PRINTF("iopl ( %d )\n", arg1);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_setxattr)
|
|
case __NR_setxattr: /* syscall 226 */
|
|
/* int setxattr (const char *path, const char *name,
|
|
const void *value, size_t size, int flags); */
|
|
case __NR_lsetxattr: /* syscall 227 */
|
|
/* int lsetxattr (const char *path, const char *name,
|
|
const void *value, size_t size, int flags); */
|
|
if (VG_(clo_trace_syscalls))
|
|
VG_(printf)("setxattr ( %p, %p, %p, %d, %d )\n",
|
|
arg1, arg2, arg3, arg4, arg5);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "setxattr(path)", arg1 );
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "setxattr(name)", arg2 );
|
|
SYSCALL_TRACK( pre_mem_read, tid, "setxattr(value)", arg3, arg4 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_fsetxattr)
|
|
case __NR_fsetxattr: /* syscall 228 */
|
|
/* int fsetxattr (int filedes, const char *name,
|
|
const void *value, size_t size, int flags); */
|
|
if (VG_(clo_trace_syscalls))
|
|
VG_(printf)("fsetxattr ( %d, %p, %p, %d, %d )\n",
|
|
arg1, arg2, arg3, arg4, arg5);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "fsetxattr(name)", arg2 );
|
|
SYSCALL_TRACK( pre_mem_read, tid, "fsetxattr(value)", arg3, arg4 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_getxattr)
|
|
case __NR_getxattr: /* syscall 229 */
|
|
/* ssize_t getxattr (const char *path, const char* name,
|
|
void* value, size_t size); */
|
|
case __NR_lgetxattr: /* syscall 230 */
|
|
/* ssize_t lgetxattr (const char *path, const char *name,
|
|
void *value, size_t size); */
|
|
MAYBE_PRINTF("getxattr ( %p, %p, %p, %d )\n",
|
|
arg1,arg2,arg3, arg4);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "getxattr(path)", arg1 );
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "getxattr(name)", arg2 );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getxattr(value)", arg3, arg4 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res > 0
|
|
&& arg3 != (Addr)NULL) {
|
|
VG_TRACK( post_mem_write, arg3, res );
|
|
}
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_fgetxattr)
|
|
case __NR_fgetxattr: /* syscall 231 */
|
|
/* ssize_t fgetxattr (int filedes, const char *name,
|
|
void *value, size_t size); */
|
|
if (VG_(clo_trace_syscalls))
|
|
VG_(printf)("fgetxattr ( %d, %p, %p, %d )\n",
|
|
arg1, arg2, arg3, arg4);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "fgetxattr(name)", arg2 );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "fgetxattr(value)", arg3, arg4 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res > 0 && arg3 != (Addr)NULL)
|
|
VG_TRACK( post_mem_write, arg3, res );
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_listxattr)
|
|
case __NR_listxattr: /* syscall 232 */
|
|
/* ssize_t listxattr (const char *path, char *list, size_t size); */
|
|
case __NR_llistxattr: /* syscall 233 */
|
|
/* ssize_t llistxattr (const char *path, char *list, size_t size); */
|
|
if (VG_(clo_trace_syscalls))
|
|
VG_(printf)("listxattr ( %p, %p, %d )\n", arg1, arg2, arg3);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "listxattr(path)", arg1 );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "listxattr(list)", arg2, arg3 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res > 0 && arg2 != (Addr)NULL)
|
|
VG_TRACK( post_mem_write, arg2, res );
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_flistxattr)
|
|
case __NR_flistxattr: /* syscall 234 */
|
|
/* ssize_t flistxattr (int filedes, char *list, size_t size); */
|
|
if (VG_(clo_trace_syscalls))
|
|
VG_(printf)("flistxattr ( %d, %p, %d )\n", arg1, arg2, arg3);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "listxattr(list)", arg2, arg3 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res > 0 && arg2 != (Addr)NULL)
|
|
VG_TRACK( post_mem_write, arg2, res );
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_removexattr)
|
|
case __NR_removexattr: /* syscall 235 */
|
|
/* int removexattr (const char *path, const char *name); */
|
|
case __NR_lremovexattr: /* syscall 236 */
|
|
/* int lremovexattr (const char *path, const char *name); */
|
|
if (VG_(clo_trace_syscalls))
|
|
VG_(printf)("removexattr ( %p, %p )\n", arg1, arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "listxattr(path)", arg1 );
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "listxattr(name)", arg2 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_fremovexattr)
|
|
case __NR_fremovexattr: /* syscall 237 */
|
|
/* int fremovexattr (int filedes, const char *name); */
|
|
if (VG_(clo_trace_syscalls))
|
|
VG_(printf)("removexattr ( %d, %p )\n", arg1, arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "listxattr(name)", arg2 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_quotactl)
|
|
case __NR_quotactl: /* syscall 131 */
|
|
/* int quotactl(int cmd, char *special, int uid, caddr_t addr); */
|
|
MAYBE_PRINTF("quotactl (0x%x, %p, 0x%x, 0x%x )\n",
|
|
arg1,arg2,arg3, arg4);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "quotactl(special)", arg2 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_lookup_dcookie)
|
|
case __NR_lookup_dcookie: /* syscall 253 */
|
|
/* int lookup_dcookie (uint64_t cookie, char *buf, size_t sz); */
|
|
MAYBE_PRINTF("lookup_dcookie (0x%llx, %p, %d)\n",
|
|
arg1 | ((long long) arg2 << 32), arg3, arg4);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "lookup_dcookie(buf)", arg3, arg4);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && arg3 != (Addr)NULL)
|
|
VG_TRACK( post_mem_write, arg3, res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_truncate64)
|
|
case __NR_truncate64: /* syscall 193 */
|
|
/* int truncate64(const char *path, off64_t length); */
|
|
MAYBE_PRINTF("truncate64 ( %p, %lld )\n",
|
|
arg1, ((ULong)arg2) | (((ULong) arg3) << 32));
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "truncate64(path)", arg1 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_fdatasync)
|
|
case __NR_fdatasync: /* syscall 148 */
|
|
/* int fdatasync(int fd); */
|
|
MAYBE_PRINTF("fdatasync ( %d )\n", arg1);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_msync) /* syscall 144 */
|
|
case __NR_msync:
|
|
/* int msync(const void *start, size_t length, int flags); */
|
|
MAYBE_PRINTF("msync ( %p, %d, %d )\n", arg1,arg2,arg3);
|
|
SYSCALL_TRACK( pre_mem_read, tid, "msync(start)", arg1, arg2 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_getpmsg) /* syscall 188 */
|
|
case __NR_getpmsg:
|
|
{
|
|
/* LiS getpmsg from http://www.gcom.com/home/linux/lis/ */
|
|
/* int getpmsg(int fd, struct strbuf *ctrl, struct strbuf *data,
|
|
int *bandp, int *flagsp); */
|
|
struct strbuf {
|
|
int maxlen; /* no. of bytes in buffer */
|
|
int len; /* no. of bytes returned */
|
|
caddr_t buf; /* pointer to data */
|
|
};
|
|
struct strbuf *ctrl;
|
|
struct strbuf *data;
|
|
MAYBE_PRINTF("getpmsg ( %d, %p, %p, %p, %p )\n",
|
|
arg1,arg2,arg3,arg4,arg5);
|
|
ctrl = (struct strbuf *)arg2;
|
|
data = (struct strbuf *)arg3;
|
|
if (ctrl && ctrl->maxlen > 0)
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getpmsg(ctrl)",
|
|
(UInt)ctrl->buf, ctrl->maxlen);
|
|
if (data && data->maxlen > 0)
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getpmsg(data)",
|
|
(UInt)data->buf, data->maxlen);
|
|
if (arg4)
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getpmsg(bandp)",
|
|
(UInt)arg4, sizeof(int));
|
|
if (arg5)
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getpmsg(flagsp)",
|
|
(UInt)arg5, sizeof(int));
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0 && ctrl && ctrl->len > 0) {
|
|
VG_TRACK( post_mem_write, (UInt)ctrl->buf, ctrl->len);
|
|
}
|
|
if (!VG_(is_kerror)(res) && res == 0 && data && data->len > 0) {
|
|
VG_TRACK( post_mem_write, (UInt)data->buf, data->len);
|
|
}
|
|
}
|
|
break;
|
|
# endif
|
|
|
|
|
|
# if defined(__NR_putpmsg) /* syscall 189 */
|
|
case __NR_putpmsg:
|
|
{
|
|
/* LiS putpmsg from http://www.gcom.com/home/linux/lis/ */
|
|
/* int putpmsg(int fd, struct strbuf *ctrl, struct strbuf *data,
|
|
int band, int flags); */
|
|
struct strbuf {
|
|
int maxlen; /* no. of bytes in buffer */
|
|
int len; /* no. of bytes returned */
|
|
caddr_t buf; /* pointer to data */
|
|
};
|
|
struct strbuf *ctrl;
|
|
struct strbuf *data;
|
|
MAYBE_PRINTF("putpmsg ( %d, %p, %p, %d, %d )\n",
|
|
arg1,arg2,arg3,arg4,arg5);
|
|
ctrl = (struct strbuf *)arg2;
|
|
data = (struct strbuf *)arg3;
|
|
if (ctrl && ctrl->len > 0)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "putpmsg(ctrl)",
|
|
(UInt)ctrl->buf, ctrl->len);
|
|
if (data && data->len > 0)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "putpmsg(data)",
|
|
(UInt)data->buf, data->len);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
}
|
|
break;
|
|
# endif
|
|
|
|
case __NR_getitimer: /* syscall 105 */
|
|
/* int getitimer(int which, struct itimerval *value); */
|
|
MAYBE_PRINTF("getitimer ( %d, %p )\n", arg1, arg2);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getitimer(timer)", arg2,
|
|
sizeof(struct itimerval) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && arg2 != (Addr)NULL) {
|
|
VG_TRACK( post_mem_write,arg2, sizeof(struct itimerval));
|
|
}
|
|
break;
|
|
|
|
# if defined(__NR_syslog)
|
|
case __NR_syslog: /* syscall 103 */
|
|
/* int syslog(int type, char *bufp, int len); */
|
|
MAYBE_PRINTF("syslog (%d, %p, %d)\n",arg1,arg2,arg3);
|
|
switch(arg1) {
|
|
case 2: case 3: case 4:
|
|
SYSCALL_TRACK( pre_mem_write, tid, "syslog(buf)", arg2, arg3);
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
KERNEL_DO_SYSCALL(tid, res);
|
|
if (!VG_(is_kerror)(res)) {
|
|
switch (arg1) {
|
|
case 2: case 3: case 4:
|
|
VG_TRACK( post_mem_write, arg2, arg3 );
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
break;
|
|
# endif
|
|
|
|
case __NR_personality: /* syscall 136 */
|
|
/* int personality(unsigned long persona); */
|
|
MAYBE_PRINTF("personality ( %d )\n", arg1);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_chroot: /* syscall 61 */
|
|
/* int chroot(const char *path); */
|
|
MAYBE_PRINTF("chroot ( %p )\n", arg1);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "chroot(path)", arg1 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
# if defined(__NR_madvise)
|
|
case __NR_madvise: /* syscall 219 */
|
|
/* int madvise(void *start, size_t length, int advice ); */
|
|
MAYBE_PRINTF("madvise ( %p, %d, %d )\n", arg1,arg2,arg3);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_mremap)
|
|
/* Treating it like an munmap() followed by a mmap() */
|
|
case __NR_mremap: /* syscall 163 */
|
|
/* void* mremap(void * old_address, size_t old_size,
|
|
size_t new_size, unsigned long flags); */
|
|
MAYBE_PRINTF("mremap ( %p, %d, %d, 0x%x )\n",
|
|
arg1, arg2, arg3, arg4);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "mremap(old_address)", arg1, arg2 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res)) {
|
|
mremap_segment( arg1, arg2, (Addr)res, arg3 );
|
|
}
|
|
break;
|
|
# endif
|
|
|
|
case __NR_nice: /* syscall 34 */
|
|
/* int nice(int inc); */
|
|
MAYBE_PRINTF("nice ( %d )\n", arg1);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
/* !!!!!!!!!! New, untested syscalls, 14 Mar 02 !!!!!!!!!! */
|
|
|
|
# if defined(__NR_setresgid32)
|
|
case __NR_setresgid32: /* syscall 210 */
|
|
/* int setresgid(gid_t rgid, gid_t egid, gid_t sgid); */
|
|
MAYBE_PRINTF("setresgid32 ( %d, %d, %d )\n", arg1, arg2, arg3);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_setfsuid32)
|
|
case __NR_setfsuid32: /* syscall 215 */
|
|
/* int setfsuid(uid_t fsuid); */
|
|
MAYBE_PRINTF("setfsuid ( %d )\n", arg1);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR__sysctl)
|
|
case __NR__sysctl:
|
|
/* int _sysctl(struct __sysctl_args *args); */
|
|
MAYBE_PRINTF("_sysctl ( %p )\n", arg1 );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "_sysctl(args)", arg1,
|
|
sizeof(struct __sysctl_args) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res))
|
|
VG_TRACK( post_mem_write, arg1, sizeof(struct __sysctl_args) );
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_sched_getscheduler)
|
|
case __NR_sched_getscheduler: /* syscall 157 */
|
|
/* int sched_getscheduler(pid_t pid); */
|
|
MAYBE_PRINTF("sched_getscheduler ( %d )\n", arg1);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_sched_setscheduler)
|
|
case __NR_sched_setscheduler: /* syscall 156 */
|
|
/* int sched_setscheduler(pid_t pid, int policy,
|
|
const struct sched_param *p); */
|
|
MAYBE_PRINTF("sched_setscheduler ( %d, %d, %p )\n",arg1,arg2,arg3);
|
|
if (arg3 != (UInt)NULL)
|
|
SYSCALL_TRACK( pre_mem_read, tid,
|
|
"sched_setscheduler(struct sched_param *p)",
|
|
arg3, sizeof(struct sched_param));
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_mlock)
|
|
case __NR_mlock: /* syscall 150 */
|
|
/* int mlock(const void * addr, size_t len) */
|
|
MAYBE_PRINTF("mlock ( %p, %d )\n", arg1, arg2);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_munlock)
|
|
case __NR_munlock: /* syscall 151 */
|
|
/* int munlock(const void * addr, size_t len) */
|
|
MAYBE_PRINTF("munlock ( %p, %d )\n", arg1, arg2);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_mlockall)
|
|
case __NR_mlockall: /* syscall 152 */
|
|
/* int mlockall(int flags); */
|
|
MAYBE_PRINTF("mlockall ( %x )\n", arg1);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_munlockall)
|
|
case __NR_munlockall: /* syscall 153 */
|
|
/* int munlockall(void); */
|
|
MAYBE_PRINTF("munlockall ( )\n");
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
#if defined(__NR_sched_get_priority_max)
|
|
case __NR_sched_get_priority_max: /* syscall 159 */
|
|
/* int sched_get_priority_max(int policy); */
|
|
MAYBE_PRINTF("sched_get_priority_max ( %d )\n", arg1);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
#if defined(__NR_sched_get_priority_min)
|
|
case __NR_sched_get_priority_min: /* syscall 160 */
|
|
/* int sched_get_priority_min(int policy); */
|
|
MAYBE_PRINTF("sched_get_priority_min ( %d )\n", arg1);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
#if defined(__NR_setpriority)
|
|
case __NR_setpriority: /* syscall 97 */
|
|
/* int setpriority(int which, int who, int prio); */
|
|
MAYBE_PRINTF("setpriority ( %d, %d, %d )\n", arg1, arg2, arg3);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
#if defined(__NR_getpriority)
|
|
case __NR_getpriority: /* syscall 96 */
|
|
/* int getpriority(int which, int who); */
|
|
MAYBE_PRINTF("getpriority ( %d, %d )\n", arg1, arg2);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_setfsgid)
|
|
case __NR_setfsgid: /* syscall 139 */
|
|
/* int setfsgid(gid_t gid); */
|
|
MAYBE_PRINTF("setfsgid ( %d )\n", arg1);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_setregid)
|
|
case __NR_setregid: /* syscall 71 */
|
|
/* int setregid(gid_t rgid, gid_t egid); */
|
|
MAYBE_PRINTF("setregid ( %d, %d )\n", arg1, arg2);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_setresuid)
|
|
case __NR_setresuid: /* syscall 164 */
|
|
/* int setresuid(uid_t ruid, uid_t euid, uid_t suid); */
|
|
MAYBE_PRINTF("setresuid ( %d, %d, %d )\n", arg1, arg2, arg3);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_setfsuid)
|
|
case __NR_setfsuid: /* syscall 138 */
|
|
/* int setfsuid(uid_t uid); */
|
|
MAYBE_PRINTF("setfsuid ( %d )\n", arg1);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
/* !!!!!!!!!! New, untested syscalls, 8 Mar 02 !!!!!!!!!!! */
|
|
|
|
# if defined(__NR_sendfile)
|
|
case __NR_sendfile: /* syscall 187 */
|
|
/* ssize_t sendfile(int out_fd, int in_fd, off_t *offset,
|
|
size_t count) */
|
|
MAYBE_PRINTF("sendfile ( %d, %d, %p, %d )\n",arg1,arg2,arg3,arg4);
|
|
if (arg3 != (UInt)NULL)
|
|
SYSCALL_TRACK( pre_mem_write, tid, "sendfile(offset)",
|
|
arg3, sizeof(off_t) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && arg3 != (UInt)NULL) {
|
|
VG_TRACK( post_mem_write, arg3, sizeof( off_t ) );
|
|
}
|
|
break;
|
|
# endif
|
|
|
|
/* !!!!!!!!!! New, untested syscall, 3 Jun 03 !!!!!!!!!!! */
|
|
# if defined(__NR_sendfile64)
|
|
case __NR_sendfile64: /* syscall 239 */
|
|
/* ssize_t sendfile64(int out_df, int in_fd, loff_t *offset,
|
|
size_t count); */
|
|
MAYBE_PRINTF("sendfile64 ( %d, %d, %p, %d )\n",arg1,arg2,arg3,arg4);
|
|
if (arg3 != (UInt)NULL)
|
|
SYSCALL_TRACK( pre_mem_write, tid, "sendfile64(offset)",
|
|
arg3, sizeof(loff_t) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && arg3 != (UInt)NULL ) {
|
|
VG_TRACK( post_mem_write, arg3, sizeof(loff_t) );
|
|
}
|
|
break;
|
|
# endif
|
|
|
|
/* !!!!!!!!!! New, untested syscalls, 7 Mar 02 !!!!!!!!!!! */
|
|
|
|
# if defined(__NR_pwrite)
|
|
case __NR_pwrite: /* syscall 181 */
|
|
/* ssize_t pwrite (int fd, const void *buf, size_t nbytes,
|
|
off_t offset); */
|
|
MAYBE_PRINTF("pwrite ( %d, %p, %d, %d )\n", arg1, arg2, arg3, arg4);
|
|
SYSCALL_TRACK( pre_mem_read, tid, "pwrite(buf)", arg2, arg3 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
/* !!!!!!!!!! New, untested syscalls, 6 Mar 02 !!!!!!!!!!! */
|
|
|
|
case __NR_sync: /* syscall 36 */
|
|
/* int sync(); */
|
|
MAYBE_PRINTF("sync ( )\n");
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_fstatfs: /* syscall 100 */
|
|
/* int fstatfs(int fd, struct statfs *buf); */
|
|
MAYBE_PRINTF("fstatfs ( %d, %p )\n",arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "stat(buf)",
|
|
arg2, sizeof(struct statfs) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res))
|
|
VG_TRACK( post_mem_write, arg2, sizeof(struct statfs) );
|
|
break;
|
|
|
|
/* !!!!!!!!!! New, untested syscalls, 4 Mar 02 !!!!!!!!!!! */
|
|
|
|
case __NR_pause: /* syscall 29 */
|
|
/* int pause(void); */
|
|
MAYBE_PRINTF("pause ( )\n");
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_getsid: /* syscall 147 */
|
|
/* pid_t getsid(pid_t pid); */
|
|
MAYBE_PRINTF("getsid ( %d )\n", arg1);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
# if defined(__NR_pread)
|
|
case __NR_pread: /* syscall 180 */
|
|
/* ssize_t pread(int fd, void *buf, size_t count, off_t offset); */
|
|
MAYBE_PRINTF("pread ( %d, %p, %d, %d ) ...\n",arg1,arg2,arg3,arg4);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "pread(buf)", arg2, arg3 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
MAYBE_PRINTF("SYSCALL[%d] pread ( %d, %p, %d, %d ) --> %d\n",
|
|
VG_(getpid)(),
|
|
arg1, arg2, arg3, arg4, res);
|
|
if (!VG_(is_kerror)(res) && res > 0) {
|
|
VG_TRACK( post_mem_write, arg2, res );
|
|
}
|
|
break;
|
|
# endif
|
|
|
|
/* !!!!!!!!!! New, untested syscalls, 27 Feb 02 !!!!!!!!!! */
|
|
|
|
case __NR_mknod: /* syscall 14 */
|
|
/* int mknod(const char *pathname, mode_t mode, dev_t dev); */
|
|
MAYBE_PRINTF("mknod ( %p, 0x%x, 0x%x )\n", arg1, arg2, arg3 );
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "mknod(pathname)", arg1 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_flock: /* syscall 143 */
|
|
/* int flock(int fd, int operation); */
|
|
MAYBE_PRINTF("flock ( %d, %d )\n", arg1, arg2 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
# if defined(__NR_rt_sigsuspend)
|
|
/* Viewed with great suspicion by me, but, hey, let's do it
|
|
anyway ... */
|
|
case __NR_rt_sigsuspend: /* syscall 179 */
|
|
/* int sigsuspend(const sigset_t *mask); */
|
|
MAYBE_PRINTF("sigsuspend ( %p )\n", arg1 );
|
|
if (arg1 != (Addr)NULL) {
|
|
/* above NULL test is paranoia */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "sigsuspend(mask)", arg1,
|
|
sizeof(vki_ksigset_t) );
|
|
}
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_rt_sigtimedwait)
|
|
case __NR_rt_sigtimedwait: /* syscall 177 */
|
|
/* int sigtimedwait(const sigset_t *set, siginfo_t *info,
|
|
const struct timespec timeout); */
|
|
if (arg2 != (UInt)NULL)
|
|
SYSCALL_TRACK( pre_mem_write, tid, "sigtimedwait(info)", arg2,
|
|
sizeof(siginfo_t) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && arg2 != (UInt)NULL)
|
|
VG_TRACK( post_mem_write, arg2, sizeof(siginfo_t) );
|
|
break;
|
|
# endif
|
|
|
|
case __NR_init_module: /* syscall 128 */
|
|
/* int init_module(const char *name, struct module *image); */
|
|
MAYBE_PRINTF("init_module ( %p, %p )\n", arg1, arg2 );
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "init_module(name)", arg1 );
|
|
SYSCALL_TRACK( pre_mem_read, tid, "init_module(image)", arg2,
|
|
VKI_SIZEOF_STRUCT_MODULE );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_ioperm: /* syscall 101 */
|
|
/* int ioperm(unsigned long from, unsigned long num, int turn_on); */
|
|
MAYBE_PRINTF("ioperm ( %d, %d, %d )\n", arg1, arg2, arg3 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_capget: /* syscall 184 */
|
|
/* int capget(cap_user_header_t header, cap_user_data_t data); */
|
|
MAYBE_PRINTF("capget ( %p, %p )\n", arg1, arg2 );
|
|
SYSCALL_TRACK( pre_mem_read, tid, "capget(header)", arg1,
|
|
sizeof(vki_cap_user_header_t) );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "capget(data)", arg2,
|
|
sizeof( vki_cap_user_data_t) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && arg2 != (Addr)NULL)
|
|
VG_TRACK( post_mem_write, arg2, sizeof( vki_cap_user_data_t) );
|
|
break;
|
|
|
|
/* Added by Gerald Carter <jerry@samba.org> 2002-12-17 */
|
|
# if defined(__NR_capset)
|
|
/* int capset(cap_user_header_t header, const cap_user_data_t data); */
|
|
case __NR_capset: /* syscall 185 */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "capset(header)",
|
|
arg1, sizeof(vki_cap_user_header_t) );
|
|
SYSCALL_TRACK( pre_mem_read, tid, "capset(data)",
|
|
arg2, sizeof( vki_cap_user_data_t) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
/* end modifications by <jerry@samba.org> */
|
|
|
|
/* !!!!!!!!!!!!!!!!!!!!! mutant ones !!!!!!!!!!!!!!!!!!!!! */
|
|
|
|
case __NR_execve: /* syscall 11 */
|
|
/* int execve (const char *filename,
|
|
char *const argv [],
|
|
char *const envp[]); */
|
|
MAYBE_PRINTF("execve ( %p(%s), %p, %p ) --- NOT CHECKED\n",
|
|
arg1, arg1, arg2, arg3);
|
|
/* Resistance is futile. Nuke all other threads. POSIX
|
|
mandates this. */
|
|
VG_(nuke_all_threads_except)( tid );
|
|
/* Make any binding for LD_PRELOAD disappear, so that child
|
|
processes don't get traced into. */
|
|
if (!VG_(clo_trace_children)) {
|
|
Int i;
|
|
Char** envp = (Char**)arg3;
|
|
Char* ld_preload_str = NULL;
|
|
Char* ld_library_path_str = NULL;
|
|
for (i = 0; envp[i] != NULL; i++) {
|
|
if (VG_(strncmp)(envp[i], "LD_PRELOAD=", 11) == 0)
|
|
ld_preload_str = &envp[i][11];
|
|
if (VG_(strncmp)(envp[i], "LD_LIBRARY_PATH=", 16) == 0)
|
|
ld_library_path_str = &envp[i][16];
|
|
}
|
|
VG_(mash_LD_PRELOAD_and_LD_LIBRARY_PATH)(
|
|
ld_preload_str, ld_library_path_str );
|
|
}
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
/* Should we still be alive here? Don't think so. */
|
|
/* Actually, above comment is wrong. execve can fail, just
|
|
like any other syscall -- typically the file to exec does
|
|
not exist. Hence: */
|
|
vg_assert(VG_(is_kerror)(res));
|
|
break;
|
|
|
|
/* !!!!!!!!!!!!!!!!!!!!! end !!!!!!!!!!!!!!!!!!!!! */
|
|
|
|
case __NR_access: /* syscall 33 */
|
|
/* int access(const char *pathname, int mode); */
|
|
MAYBE_PRINTF("access ( %p, %d )\n", arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "access(pathname)", arg1 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_alarm: /* syscall 27 */
|
|
/* unsigned int alarm(unsigned int seconds); */
|
|
MAYBE_PRINTF("alarm ( %d )\n", arg1);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_brk: /* syscall 45 */
|
|
/* Haven't a clue if this is really right. */
|
|
/* int brk(void *end_data_segment); */
|
|
MAYBE_PRINTF("brk ( %p ) --> ",arg1);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
MAYBE_PRINTF("0x%x\n", res);
|
|
|
|
if (!VG_(is_kerror)(res)) {
|
|
if (arg1 == 0) {
|
|
/* Just asking where the current end is. (???) */
|
|
curr_dataseg_end = res;
|
|
} else
|
|
if (arg1 < curr_dataseg_end) {
|
|
/* shrinking the data segment. */
|
|
VG_TRACK( die_mem_brk, (Addr)arg1,
|
|
curr_dataseg_end-arg1 );
|
|
curr_dataseg_end = arg1;
|
|
} else
|
|
if (arg1 > curr_dataseg_end && res != 0) {
|
|
/* asked for more memory, and got it */
|
|
/*
|
|
VG_(printf)("BRK: new area %x .. %x\n",
|
|
VG_(curr_dataseg_end, arg1-1 );
|
|
*/
|
|
VG_TRACK( new_mem_brk, (Addr)curr_dataseg_end,
|
|
arg1-curr_dataseg_end );
|
|
curr_dataseg_end = arg1;
|
|
}
|
|
}
|
|
break;
|
|
|
|
case __NR_chdir: /* syscall 12 */
|
|
/* int chdir(const char *path); */
|
|
MAYBE_PRINTF("chdir ( %p )\n", arg1);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "chdir(path)", arg1 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_chmod: /* syscall 15 */
|
|
/* int chmod(const char *path, mode_t mode); */
|
|
MAYBE_PRINTF("chmod ( %p, %d )\n", arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "chmod(path)", arg1 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
# if defined(__NR_chown32)
|
|
case __NR_chown32: /* syscall 212 */
|
|
# endif
|
|
# if defined(__NR_lchown32)
|
|
case __NR_lchown32: /* syscall 198 */
|
|
# endif
|
|
case __NR_chown: /* syscall 16 */
|
|
/* int chown(const char *path, uid_t owner, gid_t group); */
|
|
MAYBE_PRINTF("chown ( %p, 0x%x, 0x%x )\n", arg1,arg2,arg3);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "chown(path)", arg1 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_close: /* syscall 6 */
|
|
/* int close(int fd); */
|
|
MAYBE_PRINTF("close ( %d )\n",arg1);
|
|
/* Detect and negate attempts by the client to close Valgrind's
|
|
logfile fd ... */
|
|
if (arg1 == (UInt)VG_(clo_logfile_fd)) {
|
|
VG_(message)(Vg_UserMsg,
|
|
"Warning: client attempted to close "
|
|
"Valgrind's logfile fd (%d).",
|
|
VG_(clo_logfile_fd));
|
|
VG_(message)(Vg_UserMsg,
|
|
" Use --logfile-fd=<number> to select an "
|
|
"alternative logfile fd." );
|
|
/* Pretend the close succeeded, regardless. (0 == success) */
|
|
res = 0;
|
|
SET_SYSCALL_RETVAL(tid, res);
|
|
} else {
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
}
|
|
break;
|
|
|
|
case __NR_dup: /* syscall 41 */
|
|
/* int dup(int oldfd); */
|
|
MAYBE_PRINTF("dup ( %d ) --> ", arg1);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
MAYBE_PRINTF("%d\n", res);
|
|
break;
|
|
|
|
case __NR_dup2: /* syscall 63 */
|
|
/* int dup2(int oldfd, int newfd); */
|
|
MAYBE_PRINTF("dup2 ( %d, %d ) ...\n", arg1,arg2);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
MAYBE_PRINTF("SYSCALL[%d] dup2 ( %d, %d ) = %d\n",
|
|
VG_(getpid)(),
|
|
arg1, arg2, res);
|
|
break;
|
|
|
|
case __NR_fcntl: /* syscall 55 */
|
|
/* int fcntl(int fd, int cmd, int arg); */
|
|
MAYBE_PRINTF("fcntl ( %d, %d, %d )\n",arg1,arg2,arg3);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_fchdir: /* syscall 133 */
|
|
/* int fchdir(int fd); */
|
|
MAYBE_PRINTF("fchdir ( %d )\n", arg1);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
# if defined(__NR_fchown32)
|
|
case __NR_fchown32: /* syscall 207 */
|
|
# endif
|
|
case __NR_fchown: /* syscall 95 */
|
|
/* int fchown(int filedes, uid_t owner, gid_t group); */
|
|
MAYBE_PRINTF("fchown ( %d, %d, %d )\n", arg1,arg2,arg3);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_fchmod: /* syscall 94 */
|
|
/* int fchmod(int fildes, mode_t mode); */
|
|
MAYBE_PRINTF("fchmod ( %d, %d )\n", arg1,arg2);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
# if defined(__NR_fcntl64)
|
|
case __NR_fcntl64: /* syscall 221 */
|
|
/* I don't know what the prototype for this is supposed to be. */
|
|
/* ??? int fcntl(int fd, int cmd); */
|
|
MAYBE_PRINTF("fcntl64 (?!) ( %d, %d )\n", arg1,arg2);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
case __NR_fstat: /* syscall 108 */
|
|
/* int fstat(int filedes, struct stat *buf); */
|
|
MAYBE_PRINTF("fstat ( %d, %p )\n",arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "fstat", arg2, sizeof(struct stat) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res))
|
|
VG_TRACK( post_mem_write, arg2, sizeof(struct stat) );
|
|
break;
|
|
|
|
case __NR_vfork: /* syscall 190 */
|
|
/* pid_t vfork(void); */
|
|
MAYBE_PRINTF("vfork ( ) ... becomes ... ");
|
|
/* KLUDGE: we prefer to do a fork rather than vfork.
|
|
vfork gives a SIGSEGV, and the stated semantics looks
|
|
pretty much impossible for us. */
|
|
tst->m_eax = __NR_fork;
|
|
/* fall through ... */
|
|
case __NR_fork: /* syscall 2 */
|
|
/* pid_t fork(void); */
|
|
MAYBE_PRINTF("fork ()\n");
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (res == 0) {
|
|
/* I am the child. Nuke all other threads which I might
|
|
have inherited from my parent. POSIX mandates this. */
|
|
VG_(nuke_all_threads_except)( tid );
|
|
}
|
|
break;
|
|
|
|
case __NR_fsync: /* syscall 118 */
|
|
/* int fsync(int fd); */
|
|
MAYBE_PRINTF("fsync ( %d )\n", arg1);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_ftruncate: /* syscall 93 */
|
|
/* int ftruncate(int fd, size_t length); */
|
|
MAYBE_PRINTF("ftruncate ( %d, %d )\n", arg1,arg2);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
# if defined(__NR_ftruncate64)
|
|
case __NR_ftruncate64: /* syscall 194 */
|
|
/* int ftruncate64(int fd, off64_t length); */
|
|
MAYBE_PRINTF("ftruncate64 ( %d, %lld )\n",
|
|
arg1,arg2|((long long) arg3 << 32));
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
case __NR_getdents: /* syscall 141 */
|
|
/* int getdents(unsigned int fd, struct dirent *dirp,
|
|
unsigned int count); */
|
|
MAYBE_PRINTF("getdents ( %d, %p, %d )\n",arg1,arg2,arg3);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getdents(dirp)", arg2, arg3 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res > 0)
|
|
VG_TRACK( post_mem_write, arg2, res );
|
|
break;
|
|
|
|
# if defined(__NR_getdents64)
|
|
case __NR_getdents64: /* syscall 220 */
|
|
/* int getdents(unsigned int fd, struct dirent64 *dirp,
|
|
unsigned int count); */
|
|
MAYBE_PRINTF("getdents64 ( %d, %p, %d )\n",arg1,arg2,arg3);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getdents64(dirp)", arg2, arg3 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res > 0)
|
|
VG_TRACK( post_mem_write, arg2, res );
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_getgroups32)
|
|
case __NR_getgroups32: /* syscall 205 */
|
|
# endif
|
|
case __NR_getgroups: /* syscall 80 */
|
|
/* int getgroups(int size, gid_t list[]); */
|
|
MAYBE_PRINTF("getgroups ( %d, %p )\n", arg1, arg2);
|
|
if (arg1 > 0)
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getgroups(list)", arg2,
|
|
arg1 * sizeof(gid_t) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (arg1 > 0 && !VG_(is_kerror)(res) && res > 0)
|
|
VG_TRACK( post_mem_write, arg2, res * sizeof(gid_t) );
|
|
break;
|
|
|
|
case __NR_getcwd: /* syscall 183 */
|
|
/* char *getcwd(char *buf, size_t size); (but see comment below) */
|
|
MAYBE_PRINTF("getcwd ( %p, %d )\n",arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getcwd(buf)", arg1, arg2 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
|
|
/* From linux/fs/dcache.c:
|
|
* NOTE! The user-level library version returns a character
|
|
* pointer. The kernel system call just returns the length of the
|
|
* buffer filled (which includes the ending '\0' character), or a
|
|
* negative error value.
|
|
*/
|
|
if (!VG_(is_kerror)(res) && res != (Addr)NULL)
|
|
VG_TRACK( post_mem_write, arg1, res );
|
|
break;
|
|
|
|
case __NR_geteuid: /* syscall 49 */
|
|
/* uid_t geteuid(void); */
|
|
MAYBE_PRINTF("geteuid ( )\n");
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
# if defined(__NR_geteuid32)
|
|
case __NR_geteuid32: /* syscall 201 */
|
|
/* ?? uid_t geteuid32(void); */
|
|
MAYBE_PRINTF("geteuid32(?) ( )\n");
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
case __NR_getegid: /* syscall 50 */
|
|
/* gid_t getegid(void); */
|
|
MAYBE_PRINTF("getegid ()\n");
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
# if defined(__NR_getegid32)
|
|
case __NR_getegid32: /* syscall 202 */
|
|
/* gid_t getegid32(void); */
|
|
MAYBE_PRINTF("getegid32 ()\n");
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
case __NR_getgid: /* syscall 47 */
|
|
/* gid_t getgid(void); */
|
|
MAYBE_PRINTF("getgid ()\n");
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
# if defined(__NR_getgid32)
|
|
case __NR_getgid32: /* syscall 200 */
|
|
/* gid_t getgid32(void); */
|
|
MAYBE_PRINTF("getgid32 ()\n");
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
case __NR_getpid: /* syscall 20 */
|
|
/* pid_t getpid(void); */
|
|
MAYBE_PRINTF("getpid ()\n");
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_getpgid: /* syscall 132 */
|
|
/* pid_t getpgid(pid_t pid); */
|
|
MAYBE_PRINTF("getpgid ( %d )\n", arg1);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_getpgrp: /* syscall 65 */
|
|
/* pid_t getpgrp(void); */
|
|
MAYBE_PRINTF("getpgrp ()\n");
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_getppid: /* syscall 64 */
|
|
/* pid_t getppid(void); */
|
|
MAYBE_PRINTF("getppid ()\n");
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_getresgid: /* syscall 171 */
|
|
/* int getresgid(gid_t *rgid, gid_t *egid, gid_t *sgid); */
|
|
MAYBE_PRINTF("getresgid ( %p, %p, %p )\n", arg1,arg2,arg3);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getresgid(rgid)",
|
|
arg1, sizeof(gid_t) );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getresgid(egid)",
|
|
arg2, sizeof(gid_t) );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getresgid(sgid)",
|
|
arg3, sizeof(gid_t) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0) {
|
|
VG_TRACK( post_mem_write, arg1, sizeof(gid_t) );
|
|
VG_TRACK( post_mem_write, arg2, sizeof(gid_t) );
|
|
VG_TRACK( post_mem_write, arg3, sizeof(gid_t) );
|
|
}
|
|
break;
|
|
|
|
# if defined(__NR_getresgid32)
|
|
case __NR_getresgid32: /* syscall 211 */
|
|
/* int getresgid(gid_t *rgid, gid_t *egid, gid_t *sgid); */
|
|
MAYBE_PRINTF("getresgid32 ( %p, %p, %p )\n", arg1,arg2,arg3);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getresgid32(rgid)",
|
|
arg1, sizeof(gid_t) );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getresgid32(egid)",
|
|
arg2, sizeof(gid_t) );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getresgid32(sgid)",
|
|
arg3, sizeof(gid_t) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0) {
|
|
VG_TRACK( post_mem_write, arg1, sizeof(gid_t) );
|
|
VG_TRACK( post_mem_write, arg2, sizeof(gid_t) );
|
|
VG_TRACK( post_mem_write, arg3, sizeof(gid_t) );
|
|
}
|
|
break;
|
|
# endif
|
|
|
|
case __NR_getresuid: /* syscall 165 */
|
|
/* int getresuid(uid_t *ruid, uid_t *euid, uid_t *suid); */
|
|
MAYBE_PRINTF("getresuid ( %p, %p, %p )\n", arg1,arg2,arg3);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getresuid(ruid)",
|
|
arg1, sizeof(uid_t) );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getresuid(euid)",
|
|
arg2, sizeof(uid_t) );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getresuid(suid)",
|
|
arg3, sizeof(uid_t) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0) {
|
|
VG_TRACK( post_mem_write, arg1, sizeof(uid_t) );
|
|
VG_TRACK( post_mem_write, arg2, sizeof(uid_t) );
|
|
VG_TRACK( post_mem_write, arg3, sizeof(uid_t) );
|
|
}
|
|
break;
|
|
|
|
# if defined(__NR_getresuid32)
|
|
case __NR_getresuid32: /* syscall 209 */
|
|
/* int getresuid(uid_t *ruid, uid_t *euid, uid_t *suid); */
|
|
MAYBE_PRINTF("getresuid32 ( %p, %p, %p )\n", arg1,arg2,arg3);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getresuid32(ruid)",
|
|
arg1, sizeof(uid_t) );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getresuid32(euid)",
|
|
arg2, sizeof(uid_t) );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getresuid32(suid)",
|
|
arg3, sizeof(uid_t) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0) {
|
|
VG_TRACK( post_mem_write, arg1, sizeof(uid_t) );
|
|
VG_TRACK( post_mem_write, arg2, sizeof(uid_t) );
|
|
VG_TRACK( post_mem_write, arg3, sizeof(uid_t) );
|
|
}
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_ugetrlimit)
|
|
case __NR_ugetrlimit: /* syscall 191 */
|
|
# endif
|
|
case __NR_getrlimit: /* syscall 76 */
|
|
/* int getrlimit (int resource, struct rlimit *rlim); */
|
|
MAYBE_PRINTF("getrlimit ( %d, %p )\n", arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getrlimit(rlim)", arg2,
|
|
sizeof(struct rlimit) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write, arg2, sizeof(struct rlimit) );
|
|
break;
|
|
|
|
case __NR_getrusage: /* syscall 77 */
|
|
/* int getrusage (int who, struct rusage *usage); */
|
|
MAYBE_PRINTF("getrusage ( %d, %p )\n", arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getrusage(usage)", arg2,
|
|
sizeof(struct rusage) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write,arg2, sizeof(struct rusage) );
|
|
break;
|
|
|
|
case __NR_gettimeofday: /* syscall 78 */
|
|
/* int gettimeofday(struct timeval *tv, struct timezone *tz); */
|
|
MAYBE_PRINTF("gettimeofday ( %p, %p )\n",arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "gettimeofday(tv)", arg1,
|
|
sizeof(struct timeval) );
|
|
if (arg2 != 0)
|
|
SYSCALL_TRACK( pre_mem_write, tid, "gettimeofday(tz)", arg2,
|
|
sizeof(struct timezone) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0) {
|
|
VG_TRACK( post_mem_write, arg1, sizeof(struct timeval) );
|
|
if (arg2 != 0)
|
|
VG_TRACK( post_mem_write, arg2, sizeof(struct timezone) );
|
|
}
|
|
break;
|
|
|
|
case __NR_getuid: /* syscall 24 */
|
|
/* uid_t getuid(void); */
|
|
MAYBE_PRINTF("getuid ( )\n");
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
# if defined(__NR_getuid32)
|
|
case __NR_getuid32: /* syscall 199 */
|
|
/* ???uid_t getuid32(void); */
|
|
MAYBE_PRINTF("getuid32 ( )\n");
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
case __NR_ipc: /* syscall 117 */
|
|
/* int ipc ( unsigned int call, int first, int second,
|
|
int third, void *ptr, long fifth); */
|
|
{
|
|
UInt arg6 = tst->m_ebp;
|
|
|
|
MAYBE_PRINTF("ipc ( %d, %d, %d, %d, %p, %d )\n",
|
|
arg1,arg2,arg3,arg4,arg5,arg6);
|
|
switch (arg1 /* call */) {
|
|
case 1: /* IPCOP_semop */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "semop(sops)", arg5,
|
|
arg3 * sizeof(struct sembuf) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
case 2: /* IPCOP_semget */
|
|
case 3: /* IPCOP_semctl */
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
case 11: /* IPCOP_msgsnd */
|
|
{
|
|
struct msgbuf *msgp = (struct msgbuf *)arg5;
|
|
Int msgsz = arg3;
|
|
|
|
SYSCALL_TRACK( pre_mem_read, tid, "msgsnd(msgp->mtype)",
|
|
(UInt)&msgp->mtype, sizeof(msgp->mtype) );
|
|
SYSCALL_TRACK( pre_mem_read, tid, "msgsnd(msgp->mtext)",
|
|
(UInt)msgp->mtext, msgsz );
|
|
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
}
|
|
case 12: /* IPCOP_msgrcv */
|
|
{
|
|
struct msgbuf *msgp;
|
|
Int msgsz = arg3;
|
|
|
|
msgp = (struct msgbuf *)deref_Addr( tid,
|
|
(Addr) (&((struct ipc_kludge *)arg5)->msgp),
|
|
"msgrcv(msgp)" );
|
|
|
|
SYSCALL_TRACK( pre_mem_write, tid, "msgrcv(msgp->mtype)",
|
|
(UInt)&msgp->mtype, sizeof(msgp->mtype) );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "msgrcv(msgp->mtext)",
|
|
(UInt)msgp->mtext, msgsz );
|
|
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
|
|
if ( !VG_(is_kerror)(res) && res > 0 ) {
|
|
VG_TRACK( post_mem_write, (UInt)&msgp->mtype,
|
|
sizeof(msgp->mtype) );
|
|
VG_TRACK( post_mem_write, (UInt)msgp->mtext, res );
|
|
}
|
|
break;
|
|
}
|
|
case 13: /* IPCOP_msgget */
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
case 14: /* IPCOP_msgctl */
|
|
{
|
|
switch (arg3 /* cmd */) {
|
|
case IPC_STAT:
|
|
SYSCALL_TRACK( pre_mem_write, tid, "msgctl(buf)", arg5,
|
|
sizeof(struct msqid_ds) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if ( !VG_(is_kerror)(res) && res > 0 ) {
|
|
VG_TRACK( post_mem_write, arg5,
|
|
sizeof(struct msqid_ds) );
|
|
}
|
|
break;
|
|
case IPC_SET:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "msgctl(buf)", arg5,
|
|
sizeof(struct msqid_ds) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# if defined(IPC_64)
|
|
case IPC_STAT|IPC_64:
|
|
SYSCALL_TRACK( pre_mem_write, tid, "msgctl(buf)", arg5,
|
|
sizeof(struct msqid64_ds) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if ( !VG_(is_kerror)(res) && res > 0 ) {
|
|
VG_TRACK( post_mem_write, arg5,
|
|
sizeof(struct msqid64_ds) );
|
|
}
|
|
break;
|
|
# endif
|
|
# if defined(IPC_64)
|
|
case IPC_SET|IPC_64:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "msgctl(buf)", arg5,
|
|
sizeof(struct msqid64_ds) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
default:
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
}
|
|
break;
|
|
}
|
|
case 21: /* IPCOP_shmat */
|
|
{
|
|
Int shmid = arg2;
|
|
/*Int shmflag = arg3;*/
|
|
Addr addr;
|
|
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
|
|
if ( VG_(is_kerror) ( res ) )
|
|
break;
|
|
|
|
/* force readability. before the syscall it is
|
|
* indeed uninitialized, as can be seen in
|
|
* glibc/sysdeps/unix/sysv/linux/shmat.c */
|
|
VG_TRACK( post_mem_write, arg4, sizeof( ULong ) );
|
|
|
|
addr = deref_Addr ( tid, arg4, "shmat(addr)" );
|
|
if ( addr > 0 ) {
|
|
UInt segmentSize = get_shm_size ( shmid );
|
|
if ( segmentSize > 0 ) {
|
|
/* we don't distinguish whether it's read-only or
|
|
* read-write -- it doesn't matter really. */
|
|
VG_TRACK( new_mem_mmap, addr, segmentSize,
|
|
True, True, False );
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
case 22: /* IPCOP_shmdt */
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
/* ### FIXME: this should call make_noaccess on the
|
|
* area passed to shmdt. But there's no way to
|
|
* figure out the size of the shared memory segment
|
|
* just from the address... Maybe we want to keep a
|
|
* copy of the exiting mappings inside valgrind? */
|
|
break;
|
|
case 23: /* IPCOP_shmget */
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
case 24: /* IPCOP_shmctl */
|
|
/* Subject: shmctl: The True Story
|
|
Date: Thu, 9 May 2002 18:07:23 +0100 (BST)
|
|
From: Reuben Thomas <rrt@mupsych.org>
|
|
To: Julian Seward <jseward@acm.org>
|
|
|
|
1. As you suggested, the syscall subop is in arg1.
|
|
|
|
2. There are a couple more twists, so the arg order
|
|
is actually:
|
|
|
|
arg1 syscall subop
|
|
arg2 file desc
|
|
arg3 shm operation code (can have IPC_64 set)
|
|
arg4 0 ??? is arg3-arg4 a 64-bit quantity when IPC_64
|
|
is defined?
|
|
arg5 pointer to buffer
|
|
|
|
3. With this in mind, I've amended the case as below:
|
|
*/
|
|
{
|
|
UInt cmd = arg3;
|
|
Bool out_arg = False;
|
|
if ( arg5 ) {
|
|
# if defined(IPC_64)
|
|
cmd = cmd & (~IPC_64);
|
|
# endif
|
|
out_arg = cmd == SHM_STAT || cmd == IPC_STAT;
|
|
if ( out_arg )
|
|
SYSCALL_TRACK( pre_mem_write, tid,
|
|
"shmctl(SHM_STAT or IPC_STAT,buf)",
|
|
arg5, sizeof(struct shmid_ds) );
|
|
else
|
|
SYSCALL_TRACK( pre_mem_read, tid,
|
|
"shmctl(SHM_XXXX,buf)",
|
|
arg5, sizeof(struct shmid_ds) );
|
|
}
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if ( arg5 && !VG_(is_kerror)(res) && res == 0 && out_arg )
|
|
VG_TRACK( post_mem_write, arg5,
|
|
sizeof(struct shmid_ds) );
|
|
}
|
|
break;
|
|
default:
|
|
VG_(message)(Vg_DebugMsg,
|
|
"FATAL: unhandled syscall(ipc) %d",
|
|
arg1 );
|
|
VG_(core_panic)("... bye!\n");
|
|
break; /*NOTREACHED*/
|
|
}
|
|
}
|
|
break;
|
|
|
|
case __NR_ioctl: /* syscall 54 */
|
|
/* int ioctl(int d, int request, ...)
|
|
[The "third" argument is traditionally char *argp,
|
|
and will be so named for this discussion.]
|
|
*/
|
|
/*
|
|
VG_(message)(
|
|
Vg_DebugMsg,
|
|
"is an IOCTL, request = 0x%x, d = %d, argp = 0x%x",
|
|
arg2,arg1,arg3);
|
|
*/
|
|
MAYBE_PRINTF("ioctl ( %d, 0x%x, %p )\n",arg1,arg2,arg3);
|
|
switch (arg2 /* request */) {
|
|
case TCSETS:
|
|
case TCSETSW:
|
|
case TCSETSF:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(TCSET{S,SW,SF})", arg3,
|
|
VKI_SIZEOF_STRUCT_TERMIOS );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
case TCGETS:
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(TCGETS)", arg3,
|
|
VKI_SIZEOF_STRUCT_TERMIOS );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write, arg3, VKI_SIZEOF_STRUCT_TERMIOS );
|
|
break;
|
|
case TCSETA:
|
|
case TCSETAW:
|
|
case TCSETAF:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(TCSET{A,AW,AF})", arg3,
|
|
VKI_SIZEOF_STRUCT_TERMIO );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
case TCGETA:
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(TCGETA)", arg3,
|
|
VKI_SIZEOF_STRUCT_TERMIO );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write, arg3, VKI_SIZEOF_STRUCT_TERMIO );
|
|
break;
|
|
case TCSBRK:
|
|
case TCXONC:
|
|
case TCSBRKP:
|
|
case TCFLSH:
|
|
/* These just take an int by value */
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
case TIOCGWINSZ:
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(TIOCGWINSZ)", arg3,
|
|
sizeof(struct winsize) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write, arg3, sizeof(struct winsize) );
|
|
break;
|
|
case TIOCSWINSZ:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(TIOCSWINSZ)", arg3,
|
|
sizeof(struct winsize) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
case TIOCLINUX:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(TIOCLINUX)", arg3,
|
|
sizeof(char *) );
|
|
if (*(char *)arg3 == 11) {
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(TIOCLINUX, 11)",
|
|
arg3, 2 * sizeof(char *) );
|
|
}
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write, arg3, sizeof(char *) );
|
|
break;
|
|
case TIOCGPGRP:
|
|
/* Get process group ID for foreground processing group. */
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(TIOCGPGRP)", arg3,
|
|
sizeof(pid_t) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write, arg3, sizeof(pid_t) );
|
|
break;
|
|
case TIOCSPGRP:
|
|
/* Set a process group ID? */
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(TIOCGPGRP)", arg3,
|
|
sizeof(pid_t) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write, arg3, sizeof(pid_t) );
|
|
break;
|
|
case TIOCGPTN: /* Get Pty Number (of pty-mux device) */
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(TIOCGPTN)",
|
|
arg3, sizeof(int) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write, arg3, sizeof(int));
|
|
break;
|
|
case TIOCSCTTY:
|
|
/* Just takes an int value. */
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
case TIOCSPTLCK: /* Lock/unlock Pty */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(TIOCSPTLCK)",
|
|
arg3, sizeof(int) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
case FIONBIO:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(FIONBIO)",
|
|
arg3, sizeof(int) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
case FIOASYNC:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(FIOASYNC)",
|
|
arg3, sizeof(int) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
case FIONREAD: /* identical to SIOCINQ */
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(FIONREAD)",
|
|
arg3, sizeof(int) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write, arg3, sizeof(int) );
|
|
break;
|
|
|
|
/* If you get compilation problems here, change the #if
|
|
1 to #if 0 and get rid of <scsi/sg.h> in
|
|
vg_unsafe.h. */
|
|
# if 1
|
|
case SG_SET_COMMAND_Q:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(SG_SET_COMMAND_Q)",
|
|
arg3, sizeof(int) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# if defined(SG_IO)
|
|
case SG_IO:
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(SG_IO)", arg3,
|
|
sizeof(struct sg_io_hdr) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(struct sg_io_hdr));
|
|
break;
|
|
# endif /* SG_IO */
|
|
case SG_GET_SCSI_ID:
|
|
/* Note: sometimes sg_scsi_id is called sg_scsi_id_t */
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(SG_GET_SCSI_ID)", arg3,
|
|
sizeof(struct sg_scsi_id) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(struct sg_scsi_id));
|
|
break;
|
|
case SG_SET_RESERVED_SIZE:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(SG_SET_RESERVED_SIZE)",
|
|
arg3, sizeof(int) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
case SG_SET_TIMEOUT:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(SG_SET_TIMEOUT)", arg3,
|
|
sizeof(int) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
case SG_GET_RESERVED_SIZE:
|
|
SYSCALL_TRACK( pre_mem_write, tid,
|
|
"ioctl(SG_GET_RESERVED_SIZE)", arg3,
|
|
sizeof(int) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(int));
|
|
break;
|
|
case SG_GET_TIMEOUT:
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(SG_GET_TIMEOUT)", arg3,
|
|
sizeof(int) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(int));
|
|
break;
|
|
case SG_GET_VERSION_NUM:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(SG_GET_VERSION_NUM)",
|
|
arg3, sizeof(int) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
case IIOCGETCPS:
|
|
/* In early 2.4 kernels, ISDN_MAX_CHANNELS was only defined
|
|
* when KERNEL was. I never saw a larger value than 64 though */
|
|
# ifndef ISDN_MAX_CHANNELS
|
|
# define ISDN_MAX_CHANNELS 64
|
|
# endif
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(IIOCGETCPS)", arg3,
|
|
ISDN_MAX_CHANNELS
|
|
* 2 * sizeof(unsigned long) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write, arg3, ISDN_MAX_CHANNELS
|
|
* 2 * sizeof(unsigned long) );
|
|
break;
|
|
case IIOCNETGPN:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(IIOCNETGPN)",
|
|
(UInt)&((isdn_net_ioctl_phone *)arg3)->name,
|
|
sizeof(((isdn_net_ioctl_phone *)arg3)->name) );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(IIOCNETGPN)", arg3,
|
|
sizeof(isdn_net_ioctl_phone) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write, arg3, sizeof(isdn_net_ioctl_phone) );
|
|
break;
|
|
|
|
/* These all use struct ifreq AFAIK */
|
|
case SIOCGIFINDEX:
|
|
case SIOCGIFFLAGS: /* get flags */
|
|
case SIOCGIFHWADDR: /* Get hardware address */
|
|
case SIOCGIFMTU: /* get MTU size */
|
|
case SIOCGIFADDR: /* get PA address */
|
|
case SIOCGIFNETMASK: /* get network PA mask */
|
|
case SIOCGIFMETRIC: /* get metric */
|
|
case SIOCGIFMAP: /* Get device parameters */
|
|
case SIOCGIFTXQLEN: /* Get the tx queue length */
|
|
case SIOCGIFDSTADDR: /* get remote PA address */
|
|
case SIOCGIFBRDADDR: /* get broadcast PA address */
|
|
case SIOCGIFNAME: /* get iface name */
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(SIOCGIFINDEX)", arg3,
|
|
sizeof(struct ifreq));
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(struct ifreq));
|
|
break;
|
|
case SIOCGIFCONF: /* get iface list */
|
|
/* WAS:
|
|
SYSCALL_TRACK( pre_mem_write,"ioctl(SIOCGIFCONF)", arg3,
|
|
sizeof(struct ifconf));
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(struct ifconf));
|
|
*/
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(SIOCGIFCONF)", arg3,
|
|
sizeof(struct ifconf));
|
|
if ( arg3 ) {
|
|
// TODO len must be readable and writable
|
|
// buf pointer only needs to be readable
|
|
struct ifconf *ifc = (struct ifconf *) arg3;
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(SIOCGIFCONF).ifc_buf",
|
|
(Addr)(ifc->ifc_buf), (UInt)(ifc->ifc_len) );
|
|
}
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0 && arg3 ) {
|
|
struct ifconf *ifc = (struct ifconf *) arg3;
|
|
if (ifc->ifc_buf != NULL)
|
|
VG_TRACK( post_mem_write, (Addr)(ifc->ifc_buf),
|
|
(UInt)(ifc->ifc_len) );
|
|
}
|
|
break;
|
|
case SIOCGSTAMP:
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(SIOCGSTAMP)", arg3,
|
|
sizeof(struct timeval));
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(struct timeval));
|
|
break;
|
|
/* SIOCOUTQ is an ioctl that, when called on a socket, returns
|
|
the number of bytes currently in that socket's send buffer.
|
|
It writes this value as an int to the memory location
|
|
indicated by the third argument of ioctl(2). */
|
|
case SIOCOUTQ:
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(SIOCOUTQ)", arg3,
|
|
sizeof(int));
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(int));
|
|
break;
|
|
case SIOCGRARP: /* get RARP table entry */
|
|
case SIOCGARP: /* get ARP table entry */
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(SIOCGARP)", arg3,
|
|
sizeof(struct arpreq));
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(struct arpreq));
|
|
break;
|
|
|
|
case SIOCSIFFLAGS: /* set flags */
|
|
case SIOCSIFMAP: /* Set device parameters */
|
|
case SIOCSIFTXQLEN: /* Set the tx queue length */
|
|
case SIOCSIFDSTADDR: /* set remote PA address */
|
|
case SIOCSIFBRDADDR: /* set broadcast PA address */
|
|
case SIOCSIFNETMASK: /* set network PA mask */
|
|
case SIOCSIFMETRIC: /* set metric */
|
|
case SIOCSIFADDR: /* set PA address */
|
|
case SIOCSIFMTU: /* set MTU size */
|
|
case SIOCSIFHWADDR: /* set hardware address */
|
|
SYSCALL_TRACK( pre_mem_read, tid,"ioctl(SIOCSIFFLAGS)", arg3,
|
|
sizeof(struct ifreq));
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
/* Routing table calls. */
|
|
case SIOCADDRT: /* add routing table entry */
|
|
case SIOCDELRT: /* delete routing table entry */
|
|
SYSCALL_TRACK( pre_mem_read, tid,"ioctl(SIOCADDRT/DELRT)", arg3,
|
|
sizeof(struct rtentry));
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
/* RARP cache control calls. */
|
|
case SIOCDRARP: /* delete RARP table entry */
|
|
case SIOCSRARP: /* set RARP table entry */
|
|
/* ARP cache control calls. */
|
|
case SIOCSARP: /* set ARP table entry */
|
|
case SIOCDARP: /* delete ARP table entry */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(SIOCSIFFLAGS)", arg3,
|
|
sizeof(struct ifreq));
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case SIOCSPGRP:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(SIOCSPGRP)", arg3,
|
|
sizeof(int) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
/* linux/soundcard interface (OSS) */
|
|
case SNDCTL_SEQ_GETOUTCOUNT:
|
|
case SNDCTL_SEQ_GETINCOUNT:
|
|
case SNDCTL_SEQ_PERCMODE:
|
|
case SNDCTL_SEQ_TESTMIDI:
|
|
case SNDCTL_SEQ_RESETSAMPLES:
|
|
case SNDCTL_SEQ_NRSYNTHS:
|
|
case SNDCTL_SEQ_NRMIDIS:
|
|
case SNDCTL_SEQ_GETTIME:
|
|
case SNDCTL_DSP_GETFMTS:
|
|
case SNDCTL_DSP_GETTRIGGER:
|
|
case SNDCTL_DSP_GETODELAY:
|
|
# if defined(SNDCTL_DSP_GETSPDIF)
|
|
case SNDCTL_DSP_GETSPDIF:
|
|
# endif
|
|
case SNDCTL_DSP_GETCAPS:
|
|
case SOUND_PCM_READ_RATE:
|
|
case SOUND_PCM_READ_CHANNELS:
|
|
case SOUND_PCM_READ_BITS:
|
|
case (SOUND_PCM_READ_BITS|0x40000000): /* what the fuck ? */
|
|
case SOUND_PCM_READ_FILTER:
|
|
SYSCALL_TRACK( pre_mem_write, tid,
|
|
"ioctl(SNDCTL_XXX|SOUND_XXX (SIOR, int))",
|
|
arg3,
|
|
sizeof(int));
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(int));
|
|
break;
|
|
case SNDCTL_SEQ_CTRLRATE:
|
|
case SNDCTL_DSP_SPEED:
|
|
case SNDCTL_DSP_STEREO:
|
|
case SNDCTL_DSP_GETBLKSIZE:
|
|
case SNDCTL_DSP_CHANNELS:
|
|
case SOUND_PCM_WRITE_FILTER:
|
|
case SNDCTL_DSP_SUBDIVIDE:
|
|
case SNDCTL_DSP_SETFRAGMENT:
|
|
# if defined(SNDCTL_DSP_GETCHANNELMASK)
|
|
case SNDCTL_DSP_GETCHANNELMASK:
|
|
# endif
|
|
# if defined(SNDCTL_DSP_BIND_CHANNEL)
|
|
case SNDCTL_DSP_BIND_CHANNEL:
|
|
# endif
|
|
case SNDCTL_TMR_TIMEBASE:
|
|
case SNDCTL_TMR_TEMPO:
|
|
case SNDCTL_TMR_SOURCE:
|
|
case SNDCTL_MIDI_PRETIME:
|
|
case SNDCTL_MIDI_MPUMODE:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(SNDCTL_XXX|SOUND_XXX "
|
|
"(SIOWR, int))",
|
|
arg3, sizeof(int));
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(SNDCTL_XXX|SOUND_XXX "
|
|
"(SIOWR, int))",
|
|
arg3, sizeof(int));
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
case SNDCTL_DSP_GETOSPACE:
|
|
case SNDCTL_DSP_GETISPACE:
|
|
SYSCALL_TRACK( pre_mem_write, tid,
|
|
"ioctl(SNDCTL_XXX|SOUND_XXX "
|
|
"(SIOR, audio_buf_info))", arg3,
|
|
sizeof(audio_buf_info));
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(audio_buf_info));
|
|
break;
|
|
case SNDCTL_DSP_SETTRIGGER:
|
|
SYSCALL_TRACK( pre_mem_read, tid,
|
|
"ioctl(SNDCTL_XXX|SOUND_XXX (SIOW, int))",
|
|
arg3, sizeof(int));
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case SNDCTL_DSP_POST:
|
|
case SNDCTL_DSP_RESET:
|
|
case SNDCTL_DSP_SYNC:
|
|
case SNDCTL_DSP_SETSYNCRO:
|
|
case SNDCTL_DSP_SETDUPLEX:
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
/* Real Time Clock (/dev/rtc) ioctls */
|
|
# ifndef GLIBC_2_1
|
|
case RTC_UIE_ON:
|
|
case RTC_UIE_OFF:
|
|
case RTC_AIE_ON:
|
|
case RTC_AIE_OFF:
|
|
case RTC_PIE_ON:
|
|
case RTC_PIE_OFF:
|
|
case RTC_IRQP_SET:
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
case RTC_RD_TIME:
|
|
case RTC_ALM_READ:
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(RTC_RD_TIME/ALM_READ)",
|
|
arg3, sizeof(struct rtc_time));
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror) && res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(struct rtc_time));
|
|
break;
|
|
case RTC_ALM_SET:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(RTC_ALM_SET)", arg3,
|
|
sizeof(struct rtc_time));
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
case RTC_IRQP_READ:
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(RTC_IRQP_READ)", arg3,
|
|
sizeof(unsigned long));
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if(!VG_(is_kerror) && res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(unsigned long));
|
|
break;
|
|
# endif /* GLIBC_2_1 */
|
|
|
|
# ifdef BLKGETSIZE
|
|
case BLKGETSIZE:
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(BLKGETSIZE)", arg3,
|
|
sizeof(unsigned long));
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(unsigned long));
|
|
break;
|
|
# endif /* BLKGETSIZE */
|
|
|
|
/* CD ROM stuff (??) */
|
|
case CDROMSUBCHNL:
|
|
SYSCALL_TRACK( pre_mem_read, tid,
|
|
"ioctl(CDROMSUBCHNL (cdsc_format, char))",
|
|
(int) &(((struct cdrom_subchnl *) arg3)->cdsc_format),
|
|
sizeof(((struct cdrom_subchnl *) arg3)->cdsc_format));
|
|
SYSCALL_TRACK( pre_mem_write, tid,
|
|
"ioctl(CDROMSUBCHNL)", arg3,
|
|
sizeof(struct cdrom_subchnl));
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(struct cdrom_subchnl));
|
|
break;
|
|
case CDROMREADTOCHDR:
|
|
SYSCALL_TRACK( pre_mem_write, tid,
|
|
"ioctl(CDROMREADTOCHDR)", arg3,
|
|
sizeof(struct cdrom_tochdr));
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(struct cdrom_tochdr));
|
|
break;
|
|
case CDROMREADTOCENTRY:
|
|
SYSCALL_TRACK( pre_mem_read, tid,
|
|
"ioctl(CDROMREADTOCENTRY (cdte_format, char))",
|
|
(int) &(((struct cdrom_tocentry *) arg3)->cdte_format),
|
|
sizeof(((struct cdrom_tocentry *) arg3)->cdte_format));
|
|
SYSCALL_TRACK( pre_mem_read, tid,
|
|
"ioctl(CDROMREADTOCENTRY (cdte_track, char))",
|
|
(int) &(((struct cdrom_tocentry *) arg3)->cdte_track),
|
|
sizeof(((struct cdrom_tocentry *) arg3)->cdte_track));
|
|
SYSCALL_TRACK( pre_mem_write, tid,
|
|
"ioctl(CDROMREADTOCENTRY)", arg3,
|
|
sizeof(struct cdrom_tocentry));
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(struct cdrom_tochdr));
|
|
break;
|
|
case CDROMPLAYMSF:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(CDROMPLAYMSF)", arg3,
|
|
sizeof(struct cdrom_msf));
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
/* The following two are probably bogus (should check args
|
|
for readability). JRS 20021117 */
|
|
case CDROM_DRIVE_STATUS: /* 0x5326 */
|
|
case CDROM_CLEAR_OPTIONS: /* 0x5321 */
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
/* We don't have any specific information on it, so
|
|
try to do something reasonable based on direction and
|
|
size bits. The encoding scheme is described in
|
|
/usr/include/asm/ioctl.h.
|
|
|
|
According to Simon Hausmann, _IOC_READ means the kernel
|
|
writes a value to the ioctl value passed from the user
|
|
space and the other way around with _IOC_WRITE. */
|
|
default: {
|
|
UInt dir = _IOC_DIR(arg2);
|
|
UInt size = _IOC_SIZE(arg2);
|
|
if (VG_(strstr)(VG_(clo_weird_hacks), "lax-ioctls") != NULL) {
|
|
/*
|
|
* Be very lax about ioctl handling; the only
|
|
* assumption is that the size is correct. Doesn't
|
|
* require the full buffer to be initialized when
|
|
* writing. Without this, using some device
|
|
* drivers with a large number of strange ioctl
|
|
* commands becomes very tiresome.
|
|
*/
|
|
}
|
|
else if (/* size == 0 || */ dir == _IOC_NONE) {
|
|
static Int moans = 3;
|
|
if (moans > 0) {
|
|
moans--;
|
|
VG_(message)(Vg_UserMsg,
|
|
"Warning: noted but unhandled ioctl 0x%x"
|
|
" with no size/direction hints",
|
|
arg2);
|
|
VG_(message)(Vg_UserMsg,
|
|
" This could cause spurious value errors"
|
|
" to appear.");
|
|
VG_(message)(Vg_UserMsg,
|
|
" See README_MISSING_SYSCALL_OR_IOCTL for "
|
|
"guidance on writing a proper wrapper." );
|
|
}
|
|
} else {
|
|
if ((dir & _IOC_WRITE) && size > 0)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(generic)",
|
|
arg3, size);
|
|
if ((dir & _IOC_READ) && size > 0)
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(generic)",
|
|
arg3, size);
|
|
}
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (size > 0 && (dir & _IOC_READ)
|
|
&& !VG_(is_kerror)(res) && res == 0
|
|
&& arg3 != (Addr)NULL)
|
|
VG_TRACK( post_mem_write,arg3, size);
|
|
break;
|
|
}
|
|
}
|
|
break;
|
|
|
|
case __NR_kill: /* syscall 37 */
|
|
/* int kill(pid_t pid, int sig); */
|
|
MAYBE_PRINTF("kill ( %d, %d )\n", arg1,arg2);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_link: /* syscall 9 */
|
|
/* int link(const char *oldpath, const char *newpath); */
|
|
MAYBE_PRINTF("link ( %p, %p)\n", arg1, arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "link(oldpath)", arg1);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "link(newpath)", arg2);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_lseek: /* syscall 19 */
|
|
/* off_t lseek(int fildes, off_t offset, int whence); */
|
|
MAYBE_PRINTF("lseek ( %d, %d, %d )\n",arg1,arg2,arg3);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR__llseek: /* syscall 140 */
|
|
/* int _llseek(unsigned int fd, unsigned long offset_high,
|
|
unsigned long offset_low,
|
|
loff_t * result, unsigned int whence); */
|
|
MAYBE_PRINTF("llseek ( %d, 0x%x, 0x%x, %p, %d )\n",
|
|
arg1,arg2,arg3,arg4,arg5);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "llseek(result)", arg4,
|
|
sizeof(loff_t));
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write, arg4, sizeof(loff_t) );
|
|
break;
|
|
|
|
case __NR_lstat: /* syscall 107 */
|
|
/* int lstat(const char *file_name, struct stat *buf); */
|
|
MAYBE_PRINTF("lstat ( %p, %p )\n",arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "lstat(file_name)", arg1 );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "lstat(buf)", arg2,
|
|
sizeof(struct stat) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0) {
|
|
VG_TRACK( post_mem_write, arg2, sizeof(struct stat) );
|
|
}
|
|
break;
|
|
|
|
# if defined(__NR_lstat64)
|
|
case __NR_lstat64: /* syscall 196 */
|
|
/* int lstat64(const char *file_name, struct stat64 *buf); */
|
|
MAYBE_PRINTF("lstat64 ( %p, %p )\n",arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "lstat64(file_name)", arg1 );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "lstat64(buf)", arg2,
|
|
sizeof(struct stat64) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0) {
|
|
VG_TRACK( post_mem_write, arg2, sizeof(struct stat64) );
|
|
}
|
|
break;
|
|
# endif
|
|
|
|
case __NR_mkdir: /* syscall 39 */
|
|
/* int mkdir(const char *pathname, mode_t mode); */
|
|
MAYBE_PRINTF("mkdir ( %p, %d )\n", arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "mkdir(pathname)", arg1 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
# if defined(__NR_mmap2)
|
|
case __NR_mmap2: /* syscall 192 */
|
|
/* My impression is that this is exactly like __NR_mmap
|
|
except that all 6 args are passed in regs, rather than in
|
|
a memory-block. */
|
|
/* void* mmap(void *start, size_t length, int prot,
|
|
int flags, int fd, off_t offset);
|
|
*/
|
|
if (VG_(clo_trace_syscalls)) {
|
|
UInt arg6 = tst->m_ebp;
|
|
VG_(printf)("mmap2 ( %p, %d, %d, %d, %d, %d )\n",
|
|
arg1, arg2, arg3, arg4, arg5, arg6 );
|
|
}
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res)) {
|
|
mmap_segment( (Addr)res, arg2, arg3, arg5 );
|
|
}
|
|
break;
|
|
# endif
|
|
|
|
case __NR_mmap: /* syscall 90 */
|
|
/* void* mmap(void *start, size_t length, int prot,
|
|
int flags, int fd, off_t offset);
|
|
*/
|
|
SYSCALL_TRACK( pre_mem_read, tid, "mmap(args)", arg1, 6*sizeof(UInt) );
|
|
{
|
|
UInt* arg_block = (UInt*)arg1;
|
|
UInt arg6;
|
|
arg1 = arg_block[0];
|
|
arg2 = arg_block[1];
|
|
arg3 = arg_block[2];
|
|
arg4 = arg_block[3];
|
|
arg5 = arg_block[4];
|
|
arg6 = arg_block[5];
|
|
MAYBE_PRINTF("mmap ( %p, %d, %d, %d, %d, %d )\n",
|
|
arg1, arg2, arg3, arg4, arg5, arg6 );
|
|
}
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res)) {
|
|
mmap_segment( (Addr)res, arg2, arg3, arg5 );
|
|
}
|
|
break;
|
|
|
|
case __NR_mprotect: /* syscall 125 */
|
|
/* int mprotect(const void *addr, size_t len, int prot); */
|
|
/* should addr .. addr+len-1 be checked before the call? */
|
|
MAYBE_PRINTF("mprotect ( %p, %d, %d )\n", arg1,arg2,arg3);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res)) {
|
|
mprotect_segment( arg1, arg2, arg3 );
|
|
}
|
|
break;
|
|
|
|
case __NR_munmap: /* syscall 91 */
|
|
/* int munmap(void *start, size_t length); */
|
|
/* should start .. start+length-1 be checked before the call? */
|
|
MAYBE_PRINTF("munmap ( %p, %d )\n", arg1,arg2);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res)) {
|
|
munmap_segment( arg1, arg2 );
|
|
}
|
|
break;
|
|
|
|
case __NR_nanosleep: /* syscall 162 */
|
|
/* int nanosleep(const struct timespec *req, struct timespec *rem); */
|
|
MAYBE_PRINTF("nanosleep ( %p, %p )\n", arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read, tid, "nanosleep(req)", arg1,
|
|
sizeof(struct timespec) );
|
|
if (arg2 != (UInt)NULL)
|
|
SYSCALL_TRACK( pre_mem_write, tid, "nanosleep(rem)", arg2,
|
|
sizeof(struct timespec) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
/* Somewhat bogus ... is only written by the kernel if
|
|
res == -1 && errno == EINTR. */
|
|
if (!VG_(is_kerror)(res) && arg2 != (UInt)NULL)
|
|
VG_TRACK( post_mem_write, arg2, sizeof(struct timespec) );
|
|
break;
|
|
|
|
case __NR__newselect: /* syscall 142 */
|
|
/* int select(int n,
|
|
fd_set *readfds, fd_set *writefds, fd_set *exceptfds,
|
|
struct timeval *timeout);
|
|
*/
|
|
MAYBE_PRINTF("newselect ( %d, %p, %p, %p, %p )\n",
|
|
arg1,arg2,arg3,arg4,arg5);
|
|
if (arg2 != 0)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "newselect(readfds)",
|
|
arg2, arg1/8 /* __FD_SETSIZE/8 */ );
|
|
if (arg3 != 0)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "newselect(writefds)",
|
|
arg3, arg1/8 /* __FD_SETSIZE/8 */ );
|
|
if (arg4 != 0)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "newselect(exceptfds)",
|
|
arg4, arg1/8 /* __FD_SETSIZE/8 */ );
|
|
if (arg5 != 0)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "newselect(timeout)", arg5,
|
|
sizeof(struct timeval) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_open: /* syscall 5 */
|
|
/* int open(const char *pathname, int flags); */
|
|
MAYBE_PRINTF("open ( %p(%s), %d ) --> ",arg1,arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "open(pathname)", arg1 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
MAYBE_PRINTF("%d\n",res);
|
|
break;
|
|
|
|
case __NR_creat: /* syscall 8 */
|
|
/* int creat(const char *pathname, mode_t mode); */
|
|
MAYBE_PRINTF("creat ( %p(%s), %d ) --> ",arg1,arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "creat(pathname)", arg1 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
MAYBE_PRINTF("%d\n",res);
|
|
break;
|
|
|
|
case __NR_pipe: /* syscall 42 */
|
|
/* int pipe(int filedes[2]); */
|
|
MAYBE_PRINTF("pipe ( %p ) ...\n", arg1);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "pipe(filedes)",
|
|
arg1, 2*sizeof(int) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res))
|
|
VG_TRACK( post_mem_write, arg1, 2*sizeof(int) );
|
|
if (VG_(clo_trace_syscalls) && !VG_(is_kerror)(res))
|
|
VG_(printf)("SYSCALL[%d] pipe --> (rd %d, wr %d)\n",
|
|
VG_(getpid)(),
|
|
((UInt*)arg1)[0], ((UInt*)arg1)[1] );
|
|
break;
|
|
|
|
case __NR_poll: /* syscall 168 */
|
|
/* struct pollfd {
|
|
int fd; -- file descriptor
|
|
short events; -- requested events
|
|
short revents; -- returned events
|
|
};
|
|
int poll(struct pollfd *ufds, unsigned int nfds,
|
|
int timeout)
|
|
*/
|
|
MAYBE_PRINTF("poll ( %p, %d, %d )\n",arg1,arg2,arg3);
|
|
/* In fact some parts of this struct should be readable too.
|
|
This should be fixed properly. */
|
|
SYSCALL_TRACK( pre_mem_write, tid, "poll(ufds)",
|
|
arg1, arg2 * sizeof(struct pollfd) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res > 0) {
|
|
UInt i;
|
|
struct pollfd * arr = (struct pollfd *)arg1;
|
|
for (i = 0; i < arg2; i++)
|
|
VG_TRACK( post_mem_write, (Addr)(&arr[i].revents),
|
|
sizeof(Short) );
|
|
}
|
|
/* For some unknown reason, %ebx sometimes gets changed by poll...
|
|
let the skin know (using the `post_reg_write_syscall_return'
|
|
event isn't ideal...
|
|
|
|
Update from Lennert Buytenhek <buytenh@gnu.org>:
|
|
This came up a while ago on linux-kernel, search for a posting
|
|
by dvorak <dvorak@xs4all.nl>.
|
|
|
|
Basically, the linux syscall handler pushes the arguments to the
|
|
stack, and inside sys_poll (or another routine), one of the
|
|
parameters to the function is changed. gcc uses the stack space
|
|
the parameter came in as the storage location for that variable,
|
|
and will sometimes spill that variable back to stack. The linux
|
|
syscall handler pops all registers on return, and that is how
|
|
%ebx can get changed sometimes.
|
|
*/
|
|
if (arg1 != tst->m_ebx) {
|
|
VG_TRACK( post_reg_write_syscall_return, tid, R_EBX );
|
|
}
|
|
break;
|
|
|
|
case __NR_readlink: /* syscall 85 */
|
|
/* int readlink(const char *path, char *buf, size_t bufsiz); */
|
|
MAYBE_PRINTF("readlink ( %p, %p, %d )\n", arg1,arg2,arg3);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "readlink(path)", arg1 );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "readlink(buf)", arg2,arg3 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res > 0) {
|
|
VG_TRACK( post_mem_write, arg2, res );
|
|
}
|
|
break;
|
|
|
|
case __NR_readv: { /* syscall 145 */
|
|
/* int readv(int fd, const struct iovec * vector, size_t count); */
|
|
UInt i;
|
|
struct iovec * vec;
|
|
MAYBE_PRINTF("readv ( %d, %p, %d )\n",arg1,arg2,arg3);
|
|
SYSCALL_TRACK( pre_mem_read, tid, "readv(vector)",
|
|
arg2, arg3 * sizeof(struct iovec) );
|
|
/* ToDo: don't do any of the following if the vector is invalid */
|
|
vec = (struct iovec *)arg2;
|
|
for (i = 0; i < arg3; i++)
|
|
SYSCALL_TRACK( pre_mem_write, tid, "readv(vector[...])",
|
|
(UInt)vec[i].iov_base,vec[i].iov_len );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res > 0) {
|
|
/* res holds the number of bytes read. */
|
|
for (i = 0; i < arg3; i++) {
|
|
Int nReadThisBuf = vec[i].iov_len;
|
|
if (nReadThisBuf > res) nReadThisBuf = res;
|
|
VG_TRACK( post_mem_write, (UInt)vec[i].iov_base, nReadThisBuf );
|
|
res -= nReadThisBuf;
|
|
if (res < 0) VG_(core_panic)("readv: res < 0");
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
|
|
case __NR_rename: /* syscall 38 */
|
|
/* int rename(const char *oldpath, const char *newpath); */
|
|
MAYBE_PRINTF("rename ( %p, %p )\n", arg1, arg2 );
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "rename(oldpath)", arg1 );
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "rename(newpath)", arg2 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_rmdir: /* syscall 40 */
|
|
/* int rmdir(const char *pathname); */
|
|
MAYBE_PRINTF("rmdir ( %p )\n", arg1);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "rmdir(pathname)", arg1 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_sched_setparam: /* syscall 154 */
|
|
/* int sched_setparam(pid_t pid, const struct sched_param *p); */
|
|
MAYBE_PRINTF("sched_setparam ( %d, %p )\n", arg1, arg2 );
|
|
SYSCALL_TRACK( pre_mem_read, tid, "sched_setparam(ptr)",
|
|
arg2, sizeof(struct sched_param) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res))
|
|
VG_TRACK( post_mem_write, arg2, sizeof(struct sched_param) );
|
|
break;
|
|
|
|
case __NR_sched_getparam: /* syscall 155 */
|
|
/* int sched_getparam(pid_t pid, struct sched_param *p); */
|
|
MAYBE_PRINTF("sched_getparam ( %d, %p )\n", arg1, arg2 );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "sched_getparam(ptr)",
|
|
arg2, sizeof(struct sched_param) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res))
|
|
VG_TRACK( post_mem_write, arg2, sizeof(struct sched_param) );
|
|
break;
|
|
|
|
case __NR_sched_yield: /* syscall 158 */
|
|
/* int sched_yield(void); */
|
|
MAYBE_PRINTF("sched_yield ()\n" );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_select: /* syscall 82 */
|
|
/* struct sel_arg_struct {
|
|
unsigned long n;
|
|
fd_set *inp, *outp, *exp;
|
|
struct timeval *tvp;
|
|
};
|
|
int old_select(struct sel_arg_struct *arg);
|
|
*/
|
|
SYSCALL_TRACK( pre_mem_read, tid, "select(args)", arg1, 5*sizeof(UInt) );
|
|
{
|
|
UInt* arg_struct = (UInt*)arg1;
|
|
arg1 = arg_struct[0];
|
|
arg2 = arg_struct[1];
|
|
arg3 = arg_struct[2];
|
|
arg4 = arg_struct[3];
|
|
arg5 = arg_struct[4];
|
|
|
|
MAYBE_PRINTF("select ( %d, %p, %p, %p, %p )\n",
|
|
arg1,arg2,arg3,arg4,arg5);
|
|
if (arg2 != (Addr)NULL)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "select(readfds)", arg2,
|
|
arg1/8 /* __FD_SETSIZE/8 */ );
|
|
if (arg3 != (Addr)NULL)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "select(writefds)", arg3,
|
|
arg1/8 /* __FD_SETSIZE/8 */ );
|
|
if (arg4 != (Addr)NULL)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "select(exceptfds)", arg4,
|
|
arg1/8 /* __FD_SETSIZE/8 */ );
|
|
if (arg5 != (Addr)NULL)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "select(timeout)", arg5,
|
|
sizeof(struct timeval) );
|
|
}
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_setitimer: /* syscall 104 */
|
|
/* setitimer(int which, const struct itimerval *value,
|
|
struct itimerval *ovalue); */
|
|
MAYBE_PRINTF("setitimer ( %d, %p, %p )\n", arg1,arg2,arg3);
|
|
if (arg2 != (Addr)NULL)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "setitimer(value)",
|
|
arg2, sizeof(struct itimerval) );
|
|
if (arg3 != (Addr)NULL)
|
|
SYSCALL_TRACK( pre_mem_write, tid, "setitimer(ovalue)",
|
|
arg3, sizeof(struct itimerval));
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && arg3 != (Addr)NULL) {
|
|
VG_TRACK( post_mem_write,arg3, sizeof(struct itimerval));
|
|
}
|
|
break;
|
|
|
|
# if defined(__NR_setfsgid32)
|
|
case __NR_setfsgid32: /* syscall 216 */
|
|
/* int setfsgid(uid_t fsgid); */
|
|
MAYBE_PRINTF("setfsgid ( %d )\n", arg1);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_setgid32)
|
|
case __NR_setgid32: /* syscall 214 */
|
|
# endif
|
|
case __NR_setgid: /* syscall 46 */
|
|
/* int setgid(gid_t gid); */
|
|
MAYBE_PRINTF("setgid ( %d )\n", arg1);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_setsid: /* syscall 66 */
|
|
/* pid_t setsid(void); */
|
|
MAYBE_PRINTF("setsid ()\n");
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
# if defined(__NR_setgroups32)
|
|
case __NR_setgroups32: /* syscall 206 */
|
|
# endif
|
|
case __NR_setgroups: /* syscall 81 */
|
|
/* int setgroups(size_t size, const gid_t *list); */
|
|
MAYBE_PRINTF("setgroups ( %d, %p )\n", arg1, arg2);
|
|
if (arg1 > 0)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "setgroups(list)", arg2,
|
|
arg1 * sizeof(gid_t) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_setpgid: /* syscall 57 */
|
|
/* int setpgid(pid_t pid, pid_t pgid); */
|
|
MAYBE_PRINTF("setpgid ( %d, %d )\n", arg1, arg2);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
# if defined(__NR_setregid32)
|
|
case __NR_setregid32: /* syscall 204 */
|
|
/* int setregid(gid_t rgid, gid_t egid); */
|
|
MAYBE_PRINTF("setregid32(?) ( %d, %d )\n", arg1, arg2);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_setresuid32)
|
|
case __NR_setresuid32: /* syscall 208 */
|
|
/* int setresuid(uid_t ruid, uid_t euid, uid_t suid); */
|
|
MAYBE_PRINTF("setresuid32(?) ( %d, %d, %d )\n", arg1, arg2, arg3);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_setreuid32)
|
|
case __NR_setreuid32: /* syscall 203 */
|
|
# endif
|
|
case __NR_setreuid: /* syscall 70 */
|
|
/* int setreuid(uid_t ruid, uid_t euid); */
|
|
MAYBE_PRINTF("setreuid ( 0x%x, 0x%x )\n", arg1, arg2);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_setrlimit: /* syscall 75 */
|
|
/* int setrlimit (int resource, const struct rlimit *rlim); */
|
|
MAYBE_PRINTF("setrlimit ( %d, %p )\n", arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read, tid, "setrlimit(rlim)",
|
|
arg2, sizeof(struct rlimit) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
# if defined(__NR_setuid32)
|
|
case __NR_setuid32: /* syscall 213 */
|
|
# endif
|
|
case __NR_setuid: /* syscall 23 */
|
|
/* int setuid(uid_t uid); */
|
|
MAYBE_PRINTF("setuid ( %d )\n", arg1);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_socketcall: /* syscall 102 */
|
|
/* int socketcall(int call, unsigned long *args); */
|
|
MAYBE_PRINTF("socketcall ( %d, %p )\n",arg1,arg2);
|
|
switch (arg1 /* request */) {
|
|
|
|
case SYS_SOCKETPAIR:
|
|
/* int socketpair(int d, int type, int protocol, int sv[2]); */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.socketpair(args)",
|
|
arg2, 4*sizeof(Addr) );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "socketcall.socketpair(sv)",
|
|
((UInt*)arg2)[3], 2*sizeof(int) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res))
|
|
VG_TRACK( post_mem_write, ((UInt*)arg2)[3], 2*sizeof(int) );
|
|
break;
|
|
|
|
case SYS_SOCKET:
|
|
/* int socket(int domain, int type, int protocol); */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.socket(args)",
|
|
arg2, 3*sizeof(Addr) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case SYS_BIND:
|
|
/* int bind(int sockfd, struct sockaddr *my_addr,
|
|
int addrlen); */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.bind(args)",
|
|
arg2, 3*sizeof(Addr) );
|
|
pre_mem_read_sockaddr( tid, "socketcall.bind(my_addr.%s)",
|
|
(struct sockaddr *) (((UInt*)arg2)[1]), ((UInt*)arg2)[2]);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case SYS_LISTEN:
|
|
/* int listen(int s, int backlog); */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.listen(args)",
|
|
arg2, 2*sizeof(Addr) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case SYS_ACCEPT: {
|
|
/* int accept(int s, struct sockaddr *addr, int *addrlen); */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.accept(args)",
|
|
arg2, 3*sizeof(Addr) );
|
|
{
|
|
Addr addr_p = ((UInt*)arg2)[1];
|
|
Addr addrlen_p = ((UInt*)arg2)[2];
|
|
if (addr_p != (Addr)NULL)
|
|
buf_and_len_pre_check ( tid, addr_p, addrlen_p,
|
|
"socketcall.accept(addr)",
|
|
"socketcall.accept(addrlen_in)" );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (addr_p != (Addr)NULL)
|
|
buf_and_len_post_check ( tid, res, addr_p, addrlen_p,
|
|
"socketcall.accept(addrlen_out)" );
|
|
}
|
|
break;
|
|
}
|
|
|
|
case SYS_SENDTO:
|
|
/* int sendto(int s, const void *msg, int len,
|
|
unsigned int flags,
|
|
const struct sockaddr *to, int tolen); */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.sendto(args)", arg2,
|
|
6*sizeof(Addr) );
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.sendto(msg)",
|
|
((UInt*)arg2)[1], /* msg */
|
|
((UInt*)arg2)[2] /* len */ );
|
|
pre_mem_read_sockaddr( tid, "socketcall.sendto(to.%s)",
|
|
(struct sockaddr *) (((UInt*)arg2)[4]), ((UInt*)arg2)[5]);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case SYS_SEND:
|
|
/* int send(int s, const void *msg, size_t len, int flags); */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.send(args)", arg2,
|
|
4*sizeof(Addr) );
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.send(msg)",
|
|
((UInt*)arg2)[1], /* msg */
|
|
((UInt*)arg2)[2] /* len */ );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case SYS_RECVFROM:
|
|
/* int recvfrom(int s, void *buf, int len, unsigned int flags,
|
|
struct sockaddr *from, int *fromlen); */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.recvfrom(args)",
|
|
arg2, 6*sizeof(Addr) );
|
|
{
|
|
Addr buf_p = ((UInt*)arg2)[1];
|
|
Int len = ((UInt*)arg2)[2];
|
|
Addr from_p = ((UInt*)arg2)[4];
|
|
Addr fromlen_p = ((UInt*)arg2)[5];
|
|
|
|
SYSCALL_TRACK( pre_mem_write, tid, "socketcall.recvfrom(buf)",
|
|
buf_p, len );
|
|
if (from_p != (Addr)NULL)
|
|
buf_and_len_pre_check ( tid, from_p, fromlen_p,
|
|
"socketcall.recvfrom(from)",
|
|
"socketcall.recvfrom(fromlen_in)" );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (from_p != (Addr)NULL)
|
|
buf_and_len_post_check ( tid, res, from_p, fromlen_p,
|
|
"socketcall.recvfrom(fromlen_out)" );
|
|
if (!VG_(is_kerror)(res))
|
|
VG_TRACK( post_mem_write, buf_p, len );
|
|
}
|
|
break;
|
|
|
|
case SYS_RECV:
|
|
/* int recv(int s, void *buf, int len, unsigned int flags); */
|
|
/* man 2 recv says:
|
|
The recv call is normally used only on a connected socket
|
|
(see connect(2)) and is identical to recvfrom with a NULL
|
|
from parameter.
|
|
*/
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.recv(args)",
|
|
arg2, 4*sizeof(Addr) );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "socketcall.recv(buf)",
|
|
((UInt*)arg2)[1], /* buf */
|
|
((UInt*)arg2)[2] /* len */ );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res >= 0
|
|
&& ((UInt*)arg2)[1] != (UInt)NULL) {
|
|
VG_TRACK( post_mem_write, ((UInt*)arg2)[1], /* buf */
|
|
((UInt*)arg2)[2] /* len */ );
|
|
}
|
|
break;
|
|
|
|
case SYS_CONNECT:
|
|
/* int connect(int sockfd,
|
|
struct sockaddr *serv_addr, int addrlen ); */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.connect(args)",
|
|
arg2, 3*sizeof(Addr) );
|
|
SYSCALL_TRACK( pre_mem_read, tid,
|
|
"socketcall.connect(serv_addr.sa_family)",
|
|
((UInt*)arg2)[1], /* serv_addr */
|
|
sizeof (sa_family_t));
|
|
pre_mem_read_sockaddr( tid,
|
|
"socketcall.connect(serv_addr.%s)",
|
|
(struct sockaddr *) (((UInt*)arg2)[1]), ((UInt*)arg2)[2]);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case SYS_SETSOCKOPT:
|
|
/* int setsockopt(int s, int level, int optname,
|
|
const void *optval, int optlen); */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.setsockopt(args)",
|
|
arg2, 5*sizeof(Addr) );
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.setsockopt(optval)",
|
|
((UInt*)arg2)[3], /* optval */
|
|
((UInt*)arg2)[4] /* optlen */ );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case SYS_GETSOCKOPT:
|
|
/* int setsockopt(int s, int level, int optname,
|
|
void *optval, socklen_t *optlen); */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.getsockopt(args)",
|
|
arg2, 5*sizeof(Addr) );
|
|
{
|
|
Addr optval_p = ((UInt*)arg2)[3];
|
|
Addr optlen_p = ((UInt*)arg2)[4];
|
|
/* vg_assert(sizeof(socklen_t) == sizeof(UInt)); */
|
|
if (optval_p != (Addr)NULL)
|
|
buf_and_len_pre_check ( tid, optval_p, optlen_p,
|
|
"socketcall.getsockopt(optval)",
|
|
"socketcall.getsockopt(optlen)" );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (optval_p != (Addr)NULL)
|
|
buf_and_len_post_check ( tid, res, optval_p, optlen_p,
|
|
"socketcall.getsockopt(optlen_out)" );
|
|
}
|
|
break;
|
|
|
|
case SYS_GETSOCKNAME:
|
|
/* int getsockname(int s, struct sockaddr* name, int* namelen) */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.getsockname(args)",
|
|
arg2, 3*sizeof(Addr) );
|
|
{
|
|
Addr name_p = ((UInt*)arg2)[1];
|
|
Addr namelen_p = ((UInt*)arg2)[2];
|
|
|
|
/* Nb: name_p cannot be NULL */
|
|
buf_and_len_pre_check ( tid, name_p, namelen_p,
|
|
"socketcall.getsockname(name)",
|
|
"socketcall.getsockname(namelen_in)" );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
buf_and_len_post_check ( tid, res, name_p, namelen_p,
|
|
"socketcall.getsockname(namelen_out)" );
|
|
}
|
|
break;
|
|
|
|
case SYS_GETPEERNAME:
|
|
/* int getpeername(int s, struct sockaddr* name, int* namelen) */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.getpeername(args)",
|
|
arg2, 3*sizeof(Addr) );
|
|
{
|
|
Addr name_p = ((UInt*)arg2)[1];
|
|
Addr namelen_p = ((UInt*)arg2)[2];
|
|
|
|
/* Nb: name_p cannot be NULL */
|
|
buf_and_len_pre_check ( tid, name_p, namelen_p,
|
|
"socketcall.getpeername(name)",
|
|
"socketcall.getpeername(namelen_in)" );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
buf_and_len_post_check ( tid, res, name_p, namelen_p,
|
|
"socketcall.getpeername(namelen_out)" );
|
|
}
|
|
break;
|
|
|
|
case SYS_SHUTDOWN:
|
|
/* int shutdown(int s, int how); */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.shutdown(args)",
|
|
arg2, 2*sizeof(Addr) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case SYS_SENDMSG:
|
|
{
|
|
/* int sendmsg(int s, const struct msghdr *msg, int flags); */
|
|
|
|
/* this causes warnings, and I don't get why. glibc bug?
|
|
* (after all it's glibc providing the arguments array)
|
|
SYSCALL_TRACK( pre_mem_read, "socketcall.sendmsg(args)",
|
|
arg2, 3*sizeof(Addr) );
|
|
*/
|
|
|
|
struct msghdr *msg = (struct msghdr *)((UInt *)arg2)[ 1 ];
|
|
msghdr_foreachfield ( tid, msg, pre_mem_read_sendmsg );
|
|
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
}
|
|
|
|
case SYS_RECVMSG:
|
|
{
|
|
/* int recvmsg(int s, struct msghdr *msg, int flags); */
|
|
|
|
/* this causes warnings, and I don't get why. glibc bug?
|
|
* (after all it's glibc providing the arguments array)
|
|
SYSCALL_TRACK( pre_mem_read, "socketcall.recvmsg(args)",
|
|
arg2, 3*sizeof(Addr) );
|
|
*/
|
|
|
|
struct msghdr *msg = (struct msghdr *)((UInt *)arg2)[ 1 ];
|
|
msghdr_foreachfield ( tid, msg, pre_mem_write_recvmsg );
|
|
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
|
|
if ( !VG_(is_kerror)( res ) )
|
|
msghdr_foreachfield( tid, msg, post_mem_write_recvmsg );
|
|
|
|
break;
|
|
}
|
|
|
|
default:
|
|
VG_(message)(Vg_DebugMsg,"FATAL: unhandled socketcall 0x%x",arg1);
|
|
VG_(core_panic)("... bye!\n");
|
|
break; /*NOTREACHED*/
|
|
}
|
|
break;
|
|
|
|
case __NR_stat: /* syscall 106 */
|
|
/* int stat(const char *file_name, struct stat *buf); */
|
|
MAYBE_PRINTF("stat ( %p, %p )\n",arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "stat(file_name)", arg1 );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "stat(buf)",
|
|
arg2, sizeof(struct stat) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res))
|
|
VG_TRACK( post_mem_write, arg2, sizeof(struct stat) );
|
|
break;
|
|
|
|
case __NR_statfs: /* syscall 99 */
|
|
/* int statfs(const char *path, struct statfs *buf); */
|
|
MAYBE_PRINTF("statfs ( %p, %p )\n",arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "statfs(path)", arg1 );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "stat(buf)",
|
|
arg2, sizeof(struct statfs) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res))
|
|
VG_TRACK( post_mem_write, arg2, sizeof(struct statfs) );
|
|
break;
|
|
|
|
case __NR_symlink: /* syscall 83 */
|
|
/* int symlink(const char *oldpath, const char *newpath); */
|
|
MAYBE_PRINTF("symlink ( %p, %p )\n",arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "symlink(oldpath)", arg1 );
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "symlink(newpath)", arg2 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
# if defined(__NR_stat64)
|
|
case __NR_stat64: /* syscall 195 */
|
|
/* int stat64(const char *file_name, struct stat64 *buf); */
|
|
MAYBE_PRINTF("stat64 ( %p, %p )\n",arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "stat64(file_name)", arg1 );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "stat64(buf)",
|
|
arg2, sizeof(struct stat64) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res))
|
|
VG_TRACK( post_mem_write, arg2, sizeof(struct stat64) );
|
|
break;
|
|
# endif
|
|
|
|
# if defined(__NR_fstat64)
|
|
case __NR_fstat64: /* syscall 197 */
|
|
/* int fstat64(int filedes, struct stat64 *buf); */
|
|
MAYBE_PRINTF("fstat64 ( %d, %p )\n",arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "fstat64(buf)",
|
|
arg2, sizeof(struct stat64) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res))
|
|
VG_TRACK( post_mem_write, arg2, sizeof(struct stat64) );
|
|
break;
|
|
# endif
|
|
|
|
case __NR_sysinfo: /* syscall 116 */
|
|
/* int sysinfo(struct sysinfo *info); */
|
|
MAYBE_PRINTF("sysinfo ( %p )\n",arg1);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "sysinfo(info)",
|
|
arg1, sizeof(struct sysinfo) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res))
|
|
VG_TRACK( post_mem_write, arg1, sizeof(struct sysinfo) );
|
|
break;
|
|
|
|
case __NR_time: /* syscall 13 */
|
|
/* time_t time(time_t *t); */
|
|
MAYBE_PRINTF("time ( %p )\n",arg1);
|
|
if (arg1 != (UInt)NULL) {
|
|
SYSCALL_TRACK( pre_mem_write, tid, "time", arg1, sizeof(time_t) );
|
|
}
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && arg1 != (UInt)NULL) {
|
|
VG_TRACK( post_mem_write, arg1, sizeof(time_t) );
|
|
}
|
|
break;
|
|
|
|
case __NR_times: /* syscall 43 */
|
|
/* clock_t times(struct tms *buf); */
|
|
MAYBE_PRINTF("times ( %p )\n",arg1);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "times(buf)",
|
|
arg1, sizeof(struct tms) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && arg1 != (UInt)NULL) {
|
|
VG_TRACK( post_mem_write, arg1, sizeof(struct tms) );
|
|
}
|
|
break;
|
|
|
|
case __NR_truncate: /* syscall 92 */
|
|
/* int truncate(const char *path, size_t length); */
|
|
MAYBE_PRINTF("truncate ( %p, %d )\n", arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "truncate(path)", arg1 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_umask: /* syscall 60 */
|
|
/* mode_t umask(mode_t mask); */
|
|
MAYBE_PRINTF("umask ( %d )\n", arg1);
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_unlink: /* syscall 10 */
|
|
/* int unlink(const char *pathname) */
|
|
MAYBE_PRINTF("ulink ( %p )\n",arg1);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "unlink(pathname)", arg1 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_uname: /* syscall 122 */
|
|
/* int uname(struct utsname *buf); */
|
|
MAYBE_PRINTF("uname ( %p )\n",arg1);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "uname(buf)",
|
|
arg1, sizeof(struct utsname) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && arg1 != (UInt)NULL) {
|
|
VG_TRACK( post_mem_write, arg1, sizeof(struct utsname) );
|
|
}
|
|
break;
|
|
|
|
case __NR_utime: /* syscall 30 */
|
|
/* int utime(const char *filename, struct utimbuf *buf); */
|
|
MAYBE_PRINTF("utime ( %p, %p )\n", arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "utime(filename)", arg1 );
|
|
if (arg2 != (UInt)NULL)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "utime(buf)", arg2,
|
|
sizeof(struct utimbuf) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
|
|
case __NR_wait4: /* syscall 114 */
|
|
/* pid_t wait4(pid_t pid, int *status, int options,
|
|
struct rusage *rusage) */
|
|
MAYBE_PRINTF("wait4 ( %d, %p, %d, %p )\n",
|
|
arg1,arg2,arg3,arg4);
|
|
if (arg2 != (Addr)NULL)
|
|
SYSCALL_TRACK( pre_mem_write, tid, "wait4(status)",
|
|
arg2, sizeof(int) );
|
|
if (arg4 != (Addr)NULL)
|
|
SYSCALL_TRACK( pre_mem_write, tid, "wait4(rusage)", arg4,
|
|
sizeof(struct rusage) );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res)) {
|
|
if (arg2 != (Addr)NULL)
|
|
VG_TRACK( post_mem_write, arg2, sizeof(int) );
|
|
if (arg4 != (Addr)NULL)
|
|
VG_TRACK( post_mem_write, arg4, sizeof(struct rusage) );
|
|
}
|
|
break;
|
|
|
|
case __NR_writev: { /* syscall 146 */
|
|
/* int writev(int fd, const struct iovec * vector, size_t count); */
|
|
UInt i;
|
|
struct iovec * vec;
|
|
MAYBE_PRINTF("writev ( %d, %p, %d )\n",arg1,arg2,arg3);
|
|
SYSCALL_TRACK( pre_mem_read, tid, "writev(vector)",
|
|
arg2, arg3 * sizeof(struct iovec) );
|
|
/* ToDo: don't do any of the following if the vector is invalid */
|
|
vec = (struct iovec *)arg2;
|
|
for (i = 0; i < arg3; i++)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "writev(vector[...])",
|
|
(UInt)vec[i].iov_base,vec[i].iov_len );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
}
|
|
|
|
# if defined(__NR_prctl)
|
|
case __NR_prctl: /* syscall 172 */
|
|
/* int prctl(int option, unsigned long arg2, unsigned long arg3,
|
|
unsigned long arg4, unsigned long arg5); */
|
|
MAYBE_PRINTF( "prctl ( %d, %d, %d, %d, %d )\n", arg1, arg2, arg3,
|
|
arg4, arg5 );
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
break;
|
|
# endif
|
|
|
|
/*-------------------------- SIGNALS --------------------------*/
|
|
|
|
/* Normally set to 1, so that Valgrind's signal-simulation machinery
|
|
is engaged. Sometimes useful to disable (set to 0), for
|
|
debugging purposes, to make clients more deterministic. */
|
|
# define SIGNAL_SIMULATION 1
|
|
|
|
case __NR_sigaltstack: /* syscall 186 */
|
|
/* int sigaltstack(const stack_t *ss, stack_t *oss); */
|
|
MAYBE_PRINTF("sigaltstack ( %p, %p )\n",arg1,arg2);
|
|
if (arg1 != (UInt)NULL) {
|
|
SYSCALL_TRACK( pre_mem_read, tid, "sigaltstack(ss)",
|
|
arg1, sizeof(vki_kstack_t) );
|
|
}
|
|
if (arg2 != (UInt)NULL) {
|
|
SYSCALL_TRACK( pre_mem_write, tid, "sigaltstack(ss)",
|
|
arg1, sizeof(vki_kstack_t) );
|
|
}
|
|
# if SIGNAL_SIMULATION
|
|
VG_(do__NR_sigaltstack) (tid);
|
|
res = tst->m_eax;
|
|
# else
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
# endif
|
|
if (!VG_(is_kerror)(res) && res == 0 && arg2 != (UInt)NULL)
|
|
VG_TRACK( post_mem_write, arg2, sizeof(vki_kstack_t));
|
|
break;
|
|
|
|
case __NR_rt_sigaction: /* syscall 174 */
|
|
case __NR_sigaction: /* syscall 67 */
|
|
/* int sigaction(int signum, struct k_sigaction *act,
|
|
struct k_sigaction *oldact); */
|
|
MAYBE_PRINTF("sigaction ( %d, %p, %p )\n",arg1,arg2,arg3);
|
|
if (arg2 != (UInt)NULL)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "sigaction(act)",
|
|
arg2, sizeof(vki_ksigaction));
|
|
if (arg3 != (UInt)NULL)
|
|
SYSCALL_TRACK( pre_mem_write, tid, "sigaction(oldact)",
|
|
arg3, sizeof(vki_ksigaction));
|
|
/* We do this one ourselves! */
|
|
# if SIGNAL_SIMULATION
|
|
VG_(do__NR_sigaction)(tid);
|
|
res = tst->m_eax;
|
|
# else
|
|
/* debugging signals; when we don't handle them. */
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
# endif
|
|
if (!VG_(is_kerror)(res) && res == 0 && arg3 != (UInt)NULL)
|
|
VG_TRACK( post_mem_write, arg3, sizeof(vki_ksigaction));
|
|
break;
|
|
|
|
case __NR_rt_sigprocmask: /* syscall 175 */
|
|
case __NR_sigprocmask: /* syscall 126 */
|
|
/* int sigprocmask(int how, k_sigset_t *set,
|
|
k_sigset_t *oldset); */
|
|
MAYBE_PRINTF("sigprocmask ( %d, %p, %p )\n",arg1,arg2,arg3);
|
|
if (arg2 != (UInt)NULL)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "sigprocmask(set)",
|
|
arg2, sizeof(vki_ksigset_t));
|
|
if (arg3 != (UInt)NULL)
|
|
SYSCALL_TRACK( pre_mem_write, tid, "sigprocmask(oldset)",
|
|
arg3, sizeof(vki_ksigset_t));
|
|
# if SIGNAL_SIMULATION
|
|
VG_(do__NR_sigprocmask) ( tid,
|
|
arg1 /*how*/,
|
|
(vki_ksigset_t*) arg2,
|
|
(vki_ksigset_t*) arg3 );
|
|
res = tst->m_eax;
|
|
# else
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
# endif
|
|
if (!VG_(is_kerror)(res) && res == 0 && arg3 != (UInt)NULL)
|
|
VG_TRACK( post_mem_write, arg3, sizeof(vki_ksigset_t));
|
|
break;
|
|
case __NR_sigpending: /* syscall 73 */
|
|
# if defined(__NR_rt_sigpending)
|
|
case __NR_rt_sigpending: /* syscall 176 */
|
|
# endif
|
|
/* int sigpending( sigset_t *set ) ; */
|
|
MAYBE_PRINTF( "sigpending ( %p )\n", arg1 );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "sigpending(set)",
|
|
arg1, sizeof(vki_ksigset_t));
|
|
# if SIGNAL_SIMULATION
|
|
VG_(do_sigpending)( tid, (vki_ksigset_t*)arg1 );
|
|
res = 0;
|
|
SET_SYSCALL_RETVAL(tid, res);
|
|
# else
|
|
KERNEL_DO_SYSCALL(tid, res);
|
|
# endif
|
|
if ( !VG_( is_kerror )( res ) && res == 0 )
|
|
VG_TRACK( post_mem_write, arg1, sizeof( vki_ksigset_t ) ) ;
|
|
break ;
|
|
|
|
default:
|
|
VG_(message)
|
|
(Vg_DebugMsg,"FATAL: unhandled syscall: %d",syscallno);
|
|
VG_(message)
|
|
(Vg_DebugMsg,"Do not panic. You may be able to fix this easily.");
|
|
VG_(message)
|
|
(Vg_DebugMsg,"Read the file README_MISSING_SYSCALL_OR_IOCTL.");
|
|
VG_(unimplemented)("no wrapper for the above system call");
|
|
vg_assert(3+3 == 7);
|
|
break; /*NOTREACHED*/
|
|
}
|
|
|
|
/* { void zzzmemscan(void); zzzmemscan(); } */
|
|
|
|
/* Do any post-syscall actions */
|
|
if (VG_(needs).syscall_wrapper) {
|
|
VGP_PUSHCC(VgpSkinSysWrap);
|
|
SK_(post_syscall)(tid, syscallno, pre_res, res, /*isBlocking*/False);
|
|
VGP_POPCC(VgpSkinSysWrap);
|
|
}
|
|
|
|
VGP_POPCC(VgpCoreSysWrap);
|
|
}
|
|
|
|
|
|
|
|
/* Perform pre-actions for a blocking syscall, but do not do the
|
|
syscall itself.
|
|
|
|
Because %eax is used both for the syscall number before the call
|
|
and the result value afterwards, we can't reliably use it to get
|
|
the syscall number. So the caller has to pass it explicitly.
|
|
*/
|
|
void* VG_(pre_known_blocking_syscall) ( ThreadId tid, Int syscallno )
|
|
{
|
|
ThreadState* tst;
|
|
UInt arg1, arg2, arg3;
|
|
void* pre_res = 0;
|
|
|
|
VGP_PUSHCC(VgpCoreSysWrap);
|
|
|
|
vg_assert(VG_(is_valid_tid)(tid));
|
|
tst = & VG_(threads)[tid];
|
|
arg1 = tst->m_ebx;
|
|
arg2 = tst->m_ecx;
|
|
arg3 = tst->m_edx;
|
|
/*
|
|
arg4 = tst->m_esi;
|
|
arg5 = tst->m_edi;
|
|
*/
|
|
|
|
if (VG_(needs).syscall_wrapper) {
|
|
VGP_PUSHCC(VgpSkinSysWrap);
|
|
pre_res = SK_(pre_syscall)(tid, syscallno, /*isBlocking*/True);
|
|
VGP_POPCC(VgpSkinSysWrap);
|
|
}
|
|
|
|
switch (syscallno) {
|
|
|
|
case __NR_read: /* syscall 3 */
|
|
/* size_t read(int fd, void *buf, size_t count); */
|
|
MAYBE_PRINTF(
|
|
"SYSCALL--PRE[%d,%d] read ( %d, %p, %d )\n",
|
|
VG_(getpid)(), tid,
|
|
arg1, arg2, arg3);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "read(buf)", arg2, arg3 );
|
|
break;
|
|
|
|
case __NR_write: /* syscall 4 */
|
|
/* size_t write(int fd, const void *buf, size_t count); */
|
|
MAYBE_PRINTF(
|
|
"SYSCALL--PRE[%d,%d] write ( %d, %p, %d )\n",
|
|
VG_(getpid)(), tid,
|
|
arg1, arg2, arg3);
|
|
SYSCALL_TRACK( pre_mem_read, tid, "write(buf)", arg2, arg3 );
|
|
break;
|
|
|
|
default:
|
|
VG_(printf)("pre_known_blocking_syscall: unexpected %d\n", syscallno);
|
|
VG_(core_panic)("pre_known_blocking_syscall");
|
|
/*NOTREACHED*/
|
|
break;
|
|
}
|
|
VGP_POPCC(VgpCoreSysWrap);
|
|
|
|
return pre_res; /* 0 if SK_(pre_syscall)() not called */
|
|
}
|
|
|
|
|
|
/* Perform post-actions for a blocking syscall, but do not do the
|
|
syscall itself.
|
|
|
|
Because %eax is used both for the syscall number before the call
|
|
and the result value afterwards, we can't reliably use it to get
|
|
the syscall number. So the caller has to pass it explicitly.
|
|
*/
|
|
void VG_(post_known_blocking_syscall) ( ThreadId tid,
|
|
Int syscallno,
|
|
void* pre_res,
|
|
Int res )
|
|
{
|
|
ThreadState* tst;
|
|
UInt arg1, arg2, arg3;
|
|
|
|
VGP_PUSHCC(VgpCoreSysWrap);
|
|
|
|
vg_assert(VG_(is_valid_tid)(tid));
|
|
tst = & VG_(threads)[tid];
|
|
arg1 = tst->m_ebx;
|
|
arg2 = tst->m_ecx;
|
|
arg3 = tst->m_edx;
|
|
/*
|
|
arg4 = tst->m_esi;
|
|
arg5 = tst->m_edi;
|
|
*/
|
|
|
|
switch (syscallno) {
|
|
|
|
case __NR_read: /* syscall 3 */
|
|
/* size_t read(int fd, void *buf, size_t count); */
|
|
MAYBE_PRINTF(
|
|
"SYSCALL-POST[%d,%d] read ( %d, %p, %d ) --> %d\n",
|
|
VG_(getpid)(), tid,
|
|
arg1, arg2, arg3, res);
|
|
if (!VG_(is_kerror)(res) && res > 0)
|
|
VG_TRACK( post_mem_write, arg2, res );
|
|
break;
|
|
|
|
case __NR_write: /* syscall 4 */
|
|
/* size_t write(int fd, const void *buf, size_t count); */
|
|
MAYBE_PRINTF(
|
|
"SYSCALL-POST[%d,%d] write ( %d, %p, %d ) --> %d\n",
|
|
VG_(getpid)(), tid,
|
|
arg1, arg2, arg3, res);
|
|
break;
|
|
|
|
default:
|
|
VG_(printf)("post_known_blocking_syscall: unexpected %d\n",
|
|
syscallno);
|
|
VG_(core_panic)("post_known_blocking_syscall");
|
|
/*NOTREACHED*/
|
|
break;
|
|
}
|
|
|
|
if (VG_(needs).syscall_wrapper) {
|
|
VGP_PUSHCC(VgpSkinSysWrap);
|
|
SK_(post_syscall)(tid, syscallno, pre_res, res, /*isBlocking*/True);
|
|
VGP_POPCC(VgpSkinSysWrap);
|
|
}
|
|
|
|
VGP_POPCC(VgpCoreSysWrap);
|
|
}
|
|
|
|
|
|
/*--------------------------------------------------------------------*/
|
|
/*--- end vg_syscall_mem.c ---*/
|
|
/*--------------------------------------------------------------------*/
|