mirror of
https://github.com/Zenithsiz/ftmemsim-valgrind.git
synced 2026-02-04 02:18:37 +00:00
Lussnig <lussnig@smcc.net>. MERGE TO STABLE git-svn-id: svn://svn.valgrind.org/valgrind/trunk@1978
4533 lines
124 KiB
C
4533 lines
124 KiB
C
|
|
/*--------------------------------------------------------------------*/
|
|
/*--- Handle system calls. vg_syscalls.c ---*/
|
|
/*--------------------------------------------------------------------*/
|
|
|
|
/*
|
|
This file is part of Valgrind, an extensible x86 protected-mode
|
|
emulator for monitoring program execution on x86-Unixes.
|
|
|
|
Copyright (C) 2000-2003 Julian Seward
|
|
jseward@acm.org
|
|
|
|
This program is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU General Public License as
|
|
published by the Free Software Foundation; either version 2 of the
|
|
License, or (at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful, but
|
|
WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
|
|
02111-1307, USA.
|
|
|
|
The GNU General Public License is contained in the file COPYING.
|
|
*/
|
|
|
|
#include "vg_include.h"
|
|
|
|
/* vg_unsafe.h should NOT be included into any file except this
|
|
one. */
|
|
#include "vg_unsafe.h"
|
|
|
|
|
|
/* All system calls are channelled through here, doing two things:
|
|
|
|
* notify the skin of the memory events (reads, writes) happening
|
|
|
|
* perform the syscall, usually by passing it along to the kernel
|
|
unmodified.
|
|
|
|
A magical piece of assembly code, VG_(do_syscall)(), in vg_syscall.S
|
|
does the tricky bit of passing a syscall to the kernel, whilst
|
|
having the simulator retain control.
|
|
*/
|
|
|
|
#define SYSCALL_TRACK(fn, args...) VG_TRACK(fn, Vg_CoreSysCall, ## args)
|
|
|
|
#define MAYBE_PRINTF(format, args...) \
|
|
if (VG_(clo_trace_syscalls)) \
|
|
VG_(printf)(format, ## args)
|
|
|
|
|
|
/* ---------------------------------------------------------------------
|
|
A simple atfork() facility for Valgrind's internal use
|
|
------------------------------------------------------------------ */
|
|
|
|
struct atfork {
|
|
vg_atfork_t pre;
|
|
vg_atfork_t parent;
|
|
vg_atfork_t child;
|
|
};
|
|
|
|
#define VG_MAX_ATFORK 10
|
|
|
|
static struct atfork atforks[VG_MAX_ATFORK];
|
|
static Int n_atfork;
|
|
|
|
void VG_(atfork)(vg_atfork_t pre, vg_atfork_t parent, vg_atfork_t child)
|
|
{
|
|
Int i;
|
|
|
|
for(i = 0; i < n_atfork; i++) {
|
|
if (atforks[i].pre == pre &&
|
|
atforks[i].parent == parent &&
|
|
atforks[i].child == child)
|
|
return;
|
|
}
|
|
|
|
if (n_atfork >= VG_MAX_ATFORK)
|
|
VG_(core_panic)("Too many VG_(atfork) handlers requested: raise VG_MAX_ATFORK");
|
|
|
|
atforks[n_atfork].pre = pre;
|
|
atforks[n_atfork].parent = parent;
|
|
atforks[n_atfork].child = child;
|
|
|
|
n_atfork++;
|
|
}
|
|
|
|
static void do_atfork_pre(ThreadId tid)
|
|
{
|
|
Int i;
|
|
|
|
for(i = 0; i < n_atfork; i++)
|
|
if (atforks[i].pre != NULL)
|
|
(*atforks[i].pre)(tid);
|
|
}
|
|
|
|
static void do_atfork_parent(ThreadId tid)
|
|
{
|
|
Int i;
|
|
|
|
for(i = 0; i < n_atfork; i++)
|
|
if (atforks[i].parent != NULL)
|
|
(*atforks[i].parent)(tid);
|
|
}
|
|
|
|
static void do_atfork_child(ThreadId tid)
|
|
{
|
|
Int i;
|
|
|
|
for(i = 0; i < n_atfork; i++)
|
|
if (atforks[i].child != NULL)
|
|
(*atforks[i].child)(tid);
|
|
}
|
|
|
|
/* ---------------------------------------------------------------------
|
|
Doing mmap, munmap, mremap, mprotect
|
|
------------------------------------------------------------------ */
|
|
|
|
// Nb: this isn't done as precisely as possible, but it seems that programs
|
|
// are usually sufficiently well-behaved that the more obscure corner cases
|
|
// aren't important. Various comments in the few functions below give more
|
|
// details... njn 2002-Sep-17
|
|
|
|
/* AFAICT from kernel sources (mm/mprotect.c) and general experimentation,
|
|
munmap, mprotect (and mremap??) work at the page level. So addresses
|
|
and lengths must be adjusted for this. */
|
|
|
|
/* Mash around start and length so that the area exactly covers
|
|
an integral number of pages. If we don't do that, memcheck's
|
|
idea of addressible memory diverges from that of the
|
|
kernel's, which causes the leak detector to crash. */
|
|
static
|
|
void mash_addr_and_len( Addr* a, UInt* len)
|
|
{
|
|
while (( *a % VKI_BYTES_PER_PAGE) > 0) { (*a)--; (*len)++; }
|
|
while (((*a + *len) % VKI_BYTES_PER_PAGE) > 0) { (*len)++; }
|
|
}
|
|
|
|
static
|
|
void mmap_segment ( Addr a, UInt len, UInt prot, Int fd )
|
|
{
|
|
Bool rr, ww, xx;
|
|
|
|
/* Records segment, reads debug symbols if necessary */
|
|
if ((prot & PROT_EXEC) && fd != -1)
|
|
VG_(new_exeseg_mmap) ( a, len );
|
|
|
|
rr = prot & PROT_READ;
|
|
ww = prot & PROT_WRITE;
|
|
xx = prot & PROT_EXEC;
|
|
|
|
VG_TRACK( new_mem_mmap, a, len, rr, ww, xx );
|
|
}
|
|
|
|
static
|
|
void munmap_segment ( Addr a, UInt len )
|
|
{
|
|
/* Addr orig_a = a;
|
|
Addr orig_len = len; */
|
|
|
|
mash_addr_and_len(&a, &len);
|
|
/*
|
|
VG_(printf)("MUNMAP: correct (%p for %d) to (%p for %d) %s\n",
|
|
orig_a, orig_len, a, len, (orig_a!=start || orig_len!=length)
|
|
? "CHANGE" : "");
|
|
*/
|
|
|
|
/* Invalidate translations as necessary (also discarding any basic
|
|
block-specific info retained by the skin) and unload any debug
|
|
symbols. */
|
|
// This doesn't handle partial unmapping of exe segs correctly, if that
|
|
// ever happens...
|
|
VG_(remove_if_exeseg) ( a, len );
|
|
|
|
VG_TRACK( die_mem_munmap, a, len );
|
|
}
|
|
|
|
static
|
|
void mprotect_segment ( Addr a, UInt len, Int prot )
|
|
{
|
|
Bool rr, ww, xx;
|
|
|
|
rr = prot & PROT_READ;
|
|
ww = prot & PROT_WRITE;
|
|
xx = prot & PROT_EXEC;
|
|
|
|
// if removing exe permission, should check and remove from exe_seg list
|
|
// if adding, should check and add to exe_seg list
|
|
// easier to ignore both cases -- both v. unlikely?
|
|
mash_addr_and_len(&a, &len);
|
|
VG_TRACK( change_mem_mprotect, a, len, rr, ww, xx );
|
|
}
|
|
|
|
static
|
|
void mremap_segment ( Addr old_addr, UInt old_size, Addr new_addr,
|
|
UInt new_size )
|
|
{
|
|
/* If the block moves, assume new and old blocks can't overlap; seems to
|
|
* be valid judging from Linux kernel code in mm/mremap.c */
|
|
vg_assert(old_addr == new_addr ||
|
|
old_addr+old_size < new_addr ||
|
|
new_addr+new_size < old_addr);
|
|
|
|
if (new_size < old_size) {
|
|
// if exe_seg
|
|
// unmap old symbols from old_addr+new_size..old_addr+new_size
|
|
// update exe_seg size = new_size
|
|
// update exe_seg addr = new_addr...
|
|
VG_TRACK( copy_mem_remap, old_addr, new_addr, new_size );
|
|
VG_TRACK( die_mem_munmap, old_addr+new_size, old_size-new_size );
|
|
|
|
} else {
|
|
// if exe_seg
|
|
// map new symbols from new_addr+old_size..new_addr+new_size
|
|
// update exe_seg size = new_size
|
|
// update exe_seg addr = new_addr...
|
|
VG_TRACK( copy_mem_remap, old_addr, new_addr, old_size );
|
|
// what should the permissions on the new extended part be??
|
|
// using 'rwx'
|
|
VG_TRACK( new_mem_mmap, new_addr+old_size, new_size-old_size,
|
|
True, True, True );
|
|
}
|
|
}
|
|
|
|
|
|
/* Is this a Linux kernel error return value? */
|
|
/* From:
|
|
http://sources.redhat.com/cgi-bin/cvsweb.cgi/libc/sysdeps/unix/sysv/
|
|
linux/i386/sysdep.h?
|
|
rev=1.28&content-type=text/x-cvsweb-markup&cvsroot=glibc
|
|
|
|
\begin{quote}:
|
|
|
|
Linux uses a negative return value to indicate syscall errors,
|
|
unlike most Unices, which use the condition codes' carry flag.
|
|
|
|
Since version 2.1 the return value of a system call might be
|
|
negative even if the call succeeded. E.g., the `lseek' system call
|
|
might return a large offset. Therefore we must not anymore test
|
|
for < 0, but test for a real error by making sure the value in %eax
|
|
is a real error number. Linus said he will make sure the no syscall
|
|
returns a value in -1 .. -4095 as a valid result so we can safely
|
|
test with -4095.
|
|
|
|
END QUOTE
|
|
*/
|
|
Bool VG_(is_kerror) ( Int res )
|
|
{
|
|
if (res >= -4095 && res <= -1)
|
|
return True;
|
|
else
|
|
return False;
|
|
}
|
|
|
|
static
|
|
UInt get_shm_size ( Int shmid )
|
|
{
|
|
struct shmid_ds buf;
|
|
long __res = VG_(do_syscall)(__NR_ipc, 24 /* IPCOP_shmctl */, shmid, IPC_STAT, 0, &buf);
|
|
if ( VG_(is_kerror) ( __res ) )
|
|
return 0;
|
|
|
|
return buf.shm_segsz;
|
|
}
|
|
|
|
static
|
|
Char *strdupcat ( const Char *s1, const Char *s2, ArenaId aid )
|
|
{
|
|
UInt len = VG_(strlen) ( s1 ) + VG_(strlen) ( s2 ) + 1;
|
|
Char *result = VG_(arena_malloc) ( aid, len );
|
|
VG_(strcpy) ( result, s1 );
|
|
VG_(strcat) ( result, s2 );
|
|
return result;
|
|
}
|
|
|
|
static
|
|
void pre_mem_read_sendmsg ( ThreadId tid,
|
|
Char *msg, UInt base, UInt size )
|
|
{
|
|
Char *outmsg = strdupcat ( "socketcall.sendmsg", msg, VG_AR_TRANSIENT );
|
|
SYSCALL_TRACK( pre_mem_read, tid, outmsg, base, size );
|
|
|
|
VG_(arena_free) ( VG_AR_TRANSIENT, outmsg );
|
|
}
|
|
|
|
static
|
|
void pre_mem_write_recvmsg ( ThreadId tid,
|
|
Char *msg, UInt base, UInt size )
|
|
{
|
|
Char *outmsg = strdupcat ( "socketcall.recvmsg", msg, VG_AR_TRANSIENT );
|
|
SYSCALL_TRACK( pre_mem_write, tid, outmsg, base, size );
|
|
VG_(arena_free) ( VG_AR_TRANSIENT, outmsg );
|
|
}
|
|
|
|
static
|
|
void post_mem_write_recvmsg ( ThreadId tid,
|
|
Char *fieldName, UInt base, UInt size )
|
|
{
|
|
VG_TRACK( post_mem_write, base, size );
|
|
}
|
|
|
|
static
|
|
void msghdr_foreachfield (
|
|
ThreadId tid,
|
|
struct msghdr *msg,
|
|
void (*foreach_func)( ThreadId, Char *, UInt, UInt )
|
|
)
|
|
{
|
|
if ( !msg )
|
|
return;
|
|
|
|
foreach_func ( tid, "(msg)", (Addr)msg, sizeof( struct msghdr ) );
|
|
|
|
if ( msg->msg_name )
|
|
foreach_func ( tid,
|
|
"(msg.msg_name)",
|
|
(Addr)msg->msg_name, msg->msg_namelen );
|
|
|
|
if ( msg->msg_iov ) {
|
|
struct iovec *iov = msg->msg_iov;
|
|
UInt i;
|
|
|
|
foreach_func ( tid,
|
|
"(msg.msg_iov)",
|
|
(Addr)iov, msg->msg_iovlen * sizeof( struct iovec ) );
|
|
|
|
for ( i = 0; i < msg->msg_iovlen; ++i, ++iov )
|
|
foreach_func ( tid,
|
|
"(msg.msg_iov[i]",
|
|
(Addr)iov->iov_base, iov->iov_len );
|
|
}
|
|
|
|
if ( msg->msg_control )
|
|
foreach_func ( tid,
|
|
"(msg.msg_control)",
|
|
(Addr)msg->msg_control, msg->msg_controllen );
|
|
}
|
|
|
|
static
|
|
void pre_mem_read_sockaddr ( ThreadId tid,
|
|
Char *description,
|
|
struct sockaddr *sa, UInt salen )
|
|
{
|
|
Char *outmsg;
|
|
|
|
/* NULL/zero-length sockaddrs are legal */
|
|
if ( sa == NULL || salen == 0 ) return;
|
|
|
|
outmsg = VG_(arena_malloc) ( VG_AR_TRANSIENT,
|
|
strlen( description ) + 30 );
|
|
|
|
VG_(sprintf) ( outmsg, description, ".sa_family" );
|
|
SYSCALL_TRACK( pre_mem_read, tid, outmsg,
|
|
(UInt) &sa->sa_family, sizeof (sa_family_t));
|
|
|
|
switch (sa->sa_family) {
|
|
|
|
case AF_UNIX:
|
|
VG_(sprintf) ( outmsg, description, ".sun_path" );
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, outmsg,
|
|
(UInt) ((struct sockaddr_un *) sa)->sun_path);
|
|
break;
|
|
|
|
case AF_INET:
|
|
VG_(sprintf) ( outmsg, description, ".sin_port" );
|
|
SYSCALL_TRACK( pre_mem_read, tid, outmsg,
|
|
(UInt) &((struct sockaddr_in *) sa)->sin_port,
|
|
sizeof (((struct sockaddr_in *) sa)->sin_port));
|
|
VG_(sprintf) ( outmsg, description, ".sin_addr" );
|
|
SYSCALL_TRACK( pre_mem_read, tid, outmsg,
|
|
(UInt) &((struct sockaddr_in *) sa)->sin_addr,
|
|
sizeof (struct in_addr));
|
|
break;
|
|
|
|
case AF_INET6:
|
|
VG_(sprintf) ( outmsg, description, ".sin6_port" );
|
|
SYSCALL_TRACK( pre_mem_read, tid, outmsg,
|
|
(UInt) &((struct sockaddr_in6 *) sa)->sin6_port,
|
|
sizeof (((struct sockaddr_in6 *) sa)->sin6_port));
|
|
VG_(sprintf) ( outmsg, description, ".sin6_flowinfo" );
|
|
SYSCALL_TRACK( pre_mem_read, tid, outmsg,
|
|
(UInt) &((struct sockaddr_in6 *) sa)->sin6_flowinfo,
|
|
sizeof (uint32_t));
|
|
VG_(sprintf) ( outmsg, description, ".sin6_addr" );
|
|
SYSCALL_TRACK( pre_mem_read, tid, outmsg,
|
|
(UInt) &((struct sockaddr_in6 *) sa)->sin6_addr,
|
|
sizeof (struct in6_addr));
|
|
# ifndef GLIBC_2_1
|
|
VG_(sprintf) ( outmsg, description, ".sin6_scope_id" );
|
|
SYSCALL_TRACK( pre_mem_read, tid, outmsg,
|
|
(UInt) &((struct sockaddr_in6 *) sa)->sin6_scope_id,
|
|
sizeof (uint32_t));
|
|
# endif
|
|
break;
|
|
|
|
default:
|
|
VG_(sprintf) ( outmsg, description, "" );
|
|
SYSCALL_TRACK( pre_mem_read, tid, outmsg, (UInt) sa, salen );
|
|
break;
|
|
}
|
|
|
|
VG_(arena_free) ( VG_AR_TRANSIENT, outmsg );
|
|
}
|
|
|
|
/* Dereference a pointer to a UInt. */
|
|
static UInt deref_UInt ( ThreadId tid, Addr a, Char* s )
|
|
{
|
|
UInt* a_p = (UInt*)a;
|
|
SYSCALL_TRACK( pre_mem_read, tid, s, (Addr)a_p, sizeof(UInt) );
|
|
if (a_p == NULL)
|
|
return 0;
|
|
else
|
|
return *a_p;
|
|
}
|
|
|
|
/* Dereference a pointer to a pointer. */
|
|
static Addr deref_Addr ( ThreadId tid, Addr a, Char* s )
|
|
{
|
|
Addr* a_p = (Addr*)a;
|
|
SYSCALL_TRACK( pre_mem_read, tid, s, (Addr)a_p, sizeof(Addr) );
|
|
return *a_p;
|
|
}
|
|
|
|
static
|
|
void buf_and_len_pre_check( ThreadId tid, Addr buf_p, Addr buflen_p,
|
|
Char* buf_s, Char* buflen_s )
|
|
{
|
|
if (VG_(track_events).pre_mem_write) {
|
|
UInt buflen_in = deref_UInt( tid, buflen_p, buflen_s);
|
|
if (buflen_in > 0) {
|
|
VG_(track_events).pre_mem_write ( Vg_CoreSysCall,
|
|
tid, buf_s, buf_p, buflen_in );
|
|
}
|
|
}
|
|
}
|
|
|
|
static
|
|
void buf_and_len_post_check( ThreadId tid, Int res,
|
|
Addr buf_p, Addr buflen_p, Char* s )
|
|
{
|
|
if (!VG_(is_kerror)(res) && VG_(track_events).post_mem_write) {
|
|
UInt buflen_out = deref_UInt( tid, buflen_p, s);
|
|
if (buflen_out > 0 && buf_p != (Addr)NULL) {
|
|
VG_(track_events).post_mem_write ( buf_p, buflen_out );
|
|
}
|
|
}
|
|
}
|
|
|
|
/* ---------------------------------------------------------------------
|
|
Data seg end, for brk()
|
|
------------------------------------------------------------------ */
|
|
|
|
/* Records the current end of the data segment so we can make sense of
|
|
calls to brk(). */
|
|
static
|
|
Addr curr_dataseg_end;
|
|
|
|
void VG_(init_dataseg_end_for_brk) ( void )
|
|
{
|
|
curr_dataseg_end = (Addr)VG_(brk)(0);
|
|
if (curr_dataseg_end == (Addr)(-1))
|
|
VG_(core_panic)("can't determine data-seg end for brk()");
|
|
if (0)
|
|
VG_(printf)("DS END is %p\n", (void*)curr_dataseg_end);
|
|
}
|
|
|
|
/* ---------------------------------------------------------------------
|
|
Vet file descriptors for sanity
|
|
------------------------------------------------------------------ */
|
|
|
|
/* Return true if we're allowed to use or create this fd */
|
|
static Bool fd_allowed(Int fd, const Char *syscall, ThreadId tid)
|
|
{
|
|
if (fd < 0 || fd > VG_MAX_FD || fd == VG_(clo_logfile_fd)) {
|
|
VG_(message)(Vg_UserMsg, "Warning: bad use of file descriptor %d in syscall %s()",
|
|
fd, syscall);
|
|
if (fd == VG_(clo_logfile_fd))
|
|
VG_(message)(Vg_UserMsg, " Use --logfile-fd=<number> to select an alternative "
|
|
"logfile fd.");
|
|
if (VG_(clo_verbosity) > 1) {
|
|
ExeContext *ec = VG_(get_ExeContext)(tid);
|
|
VG_(pp_ExeContext)(ec);
|
|
}
|
|
return False;
|
|
}
|
|
return True;
|
|
}
|
|
|
|
|
|
/* ---------------------------------------------------------------------
|
|
The Main Entertainment ...
|
|
------------------------------------------------------------------ */
|
|
|
|
|
|
#define PRE(x) \
|
|
static void before_##x(ThreadId tid, ThreadState *tst)
|
|
#define POST(x) \
|
|
static void after_##x(ThreadId tid, ThreadState *tst)
|
|
|
|
#define STR(x) #x
|
|
#define PREALIAS(new, old) \
|
|
PRE(new) __attribute__((alias(STR(before_##old))))
|
|
#define POSTALIAS(new, old) \
|
|
POST(new) __attribute__((alias(STR(after_##old))))
|
|
|
|
#define SYSNO (tst->m_eax) /* in PRE(x) */
|
|
#define res ((Int)tst->m_eax) /* in POST(x) */
|
|
#define arg1 (tst->m_ebx)
|
|
#define arg2 (tst->m_ecx)
|
|
#define arg3 (tst->m_edx)
|
|
#define arg4 (tst->m_esi)
|
|
#define arg5 (tst->m_edi)
|
|
#define arg6 (tst->m_ebp)
|
|
|
|
PRE(exit_group)
|
|
{
|
|
VG_(core_panic)("syscall exit_group() not caught by the scheduler?!");
|
|
}
|
|
|
|
PRE(exit)
|
|
{
|
|
VG_(core_panic)("syscall exit() not caught by the scheduler?!");
|
|
}
|
|
|
|
PRE(clone)
|
|
{
|
|
VG_(unimplemented)
|
|
("clone(): not supported by Valgrind.\n "
|
|
"We do now support programs linked against\n "
|
|
"libpthread.so, though. Re-run with -v and ensure that\n "
|
|
"you are picking up Valgrind's implementation of libpthread.so.");
|
|
}
|
|
|
|
PRE(ptrace)
|
|
{
|
|
/* long ptrace (enum __ptrace_request request, pid_t pid,
|
|
void *addr, void *data); ... sort of. */
|
|
/* Sigh ... the /usr/include/sys/user.h on R H 6.2 doesn't
|
|
define struct user_fpxregs_struct. On the basis that it
|
|
is defined as follows on my R H 7.2 (glibc-2.2.4) box,
|
|
I kludge it.
|
|
|
|
struct user_fpxregs_struct
|
|
{
|
|
unsigned short int cwd;
|
|
unsigned short int swd;
|
|
unsigned short int twd;
|
|
unsigned short int fop;
|
|
long int fip;
|
|
long int fcs;
|
|
long int foo;
|
|
long int fos;
|
|
long int mxcsr;
|
|
long int reserved;
|
|
long int st_space[32]; 8*16 bytes for each FP-reg = 128 bytes
|
|
long int xmm_space[32]; 8*16 bytes for each XMM-reg = 128 bytes
|
|
long int padding[56];
|
|
};
|
|
*/
|
|
const Int sizeof_struct_user_fpxregs_struct
|
|
= sizeof(unsigned short) * (1 + 1 + 1 + 1)
|
|
+ sizeof(long int) * (1 + 1 + 1 + 1 + 1 + 1 + 32 + 32 + 56);
|
|
|
|
MAYBE_PRINTF("ptrace ( %d, %d, %p, %p )\n", arg1,arg2,arg3,arg4);
|
|
switch (arg1) {
|
|
case 12: /* PTRACE_GETREGS */
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ptrace(getregs)", arg4,
|
|
sizeof (struct user_regs_struct));
|
|
break;
|
|
case 14: /* PTRACE_GETFPREGS */
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ptrace(getfpregs)", arg4,
|
|
sizeof (struct user_fpregs_struct));
|
|
break;
|
|
case 18: /* PTRACE_GETFPXREGS */
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ptrace(getfpxregs)", arg4,
|
|
sizeof_struct_user_fpxregs_struct);
|
|
break;
|
|
case 1: case 2: case 3: /* PTRACE_PEEK{TEXT,DATA,USER} */
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ptrace(peek)", arg4,
|
|
sizeof (long));
|
|
break;
|
|
case 13: /* PTRACE_SETREGS */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ptrace(setregs)", arg4,
|
|
sizeof (struct user_regs_struct));
|
|
break;
|
|
case 15: /* PTRACE_SETFPREGS */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ptrace(setfpregs)", arg4,
|
|
sizeof (struct user_fpregs_struct));
|
|
break;
|
|
case 19: /* PTRACE_SETFPXREGS */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ptrace(setfpxregs)", arg4,
|
|
sizeof_struct_user_fpxregs_struct);
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
|
|
POST(ptrace)
|
|
{
|
|
const Int sizeof_struct_user_fpxregs_struct
|
|
= sizeof(unsigned short) * (1 + 1 + 1 + 1)
|
|
+ sizeof(long int) * (1 + 1 + 1 + 1 + 1 + 1 + 32 + 32 + 56);
|
|
|
|
switch (arg1) {
|
|
case 12: /* PTRACE_GETREGS */
|
|
VG_TRACK( post_mem_write, arg4,
|
|
sizeof (struct user_regs_struct));
|
|
break;
|
|
case 14: /* PTRACE_GETFPREGS */
|
|
VG_TRACK( post_mem_write, arg4,
|
|
sizeof (struct user_fpregs_struct));
|
|
break;
|
|
case 18: /* PTRACE_GETFPXREGS */
|
|
VG_TRACK( post_mem_write, arg4,
|
|
sizeof_struct_user_fpxregs_struct);
|
|
break;
|
|
case 1: case 2: case 3: /* PTRACE_PEEK{TEXT,DATA,USER} */
|
|
VG_TRACK( post_mem_write, arg4, sizeof (long));
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
|
|
PRE(mount)
|
|
{
|
|
MAYBE_PRINTF( "mount( %p, %p, %p )\n" ,arg1,arg2,arg3);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid,"mount(specialfile)",arg1);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid,"mount(dir)",arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid,"mount(filesystemtype)",arg3);
|
|
}
|
|
|
|
PRE(umount)
|
|
{
|
|
/* int umount(const char *path) */
|
|
MAYBE_PRINTF("umount( %p )\n", arg1);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid,"umount(path)",arg1);
|
|
}
|
|
|
|
PRE(modify_ldt)
|
|
{
|
|
MAYBE_PRINTF("modify_ldt ( %d, %p, %d )\n", arg1,arg2,arg3);
|
|
if (arg1 == 0) {
|
|
/* read the LDT into ptr */
|
|
SYSCALL_TRACK( pre_mem_write, tid,
|
|
"modify_ldt(ptr)(func=0)", arg2, arg3 );
|
|
}
|
|
if (arg1 == 1 || arg1 == 0x11) {
|
|
/* write the LDT with the entry pointed at by ptr */
|
|
SYSCALL_TRACK( pre_mem_read, tid,
|
|
"modify_ldt(ptr)(func=1 or 0x11)", arg2,
|
|
sizeof(struct vki_modify_ldt_ldt_s) );
|
|
}
|
|
/* "do" the syscall ourselves; the kernel never sees it */
|
|
res = VG_(sys_modify_ldt)( tid, arg1, (void*)arg2, arg3 );
|
|
|
|
if (arg1 == 0 && !VG_(is_kerror)(res) && res > 0) {
|
|
VG_TRACK( post_mem_write, arg2, res );
|
|
}
|
|
}
|
|
|
|
PRE(setresgid)
|
|
{
|
|
/* int setresgid(gid_t rgid, gid_t egid, gid_t sgid); */
|
|
MAYBE_PRINTF("setresgid ( %d, %d, %d )\n", arg1, arg2, arg3);
|
|
}
|
|
|
|
PRE(vhangup)
|
|
{
|
|
MAYBE_PRINTF("vhangup()\n");
|
|
}
|
|
|
|
PRE(iopl)
|
|
{
|
|
MAYBE_PRINTF("iopl ( %d )\n", arg1);
|
|
}
|
|
|
|
PRE(setxattr)
|
|
{
|
|
MAYBE_PRINTF("setxattr ( %p, %p, %p, %d, %d )\n",
|
|
arg1, arg2, arg3, arg4, arg5);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "setxattr(path)", arg1 );
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "setxattr(name)", arg2 );
|
|
SYSCALL_TRACK( pre_mem_read, tid, "setxattr(value)", arg3, arg4 );
|
|
}
|
|
|
|
PREALIAS(lsetxattr, setxattr);
|
|
|
|
PRE(fsetxattr)
|
|
{
|
|
/* int fsetxattr (int filedes, const char *name,
|
|
const void *value, size_t size, int flags); */
|
|
MAYBE_PRINTF("fsetxattr ( %d, %p, %p, %d, %d )\n",
|
|
arg1, arg2, arg3, arg4, arg5);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "fsetxattr(name)", arg2 );
|
|
SYSCALL_TRACK( pre_mem_read, tid, "fsetxattr(value)", arg3, arg4 );
|
|
}
|
|
|
|
PRE(getxattr)
|
|
{
|
|
MAYBE_PRINTF("getxattr ( %p, %p, %p, %d )\n",
|
|
arg1,arg2,arg3, arg4);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "getxattr(path)", arg1 );
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "getxattr(name)", arg2 );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getxattr(value)", arg3, arg4 );
|
|
}
|
|
|
|
POST(getxattr)
|
|
{
|
|
if (res > 0 && arg3 != (Addr)NULL) {
|
|
VG_TRACK( post_mem_write, arg3, res );
|
|
}
|
|
}
|
|
|
|
PREALIAS(lgetxattr, getxattr);
|
|
POSTALIAS(lgetxattr, getxattr);
|
|
|
|
PRE(fgetxattr)
|
|
{
|
|
MAYBE_PRINTF("fgetxattr ( %d, %p, %p, %d )\n",
|
|
arg1, arg2, arg3, arg4);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "fgetxattr(name)", arg2 );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "fgetxattr(value)", arg3, arg4 );
|
|
}
|
|
|
|
POST(fgetxattr)
|
|
{
|
|
if (res > 0 && arg3 != (Addr)NULL)
|
|
VG_TRACK( post_mem_write, arg3, res );
|
|
}
|
|
|
|
PRE(listxattr)
|
|
{
|
|
MAYBE_PRINTF("listxattr ( %p, %p, %d )\n", arg1, arg2, arg3);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "listxattr(path)", arg1 );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "listxattr(list)", arg2, arg3 );
|
|
}
|
|
|
|
POST(listxattr)
|
|
{
|
|
if (res > 0 && arg2 != (Addr)NULL)
|
|
VG_TRACK( post_mem_write, arg2, res );
|
|
}
|
|
|
|
PREALIAS(llistxattr, listxattr);
|
|
POSTALIAS(llistxattr, listxattr);
|
|
|
|
PRE(flistxattr)
|
|
{
|
|
/* ssize_t flistxattr (int filedes, char *list, size_t size); */
|
|
MAYBE_PRINTF("flistxattr ( %d, %p, %d )\n", arg1, arg2, arg3);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "listxattr(list)", arg2, arg3 );
|
|
}
|
|
|
|
POST(flistxattr)
|
|
{
|
|
if (res > 0 && arg2 != (Addr)NULL)
|
|
VG_TRACK( post_mem_write, arg2, res );
|
|
}
|
|
|
|
PRE(removexattr)
|
|
{
|
|
MAYBE_PRINTF("removexattr ( %p, %p )\n", arg1, arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "listxattr(path)", arg1 );
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "listxattr(name)", arg2 );
|
|
}
|
|
|
|
PREALIAS(lremovexattr, removexattr);
|
|
|
|
PRE(fremovexattr)
|
|
{
|
|
MAYBE_PRINTF("removexattr ( %d, %p )\n", arg1, arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "listxattr(name)", arg2 );
|
|
}
|
|
|
|
PRE(quotactl)
|
|
{
|
|
MAYBE_PRINTF("quotactl (0x%x, %p, 0x%x, 0x%x )\n",
|
|
arg1,arg2,arg3, arg4);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "quotactl(special)", arg2 );
|
|
}
|
|
|
|
PRE(lookup_dcookie)
|
|
{
|
|
MAYBE_PRINTF("lookup_dcookie (0x%llx, %p, %d)\n",
|
|
arg1 | ((long long) arg2 << 32), arg3, arg4);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "lookup_dcookie(buf)", arg3, arg4);
|
|
}
|
|
|
|
POST(lookup_dcookie)
|
|
{
|
|
if (arg3 != (Addr)NULL)
|
|
VG_TRACK( post_mem_write, arg3, res);
|
|
}
|
|
|
|
PRE(truncate64)
|
|
{
|
|
MAYBE_PRINTF("truncate64 ( %p, %lld )\n",
|
|
arg1, ((ULong)arg2) | (((ULong) arg3) << 32));
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "truncate64(path)", arg1 );
|
|
}
|
|
|
|
PRE(fdatasync)
|
|
{
|
|
/* int fdatasync(int fd); */
|
|
MAYBE_PRINTF("fdatasync ( %d )\n", arg1);
|
|
}
|
|
|
|
PRE(msync)
|
|
{
|
|
/* int msync(const void *start, size_t length, int flags); */
|
|
MAYBE_PRINTF("msync ( %p, %d, %d )\n", arg1,arg2,arg3);
|
|
SYSCALL_TRACK( pre_mem_read, tid, "msync(start)", arg1, arg2 );
|
|
}
|
|
|
|
struct getpmsg_strbuf {
|
|
int maxlen; /* no. of bytes in buffer */
|
|
int len; /* no. of bytes returned */
|
|
caddr_t buf; /* pointer to data */
|
|
};
|
|
|
|
PRE(getpmsg)
|
|
{
|
|
/* LiS getpmsg from http://www.gcom.com/home/linux/lis/ */
|
|
/* int getpmsg(int fd, struct strbuf *ctrl, struct strbuf *data,
|
|
int *bandp, int *flagsp); */
|
|
struct getpmsg_strbuf *ctrl;
|
|
struct getpmsg_strbuf *data;
|
|
MAYBE_PRINTF("getpmsg ( %d, %p, %p, %p, %p )\n",
|
|
arg1,arg2,arg3,arg4,arg5);
|
|
ctrl = (struct getpmsg_strbuf *)arg2;
|
|
data = (struct getpmsg_strbuf *)arg3;
|
|
if (ctrl && ctrl->maxlen > 0)
|
|
SYSCALL_TRACK( pre_mem_write,tid, "getpmsg(ctrl)",
|
|
(UInt)ctrl->buf, ctrl->maxlen);
|
|
if (data && data->maxlen > 0)
|
|
SYSCALL_TRACK( pre_mem_write,tid, "getpmsg(data)",
|
|
(UInt)data->buf, data->maxlen);
|
|
if (arg4)
|
|
SYSCALL_TRACK( pre_mem_write,tid, "getpmsg(bandp)",
|
|
(UInt)arg4, sizeof(int));
|
|
if (arg5)
|
|
SYSCALL_TRACK( pre_mem_write,tid, "getpmsg(flagsp)",
|
|
(UInt)arg5, sizeof(int));
|
|
}
|
|
|
|
POST(getpmsg)
|
|
{
|
|
struct getpmsg_strbuf *ctrl;
|
|
struct getpmsg_strbuf *data;
|
|
|
|
ctrl = (struct getpmsg_strbuf *)arg2;
|
|
data = (struct getpmsg_strbuf *)arg3;
|
|
if (res == 0 && ctrl && ctrl->len > 0) {
|
|
VG_TRACK( post_mem_write, (UInt)ctrl->buf, ctrl->len);
|
|
}
|
|
if (res == 0 && data && data->len > 0) {
|
|
VG_TRACK( post_mem_write, (UInt)data->buf, data->len);
|
|
}
|
|
}
|
|
|
|
PRE(putpmsg)
|
|
{
|
|
/* LiS putpmsg from http://www.gcom.com/home/linux/lis/ */
|
|
/* int putpmsg(int fd, struct strbuf *ctrl, struct strbuf *data,
|
|
int band, int flags); */
|
|
struct strbuf {
|
|
int maxlen; /* no. of bytes in buffer */
|
|
int len; /* no. of bytes returned */
|
|
caddr_t buf; /* pointer to data */
|
|
};
|
|
struct strbuf *ctrl;
|
|
struct strbuf *data;
|
|
MAYBE_PRINTF("putpmsg ( %d, %p, %p, %d, %d )\n",
|
|
arg1,arg2,arg3,arg4,arg5);
|
|
ctrl = (struct strbuf *)arg2;
|
|
data = (struct strbuf *)arg3;
|
|
if (ctrl && ctrl->len > 0)
|
|
SYSCALL_TRACK( pre_mem_read,tid, "putpmsg(ctrl)",
|
|
(UInt)ctrl->buf, ctrl->len);
|
|
if (data && data->len > 0)
|
|
SYSCALL_TRACK( pre_mem_read,tid, "putpmsg(data)",
|
|
(UInt)data->buf, data->len);
|
|
}
|
|
|
|
PRE(getitimer)
|
|
{
|
|
/* int getitimer(int which, struct itimerval *value); */
|
|
MAYBE_PRINTF("getitimer ( %d, %p )\n", arg1, arg2);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getitimer(timer)", arg2,
|
|
sizeof(struct itimerval) );
|
|
}
|
|
|
|
POST(getitimer)
|
|
{
|
|
if (arg2 != (Addr)NULL) {
|
|
VG_TRACK( post_mem_write,arg2, sizeof(struct itimerval));
|
|
}
|
|
}
|
|
|
|
PRE(syslog)
|
|
{
|
|
/* int syslog(int type, char *bufp, int len); */
|
|
MAYBE_PRINTF("syslog (%d, %p, %d)\n",arg1,arg2,arg3);
|
|
switch(arg1) {
|
|
case 2: case 3: case 4:
|
|
SYSCALL_TRACK( pre_mem_write, tid, "syslog(buf)", arg2, arg3);
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
|
|
POST(syslog)
|
|
{
|
|
switch (arg1) {
|
|
case 2: case 3: case 4:
|
|
VG_TRACK( post_mem_write, arg2, arg3 );
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
|
|
PRE(personality)
|
|
{
|
|
/* int personality(unsigned long persona); */
|
|
MAYBE_PRINTF("personality ( %d )\n", arg1);
|
|
}
|
|
|
|
PRE(chroot)
|
|
{
|
|
/* int chroot(const char *path); */
|
|
MAYBE_PRINTF("chroot ( %p )\n", arg1);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "chroot(path)", arg1 );
|
|
}
|
|
|
|
PRE(madvise)
|
|
{
|
|
/* int madvise(void *start, size_t length, int advice ); */
|
|
MAYBE_PRINTF("madvise ( %p, %d, %d )\n", arg1,arg2,arg3);
|
|
}
|
|
|
|
PRE(mremap)
|
|
{
|
|
/* void* mremap(void * old_address, size_t old_size,
|
|
size_t new_size, unsigned long flags); */
|
|
MAYBE_PRINTF("mremap ( %p, %d, %d, 0x%x )\n",
|
|
arg1, arg2, arg3, arg4);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "mremap(old_address)", arg1, arg2 );
|
|
}
|
|
|
|
POST(mremap)
|
|
{
|
|
mremap_segment( arg1, arg2, (Addr)res, arg3 );
|
|
}
|
|
|
|
PRE(nice)
|
|
{
|
|
/* int nice(int inc); */
|
|
MAYBE_PRINTF("nice ( %d )\n", arg1);
|
|
}
|
|
|
|
PRE(setresgid32)
|
|
{
|
|
/* int setresgid(gid_t rgid, gid_t egid, gid_t sgid); */
|
|
MAYBE_PRINTF("setresgid32 ( %d, %d, %d )\n", arg1, arg2, arg3);
|
|
}
|
|
|
|
PRE(setfsuid32)
|
|
{
|
|
/* int setfsuid(uid_t fsuid); */
|
|
MAYBE_PRINTF("setfsuid ( %d )\n", arg1);
|
|
}
|
|
|
|
PRE(_sysctl)
|
|
{
|
|
/* int _sysctl(struct __sysctl_args *args); */
|
|
MAYBE_PRINTF("_sysctl ( %p )\n", arg1 );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "_sysctl(args)", arg1,
|
|
sizeof(struct __sysctl_args) );
|
|
}
|
|
|
|
POST(_sysctl)
|
|
{
|
|
VG_TRACK( post_mem_write, arg1, sizeof(struct __sysctl_args) );
|
|
|
|
}
|
|
|
|
PRE(sched_getscheduler)
|
|
{
|
|
/* int sched_getscheduler(pid_t pid); */
|
|
MAYBE_PRINTF("sched_getscheduler ( %d )\n", arg1);
|
|
}
|
|
|
|
PRE(sched_setscheduler)
|
|
{
|
|
/* int sched_setscheduler(pid_t pid, int policy,
|
|
const struct sched_param *p); */
|
|
MAYBE_PRINTF("sched_setscheduler ( %d, %d, %p )\n",arg1,arg2,arg3);
|
|
if (arg3 != (UInt)NULL)
|
|
SYSCALL_TRACK( pre_mem_read, tid,
|
|
"sched_setscheduler(struct sched_param *p)",
|
|
arg3, sizeof(struct sched_param));
|
|
}
|
|
|
|
PRE(mlock)
|
|
{
|
|
/* int mlock(const void * addr, size_t len) */
|
|
MAYBE_PRINTF("mlock ( %p, %d )\n", arg1, arg2);
|
|
}
|
|
|
|
PRE(munlock)
|
|
{
|
|
/* int munlock(const void * addr, size_t len) */
|
|
MAYBE_PRINTF("munlock ( %p, %d )\n", arg1, arg2);
|
|
}
|
|
|
|
PRE(mlockall)
|
|
{
|
|
/* int mlockall(int flags); */
|
|
MAYBE_PRINTF("mlockall ( %x )\n", arg1);
|
|
}
|
|
|
|
PRE(munlockall)
|
|
{
|
|
/* int munlock(const void * addr, size_t len) */
|
|
MAYBE_PRINTF("munlock ( %p, %d )\n", arg1, arg2);
|
|
}
|
|
|
|
PRE(sched_get_priority_max)
|
|
{
|
|
/* int sched_get_priority_max(int policy); */
|
|
MAYBE_PRINTF("sched_get_priority_max ( %d )\n", arg1);
|
|
}
|
|
|
|
PRE(sched_get_priority_min)
|
|
{
|
|
/* int sched_get_priority_min(int policy); */
|
|
MAYBE_PRINTF("sched_get_priority_min ( %d )\n", arg1);
|
|
}
|
|
|
|
PRE(setpriority)
|
|
{
|
|
/* int setpriority(int which, int who, int prio); */
|
|
MAYBE_PRINTF("setpriority ( %d, %d, %d )\n", arg1, arg2, arg3);
|
|
}
|
|
|
|
PRE(getpriority)
|
|
{
|
|
/* int getpriority(int which, int who); */
|
|
MAYBE_PRINTF("getpriority ( %d, %d )\n", arg1, arg2);
|
|
}
|
|
|
|
PRE(setfsgid)
|
|
{
|
|
/* int setfsgid(gid_t gid); */
|
|
MAYBE_PRINTF("setfsgid ( %d )\n", arg1);
|
|
}
|
|
|
|
PRE(setregid)
|
|
{
|
|
/* int setregid(gid_t rgid, gid_t egid); */
|
|
MAYBE_PRINTF("setregid ( %d, %d )\n", arg1, arg2);
|
|
}
|
|
|
|
PRE(setresuid)
|
|
{
|
|
/* int setresuid(uid_t ruid, uid_t euid, uid_t suid); */
|
|
MAYBE_PRINTF("setresuid ( %d, %d, %d )\n", arg1, arg2, arg3);
|
|
}
|
|
|
|
PRE(setfsuid)
|
|
{
|
|
/* int setfsuid(uid_t uid); */
|
|
MAYBE_PRINTF("setfsuid ( %d )\n", arg1);
|
|
}
|
|
|
|
PRE(sendfile)
|
|
{
|
|
/* ssize_t sendfile(int out_fd, int in_fd, off_t *offset,
|
|
size_t count) */
|
|
MAYBE_PRINTF("sendfile ( %d, %d, %p, %d )\n",arg1,arg2,arg3,arg4);
|
|
if (arg3 != (UInt)NULL)
|
|
SYSCALL_TRACK( pre_mem_write, tid, "sendfile(offset)",
|
|
arg3, sizeof(off_t) );
|
|
}
|
|
|
|
POST(sendfile)
|
|
{
|
|
VG_TRACK( post_mem_write, arg3, sizeof( off_t ) );
|
|
}
|
|
|
|
PRE(sendfile64)
|
|
{
|
|
/* ssize_t sendfile64(int out_df, int in_fd, loff_t *offset,
|
|
size_t count); */
|
|
MAYBE_PRINTF("sendfile64 ( %d, %d, %p, %d )\n",arg1,arg2,arg3,arg4);
|
|
if (arg3 != (UInt)NULL)
|
|
SYSCALL_TRACK( pre_mem_write, tid, "sendfile64(offset)",
|
|
arg3, sizeof(loff_t) );
|
|
}
|
|
|
|
POST(sendfile64)
|
|
{
|
|
if (arg3 != (UInt)NULL ) {
|
|
VG_TRACK( post_mem_write, arg3, sizeof(loff_t) );
|
|
}
|
|
}
|
|
|
|
PRE(pwrite64)
|
|
{
|
|
/* ssize_t pwrite (int fd, const void *buf, size_t nbytes,
|
|
off_t offset); */
|
|
MAYBE_PRINTF("pwrite64 ( %d, %p, %d, %d )\n", arg1, arg2, arg3, arg4);
|
|
SYSCALL_TRACK( pre_mem_read, tid, "pwrite(buf)", arg2, arg3 );
|
|
}
|
|
|
|
PRE(sync)
|
|
{
|
|
/* int sync(); */
|
|
MAYBE_PRINTF("sync ( )\n");
|
|
}
|
|
|
|
PRE(fstatfs)
|
|
{
|
|
/* int fstatfs(int fd, struct statfs *buf); */
|
|
MAYBE_PRINTF("fstatfs ( %d, %p )\n",arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "stat(buf)",
|
|
arg2, sizeof(struct statfs) );
|
|
}
|
|
|
|
POST(fstatfs)
|
|
{
|
|
VG_TRACK( post_mem_write, arg2, sizeof(struct statfs) );
|
|
}
|
|
|
|
PRE(getsid)
|
|
{
|
|
/* pid_t getsid(pid_t pid); */
|
|
MAYBE_PRINTF("getsid ( %d )\n", arg1);
|
|
}
|
|
|
|
PRE(pread64)
|
|
{
|
|
/* ssize_t pread64(int fd, void *buf, size_t count, off_t offset); */
|
|
MAYBE_PRINTF("pread ( %d, %p, %d, %d ) ...\n",arg1,arg2,arg3,arg4);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "pread(buf)", arg2, arg3 );
|
|
}
|
|
|
|
POST(pread64)
|
|
{
|
|
MAYBE_PRINTF("SYSCALL[%d] pread ( %d, %p, %d, %d ) --> %d\n",
|
|
VG_(getpid)(),
|
|
arg1, arg2, arg3, arg4, res);
|
|
if (res > 0) {
|
|
VG_TRACK( post_mem_write, arg2, res );
|
|
}
|
|
}
|
|
|
|
PRE(mknod)
|
|
{
|
|
/* int mknod(const char *pathname, mode_t mode, dev_t dev); */
|
|
MAYBE_PRINTF("mknod ( %p, 0x%x, 0x%x )\n", arg1, arg2, arg3 );
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "mknod(pathname)", arg1 );
|
|
}
|
|
|
|
PRE(flock)
|
|
{
|
|
/* int flock(int fd, int operation); */
|
|
MAYBE_PRINTF("flock ( %d, %d )\n", arg1, arg2 );
|
|
}
|
|
|
|
PRE(init_module)
|
|
{
|
|
/* int init_module(const char *name, struct module *image); */
|
|
MAYBE_PRINTF("init_module ( %p, %p )\n", arg1, arg2 );
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "init_module(name)", arg1 );
|
|
SYSCALL_TRACK( pre_mem_read, tid, "init_module(image)", arg2,
|
|
VKI_SIZEOF_STRUCT_MODULE );
|
|
}
|
|
|
|
PRE(ioperm)
|
|
{
|
|
/* int ioperm(unsigned long from, unsigned long num, int turn_on); */
|
|
MAYBE_PRINTF("ioperm ( %d, %d, %d )\n", arg1, arg2, arg3 );
|
|
}
|
|
|
|
PRE(capget)
|
|
{
|
|
/* int capget(cap_user_header_t header, cap_user_data_t data); */
|
|
MAYBE_PRINTF("capget ( %p, %p )\n", arg1, arg2 );
|
|
SYSCALL_TRACK( pre_mem_read, tid, "capget(header)", arg1,
|
|
sizeof(vki_cap_user_header_t) );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "capget(data)", arg2,
|
|
sizeof( vki_cap_user_data_t) );
|
|
}
|
|
|
|
POST(capget)
|
|
{
|
|
if (arg2 != (Addr)NULL)
|
|
VG_TRACK( post_mem_write, arg2, sizeof( vki_cap_user_data_t) );
|
|
}
|
|
|
|
PRE(capset)
|
|
{
|
|
SYSCALL_TRACK( pre_mem_read, tid, "capset(header)",
|
|
arg1, sizeof(vki_cap_user_header_t) );
|
|
SYSCALL_TRACK( pre_mem_read, tid, "capset(data)",
|
|
arg2, sizeof( vki_cap_user_data_t) );
|
|
}
|
|
|
|
PRE(execve)
|
|
{
|
|
/* int execve (const char *filename,
|
|
char *const argv [],
|
|
char *const envp[]); */
|
|
MAYBE_PRINTF("execve ( %p(%s), %p, %p ) --- NOT CHECKED\n",
|
|
arg1, arg1, arg2, arg3);
|
|
|
|
/* Erk. If the exec fails, then the following will have made a
|
|
mess of things which makes it hard for us to continue. The
|
|
right thing to do is piece everything together again in
|
|
POST(execve), but that's hard work. Instead, we make an effort
|
|
to check that the execve will work before actually calling
|
|
exec. */
|
|
{
|
|
struct vki_stat st;
|
|
Int ret = VG_(stat)((Char *)arg1, &st);
|
|
|
|
if (ret < 0) {
|
|
res = ret;
|
|
return;
|
|
}
|
|
/* just look for any X bit set
|
|
XXX do proper permissions check?
|
|
*/
|
|
if ((st.st_mode & 0111) == 0) {
|
|
res = -VKI_EACCES;
|
|
return;
|
|
}
|
|
}
|
|
|
|
/* Resistance is futile. Nuke all other threads. POSIX mandates
|
|
this. (Really, nuke them all, since the new process will make
|
|
its own new thread.) */
|
|
VG_(nuke_all_threads_except)( VG_INVALID_THREADID );
|
|
|
|
/* Make any binding for LD_PRELOAD disappear, so that child
|
|
processes don't get traced into. */
|
|
if (!VG_(clo_trace_children)) {
|
|
Int i;
|
|
Char** envp = (Char**)arg3;
|
|
Char* ld_preload_str = NULL;
|
|
Char* ld_library_path_str = NULL;
|
|
for (i = 0; envp[i] != NULL; i++) {
|
|
if (VG_(strncmp)(envp[i], "LD_PRELOAD=", 11) == 0)
|
|
ld_preload_str = &envp[i][11];
|
|
if (VG_(strncmp)(envp[i], "LD_LIBRARY_PATH=", 16) == 0)
|
|
ld_library_path_str = &envp[i][16];
|
|
}
|
|
VG_(mash_LD_PRELOAD_and_LD_LIBRARY_PATH)(
|
|
ld_preload_str, ld_library_path_str );
|
|
}
|
|
|
|
res = VG_(do_syscall)(__NR_execve, arg1, arg2, arg3);
|
|
|
|
/* If we got here, then the execve failed. We've already made too much of a mess
|
|
of ourselves to continue, so we have to abort. */
|
|
VG_(message)(Vg_UserMsg, "execve(%p \"%s\", %p, %p) failed, errno %d",
|
|
arg1, arg1, arg2, arg3, -res);
|
|
VG_(core_panic)("EXEC FAILED: I can't recover from execve() failing, so I'm dying.\n"
|
|
"Add more stringent tests in PRE(execve), or work out how to recover.");
|
|
}
|
|
|
|
PRE(access)
|
|
{
|
|
/* int access(const char *pathname, int mode); */
|
|
MAYBE_PRINTF("access ( %p, %d )\n", arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "access(pathname)", arg1 );
|
|
}
|
|
|
|
PRE(alarm)
|
|
{
|
|
/* unsigned int alarm(unsigned int seconds); */
|
|
MAYBE_PRINTF("alarm ( %d )\n", arg1);
|
|
}
|
|
|
|
PRE(brk)
|
|
{
|
|
/* libc says: int brk(void *end_data_segment);
|
|
kernel says: void* brk(void* end_data_segment); (more or less)
|
|
|
|
libc returns 0 on success, and -1 (and sets errno) on failure.
|
|
Nb: if you ask to shrink the dataseg end below what it
|
|
currently is, that always succeeds, even if the dataseg end
|
|
doesn't actually change (eg. brk(0)). Unless it seg faults.
|
|
|
|
Kernel returns the new dataseg end. If the brk() failed, this
|
|
will be unchanged from the old one. That's why calling (kernel)
|
|
brk(0) gives the current dataseg end (libc brk() just returns
|
|
zero in that case).
|
|
|
|
Both will seg fault if you shrink it back into a text segment.
|
|
*/
|
|
MAYBE_PRINTF("brk ( %p ) --> ",arg1);
|
|
}
|
|
|
|
POST(brk)
|
|
{
|
|
MAYBE_PRINTF("0x%x\n", res);
|
|
|
|
if (res == arg1) {
|
|
/* brk() succeeded */
|
|
if (res < curr_dataseg_end) {
|
|
/* successfully shrunk the data segment. */
|
|
VG_TRACK( die_mem_brk, (Addr)arg1,
|
|
curr_dataseg_end-arg1 );
|
|
} else
|
|
if (res > curr_dataseg_end && res != 0) {
|
|
/* successfully grew the data segment */
|
|
VG_TRACK( new_mem_brk, curr_dataseg_end,
|
|
arg1-curr_dataseg_end );
|
|
}
|
|
curr_dataseg_end = res;
|
|
} else {
|
|
/* brk() failed */
|
|
vg_assert(curr_dataseg_end == res);
|
|
}
|
|
}
|
|
|
|
PRE(chdir)
|
|
{
|
|
/* int chdir(const char *path); */
|
|
MAYBE_PRINTF("chdir ( %p )\n", arg1);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "chdir(path)", arg1 );
|
|
}
|
|
|
|
PRE(chmod)
|
|
{
|
|
/* int chmod(const char *path, mode_t mode); */
|
|
MAYBE_PRINTF("chmod ( %p, %d )\n", arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "chmod(path)", arg1 );
|
|
}
|
|
|
|
PRE(chown)
|
|
{
|
|
/* int chown(const char *path, uid_t owner, gid_t group); */
|
|
MAYBE_PRINTF("chown ( %p, 0x%x, 0x%x )\n", arg1,arg2,arg3);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "chown(path)", arg1 );
|
|
}
|
|
|
|
PREALIAS(chown32, chown);
|
|
PREALIAS(lchown32, chown);
|
|
|
|
PRE(close)
|
|
{
|
|
/* int close(int fd); */
|
|
MAYBE_PRINTF("close ( %d )\n",arg1);
|
|
/* Detect and negate attempts by the client to close Valgrind's
|
|
logfile fd ... */
|
|
if (!fd_allowed(arg1, "close", tid))
|
|
res = -VKI_EBADF;
|
|
}
|
|
|
|
|
|
PRE(dup)
|
|
{
|
|
/* int dup(int oldfd); */
|
|
MAYBE_PRINTF("dup ( %d ) --> ", arg1);
|
|
}
|
|
|
|
POST(dup)
|
|
{
|
|
MAYBE_PRINTF("%d\n", res);
|
|
if (!fd_allowed(res, "dup", tid)) {
|
|
VG_(close)(res);
|
|
res = -VKI_EMFILE;
|
|
}
|
|
}
|
|
|
|
PRE(dup2)
|
|
{
|
|
/* int dup2(int oldfd, int newfd); */
|
|
MAYBE_PRINTF("dup2 ( %d, %d ) ...\n", arg1,arg2);
|
|
if (!fd_allowed(arg2, "dup2", tid))
|
|
res = -VKI_EBADF;
|
|
}
|
|
|
|
POST(dup2)
|
|
{
|
|
MAYBE_PRINTF("SYSCALL[%d] dup2 ( %d, %d ) = %d\n",
|
|
VG_(getpid)(),
|
|
arg1, arg2, res);
|
|
}
|
|
|
|
PRE(fcntl)
|
|
{
|
|
/* int fcntl(int fd, int cmd, int arg); */
|
|
MAYBE_PRINTF("fcntl ( %d, %d, %d )\n",arg1,arg2,arg3);
|
|
}
|
|
|
|
PRE(fchdir)
|
|
{
|
|
/* int fchdir(int fd); */
|
|
MAYBE_PRINTF("fchdir ( %d )\n", arg1);
|
|
}
|
|
|
|
PRE(fchown)
|
|
{
|
|
/* int fchown(int filedes, uid_t owner, gid_t group); */
|
|
MAYBE_PRINTF("fchown ( %d, %d, %d )\n", arg1,arg2,arg3);
|
|
}
|
|
|
|
PREALIAS(fchown32, fchown);
|
|
|
|
PRE(fchmod)
|
|
{
|
|
/* int fchmod(int fildes, mode_t mode); */
|
|
MAYBE_PRINTF("fchmod ( %d, %d )\n", arg1,arg2);
|
|
}
|
|
|
|
PRE(fcntl64)
|
|
{
|
|
/* I don't know what the prototype for this is supposed to be. */
|
|
/* ??? int fcntl(int fd, int cmd); */
|
|
MAYBE_PRINTF("fcntl64 (?!) ( %d, %d )\n", arg1,arg2);
|
|
}
|
|
|
|
PRE(fstat)
|
|
{
|
|
/* int fstat(int filedes, struct stat *buf); */
|
|
MAYBE_PRINTF("fstat ( %d, %p )\n",arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "fstat", arg2, sizeof(struct stat) );
|
|
}
|
|
|
|
POST(fstat)
|
|
{
|
|
VG_TRACK( post_mem_write, arg2, sizeof(struct stat) );
|
|
}
|
|
|
|
static vki_ksigset_t fork_saved_mask;
|
|
|
|
PRE(fork)
|
|
{
|
|
vki_ksigset_t mask;
|
|
|
|
vg_assert(VG_(gettid)() == VG_(main_pid));
|
|
|
|
/* Block all signals during fork, so that we can fix things up in
|
|
the child without being interrupted. */
|
|
VG_(ksigfillset)(&mask);
|
|
VG_(ksigprocmask)(VKI_SIG_SETMASK, &mask, &fork_saved_mask);
|
|
|
|
/* pid_t fork(void); */
|
|
MAYBE_PRINTF("fork ()\n");
|
|
|
|
do_atfork_pre(tid);
|
|
}
|
|
|
|
POST(fork)
|
|
{
|
|
if (res == 0) {
|
|
do_atfork_child(tid);
|
|
|
|
/* I am the child. Nuke all other threads which I might
|
|
have inherited from my parent. POSIX mandates this. */
|
|
VG_(nuke_all_threads_except)( tid );
|
|
|
|
/* XXX TODO: tid 1 is special, and is presumed to be present.
|
|
We should move this TID to 1 in the child. */
|
|
|
|
/* restore signal mask */
|
|
VG_(ksigprocmask)(VKI_SIG_SETMASK, &fork_saved_mask, NULL);
|
|
} else {
|
|
MAYBE_PRINTF(" fork: process %d created child %d\n", VG_(main_pid), res);
|
|
|
|
do_atfork_parent(tid);
|
|
|
|
/* restore signal mask */
|
|
VG_(ksigprocmask)(VKI_SIG_SETMASK, &fork_saved_mask, NULL);
|
|
}
|
|
}
|
|
|
|
PRE(fsync)
|
|
{
|
|
/* int fsync(int fd); */
|
|
MAYBE_PRINTF("fsync ( %d )\n", arg1);
|
|
}
|
|
|
|
PRE(ftruncate)
|
|
{
|
|
/* int ftruncate(int fd, size_t length); */
|
|
MAYBE_PRINTF("ftruncate ( %d, %d )\n", arg1,arg2);
|
|
}
|
|
|
|
PRE(ftruncate64)
|
|
{
|
|
/* int ftruncate64(int fd, off64_t length); */
|
|
MAYBE_PRINTF("ftruncate64 ( %d, %lld )\n",
|
|
arg1,arg2|((long long) arg3 << 32));
|
|
}
|
|
|
|
PRE(getdents)
|
|
{
|
|
/* int getdents(unsigned int fd, struct dirent *dirp,
|
|
unsigned int count); */
|
|
MAYBE_PRINTF("getdents ( %d, %p, %d )\n",arg1,arg2,arg3);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getdents(dirp)", arg2, arg3 );
|
|
}
|
|
|
|
POST(getdents)
|
|
{
|
|
if (res > 0)
|
|
VG_TRACK( post_mem_write, arg2, res );
|
|
}
|
|
|
|
PRE(getdents64)
|
|
{
|
|
/* int getdents(unsigned int fd, struct dirent64 *dirp,
|
|
unsigned int count); */
|
|
MAYBE_PRINTF("getdents64 ( %d, %p, %d )\n",arg1,arg2,arg3);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getdents64(dirp)", arg2, arg3 );
|
|
}
|
|
|
|
POST(getdents64)
|
|
{
|
|
if (res > 0)
|
|
VG_TRACK( post_mem_write, arg2, res );
|
|
}
|
|
|
|
PRE(getgroups)
|
|
{
|
|
/* int getgroups(int size, gid_t list[]); */
|
|
MAYBE_PRINTF("getgroups ( %d, %p )\n", arg1, arg2);
|
|
if (arg1 > 0)
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getgroups(list)", arg2,
|
|
arg1 * sizeof(gid_t) );
|
|
}
|
|
|
|
POST(getgroups)
|
|
{
|
|
if (arg1 > 0 && res > 0)
|
|
VG_TRACK( post_mem_write, arg2, res * sizeof(gid_t) );
|
|
}
|
|
|
|
PREALIAS(getgroups32, getgroups);
|
|
POSTALIAS(getgroups32, getgroups);
|
|
|
|
PRE(getcwd)
|
|
{
|
|
/* char *getcwd(char *buf, size_t size); (but see comment below) */
|
|
MAYBE_PRINTF("getcwd ( %p, %d )\n",arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getcwd(buf)", arg1, arg2 );
|
|
}
|
|
|
|
POST(getcwd)
|
|
{
|
|
if (res != (Addr)NULL)
|
|
VG_TRACK( post_mem_write, arg1, res );
|
|
}
|
|
|
|
PRE(geteuid)
|
|
{
|
|
/* uid_t geteuid(void); */
|
|
MAYBE_PRINTF("geteuid ( )\n");
|
|
}
|
|
|
|
PRE(geteuid32)
|
|
{
|
|
/* ?? uid_t geteuid32(void); */
|
|
MAYBE_PRINTF("geteuid32(?) ( )\n");
|
|
}
|
|
|
|
PRE(getegid)
|
|
{
|
|
/* gid_t getegid(void); */
|
|
MAYBE_PRINTF("getegid ()\n");
|
|
}
|
|
|
|
PRE(getegid32)
|
|
{
|
|
/* gid_t getegid32(void); */
|
|
MAYBE_PRINTF("getegid32 ()\n");
|
|
}
|
|
|
|
PRE(getgid)
|
|
{
|
|
/* gid_t getgid(void); */
|
|
MAYBE_PRINTF("getgid ()\n");
|
|
}
|
|
|
|
PRE(getgid32)
|
|
{
|
|
/* gid_t getgid32(void); */
|
|
MAYBE_PRINTF("getgid32 ()\n");
|
|
}
|
|
|
|
PRE(getpid)
|
|
{
|
|
/* pid_t getpid(void); */
|
|
MAYBE_PRINTF("getpid ()\n");
|
|
}
|
|
|
|
PRE(getpgid)
|
|
{
|
|
/* pid_t getpgid(pid_t pid); */
|
|
MAYBE_PRINTF("getpgid ( %d )\n", arg1);
|
|
}
|
|
|
|
PRE(getpgrp)
|
|
{
|
|
/* pid_t getpgrp(void); */
|
|
MAYBE_PRINTF("getpgrp ()\n");
|
|
}
|
|
|
|
PRE(getppid)
|
|
{
|
|
/* pid_t getppid(void); */
|
|
MAYBE_PRINTF("getppid ()\n");
|
|
}
|
|
|
|
PRE(getresgid)
|
|
{
|
|
/* int getresgid(gid_t *rgid, gid_t *egid, gid_t *sgid); */
|
|
MAYBE_PRINTF("getresgid ( %p, %p, %p )\n", arg1,arg2,arg3);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getresgid(rgid)",
|
|
arg1, sizeof(gid_t) );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getresgid(egid)",
|
|
arg2, sizeof(gid_t) );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getresgid(sgid)",
|
|
arg3, sizeof(gid_t) );
|
|
}
|
|
|
|
POST(getresgid)
|
|
{
|
|
if (res == 0) {
|
|
VG_TRACK( post_mem_write, arg1, sizeof(gid_t) );
|
|
VG_TRACK( post_mem_write, arg2, sizeof(gid_t) );
|
|
VG_TRACK( post_mem_write, arg3, sizeof(gid_t) );
|
|
}
|
|
}
|
|
|
|
PRE(getresgid32)
|
|
{
|
|
/* int getresgid(gid_t *rgid, gid_t *egid, gid_t *sgid); */
|
|
MAYBE_PRINTF("getresgid32 ( %p, %p, %p )\n", arg1,arg2,arg3);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getresgid32(rgid)",
|
|
arg1, sizeof(gid_t) );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getresgid32(egid)",
|
|
arg2, sizeof(gid_t) );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getresgid32(sgid)",
|
|
arg3, sizeof(gid_t) );
|
|
}
|
|
|
|
POST(getresgid32)
|
|
{
|
|
if (res == 0) {
|
|
VG_TRACK( post_mem_write, arg1, sizeof(gid_t) );
|
|
VG_TRACK( post_mem_write, arg2, sizeof(gid_t) );
|
|
VG_TRACK( post_mem_write, arg3, sizeof(gid_t) );
|
|
}
|
|
}
|
|
|
|
PRE(getresuid)
|
|
{
|
|
/* int getresuid(uid_t *ruid, uid_t *euid, uid_t *suid); */
|
|
MAYBE_PRINTF("getresuid ( %p, %p, %p )\n", arg1,arg2,arg3);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getresuid(ruid)",
|
|
arg1, sizeof(uid_t) );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getresuid(euid)",
|
|
arg2, sizeof(uid_t) );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getresuid(suid)",
|
|
arg3, sizeof(uid_t) );
|
|
}
|
|
|
|
POST(getresuid)
|
|
{
|
|
if (res == 0) {
|
|
VG_TRACK( post_mem_write, arg1, sizeof(uid_t) );
|
|
VG_TRACK( post_mem_write, arg2, sizeof(uid_t) );
|
|
VG_TRACK( post_mem_write, arg3, sizeof(uid_t) );
|
|
}
|
|
}
|
|
|
|
PRE(getresuid32)
|
|
{
|
|
/* int getresuid(uid_t *ruid, uid_t *euid, uid_t *suid); */
|
|
MAYBE_PRINTF("getresuid32 ( %p, %p, %p )\n", arg1,arg2,arg3);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getresuid32(ruid)",
|
|
arg1, sizeof(uid_t) );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getresuid32(euid)",
|
|
arg2, sizeof(uid_t) );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getresuid32(suid)",
|
|
arg3, sizeof(uid_t) );
|
|
}
|
|
|
|
POST(getresuid32)
|
|
{
|
|
if (res == 0) {
|
|
VG_TRACK( post_mem_write, arg1, sizeof(uid_t) );
|
|
VG_TRACK( post_mem_write, arg2, sizeof(uid_t) );
|
|
VG_TRACK( post_mem_write, arg3, sizeof(uid_t) );
|
|
}
|
|
}
|
|
|
|
PRE(getrlimit)
|
|
{
|
|
/* int getrlimit (int resource, struct rlimit *rlim); */
|
|
MAYBE_PRINTF("getrlimit ( %d, %p )\n", arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getrlimit(rlim)", arg2,
|
|
sizeof(struct rlimit) );
|
|
}
|
|
|
|
POST(getrlimit)
|
|
{
|
|
if (res == 0)
|
|
VG_TRACK( post_mem_write, arg2, sizeof(struct rlimit) );
|
|
}
|
|
|
|
PREALIAS(ugetrlimit, getrlimit);
|
|
POSTALIAS(ugetrlimit, getrlimit);
|
|
|
|
PRE(getrusage)
|
|
{
|
|
/* int getrusage (int who, struct rusage *usage); */
|
|
MAYBE_PRINTF("getrusage ( %d, %p )\n", arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "getrusage(usage)", arg2,
|
|
sizeof(struct rusage) );
|
|
}
|
|
|
|
POST(getrusage)
|
|
{
|
|
if (res == 0)
|
|
VG_TRACK( post_mem_write,arg2, sizeof(struct rusage) );
|
|
}
|
|
|
|
PRE(gettimeofday)
|
|
{
|
|
/* int gettimeofday(struct timeval *tv, struct timezone *tz); */
|
|
MAYBE_PRINTF("gettimeofday ( %p, %p )\n",arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "gettimeofday(tv)", arg1,
|
|
sizeof(struct timeval) );
|
|
if (arg2 != 0)
|
|
SYSCALL_TRACK( pre_mem_write, tid, "gettimeofday(tz)", arg2,
|
|
sizeof(struct timezone) );
|
|
}
|
|
|
|
POST(gettimeofday)
|
|
{
|
|
if (res == 0) {
|
|
VG_TRACK( post_mem_write, arg1, sizeof(struct timeval) );
|
|
if (arg2 != 0)
|
|
VG_TRACK( post_mem_write, arg2, sizeof(struct timezone) );
|
|
}
|
|
}
|
|
|
|
PRE(getuid)
|
|
{
|
|
/* uid_t getuid(void); */
|
|
MAYBE_PRINTF("getuid ( )\n");
|
|
}
|
|
|
|
PRE(getuid32)
|
|
{
|
|
/* ???uid_t getuid32(void); */
|
|
MAYBE_PRINTF("getuid32 ( )\n");
|
|
}
|
|
|
|
PRE(ipc)
|
|
{
|
|
MAYBE_PRINTF("ipc ( %d, %d, %d, %d, %p, %d )\n",
|
|
arg1,arg2,arg3,arg4,arg5,arg6);
|
|
switch (arg1 /* call */) {
|
|
case 1: /* IPCOP_semop */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "semop(sops)", arg5,
|
|
arg3 * sizeof(struct sembuf) );
|
|
break;
|
|
case 2: /* IPCOP_semget */
|
|
case 3: /* IPCOP_semctl */
|
|
break;
|
|
case 11: /* IPCOP_msgsnd */
|
|
{
|
|
struct msgbuf *msgp = (struct msgbuf *)arg5;
|
|
Int msgsz = arg3;
|
|
|
|
SYSCALL_TRACK( pre_mem_read, tid, "msgsnd(msgp->mtype)",
|
|
(UInt)&msgp->mtype, sizeof(msgp->mtype) );
|
|
SYSCALL_TRACK( pre_mem_read, tid, "msgsnd(msgp->mtext)",
|
|
(UInt)msgp->mtext, msgsz );
|
|
break;
|
|
}
|
|
case 12: /* IPCOP_msgrcv */
|
|
{
|
|
struct msgbuf *msgp;
|
|
Int msgsz = arg3;
|
|
|
|
msgp = (struct msgbuf *)deref_Addr( tid,
|
|
(Addr) (&((struct ipc_kludge *)arg5)->msgp),
|
|
"msgrcv(msgp)" );
|
|
|
|
SYSCALL_TRACK( pre_mem_write, tid, "msgrcv(msgp->mtype)",
|
|
(UInt)&msgp->mtype, sizeof(msgp->mtype) );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "msgrcv(msgp->mtext)",
|
|
(UInt)msgp->mtext, msgsz );
|
|
break;
|
|
}
|
|
case 13: /* IPCOP_msgget */
|
|
break;
|
|
case 14: /* IPCOP_msgctl */
|
|
{
|
|
switch (arg3 /* cmd */) {
|
|
case IPC_STAT:
|
|
SYSCALL_TRACK( pre_mem_write, tid, "msgctl(buf)", arg5,
|
|
sizeof(struct msqid_ds) );
|
|
break;
|
|
case IPC_SET:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "msgctl(buf)", arg5,
|
|
sizeof(struct msqid_ds) );
|
|
break;
|
|
# if defined(IPC_64)
|
|
case IPC_STAT|IPC_64:
|
|
SYSCALL_TRACK( pre_mem_write, tid, "msgctl(buf)", arg5,
|
|
sizeof(struct msqid64_ds) );
|
|
break;
|
|
# endif
|
|
# if defined(IPC_64)
|
|
case IPC_SET|IPC_64:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "msgctl(buf)", arg5,
|
|
sizeof(struct msqid64_ds) );
|
|
break;
|
|
# endif
|
|
default:
|
|
break;
|
|
}
|
|
break;
|
|
}
|
|
case 21: /* IPCOP_shmat */
|
|
{
|
|
break;
|
|
}
|
|
case 22: /* IPCOP_shmdt */
|
|
break;
|
|
case 23: /* IPCOP_shmget */
|
|
break;
|
|
case 24: /* IPCOP_shmctl */
|
|
/* Subject: shmctl: The True Story
|
|
Date: Thu, 9 May 2002 18:07:23 +0100 (BST)
|
|
From: Reuben Thomas <rrt@mupsych.org>
|
|
To: Julian Seward <jseward@acm.org>
|
|
|
|
1. As you suggested, the syscall subop is in arg1.
|
|
|
|
2. There are a couple more twists, so the arg order
|
|
is actually:
|
|
|
|
arg1 syscall subop
|
|
arg2 file desc
|
|
arg3 shm operation code (can have IPC_64 set)
|
|
arg4 0 ??? is arg3-arg4 a 64-bit quantity when IPC_64
|
|
is defined?
|
|
arg5 pointer to buffer
|
|
|
|
3. With this in mind, I've amended the case as below:
|
|
*/
|
|
{
|
|
UInt cmd = arg3;
|
|
Bool out_arg = False;
|
|
if ( arg5 ) {
|
|
# if defined(IPC_64)
|
|
cmd = cmd & (~IPC_64);
|
|
# endif
|
|
out_arg = cmd == SHM_STAT || cmd == IPC_STAT;
|
|
if ( out_arg )
|
|
SYSCALL_TRACK( pre_mem_write, tid,
|
|
"shmctl(SHM_STAT or IPC_STAT,buf)",
|
|
arg5, sizeof(struct shmid_ds) );
|
|
else
|
|
SYSCALL_TRACK( pre_mem_read, tid,
|
|
"shmctl(SHM_XXXX,buf)",
|
|
arg5, sizeof(struct shmid_ds) );
|
|
}
|
|
}
|
|
break;
|
|
default:
|
|
VG_(message)(Vg_DebugMsg,
|
|
"FATAL: unhandled syscall(ipc) %d",
|
|
arg1 );
|
|
VG_(core_panic)("... bye!\n");
|
|
break; /*NOTREACHED*/
|
|
}
|
|
}
|
|
|
|
POST(ipc)
|
|
{
|
|
switch (arg1 /* call */) {
|
|
case 1: /* IPCOP_semop */
|
|
break;
|
|
case 2: /* IPCOP_semget */
|
|
case 3: /* IPCOP_semctl */
|
|
break;
|
|
case 11: /* IPCOP_msgsnd */
|
|
break;
|
|
case 12: /* IPCOP_msgrcv */
|
|
{
|
|
struct msgbuf *msgp;
|
|
|
|
msgp = (struct msgbuf *)deref_Addr( tid,
|
|
(Addr) (&((struct ipc_kludge *)arg5)->msgp),
|
|
"msgrcv(msgp)" );
|
|
if ( res > 0 ) {
|
|
VG_TRACK( post_mem_write, (UInt)&msgp->mtype,
|
|
sizeof(msgp->mtype) );
|
|
VG_TRACK( post_mem_write, (UInt)msgp->mtext, res );
|
|
}
|
|
break;
|
|
}
|
|
case 13: /* IPCOP_msgget */
|
|
break;
|
|
case 14: /* IPCOP_msgctl */
|
|
{
|
|
switch (arg3 /* cmd */) {
|
|
case IPC_STAT:
|
|
if ( res > 0 ) {
|
|
VG_TRACK( post_mem_write, arg5,
|
|
sizeof(struct msqid_ds) );
|
|
}
|
|
break;
|
|
case IPC_SET:
|
|
break;
|
|
# if defined(IPC_64)
|
|
case IPC_STAT|IPC_64:
|
|
if ( res > 0 ) {
|
|
VG_TRACK( post_mem_write, arg5,
|
|
sizeof(struct msqid64_ds) );
|
|
}
|
|
break;
|
|
# endif
|
|
# if defined(IPC_64)
|
|
case IPC_SET|IPC_64:
|
|
break;
|
|
# endif
|
|
default:
|
|
break;
|
|
}
|
|
break;
|
|
}
|
|
case 21: /* IPCOP_shmat */
|
|
{
|
|
Int shmid = arg2;
|
|
/*Int shmflag = arg3;*/
|
|
Addr addr;
|
|
|
|
|
|
/* force readability. before the syscall it is
|
|
* indeed uninitialized, as can be seen in
|
|
* glibc/sysdeps/unix/sysv/linux/shmat.c */
|
|
VG_TRACK( post_mem_write, arg4, sizeof( ULong ) );
|
|
|
|
addr = deref_Addr ( tid, arg4, "shmat(addr)" );
|
|
if ( addr > 0 ) {
|
|
UInt segmentSize = get_shm_size ( shmid );
|
|
if ( segmentSize > 0 ) {
|
|
/* we don't distinguish whether it's read-only or
|
|
* read-write -- it doesn't matter really. */
|
|
VG_TRACK( new_mem_mmap, addr, segmentSize,
|
|
True, True, False );
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
case 22: /* IPCOP_shmdt */
|
|
/* ### FIXME: this should call make_noaccess on the
|
|
* area passed to shmdt. But there's no way to
|
|
* figure out the size of the shared memory segment
|
|
* just from the address... Maybe we want to keep a
|
|
* copy of the exiting mappings inside valgrind? */
|
|
break;
|
|
case 23: /* IPCOP_shmget */
|
|
break;
|
|
case 24: /* IPCOP_shmctl */
|
|
/* Subject: shmctl: The True Story
|
|
Date: Thu, 9 May 2002 18:07:23 +0100 (BST)
|
|
From: Reuben Thomas <rrt@mupsych.org>
|
|
To: Julian Seward <jseward@acm.org>
|
|
|
|
1. As you suggested, the syscall subop is in arg1.
|
|
|
|
2. There are a couple more twists, so the arg order
|
|
is actually:
|
|
|
|
arg1 syscall subop
|
|
arg2 file desc
|
|
arg3 shm operation code (can have IPC_64 set)
|
|
arg4 0 ??? is arg3-arg4 a 64-bit quantity when IPC_64
|
|
is defined?
|
|
arg5 pointer to buffer
|
|
|
|
3. With this in mind, I've amended the case as below:
|
|
*/
|
|
{
|
|
UInt cmd = arg3;
|
|
Bool out_arg = False;
|
|
if ( arg5 ) {
|
|
# if defined(IPC_64)
|
|
cmd = cmd & (~IPC_64);
|
|
# endif
|
|
out_arg = cmd == SHM_STAT || cmd == IPC_STAT;
|
|
}
|
|
if ( arg5 && res == 0 && out_arg )
|
|
VG_TRACK( post_mem_write, arg5,
|
|
sizeof(struct shmid_ds) );
|
|
}
|
|
break;
|
|
default:
|
|
VG_(message)(Vg_DebugMsg,
|
|
"FATAL: unhandled syscall(ipc) %d",
|
|
arg1 );
|
|
VG_(core_panic)("... bye!\n");
|
|
break; /*NOTREACHED*/
|
|
}
|
|
}
|
|
|
|
PRE(ioctl)
|
|
{
|
|
/* int ioctl(int d, int request, ...)
|
|
[The "third" argument is traditionally char *argp,
|
|
and will be so named for this discussion.]
|
|
*/
|
|
/*
|
|
VG_(message)(
|
|
Vg_DebugMsg,
|
|
"is an IOCTL, request = 0x%x, d = %d, argp = 0x%x",
|
|
arg2,arg1,arg3);
|
|
*/
|
|
MAYBE_PRINTF("ioctl ( %d, 0x%x, %p )\n",arg1,arg2,arg3);
|
|
switch (arg2 /* request */) {
|
|
case TCSETS:
|
|
case TCSETSW:
|
|
case TCSETSF:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(TCSET{S,SW,SF})", arg3,
|
|
VKI_SIZEOF_STRUCT_TERMIOS );
|
|
break;
|
|
case TCGETS:
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(TCGETS)", arg3,
|
|
VKI_SIZEOF_STRUCT_TERMIOS );
|
|
break;
|
|
case TCSETA:
|
|
case TCSETAW:
|
|
case TCSETAF:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(TCSET{A,AW,AF})", arg3,
|
|
VKI_SIZEOF_STRUCT_TERMIO );
|
|
break;
|
|
case TCGETA:
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(TCGETA)", arg3,
|
|
VKI_SIZEOF_STRUCT_TERMIO );
|
|
break;
|
|
case TCSBRK:
|
|
case TCXONC:
|
|
case TCSBRKP:
|
|
case TCFLSH:
|
|
/* These just take an int by value */
|
|
break;
|
|
case TIOCGWINSZ:
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(TIOCGWINSZ)", arg3,
|
|
sizeof(struct winsize) );
|
|
break;
|
|
case TIOCSWINSZ:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(TIOCSWINSZ)", arg3,
|
|
sizeof(struct winsize) );
|
|
break;
|
|
case TIOCLINUX:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(TIOCLINUX)", arg3,
|
|
sizeof(char *) );
|
|
if (*(char *)arg3 == 11) {
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(TIOCLINUX, 11)",
|
|
arg3, 2 * sizeof(char *) );
|
|
}
|
|
break;
|
|
case TIOCGPGRP:
|
|
/* Get process group ID for foreground processing group. */
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(TIOCGPGRP)", arg3,
|
|
sizeof(pid_t) );
|
|
break;
|
|
case TIOCSPGRP:
|
|
/* Set a process group ID? */
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(TIOCGPGRP)", arg3,
|
|
sizeof(pid_t) );
|
|
break;
|
|
case TIOCGPTN: /* Get Pty Number (of pty-mux device) */
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(TIOCGPTN)",
|
|
arg3, sizeof(int) );
|
|
break;
|
|
case TIOCSCTTY:
|
|
/* Just takes an int value. */
|
|
break;
|
|
case TIOCSPTLCK: /* Lock/unlock Pty */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(TIOCSPTLCK)",
|
|
arg3, sizeof(int) );
|
|
break;
|
|
case FIONBIO:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(FIONBIO)",
|
|
arg3, sizeof(int) );
|
|
break;
|
|
case FIOASYNC:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(FIOASYNC)",
|
|
arg3, sizeof(int) );
|
|
break;
|
|
case FIONREAD: /* identical to SIOCINQ */
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(FIONREAD)",
|
|
arg3, sizeof(int) );
|
|
break;
|
|
|
|
/* If you get compilation problems here, change the #if
|
|
1 to #if 0 and get rid of <scsi/sg.h> in
|
|
vg_unsafe.h. */
|
|
# if 1
|
|
case SG_SET_COMMAND_Q:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(SG_SET_COMMAND_Q)",
|
|
arg3, sizeof(int) );
|
|
break;
|
|
# if defined(SG_IO)
|
|
case SG_IO:
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(SG_IO)", arg3,
|
|
sizeof(struct sg_io_hdr) );
|
|
break;
|
|
# endif /* SG_IO */
|
|
case SG_GET_SCSI_ID:
|
|
/* Note: sometimes sg_scsi_id is called sg_scsi_id_t */
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(SG_GET_SCSI_ID)", arg3,
|
|
sizeof(struct sg_scsi_id) );
|
|
break;
|
|
case SG_SET_RESERVED_SIZE:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(SG_SET_RESERVED_SIZE)",
|
|
arg3, sizeof(int) );
|
|
break;
|
|
case SG_SET_TIMEOUT:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(SG_SET_TIMEOUT)", arg3,
|
|
sizeof(int) );
|
|
break;
|
|
case SG_GET_RESERVED_SIZE:
|
|
SYSCALL_TRACK( pre_mem_write, tid,
|
|
"ioctl(SG_GET_RESERVED_SIZE)", arg3,
|
|
sizeof(int) );
|
|
break;
|
|
case SG_GET_TIMEOUT:
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(SG_GET_TIMEOUT)", arg3,
|
|
sizeof(int) );
|
|
break;
|
|
case SG_GET_VERSION_NUM:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(SG_GET_VERSION_NUM)",
|
|
arg3, sizeof(int) );
|
|
break;
|
|
# endif
|
|
|
|
case IIOCGETCPS:
|
|
/* In early 2.4 kernels, ISDN_MAX_CHANNELS was only defined
|
|
* when KERNEL was. I never saw a larger value than 64 though */
|
|
# ifndef ISDN_MAX_CHANNELS
|
|
# define ISDN_MAX_CHANNELS 64
|
|
# endif
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(IIOCGETCPS)", arg3,
|
|
ISDN_MAX_CHANNELS
|
|
* 2 * sizeof(unsigned long) );
|
|
break;
|
|
case IIOCNETGPN:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(IIOCNETGPN)",
|
|
(UInt)&((isdn_net_ioctl_phone *)arg3)->name,
|
|
sizeof(((isdn_net_ioctl_phone *)arg3)->name) );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "ioctl(IIOCNETGPN)", arg3,
|
|
sizeof(isdn_net_ioctl_phone) );
|
|
break;
|
|
|
|
/* These all use struct ifreq AFAIK */
|
|
case SIOCGIFINDEX:
|
|
case SIOCGIFFLAGS: /* get flags */
|
|
case SIOCGIFHWADDR: /* Get hardware address */
|
|
case SIOCGIFMTU: /* get MTU size */
|
|
case SIOCGIFADDR: /* get PA address */
|
|
case SIOCGIFNETMASK: /* get network PA mask */
|
|
case SIOCGIFMETRIC: /* get metric */
|
|
case SIOCGIFMAP: /* Get device parameters */
|
|
case SIOCGIFTXQLEN: /* Get the tx queue length */
|
|
case SIOCGIFDSTADDR: /* get remote PA address */
|
|
case SIOCGIFBRDADDR: /* get broadcast PA address */
|
|
case SIOCGIFNAME: /* get iface name */
|
|
SYSCALL_TRACK( pre_mem_write,tid, "ioctl(SIOCGIFINDEX)", arg3,
|
|
sizeof(struct ifreq));
|
|
break;
|
|
case SIOCGIFCONF: /* get iface list */
|
|
/* WAS:
|
|
SYSCALL_TRACK( pre_mem_write,"ioctl(SIOCGIFCONF)", arg3,
|
|
sizeof(struct ifconf));
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(struct ifconf));
|
|
*/
|
|
SYSCALL_TRACK( pre_mem_read,tid, "ioctl(SIOCGIFCONF)", arg3,
|
|
sizeof(struct ifconf));
|
|
if ( arg3 ) {
|
|
// TODO len must be readable and writable
|
|
// buf pointer only needs to be readable
|
|
struct ifconf *ifc = (struct ifconf *) arg3;
|
|
SYSCALL_TRACK( pre_mem_write,tid, "ioctl(SIOCGIFCONF).ifc_buf",
|
|
(Addr)(ifc->ifc_buf), (UInt)(ifc->ifc_len) );
|
|
}
|
|
break;
|
|
case SIOCGSTAMP:
|
|
SYSCALL_TRACK( pre_mem_write,tid, "ioctl(SIOCGSTAMP)", arg3,
|
|
sizeof(struct timeval));
|
|
break;
|
|
/* SIOCOUTQ is an ioctl that, when called on a socket, returns
|
|
the number of bytes currently in that socket's send buffer.
|
|
It writes this value as an int to the memory location
|
|
indicated by the third argument of ioctl(2). */
|
|
case SIOCOUTQ:
|
|
SYSCALL_TRACK( pre_mem_write,tid, "ioctl(SIOCOUTQ)", arg3,
|
|
sizeof(int));
|
|
break;
|
|
case SIOCGRARP: /* get RARP table entry */
|
|
case SIOCGARP: /* get ARP table entry */
|
|
SYSCALL_TRACK( pre_mem_write,tid, "ioctl(SIOCGARP)", arg3,
|
|
sizeof(struct arpreq));
|
|
break;
|
|
|
|
case SIOCSIFFLAGS: /* set flags */
|
|
case SIOCSIFMAP: /* Set device parameters */
|
|
case SIOCSIFTXQLEN: /* Set the tx queue length */
|
|
case SIOCSIFDSTADDR: /* set remote PA address */
|
|
case SIOCSIFBRDADDR: /* set broadcast PA address */
|
|
case SIOCSIFNETMASK: /* set network PA mask */
|
|
case SIOCSIFMETRIC: /* set metric */
|
|
case SIOCSIFADDR: /* set PA address */
|
|
case SIOCSIFMTU: /* set MTU size */
|
|
case SIOCSIFHWADDR: /* set hardware address */
|
|
SYSCALL_TRACK( pre_mem_read,tid,"ioctl(SIOCSIFFLAGS)", arg3,
|
|
sizeof(struct ifreq));
|
|
break;
|
|
/* Routing table calls. */
|
|
case SIOCADDRT: /* add routing table entry */
|
|
case SIOCDELRT: /* delete routing table entry */
|
|
SYSCALL_TRACK( pre_mem_read,tid,"ioctl(SIOCADDRT/DELRT)", arg3,
|
|
sizeof(struct rtentry));
|
|
break;
|
|
|
|
/* RARP cache control calls. */
|
|
case SIOCDRARP: /* delete RARP table entry */
|
|
case SIOCSRARP: /* set RARP table entry */
|
|
/* ARP cache control calls. */
|
|
case SIOCSARP: /* set ARP table entry */
|
|
case SIOCDARP: /* delete ARP table entry */
|
|
SYSCALL_TRACK( pre_mem_read,tid, "ioctl(SIOCSIFFLAGS)", arg3,
|
|
sizeof(struct ifreq));
|
|
break;
|
|
|
|
case SIOCSPGRP:
|
|
SYSCALL_TRACK( pre_mem_read, tid, "ioctl(SIOCSPGRP)", arg3,
|
|
sizeof(int) );
|
|
break;
|
|
|
|
/* linux/soundcard interface (OSS) */
|
|
case SNDCTL_SEQ_GETOUTCOUNT:
|
|
case SNDCTL_SEQ_GETINCOUNT:
|
|
case SNDCTL_SEQ_PERCMODE:
|
|
case SNDCTL_SEQ_TESTMIDI:
|
|
case SNDCTL_SEQ_RESETSAMPLES:
|
|
case SNDCTL_SEQ_NRSYNTHS:
|
|
case SNDCTL_SEQ_NRMIDIS:
|
|
case SNDCTL_SEQ_GETTIME:
|
|
case SNDCTL_DSP_GETFMTS:
|
|
case SNDCTL_DSP_GETTRIGGER:
|
|
case SNDCTL_DSP_GETODELAY:
|
|
# if defined(SNDCTL_DSP_GETSPDIF)
|
|
case SNDCTL_DSP_GETSPDIF:
|
|
# endif
|
|
case SNDCTL_DSP_GETCAPS:
|
|
case SOUND_PCM_READ_RATE:
|
|
case SOUND_PCM_READ_CHANNELS:
|
|
case SOUND_PCM_READ_BITS:
|
|
case (SOUND_PCM_READ_BITS|0x40000000): /* what the fuck ? */
|
|
case SOUND_PCM_READ_FILTER:
|
|
SYSCALL_TRACK( pre_mem_write,tid,
|
|
"ioctl(SNDCTL_XXX|SOUND_XXX (SIOR, int))",
|
|
arg3,
|
|
sizeof(int));
|
|
break;
|
|
case SNDCTL_SEQ_CTRLRATE:
|
|
case SNDCTL_DSP_SPEED:
|
|
case SNDCTL_DSP_STEREO:
|
|
case SNDCTL_DSP_GETBLKSIZE:
|
|
case SNDCTL_DSP_CHANNELS:
|
|
case SOUND_PCM_WRITE_FILTER:
|
|
case SNDCTL_DSP_SUBDIVIDE:
|
|
case SNDCTL_DSP_SETFRAGMENT:
|
|
# if defined(SNDCTL_DSP_GETCHANNELMASK)
|
|
case SNDCTL_DSP_GETCHANNELMASK:
|
|
# endif
|
|
# if defined(SNDCTL_DSP_BIND_CHANNEL)
|
|
case SNDCTL_DSP_BIND_CHANNEL:
|
|
# endif
|
|
case SNDCTL_TMR_TIMEBASE:
|
|
case SNDCTL_TMR_TEMPO:
|
|
case SNDCTL_TMR_SOURCE:
|
|
case SNDCTL_MIDI_PRETIME:
|
|
case SNDCTL_MIDI_MPUMODE:
|
|
SYSCALL_TRACK( pre_mem_read,tid, "ioctl(SNDCTL_XXX|SOUND_XXX "
|
|
"(SIOWR, int))",
|
|
arg3, sizeof(int));
|
|
SYSCALL_TRACK( pre_mem_write,tid, "ioctl(SNDCTL_XXX|SOUND_XXX "
|
|
"(SIOWR, int))",
|
|
arg3, sizeof(int));
|
|
break;
|
|
case SNDCTL_DSP_GETOSPACE:
|
|
case SNDCTL_DSP_GETISPACE:
|
|
SYSCALL_TRACK( pre_mem_write,tid,
|
|
"ioctl(SNDCTL_XXX|SOUND_XXX "
|
|
"(SIOR, audio_buf_info))", arg3,
|
|
sizeof(audio_buf_info));
|
|
break;
|
|
case SNDCTL_DSP_SETTRIGGER:
|
|
SYSCALL_TRACK( pre_mem_read,tid,
|
|
"ioctl(SNDCTL_XXX|SOUND_XXX (SIOW, int))",
|
|
arg3, sizeof(int));
|
|
break;
|
|
|
|
case SNDCTL_DSP_POST:
|
|
case SNDCTL_DSP_RESET:
|
|
case SNDCTL_DSP_SYNC:
|
|
case SNDCTL_DSP_SETSYNCRO:
|
|
case SNDCTL_DSP_SETDUPLEX:
|
|
break;
|
|
|
|
/* Real Time Clock (/dev/rtc) ioctls */
|
|
# ifndef GLIBC_2_1
|
|
case RTC_UIE_ON:
|
|
case RTC_UIE_OFF:
|
|
case RTC_AIE_ON:
|
|
case RTC_AIE_OFF:
|
|
case RTC_PIE_ON:
|
|
case RTC_PIE_OFF:
|
|
case RTC_IRQP_SET:
|
|
break;
|
|
case RTC_RD_TIME:
|
|
case RTC_ALM_READ:
|
|
SYSCALL_TRACK( pre_mem_write,tid, "ioctl(RTC_RD_TIME/ALM_READ)",
|
|
arg3, sizeof(struct rtc_time));
|
|
break;
|
|
case RTC_ALM_SET:
|
|
SYSCALL_TRACK( pre_mem_read,tid, "ioctl(RTC_ALM_SET)", arg3,
|
|
sizeof(struct rtc_time));
|
|
break;
|
|
case RTC_IRQP_READ:
|
|
SYSCALL_TRACK( pre_mem_write,tid, "ioctl(RTC_IRQP_READ)", arg3,
|
|
sizeof(unsigned long));
|
|
break;
|
|
# endif /* GLIBC_2_1 */
|
|
|
|
# ifdef BLKGETSIZE
|
|
case BLKGETSIZE:
|
|
SYSCALL_TRACK( pre_mem_write,tid, "ioctl(BLKGETSIZE)", arg3,
|
|
sizeof(unsigned long));
|
|
break;
|
|
# endif /* BLKGETSIZE */
|
|
|
|
/* CD ROM stuff (??) */
|
|
case CDROMSUBCHNL:
|
|
SYSCALL_TRACK( pre_mem_read,tid,
|
|
"ioctl(CDROMSUBCHNL (cdsc_format, char))",
|
|
(int) &(((struct cdrom_subchnl *) arg3)->cdsc_format),
|
|
sizeof(((struct cdrom_subchnl *) arg3)->cdsc_format));
|
|
SYSCALL_TRACK( pre_mem_write,tid,
|
|
"ioctl(CDROMSUBCHNL)", arg3,
|
|
sizeof(struct cdrom_subchnl));
|
|
break;
|
|
case CDROMREADTOCHDR:
|
|
SYSCALL_TRACK( pre_mem_write,tid,
|
|
"ioctl(CDROMREADTOCHDR)", arg3,
|
|
sizeof(struct cdrom_tochdr));
|
|
break;
|
|
case CDROMREADTOCENTRY:
|
|
SYSCALL_TRACK( pre_mem_read,tid,
|
|
"ioctl(CDROMREADTOCENTRY (cdte_format, char))",
|
|
(int) &(((struct cdrom_tocentry *) arg3)->cdte_format),
|
|
sizeof(((struct cdrom_tocentry *) arg3)->cdte_format));
|
|
SYSCALL_TRACK( pre_mem_read,tid,
|
|
"ioctl(CDROMREADTOCENTRY (cdte_track, char))",
|
|
(int) &(((struct cdrom_tocentry *) arg3)->cdte_track),
|
|
sizeof(((struct cdrom_tocentry *) arg3)->cdte_track));
|
|
SYSCALL_TRACK( pre_mem_write,tid,
|
|
"ioctl(CDROMREADTOCENTRY)", arg3,
|
|
sizeof(struct cdrom_tocentry));
|
|
break;
|
|
case CDROMPLAYMSF:
|
|
SYSCALL_TRACK( pre_mem_read,tid, "ioctl(CDROMPLAYMSF)", arg3,
|
|
sizeof(struct cdrom_msf));
|
|
break;
|
|
/* The following two are probably bogus (should check args
|
|
for readability). JRS 20021117 */
|
|
case CDROM_DRIVE_STATUS: /* 0x5326 */
|
|
case CDROM_CLEAR_OPTIONS: /* 0x5321 */
|
|
break;
|
|
|
|
/* We don't have any specific information on it, so
|
|
try to do something reasonable based on direction and
|
|
size bits. The encoding scheme is described in
|
|
/usr/include/asm/ioctl.h.
|
|
|
|
According to Simon Hausmann, _IOC_READ means the kernel
|
|
writes a value to the ioctl value passed from the user
|
|
space and the other way around with _IOC_WRITE. */
|
|
default: {
|
|
UInt dir = _IOC_DIR(arg2);
|
|
UInt size = _IOC_SIZE(arg2);
|
|
if (VG_(strstr)(VG_(clo_weird_hacks), "lax-ioctls") != NULL) {
|
|
/*
|
|
* Be very lax about ioctl handling; the only
|
|
* assumption is that the size is correct. Doesn't
|
|
* require the full buffer to be initialized when
|
|
* writing. Without this, using some device
|
|
* drivers with a large number of strange ioctl
|
|
* commands becomes very tiresome.
|
|
*/
|
|
} else if (/* size == 0 || */ dir == _IOC_NONE) {
|
|
static Int moans = 3;
|
|
if (moans > 0) {
|
|
moans--;
|
|
VG_(message)(Vg_UserMsg,
|
|
"Warning: noted but unhandled ioctl 0x%x"
|
|
" with no size/direction hints",
|
|
arg2);
|
|
VG_(message)(Vg_UserMsg,
|
|
" This could cause spurious value errors"
|
|
" to appear.");
|
|
VG_(message)(Vg_UserMsg,
|
|
" See README_MISSING_SYSCALL_OR_IOCTL for "
|
|
"guidance on writing a proper wrapper." );
|
|
}
|
|
} else {
|
|
if ((dir & _IOC_WRITE) && size > 0)
|
|
SYSCALL_TRACK( pre_mem_read,tid, "ioctl(generic)",
|
|
arg3, size);
|
|
if ((dir & _IOC_READ) && size > 0)
|
|
SYSCALL_TRACK( pre_mem_write,tid, "ioctl(generic)",
|
|
arg3, size);
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
POST(ioctl)
|
|
{
|
|
/* int ioctl(int d, int request, ...)
|
|
[The "third" argument is traditionally char *argp,
|
|
and will be so named for this discussion.]
|
|
*/
|
|
/*
|
|
VG_(message)(
|
|
Vg_DebugMsg,
|
|
"is an IOCTL, request = 0x%x, d = %d, argp = 0x%x",
|
|
arg2,arg1,arg3);
|
|
*/
|
|
MAYBE_PRINTF("ioctl ( %d, 0x%x, %p )\n",arg1,arg2,arg3);
|
|
switch (arg2 /* request */) {
|
|
case TCSETS:
|
|
case TCSETSW:
|
|
case TCSETSF:
|
|
break;
|
|
case TCGETS:
|
|
if (res == 0)
|
|
VG_TRACK( post_mem_write, arg3, VKI_SIZEOF_STRUCT_TERMIOS );
|
|
break;
|
|
case TCSETA:
|
|
case TCSETAW:
|
|
case TCSETAF:
|
|
break;
|
|
case TCGETA:
|
|
if (res == 0)
|
|
VG_TRACK( post_mem_write, arg3, VKI_SIZEOF_STRUCT_TERMIO );
|
|
break;
|
|
case TCSBRK:
|
|
case TCXONC:
|
|
case TCSBRKP:
|
|
case TCFLSH:
|
|
break;
|
|
case TIOCGWINSZ:
|
|
if (res == 0)
|
|
VG_TRACK( post_mem_write, arg3, sizeof(struct winsize) );
|
|
break;
|
|
case TIOCSWINSZ:
|
|
break;
|
|
case TIOCLINUX:
|
|
if (res == 0)
|
|
VG_TRACK( post_mem_write, arg3, sizeof(char *) );
|
|
break;
|
|
case TIOCGPGRP:
|
|
/* Get process group ID for foreground processing group. */
|
|
if (res == 0)
|
|
VG_TRACK( post_mem_write, arg3, sizeof(pid_t) );
|
|
break;
|
|
case TIOCSPGRP:
|
|
/* Set a process group ID? */
|
|
if (res == 0)
|
|
VG_TRACK( post_mem_write, arg3, sizeof(pid_t) );
|
|
break;
|
|
case TIOCGPTN: /* Get Pty Number (of pty-mux device) */
|
|
if (res == 0)
|
|
VG_TRACK( post_mem_write, arg3, sizeof(int));
|
|
break;
|
|
case TIOCSCTTY:
|
|
break;
|
|
case TIOCSPTLCK: /* Lock/unlock Pty */
|
|
break;
|
|
case FIONBIO:
|
|
break;
|
|
case FIOASYNC:
|
|
break;
|
|
case FIONREAD: /* identical to SIOCINQ */
|
|
if (res == 0)
|
|
VG_TRACK( post_mem_write, arg3, sizeof(int) );
|
|
break;
|
|
|
|
/* If you get compilation problems here, change the #if
|
|
1 to #if 0 and get rid of <scsi/sg.h> in
|
|
vg_unsafe.h. */
|
|
# if 1
|
|
case SG_SET_COMMAND_Q:
|
|
break;
|
|
# if defined(SG_IO)
|
|
case SG_IO:
|
|
if (res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(struct sg_io_hdr));
|
|
break;
|
|
# endif /* SG_IO */
|
|
case SG_GET_SCSI_ID:
|
|
if (res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(struct sg_scsi_id));
|
|
break;
|
|
case SG_SET_RESERVED_SIZE:
|
|
break;
|
|
case SG_SET_TIMEOUT:
|
|
break;
|
|
case SG_GET_RESERVED_SIZE:
|
|
if (res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(int));
|
|
break;
|
|
case SG_GET_TIMEOUT:
|
|
if (res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(int));
|
|
break;
|
|
case SG_GET_VERSION_NUM:
|
|
break;
|
|
# endif
|
|
|
|
case IIOCGETCPS:
|
|
/* In early 2.4 kernels, ISDN_MAX_CHANNELS was only defined
|
|
* when KERNEL was. I never saw a larger value than 64 though */
|
|
# ifndef ISDN_MAX_CHANNELS
|
|
# define ISDN_MAX_CHANNELS 64
|
|
# endif
|
|
if (res == 0)
|
|
VG_TRACK( post_mem_write, arg3, ISDN_MAX_CHANNELS
|
|
* 2 * sizeof(unsigned long) );
|
|
break;
|
|
case IIOCNETGPN:
|
|
if (res == 0)
|
|
VG_TRACK( post_mem_write, arg3, sizeof(isdn_net_ioctl_phone) );
|
|
break;
|
|
|
|
/* These all use struct ifreq AFAIK */
|
|
case SIOCGIFINDEX:
|
|
case SIOCGIFFLAGS: /* get flags */
|
|
case SIOCGIFHWADDR: /* Get hardware address */
|
|
case SIOCGIFMTU: /* get MTU size */
|
|
case SIOCGIFADDR: /* get PA address */
|
|
case SIOCGIFNETMASK: /* get network PA mask */
|
|
case SIOCGIFMETRIC: /* get metric */
|
|
case SIOCGIFMAP: /* Get device parameters */
|
|
case SIOCGIFTXQLEN: /* Get the tx queue length */
|
|
case SIOCGIFDSTADDR: /* get remote PA address */
|
|
case SIOCGIFBRDADDR: /* get broadcast PA address */
|
|
case SIOCGIFNAME: /* get iface name */
|
|
if (res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(struct ifreq));
|
|
break;
|
|
case SIOCGIFCONF: /* get iface list */
|
|
/* WAS:
|
|
SYSCALL_TRACK( pre_mem_write,"ioctl(SIOCGIFCONF)", arg3,
|
|
sizeof(struct ifconf));
|
|
KERNEL_DO_SYSCALL(tid,res);
|
|
if (!VG_(is_kerror)(res) && res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(struct ifconf));
|
|
*/
|
|
if (res == 0 && arg3 ) {
|
|
struct ifconf *ifc = (struct ifconf *) arg3;
|
|
if (ifc->ifc_buf != NULL)
|
|
VG_TRACK( post_mem_write, (Addr)(ifc->ifc_buf),
|
|
(UInt)(ifc->ifc_len) );
|
|
}
|
|
break;
|
|
case SIOCGSTAMP:
|
|
if (res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(struct timeval));
|
|
break;
|
|
/* SIOCOUTQ is an ioctl that, when called on a socket, returns
|
|
the number of bytes currently in that socket's send buffer.
|
|
It writes this value as an int to the memory location
|
|
indicated by the third argument of ioctl(2). */
|
|
case SIOCOUTQ:
|
|
if (res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(int));
|
|
break;
|
|
case SIOCGRARP: /* get RARP table entry */
|
|
case SIOCGARP: /* get ARP table entry */
|
|
if (res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(struct arpreq));
|
|
break;
|
|
|
|
case SIOCSIFFLAGS: /* set flags */
|
|
case SIOCSIFMAP: /* Set device parameters */
|
|
case SIOCSIFTXQLEN: /* Set the tx queue length */
|
|
case SIOCSIFDSTADDR: /* set remote PA address */
|
|
case SIOCSIFBRDADDR: /* set broadcast PA address */
|
|
case SIOCSIFNETMASK: /* set network PA mask */
|
|
case SIOCSIFMETRIC: /* set metric */
|
|
case SIOCSIFADDR: /* set PA address */
|
|
case SIOCSIFMTU: /* set MTU size */
|
|
case SIOCSIFHWADDR: /* set hardware address */
|
|
break;
|
|
/* Routing table calls. */
|
|
case SIOCADDRT: /* add routing table entry */
|
|
case SIOCDELRT: /* delete routing table entry */
|
|
break;
|
|
|
|
/* RARP cache control calls. */
|
|
case SIOCDRARP: /* delete RARP table entry */
|
|
case SIOCSRARP: /* set RARP table entry */
|
|
/* ARP cache control calls. */
|
|
case SIOCSARP: /* set ARP table entry */
|
|
case SIOCDARP: /* delete ARP table entry */
|
|
break;
|
|
|
|
case SIOCSPGRP:
|
|
break;
|
|
|
|
/* linux/soundcard interface (OSS) */
|
|
case SNDCTL_SEQ_GETOUTCOUNT:
|
|
case SNDCTL_SEQ_GETINCOUNT:
|
|
case SNDCTL_SEQ_PERCMODE:
|
|
case SNDCTL_SEQ_TESTMIDI:
|
|
case SNDCTL_SEQ_RESETSAMPLES:
|
|
case SNDCTL_SEQ_NRSYNTHS:
|
|
case SNDCTL_SEQ_NRMIDIS:
|
|
case SNDCTL_SEQ_GETTIME:
|
|
case SNDCTL_DSP_GETFMTS:
|
|
case SNDCTL_DSP_GETTRIGGER:
|
|
case SNDCTL_DSP_GETODELAY:
|
|
# if defined(SNDCTL_DSP_GETSPDIF)
|
|
case SNDCTL_DSP_GETSPDIF:
|
|
# endif
|
|
case SNDCTL_DSP_GETCAPS:
|
|
case SOUND_PCM_READ_RATE:
|
|
case SOUND_PCM_READ_CHANNELS:
|
|
case SOUND_PCM_READ_BITS:
|
|
case (SOUND_PCM_READ_BITS|0x40000000): /* what the fuck ? */
|
|
case SOUND_PCM_READ_FILTER:
|
|
if (res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(int));
|
|
break;
|
|
case SNDCTL_SEQ_CTRLRATE:
|
|
case SNDCTL_DSP_SPEED:
|
|
case SNDCTL_DSP_STEREO:
|
|
case SNDCTL_DSP_GETBLKSIZE:
|
|
case SNDCTL_DSP_CHANNELS:
|
|
case SOUND_PCM_WRITE_FILTER:
|
|
case SNDCTL_DSP_SUBDIVIDE:
|
|
case SNDCTL_DSP_SETFRAGMENT:
|
|
# if defined(SNDCTL_DSP_GETCHANNELMASK)
|
|
case SNDCTL_DSP_GETCHANNELMASK:
|
|
# endif
|
|
# if defined(SNDCTL_DSP_BIND_CHANNEL)
|
|
case SNDCTL_DSP_BIND_CHANNEL:
|
|
# endif
|
|
case SNDCTL_TMR_TIMEBASE:
|
|
case SNDCTL_TMR_TEMPO:
|
|
case SNDCTL_TMR_SOURCE:
|
|
case SNDCTL_MIDI_PRETIME:
|
|
case SNDCTL_MIDI_MPUMODE:
|
|
break;
|
|
case SNDCTL_DSP_GETOSPACE:
|
|
case SNDCTL_DSP_GETISPACE:
|
|
if (res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(audio_buf_info));
|
|
break;
|
|
case SNDCTL_DSP_SETTRIGGER:
|
|
break;
|
|
|
|
case SNDCTL_DSP_POST:
|
|
case SNDCTL_DSP_RESET:
|
|
case SNDCTL_DSP_SYNC:
|
|
case SNDCTL_DSP_SETSYNCRO:
|
|
case SNDCTL_DSP_SETDUPLEX:
|
|
break;
|
|
|
|
/* Real Time Clock (/dev/rtc) ioctls */
|
|
# ifndef GLIBC_2_1
|
|
case RTC_UIE_ON:
|
|
case RTC_UIE_OFF:
|
|
case RTC_AIE_ON:
|
|
case RTC_AIE_OFF:
|
|
case RTC_PIE_ON:
|
|
case RTC_PIE_OFF:
|
|
case RTC_IRQP_SET:
|
|
break;
|
|
case RTC_RD_TIME:
|
|
case RTC_ALM_READ:
|
|
if (res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(struct rtc_time));
|
|
break;
|
|
case RTC_ALM_SET:
|
|
break;
|
|
case RTC_IRQP_READ:
|
|
if(res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(unsigned long));
|
|
break;
|
|
# endif /* GLIBC_2_1 */
|
|
|
|
# ifdef BLKGETSIZE
|
|
case BLKGETSIZE:
|
|
if (res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(unsigned long));
|
|
break;
|
|
# endif /* BLKGETSIZE */
|
|
|
|
/* CD ROM stuff (??) */
|
|
case CDROMSUBCHNL:
|
|
if (res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(struct cdrom_subchnl));
|
|
break;
|
|
case CDROMREADTOCHDR:
|
|
if (res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(struct cdrom_tochdr));
|
|
break;
|
|
case CDROMREADTOCENTRY:
|
|
if (res == 0)
|
|
VG_TRACK( post_mem_write,arg3, sizeof(struct cdrom_tochdr));
|
|
break;
|
|
case CDROMPLAYMSF:
|
|
break;
|
|
/* The following two are probably bogus (should check args
|
|
for readability). JRS 20021117 */
|
|
case CDROM_DRIVE_STATUS: /* 0x5326 */
|
|
case CDROM_CLEAR_OPTIONS: /* 0x5321 */
|
|
break;
|
|
|
|
/* We don't have any specific information on it, so
|
|
try to do something reasonable based on direction and
|
|
size bits. The encoding scheme is described in
|
|
/usr/include/asm/ioctl.h.
|
|
|
|
According to Simon Hausmann, _IOC_READ means the kernel
|
|
writes a value to the ioctl value passed from the user
|
|
space and the other way around with _IOC_WRITE. */
|
|
default: {
|
|
UInt dir = _IOC_DIR(arg2);
|
|
UInt size = _IOC_SIZE(arg2);
|
|
if (size > 0 && (dir & _IOC_READ)
|
|
&& res == 0
|
|
&& arg3 != (Addr)NULL)
|
|
VG_TRACK( post_mem_write,arg3, size);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
PRE(kill)
|
|
{
|
|
/* int kill(pid_t pid, int sig); */
|
|
MAYBE_PRINTF("kill ( %d, %d )\n", arg1,arg2);
|
|
if (arg2 == VKI_SIGVGINT || arg2 == VKI_SIGVGKILL)
|
|
res = -VKI_EINVAL;
|
|
}
|
|
|
|
POST(kill)
|
|
{
|
|
/* If this was a self-kill then wait for a signal to be
|
|
delivered to any thread before claiming the kill is done. */
|
|
if (res >= 0 && /* if it was successful */
|
|
arg2 != 0 && /* if a real signal */
|
|
!VG_(is_sig_ign)(arg2) && /* that isn't ignored and */
|
|
!VG_(ksigismember)(&tst->eff_sig_mask, arg2) && /* we're not blocking it */
|
|
(arg1 == VG_(getpid)() || /* directed at us or */
|
|
arg1 == -1 || /* directed at everyone or */
|
|
arg1 == 0 || /* directed at whole group or */
|
|
-arg1 == VG_(getpgrp)())) { /* directed at our group... */
|
|
/* ...then wait for that signal to be delivered to someone
|
|
(might be us, might be someone else who doesn't have it
|
|
blocked) */
|
|
VG_(proxy_waitsig)();
|
|
}
|
|
}
|
|
|
|
PRE(link)
|
|
{
|
|
/* int link(const char *oldpath, const char *newpath); */
|
|
MAYBE_PRINTF("link ( %p, %p)\n", arg1, arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "link(oldpath)", arg1);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "link(newpath)", arg2);
|
|
}
|
|
|
|
PRE(lseek)
|
|
{
|
|
/* off_t lseek(int fildes, off_t offset, int whence); */
|
|
MAYBE_PRINTF("lseek ( %d, %d, %d )\n",arg1,arg2,arg3);
|
|
}
|
|
|
|
PRE(_llseek)
|
|
{
|
|
/* int _llseek(unsigned int fd, unsigned long offset_high,
|
|
unsigned long offset_low,
|
|
loff_t * result, unsigned int whence); */
|
|
MAYBE_PRINTF("llseek ( %d, 0x%x, 0x%x, %p, %d )\n",
|
|
arg1,arg2,arg3,arg4,arg5);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "llseek(result)", arg4,
|
|
sizeof(loff_t));
|
|
}
|
|
|
|
POST(_llseek)
|
|
{
|
|
if (res == 0)
|
|
VG_TRACK( post_mem_write, arg4, sizeof(loff_t) );
|
|
}
|
|
|
|
PRE(lstat)
|
|
{
|
|
/* int lstat(const char *file_name, struct stat *buf); */
|
|
MAYBE_PRINTF("lstat ( %p, %p )\n",arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "lstat(file_name)", arg1 );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "lstat(buf)", arg2,
|
|
sizeof(struct stat) );
|
|
}
|
|
|
|
POST(lstat)
|
|
{
|
|
if (res == 0) {
|
|
VG_TRACK( post_mem_write, arg2, sizeof(struct stat) );
|
|
}
|
|
}
|
|
|
|
PRE(lstat64)
|
|
{
|
|
/* int lstat64(const char *file_name, struct stat64 *buf); */
|
|
MAYBE_PRINTF("lstat64 ( %p, %p )\n",arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "lstat64(file_name)", arg1 );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "lstat64(buf)", arg2,
|
|
sizeof(struct stat64) );
|
|
}
|
|
|
|
POST(lstat64)
|
|
{
|
|
if (res == 0) {
|
|
VG_TRACK( post_mem_write, arg2, sizeof(struct stat64) );
|
|
}
|
|
}
|
|
|
|
PRE(mkdir)
|
|
{
|
|
/* int mkdir(const char *pathname, mode_t mode); */
|
|
MAYBE_PRINTF("mkdir ( %p, %d )\n", arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "mkdir(pathname)", arg1 );
|
|
}
|
|
|
|
PRE(mmap2)
|
|
{
|
|
/* My impression is that this is exactly like __NR_mmap
|
|
except that all 6 args are passed in regs, rather than in
|
|
a memory-block. */
|
|
/* void* mmap(void *start, size_t length, int prot,
|
|
int flags, int fd, off_t offset);
|
|
*/
|
|
MAYBE_PRINTF("mmap2 ( %p, %d, %d, %d, %d, %d )\n",
|
|
arg1, arg2, arg3, arg4, arg5, arg6 );
|
|
}
|
|
|
|
POST(mmap2)
|
|
{
|
|
mmap_segment( (Addr)res, arg2, arg3, arg5 );
|
|
}
|
|
|
|
PRE(mmap)
|
|
{
|
|
/* void* mmap(void *start, size_t length, int prot,
|
|
int flags, int fd, off_t offset);
|
|
*/
|
|
|
|
UInt* arg_block = (UInt*)arg1;
|
|
UInt a1, a2, a3, a4, a5, a6;
|
|
|
|
SYSCALL_TRACK( pre_mem_read, tid, "mmap(args)", arg1, 6*sizeof(UInt) );
|
|
|
|
a1 = arg_block[0];
|
|
a2 = arg_block[1];
|
|
a3 = arg_block[2];
|
|
a4 = arg_block[3];
|
|
a5 = arg_block[4];
|
|
a6 = arg_block[5];
|
|
MAYBE_PRINTF("mmap ( %p, %d, %d, %d, %d, %d )\n",
|
|
a1, a2, a3, a4, a5, a6 );
|
|
}
|
|
|
|
POST(mmap)
|
|
{
|
|
UInt* arg_block = (UInt*)arg1;
|
|
UInt a2, a3, a5;
|
|
|
|
a2 = arg_block[1];
|
|
a3 = arg_block[2];
|
|
a5 = arg_block[4];
|
|
|
|
mmap_segment( (Addr)res, a2, a3, a5 );
|
|
}
|
|
|
|
PRE(mprotect)
|
|
{
|
|
/* int mprotect(const void *addr, size_t len, int prot); */
|
|
/* should addr .. addr+len-1 be checked before the call? */
|
|
MAYBE_PRINTF("mprotect ( %p, %d, %d )\n", arg1,arg2,arg3);
|
|
}
|
|
|
|
POST(mprotect)
|
|
{
|
|
mprotect_segment( arg1, arg2, arg3 );
|
|
}
|
|
|
|
PRE(munmap)
|
|
{
|
|
/* int munmap(void *start, size_t length); */
|
|
/* should start .. start+length-1 be checked before the call? */
|
|
MAYBE_PRINTF("munmap ( %p, %d )\n", arg1,arg2);
|
|
}
|
|
|
|
POST(munmap)
|
|
{
|
|
munmap_segment( arg1, arg2 );
|
|
}
|
|
|
|
PRE(nanosleep)
|
|
{
|
|
/* int nanosleep(const struct timespec *req, struct timespec *rem); */
|
|
MAYBE_PRINTF("nanosleep ( %p, %p )\n", arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read, tid, "nanosleep(req)", arg1,
|
|
sizeof(struct timespec) );
|
|
if (arg2 != (UInt)NULL)
|
|
SYSCALL_TRACK( pre_mem_write, tid, "nanosleep(rem)", arg2,
|
|
sizeof(struct timespec) );
|
|
}
|
|
|
|
POST(nanosleep)
|
|
{
|
|
/* Somewhat bogus ... is only written by the kernel if
|
|
res == -1 && errno == EINTR. */
|
|
if (arg2 != (UInt)NULL)
|
|
VG_TRACK( post_mem_write, arg2, sizeof(struct timespec) );
|
|
}
|
|
|
|
PRE(_newselect)
|
|
{
|
|
/* int select(int n,
|
|
fd_set *readfds, fd_set *writefds, fd_set *exceptfds,
|
|
struct timeval *timeout);
|
|
*/
|
|
MAYBE_PRINTF("newselect ( %d, %p, %p, %p, %p )\n",
|
|
arg1,arg2,arg3,arg4,arg5);
|
|
if (arg2 != 0)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "newselect(readfds)",
|
|
arg2, arg1/8 /* __FD_SETSIZE/8 */ );
|
|
if (arg3 != 0)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "newselect(writefds)",
|
|
arg3, arg1/8 /* __FD_SETSIZE/8 */ );
|
|
if (arg4 != 0)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "newselect(exceptfds)",
|
|
arg4, arg1/8 /* __FD_SETSIZE/8 */ );
|
|
if (arg5 != 0)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "newselect(timeout)", arg5,
|
|
sizeof(struct timeval) );
|
|
}
|
|
|
|
PRE(open)
|
|
{
|
|
/* int open(const char *pathname, int flags); */
|
|
MAYBE_PRINTF("open ( %p(%s), %d ) --> ",arg1,arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "open(pathname)", arg1 );
|
|
}
|
|
|
|
POST(open)
|
|
{
|
|
if (!fd_allowed(res, "open", tid)) {
|
|
VG_(close)(res);
|
|
res = -VKI_EMFILE;
|
|
}
|
|
MAYBE_PRINTF("%d\n",res);
|
|
}
|
|
|
|
PRE(read)
|
|
{
|
|
/* size_t read(int fd, void *buf, size_t count); */
|
|
MAYBE_PRINTF("read ( %d, %p, %d )\n", arg1, arg2, arg3);
|
|
|
|
if (!fd_allowed(arg1, "read", tid))
|
|
res = -VKI_EBADF;
|
|
}
|
|
|
|
POST(read)
|
|
{
|
|
if (res > 0)
|
|
VG_TRACK(post_mem_write, arg2, res);
|
|
}
|
|
|
|
PRE(write)
|
|
{
|
|
/* size_t write(int fd, const void *buf, size_t count); */
|
|
MAYBE_PRINTF("write ( %d, %p, %d )\n", arg1, arg2, arg3);
|
|
if (!fd_allowed(arg1, "write", tid))
|
|
res = -VKI_EBADF;
|
|
else
|
|
SYSCALL_TRACK( pre_mem_read, tid, "write(buf)", arg2, arg3 );
|
|
}
|
|
|
|
PRE(creat)
|
|
{
|
|
/* int creat(const char *pathname, mode_t mode); */
|
|
MAYBE_PRINTF("creat ( %p(%s), %d ) --> ",arg1,arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "creat(pathname)", arg1 );
|
|
}
|
|
|
|
POST(creat)
|
|
{
|
|
if (!fd_allowed(res, "creat", tid)) {
|
|
VG_(close)(res);
|
|
res = -VKI_EMFILE;
|
|
}
|
|
MAYBE_PRINTF("%d\n",res);
|
|
}
|
|
|
|
PRE(pipe)
|
|
{
|
|
/* int pipe(int filedes[2]); */
|
|
MAYBE_PRINTF("pipe ( %p ) ...\n", arg1);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "pipe(filedes)",
|
|
arg1, 2*sizeof(int) );
|
|
}
|
|
|
|
POST(pipe)
|
|
{
|
|
Int *p = (Int *)arg1;
|
|
|
|
if (!fd_allowed(p[0], "pipe", tid) ||
|
|
!fd_allowed(p[1], "pipe", tid)) {
|
|
VG_(close)(p[0]);
|
|
VG_(close)(p[1]);
|
|
res = -VKI_EMFILE;
|
|
} else
|
|
VG_TRACK( post_mem_write, arg1, 2*sizeof(int) );
|
|
|
|
MAYBE_PRINTF("SYSCALL[%d] pipe --> %d (rd %d, wr %d)\n",
|
|
VG_(getpid)(), res,
|
|
((UInt*)arg1)[0], ((UInt*)arg1)[1] );
|
|
}
|
|
|
|
PRE(poll)
|
|
{
|
|
/* struct pollfd {
|
|
int fd; -- file descriptor
|
|
short events; -- requested events
|
|
short revents; -- returned events
|
|
};
|
|
int poll(struct pollfd *ufds, unsigned int nfds,
|
|
int timeout)
|
|
*/
|
|
MAYBE_PRINTF("poll ( %p, %d, %d )\n",arg1,arg2,arg3);
|
|
/* In fact some parts of this struct should be readable too.
|
|
This should be fixed properly. */
|
|
SYSCALL_TRACK( pre_mem_write, tid, "poll(ufds)",
|
|
arg1, arg2 * sizeof(struct pollfd) );
|
|
}
|
|
|
|
POST(poll)
|
|
{
|
|
if (res > 0) {
|
|
UInt i;
|
|
struct pollfd * arr = (struct pollfd *)arg1;
|
|
for (i = 0; i < arg2; i++)
|
|
VG_TRACK( post_mem_write, (Addr)(&arr[i].revents),
|
|
sizeof(Short) );
|
|
}
|
|
}
|
|
|
|
PRE(readlink)
|
|
{
|
|
/* int readlink(const char *path, char *buf, size_t bufsiz); */
|
|
MAYBE_PRINTF("readlink ( %p, %p, %d )\n", arg1,arg2,arg3);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "readlink(path)", arg1 );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "readlink(buf)", arg2,arg3 );
|
|
}
|
|
|
|
POST(readlink)
|
|
{
|
|
VG_TRACK( post_mem_write, arg2, res );
|
|
}
|
|
|
|
PRE(readv)
|
|
{
|
|
/* int readv(int fd, const struct iovec * vector, size_t count); */
|
|
Int i;
|
|
struct iovec * vec;
|
|
MAYBE_PRINTF("readv ( %d, %p, %d )\n",arg1,arg2,arg3);
|
|
if (!fd_allowed(arg1, "readv", tid)) {
|
|
res = -VKI_EBADF;
|
|
} else {
|
|
SYSCALL_TRACK( pre_mem_read, tid, "readv(vector)",
|
|
arg2, arg3 * sizeof(struct iovec) );
|
|
/* ToDo: don't do any of the following if the vector is invalid */
|
|
vec = (struct iovec *)arg2;
|
|
for (i = 0; i < (Int)arg3; i++)
|
|
SYSCALL_TRACK( pre_mem_write, tid, "readv(vector[...])",
|
|
(UInt)vec[i].iov_base,vec[i].iov_len );
|
|
}
|
|
}
|
|
|
|
POST(readv)
|
|
{
|
|
if (res > 0) {
|
|
Int i;
|
|
struct iovec * vec = (struct iovec *)arg2;
|
|
Int remains = res;
|
|
|
|
/* res holds the number of bytes read. */
|
|
for (i = 0; i < (Int)arg3; i++) {
|
|
Int nReadThisBuf = vec[i].iov_len;
|
|
if (nReadThisBuf > remains) nReadThisBuf = remains;
|
|
VG_TRACK( post_mem_write, (UInt)vec[i].iov_base, nReadThisBuf );
|
|
remains -= nReadThisBuf;
|
|
if (remains < 0) VG_(core_panic)("readv: remains < 0");
|
|
}
|
|
}
|
|
}
|
|
|
|
PRE(rename)
|
|
{
|
|
/* int rename(const char *oldpath, const char *newpath); */
|
|
MAYBE_PRINTF("rename ( %p, %p )\n", arg1, arg2 );
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "rename(oldpath)", arg1 );
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "rename(newpath)", arg2 );
|
|
}
|
|
|
|
PRE(rmdir)
|
|
{
|
|
/* int rmdir(const char *pathname); */
|
|
MAYBE_PRINTF("rmdir ( %p )\n", arg1);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "rmdir(pathname)", arg1 );
|
|
}
|
|
|
|
PRE(sched_setparam)
|
|
{
|
|
/* int sched_setparam(pid_t pid, const struct sched_param *p); */
|
|
MAYBE_PRINTF("sched_setparam ( %d, %p )\n", arg1, arg2 );
|
|
SYSCALL_TRACK( pre_mem_read, tid, "sched_setparam(ptr)",
|
|
arg2, sizeof(struct sched_param) );
|
|
}
|
|
|
|
POST(sched_setparam)
|
|
{
|
|
VG_TRACK( post_mem_write, arg2, sizeof(struct sched_param) );
|
|
}
|
|
|
|
PRE(sched_getparam)
|
|
{
|
|
/* int sched_getparam(pid_t pid, struct sched_param *p); */
|
|
MAYBE_PRINTF("sched_getparam ( %d, %p )\n", arg1, arg2 );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "sched_getparam(ptr)",
|
|
arg2, sizeof(struct sched_param) );
|
|
}
|
|
|
|
POST(sched_getparam)
|
|
{
|
|
VG_TRACK( post_mem_write, arg2, sizeof(struct sched_param) );
|
|
}
|
|
|
|
PRE(sched_yield)
|
|
{
|
|
/* int sched_yield(void); */
|
|
MAYBE_PRINTF("sched_yield ()\n" );
|
|
}
|
|
|
|
PRE(select)
|
|
{
|
|
/* struct sel_arg_struct {
|
|
unsigned long n;
|
|
fd_set *inp, *outp, *exp;
|
|
struct timeval *tvp;
|
|
};
|
|
int old_select(struct sel_arg_struct *arg);
|
|
*/
|
|
SYSCALL_TRACK( pre_mem_read, tid, "select(args)", arg1, 5*sizeof(UInt) );
|
|
|
|
{
|
|
UInt* arg_struct = (UInt*)arg1;
|
|
UInt a1, a2, a3, a4, a5;
|
|
|
|
a1 = arg_struct[0];
|
|
a2 = arg_struct[1];
|
|
a3 = arg_struct[2];
|
|
a4 = arg_struct[3];
|
|
a5 = arg_struct[4];
|
|
|
|
MAYBE_PRINTF("select ( %d, %p, %p, %p, %p )\n",
|
|
a1,a2,a3,a4,a5);
|
|
if (a2 != (Addr)NULL)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "select(readfds)", a2,
|
|
a1/8 /* __FD_SETSIZE/8 */ );
|
|
if (a3 != (Addr)NULL)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "select(writefds)", a3,
|
|
arg1/8 /* __FD_SETSIZE/8 */ );
|
|
if (a4 != (Addr)NULL)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "select(exceptfds)", a4,
|
|
a1/8 /* __FD_SETSIZE/8 */ );
|
|
if (a5 != (Addr)NULL)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "select(timeout)", a5,
|
|
sizeof(struct timeval) );
|
|
}
|
|
}
|
|
|
|
PRE(setitimer)
|
|
{
|
|
/* setitimer(int which, const struct itimerval *value,
|
|
struct itimerval *ovalue); */
|
|
MAYBE_PRINTF("setitimer ( %d, %p, %p )\n", arg1,arg2,arg3);
|
|
if (arg2 != (Addr)NULL)
|
|
SYSCALL_TRACK( pre_mem_read,tid, "setitimer(value)",
|
|
arg2, sizeof(struct itimerval) );
|
|
if (arg3 != (Addr)NULL)
|
|
SYSCALL_TRACK( pre_mem_write,tid, "setitimer(ovalue)",
|
|
arg3, sizeof(struct itimerval));
|
|
}
|
|
|
|
POST(setitimer)
|
|
{
|
|
if (arg3 != (Addr)NULL) {
|
|
VG_TRACK( post_mem_write,arg3, sizeof(struct itimerval));
|
|
}
|
|
}
|
|
|
|
PRE(setfsgid32)
|
|
{
|
|
/* int setfsgid(uid_t fsgid); */
|
|
MAYBE_PRINTF("setfsgid ( %d )\n", arg1);
|
|
}
|
|
|
|
PRE(setgid)
|
|
{
|
|
/* int setgid(gid_t gid); */
|
|
MAYBE_PRINTF("setgid ( %d )\n", arg1);
|
|
}
|
|
|
|
PREALIAS(setgid32, setgid);
|
|
|
|
PRE(setsid)
|
|
{
|
|
/* pid_t setsid(void); */
|
|
MAYBE_PRINTF("setsid ()\n");
|
|
}
|
|
|
|
PRE(setgroups)
|
|
{
|
|
/* int setgroups(size_t size, const gid_t *list); */
|
|
MAYBE_PRINTF("setgroups ( %d, %p )\n", arg1, arg2);
|
|
if (arg1 > 0)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "setgroups(list)", arg2,
|
|
arg1 * sizeof(gid_t) );
|
|
}
|
|
|
|
PREALIAS(setgroups32, setgroups);
|
|
|
|
PRE(setpgid)
|
|
{
|
|
/* int setpgid(pid_t pid, pid_t pgid); */
|
|
MAYBE_PRINTF("setpgid ( %d, %d )\n", arg1, arg2);
|
|
}
|
|
|
|
POST(setpgid)
|
|
{
|
|
VG_(main_pgrp) = VG_(getpgrp)();
|
|
}
|
|
|
|
PRE(setregid32)
|
|
{
|
|
/* int setregid(gid_t rgid, gid_t egid); */
|
|
MAYBE_PRINTF("setregid32(?) ( %d, %d )\n", arg1, arg2);
|
|
}
|
|
|
|
PRE(setresuid32)
|
|
{
|
|
/* int setresuid(uid_t ruid, uid_t euid, uid_t suid); */
|
|
MAYBE_PRINTF("setresuid32(?) ( %d, %d, %d )\n", arg1, arg2, arg3);
|
|
}
|
|
|
|
PRE(setreuid)
|
|
{
|
|
/* int setreuid(uid_t ruid, uid_t euid); */
|
|
MAYBE_PRINTF("setreuid ( 0x%x, 0x%x )\n", arg1, arg2);
|
|
}
|
|
|
|
PREALIAS(setreuid32, setreuid);
|
|
|
|
PRE(setrlimit)
|
|
{
|
|
/* int setrlimit (int resource, const struct rlimit *rlim); */
|
|
MAYBE_PRINTF("setrlimit ( %d, %p )\n", arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read, tid, "setrlimit(rlim)",
|
|
arg2, sizeof(struct rlimit) );
|
|
}
|
|
|
|
PRE(setuid)
|
|
{
|
|
/* int setuid(uid_t uid); */
|
|
MAYBE_PRINTF("setuid ( %d )\n", arg1);
|
|
}
|
|
|
|
PREALIAS(setuid32, setuid);
|
|
|
|
PRE(socketcall)
|
|
{
|
|
/* int socketcall(int call, unsigned long *args); */
|
|
MAYBE_PRINTF("socketcall ( %d, %p )\n",arg1,arg2);
|
|
switch (arg1 /* request */) {
|
|
|
|
case SYS_SOCKETPAIR:
|
|
/* int socketpair(int d, int type, int protocol, int sv[2]); */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.socketpair(args)",
|
|
arg2, 4*sizeof(Addr) );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "socketcall.socketpair(sv)",
|
|
((UInt*)arg2)[3], 2*sizeof(int) );
|
|
break;
|
|
|
|
case SYS_SOCKET:
|
|
/* int socket(int domain, int type, int protocol); */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.socket(args)",
|
|
arg2, 3*sizeof(Addr) );
|
|
break;
|
|
|
|
case SYS_BIND:
|
|
/* int bind(int sockfd, struct sockaddr *my_addr,
|
|
int addrlen); */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.bind(args)",
|
|
arg2, 3*sizeof(Addr) );
|
|
pre_mem_read_sockaddr( tid, "socketcall.bind(my_addr.%s)",
|
|
(struct sockaddr *) (((UInt*)arg2)[1]), ((UInt*)arg2)[2]);
|
|
break;
|
|
|
|
case SYS_LISTEN:
|
|
/* int listen(int s, int backlog); */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.listen(args)",
|
|
arg2, 2*sizeof(Addr) );
|
|
break;
|
|
|
|
case SYS_ACCEPT: {
|
|
/* int accept(int s, struct sockaddr *addr, int *addrlen); */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.accept(args)",
|
|
arg2, 3*sizeof(Addr) );
|
|
{
|
|
Addr addr_p = ((UInt*)arg2)[1];
|
|
Addr addrlen_p = ((UInt*)arg2)[2];
|
|
if (addr_p != (Addr)NULL)
|
|
buf_and_len_pre_check ( tid, addr_p, addrlen_p,
|
|
"socketcall.accept(addr)",
|
|
"socketcall.accept(addrlen_in)" );
|
|
}
|
|
break;
|
|
}
|
|
|
|
case SYS_SENDTO:
|
|
/* int sendto(int s, const void *msg, int len,
|
|
unsigned int flags,
|
|
const struct sockaddr *to, int tolen); */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.sendto(args)", arg2,
|
|
6*sizeof(Addr) );
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.sendto(msg)",
|
|
((UInt*)arg2)[1], /* msg */
|
|
((UInt*)arg2)[2] /* len */ );
|
|
pre_mem_read_sockaddr( tid, "socketcall.sendto(to.%s)",
|
|
(struct sockaddr *) (((UInt*)arg2)[4]), ((UInt*)arg2)[5]);
|
|
break;
|
|
|
|
case SYS_SEND:
|
|
/* int send(int s, const void *msg, size_t len, int flags); */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.send(args)", arg2,
|
|
4*sizeof(Addr) );
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.send(msg)",
|
|
((UInt*)arg2)[1], /* msg */
|
|
((UInt*)arg2)[2] /* len */ );
|
|
break;
|
|
|
|
case SYS_RECVFROM:
|
|
/* int recvfrom(int s, void *buf, int len, unsigned int flags,
|
|
struct sockaddr *from, int *fromlen); */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.recvfrom(args)",
|
|
arg2, 6*sizeof(Addr) );
|
|
{
|
|
Addr buf_p = ((UInt*)arg2)[1];
|
|
Int len = ((UInt*)arg2)[2];
|
|
Addr from_p = ((UInt*)arg2)[4];
|
|
Addr fromlen_p = ((UInt*)arg2)[5];
|
|
|
|
SYSCALL_TRACK( pre_mem_write, tid, "socketcall.recvfrom(buf)",
|
|
buf_p, len );
|
|
if (from_p != (Addr)NULL)
|
|
buf_and_len_pre_check ( tid, from_p, fromlen_p,
|
|
"socketcall.recvfrom(from)",
|
|
"socketcall.recvfrom(fromlen_in)" );
|
|
}
|
|
break;
|
|
|
|
case SYS_RECV:
|
|
/* int recv(int s, void *buf, int len, unsigned int flags); */
|
|
/* man 2 recv says:
|
|
The recv call is normally used only on a connected socket
|
|
(see connect(2)) and is identical to recvfrom with a NULL
|
|
from parameter.
|
|
*/
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.recv(args)",
|
|
arg2, 4*sizeof(Addr) );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "socketcall.recv(buf)",
|
|
((UInt*)arg2)[1], /* buf */
|
|
((UInt*)arg2)[2] /* len */ );
|
|
break;
|
|
|
|
case SYS_CONNECT:
|
|
/* int connect(int sockfd,
|
|
struct sockaddr *serv_addr, int addrlen ); */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.connect(args)",
|
|
arg2, 3*sizeof(Addr) );
|
|
SYSCALL_TRACK( pre_mem_read, tid,
|
|
"socketcall.connect(serv_addr.sa_family)",
|
|
((UInt*)arg2)[1], /* serv_addr */
|
|
sizeof (sa_family_t));
|
|
pre_mem_read_sockaddr( tid,
|
|
"socketcall.connect(serv_addr.%s)",
|
|
(struct sockaddr *) (((UInt*)arg2)[1]), ((UInt*)arg2)[2]);
|
|
break;
|
|
|
|
case SYS_SETSOCKOPT:
|
|
/* int setsockopt(int s, int level, int optname,
|
|
const void *optval, int optlen); */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.setsockopt(args)",
|
|
arg2, 5*sizeof(Addr) );
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.setsockopt(optval)",
|
|
((UInt*)arg2)[3], /* optval */
|
|
((UInt*)arg2)[4] /* optlen */ );
|
|
break;
|
|
|
|
case SYS_GETSOCKOPT:
|
|
/* int setsockopt(int s, int level, int optname,
|
|
void *optval, socklen_t *optlen); */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.getsockopt(args)",
|
|
arg2, 5*sizeof(Addr) );
|
|
{
|
|
Addr optval_p = ((UInt*)arg2)[3];
|
|
Addr optlen_p = ((UInt*)arg2)[4];
|
|
/* vg_assert(sizeof(socklen_t) == sizeof(UInt)); */
|
|
if (optval_p != (Addr)NULL)
|
|
buf_and_len_pre_check ( tid, optval_p, optlen_p,
|
|
"socketcall.getsockopt(optval)",
|
|
"socketcall.getsockopt(optlen)" );
|
|
}
|
|
break;
|
|
|
|
case SYS_GETSOCKNAME:
|
|
/* int getsockname(int s, struct sockaddr* name, int* namelen) */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.getsockname(args)",
|
|
arg2, 3*sizeof(Addr) );
|
|
{
|
|
Addr name_p = ((UInt*)arg2)[1];
|
|
Addr namelen_p = ((UInt*)arg2)[2];
|
|
|
|
/* Nb: name_p cannot be NULL */
|
|
buf_and_len_pre_check ( tid, name_p, namelen_p,
|
|
"socketcall.getsockname(name)",
|
|
"socketcall.getsockname(namelen_in)" );
|
|
}
|
|
break;
|
|
|
|
case SYS_GETPEERNAME:
|
|
/* int getpeername(int s, struct sockaddr* name, int* namelen) */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.getpeername(args)",
|
|
arg2, 3*sizeof(Addr) );
|
|
{
|
|
Addr name_p = ((UInt*)arg2)[1];
|
|
Addr namelen_p = ((UInt*)arg2)[2];
|
|
|
|
/* Nb: name_p cannot be NULL */
|
|
buf_and_len_pre_check ( tid, name_p, namelen_p,
|
|
"socketcall.getpeername(name)",
|
|
"socketcall.getpeername(namelen_in)" );
|
|
}
|
|
break;
|
|
|
|
case SYS_SHUTDOWN:
|
|
/* int shutdown(int s, int how); */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "socketcall.shutdown(args)",
|
|
arg2, 2*sizeof(Addr) );
|
|
break;
|
|
|
|
case SYS_SENDMSG: {
|
|
/* int sendmsg(int s, const struct msghdr *msg, int flags); */
|
|
|
|
/* this causes warnings, and I don't get why. glibc bug?
|
|
* (after all it's glibc providing the arguments array)
|
|
SYSCALL_TRACK( pre_mem_read, "socketcall.sendmsg(args)",
|
|
arg2, 3*sizeof(Addr) );
|
|
*/
|
|
|
|
struct msghdr *msg = (struct msghdr *)((UInt *)arg2)[ 1 ];
|
|
msghdr_foreachfield ( tid, msg, pre_mem_read_sendmsg );
|
|
|
|
break;
|
|
}
|
|
|
|
case SYS_RECVMSG: {
|
|
/* int recvmsg(int s, struct msghdr *msg, int flags); */
|
|
|
|
/* this causes warnings, and I don't get why. glibc bug?
|
|
* (after all it's glibc providing the arguments array)
|
|
SYSCALL_TRACK( pre_mem_read, "socketcall.recvmsg(args)",
|
|
arg2, 3*sizeof(Addr) );
|
|
*/
|
|
|
|
struct msghdr *msg = (struct msghdr *)((UInt *)arg2)[ 1 ];
|
|
msghdr_foreachfield ( tid, msg, pre_mem_write_recvmsg );
|
|
|
|
break;
|
|
}
|
|
|
|
default:
|
|
VG_(message)(Vg_DebugMsg,"Warning: unhandled socketcall 0x%x",arg1);
|
|
res = -VKI_EINVAL;
|
|
break;
|
|
}
|
|
}
|
|
|
|
POST(socketcall)
|
|
{
|
|
/* int socketcall(int call, unsigned long *args); */
|
|
MAYBE_PRINTF("socketcall ( %d, %p )\n",arg1,arg2);
|
|
|
|
switch (arg1 /* request */) {
|
|
|
|
case SYS_SOCKETPAIR:
|
|
/* XXX TODO: check return fd against VG_MAX_FD */
|
|
VG_TRACK( post_mem_write, ((UInt*)arg2)[3], 2*sizeof(int) );
|
|
break;
|
|
|
|
case SYS_SOCKET:
|
|
if (!fd_allowed(res, "socket", tid)) {
|
|
VG_(close)(res);
|
|
res = -VKI_EMFILE;
|
|
}
|
|
break;
|
|
|
|
case SYS_BIND:
|
|
/* int bind(int sockfd, struct sockaddr *my_addr,
|
|
int addrlen); */
|
|
break;
|
|
|
|
case SYS_LISTEN:
|
|
/* int listen(int s, int backlog); */
|
|
break;
|
|
|
|
case SYS_ACCEPT: {
|
|
/* int accept(int s, struct sockaddr *addr, int *addrlen); */
|
|
if (!fd_allowed(res, "accept", tid)) {
|
|
VG_(close)(res);
|
|
res = -VKI_EMFILE;
|
|
} else {
|
|
Addr addr_p = ((UInt*)arg2)[1];
|
|
Addr addrlen_p = ((UInt*)arg2)[2];
|
|
|
|
if (addr_p != (Addr)NULL)
|
|
buf_and_len_post_check ( tid, res, addr_p, addrlen_p,
|
|
"socketcall.accept(addrlen_out)" );
|
|
}
|
|
break;
|
|
}
|
|
|
|
case SYS_SENDTO:
|
|
break;
|
|
|
|
case SYS_SEND:
|
|
break;
|
|
|
|
case SYS_RECVFROM:
|
|
{
|
|
Addr buf_p = ((UInt*)arg2)[1];
|
|
Int len = ((UInt*)arg2)[2];
|
|
Addr from_p = ((UInt*)arg2)[4];
|
|
Addr fromlen_p = ((UInt*)arg2)[5];
|
|
|
|
if (from_p != (Addr)NULL)
|
|
buf_and_len_post_check ( tid, res, from_p, fromlen_p,
|
|
"socketcall.recvfrom(fromlen_out)" );
|
|
VG_TRACK( post_mem_write, buf_p, len );
|
|
}
|
|
break;
|
|
|
|
case SYS_RECV:
|
|
if (res >= 0
|
|
&& ((UInt*)arg2)[1] != (UInt)NULL) {
|
|
VG_TRACK( post_mem_write, ((UInt*)arg2)[1], /* buf */
|
|
((UInt*)arg2)[2] /* len */ );
|
|
}
|
|
break;
|
|
|
|
case SYS_CONNECT:
|
|
break;
|
|
|
|
case SYS_SETSOCKOPT:
|
|
break;
|
|
|
|
case SYS_GETSOCKOPT:
|
|
{
|
|
Addr optval_p = ((UInt*)arg2)[3];
|
|
Addr optlen_p = ((UInt*)arg2)[4];
|
|
|
|
if (optval_p != (Addr)NULL)
|
|
buf_and_len_post_check ( tid, res, optval_p, optlen_p,
|
|
"socketcall.getsockopt(optlen_out)" );
|
|
}
|
|
break;
|
|
|
|
case SYS_GETSOCKNAME:
|
|
{
|
|
Addr name_p = ((UInt*)arg2)[1];
|
|
Addr namelen_p = ((UInt*)arg2)[2];
|
|
|
|
buf_and_len_post_check ( tid, res, name_p, namelen_p,
|
|
"socketcall.getsockname(namelen_out)" );
|
|
}
|
|
break;
|
|
|
|
case SYS_GETPEERNAME:
|
|
{
|
|
Addr name_p = ((UInt*)arg2)[1];
|
|
Addr namelen_p = ((UInt*)arg2)[2];
|
|
|
|
buf_and_len_post_check ( tid, res, name_p, namelen_p,
|
|
"socketcall.getpeername(namelen_out)" );
|
|
}
|
|
break;
|
|
|
|
case SYS_SHUTDOWN:
|
|
break;
|
|
|
|
case SYS_SENDMSG:
|
|
break;
|
|
|
|
case SYS_RECVMSG:
|
|
{
|
|
struct msghdr *msg = (struct msghdr *)((UInt *)arg2)[ 1 ];
|
|
|
|
msghdr_foreachfield( tid, msg, post_mem_write_recvmsg );
|
|
|
|
break;
|
|
}
|
|
|
|
default:
|
|
VG_(message)(Vg_DebugMsg,"FATAL: unhandled socketcall 0x%x",arg1);
|
|
VG_(core_panic)("... bye!\n");
|
|
break; /*NOTREACHED*/
|
|
}
|
|
}
|
|
|
|
PRE(stat)
|
|
{
|
|
/* int stat(const char *file_name, struct stat *buf); */
|
|
MAYBE_PRINTF("stat ( %p, %p )\n",arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "stat(file_name)", arg1 );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "stat(buf)",
|
|
arg2, sizeof(struct stat) );
|
|
}
|
|
|
|
POST(stat)
|
|
{
|
|
VG_TRACK( post_mem_write, arg2, sizeof(struct stat) );
|
|
}
|
|
|
|
PRE(statfs)
|
|
{
|
|
/* int statfs(const char *path, struct statfs *buf); */
|
|
MAYBE_PRINTF("statfs ( %p, %p )\n",arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "statfs(path)", arg1 );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "stat(buf)",
|
|
arg2, sizeof(struct statfs) );
|
|
}
|
|
|
|
POST(statfs)
|
|
{
|
|
VG_TRACK( post_mem_write, arg2, sizeof(struct statfs) );
|
|
}
|
|
|
|
PRE(symlink)
|
|
{
|
|
/* int symlink(const char *oldpath, const char *newpath); */
|
|
MAYBE_PRINTF("symlink ( %p, %p )\n",arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "symlink(oldpath)", arg1 );
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "symlink(newpath)", arg2 );
|
|
}
|
|
|
|
PRE(stat64)
|
|
{
|
|
/* int stat64(const char *file_name, struct stat64 *buf); */
|
|
MAYBE_PRINTF("stat64 ( %p, %p )\n",arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "stat64(file_name)", arg1 );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "stat64(buf)",
|
|
arg2, sizeof(struct stat64) );
|
|
}
|
|
|
|
POST(stat64)
|
|
{
|
|
VG_TRACK( post_mem_write, arg2, sizeof(struct stat64) );
|
|
}
|
|
|
|
PRE(fstat64)
|
|
{
|
|
/* int fstat64(int filedes, struct stat64 *buf); */
|
|
MAYBE_PRINTF("fstat64 ( %d, %p )\n",arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "fstat64(buf)",
|
|
arg2, sizeof(struct stat64) );
|
|
}
|
|
|
|
POST(fstat64)
|
|
{
|
|
VG_TRACK( post_mem_write, arg2, sizeof(struct stat64) );
|
|
}
|
|
|
|
PRE(sysinfo)
|
|
{
|
|
/* int sysinfo(struct sysinfo *info); */
|
|
MAYBE_PRINTF("sysinfo ( %p )\n",arg1);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "sysinfo(info)",
|
|
arg1, sizeof(struct sysinfo) );
|
|
}
|
|
|
|
POST(sysinfo)
|
|
{
|
|
VG_TRACK( post_mem_write, arg1, sizeof(struct sysinfo) );
|
|
}
|
|
|
|
PRE(time)
|
|
{
|
|
/* time_t time(time_t *t); */
|
|
MAYBE_PRINTF("time ( %p )\n",arg1);
|
|
if (arg1 != (UInt)NULL) {
|
|
SYSCALL_TRACK( pre_mem_write, tid, "time", arg1, sizeof(time_t) );
|
|
}
|
|
}
|
|
|
|
POST(time)
|
|
{
|
|
if (arg1 != (UInt)NULL) {
|
|
VG_TRACK( post_mem_write, arg1, sizeof(time_t) );
|
|
}
|
|
}
|
|
|
|
PRE(times)
|
|
{
|
|
/* clock_t times(struct tms *buf); */
|
|
MAYBE_PRINTF("times ( %p )\n",arg1);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "times(buf)",
|
|
arg1, sizeof(struct tms) );
|
|
}
|
|
|
|
POST(times)
|
|
{
|
|
if (arg1 != (UInt)NULL) {
|
|
VG_TRACK( post_mem_write, arg1, sizeof(struct tms) );
|
|
}
|
|
}
|
|
|
|
PRE(truncate)
|
|
{
|
|
/* int truncate(const char *path, size_t length); */
|
|
MAYBE_PRINTF("truncate ( %p, %d )\n", arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "truncate(path)", arg1 );
|
|
}
|
|
|
|
PRE(umask)
|
|
{
|
|
/* mode_t umask(mode_t mask); */
|
|
MAYBE_PRINTF("umask ( %d )\n", arg1);
|
|
}
|
|
|
|
PRE(unlink)
|
|
{
|
|
/* int unlink(const char *pathname) */
|
|
MAYBE_PRINTF("ulink ( %p )\n",arg1);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "unlink(pathname)", arg1 );
|
|
}
|
|
|
|
PRE(uname)
|
|
{
|
|
/* int uname(struct utsname *buf); */
|
|
MAYBE_PRINTF("uname ( %p )\n",arg1);
|
|
SYSCALL_TRACK( pre_mem_write, tid, "uname(buf)",
|
|
arg1, sizeof(struct utsname) );
|
|
}
|
|
|
|
POST(uname)
|
|
{
|
|
if (arg1 != (UInt)NULL) {
|
|
VG_TRACK( post_mem_write, arg1, sizeof(struct utsname) );
|
|
}
|
|
}
|
|
|
|
PRE(utime)
|
|
{
|
|
/* int utime(const char *filename, struct utimbuf *buf); */
|
|
MAYBE_PRINTF("utime ( %p, %p )\n", arg1,arg2);
|
|
SYSCALL_TRACK( pre_mem_read_asciiz, tid, "utime(filename)", arg1 );
|
|
if (arg2 != (UInt)NULL)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "utime(buf)", arg2,
|
|
sizeof(struct utimbuf) );
|
|
}
|
|
|
|
PRE(waitpid)
|
|
{
|
|
/* pid_t waitpid(pid_t pid, int *status, int options); */
|
|
|
|
MAYBE_PRINTF("waitpid ( %d, %p, %d )\n",
|
|
arg1,arg2,arg3);
|
|
if (arg2 != (Addr)NULL)
|
|
SYSCALL_TRACK( pre_mem_write, tid, "waitpid(status)",
|
|
arg2, sizeof(int) );
|
|
}
|
|
|
|
POST(waitpid)
|
|
{
|
|
if (arg2 != (Addr)NULL)
|
|
VG_TRACK( post_mem_write, arg2, sizeof(int) );
|
|
}
|
|
|
|
PRE(wait4)
|
|
{
|
|
/* pid_t wait4(pid_t pid, int *status, int options,
|
|
struct rusage *rusage) */
|
|
MAYBE_PRINTF("wait4 ( %d, %p, %d, %p )\n",
|
|
arg1,arg2,arg3,arg4);
|
|
arg3 &= ~(VKI__WCLONE | VKI__WALL);
|
|
|
|
if (arg2 != (Addr)NULL)
|
|
SYSCALL_TRACK( pre_mem_write, tid, "wait4(status)",
|
|
arg2, sizeof(int) );
|
|
if (arg4 != (Addr)NULL)
|
|
SYSCALL_TRACK( pre_mem_write, tid, "wait4(rusage)", arg4,
|
|
sizeof(struct rusage) );
|
|
}
|
|
|
|
POST(wait4)
|
|
{
|
|
if (arg2 != (Addr)NULL)
|
|
VG_TRACK( post_mem_write, arg2, sizeof(int) );
|
|
if (arg4 != (Addr)NULL)
|
|
VG_TRACK( post_mem_write, arg4, sizeof(struct rusage) );
|
|
}
|
|
|
|
PRE(writev)
|
|
{
|
|
/* int writev(int fd, const struct iovec * vector, size_t count); */
|
|
Int i;
|
|
struct iovec * vec;
|
|
MAYBE_PRINTF("writev ( %d, %p, %d )\n",arg1,arg2,arg3);
|
|
if (!fd_allowed(arg1, "writev", tid)) {
|
|
res = -VKI_EBADF;
|
|
} else {
|
|
SYSCALL_TRACK( pre_mem_read, tid, "writev(vector)",
|
|
arg2, arg3 * sizeof(struct iovec) );
|
|
/* ToDo: don't do any of the following if the vector is invalid */
|
|
vec = (struct iovec *)arg2;
|
|
for (i = 0; i < (Int)arg3; i++)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "writev(vector[...])",
|
|
(UInt)vec[i].iov_base,vec[i].iov_len );
|
|
}
|
|
}
|
|
|
|
PRE(prctl)
|
|
{
|
|
/* int prctl(int option, unsigned long arg2, unsigned long arg3,
|
|
unsigned long arg4, unsigned long arg5); */
|
|
MAYBE_PRINTF( "prctl ( %d, %d, %d, %d, %d )\n", arg1, arg2, arg3,
|
|
arg4, arg5 );
|
|
}
|
|
|
|
PRE(adjtimex)
|
|
{
|
|
struct timex *tx = (struct timex *)arg1;
|
|
MAYBE_PRINTF("adjtimex ( %p )\n", arg1);
|
|
|
|
SYSCALL_TRACK(pre_mem_read, tid, "adjtimex(timex->modes)", arg1, sizeof(tx->modes));
|
|
|
|
#define ADJX(bit,field) \
|
|
if (tx->modes & bit) \
|
|
SYSCALL_TRACK(pre_mem_read, tid, \
|
|
"adjtimex(timex->"#field")", \
|
|
(UInt)&tx->field, sizeof(tx->field))
|
|
ADJX(ADJ_FREQUENCY, freq);
|
|
ADJX(ADJ_MAXERROR, maxerror);
|
|
ADJX(ADJ_ESTERROR, esterror);
|
|
ADJX(ADJ_STATUS, status);
|
|
ADJX(ADJ_TIMECONST, constant);
|
|
ADJX(ADJ_TICK, tick);
|
|
#undef ADJX
|
|
|
|
SYSCALL_TRACK(pre_mem_write, tid, "adjtimex(timex)", arg1, sizeof(struct timex));
|
|
}
|
|
|
|
POST(adjtimex)
|
|
{
|
|
VG_TRACK(post_mem_write, arg1, sizeof(struct timex));
|
|
}
|
|
|
|
#define SIGNAL_SIMULATION 1
|
|
|
|
PRE(pause)
|
|
{
|
|
/* int pause(void); */
|
|
MAYBE_PRINTF("pause ( )\n");
|
|
}
|
|
|
|
PRE(rt_sigsuspend)
|
|
{
|
|
/* int sigsuspend(const sigset_t *mask); */
|
|
MAYBE_PRINTF("sigsuspend ( %p )\n", arg1 );
|
|
if (arg1 != (Addr)NULL) {
|
|
/* above NULL test is paranoia */
|
|
SYSCALL_TRACK( pre_mem_read, tid, "sigsuspend(mask)", arg1,
|
|
sizeof(vki_ksigset_t) );
|
|
}
|
|
}
|
|
|
|
PREALIAS(sigsuspend, rt_sigsuspend);
|
|
|
|
PRE(rt_sigtimedwait)
|
|
{
|
|
/* int sigtimedwait(const sigset_t *set, siginfo_t *info,
|
|
const struct timespec timeout); */
|
|
MAYBE_PRINTF("sigtimedwait ( %p, %p, timeout )\n", arg1, arg2);
|
|
if (arg1 != (UInt)NULL)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "sigtimedwait(set)", arg1,
|
|
sizeof(vki_ksigset_t));
|
|
if (arg2 != (UInt)NULL)
|
|
SYSCALL_TRACK( pre_mem_write, tid, "sigtimedwait(info)", arg2,
|
|
sizeof(siginfo_t) );
|
|
}
|
|
|
|
POST(rt_sigtimedwait)
|
|
{
|
|
if (arg2 != (UInt)NULL)
|
|
VG_TRACK( post_mem_write, arg2, sizeof(siginfo_t) );
|
|
}
|
|
|
|
PRE(rt_sigqueueinfo)
|
|
{
|
|
/* long sys_rt_sigqueueinfo(int pid, int sig, siginfo_t *uinfo) */
|
|
MAYBE_PRINTF("rt_sigqueueinfo(%d, %d, %p)\n", arg1, arg2, arg3);
|
|
if (arg2 != (UInt)NULL)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "sigqueueinfo(uinfo)", arg3,
|
|
sizeof(siginfo_t) );
|
|
}
|
|
|
|
POST(rt_sigqueueinfo)
|
|
{
|
|
if (res >= 0 &&
|
|
arg2 != 0 &&
|
|
!VG_(is_sig_ign)(arg2) &&
|
|
!VG_(ksigismember)(&tst->eff_sig_mask, arg2) &&
|
|
arg1 == VG_(getpid)()) {
|
|
VG_(proxy_waitsig)();
|
|
}
|
|
}
|
|
|
|
PRE(sigaltstack)
|
|
{
|
|
/* int sigaltstack(const stack_t *ss, stack_t *oss); */
|
|
MAYBE_PRINTF("sigaltstack ( %p, %p )\n",arg1,arg2);
|
|
if (arg1 != (UInt)NULL) {
|
|
SYSCALL_TRACK( pre_mem_read, tid, "sigaltstack(ss)",
|
|
arg1, sizeof(vki_kstack_t) );
|
|
}
|
|
if (arg2 != (UInt)NULL) {
|
|
SYSCALL_TRACK( pre_mem_write, tid, "sigaltstack(oss)",
|
|
arg2, sizeof(vki_kstack_t) );
|
|
}
|
|
|
|
if (SIGNAL_SIMULATION)
|
|
VG_(do__NR_sigaltstack) (tid);
|
|
}
|
|
|
|
POST(sigaltstack)
|
|
{
|
|
if (res == 0 && arg2 != (UInt)NULL)
|
|
VG_TRACK( post_mem_write, arg2, sizeof(vki_kstack_t));
|
|
}
|
|
|
|
PRE(sigaction)
|
|
{
|
|
/* int sigaction(int signum, struct k_sigaction *act,
|
|
struct k_sigaction *oldact); */
|
|
MAYBE_PRINTF("sigaction ( %d, %p, %p )\n",arg1,arg2,arg3);
|
|
if (arg2 != (UInt)NULL)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "sigaction(act)",
|
|
arg2, sizeof(vki_ksigaction));
|
|
if (arg3 != (UInt)NULL)
|
|
SYSCALL_TRACK( pre_mem_write, tid, "sigaction(oldact)",
|
|
arg3, sizeof(vki_ksigaction));
|
|
|
|
if (SIGNAL_SIMULATION)
|
|
VG_(do__NR_sigaction)(tid);
|
|
}
|
|
|
|
POST(sigaction)
|
|
{
|
|
if (res == 0 && arg3 != (UInt)NULL)
|
|
VG_TRACK( post_mem_write, arg3, sizeof(vki_ksigaction));
|
|
}
|
|
|
|
PREALIAS(rt_sigaction, sigaction);
|
|
POSTALIAS(rt_sigaction, sigaction);
|
|
|
|
PRE(sigprocmask)
|
|
{
|
|
/* int sigprocmask(int how, k_sigset_t *set,
|
|
k_sigset_t *oldset); */
|
|
MAYBE_PRINTF("sigprocmask ( %d, %p, %p )\n",arg1,arg2,arg3);
|
|
if (arg2 != (UInt)NULL)
|
|
SYSCALL_TRACK( pre_mem_read, tid, "sigprocmask(set)",
|
|
arg2, sizeof(vki_ksigset_t));
|
|
if (arg3 != (UInt)NULL)
|
|
SYSCALL_TRACK( pre_mem_write, tid, "sigprocmask(oldset)",
|
|
arg3, sizeof(vki_ksigset_t));
|
|
|
|
if (SIGNAL_SIMULATION)
|
|
VG_(do__NR_sigprocmask) ( tid,
|
|
arg1 /*how*/,
|
|
(vki_ksigset_t*) arg2,
|
|
(vki_ksigset_t*) arg3 );
|
|
}
|
|
|
|
POST(sigprocmask)
|
|
{
|
|
if (res == 0 && arg3 != (UInt)NULL)
|
|
VG_TRACK( post_mem_write, arg3, sizeof(vki_ksigset_t));
|
|
}
|
|
|
|
PREALIAS(rt_sigprocmask, sigprocmask);
|
|
POSTALIAS(rt_sigprocmask, sigprocmask);
|
|
|
|
PRE(sigpending)
|
|
{
|
|
/* int sigpending( sigset_t *set ) ; */
|
|
MAYBE_PRINTF( "sigpending ( %p )\n", arg1 );
|
|
SYSCALL_TRACK( pre_mem_write, tid, "sigpending(set)",
|
|
arg1, sizeof(vki_ksigset_t));
|
|
}
|
|
|
|
POST(sigpending)
|
|
{
|
|
if ( !VG_( is_kerror )( res ) && res == 0 )
|
|
VG_TRACK( post_mem_write, arg1, sizeof( vki_ksigset_t ) ) ;
|
|
}
|
|
|
|
PREALIAS(rt_sigpending, sigpending);
|
|
POSTALIAS(rt_sigpending, sigpending);
|
|
|
|
|
|
#undef SYSNO
|
|
#undef res
|
|
#undef arg1
|
|
#undef arg2
|
|
#undef arg3
|
|
#undef arg4
|
|
#undef arg5
|
|
#undef arg6
|
|
|
|
struct sys_info {
|
|
Bool may_block; /* is a potentially blocking syscall */
|
|
void (*before)(ThreadId tid, ThreadState *tst);
|
|
void (*after)(ThreadId tid, ThreadState *tst);
|
|
};
|
|
#define SYSB_(name, blk) [__NR_##name] = { blk, before_##name, NULL }
|
|
#define SYSBA(name, blk) [__NR_##name] = { blk, before_##name, after_##name }
|
|
|
|
static void bad_before(ThreadId tid, ThreadState *tst)
|
|
{
|
|
VG_(message)
|
|
(Vg_DebugMsg,"WARNING: unhandled syscall: %d", tst->m_eax);
|
|
VG_(message)
|
|
(Vg_DebugMsg,"Do not panic. You may be able to fix this easily.");
|
|
VG_(message)
|
|
(Vg_DebugMsg,"Read the file README_MISSING_SYSCALL_OR_IOCTL.");
|
|
|
|
tst->m_eax = -VKI_ENOSYS;
|
|
}
|
|
|
|
static void bad_after(ThreadId tid, ThreadState *tst)
|
|
{
|
|
}
|
|
|
|
static const struct sys_info bad_sys = { False, bad_before, bad_after };
|
|
|
|
static const struct sys_info special_sys[] = {
|
|
/* special */
|
|
SYSB_(exit_group, False),
|
|
SYSB_(exit, False),
|
|
SYSB_(clone, False),
|
|
|
|
SYSB_(modify_ldt, False),
|
|
|
|
SYSB_(execve, False),
|
|
|
|
#if SIGNAL_SIMULATION
|
|
SYSBA(sigaltstack, False),
|
|
SYSBA(rt_sigaction, False),
|
|
SYSBA(sigaction, False),
|
|
SYSBA(rt_sigprocmask, False),
|
|
SYSBA(sigprocmask, False),
|
|
#endif /* SIGNAL_SIMULATION */
|
|
};
|
|
#define MAX_SPECIAL_SYS (sizeof(special_sys)/sizeof(special_sys[0]))
|
|
|
|
static const struct sys_info sys_info[] = {
|
|
SYSBA(ptrace, False),
|
|
SYSB_(mount, True),
|
|
SYSB_(umount, False),
|
|
|
|
SYSB_(setresgid, False),
|
|
SYSB_(vhangup, False),
|
|
SYSB_(iopl, False),
|
|
|
|
SYSB_(setxattr, True),
|
|
SYSB_(lsetxattr, True),
|
|
SYSB_(fsetxattr, True),
|
|
SYSBA(getxattr, True),
|
|
SYSBA(lgetxattr, True),
|
|
SYSBA(fgetxattr, True),
|
|
SYSBA(listxattr, True),
|
|
SYSBA(llistxattr, True),
|
|
SYSBA(flistxattr, True),
|
|
SYSB_(removexattr, True),
|
|
SYSB_(lremovexattr, True),
|
|
SYSB_(fremovexattr, True),
|
|
|
|
SYSB_(quotactl, False),
|
|
SYSBA(lookup_dcookie, False),
|
|
|
|
SYSB_(truncate64, True),
|
|
SYSB_(fdatasync, True),
|
|
SYSB_(msync, True),
|
|
|
|
SYSBA(getpmsg, True),
|
|
SYSB_(putpmsg, True),
|
|
|
|
SYSBA(getitimer, False),
|
|
SYSBA(syslog, True),
|
|
SYSB_(personality, False),
|
|
SYSB_(chroot, False),
|
|
SYSB_(madvise, True),
|
|
SYSBA(mremap, False),
|
|
SYSB_(nice, False),
|
|
SYSB_(setresgid32, False),
|
|
SYSB_(setfsuid32, False),
|
|
SYSBA(_sysctl, False),
|
|
|
|
SYSB_(sched_getscheduler, False), /* ??? */
|
|
SYSB_(sched_setscheduler, False), /* ??? */
|
|
|
|
SYSB_(mlock, True),
|
|
SYSB_(munlock, True),
|
|
SYSB_(mlockall, True),
|
|
SYSB_(munlockall, True),
|
|
|
|
SYSB_(sched_get_priority_max, False), /* ??? */
|
|
SYSB_(sched_get_priority_min, False), /* ??? */
|
|
|
|
SYSB_(setpriority, False),
|
|
SYSB_(getpriority, False),
|
|
|
|
SYSB_(setfsgid, False),
|
|
SYSB_(setregid, False),
|
|
SYSB_(setresuid, False),
|
|
SYSB_(setfsuid, False),
|
|
|
|
SYSBA(sendfile, True),
|
|
SYSBA(sendfile64, True),
|
|
SYSB_(pwrite64, True),
|
|
SYSB_(sync, True),
|
|
SYSBA(fstatfs, False),
|
|
SYSB_(getsid, False),
|
|
SYSBA(pread64, True),
|
|
SYSB_(mknod, False),
|
|
SYSB_(flock, True),
|
|
SYSB_(init_module, True),
|
|
SYSB_(ioperm, False),
|
|
SYSBA(capget, False),
|
|
SYSB_(capset, False),
|
|
SYSB_(access, False),
|
|
SYSBA(brk, False),
|
|
SYSB_(chdir, False),
|
|
SYSB_(chmod, False),
|
|
SYSB_(chown32, False),
|
|
SYSB_(lchown32, False),
|
|
SYSB_(chown, False),
|
|
SYSB_(close, False),
|
|
SYSBA(dup, False),
|
|
SYSBA(dup2, False),
|
|
SYSB_(fcntl, True),
|
|
SYSB_(fchdir, False),
|
|
SYSB_(fchown32, False),
|
|
SYSB_(fchown, False),
|
|
SYSB_(fchmod, False),
|
|
SYSB_(fcntl64, True),
|
|
SYSBA(fstat, False),
|
|
SYSBA(fork, False),
|
|
SYSB_(fsync, True),
|
|
SYSB_(ftruncate, True),
|
|
SYSB_(ftruncate64, True),
|
|
SYSBA(getdents, True),
|
|
SYSBA(getdents64, True),
|
|
SYSBA(getgroups32, True),
|
|
SYSBA(getgroups, False),
|
|
SYSBA(getcwd, False),
|
|
SYSB_(geteuid, False),
|
|
SYSB_(geteuid32, False),
|
|
SYSB_(getegid, False),
|
|
SYSB_(getegid32, False),
|
|
SYSB_(getgid, False),
|
|
SYSB_(getgid32, False),
|
|
SYSB_(getpid, False),
|
|
SYSB_(getpgid, False),
|
|
SYSB_(getpgrp, False),
|
|
SYSB_(getppid, False),
|
|
SYSBA(getresgid, False),
|
|
SYSBA(getresgid32, False),
|
|
SYSBA(getresuid, False),
|
|
SYSBA(getresuid32, False),
|
|
SYSBA(ugetrlimit, False),
|
|
SYSBA(getrlimit, False),
|
|
SYSBA(getrusage, False),
|
|
SYSBA(gettimeofday, False),
|
|
SYSB_(getuid, False),
|
|
SYSB_(getuid32, False),
|
|
SYSBA(ipc, True),
|
|
SYSBA(ioctl, True),
|
|
SYSBA(kill, False),
|
|
SYSB_(link, True),
|
|
SYSB_(lseek, False),
|
|
SYSBA(_llseek, False),
|
|
SYSBA(lstat, False),
|
|
SYSBA(lstat64, False),
|
|
SYSB_(mkdir, True),
|
|
SYSBA(mmap2, False),
|
|
SYSBA(mmap, False),
|
|
SYSBA(mprotect, False),
|
|
SYSBA(munmap, False),
|
|
SYSBA(nanosleep, True),
|
|
SYSB_(_newselect, True),
|
|
SYSBA(open, True),
|
|
SYSBA(read, True),
|
|
SYSB_(write, True),
|
|
SYSBA(creat, True),
|
|
SYSBA(pipe, False),
|
|
SYSBA(poll, True),
|
|
SYSBA(readlink, False),
|
|
SYSBA(readv, True),
|
|
SYSB_(rename, False),
|
|
SYSB_(rmdir, True),
|
|
SYSBA(sched_setparam, False), /* ??? */
|
|
SYSBA(sched_getparam, False), /* ??? */
|
|
SYSB_(sched_yield, False), /* ??? */
|
|
SYSB_(select, True),
|
|
SYSBA(setitimer, False),
|
|
SYSB_(setfsgid32, False),
|
|
SYSB_(setgid32, False),
|
|
SYSB_(setgid, False),
|
|
SYSB_(setsid, False),
|
|
SYSB_(setgroups32, False),
|
|
SYSB_(setgroups, False),
|
|
SYSBA(setpgid, False),
|
|
SYSB_(setregid32, False),
|
|
SYSB_(setresuid32, False),
|
|
SYSB_(setreuid32, False),
|
|
SYSB_(setreuid, False),
|
|
SYSB_(setrlimit, False),
|
|
SYSB_(setuid32, False),
|
|
SYSB_(setuid, False),
|
|
SYSBA(socketcall, True),
|
|
SYSBA(stat, False),
|
|
SYSBA(statfs, False),
|
|
SYSB_(symlink, True),
|
|
SYSBA(stat64, False),
|
|
SYSBA(fstat64, False),
|
|
SYSBA(sysinfo, False),
|
|
SYSBA(time, False),
|
|
SYSBA(times, False),
|
|
SYSB_(truncate, True),
|
|
SYSB_(umask, False),
|
|
SYSB_(unlink, True),
|
|
SYSBA(uname, False),
|
|
SYSB_(utime, True),
|
|
SYSBA(waitpid, True),
|
|
SYSBA(wait4, True),
|
|
SYSB_(writev, True),
|
|
SYSB_(prctl, True),
|
|
SYSBA(adjtimex, False),
|
|
|
|
/* new signal handling makes these normal blocking syscalls */
|
|
SYSB_(pause, True),
|
|
SYSB_(sigsuspend, True),
|
|
SYSB_(rt_sigsuspend, True),
|
|
SYSBA(rt_sigtimedwait, True),
|
|
SYSBA(rt_sigqueueinfo, False),
|
|
SYSBA(sigpending, True), /* not blocking, but must run in LWP context */
|
|
SYSBA(rt_sigpending, True), /* not blocking, but must run in LWP context */
|
|
SYSB_(alarm, True), /* not blocking, but must run in LWP context */
|
|
|
|
#if !SIGNAL_SIMULATION
|
|
SYSBA(sigaltstack, False),
|
|
SYSBA(rt_sigaction, False),
|
|
SYSBA(sigaction, False),
|
|
SYSBA(rt_sigprocmask, False),
|
|
SYSBA(sigprocmask, False),
|
|
#endif /* !SIGNAL_SIMULATION */
|
|
};
|
|
#define MAX_SYS_INFO (sizeof(sys_info)/sizeof(sys_info[0]))
|
|
|
|
#undef SYSB_
|
|
#undef SYSBA
|
|
|
|
Bool VG_(pre_syscall) ( ThreadId tid )
|
|
{
|
|
ThreadState* tst;
|
|
UInt syscallno;
|
|
const struct sys_info *sys;
|
|
Bool special = False;
|
|
Bool syscall_done = False; /* we actually ran the syscall */
|
|
|
|
VGP_PUSHCC(VgpCoreSysWrap);
|
|
|
|
tst = VG_(get_ThreadState)(tid);
|
|
|
|
/* Convert vfork to fork, since we can't handle it otherwise. */
|
|
if (tst->m_eax == __NR_vfork)
|
|
tst->m_eax = __NR_fork;
|
|
|
|
syscallno = tst->m_eax;
|
|
|
|
if (tst->syscallno != -1)
|
|
VG_(printf)("tid %d has syscall %d\n", tst->tid, tst->syscallno);
|
|
|
|
vg_assert(tst->syscallno == -1); /* should be no current syscall */
|
|
vg_assert(tst->status == VgTs_Runnable); /* should be runnable */
|
|
|
|
/* the syscall no is in %eax. For syscalls with <= 6 args,
|
|
args 1 .. 6 to the syscall are in %ebx %ecx %edx %esi %edi %ebp.
|
|
For calls with > 6 args, %ebx points to a lump of memory
|
|
containing the args.
|
|
|
|
The result is returned in %eax. If this value >= 0, the call
|
|
succeeded, and this is the return value. If < 0, it failed, and
|
|
the negation of this value is errno. To be more specific,
|
|
if res is in the range -EMEDIUMTYPE (-124) .. -EPERM (-1)
|
|
(kernel 2.4.9 sources, include/asm-i386/errno.h)
|
|
then it indicates an error. Otherwise it doesn't.
|
|
|
|
Dirk Mueller (mueller@kde.org) says that values -4095 .. -1
|
|
(inclusive?) indicate error returns. Not sure where the -4095
|
|
comes from.
|
|
*/
|
|
|
|
/* post_syscall expects us to be "waiting" even if we don't
|
|
block */
|
|
tst->syscallno = syscallno;
|
|
tst->status = VgTs_WaitSys;
|
|
|
|
if (syscallno < MAX_SPECIAL_SYS && special_sys[syscallno].before != NULL) {
|
|
sys = &special_sys[syscallno];
|
|
special = True;
|
|
} else if (syscallno < MAX_SYS_INFO && sys_info[syscallno].before != NULL) {
|
|
sys = &sys_info[syscallno];
|
|
} else {
|
|
sys = &bad_sys;
|
|
special = True;
|
|
}
|
|
|
|
/* Do any pre-syscall actions */
|
|
if (VG_(needs).syscall_wrapper) {
|
|
VGP_PUSHCC(VgpSkinSysWrap);
|
|
tst->sys_pre_res = SK_(pre_syscall)(tid, syscallno, /*isBlocking*/sys->may_block);
|
|
VGP_POPCC(VgpSkinSysWrap);
|
|
}
|
|
|
|
MAYBE_PRINTF("SYSCALL[%d,%d](%3d)%s%s:",
|
|
VG_(getpid)(), tid, syscallno,
|
|
special ? " special" : "",
|
|
sys->may_block ? " blocking" : "");
|
|
|
|
if (special) {
|
|
/* "Special" syscalls are implemented by Valgrind internally,
|
|
and do not generate real kernel calls. The expectation,
|
|
therefore, is that the "before" function not only does the
|
|
appropriate tests, but also performs the syscall itself and
|
|
sets the result. Special syscalls cannot block. */
|
|
vg_assert(sys->may_block == False);
|
|
|
|
(sys->before)(tst->tid, tst);
|
|
|
|
syscall_done = True;
|
|
} else {
|
|
(sys->before)(tst->tid, tst);
|
|
|
|
if ((Int)tst->m_eax <= 0) {
|
|
/* "before" decided the syscall wasn't viable, so don't do
|
|
anything - just pretend the syscall happened. */
|
|
syscall_done = True;
|
|
} else if (sys->may_block) {
|
|
/* issue to worker */
|
|
VG_(sys_issue)(tid);
|
|
} else {
|
|
/* run the syscall directly */
|
|
tst->m_eax = VG_(do_syscall)(syscallno,
|
|
tst->m_ebx,
|
|
tst->m_ecx,
|
|
tst->m_edx,
|
|
tst->m_esi,
|
|
tst->m_edi,
|
|
tst->m_ebp);
|
|
syscall_done = True;
|
|
}
|
|
}
|
|
|
|
VGP_POPCC(VgpCoreSysWrap);
|
|
|
|
return syscall_done;
|
|
}
|
|
|
|
|
|
void VG_(post_syscall) ( ThreadId tid )
|
|
{
|
|
ThreadState* tst;
|
|
UInt syscallno;
|
|
const struct sys_info *sys;
|
|
Bool special = False;
|
|
void *pre_res;
|
|
|
|
VGP_PUSHCC(VgpCoreSysWrap);
|
|
|
|
tst = VG_(get_ThreadState)(tid);
|
|
|
|
/* Tell the skin about the syscall return value */
|
|
SET_SYSCALL_RETVAL(tst->tid, tst->m_eax);
|
|
|
|
syscallno = tst->syscallno;
|
|
pre_res = tst->sys_pre_res;
|
|
|
|
vg_assert(syscallno != -1); /* must be a current syscall */
|
|
vg_assert(tst->status == VgTs_WaitSys); /* should be blocked waiting */
|
|
|
|
if (syscallno < MAX_SPECIAL_SYS && special_sys[syscallno].before != NULL) {
|
|
sys = &special_sys[syscallno];
|
|
special = True;
|
|
} else if (syscallno < MAX_SYS_INFO && sys_info[syscallno].before != NULL) {
|
|
sys = &sys_info[syscallno];
|
|
} else {
|
|
sys = &bad_sys;
|
|
special = True;
|
|
}
|
|
|
|
if (!VG_(is_kerror)(tst->m_eax) && sys->after != NULL)
|
|
(sys->after)(tst->tid, tst);
|
|
|
|
/* Do any post-syscall actions */
|
|
if (VG_(needs).syscall_wrapper) {
|
|
VGP_PUSHCC(VgpSkinSysWrap);
|
|
SK_(post_syscall)(tid, syscallno, pre_res, tst->m_eax, /*isBlocking*/True); // did block
|
|
VGP_POPCC(VgpSkinSysWrap);
|
|
}
|
|
|
|
if (tst->m_eax == -VKI_ERESTARTSYS) {
|
|
/* Applications never expect to see this, so we should actually
|
|
restart the syscall (it means the signal happened before the
|
|
syscall made any progress, so we can safely restart it and
|
|
pretend the signal happened before the syscall even
|
|
started) */
|
|
VG_(restart_syscall)(tid);
|
|
}
|
|
|
|
tst->status = VgTs_Runnable; /* runnable again */
|
|
tst->syscallno = -1;
|
|
|
|
VGP_POPCC(VgpCoreSysWrap);
|
|
}
|
|
|
|
void VG_(restart_syscall)(ThreadId tid)
|
|
{
|
|
ThreadState* tst;
|
|
tst = VG_(get_ThreadState)(tid);
|
|
|
|
vg_assert(tst != NULL);
|
|
vg_assert(tst->status == VgTs_WaitSys);
|
|
vg_assert(tst->syscallno != -1);
|
|
|
|
tst->m_eax = tst->syscallno;
|
|
tst->m_eip -= 2; /* sizeof(int $0x80) */
|
|
}
|
|
|
|
/*--------------------------------------------------------------------*/
|
|
/*--- end vg_syscalls.c ---*/
|
|
/*--------------------------------------------------------------------*/
|
|
|