diff options
Diffstat (limited to 'coregrind/m_syswrap/.svn/text-base/syswrap-ppc32-linux.c.svn-base')
-rw-r--r-- | coregrind/m_syswrap/.svn/text-base/syswrap-ppc32-linux.c.svn-base | 1875 |
1 files changed, 1875 insertions, 0 deletions
diff --git a/coregrind/m_syswrap/.svn/text-base/syswrap-ppc32-linux.c.svn-base b/coregrind/m_syswrap/.svn/text-base/syswrap-ppc32-linux.c.svn-base new file mode 100644 index 0000000..60c2886 --- /dev/null +++ b/coregrind/m_syswrap/.svn/text-base/syswrap-ppc32-linux.c.svn-base @@ -0,0 +1,1875 @@ + +/*--------------------------------------------------------------------*/ +/*--- Platform-specific syscalls stuff. syswrap-ppc32-linux.c ---*/ +/*--------------------------------------------------------------------*/ + +/* + This file is part of Valgrind, a dynamic binary instrumentation + framework. + + Copyright (C) 2005-2009 Nicholas Nethercote <njn@valgrind.org> + Copyright (C) 2005-2009 Cerion Armour-Brown <cerion@open-works.co.uk> + + This program is free software; you can redistribute it and/or + modify it under the terms of the GNU General Public License as + published by the Free Software Foundation; either version 2 of the + License, or (at your option) any later version. + + This program is distributed in the hope that it will be useful, but + WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software + Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA + 02111-1307, USA. + + The GNU General Public License is contained in the file COPYING. +*/ + +#include "pub_core_basics.h" +#include "pub_core_vki.h" +#include "pub_core_vkiscnums.h" +#include "pub_core_threadstate.h" +#include "pub_core_aspacemgr.h" +#include "pub_core_debuglog.h" +#include "pub_core_libcbase.h" +#include "pub_core_libcassert.h" +#include "pub_core_libcprint.h" +#include "pub_core_libcproc.h" +#include "pub_core_libcsignal.h" +#include "pub_core_options.h" +#include "pub_core_scheduler.h" +#include "pub_core_sigframe.h" // For VG_(sigframe_destroy)() +#include "pub_core_signals.h" +#include "pub_core_syscall.h" +#include "pub_core_syswrap.h" +#include "pub_core_tooliface.h" +#include "pub_core_stacks.h" // VG_(register_stack) + +#include "priv_types_n_macros.h" +#include "priv_syswrap-generic.h" /* for decls of generic wrappers */ +#include "priv_syswrap-linux.h" /* for decls of linux-ish wrappers */ +#include "priv_syswrap-main.h" + + +/* --------------------------------------------------------------------- + clone() handling + ------------------------------------------------------------------ */ + +/* Call f(arg1), but first switch stacks, using 'stack' as the new + stack, and use 'retaddr' as f's return-to address. Also, clear all + the integer registers before entering f.*/ +__attribute__((noreturn)) +void ML_(call_on_new_stack_0_1) ( Addr stack, + Addr retaddr, + void (*f)(Word), + Word arg1 ); +// r3 = stack +// r4 = retaddr +// r5 = f +// r6 = arg1 +asm( +".text\n" +".globl vgModuleLocal_call_on_new_stack_0_1\n" +"vgModuleLocal_call_on_new_stack_0_1:\n" +" mr %r1,%r3\n\t" // stack to %sp +" mtlr %r4\n\t" // retaddr to %lr +" mtctr %r5\n\t" // f to count reg +" mr %r3,%r6\n\t" // arg1 to %r3 +" li 0,0\n\t" // zero all GP regs +" li 4,0\n\t" +" li 5,0\n\t" +" li 6,0\n\t" +" li 7,0\n\t" +" li 8,0\n\t" +" li 9,0\n\t" +" li 10,0\n\t" +" li 11,0\n\t" +" li 12,0\n\t" +" li 13,0\n\t" +" li 14,0\n\t" +" li 15,0\n\t" +" li 16,0\n\t" +" li 17,0\n\t" +" li 18,0\n\t" +" li 19,0\n\t" +" li 20,0\n\t" +" li 21,0\n\t" +" li 22,0\n\t" +" li 23,0\n\t" +" li 24,0\n\t" +" li 25,0\n\t" +" li 26,0\n\t" +" li 27,0\n\t" +" li 28,0\n\t" +" li 29,0\n\t" +" li 30,0\n\t" +" li 31,0\n\t" +" mtxer 0\n\t" // CAB: Need this? +" mtcr 0\n\t" // CAB: Need this? +" bctr\n\t" // jump to dst +" trap\n" // should never get here +".previous\n" +); + + +/* + Perform a clone system call. clone is strange because it has + fork()-like return-twice semantics, so it needs special + handling here. + + Upon entry, we have: + + int (fn)(void*) in r3 + void* child_stack in r4 + int flags in r5 + void* arg in r6 + pid_t* child_tid in r7 + pid_t* parent_tid in r8 + void* ??? in r9 + + System call requires: + + int $__NR_clone in r0 (sc number) + int flags in r3 (sc arg1) + void* child_stack in r4 (sc arg2) + pid_t* parent_tid in r5 (sc arg3) + ?? child_tls in r6 (sc arg4) + pid_t* child_tid in r7 (sc arg5) + void* ??? in r8 (sc arg6) + + Returns an Int encoded in the linux-ppc32 way, not a SysRes. + */ +#define __NR_CLONE VG_STRINGIFY(__NR_clone) +#define __NR_EXIT VG_STRINGIFY(__NR_exit) + +extern +ULong do_syscall_clone_ppc32_linux ( Word (*fn)(void *), + void* stack, + Int flags, + void* arg, + Int* child_tid, + Int* parent_tid, + vki_modify_ldt_t * ); +asm( +".text\n" +"do_syscall_clone_ppc32_linux:\n" +" stwu 1,-32(1)\n" +" stw 29,20(1)\n" +" stw 30,24(1)\n" +" stw 31,28(1)\n" +" mr 30,3\n" // preserve fn +" mr 31,6\n" // preserve arg + + // setup child stack +" rlwinm 4,4,0,~0xf\n" // trim sp to multiple of 16 bytes +" li 0,0\n" +" stwu 0,-16(4)\n" // make initial stack frame +" mr 29,4\n" // preserve sp + + // setup syscall +" li 0,"__NR_CLONE"\n" // syscall number +" mr 3,5\n" // syscall arg1: flags + // r4 already setup // syscall arg2: child_stack +" mr 5,8\n" // syscall arg3: parent_tid +" mr 6,2\n" // syscall arg4: REAL THREAD tls +" mr 7,7\n" // syscall arg5: child_tid +" mr 8,8\n" // syscall arg6: ???? +" mr 9,9\n" // syscall arg7: ???? + +" sc\n" // clone() + +" mfcr 4\n" // return CR in r4 (low word of ULong) +" cmpwi 3,0\n" // child if retval == 0 +" bne 1f\n" // jump if !child + + /* CHILD - call thread function */ + /* Note: 2.4 kernel doesn't set the child stack pointer, + so we do it here. + That does leave a small window for a signal to be delivered + on the wrong stack, unfortunately. */ +" mr 1,29\n" +" mtctr 30\n" // ctr reg = fn +" mr 3,31\n" // r3 = arg +" bctrl\n" // call fn() + + // exit with result +" li 0,"__NR_EXIT"\n" +" sc\n" + + // Exit returned?! +" .long 0\n" + + // PARENT or ERROR - return +"1: lwz 29,20(1)\n" +" lwz 30,24(1)\n" +" lwz 31,28(1)\n" +" addi 1,1,32\n" +" blr\n" +".previous\n" +); + +#undef __NR_CLONE +#undef __NR_EXIT + +// forward declarations +static void setup_child ( ThreadArchState*, ThreadArchState* ); + +/* + When a client clones, we need to keep track of the new thread. This means: + 1. allocate a ThreadId+ThreadState+stack for the the thread + + 2. initialize the thread's new VCPU state + + 3. create the thread using the same args as the client requested, + but using the scheduler entrypoint for IP, and a separate stack + for SP. + */ +static SysRes do_clone ( ThreadId ptid, + UInt flags, Addr sp, + Int *parent_tidptr, + Int *child_tidptr, + Addr child_tls) +{ + const Bool debug = False; + + ThreadId ctid = VG_(alloc_ThreadState)(); + ThreadState* ptst = VG_(get_ThreadState)(ptid); + ThreadState* ctst = VG_(get_ThreadState)(ctid); + ULong word64; + UWord* stack; + NSegment const* seg; + SysRes res; + vki_sigset_t blockall, savedmask; + + VG_(sigfillset)(&blockall); + + vg_assert(VG_(is_running_thread)(ptid)); + vg_assert(VG_(is_valid_tid)(ctid)); + + stack = (UWord*)ML_(allocstack)(ctid); + if (stack == NULL) { + res = VG_(mk_SysRes_Error)( VKI_ENOMEM ); + goto out; + } + +//? /* make a stack frame */ +//? stack -= 16; +//? *(UWord *)stack = 0; + + + /* Copy register state + + Both parent and child return to the same place, and the code + following the clone syscall works out which is which, so we + don't need to worry about it. + + The parent gets the child's new tid returned from clone, but the + child gets 0. + + If the clone call specifies a NULL SP for the new thread, then + it actually gets a copy of the parent's SP. + + The child's TLS register (r2) gets set to the tlsaddr argument + if the CLONE_SETTLS flag is set. + */ + setup_child( &ctst->arch, &ptst->arch ); + + /* Make sys_clone appear to have returned Success(0) in the + child. */ + { UInt old_cr = LibVEX_GuestPPC32_get_CR( &ctst->arch.vex ); + /* %r3 = 0 */ + ctst->arch.vex.guest_GPR3 = 0; + /* %cr0.so = 0 */ + LibVEX_GuestPPC32_put_CR( old_cr & ~(1<<28), &ctst->arch.vex ); + } + + if (sp != 0) + ctst->arch.vex.guest_GPR1 = sp; + + ctst->os_state.parent = ptid; + + /* inherit signal mask */ + ctst->sig_mask = ptst->sig_mask; + ctst->tmp_sig_mask = ptst->sig_mask; + + /* We don't really know where the client stack is, because its + allocated by the client. The best we can do is look at the + memory mappings and try to derive some useful information. We + assume that esp starts near its highest possible value, and can + only go down to the start of the mmaped segment. */ + seg = VG_(am_find_nsegment)(sp); + if (seg && seg->kind != SkResvn) { + ctst->client_stack_highest_word = (Addr)VG_PGROUNDUP(sp); + ctst->client_stack_szB = ctst->client_stack_highest_word - seg->start; + + VG_(register_stack)(seg->start, ctst->client_stack_highest_word); + + if (debug) + VG_(printf)("\ntid %d: guessed client stack range %#lx-%#lx\n", + ctid, seg->start, VG_PGROUNDUP(sp)); + } else { + VG_(message)(Vg_UserMsg, "!? New thread %d starts with R1(%#lx) unmapped\n", + ctid, sp); + ctst->client_stack_szB = 0; + } + + /* Assume the clone will succeed, and tell any tool that wants to + know that this thread has come into existence. If the clone + fails, we'll send out a ll_exit notification for it at the out: + label below, to clean up. */ + VG_TRACK ( pre_thread_ll_create, ptid, ctid ); + + if (flags & VKI_CLONE_SETTLS) { + if (debug) + VG_(printf)("clone child has SETTLS: tls at %#lx\n", child_tls); + ctst->arch.vex.guest_GPR2 = child_tls; + } + + flags &= ~VKI_CLONE_SETTLS; + + /* start the thread with everything blocked */ + VG_(sigprocmask)(VKI_SIG_SETMASK, &blockall, &savedmask); + + /* Create the new thread */ + word64 = do_syscall_clone_ppc32_linux( + ML_(start_thread_NORETURN), stack, flags, &VG_(threads)[ctid], + child_tidptr, parent_tidptr, NULL + ); + /* High half word64 is syscall return value. Low half is + the entire CR, from which we need to extract CR0.SO. */ + /* VG_(printf)("word64 = 0x%llx\n", word64); */ + res = VG_(mk_SysRes_ppc32_linux)( + /*val*/(UInt)(word64 >> 32), + /*errflag*/ (((UInt)word64) >> 28) & 1 + ); + + VG_(sigprocmask)(VKI_SIG_SETMASK, &savedmask, NULL); + + out: + if (res.isError) { + /* clone failed */ + VG_(cleanup_thread)(&ctst->arch); + ctst->status = VgTs_Empty; + /* oops. Better tell the tool the thread exited in a hurry :-) */ + VG_TRACK( pre_thread_ll_exit, ctid ); + } + + return res; +} + + + +/* --------------------------------------------------------------------- + More thread stuff + ------------------------------------------------------------------ */ + +void VG_(cleanup_thread) ( ThreadArchState* arch ) +{ +} + +void setup_child ( /*OUT*/ ThreadArchState *child, + /*IN*/ ThreadArchState *parent ) +{ + /* We inherit our parent's guest state. */ + child->vex = parent->vex; + child->vex_shadow1 = parent->vex_shadow1; + child->vex_shadow2 = parent->vex_shadow2; +} + + +/* --------------------------------------------------------------------- + PRE/POST wrappers for ppc32/Linux-specific syscalls + ------------------------------------------------------------------ */ + +#define PRE(name) DEFN_PRE_TEMPLATE(ppc32_linux, name) +#define POST(name) DEFN_POST_TEMPLATE(ppc32_linux, name) + +/* Add prototypes for the wrappers declared here, so that gcc doesn't + harass us for not having prototypes. Really this is a kludge -- + the right thing to do is to make these wrappers 'static' since they + aren't visible outside this file, but that requires even more macro + magic. */ + +DECL_TEMPLATE(ppc32_linux, sys_socketcall); +DECL_TEMPLATE(ppc32_linux, sys_mmap); +DECL_TEMPLATE(ppc32_linux, sys_mmap2); +DECL_TEMPLATE(ppc32_linux, sys_stat64); +DECL_TEMPLATE(ppc32_linux, sys_lstat64); +DECL_TEMPLATE(ppc32_linux, sys_fstatat64); +DECL_TEMPLATE(ppc32_linux, sys_fstat64); +DECL_TEMPLATE(ppc32_linux, sys_ipc); +DECL_TEMPLATE(ppc32_linux, sys_clone); +DECL_TEMPLATE(ppc32_linux, sys_sigreturn); +DECL_TEMPLATE(ppc32_linux, sys_rt_sigreturn); +DECL_TEMPLATE(ppc32_linux, sys_sigaction); +DECL_TEMPLATE(ppc32_linux, sys_sigsuspend); +DECL_TEMPLATE(ppc32_linux, sys_spu_create); +DECL_TEMPLATE(ppc32_linux, sys_spu_run); + +PRE(sys_socketcall) +{ +# define ARG2_0 (((UWord*)ARG2)[0]) +# define ARG2_1 (((UWord*)ARG2)[1]) +# define ARG2_2 (((UWord*)ARG2)[2]) +# define ARG2_3 (((UWord*)ARG2)[3]) +# define ARG2_4 (((UWord*)ARG2)[4]) +# define ARG2_5 (((UWord*)ARG2)[5]) + + *flags |= SfMayBlock; + PRINT("sys_socketcall ( %ld, %#lx )",ARG1,ARG2); + PRE_REG_READ2(long, "socketcall", int, call, unsigned long *, args); + + switch (ARG1 /* request */) { + + case VKI_SYS_SOCKETPAIR: + /* int socketpair(int d, int type, int protocol, int sv[2]); */ + PRE_MEM_READ( "socketcall.socketpair(args)", ARG2, 4*sizeof(Addr) ); + ML_(generic_PRE_sys_socketpair)( tid, ARG2_0, ARG2_1, ARG2_2, ARG2_3 ); + break; + + case VKI_SYS_SOCKET: + /* int socket(int domain, int type, int protocol); */ + PRE_MEM_READ( "socketcall.socket(args)", ARG2, 3*sizeof(Addr) ); + break; + + case VKI_SYS_BIND: + /* int bind(int sockfd, struct sockaddr *my_addr, + int addrlen); */ + PRE_MEM_READ( "socketcall.bind(args)", ARG2, 3*sizeof(Addr) ); + ML_(generic_PRE_sys_bind)( tid, ARG2_0, ARG2_1, ARG2_2 ); + break; + + case VKI_SYS_LISTEN: + /* int listen(int s, int backlog); */ + PRE_MEM_READ( "socketcall.listen(args)", ARG2, 2*sizeof(Addr) ); + break; + + case VKI_SYS_ACCEPT: { + /* int accept(int s, struct sockaddr *addr, int *addrlen); */ + PRE_MEM_READ( "socketcall.accept(args)", ARG2, 3*sizeof(Addr) ); + ML_(generic_PRE_sys_accept)( tid, ARG2_0, ARG2_1, ARG2_2 ); + break; + } + + case VKI_SYS_SENDTO: + /* int sendto(int s, const void *msg, int len, + unsigned int flags, + const struct sockaddr *to, int tolen); */ + PRE_MEM_READ( "socketcall.sendto(args)", ARG2, 6*sizeof(Addr) ); + ML_(generic_PRE_sys_sendto)( tid, ARG2_0, ARG2_1, ARG2_2, + ARG2_3, ARG2_4, ARG2_5 ); + break; + + case VKI_SYS_SEND: + /* int send(int s, const void *msg, size_t len, int flags); */ + PRE_MEM_READ( "socketcall.send(args)", ARG2, 4*sizeof(Addr) ); + ML_(generic_PRE_sys_send)( tid, ARG2_0, ARG2_1, ARG2_2 ); + break; + + case VKI_SYS_RECVFROM: + /* int recvfrom(int s, void *buf, int len, unsigned int flags, + struct sockaddr *from, int *fromlen); */ + PRE_MEM_READ( "socketcall.recvfrom(args)", ARG2, 6*sizeof(Addr) ); + ML_(generic_PRE_sys_recvfrom)( tid, ARG2_0, ARG2_1, ARG2_2, + ARG2_3, ARG2_4, ARG2_5 ); + break; + + case VKI_SYS_RECV: + /* int recv(int s, void *buf, int len, unsigned int flags); */ + /* man 2 recv says: + The recv call is normally used only on a connected socket + (see connect(2)) and is identical to recvfrom with a NULL + from parameter. + */ + PRE_MEM_READ( "socketcall.recv(args)", ARG2, 4*sizeof(Addr) ); + ML_(generic_PRE_sys_recv)( tid, ARG2_0, ARG2_1, ARG2_2 ); + break; + + case VKI_SYS_CONNECT: + /* int connect(int sockfd, + struct sockaddr *serv_addr, int addrlen ); */ + PRE_MEM_READ( "socketcall.connect(args)", ARG2, 3*sizeof(Addr) ); + ML_(generic_PRE_sys_connect)( tid, ARG2_0, ARG2_1, ARG2_2 ); + break; + + case VKI_SYS_SETSOCKOPT: + /* int setsockopt(int s, int level, int optname, + const void *optval, int optlen); */ + PRE_MEM_READ( "socketcall.setsockopt(args)", ARG2, 5*sizeof(Addr) ); + ML_(generic_PRE_sys_setsockopt)( tid, ARG2_0, ARG2_1, ARG2_2, + ARG2_3, ARG2_4 ); + break; + + case VKI_SYS_GETSOCKOPT: + /* int getsockopt(int s, int level, int optname, + void *optval, socklen_t *optlen); */ + PRE_MEM_READ( "socketcall.getsockopt(args)", ARG2, 5*sizeof(Addr) ); + ML_(linux_PRE_sys_getsockopt)( tid, ARG2_0, ARG2_1, ARG2_2, + ARG2_3, ARG2_4 ); + break; + + case VKI_SYS_GETSOCKNAME: + /* int getsockname(int s, struct sockaddr* name, int* namelen) */ + PRE_MEM_READ( "socketcall.getsockname(args)", ARG2, 3*sizeof(Addr) ); + ML_(generic_PRE_sys_getsockname)( tid, ARG2_0, ARG2_1, ARG2_2 ); + break; + + case VKI_SYS_GETPEERNAME: + /* int getpeername(int s, struct sockaddr* name, int* namelen) */ + PRE_MEM_READ( "socketcall.getpeername(args)", ARG2, 3*sizeof(Addr) ); + ML_(generic_PRE_sys_getpeername)( tid, ARG2_0, ARG2_1, ARG2_2 ); + break; + + case VKI_SYS_SHUTDOWN: + /* int shutdown(int s, int how); */ + PRE_MEM_READ( "socketcall.shutdown(args)", ARG2, 2*sizeof(Addr) ); + break; + + case VKI_SYS_SENDMSG: { + /* int sendmsg(int s, const struct msghdr *msg, int flags); */ + + /* this causes warnings, and I don't get why. glibc bug? + * (after all it's glibc providing the arguments array) + PRE_MEM_READ( "socketcall.sendmsg(args)", ARG2, 3*sizeof(Addr) ); + */ + ML_(generic_PRE_sys_sendmsg)( tid, ARG2_0, ARG2_1 ); + break; + } + + case VKI_SYS_RECVMSG: { + /* int recvmsg(int s, struct msghdr *msg, int flags); */ + + /* this causes warnings, and I don't get why. glibc bug? + * (after all it's glibc providing the arguments array) + PRE_MEM_READ("socketcall.recvmsg(args)", ARG2, 3*sizeof(Addr) ); + */ + ML_(generic_PRE_sys_recvmsg)( tid, ARG2_0, ARG2_1 ); + break; + } + + default: + VG_(message)(Vg_DebugMsg,"Warning: unhandled socketcall 0x%lx",ARG1); + SET_STATUS_Failure( VKI_EINVAL ); + break; + } +# undef ARG2_0 +# undef ARG2_1 +# undef ARG2_2 +# undef ARG2_3 +# undef ARG2_4 +# undef ARG2_5 +} + +POST(sys_socketcall) +{ +# define ARG2_0 (((UWord*)ARG2)[0]) +# define ARG2_1 (((UWord*)ARG2)[1]) +# define ARG2_2 (((UWord*)ARG2)[2]) +# define ARG2_3 (((UWord*)ARG2)[3]) +# define ARG2_4 (((UWord*)ARG2)[4]) +# define ARG2_5 (((UWord*)ARG2)[5]) + + SysRes r; + vg_assert(SUCCESS); + switch (ARG1 /* request */) { + + case VKI_SYS_SOCKETPAIR: + r = ML_(generic_POST_sys_socketpair)( + tid, VG_(mk_SysRes_Success)(RES), + ARG2_0, ARG2_1, ARG2_2, ARG2_3 + ); + SET_STATUS_from_SysRes(r); + break; + + case VKI_SYS_SOCKET: + r = ML_(generic_POST_sys_socket)( tid, VG_(mk_SysRes_Success)(RES) ); + SET_STATUS_from_SysRes(r); + break; + + case VKI_SYS_BIND: + /* int bind(int sockfd, struct sockaddr *my_addr, + int addrlen); */ + break; + + case VKI_SYS_LISTEN: + /* int listen(int s, int backlog); */ + break; + + case VKI_SYS_ACCEPT: + /* int accept(int s, struct sockaddr *addr, int *addrlen); */ + r = ML_(generic_POST_sys_accept)( tid, VG_(mk_SysRes_Success)(RES), + ARG2_0, ARG2_1, ARG2_2 ); + SET_STATUS_from_SysRes(r); + break; + + case VKI_SYS_SENDTO: + break; + + case VKI_SYS_SEND: + break; + + case VKI_SYS_RECVFROM: + ML_(generic_POST_sys_recvfrom)( tid, VG_(mk_SysRes_Success)(RES), + ARG2_0, ARG2_1, ARG2_2, + ARG2_3, ARG2_4, ARG2_5 ); + break; + + case VKI_SYS_RECV: + ML_(generic_POST_sys_recv)( tid, RES, ARG2_0, ARG2_1, ARG2_2 ); + break; + + case VKI_SYS_CONNECT: + break; + + case VKI_SYS_SETSOCKOPT: + break; + + case VKI_SYS_GETSOCKOPT: + ML_(linux_POST_sys_getsockopt)( tid, VG_(mk_SysRes_Success)(RES), + ARG2_0, ARG2_1, + ARG2_2, ARG2_3, ARG2_4 ); + break; + + case VKI_SYS_GETSOCKNAME: + ML_(generic_POST_sys_getsockname)( tid, VG_(mk_SysRes_Success)(RES), + ARG2_0, ARG2_1, ARG2_2 ); + break; + + case VKI_SYS_GETPEERNAME: + ML_(generic_POST_sys_getpeername)( tid, VG_(mk_SysRes_Success)(RES), + ARG2_0, ARG2_1, ARG2_2 ); + break; + + case VKI_SYS_SHUTDOWN: + break; + + case VKI_SYS_SENDMSG: + break; + + case VKI_SYS_RECVMSG: + ML_(generic_POST_sys_recvmsg)( tid, ARG2_0, ARG2_1 ); + break; + + default: + VG_(message)(Vg_DebugMsg,"FATAL: unhandled socketcall 0x%lx",ARG1); + VG_(core_panic)("... bye!\n"); + break; /*NOTREACHED*/ + } +# undef ARG2_0 +# undef ARG2_1 +# undef ARG2_2 +# undef ARG2_3 +# undef ARG2_4 +# undef ARG2_5 +} + +PRE(sys_mmap) +{ + SysRes r; + + PRINT("sys_mmap ( %#lx, %llu, %ld, %ld, %ld, %ld )", + ARG1, (ULong)ARG2, ARG3, ARG4, ARG5, ARG6 ); + PRE_REG_READ6(long, "mmap", + unsigned long, start, unsigned long, length, + unsigned long, prot, unsigned long, flags, + unsigned long, fd, unsigned long, offset); + + r = ML_(generic_PRE_sys_mmap)( tid, ARG1, ARG2, ARG3, ARG4, ARG5, + (Off64T)ARG6 ); + SET_STATUS_from_SysRes(r); +} + +PRE(sys_mmap2) +{ + SysRes r; + + // Exactly like old_mmap() except: + // - the file offset is specified in 4K units rather than bytes, + // so that it can be used for files bigger than 2^32 bytes. + PRINT("sys_mmap2 ( %#lx, %llu, %ld, %ld, %ld, %ld )", + ARG1, (ULong)ARG2, ARG3, ARG4, ARG5, ARG6 ); + PRE_REG_READ6(long, "mmap2", + unsigned long, start, unsigned long, length, + unsigned long, prot, unsigned long, flags, + unsigned long, fd, unsigned long, offset); + + r = ML_(generic_PRE_sys_mmap)( tid, ARG1, ARG2, ARG3, ARG4, ARG5, + 4096 * (Off64T)ARG6 ); + SET_STATUS_from_SysRes(r); +} + +// XXX: lstat64/fstat64/stat64 are generic, but not necessarily +// applicable to every architecture -- I think only to 32-bit archs. +// We're going to need something like linux/core_os32.h for such +// things, eventually, I think. --njn +PRE(sys_stat64) +{ + PRINT("sys_stat64 ( %#lx, %#lx )",ARG1,ARG2); + PRE_REG_READ2(long, "stat64", char *, file_name, struct stat64 *, buf); + PRE_MEM_RASCIIZ( "stat64(file_name)", ARG1 ); + PRE_MEM_WRITE( "stat64(buf)", ARG2, sizeof(struct vki_stat64) ); +} + +POST(sys_stat64) +{ + POST_MEM_WRITE( ARG2, sizeof(struct vki_stat64) ); +} + +PRE(sys_lstat64) +{ + PRINT("sys_lstat64 ( %#lx(%s), %#lx )",ARG1,(char*)ARG1,ARG2); + PRE_REG_READ2(long, "lstat64", char *, file_name, struct stat64 *, buf); + PRE_MEM_RASCIIZ( "lstat64(file_name)", ARG1 ); + PRE_MEM_WRITE( "lstat64(buf)", ARG2, sizeof(struct vki_stat64) ); +} + +POST(sys_lstat64) +{ + vg_assert(SUCCESS); + if (RES == 0) { + POST_MEM_WRITE( ARG2, sizeof(struct vki_stat64) ); + } +} + +PRE(sys_fstatat64) +{ + PRINT("sys_fstatat64 ( %ld, %#lx(%s), %#lx )",ARG1,ARG2,(char*)ARG2,ARG3); + PRE_REG_READ3(long, "fstatat64", + int, dfd, char *, file_name, struct stat64 *, buf); + PRE_MEM_RASCIIZ( "fstatat64(file_name)", ARG2 ); + PRE_MEM_WRITE( "fstatat64(buf)", ARG3, sizeof(struct vki_stat64) ); +} + +POST(sys_fstatat64) +{ + POST_MEM_WRITE( ARG3, sizeof(struct vki_stat64) ); +} + +PRE(sys_fstat64) +{ + PRINT("sys_fstat64 ( %ld, %#lx )",ARG1,ARG2); + PRE_REG_READ2(long, "fstat64", unsigned long, fd, struct stat64 *, buf); + PRE_MEM_WRITE( "fstat64(buf)", ARG2, sizeof(struct vki_stat64) ); +} + +POST(sys_fstat64) +{ + POST_MEM_WRITE( ARG2, sizeof(struct vki_stat64) ); +} + +static Addr deref_Addr ( ThreadId tid, Addr a, Char* s ) +{ + Addr* a_p = (Addr*)a; + PRE_MEM_READ( s, (Addr)a_p, sizeof(Addr) ); + return *a_p; +} + +PRE(sys_ipc) +{ + PRINT("sys_ipc ( %ld, %ld, %ld, %ld, %#lx, %ld )", ARG1,ARG2,ARG3,ARG4,ARG5,ARG6); + // XXX: this is simplistic -- some args are not used in all circumstances. + PRE_REG_READ6(int, "ipc", + vki_uint, call, int, first, int, second, int, third, + void *, ptr, long, fifth) + + switch (ARG1 /* call */) { + case VKI_SEMOP: + ML_(generic_PRE_sys_semop)( tid, ARG2, ARG5, ARG3 ); + *flags |= SfMayBlock; + break; + case VKI_SEMGET: + break; + case VKI_SEMCTL: + { + UWord arg = deref_Addr( tid, ARG5, "semctl(arg)" ); + ML_(generic_PRE_sys_semctl)( tid, ARG2, ARG3, ARG4, arg ); + break; + } + case VKI_SEMTIMEDOP: + ML_(generic_PRE_sys_semtimedop)( tid, ARG2, ARG5, ARG3, ARG6 ); + *flags |= SfMayBlock; + break; + case VKI_MSGSND: + ML_(linux_PRE_sys_msgsnd)( tid, ARG2, ARG5, ARG3, ARG4 ); + if ((ARG4 & VKI_IPC_NOWAIT) == 0) + *flags |= SfMayBlock; + break; + case VKI_MSGRCV: + { + Addr msgp; + Word msgtyp; + + msgp = deref_Addr( tid, + (Addr) (&((struct vki_ipc_kludge *)ARG5)->msgp), + "msgrcv(msgp)" ); + msgtyp = deref_Addr( tid, + (Addr) (&((struct vki_ipc_kludge *)ARG5)->msgtyp), + "msgrcv(msgp)" ); + + ML_(linux_PRE_sys_msgrcv)( tid, ARG2, msgp, ARG3, msgtyp, ARG4 ); + + if ((ARG4 & VKI_IPC_NOWAIT) == 0) + *flags |= SfMayBlock; + break; + } + case VKI_MSGGET: + break; + case VKI_MSGCTL: + ML_(linux_PRE_sys_msgctl)( tid, ARG2, ARG3, ARG5 ); + break; + case VKI_SHMAT: + { + UWord w; + PRE_MEM_WRITE( "shmat(raddr)", ARG4, sizeof(Addr) ); + w = ML_(generic_PRE_sys_shmat)( tid, ARG2, ARG5, ARG3 ); + if (w == 0) + SET_STATUS_Failure( VKI_EINVAL ); + else + ARG5 = w; + break; + } + case VKI_SHMDT: + if (!ML_(generic_PRE_sys_shmdt)(tid, ARG5)) + SET_STATUS_Failure( VKI_EINVAL ); + break; + case VKI_SHMGET: + break; + case VKI_SHMCTL: /* IPCOP_shmctl */ + ML_(generic_PRE_sys_shmctl)( tid, ARG2, ARG3, ARG5 ); + break; + default: + VG_(message)(Vg_DebugMsg, "FATAL: unhandled syscall(ipc) %ld", ARG1 ); + VG_(core_panic)("... bye!\n"); + break; /*NOTREACHED*/ + } +} + +POST(sys_ipc) +{ + vg_assert(SUCCESS); + switch (ARG1 /* call */) { + case VKI_SEMOP: + case VKI_SEMGET: + break; + case VKI_SEMCTL: + { + UWord arg = deref_Addr( tid, ARG5, "semctl(arg)" ); + ML_(generic_PRE_sys_semctl)( tid, ARG2, ARG3, ARG4, arg ); + break; + } + case VKI_SEMTIMEDOP: + case VKI_MSGSND: + break; + case VKI_MSGRCV: + { + Addr msgp; + Word msgtyp; + + msgp = deref_Addr( tid, + (Addr) (&((struct vki_ipc_kludge *)ARG5)->msgp), + "msgrcv(msgp)" ); + msgtyp = deref_Addr( tid, + (Addr) (&((struct vki_ipc_kludge *)ARG5)->msgtyp), + "msgrcv(msgp)" ); + + ML_(linux_POST_sys_msgrcv)( tid, RES, ARG2, msgp, ARG3, msgtyp, ARG4 ); + break; + } + case VKI_MSGGET: + break; + case VKI_MSGCTL: + ML_(linux_POST_sys_msgctl)( tid, RES, ARG2, ARG3, ARG5 ); + break; + case VKI_SHMAT: + { + Addr addr; + + /* force readability. before the syscall it is + * indeed uninitialized, as can be seen in + * glibc/sysdeps/unix/sysv/linux/shmat.c */ + POST_MEM_WRITE( ARG4, sizeof( Addr ) ); + + addr = deref_Addr ( tid, ARG4, "shmat(addr)" ); + ML_(generic_POST_sys_shmat)( tid, addr, ARG2, ARG5, ARG3 ); + break; + } + case VKI_SHMDT: + ML_(generic_POST_sys_shmdt)( tid, RES, ARG5 ); + break; + case VKI_SHMGET: + break; + case VKI_SHMCTL: + ML_(generic_POST_sys_shmctl)( tid, RES, ARG2, ARG3, ARG5 ); + break; + default: + VG_(message)(Vg_DebugMsg, + "FATAL: unhandled syscall(ipc) %ld", + ARG1 ); + VG_(core_panic)("... bye!\n"); + break; /*NOTREACHED*/ + } +} + + + + +//.. PRE(old_select, MayBlock) +//.. { +//.. /* struct sel_arg_struct { +//.. unsigned long n; +//.. fd_set *inp, *outp, *exp; +//.. struct timeval *tvp; +//.. }; +//.. */ +//.. PRE_REG_READ1(long, "old_select", struct sel_arg_struct *, args); +//.. PRE_MEM_READ( "old_select(args)", ARG1, 5*sizeof(UWord) ); +//.. +//.. { +//.. UInt* arg_struct = (UInt*)ARG1; +//.. UInt a1, a2, a3, a4, a5; +//.. +//.. a1 = arg_struct[0]; +//.. a2 = arg_struct[1]; +//.. a3 = arg_struct[2]; +//.. a4 = arg_struct[3]; +//.. a5 = arg_struct[4]; +//.. +//.. PRINT("old_select ( %d, %p, %p, %p, %p )", a1,a2,a3,a4,a5); +//.. if (a2 != (Addr)NULL) +//.. PRE_MEM_READ( "old_select(readfds)", a2, a1/8 /* __FD_SETSIZE/8 */ ); +//.. if (a3 != (Addr)NULL) +//.. PRE_MEM_READ( "old_select(writefds)", a3, a1/8 /* __FD_SETSIZE/8 */ ); +//.. if (a4 != (Addr)NULL) +//.. PRE_MEM_READ( "old_select(exceptfds)", a4, a1/8 /* __FD_SETSIZE/8 */ ); +//.. if (a5 != (Addr)NULL) +//.. PRE_MEM_READ( "old_select(timeout)", a5, sizeof(struct vki_timeval) ); +//.. } +//.. } + +PRE(sys_clone) +{ + UInt cloneflags; + + PRINT("sys_clone ( %lx, %#lx, %#lx, %#lx, %#lx )",ARG1,ARG2,ARG3,ARG4,ARG5); + PRE_REG_READ5(int, "clone", + unsigned long, flags, + void *, child_stack, + int *, parent_tidptr, + void *, child_tls, + int *, child_tidptr); + + if (ARG1 & VKI_CLONE_PARENT_SETTID) { + PRE_MEM_WRITE("clone(parent_tidptr)", ARG3, sizeof(Int)); + if (!VG_(am_is_valid_for_client)(ARG3, sizeof(Int), + VKI_PROT_WRITE)) { + SET_STATUS_Failure( VKI_EFAULT ); + return; + } + } + if (ARG1 & (VKI_CLONE_CHILD_SETTID | VKI_CLONE_CHILD_CLEARTID)) { + PRE_MEM_WRITE("clone(child_tidptr)", ARG5, sizeof(Int)); + if (!VG_(am_is_valid_for_client)(ARG5, sizeof(Int), + VKI_PROT_WRITE)) { + SET_STATUS_Failure( VKI_EFAULT ); + return; + } + } + + cloneflags = ARG1; + + if (!ML_(client_signal_OK)(ARG1 & VKI_CSIGNAL)) { + SET_STATUS_Failure( VKI_EINVAL ); + return; + } + + /* Only look at the flags we really care about */ + switch (cloneflags & (VKI_CLONE_VM | VKI_CLONE_FS + | VKI_CLONE_FILES | VKI_CLONE_VFORK)) { + case VKI_CLONE_VM | VKI_CLONE_FS | VKI_CLONE_FILES: + /* thread creation */ + SET_STATUS_from_SysRes( + do_clone(tid, + ARG1, /* flags */ + (Addr)ARG2, /* child SP */ + (Int *)ARG3, /* parent_tidptr */ + (Int *)ARG5, /* child_tidptr */ + (Addr)ARG4)); /* child_tls */ + break; + + case VKI_CLONE_VFORK | VKI_CLONE_VM: /* vfork */ + /* FALLTHROUGH - assume vfork == fork */ + cloneflags &= ~(VKI_CLONE_VFORK | VKI_CLONE_VM); + + case 0: /* plain fork */ + SET_STATUS_from_SysRes( + ML_(do_fork_clone)(tid, + cloneflags, /* flags */ + (Int *)ARG3, /* parent_tidptr */ + (Int *)ARG5)); /* child_tidptr */ + break; + + default: + /* should we just ENOSYS? */ + VG_(message)(Vg_UserMsg, "Unsupported clone() flags: 0x%lx", ARG1); + VG_(message)(Vg_UserMsg, ""); + VG_(message)(Vg_UserMsg, "The only supported clone() uses are:"); + VG_(message)(Vg_UserMsg, " - via a threads library (LinuxThreads or NPTL)"); + VG_(message)(Vg_UserMsg, " - via the implementation of fork or vfork"); + VG_(unimplemented) + ("Valgrind does not support general clone()."); + } + + if (SUCCESS) { + if (ARG1 & VKI_CLONE_PARENT_SETTID) + POST_MEM_WRITE(ARG3, sizeof(Int)); + if (ARG1 & (VKI_CLONE_CHILD_SETTID | VKI_CLONE_CHILD_CLEARTID)) + POST_MEM_WRITE(ARG5, sizeof(Int)); + + /* Thread creation was successful; let the child have the chance + to run */ + *flags |= SfYieldAfter; + } +} + +PRE(sys_sigreturn) +{ + /* See comments on PRE(sys_rt_sigreturn) in syswrap-amd64-linux.c for + an explanation of what follows. */ + + ThreadState* tst; + PRINT("sys_sigreturn ( )"); + + vg_assert(VG_(is_valid_tid)(tid)); + vg_assert(tid >= 1 && tid < VG_N_THREADS); + vg_assert(VG_(is_running_thread)(tid)); + + ///* Adjust esp to point to start of frame; skip back up over + // sigreturn sequence's "popl %eax" and handler ret addr */ + tst = VG_(get_ThreadState)(tid); + //tst->arch.vex.guest_ESP -= sizeof(Addr)+sizeof(Word); + // Should we do something equivalent on ppc32? Who knows. + + ///* This is only so that the EIP is (might be) useful to report if + // something goes wrong in the sigreturn */ + //ML_(fixup_guest_state_to_restart_syscall)(&tst->arch); + // Should we do something equivalent on ppc32? Who knows. + + /* Restore register state from frame and remove it */ + VG_(sigframe_destroy)(tid, False); + + /* Tell the driver not to update the guest state with the "result", + and set a bogus result to keep it happy. */ + *flags |= SfNoWriteResult; + SET_STATUS_Success(0); + + /* Check to see if any signals arose as a result of this. */ + *flags |= SfPollAfter; +} + +PRE(sys_rt_sigreturn) +{ + /* See comments on PRE(sys_rt_sigreturn) in syswrap-amd64-linux.c for + an explanation of what follows. */ + + ThreadState* tst; + PRINT("rt_sigreturn ( )"); + + vg_assert(VG_(is_valid_tid)(tid)); + vg_assert(tid >= 1 && tid < VG_N_THREADS); + vg_assert(VG_(is_running_thread)(tid)); + + ///* Adjust esp to point to start of frame; skip back up over handler + // ret addr */ + tst = VG_(get_ThreadState)(tid); + //tst->arch.vex.guest_ESP -= sizeof(Addr); + // Should we do something equivalent on ppc32? Who knows. + + ///* This is only so that the EIP is (might be) useful to report if + // something goes wrong in the sigreturn */ + //ML_(fixup_guest_state_to_restart_syscall)(&tst->arch); + // Should we do something equivalent on ppc32? Who knows. + + /* Restore register state from frame and remove it */ + VG_(sigframe_destroy)(tid, True); + + /* Tell the driver not to update the guest state with the "result", + and set a bogus result to keep it happy. */ + *flags |= SfNoWriteResult; + SET_STATUS_Success(0); + + /* Check to see if any signals arose as a result of this. */ + *flags |= SfPollAfter; +} + + +//.. PRE(sys_modify_ldt, Special) +//.. { +//.. PRINT("sys_modify_ldt ( %d, %p, %d )", ARG1,ARG2,ARG3); +//.. PRE_REG_READ3(int, "modify_ldt", int, func, void *, ptr, +//.. unsigned long, bytecount); +//.. +//.. if (ARG1 == 0) { +//.. /* read the LDT into ptr */ +//.. PRE_MEM_WRITE( "modify_ldt(ptr)", ARG2, ARG3 ); +//.. } +//.. if (ARG1 == 1 || ARG1 == 0x11) { +//.. /* write the LDT with the entry pointed at by ptr */ +//.. PRE_MEM_READ( "modify_ldt(ptr)", ARG2, sizeof(vki_modify_ldt_t) ); +//.. } +//.. /* "do" the syscall ourselves; the kernel never sees it */ +//.. SET_RESULT( VG_(sys_modify_ldt)( tid, ARG1, (void*)ARG2, ARG3 ) ); +//.. +//.. if (ARG1 == 0 && !VG_(is_kerror)(RES) && RES > 0) { +//.. POST_MEM_WRITE( ARG2, RES ); +//.. } +//.. } + +//.. PRE(sys_set_thread_area, Special) +//.. { +//.. PRINT("sys_set_thread_area ( %p )", ARG1); +//.. PRE_REG_READ1(int, "set_thread_area", struct user_desc *, u_info) +//.. PRE_MEM_READ( "set_thread_area(u_info)", ARG1, sizeof(vki_modify_ldt_t) ); +//.. +//.. /* "do" the syscall ourselves; the kernel never sees it */ +//.. SET_RESULT( VG_(sys_set_thread_area)( tid, (void *)ARG1 ) ); +//.. } + +//.. PRE(sys_get_thread_area, Special) +//.. { +//.. PRINT("sys_get_thread_area ( %p )", ARG1); +//.. PRE_REG_READ1(int, "get_thread_area", struct user_desc *, u_info) +//.. PRE_MEM_WRITE( "get_thread_area(u_info)", ARG1, sizeof(vki_modify_ldt_t) ); +//.. +//.. /* "do" the syscall ourselves; the kernel never sees it */ +//.. SET_RESULT( VG_(sys_get_thread_area)( tid, (void *)ARG1 ) ); +//.. +//.. if (!VG_(is_kerror)(RES)) { +//.. POST_MEM_WRITE( ARG1, sizeof(vki_modify_ldt_t) ); +//.. } +//.. } + +//.. // Parts of this are ppc32-specific, but the *PEEK* cases are generic. +//.. // XXX: Why is the memory pointed to by ARG3 never checked? +//.. PRE(sys_ptrace, 0) +//.. { +//.. PRINT("sys_ptrace ( %d, %d, %p, %p )", ARG1,ARG2,ARG3,ARG4); +//.. PRE_REG_READ4(int, "ptrace", +//.. long, request, long, pid, long, addr, long, data); +//.. switch (ARG1) { +//.. case VKI_PTRACE_PEEKTEXT: +//.. case VKI_PTRACE_PEEKDATA: +//.. case VKI_PTRACE_PEEKUSR: +//.. PRE_MEM_WRITE( "ptrace(peek)", ARG4, +//.. sizeof (long)); +//.. break; +//.. case VKI_PTRACE_GETREGS: +//.. PRE_MEM_WRITE( "ptrace(getregs)", ARG4, +//.. sizeof (struct vki_user_regs_struct)); +//.. break; +//.. case VKI_PTRACE_GETFPREGS: +//.. PRE_MEM_WRITE( "ptrace(getfpregs)", ARG4, +//.. sizeof (struct vki_user_i387_struct)); +//.. break; +//.. case VKI_PTRACE_GETFPXREGS: +//.. PRE_MEM_WRITE( "ptrace(getfpxregs)", ARG4, +//.. sizeof(struct vki_user_fxsr_struct) ); +//.. break; +//.. case VKI_PTRACE_SETREGS: +//.. PRE_MEM_READ( "ptrace(setregs)", ARG4, +//.. sizeof (struct vki_user_regs_struct)); +//.. break; +//.. case VKI_PTRACE_SETFPREGS: +//.. PRE_MEM_READ( "ptrace(setfpregs)", ARG4, +//.. sizeof (struct vki_user_i387_struct)); +//.. break; +//.. case VKI_PTRACE_SETFPXREGS: +//.. PRE_MEM_READ( "ptrace(setfpxregs)", ARG4, +//.. sizeof(struct vki_user_fxsr_struct) ); +//.. break; +//.. default: +//.. break; +//.. } +//.. } + +//.. POST(sys_ptrace) +//.. { +//.. switch (ARG1) { +//.. case VKI_PTRACE_PEEKTEXT: +//.. case VKI_PTRACE_PEEKDATA: +//.. case VKI_PTRACE_PEEKUSR: +//.. POST_MEM_WRITE( ARG4, sizeof (long)); +//.. break; +//.. case VKI_PTRACE_GETREGS: +//.. POST_MEM_WRITE( ARG4, sizeof (struct vki_user_regs_struct)); +//.. break; +//.. case VKI_PTRACE_GETFPREGS: +//.. POST_MEM_WRITE( ARG4, sizeof (struct vki_user_i387_struct)); +//.. break; +//.. case VKI_PTRACE_GETFPXREGS: +//.. POST_MEM_WRITE( ARG4, sizeof(struct vki_user_fxsr_struct) ); +//.. break; +//.. default: +//.. break; +//.. } +//.. } + +//.. // XXX: this duplicates a function in coregrind/vg_syscalls.c, yuk +//.. static Addr deref_Addr ( ThreadId tid, Addr a, Char* s ) +//.. { +//.. Addr* a_p = (Addr*)a; +//.. PRE_MEM_READ( s, (Addr)a_p, sizeof(Addr) ); +//.. return *a_p; +//.. } + +//.. // XXX: should use the constants here (eg. SHMAT), not the numbers directly! +//.. PRE(sys_ipc, 0) +//.. { +//.. PRINT("sys_ipc ( %d, %d, %d, %d, %p, %d )", ARG1,ARG2,ARG3,ARG4,ARG5,ARG6); +//.. // XXX: this is simplistic -- some args are not used in all circumstances. +//.. PRE_REG_READ6(int, "ipc", +//.. vki_uint, call, int, first, int, second, int, third, +//.. void *, ptr, long, fifth) +//.. +//.. switch (ARG1 /* call */) { +//.. case VKI_SEMOP: +//.. ML_(generic_PRE_sys_semop)( tid, ARG2, ARG5, ARG3 ); +//.. /* tst->sys_flags |= MayBlock; */ +//.. break; +//.. case VKI_SEMGET: +//.. break; +//.. case VKI_SEMCTL: +//.. { +//.. UWord arg = deref_Addr( tid, ARG5, "semctl(arg)" ); +//.. ML_(generic_PRE_sys_semctl)( tid, ARG2, ARG3, ARG4, arg ); +//.. break; +//.. } +//.. case VKI_SEMTIMEDOP: +//.. ML_(generic_PRE_sys_semtimedop)( tid, ARG2, ARG5, ARG3, ARG6 ); +//.. /* tst->sys_flags |= MayBlock; */ +//.. break; +//.. case VKI_MSGSND: +//.. ML_(linux_PRE_sys_msgsnd)( tid, ARG2, ARG5, ARG3, ARG4 ); +//.. /* if ((ARG4 & VKI_IPC_NOWAIT) == 0) +//.. tst->sys_flags |= MayBlock; +//.. */ +//.. break; +//.. case VKI_MSGRCV: +//.. { +//.. Addr msgp; +//.. Word msgtyp; +//.. +//.. msgp = deref_Addr( tid, +//.. (Addr) (&((struct vki_ipc_kludge *)ARG5)->msgp), +//.. "msgrcv(msgp)" ); +//.. msgtyp = deref_Addr( tid, +//.. (Addr) (&((struct vki_ipc_kludge *)ARG5)->msgtyp), +//.. "msgrcv(msgp)" ); +//.. +//.. ML_(linux_PRE_sys_msgrcv)( tid, ARG2, msgp, ARG3, msgtyp, ARG4 ); +//.. +//.. /* if ((ARG4 & VKI_IPC_NOWAIT) == 0) +//.. tst->sys_flags |= MayBlock; +//.. */ +//.. break; +//.. } +//.. case VKI_MSGGET: +//.. break; +//.. case VKI_MSGCTL: +//.. ML_(linux_PRE_sys_msgctl)( tid, ARG2, ARG3, ARG5 ); +//.. break; +//.. case VKI_SHMAT: +//.. PRE_MEM_WRITE( "shmat(raddr)", ARG4, sizeof(Addr) ); +//.. ARG5 = ML_(generic_PRE_sys_shmat)( tid, ARG2, ARG5, ARG3 ); +//.. if (ARG5 == 0) +//.. SET_RESULT( -VKI_EINVAL ); +//.. break; +//.. case VKI_SHMDT: +//.. if (!ML_(generic_PRE_sys_shmdt)(tid, ARG5)) +//.. SET_RESULT( -VKI_EINVAL ); +//.. break; +//.. case VKI_SHMGET: +//.. break; +//.. case VKI_SHMCTL: /* IPCOP_shmctl */ +//.. ML_(generic_PRE_sys_shmctl)( tid, ARG2, ARG3, ARG5 ); +//.. break; +//.. default: +//.. VG_(message)(Vg_DebugMsg, "FATAL: unhandled syscall(ipc) %d", ARG1 ); +//.. VG_(core_panic)("... bye!\n"); +//.. break; /*NOTREACHED*/ +//.. } +//.. } + +//.. POST(sys_ipc) +//.. { +//.. switch (ARG1 /* call */) { +//.. case VKI_SEMOP: +//.. case VKI_SEMGET: +//.. break; +//.. case VKI_SEMCTL: +//.. { +//.. UWord arg = deref_Addr( tid, ARG5, "semctl(arg)" ); +//.. ML_(generic_PRE_sys_semctl)( tid, ARG2, ARG3, ARG4, arg ); +//.. break; +//.. } +//.. case VKI_SEMTIMEDOP: +//.. case VKI_MSGSND: +//.. break; +//.. case VKI_MSGRCV: +//.. { +//.. Addr msgp; +//.. Word msgtyp; +//.. +//.. msgp = deref_Addr( tid, +//.. (Addr) (&((struct vki_ipc_kludge *)ARG5)->msgp), +//.. "msgrcv(msgp)" ); +//.. msgtyp = deref_Addr( tid, +//.. (Addr) (&((struct vki_ipc_kludge *)ARG5)->msgtyp), +//.. "msgrcv(msgp)" ); +//.. +//.. ML_(linux_POST_sys_msgrcv)( tid, RES, ARG2, msgp, ARG3, msgtyp, ARG4 ); +//.. break; +//.. } +//.. case VKI_MSGGET: +//.. break; +//.. case VKI_MSGCTL: +//.. ML_(linux_POST_sys_msgctl)( tid, RES, ARG2, ARG3, ARG5 ); +//.. break; +//.. case VKI_SHMAT: +//.. { +//.. Addr addr; +//.. +//.. /* force readability. before the syscall it is +//.. * indeed uninitialized, as can be seen in +//.. * glibc/sysdeps/unix/sysv/linux/shmat.c */ +//.. POST_MEM_WRITE( ARG4, sizeof( Addr ) ); +//.. +//.. addr = deref_Addr ( tid, ARG4, "shmat(addr)" ); +//.. if ( addr > 0 ) { +//.. ML_(generic_POST_sys_shmat)( tid, addr, ARG2, ARG5, ARG3 ); +//.. } +//.. break; +//.. } +//.. case VKI_SHMDT: +//.. ML_(generic_POST_sys_shmdt)( tid, RES, ARG5 ); +//.. break; +//.. case VKI_SHMGET: +//.. break; +//.. case VKI_SHMCTL: +//.. ML_(generic_POST_sys_shmctl)( tid, RES, ARG2, ARG3, ARG5 ); +//.. break; +//.. default: +//.. VG_(message)(Vg_DebugMsg, +//.. "FATAL: unhandled syscall(ipc) %d", +//.. ARG1 ); +//.. VG_(core_panic)("... bye!\n"); +//.. break; /*NOTREACHED*/ +//.. } +//.. } + + +/* Convert from non-RT to RT sigset_t's */ +static +void convert_sigset_to_rt(const vki_old_sigset_t *oldset, vki_sigset_t *set) +{ + VG_(sigemptyset)(set); + set->sig[0] = *oldset; +} +PRE(sys_sigaction) +{ + struct vki_sigaction new, old; + struct vki_sigaction *newp, *oldp; + + PRINT("sys_sigaction ( %ld, %#lx, %#lx )", ARG1,ARG2,ARG3); + PRE_REG_READ3(int, "sigaction", + int, signum, const struct old_sigaction *, act, + struct old_sigaction *, oldact); + + newp = oldp = NULL; + + if (ARG2 != 0) { + struct vki_old_sigaction *sa = (struct vki_old_sigaction *)ARG2; + PRE_MEM_READ( "sigaction(act->sa_handler)", (Addr)&sa->ksa_handler, sizeof(sa->ksa_handler)); + PRE_MEM_READ( "sigaction(act->sa_mask)", (Addr)&sa->sa_mask, sizeof(sa->sa_mask)); + PRE_MEM_READ( "sigaction(act->sa_flags)", (Addr)&sa->sa_flags, sizeof(sa->sa_flags)); + if (ML_(safe_to_deref)(sa,sizeof(sa)) + && (sa->sa_flags & VKI_SA_RESTORER)) + PRE_MEM_READ( "sigaction(act->sa_restorer)", (Addr)&sa->sa_restorer, sizeof(sa->sa_restorer)); + } + + if (ARG3 != 0) { + PRE_MEM_WRITE( "sigaction(oldact)", ARG3, sizeof(struct vki_old_sigaction)); + oldp = &old; + } + + //jrs 20050207: what?! how can this make any sense? + //if (VG_(is_kerror)(SYSRES)) + // return; + + if (ARG2 != 0) { + struct vki_old_sigaction *oldnew = (struct vki_old_sigaction *)ARG2; + + new.ksa_handler = oldnew->ksa_handler; + new.sa_flags = oldnew->sa_flags; + new.sa_restorer = oldnew->sa_restorer; + convert_sigset_to_rt(&oldnew->sa_mask, &new.sa_mask); + newp = &new; + } + + SET_STATUS_from_SysRes( VG_(do_sys_sigaction)(ARG1, newp, oldp) ); + + if (ARG3 != 0 && SUCCESS && RES == 0) { + struct vki_old_sigaction *oldold = (struct vki_old_sigaction *)ARG3; + + oldold->ksa_handler = oldp->ksa_handler; + oldold->sa_flags = oldp->sa_flags; + oldold->sa_restorer = oldp->sa_restorer; + oldold->sa_mask = oldp->sa_mask.sig[0]; + } +} + +POST(sys_sigaction) +{ + vg_assert(SUCCESS); + if (RES == 0 && ARG3 != 0) + POST_MEM_WRITE( ARG3, sizeof(struct vki_old_sigaction)); +} + +PRE(sys_sigsuspend) +{ + /* The C library interface to sigsuspend just takes a pointer to + a signal mask but this system call only takes the first word of + the signal mask as an argument so only 32 signals are supported. + + In fact glibc normally uses rt_sigsuspend if it is available as + that takes a pointer to the signal mask so supports more signals. + */ + *flags |= SfMayBlock; + PRINT("sys_sigsuspend ( %ld )", ARG1 ); + PRE_REG_READ1(int, "sigsuspend", vki_old_sigset_t, mask); +} + +PRE(sys_spu_create) +{ + PRE_MEM_RASCIIZ("stat64(filename)", ARG1); +} +POST(sys_spu_create) +{ + vg_assert(SUCCESS); +} + +PRE(sys_spu_run) +{ + *flags |= SfMayBlock; + if (ARG2 != 0) + PRE_MEM_WRITE("npc", ARG2, sizeof(unsigned int)); + PRE_MEM_READ("event", ARG3, sizeof(unsigned int)); +} +POST(sys_spu_run) +{ + if (ARG2 != 0) + POST_MEM_WRITE(ARG2, sizeof(unsigned int)); +} + +#undef PRE +#undef POST + +/* --------------------------------------------------------------------- + The ppc32/Linux syscall table + ------------------------------------------------------------------ */ + +/* Add an ppc32-linux specific wrapper to a syscall table. */ +#define PLAX_(sysno, name) WRAPPER_ENTRY_X_(ppc32_linux, sysno, name) +#define PLAXY(sysno, name) WRAPPER_ENTRY_XY(ppc32_linux, sysno, name) + +// This table maps from __NR_xxx syscall numbers (from +// linux/include/asm-ppc/unistd.h) to the appropriate PRE/POST sys_foo() +// wrappers on ppc32 (as per sys_call_table in linux/arch/ppc/kernel/entry.S). +// +// For those syscalls not handled by Valgrind, the annotation indicate its +// arch/OS combination, eg. */* (generic), */Linux (Linux only), ?/? +// (unknown). + +const SyscallTableEntry ML_(syscall_table)[] = { +//.. (restart_syscall) // 0 + GENX_(__NR_exit, sys_exit), // 1 + GENX_(__NR_fork, sys_fork), // 2 + GENXY(__NR_read, sys_read), // 3 + GENX_(__NR_write, sys_write), // 4 + + GENXY(__NR_open, sys_open), // 5 + GENXY(__NR_close, sys_close), // 6 + GENXY(__NR_waitpid, sys_waitpid), // 7 + GENXY(__NR_creat, sys_creat), // 8 + GENX_(__NR_link, sys_link), // 9 + + GENX_(__NR_unlink, sys_unlink), // 10 + GENX_(__NR_execve, sys_execve), // 11 + GENX_(__NR_chdir, sys_chdir), // 12 + GENXY(__NR_time, sys_time), // 13 + GENX_(__NR_mknod, sys_mknod), // 14 +//.. + GENX_(__NR_chmod, sys_chmod), // 15 + GENX_(__NR_lchown, sys_lchown), // 16 ## P +//.. GENX_(__NR_break, sys_ni_syscall), // 17 +//.. // (__NR_oldstat, sys_stat), // 18 (obsolete) + LINX_(__NR_lseek, sys_lseek), // 19 +//.. + GENX_(__NR_getpid, sys_getpid), // 20 + LINX_(__NR_mount, sys_mount), // 21 + LINX_(__NR_umount, sys_oldumount), // 22 + GENX_(__NR_setuid, sys_setuid), // 23 ## P + GENX_(__NR_getuid, sys_getuid), // 24 ## P +//.. +//.. // (__NR_stime, sys_stime), // 25 * (SVr4,SVID,X/OPEN) +//.. PLAXY(__NR_ptrace, sys_ptrace), // 26 + GENX_(__NR_alarm, sys_alarm), // 27 +//.. // (__NR_oldfstat, sys_fstat), // 28 * L -- obsolete + GENX_(__NR_pause, sys_pause), // 29 +//.. + LINX_(__NR_utime, sys_utime), // 30 +//.. GENX_(__NR_stty, sys_ni_syscall), // 31 +//.. GENX_(__NR_gtty, sys_ni_syscall), // 32 + GENX_(__NR_access, sys_access), // 33 +//.. GENX_(__NR_nice, sys_nice), // 34 +//.. +//.. GENX_(__NR_ftime, sys_ni_syscall), // 35 +//.. GENX_(__NR_sync, sys_sync), // 36 + GENX_(__NR_kill, sys_kill), // 37 + GENX_(__NR_rename, sys_rename), // 38 + GENX_(__NR_mkdir, sys_mkdir), // 39 + + GENX_(__NR_rmdir, sys_rmdir), // 40 + GENXY(__NR_dup, sys_dup), // 41 + LINXY(__NR_pipe, sys_pipe), // 42 + GENXY(__NR_times, sys_times), // 43 +//.. GENX_(__NR_prof, sys_ni_syscall), // 44 +//.. + GENX_(__NR_brk, sys_brk), // 45 + GENX_(__NR_setgid, sys_setgid), // 46 + GENX_(__NR_getgid, sys_getgid), // 47 +//.. // (__NR_signal, sys_signal), // 48 */* (ANSI C) + GENX_(__NR_geteuid, sys_geteuid), // 49 + + GENX_(__NR_getegid, sys_getegid), // 50 +//.. GENX_(__NR_acct, sys_acct), // 51 + LINX_(__NR_umount2, sys_umount), // 52 +//.. GENX_(__NR_lock, sys_ni_syscall), // 53 + LINXY(__NR_ioctl, sys_ioctl), // 54 +//.. + LINXY(__NR_fcntl, sys_fcntl), // 55 +//.. GENX_(__NR_mpx, sys_ni_syscall), // 56 + GENX_(__NR_setpgid, sys_setpgid), // 57 +//.. GENX_(__NR_ulimit, sys_ni_syscall), // 58 +//.. // (__NR_oldolduname, sys_olduname), // 59 Linux -- obsolete + + GENX_(__NR_umask, sys_umask), // 60 + GENX_(__NR_chroot, sys_chroot), // 61 +//.. // (__NR_ustat, sys_ustat) // 62 SVr4 -- deprecated + GENXY(__NR_dup2, sys_dup2), // 63 + GENX_(__NR_getppid, sys_getppid), // 64 + + GENX_(__NR_getpgrp, sys_getpgrp), // 65 + GENX_(__NR_setsid, sys_setsid), // 66 + PLAXY(__NR_sigaction, sys_sigaction), // 67 +//.. // (__NR_sgetmask, sys_sgetmask), // 68 */* (ANSI C) +//.. // (__NR_ssetmask, sys_ssetmask), // 69 */* (ANSI C) +//.. + GENX_(__NR_setreuid, sys_setreuid), // 70 + GENX_(__NR_setregid, sys_setregid), // 71 + PLAX_(__NR_sigsuspend, sys_sigsuspend), // 72 + LINXY(__NR_sigpending, sys_sigpending), // 73 +//.. // (__NR_sethostname, sys_sethostname), // 74 */* +//.. + GENX_(__NR_setrlimit, sys_setrlimit), // 75 +//.. GENXY(__NR_getrlimit, sys_old_getrlimit), // 76 + GENXY(__NR_getrusage, sys_getrusage), // 77 + GENXY(__NR_gettimeofday, sys_gettimeofday), // 78 +//.. GENX_(__NR_settimeofday, sys_settimeofday), // 79 +//.. + GENXY(__NR_getgroups, sys_getgroups), // 80 + GENX_(__NR_setgroups, sys_setgroups), // 81 +//.. PLAX_(__NR_select, old_select), // 82 + GENX_(__NR_symlink, sys_symlink), // 83 +//.. // (__NR_oldlstat, sys_lstat), // 84 -- obsolete +//.. + GENX_(__NR_readlink, sys_readlink), // 85 +//.. // (__NR_uselib, sys_uselib), // 86 */Linux +//.. // (__NR_swapon, sys_swapon), // 87 */Linux +//.. // (__NR_reboot, sys_reboot), // 88 */Linux +//.. // (__NR_readdir, old_readdir), // 89 -- superseded + + PLAX_(__NR_mmap, sys_mmap), // 90 + GENXY(__NR_munmap, sys_munmap), // 91 + GENX_(__NR_truncate, sys_truncate), // 92 + GENX_(__NR_ftruncate, sys_ftruncate), // 93 + GENX_(__NR_fchmod, sys_fchmod), // 94 + + GENX_(__NR_fchown, sys_fchown), // 95 + GENX_(__NR_getpriority, sys_getpriority), // 96 + GENX_(__NR_setpriority, sys_setpriority), // 97 +//.. GENX_(__NR_profil, sys_ni_syscall), // 98 + GENXY(__NR_statfs, sys_statfs), // 99 +//.. + GENXY(__NR_fstatfs, sys_fstatfs), // 100 +//.. LINX_(__NR_ioperm, sys_ioperm), // 101 + PLAXY(__NR_socketcall, sys_socketcall), // 102 + LINXY(__NR_syslog, sys_syslog), // 103 + GENXY(__NR_setitimer, sys_setitimer), // 104 + + GENXY(__NR_getitimer, sys_getitimer), // 105 + GENXY(__NR_stat, sys_newstat), // 106 + GENXY(__NR_lstat, sys_newlstat), // 107 + GENXY(__NR_fstat, sys_newfstat), // 108 +//.. // (__NR_olduname, sys_uname), // 109 -- obsolete +//.. +//.. GENX_(__NR_iopl, sys_iopl), // 110 +//.. LINX_(__NR_vhangup, sys_vhangup), // 111 +//.. GENX_(__NR_idle, sys_ni_syscall), // 112 +//.. // (__NR_vm86old, sys_vm86old), // 113 x86/Linux-only + GENXY(__NR_wait4, sys_wait4), // 114 +//.. +//.. // (__NR_swapoff, sys_swapoff), // 115 */Linux + LINXY(__NR_sysinfo, sys_sysinfo), // 116 + PLAXY(__NR_ipc, sys_ipc), // 117 + GENX_(__NR_fsync, sys_fsync), // 118 + PLAX_(__NR_sigreturn, sys_sigreturn), // 119 ?/Linux +//.. + PLAX_(__NR_clone, sys_clone), // 120 +//.. // (__NR_setdomainname, sys_setdomainname), // 121 */*(?) + GENXY(__NR_uname, sys_newuname), // 122 +//.. PLAX_(__NR_modify_ldt, sys_modify_ldt), // 123 +//.. LINXY(__NR_adjtimex, sys_adjtimex), // 124 +//.. + GENXY(__NR_mprotect, sys_mprotect), // 125 + LINXY(__NR_sigprocmask, sys_sigprocmask), // 126 + GENX_(__NR_create_module, sys_ni_syscall), // 127 + LINX_(__NR_init_module, sys_init_module), // 128 + LINX_(__NR_delete_module, sys_delete_module), // 129 +//.. +//.. // Nb: get_kernel_syms() was removed 2.4-->2.6 +//.. GENX_(__NR_get_kernel_syms, sys_ni_syscall), // 130 +//.. LINX_(__NR_quotactl, sys_quotactl), // 131 + GENX_(__NR_getpgid, sys_getpgid), // 132 + GENX_(__NR_fchdir, sys_fchdir), // 133 +//.. // (__NR_bdflush, sys_bdflush), // 134 */Linux +//.. +//.. // (__NR_sysfs, sys_sysfs), // 135 SVr4 + LINX_(__NR_personality, sys_personality), // 136 +//.. GENX_(__NR_afs_syscall, sys_ni_syscall), // 137 + LINX_(__NR_setfsuid, sys_setfsuid), // 138 + LINX_(__NR_setfsgid, sys_setfsgid), // 139 + + LINXY(__NR__llseek, sys_llseek), // 140 + GENXY(__NR_getdents, sys_getdents), // 141 + GENX_(__NR__newselect, sys_select), // 142 + GENX_(__NR_flock, sys_flock), // 143 + GENX_(__NR_msync, sys_msync), // 144 +//.. + GENXY(__NR_readv, sys_readv), // 145 + GENX_(__NR_writev, sys_writev), // 146 + GENX_(__NR_getsid, sys_getsid), // 147 + GENX_(__NR_fdatasync, sys_fdatasync), // 148 + LINXY(__NR__sysctl, sys_sysctl), // 149 +//.. + GENX_(__NR_mlock, sys_mlock), // 150 + GENX_(__NR_munlock, sys_munlock), // 151 + GENX_(__NR_mlockall, sys_mlockall), // 152 + LINX_(__NR_munlockall, sys_munlockall), // 153 + LINXY(__NR_sched_setparam, sys_sched_setparam), // 154 +//.. + LINXY(__NR_sched_getparam, sys_sched_getparam), // 155 + LINX_(__NR_sched_setscheduler, sys_sched_setscheduler), // 156 + LINX_(__NR_sched_getscheduler, sys_sched_getscheduler), // 157 + LINX_(__NR_sched_yield, sys_sched_yield), // 158 + LINX_(__NR_sched_get_priority_max, sys_sched_get_priority_max),// 159 + + LINX_(__NR_sched_get_priority_min, sys_sched_get_priority_min),// 160 +//.. //LINX?(__NR_sched_rr_get_interval, sys_sched_rr_get_interval), // 161 */* + GENXY(__NR_nanosleep, sys_nanosleep), // 162 + GENX_(__NR_mremap, sys_mremap), // 163 + LINX_(__NR_setresuid, sys_setresuid), // 164 + + LINXY(__NR_getresuid, sys_getresuid), // 165 + +//.. GENX_(__NR_query_module, sys_ni_syscall), // 166 + GENXY(__NR_poll, sys_poll), // 167 +//.. // (__NR_nfsservctl, sys_nfsservctl), // 168 */Linux +//.. + LINX_(__NR_setresgid, sys_setresgid), // 169 + LINXY(__NR_getresgid, sys_getresgid), // 170 + LINXY(__NR_prctl, sys_prctl), // 171 + PLAX_(__NR_rt_sigreturn, sys_rt_sigreturn), // 172 + LINXY(__NR_rt_sigaction, sys_rt_sigaction), // 173 + + LINXY(__NR_rt_sigprocmask, sys_rt_sigprocmask), // 174 + LINXY(__NR_rt_sigpending, sys_rt_sigpending), // 175 + LINXY(__NR_rt_sigtimedwait, sys_rt_sigtimedwait), // 176 + LINXY(__NR_rt_sigqueueinfo, sys_rt_sigqueueinfo), // 177 + LINX_(__NR_rt_sigsuspend, sys_rt_sigsuspend), // 178 + + GENXY(__NR_pread64, sys_pread64_on32bitplat), // 179 + GENX_(__NR_pwrite64, sys_pwrite64_on32bitplat), // 180 + GENX_(__NR_chown, sys_chown), // 181 + GENXY(__NR_getcwd, sys_getcwd), // 182 + LINXY(__NR_capget, sys_capget), // 183 + LINX_(__NR_capset, sys_capset), // 184 + GENXY(__NR_sigaltstack, sys_sigaltstack), // 185 + LINXY(__NR_sendfile, sys_sendfile), // 186 +//.. GENXY(__NR_getpmsg, sys_getpmsg), // 187 +//.. GENX_(__NR_putpmsg, sys_putpmsg), // 188 + + // Nb: we treat vfork as fork + GENX_(__NR_vfork, sys_fork), // 189 + GENXY(__NR_ugetrlimit, sys_getrlimit), // 190 +//__NR_readahead // 191 ppc/Linux only? + PLAX_(__NR_mmap2, sys_mmap2), // 192 + GENX_(__NR_truncate64, sys_truncate64), // 193 + GENX_(__NR_ftruncate64, sys_ftruncate64), // 194 +//.. + + PLAXY(__NR_stat64, sys_stat64), // 195 + PLAXY(__NR_lstat64, sys_lstat64), // 196 + PLAXY(__NR_fstat64, sys_fstat64), // 197 + +// __NR_pciconfig_read // 198 +// __NR_pciconfig_write // 199 +// __NR_pciconfig_iobase // 200 +// __NR_multiplexer // 201 + + GENXY(__NR_getdents64, sys_getdents64), // 202 +//.. // (__NR_pivot_root, sys_pivot_root), // 203 */Linux + LINXY(__NR_fcntl64, sys_fcntl64), // 204 + GENX_(__NR_madvise, sys_madvise), // 205 + GENXY(__NR_mincore, sys_mincore), // 206 + LINX_(__NR_gettid, sys_gettid), // 207 +//.. LINX_(__NR_tkill, sys_tkill), // 208 */Linux +//.. LINX_(__NR_setxattr, sys_setxattr), // 209 +//.. LINX_(__NR_lsetxattr, sys_lsetxattr), // 210 +//.. LINX_(__NR_fsetxattr, sys_fsetxattr), // 211 + LINXY(__NR_getxattr, sys_getxattr), // 212 + LINXY(__NR_lgetxattr, sys_lgetxattr), // 213 + LINXY(__NR_fgetxattr, sys_fgetxattr), // 214 + LINXY(__NR_listxattr, sys_listxattr), // 215 + LINXY(__NR_llistxattr, sys_llistxattr), // 216 + LINXY(__NR_flistxattr, sys_flistxattr), // 217 + LINX_(__NR_removexattr, sys_removexattr), // 218 + LINX_(__NR_lremovexattr, sys_lremovexattr), // 219 + LINX_(__NR_fremovexattr, sys_fremovexattr), // 220 + + LINXY(__NR_futex, sys_futex), // 221 + LINX_(__NR_sched_setaffinity, sys_sched_setaffinity), // 222 + LINXY(__NR_sched_getaffinity, sys_sched_getaffinity), // 223 +/* 224 currently unused */ + +// __NR_tuxcall // 225 + + LINXY(__NR_sendfile64, sys_sendfile64), // 226 +//.. + LINX_(__NR_io_setup, sys_io_setup), // 227 + LINX_(__NR_io_destroy, sys_io_destroy), // 228 + LINXY(__NR_io_getevents, sys_io_getevents), // 229 + LINX_(__NR_io_submit, sys_io_submit), // 230 + LINXY(__NR_io_cancel, sys_io_cancel), // 231 +//.. + LINX_(__NR_set_tid_address, sys_set_tid_address), // 232 + + LINX_(__NR_fadvise64, sys_fadvise64), // 233 */(Linux?) + LINX_(__NR_exit_group, sys_exit_group), // 234 +//.. GENXY(__NR_lookup_dcookie, sys_lookup_dcookie), // 235 + LINXY(__NR_epoll_create, sys_epoll_create), // 236 + LINX_(__NR_epoll_ctl, sys_epoll_ctl), // 237 + LINXY(__NR_epoll_wait, sys_epoll_wait), // 238 + +//.. // (__NR_remap_file_pages, sys_remap_file_pages), // 239 */Linux + LINXY(__NR_timer_create, sys_timer_create), // 240 + LINXY(__NR_timer_settime, sys_timer_settime), // 241 + LINXY(__NR_timer_gettime, sys_timer_gettime), // 242 + LINX_(__NR_timer_getoverrun, sys_timer_getoverrun), // 243 + LINX_(__NR_timer_delete, sys_timer_delete), // 244 + LINX_(__NR_clock_settime, sys_clock_settime), // 245 + LINXY(__NR_clock_gettime, sys_clock_gettime), // 246 + LINXY(__NR_clock_getres, sys_clock_getres), // 247 + LINXY(__NR_clock_nanosleep, sys_clock_nanosleep), // 248 + +// __NR_swapcontext // 249 + + LINXY(__NR_tgkill, sys_tgkill), // 250 */Linux +//.. GENX_(__NR_utimes, sys_utimes), // 251 + GENXY(__NR_statfs64, sys_statfs64), // 252 + GENXY(__NR_fstatfs64, sys_fstatfs64), // 253 + LINX_(__NR_fadvise64_64, sys_fadvise64_64), // 254 */(Linux?) + +// __NR_rtas // 255 + +/* Number 256 is reserved for sys_debug_setcontext */ +/* Number 257 is reserved for vserver */ +/* Number 258 is reserved for new sys_remap_file_pages */ +/* Number 259 is reserved for new sys_mbind */ + LINXY(__NR_get_mempolicy, sys_get_mempolicy), // 260 + LINX_(__NR_set_mempolicy, sys_set_mempolicy), // 261 + + LINXY(__NR_mq_open, sys_mq_open), // 262 + LINX_(__NR_mq_unlink, sys_mq_unlink), // 263 + LINX_(__NR_mq_timedsend, sys_mq_timedsend), // 264 + LINXY(__NR_mq_timedreceive, sys_mq_timedreceive), // 265 + LINX_(__NR_mq_notify, sys_mq_notify), // 266 + LINXY(__NR_mq_getsetattr, sys_mq_getsetattr), // 267 +// __NR_kexec_load // 268 + +/* Number 269 is reserved for sys_add_key */ +/* Number 270 is reserved for sys_request_key */ +/* Number 271 is reserved for sys_keyctl */ +/* Number 272 is reserved for sys_waitid */ + LINX_(__NR_ioprio_set, sys_ioprio_set), // 273 + LINX_(__NR_ioprio_get, sys_ioprio_get), // 274 + + LINX_(__NR_inotify_init, sys_inotify_init), // 275 + LINX_(__NR_inotify_add_watch, sys_inotify_add_watch), // 276 + LINX_(__NR_inotify_rm_watch, sys_inotify_rm_watch), // 277 + PLAXY(__NR_spu_run, sys_spu_run), // 278 + PLAX_(__NR_spu_create, sys_spu_create), // 279 + + LINXY(__NR_openat, sys_openat), // 286 + LINX_(__NR_mkdirat, sys_mkdirat), // 287 + LINX_(__NR_mknodat, sys_mknodat), // 288 + LINX_(__NR_fchownat, sys_fchownat), // 289 + LINX_(__NR_futimesat, sys_futimesat), // 290 + PLAXY(__NR_fstatat64, sys_fstatat64), // 291 + LINX_(__NR_unlinkat, sys_unlinkat), // 292 + LINX_(__NR_renameat, sys_renameat), // 293 + LINX_(__NR_linkat, sys_linkat), // 294 + LINX_(__NR_symlinkat, sys_symlinkat), // 295 + LINX_(__NR_readlinkat, sys_readlinkat), // 296 + LINX_(__NR_fchmodat, sys_fchmodat), // 297 + LINX_(__NR_faccessat, sys_faccessat), // 298 + LINX_(__NR_set_robust_list, sys_set_robust_list), // 299 + LINXY(__NR_get_robust_list, sys_get_robust_list), // 300 +// LINX_(__NR_move_pages, sys_ni_syscall), // 301 +// LINX_(__NR_getcpu, sys_ni_syscall), // 302 + LINXY(__NR_epoll_pwait, sys_epoll_pwait), // 303 + LINX_(__NR_utimensat, sys_utimensat), // 304 + LINXY(__NR_signalfd, sys_signalfd), // 305 + LINXY(__NR_timerfd_create, sys_timerfd_create), // 306 + LINX_(__NR_eventfd, sys_eventfd), // 307 +// LINX_(__NR_sync_file_range2, sys_ni_syscall), // 308 +// LINX_(__NR_fallocate, sys_ni_syscall), // 309 +// LINXY(__NR_subpage_prot, sys_ni_syscall), // 310 + LINXY(__NR_timerfd_settime, sys_timerfd_settime), // 311 + LINXY(__NR_timerfd_gettime, sys_timerfd_gettime), // 312 + LINXY(__NR_signalfd4, sys_signalfd4), // 313 + LINX_(__NR_eventfd2, sys_eventfd2), // 314 + // (__NR_epoll_create1, sys_ni_syscall) // 315 + // (__NR_dup3, sys_ni_syscall) // 316 + LINXY(__NR_pipe2, sys_pipe2) // 317 + // (__NR_inotify_init1, sys_ni_syscall) // 318 +}; + +const UInt ML_(syscall_table_size) = + sizeof(ML_(syscall_table)) / sizeof(ML_(syscall_table)[0]); + +/*--------------------------------------------------------------------*/ +/*--- end ---*/ +/*--------------------------------------------------------------------*/ |