Blame SOURCES/valgrind-3.11.0-ppoll-mask.patch

0ab3a1
commit 515c3b6de3eff6ddf88fd14a0084b8ad0c692553
0ab3a1
Author: iraisr <iraisr@a5019735-40e9-0310-863c-91ae7b9d1cf9>
0ab3a1
Date:   Tue Mar 8 09:04:48 2016 +0000
0ab3a1
0ab3a1
    Sanitize signal mask in ppoll and pselect syscalls
0ab3a1
    Reported and Linux patch contributed by Steven Smith <sos22@archy.org.uk>
0ab3a1
    Fixes BZ#359871
0ab3a1
    
0ab3a1
    
0ab3a1
    
0ab3a1
    git-svn-id: svn://svn.valgrind.org/valgrind/trunk@15823 a5019735-40e9-0310-863c-91ae7b9d1cf9
0ab3a1
0ab3a1
diff --git a/coregrind/m_syswrap/priv_syswrap-main.h b/coregrind/m_syswrap/priv_syswrap-main.h
0ab3a1
index cabad7c..3164c81 100644
0ab3a1
--- a/coregrind/m_syswrap/priv_syswrap-main.h
0ab3a1
+++ b/coregrind/m_syswrap/priv_syswrap-main.h
0ab3a1
@@ -38,6 +38,9 @@
0ab3a1
 extern
0ab3a1
 void ML_(fixup_guest_state_to_restart_syscall) ( ThreadArchState* arch );
0ab3a1
 
0ab3a1
+extern
0ab3a1
+void VG_(sanitize_client_sigmask)(vki_sigset_t *mask);
0ab3a1
+
0ab3a1
 #if defined(VGO_darwin)
0ab3a1
 /* Longjmp to scheduler after client calls workq_ops(WQOPS_THREAD_RETURN)*/
0ab3a1
 extern
0ab3a1
diff --git a/coregrind/m_syswrap/syswrap-amd64-linux.c b/coregrind/m_syswrap/syswrap-amd64-linux.c
0ab3a1
index 7c88bc2..4a8344b 100644
0ab3a1
--- a/coregrind/m_syswrap/syswrap-amd64-linux.c
0ab3a1
+++ b/coregrind/m_syswrap/syswrap-amd64-linux.c
0ab3a1
@@ -1018,7 +1018,7 @@ static SyscallTableEntry syscall_table[] = {
0ab3a1
    LINX_(__NR_fchmodat,		 sys_fchmodat),         // 268
0ab3a1
    LINX_(__NR_faccessat,	 sys_faccessat),        // 269
0ab3a1
 
0ab3a1
-   LINX_(__NR_pselect6,		 sys_pselect6),         // 270
0ab3a1
+   LINXY(__NR_pselect6,		 sys_pselect6),         // 270
0ab3a1
    LINXY(__NR_ppoll,		 sys_ppoll),            // 271
0ab3a1
    LINX_(__NR_unshare,		 sys_unshare),          // 272
0ab3a1
    LINX_(__NR_set_robust_list,	 sys_set_robust_list),  // 273
0ab3a1
diff --git a/coregrind/m_syswrap/syswrap-arm-linux.c b/coregrind/m_syswrap/syswrap-arm-linux.c
0ab3a1
index 3ccad12..224070c 100644
0ab3a1
--- a/coregrind/m_syswrap/syswrap-arm-linux.c
0ab3a1
+++ b/coregrind/m_syswrap/syswrap-arm-linux.c
0ab3a1
@@ -1188,7 +1188,7 @@ static SyscallTableEntry syscall_main_table[] = {
0ab3a1
 
0ab3a1
    LINX_(__NR_arm_fadvise64_64,  sys_fadvise64_64),     // 270 */(Linux?)
0ab3a1
 
0ab3a1
-   LINX_(__NR_pselect6,          sys_pselect6),         // 335
0ab3a1
+   LINXY(__NR_pselect6,          sys_pselect6),         // 335
0ab3a1
    LINXY(__NR_ppoll,             sys_ppoll),            // 336
0ab3a1
 
0ab3a1
    LINXY(__NR_epoll_pwait,       sys_epoll_pwait),      // 346
0ab3a1
diff --git a/coregrind/m_syswrap/syswrap-arm64-linux.c b/coregrind/m_syswrap/syswrap-arm64-linux.c
0ab3a1
index 8d3027d..abddff1 100644
0ab3a1
--- a/coregrind/m_syswrap/syswrap-arm64-linux.c
0ab3a1
+++ b/coregrind/m_syswrap/syswrap-arm64-linux.c
0ab3a1
@@ -924,7 +924,7 @@ static SyscallTableEntry syscall_main_table[] = {
0ab3a1
    GENX_(__NR_writev,            sys_writev),            // 66
0ab3a1
    GENXY(__NR_pread64,           sys_pread64),           // 67
0ab3a1
    GENX_(__NR_pwrite64,          sys_pwrite64),          // 68
0ab3a1
-   LINX_(__NR_pselect6,          sys_pselect6),          // 72
0ab3a1
+   LINXY(__NR_pselect6,          sys_pselect6),          // 72
0ab3a1
    LINXY(__NR_ppoll,             sys_ppoll),             // 73
0ab3a1
    LINXY(__NR_signalfd4,         sys_signalfd4),         // 74
0ab3a1
    LINX_(__NR_readlinkat,        sys_readlinkat),        // 78
0ab3a1
diff --git a/coregrind/m_syswrap/syswrap-linux.c b/coregrind/m_syswrap/syswrap-linux.c
0ab3a1
index f2d1076..6fdacda 100644
0ab3a1
--- a/coregrind/m_syswrap/syswrap-linux.c
0ab3a1
+++ b/coregrind/m_syswrap/syswrap-linux.c
0ab3a1
@@ -62,6 +62,7 @@
0ab3a1
 #include "priv_types_n_macros.h"
0ab3a1
 #include "priv_syswrap-generic.h"
0ab3a1
 #include "priv_syswrap-linux.h"
0ab3a1
+#include "priv_syswrap-main.h"
0ab3a1
 #include "priv_syswrap-xen.h"
0ab3a1
 
0ab3a1
 // Run a thread from beginning to end and return the thread's
0ab3a1
@@ -1272,9 +1273,18 @@ POST(sys_get_robust_list)
0ab3a1
    POST_MEM_WRITE(ARG3, sizeof(struct vki_size_t *));
0ab3a1
 }
0ab3a1
 
0ab3a1
+struct pselect_sized_sigset {
0ab3a1
+    const vki_sigset_t *ss;
0ab3a1
+    vki_size_t ss_len;
0ab3a1
+};
0ab3a1
+struct pselect_adjusted_sigset {
0ab3a1
+    struct pselect_sized_sigset ss; /* The actual syscall arg */
0ab3a1
+    vki_sigset_t adjusted_ss;
0ab3a1
+};
0ab3a1
+
0ab3a1
 PRE(sys_pselect6)
0ab3a1
 {
0ab3a1
-   *flags |= SfMayBlock;
0ab3a1
+   *flags |= SfMayBlock | SfPostOnFail;
0ab3a1
    PRINT("sys_pselect6 ( %ld, %#lx, %#lx, %#lx, %#lx, %#lx )",
0ab3a1
          SARG1, ARG2, ARG3, ARG4, ARG5, ARG6);
0ab3a1
    PRE_REG_READ6(long, "pselect6",
0ab3a1
@@ -1293,15 +1303,41 @@ PRE(sys_pselect6)
0ab3a1
 		     ARG4, ARG1/8 /* __FD_SETSIZE/8 */ );
0ab3a1
    if (ARG5 != 0)
0ab3a1
       PRE_MEM_READ( "pselect6(timeout)", ARG5, sizeof(struct vki_timeval) );
0ab3a1
-   if (ARG6 != 0)
0ab3a1
-      PRE_MEM_READ( "pselect6(sig)", ARG6, sizeof(void *)+sizeof(vki_size_t) );
0ab3a1
+   if (ARG6 != 0) {
0ab3a1
+      const struct pselect_sized_sigset *pss =
0ab3a1
+          (struct pselect_sized_sigset *)ARG6;
0ab3a1
+      PRE_MEM_READ( "pselect6(sig)", ARG6, sizeof(*pss) );
0ab3a1
+      if (!ML_(safe_to_deref)(pss, sizeof(*pss))) {
0ab3a1
+         ARG6 = 1; /* Something recognisable to POST() hook. */
0ab3a1
+      } else {
0ab3a1
+         struct pselect_adjusted_sigset *pas;
0ab3a1
+         pas = VG_(malloc)("syswrap.pselect6.1", sizeof(*pas));
0ab3a1
+         ARG6 = (Addr)pas;
0ab3a1
+         pas->ss.ss = (void *)1;
0ab3a1
+         pas->ss.ss_len = pss->ss_len;
0ab3a1
+         if (pss->ss_len == sizeof(*pss->ss)) {
0ab3a1
+            PRE_MEM_READ("pselect6(sig->ss)", (Addr)pss->ss, pss->ss_len);
0ab3a1
+            if (ML_(safe_to_deref)(pss->ss, sizeof(*pss->ss))) {
0ab3a1
+               pas->adjusted_ss = *pss->ss;
0ab3a1
+               pas->ss.ss = &pas->adjusted_ss;
0ab3a1
+               VG_(sanitize_client_sigmask)(&pas->adjusted_ss);
0ab3a1
+            }
0ab3a1
+         }
0ab3a1
+      }
0ab3a1
+   }
0ab3a1
+}
0ab3a1
+POST(sys_pselect6)
0ab3a1
+{
0ab3a1
+   if (ARG6 != 0 && ARG6 != 1) {
0ab3a1
+       VG_(free)((struct pselect_adjusted_sigset *)ARG6);
0ab3a1
+   }
0ab3a1
 }
0ab3a1
 
0ab3a1
 PRE(sys_ppoll)
0ab3a1
 {
0ab3a1
    UInt i;
0ab3a1
    struct vki_pollfd* ufds = (struct vki_pollfd *)ARG1;
0ab3a1
-   *flags |= SfMayBlock;
0ab3a1
+   *flags |= SfMayBlock | SfPostOnFail;
0ab3a1
    PRINT("sys_ppoll ( %#lx, %lu, %#lx, %#lx, %lu )\n", ARG1,ARG2,ARG3,ARG4,ARG5);
0ab3a1
    PRE_REG_READ5(long, "ppoll",
0ab3a1
                  struct vki_pollfd *, ufds, unsigned int, nfds,
0ab3a1
@@ -1319,18 +1355,33 @@ PRE(sys_ppoll)
0ab3a1
 
0ab3a1
    if (ARG3)
0ab3a1
       PRE_MEM_READ( "ppoll(tsp)", ARG3, sizeof(struct vki_timespec) );
0ab3a1
-   if (ARG4)
0ab3a1
-      PRE_MEM_READ( "ppoll(sigmask)", ARG4, sizeof(vki_sigset_t) );
0ab3a1
+   if (ARG4 != 0 && sizeof(vki_sigset_t) == ARG5) {
0ab3a1
+      const vki_sigset_t *guest_sigmask = (vki_sigset_t *)ARG4;
0ab3a1
+      PRE_MEM_READ( "ppoll(sigmask)", ARG4, ARG5);
0ab3a1
+      if (!ML_(safe_to_deref)(guest_sigmask, sizeof(*guest_sigmask))) {
0ab3a1
+         ARG4 = 1; /* Something recognisable to POST() hook. */
0ab3a1
+      } else {
0ab3a1
+         vki_sigset_t *vg_sigmask =
0ab3a1
+             VG_(malloc)("syswrap.ppoll.1", sizeof(*vg_sigmask));
0ab3a1
+         ARG4 = (Addr)vg_sigmask;
0ab3a1
+         *vg_sigmask = *guest_sigmask;
0ab3a1
+         VG_(sanitize_client_sigmask)(vg_sigmask);
0ab3a1
+      }
0ab3a1
+   }
0ab3a1
 }
0ab3a1
 
0ab3a1
 POST(sys_ppoll)
0ab3a1
 {
0ab3a1
-   if (RES > 0) {
0ab3a1
+   vg_assert(SUCCESS || FAILURE);
0ab3a1
+   if (SUCCESS && (RES >= 0)) {
0ab3a1
       UInt i;
0ab3a1
       struct vki_pollfd* ufds = (struct vki_pollfd *)ARG1;
0ab3a1
       for (i = 0; i < ARG2; i++)
0ab3a1
 	 POST_MEM_WRITE( (Addr)(&ufds[i].revents), sizeof(ufds[i].revents) );
0ab3a1
    }
0ab3a1
+   if (ARG4 != 0 && ARG5 == sizeof(vki_sigset_t) && ARG4 != 1) {
0ab3a1
+      VG_(free)((vki_sigset_t *) ARG4);
0ab3a1
+   }
0ab3a1
 }
0ab3a1
 
0ab3a1
 
0ab3a1
diff --git a/coregrind/m_syswrap/syswrap-main.c b/coregrind/m_syswrap/syswrap-main.c
0ab3a1
index 054891f..d854194 100644
0ab3a1
--- a/coregrind/m_syswrap/syswrap-main.c
0ab3a1
+++ b/coregrind/m_syswrap/syswrap-main.c
0ab3a1
@@ -1657,7 +1657,7 @@ static const SyscallTableEntry* get_syscall_entry ( Int syscallno )
0ab3a1
 /* Add and remove signals from mask so that we end up telling the
0ab3a1
    kernel the state we actually want rather than what the client
0ab3a1
    wants. */
0ab3a1
-static void sanitize_client_sigmask(vki_sigset_t *mask)
0ab3a1
+void VG_(sanitize_client_sigmask)(vki_sigset_t *mask)
0ab3a1
 {
0ab3a1
    VG_(sigdelset)(mask, VKI_SIGKILL);
0ab3a1
    VG_(sigdelset)(mask, VKI_SIGSTOP);
0ab3a1
@@ -1979,7 +1979,7 @@ void VG_(client_syscall) ( ThreadId tid, UInt trc )
0ab3a1
          PRINT(" --> [async] ... \n");
0ab3a1
 
0ab3a1
          mask = tst->sig_mask;
0ab3a1
-         sanitize_client_sigmask(&mask);
0ab3a1
+         VG_(sanitize_client_sigmask)(&mask);
0ab3a1
 
0ab3a1
          /* Gack.  More impedance matching.  Copy the possibly
0ab3a1
             modified syscall args back into the guest state. */
0ab3a1
diff --git a/coregrind/m_syswrap/syswrap-mips64-linux.c b/coregrind/m_syswrap/syswrap-mips64-linux.c
0ab3a1
index 12d147d..7c5fbdb 100644
0ab3a1
--- a/coregrind/m_syswrap/syswrap-mips64-linux.c
0ab3a1
+++ b/coregrind/m_syswrap/syswrap-mips64-linux.c
0ab3a1
@@ -889,7 +889,7 @@ static SyscallTableEntry syscall_main_table[] = {
0ab3a1
    LINX_ (__NR_readlinkat, sys_readlinkat),
0ab3a1
    LINX_ (__NR_fchmodat, sys_fchmodat),
0ab3a1
    LINX_ (__NR_faccessat, sys_faccessat),
0ab3a1
-   LINX_ (__NR_pselect6, sys_pselect6),
0ab3a1
+   LINXY (__NR_pselect6, sys_pselect6),
0ab3a1
    LINXY (__NR_ppoll, sys_ppoll),
0ab3a1
    PLAX_ (__NR_unshare, sys_unshare),
0ab3a1
    PLAX_ (__NR_splice, sys_splice),
0ab3a1
diff --git a/coregrind/m_syswrap/syswrap-ppc32-linux.c b/coregrind/m_syswrap/syswrap-ppc32-linux.c
0ab3a1
index 9ceaa15..379fcb3 100644
0ab3a1
--- a/coregrind/m_syswrap/syswrap-ppc32-linux.c
0ab3a1
+++ b/coregrind/m_syswrap/syswrap-ppc32-linux.c
0ab3a1
@@ -1194,7 +1194,7 @@ static SyscallTableEntry syscall_table[] = {
0ab3a1
    PLAXY(__NR_spu_run,            sys_spu_run),               // 278
0ab3a1
    PLAX_(__NR_spu_create,         sys_spu_create),            // 279
0ab3a1
 
0ab3a1
-   LINX_(__NR_pselect6,          sys_pselect6),          // 280
0ab3a1
+   LINXY(__NR_pselect6,          sys_pselect6),          // 280
0ab3a1
    LINXY(__NR_ppoll,             sys_ppoll),             // 281
0ab3a1
 
0ab3a1
    LINXY(__NR_openat,            sys_openat),            // 286
0ab3a1
diff --git a/coregrind/m_syswrap/syswrap-ppc64-linux.c b/coregrind/m_syswrap/syswrap-ppc64-linux.c
0ab3a1
index 15b8979..77668c7 100644
0ab3a1
--- a/coregrind/m_syswrap/syswrap-ppc64-linux.c
0ab3a1
+++ b/coregrind/m_syswrap/syswrap-ppc64-linux.c
0ab3a1
@@ -1110,7 +1110,7 @@ static SyscallTableEntry syscall_table[] = {
0ab3a1
    LINX_(__NR_inotify_add_watch,  sys_inotify_add_watch), // 276
0ab3a1
    LINX_(__NR_inotify_rm_watch,   sys_inotify_rm_watch),  // 277
0ab3a1
 
0ab3a1
-   LINX_(__NR_pselect6,          sys_pselect6),           // 280
0ab3a1
+   LINXY(__NR_pselect6,          sys_pselect6),           // 280
0ab3a1
    LINXY(__NR_ppoll,             sys_ppoll),              // 281
0ab3a1
 
0ab3a1
    LINXY(__NR_openat,            sys_openat),             // 286
0ab3a1
diff --git a/coregrind/m_syswrap/syswrap-s390x-linux.c b/coregrind/m_syswrap/syswrap-s390x-linux.c
0ab3a1
index 0513789..107a569 100644
0ab3a1
--- a/coregrind/m_syswrap/syswrap-s390x-linux.c
0ab3a1
+++ b/coregrind/m_syswrap/syswrap-s390x-linux.c
0ab3a1
@@ -992,7 +992,7 @@ static SyscallTableEntry syscall_table[] = {
0ab3a1
    LINX_(__NR_fchmodat,  sys_fchmodat),                               // 299
0ab3a1
 
0ab3a1
    LINX_(__NR_faccessat,  sys_faccessat),                             // 300
0ab3a1
-   LINX_(__NR_pselect6, sys_pselect6),                                // 301
0ab3a1
+   LINXY(__NR_pselect6, sys_pselect6),                                // 301
0ab3a1
    LINXY(__NR_ppoll, sys_ppoll),                                      // 302
0ab3a1
    LINX_(__NR_unshare, sys_unshare),                                  // 303
0ab3a1
    LINX_(__NR_set_robust_list,  sys_set_robust_list),                 // 304
0ab3a1
diff --git a/coregrind/m_syswrap/syswrap-solaris.c b/coregrind/m_syswrap/syswrap-solaris.c
0ab3a1
index 7ac876f..a307f6c 100644
0ab3a1
--- a/coregrind/m_syswrap/syswrap-solaris.c
0ab3a1
+++ b/coregrind/m_syswrap/syswrap-solaris.c
0ab3a1
@@ -71,6 +71,7 @@
0ab3a1
 
0ab3a1
 #include "priv_types_n_macros.h"
0ab3a1
 #include "priv_syswrap-generic.h"
0ab3a1
+#include "priv_syswrap-main.h"
0ab3a1
 #include "priv_syswrap-solaris.h"
0ab3a1
 
0ab3a1
 /* Return the number of non-dead and daemon threads.
0ab3a1
@@ -7327,7 +7328,7 @@ PRE(sys_pollsys)
0ab3a1
    UWord i;
0ab3a1
    struct vki_pollfd *ufds = (struct vki_pollfd *)ARG1;
0ab3a1
 
0ab3a1
-   *flags |= SfMayBlock;
0ab3a1
+   *flags |= SfMayBlock | SfPostOnFail;
0ab3a1
 
0ab3a1
    PRINT("sys_pollsys ( %#lx, %lu, %#lx, %#lx )", ARG1, ARG2, ARG3, ARG4);
0ab3a1
    PRE_REG_READ4(long, "poll", pollfd_t *, fds, vki_nfds_t, nfds,
0ab3a1
@@ -7343,18 +7344,37 @@ PRE(sys_pollsys)
0ab3a1
 
0ab3a1
    if (ARG3)
0ab3a1
       PRE_MEM_READ("poll(timeout)", ARG3, sizeof(vki_timespec_t));
0ab3a1
-   if (ARG4)
0ab3a1
+
0ab3a1
+   if (ARG4) {
0ab3a1
       PRE_MEM_READ("poll(set)", ARG4, sizeof(vki_sigset_t));
0ab3a1
+
0ab3a1
+      const vki_sigset_t *guest_sigmask = (vki_sigset_t *) ARG4;
0ab3a1
+      if (!ML_(safe_to_deref)(guest_sigmask, sizeof(vki_sigset_t))) {
0ab3a1
+         ARG4 = 1; /* Something recognisable to POST() hook. */
0ab3a1
+      } else {
0ab3a1
+         vki_sigset_t *vg_sigmask =
0ab3a1
+            VG_(malloc)("syswrap.pollsys.1", sizeof(vki_sigset_t));
0ab3a1
+         ARG4 = (Addr) vg_sigmask;
0ab3a1
+         *vg_sigmask = *guest_sigmask;
0ab3a1
+         VG_(sanitize_client_sigmask)(vg_sigmask);
0ab3a1
+      }
0ab3a1
+   }
0ab3a1
 }
0ab3a1
 
0ab3a1
 POST(sys_pollsys)
0ab3a1
 {
0ab3a1
-   if (RES >= 0) {
0ab3a1
+   vg_assert(SUCCESS || FAILURE);
0ab3a1
+
0ab3a1
+   if (SUCCESS && (RES >= 0)) {
0ab3a1
       UWord i;
0ab3a1
       vki_pollfd_t *ufds = (vki_pollfd_t*)ARG1;
0ab3a1
       for (i = 0; i < ARG2; i++)
0ab3a1
          POST_FIELD_WRITE(ufds[i].revents);
0ab3a1
    }
0ab3a1
+
0ab3a1
+   if ((ARG4 != 0) && (ARG4 != 1)) {
0ab3a1
+      VG_(free)((vki_sigset_t *) ARG4);
0ab3a1
+   }
0ab3a1
 }
0ab3a1
 
0ab3a1
 PRE(sys_labelsys)
0ab3a1
diff --git a/coregrind/m_syswrap/syswrap-tilegx-linux.c b/coregrind/m_syswrap/syswrap-tilegx-linux.c
0ab3a1
index aceceb4..4845f79 100644
0ab3a1
--- a/coregrind/m_syswrap/syswrap-tilegx-linux.c
0ab3a1
+++ b/coregrind/m_syswrap/syswrap-tilegx-linux.c
0ab3a1
@@ -1202,7 +1202,7 @@ static SyscallTableEntry syscall_table[] = {
0ab3a1
   LINXY(__NR_preadv,            sys_preadv),               // 69
0ab3a1
   LINX_(__NR_pwritev,           sys_pwritev),              // 70
0ab3a1
   LINXY(__NR_sendfile,          sys_sendfile),             // 71
0ab3a1
-  LINX_(__NR_pselect6,          sys_pselect6),             // 72
0ab3a1
+  LINXY(__NR_pselect6,          sys_pselect6),             // 72
0ab3a1
   LINXY(__NR_ppoll,             sys_ppoll),                // 73
0ab3a1
   LINXY(__NR_signalfd4,         sys_signalfd4),            // 74
0ab3a1
   LINX_(__NR_splice,            sys_splice),               // 75
0ab3a1
diff --git a/coregrind/m_syswrap/syswrap-x86-linux.c b/coregrind/m_syswrap/syswrap-x86-linux.c
0ab3a1
index 3c80e6a..f1f97d7 100644
0ab3a1
--- a/coregrind/m_syswrap/syswrap-x86-linux.c
0ab3a1
+++ b/coregrind/m_syswrap/syswrap-x86-linux.c
0ab3a1
@@ -1766,7 +1766,7 @@ static SyscallTableEntry syscall_table[] = {
0ab3a1
    LINX_(__NR_readlinkat,	 sys_readlinkat),       // 305
0ab3a1
    LINX_(__NR_fchmodat,		 sys_fchmodat),         // 306
0ab3a1
    LINX_(__NR_faccessat,	 sys_faccessat),        // 307
0ab3a1
-   LINX_(__NR_pselect6,		 sys_pselect6),         // 308
0ab3a1
+   LINXY(__NR_pselect6,		 sys_pselect6),         // 308
0ab3a1
    LINXY(__NR_ppoll,		 sys_ppoll),            // 309
0ab3a1
 
0ab3a1
    LINX_(__NR_unshare,		 sys_unshare),          // 310
0ab3a1
diff --git a/none/tests/Makefile.am b/none/tests/Makefile.am
0ab3a1
index 7eb2bf8..5d8e942 100644
0ab3a1
--- a/none/tests/Makefile.am
0ab3a1
+++ b/none/tests/Makefile.am
0ab3a1
@@ -142,12 +142,14 @@ EXTRA_DIST = \
0ab3a1
 	nestedfns.stderr.exp nestedfns.stdout.exp nestedfns.vgtest \
0ab3a1
 	nodir.stderr.exp nodir.vgtest \
0ab3a1
 	pending.stdout.exp pending.stderr.exp pending.vgtest \
0ab3a1
+	ppoll_alarm.stdout.exp ppoll_alarm.stderr.exp ppoll_alarm.vgtest \
0ab3a1
 	procfs-linux.stderr.exp-with-readlinkat \
0ab3a1
 	procfs-linux.stderr.exp-without-readlinkat \
0ab3a1
 	procfs-linux.vgtest \
0ab3a1
 	procfs-non-linux.vgtest \
0ab3a1
 	procfs-non-linux.stderr.exp-with-readlinkat \
0ab3a1
 	procfs-non-linux.stderr.exp-without-readlinkat \
0ab3a1
+	pselect_alarm.stdout.exp pselect_alarm.stderr.exp pselect_alarm.vgtest \
0ab3a1
 	pth_atfork1.stderr.exp pth_atfork1.stdout.exp pth_atfork1.vgtest \
0ab3a1
 	pth_blockedsig.stderr.exp \
0ab3a1
 	pth_blockedsig.stdout.exp pth_blockedsig.vgtest \
0ab3a1
@@ -215,7 +217,9 @@ check_PROGRAMS = \
0ab3a1
 	mmap_fcntl_bug \
0ab3a1
 	munmap_exe map_unaligned map_unmap mq \
0ab3a1
 	pending \
0ab3a1
+	ppoll_alarm \
0ab3a1
 	procfs-cmdline-exe \
0ab3a1
+	pselect_alarm \
0ab3a1
 	pth_atfork1 pth_blockedsig pth_cancel1 pth_cancel2 pth_cvsimple \
0ab3a1
 	pth_empty pth_exit pth_exit2 pth_mutexspeed pth_once pth_rwlock \
0ab3a1
 	pth_stackalign \
0ab3a1
@@ -289,6 +293,8 @@ libvexmultiarch_test_LDADD = \
0ab3a1
 	../../VEX/libvexmultiarch-@VGCONF_ARCH_PRI@-@VGCONF_OS@.a \
0ab3a1
 	../../VEX/libvex-@VGCONF_ARCH_PRI@-@VGCONF_OS@.a @LIB_UBSAN@
0ab3a1
 libvexmultiarch_test_SOURCES = libvex_test.c
0ab3a1
+ppoll_alarm_LDADD	= -lpthread
0ab3a1
+pselect_alarm_LDADD	= -lpthread
0ab3a1
 pth_atfork1_LDADD	= -lpthread
0ab3a1
 pth_blockedsig_LDADD	= -lpthread
0ab3a1
 pth_cancel1_CFLAGS	= $(AM_CFLAGS) -Wno-shadow
0ab3a1
diff --git a/none/tests/ppoll_alarm.c b/none/tests/ppoll_alarm.c
0ab3a1
new file mode 100644
0ab3a1
index 0000000..1b1794b
0ab3a1
--- /dev/null
0ab3a1
+++ b/none/tests/ppoll_alarm.c
0ab3a1
@@ -0,0 +1,55 @@
0ab3a1
+/* Tries to exploit bug in ppoll mask handling:
0ab3a1
+   https://bugs.kde.org/show_bug.cgi?id=359871
0ab3a1
+   where client program was able to successfully block VG_SIGVGKILL. */
0ab3a1
+
0ab3a1
+#define _GNU_SOURCE /* for ppoll */
0ab3a1
+#include <poll.h>
0ab3a1
+#include <pthread.h>
0ab3a1
+#include <signal.h>
0ab3a1
+#include <stdio.h>
0ab3a1
+#include <unistd.h>
0ab3a1
+
0ab3a1
+static int ready = 0;
0ab3a1
+static pthread_mutex_t mutex = PTHREAD_MUTEX_INITIALIZER;
0ab3a1
+static pthread_cond_t cond = PTHREAD_COND_INITIALIZER;
0ab3a1
+
0ab3a1
+static void *
0ab3a1
+mythr(void *ignore)
0ab3a1
+{
0ab3a1
+    pthread_mutex_lock(&mutex);
0ab3a1
+    ready = 1;
0ab3a1
+    pthread_cond_signal(&cond;;
0ab3a1
+    pthread_mutex_unlock(&mutex);
0ab3a1
+
0ab3a1
+    sigset_t ss;
0ab3a1
+    sigfillset(&ss);
0ab3a1
+    while (1) {
0ab3a1
+        struct timespec ts = {10000, 0};
0ab3a1
+        ppoll(NULL, 0, &ts, &ss);
0ab3a1
+    }
0ab3a1
+
0ab3a1
+    return NULL;
0ab3a1
+}
0ab3a1
+
0ab3a1
+int
0ab3a1
+main()
0ab3a1
+{
0ab3a1
+    pthread_t thr;
0ab3a1
+    int ret = pthread_create(&thr, NULL, mythr, NULL);
0ab3a1
+    if (ret != 0) {
0ab3a1
+        fprintf(stderr, "pthread_create failed\n");
0ab3a1
+        return 1;
0ab3a1
+    }
0ab3a1
+
0ab3a1
+    pthread_mutex_lock(&mutex);
0ab3a1
+    while (ready == 0) {
0ab3a1
+        pthread_cond_wait(&cond, &mutex);
0ab3a1
+    }
0ab3a1
+    pthread_mutex_unlock(&mutex);
0ab3a1
+
0ab3a1
+    alarm(1); /* Unhandled SIGALRM should cause exit. */
0ab3a1
+    while (1)
0ab3a1
+        sleep(1);
0ab3a1
+
0ab3a1
+    return 0;
0ab3a1
+}
0ab3a1
diff --git a/none/tests/ppoll_alarm.stderr.exp b/none/tests/ppoll_alarm.stderr.exp
0ab3a1
new file mode 100644
0ab3a1
index 0000000..e69de29
0ab3a1
diff --git a/none/tests/ppoll_alarm.stdout.exp b/none/tests/ppoll_alarm.stdout.exp
0ab3a1
new file mode 100644
0ab3a1
index 0000000..e69de29
0ab3a1
diff --git a/none/tests/ppoll_alarm.vgtest b/none/tests/ppoll_alarm.vgtest
0ab3a1
new file mode 100644
0ab3a1
index 0000000..b1309d3
0ab3a1
--- /dev/null
0ab3a1
+++ b/none/tests/ppoll_alarm.vgtest
0ab3a1
@@ -0,0 +1,3 @@
0ab3a1
+prog: ppoll_alarm
0ab3a1
+vgopts: -q
0ab3a1
+stderr_filter: filter_stderr
0ab3a1
diff --git a/none/tests/pselect_alarm.c b/none/tests/pselect_alarm.c
0ab3a1
new file mode 100644
0ab3a1
index 0000000..7a68ec0
0ab3a1
--- /dev/null
0ab3a1
+++ b/none/tests/pselect_alarm.c
0ab3a1
@@ -0,0 +1,61 @@
0ab3a1
+/* Tries to exploit bug in pselect mask handling:
0ab3a1
+   https://bugs.kde.org/show_bug.cgi?id=359871
0ab3a1
+   where client program was able to successfully block VG_SIGVGKILL. */
0ab3a1
+
0ab3a1
+#include <sys/select.h>
0ab3a1
+#include <assert.h>
0ab3a1
+#include <errno.h>
0ab3a1
+#include <pthread.h>
0ab3a1
+#include <signal.h>
0ab3a1
+#include <stdio.h>
0ab3a1
+#include <unistd.h>
0ab3a1
+
0ab3a1
+static int ready = 0;
0ab3a1
+static pthread_mutex_t mutex = PTHREAD_MUTEX_INITIALIZER;
0ab3a1
+static pthread_cond_t cond = PTHREAD_COND_INITIALIZER;
0ab3a1
+
0ab3a1
+static void *
0ab3a1
+mythr(void *ignore)
0ab3a1
+{
0ab3a1
+    pthread_mutex_lock(&mutex);
0ab3a1
+    ready = 1;
0ab3a1
+    pthread_cond_signal(&cond;;
0ab3a1
+    pthread_mutex_unlock(&mutex);
0ab3a1
+
0ab3a1
+    sigset_t ss;
0ab3a1
+    sigfillset(&ss);
0ab3a1
+    while (1) {
0ab3a1
+        struct timespec ts = {10000, 0};
0ab3a1
+        pselect(0, NULL, NULL, NULL, &ts, &ss);
0ab3a1
+    }
0ab3a1
+
0ab3a1
+    return NULL;
0ab3a1
+}
0ab3a1
+
0ab3a1
+int
0ab3a1
+main()
0ab3a1
+{
0ab3a1
+    pthread_t thr;
0ab3a1
+    int ret = pthread_create(&thr, NULL, mythr, NULL);
0ab3a1
+    if (ret != 0) {
0ab3a1
+        fprintf(stderr, "pthread_create failed\n");
0ab3a1
+        return 1;
0ab3a1
+    }
0ab3a1
+
0ab3a1
+    pthread_mutex_lock(&mutex);
0ab3a1
+    while (ready == 0) {
0ab3a1
+        pthread_cond_wait(&cond, &mutex);
0ab3a1
+    }
0ab3a1
+    pthread_mutex_unlock(&mutex);
0ab3a1
+
0ab3a1
+#if defined(VGO_linux)
0ab3a1
+    assert(pselect(0, NULL, NULL, NULL, NULL, (sigset_t *)12) == -1);
0ab3a1
+    assert(errno == EFAULT);
0ab3a1
+#endif
0ab3a1
+
0ab3a1
+    alarm(1); /* Unhandled SIGALRM should cause exit. */
0ab3a1
+    while (1)
0ab3a1
+        sleep(1);
0ab3a1
+
0ab3a1
+    return 0;
0ab3a1
+}
0ab3a1
diff --git a/none/tests/pselect_alarm.stderr.exp b/none/tests/pselect_alarm.stderr.exp
0ab3a1
new file mode 100644
0ab3a1
index 0000000..e69de29
0ab3a1
diff --git a/none/tests/pselect_alarm.stdout.exp b/none/tests/pselect_alarm.stdout.exp
0ab3a1
new file mode 100644
0ab3a1
index 0000000..e69de29
0ab3a1
diff --git a/none/tests/pselect_alarm.vgtest b/none/tests/pselect_alarm.vgtest
0ab3a1
new file mode 100644
0ab3a1
index 0000000..84cc674
0ab3a1
--- /dev/null
0ab3a1
+++ b/none/tests/pselect_alarm.vgtest
0ab3a1
@@ -0,0 +1,3 @@
0ab3a1
+prog: pselect_alarm
0ab3a1
+vgopts: -q
0ab3a1
+stderr_filter: filter_stderr
0ab3a1
diff --git a/tests/filter_stderr_basic b/tests/filter_stderr_basic
0ab3a1
index 472cd8f..4b6e480 100755
0ab3a1
--- a/tests/filter_stderr_basic
0ab3a1
+++ b/tests/filter_stderr_basic
0ab3a1
@@ -46,7 +46,7 @@ sed "/warning: line info addresses out of order/d" |
0ab3a1
 # of the bash process. Newer bash versions redirect such messages properly.
0ab3a1
 # Suppress any redirected abnormal termination messages. You can find the
0ab3a1
 # complete list of messages in the bash source file siglist.c.
0ab3a1
-perl -n -e 'print if !/^(Segmentation fault|Alarm clock|Aborted|Bus error)( \(core dumped\))?$/' |
0ab3a1
+perl -n -e 'print if !/^(Segmentation fault|Alarm clock|Aborted|Bus error|Killed)( \(core dumped\))?$/' |
0ab3a1
 
0ab3a1
 # Similar as above, but for ksh on Solaris/illumos.
0ab3a1
 perl -n -e 'print if !/^(Memory fault|Killed) $/' |
0ab3a1
Only in valgrind-3.11.0: autom4te.cache
0ab3a1
diff -ru valgrind-3.11.0.orig/none/tests/Makefile.in valgrind-3.11.0/none/tests/Makefile.in
0ab3a1
--- valgrind-3.11.0.orig/none/tests/Makefile.in	2016-03-09 20:07:53.451112914 +0100
0ab3a1
+++ valgrind-3.11.0/none/tests/Makefile.in	2016-03-09 20:09:44.281584703 +0100
0ab3a1
@@ -151,7 +151,8 @@
0ab3a1
 	libvexmultiarch_test$(EXEEXT) manythreads$(EXEEXT) \
0ab3a1
 	mmap_fcntl_bug$(EXEEXT) munmap_exe$(EXEEXT) \
0ab3a1
 	map_unaligned$(EXEEXT) map_unmap$(EXEEXT) mq$(EXEEXT) \
0ab3a1
-	pending$(EXEEXT) procfs-cmdline-exe$(EXEEXT) \
0ab3a1
+	pending$(EXEEXT) ppoll_alarm$(EXEEXT) \
0ab3a1
+	procfs-cmdline-exe$(EXEEXT) pselect_alarm$(EXEEXT) \
0ab3a1
 	pth_atfork1$(EXEEXT) pth_blockedsig$(EXEEXT) \
0ab3a1
 	pth_cancel1$(EXEEXT) pth_cancel2$(EXEEXT) \
0ab3a1
 	pth_cvsimple$(EXEEXT) pth_empty$(EXEEXT) pth_exit$(EXEEXT) \
0ab3a1
@@ -329,12 +330,18 @@
0ab3a1
 pending_SOURCES = pending.c
0ab3a1
 pending_OBJECTS = pending.$(OBJEXT)
0ab3a1
 pending_LDADD = $(LDADD)
0ab3a1
+ppoll_alarm_SOURCES = ppoll_alarm.c
0ab3a1
+ppoll_alarm_OBJECTS = ppoll_alarm.$(OBJEXT)
0ab3a1
+ppoll_alarm_DEPENDENCIES =
0ab3a1
 process_vm_readv_writev_SOURCES = process_vm_readv_writev.c
0ab3a1
 process_vm_readv_writev_OBJECTS = process_vm_readv_writev.$(OBJEXT)
0ab3a1
 process_vm_readv_writev_LDADD = $(LDADD)
0ab3a1
 procfs_cmdline_exe_SOURCES = procfs-cmdline-exe.c
0ab3a1
 procfs_cmdline_exe_OBJECTS = procfs-cmdline-exe.$(OBJEXT)
0ab3a1
 procfs_cmdline_exe_LDADD = $(LDADD)
0ab3a1
+pselect_alarm_SOURCES = pselect_alarm.c
0ab3a1
+pselect_alarm_OBJECTS = pselect_alarm.$(OBJEXT)
0ab3a1
+pselect_alarm_DEPENDENCIES =
0ab3a1
 pth_atfork1_SOURCES = pth_atfork1.c
0ab3a1
 pth_atfork1_OBJECTS = pth_atfork1.$(OBJEXT)
0ab3a1
 pth_atfork1_DEPENDENCIES =
0ab3a1
@@ -527,18 +534,18 @@
0ab3a1
 	$(gxx304_SOURCES) ifunc.c ioctl_moans.c libvex_test.c \
0ab3a1
 	$(libvexmultiarch_test_SOURCES) manythreads.c map_unaligned.c \
0ab3a1
 	map_unmap.c mmap_fcntl_bug.c mq.c munmap_exe.c nestedfns.c \
0ab3a1
-	pending.c process_vm_readv_writev.c procfs-cmdline-exe.c \
0ab3a1
-	pth_atfork1.c pth_blockedsig.c pth_cancel1.c pth_cancel2.c \
0ab3a1
-	pth_cvsimple.c pth_empty.c pth_exit.c pth_exit2.c \
0ab3a1
-	pth_mutexspeed.c pth_once.c pth_rwlock.c pth_stackalign.c \
0ab3a1
-	rcrl.c readline1.c require-text-symbol.c res_search.c resolv.c \
0ab3a1
-	rlimit64_nofile.c rlimit_nofile.c selfrun.c sem.c semlimit.c \
0ab3a1
-	sha1_test.c shortpush.c shorts.c sigstackgrowth.c \
0ab3a1
-	stackgrowth.c syscall-restart1.c syscall-restart2.c syslog.c \
0ab3a1
-	system.c thread-exits.c threaded-fork.c threadederrno.c \
0ab3a1
-	timestamp.c $(tls_SOURCES) $(tls_so_SOURCES) \
0ab3a1
-	$(tls2_so_SOURCES) unit_debuglog.c \
0ab3a1
-	$(valgrind_cpp_test_SOURCES) vgprintf.c
0ab3a1
+	pending.c ppoll_alarm.c process_vm_readv_writev.c \
0ab3a1
+	procfs-cmdline-exe.c pselect_alarm.c pth_atfork1.c \
0ab3a1
+	pth_blockedsig.c pth_cancel1.c pth_cancel2.c pth_cvsimple.c \
0ab3a1
+	pth_empty.c pth_exit.c pth_exit2.c pth_mutexspeed.c pth_once.c \
0ab3a1
+	pth_rwlock.c pth_stackalign.c rcrl.c readline1.c \
0ab3a1
+	require-text-symbol.c res_search.c resolv.c rlimit64_nofile.c \
0ab3a1
+	rlimit_nofile.c selfrun.c sem.c semlimit.c sha1_test.c \
0ab3a1
+	shortpush.c shorts.c sigstackgrowth.c stackgrowth.c \
0ab3a1
+	syscall-restart1.c syscall-restart2.c syslog.c system.c \
0ab3a1
+	thread-exits.c threaded-fork.c threadederrno.c timestamp.c \
0ab3a1
+	$(tls_SOURCES) $(tls_so_SOURCES) $(tls2_so_SOURCES) \
0ab3a1
+	unit_debuglog.c $(valgrind_cpp_test_SOURCES) vgprintf.c
0ab3a1
 DIST_SOURCES = ansi.c args.c async-sigs.c bitfield1.c bug129866.c \
0ab3a1
 	bug234814.c closeall.c $(coolo_sigaction_SOURCES) \
0ab3a1
 	coolo_strlen.c discard.c exec-sigmask.c execve.c faultstatus.c \
0ab3a1
@@ -548,18 +555,18 @@
0ab3a1
 	$(gxx304_SOURCES) ifunc.c ioctl_moans.c libvex_test.c \
0ab3a1
 	$(libvexmultiarch_test_SOURCES) manythreads.c map_unaligned.c \
0ab3a1
 	map_unmap.c mmap_fcntl_bug.c mq.c munmap_exe.c nestedfns.c \
0ab3a1
-	pending.c process_vm_readv_writev.c procfs-cmdline-exe.c \
0ab3a1
-	pth_atfork1.c pth_blockedsig.c pth_cancel1.c pth_cancel2.c \
0ab3a1
-	pth_cvsimple.c pth_empty.c pth_exit.c pth_exit2.c \
0ab3a1
-	pth_mutexspeed.c pth_once.c pth_rwlock.c pth_stackalign.c \
0ab3a1
-	rcrl.c readline1.c require-text-symbol.c res_search.c resolv.c \
0ab3a1
-	rlimit64_nofile.c rlimit_nofile.c selfrun.c sem.c semlimit.c \
0ab3a1
-	sha1_test.c shortpush.c shorts.c sigstackgrowth.c \
0ab3a1
-	stackgrowth.c syscall-restart1.c syscall-restart2.c syslog.c \
0ab3a1
-	system.c thread-exits.c threaded-fork.c threadederrno.c \
0ab3a1
-	timestamp.c $(tls_SOURCES) $(tls_so_SOURCES) \
0ab3a1
-	$(tls2_so_SOURCES) unit_debuglog.c \
0ab3a1
-	$(valgrind_cpp_test_SOURCES) vgprintf.c
0ab3a1
+	pending.c ppoll_alarm.c process_vm_readv_writev.c \
0ab3a1
+	procfs-cmdline-exe.c pselect_alarm.c pth_atfork1.c \
0ab3a1
+	pth_blockedsig.c pth_cancel1.c pth_cancel2.c pth_cvsimple.c \
0ab3a1
+	pth_empty.c pth_exit.c pth_exit2.c pth_mutexspeed.c pth_once.c \
0ab3a1
+	pth_rwlock.c pth_stackalign.c rcrl.c readline1.c \
0ab3a1
+	require-text-symbol.c res_search.c resolv.c rlimit64_nofile.c \
0ab3a1
+	rlimit_nofile.c selfrun.c sem.c semlimit.c sha1_test.c \
0ab3a1
+	shortpush.c shorts.c sigstackgrowth.c stackgrowth.c \
0ab3a1
+	syscall-restart1.c syscall-restart2.c syslog.c system.c \
0ab3a1
+	thread-exits.c threaded-fork.c threadederrno.c timestamp.c \
0ab3a1
+	$(tls_SOURCES) $(tls_so_SOURCES) $(tls2_so_SOURCES) \
0ab3a1
+	unit_debuglog.c $(valgrind_cpp_test_SOURCES) vgprintf.c
0ab3a1
 RECURSIVE_TARGETS = all-recursive check-recursive cscopelist-recursive \
0ab3a1
 	ctags-recursive dvi-recursive html-recursive info-recursive \
0ab3a1
 	install-data-recursive install-dvi-recursive \
0ab3a1
@@ -1072,12 +1079,14 @@
0ab3a1
 	nestedfns.stderr.exp nestedfns.stdout.exp nestedfns.vgtest \
0ab3a1
 	nodir.stderr.exp nodir.vgtest \
0ab3a1
 	pending.stdout.exp pending.stderr.exp pending.vgtest \
0ab3a1
+	ppoll_alarm.stdout.exp ppoll_alarm.stderr.exp ppoll_alarm.vgtest \
0ab3a1
 	procfs-linux.stderr.exp-with-readlinkat \
0ab3a1
 	procfs-linux.stderr.exp-without-readlinkat \
0ab3a1
 	procfs-linux.vgtest \
0ab3a1
 	procfs-non-linux.vgtest \
0ab3a1
 	procfs-non-linux.stderr.exp-with-readlinkat \
0ab3a1
 	procfs-non-linux.stderr.exp-without-readlinkat \
0ab3a1
+	pselect_alarm.stdout.exp pselect_alarm.stderr.exp pselect_alarm.vgtest \
0ab3a1
 	pth_atfork1.stderr.exp pth_atfork1.stdout.exp pth_atfork1.vgtest \
0ab3a1
 	pth_blockedsig.stderr.exp \
0ab3a1
 	pth_blockedsig.stdout.exp pth_blockedsig.vgtest \
0ab3a1
@@ -1152,6 +1161,8 @@
0ab3a1
 	../../VEX/libvex-@VGCONF_ARCH_PRI@-@VGCONF_OS@.a @LIB_UBSAN@
0ab3a1
 
0ab3a1
 libvexmultiarch_test_SOURCES = libvex_test.c
0ab3a1
+ppoll_alarm_LDADD = -lpthread
0ab3a1
+pselect_alarm_LDADD = -lpthread
0ab3a1
 pth_atfork1_LDADD = -lpthread
0ab3a1
 pth_blockedsig_LDADD = -lpthread
0ab3a1
 pth_cancel1_CFLAGS = $(AM_CFLAGS) -Wno-shadow
0ab3a1
@@ -1390,6 +1401,10 @@
0ab3a1
 	@rm -f pending$(EXEEXT)
0ab3a1
 	$(AM_V_CCLD)$(LINK) $(pending_OBJECTS) $(pending_LDADD) $(LIBS)
0ab3a1
 
0ab3a1
+ppoll_alarm$(EXEEXT): $(ppoll_alarm_OBJECTS) $(ppoll_alarm_DEPENDENCIES) $(EXTRA_ppoll_alarm_DEPENDENCIES) 
0ab3a1
+	@rm -f ppoll_alarm$(EXEEXT)
0ab3a1
+	$(AM_V_CCLD)$(LINK) $(ppoll_alarm_OBJECTS) $(ppoll_alarm_LDADD) $(LIBS)
0ab3a1
+
0ab3a1
 process_vm_readv_writev$(EXEEXT): $(process_vm_readv_writev_OBJECTS) $(process_vm_readv_writev_DEPENDENCIES) $(EXTRA_process_vm_readv_writev_DEPENDENCIES) 
0ab3a1
 	@rm -f process_vm_readv_writev$(EXEEXT)
0ab3a1
 	$(AM_V_CCLD)$(LINK) $(process_vm_readv_writev_OBJECTS) $(process_vm_readv_writev_LDADD) $(LIBS)
0ab3a1
@@ -1398,6 +1413,10 @@
0ab3a1
 	@rm -f procfs-cmdline-exe$(EXEEXT)
0ab3a1
 	$(AM_V_CCLD)$(LINK) $(procfs_cmdline_exe_OBJECTS) $(procfs_cmdline_exe_LDADD) $(LIBS)
0ab3a1
 
0ab3a1
+pselect_alarm$(EXEEXT): $(pselect_alarm_OBJECTS) $(pselect_alarm_DEPENDENCIES) $(EXTRA_pselect_alarm_DEPENDENCIES) 
0ab3a1
+	@rm -f pselect_alarm$(EXEEXT)
0ab3a1
+	$(AM_V_CCLD)$(LINK) $(pselect_alarm_OBJECTS) $(pselect_alarm_LDADD) $(LIBS)
0ab3a1
+
0ab3a1
 pth_atfork1$(EXEEXT): $(pth_atfork1_OBJECTS) $(pth_atfork1_DEPENDENCIES) $(EXTRA_pth_atfork1_DEPENDENCIES) 
0ab3a1
 	@rm -f pth_atfork1$(EXEEXT)
0ab3a1
 	$(AM_V_CCLD)$(LINK) $(pth_atfork1_OBJECTS) $(pth_atfork1_LDADD) $(LIBS)
0ab3a1
@@ -1607,8 +1626,10 @@
0ab3a1
 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/munmap_exe.Po@am__quote@
0ab3a1
 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/nestedfns-nestedfns.Po@am__quote@
0ab3a1
 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/pending.Po@am__quote@
0ab3a1
+@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/ppoll_alarm.Po@am__quote@
0ab3a1
 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/process_vm_readv_writev.Po@am__quote@
0ab3a1
 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/procfs-cmdline-exe.Po@am__quote@
0ab3a1
+@AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/pselect_alarm.Po@am__quote@
0ab3a1
 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/pth_atfork1.Po@am__quote@
0ab3a1
 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/pth_blockedsig.Po@am__quote@
0ab3a1
 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/pth_cancel1-pth_cancel1.Po@am__quote@