Blame SOURCES/valgrind-3.16.1-epoll.patch

f03e82
commit f326d68d762edf4b0e9604daa446b6f8ca25725a
f03e82
Author: Mark Wielaard <mark@klomp.org>
f03e82
Date:   Sun Jul 26 22:40:22 2020 +0200
f03e82
f03e82
    epoll_ctl warns for uninitialized padding on non-amd64 64bit arches
f03e82
    
f03e82
    struct vki_epoll_event is packed on x86_64, but not on other 64bit
f03e82
    arches. This means that on 64bit arches there can be padding in the
f03e82
    epoll_event struct. Seperately the data field is only used by user
f03e82
    space (which might not set the data field if it doesn't need to).
f03e82
    
f03e82
    Only check the events field on epoll_ctl. But assume both events
f03e82
    and data are both written to by epoll_[p]wait (exclude padding).
f03e82
    
f03e82
    https://bugs.kde.org/show_bug.cgi?id=422623
f03e82
f03e82
diff --git a/coregrind/m_syswrap/syswrap-linux.c b/coregrind/m_syswrap/syswrap-linux.c
f03e82
index 5b5b7eee6..929a4d9af 100644
f03e82
--- a/coregrind/m_syswrap/syswrap-linux.c
f03e82
+++ b/coregrind/m_syswrap/syswrap-linux.c
f03e82
@@ -2099,8 +2099,29 @@ PRE(sys_epoll_ctl)
f03e82
          SARG1, ( ARG2<3 ? epoll_ctl_s[ARG2] : "?" ), SARG3, ARG4);
f03e82
    PRE_REG_READ4(long, "epoll_ctl",
f03e82
                  int, epfd, int, op, int, fd, struct vki_epoll_event *, event);
f03e82
-   if (ARG2 != VKI_EPOLL_CTL_DEL)
f03e82
-      PRE_MEM_READ( "epoll_ctl(event)", ARG4, sizeof(struct vki_epoll_event) );
f03e82
+   if (ARG2 != VKI_EPOLL_CTL_DEL) {
f03e82
+      /* Just check the events field, the data field is for user space and
f03e82
+         unused by the kernel.  */
f03e82
+      struct vki_epoll_event *event = (struct vki_epoll_event *) ARG4;
f03e82
+      PRE_MEM_READ( "epoll_ctl(event)", (Addr) &event->events,
f03e82
+                    sizeof(__vki_u32) );
f03e82
+   }
f03e82
+}
f03e82
+
f03e82
+/* RES event records have been written (exclude padding).  */
f03e82
+static void epoll_post_helper ( ThreadId tid, SyscallArgs* arrghs,
f03e82
+                                SyscallStatus* status )
f03e82
+{
f03e82
+   vg_assert(SUCCESS);
f03e82
+   if (RES > 0) {
f03e82
+      Int i;
f03e82
+      struct vki_epoll_event **events = (struct vki_epoll_event**)(Addr)ARG2;
f03e82
+      for (i = 0; i < RES; i++) {
f03e82
+         /* Assume both events and data are set (data is user space only). */
f03e82
+         POST_FIELD_WRITE(events[i]->events);
f03e82
+         POST_FIELD_WRITE(events[i]->data);
f03e82
+      }
f03e82
+   }
f03e82
 }
f03e82
 
f03e82
 PRE(sys_epoll_wait)
f03e82
@@ -2111,13 +2132,12 @@ PRE(sys_epoll_wait)
f03e82
    PRE_REG_READ4(long, "epoll_wait",
f03e82
                  int, epfd, struct vki_epoll_event *, events,
f03e82
                  int, maxevents, int, timeout);
f03e82
+   /* Assume all (maxevents) events records should be (fully) writable. */
f03e82
    PRE_MEM_WRITE( "epoll_wait(events)", ARG2, sizeof(struct vki_epoll_event)*ARG3);
f03e82
 }
f03e82
 POST(sys_epoll_wait)
f03e82
 {
f03e82
-   vg_assert(SUCCESS);
f03e82
-   if (RES > 0)
f03e82
-      POST_MEM_WRITE( ARG2, sizeof(struct vki_epoll_event)*RES ) ;
f03e82
+   epoll_post_helper (tid, arrghs, status);
f03e82
 }
f03e82
 
f03e82
 PRE(sys_epoll_pwait)
f03e82
@@ -2130,15 +2150,14 @@ PRE(sys_epoll_pwait)
f03e82
                  int, epfd, struct vki_epoll_event *, events,
f03e82
                  int, maxevents, int, timeout, vki_sigset_t *, sigmask,
f03e82
                  vki_size_t, sigsetsize);
f03e82
+   /* Assume all (maxevents) events records should be (fully) writable. */
f03e82
    PRE_MEM_WRITE( "epoll_pwait(events)", ARG2, sizeof(struct vki_epoll_event)*ARG3);
f03e82
    if (ARG5)
f03e82
       PRE_MEM_READ( "epoll_pwait(sigmask)", ARG5, sizeof(vki_sigset_t) );
f03e82
 }
f03e82
 POST(sys_epoll_pwait)
f03e82
 {
f03e82
-   vg_assert(SUCCESS);
f03e82
-   if (RES > 0)
f03e82
-      POST_MEM_WRITE( ARG2, sizeof(struct vki_epoll_event)*RES ) ;
f03e82
+   epoll_post_helper (tid, arrghs, status);
f03e82
 }
f03e82
 
f03e82
 PRE(sys_eventfd)
f03e82
commit b74f9f23c8758c77367f18368ea95baa858544cb
f03e82
Author: Mark Wielaard <mark@klomp.org>
f03e82
Date:   Tue Aug 18 23:58:55 2020 +0200
f03e82
f03e82
    Fix epoll_ctl setting of array event and data fields.
f03e82
    
f03e82
    Fix for https://bugs.kde.org/show_bug.cgi?id=422623 in commit ecf5ba119
f03e82
    epoll_ctl warns for uninitialized padding on non-amd64 64bit arches
f03e82
    contained a bug. A pointer to an array is not a pointer to a pointer to
f03e82
    an array. Found by a Fedora user:
f03e82
    https://bugzilla.redhat.com/show_bug.cgi?id=1844778#c10
f03e82
f03e82
diff --git a/coregrind/m_syswrap/syswrap-linux.c b/coregrind/m_syswrap/syswrap-linux.c
f03e82
index 0850487e9..3f488795a 100644
f03e82
--- a/coregrind/m_syswrap/syswrap-linux.c
f03e82
+++ b/coregrind/m_syswrap/syswrap-linux.c
f03e82
@@ -2115,11 +2115,11 @@ static void epoll_post_helper ( ThreadId tid, SyscallArgs* arrghs,
f03e82
    vg_assert(SUCCESS);
f03e82
    if (RES > 0) {
f03e82
       Int i;
f03e82
-      struct vki_epoll_event **events = (struct vki_epoll_event**)(Addr)ARG2;
f03e82
+      struct vki_epoll_event *events = (struct vki_epoll_event*)(Addr)ARG2;
f03e82
       for (i = 0; i < RES; i++) {
f03e82
          /* Assume both events and data are set (data is user space only). */
f03e82
-         POST_FIELD_WRITE(events[i]->events);
f03e82
-         POST_FIELD_WRITE(events[i]->data);
f03e82
+         POST_FIELD_WRITE(events[i].events);
f03e82
+         POST_FIELD_WRITE(events[i].data);
f03e82
       }
f03e82
    }
f03e82
 }