Blame SOURCES/0036-syscall.c-avoid-infinite-loop-in-subcalls-parsing.patch

b484ca
From 522ad3a0e73148dadd2480cd9cec84d9112b2e57 Mon Sep 17 00:00:00 2001
b484ca
From: Eugene Syromyatnikov <evgsyr@gmail.com>
b484ca
Date: Tue, 4 Sep 2018 14:48:13 +0200
b484ca
Subject: [PATCH] syscall.c: avoid infinite loop in subcalls parsing
b484ca
b484ca
clang complains about it, so it might be a good reason to refactor it
b484ca
into something more linear.
b484ca
b484ca
* syscall.c (syscall_entering_decode): Put syscall subcall decoding
b484ca
before ipc/socket subcall decoding, remove the loop.
b484ca
---
b484ca
 syscall.c | 19 ++++++-------------
b484ca
 1 file changed, 6 insertions(+), 13 deletions(-)
b484ca
b484ca
diff --git a/syscall.c b/syscall.c
b484ca
index bae7343..a67d744 100644
b484ca
--- a/syscall.c
b484ca
+++ b/syscall.c
b484ca
@@ -579,11 +579,13 @@ syscall_entering_decode(struct tcb *tcp)
b484ca
 		return res;
b484ca
 	}
b484ca
 
b484ca
+# ifdef SYS_syscall_subcall
b484ca
+	if (tcp_sysent(tcp)->sen == SEN_syscall)
b484ca
+		decode_syscall_subcall(tcp);
b484ca
+# endif
b484ca
 #if defined SYS_ipc_subcall	\
b484ca
- || defined SYS_socket_subcall	\
b484ca
- || defined SYS_syscall_subcall
b484ca
-	for (;;) {
b484ca
-		switch (tcp_sysent(tcp)->sen) {
b484ca
+ || defined SYS_socket_subcall
b484ca
+	switch (tcp_sysent(tcp)->sen) {
b484ca
 # ifdef SYS_ipc_subcall
b484ca
 		case SEN_ipc:
b484ca
 			decode_ipc_subcall(tcp);
b484ca
@@ -594,15 +596,6 @@ syscall_entering_decode(struct tcb *tcp)
b484ca
 			decode_socket_subcall(tcp);
b484ca
 			break;
b484ca
 # endif
b484ca
-# ifdef SYS_syscall_subcall
b484ca
-		case SEN_syscall:
b484ca
-			decode_syscall_subcall(tcp);
b484ca
-			if (tcp_sysent(tcp)->sen != SEN_syscall)
b484ca
-				continue;
b484ca
-			break;
b484ca
-# endif
b484ca
-		}
b484ca
-		break;
b484ca
 	}
b484ca
 #endif
b484ca
 
b484ca
-- 
b484ca
2.1.4
b484ca