mirror of
https://github.com/capstone-engine/llvm-capstone.git
synced 2025-01-30 05:36:44 +00:00
Regenerate syscall hooks for NetBSD 8.99.25
Register new syscall getsockopt2. Drop removed syscalls pmc_get_info and pmc_control. While there address compiler warnings about potentially unused variables. llvm-svn: 345582
This commit is contained in:
parent
a3783b2ac2
commit
4f343547ba
@ -21,8 +21,8 @@
|
||||
// DO NOT EDIT! THIS FILE HAS BEEN GENERATED!
|
||||
//
|
||||
// Generated with: generate_netbsd_syscalls.awk
|
||||
// Generated date: 2018-03-03
|
||||
// Generated from: syscalls.master,v 1.291 2018/01/06 16:41:23 kamil Exp
|
||||
// Generated date: 2018-10-30
|
||||
// Generated from: syscalls.master,v 1.293 2018/07/31 13:00:13 rjs Exp
|
||||
//
|
||||
//===----------------------------------------------------------------------===//
|
||||
#ifndef SANITIZER_NETBSD_SYSCALL_HOOKS_H
|
||||
@ -986,7 +986,15 @@
|
||||
#define __sanitizer_syscall_post_fpathconf(res, fd, name) \
|
||||
__sanitizer_syscall_post_impl_fpathconf(res, (long long)(fd), \
|
||||
(long long)(name))
|
||||
/* syscall 193 has been skipped */
|
||||
#define __sanitizer_syscall_pre_getsockopt2(s, level, name, val, avalsize) \
|
||||
__sanitizer_syscall_pre_impl_getsockopt2( \
|
||||
(long long)(s), (long long)(level), (long long)(name), (long long)(val), \
|
||||
(long long)(avalsize))
|
||||
#define __sanitizer_syscall_post_getsockopt2(res, s, level, name, val, \
|
||||
avalsize) \
|
||||
__sanitizer_syscall_post_impl_getsockopt2( \
|
||||
res, (long long)(s), (long long)(level), (long long)(name), \
|
||||
(long long)(val), (long long)(avalsize))
|
||||
#define __sanitizer_syscall_pre_getrlimit(which, rlp) \
|
||||
__sanitizer_syscall_pre_impl_getrlimit((long long)(which), (long long)(rlp))
|
||||
#define __sanitizer_syscall_post_getrlimit(res, which, rlp) \
|
||||
@ -1752,18 +1760,8 @@
|
||||
__sanitizer_syscall_post_impl___sigaction_sigtramp( \
|
||||
res, (long long)(signum), (long long)(nsa), (long long)(osa), \
|
||||
(long long)(tramp), (long long)(vers))
|
||||
#define __sanitizer_syscall_pre_pmc_get_info(ctr, op, args) \
|
||||
__sanitizer_syscall_pre_impl_pmc_get_info((long long)(ctr), (long long)(op), \
|
||||
(long long)(args))
|
||||
#define __sanitizer_syscall_post_pmc_get_info(res, ctr, op, args) \
|
||||
__sanitizer_syscall_post_impl_pmc_get_info( \
|
||||
res, (long long)(ctr), (long long)(op), (long long)(args))
|
||||
#define __sanitizer_syscall_pre_pmc_control(ctr, op, args) \
|
||||
__sanitizer_syscall_pre_impl_pmc_control((long long)(ctr), (long long)(op), \
|
||||
(long long)(args))
|
||||
#define __sanitizer_syscall_post_pmc_control(res, ctr, op, args) \
|
||||
__sanitizer_syscall_post_impl_pmc_control( \
|
||||
res, (long long)(ctr), (long long)(op), (long long)(args))
|
||||
/* syscall 341 has been skipped */
|
||||
/* syscall 342 has been skipped */
|
||||
#define __sanitizer_syscall_pre_rasctl(addr, len, op) \
|
||||
__sanitizer_syscall_pre_impl_rasctl((long long)(addr), (long long)(len), \
|
||||
(long long)(op))
|
||||
@ -3444,7 +3442,13 @@ void __sanitizer_syscall_post_impl_pathconf(long long res, long long path,
|
||||
void __sanitizer_syscall_pre_impl_fpathconf(long long fd, long long name);
|
||||
void __sanitizer_syscall_post_impl_fpathconf(long long res, long long fd,
|
||||
long long name);
|
||||
/* syscall 193 has been skipped */
|
||||
void __sanitizer_syscall_pre_impl_getsockopt2(long long s, long long level,
|
||||
long long name, long long val,
|
||||
long long avalsize);
|
||||
void __sanitizer_syscall_post_impl_getsockopt2(long long res, long long s,
|
||||
long long level, long long name,
|
||||
long long val,
|
||||
long long avalsize);
|
||||
void __sanitizer_syscall_pre_impl_getrlimit(long long which, long long rlp);
|
||||
void __sanitizer_syscall_post_impl_getrlimit(long long res, long long which,
|
||||
long long rlp);
|
||||
@ -4001,14 +4005,8 @@ void __sanitizer_syscall_pre_impl___sigaction_sigtramp(long long signum,
|
||||
void __sanitizer_syscall_post_impl___sigaction_sigtramp(
|
||||
long long res, long long signum, long long nsa, long long osa,
|
||||
long long tramp, long long vers);
|
||||
void __sanitizer_syscall_pre_impl_pmc_get_info(long long ctr, long long op,
|
||||
long long args);
|
||||
void __sanitizer_syscall_post_impl_pmc_get_info(long long res, long long ctr,
|
||||
long long op, long long args);
|
||||
void __sanitizer_syscall_pre_impl_pmc_control(long long ctr, long long op,
|
||||
long long args);
|
||||
void __sanitizer_syscall_post_impl_pmc_control(long long res, long long ctr,
|
||||
long long op, long long args);
|
||||
/* syscall 341 has been skipped */
|
||||
/* syscall 342 has been skipped */
|
||||
void __sanitizer_syscall_pre_impl_rasctl(long long addr, long long len,
|
||||
long long op);
|
||||
void __sanitizer_syscall_post_impl_rasctl(long long res, long long addr,
|
||||
|
@ -43,8 +43,8 @@
|
||||
// DO NOT EDIT! THIS FILE HAS BEEN GENERATED!
|
||||
//
|
||||
// Generated with: generate_netbsd_syscalls.awk
|
||||
// Generated date: 2018-03-03
|
||||
// Generated from: syscalls.master,v 1.291 2018/01/06 16:41:23 kamil Exp
|
||||
// Generated date: 2018-10-30
|
||||
// Generated from: syscalls.master,v 1.293 2018/07/31 13:00:13 rjs Exp
|
||||
//
|
||||
//===----------------------------------------------------------------------===//
|
||||
|
||||
@ -1454,7 +1454,15 @@ PRE_SYSCALL(fpathconf)(long long fd_, long long name_) { /* Nothing to do */ }
|
||||
POST_SYSCALL(fpathconf)(long long res, long long fd_, long long name_) {
|
||||
/* Nothing to do */
|
||||
}
|
||||
/* syscall 193 has been skipped */
|
||||
PRE_SYSCALL(getsockopt2)
|
||||
(long long s_, long long level_, long long name_, void *val_, void *avalsize_) {
|
||||
/* TODO */
|
||||
}
|
||||
POST_SYSCALL(getsockopt2)
|
||||
(long long res, long long s_, long long level_, long long name_, void *val_,
|
||||
void *avalsize_) {
|
||||
/* TODO */
|
||||
}
|
||||
PRE_SYSCALL(getrlimit)(long long which_, void *rlp_) {
|
||||
PRE_WRITE(rlp_, struct_rlimit_sz);
|
||||
}
|
||||
@ -2341,20 +2349,8 @@ POST_SYSCALL(__sigaction_sigtramp)
|
||||
PRE_READ(nsa_, sizeof(__sanitizer_sigaction));
|
||||
}
|
||||
}
|
||||
PRE_SYSCALL(pmc_get_info)(long long ctr_, long long op_, void *args_) {
|
||||
/* TODO */
|
||||
}
|
||||
POST_SYSCALL(pmc_get_info)
|
||||
(long long res, long long ctr_, long long op_, void *args_) {
|
||||
/* TODO */
|
||||
}
|
||||
PRE_SYSCALL(pmc_control)(long long ctr_, long long op_, void *args_) {
|
||||
/* TODO */
|
||||
}
|
||||
POST_SYSCALL(pmc_control)
|
||||
(long long res, long long ctr_, long long op_, void *args_) {
|
||||
/* TODO */
|
||||
}
|
||||
/* syscall 341 has been skipped */
|
||||
/* syscall 342 has been skipped */
|
||||
PRE_SYSCALL(rasctl)(void *addr_, long long len_, long long op_) {
|
||||
/* Nothing to do */
|
||||
}
|
||||
@ -3695,18 +3691,18 @@ POST_SYSCALL(recvmmsg)
|
||||
PRE_SYSCALL(sendmmsg)
|
||||
(long long s_, void *mmsg_, long long vlen_, long long flags_) {
|
||||
struct __sanitizer_mmsghdr *mmsg = (struct __sanitizer_mmsghdr *)mmsg_;
|
||||
unsigned int vlen = (vlen_ > 1024 ? 1024 : vlen_);
|
||||
if (mmsg) {
|
||||
PRE_READ(mmsg, sizeof(struct __sanitizer_mmsghdr) * vlen);
|
||||
PRE_READ(mmsg, sizeof(struct __sanitizer_mmsghdr) *
|
||||
(vlen_ > 1024 ? 1024 : vlen_));
|
||||
}
|
||||
}
|
||||
POST_SYSCALL(sendmmsg)
|
||||
(long long res, long long s_, void *mmsg_, long long vlen_, long long flags_) {
|
||||
struct __sanitizer_mmsghdr *mmsg = (struct __sanitizer_mmsghdr *)mmsg_;
|
||||
unsigned int vlen = (vlen_ > 1024 ? 1024 : vlen_);
|
||||
if (res >= 0) {
|
||||
if (mmsg) {
|
||||
POST_READ(mmsg, sizeof(struct __sanitizer_mmsghdr) * vlen);
|
||||
POST_READ(mmsg, sizeof(struct __sanitizer_mmsghdr) *
|
||||
(vlen_ > 1024 ? 1024 : vlen_));
|
||||
}
|
||||
}
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user