https://bugs.kde.org/show_bug.cgi?id=506816
--- Comment #3 from [email protected] --- (In reply to Mark Wielaard from comment #2) > (In reply to mcermak from comment #1) > > Created attachment 184869 [details] > > proposed patch > > +PRE(sys_futex_waitv) > +{ > + /* asmlinkage long sys_futex_waitv(struct futex_waitv __user *waiters, > + * unsigned int nr_futexes, unsigned > int flags, > + * struct __kernel_timespec __user > *timeout, clockid_t clockid); */ > + > + PRINT("sys_futex_waitv ( %#" FMT_REGWORD "x, %ld, %ld, %#" FMT_REGWORD > "x, %d )", > + ARG1, SARG2, SARG3, ARG4, ARG5); > + PRE_MEM_READ("sys_futex_waitv(waiters)", ARG1, sizeof(struct > vki_futex_waitv)); > > Shouldn't that be sizeof(struct vki_futex_waitv) * ARG2? https://docs.kernel.org/userspace-api/futex2.html reads: The pointer for the first item of the array is passed as waiters. So I assume the following structs are referenced one from another. > > + PRE_MEM_READ("sys_futex_waitv(timeout)", ARG4, sizeof(struct > vki__kernel_timespec)); > +} > > Looks good otherwise. Do all LTP futex_waitv tests pass with this? Yep, both regtest and ltp tests seem to test fine. -- You are receiving this mail because: You are watching all bug changes.
