This repository was archived by the owner on Jan 6, 2025. It is now read-only.
File tree Expand file tree Collapse file tree 1 file changed +1
-15
lines changed
Expand file tree Collapse file tree 1 file changed +1
-15
lines changed Original file line number Diff line number Diff line change 11/*
2- * Copyright 2016-2017 , Intel Corporation
2+ * Copyright 2016-2020 , Intel Corporation
33 *
44 * Redistribution and use in source and binary forms, with or without
55 * modification, are permitted provided that the following conditions
4848extern bool debug_dumps_on ;
4949void debug_dump (const char * fmt , ...) __attribute__((format (printf , 1 , 2 )));
5050
51- /*
52- * Create wrapper functions to be called from glibc,
53- * with an extra instruction taken from glibc
54- * from before -- intercept_patch_with_prefix -- the syscall,
55- * or after -- intercept_patch_with_postfix -- the syscall.
56- */
57- void intercept_patch_with_prefix (unsigned char * syscall_addr );
58-
59-
60- void intercept_patch_with_postfix (unsigned char * syscall_addr ,
61- unsigned postfix_len );
62-
6351#define INTERCEPTOR_EXIT_CODE 111
6452
6553__attribute__((noreturn )) void xabort_errno (int error_code , const char * msg );
@@ -126,8 +114,6 @@ struct patch_desc {
126114 struct range nop_trampoline ;
127115};
128116
129- void patch_apply (struct patch_desc * patch );
130-
131117/*
132118 * A section_list struct contains information about sections where
133119 * libsyscall_intercept looks for jump destinations among symbol addresses.
You can’t perform that action at this time.
0 commit comments