1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
|
//===-- illegal.c ---------------------------------------------------------===//
//
// The KLEE Symbolic Virtual Machine
//
// This file is distributed under the University of Illinois Open Source
// License. See LICENSE.TXT for details.
//
//===----------------------------------------------------------------------===//
#include <stdio.h>
#include <errno.h>
#include <unistd.h>
#include <signal.h>
#include <setjmp.h>
#include <sys/types.h>
#include <klee/klee.h>
void klee_warning(const char*);
void klee_warning_once(const char*);
int kill(pid_t pid, int sig) {
klee_warning("ignoring (EPERM)");
errno = EPERM;
return -1;
}
#ifndef __FreeBSD__
int _setjmp (struct __jmp_buf_tag __env[1]) __attribute__((weak));
int _setjmp (struct __jmp_buf_tag __env[1]) {
#else
int _setjmp (jmp_buf env) __returns_twice;
int _setjmp (jmp_buf env) {
#endif
klee_warning_once("ignoring");
return 0;
}
void longjmp(jmp_buf env, int val) {
klee_report_error(__FILE__, __LINE__, "longjmp unsupported", "xxx.err");
}
/* Macro so function name from klee_warning comes out correct. */
#define __bad_exec() \
(klee_warning("ignoring (EACCES)"),\
errno = EACCES,\
-1)
/* This need to be weak because uclibc wants to define them as well,
but we will want to make sure a definition is around in case we
don't link with it. */
int execl(const char *path, const char *arg, ...) __attribute__((weak));
int execlp(const char *file, const char *arg, ...) __attribute__((weak));
int execle(const char *path, const char *arg, ...) __attribute__((weak));
int execv(const char *path, char *const argv[]) __attribute__((weak));
int execvp(const char *file, char *const argv[]) __attribute__((weak));
int execve(const char *file, char *const argv[], char *const envp[]) __attribute__((weak));
int execl(const char *path, const char *arg, ...) { return __bad_exec(); }
int execlp(const char *file, const char *arg, ...) { return __bad_exec(); }
int execle(const char *path, const char *arg, ...) { return __bad_exec(); }
int execv(const char *path, char *const argv[]) { return __bad_exec(); }
int execvp(const char *file, char *const argv[]) { return __bad_exec(); }
int execve(const char *file, char *const argv[], char *const envp[]) { return __bad_exec(); }
pid_t fork(void) {
klee_warning("ignoring (ENOMEM)");
errno = ENOMEM;
return -1;
}
pid_t vfork(void) {
return fork();
}
|