handle sys_accept4
authorJulien Desfossez <jdesfossez@efficios.com>
Fri, 20 Feb 2015 17:42:39 +0000 (12:42 -0500)
committerJulien Desfossez <jdesfossez@efficios.com>
Fri, 20 Feb 2015 17:42:39 +0000 (12:42 -0500)
Signed-off-by: Julien Desfossez <jdesfossez@efficios.com>
linuxautomaton/linuxautomaton/sv.py
linuxautomaton/linuxautomaton/syscalls.py

index c1f419d34f654f6887531ad3123a16b914b5e1cb..794014e3c42b2438385c6fe582c54ddf307a033b 100644 (file)
@@ -323,6 +323,7 @@ class SyscallConsts():
     # list of syscalls that open a FD on the network
     # (in the exit_syscall event)
     NET_OPEN_SYSCALLS = ["sys_accept", "syscall_entry_accept",
+                         "sys_accept4", "syscall_entry_accept4",
                          "sys_socket", "syscall_entry_socket"]
     # list of syscalls that can duplicate a FD
     DUP_OPEN_SYSCALLS = ["sys_fcntl", "syscall_entry_fcntl",
index 8df874447b7ca9d980e0d0d17404986f16c7864b..c0da1500c3774795f8623f7f1688c4e1636ce2b8 100644 (file)
@@ -23,7 +23,6 @@
 # SOFTWARE.
 
 import socket
-import operator
 from linuxautomaton import sp, sv, common
 from babeltrace import CTFScope
 
@@ -111,7 +110,8 @@ class SyscallsStateProvider(sp.StateProvider):
             current_syscall["filename"] = event["filename"]
             if event["flags"] & common.O_CLOEXEC == common.O_CLOEXEC:
                 current_syscall["cloexec"] = 1
-        elif name in ["sys_accept", "syscall_entry_accept"]:
+        elif name in ["sys_accept", "syscall_entry_accept",
+                      "sys_accept4", "syscall_entry_accept4"]:
             if "family" in event.keys() and event["family"] == socket.AF_INET:
                 ipport = "%s:%d" % (common.get_v4_addr_str(event["v4addr"]),
                                     event["sport"])
This page took 0.026855 seconds and 5 git commands to generate.