|
@@ -4410,13 +4410,22 @@ abi_long do_syscall(void *cpu_env, int num, abi_long arg1,
|
|
#endif
|
|
#endif
|
|
case TARGET_NR_readlink:
|
|
case TARGET_NR_readlink:
|
|
{
|
|
{
|
|
- void *p2;
|
|
|
|
|
|
+ void *p2, *temp;
|
|
p = lock_user_string(arg1);
|
|
p = lock_user_string(arg1);
|
|
p2 = lock_user(VERIFY_WRITE, arg2, arg3, 0);
|
|
p2 = lock_user(VERIFY_WRITE, arg2, arg3, 0);
|
|
if (!p || !p2)
|
|
if (!p || !p2)
|
|
ret = -TARGET_EFAULT;
|
|
ret = -TARGET_EFAULT;
|
|
- else
|
|
|
|
- ret = get_errno(readlink(path(p), p2, arg3));
|
|
|
|
|
|
+ else {
|
|
|
|
+ if (strncmp((const char *)p, "/proc/self/exe", 14) == 0) {
|
|
|
|
+ char real[PATH_MAX];
|
|
|
|
+ temp = realpath(exec_path,real);
|
|
|
|
+ ret = (temp==NULL) ? get_errno(-1) : strlen(real) ;
|
|
|
|
+ snprintf((char *)p2, arg3, "%s", real);
|
|
|
|
+ }
|
|
|
|
+ else
|
|
|
|
+ ret = get_errno(readlink(path(p), p2, arg3));
|
|
|
|
+ break;
|
|
|
|
+ }
|
|
unlock_user(p2, arg2, ret);
|
|
unlock_user(p2, arg2, ret);
|
|
unlock_user(p, arg1, 0);
|
|
unlock_user(p, arg1, 0);
|
|
}
|
|
}
|