syscall.c 276 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396339733983399340034013402340334043405340634073408340934103411341234133414341534163417341834193420342134223423342434253426342734283429343034313432343334343435343634373438343934403441344234433444344534463447344834493450345134523453345434553456345734583459346034613462346334643465346634673468346934703471347234733474347534763477347834793480348134823483348434853486348734883489349034913492349334943495349634973498349935003501350235033504350535063507350835093510351135123513351435153516351735183519352035213522352335243525352635273528352935303531353235333534353535363537353835393540354135423543354435453546354735483549355035513552355335543555355635573558355935603561356235633564356535663567356835693570357135723573357435753576357735783579358035813582358335843585358635873588358935903591359235933594359535963597359835993600360136023603360436053606360736083609361036113612361336143615361636173618361936203621362236233624362536263627362836293630363136323633363436353636363736383639364036413642364336443645364636473648364936503651365236533654365536563657365836593660366136623663366436653666366736683669367036713672367336743675367636773678367936803681368236833684368536863687368836893690369136923693369436953696369736983699370037013702370337043705370637073708370937103711371237133714371537163717371837193720372137223723372437253726372737283729373037313732373337343735373637373738373937403741374237433744374537463747374837493750375137523753375437553756375737583759376037613762376337643765376637673768376937703771377237733774377537763777377837793780378137823783378437853786378737883789379037913792379337943795379637973798379938003801380238033804380538063807380838093810381138123813381438153816381738183819382038213822382338243825382638273828382938303831383238333834383538363837383838393840384138423843384438453846384738483849385038513852385338543855385638573858385938603861386238633864386538663867386838693870387138723873387438753876387738783879388038813882388338843885388638873888388938903891389238933894389538963897389838993900390139023903390439053906390739083909391039113912391339143915391639173918391939203921392239233924392539263927392839293930393139323933393439353936393739383939394039413942394339443945394639473948394939503951395239533954395539563957395839593960396139623963396439653966396739683969397039713972397339743975397639773978397939803981398239833984398539863987398839893990399139923993399439953996399739983999400040014002400340044005400640074008400940104011401240134014401540164017401840194020402140224023402440254026402740284029403040314032403340344035403640374038403940404041404240434044404540464047404840494050405140524053405440554056405740584059406040614062406340644065406640674068406940704071407240734074407540764077407840794080408140824083408440854086408740884089409040914092409340944095409640974098409941004101410241034104410541064107410841094110411141124113411441154116411741184119412041214122412341244125412641274128412941304131413241334134413541364137413841394140414141424143414441454146414741484149415041514152415341544155415641574158415941604161416241634164416541664167416841694170417141724173417441754176417741784179418041814182418341844185418641874188418941904191419241934194419541964197419841994200420142024203420442054206420742084209421042114212421342144215421642174218421942204221422242234224422542264227422842294230423142324233423442354236423742384239424042414242424342444245424642474248424942504251425242534254425542564257425842594260426142624263426442654266426742684269427042714272427342744275427642774278427942804281428242834284428542864287428842894290429142924293429442954296429742984299430043014302430343044305430643074308430943104311431243134314431543164317431843194320432143224323432443254326432743284329433043314332433343344335433643374338433943404341434243434344434543464347434843494350435143524353435443554356435743584359436043614362436343644365436643674368436943704371437243734374437543764377437843794380438143824383438443854386438743884389439043914392439343944395439643974398439944004401440244034404440544064407440844094410441144124413441444154416441744184419442044214422442344244425442644274428442944304431443244334434443544364437443844394440444144424443444444454446444744484449445044514452445344544455445644574458445944604461446244634464446544664467446844694470447144724473447444754476447744784479448044814482448344844485448644874488448944904491449244934494449544964497449844994500450145024503450445054506450745084509451045114512451345144515451645174518451945204521452245234524452545264527452845294530453145324533453445354536453745384539454045414542454345444545454645474548454945504551455245534554455545564557455845594560456145624563456445654566456745684569457045714572457345744575457645774578457945804581458245834584458545864587458845894590459145924593459445954596459745984599460046014602460346044605460646074608460946104611461246134614461546164617461846194620462146224623462446254626462746284629463046314632463346344635463646374638463946404641464246434644464546464647464846494650465146524653465446554656465746584659466046614662466346644665466646674668466946704671467246734674467546764677467846794680468146824683468446854686468746884689469046914692469346944695469646974698469947004701470247034704470547064707470847094710471147124713471447154716471747184719472047214722472347244725472647274728472947304731473247334734473547364737473847394740474147424743474447454746474747484749475047514752475347544755475647574758475947604761476247634764476547664767476847694770477147724773477447754776477747784779478047814782478347844785478647874788478947904791479247934794479547964797479847994800480148024803480448054806480748084809481048114812481348144815481648174818481948204821482248234824482548264827482848294830483148324833483448354836483748384839484048414842484348444845484648474848484948504851485248534854485548564857485848594860486148624863486448654866486748684869487048714872487348744875487648774878487948804881488248834884488548864887488848894890489148924893489448954896489748984899490049014902490349044905490649074908490949104911491249134914491549164917491849194920492149224923492449254926492749284929493049314932493349344935493649374938493949404941494249434944494549464947494849494950495149524953495449554956495749584959496049614962496349644965496649674968496949704971497249734974497549764977497849794980498149824983498449854986498749884989499049914992499349944995499649974998499950005001500250035004500550065007500850095010501150125013501450155016501750185019502050215022502350245025502650275028502950305031503250335034503550365037503850395040504150425043504450455046504750485049505050515052505350545055505650575058505950605061506250635064506550665067506850695070507150725073507450755076507750785079508050815082508350845085508650875088508950905091509250935094509550965097509850995100510151025103510451055106510751085109511051115112511351145115511651175118511951205121512251235124512551265127512851295130513151325133513451355136513751385139514051415142514351445145514651475148514951505151515251535154515551565157515851595160516151625163516451655166516751685169517051715172517351745175517651775178517951805181518251835184518551865187518851895190519151925193519451955196519751985199520052015202520352045205520652075208520952105211521252135214521552165217521852195220522152225223522452255226522752285229523052315232523352345235523652375238523952405241524252435244524552465247524852495250525152525253525452555256525752585259526052615262526352645265526652675268526952705271527252735274527552765277527852795280528152825283528452855286528752885289529052915292529352945295529652975298529953005301530253035304530553065307530853095310531153125313531453155316531753185319532053215322532353245325532653275328532953305331533253335334533553365337533853395340534153425343534453455346534753485349535053515352535353545355535653575358535953605361536253635364536553665367536853695370537153725373537453755376537753785379538053815382538353845385538653875388538953905391539253935394539553965397539853995400540154025403540454055406540754085409541054115412541354145415541654175418541954205421542254235424542554265427542854295430543154325433543454355436543754385439544054415442544354445445544654475448544954505451545254535454545554565457545854595460546154625463546454655466546754685469547054715472547354745475547654775478547954805481548254835484548554865487548854895490549154925493549454955496549754985499550055015502550355045505550655075508550955105511551255135514551555165517551855195520552155225523552455255526552755285529553055315532553355345535553655375538553955405541554255435544554555465547554855495550555155525553555455555556555755585559556055615562556355645565556655675568556955705571557255735574557555765577557855795580558155825583558455855586558755885589559055915592559355945595559655975598559956005601560256035604560556065607560856095610561156125613561456155616561756185619562056215622562356245625562656275628562956305631563256335634563556365637563856395640564156425643564456455646564756485649565056515652565356545655565656575658565956605661566256635664566556665667566856695670567156725673567456755676567756785679568056815682568356845685568656875688568956905691569256935694569556965697569856995700570157025703570457055706570757085709571057115712571357145715571657175718571957205721572257235724572557265727572857295730573157325733573457355736573757385739574057415742574357445745574657475748574957505751575257535754575557565757575857595760576157625763576457655766576757685769577057715772577357745775577657775778577957805781578257835784578557865787578857895790579157925793579457955796579757985799580058015802580358045805580658075808580958105811581258135814581558165817581858195820582158225823582458255826582758285829583058315832583358345835583658375838583958405841584258435844584558465847584858495850585158525853585458555856585758585859586058615862586358645865586658675868586958705871587258735874587558765877587858795880588158825883588458855886588758885889589058915892589358945895589658975898589959005901590259035904590559065907590859095910591159125913591459155916591759185919592059215922592359245925592659275928592959305931593259335934593559365937593859395940594159425943594459455946594759485949595059515952595359545955595659575958595959605961596259635964596559665967596859695970597159725973597459755976597759785979598059815982598359845985598659875988598959905991599259935994599559965997599859996000600160026003600460056006600760086009601060116012601360146015601660176018601960206021602260236024602560266027602860296030603160326033603460356036603760386039604060416042604360446045604660476048604960506051605260536054605560566057605860596060606160626063606460656066606760686069607060716072607360746075607660776078607960806081608260836084608560866087608860896090609160926093609460956096609760986099610061016102610361046105610661076108610961106111611261136114611561166117611861196120612161226123612461256126612761286129613061316132613361346135613661376138613961406141614261436144614561466147614861496150615161526153615461556156615761586159616061616162616361646165616661676168616961706171617261736174617561766177617861796180618161826183618461856186618761886189619061916192619361946195619661976198619962006201620262036204620562066207620862096210621162126213621462156216621762186219622062216222622362246225622662276228622962306231623262336234623562366237623862396240624162426243624462456246624762486249625062516252625362546255625662576258625962606261626262636264626562666267626862696270627162726273627462756276627762786279628062816282628362846285628662876288628962906291629262936294629562966297629862996300630163026303630463056306630763086309631063116312631363146315631663176318631963206321632263236324632563266327632863296330633163326333633463356336633763386339634063416342634363446345634663476348634963506351635263536354635563566357635863596360636163626363636463656366636763686369637063716372637363746375637663776378637963806381638263836384638563866387638863896390639163926393639463956396639763986399640064016402640364046405640664076408640964106411641264136414641564166417641864196420642164226423642464256426642764286429643064316432643364346435643664376438643964406441644264436444644564466447644864496450645164526453645464556456645764586459646064616462646364646465646664676468646964706471647264736474647564766477647864796480648164826483648464856486648764886489649064916492649364946495649664976498649965006501650265036504650565066507650865096510651165126513651465156516651765186519652065216522652365246525652665276528652965306531653265336534653565366537653865396540654165426543654465456546654765486549655065516552655365546555655665576558655965606561656265636564656565666567656865696570657165726573657465756576657765786579658065816582658365846585658665876588658965906591659265936594659565966597659865996600660166026603660466056606660766086609661066116612661366146615661666176618661966206621662266236624662566266627662866296630663166326633663466356636663766386639664066416642664366446645664666476648664966506651665266536654665566566657665866596660666166626663666466656666666766686669667066716672667366746675667666776678667966806681668266836684668566866687668866896690669166926693669466956696669766986699670067016702670367046705670667076708670967106711671267136714671567166717671867196720672167226723672467256726672767286729673067316732673367346735673667376738673967406741674267436744674567466747674867496750675167526753675467556756675767586759676067616762676367646765676667676768676967706771677267736774677567766777677867796780678167826783678467856786678767886789679067916792679367946795679667976798679968006801680268036804680568066807680868096810681168126813681468156816681768186819682068216822682368246825682668276828682968306831683268336834683568366837683868396840684168426843684468456846684768486849685068516852685368546855685668576858685968606861686268636864686568666867686868696870687168726873687468756876687768786879688068816882688368846885688668876888688968906891689268936894689568966897689868996900690169026903690469056906690769086909691069116912691369146915691669176918691969206921692269236924692569266927692869296930693169326933693469356936693769386939694069416942694369446945694669476948694969506951695269536954695569566957695869596960696169626963696469656966696769686969697069716972697369746975697669776978697969806981698269836984698569866987698869896990699169926993699469956996699769986999700070017002700370047005700670077008700970107011701270137014701570167017701870197020702170227023702470257026702770287029703070317032703370347035703670377038703970407041704270437044704570467047704870497050705170527053705470557056705770587059706070617062706370647065706670677068706970707071707270737074707570767077707870797080708170827083708470857086708770887089709070917092709370947095709670977098709971007101710271037104710571067107710871097110711171127113711471157116711771187119712071217122712371247125712671277128712971307131713271337134713571367137713871397140714171427143714471457146714771487149715071517152715371547155715671577158715971607161716271637164716571667167716871697170717171727173717471757176717771787179718071817182718371847185718671877188718971907191719271937194719571967197719871997200720172027203720472057206720772087209721072117212721372147215721672177218721972207221722272237224722572267227722872297230723172327233723472357236723772387239724072417242724372447245724672477248724972507251725272537254725572567257725872597260726172627263726472657266726772687269727072717272727372747275727672777278727972807281728272837284728572867287728872897290729172927293729472957296729772987299730073017302730373047305730673077308730973107311731273137314731573167317731873197320732173227323732473257326732773287329733073317332733373347335733673377338733973407341734273437344734573467347734873497350735173527353735473557356735773587359736073617362736373647365736673677368736973707371737273737374737573767377737873797380738173827383738473857386738773887389739073917392739373947395739673977398739974007401740274037404740574067407740874097410741174127413741474157416741774187419742074217422742374247425742674277428742974307431743274337434743574367437743874397440744174427443744474457446744774487449745074517452745374547455745674577458745974607461746274637464746574667467746874697470747174727473747474757476747774787479748074817482748374847485748674877488748974907491749274937494749574967497749874997500750175027503750475057506750775087509751075117512751375147515751675177518751975207521752275237524752575267527752875297530753175327533753475357536753775387539754075417542754375447545754675477548754975507551755275537554755575567557755875597560756175627563756475657566756775687569757075717572757375747575757675777578757975807581758275837584758575867587758875897590759175927593759475957596759775987599760076017602760376047605760676077608760976107611761276137614761576167617761876197620762176227623762476257626762776287629763076317632763376347635763676377638763976407641764276437644764576467647764876497650765176527653765476557656765776587659766076617662766376647665766676677668766976707671767276737674767576767677767876797680768176827683768476857686768776887689769076917692769376947695769676977698769977007701770277037704770577067707770877097710771177127713771477157716771777187719772077217722772377247725772677277728772977307731773277337734773577367737773877397740774177427743774477457746774777487749775077517752775377547755775677577758775977607761776277637764776577667767776877697770777177727773777477757776777777787779778077817782778377847785778677877788778977907791779277937794779577967797779877997800780178027803780478057806780778087809781078117812781378147815781678177818781978207821782278237824782578267827782878297830783178327833783478357836783778387839784078417842784378447845784678477848784978507851785278537854785578567857785878597860786178627863786478657866786778687869787078717872787378747875787678777878787978807881788278837884788578867887788878897890789178927893789478957896789778987899790079017902790379047905790679077908790979107911791279137914791579167917791879197920792179227923792479257926792779287929793079317932793379347935793679377938793979407941794279437944794579467947794879497950795179527953795479557956795779587959796079617962796379647965796679677968796979707971797279737974797579767977797879797980798179827983798479857986798779887989799079917992799379947995799679977998799980008001800280038004800580068007800880098010801180128013801480158016801780188019802080218022802380248025802680278028802980308031803280338034803580368037803880398040804180428043804480458046804780488049805080518052805380548055805680578058805980608061806280638064806580668067806880698070807180728073807480758076807780788079808080818082808380848085808680878088808980908091809280938094809580968097809880998100810181028103810481058106810781088109811081118112811381148115811681178118811981208121812281238124812581268127812881298130813181328133813481358136813781388139814081418142814381448145814681478148814981508151815281538154815581568157815881598160816181628163816481658166816781688169817081718172817381748175817681778178817981808181818281838184818581868187818881898190819181928193819481958196819781988199820082018202820382048205820682078208820982108211821282138214821582168217821882198220822182228223822482258226822782288229823082318232823382348235823682378238823982408241824282438244824582468247824882498250825182528253825482558256825782588259826082618262826382648265826682678268826982708271827282738274827582768277827882798280828182828283828482858286828782888289829082918292829382948295829682978298829983008301830283038304830583068307830883098310831183128313831483158316831783188319832083218322832383248325832683278328832983308331833283338334833583368337833883398340834183428343834483458346834783488349835083518352835383548355835683578358835983608361836283638364836583668367836883698370837183728373837483758376837783788379838083818382838383848385838683878388838983908391839283938394839583968397839883998400840184028403840484058406840784088409841084118412841384148415841684178418841984208421842284238424842584268427842884298430843184328433843484358436843784388439844084418442844384448445844684478448844984508451845284538454845584568457845884598460846184628463846484658466846784688469847084718472847384748475847684778478847984808481848284838484848584868487848884898490849184928493849484958496849784988499850085018502850385048505850685078508850985108511851285138514851585168517851885198520852185228523852485258526852785288529853085318532853385348535853685378538853985408541854285438544854585468547854885498550855185528553855485558556855785588559856085618562856385648565856685678568856985708571857285738574857585768577857885798580858185828583858485858586858785888589859085918592859385948595859685978598859986008601860286038604860586068607860886098610861186128613861486158616861786188619862086218622862386248625862686278628862986308631863286338634863586368637863886398640864186428643864486458646864786488649865086518652865386548655865686578658865986608661866286638664866586668667866886698670867186728673867486758676867786788679868086818682868386848685868686878688868986908691869286938694869586968697869886998700870187028703870487058706870787088709871087118712871387148715871687178718871987208721872287238724872587268727872887298730873187328733873487358736873787388739874087418742874387448745874687478748874987508751875287538754875587568757875887598760876187628763876487658766876787688769877087718772877387748775877687778778877987808781878287838784878587868787878887898790879187928793879487958796879787988799880088018802880388048805880688078808880988108811881288138814881588168817881888198820882188228823882488258826882788288829883088318832883388348835883688378838883988408841884288438844884588468847884888498850885188528853885488558856885788588859886088618862886388648865886688678868886988708871887288738874887588768877887888798880888188828883888488858886888788888889889088918892889388948895889688978898889989008901890289038904890589068907890889098910891189128913891489158916891789188919892089218922892389248925892689278928892989308931893289338934893589368937893889398940894189428943894489458946894789488949895089518952
  1. /*
  2. * Linux syscalls
  3. *
  4. * Copyright (c) 2003 Fabrice Bellard
  5. *
  6. * This program is free software; you can redistribute it and/or modify
  7. * it under the terms of the GNU General Public License as published by
  8. * the Free Software Foundation; either version 2 of the License, or
  9. * (at your option) any later version.
  10. *
  11. * This program is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. * GNU General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU General Public License
  17. * along with this program; if not, see <http://www.gnu.org/licenses/>.
  18. */
  19. #define _ATFILE_SOURCE
  20. #include <stdlib.h>
  21. #include <stdio.h>
  22. #include <stdarg.h>
  23. #include <string.h>
  24. #include <elf.h>
  25. #include <endian.h>
  26. #include <errno.h>
  27. #include <unistd.h>
  28. #include <fcntl.h>
  29. #include <time.h>
  30. #include <limits.h>
  31. #include <grp.h>
  32. #include <sys/types.h>
  33. #include <sys/ipc.h>
  34. #include <sys/msg.h>
  35. #include <sys/wait.h>
  36. #include <sys/time.h>
  37. #include <sys/stat.h>
  38. #include <sys/mount.h>
  39. #include <sys/file.h>
  40. #include <sys/fsuid.h>
  41. #include <sys/personality.h>
  42. #include <sys/prctl.h>
  43. #include <sys/resource.h>
  44. #include <sys/mman.h>
  45. #include <sys/swap.h>
  46. #include <signal.h>
  47. #include <sched.h>
  48. #ifdef __ia64__
  49. int __clone2(int (*fn)(void *), void *child_stack_base,
  50. size_t stack_size, int flags, void *arg, ...);
  51. #endif
  52. #include <sys/socket.h>
  53. #include <sys/un.h>
  54. #include <sys/uio.h>
  55. #include <sys/poll.h>
  56. #include <sys/times.h>
  57. #include <sys/shm.h>
  58. #include <sys/sem.h>
  59. #include <sys/statfs.h>
  60. #include <utime.h>
  61. #include <sys/sysinfo.h>
  62. #include <sys/utsname.h>
  63. //#include <sys/user.h>
  64. #include <netinet/ip.h>
  65. #include <netinet/tcp.h>
  66. #include <linux/wireless.h>
  67. #include <linux/icmp.h>
  68. #include "qemu-common.h"
  69. #ifdef TARGET_GPROF
  70. #include <sys/gmon.h>
  71. #endif
  72. #ifdef CONFIG_EVENTFD
  73. #include <sys/eventfd.h>
  74. #endif
  75. #ifdef CONFIG_EPOLL
  76. #include <sys/epoll.h>
  77. #endif
  78. #ifdef CONFIG_ATTR
  79. #include "qemu/xattr.h"
  80. #endif
  81. #define termios host_termios
  82. #define winsize host_winsize
  83. #define termio host_termio
  84. #define sgttyb host_sgttyb /* same as target */
  85. #define tchars host_tchars /* same as target */
  86. #define ltchars host_ltchars /* same as target */
  87. #include <linux/termios.h>
  88. #include <linux/unistd.h>
  89. #include <linux/utsname.h>
  90. #include <linux/cdrom.h>
  91. #include <linux/hdreg.h>
  92. #include <linux/soundcard.h>
  93. #include <linux/kd.h>
  94. #include <linux/mtio.h>
  95. #include <linux/fs.h>
  96. #if defined(CONFIG_FIEMAP)
  97. #include <linux/fiemap.h>
  98. #endif
  99. #include <linux/fb.h>
  100. #include <linux/vt.h>
  101. #include <linux/dm-ioctl.h>
  102. #include <linux/reboot.h>
  103. #include "linux_loop.h"
  104. #include "cpu-uname.h"
  105. #include "qemu.h"
  106. #if defined(CONFIG_USE_NPTL)
  107. #define CLONE_NPTL_FLAGS2 (CLONE_SETTLS | \
  108. CLONE_PARENT_SETTID | CLONE_CHILD_SETTID | CLONE_CHILD_CLEARTID)
  109. #else
  110. /* XXX: Hardcode the above values. */
  111. #define CLONE_NPTL_FLAGS2 0
  112. #endif
  113. //#define DEBUG
  114. //#include <linux/msdos_fs.h>
  115. #define VFAT_IOCTL_READDIR_BOTH _IOR('r', 1, struct linux_dirent [2])
  116. #define VFAT_IOCTL_READDIR_SHORT _IOR('r', 2, struct linux_dirent [2])
  117. #undef _syscall0
  118. #undef _syscall1
  119. #undef _syscall2
  120. #undef _syscall3
  121. #undef _syscall4
  122. #undef _syscall5
  123. #undef _syscall6
  124. #define _syscall0(type,name) \
  125. static type name (void) \
  126. { \
  127. return syscall(__NR_##name); \
  128. }
  129. #define _syscall1(type,name,type1,arg1) \
  130. static type name (type1 arg1) \
  131. { \
  132. return syscall(__NR_##name, arg1); \
  133. }
  134. #define _syscall2(type,name,type1,arg1,type2,arg2) \
  135. static type name (type1 arg1,type2 arg2) \
  136. { \
  137. return syscall(__NR_##name, arg1, arg2); \
  138. }
  139. #define _syscall3(type,name,type1,arg1,type2,arg2,type3,arg3) \
  140. static type name (type1 arg1,type2 arg2,type3 arg3) \
  141. { \
  142. return syscall(__NR_##name, arg1, arg2, arg3); \
  143. }
  144. #define _syscall4(type,name,type1,arg1,type2,arg2,type3,arg3,type4,arg4) \
  145. static type name (type1 arg1,type2 arg2,type3 arg3,type4 arg4) \
  146. { \
  147. return syscall(__NR_##name, arg1, arg2, arg3, arg4); \
  148. }
  149. #define _syscall5(type,name,type1,arg1,type2,arg2,type3,arg3,type4,arg4, \
  150. type5,arg5) \
  151. static type name (type1 arg1,type2 arg2,type3 arg3,type4 arg4,type5 arg5) \
  152. { \
  153. return syscall(__NR_##name, arg1, arg2, arg3, arg4, arg5); \
  154. }
  155. #define _syscall6(type,name,type1,arg1,type2,arg2,type3,arg3,type4,arg4, \
  156. type5,arg5,type6,arg6) \
  157. static type name (type1 arg1,type2 arg2,type3 arg3,type4 arg4,type5 arg5, \
  158. type6 arg6) \
  159. { \
  160. return syscall(__NR_##name, arg1, arg2, arg3, arg4, arg5, arg6); \
  161. }
  162. #define __NR_sys_uname __NR_uname
  163. #define __NR_sys_faccessat __NR_faccessat
  164. #define __NR_sys_fchmodat __NR_fchmodat
  165. #define __NR_sys_fchownat __NR_fchownat
  166. #define __NR_sys_fstatat64 __NR_fstatat64
  167. #define __NR_sys_futimesat __NR_futimesat
  168. #define __NR_sys_getcwd1 __NR_getcwd
  169. #define __NR_sys_getdents __NR_getdents
  170. #define __NR_sys_getdents64 __NR_getdents64
  171. #define __NR_sys_getpriority __NR_getpriority
  172. #define __NR_sys_linkat __NR_linkat
  173. #define __NR_sys_mkdirat __NR_mkdirat
  174. #define __NR_sys_mknodat __NR_mknodat
  175. #define __NR_sys_newfstatat __NR_newfstatat
  176. #define __NR_sys_openat __NR_openat
  177. #define __NR_sys_readlinkat __NR_readlinkat
  178. #define __NR_sys_renameat __NR_renameat
  179. #define __NR_sys_rt_sigqueueinfo __NR_rt_sigqueueinfo
  180. #define __NR_sys_symlinkat __NR_symlinkat
  181. #define __NR_sys_syslog __NR_syslog
  182. #define __NR_sys_tgkill __NR_tgkill
  183. #define __NR_sys_tkill __NR_tkill
  184. #define __NR_sys_unlinkat __NR_unlinkat
  185. #define __NR_sys_utimensat __NR_utimensat
  186. #define __NR_sys_futex __NR_futex
  187. #define __NR_sys_inotify_init __NR_inotify_init
  188. #define __NR_sys_inotify_add_watch __NR_inotify_add_watch
  189. #define __NR_sys_inotify_rm_watch __NR_inotify_rm_watch
  190. #if defined(__alpha__) || defined (__ia64__) || defined(__x86_64__) || \
  191. defined(__s390x__)
  192. #define __NR__llseek __NR_lseek
  193. #endif
  194. #ifdef __NR_gettid
  195. _syscall0(int, gettid)
  196. #else
  197. /* This is a replacement for the host gettid() and must return a host
  198. errno. */
  199. static int gettid(void) {
  200. return -ENOSYS;
  201. }
  202. #endif
  203. _syscall3(int, sys_getdents, uint, fd, struct linux_dirent *, dirp, uint, count);
  204. #if defined(TARGET_NR_getdents64) && defined(__NR_getdents64)
  205. _syscall3(int, sys_getdents64, uint, fd, struct linux_dirent64 *, dirp, uint, count);
  206. #endif
  207. #if defined(TARGET_NR__llseek) && defined(__NR_llseek)
  208. _syscall5(int, _llseek, uint, fd, ulong, hi, ulong, lo,
  209. loff_t *, res, uint, wh);
  210. #endif
  211. _syscall3(int,sys_rt_sigqueueinfo,int,pid,int,sig,siginfo_t *,uinfo)
  212. _syscall3(int,sys_syslog,int,type,char*,bufp,int,len)
  213. #if defined(TARGET_NR_tgkill) && defined(__NR_tgkill)
  214. _syscall3(int,sys_tgkill,int,tgid,int,pid,int,sig)
  215. #endif
  216. #if defined(TARGET_NR_tkill) && defined(__NR_tkill)
  217. _syscall2(int,sys_tkill,int,tid,int,sig)
  218. #endif
  219. #ifdef __NR_exit_group
  220. _syscall1(int,exit_group,int,error_code)
  221. #endif
  222. #if defined(TARGET_NR_set_tid_address) && defined(__NR_set_tid_address)
  223. _syscall1(int,set_tid_address,int *,tidptr)
  224. #endif
  225. #if defined(CONFIG_USE_NPTL)
  226. #if defined(TARGET_NR_futex) && defined(__NR_futex)
  227. _syscall6(int,sys_futex,int *,uaddr,int,op,int,val,
  228. const struct timespec *,timeout,int *,uaddr2,int,val3)
  229. #endif
  230. #endif
  231. #define __NR_sys_sched_getaffinity __NR_sched_getaffinity
  232. _syscall3(int, sys_sched_getaffinity, pid_t, pid, unsigned int, len,
  233. unsigned long *, user_mask_ptr);
  234. #define __NR_sys_sched_setaffinity __NR_sched_setaffinity
  235. _syscall3(int, sys_sched_setaffinity, pid_t, pid, unsigned int, len,
  236. unsigned long *, user_mask_ptr);
  237. _syscall4(int, reboot, int, magic1, int, magic2, unsigned int, cmd,
  238. void *, arg);
  239. static bitmask_transtbl fcntl_flags_tbl[] = {
  240. { TARGET_O_ACCMODE, TARGET_O_WRONLY, O_ACCMODE, O_WRONLY, },
  241. { TARGET_O_ACCMODE, TARGET_O_RDWR, O_ACCMODE, O_RDWR, },
  242. { TARGET_O_CREAT, TARGET_O_CREAT, O_CREAT, O_CREAT, },
  243. { TARGET_O_EXCL, TARGET_O_EXCL, O_EXCL, O_EXCL, },
  244. { TARGET_O_NOCTTY, TARGET_O_NOCTTY, O_NOCTTY, O_NOCTTY, },
  245. { TARGET_O_TRUNC, TARGET_O_TRUNC, O_TRUNC, O_TRUNC, },
  246. { TARGET_O_APPEND, TARGET_O_APPEND, O_APPEND, O_APPEND, },
  247. { TARGET_O_NONBLOCK, TARGET_O_NONBLOCK, O_NONBLOCK, O_NONBLOCK, },
  248. { TARGET_O_SYNC, TARGET_O_DSYNC, O_SYNC, O_DSYNC, },
  249. { TARGET_O_SYNC, TARGET_O_SYNC, O_SYNC, O_SYNC, },
  250. { TARGET_FASYNC, TARGET_FASYNC, FASYNC, FASYNC, },
  251. { TARGET_O_DIRECTORY, TARGET_O_DIRECTORY, O_DIRECTORY, O_DIRECTORY, },
  252. { TARGET_O_NOFOLLOW, TARGET_O_NOFOLLOW, O_NOFOLLOW, O_NOFOLLOW, },
  253. #if defined(O_DIRECT)
  254. { TARGET_O_DIRECT, TARGET_O_DIRECT, O_DIRECT, O_DIRECT, },
  255. #endif
  256. #if defined(O_NOATIME)
  257. { TARGET_O_NOATIME, TARGET_O_NOATIME, O_NOATIME, O_NOATIME },
  258. #endif
  259. #if defined(O_CLOEXEC)
  260. { TARGET_O_CLOEXEC, TARGET_O_CLOEXEC, O_CLOEXEC, O_CLOEXEC },
  261. #endif
  262. #if defined(O_PATH)
  263. { TARGET_O_PATH, TARGET_O_PATH, O_PATH, O_PATH },
  264. #endif
  265. /* Don't terminate the list prematurely on 64-bit host+guest. */
  266. #if TARGET_O_LARGEFILE != 0 || O_LARGEFILE != 0
  267. { TARGET_O_LARGEFILE, TARGET_O_LARGEFILE, O_LARGEFILE, O_LARGEFILE, },
  268. #endif
  269. { 0, 0, 0, 0 }
  270. };
  271. #define COPY_UTSNAME_FIELD(dest, src) \
  272. do { \
  273. /* __NEW_UTS_LEN doesn't include terminating null */ \
  274. (void) strncpy((dest), (src), __NEW_UTS_LEN); \
  275. (dest)[__NEW_UTS_LEN] = '\0'; \
  276. } while (0)
  277. static int sys_uname(struct new_utsname *buf)
  278. {
  279. struct utsname uts_buf;
  280. if (uname(&uts_buf) < 0)
  281. return (-1);
  282. /*
  283. * Just in case these have some differences, we
  284. * translate utsname to new_utsname (which is the
  285. * struct linux kernel uses).
  286. */
  287. memset(buf, 0, sizeof(*buf));
  288. COPY_UTSNAME_FIELD(buf->sysname, uts_buf.sysname);
  289. COPY_UTSNAME_FIELD(buf->nodename, uts_buf.nodename);
  290. COPY_UTSNAME_FIELD(buf->release, uts_buf.release);
  291. COPY_UTSNAME_FIELD(buf->version, uts_buf.version);
  292. COPY_UTSNAME_FIELD(buf->machine, uts_buf.machine);
  293. #ifdef _GNU_SOURCE
  294. COPY_UTSNAME_FIELD(buf->domainname, uts_buf.domainname);
  295. #endif
  296. return (0);
  297. #undef COPY_UTSNAME_FIELD
  298. }
  299. static int sys_getcwd1(char *buf, size_t size)
  300. {
  301. if (getcwd(buf, size) == NULL) {
  302. /* getcwd() sets errno */
  303. return (-1);
  304. }
  305. return strlen(buf)+1;
  306. }
  307. #ifdef CONFIG_ATFILE
  308. /*
  309. * Host system seems to have atfile syscall stubs available. We
  310. * now enable them one by one as specified by target syscall_nr.h.
  311. */
  312. #ifdef TARGET_NR_faccessat
  313. static int sys_faccessat(int dirfd, const char *pathname, int mode)
  314. {
  315. return (faccessat(dirfd, pathname, mode, 0));
  316. }
  317. #endif
  318. #ifdef TARGET_NR_fchmodat
  319. static int sys_fchmodat(int dirfd, const char *pathname, mode_t mode)
  320. {
  321. return (fchmodat(dirfd, pathname, mode, 0));
  322. }
  323. #endif
  324. #if defined(TARGET_NR_fchownat)
  325. static int sys_fchownat(int dirfd, const char *pathname, uid_t owner,
  326. gid_t group, int flags)
  327. {
  328. return (fchownat(dirfd, pathname, owner, group, flags));
  329. }
  330. #endif
  331. #ifdef __NR_fstatat64
  332. static int sys_fstatat64(int dirfd, const char *pathname, struct stat *buf,
  333. int flags)
  334. {
  335. return (fstatat(dirfd, pathname, buf, flags));
  336. }
  337. #endif
  338. #ifdef __NR_newfstatat
  339. static int sys_newfstatat(int dirfd, const char *pathname, struct stat *buf,
  340. int flags)
  341. {
  342. return (fstatat(dirfd, pathname, buf, flags));
  343. }
  344. #endif
  345. #ifdef TARGET_NR_futimesat
  346. static int sys_futimesat(int dirfd, const char *pathname,
  347. const struct timeval times[2])
  348. {
  349. return (futimesat(dirfd, pathname, times));
  350. }
  351. #endif
  352. #ifdef TARGET_NR_linkat
  353. static int sys_linkat(int olddirfd, const char *oldpath,
  354. int newdirfd, const char *newpath, int flags)
  355. {
  356. return (linkat(olddirfd, oldpath, newdirfd, newpath, flags));
  357. }
  358. #endif
  359. #ifdef TARGET_NR_mkdirat
  360. static int sys_mkdirat(int dirfd, const char *pathname, mode_t mode)
  361. {
  362. return (mkdirat(dirfd, pathname, mode));
  363. }
  364. #endif
  365. #ifdef TARGET_NR_mknodat
  366. static int sys_mknodat(int dirfd, const char *pathname, mode_t mode,
  367. dev_t dev)
  368. {
  369. return (mknodat(dirfd, pathname, mode, dev));
  370. }
  371. #endif
  372. #ifdef TARGET_NR_openat
  373. static int sys_openat(int dirfd, const char *pathname, int flags, mode_t mode)
  374. {
  375. /*
  376. * open(2) has extra parameter 'mode' when called with
  377. * flag O_CREAT.
  378. */
  379. if ((flags & O_CREAT) != 0) {
  380. return (openat(dirfd, pathname, flags, mode));
  381. }
  382. return (openat(dirfd, pathname, flags));
  383. }
  384. #endif
  385. #ifdef TARGET_NR_readlinkat
  386. static int sys_readlinkat(int dirfd, const char *pathname, char *buf, size_t bufsiz)
  387. {
  388. return (readlinkat(dirfd, pathname, buf, bufsiz));
  389. }
  390. #endif
  391. #ifdef TARGET_NR_renameat
  392. static int sys_renameat(int olddirfd, const char *oldpath,
  393. int newdirfd, const char *newpath)
  394. {
  395. return (renameat(olddirfd, oldpath, newdirfd, newpath));
  396. }
  397. #endif
  398. #ifdef TARGET_NR_symlinkat
  399. static int sys_symlinkat(const char *oldpath, int newdirfd, const char *newpath)
  400. {
  401. return (symlinkat(oldpath, newdirfd, newpath));
  402. }
  403. #endif
  404. #ifdef TARGET_NR_unlinkat
  405. static int sys_unlinkat(int dirfd, const char *pathname, int flags)
  406. {
  407. return (unlinkat(dirfd, pathname, flags));
  408. }
  409. #endif
  410. #else /* !CONFIG_ATFILE */
  411. /*
  412. * Try direct syscalls instead
  413. */
  414. #if defined(TARGET_NR_faccessat) && defined(__NR_faccessat)
  415. _syscall3(int,sys_faccessat,int,dirfd,const char *,pathname,int,mode)
  416. #endif
  417. #if defined(TARGET_NR_fchmodat) && defined(__NR_fchmodat)
  418. _syscall3(int,sys_fchmodat,int,dirfd,const char *,pathname, mode_t,mode)
  419. #endif
  420. #if defined(TARGET_NR_fchownat) && defined(__NR_fchownat)
  421. _syscall5(int,sys_fchownat,int,dirfd,const char *,pathname,
  422. uid_t,owner,gid_t,group,int,flags)
  423. #endif
  424. #if (defined(TARGET_NR_fstatat64) || defined(TARGET_NR_newfstatat)) && \
  425. defined(__NR_fstatat64)
  426. _syscall4(int,sys_fstatat64,int,dirfd,const char *,pathname,
  427. struct stat *,buf,int,flags)
  428. #endif
  429. #if defined(TARGET_NR_futimesat) && defined(__NR_futimesat)
  430. _syscall3(int,sys_futimesat,int,dirfd,const char *,pathname,
  431. const struct timeval *,times)
  432. #endif
  433. #if (defined(TARGET_NR_newfstatat) || defined(TARGET_NR_fstatat64) ) && \
  434. defined(__NR_newfstatat)
  435. _syscall4(int,sys_newfstatat,int,dirfd,const char *,pathname,
  436. struct stat *,buf,int,flags)
  437. #endif
  438. #if defined(TARGET_NR_linkat) && defined(__NR_linkat)
  439. _syscall5(int,sys_linkat,int,olddirfd,const char *,oldpath,
  440. int,newdirfd,const char *,newpath,int,flags)
  441. #endif
  442. #if defined(TARGET_NR_mkdirat) && defined(__NR_mkdirat)
  443. _syscall3(int,sys_mkdirat,int,dirfd,const char *,pathname,mode_t,mode)
  444. #endif
  445. #if defined(TARGET_NR_mknodat) && defined(__NR_mknodat)
  446. _syscall4(int,sys_mknodat,int,dirfd,const char *,pathname,
  447. mode_t,mode,dev_t,dev)
  448. #endif
  449. #if defined(TARGET_NR_openat) && defined(__NR_openat)
  450. _syscall4(int,sys_openat,int,dirfd,const char *,pathname,int,flags,mode_t,mode)
  451. #endif
  452. #if defined(TARGET_NR_readlinkat) && defined(__NR_readlinkat)
  453. _syscall4(int,sys_readlinkat,int,dirfd,const char *,pathname,
  454. char *,buf,size_t,bufsize)
  455. #endif
  456. #if defined(TARGET_NR_renameat) && defined(__NR_renameat)
  457. _syscall4(int,sys_renameat,int,olddirfd,const char *,oldpath,
  458. int,newdirfd,const char *,newpath)
  459. #endif
  460. #if defined(TARGET_NR_symlinkat) && defined(__NR_symlinkat)
  461. _syscall3(int,sys_symlinkat,const char *,oldpath,
  462. int,newdirfd,const char *,newpath)
  463. #endif
  464. #if defined(TARGET_NR_unlinkat) && defined(__NR_unlinkat)
  465. _syscall3(int,sys_unlinkat,int,dirfd,const char *,pathname,int,flags)
  466. #endif
  467. #endif /* CONFIG_ATFILE */
  468. #ifdef CONFIG_UTIMENSAT
  469. static int sys_utimensat(int dirfd, const char *pathname,
  470. const struct timespec times[2], int flags)
  471. {
  472. if (pathname == NULL)
  473. return futimens(dirfd, times);
  474. else
  475. return utimensat(dirfd, pathname, times, flags);
  476. }
  477. #else
  478. #if defined(TARGET_NR_utimensat) && defined(__NR_utimensat)
  479. _syscall4(int,sys_utimensat,int,dirfd,const char *,pathname,
  480. const struct timespec *,tsp,int,flags)
  481. #endif
  482. #endif /* CONFIG_UTIMENSAT */
  483. #ifdef CONFIG_INOTIFY
  484. #include <sys/inotify.h>
  485. #if defined(TARGET_NR_inotify_init) && defined(__NR_inotify_init)
  486. static int sys_inotify_init(void)
  487. {
  488. return (inotify_init());
  489. }
  490. #endif
  491. #if defined(TARGET_NR_inotify_add_watch) && defined(__NR_inotify_add_watch)
  492. static int sys_inotify_add_watch(int fd,const char *pathname, int32_t mask)
  493. {
  494. return (inotify_add_watch(fd, pathname, mask));
  495. }
  496. #endif
  497. #if defined(TARGET_NR_inotify_rm_watch) && defined(__NR_inotify_rm_watch)
  498. static int sys_inotify_rm_watch(int fd, int32_t wd)
  499. {
  500. return (inotify_rm_watch(fd, wd));
  501. }
  502. #endif
  503. #ifdef CONFIG_INOTIFY1
  504. #if defined(TARGET_NR_inotify_init1) && defined(__NR_inotify_init1)
  505. static int sys_inotify_init1(int flags)
  506. {
  507. return (inotify_init1(flags));
  508. }
  509. #endif
  510. #endif
  511. #else
  512. /* Userspace can usually survive runtime without inotify */
  513. #undef TARGET_NR_inotify_init
  514. #undef TARGET_NR_inotify_init1
  515. #undef TARGET_NR_inotify_add_watch
  516. #undef TARGET_NR_inotify_rm_watch
  517. #endif /* CONFIG_INOTIFY */
  518. #if defined(TARGET_NR_ppoll)
  519. #ifndef __NR_ppoll
  520. # define __NR_ppoll -1
  521. #endif
  522. #define __NR_sys_ppoll __NR_ppoll
  523. _syscall5(int, sys_ppoll, struct pollfd *, fds, nfds_t, nfds,
  524. struct timespec *, timeout, const __sigset_t *, sigmask,
  525. size_t, sigsetsize)
  526. #endif
  527. #if defined(TARGET_NR_pselect6)
  528. #ifndef __NR_pselect6
  529. # define __NR_pselect6 -1
  530. #endif
  531. #define __NR_sys_pselect6 __NR_pselect6
  532. _syscall6(int, sys_pselect6, int, nfds, fd_set *, readfds, fd_set *, writefds,
  533. fd_set *, exceptfds, struct timespec *, timeout, void *, sig);
  534. #endif
  535. #if defined(TARGET_NR_prlimit64)
  536. #ifndef __NR_prlimit64
  537. # define __NR_prlimit64 -1
  538. #endif
  539. #define __NR_sys_prlimit64 __NR_prlimit64
  540. /* The glibc rlimit structure may not be that used by the underlying syscall */
  541. struct host_rlimit64 {
  542. uint64_t rlim_cur;
  543. uint64_t rlim_max;
  544. };
  545. _syscall4(int, sys_prlimit64, pid_t, pid, int, resource,
  546. const struct host_rlimit64 *, new_limit,
  547. struct host_rlimit64 *, old_limit)
  548. #endif
  549. /* ARM EABI and MIPS expect 64bit types aligned even on pairs or registers */
  550. #ifdef TARGET_ARM
  551. static inline int regpairs_aligned(void *cpu_env) {
  552. return ((((CPUARMState *)cpu_env)->eabi) == 1) ;
  553. }
  554. #elif defined(TARGET_MIPS)
  555. static inline int regpairs_aligned(void *cpu_env) { return 1; }
  556. #elif defined(TARGET_PPC) && !defined(TARGET_PPC64)
  557. /* SysV AVI for PPC32 expects 64bit parameters to be passed on odd/even pairs
  558. * of registers which translates to the same as ARM/MIPS, because we start with
  559. * r3 as arg1 */
  560. static inline int regpairs_aligned(void *cpu_env) { return 1; }
  561. #else
  562. static inline int regpairs_aligned(void *cpu_env) { return 0; }
  563. #endif
  564. #define ERRNO_TABLE_SIZE 1200
  565. /* target_to_host_errno_table[] is initialized from
  566. * host_to_target_errno_table[] in syscall_init(). */
  567. static uint16_t target_to_host_errno_table[ERRNO_TABLE_SIZE] = {
  568. };
  569. /*
  570. * This list is the union of errno values overridden in asm-<arch>/errno.h
  571. * minus the errnos that are not actually generic to all archs.
  572. */
  573. static uint16_t host_to_target_errno_table[ERRNO_TABLE_SIZE] = {
  574. [EIDRM] = TARGET_EIDRM,
  575. [ECHRNG] = TARGET_ECHRNG,
  576. [EL2NSYNC] = TARGET_EL2NSYNC,
  577. [EL3HLT] = TARGET_EL3HLT,
  578. [EL3RST] = TARGET_EL3RST,
  579. [ELNRNG] = TARGET_ELNRNG,
  580. [EUNATCH] = TARGET_EUNATCH,
  581. [ENOCSI] = TARGET_ENOCSI,
  582. [EL2HLT] = TARGET_EL2HLT,
  583. [EDEADLK] = TARGET_EDEADLK,
  584. [ENOLCK] = TARGET_ENOLCK,
  585. [EBADE] = TARGET_EBADE,
  586. [EBADR] = TARGET_EBADR,
  587. [EXFULL] = TARGET_EXFULL,
  588. [ENOANO] = TARGET_ENOANO,
  589. [EBADRQC] = TARGET_EBADRQC,
  590. [EBADSLT] = TARGET_EBADSLT,
  591. [EBFONT] = TARGET_EBFONT,
  592. [ENOSTR] = TARGET_ENOSTR,
  593. [ENODATA] = TARGET_ENODATA,
  594. [ETIME] = TARGET_ETIME,
  595. [ENOSR] = TARGET_ENOSR,
  596. [ENONET] = TARGET_ENONET,
  597. [ENOPKG] = TARGET_ENOPKG,
  598. [EREMOTE] = TARGET_EREMOTE,
  599. [ENOLINK] = TARGET_ENOLINK,
  600. [EADV] = TARGET_EADV,
  601. [ESRMNT] = TARGET_ESRMNT,
  602. [ECOMM] = TARGET_ECOMM,
  603. [EPROTO] = TARGET_EPROTO,
  604. [EDOTDOT] = TARGET_EDOTDOT,
  605. [EMULTIHOP] = TARGET_EMULTIHOP,
  606. [EBADMSG] = TARGET_EBADMSG,
  607. [ENAMETOOLONG] = TARGET_ENAMETOOLONG,
  608. [EOVERFLOW] = TARGET_EOVERFLOW,
  609. [ENOTUNIQ] = TARGET_ENOTUNIQ,
  610. [EBADFD] = TARGET_EBADFD,
  611. [EREMCHG] = TARGET_EREMCHG,
  612. [ELIBACC] = TARGET_ELIBACC,
  613. [ELIBBAD] = TARGET_ELIBBAD,
  614. [ELIBSCN] = TARGET_ELIBSCN,
  615. [ELIBMAX] = TARGET_ELIBMAX,
  616. [ELIBEXEC] = TARGET_ELIBEXEC,
  617. [EILSEQ] = TARGET_EILSEQ,
  618. [ENOSYS] = TARGET_ENOSYS,
  619. [ELOOP] = TARGET_ELOOP,
  620. [ERESTART] = TARGET_ERESTART,
  621. [ESTRPIPE] = TARGET_ESTRPIPE,
  622. [ENOTEMPTY] = TARGET_ENOTEMPTY,
  623. [EUSERS] = TARGET_EUSERS,
  624. [ENOTSOCK] = TARGET_ENOTSOCK,
  625. [EDESTADDRREQ] = TARGET_EDESTADDRREQ,
  626. [EMSGSIZE] = TARGET_EMSGSIZE,
  627. [EPROTOTYPE] = TARGET_EPROTOTYPE,
  628. [ENOPROTOOPT] = TARGET_ENOPROTOOPT,
  629. [EPROTONOSUPPORT] = TARGET_EPROTONOSUPPORT,
  630. [ESOCKTNOSUPPORT] = TARGET_ESOCKTNOSUPPORT,
  631. [EOPNOTSUPP] = TARGET_EOPNOTSUPP,
  632. [EPFNOSUPPORT] = TARGET_EPFNOSUPPORT,
  633. [EAFNOSUPPORT] = TARGET_EAFNOSUPPORT,
  634. [EADDRINUSE] = TARGET_EADDRINUSE,
  635. [EADDRNOTAVAIL] = TARGET_EADDRNOTAVAIL,
  636. [ENETDOWN] = TARGET_ENETDOWN,
  637. [ENETUNREACH] = TARGET_ENETUNREACH,
  638. [ENETRESET] = TARGET_ENETRESET,
  639. [ECONNABORTED] = TARGET_ECONNABORTED,
  640. [ECONNRESET] = TARGET_ECONNRESET,
  641. [ENOBUFS] = TARGET_ENOBUFS,
  642. [EISCONN] = TARGET_EISCONN,
  643. [ENOTCONN] = TARGET_ENOTCONN,
  644. [EUCLEAN] = TARGET_EUCLEAN,
  645. [ENOTNAM] = TARGET_ENOTNAM,
  646. [ENAVAIL] = TARGET_ENAVAIL,
  647. [EISNAM] = TARGET_EISNAM,
  648. [EREMOTEIO] = TARGET_EREMOTEIO,
  649. [ESHUTDOWN] = TARGET_ESHUTDOWN,
  650. [ETOOMANYREFS] = TARGET_ETOOMANYREFS,
  651. [ETIMEDOUT] = TARGET_ETIMEDOUT,
  652. [ECONNREFUSED] = TARGET_ECONNREFUSED,
  653. [EHOSTDOWN] = TARGET_EHOSTDOWN,
  654. [EHOSTUNREACH] = TARGET_EHOSTUNREACH,
  655. [EALREADY] = TARGET_EALREADY,
  656. [EINPROGRESS] = TARGET_EINPROGRESS,
  657. [ESTALE] = TARGET_ESTALE,
  658. [ECANCELED] = TARGET_ECANCELED,
  659. [ENOMEDIUM] = TARGET_ENOMEDIUM,
  660. [EMEDIUMTYPE] = TARGET_EMEDIUMTYPE,
  661. #ifdef ENOKEY
  662. [ENOKEY] = TARGET_ENOKEY,
  663. #endif
  664. #ifdef EKEYEXPIRED
  665. [EKEYEXPIRED] = TARGET_EKEYEXPIRED,
  666. #endif
  667. #ifdef EKEYREVOKED
  668. [EKEYREVOKED] = TARGET_EKEYREVOKED,
  669. #endif
  670. #ifdef EKEYREJECTED
  671. [EKEYREJECTED] = TARGET_EKEYREJECTED,
  672. #endif
  673. #ifdef EOWNERDEAD
  674. [EOWNERDEAD] = TARGET_EOWNERDEAD,
  675. #endif
  676. #ifdef ENOTRECOVERABLE
  677. [ENOTRECOVERABLE] = TARGET_ENOTRECOVERABLE,
  678. #endif
  679. };
  680. static inline int host_to_target_errno(int err)
  681. {
  682. if(host_to_target_errno_table[err])
  683. return host_to_target_errno_table[err];
  684. return err;
  685. }
  686. static inline int target_to_host_errno(int err)
  687. {
  688. if (target_to_host_errno_table[err])
  689. return target_to_host_errno_table[err];
  690. return err;
  691. }
  692. static inline abi_long get_errno(abi_long ret)
  693. {
  694. if (ret == -1)
  695. return -host_to_target_errno(errno);
  696. else
  697. return ret;
  698. }
  699. static inline int is_error(abi_long ret)
  700. {
  701. return (abi_ulong)ret >= (abi_ulong)(-4096);
  702. }
  703. char *target_strerror(int err)
  704. {
  705. if ((err >= ERRNO_TABLE_SIZE) || (err < 0)) {
  706. return NULL;
  707. }
  708. return strerror(target_to_host_errno(err));
  709. }
  710. static abi_ulong target_brk;
  711. static abi_ulong target_original_brk;
  712. static abi_ulong brk_page;
  713. void target_set_brk(abi_ulong new_brk)
  714. {
  715. target_original_brk = target_brk = HOST_PAGE_ALIGN(new_brk);
  716. brk_page = HOST_PAGE_ALIGN(target_brk);
  717. }
  718. //#define DEBUGF_BRK(message, args...) do { fprintf(stderr, (message), ## args); } while (0)
  719. #define DEBUGF_BRK(message, args...)
  720. /* do_brk() must return target values and target errnos. */
  721. abi_long do_brk(abi_ulong new_brk)
  722. {
  723. abi_long mapped_addr;
  724. int new_alloc_size;
  725. DEBUGF_BRK("do_brk(" TARGET_ABI_FMT_lx ") -> ", new_brk);
  726. if (!new_brk) {
  727. DEBUGF_BRK(TARGET_ABI_FMT_lx " (!new_brk)\n", target_brk);
  728. return target_brk;
  729. }
  730. if (new_brk < target_original_brk) {
  731. DEBUGF_BRK(TARGET_ABI_FMT_lx " (new_brk < target_original_brk)\n",
  732. target_brk);
  733. return target_brk;
  734. }
  735. /* If the new brk is less than the highest page reserved to the
  736. * target heap allocation, set it and we're almost done... */
  737. if (new_brk <= brk_page) {
  738. /* Heap contents are initialized to zero, as for anonymous
  739. * mapped pages. */
  740. if (new_brk > target_brk) {
  741. memset(g2h(target_brk), 0, new_brk - target_brk);
  742. }
  743. target_brk = new_brk;
  744. DEBUGF_BRK(TARGET_ABI_FMT_lx " (new_brk <= brk_page)\n", target_brk);
  745. return target_brk;
  746. }
  747. /* We need to allocate more memory after the brk... Note that
  748. * we don't use MAP_FIXED because that will map over the top of
  749. * any existing mapping (like the one with the host libc or qemu
  750. * itself); instead we treat "mapped but at wrong address" as
  751. * a failure and unmap again.
  752. */
  753. new_alloc_size = HOST_PAGE_ALIGN(new_brk - brk_page);
  754. mapped_addr = get_errno(target_mmap(brk_page, new_alloc_size,
  755. PROT_READ|PROT_WRITE,
  756. MAP_ANON|MAP_PRIVATE, 0, 0));
  757. if (mapped_addr == brk_page) {
  758. /* Heap contents are initialized to zero, as for anonymous
  759. * mapped pages. Technically the new pages are already
  760. * initialized to zero since they *are* anonymous mapped
  761. * pages, however we have to take care with the contents that
  762. * come from the remaining part of the previous page: it may
  763. * contains garbage data due to a previous heap usage (grown
  764. * then shrunken). */
  765. memset(g2h(target_brk), 0, brk_page - target_brk);
  766. target_brk = new_brk;
  767. brk_page = HOST_PAGE_ALIGN(target_brk);
  768. DEBUGF_BRK(TARGET_ABI_FMT_lx " (mapped_addr == brk_page)\n",
  769. target_brk);
  770. return target_brk;
  771. } else if (mapped_addr != -1) {
  772. /* Mapped but at wrong address, meaning there wasn't actually
  773. * enough space for this brk.
  774. */
  775. target_munmap(mapped_addr, new_alloc_size);
  776. mapped_addr = -1;
  777. DEBUGF_BRK(TARGET_ABI_FMT_lx " (mapped_addr != -1)\n", target_brk);
  778. }
  779. else {
  780. DEBUGF_BRK(TARGET_ABI_FMT_lx " (otherwise)\n", target_brk);
  781. }
  782. #if defined(TARGET_ALPHA)
  783. /* We (partially) emulate OSF/1 on Alpha, which requires we
  784. return a proper errno, not an unchanged brk value. */
  785. return -TARGET_ENOMEM;
  786. #endif
  787. /* For everything else, return the previous break. */
  788. return target_brk;
  789. }
  790. static inline abi_long copy_from_user_fdset(fd_set *fds,
  791. abi_ulong target_fds_addr,
  792. int n)
  793. {
  794. int i, nw, j, k;
  795. abi_ulong b, *target_fds;
  796. nw = (n + TARGET_ABI_BITS - 1) / TARGET_ABI_BITS;
  797. if (!(target_fds = lock_user(VERIFY_READ,
  798. target_fds_addr,
  799. sizeof(abi_ulong) * nw,
  800. 1)))
  801. return -TARGET_EFAULT;
  802. FD_ZERO(fds);
  803. k = 0;
  804. for (i = 0; i < nw; i++) {
  805. /* grab the abi_ulong */
  806. __get_user(b, &target_fds[i]);
  807. for (j = 0; j < TARGET_ABI_BITS; j++) {
  808. /* check the bit inside the abi_ulong */
  809. if ((b >> j) & 1)
  810. FD_SET(k, fds);
  811. k++;
  812. }
  813. }
  814. unlock_user(target_fds, target_fds_addr, 0);
  815. return 0;
  816. }
  817. static inline abi_ulong copy_from_user_fdset_ptr(fd_set *fds, fd_set **fds_ptr,
  818. abi_ulong target_fds_addr,
  819. int n)
  820. {
  821. if (target_fds_addr) {
  822. if (copy_from_user_fdset(fds, target_fds_addr, n))
  823. return -TARGET_EFAULT;
  824. *fds_ptr = fds;
  825. } else {
  826. *fds_ptr = NULL;
  827. }
  828. return 0;
  829. }
  830. static inline abi_long copy_to_user_fdset(abi_ulong target_fds_addr,
  831. const fd_set *fds,
  832. int n)
  833. {
  834. int i, nw, j, k;
  835. abi_long v;
  836. abi_ulong *target_fds;
  837. nw = (n + TARGET_ABI_BITS - 1) / TARGET_ABI_BITS;
  838. if (!(target_fds = lock_user(VERIFY_WRITE,
  839. target_fds_addr,
  840. sizeof(abi_ulong) * nw,
  841. 0)))
  842. return -TARGET_EFAULT;
  843. k = 0;
  844. for (i = 0; i < nw; i++) {
  845. v = 0;
  846. for (j = 0; j < TARGET_ABI_BITS; j++) {
  847. v |= ((FD_ISSET(k, fds) != 0) << j);
  848. k++;
  849. }
  850. __put_user(v, &target_fds[i]);
  851. }
  852. unlock_user(target_fds, target_fds_addr, sizeof(abi_ulong) * nw);
  853. return 0;
  854. }
  855. #if defined(__alpha__)
  856. #define HOST_HZ 1024
  857. #else
  858. #define HOST_HZ 100
  859. #endif
  860. static inline abi_long host_to_target_clock_t(long ticks)
  861. {
  862. #if HOST_HZ == TARGET_HZ
  863. return ticks;
  864. #else
  865. return ((int64_t)ticks * TARGET_HZ) / HOST_HZ;
  866. #endif
  867. }
  868. static inline abi_long host_to_target_rusage(abi_ulong target_addr,
  869. const struct rusage *rusage)
  870. {
  871. struct target_rusage *target_rusage;
  872. if (!lock_user_struct(VERIFY_WRITE, target_rusage, target_addr, 0))
  873. return -TARGET_EFAULT;
  874. target_rusage->ru_utime.tv_sec = tswapal(rusage->ru_utime.tv_sec);
  875. target_rusage->ru_utime.tv_usec = tswapal(rusage->ru_utime.tv_usec);
  876. target_rusage->ru_stime.tv_sec = tswapal(rusage->ru_stime.tv_sec);
  877. target_rusage->ru_stime.tv_usec = tswapal(rusage->ru_stime.tv_usec);
  878. target_rusage->ru_maxrss = tswapal(rusage->ru_maxrss);
  879. target_rusage->ru_ixrss = tswapal(rusage->ru_ixrss);
  880. target_rusage->ru_idrss = tswapal(rusage->ru_idrss);
  881. target_rusage->ru_isrss = tswapal(rusage->ru_isrss);
  882. target_rusage->ru_minflt = tswapal(rusage->ru_minflt);
  883. target_rusage->ru_majflt = tswapal(rusage->ru_majflt);
  884. target_rusage->ru_nswap = tswapal(rusage->ru_nswap);
  885. target_rusage->ru_inblock = tswapal(rusage->ru_inblock);
  886. target_rusage->ru_oublock = tswapal(rusage->ru_oublock);
  887. target_rusage->ru_msgsnd = tswapal(rusage->ru_msgsnd);
  888. target_rusage->ru_msgrcv = tswapal(rusage->ru_msgrcv);
  889. target_rusage->ru_nsignals = tswapal(rusage->ru_nsignals);
  890. target_rusage->ru_nvcsw = tswapal(rusage->ru_nvcsw);
  891. target_rusage->ru_nivcsw = tswapal(rusage->ru_nivcsw);
  892. unlock_user_struct(target_rusage, target_addr, 1);
  893. return 0;
  894. }
  895. static inline rlim_t target_to_host_rlim(abi_ulong target_rlim)
  896. {
  897. abi_ulong target_rlim_swap;
  898. rlim_t result;
  899. target_rlim_swap = tswapal(target_rlim);
  900. if (target_rlim_swap == TARGET_RLIM_INFINITY)
  901. return RLIM_INFINITY;
  902. result = target_rlim_swap;
  903. if (target_rlim_swap != (rlim_t)result)
  904. return RLIM_INFINITY;
  905. return result;
  906. }
  907. static inline abi_ulong host_to_target_rlim(rlim_t rlim)
  908. {
  909. abi_ulong target_rlim_swap;
  910. abi_ulong result;
  911. if (rlim == RLIM_INFINITY || rlim != (abi_long)rlim)
  912. target_rlim_swap = TARGET_RLIM_INFINITY;
  913. else
  914. target_rlim_swap = rlim;
  915. result = tswapal(target_rlim_swap);
  916. return result;
  917. }
  918. static inline int target_to_host_resource(int code)
  919. {
  920. switch (code) {
  921. case TARGET_RLIMIT_AS:
  922. return RLIMIT_AS;
  923. case TARGET_RLIMIT_CORE:
  924. return RLIMIT_CORE;
  925. case TARGET_RLIMIT_CPU:
  926. return RLIMIT_CPU;
  927. case TARGET_RLIMIT_DATA:
  928. return RLIMIT_DATA;
  929. case TARGET_RLIMIT_FSIZE:
  930. return RLIMIT_FSIZE;
  931. case TARGET_RLIMIT_LOCKS:
  932. return RLIMIT_LOCKS;
  933. case TARGET_RLIMIT_MEMLOCK:
  934. return RLIMIT_MEMLOCK;
  935. case TARGET_RLIMIT_MSGQUEUE:
  936. return RLIMIT_MSGQUEUE;
  937. case TARGET_RLIMIT_NICE:
  938. return RLIMIT_NICE;
  939. case TARGET_RLIMIT_NOFILE:
  940. return RLIMIT_NOFILE;
  941. case TARGET_RLIMIT_NPROC:
  942. return RLIMIT_NPROC;
  943. case TARGET_RLIMIT_RSS:
  944. return RLIMIT_RSS;
  945. case TARGET_RLIMIT_RTPRIO:
  946. return RLIMIT_RTPRIO;
  947. case TARGET_RLIMIT_SIGPENDING:
  948. return RLIMIT_SIGPENDING;
  949. case TARGET_RLIMIT_STACK:
  950. return RLIMIT_STACK;
  951. default:
  952. return code;
  953. }
  954. }
  955. static inline abi_long copy_from_user_timeval(struct timeval *tv,
  956. abi_ulong target_tv_addr)
  957. {
  958. struct target_timeval *target_tv;
  959. if (!lock_user_struct(VERIFY_READ, target_tv, target_tv_addr, 1))
  960. return -TARGET_EFAULT;
  961. __get_user(tv->tv_sec, &target_tv->tv_sec);
  962. __get_user(tv->tv_usec, &target_tv->tv_usec);
  963. unlock_user_struct(target_tv, target_tv_addr, 0);
  964. return 0;
  965. }
  966. static inline abi_long copy_to_user_timeval(abi_ulong target_tv_addr,
  967. const struct timeval *tv)
  968. {
  969. struct target_timeval *target_tv;
  970. if (!lock_user_struct(VERIFY_WRITE, target_tv, target_tv_addr, 0))
  971. return -TARGET_EFAULT;
  972. __put_user(tv->tv_sec, &target_tv->tv_sec);
  973. __put_user(tv->tv_usec, &target_tv->tv_usec);
  974. unlock_user_struct(target_tv, target_tv_addr, 1);
  975. return 0;
  976. }
  977. #if defined(TARGET_NR_mq_open) && defined(__NR_mq_open)
  978. #include <mqueue.h>
  979. static inline abi_long copy_from_user_mq_attr(struct mq_attr *attr,
  980. abi_ulong target_mq_attr_addr)
  981. {
  982. struct target_mq_attr *target_mq_attr;
  983. if (!lock_user_struct(VERIFY_READ, target_mq_attr,
  984. target_mq_attr_addr, 1))
  985. return -TARGET_EFAULT;
  986. __get_user(attr->mq_flags, &target_mq_attr->mq_flags);
  987. __get_user(attr->mq_maxmsg, &target_mq_attr->mq_maxmsg);
  988. __get_user(attr->mq_msgsize, &target_mq_attr->mq_msgsize);
  989. __get_user(attr->mq_curmsgs, &target_mq_attr->mq_curmsgs);
  990. unlock_user_struct(target_mq_attr, target_mq_attr_addr, 0);
  991. return 0;
  992. }
  993. static inline abi_long copy_to_user_mq_attr(abi_ulong target_mq_attr_addr,
  994. const struct mq_attr *attr)
  995. {
  996. struct target_mq_attr *target_mq_attr;
  997. if (!lock_user_struct(VERIFY_WRITE, target_mq_attr,
  998. target_mq_attr_addr, 0))
  999. return -TARGET_EFAULT;
  1000. __put_user(attr->mq_flags, &target_mq_attr->mq_flags);
  1001. __put_user(attr->mq_maxmsg, &target_mq_attr->mq_maxmsg);
  1002. __put_user(attr->mq_msgsize, &target_mq_attr->mq_msgsize);
  1003. __put_user(attr->mq_curmsgs, &target_mq_attr->mq_curmsgs);
  1004. unlock_user_struct(target_mq_attr, target_mq_attr_addr, 1);
  1005. return 0;
  1006. }
  1007. #endif
  1008. #if defined(TARGET_NR_select) || defined(TARGET_NR__newselect)
  1009. /* do_select() must return target values and target errnos. */
  1010. static abi_long do_select(int n,
  1011. abi_ulong rfd_addr, abi_ulong wfd_addr,
  1012. abi_ulong efd_addr, abi_ulong target_tv_addr)
  1013. {
  1014. fd_set rfds, wfds, efds;
  1015. fd_set *rfds_ptr, *wfds_ptr, *efds_ptr;
  1016. struct timeval tv, *tv_ptr;
  1017. abi_long ret;
  1018. ret = copy_from_user_fdset_ptr(&rfds, &rfds_ptr, rfd_addr, n);
  1019. if (ret) {
  1020. return ret;
  1021. }
  1022. ret = copy_from_user_fdset_ptr(&wfds, &wfds_ptr, wfd_addr, n);
  1023. if (ret) {
  1024. return ret;
  1025. }
  1026. ret = copy_from_user_fdset_ptr(&efds, &efds_ptr, efd_addr, n);
  1027. if (ret) {
  1028. return ret;
  1029. }
  1030. if (target_tv_addr) {
  1031. if (copy_from_user_timeval(&tv, target_tv_addr))
  1032. return -TARGET_EFAULT;
  1033. tv_ptr = &tv;
  1034. } else {
  1035. tv_ptr = NULL;
  1036. }
  1037. ret = get_errno(select(n, rfds_ptr, wfds_ptr, efds_ptr, tv_ptr));
  1038. if (!is_error(ret)) {
  1039. if (rfd_addr && copy_to_user_fdset(rfd_addr, &rfds, n))
  1040. return -TARGET_EFAULT;
  1041. if (wfd_addr && copy_to_user_fdset(wfd_addr, &wfds, n))
  1042. return -TARGET_EFAULT;
  1043. if (efd_addr && copy_to_user_fdset(efd_addr, &efds, n))
  1044. return -TARGET_EFAULT;
  1045. if (target_tv_addr && copy_to_user_timeval(target_tv_addr, &tv))
  1046. return -TARGET_EFAULT;
  1047. }
  1048. return ret;
  1049. }
  1050. #endif
  1051. static abi_long do_pipe2(int host_pipe[], int flags)
  1052. {
  1053. #ifdef CONFIG_PIPE2
  1054. return pipe2(host_pipe, flags);
  1055. #else
  1056. return -ENOSYS;
  1057. #endif
  1058. }
  1059. static abi_long do_pipe(void *cpu_env, abi_ulong pipedes,
  1060. int flags, int is_pipe2)
  1061. {
  1062. int host_pipe[2];
  1063. abi_long ret;
  1064. ret = flags ? do_pipe2(host_pipe, flags) : pipe(host_pipe);
  1065. if (is_error(ret))
  1066. return get_errno(ret);
  1067. /* Several targets have special calling conventions for the original
  1068. pipe syscall, but didn't replicate this into the pipe2 syscall. */
  1069. if (!is_pipe2) {
  1070. #if defined(TARGET_ALPHA)
  1071. ((CPUAlphaState *)cpu_env)->ir[IR_A4] = host_pipe[1];
  1072. return host_pipe[0];
  1073. #elif defined(TARGET_MIPS)
  1074. ((CPUMIPSState*)cpu_env)->active_tc.gpr[3] = host_pipe[1];
  1075. return host_pipe[0];
  1076. #elif defined(TARGET_SH4)
  1077. ((CPUSH4State*)cpu_env)->gregs[1] = host_pipe[1];
  1078. return host_pipe[0];
  1079. #endif
  1080. }
  1081. if (put_user_s32(host_pipe[0], pipedes)
  1082. || put_user_s32(host_pipe[1], pipedes + sizeof(host_pipe[0])))
  1083. return -TARGET_EFAULT;
  1084. return get_errno(ret);
  1085. }
  1086. static inline abi_long target_to_host_ip_mreq(struct ip_mreqn *mreqn,
  1087. abi_ulong target_addr,
  1088. socklen_t len)
  1089. {
  1090. struct target_ip_mreqn *target_smreqn;
  1091. target_smreqn = lock_user(VERIFY_READ, target_addr, len, 1);
  1092. if (!target_smreqn)
  1093. return -TARGET_EFAULT;
  1094. mreqn->imr_multiaddr.s_addr = target_smreqn->imr_multiaddr.s_addr;
  1095. mreqn->imr_address.s_addr = target_smreqn->imr_address.s_addr;
  1096. if (len == sizeof(struct target_ip_mreqn))
  1097. mreqn->imr_ifindex = tswapal(target_smreqn->imr_ifindex);
  1098. unlock_user(target_smreqn, target_addr, 0);
  1099. return 0;
  1100. }
  1101. static inline abi_long target_to_host_sockaddr(struct sockaddr *addr,
  1102. abi_ulong target_addr,
  1103. socklen_t len)
  1104. {
  1105. const socklen_t unix_maxlen = sizeof (struct sockaddr_un);
  1106. sa_family_t sa_family;
  1107. struct target_sockaddr *target_saddr;
  1108. target_saddr = lock_user(VERIFY_READ, target_addr, len, 1);
  1109. if (!target_saddr)
  1110. return -TARGET_EFAULT;
  1111. sa_family = tswap16(target_saddr->sa_family);
  1112. /* Oops. The caller might send a incomplete sun_path; sun_path
  1113. * must be terminated by \0 (see the manual page), but
  1114. * unfortunately it is quite common to specify sockaddr_un
  1115. * length as "strlen(x->sun_path)" while it should be
  1116. * "strlen(...) + 1". We'll fix that here if needed.
  1117. * Linux kernel has a similar feature.
  1118. */
  1119. if (sa_family == AF_UNIX) {
  1120. if (len < unix_maxlen && len > 0) {
  1121. char *cp = (char*)target_saddr;
  1122. if ( cp[len-1] && !cp[len] )
  1123. len++;
  1124. }
  1125. if (len > unix_maxlen)
  1126. len = unix_maxlen;
  1127. }
  1128. memcpy(addr, target_saddr, len);
  1129. addr->sa_family = sa_family;
  1130. unlock_user(target_saddr, target_addr, 0);
  1131. return 0;
  1132. }
  1133. static inline abi_long host_to_target_sockaddr(abi_ulong target_addr,
  1134. struct sockaddr *addr,
  1135. socklen_t len)
  1136. {
  1137. struct target_sockaddr *target_saddr;
  1138. target_saddr = lock_user(VERIFY_WRITE, target_addr, len, 0);
  1139. if (!target_saddr)
  1140. return -TARGET_EFAULT;
  1141. memcpy(target_saddr, addr, len);
  1142. target_saddr->sa_family = tswap16(addr->sa_family);
  1143. unlock_user(target_saddr, target_addr, len);
  1144. return 0;
  1145. }
  1146. static inline abi_long target_to_host_cmsg(struct msghdr *msgh,
  1147. struct target_msghdr *target_msgh)
  1148. {
  1149. struct cmsghdr *cmsg = CMSG_FIRSTHDR(msgh);
  1150. abi_long msg_controllen;
  1151. abi_ulong target_cmsg_addr;
  1152. struct target_cmsghdr *target_cmsg;
  1153. socklen_t space = 0;
  1154. msg_controllen = tswapal(target_msgh->msg_controllen);
  1155. if (msg_controllen < sizeof (struct target_cmsghdr))
  1156. goto the_end;
  1157. target_cmsg_addr = tswapal(target_msgh->msg_control);
  1158. target_cmsg = lock_user(VERIFY_READ, target_cmsg_addr, msg_controllen, 1);
  1159. if (!target_cmsg)
  1160. return -TARGET_EFAULT;
  1161. while (cmsg && target_cmsg) {
  1162. void *data = CMSG_DATA(cmsg);
  1163. void *target_data = TARGET_CMSG_DATA(target_cmsg);
  1164. int len = tswapal(target_cmsg->cmsg_len)
  1165. - TARGET_CMSG_ALIGN(sizeof (struct target_cmsghdr));
  1166. space += CMSG_SPACE(len);
  1167. if (space > msgh->msg_controllen) {
  1168. space -= CMSG_SPACE(len);
  1169. gemu_log("Host cmsg overflow\n");
  1170. break;
  1171. }
  1172. cmsg->cmsg_level = tswap32(target_cmsg->cmsg_level);
  1173. cmsg->cmsg_type = tswap32(target_cmsg->cmsg_type);
  1174. cmsg->cmsg_len = CMSG_LEN(len);
  1175. if (cmsg->cmsg_level != TARGET_SOL_SOCKET || cmsg->cmsg_type != SCM_RIGHTS) {
  1176. gemu_log("Unsupported ancillary data: %d/%d\n", cmsg->cmsg_level, cmsg->cmsg_type);
  1177. memcpy(data, target_data, len);
  1178. } else {
  1179. int *fd = (int *)data;
  1180. int *target_fd = (int *)target_data;
  1181. int i, numfds = len / sizeof(int);
  1182. for (i = 0; i < numfds; i++)
  1183. fd[i] = tswap32(target_fd[i]);
  1184. }
  1185. cmsg = CMSG_NXTHDR(msgh, cmsg);
  1186. target_cmsg = TARGET_CMSG_NXTHDR(target_msgh, target_cmsg);
  1187. }
  1188. unlock_user(target_cmsg, target_cmsg_addr, 0);
  1189. the_end:
  1190. msgh->msg_controllen = space;
  1191. return 0;
  1192. }
  1193. static inline abi_long host_to_target_cmsg(struct target_msghdr *target_msgh,
  1194. struct msghdr *msgh)
  1195. {
  1196. struct cmsghdr *cmsg = CMSG_FIRSTHDR(msgh);
  1197. abi_long msg_controllen;
  1198. abi_ulong target_cmsg_addr;
  1199. struct target_cmsghdr *target_cmsg;
  1200. socklen_t space = 0;
  1201. msg_controllen = tswapal(target_msgh->msg_controllen);
  1202. if (msg_controllen < sizeof (struct target_cmsghdr))
  1203. goto the_end;
  1204. target_cmsg_addr = tswapal(target_msgh->msg_control);
  1205. target_cmsg = lock_user(VERIFY_WRITE, target_cmsg_addr, msg_controllen, 0);
  1206. if (!target_cmsg)
  1207. return -TARGET_EFAULT;
  1208. while (cmsg && target_cmsg) {
  1209. void *data = CMSG_DATA(cmsg);
  1210. void *target_data = TARGET_CMSG_DATA(target_cmsg);
  1211. int len = cmsg->cmsg_len - CMSG_ALIGN(sizeof (struct cmsghdr));
  1212. space += TARGET_CMSG_SPACE(len);
  1213. if (space > msg_controllen) {
  1214. space -= TARGET_CMSG_SPACE(len);
  1215. gemu_log("Target cmsg overflow\n");
  1216. break;
  1217. }
  1218. target_cmsg->cmsg_level = tswap32(cmsg->cmsg_level);
  1219. target_cmsg->cmsg_type = tswap32(cmsg->cmsg_type);
  1220. target_cmsg->cmsg_len = tswapal(TARGET_CMSG_LEN(len));
  1221. if ((cmsg->cmsg_level == TARGET_SOL_SOCKET) &&
  1222. (cmsg->cmsg_type == SCM_RIGHTS)) {
  1223. int *fd = (int *)data;
  1224. int *target_fd = (int *)target_data;
  1225. int i, numfds = len / sizeof(int);
  1226. for (i = 0; i < numfds; i++)
  1227. target_fd[i] = tswap32(fd[i]);
  1228. } else if ((cmsg->cmsg_level == TARGET_SOL_SOCKET) &&
  1229. (cmsg->cmsg_type == SO_TIMESTAMP) &&
  1230. (len == sizeof(struct timeval))) {
  1231. /* copy struct timeval to target */
  1232. struct timeval *tv = (struct timeval *)data;
  1233. struct target_timeval *target_tv =
  1234. (struct target_timeval *)target_data;
  1235. target_tv->tv_sec = tswapal(tv->tv_sec);
  1236. target_tv->tv_usec = tswapal(tv->tv_usec);
  1237. } else {
  1238. gemu_log("Unsupported ancillary data: %d/%d\n",
  1239. cmsg->cmsg_level, cmsg->cmsg_type);
  1240. memcpy(target_data, data, len);
  1241. }
  1242. cmsg = CMSG_NXTHDR(msgh, cmsg);
  1243. target_cmsg = TARGET_CMSG_NXTHDR(target_msgh, target_cmsg);
  1244. }
  1245. unlock_user(target_cmsg, target_cmsg_addr, space);
  1246. the_end:
  1247. target_msgh->msg_controllen = tswapal(space);
  1248. return 0;
  1249. }
  1250. /* do_setsockopt() Must return target values and target errnos. */
  1251. static abi_long do_setsockopt(int sockfd, int level, int optname,
  1252. abi_ulong optval_addr, socklen_t optlen)
  1253. {
  1254. abi_long ret;
  1255. int val;
  1256. struct ip_mreqn *ip_mreq;
  1257. struct ip_mreq_source *ip_mreq_source;
  1258. switch(level) {
  1259. case SOL_TCP:
  1260. /* TCP options all take an 'int' value. */
  1261. if (optlen < sizeof(uint32_t))
  1262. return -TARGET_EINVAL;
  1263. if (get_user_u32(val, optval_addr))
  1264. return -TARGET_EFAULT;
  1265. ret = get_errno(setsockopt(sockfd, level, optname, &val, sizeof(val)));
  1266. break;
  1267. case SOL_IP:
  1268. switch(optname) {
  1269. case IP_TOS:
  1270. case IP_TTL:
  1271. case IP_HDRINCL:
  1272. case IP_ROUTER_ALERT:
  1273. case IP_RECVOPTS:
  1274. case IP_RETOPTS:
  1275. case IP_PKTINFO:
  1276. case IP_MTU_DISCOVER:
  1277. case IP_RECVERR:
  1278. case IP_RECVTOS:
  1279. #ifdef IP_FREEBIND
  1280. case IP_FREEBIND:
  1281. #endif
  1282. case IP_MULTICAST_TTL:
  1283. case IP_MULTICAST_LOOP:
  1284. val = 0;
  1285. if (optlen >= sizeof(uint32_t)) {
  1286. if (get_user_u32(val, optval_addr))
  1287. return -TARGET_EFAULT;
  1288. } else if (optlen >= 1) {
  1289. if (get_user_u8(val, optval_addr))
  1290. return -TARGET_EFAULT;
  1291. }
  1292. ret = get_errno(setsockopt(sockfd, level, optname, &val, sizeof(val)));
  1293. break;
  1294. case IP_ADD_MEMBERSHIP:
  1295. case IP_DROP_MEMBERSHIP:
  1296. if (optlen < sizeof (struct target_ip_mreq) ||
  1297. optlen > sizeof (struct target_ip_mreqn))
  1298. return -TARGET_EINVAL;
  1299. ip_mreq = (struct ip_mreqn *) alloca(optlen);
  1300. target_to_host_ip_mreq(ip_mreq, optval_addr, optlen);
  1301. ret = get_errno(setsockopt(sockfd, level, optname, ip_mreq, optlen));
  1302. break;
  1303. case IP_BLOCK_SOURCE:
  1304. case IP_UNBLOCK_SOURCE:
  1305. case IP_ADD_SOURCE_MEMBERSHIP:
  1306. case IP_DROP_SOURCE_MEMBERSHIP:
  1307. if (optlen != sizeof (struct target_ip_mreq_source))
  1308. return -TARGET_EINVAL;
  1309. ip_mreq_source = lock_user(VERIFY_READ, optval_addr, optlen, 1);
  1310. ret = get_errno(setsockopt(sockfd, level, optname, ip_mreq_source, optlen));
  1311. unlock_user (ip_mreq_source, optval_addr, 0);
  1312. break;
  1313. default:
  1314. goto unimplemented;
  1315. }
  1316. break;
  1317. case SOL_RAW:
  1318. switch (optname) {
  1319. case ICMP_FILTER:
  1320. /* struct icmp_filter takes an u32 value */
  1321. if (optlen < sizeof(uint32_t)) {
  1322. return -TARGET_EINVAL;
  1323. }
  1324. if (get_user_u32(val, optval_addr)) {
  1325. return -TARGET_EFAULT;
  1326. }
  1327. ret = get_errno(setsockopt(sockfd, level, optname,
  1328. &val, sizeof(val)));
  1329. break;
  1330. default:
  1331. goto unimplemented;
  1332. }
  1333. break;
  1334. case TARGET_SOL_SOCKET:
  1335. switch (optname) {
  1336. case TARGET_SO_RCVTIMEO:
  1337. {
  1338. struct timeval tv;
  1339. optname = SO_RCVTIMEO;
  1340. set_timeout:
  1341. if (optlen != sizeof(struct target_timeval)) {
  1342. return -TARGET_EINVAL;
  1343. }
  1344. if (copy_from_user_timeval(&tv, optval_addr)) {
  1345. return -TARGET_EFAULT;
  1346. }
  1347. ret = get_errno(setsockopt(sockfd, SOL_SOCKET, optname,
  1348. &tv, sizeof(tv)));
  1349. return ret;
  1350. }
  1351. case TARGET_SO_SNDTIMEO:
  1352. optname = SO_SNDTIMEO;
  1353. goto set_timeout;
  1354. /* Options with 'int' argument. */
  1355. case TARGET_SO_DEBUG:
  1356. optname = SO_DEBUG;
  1357. break;
  1358. case TARGET_SO_REUSEADDR:
  1359. optname = SO_REUSEADDR;
  1360. break;
  1361. case TARGET_SO_TYPE:
  1362. optname = SO_TYPE;
  1363. break;
  1364. case TARGET_SO_ERROR:
  1365. optname = SO_ERROR;
  1366. break;
  1367. case TARGET_SO_DONTROUTE:
  1368. optname = SO_DONTROUTE;
  1369. break;
  1370. case TARGET_SO_BROADCAST:
  1371. optname = SO_BROADCAST;
  1372. break;
  1373. case TARGET_SO_SNDBUF:
  1374. optname = SO_SNDBUF;
  1375. break;
  1376. case TARGET_SO_RCVBUF:
  1377. optname = SO_RCVBUF;
  1378. break;
  1379. case TARGET_SO_KEEPALIVE:
  1380. optname = SO_KEEPALIVE;
  1381. break;
  1382. case TARGET_SO_OOBINLINE:
  1383. optname = SO_OOBINLINE;
  1384. break;
  1385. case TARGET_SO_NO_CHECK:
  1386. optname = SO_NO_CHECK;
  1387. break;
  1388. case TARGET_SO_PRIORITY:
  1389. optname = SO_PRIORITY;
  1390. break;
  1391. #ifdef SO_BSDCOMPAT
  1392. case TARGET_SO_BSDCOMPAT:
  1393. optname = SO_BSDCOMPAT;
  1394. break;
  1395. #endif
  1396. case TARGET_SO_PASSCRED:
  1397. optname = SO_PASSCRED;
  1398. break;
  1399. case TARGET_SO_TIMESTAMP:
  1400. optname = SO_TIMESTAMP;
  1401. break;
  1402. case TARGET_SO_RCVLOWAT:
  1403. optname = SO_RCVLOWAT;
  1404. break;
  1405. break;
  1406. default:
  1407. goto unimplemented;
  1408. }
  1409. if (optlen < sizeof(uint32_t))
  1410. return -TARGET_EINVAL;
  1411. if (get_user_u32(val, optval_addr))
  1412. return -TARGET_EFAULT;
  1413. ret = get_errno(setsockopt(sockfd, SOL_SOCKET, optname, &val, sizeof(val)));
  1414. break;
  1415. default:
  1416. unimplemented:
  1417. gemu_log("Unsupported setsockopt level=%d optname=%d\n", level, optname);
  1418. ret = -TARGET_ENOPROTOOPT;
  1419. }
  1420. return ret;
  1421. }
  1422. /* do_getsockopt() Must return target values and target errnos. */
  1423. static abi_long do_getsockopt(int sockfd, int level, int optname,
  1424. abi_ulong optval_addr, abi_ulong optlen)
  1425. {
  1426. abi_long ret;
  1427. int len, val;
  1428. socklen_t lv;
  1429. switch(level) {
  1430. case TARGET_SOL_SOCKET:
  1431. level = SOL_SOCKET;
  1432. switch (optname) {
  1433. /* These don't just return a single integer */
  1434. case TARGET_SO_LINGER:
  1435. case TARGET_SO_RCVTIMEO:
  1436. case TARGET_SO_SNDTIMEO:
  1437. case TARGET_SO_PEERNAME:
  1438. goto unimplemented;
  1439. case TARGET_SO_PEERCRED: {
  1440. struct ucred cr;
  1441. socklen_t crlen;
  1442. struct target_ucred *tcr;
  1443. if (get_user_u32(len, optlen)) {
  1444. return -TARGET_EFAULT;
  1445. }
  1446. if (len < 0) {
  1447. return -TARGET_EINVAL;
  1448. }
  1449. crlen = sizeof(cr);
  1450. ret = get_errno(getsockopt(sockfd, level, SO_PEERCRED,
  1451. &cr, &crlen));
  1452. if (ret < 0) {
  1453. return ret;
  1454. }
  1455. if (len > crlen) {
  1456. len = crlen;
  1457. }
  1458. if (!lock_user_struct(VERIFY_WRITE, tcr, optval_addr, 0)) {
  1459. return -TARGET_EFAULT;
  1460. }
  1461. __put_user(cr.pid, &tcr->pid);
  1462. __put_user(cr.uid, &tcr->uid);
  1463. __put_user(cr.gid, &tcr->gid);
  1464. unlock_user_struct(tcr, optval_addr, 1);
  1465. if (put_user_u32(len, optlen)) {
  1466. return -TARGET_EFAULT;
  1467. }
  1468. break;
  1469. }
  1470. /* Options with 'int' argument. */
  1471. case TARGET_SO_DEBUG:
  1472. optname = SO_DEBUG;
  1473. goto int_case;
  1474. case TARGET_SO_REUSEADDR:
  1475. optname = SO_REUSEADDR;
  1476. goto int_case;
  1477. case TARGET_SO_TYPE:
  1478. optname = SO_TYPE;
  1479. goto int_case;
  1480. case TARGET_SO_ERROR:
  1481. optname = SO_ERROR;
  1482. goto int_case;
  1483. case TARGET_SO_DONTROUTE:
  1484. optname = SO_DONTROUTE;
  1485. goto int_case;
  1486. case TARGET_SO_BROADCAST:
  1487. optname = SO_BROADCAST;
  1488. goto int_case;
  1489. case TARGET_SO_SNDBUF:
  1490. optname = SO_SNDBUF;
  1491. goto int_case;
  1492. case TARGET_SO_RCVBUF:
  1493. optname = SO_RCVBUF;
  1494. goto int_case;
  1495. case TARGET_SO_KEEPALIVE:
  1496. optname = SO_KEEPALIVE;
  1497. goto int_case;
  1498. case TARGET_SO_OOBINLINE:
  1499. optname = SO_OOBINLINE;
  1500. goto int_case;
  1501. case TARGET_SO_NO_CHECK:
  1502. optname = SO_NO_CHECK;
  1503. goto int_case;
  1504. case TARGET_SO_PRIORITY:
  1505. optname = SO_PRIORITY;
  1506. goto int_case;
  1507. #ifdef SO_BSDCOMPAT
  1508. case TARGET_SO_BSDCOMPAT:
  1509. optname = SO_BSDCOMPAT;
  1510. goto int_case;
  1511. #endif
  1512. case TARGET_SO_PASSCRED:
  1513. optname = SO_PASSCRED;
  1514. goto int_case;
  1515. case TARGET_SO_TIMESTAMP:
  1516. optname = SO_TIMESTAMP;
  1517. goto int_case;
  1518. case TARGET_SO_RCVLOWAT:
  1519. optname = SO_RCVLOWAT;
  1520. goto int_case;
  1521. default:
  1522. goto int_case;
  1523. }
  1524. break;
  1525. case SOL_TCP:
  1526. /* TCP options all take an 'int' value. */
  1527. int_case:
  1528. if (get_user_u32(len, optlen))
  1529. return -TARGET_EFAULT;
  1530. if (len < 0)
  1531. return -TARGET_EINVAL;
  1532. lv = sizeof(lv);
  1533. ret = get_errno(getsockopt(sockfd, level, optname, &val, &lv));
  1534. if (ret < 0)
  1535. return ret;
  1536. if (len > lv)
  1537. len = lv;
  1538. if (len == 4) {
  1539. if (put_user_u32(val, optval_addr))
  1540. return -TARGET_EFAULT;
  1541. } else {
  1542. if (put_user_u8(val, optval_addr))
  1543. return -TARGET_EFAULT;
  1544. }
  1545. if (put_user_u32(len, optlen))
  1546. return -TARGET_EFAULT;
  1547. break;
  1548. case SOL_IP:
  1549. switch(optname) {
  1550. case IP_TOS:
  1551. case IP_TTL:
  1552. case IP_HDRINCL:
  1553. case IP_ROUTER_ALERT:
  1554. case IP_RECVOPTS:
  1555. case IP_RETOPTS:
  1556. case IP_PKTINFO:
  1557. case IP_MTU_DISCOVER:
  1558. case IP_RECVERR:
  1559. case IP_RECVTOS:
  1560. #ifdef IP_FREEBIND
  1561. case IP_FREEBIND:
  1562. #endif
  1563. case IP_MULTICAST_TTL:
  1564. case IP_MULTICAST_LOOP:
  1565. if (get_user_u32(len, optlen))
  1566. return -TARGET_EFAULT;
  1567. if (len < 0)
  1568. return -TARGET_EINVAL;
  1569. lv = sizeof(lv);
  1570. ret = get_errno(getsockopt(sockfd, level, optname, &val, &lv));
  1571. if (ret < 0)
  1572. return ret;
  1573. if (len < sizeof(int) && len > 0 && val >= 0 && val < 255) {
  1574. len = 1;
  1575. if (put_user_u32(len, optlen)
  1576. || put_user_u8(val, optval_addr))
  1577. return -TARGET_EFAULT;
  1578. } else {
  1579. if (len > sizeof(int))
  1580. len = sizeof(int);
  1581. if (put_user_u32(len, optlen)
  1582. || put_user_u32(val, optval_addr))
  1583. return -TARGET_EFAULT;
  1584. }
  1585. break;
  1586. default:
  1587. ret = -TARGET_ENOPROTOOPT;
  1588. break;
  1589. }
  1590. break;
  1591. default:
  1592. unimplemented:
  1593. gemu_log("getsockopt level=%d optname=%d not yet supported\n",
  1594. level, optname);
  1595. ret = -TARGET_EOPNOTSUPP;
  1596. break;
  1597. }
  1598. return ret;
  1599. }
  1600. static struct iovec *lock_iovec(int type, abi_ulong target_addr,
  1601. int count, int copy)
  1602. {
  1603. struct target_iovec *target_vec;
  1604. struct iovec *vec;
  1605. abi_ulong total_len, max_len;
  1606. int i;
  1607. if (count == 0) {
  1608. errno = 0;
  1609. return NULL;
  1610. }
  1611. if (count < 0 || count > IOV_MAX) {
  1612. errno = EINVAL;
  1613. return NULL;
  1614. }
  1615. vec = calloc(count, sizeof(struct iovec));
  1616. if (vec == NULL) {
  1617. errno = ENOMEM;
  1618. return NULL;
  1619. }
  1620. target_vec = lock_user(VERIFY_READ, target_addr,
  1621. count * sizeof(struct target_iovec), 1);
  1622. if (target_vec == NULL) {
  1623. errno = EFAULT;
  1624. goto fail2;
  1625. }
  1626. /* ??? If host page size > target page size, this will result in a
  1627. value larger than what we can actually support. */
  1628. max_len = 0x7fffffff & TARGET_PAGE_MASK;
  1629. total_len = 0;
  1630. for (i = 0; i < count; i++) {
  1631. abi_ulong base = tswapal(target_vec[i].iov_base);
  1632. abi_long len = tswapal(target_vec[i].iov_len);
  1633. if (len < 0) {
  1634. errno = EINVAL;
  1635. goto fail;
  1636. } else if (len == 0) {
  1637. /* Zero length pointer is ignored. */
  1638. vec[i].iov_base = 0;
  1639. } else {
  1640. vec[i].iov_base = lock_user(type, base, len, copy);
  1641. if (!vec[i].iov_base) {
  1642. errno = EFAULT;
  1643. goto fail;
  1644. }
  1645. if (len > max_len - total_len) {
  1646. len = max_len - total_len;
  1647. }
  1648. }
  1649. vec[i].iov_len = len;
  1650. total_len += len;
  1651. }
  1652. unlock_user(target_vec, target_addr, 0);
  1653. return vec;
  1654. fail:
  1655. free(vec);
  1656. fail2:
  1657. unlock_user(target_vec, target_addr, 0);
  1658. return NULL;
  1659. }
  1660. static void unlock_iovec(struct iovec *vec, abi_ulong target_addr,
  1661. int count, int copy)
  1662. {
  1663. struct target_iovec *target_vec;
  1664. int i;
  1665. target_vec = lock_user(VERIFY_READ, target_addr,
  1666. count * sizeof(struct target_iovec), 1);
  1667. if (target_vec) {
  1668. for (i = 0; i < count; i++) {
  1669. abi_ulong base = tswapal(target_vec[i].iov_base);
  1670. abi_long len = tswapal(target_vec[i].iov_base);
  1671. if (len < 0) {
  1672. break;
  1673. }
  1674. unlock_user(vec[i].iov_base, base, copy ? vec[i].iov_len : 0);
  1675. }
  1676. unlock_user(target_vec, target_addr, 0);
  1677. }
  1678. free(vec);
  1679. }
  1680. /* do_socket() Must return target values and target errnos. */
  1681. static abi_long do_socket(int domain, int type, int protocol)
  1682. {
  1683. #if defined(TARGET_MIPS)
  1684. switch(type) {
  1685. case TARGET_SOCK_DGRAM:
  1686. type = SOCK_DGRAM;
  1687. break;
  1688. case TARGET_SOCK_STREAM:
  1689. type = SOCK_STREAM;
  1690. break;
  1691. case TARGET_SOCK_RAW:
  1692. type = SOCK_RAW;
  1693. break;
  1694. case TARGET_SOCK_RDM:
  1695. type = SOCK_RDM;
  1696. break;
  1697. case TARGET_SOCK_SEQPACKET:
  1698. type = SOCK_SEQPACKET;
  1699. break;
  1700. case TARGET_SOCK_PACKET:
  1701. type = SOCK_PACKET;
  1702. break;
  1703. }
  1704. #endif
  1705. if (domain == PF_NETLINK)
  1706. return -EAFNOSUPPORT; /* do not NETLINK socket connections possible */
  1707. return get_errno(socket(domain, type, protocol));
  1708. }
  1709. /* do_bind() Must return target values and target errnos. */
  1710. static abi_long do_bind(int sockfd, abi_ulong target_addr,
  1711. socklen_t addrlen)
  1712. {
  1713. void *addr;
  1714. abi_long ret;
  1715. if ((int)addrlen < 0) {
  1716. return -TARGET_EINVAL;
  1717. }
  1718. addr = alloca(addrlen+1);
  1719. ret = target_to_host_sockaddr(addr, target_addr, addrlen);
  1720. if (ret)
  1721. return ret;
  1722. return get_errno(bind(sockfd, addr, addrlen));
  1723. }
  1724. /* do_connect() Must return target values and target errnos. */
  1725. static abi_long do_connect(int sockfd, abi_ulong target_addr,
  1726. socklen_t addrlen)
  1727. {
  1728. void *addr;
  1729. abi_long ret;
  1730. if ((int)addrlen < 0) {
  1731. return -TARGET_EINVAL;
  1732. }
  1733. addr = alloca(addrlen);
  1734. ret = target_to_host_sockaddr(addr, target_addr, addrlen);
  1735. if (ret)
  1736. return ret;
  1737. return get_errno(connect(sockfd, addr, addrlen));
  1738. }
  1739. /* do_sendrecvmsg() Must return target values and target errnos. */
  1740. static abi_long do_sendrecvmsg(int fd, abi_ulong target_msg,
  1741. int flags, int send)
  1742. {
  1743. abi_long ret, len;
  1744. struct target_msghdr *msgp;
  1745. struct msghdr msg;
  1746. int count;
  1747. struct iovec *vec;
  1748. abi_ulong target_vec;
  1749. /* FIXME */
  1750. if (!lock_user_struct(send ? VERIFY_READ : VERIFY_WRITE,
  1751. msgp,
  1752. target_msg,
  1753. send ? 1 : 0))
  1754. return -TARGET_EFAULT;
  1755. if (msgp->msg_name) {
  1756. msg.msg_namelen = tswap32(msgp->msg_namelen);
  1757. msg.msg_name = alloca(msg.msg_namelen);
  1758. ret = target_to_host_sockaddr(msg.msg_name, tswapal(msgp->msg_name),
  1759. msg.msg_namelen);
  1760. if (ret) {
  1761. goto out2;
  1762. }
  1763. } else {
  1764. msg.msg_name = NULL;
  1765. msg.msg_namelen = 0;
  1766. }
  1767. msg.msg_controllen = 2 * tswapal(msgp->msg_controllen);
  1768. msg.msg_control = alloca(msg.msg_controllen);
  1769. msg.msg_flags = tswap32(msgp->msg_flags);
  1770. count = tswapal(msgp->msg_iovlen);
  1771. target_vec = tswapal(msgp->msg_iov);
  1772. vec = lock_iovec(send ? VERIFY_READ : VERIFY_WRITE,
  1773. target_vec, count, send);
  1774. if (vec == NULL) {
  1775. ret = -host_to_target_errno(errno);
  1776. goto out2;
  1777. }
  1778. msg.msg_iovlen = count;
  1779. msg.msg_iov = vec;
  1780. if (send) {
  1781. ret = target_to_host_cmsg(&msg, msgp);
  1782. if (ret == 0)
  1783. ret = get_errno(sendmsg(fd, &msg, flags));
  1784. } else {
  1785. ret = get_errno(recvmsg(fd, &msg, flags));
  1786. if (!is_error(ret)) {
  1787. len = ret;
  1788. ret = host_to_target_cmsg(msgp, &msg);
  1789. if (!is_error(ret)) {
  1790. msgp->msg_namelen = tswap32(msg.msg_namelen);
  1791. if (msg.msg_name != NULL) {
  1792. ret = host_to_target_sockaddr(tswapal(msgp->msg_name),
  1793. msg.msg_name, msg.msg_namelen);
  1794. if (ret) {
  1795. goto out;
  1796. }
  1797. }
  1798. ret = len;
  1799. }
  1800. }
  1801. }
  1802. out:
  1803. unlock_iovec(vec, target_vec, count, !send);
  1804. out2:
  1805. unlock_user_struct(msgp, target_msg, send ? 0 : 1);
  1806. return ret;
  1807. }
  1808. /* do_accept() Must return target values and target errnos. */
  1809. static abi_long do_accept(int fd, abi_ulong target_addr,
  1810. abi_ulong target_addrlen_addr)
  1811. {
  1812. socklen_t addrlen;
  1813. void *addr;
  1814. abi_long ret;
  1815. if (target_addr == 0)
  1816. return get_errno(accept(fd, NULL, NULL));
  1817. /* linux returns EINVAL if addrlen pointer is invalid */
  1818. if (get_user_u32(addrlen, target_addrlen_addr))
  1819. return -TARGET_EINVAL;
  1820. if ((int)addrlen < 0) {
  1821. return -TARGET_EINVAL;
  1822. }
  1823. if (!access_ok(VERIFY_WRITE, target_addr, addrlen))
  1824. return -TARGET_EINVAL;
  1825. addr = alloca(addrlen);
  1826. ret = get_errno(accept(fd, addr, &addrlen));
  1827. if (!is_error(ret)) {
  1828. host_to_target_sockaddr(target_addr, addr, addrlen);
  1829. if (put_user_u32(addrlen, target_addrlen_addr))
  1830. ret = -TARGET_EFAULT;
  1831. }
  1832. return ret;
  1833. }
  1834. /* do_getpeername() Must return target values and target errnos. */
  1835. static abi_long do_getpeername(int fd, abi_ulong target_addr,
  1836. abi_ulong target_addrlen_addr)
  1837. {
  1838. socklen_t addrlen;
  1839. void *addr;
  1840. abi_long ret;
  1841. if (get_user_u32(addrlen, target_addrlen_addr))
  1842. return -TARGET_EFAULT;
  1843. if ((int)addrlen < 0) {
  1844. return -TARGET_EINVAL;
  1845. }
  1846. if (!access_ok(VERIFY_WRITE, target_addr, addrlen))
  1847. return -TARGET_EFAULT;
  1848. addr = alloca(addrlen);
  1849. ret = get_errno(getpeername(fd, addr, &addrlen));
  1850. if (!is_error(ret)) {
  1851. host_to_target_sockaddr(target_addr, addr, addrlen);
  1852. if (put_user_u32(addrlen, target_addrlen_addr))
  1853. ret = -TARGET_EFAULT;
  1854. }
  1855. return ret;
  1856. }
  1857. /* do_getsockname() Must return target values and target errnos. */
  1858. static abi_long do_getsockname(int fd, abi_ulong target_addr,
  1859. abi_ulong target_addrlen_addr)
  1860. {
  1861. socklen_t addrlen;
  1862. void *addr;
  1863. abi_long ret;
  1864. if (get_user_u32(addrlen, target_addrlen_addr))
  1865. return -TARGET_EFAULT;
  1866. if ((int)addrlen < 0) {
  1867. return -TARGET_EINVAL;
  1868. }
  1869. if (!access_ok(VERIFY_WRITE, target_addr, addrlen))
  1870. return -TARGET_EFAULT;
  1871. addr = alloca(addrlen);
  1872. ret = get_errno(getsockname(fd, addr, &addrlen));
  1873. if (!is_error(ret)) {
  1874. host_to_target_sockaddr(target_addr, addr, addrlen);
  1875. if (put_user_u32(addrlen, target_addrlen_addr))
  1876. ret = -TARGET_EFAULT;
  1877. }
  1878. return ret;
  1879. }
  1880. /* do_socketpair() Must return target values and target errnos. */
  1881. static abi_long do_socketpair(int domain, int type, int protocol,
  1882. abi_ulong target_tab_addr)
  1883. {
  1884. int tab[2];
  1885. abi_long ret;
  1886. ret = get_errno(socketpair(domain, type, protocol, tab));
  1887. if (!is_error(ret)) {
  1888. if (put_user_s32(tab[0], target_tab_addr)
  1889. || put_user_s32(tab[1], target_tab_addr + sizeof(tab[0])))
  1890. ret = -TARGET_EFAULT;
  1891. }
  1892. return ret;
  1893. }
  1894. /* do_sendto() Must return target values and target errnos. */
  1895. static abi_long do_sendto(int fd, abi_ulong msg, size_t len, int flags,
  1896. abi_ulong target_addr, socklen_t addrlen)
  1897. {
  1898. void *addr;
  1899. void *host_msg;
  1900. abi_long ret;
  1901. if ((int)addrlen < 0) {
  1902. return -TARGET_EINVAL;
  1903. }
  1904. host_msg = lock_user(VERIFY_READ, msg, len, 1);
  1905. if (!host_msg)
  1906. return -TARGET_EFAULT;
  1907. if (target_addr) {
  1908. addr = alloca(addrlen);
  1909. ret = target_to_host_sockaddr(addr, target_addr, addrlen);
  1910. if (ret) {
  1911. unlock_user(host_msg, msg, 0);
  1912. return ret;
  1913. }
  1914. ret = get_errno(sendto(fd, host_msg, len, flags, addr, addrlen));
  1915. } else {
  1916. ret = get_errno(send(fd, host_msg, len, flags));
  1917. }
  1918. unlock_user(host_msg, msg, 0);
  1919. return ret;
  1920. }
  1921. /* do_recvfrom() Must return target values and target errnos. */
  1922. static abi_long do_recvfrom(int fd, abi_ulong msg, size_t len, int flags,
  1923. abi_ulong target_addr,
  1924. abi_ulong target_addrlen)
  1925. {
  1926. socklen_t addrlen;
  1927. void *addr;
  1928. void *host_msg;
  1929. abi_long ret;
  1930. host_msg = lock_user(VERIFY_WRITE, msg, len, 0);
  1931. if (!host_msg)
  1932. return -TARGET_EFAULT;
  1933. if (target_addr) {
  1934. if (get_user_u32(addrlen, target_addrlen)) {
  1935. ret = -TARGET_EFAULT;
  1936. goto fail;
  1937. }
  1938. if ((int)addrlen < 0) {
  1939. ret = -TARGET_EINVAL;
  1940. goto fail;
  1941. }
  1942. addr = alloca(addrlen);
  1943. ret = get_errno(recvfrom(fd, host_msg, len, flags, addr, &addrlen));
  1944. } else {
  1945. addr = NULL; /* To keep compiler quiet. */
  1946. ret = get_errno(qemu_recv(fd, host_msg, len, flags));
  1947. }
  1948. if (!is_error(ret)) {
  1949. if (target_addr) {
  1950. host_to_target_sockaddr(target_addr, addr, addrlen);
  1951. if (put_user_u32(addrlen, target_addrlen)) {
  1952. ret = -TARGET_EFAULT;
  1953. goto fail;
  1954. }
  1955. }
  1956. unlock_user(host_msg, msg, len);
  1957. } else {
  1958. fail:
  1959. unlock_user(host_msg, msg, 0);
  1960. }
  1961. return ret;
  1962. }
  1963. #ifdef TARGET_NR_socketcall
  1964. /* do_socketcall() Must return target values and target errnos. */
  1965. static abi_long do_socketcall(int num, abi_ulong vptr)
  1966. {
  1967. abi_long ret;
  1968. const int n = sizeof(abi_ulong);
  1969. switch(num) {
  1970. case SOCKOP_socket:
  1971. {
  1972. abi_ulong domain, type, protocol;
  1973. if (get_user_ual(domain, vptr)
  1974. || get_user_ual(type, vptr + n)
  1975. || get_user_ual(protocol, vptr + 2 * n))
  1976. return -TARGET_EFAULT;
  1977. ret = do_socket(domain, type, protocol);
  1978. }
  1979. break;
  1980. case SOCKOP_bind:
  1981. {
  1982. abi_ulong sockfd;
  1983. abi_ulong target_addr;
  1984. socklen_t addrlen;
  1985. if (get_user_ual(sockfd, vptr)
  1986. || get_user_ual(target_addr, vptr + n)
  1987. || get_user_ual(addrlen, vptr + 2 * n))
  1988. return -TARGET_EFAULT;
  1989. ret = do_bind(sockfd, target_addr, addrlen);
  1990. }
  1991. break;
  1992. case SOCKOP_connect:
  1993. {
  1994. abi_ulong sockfd;
  1995. abi_ulong target_addr;
  1996. socklen_t addrlen;
  1997. if (get_user_ual(sockfd, vptr)
  1998. || get_user_ual(target_addr, vptr + n)
  1999. || get_user_ual(addrlen, vptr + 2 * n))
  2000. return -TARGET_EFAULT;
  2001. ret = do_connect(sockfd, target_addr, addrlen);
  2002. }
  2003. break;
  2004. case SOCKOP_listen:
  2005. {
  2006. abi_ulong sockfd, backlog;
  2007. if (get_user_ual(sockfd, vptr)
  2008. || get_user_ual(backlog, vptr + n))
  2009. return -TARGET_EFAULT;
  2010. ret = get_errno(listen(sockfd, backlog));
  2011. }
  2012. break;
  2013. case SOCKOP_accept:
  2014. {
  2015. abi_ulong sockfd;
  2016. abi_ulong target_addr, target_addrlen;
  2017. if (get_user_ual(sockfd, vptr)
  2018. || get_user_ual(target_addr, vptr + n)
  2019. || get_user_ual(target_addrlen, vptr + 2 * n))
  2020. return -TARGET_EFAULT;
  2021. ret = do_accept(sockfd, target_addr, target_addrlen);
  2022. }
  2023. break;
  2024. case SOCKOP_getsockname:
  2025. {
  2026. abi_ulong sockfd;
  2027. abi_ulong target_addr, target_addrlen;
  2028. if (get_user_ual(sockfd, vptr)
  2029. || get_user_ual(target_addr, vptr + n)
  2030. || get_user_ual(target_addrlen, vptr + 2 * n))
  2031. return -TARGET_EFAULT;
  2032. ret = do_getsockname(sockfd, target_addr, target_addrlen);
  2033. }
  2034. break;
  2035. case SOCKOP_getpeername:
  2036. {
  2037. abi_ulong sockfd;
  2038. abi_ulong target_addr, target_addrlen;
  2039. if (get_user_ual(sockfd, vptr)
  2040. || get_user_ual(target_addr, vptr + n)
  2041. || get_user_ual(target_addrlen, vptr + 2 * n))
  2042. return -TARGET_EFAULT;
  2043. ret = do_getpeername(sockfd, target_addr, target_addrlen);
  2044. }
  2045. break;
  2046. case SOCKOP_socketpair:
  2047. {
  2048. abi_ulong domain, type, protocol;
  2049. abi_ulong tab;
  2050. if (get_user_ual(domain, vptr)
  2051. || get_user_ual(type, vptr + n)
  2052. || get_user_ual(protocol, vptr + 2 * n)
  2053. || get_user_ual(tab, vptr + 3 * n))
  2054. return -TARGET_EFAULT;
  2055. ret = do_socketpair(domain, type, protocol, tab);
  2056. }
  2057. break;
  2058. case SOCKOP_send:
  2059. {
  2060. abi_ulong sockfd;
  2061. abi_ulong msg;
  2062. size_t len;
  2063. abi_ulong flags;
  2064. if (get_user_ual(sockfd, vptr)
  2065. || get_user_ual(msg, vptr + n)
  2066. || get_user_ual(len, vptr + 2 * n)
  2067. || get_user_ual(flags, vptr + 3 * n))
  2068. return -TARGET_EFAULT;
  2069. ret = do_sendto(sockfd, msg, len, flags, 0, 0);
  2070. }
  2071. break;
  2072. case SOCKOP_recv:
  2073. {
  2074. abi_ulong sockfd;
  2075. abi_ulong msg;
  2076. size_t len;
  2077. abi_ulong flags;
  2078. if (get_user_ual(sockfd, vptr)
  2079. || get_user_ual(msg, vptr + n)
  2080. || get_user_ual(len, vptr + 2 * n)
  2081. || get_user_ual(flags, vptr + 3 * n))
  2082. return -TARGET_EFAULT;
  2083. ret = do_recvfrom(sockfd, msg, len, flags, 0, 0);
  2084. }
  2085. break;
  2086. case SOCKOP_sendto:
  2087. {
  2088. abi_ulong sockfd;
  2089. abi_ulong msg;
  2090. size_t len;
  2091. abi_ulong flags;
  2092. abi_ulong addr;
  2093. socklen_t addrlen;
  2094. if (get_user_ual(sockfd, vptr)
  2095. || get_user_ual(msg, vptr + n)
  2096. || get_user_ual(len, vptr + 2 * n)
  2097. || get_user_ual(flags, vptr + 3 * n)
  2098. || get_user_ual(addr, vptr + 4 * n)
  2099. || get_user_ual(addrlen, vptr + 5 * n))
  2100. return -TARGET_EFAULT;
  2101. ret = do_sendto(sockfd, msg, len, flags, addr, addrlen);
  2102. }
  2103. break;
  2104. case SOCKOP_recvfrom:
  2105. {
  2106. abi_ulong sockfd;
  2107. abi_ulong msg;
  2108. size_t len;
  2109. abi_ulong flags;
  2110. abi_ulong addr;
  2111. socklen_t addrlen;
  2112. if (get_user_ual(sockfd, vptr)
  2113. || get_user_ual(msg, vptr + n)
  2114. || get_user_ual(len, vptr + 2 * n)
  2115. || get_user_ual(flags, vptr + 3 * n)
  2116. || get_user_ual(addr, vptr + 4 * n)
  2117. || get_user_ual(addrlen, vptr + 5 * n))
  2118. return -TARGET_EFAULT;
  2119. ret = do_recvfrom(sockfd, msg, len, flags, addr, addrlen);
  2120. }
  2121. break;
  2122. case SOCKOP_shutdown:
  2123. {
  2124. abi_ulong sockfd, how;
  2125. if (get_user_ual(sockfd, vptr)
  2126. || get_user_ual(how, vptr + n))
  2127. return -TARGET_EFAULT;
  2128. ret = get_errno(shutdown(sockfd, how));
  2129. }
  2130. break;
  2131. case SOCKOP_sendmsg:
  2132. case SOCKOP_recvmsg:
  2133. {
  2134. abi_ulong fd;
  2135. abi_ulong target_msg;
  2136. abi_ulong flags;
  2137. if (get_user_ual(fd, vptr)
  2138. || get_user_ual(target_msg, vptr + n)
  2139. || get_user_ual(flags, vptr + 2 * n))
  2140. return -TARGET_EFAULT;
  2141. ret = do_sendrecvmsg(fd, target_msg, flags,
  2142. (num == SOCKOP_sendmsg));
  2143. }
  2144. break;
  2145. case SOCKOP_setsockopt:
  2146. {
  2147. abi_ulong sockfd;
  2148. abi_ulong level;
  2149. abi_ulong optname;
  2150. abi_ulong optval;
  2151. socklen_t optlen;
  2152. if (get_user_ual(sockfd, vptr)
  2153. || get_user_ual(level, vptr + n)
  2154. || get_user_ual(optname, vptr + 2 * n)
  2155. || get_user_ual(optval, vptr + 3 * n)
  2156. || get_user_ual(optlen, vptr + 4 * n))
  2157. return -TARGET_EFAULT;
  2158. ret = do_setsockopt(sockfd, level, optname, optval, optlen);
  2159. }
  2160. break;
  2161. case SOCKOP_getsockopt:
  2162. {
  2163. abi_ulong sockfd;
  2164. abi_ulong level;
  2165. abi_ulong optname;
  2166. abi_ulong optval;
  2167. socklen_t optlen;
  2168. if (get_user_ual(sockfd, vptr)
  2169. || get_user_ual(level, vptr + n)
  2170. || get_user_ual(optname, vptr + 2 * n)
  2171. || get_user_ual(optval, vptr + 3 * n)
  2172. || get_user_ual(optlen, vptr + 4 * n))
  2173. return -TARGET_EFAULT;
  2174. ret = do_getsockopt(sockfd, level, optname, optval, optlen);
  2175. }
  2176. break;
  2177. default:
  2178. gemu_log("Unsupported socketcall: %d\n", num);
  2179. ret = -TARGET_ENOSYS;
  2180. break;
  2181. }
  2182. return ret;
  2183. }
  2184. #endif
  2185. #define N_SHM_REGIONS 32
  2186. static struct shm_region {
  2187. abi_ulong start;
  2188. abi_ulong size;
  2189. } shm_regions[N_SHM_REGIONS];
  2190. struct target_ipc_perm
  2191. {
  2192. abi_long __key;
  2193. abi_ulong uid;
  2194. abi_ulong gid;
  2195. abi_ulong cuid;
  2196. abi_ulong cgid;
  2197. unsigned short int mode;
  2198. unsigned short int __pad1;
  2199. unsigned short int __seq;
  2200. unsigned short int __pad2;
  2201. abi_ulong __unused1;
  2202. abi_ulong __unused2;
  2203. };
  2204. struct target_semid_ds
  2205. {
  2206. struct target_ipc_perm sem_perm;
  2207. abi_ulong sem_otime;
  2208. abi_ulong __unused1;
  2209. abi_ulong sem_ctime;
  2210. abi_ulong __unused2;
  2211. abi_ulong sem_nsems;
  2212. abi_ulong __unused3;
  2213. abi_ulong __unused4;
  2214. };
  2215. static inline abi_long target_to_host_ipc_perm(struct ipc_perm *host_ip,
  2216. abi_ulong target_addr)
  2217. {
  2218. struct target_ipc_perm *target_ip;
  2219. struct target_semid_ds *target_sd;
  2220. if (!lock_user_struct(VERIFY_READ, target_sd, target_addr, 1))
  2221. return -TARGET_EFAULT;
  2222. target_ip = &(target_sd->sem_perm);
  2223. host_ip->__key = tswapal(target_ip->__key);
  2224. host_ip->uid = tswapal(target_ip->uid);
  2225. host_ip->gid = tswapal(target_ip->gid);
  2226. host_ip->cuid = tswapal(target_ip->cuid);
  2227. host_ip->cgid = tswapal(target_ip->cgid);
  2228. host_ip->mode = tswap16(target_ip->mode);
  2229. unlock_user_struct(target_sd, target_addr, 0);
  2230. return 0;
  2231. }
  2232. static inline abi_long host_to_target_ipc_perm(abi_ulong target_addr,
  2233. struct ipc_perm *host_ip)
  2234. {
  2235. struct target_ipc_perm *target_ip;
  2236. struct target_semid_ds *target_sd;
  2237. if (!lock_user_struct(VERIFY_WRITE, target_sd, target_addr, 0))
  2238. return -TARGET_EFAULT;
  2239. target_ip = &(target_sd->sem_perm);
  2240. target_ip->__key = tswapal(host_ip->__key);
  2241. target_ip->uid = tswapal(host_ip->uid);
  2242. target_ip->gid = tswapal(host_ip->gid);
  2243. target_ip->cuid = tswapal(host_ip->cuid);
  2244. target_ip->cgid = tswapal(host_ip->cgid);
  2245. target_ip->mode = tswap16(host_ip->mode);
  2246. unlock_user_struct(target_sd, target_addr, 1);
  2247. return 0;
  2248. }
  2249. static inline abi_long target_to_host_semid_ds(struct semid_ds *host_sd,
  2250. abi_ulong target_addr)
  2251. {
  2252. struct target_semid_ds *target_sd;
  2253. if (!lock_user_struct(VERIFY_READ, target_sd, target_addr, 1))
  2254. return -TARGET_EFAULT;
  2255. if (target_to_host_ipc_perm(&(host_sd->sem_perm),target_addr))
  2256. return -TARGET_EFAULT;
  2257. host_sd->sem_nsems = tswapal(target_sd->sem_nsems);
  2258. host_sd->sem_otime = tswapal(target_sd->sem_otime);
  2259. host_sd->sem_ctime = tswapal(target_sd->sem_ctime);
  2260. unlock_user_struct(target_sd, target_addr, 0);
  2261. return 0;
  2262. }
  2263. static inline abi_long host_to_target_semid_ds(abi_ulong target_addr,
  2264. struct semid_ds *host_sd)
  2265. {
  2266. struct target_semid_ds *target_sd;
  2267. if (!lock_user_struct(VERIFY_WRITE, target_sd, target_addr, 0))
  2268. return -TARGET_EFAULT;
  2269. if (host_to_target_ipc_perm(target_addr,&(host_sd->sem_perm)))
  2270. return -TARGET_EFAULT;
  2271. target_sd->sem_nsems = tswapal(host_sd->sem_nsems);
  2272. target_sd->sem_otime = tswapal(host_sd->sem_otime);
  2273. target_sd->sem_ctime = tswapal(host_sd->sem_ctime);
  2274. unlock_user_struct(target_sd, target_addr, 1);
  2275. return 0;
  2276. }
  2277. struct target_seminfo {
  2278. int semmap;
  2279. int semmni;
  2280. int semmns;
  2281. int semmnu;
  2282. int semmsl;
  2283. int semopm;
  2284. int semume;
  2285. int semusz;
  2286. int semvmx;
  2287. int semaem;
  2288. };
  2289. static inline abi_long host_to_target_seminfo(abi_ulong target_addr,
  2290. struct seminfo *host_seminfo)
  2291. {
  2292. struct target_seminfo *target_seminfo;
  2293. if (!lock_user_struct(VERIFY_WRITE, target_seminfo, target_addr, 0))
  2294. return -TARGET_EFAULT;
  2295. __put_user(host_seminfo->semmap, &target_seminfo->semmap);
  2296. __put_user(host_seminfo->semmni, &target_seminfo->semmni);
  2297. __put_user(host_seminfo->semmns, &target_seminfo->semmns);
  2298. __put_user(host_seminfo->semmnu, &target_seminfo->semmnu);
  2299. __put_user(host_seminfo->semmsl, &target_seminfo->semmsl);
  2300. __put_user(host_seminfo->semopm, &target_seminfo->semopm);
  2301. __put_user(host_seminfo->semume, &target_seminfo->semume);
  2302. __put_user(host_seminfo->semusz, &target_seminfo->semusz);
  2303. __put_user(host_seminfo->semvmx, &target_seminfo->semvmx);
  2304. __put_user(host_seminfo->semaem, &target_seminfo->semaem);
  2305. unlock_user_struct(target_seminfo, target_addr, 1);
  2306. return 0;
  2307. }
  2308. union semun {
  2309. int val;
  2310. struct semid_ds *buf;
  2311. unsigned short *array;
  2312. struct seminfo *__buf;
  2313. };
  2314. union target_semun {
  2315. int val;
  2316. abi_ulong buf;
  2317. abi_ulong array;
  2318. abi_ulong __buf;
  2319. };
  2320. static inline abi_long target_to_host_semarray(int semid, unsigned short **host_array,
  2321. abi_ulong target_addr)
  2322. {
  2323. int nsems;
  2324. unsigned short *array;
  2325. union semun semun;
  2326. struct semid_ds semid_ds;
  2327. int i, ret;
  2328. semun.buf = &semid_ds;
  2329. ret = semctl(semid, 0, IPC_STAT, semun);
  2330. if (ret == -1)
  2331. return get_errno(ret);
  2332. nsems = semid_ds.sem_nsems;
  2333. *host_array = malloc(nsems*sizeof(unsigned short));
  2334. array = lock_user(VERIFY_READ, target_addr,
  2335. nsems*sizeof(unsigned short), 1);
  2336. if (!array)
  2337. return -TARGET_EFAULT;
  2338. for(i=0; i<nsems; i++) {
  2339. __get_user((*host_array)[i], &array[i]);
  2340. }
  2341. unlock_user(array, target_addr, 0);
  2342. return 0;
  2343. }
  2344. static inline abi_long host_to_target_semarray(int semid, abi_ulong target_addr,
  2345. unsigned short **host_array)
  2346. {
  2347. int nsems;
  2348. unsigned short *array;
  2349. union semun semun;
  2350. struct semid_ds semid_ds;
  2351. int i, ret;
  2352. semun.buf = &semid_ds;
  2353. ret = semctl(semid, 0, IPC_STAT, semun);
  2354. if (ret == -1)
  2355. return get_errno(ret);
  2356. nsems = semid_ds.sem_nsems;
  2357. array = lock_user(VERIFY_WRITE, target_addr,
  2358. nsems*sizeof(unsigned short), 0);
  2359. if (!array)
  2360. return -TARGET_EFAULT;
  2361. for(i=0; i<nsems; i++) {
  2362. __put_user((*host_array)[i], &array[i]);
  2363. }
  2364. free(*host_array);
  2365. unlock_user(array, target_addr, 1);
  2366. return 0;
  2367. }
  2368. static inline abi_long do_semctl(int semid, int semnum, int cmd,
  2369. union target_semun target_su)
  2370. {
  2371. union semun arg;
  2372. struct semid_ds dsarg;
  2373. unsigned short *array = NULL;
  2374. struct seminfo seminfo;
  2375. abi_long ret = -TARGET_EINVAL;
  2376. abi_long err;
  2377. cmd &= 0xff;
  2378. switch( cmd ) {
  2379. case GETVAL:
  2380. case SETVAL:
  2381. arg.val = tswap32(target_su.val);
  2382. ret = get_errno(semctl(semid, semnum, cmd, arg));
  2383. target_su.val = tswap32(arg.val);
  2384. break;
  2385. case GETALL:
  2386. case SETALL:
  2387. err = target_to_host_semarray(semid, &array, target_su.array);
  2388. if (err)
  2389. return err;
  2390. arg.array = array;
  2391. ret = get_errno(semctl(semid, semnum, cmd, arg));
  2392. err = host_to_target_semarray(semid, target_su.array, &array);
  2393. if (err)
  2394. return err;
  2395. break;
  2396. case IPC_STAT:
  2397. case IPC_SET:
  2398. case SEM_STAT:
  2399. err = target_to_host_semid_ds(&dsarg, target_su.buf);
  2400. if (err)
  2401. return err;
  2402. arg.buf = &dsarg;
  2403. ret = get_errno(semctl(semid, semnum, cmd, arg));
  2404. err = host_to_target_semid_ds(target_su.buf, &dsarg);
  2405. if (err)
  2406. return err;
  2407. break;
  2408. case IPC_INFO:
  2409. case SEM_INFO:
  2410. arg.__buf = &seminfo;
  2411. ret = get_errno(semctl(semid, semnum, cmd, arg));
  2412. err = host_to_target_seminfo(target_su.__buf, &seminfo);
  2413. if (err)
  2414. return err;
  2415. break;
  2416. case IPC_RMID:
  2417. case GETPID:
  2418. case GETNCNT:
  2419. case GETZCNT:
  2420. ret = get_errno(semctl(semid, semnum, cmd, NULL));
  2421. break;
  2422. }
  2423. return ret;
  2424. }
  2425. struct target_sembuf {
  2426. unsigned short sem_num;
  2427. short sem_op;
  2428. short sem_flg;
  2429. };
  2430. static inline abi_long target_to_host_sembuf(struct sembuf *host_sembuf,
  2431. abi_ulong target_addr,
  2432. unsigned nsops)
  2433. {
  2434. struct target_sembuf *target_sembuf;
  2435. int i;
  2436. target_sembuf = lock_user(VERIFY_READ, target_addr,
  2437. nsops*sizeof(struct target_sembuf), 1);
  2438. if (!target_sembuf)
  2439. return -TARGET_EFAULT;
  2440. for(i=0; i<nsops; i++) {
  2441. __get_user(host_sembuf[i].sem_num, &target_sembuf[i].sem_num);
  2442. __get_user(host_sembuf[i].sem_op, &target_sembuf[i].sem_op);
  2443. __get_user(host_sembuf[i].sem_flg, &target_sembuf[i].sem_flg);
  2444. }
  2445. unlock_user(target_sembuf, target_addr, 0);
  2446. return 0;
  2447. }
  2448. static inline abi_long do_semop(int semid, abi_long ptr, unsigned nsops)
  2449. {
  2450. struct sembuf sops[nsops];
  2451. if (target_to_host_sembuf(sops, ptr, nsops))
  2452. return -TARGET_EFAULT;
  2453. return semop(semid, sops, nsops);
  2454. }
  2455. struct target_msqid_ds
  2456. {
  2457. struct target_ipc_perm msg_perm;
  2458. abi_ulong msg_stime;
  2459. #if TARGET_ABI_BITS == 32
  2460. abi_ulong __unused1;
  2461. #endif
  2462. abi_ulong msg_rtime;
  2463. #if TARGET_ABI_BITS == 32
  2464. abi_ulong __unused2;
  2465. #endif
  2466. abi_ulong msg_ctime;
  2467. #if TARGET_ABI_BITS == 32
  2468. abi_ulong __unused3;
  2469. #endif
  2470. abi_ulong __msg_cbytes;
  2471. abi_ulong msg_qnum;
  2472. abi_ulong msg_qbytes;
  2473. abi_ulong msg_lspid;
  2474. abi_ulong msg_lrpid;
  2475. abi_ulong __unused4;
  2476. abi_ulong __unused5;
  2477. };
  2478. static inline abi_long target_to_host_msqid_ds(struct msqid_ds *host_md,
  2479. abi_ulong target_addr)
  2480. {
  2481. struct target_msqid_ds *target_md;
  2482. if (!lock_user_struct(VERIFY_READ, target_md, target_addr, 1))
  2483. return -TARGET_EFAULT;
  2484. if (target_to_host_ipc_perm(&(host_md->msg_perm),target_addr))
  2485. return -TARGET_EFAULT;
  2486. host_md->msg_stime = tswapal(target_md->msg_stime);
  2487. host_md->msg_rtime = tswapal(target_md->msg_rtime);
  2488. host_md->msg_ctime = tswapal(target_md->msg_ctime);
  2489. host_md->__msg_cbytes = tswapal(target_md->__msg_cbytes);
  2490. host_md->msg_qnum = tswapal(target_md->msg_qnum);
  2491. host_md->msg_qbytes = tswapal(target_md->msg_qbytes);
  2492. host_md->msg_lspid = tswapal(target_md->msg_lspid);
  2493. host_md->msg_lrpid = tswapal(target_md->msg_lrpid);
  2494. unlock_user_struct(target_md, target_addr, 0);
  2495. return 0;
  2496. }
  2497. static inline abi_long host_to_target_msqid_ds(abi_ulong target_addr,
  2498. struct msqid_ds *host_md)
  2499. {
  2500. struct target_msqid_ds *target_md;
  2501. if (!lock_user_struct(VERIFY_WRITE, target_md, target_addr, 0))
  2502. return -TARGET_EFAULT;
  2503. if (host_to_target_ipc_perm(target_addr,&(host_md->msg_perm)))
  2504. return -TARGET_EFAULT;
  2505. target_md->msg_stime = tswapal(host_md->msg_stime);
  2506. target_md->msg_rtime = tswapal(host_md->msg_rtime);
  2507. target_md->msg_ctime = tswapal(host_md->msg_ctime);
  2508. target_md->__msg_cbytes = tswapal(host_md->__msg_cbytes);
  2509. target_md->msg_qnum = tswapal(host_md->msg_qnum);
  2510. target_md->msg_qbytes = tswapal(host_md->msg_qbytes);
  2511. target_md->msg_lspid = tswapal(host_md->msg_lspid);
  2512. target_md->msg_lrpid = tswapal(host_md->msg_lrpid);
  2513. unlock_user_struct(target_md, target_addr, 1);
  2514. return 0;
  2515. }
  2516. struct target_msginfo {
  2517. int msgpool;
  2518. int msgmap;
  2519. int msgmax;
  2520. int msgmnb;
  2521. int msgmni;
  2522. int msgssz;
  2523. int msgtql;
  2524. unsigned short int msgseg;
  2525. };
  2526. static inline abi_long host_to_target_msginfo(abi_ulong target_addr,
  2527. struct msginfo *host_msginfo)
  2528. {
  2529. struct target_msginfo *target_msginfo;
  2530. if (!lock_user_struct(VERIFY_WRITE, target_msginfo, target_addr, 0))
  2531. return -TARGET_EFAULT;
  2532. __put_user(host_msginfo->msgpool, &target_msginfo->msgpool);
  2533. __put_user(host_msginfo->msgmap, &target_msginfo->msgmap);
  2534. __put_user(host_msginfo->msgmax, &target_msginfo->msgmax);
  2535. __put_user(host_msginfo->msgmnb, &target_msginfo->msgmnb);
  2536. __put_user(host_msginfo->msgmni, &target_msginfo->msgmni);
  2537. __put_user(host_msginfo->msgssz, &target_msginfo->msgssz);
  2538. __put_user(host_msginfo->msgtql, &target_msginfo->msgtql);
  2539. __put_user(host_msginfo->msgseg, &target_msginfo->msgseg);
  2540. unlock_user_struct(target_msginfo, target_addr, 1);
  2541. return 0;
  2542. }
  2543. static inline abi_long do_msgctl(int msgid, int cmd, abi_long ptr)
  2544. {
  2545. struct msqid_ds dsarg;
  2546. struct msginfo msginfo;
  2547. abi_long ret = -TARGET_EINVAL;
  2548. cmd &= 0xff;
  2549. switch (cmd) {
  2550. case IPC_STAT:
  2551. case IPC_SET:
  2552. case MSG_STAT:
  2553. if (target_to_host_msqid_ds(&dsarg,ptr))
  2554. return -TARGET_EFAULT;
  2555. ret = get_errno(msgctl(msgid, cmd, &dsarg));
  2556. if (host_to_target_msqid_ds(ptr,&dsarg))
  2557. return -TARGET_EFAULT;
  2558. break;
  2559. case IPC_RMID:
  2560. ret = get_errno(msgctl(msgid, cmd, NULL));
  2561. break;
  2562. case IPC_INFO:
  2563. case MSG_INFO:
  2564. ret = get_errno(msgctl(msgid, cmd, (struct msqid_ds *)&msginfo));
  2565. if (host_to_target_msginfo(ptr, &msginfo))
  2566. return -TARGET_EFAULT;
  2567. break;
  2568. }
  2569. return ret;
  2570. }
  2571. struct target_msgbuf {
  2572. abi_long mtype;
  2573. char mtext[1];
  2574. };
  2575. static inline abi_long do_msgsnd(int msqid, abi_long msgp,
  2576. unsigned int msgsz, int msgflg)
  2577. {
  2578. struct target_msgbuf *target_mb;
  2579. struct msgbuf *host_mb;
  2580. abi_long ret = 0;
  2581. if (!lock_user_struct(VERIFY_READ, target_mb, msgp, 0))
  2582. return -TARGET_EFAULT;
  2583. host_mb = malloc(msgsz+sizeof(long));
  2584. host_mb->mtype = (abi_long) tswapal(target_mb->mtype);
  2585. memcpy(host_mb->mtext, target_mb->mtext, msgsz);
  2586. ret = get_errno(msgsnd(msqid, host_mb, msgsz, msgflg));
  2587. free(host_mb);
  2588. unlock_user_struct(target_mb, msgp, 0);
  2589. return ret;
  2590. }
  2591. static inline abi_long do_msgrcv(int msqid, abi_long msgp,
  2592. unsigned int msgsz, abi_long msgtyp,
  2593. int msgflg)
  2594. {
  2595. struct target_msgbuf *target_mb;
  2596. char *target_mtext;
  2597. struct msgbuf *host_mb;
  2598. abi_long ret = 0;
  2599. if (!lock_user_struct(VERIFY_WRITE, target_mb, msgp, 0))
  2600. return -TARGET_EFAULT;
  2601. host_mb = g_malloc(msgsz+sizeof(long));
  2602. ret = get_errno(msgrcv(msqid, host_mb, msgsz, msgtyp, msgflg));
  2603. if (ret > 0) {
  2604. abi_ulong target_mtext_addr = msgp + sizeof(abi_ulong);
  2605. target_mtext = lock_user(VERIFY_WRITE, target_mtext_addr, ret, 0);
  2606. if (!target_mtext) {
  2607. ret = -TARGET_EFAULT;
  2608. goto end;
  2609. }
  2610. memcpy(target_mb->mtext, host_mb->mtext, ret);
  2611. unlock_user(target_mtext, target_mtext_addr, ret);
  2612. }
  2613. target_mb->mtype = tswapal(host_mb->mtype);
  2614. end:
  2615. if (target_mb)
  2616. unlock_user_struct(target_mb, msgp, 1);
  2617. g_free(host_mb);
  2618. return ret;
  2619. }
  2620. struct target_shmid_ds
  2621. {
  2622. struct target_ipc_perm shm_perm;
  2623. abi_ulong shm_segsz;
  2624. abi_ulong shm_atime;
  2625. #if TARGET_ABI_BITS == 32
  2626. abi_ulong __unused1;
  2627. #endif
  2628. abi_ulong shm_dtime;
  2629. #if TARGET_ABI_BITS == 32
  2630. abi_ulong __unused2;
  2631. #endif
  2632. abi_ulong shm_ctime;
  2633. #if TARGET_ABI_BITS == 32
  2634. abi_ulong __unused3;
  2635. #endif
  2636. int shm_cpid;
  2637. int shm_lpid;
  2638. abi_ulong shm_nattch;
  2639. unsigned long int __unused4;
  2640. unsigned long int __unused5;
  2641. };
  2642. static inline abi_long target_to_host_shmid_ds(struct shmid_ds *host_sd,
  2643. abi_ulong target_addr)
  2644. {
  2645. struct target_shmid_ds *target_sd;
  2646. if (!lock_user_struct(VERIFY_READ, target_sd, target_addr, 1))
  2647. return -TARGET_EFAULT;
  2648. if (target_to_host_ipc_perm(&(host_sd->shm_perm), target_addr))
  2649. return -TARGET_EFAULT;
  2650. __get_user(host_sd->shm_segsz, &target_sd->shm_segsz);
  2651. __get_user(host_sd->shm_atime, &target_sd->shm_atime);
  2652. __get_user(host_sd->shm_dtime, &target_sd->shm_dtime);
  2653. __get_user(host_sd->shm_ctime, &target_sd->shm_ctime);
  2654. __get_user(host_sd->shm_cpid, &target_sd->shm_cpid);
  2655. __get_user(host_sd->shm_lpid, &target_sd->shm_lpid);
  2656. __get_user(host_sd->shm_nattch, &target_sd->shm_nattch);
  2657. unlock_user_struct(target_sd, target_addr, 0);
  2658. return 0;
  2659. }
  2660. static inline abi_long host_to_target_shmid_ds(abi_ulong target_addr,
  2661. struct shmid_ds *host_sd)
  2662. {
  2663. struct target_shmid_ds *target_sd;
  2664. if (!lock_user_struct(VERIFY_WRITE, target_sd, target_addr, 0))
  2665. return -TARGET_EFAULT;
  2666. if (host_to_target_ipc_perm(target_addr, &(host_sd->shm_perm)))
  2667. return -TARGET_EFAULT;
  2668. __put_user(host_sd->shm_segsz, &target_sd->shm_segsz);
  2669. __put_user(host_sd->shm_atime, &target_sd->shm_atime);
  2670. __put_user(host_sd->shm_dtime, &target_sd->shm_dtime);
  2671. __put_user(host_sd->shm_ctime, &target_sd->shm_ctime);
  2672. __put_user(host_sd->shm_cpid, &target_sd->shm_cpid);
  2673. __put_user(host_sd->shm_lpid, &target_sd->shm_lpid);
  2674. __put_user(host_sd->shm_nattch, &target_sd->shm_nattch);
  2675. unlock_user_struct(target_sd, target_addr, 1);
  2676. return 0;
  2677. }
  2678. struct target_shminfo {
  2679. abi_ulong shmmax;
  2680. abi_ulong shmmin;
  2681. abi_ulong shmmni;
  2682. abi_ulong shmseg;
  2683. abi_ulong shmall;
  2684. };
  2685. static inline abi_long host_to_target_shminfo(abi_ulong target_addr,
  2686. struct shminfo *host_shminfo)
  2687. {
  2688. struct target_shminfo *target_shminfo;
  2689. if (!lock_user_struct(VERIFY_WRITE, target_shminfo, target_addr, 0))
  2690. return -TARGET_EFAULT;
  2691. __put_user(host_shminfo->shmmax, &target_shminfo->shmmax);
  2692. __put_user(host_shminfo->shmmin, &target_shminfo->shmmin);
  2693. __put_user(host_shminfo->shmmni, &target_shminfo->shmmni);
  2694. __put_user(host_shminfo->shmseg, &target_shminfo->shmseg);
  2695. __put_user(host_shminfo->shmall, &target_shminfo->shmall);
  2696. unlock_user_struct(target_shminfo, target_addr, 1);
  2697. return 0;
  2698. }
  2699. struct target_shm_info {
  2700. int used_ids;
  2701. abi_ulong shm_tot;
  2702. abi_ulong shm_rss;
  2703. abi_ulong shm_swp;
  2704. abi_ulong swap_attempts;
  2705. abi_ulong swap_successes;
  2706. };
  2707. static inline abi_long host_to_target_shm_info(abi_ulong target_addr,
  2708. struct shm_info *host_shm_info)
  2709. {
  2710. struct target_shm_info *target_shm_info;
  2711. if (!lock_user_struct(VERIFY_WRITE, target_shm_info, target_addr, 0))
  2712. return -TARGET_EFAULT;
  2713. __put_user(host_shm_info->used_ids, &target_shm_info->used_ids);
  2714. __put_user(host_shm_info->shm_tot, &target_shm_info->shm_tot);
  2715. __put_user(host_shm_info->shm_rss, &target_shm_info->shm_rss);
  2716. __put_user(host_shm_info->shm_swp, &target_shm_info->shm_swp);
  2717. __put_user(host_shm_info->swap_attempts, &target_shm_info->swap_attempts);
  2718. __put_user(host_shm_info->swap_successes, &target_shm_info->swap_successes);
  2719. unlock_user_struct(target_shm_info, target_addr, 1);
  2720. return 0;
  2721. }
  2722. static inline abi_long do_shmctl(int shmid, int cmd, abi_long buf)
  2723. {
  2724. struct shmid_ds dsarg;
  2725. struct shminfo shminfo;
  2726. struct shm_info shm_info;
  2727. abi_long ret = -TARGET_EINVAL;
  2728. cmd &= 0xff;
  2729. switch(cmd) {
  2730. case IPC_STAT:
  2731. case IPC_SET:
  2732. case SHM_STAT:
  2733. if (target_to_host_shmid_ds(&dsarg, buf))
  2734. return -TARGET_EFAULT;
  2735. ret = get_errno(shmctl(shmid, cmd, &dsarg));
  2736. if (host_to_target_shmid_ds(buf, &dsarg))
  2737. return -TARGET_EFAULT;
  2738. break;
  2739. case IPC_INFO:
  2740. ret = get_errno(shmctl(shmid, cmd, (struct shmid_ds *)&shminfo));
  2741. if (host_to_target_shminfo(buf, &shminfo))
  2742. return -TARGET_EFAULT;
  2743. break;
  2744. case SHM_INFO:
  2745. ret = get_errno(shmctl(shmid, cmd, (struct shmid_ds *)&shm_info));
  2746. if (host_to_target_shm_info(buf, &shm_info))
  2747. return -TARGET_EFAULT;
  2748. break;
  2749. case IPC_RMID:
  2750. case SHM_LOCK:
  2751. case SHM_UNLOCK:
  2752. ret = get_errno(shmctl(shmid, cmd, NULL));
  2753. break;
  2754. }
  2755. return ret;
  2756. }
  2757. static inline abi_ulong do_shmat(int shmid, abi_ulong shmaddr, int shmflg)
  2758. {
  2759. abi_long raddr;
  2760. void *host_raddr;
  2761. struct shmid_ds shm_info;
  2762. int i,ret;
  2763. /* find out the length of the shared memory segment */
  2764. ret = get_errno(shmctl(shmid, IPC_STAT, &shm_info));
  2765. if (is_error(ret)) {
  2766. /* can't get length, bail out */
  2767. return ret;
  2768. }
  2769. mmap_lock();
  2770. if (shmaddr)
  2771. host_raddr = shmat(shmid, (void *)g2h(shmaddr), shmflg);
  2772. else {
  2773. abi_ulong mmap_start;
  2774. mmap_start = mmap_find_vma(0, shm_info.shm_segsz);
  2775. if (mmap_start == -1) {
  2776. errno = ENOMEM;
  2777. host_raddr = (void *)-1;
  2778. } else
  2779. host_raddr = shmat(shmid, g2h(mmap_start), shmflg | SHM_REMAP);
  2780. }
  2781. if (host_raddr == (void *)-1) {
  2782. mmap_unlock();
  2783. return get_errno((long)host_raddr);
  2784. }
  2785. raddr=h2g((unsigned long)host_raddr);
  2786. page_set_flags(raddr, raddr + shm_info.shm_segsz,
  2787. PAGE_VALID | PAGE_READ |
  2788. ((shmflg & SHM_RDONLY)? 0 : PAGE_WRITE));
  2789. for (i = 0; i < N_SHM_REGIONS; i++) {
  2790. if (shm_regions[i].start == 0) {
  2791. shm_regions[i].start = raddr;
  2792. shm_regions[i].size = shm_info.shm_segsz;
  2793. break;
  2794. }
  2795. }
  2796. mmap_unlock();
  2797. return raddr;
  2798. }
  2799. static inline abi_long do_shmdt(abi_ulong shmaddr)
  2800. {
  2801. int i;
  2802. for (i = 0; i < N_SHM_REGIONS; ++i) {
  2803. if (shm_regions[i].start == shmaddr) {
  2804. shm_regions[i].start = 0;
  2805. page_set_flags(shmaddr, shmaddr + shm_regions[i].size, 0);
  2806. break;
  2807. }
  2808. }
  2809. return get_errno(shmdt(g2h(shmaddr)));
  2810. }
  2811. #ifdef TARGET_NR_ipc
  2812. /* ??? This only works with linear mappings. */
  2813. /* do_ipc() must return target values and target errnos. */
  2814. static abi_long do_ipc(unsigned int call, int first,
  2815. int second, int third,
  2816. abi_long ptr, abi_long fifth)
  2817. {
  2818. int version;
  2819. abi_long ret = 0;
  2820. version = call >> 16;
  2821. call &= 0xffff;
  2822. switch (call) {
  2823. case IPCOP_semop:
  2824. ret = do_semop(first, ptr, second);
  2825. break;
  2826. case IPCOP_semget:
  2827. ret = get_errno(semget(first, second, third));
  2828. break;
  2829. case IPCOP_semctl:
  2830. ret = do_semctl(first, second, third, (union target_semun)(abi_ulong) ptr);
  2831. break;
  2832. case IPCOP_msgget:
  2833. ret = get_errno(msgget(first, second));
  2834. break;
  2835. case IPCOP_msgsnd:
  2836. ret = do_msgsnd(first, ptr, second, third);
  2837. break;
  2838. case IPCOP_msgctl:
  2839. ret = do_msgctl(first, second, ptr);
  2840. break;
  2841. case IPCOP_msgrcv:
  2842. switch (version) {
  2843. case 0:
  2844. {
  2845. struct target_ipc_kludge {
  2846. abi_long msgp;
  2847. abi_long msgtyp;
  2848. } *tmp;
  2849. if (!lock_user_struct(VERIFY_READ, tmp, ptr, 1)) {
  2850. ret = -TARGET_EFAULT;
  2851. break;
  2852. }
  2853. ret = do_msgrcv(first, tswapal(tmp->msgp), second, tswapal(tmp->msgtyp), third);
  2854. unlock_user_struct(tmp, ptr, 0);
  2855. break;
  2856. }
  2857. default:
  2858. ret = do_msgrcv(first, ptr, second, fifth, third);
  2859. }
  2860. break;
  2861. case IPCOP_shmat:
  2862. switch (version) {
  2863. default:
  2864. {
  2865. abi_ulong raddr;
  2866. raddr = do_shmat(first, ptr, second);
  2867. if (is_error(raddr))
  2868. return get_errno(raddr);
  2869. if (put_user_ual(raddr, third))
  2870. return -TARGET_EFAULT;
  2871. break;
  2872. }
  2873. case 1:
  2874. ret = -TARGET_EINVAL;
  2875. break;
  2876. }
  2877. break;
  2878. case IPCOP_shmdt:
  2879. ret = do_shmdt(ptr);
  2880. break;
  2881. case IPCOP_shmget:
  2882. /* IPC_* flag values are the same on all linux platforms */
  2883. ret = get_errno(shmget(first, second, third));
  2884. break;
  2885. /* IPC_* and SHM_* command values are the same on all linux platforms */
  2886. case IPCOP_shmctl:
  2887. ret = do_shmctl(first, second, third);
  2888. break;
  2889. default:
  2890. gemu_log("Unsupported ipc call: %d (version %d)\n", call, version);
  2891. ret = -TARGET_ENOSYS;
  2892. break;
  2893. }
  2894. return ret;
  2895. }
  2896. #endif
  2897. /* kernel structure types definitions */
  2898. #define STRUCT(name, ...) STRUCT_ ## name,
  2899. #define STRUCT_SPECIAL(name) STRUCT_ ## name,
  2900. enum {
  2901. #include "syscall_types.h"
  2902. };
  2903. #undef STRUCT
  2904. #undef STRUCT_SPECIAL
  2905. #define STRUCT(name, ...) static const argtype struct_ ## name ## _def[] = { __VA_ARGS__, TYPE_NULL };
  2906. #define STRUCT_SPECIAL(name)
  2907. #include "syscall_types.h"
  2908. #undef STRUCT
  2909. #undef STRUCT_SPECIAL
  2910. typedef struct IOCTLEntry IOCTLEntry;
  2911. typedef abi_long do_ioctl_fn(const IOCTLEntry *ie, uint8_t *buf_temp,
  2912. int fd, abi_long cmd, abi_long arg);
  2913. struct IOCTLEntry {
  2914. unsigned int target_cmd;
  2915. unsigned int host_cmd;
  2916. const char *name;
  2917. int access;
  2918. do_ioctl_fn *do_ioctl;
  2919. const argtype arg_type[5];
  2920. };
  2921. #define IOC_R 0x0001
  2922. #define IOC_W 0x0002
  2923. #define IOC_RW (IOC_R | IOC_W)
  2924. #define MAX_STRUCT_SIZE 4096
  2925. #ifdef CONFIG_FIEMAP
  2926. /* So fiemap access checks don't overflow on 32 bit systems.
  2927. * This is very slightly smaller than the limit imposed by
  2928. * the underlying kernel.
  2929. */
  2930. #define FIEMAP_MAX_EXTENTS ((UINT_MAX - sizeof(struct fiemap)) \
  2931. / sizeof(struct fiemap_extent))
  2932. static abi_long do_ioctl_fs_ioc_fiemap(const IOCTLEntry *ie, uint8_t *buf_temp,
  2933. int fd, abi_long cmd, abi_long arg)
  2934. {
  2935. /* The parameter for this ioctl is a struct fiemap followed
  2936. * by an array of struct fiemap_extent whose size is set
  2937. * in fiemap->fm_extent_count. The array is filled in by the
  2938. * ioctl.
  2939. */
  2940. int target_size_in, target_size_out;
  2941. struct fiemap *fm;
  2942. const argtype *arg_type = ie->arg_type;
  2943. const argtype extent_arg_type[] = { MK_STRUCT(STRUCT_fiemap_extent) };
  2944. void *argptr, *p;
  2945. abi_long ret;
  2946. int i, extent_size = thunk_type_size(extent_arg_type, 0);
  2947. uint32_t outbufsz;
  2948. int free_fm = 0;
  2949. assert(arg_type[0] == TYPE_PTR);
  2950. assert(ie->access == IOC_RW);
  2951. arg_type++;
  2952. target_size_in = thunk_type_size(arg_type, 0);
  2953. argptr = lock_user(VERIFY_READ, arg, target_size_in, 1);
  2954. if (!argptr) {
  2955. return -TARGET_EFAULT;
  2956. }
  2957. thunk_convert(buf_temp, argptr, arg_type, THUNK_HOST);
  2958. unlock_user(argptr, arg, 0);
  2959. fm = (struct fiemap *)buf_temp;
  2960. if (fm->fm_extent_count > FIEMAP_MAX_EXTENTS) {
  2961. return -TARGET_EINVAL;
  2962. }
  2963. outbufsz = sizeof (*fm) +
  2964. (sizeof(struct fiemap_extent) * fm->fm_extent_count);
  2965. if (outbufsz > MAX_STRUCT_SIZE) {
  2966. /* We can't fit all the extents into the fixed size buffer.
  2967. * Allocate one that is large enough and use it instead.
  2968. */
  2969. fm = malloc(outbufsz);
  2970. if (!fm) {
  2971. return -TARGET_ENOMEM;
  2972. }
  2973. memcpy(fm, buf_temp, sizeof(struct fiemap));
  2974. free_fm = 1;
  2975. }
  2976. ret = get_errno(ioctl(fd, ie->host_cmd, fm));
  2977. if (!is_error(ret)) {
  2978. target_size_out = target_size_in;
  2979. /* An extent_count of 0 means we were only counting the extents
  2980. * so there are no structs to copy
  2981. */
  2982. if (fm->fm_extent_count != 0) {
  2983. target_size_out += fm->fm_mapped_extents * extent_size;
  2984. }
  2985. argptr = lock_user(VERIFY_WRITE, arg, target_size_out, 0);
  2986. if (!argptr) {
  2987. ret = -TARGET_EFAULT;
  2988. } else {
  2989. /* Convert the struct fiemap */
  2990. thunk_convert(argptr, fm, arg_type, THUNK_TARGET);
  2991. if (fm->fm_extent_count != 0) {
  2992. p = argptr + target_size_in;
  2993. /* ...and then all the struct fiemap_extents */
  2994. for (i = 0; i < fm->fm_mapped_extents; i++) {
  2995. thunk_convert(p, &fm->fm_extents[i], extent_arg_type,
  2996. THUNK_TARGET);
  2997. p += extent_size;
  2998. }
  2999. }
  3000. unlock_user(argptr, arg, target_size_out);
  3001. }
  3002. }
  3003. if (free_fm) {
  3004. free(fm);
  3005. }
  3006. return ret;
  3007. }
  3008. #endif
  3009. static abi_long do_ioctl_ifconf(const IOCTLEntry *ie, uint8_t *buf_temp,
  3010. int fd, abi_long cmd, abi_long arg)
  3011. {
  3012. const argtype *arg_type = ie->arg_type;
  3013. int target_size;
  3014. void *argptr;
  3015. int ret;
  3016. struct ifconf *host_ifconf;
  3017. uint32_t outbufsz;
  3018. const argtype ifreq_arg_type[] = { MK_STRUCT(STRUCT_sockaddr_ifreq) };
  3019. int target_ifreq_size;
  3020. int nb_ifreq;
  3021. int free_buf = 0;
  3022. int i;
  3023. int target_ifc_len;
  3024. abi_long target_ifc_buf;
  3025. int host_ifc_len;
  3026. char *host_ifc_buf;
  3027. assert(arg_type[0] == TYPE_PTR);
  3028. assert(ie->access == IOC_RW);
  3029. arg_type++;
  3030. target_size = thunk_type_size(arg_type, 0);
  3031. argptr = lock_user(VERIFY_READ, arg, target_size, 1);
  3032. if (!argptr)
  3033. return -TARGET_EFAULT;
  3034. thunk_convert(buf_temp, argptr, arg_type, THUNK_HOST);
  3035. unlock_user(argptr, arg, 0);
  3036. host_ifconf = (struct ifconf *)(unsigned long)buf_temp;
  3037. target_ifc_len = host_ifconf->ifc_len;
  3038. target_ifc_buf = (abi_long)(unsigned long)host_ifconf->ifc_buf;
  3039. target_ifreq_size = thunk_type_size(ifreq_arg_type, 0);
  3040. nb_ifreq = target_ifc_len / target_ifreq_size;
  3041. host_ifc_len = nb_ifreq * sizeof(struct ifreq);
  3042. outbufsz = sizeof(*host_ifconf) + host_ifc_len;
  3043. if (outbufsz > MAX_STRUCT_SIZE) {
  3044. /* We can't fit all the extents into the fixed size buffer.
  3045. * Allocate one that is large enough and use it instead.
  3046. */
  3047. host_ifconf = malloc(outbufsz);
  3048. if (!host_ifconf) {
  3049. return -TARGET_ENOMEM;
  3050. }
  3051. memcpy(host_ifconf, buf_temp, sizeof(*host_ifconf));
  3052. free_buf = 1;
  3053. }
  3054. host_ifc_buf = (char*)host_ifconf + sizeof(*host_ifconf);
  3055. host_ifconf->ifc_len = host_ifc_len;
  3056. host_ifconf->ifc_buf = host_ifc_buf;
  3057. ret = get_errno(ioctl(fd, ie->host_cmd, host_ifconf));
  3058. if (!is_error(ret)) {
  3059. /* convert host ifc_len to target ifc_len */
  3060. nb_ifreq = host_ifconf->ifc_len / sizeof(struct ifreq);
  3061. target_ifc_len = nb_ifreq * target_ifreq_size;
  3062. host_ifconf->ifc_len = target_ifc_len;
  3063. /* restore target ifc_buf */
  3064. host_ifconf->ifc_buf = (char *)(unsigned long)target_ifc_buf;
  3065. /* copy struct ifconf to target user */
  3066. argptr = lock_user(VERIFY_WRITE, arg, target_size, 0);
  3067. if (!argptr)
  3068. return -TARGET_EFAULT;
  3069. thunk_convert(argptr, host_ifconf, arg_type, THUNK_TARGET);
  3070. unlock_user(argptr, arg, target_size);
  3071. /* copy ifreq[] to target user */
  3072. argptr = lock_user(VERIFY_WRITE, target_ifc_buf, target_ifc_len, 0);
  3073. for (i = 0; i < nb_ifreq ; i++) {
  3074. thunk_convert(argptr + i * target_ifreq_size,
  3075. host_ifc_buf + i * sizeof(struct ifreq),
  3076. ifreq_arg_type, THUNK_TARGET);
  3077. }
  3078. unlock_user(argptr, target_ifc_buf, target_ifc_len);
  3079. }
  3080. if (free_buf) {
  3081. free(host_ifconf);
  3082. }
  3083. return ret;
  3084. }
  3085. static abi_long do_ioctl_dm(const IOCTLEntry *ie, uint8_t *buf_temp, int fd,
  3086. abi_long cmd, abi_long arg)
  3087. {
  3088. void *argptr;
  3089. struct dm_ioctl *host_dm;
  3090. abi_long guest_data;
  3091. uint32_t guest_data_size;
  3092. int target_size;
  3093. const argtype *arg_type = ie->arg_type;
  3094. abi_long ret;
  3095. void *big_buf = NULL;
  3096. char *host_data;
  3097. arg_type++;
  3098. target_size = thunk_type_size(arg_type, 0);
  3099. argptr = lock_user(VERIFY_READ, arg, target_size, 1);
  3100. if (!argptr) {
  3101. ret = -TARGET_EFAULT;
  3102. goto out;
  3103. }
  3104. thunk_convert(buf_temp, argptr, arg_type, THUNK_HOST);
  3105. unlock_user(argptr, arg, 0);
  3106. /* buf_temp is too small, so fetch things into a bigger buffer */
  3107. big_buf = g_malloc0(((struct dm_ioctl*)buf_temp)->data_size * 2);
  3108. memcpy(big_buf, buf_temp, target_size);
  3109. buf_temp = big_buf;
  3110. host_dm = big_buf;
  3111. guest_data = arg + host_dm->data_start;
  3112. if ((guest_data - arg) < 0) {
  3113. ret = -EINVAL;
  3114. goto out;
  3115. }
  3116. guest_data_size = host_dm->data_size - host_dm->data_start;
  3117. host_data = (char*)host_dm + host_dm->data_start;
  3118. argptr = lock_user(VERIFY_READ, guest_data, guest_data_size, 1);
  3119. switch (ie->host_cmd) {
  3120. case DM_REMOVE_ALL:
  3121. case DM_LIST_DEVICES:
  3122. case DM_DEV_CREATE:
  3123. case DM_DEV_REMOVE:
  3124. case DM_DEV_SUSPEND:
  3125. case DM_DEV_STATUS:
  3126. case DM_DEV_WAIT:
  3127. case DM_TABLE_STATUS:
  3128. case DM_TABLE_CLEAR:
  3129. case DM_TABLE_DEPS:
  3130. case DM_LIST_VERSIONS:
  3131. /* no input data */
  3132. break;
  3133. case DM_DEV_RENAME:
  3134. case DM_DEV_SET_GEOMETRY:
  3135. /* data contains only strings */
  3136. memcpy(host_data, argptr, guest_data_size);
  3137. break;
  3138. case DM_TARGET_MSG:
  3139. memcpy(host_data, argptr, guest_data_size);
  3140. *(uint64_t*)host_data = tswap64(*(uint64_t*)argptr);
  3141. break;
  3142. case DM_TABLE_LOAD:
  3143. {
  3144. void *gspec = argptr;
  3145. void *cur_data = host_data;
  3146. const argtype arg_type[] = { MK_STRUCT(STRUCT_dm_target_spec) };
  3147. int spec_size = thunk_type_size(arg_type, 0);
  3148. int i;
  3149. for (i = 0; i < host_dm->target_count; i++) {
  3150. struct dm_target_spec *spec = cur_data;
  3151. uint32_t next;
  3152. int slen;
  3153. thunk_convert(spec, gspec, arg_type, THUNK_HOST);
  3154. slen = strlen((char*)gspec + spec_size) + 1;
  3155. next = spec->next;
  3156. spec->next = sizeof(*spec) + slen;
  3157. strcpy((char*)&spec[1], gspec + spec_size);
  3158. gspec += next;
  3159. cur_data += spec->next;
  3160. }
  3161. break;
  3162. }
  3163. default:
  3164. ret = -TARGET_EINVAL;
  3165. goto out;
  3166. }
  3167. unlock_user(argptr, guest_data, 0);
  3168. ret = get_errno(ioctl(fd, ie->host_cmd, buf_temp));
  3169. if (!is_error(ret)) {
  3170. guest_data = arg + host_dm->data_start;
  3171. guest_data_size = host_dm->data_size - host_dm->data_start;
  3172. argptr = lock_user(VERIFY_WRITE, guest_data, guest_data_size, 0);
  3173. switch (ie->host_cmd) {
  3174. case DM_REMOVE_ALL:
  3175. case DM_DEV_CREATE:
  3176. case DM_DEV_REMOVE:
  3177. case DM_DEV_RENAME:
  3178. case DM_DEV_SUSPEND:
  3179. case DM_DEV_STATUS:
  3180. case DM_TABLE_LOAD:
  3181. case DM_TABLE_CLEAR:
  3182. case DM_TARGET_MSG:
  3183. case DM_DEV_SET_GEOMETRY:
  3184. /* no return data */
  3185. break;
  3186. case DM_LIST_DEVICES:
  3187. {
  3188. struct dm_name_list *nl = (void*)host_dm + host_dm->data_start;
  3189. uint32_t remaining_data = guest_data_size;
  3190. void *cur_data = argptr;
  3191. const argtype arg_type[] = { MK_STRUCT(STRUCT_dm_name_list) };
  3192. int nl_size = 12; /* can't use thunk_size due to alignment */
  3193. while (1) {
  3194. uint32_t next = nl->next;
  3195. if (next) {
  3196. nl->next = nl_size + (strlen(nl->name) + 1);
  3197. }
  3198. if (remaining_data < nl->next) {
  3199. host_dm->flags |= DM_BUFFER_FULL_FLAG;
  3200. break;
  3201. }
  3202. thunk_convert(cur_data, nl, arg_type, THUNK_TARGET);
  3203. strcpy(cur_data + nl_size, nl->name);
  3204. cur_data += nl->next;
  3205. remaining_data -= nl->next;
  3206. if (!next) {
  3207. break;
  3208. }
  3209. nl = (void*)nl + next;
  3210. }
  3211. break;
  3212. }
  3213. case DM_DEV_WAIT:
  3214. case DM_TABLE_STATUS:
  3215. {
  3216. struct dm_target_spec *spec = (void*)host_dm + host_dm->data_start;
  3217. void *cur_data = argptr;
  3218. const argtype arg_type[] = { MK_STRUCT(STRUCT_dm_target_spec) };
  3219. int spec_size = thunk_type_size(arg_type, 0);
  3220. int i;
  3221. for (i = 0; i < host_dm->target_count; i++) {
  3222. uint32_t next = spec->next;
  3223. int slen = strlen((char*)&spec[1]) + 1;
  3224. spec->next = (cur_data - argptr) + spec_size + slen;
  3225. if (guest_data_size < spec->next) {
  3226. host_dm->flags |= DM_BUFFER_FULL_FLAG;
  3227. break;
  3228. }
  3229. thunk_convert(cur_data, spec, arg_type, THUNK_TARGET);
  3230. strcpy(cur_data + spec_size, (char*)&spec[1]);
  3231. cur_data = argptr + spec->next;
  3232. spec = (void*)host_dm + host_dm->data_start + next;
  3233. }
  3234. break;
  3235. }
  3236. case DM_TABLE_DEPS:
  3237. {
  3238. void *hdata = (void*)host_dm + host_dm->data_start;
  3239. int count = *(uint32_t*)hdata;
  3240. uint64_t *hdev = hdata + 8;
  3241. uint64_t *gdev = argptr + 8;
  3242. int i;
  3243. *(uint32_t*)argptr = tswap32(count);
  3244. for (i = 0; i < count; i++) {
  3245. *gdev = tswap64(*hdev);
  3246. gdev++;
  3247. hdev++;
  3248. }
  3249. break;
  3250. }
  3251. case DM_LIST_VERSIONS:
  3252. {
  3253. struct dm_target_versions *vers = (void*)host_dm + host_dm->data_start;
  3254. uint32_t remaining_data = guest_data_size;
  3255. void *cur_data = argptr;
  3256. const argtype arg_type[] = { MK_STRUCT(STRUCT_dm_target_versions) };
  3257. int vers_size = thunk_type_size(arg_type, 0);
  3258. while (1) {
  3259. uint32_t next = vers->next;
  3260. if (next) {
  3261. vers->next = vers_size + (strlen(vers->name) + 1);
  3262. }
  3263. if (remaining_data < vers->next) {
  3264. host_dm->flags |= DM_BUFFER_FULL_FLAG;
  3265. break;
  3266. }
  3267. thunk_convert(cur_data, vers, arg_type, THUNK_TARGET);
  3268. strcpy(cur_data + vers_size, vers->name);
  3269. cur_data += vers->next;
  3270. remaining_data -= vers->next;
  3271. if (!next) {
  3272. break;
  3273. }
  3274. vers = (void*)vers + next;
  3275. }
  3276. break;
  3277. }
  3278. default:
  3279. ret = -TARGET_EINVAL;
  3280. goto out;
  3281. }
  3282. unlock_user(argptr, guest_data, guest_data_size);
  3283. argptr = lock_user(VERIFY_WRITE, arg, target_size, 0);
  3284. if (!argptr) {
  3285. ret = -TARGET_EFAULT;
  3286. goto out;
  3287. }
  3288. thunk_convert(argptr, buf_temp, arg_type, THUNK_TARGET);
  3289. unlock_user(argptr, arg, target_size);
  3290. }
  3291. out:
  3292. g_free(big_buf);
  3293. return ret;
  3294. }
  3295. static IOCTLEntry ioctl_entries[] = {
  3296. #define IOCTL(cmd, access, ...) \
  3297. { TARGET_ ## cmd, cmd, #cmd, access, 0, { __VA_ARGS__ } },
  3298. #define IOCTL_SPECIAL(cmd, access, dofn, ...) \
  3299. { TARGET_ ## cmd, cmd, #cmd, access, dofn, { __VA_ARGS__ } },
  3300. #include "ioctls.h"
  3301. { 0, 0, },
  3302. };
  3303. /* ??? Implement proper locking for ioctls. */
  3304. /* do_ioctl() Must return target values and target errnos. */
  3305. static abi_long do_ioctl(int fd, abi_long cmd, abi_long arg)
  3306. {
  3307. const IOCTLEntry *ie;
  3308. const argtype *arg_type;
  3309. abi_long ret;
  3310. uint8_t buf_temp[MAX_STRUCT_SIZE];
  3311. int target_size;
  3312. void *argptr;
  3313. ie = ioctl_entries;
  3314. for(;;) {
  3315. if (ie->target_cmd == 0) {
  3316. gemu_log("Unsupported ioctl: cmd=0x%04lx\n", (long)cmd);
  3317. return -TARGET_ENOSYS;
  3318. }
  3319. if (ie->target_cmd == cmd)
  3320. break;
  3321. ie++;
  3322. }
  3323. arg_type = ie->arg_type;
  3324. #if defined(DEBUG)
  3325. gemu_log("ioctl: cmd=0x%04lx (%s)\n", (long)cmd, ie->name);
  3326. #endif
  3327. if (ie->do_ioctl) {
  3328. return ie->do_ioctl(ie, buf_temp, fd, cmd, arg);
  3329. }
  3330. switch(arg_type[0]) {
  3331. case TYPE_NULL:
  3332. /* no argument */
  3333. ret = get_errno(ioctl(fd, ie->host_cmd));
  3334. break;
  3335. case TYPE_PTRVOID:
  3336. case TYPE_INT:
  3337. /* int argment */
  3338. ret = get_errno(ioctl(fd, ie->host_cmd, arg));
  3339. break;
  3340. case TYPE_PTR:
  3341. arg_type++;
  3342. target_size = thunk_type_size(arg_type, 0);
  3343. switch(ie->access) {
  3344. case IOC_R:
  3345. ret = get_errno(ioctl(fd, ie->host_cmd, buf_temp));
  3346. if (!is_error(ret)) {
  3347. argptr = lock_user(VERIFY_WRITE, arg, target_size, 0);
  3348. if (!argptr)
  3349. return -TARGET_EFAULT;
  3350. thunk_convert(argptr, buf_temp, arg_type, THUNK_TARGET);
  3351. unlock_user(argptr, arg, target_size);
  3352. }
  3353. break;
  3354. case IOC_W:
  3355. argptr = lock_user(VERIFY_READ, arg, target_size, 1);
  3356. if (!argptr)
  3357. return -TARGET_EFAULT;
  3358. thunk_convert(buf_temp, argptr, arg_type, THUNK_HOST);
  3359. unlock_user(argptr, arg, 0);
  3360. ret = get_errno(ioctl(fd, ie->host_cmd, buf_temp));
  3361. break;
  3362. default:
  3363. case IOC_RW:
  3364. argptr = lock_user(VERIFY_READ, arg, target_size, 1);
  3365. if (!argptr)
  3366. return -TARGET_EFAULT;
  3367. thunk_convert(buf_temp, argptr, arg_type, THUNK_HOST);
  3368. unlock_user(argptr, arg, 0);
  3369. ret = get_errno(ioctl(fd, ie->host_cmd, buf_temp));
  3370. if (!is_error(ret)) {
  3371. argptr = lock_user(VERIFY_WRITE, arg, target_size, 0);
  3372. if (!argptr)
  3373. return -TARGET_EFAULT;
  3374. thunk_convert(argptr, buf_temp, arg_type, THUNK_TARGET);
  3375. unlock_user(argptr, arg, target_size);
  3376. }
  3377. break;
  3378. }
  3379. break;
  3380. default:
  3381. gemu_log("Unsupported ioctl type: cmd=0x%04lx type=%d\n",
  3382. (long)cmd, arg_type[0]);
  3383. ret = -TARGET_ENOSYS;
  3384. break;
  3385. }
  3386. return ret;
  3387. }
  3388. static const bitmask_transtbl iflag_tbl[] = {
  3389. { TARGET_IGNBRK, TARGET_IGNBRK, IGNBRK, IGNBRK },
  3390. { TARGET_BRKINT, TARGET_BRKINT, BRKINT, BRKINT },
  3391. { TARGET_IGNPAR, TARGET_IGNPAR, IGNPAR, IGNPAR },
  3392. { TARGET_PARMRK, TARGET_PARMRK, PARMRK, PARMRK },
  3393. { TARGET_INPCK, TARGET_INPCK, INPCK, INPCK },
  3394. { TARGET_ISTRIP, TARGET_ISTRIP, ISTRIP, ISTRIP },
  3395. { TARGET_INLCR, TARGET_INLCR, INLCR, INLCR },
  3396. { TARGET_IGNCR, TARGET_IGNCR, IGNCR, IGNCR },
  3397. { TARGET_ICRNL, TARGET_ICRNL, ICRNL, ICRNL },
  3398. { TARGET_IUCLC, TARGET_IUCLC, IUCLC, IUCLC },
  3399. { TARGET_IXON, TARGET_IXON, IXON, IXON },
  3400. { TARGET_IXANY, TARGET_IXANY, IXANY, IXANY },
  3401. { TARGET_IXOFF, TARGET_IXOFF, IXOFF, IXOFF },
  3402. { TARGET_IMAXBEL, TARGET_IMAXBEL, IMAXBEL, IMAXBEL },
  3403. { 0, 0, 0, 0 }
  3404. };
  3405. static const bitmask_transtbl oflag_tbl[] = {
  3406. { TARGET_OPOST, TARGET_OPOST, OPOST, OPOST },
  3407. { TARGET_OLCUC, TARGET_OLCUC, OLCUC, OLCUC },
  3408. { TARGET_ONLCR, TARGET_ONLCR, ONLCR, ONLCR },
  3409. { TARGET_OCRNL, TARGET_OCRNL, OCRNL, OCRNL },
  3410. { TARGET_ONOCR, TARGET_ONOCR, ONOCR, ONOCR },
  3411. { TARGET_ONLRET, TARGET_ONLRET, ONLRET, ONLRET },
  3412. { TARGET_OFILL, TARGET_OFILL, OFILL, OFILL },
  3413. { TARGET_OFDEL, TARGET_OFDEL, OFDEL, OFDEL },
  3414. { TARGET_NLDLY, TARGET_NL0, NLDLY, NL0 },
  3415. { TARGET_NLDLY, TARGET_NL1, NLDLY, NL1 },
  3416. { TARGET_CRDLY, TARGET_CR0, CRDLY, CR0 },
  3417. { TARGET_CRDLY, TARGET_CR1, CRDLY, CR1 },
  3418. { TARGET_CRDLY, TARGET_CR2, CRDLY, CR2 },
  3419. { TARGET_CRDLY, TARGET_CR3, CRDLY, CR3 },
  3420. { TARGET_TABDLY, TARGET_TAB0, TABDLY, TAB0 },
  3421. { TARGET_TABDLY, TARGET_TAB1, TABDLY, TAB1 },
  3422. { TARGET_TABDLY, TARGET_TAB2, TABDLY, TAB2 },
  3423. { TARGET_TABDLY, TARGET_TAB3, TABDLY, TAB3 },
  3424. { TARGET_BSDLY, TARGET_BS0, BSDLY, BS0 },
  3425. { TARGET_BSDLY, TARGET_BS1, BSDLY, BS1 },
  3426. { TARGET_VTDLY, TARGET_VT0, VTDLY, VT0 },
  3427. { TARGET_VTDLY, TARGET_VT1, VTDLY, VT1 },
  3428. { TARGET_FFDLY, TARGET_FF0, FFDLY, FF0 },
  3429. { TARGET_FFDLY, TARGET_FF1, FFDLY, FF1 },
  3430. { 0, 0, 0, 0 }
  3431. };
  3432. static const bitmask_transtbl cflag_tbl[] = {
  3433. { TARGET_CBAUD, TARGET_B0, CBAUD, B0 },
  3434. { TARGET_CBAUD, TARGET_B50, CBAUD, B50 },
  3435. { TARGET_CBAUD, TARGET_B75, CBAUD, B75 },
  3436. { TARGET_CBAUD, TARGET_B110, CBAUD, B110 },
  3437. { TARGET_CBAUD, TARGET_B134, CBAUD, B134 },
  3438. { TARGET_CBAUD, TARGET_B150, CBAUD, B150 },
  3439. { TARGET_CBAUD, TARGET_B200, CBAUD, B200 },
  3440. { TARGET_CBAUD, TARGET_B300, CBAUD, B300 },
  3441. { TARGET_CBAUD, TARGET_B600, CBAUD, B600 },
  3442. { TARGET_CBAUD, TARGET_B1200, CBAUD, B1200 },
  3443. { TARGET_CBAUD, TARGET_B1800, CBAUD, B1800 },
  3444. { TARGET_CBAUD, TARGET_B2400, CBAUD, B2400 },
  3445. { TARGET_CBAUD, TARGET_B4800, CBAUD, B4800 },
  3446. { TARGET_CBAUD, TARGET_B9600, CBAUD, B9600 },
  3447. { TARGET_CBAUD, TARGET_B19200, CBAUD, B19200 },
  3448. { TARGET_CBAUD, TARGET_B38400, CBAUD, B38400 },
  3449. { TARGET_CBAUD, TARGET_B57600, CBAUD, B57600 },
  3450. { TARGET_CBAUD, TARGET_B115200, CBAUD, B115200 },
  3451. { TARGET_CBAUD, TARGET_B230400, CBAUD, B230400 },
  3452. { TARGET_CBAUD, TARGET_B460800, CBAUD, B460800 },
  3453. { TARGET_CSIZE, TARGET_CS5, CSIZE, CS5 },
  3454. { TARGET_CSIZE, TARGET_CS6, CSIZE, CS6 },
  3455. { TARGET_CSIZE, TARGET_CS7, CSIZE, CS7 },
  3456. { TARGET_CSIZE, TARGET_CS8, CSIZE, CS8 },
  3457. { TARGET_CSTOPB, TARGET_CSTOPB, CSTOPB, CSTOPB },
  3458. { TARGET_CREAD, TARGET_CREAD, CREAD, CREAD },
  3459. { TARGET_PARENB, TARGET_PARENB, PARENB, PARENB },
  3460. { TARGET_PARODD, TARGET_PARODD, PARODD, PARODD },
  3461. { TARGET_HUPCL, TARGET_HUPCL, HUPCL, HUPCL },
  3462. { TARGET_CLOCAL, TARGET_CLOCAL, CLOCAL, CLOCAL },
  3463. { TARGET_CRTSCTS, TARGET_CRTSCTS, CRTSCTS, CRTSCTS },
  3464. { 0, 0, 0, 0 }
  3465. };
  3466. static const bitmask_transtbl lflag_tbl[] = {
  3467. { TARGET_ISIG, TARGET_ISIG, ISIG, ISIG },
  3468. { TARGET_ICANON, TARGET_ICANON, ICANON, ICANON },
  3469. { TARGET_XCASE, TARGET_XCASE, XCASE, XCASE },
  3470. { TARGET_ECHO, TARGET_ECHO, ECHO, ECHO },
  3471. { TARGET_ECHOE, TARGET_ECHOE, ECHOE, ECHOE },
  3472. { TARGET_ECHOK, TARGET_ECHOK, ECHOK, ECHOK },
  3473. { TARGET_ECHONL, TARGET_ECHONL, ECHONL, ECHONL },
  3474. { TARGET_NOFLSH, TARGET_NOFLSH, NOFLSH, NOFLSH },
  3475. { TARGET_TOSTOP, TARGET_TOSTOP, TOSTOP, TOSTOP },
  3476. { TARGET_ECHOCTL, TARGET_ECHOCTL, ECHOCTL, ECHOCTL },
  3477. { TARGET_ECHOPRT, TARGET_ECHOPRT, ECHOPRT, ECHOPRT },
  3478. { TARGET_ECHOKE, TARGET_ECHOKE, ECHOKE, ECHOKE },
  3479. { TARGET_FLUSHO, TARGET_FLUSHO, FLUSHO, FLUSHO },
  3480. { TARGET_PENDIN, TARGET_PENDIN, PENDIN, PENDIN },
  3481. { TARGET_IEXTEN, TARGET_IEXTEN, IEXTEN, IEXTEN },
  3482. { 0, 0, 0, 0 }
  3483. };
  3484. static void target_to_host_termios (void *dst, const void *src)
  3485. {
  3486. struct host_termios *host = dst;
  3487. const struct target_termios *target = src;
  3488. host->c_iflag =
  3489. target_to_host_bitmask(tswap32(target->c_iflag), iflag_tbl);
  3490. host->c_oflag =
  3491. target_to_host_bitmask(tswap32(target->c_oflag), oflag_tbl);
  3492. host->c_cflag =
  3493. target_to_host_bitmask(tswap32(target->c_cflag), cflag_tbl);
  3494. host->c_lflag =
  3495. target_to_host_bitmask(tswap32(target->c_lflag), lflag_tbl);
  3496. host->c_line = target->c_line;
  3497. memset(host->c_cc, 0, sizeof(host->c_cc));
  3498. host->c_cc[VINTR] = target->c_cc[TARGET_VINTR];
  3499. host->c_cc[VQUIT] = target->c_cc[TARGET_VQUIT];
  3500. host->c_cc[VERASE] = target->c_cc[TARGET_VERASE];
  3501. host->c_cc[VKILL] = target->c_cc[TARGET_VKILL];
  3502. host->c_cc[VEOF] = target->c_cc[TARGET_VEOF];
  3503. host->c_cc[VTIME] = target->c_cc[TARGET_VTIME];
  3504. host->c_cc[VMIN] = target->c_cc[TARGET_VMIN];
  3505. host->c_cc[VSWTC] = target->c_cc[TARGET_VSWTC];
  3506. host->c_cc[VSTART] = target->c_cc[TARGET_VSTART];
  3507. host->c_cc[VSTOP] = target->c_cc[TARGET_VSTOP];
  3508. host->c_cc[VSUSP] = target->c_cc[TARGET_VSUSP];
  3509. host->c_cc[VEOL] = target->c_cc[TARGET_VEOL];
  3510. host->c_cc[VREPRINT] = target->c_cc[TARGET_VREPRINT];
  3511. host->c_cc[VDISCARD] = target->c_cc[TARGET_VDISCARD];
  3512. host->c_cc[VWERASE] = target->c_cc[TARGET_VWERASE];
  3513. host->c_cc[VLNEXT] = target->c_cc[TARGET_VLNEXT];
  3514. host->c_cc[VEOL2] = target->c_cc[TARGET_VEOL2];
  3515. }
  3516. static void host_to_target_termios (void *dst, const void *src)
  3517. {
  3518. struct target_termios *target = dst;
  3519. const struct host_termios *host = src;
  3520. target->c_iflag =
  3521. tswap32(host_to_target_bitmask(host->c_iflag, iflag_tbl));
  3522. target->c_oflag =
  3523. tswap32(host_to_target_bitmask(host->c_oflag, oflag_tbl));
  3524. target->c_cflag =
  3525. tswap32(host_to_target_bitmask(host->c_cflag, cflag_tbl));
  3526. target->c_lflag =
  3527. tswap32(host_to_target_bitmask(host->c_lflag, lflag_tbl));
  3528. target->c_line = host->c_line;
  3529. memset(target->c_cc, 0, sizeof(target->c_cc));
  3530. target->c_cc[TARGET_VINTR] = host->c_cc[VINTR];
  3531. target->c_cc[TARGET_VQUIT] = host->c_cc[VQUIT];
  3532. target->c_cc[TARGET_VERASE] = host->c_cc[VERASE];
  3533. target->c_cc[TARGET_VKILL] = host->c_cc[VKILL];
  3534. target->c_cc[TARGET_VEOF] = host->c_cc[VEOF];
  3535. target->c_cc[TARGET_VTIME] = host->c_cc[VTIME];
  3536. target->c_cc[TARGET_VMIN] = host->c_cc[VMIN];
  3537. target->c_cc[TARGET_VSWTC] = host->c_cc[VSWTC];
  3538. target->c_cc[TARGET_VSTART] = host->c_cc[VSTART];
  3539. target->c_cc[TARGET_VSTOP] = host->c_cc[VSTOP];
  3540. target->c_cc[TARGET_VSUSP] = host->c_cc[VSUSP];
  3541. target->c_cc[TARGET_VEOL] = host->c_cc[VEOL];
  3542. target->c_cc[TARGET_VREPRINT] = host->c_cc[VREPRINT];
  3543. target->c_cc[TARGET_VDISCARD] = host->c_cc[VDISCARD];
  3544. target->c_cc[TARGET_VWERASE] = host->c_cc[VWERASE];
  3545. target->c_cc[TARGET_VLNEXT] = host->c_cc[VLNEXT];
  3546. target->c_cc[TARGET_VEOL2] = host->c_cc[VEOL2];
  3547. }
  3548. static const StructEntry struct_termios_def = {
  3549. .convert = { host_to_target_termios, target_to_host_termios },
  3550. .size = { sizeof(struct target_termios), sizeof(struct host_termios) },
  3551. .align = { __alignof__(struct target_termios), __alignof__(struct host_termios) },
  3552. };
  3553. static bitmask_transtbl mmap_flags_tbl[] = {
  3554. { TARGET_MAP_SHARED, TARGET_MAP_SHARED, MAP_SHARED, MAP_SHARED },
  3555. { TARGET_MAP_PRIVATE, TARGET_MAP_PRIVATE, MAP_PRIVATE, MAP_PRIVATE },
  3556. { TARGET_MAP_FIXED, TARGET_MAP_FIXED, MAP_FIXED, MAP_FIXED },
  3557. { TARGET_MAP_ANONYMOUS, TARGET_MAP_ANONYMOUS, MAP_ANONYMOUS, MAP_ANONYMOUS },
  3558. { TARGET_MAP_GROWSDOWN, TARGET_MAP_GROWSDOWN, MAP_GROWSDOWN, MAP_GROWSDOWN },
  3559. { TARGET_MAP_DENYWRITE, TARGET_MAP_DENYWRITE, MAP_DENYWRITE, MAP_DENYWRITE },
  3560. { TARGET_MAP_EXECUTABLE, TARGET_MAP_EXECUTABLE, MAP_EXECUTABLE, MAP_EXECUTABLE },
  3561. { TARGET_MAP_LOCKED, TARGET_MAP_LOCKED, MAP_LOCKED, MAP_LOCKED },
  3562. { 0, 0, 0, 0 }
  3563. };
  3564. #if defined(TARGET_I386)
  3565. /* NOTE: there is really one LDT for all the threads */
  3566. static uint8_t *ldt_table;
  3567. static abi_long read_ldt(abi_ulong ptr, unsigned long bytecount)
  3568. {
  3569. int size;
  3570. void *p;
  3571. if (!ldt_table)
  3572. return 0;
  3573. size = TARGET_LDT_ENTRIES * TARGET_LDT_ENTRY_SIZE;
  3574. if (size > bytecount)
  3575. size = bytecount;
  3576. p = lock_user(VERIFY_WRITE, ptr, size, 0);
  3577. if (!p)
  3578. return -TARGET_EFAULT;
  3579. /* ??? Should this by byteswapped? */
  3580. memcpy(p, ldt_table, size);
  3581. unlock_user(p, ptr, size);
  3582. return size;
  3583. }
  3584. /* XXX: add locking support */
  3585. static abi_long write_ldt(CPUX86State *env,
  3586. abi_ulong ptr, unsigned long bytecount, int oldmode)
  3587. {
  3588. struct target_modify_ldt_ldt_s ldt_info;
  3589. struct target_modify_ldt_ldt_s *target_ldt_info;
  3590. int seg_32bit, contents, read_exec_only, limit_in_pages;
  3591. int seg_not_present, useable, lm;
  3592. uint32_t *lp, entry_1, entry_2;
  3593. if (bytecount != sizeof(ldt_info))
  3594. return -TARGET_EINVAL;
  3595. if (!lock_user_struct(VERIFY_READ, target_ldt_info, ptr, 1))
  3596. return -TARGET_EFAULT;
  3597. ldt_info.entry_number = tswap32(target_ldt_info->entry_number);
  3598. ldt_info.base_addr = tswapal(target_ldt_info->base_addr);
  3599. ldt_info.limit = tswap32(target_ldt_info->limit);
  3600. ldt_info.flags = tswap32(target_ldt_info->flags);
  3601. unlock_user_struct(target_ldt_info, ptr, 0);
  3602. if (ldt_info.entry_number >= TARGET_LDT_ENTRIES)
  3603. return -TARGET_EINVAL;
  3604. seg_32bit = ldt_info.flags & 1;
  3605. contents = (ldt_info.flags >> 1) & 3;
  3606. read_exec_only = (ldt_info.flags >> 3) & 1;
  3607. limit_in_pages = (ldt_info.flags >> 4) & 1;
  3608. seg_not_present = (ldt_info.flags >> 5) & 1;
  3609. useable = (ldt_info.flags >> 6) & 1;
  3610. #ifdef TARGET_ABI32
  3611. lm = 0;
  3612. #else
  3613. lm = (ldt_info.flags >> 7) & 1;
  3614. #endif
  3615. if (contents == 3) {
  3616. if (oldmode)
  3617. return -TARGET_EINVAL;
  3618. if (seg_not_present == 0)
  3619. return -TARGET_EINVAL;
  3620. }
  3621. /* allocate the LDT */
  3622. if (!ldt_table) {
  3623. env->ldt.base = target_mmap(0,
  3624. TARGET_LDT_ENTRIES * TARGET_LDT_ENTRY_SIZE,
  3625. PROT_READ|PROT_WRITE,
  3626. MAP_ANONYMOUS|MAP_PRIVATE, -1, 0);
  3627. if (env->ldt.base == -1)
  3628. return -TARGET_ENOMEM;
  3629. memset(g2h(env->ldt.base), 0,
  3630. TARGET_LDT_ENTRIES * TARGET_LDT_ENTRY_SIZE);
  3631. env->ldt.limit = 0xffff;
  3632. ldt_table = g2h(env->ldt.base);
  3633. }
  3634. /* NOTE: same code as Linux kernel */
  3635. /* Allow LDTs to be cleared by the user. */
  3636. if (ldt_info.base_addr == 0 && ldt_info.limit == 0) {
  3637. if (oldmode ||
  3638. (contents == 0 &&
  3639. read_exec_only == 1 &&
  3640. seg_32bit == 0 &&
  3641. limit_in_pages == 0 &&
  3642. seg_not_present == 1 &&
  3643. useable == 0 )) {
  3644. entry_1 = 0;
  3645. entry_2 = 0;
  3646. goto install;
  3647. }
  3648. }
  3649. entry_1 = ((ldt_info.base_addr & 0x0000ffff) << 16) |
  3650. (ldt_info.limit & 0x0ffff);
  3651. entry_2 = (ldt_info.base_addr & 0xff000000) |
  3652. ((ldt_info.base_addr & 0x00ff0000) >> 16) |
  3653. (ldt_info.limit & 0xf0000) |
  3654. ((read_exec_only ^ 1) << 9) |
  3655. (contents << 10) |
  3656. ((seg_not_present ^ 1) << 15) |
  3657. (seg_32bit << 22) |
  3658. (limit_in_pages << 23) |
  3659. (lm << 21) |
  3660. 0x7000;
  3661. if (!oldmode)
  3662. entry_2 |= (useable << 20);
  3663. /* Install the new entry ... */
  3664. install:
  3665. lp = (uint32_t *)(ldt_table + (ldt_info.entry_number << 3));
  3666. lp[0] = tswap32(entry_1);
  3667. lp[1] = tswap32(entry_2);
  3668. return 0;
  3669. }
  3670. /* specific and weird i386 syscalls */
  3671. static abi_long do_modify_ldt(CPUX86State *env, int func, abi_ulong ptr,
  3672. unsigned long bytecount)
  3673. {
  3674. abi_long ret;
  3675. switch (func) {
  3676. case 0:
  3677. ret = read_ldt(ptr, bytecount);
  3678. break;
  3679. case 1:
  3680. ret = write_ldt(env, ptr, bytecount, 1);
  3681. break;
  3682. case 0x11:
  3683. ret = write_ldt(env, ptr, bytecount, 0);
  3684. break;
  3685. default:
  3686. ret = -TARGET_ENOSYS;
  3687. break;
  3688. }
  3689. return ret;
  3690. }
  3691. #if defined(TARGET_I386) && defined(TARGET_ABI32)
  3692. static abi_long do_set_thread_area(CPUX86State *env, abi_ulong ptr)
  3693. {
  3694. uint64_t *gdt_table = g2h(env->gdt.base);
  3695. struct target_modify_ldt_ldt_s ldt_info;
  3696. struct target_modify_ldt_ldt_s *target_ldt_info;
  3697. int seg_32bit, contents, read_exec_only, limit_in_pages;
  3698. int seg_not_present, useable, lm;
  3699. uint32_t *lp, entry_1, entry_2;
  3700. int i;
  3701. lock_user_struct(VERIFY_WRITE, target_ldt_info, ptr, 1);
  3702. if (!target_ldt_info)
  3703. return -TARGET_EFAULT;
  3704. ldt_info.entry_number = tswap32(target_ldt_info->entry_number);
  3705. ldt_info.base_addr = tswapal(target_ldt_info->base_addr);
  3706. ldt_info.limit = tswap32(target_ldt_info->limit);
  3707. ldt_info.flags = tswap32(target_ldt_info->flags);
  3708. if (ldt_info.entry_number == -1) {
  3709. for (i=TARGET_GDT_ENTRY_TLS_MIN; i<=TARGET_GDT_ENTRY_TLS_MAX; i++) {
  3710. if (gdt_table[i] == 0) {
  3711. ldt_info.entry_number = i;
  3712. target_ldt_info->entry_number = tswap32(i);
  3713. break;
  3714. }
  3715. }
  3716. }
  3717. unlock_user_struct(target_ldt_info, ptr, 1);
  3718. if (ldt_info.entry_number < TARGET_GDT_ENTRY_TLS_MIN ||
  3719. ldt_info.entry_number > TARGET_GDT_ENTRY_TLS_MAX)
  3720. return -TARGET_EINVAL;
  3721. seg_32bit = ldt_info.flags & 1;
  3722. contents = (ldt_info.flags >> 1) & 3;
  3723. read_exec_only = (ldt_info.flags >> 3) & 1;
  3724. limit_in_pages = (ldt_info.flags >> 4) & 1;
  3725. seg_not_present = (ldt_info.flags >> 5) & 1;
  3726. useable = (ldt_info.flags >> 6) & 1;
  3727. #ifdef TARGET_ABI32
  3728. lm = 0;
  3729. #else
  3730. lm = (ldt_info.flags >> 7) & 1;
  3731. #endif
  3732. if (contents == 3) {
  3733. if (seg_not_present == 0)
  3734. return -TARGET_EINVAL;
  3735. }
  3736. /* NOTE: same code as Linux kernel */
  3737. /* Allow LDTs to be cleared by the user. */
  3738. if (ldt_info.base_addr == 0 && ldt_info.limit == 0) {
  3739. if ((contents == 0 &&
  3740. read_exec_only == 1 &&
  3741. seg_32bit == 0 &&
  3742. limit_in_pages == 0 &&
  3743. seg_not_present == 1 &&
  3744. useable == 0 )) {
  3745. entry_1 = 0;
  3746. entry_2 = 0;
  3747. goto install;
  3748. }
  3749. }
  3750. entry_1 = ((ldt_info.base_addr & 0x0000ffff) << 16) |
  3751. (ldt_info.limit & 0x0ffff);
  3752. entry_2 = (ldt_info.base_addr & 0xff000000) |
  3753. ((ldt_info.base_addr & 0x00ff0000) >> 16) |
  3754. (ldt_info.limit & 0xf0000) |
  3755. ((read_exec_only ^ 1) << 9) |
  3756. (contents << 10) |
  3757. ((seg_not_present ^ 1) << 15) |
  3758. (seg_32bit << 22) |
  3759. (limit_in_pages << 23) |
  3760. (useable << 20) |
  3761. (lm << 21) |
  3762. 0x7000;
  3763. /* Install the new entry ... */
  3764. install:
  3765. lp = (uint32_t *)(gdt_table + ldt_info.entry_number);
  3766. lp[0] = tswap32(entry_1);
  3767. lp[1] = tswap32(entry_2);
  3768. return 0;
  3769. }
  3770. static abi_long do_get_thread_area(CPUX86State *env, abi_ulong ptr)
  3771. {
  3772. struct target_modify_ldt_ldt_s *target_ldt_info;
  3773. uint64_t *gdt_table = g2h(env->gdt.base);
  3774. uint32_t base_addr, limit, flags;
  3775. int seg_32bit, contents, read_exec_only, limit_in_pages, idx;
  3776. int seg_not_present, useable, lm;
  3777. uint32_t *lp, entry_1, entry_2;
  3778. lock_user_struct(VERIFY_WRITE, target_ldt_info, ptr, 1);
  3779. if (!target_ldt_info)
  3780. return -TARGET_EFAULT;
  3781. idx = tswap32(target_ldt_info->entry_number);
  3782. if (idx < TARGET_GDT_ENTRY_TLS_MIN ||
  3783. idx > TARGET_GDT_ENTRY_TLS_MAX) {
  3784. unlock_user_struct(target_ldt_info, ptr, 1);
  3785. return -TARGET_EINVAL;
  3786. }
  3787. lp = (uint32_t *)(gdt_table + idx);
  3788. entry_1 = tswap32(lp[0]);
  3789. entry_2 = tswap32(lp[1]);
  3790. read_exec_only = ((entry_2 >> 9) & 1) ^ 1;
  3791. contents = (entry_2 >> 10) & 3;
  3792. seg_not_present = ((entry_2 >> 15) & 1) ^ 1;
  3793. seg_32bit = (entry_2 >> 22) & 1;
  3794. limit_in_pages = (entry_2 >> 23) & 1;
  3795. useable = (entry_2 >> 20) & 1;
  3796. #ifdef TARGET_ABI32
  3797. lm = 0;
  3798. #else
  3799. lm = (entry_2 >> 21) & 1;
  3800. #endif
  3801. flags = (seg_32bit << 0) | (contents << 1) |
  3802. (read_exec_only << 3) | (limit_in_pages << 4) |
  3803. (seg_not_present << 5) | (useable << 6) | (lm << 7);
  3804. limit = (entry_1 & 0xffff) | (entry_2 & 0xf0000);
  3805. base_addr = (entry_1 >> 16) |
  3806. (entry_2 & 0xff000000) |
  3807. ((entry_2 & 0xff) << 16);
  3808. target_ldt_info->base_addr = tswapal(base_addr);
  3809. target_ldt_info->limit = tswap32(limit);
  3810. target_ldt_info->flags = tswap32(flags);
  3811. unlock_user_struct(target_ldt_info, ptr, 1);
  3812. return 0;
  3813. }
  3814. #endif /* TARGET_I386 && TARGET_ABI32 */
  3815. #ifndef TARGET_ABI32
  3816. static abi_long do_arch_prctl(CPUX86State *env, int code, abi_ulong addr)
  3817. {
  3818. abi_long ret = 0;
  3819. abi_ulong val;
  3820. int idx;
  3821. switch(code) {
  3822. case TARGET_ARCH_SET_GS:
  3823. case TARGET_ARCH_SET_FS:
  3824. if (code == TARGET_ARCH_SET_GS)
  3825. idx = R_GS;
  3826. else
  3827. idx = R_FS;
  3828. cpu_x86_load_seg(env, idx, 0);
  3829. env->segs[idx].base = addr;
  3830. break;
  3831. case TARGET_ARCH_GET_GS:
  3832. case TARGET_ARCH_GET_FS:
  3833. if (code == TARGET_ARCH_GET_GS)
  3834. idx = R_GS;
  3835. else
  3836. idx = R_FS;
  3837. val = env->segs[idx].base;
  3838. if (put_user(val, addr, abi_ulong))
  3839. ret = -TARGET_EFAULT;
  3840. break;
  3841. default:
  3842. ret = -TARGET_EINVAL;
  3843. break;
  3844. }
  3845. return ret;
  3846. }
  3847. #endif
  3848. #endif /* defined(TARGET_I386) */
  3849. #define NEW_STACK_SIZE 0x40000
  3850. #if defined(CONFIG_USE_NPTL)
  3851. static pthread_mutex_t clone_lock = PTHREAD_MUTEX_INITIALIZER;
  3852. typedef struct {
  3853. CPUArchState *env;
  3854. pthread_mutex_t mutex;
  3855. pthread_cond_t cond;
  3856. pthread_t thread;
  3857. uint32_t tid;
  3858. abi_ulong child_tidptr;
  3859. abi_ulong parent_tidptr;
  3860. sigset_t sigmask;
  3861. } new_thread_info;
  3862. static void *clone_func(void *arg)
  3863. {
  3864. new_thread_info *info = arg;
  3865. CPUArchState *env;
  3866. TaskState *ts;
  3867. env = info->env;
  3868. thread_env = env;
  3869. ts = (TaskState *)thread_env->opaque;
  3870. info->tid = gettid();
  3871. env->host_tid = info->tid;
  3872. task_settid(ts);
  3873. if (info->child_tidptr)
  3874. put_user_u32(info->tid, info->child_tidptr);
  3875. if (info->parent_tidptr)
  3876. put_user_u32(info->tid, info->parent_tidptr);
  3877. /* Enable signals. */
  3878. sigprocmask(SIG_SETMASK, &info->sigmask, NULL);
  3879. /* Signal to the parent that we're ready. */
  3880. pthread_mutex_lock(&info->mutex);
  3881. pthread_cond_broadcast(&info->cond);
  3882. pthread_mutex_unlock(&info->mutex);
  3883. /* Wait until the parent has finshed initializing the tls state. */
  3884. pthread_mutex_lock(&clone_lock);
  3885. pthread_mutex_unlock(&clone_lock);
  3886. cpu_loop(env);
  3887. /* never exits */
  3888. return NULL;
  3889. }
  3890. #else
  3891. static int clone_func(void *arg)
  3892. {
  3893. CPUArchState *env = arg;
  3894. cpu_loop(env);
  3895. /* never exits */
  3896. return 0;
  3897. }
  3898. #endif
  3899. /* do_fork() Must return host values and target errnos (unlike most
  3900. do_*() functions). */
  3901. static int do_fork(CPUArchState *env, unsigned int flags, abi_ulong newsp,
  3902. abi_ulong parent_tidptr, target_ulong newtls,
  3903. abi_ulong child_tidptr)
  3904. {
  3905. int ret;
  3906. TaskState *ts;
  3907. CPUArchState *new_env;
  3908. #if defined(CONFIG_USE_NPTL)
  3909. unsigned int nptl_flags;
  3910. sigset_t sigmask;
  3911. #else
  3912. uint8_t *new_stack;
  3913. #endif
  3914. /* Emulate vfork() with fork() */
  3915. if (flags & CLONE_VFORK)
  3916. flags &= ~(CLONE_VFORK | CLONE_VM);
  3917. if (flags & CLONE_VM) {
  3918. TaskState *parent_ts = (TaskState *)env->opaque;
  3919. #if defined(CONFIG_USE_NPTL)
  3920. new_thread_info info;
  3921. pthread_attr_t attr;
  3922. #endif
  3923. ts = g_malloc0(sizeof(TaskState));
  3924. init_task_state(ts);
  3925. /* we create a new CPU instance. */
  3926. new_env = cpu_copy(env);
  3927. #if defined(TARGET_I386) || defined(TARGET_SPARC) || defined(TARGET_PPC)
  3928. cpu_reset(ENV_GET_CPU(new_env));
  3929. #endif
  3930. /* Init regs that differ from the parent. */
  3931. cpu_clone_regs(new_env, newsp);
  3932. new_env->opaque = ts;
  3933. ts->bprm = parent_ts->bprm;
  3934. ts->info = parent_ts->info;
  3935. #if defined(CONFIG_USE_NPTL)
  3936. nptl_flags = flags;
  3937. flags &= ~CLONE_NPTL_FLAGS2;
  3938. if (nptl_flags & CLONE_CHILD_CLEARTID) {
  3939. ts->child_tidptr = child_tidptr;
  3940. }
  3941. if (nptl_flags & CLONE_SETTLS)
  3942. cpu_set_tls (new_env, newtls);
  3943. /* Grab a mutex so that thread setup appears atomic. */
  3944. pthread_mutex_lock(&clone_lock);
  3945. memset(&info, 0, sizeof(info));
  3946. pthread_mutex_init(&info.mutex, NULL);
  3947. pthread_mutex_lock(&info.mutex);
  3948. pthread_cond_init(&info.cond, NULL);
  3949. info.env = new_env;
  3950. if (nptl_flags & CLONE_CHILD_SETTID)
  3951. info.child_tidptr = child_tidptr;
  3952. if (nptl_flags & CLONE_PARENT_SETTID)
  3953. info.parent_tidptr = parent_tidptr;
  3954. ret = pthread_attr_init(&attr);
  3955. ret = pthread_attr_setstacksize(&attr, NEW_STACK_SIZE);
  3956. ret = pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED);
  3957. /* It is not safe to deliver signals until the child has finished
  3958. initializing, so temporarily block all signals. */
  3959. sigfillset(&sigmask);
  3960. sigprocmask(SIG_BLOCK, &sigmask, &info.sigmask);
  3961. ret = pthread_create(&info.thread, &attr, clone_func, &info);
  3962. /* TODO: Free new CPU state if thread creation failed. */
  3963. sigprocmask(SIG_SETMASK, &info.sigmask, NULL);
  3964. pthread_attr_destroy(&attr);
  3965. if (ret == 0) {
  3966. /* Wait for the child to initialize. */
  3967. pthread_cond_wait(&info.cond, &info.mutex);
  3968. ret = info.tid;
  3969. if (flags & CLONE_PARENT_SETTID)
  3970. put_user_u32(ret, parent_tidptr);
  3971. } else {
  3972. ret = -1;
  3973. }
  3974. pthread_mutex_unlock(&info.mutex);
  3975. pthread_cond_destroy(&info.cond);
  3976. pthread_mutex_destroy(&info.mutex);
  3977. pthread_mutex_unlock(&clone_lock);
  3978. #else
  3979. if (flags & CLONE_NPTL_FLAGS2)
  3980. return -EINVAL;
  3981. /* This is probably going to die very quickly, but do it anyway. */
  3982. new_stack = g_malloc0 (NEW_STACK_SIZE);
  3983. #ifdef __ia64__
  3984. ret = __clone2(clone_func, new_stack, NEW_STACK_SIZE, flags, new_env);
  3985. #else
  3986. ret = clone(clone_func, new_stack + NEW_STACK_SIZE, flags, new_env);
  3987. #endif
  3988. #endif
  3989. } else {
  3990. /* if no CLONE_VM, we consider it is a fork */
  3991. if ((flags & ~(CSIGNAL | CLONE_NPTL_FLAGS2)) != 0)
  3992. return -EINVAL;
  3993. fork_start();
  3994. ret = fork();
  3995. if (ret == 0) {
  3996. /* Child Process. */
  3997. cpu_clone_regs(env, newsp);
  3998. fork_end(1);
  3999. #if defined(CONFIG_USE_NPTL)
  4000. /* There is a race condition here. The parent process could
  4001. theoretically read the TID in the child process before the child
  4002. tid is set. This would require using either ptrace
  4003. (not implemented) or having *_tidptr to point at a shared memory
  4004. mapping. We can't repeat the spinlock hack used above because
  4005. the child process gets its own copy of the lock. */
  4006. if (flags & CLONE_CHILD_SETTID)
  4007. put_user_u32(gettid(), child_tidptr);
  4008. if (flags & CLONE_PARENT_SETTID)
  4009. put_user_u32(gettid(), parent_tidptr);
  4010. ts = (TaskState *)env->opaque;
  4011. if (flags & CLONE_SETTLS)
  4012. cpu_set_tls (env, newtls);
  4013. if (flags & CLONE_CHILD_CLEARTID)
  4014. ts->child_tidptr = child_tidptr;
  4015. #endif
  4016. } else {
  4017. fork_end(0);
  4018. }
  4019. }
  4020. return ret;
  4021. }
  4022. /* warning : doesn't handle linux specific flags... */
  4023. static int target_to_host_fcntl_cmd(int cmd)
  4024. {
  4025. switch(cmd) {
  4026. case TARGET_F_DUPFD:
  4027. case TARGET_F_GETFD:
  4028. case TARGET_F_SETFD:
  4029. case TARGET_F_GETFL:
  4030. case TARGET_F_SETFL:
  4031. return cmd;
  4032. case TARGET_F_GETLK:
  4033. return F_GETLK;
  4034. case TARGET_F_SETLK:
  4035. return F_SETLK;
  4036. case TARGET_F_SETLKW:
  4037. return F_SETLKW;
  4038. case TARGET_F_GETOWN:
  4039. return F_GETOWN;
  4040. case TARGET_F_SETOWN:
  4041. return F_SETOWN;
  4042. case TARGET_F_GETSIG:
  4043. return F_GETSIG;
  4044. case TARGET_F_SETSIG:
  4045. return F_SETSIG;
  4046. #if TARGET_ABI_BITS == 32
  4047. case TARGET_F_GETLK64:
  4048. return F_GETLK64;
  4049. case TARGET_F_SETLK64:
  4050. return F_SETLK64;
  4051. case TARGET_F_SETLKW64:
  4052. return F_SETLKW64;
  4053. #endif
  4054. case TARGET_F_SETLEASE:
  4055. return F_SETLEASE;
  4056. case TARGET_F_GETLEASE:
  4057. return F_GETLEASE;
  4058. #ifdef F_DUPFD_CLOEXEC
  4059. case TARGET_F_DUPFD_CLOEXEC:
  4060. return F_DUPFD_CLOEXEC;
  4061. #endif
  4062. case TARGET_F_NOTIFY:
  4063. return F_NOTIFY;
  4064. default:
  4065. return -TARGET_EINVAL;
  4066. }
  4067. return -TARGET_EINVAL;
  4068. }
  4069. #define TRANSTBL_CONVERT(a) { -1, TARGET_##a, -1, a }
  4070. static const bitmask_transtbl flock_tbl[] = {
  4071. TRANSTBL_CONVERT(F_RDLCK),
  4072. TRANSTBL_CONVERT(F_WRLCK),
  4073. TRANSTBL_CONVERT(F_UNLCK),
  4074. TRANSTBL_CONVERT(F_EXLCK),
  4075. TRANSTBL_CONVERT(F_SHLCK),
  4076. { 0, 0, 0, 0 }
  4077. };
  4078. static abi_long do_fcntl(int fd, int cmd, abi_ulong arg)
  4079. {
  4080. struct flock fl;
  4081. struct target_flock *target_fl;
  4082. struct flock64 fl64;
  4083. struct target_flock64 *target_fl64;
  4084. abi_long ret;
  4085. int host_cmd = target_to_host_fcntl_cmd(cmd);
  4086. if (host_cmd == -TARGET_EINVAL)
  4087. return host_cmd;
  4088. switch(cmd) {
  4089. case TARGET_F_GETLK:
  4090. if (!lock_user_struct(VERIFY_READ, target_fl, arg, 1))
  4091. return -TARGET_EFAULT;
  4092. fl.l_type =
  4093. target_to_host_bitmask(tswap16(target_fl->l_type), flock_tbl);
  4094. fl.l_whence = tswap16(target_fl->l_whence);
  4095. fl.l_start = tswapal(target_fl->l_start);
  4096. fl.l_len = tswapal(target_fl->l_len);
  4097. fl.l_pid = tswap32(target_fl->l_pid);
  4098. unlock_user_struct(target_fl, arg, 0);
  4099. ret = get_errno(fcntl(fd, host_cmd, &fl));
  4100. if (ret == 0) {
  4101. if (!lock_user_struct(VERIFY_WRITE, target_fl, arg, 0))
  4102. return -TARGET_EFAULT;
  4103. target_fl->l_type =
  4104. host_to_target_bitmask(tswap16(fl.l_type), flock_tbl);
  4105. target_fl->l_whence = tswap16(fl.l_whence);
  4106. target_fl->l_start = tswapal(fl.l_start);
  4107. target_fl->l_len = tswapal(fl.l_len);
  4108. target_fl->l_pid = tswap32(fl.l_pid);
  4109. unlock_user_struct(target_fl, arg, 1);
  4110. }
  4111. break;
  4112. case TARGET_F_SETLK:
  4113. case TARGET_F_SETLKW:
  4114. if (!lock_user_struct(VERIFY_READ, target_fl, arg, 1))
  4115. return -TARGET_EFAULT;
  4116. fl.l_type =
  4117. target_to_host_bitmask(tswap16(target_fl->l_type), flock_tbl);
  4118. fl.l_whence = tswap16(target_fl->l_whence);
  4119. fl.l_start = tswapal(target_fl->l_start);
  4120. fl.l_len = tswapal(target_fl->l_len);
  4121. fl.l_pid = tswap32(target_fl->l_pid);
  4122. unlock_user_struct(target_fl, arg, 0);
  4123. ret = get_errno(fcntl(fd, host_cmd, &fl));
  4124. break;
  4125. case TARGET_F_GETLK64:
  4126. if (!lock_user_struct(VERIFY_READ, target_fl64, arg, 1))
  4127. return -TARGET_EFAULT;
  4128. fl64.l_type =
  4129. target_to_host_bitmask(tswap16(target_fl64->l_type), flock_tbl) >> 1;
  4130. fl64.l_whence = tswap16(target_fl64->l_whence);
  4131. fl64.l_start = tswap64(target_fl64->l_start);
  4132. fl64.l_len = tswap64(target_fl64->l_len);
  4133. fl64.l_pid = tswap32(target_fl64->l_pid);
  4134. unlock_user_struct(target_fl64, arg, 0);
  4135. ret = get_errno(fcntl(fd, host_cmd, &fl64));
  4136. if (ret == 0) {
  4137. if (!lock_user_struct(VERIFY_WRITE, target_fl64, arg, 0))
  4138. return -TARGET_EFAULT;
  4139. target_fl64->l_type =
  4140. host_to_target_bitmask(tswap16(fl64.l_type), flock_tbl) >> 1;
  4141. target_fl64->l_whence = tswap16(fl64.l_whence);
  4142. target_fl64->l_start = tswap64(fl64.l_start);
  4143. target_fl64->l_len = tswap64(fl64.l_len);
  4144. target_fl64->l_pid = tswap32(fl64.l_pid);
  4145. unlock_user_struct(target_fl64, arg, 1);
  4146. }
  4147. break;
  4148. case TARGET_F_SETLK64:
  4149. case TARGET_F_SETLKW64:
  4150. if (!lock_user_struct(VERIFY_READ, target_fl64, arg, 1))
  4151. return -TARGET_EFAULT;
  4152. fl64.l_type =
  4153. target_to_host_bitmask(tswap16(target_fl64->l_type), flock_tbl) >> 1;
  4154. fl64.l_whence = tswap16(target_fl64->l_whence);
  4155. fl64.l_start = tswap64(target_fl64->l_start);
  4156. fl64.l_len = tswap64(target_fl64->l_len);
  4157. fl64.l_pid = tswap32(target_fl64->l_pid);
  4158. unlock_user_struct(target_fl64, arg, 0);
  4159. ret = get_errno(fcntl(fd, host_cmd, &fl64));
  4160. break;
  4161. case TARGET_F_GETFL:
  4162. ret = get_errno(fcntl(fd, host_cmd, arg));
  4163. if (ret >= 0) {
  4164. ret = host_to_target_bitmask(ret, fcntl_flags_tbl);
  4165. }
  4166. break;
  4167. case TARGET_F_SETFL:
  4168. ret = get_errno(fcntl(fd, host_cmd, target_to_host_bitmask(arg, fcntl_flags_tbl)));
  4169. break;
  4170. case TARGET_F_SETOWN:
  4171. case TARGET_F_GETOWN:
  4172. case TARGET_F_SETSIG:
  4173. case TARGET_F_GETSIG:
  4174. case TARGET_F_SETLEASE:
  4175. case TARGET_F_GETLEASE:
  4176. ret = get_errno(fcntl(fd, host_cmd, arg));
  4177. break;
  4178. default:
  4179. ret = get_errno(fcntl(fd, cmd, arg));
  4180. break;
  4181. }
  4182. return ret;
  4183. }
  4184. #ifdef USE_UID16
  4185. static inline int high2lowuid(int uid)
  4186. {
  4187. if (uid > 65535)
  4188. return 65534;
  4189. else
  4190. return uid;
  4191. }
  4192. static inline int high2lowgid(int gid)
  4193. {
  4194. if (gid > 65535)
  4195. return 65534;
  4196. else
  4197. return gid;
  4198. }
  4199. static inline int low2highuid(int uid)
  4200. {
  4201. if ((int16_t)uid == -1)
  4202. return -1;
  4203. else
  4204. return uid;
  4205. }
  4206. static inline int low2highgid(int gid)
  4207. {
  4208. if ((int16_t)gid == -1)
  4209. return -1;
  4210. else
  4211. return gid;
  4212. }
  4213. static inline int tswapid(int id)
  4214. {
  4215. return tswap16(id);
  4216. }
  4217. #else /* !USE_UID16 */
  4218. static inline int high2lowuid(int uid)
  4219. {
  4220. return uid;
  4221. }
  4222. static inline int high2lowgid(int gid)
  4223. {
  4224. return gid;
  4225. }
  4226. static inline int low2highuid(int uid)
  4227. {
  4228. return uid;
  4229. }
  4230. static inline int low2highgid(int gid)
  4231. {
  4232. return gid;
  4233. }
  4234. static inline int tswapid(int id)
  4235. {
  4236. return tswap32(id);
  4237. }
  4238. #endif /* USE_UID16 */
  4239. void syscall_init(void)
  4240. {
  4241. IOCTLEntry *ie;
  4242. const argtype *arg_type;
  4243. int size;
  4244. int i;
  4245. #define STRUCT(name, ...) thunk_register_struct(STRUCT_ ## name, #name, struct_ ## name ## _def);
  4246. #define STRUCT_SPECIAL(name) thunk_register_struct_direct(STRUCT_ ## name, #name, &struct_ ## name ## _def);
  4247. #include "syscall_types.h"
  4248. #undef STRUCT
  4249. #undef STRUCT_SPECIAL
  4250. /* Build target_to_host_errno_table[] table from
  4251. * host_to_target_errno_table[]. */
  4252. for (i = 0; i < ERRNO_TABLE_SIZE; i++) {
  4253. target_to_host_errno_table[host_to_target_errno_table[i]] = i;
  4254. }
  4255. /* we patch the ioctl size if necessary. We rely on the fact that
  4256. no ioctl has all the bits at '1' in the size field */
  4257. ie = ioctl_entries;
  4258. while (ie->target_cmd != 0) {
  4259. if (((ie->target_cmd >> TARGET_IOC_SIZESHIFT) & TARGET_IOC_SIZEMASK) ==
  4260. TARGET_IOC_SIZEMASK) {
  4261. arg_type = ie->arg_type;
  4262. if (arg_type[0] != TYPE_PTR) {
  4263. fprintf(stderr, "cannot patch size for ioctl 0x%x\n",
  4264. ie->target_cmd);
  4265. exit(1);
  4266. }
  4267. arg_type++;
  4268. size = thunk_type_size(arg_type, 0);
  4269. ie->target_cmd = (ie->target_cmd &
  4270. ~(TARGET_IOC_SIZEMASK << TARGET_IOC_SIZESHIFT)) |
  4271. (size << TARGET_IOC_SIZESHIFT);
  4272. }
  4273. /* automatic consistency check if same arch */
  4274. #if (defined(__i386__) && defined(TARGET_I386) && defined(TARGET_ABI32)) || \
  4275. (defined(__x86_64__) && defined(TARGET_X86_64))
  4276. if (unlikely(ie->target_cmd != ie->host_cmd)) {
  4277. fprintf(stderr, "ERROR: ioctl(%s): target=0x%x host=0x%x\n",
  4278. ie->name, ie->target_cmd, ie->host_cmd);
  4279. }
  4280. #endif
  4281. ie++;
  4282. }
  4283. }
  4284. #if TARGET_ABI_BITS == 32
  4285. static inline uint64_t target_offset64(uint32_t word0, uint32_t word1)
  4286. {
  4287. #ifdef TARGET_WORDS_BIGENDIAN
  4288. return ((uint64_t)word0 << 32) | word1;
  4289. #else
  4290. return ((uint64_t)word1 << 32) | word0;
  4291. #endif
  4292. }
  4293. #else /* TARGET_ABI_BITS == 32 */
  4294. static inline uint64_t target_offset64(uint64_t word0, uint64_t word1)
  4295. {
  4296. return word0;
  4297. }
  4298. #endif /* TARGET_ABI_BITS != 32 */
  4299. #ifdef TARGET_NR_truncate64
  4300. static inline abi_long target_truncate64(void *cpu_env, const char *arg1,
  4301. abi_long arg2,
  4302. abi_long arg3,
  4303. abi_long arg4)
  4304. {
  4305. if (regpairs_aligned(cpu_env)) {
  4306. arg2 = arg3;
  4307. arg3 = arg4;
  4308. }
  4309. return get_errno(truncate64(arg1, target_offset64(arg2, arg3)));
  4310. }
  4311. #endif
  4312. #ifdef TARGET_NR_ftruncate64
  4313. static inline abi_long target_ftruncate64(void *cpu_env, abi_long arg1,
  4314. abi_long arg2,
  4315. abi_long arg3,
  4316. abi_long arg4)
  4317. {
  4318. if (regpairs_aligned(cpu_env)) {
  4319. arg2 = arg3;
  4320. arg3 = arg4;
  4321. }
  4322. return get_errno(ftruncate64(arg1, target_offset64(arg2, arg3)));
  4323. }
  4324. #endif
  4325. static inline abi_long target_to_host_timespec(struct timespec *host_ts,
  4326. abi_ulong target_addr)
  4327. {
  4328. struct target_timespec *target_ts;
  4329. if (!lock_user_struct(VERIFY_READ, target_ts, target_addr, 1))
  4330. return -TARGET_EFAULT;
  4331. host_ts->tv_sec = tswapal(target_ts->tv_sec);
  4332. host_ts->tv_nsec = tswapal(target_ts->tv_nsec);
  4333. unlock_user_struct(target_ts, target_addr, 0);
  4334. return 0;
  4335. }
  4336. static inline abi_long host_to_target_timespec(abi_ulong target_addr,
  4337. struct timespec *host_ts)
  4338. {
  4339. struct target_timespec *target_ts;
  4340. if (!lock_user_struct(VERIFY_WRITE, target_ts, target_addr, 0))
  4341. return -TARGET_EFAULT;
  4342. target_ts->tv_sec = tswapal(host_ts->tv_sec);
  4343. target_ts->tv_nsec = tswapal(host_ts->tv_nsec);
  4344. unlock_user_struct(target_ts, target_addr, 1);
  4345. return 0;
  4346. }
  4347. #if defined(TARGET_NR_stat64) || defined(TARGET_NR_newfstatat)
  4348. static inline abi_long host_to_target_stat64(void *cpu_env,
  4349. abi_ulong target_addr,
  4350. struct stat *host_st)
  4351. {
  4352. #ifdef TARGET_ARM
  4353. if (((CPUARMState *)cpu_env)->eabi) {
  4354. struct target_eabi_stat64 *target_st;
  4355. if (!lock_user_struct(VERIFY_WRITE, target_st, target_addr, 0))
  4356. return -TARGET_EFAULT;
  4357. memset(target_st, 0, sizeof(struct target_eabi_stat64));
  4358. __put_user(host_st->st_dev, &target_st->st_dev);
  4359. __put_user(host_st->st_ino, &target_st->st_ino);
  4360. #ifdef TARGET_STAT64_HAS_BROKEN_ST_INO
  4361. __put_user(host_st->st_ino, &target_st->__st_ino);
  4362. #endif
  4363. __put_user(host_st->st_mode, &target_st->st_mode);
  4364. __put_user(host_st->st_nlink, &target_st->st_nlink);
  4365. __put_user(host_st->st_uid, &target_st->st_uid);
  4366. __put_user(host_st->st_gid, &target_st->st_gid);
  4367. __put_user(host_st->st_rdev, &target_st->st_rdev);
  4368. __put_user(host_st->st_size, &target_st->st_size);
  4369. __put_user(host_st->st_blksize, &target_st->st_blksize);
  4370. __put_user(host_st->st_blocks, &target_st->st_blocks);
  4371. __put_user(host_st->st_atime, &target_st->target_st_atime);
  4372. __put_user(host_st->st_mtime, &target_st->target_st_mtime);
  4373. __put_user(host_st->st_ctime, &target_st->target_st_ctime);
  4374. unlock_user_struct(target_st, target_addr, 1);
  4375. } else
  4376. #endif
  4377. {
  4378. #if TARGET_ABI_BITS == 64 && !defined(TARGET_ALPHA)
  4379. struct target_stat *target_st;
  4380. #else
  4381. struct target_stat64 *target_st;
  4382. #endif
  4383. if (!lock_user_struct(VERIFY_WRITE, target_st, target_addr, 0))
  4384. return -TARGET_EFAULT;
  4385. memset(target_st, 0, sizeof(*target_st));
  4386. __put_user(host_st->st_dev, &target_st->st_dev);
  4387. __put_user(host_st->st_ino, &target_st->st_ino);
  4388. #ifdef TARGET_STAT64_HAS_BROKEN_ST_INO
  4389. __put_user(host_st->st_ino, &target_st->__st_ino);
  4390. #endif
  4391. __put_user(host_st->st_mode, &target_st->st_mode);
  4392. __put_user(host_st->st_nlink, &target_st->st_nlink);
  4393. __put_user(host_st->st_uid, &target_st->st_uid);
  4394. __put_user(host_st->st_gid, &target_st->st_gid);
  4395. __put_user(host_st->st_rdev, &target_st->st_rdev);
  4396. /* XXX: better use of kernel struct */
  4397. __put_user(host_st->st_size, &target_st->st_size);
  4398. __put_user(host_st->st_blksize, &target_st->st_blksize);
  4399. __put_user(host_st->st_blocks, &target_st->st_blocks);
  4400. __put_user(host_st->st_atime, &target_st->target_st_atime);
  4401. __put_user(host_st->st_mtime, &target_st->target_st_mtime);
  4402. __put_user(host_st->st_ctime, &target_st->target_st_ctime);
  4403. unlock_user_struct(target_st, target_addr, 1);
  4404. }
  4405. return 0;
  4406. }
  4407. #endif
  4408. #if defined(CONFIG_USE_NPTL)
  4409. /* ??? Using host futex calls even when target atomic operations
  4410. are not really atomic probably breaks things. However implementing
  4411. futexes locally would make futexes shared between multiple processes
  4412. tricky. However they're probably useless because guest atomic
  4413. operations won't work either. */
  4414. static int do_futex(target_ulong uaddr, int op, int val, target_ulong timeout,
  4415. target_ulong uaddr2, int val3)
  4416. {
  4417. struct timespec ts, *pts;
  4418. int base_op;
  4419. /* ??? We assume FUTEX_* constants are the same on both host
  4420. and target. */
  4421. #ifdef FUTEX_CMD_MASK
  4422. base_op = op & FUTEX_CMD_MASK;
  4423. #else
  4424. base_op = op;
  4425. #endif
  4426. switch (base_op) {
  4427. case FUTEX_WAIT:
  4428. case FUTEX_WAIT_BITSET:
  4429. if (timeout) {
  4430. pts = &ts;
  4431. target_to_host_timespec(pts, timeout);
  4432. } else {
  4433. pts = NULL;
  4434. }
  4435. return get_errno(sys_futex(g2h(uaddr), op, tswap32(val),
  4436. pts, NULL, val3));
  4437. case FUTEX_WAKE:
  4438. return get_errno(sys_futex(g2h(uaddr), op, val, NULL, NULL, 0));
  4439. case FUTEX_FD:
  4440. return get_errno(sys_futex(g2h(uaddr), op, val, NULL, NULL, 0));
  4441. case FUTEX_REQUEUE:
  4442. case FUTEX_CMP_REQUEUE:
  4443. case FUTEX_WAKE_OP:
  4444. /* For FUTEX_REQUEUE, FUTEX_CMP_REQUEUE, and FUTEX_WAKE_OP, the
  4445. TIMEOUT parameter is interpreted as a uint32_t by the kernel.
  4446. But the prototype takes a `struct timespec *'; insert casts
  4447. to satisfy the compiler. We do not need to tswap TIMEOUT
  4448. since it's not compared to guest memory. */
  4449. pts = (struct timespec *)(uintptr_t) timeout;
  4450. return get_errno(sys_futex(g2h(uaddr), op, val, pts,
  4451. g2h(uaddr2),
  4452. (base_op == FUTEX_CMP_REQUEUE
  4453. ? tswap32(val3)
  4454. : val3)));
  4455. default:
  4456. return -TARGET_ENOSYS;
  4457. }
  4458. }
  4459. #endif
  4460. /* Map host to target signal numbers for the wait family of syscalls.
  4461. Assume all other status bits are the same. */
  4462. int host_to_target_waitstatus(int status)
  4463. {
  4464. if (WIFSIGNALED(status)) {
  4465. return host_to_target_signal(WTERMSIG(status)) | (status & ~0x7f);
  4466. }
  4467. if (WIFSTOPPED(status)) {
  4468. return (host_to_target_signal(WSTOPSIG(status)) << 8)
  4469. | (status & 0xff);
  4470. }
  4471. return status;
  4472. }
  4473. int get_osversion(void)
  4474. {
  4475. static int osversion;
  4476. struct new_utsname buf;
  4477. const char *s;
  4478. int i, n, tmp;
  4479. if (osversion)
  4480. return osversion;
  4481. if (qemu_uname_release && *qemu_uname_release) {
  4482. s = qemu_uname_release;
  4483. } else {
  4484. if (sys_uname(&buf))
  4485. return 0;
  4486. s = buf.release;
  4487. }
  4488. tmp = 0;
  4489. for (i = 0; i < 3; i++) {
  4490. n = 0;
  4491. while (*s >= '0' && *s <= '9') {
  4492. n *= 10;
  4493. n += *s - '0';
  4494. s++;
  4495. }
  4496. tmp = (tmp << 8) + n;
  4497. if (*s == '.')
  4498. s++;
  4499. }
  4500. osversion = tmp;
  4501. return osversion;
  4502. }
  4503. static int open_self_maps(void *cpu_env, int fd)
  4504. {
  4505. #if defined(TARGET_ARM) || defined(TARGET_M68K) || defined(TARGET_UNICORE32)
  4506. TaskState *ts = ((CPUArchState *)cpu_env)->opaque;
  4507. #endif
  4508. FILE *fp;
  4509. char *line = NULL;
  4510. size_t len = 0;
  4511. ssize_t read;
  4512. fp = fopen("/proc/self/maps", "r");
  4513. if (fp == NULL) {
  4514. return -EACCES;
  4515. }
  4516. while ((read = getline(&line, &len, fp)) != -1) {
  4517. int fields, dev_maj, dev_min, inode;
  4518. uint64_t min, max, offset;
  4519. char flag_r, flag_w, flag_x, flag_p;
  4520. char path[512] = "";
  4521. fields = sscanf(line, "%"PRIx64"-%"PRIx64" %c%c%c%c %"PRIx64" %x:%x %d"
  4522. " %512s", &min, &max, &flag_r, &flag_w, &flag_x,
  4523. &flag_p, &offset, &dev_maj, &dev_min, &inode, path);
  4524. if ((fields < 10) || (fields > 11)) {
  4525. continue;
  4526. }
  4527. if (!strncmp(path, "[stack]", 7)) {
  4528. continue;
  4529. }
  4530. if (h2g_valid(min) && h2g_valid(max)) {
  4531. dprintf(fd, TARGET_ABI_FMT_lx "-" TARGET_ABI_FMT_lx
  4532. " %c%c%c%c %08" PRIx64 " %02x:%02x %d%s%s\n",
  4533. h2g(min), h2g(max), flag_r, flag_w,
  4534. flag_x, flag_p, offset, dev_maj, dev_min, inode,
  4535. path[0] ? " " : "", path);
  4536. }
  4537. }
  4538. free(line);
  4539. fclose(fp);
  4540. #if defined(TARGET_ARM) || defined(TARGET_M68K) || defined(TARGET_UNICORE32)
  4541. dprintf(fd, "%08llx-%08llx rw-p %08llx 00:00 0 [stack]\n",
  4542. (unsigned long long)ts->info->stack_limit,
  4543. (unsigned long long)(ts->info->start_stack +
  4544. (TARGET_PAGE_SIZE - 1)) & TARGET_PAGE_MASK,
  4545. (unsigned long long)0);
  4546. #endif
  4547. return 0;
  4548. }
  4549. static int open_self_stat(void *cpu_env, int fd)
  4550. {
  4551. TaskState *ts = ((CPUArchState *)cpu_env)->opaque;
  4552. abi_ulong start_stack = ts->info->start_stack;
  4553. int i;
  4554. for (i = 0; i < 44; i++) {
  4555. char buf[128];
  4556. int len;
  4557. uint64_t val = 0;
  4558. if (i == 0) {
  4559. /* pid */
  4560. val = getpid();
  4561. snprintf(buf, sizeof(buf), "%"PRId64 " ", val);
  4562. } else if (i == 1) {
  4563. /* app name */
  4564. snprintf(buf, sizeof(buf), "(%s) ", ts->bprm->argv[0]);
  4565. } else if (i == 27) {
  4566. /* stack bottom */
  4567. val = start_stack;
  4568. snprintf(buf, sizeof(buf), "%"PRId64 " ", val);
  4569. } else {
  4570. /* for the rest, there is MasterCard */
  4571. snprintf(buf, sizeof(buf), "0%c", i == 43 ? '\n' : ' ');
  4572. }
  4573. len = strlen(buf);
  4574. if (write(fd, buf, len) != len) {
  4575. return -1;
  4576. }
  4577. }
  4578. return 0;
  4579. }
  4580. static int open_self_auxv(void *cpu_env, int fd)
  4581. {
  4582. TaskState *ts = ((CPUArchState *)cpu_env)->opaque;
  4583. abi_ulong auxv = ts->info->saved_auxv;
  4584. abi_ulong len = ts->info->auxv_len;
  4585. char *ptr;
  4586. /*
  4587. * Auxiliary vector is stored in target process stack.
  4588. * read in whole auxv vector and copy it to file
  4589. */
  4590. ptr = lock_user(VERIFY_READ, auxv, len, 0);
  4591. if (ptr != NULL) {
  4592. while (len > 0) {
  4593. ssize_t r;
  4594. r = write(fd, ptr, len);
  4595. if (r <= 0) {
  4596. break;
  4597. }
  4598. len -= r;
  4599. ptr += r;
  4600. }
  4601. lseek(fd, 0, SEEK_SET);
  4602. unlock_user(ptr, auxv, len);
  4603. }
  4604. return 0;
  4605. }
  4606. static int do_open(void *cpu_env, const char *pathname, int flags, mode_t mode)
  4607. {
  4608. struct fake_open {
  4609. const char *filename;
  4610. int (*fill)(void *cpu_env, int fd);
  4611. };
  4612. const struct fake_open *fake_open;
  4613. static const struct fake_open fakes[] = {
  4614. { "/proc/self/maps", open_self_maps },
  4615. { "/proc/self/stat", open_self_stat },
  4616. { "/proc/self/auxv", open_self_auxv },
  4617. { NULL, NULL }
  4618. };
  4619. for (fake_open = fakes; fake_open->filename; fake_open++) {
  4620. if (!strncmp(pathname, fake_open->filename,
  4621. strlen(fake_open->filename))) {
  4622. break;
  4623. }
  4624. }
  4625. if (fake_open->filename) {
  4626. const char *tmpdir;
  4627. char filename[PATH_MAX];
  4628. int fd, r;
  4629. /* create temporary file to map stat to */
  4630. tmpdir = getenv("TMPDIR");
  4631. if (!tmpdir)
  4632. tmpdir = "/tmp";
  4633. snprintf(filename, sizeof(filename), "%s/qemu-open.XXXXXX", tmpdir);
  4634. fd = mkstemp(filename);
  4635. if (fd < 0) {
  4636. return fd;
  4637. }
  4638. unlink(filename);
  4639. if ((r = fake_open->fill(cpu_env, fd))) {
  4640. close(fd);
  4641. return r;
  4642. }
  4643. lseek(fd, 0, SEEK_SET);
  4644. return fd;
  4645. }
  4646. return get_errno(open(path(pathname), flags, mode));
  4647. }
  4648. /* do_syscall() should always have a single exit point at the end so
  4649. that actions, such as logging of syscall results, can be performed.
  4650. All errnos that do_syscall() returns must be -TARGET_<errcode>. */
  4651. abi_long do_syscall(void *cpu_env, int num, abi_long arg1,
  4652. abi_long arg2, abi_long arg3, abi_long arg4,
  4653. abi_long arg5, abi_long arg6, abi_long arg7,
  4654. abi_long arg8)
  4655. {
  4656. abi_long ret;
  4657. struct stat st;
  4658. struct statfs stfs;
  4659. void *p;
  4660. #ifdef DEBUG
  4661. gemu_log("syscall %d", num);
  4662. #endif
  4663. if(do_strace)
  4664. print_syscall(num, arg1, arg2, arg3, arg4, arg5, arg6);
  4665. switch(num) {
  4666. case TARGET_NR_exit:
  4667. #ifdef CONFIG_USE_NPTL
  4668. /* In old applications this may be used to implement _exit(2).
  4669. However in threaded applictions it is used for thread termination,
  4670. and _exit_group is used for application termination.
  4671. Do thread termination if we have more then one thread. */
  4672. /* FIXME: This probably breaks if a signal arrives. We should probably
  4673. be disabling signals. */
  4674. if (first_cpu->next_cpu) {
  4675. TaskState *ts;
  4676. CPUArchState **lastp;
  4677. CPUArchState *p;
  4678. cpu_list_lock();
  4679. lastp = &first_cpu;
  4680. p = first_cpu;
  4681. while (p && p != (CPUArchState *)cpu_env) {
  4682. lastp = &p->next_cpu;
  4683. p = p->next_cpu;
  4684. }
  4685. /* If we didn't find the CPU for this thread then something is
  4686. horribly wrong. */
  4687. if (!p)
  4688. abort();
  4689. /* Remove the CPU from the list. */
  4690. *lastp = p->next_cpu;
  4691. cpu_list_unlock();
  4692. ts = ((CPUArchState *)cpu_env)->opaque;
  4693. if (ts->child_tidptr) {
  4694. put_user_u32(0, ts->child_tidptr);
  4695. sys_futex(g2h(ts->child_tidptr), FUTEX_WAKE, INT_MAX,
  4696. NULL, NULL, 0);
  4697. }
  4698. thread_env = NULL;
  4699. object_unref(OBJECT(ENV_GET_CPU(cpu_env)));
  4700. g_free(ts);
  4701. pthread_exit(NULL);
  4702. }
  4703. #endif
  4704. #ifdef TARGET_GPROF
  4705. _mcleanup();
  4706. #endif
  4707. gdb_exit(cpu_env, arg1);
  4708. _exit(arg1);
  4709. ret = 0; /* avoid warning */
  4710. break;
  4711. case TARGET_NR_read:
  4712. if (arg3 == 0)
  4713. ret = 0;
  4714. else {
  4715. if (!(p = lock_user(VERIFY_WRITE, arg2, arg3, 0)))
  4716. goto efault;
  4717. ret = get_errno(read(arg1, p, arg3));
  4718. unlock_user(p, arg2, ret);
  4719. }
  4720. break;
  4721. case TARGET_NR_write:
  4722. if (!(p = lock_user(VERIFY_READ, arg2, arg3, 1)))
  4723. goto efault;
  4724. ret = get_errno(write(arg1, p, arg3));
  4725. unlock_user(p, arg2, 0);
  4726. break;
  4727. case TARGET_NR_open:
  4728. if (!(p = lock_user_string(arg1)))
  4729. goto efault;
  4730. ret = get_errno(do_open(cpu_env, p,
  4731. target_to_host_bitmask(arg2, fcntl_flags_tbl),
  4732. arg3));
  4733. unlock_user(p, arg1, 0);
  4734. break;
  4735. #if defined(TARGET_NR_openat) && defined(__NR_openat)
  4736. case TARGET_NR_openat:
  4737. if (!(p = lock_user_string(arg2)))
  4738. goto efault;
  4739. ret = get_errno(sys_openat(arg1,
  4740. path(p),
  4741. target_to_host_bitmask(arg3, fcntl_flags_tbl),
  4742. arg4));
  4743. unlock_user(p, arg2, 0);
  4744. break;
  4745. #endif
  4746. case TARGET_NR_close:
  4747. ret = get_errno(close(arg1));
  4748. break;
  4749. case TARGET_NR_brk:
  4750. ret = do_brk(arg1);
  4751. break;
  4752. case TARGET_NR_fork:
  4753. ret = get_errno(do_fork(cpu_env, SIGCHLD, 0, 0, 0, 0));
  4754. break;
  4755. #ifdef TARGET_NR_waitpid
  4756. case TARGET_NR_waitpid:
  4757. {
  4758. int status;
  4759. ret = get_errno(waitpid(arg1, &status, arg3));
  4760. if (!is_error(ret) && arg2 && ret
  4761. && put_user_s32(host_to_target_waitstatus(status), arg2))
  4762. goto efault;
  4763. }
  4764. break;
  4765. #endif
  4766. #ifdef TARGET_NR_waitid
  4767. case TARGET_NR_waitid:
  4768. {
  4769. siginfo_t info;
  4770. info.si_pid = 0;
  4771. ret = get_errno(waitid(arg1, arg2, &info, arg4));
  4772. if (!is_error(ret) && arg3 && info.si_pid != 0) {
  4773. if (!(p = lock_user(VERIFY_WRITE, arg3, sizeof(target_siginfo_t), 0)))
  4774. goto efault;
  4775. host_to_target_siginfo(p, &info);
  4776. unlock_user(p, arg3, sizeof(target_siginfo_t));
  4777. }
  4778. }
  4779. break;
  4780. #endif
  4781. #ifdef TARGET_NR_creat /* not on alpha */
  4782. case TARGET_NR_creat:
  4783. if (!(p = lock_user_string(arg1)))
  4784. goto efault;
  4785. ret = get_errno(creat(p, arg2));
  4786. unlock_user(p, arg1, 0);
  4787. break;
  4788. #endif
  4789. case TARGET_NR_link:
  4790. {
  4791. void * p2;
  4792. p = lock_user_string(arg1);
  4793. p2 = lock_user_string(arg2);
  4794. if (!p || !p2)
  4795. ret = -TARGET_EFAULT;
  4796. else
  4797. ret = get_errno(link(p, p2));
  4798. unlock_user(p2, arg2, 0);
  4799. unlock_user(p, arg1, 0);
  4800. }
  4801. break;
  4802. #if defined(TARGET_NR_linkat) && defined(__NR_linkat)
  4803. case TARGET_NR_linkat:
  4804. {
  4805. void * p2 = NULL;
  4806. if (!arg2 || !arg4)
  4807. goto efault;
  4808. p = lock_user_string(arg2);
  4809. p2 = lock_user_string(arg4);
  4810. if (!p || !p2)
  4811. ret = -TARGET_EFAULT;
  4812. else
  4813. ret = get_errno(sys_linkat(arg1, p, arg3, p2, arg5));
  4814. unlock_user(p, arg2, 0);
  4815. unlock_user(p2, arg4, 0);
  4816. }
  4817. break;
  4818. #endif
  4819. case TARGET_NR_unlink:
  4820. if (!(p = lock_user_string(arg1)))
  4821. goto efault;
  4822. ret = get_errno(unlink(p));
  4823. unlock_user(p, arg1, 0);
  4824. break;
  4825. #if defined(TARGET_NR_unlinkat) && defined(__NR_unlinkat)
  4826. case TARGET_NR_unlinkat:
  4827. if (!(p = lock_user_string(arg2)))
  4828. goto efault;
  4829. ret = get_errno(sys_unlinkat(arg1, p, arg3));
  4830. unlock_user(p, arg2, 0);
  4831. break;
  4832. #endif
  4833. case TARGET_NR_execve:
  4834. {
  4835. char **argp, **envp;
  4836. int argc, envc;
  4837. abi_ulong gp;
  4838. abi_ulong guest_argp;
  4839. abi_ulong guest_envp;
  4840. abi_ulong addr;
  4841. char **q;
  4842. int total_size = 0;
  4843. argc = 0;
  4844. guest_argp = arg2;
  4845. for (gp = guest_argp; gp; gp += sizeof(abi_ulong)) {
  4846. if (get_user_ual(addr, gp))
  4847. goto efault;
  4848. if (!addr)
  4849. break;
  4850. argc++;
  4851. }
  4852. envc = 0;
  4853. guest_envp = arg3;
  4854. for (gp = guest_envp; gp; gp += sizeof(abi_ulong)) {
  4855. if (get_user_ual(addr, gp))
  4856. goto efault;
  4857. if (!addr)
  4858. break;
  4859. envc++;
  4860. }
  4861. argp = alloca((argc + 1) * sizeof(void *));
  4862. envp = alloca((envc + 1) * sizeof(void *));
  4863. for (gp = guest_argp, q = argp; gp;
  4864. gp += sizeof(abi_ulong), q++) {
  4865. if (get_user_ual(addr, gp))
  4866. goto execve_efault;
  4867. if (!addr)
  4868. break;
  4869. if (!(*q = lock_user_string(addr)))
  4870. goto execve_efault;
  4871. total_size += strlen(*q) + 1;
  4872. }
  4873. *q = NULL;
  4874. for (gp = guest_envp, q = envp; gp;
  4875. gp += sizeof(abi_ulong), q++) {
  4876. if (get_user_ual(addr, gp))
  4877. goto execve_efault;
  4878. if (!addr)
  4879. break;
  4880. if (!(*q = lock_user_string(addr)))
  4881. goto execve_efault;
  4882. total_size += strlen(*q) + 1;
  4883. }
  4884. *q = NULL;
  4885. /* This case will not be caught by the host's execve() if its
  4886. page size is bigger than the target's. */
  4887. if (total_size > MAX_ARG_PAGES * TARGET_PAGE_SIZE) {
  4888. ret = -TARGET_E2BIG;
  4889. goto execve_end;
  4890. }
  4891. if (!(p = lock_user_string(arg1)))
  4892. goto execve_efault;
  4893. ret = get_errno(execve(p, argp, envp));
  4894. unlock_user(p, arg1, 0);
  4895. goto execve_end;
  4896. execve_efault:
  4897. ret = -TARGET_EFAULT;
  4898. execve_end:
  4899. for (gp = guest_argp, q = argp; *q;
  4900. gp += sizeof(abi_ulong), q++) {
  4901. if (get_user_ual(addr, gp)
  4902. || !addr)
  4903. break;
  4904. unlock_user(*q, addr, 0);
  4905. }
  4906. for (gp = guest_envp, q = envp; *q;
  4907. gp += sizeof(abi_ulong), q++) {
  4908. if (get_user_ual(addr, gp)
  4909. || !addr)
  4910. break;
  4911. unlock_user(*q, addr, 0);
  4912. }
  4913. }
  4914. break;
  4915. case TARGET_NR_chdir:
  4916. if (!(p = lock_user_string(arg1)))
  4917. goto efault;
  4918. ret = get_errno(chdir(p));
  4919. unlock_user(p, arg1, 0);
  4920. break;
  4921. #ifdef TARGET_NR_time
  4922. case TARGET_NR_time:
  4923. {
  4924. time_t host_time;
  4925. ret = get_errno(time(&host_time));
  4926. if (!is_error(ret)
  4927. && arg1
  4928. && put_user_sal(host_time, arg1))
  4929. goto efault;
  4930. }
  4931. break;
  4932. #endif
  4933. case TARGET_NR_mknod:
  4934. if (!(p = lock_user_string(arg1)))
  4935. goto efault;
  4936. ret = get_errno(mknod(p, arg2, arg3));
  4937. unlock_user(p, arg1, 0);
  4938. break;
  4939. #if defined(TARGET_NR_mknodat) && defined(__NR_mknodat)
  4940. case TARGET_NR_mknodat:
  4941. if (!(p = lock_user_string(arg2)))
  4942. goto efault;
  4943. ret = get_errno(sys_mknodat(arg1, p, arg3, arg4));
  4944. unlock_user(p, arg2, 0);
  4945. break;
  4946. #endif
  4947. case TARGET_NR_chmod:
  4948. if (!(p = lock_user_string(arg1)))
  4949. goto efault;
  4950. ret = get_errno(chmod(p, arg2));
  4951. unlock_user(p, arg1, 0);
  4952. break;
  4953. #ifdef TARGET_NR_break
  4954. case TARGET_NR_break:
  4955. goto unimplemented;
  4956. #endif
  4957. #ifdef TARGET_NR_oldstat
  4958. case TARGET_NR_oldstat:
  4959. goto unimplemented;
  4960. #endif
  4961. case TARGET_NR_lseek:
  4962. ret = get_errno(lseek(arg1, arg2, arg3));
  4963. break;
  4964. #if defined(TARGET_NR_getxpid) && defined(TARGET_ALPHA)
  4965. /* Alpha specific */
  4966. case TARGET_NR_getxpid:
  4967. ((CPUAlphaState *)cpu_env)->ir[IR_A4] = getppid();
  4968. ret = get_errno(getpid());
  4969. break;
  4970. #endif
  4971. #ifdef TARGET_NR_getpid
  4972. case TARGET_NR_getpid:
  4973. ret = get_errno(getpid());
  4974. break;
  4975. #endif
  4976. case TARGET_NR_mount:
  4977. {
  4978. /* need to look at the data field */
  4979. void *p2, *p3;
  4980. p = lock_user_string(arg1);
  4981. p2 = lock_user_string(arg2);
  4982. p3 = lock_user_string(arg3);
  4983. if (!p || !p2 || !p3)
  4984. ret = -TARGET_EFAULT;
  4985. else {
  4986. /* FIXME - arg5 should be locked, but it isn't clear how to
  4987. * do that since it's not guaranteed to be a NULL-terminated
  4988. * string.
  4989. */
  4990. if ( ! arg5 )
  4991. ret = get_errno(mount(p, p2, p3, (unsigned long)arg4, NULL));
  4992. else
  4993. ret = get_errno(mount(p, p2, p3, (unsigned long)arg4, g2h(arg5)));
  4994. }
  4995. unlock_user(p, arg1, 0);
  4996. unlock_user(p2, arg2, 0);
  4997. unlock_user(p3, arg3, 0);
  4998. break;
  4999. }
  5000. #ifdef TARGET_NR_umount
  5001. case TARGET_NR_umount:
  5002. if (!(p = lock_user_string(arg1)))
  5003. goto efault;
  5004. ret = get_errno(umount(p));
  5005. unlock_user(p, arg1, 0);
  5006. break;
  5007. #endif
  5008. #ifdef TARGET_NR_stime /* not on alpha */
  5009. case TARGET_NR_stime:
  5010. {
  5011. time_t host_time;
  5012. if (get_user_sal(host_time, arg1))
  5013. goto efault;
  5014. ret = get_errno(stime(&host_time));
  5015. }
  5016. break;
  5017. #endif
  5018. case TARGET_NR_ptrace:
  5019. goto unimplemented;
  5020. #ifdef TARGET_NR_alarm /* not on alpha */
  5021. case TARGET_NR_alarm:
  5022. ret = alarm(arg1);
  5023. break;
  5024. #endif
  5025. #ifdef TARGET_NR_oldfstat
  5026. case TARGET_NR_oldfstat:
  5027. goto unimplemented;
  5028. #endif
  5029. #ifdef TARGET_NR_pause /* not on alpha */
  5030. case TARGET_NR_pause:
  5031. ret = get_errno(pause());
  5032. break;
  5033. #endif
  5034. #ifdef TARGET_NR_utime
  5035. case TARGET_NR_utime:
  5036. {
  5037. struct utimbuf tbuf, *host_tbuf;
  5038. struct target_utimbuf *target_tbuf;
  5039. if (arg2) {
  5040. if (!lock_user_struct(VERIFY_READ, target_tbuf, arg2, 1))
  5041. goto efault;
  5042. tbuf.actime = tswapal(target_tbuf->actime);
  5043. tbuf.modtime = tswapal(target_tbuf->modtime);
  5044. unlock_user_struct(target_tbuf, arg2, 0);
  5045. host_tbuf = &tbuf;
  5046. } else {
  5047. host_tbuf = NULL;
  5048. }
  5049. if (!(p = lock_user_string(arg1)))
  5050. goto efault;
  5051. ret = get_errno(utime(p, host_tbuf));
  5052. unlock_user(p, arg1, 0);
  5053. }
  5054. break;
  5055. #endif
  5056. case TARGET_NR_utimes:
  5057. {
  5058. struct timeval *tvp, tv[2];
  5059. if (arg2) {
  5060. if (copy_from_user_timeval(&tv[0], arg2)
  5061. || copy_from_user_timeval(&tv[1],
  5062. arg2 + sizeof(struct target_timeval)))
  5063. goto efault;
  5064. tvp = tv;
  5065. } else {
  5066. tvp = NULL;
  5067. }
  5068. if (!(p = lock_user_string(arg1)))
  5069. goto efault;
  5070. ret = get_errno(utimes(p, tvp));
  5071. unlock_user(p, arg1, 0);
  5072. }
  5073. break;
  5074. #if defined(TARGET_NR_futimesat) && defined(__NR_futimesat)
  5075. case TARGET_NR_futimesat:
  5076. {
  5077. struct timeval *tvp, tv[2];
  5078. if (arg3) {
  5079. if (copy_from_user_timeval(&tv[0], arg3)
  5080. || copy_from_user_timeval(&tv[1],
  5081. arg3 + sizeof(struct target_timeval)))
  5082. goto efault;
  5083. tvp = tv;
  5084. } else {
  5085. tvp = NULL;
  5086. }
  5087. if (!(p = lock_user_string(arg2)))
  5088. goto efault;
  5089. ret = get_errno(sys_futimesat(arg1, path(p), tvp));
  5090. unlock_user(p, arg2, 0);
  5091. }
  5092. break;
  5093. #endif
  5094. #ifdef TARGET_NR_stty
  5095. case TARGET_NR_stty:
  5096. goto unimplemented;
  5097. #endif
  5098. #ifdef TARGET_NR_gtty
  5099. case TARGET_NR_gtty:
  5100. goto unimplemented;
  5101. #endif
  5102. case TARGET_NR_access:
  5103. if (!(p = lock_user_string(arg1)))
  5104. goto efault;
  5105. ret = get_errno(access(path(p), arg2));
  5106. unlock_user(p, arg1, 0);
  5107. break;
  5108. #if defined(TARGET_NR_faccessat) && defined(__NR_faccessat)
  5109. case TARGET_NR_faccessat:
  5110. if (!(p = lock_user_string(arg2)))
  5111. goto efault;
  5112. ret = get_errno(sys_faccessat(arg1, p, arg3));
  5113. unlock_user(p, arg2, 0);
  5114. break;
  5115. #endif
  5116. #ifdef TARGET_NR_nice /* not on alpha */
  5117. case TARGET_NR_nice:
  5118. ret = get_errno(nice(arg1));
  5119. break;
  5120. #endif
  5121. #ifdef TARGET_NR_ftime
  5122. case TARGET_NR_ftime:
  5123. goto unimplemented;
  5124. #endif
  5125. case TARGET_NR_sync:
  5126. sync();
  5127. ret = 0;
  5128. break;
  5129. case TARGET_NR_kill:
  5130. ret = get_errno(kill(arg1, target_to_host_signal(arg2)));
  5131. break;
  5132. case TARGET_NR_rename:
  5133. {
  5134. void *p2;
  5135. p = lock_user_string(arg1);
  5136. p2 = lock_user_string(arg2);
  5137. if (!p || !p2)
  5138. ret = -TARGET_EFAULT;
  5139. else
  5140. ret = get_errno(rename(p, p2));
  5141. unlock_user(p2, arg2, 0);
  5142. unlock_user(p, arg1, 0);
  5143. }
  5144. break;
  5145. #if defined(TARGET_NR_renameat) && defined(__NR_renameat)
  5146. case TARGET_NR_renameat:
  5147. {
  5148. void *p2;
  5149. p = lock_user_string(arg2);
  5150. p2 = lock_user_string(arg4);
  5151. if (!p || !p2)
  5152. ret = -TARGET_EFAULT;
  5153. else
  5154. ret = get_errno(sys_renameat(arg1, p, arg3, p2));
  5155. unlock_user(p2, arg4, 0);
  5156. unlock_user(p, arg2, 0);
  5157. }
  5158. break;
  5159. #endif
  5160. case TARGET_NR_mkdir:
  5161. if (!(p = lock_user_string(arg1)))
  5162. goto efault;
  5163. ret = get_errno(mkdir(p, arg2));
  5164. unlock_user(p, arg1, 0);
  5165. break;
  5166. #if defined(TARGET_NR_mkdirat) && defined(__NR_mkdirat)
  5167. case TARGET_NR_mkdirat:
  5168. if (!(p = lock_user_string(arg2)))
  5169. goto efault;
  5170. ret = get_errno(sys_mkdirat(arg1, p, arg3));
  5171. unlock_user(p, arg2, 0);
  5172. break;
  5173. #endif
  5174. case TARGET_NR_rmdir:
  5175. if (!(p = lock_user_string(arg1)))
  5176. goto efault;
  5177. ret = get_errno(rmdir(p));
  5178. unlock_user(p, arg1, 0);
  5179. break;
  5180. case TARGET_NR_dup:
  5181. ret = get_errno(dup(arg1));
  5182. break;
  5183. case TARGET_NR_pipe:
  5184. ret = do_pipe(cpu_env, arg1, 0, 0);
  5185. break;
  5186. #ifdef TARGET_NR_pipe2
  5187. case TARGET_NR_pipe2:
  5188. ret = do_pipe(cpu_env, arg1,
  5189. target_to_host_bitmask(arg2, fcntl_flags_tbl), 1);
  5190. break;
  5191. #endif
  5192. case TARGET_NR_times:
  5193. {
  5194. struct target_tms *tmsp;
  5195. struct tms tms;
  5196. ret = get_errno(times(&tms));
  5197. if (arg1) {
  5198. tmsp = lock_user(VERIFY_WRITE, arg1, sizeof(struct target_tms), 0);
  5199. if (!tmsp)
  5200. goto efault;
  5201. tmsp->tms_utime = tswapal(host_to_target_clock_t(tms.tms_utime));
  5202. tmsp->tms_stime = tswapal(host_to_target_clock_t(tms.tms_stime));
  5203. tmsp->tms_cutime = tswapal(host_to_target_clock_t(tms.tms_cutime));
  5204. tmsp->tms_cstime = tswapal(host_to_target_clock_t(tms.tms_cstime));
  5205. }
  5206. if (!is_error(ret))
  5207. ret = host_to_target_clock_t(ret);
  5208. }
  5209. break;
  5210. #ifdef TARGET_NR_prof
  5211. case TARGET_NR_prof:
  5212. goto unimplemented;
  5213. #endif
  5214. #ifdef TARGET_NR_signal
  5215. case TARGET_NR_signal:
  5216. goto unimplemented;
  5217. #endif
  5218. case TARGET_NR_acct:
  5219. if (arg1 == 0) {
  5220. ret = get_errno(acct(NULL));
  5221. } else {
  5222. if (!(p = lock_user_string(arg1)))
  5223. goto efault;
  5224. ret = get_errno(acct(path(p)));
  5225. unlock_user(p, arg1, 0);
  5226. }
  5227. break;
  5228. #ifdef TARGET_NR_umount2 /* not on alpha */
  5229. case TARGET_NR_umount2:
  5230. if (!(p = lock_user_string(arg1)))
  5231. goto efault;
  5232. ret = get_errno(umount2(p, arg2));
  5233. unlock_user(p, arg1, 0);
  5234. break;
  5235. #endif
  5236. #ifdef TARGET_NR_lock
  5237. case TARGET_NR_lock:
  5238. goto unimplemented;
  5239. #endif
  5240. case TARGET_NR_ioctl:
  5241. ret = do_ioctl(arg1, arg2, arg3);
  5242. break;
  5243. case TARGET_NR_fcntl:
  5244. ret = do_fcntl(arg1, arg2, arg3);
  5245. break;
  5246. #ifdef TARGET_NR_mpx
  5247. case TARGET_NR_mpx:
  5248. goto unimplemented;
  5249. #endif
  5250. case TARGET_NR_setpgid:
  5251. ret = get_errno(setpgid(arg1, arg2));
  5252. break;
  5253. #ifdef TARGET_NR_ulimit
  5254. case TARGET_NR_ulimit:
  5255. goto unimplemented;
  5256. #endif
  5257. #ifdef TARGET_NR_oldolduname
  5258. case TARGET_NR_oldolduname:
  5259. goto unimplemented;
  5260. #endif
  5261. case TARGET_NR_umask:
  5262. ret = get_errno(umask(arg1));
  5263. break;
  5264. case TARGET_NR_chroot:
  5265. if (!(p = lock_user_string(arg1)))
  5266. goto efault;
  5267. ret = get_errno(chroot(p));
  5268. unlock_user(p, arg1, 0);
  5269. break;
  5270. case TARGET_NR_ustat:
  5271. goto unimplemented;
  5272. case TARGET_NR_dup2:
  5273. ret = get_errno(dup2(arg1, arg2));
  5274. break;
  5275. #if defined(CONFIG_DUP3) && defined(TARGET_NR_dup3)
  5276. case TARGET_NR_dup3:
  5277. ret = get_errno(dup3(arg1, arg2, arg3));
  5278. break;
  5279. #endif
  5280. #ifdef TARGET_NR_getppid /* not on alpha */
  5281. case TARGET_NR_getppid:
  5282. ret = get_errno(getppid());
  5283. break;
  5284. #endif
  5285. case TARGET_NR_getpgrp:
  5286. ret = get_errno(getpgrp());
  5287. break;
  5288. case TARGET_NR_setsid:
  5289. ret = get_errno(setsid());
  5290. break;
  5291. #ifdef TARGET_NR_sigaction
  5292. case TARGET_NR_sigaction:
  5293. {
  5294. #if defined(TARGET_ALPHA)
  5295. struct target_sigaction act, oact, *pact = 0;
  5296. struct target_old_sigaction *old_act;
  5297. if (arg2) {
  5298. if (!lock_user_struct(VERIFY_READ, old_act, arg2, 1))
  5299. goto efault;
  5300. act._sa_handler = old_act->_sa_handler;
  5301. target_siginitset(&act.sa_mask, old_act->sa_mask);
  5302. act.sa_flags = old_act->sa_flags;
  5303. act.sa_restorer = 0;
  5304. unlock_user_struct(old_act, arg2, 0);
  5305. pact = &act;
  5306. }
  5307. ret = get_errno(do_sigaction(arg1, pact, &oact));
  5308. if (!is_error(ret) && arg3) {
  5309. if (!lock_user_struct(VERIFY_WRITE, old_act, arg3, 0))
  5310. goto efault;
  5311. old_act->_sa_handler = oact._sa_handler;
  5312. old_act->sa_mask = oact.sa_mask.sig[0];
  5313. old_act->sa_flags = oact.sa_flags;
  5314. unlock_user_struct(old_act, arg3, 1);
  5315. }
  5316. #elif defined(TARGET_MIPS)
  5317. struct target_sigaction act, oact, *pact, *old_act;
  5318. if (arg2) {
  5319. if (!lock_user_struct(VERIFY_READ, old_act, arg2, 1))
  5320. goto efault;
  5321. act._sa_handler = old_act->_sa_handler;
  5322. target_siginitset(&act.sa_mask, old_act->sa_mask.sig[0]);
  5323. act.sa_flags = old_act->sa_flags;
  5324. unlock_user_struct(old_act, arg2, 0);
  5325. pact = &act;
  5326. } else {
  5327. pact = NULL;
  5328. }
  5329. ret = get_errno(do_sigaction(arg1, pact, &oact));
  5330. if (!is_error(ret) && arg3) {
  5331. if (!lock_user_struct(VERIFY_WRITE, old_act, arg3, 0))
  5332. goto efault;
  5333. old_act->_sa_handler = oact._sa_handler;
  5334. old_act->sa_flags = oact.sa_flags;
  5335. old_act->sa_mask.sig[0] = oact.sa_mask.sig[0];
  5336. old_act->sa_mask.sig[1] = 0;
  5337. old_act->sa_mask.sig[2] = 0;
  5338. old_act->sa_mask.sig[3] = 0;
  5339. unlock_user_struct(old_act, arg3, 1);
  5340. }
  5341. #else
  5342. struct target_old_sigaction *old_act;
  5343. struct target_sigaction act, oact, *pact;
  5344. if (arg2) {
  5345. if (!lock_user_struct(VERIFY_READ, old_act, arg2, 1))
  5346. goto efault;
  5347. act._sa_handler = old_act->_sa_handler;
  5348. target_siginitset(&act.sa_mask, old_act->sa_mask);
  5349. act.sa_flags = old_act->sa_flags;
  5350. act.sa_restorer = old_act->sa_restorer;
  5351. unlock_user_struct(old_act, arg2, 0);
  5352. pact = &act;
  5353. } else {
  5354. pact = NULL;
  5355. }
  5356. ret = get_errno(do_sigaction(arg1, pact, &oact));
  5357. if (!is_error(ret) && arg3) {
  5358. if (!lock_user_struct(VERIFY_WRITE, old_act, arg3, 0))
  5359. goto efault;
  5360. old_act->_sa_handler = oact._sa_handler;
  5361. old_act->sa_mask = oact.sa_mask.sig[0];
  5362. old_act->sa_flags = oact.sa_flags;
  5363. old_act->sa_restorer = oact.sa_restorer;
  5364. unlock_user_struct(old_act, arg3, 1);
  5365. }
  5366. #endif
  5367. }
  5368. break;
  5369. #endif
  5370. case TARGET_NR_rt_sigaction:
  5371. {
  5372. #if defined(TARGET_ALPHA)
  5373. struct target_sigaction act, oact, *pact = 0;
  5374. struct target_rt_sigaction *rt_act;
  5375. /* ??? arg4 == sizeof(sigset_t). */
  5376. if (arg2) {
  5377. if (!lock_user_struct(VERIFY_READ, rt_act, arg2, 1))
  5378. goto efault;
  5379. act._sa_handler = rt_act->_sa_handler;
  5380. act.sa_mask = rt_act->sa_mask;
  5381. act.sa_flags = rt_act->sa_flags;
  5382. act.sa_restorer = arg5;
  5383. unlock_user_struct(rt_act, arg2, 0);
  5384. pact = &act;
  5385. }
  5386. ret = get_errno(do_sigaction(arg1, pact, &oact));
  5387. if (!is_error(ret) && arg3) {
  5388. if (!lock_user_struct(VERIFY_WRITE, rt_act, arg3, 0))
  5389. goto efault;
  5390. rt_act->_sa_handler = oact._sa_handler;
  5391. rt_act->sa_mask = oact.sa_mask;
  5392. rt_act->sa_flags = oact.sa_flags;
  5393. unlock_user_struct(rt_act, arg3, 1);
  5394. }
  5395. #else
  5396. struct target_sigaction *act;
  5397. struct target_sigaction *oact;
  5398. if (arg2) {
  5399. if (!lock_user_struct(VERIFY_READ, act, arg2, 1))
  5400. goto efault;
  5401. } else
  5402. act = NULL;
  5403. if (arg3) {
  5404. if (!lock_user_struct(VERIFY_WRITE, oact, arg3, 0)) {
  5405. ret = -TARGET_EFAULT;
  5406. goto rt_sigaction_fail;
  5407. }
  5408. } else
  5409. oact = NULL;
  5410. ret = get_errno(do_sigaction(arg1, act, oact));
  5411. rt_sigaction_fail:
  5412. if (act)
  5413. unlock_user_struct(act, arg2, 0);
  5414. if (oact)
  5415. unlock_user_struct(oact, arg3, 1);
  5416. #endif
  5417. }
  5418. break;
  5419. #ifdef TARGET_NR_sgetmask /* not on alpha */
  5420. case TARGET_NR_sgetmask:
  5421. {
  5422. sigset_t cur_set;
  5423. abi_ulong target_set;
  5424. sigprocmask(0, NULL, &cur_set);
  5425. host_to_target_old_sigset(&target_set, &cur_set);
  5426. ret = target_set;
  5427. }
  5428. break;
  5429. #endif
  5430. #ifdef TARGET_NR_ssetmask /* not on alpha */
  5431. case TARGET_NR_ssetmask:
  5432. {
  5433. sigset_t set, oset, cur_set;
  5434. abi_ulong target_set = arg1;
  5435. sigprocmask(0, NULL, &cur_set);
  5436. target_to_host_old_sigset(&set, &target_set);
  5437. sigorset(&set, &set, &cur_set);
  5438. sigprocmask(SIG_SETMASK, &set, &oset);
  5439. host_to_target_old_sigset(&target_set, &oset);
  5440. ret = target_set;
  5441. }
  5442. break;
  5443. #endif
  5444. #ifdef TARGET_NR_sigprocmask
  5445. case TARGET_NR_sigprocmask:
  5446. {
  5447. #if defined(TARGET_ALPHA)
  5448. sigset_t set, oldset;
  5449. abi_ulong mask;
  5450. int how;
  5451. switch (arg1) {
  5452. case TARGET_SIG_BLOCK:
  5453. how = SIG_BLOCK;
  5454. break;
  5455. case TARGET_SIG_UNBLOCK:
  5456. how = SIG_UNBLOCK;
  5457. break;
  5458. case TARGET_SIG_SETMASK:
  5459. how = SIG_SETMASK;
  5460. break;
  5461. default:
  5462. ret = -TARGET_EINVAL;
  5463. goto fail;
  5464. }
  5465. mask = arg2;
  5466. target_to_host_old_sigset(&set, &mask);
  5467. ret = get_errno(sigprocmask(how, &set, &oldset));
  5468. if (!is_error(ret)) {
  5469. host_to_target_old_sigset(&mask, &oldset);
  5470. ret = mask;
  5471. ((CPUAlphaState *)cpu_env)->ir[IR_V0] = 0; /* force no error */
  5472. }
  5473. #else
  5474. sigset_t set, oldset, *set_ptr;
  5475. int how;
  5476. if (arg2) {
  5477. switch (arg1) {
  5478. case TARGET_SIG_BLOCK:
  5479. how = SIG_BLOCK;
  5480. break;
  5481. case TARGET_SIG_UNBLOCK:
  5482. how = SIG_UNBLOCK;
  5483. break;
  5484. case TARGET_SIG_SETMASK:
  5485. how = SIG_SETMASK;
  5486. break;
  5487. default:
  5488. ret = -TARGET_EINVAL;
  5489. goto fail;
  5490. }
  5491. if (!(p = lock_user(VERIFY_READ, arg2, sizeof(target_sigset_t), 1)))
  5492. goto efault;
  5493. target_to_host_old_sigset(&set, p);
  5494. unlock_user(p, arg2, 0);
  5495. set_ptr = &set;
  5496. } else {
  5497. how = 0;
  5498. set_ptr = NULL;
  5499. }
  5500. ret = get_errno(sigprocmask(how, set_ptr, &oldset));
  5501. if (!is_error(ret) && arg3) {
  5502. if (!(p = lock_user(VERIFY_WRITE, arg3, sizeof(target_sigset_t), 0)))
  5503. goto efault;
  5504. host_to_target_old_sigset(p, &oldset);
  5505. unlock_user(p, arg3, sizeof(target_sigset_t));
  5506. }
  5507. #endif
  5508. }
  5509. break;
  5510. #endif
  5511. case TARGET_NR_rt_sigprocmask:
  5512. {
  5513. int how = arg1;
  5514. sigset_t set, oldset, *set_ptr;
  5515. if (arg2) {
  5516. switch(how) {
  5517. case TARGET_SIG_BLOCK:
  5518. how = SIG_BLOCK;
  5519. break;
  5520. case TARGET_SIG_UNBLOCK:
  5521. how = SIG_UNBLOCK;
  5522. break;
  5523. case TARGET_SIG_SETMASK:
  5524. how = SIG_SETMASK;
  5525. break;
  5526. default:
  5527. ret = -TARGET_EINVAL;
  5528. goto fail;
  5529. }
  5530. if (!(p = lock_user(VERIFY_READ, arg2, sizeof(target_sigset_t), 1)))
  5531. goto efault;
  5532. target_to_host_sigset(&set, p);
  5533. unlock_user(p, arg2, 0);
  5534. set_ptr = &set;
  5535. } else {
  5536. how = 0;
  5537. set_ptr = NULL;
  5538. }
  5539. ret = get_errno(sigprocmask(how, set_ptr, &oldset));
  5540. if (!is_error(ret) && arg3) {
  5541. if (!(p = lock_user(VERIFY_WRITE, arg3, sizeof(target_sigset_t), 0)))
  5542. goto efault;
  5543. host_to_target_sigset(p, &oldset);
  5544. unlock_user(p, arg3, sizeof(target_sigset_t));
  5545. }
  5546. }
  5547. break;
  5548. #ifdef TARGET_NR_sigpending
  5549. case TARGET_NR_sigpending:
  5550. {
  5551. sigset_t set;
  5552. ret = get_errno(sigpending(&set));
  5553. if (!is_error(ret)) {
  5554. if (!(p = lock_user(VERIFY_WRITE, arg1, sizeof(target_sigset_t), 0)))
  5555. goto efault;
  5556. host_to_target_old_sigset(p, &set);
  5557. unlock_user(p, arg1, sizeof(target_sigset_t));
  5558. }
  5559. }
  5560. break;
  5561. #endif
  5562. case TARGET_NR_rt_sigpending:
  5563. {
  5564. sigset_t set;
  5565. ret = get_errno(sigpending(&set));
  5566. if (!is_error(ret)) {
  5567. if (!(p = lock_user(VERIFY_WRITE, arg1, sizeof(target_sigset_t), 0)))
  5568. goto efault;
  5569. host_to_target_sigset(p, &set);
  5570. unlock_user(p, arg1, sizeof(target_sigset_t));
  5571. }
  5572. }
  5573. break;
  5574. #ifdef TARGET_NR_sigsuspend
  5575. case TARGET_NR_sigsuspend:
  5576. {
  5577. sigset_t set;
  5578. #if defined(TARGET_ALPHA)
  5579. abi_ulong mask = arg1;
  5580. target_to_host_old_sigset(&set, &mask);
  5581. #else
  5582. if (!(p = lock_user(VERIFY_READ, arg1, sizeof(target_sigset_t), 1)))
  5583. goto efault;
  5584. target_to_host_old_sigset(&set, p);
  5585. unlock_user(p, arg1, 0);
  5586. #endif
  5587. ret = get_errno(sigsuspend(&set));
  5588. }
  5589. break;
  5590. #endif
  5591. case TARGET_NR_rt_sigsuspend:
  5592. {
  5593. sigset_t set;
  5594. if (!(p = lock_user(VERIFY_READ, arg1, sizeof(target_sigset_t), 1)))
  5595. goto efault;
  5596. target_to_host_sigset(&set, p);
  5597. unlock_user(p, arg1, 0);
  5598. ret = get_errno(sigsuspend(&set));
  5599. }
  5600. break;
  5601. case TARGET_NR_rt_sigtimedwait:
  5602. {
  5603. sigset_t set;
  5604. struct timespec uts, *puts;
  5605. siginfo_t uinfo;
  5606. if (!(p = lock_user(VERIFY_READ, arg1, sizeof(target_sigset_t), 1)))
  5607. goto efault;
  5608. target_to_host_sigset(&set, p);
  5609. unlock_user(p, arg1, 0);
  5610. if (arg3) {
  5611. puts = &uts;
  5612. target_to_host_timespec(puts, arg3);
  5613. } else {
  5614. puts = NULL;
  5615. }
  5616. ret = get_errno(sigtimedwait(&set, &uinfo, puts));
  5617. if (!is_error(ret) && arg2) {
  5618. if (!(p = lock_user(VERIFY_WRITE, arg2, sizeof(target_siginfo_t), 0)))
  5619. goto efault;
  5620. host_to_target_siginfo(p, &uinfo);
  5621. unlock_user(p, arg2, sizeof(target_siginfo_t));
  5622. }
  5623. }
  5624. break;
  5625. case TARGET_NR_rt_sigqueueinfo:
  5626. {
  5627. siginfo_t uinfo;
  5628. if (!(p = lock_user(VERIFY_READ, arg3, sizeof(target_sigset_t), 1)))
  5629. goto efault;
  5630. target_to_host_siginfo(&uinfo, p);
  5631. unlock_user(p, arg1, 0);
  5632. ret = get_errno(sys_rt_sigqueueinfo(arg1, arg2, &uinfo));
  5633. }
  5634. break;
  5635. #ifdef TARGET_NR_sigreturn
  5636. case TARGET_NR_sigreturn:
  5637. /* NOTE: ret is eax, so not transcoding must be done */
  5638. ret = do_sigreturn(cpu_env);
  5639. break;
  5640. #endif
  5641. case TARGET_NR_rt_sigreturn:
  5642. /* NOTE: ret is eax, so not transcoding must be done */
  5643. ret = do_rt_sigreturn(cpu_env);
  5644. break;
  5645. case TARGET_NR_sethostname:
  5646. if (!(p = lock_user_string(arg1)))
  5647. goto efault;
  5648. ret = get_errno(sethostname(p, arg2));
  5649. unlock_user(p, arg1, 0);
  5650. break;
  5651. case TARGET_NR_setrlimit:
  5652. {
  5653. int resource = target_to_host_resource(arg1);
  5654. struct target_rlimit *target_rlim;
  5655. struct rlimit rlim;
  5656. if (!lock_user_struct(VERIFY_READ, target_rlim, arg2, 1))
  5657. goto efault;
  5658. rlim.rlim_cur = target_to_host_rlim(target_rlim->rlim_cur);
  5659. rlim.rlim_max = target_to_host_rlim(target_rlim->rlim_max);
  5660. unlock_user_struct(target_rlim, arg2, 0);
  5661. ret = get_errno(setrlimit(resource, &rlim));
  5662. }
  5663. break;
  5664. case TARGET_NR_getrlimit:
  5665. {
  5666. int resource = target_to_host_resource(arg1);
  5667. struct target_rlimit *target_rlim;
  5668. struct rlimit rlim;
  5669. ret = get_errno(getrlimit(resource, &rlim));
  5670. if (!is_error(ret)) {
  5671. if (!lock_user_struct(VERIFY_WRITE, target_rlim, arg2, 0))
  5672. goto efault;
  5673. target_rlim->rlim_cur = host_to_target_rlim(rlim.rlim_cur);
  5674. target_rlim->rlim_max = host_to_target_rlim(rlim.rlim_max);
  5675. unlock_user_struct(target_rlim, arg2, 1);
  5676. }
  5677. }
  5678. break;
  5679. case TARGET_NR_getrusage:
  5680. {
  5681. struct rusage rusage;
  5682. ret = get_errno(getrusage(arg1, &rusage));
  5683. if (!is_error(ret)) {
  5684. host_to_target_rusage(arg2, &rusage);
  5685. }
  5686. }
  5687. break;
  5688. case TARGET_NR_gettimeofday:
  5689. {
  5690. struct timeval tv;
  5691. ret = get_errno(gettimeofday(&tv, NULL));
  5692. if (!is_error(ret)) {
  5693. if (copy_to_user_timeval(arg1, &tv))
  5694. goto efault;
  5695. }
  5696. }
  5697. break;
  5698. case TARGET_NR_settimeofday:
  5699. {
  5700. struct timeval tv;
  5701. if (copy_from_user_timeval(&tv, arg1))
  5702. goto efault;
  5703. ret = get_errno(settimeofday(&tv, NULL));
  5704. }
  5705. break;
  5706. #if defined(TARGET_NR_select)
  5707. case TARGET_NR_select:
  5708. #if defined(TARGET_S390X) || defined(TARGET_ALPHA)
  5709. ret = do_select(arg1, arg2, arg3, arg4, arg5);
  5710. #else
  5711. {
  5712. struct target_sel_arg_struct *sel;
  5713. abi_ulong inp, outp, exp, tvp;
  5714. long nsel;
  5715. if (!lock_user_struct(VERIFY_READ, sel, arg1, 1))
  5716. goto efault;
  5717. nsel = tswapal(sel->n);
  5718. inp = tswapal(sel->inp);
  5719. outp = tswapal(sel->outp);
  5720. exp = tswapal(sel->exp);
  5721. tvp = tswapal(sel->tvp);
  5722. unlock_user_struct(sel, arg1, 0);
  5723. ret = do_select(nsel, inp, outp, exp, tvp);
  5724. }
  5725. #endif
  5726. break;
  5727. #endif
  5728. #ifdef TARGET_NR_pselect6
  5729. case TARGET_NR_pselect6:
  5730. {
  5731. abi_long rfd_addr, wfd_addr, efd_addr, n, ts_addr;
  5732. fd_set rfds, wfds, efds;
  5733. fd_set *rfds_ptr, *wfds_ptr, *efds_ptr;
  5734. struct timespec ts, *ts_ptr;
  5735. /*
  5736. * The 6th arg is actually two args smashed together,
  5737. * so we cannot use the C library.
  5738. */
  5739. sigset_t set;
  5740. struct {
  5741. sigset_t *set;
  5742. size_t size;
  5743. } sig, *sig_ptr;
  5744. abi_ulong arg_sigset, arg_sigsize, *arg7;
  5745. target_sigset_t *target_sigset;
  5746. n = arg1;
  5747. rfd_addr = arg2;
  5748. wfd_addr = arg3;
  5749. efd_addr = arg4;
  5750. ts_addr = arg5;
  5751. ret = copy_from_user_fdset_ptr(&rfds, &rfds_ptr, rfd_addr, n);
  5752. if (ret) {
  5753. goto fail;
  5754. }
  5755. ret = copy_from_user_fdset_ptr(&wfds, &wfds_ptr, wfd_addr, n);
  5756. if (ret) {
  5757. goto fail;
  5758. }
  5759. ret = copy_from_user_fdset_ptr(&efds, &efds_ptr, efd_addr, n);
  5760. if (ret) {
  5761. goto fail;
  5762. }
  5763. /*
  5764. * This takes a timespec, and not a timeval, so we cannot
  5765. * use the do_select() helper ...
  5766. */
  5767. if (ts_addr) {
  5768. if (target_to_host_timespec(&ts, ts_addr)) {
  5769. goto efault;
  5770. }
  5771. ts_ptr = &ts;
  5772. } else {
  5773. ts_ptr = NULL;
  5774. }
  5775. /* Extract the two packed args for the sigset */
  5776. if (arg6) {
  5777. sig_ptr = &sig;
  5778. sig.size = _NSIG / 8;
  5779. arg7 = lock_user(VERIFY_READ, arg6, sizeof(*arg7) * 2, 1);
  5780. if (!arg7) {
  5781. goto efault;
  5782. }
  5783. arg_sigset = tswapal(arg7[0]);
  5784. arg_sigsize = tswapal(arg7[1]);
  5785. unlock_user(arg7, arg6, 0);
  5786. if (arg_sigset) {
  5787. sig.set = &set;
  5788. if (arg_sigsize != sizeof(*target_sigset)) {
  5789. /* Like the kernel, we enforce correct size sigsets */
  5790. ret = -TARGET_EINVAL;
  5791. goto fail;
  5792. }
  5793. target_sigset = lock_user(VERIFY_READ, arg_sigset,
  5794. sizeof(*target_sigset), 1);
  5795. if (!target_sigset) {
  5796. goto efault;
  5797. }
  5798. target_to_host_sigset(&set, target_sigset);
  5799. unlock_user(target_sigset, arg_sigset, 0);
  5800. } else {
  5801. sig.set = NULL;
  5802. }
  5803. } else {
  5804. sig_ptr = NULL;
  5805. }
  5806. ret = get_errno(sys_pselect6(n, rfds_ptr, wfds_ptr, efds_ptr,
  5807. ts_ptr, sig_ptr));
  5808. if (!is_error(ret)) {
  5809. if (rfd_addr && copy_to_user_fdset(rfd_addr, &rfds, n))
  5810. goto efault;
  5811. if (wfd_addr && copy_to_user_fdset(wfd_addr, &wfds, n))
  5812. goto efault;
  5813. if (efd_addr && copy_to_user_fdset(efd_addr, &efds, n))
  5814. goto efault;
  5815. if (ts_addr && host_to_target_timespec(ts_addr, &ts))
  5816. goto efault;
  5817. }
  5818. }
  5819. break;
  5820. #endif
  5821. case TARGET_NR_symlink:
  5822. {
  5823. void *p2;
  5824. p = lock_user_string(arg1);
  5825. p2 = lock_user_string(arg2);
  5826. if (!p || !p2)
  5827. ret = -TARGET_EFAULT;
  5828. else
  5829. ret = get_errno(symlink(p, p2));
  5830. unlock_user(p2, arg2, 0);
  5831. unlock_user(p, arg1, 0);
  5832. }
  5833. break;
  5834. #if defined(TARGET_NR_symlinkat) && defined(__NR_symlinkat)
  5835. case TARGET_NR_symlinkat:
  5836. {
  5837. void *p2;
  5838. p = lock_user_string(arg1);
  5839. p2 = lock_user_string(arg3);
  5840. if (!p || !p2)
  5841. ret = -TARGET_EFAULT;
  5842. else
  5843. ret = get_errno(sys_symlinkat(p, arg2, p2));
  5844. unlock_user(p2, arg3, 0);
  5845. unlock_user(p, arg1, 0);
  5846. }
  5847. break;
  5848. #endif
  5849. #ifdef TARGET_NR_oldlstat
  5850. case TARGET_NR_oldlstat:
  5851. goto unimplemented;
  5852. #endif
  5853. case TARGET_NR_readlink:
  5854. {
  5855. void *p2, *temp;
  5856. p = lock_user_string(arg1);
  5857. p2 = lock_user(VERIFY_WRITE, arg2, arg3, 0);
  5858. if (!p || !p2)
  5859. ret = -TARGET_EFAULT;
  5860. else {
  5861. if (strncmp((const char *)p, "/proc/self/exe", 14) == 0) {
  5862. char real[PATH_MAX];
  5863. temp = realpath(exec_path,real);
  5864. ret = (temp==NULL) ? get_errno(-1) : strlen(real) ;
  5865. snprintf((char *)p2, arg3, "%s", real);
  5866. }
  5867. else
  5868. ret = get_errno(readlink(path(p), p2, arg3));
  5869. }
  5870. unlock_user(p2, arg2, ret);
  5871. unlock_user(p, arg1, 0);
  5872. }
  5873. break;
  5874. #if defined(TARGET_NR_readlinkat) && defined(__NR_readlinkat)
  5875. case TARGET_NR_readlinkat:
  5876. {
  5877. void *p2;
  5878. p = lock_user_string(arg2);
  5879. p2 = lock_user(VERIFY_WRITE, arg3, arg4, 0);
  5880. if (!p || !p2)
  5881. ret = -TARGET_EFAULT;
  5882. else
  5883. ret = get_errno(sys_readlinkat(arg1, path(p), p2, arg4));
  5884. unlock_user(p2, arg3, ret);
  5885. unlock_user(p, arg2, 0);
  5886. }
  5887. break;
  5888. #endif
  5889. #ifdef TARGET_NR_uselib
  5890. case TARGET_NR_uselib:
  5891. goto unimplemented;
  5892. #endif
  5893. #ifdef TARGET_NR_swapon
  5894. case TARGET_NR_swapon:
  5895. if (!(p = lock_user_string(arg1)))
  5896. goto efault;
  5897. ret = get_errno(swapon(p, arg2));
  5898. unlock_user(p, arg1, 0);
  5899. break;
  5900. #endif
  5901. case TARGET_NR_reboot:
  5902. if (arg3 == LINUX_REBOOT_CMD_RESTART2) {
  5903. /* arg4 must be ignored in all other cases */
  5904. p = lock_user_string(arg4);
  5905. if (!p) {
  5906. goto efault;
  5907. }
  5908. ret = get_errno(reboot(arg1, arg2, arg3, p));
  5909. unlock_user(p, arg4, 0);
  5910. } else {
  5911. ret = get_errno(reboot(arg1, arg2, arg3, NULL));
  5912. }
  5913. break;
  5914. #ifdef TARGET_NR_readdir
  5915. case TARGET_NR_readdir:
  5916. goto unimplemented;
  5917. #endif
  5918. #ifdef TARGET_NR_mmap
  5919. case TARGET_NR_mmap:
  5920. #if (defined(TARGET_I386) && defined(TARGET_ABI32)) || defined(TARGET_ARM) || \
  5921. defined(TARGET_M68K) || defined(TARGET_CRIS) || defined(TARGET_MICROBLAZE) \
  5922. || defined(TARGET_S390X)
  5923. {
  5924. abi_ulong *v;
  5925. abi_ulong v1, v2, v3, v4, v5, v6;
  5926. if (!(v = lock_user(VERIFY_READ, arg1, 6 * sizeof(abi_ulong), 1)))
  5927. goto efault;
  5928. v1 = tswapal(v[0]);
  5929. v2 = tswapal(v[1]);
  5930. v3 = tswapal(v[2]);
  5931. v4 = tswapal(v[3]);
  5932. v5 = tswapal(v[4]);
  5933. v6 = tswapal(v[5]);
  5934. unlock_user(v, arg1, 0);
  5935. ret = get_errno(target_mmap(v1, v2, v3,
  5936. target_to_host_bitmask(v4, mmap_flags_tbl),
  5937. v5, v6));
  5938. }
  5939. #else
  5940. ret = get_errno(target_mmap(arg1, arg2, arg3,
  5941. target_to_host_bitmask(arg4, mmap_flags_tbl),
  5942. arg5,
  5943. arg6));
  5944. #endif
  5945. break;
  5946. #endif
  5947. #ifdef TARGET_NR_mmap2
  5948. case TARGET_NR_mmap2:
  5949. #ifndef MMAP_SHIFT
  5950. #define MMAP_SHIFT 12
  5951. #endif
  5952. ret = get_errno(target_mmap(arg1, arg2, arg3,
  5953. target_to_host_bitmask(arg4, mmap_flags_tbl),
  5954. arg5,
  5955. arg6 << MMAP_SHIFT));
  5956. break;
  5957. #endif
  5958. case TARGET_NR_munmap:
  5959. ret = get_errno(target_munmap(arg1, arg2));
  5960. break;
  5961. case TARGET_NR_mprotect:
  5962. {
  5963. TaskState *ts = ((CPUArchState *)cpu_env)->opaque;
  5964. /* Special hack to detect libc making the stack executable. */
  5965. if ((arg3 & PROT_GROWSDOWN)
  5966. && arg1 >= ts->info->stack_limit
  5967. && arg1 <= ts->info->start_stack) {
  5968. arg3 &= ~PROT_GROWSDOWN;
  5969. arg2 = arg2 + arg1 - ts->info->stack_limit;
  5970. arg1 = ts->info->stack_limit;
  5971. }
  5972. }
  5973. ret = get_errno(target_mprotect(arg1, arg2, arg3));
  5974. break;
  5975. #ifdef TARGET_NR_mremap
  5976. case TARGET_NR_mremap:
  5977. ret = get_errno(target_mremap(arg1, arg2, arg3, arg4, arg5));
  5978. break;
  5979. #endif
  5980. /* ??? msync/mlock/munlock are broken for softmmu. */
  5981. #ifdef TARGET_NR_msync
  5982. case TARGET_NR_msync:
  5983. ret = get_errno(msync(g2h(arg1), arg2, arg3));
  5984. break;
  5985. #endif
  5986. #ifdef TARGET_NR_mlock
  5987. case TARGET_NR_mlock:
  5988. ret = get_errno(mlock(g2h(arg1), arg2));
  5989. break;
  5990. #endif
  5991. #ifdef TARGET_NR_munlock
  5992. case TARGET_NR_munlock:
  5993. ret = get_errno(munlock(g2h(arg1), arg2));
  5994. break;
  5995. #endif
  5996. #ifdef TARGET_NR_mlockall
  5997. case TARGET_NR_mlockall:
  5998. ret = get_errno(mlockall(arg1));
  5999. break;
  6000. #endif
  6001. #ifdef TARGET_NR_munlockall
  6002. case TARGET_NR_munlockall:
  6003. ret = get_errno(munlockall());
  6004. break;
  6005. #endif
  6006. case TARGET_NR_truncate:
  6007. if (!(p = lock_user_string(arg1)))
  6008. goto efault;
  6009. ret = get_errno(truncate(p, arg2));
  6010. unlock_user(p, arg1, 0);
  6011. break;
  6012. case TARGET_NR_ftruncate:
  6013. ret = get_errno(ftruncate(arg1, arg2));
  6014. break;
  6015. case TARGET_NR_fchmod:
  6016. ret = get_errno(fchmod(arg1, arg2));
  6017. break;
  6018. #if defined(TARGET_NR_fchmodat) && defined(__NR_fchmodat)
  6019. case TARGET_NR_fchmodat:
  6020. if (!(p = lock_user_string(arg2)))
  6021. goto efault;
  6022. ret = get_errno(sys_fchmodat(arg1, p, arg3));
  6023. unlock_user(p, arg2, 0);
  6024. break;
  6025. #endif
  6026. case TARGET_NR_getpriority:
  6027. /* Note that negative values are valid for getpriority, so we must
  6028. differentiate based on errno settings. */
  6029. errno = 0;
  6030. ret = getpriority(arg1, arg2);
  6031. if (ret == -1 && errno != 0) {
  6032. ret = -host_to_target_errno(errno);
  6033. break;
  6034. }
  6035. #ifdef TARGET_ALPHA
  6036. /* Return value is the unbiased priority. Signal no error. */
  6037. ((CPUAlphaState *)cpu_env)->ir[IR_V0] = 0;
  6038. #else
  6039. /* Return value is a biased priority to avoid negative numbers. */
  6040. ret = 20 - ret;
  6041. #endif
  6042. break;
  6043. case TARGET_NR_setpriority:
  6044. ret = get_errno(setpriority(arg1, arg2, arg3));
  6045. break;
  6046. #ifdef TARGET_NR_profil
  6047. case TARGET_NR_profil:
  6048. goto unimplemented;
  6049. #endif
  6050. case TARGET_NR_statfs:
  6051. if (!(p = lock_user_string(arg1)))
  6052. goto efault;
  6053. ret = get_errno(statfs(path(p), &stfs));
  6054. unlock_user(p, arg1, 0);
  6055. convert_statfs:
  6056. if (!is_error(ret)) {
  6057. struct target_statfs *target_stfs;
  6058. if (!lock_user_struct(VERIFY_WRITE, target_stfs, arg2, 0))
  6059. goto efault;
  6060. __put_user(stfs.f_type, &target_stfs->f_type);
  6061. __put_user(stfs.f_bsize, &target_stfs->f_bsize);
  6062. __put_user(stfs.f_blocks, &target_stfs->f_blocks);
  6063. __put_user(stfs.f_bfree, &target_stfs->f_bfree);
  6064. __put_user(stfs.f_bavail, &target_stfs->f_bavail);
  6065. __put_user(stfs.f_files, &target_stfs->f_files);
  6066. __put_user(stfs.f_ffree, &target_stfs->f_ffree);
  6067. __put_user(stfs.f_fsid.__val[0], &target_stfs->f_fsid.val[0]);
  6068. __put_user(stfs.f_fsid.__val[1], &target_stfs->f_fsid.val[1]);
  6069. __put_user(stfs.f_namelen, &target_stfs->f_namelen);
  6070. __put_user(stfs.f_frsize, &target_stfs->f_frsize);
  6071. memset(target_stfs->f_spare, 0, sizeof(target_stfs->f_spare));
  6072. unlock_user_struct(target_stfs, arg2, 1);
  6073. }
  6074. break;
  6075. case TARGET_NR_fstatfs:
  6076. ret = get_errno(fstatfs(arg1, &stfs));
  6077. goto convert_statfs;
  6078. #ifdef TARGET_NR_statfs64
  6079. case TARGET_NR_statfs64:
  6080. if (!(p = lock_user_string(arg1)))
  6081. goto efault;
  6082. ret = get_errno(statfs(path(p), &stfs));
  6083. unlock_user(p, arg1, 0);
  6084. convert_statfs64:
  6085. if (!is_error(ret)) {
  6086. struct target_statfs64 *target_stfs;
  6087. if (!lock_user_struct(VERIFY_WRITE, target_stfs, arg3, 0))
  6088. goto efault;
  6089. __put_user(stfs.f_type, &target_stfs->f_type);
  6090. __put_user(stfs.f_bsize, &target_stfs->f_bsize);
  6091. __put_user(stfs.f_blocks, &target_stfs->f_blocks);
  6092. __put_user(stfs.f_bfree, &target_stfs->f_bfree);
  6093. __put_user(stfs.f_bavail, &target_stfs->f_bavail);
  6094. __put_user(stfs.f_files, &target_stfs->f_files);
  6095. __put_user(stfs.f_ffree, &target_stfs->f_ffree);
  6096. __put_user(stfs.f_fsid.__val[0], &target_stfs->f_fsid.val[0]);
  6097. __put_user(stfs.f_fsid.__val[1], &target_stfs->f_fsid.val[1]);
  6098. __put_user(stfs.f_namelen, &target_stfs->f_namelen);
  6099. __put_user(stfs.f_frsize, &target_stfs->f_frsize);
  6100. memset(target_stfs->f_spare, 0, sizeof(target_stfs->f_spare));
  6101. unlock_user_struct(target_stfs, arg3, 1);
  6102. }
  6103. break;
  6104. case TARGET_NR_fstatfs64:
  6105. ret = get_errno(fstatfs(arg1, &stfs));
  6106. goto convert_statfs64;
  6107. #endif
  6108. #ifdef TARGET_NR_ioperm
  6109. case TARGET_NR_ioperm:
  6110. goto unimplemented;
  6111. #endif
  6112. #ifdef TARGET_NR_socketcall
  6113. case TARGET_NR_socketcall:
  6114. ret = do_socketcall(arg1, arg2);
  6115. break;
  6116. #endif
  6117. #ifdef TARGET_NR_accept
  6118. case TARGET_NR_accept:
  6119. ret = do_accept(arg1, arg2, arg3);
  6120. break;
  6121. #endif
  6122. #ifdef TARGET_NR_bind
  6123. case TARGET_NR_bind:
  6124. ret = do_bind(arg1, arg2, arg3);
  6125. break;
  6126. #endif
  6127. #ifdef TARGET_NR_connect
  6128. case TARGET_NR_connect:
  6129. ret = do_connect(arg1, arg2, arg3);
  6130. break;
  6131. #endif
  6132. #ifdef TARGET_NR_getpeername
  6133. case TARGET_NR_getpeername:
  6134. ret = do_getpeername(arg1, arg2, arg3);
  6135. break;
  6136. #endif
  6137. #ifdef TARGET_NR_getsockname
  6138. case TARGET_NR_getsockname:
  6139. ret = do_getsockname(arg1, arg2, arg3);
  6140. break;
  6141. #endif
  6142. #ifdef TARGET_NR_getsockopt
  6143. case TARGET_NR_getsockopt:
  6144. ret = do_getsockopt(arg1, arg2, arg3, arg4, arg5);
  6145. break;
  6146. #endif
  6147. #ifdef TARGET_NR_listen
  6148. case TARGET_NR_listen:
  6149. ret = get_errno(listen(arg1, arg2));
  6150. break;
  6151. #endif
  6152. #ifdef TARGET_NR_recv
  6153. case TARGET_NR_recv:
  6154. ret = do_recvfrom(arg1, arg2, arg3, arg4, 0, 0);
  6155. break;
  6156. #endif
  6157. #ifdef TARGET_NR_recvfrom
  6158. case TARGET_NR_recvfrom:
  6159. ret = do_recvfrom(arg1, arg2, arg3, arg4, arg5, arg6);
  6160. break;
  6161. #endif
  6162. #ifdef TARGET_NR_recvmsg
  6163. case TARGET_NR_recvmsg:
  6164. ret = do_sendrecvmsg(arg1, arg2, arg3, 0);
  6165. break;
  6166. #endif
  6167. #ifdef TARGET_NR_send
  6168. case TARGET_NR_send:
  6169. ret = do_sendto(arg1, arg2, arg3, arg4, 0, 0);
  6170. break;
  6171. #endif
  6172. #ifdef TARGET_NR_sendmsg
  6173. case TARGET_NR_sendmsg:
  6174. ret = do_sendrecvmsg(arg1, arg2, arg3, 1);
  6175. break;
  6176. #endif
  6177. #ifdef TARGET_NR_sendto
  6178. case TARGET_NR_sendto:
  6179. ret = do_sendto(arg1, arg2, arg3, arg4, arg5, arg6);
  6180. break;
  6181. #endif
  6182. #ifdef TARGET_NR_shutdown
  6183. case TARGET_NR_shutdown:
  6184. ret = get_errno(shutdown(arg1, arg2));
  6185. break;
  6186. #endif
  6187. #ifdef TARGET_NR_socket
  6188. case TARGET_NR_socket:
  6189. ret = do_socket(arg1, arg2, arg3);
  6190. break;
  6191. #endif
  6192. #ifdef TARGET_NR_socketpair
  6193. case TARGET_NR_socketpair:
  6194. ret = do_socketpair(arg1, arg2, arg3, arg4);
  6195. break;
  6196. #endif
  6197. #ifdef TARGET_NR_setsockopt
  6198. case TARGET_NR_setsockopt:
  6199. ret = do_setsockopt(arg1, arg2, arg3, arg4, (socklen_t) arg5);
  6200. break;
  6201. #endif
  6202. case TARGET_NR_syslog:
  6203. if (!(p = lock_user_string(arg2)))
  6204. goto efault;
  6205. ret = get_errno(sys_syslog((int)arg1, p, (int)arg3));
  6206. unlock_user(p, arg2, 0);
  6207. break;
  6208. case TARGET_NR_setitimer:
  6209. {
  6210. struct itimerval value, ovalue, *pvalue;
  6211. if (arg2) {
  6212. pvalue = &value;
  6213. if (copy_from_user_timeval(&pvalue->it_interval, arg2)
  6214. || copy_from_user_timeval(&pvalue->it_value,
  6215. arg2 + sizeof(struct target_timeval)))
  6216. goto efault;
  6217. } else {
  6218. pvalue = NULL;
  6219. }
  6220. ret = get_errno(setitimer(arg1, pvalue, &ovalue));
  6221. if (!is_error(ret) && arg3) {
  6222. if (copy_to_user_timeval(arg3,
  6223. &ovalue.it_interval)
  6224. || copy_to_user_timeval(arg3 + sizeof(struct target_timeval),
  6225. &ovalue.it_value))
  6226. goto efault;
  6227. }
  6228. }
  6229. break;
  6230. case TARGET_NR_getitimer:
  6231. {
  6232. struct itimerval value;
  6233. ret = get_errno(getitimer(arg1, &value));
  6234. if (!is_error(ret) && arg2) {
  6235. if (copy_to_user_timeval(arg2,
  6236. &value.it_interval)
  6237. || copy_to_user_timeval(arg2 + sizeof(struct target_timeval),
  6238. &value.it_value))
  6239. goto efault;
  6240. }
  6241. }
  6242. break;
  6243. case TARGET_NR_stat:
  6244. if (!(p = lock_user_string(arg1)))
  6245. goto efault;
  6246. ret = get_errno(stat(path(p), &st));
  6247. unlock_user(p, arg1, 0);
  6248. goto do_stat;
  6249. case TARGET_NR_lstat:
  6250. if (!(p = lock_user_string(arg1)))
  6251. goto efault;
  6252. ret = get_errno(lstat(path(p), &st));
  6253. unlock_user(p, arg1, 0);
  6254. goto do_stat;
  6255. case TARGET_NR_fstat:
  6256. {
  6257. ret = get_errno(fstat(arg1, &st));
  6258. do_stat:
  6259. if (!is_error(ret)) {
  6260. struct target_stat *target_st;
  6261. if (!lock_user_struct(VERIFY_WRITE, target_st, arg2, 0))
  6262. goto efault;
  6263. memset(target_st, 0, sizeof(*target_st));
  6264. __put_user(st.st_dev, &target_st->st_dev);
  6265. __put_user(st.st_ino, &target_st->st_ino);
  6266. __put_user(st.st_mode, &target_st->st_mode);
  6267. __put_user(st.st_uid, &target_st->st_uid);
  6268. __put_user(st.st_gid, &target_st->st_gid);
  6269. __put_user(st.st_nlink, &target_st->st_nlink);
  6270. __put_user(st.st_rdev, &target_st->st_rdev);
  6271. __put_user(st.st_size, &target_st->st_size);
  6272. __put_user(st.st_blksize, &target_st->st_blksize);
  6273. __put_user(st.st_blocks, &target_st->st_blocks);
  6274. __put_user(st.st_atime, &target_st->target_st_atime);
  6275. __put_user(st.st_mtime, &target_st->target_st_mtime);
  6276. __put_user(st.st_ctime, &target_st->target_st_ctime);
  6277. unlock_user_struct(target_st, arg2, 1);
  6278. }
  6279. }
  6280. break;
  6281. #ifdef TARGET_NR_olduname
  6282. case TARGET_NR_olduname:
  6283. goto unimplemented;
  6284. #endif
  6285. #ifdef TARGET_NR_iopl
  6286. case TARGET_NR_iopl:
  6287. goto unimplemented;
  6288. #endif
  6289. case TARGET_NR_vhangup:
  6290. ret = get_errno(vhangup());
  6291. break;
  6292. #ifdef TARGET_NR_idle
  6293. case TARGET_NR_idle:
  6294. goto unimplemented;
  6295. #endif
  6296. #ifdef TARGET_NR_syscall
  6297. case TARGET_NR_syscall:
  6298. ret = do_syscall(cpu_env, arg1 & 0xffff, arg2, arg3, arg4, arg5,
  6299. arg6, arg7, arg8, 0);
  6300. break;
  6301. #endif
  6302. case TARGET_NR_wait4:
  6303. {
  6304. int status;
  6305. abi_long status_ptr = arg2;
  6306. struct rusage rusage, *rusage_ptr;
  6307. abi_ulong target_rusage = arg4;
  6308. if (target_rusage)
  6309. rusage_ptr = &rusage;
  6310. else
  6311. rusage_ptr = NULL;
  6312. ret = get_errno(wait4(arg1, &status, arg3, rusage_ptr));
  6313. if (!is_error(ret)) {
  6314. if (status_ptr && ret) {
  6315. status = host_to_target_waitstatus(status);
  6316. if (put_user_s32(status, status_ptr))
  6317. goto efault;
  6318. }
  6319. if (target_rusage)
  6320. host_to_target_rusage(target_rusage, &rusage);
  6321. }
  6322. }
  6323. break;
  6324. #ifdef TARGET_NR_swapoff
  6325. case TARGET_NR_swapoff:
  6326. if (!(p = lock_user_string(arg1)))
  6327. goto efault;
  6328. ret = get_errno(swapoff(p));
  6329. unlock_user(p, arg1, 0);
  6330. break;
  6331. #endif
  6332. case TARGET_NR_sysinfo:
  6333. {
  6334. struct target_sysinfo *target_value;
  6335. struct sysinfo value;
  6336. ret = get_errno(sysinfo(&value));
  6337. if (!is_error(ret) && arg1)
  6338. {
  6339. if (!lock_user_struct(VERIFY_WRITE, target_value, arg1, 0))
  6340. goto efault;
  6341. __put_user(value.uptime, &target_value->uptime);
  6342. __put_user(value.loads[0], &target_value->loads[0]);
  6343. __put_user(value.loads[1], &target_value->loads[1]);
  6344. __put_user(value.loads[2], &target_value->loads[2]);
  6345. __put_user(value.totalram, &target_value->totalram);
  6346. __put_user(value.freeram, &target_value->freeram);
  6347. __put_user(value.sharedram, &target_value->sharedram);
  6348. __put_user(value.bufferram, &target_value->bufferram);
  6349. __put_user(value.totalswap, &target_value->totalswap);
  6350. __put_user(value.freeswap, &target_value->freeswap);
  6351. __put_user(value.procs, &target_value->procs);
  6352. __put_user(value.totalhigh, &target_value->totalhigh);
  6353. __put_user(value.freehigh, &target_value->freehigh);
  6354. __put_user(value.mem_unit, &target_value->mem_unit);
  6355. unlock_user_struct(target_value, arg1, 1);
  6356. }
  6357. }
  6358. break;
  6359. #ifdef TARGET_NR_ipc
  6360. case TARGET_NR_ipc:
  6361. ret = do_ipc(arg1, arg2, arg3, arg4, arg5, arg6);
  6362. break;
  6363. #endif
  6364. #ifdef TARGET_NR_semget
  6365. case TARGET_NR_semget:
  6366. ret = get_errno(semget(arg1, arg2, arg3));
  6367. break;
  6368. #endif
  6369. #ifdef TARGET_NR_semop
  6370. case TARGET_NR_semop:
  6371. ret = get_errno(do_semop(arg1, arg2, arg3));
  6372. break;
  6373. #endif
  6374. #ifdef TARGET_NR_semctl
  6375. case TARGET_NR_semctl:
  6376. ret = do_semctl(arg1, arg2, arg3, (union target_semun)(abi_ulong)arg4);
  6377. break;
  6378. #endif
  6379. #ifdef TARGET_NR_msgctl
  6380. case TARGET_NR_msgctl:
  6381. ret = do_msgctl(arg1, arg2, arg3);
  6382. break;
  6383. #endif
  6384. #ifdef TARGET_NR_msgget
  6385. case TARGET_NR_msgget:
  6386. ret = get_errno(msgget(arg1, arg2));
  6387. break;
  6388. #endif
  6389. #ifdef TARGET_NR_msgrcv
  6390. case TARGET_NR_msgrcv:
  6391. ret = do_msgrcv(arg1, arg2, arg3, arg4, arg5);
  6392. break;
  6393. #endif
  6394. #ifdef TARGET_NR_msgsnd
  6395. case TARGET_NR_msgsnd:
  6396. ret = do_msgsnd(arg1, arg2, arg3, arg4);
  6397. break;
  6398. #endif
  6399. #ifdef TARGET_NR_shmget
  6400. case TARGET_NR_shmget:
  6401. ret = get_errno(shmget(arg1, arg2, arg3));
  6402. break;
  6403. #endif
  6404. #ifdef TARGET_NR_shmctl
  6405. case TARGET_NR_shmctl:
  6406. ret = do_shmctl(arg1, arg2, arg3);
  6407. break;
  6408. #endif
  6409. #ifdef TARGET_NR_shmat
  6410. case TARGET_NR_shmat:
  6411. ret = do_shmat(arg1, arg2, arg3);
  6412. break;
  6413. #endif
  6414. #ifdef TARGET_NR_shmdt
  6415. case TARGET_NR_shmdt:
  6416. ret = do_shmdt(arg1);
  6417. break;
  6418. #endif
  6419. case TARGET_NR_fsync:
  6420. ret = get_errno(fsync(arg1));
  6421. break;
  6422. case TARGET_NR_clone:
  6423. #if defined(TARGET_SH4) || defined(TARGET_ALPHA)
  6424. ret = get_errno(do_fork(cpu_env, arg1, arg2, arg3, arg5, arg4));
  6425. #elif defined(TARGET_CRIS)
  6426. ret = get_errno(do_fork(cpu_env, arg2, arg1, arg3, arg4, arg5));
  6427. #elif defined(TARGET_MICROBLAZE)
  6428. ret = get_errno(do_fork(cpu_env, arg1, arg2, arg4, arg6, arg5));
  6429. #elif defined(TARGET_S390X)
  6430. ret = get_errno(do_fork(cpu_env, arg2, arg1, arg3, arg5, arg4));
  6431. #else
  6432. ret = get_errno(do_fork(cpu_env, arg1, arg2, arg3, arg4, arg5));
  6433. #endif
  6434. break;
  6435. #ifdef __NR_exit_group
  6436. /* new thread calls */
  6437. case TARGET_NR_exit_group:
  6438. #ifdef TARGET_GPROF
  6439. _mcleanup();
  6440. #endif
  6441. gdb_exit(cpu_env, arg1);
  6442. ret = get_errno(exit_group(arg1));
  6443. break;
  6444. #endif
  6445. case TARGET_NR_setdomainname:
  6446. if (!(p = lock_user_string(arg1)))
  6447. goto efault;
  6448. ret = get_errno(setdomainname(p, arg2));
  6449. unlock_user(p, arg1, 0);
  6450. break;
  6451. case TARGET_NR_uname:
  6452. /* no need to transcode because we use the linux syscall */
  6453. {
  6454. struct new_utsname * buf;
  6455. if (!lock_user_struct(VERIFY_WRITE, buf, arg1, 0))
  6456. goto efault;
  6457. ret = get_errno(sys_uname(buf));
  6458. if (!is_error(ret)) {
  6459. /* Overrite the native machine name with whatever is being
  6460. emulated. */
  6461. strcpy (buf->machine, cpu_to_uname_machine(cpu_env));
  6462. /* Allow the user to override the reported release. */
  6463. if (qemu_uname_release && *qemu_uname_release)
  6464. strcpy (buf->release, qemu_uname_release);
  6465. }
  6466. unlock_user_struct(buf, arg1, 1);
  6467. }
  6468. break;
  6469. #ifdef TARGET_I386
  6470. case TARGET_NR_modify_ldt:
  6471. ret = do_modify_ldt(cpu_env, arg1, arg2, arg3);
  6472. break;
  6473. #if !defined(TARGET_X86_64)
  6474. case TARGET_NR_vm86old:
  6475. goto unimplemented;
  6476. case TARGET_NR_vm86:
  6477. ret = do_vm86(cpu_env, arg1, arg2);
  6478. break;
  6479. #endif
  6480. #endif
  6481. case TARGET_NR_adjtimex:
  6482. goto unimplemented;
  6483. #ifdef TARGET_NR_create_module
  6484. case TARGET_NR_create_module:
  6485. #endif
  6486. case TARGET_NR_init_module:
  6487. case TARGET_NR_delete_module:
  6488. #ifdef TARGET_NR_get_kernel_syms
  6489. case TARGET_NR_get_kernel_syms:
  6490. #endif
  6491. goto unimplemented;
  6492. case TARGET_NR_quotactl:
  6493. goto unimplemented;
  6494. case TARGET_NR_getpgid:
  6495. ret = get_errno(getpgid(arg1));
  6496. break;
  6497. case TARGET_NR_fchdir:
  6498. ret = get_errno(fchdir(arg1));
  6499. break;
  6500. #ifdef TARGET_NR_bdflush /* not on x86_64 */
  6501. case TARGET_NR_bdflush:
  6502. goto unimplemented;
  6503. #endif
  6504. #ifdef TARGET_NR_sysfs
  6505. case TARGET_NR_sysfs:
  6506. goto unimplemented;
  6507. #endif
  6508. case TARGET_NR_personality:
  6509. ret = get_errno(personality(arg1));
  6510. break;
  6511. #ifdef TARGET_NR_afs_syscall
  6512. case TARGET_NR_afs_syscall:
  6513. goto unimplemented;
  6514. #endif
  6515. #ifdef TARGET_NR__llseek /* Not on alpha */
  6516. case TARGET_NR__llseek:
  6517. {
  6518. int64_t res;
  6519. #if !defined(__NR_llseek)
  6520. res = lseek(arg1, ((uint64_t)arg2 << 32) | arg3, arg5);
  6521. if (res == -1) {
  6522. ret = get_errno(res);
  6523. } else {
  6524. ret = 0;
  6525. }
  6526. #else
  6527. ret = get_errno(_llseek(arg1, arg2, arg3, &res, arg5));
  6528. #endif
  6529. if ((ret == 0) && put_user_s64(res, arg4)) {
  6530. goto efault;
  6531. }
  6532. }
  6533. break;
  6534. #endif
  6535. case TARGET_NR_getdents:
  6536. #if TARGET_ABI_BITS == 32 && HOST_LONG_BITS == 64
  6537. {
  6538. struct target_dirent *target_dirp;
  6539. struct linux_dirent *dirp;
  6540. abi_long count = arg3;
  6541. dirp = malloc(count);
  6542. if (!dirp) {
  6543. ret = -TARGET_ENOMEM;
  6544. goto fail;
  6545. }
  6546. ret = get_errno(sys_getdents(arg1, dirp, count));
  6547. if (!is_error(ret)) {
  6548. struct linux_dirent *de;
  6549. struct target_dirent *tde;
  6550. int len = ret;
  6551. int reclen, treclen;
  6552. int count1, tnamelen;
  6553. count1 = 0;
  6554. de = dirp;
  6555. if (!(target_dirp = lock_user(VERIFY_WRITE, arg2, count, 0)))
  6556. goto efault;
  6557. tde = target_dirp;
  6558. while (len > 0) {
  6559. reclen = de->d_reclen;
  6560. tnamelen = reclen - offsetof(struct linux_dirent, d_name);
  6561. assert(tnamelen >= 0);
  6562. treclen = tnamelen + offsetof(struct target_dirent, d_name);
  6563. assert(count1 + treclen <= count);
  6564. tde->d_reclen = tswap16(treclen);
  6565. tde->d_ino = tswapal(de->d_ino);
  6566. tde->d_off = tswapal(de->d_off);
  6567. memcpy(tde->d_name, de->d_name, tnamelen);
  6568. de = (struct linux_dirent *)((char *)de + reclen);
  6569. len -= reclen;
  6570. tde = (struct target_dirent *)((char *)tde + treclen);
  6571. count1 += treclen;
  6572. }
  6573. ret = count1;
  6574. unlock_user(target_dirp, arg2, ret);
  6575. }
  6576. free(dirp);
  6577. }
  6578. #else
  6579. {
  6580. struct linux_dirent *dirp;
  6581. abi_long count = arg3;
  6582. if (!(dirp = lock_user(VERIFY_WRITE, arg2, count, 0)))
  6583. goto efault;
  6584. ret = get_errno(sys_getdents(arg1, dirp, count));
  6585. if (!is_error(ret)) {
  6586. struct linux_dirent *de;
  6587. int len = ret;
  6588. int reclen;
  6589. de = dirp;
  6590. while (len > 0) {
  6591. reclen = de->d_reclen;
  6592. if (reclen > len)
  6593. break;
  6594. de->d_reclen = tswap16(reclen);
  6595. tswapls(&de->d_ino);
  6596. tswapls(&de->d_off);
  6597. de = (struct linux_dirent *)((char *)de + reclen);
  6598. len -= reclen;
  6599. }
  6600. }
  6601. unlock_user(dirp, arg2, ret);
  6602. }
  6603. #endif
  6604. break;
  6605. #if defined(TARGET_NR_getdents64) && defined(__NR_getdents64)
  6606. case TARGET_NR_getdents64:
  6607. {
  6608. struct linux_dirent64 *dirp;
  6609. abi_long count = arg3;
  6610. if (!(dirp = lock_user(VERIFY_WRITE, arg2, count, 0)))
  6611. goto efault;
  6612. ret = get_errno(sys_getdents64(arg1, dirp, count));
  6613. if (!is_error(ret)) {
  6614. struct linux_dirent64 *de;
  6615. int len = ret;
  6616. int reclen;
  6617. de = dirp;
  6618. while (len > 0) {
  6619. reclen = de->d_reclen;
  6620. if (reclen > len)
  6621. break;
  6622. de->d_reclen = tswap16(reclen);
  6623. tswap64s((uint64_t *)&de->d_ino);
  6624. tswap64s((uint64_t *)&de->d_off);
  6625. de = (struct linux_dirent64 *)((char *)de + reclen);
  6626. len -= reclen;
  6627. }
  6628. }
  6629. unlock_user(dirp, arg2, ret);
  6630. }
  6631. break;
  6632. #endif /* TARGET_NR_getdents64 */
  6633. #if defined(TARGET_NR__newselect)
  6634. case TARGET_NR__newselect:
  6635. ret = do_select(arg1, arg2, arg3, arg4, arg5);
  6636. break;
  6637. #endif
  6638. #if defined(TARGET_NR_poll) || defined(TARGET_NR_ppoll)
  6639. # ifdef TARGET_NR_poll
  6640. case TARGET_NR_poll:
  6641. # endif
  6642. # ifdef TARGET_NR_ppoll
  6643. case TARGET_NR_ppoll:
  6644. # endif
  6645. {
  6646. struct target_pollfd *target_pfd;
  6647. unsigned int nfds = arg2;
  6648. int timeout = arg3;
  6649. struct pollfd *pfd;
  6650. unsigned int i;
  6651. target_pfd = lock_user(VERIFY_WRITE, arg1, sizeof(struct target_pollfd) * nfds, 1);
  6652. if (!target_pfd)
  6653. goto efault;
  6654. pfd = alloca(sizeof(struct pollfd) * nfds);
  6655. for(i = 0; i < nfds; i++) {
  6656. pfd[i].fd = tswap32(target_pfd[i].fd);
  6657. pfd[i].events = tswap16(target_pfd[i].events);
  6658. }
  6659. # ifdef TARGET_NR_ppoll
  6660. if (num == TARGET_NR_ppoll) {
  6661. struct timespec _timeout_ts, *timeout_ts = &_timeout_ts;
  6662. target_sigset_t *target_set;
  6663. sigset_t _set, *set = &_set;
  6664. if (arg3) {
  6665. if (target_to_host_timespec(timeout_ts, arg3)) {
  6666. unlock_user(target_pfd, arg1, 0);
  6667. goto efault;
  6668. }
  6669. } else {
  6670. timeout_ts = NULL;
  6671. }
  6672. if (arg4) {
  6673. target_set = lock_user(VERIFY_READ, arg4, sizeof(target_sigset_t), 1);
  6674. if (!target_set) {
  6675. unlock_user(target_pfd, arg1, 0);
  6676. goto efault;
  6677. }
  6678. target_to_host_sigset(set, target_set);
  6679. } else {
  6680. set = NULL;
  6681. }
  6682. ret = get_errno(sys_ppoll(pfd, nfds, timeout_ts, set, _NSIG/8));
  6683. if (!is_error(ret) && arg3) {
  6684. host_to_target_timespec(arg3, timeout_ts);
  6685. }
  6686. if (arg4) {
  6687. unlock_user(target_set, arg4, 0);
  6688. }
  6689. } else
  6690. # endif
  6691. ret = get_errno(poll(pfd, nfds, timeout));
  6692. if (!is_error(ret)) {
  6693. for(i = 0; i < nfds; i++) {
  6694. target_pfd[i].revents = tswap16(pfd[i].revents);
  6695. }
  6696. }
  6697. unlock_user(target_pfd, arg1, sizeof(struct target_pollfd) * nfds);
  6698. }
  6699. break;
  6700. #endif
  6701. case TARGET_NR_flock:
  6702. /* NOTE: the flock constant seems to be the same for every
  6703. Linux platform */
  6704. ret = get_errno(flock(arg1, arg2));
  6705. break;
  6706. case TARGET_NR_readv:
  6707. {
  6708. struct iovec *vec = lock_iovec(VERIFY_WRITE, arg2, arg3, 0);
  6709. if (vec != NULL) {
  6710. ret = get_errno(readv(arg1, vec, arg3));
  6711. unlock_iovec(vec, arg2, arg3, 1);
  6712. } else {
  6713. ret = -host_to_target_errno(errno);
  6714. }
  6715. }
  6716. break;
  6717. case TARGET_NR_writev:
  6718. {
  6719. struct iovec *vec = lock_iovec(VERIFY_READ, arg2, arg3, 1);
  6720. if (vec != NULL) {
  6721. ret = get_errno(writev(arg1, vec, arg3));
  6722. unlock_iovec(vec, arg2, arg3, 0);
  6723. } else {
  6724. ret = -host_to_target_errno(errno);
  6725. }
  6726. }
  6727. break;
  6728. case TARGET_NR_getsid:
  6729. ret = get_errno(getsid(arg1));
  6730. break;
  6731. #if defined(TARGET_NR_fdatasync) /* Not on alpha (osf_datasync ?) */
  6732. case TARGET_NR_fdatasync:
  6733. ret = get_errno(fdatasync(arg1));
  6734. break;
  6735. #endif
  6736. case TARGET_NR__sysctl:
  6737. /* We don't implement this, but ENOTDIR is always a safe
  6738. return value. */
  6739. ret = -TARGET_ENOTDIR;
  6740. break;
  6741. case TARGET_NR_sched_getaffinity:
  6742. {
  6743. unsigned int mask_size;
  6744. unsigned long *mask;
  6745. /*
  6746. * sched_getaffinity needs multiples of ulong, so need to take
  6747. * care of mismatches between target ulong and host ulong sizes.
  6748. */
  6749. if (arg2 & (sizeof(abi_ulong) - 1)) {
  6750. ret = -TARGET_EINVAL;
  6751. break;
  6752. }
  6753. mask_size = (arg2 + (sizeof(*mask) - 1)) & ~(sizeof(*mask) - 1);
  6754. mask = alloca(mask_size);
  6755. ret = get_errno(sys_sched_getaffinity(arg1, mask_size, mask));
  6756. if (!is_error(ret)) {
  6757. if (copy_to_user(arg3, mask, ret)) {
  6758. goto efault;
  6759. }
  6760. }
  6761. }
  6762. break;
  6763. case TARGET_NR_sched_setaffinity:
  6764. {
  6765. unsigned int mask_size;
  6766. unsigned long *mask;
  6767. /*
  6768. * sched_setaffinity needs multiples of ulong, so need to take
  6769. * care of mismatches between target ulong and host ulong sizes.
  6770. */
  6771. if (arg2 & (sizeof(abi_ulong) - 1)) {
  6772. ret = -TARGET_EINVAL;
  6773. break;
  6774. }
  6775. mask_size = (arg2 + (sizeof(*mask) - 1)) & ~(sizeof(*mask) - 1);
  6776. mask = alloca(mask_size);
  6777. if (!lock_user_struct(VERIFY_READ, p, arg3, 1)) {
  6778. goto efault;
  6779. }
  6780. memcpy(mask, p, arg2);
  6781. unlock_user_struct(p, arg2, 0);
  6782. ret = get_errno(sys_sched_setaffinity(arg1, mask_size, mask));
  6783. }
  6784. break;
  6785. case TARGET_NR_sched_setparam:
  6786. {
  6787. struct sched_param *target_schp;
  6788. struct sched_param schp;
  6789. if (!lock_user_struct(VERIFY_READ, target_schp, arg2, 1))
  6790. goto efault;
  6791. schp.sched_priority = tswap32(target_schp->sched_priority);
  6792. unlock_user_struct(target_schp, arg2, 0);
  6793. ret = get_errno(sched_setparam(arg1, &schp));
  6794. }
  6795. break;
  6796. case TARGET_NR_sched_getparam:
  6797. {
  6798. struct sched_param *target_schp;
  6799. struct sched_param schp;
  6800. ret = get_errno(sched_getparam(arg1, &schp));
  6801. if (!is_error(ret)) {
  6802. if (!lock_user_struct(VERIFY_WRITE, target_schp, arg2, 0))
  6803. goto efault;
  6804. target_schp->sched_priority = tswap32(schp.sched_priority);
  6805. unlock_user_struct(target_schp, arg2, 1);
  6806. }
  6807. }
  6808. break;
  6809. case TARGET_NR_sched_setscheduler:
  6810. {
  6811. struct sched_param *target_schp;
  6812. struct sched_param schp;
  6813. if (!lock_user_struct(VERIFY_READ, target_schp, arg3, 1))
  6814. goto efault;
  6815. schp.sched_priority = tswap32(target_schp->sched_priority);
  6816. unlock_user_struct(target_schp, arg3, 0);
  6817. ret = get_errno(sched_setscheduler(arg1, arg2, &schp));
  6818. }
  6819. break;
  6820. case TARGET_NR_sched_getscheduler:
  6821. ret = get_errno(sched_getscheduler(arg1));
  6822. break;
  6823. case TARGET_NR_sched_yield:
  6824. ret = get_errno(sched_yield());
  6825. break;
  6826. case TARGET_NR_sched_get_priority_max:
  6827. ret = get_errno(sched_get_priority_max(arg1));
  6828. break;
  6829. case TARGET_NR_sched_get_priority_min:
  6830. ret = get_errno(sched_get_priority_min(arg1));
  6831. break;
  6832. case TARGET_NR_sched_rr_get_interval:
  6833. {
  6834. struct timespec ts;
  6835. ret = get_errno(sched_rr_get_interval(arg1, &ts));
  6836. if (!is_error(ret)) {
  6837. host_to_target_timespec(arg2, &ts);
  6838. }
  6839. }
  6840. break;
  6841. case TARGET_NR_nanosleep:
  6842. {
  6843. struct timespec req, rem;
  6844. target_to_host_timespec(&req, arg1);
  6845. ret = get_errno(nanosleep(&req, &rem));
  6846. if (is_error(ret) && arg2) {
  6847. host_to_target_timespec(arg2, &rem);
  6848. }
  6849. }
  6850. break;
  6851. #ifdef TARGET_NR_query_module
  6852. case TARGET_NR_query_module:
  6853. goto unimplemented;
  6854. #endif
  6855. #ifdef TARGET_NR_nfsservctl
  6856. case TARGET_NR_nfsservctl:
  6857. goto unimplemented;
  6858. #endif
  6859. case TARGET_NR_prctl:
  6860. switch (arg1) {
  6861. case PR_GET_PDEATHSIG:
  6862. {
  6863. int deathsig;
  6864. ret = get_errno(prctl(arg1, &deathsig, arg3, arg4, arg5));
  6865. if (!is_error(ret) && arg2
  6866. && put_user_ual(deathsig, arg2)) {
  6867. goto efault;
  6868. }
  6869. break;
  6870. }
  6871. #ifdef PR_GET_NAME
  6872. case PR_GET_NAME:
  6873. {
  6874. void *name = lock_user(VERIFY_WRITE, arg2, 16, 1);
  6875. if (!name) {
  6876. goto efault;
  6877. }
  6878. ret = get_errno(prctl(arg1, (unsigned long)name,
  6879. arg3, arg4, arg5));
  6880. unlock_user(name, arg2, 16);
  6881. break;
  6882. }
  6883. case PR_SET_NAME:
  6884. {
  6885. void *name = lock_user(VERIFY_READ, arg2, 16, 1);
  6886. if (!name) {
  6887. goto efault;
  6888. }
  6889. ret = get_errno(prctl(arg1, (unsigned long)name,
  6890. arg3, arg4, arg5));
  6891. unlock_user(name, arg2, 0);
  6892. break;
  6893. }
  6894. #endif
  6895. default:
  6896. /* Most prctl options have no pointer arguments */
  6897. ret = get_errno(prctl(arg1, arg2, arg3, arg4, arg5));
  6898. break;
  6899. }
  6900. break;
  6901. #ifdef TARGET_NR_arch_prctl
  6902. case TARGET_NR_arch_prctl:
  6903. #if defined(TARGET_I386) && !defined(TARGET_ABI32)
  6904. ret = do_arch_prctl(cpu_env, arg1, arg2);
  6905. break;
  6906. #else
  6907. goto unimplemented;
  6908. #endif
  6909. #endif
  6910. #ifdef TARGET_NR_pread64
  6911. case TARGET_NR_pread64:
  6912. if (regpairs_aligned(cpu_env)) {
  6913. arg4 = arg5;
  6914. arg5 = arg6;
  6915. }
  6916. if (!(p = lock_user(VERIFY_WRITE, arg2, arg3, 0)))
  6917. goto efault;
  6918. ret = get_errno(pread64(arg1, p, arg3, target_offset64(arg4, arg5)));
  6919. unlock_user(p, arg2, ret);
  6920. break;
  6921. case TARGET_NR_pwrite64:
  6922. if (regpairs_aligned(cpu_env)) {
  6923. arg4 = arg5;
  6924. arg5 = arg6;
  6925. }
  6926. if (!(p = lock_user(VERIFY_READ, arg2, arg3, 1)))
  6927. goto efault;
  6928. ret = get_errno(pwrite64(arg1, p, arg3, target_offset64(arg4, arg5)));
  6929. unlock_user(p, arg2, 0);
  6930. break;
  6931. #endif
  6932. case TARGET_NR_getcwd:
  6933. if (!(p = lock_user(VERIFY_WRITE, arg1, arg2, 0)))
  6934. goto efault;
  6935. ret = get_errno(sys_getcwd1(p, arg2));
  6936. unlock_user(p, arg1, ret);
  6937. break;
  6938. case TARGET_NR_capget:
  6939. goto unimplemented;
  6940. case TARGET_NR_capset:
  6941. goto unimplemented;
  6942. case TARGET_NR_sigaltstack:
  6943. #if defined(TARGET_I386) || defined(TARGET_ARM) || defined(TARGET_MIPS) || \
  6944. defined(TARGET_SPARC) || defined(TARGET_PPC) || defined(TARGET_ALPHA) || \
  6945. defined(TARGET_M68K) || defined(TARGET_S390X) || defined(TARGET_OPENRISC)
  6946. ret = do_sigaltstack(arg1, arg2, get_sp_from_cpustate((CPUArchState *)cpu_env));
  6947. break;
  6948. #else
  6949. goto unimplemented;
  6950. #endif
  6951. case TARGET_NR_sendfile:
  6952. goto unimplemented;
  6953. #ifdef TARGET_NR_getpmsg
  6954. case TARGET_NR_getpmsg:
  6955. goto unimplemented;
  6956. #endif
  6957. #ifdef TARGET_NR_putpmsg
  6958. case TARGET_NR_putpmsg:
  6959. goto unimplemented;
  6960. #endif
  6961. #ifdef TARGET_NR_vfork
  6962. case TARGET_NR_vfork:
  6963. ret = get_errno(do_fork(cpu_env, CLONE_VFORK | CLONE_VM | SIGCHLD,
  6964. 0, 0, 0, 0));
  6965. break;
  6966. #endif
  6967. #ifdef TARGET_NR_ugetrlimit
  6968. case TARGET_NR_ugetrlimit:
  6969. {
  6970. struct rlimit rlim;
  6971. int resource = target_to_host_resource(arg1);
  6972. ret = get_errno(getrlimit(resource, &rlim));
  6973. if (!is_error(ret)) {
  6974. struct target_rlimit *target_rlim;
  6975. if (!lock_user_struct(VERIFY_WRITE, target_rlim, arg2, 0))
  6976. goto efault;
  6977. target_rlim->rlim_cur = host_to_target_rlim(rlim.rlim_cur);
  6978. target_rlim->rlim_max = host_to_target_rlim(rlim.rlim_max);
  6979. unlock_user_struct(target_rlim, arg2, 1);
  6980. }
  6981. break;
  6982. }
  6983. #endif
  6984. #ifdef TARGET_NR_truncate64
  6985. case TARGET_NR_truncate64:
  6986. if (!(p = lock_user_string(arg1)))
  6987. goto efault;
  6988. ret = target_truncate64(cpu_env, p, arg2, arg3, arg4);
  6989. unlock_user(p, arg1, 0);
  6990. break;
  6991. #endif
  6992. #ifdef TARGET_NR_ftruncate64
  6993. case TARGET_NR_ftruncate64:
  6994. ret = target_ftruncate64(cpu_env, arg1, arg2, arg3, arg4);
  6995. break;
  6996. #endif
  6997. #ifdef TARGET_NR_stat64
  6998. case TARGET_NR_stat64:
  6999. if (!(p = lock_user_string(arg1)))
  7000. goto efault;
  7001. ret = get_errno(stat(path(p), &st));
  7002. unlock_user(p, arg1, 0);
  7003. if (!is_error(ret))
  7004. ret = host_to_target_stat64(cpu_env, arg2, &st);
  7005. break;
  7006. #endif
  7007. #ifdef TARGET_NR_lstat64
  7008. case TARGET_NR_lstat64:
  7009. if (!(p = lock_user_string(arg1)))
  7010. goto efault;
  7011. ret = get_errno(lstat(path(p), &st));
  7012. unlock_user(p, arg1, 0);
  7013. if (!is_error(ret))
  7014. ret = host_to_target_stat64(cpu_env, arg2, &st);
  7015. break;
  7016. #endif
  7017. #ifdef TARGET_NR_fstat64
  7018. case TARGET_NR_fstat64:
  7019. ret = get_errno(fstat(arg1, &st));
  7020. if (!is_error(ret))
  7021. ret = host_to_target_stat64(cpu_env, arg2, &st);
  7022. break;
  7023. #endif
  7024. #if (defined(TARGET_NR_fstatat64) || defined(TARGET_NR_newfstatat)) && \
  7025. (defined(__NR_fstatat64) || defined(__NR_newfstatat))
  7026. #ifdef TARGET_NR_fstatat64
  7027. case TARGET_NR_fstatat64:
  7028. #endif
  7029. #ifdef TARGET_NR_newfstatat
  7030. case TARGET_NR_newfstatat:
  7031. #endif
  7032. if (!(p = lock_user_string(arg2)))
  7033. goto efault;
  7034. #ifdef __NR_fstatat64
  7035. ret = get_errno(sys_fstatat64(arg1, path(p), &st, arg4));
  7036. #else
  7037. ret = get_errno(sys_newfstatat(arg1, path(p), &st, arg4));
  7038. #endif
  7039. if (!is_error(ret))
  7040. ret = host_to_target_stat64(cpu_env, arg3, &st);
  7041. break;
  7042. #endif
  7043. case TARGET_NR_lchown:
  7044. if (!(p = lock_user_string(arg1)))
  7045. goto efault;
  7046. ret = get_errno(lchown(p, low2highuid(arg2), low2highgid(arg3)));
  7047. unlock_user(p, arg1, 0);
  7048. break;
  7049. #ifdef TARGET_NR_getuid
  7050. case TARGET_NR_getuid:
  7051. ret = get_errno(high2lowuid(getuid()));
  7052. break;
  7053. #endif
  7054. #ifdef TARGET_NR_getgid
  7055. case TARGET_NR_getgid:
  7056. ret = get_errno(high2lowgid(getgid()));
  7057. break;
  7058. #endif
  7059. #ifdef TARGET_NR_geteuid
  7060. case TARGET_NR_geteuid:
  7061. ret = get_errno(high2lowuid(geteuid()));
  7062. break;
  7063. #endif
  7064. #ifdef TARGET_NR_getegid
  7065. case TARGET_NR_getegid:
  7066. ret = get_errno(high2lowgid(getegid()));
  7067. break;
  7068. #endif
  7069. case TARGET_NR_setreuid:
  7070. ret = get_errno(setreuid(low2highuid(arg1), low2highuid(arg2)));
  7071. break;
  7072. case TARGET_NR_setregid:
  7073. ret = get_errno(setregid(low2highgid(arg1), low2highgid(arg2)));
  7074. break;
  7075. case TARGET_NR_getgroups:
  7076. {
  7077. int gidsetsize = arg1;
  7078. target_id *target_grouplist;
  7079. gid_t *grouplist;
  7080. int i;
  7081. grouplist = alloca(gidsetsize * sizeof(gid_t));
  7082. ret = get_errno(getgroups(gidsetsize, grouplist));
  7083. if (gidsetsize == 0)
  7084. break;
  7085. if (!is_error(ret)) {
  7086. target_grouplist = lock_user(VERIFY_WRITE, arg2, gidsetsize * 2, 0);
  7087. if (!target_grouplist)
  7088. goto efault;
  7089. for(i = 0;i < ret; i++)
  7090. target_grouplist[i] = tswapid(high2lowgid(grouplist[i]));
  7091. unlock_user(target_grouplist, arg2, gidsetsize * 2);
  7092. }
  7093. }
  7094. break;
  7095. case TARGET_NR_setgroups:
  7096. {
  7097. int gidsetsize = arg1;
  7098. target_id *target_grouplist;
  7099. gid_t *grouplist;
  7100. int i;
  7101. grouplist = alloca(gidsetsize * sizeof(gid_t));
  7102. target_grouplist = lock_user(VERIFY_READ, arg2, gidsetsize * 2, 1);
  7103. if (!target_grouplist) {
  7104. ret = -TARGET_EFAULT;
  7105. goto fail;
  7106. }
  7107. for(i = 0;i < gidsetsize; i++)
  7108. grouplist[i] = low2highgid(tswapid(target_grouplist[i]));
  7109. unlock_user(target_grouplist, arg2, 0);
  7110. ret = get_errno(setgroups(gidsetsize, grouplist));
  7111. }
  7112. break;
  7113. case TARGET_NR_fchown:
  7114. ret = get_errno(fchown(arg1, low2highuid(arg2), low2highgid(arg3)));
  7115. break;
  7116. #if defined(TARGET_NR_fchownat) && defined(__NR_fchownat)
  7117. case TARGET_NR_fchownat:
  7118. if (!(p = lock_user_string(arg2)))
  7119. goto efault;
  7120. ret = get_errno(sys_fchownat(arg1, p, low2highuid(arg3), low2highgid(arg4), arg5));
  7121. unlock_user(p, arg2, 0);
  7122. break;
  7123. #endif
  7124. #ifdef TARGET_NR_setresuid
  7125. case TARGET_NR_setresuid:
  7126. ret = get_errno(setresuid(low2highuid(arg1),
  7127. low2highuid(arg2),
  7128. low2highuid(arg3)));
  7129. break;
  7130. #endif
  7131. #ifdef TARGET_NR_getresuid
  7132. case TARGET_NR_getresuid:
  7133. {
  7134. uid_t ruid, euid, suid;
  7135. ret = get_errno(getresuid(&ruid, &euid, &suid));
  7136. if (!is_error(ret)) {
  7137. if (put_user_u16(high2lowuid(ruid), arg1)
  7138. || put_user_u16(high2lowuid(euid), arg2)
  7139. || put_user_u16(high2lowuid(suid), arg3))
  7140. goto efault;
  7141. }
  7142. }
  7143. break;
  7144. #endif
  7145. #ifdef TARGET_NR_getresgid
  7146. case TARGET_NR_setresgid:
  7147. ret = get_errno(setresgid(low2highgid(arg1),
  7148. low2highgid(arg2),
  7149. low2highgid(arg3)));
  7150. break;
  7151. #endif
  7152. #ifdef TARGET_NR_getresgid
  7153. case TARGET_NR_getresgid:
  7154. {
  7155. gid_t rgid, egid, sgid;
  7156. ret = get_errno(getresgid(&rgid, &egid, &sgid));
  7157. if (!is_error(ret)) {
  7158. if (put_user_u16(high2lowgid(rgid), arg1)
  7159. || put_user_u16(high2lowgid(egid), arg2)
  7160. || put_user_u16(high2lowgid(sgid), arg3))
  7161. goto efault;
  7162. }
  7163. }
  7164. break;
  7165. #endif
  7166. case TARGET_NR_chown:
  7167. if (!(p = lock_user_string(arg1)))
  7168. goto efault;
  7169. ret = get_errno(chown(p, low2highuid(arg2), low2highgid(arg3)));
  7170. unlock_user(p, arg1, 0);
  7171. break;
  7172. case TARGET_NR_setuid:
  7173. ret = get_errno(setuid(low2highuid(arg1)));
  7174. break;
  7175. case TARGET_NR_setgid:
  7176. ret = get_errno(setgid(low2highgid(arg1)));
  7177. break;
  7178. case TARGET_NR_setfsuid:
  7179. ret = get_errno(setfsuid(arg1));
  7180. break;
  7181. case TARGET_NR_setfsgid:
  7182. ret = get_errno(setfsgid(arg1));
  7183. break;
  7184. #ifdef TARGET_NR_lchown32
  7185. case TARGET_NR_lchown32:
  7186. if (!(p = lock_user_string(arg1)))
  7187. goto efault;
  7188. ret = get_errno(lchown(p, arg2, arg3));
  7189. unlock_user(p, arg1, 0);
  7190. break;
  7191. #endif
  7192. #ifdef TARGET_NR_getuid32
  7193. case TARGET_NR_getuid32:
  7194. ret = get_errno(getuid());
  7195. break;
  7196. #endif
  7197. #if defined(TARGET_NR_getxuid) && defined(TARGET_ALPHA)
  7198. /* Alpha specific */
  7199. case TARGET_NR_getxuid:
  7200. {
  7201. uid_t euid;
  7202. euid=geteuid();
  7203. ((CPUAlphaState *)cpu_env)->ir[IR_A4]=euid;
  7204. }
  7205. ret = get_errno(getuid());
  7206. break;
  7207. #endif
  7208. #if defined(TARGET_NR_getxgid) && defined(TARGET_ALPHA)
  7209. /* Alpha specific */
  7210. case TARGET_NR_getxgid:
  7211. {
  7212. uid_t egid;
  7213. egid=getegid();
  7214. ((CPUAlphaState *)cpu_env)->ir[IR_A4]=egid;
  7215. }
  7216. ret = get_errno(getgid());
  7217. break;
  7218. #endif
  7219. #if defined(TARGET_NR_osf_getsysinfo) && defined(TARGET_ALPHA)
  7220. /* Alpha specific */
  7221. case TARGET_NR_osf_getsysinfo:
  7222. ret = -TARGET_EOPNOTSUPP;
  7223. switch (arg1) {
  7224. case TARGET_GSI_IEEE_FP_CONTROL:
  7225. {
  7226. uint64_t swcr, fpcr = cpu_alpha_load_fpcr (cpu_env);
  7227. /* Copied from linux ieee_fpcr_to_swcr. */
  7228. swcr = (fpcr >> 35) & SWCR_STATUS_MASK;
  7229. swcr |= (fpcr >> 36) & SWCR_MAP_DMZ;
  7230. swcr |= (~fpcr >> 48) & (SWCR_TRAP_ENABLE_INV
  7231. | SWCR_TRAP_ENABLE_DZE
  7232. | SWCR_TRAP_ENABLE_OVF);
  7233. swcr |= (~fpcr >> 57) & (SWCR_TRAP_ENABLE_UNF
  7234. | SWCR_TRAP_ENABLE_INE);
  7235. swcr |= (fpcr >> 47) & SWCR_MAP_UMZ;
  7236. swcr |= (~fpcr >> 41) & SWCR_TRAP_ENABLE_DNO;
  7237. if (put_user_u64 (swcr, arg2))
  7238. goto efault;
  7239. ret = 0;
  7240. }
  7241. break;
  7242. /* case GSI_IEEE_STATE_AT_SIGNAL:
  7243. -- Not implemented in linux kernel.
  7244. case GSI_UACPROC:
  7245. -- Retrieves current unaligned access state; not much used.
  7246. case GSI_PROC_TYPE:
  7247. -- Retrieves implver information; surely not used.
  7248. case GSI_GET_HWRPB:
  7249. -- Grabs a copy of the HWRPB; surely not used.
  7250. */
  7251. }
  7252. break;
  7253. #endif
  7254. #if defined(TARGET_NR_osf_setsysinfo) && defined(TARGET_ALPHA)
  7255. /* Alpha specific */
  7256. case TARGET_NR_osf_setsysinfo:
  7257. ret = -TARGET_EOPNOTSUPP;
  7258. switch (arg1) {
  7259. case TARGET_SSI_IEEE_FP_CONTROL:
  7260. {
  7261. uint64_t swcr, fpcr, orig_fpcr;
  7262. if (get_user_u64 (swcr, arg2)) {
  7263. goto efault;
  7264. }
  7265. orig_fpcr = cpu_alpha_load_fpcr(cpu_env);
  7266. fpcr = orig_fpcr & FPCR_DYN_MASK;
  7267. /* Copied from linux ieee_swcr_to_fpcr. */
  7268. fpcr |= (swcr & SWCR_STATUS_MASK) << 35;
  7269. fpcr |= (swcr & SWCR_MAP_DMZ) << 36;
  7270. fpcr |= (~swcr & (SWCR_TRAP_ENABLE_INV
  7271. | SWCR_TRAP_ENABLE_DZE
  7272. | SWCR_TRAP_ENABLE_OVF)) << 48;
  7273. fpcr |= (~swcr & (SWCR_TRAP_ENABLE_UNF
  7274. | SWCR_TRAP_ENABLE_INE)) << 57;
  7275. fpcr |= (swcr & SWCR_MAP_UMZ ? FPCR_UNDZ | FPCR_UNFD : 0);
  7276. fpcr |= (~swcr & SWCR_TRAP_ENABLE_DNO) << 41;
  7277. cpu_alpha_store_fpcr(cpu_env, fpcr);
  7278. ret = 0;
  7279. }
  7280. break;
  7281. case TARGET_SSI_IEEE_RAISE_EXCEPTION:
  7282. {
  7283. uint64_t exc, fpcr, orig_fpcr;
  7284. int si_code;
  7285. if (get_user_u64(exc, arg2)) {
  7286. goto efault;
  7287. }
  7288. orig_fpcr = cpu_alpha_load_fpcr(cpu_env);
  7289. /* We only add to the exception status here. */
  7290. fpcr = orig_fpcr | ((exc & SWCR_STATUS_MASK) << 35);
  7291. cpu_alpha_store_fpcr(cpu_env, fpcr);
  7292. ret = 0;
  7293. /* Old exceptions are not signaled. */
  7294. fpcr &= ~(orig_fpcr & FPCR_STATUS_MASK);
  7295. /* If any exceptions set by this call,
  7296. and are unmasked, send a signal. */
  7297. si_code = 0;
  7298. if ((fpcr & (FPCR_INE | FPCR_INED)) == FPCR_INE) {
  7299. si_code = TARGET_FPE_FLTRES;
  7300. }
  7301. if ((fpcr & (FPCR_UNF | FPCR_UNFD)) == FPCR_UNF) {
  7302. si_code = TARGET_FPE_FLTUND;
  7303. }
  7304. if ((fpcr & (FPCR_OVF | FPCR_OVFD)) == FPCR_OVF) {
  7305. si_code = TARGET_FPE_FLTOVF;
  7306. }
  7307. if ((fpcr & (FPCR_DZE | FPCR_DZED)) == FPCR_DZE) {
  7308. si_code = TARGET_FPE_FLTDIV;
  7309. }
  7310. if ((fpcr & (FPCR_INV | FPCR_INVD)) == FPCR_INV) {
  7311. si_code = TARGET_FPE_FLTINV;
  7312. }
  7313. if (si_code != 0) {
  7314. target_siginfo_t info;
  7315. info.si_signo = SIGFPE;
  7316. info.si_errno = 0;
  7317. info.si_code = si_code;
  7318. info._sifields._sigfault._addr
  7319. = ((CPUArchState *)cpu_env)->pc;
  7320. queue_signal((CPUArchState *)cpu_env, info.si_signo, &info);
  7321. }
  7322. }
  7323. break;
  7324. /* case SSI_NVPAIRS:
  7325. -- Used with SSIN_UACPROC to enable unaligned accesses.
  7326. case SSI_IEEE_STATE_AT_SIGNAL:
  7327. case SSI_IEEE_IGNORE_STATE_AT_SIGNAL:
  7328. -- Not implemented in linux kernel
  7329. */
  7330. }
  7331. break;
  7332. #endif
  7333. #ifdef TARGET_NR_osf_sigprocmask
  7334. /* Alpha specific. */
  7335. case TARGET_NR_osf_sigprocmask:
  7336. {
  7337. abi_ulong mask;
  7338. int how;
  7339. sigset_t set, oldset;
  7340. switch(arg1) {
  7341. case TARGET_SIG_BLOCK:
  7342. how = SIG_BLOCK;
  7343. break;
  7344. case TARGET_SIG_UNBLOCK:
  7345. how = SIG_UNBLOCK;
  7346. break;
  7347. case TARGET_SIG_SETMASK:
  7348. how = SIG_SETMASK;
  7349. break;
  7350. default:
  7351. ret = -TARGET_EINVAL;
  7352. goto fail;
  7353. }
  7354. mask = arg2;
  7355. target_to_host_old_sigset(&set, &mask);
  7356. sigprocmask(how, &set, &oldset);
  7357. host_to_target_old_sigset(&mask, &oldset);
  7358. ret = mask;
  7359. }
  7360. break;
  7361. #endif
  7362. #ifdef TARGET_NR_getgid32
  7363. case TARGET_NR_getgid32:
  7364. ret = get_errno(getgid());
  7365. break;
  7366. #endif
  7367. #ifdef TARGET_NR_geteuid32
  7368. case TARGET_NR_geteuid32:
  7369. ret = get_errno(geteuid());
  7370. break;
  7371. #endif
  7372. #ifdef TARGET_NR_getegid32
  7373. case TARGET_NR_getegid32:
  7374. ret = get_errno(getegid());
  7375. break;
  7376. #endif
  7377. #ifdef TARGET_NR_setreuid32
  7378. case TARGET_NR_setreuid32:
  7379. ret = get_errno(setreuid(arg1, arg2));
  7380. break;
  7381. #endif
  7382. #ifdef TARGET_NR_setregid32
  7383. case TARGET_NR_setregid32:
  7384. ret = get_errno(setregid(arg1, arg2));
  7385. break;
  7386. #endif
  7387. #ifdef TARGET_NR_getgroups32
  7388. case TARGET_NR_getgroups32:
  7389. {
  7390. int gidsetsize = arg1;
  7391. uint32_t *target_grouplist;
  7392. gid_t *grouplist;
  7393. int i;
  7394. grouplist = alloca(gidsetsize * sizeof(gid_t));
  7395. ret = get_errno(getgroups(gidsetsize, grouplist));
  7396. if (gidsetsize == 0)
  7397. break;
  7398. if (!is_error(ret)) {
  7399. target_grouplist = lock_user(VERIFY_WRITE, arg2, gidsetsize * 4, 0);
  7400. if (!target_grouplist) {
  7401. ret = -TARGET_EFAULT;
  7402. goto fail;
  7403. }
  7404. for(i = 0;i < ret; i++)
  7405. target_grouplist[i] = tswap32(grouplist[i]);
  7406. unlock_user(target_grouplist, arg2, gidsetsize * 4);
  7407. }
  7408. }
  7409. break;
  7410. #endif
  7411. #ifdef TARGET_NR_setgroups32
  7412. case TARGET_NR_setgroups32:
  7413. {
  7414. int gidsetsize = arg1;
  7415. uint32_t *target_grouplist;
  7416. gid_t *grouplist;
  7417. int i;
  7418. grouplist = alloca(gidsetsize * sizeof(gid_t));
  7419. target_grouplist = lock_user(VERIFY_READ, arg2, gidsetsize * 4, 1);
  7420. if (!target_grouplist) {
  7421. ret = -TARGET_EFAULT;
  7422. goto fail;
  7423. }
  7424. for(i = 0;i < gidsetsize; i++)
  7425. grouplist[i] = tswap32(target_grouplist[i]);
  7426. unlock_user(target_grouplist, arg2, 0);
  7427. ret = get_errno(setgroups(gidsetsize, grouplist));
  7428. }
  7429. break;
  7430. #endif
  7431. #ifdef TARGET_NR_fchown32
  7432. case TARGET_NR_fchown32:
  7433. ret = get_errno(fchown(arg1, arg2, arg3));
  7434. break;
  7435. #endif
  7436. #ifdef TARGET_NR_setresuid32
  7437. case TARGET_NR_setresuid32:
  7438. ret = get_errno(setresuid(arg1, arg2, arg3));
  7439. break;
  7440. #endif
  7441. #ifdef TARGET_NR_getresuid32
  7442. case TARGET_NR_getresuid32:
  7443. {
  7444. uid_t ruid, euid, suid;
  7445. ret = get_errno(getresuid(&ruid, &euid, &suid));
  7446. if (!is_error(ret)) {
  7447. if (put_user_u32(ruid, arg1)
  7448. || put_user_u32(euid, arg2)
  7449. || put_user_u32(suid, arg3))
  7450. goto efault;
  7451. }
  7452. }
  7453. break;
  7454. #endif
  7455. #ifdef TARGET_NR_setresgid32
  7456. case TARGET_NR_setresgid32:
  7457. ret = get_errno(setresgid(arg1, arg2, arg3));
  7458. break;
  7459. #endif
  7460. #ifdef TARGET_NR_getresgid32
  7461. case TARGET_NR_getresgid32:
  7462. {
  7463. gid_t rgid, egid, sgid;
  7464. ret = get_errno(getresgid(&rgid, &egid, &sgid));
  7465. if (!is_error(ret)) {
  7466. if (put_user_u32(rgid, arg1)
  7467. || put_user_u32(egid, arg2)
  7468. || put_user_u32(sgid, arg3))
  7469. goto efault;
  7470. }
  7471. }
  7472. break;
  7473. #endif
  7474. #ifdef TARGET_NR_chown32
  7475. case TARGET_NR_chown32:
  7476. if (!(p = lock_user_string(arg1)))
  7477. goto efault;
  7478. ret = get_errno(chown(p, arg2, arg3));
  7479. unlock_user(p, arg1, 0);
  7480. break;
  7481. #endif
  7482. #ifdef TARGET_NR_setuid32
  7483. case TARGET_NR_setuid32:
  7484. ret = get_errno(setuid(arg1));
  7485. break;
  7486. #endif
  7487. #ifdef TARGET_NR_setgid32
  7488. case TARGET_NR_setgid32:
  7489. ret = get_errno(setgid(arg1));
  7490. break;
  7491. #endif
  7492. #ifdef TARGET_NR_setfsuid32
  7493. case TARGET_NR_setfsuid32:
  7494. ret = get_errno(setfsuid(arg1));
  7495. break;
  7496. #endif
  7497. #ifdef TARGET_NR_setfsgid32
  7498. case TARGET_NR_setfsgid32:
  7499. ret = get_errno(setfsgid(arg1));
  7500. break;
  7501. #endif
  7502. case TARGET_NR_pivot_root:
  7503. goto unimplemented;
  7504. #ifdef TARGET_NR_mincore
  7505. case TARGET_NR_mincore:
  7506. {
  7507. void *a;
  7508. ret = -TARGET_EFAULT;
  7509. if (!(a = lock_user(VERIFY_READ, arg1,arg2, 0)))
  7510. goto efault;
  7511. if (!(p = lock_user_string(arg3)))
  7512. goto mincore_fail;
  7513. ret = get_errno(mincore(a, arg2, p));
  7514. unlock_user(p, arg3, ret);
  7515. mincore_fail:
  7516. unlock_user(a, arg1, 0);
  7517. }
  7518. break;
  7519. #endif
  7520. #ifdef TARGET_NR_arm_fadvise64_64
  7521. case TARGET_NR_arm_fadvise64_64:
  7522. {
  7523. /*
  7524. * arm_fadvise64_64 looks like fadvise64_64 but
  7525. * with different argument order
  7526. */
  7527. abi_long temp;
  7528. temp = arg3;
  7529. arg3 = arg4;
  7530. arg4 = temp;
  7531. }
  7532. #endif
  7533. #if defined(TARGET_NR_fadvise64_64) || defined(TARGET_NR_arm_fadvise64_64) || defined(TARGET_NR_fadvise64)
  7534. #ifdef TARGET_NR_fadvise64_64
  7535. case TARGET_NR_fadvise64_64:
  7536. #endif
  7537. #ifdef TARGET_NR_fadvise64
  7538. case TARGET_NR_fadvise64:
  7539. #endif
  7540. #ifdef TARGET_S390X
  7541. switch (arg4) {
  7542. case 4: arg4 = POSIX_FADV_NOREUSE + 1; break; /* make sure it's an invalid value */
  7543. case 5: arg4 = POSIX_FADV_NOREUSE + 2; break; /* ditto */
  7544. case 6: arg4 = POSIX_FADV_DONTNEED; break;
  7545. case 7: arg4 = POSIX_FADV_NOREUSE; break;
  7546. default: break;
  7547. }
  7548. #endif
  7549. ret = -posix_fadvise(arg1, arg2, arg3, arg4);
  7550. break;
  7551. #endif
  7552. #ifdef TARGET_NR_madvise
  7553. case TARGET_NR_madvise:
  7554. /* A straight passthrough may not be safe because qemu sometimes
  7555. turns private flie-backed mappings into anonymous mappings.
  7556. This will break MADV_DONTNEED.
  7557. This is a hint, so ignoring and returning success is ok. */
  7558. ret = get_errno(0);
  7559. break;
  7560. #endif
  7561. #if TARGET_ABI_BITS == 32
  7562. case TARGET_NR_fcntl64:
  7563. {
  7564. int cmd;
  7565. struct flock64 fl;
  7566. struct target_flock64 *target_fl;
  7567. #ifdef TARGET_ARM
  7568. struct target_eabi_flock64 *target_efl;
  7569. #endif
  7570. cmd = target_to_host_fcntl_cmd(arg2);
  7571. if (cmd == -TARGET_EINVAL) {
  7572. ret = cmd;
  7573. break;
  7574. }
  7575. switch(arg2) {
  7576. case TARGET_F_GETLK64:
  7577. #ifdef TARGET_ARM
  7578. if (((CPUARMState *)cpu_env)->eabi) {
  7579. if (!lock_user_struct(VERIFY_READ, target_efl, arg3, 1))
  7580. goto efault;
  7581. fl.l_type = tswap16(target_efl->l_type);
  7582. fl.l_whence = tswap16(target_efl->l_whence);
  7583. fl.l_start = tswap64(target_efl->l_start);
  7584. fl.l_len = tswap64(target_efl->l_len);
  7585. fl.l_pid = tswap32(target_efl->l_pid);
  7586. unlock_user_struct(target_efl, arg3, 0);
  7587. } else
  7588. #endif
  7589. {
  7590. if (!lock_user_struct(VERIFY_READ, target_fl, arg3, 1))
  7591. goto efault;
  7592. fl.l_type = tswap16(target_fl->l_type);
  7593. fl.l_whence = tswap16(target_fl->l_whence);
  7594. fl.l_start = tswap64(target_fl->l_start);
  7595. fl.l_len = tswap64(target_fl->l_len);
  7596. fl.l_pid = tswap32(target_fl->l_pid);
  7597. unlock_user_struct(target_fl, arg3, 0);
  7598. }
  7599. ret = get_errno(fcntl(arg1, cmd, &fl));
  7600. if (ret == 0) {
  7601. #ifdef TARGET_ARM
  7602. if (((CPUARMState *)cpu_env)->eabi) {
  7603. if (!lock_user_struct(VERIFY_WRITE, target_efl, arg3, 0))
  7604. goto efault;
  7605. target_efl->l_type = tswap16(fl.l_type);
  7606. target_efl->l_whence = tswap16(fl.l_whence);
  7607. target_efl->l_start = tswap64(fl.l_start);
  7608. target_efl->l_len = tswap64(fl.l_len);
  7609. target_efl->l_pid = tswap32(fl.l_pid);
  7610. unlock_user_struct(target_efl, arg3, 1);
  7611. } else
  7612. #endif
  7613. {
  7614. if (!lock_user_struct(VERIFY_WRITE, target_fl, arg3, 0))
  7615. goto efault;
  7616. target_fl->l_type = tswap16(fl.l_type);
  7617. target_fl->l_whence = tswap16(fl.l_whence);
  7618. target_fl->l_start = tswap64(fl.l_start);
  7619. target_fl->l_len = tswap64(fl.l_len);
  7620. target_fl->l_pid = tswap32(fl.l_pid);
  7621. unlock_user_struct(target_fl, arg3, 1);
  7622. }
  7623. }
  7624. break;
  7625. case TARGET_F_SETLK64:
  7626. case TARGET_F_SETLKW64:
  7627. #ifdef TARGET_ARM
  7628. if (((CPUARMState *)cpu_env)->eabi) {
  7629. if (!lock_user_struct(VERIFY_READ, target_efl, arg3, 1))
  7630. goto efault;
  7631. fl.l_type = tswap16(target_efl->l_type);
  7632. fl.l_whence = tswap16(target_efl->l_whence);
  7633. fl.l_start = tswap64(target_efl->l_start);
  7634. fl.l_len = tswap64(target_efl->l_len);
  7635. fl.l_pid = tswap32(target_efl->l_pid);
  7636. unlock_user_struct(target_efl, arg3, 0);
  7637. } else
  7638. #endif
  7639. {
  7640. if (!lock_user_struct(VERIFY_READ, target_fl, arg3, 1))
  7641. goto efault;
  7642. fl.l_type = tswap16(target_fl->l_type);
  7643. fl.l_whence = tswap16(target_fl->l_whence);
  7644. fl.l_start = tswap64(target_fl->l_start);
  7645. fl.l_len = tswap64(target_fl->l_len);
  7646. fl.l_pid = tswap32(target_fl->l_pid);
  7647. unlock_user_struct(target_fl, arg3, 0);
  7648. }
  7649. ret = get_errno(fcntl(arg1, cmd, &fl));
  7650. break;
  7651. default:
  7652. ret = do_fcntl(arg1, arg2, arg3);
  7653. break;
  7654. }
  7655. break;
  7656. }
  7657. #endif
  7658. #ifdef TARGET_NR_cacheflush
  7659. case TARGET_NR_cacheflush:
  7660. /* self-modifying code is handled automatically, so nothing needed */
  7661. ret = 0;
  7662. break;
  7663. #endif
  7664. #ifdef TARGET_NR_security
  7665. case TARGET_NR_security:
  7666. goto unimplemented;
  7667. #endif
  7668. #ifdef TARGET_NR_getpagesize
  7669. case TARGET_NR_getpagesize:
  7670. ret = TARGET_PAGE_SIZE;
  7671. break;
  7672. #endif
  7673. case TARGET_NR_gettid:
  7674. ret = get_errno(gettid());
  7675. break;
  7676. #ifdef TARGET_NR_readahead
  7677. case TARGET_NR_readahead:
  7678. #if TARGET_ABI_BITS == 32
  7679. if (regpairs_aligned(cpu_env)) {
  7680. arg2 = arg3;
  7681. arg3 = arg4;
  7682. arg4 = arg5;
  7683. }
  7684. ret = get_errno(readahead(arg1, ((off64_t)arg3 << 32) | arg2, arg4));
  7685. #else
  7686. ret = get_errno(readahead(arg1, arg2, arg3));
  7687. #endif
  7688. break;
  7689. #endif
  7690. #ifdef CONFIG_ATTR
  7691. #ifdef TARGET_NR_setxattr
  7692. case TARGET_NR_listxattr:
  7693. case TARGET_NR_llistxattr:
  7694. {
  7695. void *p, *b = 0;
  7696. if (arg2) {
  7697. b = lock_user(VERIFY_WRITE, arg2, arg3, 0);
  7698. if (!b) {
  7699. ret = -TARGET_EFAULT;
  7700. break;
  7701. }
  7702. }
  7703. p = lock_user_string(arg1);
  7704. if (p) {
  7705. if (num == TARGET_NR_listxattr) {
  7706. ret = get_errno(listxattr(p, b, arg3));
  7707. } else {
  7708. ret = get_errno(llistxattr(p, b, arg3));
  7709. }
  7710. } else {
  7711. ret = -TARGET_EFAULT;
  7712. }
  7713. unlock_user(p, arg1, 0);
  7714. unlock_user(b, arg2, arg3);
  7715. break;
  7716. }
  7717. case TARGET_NR_flistxattr:
  7718. {
  7719. void *b = 0;
  7720. if (arg2) {
  7721. b = lock_user(VERIFY_WRITE, arg2, arg3, 0);
  7722. if (!b) {
  7723. ret = -TARGET_EFAULT;
  7724. break;
  7725. }
  7726. }
  7727. ret = get_errno(flistxattr(arg1, b, arg3));
  7728. unlock_user(b, arg2, arg3);
  7729. break;
  7730. }
  7731. case TARGET_NR_setxattr:
  7732. case TARGET_NR_lsetxattr:
  7733. {
  7734. void *p, *n, *v = 0;
  7735. if (arg3) {
  7736. v = lock_user(VERIFY_READ, arg3, arg4, 1);
  7737. if (!v) {
  7738. ret = -TARGET_EFAULT;
  7739. break;
  7740. }
  7741. }
  7742. p = lock_user_string(arg1);
  7743. n = lock_user_string(arg2);
  7744. if (p && n) {
  7745. if (num == TARGET_NR_setxattr) {
  7746. ret = get_errno(setxattr(p, n, v, arg4, arg5));
  7747. } else {
  7748. ret = get_errno(lsetxattr(p, n, v, arg4, arg5));
  7749. }
  7750. } else {
  7751. ret = -TARGET_EFAULT;
  7752. }
  7753. unlock_user(p, arg1, 0);
  7754. unlock_user(n, arg2, 0);
  7755. unlock_user(v, arg3, 0);
  7756. }
  7757. break;
  7758. case TARGET_NR_fsetxattr:
  7759. {
  7760. void *n, *v = 0;
  7761. if (arg3) {
  7762. v = lock_user(VERIFY_READ, arg3, arg4, 1);
  7763. if (!v) {
  7764. ret = -TARGET_EFAULT;
  7765. break;
  7766. }
  7767. }
  7768. n = lock_user_string(arg2);
  7769. if (n) {
  7770. ret = get_errno(fsetxattr(arg1, n, v, arg4, arg5));
  7771. } else {
  7772. ret = -TARGET_EFAULT;
  7773. }
  7774. unlock_user(n, arg2, 0);
  7775. unlock_user(v, arg3, 0);
  7776. }
  7777. break;
  7778. case TARGET_NR_getxattr:
  7779. case TARGET_NR_lgetxattr:
  7780. {
  7781. void *p, *n, *v = 0;
  7782. if (arg3) {
  7783. v = lock_user(VERIFY_WRITE, arg3, arg4, 0);
  7784. if (!v) {
  7785. ret = -TARGET_EFAULT;
  7786. break;
  7787. }
  7788. }
  7789. p = lock_user_string(arg1);
  7790. n = lock_user_string(arg2);
  7791. if (p && n) {
  7792. if (num == TARGET_NR_getxattr) {
  7793. ret = get_errno(getxattr(p, n, v, arg4));
  7794. } else {
  7795. ret = get_errno(lgetxattr(p, n, v, arg4));
  7796. }
  7797. } else {
  7798. ret = -TARGET_EFAULT;
  7799. }
  7800. unlock_user(p, arg1, 0);
  7801. unlock_user(n, arg2, 0);
  7802. unlock_user(v, arg3, arg4);
  7803. }
  7804. break;
  7805. case TARGET_NR_fgetxattr:
  7806. {
  7807. void *n, *v = 0;
  7808. if (arg3) {
  7809. v = lock_user(VERIFY_WRITE, arg3, arg4, 0);
  7810. if (!v) {
  7811. ret = -TARGET_EFAULT;
  7812. break;
  7813. }
  7814. }
  7815. n = lock_user_string(arg2);
  7816. if (n) {
  7817. ret = get_errno(fgetxattr(arg1, n, v, arg4));
  7818. } else {
  7819. ret = -TARGET_EFAULT;
  7820. }
  7821. unlock_user(n, arg2, 0);
  7822. unlock_user(v, arg3, arg4);
  7823. }
  7824. break;
  7825. case TARGET_NR_removexattr:
  7826. case TARGET_NR_lremovexattr:
  7827. {
  7828. void *p, *n;
  7829. p = lock_user_string(arg1);
  7830. n = lock_user_string(arg2);
  7831. if (p && n) {
  7832. if (num == TARGET_NR_removexattr) {
  7833. ret = get_errno(removexattr(p, n));
  7834. } else {
  7835. ret = get_errno(lremovexattr(p, n));
  7836. }
  7837. } else {
  7838. ret = -TARGET_EFAULT;
  7839. }
  7840. unlock_user(p, arg1, 0);
  7841. unlock_user(n, arg2, 0);
  7842. }
  7843. break;
  7844. case TARGET_NR_fremovexattr:
  7845. {
  7846. void *n;
  7847. n = lock_user_string(arg2);
  7848. if (n) {
  7849. ret = get_errno(fremovexattr(arg1, n));
  7850. } else {
  7851. ret = -TARGET_EFAULT;
  7852. }
  7853. unlock_user(n, arg2, 0);
  7854. }
  7855. break;
  7856. #endif
  7857. #endif /* CONFIG_ATTR */
  7858. #ifdef TARGET_NR_set_thread_area
  7859. case TARGET_NR_set_thread_area:
  7860. #if defined(TARGET_MIPS)
  7861. ((CPUMIPSState *) cpu_env)->tls_value = arg1;
  7862. ret = 0;
  7863. break;
  7864. #elif defined(TARGET_CRIS)
  7865. if (arg1 & 0xff)
  7866. ret = -TARGET_EINVAL;
  7867. else {
  7868. ((CPUCRISState *) cpu_env)->pregs[PR_PID] = arg1;
  7869. ret = 0;
  7870. }
  7871. break;
  7872. #elif defined(TARGET_I386) && defined(TARGET_ABI32)
  7873. ret = do_set_thread_area(cpu_env, arg1);
  7874. break;
  7875. #else
  7876. goto unimplemented_nowarn;
  7877. #endif
  7878. #endif
  7879. #ifdef TARGET_NR_get_thread_area
  7880. case TARGET_NR_get_thread_area:
  7881. #if defined(TARGET_I386) && defined(TARGET_ABI32)
  7882. ret = do_get_thread_area(cpu_env, arg1);
  7883. #else
  7884. goto unimplemented_nowarn;
  7885. #endif
  7886. #endif
  7887. #ifdef TARGET_NR_getdomainname
  7888. case TARGET_NR_getdomainname:
  7889. goto unimplemented_nowarn;
  7890. #endif
  7891. #ifdef TARGET_NR_clock_gettime
  7892. case TARGET_NR_clock_gettime:
  7893. {
  7894. struct timespec ts;
  7895. ret = get_errno(clock_gettime(arg1, &ts));
  7896. if (!is_error(ret)) {
  7897. host_to_target_timespec(arg2, &ts);
  7898. }
  7899. break;
  7900. }
  7901. #endif
  7902. #ifdef TARGET_NR_clock_getres
  7903. case TARGET_NR_clock_getres:
  7904. {
  7905. struct timespec ts;
  7906. ret = get_errno(clock_getres(arg1, &ts));
  7907. if (!is_error(ret)) {
  7908. host_to_target_timespec(arg2, &ts);
  7909. }
  7910. break;
  7911. }
  7912. #endif
  7913. #ifdef TARGET_NR_clock_nanosleep
  7914. case TARGET_NR_clock_nanosleep:
  7915. {
  7916. struct timespec ts;
  7917. target_to_host_timespec(&ts, arg3);
  7918. ret = get_errno(clock_nanosleep(arg1, arg2, &ts, arg4 ? &ts : NULL));
  7919. if (arg4)
  7920. host_to_target_timespec(arg4, &ts);
  7921. break;
  7922. }
  7923. #endif
  7924. #if defined(TARGET_NR_set_tid_address) && defined(__NR_set_tid_address)
  7925. case TARGET_NR_set_tid_address:
  7926. ret = get_errno(set_tid_address((int *)g2h(arg1)));
  7927. break;
  7928. #endif
  7929. #if defined(TARGET_NR_tkill) && defined(__NR_tkill)
  7930. case TARGET_NR_tkill:
  7931. ret = get_errno(sys_tkill((int)arg1, target_to_host_signal(arg2)));
  7932. break;
  7933. #endif
  7934. #if defined(TARGET_NR_tgkill) && defined(__NR_tgkill)
  7935. case TARGET_NR_tgkill:
  7936. ret = get_errno(sys_tgkill((int)arg1, (int)arg2,
  7937. target_to_host_signal(arg3)));
  7938. break;
  7939. #endif
  7940. #ifdef TARGET_NR_set_robust_list
  7941. case TARGET_NR_set_robust_list:
  7942. case TARGET_NR_get_robust_list:
  7943. /* The ABI for supporting robust futexes has userspace pass
  7944. * the kernel a pointer to a linked list which is updated by
  7945. * userspace after the syscall; the list is walked by the kernel
  7946. * when the thread exits. Since the linked list in QEMU guest
  7947. * memory isn't a valid linked list for the host and we have
  7948. * no way to reliably intercept the thread-death event, we can't
  7949. * support these. Silently return ENOSYS so that guest userspace
  7950. * falls back to a non-robust futex implementation (which should
  7951. * be OK except in the corner case of the guest crashing while
  7952. * holding a mutex that is shared with another process via
  7953. * shared memory).
  7954. */
  7955. goto unimplemented_nowarn;
  7956. #endif
  7957. #if defined(TARGET_NR_utimensat) && defined(__NR_utimensat)
  7958. case TARGET_NR_utimensat:
  7959. {
  7960. struct timespec *tsp, ts[2];
  7961. if (!arg3) {
  7962. tsp = NULL;
  7963. } else {
  7964. target_to_host_timespec(ts, arg3);
  7965. target_to_host_timespec(ts+1, arg3+sizeof(struct target_timespec));
  7966. tsp = ts;
  7967. }
  7968. if (!arg2)
  7969. ret = get_errno(sys_utimensat(arg1, NULL, tsp, arg4));
  7970. else {
  7971. if (!(p = lock_user_string(arg2))) {
  7972. ret = -TARGET_EFAULT;
  7973. goto fail;
  7974. }
  7975. ret = get_errno(sys_utimensat(arg1, path(p), tsp, arg4));
  7976. unlock_user(p, arg2, 0);
  7977. }
  7978. }
  7979. break;
  7980. #endif
  7981. #if defined(CONFIG_USE_NPTL)
  7982. case TARGET_NR_futex:
  7983. ret = do_futex(arg1, arg2, arg3, arg4, arg5, arg6);
  7984. break;
  7985. #endif
  7986. #if defined(TARGET_NR_inotify_init) && defined(__NR_inotify_init)
  7987. case TARGET_NR_inotify_init:
  7988. ret = get_errno(sys_inotify_init());
  7989. break;
  7990. #endif
  7991. #ifdef CONFIG_INOTIFY1
  7992. #if defined(TARGET_NR_inotify_init1) && defined(__NR_inotify_init1)
  7993. case TARGET_NR_inotify_init1:
  7994. ret = get_errno(sys_inotify_init1(arg1));
  7995. break;
  7996. #endif
  7997. #endif
  7998. #if defined(TARGET_NR_inotify_add_watch) && defined(__NR_inotify_add_watch)
  7999. case TARGET_NR_inotify_add_watch:
  8000. p = lock_user_string(arg2);
  8001. ret = get_errno(sys_inotify_add_watch(arg1, path(p), arg3));
  8002. unlock_user(p, arg2, 0);
  8003. break;
  8004. #endif
  8005. #if defined(TARGET_NR_inotify_rm_watch) && defined(__NR_inotify_rm_watch)
  8006. case TARGET_NR_inotify_rm_watch:
  8007. ret = get_errno(sys_inotify_rm_watch(arg1, arg2));
  8008. break;
  8009. #endif
  8010. #if defined(TARGET_NR_mq_open) && defined(__NR_mq_open)
  8011. case TARGET_NR_mq_open:
  8012. {
  8013. struct mq_attr posix_mq_attr;
  8014. p = lock_user_string(arg1 - 1);
  8015. if (arg4 != 0)
  8016. copy_from_user_mq_attr (&posix_mq_attr, arg4);
  8017. ret = get_errno(mq_open(p, arg2, arg3, &posix_mq_attr));
  8018. unlock_user (p, arg1, 0);
  8019. }
  8020. break;
  8021. case TARGET_NR_mq_unlink:
  8022. p = lock_user_string(arg1 - 1);
  8023. ret = get_errno(mq_unlink(p));
  8024. unlock_user (p, arg1, 0);
  8025. break;
  8026. case TARGET_NR_mq_timedsend:
  8027. {
  8028. struct timespec ts;
  8029. p = lock_user (VERIFY_READ, arg2, arg3, 1);
  8030. if (arg5 != 0) {
  8031. target_to_host_timespec(&ts, arg5);
  8032. ret = get_errno(mq_timedsend(arg1, p, arg3, arg4, &ts));
  8033. host_to_target_timespec(arg5, &ts);
  8034. }
  8035. else
  8036. ret = get_errno(mq_send(arg1, p, arg3, arg4));
  8037. unlock_user (p, arg2, arg3);
  8038. }
  8039. break;
  8040. case TARGET_NR_mq_timedreceive:
  8041. {
  8042. struct timespec ts;
  8043. unsigned int prio;
  8044. p = lock_user (VERIFY_READ, arg2, arg3, 1);
  8045. if (arg5 != 0) {
  8046. target_to_host_timespec(&ts, arg5);
  8047. ret = get_errno(mq_timedreceive(arg1, p, arg3, &prio, &ts));
  8048. host_to_target_timespec(arg5, &ts);
  8049. }
  8050. else
  8051. ret = get_errno(mq_receive(arg1, p, arg3, &prio));
  8052. unlock_user (p, arg2, arg3);
  8053. if (arg4 != 0)
  8054. put_user_u32(prio, arg4);
  8055. }
  8056. break;
  8057. /* Not implemented for now... */
  8058. /* case TARGET_NR_mq_notify: */
  8059. /* break; */
  8060. case TARGET_NR_mq_getsetattr:
  8061. {
  8062. struct mq_attr posix_mq_attr_in, posix_mq_attr_out;
  8063. ret = 0;
  8064. if (arg3 != 0) {
  8065. ret = mq_getattr(arg1, &posix_mq_attr_out);
  8066. copy_to_user_mq_attr(arg3, &posix_mq_attr_out);
  8067. }
  8068. if (arg2 != 0) {
  8069. copy_from_user_mq_attr(&posix_mq_attr_in, arg2);
  8070. ret |= mq_setattr(arg1, &posix_mq_attr_in, &posix_mq_attr_out);
  8071. }
  8072. }
  8073. break;
  8074. #endif
  8075. #ifdef CONFIG_SPLICE
  8076. #ifdef TARGET_NR_tee
  8077. case TARGET_NR_tee:
  8078. {
  8079. ret = get_errno(tee(arg1,arg2,arg3,arg4));
  8080. }
  8081. break;
  8082. #endif
  8083. #ifdef TARGET_NR_splice
  8084. case TARGET_NR_splice:
  8085. {
  8086. loff_t loff_in, loff_out;
  8087. loff_t *ploff_in = NULL, *ploff_out = NULL;
  8088. if(arg2) {
  8089. get_user_u64(loff_in, arg2);
  8090. ploff_in = &loff_in;
  8091. }
  8092. if(arg4) {
  8093. get_user_u64(loff_out, arg2);
  8094. ploff_out = &loff_out;
  8095. }
  8096. ret = get_errno(splice(arg1, ploff_in, arg3, ploff_out, arg5, arg6));
  8097. }
  8098. break;
  8099. #endif
  8100. #ifdef TARGET_NR_vmsplice
  8101. case TARGET_NR_vmsplice:
  8102. {
  8103. struct iovec *vec = lock_iovec(VERIFY_READ, arg2, arg3, 1);
  8104. if (vec != NULL) {
  8105. ret = get_errno(vmsplice(arg1, vec, arg3, arg4));
  8106. unlock_iovec(vec, arg2, arg3, 0);
  8107. } else {
  8108. ret = -host_to_target_errno(errno);
  8109. }
  8110. }
  8111. break;
  8112. #endif
  8113. #endif /* CONFIG_SPLICE */
  8114. #ifdef CONFIG_EVENTFD
  8115. #if defined(TARGET_NR_eventfd)
  8116. case TARGET_NR_eventfd:
  8117. ret = get_errno(eventfd(arg1, 0));
  8118. break;
  8119. #endif
  8120. #if defined(TARGET_NR_eventfd2)
  8121. case TARGET_NR_eventfd2:
  8122. ret = get_errno(eventfd(arg1, arg2));
  8123. break;
  8124. #endif
  8125. #endif /* CONFIG_EVENTFD */
  8126. #if defined(CONFIG_FALLOCATE) && defined(TARGET_NR_fallocate)
  8127. case TARGET_NR_fallocate:
  8128. #if TARGET_ABI_BITS == 32
  8129. ret = get_errno(fallocate(arg1, arg2, target_offset64(arg3, arg4),
  8130. target_offset64(arg5, arg6)));
  8131. #else
  8132. ret = get_errno(fallocate(arg1, arg2, arg3, arg4));
  8133. #endif
  8134. break;
  8135. #endif
  8136. #if defined(CONFIG_SYNC_FILE_RANGE)
  8137. #if defined(TARGET_NR_sync_file_range)
  8138. case TARGET_NR_sync_file_range:
  8139. #if TARGET_ABI_BITS == 32
  8140. #if defined(TARGET_MIPS)
  8141. ret = get_errno(sync_file_range(arg1, target_offset64(arg3, arg4),
  8142. target_offset64(arg5, arg6), arg7));
  8143. #else
  8144. ret = get_errno(sync_file_range(arg1, target_offset64(arg2, arg3),
  8145. target_offset64(arg4, arg5), arg6));
  8146. #endif /* !TARGET_MIPS */
  8147. #else
  8148. ret = get_errno(sync_file_range(arg1, arg2, arg3, arg4));
  8149. #endif
  8150. break;
  8151. #endif
  8152. #if defined(TARGET_NR_sync_file_range2)
  8153. case TARGET_NR_sync_file_range2:
  8154. /* This is like sync_file_range but the arguments are reordered */
  8155. #if TARGET_ABI_BITS == 32
  8156. ret = get_errno(sync_file_range(arg1, target_offset64(arg3, arg4),
  8157. target_offset64(arg5, arg6), arg2));
  8158. #else
  8159. ret = get_errno(sync_file_range(arg1, arg3, arg4, arg2));
  8160. #endif
  8161. break;
  8162. #endif
  8163. #endif
  8164. #if defined(CONFIG_EPOLL)
  8165. #if defined(TARGET_NR_epoll_create)
  8166. case TARGET_NR_epoll_create:
  8167. ret = get_errno(epoll_create(arg1));
  8168. break;
  8169. #endif
  8170. #if defined(TARGET_NR_epoll_create1) && defined(CONFIG_EPOLL_CREATE1)
  8171. case TARGET_NR_epoll_create1:
  8172. ret = get_errno(epoll_create1(arg1));
  8173. break;
  8174. #endif
  8175. #if defined(TARGET_NR_epoll_ctl)
  8176. case TARGET_NR_epoll_ctl:
  8177. {
  8178. struct epoll_event ep;
  8179. struct epoll_event *epp = 0;
  8180. if (arg4) {
  8181. struct target_epoll_event *target_ep;
  8182. if (!lock_user_struct(VERIFY_READ, target_ep, arg4, 1)) {
  8183. goto efault;
  8184. }
  8185. ep.events = tswap32(target_ep->events);
  8186. /* The epoll_data_t union is just opaque data to the kernel,
  8187. * so we transfer all 64 bits across and need not worry what
  8188. * actual data type it is.
  8189. */
  8190. ep.data.u64 = tswap64(target_ep->data.u64);
  8191. unlock_user_struct(target_ep, arg4, 0);
  8192. epp = &ep;
  8193. }
  8194. ret = get_errno(epoll_ctl(arg1, arg2, arg3, epp));
  8195. break;
  8196. }
  8197. #endif
  8198. #if defined(TARGET_NR_epoll_pwait) && defined(CONFIG_EPOLL_PWAIT)
  8199. #define IMPLEMENT_EPOLL_PWAIT
  8200. #endif
  8201. #if defined(TARGET_NR_epoll_wait) || defined(IMPLEMENT_EPOLL_PWAIT)
  8202. #if defined(TARGET_NR_epoll_wait)
  8203. case TARGET_NR_epoll_wait:
  8204. #endif
  8205. #if defined(IMPLEMENT_EPOLL_PWAIT)
  8206. case TARGET_NR_epoll_pwait:
  8207. #endif
  8208. {
  8209. struct target_epoll_event *target_ep;
  8210. struct epoll_event *ep;
  8211. int epfd = arg1;
  8212. int maxevents = arg3;
  8213. int timeout = arg4;
  8214. target_ep = lock_user(VERIFY_WRITE, arg2,
  8215. maxevents * sizeof(struct target_epoll_event), 1);
  8216. if (!target_ep) {
  8217. goto efault;
  8218. }
  8219. ep = alloca(maxevents * sizeof(struct epoll_event));
  8220. switch (num) {
  8221. #if defined(IMPLEMENT_EPOLL_PWAIT)
  8222. case TARGET_NR_epoll_pwait:
  8223. {
  8224. target_sigset_t *target_set;
  8225. sigset_t _set, *set = &_set;
  8226. if (arg5) {
  8227. target_set = lock_user(VERIFY_READ, arg5,
  8228. sizeof(target_sigset_t), 1);
  8229. if (!target_set) {
  8230. unlock_user(target_ep, arg2, 0);
  8231. goto efault;
  8232. }
  8233. target_to_host_sigset(set, target_set);
  8234. unlock_user(target_set, arg5, 0);
  8235. } else {
  8236. set = NULL;
  8237. }
  8238. ret = get_errno(epoll_pwait(epfd, ep, maxevents, timeout, set));
  8239. break;
  8240. }
  8241. #endif
  8242. #if defined(TARGET_NR_epoll_wait)
  8243. case TARGET_NR_epoll_wait:
  8244. ret = get_errno(epoll_wait(epfd, ep, maxevents, timeout));
  8245. break;
  8246. #endif
  8247. default:
  8248. ret = -TARGET_ENOSYS;
  8249. }
  8250. if (!is_error(ret)) {
  8251. int i;
  8252. for (i = 0; i < ret; i++) {
  8253. target_ep[i].events = tswap32(ep[i].events);
  8254. target_ep[i].data.u64 = tswap64(ep[i].data.u64);
  8255. }
  8256. }
  8257. unlock_user(target_ep, arg2, ret * sizeof(struct target_epoll_event));
  8258. break;
  8259. }
  8260. #endif
  8261. #endif
  8262. #ifdef TARGET_NR_prlimit64
  8263. case TARGET_NR_prlimit64:
  8264. {
  8265. /* args: pid, resource number, ptr to new rlimit, ptr to old rlimit */
  8266. struct target_rlimit64 *target_rnew, *target_rold;
  8267. struct host_rlimit64 rnew, rold, *rnewp = 0;
  8268. if (arg3) {
  8269. if (!lock_user_struct(VERIFY_READ, target_rnew, arg3, 1)) {
  8270. goto efault;
  8271. }
  8272. rnew.rlim_cur = tswap64(target_rnew->rlim_cur);
  8273. rnew.rlim_max = tswap64(target_rnew->rlim_max);
  8274. unlock_user_struct(target_rnew, arg3, 0);
  8275. rnewp = &rnew;
  8276. }
  8277. ret = get_errno(sys_prlimit64(arg1, arg2, rnewp, arg4 ? &rold : 0));
  8278. if (!is_error(ret) && arg4) {
  8279. if (!lock_user_struct(VERIFY_WRITE, target_rold, arg4, 1)) {
  8280. goto efault;
  8281. }
  8282. target_rold->rlim_cur = tswap64(rold.rlim_cur);
  8283. target_rold->rlim_max = tswap64(rold.rlim_max);
  8284. unlock_user_struct(target_rold, arg4, 1);
  8285. }
  8286. break;
  8287. }
  8288. #endif
  8289. #ifdef TARGET_NR_gethostname
  8290. case TARGET_NR_gethostname:
  8291. {
  8292. char *name = lock_user(VERIFY_WRITE, arg1, arg2, 0);
  8293. if (name) {
  8294. ret = get_errno(gethostname(name, arg2));
  8295. unlock_user(name, arg1, arg2);
  8296. } else {
  8297. ret = -TARGET_EFAULT;
  8298. }
  8299. break;
  8300. }
  8301. #endif
  8302. default:
  8303. unimplemented:
  8304. gemu_log("qemu: Unsupported syscall: %d\n", num);
  8305. #if defined(TARGET_NR_setxattr) || defined(TARGET_NR_get_thread_area) || defined(TARGET_NR_getdomainname) || defined(TARGET_NR_set_robust_list)
  8306. unimplemented_nowarn:
  8307. #endif
  8308. ret = -TARGET_ENOSYS;
  8309. break;
  8310. }
  8311. fail:
  8312. #ifdef DEBUG
  8313. gemu_log(" = " TARGET_ABI_FMT_ld "\n", ret);
  8314. #endif
  8315. if(do_strace)
  8316. print_syscall_ret(num, ret);
  8317. return ret;
  8318. efault:
  8319. ret = -TARGET_EFAULT;
  8320. goto fail;
  8321. }