4 * Copyright (c) 2003 Fabrice Bellard
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
30 #include <sys/types.h>
36 #include <sys/mount.h>
37 #include <sys/prctl.h>
38 #include <sys/resource.h>
43 #include <sys/socket.h>
46 #include <sys/times.h>
49 #include <sys/statfs.h>
51 #include <sys/sysinfo.h>
52 //#include <sys/user.h>
53 #include <netinet/ip.h>
54 #include <netinet/tcp.h>
56 #define termios host_termios
57 #define winsize host_winsize
58 #define termio host_termio
59 #define sgttyb host_sgttyb /* same as target */
60 #define tchars host_tchars /* same as target */
61 #define ltchars host_ltchars /* same as target */
63 #include <linux/termios.h>
64 #include <linux/unistd.h>
65 #include <linux/utsname.h>
66 #include <linux/cdrom.h>
67 #include <linux/hdreg.h>
68 #include <linux/soundcard.h>
69 #include <linux/dirent.h>
71 #include <linux/loop.h>
77 #if defined(TARGET_I386) || defined(TARGET_ARM) || defined(TARGET_SPARC) \
78 || defined(TARGET_M68K) || defined(TARGET_SH4) || defined(TARGET_CRIS)
79 /* 16 bit uid wrappers emulation */
83 //#include <linux/msdos_fs.h>
84 #define VFAT_IOCTL_READDIR_BOTH _IOR('r', 1, struct dirent [2])
85 #define VFAT_IOCTL_READDIR_SHORT _IOR('r', 2, struct dirent [2])
96 #define _syscall0(type,name) \
99 return syscall(__NR_##name); \
102 #define _syscall1(type,name,type1,arg1) \
103 type name (type1 arg1) \
105 return syscall(__NR_##name, arg1); \
108 #define _syscall2(type,name,type1,arg1,type2,arg2) \
109 type name (type1 arg1,type2 arg2) \
111 return syscall(__NR_##name, arg1, arg2); \
114 #define _syscall3(type,name,type1,arg1,type2,arg2,type3,arg3) \
115 type name (type1 arg1,type2 arg2,type3 arg3) \
117 return syscall(__NR_##name, arg1, arg2, arg3); \
120 #define _syscall4(type,name,type1,arg1,type2,arg2,type3,arg3,type4,arg4) \
121 type name (type1 arg1,type2 arg2,type3 arg3,type4 arg4) \
123 return syscall(__NR_##name, arg1, arg2, arg3, arg4); \
126 #define _syscall5(type,name,type1,arg1,type2,arg2,type3,arg3,type4,arg4, \
128 type name (type1 arg1,type2 arg2,type3 arg3,type4 arg4,type5 arg5) \
130 return syscall(__NR_##name, arg1, arg2, arg3, arg4, arg5); \
134 #define _syscall6(type,name,type1,arg1,type2,arg2,type3,arg3,type4,arg4, \
135 type5,arg5,type6,arg6) \
136 type name (type1 arg1,type2 arg2,type3 arg3,type4 arg4,type5 arg5,type6 arg6) \
138 return syscall(__NR_##name, arg1, arg2, arg3, arg4, arg5, arg6); \
142 #define __NR_sys_uname __NR_uname
143 #define __NR_sys_faccessat __NR_faccessat
144 #define __NR_sys_fchmodat __NR_fchmodat
145 #define __NR_sys_fchownat __NR_fchownat
146 #define __NR_sys_getcwd1 __NR_getcwd
147 #define __NR_sys_getdents __NR_getdents
148 #define __NR_sys_getdents64 __NR_getdents64
149 #define __NR_sys_getpriority __NR_getpriority
150 #define __NR_sys_linkat __NR_linkat
151 #define __NR_sys_mkdirat __NR_mkdirat
152 #define __NR_sys_mknodat __NR_mknodat
153 #define __NR_sys_openat __NR_openat
154 #define __NR_sys_readlinkat __NR_readlinkat
155 #define __NR_sys_renameat __NR_renameat
156 #define __NR_sys_rt_sigqueueinfo __NR_rt_sigqueueinfo
157 #define __NR_sys_symlinkat __NR_symlinkat
158 #define __NR_sys_syslog __NR_syslog
159 #define __NR_sys_tgkill __NR_tgkill
160 #define __NR_sys_tkill __NR_tkill
161 #define __NR_sys_unlinkat __NR_unlinkat
162 #define __NR_sys_utimensat __NR_utimensat
164 #if defined(__alpha__) || defined (__ia64__) || defined(__x86_64__)
165 #define __NR__llseek __NR_lseek
169 _syscall0(int, gettid
)
171 /* This is a replacement for the host gettid() and must return a host
173 static int gettid(void) {
177 _syscall1(int,sys_uname
,struct new_utsname
*,buf
)
178 #if defined(TARGET_NR_faccessat) && defined(__NR_faccessat)
179 _syscall4(int,sys_faccessat
,int,dirfd
,const char *,pathname
,int,mode
,int,flags
)
181 #if defined(TARGET_NR_fchmodat) && defined(__NR_fchmodat)
182 _syscall4(int,sys_fchmodat
,int,dirfd
,const char *,pathname
,
183 mode_t
,mode
,int,flags
)
185 #if defined(TARGET_NR_fchownat) && defined(__NR_fchownat)
186 _syscall5(int,sys_fchownat
,int,dirfd
,const char *,pathname
,
187 uid_t
,owner
,gid_t
,group
,int,flags
)
189 _syscall2(int,sys_getcwd1
,char *,buf
,size_t,size
)
190 _syscall3(int, sys_getdents
, uint
, fd
, struct dirent
*, dirp
, uint
, count
);
191 #if defined(TARGET_NR_getdents64) && defined(__NR_getdents64)
192 _syscall3(int, sys_getdents64
, uint
, fd
, struct dirent64
*, dirp
, uint
, count
);
194 _syscall2(int, sys_getpriority
, int, which
, int, who
);
195 _syscall5(int, _llseek
, uint
, fd
, ulong
, hi
, ulong
, lo
,
196 loff_t
*, res
, uint
, wh
);
197 #if defined(TARGET_NR_linkat) && defined(__NR_linkat)
198 _syscall5(int,sys_linkat
,int,olddirfd
,const char *,oldpath
,
199 int,newdirfd
,const char *,newpath
,int,flags
)
201 #if defined(TARGET_NR_mkdirat) && defined(__NR_mkdirat)
202 _syscall3(int,sys_mkdirat
,int,dirfd
,const char *,pathname
,mode_t
,mode
)
204 #if defined(TARGET_NR_mknodat) && defined(__NR_mknodat)
205 _syscall4(int,sys_mknodat
,int,dirfd
,const char *,pathname
,
206 mode_t
,mode
,dev_t
,dev
)
208 #if defined(TARGET_NR_openat) && defined(__NR_openat)
209 _syscall4(int,sys_openat
,int,dirfd
,const char *,pathname
,int,flags
,mode_t
,mode
)
211 #if defined(TARGET_NR_readlinkat) && defined(__NR_readlinkat)
212 _syscall4(int,sys_readlinkat
,int,dirfd
,const char *,pathname
,
213 char *,buf
,size_t,bufsize
)
215 #if defined(TARGET_NR_renameat) && defined(__NR_renameat)
216 _syscall4(int,sys_renameat
,int,olddirfd
,const char *,oldpath
,
217 int,newdirfd
,const char *,newpath
)
219 _syscall3(int,sys_rt_sigqueueinfo
,int,pid
,int,sig
,siginfo_t
*,uinfo
)
220 #if defined(TARGET_NR_symlinkat) && defined(__NR_symlinkat)
221 _syscall3(int,sys_symlinkat
,const char *,oldpath
,
222 int,newdirfd
,const char *,newpath
)
224 _syscall3(int,sys_syslog
,int,type
,char*,bufp
,int,len
)
225 #if defined(TARGET_NR_tgkill) && defined(__NR_tgkill)
226 _syscall3(int,sys_tgkill
,int,tgid
,int,pid
,int,sig
)
228 #if defined(TARGET_NR_tkill) && defined(__NR_tkill)
229 _syscall2(int,sys_tkill
,int,tid
,int,sig
)
231 #ifdef __NR_exit_group
232 _syscall1(int,exit_group
,int,error_code
)
234 #if defined(TARGET_NR_set_tid_address) && defined(__NR_set_tid_address)
235 _syscall1(int,set_tid_address
,int *,tidptr
)
237 #if defined(TARGET_NR_unlinkat) && defined(__NR_unlinkat)
238 _syscall3(int,sys_unlinkat
,int,dirfd
,const char *,pathname
,int,flags
)
240 #if defined(TARGET_NR_utimensat) && defined(__NR_utimensat)
241 _syscall4(int,sys_utimensat
,int,dirfd
,const char *,pathname
,
242 const struct timespec
*,tsp
,int,flags
)
245 extern int personality(int);
246 extern int flock(int, int);
247 extern int setfsuid(int);
248 extern int setfsgid(int);
249 extern int setresuid(uid_t
, uid_t
, uid_t
);
250 extern int getresuid(uid_t
*, uid_t
*, uid_t
*);
251 extern int setresgid(gid_t
, gid_t
, gid_t
);
252 extern int getresgid(gid_t
*, gid_t
*, gid_t
*);
253 extern int setgroups(int, gid_t
*);
255 #define ERRNO_TABLE_SIZE 1200
257 /* target_to_host_errno_table[] is initialized from
258 * host_to_target_errno_table[] in syscall_init(). */
259 static uint16_t target_to_host_errno_table
[ERRNO_TABLE_SIZE
] = {
263 * This list is the union of errno values overridden in asm-<arch>/errno.h
264 * minus the errnos that are not actually generic to all archs.
266 static uint16_t host_to_target_errno_table
[ERRNO_TABLE_SIZE
] = {
267 [EIDRM
] = TARGET_EIDRM
,
268 [ECHRNG
] = TARGET_ECHRNG
,
269 [EL2NSYNC
] = TARGET_EL2NSYNC
,
270 [EL3HLT
] = TARGET_EL3HLT
,
271 [EL3RST
] = TARGET_EL3RST
,
272 [ELNRNG
] = TARGET_ELNRNG
,
273 [EUNATCH
] = TARGET_EUNATCH
,
274 [ENOCSI
] = TARGET_ENOCSI
,
275 [EL2HLT
] = TARGET_EL2HLT
,
276 [EDEADLK
] = TARGET_EDEADLK
,
277 [ENOLCK
] = TARGET_ENOLCK
,
278 [EBADE
] = TARGET_EBADE
,
279 [EBADR
] = TARGET_EBADR
,
280 [EXFULL
] = TARGET_EXFULL
,
281 [ENOANO
] = TARGET_ENOANO
,
282 [EBADRQC
] = TARGET_EBADRQC
,
283 [EBADSLT
] = TARGET_EBADSLT
,
284 [EBFONT
] = TARGET_EBFONT
,
285 [ENOSTR
] = TARGET_ENOSTR
,
286 [ENODATA
] = TARGET_ENODATA
,
287 [ETIME
] = TARGET_ETIME
,
288 [ENOSR
] = TARGET_ENOSR
,
289 [ENONET
] = TARGET_ENONET
,
290 [ENOPKG
] = TARGET_ENOPKG
,
291 [EREMOTE
] = TARGET_EREMOTE
,
292 [ENOLINK
] = TARGET_ENOLINK
,
293 [EADV
] = TARGET_EADV
,
294 [ESRMNT
] = TARGET_ESRMNT
,
295 [ECOMM
] = TARGET_ECOMM
,
296 [EPROTO
] = TARGET_EPROTO
,
297 [EDOTDOT
] = TARGET_EDOTDOT
,
298 [EMULTIHOP
] = TARGET_EMULTIHOP
,
299 [EBADMSG
] = TARGET_EBADMSG
,
300 [ENAMETOOLONG
] = TARGET_ENAMETOOLONG
,
301 [EOVERFLOW
] = TARGET_EOVERFLOW
,
302 [ENOTUNIQ
] = TARGET_ENOTUNIQ
,
303 [EBADFD
] = TARGET_EBADFD
,
304 [EREMCHG
] = TARGET_EREMCHG
,
305 [ELIBACC
] = TARGET_ELIBACC
,
306 [ELIBBAD
] = TARGET_ELIBBAD
,
307 [ELIBSCN
] = TARGET_ELIBSCN
,
308 [ELIBMAX
] = TARGET_ELIBMAX
,
309 [ELIBEXEC
] = TARGET_ELIBEXEC
,
310 [EILSEQ
] = TARGET_EILSEQ
,
311 [ENOSYS
] = TARGET_ENOSYS
,
312 [ELOOP
] = TARGET_ELOOP
,
313 [ERESTART
] = TARGET_ERESTART
,
314 [ESTRPIPE
] = TARGET_ESTRPIPE
,
315 [ENOTEMPTY
] = TARGET_ENOTEMPTY
,
316 [EUSERS
] = TARGET_EUSERS
,
317 [ENOTSOCK
] = TARGET_ENOTSOCK
,
318 [EDESTADDRREQ
] = TARGET_EDESTADDRREQ
,
319 [EMSGSIZE
] = TARGET_EMSGSIZE
,
320 [EPROTOTYPE
] = TARGET_EPROTOTYPE
,
321 [ENOPROTOOPT
] = TARGET_ENOPROTOOPT
,
322 [EPROTONOSUPPORT
] = TARGET_EPROTONOSUPPORT
,
323 [ESOCKTNOSUPPORT
] = TARGET_ESOCKTNOSUPPORT
,
324 [EOPNOTSUPP
] = TARGET_EOPNOTSUPP
,
325 [EPFNOSUPPORT
] = TARGET_EPFNOSUPPORT
,
326 [EAFNOSUPPORT
] = TARGET_EAFNOSUPPORT
,
327 [EADDRINUSE
] = TARGET_EADDRINUSE
,
328 [EADDRNOTAVAIL
] = TARGET_EADDRNOTAVAIL
,
329 [ENETDOWN
] = TARGET_ENETDOWN
,
330 [ENETUNREACH
] = TARGET_ENETUNREACH
,
331 [ENETRESET
] = TARGET_ENETRESET
,
332 [ECONNABORTED
] = TARGET_ECONNABORTED
,
333 [ECONNRESET
] = TARGET_ECONNRESET
,
334 [ENOBUFS
] = TARGET_ENOBUFS
,
335 [EISCONN
] = TARGET_EISCONN
,
336 [ENOTCONN
] = TARGET_ENOTCONN
,
337 [EUCLEAN
] = TARGET_EUCLEAN
,
338 [ENOTNAM
] = TARGET_ENOTNAM
,
339 [ENAVAIL
] = TARGET_ENAVAIL
,
340 [EISNAM
] = TARGET_EISNAM
,
341 [EREMOTEIO
] = TARGET_EREMOTEIO
,
342 [ESHUTDOWN
] = TARGET_ESHUTDOWN
,
343 [ETOOMANYREFS
] = TARGET_ETOOMANYREFS
,
344 [ETIMEDOUT
] = TARGET_ETIMEDOUT
,
345 [ECONNREFUSED
] = TARGET_ECONNREFUSED
,
346 [EHOSTDOWN
] = TARGET_EHOSTDOWN
,
347 [EHOSTUNREACH
] = TARGET_EHOSTUNREACH
,
348 [EALREADY
] = TARGET_EALREADY
,
349 [EINPROGRESS
] = TARGET_EINPROGRESS
,
350 [ESTALE
] = TARGET_ESTALE
,
351 [ECANCELED
] = TARGET_ECANCELED
,
352 [ENOMEDIUM
] = TARGET_ENOMEDIUM
,
353 [EMEDIUMTYPE
] = TARGET_EMEDIUMTYPE
,
355 [ENOKEY
] = TARGET_ENOKEY
,
358 [EKEYEXPIRED
] = TARGET_EKEYEXPIRED
,
361 [EKEYREVOKED
] = TARGET_EKEYREVOKED
,
364 [EKEYREJECTED
] = TARGET_EKEYREJECTED
,
367 [EOWNERDEAD
] = TARGET_EOWNERDEAD
,
369 #ifdef ENOTRECOVERABLE
370 [ENOTRECOVERABLE
] = TARGET_ENOTRECOVERABLE
,
374 static inline int host_to_target_errno(int err
)
376 if(host_to_target_errno_table
[err
])
377 return host_to_target_errno_table
[err
];
381 static inline int target_to_host_errno(int err
)
383 if (target_to_host_errno_table
[err
])
384 return target_to_host_errno_table
[err
];
388 static inline abi_long
get_errno(abi_long ret
)
391 return -host_to_target_errno(errno
);
396 static inline int is_error(abi_long ret
)
398 return (abi_ulong
)ret
>= (abi_ulong
)(-4096);
401 char *target_strerror(int err
)
403 return strerror(target_to_host_errno(err
));
406 static abi_ulong target_brk
;
407 static abi_ulong target_original_brk
;
409 void target_set_brk(abi_ulong new_brk
)
411 target_original_brk
= target_brk
= HOST_PAGE_ALIGN(new_brk
);
414 /* do_brk() must return target values and target errnos. */
415 abi_long
do_brk(abi_ulong new_brk
)
418 abi_long mapped_addr
;
423 if (new_brk
< target_original_brk
)
426 brk_page
= HOST_PAGE_ALIGN(target_brk
);
428 /* If the new brk is less than this, set it and we're done... */
429 if (new_brk
< brk_page
) {
430 target_brk
= new_brk
;
434 /* We need to allocate more memory after the brk... */
435 new_alloc_size
= HOST_PAGE_ALIGN(new_brk
- brk_page
+ 1);
436 mapped_addr
= get_errno(target_mmap(brk_page
, new_alloc_size
,
437 PROT_READ
|PROT_WRITE
,
438 MAP_ANON
|MAP_FIXED
|MAP_PRIVATE
, 0, 0));
440 if (!is_error(mapped_addr
))
441 target_brk
= new_brk
;
446 static inline abi_long
copy_from_user_fdset(fd_set
*fds
,
447 abi_ulong target_fds_addr
,
451 abi_ulong b
, *target_fds
;
453 nw
= (n
+ TARGET_ABI_BITS
- 1) / TARGET_ABI_BITS
;
454 if (!(target_fds
= lock_user(VERIFY_READ
,
456 sizeof(abi_ulong
) * nw
,
458 return -TARGET_EFAULT
;
462 for (i
= 0; i
< nw
; i
++) {
463 /* grab the abi_ulong */
464 __get_user(b
, &target_fds
[i
]);
465 for (j
= 0; j
< TARGET_ABI_BITS
; j
++) {
466 /* check the bit inside the abi_ulong */
473 unlock_user(target_fds
, target_fds_addr
, 0);
478 static inline abi_long
copy_to_user_fdset(abi_ulong target_fds_addr
,
484 abi_ulong
*target_fds
;
486 nw
= (n
+ TARGET_ABI_BITS
- 1) / TARGET_ABI_BITS
;
487 if (!(target_fds
= lock_user(VERIFY_WRITE
,
489 sizeof(abi_ulong
) * nw
,
491 return -TARGET_EFAULT
;
494 for (i
= 0; i
< nw
; i
++) {
496 for (j
= 0; j
< TARGET_ABI_BITS
; j
++) {
497 v
|= ((FD_ISSET(k
, fds
) != 0) << j
);
500 __put_user(v
, &target_fds
[i
]);
503 unlock_user(target_fds
, target_fds_addr
, sizeof(abi_ulong
) * nw
);
508 #if defined(__alpha__)
514 static inline abi_long
host_to_target_clock_t(long ticks
)
516 #if HOST_HZ == TARGET_HZ
519 return ((int64_t)ticks
* TARGET_HZ
) / HOST_HZ
;
523 static inline abi_long
host_to_target_rusage(abi_ulong target_addr
,
524 const struct rusage
*rusage
)
526 struct target_rusage
*target_rusage
;
528 if (!lock_user_struct(VERIFY_WRITE
, target_rusage
, target_addr
, 0))
529 return -TARGET_EFAULT
;
530 target_rusage
->ru_utime
.tv_sec
= tswapl(rusage
->ru_utime
.tv_sec
);
531 target_rusage
->ru_utime
.tv_usec
= tswapl(rusage
->ru_utime
.tv_usec
);
532 target_rusage
->ru_stime
.tv_sec
= tswapl(rusage
->ru_stime
.tv_sec
);
533 target_rusage
->ru_stime
.tv_usec
= tswapl(rusage
->ru_stime
.tv_usec
);
534 target_rusage
->ru_maxrss
= tswapl(rusage
->ru_maxrss
);
535 target_rusage
->ru_ixrss
= tswapl(rusage
->ru_ixrss
);
536 target_rusage
->ru_idrss
= tswapl(rusage
->ru_idrss
);
537 target_rusage
->ru_isrss
= tswapl(rusage
->ru_isrss
);
538 target_rusage
->ru_minflt
= tswapl(rusage
->ru_minflt
);
539 target_rusage
->ru_majflt
= tswapl(rusage
->ru_majflt
);
540 target_rusage
->ru_nswap
= tswapl(rusage
->ru_nswap
);
541 target_rusage
->ru_inblock
= tswapl(rusage
->ru_inblock
);
542 target_rusage
->ru_oublock
= tswapl(rusage
->ru_oublock
);
543 target_rusage
->ru_msgsnd
= tswapl(rusage
->ru_msgsnd
);
544 target_rusage
->ru_msgrcv
= tswapl(rusage
->ru_msgrcv
);
545 target_rusage
->ru_nsignals
= tswapl(rusage
->ru_nsignals
);
546 target_rusage
->ru_nvcsw
= tswapl(rusage
->ru_nvcsw
);
547 target_rusage
->ru_nivcsw
= tswapl(rusage
->ru_nivcsw
);
548 unlock_user_struct(target_rusage
, target_addr
, 1);
553 static inline abi_long
copy_from_user_timeval(struct timeval
*tv
,
554 abi_ulong target_tv_addr
)
556 struct target_timeval
*target_tv
;
558 if (!lock_user_struct(VERIFY_READ
, target_tv
, target_tv_addr
, 1))
559 return -TARGET_EFAULT
;
561 __get_user(tv
->tv_sec
, &target_tv
->tv_sec
);
562 __get_user(tv
->tv_usec
, &target_tv
->tv_usec
);
564 unlock_user_struct(target_tv
, target_tv_addr
, 0);
569 static inline abi_long
copy_to_user_timeval(abi_ulong target_tv_addr
,
570 const struct timeval
*tv
)
572 struct target_timeval
*target_tv
;
574 if (!lock_user_struct(VERIFY_WRITE
, target_tv
, target_tv_addr
, 0))
575 return -TARGET_EFAULT
;
577 __put_user(tv
->tv_sec
, &target_tv
->tv_sec
);
578 __put_user(tv
->tv_usec
, &target_tv
->tv_usec
);
580 unlock_user_struct(target_tv
, target_tv_addr
, 1);
586 /* do_select() must return target values and target errnos. */
587 static abi_long
do_select(int n
,
588 abi_ulong rfd_addr
, abi_ulong wfd_addr
,
589 abi_ulong efd_addr
, abi_ulong target_tv_addr
)
591 fd_set rfds
, wfds
, efds
;
592 fd_set
*rfds_ptr
, *wfds_ptr
, *efds_ptr
;
593 struct timeval tv
, *tv_ptr
;
597 if (copy_from_user_fdset(&rfds
, rfd_addr
, n
))
598 return -TARGET_EFAULT
;
604 if (copy_from_user_fdset(&wfds
, wfd_addr
, n
))
605 return -TARGET_EFAULT
;
611 if (copy_from_user_fdset(&efds
, efd_addr
, n
))
612 return -TARGET_EFAULT
;
618 if (target_tv_addr
) {
619 if (copy_from_user_timeval(&tv
, target_tv_addr
))
620 return -TARGET_EFAULT
;
626 ret
= get_errno(select(n
, rfds_ptr
, wfds_ptr
, efds_ptr
, tv_ptr
));
628 if (!is_error(ret
)) {
629 if (rfd_addr
&& copy_to_user_fdset(rfd_addr
, &rfds
, n
))
630 return -TARGET_EFAULT
;
631 if (wfd_addr
&& copy_to_user_fdset(wfd_addr
, &wfds
, n
))
632 return -TARGET_EFAULT
;
633 if (efd_addr
&& copy_to_user_fdset(efd_addr
, &efds
, n
))
634 return -TARGET_EFAULT
;
636 if (target_tv_addr
&& copy_to_user_timeval(target_tv_addr
, &tv
))
637 return -TARGET_EFAULT
;
643 static inline abi_long
target_to_host_sockaddr(struct sockaddr
*addr
,
644 abi_ulong target_addr
,
647 struct target_sockaddr
*target_saddr
;
649 target_saddr
= lock_user(VERIFY_READ
, target_addr
, len
, 1);
651 return -TARGET_EFAULT
;
652 memcpy(addr
, target_saddr
, len
);
653 addr
->sa_family
= tswap16(target_saddr
->sa_family
);
654 unlock_user(target_saddr
, target_addr
, 0);
659 static inline abi_long
host_to_target_sockaddr(abi_ulong target_addr
,
660 struct sockaddr
*addr
,
663 struct target_sockaddr
*target_saddr
;
665 target_saddr
= lock_user(VERIFY_WRITE
, target_addr
, len
, 0);
667 return -TARGET_EFAULT
;
668 memcpy(target_saddr
, addr
, len
);
669 target_saddr
->sa_family
= tswap16(addr
->sa_family
);
670 unlock_user(target_saddr
, target_addr
, len
);
675 /* ??? Should this also swap msgh->name? */
676 static inline abi_long
target_to_host_cmsg(struct msghdr
*msgh
,
677 struct target_msghdr
*target_msgh
)
679 struct cmsghdr
*cmsg
= CMSG_FIRSTHDR(msgh
);
680 abi_long msg_controllen
;
681 abi_ulong target_cmsg_addr
;
682 struct target_cmsghdr
*target_cmsg
;
685 msg_controllen
= tswapl(target_msgh
->msg_controllen
);
686 if (msg_controllen
< sizeof (struct target_cmsghdr
))
688 target_cmsg_addr
= tswapl(target_msgh
->msg_control
);
689 target_cmsg
= lock_user(VERIFY_READ
, target_cmsg_addr
, msg_controllen
, 1);
691 return -TARGET_EFAULT
;
693 while (cmsg
&& target_cmsg
) {
694 void *data
= CMSG_DATA(cmsg
);
695 void *target_data
= TARGET_CMSG_DATA(target_cmsg
);
697 int len
= tswapl(target_cmsg
->cmsg_len
)
698 - TARGET_CMSG_ALIGN(sizeof (struct target_cmsghdr
));
700 space
+= CMSG_SPACE(len
);
701 if (space
> msgh
->msg_controllen
) {
702 space
-= CMSG_SPACE(len
);
703 gemu_log("Host cmsg overflow\n");
707 cmsg
->cmsg_level
= tswap32(target_cmsg
->cmsg_level
);
708 cmsg
->cmsg_type
= tswap32(target_cmsg
->cmsg_type
);
709 cmsg
->cmsg_len
= CMSG_LEN(len
);
711 if (cmsg
->cmsg_level
!= TARGET_SOL_SOCKET
|| cmsg
->cmsg_type
!= SCM_RIGHTS
) {
712 gemu_log("Unsupported ancillary data: %d/%d\n", cmsg
->cmsg_level
, cmsg
->cmsg_type
);
713 memcpy(data
, target_data
, len
);
715 int *fd
= (int *)data
;
716 int *target_fd
= (int *)target_data
;
717 int i
, numfds
= len
/ sizeof(int);
719 for (i
= 0; i
< numfds
; i
++)
720 fd
[i
] = tswap32(target_fd
[i
]);
723 cmsg
= CMSG_NXTHDR(msgh
, cmsg
);
724 target_cmsg
= TARGET_CMSG_NXTHDR(target_msgh
, target_cmsg
);
726 unlock_user(target_cmsg
, target_cmsg_addr
, 0);
728 msgh
->msg_controllen
= space
;
732 /* ??? Should this also swap msgh->name? */
733 static inline abi_long
host_to_target_cmsg(struct target_msghdr
*target_msgh
,
736 struct cmsghdr
*cmsg
= CMSG_FIRSTHDR(msgh
);
737 abi_long msg_controllen
;
738 abi_ulong target_cmsg_addr
;
739 struct target_cmsghdr
*target_cmsg
;
742 msg_controllen
= tswapl(target_msgh
->msg_controllen
);
743 if (msg_controllen
< sizeof (struct target_cmsghdr
))
745 target_cmsg_addr
= tswapl(target_msgh
->msg_control
);
746 target_cmsg
= lock_user(VERIFY_WRITE
, target_cmsg_addr
, msg_controllen
, 0);
748 return -TARGET_EFAULT
;
750 while (cmsg
&& target_cmsg
) {
751 void *data
= CMSG_DATA(cmsg
);
752 void *target_data
= TARGET_CMSG_DATA(target_cmsg
);
754 int len
= cmsg
->cmsg_len
- CMSG_ALIGN(sizeof (struct cmsghdr
));
756 space
+= TARGET_CMSG_SPACE(len
);
757 if (space
> msg_controllen
) {
758 space
-= TARGET_CMSG_SPACE(len
);
759 gemu_log("Target cmsg overflow\n");
763 target_cmsg
->cmsg_level
= tswap32(cmsg
->cmsg_level
);
764 target_cmsg
->cmsg_type
= tswap32(cmsg
->cmsg_type
);
765 target_cmsg
->cmsg_len
= tswapl(TARGET_CMSG_LEN(len
));
767 if (cmsg
->cmsg_level
!= TARGET_SOL_SOCKET
|| cmsg
->cmsg_type
!= SCM_RIGHTS
) {
768 gemu_log("Unsupported ancillary data: %d/%d\n", cmsg
->cmsg_level
, cmsg
->cmsg_type
);
769 memcpy(target_data
, data
, len
);
771 int *fd
= (int *)data
;
772 int *target_fd
= (int *)target_data
;
773 int i
, numfds
= len
/ sizeof(int);
775 for (i
= 0; i
< numfds
; i
++)
776 target_fd
[i
] = tswap32(fd
[i
]);
779 cmsg
= CMSG_NXTHDR(msgh
, cmsg
);
780 target_cmsg
= TARGET_CMSG_NXTHDR(target_msgh
, target_cmsg
);
782 unlock_user(target_cmsg
, target_cmsg_addr
, space
);
784 target_msgh
->msg_controllen
= tswapl(space
);
788 /* do_setsockopt() Must return target values and target errnos. */
789 static abi_long
do_setsockopt(int sockfd
, int level
, int optname
,
790 abi_ulong optval_addr
, socklen_t optlen
)
797 /* TCP options all take an 'int' value. */
798 if (optlen
< sizeof(uint32_t))
799 return -TARGET_EINVAL
;
801 if (get_user_u32(val
, optval_addr
))
802 return -TARGET_EFAULT
;
803 ret
= get_errno(setsockopt(sockfd
, level
, optname
, &val
, sizeof(val
)));
810 case IP_ROUTER_ALERT
:
814 case IP_MTU_DISCOVER
:
820 case IP_MULTICAST_TTL
:
821 case IP_MULTICAST_LOOP
:
823 if (optlen
>= sizeof(uint32_t)) {
824 if (get_user_u32(val
, optval_addr
))
825 return -TARGET_EFAULT
;
826 } else if (optlen
>= 1) {
827 if (get_user_u8(val
, optval_addr
))
828 return -TARGET_EFAULT
;
830 ret
= get_errno(setsockopt(sockfd
, level
, optname
, &val
, sizeof(val
)));
836 case TARGET_SOL_SOCKET
:
838 /* Options with 'int' argument. */
839 case TARGET_SO_DEBUG
:
842 case TARGET_SO_REUSEADDR
:
843 optname
= SO_REUSEADDR
;
848 case TARGET_SO_ERROR
:
851 case TARGET_SO_DONTROUTE
:
852 optname
= SO_DONTROUTE
;
854 case TARGET_SO_BROADCAST
:
855 optname
= SO_BROADCAST
;
857 case TARGET_SO_SNDBUF
:
860 case TARGET_SO_RCVBUF
:
863 case TARGET_SO_KEEPALIVE
:
864 optname
= SO_KEEPALIVE
;
866 case TARGET_SO_OOBINLINE
:
867 optname
= SO_OOBINLINE
;
869 case TARGET_SO_NO_CHECK
:
870 optname
= SO_NO_CHECK
;
872 case TARGET_SO_PRIORITY
:
873 optname
= SO_PRIORITY
;
876 case TARGET_SO_BSDCOMPAT
:
877 optname
= SO_BSDCOMPAT
;
880 case TARGET_SO_PASSCRED
:
881 optname
= SO_PASSCRED
;
883 case TARGET_SO_TIMESTAMP
:
884 optname
= SO_TIMESTAMP
;
886 case TARGET_SO_RCVLOWAT
:
887 optname
= SO_RCVLOWAT
;
889 case TARGET_SO_RCVTIMEO
:
890 optname
= SO_RCVTIMEO
;
892 case TARGET_SO_SNDTIMEO
:
893 optname
= SO_SNDTIMEO
;
899 if (optlen
< sizeof(uint32_t))
900 return -TARGET_EINVAL
;
902 if (get_user_u32(val
, optval_addr
))
903 return -TARGET_EFAULT
;
904 ret
= get_errno(setsockopt(sockfd
, SOL_SOCKET
, optname
, &val
, sizeof(val
)));
908 gemu_log("Unsupported setsockopt level=%d optname=%d \n", level
, optname
);
909 ret
= -TARGET_ENOPROTOOPT
;
914 /* do_getsockopt() Must return target values and target errnos. */
915 static abi_long
do_getsockopt(int sockfd
, int level
, int optname
,
916 abi_ulong optval_addr
, abi_ulong optlen
)
922 case TARGET_SOL_SOCKET
:
925 case TARGET_SO_LINGER
:
926 case TARGET_SO_RCVTIMEO
:
927 case TARGET_SO_SNDTIMEO
:
928 case TARGET_SO_PEERCRED
:
929 case TARGET_SO_PEERNAME
:
930 /* These don't just return a single integer */
937 /* TCP options all take an 'int' value. */
939 if (get_user_u32(len
, optlen
))
940 return -TARGET_EFAULT
;
942 return -TARGET_EINVAL
;
944 ret
= get_errno(getsockopt(sockfd
, level
, optname
, &val
, &lv
));
951 if (put_user_u32(val
, optval_addr
))
952 return -TARGET_EFAULT
;
954 if (put_user_u8(val
, optval_addr
))
955 return -TARGET_EFAULT
;
957 if (put_user_u32(len
, optlen
))
958 return -TARGET_EFAULT
;
965 case IP_ROUTER_ALERT
:
969 case IP_MTU_DISCOVER
:
975 case IP_MULTICAST_TTL
:
976 case IP_MULTICAST_LOOP
:
977 if (get_user_u32(len
, optlen
))
978 return -TARGET_EFAULT
;
980 return -TARGET_EINVAL
;
982 ret
= get_errno(getsockopt(sockfd
, level
, optname
, &val
, &lv
));
985 if (len
< sizeof(int) && len
> 0 && val
>= 0 && val
< 255) {
987 if (put_user_u32(len
, optlen
)
988 || put_user_u8(val
, optval_addr
))
989 return -TARGET_EFAULT
;
991 if (len
> sizeof(int))
993 if (put_user_u32(len
, optlen
)
994 || put_user_u32(val
, optval_addr
))
995 return -TARGET_EFAULT
;
999 ret
= -TARGET_ENOPROTOOPT
;
1005 gemu_log("getsockopt level=%d optname=%d not yet supported\n",
1007 ret
= -TARGET_EOPNOTSUPP
;
1014 * lock_iovec()/unlock_iovec() have a return code of 0 for success where
1015 * other lock functions have a return code of 0 for failure.
1017 static abi_long
lock_iovec(int type
, struct iovec
*vec
, abi_ulong target_addr
,
1018 int count
, int copy
)
1020 struct target_iovec
*target_vec
;
1024 target_vec
= lock_user(VERIFY_READ
, target_addr
, count
* sizeof(struct target_iovec
), 1);
1026 return -TARGET_EFAULT
;
1027 for(i
= 0;i
< count
; i
++) {
1028 base
= tswapl(target_vec
[i
].iov_base
);
1029 vec
[i
].iov_len
= tswapl(target_vec
[i
].iov_len
);
1030 if (vec
[i
].iov_len
!= 0) {
1031 vec
[i
].iov_base
= lock_user(type
, base
, vec
[i
].iov_len
, copy
);
1032 if (!vec
[i
].iov_base
&& vec
[i
].iov_len
)
1035 /* zero length pointer is ignored */
1036 vec
[i
].iov_base
= NULL
;
1039 unlock_user (target_vec
, target_addr
, 0);
1042 /* failure - unwind locks */
1043 for (j
= 0; j
< i
; j
++) {
1044 base
= tswapl(target_vec
[j
].iov_base
);
1045 unlock_user(vec
[j
].iov_base
, base
, 0);
1047 unlock_user (target_vec
, target_addr
, 0);
1048 return -TARGET_EFAULT
;
1051 static abi_long
unlock_iovec(struct iovec
*vec
, abi_ulong target_addr
,
1052 int count
, int copy
)
1054 struct target_iovec
*target_vec
;
1058 target_vec
= lock_user(VERIFY_READ
, target_addr
, count
* sizeof(struct target_iovec
), 1);
1060 return -TARGET_EFAULT
;
1061 for(i
= 0;i
< count
; i
++) {
1062 base
= tswapl(target_vec
[i
].iov_base
);
1063 unlock_user(vec
[i
].iov_base
, base
, copy
? vec
[i
].iov_len
: 0);
1065 unlock_user (target_vec
, target_addr
, 0);
1070 /* do_socket() Must return target values and target errnos. */
1071 static abi_long
do_socket(int domain
, int type
, int protocol
)
1073 #if defined(TARGET_MIPS)
1075 case TARGET_SOCK_DGRAM
:
1078 case TARGET_SOCK_STREAM
:
1081 case TARGET_SOCK_RAW
:
1084 case TARGET_SOCK_RDM
:
1087 case TARGET_SOCK_SEQPACKET
:
1088 type
= SOCK_SEQPACKET
;
1090 case TARGET_SOCK_PACKET
:
1095 if (domain
== PF_NETLINK
)
1096 return -EAFNOSUPPORT
; /* do not NETLINK socket connections possible */
1097 return get_errno(socket(domain
, type
, protocol
));
1100 /* do_bind() Must return target values and target errnos. */
1101 static abi_long
do_bind(int sockfd
, abi_ulong target_addr
,
1104 void *addr
= alloca(addrlen
);
1106 target_to_host_sockaddr(addr
, target_addr
, addrlen
);
1107 return get_errno(bind(sockfd
, addr
, addrlen
));
1110 /* do_connect() Must return target values and target errnos. */
1111 static abi_long
do_connect(int sockfd
, abi_ulong target_addr
,
1114 void *addr
= alloca(addrlen
);
1116 target_to_host_sockaddr(addr
, target_addr
, addrlen
);
1117 return get_errno(connect(sockfd
, addr
, addrlen
));
1120 /* do_sendrecvmsg() Must return target values and target errnos. */
1121 static abi_long
do_sendrecvmsg(int fd
, abi_ulong target_msg
,
1122 int flags
, int send
)
1125 struct target_msghdr
*msgp
;
1129 abi_ulong target_vec
;
1132 if (!lock_user_struct(send
? VERIFY_READ
: VERIFY_WRITE
,
1136 return -TARGET_EFAULT
;
1137 if (msgp
->msg_name
) {
1138 msg
.msg_namelen
= tswap32(msgp
->msg_namelen
);
1139 msg
.msg_name
= alloca(msg
.msg_namelen
);
1140 target_to_host_sockaddr(msg
.msg_name
, tswapl(msgp
->msg_name
),
1143 msg
.msg_name
= NULL
;
1144 msg
.msg_namelen
= 0;
1146 msg
.msg_controllen
= 2 * tswapl(msgp
->msg_controllen
);
1147 msg
.msg_control
= alloca(msg
.msg_controllen
);
1148 msg
.msg_flags
= tswap32(msgp
->msg_flags
);
1150 count
= tswapl(msgp
->msg_iovlen
);
1151 vec
= alloca(count
* sizeof(struct iovec
));
1152 target_vec
= tswapl(msgp
->msg_iov
);
1153 lock_iovec(send
? VERIFY_READ
: VERIFY_WRITE
, vec
, target_vec
, count
, send
);
1154 msg
.msg_iovlen
= count
;
1158 ret
= target_to_host_cmsg(&msg
, msgp
);
1160 ret
= get_errno(sendmsg(fd
, &msg
, flags
));
1162 ret
= get_errno(recvmsg(fd
, &msg
, flags
));
1164 ret
= host_to_target_cmsg(msgp
, &msg
);
1166 unlock_iovec(vec
, target_vec
, count
, !send
);
1167 unlock_user_struct(msgp
, target_msg
, send
? 0 : 1);
1171 /* do_accept() Must return target values and target errnos. */
1172 static abi_long
do_accept(int fd
, abi_ulong target_addr
,
1173 abi_ulong target_addrlen_addr
)
1179 if (get_user_u32(addrlen
, target_addrlen_addr
))
1180 return -TARGET_EFAULT
;
1182 addr
= alloca(addrlen
);
1184 ret
= get_errno(accept(fd
, addr
, &addrlen
));
1185 if (!is_error(ret
)) {
1186 host_to_target_sockaddr(target_addr
, addr
, addrlen
);
1187 if (put_user_u32(addrlen
, target_addrlen_addr
))
1188 ret
= -TARGET_EFAULT
;
1193 /* do_getpeername() Must return target values and target errnos. */
1194 static abi_long
do_getpeername(int fd
, abi_ulong target_addr
,
1195 abi_ulong target_addrlen_addr
)
1201 if (get_user_u32(addrlen
, target_addrlen_addr
))
1202 return -TARGET_EFAULT
;
1204 addr
= alloca(addrlen
);
1206 ret
= get_errno(getpeername(fd
, addr
, &addrlen
));
1207 if (!is_error(ret
)) {
1208 host_to_target_sockaddr(target_addr
, addr
, addrlen
);
1209 if (put_user_u32(addrlen
, target_addrlen_addr
))
1210 ret
= -TARGET_EFAULT
;
1215 /* do_getsockname() Must return target values and target errnos. */
1216 static abi_long
do_getsockname(int fd
, abi_ulong target_addr
,
1217 abi_ulong target_addrlen_addr
)
1223 if (get_user_u32(addrlen
, target_addrlen_addr
))
1224 return -TARGET_EFAULT
;
1226 addr
= alloca(addrlen
);
1228 ret
= get_errno(getsockname(fd
, addr
, &addrlen
));
1229 if (!is_error(ret
)) {
1230 host_to_target_sockaddr(target_addr
, addr
, addrlen
);
1231 if (put_user_u32(addrlen
, target_addrlen_addr
))
1232 ret
= -TARGET_EFAULT
;
1237 /* do_socketpair() Must return target values and target errnos. */
1238 static abi_long
do_socketpair(int domain
, int type
, int protocol
,
1239 abi_ulong target_tab_addr
)
1244 ret
= get_errno(socketpair(domain
, type
, protocol
, tab
));
1245 if (!is_error(ret
)) {
1246 if (put_user_s32(tab
[0], target_tab_addr
)
1247 || put_user_s32(tab
[1], target_tab_addr
+ sizeof(tab
[0])))
1248 ret
= -TARGET_EFAULT
;
1253 /* do_sendto() Must return target values and target errnos. */
1254 static abi_long
do_sendto(int fd
, abi_ulong msg
, size_t len
, int flags
,
1255 abi_ulong target_addr
, socklen_t addrlen
)
1261 host_msg
= lock_user(VERIFY_READ
, msg
, len
, 1);
1263 return -TARGET_EFAULT
;
1265 addr
= alloca(addrlen
);
1266 target_to_host_sockaddr(addr
, target_addr
, addrlen
);
1267 ret
= get_errno(sendto(fd
, host_msg
, len
, flags
, addr
, addrlen
));
1269 ret
= get_errno(send(fd
, host_msg
, len
, flags
));
1271 unlock_user(host_msg
, msg
, 0);
1275 /* do_recvfrom() Must return target values and target errnos. */
1276 static abi_long
do_recvfrom(int fd
, abi_ulong msg
, size_t len
, int flags
,
1277 abi_ulong target_addr
,
1278 abi_ulong target_addrlen
)
1285 host_msg
= lock_user(VERIFY_WRITE
, msg
, len
, 0);
1287 return -TARGET_EFAULT
;
1289 if (get_user_u32(addrlen
, target_addrlen
)) {
1290 ret
= -TARGET_EFAULT
;
1293 addr
= alloca(addrlen
);
1294 ret
= get_errno(recvfrom(fd
, host_msg
, len
, flags
, addr
, &addrlen
));
1296 addr
= NULL
; /* To keep compiler quiet. */
1297 ret
= get_errno(recv(fd
, host_msg
, len
, flags
));
1299 if (!is_error(ret
)) {
1301 host_to_target_sockaddr(target_addr
, addr
, addrlen
);
1302 if (put_user_u32(addrlen
, target_addrlen
)) {
1303 ret
= -TARGET_EFAULT
;
1307 unlock_user(host_msg
, msg
, len
);
1310 unlock_user(host_msg
, msg
, 0);
1315 #ifdef TARGET_NR_socketcall
1316 /* do_socketcall() Must return target values and target errnos. */
1317 static abi_long
do_socketcall(int num
, abi_ulong vptr
)
1320 const int n
= sizeof(abi_ulong
);
1325 int domain
, type
, protocol
;
1327 if (get_user_s32(domain
, vptr
)
1328 || get_user_s32(type
, vptr
+ n
)
1329 || get_user_s32(protocol
, vptr
+ 2 * n
))
1330 return -TARGET_EFAULT
;
1332 ret
= do_socket(domain
, type
, protocol
);
1338 abi_ulong target_addr
;
1341 if (get_user_s32(sockfd
, vptr
)
1342 || get_user_ual(target_addr
, vptr
+ n
)
1343 || get_user_u32(addrlen
, vptr
+ 2 * n
))
1344 return -TARGET_EFAULT
;
1346 ret
= do_bind(sockfd
, target_addr
, addrlen
);
1349 case SOCKOP_connect
:
1352 abi_ulong target_addr
;
1355 if (get_user_s32(sockfd
, vptr
)
1356 || get_user_ual(target_addr
, vptr
+ n
)
1357 || get_user_u32(addrlen
, vptr
+ 2 * n
))
1358 return -TARGET_EFAULT
;
1360 ret
= do_connect(sockfd
, target_addr
, addrlen
);
1365 int sockfd
, backlog
;
1367 if (get_user_s32(sockfd
, vptr
)
1368 || get_user_s32(backlog
, vptr
+ n
))
1369 return -TARGET_EFAULT
;
1371 ret
= get_errno(listen(sockfd
, backlog
));
1377 abi_ulong target_addr
, target_addrlen
;
1379 if (get_user_s32(sockfd
, vptr
)
1380 || get_user_ual(target_addr
, vptr
+ n
)
1381 || get_user_u32(target_addrlen
, vptr
+ 2 * n
))
1382 return -TARGET_EFAULT
;
1384 ret
= do_accept(sockfd
, target_addr
, target_addrlen
);
1387 case SOCKOP_getsockname
:
1390 abi_ulong target_addr
, target_addrlen
;
1392 if (get_user_s32(sockfd
, vptr
)
1393 || get_user_ual(target_addr
, vptr
+ n
)
1394 || get_user_u32(target_addrlen
, vptr
+ 2 * n
))
1395 return -TARGET_EFAULT
;
1397 ret
= do_getsockname(sockfd
, target_addr
, target_addrlen
);
1400 case SOCKOP_getpeername
:
1403 abi_ulong target_addr
, target_addrlen
;
1405 if (get_user_s32(sockfd
, vptr
)
1406 || get_user_ual(target_addr
, vptr
+ n
)
1407 || get_user_u32(target_addrlen
, vptr
+ 2 * n
))
1408 return -TARGET_EFAULT
;
1410 ret
= do_getpeername(sockfd
, target_addr
, target_addrlen
);
1413 case SOCKOP_socketpair
:
1415 int domain
, type
, protocol
;
1418 if (get_user_s32(domain
, vptr
)
1419 || get_user_s32(type
, vptr
+ n
)
1420 || get_user_s32(protocol
, vptr
+ 2 * n
)
1421 || get_user_ual(tab
, vptr
+ 3 * n
))
1422 return -TARGET_EFAULT
;
1424 ret
= do_socketpair(domain
, type
, protocol
, tab
);
1434 if (get_user_s32(sockfd
, vptr
)
1435 || get_user_ual(msg
, vptr
+ n
)
1436 || get_user_ual(len
, vptr
+ 2 * n
)
1437 || get_user_s32(flags
, vptr
+ 3 * n
))
1438 return -TARGET_EFAULT
;
1440 ret
= do_sendto(sockfd
, msg
, len
, flags
, 0, 0);
1450 if (get_user_s32(sockfd
, vptr
)
1451 || get_user_ual(msg
, vptr
+ n
)
1452 || get_user_ual(len
, vptr
+ 2 * n
)
1453 || get_user_s32(flags
, vptr
+ 3 * n
))
1454 return -TARGET_EFAULT
;
1456 ret
= do_recvfrom(sockfd
, msg
, len
, flags
, 0, 0);
1468 if (get_user_s32(sockfd
, vptr
)
1469 || get_user_ual(msg
, vptr
+ n
)
1470 || get_user_ual(len
, vptr
+ 2 * n
)
1471 || get_user_s32(flags
, vptr
+ 3 * n
)
1472 || get_user_ual(addr
, vptr
+ 4 * n
)
1473 || get_user_u32(addrlen
, vptr
+ 5 * n
))
1474 return -TARGET_EFAULT
;
1476 ret
= do_sendto(sockfd
, msg
, len
, flags
, addr
, addrlen
);
1479 case SOCKOP_recvfrom
:
1488 if (get_user_s32(sockfd
, vptr
)
1489 || get_user_ual(msg
, vptr
+ n
)
1490 || get_user_ual(len
, vptr
+ 2 * n
)
1491 || get_user_s32(flags
, vptr
+ 3 * n
)
1492 || get_user_ual(addr
, vptr
+ 4 * n
)
1493 || get_user_u32(addrlen
, vptr
+ 5 * n
))
1494 return -TARGET_EFAULT
;
1496 ret
= do_recvfrom(sockfd
, msg
, len
, flags
, addr
, addrlen
);
1499 case SOCKOP_shutdown
:
1503 if (get_user_s32(sockfd
, vptr
)
1504 || get_user_s32(how
, vptr
+ n
))
1505 return -TARGET_EFAULT
;
1507 ret
= get_errno(shutdown(sockfd
, how
));
1510 case SOCKOP_sendmsg
:
1511 case SOCKOP_recvmsg
:
1514 abi_ulong target_msg
;
1517 if (get_user_s32(fd
, vptr
)
1518 || get_user_ual(target_msg
, vptr
+ n
)
1519 || get_user_s32(flags
, vptr
+ 2 * n
))
1520 return -TARGET_EFAULT
;
1522 ret
= do_sendrecvmsg(fd
, target_msg
, flags
,
1523 (num
== SOCKOP_sendmsg
));
1526 case SOCKOP_setsockopt
:
1534 if (get_user_s32(sockfd
, vptr
)
1535 || get_user_s32(level
, vptr
+ n
)
1536 || get_user_s32(optname
, vptr
+ 2 * n
)
1537 || get_user_ual(optval
, vptr
+ 3 * n
)
1538 || get_user_u32(optlen
, vptr
+ 4 * n
))
1539 return -TARGET_EFAULT
;
1541 ret
= do_setsockopt(sockfd
, level
, optname
, optval
, optlen
);
1544 case SOCKOP_getsockopt
:
1552 if (get_user_s32(sockfd
, vptr
)
1553 || get_user_s32(level
, vptr
+ n
)
1554 || get_user_s32(optname
, vptr
+ 2 * n
)
1555 || get_user_ual(optval
, vptr
+ 3 * n
)
1556 || get_user_u32(optlen
, vptr
+ 4 * n
))
1557 return -TARGET_EFAULT
;
1559 ret
= do_getsockopt(sockfd
, level
, optname
, optval
, optlen
);
1563 gemu_log("Unsupported socketcall: %d\n", num
);
1564 ret
= -TARGET_ENOSYS
;
1571 #ifdef TARGET_NR_ipc
1572 #define N_SHM_REGIONS 32
1574 static struct shm_region
{
1577 } shm_regions
[N_SHM_REGIONS
];
1579 struct target_ipc_perm
1586 unsigned short int mode
;
1587 unsigned short int __pad1
;
1588 unsigned short int __seq
;
1589 unsigned short int __pad2
;
1590 abi_ulong __unused1
;
1591 abi_ulong __unused2
;
1594 struct target_semid_ds
1596 struct target_ipc_perm sem_perm
;
1597 abi_ulong sem_otime
;
1598 abi_ulong __unused1
;
1599 abi_ulong sem_ctime
;
1600 abi_ulong __unused2
;
1601 abi_ulong sem_nsems
;
1602 abi_ulong __unused3
;
1603 abi_ulong __unused4
;
1606 static inline abi_long
target_to_host_ipc_perm(struct ipc_perm
*host_ip
,
1607 abi_ulong target_addr
)
1609 struct target_ipc_perm
*target_ip
;
1610 struct target_semid_ds
*target_sd
;
1612 if (!lock_user_struct(VERIFY_READ
, target_sd
, target_addr
, 1))
1613 return -TARGET_EFAULT
;
1614 target_ip
=&(target_sd
->sem_perm
);
1615 host_ip
->__key
= tswapl(target_ip
->__key
);
1616 host_ip
->uid
= tswapl(target_ip
->uid
);
1617 host_ip
->gid
= tswapl(target_ip
->gid
);
1618 host_ip
->cuid
= tswapl(target_ip
->cuid
);
1619 host_ip
->cgid
= tswapl(target_ip
->cgid
);
1620 host_ip
->mode
= tswapl(target_ip
->mode
);
1621 unlock_user_struct(target_sd
, target_addr
, 0);
1625 static inline abi_long
host_to_target_ipc_perm(abi_ulong target_addr
,
1626 struct ipc_perm
*host_ip
)
1628 struct target_ipc_perm
*target_ip
;
1629 struct target_semid_ds
*target_sd
;
1631 if (!lock_user_struct(VERIFY_WRITE
, target_sd
, target_addr
, 0))
1632 return -TARGET_EFAULT
;
1633 target_ip
= &(target_sd
->sem_perm
);
1634 target_ip
->__key
= tswapl(host_ip
->__key
);
1635 target_ip
->uid
= tswapl(host_ip
->uid
);
1636 target_ip
->gid
= tswapl(host_ip
->gid
);
1637 target_ip
->cuid
= tswapl(host_ip
->cuid
);
1638 target_ip
->cgid
= tswapl(host_ip
->cgid
);
1639 target_ip
->mode
= tswapl(host_ip
->mode
);
1640 unlock_user_struct(target_sd
, target_addr
, 1);
1644 static inline abi_long
target_to_host_semid_ds(struct semid_ds
*host_sd
,
1645 abi_ulong target_addr
)
1647 struct target_semid_ds
*target_sd
;
1649 if (!lock_user_struct(VERIFY_READ
, target_sd
, target_addr
, 1))
1650 return -TARGET_EFAULT
;
1651 target_to_host_ipc_perm(&(host_sd
->sem_perm
),target_addr
);
1652 host_sd
->sem_nsems
= tswapl(target_sd
->sem_nsems
);
1653 host_sd
->sem_otime
= tswapl(target_sd
->sem_otime
);
1654 host_sd
->sem_ctime
= tswapl(target_sd
->sem_ctime
);
1655 unlock_user_struct(target_sd
, target_addr
, 0);
1659 static inline abi_long
host_to_target_semid_ds(abi_ulong target_addr
,
1660 struct semid_ds
*host_sd
)
1662 struct target_semid_ds
*target_sd
;
1664 if (!lock_user_struct(VERIFY_WRITE
, target_sd
, target_addr
, 0))
1665 return -TARGET_EFAULT
;
1666 host_to_target_ipc_perm(target_addr
,&(host_sd
->sem_perm
));
1667 target_sd
->sem_nsems
= tswapl(host_sd
->sem_nsems
);
1668 target_sd
->sem_otime
= tswapl(host_sd
->sem_otime
);
1669 target_sd
->sem_ctime
= tswapl(host_sd
->sem_ctime
);
1670 unlock_user_struct(target_sd
, target_addr
, 1);
1676 struct semid_ds
*buf
;
1677 unsigned short *array
;
1680 union target_semun
{
1683 unsigned short int *array
;
1686 static inline abi_long
target_to_host_semun(int cmd
,
1687 union semun
*host_su
,
1688 abi_ulong target_addr
,
1689 struct semid_ds
*ds
)
1691 union target_semun
*target_su
;
1696 if (!lock_user_struct(VERIFY_READ
, target_su
, target_addr
, 1))
1697 return -TARGET_EFAULT
;
1698 target_to_host_semid_ds(ds
,target_su
->buf
);
1700 unlock_user_struct(target_su
, target_addr
, 0);
1704 if (!lock_user_struct(VERIFY_READ
, target_su
, target_addr
, 1))
1705 return -TARGET_EFAULT
;
1706 host_su
->val
= tswapl(target_su
->val
);
1707 unlock_user_struct(target_su
, target_addr
, 0);
1711 if (!lock_user_struct(VERIFY_READ
, target_su
, target_addr
, 1))
1712 return -TARGET_EFAULT
;
1713 *host_su
->array
= tswap16(*target_su
->array
);
1714 unlock_user_struct(target_su
, target_addr
, 0);
1717 gemu_log("semun operation not fully supported: %d\n", (int)cmd
);
1722 static inline abi_long
host_to_target_semun(int cmd
,
1723 abi_ulong target_addr
,
1724 union semun
*host_su
,
1725 struct semid_ds
*ds
)
1727 union target_semun
*target_su
;
1732 if (lock_user_struct(VERIFY_WRITE
, target_su
, target_addr
, 0))
1733 return -TARGET_EFAULT
;
1734 host_to_target_semid_ds(target_su
->buf
,ds
);
1735 unlock_user_struct(target_su
, target_addr
, 1);
1739 if (lock_user_struct(VERIFY_WRITE
, target_su
, target_addr
, 0))
1740 return -TARGET_EFAULT
;
1741 target_su
->val
= tswapl(host_su
->val
);
1742 unlock_user_struct(target_su
, target_addr
, 1);
1746 if (lock_user_struct(VERIFY_WRITE
, target_su
, target_addr
, 0))
1747 return -TARGET_EFAULT
;
1748 *target_su
->array
= tswap16(*host_su
->array
);
1749 unlock_user_struct(target_su
, target_addr
, 1);
1752 gemu_log("semun operation not fully supported: %d\n", (int)cmd
);
1757 static inline abi_long
do_semctl(int first
, int second
, int third
,
1761 struct semid_ds dsarg
;
1762 int cmd
= third
&0xff;
1767 target_to_host_semun(cmd
,&arg
,ptr
,&dsarg
);
1768 ret
= get_errno(semctl(first
, second
, cmd
, arg
));
1769 host_to_target_semun(cmd
,ptr
,&arg
,&dsarg
);
1772 target_to_host_semun(cmd
,&arg
,ptr
,&dsarg
);
1773 ret
= get_errno(semctl(first
, second
, cmd
, arg
));
1774 host_to_target_semun(cmd
,ptr
,&arg
,&dsarg
);
1777 target_to_host_semun(cmd
,&arg
,ptr
,&dsarg
);
1778 ret
= get_errno(semctl(first
, second
, cmd
, arg
));
1779 host_to_target_semun(cmd
,ptr
,&arg
,&dsarg
);
1782 target_to_host_semun(cmd
,&arg
,ptr
,&dsarg
);
1783 ret
= get_errno(semctl(first
, second
, cmd
, arg
));
1784 host_to_target_semun(cmd
,ptr
,&arg
,&dsarg
);
1787 target_to_host_semun(cmd
,&arg
,ptr
,&dsarg
);
1788 ret
= get_errno(semctl(first
, second
, cmd
, arg
));
1789 host_to_target_semun(cmd
,ptr
,&arg
,&dsarg
);
1792 target_to_host_semun(cmd
,&arg
,ptr
,&dsarg
);
1793 ret
= get_errno(semctl(first
, second
, cmd
, arg
));
1794 host_to_target_semun(cmd
,ptr
,&arg
,&dsarg
);
1797 ret
= get_errno(semctl(first
, second
, cmd
, arg
));
1803 struct target_msqid_ds
1805 struct target_ipc_perm msg_perm
;
1806 abi_ulong msg_stime
;
1807 abi_ulong __unused1
;
1808 abi_ulong msg_rtime
;
1809 abi_ulong __unused2
;
1810 abi_ulong msg_ctime
;
1811 abi_ulong __unused3
;
1812 abi_ulong __msg_cbytes
;
1814 abi_ulong msg_qbytes
;
1815 abi_ulong msg_lspid
;
1816 abi_ulong msg_lrpid
;
1817 abi_ulong __unused4
;
1818 abi_ulong __unused5
;
1821 static inline abi_long
target_to_host_msqid_ds(struct msqid_ds
*host_md
,
1822 abi_ulong target_addr
)
1824 struct target_msqid_ds
*target_md
;
1826 if (!lock_user_struct(VERIFY_READ
, target_md
, target_addr
, 1))
1827 return -TARGET_EFAULT
;
1828 target_to_host_ipc_perm(&(host_md
->msg_perm
),target_addr
);
1829 host_md
->msg_stime
= tswapl(target_md
->msg_stime
);
1830 host_md
->msg_rtime
= tswapl(target_md
->msg_rtime
);
1831 host_md
->msg_ctime
= tswapl(target_md
->msg_ctime
);
1832 host_md
->__msg_cbytes
= tswapl(target_md
->__msg_cbytes
);
1833 host_md
->msg_qnum
= tswapl(target_md
->msg_qnum
);
1834 host_md
->msg_qbytes
= tswapl(target_md
->msg_qbytes
);
1835 host_md
->msg_lspid
= tswapl(target_md
->msg_lspid
);
1836 host_md
->msg_lrpid
= tswapl(target_md
->msg_lrpid
);
1837 unlock_user_struct(target_md
, target_addr
, 0);
1841 static inline abi_long
host_to_target_msqid_ds(abi_ulong target_addr
,
1842 struct msqid_ds
*host_md
)
1844 struct target_msqid_ds
*target_md
;
1846 if (!lock_user_struct(VERIFY_WRITE
, target_md
, target_addr
, 0))
1847 return -TARGET_EFAULT
;
1848 host_to_target_ipc_perm(target_addr
,&(host_md
->msg_perm
));
1849 target_md
->msg_stime
= tswapl(host_md
->msg_stime
);
1850 target_md
->msg_rtime
= tswapl(host_md
->msg_rtime
);
1851 target_md
->msg_ctime
= tswapl(host_md
->msg_ctime
);
1852 target_md
->__msg_cbytes
= tswapl(host_md
->__msg_cbytes
);
1853 target_md
->msg_qnum
= tswapl(host_md
->msg_qnum
);
1854 target_md
->msg_qbytes
= tswapl(host_md
->msg_qbytes
);
1855 target_md
->msg_lspid
= tswapl(host_md
->msg_lspid
);
1856 target_md
->msg_lrpid
= tswapl(host_md
->msg_lrpid
);
1857 unlock_user_struct(target_md
, target_addr
, 1);
1861 static inline abi_long
do_msgctl(int first
, int second
, abi_long ptr
)
1863 struct msqid_ds dsarg
;
1864 int cmd
= second
&0xff;
1869 target_to_host_msqid_ds(&dsarg
,ptr
);
1870 ret
= get_errno(msgctl(first
, cmd
, &dsarg
));
1871 host_to_target_msqid_ds(ptr
,&dsarg
);
1873 ret
= get_errno(msgctl(first
, cmd
, &dsarg
));
1878 struct target_msgbuf
{
1883 static inline abi_long
do_msgsnd(int msqid
, abi_long msgp
,
1884 unsigned int msgsz
, int msgflg
)
1886 struct target_msgbuf
*target_mb
;
1887 struct msgbuf
*host_mb
;
1890 if (!lock_user_struct(VERIFY_READ
, target_mb
, msgp
, 0))
1891 return -TARGET_EFAULT
;
1892 host_mb
= malloc(msgsz
+sizeof(long));
1893 host_mb
->mtype
= tswapl(target_mb
->mtype
);
1894 memcpy(host_mb
->mtext
,target_mb
->mtext
,msgsz
);
1895 ret
= get_errno(msgsnd(msqid
, host_mb
, msgsz
, msgflg
));
1897 unlock_user_struct(target_mb
, msgp
, 0);
1902 static inline abi_long
do_msgrcv(int msqid
, abi_long msgp
,
1903 unsigned int msgsz
, int msgtype
,
1906 struct target_msgbuf
*target_mb
;
1908 struct msgbuf
*host_mb
;
1911 if (!lock_user_struct(VERIFY_WRITE
, target_mb
, msgp
, 0))
1912 return -TARGET_EFAULT
;
1913 host_mb
= malloc(msgsz
+sizeof(long));
1914 ret
= get_errno(msgrcv(msqid
, host_mb
, msgsz
, 1, msgflg
));
1916 abi_ulong target_mtext_addr
= msgp
+ sizeof(abi_ulong
);
1917 target_mtext
= lock_user(VERIFY_WRITE
, target_mtext_addr
, ret
, 0);
1918 if (!target_mtext
) {
1919 ret
= -TARGET_EFAULT
;
1922 memcpy(target_mb
->mtext
, host_mb
->mtext
, ret
);
1923 unlock_user(target_mtext
, target_mtext_addr
, ret
);
1925 target_mb
->mtype
= tswapl(host_mb
->mtype
);
1930 unlock_user_struct(target_mb
, msgp
, 1);
1934 /* ??? This only works with linear mappings. */
1935 /* do_ipc() must return target values and target errnos. */
1936 static abi_long
do_ipc(unsigned int call
, int first
,
1937 int second
, int third
,
1938 abi_long ptr
, abi_long fifth
)
1942 struct shmid_ds shm_info
;
1945 version
= call
>> 16;
1950 ret
= get_errno(semop(first
,(struct sembuf
*)g2h(ptr
), second
));
1954 ret
= get_errno(semget(first
, second
, third
));
1958 ret
= do_semctl(first
, second
, third
, ptr
);
1961 case IPCOP_semtimedop
:
1962 gemu_log("Unsupported ipc call: %d (version %d)\n", call
, version
);
1963 ret
= -TARGET_ENOSYS
;
1967 ret
= get_errno(msgget(first
, second
));
1971 ret
= do_msgsnd(first
, ptr
, second
, third
);
1975 ret
= do_msgctl(first
, second
, ptr
);
1980 /* XXX: this code is not correct */
1983 void *__unbounded msgp
;
1987 struct ipc_kludge
*foo
= (struct ipc_kludge
*)g2h(ptr
);
1988 struct msgbuf
*msgp
= (struct msgbuf
*) foo
->msgp
;
1990 ret
= do_msgrcv(first
, (long)msgp
, second
, 0, third
);
1999 /* SHM_* flags are the same on all linux platforms */
2000 host_addr
= shmat(first
, (void *)g2h(ptr
), second
);
2001 if (host_addr
== (void *)-1) {
2002 ret
= get_errno((long)host_addr
);
2005 raddr
= h2g((unsigned long)host_addr
);
2006 /* find out the length of the shared memory segment */
2008 ret
= get_errno(shmctl(first
, IPC_STAT
, &shm_info
));
2009 if (is_error(ret
)) {
2010 /* can't get length, bail out */
2014 page_set_flags(raddr
, raddr
+ shm_info
.shm_segsz
,
2015 PAGE_VALID
| PAGE_READ
|
2016 ((second
& SHM_RDONLY
)? 0: PAGE_WRITE
));
2017 for (i
= 0; i
< N_SHM_REGIONS
; ++i
) {
2018 if (shm_regions
[i
].start
== 0) {
2019 shm_regions
[i
].start
= raddr
;
2020 shm_regions
[i
].size
= shm_info
.shm_segsz
;
2024 if (put_user_ual(raddr
, third
))
2025 return -TARGET_EFAULT
;
2030 for (i
= 0; i
< N_SHM_REGIONS
; ++i
) {
2031 if (shm_regions
[i
].start
== ptr
) {
2032 shm_regions
[i
].start
= 0;
2033 page_set_flags(ptr
, shm_regions
[i
].size
, 0);
2037 ret
= get_errno(shmdt((void *)g2h(ptr
)));
2041 /* IPC_* flag values are the same on all linux platforms */
2042 ret
= get_errno(shmget(first
, second
, third
));
2045 /* IPC_* and SHM_* command values are the same on all linux platforms */
2051 ret
= get_errno(shmctl(first
, second
, NULL
));
2059 gemu_log("Unsupported ipc call: %d (version %d)\n", call
, version
);
2060 ret
= -TARGET_ENOSYS
;
2067 /* kernel structure types definitions */
2070 #define STRUCT(name, list...) STRUCT_ ## name,
2071 #define STRUCT_SPECIAL(name) STRUCT_ ## name,
2073 #include "syscall_types.h"
2076 #undef STRUCT_SPECIAL
2078 #define STRUCT(name, list...) const argtype struct_ ## name ## _def[] = { list, TYPE_NULL };
2079 #define STRUCT_SPECIAL(name)
2080 #include "syscall_types.h"
2082 #undef STRUCT_SPECIAL
2084 typedef struct IOCTLEntry
{
2085 unsigned int target_cmd
;
2086 unsigned int host_cmd
;
2089 const argtype arg_type
[5];
2092 #define IOC_R 0x0001
2093 #define IOC_W 0x0002
2094 #define IOC_RW (IOC_R | IOC_W)
2096 #define MAX_STRUCT_SIZE 4096
2098 IOCTLEntry ioctl_entries
[] = {
2099 #define IOCTL(cmd, access, types...) \
2100 { TARGET_ ## cmd, cmd, #cmd, access, { types } },
2105 /* ??? Implement proper locking for ioctls. */
2106 /* do_ioctl() Must return target values and target errnos. */
2107 static abi_long
do_ioctl(int fd
, abi_long cmd
, abi_long arg
)
2109 const IOCTLEntry
*ie
;
2110 const argtype
*arg_type
;
2112 uint8_t buf_temp
[MAX_STRUCT_SIZE
];
2118 if (ie
->target_cmd
== 0) {
2119 gemu_log("Unsupported ioctl: cmd=0x%04lx\n", (long)cmd
);
2120 return -TARGET_ENOSYS
;
2122 if (ie
->target_cmd
== cmd
)
2126 arg_type
= ie
->arg_type
;
2128 gemu_log("ioctl: cmd=0x%04lx (%s)\n", (long)cmd
, ie
->name
);
2130 switch(arg_type
[0]) {
2133 ret
= get_errno(ioctl(fd
, ie
->host_cmd
));
2138 ret
= get_errno(ioctl(fd
, ie
->host_cmd
, arg
));
2142 target_size
= thunk_type_size(arg_type
, 0);
2143 switch(ie
->access
) {
2145 ret
= get_errno(ioctl(fd
, ie
->host_cmd
, buf_temp
));
2146 if (!is_error(ret
)) {
2147 argptr
= lock_user(VERIFY_WRITE
, arg
, target_size
, 0);
2149 return -TARGET_EFAULT
;
2150 thunk_convert(argptr
, buf_temp
, arg_type
, THUNK_TARGET
);
2151 unlock_user(argptr
, arg
, target_size
);
2155 argptr
= lock_user(VERIFY_READ
, arg
, target_size
, 1);
2157 return -TARGET_EFAULT
;
2158 thunk_convert(buf_temp
, argptr
, arg_type
, THUNK_HOST
);
2159 unlock_user(argptr
, arg
, 0);
2160 ret
= get_errno(ioctl(fd
, ie
->host_cmd
, buf_temp
));
2164 argptr
= lock_user(VERIFY_READ
, arg
, target_size
, 1);
2166 return -TARGET_EFAULT
;
2167 thunk_convert(buf_temp
, argptr
, arg_type
, THUNK_HOST
);
2168 unlock_user(argptr
, arg
, 0);
2169 ret
= get_errno(ioctl(fd
, ie
->host_cmd
, buf_temp
));
2170 if (!is_error(ret
)) {
2171 argptr
= lock_user(VERIFY_WRITE
, arg
, target_size
, 0);
2173 return -TARGET_EFAULT
;
2174 thunk_convert(argptr
, buf_temp
, arg_type
, THUNK_TARGET
);
2175 unlock_user(argptr
, arg
, target_size
);
2181 gemu_log("Unsupported ioctl type: cmd=0x%04lx type=%d\n",
2182 (long)cmd
, arg_type
[0]);
2183 ret
= -TARGET_ENOSYS
;
2189 bitmask_transtbl iflag_tbl
[] = {
2190 { TARGET_IGNBRK
, TARGET_IGNBRK
, IGNBRK
, IGNBRK
},
2191 { TARGET_BRKINT
, TARGET_BRKINT
, BRKINT
, BRKINT
},
2192 { TARGET_IGNPAR
, TARGET_IGNPAR
, IGNPAR
, IGNPAR
},
2193 { TARGET_PARMRK
, TARGET_PARMRK
, PARMRK
, PARMRK
},
2194 { TARGET_INPCK
, TARGET_INPCK
, INPCK
, INPCK
},
2195 { TARGET_ISTRIP
, TARGET_ISTRIP
, ISTRIP
, ISTRIP
},
2196 { TARGET_INLCR
, TARGET_INLCR
, INLCR
, INLCR
},
2197 { TARGET_IGNCR
, TARGET_IGNCR
, IGNCR
, IGNCR
},
2198 { TARGET_ICRNL
, TARGET_ICRNL
, ICRNL
, ICRNL
},
2199 { TARGET_IUCLC
, TARGET_IUCLC
, IUCLC
, IUCLC
},
2200 { TARGET_IXON
, TARGET_IXON
, IXON
, IXON
},
2201 { TARGET_IXANY
, TARGET_IXANY
, IXANY
, IXANY
},
2202 { TARGET_IXOFF
, TARGET_IXOFF
, IXOFF
, IXOFF
},
2203 { TARGET_IMAXBEL
, TARGET_IMAXBEL
, IMAXBEL
, IMAXBEL
},
2207 bitmask_transtbl oflag_tbl
[] = {
2208 { TARGET_OPOST
, TARGET_OPOST
, OPOST
, OPOST
},
2209 { TARGET_OLCUC
, TARGET_OLCUC
, OLCUC
, OLCUC
},
2210 { TARGET_ONLCR
, TARGET_ONLCR
, ONLCR
, ONLCR
},
2211 { TARGET_OCRNL
, TARGET_OCRNL
, OCRNL
, OCRNL
},
2212 { TARGET_ONOCR
, TARGET_ONOCR
, ONOCR
, ONOCR
},
2213 { TARGET_ONLRET
, TARGET_ONLRET
, ONLRET
, ONLRET
},
2214 { TARGET_OFILL
, TARGET_OFILL
, OFILL
, OFILL
},
2215 { TARGET_OFDEL
, TARGET_OFDEL
, OFDEL
, OFDEL
},
2216 { TARGET_NLDLY
, TARGET_NL0
, NLDLY
, NL0
},
2217 { TARGET_NLDLY
, TARGET_NL1
, NLDLY
, NL1
},
2218 { TARGET_CRDLY
, TARGET_CR0
, CRDLY
, CR0
},
2219 { TARGET_CRDLY
, TARGET_CR1
, CRDLY
, CR1
},
2220 { TARGET_CRDLY
, TARGET_CR2
, CRDLY
, CR2
},
2221 { TARGET_CRDLY
, TARGET_CR3
, CRDLY
, CR3
},
2222 { TARGET_TABDLY
, TARGET_TAB0
, TABDLY
, TAB0
},
2223 { TARGET_TABDLY
, TARGET_TAB1
, TABDLY
, TAB1
},
2224 { TARGET_TABDLY
, TARGET_TAB2
, TABDLY
, TAB2
},
2225 { TARGET_TABDLY
, TARGET_TAB3
, TABDLY
, TAB3
},
2226 { TARGET_BSDLY
, TARGET_BS0
, BSDLY
, BS0
},
2227 { TARGET_BSDLY
, TARGET_BS1
, BSDLY
, BS1
},
2228 { TARGET_VTDLY
, TARGET_VT0
, VTDLY
, VT0
},
2229 { TARGET_VTDLY
, TARGET_VT1
, VTDLY
, VT1
},
2230 { TARGET_FFDLY
, TARGET_FF0
, FFDLY
, FF0
},
2231 { TARGET_FFDLY
, TARGET_FF1
, FFDLY
, FF1
},
2235 bitmask_transtbl cflag_tbl
[] = {
2236 { TARGET_CBAUD
, TARGET_B0
, CBAUD
, B0
},
2237 { TARGET_CBAUD
, TARGET_B50
, CBAUD
, B50
},
2238 { TARGET_CBAUD
, TARGET_B75
, CBAUD
, B75
},
2239 { TARGET_CBAUD
, TARGET_B110
, CBAUD
, B110
},
2240 { TARGET_CBAUD
, TARGET_B134
, CBAUD
, B134
},
2241 { TARGET_CBAUD
, TARGET_B150
, CBAUD
, B150
},
2242 { TARGET_CBAUD
, TARGET_B200
, CBAUD
, B200
},
2243 { TARGET_CBAUD
, TARGET_B300
, CBAUD
, B300
},
2244 { TARGET_CBAUD
, TARGET_B600
, CBAUD
, B600
},
2245 { TARGET_CBAUD
, TARGET_B1200
, CBAUD
, B1200
},
2246 { TARGET_CBAUD
, TARGET_B1800
, CBAUD
, B1800
},
2247 { TARGET_CBAUD
, TARGET_B2400
, CBAUD
, B2400
},
2248 { TARGET_CBAUD
, TARGET_B4800
, CBAUD
, B4800
},
2249 { TARGET_CBAUD
, TARGET_B9600
, CBAUD
, B9600
},
2250 { TARGET_CBAUD
, TARGET_B19200
, CBAUD
, B19200
},
2251 { TARGET_CBAUD
, TARGET_B38400
, CBAUD
, B38400
},
2252 { TARGET_CBAUD
, TARGET_B57600
, CBAUD
, B57600
},
2253 { TARGET_CBAUD
, TARGET_B115200
, CBAUD
, B115200
},
2254 { TARGET_CBAUD
, TARGET_B230400
, CBAUD
, B230400
},
2255 { TARGET_CBAUD
, TARGET_B460800
, CBAUD
, B460800
},
2256 { TARGET_CSIZE
, TARGET_CS5
, CSIZE
, CS5
},
2257 { TARGET_CSIZE
, TARGET_CS6
, CSIZE
, CS6
},
2258 { TARGET_CSIZE
, TARGET_CS7
, CSIZE
, CS7
},
2259 { TARGET_CSIZE
, TARGET_CS8
, CSIZE
, CS8
},
2260 { TARGET_CSTOPB
, TARGET_CSTOPB
, CSTOPB
, CSTOPB
},
2261 { TARGET_CREAD
, TARGET_CREAD
, CREAD
, CREAD
},
2262 { TARGET_PARENB
, TARGET_PARENB
, PARENB
, PARENB
},
2263 { TARGET_PARODD
, TARGET_PARODD
, PARODD
, PARODD
},
2264 { TARGET_HUPCL
, TARGET_HUPCL
, HUPCL
, HUPCL
},
2265 { TARGET_CLOCAL
, TARGET_CLOCAL
, CLOCAL
, CLOCAL
},
2266 { TARGET_CRTSCTS
, TARGET_CRTSCTS
, CRTSCTS
, CRTSCTS
},
2270 bitmask_transtbl lflag_tbl
[] = {
2271 { TARGET_ISIG
, TARGET_ISIG
, ISIG
, ISIG
},
2272 { TARGET_ICANON
, TARGET_ICANON
, ICANON
, ICANON
},
2273 { TARGET_XCASE
, TARGET_XCASE
, XCASE
, XCASE
},
2274 { TARGET_ECHO
, TARGET_ECHO
, ECHO
, ECHO
},
2275 { TARGET_ECHOE
, TARGET_ECHOE
, ECHOE
, ECHOE
},
2276 { TARGET_ECHOK
, TARGET_ECHOK
, ECHOK
, ECHOK
},
2277 { TARGET_ECHONL
, TARGET_ECHONL
, ECHONL
, ECHONL
},
2278 { TARGET_NOFLSH
, TARGET_NOFLSH
, NOFLSH
, NOFLSH
},
2279 { TARGET_TOSTOP
, TARGET_TOSTOP
, TOSTOP
, TOSTOP
},
2280 { TARGET_ECHOCTL
, TARGET_ECHOCTL
, ECHOCTL
, ECHOCTL
},
2281 { TARGET_ECHOPRT
, TARGET_ECHOPRT
, ECHOPRT
, ECHOPRT
},
2282 { TARGET_ECHOKE
, TARGET_ECHOKE
, ECHOKE
, ECHOKE
},
2283 { TARGET_FLUSHO
, TARGET_FLUSHO
, FLUSHO
, FLUSHO
},
2284 { TARGET_PENDIN
, TARGET_PENDIN
, PENDIN
, PENDIN
},
2285 { TARGET_IEXTEN
, TARGET_IEXTEN
, IEXTEN
, IEXTEN
},
2289 static void target_to_host_termios (void *dst
, const void *src
)
2291 struct host_termios
*host
= dst
;
2292 const struct target_termios
*target
= src
;
2295 target_to_host_bitmask(tswap32(target
->c_iflag
), iflag_tbl
);
2297 target_to_host_bitmask(tswap32(target
->c_oflag
), oflag_tbl
);
2299 target_to_host_bitmask(tswap32(target
->c_cflag
), cflag_tbl
);
2301 target_to_host_bitmask(tswap32(target
->c_lflag
), lflag_tbl
);
2302 host
->c_line
= target
->c_line
;
2304 host
->c_cc
[VINTR
] = target
->c_cc
[TARGET_VINTR
];
2305 host
->c_cc
[VQUIT
] = target
->c_cc
[TARGET_VQUIT
];
2306 host
->c_cc
[VERASE
] = target
->c_cc
[TARGET_VERASE
];
2307 host
->c_cc
[VKILL
] = target
->c_cc
[TARGET_VKILL
];
2308 host
->c_cc
[VEOF
] = target
->c_cc
[TARGET_VEOF
];
2309 host
->c_cc
[VTIME
] = target
->c_cc
[TARGET_VTIME
];
2310 host
->c_cc
[VMIN
] = target
->c_cc
[TARGET_VMIN
];
2311 host
->c_cc
[VSWTC
] = target
->c_cc
[TARGET_VSWTC
];
2312 host
->c_cc
[VSTART
] = target
->c_cc
[TARGET_VSTART
];
2313 host
->c_cc
[VSTOP
] = target
->c_cc
[TARGET_VSTOP
];
2314 host
->c_cc
[VSUSP
] = target
->c_cc
[TARGET_VSUSP
];
2315 host
->c_cc
[VEOL
] = target
->c_cc
[TARGET_VEOL
];
2316 host
->c_cc
[VREPRINT
] = target
->c_cc
[TARGET_VREPRINT
];
2317 host
->c_cc
[VDISCARD
] = target
->c_cc
[TARGET_VDISCARD
];
2318 host
->c_cc
[VWERASE
] = target
->c_cc
[TARGET_VWERASE
];
2319 host
->c_cc
[VLNEXT
] = target
->c_cc
[TARGET_VLNEXT
];
2320 host
->c_cc
[VEOL2
] = target
->c_cc
[TARGET_VEOL2
];
2323 static void host_to_target_termios (void *dst
, const void *src
)
2325 struct target_termios
*target
= dst
;
2326 const struct host_termios
*host
= src
;
2329 tswap32(host_to_target_bitmask(host
->c_iflag
, iflag_tbl
));
2331 tswap32(host_to_target_bitmask(host
->c_oflag
, oflag_tbl
));
2333 tswap32(host_to_target_bitmask(host
->c_cflag
, cflag_tbl
));
2335 tswap32(host_to_target_bitmask(host
->c_lflag
, lflag_tbl
));
2336 target
->c_line
= host
->c_line
;
2338 target
->c_cc
[TARGET_VINTR
] = host
->c_cc
[VINTR
];
2339 target
->c_cc
[TARGET_VQUIT
] = host
->c_cc
[VQUIT
];
2340 target
->c_cc
[TARGET_VERASE
] = host
->c_cc
[VERASE
];
2341 target
->c_cc
[TARGET_VKILL
] = host
->c_cc
[VKILL
];
2342 target
->c_cc
[TARGET_VEOF
] = host
->c_cc
[VEOF
];
2343 target
->c_cc
[TARGET_VTIME
] = host
->c_cc
[VTIME
];
2344 target
->c_cc
[TARGET_VMIN
] = host
->c_cc
[VMIN
];
2345 target
->c_cc
[TARGET_VSWTC
] = host
->c_cc
[VSWTC
];
2346 target
->c_cc
[TARGET_VSTART
] = host
->c_cc
[VSTART
];
2347 target
->c_cc
[TARGET_VSTOP
] = host
->c_cc
[VSTOP
];
2348 target
->c_cc
[TARGET_VSUSP
] = host
->c_cc
[VSUSP
];
2349 target
->c_cc
[TARGET_VEOL
] = host
->c_cc
[VEOL
];
2350 target
->c_cc
[TARGET_VREPRINT
] = host
->c_cc
[VREPRINT
];
2351 target
->c_cc
[TARGET_VDISCARD
] = host
->c_cc
[VDISCARD
];
2352 target
->c_cc
[TARGET_VWERASE
] = host
->c_cc
[VWERASE
];
2353 target
->c_cc
[TARGET_VLNEXT
] = host
->c_cc
[VLNEXT
];
2354 target
->c_cc
[TARGET_VEOL2
] = host
->c_cc
[VEOL2
];
2357 StructEntry struct_termios_def
= {
2358 .convert
= { host_to_target_termios
, target_to_host_termios
},
2359 .size
= { sizeof(struct target_termios
), sizeof(struct host_termios
) },
2360 .align
= { __alignof__(struct target_termios
), __alignof__(struct host_termios
) },
2363 static bitmask_transtbl mmap_flags_tbl
[] = {
2364 { TARGET_MAP_SHARED
, TARGET_MAP_SHARED
, MAP_SHARED
, MAP_SHARED
},
2365 { TARGET_MAP_PRIVATE
, TARGET_MAP_PRIVATE
, MAP_PRIVATE
, MAP_PRIVATE
},
2366 { TARGET_MAP_FIXED
, TARGET_MAP_FIXED
, MAP_FIXED
, MAP_FIXED
},
2367 { TARGET_MAP_ANONYMOUS
, TARGET_MAP_ANONYMOUS
, MAP_ANONYMOUS
, MAP_ANONYMOUS
},
2368 { TARGET_MAP_GROWSDOWN
, TARGET_MAP_GROWSDOWN
, MAP_GROWSDOWN
, MAP_GROWSDOWN
},
2369 { TARGET_MAP_DENYWRITE
, TARGET_MAP_DENYWRITE
, MAP_DENYWRITE
, MAP_DENYWRITE
},
2370 { TARGET_MAP_EXECUTABLE
, TARGET_MAP_EXECUTABLE
, MAP_EXECUTABLE
, MAP_EXECUTABLE
},
2371 { TARGET_MAP_LOCKED
, TARGET_MAP_LOCKED
, MAP_LOCKED
, MAP_LOCKED
},
2375 static bitmask_transtbl fcntl_flags_tbl
[] = {
2376 { TARGET_O_ACCMODE
, TARGET_O_WRONLY
, O_ACCMODE
, O_WRONLY
, },
2377 { TARGET_O_ACCMODE
, TARGET_O_RDWR
, O_ACCMODE
, O_RDWR
, },
2378 { TARGET_O_CREAT
, TARGET_O_CREAT
, O_CREAT
, O_CREAT
, },
2379 { TARGET_O_EXCL
, TARGET_O_EXCL
, O_EXCL
, O_EXCL
, },
2380 { TARGET_O_NOCTTY
, TARGET_O_NOCTTY
, O_NOCTTY
, O_NOCTTY
, },
2381 { TARGET_O_TRUNC
, TARGET_O_TRUNC
, O_TRUNC
, O_TRUNC
, },
2382 { TARGET_O_APPEND
, TARGET_O_APPEND
, O_APPEND
, O_APPEND
, },
2383 { TARGET_O_NONBLOCK
, TARGET_O_NONBLOCK
, O_NONBLOCK
, O_NONBLOCK
, },
2384 { TARGET_O_SYNC
, TARGET_O_SYNC
, O_SYNC
, O_SYNC
, },
2385 { TARGET_FASYNC
, TARGET_FASYNC
, FASYNC
, FASYNC
, },
2386 { TARGET_O_DIRECTORY
, TARGET_O_DIRECTORY
, O_DIRECTORY
, O_DIRECTORY
, },
2387 { TARGET_O_NOFOLLOW
, TARGET_O_NOFOLLOW
, O_NOFOLLOW
, O_NOFOLLOW
, },
2388 { TARGET_O_LARGEFILE
, TARGET_O_LARGEFILE
, O_LARGEFILE
, O_LARGEFILE
, },
2389 #if defined(O_DIRECT)
2390 { TARGET_O_DIRECT
, TARGET_O_DIRECT
, O_DIRECT
, O_DIRECT
, },
2395 #if defined(TARGET_I386)
2397 /* NOTE: there is really one LDT for all the threads */
2400 static abi_long
read_ldt(abi_ulong ptr
, unsigned long bytecount
)
2407 size
= TARGET_LDT_ENTRIES
* TARGET_LDT_ENTRY_SIZE
;
2408 if (size
> bytecount
)
2410 p
= lock_user(VERIFY_WRITE
, ptr
, size
, 0);
2412 return -TARGET_EFAULT
;
2413 /* ??? Should this by byteswapped? */
2414 memcpy(p
, ldt_table
, size
);
2415 unlock_user(p
, ptr
, size
);
2419 /* XXX: add locking support */
2420 static abi_long
write_ldt(CPUX86State
*env
,
2421 abi_ulong ptr
, unsigned long bytecount
, int oldmode
)
2423 struct target_modify_ldt_ldt_s ldt_info
;
2424 struct target_modify_ldt_ldt_s
*target_ldt_info
;
2425 int seg_32bit
, contents
, read_exec_only
, limit_in_pages
;
2426 int seg_not_present
, useable
, lm
;
2427 uint32_t *lp
, entry_1
, entry_2
;
2429 if (bytecount
!= sizeof(ldt_info
))
2430 return -TARGET_EINVAL
;
2431 if (!lock_user_struct(VERIFY_READ
, target_ldt_info
, ptr
, 1))
2432 return -TARGET_EFAULT
;
2433 ldt_info
.entry_number
= tswap32(target_ldt_info
->entry_number
);
2434 ldt_info
.base_addr
= tswapl(target_ldt_info
->base_addr
);
2435 ldt_info
.limit
= tswap32(target_ldt_info
->limit
);
2436 ldt_info
.flags
= tswap32(target_ldt_info
->flags
);
2437 unlock_user_struct(target_ldt_info
, ptr
, 0);
2439 if (ldt_info
.entry_number
>= TARGET_LDT_ENTRIES
)
2440 return -TARGET_EINVAL
;
2441 seg_32bit
= ldt_info
.flags
& 1;
2442 contents
= (ldt_info
.flags
>> 1) & 3;
2443 read_exec_only
= (ldt_info
.flags
>> 3) & 1;
2444 limit_in_pages
= (ldt_info
.flags
>> 4) & 1;
2445 seg_not_present
= (ldt_info
.flags
>> 5) & 1;
2446 useable
= (ldt_info
.flags
>> 6) & 1;
2450 lm
= (ldt_info
.flags
>> 7) & 1;
2452 if (contents
== 3) {
2454 return -TARGET_EINVAL
;
2455 if (seg_not_present
== 0)
2456 return -TARGET_EINVAL
;
2458 /* allocate the LDT */
2460 ldt_table
= malloc(TARGET_LDT_ENTRIES
* TARGET_LDT_ENTRY_SIZE
);
2462 return -TARGET_ENOMEM
;
2463 memset(ldt_table
, 0, TARGET_LDT_ENTRIES
* TARGET_LDT_ENTRY_SIZE
);
2464 env
->ldt
.base
= h2g((unsigned long)ldt_table
);
2465 env
->ldt
.limit
= 0xffff;
2468 /* NOTE: same code as Linux kernel */
2469 /* Allow LDTs to be cleared by the user. */
2470 if (ldt_info
.base_addr
== 0 && ldt_info
.limit
== 0) {
2473 read_exec_only
== 1 &&
2475 limit_in_pages
== 0 &&
2476 seg_not_present
== 1 &&
2484 entry_1
= ((ldt_info
.base_addr
& 0x0000ffff) << 16) |
2485 (ldt_info
.limit
& 0x0ffff);
2486 entry_2
= (ldt_info
.base_addr
& 0xff000000) |
2487 ((ldt_info
.base_addr
& 0x00ff0000) >> 16) |
2488 (ldt_info
.limit
& 0xf0000) |
2489 ((read_exec_only
^ 1) << 9) |
2491 ((seg_not_present
^ 1) << 15) |
2493 (limit_in_pages
<< 23) |
2497 entry_2
|= (useable
<< 20);
2499 /* Install the new entry ... */
2501 lp
= (uint32_t *)(ldt_table
+ (ldt_info
.entry_number
<< 3));
2502 lp
[0] = tswap32(entry_1
);
2503 lp
[1] = tswap32(entry_2
);
2507 /* specific and weird i386 syscalls */
2508 abi_long
do_modify_ldt(CPUX86State
*env
, int func
, abi_ulong ptr
,
2509 unsigned long bytecount
)
2515 ret
= read_ldt(ptr
, bytecount
);
2518 ret
= write_ldt(env
, ptr
, bytecount
, 1);
2521 ret
= write_ldt(env
, ptr
, bytecount
, 0);
2524 ret
= -TARGET_ENOSYS
;
2530 abi_long
do_set_thread_area(CPUX86State
*env
, abi_ulong ptr
)
2532 uint64_t *gdt_table
= g2h(env
->gdt
.base
);
2533 struct target_modify_ldt_ldt_s ldt_info
;
2534 struct target_modify_ldt_ldt_s
*target_ldt_info
;
2535 int seg_32bit
, contents
, read_exec_only
, limit_in_pages
;
2536 int seg_not_present
, useable
, lm
;
2537 uint32_t *lp
, entry_1
, entry_2
;
2540 lock_user_struct(VERIFY_WRITE
, target_ldt_info
, ptr
, 1);
2541 if (!target_ldt_info
)
2542 return -TARGET_EFAULT
;
2543 ldt_info
.entry_number
= tswap32(target_ldt_info
->entry_number
);
2544 ldt_info
.base_addr
= tswapl(target_ldt_info
->base_addr
);
2545 ldt_info
.limit
= tswap32(target_ldt_info
->limit
);
2546 ldt_info
.flags
= tswap32(target_ldt_info
->flags
);
2547 if (ldt_info
.entry_number
== -1) {
2548 for (i
=TARGET_GDT_ENTRY_TLS_MIN
; i
<=TARGET_GDT_ENTRY_TLS_MAX
; i
++) {
2549 if (gdt_table
[i
] == 0) {
2550 ldt_info
.entry_number
= i
;
2551 target_ldt_info
->entry_number
= tswap32(i
);
2556 unlock_user_struct(target_ldt_info
, ptr
, 1);
2558 if (ldt_info
.entry_number
< TARGET_GDT_ENTRY_TLS_MIN
||
2559 ldt_info
.entry_number
> TARGET_GDT_ENTRY_TLS_MAX
)
2560 return -TARGET_EINVAL
;
2561 seg_32bit
= ldt_info
.flags
& 1;
2562 contents
= (ldt_info
.flags
>> 1) & 3;
2563 read_exec_only
= (ldt_info
.flags
>> 3) & 1;
2564 limit_in_pages
= (ldt_info
.flags
>> 4) & 1;
2565 seg_not_present
= (ldt_info
.flags
>> 5) & 1;
2566 useable
= (ldt_info
.flags
>> 6) & 1;
2570 lm
= (ldt_info
.flags
>> 7) & 1;
2573 if (contents
== 3) {
2574 if (seg_not_present
== 0)
2575 return -TARGET_EINVAL
;
2578 /* NOTE: same code as Linux kernel */
2579 /* Allow LDTs to be cleared by the user. */
2580 if (ldt_info
.base_addr
== 0 && ldt_info
.limit
== 0) {
2581 if ((contents
== 0 &&
2582 read_exec_only
== 1 &&
2584 limit_in_pages
== 0 &&
2585 seg_not_present
== 1 &&
2593 entry_1
= ((ldt_info
.base_addr
& 0x0000ffff) << 16) |
2594 (ldt_info
.limit
& 0x0ffff);
2595 entry_2
= (ldt_info
.base_addr
& 0xff000000) |
2596 ((ldt_info
.base_addr
& 0x00ff0000) >> 16) |
2597 (ldt_info
.limit
& 0xf0000) |
2598 ((read_exec_only
^ 1) << 9) |
2600 ((seg_not_present
^ 1) << 15) |
2602 (limit_in_pages
<< 23) |
2607 /* Install the new entry ... */
2609 lp
= (uint32_t *)(gdt_table
+ ldt_info
.entry_number
);
2610 lp
[0] = tswap32(entry_1
);
2611 lp
[1] = tswap32(entry_2
);
2615 abi_long
do_get_thread_area(CPUX86State
*env
, abi_ulong ptr
)
2617 struct target_modify_ldt_ldt_s
*target_ldt_info
;
2618 uint64_t *gdt_table
= g2h(env
->gdt
.base
);
2619 uint32_t base_addr
, limit
, flags
;
2620 int seg_32bit
, contents
, read_exec_only
, limit_in_pages
, idx
;
2621 int seg_not_present
, useable
, lm
;
2622 uint32_t *lp
, entry_1
, entry_2
;
2624 lock_user_struct(VERIFY_WRITE
, target_ldt_info
, ptr
, 1);
2625 if (!target_ldt_info
)
2626 return -TARGET_EFAULT
;
2627 idx
= tswap32(target_ldt_info
->entry_number
);
2628 if (idx
< TARGET_GDT_ENTRY_TLS_MIN
||
2629 idx
> TARGET_GDT_ENTRY_TLS_MAX
) {
2630 unlock_user_struct(target_ldt_info
, ptr
, 1);
2631 return -TARGET_EINVAL
;
2633 lp
= (uint32_t *)(gdt_table
+ idx
);
2634 entry_1
= tswap32(lp
[0]);
2635 entry_2
= tswap32(lp
[1]);
2637 read_exec_only
= ((entry_2
>> 9) & 1) ^ 1;
2638 contents
= (entry_2
>> 10) & 3;
2639 seg_not_present
= ((entry_2
>> 15) & 1) ^ 1;
2640 seg_32bit
= (entry_2
>> 22) & 1;
2641 limit_in_pages
= (entry_2
>> 23) & 1;
2642 useable
= (entry_2
>> 20) & 1;
2646 lm
= (entry_2
>> 21) & 1;
2648 flags
= (seg_32bit
<< 0) | (contents
<< 1) |
2649 (read_exec_only
<< 3) | (limit_in_pages
<< 4) |
2650 (seg_not_present
<< 5) | (useable
<< 6) | (lm
<< 7);
2651 limit
= (entry_1
& 0xffff) | (entry_2
& 0xf0000);
2652 base_addr
= (entry_1
>> 16) |
2653 (entry_2
& 0xff000000) |
2654 ((entry_2
& 0xff) << 16);
2655 target_ldt_info
->base_addr
= tswapl(base_addr
);
2656 target_ldt_info
->limit
= tswap32(limit
);
2657 target_ldt_info
->flags
= tswap32(flags
);
2658 unlock_user_struct(target_ldt_info
, ptr
, 1);
2662 #ifndef TARGET_ABI32
2663 abi_long
do_arch_prctl(CPUX86State
*env
, int code
, abi_ulong addr
)
2670 case TARGET_ARCH_SET_GS
:
2671 case TARGET_ARCH_SET_FS
:
2672 if (code
== TARGET_ARCH_SET_GS
)
2676 cpu_x86_load_seg(env
, idx
, 0);
2677 env
->segs
[idx
].base
= addr
;
2679 case TARGET_ARCH_GET_GS
:
2680 case TARGET_ARCH_GET_FS
:
2681 if (code
== TARGET_ARCH_GET_GS
)
2685 val
= env
->segs
[idx
].base
;
2686 if (put_user(val
, addr
, abi_ulong
))
2687 return -TARGET_EFAULT
;
2690 ret
= -TARGET_EINVAL
;
2697 #endif /* defined(TARGET_I386) */
2699 /* this stack is the equivalent of the kernel stack associated with a
2701 #define NEW_STACK_SIZE 8192
2703 static int clone_func(void *arg
)
2705 CPUState
*env
= arg
;
2711 /* do_fork() Must return host values and target errnos (unlike most
2712 do_*() functions). */
2713 int do_fork(CPUState
*env
, unsigned int flags
, abi_ulong newsp
)
2720 if (flags
& CLONE_VM
) {
2721 ts
= malloc(sizeof(TaskState
) + NEW_STACK_SIZE
);
2722 memset(ts
, 0, sizeof(TaskState
));
2723 new_stack
= ts
->stack
;
2725 /* add in task state list */
2726 ts
->next
= first_task_state
;
2727 first_task_state
= ts
;
2728 /* we create a new CPU instance. */
2729 new_env
= cpu_copy(env
);
2730 #if defined(TARGET_I386)
2732 newsp
= env
->regs
[R_ESP
];
2733 new_env
->regs
[R_ESP
] = newsp
;
2734 new_env
->regs
[R_EAX
] = 0;
2735 #elif defined(TARGET_ARM)
2737 newsp
= env
->regs
[13];
2738 new_env
->regs
[13] = newsp
;
2739 new_env
->regs
[0] = 0;
2740 #elif defined(TARGET_SPARC)
2742 newsp
= env
->regwptr
[22];
2743 new_env
->regwptr
[22] = newsp
;
2744 new_env
->regwptr
[0] = 0;
2746 printf ("HELPME: %s:%d\n", __FILE__
, __LINE__
);
2747 #elif defined(TARGET_M68K)
2749 newsp
= env
->aregs
[7];
2750 new_env
->aregs
[7] = newsp
;
2751 new_env
->dregs
[0] = 0;
2752 /* ??? is this sufficient? */
2753 #elif defined(TARGET_MIPS)
2755 newsp
= env
->gpr
[env
->current_tc
][29];
2756 new_env
->gpr
[env
->current_tc
][29] = newsp
;
2757 #elif defined(TARGET_PPC)
2759 newsp
= env
->gpr
[1];
2760 new_env
->gpr
[1] = newsp
;
2763 for (i
= 7; i
< 32; i
++)
2764 new_env
->gpr
[i
] = 0;
2766 #elif defined(TARGET_SH4)
2768 newsp
= env
->gregs
[15];
2769 new_env
->gregs
[15] = newsp
;
2771 #elif defined(TARGET_ALPHA)
2773 newsp
= env
->ir
[30];
2774 new_env
->ir
[30] = newsp
;
2778 for (i
= 7; i
< 30; i
++)
2781 #elif defined(TARGET_CRIS)
2783 newsp
= env
->regs
[14];
2784 new_env
->regs
[14] = newsp
;
2786 #error unsupported target CPU
2788 new_env
->opaque
= ts
;
2790 ret
= __clone2(clone_func
, new_stack
+ NEW_STACK_SIZE
, flags
, new_env
);
2792 ret
= clone(clone_func
, new_stack
+ NEW_STACK_SIZE
, flags
, new_env
);
2795 /* if no CLONE_VM, we consider it is a fork */
2796 if ((flags
& ~CSIGNAL
) != 0)
2803 static abi_long
do_fcntl(int fd
, int cmd
, abi_ulong arg
)
2806 struct target_flock
*target_fl
;
2807 struct flock64 fl64
;
2808 struct target_flock64
*target_fl64
;
2812 case TARGET_F_GETLK
:
2813 if (!lock_user_struct(VERIFY_READ
, target_fl
, arg
, 1))
2814 return -TARGET_EFAULT
;
2815 fl
.l_type
= tswap16(target_fl
->l_type
);
2816 fl
.l_whence
= tswap16(target_fl
->l_whence
);
2817 fl
.l_start
= tswapl(target_fl
->l_start
);
2818 fl
.l_len
= tswapl(target_fl
->l_len
);
2819 fl
.l_pid
= tswapl(target_fl
->l_pid
);
2820 unlock_user_struct(target_fl
, arg
, 0);
2821 ret
= get_errno(fcntl(fd
, cmd
, &fl
));
2823 if (!lock_user_struct(VERIFY_WRITE
, target_fl
, arg
, 0))
2824 return -TARGET_EFAULT
;
2825 target_fl
->l_type
= tswap16(fl
.l_type
);
2826 target_fl
->l_whence
= tswap16(fl
.l_whence
);
2827 target_fl
->l_start
= tswapl(fl
.l_start
);
2828 target_fl
->l_len
= tswapl(fl
.l_len
);
2829 target_fl
->l_pid
= tswapl(fl
.l_pid
);
2830 unlock_user_struct(target_fl
, arg
, 1);
2834 case TARGET_F_SETLK
:
2835 case TARGET_F_SETLKW
:
2836 if (!lock_user_struct(VERIFY_READ
, target_fl
, arg
, 1))
2837 return -TARGET_EFAULT
;
2838 fl
.l_type
= tswap16(target_fl
->l_type
);
2839 fl
.l_whence
= tswap16(target_fl
->l_whence
);
2840 fl
.l_start
= tswapl(target_fl
->l_start
);
2841 fl
.l_len
= tswapl(target_fl
->l_len
);
2842 fl
.l_pid
= tswapl(target_fl
->l_pid
);
2843 unlock_user_struct(target_fl
, arg
, 0);
2844 ret
= get_errno(fcntl(fd
, cmd
, &fl
));
2847 case TARGET_F_GETLK64
:
2848 if (!lock_user_struct(VERIFY_READ
, target_fl64
, arg
, 1))
2849 return -TARGET_EFAULT
;
2850 fl64
.l_type
= tswap16(target_fl64
->l_type
) >> 1;
2851 fl64
.l_whence
= tswap16(target_fl64
->l_whence
);
2852 fl64
.l_start
= tswapl(target_fl64
->l_start
);
2853 fl64
.l_len
= tswapl(target_fl64
->l_len
);
2854 fl64
.l_pid
= tswap16(target_fl64
->l_pid
);
2855 unlock_user_struct(target_fl64
, arg
, 0);
2856 ret
= get_errno(fcntl(fd
, cmd
>> 1, &fl64
));
2858 if (!lock_user_struct(VERIFY_WRITE
, target_fl64
, arg
, 0))
2859 return -TARGET_EFAULT
;
2860 target_fl64
->l_type
= tswap16(fl64
.l_type
) >> 1;
2861 target_fl64
->l_whence
= tswap16(fl64
.l_whence
);
2862 target_fl64
->l_start
= tswapl(fl64
.l_start
);
2863 target_fl64
->l_len
= tswapl(fl64
.l_len
);
2864 target_fl64
->l_pid
= tswapl(fl64
.l_pid
);
2865 unlock_user_struct(target_fl64
, arg
, 1);
2868 case TARGET_F_SETLK64
:
2869 case TARGET_F_SETLKW64
:
2870 if (!lock_user_struct(VERIFY_READ
, target_fl64
, arg
, 1))
2871 return -TARGET_EFAULT
;
2872 fl64
.l_type
= tswap16(target_fl64
->l_type
) >> 1;
2873 fl64
.l_whence
= tswap16(target_fl64
->l_whence
);
2874 fl64
.l_start
= tswapl(target_fl64
->l_start
);
2875 fl64
.l_len
= tswapl(target_fl64
->l_len
);
2876 fl64
.l_pid
= tswap16(target_fl64
->l_pid
);
2877 unlock_user_struct(target_fl64
, arg
, 0);
2878 ret
= get_errno(fcntl(fd
, cmd
>> 1, &fl64
));
2882 ret
= get_errno(fcntl(fd
, cmd
, arg
));
2884 ret
= host_to_target_bitmask(ret
, fcntl_flags_tbl
);
2889 ret
= get_errno(fcntl(fd
, cmd
, target_to_host_bitmask(arg
, fcntl_flags_tbl
)));
2893 ret
= get_errno(fcntl(fd
, cmd
, arg
));
2901 static inline int high2lowuid(int uid
)
2909 static inline int high2lowgid(int gid
)
2917 static inline int low2highuid(int uid
)
2919 if ((int16_t)uid
== -1)
2925 static inline int low2highgid(int gid
)
2927 if ((int16_t)gid
== -1)
2933 #endif /* USE_UID16 */
2935 void syscall_init(void)
2938 const argtype
*arg_type
;
2942 #define STRUCT(name, list...) thunk_register_struct(STRUCT_ ## name, #name, struct_ ## name ## _def);
2943 #define STRUCT_SPECIAL(name) thunk_register_struct_direct(STRUCT_ ## name, #name, &struct_ ## name ## _def);
2944 #include "syscall_types.h"
2946 #undef STRUCT_SPECIAL
2948 /* we patch the ioctl size if necessary. We rely on the fact that
2949 no ioctl has all the bits at '1' in the size field */
2951 while (ie
->target_cmd
!= 0) {
2952 if (((ie
->target_cmd
>> TARGET_IOC_SIZESHIFT
) & TARGET_IOC_SIZEMASK
) ==
2953 TARGET_IOC_SIZEMASK
) {
2954 arg_type
= ie
->arg_type
;
2955 if (arg_type
[0] != TYPE_PTR
) {
2956 fprintf(stderr
, "cannot patch size for ioctl 0x%x\n",
2961 size
= thunk_type_size(arg_type
, 0);
2962 ie
->target_cmd
= (ie
->target_cmd
&
2963 ~(TARGET_IOC_SIZEMASK
<< TARGET_IOC_SIZESHIFT
)) |
2964 (size
<< TARGET_IOC_SIZESHIFT
);
2967 /* Build target_to_host_errno_table[] table from
2968 * host_to_target_errno_table[]. */
2969 for (i
=0; i
< ERRNO_TABLE_SIZE
; i
++)
2970 target_to_host_errno_table
[host_to_target_errno_table
[i
]] = i
;
2972 /* automatic consistency check if same arch */
2973 #if defined(__i386__) && defined(TARGET_I386) && defined(TARGET_ABI32)
2974 if (ie
->target_cmd
!= ie
->host_cmd
) {
2975 fprintf(stderr
, "ERROR: ioctl: target=0x%x host=0x%x\n",
2976 ie
->target_cmd
, ie
->host_cmd
);
2983 #if TARGET_ABI_BITS == 32
2984 static inline uint64_t target_offset64(uint32_t word0
, uint32_t word1
)
2986 #ifdef TARGET_WORDS_BIG_ENDIAN
2987 return ((uint64_t)word0
<< 32) | word1
;
2989 return ((uint64_t)word1
<< 32) | word0
;
2992 #else /* TARGET_ABI_BITS == 32 */
2993 static inline uint64_t target_offset64(uint64_t word0
, uint64_t word1
)
2997 #endif /* TARGET_ABI_BITS != 32 */
2999 #ifdef TARGET_NR_truncate64
3000 static inline abi_long
target_truncate64(void *cpu_env
, const char *arg1
,
3006 if (((CPUARMState
*)cpu_env
)->eabi
)
3012 return get_errno(truncate64(arg1
, target_offset64(arg2
, arg3
)));
3016 #ifdef TARGET_NR_ftruncate64
3017 static inline abi_long
target_ftruncate64(void *cpu_env
, abi_long arg1
,
3023 if (((CPUARMState
*)cpu_env
)->eabi
)
3029 return get_errno(ftruncate64(arg1
, target_offset64(arg2
, arg3
)));
3033 static inline abi_long
target_to_host_timespec(struct timespec
*host_ts
,
3034 abi_ulong target_addr
)
3036 struct target_timespec
*target_ts
;
3038 if (!lock_user_struct(VERIFY_READ
, target_ts
, target_addr
, 1))
3039 return -TARGET_EFAULT
;
3040 host_ts
->tv_sec
= tswapl(target_ts
->tv_sec
);
3041 host_ts
->tv_nsec
= tswapl(target_ts
->tv_nsec
);
3042 unlock_user_struct(target_ts
, target_addr
, 0);
3045 static inline abi_long
host_to_target_timespec(abi_ulong target_addr
,
3046 struct timespec
*host_ts
)
3048 struct target_timespec
*target_ts
;
3050 if (!lock_user_struct(VERIFY_WRITE
, target_ts
, target_addr
, 0))
3051 return -TARGET_EFAULT
;
3052 target_ts
->tv_sec
= tswapl(host_ts
->tv_sec
);
3053 target_ts
->tv_nsec
= tswapl(host_ts
->tv_nsec
);
3054 unlock_user_struct(target_ts
, target_addr
, 1);
3057 int get_osversion(void)
3059 static int osversion
;
3060 struct new_utsname buf
;
3065 if (qemu_uname_release
&& *qemu_uname_release
) {
3066 s
= qemu_uname_release
;
3068 if (sys_uname(&buf
))
3073 for (i
= 0; i
< 3; i
++) {
3075 while (*s
>= '0' && *s
<= '9') {
3080 tmp
= (tmp
<< 8) + n
;
3088 /* do_syscall() should always have a single exit point at the end so
3089 that actions, such as logging of syscall results, can be performed.
3090 All errnos that do_syscall() returns must be -TARGET_<errcode>. */
3091 abi_long
do_syscall(void *cpu_env
, int num
, abi_long arg1
,
3092 abi_long arg2
, abi_long arg3
, abi_long arg4
,
3093 abi_long arg5
, abi_long arg6
)
3101 gemu_log("syscall %d", num
);
3104 print_syscall(num
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
3107 case TARGET_NR_exit
:
3111 gdb_exit(cpu_env
, arg1
);
3112 /* XXX: should free thread stack and CPU env */
3114 ret
= 0; /* avoid warning */
3116 case TARGET_NR_read
:
3117 if (!(p
= lock_user(VERIFY_WRITE
, arg2
, arg3
, 0)))
3119 ret
= get_errno(read(arg1
, p
, arg3
));
3120 unlock_user(p
, arg2
, ret
);
3122 case TARGET_NR_write
:
3123 if (!(p
= lock_user(VERIFY_READ
, arg2
, arg3
, 1)))
3125 ret
= get_errno(write(arg1
, p
, arg3
));
3126 unlock_user(p
, arg2
, 0);
3128 case TARGET_NR_open
:
3129 if (!(p
= lock_user_string(arg1
)))
3131 ret
= get_errno(open(path(p
),
3132 target_to_host_bitmask(arg2
, fcntl_flags_tbl
),
3134 unlock_user(p
, arg1
, 0);
3136 #if defined(TARGET_NR_openat) && defined(__NR_openat)
3137 case TARGET_NR_openat
:
3138 if (!(p
= lock_user_string(arg2
)))
3140 ret
= get_errno(sys_openat(arg1
,
3142 target_to_host_bitmask(arg3
, fcntl_flags_tbl
),
3144 unlock_user(p
, arg2
, 0);
3147 case TARGET_NR_close
:
3148 ret
= get_errno(close(arg1
));
3153 case TARGET_NR_fork
:
3154 ret
= get_errno(do_fork(cpu_env
, SIGCHLD
, 0));
3156 #ifdef TARGET_NR_waitpid
3157 case TARGET_NR_waitpid
:
3160 ret
= get_errno(waitpid(arg1
, &status
, arg3
));
3161 if (!is_error(ret
) && arg2
3162 && put_user_s32(status
, arg2
))
3167 #ifdef TARGET_NR_creat /* not on alpha */
3168 case TARGET_NR_creat
:
3169 if (!(p
= lock_user_string(arg1
)))
3171 ret
= get_errno(creat(p
, arg2
));
3172 unlock_user(p
, arg1
, 0);
3175 case TARGET_NR_link
:
3178 p
= lock_user_string(arg1
);
3179 p2
= lock_user_string(arg2
);
3181 ret
= -TARGET_EFAULT
;
3183 ret
= get_errno(link(p
, p2
));
3184 unlock_user(p2
, arg2
, 0);
3185 unlock_user(p
, arg1
, 0);
3188 #if defined(TARGET_NR_linkat) && defined(__NR_linkat)
3189 case TARGET_NR_linkat
:
3194 p
= lock_user_string(arg2
);
3195 p2
= lock_user_string(arg4
);
3197 ret
= -TARGET_EFAULT
;
3199 ret
= get_errno(sys_linkat(arg1
, p
, arg3
, p2
, arg5
));
3200 unlock_user(p
, arg2
, 0);
3201 unlock_user(p2
, arg4
, 0);
3205 case TARGET_NR_unlink
:
3206 if (!(p
= lock_user_string(arg1
)))
3208 ret
= get_errno(unlink(p
));
3209 unlock_user(p
, arg1
, 0);
3211 #if defined(TARGET_NR_unlinkat) && defined(__NR_unlinkat)
3212 case TARGET_NR_unlinkat
:
3213 if (!(p
= lock_user_string(arg2
)))
3215 ret
= get_errno(sys_unlinkat(arg1
, p
, arg3
));
3216 unlock_user(p
, arg2
, 0);
3219 case TARGET_NR_execve
:
3221 char **argp
, **envp
;
3224 abi_ulong guest_argp
;
3225 abi_ulong guest_envp
;
3231 for (gp
= guest_argp
; ; gp
+= sizeof(abi_ulong
)) {
3232 if (get_user_ual(addr
, gp
))
3240 for (gp
= guest_envp
; ; gp
+= sizeof(abi_ulong
)) {
3241 if (get_user_ual(addr
, gp
))
3248 argp
= alloca((argc
+ 1) * sizeof(void *));
3249 envp
= alloca((envc
+ 1) * sizeof(void *));
3251 for (gp
= guest_argp
, q
= argp
; ;
3252 gp
+= sizeof(abi_ulong
), q
++) {
3253 if (get_user_ual(addr
, gp
))
3257 if (!(*q
= lock_user_string(addr
)))
3262 for (gp
= guest_envp
, q
= envp
; ;
3263 gp
+= sizeof(abi_ulong
), q
++) {
3264 if (get_user_ual(addr
, gp
))
3268 if (!(*q
= lock_user_string(addr
)))
3273 if (!(p
= lock_user_string(arg1
)))
3275 ret
= get_errno(execve(p
, argp
, envp
));
3276 unlock_user(p
, arg1
, 0);
3281 ret
= -TARGET_EFAULT
;
3284 for (gp
= guest_argp
, q
= argp
; *q
;
3285 gp
+= sizeof(abi_ulong
), q
++) {
3286 if (get_user_ual(addr
, gp
)
3289 unlock_user(*q
, addr
, 0);
3291 for (gp
= guest_envp
, q
= envp
; *q
;
3292 gp
+= sizeof(abi_ulong
), q
++) {
3293 if (get_user_ual(addr
, gp
)
3296 unlock_user(*q
, addr
, 0);
3300 case TARGET_NR_chdir
:
3301 if (!(p
= lock_user_string(arg1
)))
3303 ret
= get_errno(chdir(p
));
3304 unlock_user(p
, arg1
, 0);
3306 #ifdef TARGET_NR_time
3307 case TARGET_NR_time
:
3310 ret
= get_errno(time(&host_time
));
3313 && put_user_sal(host_time
, arg1
))
3318 case TARGET_NR_mknod
:
3319 if (!(p
= lock_user_string(arg1
)))
3321 ret
= get_errno(mknod(p
, arg2
, arg3
));
3322 unlock_user(p
, arg1
, 0);
3324 #if defined(TARGET_NR_mknodat) && defined(__NR_mknodat)
3325 case TARGET_NR_mknodat
:
3326 if (!(p
= lock_user_string(arg2
)))
3328 ret
= get_errno(sys_mknodat(arg1
, p
, arg3
, arg4
));
3329 unlock_user(p
, arg2
, 0);
3332 case TARGET_NR_chmod
:
3333 if (!(p
= lock_user_string(arg1
)))
3335 ret
= get_errno(chmod(p
, arg2
));
3336 unlock_user(p
, arg1
, 0);
3338 #ifdef TARGET_NR_break
3339 case TARGET_NR_break
:
3342 #ifdef TARGET_NR_oldstat
3343 case TARGET_NR_oldstat
:
3346 case TARGET_NR_lseek
:
3347 ret
= get_errno(lseek(arg1
, arg2
, arg3
));
3349 #ifdef TARGET_NR_getxpid
3350 case TARGET_NR_getxpid
:
3352 case TARGET_NR_getpid
:
3354 ret
= get_errno(getpid());
3356 case TARGET_NR_mount
:
3358 /* need to look at the data field */
3360 p
= lock_user_string(arg1
);
3361 p2
= lock_user_string(arg2
);
3362 p3
= lock_user_string(arg3
);
3363 if (!p
|| !p2
|| !p3
)
3364 ret
= -TARGET_EFAULT
;
3366 /* FIXME - arg5 should be locked, but it isn't clear how to
3367 * do that since it's not guaranteed to be a NULL-terminated
3370 ret
= get_errno(mount(p
, p2
, p3
, (unsigned long)arg4
, g2h(arg5
)));
3371 unlock_user(p
, arg1
, 0);
3372 unlock_user(p2
, arg2
, 0);
3373 unlock_user(p3
, arg3
, 0);
3376 #ifdef TARGET_NR_umount
3377 case TARGET_NR_umount
:
3378 if (!(p
= lock_user_string(arg1
)))
3380 ret
= get_errno(umount(p
));
3381 unlock_user(p
, arg1
, 0);
3384 #ifdef TARGET_NR_stime /* not on alpha */
3385 case TARGET_NR_stime
:
3388 if (get_user_sal(host_time
, arg1
))
3390 ret
= get_errno(stime(&host_time
));
3394 case TARGET_NR_ptrace
:
3396 #ifdef TARGET_NR_alarm /* not on alpha */
3397 case TARGET_NR_alarm
:
3401 #ifdef TARGET_NR_oldfstat
3402 case TARGET_NR_oldfstat
:
3405 #ifdef TARGET_NR_pause /* not on alpha */
3406 case TARGET_NR_pause
:
3407 ret
= get_errno(pause());
3410 #ifdef TARGET_NR_utime
3411 case TARGET_NR_utime
:
3413 struct utimbuf tbuf
, *host_tbuf
;
3414 struct target_utimbuf
*target_tbuf
;
3416 if (!lock_user_struct(VERIFY_READ
, target_tbuf
, arg2
, 1))
3418 tbuf
.actime
= tswapl(target_tbuf
->actime
);
3419 tbuf
.modtime
= tswapl(target_tbuf
->modtime
);
3420 unlock_user_struct(target_tbuf
, arg2
, 0);
3425 if (!(p
= lock_user_string(arg1
)))
3427 ret
= get_errno(utime(p
, host_tbuf
));
3428 unlock_user(p
, arg1
, 0);
3432 case TARGET_NR_utimes
:
3434 struct timeval
*tvp
, tv
[2];
3436 if (copy_from_user_timeval(&tv
[0], arg2
)
3437 || copy_from_user_timeval(&tv
[1],
3438 arg2
+ sizeof(struct target_timeval
)))
3444 if (!(p
= lock_user_string(arg1
)))
3446 ret
= get_errno(utimes(p
, tvp
));
3447 unlock_user(p
, arg1
, 0);
3450 #ifdef TARGET_NR_stty
3451 case TARGET_NR_stty
:
3454 #ifdef TARGET_NR_gtty
3455 case TARGET_NR_gtty
:
3458 case TARGET_NR_access
:
3459 if (!(p
= lock_user_string(arg1
)))
3461 ret
= get_errno(access(p
, arg2
));
3462 unlock_user(p
, arg1
, 0);
3464 #if defined(TARGET_NR_faccessat) && defined(__NR_faccessat)
3465 case TARGET_NR_faccessat
:
3466 if (!(p
= lock_user_string(arg2
)))
3468 ret
= get_errno(sys_faccessat(arg1
, p
, arg3
, arg4
));
3469 unlock_user(p
, arg2
, 0);
3472 #ifdef TARGET_NR_nice /* not on alpha */
3473 case TARGET_NR_nice
:
3474 ret
= get_errno(nice(arg1
));
3477 #ifdef TARGET_NR_ftime
3478 case TARGET_NR_ftime
:
3481 case TARGET_NR_sync
:
3485 case TARGET_NR_kill
:
3486 ret
= get_errno(kill(arg1
, arg2
));
3488 case TARGET_NR_rename
:
3491 p
= lock_user_string(arg1
);
3492 p2
= lock_user_string(arg2
);
3494 ret
= -TARGET_EFAULT
;
3496 ret
= get_errno(rename(p
, p2
));
3497 unlock_user(p2
, arg2
, 0);
3498 unlock_user(p
, arg1
, 0);
3501 #if defined(TARGET_NR_renameat) && defined(__NR_renameat)
3502 case TARGET_NR_renameat
:
3505 p
= lock_user_string(arg2
);
3506 p2
= lock_user_string(arg4
);
3508 ret
= -TARGET_EFAULT
;
3510 ret
= get_errno(sys_renameat(arg1
, p
, arg3
, p2
));
3511 unlock_user(p2
, arg4
, 0);
3512 unlock_user(p
, arg2
, 0);
3516 case TARGET_NR_mkdir
:
3517 if (!(p
= lock_user_string(arg1
)))
3519 ret
= get_errno(mkdir(p
, arg2
));
3520 unlock_user(p
, arg1
, 0);
3522 #if defined(TARGET_NR_mkdirat) && defined(__NR_mkdirat)
3523 case TARGET_NR_mkdirat
:
3524 if (!(p
= lock_user_string(arg2
)))
3526 ret
= get_errno(sys_mkdirat(arg1
, p
, arg3
));
3527 unlock_user(p
, arg2
, 0);
3530 case TARGET_NR_rmdir
:
3531 if (!(p
= lock_user_string(arg1
)))
3533 ret
= get_errno(rmdir(p
));
3534 unlock_user(p
, arg1
, 0);
3537 ret
= get_errno(dup(arg1
));
3539 case TARGET_NR_pipe
:
3542 ret
= get_errno(pipe(host_pipe
));
3543 if (!is_error(ret
)) {
3544 #if defined(TARGET_MIPS)
3545 CPUMIPSState
*env
= (CPUMIPSState
*)cpu_env
;
3546 env
->gpr
[env
->current_tc
][3] = host_pipe
[1];
3548 #elif defined(TARGET_SH4)
3549 ((CPUSH4State
*)cpu_env
)->gregs
[1] = host_pipe
[1];
3552 if (put_user_s32(host_pipe
[0], arg1
)
3553 || put_user_s32(host_pipe
[1], arg1
+ sizeof(host_pipe
[0])))
3559 case TARGET_NR_times
:
3561 struct target_tms
*tmsp
;
3563 ret
= get_errno(times(&tms
));
3565 tmsp
= lock_user(VERIFY_WRITE
, arg1
, sizeof(struct target_tms
), 0);
3568 tmsp
->tms_utime
= tswapl(host_to_target_clock_t(tms
.tms_utime
));
3569 tmsp
->tms_stime
= tswapl(host_to_target_clock_t(tms
.tms_stime
));
3570 tmsp
->tms_cutime
= tswapl(host_to_target_clock_t(tms
.tms_cutime
));
3571 tmsp
->tms_cstime
= tswapl(host_to_target_clock_t(tms
.tms_cstime
));
3574 ret
= host_to_target_clock_t(ret
);
3577 #ifdef TARGET_NR_prof
3578 case TARGET_NR_prof
:
3581 #ifdef TARGET_NR_signal
3582 case TARGET_NR_signal
:
3585 case TARGET_NR_acct
:
3586 if (!(p
= lock_user_string(arg1
)))
3588 ret
= get_errno(acct(path(p
)));
3589 unlock_user(p
, arg1
, 0);
3591 #ifdef TARGET_NR_umount2 /* not on alpha */
3592 case TARGET_NR_umount2
:
3593 if (!(p
= lock_user_string(arg1
)))
3595 ret
= get_errno(umount2(p
, arg2
));
3596 unlock_user(p
, arg1
, 0);
3599 #ifdef TARGET_NR_lock
3600 case TARGET_NR_lock
:
3603 case TARGET_NR_ioctl
:
3604 ret
= do_ioctl(arg1
, arg2
, arg3
);
3606 case TARGET_NR_fcntl
:
3607 ret
= do_fcntl(arg1
, arg2
, arg3
);
3609 #ifdef TARGET_NR_mpx
3613 case TARGET_NR_setpgid
:
3614 ret
= get_errno(setpgid(arg1
, arg2
));
3616 #ifdef TARGET_NR_ulimit
3617 case TARGET_NR_ulimit
:
3620 #ifdef TARGET_NR_oldolduname
3621 case TARGET_NR_oldolduname
:
3624 case TARGET_NR_umask
:
3625 ret
= get_errno(umask(arg1
));
3627 case TARGET_NR_chroot
:
3628 if (!(p
= lock_user_string(arg1
)))
3630 ret
= get_errno(chroot(p
));
3631 unlock_user(p
, arg1
, 0);
3633 case TARGET_NR_ustat
:
3635 case TARGET_NR_dup2
:
3636 ret
= get_errno(dup2(arg1
, arg2
));
3638 #ifdef TARGET_NR_getppid /* not on alpha */
3639 case TARGET_NR_getppid
:
3640 ret
= get_errno(getppid());
3643 case TARGET_NR_getpgrp
:
3644 ret
= get_errno(getpgrp());
3646 case TARGET_NR_setsid
:
3647 ret
= get_errno(setsid());
3649 #ifdef TARGET_NR_sigaction
3650 case TARGET_NR_sigaction
:
3652 #if !defined(TARGET_MIPS)
3653 struct target_old_sigaction
*old_act
;
3654 struct target_sigaction act
, oact
, *pact
;
3656 if (!lock_user_struct(VERIFY_READ
, old_act
, arg2
, 1))
3658 act
._sa_handler
= old_act
->_sa_handler
;
3659 target_siginitset(&act
.sa_mask
, old_act
->sa_mask
);
3660 act
.sa_flags
= old_act
->sa_flags
;
3661 act
.sa_restorer
= old_act
->sa_restorer
;
3662 unlock_user_struct(old_act
, arg2
, 0);
3667 ret
= get_errno(do_sigaction(arg1
, pact
, &oact
));
3668 if (!is_error(ret
) && arg3
) {
3669 if (!lock_user_struct(VERIFY_WRITE
, old_act
, arg3
, 0))
3671 old_act
->_sa_handler
= oact
._sa_handler
;
3672 old_act
->sa_mask
= oact
.sa_mask
.sig
[0];
3673 old_act
->sa_flags
= oact
.sa_flags
;
3674 old_act
->sa_restorer
= oact
.sa_restorer
;
3675 unlock_user_struct(old_act
, arg3
, 1);
3678 struct target_sigaction act
, oact
, *pact
, *old_act
;
3681 if (!lock_user_struct(VERIFY_READ
, old_act
, arg2
, 1))
3683 act
._sa_handler
= old_act
->_sa_handler
;
3684 target_siginitset(&act
.sa_mask
, old_act
->sa_mask
.sig
[0]);
3685 act
.sa_flags
= old_act
->sa_flags
;
3686 unlock_user_struct(old_act
, arg2
, 0);
3692 ret
= get_errno(do_sigaction(arg1
, pact
, &oact
));
3694 if (!is_error(ret
) && arg3
) {
3695 if (!lock_user_struct(VERIFY_WRITE
, old_act
, arg3
, 0))
3697 old_act
->_sa_handler
= oact
._sa_handler
;
3698 old_act
->sa_flags
= oact
.sa_flags
;
3699 old_act
->sa_mask
.sig
[0] = oact
.sa_mask
.sig
[0];
3700 old_act
->sa_mask
.sig
[1] = 0;
3701 old_act
->sa_mask
.sig
[2] = 0;
3702 old_act
->sa_mask
.sig
[3] = 0;
3703 unlock_user_struct(old_act
, arg3
, 1);
3709 case TARGET_NR_rt_sigaction
:
3711 struct target_sigaction
*act
;
3712 struct target_sigaction
*oact
;
3715 if (!lock_user_struct(VERIFY_READ
, act
, arg2
, 1))
3720 if (!lock_user_struct(VERIFY_WRITE
, oact
, arg3
, 0)) {
3721 ret
= -TARGET_EFAULT
;
3722 goto rt_sigaction_fail
;
3726 ret
= get_errno(do_sigaction(arg1
, act
, oact
));
3729 unlock_user_struct(act
, arg2
, 0);
3731 unlock_user_struct(oact
, arg3
, 1);
3734 #ifdef TARGET_NR_sgetmask /* not on alpha */
3735 case TARGET_NR_sgetmask
:
3738 abi_ulong target_set
;
3739 sigprocmask(0, NULL
, &cur_set
);
3740 host_to_target_old_sigset(&target_set
, &cur_set
);
3745 #ifdef TARGET_NR_ssetmask /* not on alpha */
3746 case TARGET_NR_ssetmask
:
3748 sigset_t set
, oset
, cur_set
;
3749 abi_ulong target_set
= arg1
;
3750 sigprocmask(0, NULL
, &cur_set
);
3751 target_to_host_old_sigset(&set
, &target_set
);
3752 sigorset(&set
, &set
, &cur_set
);
3753 sigprocmask(SIG_SETMASK
, &set
, &oset
);
3754 host_to_target_old_sigset(&target_set
, &oset
);
3759 #ifdef TARGET_NR_sigprocmask
3760 case TARGET_NR_sigprocmask
:
3763 sigset_t set
, oldset
, *set_ptr
;
3767 case TARGET_SIG_BLOCK
:
3770 case TARGET_SIG_UNBLOCK
:
3773 case TARGET_SIG_SETMASK
:
3777 ret
= -TARGET_EINVAL
;
3780 if (!(p
= lock_user(VERIFY_READ
, arg2
, sizeof(target_sigset_t
), 1)))
3782 target_to_host_old_sigset(&set
, p
);
3783 unlock_user(p
, arg2
, 0);
3789 ret
= get_errno(sigprocmask(arg1
, set_ptr
, &oldset
));
3790 if (!is_error(ret
) && arg3
) {
3791 if (!(p
= lock_user(VERIFY_WRITE
, arg3
, sizeof(target_sigset_t
), 0)))
3793 host_to_target_old_sigset(p
, &oldset
);
3794 unlock_user(p
, arg3
, sizeof(target_sigset_t
));
3799 case TARGET_NR_rt_sigprocmask
:
3802 sigset_t set
, oldset
, *set_ptr
;
3806 case TARGET_SIG_BLOCK
:
3809 case TARGET_SIG_UNBLOCK
:
3812 case TARGET_SIG_SETMASK
:
3816 ret
= -TARGET_EINVAL
;
3819 if (!(p
= lock_user(VERIFY_READ
, arg2
, sizeof(target_sigset_t
), 1)))
3821 target_to_host_sigset(&set
, p
);
3822 unlock_user(p
, arg2
, 0);
3828 ret
= get_errno(sigprocmask(how
, set_ptr
, &oldset
));
3829 if (!is_error(ret
) && arg3
) {
3830 if (!(p
= lock_user(VERIFY_WRITE
, arg3
, sizeof(target_sigset_t
), 0)))
3832 host_to_target_sigset(p
, &oldset
);
3833 unlock_user(p
, arg3
, sizeof(target_sigset_t
));
3837 #ifdef TARGET_NR_sigpending
3838 case TARGET_NR_sigpending
:
3841 ret
= get_errno(sigpending(&set
));
3842 if (!is_error(ret
)) {
3843 if (!(p
= lock_user(VERIFY_WRITE
, arg1
, sizeof(target_sigset_t
), 0)))
3845 host_to_target_old_sigset(p
, &set
);
3846 unlock_user(p
, arg1
, sizeof(target_sigset_t
));
3851 case TARGET_NR_rt_sigpending
:
3854 ret
= get_errno(sigpending(&set
));
3855 if (!is_error(ret
)) {
3856 if (!(p
= lock_user(VERIFY_WRITE
, arg1
, sizeof(target_sigset_t
), 0)))
3858 host_to_target_sigset(p
, &set
);
3859 unlock_user(p
, arg1
, sizeof(target_sigset_t
));
3863 #ifdef TARGET_NR_sigsuspend
3864 case TARGET_NR_sigsuspend
:
3867 if (!(p
= lock_user(VERIFY_READ
, arg1
, sizeof(target_sigset_t
), 1)))
3869 target_to_host_old_sigset(&set
, p
);
3870 unlock_user(p
, arg1
, 0);
3871 ret
= get_errno(sigsuspend(&set
));
3875 case TARGET_NR_rt_sigsuspend
:
3878 if (!(p
= lock_user(VERIFY_READ
, arg1
, sizeof(target_sigset_t
), 1)))
3880 target_to_host_sigset(&set
, p
);
3881 unlock_user(p
, arg1
, 0);
3882 ret
= get_errno(sigsuspend(&set
));
3885 case TARGET_NR_rt_sigtimedwait
:
3888 struct timespec uts
, *puts
;
3891 if (!(p
= lock_user(VERIFY_READ
, arg1
, sizeof(target_sigset_t
), 1)))
3893 target_to_host_sigset(&set
, p
);
3894 unlock_user(p
, arg1
, 0);
3897 target_to_host_timespec(puts
, arg3
);
3901 ret
= get_errno(sigtimedwait(&set
, &uinfo
, puts
));
3902 if (!is_error(ret
) && arg2
) {
3903 if (!(p
= lock_user(VERIFY_WRITE
, arg2
, sizeof(target_sigset_t
), 0)))
3905 host_to_target_siginfo(p
, &uinfo
);
3906 unlock_user(p
, arg2
, sizeof(target_sigset_t
));
3910 case TARGET_NR_rt_sigqueueinfo
:
3913 if (!(p
= lock_user(VERIFY_READ
, arg3
, sizeof(target_sigset_t
), 1)))
3915 target_to_host_siginfo(&uinfo
, p
);
3916 unlock_user(p
, arg1
, 0);
3917 ret
= get_errno(sys_rt_sigqueueinfo(arg1
, arg2
, &uinfo
));
3920 #ifdef TARGET_NR_sigreturn
3921 case TARGET_NR_sigreturn
:
3922 /* NOTE: ret is eax, so not transcoding must be done */
3923 ret
= do_sigreturn(cpu_env
);
3926 case TARGET_NR_rt_sigreturn
:
3927 /* NOTE: ret is eax, so not transcoding must be done */
3928 ret
= do_rt_sigreturn(cpu_env
);
3930 case TARGET_NR_sethostname
:
3931 if (!(p
= lock_user_string(arg1
)))
3933 ret
= get_errno(sethostname(p
, arg2
));
3934 unlock_user(p
, arg1
, 0);
3936 case TARGET_NR_setrlimit
:
3938 /* XXX: convert resource ? */
3939 int resource
= arg1
;
3940 struct target_rlimit
*target_rlim
;
3942 if (!lock_user_struct(VERIFY_READ
, target_rlim
, arg2
, 1))
3944 rlim
.rlim_cur
= tswapl(target_rlim
->rlim_cur
);
3945 rlim
.rlim_max
= tswapl(target_rlim
->rlim_max
);
3946 unlock_user_struct(target_rlim
, arg2
, 0);
3947 ret
= get_errno(setrlimit(resource
, &rlim
));
3950 case TARGET_NR_getrlimit
:
3952 /* XXX: convert resource ? */
3953 int resource
= arg1
;
3954 struct target_rlimit
*target_rlim
;
3957 ret
= get_errno(getrlimit(resource
, &rlim
));
3958 if (!is_error(ret
)) {
3959 if (!lock_user_struct(VERIFY_WRITE
, target_rlim
, arg2
, 0))
3961 rlim
.rlim_cur
= tswapl(target_rlim
->rlim_cur
);
3962 rlim
.rlim_max
= tswapl(target_rlim
->rlim_max
);
3963 unlock_user_struct(target_rlim
, arg2
, 1);
3967 case TARGET_NR_getrusage
:
3969 struct rusage rusage
;
3970 ret
= get_errno(getrusage(arg1
, &rusage
));
3971 if (!is_error(ret
)) {
3972 host_to_target_rusage(arg2
, &rusage
);
3976 case TARGET_NR_gettimeofday
:
3979 ret
= get_errno(gettimeofday(&tv
, NULL
));
3980 if (!is_error(ret
)) {
3981 if (copy_to_user_timeval(arg1
, &tv
))
3986 case TARGET_NR_settimeofday
:
3989 if (copy_from_user_timeval(&tv
, arg1
))
3991 ret
= get_errno(settimeofday(&tv
, NULL
));
3994 #ifdef TARGET_NR_select
3995 case TARGET_NR_select
:
3997 struct target_sel_arg_struct
*sel
;
3998 abi_ulong inp
, outp
, exp
, tvp
;
4001 if (!lock_user_struct(VERIFY_READ
, sel
, arg1
, 1))
4003 nsel
= tswapl(sel
->n
);
4004 inp
= tswapl(sel
->inp
);
4005 outp
= tswapl(sel
->outp
);
4006 exp
= tswapl(sel
->exp
);
4007 tvp
= tswapl(sel
->tvp
);
4008 unlock_user_struct(sel
, arg1
, 0);
4009 ret
= do_select(nsel
, inp
, outp
, exp
, tvp
);
4013 case TARGET_NR_symlink
:
4016 p
= lock_user_string(arg1
);
4017 p2
= lock_user_string(arg2
);
4019 ret
= -TARGET_EFAULT
;
4021 ret
= get_errno(symlink(p
, p2
));
4022 unlock_user(p2
, arg2
, 0);
4023 unlock_user(p
, arg1
, 0);
4026 #if defined(TARGET_NR_symlinkat) && defined(__NR_symlinkat)
4027 case TARGET_NR_symlinkat
:
4030 p
= lock_user_string(arg1
);
4031 p2
= lock_user_string(arg3
);
4033 ret
= -TARGET_EFAULT
;
4035 ret
= get_errno(sys_symlinkat(p
, arg2
, p2
));
4036 unlock_user(p2
, arg3
, 0);
4037 unlock_user(p
, arg1
, 0);
4041 #ifdef TARGET_NR_oldlstat
4042 case TARGET_NR_oldlstat
:
4045 case TARGET_NR_readlink
:
4048 p
= lock_user_string(arg1
);
4049 p2
= lock_user(VERIFY_WRITE
, arg2
, arg3
, 0);
4051 ret
= -TARGET_EFAULT
;
4053 ret
= get_errno(readlink(path(p
), p2
, arg3
));
4054 unlock_user(p2
, arg2
, ret
);
4055 unlock_user(p
, arg1
, 0);
4058 #if defined(TARGET_NR_readlinkat) && defined(__NR_readlinkat)
4059 case TARGET_NR_readlinkat
:
4062 p
= lock_user_string(arg2
);
4063 p2
= lock_user(VERIFY_WRITE
, arg3
, arg4
, 0);
4065 ret
= -TARGET_EFAULT
;
4067 ret
= get_errno(sys_readlinkat(arg1
, path(p
), p2
, arg4
));
4068 unlock_user(p2
, arg3
, ret
);
4069 unlock_user(p
, arg2
, 0);
4073 #ifdef TARGET_NR_uselib
4074 case TARGET_NR_uselib
:
4077 #ifdef TARGET_NR_swapon
4078 case TARGET_NR_swapon
:
4079 if (!(p
= lock_user_string(arg1
)))
4081 ret
= get_errno(swapon(p
, arg2
));
4082 unlock_user(p
, arg1
, 0);
4085 case TARGET_NR_reboot
:
4087 #ifdef TARGET_NR_readdir
4088 case TARGET_NR_readdir
:
4091 #ifdef TARGET_NR_mmap
4092 case TARGET_NR_mmap
:
4093 #if (defined(TARGET_I386) && defined(TARGET_ABI32)) || defined(TARGET_ARM) || defined(TARGET_M68K) || defined(TARGET_CRIS)
4096 abi_ulong v1
, v2
, v3
, v4
, v5
, v6
;
4097 if (!(v
= lock_user(VERIFY_READ
, arg1
, 6 * sizeof(abi_ulong
), 1)))
4105 unlock_user(v
, arg1
, 0);
4106 ret
= get_errno(target_mmap(v1
, v2
, v3
,
4107 target_to_host_bitmask(v4
, mmap_flags_tbl
),
4111 ret
= get_errno(target_mmap(arg1
, arg2
, arg3
,
4112 target_to_host_bitmask(arg4
, mmap_flags_tbl
),
4118 #ifdef TARGET_NR_mmap2
4119 case TARGET_NR_mmap2
:
4121 #define MMAP_SHIFT 12
4123 ret
= get_errno(target_mmap(arg1
, arg2
, arg3
,
4124 target_to_host_bitmask(arg4
, mmap_flags_tbl
),
4126 arg6
<< MMAP_SHIFT
));
4129 case TARGET_NR_munmap
:
4130 ret
= get_errno(target_munmap(arg1
, arg2
));
4132 case TARGET_NR_mprotect
:
4133 ret
= get_errno(target_mprotect(arg1
, arg2
, arg3
));
4135 #ifdef TARGET_NR_mremap
4136 case TARGET_NR_mremap
:
4137 ret
= get_errno(target_mremap(arg1
, arg2
, arg3
, arg4
, arg5
));
4140 /* ??? msync/mlock/munlock are broken for softmmu. */
4141 #ifdef TARGET_NR_msync
4142 case TARGET_NR_msync
:
4143 ret
= get_errno(msync(g2h(arg1
), arg2
, arg3
));
4146 #ifdef TARGET_NR_mlock
4147 case TARGET_NR_mlock
:
4148 ret
= get_errno(mlock(g2h(arg1
), arg2
));
4151 #ifdef TARGET_NR_munlock
4152 case TARGET_NR_munlock
:
4153 ret
= get_errno(munlock(g2h(arg1
), arg2
));
4156 #ifdef TARGET_NR_mlockall
4157 case TARGET_NR_mlockall
:
4158 ret
= get_errno(mlockall(arg1
));
4161 #ifdef TARGET_NR_munlockall
4162 case TARGET_NR_munlockall
:
4163 ret
= get_errno(munlockall());
4166 case TARGET_NR_truncate
:
4167 if (!(p
= lock_user_string(arg1
)))
4169 ret
= get_errno(truncate(p
, arg2
));
4170 unlock_user(p
, arg1
, 0);
4172 case TARGET_NR_ftruncate
:
4173 ret
= get_errno(ftruncate(arg1
, arg2
));
4175 case TARGET_NR_fchmod
:
4176 ret
= get_errno(fchmod(arg1
, arg2
));
4178 #if defined(TARGET_NR_fchmodat) && defined(__NR_fchmodat)
4179 case TARGET_NR_fchmodat
:
4180 if (!(p
= lock_user_string(arg2
)))
4182 ret
= get_errno(sys_fchmodat(arg1
, p
, arg3
, arg4
));
4183 unlock_user(p
, arg2
, 0);
4186 case TARGET_NR_getpriority
:
4187 /* libc does special remapping of the return value of
4188 * sys_getpriority() so it's just easiest to call
4189 * sys_getpriority() directly rather than through libc. */
4190 ret
= sys_getpriority(arg1
, arg2
);
4192 case TARGET_NR_setpriority
:
4193 ret
= get_errno(setpriority(arg1
, arg2
, arg3
));
4195 #ifdef TARGET_NR_profil
4196 case TARGET_NR_profil
:
4199 case TARGET_NR_statfs
:
4200 if (!(p
= lock_user_string(arg1
)))
4202 ret
= get_errno(statfs(path(p
), &stfs
));
4203 unlock_user(p
, arg1
, 0);
4205 if (!is_error(ret
)) {
4206 struct target_statfs
*target_stfs
;
4208 if (!lock_user_struct(VERIFY_WRITE
, target_stfs
, arg2
, 0))
4210 __put_user(stfs
.f_type
, &target_stfs
->f_type
);
4211 __put_user(stfs
.f_bsize
, &target_stfs
->f_bsize
);
4212 __put_user(stfs
.f_blocks
, &target_stfs
->f_blocks
);
4213 __put_user(stfs
.f_bfree
, &target_stfs
->f_bfree
);
4214 __put_user(stfs
.f_bavail
, &target_stfs
->f_bavail
);
4215 __put_user(stfs
.f_files
, &target_stfs
->f_files
);
4216 __put_user(stfs
.f_ffree
, &target_stfs
->f_ffree
);
4217 __put_user(stfs
.f_fsid
.__val
[0], &target_stfs
->f_fsid
.val
[0]);
4218 __put_user(stfs
.f_fsid
.__val
[1], &target_stfs
->f_fsid
.val
[1]);
4219 __put_user(stfs
.f_namelen
, &target_stfs
->f_namelen
);
4220 unlock_user_struct(target_stfs
, arg2
, 1);
4223 case TARGET_NR_fstatfs
:
4224 ret
= get_errno(fstatfs(arg1
, &stfs
));
4225 goto convert_statfs
;
4226 #ifdef TARGET_NR_statfs64
4227 case TARGET_NR_statfs64
:
4228 if (!(p
= lock_user_string(arg1
)))
4230 ret
= get_errno(statfs(path(p
), &stfs
));
4231 unlock_user(p
, arg1
, 0);
4233 if (!is_error(ret
)) {
4234 struct target_statfs64
*target_stfs
;
4236 if (!lock_user_struct(VERIFY_WRITE
, target_stfs
, arg3
, 0))
4238 __put_user(stfs
.f_type
, &target_stfs
->f_type
);
4239 __put_user(stfs
.f_bsize
, &target_stfs
->f_bsize
);
4240 __put_user(stfs
.f_blocks
, &target_stfs
->f_blocks
);
4241 __put_user(stfs
.f_bfree
, &target_stfs
->f_bfree
);
4242 __put_user(stfs
.f_bavail
, &target_stfs
->f_bavail
);
4243 __put_user(stfs
.f_files
, &target_stfs
->f_files
);
4244 __put_user(stfs
.f_ffree
, &target_stfs
->f_ffree
);
4245 __put_user(stfs
.f_fsid
.__val
[0], &target_stfs
->f_fsid
.val
[0]);
4246 __put_user(stfs
.f_fsid
.__val
[1], &target_stfs
->f_fsid
.val
[1]);
4247 __put_user(stfs
.f_namelen
, &target_stfs
->f_namelen
);
4248 unlock_user_struct(target_stfs
, arg3
, 1);
4251 case TARGET_NR_fstatfs64
:
4252 ret
= get_errno(fstatfs(arg1
, &stfs
));
4253 goto convert_statfs64
;
4255 #ifdef TARGET_NR_ioperm
4256 case TARGET_NR_ioperm
:
4259 #ifdef TARGET_NR_socketcall
4260 case TARGET_NR_socketcall
:
4261 ret
= do_socketcall(arg1
, arg2
);
4264 #ifdef TARGET_NR_accept
4265 case TARGET_NR_accept
:
4266 ret
= do_accept(arg1
, arg2
, arg3
);
4269 #ifdef TARGET_NR_bind
4270 case TARGET_NR_bind
:
4271 ret
= do_bind(arg1
, arg2
, arg3
);
4274 #ifdef TARGET_NR_connect
4275 case TARGET_NR_connect
:
4276 ret
= do_connect(arg1
, arg2
, arg3
);
4279 #ifdef TARGET_NR_getpeername
4280 case TARGET_NR_getpeername
:
4281 ret
= do_getpeername(arg1
, arg2
, arg3
);
4284 #ifdef TARGET_NR_getsockname
4285 case TARGET_NR_getsockname
:
4286 ret
= do_getsockname(arg1
, arg2
, arg3
);
4289 #ifdef TARGET_NR_getsockopt
4290 case TARGET_NR_getsockopt
:
4291 ret
= do_getsockopt(arg1
, arg2
, arg3
, arg4
, arg5
);
4294 #ifdef TARGET_NR_listen
4295 case TARGET_NR_listen
:
4296 ret
= get_errno(listen(arg1
, arg2
));
4299 #ifdef TARGET_NR_recv
4300 case TARGET_NR_recv
:
4301 ret
= do_recvfrom(arg1
, arg2
, arg3
, arg4
, 0, 0);
4304 #ifdef TARGET_NR_recvfrom
4305 case TARGET_NR_recvfrom
:
4306 ret
= do_recvfrom(arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
4309 #ifdef TARGET_NR_recvmsg
4310 case TARGET_NR_recvmsg
:
4311 ret
= do_sendrecvmsg(arg1
, arg2
, arg3
, 0);
4314 #ifdef TARGET_NR_send
4315 case TARGET_NR_send
:
4316 ret
= do_sendto(arg1
, arg2
, arg3
, arg4
, 0, 0);
4319 #ifdef TARGET_NR_sendmsg
4320 case TARGET_NR_sendmsg
:
4321 ret
= do_sendrecvmsg(arg1
, arg2
, arg3
, 1);
4324 #ifdef TARGET_NR_sendto
4325 case TARGET_NR_sendto
:
4326 ret
= do_sendto(arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
4329 #ifdef TARGET_NR_shutdown
4330 case TARGET_NR_shutdown
:
4331 ret
= get_errno(shutdown(arg1
, arg2
));
4334 #ifdef TARGET_NR_socket
4335 case TARGET_NR_socket
:
4336 ret
= do_socket(arg1
, arg2
, arg3
);
4339 #ifdef TARGET_NR_socketpair
4340 case TARGET_NR_socketpair
:
4341 ret
= do_socketpair(arg1
, arg2
, arg3
, arg4
);
4344 #ifdef TARGET_NR_setsockopt
4345 case TARGET_NR_setsockopt
:
4346 ret
= do_setsockopt(arg1
, arg2
, arg3
, arg4
, (socklen_t
) arg5
);
4350 case TARGET_NR_syslog
:
4351 if (!(p
= lock_user_string(arg2
)))
4353 ret
= get_errno(sys_syslog((int)arg1
, p
, (int)arg3
));
4354 unlock_user(p
, arg2
, 0);
4357 case TARGET_NR_setitimer
:
4359 struct itimerval value
, ovalue
, *pvalue
;
4363 if (copy_from_user_timeval(&pvalue
->it_interval
, arg2
)
4364 || copy_from_user_timeval(&pvalue
->it_value
,
4365 arg2
+ sizeof(struct target_timeval
)))
4370 ret
= get_errno(setitimer(arg1
, pvalue
, &ovalue
));
4371 if (!is_error(ret
) && arg3
) {
4372 if (copy_to_user_timeval(arg3
,
4373 &ovalue
.it_interval
)
4374 || copy_to_user_timeval(arg3
+ sizeof(struct target_timeval
),
4380 case TARGET_NR_getitimer
:
4382 struct itimerval value
;
4384 ret
= get_errno(getitimer(arg1
, &value
));
4385 if (!is_error(ret
) && arg2
) {
4386 if (copy_to_user_timeval(arg2
,
4388 || copy_to_user_timeval(arg2
+ sizeof(struct target_timeval
),
4394 case TARGET_NR_stat
:
4395 if (!(p
= lock_user_string(arg1
)))
4397 ret
= get_errno(stat(path(p
), &st
));
4398 unlock_user(p
, arg1
, 0);
4400 case TARGET_NR_lstat
:
4401 if (!(p
= lock_user_string(arg1
)))
4403 ret
= get_errno(lstat(path(p
), &st
));
4404 unlock_user(p
, arg1
, 0);
4406 case TARGET_NR_fstat
:
4408 ret
= get_errno(fstat(arg1
, &st
));
4410 if (!is_error(ret
)) {
4411 struct target_stat
*target_st
;
4413 if (!lock_user_struct(VERIFY_WRITE
, target_st
, arg2
, 0))
4415 __put_user(st
.st_dev
, &target_st
->st_dev
);
4416 __put_user(st
.st_ino
, &target_st
->st_ino
);
4417 __put_user(st
.st_mode
, &target_st
->st_mode
);
4418 __put_user(st
.st_uid
, &target_st
->st_uid
);
4419 __put_user(st
.st_gid
, &target_st
->st_gid
);
4420 __put_user(st
.st_nlink
, &target_st
->st_nlink
);
4421 __put_user(st
.st_rdev
, &target_st
->st_rdev
);
4422 __put_user(st
.st_size
, &target_st
->st_size
);
4423 __put_user(st
.st_blksize
, &target_st
->st_blksize
);
4424 __put_user(st
.st_blocks
, &target_st
->st_blocks
);
4425 __put_user(st
.st_atime
, &target_st
->target_st_atime
);
4426 __put_user(st
.st_mtime
, &target_st
->target_st_mtime
);
4427 __put_user(st
.st_ctime
, &target_st
->target_st_ctime
);
4428 unlock_user_struct(target_st
, arg2
, 1);
4432 #ifdef TARGET_NR_olduname
4433 case TARGET_NR_olduname
:
4436 #ifdef TARGET_NR_iopl
4437 case TARGET_NR_iopl
:
4440 case TARGET_NR_vhangup
:
4441 ret
= get_errno(vhangup());
4443 #ifdef TARGET_NR_idle
4444 case TARGET_NR_idle
:
4447 #ifdef TARGET_NR_syscall
4448 case TARGET_NR_syscall
:
4449 ret
= do_syscall(cpu_env
,arg1
& 0xffff,arg2
,arg3
,arg4
,arg5
,arg6
,0);
4452 case TARGET_NR_wait4
:
4455 abi_long status_ptr
= arg2
;
4456 struct rusage rusage
, *rusage_ptr
;
4457 abi_ulong target_rusage
= arg4
;
4459 rusage_ptr
= &rusage
;
4462 ret
= get_errno(wait4(arg1
, &status
, arg3
, rusage_ptr
));
4463 if (!is_error(ret
)) {
4465 if (put_user_s32(status
, status_ptr
))
4469 host_to_target_rusage(target_rusage
, &rusage
);
4473 #ifdef TARGET_NR_swapoff
4474 case TARGET_NR_swapoff
:
4475 if (!(p
= lock_user_string(arg1
)))
4477 ret
= get_errno(swapoff(p
));
4478 unlock_user(p
, arg1
, 0);
4481 case TARGET_NR_sysinfo
:
4483 struct target_sysinfo
*target_value
;
4484 struct sysinfo value
;
4485 ret
= get_errno(sysinfo(&value
));
4486 if (!is_error(ret
) && arg1
)
4488 if (!lock_user_struct(VERIFY_WRITE
, target_value
, arg1
, 0))
4490 __put_user(value
.uptime
, &target_value
->uptime
);
4491 __put_user(value
.loads
[0], &target_value
->loads
[0]);
4492 __put_user(value
.loads
[1], &target_value
->loads
[1]);
4493 __put_user(value
.loads
[2], &target_value
->loads
[2]);
4494 __put_user(value
.totalram
, &target_value
->totalram
);
4495 __put_user(value
.freeram
, &target_value
->freeram
);
4496 __put_user(value
.sharedram
, &target_value
->sharedram
);
4497 __put_user(value
.bufferram
, &target_value
->bufferram
);
4498 __put_user(value
.totalswap
, &target_value
->totalswap
);
4499 __put_user(value
.freeswap
, &target_value
->freeswap
);
4500 __put_user(value
.procs
, &target_value
->procs
);
4501 __put_user(value
.totalhigh
, &target_value
->totalhigh
);
4502 __put_user(value
.freehigh
, &target_value
->freehigh
);
4503 __put_user(value
.mem_unit
, &target_value
->mem_unit
);
4504 unlock_user_struct(target_value
, arg1
, 1);
4508 #ifdef TARGET_NR_ipc
4510 ret
= do_ipc(arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
4513 case TARGET_NR_fsync
:
4514 ret
= get_errno(fsync(arg1
));
4516 case TARGET_NR_clone
:
4517 ret
= get_errno(do_fork(cpu_env
, arg1
, arg2
));
4519 #ifdef __NR_exit_group
4520 /* new thread calls */
4521 case TARGET_NR_exit_group
:
4522 gdb_exit(cpu_env
, arg1
);
4523 ret
= get_errno(exit_group(arg1
));
4526 case TARGET_NR_setdomainname
:
4527 if (!(p
= lock_user_string(arg1
)))
4529 ret
= get_errno(setdomainname(p
, arg2
));
4530 unlock_user(p
, arg1
, 0);
4532 case TARGET_NR_uname
:
4533 /* no need to transcode because we use the linux syscall */
4535 struct new_utsname
* buf
;
4537 if (!lock_user_struct(VERIFY_WRITE
, buf
, arg1
, 0))
4539 ret
= get_errno(sys_uname(buf
));
4540 if (!is_error(ret
)) {
4541 /* Overrite the native machine name with whatever is being
4543 strcpy (buf
->machine
, UNAME_MACHINE
);
4544 /* Allow the user to override the reported release. */
4545 if (qemu_uname_release
&& *qemu_uname_release
)
4546 strcpy (buf
->release
, qemu_uname_release
);
4548 unlock_user_struct(buf
, arg1
, 1);
4552 case TARGET_NR_modify_ldt
:
4553 ret
= do_modify_ldt(cpu_env
, arg1
, arg2
, arg3
);
4555 #if !defined(TARGET_X86_64)
4556 case TARGET_NR_vm86old
:
4558 case TARGET_NR_vm86
:
4559 ret
= do_vm86(cpu_env
, arg1
, arg2
);
4563 case TARGET_NR_adjtimex
:
4565 #ifdef TARGET_NR_create_module
4566 case TARGET_NR_create_module
:
4568 case TARGET_NR_init_module
:
4569 case TARGET_NR_delete_module
:
4570 #ifdef TARGET_NR_get_kernel_syms
4571 case TARGET_NR_get_kernel_syms
:
4574 case TARGET_NR_quotactl
:
4576 case TARGET_NR_getpgid
:
4577 ret
= get_errno(getpgid(arg1
));
4579 case TARGET_NR_fchdir
:
4580 ret
= get_errno(fchdir(arg1
));
4582 #ifdef TARGET_NR_bdflush /* not on x86_64 */
4583 case TARGET_NR_bdflush
:
4586 #ifdef TARGET_NR_sysfs
4587 case TARGET_NR_sysfs
:
4590 case TARGET_NR_personality
:
4591 ret
= get_errno(personality(arg1
));
4593 #ifdef TARGET_NR_afs_syscall
4594 case TARGET_NR_afs_syscall
:
4597 #ifdef TARGET_NR__llseek /* Not on alpha */
4598 case TARGET_NR__llseek
:
4600 #if defined (__x86_64__)
4601 ret
= get_errno(lseek(arg1
, ((uint64_t )arg2
<< 32) | arg3
, arg5
));
4602 if (put_user_s64(ret
, arg4
))
4606 ret
= get_errno(_llseek(arg1
, arg2
, arg3
, &res
, arg5
));
4607 if (put_user_s64(res
, arg4
))
4613 case TARGET_NR_getdents
:
4614 #if TARGET_ABI_BITS != 32
4616 #elif TARGET_ABI_BITS == 32 && HOST_LONG_BITS == 64
4618 struct target_dirent
*target_dirp
;
4619 struct dirent
*dirp
;
4620 abi_long count
= arg3
;
4622 dirp
= malloc(count
);
4624 ret
= -TARGET_ENOMEM
;
4628 ret
= get_errno(sys_getdents(arg1
, dirp
, count
));
4629 if (!is_error(ret
)) {
4631 struct target_dirent
*tde
;
4633 int reclen
, treclen
;
4634 int count1
, tnamelen
;
4638 if (!(target_dirp
= lock_user(VERIFY_WRITE
, arg2
, count
, 0)))
4642 reclen
= de
->d_reclen
;
4643 treclen
= reclen
- (2 * (sizeof(long) - sizeof(abi_long
)));
4644 tde
->d_reclen
= tswap16(treclen
);
4645 tde
->d_ino
= tswapl(de
->d_ino
);
4646 tde
->d_off
= tswapl(de
->d_off
);
4647 tnamelen
= treclen
- (2 * sizeof(abi_long
) + 2);
4650 /* XXX: may not be correct */
4651 strncpy(tde
->d_name
, de
->d_name
, tnamelen
);
4652 de
= (struct dirent
*)((char *)de
+ reclen
);
4654 tde
= (struct target_dirent
*)((char *)tde
+ treclen
);
4658 unlock_user(target_dirp
, arg2
, ret
);
4664 struct dirent
*dirp
;
4665 abi_long count
= arg3
;
4667 if (!(dirp
= lock_user(VERIFY_WRITE
, arg2
, count
, 0)))
4669 ret
= get_errno(sys_getdents(arg1
, dirp
, count
));
4670 if (!is_error(ret
)) {
4676 reclen
= de
->d_reclen
;
4679 de
->d_reclen
= tswap16(reclen
);
4680 tswapls(&de
->d_ino
);
4681 tswapls(&de
->d_off
);
4682 de
= (struct dirent
*)((char *)de
+ reclen
);
4686 unlock_user(dirp
, arg2
, ret
);
4690 #if defined(TARGET_NR_getdents64) && defined(__NR_getdents64)
4691 case TARGET_NR_getdents64
:
4693 struct dirent64
*dirp
;
4694 abi_long count
= arg3
;
4695 if (!(dirp
= lock_user(VERIFY_WRITE
, arg2
, count
, 0)))
4697 ret
= get_errno(sys_getdents64(arg1
, dirp
, count
));
4698 if (!is_error(ret
)) {
4699 struct dirent64
*de
;
4704 reclen
= de
->d_reclen
;
4707 de
->d_reclen
= tswap16(reclen
);
4708 tswap64s((uint64_t *)&de
->d_ino
);
4709 tswap64s((uint64_t *)&de
->d_off
);
4710 de
= (struct dirent64
*)((char *)de
+ reclen
);
4714 unlock_user(dirp
, arg2
, ret
);
4717 #endif /* TARGET_NR_getdents64 */
4718 #ifdef TARGET_NR__newselect
4719 case TARGET_NR__newselect
:
4720 ret
= do_select(arg1
, arg2
, arg3
, arg4
, arg5
);
4723 #ifdef TARGET_NR_poll
4724 case TARGET_NR_poll
:
4726 struct target_pollfd
*target_pfd
;
4727 unsigned int nfds
= arg2
;
4732 target_pfd
= lock_user(VERIFY_WRITE
, arg1
, sizeof(struct target_pollfd
) * nfds
, 1);
4735 pfd
= alloca(sizeof(struct pollfd
) * nfds
);
4736 for(i
= 0; i
< nfds
; i
++) {
4737 pfd
[i
].fd
= tswap32(target_pfd
[i
].fd
);
4738 pfd
[i
].events
= tswap16(target_pfd
[i
].events
);
4740 ret
= get_errno(poll(pfd
, nfds
, timeout
));
4741 if (!is_error(ret
)) {
4742 for(i
= 0; i
< nfds
; i
++) {
4743 target_pfd
[i
].revents
= tswap16(pfd
[i
].revents
);
4745 ret
+= nfds
* (sizeof(struct target_pollfd
)
4746 - sizeof(struct pollfd
));
4748 unlock_user(target_pfd
, arg1
, ret
);
4752 case TARGET_NR_flock
:
4753 /* NOTE: the flock constant seems to be the same for every
4755 ret
= get_errno(flock(arg1
, arg2
));
4757 case TARGET_NR_readv
:
4762 vec
= alloca(count
* sizeof(struct iovec
));
4763 if (lock_iovec(VERIFY_WRITE
, vec
, arg2
, count
, 0) < 0)
4765 ret
= get_errno(readv(arg1
, vec
, count
));
4766 unlock_iovec(vec
, arg2
, count
, 1);
4769 case TARGET_NR_writev
:
4774 vec
= alloca(count
* sizeof(struct iovec
));
4775 if (lock_iovec(VERIFY_READ
, vec
, arg2
, count
, 1) < 0)
4777 ret
= get_errno(writev(arg1
, vec
, count
));
4778 unlock_iovec(vec
, arg2
, count
, 0);
4781 case TARGET_NR_getsid
:
4782 ret
= get_errno(getsid(arg1
));
4784 #if defined(TARGET_NR_fdatasync) /* Not on alpha (osf_datasync ?) */
4785 case TARGET_NR_fdatasync
:
4786 ret
= get_errno(fdatasync(arg1
));
4789 case TARGET_NR__sysctl
:
4790 /* We don't implement this, but ENOTDIR is always a safe
4792 ret
= -TARGET_ENOTDIR
;
4794 case TARGET_NR_sched_setparam
:
4796 struct sched_param
*target_schp
;
4797 struct sched_param schp
;
4799 if (!lock_user_struct(VERIFY_READ
, target_schp
, arg2
, 1))
4801 schp
.sched_priority
= tswap32(target_schp
->sched_priority
);
4802 unlock_user_struct(target_schp
, arg2
, 0);
4803 ret
= get_errno(sched_setparam(arg1
, &schp
));
4806 case TARGET_NR_sched_getparam
:
4808 struct sched_param
*target_schp
;
4809 struct sched_param schp
;
4810 ret
= get_errno(sched_getparam(arg1
, &schp
));
4811 if (!is_error(ret
)) {
4812 if (!lock_user_struct(VERIFY_WRITE
, target_schp
, arg2
, 0))
4814 target_schp
->sched_priority
= tswap32(schp
.sched_priority
);
4815 unlock_user_struct(target_schp
, arg2
, 1);
4819 case TARGET_NR_sched_setscheduler
:
4821 struct sched_param
*target_schp
;
4822 struct sched_param schp
;
4823 if (!lock_user_struct(VERIFY_READ
, target_schp
, arg3
, 1))
4825 schp
.sched_priority
= tswap32(target_schp
->sched_priority
);
4826 unlock_user_struct(target_schp
, arg3
, 0);
4827 ret
= get_errno(sched_setscheduler(arg1
, arg2
, &schp
));
4830 case TARGET_NR_sched_getscheduler
:
4831 ret
= get_errno(sched_getscheduler(arg1
));
4833 case TARGET_NR_sched_yield
:
4834 ret
= get_errno(sched_yield());
4836 case TARGET_NR_sched_get_priority_max
:
4837 ret
= get_errno(sched_get_priority_max(arg1
));
4839 case TARGET_NR_sched_get_priority_min
:
4840 ret
= get_errno(sched_get_priority_min(arg1
));
4842 case TARGET_NR_sched_rr_get_interval
:
4845 ret
= get_errno(sched_rr_get_interval(arg1
, &ts
));
4846 if (!is_error(ret
)) {
4847 host_to_target_timespec(arg2
, &ts
);
4851 case TARGET_NR_nanosleep
:
4853 struct timespec req
, rem
;
4854 target_to_host_timespec(&req
, arg1
);
4855 ret
= get_errno(nanosleep(&req
, &rem
));
4856 if (is_error(ret
) && arg2
) {
4857 host_to_target_timespec(arg2
, &rem
);
4861 #ifdef TARGET_NR_query_module
4862 case TARGET_NR_query_module
:
4865 #ifdef TARGET_NR_nfsservctl
4866 case TARGET_NR_nfsservctl
:
4869 case TARGET_NR_prctl
:
4872 case PR_GET_PDEATHSIG
:
4875 ret
= get_errno(prctl(arg1
, &deathsig
, arg3
, arg4
, arg5
));
4876 if (!is_error(ret
) && arg2
4877 && put_user_ual(deathsig
, arg2
))
4882 ret
= get_errno(prctl(arg1
, arg2
, arg3
, arg4
, arg5
));
4886 #ifdef TARGET_NR_arch_prctl
4887 case TARGET_NR_arch_prctl
:
4888 #if defined(TARGET_I386) && !defined(TARGET_ABI32)
4889 ret
= do_arch_prctl(cpu_env
, arg1
, arg2
);
4895 #ifdef TARGET_NR_pread
4896 case TARGET_NR_pread
:
4897 if (!(p
= lock_user(VERIFY_WRITE
, arg2
, arg3
, 0)))
4899 ret
= get_errno(pread(arg1
, p
, arg3
, arg4
));
4900 unlock_user(p
, arg2
, ret
);
4902 case TARGET_NR_pwrite
:
4903 if (!(p
= lock_user(VERIFY_READ
, arg2
, arg3
, 1)))
4905 ret
= get_errno(pwrite(arg1
, p
, arg3
, arg4
));
4906 unlock_user(p
, arg2
, 0);
4909 #ifdef TARGET_NR_pread64
4910 case TARGET_NR_pread64
:
4911 if (!(p
= lock_user(VERIFY_WRITE
, arg2
, arg3
, 0)))
4913 ret
= get_errno(pread64(arg1
, p
, arg3
, target_offset64(arg4
, arg5
)));
4914 unlock_user(p
, arg2
, ret
);
4916 case TARGET_NR_pwrite64
:
4917 if (!(p
= lock_user(VERIFY_READ
, arg2
, arg3
, 1)))
4919 ret
= get_errno(pwrite64(arg1
, p
, arg3
, target_offset64(arg4
, arg5
)));
4920 unlock_user(p
, arg2
, 0);
4923 case TARGET_NR_getcwd
:
4924 if (!(p
= lock_user(VERIFY_WRITE
, arg1
, arg2
, 0)))
4926 ret
= get_errno(sys_getcwd1(p
, arg2
));
4927 unlock_user(p
, arg1
, ret
);
4929 case TARGET_NR_capget
:
4931 case TARGET_NR_capset
:
4933 case TARGET_NR_sigaltstack
:
4934 #if defined(TARGET_I386) || defined(TARGET_ARM) || defined(TARGET_MIPS) || \
4935 defined(TARGET_SPARC) || defined(TARGET_PPC) || defined(TARGET_ALPHA)
4936 ret
= do_sigaltstack(arg1
, arg2
, get_sp_from_cpustate((CPUState
*)cpu_env
));
4941 case TARGET_NR_sendfile
:
4943 #ifdef TARGET_NR_getpmsg
4944 case TARGET_NR_getpmsg
:
4947 #ifdef TARGET_NR_putpmsg
4948 case TARGET_NR_putpmsg
:
4951 #ifdef TARGET_NR_vfork
4952 case TARGET_NR_vfork
:
4953 ret
= get_errno(do_fork(cpu_env
, CLONE_VFORK
| CLONE_VM
| SIGCHLD
, 0));
4956 #ifdef TARGET_NR_ugetrlimit
4957 case TARGET_NR_ugetrlimit
:
4960 ret
= get_errno(getrlimit(arg1
, &rlim
));
4961 if (!is_error(ret
)) {
4962 struct target_rlimit
*target_rlim
;
4963 if (!lock_user_struct(VERIFY_WRITE
, target_rlim
, arg2
, 0))
4965 target_rlim
->rlim_cur
= tswapl(rlim
.rlim_cur
);
4966 target_rlim
->rlim_max
= tswapl(rlim
.rlim_max
);
4967 unlock_user_struct(target_rlim
, arg2
, 1);
4972 #ifdef TARGET_NR_truncate64
4973 case TARGET_NR_truncate64
:
4974 if (!(p
= lock_user_string(arg1
)))
4976 ret
= target_truncate64(cpu_env
, p
, arg2
, arg3
, arg4
);
4977 unlock_user(p
, arg1
, 0);
4980 #ifdef TARGET_NR_ftruncate64
4981 case TARGET_NR_ftruncate64
:
4982 ret
= target_ftruncate64(cpu_env
, arg1
, arg2
, arg3
, arg4
);
4985 #ifdef TARGET_NR_stat64
4986 case TARGET_NR_stat64
:
4987 if (!(p
= lock_user_string(arg1
)))
4989 ret
= get_errno(stat(path(p
), &st
));
4990 unlock_user(p
, arg1
, 0);
4993 #ifdef TARGET_NR_lstat64
4994 case TARGET_NR_lstat64
:
4995 if (!(p
= lock_user_string(arg1
)))
4997 ret
= get_errno(lstat(path(p
), &st
));
4998 unlock_user(p
, arg1
, 0);
5001 #ifdef TARGET_NR_fstat64
5002 case TARGET_NR_fstat64
:
5004 ret
= get_errno(fstat(arg1
, &st
));
5006 if (!is_error(ret
)) {
5008 if (((CPUARMState
*)cpu_env
)->eabi
) {
5009 struct target_eabi_stat64
*target_st
;
5011 if (!lock_user_struct(VERIFY_WRITE
, target_st
, arg2
, 0))
5013 memset(target_st
, 0, sizeof(struct target_eabi_stat64
));
5014 __put_user(st
.st_dev
, &target_st
->st_dev
);
5015 __put_user(st
.st_ino
, &target_st
->st_ino
);
5016 #ifdef TARGET_STAT64_HAS_BROKEN_ST_INO
5017 __put_user(st
.st_ino
, &target_st
->__st_ino
);
5019 __put_user(st
.st_mode
, &target_st
->st_mode
);
5020 __put_user(st
.st_nlink
, &target_st
->st_nlink
);
5021 __put_user(st
.st_uid
, &target_st
->st_uid
);
5022 __put_user(st
.st_gid
, &target_st
->st_gid
);
5023 __put_user(st
.st_rdev
, &target_st
->st_rdev
);
5024 __put_user(st
.st_size
, &target_st
->st_size
);
5025 __put_user(st
.st_blksize
, &target_st
->st_blksize
);
5026 __put_user(st
.st_blocks
, &target_st
->st_blocks
);
5027 __put_user(st
.st_atime
, &target_st
->target_st_atime
);
5028 __put_user(st
.st_mtime
, &target_st
->target_st_mtime
);
5029 __put_user(st
.st_ctime
, &target_st
->target_st_ctime
);
5030 unlock_user_struct(target_st
, arg2
, 1);
5034 struct target_stat64
*target_st
;
5036 if (!lock_user_struct(VERIFY_WRITE
, target_st
, arg2
, 0))
5038 memset(target_st
, 0, sizeof(struct target_stat64
));
5039 __put_user(st
.st_dev
, &target_st
->st_dev
);
5040 __put_user(st
.st_ino
, &target_st
->st_ino
);
5041 #ifdef TARGET_STAT64_HAS_BROKEN_ST_INO
5042 __put_user(st
.st_ino
, &target_st
->__st_ino
);
5044 __put_user(st
.st_mode
, &target_st
->st_mode
);
5045 __put_user(st
.st_nlink
, &target_st
->st_nlink
);
5046 __put_user(st
.st_uid
, &target_st
->st_uid
);
5047 __put_user(st
.st_gid
, &target_st
->st_gid
);
5048 __put_user(st
.st_rdev
, &target_st
->st_rdev
);
5049 /* XXX: better use of kernel struct */
5050 __put_user(st
.st_size
, &target_st
->st_size
);
5051 __put_user(st
.st_blksize
, &target_st
->st_blksize
);
5052 __put_user(st
.st_blocks
, &target_st
->st_blocks
);
5053 __put_user(st
.st_atime
, &target_st
->target_st_atime
);
5054 __put_user(st
.st_mtime
, &target_st
->target_st_mtime
);
5055 __put_user(st
.st_ctime
, &target_st
->target_st_ctime
);
5056 unlock_user_struct(target_st
, arg2
, 1);
5063 case TARGET_NR_lchown
:
5064 if (!(p
= lock_user_string(arg1
)))
5066 ret
= get_errno(lchown(p
, low2highuid(arg2
), low2highgid(arg3
)));
5067 unlock_user(p
, arg1
, 0);
5069 case TARGET_NR_getuid
:
5070 ret
= get_errno(high2lowuid(getuid()));
5072 case TARGET_NR_getgid
:
5073 ret
= get_errno(high2lowgid(getgid()));
5075 case TARGET_NR_geteuid
:
5076 ret
= get_errno(high2lowuid(geteuid()));
5078 case TARGET_NR_getegid
:
5079 ret
= get_errno(high2lowgid(getegid()));
5081 case TARGET_NR_setreuid
:
5082 ret
= get_errno(setreuid(low2highuid(arg1
), low2highuid(arg2
)));
5084 case TARGET_NR_setregid
:
5085 ret
= get_errno(setregid(low2highgid(arg1
), low2highgid(arg2
)));
5087 case TARGET_NR_getgroups
:
5089 int gidsetsize
= arg1
;
5090 uint16_t *target_grouplist
;
5094 grouplist
= alloca(gidsetsize
* sizeof(gid_t
));
5095 ret
= get_errno(getgroups(gidsetsize
, grouplist
));
5096 if (!is_error(ret
)) {
5097 target_grouplist
= lock_user(VERIFY_WRITE
, arg2
, gidsetsize
* 2, 0);
5098 if (!target_grouplist
)
5100 for(i
= 0;i
< gidsetsize
; i
++)
5101 target_grouplist
[i
] = tswap16(grouplist
[i
]);
5102 unlock_user(target_grouplist
, arg2
, gidsetsize
* 2);
5106 case TARGET_NR_setgroups
:
5108 int gidsetsize
= arg1
;
5109 uint16_t *target_grouplist
;
5113 grouplist
= alloca(gidsetsize
* sizeof(gid_t
));
5114 target_grouplist
= lock_user(VERIFY_READ
, arg2
, gidsetsize
* 2, 1);
5115 if (!target_grouplist
) {
5116 ret
= -TARGET_EFAULT
;
5119 for(i
= 0;i
< gidsetsize
; i
++)
5120 grouplist
[i
] = tswap16(target_grouplist
[i
]);
5121 unlock_user(target_grouplist
, arg2
, 0);
5122 ret
= get_errno(setgroups(gidsetsize
, grouplist
));
5125 case TARGET_NR_fchown
:
5126 ret
= get_errno(fchown(arg1
, low2highuid(arg2
), low2highgid(arg3
)));
5128 #if defined(TARGET_NR_fchownat) && defined(__NR_fchownat)
5129 case TARGET_NR_fchownat
:
5130 if (!(p
= lock_user_string(arg2
)))
5132 ret
= get_errno(sys_fchownat(arg1
, p
, low2highuid(arg3
), low2highgid(arg4
), arg5
));
5133 unlock_user(p
, arg2
, 0);
5136 #ifdef TARGET_NR_setresuid
5137 case TARGET_NR_setresuid
:
5138 ret
= get_errno(setresuid(low2highuid(arg1
),
5140 low2highuid(arg3
)));
5143 #ifdef TARGET_NR_getresuid
5144 case TARGET_NR_getresuid
:
5146 uid_t ruid
, euid
, suid
;
5147 ret
= get_errno(getresuid(&ruid
, &euid
, &suid
));
5148 if (!is_error(ret
)) {
5149 if (put_user_u16(high2lowuid(ruid
), arg1
)
5150 || put_user_u16(high2lowuid(euid
), arg2
)
5151 || put_user_u16(high2lowuid(suid
), arg3
))
5157 #ifdef TARGET_NR_getresgid
5158 case TARGET_NR_setresgid
:
5159 ret
= get_errno(setresgid(low2highgid(arg1
),
5161 low2highgid(arg3
)));
5164 #ifdef TARGET_NR_getresgid
5165 case TARGET_NR_getresgid
:
5167 gid_t rgid
, egid
, sgid
;
5168 ret
= get_errno(getresgid(&rgid
, &egid
, &sgid
));
5169 if (!is_error(ret
)) {
5170 if (put_user_u16(high2lowgid(rgid
), arg1
)
5171 || put_user_u16(high2lowgid(egid
), arg2
)
5172 || put_user_u16(high2lowgid(sgid
), arg3
))
5178 case TARGET_NR_chown
:
5179 if (!(p
= lock_user_string(arg1
)))
5181 ret
= get_errno(chown(p
, low2highuid(arg2
), low2highgid(arg3
)));
5182 unlock_user(p
, arg1
, 0);
5184 case TARGET_NR_setuid
:
5185 ret
= get_errno(setuid(low2highuid(arg1
)));
5187 case TARGET_NR_setgid
:
5188 ret
= get_errno(setgid(low2highgid(arg1
)));
5190 case TARGET_NR_setfsuid
:
5191 ret
= get_errno(setfsuid(arg1
));
5193 case TARGET_NR_setfsgid
:
5194 ret
= get_errno(setfsgid(arg1
));
5196 #endif /* USE_UID16 */
5198 #ifdef TARGET_NR_lchown32
5199 case TARGET_NR_lchown32
:
5200 if (!(p
= lock_user_string(arg1
)))
5202 ret
= get_errno(lchown(p
, arg2
, arg3
));
5203 unlock_user(p
, arg1
, 0);
5206 #ifdef TARGET_NR_getuid32
5207 case TARGET_NR_getuid32
:
5208 ret
= get_errno(getuid());
5211 #ifdef TARGET_NR_getgid32
5212 case TARGET_NR_getgid32
:
5213 ret
= get_errno(getgid());
5216 #ifdef TARGET_NR_geteuid32
5217 case TARGET_NR_geteuid32
:
5218 ret
= get_errno(geteuid());
5221 #ifdef TARGET_NR_getegid32
5222 case TARGET_NR_getegid32
:
5223 ret
= get_errno(getegid());
5226 #ifdef TARGET_NR_setreuid32
5227 case TARGET_NR_setreuid32
:
5228 ret
= get_errno(setreuid(arg1
, arg2
));
5231 #ifdef TARGET_NR_setregid32
5232 case TARGET_NR_setregid32
:
5233 ret
= get_errno(setregid(arg1
, arg2
));
5236 #ifdef TARGET_NR_getgroups32
5237 case TARGET_NR_getgroups32
:
5239 int gidsetsize
= arg1
;
5240 uint32_t *target_grouplist
;
5244 grouplist
= alloca(gidsetsize
* sizeof(gid_t
));
5245 ret
= get_errno(getgroups(gidsetsize
, grouplist
));
5246 if (!is_error(ret
)) {
5247 target_grouplist
= lock_user(VERIFY_WRITE
, arg2
, gidsetsize
* 4, 0);
5248 if (!target_grouplist
) {
5249 ret
= -TARGET_EFAULT
;
5252 for(i
= 0;i
< gidsetsize
; i
++)
5253 target_grouplist
[i
] = tswap32(grouplist
[i
]);
5254 unlock_user(target_grouplist
, arg2
, gidsetsize
* 4);
5259 #ifdef TARGET_NR_setgroups32
5260 case TARGET_NR_setgroups32
:
5262 int gidsetsize
= arg1
;
5263 uint32_t *target_grouplist
;
5267 grouplist
= alloca(gidsetsize
* sizeof(gid_t
));
5268 target_grouplist
= lock_user(VERIFY_READ
, arg2
, gidsetsize
* 4, 1);
5269 if (!target_grouplist
) {
5270 ret
= -TARGET_EFAULT
;
5273 for(i
= 0;i
< gidsetsize
; i
++)
5274 grouplist
[i
] = tswap32(target_grouplist
[i
]);
5275 unlock_user(target_grouplist
, arg2
, 0);
5276 ret
= get_errno(setgroups(gidsetsize
, grouplist
));
5280 #ifdef TARGET_NR_fchown32
5281 case TARGET_NR_fchown32
:
5282 ret
= get_errno(fchown(arg1
, arg2
, arg3
));
5285 #ifdef TARGET_NR_setresuid32
5286 case TARGET_NR_setresuid32
:
5287 ret
= get_errno(setresuid(arg1
, arg2
, arg3
));
5290 #ifdef TARGET_NR_getresuid32
5291 case TARGET_NR_getresuid32
:
5293 uid_t ruid
, euid
, suid
;
5294 ret
= get_errno(getresuid(&ruid
, &euid
, &suid
));
5295 if (!is_error(ret
)) {
5296 if (put_user_u32(ruid
, arg1
)
5297 || put_user_u32(euid
, arg2
)
5298 || put_user_u32(suid
, arg3
))
5304 #ifdef TARGET_NR_setresgid32
5305 case TARGET_NR_setresgid32
:
5306 ret
= get_errno(setresgid(arg1
, arg2
, arg3
));
5309 #ifdef TARGET_NR_getresgid32
5310 case TARGET_NR_getresgid32
:
5312 gid_t rgid
, egid
, sgid
;
5313 ret
= get_errno(getresgid(&rgid
, &egid
, &sgid
));
5314 if (!is_error(ret
)) {
5315 if (put_user_u32(rgid
, arg1
)
5316 || put_user_u32(egid
, arg2
)
5317 || put_user_u32(sgid
, arg3
))
5323 #ifdef TARGET_NR_chown32
5324 case TARGET_NR_chown32
:
5325 if (!(p
= lock_user_string(arg1
)))
5327 ret
= get_errno(chown(p
, arg2
, arg3
));
5328 unlock_user(p
, arg1
, 0);
5331 #ifdef TARGET_NR_setuid32
5332 case TARGET_NR_setuid32
:
5333 ret
= get_errno(setuid(arg1
));
5336 #ifdef TARGET_NR_setgid32
5337 case TARGET_NR_setgid32
:
5338 ret
= get_errno(setgid(arg1
));
5341 #ifdef TARGET_NR_setfsuid32
5342 case TARGET_NR_setfsuid32
:
5343 ret
= get_errno(setfsuid(arg1
));
5346 #ifdef TARGET_NR_setfsgid32
5347 case TARGET_NR_setfsgid32
:
5348 ret
= get_errno(setfsgid(arg1
));
5352 case TARGET_NR_pivot_root
:
5354 #ifdef TARGET_NR_mincore
5355 case TARGET_NR_mincore
:
5358 #ifdef TARGET_NR_madvise
5359 case TARGET_NR_madvise
:
5360 /* A straight passthrough may not be safe because qemu sometimes
5361 turns private flie-backed mappings into anonymous mappings.
5362 This will break MADV_DONTNEED.
5363 This is a hint, so ignoring and returning success is ok. */
5367 #if TARGET_ABI_BITS == 32
5368 case TARGET_NR_fcntl64
:
5372 struct target_flock64
*target_fl
;
5374 struct target_eabi_flock64
*target_efl
;
5378 case TARGET_F_GETLK64
:
5381 case TARGET_F_SETLK64
:
5384 case TARGET_F_SETLKW64
:
5393 case TARGET_F_GETLK64
:
5395 if (((CPUARMState
*)cpu_env
)->eabi
) {
5396 if (!lock_user_struct(VERIFY_READ
, target_efl
, arg3
, 1))
5398 fl
.l_type
= tswap16(target_efl
->l_type
);
5399 fl
.l_whence
= tswap16(target_efl
->l_whence
);
5400 fl
.l_start
= tswap64(target_efl
->l_start
);
5401 fl
.l_len
= tswap64(target_efl
->l_len
);
5402 fl
.l_pid
= tswapl(target_efl
->l_pid
);
5403 unlock_user_struct(target_efl
, arg3
, 0);
5407 if (!lock_user_struct(VERIFY_READ
, target_fl
, arg3
, 1))
5409 fl
.l_type
= tswap16(target_fl
->l_type
);
5410 fl
.l_whence
= tswap16(target_fl
->l_whence
);
5411 fl
.l_start
= tswap64(target_fl
->l_start
);
5412 fl
.l_len
= tswap64(target_fl
->l_len
);
5413 fl
.l_pid
= tswapl(target_fl
->l_pid
);
5414 unlock_user_struct(target_fl
, arg3
, 0);
5416 ret
= get_errno(fcntl(arg1
, cmd
, &fl
));
5419 if (((CPUARMState
*)cpu_env
)->eabi
) {
5420 if (!lock_user_struct(VERIFY_WRITE
, target_efl
, arg3
, 0))
5422 target_efl
->l_type
= tswap16(fl
.l_type
);
5423 target_efl
->l_whence
= tswap16(fl
.l_whence
);
5424 target_efl
->l_start
= tswap64(fl
.l_start
);
5425 target_efl
->l_len
= tswap64(fl
.l_len
);
5426 target_efl
->l_pid
= tswapl(fl
.l_pid
);
5427 unlock_user_struct(target_efl
, arg3
, 1);
5431 if (!lock_user_struct(VERIFY_WRITE
, target_fl
, arg3
, 0))
5433 target_fl
->l_type
= tswap16(fl
.l_type
);
5434 target_fl
->l_whence
= tswap16(fl
.l_whence
);
5435 target_fl
->l_start
= tswap64(fl
.l_start
);
5436 target_fl
->l_len
= tswap64(fl
.l_len
);
5437 target_fl
->l_pid
= tswapl(fl
.l_pid
);
5438 unlock_user_struct(target_fl
, arg3
, 1);
5443 case TARGET_F_SETLK64
:
5444 case TARGET_F_SETLKW64
:
5446 if (((CPUARMState
*)cpu_env
)->eabi
) {
5447 if (!lock_user_struct(VERIFY_READ
, target_efl
, arg3
, 1))
5449 fl
.l_type
= tswap16(target_efl
->l_type
);
5450 fl
.l_whence
= tswap16(target_efl
->l_whence
);
5451 fl
.l_start
= tswap64(target_efl
->l_start
);
5452 fl
.l_len
= tswap64(target_efl
->l_len
);
5453 fl
.l_pid
= tswapl(target_efl
->l_pid
);
5454 unlock_user_struct(target_efl
, arg3
, 0);
5458 if (!lock_user_struct(VERIFY_READ
, target_fl
, arg3
, 1))
5460 fl
.l_type
= tswap16(target_fl
->l_type
);
5461 fl
.l_whence
= tswap16(target_fl
->l_whence
);
5462 fl
.l_start
= tswap64(target_fl
->l_start
);
5463 fl
.l_len
= tswap64(target_fl
->l_len
);
5464 fl
.l_pid
= tswapl(target_fl
->l_pid
);
5465 unlock_user_struct(target_fl
, arg3
, 0);
5467 ret
= get_errno(fcntl(arg1
, cmd
, &fl
));
5470 ret
= do_fcntl(arg1
, cmd
, arg3
);
5476 #ifdef TARGET_NR_cacheflush
5477 case TARGET_NR_cacheflush
:
5478 /* self-modifying code is handled automatically, so nothing needed */
5482 #ifdef TARGET_NR_security
5483 case TARGET_NR_security
:
5486 #ifdef TARGET_NR_getpagesize
5487 case TARGET_NR_getpagesize
:
5488 ret
= TARGET_PAGE_SIZE
;
5491 case TARGET_NR_gettid
:
5492 ret
= get_errno(gettid());
5494 #ifdef TARGET_NR_readahead
5495 case TARGET_NR_readahead
:
5498 #ifdef TARGET_NR_setxattr
5499 case TARGET_NR_setxattr
:
5500 case TARGET_NR_lsetxattr
:
5501 case TARGET_NR_fsetxattr
:
5502 case TARGET_NR_getxattr
:
5503 case TARGET_NR_lgetxattr
:
5504 case TARGET_NR_fgetxattr
:
5505 case TARGET_NR_listxattr
:
5506 case TARGET_NR_llistxattr
:
5507 case TARGET_NR_flistxattr
:
5508 case TARGET_NR_removexattr
:
5509 case TARGET_NR_lremovexattr
:
5510 case TARGET_NR_fremovexattr
:
5511 goto unimplemented_nowarn
;
5513 #ifdef TARGET_NR_set_thread_area
5514 case TARGET_NR_set_thread_area
:
5515 #if defined(TARGET_MIPS)
5516 ((CPUMIPSState
*) cpu_env
)->tls_value
= arg1
;
5519 #elif defined(TARGET_I386) && defined(TARGET_ABI32)
5520 ret
= do_set_thread_area(cpu_env
, arg1
);
5523 goto unimplemented_nowarn
;
5526 #ifdef TARGET_NR_get_thread_area
5527 case TARGET_NR_get_thread_area
:
5528 #if defined(TARGET_I386) && defined(TARGET_ABI32)
5529 ret
= do_get_thread_area(cpu_env
, arg1
);
5531 goto unimplemented_nowarn
;
5534 #ifdef TARGET_NR_getdomainname
5535 case TARGET_NR_getdomainname
:
5536 goto unimplemented_nowarn
;
5539 #ifdef TARGET_NR_clock_gettime
5540 case TARGET_NR_clock_gettime
:
5543 ret
= get_errno(clock_gettime(arg1
, &ts
));
5544 if (!is_error(ret
)) {
5545 host_to_target_timespec(arg2
, &ts
);
5550 #ifdef TARGET_NR_clock_getres
5551 case TARGET_NR_clock_getres
:
5554 ret
= get_errno(clock_getres(arg1
, &ts
));
5555 if (!is_error(ret
)) {
5556 host_to_target_timespec(arg2
, &ts
);
5562 #if defined(TARGET_NR_set_tid_address) && defined(__NR_set_tid_address)
5563 case TARGET_NR_set_tid_address
:
5564 ret
= get_errno(set_tid_address((int *)g2h(arg1
)));
5568 #if defined(TARGET_NR_tkill) && defined(__NR_tkill)
5569 case TARGET_NR_tkill
:
5570 ret
= get_errno(sys_tkill((int)arg1
, (int)arg2
));
5574 #if defined(TARGET_NR_tgkill) && defined(__NR_tgkill)
5575 case TARGET_NR_tgkill
:
5576 ret
= get_errno(sys_tgkill((int)arg1
, (int)arg2
, (int)arg3
));
5580 #ifdef TARGET_NR_set_robust_list
5581 case TARGET_NR_set_robust_list
:
5582 goto unimplemented_nowarn
;
5585 #if defined(TARGET_NR_utimensat) && defined(__NR_utimensat)
5586 case TARGET_NR_utimensat
:
5588 struct timespec ts
[2];
5589 target_to_host_timespec(ts
, arg3
);
5590 target_to_host_timespec(ts
+1, arg3
+sizeof(struct target_timespec
));
5592 ret
= get_errno(sys_utimensat(arg1
, NULL
, ts
, arg4
));
5594 if (!(p
= lock_user_string(arg2
))) {
5595 ret
= -TARGET_EFAULT
;
5598 ret
= get_errno(sys_utimensat(arg1
, path(p
), ts
, arg4
));
5599 unlock_user(p
, arg2
, 0);
5607 gemu_log("qemu: Unsupported syscall: %d\n", num
);
5608 #if defined(TARGET_NR_setxattr) || defined(TARGET_NR_get_thread_area) || defined(TARGET_NR_getdomainname) || defined(TARGET_NR_set_robust_list)
5609 unimplemented_nowarn
:
5611 ret
= -TARGET_ENOSYS
;
5616 gemu_log(" = %ld\n", ret
);
5619 print_syscall_ret(num
, ret
);
5622 ret
= -TARGET_EFAULT
;