4 * Copyright (c) 2003 Fabrice Bellard
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
30 #include <sys/types.h>
34 #include <sys/mount.h>
35 #include <sys/resource.h>
40 #include <sys/socket.h>
43 #include <sys/times.h>
46 #include <sys/statfs.h>
48 #include <sys/sysinfo.h>
49 //#include <sys/user.h>
50 #include <netinet/ip.h>
51 #include <netinet/tcp.h>
53 #define termios host_termios
54 #define winsize host_winsize
55 #define termio host_termio
56 #define sgttyb host_sgttyb /* same as target */
57 #define tchars host_tchars /* same as target */
58 #define ltchars host_ltchars /* same as target */
60 #include <linux/termios.h>
61 #include <linux/unistd.h>
62 #include <linux/utsname.h>
63 #include <linux/cdrom.h>
64 #include <linux/hdreg.h>
65 #include <linux/soundcard.h>
66 #include <linux/dirent.h>
73 #if defined(TARGET_I386) || defined(TARGET_ARM) || defined(TARGET_SPARC) \
74 || defined(TARGET_M68K)
75 /* 16 bit uid wrappers emulation */
79 //#include <linux/msdos_fs.h>
80 #define VFAT_IOCTL_READDIR_BOTH _IOR('r', 1, struct dirent [2])
81 #define VFAT_IOCTL_READDIR_SHORT _IOR('r', 2, struct dirent [2])
92 #define _syscall0(type,name) \
95 return syscall(__NR_##name); \
98 #define _syscall1(type,name,type1,arg1) \
99 type name (type1 arg1) \
101 return syscall(__NR_##name, arg1); \
104 #define _syscall2(type,name,type1,arg1,type2,arg2) \
105 type name (type1 arg1,type2 arg2) \
107 return syscall(__NR_##name, arg1, arg2); \
110 #define _syscall3(type,name,type1,arg1,type2,arg2,type3,arg3) \
111 type name (type1 arg1,type2 arg2,type3 arg3) \
113 return syscall(__NR_##name, arg1, arg2, arg3); \
116 #define _syscall4(type,name,type1,arg1,type2,arg2,type3,arg3,type4,arg4) \
117 type name (type1 arg1,type2 arg2,type3 arg3,type4 arg4) \
119 return syscall(__NR_##name, arg1, arg2, arg3, arg4); \
122 #define _syscall5(type,name,type1,arg1,type2,arg2,type3,arg3,type4,arg4, \
124 type name (type1 arg1,type2 arg2,type3 arg3,type4 arg4,type5 arg5) \
126 return syscall(__NR_##name, arg1, arg2, arg3, arg4, arg5); \
130 #define _syscall6(type,name,type1,arg1,type2,arg2,type3,arg3,type4,arg4, \
131 type5,arg5,type6,arg6) \
132 type name (type1 arg1,type2 arg2,type3 arg3,type4 arg4,type5 arg5,type6 arg6) \
134 return syscall(__NR_##name, arg1, arg2, arg3, arg4, arg5, arg6); \
138 #define __NR_sys_uname __NR_uname
139 #define __NR_sys_getcwd1 __NR_getcwd
140 #define __NR_sys_getdents __NR_getdents
141 #define __NR_sys_getdents64 __NR_getdents64
142 #define __NR_sys_rt_sigqueueinfo __NR_rt_sigqueueinfo
144 #if defined(__alpha__) || defined (__ia64__) || defined(__x86_64__)
145 #define __NR__llseek __NR_lseek
149 _syscall0(int, gettid
)
151 static int gettid(void) {
155 _syscall1(int,sys_uname
,struct new_utsname
*,buf
)
156 _syscall2(int,sys_getcwd1
,char *,buf
,size_t,size
)
157 _syscall3(int, sys_getdents
, uint
, fd
, struct dirent
*, dirp
, uint
, count
);
158 _syscall3(int, sys_getdents64
, uint
, fd
, struct dirent64
*, dirp
, uint
, count
);
159 _syscall5(int, _llseek
, uint
, fd
, ulong
, hi
, ulong
, lo
,
160 loff_t
*, res
, uint
, wh
);
161 _syscall3(int,sys_rt_sigqueueinfo
,int,pid
,int,sig
,siginfo_t
*,uinfo
)
162 #ifdef __NR_exit_group
163 _syscall1(int,exit_group
,int,error_code
)
166 extern int personality(int);
167 extern int flock(int, int);
168 extern int setfsuid(int);
169 extern int setfsgid(int);
170 extern int setresuid(uid_t
, uid_t
, uid_t
);
171 extern int getresuid(uid_t
*, uid_t
*, uid_t
*);
172 extern int setresgid(gid_t
, gid_t
, gid_t
);
173 extern int getresgid(gid_t
*, gid_t
*, gid_t
*);
174 extern int setgroups(int, gid_t
*);
176 static inline long get_errno(long ret
)
184 static inline int is_error(long ret
)
186 return (unsigned long)ret
>= (unsigned long)(-4096);
189 static target_ulong target_brk
;
190 static target_ulong target_original_brk
;
192 void target_set_brk(target_ulong new_brk
)
194 target_original_brk
= target_brk
= new_brk
;
197 long do_brk(target_ulong new_brk
)
199 target_ulong brk_page
;
205 if (new_brk
< target_original_brk
)
208 brk_page
= HOST_PAGE_ALIGN(target_brk
);
210 /* If the new brk is less than this, set it and we're done... */
211 if (new_brk
< brk_page
) {
212 target_brk
= new_brk
;
216 /* We need to allocate more memory after the brk... */
217 new_alloc_size
= HOST_PAGE_ALIGN(new_brk
- brk_page
+ 1);
218 mapped_addr
= get_errno(target_mmap(brk_page
, new_alloc_size
,
219 PROT_READ
|PROT_WRITE
,
220 MAP_ANON
|MAP_FIXED
|MAP_PRIVATE
, 0, 0));
221 if (is_error(mapped_addr
)) {
224 target_brk
= new_brk
;
229 static inline fd_set
*target_to_host_fds(fd_set
*fds
,
230 target_long
*target_fds
, int n
)
232 #if !defined(BSWAP_NEEDED) && !defined(WORDS_BIGENDIAN)
233 return (fd_set
*)target_fds
;
238 for(i
= 0;i
< n
; i
++) {
239 b
= (tswapl(target_fds
[i
/ TARGET_LONG_BITS
]) >>
240 (i
& (TARGET_LONG_BITS
- 1))) & 1;
251 static inline void host_to_target_fds(target_long
*target_fds
,
254 #if !defined(BSWAP_NEEDED) && !defined(WORDS_BIGENDIAN)
261 nw
= (n
+ TARGET_LONG_BITS
- 1) / TARGET_LONG_BITS
;
263 for(i
= 0;i
< nw
; i
++) {
265 for(j
= 0; j
< TARGET_LONG_BITS
; j
++) {
266 v
|= ((FD_ISSET(k
, fds
) != 0) << j
);
269 target_fds
[i
] = tswapl(v
);
275 #if defined(__alpha__)
281 static inline long host_to_target_clock_t(long ticks
)
283 #if HOST_HZ == TARGET_HZ
286 return ((int64_t)ticks
* TARGET_HZ
) / HOST_HZ
;
290 static inline void host_to_target_rusage(target_ulong target_addr
,
291 const struct rusage
*rusage
)
293 struct target_rusage
*target_rusage
;
295 lock_user_struct(target_rusage
, target_addr
, 0);
296 target_rusage
->ru_utime
.tv_sec
= tswapl(rusage
->ru_utime
.tv_sec
);
297 target_rusage
->ru_utime
.tv_usec
= tswapl(rusage
->ru_utime
.tv_usec
);
298 target_rusage
->ru_stime
.tv_sec
= tswapl(rusage
->ru_stime
.tv_sec
);
299 target_rusage
->ru_stime
.tv_usec
= tswapl(rusage
->ru_stime
.tv_usec
);
300 target_rusage
->ru_maxrss
= tswapl(rusage
->ru_maxrss
);
301 target_rusage
->ru_ixrss
= tswapl(rusage
->ru_ixrss
);
302 target_rusage
->ru_idrss
= tswapl(rusage
->ru_idrss
);
303 target_rusage
->ru_isrss
= tswapl(rusage
->ru_isrss
);
304 target_rusage
->ru_minflt
= tswapl(rusage
->ru_minflt
);
305 target_rusage
->ru_majflt
= tswapl(rusage
->ru_majflt
);
306 target_rusage
->ru_nswap
= tswapl(rusage
->ru_nswap
);
307 target_rusage
->ru_inblock
= tswapl(rusage
->ru_inblock
);
308 target_rusage
->ru_oublock
= tswapl(rusage
->ru_oublock
);
309 target_rusage
->ru_msgsnd
= tswapl(rusage
->ru_msgsnd
);
310 target_rusage
->ru_msgrcv
= tswapl(rusage
->ru_msgrcv
);
311 target_rusage
->ru_nsignals
= tswapl(rusage
->ru_nsignals
);
312 target_rusage
->ru_nvcsw
= tswapl(rusage
->ru_nvcsw
);
313 target_rusage
->ru_nivcsw
= tswapl(rusage
->ru_nivcsw
);
314 unlock_user_struct(target_rusage
, target_addr
, 1);
317 static inline void target_to_host_timeval(struct timeval
*tv
,
318 target_ulong target_addr
)
320 struct target_timeval
*target_tv
;
322 lock_user_struct(target_tv
, target_addr
, 1);
323 tv
->tv_sec
= tswapl(target_tv
->tv_sec
);
324 tv
->tv_usec
= tswapl(target_tv
->tv_usec
);
325 unlock_user_struct(target_tv
, target_addr
, 0);
328 static inline void host_to_target_timeval(target_ulong target_addr
,
329 const struct timeval
*tv
)
331 struct target_timeval
*target_tv
;
333 lock_user_struct(target_tv
, target_addr
, 0);
334 target_tv
->tv_sec
= tswapl(tv
->tv_sec
);
335 target_tv
->tv_usec
= tswapl(tv
->tv_usec
);
336 unlock_user_struct(target_tv
, target_addr
, 1);
340 static long do_select(long n
,
341 target_ulong rfd_p
, target_ulong wfd_p
,
342 target_ulong efd_p
, target_ulong target_tv
)
344 fd_set rfds
, wfds
, efds
;
345 fd_set
*rfds_ptr
, *wfds_ptr
, *efds_ptr
;
346 target_long
*target_rfds
, *target_wfds
, *target_efds
;
347 struct timeval tv
, *tv_ptr
;
352 target_rfds
= lock_user(rfd_p
, sizeof(target_long
) * n
, 1);
353 rfds_ptr
= target_to_host_fds(&rfds
, target_rfds
, n
);
359 target_wfds
= lock_user(wfd_p
, sizeof(target_long
) * n
, 1);
360 wfds_ptr
= target_to_host_fds(&wfds
, target_wfds
, n
);
366 target_efds
= lock_user(efd_p
, sizeof(target_long
) * n
, 1);
367 efds_ptr
= target_to_host_fds(&efds
, target_efds
, n
);
374 target_to_host_timeval(&tv
, target_tv
);
379 ret
= get_errno(select(n
, rfds_ptr
, wfds_ptr
, efds_ptr
, tv_ptr
));
383 host_to_target_fds(target_rfds
, rfds_ptr
, n
);
384 host_to_target_fds(target_wfds
, wfds_ptr
, n
);
385 host_to_target_fds(target_efds
, efds_ptr
, n
);
388 host_to_target_timeval(target_tv
, &tv
);
392 unlock_user(target_rfds
, rfd_p
, ok
? sizeof(target_long
) * n
: 0);
394 unlock_user(target_wfds
, wfd_p
, ok
? sizeof(target_long
) * n
: 0);
396 unlock_user(target_efds
, efd_p
, ok
? sizeof(target_long
) * n
: 0);
401 static inline void target_to_host_sockaddr(struct sockaddr
*addr
,
402 target_ulong target_addr
,
405 struct target_sockaddr
*target_saddr
;
407 target_saddr
= lock_user(target_addr
, len
, 1);
408 memcpy(addr
, target_saddr
, len
);
409 addr
->sa_family
= tswap16(target_saddr
->sa_family
);
410 unlock_user(target_saddr
, target_addr
, 0);
413 static inline void host_to_target_sockaddr(target_ulong target_addr
,
414 struct sockaddr
*addr
,
417 struct target_sockaddr
*target_saddr
;
419 target_saddr
= lock_user(target_addr
, len
, 0);
420 memcpy(target_saddr
, addr
, len
);
421 target_saddr
->sa_family
= tswap16(addr
->sa_family
);
422 unlock_user(target_saddr
, target_addr
, len
);
425 /* ??? Should this also swap msgh->name? */
426 static inline void target_to_host_cmsg(struct msghdr
*msgh
,
427 struct target_msghdr
*target_msgh
)
429 struct cmsghdr
*cmsg
= CMSG_FIRSTHDR(msgh
);
430 struct target_cmsghdr
*target_cmsg
= TARGET_CMSG_FIRSTHDR(target_msgh
);
433 while (cmsg
&& target_cmsg
) {
434 void *data
= CMSG_DATA(cmsg
);
435 void *target_data
= TARGET_CMSG_DATA(target_cmsg
);
437 int len
= tswapl(target_cmsg
->cmsg_len
)
438 - TARGET_CMSG_ALIGN(sizeof (struct target_cmsghdr
));
440 space
+= CMSG_SPACE(len
);
441 if (space
> msgh
->msg_controllen
) {
442 space
-= CMSG_SPACE(len
);
443 gemu_log("Host cmsg overflow\n");
447 cmsg
->cmsg_level
= tswap32(target_cmsg
->cmsg_level
);
448 cmsg
->cmsg_type
= tswap32(target_cmsg
->cmsg_type
);
449 cmsg
->cmsg_len
= CMSG_LEN(len
);
451 if (cmsg
->cmsg_level
!= TARGET_SOL_SOCKET
|| cmsg
->cmsg_type
!= SCM_RIGHTS
) {
452 gemu_log("Unsupported ancillary data: %d/%d\n", cmsg
->cmsg_level
, cmsg
->cmsg_type
);
453 memcpy(data
, target_data
, len
);
455 int *fd
= (int *)data
;
456 int *target_fd
= (int *)target_data
;
457 int i
, numfds
= len
/ sizeof(int);
459 for (i
= 0; i
< numfds
; i
++)
460 fd
[i
] = tswap32(target_fd
[i
]);
463 cmsg
= CMSG_NXTHDR(msgh
, cmsg
);
464 target_cmsg
= TARGET_CMSG_NXTHDR(target_msgh
, target_cmsg
);
467 msgh
->msg_controllen
= space
;
470 /* ??? Should this also swap msgh->name? */
471 static inline void host_to_target_cmsg(struct target_msghdr
*target_msgh
,
474 struct cmsghdr
*cmsg
= CMSG_FIRSTHDR(msgh
);
475 struct target_cmsghdr
*target_cmsg
= TARGET_CMSG_FIRSTHDR(target_msgh
);
478 while (cmsg
&& target_cmsg
) {
479 void *data
= CMSG_DATA(cmsg
);
480 void *target_data
= TARGET_CMSG_DATA(target_cmsg
);
482 int len
= cmsg
->cmsg_len
- CMSG_ALIGN(sizeof (struct cmsghdr
));
484 space
+= TARGET_CMSG_SPACE(len
);
485 if (space
> tswapl(target_msgh
->msg_controllen
)) {
486 space
-= TARGET_CMSG_SPACE(len
);
487 gemu_log("Target cmsg overflow\n");
491 target_cmsg
->cmsg_level
= tswap32(cmsg
->cmsg_level
);
492 target_cmsg
->cmsg_type
= tswap32(cmsg
->cmsg_type
);
493 target_cmsg
->cmsg_len
= tswapl(TARGET_CMSG_LEN(len
));
495 if (cmsg
->cmsg_level
!= TARGET_SOL_SOCKET
|| cmsg
->cmsg_type
!= SCM_RIGHTS
) {
496 gemu_log("Unsupported ancillary data: %d/%d\n", cmsg
->cmsg_level
, cmsg
->cmsg_type
);
497 memcpy(target_data
, data
, len
);
499 int *fd
= (int *)data
;
500 int *target_fd
= (int *)target_data
;
501 int i
, numfds
= len
/ sizeof(int);
503 for (i
= 0; i
< numfds
; i
++)
504 target_fd
[i
] = tswap32(fd
[i
]);
507 cmsg
= CMSG_NXTHDR(msgh
, cmsg
);
508 target_cmsg
= TARGET_CMSG_NXTHDR(target_msgh
, target_cmsg
);
511 msgh
->msg_controllen
= tswapl(space
);
514 static long do_setsockopt(int sockfd
, int level
, int optname
,
515 target_ulong optval
, socklen_t optlen
)
521 /* TCP options all take an 'int' value. */
522 if (optlen
< sizeof(uint32_t))
525 val
= tget32(optval
);
526 ret
= get_errno(setsockopt(sockfd
, level
, optname
, &val
, sizeof(val
)));
533 case IP_ROUTER_ALERT
:
537 case IP_MTU_DISCOVER
:
543 case IP_MULTICAST_TTL
:
544 case IP_MULTICAST_LOOP
:
546 if (optlen
>= sizeof(uint32_t)) {
547 val
= tget32(optval
);
548 } else if (optlen
>= 1) {
551 ret
= get_errno(setsockopt(sockfd
, level
, optname
, &val
, sizeof(val
)));
557 case TARGET_SOL_SOCKET
:
559 /* Options with 'int' argument. */
560 case TARGET_SO_DEBUG
:
563 case TARGET_SO_REUSEADDR
:
564 optname
= SO_REUSEADDR
;
569 case TARGET_SO_ERROR
:
572 case TARGET_SO_DONTROUTE
:
573 optname
= SO_DONTROUTE
;
575 case TARGET_SO_BROADCAST
:
576 optname
= SO_BROADCAST
;
578 case TARGET_SO_SNDBUF
:
581 case TARGET_SO_RCVBUF
:
584 case TARGET_SO_KEEPALIVE
:
585 optname
= SO_KEEPALIVE
;
587 case TARGET_SO_OOBINLINE
:
588 optname
= SO_OOBINLINE
;
590 case TARGET_SO_NO_CHECK
:
591 optname
= SO_NO_CHECK
;
593 case TARGET_SO_PRIORITY
:
594 optname
= SO_PRIORITY
;
597 case TARGET_SO_BSDCOMPAT
:
598 optname
= SO_BSDCOMPAT
;
601 case TARGET_SO_PASSCRED
:
602 optname
= SO_PASSCRED
;
604 case TARGET_SO_TIMESTAMP
:
605 optname
= SO_TIMESTAMP
;
607 case TARGET_SO_RCVLOWAT
:
608 optname
= SO_RCVLOWAT
;
610 case TARGET_SO_RCVTIMEO
:
611 optname
= SO_RCVTIMEO
;
613 case TARGET_SO_SNDTIMEO
:
614 optname
= SO_SNDTIMEO
;
620 if (optlen
< sizeof(uint32_t))
623 val
= tget32(optval
);
624 ret
= get_errno(setsockopt(sockfd
, SOL_SOCKET
, optname
, &val
, sizeof(val
)));
628 gemu_log("Unsupported setsockopt level=%d optname=%d \n", level
, optname
);
634 static long do_getsockopt(int sockfd
, int level
, int optname
,
635 target_ulong optval
, target_ulong optlen
)
637 int len
, lv
, val
, ret
;
640 case TARGET_SOL_SOCKET
:
643 case TARGET_SO_LINGER
:
644 case TARGET_SO_RCVTIMEO
:
645 case TARGET_SO_SNDTIMEO
:
646 case TARGET_SO_PEERCRED
:
647 case TARGET_SO_PEERNAME
:
648 /* These don't just return a single integer */
655 /* TCP options all take an 'int' value. */
657 len
= tget32(optlen
);
661 ret
= get_errno(getsockopt(sockfd
, level
, optname
, &val
, &lv
));
678 case IP_ROUTER_ALERT
:
682 case IP_MTU_DISCOVER
:
688 case IP_MULTICAST_TTL
:
689 case IP_MULTICAST_LOOP
:
690 len
= tget32(optlen
);
694 ret
= get_errno(getsockopt(sockfd
, level
, optname
, &val
, &lv
));
697 if (len
< sizeof(int) && len
> 0 && val
>= 0 && val
< 255) {
702 if (len
> sizeof(int))
714 gemu_log("getsockopt level=%d optname=%d not yet supported\n",
722 static void lock_iovec(struct iovec
*vec
, target_ulong target_addr
,
725 struct target_iovec
*target_vec
;
729 target_vec
= lock_user(target_addr
, count
* sizeof(struct target_iovec
), 1);
730 for(i
= 0;i
< count
; i
++) {
731 base
= tswapl(target_vec
[i
].iov_base
);
732 vec
[i
].iov_len
= tswapl(target_vec
[i
].iov_len
);
733 vec
[i
].iov_base
= lock_user(base
, vec
[i
].iov_len
, copy
);
735 unlock_user (target_vec
, target_addr
, 0);
738 static void unlock_iovec(struct iovec
*vec
, target_ulong target_addr
,
741 struct target_iovec
*target_vec
;
745 target_vec
= lock_user(target_addr
, count
* sizeof(struct target_iovec
), 1);
746 for(i
= 0;i
< count
; i
++) {
747 base
= tswapl(target_vec
[i
].iov_base
);
748 unlock_user(vec
[i
].iov_base
, base
, copy
? vec
[i
].iov_len
: 0);
750 unlock_user (target_vec
, target_addr
, 0);
753 static long do_socket(int domain
, int type
, int protocol
)
755 #if defined(TARGET_MIPS)
757 case TARGET_SOCK_DGRAM
:
760 case TARGET_SOCK_STREAM
:
763 case TARGET_SOCK_RAW
:
766 case TARGET_SOCK_RDM
:
769 case TARGET_SOCK_SEQPACKET
:
770 type
= SOCK_SEQPACKET
;
772 case TARGET_SOCK_PACKET
:
777 return get_errno(socket(domain
, type
, protocol
));
780 static long do_bind(int sockfd
, target_ulong target_addr
,
783 void *addr
= alloca(addrlen
);
785 target_to_host_sockaddr(addr
, target_addr
, addrlen
);
786 return get_errno(bind(sockfd
, addr
, addrlen
));
789 static long do_connect(int sockfd
, target_ulong target_addr
,
792 void *addr
= alloca(addrlen
);
794 target_to_host_sockaddr(addr
, target_addr
, addrlen
);
795 return get_errno(connect(sockfd
, addr
, addrlen
));
798 static long do_sendrecvmsg(int fd
, target_ulong target_msg
,
802 struct target_msghdr
*msgp
;
806 target_ulong target_vec
;
808 lock_user_struct(msgp
, target_msg
, 1);
809 if (msgp
->msg_name
) {
810 msg
.msg_namelen
= tswap32(msgp
->msg_namelen
);
811 msg
.msg_name
= alloca(msg
.msg_namelen
);
812 target_to_host_sockaddr(msg
.msg_name
, tswapl(msgp
->msg_name
),
818 msg
.msg_controllen
= 2 * tswapl(msgp
->msg_controllen
);
819 msg
.msg_control
= alloca(msg
.msg_controllen
);
820 msg
.msg_flags
= tswap32(msgp
->msg_flags
);
822 count
= tswapl(msgp
->msg_iovlen
);
823 vec
= alloca(count
* sizeof(struct iovec
));
824 target_vec
= tswapl(msgp
->msg_iov
);
825 lock_iovec(vec
, target_vec
, count
, send
);
826 msg
.msg_iovlen
= count
;
830 target_to_host_cmsg(&msg
, msgp
);
831 ret
= get_errno(sendmsg(fd
, &msg
, flags
));
833 ret
= get_errno(recvmsg(fd
, &msg
, flags
));
835 host_to_target_cmsg(msgp
, &msg
);
837 unlock_iovec(vec
, target_vec
, count
, !send
);
841 static long do_accept(int fd
, target_ulong target_addr
,
842 target_ulong target_addrlen
)
844 socklen_t addrlen
= tget32(target_addrlen
);
845 void *addr
= alloca(addrlen
);
848 ret
= get_errno(accept(fd
, addr
, &addrlen
));
849 if (!is_error(ret
)) {
850 host_to_target_sockaddr(target_addr
, addr
, addrlen
);
851 tput32(target_addrlen
, addrlen
);
856 static long do_getpeername(int fd
, target_ulong target_addr
,
857 target_ulong target_addrlen
)
859 socklen_t addrlen
= tget32(target_addrlen
);
860 void *addr
= alloca(target_addrlen
);
863 ret
= get_errno(getpeername(fd
, addr
, &addrlen
));
864 if (!is_error(ret
)) {
865 host_to_target_sockaddr(target_addr
, addr
, addrlen
);
866 tput32(target_addrlen
, addrlen
);
871 static long do_getsockname(int fd
, target_ulong target_addr
,
872 target_ulong target_addrlen
)
874 socklen_t addrlen
= tget32(target_addrlen
);
875 void *addr
= alloca(target_addrlen
);
878 ret
= get_errno(getsockname(fd
, addr
, &addrlen
));
879 if (!is_error(ret
)) {
880 host_to_target_sockaddr(target_addr
, addr
, addrlen
);
881 tput32(target_addrlen
, addrlen
);
886 static long do_socketpair(int domain
, int type
, int protocol
,
887 target_ulong target_tab
)
892 ret
= get_errno(socketpair(domain
, type
, protocol
, tab
));
893 if (!is_error(ret
)) {
894 tput32(target_tab
, tab
[0]);
895 tput32(target_tab
+ 4, tab
[1]);
900 static long do_sendto(int fd
, target_ulong msg
, size_t len
, int flags
,
901 target_ulong target_addr
, socklen_t addrlen
)
907 host_msg
= lock_user(msg
, len
, 1);
909 addr
= alloca(addrlen
);
910 target_to_host_sockaddr(addr
, target_addr
, addrlen
);
911 ret
= get_errno(sendto(fd
, host_msg
, len
, flags
, addr
, addrlen
));
913 ret
= get_errno(send(fd
, host_msg
, len
, flags
));
915 unlock_user(host_msg
, msg
, 0);
919 static long do_recvfrom(int fd
, target_ulong msg
, size_t len
, int flags
,
920 target_ulong target_addr
, target_ulong target_addrlen
)
927 host_msg
= lock_user(msg
, len
, 0);
929 addrlen
= tget32(target_addrlen
);
930 addr
= alloca(addrlen
);
931 ret
= get_errno(recvfrom(fd
, host_msg
, len
, flags
, addr
, &addrlen
));
933 addr
= NULL
; /* To keep compiler quiet. */
934 ret
= get_errno(recv(fd
, host_msg
, len
, flags
));
936 if (!is_error(ret
)) {
938 host_to_target_sockaddr(target_addr
, addr
, addrlen
);
939 tput32(target_addrlen
, addrlen
);
941 unlock_user(host_msg
, msg
, len
);
943 unlock_user(host_msg
, msg
, 0);
948 static long do_socketcall(int num
, target_ulong vptr
)
951 const int n
= sizeof(target_ulong
);
956 int domain
= tgetl(vptr
);
957 int type
= tgetl(vptr
+ n
);
958 int protocol
= tgetl(vptr
+ 2 * n
);
959 ret
= do_socket(domain
, type
, protocol
);
964 int sockfd
= tgetl(vptr
);
965 target_ulong target_addr
= tgetl(vptr
+ n
);
966 socklen_t addrlen
= tgetl(vptr
+ 2 * n
);
967 ret
= do_bind(sockfd
, target_addr
, addrlen
);
972 int sockfd
= tgetl(vptr
);
973 target_ulong target_addr
= tgetl(vptr
+ n
);
974 socklen_t addrlen
= tgetl(vptr
+ 2 * n
);
975 ret
= do_connect(sockfd
, target_addr
, addrlen
);
980 int sockfd
= tgetl(vptr
);
981 int backlog
= tgetl(vptr
+ n
);
982 ret
= get_errno(listen(sockfd
, backlog
));
987 int sockfd
= tgetl(vptr
);
988 target_ulong target_addr
= tgetl(vptr
+ n
);
989 target_ulong target_addrlen
= tgetl(vptr
+ 2 * n
);
990 ret
= do_accept(sockfd
, target_addr
, target_addrlen
);
993 case SOCKOP_getsockname
:
995 int sockfd
= tgetl(vptr
);
996 target_ulong target_addr
= tgetl(vptr
+ n
);
997 target_ulong target_addrlen
= tgetl(vptr
+ 2 * n
);
998 ret
= do_getsockname(sockfd
, target_addr
, target_addrlen
);
1001 case SOCKOP_getpeername
:
1003 int sockfd
= tgetl(vptr
);
1004 target_ulong target_addr
= tgetl(vptr
+ n
);
1005 target_ulong target_addrlen
= tgetl(vptr
+ 2 * n
);
1006 ret
= do_getpeername(sockfd
, target_addr
, target_addrlen
);
1009 case SOCKOP_socketpair
:
1011 int domain
= tgetl(vptr
);
1012 int type
= tgetl(vptr
+ n
);
1013 int protocol
= tgetl(vptr
+ 2 * n
);
1014 target_ulong tab
= tgetl(vptr
+ 3 * n
);
1015 ret
= do_socketpair(domain
, type
, protocol
, tab
);
1020 int sockfd
= tgetl(vptr
);
1021 target_ulong msg
= tgetl(vptr
+ n
);
1022 size_t len
= tgetl(vptr
+ 2 * n
);
1023 int flags
= tgetl(vptr
+ 3 * n
);
1024 ret
= do_sendto(sockfd
, msg
, len
, flags
, 0, 0);
1029 int sockfd
= tgetl(vptr
);
1030 target_ulong msg
= tgetl(vptr
+ n
);
1031 size_t len
= tgetl(vptr
+ 2 * n
);
1032 int flags
= tgetl(vptr
+ 3 * n
);
1033 ret
= do_recvfrom(sockfd
, msg
, len
, flags
, 0, 0);
1038 int sockfd
= tgetl(vptr
);
1039 target_ulong msg
= tgetl(vptr
+ n
);
1040 size_t len
= tgetl(vptr
+ 2 * n
);
1041 int flags
= tgetl(vptr
+ 3 * n
);
1042 target_ulong addr
= tgetl(vptr
+ 4 * n
);
1043 socklen_t addrlen
= tgetl(vptr
+ 5 * n
);
1044 ret
= do_sendto(sockfd
, msg
, len
, flags
, addr
, addrlen
);
1047 case SOCKOP_recvfrom
:
1049 int sockfd
= tgetl(vptr
);
1050 target_ulong msg
= tgetl(vptr
+ n
);
1051 size_t len
= tgetl(vptr
+ 2 * n
);
1052 int flags
= tgetl(vptr
+ 3 * n
);
1053 target_ulong addr
= tgetl(vptr
+ 4 * n
);
1054 target_ulong addrlen
= tgetl(vptr
+ 5 * n
);
1055 ret
= do_recvfrom(sockfd
, msg
, len
, flags
, addr
, addrlen
);
1058 case SOCKOP_shutdown
:
1060 int sockfd
= tgetl(vptr
);
1061 int how
= tgetl(vptr
+ n
);
1063 ret
= get_errno(shutdown(sockfd
, how
));
1066 case SOCKOP_sendmsg
:
1067 case SOCKOP_recvmsg
:
1070 target_ulong target_msg
;
1074 target_msg
= tgetl(vptr
+ n
);
1075 flags
= tgetl(vptr
+ 2 * n
);
1077 ret
= do_sendrecvmsg(fd
, target_msg
, flags
,
1078 (num
== SOCKOP_sendmsg
));
1081 case SOCKOP_setsockopt
:
1083 int sockfd
= tgetl(vptr
);
1084 int level
= tgetl(vptr
+ n
);
1085 int optname
= tgetl(vptr
+ 2 * n
);
1086 target_ulong optval
= tgetl(vptr
+ 3 * n
);
1087 socklen_t optlen
= tgetl(vptr
+ 4 * n
);
1089 ret
= do_setsockopt(sockfd
, level
, optname
, optval
, optlen
);
1092 case SOCKOP_getsockopt
:
1094 int sockfd
= tgetl(vptr
);
1095 int level
= tgetl(vptr
+ n
);
1096 int optname
= tgetl(vptr
+ 2 * n
);
1097 target_ulong optval
= tgetl(vptr
+ 3 * n
);
1098 target_ulong poptlen
= tgetl(vptr
+ 4 * n
);
1100 ret
= do_getsockopt(sockfd
, level
, optname
, optval
, poptlen
);
1104 gemu_log("Unsupported socketcall: %d\n", num
);
1111 #define N_SHM_REGIONS 32
1113 static struct shm_region
{
1116 } shm_regions
[N_SHM_REGIONS
];
1120 struct senid_ds
*buf
;
1121 unsigned short *array
;
1124 /* ??? This only works with linear mappings. */
1125 static long do_ipc(long call
, long first
, long second
, long third
,
1126 long ptr
, long fifth
)
1130 unsigned long raddr
;
1131 struct shmid_ds shm_info
;
1134 version
= call
>> 16;
1139 ret
= get_errno(semop(first
,(struct sembuf
*) ptr
, second
));
1143 ret
= get_errno(semget(first
, second
, third
));
1147 ret
= get_errno(semctl(first
, second
, third
, ((union semun
*)ptr
)->val
));
1151 case IPCOP_semtimedop
:
1152 gemu_log("Unsupported ipc call: %ld (version %d)\n", call
, version
);
1157 ret
= get_errno(msgget(first
, second
));
1161 ret
= get_errno(msgsnd(first
, (struct msgbuf
*) ptr
, second
, third
));
1165 ret
= get_errno(msgctl(first
, second
, (struct msqid_ds
*) ptr
));
1172 void *__unbounded msgp
;
1176 struct ipc_kludge
*foo
= (struct ipc_kludge
*) ptr
;
1177 struct msgbuf
*msgp
= (struct msgbuf
*) foo
->msgp
;
1179 ret
= get_errno(msgrcv(first
, msgp
, second
, 0, third
));
1185 /* SHM_* flags are the same on all linux platforms */
1186 ret
= get_errno((long) shmat(first
, (void *) ptr
, second
));
1190 /* find out the length of the shared memory segment */
1192 ret
= get_errno(shmctl(first
, IPC_STAT
, &shm_info
));
1193 if (is_error(ret
)) {
1194 /* can't get length, bail out */
1195 shmdt((void *) raddr
);
1198 page_set_flags(raddr
, raddr
+ shm_info
.shm_segsz
,
1199 PAGE_VALID
| PAGE_READ
|
1200 ((second
& SHM_RDONLY
)? 0: PAGE_WRITE
));
1201 for (i
= 0; i
< N_SHM_REGIONS
; ++i
) {
1202 if (shm_regions
[i
].start
== 0) {
1203 shm_regions
[i
].start
= raddr
;
1204 shm_regions
[i
].size
= shm_info
.shm_segsz
;
1208 if (put_user(raddr
, (uint32_t *)third
))
1213 for (i
= 0; i
< N_SHM_REGIONS
; ++i
) {
1214 if (shm_regions
[i
].start
== ptr
) {
1215 shm_regions
[i
].start
= 0;
1216 page_set_flags(ptr
, shm_regions
[i
].size
, 0);
1220 ret
= get_errno(shmdt((void *) ptr
));
1224 /* IPC_* flag values are the same on all linux platforms */
1225 ret
= get_errno(shmget(first
, second
, third
));
1228 /* IPC_* and SHM_* command values are the same on all linux platforms */
1234 ret
= get_errno(shmctl(first
, second
, NULL
));
1242 gemu_log("Unsupported ipc call: %ld (version %d)\n", call
, version
);
1249 /* kernel structure types definitions */
1252 #define STRUCT(name, list...) STRUCT_ ## name,
1253 #define STRUCT_SPECIAL(name) STRUCT_ ## name,
1255 #include "syscall_types.h"
1258 #undef STRUCT_SPECIAL
1260 #define STRUCT(name, list...) const argtype struct_ ## name ## _def[] = { list, TYPE_NULL };
1261 #define STRUCT_SPECIAL(name)
1262 #include "syscall_types.h"
1264 #undef STRUCT_SPECIAL
1266 typedef struct IOCTLEntry
{
1267 unsigned int target_cmd
;
1268 unsigned int host_cmd
;
1271 const argtype arg_type
[5];
1274 #define IOC_R 0x0001
1275 #define IOC_W 0x0002
1276 #define IOC_RW (IOC_R | IOC_W)
1278 #define MAX_STRUCT_SIZE 4096
1280 IOCTLEntry ioctl_entries
[] = {
1281 #define IOCTL(cmd, access, types...) \
1282 { TARGET_ ## cmd, cmd, #cmd, access, { types } },
1287 /* ??? Implement proper locking for ioctls. */
1288 static long do_ioctl(long fd
, long cmd
, long arg
)
1290 const IOCTLEntry
*ie
;
1291 const argtype
*arg_type
;
1293 uint8_t buf_temp
[MAX_STRUCT_SIZE
];
1299 if (ie
->target_cmd
== 0) {
1300 gemu_log("Unsupported ioctl: cmd=0x%04lx\n", cmd
);
1303 if (ie
->target_cmd
== cmd
)
1307 arg_type
= ie
->arg_type
;
1309 gemu_log("ioctl: cmd=0x%04lx (%s)\n", cmd
, ie
->name
);
1311 switch(arg_type
[0]) {
1314 ret
= get_errno(ioctl(fd
, ie
->host_cmd
));
1319 ret
= get_errno(ioctl(fd
, ie
->host_cmd
, arg
));
1323 target_size
= thunk_type_size(arg_type
, 0);
1324 switch(ie
->access
) {
1326 ret
= get_errno(ioctl(fd
, ie
->host_cmd
, buf_temp
));
1327 if (!is_error(ret
)) {
1328 argptr
= lock_user(arg
, target_size
, 0);
1329 thunk_convert(argptr
, buf_temp
, arg_type
, THUNK_TARGET
);
1330 unlock_user(argptr
, arg
, target_size
);
1334 argptr
= lock_user(arg
, target_size
, 1);
1335 thunk_convert(buf_temp
, argptr
, arg_type
, THUNK_HOST
);
1336 unlock_user(argptr
, arg
, 0);
1337 ret
= get_errno(ioctl(fd
, ie
->host_cmd
, buf_temp
));
1341 argptr
= lock_user(arg
, target_size
, 1);
1342 thunk_convert(buf_temp
, argptr
, arg_type
, THUNK_HOST
);
1343 unlock_user(argptr
, arg
, 0);
1344 ret
= get_errno(ioctl(fd
, ie
->host_cmd
, buf_temp
));
1345 if (!is_error(ret
)) {
1346 argptr
= lock_user(arg
, target_size
, 0);
1347 thunk_convert(argptr
, buf_temp
, arg_type
, THUNK_TARGET
);
1348 unlock_user(argptr
, arg
, target_size
);
1354 gemu_log("Unsupported ioctl type: cmd=0x%04lx type=%d\n", cmd
, arg_type
[0]);
1361 bitmask_transtbl iflag_tbl
[] = {
1362 { TARGET_IGNBRK
, TARGET_IGNBRK
, IGNBRK
, IGNBRK
},
1363 { TARGET_BRKINT
, TARGET_BRKINT
, BRKINT
, BRKINT
},
1364 { TARGET_IGNPAR
, TARGET_IGNPAR
, IGNPAR
, IGNPAR
},
1365 { TARGET_PARMRK
, TARGET_PARMRK
, PARMRK
, PARMRK
},
1366 { TARGET_INPCK
, TARGET_INPCK
, INPCK
, INPCK
},
1367 { TARGET_ISTRIP
, TARGET_ISTRIP
, ISTRIP
, ISTRIP
},
1368 { TARGET_INLCR
, TARGET_INLCR
, INLCR
, INLCR
},
1369 { TARGET_IGNCR
, TARGET_IGNCR
, IGNCR
, IGNCR
},
1370 { TARGET_ICRNL
, TARGET_ICRNL
, ICRNL
, ICRNL
},
1371 { TARGET_IUCLC
, TARGET_IUCLC
, IUCLC
, IUCLC
},
1372 { TARGET_IXON
, TARGET_IXON
, IXON
, IXON
},
1373 { TARGET_IXANY
, TARGET_IXANY
, IXANY
, IXANY
},
1374 { TARGET_IXOFF
, TARGET_IXOFF
, IXOFF
, IXOFF
},
1375 { TARGET_IMAXBEL
, TARGET_IMAXBEL
, IMAXBEL
, IMAXBEL
},
1379 bitmask_transtbl oflag_tbl
[] = {
1380 { TARGET_OPOST
, TARGET_OPOST
, OPOST
, OPOST
},
1381 { TARGET_OLCUC
, TARGET_OLCUC
, OLCUC
, OLCUC
},
1382 { TARGET_ONLCR
, TARGET_ONLCR
, ONLCR
, ONLCR
},
1383 { TARGET_OCRNL
, TARGET_OCRNL
, OCRNL
, OCRNL
},
1384 { TARGET_ONOCR
, TARGET_ONOCR
, ONOCR
, ONOCR
},
1385 { TARGET_ONLRET
, TARGET_ONLRET
, ONLRET
, ONLRET
},
1386 { TARGET_OFILL
, TARGET_OFILL
, OFILL
, OFILL
},
1387 { TARGET_OFDEL
, TARGET_OFDEL
, OFDEL
, OFDEL
},
1388 { TARGET_NLDLY
, TARGET_NL0
, NLDLY
, NL0
},
1389 { TARGET_NLDLY
, TARGET_NL1
, NLDLY
, NL1
},
1390 { TARGET_CRDLY
, TARGET_CR0
, CRDLY
, CR0
},
1391 { TARGET_CRDLY
, TARGET_CR1
, CRDLY
, CR1
},
1392 { TARGET_CRDLY
, TARGET_CR2
, CRDLY
, CR2
},
1393 { TARGET_CRDLY
, TARGET_CR3
, CRDLY
, CR3
},
1394 { TARGET_TABDLY
, TARGET_TAB0
, TABDLY
, TAB0
},
1395 { TARGET_TABDLY
, TARGET_TAB1
, TABDLY
, TAB1
},
1396 { TARGET_TABDLY
, TARGET_TAB2
, TABDLY
, TAB2
},
1397 { TARGET_TABDLY
, TARGET_TAB3
, TABDLY
, TAB3
},
1398 { TARGET_BSDLY
, TARGET_BS0
, BSDLY
, BS0
},
1399 { TARGET_BSDLY
, TARGET_BS1
, BSDLY
, BS1
},
1400 { TARGET_VTDLY
, TARGET_VT0
, VTDLY
, VT0
},
1401 { TARGET_VTDLY
, TARGET_VT1
, VTDLY
, VT1
},
1402 { TARGET_FFDLY
, TARGET_FF0
, FFDLY
, FF0
},
1403 { TARGET_FFDLY
, TARGET_FF1
, FFDLY
, FF1
},
1407 bitmask_transtbl cflag_tbl
[] = {
1408 { TARGET_CBAUD
, TARGET_B0
, CBAUD
, B0
},
1409 { TARGET_CBAUD
, TARGET_B50
, CBAUD
, B50
},
1410 { TARGET_CBAUD
, TARGET_B75
, CBAUD
, B75
},
1411 { TARGET_CBAUD
, TARGET_B110
, CBAUD
, B110
},
1412 { TARGET_CBAUD
, TARGET_B134
, CBAUD
, B134
},
1413 { TARGET_CBAUD
, TARGET_B150
, CBAUD
, B150
},
1414 { TARGET_CBAUD
, TARGET_B200
, CBAUD
, B200
},
1415 { TARGET_CBAUD
, TARGET_B300
, CBAUD
, B300
},
1416 { TARGET_CBAUD
, TARGET_B600
, CBAUD
, B600
},
1417 { TARGET_CBAUD
, TARGET_B1200
, CBAUD
, B1200
},
1418 { TARGET_CBAUD
, TARGET_B1800
, CBAUD
, B1800
},
1419 { TARGET_CBAUD
, TARGET_B2400
, CBAUD
, B2400
},
1420 { TARGET_CBAUD
, TARGET_B4800
, CBAUD
, B4800
},
1421 { TARGET_CBAUD
, TARGET_B9600
, CBAUD
, B9600
},
1422 { TARGET_CBAUD
, TARGET_B19200
, CBAUD
, B19200
},
1423 { TARGET_CBAUD
, TARGET_B38400
, CBAUD
, B38400
},
1424 { TARGET_CBAUD
, TARGET_B57600
, CBAUD
, B57600
},
1425 { TARGET_CBAUD
, TARGET_B115200
, CBAUD
, B115200
},
1426 { TARGET_CBAUD
, TARGET_B230400
, CBAUD
, B230400
},
1427 { TARGET_CBAUD
, TARGET_B460800
, CBAUD
, B460800
},
1428 { TARGET_CSIZE
, TARGET_CS5
, CSIZE
, CS5
},
1429 { TARGET_CSIZE
, TARGET_CS6
, CSIZE
, CS6
},
1430 { TARGET_CSIZE
, TARGET_CS7
, CSIZE
, CS7
},
1431 { TARGET_CSIZE
, TARGET_CS8
, CSIZE
, CS8
},
1432 { TARGET_CSTOPB
, TARGET_CSTOPB
, CSTOPB
, CSTOPB
},
1433 { TARGET_CREAD
, TARGET_CREAD
, CREAD
, CREAD
},
1434 { TARGET_PARENB
, TARGET_PARENB
, PARENB
, PARENB
},
1435 { TARGET_PARODD
, TARGET_PARODD
, PARODD
, PARODD
},
1436 { TARGET_HUPCL
, TARGET_HUPCL
, HUPCL
, HUPCL
},
1437 { TARGET_CLOCAL
, TARGET_CLOCAL
, CLOCAL
, CLOCAL
},
1438 { TARGET_CRTSCTS
, TARGET_CRTSCTS
, CRTSCTS
, CRTSCTS
},
1442 bitmask_transtbl lflag_tbl
[] = {
1443 { TARGET_ISIG
, TARGET_ISIG
, ISIG
, ISIG
},
1444 { TARGET_ICANON
, TARGET_ICANON
, ICANON
, ICANON
},
1445 { TARGET_XCASE
, TARGET_XCASE
, XCASE
, XCASE
},
1446 { TARGET_ECHO
, TARGET_ECHO
, ECHO
, ECHO
},
1447 { TARGET_ECHOE
, TARGET_ECHOE
, ECHOE
, ECHOE
},
1448 { TARGET_ECHOK
, TARGET_ECHOK
, ECHOK
, ECHOK
},
1449 { TARGET_ECHONL
, TARGET_ECHONL
, ECHONL
, ECHONL
},
1450 { TARGET_NOFLSH
, TARGET_NOFLSH
, NOFLSH
, NOFLSH
},
1451 { TARGET_TOSTOP
, TARGET_TOSTOP
, TOSTOP
, TOSTOP
},
1452 { TARGET_ECHOCTL
, TARGET_ECHOCTL
, ECHOCTL
, ECHOCTL
},
1453 { TARGET_ECHOPRT
, TARGET_ECHOPRT
, ECHOPRT
, ECHOPRT
},
1454 { TARGET_ECHOKE
, TARGET_ECHOKE
, ECHOKE
, ECHOKE
},
1455 { TARGET_FLUSHO
, TARGET_FLUSHO
, FLUSHO
, FLUSHO
},
1456 { TARGET_PENDIN
, TARGET_PENDIN
, PENDIN
, PENDIN
},
1457 { TARGET_IEXTEN
, TARGET_IEXTEN
, IEXTEN
, IEXTEN
},
1461 static void target_to_host_termios (void *dst
, const void *src
)
1463 struct host_termios
*host
= dst
;
1464 const struct target_termios
*target
= src
;
1467 target_to_host_bitmask(tswap32(target
->c_iflag
), iflag_tbl
);
1469 target_to_host_bitmask(tswap32(target
->c_oflag
), oflag_tbl
);
1471 target_to_host_bitmask(tswap32(target
->c_cflag
), cflag_tbl
);
1473 target_to_host_bitmask(tswap32(target
->c_lflag
), lflag_tbl
);
1474 host
->c_line
= target
->c_line
;
1476 host
->c_cc
[VINTR
] = target
->c_cc
[TARGET_VINTR
];
1477 host
->c_cc
[VQUIT
] = target
->c_cc
[TARGET_VQUIT
];
1478 host
->c_cc
[VERASE
] = target
->c_cc
[TARGET_VERASE
];
1479 host
->c_cc
[VKILL
] = target
->c_cc
[TARGET_VKILL
];
1480 host
->c_cc
[VEOF
] = target
->c_cc
[TARGET_VEOF
];
1481 host
->c_cc
[VTIME
] = target
->c_cc
[TARGET_VTIME
];
1482 host
->c_cc
[VMIN
] = target
->c_cc
[TARGET_VMIN
];
1483 host
->c_cc
[VSWTC
] = target
->c_cc
[TARGET_VSWTC
];
1484 host
->c_cc
[VSTART
] = target
->c_cc
[TARGET_VSTART
];
1485 host
->c_cc
[VSTOP
] = target
->c_cc
[TARGET_VSTOP
];
1486 host
->c_cc
[VSUSP
] = target
->c_cc
[TARGET_VSUSP
];
1487 host
->c_cc
[VEOL
] = target
->c_cc
[TARGET_VEOL
];
1488 host
->c_cc
[VREPRINT
] = target
->c_cc
[TARGET_VREPRINT
];
1489 host
->c_cc
[VDISCARD
] = target
->c_cc
[TARGET_VDISCARD
];
1490 host
->c_cc
[VWERASE
] = target
->c_cc
[TARGET_VWERASE
];
1491 host
->c_cc
[VLNEXT
] = target
->c_cc
[TARGET_VLNEXT
];
1492 host
->c_cc
[VEOL2
] = target
->c_cc
[TARGET_VEOL2
];
1495 static void host_to_target_termios (void *dst
, const void *src
)
1497 struct target_termios
*target
= dst
;
1498 const struct host_termios
*host
= src
;
1501 tswap32(host_to_target_bitmask(host
->c_iflag
, iflag_tbl
));
1503 tswap32(host_to_target_bitmask(host
->c_oflag
, oflag_tbl
));
1505 tswap32(host_to_target_bitmask(host
->c_cflag
, cflag_tbl
));
1507 tswap32(host_to_target_bitmask(host
->c_lflag
, lflag_tbl
));
1508 target
->c_line
= host
->c_line
;
1510 target
->c_cc
[TARGET_VINTR
] = host
->c_cc
[VINTR
];
1511 target
->c_cc
[TARGET_VQUIT
] = host
->c_cc
[VQUIT
];
1512 target
->c_cc
[TARGET_VERASE
] = host
->c_cc
[VERASE
];
1513 target
->c_cc
[TARGET_VKILL
] = host
->c_cc
[VKILL
];
1514 target
->c_cc
[TARGET_VEOF
] = host
->c_cc
[VEOF
];
1515 target
->c_cc
[TARGET_VTIME
] = host
->c_cc
[VTIME
];
1516 target
->c_cc
[TARGET_VMIN
] = host
->c_cc
[VMIN
];
1517 target
->c_cc
[TARGET_VSWTC
] = host
->c_cc
[VSWTC
];
1518 target
->c_cc
[TARGET_VSTART
] = host
->c_cc
[VSTART
];
1519 target
->c_cc
[TARGET_VSTOP
] = host
->c_cc
[VSTOP
];
1520 target
->c_cc
[TARGET_VSUSP
] = host
->c_cc
[VSUSP
];
1521 target
->c_cc
[TARGET_VEOL
] = host
->c_cc
[VEOL
];
1522 target
->c_cc
[TARGET_VREPRINT
] = host
->c_cc
[VREPRINT
];
1523 target
->c_cc
[TARGET_VDISCARD
] = host
->c_cc
[VDISCARD
];
1524 target
->c_cc
[TARGET_VWERASE
] = host
->c_cc
[VWERASE
];
1525 target
->c_cc
[TARGET_VLNEXT
] = host
->c_cc
[VLNEXT
];
1526 target
->c_cc
[TARGET_VEOL2
] = host
->c_cc
[VEOL2
];
1529 StructEntry struct_termios_def
= {
1530 .convert
= { host_to_target_termios
, target_to_host_termios
},
1531 .size
= { sizeof(struct target_termios
), sizeof(struct host_termios
) },
1532 .align
= { __alignof__(struct target_termios
), __alignof__(struct host_termios
) },
1535 static bitmask_transtbl mmap_flags_tbl
[] = {
1536 { TARGET_MAP_SHARED
, TARGET_MAP_SHARED
, MAP_SHARED
, MAP_SHARED
},
1537 { TARGET_MAP_PRIVATE
, TARGET_MAP_PRIVATE
, MAP_PRIVATE
, MAP_PRIVATE
},
1538 { TARGET_MAP_FIXED
, TARGET_MAP_FIXED
, MAP_FIXED
, MAP_FIXED
},
1539 { TARGET_MAP_ANONYMOUS
, TARGET_MAP_ANONYMOUS
, MAP_ANONYMOUS
, MAP_ANONYMOUS
},
1540 { TARGET_MAP_GROWSDOWN
, TARGET_MAP_GROWSDOWN
, MAP_GROWSDOWN
, MAP_GROWSDOWN
},
1541 { TARGET_MAP_DENYWRITE
, TARGET_MAP_DENYWRITE
, MAP_DENYWRITE
, MAP_DENYWRITE
},
1542 { TARGET_MAP_EXECUTABLE
, TARGET_MAP_EXECUTABLE
, MAP_EXECUTABLE
, MAP_EXECUTABLE
},
1543 { TARGET_MAP_LOCKED
, TARGET_MAP_LOCKED
, MAP_LOCKED
, MAP_LOCKED
},
1547 static bitmask_transtbl fcntl_flags_tbl
[] = {
1548 { TARGET_O_ACCMODE
, TARGET_O_WRONLY
, O_ACCMODE
, O_WRONLY
, },
1549 { TARGET_O_ACCMODE
, TARGET_O_RDWR
, O_ACCMODE
, O_RDWR
, },
1550 { TARGET_O_CREAT
, TARGET_O_CREAT
, O_CREAT
, O_CREAT
, },
1551 { TARGET_O_EXCL
, TARGET_O_EXCL
, O_EXCL
, O_EXCL
, },
1552 { TARGET_O_NOCTTY
, TARGET_O_NOCTTY
, O_NOCTTY
, O_NOCTTY
, },
1553 { TARGET_O_TRUNC
, TARGET_O_TRUNC
, O_TRUNC
, O_TRUNC
, },
1554 { TARGET_O_APPEND
, TARGET_O_APPEND
, O_APPEND
, O_APPEND
, },
1555 { TARGET_O_NONBLOCK
, TARGET_O_NONBLOCK
, O_NONBLOCK
, O_NONBLOCK
, },
1556 { TARGET_O_SYNC
, TARGET_O_SYNC
, O_SYNC
, O_SYNC
, },
1557 { TARGET_FASYNC
, TARGET_FASYNC
, FASYNC
, FASYNC
, },
1558 { TARGET_O_DIRECTORY
, TARGET_O_DIRECTORY
, O_DIRECTORY
, O_DIRECTORY
, },
1559 { TARGET_O_NOFOLLOW
, TARGET_O_NOFOLLOW
, O_NOFOLLOW
, O_NOFOLLOW
, },
1560 { TARGET_O_LARGEFILE
, TARGET_O_LARGEFILE
, O_LARGEFILE
, O_LARGEFILE
, },
1561 #if defined(O_DIRECT)
1562 { TARGET_O_DIRECT
, TARGET_O_DIRECT
, O_DIRECT
, O_DIRECT
, },
1567 #if defined(TARGET_I386)
1569 /* NOTE: there is really one LDT for all the threads */
1572 static int read_ldt(target_ulong ptr
, unsigned long bytecount
)
1579 size
= TARGET_LDT_ENTRIES
* TARGET_LDT_ENTRY_SIZE
;
1580 if (size
> bytecount
)
1582 p
= lock_user(ptr
, size
, 0);
1583 /* ??? Shoudl this by byteswapped? */
1584 memcpy(p
, ldt_table
, size
);
1585 unlock_user(p
, ptr
, size
);
1589 /* XXX: add locking support */
1590 static int write_ldt(CPUX86State
*env
,
1591 target_ulong ptr
, unsigned long bytecount
, int oldmode
)
1593 struct target_modify_ldt_ldt_s ldt_info
;
1594 struct target_modify_ldt_ldt_s
*target_ldt_info
;
1595 int seg_32bit
, contents
, read_exec_only
, limit_in_pages
;
1596 int seg_not_present
, useable
;
1597 uint32_t *lp
, entry_1
, entry_2
;
1599 if (bytecount
!= sizeof(ldt_info
))
1601 lock_user_struct(target_ldt_info
, ptr
, 1);
1602 ldt_info
.entry_number
= tswap32(target_ldt_info
->entry_number
);
1603 ldt_info
.base_addr
= tswapl(target_ldt_info
->base_addr
);
1604 ldt_info
.limit
= tswap32(target_ldt_info
->limit
);
1605 ldt_info
.flags
= tswap32(target_ldt_info
->flags
);
1606 unlock_user_struct(target_ldt_info
, ptr
, 0);
1608 if (ldt_info
.entry_number
>= TARGET_LDT_ENTRIES
)
1610 seg_32bit
= ldt_info
.flags
& 1;
1611 contents
= (ldt_info
.flags
>> 1) & 3;
1612 read_exec_only
= (ldt_info
.flags
>> 3) & 1;
1613 limit_in_pages
= (ldt_info
.flags
>> 4) & 1;
1614 seg_not_present
= (ldt_info
.flags
>> 5) & 1;
1615 useable
= (ldt_info
.flags
>> 6) & 1;
1617 if (contents
== 3) {
1620 if (seg_not_present
== 0)
1623 /* allocate the LDT */
1625 ldt_table
= malloc(TARGET_LDT_ENTRIES
* TARGET_LDT_ENTRY_SIZE
);
1628 memset(ldt_table
, 0, TARGET_LDT_ENTRIES
* TARGET_LDT_ENTRY_SIZE
);
1629 env
->ldt
.base
= h2g(ldt_table
);
1630 env
->ldt
.limit
= 0xffff;
1633 /* NOTE: same code as Linux kernel */
1634 /* Allow LDTs to be cleared by the user. */
1635 if (ldt_info
.base_addr
== 0 && ldt_info
.limit
== 0) {
1638 read_exec_only
== 1 &&
1640 limit_in_pages
== 0 &&
1641 seg_not_present
== 1 &&
1649 entry_1
= ((ldt_info
.base_addr
& 0x0000ffff) << 16) |
1650 (ldt_info
.limit
& 0x0ffff);
1651 entry_2
= (ldt_info
.base_addr
& 0xff000000) |
1652 ((ldt_info
.base_addr
& 0x00ff0000) >> 16) |
1653 (ldt_info
.limit
& 0xf0000) |
1654 ((read_exec_only
^ 1) << 9) |
1656 ((seg_not_present
^ 1) << 15) |
1658 (limit_in_pages
<< 23) |
1661 entry_2
|= (useable
<< 20);
1663 /* Install the new entry ... */
1665 lp
= (uint32_t *)(ldt_table
+ (ldt_info
.entry_number
<< 3));
1666 lp
[0] = tswap32(entry_1
);
1667 lp
[1] = tswap32(entry_2
);
1671 /* specific and weird i386 syscalls */
1672 int do_modify_ldt(CPUX86State
*env
, int func
, target_ulong ptr
, unsigned long bytecount
)
1678 ret
= read_ldt(ptr
, bytecount
);
1681 ret
= write_ldt(env
, ptr
, bytecount
, 1);
1684 ret
= write_ldt(env
, ptr
, bytecount
, 0);
1690 #endif /* defined(TARGET_I386) */
1692 /* this stack is the equivalent of the kernel stack associated with a
1694 #define NEW_STACK_SIZE 8192
1696 static int clone_func(void *arg
)
1698 CPUState
*env
= arg
;
1704 int do_fork(CPUState
*env
, unsigned int flags
, unsigned long newsp
)
1711 if (flags
& CLONE_VM
) {
1712 ts
= malloc(sizeof(TaskState
) + NEW_STACK_SIZE
);
1713 memset(ts
, 0, sizeof(TaskState
));
1714 new_stack
= ts
->stack
;
1716 /* add in task state list */
1717 ts
->next
= first_task_state
;
1718 first_task_state
= ts
;
1719 /* we create a new CPU instance. */
1720 new_env
= cpu_init();
1721 memcpy(new_env
, env
, sizeof(CPUState
));
1722 #if defined(TARGET_I386)
1724 newsp
= env
->regs
[R_ESP
];
1725 new_env
->regs
[R_ESP
] = newsp
;
1726 new_env
->regs
[R_EAX
] = 0;
1727 #elif defined(TARGET_ARM)
1729 newsp
= env
->regs
[13];
1730 new_env
->regs
[13] = newsp
;
1731 new_env
->regs
[0] = 0;
1732 #elif defined(TARGET_SPARC)
1734 newsp
= env
->regwptr
[22];
1735 new_env
->regwptr
[22] = newsp
;
1736 new_env
->regwptr
[0] = 0;
1738 printf ("HELPME: %s:%d\n", __FILE__
, __LINE__
);
1739 #elif defined(TARGET_M68K)
1741 newsp
= env
->aregs
[7];
1742 new_env
->aregs
[7] = newsp
;
1743 new_env
->dregs
[0] = 0;
1744 /* ??? is this sufficient? */
1745 #elif defined(TARGET_MIPS)
1746 printf ("HELPME: %s:%d\n", __FILE__
, __LINE__
);
1747 #elif defined(TARGET_PPC)
1749 newsp
= env
->gpr
[1];
1750 new_env
->gpr
[1] = newsp
;
1753 for (i
= 7; i
< 32; i
++)
1754 new_env
->gpr
[i
] = 0;
1756 #elif defined(TARGET_SH4)
1758 newsp
= env
->gregs
[15];
1759 new_env
->gregs
[15] = newsp
;
1762 #error unsupported target CPU
1764 new_env
->opaque
= ts
;
1766 ret
= __clone2(clone_func
, new_stack
+ NEW_STACK_SIZE
, flags
, new_env
);
1768 ret
= clone(clone_func
, new_stack
+ NEW_STACK_SIZE
, flags
, new_env
);
1771 /* if no CLONE_VM, we consider it is a fork */
1772 if ((flags
& ~CSIGNAL
) != 0)
1779 static long do_fcntl(int fd
, int cmd
, target_ulong arg
)
1782 struct target_flock
*target_fl
;
1783 struct flock64 fl64
;
1784 struct target_flock64
*target_fl64
;
1788 case TARGET_F_GETLK
:
1789 ret
= fcntl(fd
, cmd
, &fl
);
1791 lock_user_struct(target_fl
, arg
, 0);
1792 target_fl
->l_type
= tswap16(fl
.l_type
);
1793 target_fl
->l_whence
= tswap16(fl
.l_whence
);
1794 target_fl
->l_start
= tswapl(fl
.l_start
);
1795 target_fl
->l_len
= tswapl(fl
.l_len
);
1796 target_fl
->l_pid
= tswapl(fl
.l_pid
);
1797 unlock_user_struct(target_fl
, arg
, 1);
1801 case TARGET_F_SETLK
:
1802 case TARGET_F_SETLKW
:
1803 lock_user_struct(target_fl
, arg
, 1);
1804 fl
.l_type
= tswap16(target_fl
->l_type
);
1805 fl
.l_whence
= tswap16(target_fl
->l_whence
);
1806 fl
.l_start
= tswapl(target_fl
->l_start
);
1807 fl
.l_len
= tswapl(target_fl
->l_len
);
1808 fl
.l_pid
= tswapl(target_fl
->l_pid
);
1809 unlock_user_struct(target_fl
, arg
, 0);
1810 ret
= fcntl(fd
, cmd
, &fl
);
1813 case TARGET_F_GETLK64
:
1814 ret
= fcntl(fd
, cmd
>> 1, &fl64
);
1816 lock_user_struct(target_fl64
, arg
, 0);
1817 target_fl64
->l_type
= tswap16(fl64
.l_type
) >> 1;
1818 target_fl64
->l_whence
= tswap16(fl64
.l_whence
);
1819 target_fl64
->l_start
= tswapl(fl64
.l_start
);
1820 target_fl64
->l_len
= tswapl(fl64
.l_len
);
1821 target_fl64
->l_pid
= tswapl(fl64
.l_pid
);
1822 unlock_user_struct(target_fl64
, arg
, 1);
1825 case TARGET_F_SETLK64
:
1826 case TARGET_F_SETLKW64
:
1827 lock_user_struct(target_fl64
, arg
, 1);
1828 fl64
.l_type
= tswap16(target_fl64
->l_type
) >> 1;
1829 fl64
.l_whence
= tswap16(target_fl64
->l_whence
);
1830 fl64
.l_start
= tswapl(target_fl64
->l_start
);
1831 fl64
.l_len
= tswapl(target_fl64
->l_len
);
1832 fl64
.l_pid
= tswap16(target_fl64
->l_pid
);
1833 unlock_user_struct(target_fl64
, arg
, 0);
1834 ret
= fcntl(fd
, cmd
>> 1, &fl64
);
1838 ret
= fcntl(fd
, cmd
, arg
);
1839 ret
= host_to_target_bitmask(ret
, fcntl_flags_tbl
);
1843 ret
= fcntl(fd
, cmd
, target_to_host_bitmask(arg
, fcntl_flags_tbl
));
1847 ret
= fcntl(fd
, cmd
, arg
);
1855 static inline int high2lowuid(int uid
)
1863 static inline int high2lowgid(int gid
)
1871 static inline int low2highuid(int uid
)
1873 if ((int16_t)uid
== -1)
1879 static inline int low2highgid(int gid
)
1881 if ((int16_t)gid
== -1)
1887 #endif /* USE_UID16 */
1889 void syscall_init(void)
1892 const argtype
*arg_type
;
1895 #define STRUCT(name, list...) thunk_register_struct(STRUCT_ ## name, #name, struct_ ## name ## _def);
1896 #define STRUCT_SPECIAL(name) thunk_register_struct_direct(STRUCT_ ## name, #name, &struct_ ## name ## _def);
1897 #include "syscall_types.h"
1899 #undef STRUCT_SPECIAL
1901 /* we patch the ioctl size if necessary. We rely on the fact that
1902 no ioctl has all the bits at '1' in the size field */
1904 while (ie
->target_cmd
!= 0) {
1905 if (((ie
->target_cmd
>> TARGET_IOC_SIZESHIFT
) & TARGET_IOC_SIZEMASK
) ==
1906 TARGET_IOC_SIZEMASK
) {
1907 arg_type
= ie
->arg_type
;
1908 if (arg_type
[0] != TYPE_PTR
) {
1909 fprintf(stderr
, "cannot patch size for ioctl 0x%x\n",
1914 size
= thunk_type_size(arg_type
, 0);
1915 ie
->target_cmd
= (ie
->target_cmd
&
1916 ~(TARGET_IOC_SIZEMASK
<< TARGET_IOC_SIZESHIFT
)) |
1917 (size
<< TARGET_IOC_SIZESHIFT
);
1919 /* automatic consistency check if same arch */
1920 #if defined(__i386__) && defined(TARGET_I386)
1921 if (ie
->target_cmd
!= ie
->host_cmd
) {
1922 fprintf(stderr
, "ERROR: ioctl: target=0x%x host=0x%x\n",
1923 ie
->target_cmd
, ie
->host_cmd
);
1930 static inline uint64_t target_offset64(uint32_t word0
, uint32_t word1
)
1932 #ifdef TARGET_WORDS_BIG_ENDIAN
1933 return ((uint64_t)word0
<< 32) | word1
;
1935 return ((uint64_t)word1
<< 32) | word0
;
1939 #ifdef TARGET_NR_truncate64
1940 static inline long target_truncate64(void *cpu_env
, const char *arg1
,
1941 long arg2
, long arg3
, long arg4
)
1944 if (((CPUARMState
*)cpu_env
)->eabi
)
1950 return get_errno(truncate64(arg1
, target_offset64(arg2
, arg3
)));
1954 #ifdef TARGET_NR_ftruncate64
1955 static inline long target_ftruncate64(void *cpu_env
, long arg1
, long arg2
,
1956 long arg3
, long arg4
)
1959 if (((CPUARMState
*)cpu_env
)->eabi
)
1965 return get_errno(ftruncate64(arg1
, target_offset64(arg2
, arg3
)));
1969 static inline void target_to_host_timespec(struct timespec
*host_ts
,
1970 target_ulong target_addr
)
1972 struct target_timespec
*target_ts
;
1974 lock_user_struct(target_ts
, target_addr
, 1);
1975 host_ts
->tv_sec
= tswapl(target_ts
->tv_sec
);
1976 host_ts
->tv_nsec
= tswapl(target_ts
->tv_nsec
);
1977 unlock_user_struct(target_ts
, target_addr
, 0);
1980 static inline void host_to_target_timespec(target_ulong target_addr
,
1981 struct timespec
*host_ts
)
1983 struct target_timespec
*target_ts
;
1985 lock_user_struct(target_ts
, target_addr
, 0);
1986 target_ts
->tv_sec
= tswapl(host_ts
->tv_sec
);
1987 target_ts
->tv_nsec
= tswapl(host_ts
->tv_nsec
);
1988 unlock_user_struct(target_ts
, target_addr
, 1);
1991 long do_syscall(void *cpu_env
, int num
, long arg1
, long arg2
, long arg3
,
1992 long arg4
, long arg5
, long arg6
)
2000 gemu_log("syscall %d", num
);
2003 case TARGET_NR_exit
:
2007 gdb_exit(cpu_env
, arg1
);
2008 /* XXX: should free thread stack and CPU env */
2010 ret
= 0; /* avoid warning */
2012 case TARGET_NR_read
:
2013 page_unprotect_range(arg2
, arg3
);
2014 p
= lock_user(arg2
, arg3
, 0);
2015 ret
= get_errno(read(arg1
, p
, arg3
));
2016 unlock_user(p
, arg2
, ret
);
2018 case TARGET_NR_write
:
2019 p
= lock_user(arg2
, arg3
, 1);
2020 ret
= get_errno(write(arg1
, p
, arg3
));
2021 unlock_user(p
, arg2
, 0);
2023 case TARGET_NR_open
:
2024 p
= lock_user_string(arg1
);
2025 ret
= get_errno(open(path(p
),
2026 target_to_host_bitmask(arg2
, fcntl_flags_tbl
),
2028 unlock_user(p
, arg1
, 0);
2030 case TARGET_NR_close
:
2031 ret
= get_errno(close(arg1
));
2036 case TARGET_NR_fork
:
2037 ret
= get_errno(do_fork(cpu_env
, SIGCHLD
, 0));
2039 case TARGET_NR_waitpid
:
2042 ret
= get_errno(waitpid(arg1
, &status
, arg3
));
2043 if (!is_error(ret
) && arg2
)
2044 tput32(arg2
, status
);
2047 case TARGET_NR_creat
:
2048 p
= lock_user_string(arg1
);
2049 ret
= get_errno(creat(p
, arg2
));
2050 unlock_user(p
, arg1
, 0);
2052 case TARGET_NR_link
:
2055 p
= lock_user_string(arg1
);
2056 p2
= lock_user_string(arg2
);
2057 ret
= get_errno(link(p
, p2
));
2058 unlock_user(p2
, arg2
, 0);
2059 unlock_user(p
, arg1
, 0);
2062 case TARGET_NR_unlink
:
2063 p
= lock_user_string(arg1
);
2064 ret
= get_errno(unlink(p
));
2065 unlock_user(p
, arg1
, 0);
2067 case TARGET_NR_execve
:
2069 char **argp
, **envp
;
2072 target_ulong guest_argp
;
2073 target_ulong guest_envp
;
2079 for (gp
= guest_argp
; tgetl(gp
); gp
++)
2083 for (gp
= guest_envp
; tgetl(gp
); gp
++)
2086 argp
= alloca((argc
+ 1) * sizeof(void *));
2087 envp
= alloca((envc
+ 1) * sizeof(void *));
2089 for (gp
= guest_argp
, q
= argp
; ;
2090 gp
+= sizeof(target_ulong
), q
++) {
2094 *q
= lock_user_string(addr
);
2098 for (gp
= guest_envp
, q
= envp
; ;
2099 gp
+= sizeof(target_ulong
), q
++) {
2103 *q
= lock_user_string(addr
);
2107 p
= lock_user_string(arg1
);
2108 ret
= get_errno(execve(p
, argp
, envp
));
2109 unlock_user(p
, arg1
, 0);
2111 for (gp
= guest_argp
, q
= argp
; *q
;
2112 gp
+= sizeof(target_ulong
), q
++) {
2114 unlock_user(*q
, addr
, 0);
2116 for (gp
= guest_envp
, q
= envp
; *q
;
2117 gp
+= sizeof(target_ulong
), q
++) {
2119 unlock_user(*q
, addr
, 0);
2123 case TARGET_NR_chdir
:
2124 p
= lock_user_string(arg1
);
2125 ret
= get_errno(chdir(p
));
2126 unlock_user(p
, arg1
, 0);
2128 #ifdef TARGET_NR_time
2129 case TARGET_NR_time
:
2132 ret
= get_errno(time(&host_time
));
2133 if (!is_error(ret
) && arg1
)
2134 tputl(arg1
, host_time
);
2138 case TARGET_NR_mknod
:
2139 p
= lock_user_string(arg1
);
2140 ret
= get_errno(mknod(p
, arg2
, arg3
));
2141 unlock_user(p
, arg1
, 0);
2143 case TARGET_NR_chmod
:
2144 p
= lock_user_string(arg1
);
2145 ret
= get_errno(chmod(p
, arg2
));
2146 unlock_user(p
, arg1
, 0);
2148 #ifdef TARGET_NR_break
2149 case TARGET_NR_break
:
2152 #ifdef TARGET_NR_oldstat
2153 case TARGET_NR_oldstat
:
2156 case TARGET_NR_lseek
:
2157 ret
= get_errno(lseek(arg1
, arg2
, arg3
));
2159 case TARGET_NR_getpid
:
2160 ret
= get_errno(getpid());
2162 case TARGET_NR_mount
:
2163 /* need to look at the data field */
2165 case TARGET_NR_umount
:
2166 p
= lock_user_string(arg1
);
2167 ret
= get_errno(umount(p
));
2168 unlock_user(p
, arg1
, 0);
2170 case TARGET_NR_stime
:
2173 host_time
= tgetl(arg1
);
2174 ret
= get_errno(stime(&host_time
));
2177 case TARGET_NR_ptrace
:
2179 case TARGET_NR_alarm
:
2182 #ifdef TARGET_NR_oldfstat
2183 case TARGET_NR_oldfstat
:
2186 case TARGET_NR_pause
:
2187 ret
= get_errno(pause());
2189 case TARGET_NR_utime
:
2191 struct utimbuf tbuf
, *host_tbuf
;
2192 struct target_utimbuf
*target_tbuf
;
2194 lock_user_struct(target_tbuf
, arg2
, 1);
2195 tbuf
.actime
= tswapl(target_tbuf
->actime
);
2196 tbuf
.modtime
= tswapl(target_tbuf
->modtime
);
2197 unlock_user_struct(target_tbuf
, arg2
, 0);
2202 p
= lock_user_string(arg1
);
2203 ret
= get_errno(utime(p
, host_tbuf
));
2204 unlock_user(p
, arg1
, 0);
2207 case TARGET_NR_utimes
:
2209 struct timeval
*tvp
, tv
[2];
2211 target_to_host_timeval(&tv
[0], arg2
);
2212 target_to_host_timeval(&tv
[1],
2213 arg2
+ sizeof (struct target_timeval
));
2218 p
= lock_user_string(arg1
);
2219 ret
= get_errno(utimes(p
, tvp
));
2220 unlock_user(p
, arg1
, 0);
2223 #ifdef TARGET_NR_stty
2224 case TARGET_NR_stty
:
2227 #ifdef TARGET_NR_gtty
2228 case TARGET_NR_gtty
:
2231 case TARGET_NR_access
:
2232 p
= lock_user_string(arg1
);
2233 ret
= get_errno(access(p
, arg2
));
2234 unlock_user(p
, arg1
, 0);
2236 case TARGET_NR_nice
:
2237 ret
= get_errno(nice(arg1
));
2239 #ifdef TARGET_NR_ftime
2240 case TARGET_NR_ftime
:
2243 case TARGET_NR_sync
:
2247 case TARGET_NR_kill
:
2248 ret
= get_errno(kill(arg1
, arg2
));
2250 case TARGET_NR_rename
:
2253 p
= lock_user_string(arg1
);
2254 p2
= lock_user_string(arg2
);
2255 ret
= get_errno(rename(p
, p2
));
2256 unlock_user(p2
, arg2
, 0);
2257 unlock_user(p
, arg1
, 0);
2260 case TARGET_NR_mkdir
:
2261 p
= lock_user_string(arg1
);
2262 ret
= get_errno(mkdir(p
, arg2
));
2263 unlock_user(p
, arg1
, 0);
2265 case TARGET_NR_rmdir
:
2266 p
= lock_user_string(arg1
);
2267 ret
= get_errno(rmdir(p
));
2268 unlock_user(p
, arg1
, 0);
2271 ret
= get_errno(dup(arg1
));
2273 case TARGET_NR_pipe
:
2276 ret
= get_errno(pipe(host_pipe
));
2277 if (!is_error(ret
)) {
2278 tput32(arg1
, host_pipe
[0]);
2279 tput32(arg1
+ 4, host_pipe
[1]);
2283 case TARGET_NR_times
:
2285 struct target_tms
*tmsp
;
2287 ret
= get_errno(times(&tms
));
2289 tmsp
= lock_user(arg1
, sizeof(struct target_tms
), 0);
2290 tmsp
->tms_utime
= tswapl(host_to_target_clock_t(tms
.tms_utime
));
2291 tmsp
->tms_stime
= tswapl(host_to_target_clock_t(tms
.tms_stime
));
2292 tmsp
->tms_cutime
= tswapl(host_to_target_clock_t(tms
.tms_cutime
));
2293 tmsp
->tms_cstime
= tswapl(host_to_target_clock_t(tms
.tms_cstime
));
2296 ret
= host_to_target_clock_t(ret
);
2299 #ifdef TARGET_NR_prof
2300 case TARGET_NR_prof
:
2303 case TARGET_NR_signal
:
2306 case TARGET_NR_acct
:
2307 p
= lock_user_string(arg1
);
2308 ret
= get_errno(acct(path(p
)));
2309 unlock_user(p
, arg1
, 0);
2311 case TARGET_NR_umount2
:
2312 p
= lock_user_string(arg1
);
2313 ret
= get_errno(umount2(p
, arg2
));
2314 unlock_user(p
, arg1
, 0);
2316 #ifdef TARGET_NR_lock
2317 case TARGET_NR_lock
:
2320 case TARGET_NR_ioctl
:
2321 ret
= do_ioctl(arg1
, arg2
, arg3
);
2323 case TARGET_NR_fcntl
:
2324 ret
= get_errno(do_fcntl(arg1
, arg2
, arg3
));
2326 #ifdef TARGET_NR_mpx
2330 case TARGET_NR_setpgid
:
2331 ret
= get_errno(setpgid(arg1
, arg2
));
2333 #ifdef TARGET_NR_ulimit
2334 case TARGET_NR_ulimit
:
2337 #ifdef TARGET_NR_oldolduname
2338 case TARGET_NR_oldolduname
:
2341 case TARGET_NR_umask
:
2342 ret
= get_errno(umask(arg1
));
2344 case TARGET_NR_chroot
:
2345 p
= lock_user_string(arg1
);
2346 ret
= get_errno(chroot(p
));
2347 unlock_user(p
, arg1
, 0);
2349 case TARGET_NR_ustat
:
2351 case TARGET_NR_dup2
:
2352 ret
= get_errno(dup2(arg1
, arg2
));
2354 case TARGET_NR_getppid
:
2355 ret
= get_errno(getppid());
2357 case TARGET_NR_getpgrp
:
2358 ret
= get_errno(getpgrp());
2360 case TARGET_NR_setsid
:
2361 ret
= get_errno(setsid());
2363 case TARGET_NR_sigaction
:
2365 #if !defined(TARGET_MIPS)
2366 struct target_old_sigaction
*old_act
;
2367 struct target_sigaction act
, oact
, *pact
;
2369 lock_user_struct(old_act
, arg2
, 1);
2370 act
._sa_handler
= old_act
->_sa_handler
;
2371 target_siginitset(&act
.sa_mask
, old_act
->sa_mask
);
2372 act
.sa_flags
= old_act
->sa_flags
;
2373 act
.sa_restorer
= old_act
->sa_restorer
;
2374 unlock_user_struct(old_act
, arg2
, 0);
2379 ret
= get_errno(do_sigaction(arg1
, pact
, &oact
));
2380 if (!is_error(ret
) && arg3
) {
2381 lock_user_struct(old_act
, arg3
, 0);
2382 old_act
->_sa_handler
= oact
._sa_handler
;
2383 old_act
->sa_mask
= oact
.sa_mask
.sig
[0];
2384 old_act
->sa_flags
= oact
.sa_flags
;
2385 old_act
->sa_restorer
= oact
.sa_restorer
;
2386 unlock_user_struct(old_act
, arg3
, 1);
2389 struct target_sigaction act
, oact
, *pact
, *old_act
;
2392 lock_user_struct(old_act
, arg2
, 1);
2393 act
._sa_handler
= old_act
->_sa_handler
;
2394 target_siginitset(&act
.sa_mask
, old_act
->sa_mask
.sig
[0]);
2395 act
.sa_flags
= old_act
->sa_flags
;
2396 unlock_user_struct(old_act
, arg2
, 0);
2402 ret
= get_errno(do_sigaction(arg1
, pact
, &oact
));
2404 if (!is_error(ret
) && arg3
) {
2405 lock_user_struct(old_act
, arg3
, 0);
2406 old_act
->_sa_handler
= oact
._sa_handler
;
2407 old_act
->sa_flags
= oact
.sa_flags
;
2408 old_act
->sa_mask
.sig
[0] = oact
.sa_mask
.sig
[0];
2409 old_act
->sa_mask
.sig
[1] = 0;
2410 old_act
->sa_mask
.sig
[2] = 0;
2411 old_act
->sa_mask
.sig
[3] = 0;
2412 unlock_user_struct(old_act
, arg3
, 1);
2417 case TARGET_NR_rt_sigaction
:
2419 struct target_sigaction
*act
;
2420 struct target_sigaction
*oact
;
2423 lock_user_struct(act
, arg2
, 1);
2427 lock_user_struct(oact
, arg3
, 0);
2430 ret
= get_errno(do_sigaction(arg1
, act
, oact
));
2432 unlock_user_struct(act
, arg2
, 0);
2434 unlock_user_struct(oact
, arg3
, 1);
2437 case TARGET_NR_sgetmask
:
2440 target_ulong target_set
;
2441 sigprocmask(0, NULL
, &cur_set
);
2442 host_to_target_old_sigset(&target_set
, &cur_set
);
2446 case TARGET_NR_ssetmask
:
2448 sigset_t set
, oset
, cur_set
;
2449 target_ulong target_set
= arg1
;
2450 sigprocmask(0, NULL
, &cur_set
);
2451 target_to_host_old_sigset(&set
, &target_set
);
2452 sigorset(&set
, &set
, &cur_set
);
2453 sigprocmask(SIG_SETMASK
, &set
, &oset
);
2454 host_to_target_old_sigset(&target_set
, &oset
);
2458 case TARGET_NR_sigprocmask
:
2461 sigset_t set
, oldset
, *set_ptr
;
2465 case TARGET_SIG_BLOCK
:
2468 case TARGET_SIG_UNBLOCK
:
2471 case TARGET_SIG_SETMASK
:
2478 p
= lock_user(arg2
, sizeof(target_sigset_t
), 1);
2479 target_to_host_old_sigset(&set
, p
);
2480 unlock_user(p
, arg2
, 0);
2486 ret
= get_errno(sigprocmask(arg1
, set_ptr
, &oldset
));
2487 if (!is_error(ret
) && arg3
) {
2488 p
= lock_user(arg3
, sizeof(target_sigset_t
), 0);
2489 host_to_target_old_sigset(p
, &oldset
);
2490 unlock_user(p
, arg3
, sizeof(target_sigset_t
));
2494 case TARGET_NR_rt_sigprocmask
:
2497 sigset_t set
, oldset
, *set_ptr
;
2501 case TARGET_SIG_BLOCK
:
2504 case TARGET_SIG_UNBLOCK
:
2507 case TARGET_SIG_SETMASK
:
2514 p
= lock_user(arg2
, sizeof(target_sigset_t
), 1);
2515 target_to_host_sigset(&set
, p
);
2516 unlock_user(p
, arg2
, 0);
2522 ret
= get_errno(sigprocmask(how
, set_ptr
, &oldset
));
2523 if (!is_error(ret
) && arg3
) {
2524 p
= lock_user(arg3
, sizeof(target_sigset_t
), 0);
2525 host_to_target_sigset(p
, &oldset
);
2526 unlock_user(p
, arg3
, sizeof(target_sigset_t
));
2530 case TARGET_NR_sigpending
:
2533 ret
= get_errno(sigpending(&set
));
2534 if (!is_error(ret
)) {
2535 p
= lock_user(arg1
, sizeof(target_sigset_t
), 0);
2536 host_to_target_old_sigset(p
, &set
);
2537 unlock_user(p
, arg1
, sizeof(target_sigset_t
));
2541 case TARGET_NR_rt_sigpending
:
2544 ret
= get_errno(sigpending(&set
));
2545 if (!is_error(ret
)) {
2546 p
= lock_user(arg1
, sizeof(target_sigset_t
), 0);
2547 host_to_target_sigset(p
, &set
);
2548 unlock_user(p
, arg1
, sizeof(target_sigset_t
));
2552 case TARGET_NR_sigsuspend
:
2555 p
= lock_user(arg1
, sizeof(target_sigset_t
), 1);
2556 target_to_host_old_sigset(&set
, p
);
2557 unlock_user(p
, arg1
, 0);
2558 ret
= get_errno(sigsuspend(&set
));
2561 case TARGET_NR_rt_sigsuspend
:
2564 p
= lock_user(arg1
, sizeof(target_sigset_t
), 1);
2565 target_to_host_sigset(&set
, p
);
2566 unlock_user(p
, arg1
, 0);
2567 ret
= get_errno(sigsuspend(&set
));
2570 case TARGET_NR_rt_sigtimedwait
:
2573 struct timespec uts
, *puts
;
2576 p
= lock_user(arg1
, sizeof(target_sigset_t
), 1);
2577 target_to_host_sigset(&set
, p
);
2578 unlock_user(p
, arg1
, 0);
2581 target_to_host_timespec(puts
, arg3
);
2585 ret
= get_errno(sigtimedwait(&set
, &uinfo
, puts
));
2586 if (!is_error(ret
) && arg2
) {
2587 p
= lock_user(arg2
, sizeof(target_sigset_t
), 0);
2588 host_to_target_siginfo(p
, &uinfo
);
2589 unlock_user(p
, arg2
, sizeof(target_sigset_t
));
2593 case TARGET_NR_rt_sigqueueinfo
:
2596 p
= lock_user(arg3
, sizeof(target_sigset_t
), 1);
2597 target_to_host_siginfo(&uinfo
, p
);
2598 unlock_user(p
, arg1
, 0);
2599 ret
= get_errno(sys_rt_sigqueueinfo(arg1
, arg2
, &uinfo
));
2602 case TARGET_NR_sigreturn
:
2603 /* NOTE: ret is eax, so not transcoding must be done */
2604 ret
= do_sigreturn(cpu_env
);
2606 case TARGET_NR_rt_sigreturn
:
2607 /* NOTE: ret is eax, so not transcoding must be done */
2608 ret
= do_rt_sigreturn(cpu_env
);
2610 case TARGET_NR_sethostname
:
2611 p
= lock_user_string(arg1
);
2612 ret
= get_errno(sethostname(p
, arg2
));
2613 unlock_user(p
, arg1
, 0);
2615 case TARGET_NR_setrlimit
:
2617 /* XXX: convert resource ? */
2618 int resource
= arg1
;
2619 struct target_rlimit
*target_rlim
;
2621 lock_user_struct(target_rlim
, arg2
, 1);
2622 rlim
.rlim_cur
= tswapl(target_rlim
->rlim_cur
);
2623 rlim
.rlim_max
= tswapl(target_rlim
->rlim_max
);
2624 unlock_user_struct(target_rlim
, arg2
, 0);
2625 ret
= get_errno(setrlimit(resource
, &rlim
));
2628 case TARGET_NR_getrlimit
:
2630 /* XXX: convert resource ? */
2631 int resource
= arg1
;
2632 struct target_rlimit
*target_rlim
;
2635 ret
= get_errno(getrlimit(resource
, &rlim
));
2636 if (!is_error(ret
)) {
2637 lock_user_struct(target_rlim
, arg2
, 0);
2638 rlim
.rlim_cur
= tswapl(target_rlim
->rlim_cur
);
2639 rlim
.rlim_max
= tswapl(target_rlim
->rlim_max
);
2640 unlock_user_struct(target_rlim
, arg2
, 1);
2644 case TARGET_NR_getrusage
:
2646 struct rusage rusage
;
2647 ret
= get_errno(getrusage(arg1
, &rusage
));
2648 if (!is_error(ret
)) {
2649 host_to_target_rusage(arg2
, &rusage
);
2653 case TARGET_NR_gettimeofday
:
2656 ret
= get_errno(gettimeofday(&tv
, NULL
));
2657 if (!is_error(ret
)) {
2658 host_to_target_timeval(arg1
, &tv
);
2662 case TARGET_NR_settimeofday
:
2665 target_to_host_timeval(&tv
, arg1
);
2666 ret
= get_errno(settimeofday(&tv
, NULL
));
2669 #ifdef TARGET_NR_select
2670 case TARGET_NR_select
:
2672 struct target_sel_arg_struct
*sel
;
2673 target_ulong inp
, outp
, exp
, tvp
;
2676 lock_user_struct(sel
, arg1
, 1);
2677 nsel
= tswapl(sel
->n
);
2678 inp
= tswapl(sel
->inp
);
2679 outp
= tswapl(sel
->outp
);
2680 exp
= tswapl(sel
->exp
);
2681 tvp
= tswapl(sel
->tvp
);
2682 unlock_user_struct(sel
, arg1
, 0);
2683 ret
= do_select(nsel
, inp
, outp
, exp
, tvp
);
2687 case TARGET_NR_symlink
:
2690 p
= lock_user_string(arg1
);
2691 p2
= lock_user_string(arg2
);
2692 ret
= get_errno(symlink(p
, p2
));
2693 unlock_user(p2
, arg2
, 0);
2694 unlock_user(p
, arg1
, 0);
2697 #ifdef TARGET_NR_oldlstat
2698 case TARGET_NR_oldlstat
:
2701 case TARGET_NR_readlink
:
2704 p
= lock_user_string(arg1
);
2705 p2
= lock_user(arg2
, arg3
, 0);
2706 ret
= get_errno(readlink(path(p
), p2
, arg3
));
2707 unlock_user(p2
, arg2
, ret
);
2708 unlock_user(p
, arg1
, 0);
2711 case TARGET_NR_uselib
:
2713 case TARGET_NR_swapon
:
2714 p
= lock_user_string(arg1
);
2715 ret
= get_errno(swapon(p
, arg2
));
2716 unlock_user(p
, arg1
, 0);
2718 case TARGET_NR_reboot
:
2720 case TARGET_NR_readdir
:
2722 case TARGET_NR_mmap
:
2723 #if defined(TARGET_I386) || defined(TARGET_ARM) || defined(TARGET_M68K)
2726 target_ulong v1
, v2
, v3
, v4
, v5
, v6
;
2727 v
= lock_user(arg1
, 6 * sizeof(target_ulong
), 1);
2734 unlock_user(v
, arg1
, 0);
2735 ret
= get_errno(target_mmap(v1
, v2
, v3
,
2736 target_to_host_bitmask(v4
, mmap_flags_tbl
),
2740 ret
= get_errno(target_mmap(arg1
, arg2
, arg3
,
2741 target_to_host_bitmask(arg4
, mmap_flags_tbl
),
2746 #ifdef TARGET_NR_mmap2
2747 case TARGET_NR_mmap2
:
2748 #if defined(TARGET_SPARC) || defined(TARGET_MIPS)
2749 #define MMAP_SHIFT 12
2751 #define MMAP_SHIFT TARGET_PAGE_BITS
2753 ret
= get_errno(target_mmap(arg1
, arg2
, arg3
,
2754 target_to_host_bitmask(arg4
, mmap_flags_tbl
),
2756 arg6
<< MMAP_SHIFT
));
2759 case TARGET_NR_munmap
:
2760 ret
= get_errno(target_munmap(arg1
, arg2
));
2762 case TARGET_NR_mprotect
:
2763 ret
= get_errno(target_mprotect(arg1
, arg2
, arg3
));
2765 case TARGET_NR_mremap
:
2766 ret
= get_errno(target_mremap(arg1
, arg2
, arg3
, arg4
, arg5
));
2768 /* ??? msync/mlock/munlock are broken for softmmu. */
2769 case TARGET_NR_msync
:
2770 ret
= get_errno(msync(g2h(arg1
), arg2
, arg3
));
2772 case TARGET_NR_mlock
:
2773 ret
= get_errno(mlock(g2h(arg1
), arg2
));
2775 case TARGET_NR_munlock
:
2776 ret
= get_errno(munlock(g2h(arg1
), arg2
));
2778 case TARGET_NR_mlockall
:
2779 ret
= get_errno(mlockall(arg1
));
2781 case TARGET_NR_munlockall
:
2782 ret
= get_errno(munlockall());
2784 case TARGET_NR_truncate
:
2785 p
= lock_user_string(arg1
);
2786 ret
= get_errno(truncate(p
, arg2
));
2787 unlock_user(p
, arg1
, 0);
2789 case TARGET_NR_ftruncate
:
2790 ret
= get_errno(ftruncate(arg1
, arg2
));
2792 case TARGET_NR_fchmod
:
2793 ret
= get_errno(fchmod(arg1
, arg2
));
2795 case TARGET_NR_getpriority
:
2796 ret
= get_errno(getpriority(arg1
, arg2
));
2798 case TARGET_NR_setpriority
:
2799 ret
= get_errno(setpriority(arg1
, arg2
, arg3
));
2801 #ifdef TARGET_NR_profil
2802 case TARGET_NR_profil
:
2805 case TARGET_NR_statfs
:
2806 p
= lock_user_string(arg1
);
2807 ret
= get_errno(statfs(path(p
), &stfs
));
2808 unlock_user(p
, arg1
, 0);
2810 if (!is_error(ret
)) {
2811 struct target_statfs
*target_stfs
;
2813 lock_user_struct(target_stfs
, arg2
, 0);
2814 /* ??? put_user is probably wrong. */
2815 put_user(stfs
.f_type
, &target_stfs
->f_type
);
2816 put_user(stfs
.f_bsize
, &target_stfs
->f_bsize
);
2817 put_user(stfs
.f_blocks
, &target_stfs
->f_blocks
);
2818 put_user(stfs
.f_bfree
, &target_stfs
->f_bfree
);
2819 put_user(stfs
.f_bavail
, &target_stfs
->f_bavail
);
2820 put_user(stfs
.f_files
, &target_stfs
->f_files
);
2821 put_user(stfs
.f_ffree
, &target_stfs
->f_ffree
);
2822 put_user(stfs
.f_fsid
.__val
[0], &target_stfs
->f_fsid
);
2823 put_user(stfs
.f_namelen
, &target_stfs
->f_namelen
);
2824 unlock_user_struct(target_stfs
, arg2
, 1);
2827 case TARGET_NR_fstatfs
:
2828 ret
= get_errno(fstatfs(arg1
, &stfs
));
2829 goto convert_statfs
;
2830 #ifdef TARGET_NR_statfs64
2831 case TARGET_NR_statfs64
:
2832 p
= lock_user_string(arg1
);
2833 ret
= get_errno(statfs(path(p
), &stfs
));
2834 unlock_user(p
, arg1
, 0);
2836 if (!is_error(ret
)) {
2837 struct target_statfs64
*target_stfs
;
2839 lock_user_struct(target_stfs
, arg3
, 0);
2840 /* ??? put_user is probably wrong. */
2841 put_user(stfs
.f_type
, &target_stfs
->f_type
);
2842 put_user(stfs
.f_bsize
, &target_stfs
->f_bsize
);
2843 put_user(stfs
.f_blocks
, &target_stfs
->f_blocks
);
2844 put_user(stfs
.f_bfree
, &target_stfs
->f_bfree
);
2845 put_user(stfs
.f_bavail
, &target_stfs
->f_bavail
);
2846 put_user(stfs
.f_files
, &target_stfs
->f_files
);
2847 put_user(stfs
.f_ffree
, &target_stfs
->f_ffree
);
2848 put_user(stfs
.f_fsid
.__val
[0], &target_stfs
->f_fsid
);
2849 put_user(stfs
.f_namelen
, &target_stfs
->f_namelen
);
2850 unlock_user_struct(target_stfs
, arg3
, 0);
2853 case TARGET_NR_fstatfs64
:
2854 ret
= get_errno(fstatfs(arg1
, &stfs
));
2855 goto convert_statfs64
;
2857 #ifdef TARGET_NR_ioperm
2858 case TARGET_NR_ioperm
:
2861 case TARGET_NR_socketcall
:
2862 ret
= do_socketcall(arg1
, arg2
);
2865 #ifdef TARGET_NR_accept
2866 case TARGET_NR_accept
:
2867 ret
= do_accept(arg1
, arg2
, arg3
);
2870 #ifdef TARGET_NR_bind
2871 case TARGET_NR_bind
:
2872 ret
= do_bind(arg1
, arg2
, arg3
);
2875 #ifdef TARGET_NR_connect
2876 case TARGET_NR_connect
:
2877 ret
= do_connect(arg1
, arg2
, arg3
);
2880 #ifdef TARGET_NR_getpeername
2881 case TARGET_NR_getpeername
:
2882 ret
= do_getpeername(arg1
, arg2
, arg3
);
2885 #ifdef TARGET_NR_getsockname
2886 case TARGET_NR_getsockname
:
2887 ret
= do_getsockname(arg1
, arg2
, arg3
);
2890 #ifdef TARGET_NR_getsockopt
2891 case TARGET_NR_getsockopt
:
2892 ret
= do_getsockopt(arg1
, arg2
, arg3
, arg4
, arg5
);
2895 #ifdef TARGET_NR_listen
2896 case TARGET_NR_listen
:
2897 ret
= get_errno(listen(arg1
, arg2
));
2900 #ifdef TARGET_NR_recv
2901 case TARGET_NR_recv
:
2902 ret
= do_recvfrom(arg1
, arg1
, arg3
, arg4
, 0, 0);
2905 #ifdef TARGET_NR_recvfrom
2906 case TARGET_NR_recvfrom
:
2907 ret
= do_recvfrom(arg1
, arg1
, arg3
, arg4
, arg5
, arg6
);
2910 #ifdef TARGET_NR_recvmsg
2911 case TARGET_NR_recvmsg
:
2912 ret
= do_sendrecvmsg(arg1
, arg2
, arg3
, 0);
2915 #ifdef TARGET_NR_send
2916 case TARGET_NR_send
:
2917 ret
= do_sendto(arg1
, arg2
, arg3
, arg4
, 0, 0);
2920 #ifdef TARGET_NR_sendmsg
2921 case TARGET_NR_sendmsg
:
2922 ret
= do_sendrecvmsg(arg1
, arg2
, arg3
, 1);
2925 #ifdef TARGET_NR_sendto
2926 case TARGET_NR_sendto
:
2927 ret
= do_sendto(arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
2930 #ifdef TARGET_NR_shutdown
2931 case TARGET_NR_shutdown
:
2932 ret
= get_errno(shutdown(arg1
, arg2
));
2935 #ifdef TARGET_NR_socket
2936 case TARGET_NR_socket
:
2937 ret
= do_socket(arg1
, arg2
, arg3
);
2940 #ifdef TARGET_NR_socketpair
2941 case TARGET_NR_socketpair
:
2942 ret
= do_socketpair(arg1
, arg2
, arg3
, arg4
);
2945 #ifdef TARGET_NR_setsockopt
2946 case TARGET_NR_setsockopt
:
2947 ret
= do_setsockopt(arg1
, arg2
, arg3
, arg4
, (socklen_t
) arg5
);
2951 case TARGET_NR_syslog
:
2953 case TARGET_NR_setitimer
:
2955 struct itimerval value
, ovalue
, *pvalue
;
2959 target_to_host_timeval(&pvalue
->it_interval
,
2961 target_to_host_timeval(&pvalue
->it_value
,
2962 arg2
+ sizeof(struct target_timeval
));
2966 ret
= get_errno(setitimer(arg1
, pvalue
, &ovalue
));
2967 if (!is_error(ret
) && arg3
) {
2968 host_to_target_timeval(arg3
,
2969 &ovalue
.it_interval
);
2970 host_to_target_timeval(arg3
+ sizeof(struct target_timeval
),
2975 case TARGET_NR_getitimer
:
2977 struct itimerval value
;
2979 ret
= get_errno(getitimer(arg1
, &value
));
2980 if (!is_error(ret
) && arg2
) {
2981 host_to_target_timeval(arg2
,
2982 &value
.it_interval
);
2983 host_to_target_timeval(arg2
+ sizeof(struct target_timeval
),
2988 case TARGET_NR_stat
:
2989 p
= lock_user_string(arg1
);
2990 ret
= get_errno(stat(path(p
), &st
));
2991 unlock_user(p
, arg1
, 0);
2993 case TARGET_NR_lstat
:
2994 p
= lock_user_string(arg1
);
2995 ret
= get_errno(lstat(path(p
), &st
));
2996 unlock_user(p
, arg1
, 0);
2998 case TARGET_NR_fstat
:
3000 ret
= get_errno(fstat(arg1
, &st
));
3002 if (!is_error(ret
)) {
3003 struct target_stat
*target_st
;
3005 lock_user_struct(target_st
, arg2
, 0);
3006 target_st
->st_dev
= tswap16(st
.st_dev
);
3007 target_st
->st_ino
= tswapl(st
.st_ino
);
3008 #if defined(TARGET_PPC) || defined(TARGET_MIPS)
3009 target_st
->st_mode
= tswapl(st
.st_mode
); /* XXX: check this */
3010 target_st
->st_uid
= tswap32(st
.st_uid
);
3011 target_st
->st_gid
= tswap32(st
.st_gid
);
3013 target_st
->st_mode
= tswap16(st
.st_mode
);
3014 target_st
->st_uid
= tswap16(st
.st_uid
);
3015 target_st
->st_gid
= tswap16(st
.st_gid
);
3017 target_st
->st_nlink
= tswap16(st
.st_nlink
);
3018 target_st
->st_rdev
= tswap16(st
.st_rdev
);
3019 target_st
->st_size
= tswapl(st
.st_size
);
3020 target_st
->st_blksize
= tswapl(st
.st_blksize
);
3021 target_st
->st_blocks
= tswapl(st
.st_blocks
);
3022 target_st
->target_st_atime
= tswapl(st
.st_atime
);
3023 target_st
->target_st_mtime
= tswapl(st
.st_mtime
);
3024 target_st
->target_st_ctime
= tswapl(st
.st_ctime
);
3025 unlock_user_struct(target_st
, arg2
, 1);
3029 #ifdef TARGET_NR_olduname
3030 case TARGET_NR_olduname
:
3033 #ifdef TARGET_NR_iopl
3034 case TARGET_NR_iopl
:
3037 case TARGET_NR_vhangup
:
3038 ret
= get_errno(vhangup());
3040 #ifdef TARGET_NR_idle
3041 case TARGET_NR_idle
:
3044 #ifdef TARGET_NR_syscall
3045 case TARGET_NR_syscall
:
3046 ret
= do_syscall(cpu_env
,arg1
& 0xffff,arg2
,arg3
,arg4
,arg5
,arg6
,0);
3049 case TARGET_NR_wait4
:
3052 target_long status_ptr
= arg2
;
3053 struct rusage rusage
, *rusage_ptr
;
3054 target_ulong target_rusage
= arg4
;
3056 rusage_ptr
= &rusage
;
3059 ret
= get_errno(wait4(arg1
, &status
, arg3
, rusage_ptr
));
3060 if (!is_error(ret
)) {
3062 tputl(status_ptr
, status
);
3063 if (target_rusage
) {
3064 host_to_target_rusage(target_rusage
, &rusage
);
3069 case TARGET_NR_swapoff
:
3070 p
= lock_user_string(arg1
);
3071 ret
= get_errno(swapoff(p
));
3072 unlock_user(p
, arg1
, 0);
3074 case TARGET_NR_sysinfo
:
3076 struct target_sysinfo
*target_value
;
3077 struct sysinfo value
;
3078 ret
= get_errno(sysinfo(&value
));
3079 if (!is_error(ret
) && arg1
)
3081 /* ??? __put_user is probably wrong. */
3082 lock_user_struct(target_value
, arg1
, 0);
3083 __put_user(value
.uptime
, &target_value
->uptime
);
3084 __put_user(value
.loads
[0], &target_value
->loads
[0]);
3085 __put_user(value
.loads
[1], &target_value
->loads
[1]);
3086 __put_user(value
.loads
[2], &target_value
->loads
[2]);
3087 __put_user(value
.totalram
, &target_value
->totalram
);
3088 __put_user(value
.freeram
, &target_value
->freeram
);
3089 __put_user(value
.sharedram
, &target_value
->sharedram
);
3090 __put_user(value
.bufferram
, &target_value
->bufferram
);
3091 __put_user(value
.totalswap
, &target_value
->totalswap
);
3092 __put_user(value
.freeswap
, &target_value
->freeswap
);
3093 __put_user(value
.procs
, &target_value
->procs
);
3094 __put_user(value
.totalhigh
, &target_value
->totalhigh
);
3095 __put_user(value
.freehigh
, &target_value
->freehigh
);
3096 __put_user(value
.mem_unit
, &target_value
->mem_unit
);
3097 unlock_user_struct(target_value
, arg1
, 1);
3102 ret
= do_ipc(arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
3104 case TARGET_NR_fsync
:
3105 ret
= get_errno(fsync(arg1
));
3107 case TARGET_NR_clone
:
3108 ret
= get_errno(do_fork(cpu_env
, arg1
, arg2
));
3110 #ifdef __NR_exit_group
3111 /* new thread calls */
3112 case TARGET_NR_exit_group
:
3113 gdb_exit(cpu_env
, arg1
);
3114 ret
= get_errno(exit_group(arg1
));
3117 case TARGET_NR_setdomainname
:
3118 p
= lock_user_string(arg1
);
3119 ret
= get_errno(setdomainname(p
, arg2
));
3120 unlock_user(p
, arg1
, 0);
3122 case TARGET_NR_uname
:
3123 /* no need to transcode because we use the linux syscall */
3125 struct new_utsname
* buf
;
3127 lock_user_struct(buf
, arg1
, 0);
3128 ret
= get_errno(sys_uname(buf
));
3129 if (!is_error(ret
)) {
3130 /* Overrite the native machine name with whatever is being
3132 strcpy (buf
->machine
, UNAME_MACHINE
);
3133 /* Allow the user to override the reported release. */
3134 if (qemu_uname_release
&& *qemu_uname_release
)
3135 strcpy (buf
->release
, qemu_uname_release
);
3137 unlock_user_struct(buf
, arg1
, 1);
3141 case TARGET_NR_modify_ldt
:
3142 ret
= get_errno(do_modify_ldt(cpu_env
, arg1
, arg2
, arg3
));
3144 case TARGET_NR_vm86old
:
3146 case TARGET_NR_vm86
:
3147 ret
= do_vm86(cpu_env
, arg1
, arg2
);
3150 case TARGET_NR_adjtimex
:
3152 case TARGET_NR_create_module
:
3153 case TARGET_NR_init_module
:
3154 case TARGET_NR_delete_module
:
3155 case TARGET_NR_get_kernel_syms
:
3157 case TARGET_NR_quotactl
:
3159 case TARGET_NR_getpgid
:
3160 ret
= get_errno(getpgid(arg1
));
3162 case TARGET_NR_fchdir
:
3163 ret
= get_errno(fchdir(arg1
));
3165 case TARGET_NR_bdflush
:
3167 case TARGET_NR_sysfs
:
3169 case TARGET_NR_personality
:
3170 ret
= get_errno(personality(arg1
));
3172 case TARGET_NR_afs_syscall
:
3174 case TARGET_NR__llseek
:
3176 #if defined (__x86_64__)
3177 ret
= get_errno(lseek(arg1
, ((uint64_t )arg2
<< 32) | arg3
, arg5
));
3181 ret
= get_errno(_llseek(arg1
, arg2
, arg3
, &res
, arg5
));
3186 case TARGET_NR_getdents
:
3187 #if TARGET_LONG_SIZE != 4
3189 #warning not supported
3190 #elif TARGET_LONG_SIZE == 4 && HOST_LONG_SIZE == 8
3192 struct target_dirent
*target_dirp
;
3193 struct dirent
*dirp
;
3196 dirp
= malloc(count
);
3200 ret
= get_errno(sys_getdents(arg1
, dirp
, count
));
3201 if (!is_error(ret
)) {
3203 struct target_dirent
*tde
;
3205 int reclen
, treclen
;
3206 int count1
, tnamelen
;
3210 target_dirp
= lock_user(arg2
, count
, 0);
3213 reclen
= de
->d_reclen
;
3214 treclen
= reclen
- (2 * (sizeof(long) - sizeof(target_long
)));
3215 tde
->d_reclen
= tswap16(treclen
);
3216 tde
->d_ino
= tswapl(de
->d_ino
);
3217 tde
->d_off
= tswapl(de
->d_off
);
3218 tnamelen
= treclen
- (2 * sizeof(target_long
) + 2);
3221 /* XXX: may not be correct */
3222 strncpy(tde
->d_name
, de
->d_name
, tnamelen
);
3223 de
= (struct dirent
*)((char *)de
+ reclen
);
3225 tde
= (struct dirent
*)((char *)tde
+ treclen
);
3230 unlock_user(target_dirp
, arg2
, ret
);
3235 struct dirent
*dirp
;
3238 dirp
= lock_user(arg2
, count
, 0);
3239 ret
= get_errno(sys_getdents(arg1
, dirp
, count
));
3240 if (!is_error(ret
)) {
3246 reclen
= de
->d_reclen
;
3249 de
->d_reclen
= tswap16(reclen
);
3250 tswapls(&de
->d_ino
);
3251 tswapls(&de
->d_off
);
3252 de
= (struct dirent
*)((char *)de
+ reclen
);
3256 unlock_user(dirp
, arg2
, ret
);
3260 #ifdef TARGET_NR_getdents64
3261 case TARGET_NR_getdents64
:
3263 struct dirent64
*dirp
;
3265 dirp
= lock_user(arg2
, count
, 0);
3266 ret
= get_errno(sys_getdents64(arg1
, dirp
, count
));
3267 if (!is_error(ret
)) {
3268 struct dirent64
*de
;
3273 reclen
= de
->d_reclen
;
3276 de
->d_reclen
= tswap16(reclen
);
3277 tswap64s(&de
->d_ino
);
3278 tswap64s(&de
->d_off
);
3279 de
= (struct dirent64
*)((char *)de
+ reclen
);
3283 unlock_user(dirp
, arg2
, ret
);
3286 #endif /* TARGET_NR_getdents64 */
3287 case TARGET_NR__newselect
:
3288 ret
= do_select(arg1
, arg2
, arg3
, arg4
, arg5
);
3290 case TARGET_NR_poll
:
3292 struct target_pollfd
*target_pfd
;
3293 unsigned int nfds
= arg2
;
3298 target_pfd
= lock_user(arg1
, sizeof(struct target_pollfd
) * nfds
, 1);
3299 pfd
= alloca(sizeof(struct pollfd
) * nfds
);
3300 for(i
= 0; i
< nfds
; i
++) {
3301 pfd
[i
].fd
= tswap32(target_pfd
[i
].fd
);
3302 pfd
[i
].events
= tswap16(target_pfd
[i
].events
);
3304 ret
= get_errno(poll(pfd
, nfds
, timeout
));
3305 if (!is_error(ret
)) {
3306 for(i
= 0; i
< nfds
; i
++) {
3307 target_pfd
[i
].revents
= tswap16(pfd
[i
].revents
);
3309 ret
+= nfds
* (sizeof(struct target_pollfd
)
3310 - sizeof(struct pollfd
));
3312 unlock_user(target_pfd
, arg1
, ret
);
3315 case TARGET_NR_flock
:
3316 /* NOTE: the flock constant seems to be the same for every
3318 ret
= get_errno(flock(arg1
, arg2
));
3320 case TARGET_NR_readv
:
3325 vec
= alloca(count
* sizeof(struct iovec
));
3326 lock_iovec(vec
, arg2
, count
, 0);
3327 ret
= get_errno(readv(arg1
, vec
, count
));
3328 unlock_iovec(vec
, arg2
, count
, 1);
3331 case TARGET_NR_writev
:
3336 vec
= alloca(count
* sizeof(struct iovec
));
3337 lock_iovec(vec
, arg2
, count
, 1);
3338 ret
= get_errno(writev(arg1
, vec
, count
));
3339 unlock_iovec(vec
, arg2
, count
, 0);
3342 case TARGET_NR_getsid
:
3343 ret
= get_errno(getsid(arg1
));
3345 case TARGET_NR_fdatasync
:
3346 ret
= get_errno(fdatasync(arg1
));
3348 case TARGET_NR__sysctl
:
3349 /* We don't implement this, but ENODIR is always a safe
3352 case TARGET_NR_sched_setparam
:
3354 struct sched_param
*target_schp
;
3355 struct sched_param schp
;
3357 lock_user_struct(target_schp
, arg2
, 1);
3358 schp
.sched_priority
= tswap32(target_schp
->sched_priority
);
3359 unlock_user_struct(target_schp
, arg2
, 0);
3360 ret
= get_errno(sched_setparam(arg1
, &schp
));
3363 case TARGET_NR_sched_getparam
:
3365 struct sched_param
*target_schp
;
3366 struct sched_param schp
;
3367 ret
= get_errno(sched_getparam(arg1
, &schp
));
3368 if (!is_error(ret
)) {
3369 lock_user_struct(target_schp
, arg2
, 0);
3370 target_schp
->sched_priority
= tswap32(schp
.sched_priority
);
3371 unlock_user_struct(target_schp
, arg2
, 1);
3375 case TARGET_NR_sched_setscheduler
:
3377 struct sched_param
*target_schp
;
3378 struct sched_param schp
;
3379 lock_user_struct(target_schp
, arg3
, 1);
3380 schp
.sched_priority
= tswap32(target_schp
->sched_priority
);
3381 unlock_user_struct(target_schp
, arg3
, 0);
3382 ret
= get_errno(sched_setscheduler(arg1
, arg2
, &schp
));
3385 case TARGET_NR_sched_getscheduler
:
3386 ret
= get_errno(sched_getscheduler(arg1
));
3388 case TARGET_NR_sched_yield
:
3389 ret
= get_errno(sched_yield());
3391 case TARGET_NR_sched_get_priority_max
:
3392 ret
= get_errno(sched_get_priority_max(arg1
));
3394 case TARGET_NR_sched_get_priority_min
:
3395 ret
= get_errno(sched_get_priority_min(arg1
));
3397 case TARGET_NR_sched_rr_get_interval
:
3400 ret
= get_errno(sched_rr_get_interval(arg1
, &ts
));
3401 if (!is_error(ret
)) {
3402 host_to_target_timespec(arg2
, &ts
);
3406 case TARGET_NR_nanosleep
:
3408 struct timespec req
, rem
;
3409 target_to_host_timespec(&req
, arg1
);
3410 ret
= get_errno(nanosleep(&req
, &rem
));
3411 if (is_error(ret
) && arg2
) {
3412 host_to_target_timespec(arg2
, &rem
);
3416 case TARGET_NR_query_module
:
3418 case TARGET_NR_nfsservctl
:
3420 case TARGET_NR_prctl
:
3422 #ifdef TARGET_NR_pread
3423 case TARGET_NR_pread
:
3424 page_unprotect_range(arg2
, arg3
);
3425 p
= lock_user(arg2
, arg3
, 0);
3426 ret
= get_errno(pread(arg1
, p
, arg3
, arg4
));
3427 unlock_user(p
, arg2
, ret
);
3429 case TARGET_NR_pwrite
:
3430 p
= lock_user(arg2
, arg3
, 1);
3431 ret
= get_errno(pwrite(arg1
, p
, arg3
, arg4
));
3432 unlock_user(p
, arg2
, 0);
3435 case TARGET_NR_getcwd
:
3436 p
= lock_user(arg1
, arg2
, 0);
3437 ret
= get_errno(sys_getcwd1(p
, arg2
));
3438 unlock_user(p
, arg1
, ret
);
3440 case TARGET_NR_capget
:
3442 case TARGET_NR_capset
:
3444 case TARGET_NR_sigaltstack
:
3446 case TARGET_NR_sendfile
:
3448 #ifdef TARGET_NR_getpmsg
3449 case TARGET_NR_getpmsg
:
3452 #ifdef TARGET_NR_putpmsg
3453 case TARGET_NR_putpmsg
:
3456 #ifdef TARGET_NR_vfork
3457 case TARGET_NR_vfork
:
3458 ret
= get_errno(do_fork(cpu_env
, CLONE_VFORK
| CLONE_VM
| SIGCHLD
, 0));
3461 #ifdef TARGET_NR_ugetrlimit
3462 case TARGET_NR_ugetrlimit
:
3465 ret
= get_errno(getrlimit(arg1
, &rlim
));
3466 if (!is_error(ret
)) {
3467 struct target_rlimit
*target_rlim
;
3468 lock_user_struct(target_rlim
, arg2
, 0);
3469 target_rlim
->rlim_cur
= tswapl(rlim
.rlim_cur
);
3470 target_rlim
->rlim_max
= tswapl(rlim
.rlim_max
);
3471 unlock_user_struct(target_rlim
, arg2
, 1);
3476 #ifdef TARGET_NR_truncate64
3477 case TARGET_NR_truncate64
:
3478 p
= lock_user_string(arg1
);
3479 ret
= target_truncate64(cpu_env
, p
, arg2
, arg3
, arg4
);
3480 unlock_user(p
, arg1
, 0);
3483 #ifdef TARGET_NR_ftruncate64
3484 case TARGET_NR_ftruncate64
:
3485 ret
= target_ftruncate64(cpu_env
, arg1
, arg2
, arg3
, arg4
);
3488 #ifdef TARGET_NR_stat64
3489 case TARGET_NR_stat64
:
3490 p
= lock_user_string(arg1
);
3491 ret
= get_errno(stat(path(p
), &st
));
3492 unlock_user(p
, arg1
, 0);
3495 #ifdef TARGET_NR_lstat64
3496 case TARGET_NR_lstat64
:
3497 p
= lock_user_string(arg1
);
3498 ret
= get_errno(lstat(path(p
), &st
));
3499 unlock_user(p
, arg1
, 0);
3502 #ifdef TARGET_NR_fstat64
3503 case TARGET_NR_fstat64
:
3505 ret
= get_errno(fstat(arg1
, &st
));
3507 if (!is_error(ret
)) {
3509 if (((CPUARMState
*)cpu_env
)->eabi
) {
3510 struct target_eabi_stat64
*target_st
;
3511 lock_user_struct(target_st
, arg2
, 1);
3512 memset(target_st
, 0, sizeof(struct target_eabi_stat64
));
3513 /* put_user is probably wrong. */
3514 put_user(st
.st_dev
, &target_st
->st_dev
);
3515 put_user(st
.st_ino
, &target_st
->st_ino
);
3516 #ifdef TARGET_STAT64_HAS_BROKEN_ST_INO
3517 put_user(st
.st_ino
, &target_st
->__st_ino
);
3519 put_user(st
.st_mode
, &target_st
->st_mode
);
3520 put_user(st
.st_nlink
, &target_st
->st_nlink
);
3521 put_user(st
.st_uid
, &target_st
->st_uid
);
3522 put_user(st
.st_gid
, &target_st
->st_gid
);
3523 put_user(st
.st_rdev
, &target_st
->st_rdev
);
3524 /* XXX: better use of kernel struct */
3525 put_user(st
.st_size
, &target_st
->st_size
);
3526 put_user(st
.st_blksize
, &target_st
->st_blksize
);
3527 put_user(st
.st_blocks
, &target_st
->st_blocks
);
3528 put_user(st
.st_atime
, &target_st
->target_st_atime
);
3529 put_user(st
.st_mtime
, &target_st
->target_st_mtime
);
3530 put_user(st
.st_ctime
, &target_st
->target_st_ctime
);
3531 unlock_user_struct(target_st
, arg2
, 0);
3535 struct target_stat64
*target_st
;
3536 lock_user_struct(target_st
, arg2
, 1);
3537 memset(target_st
, 0, sizeof(struct target_stat64
));
3538 /* ??? put_user is probably wrong. */
3539 put_user(st
.st_dev
, &target_st
->st_dev
);
3540 put_user(st
.st_ino
, &target_st
->st_ino
);
3541 #ifdef TARGET_STAT64_HAS_BROKEN_ST_INO
3542 put_user(st
.st_ino
, &target_st
->__st_ino
);
3544 put_user(st
.st_mode
, &target_st
->st_mode
);
3545 put_user(st
.st_nlink
, &target_st
->st_nlink
);
3546 put_user(st
.st_uid
, &target_st
->st_uid
);
3547 put_user(st
.st_gid
, &target_st
->st_gid
);
3548 put_user(st
.st_rdev
, &target_st
->st_rdev
);
3549 /* XXX: better use of kernel struct */
3550 put_user(st
.st_size
, &target_st
->st_size
);
3551 put_user(st
.st_blksize
, &target_st
->st_blksize
);
3552 put_user(st
.st_blocks
, &target_st
->st_blocks
);
3553 put_user(st
.st_atime
, &target_st
->target_st_atime
);
3554 put_user(st
.st_mtime
, &target_st
->target_st_mtime
);
3555 put_user(st
.st_ctime
, &target_st
->target_st_ctime
);
3556 unlock_user_struct(target_st
, arg2
, 0);
3563 case TARGET_NR_lchown
:
3564 p
= lock_user_string(arg1
);
3565 ret
= get_errno(lchown(p
, low2highuid(arg2
), low2highgid(arg3
)));
3566 unlock_user(p
, arg1
, 0);
3568 case TARGET_NR_getuid
:
3569 ret
= get_errno(high2lowuid(getuid()));
3571 case TARGET_NR_getgid
:
3572 ret
= get_errno(high2lowgid(getgid()));
3574 case TARGET_NR_geteuid
:
3575 ret
= get_errno(high2lowuid(geteuid()));
3577 case TARGET_NR_getegid
:
3578 ret
= get_errno(high2lowgid(getegid()));
3580 case TARGET_NR_setreuid
:
3581 ret
= get_errno(setreuid(low2highuid(arg1
), low2highuid(arg2
)));
3583 case TARGET_NR_setregid
:
3584 ret
= get_errno(setregid(low2highgid(arg1
), low2highgid(arg2
)));
3586 case TARGET_NR_getgroups
:
3588 int gidsetsize
= arg1
;
3589 uint16_t *target_grouplist
;
3593 grouplist
= alloca(gidsetsize
* sizeof(gid_t
));
3594 ret
= get_errno(getgroups(gidsetsize
, grouplist
));
3595 if (!is_error(ret
)) {
3596 target_grouplist
= lock_user(arg2
, gidsetsize
* 2, 0);
3597 for(i
= 0;i
< gidsetsize
; i
++)
3598 target_grouplist
[i
] = tswap16(grouplist
[i
]);
3599 unlock_user(target_grouplist
, arg2
, gidsetsize
* 2);
3603 case TARGET_NR_setgroups
:
3605 int gidsetsize
= arg1
;
3606 uint16_t *target_grouplist
;
3610 grouplist
= alloca(gidsetsize
* sizeof(gid_t
));
3611 target_grouplist
= lock_user(arg2
, gidsetsize
* 2, 1);
3612 for(i
= 0;i
< gidsetsize
; i
++)
3613 grouplist
[i
] = tswap16(target_grouplist
[i
]);
3614 unlock_user(target_grouplist
, arg2
, 0);
3615 ret
= get_errno(setgroups(gidsetsize
, grouplist
));
3618 case TARGET_NR_fchown
:
3619 ret
= get_errno(fchown(arg1
, low2highuid(arg2
), low2highgid(arg3
)));
3621 #ifdef TARGET_NR_setresuid
3622 case TARGET_NR_setresuid
:
3623 ret
= get_errno(setresuid(low2highuid(arg1
),
3625 low2highuid(arg3
)));
3628 #ifdef TARGET_NR_getresuid
3629 case TARGET_NR_getresuid
:
3631 uid_t ruid
, euid
, suid
;
3632 ret
= get_errno(getresuid(&ruid
, &euid
, &suid
));
3633 if (!is_error(ret
)) {
3634 tput16(arg1
, tswap16(high2lowuid(ruid
)));
3635 tput16(arg2
, tswap16(high2lowuid(euid
)));
3636 tput16(arg3
, tswap16(high2lowuid(suid
)));
3641 #ifdef TARGET_NR_getresgid
3642 case TARGET_NR_setresgid
:
3643 ret
= get_errno(setresgid(low2highgid(arg1
),
3645 low2highgid(arg3
)));
3648 #ifdef TARGET_NR_getresgid
3649 case TARGET_NR_getresgid
:
3651 gid_t rgid
, egid
, sgid
;
3652 ret
= get_errno(getresgid(&rgid
, &egid
, &sgid
));
3653 if (!is_error(ret
)) {
3654 tput16(arg1
, tswap16(high2lowgid(rgid
)));
3655 tput16(arg2
, tswap16(high2lowgid(egid
)));
3656 tput16(arg3
, tswap16(high2lowgid(sgid
)));
3661 case TARGET_NR_chown
:
3662 p
= lock_user_string(arg1
);
3663 ret
= get_errno(chown(p
, low2highuid(arg2
), low2highgid(arg3
)));
3664 unlock_user(p
, arg1
, 0);
3666 case TARGET_NR_setuid
:
3667 ret
= get_errno(setuid(low2highuid(arg1
)));
3669 case TARGET_NR_setgid
:
3670 ret
= get_errno(setgid(low2highgid(arg1
)));
3672 case TARGET_NR_setfsuid
:
3673 ret
= get_errno(setfsuid(arg1
));
3675 case TARGET_NR_setfsgid
:
3676 ret
= get_errno(setfsgid(arg1
));
3678 #endif /* USE_UID16 */
3680 #ifdef TARGET_NR_lchown32
3681 case TARGET_NR_lchown32
:
3682 p
= lock_user_string(arg1
);
3683 ret
= get_errno(lchown(p
, arg2
, arg3
));
3684 unlock_user(p
, arg1
, 0);
3687 #ifdef TARGET_NR_getuid32
3688 case TARGET_NR_getuid32
:
3689 ret
= get_errno(getuid());
3692 #ifdef TARGET_NR_getgid32
3693 case TARGET_NR_getgid32
:
3694 ret
= get_errno(getgid());
3697 #ifdef TARGET_NR_geteuid32
3698 case TARGET_NR_geteuid32
:
3699 ret
= get_errno(geteuid());
3702 #ifdef TARGET_NR_getegid32
3703 case TARGET_NR_getegid32
:
3704 ret
= get_errno(getegid());
3707 #ifdef TARGET_NR_setreuid32
3708 case TARGET_NR_setreuid32
:
3709 ret
= get_errno(setreuid(arg1
, arg2
));
3712 #ifdef TARGET_NR_setregid32
3713 case TARGET_NR_setregid32
:
3714 ret
= get_errno(setregid(arg1
, arg2
));
3717 #ifdef TARGET_NR_getgroups32
3718 case TARGET_NR_getgroups32
:
3720 int gidsetsize
= arg1
;
3721 uint32_t *target_grouplist
;
3725 grouplist
= alloca(gidsetsize
* sizeof(gid_t
));
3726 ret
= get_errno(getgroups(gidsetsize
, grouplist
));
3727 if (!is_error(ret
)) {
3728 target_grouplist
= lock_user(arg2
, gidsetsize
* 4, 0);
3729 for(i
= 0;i
< gidsetsize
; i
++)
3730 target_grouplist
[i
] = tswap32(grouplist
[i
]);
3731 unlock_user(target_grouplist
, arg2
, gidsetsize
* 4);
3736 #ifdef TARGET_NR_setgroups32
3737 case TARGET_NR_setgroups32
:
3739 int gidsetsize
= arg1
;
3740 uint32_t *target_grouplist
;
3744 grouplist
= alloca(gidsetsize
* sizeof(gid_t
));
3745 target_grouplist
= lock_user(arg2
, gidsetsize
* 4, 1);
3746 for(i
= 0;i
< gidsetsize
; i
++)
3747 grouplist
[i
] = tswap32(target_grouplist
[i
]);
3748 unlock_user(target_grouplist
, arg2
, 0);
3749 ret
= get_errno(setgroups(gidsetsize
, grouplist
));
3753 #ifdef TARGET_NR_fchown32
3754 case TARGET_NR_fchown32
:
3755 ret
= get_errno(fchown(arg1
, arg2
, arg3
));
3758 #ifdef TARGET_NR_setresuid32
3759 case TARGET_NR_setresuid32
:
3760 ret
= get_errno(setresuid(arg1
, arg2
, arg3
));
3763 #ifdef TARGET_NR_getresuid32
3764 case TARGET_NR_getresuid32
:
3766 uid_t ruid
, euid
, suid
;
3767 ret
= get_errno(getresuid(&ruid
, &euid
, &suid
));
3768 if (!is_error(ret
)) {
3769 tput32(arg1
, tswap32(ruid
));
3770 tput32(arg2
, tswap32(euid
));
3771 tput32(arg3
, tswap32(suid
));
3776 #ifdef TARGET_NR_setresgid32
3777 case TARGET_NR_setresgid32
:
3778 ret
= get_errno(setresgid(arg1
, arg2
, arg3
));
3781 #ifdef TARGET_NR_getresgid32
3782 case TARGET_NR_getresgid32
:
3784 gid_t rgid
, egid
, sgid
;
3785 ret
= get_errno(getresgid(&rgid
, &egid
, &sgid
));
3786 if (!is_error(ret
)) {
3787 tput32(arg1
, tswap32(rgid
));
3788 tput32(arg2
, tswap32(egid
));
3789 tput32(arg3
, tswap32(sgid
));
3794 #ifdef TARGET_NR_chown32
3795 case TARGET_NR_chown32
:
3796 p
= lock_user_string(arg1
);
3797 ret
= get_errno(chown(p
, arg2
, arg3
));
3798 unlock_user(p
, arg1
, 0);
3801 #ifdef TARGET_NR_setuid32
3802 case TARGET_NR_setuid32
:
3803 ret
= get_errno(setuid(arg1
));
3806 #ifdef TARGET_NR_setgid32
3807 case TARGET_NR_setgid32
:
3808 ret
= get_errno(setgid(arg1
));
3811 #ifdef TARGET_NR_setfsuid32
3812 case TARGET_NR_setfsuid32
:
3813 ret
= get_errno(setfsuid(arg1
));
3816 #ifdef TARGET_NR_setfsgid32
3817 case TARGET_NR_setfsgid32
:
3818 ret
= get_errno(setfsgid(arg1
));
3822 case TARGET_NR_pivot_root
:
3824 #ifdef TARGET_NR_mincore
3825 case TARGET_NR_mincore
:
3828 #ifdef TARGET_NR_madvise
3829 case TARGET_NR_madvise
:
3830 /* A straight passthrough may not be safe because qemu sometimes
3831 turns private flie-backed mappings into anonymous mappings.
3832 This will break MADV_DONTNEED.
3833 This is a hint, so ignoring and returning success is ok. */
3837 #if TARGET_LONG_BITS == 32
3838 case TARGET_NR_fcntl64
:
3841 struct target_flock64
*target_fl
;
3843 struct target_eabi_flock64
*target_efl
;
3848 ret
= get_errno(fcntl(arg1
, arg2
, &fl
));
3851 if (((CPUARMState
*)cpu_env
)->eabi
) {
3852 lock_user_struct(target_efl
, arg3
, 0);
3853 target_efl
->l_type
= tswap16(fl
.l_type
);
3854 target_efl
->l_whence
= tswap16(fl
.l_whence
);
3855 target_efl
->l_start
= tswap64(fl
.l_start
);
3856 target_efl
->l_len
= tswap64(fl
.l_len
);
3857 target_efl
->l_pid
= tswapl(fl
.l_pid
);
3858 unlock_user_struct(target_efl
, arg3
, 1);
3862 lock_user_struct(target_fl
, arg3
, 0);
3863 target_fl
->l_type
= tswap16(fl
.l_type
);
3864 target_fl
->l_whence
= tswap16(fl
.l_whence
);
3865 target_fl
->l_start
= tswap64(fl
.l_start
);
3866 target_fl
->l_len
= tswap64(fl
.l_len
);
3867 target_fl
->l_pid
= tswapl(fl
.l_pid
);
3868 unlock_user_struct(target_fl
, arg3
, 1);
3876 if (((CPUARMState
*)cpu_env
)->eabi
) {
3877 lock_user_struct(target_efl
, arg3
, 1);
3878 fl
.l_type
= tswap16(target_efl
->l_type
);
3879 fl
.l_whence
= tswap16(target_efl
->l_whence
);
3880 fl
.l_start
= tswap64(target_efl
->l_start
);
3881 fl
.l_len
= tswap64(target_efl
->l_len
);
3882 fl
.l_pid
= tswapl(target_efl
->l_pid
);
3883 unlock_user_struct(target_efl
, arg3
, 0);
3887 lock_user_struct(target_fl
, arg3
, 1);
3888 fl
.l_type
= tswap16(target_fl
->l_type
);
3889 fl
.l_whence
= tswap16(target_fl
->l_whence
);
3890 fl
.l_start
= tswap64(target_fl
->l_start
);
3891 fl
.l_len
= tswap64(target_fl
->l_len
);
3892 fl
.l_pid
= tswapl(target_fl
->l_pid
);
3893 unlock_user_struct(target_fl
, arg3
, 0);
3895 ret
= get_errno(fcntl(arg1
, arg2
, &fl
));
3898 ret
= get_errno(do_fcntl(arg1
, arg2
, arg3
));
3904 #ifdef TARGET_NR_cacheflush
3905 case TARGET_NR_cacheflush
:
3906 /* self-modifying code is handled automatically, so nothing needed */
3910 #ifdef TARGET_NR_security
3911 case TARGET_NR_security
:
3914 #ifdef TARGET_NR_getpagesize
3915 case TARGET_NR_getpagesize
:
3916 ret
= TARGET_PAGE_SIZE
;
3919 case TARGET_NR_gettid
:
3920 ret
= get_errno(gettid());
3922 case TARGET_NR_readahead
:
3924 #ifdef TARGET_NR_setxattr
3925 case TARGET_NR_setxattr
:
3926 case TARGET_NR_lsetxattr
:
3927 case TARGET_NR_fsetxattr
:
3928 case TARGET_NR_getxattr
:
3929 case TARGET_NR_lgetxattr
:
3930 case TARGET_NR_fgetxattr
:
3931 case TARGET_NR_listxattr
:
3932 case TARGET_NR_llistxattr
:
3933 case TARGET_NR_flistxattr
:
3934 case TARGET_NR_removexattr
:
3935 case TARGET_NR_lremovexattr
:
3936 case TARGET_NR_fremovexattr
:
3937 goto unimplemented_nowarn
;
3939 #ifdef TARGET_NR_set_thread_area
3940 case TARGET_NR_set_thread_area
:
3941 case TARGET_NR_get_thread_area
:
3942 goto unimplemented_nowarn
;
3944 #ifdef TARGET_NR_getdomainname
3945 case TARGET_NR_getdomainname
:
3946 goto unimplemented_nowarn
;
3950 gemu_log("qemu: Unsupported syscall: %d\n", num
);
3951 #if defined(TARGET_NR_setxattr) || defined(TARGET_NR_set_thread_area) || defined(TARGET_NR_getdomainname)
3952 unimplemented_nowarn
:
3959 gemu_log(" = %ld\n", ret
);