1 /* 2 * Linux syscalls 3 * 4 * Copyright (c) 2003 Fabrice Bellard 5 * 6 * This program is free software; you can redistribute it and/or modify 7 * it under the terms of the GNU General Public License as published by 8 * the Free Software Foundation; either version 2 of the License, or 9 * (at your option) any later version. 10 * 11 * This program is distributed in the hope that it will be useful, 12 * but WITHOUT ANY WARRANTY; without even the implied warranty of 13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 14 * GNU General Public License for more details. 15 * 16 * You should have received a copy of the GNU General Public License 17 * along with this program; if not, see <http://www.gnu.org/licenses/>. 18 */ 19 #define _ATFILE_SOURCE 20 #include <stdlib.h> 21 #include <stdio.h> 22 #include <stdarg.h> 23 #include <string.h> 24 #include <elf.h> 25 #include <endian.h> 26 #include <errno.h> 27 #include <unistd.h> 28 #include <fcntl.h> 29 #include <time.h> 30 #include <limits.h> 31 #include <sys/types.h> 32 #include <sys/ipc.h> 33 #include <sys/msg.h> 34 #include <sys/wait.h> 35 #include <sys/time.h> 36 #include <sys/stat.h> 37 #include <sys/mount.h> 38 #include <sys/prctl.h> 39 #include <sys/resource.h> 40 #include <sys/mman.h> 41 #include <sys/swap.h> 42 #include <signal.h> 43 #include <sched.h> 44 #ifdef __ia64__ 45 int __clone2(int (*fn)(void *), void *child_stack_base, 46 size_t stack_size, int flags, void *arg, ...); 47 #endif 48 #include <sys/socket.h> 49 #include <sys/un.h> 50 #include <sys/uio.h> 51 #include <sys/poll.h> 52 #include <sys/times.h> 53 #include <sys/shm.h> 54 #include <sys/sem.h> 55 #include <sys/statfs.h> 56 #include <utime.h> 57 #include <sys/sysinfo.h> 58 #include <sys/utsname.h> 59 //#include <sys/user.h> 60 #include <netinet/ip.h> 61 #include <netinet/tcp.h> 62 #include <linux/wireless.h> 63 #include "qemu-common.h" 64 #ifdef TARGET_GPROF 65 #include <sys/gmon.h> 66 #endif 67 #ifdef CONFIG_EVENTFD 68 #include <sys/eventfd.h> 69 #endif 70 #ifdef CONFIG_EPOLL 71 #include <sys/epoll.h> 72 #endif 73 #ifdef CONFIG_ATTR 74 #include "qemu-xattr.h" 75 #endif 76 77 #define termios host_termios 78 #define winsize host_winsize 79 #define termio host_termio 80 #define sgttyb host_sgttyb /* same as target */ 81 #define tchars host_tchars /* same as target */ 82 #define ltchars host_ltchars /* same as target */ 83 84 #include <linux/termios.h> 85 #include <linux/unistd.h> 86 #include <linux/utsname.h> 87 #include <linux/cdrom.h> 88 #include <linux/hdreg.h> 89 #include <linux/soundcard.h> 90 #include <linux/kd.h> 91 #include <linux/mtio.h> 92 #include <linux/fs.h> 93 #if defined(CONFIG_FIEMAP) 94 #include <linux/fiemap.h> 95 #endif 96 #include <linux/fb.h> 97 #include <linux/vt.h> 98 #include "linux_loop.h" 99 #include "cpu-uname.h" 100 101 #include "qemu.h" 102 103 #if defined(CONFIG_USE_NPTL) 104 #define CLONE_NPTL_FLAGS2 (CLONE_SETTLS | \ 105 CLONE_PARENT_SETTID | CLONE_CHILD_SETTID | CLONE_CHILD_CLEARTID) 106 #else 107 /* XXX: Hardcode the above values. */ 108 #define CLONE_NPTL_FLAGS2 0 109 #endif 110 111 //#define DEBUG 112 113 //#include <linux/msdos_fs.h> 114 #define VFAT_IOCTL_READDIR_BOTH _IOR('r', 1, struct linux_dirent [2]) 115 #define VFAT_IOCTL_READDIR_SHORT _IOR('r', 2, struct linux_dirent [2]) 116 117 118 #undef _syscall0 119 #undef _syscall1 120 #undef _syscall2 121 #undef _syscall3 122 #undef _syscall4 123 #undef _syscall5 124 #undef _syscall6 125 126 #define _syscall0(type,name) \ 127 static type name (void) \ 128 { \ 129 return syscall(__NR_##name); \ 130 } 131 132 #define _syscall1(type,name,type1,arg1) \ 133 static type name (type1 arg1) \ 134 { \ 135 return syscall(__NR_##name, arg1); \ 136 } 137 138 #define _syscall2(type,name,type1,arg1,type2,arg2) \ 139 static type name (type1 arg1,type2 arg2) \ 140 { \ 141 return syscall(__NR_##name, arg1, arg2); \ 142 } 143 144 #define _syscall3(type,name,type1,arg1,type2,arg2,type3,arg3) \ 145 static type name (type1 arg1,type2 arg2,type3 arg3) \ 146 { \ 147 return syscall(__NR_##name, arg1, arg2, arg3); \ 148 } 149 150 #define _syscall4(type,name,type1,arg1,type2,arg2,type3,arg3,type4,arg4) \ 151 static type name (type1 arg1,type2 arg2,type3 arg3,type4 arg4) \ 152 { \ 153 return syscall(__NR_##name, arg1, arg2, arg3, arg4); \ 154 } 155 156 #define _syscall5(type,name,type1,arg1,type2,arg2,type3,arg3,type4,arg4, \ 157 type5,arg5) \ 158 static type name (type1 arg1,type2 arg2,type3 arg3,type4 arg4,type5 arg5) \ 159 { \ 160 return syscall(__NR_##name, arg1, arg2, arg3, arg4, arg5); \ 161 } 162 163 164 #define _syscall6(type,name,type1,arg1,type2,arg2,type3,arg3,type4,arg4, \ 165 type5,arg5,type6,arg6) \ 166 static type name (type1 arg1,type2 arg2,type3 arg3,type4 arg4,type5 arg5, \ 167 type6 arg6) \ 168 { \ 169 return syscall(__NR_##name, arg1, arg2, arg3, arg4, arg5, arg6); \ 170 } 171 172 173 #define __NR_sys_uname __NR_uname 174 #define __NR_sys_faccessat __NR_faccessat 175 #define __NR_sys_fchmodat __NR_fchmodat 176 #define __NR_sys_fchownat __NR_fchownat 177 #define __NR_sys_fstatat64 __NR_fstatat64 178 #define __NR_sys_futimesat __NR_futimesat 179 #define __NR_sys_getcwd1 __NR_getcwd 180 #define __NR_sys_getdents __NR_getdents 181 #define __NR_sys_getdents64 __NR_getdents64 182 #define __NR_sys_getpriority __NR_getpriority 183 #define __NR_sys_linkat __NR_linkat 184 #define __NR_sys_mkdirat __NR_mkdirat 185 #define __NR_sys_mknodat __NR_mknodat 186 #define __NR_sys_newfstatat __NR_newfstatat 187 #define __NR_sys_openat __NR_openat 188 #define __NR_sys_readlinkat __NR_readlinkat 189 #define __NR_sys_renameat __NR_renameat 190 #define __NR_sys_rt_sigqueueinfo __NR_rt_sigqueueinfo 191 #define __NR_sys_symlinkat __NR_symlinkat 192 #define __NR_sys_syslog __NR_syslog 193 #define __NR_sys_tgkill __NR_tgkill 194 #define __NR_sys_tkill __NR_tkill 195 #define __NR_sys_unlinkat __NR_unlinkat 196 #define __NR_sys_utimensat __NR_utimensat 197 #define __NR_sys_futex __NR_futex 198 #define __NR_sys_inotify_init __NR_inotify_init 199 #define __NR_sys_inotify_add_watch __NR_inotify_add_watch 200 #define __NR_sys_inotify_rm_watch __NR_inotify_rm_watch 201 202 #if defined(__alpha__) || defined (__ia64__) || defined(__x86_64__) || \ 203 defined(__s390x__) 204 #define __NR__llseek __NR_lseek 205 #endif 206 207 #ifdef __NR_gettid 208 _syscall0(int, gettid) 209 #else 210 /* This is a replacement for the host gettid() and must return a host 211 errno. */ 212 static int gettid(void) { 213 return -ENOSYS; 214 } 215 #endif 216 _syscall3(int, sys_getdents, uint, fd, struct linux_dirent *, dirp, uint, count); 217 #if defined(TARGET_NR_getdents64) && defined(__NR_getdents64) 218 _syscall3(int, sys_getdents64, uint, fd, struct linux_dirent64 *, dirp, uint, count); 219 #endif 220 _syscall2(int, sys_getpriority, int, which, int, who); 221 #if defined(TARGET_NR__llseek) && defined(__NR_llseek) 222 _syscall5(int, _llseek, uint, fd, ulong, hi, ulong, lo, 223 loff_t *, res, uint, wh); 224 #endif 225 _syscall3(int,sys_rt_sigqueueinfo,int,pid,int,sig,siginfo_t *,uinfo) 226 _syscall3(int,sys_syslog,int,type,char*,bufp,int,len) 227 #if defined(TARGET_NR_tgkill) && defined(__NR_tgkill) 228 _syscall3(int,sys_tgkill,int,tgid,int,pid,int,sig) 229 #endif 230 #if defined(TARGET_NR_tkill) && defined(__NR_tkill) 231 _syscall2(int,sys_tkill,int,tid,int,sig) 232 #endif 233 #ifdef __NR_exit_group 234 _syscall1(int,exit_group,int,error_code) 235 #endif 236 #if defined(TARGET_NR_set_tid_address) && defined(__NR_set_tid_address) 237 _syscall1(int,set_tid_address,int *,tidptr) 238 #endif 239 #if defined(CONFIG_USE_NPTL) 240 #if defined(TARGET_NR_futex) && defined(__NR_futex) 241 _syscall6(int,sys_futex,int *,uaddr,int,op,int,val, 242 const struct timespec *,timeout,int *,uaddr2,int,val3) 243 #endif 244 #endif 245 #define __NR_sys_sched_getaffinity __NR_sched_getaffinity 246 _syscall3(int, sys_sched_getaffinity, pid_t, pid, unsigned int, len, 247 unsigned long *, user_mask_ptr); 248 #define __NR_sys_sched_setaffinity __NR_sched_setaffinity 249 _syscall3(int, sys_sched_setaffinity, pid_t, pid, unsigned int, len, 250 unsigned long *, user_mask_ptr); 251 _syscall4(int, reboot, int, magic1, int, magic2, unsigned int, cmd, 252 void *, arg); 253 254 static bitmask_transtbl fcntl_flags_tbl[] = { 255 { TARGET_O_ACCMODE, TARGET_O_WRONLY, O_ACCMODE, O_WRONLY, }, 256 { TARGET_O_ACCMODE, TARGET_O_RDWR, O_ACCMODE, O_RDWR, }, 257 { TARGET_O_CREAT, TARGET_O_CREAT, O_CREAT, O_CREAT, }, 258 { TARGET_O_EXCL, TARGET_O_EXCL, O_EXCL, O_EXCL, }, 259 { TARGET_O_NOCTTY, TARGET_O_NOCTTY, O_NOCTTY, O_NOCTTY, }, 260 { TARGET_O_TRUNC, TARGET_O_TRUNC, O_TRUNC, O_TRUNC, }, 261 { TARGET_O_APPEND, TARGET_O_APPEND, O_APPEND, O_APPEND, }, 262 { TARGET_O_NONBLOCK, TARGET_O_NONBLOCK, O_NONBLOCK, O_NONBLOCK, }, 263 { TARGET_O_SYNC, TARGET_O_SYNC, O_SYNC, O_SYNC, }, 264 { TARGET_FASYNC, TARGET_FASYNC, FASYNC, FASYNC, }, 265 { TARGET_O_DIRECTORY, TARGET_O_DIRECTORY, O_DIRECTORY, O_DIRECTORY, }, 266 { TARGET_O_NOFOLLOW, TARGET_O_NOFOLLOW, O_NOFOLLOW, O_NOFOLLOW, }, 267 { TARGET_O_LARGEFILE, TARGET_O_LARGEFILE, O_LARGEFILE, O_LARGEFILE, }, 268 #if defined(O_DIRECT) 269 { TARGET_O_DIRECT, TARGET_O_DIRECT, O_DIRECT, O_DIRECT, }, 270 #endif 271 { 0, 0, 0, 0 } 272 }; 273 274 #define COPY_UTSNAME_FIELD(dest, src) \ 275 do { \ 276 /* __NEW_UTS_LEN doesn't include terminating null */ \ 277 (void) strncpy((dest), (src), __NEW_UTS_LEN); \ 278 (dest)[__NEW_UTS_LEN] = '\0'; \ 279 } while (0) 280 281 static int sys_uname(struct new_utsname *buf) 282 { 283 struct utsname uts_buf; 284 285 if (uname(&uts_buf) < 0) 286 return (-1); 287 288 /* 289 * Just in case these have some differences, we 290 * translate utsname to new_utsname (which is the 291 * struct linux kernel uses). 292 */ 293 294 memset(buf, 0, sizeof(*buf)); 295 COPY_UTSNAME_FIELD(buf->sysname, uts_buf.sysname); 296 COPY_UTSNAME_FIELD(buf->nodename, uts_buf.nodename); 297 COPY_UTSNAME_FIELD(buf->release, uts_buf.release); 298 COPY_UTSNAME_FIELD(buf->version, uts_buf.version); 299 COPY_UTSNAME_FIELD(buf->machine, uts_buf.machine); 300 #ifdef _GNU_SOURCE 301 COPY_UTSNAME_FIELD(buf->domainname, uts_buf.domainname); 302 #endif 303 return (0); 304 305 #undef COPY_UTSNAME_FIELD 306 } 307 308 static int sys_getcwd1(char *buf, size_t size) 309 { 310 if (getcwd(buf, size) == NULL) { 311 /* getcwd() sets errno */ 312 return (-1); 313 } 314 return strlen(buf)+1; 315 } 316 317 #ifdef CONFIG_ATFILE 318 /* 319 * Host system seems to have atfile syscall stubs available. We 320 * now enable them one by one as specified by target syscall_nr.h. 321 */ 322 323 #ifdef TARGET_NR_faccessat 324 static int sys_faccessat(int dirfd, const char *pathname, int mode) 325 { 326 return (faccessat(dirfd, pathname, mode, 0)); 327 } 328 #endif 329 #ifdef TARGET_NR_fchmodat 330 static int sys_fchmodat(int dirfd, const char *pathname, mode_t mode) 331 { 332 return (fchmodat(dirfd, pathname, mode, 0)); 333 } 334 #endif 335 #if defined(TARGET_NR_fchownat) 336 static int sys_fchownat(int dirfd, const char *pathname, uid_t owner, 337 gid_t group, int flags) 338 { 339 return (fchownat(dirfd, pathname, owner, group, flags)); 340 } 341 #endif 342 #ifdef __NR_fstatat64 343 static int sys_fstatat64(int dirfd, const char *pathname, struct stat *buf, 344 int flags) 345 { 346 return (fstatat(dirfd, pathname, buf, flags)); 347 } 348 #endif 349 #ifdef __NR_newfstatat 350 static int sys_newfstatat(int dirfd, const char *pathname, struct stat *buf, 351 int flags) 352 { 353 return (fstatat(dirfd, pathname, buf, flags)); 354 } 355 #endif 356 #ifdef TARGET_NR_futimesat 357 static int sys_futimesat(int dirfd, const char *pathname, 358 const struct timeval times[2]) 359 { 360 return (futimesat(dirfd, pathname, times)); 361 } 362 #endif 363 #ifdef TARGET_NR_linkat 364 static int sys_linkat(int olddirfd, const char *oldpath, 365 int newdirfd, const char *newpath, int flags) 366 { 367 return (linkat(olddirfd, oldpath, newdirfd, newpath, flags)); 368 } 369 #endif 370 #ifdef TARGET_NR_mkdirat 371 static int sys_mkdirat(int dirfd, const char *pathname, mode_t mode) 372 { 373 return (mkdirat(dirfd, pathname, mode)); 374 } 375 #endif 376 #ifdef TARGET_NR_mknodat 377 static int sys_mknodat(int dirfd, const char *pathname, mode_t mode, 378 dev_t dev) 379 { 380 return (mknodat(dirfd, pathname, mode, dev)); 381 } 382 #endif 383 #ifdef TARGET_NR_openat 384 static int sys_openat(int dirfd, const char *pathname, int flags, mode_t mode) 385 { 386 /* 387 * open(2) has extra parameter 'mode' when called with 388 * flag O_CREAT. 389 */ 390 if ((flags & O_CREAT) != 0) { 391 return (openat(dirfd, pathname, flags, mode)); 392 } 393 return (openat(dirfd, pathname, flags)); 394 } 395 #endif 396 #ifdef TARGET_NR_readlinkat 397 static int sys_readlinkat(int dirfd, const char *pathname, char *buf, size_t bufsiz) 398 { 399 return (readlinkat(dirfd, pathname, buf, bufsiz)); 400 } 401 #endif 402 #ifdef TARGET_NR_renameat 403 static int sys_renameat(int olddirfd, const char *oldpath, 404 int newdirfd, const char *newpath) 405 { 406 return (renameat(olddirfd, oldpath, newdirfd, newpath)); 407 } 408 #endif 409 #ifdef TARGET_NR_symlinkat 410 static int sys_symlinkat(const char *oldpath, int newdirfd, const char *newpath) 411 { 412 return (symlinkat(oldpath, newdirfd, newpath)); 413 } 414 #endif 415 #ifdef TARGET_NR_unlinkat 416 static int sys_unlinkat(int dirfd, const char *pathname, int flags) 417 { 418 return (unlinkat(dirfd, pathname, flags)); 419 } 420 #endif 421 #else /* !CONFIG_ATFILE */ 422 423 /* 424 * Try direct syscalls instead 425 */ 426 #if defined(TARGET_NR_faccessat) && defined(__NR_faccessat) 427 _syscall3(int,sys_faccessat,int,dirfd,const char *,pathname,int,mode) 428 #endif 429 #if defined(TARGET_NR_fchmodat) && defined(__NR_fchmodat) 430 _syscall3(int,sys_fchmodat,int,dirfd,const char *,pathname, mode_t,mode) 431 #endif 432 #if defined(TARGET_NR_fchownat) && defined(__NR_fchownat) 433 _syscall5(int,sys_fchownat,int,dirfd,const char *,pathname, 434 uid_t,owner,gid_t,group,int,flags) 435 #endif 436 #if (defined(TARGET_NR_fstatat64) || defined(TARGET_NR_newfstatat)) && \ 437 defined(__NR_fstatat64) 438 _syscall4(int,sys_fstatat64,int,dirfd,const char *,pathname, 439 struct stat *,buf,int,flags) 440 #endif 441 #if defined(TARGET_NR_futimesat) && defined(__NR_futimesat) 442 _syscall3(int,sys_futimesat,int,dirfd,const char *,pathname, 443 const struct timeval *,times) 444 #endif 445 #if (defined(TARGET_NR_newfstatat) || defined(TARGET_NR_fstatat64) ) && \ 446 defined(__NR_newfstatat) 447 _syscall4(int,sys_newfstatat,int,dirfd,const char *,pathname, 448 struct stat *,buf,int,flags) 449 #endif 450 #if defined(TARGET_NR_linkat) && defined(__NR_linkat) 451 _syscall5(int,sys_linkat,int,olddirfd,const char *,oldpath, 452 int,newdirfd,const char *,newpath,int,flags) 453 #endif 454 #if defined(TARGET_NR_mkdirat) && defined(__NR_mkdirat) 455 _syscall3(int,sys_mkdirat,int,dirfd,const char *,pathname,mode_t,mode) 456 #endif 457 #if defined(TARGET_NR_mknodat) && defined(__NR_mknodat) 458 _syscall4(int,sys_mknodat,int,dirfd,const char *,pathname, 459 mode_t,mode,dev_t,dev) 460 #endif 461 #if defined(TARGET_NR_openat) && defined(__NR_openat) 462 _syscall4(int,sys_openat,int,dirfd,const char *,pathname,int,flags,mode_t,mode) 463 #endif 464 #if defined(TARGET_NR_readlinkat) && defined(__NR_readlinkat) 465 _syscall4(int,sys_readlinkat,int,dirfd,const char *,pathname, 466 char *,buf,size_t,bufsize) 467 #endif 468 #if defined(TARGET_NR_renameat) && defined(__NR_renameat) 469 _syscall4(int,sys_renameat,int,olddirfd,const char *,oldpath, 470 int,newdirfd,const char *,newpath) 471 #endif 472 #if defined(TARGET_NR_symlinkat) && defined(__NR_symlinkat) 473 _syscall3(int,sys_symlinkat,const char *,oldpath, 474 int,newdirfd,const char *,newpath) 475 #endif 476 #if defined(TARGET_NR_unlinkat) && defined(__NR_unlinkat) 477 _syscall3(int,sys_unlinkat,int,dirfd,const char *,pathname,int,flags) 478 #endif 479 480 #endif /* CONFIG_ATFILE */ 481 482 #ifdef CONFIG_UTIMENSAT 483 static int sys_utimensat(int dirfd, const char *pathname, 484 const struct timespec times[2], int flags) 485 { 486 if (pathname == NULL) 487 return futimens(dirfd, times); 488 else 489 return utimensat(dirfd, pathname, times, flags); 490 } 491 #else 492 #if defined(TARGET_NR_utimensat) && defined(__NR_utimensat) 493 _syscall4(int,sys_utimensat,int,dirfd,const char *,pathname, 494 const struct timespec *,tsp,int,flags) 495 #endif 496 #endif /* CONFIG_UTIMENSAT */ 497 498 #ifdef CONFIG_INOTIFY 499 #include <sys/inotify.h> 500 501 #if defined(TARGET_NR_inotify_init) && defined(__NR_inotify_init) 502 static int sys_inotify_init(void) 503 { 504 return (inotify_init()); 505 } 506 #endif 507 #if defined(TARGET_NR_inotify_add_watch) && defined(__NR_inotify_add_watch) 508 static int sys_inotify_add_watch(int fd,const char *pathname, int32_t mask) 509 { 510 return (inotify_add_watch(fd, pathname, mask)); 511 } 512 #endif 513 #if defined(TARGET_NR_inotify_rm_watch) && defined(__NR_inotify_rm_watch) 514 static int sys_inotify_rm_watch(int fd, int32_t wd) 515 { 516 return (inotify_rm_watch(fd, wd)); 517 } 518 #endif 519 #ifdef CONFIG_INOTIFY1 520 #if defined(TARGET_NR_inotify_init1) && defined(__NR_inotify_init1) 521 static int sys_inotify_init1(int flags) 522 { 523 return (inotify_init1(flags)); 524 } 525 #endif 526 #endif 527 #else 528 /* Userspace can usually survive runtime without inotify */ 529 #undef TARGET_NR_inotify_init 530 #undef TARGET_NR_inotify_init1 531 #undef TARGET_NR_inotify_add_watch 532 #undef TARGET_NR_inotify_rm_watch 533 #endif /* CONFIG_INOTIFY */ 534 535 #if defined(TARGET_NR_ppoll) 536 #ifndef __NR_ppoll 537 # define __NR_ppoll -1 538 #endif 539 #define __NR_sys_ppoll __NR_ppoll 540 _syscall5(int, sys_ppoll, struct pollfd *, fds, nfds_t, nfds, 541 struct timespec *, timeout, const __sigset_t *, sigmask, 542 size_t, sigsetsize) 543 #endif 544 545 #if defined(TARGET_NR_pselect6) 546 #ifndef __NR_pselect6 547 # define __NR_pselect6 -1 548 #endif 549 #define __NR_sys_pselect6 __NR_pselect6 550 _syscall6(int, sys_pselect6, int, nfds, fd_set *, readfds, fd_set *, writefds, 551 fd_set *, exceptfds, struct timespec *, timeout, void *, sig); 552 #endif 553 554 #if defined(TARGET_NR_prlimit64) 555 #ifndef __NR_prlimit64 556 # define __NR_prlimit64 -1 557 #endif 558 #define __NR_sys_prlimit64 __NR_prlimit64 559 /* The glibc rlimit structure may not be that used by the underlying syscall */ 560 struct host_rlimit64 { 561 uint64_t rlim_cur; 562 uint64_t rlim_max; 563 }; 564 _syscall4(int, sys_prlimit64, pid_t, pid, int, resource, 565 const struct host_rlimit64 *, new_limit, 566 struct host_rlimit64 *, old_limit) 567 #endif 568 569 extern int personality(int); 570 extern int flock(int, int); 571 extern int setfsuid(int); 572 extern int setfsgid(int); 573 extern int setgroups(int, gid_t *); 574 575 /* ARM EABI and MIPS expect 64bit types aligned even on pairs or registers */ 576 #ifdef TARGET_ARM 577 static inline int regpairs_aligned(void *cpu_env) { 578 return ((((CPUARMState *)cpu_env)->eabi) == 1) ; 579 } 580 #elif defined(TARGET_MIPS) 581 static inline int regpairs_aligned(void *cpu_env) { return 1; } 582 #else 583 static inline int regpairs_aligned(void *cpu_env) { return 0; } 584 #endif 585 586 #define ERRNO_TABLE_SIZE 1200 587 588 /* target_to_host_errno_table[] is initialized from 589 * host_to_target_errno_table[] in syscall_init(). */ 590 static uint16_t target_to_host_errno_table[ERRNO_TABLE_SIZE] = { 591 }; 592 593 /* 594 * This list is the union of errno values overridden in asm-<arch>/errno.h 595 * minus the errnos that are not actually generic to all archs. 596 */ 597 static uint16_t host_to_target_errno_table[ERRNO_TABLE_SIZE] = { 598 [EIDRM] = TARGET_EIDRM, 599 [ECHRNG] = TARGET_ECHRNG, 600 [EL2NSYNC] = TARGET_EL2NSYNC, 601 [EL3HLT] = TARGET_EL3HLT, 602 [EL3RST] = TARGET_EL3RST, 603 [ELNRNG] = TARGET_ELNRNG, 604 [EUNATCH] = TARGET_EUNATCH, 605 [ENOCSI] = TARGET_ENOCSI, 606 [EL2HLT] = TARGET_EL2HLT, 607 [EDEADLK] = TARGET_EDEADLK, 608 [ENOLCK] = TARGET_ENOLCK, 609 [EBADE] = TARGET_EBADE, 610 [EBADR] = TARGET_EBADR, 611 [EXFULL] = TARGET_EXFULL, 612 [ENOANO] = TARGET_ENOANO, 613 [EBADRQC] = TARGET_EBADRQC, 614 [EBADSLT] = TARGET_EBADSLT, 615 [EBFONT] = TARGET_EBFONT, 616 [ENOSTR] = TARGET_ENOSTR, 617 [ENODATA] = TARGET_ENODATA, 618 [ETIME] = TARGET_ETIME, 619 [ENOSR] = TARGET_ENOSR, 620 [ENONET] = TARGET_ENONET, 621 [ENOPKG] = TARGET_ENOPKG, 622 [EREMOTE] = TARGET_EREMOTE, 623 [ENOLINK] = TARGET_ENOLINK, 624 [EADV] = TARGET_EADV, 625 [ESRMNT] = TARGET_ESRMNT, 626 [ECOMM] = TARGET_ECOMM, 627 [EPROTO] = TARGET_EPROTO, 628 [EDOTDOT] = TARGET_EDOTDOT, 629 [EMULTIHOP] = TARGET_EMULTIHOP, 630 [EBADMSG] = TARGET_EBADMSG, 631 [ENAMETOOLONG] = TARGET_ENAMETOOLONG, 632 [EOVERFLOW] = TARGET_EOVERFLOW, 633 [ENOTUNIQ] = TARGET_ENOTUNIQ, 634 [EBADFD] = TARGET_EBADFD, 635 [EREMCHG] = TARGET_EREMCHG, 636 [ELIBACC] = TARGET_ELIBACC, 637 [ELIBBAD] = TARGET_ELIBBAD, 638 [ELIBSCN] = TARGET_ELIBSCN, 639 [ELIBMAX] = TARGET_ELIBMAX, 640 [ELIBEXEC] = TARGET_ELIBEXEC, 641 [EILSEQ] = TARGET_EILSEQ, 642 [ENOSYS] = TARGET_ENOSYS, 643 [ELOOP] = TARGET_ELOOP, 644 [ERESTART] = TARGET_ERESTART, 645 [ESTRPIPE] = TARGET_ESTRPIPE, 646 [ENOTEMPTY] = TARGET_ENOTEMPTY, 647 [EUSERS] = TARGET_EUSERS, 648 [ENOTSOCK] = TARGET_ENOTSOCK, 649 [EDESTADDRREQ] = TARGET_EDESTADDRREQ, 650 [EMSGSIZE] = TARGET_EMSGSIZE, 651 [EPROTOTYPE] = TARGET_EPROTOTYPE, 652 [ENOPROTOOPT] = TARGET_ENOPROTOOPT, 653 [EPROTONOSUPPORT] = TARGET_EPROTONOSUPPORT, 654 [ESOCKTNOSUPPORT] = TARGET_ESOCKTNOSUPPORT, 655 [EOPNOTSUPP] = TARGET_EOPNOTSUPP, 656 [EPFNOSUPPORT] = TARGET_EPFNOSUPPORT, 657 [EAFNOSUPPORT] = TARGET_EAFNOSUPPORT, 658 [EADDRINUSE] = TARGET_EADDRINUSE, 659 [EADDRNOTAVAIL] = TARGET_EADDRNOTAVAIL, 660 [ENETDOWN] = TARGET_ENETDOWN, 661 [ENETUNREACH] = TARGET_ENETUNREACH, 662 [ENETRESET] = TARGET_ENETRESET, 663 [ECONNABORTED] = TARGET_ECONNABORTED, 664 [ECONNRESET] = TARGET_ECONNRESET, 665 [ENOBUFS] = TARGET_ENOBUFS, 666 [EISCONN] = TARGET_EISCONN, 667 [ENOTCONN] = TARGET_ENOTCONN, 668 [EUCLEAN] = TARGET_EUCLEAN, 669 [ENOTNAM] = TARGET_ENOTNAM, 670 [ENAVAIL] = TARGET_ENAVAIL, 671 [EISNAM] = TARGET_EISNAM, 672 [EREMOTEIO] = TARGET_EREMOTEIO, 673 [ESHUTDOWN] = TARGET_ESHUTDOWN, 674 [ETOOMANYREFS] = TARGET_ETOOMANYREFS, 675 [ETIMEDOUT] = TARGET_ETIMEDOUT, 676 [ECONNREFUSED] = TARGET_ECONNREFUSED, 677 [EHOSTDOWN] = TARGET_EHOSTDOWN, 678 [EHOSTUNREACH] = TARGET_EHOSTUNREACH, 679 [EALREADY] = TARGET_EALREADY, 680 [EINPROGRESS] = TARGET_EINPROGRESS, 681 [ESTALE] = TARGET_ESTALE, 682 [ECANCELED] = TARGET_ECANCELED, 683 [ENOMEDIUM] = TARGET_ENOMEDIUM, 684 [EMEDIUMTYPE] = TARGET_EMEDIUMTYPE, 685 #ifdef ENOKEY 686 [ENOKEY] = TARGET_ENOKEY, 687 #endif 688 #ifdef EKEYEXPIRED 689 [EKEYEXPIRED] = TARGET_EKEYEXPIRED, 690 #endif 691 #ifdef EKEYREVOKED 692 [EKEYREVOKED] = TARGET_EKEYREVOKED, 693 #endif 694 #ifdef EKEYREJECTED 695 [EKEYREJECTED] = TARGET_EKEYREJECTED, 696 #endif 697 #ifdef EOWNERDEAD 698 [EOWNERDEAD] = TARGET_EOWNERDEAD, 699 #endif 700 #ifdef ENOTRECOVERABLE 701 [ENOTRECOVERABLE] = TARGET_ENOTRECOVERABLE, 702 #endif 703 }; 704 705 static inline int host_to_target_errno(int err) 706 { 707 if(host_to_target_errno_table[err]) 708 return host_to_target_errno_table[err]; 709 return err; 710 } 711 712 static inline int target_to_host_errno(int err) 713 { 714 if (target_to_host_errno_table[err]) 715 return target_to_host_errno_table[err]; 716 return err; 717 } 718 719 static inline abi_long get_errno(abi_long ret) 720 { 721 if (ret == -1) 722 return -host_to_target_errno(errno); 723 else 724 return ret; 725 } 726 727 static inline int is_error(abi_long ret) 728 { 729 return (abi_ulong)ret >= (abi_ulong)(-4096); 730 } 731 732 char *target_strerror(int err) 733 { 734 if ((err >= ERRNO_TABLE_SIZE) || (err < 0)) { 735 return NULL; 736 } 737 return strerror(target_to_host_errno(err)); 738 } 739 740 static abi_ulong target_brk; 741 static abi_ulong target_original_brk; 742 static abi_ulong brk_page; 743 744 void target_set_brk(abi_ulong new_brk) 745 { 746 target_original_brk = target_brk = HOST_PAGE_ALIGN(new_brk); 747 brk_page = HOST_PAGE_ALIGN(target_brk); 748 } 749 750 //#define DEBUGF_BRK(message, args...) do { fprintf(stderr, (message), ## args); } while (0) 751 #define DEBUGF_BRK(message, args...) 752 753 /* do_brk() must return target values and target errnos. */ 754 abi_long do_brk(abi_ulong new_brk) 755 { 756 abi_long mapped_addr; 757 int new_alloc_size; 758 759 DEBUGF_BRK("do_brk(" TARGET_ABI_FMT_lx ") -> ", new_brk); 760 761 if (!new_brk) { 762 DEBUGF_BRK(TARGET_ABI_FMT_lx " (!new_brk)\n", target_brk); 763 return target_brk; 764 } 765 if (new_brk < target_original_brk) { 766 DEBUGF_BRK(TARGET_ABI_FMT_lx " (new_brk < target_original_brk)\n", 767 target_brk); 768 return target_brk; 769 } 770 771 /* If the new brk is less than the highest page reserved to the 772 * target heap allocation, set it and we're almost done... */ 773 if (new_brk <= brk_page) { 774 /* Heap contents are initialized to zero, as for anonymous 775 * mapped pages. */ 776 if (new_brk > target_brk) { 777 memset(g2h(target_brk), 0, new_brk - target_brk); 778 } 779 target_brk = new_brk; 780 DEBUGF_BRK(TARGET_ABI_FMT_lx " (new_brk <= brk_page)\n", target_brk); 781 return target_brk; 782 } 783 784 /* We need to allocate more memory after the brk... Note that 785 * we don't use MAP_FIXED because that will map over the top of 786 * any existing mapping (like the one with the host libc or qemu 787 * itself); instead we treat "mapped but at wrong address" as 788 * a failure and unmap again. 789 */ 790 new_alloc_size = HOST_PAGE_ALIGN(new_brk - brk_page); 791 mapped_addr = get_errno(target_mmap(brk_page, new_alloc_size, 792 PROT_READ|PROT_WRITE, 793 MAP_ANON|MAP_PRIVATE, 0, 0)); 794 795 if (mapped_addr == brk_page) { 796 /* Heap contents are initialized to zero, as for anonymous 797 * mapped pages. Technically the new pages are already 798 * initialized to zero since they *are* anonymous mapped 799 * pages, however we have to take care with the contents that 800 * come from the remaining part of the previous page: it may 801 * contains garbage data due to a previous heap usage (grown 802 * then shrunken). */ 803 memset(g2h(target_brk), 0, brk_page - target_brk); 804 805 target_brk = new_brk; 806 brk_page = HOST_PAGE_ALIGN(target_brk); 807 DEBUGF_BRK(TARGET_ABI_FMT_lx " (mapped_addr == brk_page)\n", 808 target_brk); 809 return target_brk; 810 } else if (mapped_addr != -1) { 811 /* Mapped but at wrong address, meaning there wasn't actually 812 * enough space for this brk. 813 */ 814 target_munmap(mapped_addr, new_alloc_size); 815 mapped_addr = -1; 816 DEBUGF_BRK(TARGET_ABI_FMT_lx " (mapped_addr != -1)\n", target_brk); 817 } 818 else { 819 DEBUGF_BRK(TARGET_ABI_FMT_lx " (otherwise)\n", target_brk); 820 } 821 822 #if defined(TARGET_ALPHA) 823 /* We (partially) emulate OSF/1 on Alpha, which requires we 824 return a proper errno, not an unchanged brk value. */ 825 return -TARGET_ENOMEM; 826 #endif 827 /* For everything else, return the previous break. */ 828 return target_brk; 829 } 830 831 static inline abi_long copy_from_user_fdset(fd_set *fds, 832 abi_ulong target_fds_addr, 833 int n) 834 { 835 int i, nw, j, k; 836 abi_ulong b, *target_fds; 837 838 nw = (n + TARGET_ABI_BITS - 1) / TARGET_ABI_BITS; 839 if (!(target_fds = lock_user(VERIFY_READ, 840 target_fds_addr, 841 sizeof(abi_ulong) * nw, 842 1))) 843 return -TARGET_EFAULT; 844 845 FD_ZERO(fds); 846 k = 0; 847 for (i = 0; i < nw; i++) { 848 /* grab the abi_ulong */ 849 __get_user(b, &target_fds[i]); 850 for (j = 0; j < TARGET_ABI_BITS; j++) { 851 /* check the bit inside the abi_ulong */ 852 if ((b >> j) & 1) 853 FD_SET(k, fds); 854 k++; 855 } 856 } 857 858 unlock_user(target_fds, target_fds_addr, 0); 859 860 return 0; 861 } 862 863 static inline abi_ulong copy_from_user_fdset_ptr(fd_set *fds, fd_set **fds_ptr, 864 abi_ulong target_fds_addr, 865 int n) 866 { 867 if (target_fds_addr) { 868 if (copy_from_user_fdset(fds, target_fds_addr, n)) 869 return -TARGET_EFAULT; 870 *fds_ptr = fds; 871 } else { 872 *fds_ptr = NULL; 873 } 874 return 0; 875 } 876 877 static inline abi_long copy_to_user_fdset(abi_ulong target_fds_addr, 878 const fd_set *fds, 879 int n) 880 { 881 int i, nw, j, k; 882 abi_long v; 883 abi_ulong *target_fds; 884 885 nw = (n + TARGET_ABI_BITS - 1) / TARGET_ABI_BITS; 886 if (!(target_fds = lock_user(VERIFY_WRITE, 887 target_fds_addr, 888 sizeof(abi_ulong) * nw, 889 0))) 890 return -TARGET_EFAULT; 891 892 k = 0; 893 for (i = 0; i < nw; i++) { 894 v = 0; 895 for (j = 0; j < TARGET_ABI_BITS; j++) { 896 v |= ((FD_ISSET(k, fds) != 0) << j); 897 k++; 898 } 899 __put_user(v, &target_fds[i]); 900 } 901 902 unlock_user(target_fds, target_fds_addr, sizeof(abi_ulong) * nw); 903 904 return 0; 905 } 906 907 #if defined(__alpha__) 908 #define HOST_HZ 1024 909 #else 910 #define HOST_HZ 100 911 #endif 912 913 static inline abi_long host_to_target_clock_t(long ticks) 914 { 915 #if HOST_HZ == TARGET_HZ 916 return ticks; 917 #else 918 return ((int64_t)ticks * TARGET_HZ) / HOST_HZ; 919 #endif 920 } 921 922 static inline abi_long host_to_target_rusage(abi_ulong target_addr, 923 const struct rusage *rusage) 924 { 925 struct target_rusage *target_rusage; 926 927 if (!lock_user_struct(VERIFY_WRITE, target_rusage, target_addr, 0)) 928 return -TARGET_EFAULT; 929 target_rusage->ru_utime.tv_sec = tswapal(rusage->ru_utime.tv_sec); 930 target_rusage->ru_utime.tv_usec = tswapal(rusage->ru_utime.tv_usec); 931 target_rusage->ru_stime.tv_sec = tswapal(rusage->ru_stime.tv_sec); 932 target_rusage->ru_stime.tv_usec = tswapal(rusage->ru_stime.tv_usec); 933 target_rusage->ru_maxrss = tswapal(rusage->ru_maxrss); 934 target_rusage->ru_ixrss = tswapal(rusage->ru_ixrss); 935 target_rusage->ru_idrss = tswapal(rusage->ru_idrss); 936 target_rusage->ru_isrss = tswapal(rusage->ru_isrss); 937 target_rusage->ru_minflt = tswapal(rusage->ru_minflt); 938 target_rusage->ru_majflt = tswapal(rusage->ru_majflt); 939 target_rusage->ru_nswap = tswapal(rusage->ru_nswap); 940 target_rusage->ru_inblock = tswapal(rusage->ru_inblock); 941 target_rusage->ru_oublock = tswapal(rusage->ru_oublock); 942 target_rusage->ru_msgsnd = tswapal(rusage->ru_msgsnd); 943 target_rusage->ru_msgrcv = tswapal(rusage->ru_msgrcv); 944 target_rusage->ru_nsignals = tswapal(rusage->ru_nsignals); 945 target_rusage->ru_nvcsw = tswapal(rusage->ru_nvcsw); 946 target_rusage->ru_nivcsw = tswapal(rusage->ru_nivcsw); 947 unlock_user_struct(target_rusage, target_addr, 1); 948 949 return 0; 950 } 951 952 static inline rlim_t target_to_host_rlim(abi_ulong target_rlim) 953 { 954 abi_ulong target_rlim_swap; 955 rlim_t result; 956 957 target_rlim_swap = tswapal(target_rlim); 958 if (target_rlim_swap == TARGET_RLIM_INFINITY) 959 return RLIM_INFINITY; 960 961 result = target_rlim_swap; 962 if (target_rlim_swap != (rlim_t)result) 963 return RLIM_INFINITY; 964 965 return result; 966 } 967 968 static inline abi_ulong host_to_target_rlim(rlim_t rlim) 969 { 970 abi_ulong target_rlim_swap; 971 abi_ulong result; 972 973 if (rlim == RLIM_INFINITY || rlim != (abi_long)rlim) 974 target_rlim_swap = TARGET_RLIM_INFINITY; 975 else 976 target_rlim_swap = rlim; 977 result = tswapal(target_rlim_swap); 978 979 return result; 980 } 981 982 static inline int target_to_host_resource(int code) 983 { 984 switch (code) { 985 case TARGET_RLIMIT_AS: 986 return RLIMIT_AS; 987 case TARGET_RLIMIT_CORE: 988 return RLIMIT_CORE; 989 case TARGET_RLIMIT_CPU: 990 return RLIMIT_CPU; 991 case TARGET_RLIMIT_DATA: 992 return RLIMIT_DATA; 993 case TARGET_RLIMIT_FSIZE: 994 return RLIMIT_FSIZE; 995 case TARGET_RLIMIT_LOCKS: 996 return RLIMIT_LOCKS; 997 case TARGET_RLIMIT_MEMLOCK: 998 return RLIMIT_MEMLOCK; 999 case TARGET_RLIMIT_MSGQUEUE: 1000 return RLIMIT_MSGQUEUE; 1001 case TARGET_RLIMIT_NICE: 1002 return RLIMIT_NICE; 1003 case TARGET_RLIMIT_NOFILE: 1004 return RLIMIT_NOFILE; 1005 case TARGET_RLIMIT_NPROC: 1006 return RLIMIT_NPROC; 1007 case TARGET_RLIMIT_RSS: 1008 return RLIMIT_RSS; 1009 case TARGET_RLIMIT_RTPRIO: 1010 return RLIMIT_RTPRIO; 1011 case TARGET_RLIMIT_SIGPENDING: 1012 return RLIMIT_SIGPENDING; 1013 case TARGET_RLIMIT_STACK: 1014 return RLIMIT_STACK; 1015 default: 1016 return code; 1017 } 1018 } 1019 1020 static inline abi_long copy_from_user_timeval(struct timeval *tv, 1021 abi_ulong target_tv_addr) 1022 { 1023 struct target_timeval *target_tv; 1024 1025 if (!lock_user_struct(VERIFY_READ, target_tv, target_tv_addr, 1)) 1026 return -TARGET_EFAULT; 1027 1028 __get_user(tv->tv_sec, &target_tv->tv_sec); 1029 __get_user(tv->tv_usec, &target_tv->tv_usec); 1030 1031 unlock_user_struct(target_tv, target_tv_addr, 0); 1032 1033 return 0; 1034 } 1035 1036 static inline abi_long copy_to_user_timeval(abi_ulong target_tv_addr, 1037 const struct timeval *tv) 1038 { 1039 struct target_timeval *target_tv; 1040 1041 if (!lock_user_struct(VERIFY_WRITE, target_tv, target_tv_addr, 0)) 1042 return -TARGET_EFAULT; 1043 1044 __put_user(tv->tv_sec, &target_tv->tv_sec); 1045 __put_user(tv->tv_usec, &target_tv->tv_usec); 1046 1047 unlock_user_struct(target_tv, target_tv_addr, 1); 1048 1049 return 0; 1050 } 1051 1052 #if defined(TARGET_NR_mq_open) && defined(__NR_mq_open) 1053 #include <mqueue.h> 1054 1055 static inline abi_long copy_from_user_mq_attr(struct mq_attr *attr, 1056 abi_ulong target_mq_attr_addr) 1057 { 1058 struct target_mq_attr *target_mq_attr; 1059 1060 if (!lock_user_struct(VERIFY_READ, target_mq_attr, 1061 target_mq_attr_addr, 1)) 1062 return -TARGET_EFAULT; 1063 1064 __get_user(attr->mq_flags, &target_mq_attr->mq_flags); 1065 __get_user(attr->mq_maxmsg, &target_mq_attr->mq_maxmsg); 1066 __get_user(attr->mq_msgsize, &target_mq_attr->mq_msgsize); 1067 __get_user(attr->mq_curmsgs, &target_mq_attr->mq_curmsgs); 1068 1069 unlock_user_struct(target_mq_attr, target_mq_attr_addr, 0); 1070 1071 return 0; 1072 } 1073 1074 static inline abi_long copy_to_user_mq_attr(abi_ulong target_mq_attr_addr, 1075 const struct mq_attr *attr) 1076 { 1077 struct target_mq_attr *target_mq_attr; 1078 1079 if (!lock_user_struct(VERIFY_WRITE, target_mq_attr, 1080 target_mq_attr_addr, 0)) 1081 return -TARGET_EFAULT; 1082 1083 __put_user(attr->mq_flags, &target_mq_attr->mq_flags); 1084 __put_user(attr->mq_maxmsg, &target_mq_attr->mq_maxmsg); 1085 __put_user(attr->mq_msgsize, &target_mq_attr->mq_msgsize); 1086 __put_user(attr->mq_curmsgs, &target_mq_attr->mq_curmsgs); 1087 1088 unlock_user_struct(target_mq_attr, target_mq_attr_addr, 1); 1089 1090 return 0; 1091 } 1092 #endif 1093 1094 #if defined(TARGET_NR_select) || defined(TARGET_NR__newselect) 1095 /* do_select() must return target values and target errnos. */ 1096 static abi_long do_select(int n, 1097 abi_ulong rfd_addr, abi_ulong wfd_addr, 1098 abi_ulong efd_addr, abi_ulong target_tv_addr) 1099 { 1100 fd_set rfds, wfds, efds; 1101 fd_set *rfds_ptr, *wfds_ptr, *efds_ptr; 1102 struct timeval tv, *tv_ptr; 1103 abi_long ret; 1104 1105 ret = copy_from_user_fdset_ptr(&rfds, &rfds_ptr, rfd_addr, n); 1106 if (ret) { 1107 return ret; 1108 } 1109 ret = copy_from_user_fdset_ptr(&wfds, &wfds_ptr, wfd_addr, n); 1110 if (ret) { 1111 return ret; 1112 } 1113 ret = copy_from_user_fdset_ptr(&efds, &efds_ptr, efd_addr, n); 1114 if (ret) { 1115 return ret; 1116 } 1117 1118 if (target_tv_addr) { 1119 if (copy_from_user_timeval(&tv, target_tv_addr)) 1120 return -TARGET_EFAULT; 1121 tv_ptr = &tv; 1122 } else { 1123 tv_ptr = NULL; 1124 } 1125 1126 ret = get_errno(select(n, rfds_ptr, wfds_ptr, efds_ptr, tv_ptr)); 1127 1128 if (!is_error(ret)) { 1129 if (rfd_addr && copy_to_user_fdset(rfd_addr, &rfds, n)) 1130 return -TARGET_EFAULT; 1131 if (wfd_addr && copy_to_user_fdset(wfd_addr, &wfds, n)) 1132 return -TARGET_EFAULT; 1133 if (efd_addr && copy_to_user_fdset(efd_addr, &efds, n)) 1134 return -TARGET_EFAULT; 1135 1136 if (target_tv_addr && copy_to_user_timeval(target_tv_addr, &tv)) 1137 return -TARGET_EFAULT; 1138 } 1139 1140 return ret; 1141 } 1142 #endif 1143 1144 static abi_long do_pipe2(int host_pipe[], int flags) 1145 { 1146 #ifdef CONFIG_PIPE2 1147 return pipe2(host_pipe, flags); 1148 #else 1149 return -ENOSYS; 1150 #endif 1151 } 1152 1153 static abi_long do_pipe(void *cpu_env, abi_ulong pipedes, 1154 int flags, int is_pipe2) 1155 { 1156 int host_pipe[2]; 1157 abi_long ret; 1158 ret = flags ? do_pipe2(host_pipe, flags) : pipe(host_pipe); 1159 1160 if (is_error(ret)) 1161 return get_errno(ret); 1162 1163 /* Several targets have special calling conventions for the original 1164 pipe syscall, but didn't replicate this into the pipe2 syscall. */ 1165 if (!is_pipe2) { 1166 #if defined(TARGET_ALPHA) 1167 ((CPUAlphaState *)cpu_env)->ir[IR_A4] = host_pipe[1]; 1168 return host_pipe[0]; 1169 #elif defined(TARGET_MIPS) 1170 ((CPUMIPSState*)cpu_env)->active_tc.gpr[3] = host_pipe[1]; 1171 return host_pipe[0]; 1172 #elif defined(TARGET_SH4) 1173 ((CPUSH4State*)cpu_env)->gregs[1] = host_pipe[1]; 1174 return host_pipe[0]; 1175 #endif 1176 } 1177 1178 if (put_user_s32(host_pipe[0], pipedes) 1179 || put_user_s32(host_pipe[1], pipedes + sizeof(host_pipe[0]))) 1180 return -TARGET_EFAULT; 1181 return get_errno(ret); 1182 } 1183 1184 static inline abi_long target_to_host_ip_mreq(struct ip_mreqn *mreqn, 1185 abi_ulong target_addr, 1186 socklen_t len) 1187 { 1188 struct target_ip_mreqn *target_smreqn; 1189 1190 target_smreqn = lock_user(VERIFY_READ, target_addr, len, 1); 1191 if (!target_smreqn) 1192 return -TARGET_EFAULT; 1193 mreqn->imr_multiaddr.s_addr = target_smreqn->imr_multiaddr.s_addr; 1194 mreqn->imr_address.s_addr = target_smreqn->imr_address.s_addr; 1195 if (len == sizeof(struct target_ip_mreqn)) 1196 mreqn->imr_ifindex = tswapal(target_smreqn->imr_ifindex); 1197 unlock_user(target_smreqn, target_addr, 0); 1198 1199 return 0; 1200 } 1201 1202 static inline abi_long target_to_host_sockaddr(struct sockaddr *addr, 1203 abi_ulong target_addr, 1204 socklen_t len) 1205 { 1206 const socklen_t unix_maxlen = sizeof (struct sockaddr_un); 1207 sa_family_t sa_family; 1208 struct target_sockaddr *target_saddr; 1209 1210 target_saddr = lock_user(VERIFY_READ, target_addr, len, 1); 1211 if (!target_saddr) 1212 return -TARGET_EFAULT; 1213 1214 sa_family = tswap16(target_saddr->sa_family); 1215 1216 /* Oops. The caller might send a incomplete sun_path; sun_path 1217 * must be terminated by \0 (see the manual page), but 1218 * unfortunately it is quite common to specify sockaddr_un 1219 * length as "strlen(x->sun_path)" while it should be 1220 * "strlen(...) + 1". We'll fix that here if needed. 1221 * Linux kernel has a similar feature. 1222 */ 1223 1224 if (sa_family == AF_UNIX) { 1225 if (len < unix_maxlen && len > 0) { 1226 char *cp = (char*)target_saddr; 1227 1228 if ( cp[len-1] && !cp[len] ) 1229 len++; 1230 } 1231 if (len > unix_maxlen) 1232 len = unix_maxlen; 1233 } 1234 1235 memcpy(addr, target_saddr, len); 1236 addr->sa_family = sa_family; 1237 unlock_user(target_saddr, target_addr, 0); 1238 1239 return 0; 1240 } 1241 1242 static inline abi_long host_to_target_sockaddr(abi_ulong target_addr, 1243 struct sockaddr *addr, 1244 socklen_t len) 1245 { 1246 struct target_sockaddr *target_saddr; 1247 1248 target_saddr = lock_user(VERIFY_WRITE, target_addr, len, 0); 1249 if (!target_saddr) 1250 return -TARGET_EFAULT; 1251 memcpy(target_saddr, addr, len); 1252 target_saddr->sa_family = tswap16(addr->sa_family); 1253 unlock_user(target_saddr, target_addr, len); 1254 1255 return 0; 1256 } 1257 1258 /* ??? Should this also swap msgh->name? */ 1259 static inline abi_long target_to_host_cmsg(struct msghdr *msgh, 1260 struct target_msghdr *target_msgh) 1261 { 1262 struct cmsghdr *cmsg = CMSG_FIRSTHDR(msgh); 1263 abi_long msg_controllen; 1264 abi_ulong target_cmsg_addr; 1265 struct target_cmsghdr *target_cmsg; 1266 socklen_t space = 0; 1267 1268 msg_controllen = tswapal(target_msgh->msg_controllen); 1269 if (msg_controllen < sizeof (struct target_cmsghdr)) 1270 goto the_end; 1271 target_cmsg_addr = tswapal(target_msgh->msg_control); 1272 target_cmsg = lock_user(VERIFY_READ, target_cmsg_addr, msg_controllen, 1); 1273 if (!target_cmsg) 1274 return -TARGET_EFAULT; 1275 1276 while (cmsg && target_cmsg) { 1277 void *data = CMSG_DATA(cmsg); 1278 void *target_data = TARGET_CMSG_DATA(target_cmsg); 1279 1280 int len = tswapal(target_cmsg->cmsg_len) 1281 - TARGET_CMSG_ALIGN(sizeof (struct target_cmsghdr)); 1282 1283 space += CMSG_SPACE(len); 1284 if (space > msgh->msg_controllen) { 1285 space -= CMSG_SPACE(len); 1286 gemu_log("Host cmsg overflow\n"); 1287 break; 1288 } 1289 1290 cmsg->cmsg_level = tswap32(target_cmsg->cmsg_level); 1291 cmsg->cmsg_type = tswap32(target_cmsg->cmsg_type); 1292 cmsg->cmsg_len = CMSG_LEN(len); 1293 1294 if (cmsg->cmsg_level != TARGET_SOL_SOCKET || cmsg->cmsg_type != SCM_RIGHTS) { 1295 gemu_log("Unsupported ancillary data: %d/%d\n", cmsg->cmsg_level, cmsg->cmsg_type); 1296 memcpy(data, target_data, len); 1297 } else { 1298 int *fd = (int *)data; 1299 int *target_fd = (int *)target_data; 1300 int i, numfds = len / sizeof(int); 1301 1302 for (i = 0; i < numfds; i++) 1303 fd[i] = tswap32(target_fd[i]); 1304 } 1305 1306 cmsg = CMSG_NXTHDR(msgh, cmsg); 1307 target_cmsg = TARGET_CMSG_NXTHDR(target_msgh, target_cmsg); 1308 } 1309 unlock_user(target_cmsg, target_cmsg_addr, 0); 1310 the_end: 1311 msgh->msg_controllen = space; 1312 return 0; 1313 } 1314 1315 /* ??? Should this also swap msgh->name? */ 1316 static inline abi_long host_to_target_cmsg(struct target_msghdr *target_msgh, 1317 struct msghdr *msgh) 1318 { 1319 struct cmsghdr *cmsg = CMSG_FIRSTHDR(msgh); 1320 abi_long msg_controllen; 1321 abi_ulong target_cmsg_addr; 1322 struct target_cmsghdr *target_cmsg; 1323 socklen_t space = 0; 1324 1325 msg_controllen = tswapal(target_msgh->msg_controllen); 1326 if (msg_controllen < sizeof (struct target_cmsghdr)) 1327 goto the_end; 1328 target_cmsg_addr = tswapal(target_msgh->msg_control); 1329 target_cmsg = lock_user(VERIFY_WRITE, target_cmsg_addr, msg_controllen, 0); 1330 if (!target_cmsg) 1331 return -TARGET_EFAULT; 1332 1333 while (cmsg && target_cmsg) { 1334 void *data = CMSG_DATA(cmsg); 1335 void *target_data = TARGET_CMSG_DATA(target_cmsg); 1336 1337 int len = cmsg->cmsg_len - CMSG_ALIGN(sizeof (struct cmsghdr)); 1338 1339 space += TARGET_CMSG_SPACE(len); 1340 if (space > msg_controllen) { 1341 space -= TARGET_CMSG_SPACE(len); 1342 gemu_log("Target cmsg overflow\n"); 1343 break; 1344 } 1345 1346 target_cmsg->cmsg_level = tswap32(cmsg->cmsg_level); 1347 target_cmsg->cmsg_type = tswap32(cmsg->cmsg_type); 1348 target_cmsg->cmsg_len = tswapal(TARGET_CMSG_LEN(len)); 1349 1350 if (cmsg->cmsg_level != TARGET_SOL_SOCKET || cmsg->cmsg_type != SCM_RIGHTS) { 1351 gemu_log("Unsupported ancillary data: %d/%d\n", cmsg->cmsg_level, cmsg->cmsg_type); 1352 memcpy(target_data, data, len); 1353 } else { 1354 int *fd = (int *)data; 1355 int *target_fd = (int *)target_data; 1356 int i, numfds = len / sizeof(int); 1357 1358 for (i = 0; i < numfds; i++) 1359 target_fd[i] = tswap32(fd[i]); 1360 } 1361 1362 cmsg = CMSG_NXTHDR(msgh, cmsg); 1363 target_cmsg = TARGET_CMSG_NXTHDR(target_msgh, target_cmsg); 1364 } 1365 unlock_user(target_cmsg, target_cmsg_addr, space); 1366 the_end: 1367 target_msgh->msg_controllen = tswapal(space); 1368 return 0; 1369 } 1370 1371 /* do_setsockopt() Must return target values and target errnos. */ 1372 static abi_long do_setsockopt(int sockfd, int level, int optname, 1373 abi_ulong optval_addr, socklen_t optlen) 1374 { 1375 abi_long ret; 1376 int val; 1377 struct ip_mreqn *ip_mreq; 1378 struct ip_mreq_source *ip_mreq_source; 1379 1380 switch(level) { 1381 case SOL_TCP: 1382 /* TCP options all take an 'int' value. */ 1383 if (optlen < sizeof(uint32_t)) 1384 return -TARGET_EINVAL; 1385 1386 if (get_user_u32(val, optval_addr)) 1387 return -TARGET_EFAULT; 1388 ret = get_errno(setsockopt(sockfd, level, optname, &val, sizeof(val))); 1389 break; 1390 case SOL_IP: 1391 switch(optname) { 1392 case IP_TOS: 1393 case IP_TTL: 1394 case IP_HDRINCL: 1395 case IP_ROUTER_ALERT: 1396 case IP_RECVOPTS: 1397 case IP_RETOPTS: 1398 case IP_PKTINFO: 1399 case IP_MTU_DISCOVER: 1400 case IP_RECVERR: 1401 case IP_RECVTOS: 1402 #ifdef IP_FREEBIND 1403 case IP_FREEBIND: 1404 #endif 1405 case IP_MULTICAST_TTL: 1406 case IP_MULTICAST_LOOP: 1407 val = 0; 1408 if (optlen >= sizeof(uint32_t)) { 1409 if (get_user_u32(val, optval_addr)) 1410 return -TARGET_EFAULT; 1411 } else if (optlen >= 1) { 1412 if (get_user_u8(val, optval_addr)) 1413 return -TARGET_EFAULT; 1414 } 1415 ret = get_errno(setsockopt(sockfd, level, optname, &val, sizeof(val))); 1416 break; 1417 case IP_ADD_MEMBERSHIP: 1418 case IP_DROP_MEMBERSHIP: 1419 if (optlen < sizeof (struct target_ip_mreq) || 1420 optlen > sizeof (struct target_ip_mreqn)) 1421 return -TARGET_EINVAL; 1422 1423 ip_mreq = (struct ip_mreqn *) alloca(optlen); 1424 target_to_host_ip_mreq(ip_mreq, optval_addr, optlen); 1425 ret = get_errno(setsockopt(sockfd, level, optname, ip_mreq, optlen)); 1426 break; 1427 1428 case IP_BLOCK_SOURCE: 1429 case IP_UNBLOCK_SOURCE: 1430 case IP_ADD_SOURCE_MEMBERSHIP: 1431 case IP_DROP_SOURCE_MEMBERSHIP: 1432 if (optlen != sizeof (struct target_ip_mreq_source)) 1433 return -TARGET_EINVAL; 1434 1435 ip_mreq_source = lock_user(VERIFY_READ, optval_addr, optlen, 1); 1436 ret = get_errno(setsockopt(sockfd, level, optname, ip_mreq_source, optlen)); 1437 unlock_user (ip_mreq_source, optval_addr, 0); 1438 break; 1439 1440 default: 1441 goto unimplemented; 1442 } 1443 break; 1444 case TARGET_SOL_SOCKET: 1445 switch (optname) { 1446 /* Options with 'int' argument. */ 1447 case TARGET_SO_DEBUG: 1448 optname = SO_DEBUG; 1449 break; 1450 case TARGET_SO_REUSEADDR: 1451 optname = SO_REUSEADDR; 1452 break; 1453 case TARGET_SO_TYPE: 1454 optname = SO_TYPE; 1455 break; 1456 case TARGET_SO_ERROR: 1457 optname = SO_ERROR; 1458 break; 1459 case TARGET_SO_DONTROUTE: 1460 optname = SO_DONTROUTE; 1461 break; 1462 case TARGET_SO_BROADCAST: 1463 optname = SO_BROADCAST; 1464 break; 1465 case TARGET_SO_SNDBUF: 1466 optname = SO_SNDBUF; 1467 break; 1468 case TARGET_SO_RCVBUF: 1469 optname = SO_RCVBUF; 1470 break; 1471 case TARGET_SO_KEEPALIVE: 1472 optname = SO_KEEPALIVE; 1473 break; 1474 case TARGET_SO_OOBINLINE: 1475 optname = SO_OOBINLINE; 1476 break; 1477 case TARGET_SO_NO_CHECK: 1478 optname = SO_NO_CHECK; 1479 break; 1480 case TARGET_SO_PRIORITY: 1481 optname = SO_PRIORITY; 1482 break; 1483 #ifdef SO_BSDCOMPAT 1484 case TARGET_SO_BSDCOMPAT: 1485 optname = SO_BSDCOMPAT; 1486 break; 1487 #endif 1488 case TARGET_SO_PASSCRED: 1489 optname = SO_PASSCRED; 1490 break; 1491 case TARGET_SO_TIMESTAMP: 1492 optname = SO_TIMESTAMP; 1493 break; 1494 case TARGET_SO_RCVLOWAT: 1495 optname = SO_RCVLOWAT; 1496 break; 1497 case TARGET_SO_RCVTIMEO: 1498 optname = SO_RCVTIMEO; 1499 break; 1500 case TARGET_SO_SNDTIMEO: 1501 optname = SO_SNDTIMEO; 1502 break; 1503 break; 1504 default: 1505 goto unimplemented; 1506 } 1507 if (optlen < sizeof(uint32_t)) 1508 return -TARGET_EINVAL; 1509 1510 if (get_user_u32(val, optval_addr)) 1511 return -TARGET_EFAULT; 1512 ret = get_errno(setsockopt(sockfd, SOL_SOCKET, optname, &val, sizeof(val))); 1513 break; 1514 default: 1515 unimplemented: 1516 gemu_log("Unsupported setsockopt level=%d optname=%d\n", level, optname); 1517 ret = -TARGET_ENOPROTOOPT; 1518 } 1519 return ret; 1520 } 1521 1522 /* do_getsockopt() Must return target values and target errnos. */ 1523 static abi_long do_getsockopt(int sockfd, int level, int optname, 1524 abi_ulong optval_addr, abi_ulong optlen) 1525 { 1526 abi_long ret; 1527 int len, val; 1528 socklen_t lv; 1529 1530 switch(level) { 1531 case TARGET_SOL_SOCKET: 1532 level = SOL_SOCKET; 1533 switch (optname) { 1534 /* These don't just return a single integer */ 1535 case TARGET_SO_LINGER: 1536 case TARGET_SO_RCVTIMEO: 1537 case TARGET_SO_SNDTIMEO: 1538 case TARGET_SO_PEERNAME: 1539 goto unimplemented; 1540 case TARGET_SO_PEERCRED: { 1541 struct ucred cr; 1542 socklen_t crlen; 1543 struct target_ucred *tcr; 1544 1545 if (get_user_u32(len, optlen)) { 1546 return -TARGET_EFAULT; 1547 } 1548 if (len < 0) { 1549 return -TARGET_EINVAL; 1550 } 1551 1552 crlen = sizeof(cr); 1553 ret = get_errno(getsockopt(sockfd, level, SO_PEERCRED, 1554 &cr, &crlen)); 1555 if (ret < 0) { 1556 return ret; 1557 } 1558 if (len > crlen) { 1559 len = crlen; 1560 } 1561 if (!lock_user_struct(VERIFY_WRITE, tcr, optval_addr, 0)) { 1562 return -TARGET_EFAULT; 1563 } 1564 __put_user(cr.pid, &tcr->pid); 1565 __put_user(cr.uid, &tcr->uid); 1566 __put_user(cr.gid, &tcr->gid); 1567 unlock_user_struct(tcr, optval_addr, 1); 1568 if (put_user_u32(len, optlen)) { 1569 return -TARGET_EFAULT; 1570 } 1571 break; 1572 } 1573 /* Options with 'int' argument. */ 1574 case TARGET_SO_DEBUG: 1575 optname = SO_DEBUG; 1576 goto int_case; 1577 case TARGET_SO_REUSEADDR: 1578 optname = SO_REUSEADDR; 1579 goto int_case; 1580 case TARGET_SO_TYPE: 1581 optname = SO_TYPE; 1582 goto int_case; 1583 case TARGET_SO_ERROR: 1584 optname = SO_ERROR; 1585 goto int_case; 1586 case TARGET_SO_DONTROUTE: 1587 optname = SO_DONTROUTE; 1588 goto int_case; 1589 case TARGET_SO_BROADCAST: 1590 optname = SO_BROADCAST; 1591 goto int_case; 1592 case TARGET_SO_SNDBUF: 1593 optname = SO_SNDBUF; 1594 goto int_case; 1595 case TARGET_SO_RCVBUF: 1596 optname = SO_RCVBUF; 1597 goto int_case; 1598 case TARGET_SO_KEEPALIVE: 1599 optname = SO_KEEPALIVE; 1600 goto int_case; 1601 case TARGET_SO_OOBINLINE: 1602 optname = SO_OOBINLINE; 1603 goto int_case; 1604 case TARGET_SO_NO_CHECK: 1605 optname = SO_NO_CHECK; 1606 goto int_case; 1607 case TARGET_SO_PRIORITY: 1608 optname = SO_PRIORITY; 1609 goto int_case; 1610 #ifdef SO_BSDCOMPAT 1611 case TARGET_SO_BSDCOMPAT: 1612 optname = SO_BSDCOMPAT; 1613 goto int_case; 1614 #endif 1615 case TARGET_SO_PASSCRED: 1616 optname = SO_PASSCRED; 1617 goto int_case; 1618 case TARGET_SO_TIMESTAMP: 1619 optname = SO_TIMESTAMP; 1620 goto int_case; 1621 case TARGET_SO_RCVLOWAT: 1622 optname = SO_RCVLOWAT; 1623 goto int_case; 1624 default: 1625 goto int_case; 1626 } 1627 break; 1628 case SOL_TCP: 1629 /* TCP options all take an 'int' value. */ 1630 int_case: 1631 if (get_user_u32(len, optlen)) 1632 return -TARGET_EFAULT; 1633 if (len < 0) 1634 return -TARGET_EINVAL; 1635 lv = sizeof(lv); 1636 ret = get_errno(getsockopt(sockfd, level, optname, &val, &lv)); 1637 if (ret < 0) 1638 return ret; 1639 if (len > lv) 1640 len = lv; 1641 if (len == 4) { 1642 if (put_user_u32(val, optval_addr)) 1643 return -TARGET_EFAULT; 1644 } else { 1645 if (put_user_u8(val, optval_addr)) 1646 return -TARGET_EFAULT; 1647 } 1648 if (put_user_u32(len, optlen)) 1649 return -TARGET_EFAULT; 1650 break; 1651 case SOL_IP: 1652 switch(optname) { 1653 case IP_TOS: 1654 case IP_TTL: 1655 case IP_HDRINCL: 1656 case IP_ROUTER_ALERT: 1657 case IP_RECVOPTS: 1658 case IP_RETOPTS: 1659 case IP_PKTINFO: 1660 case IP_MTU_DISCOVER: 1661 case IP_RECVERR: 1662 case IP_RECVTOS: 1663 #ifdef IP_FREEBIND 1664 case IP_FREEBIND: 1665 #endif 1666 case IP_MULTICAST_TTL: 1667 case IP_MULTICAST_LOOP: 1668 if (get_user_u32(len, optlen)) 1669 return -TARGET_EFAULT; 1670 if (len < 0) 1671 return -TARGET_EINVAL; 1672 lv = sizeof(lv); 1673 ret = get_errno(getsockopt(sockfd, level, optname, &val, &lv)); 1674 if (ret < 0) 1675 return ret; 1676 if (len < sizeof(int) && len > 0 && val >= 0 && val < 255) { 1677 len = 1; 1678 if (put_user_u32(len, optlen) 1679 || put_user_u8(val, optval_addr)) 1680 return -TARGET_EFAULT; 1681 } else { 1682 if (len > sizeof(int)) 1683 len = sizeof(int); 1684 if (put_user_u32(len, optlen) 1685 || put_user_u32(val, optval_addr)) 1686 return -TARGET_EFAULT; 1687 } 1688 break; 1689 default: 1690 ret = -TARGET_ENOPROTOOPT; 1691 break; 1692 } 1693 break; 1694 default: 1695 unimplemented: 1696 gemu_log("getsockopt level=%d optname=%d not yet supported\n", 1697 level, optname); 1698 ret = -TARGET_EOPNOTSUPP; 1699 break; 1700 } 1701 return ret; 1702 } 1703 1704 /* FIXME 1705 * lock_iovec()/unlock_iovec() have a return code of 0 for success where 1706 * other lock functions have a return code of 0 for failure. 1707 */ 1708 static abi_long lock_iovec(int type, struct iovec *vec, abi_ulong target_addr, 1709 int count, int copy) 1710 { 1711 struct target_iovec *target_vec; 1712 abi_ulong base; 1713 int i; 1714 1715 target_vec = lock_user(VERIFY_READ, target_addr, count * sizeof(struct target_iovec), 1); 1716 if (!target_vec) 1717 return -TARGET_EFAULT; 1718 for(i = 0;i < count; i++) { 1719 base = tswapal(target_vec[i].iov_base); 1720 vec[i].iov_len = tswapal(target_vec[i].iov_len); 1721 if (vec[i].iov_len != 0) { 1722 vec[i].iov_base = lock_user(type, base, vec[i].iov_len, copy); 1723 /* Don't check lock_user return value. We must call writev even 1724 if a element has invalid base address. */ 1725 } else { 1726 /* zero length pointer is ignored */ 1727 vec[i].iov_base = NULL; 1728 } 1729 } 1730 unlock_user (target_vec, target_addr, 0); 1731 return 0; 1732 } 1733 1734 static abi_long unlock_iovec(struct iovec *vec, abi_ulong target_addr, 1735 int count, int copy) 1736 { 1737 struct target_iovec *target_vec; 1738 abi_ulong base; 1739 int i; 1740 1741 target_vec = lock_user(VERIFY_READ, target_addr, count * sizeof(struct target_iovec), 1); 1742 if (!target_vec) 1743 return -TARGET_EFAULT; 1744 for(i = 0;i < count; i++) { 1745 if (target_vec[i].iov_base) { 1746 base = tswapal(target_vec[i].iov_base); 1747 unlock_user(vec[i].iov_base, base, copy ? vec[i].iov_len : 0); 1748 } 1749 } 1750 unlock_user (target_vec, target_addr, 0); 1751 1752 return 0; 1753 } 1754 1755 /* do_socket() Must return target values and target errnos. */ 1756 static abi_long do_socket(int domain, int type, int protocol) 1757 { 1758 #if defined(TARGET_MIPS) 1759 switch(type) { 1760 case TARGET_SOCK_DGRAM: 1761 type = SOCK_DGRAM; 1762 break; 1763 case TARGET_SOCK_STREAM: 1764 type = SOCK_STREAM; 1765 break; 1766 case TARGET_SOCK_RAW: 1767 type = SOCK_RAW; 1768 break; 1769 case TARGET_SOCK_RDM: 1770 type = SOCK_RDM; 1771 break; 1772 case TARGET_SOCK_SEQPACKET: 1773 type = SOCK_SEQPACKET; 1774 break; 1775 case TARGET_SOCK_PACKET: 1776 type = SOCK_PACKET; 1777 break; 1778 } 1779 #endif 1780 if (domain == PF_NETLINK) 1781 return -EAFNOSUPPORT; /* do not NETLINK socket connections possible */ 1782 return get_errno(socket(domain, type, protocol)); 1783 } 1784 1785 /* do_bind() Must return target values and target errnos. */ 1786 static abi_long do_bind(int sockfd, abi_ulong target_addr, 1787 socklen_t addrlen) 1788 { 1789 void *addr; 1790 abi_long ret; 1791 1792 if ((int)addrlen < 0) { 1793 return -TARGET_EINVAL; 1794 } 1795 1796 addr = alloca(addrlen+1); 1797 1798 ret = target_to_host_sockaddr(addr, target_addr, addrlen); 1799 if (ret) 1800 return ret; 1801 1802 return get_errno(bind(sockfd, addr, addrlen)); 1803 } 1804 1805 /* do_connect() Must return target values and target errnos. */ 1806 static abi_long do_connect(int sockfd, abi_ulong target_addr, 1807 socklen_t addrlen) 1808 { 1809 void *addr; 1810 abi_long ret; 1811 1812 if ((int)addrlen < 0) { 1813 return -TARGET_EINVAL; 1814 } 1815 1816 addr = alloca(addrlen); 1817 1818 ret = target_to_host_sockaddr(addr, target_addr, addrlen); 1819 if (ret) 1820 return ret; 1821 1822 return get_errno(connect(sockfd, addr, addrlen)); 1823 } 1824 1825 /* do_sendrecvmsg() Must return target values and target errnos. */ 1826 static abi_long do_sendrecvmsg(int fd, abi_ulong target_msg, 1827 int flags, int send) 1828 { 1829 abi_long ret, len; 1830 struct target_msghdr *msgp; 1831 struct msghdr msg; 1832 int count; 1833 struct iovec *vec; 1834 abi_ulong target_vec; 1835 1836 /* FIXME */ 1837 if (!lock_user_struct(send ? VERIFY_READ : VERIFY_WRITE, 1838 msgp, 1839 target_msg, 1840 send ? 1 : 0)) 1841 return -TARGET_EFAULT; 1842 if (msgp->msg_name) { 1843 msg.msg_namelen = tswap32(msgp->msg_namelen); 1844 msg.msg_name = alloca(msg.msg_namelen); 1845 ret = target_to_host_sockaddr(msg.msg_name, tswapal(msgp->msg_name), 1846 msg.msg_namelen); 1847 if (ret) { 1848 unlock_user_struct(msgp, target_msg, send ? 0 : 1); 1849 return ret; 1850 } 1851 } else { 1852 msg.msg_name = NULL; 1853 msg.msg_namelen = 0; 1854 } 1855 msg.msg_controllen = 2 * tswapal(msgp->msg_controllen); 1856 msg.msg_control = alloca(msg.msg_controllen); 1857 msg.msg_flags = tswap32(msgp->msg_flags); 1858 1859 count = tswapal(msgp->msg_iovlen); 1860 vec = alloca(count * sizeof(struct iovec)); 1861 target_vec = tswapal(msgp->msg_iov); 1862 lock_iovec(send ? VERIFY_READ : VERIFY_WRITE, vec, target_vec, count, send); 1863 msg.msg_iovlen = count; 1864 msg.msg_iov = vec; 1865 1866 if (send) { 1867 ret = target_to_host_cmsg(&msg, msgp); 1868 if (ret == 0) 1869 ret = get_errno(sendmsg(fd, &msg, flags)); 1870 } else { 1871 ret = get_errno(recvmsg(fd, &msg, flags)); 1872 if (!is_error(ret)) { 1873 len = ret; 1874 ret = host_to_target_cmsg(msgp, &msg); 1875 if (!is_error(ret)) 1876 ret = len; 1877 } 1878 } 1879 unlock_iovec(vec, target_vec, count, !send); 1880 unlock_user_struct(msgp, target_msg, send ? 0 : 1); 1881 return ret; 1882 } 1883 1884 /* do_accept() Must return target values and target errnos. */ 1885 static abi_long do_accept(int fd, abi_ulong target_addr, 1886 abi_ulong target_addrlen_addr) 1887 { 1888 socklen_t addrlen; 1889 void *addr; 1890 abi_long ret; 1891 1892 if (target_addr == 0) 1893 return get_errno(accept(fd, NULL, NULL)); 1894 1895 /* linux returns EINVAL if addrlen pointer is invalid */ 1896 if (get_user_u32(addrlen, target_addrlen_addr)) 1897 return -TARGET_EINVAL; 1898 1899 if ((int)addrlen < 0) { 1900 return -TARGET_EINVAL; 1901 } 1902 1903 if (!access_ok(VERIFY_WRITE, target_addr, addrlen)) 1904 return -TARGET_EINVAL; 1905 1906 addr = alloca(addrlen); 1907 1908 ret = get_errno(accept(fd, addr, &addrlen)); 1909 if (!is_error(ret)) { 1910 host_to_target_sockaddr(target_addr, addr, addrlen); 1911 if (put_user_u32(addrlen, target_addrlen_addr)) 1912 ret = -TARGET_EFAULT; 1913 } 1914 return ret; 1915 } 1916 1917 /* do_getpeername() Must return target values and target errnos. */ 1918 static abi_long do_getpeername(int fd, abi_ulong target_addr, 1919 abi_ulong target_addrlen_addr) 1920 { 1921 socklen_t addrlen; 1922 void *addr; 1923 abi_long ret; 1924 1925 if (get_user_u32(addrlen, target_addrlen_addr)) 1926 return -TARGET_EFAULT; 1927 1928 if ((int)addrlen < 0) { 1929 return -TARGET_EINVAL; 1930 } 1931 1932 if (!access_ok(VERIFY_WRITE, target_addr, addrlen)) 1933 return -TARGET_EFAULT; 1934 1935 addr = alloca(addrlen); 1936 1937 ret = get_errno(getpeername(fd, addr, &addrlen)); 1938 if (!is_error(ret)) { 1939 host_to_target_sockaddr(target_addr, addr, addrlen); 1940 if (put_user_u32(addrlen, target_addrlen_addr)) 1941 ret = -TARGET_EFAULT; 1942 } 1943 return ret; 1944 } 1945 1946 /* do_getsockname() Must return target values and target errnos. */ 1947 static abi_long do_getsockname(int fd, abi_ulong target_addr, 1948 abi_ulong target_addrlen_addr) 1949 { 1950 socklen_t addrlen; 1951 void *addr; 1952 abi_long ret; 1953 1954 if (get_user_u32(addrlen, target_addrlen_addr)) 1955 return -TARGET_EFAULT; 1956 1957 if ((int)addrlen < 0) { 1958 return -TARGET_EINVAL; 1959 } 1960 1961 if (!access_ok(VERIFY_WRITE, target_addr, addrlen)) 1962 return -TARGET_EFAULT; 1963 1964 addr = alloca(addrlen); 1965 1966 ret = get_errno(getsockname(fd, addr, &addrlen)); 1967 if (!is_error(ret)) { 1968 host_to_target_sockaddr(target_addr, addr, addrlen); 1969 if (put_user_u32(addrlen, target_addrlen_addr)) 1970 ret = -TARGET_EFAULT; 1971 } 1972 return ret; 1973 } 1974 1975 /* do_socketpair() Must return target values and target errnos. */ 1976 static abi_long do_socketpair(int domain, int type, int protocol, 1977 abi_ulong target_tab_addr) 1978 { 1979 int tab[2]; 1980 abi_long ret; 1981 1982 ret = get_errno(socketpair(domain, type, protocol, tab)); 1983 if (!is_error(ret)) { 1984 if (put_user_s32(tab[0], target_tab_addr) 1985 || put_user_s32(tab[1], target_tab_addr + sizeof(tab[0]))) 1986 ret = -TARGET_EFAULT; 1987 } 1988 return ret; 1989 } 1990 1991 /* do_sendto() Must return target values and target errnos. */ 1992 static abi_long do_sendto(int fd, abi_ulong msg, size_t len, int flags, 1993 abi_ulong target_addr, socklen_t addrlen) 1994 { 1995 void *addr; 1996 void *host_msg; 1997 abi_long ret; 1998 1999 if ((int)addrlen < 0) { 2000 return -TARGET_EINVAL; 2001 } 2002 2003 host_msg = lock_user(VERIFY_READ, msg, len, 1); 2004 if (!host_msg) 2005 return -TARGET_EFAULT; 2006 if (target_addr) { 2007 addr = alloca(addrlen); 2008 ret = target_to_host_sockaddr(addr, target_addr, addrlen); 2009 if (ret) { 2010 unlock_user(host_msg, msg, 0); 2011 return ret; 2012 } 2013 ret = get_errno(sendto(fd, host_msg, len, flags, addr, addrlen)); 2014 } else { 2015 ret = get_errno(send(fd, host_msg, len, flags)); 2016 } 2017 unlock_user(host_msg, msg, 0); 2018 return ret; 2019 } 2020 2021 /* do_recvfrom() Must return target values and target errnos. */ 2022 static abi_long do_recvfrom(int fd, abi_ulong msg, size_t len, int flags, 2023 abi_ulong target_addr, 2024 abi_ulong target_addrlen) 2025 { 2026 socklen_t addrlen; 2027 void *addr; 2028 void *host_msg; 2029 abi_long ret; 2030 2031 host_msg = lock_user(VERIFY_WRITE, msg, len, 0); 2032 if (!host_msg) 2033 return -TARGET_EFAULT; 2034 if (target_addr) { 2035 if (get_user_u32(addrlen, target_addrlen)) { 2036 ret = -TARGET_EFAULT; 2037 goto fail; 2038 } 2039 if ((int)addrlen < 0) { 2040 ret = -TARGET_EINVAL; 2041 goto fail; 2042 } 2043 addr = alloca(addrlen); 2044 ret = get_errno(recvfrom(fd, host_msg, len, flags, addr, &addrlen)); 2045 } else { 2046 addr = NULL; /* To keep compiler quiet. */ 2047 ret = get_errno(qemu_recv(fd, host_msg, len, flags)); 2048 } 2049 if (!is_error(ret)) { 2050 if (target_addr) { 2051 host_to_target_sockaddr(target_addr, addr, addrlen); 2052 if (put_user_u32(addrlen, target_addrlen)) { 2053 ret = -TARGET_EFAULT; 2054 goto fail; 2055 } 2056 } 2057 unlock_user(host_msg, msg, len); 2058 } else { 2059 fail: 2060 unlock_user(host_msg, msg, 0); 2061 } 2062 return ret; 2063 } 2064 2065 #ifdef TARGET_NR_socketcall 2066 /* do_socketcall() Must return target values and target errnos. */ 2067 static abi_long do_socketcall(int num, abi_ulong vptr) 2068 { 2069 abi_long ret; 2070 const int n = sizeof(abi_ulong); 2071 2072 switch(num) { 2073 case SOCKOP_socket: 2074 { 2075 abi_ulong domain, type, protocol; 2076 2077 if (get_user_ual(domain, vptr) 2078 || get_user_ual(type, vptr + n) 2079 || get_user_ual(protocol, vptr + 2 * n)) 2080 return -TARGET_EFAULT; 2081 2082 ret = do_socket(domain, type, protocol); 2083 } 2084 break; 2085 case SOCKOP_bind: 2086 { 2087 abi_ulong sockfd; 2088 abi_ulong target_addr; 2089 socklen_t addrlen; 2090 2091 if (get_user_ual(sockfd, vptr) 2092 || get_user_ual(target_addr, vptr + n) 2093 || get_user_ual(addrlen, vptr + 2 * n)) 2094 return -TARGET_EFAULT; 2095 2096 ret = do_bind(sockfd, target_addr, addrlen); 2097 } 2098 break; 2099 case SOCKOP_connect: 2100 { 2101 abi_ulong sockfd; 2102 abi_ulong target_addr; 2103 socklen_t addrlen; 2104 2105 if (get_user_ual(sockfd, vptr) 2106 || get_user_ual(target_addr, vptr + n) 2107 || get_user_ual(addrlen, vptr + 2 * n)) 2108 return -TARGET_EFAULT; 2109 2110 ret = do_connect(sockfd, target_addr, addrlen); 2111 } 2112 break; 2113 case SOCKOP_listen: 2114 { 2115 abi_ulong sockfd, backlog; 2116 2117 if (get_user_ual(sockfd, vptr) 2118 || get_user_ual(backlog, vptr + n)) 2119 return -TARGET_EFAULT; 2120 2121 ret = get_errno(listen(sockfd, backlog)); 2122 } 2123 break; 2124 case SOCKOP_accept: 2125 { 2126 abi_ulong sockfd; 2127 abi_ulong target_addr, target_addrlen; 2128 2129 if (get_user_ual(sockfd, vptr) 2130 || get_user_ual(target_addr, vptr + n) 2131 || get_user_ual(target_addrlen, vptr + 2 * n)) 2132 return -TARGET_EFAULT; 2133 2134 ret = do_accept(sockfd, target_addr, target_addrlen); 2135 } 2136 break; 2137 case SOCKOP_getsockname: 2138 { 2139 abi_ulong sockfd; 2140 abi_ulong target_addr, target_addrlen; 2141 2142 if (get_user_ual(sockfd, vptr) 2143 || get_user_ual(target_addr, vptr + n) 2144 || get_user_ual(target_addrlen, vptr + 2 * n)) 2145 return -TARGET_EFAULT; 2146 2147 ret = do_getsockname(sockfd, target_addr, target_addrlen); 2148 } 2149 break; 2150 case SOCKOP_getpeername: 2151 { 2152 abi_ulong sockfd; 2153 abi_ulong target_addr, target_addrlen; 2154 2155 if (get_user_ual(sockfd, vptr) 2156 || get_user_ual(target_addr, vptr + n) 2157 || get_user_ual(target_addrlen, vptr + 2 * n)) 2158 return -TARGET_EFAULT; 2159 2160 ret = do_getpeername(sockfd, target_addr, target_addrlen); 2161 } 2162 break; 2163 case SOCKOP_socketpair: 2164 { 2165 abi_ulong domain, type, protocol; 2166 abi_ulong tab; 2167 2168 if (get_user_ual(domain, vptr) 2169 || get_user_ual(type, vptr + n) 2170 || get_user_ual(protocol, vptr + 2 * n) 2171 || get_user_ual(tab, vptr + 3 * n)) 2172 return -TARGET_EFAULT; 2173 2174 ret = do_socketpair(domain, type, protocol, tab); 2175 } 2176 break; 2177 case SOCKOP_send: 2178 { 2179 abi_ulong sockfd; 2180 abi_ulong msg; 2181 size_t len; 2182 abi_ulong flags; 2183 2184 if (get_user_ual(sockfd, vptr) 2185 || get_user_ual(msg, vptr + n) 2186 || get_user_ual(len, vptr + 2 * n) 2187 || get_user_ual(flags, vptr + 3 * n)) 2188 return -TARGET_EFAULT; 2189 2190 ret = do_sendto(sockfd, msg, len, flags, 0, 0); 2191 } 2192 break; 2193 case SOCKOP_recv: 2194 { 2195 abi_ulong sockfd; 2196 abi_ulong msg; 2197 size_t len; 2198 abi_ulong flags; 2199 2200 if (get_user_ual(sockfd, vptr) 2201 || get_user_ual(msg, vptr + n) 2202 || get_user_ual(len, vptr + 2 * n) 2203 || get_user_ual(flags, vptr + 3 * n)) 2204 return -TARGET_EFAULT; 2205 2206 ret = do_recvfrom(sockfd, msg, len, flags, 0, 0); 2207 } 2208 break; 2209 case SOCKOP_sendto: 2210 { 2211 abi_ulong sockfd; 2212 abi_ulong msg; 2213 size_t len; 2214 abi_ulong flags; 2215 abi_ulong addr; 2216 socklen_t addrlen; 2217 2218 if (get_user_ual(sockfd, vptr) 2219 || get_user_ual(msg, vptr + n) 2220 || get_user_ual(len, vptr + 2 * n) 2221 || get_user_ual(flags, vptr + 3 * n) 2222 || get_user_ual(addr, vptr + 4 * n) 2223 || get_user_ual(addrlen, vptr + 5 * n)) 2224 return -TARGET_EFAULT; 2225 2226 ret = do_sendto(sockfd, msg, len, flags, addr, addrlen); 2227 } 2228 break; 2229 case SOCKOP_recvfrom: 2230 { 2231 abi_ulong sockfd; 2232 abi_ulong msg; 2233 size_t len; 2234 abi_ulong flags; 2235 abi_ulong addr; 2236 socklen_t addrlen; 2237 2238 if (get_user_ual(sockfd, vptr) 2239 || get_user_ual(msg, vptr + n) 2240 || get_user_ual(len, vptr + 2 * n) 2241 || get_user_ual(flags, vptr + 3 * n) 2242 || get_user_ual(addr, vptr + 4 * n) 2243 || get_user_ual(addrlen, vptr + 5 * n)) 2244 return -TARGET_EFAULT; 2245 2246 ret = do_recvfrom(sockfd, msg, len, flags, addr, addrlen); 2247 } 2248 break; 2249 case SOCKOP_shutdown: 2250 { 2251 abi_ulong sockfd, how; 2252 2253 if (get_user_ual(sockfd, vptr) 2254 || get_user_ual(how, vptr + n)) 2255 return -TARGET_EFAULT; 2256 2257 ret = get_errno(shutdown(sockfd, how)); 2258 } 2259 break; 2260 case SOCKOP_sendmsg: 2261 case SOCKOP_recvmsg: 2262 { 2263 abi_ulong fd; 2264 abi_ulong target_msg; 2265 abi_ulong flags; 2266 2267 if (get_user_ual(fd, vptr) 2268 || get_user_ual(target_msg, vptr + n) 2269 || get_user_ual(flags, vptr + 2 * n)) 2270 return -TARGET_EFAULT; 2271 2272 ret = do_sendrecvmsg(fd, target_msg, flags, 2273 (num == SOCKOP_sendmsg)); 2274 } 2275 break; 2276 case SOCKOP_setsockopt: 2277 { 2278 abi_ulong sockfd; 2279 abi_ulong level; 2280 abi_ulong optname; 2281 abi_ulong optval; 2282 socklen_t optlen; 2283 2284 if (get_user_ual(sockfd, vptr) 2285 || get_user_ual(level, vptr + n) 2286 || get_user_ual(optname, vptr + 2 * n) 2287 || get_user_ual(optval, vptr + 3 * n) 2288 || get_user_ual(optlen, vptr + 4 * n)) 2289 return -TARGET_EFAULT; 2290 2291 ret = do_setsockopt(sockfd, level, optname, optval, optlen); 2292 } 2293 break; 2294 case SOCKOP_getsockopt: 2295 { 2296 abi_ulong sockfd; 2297 abi_ulong level; 2298 abi_ulong optname; 2299 abi_ulong optval; 2300 socklen_t optlen; 2301 2302 if (get_user_ual(sockfd, vptr) 2303 || get_user_ual(level, vptr + n) 2304 || get_user_ual(optname, vptr + 2 * n) 2305 || get_user_ual(optval, vptr + 3 * n) 2306 || get_user_ual(optlen, vptr + 4 * n)) 2307 return -TARGET_EFAULT; 2308 2309 ret = do_getsockopt(sockfd, level, optname, optval, optlen); 2310 } 2311 break; 2312 default: 2313 gemu_log("Unsupported socketcall: %d\n", num); 2314 ret = -TARGET_ENOSYS; 2315 break; 2316 } 2317 return ret; 2318 } 2319 #endif 2320 2321 #define N_SHM_REGIONS 32 2322 2323 static struct shm_region { 2324 abi_ulong start; 2325 abi_ulong size; 2326 } shm_regions[N_SHM_REGIONS]; 2327 2328 struct target_ipc_perm 2329 { 2330 abi_long __key; 2331 abi_ulong uid; 2332 abi_ulong gid; 2333 abi_ulong cuid; 2334 abi_ulong cgid; 2335 unsigned short int mode; 2336 unsigned short int __pad1; 2337 unsigned short int __seq; 2338 unsigned short int __pad2; 2339 abi_ulong __unused1; 2340 abi_ulong __unused2; 2341 }; 2342 2343 struct target_semid_ds 2344 { 2345 struct target_ipc_perm sem_perm; 2346 abi_ulong sem_otime; 2347 abi_ulong __unused1; 2348 abi_ulong sem_ctime; 2349 abi_ulong __unused2; 2350 abi_ulong sem_nsems; 2351 abi_ulong __unused3; 2352 abi_ulong __unused4; 2353 }; 2354 2355 static inline abi_long target_to_host_ipc_perm(struct ipc_perm *host_ip, 2356 abi_ulong target_addr) 2357 { 2358 struct target_ipc_perm *target_ip; 2359 struct target_semid_ds *target_sd; 2360 2361 if (!lock_user_struct(VERIFY_READ, target_sd, target_addr, 1)) 2362 return -TARGET_EFAULT; 2363 target_ip = &(target_sd->sem_perm); 2364 host_ip->__key = tswapal(target_ip->__key); 2365 host_ip->uid = tswapal(target_ip->uid); 2366 host_ip->gid = tswapal(target_ip->gid); 2367 host_ip->cuid = tswapal(target_ip->cuid); 2368 host_ip->cgid = tswapal(target_ip->cgid); 2369 host_ip->mode = tswap16(target_ip->mode); 2370 unlock_user_struct(target_sd, target_addr, 0); 2371 return 0; 2372 } 2373 2374 static inline abi_long host_to_target_ipc_perm(abi_ulong target_addr, 2375 struct ipc_perm *host_ip) 2376 { 2377 struct target_ipc_perm *target_ip; 2378 struct target_semid_ds *target_sd; 2379 2380 if (!lock_user_struct(VERIFY_WRITE, target_sd, target_addr, 0)) 2381 return -TARGET_EFAULT; 2382 target_ip = &(target_sd->sem_perm); 2383 target_ip->__key = tswapal(host_ip->__key); 2384 target_ip->uid = tswapal(host_ip->uid); 2385 target_ip->gid = tswapal(host_ip->gid); 2386 target_ip->cuid = tswapal(host_ip->cuid); 2387 target_ip->cgid = tswapal(host_ip->cgid); 2388 target_ip->mode = tswap16(host_ip->mode); 2389 unlock_user_struct(target_sd, target_addr, 1); 2390 return 0; 2391 } 2392 2393 static inline abi_long target_to_host_semid_ds(struct semid_ds *host_sd, 2394 abi_ulong target_addr) 2395 { 2396 struct target_semid_ds *target_sd; 2397 2398 if (!lock_user_struct(VERIFY_READ, target_sd, target_addr, 1)) 2399 return -TARGET_EFAULT; 2400 if (target_to_host_ipc_perm(&(host_sd->sem_perm),target_addr)) 2401 return -TARGET_EFAULT; 2402 host_sd->sem_nsems = tswapal(target_sd->sem_nsems); 2403 host_sd->sem_otime = tswapal(target_sd->sem_otime); 2404 host_sd->sem_ctime = tswapal(target_sd->sem_ctime); 2405 unlock_user_struct(target_sd, target_addr, 0); 2406 return 0; 2407 } 2408 2409 static inline abi_long host_to_target_semid_ds(abi_ulong target_addr, 2410 struct semid_ds *host_sd) 2411 { 2412 struct target_semid_ds *target_sd; 2413 2414 if (!lock_user_struct(VERIFY_WRITE, target_sd, target_addr, 0)) 2415 return -TARGET_EFAULT; 2416 if (host_to_target_ipc_perm(target_addr,&(host_sd->sem_perm))) 2417 return -TARGET_EFAULT; 2418 target_sd->sem_nsems = tswapal(host_sd->sem_nsems); 2419 target_sd->sem_otime = tswapal(host_sd->sem_otime); 2420 target_sd->sem_ctime = tswapal(host_sd->sem_ctime); 2421 unlock_user_struct(target_sd, target_addr, 1); 2422 return 0; 2423 } 2424 2425 struct target_seminfo { 2426 int semmap; 2427 int semmni; 2428 int semmns; 2429 int semmnu; 2430 int semmsl; 2431 int semopm; 2432 int semume; 2433 int semusz; 2434 int semvmx; 2435 int semaem; 2436 }; 2437 2438 static inline abi_long host_to_target_seminfo(abi_ulong target_addr, 2439 struct seminfo *host_seminfo) 2440 { 2441 struct target_seminfo *target_seminfo; 2442 if (!lock_user_struct(VERIFY_WRITE, target_seminfo, target_addr, 0)) 2443 return -TARGET_EFAULT; 2444 __put_user(host_seminfo->semmap, &target_seminfo->semmap); 2445 __put_user(host_seminfo->semmni, &target_seminfo->semmni); 2446 __put_user(host_seminfo->semmns, &target_seminfo->semmns); 2447 __put_user(host_seminfo->semmnu, &target_seminfo->semmnu); 2448 __put_user(host_seminfo->semmsl, &target_seminfo->semmsl); 2449 __put_user(host_seminfo->semopm, &target_seminfo->semopm); 2450 __put_user(host_seminfo->semume, &target_seminfo->semume); 2451 __put_user(host_seminfo->semusz, &target_seminfo->semusz); 2452 __put_user(host_seminfo->semvmx, &target_seminfo->semvmx); 2453 __put_user(host_seminfo->semaem, &target_seminfo->semaem); 2454 unlock_user_struct(target_seminfo, target_addr, 1); 2455 return 0; 2456 } 2457 2458 union semun { 2459 int val; 2460 struct semid_ds *buf; 2461 unsigned short *array; 2462 struct seminfo *__buf; 2463 }; 2464 2465 union target_semun { 2466 int val; 2467 abi_ulong buf; 2468 abi_ulong array; 2469 abi_ulong __buf; 2470 }; 2471 2472 static inline abi_long target_to_host_semarray(int semid, unsigned short **host_array, 2473 abi_ulong target_addr) 2474 { 2475 int nsems; 2476 unsigned short *array; 2477 union semun semun; 2478 struct semid_ds semid_ds; 2479 int i, ret; 2480 2481 semun.buf = &semid_ds; 2482 2483 ret = semctl(semid, 0, IPC_STAT, semun); 2484 if (ret == -1) 2485 return get_errno(ret); 2486 2487 nsems = semid_ds.sem_nsems; 2488 2489 *host_array = malloc(nsems*sizeof(unsigned short)); 2490 array = lock_user(VERIFY_READ, target_addr, 2491 nsems*sizeof(unsigned short), 1); 2492 if (!array) 2493 return -TARGET_EFAULT; 2494 2495 for(i=0; i<nsems; i++) { 2496 __get_user((*host_array)[i], &array[i]); 2497 } 2498 unlock_user(array, target_addr, 0); 2499 2500 return 0; 2501 } 2502 2503 static inline abi_long host_to_target_semarray(int semid, abi_ulong target_addr, 2504 unsigned short **host_array) 2505 { 2506 int nsems; 2507 unsigned short *array; 2508 union semun semun; 2509 struct semid_ds semid_ds; 2510 int i, ret; 2511 2512 semun.buf = &semid_ds; 2513 2514 ret = semctl(semid, 0, IPC_STAT, semun); 2515 if (ret == -1) 2516 return get_errno(ret); 2517 2518 nsems = semid_ds.sem_nsems; 2519 2520 array = lock_user(VERIFY_WRITE, target_addr, 2521 nsems*sizeof(unsigned short), 0); 2522 if (!array) 2523 return -TARGET_EFAULT; 2524 2525 for(i=0; i<nsems; i++) { 2526 __put_user((*host_array)[i], &array[i]); 2527 } 2528 free(*host_array); 2529 unlock_user(array, target_addr, 1); 2530 2531 return 0; 2532 } 2533 2534 static inline abi_long do_semctl(int semid, int semnum, int cmd, 2535 union target_semun target_su) 2536 { 2537 union semun arg; 2538 struct semid_ds dsarg; 2539 unsigned short *array = NULL; 2540 struct seminfo seminfo; 2541 abi_long ret = -TARGET_EINVAL; 2542 abi_long err; 2543 cmd &= 0xff; 2544 2545 switch( cmd ) { 2546 case GETVAL: 2547 case SETVAL: 2548 arg.val = tswap32(target_su.val); 2549 ret = get_errno(semctl(semid, semnum, cmd, arg)); 2550 target_su.val = tswap32(arg.val); 2551 break; 2552 case GETALL: 2553 case SETALL: 2554 err = target_to_host_semarray(semid, &array, target_su.array); 2555 if (err) 2556 return err; 2557 arg.array = array; 2558 ret = get_errno(semctl(semid, semnum, cmd, arg)); 2559 err = host_to_target_semarray(semid, target_su.array, &array); 2560 if (err) 2561 return err; 2562 break; 2563 case IPC_STAT: 2564 case IPC_SET: 2565 case SEM_STAT: 2566 err = target_to_host_semid_ds(&dsarg, target_su.buf); 2567 if (err) 2568 return err; 2569 arg.buf = &dsarg; 2570 ret = get_errno(semctl(semid, semnum, cmd, arg)); 2571 err = host_to_target_semid_ds(target_su.buf, &dsarg); 2572 if (err) 2573 return err; 2574 break; 2575 case IPC_INFO: 2576 case SEM_INFO: 2577 arg.__buf = &seminfo; 2578 ret = get_errno(semctl(semid, semnum, cmd, arg)); 2579 err = host_to_target_seminfo(target_su.__buf, &seminfo); 2580 if (err) 2581 return err; 2582 break; 2583 case IPC_RMID: 2584 case GETPID: 2585 case GETNCNT: 2586 case GETZCNT: 2587 ret = get_errno(semctl(semid, semnum, cmd, NULL)); 2588 break; 2589 } 2590 2591 return ret; 2592 } 2593 2594 struct target_sembuf { 2595 unsigned short sem_num; 2596 short sem_op; 2597 short sem_flg; 2598 }; 2599 2600 static inline abi_long target_to_host_sembuf(struct sembuf *host_sembuf, 2601 abi_ulong target_addr, 2602 unsigned nsops) 2603 { 2604 struct target_sembuf *target_sembuf; 2605 int i; 2606 2607 target_sembuf = lock_user(VERIFY_READ, target_addr, 2608 nsops*sizeof(struct target_sembuf), 1); 2609 if (!target_sembuf) 2610 return -TARGET_EFAULT; 2611 2612 for(i=0; i<nsops; i++) { 2613 __get_user(host_sembuf[i].sem_num, &target_sembuf[i].sem_num); 2614 __get_user(host_sembuf[i].sem_op, &target_sembuf[i].sem_op); 2615 __get_user(host_sembuf[i].sem_flg, &target_sembuf[i].sem_flg); 2616 } 2617 2618 unlock_user(target_sembuf, target_addr, 0); 2619 2620 return 0; 2621 } 2622 2623 static inline abi_long do_semop(int semid, abi_long ptr, unsigned nsops) 2624 { 2625 struct sembuf sops[nsops]; 2626 2627 if (target_to_host_sembuf(sops, ptr, nsops)) 2628 return -TARGET_EFAULT; 2629 2630 return semop(semid, sops, nsops); 2631 } 2632 2633 struct target_msqid_ds 2634 { 2635 struct target_ipc_perm msg_perm; 2636 abi_ulong msg_stime; 2637 #if TARGET_ABI_BITS == 32 2638 abi_ulong __unused1; 2639 #endif 2640 abi_ulong msg_rtime; 2641 #if TARGET_ABI_BITS == 32 2642 abi_ulong __unused2; 2643 #endif 2644 abi_ulong msg_ctime; 2645 #if TARGET_ABI_BITS == 32 2646 abi_ulong __unused3; 2647 #endif 2648 abi_ulong __msg_cbytes; 2649 abi_ulong msg_qnum; 2650 abi_ulong msg_qbytes; 2651 abi_ulong msg_lspid; 2652 abi_ulong msg_lrpid; 2653 abi_ulong __unused4; 2654 abi_ulong __unused5; 2655 }; 2656 2657 static inline abi_long target_to_host_msqid_ds(struct msqid_ds *host_md, 2658 abi_ulong target_addr) 2659 { 2660 struct target_msqid_ds *target_md; 2661 2662 if (!lock_user_struct(VERIFY_READ, target_md, target_addr, 1)) 2663 return -TARGET_EFAULT; 2664 if (target_to_host_ipc_perm(&(host_md->msg_perm),target_addr)) 2665 return -TARGET_EFAULT; 2666 host_md->msg_stime = tswapal(target_md->msg_stime); 2667 host_md->msg_rtime = tswapal(target_md->msg_rtime); 2668 host_md->msg_ctime = tswapal(target_md->msg_ctime); 2669 host_md->__msg_cbytes = tswapal(target_md->__msg_cbytes); 2670 host_md->msg_qnum = tswapal(target_md->msg_qnum); 2671 host_md->msg_qbytes = tswapal(target_md->msg_qbytes); 2672 host_md->msg_lspid = tswapal(target_md->msg_lspid); 2673 host_md->msg_lrpid = tswapal(target_md->msg_lrpid); 2674 unlock_user_struct(target_md, target_addr, 0); 2675 return 0; 2676 } 2677 2678 static inline abi_long host_to_target_msqid_ds(abi_ulong target_addr, 2679 struct msqid_ds *host_md) 2680 { 2681 struct target_msqid_ds *target_md; 2682 2683 if (!lock_user_struct(VERIFY_WRITE, target_md, target_addr, 0)) 2684 return -TARGET_EFAULT; 2685 if (host_to_target_ipc_perm(target_addr,&(host_md->msg_perm))) 2686 return -TARGET_EFAULT; 2687 target_md->msg_stime = tswapal(host_md->msg_stime); 2688 target_md->msg_rtime = tswapal(host_md->msg_rtime); 2689 target_md->msg_ctime = tswapal(host_md->msg_ctime); 2690 target_md->__msg_cbytes = tswapal(host_md->__msg_cbytes); 2691 target_md->msg_qnum = tswapal(host_md->msg_qnum); 2692 target_md->msg_qbytes = tswapal(host_md->msg_qbytes); 2693 target_md->msg_lspid = tswapal(host_md->msg_lspid); 2694 target_md->msg_lrpid = tswapal(host_md->msg_lrpid); 2695 unlock_user_struct(target_md, target_addr, 1); 2696 return 0; 2697 } 2698 2699 struct target_msginfo { 2700 int msgpool; 2701 int msgmap; 2702 int msgmax; 2703 int msgmnb; 2704 int msgmni; 2705 int msgssz; 2706 int msgtql; 2707 unsigned short int msgseg; 2708 }; 2709 2710 static inline abi_long host_to_target_msginfo(abi_ulong target_addr, 2711 struct msginfo *host_msginfo) 2712 { 2713 struct target_msginfo *target_msginfo; 2714 if (!lock_user_struct(VERIFY_WRITE, target_msginfo, target_addr, 0)) 2715 return -TARGET_EFAULT; 2716 __put_user(host_msginfo->msgpool, &target_msginfo->msgpool); 2717 __put_user(host_msginfo->msgmap, &target_msginfo->msgmap); 2718 __put_user(host_msginfo->msgmax, &target_msginfo->msgmax); 2719 __put_user(host_msginfo->msgmnb, &target_msginfo->msgmnb); 2720 __put_user(host_msginfo->msgmni, &target_msginfo->msgmni); 2721 __put_user(host_msginfo->msgssz, &target_msginfo->msgssz); 2722 __put_user(host_msginfo->msgtql, &target_msginfo->msgtql); 2723 __put_user(host_msginfo->msgseg, &target_msginfo->msgseg); 2724 unlock_user_struct(target_msginfo, target_addr, 1); 2725 return 0; 2726 } 2727 2728 static inline abi_long do_msgctl(int msgid, int cmd, abi_long ptr) 2729 { 2730 struct msqid_ds dsarg; 2731 struct msginfo msginfo; 2732 abi_long ret = -TARGET_EINVAL; 2733 2734 cmd &= 0xff; 2735 2736 switch (cmd) { 2737 case IPC_STAT: 2738 case IPC_SET: 2739 case MSG_STAT: 2740 if (target_to_host_msqid_ds(&dsarg,ptr)) 2741 return -TARGET_EFAULT; 2742 ret = get_errno(msgctl(msgid, cmd, &dsarg)); 2743 if (host_to_target_msqid_ds(ptr,&dsarg)) 2744 return -TARGET_EFAULT; 2745 break; 2746 case IPC_RMID: 2747 ret = get_errno(msgctl(msgid, cmd, NULL)); 2748 break; 2749 case IPC_INFO: 2750 case MSG_INFO: 2751 ret = get_errno(msgctl(msgid, cmd, (struct msqid_ds *)&msginfo)); 2752 if (host_to_target_msginfo(ptr, &msginfo)) 2753 return -TARGET_EFAULT; 2754 break; 2755 } 2756 2757 return ret; 2758 } 2759 2760 struct target_msgbuf { 2761 abi_long mtype; 2762 char mtext[1]; 2763 }; 2764 2765 static inline abi_long do_msgsnd(int msqid, abi_long msgp, 2766 unsigned int msgsz, int msgflg) 2767 { 2768 struct target_msgbuf *target_mb; 2769 struct msgbuf *host_mb; 2770 abi_long ret = 0; 2771 2772 if (!lock_user_struct(VERIFY_READ, target_mb, msgp, 0)) 2773 return -TARGET_EFAULT; 2774 host_mb = malloc(msgsz+sizeof(long)); 2775 host_mb->mtype = (abi_long) tswapal(target_mb->mtype); 2776 memcpy(host_mb->mtext, target_mb->mtext, msgsz); 2777 ret = get_errno(msgsnd(msqid, host_mb, msgsz, msgflg)); 2778 free(host_mb); 2779 unlock_user_struct(target_mb, msgp, 0); 2780 2781 return ret; 2782 } 2783 2784 static inline abi_long do_msgrcv(int msqid, abi_long msgp, 2785 unsigned int msgsz, abi_long msgtyp, 2786 int msgflg) 2787 { 2788 struct target_msgbuf *target_mb; 2789 char *target_mtext; 2790 struct msgbuf *host_mb; 2791 abi_long ret = 0; 2792 2793 if (!lock_user_struct(VERIFY_WRITE, target_mb, msgp, 0)) 2794 return -TARGET_EFAULT; 2795 2796 host_mb = malloc(msgsz+sizeof(long)); 2797 ret = get_errno(msgrcv(msqid, host_mb, msgsz, tswapal(msgtyp), msgflg)); 2798 2799 if (ret > 0) { 2800 abi_ulong target_mtext_addr = msgp + sizeof(abi_ulong); 2801 target_mtext = lock_user(VERIFY_WRITE, target_mtext_addr, ret, 0); 2802 if (!target_mtext) { 2803 ret = -TARGET_EFAULT; 2804 goto end; 2805 } 2806 memcpy(target_mb->mtext, host_mb->mtext, ret); 2807 unlock_user(target_mtext, target_mtext_addr, ret); 2808 } 2809 2810 target_mb->mtype = tswapal(host_mb->mtype); 2811 free(host_mb); 2812 2813 end: 2814 if (target_mb) 2815 unlock_user_struct(target_mb, msgp, 1); 2816 return ret; 2817 } 2818 2819 struct target_shmid_ds 2820 { 2821 struct target_ipc_perm shm_perm; 2822 abi_ulong shm_segsz; 2823 abi_ulong shm_atime; 2824 #if TARGET_ABI_BITS == 32 2825 abi_ulong __unused1; 2826 #endif 2827 abi_ulong shm_dtime; 2828 #if TARGET_ABI_BITS == 32 2829 abi_ulong __unused2; 2830 #endif 2831 abi_ulong shm_ctime; 2832 #if TARGET_ABI_BITS == 32 2833 abi_ulong __unused3; 2834 #endif 2835 int shm_cpid; 2836 int shm_lpid; 2837 abi_ulong shm_nattch; 2838 unsigned long int __unused4; 2839 unsigned long int __unused5; 2840 }; 2841 2842 static inline abi_long target_to_host_shmid_ds(struct shmid_ds *host_sd, 2843 abi_ulong target_addr) 2844 { 2845 struct target_shmid_ds *target_sd; 2846 2847 if (!lock_user_struct(VERIFY_READ, target_sd, target_addr, 1)) 2848 return -TARGET_EFAULT; 2849 if (target_to_host_ipc_perm(&(host_sd->shm_perm), target_addr)) 2850 return -TARGET_EFAULT; 2851 __get_user(host_sd->shm_segsz, &target_sd->shm_segsz); 2852 __get_user(host_sd->shm_atime, &target_sd->shm_atime); 2853 __get_user(host_sd->shm_dtime, &target_sd->shm_dtime); 2854 __get_user(host_sd->shm_ctime, &target_sd->shm_ctime); 2855 __get_user(host_sd->shm_cpid, &target_sd->shm_cpid); 2856 __get_user(host_sd->shm_lpid, &target_sd->shm_lpid); 2857 __get_user(host_sd->shm_nattch, &target_sd->shm_nattch); 2858 unlock_user_struct(target_sd, target_addr, 0); 2859 return 0; 2860 } 2861 2862 static inline abi_long host_to_target_shmid_ds(abi_ulong target_addr, 2863 struct shmid_ds *host_sd) 2864 { 2865 struct target_shmid_ds *target_sd; 2866 2867 if (!lock_user_struct(VERIFY_WRITE, target_sd, target_addr, 0)) 2868 return -TARGET_EFAULT; 2869 if (host_to_target_ipc_perm(target_addr, &(host_sd->shm_perm))) 2870 return -TARGET_EFAULT; 2871 __put_user(host_sd->shm_segsz, &target_sd->shm_segsz); 2872 __put_user(host_sd->shm_atime, &target_sd->shm_atime); 2873 __put_user(host_sd->shm_dtime, &target_sd->shm_dtime); 2874 __put_user(host_sd->shm_ctime, &target_sd->shm_ctime); 2875 __put_user(host_sd->shm_cpid, &target_sd->shm_cpid); 2876 __put_user(host_sd->shm_lpid, &target_sd->shm_lpid); 2877 __put_user(host_sd->shm_nattch, &target_sd->shm_nattch); 2878 unlock_user_struct(target_sd, target_addr, 1); 2879 return 0; 2880 } 2881 2882 struct target_shminfo { 2883 abi_ulong shmmax; 2884 abi_ulong shmmin; 2885 abi_ulong shmmni; 2886 abi_ulong shmseg; 2887 abi_ulong shmall; 2888 }; 2889 2890 static inline abi_long host_to_target_shminfo(abi_ulong target_addr, 2891 struct shminfo *host_shminfo) 2892 { 2893 struct target_shminfo *target_shminfo; 2894 if (!lock_user_struct(VERIFY_WRITE, target_shminfo, target_addr, 0)) 2895 return -TARGET_EFAULT; 2896 __put_user(host_shminfo->shmmax, &target_shminfo->shmmax); 2897 __put_user(host_shminfo->shmmin, &target_shminfo->shmmin); 2898 __put_user(host_shminfo->shmmni, &target_shminfo->shmmni); 2899 __put_user(host_shminfo->shmseg, &target_shminfo->shmseg); 2900 __put_user(host_shminfo->shmall, &target_shminfo->shmall); 2901 unlock_user_struct(target_shminfo, target_addr, 1); 2902 return 0; 2903 } 2904 2905 struct target_shm_info { 2906 int used_ids; 2907 abi_ulong shm_tot; 2908 abi_ulong shm_rss; 2909 abi_ulong shm_swp; 2910 abi_ulong swap_attempts; 2911 abi_ulong swap_successes; 2912 }; 2913 2914 static inline abi_long host_to_target_shm_info(abi_ulong target_addr, 2915 struct shm_info *host_shm_info) 2916 { 2917 struct target_shm_info *target_shm_info; 2918 if (!lock_user_struct(VERIFY_WRITE, target_shm_info, target_addr, 0)) 2919 return -TARGET_EFAULT; 2920 __put_user(host_shm_info->used_ids, &target_shm_info->used_ids); 2921 __put_user(host_shm_info->shm_tot, &target_shm_info->shm_tot); 2922 __put_user(host_shm_info->shm_rss, &target_shm_info->shm_rss); 2923 __put_user(host_shm_info->shm_swp, &target_shm_info->shm_swp); 2924 __put_user(host_shm_info->swap_attempts, &target_shm_info->swap_attempts); 2925 __put_user(host_shm_info->swap_successes, &target_shm_info->swap_successes); 2926 unlock_user_struct(target_shm_info, target_addr, 1); 2927 return 0; 2928 } 2929 2930 static inline abi_long do_shmctl(int shmid, int cmd, abi_long buf) 2931 { 2932 struct shmid_ds dsarg; 2933 struct shminfo shminfo; 2934 struct shm_info shm_info; 2935 abi_long ret = -TARGET_EINVAL; 2936 2937 cmd &= 0xff; 2938 2939 switch(cmd) { 2940 case IPC_STAT: 2941 case IPC_SET: 2942 case SHM_STAT: 2943 if (target_to_host_shmid_ds(&dsarg, buf)) 2944 return -TARGET_EFAULT; 2945 ret = get_errno(shmctl(shmid, cmd, &dsarg)); 2946 if (host_to_target_shmid_ds(buf, &dsarg)) 2947 return -TARGET_EFAULT; 2948 break; 2949 case IPC_INFO: 2950 ret = get_errno(shmctl(shmid, cmd, (struct shmid_ds *)&shminfo)); 2951 if (host_to_target_shminfo(buf, &shminfo)) 2952 return -TARGET_EFAULT; 2953 break; 2954 case SHM_INFO: 2955 ret = get_errno(shmctl(shmid, cmd, (struct shmid_ds *)&shm_info)); 2956 if (host_to_target_shm_info(buf, &shm_info)) 2957 return -TARGET_EFAULT; 2958 break; 2959 case IPC_RMID: 2960 case SHM_LOCK: 2961 case SHM_UNLOCK: 2962 ret = get_errno(shmctl(shmid, cmd, NULL)); 2963 break; 2964 } 2965 2966 return ret; 2967 } 2968 2969 static inline abi_ulong do_shmat(int shmid, abi_ulong shmaddr, int shmflg) 2970 { 2971 abi_long raddr; 2972 void *host_raddr; 2973 struct shmid_ds shm_info; 2974 int i,ret; 2975 2976 /* find out the length of the shared memory segment */ 2977 ret = get_errno(shmctl(shmid, IPC_STAT, &shm_info)); 2978 if (is_error(ret)) { 2979 /* can't get length, bail out */ 2980 return ret; 2981 } 2982 2983 mmap_lock(); 2984 2985 if (shmaddr) 2986 host_raddr = shmat(shmid, (void *)g2h(shmaddr), shmflg); 2987 else { 2988 abi_ulong mmap_start; 2989 2990 mmap_start = mmap_find_vma(0, shm_info.shm_segsz); 2991 2992 if (mmap_start == -1) { 2993 errno = ENOMEM; 2994 host_raddr = (void *)-1; 2995 } else 2996 host_raddr = shmat(shmid, g2h(mmap_start), shmflg | SHM_REMAP); 2997 } 2998 2999 if (host_raddr == (void *)-1) { 3000 mmap_unlock(); 3001 return get_errno((long)host_raddr); 3002 } 3003 raddr=h2g((unsigned long)host_raddr); 3004 3005 page_set_flags(raddr, raddr + shm_info.shm_segsz, 3006 PAGE_VALID | PAGE_READ | 3007 ((shmflg & SHM_RDONLY)? 0 : PAGE_WRITE)); 3008 3009 for (i = 0; i < N_SHM_REGIONS; i++) { 3010 if (shm_regions[i].start == 0) { 3011 shm_regions[i].start = raddr; 3012 shm_regions[i].size = shm_info.shm_segsz; 3013 break; 3014 } 3015 } 3016 3017 mmap_unlock(); 3018 return raddr; 3019 3020 } 3021 3022 static inline abi_long do_shmdt(abi_ulong shmaddr) 3023 { 3024 int i; 3025 3026 for (i = 0; i < N_SHM_REGIONS; ++i) { 3027 if (shm_regions[i].start == shmaddr) { 3028 shm_regions[i].start = 0; 3029 page_set_flags(shmaddr, shmaddr + shm_regions[i].size, 0); 3030 break; 3031 } 3032 } 3033 3034 return get_errno(shmdt(g2h(shmaddr))); 3035 } 3036 3037 #ifdef TARGET_NR_ipc 3038 /* ??? This only works with linear mappings. */ 3039 /* do_ipc() must return target values and target errnos. */ 3040 static abi_long do_ipc(unsigned int call, int first, 3041 int second, int third, 3042 abi_long ptr, abi_long fifth) 3043 { 3044 int version; 3045 abi_long ret = 0; 3046 3047 version = call >> 16; 3048 call &= 0xffff; 3049 3050 switch (call) { 3051 case IPCOP_semop: 3052 ret = do_semop(first, ptr, second); 3053 break; 3054 3055 case IPCOP_semget: 3056 ret = get_errno(semget(first, second, third)); 3057 break; 3058 3059 case IPCOP_semctl: 3060 ret = do_semctl(first, second, third, (union target_semun)(abi_ulong) ptr); 3061 break; 3062 3063 case IPCOP_msgget: 3064 ret = get_errno(msgget(first, second)); 3065 break; 3066 3067 case IPCOP_msgsnd: 3068 ret = do_msgsnd(first, ptr, second, third); 3069 break; 3070 3071 case IPCOP_msgctl: 3072 ret = do_msgctl(first, second, ptr); 3073 break; 3074 3075 case IPCOP_msgrcv: 3076 switch (version) { 3077 case 0: 3078 { 3079 struct target_ipc_kludge { 3080 abi_long msgp; 3081 abi_long msgtyp; 3082 } *tmp; 3083 3084 if (!lock_user_struct(VERIFY_READ, tmp, ptr, 1)) { 3085 ret = -TARGET_EFAULT; 3086 break; 3087 } 3088 3089 ret = do_msgrcv(first, tmp->msgp, second, tmp->msgtyp, third); 3090 3091 unlock_user_struct(tmp, ptr, 0); 3092 break; 3093 } 3094 default: 3095 ret = do_msgrcv(first, ptr, second, fifth, third); 3096 } 3097 break; 3098 3099 case IPCOP_shmat: 3100 switch (version) { 3101 default: 3102 { 3103 abi_ulong raddr; 3104 raddr = do_shmat(first, ptr, second); 3105 if (is_error(raddr)) 3106 return get_errno(raddr); 3107 if (put_user_ual(raddr, third)) 3108 return -TARGET_EFAULT; 3109 break; 3110 } 3111 case 1: 3112 ret = -TARGET_EINVAL; 3113 break; 3114 } 3115 break; 3116 case IPCOP_shmdt: 3117 ret = do_shmdt(ptr); 3118 break; 3119 3120 case IPCOP_shmget: 3121 /* IPC_* flag values are the same on all linux platforms */ 3122 ret = get_errno(shmget(first, second, third)); 3123 break; 3124 3125 /* IPC_* and SHM_* command values are the same on all linux platforms */ 3126 case IPCOP_shmctl: 3127 ret = do_shmctl(first, second, third); 3128 break; 3129 default: 3130 gemu_log("Unsupported ipc call: %d (version %d)\n", call, version); 3131 ret = -TARGET_ENOSYS; 3132 break; 3133 } 3134 return ret; 3135 } 3136 #endif 3137 3138 /* kernel structure types definitions */ 3139 3140 #define STRUCT(name, ...) STRUCT_ ## name, 3141 #define STRUCT_SPECIAL(name) STRUCT_ ## name, 3142 enum { 3143 #include "syscall_types.h" 3144 }; 3145 #undef STRUCT 3146 #undef STRUCT_SPECIAL 3147 3148 #define STRUCT(name, ...) static const argtype struct_ ## name ## _def[] = { __VA_ARGS__, TYPE_NULL }; 3149 #define STRUCT_SPECIAL(name) 3150 #include "syscall_types.h" 3151 #undef STRUCT 3152 #undef STRUCT_SPECIAL 3153 3154 typedef struct IOCTLEntry IOCTLEntry; 3155 3156 typedef abi_long do_ioctl_fn(const IOCTLEntry *ie, uint8_t *buf_temp, 3157 int fd, abi_long cmd, abi_long arg); 3158 3159 struct IOCTLEntry { 3160 unsigned int target_cmd; 3161 unsigned int host_cmd; 3162 const char *name; 3163 int access; 3164 do_ioctl_fn *do_ioctl; 3165 const argtype arg_type[5]; 3166 }; 3167 3168 #define IOC_R 0x0001 3169 #define IOC_W 0x0002 3170 #define IOC_RW (IOC_R | IOC_W) 3171 3172 #define MAX_STRUCT_SIZE 4096 3173 3174 #ifdef CONFIG_FIEMAP 3175 /* So fiemap access checks don't overflow on 32 bit systems. 3176 * This is very slightly smaller than the limit imposed by 3177 * the underlying kernel. 3178 */ 3179 #define FIEMAP_MAX_EXTENTS ((UINT_MAX - sizeof(struct fiemap)) \ 3180 / sizeof(struct fiemap_extent)) 3181 3182 static abi_long do_ioctl_fs_ioc_fiemap(const IOCTLEntry *ie, uint8_t *buf_temp, 3183 int fd, abi_long cmd, abi_long arg) 3184 { 3185 /* The parameter for this ioctl is a struct fiemap followed 3186 * by an array of struct fiemap_extent whose size is set 3187 * in fiemap->fm_extent_count. The array is filled in by the 3188 * ioctl. 3189 */ 3190 int target_size_in, target_size_out; 3191 struct fiemap *fm; 3192 const argtype *arg_type = ie->arg_type; 3193 const argtype extent_arg_type[] = { MK_STRUCT(STRUCT_fiemap_extent) }; 3194 void *argptr, *p; 3195 abi_long ret; 3196 int i, extent_size = thunk_type_size(extent_arg_type, 0); 3197 uint32_t outbufsz; 3198 int free_fm = 0; 3199 3200 assert(arg_type[0] == TYPE_PTR); 3201 assert(ie->access == IOC_RW); 3202 arg_type++; 3203 target_size_in = thunk_type_size(arg_type, 0); 3204 argptr = lock_user(VERIFY_READ, arg, target_size_in, 1); 3205 if (!argptr) { 3206 return -TARGET_EFAULT; 3207 } 3208 thunk_convert(buf_temp, argptr, arg_type, THUNK_HOST); 3209 unlock_user(argptr, arg, 0); 3210 fm = (struct fiemap *)buf_temp; 3211 if (fm->fm_extent_count > FIEMAP_MAX_EXTENTS) { 3212 return -TARGET_EINVAL; 3213 } 3214 3215 outbufsz = sizeof (*fm) + 3216 (sizeof(struct fiemap_extent) * fm->fm_extent_count); 3217 3218 if (outbufsz > MAX_STRUCT_SIZE) { 3219 /* We can't fit all the extents into the fixed size buffer. 3220 * Allocate one that is large enough and use it instead. 3221 */ 3222 fm = malloc(outbufsz); 3223 if (!fm) { 3224 return -TARGET_ENOMEM; 3225 } 3226 memcpy(fm, buf_temp, sizeof(struct fiemap)); 3227 free_fm = 1; 3228 } 3229 ret = get_errno(ioctl(fd, ie->host_cmd, fm)); 3230 if (!is_error(ret)) { 3231 target_size_out = target_size_in; 3232 /* An extent_count of 0 means we were only counting the extents 3233 * so there are no structs to copy 3234 */ 3235 if (fm->fm_extent_count != 0) { 3236 target_size_out += fm->fm_mapped_extents * extent_size; 3237 } 3238 argptr = lock_user(VERIFY_WRITE, arg, target_size_out, 0); 3239 if (!argptr) { 3240 ret = -TARGET_EFAULT; 3241 } else { 3242 /* Convert the struct fiemap */ 3243 thunk_convert(argptr, fm, arg_type, THUNK_TARGET); 3244 if (fm->fm_extent_count != 0) { 3245 p = argptr + target_size_in; 3246 /* ...and then all the struct fiemap_extents */ 3247 for (i = 0; i < fm->fm_mapped_extents; i++) { 3248 thunk_convert(p, &fm->fm_extents[i], extent_arg_type, 3249 THUNK_TARGET); 3250 p += extent_size; 3251 } 3252 } 3253 unlock_user(argptr, arg, target_size_out); 3254 } 3255 } 3256 if (free_fm) { 3257 free(fm); 3258 } 3259 return ret; 3260 } 3261 #endif 3262 3263 static abi_long do_ioctl_ifconf(const IOCTLEntry *ie, uint8_t *buf_temp, 3264 int fd, abi_long cmd, abi_long arg) 3265 { 3266 const argtype *arg_type = ie->arg_type; 3267 int target_size; 3268 void *argptr; 3269 int ret; 3270 struct ifconf *host_ifconf; 3271 uint32_t outbufsz; 3272 const argtype ifreq_arg_type[] = { MK_STRUCT(STRUCT_sockaddr_ifreq) }; 3273 int target_ifreq_size; 3274 int nb_ifreq; 3275 int free_buf = 0; 3276 int i; 3277 int target_ifc_len; 3278 abi_long target_ifc_buf; 3279 int host_ifc_len; 3280 char *host_ifc_buf; 3281 3282 assert(arg_type[0] == TYPE_PTR); 3283 assert(ie->access == IOC_RW); 3284 3285 arg_type++; 3286 target_size = thunk_type_size(arg_type, 0); 3287 3288 argptr = lock_user(VERIFY_READ, arg, target_size, 1); 3289 if (!argptr) 3290 return -TARGET_EFAULT; 3291 thunk_convert(buf_temp, argptr, arg_type, THUNK_HOST); 3292 unlock_user(argptr, arg, 0); 3293 3294 host_ifconf = (struct ifconf *)(unsigned long)buf_temp; 3295 target_ifc_len = host_ifconf->ifc_len; 3296 target_ifc_buf = (abi_long)(unsigned long)host_ifconf->ifc_buf; 3297 3298 target_ifreq_size = thunk_type_size(ifreq_arg_type, 0); 3299 nb_ifreq = target_ifc_len / target_ifreq_size; 3300 host_ifc_len = nb_ifreq * sizeof(struct ifreq); 3301 3302 outbufsz = sizeof(*host_ifconf) + host_ifc_len; 3303 if (outbufsz > MAX_STRUCT_SIZE) { 3304 /* We can't fit all the extents into the fixed size buffer. 3305 * Allocate one that is large enough and use it instead. 3306 */ 3307 host_ifconf = malloc(outbufsz); 3308 if (!host_ifconf) { 3309 return -TARGET_ENOMEM; 3310 } 3311 memcpy(host_ifconf, buf_temp, sizeof(*host_ifconf)); 3312 free_buf = 1; 3313 } 3314 host_ifc_buf = (char*)host_ifconf + sizeof(*host_ifconf); 3315 3316 host_ifconf->ifc_len = host_ifc_len; 3317 host_ifconf->ifc_buf = host_ifc_buf; 3318 3319 ret = get_errno(ioctl(fd, ie->host_cmd, host_ifconf)); 3320 if (!is_error(ret)) { 3321 /* convert host ifc_len to target ifc_len */ 3322 3323 nb_ifreq = host_ifconf->ifc_len / sizeof(struct ifreq); 3324 target_ifc_len = nb_ifreq * target_ifreq_size; 3325 host_ifconf->ifc_len = target_ifc_len; 3326 3327 /* restore target ifc_buf */ 3328 3329 host_ifconf->ifc_buf = (char *)(unsigned long)target_ifc_buf; 3330 3331 /* copy struct ifconf to target user */ 3332 3333 argptr = lock_user(VERIFY_WRITE, arg, target_size, 0); 3334 if (!argptr) 3335 return -TARGET_EFAULT; 3336 thunk_convert(argptr, host_ifconf, arg_type, THUNK_TARGET); 3337 unlock_user(argptr, arg, target_size); 3338 3339 /* copy ifreq[] to target user */ 3340 3341 argptr = lock_user(VERIFY_WRITE, target_ifc_buf, target_ifc_len, 0); 3342 for (i = 0; i < nb_ifreq ; i++) { 3343 thunk_convert(argptr + i * target_ifreq_size, 3344 host_ifc_buf + i * sizeof(struct ifreq), 3345 ifreq_arg_type, THUNK_TARGET); 3346 } 3347 unlock_user(argptr, target_ifc_buf, target_ifc_len); 3348 } 3349 3350 if (free_buf) { 3351 free(host_ifconf); 3352 } 3353 3354 return ret; 3355 } 3356 3357 static IOCTLEntry ioctl_entries[] = { 3358 #define IOCTL(cmd, access, ...) \ 3359 { TARGET_ ## cmd, cmd, #cmd, access, 0, { __VA_ARGS__ } }, 3360 #define IOCTL_SPECIAL(cmd, access, dofn, ...) \ 3361 { TARGET_ ## cmd, cmd, #cmd, access, dofn, { __VA_ARGS__ } }, 3362 #include "ioctls.h" 3363 { 0, 0, }, 3364 }; 3365 3366 /* ??? Implement proper locking for ioctls. */ 3367 /* do_ioctl() Must return target values and target errnos. */ 3368 static abi_long do_ioctl(int fd, abi_long cmd, abi_long arg) 3369 { 3370 const IOCTLEntry *ie; 3371 const argtype *arg_type; 3372 abi_long ret; 3373 uint8_t buf_temp[MAX_STRUCT_SIZE]; 3374 int target_size; 3375 void *argptr; 3376 3377 ie = ioctl_entries; 3378 for(;;) { 3379 if (ie->target_cmd == 0) { 3380 gemu_log("Unsupported ioctl: cmd=0x%04lx\n", (long)cmd); 3381 return -TARGET_ENOSYS; 3382 } 3383 if (ie->target_cmd == cmd) 3384 break; 3385 ie++; 3386 } 3387 arg_type = ie->arg_type; 3388 #if defined(DEBUG) 3389 gemu_log("ioctl: cmd=0x%04lx (%s)\n", (long)cmd, ie->name); 3390 #endif 3391 if (ie->do_ioctl) { 3392 return ie->do_ioctl(ie, buf_temp, fd, cmd, arg); 3393 } 3394 3395 switch(arg_type[0]) { 3396 case TYPE_NULL: 3397 /* no argument */ 3398 ret = get_errno(ioctl(fd, ie->host_cmd)); 3399 break; 3400 case TYPE_PTRVOID: 3401 case TYPE_INT: 3402 /* int argment */ 3403 ret = get_errno(ioctl(fd, ie->host_cmd, arg)); 3404 break; 3405 case TYPE_PTR: 3406 arg_type++; 3407 target_size = thunk_type_size(arg_type, 0); 3408 switch(ie->access) { 3409 case IOC_R: 3410 ret = get_errno(ioctl(fd, ie->host_cmd, buf_temp)); 3411 if (!is_error(ret)) { 3412 argptr = lock_user(VERIFY_WRITE, arg, target_size, 0); 3413 if (!argptr) 3414 return -TARGET_EFAULT; 3415 thunk_convert(argptr, buf_temp, arg_type, THUNK_TARGET); 3416 unlock_user(argptr, arg, target_size); 3417 } 3418 break; 3419 case IOC_W: 3420 argptr = lock_user(VERIFY_READ, arg, target_size, 1); 3421 if (!argptr) 3422 return -TARGET_EFAULT; 3423 thunk_convert(buf_temp, argptr, arg_type, THUNK_HOST); 3424 unlock_user(argptr, arg, 0); 3425 ret = get_errno(ioctl(fd, ie->host_cmd, buf_temp)); 3426 break; 3427 default: 3428 case IOC_RW: 3429 argptr = lock_user(VERIFY_READ, arg, target_size, 1); 3430 if (!argptr) 3431 return -TARGET_EFAULT; 3432 thunk_convert(buf_temp, argptr, arg_type, THUNK_HOST); 3433 unlock_user(argptr, arg, 0); 3434 ret = get_errno(ioctl(fd, ie->host_cmd, buf_temp)); 3435 if (!is_error(ret)) { 3436 argptr = lock_user(VERIFY_WRITE, arg, target_size, 0); 3437 if (!argptr) 3438 return -TARGET_EFAULT; 3439 thunk_convert(argptr, buf_temp, arg_type, THUNK_TARGET); 3440 unlock_user(argptr, arg, target_size); 3441 } 3442 break; 3443 } 3444 break; 3445 default: 3446 gemu_log("Unsupported ioctl type: cmd=0x%04lx type=%d\n", 3447 (long)cmd, arg_type[0]); 3448 ret = -TARGET_ENOSYS; 3449 break; 3450 } 3451 return ret; 3452 } 3453 3454 static const bitmask_transtbl iflag_tbl[] = { 3455 { TARGET_IGNBRK, TARGET_IGNBRK, IGNBRK, IGNBRK }, 3456 { TARGET_BRKINT, TARGET_BRKINT, BRKINT, BRKINT }, 3457 { TARGET_IGNPAR, TARGET_IGNPAR, IGNPAR, IGNPAR }, 3458 { TARGET_PARMRK, TARGET_PARMRK, PARMRK, PARMRK }, 3459 { TARGET_INPCK, TARGET_INPCK, INPCK, INPCK }, 3460 { TARGET_ISTRIP, TARGET_ISTRIP, ISTRIP, ISTRIP }, 3461 { TARGET_INLCR, TARGET_INLCR, INLCR, INLCR }, 3462 { TARGET_IGNCR, TARGET_IGNCR, IGNCR, IGNCR }, 3463 { TARGET_ICRNL, TARGET_ICRNL, ICRNL, ICRNL }, 3464 { TARGET_IUCLC, TARGET_IUCLC, IUCLC, IUCLC }, 3465 { TARGET_IXON, TARGET_IXON, IXON, IXON }, 3466 { TARGET_IXANY, TARGET_IXANY, IXANY, IXANY }, 3467 { TARGET_IXOFF, TARGET_IXOFF, IXOFF, IXOFF }, 3468 { TARGET_IMAXBEL, TARGET_IMAXBEL, IMAXBEL, IMAXBEL }, 3469 { 0, 0, 0, 0 } 3470 }; 3471 3472 static const bitmask_transtbl oflag_tbl[] = { 3473 { TARGET_OPOST, TARGET_OPOST, OPOST, OPOST }, 3474 { TARGET_OLCUC, TARGET_OLCUC, OLCUC, OLCUC }, 3475 { TARGET_ONLCR, TARGET_ONLCR, ONLCR, ONLCR }, 3476 { TARGET_OCRNL, TARGET_OCRNL, OCRNL, OCRNL }, 3477 { TARGET_ONOCR, TARGET_ONOCR, ONOCR, ONOCR }, 3478 { TARGET_ONLRET, TARGET_ONLRET, ONLRET, ONLRET }, 3479 { TARGET_OFILL, TARGET_OFILL, OFILL, OFILL }, 3480 { TARGET_OFDEL, TARGET_OFDEL, OFDEL, OFDEL }, 3481 { TARGET_NLDLY, TARGET_NL0, NLDLY, NL0 }, 3482 { TARGET_NLDLY, TARGET_NL1, NLDLY, NL1 }, 3483 { TARGET_CRDLY, TARGET_CR0, CRDLY, CR0 }, 3484 { TARGET_CRDLY, TARGET_CR1, CRDLY, CR1 }, 3485 { TARGET_CRDLY, TARGET_CR2, CRDLY, CR2 }, 3486 { TARGET_CRDLY, TARGET_CR3, CRDLY, CR3 }, 3487 { TARGET_TABDLY, TARGET_TAB0, TABDLY, TAB0 }, 3488 { TARGET_TABDLY, TARGET_TAB1, TABDLY, TAB1 }, 3489 { TARGET_TABDLY, TARGET_TAB2, TABDLY, TAB2 }, 3490 { TARGET_TABDLY, TARGET_TAB3, TABDLY, TAB3 }, 3491 { TARGET_BSDLY, TARGET_BS0, BSDLY, BS0 }, 3492 { TARGET_BSDLY, TARGET_BS1, BSDLY, BS1 }, 3493 { TARGET_VTDLY, TARGET_VT0, VTDLY, VT0 }, 3494 { TARGET_VTDLY, TARGET_VT1, VTDLY, VT1 }, 3495 { TARGET_FFDLY, TARGET_FF0, FFDLY, FF0 }, 3496 { TARGET_FFDLY, TARGET_FF1, FFDLY, FF1 }, 3497 { 0, 0, 0, 0 } 3498 }; 3499 3500 static const bitmask_transtbl cflag_tbl[] = { 3501 { TARGET_CBAUD, TARGET_B0, CBAUD, B0 }, 3502 { TARGET_CBAUD, TARGET_B50, CBAUD, B50 }, 3503 { TARGET_CBAUD, TARGET_B75, CBAUD, B75 }, 3504 { TARGET_CBAUD, TARGET_B110, CBAUD, B110 }, 3505 { TARGET_CBAUD, TARGET_B134, CBAUD, B134 }, 3506 { TARGET_CBAUD, TARGET_B150, CBAUD, B150 }, 3507 { TARGET_CBAUD, TARGET_B200, CBAUD, B200 }, 3508 { TARGET_CBAUD, TARGET_B300, CBAUD, B300 }, 3509 { TARGET_CBAUD, TARGET_B600, CBAUD, B600 }, 3510 { TARGET_CBAUD, TARGET_B1200, CBAUD, B1200 }, 3511 { TARGET_CBAUD, TARGET_B1800, CBAUD, B1800 }, 3512 { TARGET_CBAUD, TARGET_B2400, CBAUD, B2400 }, 3513 { TARGET_CBAUD, TARGET_B4800, CBAUD, B4800 }, 3514 { TARGET_CBAUD, TARGET_B9600, CBAUD, B9600 }, 3515 { TARGET_CBAUD, TARGET_B19200, CBAUD, B19200 }, 3516 { TARGET_CBAUD, TARGET_B38400, CBAUD, B38400 }, 3517 { TARGET_CBAUD, TARGET_B57600, CBAUD, B57600 }, 3518 { TARGET_CBAUD, TARGET_B115200, CBAUD, B115200 }, 3519 { TARGET_CBAUD, TARGET_B230400, CBAUD, B230400 }, 3520 { TARGET_CBAUD, TARGET_B460800, CBAUD, B460800 }, 3521 { TARGET_CSIZE, TARGET_CS5, CSIZE, CS5 }, 3522 { TARGET_CSIZE, TARGET_CS6, CSIZE, CS6 }, 3523 { TARGET_CSIZE, TARGET_CS7, CSIZE, CS7 }, 3524 { TARGET_CSIZE, TARGET_CS8, CSIZE, CS8 }, 3525 { TARGET_CSTOPB, TARGET_CSTOPB, CSTOPB, CSTOPB }, 3526 { TARGET_CREAD, TARGET_CREAD, CREAD, CREAD }, 3527 { TARGET_PARENB, TARGET_PARENB, PARENB, PARENB }, 3528 { TARGET_PARODD, TARGET_PARODD, PARODD, PARODD }, 3529 { TARGET_HUPCL, TARGET_HUPCL, HUPCL, HUPCL }, 3530 { TARGET_CLOCAL, TARGET_CLOCAL, CLOCAL, CLOCAL }, 3531 { TARGET_CRTSCTS, TARGET_CRTSCTS, CRTSCTS, CRTSCTS }, 3532 { 0, 0, 0, 0 } 3533 }; 3534 3535 static const bitmask_transtbl lflag_tbl[] = { 3536 { TARGET_ISIG, TARGET_ISIG, ISIG, ISIG }, 3537 { TARGET_ICANON, TARGET_ICANON, ICANON, ICANON }, 3538 { TARGET_XCASE, TARGET_XCASE, XCASE, XCASE }, 3539 { TARGET_ECHO, TARGET_ECHO, ECHO, ECHO }, 3540 { TARGET_ECHOE, TARGET_ECHOE, ECHOE, ECHOE }, 3541 { TARGET_ECHOK, TARGET_ECHOK, ECHOK, ECHOK }, 3542 { TARGET_ECHONL, TARGET_ECHONL, ECHONL, ECHONL }, 3543 { TARGET_NOFLSH, TARGET_NOFLSH, NOFLSH, NOFLSH }, 3544 { TARGET_TOSTOP, TARGET_TOSTOP, TOSTOP, TOSTOP }, 3545 { TARGET_ECHOCTL, TARGET_ECHOCTL, ECHOCTL, ECHOCTL }, 3546 { TARGET_ECHOPRT, TARGET_ECHOPRT, ECHOPRT, ECHOPRT }, 3547 { TARGET_ECHOKE, TARGET_ECHOKE, ECHOKE, ECHOKE }, 3548 { TARGET_FLUSHO, TARGET_FLUSHO, FLUSHO, FLUSHO }, 3549 { TARGET_PENDIN, TARGET_PENDIN, PENDIN, PENDIN }, 3550 { TARGET_IEXTEN, TARGET_IEXTEN, IEXTEN, IEXTEN }, 3551 { 0, 0, 0, 0 } 3552 }; 3553 3554 static void target_to_host_termios (void *dst, const void *src) 3555 { 3556 struct host_termios *host = dst; 3557 const struct target_termios *target = src; 3558 3559 host->c_iflag = 3560 target_to_host_bitmask(tswap32(target->c_iflag), iflag_tbl); 3561 host->c_oflag = 3562 target_to_host_bitmask(tswap32(target->c_oflag), oflag_tbl); 3563 host->c_cflag = 3564 target_to_host_bitmask(tswap32(target->c_cflag), cflag_tbl); 3565 host->c_lflag = 3566 target_to_host_bitmask(tswap32(target->c_lflag), lflag_tbl); 3567 host->c_line = target->c_line; 3568 3569 memset(host->c_cc, 0, sizeof(host->c_cc)); 3570 host->c_cc[VINTR] = target->c_cc[TARGET_VINTR]; 3571 host->c_cc[VQUIT] = target->c_cc[TARGET_VQUIT]; 3572 host->c_cc[VERASE] = target->c_cc[TARGET_VERASE]; 3573 host->c_cc[VKILL] = target->c_cc[TARGET_VKILL]; 3574 host->c_cc[VEOF] = target->c_cc[TARGET_VEOF]; 3575 host->c_cc[VTIME] = target->c_cc[TARGET_VTIME]; 3576 host->c_cc[VMIN] = target->c_cc[TARGET_VMIN]; 3577 host->c_cc[VSWTC] = target->c_cc[TARGET_VSWTC]; 3578 host->c_cc[VSTART] = target->c_cc[TARGET_VSTART]; 3579 host->c_cc[VSTOP] = target->c_cc[TARGET_VSTOP]; 3580 host->c_cc[VSUSP] = target->c_cc[TARGET_VSUSP]; 3581 host->c_cc[VEOL] = target->c_cc[TARGET_VEOL]; 3582 host->c_cc[VREPRINT] = target->c_cc[TARGET_VREPRINT]; 3583 host->c_cc[VDISCARD] = target->c_cc[TARGET_VDISCARD]; 3584 host->c_cc[VWERASE] = target->c_cc[TARGET_VWERASE]; 3585 host->c_cc[VLNEXT] = target->c_cc[TARGET_VLNEXT]; 3586 host->c_cc[VEOL2] = target->c_cc[TARGET_VEOL2]; 3587 } 3588 3589 static void host_to_target_termios (void *dst, const void *src) 3590 { 3591 struct target_termios *target = dst; 3592 const struct host_termios *host = src; 3593 3594 target->c_iflag = 3595 tswap32(host_to_target_bitmask(host->c_iflag, iflag_tbl)); 3596 target->c_oflag = 3597 tswap32(host_to_target_bitmask(host->c_oflag, oflag_tbl)); 3598 target->c_cflag = 3599 tswap32(host_to_target_bitmask(host->c_cflag, cflag_tbl)); 3600 target->c_lflag = 3601 tswap32(host_to_target_bitmask(host->c_lflag, lflag_tbl)); 3602 target->c_line = host->c_line; 3603 3604 memset(target->c_cc, 0, sizeof(target->c_cc)); 3605 target->c_cc[TARGET_VINTR] = host->c_cc[VINTR]; 3606 target->c_cc[TARGET_VQUIT] = host->c_cc[VQUIT]; 3607 target->c_cc[TARGET_VERASE] = host->c_cc[VERASE]; 3608 target->c_cc[TARGET_VKILL] = host->c_cc[VKILL]; 3609 target->c_cc[TARGET_VEOF] = host->c_cc[VEOF]; 3610 target->c_cc[TARGET_VTIME] = host->c_cc[VTIME]; 3611 target->c_cc[TARGET_VMIN] = host->c_cc[VMIN]; 3612 target->c_cc[TARGET_VSWTC] = host->c_cc[VSWTC]; 3613 target->c_cc[TARGET_VSTART] = host->c_cc[VSTART]; 3614 target->c_cc[TARGET_VSTOP] = host->c_cc[VSTOP]; 3615 target->c_cc[TARGET_VSUSP] = host->c_cc[VSUSP]; 3616 target->c_cc[TARGET_VEOL] = host->c_cc[VEOL]; 3617 target->c_cc[TARGET_VREPRINT] = host->c_cc[VREPRINT]; 3618 target->c_cc[TARGET_VDISCARD] = host->c_cc[VDISCARD]; 3619 target->c_cc[TARGET_VWERASE] = host->c_cc[VWERASE]; 3620 target->c_cc[TARGET_VLNEXT] = host->c_cc[VLNEXT]; 3621 target->c_cc[TARGET_VEOL2] = host->c_cc[VEOL2]; 3622 } 3623 3624 static const StructEntry struct_termios_def = { 3625 .convert = { host_to_target_termios, target_to_host_termios }, 3626 .size = { sizeof(struct target_termios), sizeof(struct host_termios) }, 3627 .align = { __alignof__(struct target_termios), __alignof__(struct host_termios) }, 3628 }; 3629 3630 static bitmask_transtbl mmap_flags_tbl[] = { 3631 { TARGET_MAP_SHARED, TARGET_MAP_SHARED, MAP_SHARED, MAP_SHARED }, 3632 { TARGET_MAP_PRIVATE, TARGET_MAP_PRIVATE, MAP_PRIVATE, MAP_PRIVATE }, 3633 { TARGET_MAP_FIXED, TARGET_MAP_FIXED, MAP_FIXED, MAP_FIXED }, 3634 { TARGET_MAP_ANONYMOUS, TARGET_MAP_ANONYMOUS, MAP_ANONYMOUS, MAP_ANONYMOUS }, 3635 { TARGET_MAP_GROWSDOWN, TARGET_MAP_GROWSDOWN, MAP_GROWSDOWN, MAP_GROWSDOWN }, 3636 { TARGET_MAP_DENYWRITE, TARGET_MAP_DENYWRITE, MAP_DENYWRITE, MAP_DENYWRITE }, 3637 { TARGET_MAP_EXECUTABLE, TARGET_MAP_EXECUTABLE, MAP_EXECUTABLE, MAP_EXECUTABLE }, 3638 { TARGET_MAP_LOCKED, TARGET_MAP_LOCKED, MAP_LOCKED, MAP_LOCKED }, 3639 { 0, 0, 0, 0 } 3640 }; 3641 3642 #if defined(TARGET_I386) 3643 3644 /* NOTE: there is really one LDT for all the threads */ 3645 static uint8_t *ldt_table; 3646 3647 static abi_long read_ldt(abi_ulong ptr, unsigned long bytecount) 3648 { 3649 int size; 3650 void *p; 3651 3652 if (!ldt_table) 3653 return 0; 3654 size = TARGET_LDT_ENTRIES * TARGET_LDT_ENTRY_SIZE; 3655 if (size > bytecount) 3656 size = bytecount; 3657 p = lock_user(VERIFY_WRITE, ptr, size, 0); 3658 if (!p) 3659 return -TARGET_EFAULT; 3660 /* ??? Should this by byteswapped? */ 3661 memcpy(p, ldt_table, size); 3662 unlock_user(p, ptr, size); 3663 return size; 3664 } 3665 3666 /* XXX: add locking support */ 3667 static abi_long write_ldt(CPUX86State *env, 3668 abi_ulong ptr, unsigned long bytecount, int oldmode) 3669 { 3670 struct target_modify_ldt_ldt_s ldt_info; 3671 struct target_modify_ldt_ldt_s *target_ldt_info; 3672 int seg_32bit, contents, read_exec_only, limit_in_pages; 3673 int seg_not_present, useable, lm; 3674 uint32_t *lp, entry_1, entry_2; 3675 3676 if (bytecount != sizeof(ldt_info)) 3677 return -TARGET_EINVAL; 3678 if (!lock_user_struct(VERIFY_READ, target_ldt_info, ptr, 1)) 3679 return -TARGET_EFAULT; 3680 ldt_info.entry_number = tswap32(target_ldt_info->entry_number); 3681 ldt_info.base_addr = tswapal(target_ldt_info->base_addr); 3682 ldt_info.limit = tswap32(target_ldt_info->limit); 3683 ldt_info.flags = tswap32(target_ldt_info->flags); 3684 unlock_user_struct(target_ldt_info, ptr, 0); 3685 3686 if (ldt_info.entry_number >= TARGET_LDT_ENTRIES) 3687 return -TARGET_EINVAL; 3688 seg_32bit = ldt_info.flags & 1; 3689 contents = (ldt_info.flags >> 1) & 3; 3690 read_exec_only = (ldt_info.flags >> 3) & 1; 3691 limit_in_pages = (ldt_info.flags >> 4) & 1; 3692 seg_not_present = (ldt_info.flags >> 5) & 1; 3693 useable = (ldt_info.flags >> 6) & 1; 3694 #ifdef TARGET_ABI32 3695 lm = 0; 3696 #else 3697 lm = (ldt_info.flags >> 7) & 1; 3698 #endif 3699 if (contents == 3) { 3700 if (oldmode) 3701 return -TARGET_EINVAL; 3702 if (seg_not_present == 0) 3703 return -TARGET_EINVAL; 3704 } 3705 /* allocate the LDT */ 3706 if (!ldt_table) { 3707 env->ldt.base = target_mmap(0, 3708 TARGET_LDT_ENTRIES * TARGET_LDT_ENTRY_SIZE, 3709 PROT_READ|PROT_WRITE, 3710 MAP_ANONYMOUS|MAP_PRIVATE, -1, 0); 3711 if (env->ldt.base == -1) 3712 return -TARGET_ENOMEM; 3713 memset(g2h(env->ldt.base), 0, 3714 TARGET_LDT_ENTRIES * TARGET_LDT_ENTRY_SIZE); 3715 env->ldt.limit = 0xffff; 3716 ldt_table = g2h(env->ldt.base); 3717 } 3718 3719 /* NOTE: same code as Linux kernel */ 3720 /* Allow LDTs to be cleared by the user. */ 3721 if (ldt_info.base_addr == 0 && ldt_info.limit == 0) { 3722 if (oldmode || 3723 (contents == 0 && 3724 read_exec_only == 1 && 3725 seg_32bit == 0 && 3726 limit_in_pages == 0 && 3727 seg_not_present == 1 && 3728 useable == 0 )) { 3729 entry_1 = 0; 3730 entry_2 = 0; 3731 goto install; 3732 } 3733 } 3734 3735 entry_1 = ((ldt_info.base_addr & 0x0000ffff) << 16) | 3736 (ldt_info.limit & 0x0ffff); 3737 entry_2 = (ldt_info.base_addr & 0xff000000) | 3738 ((ldt_info.base_addr & 0x00ff0000) >> 16) | 3739 (ldt_info.limit & 0xf0000) | 3740 ((read_exec_only ^ 1) << 9) | 3741 (contents << 10) | 3742 ((seg_not_present ^ 1) << 15) | 3743 (seg_32bit << 22) | 3744 (limit_in_pages << 23) | 3745 (lm << 21) | 3746 0x7000; 3747 if (!oldmode) 3748 entry_2 |= (useable << 20); 3749 3750 /* Install the new entry ... */ 3751 install: 3752 lp = (uint32_t *)(ldt_table + (ldt_info.entry_number << 3)); 3753 lp[0] = tswap32(entry_1); 3754 lp[1] = tswap32(entry_2); 3755 return 0; 3756 } 3757 3758 /* specific and weird i386 syscalls */ 3759 static abi_long do_modify_ldt(CPUX86State *env, int func, abi_ulong ptr, 3760 unsigned long bytecount) 3761 { 3762 abi_long ret; 3763 3764 switch (func) { 3765 case 0: 3766 ret = read_ldt(ptr, bytecount); 3767 break; 3768 case 1: 3769 ret = write_ldt(env, ptr, bytecount, 1); 3770 break; 3771 case 0x11: 3772 ret = write_ldt(env, ptr, bytecount, 0); 3773 break; 3774 default: 3775 ret = -TARGET_ENOSYS; 3776 break; 3777 } 3778 return ret; 3779 } 3780 3781 #if defined(TARGET_I386) && defined(TARGET_ABI32) 3782 static abi_long do_set_thread_area(CPUX86State *env, abi_ulong ptr) 3783 { 3784 uint64_t *gdt_table = g2h(env->gdt.base); 3785 struct target_modify_ldt_ldt_s ldt_info; 3786 struct target_modify_ldt_ldt_s *target_ldt_info; 3787 int seg_32bit, contents, read_exec_only, limit_in_pages; 3788 int seg_not_present, useable, lm; 3789 uint32_t *lp, entry_1, entry_2; 3790 int i; 3791 3792 lock_user_struct(VERIFY_WRITE, target_ldt_info, ptr, 1); 3793 if (!target_ldt_info) 3794 return -TARGET_EFAULT; 3795 ldt_info.entry_number = tswap32(target_ldt_info->entry_number); 3796 ldt_info.base_addr = tswapal(target_ldt_info->base_addr); 3797 ldt_info.limit = tswap32(target_ldt_info->limit); 3798 ldt_info.flags = tswap32(target_ldt_info->flags); 3799 if (ldt_info.entry_number == -1) { 3800 for (i=TARGET_GDT_ENTRY_TLS_MIN; i<=TARGET_GDT_ENTRY_TLS_MAX; i++) { 3801 if (gdt_table[i] == 0) { 3802 ldt_info.entry_number = i; 3803 target_ldt_info->entry_number = tswap32(i); 3804 break; 3805 } 3806 } 3807 } 3808 unlock_user_struct(target_ldt_info, ptr, 1); 3809 3810 if (ldt_info.entry_number < TARGET_GDT_ENTRY_TLS_MIN || 3811 ldt_info.entry_number > TARGET_GDT_ENTRY_TLS_MAX) 3812 return -TARGET_EINVAL; 3813 seg_32bit = ldt_info.flags & 1; 3814 contents = (ldt_info.flags >> 1) & 3; 3815 read_exec_only = (ldt_info.flags >> 3) & 1; 3816 limit_in_pages = (ldt_info.flags >> 4) & 1; 3817 seg_not_present = (ldt_info.flags >> 5) & 1; 3818 useable = (ldt_info.flags >> 6) & 1; 3819 #ifdef TARGET_ABI32 3820 lm = 0; 3821 #else 3822 lm = (ldt_info.flags >> 7) & 1; 3823 #endif 3824 3825 if (contents == 3) { 3826 if (seg_not_present == 0) 3827 return -TARGET_EINVAL; 3828 } 3829 3830 /* NOTE: same code as Linux kernel */ 3831 /* Allow LDTs to be cleared by the user. */ 3832 if (ldt_info.base_addr == 0 && ldt_info.limit == 0) { 3833 if ((contents == 0 && 3834 read_exec_only == 1 && 3835 seg_32bit == 0 && 3836 limit_in_pages == 0 && 3837 seg_not_present == 1 && 3838 useable == 0 )) { 3839 entry_1 = 0; 3840 entry_2 = 0; 3841 goto install; 3842 } 3843 } 3844 3845 entry_1 = ((ldt_info.base_addr & 0x0000ffff) << 16) | 3846 (ldt_info.limit & 0x0ffff); 3847 entry_2 = (ldt_info.base_addr & 0xff000000) | 3848 ((ldt_info.base_addr & 0x00ff0000) >> 16) | 3849 (ldt_info.limit & 0xf0000) | 3850 ((read_exec_only ^ 1) << 9) | 3851 (contents << 10) | 3852 ((seg_not_present ^ 1) << 15) | 3853 (seg_32bit << 22) | 3854 (limit_in_pages << 23) | 3855 (useable << 20) | 3856 (lm << 21) | 3857 0x7000; 3858 3859 /* Install the new entry ... */ 3860 install: 3861 lp = (uint32_t *)(gdt_table + ldt_info.entry_number); 3862 lp[0] = tswap32(entry_1); 3863 lp[1] = tswap32(entry_2); 3864 return 0; 3865 } 3866 3867 static abi_long do_get_thread_area(CPUX86State *env, abi_ulong ptr) 3868 { 3869 struct target_modify_ldt_ldt_s *target_ldt_info; 3870 uint64_t *gdt_table = g2h(env->gdt.base); 3871 uint32_t base_addr, limit, flags; 3872 int seg_32bit, contents, read_exec_only, limit_in_pages, idx; 3873 int seg_not_present, useable, lm; 3874 uint32_t *lp, entry_1, entry_2; 3875 3876 lock_user_struct(VERIFY_WRITE, target_ldt_info, ptr, 1); 3877 if (!target_ldt_info) 3878 return -TARGET_EFAULT; 3879 idx = tswap32(target_ldt_info->entry_number); 3880 if (idx < TARGET_GDT_ENTRY_TLS_MIN || 3881 idx > TARGET_GDT_ENTRY_TLS_MAX) { 3882 unlock_user_struct(target_ldt_info, ptr, 1); 3883 return -TARGET_EINVAL; 3884 } 3885 lp = (uint32_t *)(gdt_table + idx); 3886 entry_1 = tswap32(lp[0]); 3887 entry_2 = tswap32(lp[1]); 3888 3889 read_exec_only = ((entry_2 >> 9) & 1) ^ 1; 3890 contents = (entry_2 >> 10) & 3; 3891 seg_not_present = ((entry_2 >> 15) & 1) ^ 1; 3892 seg_32bit = (entry_2 >> 22) & 1; 3893 limit_in_pages = (entry_2 >> 23) & 1; 3894 useable = (entry_2 >> 20) & 1; 3895 #ifdef TARGET_ABI32 3896 lm = 0; 3897 #else 3898 lm = (entry_2 >> 21) & 1; 3899 #endif 3900 flags = (seg_32bit << 0) | (contents << 1) | 3901 (read_exec_only << 3) | (limit_in_pages << 4) | 3902 (seg_not_present << 5) | (useable << 6) | (lm << 7); 3903 limit = (entry_1 & 0xffff) | (entry_2 & 0xf0000); 3904 base_addr = (entry_1 >> 16) | 3905 (entry_2 & 0xff000000) | 3906 ((entry_2 & 0xff) << 16); 3907 target_ldt_info->base_addr = tswapal(base_addr); 3908 target_ldt_info->limit = tswap32(limit); 3909 target_ldt_info->flags = tswap32(flags); 3910 unlock_user_struct(target_ldt_info, ptr, 1); 3911 return 0; 3912 } 3913 #endif /* TARGET_I386 && TARGET_ABI32 */ 3914 3915 #ifndef TARGET_ABI32 3916 static abi_long do_arch_prctl(CPUX86State *env, int code, abi_ulong addr) 3917 { 3918 abi_long ret = 0; 3919 abi_ulong val; 3920 int idx; 3921 3922 switch(code) { 3923 case TARGET_ARCH_SET_GS: 3924 case TARGET_ARCH_SET_FS: 3925 if (code == TARGET_ARCH_SET_GS) 3926 idx = R_GS; 3927 else 3928 idx = R_FS; 3929 cpu_x86_load_seg(env, idx, 0); 3930 env->segs[idx].base = addr; 3931 break; 3932 case TARGET_ARCH_GET_GS: 3933 case TARGET_ARCH_GET_FS: 3934 if (code == TARGET_ARCH_GET_GS) 3935 idx = R_GS; 3936 else 3937 idx = R_FS; 3938 val = env->segs[idx].base; 3939 if (put_user(val, addr, abi_ulong)) 3940 ret = -TARGET_EFAULT; 3941 break; 3942 default: 3943 ret = -TARGET_EINVAL; 3944 break; 3945 } 3946 return ret; 3947 } 3948 #endif 3949 3950 #endif /* defined(TARGET_I386) */ 3951 3952 #define NEW_STACK_SIZE 0x40000 3953 3954 #if defined(CONFIG_USE_NPTL) 3955 3956 static pthread_mutex_t clone_lock = PTHREAD_MUTEX_INITIALIZER; 3957 typedef struct { 3958 CPUState *env; 3959 pthread_mutex_t mutex; 3960 pthread_cond_t cond; 3961 pthread_t thread; 3962 uint32_t tid; 3963 abi_ulong child_tidptr; 3964 abi_ulong parent_tidptr; 3965 sigset_t sigmask; 3966 } new_thread_info; 3967 3968 static void *clone_func(void *arg) 3969 { 3970 new_thread_info *info = arg; 3971 CPUState *env; 3972 TaskState *ts; 3973 3974 env = info->env; 3975 thread_env = env; 3976 ts = (TaskState *)thread_env->opaque; 3977 info->tid = gettid(); 3978 env->host_tid = info->tid; 3979 task_settid(ts); 3980 if (info->child_tidptr) 3981 put_user_u32(info->tid, info->child_tidptr); 3982 if (info->parent_tidptr) 3983 put_user_u32(info->tid, info->parent_tidptr); 3984 /* Enable signals. */ 3985 sigprocmask(SIG_SETMASK, &info->sigmask, NULL); 3986 /* Signal to the parent that we're ready. */ 3987 pthread_mutex_lock(&info->mutex); 3988 pthread_cond_broadcast(&info->cond); 3989 pthread_mutex_unlock(&info->mutex); 3990 /* Wait until the parent has finshed initializing the tls state. */ 3991 pthread_mutex_lock(&clone_lock); 3992 pthread_mutex_unlock(&clone_lock); 3993 cpu_loop(env); 3994 /* never exits */ 3995 return NULL; 3996 } 3997 #else 3998 3999 static int clone_func(void *arg) 4000 { 4001 CPUState *env = arg; 4002 cpu_loop(env); 4003 /* never exits */ 4004 return 0; 4005 } 4006 #endif 4007 4008 /* do_fork() Must return host values and target errnos (unlike most 4009 do_*() functions). */ 4010 static int do_fork(CPUState *env, unsigned int flags, abi_ulong newsp, 4011 abi_ulong parent_tidptr, target_ulong newtls, 4012 abi_ulong child_tidptr) 4013 { 4014 int ret; 4015 TaskState *ts; 4016 CPUState *new_env; 4017 #if defined(CONFIG_USE_NPTL) 4018 unsigned int nptl_flags; 4019 sigset_t sigmask; 4020 #else 4021 uint8_t *new_stack; 4022 #endif 4023 4024 /* Emulate vfork() with fork() */ 4025 if (flags & CLONE_VFORK) 4026 flags &= ~(CLONE_VFORK | CLONE_VM); 4027 4028 if (flags & CLONE_VM) { 4029 TaskState *parent_ts = (TaskState *)env->opaque; 4030 #if defined(CONFIG_USE_NPTL) 4031 new_thread_info info; 4032 pthread_attr_t attr; 4033 #endif 4034 ts = g_malloc0(sizeof(TaskState)); 4035 init_task_state(ts); 4036 /* we create a new CPU instance. */ 4037 new_env = cpu_copy(env); 4038 #if defined(TARGET_I386) || defined(TARGET_SPARC) || defined(TARGET_PPC) 4039 cpu_reset(new_env); 4040 #endif 4041 /* Init regs that differ from the parent. */ 4042 cpu_clone_regs(new_env, newsp); 4043 new_env->opaque = ts; 4044 ts->bprm = parent_ts->bprm; 4045 ts->info = parent_ts->info; 4046 #if defined(CONFIG_USE_NPTL) 4047 nptl_flags = flags; 4048 flags &= ~CLONE_NPTL_FLAGS2; 4049 4050 if (nptl_flags & CLONE_CHILD_CLEARTID) { 4051 ts->child_tidptr = child_tidptr; 4052 } 4053 4054 if (nptl_flags & CLONE_SETTLS) 4055 cpu_set_tls (new_env, newtls); 4056 4057 /* Grab a mutex so that thread setup appears atomic. */ 4058 pthread_mutex_lock(&clone_lock); 4059 4060 memset(&info, 0, sizeof(info)); 4061 pthread_mutex_init(&info.mutex, NULL); 4062 pthread_mutex_lock(&info.mutex); 4063 pthread_cond_init(&info.cond, NULL); 4064 info.env = new_env; 4065 if (nptl_flags & CLONE_CHILD_SETTID) 4066 info.child_tidptr = child_tidptr; 4067 if (nptl_flags & CLONE_PARENT_SETTID) 4068 info.parent_tidptr = parent_tidptr; 4069 4070 ret = pthread_attr_init(&attr); 4071 ret = pthread_attr_setstacksize(&attr, NEW_STACK_SIZE); 4072 ret = pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED); 4073 /* It is not safe to deliver signals until the child has finished 4074 initializing, so temporarily block all signals. */ 4075 sigfillset(&sigmask); 4076 sigprocmask(SIG_BLOCK, &sigmask, &info.sigmask); 4077 4078 ret = pthread_create(&info.thread, &attr, clone_func, &info); 4079 /* TODO: Free new CPU state if thread creation failed. */ 4080 4081 sigprocmask(SIG_SETMASK, &info.sigmask, NULL); 4082 pthread_attr_destroy(&attr); 4083 if (ret == 0) { 4084 /* Wait for the child to initialize. */ 4085 pthread_cond_wait(&info.cond, &info.mutex); 4086 ret = info.tid; 4087 if (flags & CLONE_PARENT_SETTID) 4088 put_user_u32(ret, parent_tidptr); 4089 } else { 4090 ret = -1; 4091 } 4092 pthread_mutex_unlock(&info.mutex); 4093 pthread_cond_destroy(&info.cond); 4094 pthread_mutex_destroy(&info.mutex); 4095 pthread_mutex_unlock(&clone_lock); 4096 #else 4097 if (flags & CLONE_NPTL_FLAGS2) 4098 return -EINVAL; 4099 /* This is probably going to die very quickly, but do it anyway. */ 4100 new_stack = g_malloc0 (NEW_STACK_SIZE); 4101 #ifdef __ia64__ 4102 ret = __clone2(clone_func, new_stack, NEW_STACK_SIZE, flags, new_env); 4103 #else 4104 ret = clone(clone_func, new_stack + NEW_STACK_SIZE, flags, new_env); 4105 #endif 4106 #endif 4107 } else { 4108 /* if no CLONE_VM, we consider it is a fork */ 4109 if ((flags & ~(CSIGNAL | CLONE_NPTL_FLAGS2)) != 0) 4110 return -EINVAL; 4111 fork_start(); 4112 ret = fork(); 4113 if (ret == 0) { 4114 /* Child Process. */ 4115 cpu_clone_regs(env, newsp); 4116 fork_end(1); 4117 #if defined(CONFIG_USE_NPTL) 4118 /* There is a race condition here. The parent process could 4119 theoretically read the TID in the child process before the child 4120 tid is set. This would require using either ptrace 4121 (not implemented) or having *_tidptr to point at a shared memory 4122 mapping. We can't repeat the spinlock hack used above because 4123 the child process gets its own copy of the lock. */ 4124 if (flags & CLONE_CHILD_SETTID) 4125 put_user_u32(gettid(), child_tidptr); 4126 if (flags & CLONE_PARENT_SETTID) 4127 put_user_u32(gettid(), parent_tidptr); 4128 ts = (TaskState *)env->opaque; 4129 if (flags & CLONE_SETTLS) 4130 cpu_set_tls (env, newtls); 4131 if (flags & CLONE_CHILD_CLEARTID) 4132 ts->child_tidptr = child_tidptr; 4133 #endif 4134 } else { 4135 fork_end(0); 4136 } 4137 } 4138 return ret; 4139 } 4140 4141 /* warning : doesn't handle linux specific flags... */ 4142 static int target_to_host_fcntl_cmd(int cmd) 4143 { 4144 switch(cmd) { 4145 case TARGET_F_DUPFD: 4146 case TARGET_F_GETFD: 4147 case TARGET_F_SETFD: 4148 case TARGET_F_GETFL: 4149 case TARGET_F_SETFL: 4150 return cmd; 4151 case TARGET_F_GETLK: 4152 return F_GETLK; 4153 case TARGET_F_SETLK: 4154 return F_SETLK; 4155 case TARGET_F_SETLKW: 4156 return F_SETLKW; 4157 case TARGET_F_GETOWN: 4158 return F_GETOWN; 4159 case TARGET_F_SETOWN: 4160 return F_SETOWN; 4161 case TARGET_F_GETSIG: 4162 return F_GETSIG; 4163 case TARGET_F_SETSIG: 4164 return F_SETSIG; 4165 #if TARGET_ABI_BITS == 32 4166 case TARGET_F_GETLK64: 4167 return F_GETLK64; 4168 case TARGET_F_SETLK64: 4169 return F_SETLK64; 4170 case TARGET_F_SETLKW64: 4171 return F_SETLKW64; 4172 #endif 4173 case TARGET_F_SETLEASE: 4174 return F_SETLEASE; 4175 case TARGET_F_GETLEASE: 4176 return F_GETLEASE; 4177 #ifdef F_DUPFD_CLOEXEC 4178 case TARGET_F_DUPFD_CLOEXEC: 4179 return F_DUPFD_CLOEXEC; 4180 #endif 4181 case TARGET_F_NOTIFY: 4182 return F_NOTIFY; 4183 default: 4184 return -TARGET_EINVAL; 4185 } 4186 return -TARGET_EINVAL; 4187 } 4188 4189 static abi_long do_fcntl(int fd, int cmd, abi_ulong arg) 4190 { 4191 struct flock fl; 4192 struct target_flock *target_fl; 4193 struct flock64 fl64; 4194 struct target_flock64 *target_fl64; 4195 abi_long ret; 4196 int host_cmd = target_to_host_fcntl_cmd(cmd); 4197 4198 if (host_cmd == -TARGET_EINVAL) 4199 return host_cmd; 4200 4201 switch(cmd) { 4202 case TARGET_F_GETLK: 4203 if (!lock_user_struct(VERIFY_READ, target_fl, arg, 1)) 4204 return -TARGET_EFAULT; 4205 fl.l_type = tswap16(target_fl->l_type); 4206 fl.l_whence = tswap16(target_fl->l_whence); 4207 fl.l_start = tswapal(target_fl->l_start); 4208 fl.l_len = tswapal(target_fl->l_len); 4209 fl.l_pid = tswap32(target_fl->l_pid); 4210 unlock_user_struct(target_fl, arg, 0); 4211 ret = get_errno(fcntl(fd, host_cmd, &fl)); 4212 if (ret == 0) { 4213 if (!lock_user_struct(VERIFY_WRITE, target_fl, arg, 0)) 4214 return -TARGET_EFAULT; 4215 target_fl->l_type = tswap16(fl.l_type); 4216 target_fl->l_whence = tswap16(fl.l_whence); 4217 target_fl->l_start = tswapal(fl.l_start); 4218 target_fl->l_len = tswapal(fl.l_len); 4219 target_fl->l_pid = tswap32(fl.l_pid); 4220 unlock_user_struct(target_fl, arg, 1); 4221 } 4222 break; 4223 4224 case TARGET_F_SETLK: 4225 case TARGET_F_SETLKW: 4226 if (!lock_user_struct(VERIFY_READ, target_fl, arg, 1)) 4227 return -TARGET_EFAULT; 4228 fl.l_type = tswap16(target_fl->l_type); 4229 fl.l_whence = tswap16(target_fl->l_whence); 4230 fl.l_start = tswapal(target_fl->l_start); 4231 fl.l_len = tswapal(target_fl->l_len); 4232 fl.l_pid = tswap32(target_fl->l_pid); 4233 unlock_user_struct(target_fl, arg, 0); 4234 ret = get_errno(fcntl(fd, host_cmd, &fl)); 4235 break; 4236 4237 case TARGET_F_GETLK64: 4238 if (!lock_user_struct(VERIFY_READ, target_fl64, arg, 1)) 4239 return -TARGET_EFAULT; 4240 fl64.l_type = tswap16(target_fl64->l_type) >> 1; 4241 fl64.l_whence = tswap16(target_fl64->l_whence); 4242 fl64.l_start = tswap64(target_fl64->l_start); 4243 fl64.l_len = tswap64(target_fl64->l_len); 4244 fl64.l_pid = tswap32(target_fl64->l_pid); 4245 unlock_user_struct(target_fl64, arg, 0); 4246 ret = get_errno(fcntl(fd, host_cmd, &fl64)); 4247 if (ret == 0) { 4248 if (!lock_user_struct(VERIFY_WRITE, target_fl64, arg, 0)) 4249 return -TARGET_EFAULT; 4250 target_fl64->l_type = tswap16(fl64.l_type) >> 1; 4251 target_fl64->l_whence = tswap16(fl64.l_whence); 4252 target_fl64->l_start = tswap64(fl64.l_start); 4253 target_fl64->l_len = tswap64(fl64.l_len); 4254 target_fl64->l_pid = tswap32(fl64.l_pid); 4255 unlock_user_struct(target_fl64, arg, 1); 4256 } 4257 break; 4258 case TARGET_F_SETLK64: 4259 case TARGET_F_SETLKW64: 4260 if (!lock_user_struct(VERIFY_READ, target_fl64, arg, 1)) 4261 return -TARGET_EFAULT; 4262 fl64.l_type = tswap16(target_fl64->l_type) >> 1; 4263 fl64.l_whence = tswap16(target_fl64->l_whence); 4264 fl64.l_start = tswap64(target_fl64->l_start); 4265 fl64.l_len = tswap64(target_fl64->l_len); 4266 fl64.l_pid = tswap32(target_fl64->l_pid); 4267 unlock_user_struct(target_fl64, arg, 0); 4268 ret = get_errno(fcntl(fd, host_cmd, &fl64)); 4269 break; 4270 4271 case TARGET_F_GETFL: 4272 ret = get_errno(fcntl(fd, host_cmd, arg)); 4273 if (ret >= 0) { 4274 ret = host_to_target_bitmask(ret, fcntl_flags_tbl); 4275 } 4276 break; 4277 4278 case TARGET_F_SETFL: 4279 ret = get_errno(fcntl(fd, host_cmd, target_to_host_bitmask(arg, fcntl_flags_tbl))); 4280 break; 4281 4282 case TARGET_F_SETOWN: 4283 case TARGET_F_GETOWN: 4284 case TARGET_F_SETSIG: 4285 case TARGET_F_GETSIG: 4286 case TARGET_F_SETLEASE: 4287 case TARGET_F_GETLEASE: 4288 ret = get_errno(fcntl(fd, host_cmd, arg)); 4289 break; 4290 4291 default: 4292 ret = get_errno(fcntl(fd, cmd, arg)); 4293 break; 4294 } 4295 return ret; 4296 } 4297 4298 #ifdef USE_UID16 4299 4300 static inline int high2lowuid(int uid) 4301 { 4302 if (uid > 65535) 4303 return 65534; 4304 else 4305 return uid; 4306 } 4307 4308 static inline int high2lowgid(int gid) 4309 { 4310 if (gid > 65535) 4311 return 65534; 4312 else 4313 return gid; 4314 } 4315 4316 static inline int low2highuid(int uid) 4317 { 4318 if ((int16_t)uid == -1) 4319 return -1; 4320 else 4321 return uid; 4322 } 4323 4324 static inline int low2highgid(int gid) 4325 { 4326 if ((int16_t)gid == -1) 4327 return -1; 4328 else 4329 return gid; 4330 } 4331 static inline int tswapid(int id) 4332 { 4333 return tswap16(id); 4334 } 4335 #else /* !USE_UID16 */ 4336 static inline int high2lowuid(int uid) 4337 { 4338 return uid; 4339 } 4340 static inline int high2lowgid(int gid) 4341 { 4342 return gid; 4343 } 4344 static inline int low2highuid(int uid) 4345 { 4346 return uid; 4347 } 4348 static inline int low2highgid(int gid) 4349 { 4350 return gid; 4351 } 4352 static inline int tswapid(int id) 4353 { 4354 return tswap32(id); 4355 } 4356 #endif /* USE_UID16 */ 4357 4358 void syscall_init(void) 4359 { 4360 IOCTLEntry *ie; 4361 const argtype *arg_type; 4362 int size; 4363 int i; 4364 4365 #define STRUCT(name, ...) thunk_register_struct(STRUCT_ ## name, #name, struct_ ## name ## _def); 4366 #define STRUCT_SPECIAL(name) thunk_register_struct_direct(STRUCT_ ## name, #name, &struct_ ## name ## _def); 4367 #include "syscall_types.h" 4368 #undef STRUCT 4369 #undef STRUCT_SPECIAL 4370 4371 /* we patch the ioctl size if necessary. We rely on the fact that 4372 no ioctl has all the bits at '1' in the size field */ 4373 ie = ioctl_entries; 4374 while (ie->target_cmd != 0) { 4375 if (((ie->target_cmd >> TARGET_IOC_SIZESHIFT) & TARGET_IOC_SIZEMASK) == 4376 TARGET_IOC_SIZEMASK) { 4377 arg_type = ie->arg_type; 4378 if (arg_type[0] != TYPE_PTR) { 4379 fprintf(stderr, "cannot patch size for ioctl 0x%x\n", 4380 ie->target_cmd); 4381 exit(1); 4382 } 4383 arg_type++; 4384 size = thunk_type_size(arg_type, 0); 4385 ie->target_cmd = (ie->target_cmd & 4386 ~(TARGET_IOC_SIZEMASK << TARGET_IOC_SIZESHIFT)) | 4387 (size << TARGET_IOC_SIZESHIFT); 4388 } 4389 4390 /* Build target_to_host_errno_table[] table from 4391 * host_to_target_errno_table[]. */ 4392 for (i=0; i < ERRNO_TABLE_SIZE; i++) 4393 target_to_host_errno_table[host_to_target_errno_table[i]] = i; 4394 4395 /* automatic consistency check if same arch */ 4396 #if (defined(__i386__) && defined(TARGET_I386) && defined(TARGET_ABI32)) || \ 4397 (defined(__x86_64__) && defined(TARGET_X86_64)) 4398 if (unlikely(ie->target_cmd != ie->host_cmd)) { 4399 fprintf(stderr, "ERROR: ioctl(%s): target=0x%x host=0x%x\n", 4400 ie->name, ie->target_cmd, ie->host_cmd); 4401 } 4402 #endif 4403 ie++; 4404 } 4405 } 4406 4407 #if TARGET_ABI_BITS == 32 4408 static inline uint64_t target_offset64(uint32_t word0, uint32_t word1) 4409 { 4410 #ifdef TARGET_WORDS_BIGENDIAN 4411 return ((uint64_t)word0 << 32) | word1; 4412 #else 4413 return ((uint64_t)word1 << 32) | word0; 4414 #endif 4415 } 4416 #else /* TARGET_ABI_BITS == 32 */ 4417 static inline uint64_t target_offset64(uint64_t word0, uint64_t word1) 4418 { 4419 return word0; 4420 } 4421 #endif /* TARGET_ABI_BITS != 32 */ 4422 4423 #ifdef TARGET_NR_truncate64 4424 static inline abi_long target_truncate64(void *cpu_env, const char *arg1, 4425 abi_long arg2, 4426 abi_long arg3, 4427 abi_long arg4) 4428 { 4429 if (regpairs_aligned(cpu_env)) { 4430 arg2 = arg3; 4431 arg3 = arg4; 4432 } 4433 return get_errno(truncate64(arg1, target_offset64(arg2, arg3))); 4434 } 4435 #endif 4436 4437 #ifdef TARGET_NR_ftruncate64 4438 static inline abi_long target_ftruncate64(void *cpu_env, abi_long arg1, 4439 abi_long arg2, 4440 abi_long arg3, 4441 abi_long arg4) 4442 { 4443 if (regpairs_aligned(cpu_env)) { 4444 arg2 = arg3; 4445 arg3 = arg4; 4446 } 4447 return get_errno(ftruncate64(arg1, target_offset64(arg2, arg3))); 4448 } 4449 #endif 4450 4451 static inline abi_long target_to_host_timespec(struct timespec *host_ts, 4452 abi_ulong target_addr) 4453 { 4454 struct target_timespec *target_ts; 4455 4456 if (!lock_user_struct(VERIFY_READ, target_ts, target_addr, 1)) 4457 return -TARGET_EFAULT; 4458 host_ts->tv_sec = tswapal(target_ts->tv_sec); 4459 host_ts->tv_nsec = tswapal(target_ts->tv_nsec); 4460 unlock_user_struct(target_ts, target_addr, 0); 4461 return 0; 4462 } 4463 4464 static inline abi_long host_to_target_timespec(abi_ulong target_addr, 4465 struct timespec *host_ts) 4466 { 4467 struct target_timespec *target_ts; 4468 4469 if (!lock_user_struct(VERIFY_WRITE, target_ts, target_addr, 0)) 4470 return -TARGET_EFAULT; 4471 target_ts->tv_sec = tswapal(host_ts->tv_sec); 4472 target_ts->tv_nsec = tswapal(host_ts->tv_nsec); 4473 unlock_user_struct(target_ts, target_addr, 1); 4474 return 0; 4475 } 4476 4477 #if defined(TARGET_NR_stat64) || defined(TARGET_NR_newfstatat) 4478 static inline abi_long host_to_target_stat64(void *cpu_env, 4479 abi_ulong target_addr, 4480 struct stat *host_st) 4481 { 4482 #ifdef TARGET_ARM 4483 if (((CPUARMState *)cpu_env)->eabi) { 4484 struct target_eabi_stat64 *target_st; 4485 4486 if (!lock_user_struct(VERIFY_WRITE, target_st, target_addr, 0)) 4487 return -TARGET_EFAULT; 4488 memset(target_st, 0, sizeof(struct target_eabi_stat64)); 4489 __put_user(host_st->st_dev, &target_st->st_dev); 4490 __put_user(host_st->st_ino, &target_st->st_ino); 4491 #ifdef TARGET_STAT64_HAS_BROKEN_ST_INO 4492 __put_user(host_st->st_ino, &target_st->__st_ino); 4493 #endif 4494 __put_user(host_st->st_mode, &target_st->st_mode); 4495 __put_user(host_st->st_nlink, &target_st->st_nlink); 4496 __put_user(host_st->st_uid, &target_st->st_uid); 4497 __put_user(host_st->st_gid, &target_st->st_gid); 4498 __put_user(host_st->st_rdev, &target_st->st_rdev); 4499 __put_user(host_st->st_size, &target_st->st_size); 4500 __put_user(host_st->st_blksize, &target_st->st_blksize); 4501 __put_user(host_st->st_blocks, &target_st->st_blocks); 4502 __put_user(host_st->st_atime, &target_st->target_st_atime); 4503 __put_user(host_st->st_mtime, &target_st->target_st_mtime); 4504 __put_user(host_st->st_ctime, &target_st->target_st_ctime); 4505 unlock_user_struct(target_st, target_addr, 1); 4506 } else 4507 #endif 4508 { 4509 #if TARGET_ABI_BITS == 64 && !defined(TARGET_ALPHA) 4510 struct target_stat *target_st; 4511 #else 4512 struct target_stat64 *target_st; 4513 #endif 4514 4515 if (!lock_user_struct(VERIFY_WRITE, target_st, target_addr, 0)) 4516 return -TARGET_EFAULT; 4517 memset(target_st, 0, sizeof(*target_st)); 4518 __put_user(host_st->st_dev, &target_st->st_dev); 4519 __put_user(host_st->st_ino, &target_st->st_ino); 4520 #ifdef TARGET_STAT64_HAS_BROKEN_ST_INO 4521 __put_user(host_st->st_ino, &target_st->__st_ino); 4522 #endif 4523 __put_user(host_st->st_mode, &target_st->st_mode); 4524 __put_user(host_st->st_nlink, &target_st->st_nlink); 4525 __put_user(host_st->st_uid, &target_st->st_uid); 4526 __put_user(host_st->st_gid, &target_st->st_gid); 4527 __put_user(host_st->st_rdev, &target_st->st_rdev); 4528 /* XXX: better use of kernel struct */ 4529 __put_user(host_st->st_size, &target_st->st_size); 4530 __put_user(host_st->st_blksize, &target_st->st_blksize); 4531 __put_user(host_st->st_blocks, &target_st->st_blocks); 4532 __put_user(host_st->st_atime, &target_st->target_st_atime); 4533 __put_user(host_st->st_mtime, &target_st->target_st_mtime); 4534 __put_user(host_st->st_ctime, &target_st->target_st_ctime); 4535 unlock_user_struct(target_st, target_addr, 1); 4536 } 4537 4538 return 0; 4539 } 4540 #endif 4541 4542 #if defined(CONFIG_USE_NPTL) 4543 /* ??? Using host futex calls even when target atomic operations 4544 are not really atomic probably breaks things. However implementing 4545 futexes locally would make futexes shared between multiple processes 4546 tricky. However they're probably useless because guest atomic 4547 operations won't work either. */ 4548 static int do_futex(target_ulong uaddr, int op, int val, target_ulong timeout, 4549 target_ulong uaddr2, int val3) 4550 { 4551 struct timespec ts, *pts; 4552 int base_op; 4553 4554 /* ??? We assume FUTEX_* constants are the same on both host 4555 and target. */ 4556 #ifdef FUTEX_CMD_MASK 4557 base_op = op & FUTEX_CMD_MASK; 4558 #else 4559 base_op = op; 4560 #endif 4561 switch (base_op) { 4562 case FUTEX_WAIT: 4563 if (timeout) { 4564 pts = &ts; 4565 target_to_host_timespec(pts, timeout); 4566 } else { 4567 pts = NULL; 4568 } 4569 return get_errno(sys_futex(g2h(uaddr), op, tswap32(val), 4570 pts, NULL, 0)); 4571 case FUTEX_WAKE: 4572 return get_errno(sys_futex(g2h(uaddr), op, val, NULL, NULL, 0)); 4573 case FUTEX_FD: 4574 return get_errno(sys_futex(g2h(uaddr), op, val, NULL, NULL, 0)); 4575 case FUTEX_REQUEUE: 4576 case FUTEX_CMP_REQUEUE: 4577 case FUTEX_WAKE_OP: 4578 /* For FUTEX_REQUEUE, FUTEX_CMP_REQUEUE, and FUTEX_WAKE_OP, the 4579 TIMEOUT parameter is interpreted as a uint32_t by the kernel. 4580 But the prototype takes a `struct timespec *'; insert casts 4581 to satisfy the compiler. We do not need to tswap TIMEOUT 4582 since it's not compared to guest memory. */ 4583 pts = (struct timespec *)(uintptr_t) timeout; 4584 return get_errno(sys_futex(g2h(uaddr), op, val, pts, 4585 g2h(uaddr2), 4586 (base_op == FUTEX_CMP_REQUEUE 4587 ? tswap32(val3) 4588 : val3))); 4589 default: 4590 return -TARGET_ENOSYS; 4591 } 4592 } 4593 #endif 4594 4595 /* Map host to target signal numbers for the wait family of syscalls. 4596 Assume all other status bits are the same. */ 4597 static int host_to_target_waitstatus(int status) 4598 { 4599 if (WIFSIGNALED(status)) { 4600 return host_to_target_signal(WTERMSIG(status)) | (status & ~0x7f); 4601 } 4602 if (WIFSTOPPED(status)) { 4603 return (host_to_target_signal(WSTOPSIG(status)) << 8) 4604 | (status & 0xff); 4605 } 4606 return status; 4607 } 4608 4609 int get_osversion(void) 4610 { 4611 static int osversion; 4612 struct new_utsname buf; 4613 const char *s; 4614 int i, n, tmp; 4615 if (osversion) 4616 return osversion; 4617 if (qemu_uname_release && *qemu_uname_release) { 4618 s = qemu_uname_release; 4619 } else { 4620 if (sys_uname(&buf)) 4621 return 0; 4622 s = buf.release; 4623 } 4624 tmp = 0; 4625 for (i = 0; i < 3; i++) { 4626 n = 0; 4627 while (*s >= '0' && *s <= '9') { 4628 n *= 10; 4629 n += *s - '0'; 4630 s++; 4631 } 4632 tmp = (tmp << 8) + n; 4633 if (*s == '.') 4634 s++; 4635 } 4636 osversion = tmp; 4637 return osversion; 4638 } 4639 4640 4641 static int open_self_maps(void *cpu_env, int fd) 4642 { 4643 TaskState *ts = ((CPUState *)cpu_env)->opaque; 4644 4645 dprintf(fd, "%08llx-%08llx rw-p %08llx 00:00 0 [stack]\n", 4646 (unsigned long long)ts->info->stack_limit, 4647 (unsigned long long)(ts->stack_base + (TARGET_PAGE_SIZE - 1)) 4648 & TARGET_PAGE_MASK, 4649 (unsigned long long)ts->stack_base); 4650 4651 return 0; 4652 } 4653 4654 static int open_self_stat(void *cpu_env, int fd) 4655 { 4656 TaskState *ts = ((CPUState *)cpu_env)->opaque; 4657 abi_ulong start_stack = ts->info->start_stack; 4658 int i; 4659 4660 for (i = 0; i < 44; i++) { 4661 char buf[128]; 4662 int len; 4663 uint64_t val = 0; 4664 4665 if (i == 27) { 4666 /* stack bottom */ 4667 val = start_stack; 4668 } 4669 snprintf(buf, sizeof(buf), "%"PRId64 "%c", val, i == 43 ? '\n' : ' '); 4670 len = strlen(buf); 4671 if (write(fd, buf, len) != len) { 4672 return -1; 4673 } 4674 } 4675 4676 return 0; 4677 } 4678 4679 static int open_self_auxv(void *cpu_env, int fd) 4680 { 4681 TaskState *ts = ((CPUState *)cpu_env)->opaque; 4682 abi_ulong auxv = ts->info->saved_auxv; 4683 abi_ulong len = ts->info->auxv_len; 4684 char *ptr; 4685 4686 /* 4687 * Auxiliary vector is stored in target process stack. 4688 * read in whole auxv vector and copy it to file 4689 */ 4690 ptr = lock_user(VERIFY_READ, auxv, len, 0); 4691 if (ptr != NULL) { 4692 while (len > 0) { 4693 ssize_t r; 4694 r = write(fd, ptr, len); 4695 if (r <= 0) { 4696 break; 4697 } 4698 len -= r; 4699 ptr += r; 4700 } 4701 lseek(fd, 0, SEEK_SET); 4702 unlock_user(ptr, auxv, len); 4703 } 4704 4705 return 0; 4706 } 4707 4708 static int do_open(void *cpu_env, const char *pathname, int flags, mode_t mode) 4709 { 4710 struct fake_open { 4711 const char *filename; 4712 int (*fill)(void *cpu_env, int fd); 4713 }; 4714 const struct fake_open *fake_open; 4715 static const struct fake_open fakes[] = { 4716 { "/proc/self/maps", open_self_maps }, 4717 { "/proc/self/stat", open_self_stat }, 4718 { "/proc/self/auxv", open_self_auxv }, 4719 { NULL, NULL } 4720 }; 4721 4722 for (fake_open = fakes; fake_open->filename; fake_open++) { 4723 if (!strncmp(pathname, fake_open->filename, 4724 strlen(fake_open->filename))) { 4725 break; 4726 } 4727 } 4728 4729 if (fake_open->filename) { 4730 const char *tmpdir; 4731 char filename[PATH_MAX]; 4732 int fd, r; 4733 4734 /* create temporary file to map stat to */ 4735 tmpdir = getenv("TMPDIR"); 4736 if (!tmpdir) 4737 tmpdir = "/tmp"; 4738 snprintf(filename, sizeof(filename), "%s/qemu-open.XXXXXX", tmpdir); 4739 fd = mkstemp(filename); 4740 if (fd < 0) { 4741 return fd; 4742 } 4743 unlink(filename); 4744 4745 if ((r = fake_open->fill(cpu_env, fd))) { 4746 close(fd); 4747 return r; 4748 } 4749 lseek(fd, 0, SEEK_SET); 4750 4751 return fd; 4752 } 4753 4754 return get_errno(open(path(pathname), flags, mode)); 4755 } 4756 4757 /* do_syscall() should always have a single exit point at the end so 4758 that actions, such as logging of syscall results, can be performed. 4759 All errnos that do_syscall() returns must be -TARGET_<errcode>. */ 4760 abi_long do_syscall(void *cpu_env, int num, abi_long arg1, 4761 abi_long arg2, abi_long arg3, abi_long arg4, 4762 abi_long arg5, abi_long arg6, abi_long arg7, 4763 abi_long arg8) 4764 { 4765 abi_long ret; 4766 struct stat st; 4767 struct statfs stfs; 4768 void *p; 4769 4770 #ifdef DEBUG 4771 gemu_log("syscall %d", num); 4772 #endif 4773 if(do_strace) 4774 print_syscall(num, arg1, arg2, arg3, arg4, arg5, arg6); 4775 4776 switch(num) { 4777 case TARGET_NR_exit: 4778 #ifdef CONFIG_USE_NPTL 4779 /* In old applications this may be used to implement _exit(2). 4780 However in threaded applictions it is used for thread termination, 4781 and _exit_group is used for application termination. 4782 Do thread termination if we have more then one thread. */ 4783 /* FIXME: This probably breaks if a signal arrives. We should probably 4784 be disabling signals. */ 4785 if (first_cpu->next_cpu) { 4786 TaskState *ts; 4787 CPUState **lastp; 4788 CPUState *p; 4789 4790 cpu_list_lock(); 4791 lastp = &first_cpu; 4792 p = first_cpu; 4793 while (p && p != (CPUState *)cpu_env) { 4794 lastp = &p->next_cpu; 4795 p = p->next_cpu; 4796 } 4797 /* If we didn't find the CPU for this thread then something is 4798 horribly wrong. */ 4799 if (!p) 4800 abort(); 4801 /* Remove the CPU from the list. */ 4802 *lastp = p->next_cpu; 4803 cpu_list_unlock(); 4804 ts = ((CPUState *)cpu_env)->opaque; 4805 if (ts->child_tidptr) { 4806 put_user_u32(0, ts->child_tidptr); 4807 sys_futex(g2h(ts->child_tidptr), FUTEX_WAKE, INT_MAX, 4808 NULL, NULL, 0); 4809 } 4810 thread_env = NULL; 4811 g_free(cpu_env); 4812 g_free(ts); 4813 pthread_exit(NULL); 4814 } 4815 #endif 4816 #ifdef TARGET_GPROF 4817 _mcleanup(); 4818 #endif 4819 gdb_exit(cpu_env, arg1); 4820 _exit(arg1); 4821 ret = 0; /* avoid warning */ 4822 break; 4823 case TARGET_NR_read: 4824 if (arg3 == 0) 4825 ret = 0; 4826 else { 4827 if (!(p = lock_user(VERIFY_WRITE, arg2, arg3, 0))) 4828 goto efault; 4829 ret = get_errno(read(arg1, p, arg3)); 4830 unlock_user(p, arg2, ret); 4831 } 4832 break; 4833 case TARGET_NR_write: 4834 if (!(p = lock_user(VERIFY_READ, arg2, arg3, 1))) 4835 goto efault; 4836 ret = get_errno(write(arg1, p, arg3)); 4837 unlock_user(p, arg2, 0); 4838 break; 4839 case TARGET_NR_open: 4840 if (!(p = lock_user_string(arg1))) 4841 goto efault; 4842 ret = get_errno(do_open(cpu_env, p, 4843 target_to_host_bitmask(arg2, fcntl_flags_tbl), 4844 arg3)); 4845 unlock_user(p, arg1, 0); 4846 break; 4847 #if defined(TARGET_NR_openat) && defined(__NR_openat) 4848 case TARGET_NR_openat: 4849 if (!(p = lock_user_string(arg2))) 4850 goto efault; 4851 ret = get_errno(sys_openat(arg1, 4852 path(p), 4853 target_to_host_bitmask(arg3, fcntl_flags_tbl), 4854 arg4)); 4855 unlock_user(p, arg2, 0); 4856 break; 4857 #endif 4858 case TARGET_NR_close: 4859 ret = get_errno(close(arg1)); 4860 break; 4861 case TARGET_NR_brk: 4862 ret = do_brk(arg1); 4863 break; 4864 case TARGET_NR_fork: 4865 ret = get_errno(do_fork(cpu_env, SIGCHLD, 0, 0, 0, 0)); 4866 break; 4867 #ifdef TARGET_NR_waitpid 4868 case TARGET_NR_waitpid: 4869 { 4870 int status; 4871 ret = get_errno(waitpid(arg1, &status, arg3)); 4872 if (!is_error(ret) && arg2 && ret 4873 && put_user_s32(host_to_target_waitstatus(status), arg2)) 4874 goto efault; 4875 } 4876 break; 4877 #endif 4878 #ifdef TARGET_NR_waitid 4879 case TARGET_NR_waitid: 4880 { 4881 siginfo_t info; 4882 info.si_pid = 0; 4883 ret = get_errno(waitid(arg1, arg2, &info, arg4)); 4884 if (!is_error(ret) && arg3 && info.si_pid != 0) { 4885 if (!(p = lock_user(VERIFY_WRITE, arg3, sizeof(target_siginfo_t), 0))) 4886 goto efault; 4887 host_to_target_siginfo(p, &info); 4888 unlock_user(p, arg3, sizeof(target_siginfo_t)); 4889 } 4890 } 4891 break; 4892 #endif 4893 #ifdef TARGET_NR_creat /* not on alpha */ 4894 case TARGET_NR_creat: 4895 if (!(p = lock_user_string(arg1))) 4896 goto efault; 4897 ret = get_errno(creat(p, arg2)); 4898 unlock_user(p, arg1, 0); 4899 break; 4900 #endif 4901 case TARGET_NR_link: 4902 { 4903 void * p2; 4904 p = lock_user_string(arg1); 4905 p2 = lock_user_string(arg2); 4906 if (!p || !p2) 4907 ret = -TARGET_EFAULT; 4908 else 4909 ret = get_errno(link(p, p2)); 4910 unlock_user(p2, arg2, 0); 4911 unlock_user(p, arg1, 0); 4912 } 4913 break; 4914 #if defined(TARGET_NR_linkat) && defined(__NR_linkat) 4915 case TARGET_NR_linkat: 4916 { 4917 void * p2 = NULL; 4918 if (!arg2 || !arg4) 4919 goto efault; 4920 p = lock_user_string(arg2); 4921 p2 = lock_user_string(arg4); 4922 if (!p || !p2) 4923 ret = -TARGET_EFAULT; 4924 else 4925 ret = get_errno(sys_linkat(arg1, p, arg3, p2, arg5)); 4926 unlock_user(p, arg2, 0); 4927 unlock_user(p2, arg4, 0); 4928 } 4929 break; 4930 #endif 4931 case TARGET_NR_unlink: 4932 if (!(p = lock_user_string(arg1))) 4933 goto efault; 4934 ret = get_errno(unlink(p)); 4935 unlock_user(p, arg1, 0); 4936 break; 4937 #if defined(TARGET_NR_unlinkat) && defined(__NR_unlinkat) 4938 case TARGET_NR_unlinkat: 4939 if (!(p = lock_user_string(arg2))) 4940 goto efault; 4941 ret = get_errno(sys_unlinkat(arg1, p, arg3)); 4942 unlock_user(p, arg2, 0); 4943 break; 4944 #endif 4945 case TARGET_NR_execve: 4946 { 4947 char **argp, **envp; 4948 int argc, envc; 4949 abi_ulong gp; 4950 abi_ulong guest_argp; 4951 abi_ulong guest_envp; 4952 abi_ulong addr; 4953 char **q; 4954 int total_size = 0; 4955 4956 argc = 0; 4957 guest_argp = arg2; 4958 for (gp = guest_argp; gp; gp += sizeof(abi_ulong)) { 4959 if (get_user_ual(addr, gp)) 4960 goto efault; 4961 if (!addr) 4962 break; 4963 argc++; 4964 } 4965 envc = 0; 4966 guest_envp = arg3; 4967 for (gp = guest_envp; gp; gp += sizeof(abi_ulong)) { 4968 if (get_user_ual(addr, gp)) 4969 goto efault; 4970 if (!addr) 4971 break; 4972 envc++; 4973 } 4974 4975 argp = alloca((argc + 1) * sizeof(void *)); 4976 envp = alloca((envc + 1) * sizeof(void *)); 4977 4978 for (gp = guest_argp, q = argp; gp; 4979 gp += sizeof(abi_ulong), q++) { 4980 if (get_user_ual(addr, gp)) 4981 goto execve_efault; 4982 if (!addr) 4983 break; 4984 if (!(*q = lock_user_string(addr))) 4985 goto execve_efault; 4986 total_size += strlen(*q) + 1; 4987 } 4988 *q = NULL; 4989 4990 for (gp = guest_envp, q = envp; gp; 4991 gp += sizeof(abi_ulong), q++) { 4992 if (get_user_ual(addr, gp)) 4993 goto execve_efault; 4994 if (!addr) 4995 break; 4996 if (!(*q = lock_user_string(addr))) 4997 goto execve_efault; 4998 total_size += strlen(*q) + 1; 4999 } 5000 *q = NULL; 5001 5002 /* This case will not be caught by the host's execve() if its 5003 page size is bigger than the target's. */ 5004 if (total_size > MAX_ARG_PAGES * TARGET_PAGE_SIZE) { 5005 ret = -TARGET_E2BIG; 5006 goto execve_end; 5007 } 5008 if (!(p = lock_user_string(arg1))) 5009 goto execve_efault; 5010 ret = get_errno(execve(p, argp, envp)); 5011 unlock_user(p, arg1, 0); 5012 5013 goto execve_end; 5014 5015 execve_efault: 5016 ret = -TARGET_EFAULT; 5017 5018 execve_end: 5019 for (gp = guest_argp, q = argp; *q; 5020 gp += sizeof(abi_ulong), q++) { 5021 if (get_user_ual(addr, gp) 5022 || !addr) 5023 break; 5024 unlock_user(*q, addr, 0); 5025 } 5026 for (gp = guest_envp, q = envp; *q; 5027 gp += sizeof(abi_ulong), q++) { 5028 if (get_user_ual(addr, gp) 5029 || !addr) 5030 break; 5031 unlock_user(*q, addr, 0); 5032 } 5033 } 5034 break; 5035 case TARGET_NR_chdir: 5036 if (!(p = lock_user_string(arg1))) 5037 goto efault; 5038 ret = get_errno(chdir(p)); 5039 unlock_user(p, arg1, 0); 5040 break; 5041 #ifdef TARGET_NR_time 5042 case TARGET_NR_time: 5043 { 5044 time_t host_time; 5045 ret = get_errno(time(&host_time)); 5046 if (!is_error(ret) 5047 && arg1 5048 && put_user_sal(host_time, arg1)) 5049 goto efault; 5050 } 5051 break; 5052 #endif 5053 case TARGET_NR_mknod: 5054 if (!(p = lock_user_string(arg1))) 5055 goto efault; 5056 ret = get_errno(mknod(p, arg2, arg3)); 5057 unlock_user(p, arg1, 0); 5058 break; 5059 #if defined(TARGET_NR_mknodat) && defined(__NR_mknodat) 5060 case TARGET_NR_mknodat: 5061 if (!(p = lock_user_string(arg2))) 5062 goto efault; 5063 ret = get_errno(sys_mknodat(arg1, p, arg3, arg4)); 5064 unlock_user(p, arg2, 0); 5065 break; 5066 #endif 5067 case TARGET_NR_chmod: 5068 if (!(p = lock_user_string(arg1))) 5069 goto efault; 5070 ret = get_errno(chmod(p, arg2)); 5071 unlock_user(p, arg1, 0); 5072 break; 5073 #ifdef TARGET_NR_break 5074 case TARGET_NR_break: 5075 goto unimplemented; 5076 #endif 5077 #ifdef TARGET_NR_oldstat 5078 case TARGET_NR_oldstat: 5079 goto unimplemented; 5080 #endif 5081 case TARGET_NR_lseek: 5082 ret = get_errno(lseek(arg1, arg2, arg3)); 5083 break; 5084 #if defined(TARGET_NR_getxpid) && defined(TARGET_ALPHA) 5085 /* Alpha specific */ 5086 case TARGET_NR_getxpid: 5087 ((CPUAlphaState *)cpu_env)->ir[IR_A4] = getppid(); 5088 ret = get_errno(getpid()); 5089 break; 5090 #endif 5091 #ifdef TARGET_NR_getpid 5092 case TARGET_NR_getpid: 5093 ret = get_errno(getpid()); 5094 break; 5095 #endif 5096 case TARGET_NR_mount: 5097 { 5098 /* need to look at the data field */ 5099 void *p2, *p3; 5100 p = lock_user_string(arg1); 5101 p2 = lock_user_string(arg2); 5102 p3 = lock_user_string(arg3); 5103 if (!p || !p2 || !p3) 5104 ret = -TARGET_EFAULT; 5105 else { 5106 /* FIXME - arg5 should be locked, but it isn't clear how to 5107 * do that since it's not guaranteed to be a NULL-terminated 5108 * string. 5109 */ 5110 if ( ! arg5 ) 5111 ret = get_errno(mount(p, p2, p3, (unsigned long)arg4, NULL)); 5112 else 5113 ret = get_errno(mount(p, p2, p3, (unsigned long)arg4, g2h(arg5))); 5114 } 5115 unlock_user(p, arg1, 0); 5116 unlock_user(p2, arg2, 0); 5117 unlock_user(p3, arg3, 0); 5118 break; 5119 } 5120 #ifdef TARGET_NR_umount 5121 case TARGET_NR_umount: 5122 if (!(p = lock_user_string(arg1))) 5123 goto efault; 5124 ret = get_errno(umount(p)); 5125 unlock_user(p, arg1, 0); 5126 break; 5127 #endif 5128 #ifdef TARGET_NR_stime /* not on alpha */ 5129 case TARGET_NR_stime: 5130 { 5131 time_t host_time; 5132 if (get_user_sal(host_time, arg1)) 5133 goto efault; 5134 ret = get_errno(stime(&host_time)); 5135 } 5136 break; 5137 #endif 5138 case TARGET_NR_ptrace: 5139 goto unimplemented; 5140 #ifdef TARGET_NR_alarm /* not on alpha */ 5141 case TARGET_NR_alarm: 5142 ret = alarm(arg1); 5143 break; 5144 #endif 5145 #ifdef TARGET_NR_oldfstat 5146 case TARGET_NR_oldfstat: 5147 goto unimplemented; 5148 #endif 5149 #ifdef TARGET_NR_pause /* not on alpha */ 5150 case TARGET_NR_pause: 5151 ret = get_errno(pause()); 5152 break; 5153 #endif 5154 #ifdef TARGET_NR_utime 5155 case TARGET_NR_utime: 5156 { 5157 struct utimbuf tbuf, *host_tbuf; 5158 struct target_utimbuf *target_tbuf; 5159 if (arg2) { 5160 if (!lock_user_struct(VERIFY_READ, target_tbuf, arg2, 1)) 5161 goto efault; 5162 tbuf.actime = tswapal(target_tbuf->actime); 5163 tbuf.modtime = tswapal(target_tbuf->modtime); 5164 unlock_user_struct(target_tbuf, arg2, 0); 5165 host_tbuf = &tbuf; 5166 } else { 5167 host_tbuf = NULL; 5168 } 5169 if (!(p = lock_user_string(arg1))) 5170 goto efault; 5171 ret = get_errno(utime(p, host_tbuf)); 5172 unlock_user(p, arg1, 0); 5173 } 5174 break; 5175 #endif 5176 case TARGET_NR_utimes: 5177 { 5178 struct timeval *tvp, tv[2]; 5179 if (arg2) { 5180 if (copy_from_user_timeval(&tv[0], arg2) 5181 || copy_from_user_timeval(&tv[1], 5182 arg2 + sizeof(struct target_timeval))) 5183 goto efault; 5184 tvp = tv; 5185 } else { 5186 tvp = NULL; 5187 } 5188 if (!(p = lock_user_string(arg1))) 5189 goto efault; 5190 ret = get_errno(utimes(p, tvp)); 5191 unlock_user(p, arg1, 0); 5192 } 5193 break; 5194 #if defined(TARGET_NR_futimesat) && defined(__NR_futimesat) 5195 case TARGET_NR_futimesat: 5196 { 5197 struct timeval *tvp, tv[2]; 5198 if (arg3) { 5199 if (copy_from_user_timeval(&tv[0], arg3) 5200 || copy_from_user_timeval(&tv[1], 5201 arg3 + sizeof(struct target_timeval))) 5202 goto efault; 5203 tvp = tv; 5204 } else { 5205 tvp = NULL; 5206 } 5207 if (!(p = lock_user_string(arg2))) 5208 goto efault; 5209 ret = get_errno(sys_futimesat(arg1, path(p), tvp)); 5210 unlock_user(p, arg2, 0); 5211 } 5212 break; 5213 #endif 5214 #ifdef TARGET_NR_stty 5215 case TARGET_NR_stty: 5216 goto unimplemented; 5217 #endif 5218 #ifdef TARGET_NR_gtty 5219 case TARGET_NR_gtty: 5220 goto unimplemented; 5221 #endif 5222 case TARGET_NR_access: 5223 if (!(p = lock_user_string(arg1))) 5224 goto efault; 5225 ret = get_errno(access(path(p), arg2)); 5226 unlock_user(p, arg1, 0); 5227 break; 5228 #if defined(TARGET_NR_faccessat) && defined(__NR_faccessat) 5229 case TARGET_NR_faccessat: 5230 if (!(p = lock_user_string(arg2))) 5231 goto efault; 5232 ret = get_errno(sys_faccessat(arg1, p, arg3)); 5233 unlock_user(p, arg2, 0); 5234 break; 5235 #endif 5236 #ifdef TARGET_NR_nice /* not on alpha */ 5237 case TARGET_NR_nice: 5238 ret = get_errno(nice(arg1)); 5239 break; 5240 #endif 5241 #ifdef TARGET_NR_ftime 5242 case TARGET_NR_ftime: 5243 goto unimplemented; 5244 #endif 5245 case TARGET_NR_sync: 5246 sync(); 5247 ret = 0; 5248 break; 5249 case TARGET_NR_kill: 5250 ret = get_errno(kill(arg1, target_to_host_signal(arg2))); 5251 break; 5252 case TARGET_NR_rename: 5253 { 5254 void *p2; 5255 p = lock_user_string(arg1); 5256 p2 = lock_user_string(arg2); 5257 if (!p || !p2) 5258 ret = -TARGET_EFAULT; 5259 else 5260 ret = get_errno(rename(p, p2)); 5261 unlock_user(p2, arg2, 0); 5262 unlock_user(p, arg1, 0); 5263 } 5264 break; 5265 #if defined(TARGET_NR_renameat) && defined(__NR_renameat) 5266 case TARGET_NR_renameat: 5267 { 5268 void *p2; 5269 p = lock_user_string(arg2); 5270 p2 = lock_user_string(arg4); 5271 if (!p || !p2) 5272 ret = -TARGET_EFAULT; 5273 else 5274 ret = get_errno(sys_renameat(arg1, p, arg3, p2)); 5275 unlock_user(p2, arg4, 0); 5276 unlock_user(p, arg2, 0); 5277 } 5278 break; 5279 #endif 5280 case TARGET_NR_mkdir: 5281 if (!(p = lock_user_string(arg1))) 5282 goto efault; 5283 ret = get_errno(mkdir(p, arg2)); 5284 unlock_user(p, arg1, 0); 5285 break; 5286 #if defined(TARGET_NR_mkdirat) && defined(__NR_mkdirat) 5287 case TARGET_NR_mkdirat: 5288 if (!(p = lock_user_string(arg2))) 5289 goto efault; 5290 ret = get_errno(sys_mkdirat(arg1, p, arg3)); 5291 unlock_user(p, arg2, 0); 5292 break; 5293 #endif 5294 case TARGET_NR_rmdir: 5295 if (!(p = lock_user_string(arg1))) 5296 goto efault; 5297 ret = get_errno(rmdir(p)); 5298 unlock_user(p, arg1, 0); 5299 break; 5300 case TARGET_NR_dup: 5301 ret = get_errno(dup(arg1)); 5302 break; 5303 case TARGET_NR_pipe: 5304 ret = do_pipe(cpu_env, arg1, 0, 0); 5305 break; 5306 #ifdef TARGET_NR_pipe2 5307 case TARGET_NR_pipe2: 5308 ret = do_pipe(cpu_env, arg1, arg2, 1); 5309 break; 5310 #endif 5311 case TARGET_NR_times: 5312 { 5313 struct target_tms *tmsp; 5314 struct tms tms; 5315 ret = get_errno(times(&tms)); 5316 if (arg1) { 5317 tmsp = lock_user(VERIFY_WRITE, arg1, sizeof(struct target_tms), 0); 5318 if (!tmsp) 5319 goto efault; 5320 tmsp->tms_utime = tswapal(host_to_target_clock_t(tms.tms_utime)); 5321 tmsp->tms_stime = tswapal(host_to_target_clock_t(tms.tms_stime)); 5322 tmsp->tms_cutime = tswapal(host_to_target_clock_t(tms.tms_cutime)); 5323 tmsp->tms_cstime = tswapal(host_to_target_clock_t(tms.tms_cstime)); 5324 } 5325 if (!is_error(ret)) 5326 ret = host_to_target_clock_t(ret); 5327 } 5328 break; 5329 #ifdef TARGET_NR_prof 5330 case TARGET_NR_prof: 5331 goto unimplemented; 5332 #endif 5333 #ifdef TARGET_NR_signal 5334 case TARGET_NR_signal: 5335 goto unimplemented; 5336 #endif 5337 case TARGET_NR_acct: 5338 if (arg1 == 0) { 5339 ret = get_errno(acct(NULL)); 5340 } else { 5341 if (!(p = lock_user_string(arg1))) 5342 goto efault; 5343 ret = get_errno(acct(path(p))); 5344 unlock_user(p, arg1, 0); 5345 } 5346 break; 5347 #ifdef TARGET_NR_umount2 /* not on alpha */ 5348 case TARGET_NR_umount2: 5349 if (!(p = lock_user_string(arg1))) 5350 goto efault; 5351 ret = get_errno(umount2(p, arg2)); 5352 unlock_user(p, arg1, 0); 5353 break; 5354 #endif 5355 #ifdef TARGET_NR_lock 5356 case TARGET_NR_lock: 5357 goto unimplemented; 5358 #endif 5359 case TARGET_NR_ioctl: 5360 ret = do_ioctl(arg1, arg2, arg3); 5361 break; 5362 case TARGET_NR_fcntl: 5363 ret = do_fcntl(arg1, arg2, arg3); 5364 break; 5365 #ifdef TARGET_NR_mpx 5366 case TARGET_NR_mpx: 5367 goto unimplemented; 5368 #endif 5369 case TARGET_NR_setpgid: 5370 ret = get_errno(setpgid(arg1, arg2)); 5371 break; 5372 #ifdef TARGET_NR_ulimit 5373 case TARGET_NR_ulimit: 5374 goto unimplemented; 5375 #endif 5376 #ifdef TARGET_NR_oldolduname 5377 case TARGET_NR_oldolduname: 5378 goto unimplemented; 5379 #endif 5380 case TARGET_NR_umask: 5381 ret = get_errno(umask(arg1)); 5382 break; 5383 case TARGET_NR_chroot: 5384 if (!(p = lock_user_string(arg1))) 5385 goto efault; 5386 ret = get_errno(chroot(p)); 5387 unlock_user(p, arg1, 0); 5388 break; 5389 case TARGET_NR_ustat: 5390 goto unimplemented; 5391 case TARGET_NR_dup2: 5392 ret = get_errno(dup2(arg1, arg2)); 5393 break; 5394 #if defined(CONFIG_DUP3) && defined(TARGET_NR_dup3) 5395 case TARGET_NR_dup3: 5396 ret = get_errno(dup3(arg1, arg2, arg3)); 5397 break; 5398 #endif 5399 #ifdef TARGET_NR_getppid /* not on alpha */ 5400 case TARGET_NR_getppid: 5401 ret = get_errno(getppid()); 5402 break; 5403 #endif 5404 case TARGET_NR_getpgrp: 5405 ret = get_errno(getpgrp()); 5406 break; 5407 case TARGET_NR_setsid: 5408 ret = get_errno(setsid()); 5409 break; 5410 #ifdef TARGET_NR_sigaction 5411 case TARGET_NR_sigaction: 5412 { 5413 #if defined(TARGET_ALPHA) 5414 struct target_sigaction act, oact, *pact = 0; 5415 struct target_old_sigaction *old_act; 5416 if (arg2) { 5417 if (!lock_user_struct(VERIFY_READ, old_act, arg2, 1)) 5418 goto efault; 5419 act._sa_handler = old_act->_sa_handler; 5420 target_siginitset(&act.sa_mask, old_act->sa_mask); 5421 act.sa_flags = old_act->sa_flags; 5422 act.sa_restorer = 0; 5423 unlock_user_struct(old_act, arg2, 0); 5424 pact = &act; 5425 } 5426 ret = get_errno(do_sigaction(arg1, pact, &oact)); 5427 if (!is_error(ret) && arg3) { 5428 if (!lock_user_struct(VERIFY_WRITE, old_act, arg3, 0)) 5429 goto efault; 5430 old_act->_sa_handler = oact._sa_handler; 5431 old_act->sa_mask = oact.sa_mask.sig[0]; 5432 old_act->sa_flags = oact.sa_flags; 5433 unlock_user_struct(old_act, arg3, 1); 5434 } 5435 #elif defined(TARGET_MIPS) 5436 struct target_sigaction act, oact, *pact, *old_act; 5437 5438 if (arg2) { 5439 if (!lock_user_struct(VERIFY_READ, old_act, arg2, 1)) 5440 goto efault; 5441 act._sa_handler = old_act->_sa_handler; 5442 target_siginitset(&act.sa_mask, old_act->sa_mask.sig[0]); 5443 act.sa_flags = old_act->sa_flags; 5444 unlock_user_struct(old_act, arg2, 0); 5445 pact = &act; 5446 } else { 5447 pact = NULL; 5448 } 5449 5450 ret = get_errno(do_sigaction(arg1, pact, &oact)); 5451 5452 if (!is_error(ret) && arg3) { 5453 if (!lock_user_struct(VERIFY_WRITE, old_act, arg3, 0)) 5454 goto efault; 5455 old_act->_sa_handler = oact._sa_handler; 5456 old_act->sa_flags = oact.sa_flags; 5457 old_act->sa_mask.sig[0] = oact.sa_mask.sig[0]; 5458 old_act->sa_mask.sig[1] = 0; 5459 old_act->sa_mask.sig[2] = 0; 5460 old_act->sa_mask.sig[3] = 0; 5461 unlock_user_struct(old_act, arg3, 1); 5462 } 5463 #else 5464 struct target_old_sigaction *old_act; 5465 struct target_sigaction act, oact, *pact; 5466 if (arg2) { 5467 if (!lock_user_struct(VERIFY_READ, old_act, arg2, 1)) 5468 goto efault; 5469 act._sa_handler = old_act->_sa_handler; 5470 target_siginitset(&act.sa_mask, old_act->sa_mask); 5471 act.sa_flags = old_act->sa_flags; 5472 act.sa_restorer = old_act->sa_restorer; 5473 unlock_user_struct(old_act, arg2, 0); 5474 pact = &act; 5475 } else { 5476 pact = NULL; 5477 } 5478 ret = get_errno(do_sigaction(arg1, pact, &oact)); 5479 if (!is_error(ret) && arg3) { 5480 if (!lock_user_struct(VERIFY_WRITE, old_act, arg3, 0)) 5481 goto efault; 5482 old_act->_sa_handler = oact._sa_handler; 5483 old_act->sa_mask = oact.sa_mask.sig[0]; 5484 old_act->sa_flags = oact.sa_flags; 5485 old_act->sa_restorer = oact.sa_restorer; 5486 unlock_user_struct(old_act, arg3, 1); 5487 } 5488 #endif 5489 } 5490 break; 5491 #endif 5492 case TARGET_NR_rt_sigaction: 5493 { 5494 #if defined(TARGET_ALPHA) 5495 struct target_sigaction act, oact, *pact = 0; 5496 struct target_rt_sigaction *rt_act; 5497 /* ??? arg4 == sizeof(sigset_t). */ 5498 if (arg2) { 5499 if (!lock_user_struct(VERIFY_READ, rt_act, arg2, 1)) 5500 goto efault; 5501 act._sa_handler = rt_act->_sa_handler; 5502 act.sa_mask = rt_act->sa_mask; 5503 act.sa_flags = rt_act->sa_flags; 5504 act.sa_restorer = arg5; 5505 unlock_user_struct(rt_act, arg2, 0); 5506 pact = &act; 5507 } 5508 ret = get_errno(do_sigaction(arg1, pact, &oact)); 5509 if (!is_error(ret) && arg3) { 5510 if (!lock_user_struct(VERIFY_WRITE, rt_act, arg3, 0)) 5511 goto efault; 5512 rt_act->_sa_handler = oact._sa_handler; 5513 rt_act->sa_mask = oact.sa_mask; 5514 rt_act->sa_flags = oact.sa_flags; 5515 unlock_user_struct(rt_act, arg3, 1); 5516 } 5517 #else 5518 struct target_sigaction *act; 5519 struct target_sigaction *oact; 5520 5521 if (arg2) { 5522 if (!lock_user_struct(VERIFY_READ, act, arg2, 1)) 5523 goto efault; 5524 } else 5525 act = NULL; 5526 if (arg3) { 5527 if (!lock_user_struct(VERIFY_WRITE, oact, arg3, 0)) { 5528 ret = -TARGET_EFAULT; 5529 goto rt_sigaction_fail; 5530 } 5531 } else 5532 oact = NULL; 5533 ret = get_errno(do_sigaction(arg1, act, oact)); 5534 rt_sigaction_fail: 5535 if (act) 5536 unlock_user_struct(act, arg2, 0); 5537 if (oact) 5538 unlock_user_struct(oact, arg3, 1); 5539 #endif 5540 } 5541 break; 5542 #ifdef TARGET_NR_sgetmask /* not on alpha */ 5543 case TARGET_NR_sgetmask: 5544 { 5545 sigset_t cur_set; 5546 abi_ulong target_set; 5547 sigprocmask(0, NULL, &cur_set); 5548 host_to_target_old_sigset(&target_set, &cur_set); 5549 ret = target_set; 5550 } 5551 break; 5552 #endif 5553 #ifdef TARGET_NR_ssetmask /* not on alpha */ 5554 case TARGET_NR_ssetmask: 5555 { 5556 sigset_t set, oset, cur_set; 5557 abi_ulong target_set = arg1; 5558 sigprocmask(0, NULL, &cur_set); 5559 target_to_host_old_sigset(&set, &target_set); 5560 sigorset(&set, &set, &cur_set); 5561 sigprocmask(SIG_SETMASK, &set, &oset); 5562 host_to_target_old_sigset(&target_set, &oset); 5563 ret = target_set; 5564 } 5565 break; 5566 #endif 5567 #ifdef TARGET_NR_sigprocmask 5568 case TARGET_NR_sigprocmask: 5569 { 5570 #if defined(TARGET_ALPHA) 5571 sigset_t set, oldset; 5572 abi_ulong mask; 5573 int how; 5574 5575 switch (arg1) { 5576 case TARGET_SIG_BLOCK: 5577 how = SIG_BLOCK; 5578 break; 5579 case TARGET_SIG_UNBLOCK: 5580 how = SIG_UNBLOCK; 5581 break; 5582 case TARGET_SIG_SETMASK: 5583 how = SIG_SETMASK; 5584 break; 5585 default: 5586 ret = -TARGET_EINVAL; 5587 goto fail; 5588 } 5589 mask = arg2; 5590 target_to_host_old_sigset(&set, &mask); 5591 5592 ret = get_errno(sigprocmask(how, &set, &oldset)); 5593 5594 if (!is_error(ret)) { 5595 host_to_target_old_sigset(&mask, &oldset); 5596 ret = mask; 5597 ((CPUAlphaState *)cpu_env)->[IR_V0] = 0; /* force no error */ 5598 } 5599 #else 5600 sigset_t set, oldset, *set_ptr; 5601 int how; 5602 5603 if (arg2) { 5604 switch (arg1) { 5605 case TARGET_SIG_BLOCK: 5606 how = SIG_BLOCK; 5607 break; 5608 case TARGET_SIG_UNBLOCK: 5609 how = SIG_UNBLOCK; 5610 break; 5611 case TARGET_SIG_SETMASK: 5612 how = SIG_SETMASK; 5613 break; 5614 default: 5615 ret = -TARGET_EINVAL; 5616 goto fail; 5617 } 5618 if (!(p = lock_user(VERIFY_READ, arg2, sizeof(target_sigset_t), 1))) 5619 goto efault; 5620 target_to_host_old_sigset(&set, p); 5621 unlock_user(p, arg2, 0); 5622 set_ptr = &set; 5623 } else { 5624 how = 0; 5625 set_ptr = NULL; 5626 } 5627 ret = get_errno(sigprocmask(how, set_ptr, &oldset)); 5628 if (!is_error(ret) && arg3) { 5629 if (!(p = lock_user(VERIFY_WRITE, arg3, sizeof(target_sigset_t), 0))) 5630 goto efault; 5631 host_to_target_old_sigset(p, &oldset); 5632 unlock_user(p, arg3, sizeof(target_sigset_t)); 5633 } 5634 #endif 5635 } 5636 break; 5637 #endif 5638 case TARGET_NR_rt_sigprocmask: 5639 { 5640 int how = arg1; 5641 sigset_t set, oldset, *set_ptr; 5642 5643 if (arg2) { 5644 switch(how) { 5645 case TARGET_SIG_BLOCK: 5646 how = SIG_BLOCK; 5647 break; 5648 case TARGET_SIG_UNBLOCK: 5649 how = SIG_UNBLOCK; 5650 break; 5651 case TARGET_SIG_SETMASK: 5652 how = SIG_SETMASK; 5653 break; 5654 default: 5655 ret = -TARGET_EINVAL; 5656 goto fail; 5657 } 5658 if (!(p = lock_user(VERIFY_READ, arg2, sizeof(target_sigset_t), 1))) 5659 goto efault; 5660 target_to_host_sigset(&set, p); 5661 unlock_user(p, arg2, 0); 5662 set_ptr = &set; 5663 } else { 5664 how = 0; 5665 set_ptr = NULL; 5666 } 5667 ret = get_errno(sigprocmask(how, set_ptr, &oldset)); 5668 if (!is_error(ret) && arg3) { 5669 if (!(p = lock_user(VERIFY_WRITE, arg3, sizeof(target_sigset_t), 0))) 5670 goto efault; 5671 host_to_target_sigset(p, &oldset); 5672 unlock_user(p, arg3, sizeof(target_sigset_t)); 5673 } 5674 } 5675 break; 5676 #ifdef TARGET_NR_sigpending 5677 case TARGET_NR_sigpending: 5678 { 5679 sigset_t set; 5680 ret = get_errno(sigpending(&set)); 5681 if (!is_error(ret)) { 5682 if (!(p = lock_user(VERIFY_WRITE, arg1, sizeof(target_sigset_t), 0))) 5683 goto efault; 5684 host_to_target_old_sigset(p, &set); 5685 unlock_user(p, arg1, sizeof(target_sigset_t)); 5686 } 5687 } 5688 break; 5689 #endif 5690 case TARGET_NR_rt_sigpending: 5691 { 5692 sigset_t set; 5693 ret = get_errno(sigpending(&set)); 5694 if (!is_error(ret)) { 5695 if (!(p = lock_user(VERIFY_WRITE, arg1, sizeof(target_sigset_t), 0))) 5696 goto efault; 5697 host_to_target_sigset(p, &set); 5698 unlock_user(p, arg1, sizeof(target_sigset_t)); 5699 } 5700 } 5701 break; 5702 #ifdef TARGET_NR_sigsuspend 5703 case TARGET_NR_sigsuspend: 5704 { 5705 sigset_t set; 5706 #if defined(TARGET_ALPHA) 5707 abi_ulong mask = arg1; 5708 target_to_host_old_sigset(&set, &mask); 5709 #else 5710 if (!(p = lock_user(VERIFY_READ, arg1, sizeof(target_sigset_t), 1))) 5711 goto efault; 5712 target_to_host_old_sigset(&set, p); 5713 unlock_user(p, arg1, 0); 5714 #endif 5715 ret = get_errno(sigsuspend(&set)); 5716 } 5717 break; 5718 #endif 5719 case TARGET_NR_rt_sigsuspend: 5720 { 5721 sigset_t set; 5722 if (!(p = lock_user(VERIFY_READ, arg1, sizeof(target_sigset_t), 1))) 5723 goto efault; 5724 target_to_host_sigset(&set, p); 5725 unlock_user(p, arg1, 0); 5726 ret = get_errno(sigsuspend(&set)); 5727 } 5728 break; 5729 case TARGET_NR_rt_sigtimedwait: 5730 { 5731 sigset_t set; 5732 struct timespec uts, *puts; 5733 siginfo_t uinfo; 5734 5735 if (!(p = lock_user(VERIFY_READ, arg1, sizeof(target_sigset_t), 1))) 5736 goto efault; 5737 target_to_host_sigset(&set, p); 5738 unlock_user(p, arg1, 0); 5739 if (arg3) { 5740 puts = &uts; 5741 target_to_host_timespec(puts, arg3); 5742 } else { 5743 puts = NULL; 5744 } 5745 ret = get_errno(sigtimedwait(&set, &uinfo, puts)); 5746 if (!is_error(ret) && arg2) { 5747 if (!(p = lock_user(VERIFY_WRITE, arg2, sizeof(target_siginfo_t), 0))) 5748 goto efault; 5749 host_to_target_siginfo(p, &uinfo); 5750 unlock_user(p, arg2, sizeof(target_siginfo_t)); 5751 } 5752 } 5753 break; 5754 case TARGET_NR_rt_sigqueueinfo: 5755 { 5756 siginfo_t uinfo; 5757 if (!(p = lock_user(VERIFY_READ, arg3, sizeof(target_sigset_t), 1))) 5758 goto efault; 5759 target_to_host_siginfo(&uinfo, p); 5760 unlock_user(p, arg1, 0); 5761 ret = get_errno(sys_rt_sigqueueinfo(arg1, arg2, &uinfo)); 5762 } 5763 break; 5764 #ifdef TARGET_NR_sigreturn 5765 case TARGET_NR_sigreturn: 5766 /* NOTE: ret is eax, so not transcoding must be done */ 5767 ret = do_sigreturn(cpu_env); 5768 break; 5769 #endif 5770 case TARGET_NR_rt_sigreturn: 5771 /* NOTE: ret is eax, so not transcoding must be done */ 5772 ret = do_rt_sigreturn(cpu_env); 5773 break; 5774 case TARGET_NR_sethostname: 5775 if (!(p = lock_user_string(arg1))) 5776 goto efault; 5777 ret = get_errno(sethostname(p, arg2)); 5778 unlock_user(p, arg1, 0); 5779 break; 5780 case TARGET_NR_setrlimit: 5781 { 5782 int resource = target_to_host_resource(arg1); 5783 struct target_rlimit *target_rlim; 5784 struct rlimit rlim; 5785 if (!lock_user_struct(VERIFY_READ, target_rlim, arg2, 1)) 5786 goto efault; 5787 rlim.rlim_cur = target_to_host_rlim(target_rlim->rlim_cur); 5788 rlim.rlim_max = target_to_host_rlim(target_rlim->rlim_max); 5789 unlock_user_struct(target_rlim, arg2, 0); 5790 ret = get_errno(setrlimit(resource, &rlim)); 5791 } 5792 break; 5793 case TARGET_NR_getrlimit: 5794 { 5795 int resource = target_to_host_resource(arg1); 5796 struct target_rlimit *target_rlim; 5797 struct rlimit rlim; 5798 5799 ret = get_errno(getrlimit(resource, &rlim)); 5800 if (!is_error(ret)) { 5801 if (!lock_user_struct(VERIFY_WRITE, target_rlim, arg2, 0)) 5802 goto efault; 5803 target_rlim->rlim_cur = host_to_target_rlim(rlim.rlim_cur); 5804 target_rlim->rlim_max = host_to_target_rlim(rlim.rlim_max); 5805 unlock_user_struct(target_rlim, arg2, 1); 5806 } 5807 } 5808 break; 5809 case TARGET_NR_getrusage: 5810 { 5811 struct rusage rusage; 5812 ret = get_errno(getrusage(arg1, &rusage)); 5813 if (!is_error(ret)) { 5814 host_to_target_rusage(arg2, &rusage); 5815 } 5816 } 5817 break; 5818 case TARGET_NR_gettimeofday: 5819 { 5820 struct timeval tv; 5821 ret = get_errno(gettimeofday(&tv, NULL)); 5822 if (!is_error(ret)) { 5823 if (copy_to_user_timeval(arg1, &tv)) 5824 goto efault; 5825 } 5826 } 5827 break; 5828 case TARGET_NR_settimeofday: 5829 { 5830 struct timeval tv; 5831 if (copy_from_user_timeval(&tv, arg1)) 5832 goto efault; 5833 ret = get_errno(settimeofday(&tv, NULL)); 5834 } 5835 break; 5836 #if defined(TARGET_NR_select) && !defined(TARGET_S390X) && !defined(TARGET_S390) 5837 case TARGET_NR_select: 5838 { 5839 struct target_sel_arg_struct *sel; 5840 abi_ulong inp, outp, exp, tvp; 5841 long nsel; 5842 5843 if (!lock_user_struct(VERIFY_READ, sel, arg1, 1)) 5844 goto efault; 5845 nsel = tswapal(sel->n); 5846 inp = tswapal(sel->inp); 5847 outp = tswapal(sel->outp); 5848 exp = tswapal(sel->exp); 5849 tvp = tswapal(sel->tvp); 5850 unlock_user_struct(sel, arg1, 0); 5851 ret = do_select(nsel, inp, outp, exp, tvp); 5852 } 5853 break; 5854 #endif 5855 #ifdef TARGET_NR_pselect6 5856 case TARGET_NR_pselect6: 5857 { 5858 abi_long rfd_addr, wfd_addr, efd_addr, n, ts_addr; 5859 fd_set rfds, wfds, efds; 5860 fd_set *rfds_ptr, *wfds_ptr, *efds_ptr; 5861 struct timespec ts, *ts_ptr; 5862 5863 /* 5864 * The 6th arg is actually two args smashed together, 5865 * so we cannot use the C library. 5866 */ 5867 sigset_t set; 5868 struct { 5869 sigset_t *set; 5870 size_t size; 5871 } sig, *sig_ptr; 5872 5873 abi_ulong arg_sigset, arg_sigsize, *arg7; 5874 target_sigset_t *target_sigset; 5875 5876 n = arg1; 5877 rfd_addr = arg2; 5878 wfd_addr = arg3; 5879 efd_addr = arg4; 5880 ts_addr = arg5; 5881 5882 ret = copy_from_user_fdset_ptr(&rfds, &rfds_ptr, rfd_addr, n); 5883 if (ret) { 5884 goto fail; 5885 } 5886 ret = copy_from_user_fdset_ptr(&wfds, &wfds_ptr, wfd_addr, n); 5887 if (ret) { 5888 goto fail; 5889 } 5890 ret = copy_from_user_fdset_ptr(&efds, &efds_ptr, efd_addr, n); 5891 if (ret) { 5892 goto fail; 5893 } 5894 5895 /* 5896 * This takes a timespec, and not a timeval, so we cannot 5897 * use the do_select() helper ... 5898 */ 5899 if (ts_addr) { 5900 if (target_to_host_timespec(&ts, ts_addr)) { 5901 goto efault; 5902 } 5903 ts_ptr = &ts; 5904 } else { 5905 ts_ptr = NULL; 5906 } 5907 5908 /* Extract the two packed args for the sigset */ 5909 if (arg6) { 5910 sig_ptr = &sig; 5911 sig.size = _NSIG / 8; 5912 5913 arg7 = lock_user(VERIFY_READ, arg6, sizeof(*arg7) * 2, 1); 5914 if (!arg7) { 5915 goto efault; 5916 } 5917 arg_sigset = tswapal(arg7[0]); 5918 arg_sigsize = tswapal(arg7[1]); 5919 unlock_user(arg7, arg6, 0); 5920 5921 if (arg_sigset) { 5922 sig.set = &set; 5923 if (arg_sigsize != sizeof(*target_sigset)) { 5924 /* Like the kernel, we enforce correct size sigsets */ 5925 ret = -TARGET_EINVAL; 5926 goto fail; 5927 } 5928 target_sigset = lock_user(VERIFY_READ, arg_sigset, 5929 sizeof(*target_sigset), 1); 5930 if (!target_sigset) { 5931 goto efault; 5932 } 5933 target_to_host_sigset(&set, target_sigset); 5934 unlock_user(target_sigset, arg_sigset, 0); 5935 } else { 5936 sig.set = NULL; 5937 } 5938 } else { 5939 sig_ptr = NULL; 5940 } 5941 5942 ret = get_errno(sys_pselect6(n, rfds_ptr, wfds_ptr, efds_ptr, 5943 ts_ptr, sig_ptr)); 5944 5945 if (!is_error(ret)) { 5946 if (rfd_addr && copy_to_user_fdset(rfd_addr, &rfds, n)) 5947 goto efault; 5948 if (wfd_addr && copy_to_user_fdset(wfd_addr, &wfds, n)) 5949 goto efault; 5950 if (efd_addr && copy_to_user_fdset(efd_addr, &efds, n)) 5951 goto efault; 5952 5953 if (ts_addr && host_to_target_timespec(ts_addr, &ts)) 5954 goto efault; 5955 } 5956 } 5957 break; 5958 #endif 5959 case TARGET_NR_symlink: 5960 { 5961 void *p2; 5962 p = lock_user_string(arg1); 5963 p2 = lock_user_string(arg2); 5964 if (!p || !p2) 5965 ret = -TARGET_EFAULT; 5966 else 5967 ret = get_errno(symlink(p, p2)); 5968 unlock_user(p2, arg2, 0); 5969 unlock_user(p, arg1, 0); 5970 } 5971 break; 5972 #if defined(TARGET_NR_symlinkat) && defined(__NR_symlinkat) 5973 case TARGET_NR_symlinkat: 5974 { 5975 void *p2; 5976 p = lock_user_string(arg1); 5977 p2 = lock_user_string(arg3); 5978 if (!p || !p2) 5979 ret = -TARGET_EFAULT; 5980 else 5981 ret = get_errno(sys_symlinkat(p, arg2, p2)); 5982 unlock_user(p2, arg3, 0); 5983 unlock_user(p, arg1, 0); 5984 } 5985 break; 5986 #endif 5987 #ifdef TARGET_NR_oldlstat 5988 case TARGET_NR_oldlstat: 5989 goto unimplemented; 5990 #endif 5991 case TARGET_NR_readlink: 5992 { 5993 void *p2, *temp; 5994 p = lock_user_string(arg1); 5995 p2 = lock_user(VERIFY_WRITE, arg2, arg3, 0); 5996 if (!p || !p2) 5997 ret = -TARGET_EFAULT; 5998 else { 5999 if (strncmp((const char *)p, "/proc/self/exe", 14) == 0) { 6000 char real[PATH_MAX]; 6001 temp = realpath(exec_path,real); 6002 ret = (temp==NULL) ? get_errno(-1) : strlen(real) ; 6003 snprintf((char *)p2, arg3, "%s", real); 6004 } 6005 else 6006 ret = get_errno(readlink(path(p), p2, arg3)); 6007 } 6008 unlock_user(p2, arg2, ret); 6009 unlock_user(p, arg1, 0); 6010 } 6011 break; 6012 #if defined(TARGET_NR_readlinkat) && defined(__NR_readlinkat) 6013 case TARGET_NR_readlinkat: 6014 { 6015 void *p2; 6016 p = lock_user_string(arg2); 6017 p2 = lock_user(VERIFY_WRITE, arg3, arg4, 0); 6018 if (!p || !p2) 6019 ret = -TARGET_EFAULT; 6020 else 6021 ret = get_errno(sys_readlinkat(arg1, path(p), p2, arg4)); 6022 unlock_user(p2, arg3, ret); 6023 unlock_user(p, arg2, 0); 6024 } 6025 break; 6026 #endif 6027 #ifdef TARGET_NR_uselib 6028 case TARGET_NR_uselib: 6029 goto unimplemented; 6030 #endif 6031 #ifdef TARGET_NR_swapon 6032 case TARGET_NR_swapon: 6033 if (!(p = lock_user_string(arg1))) 6034 goto efault; 6035 ret = get_errno(swapon(p, arg2)); 6036 unlock_user(p, arg1, 0); 6037 break; 6038 #endif 6039 case TARGET_NR_reboot: 6040 if (!(p = lock_user_string(arg4))) 6041 goto efault; 6042 ret = reboot(arg1, arg2, arg3, p); 6043 unlock_user(p, arg4, 0); 6044 break; 6045 #ifdef TARGET_NR_readdir 6046 case TARGET_NR_readdir: 6047 goto unimplemented; 6048 #endif 6049 #ifdef TARGET_NR_mmap 6050 case TARGET_NR_mmap: 6051 #if (defined(TARGET_I386) && defined(TARGET_ABI32)) || defined(TARGET_ARM) || \ 6052 defined(TARGET_M68K) || defined(TARGET_CRIS) || defined(TARGET_MICROBLAZE) \ 6053 || defined(TARGET_S390X) 6054 { 6055 abi_ulong *v; 6056 abi_ulong v1, v2, v3, v4, v5, v6; 6057 if (!(v = lock_user(VERIFY_READ, arg1, 6 * sizeof(abi_ulong), 1))) 6058 goto efault; 6059 v1 = tswapal(v[0]); 6060 v2 = tswapal(v[1]); 6061 v3 = tswapal(v[2]); 6062 v4 = tswapal(v[3]); 6063 v5 = tswapal(v[4]); 6064 v6 = tswapal(v[5]); 6065 unlock_user(v, arg1, 0); 6066 ret = get_errno(target_mmap(v1, v2, v3, 6067 target_to_host_bitmask(v4, mmap_flags_tbl), 6068 v5, v6)); 6069 } 6070 #else 6071 ret = get_errno(target_mmap(arg1, arg2, arg3, 6072 target_to_host_bitmask(arg4, mmap_flags_tbl), 6073 arg5, 6074 arg6)); 6075 #endif 6076 break; 6077 #endif 6078 #ifdef TARGET_NR_mmap2 6079 case TARGET_NR_mmap2: 6080 #ifndef MMAP_SHIFT 6081 #define MMAP_SHIFT 12 6082 #endif 6083 ret = get_errno(target_mmap(arg1, arg2, arg3, 6084 target_to_host_bitmask(arg4, mmap_flags_tbl), 6085 arg5, 6086 arg6 << MMAP_SHIFT)); 6087 break; 6088 #endif 6089 case TARGET_NR_munmap: 6090 ret = get_errno(target_munmap(arg1, arg2)); 6091 break; 6092 case TARGET_NR_mprotect: 6093 { 6094 TaskState *ts = ((CPUState *)cpu_env)->opaque; 6095 /* Special hack to detect libc making the stack executable. */ 6096 if ((arg3 & PROT_GROWSDOWN) 6097 && arg1 >= ts->info->stack_limit 6098 && arg1 <= ts->info->start_stack) { 6099 arg3 &= ~PROT_GROWSDOWN; 6100 arg2 = arg2 + arg1 - ts->info->stack_limit; 6101 arg1 = ts->info->stack_limit; 6102 } 6103 } 6104 ret = get_errno(target_mprotect(arg1, arg2, arg3)); 6105 break; 6106 #ifdef TARGET_NR_mremap 6107 case TARGET_NR_mremap: 6108 ret = get_errno(target_mremap(arg1, arg2, arg3, arg4, arg5)); 6109 break; 6110 #endif 6111 /* ??? msync/mlock/munlock are broken for softmmu. */ 6112 #ifdef TARGET_NR_msync 6113 case TARGET_NR_msync: 6114 ret = get_errno(msync(g2h(arg1), arg2, arg3)); 6115 break; 6116 #endif 6117 #ifdef TARGET_NR_mlock 6118 case TARGET_NR_mlock: 6119 ret = get_errno(mlock(g2h(arg1), arg2)); 6120 break; 6121 #endif 6122 #ifdef TARGET_NR_munlock 6123 case TARGET_NR_munlock: 6124 ret = get_errno(munlock(g2h(arg1), arg2)); 6125 break; 6126 #endif 6127 #ifdef TARGET_NR_mlockall 6128 case TARGET_NR_mlockall: 6129 ret = get_errno(mlockall(arg1)); 6130 break; 6131 #endif 6132 #ifdef TARGET_NR_munlockall 6133 case TARGET_NR_munlockall: 6134 ret = get_errno(munlockall()); 6135 break; 6136 #endif 6137 case TARGET_NR_truncate: 6138 if (!(p = lock_user_string(arg1))) 6139 goto efault; 6140 ret = get_errno(truncate(p, arg2)); 6141 unlock_user(p, arg1, 0); 6142 break; 6143 case TARGET_NR_ftruncate: 6144 ret = get_errno(ftruncate(arg1, arg2)); 6145 break; 6146 case TARGET_NR_fchmod: 6147 ret = get_errno(fchmod(arg1, arg2)); 6148 break; 6149 #if defined(TARGET_NR_fchmodat) && defined(__NR_fchmodat) 6150 case TARGET_NR_fchmodat: 6151 if (!(p = lock_user_string(arg2))) 6152 goto efault; 6153 ret = get_errno(sys_fchmodat(arg1, p, arg3)); 6154 unlock_user(p, arg2, 0); 6155 break; 6156 #endif 6157 case TARGET_NR_getpriority: 6158 /* libc does special remapping of the return value of 6159 * sys_getpriority() so it's just easiest to call 6160 * sys_getpriority() directly rather than through libc. */ 6161 ret = get_errno(sys_getpriority(arg1, arg2)); 6162 break; 6163 case TARGET_NR_setpriority: 6164 ret = get_errno(setpriority(arg1, arg2, arg3)); 6165 break; 6166 #ifdef TARGET_NR_profil 6167 case TARGET_NR_profil: 6168 goto unimplemented; 6169 #endif 6170 case TARGET_NR_statfs: 6171 if (!(p = lock_user_string(arg1))) 6172 goto efault; 6173 ret = get_errno(statfs(path(p), &stfs)); 6174 unlock_user(p, arg1, 0); 6175 convert_statfs: 6176 if (!is_error(ret)) { 6177 struct target_statfs *target_stfs; 6178 6179 if (!lock_user_struct(VERIFY_WRITE, target_stfs, arg2, 0)) 6180 goto efault; 6181 __put_user(stfs.f_type, &target_stfs->f_type); 6182 __put_user(stfs.f_bsize, &target_stfs->f_bsize); 6183 __put_user(stfs.f_blocks, &target_stfs->f_blocks); 6184 __put_user(stfs.f_bfree, &target_stfs->f_bfree); 6185 __put_user(stfs.f_bavail, &target_stfs->f_bavail); 6186 __put_user(stfs.f_files, &target_stfs->f_files); 6187 __put_user(stfs.f_ffree, &target_stfs->f_ffree); 6188 __put_user(stfs.f_fsid.__val[0], &target_stfs->f_fsid.val[0]); 6189 __put_user(stfs.f_fsid.__val[1], &target_stfs->f_fsid.val[1]); 6190 __put_user(stfs.f_namelen, &target_stfs->f_namelen); 6191 unlock_user_struct(target_stfs, arg2, 1); 6192 } 6193 break; 6194 case TARGET_NR_fstatfs: 6195 ret = get_errno(fstatfs(arg1, &stfs)); 6196 goto convert_statfs; 6197 #ifdef TARGET_NR_statfs64 6198 case TARGET_NR_statfs64: 6199 if (!(p = lock_user_string(arg1))) 6200 goto efault; 6201 ret = get_errno(statfs(path(p), &stfs)); 6202 unlock_user(p, arg1, 0); 6203 convert_statfs64: 6204 if (!is_error(ret)) { 6205 struct target_statfs64 *target_stfs; 6206 6207 if (!lock_user_struct(VERIFY_WRITE, target_stfs, arg3, 0)) 6208 goto efault; 6209 __put_user(stfs.f_type, &target_stfs->f_type); 6210 __put_user(stfs.f_bsize, &target_stfs->f_bsize); 6211 __put_user(stfs.f_blocks, &target_stfs->f_blocks); 6212 __put_user(stfs.f_bfree, &target_stfs->f_bfree); 6213 __put_user(stfs.f_bavail, &target_stfs->f_bavail); 6214 __put_user(stfs.f_files, &target_stfs->f_files); 6215 __put_user(stfs.f_ffree, &target_stfs->f_ffree); 6216 __put_user(stfs.f_fsid.__val[0], &target_stfs->f_fsid.val[0]); 6217 __put_user(stfs.f_fsid.__val[1], &target_stfs->f_fsid.val[1]); 6218 __put_user(stfs.f_namelen, &target_stfs->f_namelen); 6219 unlock_user_struct(target_stfs, arg3, 1); 6220 } 6221 break; 6222 case TARGET_NR_fstatfs64: 6223 ret = get_errno(fstatfs(arg1, &stfs)); 6224 goto convert_statfs64; 6225 #endif 6226 #ifdef TARGET_NR_ioperm 6227 case TARGET_NR_ioperm: 6228 goto unimplemented; 6229 #endif 6230 #ifdef TARGET_NR_socketcall 6231 case TARGET_NR_socketcall: 6232 ret = do_socketcall(arg1, arg2); 6233 break; 6234 #endif 6235 #ifdef TARGET_NR_accept 6236 case TARGET_NR_accept: 6237 ret = do_accept(arg1, arg2, arg3); 6238 break; 6239 #endif 6240 #ifdef TARGET_NR_bind 6241 case TARGET_NR_bind: 6242 ret = do_bind(arg1, arg2, arg3); 6243 break; 6244 #endif 6245 #ifdef TARGET_NR_connect 6246 case TARGET_NR_connect: 6247 ret = do_connect(arg1, arg2, arg3); 6248 break; 6249 #endif 6250 #ifdef TARGET_NR_getpeername 6251 case TARGET_NR_getpeername: 6252 ret = do_getpeername(arg1, arg2, arg3); 6253 break; 6254 #endif 6255 #ifdef TARGET_NR_getsockname 6256 case TARGET_NR_getsockname: 6257 ret = do_getsockname(arg1, arg2, arg3); 6258 break; 6259 #endif 6260 #ifdef TARGET_NR_getsockopt 6261 case TARGET_NR_getsockopt: 6262 ret = do_getsockopt(arg1, arg2, arg3, arg4, arg5); 6263 break; 6264 #endif 6265 #ifdef TARGET_NR_listen 6266 case TARGET_NR_listen: 6267 ret = get_errno(listen(arg1, arg2)); 6268 break; 6269 #endif 6270 #ifdef TARGET_NR_recv 6271 case TARGET_NR_recv: 6272 ret = do_recvfrom(arg1, arg2, arg3, arg4, 0, 0); 6273 break; 6274 #endif 6275 #ifdef TARGET_NR_recvfrom 6276 case TARGET_NR_recvfrom: 6277 ret = do_recvfrom(arg1, arg2, arg3, arg4, arg5, arg6); 6278 break; 6279 #endif 6280 #ifdef TARGET_NR_recvmsg 6281 case TARGET_NR_recvmsg: 6282 ret = do_sendrecvmsg(arg1, arg2, arg3, 0); 6283 break; 6284 #endif 6285 #ifdef TARGET_NR_send 6286 case TARGET_NR_send: 6287 ret = do_sendto(arg1, arg2, arg3, arg4, 0, 0); 6288 break; 6289 #endif 6290 #ifdef TARGET_NR_sendmsg 6291 case TARGET_NR_sendmsg: 6292 ret = do_sendrecvmsg(arg1, arg2, arg3, 1); 6293 break; 6294 #endif 6295 #ifdef TARGET_NR_sendto 6296 case TARGET_NR_sendto: 6297 ret = do_sendto(arg1, arg2, arg3, arg4, arg5, arg6); 6298 break; 6299 #endif 6300 #ifdef TARGET_NR_shutdown 6301 case TARGET_NR_shutdown: 6302 ret = get_errno(shutdown(arg1, arg2)); 6303 break; 6304 #endif 6305 #ifdef TARGET_NR_socket 6306 case TARGET_NR_socket: 6307 ret = do_socket(arg1, arg2, arg3); 6308 break; 6309 #endif 6310 #ifdef TARGET_NR_socketpair 6311 case TARGET_NR_socketpair: 6312 ret = do_socketpair(arg1, arg2, arg3, arg4); 6313 break; 6314 #endif 6315 #ifdef TARGET_NR_setsockopt 6316 case TARGET_NR_setsockopt: 6317 ret = do_setsockopt(arg1, arg2, arg3, arg4, (socklen_t) arg5); 6318 break; 6319 #endif 6320 6321 case TARGET_NR_syslog: 6322 if (!(p = lock_user_string(arg2))) 6323 goto efault; 6324 ret = get_errno(sys_syslog((int)arg1, p, (int)arg3)); 6325 unlock_user(p, arg2, 0); 6326 break; 6327 6328 case TARGET_NR_setitimer: 6329 { 6330 struct itimerval value, ovalue, *pvalue; 6331 6332 if (arg2) { 6333 pvalue = &value; 6334 if (copy_from_user_timeval(&pvalue->it_interval, arg2) 6335 || copy_from_user_timeval(&pvalue->it_value, 6336 arg2 + sizeof(struct target_timeval))) 6337 goto efault; 6338 } else { 6339 pvalue = NULL; 6340 } 6341 ret = get_errno(setitimer(arg1, pvalue, &ovalue)); 6342 if (!is_error(ret) && arg3) { 6343 if (copy_to_user_timeval(arg3, 6344 &ovalue.it_interval) 6345 || copy_to_user_timeval(arg3 + sizeof(struct target_timeval), 6346 &ovalue.it_value)) 6347 goto efault; 6348 } 6349 } 6350 break; 6351 case TARGET_NR_getitimer: 6352 { 6353 struct itimerval value; 6354 6355 ret = get_errno(getitimer(arg1, &value)); 6356 if (!is_error(ret) && arg2) { 6357 if (copy_to_user_timeval(arg2, 6358 &value.it_interval) 6359 || copy_to_user_timeval(arg2 + sizeof(struct target_timeval), 6360 &value.it_value)) 6361 goto efault; 6362 } 6363 } 6364 break; 6365 case TARGET_NR_stat: 6366 if (!(p = lock_user_string(arg1))) 6367 goto efault; 6368 ret = get_errno(stat(path(p), &st)); 6369 unlock_user(p, arg1, 0); 6370 goto do_stat; 6371 case TARGET_NR_lstat: 6372 if (!(p = lock_user_string(arg1))) 6373 goto efault; 6374 ret = get_errno(lstat(path(p), &st)); 6375 unlock_user(p, arg1, 0); 6376 goto do_stat; 6377 case TARGET_NR_fstat: 6378 { 6379 ret = get_errno(fstat(arg1, &st)); 6380 do_stat: 6381 if (!is_error(ret)) { 6382 struct target_stat *target_st; 6383 6384 if (!lock_user_struct(VERIFY_WRITE, target_st, arg2, 0)) 6385 goto efault; 6386 memset(target_st, 0, sizeof(*target_st)); 6387 __put_user(st.st_dev, &target_st->st_dev); 6388 __put_user(st.st_ino, &target_st->st_ino); 6389 __put_user(st.st_mode, &target_st->st_mode); 6390 __put_user(st.st_uid, &target_st->st_uid); 6391 __put_user(st.st_gid, &target_st->st_gid); 6392 __put_user(st.st_nlink, &target_st->st_nlink); 6393 __put_user(st.st_rdev, &target_st->st_rdev); 6394 __put_user(st.st_size, &target_st->st_size); 6395 __put_user(st.st_blksize, &target_st->st_blksize); 6396 __put_user(st.st_blocks, &target_st->st_blocks); 6397 __put_user(st.st_atime, &target_st->target_st_atime); 6398 __put_user(st.st_mtime, &target_st->target_st_mtime); 6399 __put_user(st.st_ctime, &target_st->target_st_ctime); 6400 unlock_user_struct(target_st, arg2, 1); 6401 } 6402 } 6403 break; 6404 #ifdef TARGET_NR_olduname 6405 case TARGET_NR_olduname: 6406 goto unimplemented; 6407 #endif 6408 #ifdef TARGET_NR_iopl 6409 case TARGET_NR_iopl: 6410 goto unimplemented; 6411 #endif 6412 case TARGET_NR_vhangup: 6413 ret = get_errno(vhangup()); 6414 break; 6415 #ifdef TARGET_NR_idle 6416 case TARGET_NR_idle: 6417 goto unimplemented; 6418 #endif 6419 #ifdef TARGET_NR_syscall 6420 case TARGET_NR_syscall: 6421 ret = do_syscall(cpu_env, arg1 & 0xffff, arg2, arg3, arg4, arg5, 6422 arg6, arg7, arg8, 0); 6423 break; 6424 #endif 6425 case TARGET_NR_wait4: 6426 { 6427 int status; 6428 abi_long status_ptr = arg2; 6429 struct rusage rusage, *rusage_ptr; 6430 abi_ulong target_rusage = arg4; 6431 if (target_rusage) 6432 rusage_ptr = &rusage; 6433 else 6434 rusage_ptr = NULL; 6435 ret = get_errno(wait4(arg1, &status, arg3, rusage_ptr)); 6436 if (!is_error(ret)) { 6437 if (status_ptr && ret) { 6438 status = host_to_target_waitstatus(status); 6439 if (put_user_s32(status, status_ptr)) 6440 goto efault; 6441 } 6442 if (target_rusage) 6443 host_to_target_rusage(target_rusage, &rusage); 6444 } 6445 } 6446 break; 6447 #ifdef TARGET_NR_swapoff 6448 case TARGET_NR_swapoff: 6449 if (!(p = lock_user_string(arg1))) 6450 goto efault; 6451 ret = get_errno(swapoff(p)); 6452 unlock_user(p, arg1, 0); 6453 break; 6454 #endif 6455 case TARGET_NR_sysinfo: 6456 { 6457 struct target_sysinfo *target_value; 6458 struct sysinfo value; 6459 ret = get_errno(sysinfo(&value)); 6460 if (!is_error(ret) && arg1) 6461 { 6462 if (!lock_user_struct(VERIFY_WRITE, target_value, arg1, 0)) 6463 goto efault; 6464 __put_user(value.uptime, &target_value->uptime); 6465 __put_user(value.loads[0], &target_value->loads[0]); 6466 __put_user(value.loads[1], &target_value->loads[1]); 6467 __put_user(value.loads[2], &target_value->loads[2]); 6468 __put_user(value.totalram, &target_value->totalram); 6469 __put_user(value.freeram, &target_value->freeram); 6470 __put_user(value.sharedram, &target_value->sharedram); 6471 __put_user(value.bufferram, &target_value->bufferram); 6472 __put_user(value.totalswap, &target_value->totalswap); 6473 __put_user(value.freeswap, &target_value->freeswap); 6474 __put_user(value.procs, &target_value->procs); 6475 __put_user(value.totalhigh, &target_value->totalhigh); 6476 __put_user(value.freehigh, &target_value->freehigh); 6477 __put_user(value.mem_unit, &target_value->mem_unit); 6478 unlock_user_struct(target_value, arg1, 1); 6479 } 6480 } 6481 break; 6482 #ifdef TARGET_NR_ipc 6483 case TARGET_NR_ipc: 6484 ret = do_ipc(arg1, arg2, arg3, arg4, arg5, arg6); 6485 break; 6486 #endif 6487 #ifdef TARGET_NR_semget 6488 case TARGET_NR_semget: 6489 ret = get_errno(semget(arg1, arg2, arg3)); 6490 break; 6491 #endif 6492 #ifdef TARGET_NR_semop 6493 case TARGET_NR_semop: 6494 ret = get_errno(do_semop(arg1, arg2, arg3)); 6495 break; 6496 #endif 6497 #ifdef TARGET_NR_semctl 6498 case TARGET_NR_semctl: 6499 ret = do_semctl(arg1, arg2, arg3, (union target_semun)(abi_ulong)arg4); 6500 break; 6501 #endif 6502 #ifdef TARGET_NR_msgctl 6503 case TARGET_NR_msgctl: 6504 ret = do_msgctl(arg1, arg2, arg3); 6505 break; 6506 #endif 6507 #ifdef TARGET_NR_msgget 6508 case TARGET_NR_msgget: 6509 ret = get_errno(msgget(arg1, arg2)); 6510 break; 6511 #endif 6512 #ifdef TARGET_NR_msgrcv 6513 case TARGET_NR_msgrcv: 6514 ret = do_msgrcv(arg1, arg2, arg3, arg4, arg5); 6515 break; 6516 #endif 6517 #ifdef TARGET_NR_msgsnd 6518 case TARGET_NR_msgsnd: 6519 ret = do_msgsnd(arg1, arg2, arg3, arg4); 6520 break; 6521 #endif 6522 #ifdef TARGET_NR_shmget 6523 case TARGET_NR_shmget: 6524 ret = get_errno(shmget(arg1, arg2, arg3)); 6525 break; 6526 #endif 6527 #ifdef TARGET_NR_shmctl 6528 case TARGET_NR_shmctl: 6529 ret = do_shmctl(arg1, arg2, arg3); 6530 break; 6531 #endif 6532 #ifdef TARGET_NR_shmat 6533 case TARGET_NR_shmat: 6534 ret = do_shmat(arg1, arg2, arg3); 6535 break; 6536 #endif 6537 #ifdef TARGET_NR_shmdt 6538 case TARGET_NR_shmdt: 6539 ret = do_shmdt(arg1); 6540 break; 6541 #endif 6542 case TARGET_NR_fsync: 6543 ret = get_errno(fsync(arg1)); 6544 break; 6545 case TARGET_NR_clone: 6546 #if defined(TARGET_SH4) || defined(TARGET_ALPHA) 6547 ret = get_errno(do_fork(cpu_env, arg1, arg2, arg3, arg5, arg4)); 6548 #elif defined(TARGET_CRIS) 6549 ret = get_errno(do_fork(cpu_env, arg2, arg1, arg3, arg4, arg5)); 6550 #elif defined(TARGET_S390X) 6551 ret = get_errno(do_fork(cpu_env, arg2, arg1, arg3, arg5, arg4)); 6552 #else 6553 ret = get_errno(do_fork(cpu_env, arg1, arg2, arg3, arg4, arg5)); 6554 #endif 6555 break; 6556 #ifdef __NR_exit_group 6557 /* new thread calls */ 6558 case TARGET_NR_exit_group: 6559 #ifdef TARGET_GPROF 6560 _mcleanup(); 6561 #endif 6562 gdb_exit(cpu_env, arg1); 6563 ret = get_errno(exit_group(arg1)); 6564 break; 6565 #endif 6566 case TARGET_NR_setdomainname: 6567 if (!(p = lock_user_string(arg1))) 6568 goto efault; 6569 ret = get_errno(setdomainname(p, arg2)); 6570 unlock_user(p, arg1, 0); 6571 break; 6572 case TARGET_NR_uname: 6573 /* no need to transcode because we use the linux syscall */ 6574 { 6575 struct new_utsname * buf; 6576 6577 if (!lock_user_struct(VERIFY_WRITE, buf, arg1, 0)) 6578 goto efault; 6579 ret = get_errno(sys_uname(buf)); 6580 if (!is_error(ret)) { 6581 /* Overrite the native machine name with whatever is being 6582 emulated. */ 6583 strcpy (buf->machine, cpu_to_uname_machine(cpu_env)); 6584 /* Allow the user to override the reported release. */ 6585 if (qemu_uname_release && *qemu_uname_release) 6586 strcpy (buf->release, qemu_uname_release); 6587 } 6588 unlock_user_struct(buf, arg1, 1); 6589 } 6590 break; 6591 #ifdef TARGET_I386 6592 case TARGET_NR_modify_ldt: 6593 ret = do_modify_ldt(cpu_env, arg1, arg2, arg3); 6594 break; 6595 #if !defined(TARGET_X86_64) 6596 case TARGET_NR_vm86old: 6597 goto unimplemented; 6598 case TARGET_NR_vm86: 6599 ret = do_vm86(cpu_env, arg1, arg2); 6600 break; 6601 #endif 6602 #endif 6603 case TARGET_NR_adjtimex: 6604 goto unimplemented; 6605 #ifdef TARGET_NR_create_module 6606 case TARGET_NR_create_module: 6607 #endif 6608 case TARGET_NR_init_module: 6609 case TARGET_NR_delete_module: 6610 #ifdef TARGET_NR_get_kernel_syms 6611 case TARGET_NR_get_kernel_syms: 6612 #endif 6613 goto unimplemented; 6614 case TARGET_NR_quotactl: 6615 goto unimplemented; 6616 case TARGET_NR_getpgid: 6617 ret = get_errno(getpgid(arg1)); 6618 break; 6619 case TARGET_NR_fchdir: 6620 ret = get_errno(fchdir(arg1)); 6621 break; 6622 #ifdef TARGET_NR_bdflush /* not on x86_64 */ 6623 case TARGET_NR_bdflush: 6624 goto unimplemented; 6625 #endif 6626 #ifdef TARGET_NR_sysfs 6627 case TARGET_NR_sysfs: 6628 goto unimplemented; 6629 #endif 6630 case TARGET_NR_personality: 6631 ret = get_errno(personality(arg1)); 6632 break; 6633 #ifdef TARGET_NR_afs_syscall 6634 case TARGET_NR_afs_syscall: 6635 goto unimplemented; 6636 #endif 6637 #ifdef TARGET_NR__llseek /* Not on alpha */ 6638 case TARGET_NR__llseek: 6639 { 6640 int64_t res; 6641 #if !defined(__NR_llseek) 6642 res = lseek(arg1, ((uint64_t)arg2 << 32) | arg3, arg5); 6643 if (res == -1) { 6644 ret = get_errno(res); 6645 } else { 6646 ret = 0; 6647 } 6648 #else 6649 ret = get_errno(_llseek(arg1, arg2, arg3, &res, arg5)); 6650 #endif 6651 if ((ret == 0) && put_user_s64(res, arg4)) { 6652 goto efault; 6653 } 6654 } 6655 break; 6656 #endif 6657 case TARGET_NR_getdents: 6658 #if TARGET_ABI_BITS == 32 && HOST_LONG_BITS == 64 6659 { 6660 struct target_dirent *target_dirp; 6661 struct linux_dirent *dirp; 6662 abi_long count = arg3; 6663 6664 dirp = malloc(count); 6665 if (!dirp) { 6666 ret = -TARGET_ENOMEM; 6667 goto fail; 6668 } 6669 6670 ret = get_errno(sys_getdents(arg1, dirp, count)); 6671 if (!is_error(ret)) { 6672 struct linux_dirent *de; 6673 struct target_dirent *tde; 6674 int len = ret; 6675 int reclen, treclen; 6676 int count1, tnamelen; 6677 6678 count1 = 0; 6679 de = dirp; 6680 if (!(target_dirp = lock_user(VERIFY_WRITE, arg2, count, 0))) 6681 goto efault; 6682 tde = target_dirp; 6683 while (len > 0) { 6684 reclen = de->d_reclen; 6685 treclen = reclen - (2 * (sizeof(long) - sizeof(abi_long))); 6686 tde->d_reclen = tswap16(treclen); 6687 tde->d_ino = tswapal(de->d_ino); 6688 tde->d_off = tswapal(de->d_off); 6689 tnamelen = treclen - (2 * sizeof(abi_long) + 2); 6690 if (tnamelen > 256) 6691 tnamelen = 256; 6692 /* XXX: may not be correct */ 6693 pstrcpy(tde->d_name, tnamelen, de->d_name); 6694 de = (struct linux_dirent *)((char *)de + reclen); 6695 len -= reclen; 6696 tde = (struct target_dirent *)((char *)tde + treclen); 6697 count1 += treclen; 6698 } 6699 ret = count1; 6700 unlock_user(target_dirp, arg2, ret); 6701 } 6702 free(dirp); 6703 } 6704 #else 6705 { 6706 struct linux_dirent *dirp; 6707 abi_long count = arg3; 6708 6709 if (!(dirp = lock_user(VERIFY_WRITE, arg2, count, 0))) 6710 goto efault; 6711 ret = get_errno(sys_getdents(arg1, dirp, count)); 6712 if (!is_error(ret)) { 6713 struct linux_dirent *de; 6714 int len = ret; 6715 int reclen; 6716 de = dirp; 6717 while (len > 0) { 6718 reclen = de->d_reclen; 6719 if (reclen > len) 6720 break; 6721 de->d_reclen = tswap16(reclen); 6722 tswapls(&de->d_ino); 6723 tswapls(&de->d_off); 6724 de = (struct linux_dirent *)((char *)de + reclen); 6725 len -= reclen; 6726 } 6727 } 6728 unlock_user(dirp, arg2, ret); 6729 } 6730 #endif 6731 break; 6732 #if defined(TARGET_NR_getdents64) && defined(__NR_getdents64) 6733 case TARGET_NR_getdents64: 6734 { 6735 struct linux_dirent64 *dirp; 6736 abi_long count = arg3; 6737 if (!(dirp = lock_user(VERIFY_WRITE, arg2, count, 0))) 6738 goto efault; 6739 ret = get_errno(sys_getdents64(arg1, dirp, count)); 6740 if (!is_error(ret)) { 6741 struct linux_dirent64 *de; 6742 int len = ret; 6743 int reclen; 6744 de = dirp; 6745 while (len > 0) { 6746 reclen = de->d_reclen; 6747 if (reclen > len) 6748 break; 6749 de->d_reclen = tswap16(reclen); 6750 tswap64s((uint64_t *)&de->d_ino); 6751 tswap64s((uint64_t *)&de->d_off); 6752 de = (struct linux_dirent64 *)((char *)de + reclen); 6753 len -= reclen; 6754 } 6755 } 6756 unlock_user(dirp, arg2, ret); 6757 } 6758 break; 6759 #endif /* TARGET_NR_getdents64 */ 6760 #if defined(TARGET_NR__newselect) || defined(TARGET_S390X) 6761 #ifdef TARGET_S390X 6762 case TARGET_NR_select: 6763 #else 6764 case TARGET_NR__newselect: 6765 #endif 6766 ret = do_select(arg1, arg2, arg3, arg4, arg5); 6767 break; 6768 #endif 6769 #if defined(TARGET_NR_poll) || defined(TARGET_NR_ppoll) 6770 # ifdef TARGET_NR_poll 6771 case TARGET_NR_poll: 6772 # endif 6773 # ifdef TARGET_NR_ppoll 6774 case TARGET_NR_ppoll: 6775 # endif 6776 { 6777 struct target_pollfd *target_pfd; 6778 unsigned int nfds = arg2; 6779 int timeout = arg3; 6780 struct pollfd *pfd; 6781 unsigned int i; 6782 6783 target_pfd = lock_user(VERIFY_WRITE, arg1, sizeof(struct target_pollfd) * nfds, 1); 6784 if (!target_pfd) 6785 goto efault; 6786 6787 pfd = alloca(sizeof(struct pollfd) * nfds); 6788 for(i = 0; i < nfds; i++) { 6789 pfd[i].fd = tswap32(target_pfd[i].fd); 6790 pfd[i].events = tswap16(target_pfd[i].events); 6791 } 6792 6793 # ifdef TARGET_NR_ppoll 6794 if (num == TARGET_NR_ppoll) { 6795 struct timespec _timeout_ts, *timeout_ts = &_timeout_ts; 6796 target_sigset_t *target_set; 6797 sigset_t _set, *set = &_set; 6798 6799 if (arg3) { 6800 if (target_to_host_timespec(timeout_ts, arg3)) { 6801 unlock_user(target_pfd, arg1, 0); 6802 goto efault; 6803 } 6804 } else { 6805 timeout_ts = NULL; 6806 } 6807 6808 if (arg4) { 6809 target_set = lock_user(VERIFY_READ, arg4, sizeof(target_sigset_t), 1); 6810 if (!target_set) { 6811 unlock_user(target_pfd, arg1, 0); 6812 goto efault; 6813 } 6814 target_to_host_sigset(set, target_set); 6815 } else { 6816 set = NULL; 6817 } 6818 6819 ret = get_errno(sys_ppoll(pfd, nfds, timeout_ts, set, _NSIG/8)); 6820 6821 if (!is_error(ret) && arg3) { 6822 host_to_target_timespec(arg3, timeout_ts); 6823 } 6824 if (arg4) { 6825 unlock_user(target_set, arg4, 0); 6826 } 6827 } else 6828 # endif 6829 ret = get_errno(poll(pfd, nfds, timeout)); 6830 6831 if (!is_error(ret)) { 6832 for(i = 0; i < nfds; i++) { 6833 target_pfd[i].revents = tswap16(pfd[i].revents); 6834 } 6835 } 6836 unlock_user(target_pfd, arg1, sizeof(struct target_pollfd) * nfds); 6837 } 6838 break; 6839 #endif 6840 case TARGET_NR_flock: 6841 /* NOTE: the flock constant seems to be the same for every 6842 Linux platform */ 6843 ret = get_errno(flock(arg1, arg2)); 6844 break; 6845 case TARGET_NR_readv: 6846 { 6847 int count = arg3; 6848 struct iovec *vec; 6849 6850 vec = alloca(count * sizeof(struct iovec)); 6851 if (lock_iovec(VERIFY_WRITE, vec, arg2, count, 0) < 0) 6852 goto efault; 6853 ret = get_errno(readv(arg1, vec, count)); 6854 unlock_iovec(vec, arg2, count, 1); 6855 } 6856 break; 6857 case TARGET_NR_writev: 6858 { 6859 int count = arg3; 6860 struct iovec *vec; 6861 6862 vec = alloca(count * sizeof(struct iovec)); 6863 if (lock_iovec(VERIFY_READ, vec, arg2, count, 1) < 0) 6864 goto efault; 6865 ret = get_errno(writev(arg1, vec, count)); 6866 unlock_iovec(vec, arg2, count, 0); 6867 } 6868 break; 6869 case TARGET_NR_getsid: 6870 ret = get_errno(getsid(arg1)); 6871 break; 6872 #if defined(TARGET_NR_fdatasync) /* Not on alpha (osf_datasync ?) */ 6873 case TARGET_NR_fdatasync: 6874 ret = get_errno(fdatasync(arg1)); 6875 break; 6876 #endif 6877 case TARGET_NR__sysctl: 6878 /* We don't implement this, but ENOTDIR is always a safe 6879 return value. */ 6880 ret = -TARGET_ENOTDIR; 6881 break; 6882 case TARGET_NR_sched_getaffinity: 6883 { 6884 unsigned int mask_size; 6885 unsigned long *mask; 6886 6887 /* 6888 * sched_getaffinity needs multiples of ulong, so need to take 6889 * care of mismatches between target ulong and host ulong sizes. 6890 */ 6891 if (arg2 & (sizeof(abi_ulong) - 1)) { 6892 ret = -TARGET_EINVAL; 6893 break; 6894 } 6895 mask_size = (arg2 + (sizeof(*mask) - 1)) & ~(sizeof(*mask) - 1); 6896 6897 mask = alloca(mask_size); 6898 ret = get_errno(sys_sched_getaffinity(arg1, mask_size, mask)); 6899 6900 if (!is_error(ret)) { 6901 if (copy_to_user(arg3, mask, ret)) { 6902 goto efault; 6903 } 6904 } 6905 } 6906 break; 6907 case TARGET_NR_sched_setaffinity: 6908 { 6909 unsigned int mask_size; 6910 unsigned long *mask; 6911 6912 /* 6913 * sched_setaffinity needs multiples of ulong, so need to take 6914 * care of mismatches between target ulong and host ulong sizes. 6915 */ 6916 if (arg2 & (sizeof(abi_ulong) - 1)) { 6917 ret = -TARGET_EINVAL; 6918 break; 6919 } 6920 mask_size = (arg2 + (sizeof(*mask) - 1)) & ~(sizeof(*mask) - 1); 6921 6922 mask = alloca(mask_size); 6923 if (!lock_user_struct(VERIFY_READ, p, arg3, 1)) { 6924 goto efault; 6925 } 6926 memcpy(mask, p, arg2); 6927 unlock_user_struct(p, arg2, 0); 6928 6929 ret = get_errno(sys_sched_setaffinity(arg1, mask_size, mask)); 6930 } 6931 break; 6932 case TARGET_NR_sched_setparam: 6933 { 6934 struct sched_param *target_schp; 6935 struct sched_param schp; 6936 6937 if (!lock_user_struct(VERIFY_READ, target_schp, arg2, 1)) 6938 goto efault; 6939 schp.sched_priority = tswap32(target_schp->sched_priority); 6940 unlock_user_struct(target_schp, arg2, 0); 6941 ret = get_errno(sched_setparam(arg1, &schp)); 6942 } 6943 break; 6944 case TARGET_NR_sched_getparam: 6945 { 6946 struct sched_param *target_schp; 6947 struct sched_param schp; 6948 ret = get_errno(sched_getparam(arg1, &schp)); 6949 if (!is_error(ret)) { 6950 if (!lock_user_struct(VERIFY_WRITE, target_schp, arg2, 0)) 6951 goto efault; 6952 target_schp->sched_priority = tswap32(schp.sched_priority); 6953 unlock_user_struct(target_schp, arg2, 1); 6954 } 6955 } 6956 break; 6957 case TARGET_NR_sched_setscheduler: 6958 { 6959 struct sched_param *target_schp; 6960 struct sched_param schp; 6961 if (!lock_user_struct(VERIFY_READ, target_schp, arg3, 1)) 6962 goto efault; 6963 schp.sched_priority = tswap32(target_schp->sched_priority); 6964 unlock_user_struct(target_schp, arg3, 0); 6965 ret = get_errno(sched_setscheduler(arg1, arg2, &schp)); 6966 } 6967 break; 6968 case TARGET_NR_sched_getscheduler: 6969 ret = get_errno(sched_getscheduler(arg1)); 6970 break; 6971 case TARGET_NR_sched_yield: 6972 ret = get_errno(sched_yield()); 6973 break; 6974 case TARGET_NR_sched_get_priority_max: 6975 ret = get_errno(sched_get_priority_max(arg1)); 6976 break; 6977 case TARGET_NR_sched_get_priority_min: 6978 ret = get_errno(sched_get_priority_min(arg1)); 6979 break; 6980 case TARGET_NR_sched_rr_get_interval: 6981 { 6982 struct timespec ts; 6983 ret = get_errno(sched_rr_get_interval(arg1, &ts)); 6984 if (!is_error(ret)) { 6985 host_to_target_timespec(arg2, &ts); 6986 } 6987 } 6988 break; 6989 case TARGET_NR_nanosleep: 6990 { 6991 struct timespec req, rem; 6992 target_to_host_timespec(&req, arg1); 6993 ret = get_errno(nanosleep(&req, &rem)); 6994 if (is_error(ret) && arg2) { 6995 host_to_target_timespec(arg2, &rem); 6996 } 6997 } 6998 break; 6999 #ifdef TARGET_NR_query_module 7000 case TARGET_NR_query_module: 7001 goto unimplemented; 7002 #endif 7003 #ifdef TARGET_NR_nfsservctl 7004 case TARGET_NR_nfsservctl: 7005 goto unimplemented; 7006 #endif 7007 case TARGET_NR_prctl: 7008 switch (arg1) 7009 { 7010 case PR_GET_PDEATHSIG: 7011 { 7012 int deathsig; 7013 ret = get_errno(prctl(arg1, &deathsig, arg3, arg4, arg5)); 7014 if (!is_error(ret) && arg2 7015 && put_user_ual(deathsig, arg2)) 7016 goto efault; 7017 } 7018 break; 7019 default: 7020 ret = get_errno(prctl(arg1, arg2, arg3, arg4, arg5)); 7021 break; 7022 } 7023 break; 7024 #ifdef TARGET_NR_arch_prctl 7025 case TARGET_NR_arch_prctl: 7026 #if defined(TARGET_I386) && !defined(TARGET_ABI32) 7027 ret = do_arch_prctl(cpu_env, arg1, arg2); 7028 break; 7029 #else 7030 goto unimplemented; 7031 #endif 7032 #endif 7033 #ifdef TARGET_NR_pread 7034 case TARGET_NR_pread: 7035 if (regpairs_aligned(cpu_env)) 7036 arg4 = arg5; 7037 if (!(p = lock_user(VERIFY_WRITE, arg2, arg3, 0))) 7038 goto efault; 7039 ret = get_errno(pread(arg1, p, arg3, arg4)); 7040 unlock_user(p, arg2, ret); 7041 break; 7042 case TARGET_NR_pwrite: 7043 if (regpairs_aligned(cpu_env)) 7044 arg4 = arg5; 7045 if (!(p = lock_user(VERIFY_READ, arg2, arg3, 1))) 7046 goto efault; 7047 ret = get_errno(pwrite(arg1, p, arg3, arg4)); 7048 unlock_user(p, arg2, 0); 7049 break; 7050 #endif 7051 #ifdef TARGET_NR_pread64 7052 case TARGET_NR_pread64: 7053 if (!(p = lock_user(VERIFY_WRITE, arg2, arg3, 0))) 7054 goto efault; 7055 ret = get_errno(pread64(arg1, p, arg3, target_offset64(arg4, arg5))); 7056 unlock_user(p, arg2, ret); 7057 break; 7058 case TARGET_NR_pwrite64: 7059 if (!(p = lock_user(VERIFY_READ, arg2, arg3, 1))) 7060 goto efault; 7061 ret = get_errno(pwrite64(arg1, p, arg3, target_offset64(arg4, arg5))); 7062 unlock_user(p, arg2, 0); 7063 break; 7064 #endif 7065 case TARGET_NR_getcwd: 7066 if (!(p = lock_user(VERIFY_WRITE, arg1, arg2, 0))) 7067 goto efault; 7068 ret = get_errno(sys_getcwd1(p, arg2)); 7069 unlock_user(p, arg1, ret); 7070 break; 7071 case TARGET_NR_capget: 7072 goto unimplemented; 7073 case TARGET_NR_capset: 7074 goto unimplemented; 7075 case TARGET_NR_sigaltstack: 7076 #if defined(TARGET_I386) || defined(TARGET_ARM) || defined(TARGET_MIPS) || \ 7077 defined(TARGET_SPARC) || defined(TARGET_PPC) || defined(TARGET_ALPHA) || \ 7078 defined(TARGET_M68K) || defined(TARGET_S390X) 7079 ret = do_sigaltstack(arg1, arg2, get_sp_from_cpustate((CPUState *)cpu_env)); 7080 break; 7081 #else 7082 goto unimplemented; 7083 #endif 7084 case TARGET_NR_sendfile: 7085 goto unimplemented; 7086 #ifdef TARGET_NR_getpmsg 7087 case TARGET_NR_getpmsg: 7088 goto unimplemented; 7089 #endif 7090 #ifdef TARGET_NR_putpmsg 7091 case TARGET_NR_putpmsg: 7092 goto unimplemented; 7093 #endif 7094 #ifdef TARGET_NR_vfork 7095 case TARGET_NR_vfork: 7096 ret = get_errno(do_fork(cpu_env, CLONE_VFORK | CLONE_VM | SIGCHLD, 7097 0, 0, 0, 0)); 7098 break; 7099 #endif 7100 #ifdef TARGET_NR_ugetrlimit 7101 case TARGET_NR_ugetrlimit: 7102 { 7103 struct rlimit rlim; 7104 int resource = target_to_host_resource(arg1); 7105 ret = get_errno(getrlimit(resource, &rlim)); 7106 if (!is_error(ret)) { 7107 struct target_rlimit *target_rlim; 7108 if (!lock_user_struct(VERIFY_WRITE, target_rlim, arg2, 0)) 7109 goto efault; 7110 target_rlim->rlim_cur = host_to_target_rlim(rlim.rlim_cur); 7111 target_rlim->rlim_max = host_to_target_rlim(rlim.rlim_max); 7112 unlock_user_struct(target_rlim, arg2, 1); 7113 } 7114 break; 7115 } 7116 #endif 7117 #ifdef TARGET_NR_truncate64 7118 case TARGET_NR_truncate64: 7119 if (!(p = lock_user_string(arg1))) 7120 goto efault; 7121 ret = target_truncate64(cpu_env, p, arg2, arg3, arg4); 7122 unlock_user(p, arg1, 0); 7123 break; 7124 #endif 7125 #ifdef TARGET_NR_ftruncate64 7126 case TARGET_NR_ftruncate64: 7127 ret = target_ftruncate64(cpu_env, arg1, arg2, arg3, arg4); 7128 break; 7129 #endif 7130 #ifdef TARGET_NR_stat64 7131 case TARGET_NR_stat64: 7132 if (!(p = lock_user_string(arg1))) 7133 goto efault; 7134 ret = get_errno(stat(path(p), &st)); 7135 unlock_user(p, arg1, 0); 7136 if (!is_error(ret)) 7137 ret = host_to_target_stat64(cpu_env, arg2, &st); 7138 break; 7139 #endif 7140 #ifdef TARGET_NR_lstat64 7141 case TARGET_NR_lstat64: 7142 if (!(p = lock_user_string(arg1))) 7143 goto efault; 7144 ret = get_errno(lstat(path(p), &st)); 7145 unlock_user(p, arg1, 0); 7146 if (!is_error(ret)) 7147 ret = host_to_target_stat64(cpu_env, arg2, &st); 7148 break; 7149 #endif 7150 #ifdef TARGET_NR_fstat64 7151 case TARGET_NR_fstat64: 7152 ret = get_errno(fstat(arg1, &st)); 7153 if (!is_error(ret)) 7154 ret = host_to_target_stat64(cpu_env, arg2, &st); 7155 break; 7156 #endif 7157 #if (defined(TARGET_NR_fstatat64) || defined(TARGET_NR_newfstatat)) && \ 7158 (defined(__NR_fstatat64) || defined(__NR_newfstatat)) 7159 #ifdef TARGET_NR_fstatat64 7160 case TARGET_NR_fstatat64: 7161 #endif 7162 #ifdef TARGET_NR_newfstatat 7163 case TARGET_NR_newfstatat: 7164 #endif 7165 if (!(p = lock_user_string(arg2))) 7166 goto efault; 7167 #ifdef __NR_fstatat64 7168 ret = get_errno(sys_fstatat64(arg1, path(p), &st, arg4)); 7169 #else 7170 ret = get_errno(sys_newfstatat(arg1, path(p), &st, arg4)); 7171 #endif 7172 if (!is_error(ret)) 7173 ret = host_to_target_stat64(cpu_env, arg3, &st); 7174 break; 7175 #endif 7176 case TARGET_NR_lchown: 7177 if (!(p = lock_user_string(arg1))) 7178 goto efault; 7179 ret = get_errno(lchown(p, low2highuid(arg2), low2highgid(arg3))); 7180 unlock_user(p, arg1, 0); 7181 break; 7182 #ifdef TARGET_NR_getuid 7183 case TARGET_NR_getuid: 7184 ret = get_errno(high2lowuid(getuid())); 7185 break; 7186 #endif 7187 #ifdef TARGET_NR_getgid 7188 case TARGET_NR_getgid: 7189 ret = get_errno(high2lowgid(getgid())); 7190 break; 7191 #endif 7192 #ifdef TARGET_NR_geteuid 7193 case TARGET_NR_geteuid: 7194 ret = get_errno(high2lowuid(geteuid())); 7195 break; 7196 #endif 7197 #ifdef TARGET_NR_getegid 7198 case TARGET_NR_getegid: 7199 ret = get_errno(high2lowgid(getegid())); 7200 break; 7201 #endif 7202 case TARGET_NR_setreuid: 7203 ret = get_errno(setreuid(low2highuid(arg1), low2highuid(arg2))); 7204 break; 7205 case TARGET_NR_setregid: 7206 ret = get_errno(setregid(low2highgid(arg1), low2highgid(arg2))); 7207 break; 7208 case TARGET_NR_getgroups: 7209 { 7210 int gidsetsize = arg1; 7211 target_id *target_grouplist; 7212 gid_t *grouplist; 7213 int i; 7214 7215 grouplist = alloca(gidsetsize * sizeof(gid_t)); 7216 ret = get_errno(getgroups(gidsetsize, grouplist)); 7217 if (gidsetsize == 0) 7218 break; 7219 if (!is_error(ret)) { 7220 target_grouplist = lock_user(VERIFY_WRITE, arg2, gidsetsize * 2, 0); 7221 if (!target_grouplist) 7222 goto efault; 7223 for(i = 0;i < ret; i++) 7224 target_grouplist[i] = tswapid(high2lowgid(grouplist[i])); 7225 unlock_user(target_grouplist, arg2, gidsetsize * 2); 7226 } 7227 } 7228 break; 7229 case TARGET_NR_setgroups: 7230 { 7231 int gidsetsize = arg1; 7232 target_id *target_grouplist; 7233 gid_t *grouplist; 7234 int i; 7235 7236 grouplist = alloca(gidsetsize * sizeof(gid_t)); 7237 target_grouplist = lock_user(VERIFY_READ, arg2, gidsetsize * 2, 1); 7238 if (!target_grouplist) { 7239 ret = -TARGET_EFAULT; 7240 goto fail; 7241 } 7242 for(i = 0;i < gidsetsize; i++) 7243 grouplist[i] = low2highgid(tswapid(target_grouplist[i])); 7244 unlock_user(target_grouplist, arg2, 0); 7245 ret = get_errno(setgroups(gidsetsize, grouplist)); 7246 } 7247 break; 7248 case TARGET_NR_fchown: 7249 ret = get_errno(fchown(arg1, low2highuid(arg2), low2highgid(arg3))); 7250 break; 7251 #if defined(TARGET_NR_fchownat) && defined(__NR_fchownat) 7252 case TARGET_NR_fchownat: 7253 if (!(p = lock_user_string(arg2))) 7254 goto efault; 7255 ret = get_errno(sys_fchownat(arg1, p, low2highuid(arg3), low2highgid(arg4), arg5)); 7256 unlock_user(p, arg2, 0); 7257 break; 7258 #endif 7259 #ifdef TARGET_NR_setresuid 7260 case TARGET_NR_setresuid: 7261 ret = get_errno(setresuid(low2highuid(arg1), 7262 low2highuid(arg2), 7263 low2highuid(arg3))); 7264 break; 7265 #endif 7266 #ifdef TARGET_NR_getresuid 7267 case TARGET_NR_getresuid: 7268 { 7269 uid_t ruid, euid, suid; 7270 ret = get_errno(getresuid(&ruid, &euid, &suid)); 7271 if (!is_error(ret)) { 7272 if (put_user_u16(high2lowuid(ruid), arg1) 7273 || put_user_u16(high2lowuid(euid), arg2) 7274 || put_user_u16(high2lowuid(suid), arg3)) 7275 goto efault; 7276 } 7277 } 7278 break; 7279 #endif 7280 #ifdef TARGET_NR_getresgid 7281 case TARGET_NR_setresgid: 7282 ret = get_errno(setresgid(low2highgid(arg1), 7283 low2highgid(arg2), 7284 low2highgid(arg3))); 7285 break; 7286 #endif 7287 #ifdef TARGET_NR_getresgid 7288 case TARGET_NR_getresgid: 7289 { 7290 gid_t rgid, egid, sgid; 7291 ret = get_errno(getresgid(&rgid, &egid, &sgid)); 7292 if (!is_error(ret)) { 7293 if (put_user_u16(high2lowgid(rgid), arg1) 7294 || put_user_u16(high2lowgid(egid), arg2) 7295 || put_user_u16(high2lowgid(sgid), arg3)) 7296 goto efault; 7297 } 7298 } 7299 break; 7300 #endif 7301 case TARGET_NR_chown: 7302 if (!(p = lock_user_string(arg1))) 7303 goto efault; 7304 ret = get_errno(chown(p, low2highuid(arg2), low2highgid(arg3))); 7305 unlock_user(p, arg1, 0); 7306 break; 7307 case TARGET_NR_setuid: 7308 ret = get_errno(setuid(low2highuid(arg1))); 7309 break; 7310 case TARGET_NR_setgid: 7311 ret = get_errno(setgid(low2highgid(arg1))); 7312 break; 7313 case TARGET_NR_setfsuid: 7314 ret = get_errno(setfsuid(arg1)); 7315 break; 7316 case TARGET_NR_setfsgid: 7317 ret = get_errno(setfsgid(arg1)); 7318 break; 7319 7320 #ifdef TARGET_NR_lchown32 7321 case TARGET_NR_lchown32: 7322 if (!(p = lock_user_string(arg1))) 7323 goto efault; 7324 ret = get_errno(lchown(p, arg2, arg3)); 7325 unlock_user(p, arg1, 0); 7326 break; 7327 #endif 7328 #ifdef TARGET_NR_getuid32 7329 case TARGET_NR_getuid32: 7330 ret = get_errno(getuid()); 7331 break; 7332 #endif 7333 7334 #if defined(TARGET_NR_getxuid) && defined(TARGET_ALPHA) 7335 /* Alpha specific */ 7336 case TARGET_NR_getxuid: 7337 { 7338 uid_t euid; 7339 euid=geteuid(); 7340 ((CPUAlphaState *)cpu_env)->ir[IR_A4]=euid; 7341 } 7342 ret = get_errno(getuid()); 7343 break; 7344 #endif 7345 #if defined(TARGET_NR_getxgid) && defined(TARGET_ALPHA) 7346 /* Alpha specific */ 7347 case TARGET_NR_getxgid: 7348 { 7349 uid_t egid; 7350 egid=getegid(); 7351 ((CPUAlphaState *)cpu_env)->ir[IR_A4]=egid; 7352 } 7353 ret = get_errno(getgid()); 7354 break; 7355 #endif 7356 #if defined(TARGET_NR_osf_getsysinfo) && defined(TARGET_ALPHA) 7357 /* Alpha specific */ 7358 case TARGET_NR_osf_getsysinfo: 7359 ret = -TARGET_EOPNOTSUPP; 7360 switch (arg1) { 7361 case TARGET_GSI_IEEE_FP_CONTROL: 7362 { 7363 uint64_t swcr, fpcr = cpu_alpha_load_fpcr (cpu_env); 7364 7365 /* Copied from linux ieee_fpcr_to_swcr. */ 7366 swcr = (fpcr >> 35) & SWCR_STATUS_MASK; 7367 swcr |= (fpcr >> 36) & SWCR_MAP_DMZ; 7368 swcr |= (~fpcr >> 48) & (SWCR_TRAP_ENABLE_INV 7369 | SWCR_TRAP_ENABLE_DZE 7370 | SWCR_TRAP_ENABLE_OVF); 7371 swcr |= (~fpcr >> 57) & (SWCR_TRAP_ENABLE_UNF 7372 | SWCR_TRAP_ENABLE_INE); 7373 swcr |= (fpcr >> 47) & SWCR_MAP_UMZ; 7374 swcr |= (~fpcr >> 41) & SWCR_TRAP_ENABLE_DNO; 7375 7376 if (put_user_u64 (swcr, arg2)) 7377 goto efault; 7378 ret = 0; 7379 } 7380 break; 7381 7382 /* case GSI_IEEE_STATE_AT_SIGNAL: 7383 -- Not implemented in linux kernel. 7384 case GSI_UACPROC: 7385 -- Retrieves current unaligned access state; not much used. 7386 case GSI_PROC_TYPE: 7387 -- Retrieves implver information; surely not used. 7388 case GSI_GET_HWRPB: 7389 -- Grabs a copy of the HWRPB; surely not used. 7390 */ 7391 } 7392 break; 7393 #endif 7394 #if defined(TARGET_NR_osf_setsysinfo) && defined(TARGET_ALPHA) 7395 /* Alpha specific */ 7396 case TARGET_NR_osf_setsysinfo: 7397 ret = -TARGET_EOPNOTSUPP; 7398 switch (arg1) { 7399 case TARGET_SSI_IEEE_FP_CONTROL: 7400 case TARGET_SSI_IEEE_RAISE_EXCEPTION: 7401 { 7402 uint64_t swcr, fpcr, orig_fpcr; 7403 7404 if (get_user_u64 (swcr, arg2)) 7405 goto efault; 7406 orig_fpcr = cpu_alpha_load_fpcr (cpu_env); 7407 fpcr = orig_fpcr & FPCR_DYN_MASK; 7408 7409 /* Copied from linux ieee_swcr_to_fpcr. */ 7410 fpcr |= (swcr & SWCR_STATUS_MASK) << 35; 7411 fpcr |= (swcr & SWCR_MAP_DMZ) << 36; 7412 fpcr |= (~swcr & (SWCR_TRAP_ENABLE_INV 7413 | SWCR_TRAP_ENABLE_DZE 7414 | SWCR_TRAP_ENABLE_OVF)) << 48; 7415 fpcr |= (~swcr & (SWCR_TRAP_ENABLE_UNF 7416 | SWCR_TRAP_ENABLE_INE)) << 57; 7417 fpcr |= (swcr & SWCR_MAP_UMZ ? FPCR_UNDZ | FPCR_UNFD : 0); 7418 fpcr |= (~swcr & SWCR_TRAP_ENABLE_DNO) << 41; 7419 7420 cpu_alpha_store_fpcr (cpu_env, fpcr); 7421 ret = 0; 7422 7423 if (arg1 == TARGET_SSI_IEEE_RAISE_EXCEPTION) { 7424 /* Old exceptions are not signaled. */ 7425 fpcr &= ~(orig_fpcr & FPCR_STATUS_MASK); 7426 7427 /* If any exceptions set by this call, and are unmasked, 7428 send a signal. */ 7429 /* ??? FIXME */ 7430 } 7431 } 7432 break; 7433 7434 /* case SSI_NVPAIRS: 7435 -- Used with SSIN_UACPROC to enable unaligned accesses. 7436 case SSI_IEEE_STATE_AT_SIGNAL: 7437 case SSI_IEEE_IGNORE_STATE_AT_SIGNAL: 7438 -- Not implemented in linux kernel 7439 */ 7440 } 7441 break; 7442 #endif 7443 #ifdef TARGET_NR_osf_sigprocmask 7444 /* Alpha specific. */ 7445 case TARGET_NR_osf_sigprocmask: 7446 { 7447 abi_ulong mask; 7448 int how; 7449 sigset_t set, oldset; 7450 7451 switch(arg1) { 7452 case TARGET_SIG_BLOCK: 7453 how = SIG_BLOCK; 7454 break; 7455 case TARGET_SIG_UNBLOCK: 7456 how = SIG_UNBLOCK; 7457 break; 7458 case TARGET_SIG_SETMASK: 7459 how = SIG_SETMASK; 7460 break; 7461 default: 7462 ret = -TARGET_EINVAL; 7463 goto fail; 7464 } 7465 mask = arg2; 7466 target_to_host_old_sigset(&set, &mask); 7467 sigprocmask(how, &set, &oldset); 7468 host_to_target_old_sigset(&mask, &oldset); 7469 ret = mask; 7470 } 7471 break; 7472 #endif 7473 7474 #ifdef TARGET_NR_getgid32 7475 case TARGET_NR_getgid32: 7476 ret = get_errno(getgid()); 7477 break; 7478 #endif 7479 #ifdef TARGET_NR_geteuid32 7480 case TARGET_NR_geteuid32: 7481 ret = get_errno(geteuid()); 7482 break; 7483 #endif 7484 #ifdef TARGET_NR_getegid32 7485 case TARGET_NR_getegid32: 7486 ret = get_errno(getegid()); 7487 break; 7488 #endif 7489 #ifdef TARGET_NR_setreuid32 7490 case TARGET_NR_setreuid32: 7491 ret = get_errno(setreuid(arg1, arg2)); 7492 break; 7493 #endif 7494 #ifdef TARGET_NR_setregid32 7495 case TARGET_NR_setregid32: 7496 ret = get_errno(setregid(arg1, arg2)); 7497 break; 7498 #endif 7499 #ifdef TARGET_NR_getgroups32 7500 case TARGET_NR_getgroups32: 7501 { 7502 int gidsetsize = arg1; 7503 uint32_t *target_grouplist; 7504 gid_t *grouplist; 7505 int i; 7506 7507 grouplist = alloca(gidsetsize * sizeof(gid_t)); 7508 ret = get_errno(getgroups(gidsetsize, grouplist)); 7509 if (gidsetsize == 0) 7510 break; 7511 if (!is_error(ret)) { 7512 target_grouplist = lock_user(VERIFY_WRITE, arg2, gidsetsize * 4, 0); 7513 if (!target_grouplist) { 7514 ret = -TARGET_EFAULT; 7515 goto fail; 7516 } 7517 for(i = 0;i < ret; i++) 7518 target_grouplist[i] = tswap32(grouplist[i]); 7519 unlock_user(target_grouplist, arg2, gidsetsize * 4); 7520 } 7521 } 7522 break; 7523 #endif 7524 #ifdef TARGET_NR_setgroups32 7525 case TARGET_NR_setgroups32: 7526 { 7527 int gidsetsize = arg1; 7528 uint32_t *target_grouplist; 7529 gid_t *grouplist; 7530 int i; 7531 7532 grouplist = alloca(gidsetsize * sizeof(gid_t)); 7533 target_grouplist = lock_user(VERIFY_READ, arg2, gidsetsize * 4, 1); 7534 if (!target_grouplist) { 7535 ret = -TARGET_EFAULT; 7536 goto fail; 7537 } 7538 for(i = 0;i < gidsetsize; i++) 7539 grouplist[i] = tswap32(target_grouplist[i]); 7540 unlock_user(target_grouplist, arg2, 0); 7541 ret = get_errno(setgroups(gidsetsize, grouplist)); 7542 } 7543 break; 7544 #endif 7545 #ifdef TARGET_NR_fchown32 7546 case TARGET_NR_fchown32: 7547 ret = get_errno(fchown(arg1, arg2, arg3)); 7548 break; 7549 #endif 7550 #ifdef TARGET_NR_setresuid32 7551 case TARGET_NR_setresuid32: 7552 ret = get_errno(setresuid(arg1, arg2, arg3)); 7553 break; 7554 #endif 7555 #ifdef TARGET_NR_getresuid32 7556 case TARGET_NR_getresuid32: 7557 { 7558 uid_t ruid, euid, suid; 7559 ret = get_errno(getresuid(&ruid, &euid, &suid)); 7560 if (!is_error(ret)) { 7561 if (put_user_u32(ruid, arg1) 7562 || put_user_u32(euid, arg2) 7563 || put_user_u32(suid, arg3)) 7564 goto efault; 7565 } 7566 } 7567 break; 7568 #endif 7569 #ifdef TARGET_NR_setresgid32 7570 case TARGET_NR_setresgid32: 7571 ret = get_errno(setresgid(arg1, arg2, arg3)); 7572 break; 7573 #endif 7574 #ifdef TARGET_NR_getresgid32 7575 case TARGET_NR_getresgid32: 7576 { 7577 gid_t rgid, egid, sgid; 7578 ret = get_errno(getresgid(&rgid, &egid, &sgid)); 7579 if (!is_error(ret)) { 7580 if (put_user_u32(rgid, arg1) 7581 || put_user_u32(egid, arg2) 7582 || put_user_u32(sgid, arg3)) 7583 goto efault; 7584 } 7585 } 7586 break; 7587 #endif 7588 #ifdef TARGET_NR_chown32 7589 case TARGET_NR_chown32: 7590 if (!(p = lock_user_string(arg1))) 7591 goto efault; 7592 ret = get_errno(chown(p, arg2, arg3)); 7593 unlock_user(p, arg1, 0); 7594 break; 7595 #endif 7596 #ifdef TARGET_NR_setuid32 7597 case TARGET_NR_setuid32: 7598 ret = get_errno(setuid(arg1)); 7599 break; 7600 #endif 7601 #ifdef TARGET_NR_setgid32 7602 case TARGET_NR_setgid32: 7603 ret = get_errno(setgid(arg1)); 7604 break; 7605 #endif 7606 #ifdef TARGET_NR_setfsuid32 7607 case TARGET_NR_setfsuid32: 7608 ret = get_errno(setfsuid(arg1)); 7609 break; 7610 #endif 7611 #ifdef TARGET_NR_setfsgid32 7612 case TARGET_NR_setfsgid32: 7613 ret = get_errno(setfsgid(arg1)); 7614 break; 7615 #endif 7616 7617 case TARGET_NR_pivot_root: 7618 goto unimplemented; 7619 #ifdef TARGET_NR_mincore 7620 case TARGET_NR_mincore: 7621 { 7622 void *a; 7623 ret = -TARGET_EFAULT; 7624 if (!(a = lock_user(VERIFY_READ, arg1,arg2, 0))) 7625 goto efault; 7626 if (!(p = lock_user_string(arg3))) 7627 goto mincore_fail; 7628 ret = get_errno(mincore(a, arg2, p)); 7629 unlock_user(p, arg3, ret); 7630 mincore_fail: 7631 unlock_user(a, arg1, 0); 7632 } 7633 break; 7634 #endif 7635 #ifdef TARGET_NR_arm_fadvise64_64 7636 case TARGET_NR_arm_fadvise64_64: 7637 { 7638 /* 7639 * arm_fadvise64_64 looks like fadvise64_64 but 7640 * with different argument order 7641 */ 7642 abi_long temp; 7643 temp = arg3; 7644 arg3 = arg4; 7645 arg4 = temp; 7646 } 7647 #endif 7648 #if defined(TARGET_NR_fadvise64_64) || defined(TARGET_NR_arm_fadvise64_64) || defined(TARGET_NR_fadvise64) 7649 #ifdef TARGET_NR_fadvise64_64 7650 case TARGET_NR_fadvise64_64: 7651 #endif 7652 #ifdef TARGET_NR_fadvise64 7653 case TARGET_NR_fadvise64: 7654 #endif 7655 #ifdef TARGET_S390X 7656 switch (arg4) { 7657 case 4: arg4 = POSIX_FADV_NOREUSE + 1; break; /* make sure it's an invalid value */ 7658 case 5: arg4 = POSIX_FADV_NOREUSE + 2; break; /* ditto */ 7659 case 6: arg4 = POSIX_FADV_DONTNEED; break; 7660 case 7: arg4 = POSIX_FADV_NOREUSE; break; 7661 default: break; 7662 } 7663 #endif 7664 ret = -posix_fadvise(arg1, arg2, arg3, arg4); 7665 break; 7666 #endif 7667 #ifdef TARGET_NR_madvise 7668 case TARGET_NR_madvise: 7669 /* A straight passthrough may not be safe because qemu sometimes 7670 turns private flie-backed mappings into anonymous mappings. 7671 This will break MADV_DONTNEED. 7672 This is a hint, so ignoring and returning success is ok. */ 7673 ret = get_errno(0); 7674 break; 7675 #endif 7676 #if TARGET_ABI_BITS == 32 7677 case TARGET_NR_fcntl64: 7678 { 7679 int cmd; 7680 struct flock64 fl; 7681 struct target_flock64 *target_fl; 7682 #ifdef TARGET_ARM 7683 struct target_eabi_flock64 *target_efl; 7684 #endif 7685 7686 cmd = target_to_host_fcntl_cmd(arg2); 7687 if (cmd == -TARGET_EINVAL) { 7688 ret = cmd; 7689 break; 7690 } 7691 7692 switch(arg2) { 7693 case TARGET_F_GETLK64: 7694 #ifdef TARGET_ARM 7695 if (((CPUARMState *)cpu_env)->eabi) { 7696 if (!lock_user_struct(VERIFY_READ, target_efl, arg3, 1)) 7697 goto efault; 7698 fl.l_type = tswap16(target_efl->l_type); 7699 fl.l_whence = tswap16(target_efl->l_whence); 7700 fl.l_start = tswap64(target_efl->l_start); 7701 fl.l_len = tswap64(target_efl->l_len); 7702 fl.l_pid = tswap32(target_efl->l_pid); 7703 unlock_user_struct(target_efl, arg3, 0); 7704 } else 7705 #endif 7706 { 7707 if (!lock_user_struct(VERIFY_READ, target_fl, arg3, 1)) 7708 goto efault; 7709 fl.l_type = tswap16(target_fl->l_type); 7710 fl.l_whence = tswap16(target_fl->l_whence); 7711 fl.l_start = tswap64(target_fl->l_start); 7712 fl.l_len = tswap64(target_fl->l_len); 7713 fl.l_pid = tswap32(target_fl->l_pid); 7714 unlock_user_struct(target_fl, arg3, 0); 7715 } 7716 ret = get_errno(fcntl(arg1, cmd, &fl)); 7717 if (ret == 0) { 7718 #ifdef TARGET_ARM 7719 if (((CPUARMState *)cpu_env)->eabi) { 7720 if (!lock_user_struct(VERIFY_WRITE, target_efl, arg3, 0)) 7721 goto efault; 7722 target_efl->l_type = tswap16(fl.l_type); 7723 target_efl->l_whence = tswap16(fl.l_whence); 7724 target_efl->l_start = tswap64(fl.l_start); 7725 target_efl->l_len = tswap64(fl.l_len); 7726 target_efl->l_pid = tswap32(fl.l_pid); 7727 unlock_user_struct(target_efl, arg3, 1); 7728 } else 7729 #endif 7730 { 7731 if (!lock_user_struct(VERIFY_WRITE, target_fl, arg3, 0)) 7732 goto efault; 7733 target_fl->l_type = tswap16(fl.l_type); 7734 target_fl->l_whence = tswap16(fl.l_whence); 7735 target_fl->l_start = tswap64(fl.l_start); 7736 target_fl->l_len = tswap64(fl.l_len); 7737 target_fl->l_pid = tswap32(fl.l_pid); 7738 unlock_user_struct(target_fl, arg3, 1); 7739 } 7740 } 7741 break; 7742 7743 case TARGET_F_SETLK64: 7744 case TARGET_F_SETLKW64: 7745 #ifdef TARGET_ARM 7746 if (((CPUARMState *)cpu_env)->eabi) { 7747 if (!lock_user_struct(VERIFY_READ, target_efl, arg3, 1)) 7748 goto efault; 7749 fl.l_type = tswap16(target_efl->l_type); 7750 fl.l_whence = tswap16(target_efl->l_whence); 7751 fl.l_start = tswap64(target_efl->l_start); 7752 fl.l_len = tswap64(target_efl->l_len); 7753 fl.l_pid = tswap32(target_efl->l_pid); 7754 unlock_user_struct(target_efl, arg3, 0); 7755 } else 7756 #endif 7757 { 7758 if (!lock_user_struct(VERIFY_READ, target_fl, arg3, 1)) 7759 goto efault; 7760 fl.l_type = tswap16(target_fl->l_type); 7761 fl.l_whence = tswap16(target_fl->l_whence); 7762 fl.l_start = tswap64(target_fl->l_start); 7763 fl.l_len = tswap64(target_fl->l_len); 7764 fl.l_pid = tswap32(target_fl->l_pid); 7765 unlock_user_struct(target_fl, arg3, 0); 7766 } 7767 ret = get_errno(fcntl(arg1, cmd, &fl)); 7768 break; 7769 default: 7770 ret = do_fcntl(arg1, arg2, arg3); 7771 break; 7772 } 7773 break; 7774 } 7775 #endif 7776 #ifdef TARGET_NR_cacheflush 7777 case TARGET_NR_cacheflush: 7778 /* self-modifying code is handled automatically, so nothing needed */ 7779 ret = 0; 7780 break; 7781 #endif 7782 #ifdef TARGET_NR_security 7783 case TARGET_NR_security: 7784 goto unimplemented; 7785 #endif 7786 #ifdef TARGET_NR_getpagesize 7787 case TARGET_NR_getpagesize: 7788 ret = TARGET_PAGE_SIZE; 7789 break; 7790 #endif 7791 case TARGET_NR_gettid: 7792 ret = get_errno(gettid()); 7793 break; 7794 #ifdef TARGET_NR_readahead 7795 case TARGET_NR_readahead: 7796 #if TARGET_ABI_BITS == 32 7797 if (regpairs_aligned(cpu_env)) { 7798 arg2 = arg3; 7799 arg3 = arg4; 7800 arg4 = arg5; 7801 } 7802 ret = get_errno(readahead(arg1, ((off64_t)arg3 << 32) | arg2, arg4)); 7803 #else 7804 ret = get_errno(readahead(arg1, arg2, arg3)); 7805 #endif 7806 break; 7807 #endif 7808 #ifdef CONFIG_ATTR 7809 #ifdef TARGET_NR_setxattr 7810 case TARGET_NR_listxattr: 7811 case TARGET_NR_llistxattr: 7812 { 7813 void *p, *b = 0; 7814 if (arg2) { 7815 b = lock_user(VERIFY_WRITE, arg2, arg3, 0); 7816 if (!b) { 7817 ret = -TARGET_EFAULT; 7818 break; 7819 } 7820 } 7821 p = lock_user_string(arg1); 7822 if (p) { 7823 if (num == TARGET_NR_listxattr) { 7824 ret = get_errno(listxattr(p, b, arg3)); 7825 } else { 7826 ret = get_errno(llistxattr(p, b, arg3)); 7827 } 7828 } else { 7829 ret = -TARGET_EFAULT; 7830 } 7831 unlock_user(p, arg1, 0); 7832 unlock_user(b, arg2, arg3); 7833 break; 7834 } 7835 case TARGET_NR_flistxattr: 7836 { 7837 void *b = 0; 7838 if (arg2) { 7839 b = lock_user(VERIFY_WRITE, arg2, arg3, 0); 7840 if (!b) { 7841 ret = -TARGET_EFAULT; 7842 break; 7843 } 7844 } 7845 ret = get_errno(flistxattr(arg1, b, arg3)); 7846 unlock_user(b, arg2, arg3); 7847 break; 7848 } 7849 case TARGET_NR_setxattr: 7850 case TARGET_NR_lsetxattr: 7851 { 7852 void *p, *n, *v = 0; 7853 if (arg3) { 7854 v = lock_user(VERIFY_READ, arg3, arg4, 1); 7855 if (!v) { 7856 ret = -TARGET_EFAULT; 7857 break; 7858 } 7859 } 7860 p = lock_user_string(arg1); 7861 n = lock_user_string(arg2); 7862 if (p && n) { 7863 if (num == TARGET_NR_setxattr) { 7864 ret = get_errno(setxattr(p, n, v, arg4, arg5)); 7865 } else { 7866 ret = get_errno(lsetxattr(p, n, v, arg4, arg5)); 7867 } 7868 } else { 7869 ret = -TARGET_EFAULT; 7870 } 7871 unlock_user(p, arg1, 0); 7872 unlock_user(n, arg2, 0); 7873 unlock_user(v, arg3, 0); 7874 } 7875 break; 7876 case TARGET_NR_fsetxattr: 7877 { 7878 void *n, *v = 0; 7879 if (arg3) { 7880 v = lock_user(VERIFY_READ, arg3, arg4, 1); 7881 if (!v) { 7882 ret = -TARGET_EFAULT; 7883 break; 7884 } 7885 } 7886 n = lock_user_string(arg2); 7887 if (n) { 7888 ret = get_errno(fsetxattr(arg1, n, v, arg4, arg5)); 7889 } else { 7890 ret = -TARGET_EFAULT; 7891 } 7892 unlock_user(n, arg2, 0); 7893 unlock_user(v, arg3, 0); 7894 } 7895 break; 7896 case TARGET_NR_getxattr: 7897 case TARGET_NR_lgetxattr: 7898 { 7899 void *p, *n, *v = 0; 7900 if (arg3) { 7901 v = lock_user(VERIFY_WRITE, arg3, arg4, 0); 7902 if (!v) { 7903 ret = -TARGET_EFAULT; 7904 break; 7905 } 7906 } 7907 p = lock_user_string(arg1); 7908 n = lock_user_string(arg2); 7909 if (p && n) { 7910 if (num == TARGET_NR_getxattr) { 7911 ret = get_errno(getxattr(p, n, v, arg4)); 7912 } else { 7913 ret = get_errno(lgetxattr(p, n, v, arg4)); 7914 } 7915 } else { 7916 ret = -TARGET_EFAULT; 7917 } 7918 unlock_user(p, arg1, 0); 7919 unlock_user(n, arg2, 0); 7920 unlock_user(v, arg3, arg4); 7921 } 7922 break; 7923 case TARGET_NR_fgetxattr: 7924 { 7925 void *n, *v = 0; 7926 if (arg3) { 7927 v = lock_user(VERIFY_WRITE, arg3, arg4, 0); 7928 if (!v) { 7929 ret = -TARGET_EFAULT; 7930 break; 7931 } 7932 } 7933 n = lock_user_string(arg2); 7934 if (n) { 7935 ret = get_errno(fgetxattr(arg1, n, v, arg4)); 7936 } else { 7937 ret = -TARGET_EFAULT; 7938 } 7939 unlock_user(n, arg2, 0); 7940 unlock_user(v, arg3, arg4); 7941 } 7942 break; 7943 case TARGET_NR_removexattr: 7944 case TARGET_NR_lremovexattr: 7945 { 7946 void *p, *n; 7947 p = lock_user_string(arg1); 7948 n = lock_user_string(arg2); 7949 if (p && n) { 7950 if (num == TARGET_NR_removexattr) { 7951 ret = get_errno(removexattr(p, n)); 7952 } else { 7953 ret = get_errno(lremovexattr(p, n)); 7954 } 7955 } else { 7956 ret = -TARGET_EFAULT; 7957 } 7958 unlock_user(p, arg1, 0); 7959 unlock_user(n, arg2, 0); 7960 } 7961 break; 7962 case TARGET_NR_fremovexattr: 7963 { 7964 void *n; 7965 n = lock_user_string(arg2); 7966 if (n) { 7967 ret = get_errno(fremovexattr(arg1, n)); 7968 } else { 7969 ret = -TARGET_EFAULT; 7970 } 7971 unlock_user(n, arg2, 0); 7972 } 7973 break; 7974 #endif 7975 #endif /* CONFIG_ATTR */ 7976 #ifdef TARGET_NR_set_thread_area 7977 case TARGET_NR_set_thread_area: 7978 #if defined(TARGET_MIPS) 7979 ((CPUMIPSState *) cpu_env)->tls_value = arg1; 7980 ret = 0; 7981 break; 7982 #elif defined(TARGET_CRIS) 7983 if (arg1 & 0xff) 7984 ret = -TARGET_EINVAL; 7985 else { 7986 ((CPUCRISState *) cpu_env)->pregs[PR_PID] = arg1; 7987 ret = 0; 7988 } 7989 break; 7990 #elif defined(TARGET_I386) && defined(TARGET_ABI32) 7991 ret = do_set_thread_area(cpu_env, arg1); 7992 break; 7993 #else 7994 goto unimplemented_nowarn; 7995 #endif 7996 #endif 7997 #ifdef TARGET_NR_get_thread_area 7998 case TARGET_NR_get_thread_area: 7999 #if defined(TARGET_I386) && defined(TARGET_ABI32) 8000 ret = do_get_thread_area(cpu_env, arg1); 8001 #else 8002 goto unimplemented_nowarn; 8003 #endif 8004 #endif 8005 #ifdef TARGET_NR_getdomainname 8006 case TARGET_NR_getdomainname: 8007 goto unimplemented_nowarn; 8008 #endif 8009 8010 #ifdef TARGET_NR_clock_gettime 8011 case TARGET_NR_clock_gettime: 8012 { 8013 struct timespec ts; 8014 ret = get_errno(clock_gettime(arg1, &ts)); 8015 if (!is_error(ret)) { 8016 host_to_target_timespec(arg2, &ts); 8017 } 8018 break; 8019 } 8020 #endif 8021 #ifdef TARGET_NR_clock_getres 8022 case TARGET_NR_clock_getres: 8023 { 8024 struct timespec ts; 8025 ret = get_errno(clock_getres(arg1, &ts)); 8026 if (!is_error(ret)) { 8027 host_to_target_timespec(arg2, &ts); 8028 } 8029 break; 8030 } 8031 #endif 8032 #ifdef TARGET_NR_clock_nanosleep 8033 case TARGET_NR_clock_nanosleep: 8034 { 8035 struct timespec ts; 8036 target_to_host_timespec(&ts, arg3); 8037 ret = get_errno(clock_nanosleep(arg1, arg2, &ts, arg4 ? &ts : NULL)); 8038 if (arg4) 8039 host_to_target_timespec(arg4, &ts); 8040 break; 8041 } 8042 #endif 8043 8044 #if defined(TARGET_NR_set_tid_address) && defined(__NR_set_tid_address) 8045 case TARGET_NR_set_tid_address: 8046 ret = get_errno(set_tid_address((int *)g2h(arg1))); 8047 break; 8048 #endif 8049 8050 #if defined(TARGET_NR_tkill) && defined(__NR_tkill) 8051 case TARGET_NR_tkill: 8052 ret = get_errno(sys_tkill((int)arg1, target_to_host_signal(arg2))); 8053 break; 8054 #endif 8055 8056 #if defined(TARGET_NR_tgkill) && defined(__NR_tgkill) 8057 case TARGET_NR_tgkill: 8058 ret = get_errno(sys_tgkill((int)arg1, (int)arg2, 8059 target_to_host_signal(arg3))); 8060 break; 8061 #endif 8062 8063 #ifdef TARGET_NR_set_robust_list 8064 case TARGET_NR_set_robust_list: 8065 goto unimplemented_nowarn; 8066 #endif 8067 8068 #if defined(TARGET_NR_utimensat) && defined(__NR_utimensat) 8069 case TARGET_NR_utimensat: 8070 { 8071 struct timespec *tsp, ts[2]; 8072 if (!arg3) { 8073 tsp = NULL; 8074 } else { 8075 target_to_host_timespec(ts, arg3); 8076 target_to_host_timespec(ts+1, arg3+sizeof(struct target_timespec)); 8077 tsp = ts; 8078 } 8079 if (!arg2) 8080 ret = get_errno(sys_utimensat(arg1, NULL, tsp, arg4)); 8081 else { 8082 if (!(p = lock_user_string(arg2))) { 8083 ret = -TARGET_EFAULT; 8084 goto fail; 8085 } 8086 ret = get_errno(sys_utimensat(arg1, path(p), tsp, arg4)); 8087 unlock_user(p, arg2, 0); 8088 } 8089 } 8090 break; 8091 #endif 8092 #if defined(CONFIG_USE_NPTL) 8093 case TARGET_NR_futex: 8094 ret = do_futex(arg1, arg2, arg3, arg4, arg5, arg6); 8095 break; 8096 #endif 8097 #if defined(TARGET_NR_inotify_init) && defined(__NR_inotify_init) 8098 case TARGET_NR_inotify_init: 8099 ret = get_errno(sys_inotify_init()); 8100 break; 8101 #endif 8102 #ifdef CONFIG_INOTIFY1 8103 #if defined(TARGET_NR_inotify_init1) && defined(__NR_inotify_init1) 8104 case TARGET_NR_inotify_init1: 8105 ret = get_errno(sys_inotify_init1(arg1)); 8106 break; 8107 #endif 8108 #endif 8109 #if defined(TARGET_NR_inotify_add_watch) && defined(__NR_inotify_add_watch) 8110 case TARGET_NR_inotify_add_watch: 8111 p = lock_user_string(arg2); 8112 ret = get_errno(sys_inotify_add_watch(arg1, path(p), arg3)); 8113 unlock_user(p, arg2, 0); 8114 break; 8115 #endif 8116 #if defined(TARGET_NR_inotify_rm_watch) && defined(__NR_inotify_rm_watch) 8117 case TARGET_NR_inotify_rm_watch: 8118 ret = get_errno(sys_inotify_rm_watch(arg1, arg2)); 8119 break; 8120 #endif 8121 8122 #if defined(TARGET_NR_mq_open) && defined(__NR_mq_open) 8123 case TARGET_NR_mq_open: 8124 { 8125 struct mq_attr posix_mq_attr; 8126 8127 p = lock_user_string(arg1 - 1); 8128 if (arg4 != 0) 8129 copy_from_user_mq_attr (&posix_mq_attr, arg4); 8130 ret = get_errno(mq_open(p, arg2, arg3, &posix_mq_attr)); 8131 unlock_user (p, arg1, 0); 8132 } 8133 break; 8134 8135 case TARGET_NR_mq_unlink: 8136 p = lock_user_string(arg1 - 1); 8137 ret = get_errno(mq_unlink(p)); 8138 unlock_user (p, arg1, 0); 8139 break; 8140 8141 case TARGET_NR_mq_timedsend: 8142 { 8143 struct timespec ts; 8144 8145 p = lock_user (VERIFY_READ, arg2, arg3, 1); 8146 if (arg5 != 0) { 8147 target_to_host_timespec(&ts, arg5); 8148 ret = get_errno(mq_timedsend(arg1, p, arg3, arg4, &ts)); 8149 host_to_target_timespec(arg5, &ts); 8150 } 8151 else 8152 ret = get_errno(mq_send(arg1, p, arg3, arg4)); 8153 unlock_user (p, arg2, arg3); 8154 } 8155 break; 8156 8157 case TARGET_NR_mq_timedreceive: 8158 { 8159 struct timespec ts; 8160 unsigned int prio; 8161 8162 p = lock_user (VERIFY_READ, arg2, arg3, 1); 8163 if (arg5 != 0) { 8164 target_to_host_timespec(&ts, arg5); 8165 ret = get_errno(mq_timedreceive(arg1, p, arg3, &prio, &ts)); 8166 host_to_target_timespec(arg5, &ts); 8167 } 8168 else 8169 ret = get_errno(mq_receive(arg1, p, arg3, &prio)); 8170 unlock_user (p, arg2, arg3); 8171 if (arg4 != 0) 8172 put_user_u32(prio, arg4); 8173 } 8174 break; 8175 8176 /* Not implemented for now... */ 8177 /* case TARGET_NR_mq_notify: */ 8178 /* break; */ 8179 8180 case TARGET_NR_mq_getsetattr: 8181 { 8182 struct mq_attr posix_mq_attr_in, posix_mq_attr_out; 8183 ret = 0; 8184 if (arg3 != 0) { 8185 ret = mq_getattr(arg1, &posix_mq_attr_out); 8186 copy_to_user_mq_attr(arg3, &posix_mq_attr_out); 8187 } 8188 if (arg2 != 0) { 8189 copy_from_user_mq_attr(&posix_mq_attr_in, arg2); 8190 ret |= mq_setattr(arg1, &posix_mq_attr_in, &posix_mq_attr_out); 8191 } 8192 8193 } 8194 break; 8195 #endif 8196 8197 #ifdef CONFIG_SPLICE 8198 #ifdef TARGET_NR_tee 8199 case TARGET_NR_tee: 8200 { 8201 ret = get_errno(tee(arg1,arg2,arg3,arg4)); 8202 } 8203 break; 8204 #endif 8205 #ifdef TARGET_NR_splice 8206 case TARGET_NR_splice: 8207 { 8208 loff_t loff_in, loff_out; 8209 loff_t *ploff_in = NULL, *ploff_out = NULL; 8210 if(arg2) { 8211 get_user_u64(loff_in, arg2); 8212 ploff_in = &loff_in; 8213 } 8214 if(arg4) { 8215 get_user_u64(loff_out, arg2); 8216 ploff_out = &loff_out; 8217 } 8218 ret = get_errno(splice(arg1, ploff_in, arg3, ploff_out, arg5, arg6)); 8219 } 8220 break; 8221 #endif 8222 #ifdef TARGET_NR_vmsplice 8223 case TARGET_NR_vmsplice: 8224 { 8225 int count = arg3; 8226 struct iovec *vec; 8227 8228 vec = alloca(count * sizeof(struct iovec)); 8229 if (lock_iovec(VERIFY_READ, vec, arg2, count, 1) < 0) 8230 goto efault; 8231 ret = get_errno(vmsplice(arg1, vec, count, arg4)); 8232 unlock_iovec(vec, arg2, count, 0); 8233 } 8234 break; 8235 #endif 8236 #endif /* CONFIG_SPLICE */ 8237 #ifdef CONFIG_EVENTFD 8238 #if defined(TARGET_NR_eventfd) 8239 case TARGET_NR_eventfd: 8240 ret = get_errno(eventfd(arg1, 0)); 8241 break; 8242 #endif 8243 #if defined(TARGET_NR_eventfd2) 8244 case TARGET_NR_eventfd2: 8245 ret = get_errno(eventfd(arg1, arg2)); 8246 break; 8247 #endif 8248 #endif /* CONFIG_EVENTFD */ 8249 #if defined(CONFIG_FALLOCATE) && defined(TARGET_NR_fallocate) 8250 case TARGET_NR_fallocate: 8251 ret = get_errno(fallocate(arg1, arg2, arg3, arg4)); 8252 break; 8253 #endif 8254 #if defined(CONFIG_SYNC_FILE_RANGE) 8255 #if defined(TARGET_NR_sync_file_range) 8256 case TARGET_NR_sync_file_range: 8257 #if TARGET_ABI_BITS == 32 8258 #if defined(TARGET_MIPS) 8259 ret = get_errno(sync_file_range(arg1, target_offset64(arg3, arg4), 8260 target_offset64(arg5, arg6), arg7)); 8261 #else 8262 ret = get_errno(sync_file_range(arg1, target_offset64(arg2, arg3), 8263 target_offset64(arg4, arg5), arg6)); 8264 #endif /* !TARGET_MIPS */ 8265 #else 8266 ret = get_errno(sync_file_range(arg1, arg2, arg3, arg4)); 8267 #endif 8268 break; 8269 #endif 8270 #if defined(TARGET_NR_sync_file_range2) 8271 case TARGET_NR_sync_file_range2: 8272 /* This is like sync_file_range but the arguments are reordered */ 8273 #if TARGET_ABI_BITS == 32 8274 ret = get_errno(sync_file_range(arg1, target_offset64(arg3, arg4), 8275 target_offset64(arg5, arg6), arg2)); 8276 #else 8277 ret = get_errno(sync_file_range(arg1, arg3, arg4, arg2)); 8278 #endif 8279 break; 8280 #endif 8281 #endif 8282 #if defined(CONFIG_EPOLL) 8283 #if defined(TARGET_NR_epoll_create) 8284 case TARGET_NR_epoll_create: 8285 ret = get_errno(epoll_create(arg1)); 8286 break; 8287 #endif 8288 #if defined(TARGET_NR_epoll_create1) && defined(CONFIG_EPOLL_CREATE1) 8289 case TARGET_NR_epoll_create1: 8290 ret = get_errno(epoll_create1(arg1)); 8291 break; 8292 #endif 8293 #if defined(TARGET_NR_epoll_ctl) 8294 case TARGET_NR_epoll_ctl: 8295 { 8296 struct epoll_event ep; 8297 struct epoll_event *epp = 0; 8298 if (arg4) { 8299 struct target_epoll_event *target_ep; 8300 if (!lock_user_struct(VERIFY_READ, target_ep, arg4, 1)) { 8301 goto efault; 8302 } 8303 ep.events = tswap32(target_ep->events); 8304 /* The epoll_data_t union is just opaque data to the kernel, 8305 * so we transfer all 64 bits across and need not worry what 8306 * actual data type it is. 8307 */ 8308 ep.data.u64 = tswap64(target_ep->data.u64); 8309 unlock_user_struct(target_ep, arg4, 0); 8310 epp = &ep; 8311 } 8312 ret = get_errno(epoll_ctl(arg1, arg2, arg3, epp)); 8313 break; 8314 } 8315 #endif 8316 8317 #if defined(TARGET_NR_epoll_pwait) && defined(CONFIG_EPOLL_PWAIT) 8318 #define IMPLEMENT_EPOLL_PWAIT 8319 #endif 8320 #if defined(TARGET_NR_epoll_wait) || defined(IMPLEMENT_EPOLL_PWAIT) 8321 #if defined(TARGET_NR_epoll_wait) 8322 case TARGET_NR_epoll_wait: 8323 #endif 8324 #if defined(IMPLEMENT_EPOLL_PWAIT) 8325 case TARGET_NR_epoll_pwait: 8326 #endif 8327 { 8328 struct target_epoll_event *target_ep; 8329 struct epoll_event *ep; 8330 int epfd = arg1; 8331 int maxevents = arg3; 8332 int timeout = arg4; 8333 8334 target_ep = lock_user(VERIFY_WRITE, arg2, 8335 maxevents * sizeof(struct target_epoll_event), 1); 8336 if (!target_ep) { 8337 goto efault; 8338 } 8339 8340 ep = alloca(maxevents * sizeof(struct epoll_event)); 8341 8342 switch (num) { 8343 #if defined(IMPLEMENT_EPOLL_PWAIT) 8344 case TARGET_NR_epoll_pwait: 8345 { 8346 target_sigset_t *target_set; 8347 sigset_t _set, *set = &_set; 8348 8349 if (arg5) { 8350 target_set = lock_user(VERIFY_READ, arg5, 8351 sizeof(target_sigset_t), 1); 8352 if (!target_set) { 8353 unlock_user(target_ep, arg2, 0); 8354 goto efault; 8355 } 8356 target_to_host_sigset(set, target_set); 8357 unlock_user(target_set, arg5, 0); 8358 } else { 8359 set = NULL; 8360 } 8361 8362 ret = get_errno(epoll_pwait(epfd, ep, maxevents, timeout, set)); 8363 break; 8364 } 8365 #endif 8366 #if defined(TARGET_NR_epoll_wait) 8367 case TARGET_NR_epoll_wait: 8368 ret = get_errno(epoll_wait(epfd, ep, maxevents, timeout)); 8369 break; 8370 #endif 8371 default: 8372 ret = -TARGET_ENOSYS; 8373 } 8374 if (!is_error(ret)) { 8375 int i; 8376 for (i = 0; i < ret; i++) { 8377 target_ep[i].events = tswap32(ep[i].events); 8378 target_ep[i].data.u64 = tswap64(ep[i].data.u64); 8379 } 8380 } 8381 unlock_user(target_ep, arg2, ret * sizeof(struct target_epoll_event)); 8382 break; 8383 } 8384 #endif 8385 #endif 8386 #ifdef TARGET_NR_prlimit64 8387 case TARGET_NR_prlimit64: 8388 { 8389 /* args: pid, resource number, ptr to new rlimit, ptr to old rlimit */ 8390 struct target_rlimit64 *target_rnew, *target_rold; 8391 struct host_rlimit64 rnew, rold, *rnewp = 0; 8392 if (arg3) { 8393 if (!lock_user_struct(VERIFY_READ, target_rnew, arg3, 1)) { 8394 goto efault; 8395 } 8396 rnew.rlim_cur = tswap64(target_rnew->rlim_cur); 8397 rnew.rlim_max = tswap64(target_rnew->rlim_max); 8398 unlock_user_struct(target_rnew, arg3, 0); 8399 rnewp = &rnew; 8400 } 8401 8402 ret = get_errno(sys_prlimit64(arg1, arg2, rnewp, arg4 ? &rold : 0)); 8403 if (!is_error(ret) && arg4) { 8404 if (!lock_user_struct(VERIFY_WRITE, target_rold, arg4, 1)) { 8405 goto efault; 8406 } 8407 target_rold->rlim_cur = tswap64(rold.rlim_cur); 8408 target_rold->rlim_max = tswap64(rold.rlim_max); 8409 unlock_user_struct(target_rold, arg4, 1); 8410 } 8411 break; 8412 } 8413 #endif 8414 default: 8415 unimplemented: 8416 gemu_log("qemu: Unsupported syscall: %d\n", num); 8417 #if defined(TARGET_NR_setxattr) || defined(TARGET_NR_get_thread_area) || defined(TARGET_NR_getdomainname) || defined(TARGET_NR_set_robust_list) 8418 unimplemented_nowarn: 8419 #endif 8420 ret = -TARGET_ENOSYS; 8421 break; 8422 } 8423 fail: 8424 #ifdef DEBUG 8425 gemu_log(" = " TARGET_ABI_FMT_ld "\n", ret); 8426 #endif 8427 if(do_strace) 8428 print_syscall_ret(num, ret); 8429 return ret; 8430 efault: 8431 ret = -TARGET_EFAULT; 8432 goto fail; 8433 } 8434