xref: /openbmc/qemu/linux-user/syscall.c (revision c5937220)
1 /*
2  *  Linux syscalls
3  *
4  *  Copyright (c) 2003 Fabrice Bellard
5  *
6  *  This program is free software; you can redistribute it and/or modify
7  *  it under the terms of the GNU General Public License as published by
8  *  the Free Software Foundation; either version 2 of the License, or
9  *  (at your option) any later version.
10  *
11  *  This program is distributed in the hope that it will be useful,
12  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
13  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14  *  GNU General Public License for more details.
15  *
16  *  You should have received a copy of the GNU General Public License
17  *  along with this program; if not, write to the Free Software
18  *  Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
19  */
20 #include <stdlib.h>
21 #include <stdio.h>
22 #include <stdarg.h>
23 #include <string.h>
24 #include <elf.h>
25 #include <endian.h>
26 #include <errno.h>
27 #include <unistd.h>
28 #include <fcntl.h>
29 #include <time.h>
30 #include <sys/types.h>
31 #include <sys/wait.h>
32 #include <sys/time.h>
33 #include <sys/stat.h>
34 #include <sys/mount.h>
35 #include <sys/resource.h>
36 #include <sys/mman.h>
37 #include <sys/swap.h>
38 #include <signal.h>
39 #include <sched.h>
40 #include <sys/socket.h>
41 #include <sys/uio.h>
42 #include <sys/poll.h>
43 #include <sys/times.h>
44 #include <sys/shm.h>
45 #include <sys/statfs.h>
46 #include <utime.h>
47 #include <sys/sysinfo.h>
48 //#include <sys/user.h>
49 #include <netinet/ip.h>
50 #include <netinet/tcp.h>
51 
52 #define termios host_termios
53 #define winsize host_winsize
54 #define termio host_termio
55 #define sgttyb host_sgttyb /* same as target */
56 #define tchars host_tchars /* same as target */
57 #define ltchars host_ltchars /* same as target */
58 
59 #include <linux/termios.h>
60 #include <linux/unistd.h>
61 #include <linux/utsname.h>
62 #include <linux/cdrom.h>
63 #include <linux/hdreg.h>
64 #include <linux/soundcard.h>
65 #include <linux/dirent.h>
66 #include <linux/kd.h>
67 
68 #include "qemu.h"
69 
70 //#define DEBUG
71 
72 #if defined(TARGET_I386) || defined(TARGET_ARM) || defined(TARGET_SPARC)
73 /* 16 bit uid wrappers emulation */
74 #define USE_UID16
75 #endif
76 
77 //#include <linux/msdos_fs.h>
78 #define	VFAT_IOCTL_READDIR_BOTH		_IOR('r', 1, struct dirent [2])
79 #define	VFAT_IOCTL_READDIR_SHORT	_IOR('r', 2, struct dirent [2])
80 
81 
82 #if defined(__powerpc__)
83 #undef __syscall_nr
84 #undef __sc_loadargs_0
85 #undef __sc_loadargs_1
86 #undef __sc_loadargs_2
87 #undef __sc_loadargs_3
88 #undef __sc_loadargs_4
89 #undef __sc_loadargs_5
90 #undef __sc_asm_input_0
91 #undef __sc_asm_input_1
92 #undef __sc_asm_input_2
93 #undef __sc_asm_input_3
94 #undef __sc_asm_input_4
95 #undef __sc_asm_input_5
96 #undef _syscall0
97 #undef _syscall1
98 #undef _syscall2
99 #undef _syscall3
100 #undef _syscall4
101 #undef _syscall5
102 
103 /* need to redefine syscalls as Linux kernel defines are incorrect for
104    the clobber list */
105 /* On powerpc a system call basically clobbers the same registers like a
106  * function call, with the exception of LR (which is needed for the
107  * "sc; bnslr" sequence) and CR (where only CR0.SO is clobbered to signal
108  * an error return status).
109  */
110 
111 #define __syscall_nr(nr, type, name, args...)				\
112 	unsigned long __sc_ret, __sc_err;				\
113 	{								\
114 		register unsigned long __sc_0  __asm__ ("r0");		\
115 		register unsigned long __sc_3  __asm__ ("r3");		\
116 		register unsigned long __sc_4  __asm__ ("r4");		\
117 		register unsigned long __sc_5  __asm__ ("r5");		\
118 		register unsigned long __sc_6  __asm__ ("r6");		\
119 		register unsigned long __sc_7  __asm__ ("r7");		\
120 									\
121 		__sc_loadargs_##nr(name, args);				\
122 		__asm__ __volatile__					\
123 			("sc           \n\t"				\
124 			 "mfcr %0      "				\
125 			: "=&r" (__sc_0),				\
126 			  "=&r" (__sc_3),  "=&r" (__sc_4),		\
127 			  "=&r" (__sc_5),  "=&r" (__sc_6),		\
128 			  "=&r" (__sc_7)				\
129 			: __sc_asm_input_##nr				\
130 			: "cr0", "ctr", "memory",			\
131 			  "r8", "r9", "r10","r11", "r12");		\
132 		__sc_ret = __sc_3;					\
133 		__sc_err = __sc_0;					\
134 	}								\
135 	if (__sc_err & 0x10000000)					\
136 	{								\
137 		errno = __sc_ret;					\
138 		__sc_ret = -1;						\
139 	}								\
140 	return (type) __sc_ret
141 
142 #define __sc_loadargs_0(name, dummy...)					\
143 	__sc_0 = __NR_##name
144 #define __sc_loadargs_1(name, arg1)					\
145 	__sc_loadargs_0(name);						\
146 	__sc_3 = (unsigned long) (arg1)
147 #define __sc_loadargs_2(name, arg1, arg2)				\
148 	__sc_loadargs_1(name, arg1);					\
149 	__sc_4 = (unsigned long) (arg2)
150 #define __sc_loadargs_3(name, arg1, arg2, arg3)				\
151 	__sc_loadargs_2(name, arg1, arg2);				\
152 	__sc_5 = (unsigned long) (arg3)
153 #define __sc_loadargs_4(name, arg1, arg2, arg3, arg4)			\
154 	__sc_loadargs_3(name, arg1, arg2, arg3);			\
155 	__sc_6 = (unsigned long) (arg4)
156 #define __sc_loadargs_5(name, arg1, arg2, arg3, arg4, arg5)		\
157 	__sc_loadargs_4(name, arg1, arg2, arg3, arg4);			\
158 	__sc_7 = (unsigned long) (arg5)
159 
160 #define __sc_asm_input_0 "0" (__sc_0)
161 #define __sc_asm_input_1 __sc_asm_input_0, "1" (__sc_3)
162 #define __sc_asm_input_2 __sc_asm_input_1, "2" (__sc_4)
163 #define __sc_asm_input_3 __sc_asm_input_2, "3" (__sc_5)
164 #define __sc_asm_input_4 __sc_asm_input_3, "4" (__sc_6)
165 #define __sc_asm_input_5 __sc_asm_input_4, "5" (__sc_7)
166 
167 #define _syscall0(type,name)						\
168 type name(void)								\
169 {									\
170 	__syscall_nr(0, type, name);					\
171 }
172 
173 #define _syscall1(type,name,type1,arg1)					\
174 type name(type1 arg1)							\
175 {									\
176 	__syscall_nr(1, type, name, arg1);				\
177 }
178 
179 #define _syscall2(type,name,type1,arg1,type2,arg2)			\
180 type name(type1 arg1, type2 arg2)					\
181 {									\
182 	__syscall_nr(2, type, name, arg1, arg2);			\
183 }
184 
185 #define _syscall3(type,name,type1,arg1,type2,arg2,type3,arg3)		\
186 type name(type1 arg1, type2 arg2, type3 arg3)				\
187 {									\
188 	__syscall_nr(3, type, name, arg1, arg2, arg3);			\
189 }
190 
191 #define _syscall4(type,name,type1,arg1,type2,arg2,type3,arg3,type4,arg4) \
192 type name(type1 arg1, type2 arg2, type3 arg3, type4 arg4)		\
193 {									\
194 	__syscall_nr(4, type, name, arg1, arg2, arg3, arg4);		\
195 }
196 
197 #define _syscall5(type,name,type1,arg1,type2,arg2,type3,arg3,type4,arg4,type5,arg5) \
198 type name(type1 arg1, type2 arg2, type3 arg3, type4 arg4, type5 arg5)	\
199 {									\
200 	__syscall_nr(5, type, name, arg1, arg2, arg3, arg4, arg5);	\
201 }
202 #endif
203 
204 #define __NR_sys_uname __NR_uname
205 #define __NR_sys_getcwd1 __NR_getcwd
206 #define __NR_sys_getdents __NR_getdents
207 #define __NR_sys_getdents64 __NR_getdents64
208 #define __NR_sys_rt_sigqueueinfo __NR_rt_sigqueueinfo
209 
210 #if defined(__alpha__) || defined (__ia64__) || defined(__x86_64__)
211 #define __NR__llseek __NR_lseek
212 #endif
213 
214 #ifdef __NR_gettid
215 _syscall0(int, gettid)
216 #else
217 static int gettid(void) {
218     return -ENOSYS;
219 }
220 #endif
221 _syscall1(int,sys_uname,struct new_utsname *,buf)
222 _syscall2(int,sys_getcwd1,char *,buf,size_t,size)
223 _syscall3(int, sys_getdents, uint, fd, struct dirent *, dirp, uint, count);
224 _syscall3(int, sys_getdents64, uint, fd, struct dirent64 *, dirp, uint, count);
225 _syscall5(int, _llseek,  uint,  fd, ulong, hi, ulong, lo,
226           loff_t *, res, uint, wh);
227 _syscall3(int,sys_rt_sigqueueinfo,int,pid,int,sig,siginfo_t *,uinfo)
228 #ifdef __NR_exit_group
229 _syscall1(int,exit_group,int,error_code)
230 #endif
231 
232 extern int personality(int);
233 extern int flock(int, int);
234 extern int setfsuid(int);
235 extern int setfsgid(int);
236 extern int setresuid(uid_t, uid_t, uid_t);
237 extern int getresuid(uid_t *, uid_t *, uid_t *);
238 extern int setresgid(gid_t, gid_t, gid_t);
239 extern int getresgid(gid_t *, gid_t *, gid_t *);
240 extern int setgroups(int, gid_t *);
241 
242 static inline long get_errno(long ret)
243 {
244     if (ret == -1)
245         return -errno;
246     else
247         return ret;
248 }
249 
250 static inline int is_error(long ret)
251 {
252     return (unsigned long)ret >= (unsigned long)(-4096);
253 }
254 
255 static target_ulong target_brk;
256 static target_ulong target_original_brk;
257 
258 void target_set_brk(target_ulong new_brk)
259 {
260     target_original_brk = target_brk = new_brk;
261 }
262 
263 long do_brk(target_ulong new_brk)
264 {
265     target_ulong brk_page;
266     long mapped_addr;
267     int	new_alloc_size;
268 
269     if (!new_brk)
270         return target_brk;
271     if (new_brk < target_original_brk)
272         return -ENOMEM;
273 
274     brk_page = HOST_PAGE_ALIGN(target_brk);
275 
276     /* If the new brk is less than this, set it and we're done... */
277     if (new_brk < brk_page) {
278 	target_brk = new_brk;
279     	return target_brk;
280     }
281 
282     /* We need to allocate more memory after the brk... */
283     new_alloc_size = HOST_PAGE_ALIGN(new_brk - brk_page + 1);
284     mapped_addr = get_errno(target_mmap(brk_page, new_alloc_size,
285                                         PROT_READ|PROT_WRITE,
286                                         MAP_ANON|MAP_FIXED|MAP_PRIVATE, 0, 0));
287     if (is_error(mapped_addr)) {
288 	return mapped_addr;
289     } else {
290 	target_brk = new_brk;
291     	return target_brk;
292     }
293 }
294 
295 static inline fd_set *target_to_host_fds(fd_set *fds,
296                                          target_long *target_fds, int n)
297 {
298 #if !defined(BSWAP_NEEDED) && !defined(WORDS_BIGENDIAN)
299     return (fd_set *)target_fds;
300 #else
301     int i, b;
302     if (target_fds) {
303         FD_ZERO(fds);
304         for(i = 0;i < n; i++) {
305             b = (tswapl(target_fds[i / TARGET_LONG_BITS]) >>
306                  (i & (TARGET_LONG_BITS - 1))) & 1;
307             if (b)
308                 FD_SET(i, fds);
309         }
310         return fds;
311     } else {
312         return NULL;
313     }
314 #endif
315 }
316 
317 static inline void host_to_target_fds(target_long *target_fds,
318                                       fd_set *fds, int n)
319 {
320 #if !defined(BSWAP_NEEDED) && !defined(WORDS_BIGENDIAN)
321     /* nothing to do */
322 #else
323     int i, nw, j, k;
324     target_long v;
325 
326     if (target_fds) {
327         nw = (n + TARGET_LONG_BITS - 1) / TARGET_LONG_BITS;
328         k = 0;
329         for(i = 0;i < nw; i++) {
330             v = 0;
331             for(j = 0; j < TARGET_LONG_BITS; j++) {
332                 v |= ((FD_ISSET(k, fds) != 0) << j);
333                 k++;
334             }
335             target_fds[i] = tswapl(v);
336         }
337     }
338 #endif
339 }
340 
341 #if defined(__alpha__)
342 #define HOST_HZ 1024
343 #else
344 #define HOST_HZ 100
345 #endif
346 
347 static inline long host_to_target_clock_t(long ticks)
348 {
349 #if HOST_HZ == TARGET_HZ
350     return ticks;
351 #else
352     return ((int64_t)ticks * TARGET_HZ) / HOST_HZ;
353 #endif
354 }
355 
356 static inline void host_to_target_rusage(target_ulong target_addr,
357                                          const struct rusage *rusage)
358 {
359     struct target_rusage *target_rusage;
360 
361     lock_user_struct(target_rusage, target_addr, 0);
362     target_rusage->ru_utime.tv_sec = tswapl(rusage->ru_utime.tv_sec);
363     target_rusage->ru_utime.tv_usec = tswapl(rusage->ru_utime.tv_usec);
364     target_rusage->ru_stime.tv_sec = tswapl(rusage->ru_stime.tv_sec);
365     target_rusage->ru_stime.tv_usec = tswapl(rusage->ru_stime.tv_usec);
366     target_rusage->ru_maxrss = tswapl(rusage->ru_maxrss);
367     target_rusage->ru_ixrss = tswapl(rusage->ru_ixrss);
368     target_rusage->ru_idrss = tswapl(rusage->ru_idrss);
369     target_rusage->ru_isrss = tswapl(rusage->ru_isrss);
370     target_rusage->ru_minflt = tswapl(rusage->ru_minflt);
371     target_rusage->ru_majflt = tswapl(rusage->ru_majflt);
372     target_rusage->ru_nswap = tswapl(rusage->ru_nswap);
373     target_rusage->ru_inblock = tswapl(rusage->ru_inblock);
374     target_rusage->ru_oublock = tswapl(rusage->ru_oublock);
375     target_rusage->ru_msgsnd = tswapl(rusage->ru_msgsnd);
376     target_rusage->ru_msgrcv = tswapl(rusage->ru_msgrcv);
377     target_rusage->ru_nsignals = tswapl(rusage->ru_nsignals);
378     target_rusage->ru_nvcsw = tswapl(rusage->ru_nvcsw);
379     target_rusage->ru_nivcsw = tswapl(rusage->ru_nivcsw);
380     unlock_user_struct(target_rusage, target_addr, 1);
381 }
382 
383 static inline void target_to_host_timeval(struct timeval *tv,
384                                           target_ulong target_addr)
385 {
386     struct target_timeval *target_tv;
387 
388     lock_user_struct(target_tv, target_addr, 1);
389     tv->tv_sec = tswapl(target_tv->tv_sec);
390     tv->tv_usec = tswapl(target_tv->tv_usec);
391     unlock_user_struct(target_tv, target_addr, 0);
392 }
393 
394 static inline void host_to_target_timeval(target_ulong target_addr,
395                                           const struct timeval *tv)
396 {
397     struct target_timeval *target_tv;
398 
399     lock_user_struct(target_tv, target_addr, 0);
400     target_tv->tv_sec = tswapl(tv->tv_sec);
401     target_tv->tv_usec = tswapl(tv->tv_usec);
402     unlock_user_struct(target_tv, target_addr, 1);
403 }
404 
405 
406 static long do_select(long n,
407                       target_ulong rfd_p, target_ulong wfd_p,
408                       target_ulong efd_p, target_ulong target_tv)
409 {
410     fd_set rfds, wfds, efds;
411     fd_set *rfds_ptr, *wfds_ptr, *efds_ptr;
412     target_long *target_rfds, *target_wfds, *target_efds;
413     struct timeval tv, *tv_ptr;
414     long ret;
415     int ok;
416 
417     if (rfd_p) {
418         target_rfds = lock_user(rfd_p, sizeof(target_long) * n, 1);
419         rfds_ptr = target_to_host_fds(&rfds, target_rfds, n);
420     } else {
421         target_rfds = NULL;
422         rfds_ptr = NULL;
423     }
424     if (wfd_p) {
425         target_wfds = lock_user(wfd_p, sizeof(target_long) * n, 1);
426         wfds_ptr = target_to_host_fds(&wfds, target_wfds, n);
427     } else {
428         target_wfds = NULL;
429         wfds_ptr = NULL;
430     }
431     if (efd_p) {
432         target_efds = lock_user(efd_p, sizeof(target_long) * n, 1);
433         efds_ptr = target_to_host_fds(&efds, target_efds, n);
434     } else {
435         target_efds = NULL;
436         efds_ptr = NULL;
437     }
438 
439     if (target_tv) {
440         target_to_host_timeval(&tv, target_tv);
441         tv_ptr = &tv;
442     } else {
443         tv_ptr = NULL;
444     }
445     ret = get_errno(select(n, rfds_ptr, wfds_ptr, efds_ptr, tv_ptr));
446     ok = !is_error(ret);
447 
448     if (ok) {
449         host_to_target_fds(target_rfds, rfds_ptr, n);
450         host_to_target_fds(target_wfds, wfds_ptr, n);
451         host_to_target_fds(target_efds, efds_ptr, n);
452 
453         if (target_tv) {
454             host_to_target_timeval(target_tv, &tv);
455         }
456     }
457     if (target_rfds)
458         unlock_user(target_rfds, rfd_p, ok ? sizeof(target_long) * n : 0);
459     if (target_wfds)
460         unlock_user(target_wfds, wfd_p, ok ? sizeof(target_long) * n : 0);
461     if (target_efds)
462         unlock_user(target_efds, efd_p, ok ? sizeof(target_long) * n : 0);
463 
464     return ret;
465 }
466 
467 static inline void target_to_host_sockaddr(struct sockaddr *addr,
468                                            target_ulong target_addr,
469                                            socklen_t len)
470 {
471     struct target_sockaddr *target_saddr;
472 
473     target_saddr = lock_user(target_addr, len, 1);
474     memcpy(addr, target_saddr, len);
475     addr->sa_family = tswap16(target_saddr->sa_family);
476     unlock_user(target_saddr, target_addr, 0);
477 }
478 
479 static inline void host_to_target_sockaddr(target_ulong target_addr,
480                                            struct sockaddr *addr,
481                                            socklen_t len)
482 {
483     struct target_sockaddr *target_saddr;
484 
485     target_saddr = lock_user(target_addr, len, 0);
486     memcpy(target_saddr, addr, len);
487     target_saddr->sa_family = tswap16(addr->sa_family);
488     unlock_user(target_saddr, target_addr, len);
489 }
490 
491 /* ??? Should this also swap msgh->name?  */
492 static inline void target_to_host_cmsg(struct msghdr *msgh,
493                                        struct target_msghdr *target_msgh)
494 {
495     struct cmsghdr *cmsg = CMSG_FIRSTHDR(msgh);
496     struct target_cmsghdr *target_cmsg = TARGET_CMSG_FIRSTHDR(target_msgh);
497     socklen_t space = 0;
498 
499     while (cmsg && target_cmsg) {
500         void *data = CMSG_DATA(cmsg);
501         void *target_data = TARGET_CMSG_DATA(target_cmsg);
502 
503         int len = tswapl(target_cmsg->cmsg_len)
504                   - TARGET_CMSG_ALIGN(sizeof (struct target_cmsghdr));
505 
506         space += CMSG_SPACE(len);
507         if (space > msgh->msg_controllen) {
508             space -= CMSG_SPACE(len);
509             gemu_log("Host cmsg overflow\n");
510             break;
511         }
512 
513         cmsg->cmsg_level = tswap32(target_cmsg->cmsg_level);
514         cmsg->cmsg_type = tswap32(target_cmsg->cmsg_type);
515         cmsg->cmsg_len = CMSG_LEN(len);
516 
517         if (cmsg->cmsg_level != SOL_SOCKET || cmsg->cmsg_type != SCM_RIGHTS) {
518             gemu_log("Unsupported ancillary data: %d/%d\n", cmsg->cmsg_level, cmsg->cmsg_type);
519             memcpy(data, target_data, len);
520         } else {
521             int *fd = (int *)data;
522             int *target_fd = (int *)target_data;
523             int i, numfds = len / sizeof(int);
524 
525             for (i = 0; i < numfds; i++)
526                 fd[i] = tswap32(target_fd[i]);
527         }
528 
529         cmsg = CMSG_NXTHDR(msgh, cmsg);
530         target_cmsg = TARGET_CMSG_NXTHDR(target_msgh, target_cmsg);
531     }
532 
533     msgh->msg_controllen = space;
534 }
535 
536 /* ??? Should this also swap msgh->name?  */
537 static inline void host_to_target_cmsg(struct target_msghdr *target_msgh,
538                                        struct msghdr *msgh)
539 {
540     struct cmsghdr *cmsg = CMSG_FIRSTHDR(msgh);
541     struct target_cmsghdr *target_cmsg = TARGET_CMSG_FIRSTHDR(target_msgh);
542     socklen_t space = 0;
543 
544     while (cmsg && target_cmsg) {
545         void *data = CMSG_DATA(cmsg);
546         void *target_data = TARGET_CMSG_DATA(target_cmsg);
547 
548         int len = cmsg->cmsg_len - CMSG_ALIGN(sizeof (struct cmsghdr));
549 
550         space += TARGET_CMSG_SPACE(len);
551         if (space > tswapl(target_msgh->msg_controllen)) {
552             space -= TARGET_CMSG_SPACE(len);
553             gemu_log("Target cmsg overflow\n");
554             break;
555         }
556 
557         target_cmsg->cmsg_level = tswap32(cmsg->cmsg_level);
558         target_cmsg->cmsg_type = tswap32(cmsg->cmsg_type);
559         target_cmsg->cmsg_len = tswapl(TARGET_CMSG_LEN(len));
560 
561         if (cmsg->cmsg_level != SOL_SOCKET || cmsg->cmsg_type != SCM_RIGHTS) {
562             gemu_log("Unsupported ancillary data: %d/%d\n", cmsg->cmsg_level, cmsg->cmsg_type);
563             memcpy(target_data, data, len);
564         } else {
565             int *fd = (int *)data;
566             int *target_fd = (int *)target_data;
567             int i, numfds = len / sizeof(int);
568 
569             for (i = 0; i < numfds; i++)
570                 target_fd[i] = tswap32(fd[i]);
571         }
572 
573         cmsg = CMSG_NXTHDR(msgh, cmsg);
574         target_cmsg = TARGET_CMSG_NXTHDR(target_msgh, target_cmsg);
575     }
576 
577     msgh->msg_controllen = tswapl(space);
578 }
579 
580 static long do_setsockopt(int sockfd, int level, int optname,
581                           target_ulong optval, socklen_t optlen)
582 {
583     int val, ret;
584 
585     switch(level) {
586     case SOL_TCP:
587         /* TCP options all take an 'int' value.  */
588         if (optlen < sizeof(uint32_t))
589             return -EINVAL;
590 
591         val = tget32(optval);
592         ret = get_errno(setsockopt(sockfd, level, optname, &val, sizeof(val)));
593         break;
594     case SOL_IP:
595         switch(optname) {
596         case IP_TOS:
597         case IP_TTL:
598         case IP_HDRINCL:
599         case IP_ROUTER_ALERT:
600         case IP_RECVOPTS:
601         case IP_RETOPTS:
602         case IP_PKTINFO:
603         case IP_MTU_DISCOVER:
604         case IP_RECVERR:
605         case IP_RECVTOS:
606 #ifdef IP_FREEBIND
607         case IP_FREEBIND:
608 #endif
609         case IP_MULTICAST_TTL:
610         case IP_MULTICAST_LOOP:
611             val = 0;
612             if (optlen >= sizeof(uint32_t)) {
613                 val = tget32(optval);
614             } else if (optlen >= 1) {
615                 val = tget8(optval);
616             }
617             ret = get_errno(setsockopt(sockfd, level, optname, &val, sizeof(val)));
618             break;
619         default:
620             goto unimplemented;
621         }
622         break;
623     case SOL_SOCKET:
624         switch (optname) {
625             /* Options with 'int' argument.  */
626         case SO_DEBUG:
627         case SO_REUSEADDR:
628         case SO_TYPE:
629         case SO_ERROR:
630         case SO_DONTROUTE:
631         case SO_BROADCAST:
632         case SO_SNDBUF:
633         case SO_RCVBUF:
634         case SO_KEEPALIVE:
635         case SO_OOBINLINE:
636         case SO_NO_CHECK:
637         case SO_PRIORITY:
638 #ifdef SO_BSDCOMPAT
639         case SO_BSDCOMPAT:
640 #endif
641         case SO_PASSCRED:
642         case SO_TIMESTAMP:
643         case SO_RCVLOWAT:
644         case SO_RCVTIMEO:
645         case SO_SNDTIMEO:
646             if (optlen < sizeof(uint32_t))
647                 return -EINVAL;
648 
649             val = tget32(optval);
650             ret = get_errno(setsockopt(sockfd, level, optname, &val, sizeof(val)));
651             break;
652         default:
653             goto unimplemented;
654         }
655         break;
656     default:
657     unimplemented:
658         gemu_log("Unsupported setsockopt level=%d optname=%d \n", level, optname);
659         ret = -ENOSYS;
660     }
661     return ret;
662 }
663 
664 static long do_getsockopt(int sockfd, int level, int optname,
665                           target_ulong optval, target_ulong optlen)
666 {
667     int len, lv, val, ret;
668 
669     switch(level) {
670     case SOL_SOCKET:
671 	switch (optname) {
672 	case SO_LINGER:
673 	case SO_RCVTIMEO:
674 	case SO_SNDTIMEO:
675 	case SO_PEERCRED:
676 	case SO_PEERNAME:
677 	    /* These don't just return a single integer */
678 	    goto unimplemented;
679         default:
680             goto int_case;
681         }
682         break;
683     case SOL_TCP:
684         /* TCP options all take an 'int' value.  */
685     int_case:
686         len = tget32(optlen);
687         if (len < 0)
688             return -EINVAL;
689         lv = sizeof(int);
690         ret = get_errno(getsockopt(sockfd, level, optname, &val, &lv));
691         if (ret < 0)
692             return ret;
693         val = tswap32(val);
694         if (len > lv)
695             len = lv;
696         if (len == 4)
697             tput32(optval, val);
698         else
699             tput8(optval, val);
700         tput32(optlen, len);
701         break;
702     case SOL_IP:
703         switch(optname) {
704         case IP_TOS:
705         case IP_TTL:
706         case IP_HDRINCL:
707         case IP_ROUTER_ALERT:
708         case IP_RECVOPTS:
709         case IP_RETOPTS:
710         case IP_PKTINFO:
711         case IP_MTU_DISCOVER:
712         case IP_RECVERR:
713         case IP_RECVTOS:
714 #ifdef IP_FREEBIND
715         case IP_FREEBIND:
716 #endif
717         case IP_MULTICAST_TTL:
718         case IP_MULTICAST_LOOP:
719             len = tget32(optlen);
720             if (len < 0)
721                 return -EINVAL;
722             lv = sizeof(int);
723             ret = get_errno(getsockopt(sockfd, level, optname, &val, &lv));
724             if (ret < 0)
725                 return ret;
726             if (len < sizeof(int) && len > 0 && val >= 0 && val < 255) {
727                 len = 1;
728                 tput32(optlen, len);
729                 tput8(optval, val);
730             } else {
731                 if (len > sizeof(int))
732                     len = sizeof(int);
733                 tput32(optlen, len);
734                 tput32(optval, val);
735             }
736             break;
737         default:
738             goto unimplemented;
739         }
740         break;
741     default:
742     unimplemented:
743         gemu_log("getsockopt level=%d optname=%d not yet supported\n",
744                  level, optname);
745         ret = -ENOSYS;
746         break;
747     }
748     return ret;
749 }
750 
751 static void lock_iovec(struct iovec *vec, target_ulong target_addr,
752                        int count, int copy)
753 {
754     struct target_iovec *target_vec;
755     target_ulong base;
756     int i;
757 
758     target_vec = lock_user(target_addr, count * sizeof(struct target_iovec), 1);
759     for(i = 0;i < count; i++) {
760         base = tswapl(target_vec[i].iov_base);
761         vec[i].iov_len = tswapl(target_vec[i].iov_len);
762         vec[i].iov_base = lock_user(base, vec[i].iov_len, copy);
763     }
764     unlock_user (target_vec, target_addr, 0);
765 }
766 
767 static void unlock_iovec(struct iovec *vec, target_ulong target_addr,
768                          int count, int copy)
769 {
770     struct target_iovec *target_vec;
771     target_ulong base;
772     int i;
773 
774     target_vec = lock_user(target_addr, count * sizeof(struct target_iovec), 1);
775     for(i = 0;i < count; i++) {
776         base = tswapl(target_vec[i].iov_base);
777         unlock_user(vec[i].iov_base, base, copy ? vec[i].iov_len : 0);
778     }
779     unlock_user (target_vec, target_addr, 0);
780 }
781 
782 static long do_socketcall(int num, target_ulong vptr)
783 {
784     long ret;
785     const int n = sizeof(target_ulong);
786 
787     switch(num) {
788     case SOCKOP_socket:
789 	{
790             int domain = tgetl(vptr);
791             int type = tgetl(vptr + n);
792             int protocol = tgetl(vptr + 2 * n);
793 
794             ret = get_errno(socket(domain, type, protocol));
795 	}
796         break;
797     case SOCKOP_bind:
798 	{
799             int sockfd = tgetl(vptr);
800             target_ulong target_addr = tgetl(vptr + n);
801             socklen_t addrlen = tgetl(vptr + 2 * n);
802             void *addr = alloca(addrlen);
803 
804             target_to_host_sockaddr(addr, target_addr, addrlen);
805             ret = get_errno(bind(sockfd, addr, addrlen));
806         }
807         break;
808     case SOCKOP_connect:
809         {
810             int sockfd = tgetl(vptr);
811             target_ulong target_addr = tgetl(vptr + n);
812             socklen_t addrlen = tgetl(vptr + 2 * n);
813             void *addr = alloca(addrlen);
814 
815             target_to_host_sockaddr(addr, target_addr, addrlen);
816             ret = get_errno(connect(sockfd, addr, addrlen));
817         }
818         break;
819     case SOCKOP_listen:
820         {
821             int sockfd = tgetl(vptr);
822             int backlog = tgetl(vptr + n);
823 
824             ret = get_errno(listen(sockfd, backlog));
825         }
826         break;
827     case SOCKOP_accept:
828         {
829             int sockfd = tgetl(vptr);
830             target_ulong target_addr = tgetl(vptr + n);
831             target_ulong target_addrlen = tgetl(vptr + 2 * n);
832             socklen_t addrlen = tget32(target_addrlen);
833             void *addr = alloca(addrlen);
834 
835             ret = get_errno(accept(sockfd, addr, &addrlen));
836             if (!is_error(ret)) {
837                 host_to_target_sockaddr(target_addr, addr, addrlen);
838                 tput32(target_addrlen, addrlen);
839             }
840         }
841         break;
842     case SOCKOP_getsockname:
843         {
844             int sockfd = tgetl(vptr);
845             target_ulong target_addr = tgetl(vptr + n);
846             target_ulong target_addrlen = tgetl(vptr + 2 * n);
847             socklen_t addrlen = tget32(target_addrlen);
848             void *addr = alloca(addrlen);
849 
850             ret = get_errno(getsockname(sockfd, addr, &addrlen));
851             if (!is_error(ret)) {
852                 host_to_target_sockaddr(target_addr, addr, addrlen);
853                 tput32(target_addrlen, addrlen);
854             }
855         }
856         break;
857     case SOCKOP_getpeername:
858         {
859             int sockfd = tgetl(vptr);
860             target_ulong target_addr = tgetl(vptr + n);
861             target_ulong target_addrlen = tgetl(vptr + 2 * n);
862             socklen_t addrlen = tget32(target_addrlen);
863             void *addr = alloca(addrlen);
864 
865             ret = get_errno(getpeername(sockfd, addr, &addrlen));
866             if (!is_error(ret)) {
867                 host_to_target_sockaddr(target_addr, addr, addrlen);
868                 tput32(target_addrlen, addrlen);
869             }
870         }
871         break;
872     case SOCKOP_socketpair:
873         {
874             int domain = tgetl(vptr);
875             int type = tgetl(vptr + n);
876             int protocol = tgetl(vptr + 2 * n);
877             target_ulong target_tab = tgetl(vptr + 3 * n);
878             int tab[2];
879 
880             ret = get_errno(socketpair(domain, type, protocol, tab));
881             if (!is_error(ret)) {
882                 tput32(target_tab, tab[0]);
883                 tput32(target_tab + 4, tab[1]);
884             }
885         }
886         break;
887     case SOCKOP_send:
888         {
889             int sockfd = tgetl(vptr);
890             target_ulong msg = tgetl(vptr + n);
891             size_t len = tgetl(vptr + 2 * n);
892             int flags = tgetl(vptr + 3 * n);
893             void *host_msg;
894 
895             host_msg = lock_user(msg, len, 1);
896             ret = get_errno(send(sockfd, host_msg, len, flags));
897             unlock_user(host_msg, msg, 0);
898         }
899         break;
900     case SOCKOP_recv:
901         {
902             int sockfd = tgetl(vptr);
903             target_ulong msg = tgetl(vptr + n);
904             size_t len = tgetl(vptr + 2 * n);
905             int flags = tgetl(vptr + 3 * n);
906             void *host_msg;
907 
908             host_msg = lock_user(msg, len, 0);
909             ret = get_errno(recv(sockfd, host_msg, len, flags));
910             unlock_user(host_msg, msg, ret);
911         }
912         break;
913     case SOCKOP_sendto:
914         {
915             int sockfd = tgetl(vptr);
916             target_ulong msg = tgetl(vptr + n);
917             size_t len = tgetl(vptr + 2 * n);
918             int flags = tgetl(vptr + 3 * n);
919             target_ulong target_addr = tgetl(vptr + 4 * n);
920             socklen_t addrlen = tgetl(vptr + 5 * n);
921             void *addr = alloca(addrlen);
922             void *host_msg;
923 
924             host_msg = lock_user(msg, len, 1);
925             target_to_host_sockaddr(addr, target_addr, addrlen);
926             ret = get_errno(sendto(sockfd, host_msg, len, flags, addr, addrlen));
927             unlock_user(host_msg, msg, 0);
928         }
929         break;
930     case SOCKOP_recvfrom:
931         {
932             int sockfd = tgetl(vptr);
933             target_ulong msg = tgetl(vptr + n);
934             size_t len = tgetl(vptr + 2 * n);
935             int flags = tgetl(vptr + 3 * n);
936             target_ulong target_addr = tgetl(vptr + 4 * n);
937             target_ulong target_addrlen = tgetl(vptr + 5 * n);
938             socklen_t addrlen = tget32(target_addrlen);
939             void *addr = alloca(addrlen);
940             void *host_msg;
941 
942             host_msg = lock_user(msg, len, 0);
943             ret = get_errno(recvfrom(sockfd, host_msg, len, flags, addr, &addrlen));
944             if (!is_error(ret)) {
945                 host_to_target_sockaddr(target_addr, addr, addrlen);
946                 tput32(target_addrlen, addrlen);
947                 unlock_user(host_msg, msg, len);
948             } else {
949                 unlock_user(host_msg, msg, 0);
950             }
951         }
952         break;
953     case SOCKOP_shutdown:
954         {
955             int sockfd = tgetl(vptr);
956             int how = tgetl(vptr + n);
957 
958             ret = get_errno(shutdown(sockfd, how));
959         }
960         break;
961     case SOCKOP_sendmsg:
962     case SOCKOP_recvmsg:
963         {
964             int fd;
965             target_ulong target_msg;
966             struct target_msghdr *msgp;
967             struct msghdr msg;
968             int flags, count;
969             struct iovec *vec;
970             target_ulong target_vec;
971             int send = (num == SOCKOP_sendmsg);
972 
973             target_msg = tgetl(vptr + n);
974             lock_user_struct(msgp, target_msg, 1);
975             if (msgp->msg_name) {
976                 msg.msg_namelen = tswap32(msgp->msg_namelen);
977                 msg.msg_name = alloca(msg.msg_namelen);
978                 target_to_host_sockaddr(msg.msg_name, tswapl(msgp->msg_name),
979                                         msg.msg_namelen);
980             } else {
981                 msg.msg_name = NULL;
982                 msg.msg_namelen = 0;
983             }
984             msg.msg_controllen = 2 * tswapl(msgp->msg_controllen);
985             msg.msg_control = alloca(msg.msg_controllen);
986             msg.msg_flags = tswap32(msgp->msg_flags);
987 
988             count = tswapl(msgp->msg_iovlen);
989             vec = alloca(count * sizeof(struct iovec));
990             target_vec = tswapl(msgp->msg_iov);
991             lock_iovec(vec, target_vec, count, send);
992             msg.msg_iovlen = count;
993             msg.msg_iov = vec;
994 
995             fd = tgetl(vptr);
996             flags = tgetl(vptr + 2 * n);
997             if (send) {
998                 target_to_host_cmsg(&msg, msgp);
999                 ret = get_errno(sendmsg(fd, &msg, flags));
1000             } else {
1001                 ret = get_errno(recvmsg(fd, &msg, flags));
1002                 if (!is_error(ret))
1003                   host_to_target_cmsg(msgp, &msg);
1004             }
1005             unlock_iovec(vec, target_vec, count, !send);
1006         }
1007         break;
1008     case SOCKOP_setsockopt:
1009         {
1010             int sockfd = tgetl(vptr);
1011             int level = tgetl(vptr + n);
1012             int optname = tgetl(vptr + 2 * n);
1013             target_ulong optval = tgetl(vptr + 3 * n);
1014             socklen_t optlen = tgetl(vptr + 4 * n);
1015 
1016             ret = do_setsockopt(sockfd, level, optname, optval, optlen);
1017         }
1018         break;
1019     case SOCKOP_getsockopt:
1020         {
1021             int sockfd = tgetl(vptr);
1022             int level = tgetl(vptr + n);
1023             int optname = tgetl(vptr + 2 * n);
1024             target_ulong optval = tgetl(vptr + 3 * n);
1025             target_ulong poptlen = tgetl(vptr + 4 * n);
1026 
1027             ret = do_getsockopt(sockfd, level, optname, optval, poptlen);
1028         }
1029         break;
1030     default:
1031         gemu_log("Unsupported socketcall: %d\n", num);
1032         ret = -ENOSYS;
1033         break;
1034     }
1035     return ret;
1036 }
1037 
1038 
1039 #define N_SHM_REGIONS	32
1040 
1041 static struct shm_region {
1042     uint32_t	start;
1043     uint32_t	size;
1044 } shm_regions[N_SHM_REGIONS];
1045 
1046 /* ??? This only works with linear mappings.  */
1047 static long do_ipc(long call, long first, long second, long third,
1048 		   long ptr, long fifth)
1049 {
1050     int version;
1051     long ret = 0;
1052     unsigned long raddr;
1053     struct shmid_ds shm_info;
1054     int i;
1055 
1056     version = call >> 16;
1057     call &= 0xffff;
1058 
1059     switch (call) {
1060     case IPCOP_shmat:
1061 	/* SHM_* flags are the same on all linux platforms */
1062 	ret = get_errno((long) shmat(first, (void *) ptr, second));
1063         if (is_error(ret))
1064             break;
1065         raddr = ret;
1066 	/* find out the length of the shared memory segment */
1067 
1068         ret = get_errno(shmctl(first, IPC_STAT, &shm_info));
1069         if (is_error(ret)) {
1070             /* can't get length, bail out */
1071             shmdt((void *) raddr);
1072 	    break;
1073 	}
1074 	page_set_flags(raddr, raddr + shm_info.shm_segsz,
1075 		       PAGE_VALID | PAGE_READ |
1076 		       ((second & SHM_RDONLY)? 0: PAGE_WRITE));
1077 	for (i = 0; i < N_SHM_REGIONS; ++i) {
1078 	    if (shm_regions[i].start == 0) {
1079 		shm_regions[i].start = raddr;
1080 		shm_regions[i].size = shm_info.shm_segsz;
1081                 break;
1082 	    }
1083 	}
1084 	if (put_user(raddr, (uint32_t *)third))
1085             return -EFAULT;
1086         ret = 0;
1087 	break;
1088     case IPCOP_shmdt:
1089 	for (i = 0; i < N_SHM_REGIONS; ++i) {
1090 	    if (shm_regions[i].start == ptr) {
1091 		shm_regions[i].start = 0;
1092 		page_set_flags(ptr, shm_regions[i].size, 0);
1093 		break;
1094 	    }
1095 	}
1096 	ret = get_errno(shmdt((void *) ptr));
1097 	break;
1098 
1099     case IPCOP_shmget:
1100 	/* IPC_* flag values are the same on all linux platforms */
1101 	ret = get_errno(shmget(first, second, third));
1102 	break;
1103 
1104 	/* IPC_* and SHM_* command values are the same on all linux platforms */
1105     case IPCOP_shmctl:
1106         switch(second) {
1107         case IPC_RMID:
1108         case SHM_LOCK:
1109         case SHM_UNLOCK:
1110             ret = get_errno(shmctl(first, second, NULL));
1111             break;
1112         default:
1113             goto unimplemented;
1114         }
1115         break;
1116     default:
1117     unimplemented:
1118 	gemu_log("Unsupported ipc call: %ld (version %d)\n", call, version);
1119 	ret = -ENOSYS;
1120 	break;
1121     }
1122     return ret;
1123 }
1124 
1125 /* kernel structure types definitions */
1126 #define IFNAMSIZ        16
1127 
1128 #define STRUCT(name, list...) STRUCT_ ## name,
1129 #define STRUCT_SPECIAL(name) STRUCT_ ## name,
1130 enum {
1131 #include "syscall_types.h"
1132 };
1133 #undef STRUCT
1134 #undef STRUCT_SPECIAL
1135 
1136 #define STRUCT(name, list...) const argtype struct_ ## name ## _def[] = { list, TYPE_NULL };
1137 #define STRUCT_SPECIAL(name)
1138 #include "syscall_types.h"
1139 #undef STRUCT
1140 #undef STRUCT_SPECIAL
1141 
1142 typedef struct IOCTLEntry {
1143     unsigned int target_cmd;
1144     unsigned int host_cmd;
1145     const char *name;
1146     int access;
1147     const argtype arg_type[5];
1148 } IOCTLEntry;
1149 
1150 #define IOC_R 0x0001
1151 #define IOC_W 0x0002
1152 #define IOC_RW (IOC_R | IOC_W)
1153 
1154 #define MAX_STRUCT_SIZE 4096
1155 
1156 IOCTLEntry ioctl_entries[] = {
1157 #define IOCTL(cmd, access, types...) \
1158     { TARGET_ ## cmd, cmd, #cmd, access, { types } },
1159 #include "ioctls.h"
1160     { 0, 0, },
1161 };
1162 
1163 /* ??? Implement proper locking for ioctls.  */
1164 static long do_ioctl(long fd, long cmd, long arg)
1165 {
1166     const IOCTLEntry *ie;
1167     const argtype *arg_type;
1168     long ret;
1169     uint8_t buf_temp[MAX_STRUCT_SIZE];
1170     int target_size;
1171     void *argptr;
1172 
1173     ie = ioctl_entries;
1174     for(;;) {
1175         if (ie->target_cmd == 0) {
1176             gemu_log("Unsupported ioctl: cmd=0x%04lx\n", cmd);
1177             return -ENOSYS;
1178         }
1179         if (ie->target_cmd == cmd)
1180             break;
1181         ie++;
1182     }
1183     arg_type = ie->arg_type;
1184 #if defined(DEBUG)
1185     gemu_log("ioctl: cmd=0x%04lx (%s)\n", cmd, ie->name);
1186 #endif
1187     switch(arg_type[0]) {
1188     case TYPE_NULL:
1189         /* no argument */
1190         ret = get_errno(ioctl(fd, ie->host_cmd));
1191         break;
1192     case TYPE_PTRVOID:
1193     case TYPE_INT:
1194         /* int argment */
1195         ret = get_errno(ioctl(fd, ie->host_cmd, arg));
1196         break;
1197     case TYPE_PTR:
1198         arg_type++;
1199         target_size = thunk_type_size(arg_type, 0);
1200         switch(ie->access) {
1201         case IOC_R:
1202             ret = get_errno(ioctl(fd, ie->host_cmd, buf_temp));
1203             if (!is_error(ret)) {
1204                 argptr = lock_user(arg, target_size, 0);
1205                 thunk_convert(argptr, buf_temp, arg_type, THUNK_TARGET);
1206                 unlock_user(argptr, arg, target_size);
1207             }
1208             break;
1209         case IOC_W:
1210             argptr = lock_user(arg, target_size, 1);
1211             thunk_convert(buf_temp, argptr, arg_type, THUNK_HOST);
1212             unlock_user(argptr, arg, 0);
1213             ret = get_errno(ioctl(fd, ie->host_cmd, buf_temp));
1214             break;
1215         default:
1216         case IOC_RW:
1217             argptr = lock_user(arg, target_size, 1);
1218             thunk_convert(buf_temp, argptr, arg_type, THUNK_HOST);
1219             unlock_user(argptr, arg, 0);
1220             ret = get_errno(ioctl(fd, ie->host_cmd, buf_temp));
1221             if (!is_error(ret)) {
1222                 argptr = lock_user(arg, target_size, 0);
1223                 thunk_convert(argptr, buf_temp, arg_type, THUNK_TARGET);
1224                 unlock_user(argptr, arg, target_size);
1225             }
1226             break;
1227         }
1228         break;
1229     default:
1230         gemu_log("Unsupported ioctl type: cmd=0x%04lx type=%d\n", cmd, arg_type[0]);
1231         ret = -ENOSYS;
1232         break;
1233     }
1234     return ret;
1235 }
1236 
1237 bitmask_transtbl iflag_tbl[] = {
1238         { TARGET_IGNBRK, TARGET_IGNBRK, IGNBRK, IGNBRK },
1239         { TARGET_BRKINT, TARGET_BRKINT, BRKINT, BRKINT },
1240         { TARGET_IGNPAR, TARGET_IGNPAR, IGNPAR, IGNPAR },
1241         { TARGET_PARMRK, TARGET_PARMRK, PARMRK, PARMRK },
1242         { TARGET_INPCK, TARGET_INPCK, INPCK, INPCK },
1243         { TARGET_ISTRIP, TARGET_ISTRIP, ISTRIP, ISTRIP },
1244         { TARGET_INLCR, TARGET_INLCR, INLCR, INLCR },
1245         { TARGET_IGNCR, TARGET_IGNCR, IGNCR, IGNCR },
1246         { TARGET_ICRNL, TARGET_ICRNL, ICRNL, ICRNL },
1247         { TARGET_IUCLC, TARGET_IUCLC, IUCLC, IUCLC },
1248         { TARGET_IXON, TARGET_IXON, IXON, IXON },
1249         { TARGET_IXANY, TARGET_IXANY, IXANY, IXANY },
1250         { TARGET_IXOFF, TARGET_IXOFF, IXOFF, IXOFF },
1251         { TARGET_IMAXBEL, TARGET_IMAXBEL, IMAXBEL, IMAXBEL },
1252         { 0, 0, 0, 0 }
1253 };
1254 
1255 bitmask_transtbl oflag_tbl[] = {
1256 	{ TARGET_OPOST, TARGET_OPOST, OPOST, OPOST },
1257 	{ TARGET_OLCUC, TARGET_OLCUC, OLCUC, OLCUC },
1258 	{ TARGET_ONLCR, TARGET_ONLCR, ONLCR, ONLCR },
1259 	{ TARGET_OCRNL, TARGET_OCRNL, OCRNL, OCRNL },
1260 	{ TARGET_ONOCR, TARGET_ONOCR, ONOCR, ONOCR },
1261 	{ TARGET_ONLRET, TARGET_ONLRET, ONLRET, ONLRET },
1262 	{ TARGET_OFILL, TARGET_OFILL, OFILL, OFILL },
1263 	{ TARGET_OFDEL, TARGET_OFDEL, OFDEL, OFDEL },
1264 	{ TARGET_NLDLY, TARGET_NL0, NLDLY, NL0 },
1265 	{ TARGET_NLDLY, TARGET_NL1, NLDLY, NL1 },
1266 	{ TARGET_CRDLY, TARGET_CR0, CRDLY, CR0 },
1267 	{ TARGET_CRDLY, TARGET_CR1, CRDLY, CR1 },
1268 	{ TARGET_CRDLY, TARGET_CR2, CRDLY, CR2 },
1269 	{ TARGET_CRDLY, TARGET_CR3, CRDLY, CR3 },
1270 	{ TARGET_TABDLY, TARGET_TAB0, TABDLY, TAB0 },
1271 	{ TARGET_TABDLY, TARGET_TAB1, TABDLY, TAB1 },
1272 	{ TARGET_TABDLY, TARGET_TAB2, TABDLY, TAB2 },
1273 	{ TARGET_TABDLY, TARGET_TAB3, TABDLY, TAB3 },
1274 	{ TARGET_BSDLY, TARGET_BS0, BSDLY, BS0 },
1275 	{ TARGET_BSDLY, TARGET_BS1, BSDLY, BS1 },
1276 	{ TARGET_VTDLY, TARGET_VT0, VTDLY, VT0 },
1277 	{ TARGET_VTDLY, TARGET_VT1, VTDLY, VT1 },
1278 	{ TARGET_FFDLY, TARGET_FF0, FFDLY, FF0 },
1279 	{ TARGET_FFDLY, TARGET_FF1, FFDLY, FF1 },
1280 	{ 0, 0, 0, 0 }
1281 };
1282 
1283 bitmask_transtbl cflag_tbl[] = {
1284 	{ TARGET_CBAUD, TARGET_B0, CBAUD, B0 },
1285 	{ TARGET_CBAUD, TARGET_B50, CBAUD, B50 },
1286 	{ TARGET_CBAUD, TARGET_B75, CBAUD, B75 },
1287 	{ TARGET_CBAUD, TARGET_B110, CBAUD, B110 },
1288 	{ TARGET_CBAUD, TARGET_B134, CBAUD, B134 },
1289 	{ TARGET_CBAUD, TARGET_B150, CBAUD, B150 },
1290 	{ TARGET_CBAUD, TARGET_B200, CBAUD, B200 },
1291 	{ TARGET_CBAUD, TARGET_B300, CBAUD, B300 },
1292 	{ TARGET_CBAUD, TARGET_B600, CBAUD, B600 },
1293 	{ TARGET_CBAUD, TARGET_B1200, CBAUD, B1200 },
1294 	{ TARGET_CBAUD, TARGET_B1800, CBAUD, B1800 },
1295 	{ TARGET_CBAUD, TARGET_B2400, CBAUD, B2400 },
1296 	{ TARGET_CBAUD, TARGET_B4800, CBAUD, B4800 },
1297 	{ TARGET_CBAUD, TARGET_B9600, CBAUD, B9600 },
1298 	{ TARGET_CBAUD, TARGET_B19200, CBAUD, B19200 },
1299 	{ TARGET_CBAUD, TARGET_B38400, CBAUD, B38400 },
1300 	{ TARGET_CBAUD, TARGET_B57600, CBAUD, B57600 },
1301 	{ TARGET_CBAUD, TARGET_B115200, CBAUD, B115200 },
1302 	{ TARGET_CBAUD, TARGET_B230400, CBAUD, B230400 },
1303 	{ TARGET_CBAUD, TARGET_B460800, CBAUD, B460800 },
1304 	{ TARGET_CSIZE, TARGET_CS5, CSIZE, CS5 },
1305 	{ TARGET_CSIZE, TARGET_CS6, CSIZE, CS6 },
1306 	{ TARGET_CSIZE, TARGET_CS7, CSIZE, CS7 },
1307 	{ TARGET_CSIZE, TARGET_CS8, CSIZE, CS8 },
1308 	{ TARGET_CSTOPB, TARGET_CSTOPB, CSTOPB, CSTOPB },
1309 	{ TARGET_CREAD, TARGET_CREAD, CREAD, CREAD },
1310 	{ TARGET_PARENB, TARGET_PARENB, PARENB, PARENB },
1311 	{ TARGET_PARODD, TARGET_PARODD, PARODD, PARODD },
1312 	{ TARGET_HUPCL, TARGET_HUPCL, HUPCL, HUPCL },
1313 	{ TARGET_CLOCAL, TARGET_CLOCAL, CLOCAL, CLOCAL },
1314 	{ TARGET_CRTSCTS, TARGET_CRTSCTS, CRTSCTS, CRTSCTS },
1315 	{ 0, 0, 0, 0 }
1316 };
1317 
1318 bitmask_transtbl lflag_tbl[] = {
1319 	{ TARGET_ISIG, TARGET_ISIG, ISIG, ISIG },
1320 	{ TARGET_ICANON, TARGET_ICANON, ICANON, ICANON },
1321 	{ TARGET_XCASE, TARGET_XCASE, XCASE, XCASE },
1322 	{ TARGET_ECHO, TARGET_ECHO, ECHO, ECHO },
1323 	{ TARGET_ECHOE, TARGET_ECHOE, ECHOE, ECHOE },
1324 	{ TARGET_ECHOK, TARGET_ECHOK, ECHOK, ECHOK },
1325 	{ TARGET_ECHONL, TARGET_ECHONL, ECHONL, ECHONL },
1326 	{ TARGET_NOFLSH, TARGET_NOFLSH, NOFLSH, NOFLSH },
1327 	{ TARGET_TOSTOP, TARGET_TOSTOP, TOSTOP, TOSTOP },
1328 	{ TARGET_ECHOCTL, TARGET_ECHOCTL, ECHOCTL, ECHOCTL },
1329 	{ TARGET_ECHOPRT, TARGET_ECHOPRT, ECHOPRT, ECHOPRT },
1330 	{ TARGET_ECHOKE, TARGET_ECHOKE, ECHOKE, ECHOKE },
1331 	{ TARGET_FLUSHO, TARGET_FLUSHO, FLUSHO, FLUSHO },
1332 	{ TARGET_PENDIN, TARGET_PENDIN, PENDIN, PENDIN },
1333 	{ TARGET_IEXTEN, TARGET_IEXTEN, IEXTEN, IEXTEN },
1334 	{ 0, 0, 0, 0 }
1335 };
1336 
1337 static void target_to_host_termios (void *dst, const void *src)
1338 {
1339     struct host_termios *host = dst;
1340     const struct target_termios *target = src;
1341 
1342     host->c_iflag =
1343         target_to_host_bitmask(tswap32(target->c_iflag), iflag_tbl);
1344     host->c_oflag =
1345         target_to_host_bitmask(tswap32(target->c_oflag), oflag_tbl);
1346     host->c_cflag =
1347         target_to_host_bitmask(tswap32(target->c_cflag), cflag_tbl);
1348     host->c_lflag =
1349         target_to_host_bitmask(tswap32(target->c_lflag), lflag_tbl);
1350     host->c_line = target->c_line;
1351 
1352     host->c_cc[VINTR] = target->c_cc[TARGET_VINTR];
1353     host->c_cc[VQUIT] = target->c_cc[TARGET_VQUIT];
1354     host->c_cc[VERASE] = target->c_cc[TARGET_VERASE];
1355     host->c_cc[VKILL] = target->c_cc[TARGET_VKILL];
1356     host->c_cc[VEOF] = target->c_cc[TARGET_VEOF];
1357     host->c_cc[VTIME] = target->c_cc[TARGET_VTIME];
1358     host->c_cc[VMIN] = target->c_cc[TARGET_VMIN];
1359     host->c_cc[VSWTC] = target->c_cc[TARGET_VSWTC];
1360     host->c_cc[VSTART] = target->c_cc[TARGET_VSTART];
1361     host->c_cc[VSTOP] = target->c_cc[TARGET_VSTOP];
1362     host->c_cc[VSUSP] = target->c_cc[TARGET_VSUSP];
1363     host->c_cc[VEOL] = target->c_cc[TARGET_VEOL];
1364     host->c_cc[VREPRINT] = target->c_cc[TARGET_VREPRINT];
1365     host->c_cc[VDISCARD] = target->c_cc[TARGET_VDISCARD];
1366     host->c_cc[VWERASE] = target->c_cc[TARGET_VWERASE];
1367     host->c_cc[VLNEXT] = target->c_cc[TARGET_VLNEXT];
1368     host->c_cc[VEOL2] = target->c_cc[TARGET_VEOL2];
1369 }
1370 
1371 static void host_to_target_termios (void *dst, const void *src)
1372 {
1373     struct target_termios *target = dst;
1374     const struct host_termios *host = src;
1375 
1376     target->c_iflag =
1377         tswap32(host_to_target_bitmask(host->c_iflag, iflag_tbl));
1378     target->c_oflag =
1379         tswap32(host_to_target_bitmask(host->c_oflag, oflag_tbl));
1380     target->c_cflag =
1381         tswap32(host_to_target_bitmask(host->c_cflag, cflag_tbl));
1382     target->c_lflag =
1383         tswap32(host_to_target_bitmask(host->c_lflag, lflag_tbl));
1384     target->c_line = host->c_line;
1385 
1386     target->c_cc[TARGET_VINTR] = host->c_cc[VINTR];
1387     target->c_cc[TARGET_VQUIT] = host->c_cc[VQUIT];
1388     target->c_cc[TARGET_VERASE] = host->c_cc[VERASE];
1389     target->c_cc[TARGET_VKILL] = host->c_cc[VKILL];
1390     target->c_cc[TARGET_VEOF] = host->c_cc[VEOF];
1391     target->c_cc[TARGET_VTIME] = host->c_cc[VTIME];
1392     target->c_cc[TARGET_VMIN] = host->c_cc[VMIN];
1393     target->c_cc[TARGET_VSWTC] = host->c_cc[VSWTC];
1394     target->c_cc[TARGET_VSTART] = host->c_cc[VSTART];
1395     target->c_cc[TARGET_VSTOP] = host->c_cc[VSTOP];
1396     target->c_cc[TARGET_VSUSP] = host->c_cc[VSUSP];
1397     target->c_cc[TARGET_VEOL] = host->c_cc[VEOL];
1398     target->c_cc[TARGET_VREPRINT] = host->c_cc[VREPRINT];
1399     target->c_cc[TARGET_VDISCARD] = host->c_cc[VDISCARD];
1400     target->c_cc[TARGET_VWERASE] = host->c_cc[VWERASE];
1401     target->c_cc[TARGET_VLNEXT] = host->c_cc[VLNEXT];
1402     target->c_cc[TARGET_VEOL2] = host->c_cc[VEOL2];
1403 }
1404 
1405 StructEntry struct_termios_def = {
1406     .convert = { host_to_target_termios, target_to_host_termios },
1407     .size = { sizeof(struct target_termios), sizeof(struct host_termios) },
1408     .align = { __alignof__(struct target_termios), __alignof__(struct host_termios) },
1409 };
1410 
1411 static bitmask_transtbl mmap_flags_tbl[] = {
1412 	{ TARGET_MAP_SHARED, TARGET_MAP_SHARED, MAP_SHARED, MAP_SHARED },
1413 	{ TARGET_MAP_PRIVATE, TARGET_MAP_PRIVATE, MAP_PRIVATE, MAP_PRIVATE },
1414 	{ TARGET_MAP_FIXED, TARGET_MAP_FIXED, MAP_FIXED, MAP_FIXED },
1415 	{ TARGET_MAP_ANONYMOUS, TARGET_MAP_ANONYMOUS, MAP_ANONYMOUS, MAP_ANONYMOUS },
1416 	{ TARGET_MAP_GROWSDOWN, TARGET_MAP_GROWSDOWN, MAP_GROWSDOWN, MAP_GROWSDOWN },
1417 	{ TARGET_MAP_DENYWRITE, TARGET_MAP_DENYWRITE, MAP_DENYWRITE, MAP_DENYWRITE },
1418 	{ TARGET_MAP_EXECUTABLE, TARGET_MAP_EXECUTABLE, MAP_EXECUTABLE, MAP_EXECUTABLE },
1419 	{ TARGET_MAP_LOCKED, TARGET_MAP_LOCKED, MAP_LOCKED, MAP_LOCKED },
1420 	{ 0, 0, 0, 0 }
1421 };
1422 
1423 static bitmask_transtbl fcntl_flags_tbl[] = {
1424 	{ TARGET_O_ACCMODE,   TARGET_O_WRONLY,    O_ACCMODE,   O_WRONLY,    },
1425 	{ TARGET_O_ACCMODE,   TARGET_O_RDWR,      O_ACCMODE,   O_RDWR,      },
1426 	{ TARGET_O_CREAT,     TARGET_O_CREAT,     O_CREAT,     O_CREAT,     },
1427 	{ TARGET_O_EXCL,      TARGET_O_EXCL,      O_EXCL,      O_EXCL,      },
1428 	{ TARGET_O_NOCTTY,    TARGET_O_NOCTTY,    O_NOCTTY,    O_NOCTTY,    },
1429 	{ TARGET_O_TRUNC,     TARGET_O_TRUNC,     O_TRUNC,     O_TRUNC,     },
1430 	{ TARGET_O_APPEND,    TARGET_O_APPEND,    O_APPEND,    O_APPEND,    },
1431 	{ TARGET_O_NONBLOCK,  TARGET_O_NONBLOCK,  O_NONBLOCK,  O_NONBLOCK,  },
1432 	{ TARGET_O_SYNC,      TARGET_O_SYNC,      O_SYNC,      O_SYNC,      },
1433 	{ TARGET_FASYNC,      TARGET_FASYNC,      FASYNC,      FASYNC,      },
1434 	{ TARGET_O_DIRECTORY, TARGET_O_DIRECTORY, O_DIRECTORY, O_DIRECTORY, },
1435 	{ TARGET_O_NOFOLLOW,  TARGET_O_NOFOLLOW,  O_NOFOLLOW,  O_NOFOLLOW,  },
1436 	{ TARGET_O_LARGEFILE, TARGET_O_LARGEFILE, O_LARGEFILE, O_LARGEFILE, },
1437 #if defined(O_DIRECT)
1438 	{ TARGET_O_DIRECT,    TARGET_O_DIRECT,    O_DIRECT,    O_DIRECT,    },
1439 #endif
1440 	{ 0, 0, 0, 0 }
1441 };
1442 
1443 #if defined(TARGET_I386)
1444 
1445 /* NOTE: there is really one LDT for all the threads */
1446 uint8_t *ldt_table;
1447 
1448 static int read_ldt(target_ulong ptr, unsigned long bytecount)
1449 {
1450     int size;
1451     void *p;
1452 
1453     if (!ldt_table)
1454         return 0;
1455     size = TARGET_LDT_ENTRIES * TARGET_LDT_ENTRY_SIZE;
1456     if (size > bytecount)
1457         size = bytecount;
1458     p = lock_user(ptr, size, 0);
1459     /* ??? Shoudl this by byteswapped?  */
1460     memcpy(p, ldt_table, size);
1461     unlock_user(p, ptr, size);
1462     return size;
1463 }
1464 
1465 /* XXX: add locking support */
1466 static int write_ldt(CPUX86State *env,
1467                      target_ulong ptr, unsigned long bytecount, int oldmode)
1468 {
1469     struct target_modify_ldt_ldt_s ldt_info;
1470     struct target_modify_ldt_ldt_s *target_ldt_info;
1471     int seg_32bit, contents, read_exec_only, limit_in_pages;
1472     int seg_not_present, useable;
1473     uint32_t *lp, entry_1, entry_2;
1474 
1475     if (bytecount != sizeof(ldt_info))
1476         return -EINVAL;
1477     lock_user_struct(target_ldt_info, ptr, 1);
1478     ldt_info.entry_number = tswap32(target_ldt_info->entry_number);
1479     ldt_info.base_addr = tswapl(target_ldt_info->base_addr);
1480     ldt_info.limit = tswap32(target_ldt_info->limit);
1481     ldt_info.flags = tswap32(target_ldt_info->flags);
1482     unlock_user_struct(target_ldt_info, ptr, 0);
1483 
1484     if (ldt_info.entry_number >= TARGET_LDT_ENTRIES)
1485         return -EINVAL;
1486     seg_32bit = ldt_info.flags & 1;
1487     contents = (ldt_info.flags >> 1) & 3;
1488     read_exec_only = (ldt_info.flags >> 3) & 1;
1489     limit_in_pages = (ldt_info.flags >> 4) & 1;
1490     seg_not_present = (ldt_info.flags >> 5) & 1;
1491     useable = (ldt_info.flags >> 6) & 1;
1492 
1493     if (contents == 3) {
1494         if (oldmode)
1495             return -EINVAL;
1496         if (seg_not_present == 0)
1497             return -EINVAL;
1498     }
1499     /* allocate the LDT */
1500     if (!ldt_table) {
1501         ldt_table = malloc(TARGET_LDT_ENTRIES * TARGET_LDT_ENTRY_SIZE);
1502         if (!ldt_table)
1503             return -ENOMEM;
1504         memset(ldt_table, 0, TARGET_LDT_ENTRIES * TARGET_LDT_ENTRY_SIZE);
1505         env->ldt.base = h2g(ldt_table);
1506         env->ldt.limit = 0xffff;
1507     }
1508 
1509     /* NOTE: same code as Linux kernel */
1510     /* Allow LDTs to be cleared by the user. */
1511     if (ldt_info.base_addr == 0 && ldt_info.limit == 0) {
1512         if (oldmode ||
1513             (contents == 0		&&
1514              read_exec_only == 1	&&
1515              seg_32bit == 0		&&
1516              limit_in_pages == 0	&&
1517              seg_not_present == 1	&&
1518              useable == 0 )) {
1519             entry_1 = 0;
1520             entry_2 = 0;
1521             goto install;
1522         }
1523     }
1524 
1525     entry_1 = ((ldt_info.base_addr & 0x0000ffff) << 16) |
1526         (ldt_info.limit & 0x0ffff);
1527     entry_2 = (ldt_info.base_addr & 0xff000000) |
1528         ((ldt_info.base_addr & 0x00ff0000) >> 16) |
1529         (ldt_info.limit & 0xf0000) |
1530         ((read_exec_only ^ 1) << 9) |
1531         (contents << 10) |
1532         ((seg_not_present ^ 1) << 15) |
1533         (seg_32bit << 22) |
1534         (limit_in_pages << 23) |
1535         0x7000;
1536     if (!oldmode)
1537         entry_2 |= (useable << 20);
1538 
1539     /* Install the new entry ...  */
1540 install:
1541     lp = (uint32_t *)(ldt_table + (ldt_info.entry_number << 3));
1542     lp[0] = tswap32(entry_1);
1543     lp[1] = tswap32(entry_2);
1544     return 0;
1545 }
1546 
1547 /* specific and weird i386 syscalls */
1548 int do_modify_ldt(CPUX86State *env, int func, target_ulong ptr, unsigned long bytecount)
1549 {
1550     int ret = -ENOSYS;
1551 
1552     switch (func) {
1553     case 0:
1554         ret = read_ldt(ptr, bytecount);
1555         break;
1556     case 1:
1557         ret = write_ldt(env, ptr, bytecount, 1);
1558         break;
1559     case 0x11:
1560         ret = write_ldt(env, ptr, bytecount, 0);
1561         break;
1562     }
1563     return ret;
1564 }
1565 
1566 #endif /* defined(TARGET_I386) */
1567 
1568 /* this stack is the equivalent of the kernel stack associated with a
1569    thread/process */
1570 #define NEW_STACK_SIZE 8192
1571 
1572 static int clone_func(void *arg)
1573 {
1574     CPUState *env = arg;
1575     cpu_loop(env);
1576     /* never exits */
1577     return 0;
1578 }
1579 
1580 int do_fork(CPUState *env, unsigned int flags, unsigned long newsp)
1581 {
1582     int ret;
1583     TaskState *ts;
1584     uint8_t *new_stack;
1585     CPUState *new_env;
1586 
1587     if (flags & CLONE_VM) {
1588         ts = malloc(sizeof(TaskState) + NEW_STACK_SIZE);
1589         memset(ts, 0, sizeof(TaskState));
1590         new_stack = ts->stack;
1591         ts->used = 1;
1592         /* add in task state list */
1593         ts->next = first_task_state;
1594         first_task_state = ts;
1595         /* we create a new CPU instance. */
1596         new_env = cpu_init();
1597         memcpy(new_env, env, sizeof(CPUState));
1598 #if defined(TARGET_I386)
1599         if (!newsp)
1600             newsp = env->regs[R_ESP];
1601         new_env->regs[R_ESP] = newsp;
1602         new_env->regs[R_EAX] = 0;
1603 #elif defined(TARGET_ARM)
1604         if (!newsp)
1605             newsp = env->regs[13];
1606         new_env->regs[13] = newsp;
1607         new_env->regs[0] = 0;
1608 #elif defined(TARGET_SPARC)
1609         printf ("HELPME: %s:%d\n", __FILE__, __LINE__);
1610 #elif defined(TARGET_MIPS)
1611         printf ("HELPME: %s:%d\n", __FILE__, __LINE__);
1612 #elif defined(TARGET_PPC)
1613         if (!newsp)
1614             newsp = env->gpr[1];
1615         new_env->gpr[1] = newsp;
1616         {
1617             int i;
1618             for (i = 7; i < 32; i++)
1619                 new_env->gpr[i] = 0;
1620         }
1621 #elif defined(TARGET_SH4)
1622 	if (!newsp)
1623 	  newsp = env->gregs[15];
1624 	new_env->gregs[15] = newsp;
1625 	/* XXXXX */
1626 #else
1627 #error unsupported target CPU
1628 #endif
1629         new_env->opaque = ts;
1630 #ifdef __ia64__
1631         ret = __clone2(clone_func, new_stack + NEW_STACK_SIZE, flags, new_env);
1632 #else
1633 	ret = clone(clone_func, new_stack + NEW_STACK_SIZE, flags, new_env);
1634 #endif
1635     } else {
1636         /* if no CLONE_VM, we consider it is a fork */
1637         if ((flags & ~CSIGNAL) != 0)
1638             return -EINVAL;
1639         ret = fork();
1640     }
1641     return ret;
1642 }
1643 
1644 static long do_fcntl(int fd, int cmd, target_ulong arg)
1645 {
1646     struct flock fl;
1647     struct target_flock *target_fl;
1648     long ret;
1649 
1650     switch(cmd) {
1651     case TARGET_F_GETLK:
1652         ret = fcntl(fd, cmd, &fl);
1653         if (ret == 0) {
1654             lock_user_struct(target_fl, arg, 0);
1655             target_fl->l_type = tswap16(fl.l_type);
1656             target_fl->l_whence = tswap16(fl.l_whence);
1657             target_fl->l_start = tswapl(fl.l_start);
1658             target_fl->l_len = tswapl(fl.l_len);
1659             target_fl->l_pid = tswapl(fl.l_pid);
1660             unlock_user_struct(target_fl, arg, 1);
1661         }
1662         break;
1663 
1664     case TARGET_F_SETLK:
1665     case TARGET_F_SETLKW:
1666         lock_user_struct(target_fl, arg, 1);
1667         fl.l_type = tswap16(target_fl->l_type);
1668         fl.l_whence = tswap16(target_fl->l_whence);
1669         fl.l_start = tswapl(target_fl->l_start);
1670         fl.l_len = tswapl(target_fl->l_len);
1671         fl.l_pid = tswapl(target_fl->l_pid);
1672         unlock_user_struct(target_fl, arg, 0);
1673         ret = fcntl(fd, cmd, &fl);
1674         break;
1675 
1676     case TARGET_F_GETLK64:
1677     case TARGET_F_SETLK64:
1678     case TARGET_F_SETLKW64:
1679         ret = -1;
1680         errno = EINVAL;
1681         break;
1682 
1683     case F_GETFL:
1684         ret = fcntl(fd, cmd, arg);
1685         ret = host_to_target_bitmask(ret, fcntl_flags_tbl);
1686         break;
1687 
1688     case F_SETFL:
1689         ret = fcntl(fd, cmd, target_to_host_bitmask(arg, fcntl_flags_tbl));
1690         break;
1691 
1692     default:
1693         ret = fcntl(fd, cmd, arg);
1694         break;
1695     }
1696     return ret;
1697 }
1698 
1699 #ifdef USE_UID16
1700 
1701 static inline int high2lowuid(int uid)
1702 {
1703     if (uid > 65535)
1704         return 65534;
1705     else
1706         return uid;
1707 }
1708 
1709 static inline int high2lowgid(int gid)
1710 {
1711     if (gid > 65535)
1712         return 65534;
1713     else
1714         return gid;
1715 }
1716 
1717 static inline int low2highuid(int uid)
1718 {
1719     if ((int16_t)uid == -1)
1720         return -1;
1721     else
1722         return uid;
1723 }
1724 
1725 static inline int low2highgid(int gid)
1726 {
1727     if ((int16_t)gid == -1)
1728         return -1;
1729     else
1730         return gid;
1731 }
1732 
1733 #endif /* USE_UID16 */
1734 
1735 void syscall_init(void)
1736 {
1737     IOCTLEntry *ie;
1738     const argtype *arg_type;
1739     int size;
1740 
1741 #define STRUCT(name, list...) thunk_register_struct(STRUCT_ ## name, #name, struct_ ## name ## _def);
1742 #define STRUCT_SPECIAL(name) thunk_register_struct_direct(STRUCT_ ## name, #name, &struct_ ## name ## _def);
1743 #include "syscall_types.h"
1744 #undef STRUCT
1745 #undef STRUCT_SPECIAL
1746 
1747     /* we patch the ioctl size if necessary. We rely on the fact that
1748        no ioctl has all the bits at '1' in the size field */
1749     ie = ioctl_entries;
1750     while (ie->target_cmd != 0) {
1751         if (((ie->target_cmd >> TARGET_IOC_SIZESHIFT) & TARGET_IOC_SIZEMASK) ==
1752             TARGET_IOC_SIZEMASK) {
1753             arg_type = ie->arg_type;
1754             if (arg_type[0] != TYPE_PTR) {
1755                 fprintf(stderr, "cannot patch size for ioctl 0x%x\n",
1756                         ie->target_cmd);
1757                 exit(1);
1758             }
1759             arg_type++;
1760             size = thunk_type_size(arg_type, 0);
1761             ie->target_cmd = (ie->target_cmd &
1762                               ~(TARGET_IOC_SIZEMASK << TARGET_IOC_SIZESHIFT)) |
1763                 (size << TARGET_IOC_SIZESHIFT);
1764         }
1765         /* automatic consistency check if same arch */
1766 #if defined(__i386__) && defined(TARGET_I386)
1767         if (ie->target_cmd != ie->host_cmd) {
1768             fprintf(stderr, "ERROR: ioctl: target=0x%x host=0x%x\n",
1769                     ie->target_cmd, ie->host_cmd);
1770         }
1771 #endif
1772         ie++;
1773     }
1774 }
1775 
1776 static inline uint64_t target_offset64(uint32_t word0, uint32_t word1)
1777 {
1778 #ifdef TARGET_WORDS_BIG_ENDIAN
1779     return ((uint64_t)word0 << 32) | word1;
1780 #else
1781     return ((uint64_t)word1 << 32) | word0;
1782 #endif
1783 }
1784 
1785 #ifdef TARGET_NR_truncate64
1786 static inline long target_truncate64(void *cpu_env, const char *arg1,
1787                                      long arg2, long arg3, long arg4)
1788 {
1789 #ifdef TARGET_ARM
1790     if (((CPUARMState *)cpu_env)->eabi)
1791       {
1792         arg2 = arg3;
1793         arg3 = arg4;
1794       }
1795 #endif
1796     return get_errno(truncate64(arg1, target_offset64(arg2, arg3)));
1797 }
1798 #endif
1799 
1800 #ifdef TARGET_NR_ftruncate64
1801 static inline long target_ftruncate64(void *cpu_env, long arg1, long arg2,
1802                                       long arg3, long arg4)
1803 {
1804 #ifdef TARGET_ARM
1805     if (((CPUARMState *)cpu_env)->eabi)
1806       {
1807         arg2 = arg3;
1808         arg3 = arg4;
1809       }
1810 #endif
1811     return get_errno(ftruncate64(arg1, target_offset64(arg2, arg3)));
1812 }
1813 #endif
1814 
1815 static inline void target_to_host_timespec(struct timespec *host_ts,
1816                                            target_ulong target_addr)
1817 {
1818     struct target_timespec *target_ts;
1819 
1820     lock_user_struct(target_ts, target_addr, 1);
1821     host_ts->tv_sec = tswapl(target_ts->tv_sec);
1822     host_ts->tv_nsec = tswapl(target_ts->tv_nsec);
1823     unlock_user_struct(target_ts, target_addr, 0);
1824 }
1825 
1826 static inline void host_to_target_timespec(target_ulong target_addr,
1827                                            struct timespec *host_ts)
1828 {
1829     struct target_timespec *target_ts;
1830 
1831     lock_user_struct(target_ts, target_addr, 0);
1832     target_ts->tv_sec = tswapl(host_ts->tv_sec);
1833     target_ts->tv_nsec = tswapl(host_ts->tv_nsec);
1834     unlock_user_struct(target_ts, target_addr, 1);
1835 }
1836 
1837 long do_syscall(void *cpu_env, int num, long arg1, long arg2, long arg3,
1838                 long arg4, long arg5, long arg6)
1839 {
1840     long ret;
1841     struct stat st;
1842     struct statfs stfs;
1843     void *p;
1844 
1845 #ifdef DEBUG
1846     gemu_log("syscall %d", num);
1847 #endif
1848     switch(num) {
1849     case TARGET_NR_exit:
1850 #ifdef HAVE_GPROF
1851         _mcleanup();
1852 #endif
1853         gdb_exit(cpu_env, arg1);
1854         /* XXX: should free thread stack and CPU env */
1855         _exit(arg1);
1856         ret = 0; /* avoid warning */
1857         break;
1858     case TARGET_NR_read:
1859         page_unprotect_range(arg2, arg3);
1860         p = lock_user(arg2, arg3, 0);
1861         ret = get_errno(read(arg1, p, arg3));
1862         unlock_user(p, arg2, ret);
1863         break;
1864     case TARGET_NR_write:
1865         p = lock_user(arg2, arg3, 1);
1866         ret = get_errno(write(arg1, p, arg3));
1867         unlock_user(p, arg2, 0);
1868         break;
1869     case TARGET_NR_open:
1870         p = lock_user_string(arg1);
1871         ret = get_errno(open(path(p),
1872                              target_to_host_bitmask(arg2, fcntl_flags_tbl),
1873                              arg3));
1874         unlock_user(p, arg1, 0);
1875         break;
1876     case TARGET_NR_close:
1877         ret = get_errno(close(arg1));
1878         break;
1879     case TARGET_NR_brk:
1880         ret = do_brk(arg1);
1881         break;
1882     case TARGET_NR_fork:
1883         ret = get_errno(do_fork(cpu_env, SIGCHLD, 0));
1884         break;
1885     case TARGET_NR_waitpid:
1886         {
1887             int status;
1888             ret = get_errno(waitpid(arg1, &status, arg3));
1889             if (!is_error(ret) && arg2)
1890                 tput32(arg2, status);
1891         }
1892         break;
1893     case TARGET_NR_creat:
1894         p = lock_user_string(arg1);
1895         ret = get_errno(creat(p, arg2));
1896         unlock_user(p, arg1, 0);
1897         break;
1898     case TARGET_NR_link:
1899         {
1900             void * p2;
1901             p = lock_user_string(arg1);
1902             p2 = lock_user_string(arg2);
1903             ret = get_errno(link(p, p2));
1904             unlock_user(p2, arg2, 0);
1905             unlock_user(p, arg1, 0);
1906         }
1907         break;
1908     case TARGET_NR_unlink:
1909         p = lock_user_string(arg1);
1910         ret = get_errno(unlink(p));
1911         unlock_user(p, arg1, 0);
1912         break;
1913     case TARGET_NR_execve:
1914         {
1915             char **argp, **envp;
1916             int argc, envc;
1917             target_ulong gp;
1918             target_ulong guest_argp;
1919             target_ulong guest_envp;
1920             target_ulong addr;
1921             char **q;
1922 
1923             argc = 0;
1924             guest_argp = arg2;
1925             for (gp = guest_argp; tgetl(gp); gp++)
1926                 argc++;
1927             envc = 0;
1928             guest_envp = arg3;
1929             for (gp = guest_envp; tgetl(gp); gp++)
1930                 envc++;
1931 
1932             argp = alloca((argc + 1) * sizeof(void *));
1933             envp = alloca((envc + 1) * sizeof(void *));
1934 
1935             for (gp = guest_argp, q = argp; ;
1936                   gp += sizeof(target_ulong), q++) {
1937                 addr = tgetl(gp);
1938                 if (!addr)
1939                     break;
1940                 *q = lock_user_string(addr);
1941             }
1942             *q = NULL;
1943 
1944             for (gp = guest_envp, q = envp; ;
1945                   gp += sizeof(target_ulong), q++) {
1946                 addr = tgetl(gp);
1947                 if (!addr)
1948                     break;
1949                 *q = lock_user_string(addr);
1950             }
1951             *q = NULL;
1952 
1953             p = lock_user_string(arg1);
1954             ret = get_errno(execve(p, argp, envp));
1955             unlock_user(p, arg1, 0);
1956 
1957             for (gp = guest_argp, q = argp; *q;
1958                   gp += sizeof(target_ulong), q++) {
1959                 addr = tgetl(gp);
1960                 unlock_user(*q, addr, 0);
1961             }
1962             for (gp = guest_envp, q = envp; *q;
1963                   gp += sizeof(target_ulong), q++) {
1964                 addr = tgetl(gp);
1965                 unlock_user(*q, addr, 0);
1966             }
1967         }
1968         break;
1969     case TARGET_NR_chdir:
1970         p = lock_user_string(arg1);
1971         ret = get_errno(chdir(p));
1972         unlock_user(p, arg1, 0);
1973         break;
1974 #ifdef TARGET_NR_time
1975     case TARGET_NR_time:
1976         {
1977             time_t host_time;
1978             ret = get_errno(time(&host_time));
1979             if (!is_error(ret) && arg1)
1980                 tputl(arg1, host_time);
1981         }
1982         break;
1983 #endif
1984     case TARGET_NR_mknod:
1985         p = lock_user_string(arg1);
1986         ret = get_errno(mknod(p, arg2, arg3));
1987         unlock_user(p, arg1, 0);
1988         break;
1989     case TARGET_NR_chmod:
1990         p = lock_user_string(arg1);
1991         ret = get_errno(chmod(p, arg2));
1992         unlock_user(p, arg1, 0);
1993         break;
1994 #ifdef TARGET_NR_break
1995     case TARGET_NR_break:
1996         goto unimplemented;
1997 #endif
1998 #ifdef TARGET_NR_oldstat
1999     case TARGET_NR_oldstat:
2000         goto unimplemented;
2001 #endif
2002     case TARGET_NR_lseek:
2003         ret = get_errno(lseek(arg1, arg2, arg3));
2004         break;
2005     case TARGET_NR_getpid:
2006         ret = get_errno(getpid());
2007         break;
2008     case TARGET_NR_mount:
2009         /* need to look at the data field */
2010         goto unimplemented;
2011     case TARGET_NR_umount:
2012         p = lock_user_string(arg1);
2013         ret = get_errno(umount(p));
2014         unlock_user(p, arg1, 0);
2015         break;
2016     case TARGET_NR_stime:
2017         {
2018             time_t host_time;
2019             host_time = tgetl(arg1);
2020             ret = get_errno(stime(&host_time));
2021         }
2022         break;
2023     case TARGET_NR_ptrace:
2024         goto unimplemented;
2025     case TARGET_NR_alarm:
2026         ret = alarm(arg1);
2027         break;
2028 #ifdef TARGET_NR_oldfstat
2029     case TARGET_NR_oldfstat:
2030         goto unimplemented;
2031 #endif
2032     case TARGET_NR_pause:
2033         ret = get_errno(pause());
2034         break;
2035     case TARGET_NR_utime:
2036         {
2037             struct utimbuf tbuf, *host_tbuf;
2038             struct target_utimbuf *target_tbuf;
2039             if (arg2) {
2040                 lock_user_struct(target_tbuf, arg2, 1);
2041                 tbuf.actime = tswapl(target_tbuf->actime);
2042                 tbuf.modtime = tswapl(target_tbuf->modtime);
2043                 unlock_user_struct(target_tbuf, arg2, 0);
2044                 host_tbuf = &tbuf;
2045             } else {
2046                 host_tbuf = NULL;
2047             }
2048             p = lock_user_string(arg1);
2049             ret = get_errno(utime(p, host_tbuf));
2050             unlock_user(p, arg1, 0);
2051         }
2052         break;
2053     case TARGET_NR_utimes:
2054         {
2055             struct timeval *tvp, tv[2];
2056             if (arg2) {
2057                 target_to_host_timeval(&tv[0], arg2);
2058                 target_to_host_timeval(&tv[1],
2059                     arg2 + sizeof (struct target_timeval));
2060                 tvp = tv;
2061             } else {
2062                 tvp = NULL;
2063             }
2064             p = lock_user_string(arg1);
2065             ret = get_errno(utimes(p, tvp));
2066             unlock_user(p, arg1, 0);
2067         }
2068         break;
2069 #ifdef TARGET_NR_stty
2070     case TARGET_NR_stty:
2071         goto unimplemented;
2072 #endif
2073 #ifdef TARGET_NR_gtty
2074     case TARGET_NR_gtty:
2075         goto unimplemented;
2076 #endif
2077     case TARGET_NR_access:
2078         p = lock_user_string(arg1);
2079         ret = get_errno(access(p, arg2));
2080         unlock_user(p, arg1, 0);
2081         break;
2082     case TARGET_NR_nice:
2083         ret = get_errno(nice(arg1));
2084         break;
2085 #ifdef TARGET_NR_ftime
2086     case TARGET_NR_ftime:
2087         goto unimplemented;
2088 #endif
2089     case TARGET_NR_sync:
2090         sync();
2091         ret = 0;
2092         break;
2093     case TARGET_NR_kill:
2094         ret = get_errno(kill(arg1, arg2));
2095         break;
2096     case TARGET_NR_rename:
2097         {
2098             void *p2;
2099             p = lock_user_string(arg1);
2100             p2 = lock_user_string(arg2);
2101             ret = get_errno(rename(p, p2));
2102             unlock_user(p2, arg2, 0);
2103             unlock_user(p, arg1, 0);
2104         }
2105         break;
2106     case TARGET_NR_mkdir:
2107         p = lock_user_string(arg1);
2108         ret = get_errno(mkdir(p, arg2));
2109         unlock_user(p, arg1, 0);
2110         break;
2111     case TARGET_NR_rmdir:
2112         p = lock_user_string(arg1);
2113         ret = get_errno(rmdir(p));
2114         unlock_user(p, arg1, 0);
2115         break;
2116     case TARGET_NR_dup:
2117         ret = get_errno(dup(arg1));
2118         break;
2119     case TARGET_NR_pipe:
2120         {
2121             int host_pipe[2];
2122             ret = get_errno(pipe(host_pipe));
2123             if (!is_error(ret)) {
2124                 tput32(arg1, host_pipe[0]);
2125                 tput32(arg1 + 4, host_pipe[1]);
2126             }
2127         }
2128         break;
2129     case TARGET_NR_times:
2130         {
2131             struct target_tms *tmsp;
2132             struct tms tms;
2133             ret = get_errno(times(&tms));
2134             if (arg1) {
2135                 tmsp = lock_user(arg1, sizeof(struct target_tms), 0);
2136                 tmsp->tms_utime = tswapl(host_to_target_clock_t(tms.tms_utime));
2137                 tmsp->tms_stime = tswapl(host_to_target_clock_t(tms.tms_stime));
2138                 tmsp->tms_cutime = tswapl(host_to_target_clock_t(tms.tms_cutime));
2139                 tmsp->tms_cstime = tswapl(host_to_target_clock_t(tms.tms_cstime));
2140             }
2141             if (!is_error(ret))
2142                 ret = host_to_target_clock_t(ret);
2143         }
2144         break;
2145 #ifdef TARGET_NR_prof
2146     case TARGET_NR_prof:
2147         goto unimplemented;
2148 #endif
2149     case TARGET_NR_signal:
2150         goto unimplemented;
2151 
2152     case TARGET_NR_acct:
2153         p = lock_user_string(arg1);
2154         ret = get_errno(acct(path(p)));
2155         unlock_user(p, arg1, 0);
2156         break;
2157     case TARGET_NR_umount2:
2158         p = lock_user_string(arg1);
2159         ret = get_errno(umount2(p, arg2));
2160         unlock_user(p, arg1, 0);
2161         break;
2162 #ifdef TARGET_NR_lock
2163     case TARGET_NR_lock:
2164         goto unimplemented;
2165 #endif
2166     case TARGET_NR_ioctl:
2167         ret = do_ioctl(arg1, arg2, arg3);
2168         break;
2169     case TARGET_NR_fcntl:
2170         ret = get_errno(do_fcntl(arg1, arg2, arg3));
2171         break;
2172 #ifdef TARGET_NR_mpx
2173     case TARGET_NR_mpx:
2174         goto unimplemented;
2175 #endif
2176     case TARGET_NR_setpgid:
2177         ret = get_errno(setpgid(arg1, arg2));
2178         break;
2179 #ifdef TARGET_NR_ulimit
2180     case TARGET_NR_ulimit:
2181         goto unimplemented;
2182 #endif
2183 #ifdef TARGET_NR_oldolduname
2184     case TARGET_NR_oldolduname:
2185         goto unimplemented;
2186 #endif
2187     case TARGET_NR_umask:
2188         ret = get_errno(umask(arg1));
2189         break;
2190     case TARGET_NR_chroot:
2191         p = lock_user_string(arg1);
2192         ret = get_errno(chroot(p));
2193         unlock_user(p, arg1, 0);
2194         break;
2195     case TARGET_NR_ustat:
2196         goto unimplemented;
2197     case TARGET_NR_dup2:
2198         ret = get_errno(dup2(arg1, arg2));
2199         break;
2200     case TARGET_NR_getppid:
2201         ret = get_errno(getppid());
2202         break;
2203     case TARGET_NR_getpgrp:
2204         ret = get_errno(getpgrp());
2205         break;
2206     case TARGET_NR_setsid:
2207         ret = get_errno(setsid());
2208         break;
2209     case TARGET_NR_sigaction:
2210         {
2211             struct target_old_sigaction *old_act;
2212             struct target_sigaction act, oact, *pact;
2213             if (arg2) {
2214                 lock_user_struct(old_act, arg2, 1);
2215                 act._sa_handler = old_act->_sa_handler;
2216                 target_siginitset(&act.sa_mask, old_act->sa_mask);
2217                 act.sa_flags = old_act->sa_flags;
2218                 act.sa_restorer = old_act->sa_restorer;
2219                 unlock_user_struct(old_act, arg2, 0);
2220                 pact = &act;
2221             } else {
2222                 pact = NULL;
2223             }
2224             ret = get_errno(do_sigaction(arg1, pact, &oact));
2225             if (!is_error(ret) && arg3) {
2226                 lock_user_struct(old_act, arg3, 0);
2227                 old_act->_sa_handler = oact._sa_handler;
2228                 old_act->sa_mask = oact.sa_mask.sig[0];
2229                 old_act->sa_flags = oact.sa_flags;
2230                 old_act->sa_restorer = oact.sa_restorer;
2231                 unlock_user_struct(old_act, arg3, 1);
2232             }
2233         }
2234         break;
2235     case TARGET_NR_rt_sigaction:
2236         {
2237             struct target_sigaction *act;
2238             struct target_sigaction *oact;
2239 
2240             if (arg2)
2241                 lock_user_struct(act, arg2, 1);
2242             else
2243                 act = NULL;
2244             if (arg3)
2245                 lock_user_struct(oact, arg3, 0);
2246             else
2247                 oact = NULL;
2248             ret = get_errno(do_sigaction(arg1, act, oact));
2249             if (arg2)
2250                 unlock_user_struct(act, arg2, 0);
2251             if (arg3)
2252                 unlock_user_struct(oact, arg3, 1);
2253         }
2254         break;
2255     case TARGET_NR_sgetmask:
2256         {
2257             sigset_t cur_set;
2258             target_ulong target_set;
2259             sigprocmask(0, NULL, &cur_set);
2260             host_to_target_old_sigset(&target_set, &cur_set);
2261             ret = target_set;
2262         }
2263         break;
2264     case TARGET_NR_ssetmask:
2265         {
2266             sigset_t set, oset, cur_set;
2267             target_ulong target_set = arg1;
2268             sigprocmask(0, NULL, &cur_set);
2269             target_to_host_old_sigset(&set, &target_set);
2270             sigorset(&set, &set, &cur_set);
2271             sigprocmask(SIG_SETMASK, &set, &oset);
2272             host_to_target_old_sigset(&target_set, &oset);
2273             ret = target_set;
2274         }
2275         break;
2276     case TARGET_NR_sigprocmask:
2277         {
2278             int how = arg1;
2279             sigset_t set, oldset, *set_ptr;
2280 
2281             if (arg2) {
2282                 switch(how) {
2283                 case TARGET_SIG_BLOCK:
2284                     how = SIG_BLOCK;
2285                     break;
2286                 case TARGET_SIG_UNBLOCK:
2287                     how = SIG_UNBLOCK;
2288                     break;
2289                 case TARGET_SIG_SETMASK:
2290                     how = SIG_SETMASK;
2291                     break;
2292                 default:
2293                     ret = -EINVAL;
2294                     goto fail;
2295                 }
2296                 p = lock_user(arg2, sizeof(target_sigset_t), 1);
2297                 target_to_host_old_sigset(&set, p);
2298                 unlock_user(p, arg2, 0);
2299                 set_ptr = &set;
2300             } else {
2301                 how = 0;
2302                 set_ptr = NULL;
2303             }
2304             ret = get_errno(sigprocmask(arg1, set_ptr, &oldset));
2305             if (!is_error(ret) && arg3) {
2306                 p = lock_user(arg3, sizeof(target_sigset_t), 0);
2307                 host_to_target_old_sigset(p, &oldset);
2308                 unlock_user(p, arg3, sizeof(target_sigset_t));
2309             }
2310         }
2311         break;
2312     case TARGET_NR_rt_sigprocmask:
2313         {
2314             int how = arg1;
2315             sigset_t set, oldset, *set_ptr;
2316 
2317             if (arg2) {
2318                 switch(how) {
2319                 case TARGET_SIG_BLOCK:
2320                     how = SIG_BLOCK;
2321                     break;
2322                 case TARGET_SIG_UNBLOCK:
2323                     how = SIG_UNBLOCK;
2324                     break;
2325                 case TARGET_SIG_SETMASK:
2326                     how = SIG_SETMASK;
2327                     break;
2328                 default:
2329                     ret = -EINVAL;
2330                     goto fail;
2331                 }
2332                 p = lock_user(arg2, sizeof(target_sigset_t), 1);
2333                 target_to_host_sigset(&set, p);
2334                 unlock_user(p, arg2, 0);
2335                 set_ptr = &set;
2336             } else {
2337                 how = 0;
2338                 set_ptr = NULL;
2339             }
2340             ret = get_errno(sigprocmask(how, set_ptr, &oldset));
2341             if (!is_error(ret) && arg3) {
2342                 p = lock_user(arg3, sizeof(target_sigset_t), 0);
2343                 host_to_target_sigset(p, &oldset);
2344                 unlock_user(p, arg3, sizeof(target_sigset_t));
2345             }
2346         }
2347         break;
2348     case TARGET_NR_sigpending:
2349         {
2350             sigset_t set;
2351             ret = get_errno(sigpending(&set));
2352             if (!is_error(ret)) {
2353                 p = lock_user(arg1, sizeof(target_sigset_t), 0);
2354                 host_to_target_old_sigset(p, &set);
2355                 unlock_user(p, arg1, sizeof(target_sigset_t));
2356             }
2357         }
2358         break;
2359     case TARGET_NR_rt_sigpending:
2360         {
2361             sigset_t set;
2362             ret = get_errno(sigpending(&set));
2363             if (!is_error(ret)) {
2364                 p = lock_user(arg1, sizeof(target_sigset_t), 0);
2365                 host_to_target_sigset(p, &set);
2366                 unlock_user(p, arg1, sizeof(target_sigset_t));
2367             }
2368         }
2369         break;
2370     case TARGET_NR_sigsuspend:
2371         {
2372             sigset_t set;
2373             p = lock_user(arg1, sizeof(target_sigset_t), 1);
2374             target_to_host_old_sigset(&set, p);
2375             unlock_user(p, arg1, 0);
2376             ret = get_errno(sigsuspend(&set));
2377         }
2378         break;
2379     case TARGET_NR_rt_sigsuspend:
2380         {
2381             sigset_t set;
2382             p = lock_user(arg1, sizeof(target_sigset_t), 1);
2383             target_to_host_sigset(&set, p);
2384             unlock_user(p, arg1, 0);
2385             ret = get_errno(sigsuspend(&set));
2386         }
2387         break;
2388     case TARGET_NR_rt_sigtimedwait:
2389         {
2390             sigset_t set;
2391             struct timespec uts, *puts;
2392             siginfo_t uinfo;
2393 
2394             p = lock_user(arg1, sizeof(target_sigset_t), 1);
2395             target_to_host_sigset(&set, p);
2396             unlock_user(p, arg1, 0);
2397             if (arg3) {
2398                 puts = &uts;
2399                 target_to_host_timespec(puts, arg3);
2400             } else {
2401                 puts = NULL;
2402             }
2403             ret = get_errno(sigtimedwait(&set, &uinfo, puts));
2404             if (!is_error(ret) && arg2) {
2405                 p = lock_user(arg2, sizeof(target_sigset_t), 0);
2406                 host_to_target_siginfo(p, &uinfo);
2407                 unlock_user(p, arg2, sizeof(target_sigset_t));
2408             }
2409         }
2410         break;
2411     case TARGET_NR_rt_sigqueueinfo:
2412         {
2413             siginfo_t uinfo;
2414             p = lock_user(arg3, sizeof(target_sigset_t), 1);
2415             target_to_host_siginfo(&uinfo, p);
2416             unlock_user(p, arg1, 0);
2417             ret = get_errno(sys_rt_sigqueueinfo(arg1, arg2, &uinfo));
2418         }
2419         break;
2420     case TARGET_NR_sigreturn:
2421         /* NOTE: ret is eax, so not transcoding must be done */
2422         ret = do_sigreturn(cpu_env);
2423         break;
2424     case TARGET_NR_rt_sigreturn:
2425         /* NOTE: ret is eax, so not transcoding must be done */
2426         ret = do_rt_sigreturn(cpu_env);
2427         break;
2428     case TARGET_NR_sethostname:
2429         p = lock_user_string(arg1);
2430         ret = get_errno(sethostname(p, arg2));
2431         unlock_user(p, arg1, 0);
2432         break;
2433     case TARGET_NR_setrlimit:
2434         {
2435             /* XXX: convert resource ? */
2436             int resource = arg1;
2437             struct target_rlimit *target_rlim;
2438             struct rlimit rlim;
2439             lock_user_struct(target_rlim, arg2, 1);
2440             rlim.rlim_cur = tswapl(target_rlim->rlim_cur);
2441             rlim.rlim_max = tswapl(target_rlim->rlim_max);
2442             unlock_user_struct(target_rlim, arg2, 0);
2443             ret = get_errno(setrlimit(resource, &rlim));
2444         }
2445         break;
2446     case TARGET_NR_getrlimit:
2447         {
2448             /* XXX: convert resource ? */
2449             int resource = arg1;
2450             struct target_rlimit *target_rlim;
2451             struct rlimit rlim;
2452 
2453             ret = get_errno(getrlimit(resource, &rlim));
2454             if (!is_error(ret)) {
2455                 lock_user_struct(target_rlim, arg2, 0);
2456                 rlim.rlim_cur = tswapl(target_rlim->rlim_cur);
2457                 rlim.rlim_max = tswapl(target_rlim->rlim_max);
2458                 unlock_user_struct(target_rlim, arg2, 1);
2459             }
2460         }
2461         break;
2462     case TARGET_NR_getrusage:
2463         {
2464             struct rusage rusage;
2465             ret = get_errno(getrusage(arg1, &rusage));
2466             if (!is_error(ret)) {
2467                 host_to_target_rusage(arg2, &rusage);
2468             }
2469         }
2470         break;
2471     case TARGET_NR_gettimeofday:
2472         {
2473             struct timeval tv;
2474             ret = get_errno(gettimeofday(&tv, NULL));
2475             if (!is_error(ret)) {
2476                 host_to_target_timeval(arg1, &tv);
2477             }
2478         }
2479         break;
2480     case TARGET_NR_settimeofday:
2481         {
2482             struct timeval tv;
2483             target_to_host_timeval(&tv, arg1);
2484             ret = get_errno(settimeofday(&tv, NULL));
2485         }
2486         break;
2487 #ifdef TARGET_NR_select
2488     case TARGET_NR_select:
2489         {
2490             struct target_sel_arg_struct *sel;
2491             target_ulong inp, outp, exp, tvp;
2492             long nsel;
2493 
2494             lock_user_struct(sel, arg1, 1);
2495             nsel = tswapl(sel->n);
2496             inp = tswapl(sel->inp);
2497             outp = tswapl(sel->outp);
2498             exp = tswapl(sel->exp);
2499             tvp = tswapl(sel->tvp);
2500             unlock_user_struct(sel, arg1, 0);
2501             ret = do_select(nsel, inp, outp, exp, tvp);
2502         }
2503         break;
2504 #endif
2505     case TARGET_NR_symlink:
2506         {
2507             void *p2;
2508             p = lock_user_string(arg1);
2509             p2 = lock_user_string(arg2);
2510             ret = get_errno(symlink(p, p2));
2511             unlock_user(p2, arg2, 0);
2512             unlock_user(p, arg1, 0);
2513         }
2514         break;
2515 #ifdef TARGET_NR_oldlstat
2516     case TARGET_NR_oldlstat:
2517         goto unimplemented;
2518 #endif
2519     case TARGET_NR_readlink:
2520         {
2521             void *p2;
2522             p = lock_user_string(arg1);
2523             p2 = lock_user(arg2, arg3, 0);
2524             ret = get_errno(readlink(path(p), p2, arg3));
2525             unlock_user(p2, arg2, ret);
2526             unlock_user(p, arg1, 0);
2527         }
2528         break;
2529     case TARGET_NR_uselib:
2530         goto unimplemented;
2531     case TARGET_NR_swapon:
2532         p = lock_user_string(arg1);
2533         ret = get_errno(swapon(p, arg2));
2534         unlock_user(p, arg1, 0);
2535         break;
2536     case TARGET_NR_reboot:
2537         goto unimplemented;
2538     case TARGET_NR_readdir:
2539         goto unimplemented;
2540     case TARGET_NR_mmap:
2541 #if defined(TARGET_I386) || defined(TARGET_ARM)
2542         {
2543             target_ulong *v;
2544             target_ulong v1, v2, v3, v4, v5, v6;
2545             v = lock_user(arg1, 6 * sizeof(target_ulong), 1);
2546             v1 = tswapl(v[0]);
2547             v2 = tswapl(v[1]);
2548             v3 = tswapl(v[2]);
2549             v4 = tswapl(v[3]);
2550             v5 = tswapl(v[4]);
2551             v6 = tswapl(v[5]);
2552             unlock_user(v, arg1, 0);
2553             ret = get_errno(target_mmap(v1, v2, v3,
2554                                         target_to_host_bitmask(v4, mmap_flags_tbl),
2555                                         v5, v6));
2556         }
2557 #else
2558         ret = get_errno(target_mmap(arg1, arg2, arg3,
2559                                     target_to_host_bitmask(arg4, mmap_flags_tbl),
2560                                     arg5,
2561                                     arg6));
2562 #endif
2563         break;
2564 #ifdef TARGET_NR_mmap2
2565     case TARGET_NR_mmap2:
2566 #if defined(TARGET_SPARC)
2567 #define MMAP_SHIFT 12
2568 #else
2569 #define MMAP_SHIFT TARGET_PAGE_BITS
2570 #endif
2571         ret = get_errno(target_mmap(arg1, arg2, arg3,
2572                                     target_to_host_bitmask(arg4, mmap_flags_tbl),
2573                                     arg5,
2574                                     arg6 << MMAP_SHIFT));
2575         break;
2576 #endif
2577     case TARGET_NR_munmap:
2578         ret = get_errno(target_munmap(arg1, arg2));
2579         break;
2580     case TARGET_NR_mprotect:
2581         ret = get_errno(target_mprotect(arg1, arg2, arg3));
2582         break;
2583     case TARGET_NR_mremap:
2584         ret = get_errno(target_mremap(arg1, arg2, arg3, arg4, arg5));
2585         break;
2586         /* ??? msync/mlock/munlock are broken for softmmu.  */
2587     case TARGET_NR_msync:
2588         ret = get_errno(msync(g2h(arg1), arg2, arg3));
2589         break;
2590     case TARGET_NR_mlock:
2591         ret = get_errno(mlock(g2h(arg1), arg2));
2592         break;
2593     case TARGET_NR_munlock:
2594         ret = get_errno(munlock(g2h(arg1), arg2));
2595         break;
2596     case TARGET_NR_mlockall:
2597         ret = get_errno(mlockall(arg1));
2598         break;
2599     case TARGET_NR_munlockall:
2600         ret = get_errno(munlockall());
2601         break;
2602     case TARGET_NR_truncate:
2603         p = lock_user_string(arg1);
2604         ret = get_errno(truncate(p, arg2));
2605         unlock_user(p, arg1, 0);
2606         break;
2607     case TARGET_NR_ftruncate:
2608         ret = get_errno(ftruncate(arg1, arg2));
2609         break;
2610     case TARGET_NR_fchmod:
2611         ret = get_errno(fchmod(arg1, arg2));
2612         break;
2613     case TARGET_NR_getpriority:
2614         ret = get_errno(getpriority(arg1, arg2));
2615         break;
2616     case TARGET_NR_setpriority:
2617         ret = get_errno(setpriority(arg1, arg2, arg3));
2618         break;
2619 #ifdef TARGET_NR_profil
2620     case TARGET_NR_profil:
2621         goto unimplemented;
2622 #endif
2623     case TARGET_NR_statfs:
2624         p = lock_user_string(arg1);
2625         ret = get_errno(statfs(path(p), &stfs));
2626         unlock_user(p, arg1, 0);
2627     convert_statfs:
2628         if (!is_error(ret)) {
2629             struct target_statfs *target_stfs;
2630 
2631             lock_user_struct(target_stfs, arg2, 0);
2632             /* ??? put_user is probably wrong.  */
2633             put_user(stfs.f_type, &target_stfs->f_type);
2634             put_user(stfs.f_bsize, &target_stfs->f_bsize);
2635             put_user(stfs.f_blocks, &target_stfs->f_blocks);
2636             put_user(stfs.f_bfree, &target_stfs->f_bfree);
2637             put_user(stfs.f_bavail, &target_stfs->f_bavail);
2638             put_user(stfs.f_files, &target_stfs->f_files);
2639             put_user(stfs.f_ffree, &target_stfs->f_ffree);
2640             put_user(stfs.f_fsid.__val[0], &target_stfs->f_fsid);
2641             put_user(stfs.f_namelen, &target_stfs->f_namelen);
2642             unlock_user_struct(target_stfs, arg2, 1);
2643         }
2644         break;
2645     case TARGET_NR_fstatfs:
2646         ret = get_errno(fstatfs(arg1, &stfs));
2647         goto convert_statfs;
2648 #ifdef TARGET_NR_statfs64
2649     case TARGET_NR_statfs64:
2650         p = lock_user_string(arg1);
2651         ret = get_errno(statfs(path(p), &stfs));
2652         unlock_user(p, arg1, 0);
2653     convert_statfs64:
2654         if (!is_error(ret)) {
2655             struct target_statfs64 *target_stfs;
2656 
2657             lock_user_struct(target_stfs, arg3, 0);
2658             /* ??? put_user is probably wrong.  */
2659             put_user(stfs.f_type, &target_stfs->f_type);
2660             put_user(stfs.f_bsize, &target_stfs->f_bsize);
2661             put_user(stfs.f_blocks, &target_stfs->f_blocks);
2662             put_user(stfs.f_bfree, &target_stfs->f_bfree);
2663             put_user(stfs.f_bavail, &target_stfs->f_bavail);
2664             put_user(stfs.f_files, &target_stfs->f_files);
2665             put_user(stfs.f_ffree, &target_stfs->f_ffree);
2666             put_user(stfs.f_fsid.__val[0], &target_stfs->f_fsid);
2667             put_user(stfs.f_namelen, &target_stfs->f_namelen);
2668             unlock_user_struct(target_stfs, arg3, 0);
2669         }
2670         break;
2671     case TARGET_NR_fstatfs64:
2672         ret = get_errno(fstatfs(arg1, &stfs));
2673         goto convert_statfs64;
2674 #endif
2675 #ifdef TARGET_NR_ioperm
2676     case TARGET_NR_ioperm:
2677         goto unimplemented;
2678 #endif
2679     case TARGET_NR_socketcall:
2680         ret = do_socketcall(arg1, arg2);
2681         break;
2682     case TARGET_NR_syslog:
2683         goto unimplemented;
2684     case TARGET_NR_setitimer:
2685         {
2686             struct itimerval value, ovalue, *pvalue;
2687 
2688             if (arg2) {
2689                 pvalue = &value;
2690                 target_to_host_timeval(&pvalue->it_interval,
2691                                        arg2);
2692                 target_to_host_timeval(&pvalue->it_value,
2693                                        arg2 + sizeof(struct target_timeval));
2694             } else {
2695                 pvalue = NULL;
2696             }
2697             ret = get_errno(setitimer(arg1, pvalue, &ovalue));
2698             if (!is_error(ret) && arg3) {
2699                 host_to_target_timeval(arg3,
2700                                        &ovalue.it_interval);
2701                 host_to_target_timeval(arg3 + sizeof(struct target_timeval),
2702                                        &ovalue.it_value);
2703             }
2704         }
2705         break;
2706     case TARGET_NR_getitimer:
2707         {
2708             struct itimerval value;
2709 
2710             ret = get_errno(getitimer(arg1, &value));
2711             if (!is_error(ret) && arg2) {
2712                 host_to_target_timeval(arg2,
2713                                        &value.it_interval);
2714                 host_to_target_timeval(arg2 + sizeof(struct target_timeval),
2715                                        &value.it_value);
2716             }
2717         }
2718         break;
2719     case TARGET_NR_stat:
2720         p = lock_user_string(arg1);
2721         ret = get_errno(stat(path(p), &st));
2722         unlock_user(p, arg1, 0);
2723         goto do_stat;
2724     case TARGET_NR_lstat:
2725         p = lock_user_string(arg1);
2726         ret = get_errno(lstat(path(p), &st));
2727         unlock_user(p, arg1, 0);
2728         goto do_stat;
2729     case TARGET_NR_fstat:
2730         {
2731             ret = get_errno(fstat(arg1, &st));
2732         do_stat:
2733             if (!is_error(ret)) {
2734                 struct target_stat *target_st;
2735 
2736                 lock_user_struct(target_st, arg2, 0);
2737                 target_st->st_dev = tswap16(st.st_dev);
2738                 target_st->st_ino = tswapl(st.st_ino);
2739 #if defined(TARGET_PPC)
2740                 target_st->st_mode = tswapl(st.st_mode); /* XXX: check this */
2741                 target_st->st_uid = tswap32(st.st_uid);
2742                 target_st->st_gid = tswap32(st.st_gid);
2743 #else
2744                 target_st->st_mode = tswap16(st.st_mode);
2745                 target_st->st_uid = tswap16(st.st_uid);
2746                 target_st->st_gid = tswap16(st.st_gid);
2747 #endif
2748                 target_st->st_nlink = tswap16(st.st_nlink);
2749                 target_st->st_rdev = tswap16(st.st_rdev);
2750                 target_st->st_size = tswapl(st.st_size);
2751                 target_st->st_blksize = tswapl(st.st_blksize);
2752                 target_st->st_blocks = tswapl(st.st_blocks);
2753                 target_st->target_st_atime = tswapl(st.st_atime);
2754                 target_st->target_st_mtime = tswapl(st.st_mtime);
2755                 target_st->target_st_ctime = tswapl(st.st_ctime);
2756                 unlock_user_struct(target_st, arg2, 1);
2757             }
2758         }
2759         break;
2760 #ifdef TARGET_NR_olduname
2761     case TARGET_NR_olduname:
2762         goto unimplemented;
2763 #endif
2764 #ifdef TARGET_NR_iopl
2765     case TARGET_NR_iopl:
2766         goto unimplemented;
2767 #endif
2768     case TARGET_NR_vhangup:
2769         ret = get_errno(vhangup());
2770         break;
2771 #ifdef TARGET_NR_idle
2772     case TARGET_NR_idle:
2773         goto unimplemented;
2774 #endif
2775 #ifdef TARGET_NR_syscall
2776     case TARGET_NR_syscall:
2777     	ret = do_syscall(cpu_env,arg1 & 0xffff,arg2,arg3,arg4,arg5,arg6,0);
2778     	break;
2779 #endif
2780     case TARGET_NR_wait4:
2781         {
2782             int status;
2783             target_long status_ptr = arg2;
2784             struct rusage rusage, *rusage_ptr;
2785             target_ulong target_rusage = arg4;
2786             if (target_rusage)
2787                 rusage_ptr = &rusage;
2788             else
2789                 rusage_ptr = NULL;
2790             ret = get_errno(wait4(arg1, &status, arg3, rusage_ptr));
2791             if (!is_error(ret)) {
2792                 if (status_ptr)
2793                     tputl(status_ptr, status);
2794                 if (target_rusage) {
2795                     host_to_target_rusage(target_rusage, &rusage);
2796                 }
2797             }
2798         }
2799         break;
2800     case TARGET_NR_swapoff:
2801         p = lock_user_string(arg1);
2802         ret = get_errno(swapoff(p));
2803         unlock_user(p, arg1, 0);
2804         break;
2805     case TARGET_NR_sysinfo:
2806         {
2807             struct target_sysinfo *target_value;
2808             struct sysinfo value;
2809             ret = get_errno(sysinfo(&value));
2810             if (!is_error(ret) && arg1)
2811             {
2812                 /* ??? __put_user is probably wrong.  */
2813                 lock_user_struct(target_value, arg1, 0);
2814                 __put_user(value.uptime, &target_value->uptime);
2815                 __put_user(value.loads[0], &target_value->loads[0]);
2816                 __put_user(value.loads[1], &target_value->loads[1]);
2817                 __put_user(value.loads[2], &target_value->loads[2]);
2818                 __put_user(value.totalram, &target_value->totalram);
2819                 __put_user(value.freeram, &target_value->freeram);
2820                 __put_user(value.sharedram, &target_value->sharedram);
2821                 __put_user(value.bufferram, &target_value->bufferram);
2822                 __put_user(value.totalswap, &target_value->totalswap);
2823                 __put_user(value.freeswap, &target_value->freeswap);
2824                 __put_user(value.procs, &target_value->procs);
2825                 __put_user(value.totalhigh, &target_value->totalhigh);
2826                 __put_user(value.freehigh, &target_value->freehigh);
2827                 __put_user(value.mem_unit, &target_value->mem_unit);
2828                 unlock_user_struct(target_value, arg1, 1);
2829             }
2830         }
2831         break;
2832     case TARGET_NR_ipc:
2833 	ret = do_ipc(arg1, arg2, arg3, arg4, arg5, arg6);
2834 	break;
2835     case TARGET_NR_fsync:
2836         ret = get_errno(fsync(arg1));
2837         break;
2838     case TARGET_NR_clone:
2839         ret = get_errno(do_fork(cpu_env, arg1, arg2));
2840         break;
2841 #ifdef __NR_exit_group
2842         /* new thread calls */
2843     case TARGET_NR_exit_group:
2844         gdb_exit(cpu_env, arg1);
2845         ret = get_errno(exit_group(arg1));
2846         break;
2847 #endif
2848     case TARGET_NR_setdomainname:
2849         p = lock_user_string(arg1);
2850         ret = get_errno(setdomainname(p, arg2));
2851         unlock_user(p, arg1, 0);
2852         break;
2853     case TARGET_NR_uname:
2854         /* no need to transcode because we use the linux syscall */
2855         {
2856             struct new_utsname * buf;
2857 
2858             lock_user_struct(buf, arg1, 0);
2859             ret = get_errno(sys_uname(buf));
2860             if (!is_error(ret)) {
2861                 /* Overrite the native machine name with whatever is being
2862                    emulated. */
2863                 strcpy (buf->machine, UNAME_MACHINE);
2864                 /* Allow the user to override the reported release.  */
2865                 if (qemu_uname_release && *qemu_uname_release)
2866                   strcpy (buf->release, qemu_uname_release);
2867             }
2868             unlock_user_struct(buf, arg1, 1);
2869         }
2870         break;
2871 #ifdef TARGET_I386
2872     case TARGET_NR_modify_ldt:
2873         ret = get_errno(do_modify_ldt(cpu_env, arg1, arg2, arg3));
2874         break;
2875     case TARGET_NR_vm86old:
2876         goto unimplemented;
2877     case TARGET_NR_vm86:
2878         ret = do_vm86(cpu_env, arg1, arg2);
2879         break;
2880 #endif
2881     case TARGET_NR_adjtimex:
2882         goto unimplemented;
2883     case TARGET_NR_create_module:
2884     case TARGET_NR_init_module:
2885     case TARGET_NR_delete_module:
2886     case TARGET_NR_get_kernel_syms:
2887         goto unimplemented;
2888     case TARGET_NR_quotactl:
2889         goto unimplemented;
2890     case TARGET_NR_getpgid:
2891         ret = get_errno(getpgid(arg1));
2892         break;
2893     case TARGET_NR_fchdir:
2894         ret = get_errno(fchdir(arg1));
2895         break;
2896     case TARGET_NR_bdflush:
2897         goto unimplemented;
2898     case TARGET_NR_sysfs:
2899         goto unimplemented;
2900     case TARGET_NR_personality:
2901         ret = get_errno(personality(arg1));
2902         break;
2903     case TARGET_NR_afs_syscall:
2904         goto unimplemented;
2905     case TARGET_NR__llseek:
2906         {
2907 #if defined (__x86_64__)
2908             ret = get_errno(lseek(arg1, ((uint64_t )arg2 << 32) | arg3, arg5));
2909             tput64(arg4, ret);
2910 #else
2911             int64_t res;
2912             ret = get_errno(_llseek(arg1, arg2, arg3, &res, arg5));
2913             tput64(arg4, res);
2914 #endif
2915         }
2916         break;
2917     case TARGET_NR_getdents:
2918 #if TARGET_LONG_SIZE != 4
2919         goto unimplemented;
2920 #warning not supported
2921 #elif TARGET_LONG_SIZE == 4 && HOST_LONG_SIZE == 8
2922         {
2923             struct target_dirent *target_dirp;
2924             struct dirent *dirp;
2925             long count = arg3;
2926 
2927 	    dirp = malloc(count);
2928 	    if (!dirp)
2929                 return -ENOMEM;
2930 
2931             ret = get_errno(sys_getdents(arg1, dirp, count));
2932             if (!is_error(ret)) {
2933                 struct dirent *de;
2934 		struct target_dirent *tde;
2935                 int len = ret;
2936                 int reclen, treclen;
2937 		int count1, tnamelen;
2938 
2939 		count1 = 0;
2940                 de = dirp;
2941                 target_dirp = lock_user(arg2, count, 0);
2942 		tde = target_dirp;
2943                 while (len > 0) {
2944                     reclen = de->d_reclen;
2945 		    treclen = reclen - (2 * (sizeof(long) - sizeof(target_long)));
2946                     tde->d_reclen = tswap16(treclen);
2947                     tde->d_ino = tswapl(de->d_ino);
2948                     tde->d_off = tswapl(de->d_off);
2949 		    tnamelen = treclen - (2 * sizeof(target_long) + 2);
2950 		    if (tnamelen > 256)
2951                         tnamelen = 256;
2952                     /* XXX: may not be correct */
2953 		    strncpy(tde->d_name, de->d_name, tnamelen);
2954                     de = (struct dirent *)((char *)de + reclen);
2955                     len -= reclen;
2956                     tde = (struct dirent *)((char *)tde + treclen);
2957 		    count1 += treclen;
2958                 }
2959 		ret = count1;
2960             }
2961             unlock_user(target_dirp, arg2, ret);
2962 	    free(dirp);
2963         }
2964 #else
2965         {
2966             struct dirent *dirp;
2967             long count = arg3;
2968 
2969             dirp = lock_user(arg2, count, 0);
2970             ret = get_errno(sys_getdents(arg1, dirp, count));
2971             if (!is_error(ret)) {
2972                 struct dirent *de;
2973                 int len = ret;
2974                 int reclen;
2975                 de = dirp;
2976                 while (len > 0) {
2977                     reclen = de->d_reclen;
2978                     if (reclen > len)
2979                         break;
2980                     de->d_reclen = tswap16(reclen);
2981                     tswapls(&de->d_ino);
2982                     tswapls(&de->d_off);
2983                     de = (struct dirent *)((char *)de + reclen);
2984                     len -= reclen;
2985                 }
2986             }
2987             unlock_user(dirp, arg2, ret);
2988         }
2989 #endif
2990         break;
2991 #ifdef TARGET_NR_getdents64
2992     case TARGET_NR_getdents64:
2993         {
2994             struct dirent64 *dirp;
2995             long count = arg3;
2996             dirp = lock_user(arg2, count, 0);
2997             ret = get_errno(sys_getdents64(arg1, dirp, count));
2998             if (!is_error(ret)) {
2999                 struct dirent64 *de;
3000                 int len = ret;
3001                 int reclen;
3002                 de = dirp;
3003                 while (len > 0) {
3004                     reclen = de->d_reclen;
3005                     if (reclen > len)
3006                         break;
3007                     de->d_reclen = tswap16(reclen);
3008                     tswap64s(&de->d_ino);
3009                     tswap64s(&de->d_off);
3010                     de = (struct dirent64 *)((char *)de + reclen);
3011                     len -= reclen;
3012                 }
3013             }
3014             unlock_user(dirp, arg2, ret);
3015         }
3016         break;
3017 #endif /* TARGET_NR_getdents64 */
3018     case TARGET_NR__newselect:
3019         ret = do_select(arg1, arg2, arg3, arg4, arg5);
3020         break;
3021     case TARGET_NR_poll:
3022         {
3023             struct target_pollfd *target_pfd;
3024             unsigned int nfds = arg2;
3025             int timeout = arg3;
3026             struct pollfd *pfd;
3027             unsigned int i;
3028 
3029             target_pfd = lock_user(arg1, sizeof(struct target_pollfd) * nfds, 1);
3030             pfd = alloca(sizeof(struct pollfd) * nfds);
3031             for(i = 0; i < nfds; i++) {
3032                 pfd[i].fd = tswap32(target_pfd[i].fd);
3033                 pfd[i].events = tswap16(target_pfd[i].events);
3034             }
3035             ret = get_errno(poll(pfd, nfds, timeout));
3036             if (!is_error(ret)) {
3037                 for(i = 0; i < nfds; i++) {
3038                     target_pfd[i].revents = tswap16(pfd[i].revents);
3039                 }
3040                 ret += nfds * (sizeof(struct target_pollfd)
3041                                - sizeof(struct pollfd));
3042             }
3043             unlock_user(target_pfd, arg1, ret);
3044         }
3045         break;
3046     case TARGET_NR_flock:
3047         /* NOTE: the flock constant seems to be the same for every
3048            Linux platform */
3049         ret = get_errno(flock(arg1, arg2));
3050         break;
3051     case TARGET_NR_readv:
3052         {
3053             int count = arg3;
3054             struct iovec *vec;
3055 
3056             vec = alloca(count * sizeof(struct iovec));
3057             lock_iovec(vec, arg2, count, 0);
3058             ret = get_errno(readv(arg1, vec, count));
3059             unlock_iovec(vec, arg2, count, 1);
3060         }
3061         break;
3062     case TARGET_NR_writev:
3063         {
3064             int count = arg3;
3065             struct iovec *vec;
3066 
3067             vec = alloca(count * sizeof(struct iovec));
3068             lock_iovec(vec, arg2, count, 1);
3069             ret = get_errno(writev(arg1, vec, count));
3070             unlock_iovec(vec, arg2, count, 0);
3071         }
3072         break;
3073     case TARGET_NR_getsid:
3074         ret = get_errno(getsid(arg1));
3075         break;
3076     case TARGET_NR_fdatasync:
3077         ret = get_errno(fdatasync(arg1));
3078         break;
3079     case TARGET_NR__sysctl:
3080         /* We don't implement this, but ENODIR is always a safe
3081            return value. */
3082         return -ENOTDIR;
3083     case TARGET_NR_sched_setparam:
3084         {
3085             struct sched_param *target_schp;
3086             struct sched_param schp;
3087 
3088             lock_user_struct(target_schp, arg2, 1);
3089             schp.sched_priority = tswap32(target_schp->sched_priority);
3090             unlock_user_struct(target_schp, arg2, 0);
3091             ret = get_errno(sched_setparam(arg1, &schp));
3092         }
3093         break;
3094     case TARGET_NR_sched_getparam:
3095         {
3096             struct sched_param *target_schp;
3097             struct sched_param schp;
3098             ret = get_errno(sched_getparam(arg1, &schp));
3099             if (!is_error(ret)) {
3100                 lock_user_struct(target_schp, arg2, 0);
3101                 target_schp->sched_priority = tswap32(schp.sched_priority);
3102                 unlock_user_struct(target_schp, arg2, 1);
3103             }
3104         }
3105         break;
3106     case TARGET_NR_sched_setscheduler:
3107         {
3108             struct sched_param *target_schp;
3109             struct sched_param schp;
3110             lock_user_struct(target_schp, arg3, 1);
3111             schp.sched_priority = tswap32(target_schp->sched_priority);
3112             unlock_user_struct(target_schp, arg3, 0);
3113             ret = get_errno(sched_setscheduler(arg1, arg2, &schp));
3114         }
3115         break;
3116     case TARGET_NR_sched_getscheduler:
3117         ret = get_errno(sched_getscheduler(arg1));
3118         break;
3119     case TARGET_NR_sched_yield:
3120         ret = get_errno(sched_yield());
3121         break;
3122     case TARGET_NR_sched_get_priority_max:
3123         ret = get_errno(sched_get_priority_max(arg1));
3124         break;
3125     case TARGET_NR_sched_get_priority_min:
3126         ret = get_errno(sched_get_priority_min(arg1));
3127         break;
3128     case TARGET_NR_sched_rr_get_interval:
3129         {
3130             struct timespec ts;
3131             ret = get_errno(sched_rr_get_interval(arg1, &ts));
3132             if (!is_error(ret)) {
3133                 host_to_target_timespec(arg2, &ts);
3134             }
3135         }
3136         break;
3137     case TARGET_NR_nanosleep:
3138         {
3139             struct timespec req, rem;
3140             target_to_host_timespec(&req, arg1);
3141             ret = get_errno(nanosleep(&req, &rem));
3142             if (is_error(ret) && arg2) {
3143                 host_to_target_timespec(arg2, &rem);
3144             }
3145         }
3146         break;
3147     case TARGET_NR_query_module:
3148         goto unimplemented;
3149     case TARGET_NR_nfsservctl:
3150         goto unimplemented;
3151     case TARGET_NR_prctl:
3152         goto unimplemented;
3153 #ifdef TARGET_NR_pread
3154     case TARGET_NR_pread:
3155         page_unprotect_range(arg2, arg3);
3156         p = lock_user(arg2, arg3, 0);
3157         ret = get_errno(pread(arg1, p, arg3, arg4));
3158         unlock_user(p, arg2, ret);
3159         break;
3160     case TARGET_NR_pwrite:
3161         p = lock_user(arg2, arg3, 1);
3162         ret = get_errno(pwrite(arg1, p, arg3, arg4));
3163         unlock_user(p, arg2, 0);
3164         break;
3165 #endif
3166     case TARGET_NR_getcwd:
3167         p = lock_user(arg1, arg2, 0);
3168         ret = get_errno(sys_getcwd1(p, arg2));
3169         unlock_user(p, arg1, ret);
3170         break;
3171     case TARGET_NR_capget:
3172         goto unimplemented;
3173     case TARGET_NR_capset:
3174         goto unimplemented;
3175     case TARGET_NR_sigaltstack:
3176         goto unimplemented;
3177     case TARGET_NR_sendfile:
3178         goto unimplemented;
3179 #ifdef TARGET_NR_getpmsg
3180     case TARGET_NR_getpmsg:
3181         goto unimplemented;
3182 #endif
3183 #ifdef TARGET_NR_putpmsg
3184     case TARGET_NR_putpmsg:
3185         goto unimplemented;
3186 #endif
3187 #ifdef TARGET_NR_vfork
3188     case TARGET_NR_vfork:
3189         ret = get_errno(do_fork(cpu_env, CLONE_VFORK | CLONE_VM | SIGCHLD, 0));
3190         break;
3191 #endif
3192 #ifdef TARGET_NR_ugetrlimit
3193     case TARGET_NR_ugetrlimit:
3194     {
3195 	struct rlimit rlim;
3196 	ret = get_errno(getrlimit(arg1, &rlim));
3197 	if (!is_error(ret)) {
3198 	    struct target_rlimit *target_rlim;
3199             lock_user_struct(target_rlim, arg2, 0);
3200 	    target_rlim->rlim_cur = tswapl(rlim.rlim_cur);
3201 	    target_rlim->rlim_max = tswapl(rlim.rlim_max);
3202             unlock_user_struct(target_rlim, arg2, 1);
3203 	}
3204 	break;
3205     }
3206 #endif
3207 #ifdef TARGET_NR_truncate64
3208     case TARGET_NR_truncate64:
3209         p = lock_user_string(arg1);
3210 	ret = target_truncate64(cpu_env, p, arg2, arg3, arg4);
3211         unlock_user(p, arg1, 0);
3212 	break;
3213 #endif
3214 #ifdef TARGET_NR_ftruncate64
3215     case TARGET_NR_ftruncate64:
3216 	ret = target_ftruncate64(cpu_env, arg1, arg2, arg3, arg4);
3217 	break;
3218 #endif
3219 #ifdef TARGET_NR_stat64
3220     case TARGET_NR_stat64:
3221         p = lock_user_string(arg1);
3222         ret = get_errno(stat(path(p), &st));
3223         unlock_user(p, arg1, 0);
3224         goto do_stat64;
3225 #endif
3226 #ifdef TARGET_NR_lstat64
3227     case TARGET_NR_lstat64:
3228         p = lock_user_string(arg1);
3229         ret = get_errno(lstat(path(p), &st));
3230         unlock_user(p, arg1, 0);
3231         goto do_stat64;
3232 #endif
3233 #ifdef TARGET_NR_fstat64
3234     case TARGET_NR_fstat64:
3235         {
3236             ret = get_errno(fstat(arg1, &st));
3237         do_stat64:
3238             if (!is_error(ret)) {
3239 #ifdef TARGET_ARM
3240                 if (((CPUARMState *)cpu_env)->eabi) {
3241                     struct target_eabi_stat64 *target_st;
3242                     lock_user_struct(target_st, arg2, 1);
3243                     memset(target_st, 0, sizeof(struct target_eabi_stat64));
3244                     /* put_user is probably wrong.  */
3245                     put_user(st.st_dev, &target_st->st_dev);
3246                     put_user(st.st_ino, &target_st->st_ino);
3247 #ifdef TARGET_STAT64_HAS_BROKEN_ST_INO
3248                     put_user(st.st_ino, &target_st->__st_ino);
3249 #endif
3250                     put_user(st.st_mode, &target_st->st_mode);
3251                     put_user(st.st_nlink, &target_st->st_nlink);
3252                     put_user(st.st_uid, &target_st->st_uid);
3253                     put_user(st.st_gid, &target_st->st_gid);
3254                     put_user(st.st_rdev, &target_st->st_rdev);
3255                     /* XXX: better use of kernel struct */
3256                     put_user(st.st_size, &target_st->st_size);
3257                     put_user(st.st_blksize, &target_st->st_blksize);
3258                     put_user(st.st_blocks, &target_st->st_blocks);
3259                     put_user(st.st_atime, &target_st->target_st_atime);
3260                     put_user(st.st_mtime, &target_st->target_st_mtime);
3261                     put_user(st.st_ctime, &target_st->target_st_ctime);
3262                     unlock_user_struct(target_st, arg2, 0);
3263                 } else
3264 #endif
3265                 {
3266                     struct target_stat64 *target_st;
3267                     lock_user_struct(target_st, arg2, 1);
3268                     memset(target_st, 0, sizeof(struct target_stat64));
3269                     /* ??? put_user is probably wrong.  */
3270                     put_user(st.st_dev, &target_st->st_dev);
3271                     put_user(st.st_ino, &target_st->st_ino);
3272 #ifdef TARGET_STAT64_HAS_BROKEN_ST_INO
3273                     put_user(st.st_ino, &target_st->__st_ino);
3274 #endif
3275                     put_user(st.st_mode, &target_st->st_mode);
3276                     put_user(st.st_nlink, &target_st->st_nlink);
3277                     put_user(st.st_uid, &target_st->st_uid);
3278                     put_user(st.st_gid, &target_st->st_gid);
3279                     put_user(st.st_rdev, &target_st->st_rdev);
3280                     /* XXX: better use of kernel struct */
3281                     put_user(st.st_size, &target_st->st_size);
3282                     put_user(st.st_blksize, &target_st->st_blksize);
3283                     put_user(st.st_blocks, &target_st->st_blocks);
3284                     put_user(st.st_atime, &target_st->target_st_atime);
3285                     put_user(st.st_mtime, &target_st->target_st_mtime);
3286                     put_user(st.st_ctime, &target_st->target_st_ctime);
3287                     unlock_user_struct(target_st, arg2, 0);
3288                 }
3289             }
3290         }
3291         break;
3292 #endif
3293 #ifdef USE_UID16
3294     case TARGET_NR_lchown:
3295         p = lock_user_string(arg1);
3296         ret = get_errno(lchown(p, low2highuid(arg2), low2highgid(arg3)));
3297         unlock_user(p, arg1, 0);
3298         break;
3299     case TARGET_NR_getuid:
3300         ret = get_errno(high2lowuid(getuid()));
3301         break;
3302     case TARGET_NR_getgid:
3303         ret = get_errno(high2lowgid(getgid()));
3304         break;
3305     case TARGET_NR_geteuid:
3306         ret = get_errno(high2lowuid(geteuid()));
3307         break;
3308     case TARGET_NR_getegid:
3309         ret = get_errno(high2lowgid(getegid()));
3310         break;
3311     case TARGET_NR_setreuid:
3312         ret = get_errno(setreuid(low2highuid(arg1), low2highuid(arg2)));
3313         break;
3314     case TARGET_NR_setregid:
3315         ret = get_errno(setregid(low2highgid(arg1), low2highgid(arg2)));
3316         break;
3317     case TARGET_NR_getgroups:
3318         {
3319             int gidsetsize = arg1;
3320             uint16_t *target_grouplist;
3321             gid_t *grouplist;
3322             int i;
3323 
3324             grouplist = alloca(gidsetsize * sizeof(gid_t));
3325             ret = get_errno(getgroups(gidsetsize, grouplist));
3326             if (!is_error(ret)) {
3327                 target_grouplist = lock_user(arg2, gidsetsize * 2, 0);
3328                 for(i = 0;i < gidsetsize; i++)
3329                     target_grouplist[i] = tswap16(grouplist[i]);
3330                 unlock_user(target_grouplist, arg2, gidsetsize * 2);
3331             }
3332         }
3333         break;
3334     case TARGET_NR_setgroups:
3335         {
3336             int gidsetsize = arg1;
3337             uint16_t *target_grouplist;
3338             gid_t *grouplist;
3339             int i;
3340 
3341             grouplist = alloca(gidsetsize * sizeof(gid_t));
3342             target_grouplist = lock_user(arg2, gidsetsize * 2, 1);
3343             for(i = 0;i < gidsetsize; i++)
3344                 grouplist[i] = tswap16(target_grouplist[i]);
3345             unlock_user(target_grouplist, arg2, 0);
3346             ret = get_errno(setgroups(gidsetsize, grouplist));
3347         }
3348         break;
3349     case TARGET_NR_fchown:
3350         ret = get_errno(fchown(arg1, low2highuid(arg2), low2highgid(arg3)));
3351         break;
3352 #ifdef TARGET_NR_setresuid
3353     case TARGET_NR_setresuid:
3354         ret = get_errno(setresuid(low2highuid(arg1),
3355                                   low2highuid(arg2),
3356                                   low2highuid(arg3)));
3357         break;
3358 #endif
3359 #ifdef TARGET_NR_getresuid
3360     case TARGET_NR_getresuid:
3361         {
3362             uid_t ruid, euid, suid;
3363             ret = get_errno(getresuid(&ruid, &euid, &suid));
3364             if (!is_error(ret)) {
3365                 tput16(arg1, tswap16(high2lowuid(ruid)));
3366                 tput16(arg2, tswap16(high2lowuid(euid)));
3367                 tput16(arg3, tswap16(high2lowuid(suid)));
3368             }
3369         }
3370         break;
3371 #endif
3372 #ifdef TARGET_NR_getresgid
3373     case TARGET_NR_setresgid:
3374         ret = get_errno(setresgid(low2highgid(arg1),
3375                                   low2highgid(arg2),
3376                                   low2highgid(arg3)));
3377         break;
3378 #endif
3379 #ifdef TARGET_NR_getresgid
3380     case TARGET_NR_getresgid:
3381         {
3382             gid_t rgid, egid, sgid;
3383             ret = get_errno(getresgid(&rgid, &egid, &sgid));
3384             if (!is_error(ret)) {
3385                 tput16(arg1, tswap16(high2lowgid(rgid)));
3386                 tput16(arg2, tswap16(high2lowgid(egid)));
3387                 tput16(arg3, tswap16(high2lowgid(sgid)));
3388             }
3389         }
3390         break;
3391 #endif
3392     case TARGET_NR_chown:
3393         p = lock_user_string(arg1);
3394         ret = get_errno(chown(p, low2highuid(arg2), low2highgid(arg3)));
3395         unlock_user(p, arg1, 0);
3396         break;
3397     case TARGET_NR_setuid:
3398         ret = get_errno(setuid(low2highuid(arg1)));
3399         break;
3400     case TARGET_NR_setgid:
3401         ret = get_errno(setgid(low2highgid(arg1)));
3402         break;
3403     case TARGET_NR_setfsuid:
3404         ret = get_errno(setfsuid(arg1));
3405         break;
3406     case TARGET_NR_setfsgid:
3407         ret = get_errno(setfsgid(arg1));
3408         break;
3409 #endif /* USE_UID16 */
3410 
3411 #ifdef TARGET_NR_lchown32
3412     case TARGET_NR_lchown32:
3413         p = lock_user_string(arg1);
3414         ret = get_errno(lchown(p, arg2, arg3));
3415         unlock_user(p, arg1, 0);
3416         break;
3417 #endif
3418 #ifdef TARGET_NR_getuid32
3419     case TARGET_NR_getuid32:
3420         ret = get_errno(getuid());
3421         break;
3422 #endif
3423 #ifdef TARGET_NR_getgid32
3424     case TARGET_NR_getgid32:
3425         ret = get_errno(getgid());
3426         break;
3427 #endif
3428 #ifdef TARGET_NR_geteuid32
3429     case TARGET_NR_geteuid32:
3430         ret = get_errno(geteuid());
3431         break;
3432 #endif
3433 #ifdef TARGET_NR_getegid32
3434     case TARGET_NR_getegid32:
3435         ret = get_errno(getegid());
3436         break;
3437 #endif
3438 #ifdef TARGET_NR_setreuid32
3439     case TARGET_NR_setreuid32:
3440         ret = get_errno(setreuid(arg1, arg2));
3441         break;
3442 #endif
3443 #ifdef TARGET_NR_setregid32
3444     case TARGET_NR_setregid32:
3445         ret = get_errno(setregid(arg1, arg2));
3446         break;
3447 #endif
3448 #ifdef TARGET_NR_getgroups32
3449     case TARGET_NR_getgroups32:
3450         {
3451             int gidsetsize = arg1;
3452             uint32_t *target_grouplist;
3453             gid_t *grouplist;
3454             int i;
3455 
3456             grouplist = alloca(gidsetsize * sizeof(gid_t));
3457             ret = get_errno(getgroups(gidsetsize, grouplist));
3458             if (!is_error(ret)) {
3459                 target_grouplist = lock_user(arg2, gidsetsize * 4, 0);
3460                 for(i = 0;i < gidsetsize; i++)
3461                     target_grouplist[i] = tswap32(grouplist[i]);
3462                 unlock_user(target_grouplist, arg2, gidsetsize * 4);
3463             }
3464         }
3465         break;
3466 #endif
3467 #ifdef TARGET_NR_setgroups32
3468     case TARGET_NR_setgroups32:
3469         {
3470             int gidsetsize = arg1;
3471             uint32_t *target_grouplist;
3472             gid_t *grouplist;
3473             int i;
3474 
3475             grouplist = alloca(gidsetsize * sizeof(gid_t));
3476             target_grouplist = lock_user(arg2, gidsetsize * 4, 1);
3477             for(i = 0;i < gidsetsize; i++)
3478                 grouplist[i] = tswap32(target_grouplist[i]);
3479             unlock_user(target_grouplist, arg2, 0);
3480             ret = get_errno(setgroups(gidsetsize, grouplist));
3481         }
3482         break;
3483 #endif
3484 #ifdef TARGET_NR_fchown32
3485     case TARGET_NR_fchown32:
3486         ret = get_errno(fchown(arg1, arg2, arg3));
3487         break;
3488 #endif
3489 #ifdef TARGET_NR_setresuid32
3490     case TARGET_NR_setresuid32:
3491         ret = get_errno(setresuid(arg1, arg2, arg3));
3492         break;
3493 #endif
3494 #ifdef TARGET_NR_getresuid32
3495     case TARGET_NR_getresuid32:
3496         {
3497             uid_t ruid, euid, suid;
3498             ret = get_errno(getresuid(&ruid, &euid, &suid));
3499             if (!is_error(ret)) {
3500                 tput32(arg1, tswap32(ruid));
3501                 tput32(arg2, tswap32(euid));
3502                 tput32(arg3, tswap32(suid));
3503             }
3504         }
3505         break;
3506 #endif
3507 #ifdef TARGET_NR_setresgid32
3508     case TARGET_NR_setresgid32:
3509         ret = get_errno(setresgid(arg1, arg2, arg3));
3510         break;
3511 #endif
3512 #ifdef TARGET_NR_getresgid32
3513     case TARGET_NR_getresgid32:
3514         {
3515             gid_t rgid, egid, sgid;
3516             ret = get_errno(getresgid(&rgid, &egid, &sgid));
3517             if (!is_error(ret)) {
3518                 tput32(arg1, tswap32(rgid));
3519                 tput32(arg2, tswap32(egid));
3520                 tput32(arg3, tswap32(sgid));
3521             }
3522         }
3523         break;
3524 #endif
3525 #ifdef TARGET_NR_chown32
3526     case TARGET_NR_chown32:
3527         p = lock_user_string(arg1);
3528         ret = get_errno(chown(p, arg2, arg3));
3529         unlock_user(p, arg1, 0);
3530         break;
3531 #endif
3532 #ifdef TARGET_NR_setuid32
3533     case TARGET_NR_setuid32:
3534         ret = get_errno(setuid(arg1));
3535         break;
3536 #endif
3537 #ifdef TARGET_NR_setgid32
3538     case TARGET_NR_setgid32:
3539         ret = get_errno(setgid(arg1));
3540         break;
3541 #endif
3542 #ifdef TARGET_NR_setfsuid32
3543     case TARGET_NR_setfsuid32:
3544         ret = get_errno(setfsuid(arg1));
3545         break;
3546 #endif
3547 #ifdef TARGET_NR_setfsgid32
3548     case TARGET_NR_setfsgid32:
3549         ret = get_errno(setfsgid(arg1));
3550         break;
3551 #endif
3552 
3553     case TARGET_NR_pivot_root:
3554         goto unimplemented;
3555 #ifdef TARGET_NR_mincore
3556     case TARGET_NR_mincore:
3557         goto unimplemented;
3558 #endif
3559 #ifdef TARGET_NR_madvise
3560     case TARGET_NR_madvise:
3561         /* A straight passthrough may not be safe because qemu sometimes
3562            turns private flie-backed mappings into anonymous mappings.
3563            This will break MADV_DONTNEED.
3564            This is a hint, so ignoring and returning success is ok.  */
3565         ret = get_errno(0);
3566         break;
3567 #endif
3568 #if TARGET_LONG_BITS == 32
3569     case TARGET_NR_fcntl64:
3570     {
3571 	struct flock64 fl;
3572 	struct target_flock64 *target_fl;
3573 #ifdef TARGET_ARM
3574 	struct target_eabi_flock64 *target_efl;
3575 #endif
3576 
3577         switch(arg2) {
3578         case F_GETLK64:
3579             ret = get_errno(fcntl(arg1, arg2, &fl));
3580 	    if (ret == 0) {
3581 #ifdef TARGET_ARM
3582                 if (((CPUARMState *)cpu_env)->eabi) {
3583                     lock_user_struct(target_efl, arg3, 0);
3584                     target_efl->l_type = tswap16(fl.l_type);
3585                     target_efl->l_whence = tswap16(fl.l_whence);
3586                     target_efl->l_start = tswap64(fl.l_start);
3587                     target_efl->l_len = tswap64(fl.l_len);
3588                     target_efl->l_pid = tswapl(fl.l_pid);
3589                     unlock_user_struct(target_efl, arg3, 1);
3590                 } else
3591 #endif
3592                 {
3593                     lock_user_struct(target_fl, arg3, 0);
3594                     target_fl->l_type = tswap16(fl.l_type);
3595                     target_fl->l_whence = tswap16(fl.l_whence);
3596                     target_fl->l_start = tswap64(fl.l_start);
3597                     target_fl->l_len = tswap64(fl.l_len);
3598                     target_fl->l_pid = tswapl(fl.l_pid);
3599                     unlock_user_struct(target_fl, arg3, 1);
3600                 }
3601 	    }
3602 	    break;
3603 
3604         case F_SETLK64:
3605         case F_SETLKW64:
3606 #ifdef TARGET_ARM
3607             if (((CPUARMState *)cpu_env)->eabi) {
3608                 lock_user_struct(target_efl, arg3, 1);
3609                 fl.l_type = tswap16(target_efl->l_type);
3610                 fl.l_whence = tswap16(target_efl->l_whence);
3611                 fl.l_start = tswap64(target_efl->l_start);
3612                 fl.l_len = tswap64(target_efl->l_len);
3613                 fl.l_pid = tswapl(target_efl->l_pid);
3614                 unlock_user_struct(target_efl, arg3, 0);
3615             } else
3616 #endif
3617             {
3618                 lock_user_struct(target_fl, arg3, 1);
3619                 fl.l_type = tswap16(target_fl->l_type);
3620                 fl.l_whence = tswap16(target_fl->l_whence);
3621                 fl.l_start = tswap64(target_fl->l_start);
3622                 fl.l_len = tswap64(target_fl->l_len);
3623                 fl.l_pid = tswapl(target_fl->l_pid);
3624                 unlock_user_struct(target_fl, arg3, 0);
3625             }
3626             ret = get_errno(fcntl(arg1, arg2, &fl));
3627 	    break;
3628         default:
3629             ret = get_errno(do_fcntl(arg1, arg2, arg3));
3630             break;
3631         }
3632 	break;
3633     }
3634 #endif
3635 #ifdef TARGET_NR_security
3636     case TARGET_NR_security:
3637         goto unimplemented;
3638 #endif
3639 #ifdef TARGET_NR_getpagesize
3640     case TARGET_NR_getpagesize:
3641         ret = TARGET_PAGE_SIZE;
3642         break;
3643 #endif
3644     case TARGET_NR_gettid:
3645         ret = get_errno(gettid());
3646         break;
3647     case TARGET_NR_readahead:
3648         goto unimplemented;
3649 #ifdef TARGET_NR_setxattr
3650     case TARGET_NR_setxattr:
3651     case TARGET_NR_lsetxattr:
3652     case TARGET_NR_fsetxattr:
3653     case TARGET_NR_getxattr:
3654     case TARGET_NR_lgetxattr:
3655     case TARGET_NR_fgetxattr:
3656     case TARGET_NR_listxattr:
3657     case TARGET_NR_llistxattr:
3658     case TARGET_NR_flistxattr:
3659     case TARGET_NR_removexattr:
3660     case TARGET_NR_lremovexattr:
3661     case TARGET_NR_fremovexattr:
3662         goto unimplemented_nowarn;
3663 #endif
3664 #ifdef TARGET_NR_set_thread_area
3665     case TARGET_NR_set_thread_area:
3666     case TARGET_NR_get_thread_area:
3667         goto unimplemented_nowarn;
3668 #endif
3669     default:
3670     unimplemented:
3671         gemu_log("qemu: Unsupported syscall: %d\n", num);
3672 #if defined(TARGET_NR_setxattr) || defined(TARGET_NR_set_thread_area)
3673     unimplemented_nowarn:
3674 #endif
3675         ret = -ENOSYS;
3676         break;
3677     }
3678  fail:
3679 #ifdef DEBUG
3680     gemu_log(" = %ld\n", ret);
3681 #endif
3682     return ret;
3683 }
3684 
3685