1 /* 2 * Linux syscalls 3 * 4 * Copyright (c) 2003 Fabrice Bellard 5 * 6 * This program is free software; you can redistribute it and/or modify 7 * it under the terms of the GNU General Public License as published by 8 * the Free Software Foundation; either version 2 of the License, or 9 * (at your option) any later version. 10 * 11 * This program is distributed in the hope that it will be useful, 12 * but WITHOUT ANY WARRANTY; without even the implied warranty of 13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 14 * GNU General Public License for more details. 15 * 16 * You should have received a copy of the GNU General Public License 17 * along with this program; if not, write to the Free Software 18 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. 19 */ 20 #include <stdlib.h> 21 #include <stdio.h> 22 #include <stdarg.h> 23 #include <string.h> 24 #include <elf.h> 25 #include <endian.h> 26 #include <errno.h> 27 #include <unistd.h> 28 #include <fcntl.h> 29 #include <time.h> 30 #include <sys/types.h> 31 #include <sys/wait.h> 32 #include <sys/time.h> 33 #include <sys/stat.h> 34 #include <sys/mount.h> 35 #include <sys/resource.h> 36 #include <sys/mman.h> 37 #include <sys/swap.h> 38 #include <signal.h> 39 #include <sched.h> 40 #include <sys/socket.h> 41 #include <sys/uio.h> 42 #include <sys/poll.h> 43 #include <sys/times.h> 44 #include <sys/shm.h> 45 #include <sys/statfs.h> 46 #include <utime.h> 47 #include <sys/sysinfo.h> 48 //#include <sys/user.h> 49 #include <netinet/ip.h> 50 #include <netinet/tcp.h> 51 52 #define termios host_termios 53 #define winsize host_winsize 54 #define termio host_termio 55 #define sgttyb host_sgttyb /* same as target */ 56 #define tchars host_tchars /* same as target */ 57 #define ltchars host_ltchars /* same as target */ 58 59 #include <linux/termios.h> 60 #include <linux/unistd.h> 61 #include <linux/utsname.h> 62 #include <linux/cdrom.h> 63 #include <linux/hdreg.h> 64 #include <linux/soundcard.h> 65 #include <linux/dirent.h> 66 #include <linux/kd.h> 67 68 #include "qemu.h" 69 70 //#define DEBUG 71 72 #if defined(TARGET_I386) || defined(TARGET_ARM) || defined(TARGET_SPARC) 73 /* 16 bit uid wrappers emulation */ 74 #define USE_UID16 75 #endif 76 77 //#include <linux/msdos_fs.h> 78 #define VFAT_IOCTL_READDIR_BOTH _IOR('r', 1, struct dirent [2]) 79 #define VFAT_IOCTL_READDIR_SHORT _IOR('r', 2, struct dirent [2]) 80 81 82 #if defined(__powerpc__) 83 #undef __syscall_nr 84 #undef __sc_loadargs_0 85 #undef __sc_loadargs_1 86 #undef __sc_loadargs_2 87 #undef __sc_loadargs_3 88 #undef __sc_loadargs_4 89 #undef __sc_loadargs_5 90 #undef __sc_asm_input_0 91 #undef __sc_asm_input_1 92 #undef __sc_asm_input_2 93 #undef __sc_asm_input_3 94 #undef __sc_asm_input_4 95 #undef __sc_asm_input_5 96 #undef _syscall0 97 #undef _syscall1 98 #undef _syscall2 99 #undef _syscall3 100 #undef _syscall4 101 #undef _syscall5 102 103 /* need to redefine syscalls as Linux kernel defines are incorrect for 104 the clobber list */ 105 /* On powerpc a system call basically clobbers the same registers like a 106 * function call, with the exception of LR (which is needed for the 107 * "sc; bnslr" sequence) and CR (where only CR0.SO is clobbered to signal 108 * an error return status). 109 */ 110 111 #define __syscall_nr(nr, type, name, args...) \ 112 unsigned long __sc_ret, __sc_err; \ 113 { \ 114 register unsigned long __sc_0 __asm__ ("r0"); \ 115 register unsigned long __sc_3 __asm__ ("r3"); \ 116 register unsigned long __sc_4 __asm__ ("r4"); \ 117 register unsigned long __sc_5 __asm__ ("r5"); \ 118 register unsigned long __sc_6 __asm__ ("r6"); \ 119 register unsigned long __sc_7 __asm__ ("r7"); \ 120 \ 121 __sc_loadargs_##nr(name, args); \ 122 __asm__ __volatile__ \ 123 ("sc \n\t" \ 124 "mfcr %0 " \ 125 : "=&r" (__sc_0), \ 126 "=&r" (__sc_3), "=&r" (__sc_4), \ 127 "=&r" (__sc_5), "=&r" (__sc_6), \ 128 "=&r" (__sc_7) \ 129 : __sc_asm_input_##nr \ 130 : "cr0", "ctr", "memory", \ 131 "r8", "r9", "r10","r11", "r12"); \ 132 __sc_ret = __sc_3; \ 133 __sc_err = __sc_0; \ 134 } \ 135 if (__sc_err & 0x10000000) \ 136 { \ 137 errno = __sc_ret; \ 138 __sc_ret = -1; \ 139 } \ 140 return (type) __sc_ret 141 142 #define __sc_loadargs_0(name, dummy...) \ 143 __sc_0 = __NR_##name 144 #define __sc_loadargs_1(name, arg1) \ 145 __sc_loadargs_0(name); \ 146 __sc_3 = (unsigned long) (arg1) 147 #define __sc_loadargs_2(name, arg1, arg2) \ 148 __sc_loadargs_1(name, arg1); \ 149 __sc_4 = (unsigned long) (arg2) 150 #define __sc_loadargs_3(name, arg1, arg2, arg3) \ 151 __sc_loadargs_2(name, arg1, arg2); \ 152 __sc_5 = (unsigned long) (arg3) 153 #define __sc_loadargs_4(name, arg1, arg2, arg3, arg4) \ 154 __sc_loadargs_3(name, arg1, arg2, arg3); \ 155 __sc_6 = (unsigned long) (arg4) 156 #define __sc_loadargs_5(name, arg1, arg2, arg3, arg4, arg5) \ 157 __sc_loadargs_4(name, arg1, arg2, arg3, arg4); \ 158 __sc_7 = (unsigned long) (arg5) 159 160 #define __sc_asm_input_0 "0" (__sc_0) 161 #define __sc_asm_input_1 __sc_asm_input_0, "1" (__sc_3) 162 #define __sc_asm_input_2 __sc_asm_input_1, "2" (__sc_4) 163 #define __sc_asm_input_3 __sc_asm_input_2, "3" (__sc_5) 164 #define __sc_asm_input_4 __sc_asm_input_3, "4" (__sc_6) 165 #define __sc_asm_input_5 __sc_asm_input_4, "5" (__sc_7) 166 167 #define _syscall0(type,name) \ 168 type name(void) \ 169 { \ 170 __syscall_nr(0, type, name); \ 171 } 172 173 #define _syscall1(type,name,type1,arg1) \ 174 type name(type1 arg1) \ 175 { \ 176 __syscall_nr(1, type, name, arg1); \ 177 } 178 179 #define _syscall2(type,name,type1,arg1,type2,arg2) \ 180 type name(type1 arg1, type2 arg2) \ 181 { \ 182 __syscall_nr(2, type, name, arg1, arg2); \ 183 } 184 185 #define _syscall3(type,name,type1,arg1,type2,arg2,type3,arg3) \ 186 type name(type1 arg1, type2 arg2, type3 arg3) \ 187 { \ 188 __syscall_nr(3, type, name, arg1, arg2, arg3); \ 189 } 190 191 #define _syscall4(type,name,type1,arg1,type2,arg2,type3,arg3,type4,arg4) \ 192 type name(type1 arg1, type2 arg2, type3 arg3, type4 arg4) \ 193 { \ 194 __syscall_nr(4, type, name, arg1, arg2, arg3, arg4); \ 195 } 196 197 #define _syscall5(type,name,type1,arg1,type2,arg2,type3,arg3,type4,arg4,type5,arg5) \ 198 type name(type1 arg1, type2 arg2, type3 arg3, type4 arg4, type5 arg5) \ 199 { \ 200 __syscall_nr(5, type, name, arg1, arg2, arg3, arg4, arg5); \ 201 } 202 #endif 203 204 #define __NR_sys_uname __NR_uname 205 #define __NR_sys_getcwd1 __NR_getcwd 206 #define __NR_sys_getdents __NR_getdents 207 #define __NR_sys_getdents64 __NR_getdents64 208 #define __NR_sys_rt_sigqueueinfo __NR_rt_sigqueueinfo 209 210 #if defined(__alpha__) || defined (__ia64__) || defined(__x86_64__) 211 #define __NR__llseek __NR_lseek 212 #endif 213 214 #ifdef __NR_gettid 215 _syscall0(int, gettid) 216 #else 217 static int gettid(void) { 218 return -ENOSYS; 219 } 220 #endif 221 _syscall1(int,sys_uname,struct new_utsname *,buf) 222 _syscall2(int,sys_getcwd1,char *,buf,size_t,size) 223 _syscall3(int, sys_getdents, uint, fd, struct dirent *, dirp, uint, count); 224 _syscall3(int, sys_getdents64, uint, fd, struct dirent64 *, dirp, uint, count); 225 _syscall5(int, _llseek, uint, fd, ulong, hi, ulong, lo, 226 loff_t *, res, uint, wh); 227 _syscall3(int,sys_rt_sigqueueinfo,int,pid,int,sig,siginfo_t *,uinfo) 228 #ifdef __NR_exit_group 229 _syscall1(int,exit_group,int,error_code) 230 #endif 231 232 extern int personality(int); 233 extern int flock(int, int); 234 extern int setfsuid(int); 235 extern int setfsgid(int); 236 extern int setresuid(uid_t, uid_t, uid_t); 237 extern int getresuid(uid_t *, uid_t *, uid_t *); 238 extern int setresgid(gid_t, gid_t, gid_t); 239 extern int getresgid(gid_t *, gid_t *, gid_t *); 240 extern int setgroups(int, gid_t *); 241 242 static inline long get_errno(long ret) 243 { 244 if (ret == -1) 245 return -errno; 246 else 247 return ret; 248 } 249 250 static inline int is_error(long ret) 251 { 252 return (unsigned long)ret >= (unsigned long)(-4096); 253 } 254 255 static target_ulong target_brk; 256 static target_ulong target_original_brk; 257 258 void target_set_brk(target_ulong new_brk) 259 { 260 target_original_brk = target_brk = new_brk; 261 } 262 263 long do_brk(target_ulong new_brk) 264 { 265 target_ulong brk_page; 266 long mapped_addr; 267 int new_alloc_size; 268 269 if (!new_brk) 270 return target_brk; 271 if (new_brk < target_original_brk) 272 return -ENOMEM; 273 274 brk_page = HOST_PAGE_ALIGN(target_brk); 275 276 /* If the new brk is less than this, set it and we're done... */ 277 if (new_brk < brk_page) { 278 target_brk = new_brk; 279 return target_brk; 280 } 281 282 /* We need to allocate more memory after the brk... */ 283 new_alloc_size = HOST_PAGE_ALIGN(new_brk - brk_page + 1); 284 mapped_addr = get_errno(target_mmap(brk_page, new_alloc_size, 285 PROT_READ|PROT_WRITE, 286 MAP_ANON|MAP_FIXED|MAP_PRIVATE, 0, 0)); 287 if (is_error(mapped_addr)) { 288 return mapped_addr; 289 } else { 290 target_brk = new_brk; 291 return target_brk; 292 } 293 } 294 295 static inline fd_set *target_to_host_fds(fd_set *fds, 296 target_long *target_fds, int n) 297 { 298 #if !defined(BSWAP_NEEDED) && !defined(WORDS_BIGENDIAN) 299 return (fd_set *)target_fds; 300 #else 301 int i, b; 302 if (target_fds) { 303 FD_ZERO(fds); 304 for(i = 0;i < n; i++) { 305 b = (tswapl(target_fds[i / TARGET_LONG_BITS]) >> 306 (i & (TARGET_LONG_BITS - 1))) & 1; 307 if (b) 308 FD_SET(i, fds); 309 } 310 return fds; 311 } else { 312 return NULL; 313 } 314 #endif 315 } 316 317 static inline void host_to_target_fds(target_long *target_fds, 318 fd_set *fds, int n) 319 { 320 #if !defined(BSWAP_NEEDED) && !defined(WORDS_BIGENDIAN) 321 /* nothing to do */ 322 #else 323 int i, nw, j, k; 324 target_long v; 325 326 if (target_fds) { 327 nw = (n + TARGET_LONG_BITS - 1) / TARGET_LONG_BITS; 328 k = 0; 329 for(i = 0;i < nw; i++) { 330 v = 0; 331 for(j = 0; j < TARGET_LONG_BITS; j++) { 332 v |= ((FD_ISSET(k, fds) != 0) << j); 333 k++; 334 } 335 target_fds[i] = tswapl(v); 336 } 337 } 338 #endif 339 } 340 341 #if defined(__alpha__) 342 #define HOST_HZ 1024 343 #else 344 #define HOST_HZ 100 345 #endif 346 347 static inline long host_to_target_clock_t(long ticks) 348 { 349 #if HOST_HZ == TARGET_HZ 350 return ticks; 351 #else 352 return ((int64_t)ticks * TARGET_HZ) / HOST_HZ; 353 #endif 354 } 355 356 static inline void host_to_target_rusage(target_ulong target_addr, 357 const struct rusage *rusage) 358 { 359 struct target_rusage *target_rusage; 360 361 lock_user_struct(target_rusage, target_addr, 0); 362 target_rusage->ru_utime.tv_sec = tswapl(rusage->ru_utime.tv_sec); 363 target_rusage->ru_utime.tv_usec = tswapl(rusage->ru_utime.tv_usec); 364 target_rusage->ru_stime.tv_sec = tswapl(rusage->ru_stime.tv_sec); 365 target_rusage->ru_stime.tv_usec = tswapl(rusage->ru_stime.tv_usec); 366 target_rusage->ru_maxrss = tswapl(rusage->ru_maxrss); 367 target_rusage->ru_ixrss = tswapl(rusage->ru_ixrss); 368 target_rusage->ru_idrss = tswapl(rusage->ru_idrss); 369 target_rusage->ru_isrss = tswapl(rusage->ru_isrss); 370 target_rusage->ru_minflt = tswapl(rusage->ru_minflt); 371 target_rusage->ru_majflt = tswapl(rusage->ru_majflt); 372 target_rusage->ru_nswap = tswapl(rusage->ru_nswap); 373 target_rusage->ru_inblock = tswapl(rusage->ru_inblock); 374 target_rusage->ru_oublock = tswapl(rusage->ru_oublock); 375 target_rusage->ru_msgsnd = tswapl(rusage->ru_msgsnd); 376 target_rusage->ru_msgrcv = tswapl(rusage->ru_msgrcv); 377 target_rusage->ru_nsignals = tswapl(rusage->ru_nsignals); 378 target_rusage->ru_nvcsw = tswapl(rusage->ru_nvcsw); 379 target_rusage->ru_nivcsw = tswapl(rusage->ru_nivcsw); 380 unlock_user_struct(target_rusage, target_addr, 1); 381 } 382 383 static inline void target_to_host_timeval(struct timeval *tv, 384 target_ulong target_addr) 385 { 386 struct target_timeval *target_tv; 387 388 lock_user_struct(target_tv, target_addr, 1); 389 tv->tv_sec = tswapl(target_tv->tv_sec); 390 tv->tv_usec = tswapl(target_tv->tv_usec); 391 unlock_user_struct(target_tv, target_addr, 0); 392 } 393 394 static inline void host_to_target_timeval(target_ulong target_addr, 395 const struct timeval *tv) 396 { 397 struct target_timeval *target_tv; 398 399 lock_user_struct(target_tv, target_addr, 0); 400 target_tv->tv_sec = tswapl(tv->tv_sec); 401 target_tv->tv_usec = tswapl(tv->tv_usec); 402 unlock_user_struct(target_tv, target_addr, 1); 403 } 404 405 406 static long do_select(long n, 407 target_ulong rfd_p, target_ulong wfd_p, 408 target_ulong efd_p, target_ulong target_tv) 409 { 410 fd_set rfds, wfds, efds; 411 fd_set *rfds_ptr, *wfds_ptr, *efds_ptr; 412 target_long *target_rfds, *target_wfds, *target_efds; 413 struct timeval tv, *tv_ptr; 414 long ret; 415 int ok; 416 417 if (rfd_p) { 418 target_rfds = lock_user(rfd_p, sizeof(target_long) * n, 1); 419 rfds_ptr = target_to_host_fds(&rfds, target_rfds, n); 420 } else { 421 target_rfds = NULL; 422 rfds_ptr = NULL; 423 } 424 if (wfd_p) { 425 target_wfds = lock_user(wfd_p, sizeof(target_long) * n, 1); 426 wfds_ptr = target_to_host_fds(&wfds, target_wfds, n); 427 } else { 428 target_wfds = NULL; 429 wfds_ptr = NULL; 430 } 431 if (efd_p) { 432 target_efds = lock_user(efd_p, sizeof(target_long) * n, 1); 433 efds_ptr = target_to_host_fds(&efds, target_efds, n); 434 } else { 435 target_efds = NULL; 436 efds_ptr = NULL; 437 } 438 439 if (target_tv) { 440 target_to_host_timeval(&tv, target_tv); 441 tv_ptr = &tv; 442 } else { 443 tv_ptr = NULL; 444 } 445 ret = get_errno(select(n, rfds_ptr, wfds_ptr, efds_ptr, tv_ptr)); 446 ok = !is_error(ret); 447 448 if (ok) { 449 host_to_target_fds(target_rfds, rfds_ptr, n); 450 host_to_target_fds(target_wfds, wfds_ptr, n); 451 host_to_target_fds(target_efds, efds_ptr, n); 452 453 if (target_tv) { 454 host_to_target_timeval(target_tv, &tv); 455 } 456 } 457 if (target_rfds) 458 unlock_user(target_rfds, rfd_p, ok ? sizeof(target_long) * n : 0); 459 if (target_wfds) 460 unlock_user(target_wfds, wfd_p, ok ? sizeof(target_long) * n : 0); 461 if (target_efds) 462 unlock_user(target_efds, efd_p, ok ? sizeof(target_long) * n : 0); 463 464 return ret; 465 } 466 467 static inline void target_to_host_sockaddr(struct sockaddr *addr, 468 target_ulong target_addr, 469 socklen_t len) 470 { 471 struct target_sockaddr *target_saddr; 472 473 target_saddr = lock_user(target_addr, len, 1); 474 memcpy(addr, target_saddr, len); 475 addr->sa_family = tswap16(target_saddr->sa_family); 476 unlock_user(target_saddr, target_addr, 0); 477 } 478 479 static inline void host_to_target_sockaddr(target_ulong target_addr, 480 struct sockaddr *addr, 481 socklen_t len) 482 { 483 struct target_sockaddr *target_saddr; 484 485 target_saddr = lock_user(target_addr, len, 0); 486 memcpy(target_saddr, addr, len); 487 target_saddr->sa_family = tswap16(addr->sa_family); 488 unlock_user(target_saddr, target_addr, len); 489 } 490 491 /* ??? Should this also swap msgh->name? */ 492 static inline void target_to_host_cmsg(struct msghdr *msgh, 493 struct target_msghdr *target_msgh) 494 { 495 struct cmsghdr *cmsg = CMSG_FIRSTHDR(msgh); 496 struct target_cmsghdr *target_cmsg = TARGET_CMSG_FIRSTHDR(target_msgh); 497 socklen_t space = 0; 498 499 while (cmsg && target_cmsg) { 500 void *data = CMSG_DATA(cmsg); 501 void *target_data = TARGET_CMSG_DATA(target_cmsg); 502 503 int len = tswapl(target_cmsg->cmsg_len) 504 - TARGET_CMSG_ALIGN(sizeof (struct target_cmsghdr)); 505 506 space += CMSG_SPACE(len); 507 if (space > msgh->msg_controllen) { 508 space -= CMSG_SPACE(len); 509 gemu_log("Host cmsg overflow\n"); 510 break; 511 } 512 513 cmsg->cmsg_level = tswap32(target_cmsg->cmsg_level); 514 cmsg->cmsg_type = tswap32(target_cmsg->cmsg_type); 515 cmsg->cmsg_len = CMSG_LEN(len); 516 517 if (cmsg->cmsg_level != SOL_SOCKET || cmsg->cmsg_type != SCM_RIGHTS) { 518 gemu_log("Unsupported ancillary data: %d/%d\n", cmsg->cmsg_level, cmsg->cmsg_type); 519 memcpy(data, target_data, len); 520 } else { 521 int *fd = (int *)data; 522 int *target_fd = (int *)target_data; 523 int i, numfds = len / sizeof(int); 524 525 for (i = 0; i < numfds; i++) 526 fd[i] = tswap32(target_fd[i]); 527 } 528 529 cmsg = CMSG_NXTHDR(msgh, cmsg); 530 target_cmsg = TARGET_CMSG_NXTHDR(target_msgh, target_cmsg); 531 } 532 533 msgh->msg_controllen = space; 534 } 535 536 /* ??? Should this also swap msgh->name? */ 537 static inline void host_to_target_cmsg(struct target_msghdr *target_msgh, 538 struct msghdr *msgh) 539 { 540 struct cmsghdr *cmsg = CMSG_FIRSTHDR(msgh); 541 struct target_cmsghdr *target_cmsg = TARGET_CMSG_FIRSTHDR(target_msgh); 542 socklen_t space = 0; 543 544 while (cmsg && target_cmsg) { 545 void *data = CMSG_DATA(cmsg); 546 void *target_data = TARGET_CMSG_DATA(target_cmsg); 547 548 int len = cmsg->cmsg_len - CMSG_ALIGN(sizeof (struct cmsghdr)); 549 550 space += TARGET_CMSG_SPACE(len); 551 if (space > tswapl(target_msgh->msg_controllen)) { 552 space -= TARGET_CMSG_SPACE(len); 553 gemu_log("Target cmsg overflow\n"); 554 break; 555 } 556 557 target_cmsg->cmsg_level = tswap32(cmsg->cmsg_level); 558 target_cmsg->cmsg_type = tswap32(cmsg->cmsg_type); 559 target_cmsg->cmsg_len = tswapl(TARGET_CMSG_LEN(len)); 560 561 if (cmsg->cmsg_level != SOL_SOCKET || cmsg->cmsg_type != SCM_RIGHTS) { 562 gemu_log("Unsupported ancillary data: %d/%d\n", cmsg->cmsg_level, cmsg->cmsg_type); 563 memcpy(target_data, data, len); 564 } else { 565 int *fd = (int *)data; 566 int *target_fd = (int *)target_data; 567 int i, numfds = len / sizeof(int); 568 569 for (i = 0; i < numfds; i++) 570 target_fd[i] = tswap32(fd[i]); 571 } 572 573 cmsg = CMSG_NXTHDR(msgh, cmsg); 574 target_cmsg = TARGET_CMSG_NXTHDR(target_msgh, target_cmsg); 575 } 576 577 msgh->msg_controllen = tswapl(space); 578 } 579 580 static long do_setsockopt(int sockfd, int level, int optname, 581 target_ulong optval, socklen_t optlen) 582 { 583 int val, ret; 584 585 switch(level) { 586 case SOL_TCP: 587 /* TCP options all take an 'int' value. */ 588 if (optlen < sizeof(uint32_t)) 589 return -EINVAL; 590 591 val = tget32(optval); 592 ret = get_errno(setsockopt(sockfd, level, optname, &val, sizeof(val))); 593 break; 594 case SOL_IP: 595 switch(optname) { 596 case IP_TOS: 597 case IP_TTL: 598 case IP_HDRINCL: 599 case IP_ROUTER_ALERT: 600 case IP_RECVOPTS: 601 case IP_RETOPTS: 602 case IP_PKTINFO: 603 case IP_MTU_DISCOVER: 604 case IP_RECVERR: 605 case IP_RECVTOS: 606 #ifdef IP_FREEBIND 607 case IP_FREEBIND: 608 #endif 609 case IP_MULTICAST_TTL: 610 case IP_MULTICAST_LOOP: 611 val = 0; 612 if (optlen >= sizeof(uint32_t)) { 613 val = tget32(optval); 614 } else if (optlen >= 1) { 615 val = tget8(optval); 616 } 617 ret = get_errno(setsockopt(sockfd, level, optname, &val, sizeof(val))); 618 break; 619 default: 620 goto unimplemented; 621 } 622 break; 623 case SOL_SOCKET: 624 switch (optname) { 625 /* Options with 'int' argument. */ 626 case SO_DEBUG: 627 case SO_REUSEADDR: 628 case SO_TYPE: 629 case SO_ERROR: 630 case SO_DONTROUTE: 631 case SO_BROADCAST: 632 case SO_SNDBUF: 633 case SO_RCVBUF: 634 case SO_KEEPALIVE: 635 case SO_OOBINLINE: 636 case SO_NO_CHECK: 637 case SO_PRIORITY: 638 #ifdef SO_BSDCOMPAT 639 case SO_BSDCOMPAT: 640 #endif 641 case SO_PASSCRED: 642 case SO_TIMESTAMP: 643 case SO_RCVLOWAT: 644 case SO_RCVTIMEO: 645 case SO_SNDTIMEO: 646 if (optlen < sizeof(uint32_t)) 647 return -EINVAL; 648 649 val = tget32(optval); 650 ret = get_errno(setsockopt(sockfd, level, optname, &val, sizeof(val))); 651 break; 652 default: 653 goto unimplemented; 654 } 655 break; 656 default: 657 unimplemented: 658 gemu_log("Unsupported setsockopt level=%d optname=%d \n", level, optname); 659 ret = -ENOSYS; 660 } 661 return ret; 662 } 663 664 static long do_getsockopt(int sockfd, int level, int optname, 665 target_ulong optval, target_ulong optlen) 666 { 667 int len, lv, val, ret; 668 669 switch(level) { 670 case SOL_SOCKET: 671 switch (optname) { 672 case SO_LINGER: 673 case SO_RCVTIMEO: 674 case SO_SNDTIMEO: 675 case SO_PEERCRED: 676 case SO_PEERNAME: 677 /* These don't just return a single integer */ 678 goto unimplemented; 679 default: 680 goto int_case; 681 } 682 break; 683 case SOL_TCP: 684 /* TCP options all take an 'int' value. */ 685 int_case: 686 len = tget32(optlen); 687 if (len < 0) 688 return -EINVAL; 689 lv = sizeof(int); 690 ret = get_errno(getsockopt(sockfd, level, optname, &val, &lv)); 691 if (ret < 0) 692 return ret; 693 val = tswap32(val); 694 if (len > lv) 695 len = lv; 696 if (len == 4) 697 tput32(optval, val); 698 else 699 tput8(optval, val); 700 tput32(optlen, len); 701 break; 702 case SOL_IP: 703 switch(optname) { 704 case IP_TOS: 705 case IP_TTL: 706 case IP_HDRINCL: 707 case IP_ROUTER_ALERT: 708 case IP_RECVOPTS: 709 case IP_RETOPTS: 710 case IP_PKTINFO: 711 case IP_MTU_DISCOVER: 712 case IP_RECVERR: 713 case IP_RECVTOS: 714 #ifdef IP_FREEBIND 715 case IP_FREEBIND: 716 #endif 717 case IP_MULTICAST_TTL: 718 case IP_MULTICAST_LOOP: 719 len = tget32(optlen); 720 if (len < 0) 721 return -EINVAL; 722 lv = sizeof(int); 723 ret = get_errno(getsockopt(sockfd, level, optname, &val, &lv)); 724 if (ret < 0) 725 return ret; 726 if (len < sizeof(int) && len > 0 && val >= 0 && val < 255) { 727 len = 1; 728 tput32(optlen, len); 729 tput8(optval, val); 730 } else { 731 if (len > sizeof(int)) 732 len = sizeof(int); 733 tput32(optlen, len); 734 tput32(optval, val); 735 } 736 break; 737 default: 738 goto unimplemented; 739 } 740 break; 741 default: 742 unimplemented: 743 gemu_log("getsockopt level=%d optname=%d not yet supported\n", 744 level, optname); 745 ret = -ENOSYS; 746 break; 747 } 748 return ret; 749 } 750 751 static void lock_iovec(struct iovec *vec, target_ulong target_addr, 752 int count, int copy) 753 { 754 struct target_iovec *target_vec; 755 target_ulong base; 756 int i; 757 758 target_vec = lock_user(target_addr, count * sizeof(struct target_iovec), 1); 759 for(i = 0;i < count; i++) { 760 base = tswapl(target_vec[i].iov_base); 761 vec[i].iov_len = tswapl(target_vec[i].iov_len); 762 vec[i].iov_base = lock_user(base, vec[i].iov_len, copy); 763 } 764 unlock_user (target_vec, target_addr, 0); 765 } 766 767 static void unlock_iovec(struct iovec *vec, target_ulong target_addr, 768 int count, int copy) 769 { 770 struct target_iovec *target_vec; 771 target_ulong base; 772 int i; 773 774 target_vec = lock_user(target_addr, count * sizeof(struct target_iovec), 1); 775 for(i = 0;i < count; i++) { 776 base = tswapl(target_vec[i].iov_base); 777 unlock_user(vec[i].iov_base, base, copy ? vec[i].iov_len : 0); 778 } 779 unlock_user (target_vec, target_addr, 0); 780 } 781 782 static long do_socketcall(int num, target_ulong vptr) 783 { 784 long ret; 785 const int n = sizeof(target_ulong); 786 787 switch(num) { 788 case SOCKOP_socket: 789 { 790 int domain = tgetl(vptr); 791 int type = tgetl(vptr + n); 792 int protocol = tgetl(vptr + 2 * n); 793 794 ret = get_errno(socket(domain, type, protocol)); 795 } 796 break; 797 case SOCKOP_bind: 798 { 799 int sockfd = tgetl(vptr); 800 target_ulong target_addr = tgetl(vptr + n); 801 socklen_t addrlen = tgetl(vptr + 2 * n); 802 void *addr = alloca(addrlen); 803 804 target_to_host_sockaddr(addr, target_addr, addrlen); 805 ret = get_errno(bind(sockfd, addr, addrlen)); 806 } 807 break; 808 case SOCKOP_connect: 809 { 810 int sockfd = tgetl(vptr); 811 target_ulong target_addr = tgetl(vptr + n); 812 socklen_t addrlen = tgetl(vptr + 2 * n); 813 void *addr = alloca(addrlen); 814 815 target_to_host_sockaddr(addr, target_addr, addrlen); 816 ret = get_errno(connect(sockfd, addr, addrlen)); 817 } 818 break; 819 case SOCKOP_listen: 820 { 821 int sockfd = tgetl(vptr); 822 int backlog = tgetl(vptr + n); 823 824 ret = get_errno(listen(sockfd, backlog)); 825 } 826 break; 827 case SOCKOP_accept: 828 { 829 int sockfd = tgetl(vptr); 830 target_ulong target_addr = tgetl(vptr + n); 831 target_ulong target_addrlen = tgetl(vptr + 2 * n); 832 socklen_t addrlen = tget32(target_addrlen); 833 void *addr = alloca(addrlen); 834 835 ret = get_errno(accept(sockfd, addr, &addrlen)); 836 if (!is_error(ret)) { 837 host_to_target_sockaddr(target_addr, addr, addrlen); 838 tput32(target_addrlen, addrlen); 839 } 840 } 841 break; 842 case SOCKOP_getsockname: 843 { 844 int sockfd = tgetl(vptr); 845 target_ulong target_addr = tgetl(vptr + n); 846 target_ulong target_addrlen = tgetl(vptr + 2 * n); 847 socklen_t addrlen = tget32(target_addrlen); 848 void *addr = alloca(addrlen); 849 850 ret = get_errno(getsockname(sockfd, addr, &addrlen)); 851 if (!is_error(ret)) { 852 host_to_target_sockaddr(target_addr, addr, addrlen); 853 tput32(target_addrlen, addrlen); 854 } 855 } 856 break; 857 case SOCKOP_getpeername: 858 { 859 int sockfd = tgetl(vptr); 860 target_ulong target_addr = tgetl(vptr + n); 861 target_ulong target_addrlen = tgetl(vptr + 2 * n); 862 socklen_t addrlen = tget32(target_addrlen); 863 void *addr = alloca(addrlen); 864 865 ret = get_errno(getpeername(sockfd, addr, &addrlen)); 866 if (!is_error(ret)) { 867 host_to_target_sockaddr(target_addr, addr, addrlen); 868 tput32(target_addrlen, addrlen); 869 } 870 } 871 break; 872 case SOCKOP_socketpair: 873 { 874 int domain = tgetl(vptr); 875 int type = tgetl(vptr + n); 876 int protocol = tgetl(vptr + 2 * n); 877 target_ulong target_tab = tgetl(vptr + 3 * n); 878 int tab[2]; 879 880 ret = get_errno(socketpair(domain, type, protocol, tab)); 881 if (!is_error(ret)) { 882 tput32(target_tab, tab[0]); 883 tput32(target_tab + 4, tab[1]); 884 } 885 } 886 break; 887 case SOCKOP_send: 888 { 889 int sockfd = tgetl(vptr); 890 target_ulong msg = tgetl(vptr + n); 891 size_t len = tgetl(vptr + 2 * n); 892 int flags = tgetl(vptr + 3 * n); 893 void *host_msg; 894 895 host_msg = lock_user(msg, len, 1); 896 ret = get_errno(send(sockfd, host_msg, len, flags)); 897 unlock_user(host_msg, msg, 0); 898 } 899 break; 900 case SOCKOP_recv: 901 { 902 int sockfd = tgetl(vptr); 903 target_ulong msg = tgetl(vptr + n); 904 size_t len = tgetl(vptr + 2 * n); 905 int flags = tgetl(vptr + 3 * n); 906 void *host_msg; 907 908 host_msg = lock_user(msg, len, 0); 909 ret = get_errno(recv(sockfd, host_msg, len, flags)); 910 unlock_user(host_msg, msg, ret); 911 } 912 break; 913 case SOCKOP_sendto: 914 { 915 int sockfd = tgetl(vptr); 916 target_ulong msg = tgetl(vptr + n); 917 size_t len = tgetl(vptr + 2 * n); 918 int flags = tgetl(vptr + 3 * n); 919 target_ulong target_addr = tgetl(vptr + 4 * n); 920 socklen_t addrlen = tgetl(vptr + 5 * n); 921 void *addr = alloca(addrlen); 922 void *host_msg; 923 924 host_msg = lock_user(msg, len, 1); 925 target_to_host_sockaddr(addr, target_addr, addrlen); 926 ret = get_errno(sendto(sockfd, host_msg, len, flags, addr, addrlen)); 927 unlock_user(host_msg, msg, 0); 928 } 929 break; 930 case SOCKOP_recvfrom: 931 { 932 int sockfd = tgetl(vptr); 933 target_ulong msg = tgetl(vptr + n); 934 size_t len = tgetl(vptr + 2 * n); 935 int flags = tgetl(vptr + 3 * n); 936 target_ulong target_addr = tgetl(vptr + 4 * n); 937 target_ulong target_addrlen = tgetl(vptr + 5 * n); 938 socklen_t addrlen = tget32(target_addrlen); 939 void *addr = alloca(addrlen); 940 void *host_msg; 941 942 host_msg = lock_user(msg, len, 0); 943 ret = get_errno(recvfrom(sockfd, host_msg, len, flags, addr, &addrlen)); 944 if (!is_error(ret)) { 945 host_to_target_sockaddr(target_addr, addr, addrlen); 946 tput32(target_addrlen, addrlen); 947 unlock_user(host_msg, msg, len); 948 } else { 949 unlock_user(host_msg, msg, 0); 950 } 951 } 952 break; 953 case SOCKOP_shutdown: 954 { 955 int sockfd = tgetl(vptr); 956 int how = tgetl(vptr + n); 957 958 ret = get_errno(shutdown(sockfd, how)); 959 } 960 break; 961 case SOCKOP_sendmsg: 962 case SOCKOP_recvmsg: 963 { 964 int fd; 965 target_ulong target_msg; 966 struct target_msghdr *msgp; 967 struct msghdr msg; 968 int flags, count; 969 struct iovec *vec; 970 target_ulong target_vec; 971 int send = (num == SOCKOP_sendmsg); 972 973 target_msg = tgetl(vptr + n); 974 lock_user_struct(msgp, target_msg, 1); 975 if (msgp->msg_name) { 976 msg.msg_namelen = tswap32(msgp->msg_namelen); 977 msg.msg_name = alloca(msg.msg_namelen); 978 target_to_host_sockaddr(msg.msg_name, tswapl(msgp->msg_name), 979 msg.msg_namelen); 980 } else { 981 msg.msg_name = NULL; 982 msg.msg_namelen = 0; 983 } 984 msg.msg_controllen = 2 * tswapl(msgp->msg_controllen); 985 msg.msg_control = alloca(msg.msg_controllen); 986 msg.msg_flags = tswap32(msgp->msg_flags); 987 988 count = tswapl(msgp->msg_iovlen); 989 vec = alloca(count * sizeof(struct iovec)); 990 target_vec = tswapl(msgp->msg_iov); 991 lock_iovec(vec, target_vec, count, send); 992 msg.msg_iovlen = count; 993 msg.msg_iov = vec; 994 995 fd = tgetl(vptr); 996 flags = tgetl(vptr + 2 * n); 997 if (send) { 998 target_to_host_cmsg(&msg, msgp); 999 ret = get_errno(sendmsg(fd, &msg, flags)); 1000 } else { 1001 ret = get_errno(recvmsg(fd, &msg, flags)); 1002 if (!is_error(ret)) 1003 host_to_target_cmsg(msgp, &msg); 1004 } 1005 unlock_iovec(vec, target_vec, count, !send); 1006 } 1007 break; 1008 case SOCKOP_setsockopt: 1009 { 1010 int sockfd = tgetl(vptr); 1011 int level = tgetl(vptr + n); 1012 int optname = tgetl(vptr + 2 * n); 1013 target_ulong optval = tgetl(vptr + 3 * n); 1014 socklen_t optlen = tgetl(vptr + 4 * n); 1015 1016 ret = do_setsockopt(sockfd, level, optname, optval, optlen); 1017 } 1018 break; 1019 case SOCKOP_getsockopt: 1020 { 1021 int sockfd = tgetl(vptr); 1022 int level = tgetl(vptr + n); 1023 int optname = tgetl(vptr + 2 * n); 1024 target_ulong optval = tgetl(vptr + 3 * n); 1025 target_ulong poptlen = tgetl(vptr + 4 * n); 1026 1027 ret = do_getsockopt(sockfd, level, optname, optval, poptlen); 1028 } 1029 break; 1030 default: 1031 gemu_log("Unsupported socketcall: %d\n", num); 1032 ret = -ENOSYS; 1033 break; 1034 } 1035 return ret; 1036 } 1037 1038 1039 #define N_SHM_REGIONS 32 1040 1041 static struct shm_region { 1042 uint32_t start; 1043 uint32_t size; 1044 } shm_regions[N_SHM_REGIONS]; 1045 1046 /* ??? This only works with linear mappings. */ 1047 static long do_ipc(long call, long first, long second, long third, 1048 long ptr, long fifth) 1049 { 1050 int version; 1051 long ret = 0; 1052 unsigned long raddr; 1053 struct shmid_ds shm_info; 1054 int i; 1055 1056 version = call >> 16; 1057 call &= 0xffff; 1058 1059 switch (call) { 1060 case IPCOP_shmat: 1061 /* SHM_* flags are the same on all linux platforms */ 1062 ret = get_errno((long) shmat(first, (void *) ptr, second)); 1063 if (is_error(ret)) 1064 break; 1065 raddr = ret; 1066 /* find out the length of the shared memory segment */ 1067 1068 ret = get_errno(shmctl(first, IPC_STAT, &shm_info)); 1069 if (is_error(ret)) { 1070 /* can't get length, bail out */ 1071 shmdt((void *) raddr); 1072 break; 1073 } 1074 page_set_flags(raddr, raddr + shm_info.shm_segsz, 1075 PAGE_VALID | PAGE_READ | 1076 ((second & SHM_RDONLY)? 0: PAGE_WRITE)); 1077 for (i = 0; i < N_SHM_REGIONS; ++i) { 1078 if (shm_regions[i].start == 0) { 1079 shm_regions[i].start = raddr; 1080 shm_regions[i].size = shm_info.shm_segsz; 1081 break; 1082 } 1083 } 1084 if (put_user(raddr, (uint32_t *)third)) 1085 return -EFAULT; 1086 ret = 0; 1087 break; 1088 case IPCOP_shmdt: 1089 for (i = 0; i < N_SHM_REGIONS; ++i) { 1090 if (shm_regions[i].start == ptr) { 1091 shm_regions[i].start = 0; 1092 page_set_flags(ptr, shm_regions[i].size, 0); 1093 break; 1094 } 1095 } 1096 ret = get_errno(shmdt((void *) ptr)); 1097 break; 1098 1099 case IPCOP_shmget: 1100 /* IPC_* flag values are the same on all linux platforms */ 1101 ret = get_errno(shmget(first, second, third)); 1102 break; 1103 1104 /* IPC_* and SHM_* command values are the same on all linux platforms */ 1105 case IPCOP_shmctl: 1106 switch(second) { 1107 case IPC_RMID: 1108 case SHM_LOCK: 1109 case SHM_UNLOCK: 1110 ret = get_errno(shmctl(first, second, NULL)); 1111 break; 1112 default: 1113 goto unimplemented; 1114 } 1115 break; 1116 default: 1117 unimplemented: 1118 gemu_log("Unsupported ipc call: %ld (version %d)\n", call, version); 1119 ret = -ENOSYS; 1120 break; 1121 } 1122 return ret; 1123 } 1124 1125 /* kernel structure types definitions */ 1126 #define IFNAMSIZ 16 1127 1128 #define STRUCT(name, list...) STRUCT_ ## name, 1129 #define STRUCT_SPECIAL(name) STRUCT_ ## name, 1130 enum { 1131 #include "syscall_types.h" 1132 }; 1133 #undef STRUCT 1134 #undef STRUCT_SPECIAL 1135 1136 #define STRUCT(name, list...) const argtype struct_ ## name ## _def[] = { list, TYPE_NULL }; 1137 #define STRUCT_SPECIAL(name) 1138 #include "syscall_types.h" 1139 #undef STRUCT 1140 #undef STRUCT_SPECIAL 1141 1142 typedef struct IOCTLEntry { 1143 unsigned int target_cmd; 1144 unsigned int host_cmd; 1145 const char *name; 1146 int access; 1147 const argtype arg_type[5]; 1148 } IOCTLEntry; 1149 1150 #define IOC_R 0x0001 1151 #define IOC_W 0x0002 1152 #define IOC_RW (IOC_R | IOC_W) 1153 1154 #define MAX_STRUCT_SIZE 4096 1155 1156 IOCTLEntry ioctl_entries[] = { 1157 #define IOCTL(cmd, access, types...) \ 1158 { TARGET_ ## cmd, cmd, #cmd, access, { types } }, 1159 #include "ioctls.h" 1160 { 0, 0, }, 1161 }; 1162 1163 /* ??? Implement proper locking for ioctls. */ 1164 static long do_ioctl(long fd, long cmd, long arg) 1165 { 1166 const IOCTLEntry *ie; 1167 const argtype *arg_type; 1168 long ret; 1169 uint8_t buf_temp[MAX_STRUCT_SIZE]; 1170 int target_size; 1171 void *argptr; 1172 1173 ie = ioctl_entries; 1174 for(;;) { 1175 if (ie->target_cmd == 0) { 1176 gemu_log("Unsupported ioctl: cmd=0x%04lx\n", cmd); 1177 return -ENOSYS; 1178 } 1179 if (ie->target_cmd == cmd) 1180 break; 1181 ie++; 1182 } 1183 arg_type = ie->arg_type; 1184 #if defined(DEBUG) 1185 gemu_log("ioctl: cmd=0x%04lx (%s)\n", cmd, ie->name); 1186 #endif 1187 switch(arg_type[0]) { 1188 case TYPE_NULL: 1189 /* no argument */ 1190 ret = get_errno(ioctl(fd, ie->host_cmd)); 1191 break; 1192 case TYPE_PTRVOID: 1193 case TYPE_INT: 1194 /* int argment */ 1195 ret = get_errno(ioctl(fd, ie->host_cmd, arg)); 1196 break; 1197 case TYPE_PTR: 1198 arg_type++; 1199 target_size = thunk_type_size(arg_type, 0); 1200 switch(ie->access) { 1201 case IOC_R: 1202 ret = get_errno(ioctl(fd, ie->host_cmd, buf_temp)); 1203 if (!is_error(ret)) { 1204 argptr = lock_user(arg, target_size, 0); 1205 thunk_convert(argptr, buf_temp, arg_type, THUNK_TARGET); 1206 unlock_user(argptr, arg, target_size); 1207 } 1208 break; 1209 case IOC_W: 1210 argptr = lock_user(arg, target_size, 1); 1211 thunk_convert(buf_temp, argptr, arg_type, THUNK_HOST); 1212 unlock_user(argptr, arg, 0); 1213 ret = get_errno(ioctl(fd, ie->host_cmd, buf_temp)); 1214 break; 1215 default: 1216 case IOC_RW: 1217 argptr = lock_user(arg, target_size, 1); 1218 thunk_convert(buf_temp, argptr, arg_type, THUNK_HOST); 1219 unlock_user(argptr, arg, 0); 1220 ret = get_errno(ioctl(fd, ie->host_cmd, buf_temp)); 1221 if (!is_error(ret)) { 1222 argptr = lock_user(arg, target_size, 0); 1223 thunk_convert(argptr, buf_temp, arg_type, THUNK_TARGET); 1224 unlock_user(argptr, arg, target_size); 1225 } 1226 break; 1227 } 1228 break; 1229 default: 1230 gemu_log("Unsupported ioctl type: cmd=0x%04lx type=%d\n", cmd, arg_type[0]); 1231 ret = -ENOSYS; 1232 break; 1233 } 1234 return ret; 1235 } 1236 1237 bitmask_transtbl iflag_tbl[] = { 1238 { TARGET_IGNBRK, TARGET_IGNBRK, IGNBRK, IGNBRK }, 1239 { TARGET_BRKINT, TARGET_BRKINT, BRKINT, BRKINT }, 1240 { TARGET_IGNPAR, TARGET_IGNPAR, IGNPAR, IGNPAR }, 1241 { TARGET_PARMRK, TARGET_PARMRK, PARMRK, PARMRK }, 1242 { TARGET_INPCK, TARGET_INPCK, INPCK, INPCK }, 1243 { TARGET_ISTRIP, TARGET_ISTRIP, ISTRIP, ISTRIP }, 1244 { TARGET_INLCR, TARGET_INLCR, INLCR, INLCR }, 1245 { TARGET_IGNCR, TARGET_IGNCR, IGNCR, IGNCR }, 1246 { TARGET_ICRNL, TARGET_ICRNL, ICRNL, ICRNL }, 1247 { TARGET_IUCLC, TARGET_IUCLC, IUCLC, IUCLC }, 1248 { TARGET_IXON, TARGET_IXON, IXON, IXON }, 1249 { TARGET_IXANY, TARGET_IXANY, IXANY, IXANY }, 1250 { TARGET_IXOFF, TARGET_IXOFF, IXOFF, IXOFF }, 1251 { TARGET_IMAXBEL, TARGET_IMAXBEL, IMAXBEL, IMAXBEL }, 1252 { 0, 0, 0, 0 } 1253 }; 1254 1255 bitmask_transtbl oflag_tbl[] = { 1256 { TARGET_OPOST, TARGET_OPOST, OPOST, OPOST }, 1257 { TARGET_OLCUC, TARGET_OLCUC, OLCUC, OLCUC }, 1258 { TARGET_ONLCR, TARGET_ONLCR, ONLCR, ONLCR }, 1259 { TARGET_OCRNL, TARGET_OCRNL, OCRNL, OCRNL }, 1260 { TARGET_ONOCR, TARGET_ONOCR, ONOCR, ONOCR }, 1261 { TARGET_ONLRET, TARGET_ONLRET, ONLRET, ONLRET }, 1262 { TARGET_OFILL, TARGET_OFILL, OFILL, OFILL }, 1263 { TARGET_OFDEL, TARGET_OFDEL, OFDEL, OFDEL }, 1264 { TARGET_NLDLY, TARGET_NL0, NLDLY, NL0 }, 1265 { TARGET_NLDLY, TARGET_NL1, NLDLY, NL1 }, 1266 { TARGET_CRDLY, TARGET_CR0, CRDLY, CR0 }, 1267 { TARGET_CRDLY, TARGET_CR1, CRDLY, CR1 }, 1268 { TARGET_CRDLY, TARGET_CR2, CRDLY, CR2 }, 1269 { TARGET_CRDLY, TARGET_CR3, CRDLY, CR3 }, 1270 { TARGET_TABDLY, TARGET_TAB0, TABDLY, TAB0 }, 1271 { TARGET_TABDLY, TARGET_TAB1, TABDLY, TAB1 }, 1272 { TARGET_TABDLY, TARGET_TAB2, TABDLY, TAB2 }, 1273 { TARGET_TABDLY, TARGET_TAB3, TABDLY, TAB3 }, 1274 { TARGET_BSDLY, TARGET_BS0, BSDLY, BS0 }, 1275 { TARGET_BSDLY, TARGET_BS1, BSDLY, BS1 }, 1276 { TARGET_VTDLY, TARGET_VT0, VTDLY, VT0 }, 1277 { TARGET_VTDLY, TARGET_VT1, VTDLY, VT1 }, 1278 { TARGET_FFDLY, TARGET_FF0, FFDLY, FF0 }, 1279 { TARGET_FFDLY, TARGET_FF1, FFDLY, FF1 }, 1280 { 0, 0, 0, 0 } 1281 }; 1282 1283 bitmask_transtbl cflag_tbl[] = { 1284 { TARGET_CBAUD, TARGET_B0, CBAUD, B0 }, 1285 { TARGET_CBAUD, TARGET_B50, CBAUD, B50 }, 1286 { TARGET_CBAUD, TARGET_B75, CBAUD, B75 }, 1287 { TARGET_CBAUD, TARGET_B110, CBAUD, B110 }, 1288 { TARGET_CBAUD, TARGET_B134, CBAUD, B134 }, 1289 { TARGET_CBAUD, TARGET_B150, CBAUD, B150 }, 1290 { TARGET_CBAUD, TARGET_B200, CBAUD, B200 }, 1291 { TARGET_CBAUD, TARGET_B300, CBAUD, B300 }, 1292 { TARGET_CBAUD, TARGET_B600, CBAUD, B600 }, 1293 { TARGET_CBAUD, TARGET_B1200, CBAUD, B1200 }, 1294 { TARGET_CBAUD, TARGET_B1800, CBAUD, B1800 }, 1295 { TARGET_CBAUD, TARGET_B2400, CBAUD, B2400 }, 1296 { TARGET_CBAUD, TARGET_B4800, CBAUD, B4800 }, 1297 { TARGET_CBAUD, TARGET_B9600, CBAUD, B9600 }, 1298 { TARGET_CBAUD, TARGET_B19200, CBAUD, B19200 }, 1299 { TARGET_CBAUD, TARGET_B38400, CBAUD, B38400 }, 1300 { TARGET_CBAUD, TARGET_B57600, CBAUD, B57600 }, 1301 { TARGET_CBAUD, TARGET_B115200, CBAUD, B115200 }, 1302 { TARGET_CBAUD, TARGET_B230400, CBAUD, B230400 }, 1303 { TARGET_CBAUD, TARGET_B460800, CBAUD, B460800 }, 1304 { TARGET_CSIZE, TARGET_CS5, CSIZE, CS5 }, 1305 { TARGET_CSIZE, TARGET_CS6, CSIZE, CS6 }, 1306 { TARGET_CSIZE, TARGET_CS7, CSIZE, CS7 }, 1307 { TARGET_CSIZE, TARGET_CS8, CSIZE, CS8 }, 1308 { TARGET_CSTOPB, TARGET_CSTOPB, CSTOPB, CSTOPB }, 1309 { TARGET_CREAD, TARGET_CREAD, CREAD, CREAD }, 1310 { TARGET_PARENB, TARGET_PARENB, PARENB, PARENB }, 1311 { TARGET_PARODD, TARGET_PARODD, PARODD, PARODD }, 1312 { TARGET_HUPCL, TARGET_HUPCL, HUPCL, HUPCL }, 1313 { TARGET_CLOCAL, TARGET_CLOCAL, CLOCAL, CLOCAL }, 1314 { TARGET_CRTSCTS, TARGET_CRTSCTS, CRTSCTS, CRTSCTS }, 1315 { 0, 0, 0, 0 } 1316 }; 1317 1318 bitmask_transtbl lflag_tbl[] = { 1319 { TARGET_ISIG, TARGET_ISIG, ISIG, ISIG }, 1320 { TARGET_ICANON, TARGET_ICANON, ICANON, ICANON }, 1321 { TARGET_XCASE, TARGET_XCASE, XCASE, XCASE }, 1322 { TARGET_ECHO, TARGET_ECHO, ECHO, ECHO }, 1323 { TARGET_ECHOE, TARGET_ECHOE, ECHOE, ECHOE }, 1324 { TARGET_ECHOK, TARGET_ECHOK, ECHOK, ECHOK }, 1325 { TARGET_ECHONL, TARGET_ECHONL, ECHONL, ECHONL }, 1326 { TARGET_NOFLSH, TARGET_NOFLSH, NOFLSH, NOFLSH }, 1327 { TARGET_TOSTOP, TARGET_TOSTOP, TOSTOP, TOSTOP }, 1328 { TARGET_ECHOCTL, TARGET_ECHOCTL, ECHOCTL, ECHOCTL }, 1329 { TARGET_ECHOPRT, TARGET_ECHOPRT, ECHOPRT, ECHOPRT }, 1330 { TARGET_ECHOKE, TARGET_ECHOKE, ECHOKE, ECHOKE }, 1331 { TARGET_FLUSHO, TARGET_FLUSHO, FLUSHO, FLUSHO }, 1332 { TARGET_PENDIN, TARGET_PENDIN, PENDIN, PENDIN }, 1333 { TARGET_IEXTEN, TARGET_IEXTEN, IEXTEN, IEXTEN }, 1334 { 0, 0, 0, 0 } 1335 }; 1336 1337 static void target_to_host_termios (void *dst, const void *src) 1338 { 1339 struct host_termios *host = dst; 1340 const struct target_termios *target = src; 1341 1342 host->c_iflag = 1343 target_to_host_bitmask(tswap32(target->c_iflag), iflag_tbl); 1344 host->c_oflag = 1345 target_to_host_bitmask(tswap32(target->c_oflag), oflag_tbl); 1346 host->c_cflag = 1347 target_to_host_bitmask(tswap32(target->c_cflag), cflag_tbl); 1348 host->c_lflag = 1349 target_to_host_bitmask(tswap32(target->c_lflag), lflag_tbl); 1350 host->c_line = target->c_line; 1351 1352 host->c_cc[VINTR] = target->c_cc[TARGET_VINTR]; 1353 host->c_cc[VQUIT] = target->c_cc[TARGET_VQUIT]; 1354 host->c_cc[VERASE] = target->c_cc[TARGET_VERASE]; 1355 host->c_cc[VKILL] = target->c_cc[TARGET_VKILL]; 1356 host->c_cc[VEOF] = target->c_cc[TARGET_VEOF]; 1357 host->c_cc[VTIME] = target->c_cc[TARGET_VTIME]; 1358 host->c_cc[VMIN] = target->c_cc[TARGET_VMIN]; 1359 host->c_cc[VSWTC] = target->c_cc[TARGET_VSWTC]; 1360 host->c_cc[VSTART] = target->c_cc[TARGET_VSTART]; 1361 host->c_cc[VSTOP] = target->c_cc[TARGET_VSTOP]; 1362 host->c_cc[VSUSP] = target->c_cc[TARGET_VSUSP]; 1363 host->c_cc[VEOL] = target->c_cc[TARGET_VEOL]; 1364 host->c_cc[VREPRINT] = target->c_cc[TARGET_VREPRINT]; 1365 host->c_cc[VDISCARD] = target->c_cc[TARGET_VDISCARD]; 1366 host->c_cc[VWERASE] = target->c_cc[TARGET_VWERASE]; 1367 host->c_cc[VLNEXT] = target->c_cc[TARGET_VLNEXT]; 1368 host->c_cc[VEOL2] = target->c_cc[TARGET_VEOL2]; 1369 } 1370 1371 static void host_to_target_termios (void *dst, const void *src) 1372 { 1373 struct target_termios *target = dst; 1374 const struct host_termios *host = src; 1375 1376 target->c_iflag = 1377 tswap32(host_to_target_bitmask(host->c_iflag, iflag_tbl)); 1378 target->c_oflag = 1379 tswap32(host_to_target_bitmask(host->c_oflag, oflag_tbl)); 1380 target->c_cflag = 1381 tswap32(host_to_target_bitmask(host->c_cflag, cflag_tbl)); 1382 target->c_lflag = 1383 tswap32(host_to_target_bitmask(host->c_lflag, lflag_tbl)); 1384 target->c_line = host->c_line; 1385 1386 target->c_cc[TARGET_VINTR] = host->c_cc[VINTR]; 1387 target->c_cc[TARGET_VQUIT] = host->c_cc[VQUIT]; 1388 target->c_cc[TARGET_VERASE] = host->c_cc[VERASE]; 1389 target->c_cc[TARGET_VKILL] = host->c_cc[VKILL]; 1390 target->c_cc[TARGET_VEOF] = host->c_cc[VEOF]; 1391 target->c_cc[TARGET_VTIME] = host->c_cc[VTIME]; 1392 target->c_cc[TARGET_VMIN] = host->c_cc[VMIN]; 1393 target->c_cc[TARGET_VSWTC] = host->c_cc[VSWTC]; 1394 target->c_cc[TARGET_VSTART] = host->c_cc[VSTART]; 1395 target->c_cc[TARGET_VSTOP] = host->c_cc[VSTOP]; 1396 target->c_cc[TARGET_VSUSP] = host->c_cc[VSUSP]; 1397 target->c_cc[TARGET_VEOL] = host->c_cc[VEOL]; 1398 target->c_cc[TARGET_VREPRINT] = host->c_cc[VREPRINT]; 1399 target->c_cc[TARGET_VDISCARD] = host->c_cc[VDISCARD]; 1400 target->c_cc[TARGET_VWERASE] = host->c_cc[VWERASE]; 1401 target->c_cc[TARGET_VLNEXT] = host->c_cc[VLNEXT]; 1402 target->c_cc[TARGET_VEOL2] = host->c_cc[VEOL2]; 1403 } 1404 1405 StructEntry struct_termios_def = { 1406 .convert = { host_to_target_termios, target_to_host_termios }, 1407 .size = { sizeof(struct target_termios), sizeof(struct host_termios) }, 1408 .align = { __alignof__(struct target_termios), __alignof__(struct host_termios) }, 1409 }; 1410 1411 static bitmask_transtbl mmap_flags_tbl[] = { 1412 { TARGET_MAP_SHARED, TARGET_MAP_SHARED, MAP_SHARED, MAP_SHARED }, 1413 { TARGET_MAP_PRIVATE, TARGET_MAP_PRIVATE, MAP_PRIVATE, MAP_PRIVATE }, 1414 { TARGET_MAP_FIXED, TARGET_MAP_FIXED, MAP_FIXED, MAP_FIXED }, 1415 { TARGET_MAP_ANONYMOUS, TARGET_MAP_ANONYMOUS, MAP_ANONYMOUS, MAP_ANONYMOUS }, 1416 { TARGET_MAP_GROWSDOWN, TARGET_MAP_GROWSDOWN, MAP_GROWSDOWN, MAP_GROWSDOWN }, 1417 { TARGET_MAP_DENYWRITE, TARGET_MAP_DENYWRITE, MAP_DENYWRITE, MAP_DENYWRITE }, 1418 { TARGET_MAP_EXECUTABLE, TARGET_MAP_EXECUTABLE, MAP_EXECUTABLE, MAP_EXECUTABLE }, 1419 { TARGET_MAP_LOCKED, TARGET_MAP_LOCKED, MAP_LOCKED, MAP_LOCKED }, 1420 { 0, 0, 0, 0 } 1421 }; 1422 1423 static bitmask_transtbl fcntl_flags_tbl[] = { 1424 { TARGET_O_ACCMODE, TARGET_O_WRONLY, O_ACCMODE, O_WRONLY, }, 1425 { TARGET_O_ACCMODE, TARGET_O_RDWR, O_ACCMODE, O_RDWR, }, 1426 { TARGET_O_CREAT, TARGET_O_CREAT, O_CREAT, O_CREAT, }, 1427 { TARGET_O_EXCL, TARGET_O_EXCL, O_EXCL, O_EXCL, }, 1428 { TARGET_O_NOCTTY, TARGET_O_NOCTTY, O_NOCTTY, O_NOCTTY, }, 1429 { TARGET_O_TRUNC, TARGET_O_TRUNC, O_TRUNC, O_TRUNC, }, 1430 { TARGET_O_APPEND, TARGET_O_APPEND, O_APPEND, O_APPEND, }, 1431 { TARGET_O_NONBLOCK, TARGET_O_NONBLOCK, O_NONBLOCK, O_NONBLOCK, }, 1432 { TARGET_O_SYNC, TARGET_O_SYNC, O_SYNC, O_SYNC, }, 1433 { TARGET_FASYNC, TARGET_FASYNC, FASYNC, FASYNC, }, 1434 { TARGET_O_DIRECTORY, TARGET_O_DIRECTORY, O_DIRECTORY, O_DIRECTORY, }, 1435 { TARGET_O_NOFOLLOW, TARGET_O_NOFOLLOW, O_NOFOLLOW, O_NOFOLLOW, }, 1436 { TARGET_O_LARGEFILE, TARGET_O_LARGEFILE, O_LARGEFILE, O_LARGEFILE, }, 1437 #if defined(O_DIRECT) 1438 { TARGET_O_DIRECT, TARGET_O_DIRECT, O_DIRECT, O_DIRECT, }, 1439 #endif 1440 { 0, 0, 0, 0 } 1441 }; 1442 1443 #if defined(TARGET_I386) 1444 1445 /* NOTE: there is really one LDT for all the threads */ 1446 uint8_t *ldt_table; 1447 1448 static int read_ldt(target_ulong ptr, unsigned long bytecount) 1449 { 1450 int size; 1451 void *p; 1452 1453 if (!ldt_table) 1454 return 0; 1455 size = TARGET_LDT_ENTRIES * TARGET_LDT_ENTRY_SIZE; 1456 if (size > bytecount) 1457 size = bytecount; 1458 p = lock_user(ptr, size, 0); 1459 /* ??? Shoudl this by byteswapped? */ 1460 memcpy(p, ldt_table, size); 1461 unlock_user(p, ptr, size); 1462 return size; 1463 } 1464 1465 /* XXX: add locking support */ 1466 static int write_ldt(CPUX86State *env, 1467 target_ulong ptr, unsigned long bytecount, int oldmode) 1468 { 1469 struct target_modify_ldt_ldt_s ldt_info; 1470 struct target_modify_ldt_ldt_s *target_ldt_info; 1471 int seg_32bit, contents, read_exec_only, limit_in_pages; 1472 int seg_not_present, useable; 1473 uint32_t *lp, entry_1, entry_2; 1474 1475 if (bytecount != sizeof(ldt_info)) 1476 return -EINVAL; 1477 lock_user_struct(target_ldt_info, ptr, 1); 1478 ldt_info.entry_number = tswap32(target_ldt_info->entry_number); 1479 ldt_info.base_addr = tswapl(target_ldt_info->base_addr); 1480 ldt_info.limit = tswap32(target_ldt_info->limit); 1481 ldt_info.flags = tswap32(target_ldt_info->flags); 1482 unlock_user_struct(target_ldt_info, ptr, 0); 1483 1484 if (ldt_info.entry_number >= TARGET_LDT_ENTRIES) 1485 return -EINVAL; 1486 seg_32bit = ldt_info.flags & 1; 1487 contents = (ldt_info.flags >> 1) & 3; 1488 read_exec_only = (ldt_info.flags >> 3) & 1; 1489 limit_in_pages = (ldt_info.flags >> 4) & 1; 1490 seg_not_present = (ldt_info.flags >> 5) & 1; 1491 useable = (ldt_info.flags >> 6) & 1; 1492 1493 if (contents == 3) { 1494 if (oldmode) 1495 return -EINVAL; 1496 if (seg_not_present == 0) 1497 return -EINVAL; 1498 } 1499 /* allocate the LDT */ 1500 if (!ldt_table) { 1501 ldt_table = malloc(TARGET_LDT_ENTRIES * TARGET_LDT_ENTRY_SIZE); 1502 if (!ldt_table) 1503 return -ENOMEM; 1504 memset(ldt_table, 0, TARGET_LDT_ENTRIES * TARGET_LDT_ENTRY_SIZE); 1505 env->ldt.base = h2g(ldt_table); 1506 env->ldt.limit = 0xffff; 1507 } 1508 1509 /* NOTE: same code as Linux kernel */ 1510 /* Allow LDTs to be cleared by the user. */ 1511 if (ldt_info.base_addr == 0 && ldt_info.limit == 0) { 1512 if (oldmode || 1513 (contents == 0 && 1514 read_exec_only == 1 && 1515 seg_32bit == 0 && 1516 limit_in_pages == 0 && 1517 seg_not_present == 1 && 1518 useable == 0 )) { 1519 entry_1 = 0; 1520 entry_2 = 0; 1521 goto install; 1522 } 1523 } 1524 1525 entry_1 = ((ldt_info.base_addr & 0x0000ffff) << 16) | 1526 (ldt_info.limit & 0x0ffff); 1527 entry_2 = (ldt_info.base_addr & 0xff000000) | 1528 ((ldt_info.base_addr & 0x00ff0000) >> 16) | 1529 (ldt_info.limit & 0xf0000) | 1530 ((read_exec_only ^ 1) << 9) | 1531 (contents << 10) | 1532 ((seg_not_present ^ 1) << 15) | 1533 (seg_32bit << 22) | 1534 (limit_in_pages << 23) | 1535 0x7000; 1536 if (!oldmode) 1537 entry_2 |= (useable << 20); 1538 1539 /* Install the new entry ... */ 1540 install: 1541 lp = (uint32_t *)(ldt_table + (ldt_info.entry_number << 3)); 1542 lp[0] = tswap32(entry_1); 1543 lp[1] = tswap32(entry_2); 1544 return 0; 1545 } 1546 1547 /* specific and weird i386 syscalls */ 1548 int do_modify_ldt(CPUX86State *env, int func, target_ulong ptr, unsigned long bytecount) 1549 { 1550 int ret = -ENOSYS; 1551 1552 switch (func) { 1553 case 0: 1554 ret = read_ldt(ptr, bytecount); 1555 break; 1556 case 1: 1557 ret = write_ldt(env, ptr, bytecount, 1); 1558 break; 1559 case 0x11: 1560 ret = write_ldt(env, ptr, bytecount, 0); 1561 break; 1562 } 1563 return ret; 1564 } 1565 1566 #endif /* defined(TARGET_I386) */ 1567 1568 /* this stack is the equivalent of the kernel stack associated with a 1569 thread/process */ 1570 #define NEW_STACK_SIZE 8192 1571 1572 static int clone_func(void *arg) 1573 { 1574 CPUState *env = arg; 1575 cpu_loop(env); 1576 /* never exits */ 1577 return 0; 1578 } 1579 1580 int do_fork(CPUState *env, unsigned int flags, unsigned long newsp) 1581 { 1582 int ret; 1583 TaskState *ts; 1584 uint8_t *new_stack; 1585 CPUState *new_env; 1586 1587 if (flags & CLONE_VM) { 1588 ts = malloc(sizeof(TaskState) + NEW_STACK_SIZE); 1589 memset(ts, 0, sizeof(TaskState)); 1590 new_stack = ts->stack; 1591 ts->used = 1; 1592 /* add in task state list */ 1593 ts->next = first_task_state; 1594 first_task_state = ts; 1595 /* we create a new CPU instance. */ 1596 new_env = cpu_init(); 1597 memcpy(new_env, env, sizeof(CPUState)); 1598 #if defined(TARGET_I386) 1599 if (!newsp) 1600 newsp = env->regs[R_ESP]; 1601 new_env->regs[R_ESP] = newsp; 1602 new_env->regs[R_EAX] = 0; 1603 #elif defined(TARGET_ARM) 1604 if (!newsp) 1605 newsp = env->regs[13]; 1606 new_env->regs[13] = newsp; 1607 new_env->regs[0] = 0; 1608 #elif defined(TARGET_SPARC) 1609 printf ("HELPME: %s:%d\n", __FILE__, __LINE__); 1610 #elif defined(TARGET_MIPS) 1611 printf ("HELPME: %s:%d\n", __FILE__, __LINE__); 1612 #elif defined(TARGET_PPC) 1613 if (!newsp) 1614 newsp = env->gpr[1]; 1615 new_env->gpr[1] = newsp; 1616 { 1617 int i; 1618 for (i = 7; i < 32; i++) 1619 new_env->gpr[i] = 0; 1620 } 1621 #elif defined(TARGET_SH4) 1622 if (!newsp) 1623 newsp = env->gregs[15]; 1624 new_env->gregs[15] = newsp; 1625 /* XXXXX */ 1626 #else 1627 #error unsupported target CPU 1628 #endif 1629 new_env->opaque = ts; 1630 #ifdef __ia64__ 1631 ret = __clone2(clone_func, new_stack + NEW_STACK_SIZE, flags, new_env); 1632 #else 1633 ret = clone(clone_func, new_stack + NEW_STACK_SIZE, flags, new_env); 1634 #endif 1635 } else { 1636 /* if no CLONE_VM, we consider it is a fork */ 1637 if ((flags & ~CSIGNAL) != 0) 1638 return -EINVAL; 1639 ret = fork(); 1640 } 1641 return ret; 1642 } 1643 1644 static long do_fcntl(int fd, int cmd, target_ulong arg) 1645 { 1646 struct flock fl; 1647 struct target_flock *target_fl; 1648 long ret; 1649 1650 switch(cmd) { 1651 case TARGET_F_GETLK: 1652 ret = fcntl(fd, cmd, &fl); 1653 if (ret == 0) { 1654 lock_user_struct(target_fl, arg, 0); 1655 target_fl->l_type = tswap16(fl.l_type); 1656 target_fl->l_whence = tswap16(fl.l_whence); 1657 target_fl->l_start = tswapl(fl.l_start); 1658 target_fl->l_len = tswapl(fl.l_len); 1659 target_fl->l_pid = tswapl(fl.l_pid); 1660 unlock_user_struct(target_fl, arg, 1); 1661 } 1662 break; 1663 1664 case TARGET_F_SETLK: 1665 case TARGET_F_SETLKW: 1666 lock_user_struct(target_fl, arg, 1); 1667 fl.l_type = tswap16(target_fl->l_type); 1668 fl.l_whence = tswap16(target_fl->l_whence); 1669 fl.l_start = tswapl(target_fl->l_start); 1670 fl.l_len = tswapl(target_fl->l_len); 1671 fl.l_pid = tswapl(target_fl->l_pid); 1672 unlock_user_struct(target_fl, arg, 0); 1673 ret = fcntl(fd, cmd, &fl); 1674 break; 1675 1676 case TARGET_F_GETLK64: 1677 case TARGET_F_SETLK64: 1678 case TARGET_F_SETLKW64: 1679 ret = -1; 1680 errno = EINVAL; 1681 break; 1682 1683 case F_GETFL: 1684 ret = fcntl(fd, cmd, arg); 1685 ret = host_to_target_bitmask(ret, fcntl_flags_tbl); 1686 break; 1687 1688 case F_SETFL: 1689 ret = fcntl(fd, cmd, target_to_host_bitmask(arg, fcntl_flags_tbl)); 1690 break; 1691 1692 default: 1693 ret = fcntl(fd, cmd, arg); 1694 break; 1695 } 1696 return ret; 1697 } 1698 1699 #ifdef USE_UID16 1700 1701 static inline int high2lowuid(int uid) 1702 { 1703 if (uid > 65535) 1704 return 65534; 1705 else 1706 return uid; 1707 } 1708 1709 static inline int high2lowgid(int gid) 1710 { 1711 if (gid > 65535) 1712 return 65534; 1713 else 1714 return gid; 1715 } 1716 1717 static inline int low2highuid(int uid) 1718 { 1719 if ((int16_t)uid == -1) 1720 return -1; 1721 else 1722 return uid; 1723 } 1724 1725 static inline int low2highgid(int gid) 1726 { 1727 if ((int16_t)gid == -1) 1728 return -1; 1729 else 1730 return gid; 1731 } 1732 1733 #endif /* USE_UID16 */ 1734 1735 void syscall_init(void) 1736 { 1737 IOCTLEntry *ie; 1738 const argtype *arg_type; 1739 int size; 1740 1741 #define STRUCT(name, list...) thunk_register_struct(STRUCT_ ## name, #name, struct_ ## name ## _def); 1742 #define STRUCT_SPECIAL(name) thunk_register_struct_direct(STRUCT_ ## name, #name, &struct_ ## name ## _def); 1743 #include "syscall_types.h" 1744 #undef STRUCT 1745 #undef STRUCT_SPECIAL 1746 1747 /* we patch the ioctl size if necessary. We rely on the fact that 1748 no ioctl has all the bits at '1' in the size field */ 1749 ie = ioctl_entries; 1750 while (ie->target_cmd != 0) { 1751 if (((ie->target_cmd >> TARGET_IOC_SIZESHIFT) & TARGET_IOC_SIZEMASK) == 1752 TARGET_IOC_SIZEMASK) { 1753 arg_type = ie->arg_type; 1754 if (arg_type[0] != TYPE_PTR) { 1755 fprintf(stderr, "cannot patch size for ioctl 0x%x\n", 1756 ie->target_cmd); 1757 exit(1); 1758 } 1759 arg_type++; 1760 size = thunk_type_size(arg_type, 0); 1761 ie->target_cmd = (ie->target_cmd & 1762 ~(TARGET_IOC_SIZEMASK << TARGET_IOC_SIZESHIFT)) | 1763 (size << TARGET_IOC_SIZESHIFT); 1764 } 1765 /* automatic consistency check if same arch */ 1766 #if defined(__i386__) && defined(TARGET_I386) 1767 if (ie->target_cmd != ie->host_cmd) { 1768 fprintf(stderr, "ERROR: ioctl: target=0x%x host=0x%x\n", 1769 ie->target_cmd, ie->host_cmd); 1770 } 1771 #endif 1772 ie++; 1773 } 1774 } 1775 1776 static inline uint64_t target_offset64(uint32_t word0, uint32_t word1) 1777 { 1778 #ifdef TARGET_WORDS_BIG_ENDIAN 1779 return ((uint64_t)word0 << 32) | word1; 1780 #else 1781 return ((uint64_t)word1 << 32) | word0; 1782 #endif 1783 } 1784 1785 #ifdef TARGET_NR_truncate64 1786 static inline long target_truncate64(void *cpu_env, const char *arg1, 1787 long arg2, long arg3, long arg4) 1788 { 1789 #ifdef TARGET_ARM 1790 if (((CPUARMState *)cpu_env)->eabi) 1791 { 1792 arg2 = arg3; 1793 arg3 = arg4; 1794 } 1795 #endif 1796 return get_errno(truncate64(arg1, target_offset64(arg2, arg3))); 1797 } 1798 #endif 1799 1800 #ifdef TARGET_NR_ftruncate64 1801 static inline long target_ftruncate64(void *cpu_env, long arg1, long arg2, 1802 long arg3, long arg4) 1803 { 1804 #ifdef TARGET_ARM 1805 if (((CPUARMState *)cpu_env)->eabi) 1806 { 1807 arg2 = arg3; 1808 arg3 = arg4; 1809 } 1810 #endif 1811 return get_errno(ftruncate64(arg1, target_offset64(arg2, arg3))); 1812 } 1813 #endif 1814 1815 static inline void target_to_host_timespec(struct timespec *host_ts, 1816 target_ulong target_addr) 1817 { 1818 struct target_timespec *target_ts; 1819 1820 lock_user_struct(target_ts, target_addr, 1); 1821 host_ts->tv_sec = tswapl(target_ts->tv_sec); 1822 host_ts->tv_nsec = tswapl(target_ts->tv_nsec); 1823 unlock_user_struct(target_ts, target_addr, 0); 1824 } 1825 1826 static inline void host_to_target_timespec(target_ulong target_addr, 1827 struct timespec *host_ts) 1828 { 1829 struct target_timespec *target_ts; 1830 1831 lock_user_struct(target_ts, target_addr, 0); 1832 target_ts->tv_sec = tswapl(host_ts->tv_sec); 1833 target_ts->tv_nsec = tswapl(host_ts->tv_nsec); 1834 unlock_user_struct(target_ts, target_addr, 1); 1835 } 1836 1837 long do_syscall(void *cpu_env, int num, long arg1, long arg2, long arg3, 1838 long arg4, long arg5, long arg6) 1839 { 1840 long ret; 1841 struct stat st; 1842 struct statfs stfs; 1843 void *p; 1844 1845 #ifdef DEBUG 1846 gemu_log("syscall %d", num); 1847 #endif 1848 switch(num) { 1849 case TARGET_NR_exit: 1850 #ifdef HAVE_GPROF 1851 _mcleanup(); 1852 #endif 1853 gdb_exit(cpu_env, arg1); 1854 /* XXX: should free thread stack and CPU env */ 1855 _exit(arg1); 1856 ret = 0; /* avoid warning */ 1857 break; 1858 case TARGET_NR_read: 1859 page_unprotect_range(arg2, arg3); 1860 p = lock_user(arg2, arg3, 0); 1861 ret = get_errno(read(arg1, p, arg3)); 1862 unlock_user(p, arg2, ret); 1863 break; 1864 case TARGET_NR_write: 1865 p = lock_user(arg2, arg3, 1); 1866 ret = get_errno(write(arg1, p, arg3)); 1867 unlock_user(p, arg2, 0); 1868 break; 1869 case TARGET_NR_open: 1870 p = lock_user_string(arg1); 1871 ret = get_errno(open(path(p), 1872 target_to_host_bitmask(arg2, fcntl_flags_tbl), 1873 arg3)); 1874 unlock_user(p, arg1, 0); 1875 break; 1876 case TARGET_NR_close: 1877 ret = get_errno(close(arg1)); 1878 break; 1879 case TARGET_NR_brk: 1880 ret = do_brk(arg1); 1881 break; 1882 case TARGET_NR_fork: 1883 ret = get_errno(do_fork(cpu_env, SIGCHLD, 0)); 1884 break; 1885 case TARGET_NR_waitpid: 1886 { 1887 int status; 1888 ret = get_errno(waitpid(arg1, &status, arg3)); 1889 if (!is_error(ret) && arg2) 1890 tput32(arg2, status); 1891 } 1892 break; 1893 case TARGET_NR_creat: 1894 p = lock_user_string(arg1); 1895 ret = get_errno(creat(p, arg2)); 1896 unlock_user(p, arg1, 0); 1897 break; 1898 case TARGET_NR_link: 1899 { 1900 void * p2; 1901 p = lock_user_string(arg1); 1902 p2 = lock_user_string(arg2); 1903 ret = get_errno(link(p, p2)); 1904 unlock_user(p2, arg2, 0); 1905 unlock_user(p, arg1, 0); 1906 } 1907 break; 1908 case TARGET_NR_unlink: 1909 p = lock_user_string(arg1); 1910 ret = get_errno(unlink(p)); 1911 unlock_user(p, arg1, 0); 1912 break; 1913 case TARGET_NR_execve: 1914 { 1915 char **argp, **envp; 1916 int argc, envc; 1917 target_ulong gp; 1918 target_ulong guest_argp; 1919 target_ulong guest_envp; 1920 target_ulong addr; 1921 char **q; 1922 1923 argc = 0; 1924 guest_argp = arg2; 1925 for (gp = guest_argp; tgetl(gp); gp++) 1926 argc++; 1927 envc = 0; 1928 guest_envp = arg3; 1929 for (gp = guest_envp; tgetl(gp); gp++) 1930 envc++; 1931 1932 argp = alloca((argc + 1) * sizeof(void *)); 1933 envp = alloca((envc + 1) * sizeof(void *)); 1934 1935 for (gp = guest_argp, q = argp; ; 1936 gp += sizeof(target_ulong), q++) { 1937 addr = tgetl(gp); 1938 if (!addr) 1939 break; 1940 *q = lock_user_string(addr); 1941 } 1942 *q = NULL; 1943 1944 for (gp = guest_envp, q = envp; ; 1945 gp += sizeof(target_ulong), q++) { 1946 addr = tgetl(gp); 1947 if (!addr) 1948 break; 1949 *q = lock_user_string(addr); 1950 } 1951 *q = NULL; 1952 1953 p = lock_user_string(arg1); 1954 ret = get_errno(execve(p, argp, envp)); 1955 unlock_user(p, arg1, 0); 1956 1957 for (gp = guest_argp, q = argp; *q; 1958 gp += sizeof(target_ulong), q++) { 1959 addr = tgetl(gp); 1960 unlock_user(*q, addr, 0); 1961 } 1962 for (gp = guest_envp, q = envp; *q; 1963 gp += sizeof(target_ulong), q++) { 1964 addr = tgetl(gp); 1965 unlock_user(*q, addr, 0); 1966 } 1967 } 1968 break; 1969 case TARGET_NR_chdir: 1970 p = lock_user_string(arg1); 1971 ret = get_errno(chdir(p)); 1972 unlock_user(p, arg1, 0); 1973 break; 1974 #ifdef TARGET_NR_time 1975 case TARGET_NR_time: 1976 { 1977 time_t host_time; 1978 ret = get_errno(time(&host_time)); 1979 if (!is_error(ret) && arg1) 1980 tputl(arg1, host_time); 1981 } 1982 break; 1983 #endif 1984 case TARGET_NR_mknod: 1985 p = lock_user_string(arg1); 1986 ret = get_errno(mknod(p, arg2, arg3)); 1987 unlock_user(p, arg1, 0); 1988 break; 1989 case TARGET_NR_chmod: 1990 p = lock_user_string(arg1); 1991 ret = get_errno(chmod(p, arg2)); 1992 unlock_user(p, arg1, 0); 1993 break; 1994 #ifdef TARGET_NR_break 1995 case TARGET_NR_break: 1996 goto unimplemented; 1997 #endif 1998 #ifdef TARGET_NR_oldstat 1999 case TARGET_NR_oldstat: 2000 goto unimplemented; 2001 #endif 2002 case TARGET_NR_lseek: 2003 ret = get_errno(lseek(arg1, arg2, arg3)); 2004 break; 2005 case TARGET_NR_getpid: 2006 ret = get_errno(getpid()); 2007 break; 2008 case TARGET_NR_mount: 2009 /* need to look at the data field */ 2010 goto unimplemented; 2011 case TARGET_NR_umount: 2012 p = lock_user_string(arg1); 2013 ret = get_errno(umount(p)); 2014 unlock_user(p, arg1, 0); 2015 break; 2016 case TARGET_NR_stime: 2017 { 2018 time_t host_time; 2019 host_time = tgetl(arg1); 2020 ret = get_errno(stime(&host_time)); 2021 } 2022 break; 2023 case TARGET_NR_ptrace: 2024 goto unimplemented; 2025 case TARGET_NR_alarm: 2026 ret = alarm(arg1); 2027 break; 2028 #ifdef TARGET_NR_oldfstat 2029 case TARGET_NR_oldfstat: 2030 goto unimplemented; 2031 #endif 2032 case TARGET_NR_pause: 2033 ret = get_errno(pause()); 2034 break; 2035 case TARGET_NR_utime: 2036 { 2037 struct utimbuf tbuf, *host_tbuf; 2038 struct target_utimbuf *target_tbuf; 2039 if (arg2) { 2040 lock_user_struct(target_tbuf, arg2, 1); 2041 tbuf.actime = tswapl(target_tbuf->actime); 2042 tbuf.modtime = tswapl(target_tbuf->modtime); 2043 unlock_user_struct(target_tbuf, arg2, 0); 2044 host_tbuf = &tbuf; 2045 } else { 2046 host_tbuf = NULL; 2047 } 2048 p = lock_user_string(arg1); 2049 ret = get_errno(utime(p, host_tbuf)); 2050 unlock_user(p, arg1, 0); 2051 } 2052 break; 2053 case TARGET_NR_utimes: 2054 { 2055 struct timeval *tvp, tv[2]; 2056 if (arg2) { 2057 target_to_host_timeval(&tv[0], arg2); 2058 target_to_host_timeval(&tv[1], 2059 arg2 + sizeof (struct target_timeval)); 2060 tvp = tv; 2061 } else { 2062 tvp = NULL; 2063 } 2064 p = lock_user_string(arg1); 2065 ret = get_errno(utimes(p, tvp)); 2066 unlock_user(p, arg1, 0); 2067 } 2068 break; 2069 #ifdef TARGET_NR_stty 2070 case TARGET_NR_stty: 2071 goto unimplemented; 2072 #endif 2073 #ifdef TARGET_NR_gtty 2074 case TARGET_NR_gtty: 2075 goto unimplemented; 2076 #endif 2077 case TARGET_NR_access: 2078 p = lock_user_string(arg1); 2079 ret = get_errno(access(p, arg2)); 2080 unlock_user(p, arg1, 0); 2081 break; 2082 case TARGET_NR_nice: 2083 ret = get_errno(nice(arg1)); 2084 break; 2085 #ifdef TARGET_NR_ftime 2086 case TARGET_NR_ftime: 2087 goto unimplemented; 2088 #endif 2089 case TARGET_NR_sync: 2090 sync(); 2091 ret = 0; 2092 break; 2093 case TARGET_NR_kill: 2094 ret = get_errno(kill(arg1, arg2)); 2095 break; 2096 case TARGET_NR_rename: 2097 { 2098 void *p2; 2099 p = lock_user_string(arg1); 2100 p2 = lock_user_string(arg2); 2101 ret = get_errno(rename(p, p2)); 2102 unlock_user(p2, arg2, 0); 2103 unlock_user(p, arg1, 0); 2104 } 2105 break; 2106 case TARGET_NR_mkdir: 2107 p = lock_user_string(arg1); 2108 ret = get_errno(mkdir(p, arg2)); 2109 unlock_user(p, arg1, 0); 2110 break; 2111 case TARGET_NR_rmdir: 2112 p = lock_user_string(arg1); 2113 ret = get_errno(rmdir(p)); 2114 unlock_user(p, arg1, 0); 2115 break; 2116 case TARGET_NR_dup: 2117 ret = get_errno(dup(arg1)); 2118 break; 2119 case TARGET_NR_pipe: 2120 { 2121 int host_pipe[2]; 2122 ret = get_errno(pipe(host_pipe)); 2123 if (!is_error(ret)) { 2124 tput32(arg1, host_pipe[0]); 2125 tput32(arg1 + 4, host_pipe[1]); 2126 } 2127 } 2128 break; 2129 case TARGET_NR_times: 2130 { 2131 struct target_tms *tmsp; 2132 struct tms tms; 2133 ret = get_errno(times(&tms)); 2134 if (arg1) { 2135 tmsp = lock_user(arg1, sizeof(struct target_tms), 0); 2136 tmsp->tms_utime = tswapl(host_to_target_clock_t(tms.tms_utime)); 2137 tmsp->tms_stime = tswapl(host_to_target_clock_t(tms.tms_stime)); 2138 tmsp->tms_cutime = tswapl(host_to_target_clock_t(tms.tms_cutime)); 2139 tmsp->tms_cstime = tswapl(host_to_target_clock_t(tms.tms_cstime)); 2140 } 2141 if (!is_error(ret)) 2142 ret = host_to_target_clock_t(ret); 2143 } 2144 break; 2145 #ifdef TARGET_NR_prof 2146 case TARGET_NR_prof: 2147 goto unimplemented; 2148 #endif 2149 case TARGET_NR_signal: 2150 goto unimplemented; 2151 2152 case TARGET_NR_acct: 2153 p = lock_user_string(arg1); 2154 ret = get_errno(acct(path(p))); 2155 unlock_user(p, arg1, 0); 2156 break; 2157 case TARGET_NR_umount2: 2158 p = lock_user_string(arg1); 2159 ret = get_errno(umount2(p, arg2)); 2160 unlock_user(p, arg1, 0); 2161 break; 2162 #ifdef TARGET_NR_lock 2163 case TARGET_NR_lock: 2164 goto unimplemented; 2165 #endif 2166 case TARGET_NR_ioctl: 2167 ret = do_ioctl(arg1, arg2, arg3); 2168 break; 2169 case TARGET_NR_fcntl: 2170 ret = get_errno(do_fcntl(arg1, arg2, arg3)); 2171 break; 2172 #ifdef TARGET_NR_mpx 2173 case TARGET_NR_mpx: 2174 goto unimplemented; 2175 #endif 2176 case TARGET_NR_setpgid: 2177 ret = get_errno(setpgid(arg1, arg2)); 2178 break; 2179 #ifdef TARGET_NR_ulimit 2180 case TARGET_NR_ulimit: 2181 goto unimplemented; 2182 #endif 2183 #ifdef TARGET_NR_oldolduname 2184 case TARGET_NR_oldolduname: 2185 goto unimplemented; 2186 #endif 2187 case TARGET_NR_umask: 2188 ret = get_errno(umask(arg1)); 2189 break; 2190 case TARGET_NR_chroot: 2191 p = lock_user_string(arg1); 2192 ret = get_errno(chroot(p)); 2193 unlock_user(p, arg1, 0); 2194 break; 2195 case TARGET_NR_ustat: 2196 goto unimplemented; 2197 case TARGET_NR_dup2: 2198 ret = get_errno(dup2(arg1, arg2)); 2199 break; 2200 case TARGET_NR_getppid: 2201 ret = get_errno(getppid()); 2202 break; 2203 case TARGET_NR_getpgrp: 2204 ret = get_errno(getpgrp()); 2205 break; 2206 case TARGET_NR_setsid: 2207 ret = get_errno(setsid()); 2208 break; 2209 case TARGET_NR_sigaction: 2210 { 2211 struct target_old_sigaction *old_act; 2212 struct target_sigaction act, oact, *pact; 2213 if (arg2) { 2214 lock_user_struct(old_act, arg2, 1); 2215 act._sa_handler = old_act->_sa_handler; 2216 target_siginitset(&act.sa_mask, old_act->sa_mask); 2217 act.sa_flags = old_act->sa_flags; 2218 act.sa_restorer = old_act->sa_restorer; 2219 unlock_user_struct(old_act, arg2, 0); 2220 pact = &act; 2221 } else { 2222 pact = NULL; 2223 } 2224 ret = get_errno(do_sigaction(arg1, pact, &oact)); 2225 if (!is_error(ret) && arg3) { 2226 lock_user_struct(old_act, arg3, 0); 2227 old_act->_sa_handler = oact._sa_handler; 2228 old_act->sa_mask = oact.sa_mask.sig[0]; 2229 old_act->sa_flags = oact.sa_flags; 2230 old_act->sa_restorer = oact.sa_restorer; 2231 unlock_user_struct(old_act, arg3, 1); 2232 } 2233 } 2234 break; 2235 case TARGET_NR_rt_sigaction: 2236 { 2237 struct target_sigaction *act; 2238 struct target_sigaction *oact; 2239 2240 if (arg2) 2241 lock_user_struct(act, arg2, 1); 2242 else 2243 act = NULL; 2244 if (arg3) 2245 lock_user_struct(oact, arg3, 0); 2246 else 2247 oact = NULL; 2248 ret = get_errno(do_sigaction(arg1, act, oact)); 2249 if (arg2) 2250 unlock_user_struct(act, arg2, 0); 2251 if (arg3) 2252 unlock_user_struct(oact, arg3, 1); 2253 } 2254 break; 2255 case TARGET_NR_sgetmask: 2256 { 2257 sigset_t cur_set; 2258 target_ulong target_set; 2259 sigprocmask(0, NULL, &cur_set); 2260 host_to_target_old_sigset(&target_set, &cur_set); 2261 ret = target_set; 2262 } 2263 break; 2264 case TARGET_NR_ssetmask: 2265 { 2266 sigset_t set, oset, cur_set; 2267 target_ulong target_set = arg1; 2268 sigprocmask(0, NULL, &cur_set); 2269 target_to_host_old_sigset(&set, &target_set); 2270 sigorset(&set, &set, &cur_set); 2271 sigprocmask(SIG_SETMASK, &set, &oset); 2272 host_to_target_old_sigset(&target_set, &oset); 2273 ret = target_set; 2274 } 2275 break; 2276 case TARGET_NR_sigprocmask: 2277 { 2278 int how = arg1; 2279 sigset_t set, oldset, *set_ptr; 2280 2281 if (arg2) { 2282 switch(how) { 2283 case TARGET_SIG_BLOCK: 2284 how = SIG_BLOCK; 2285 break; 2286 case TARGET_SIG_UNBLOCK: 2287 how = SIG_UNBLOCK; 2288 break; 2289 case TARGET_SIG_SETMASK: 2290 how = SIG_SETMASK; 2291 break; 2292 default: 2293 ret = -EINVAL; 2294 goto fail; 2295 } 2296 p = lock_user(arg2, sizeof(target_sigset_t), 1); 2297 target_to_host_old_sigset(&set, p); 2298 unlock_user(p, arg2, 0); 2299 set_ptr = &set; 2300 } else { 2301 how = 0; 2302 set_ptr = NULL; 2303 } 2304 ret = get_errno(sigprocmask(arg1, set_ptr, &oldset)); 2305 if (!is_error(ret) && arg3) { 2306 p = lock_user(arg3, sizeof(target_sigset_t), 0); 2307 host_to_target_old_sigset(p, &oldset); 2308 unlock_user(p, arg3, sizeof(target_sigset_t)); 2309 } 2310 } 2311 break; 2312 case TARGET_NR_rt_sigprocmask: 2313 { 2314 int how = arg1; 2315 sigset_t set, oldset, *set_ptr; 2316 2317 if (arg2) { 2318 switch(how) { 2319 case TARGET_SIG_BLOCK: 2320 how = SIG_BLOCK; 2321 break; 2322 case TARGET_SIG_UNBLOCK: 2323 how = SIG_UNBLOCK; 2324 break; 2325 case TARGET_SIG_SETMASK: 2326 how = SIG_SETMASK; 2327 break; 2328 default: 2329 ret = -EINVAL; 2330 goto fail; 2331 } 2332 p = lock_user(arg2, sizeof(target_sigset_t), 1); 2333 target_to_host_sigset(&set, p); 2334 unlock_user(p, arg2, 0); 2335 set_ptr = &set; 2336 } else { 2337 how = 0; 2338 set_ptr = NULL; 2339 } 2340 ret = get_errno(sigprocmask(how, set_ptr, &oldset)); 2341 if (!is_error(ret) && arg3) { 2342 p = lock_user(arg3, sizeof(target_sigset_t), 0); 2343 host_to_target_sigset(p, &oldset); 2344 unlock_user(p, arg3, sizeof(target_sigset_t)); 2345 } 2346 } 2347 break; 2348 case TARGET_NR_sigpending: 2349 { 2350 sigset_t set; 2351 ret = get_errno(sigpending(&set)); 2352 if (!is_error(ret)) { 2353 p = lock_user(arg1, sizeof(target_sigset_t), 0); 2354 host_to_target_old_sigset(p, &set); 2355 unlock_user(p, arg1, sizeof(target_sigset_t)); 2356 } 2357 } 2358 break; 2359 case TARGET_NR_rt_sigpending: 2360 { 2361 sigset_t set; 2362 ret = get_errno(sigpending(&set)); 2363 if (!is_error(ret)) { 2364 p = lock_user(arg1, sizeof(target_sigset_t), 0); 2365 host_to_target_sigset(p, &set); 2366 unlock_user(p, arg1, sizeof(target_sigset_t)); 2367 } 2368 } 2369 break; 2370 case TARGET_NR_sigsuspend: 2371 { 2372 sigset_t set; 2373 p = lock_user(arg1, sizeof(target_sigset_t), 1); 2374 target_to_host_old_sigset(&set, p); 2375 unlock_user(p, arg1, 0); 2376 ret = get_errno(sigsuspend(&set)); 2377 } 2378 break; 2379 case TARGET_NR_rt_sigsuspend: 2380 { 2381 sigset_t set; 2382 p = lock_user(arg1, sizeof(target_sigset_t), 1); 2383 target_to_host_sigset(&set, p); 2384 unlock_user(p, arg1, 0); 2385 ret = get_errno(sigsuspend(&set)); 2386 } 2387 break; 2388 case TARGET_NR_rt_sigtimedwait: 2389 { 2390 sigset_t set; 2391 struct timespec uts, *puts; 2392 siginfo_t uinfo; 2393 2394 p = lock_user(arg1, sizeof(target_sigset_t), 1); 2395 target_to_host_sigset(&set, p); 2396 unlock_user(p, arg1, 0); 2397 if (arg3) { 2398 puts = &uts; 2399 target_to_host_timespec(puts, arg3); 2400 } else { 2401 puts = NULL; 2402 } 2403 ret = get_errno(sigtimedwait(&set, &uinfo, puts)); 2404 if (!is_error(ret) && arg2) { 2405 p = lock_user(arg2, sizeof(target_sigset_t), 0); 2406 host_to_target_siginfo(p, &uinfo); 2407 unlock_user(p, arg2, sizeof(target_sigset_t)); 2408 } 2409 } 2410 break; 2411 case TARGET_NR_rt_sigqueueinfo: 2412 { 2413 siginfo_t uinfo; 2414 p = lock_user(arg3, sizeof(target_sigset_t), 1); 2415 target_to_host_siginfo(&uinfo, p); 2416 unlock_user(p, arg1, 0); 2417 ret = get_errno(sys_rt_sigqueueinfo(arg1, arg2, &uinfo)); 2418 } 2419 break; 2420 case TARGET_NR_sigreturn: 2421 /* NOTE: ret is eax, so not transcoding must be done */ 2422 ret = do_sigreturn(cpu_env); 2423 break; 2424 case TARGET_NR_rt_sigreturn: 2425 /* NOTE: ret is eax, so not transcoding must be done */ 2426 ret = do_rt_sigreturn(cpu_env); 2427 break; 2428 case TARGET_NR_sethostname: 2429 p = lock_user_string(arg1); 2430 ret = get_errno(sethostname(p, arg2)); 2431 unlock_user(p, arg1, 0); 2432 break; 2433 case TARGET_NR_setrlimit: 2434 { 2435 /* XXX: convert resource ? */ 2436 int resource = arg1; 2437 struct target_rlimit *target_rlim; 2438 struct rlimit rlim; 2439 lock_user_struct(target_rlim, arg2, 1); 2440 rlim.rlim_cur = tswapl(target_rlim->rlim_cur); 2441 rlim.rlim_max = tswapl(target_rlim->rlim_max); 2442 unlock_user_struct(target_rlim, arg2, 0); 2443 ret = get_errno(setrlimit(resource, &rlim)); 2444 } 2445 break; 2446 case TARGET_NR_getrlimit: 2447 { 2448 /* XXX: convert resource ? */ 2449 int resource = arg1; 2450 struct target_rlimit *target_rlim; 2451 struct rlimit rlim; 2452 2453 ret = get_errno(getrlimit(resource, &rlim)); 2454 if (!is_error(ret)) { 2455 lock_user_struct(target_rlim, arg2, 0); 2456 rlim.rlim_cur = tswapl(target_rlim->rlim_cur); 2457 rlim.rlim_max = tswapl(target_rlim->rlim_max); 2458 unlock_user_struct(target_rlim, arg2, 1); 2459 } 2460 } 2461 break; 2462 case TARGET_NR_getrusage: 2463 { 2464 struct rusage rusage; 2465 ret = get_errno(getrusage(arg1, &rusage)); 2466 if (!is_error(ret)) { 2467 host_to_target_rusage(arg2, &rusage); 2468 } 2469 } 2470 break; 2471 case TARGET_NR_gettimeofday: 2472 { 2473 struct timeval tv; 2474 ret = get_errno(gettimeofday(&tv, NULL)); 2475 if (!is_error(ret)) { 2476 host_to_target_timeval(arg1, &tv); 2477 } 2478 } 2479 break; 2480 case TARGET_NR_settimeofday: 2481 { 2482 struct timeval tv; 2483 target_to_host_timeval(&tv, arg1); 2484 ret = get_errno(settimeofday(&tv, NULL)); 2485 } 2486 break; 2487 #ifdef TARGET_NR_select 2488 case TARGET_NR_select: 2489 { 2490 struct target_sel_arg_struct *sel; 2491 target_ulong inp, outp, exp, tvp; 2492 long nsel; 2493 2494 lock_user_struct(sel, arg1, 1); 2495 nsel = tswapl(sel->n); 2496 inp = tswapl(sel->inp); 2497 outp = tswapl(sel->outp); 2498 exp = tswapl(sel->exp); 2499 tvp = tswapl(sel->tvp); 2500 unlock_user_struct(sel, arg1, 0); 2501 ret = do_select(nsel, inp, outp, exp, tvp); 2502 } 2503 break; 2504 #endif 2505 case TARGET_NR_symlink: 2506 { 2507 void *p2; 2508 p = lock_user_string(arg1); 2509 p2 = lock_user_string(arg2); 2510 ret = get_errno(symlink(p, p2)); 2511 unlock_user(p2, arg2, 0); 2512 unlock_user(p, arg1, 0); 2513 } 2514 break; 2515 #ifdef TARGET_NR_oldlstat 2516 case TARGET_NR_oldlstat: 2517 goto unimplemented; 2518 #endif 2519 case TARGET_NR_readlink: 2520 { 2521 void *p2; 2522 p = lock_user_string(arg1); 2523 p2 = lock_user(arg2, arg3, 0); 2524 ret = get_errno(readlink(path(p), p2, arg3)); 2525 unlock_user(p2, arg2, ret); 2526 unlock_user(p, arg1, 0); 2527 } 2528 break; 2529 case TARGET_NR_uselib: 2530 goto unimplemented; 2531 case TARGET_NR_swapon: 2532 p = lock_user_string(arg1); 2533 ret = get_errno(swapon(p, arg2)); 2534 unlock_user(p, arg1, 0); 2535 break; 2536 case TARGET_NR_reboot: 2537 goto unimplemented; 2538 case TARGET_NR_readdir: 2539 goto unimplemented; 2540 case TARGET_NR_mmap: 2541 #if defined(TARGET_I386) || defined(TARGET_ARM) 2542 { 2543 target_ulong *v; 2544 target_ulong v1, v2, v3, v4, v5, v6; 2545 v = lock_user(arg1, 6 * sizeof(target_ulong), 1); 2546 v1 = tswapl(v[0]); 2547 v2 = tswapl(v[1]); 2548 v3 = tswapl(v[2]); 2549 v4 = tswapl(v[3]); 2550 v5 = tswapl(v[4]); 2551 v6 = tswapl(v[5]); 2552 unlock_user(v, arg1, 0); 2553 ret = get_errno(target_mmap(v1, v2, v3, 2554 target_to_host_bitmask(v4, mmap_flags_tbl), 2555 v5, v6)); 2556 } 2557 #else 2558 ret = get_errno(target_mmap(arg1, arg2, arg3, 2559 target_to_host_bitmask(arg4, mmap_flags_tbl), 2560 arg5, 2561 arg6)); 2562 #endif 2563 break; 2564 #ifdef TARGET_NR_mmap2 2565 case TARGET_NR_mmap2: 2566 #if defined(TARGET_SPARC) 2567 #define MMAP_SHIFT 12 2568 #else 2569 #define MMAP_SHIFT TARGET_PAGE_BITS 2570 #endif 2571 ret = get_errno(target_mmap(arg1, arg2, arg3, 2572 target_to_host_bitmask(arg4, mmap_flags_tbl), 2573 arg5, 2574 arg6 << MMAP_SHIFT)); 2575 break; 2576 #endif 2577 case TARGET_NR_munmap: 2578 ret = get_errno(target_munmap(arg1, arg2)); 2579 break; 2580 case TARGET_NR_mprotect: 2581 ret = get_errno(target_mprotect(arg1, arg2, arg3)); 2582 break; 2583 case TARGET_NR_mremap: 2584 ret = get_errno(target_mremap(arg1, arg2, arg3, arg4, arg5)); 2585 break; 2586 /* ??? msync/mlock/munlock are broken for softmmu. */ 2587 case TARGET_NR_msync: 2588 ret = get_errno(msync(g2h(arg1), arg2, arg3)); 2589 break; 2590 case TARGET_NR_mlock: 2591 ret = get_errno(mlock(g2h(arg1), arg2)); 2592 break; 2593 case TARGET_NR_munlock: 2594 ret = get_errno(munlock(g2h(arg1), arg2)); 2595 break; 2596 case TARGET_NR_mlockall: 2597 ret = get_errno(mlockall(arg1)); 2598 break; 2599 case TARGET_NR_munlockall: 2600 ret = get_errno(munlockall()); 2601 break; 2602 case TARGET_NR_truncate: 2603 p = lock_user_string(arg1); 2604 ret = get_errno(truncate(p, arg2)); 2605 unlock_user(p, arg1, 0); 2606 break; 2607 case TARGET_NR_ftruncate: 2608 ret = get_errno(ftruncate(arg1, arg2)); 2609 break; 2610 case TARGET_NR_fchmod: 2611 ret = get_errno(fchmod(arg1, arg2)); 2612 break; 2613 case TARGET_NR_getpriority: 2614 ret = get_errno(getpriority(arg1, arg2)); 2615 break; 2616 case TARGET_NR_setpriority: 2617 ret = get_errno(setpriority(arg1, arg2, arg3)); 2618 break; 2619 #ifdef TARGET_NR_profil 2620 case TARGET_NR_profil: 2621 goto unimplemented; 2622 #endif 2623 case TARGET_NR_statfs: 2624 p = lock_user_string(arg1); 2625 ret = get_errno(statfs(path(p), &stfs)); 2626 unlock_user(p, arg1, 0); 2627 convert_statfs: 2628 if (!is_error(ret)) { 2629 struct target_statfs *target_stfs; 2630 2631 lock_user_struct(target_stfs, arg2, 0); 2632 /* ??? put_user is probably wrong. */ 2633 put_user(stfs.f_type, &target_stfs->f_type); 2634 put_user(stfs.f_bsize, &target_stfs->f_bsize); 2635 put_user(stfs.f_blocks, &target_stfs->f_blocks); 2636 put_user(stfs.f_bfree, &target_stfs->f_bfree); 2637 put_user(stfs.f_bavail, &target_stfs->f_bavail); 2638 put_user(stfs.f_files, &target_stfs->f_files); 2639 put_user(stfs.f_ffree, &target_stfs->f_ffree); 2640 put_user(stfs.f_fsid.__val[0], &target_stfs->f_fsid); 2641 put_user(stfs.f_namelen, &target_stfs->f_namelen); 2642 unlock_user_struct(target_stfs, arg2, 1); 2643 } 2644 break; 2645 case TARGET_NR_fstatfs: 2646 ret = get_errno(fstatfs(arg1, &stfs)); 2647 goto convert_statfs; 2648 #ifdef TARGET_NR_statfs64 2649 case TARGET_NR_statfs64: 2650 p = lock_user_string(arg1); 2651 ret = get_errno(statfs(path(p), &stfs)); 2652 unlock_user(p, arg1, 0); 2653 convert_statfs64: 2654 if (!is_error(ret)) { 2655 struct target_statfs64 *target_stfs; 2656 2657 lock_user_struct(target_stfs, arg3, 0); 2658 /* ??? put_user is probably wrong. */ 2659 put_user(stfs.f_type, &target_stfs->f_type); 2660 put_user(stfs.f_bsize, &target_stfs->f_bsize); 2661 put_user(stfs.f_blocks, &target_stfs->f_blocks); 2662 put_user(stfs.f_bfree, &target_stfs->f_bfree); 2663 put_user(stfs.f_bavail, &target_stfs->f_bavail); 2664 put_user(stfs.f_files, &target_stfs->f_files); 2665 put_user(stfs.f_ffree, &target_stfs->f_ffree); 2666 put_user(stfs.f_fsid.__val[0], &target_stfs->f_fsid); 2667 put_user(stfs.f_namelen, &target_stfs->f_namelen); 2668 unlock_user_struct(target_stfs, arg3, 0); 2669 } 2670 break; 2671 case TARGET_NR_fstatfs64: 2672 ret = get_errno(fstatfs(arg1, &stfs)); 2673 goto convert_statfs64; 2674 #endif 2675 #ifdef TARGET_NR_ioperm 2676 case TARGET_NR_ioperm: 2677 goto unimplemented; 2678 #endif 2679 case TARGET_NR_socketcall: 2680 ret = do_socketcall(arg1, arg2); 2681 break; 2682 case TARGET_NR_syslog: 2683 goto unimplemented; 2684 case TARGET_NR_setitimer: 2685 { 2686 struct itimerval value, ovalue, *pvalue; 2687 2688 if (arg2) { 2689 pvalue = &value; 2690 target_to_host_timeval(&pvalue->it_interval, 2691 arg2); 2692 target_to_host_timeval(&pvalue->it_value, 2693 arg2 + sizeof(struct target_timeval)); 2694 } else { 2695 pvalue = NULL; 2696 } 2697 ret = get_errno(setitimer(arg1, pvalue, &ovalue)); 2698 if (!is_error(ret) && arg3) { 2699 host_to_target_timeval(arg3, 2700 &ovalue.it_interval); 2701 host_to_target_timeval(arg3 + sizeof(struct target_timeval), 2702 &ovalue.it_value); 2703 } 2704 } 2705 break; 2706 case TARGET_NR_getitimer: 2707 { 2708 struct itimerval value; 2709 2710 ret = get_errno(getitimer(arg1, &value)); 2711 if (!is_error(ret) && arg2) { 2712 host_to_target_timeval(arg2, 2713 &value.it_interval); 2714 host_to_target_timeval(arg2 + sizeof(struct target_timeval), 2715 &value.it_value); 2716 } 2717 } 2718 break; 2719 case TARGET_NR_stat: 2720 p = lock_user_string(arg1); 2721 ret = get_errno(stat(path(p), &st)); 2722 unlock_user(p, arg1, 0); 2723 goto do_stat; 2724 case TARGET_NR_lstat: 2725 p = lock_user_string(arg1); 2726 ret = get_errno(lstat(path(p), &st)); 2727 unlock_user(p, arg1, 0); 2728 goto do_stat; 2729 case TARGET_NR_fstat: 2730 { 2731 ret = get_errno(fstat(arg1, &st)); 2732 do_stat: 2733 if (!is_error(ret)) { 2734 struct target_stat *target_st; 2735 2736 lock_user_struct(target_st, arg2, 0); 2737 target_st->st_dev = tswap16(st.st_dev); 2738 target_st->st_ino = tswapl(st.st_ino); 2739 #if defined(TARGET_PPC) 2740 target_st->st_mode = tswapl(st.st_mode); /* XXX: check this */ 2741 target_st->st_uid = tswap32(st.st_uid); 2742 target_st->st_gid = tswap32(st.st_gid); 2743 #else 2744 target_st->st_mode = tswap16(st.st_mode); 2745 target_st->st_uid = tswap16(st.st_uid); 2746 target_st->st_gid = tswap16(st.st_gid); 2747 #endif 2748 target_st->st_nlink = tswap16(st.st_nlink); 2749 target_st->st_rdev = tswap16(st.st_rdev); 2750 target_st->st_size = tswapl(st.st_size); 2751 target_st->st_blksize = tswapl(st.st_blksize); 2752 target_st->st_blocks = tswapl(st.st_blocks); 2753 target_st->target_st_atime = tswapl(st.st_atime); 2754 target_st->target_st_mtime = tswapl(st.st_mtime); 2755 target_st->target_st_ctime = tswapl(st.st_ctime); 2756 unlock_user_struct(target_st, arg2, 1); 2757 } 2758 } 2759 break; 2760 #ifdef TARGET_NR_olduname 2761 case TARGET_NR_olduname: 2762 goto unimplemented; 2763 #endif 2764 #ifdef TARGET_NR_iopl 2765 case TARGET_NR_iopl: 2766 goto unimplemented; 2767 #endif 2768 case TARGET_NR_vhangup: 2769 ret = get_errno(vhangup()); 2770 break; 2771 #ifdef TARGET_NR_idle 2772 case TARGET_NR_idle: 2773 goto unimplemented; 2774 #endif 2775 #ifdef TARGET_NR_syscall 2776 case TARGET_NR_syscall: 2777 ret = do_syscall(cpu_env,arg1 & 0xffff,arg2,arg3,arg4,arg5,arg6,0); 2778 break; 2779 #endif 2780 case TARGET_NR_wait4: 2781 { 2782 int status; 2783 target_long status_ptr = arg2; 2784 struct rusage rusage, *rusage_ptr; 2785 target_ulong target_rusage = arg4; 2786 if (target_rusage) 2787 rusage_ptr = &rusage; 2788 else 2789 rusage_ptr = NULL; 2790 ret = get_errno(wait4(arg1, &status, arg3, rusage_ptr)); 2791 if (!is_error(ret)) { 2792 if (status_ptr) 2793 tputl(status_ptr, status); 2794 if (target_rusage) { 2795 host_to_target_rusage(target_rusage, &rusage); 2796 } 2797 } 2798 } 2799 break; 2800 case TARGET_NR_swapoff: 2801 p = lock_user_string(arg1); 2802 ret = get_errno(swapoff(p)); 2803 unlock_user(p, arg1, 0); 2804 break; 2805 case TARGET_NR_sysinfo: 2806 { 2807 struct target_sysinfo *target_value; 2808 struct sysinfo value; 2809 ret = get_errno(sysinfo(&value)); 2810 if (!is_error(ret) && arg1) 2811 { 2812 /* ??? __put_user is probably wrong. */ 2813 lock_user_struct(target_value, arg1, 0); 2814 __put_user(value.uptime, &target_value->uptime); 2815 __put_user(value.loads[0], &target_value->loads[0]); 2816 __put_user(value.loads[1], &target_value->loads[1]); 2817 __put_user(value.loads[2], &target_value->loads[2]); 2818 __put_user(value.totalram, &target_value->totalram); 2819 __put_user(value.freeram, &target_value->freeram); 2820 __put_user(value.sharedram, &target_value->sharedram); 2821 __put_user(value.bufferram, &target_value->bufferram); 2822 __put_user(value.totalswap, &target_value->totalswap); 2823 __put_user(value.freeswap, &target_value->freeswap); 2824 __put_user(value.procs, &target_value->procs); 2825 __put_user(value.totalhigh, &target_value->totalhigh); 2826 __put_user(value.freehigh, &target_value->freehigh); 2827 __put_user(value.mem_unit, &target_value->mem_unit); 2828 unlock_user_struct(target_value, arg1, 1); 2829 } 2830 } 2831 break; 2832 case TARGET_NR_ipc: 2833 ret = do_ipc(arg1, arg2, arg3, arg4, arg5, arg6); 2834 break; 2835 case TARGET_NR_fsync: 2836 ret = get_errno(fsync(arg1)); 2837 break; 2838 case TARGET_NR_clone: 2839 ret = get_errno(do_fork(cpu_env, arg1, arg2)); 2840 break; 2841 #ifdef __NR_exit_group 2842 /* new thread calls */ 2843 case TARGET_NR_exit_group: 2844 gdb_exit(cpu_env, arg1); 2845 ret = get_errno(exit_group(arg1)); 2846 break; 2847 #endif 2848 case TARGET_NR_setdomainname: 2849 p = lock_user_string(arg1); 2850 ret = get_errno(setdomainname(p, arg2)); 2851 unlock_user(p, arg1, 0); 2852 break; 2853 case TARGET_NR_uname: 2854 /* no need to transcode because we use the linux syscall */ 2855 { 2856 struct new_utsname * buf; 2857 2858 lock_user_struct(buf, arg1, 0); 2859 ret = get_errno(sys_uname(buf)); 2860 if (!is_error(ret)) { 2861 /* Overrite the native machine name with whatever is being 2862 emulated. */ 2863 strcpy (buf->machine, UNAME_MACHINE); 2864 /* Allow the user to override the reported release. */ 2865 if (qemu_uname_release && *qemu_uname_release) 2866 strcpy (buf->release, qemu_uname_release); 2867 } 2868 unlock_user_struct(buf, arg1, 1); 2869 } 2870 break; 2871 #ifdef TARGET_I386 2872 case TARGET_NR_modify_ldt: 2873 ret = get_errno(do_modify_ldt(cpu_env, arg1, arg2, arg3)); 2874 break; 2875 case TARGET_NR_vm86old: 2876 goto unimplemented; 2877 case TARGET_NR_vm86: 2878 ret = do_vm86(cpu_env, arg1, arg2); 2879 break; 2880 #endif 2881 case TARGET_NR_adjtimex: 2882 goto unimplemented; 2883 case TARGET_NR_create_module: 2884 case TARGET_NR_init_module: 2885 case TARGET_NR_delete_module: 2886 case TARGET_NR_get_kernel_syms: 2887 goto unimplemented; 2888 case TARGET_NR_quotactl: 2889 goto unimplemented; 2890 case TARGET_NR_getpgid: 2891 ret = get_errno(getpgid(arg1)); 2892 break; 2893 case TARGET_NR_fchdir: 2894 ret = get_errno(fchdir(arg1)); 2895 break; 2896 case TARGET_NR_bdflush: 2897 goto unimplemented; 2898 case TARGET_NR_sysfs: 2899 goto unimplemented; 2900 case TARGET_NR_personality: 2901 ret = get_errno(personality(arg1)); 2902 break; 2903 case TARGET_NR_afs_syscall: 2904 goto unimplemented; 2905 case TARGET_NR__llseek: 2906 { 2907 #if defined (__x86_64__) 2908 ret = get_errno(lseek(arg1, ((uint64_t )arg2 << 32) | arg3, arg5)); 2909 tput64(arg4, ret); 2910 #else 2911 int64_t res; 2912 ret = get_errno(_llseek(arg1, arg2, arg3, &res, arg5)); 2913 tput64(arg4, res); 2914 #endif 2915 } 2916 break; 2917 case TARGET_NR_getdents: 2918 #if TARGET_LONG_SIZE != 4 2919 goto unimplemented; 2920 #warning not supported 2921 #elif TARGET_LONG_SIZE == 4 && HOST_LONG_SIZE == 8 2922 { 2923 struct target_dirent *target_dirp; 2924 struct dirent *dirp; 2925 long count = arg3; 2926 2927 dirp = malloc(count); 2928 if (!dirp) 2929 return -ENOMEM; 2930 2931 ret = get_errno(sys_getdents(arg1, dirp, count)); 2932 if (!is_error(ret)) { 2933 struct dirent *de; 2934 struct target_dirent *tde; 2935 int len = ret; 2936 int reclen, treclen; 2937 int count1, tnamelen; 2938 2939 count1 = 0; 2940 de = dirp; 2941 target_dirp = lock_user(arg2, count, 0); 2942 tde = target_dirp; 2943 while (len > 0) { 2944 reclen = de->d_reclen; 2945 treclen = reclen - (2 * (sizeof(long) - sizeof(target_long))); 2946 tde->d_reclen = tswap16(treclen); 2947 tde->d_ino = tswapl(de->d_ino); 2948 tde->d_off = tswapl(de->d_off); 2949 tnamelen = treclen - (2 * sizeof(target_long) + 2); 2950 if (tnamelen > 256) 2951 tnamelen = 256; 2952 /* XXX: may not be correct */ 2953 strncpy(tde->d_name, de->d_name, tnamelen); 2954 de = (struct dirent *)((char *)de + reclen); 2955 len -= reclen; 2956 tde = (struct dirent *)((char *)tde + treclen); 2957 count1 += treclen; 2958 } 2959 ret = count1; 2960 } 2961 unlock_user(target_dirp, arg2, ret); 2962 free(dirp); 2963 } 2964 #else 2965 { 2966 struct dirent *dirp; 2967 long count = arg3; 2968 2969 dirp = lock_user(arg2, count, 0); 2970 ret = get_errno(sys_getdents(arg1, dirp, count)); 2971 if (!is_error(ret)) { 2972 struct dirent *de; 2973 int len = ret; 2974 int reclen; 2975 de = dirp; 2976 while (len > 0) { 2977 reclen = de->d_reclen; 2978 if (reclen > len) 2979 break; 2980 de->d_reclen = tswap16(reclen); 2981 tswapls(&de->d_ino); 2982 tswapls(&de->d_off); 2983 de = (struct dirent *)((char *)de + reclen); 2984 len -= reclen; 2985 } 2986 } 2987 unlock_user(dirp, arg2, ret); 2988 } 2989 #endif 2990 break; 2991 #ifdef TARGET_NR_getdents64 2992 case TARGET_NR_getdents64: 2993 { 2994 struct dirent64 *dirp; 2995 long count = arg3; 2996 dirp = lock_user(arg2, count, 0); 2997 ret = get_errno(sys_getdents64(arg1, dirp, count)); 2998 if (!is_error(ret)) { 2999 struct dirent64 *de; 3000 int len = ret; 3001 int reclen; 3002 de = dirp; 3003 while (len > 0) { 3004 reclen = de->d_reclen; 3005 if (reclen > len) 3006 break; 3007 de->d_reclen = tswap16(reclen); 3008 tswap64s(&de->d_ino); 3009 tswap64s(&de->d_off); 3010 de = (struct dirent64 *)((char *)de + reclen); 3011 len -= reclen; 3012 } 3013 } 3014 unlock_user(dirp, arg2, ret); 3015 } 3016 break; 3017 #endif /* TARGET_NR_getdents64 */ 3018 case TARGET_NR__newselect: 3019 ret = do_select(arg1, arg2, arg3, arg4, arg5); 3020 break; 3021 case TARGET_NR_poll: 3022 { 3023 struct target_pollfd *target_pfd; 3024 unsigned int nfds = arg2; 3025 int timeout = arg3; 3026 struct pollfd *pfd; 3027 unsigned int i; 3028 3029 target_pfd = lock_user(arg1, sizeof(struct target_pollfd) * nfds, 1); 3030 pfd = alloca(sizeof(struct pollfd) * nfds); 3031 for(i = 0; i < nfds; i++) { 3032 pfd[i].fd = tswap32(target_pfd[i].fd); 3033 pfd[i].events = tswap16(target_pfd[i].events); 3034 } 3035 ret = get_errno(poll(pfd, nfds, timeout)); 3036 if (!is_error(ret)) { 3037 for(i = 0; i < nfds; i++) { 3038 target_pfd[i].revents = tswap16(pfd[i].revents); 3039 } 3040 ret += nfds * (sizeof(struct target_pollfd) 3041 - sizeof(struct pollfd)); 3042 } 3043 unlock_user(target_pfd, arg1, ret); 3044 } 3045 break; 3046 case TARGET_NR_flock: 3047 /* NOTE: the flock constant seems to be the same for every 3048 Linux platform */ 3049 ret = get_errno(flock(arg1, arg2)); 3050 break; 3051 case TARGET_NR_readv: 3052 { 3053 int count = arg3; 3054 struct iovec *vec; 3055 3056 vec = alloca(count * sizeof(struct iovec)); 3057 lock_iovec(vec, arg2, count, 0); 3058 ret = get_errno(readv(arg1, vec, count)); 3059 unlock_iovec(vec, arg2, count, 1); 3060 } 3061 break; 3062 case TARGET_NR_writev: 3063 { 3064 int count = arg3; 3065 struct iovec *vec; 3066 3067 vec = alloca(count * sizeof(struct iovec)); 3068 lock_iovec(vec, arg2, count, 1); 3069 ret = get_errno(writev(arg1, vec, count)); 3070 unlock_iovec(vec, arg2, count, 0); 3071 } 3072 break; 3073 case TARGET_NR_getsid: 3074 ret = get_errno(getsid(arg1)); 3075 break; 3076 case TARGET_NR_fdatasync: 3077 ret = get_errno(fdatasync(arg1)); 3078 break; 3079 case TARGET_NR__sysctl: 3080 /* We don't implement this, but ENODIR is always a safe 3081 return value. */ 3082 return -ENOTDIR; 3083 case TARGET_NR_sched_setparam: 3084 { 3085 struct sched_param *target_schp; 3086 struct sched_param schp; 3087 3088 lock_user_struct(target_schp, arg2, 1); 3089 schp.sched_priority = tswap32(target_schp->sched_priority); 3090 unlock_user_struct(target_schp, arg2, 0); 3091 ret = get_errno(sched_setparam(arg1, &schp)); 3092 } 3093 break; 3094 case TARGET_NR_sched_getparam: 3095 { 3096 struct sched_param *target_schp; 3097 struct sched_param schp; 3098 ret = get_errno(sched_getparam(arg1, &schp)); 3099 if (!is_error(ret)) { 3100 lock_user_struct(target_schp, arg2, 0); 3101 target_schp->sched_priority = tswap32(schp.sched_priority); 3102 unlock_user_struct(target_schp, arg2, 1); 3103 } 3104 } 3105 break; 3106 case TARGET_NR_sched_setscheduler: 3107 { 3108 struct sched_param *target_schp; 3109 struct sched_param schp; 3110 lock_user_struct(target_schp, arg3, 1); 3111 schp.sched_priority = tswap32(target_schp->sched_priority); 3112 unlock_user_struct(target_schp, arg3, 0); 3113 ret = get_errno(sched_setscheduler(arg1, arg2, &schp)); 3114 } 3115 break; 3116 case TARGET_NR_sched_getscheduler: 3117 ret = get_errno(sched_getscheduler(arg1)); 3118 break; 3119 case TARGET_NR_sched_yield: 3120 ret = get_errno(sched_yield()); 3121 break; 3122 case TARGET_NR_sched_get_priority_max: 3123 ret = get_errno(sched_get_priority_max(arg1)); 3124 break; 3125 case TARGET_NR_sched_get_priority_min: 3126 ret = get_errno(sched_get_priority_min(arg1)); 3127 break; 3128 case TARGET_NR_sched_rr_get_interval: 3129 { 3130 struct timespec ts; 3131 ret = get_errno(sched_rr_get_interval(arg1, &ts)); 3132 if (!is_error(ret)) { 3133 host_to_target_timespec(arg2, &ts); 3134 } 3135 } 3136 break; 3137 case TARGET_NR_nanosleep: 3138 { 3139 struct timespec req, rem; 3140 target_to_host_timespec(&req, arg1); 3141 ret = get_errno(nanosleep(&req, &rem)); 3142 if (is_error(ret) && arg2) { 3143 host_to_target_timespec(arg2, &rem); 3144 } 3145 } 3146 break; 3147 case TARGET_NR_query_module: 3148 goto unimplemented; 3149 case TARGET_NR_nfsservctl: 3150 goto unimplemented; 3151 case TARGET_NR_prctl: 3152 goto unimplemented; 3153 #ifdef TARGET_NR_pread 3154 case TARGET_NR_pread: 3155 page_unprotect_range(arg2, arg3); 3156 p = lock_user(arg2, arg3, 0); 3157 ret = get_errno(pread(arg1, p, arg3, arg4)); 3158 unlock_user(p, arg2, ret); 3159 break; 3160 case TARGET_NR_pwrite: 3161 p = lock_user(arg2, arg3, 1); 3162 ret = get_errno(pwrite(arg1, p, arg3, arg4)); 3163 unlock_user(p, arg2, 0); 3164 break; 3165 #endif 3166 case TARGET_NR_getcwd: 3167 p = lock_user(arg1, arg2, 0); 3168 ret = get_errno(sys_getcwd1(p, arg2)); 3169 unlock_user(p, arg1, ret); 3170 break; 3171 case TARGET_NR_capget: 3172 goto unimplemented; 3173 case TARGET_NR_capset: 3174 goto unimplemented; 3175 case TARGET_NR_sigaltstack: 3176 goto unimplemented; 3177 case TARGET_NR_sendfile: 3178 goto unimplemented; 3179 #ifdef TARGET_NR_getpmsg 3180 case TARGET_NR_getpmsg: 3181 goto unimplemented; 3182 #endif 3183 #ifdef TARGET_NR_putpmsg 3184 case TARGET_NR_putpmsg: 3185 goto unimplemented; 3186 #endif 3187 #ifdef TARGET_NR_vfork 3188 case TARGET_NR_vfork: 3189 ret = get_errno(do_fork(cpu_env, CLONE_VFORK | CLONE_VM | SIGCHLD, 0)); 3190 break; 3191 #endif 3192 #ifdef TARGET_NR_ugetrlimit 3193 case TARGET_NR_ugetrlimit: 3194 { 3195 struct rlimit rlim; 3196 ret = get_errno(getrlimit(arg1, &rlim)); 3197 if (!is_error(ret)) { 3198 struct target_rlimit *target_rlim; 3199 lock_user_struct(target_rlim, arg2, 0); 3200 target_rlim->rlim_cur = tswapl(rlim.rlim_cur); 3201 target_rlim->rlim_max = tswapl(rlim.rlim_max); 3202 unlock_user_struct(target_rlim, arg2, 1); 3203 } 3204 break; 3205 } 3206 #endif 3207 #ifdef TARGET_NR_truncate64 3208 case TARGET_NR_truncate64: 3209 p = lock_user_string(arg1); 3210 ret = target_truncate64(cpu_env, p, arg2, arg3, arg4); 3211 unlock_user(p, arg1, 0); 3212 break; 3213 #endif 3214 #ifdef TARGET_NR_ftruncate64 3215 case TARGET_NR_ftruncate64: 3216 ret = target_ftruncate64(cpu_env, arg1, arg2, arg3, arg4); 3217 break; 3218 #endif 3219 #ifdef TARGET_NR_stat64 3220 case TARGET_NR_stat64: 3221 p = lock_user_string(arg1); 3222 ret = get_errno(stat(path(p), &st)); 3223 unlock_user(p, arg1, 0); 3224 goto do_stat64; 3225 #endif 3226 #ifdef TARGET_NR_lstat64 3227 case TARGET_NR_lstat64: 3228 p = lock_user_string(arg1); 3229 ret = get_errno(lstat(path(p), &st)); 3230 unlock_user(p, arg1, 0); 3231 goto do_stat64; 3232 #endif 3233 #ifdef TARGET_NR_fstat64 3234 case TARGET_NR_fstat64: 3235 { 3236 ret = get_errno(fstat(arg1, &st)); 3237 do_stat64: 3238 if (!is_error(ret)) { 3239 #ifdef TARGET_ARM 3240 if (((CPUARMState *)cpu_env)->eabi) { 3241 struct target_eabi_stat64 *target_st; 3242 lock_user_struct(target_st, arg2, 1); 3243 memset(target_st, 0, sizeof(struct target_eabi_stat64)); 3244 /* put_user is probably wrong. */ 3245 put_user(st.st_dev, &target_st->st_dev); 3246 put_user(st.st_ino, &target_st->st_ino); 3247 #ifdef TARGET_STAT64_HAS_BROKEN_ST_INO 3248 put_user(st.st_ino, &target_st->__st_ino); 3249 #endif 3250 put_user(st.st_mode, &target_st->st_mode); 3251 put_user(st.st_nlink, &target_st->st_nlink); 3252 put_user(st.st_uid, &target_st->st_uid); 3253 put_user(st.st_gid, &target_st->st_gid); 3254 put_user(st.st_rdev, &target_st->st_rdev); 3255 /* XXX: better use of kernel struct */ 3256 put_user(st.st_size, &target_st->st_size); 3257 put_user(st.st_blksize, &target_st->st_blksize); 3258 put_user(st.st_blocks, &target_st->st_blocks); 3259 put_user(st.st_atime, &target_st->target_st_atime); 3260 put_user(st.st_mtime, &target_st->target_st_mtime); 3261 put_user(st.st_ctime, &target_st->target_st_ctime); 3262 unlock_user_struct(target_st, arg2, 0); 3263 } else 3264 #endif 3265 { 3266 struct target_stat64 *target_st; 3267 lock_user_struct(target_st, arg2, 1); 3268 memset(target_st, 0, sizeof(struct target_stat64)); 3269 /* ??? put_user is probably wrong. */ 3270 put_user(st.st_dev, &target_st->st_dev); 3271 put_user(st.st_ino, &target_st->st_ino); 3272 #ifdef TARGET_STAT64_HAS_BROKEN_ST_INO 3273 put_user(st.st_ino, &target_st->__st_ino); 3274 #endif 3275 put_user(st.st_mode, &target_st->st_mode); 3276 put_user(st.st_nlink, &target_st->st_nlink); 3277 put_user(st.st_uid, &target_st->st_uid); 3278 put_user(st.st_gid, &target_st->st_gid); 3279 put_user(st.st_rdev, &target_st->st_rdev); 3280 /* XXX: better use of kernel struct */ 3281 put_user(st.st_size, &target_st->st_size); 3282 put_user(st.st_blksize, &target_st->st_blksize); 3283 put_user(st.st_blocks, &target_st->st_blocks); 3284 put_user(st.st_atime, &target_st->target_st_atime); 3285 put_user(st.st_mtime, &target_st->target_st_mtime); 3286 put_user(st.st_ctime, &target_st->target_st_ctime); 3287 unlock_user_struct(target_st, arg2, 0); 3288 } 3289 } 3290 } 3291 break; 3292 #endif 3293 #ifdef USE_UID16 3294 case TARGET_NR_lchown: 3295 p = lock_user_string(arg1); 3296 ret = get_errno(lchown(p, low2highuid(arg2), low2highgid(arg3))); 3297 unlock_user(p, arg1, 0); 3298 break; 3299 case TARGET_NR_getuid: 3300 ret = get_errno(high2lowuid(getuid())); 3301 break; 3302 case TARGET_NR_getgid: 3303 ret = get_errno(high2lowgid(getgid())); 3304 break; 3305 case TARGET_NR_geteuid: 3306 ret = get_errno(high2lowuid(geteuid())); 3307 break; 3308 case TARGET_NR_getegid: 3309 ret = get_errno(high2lowgid(getegid())); 3310 break; 3311 case TARGET_NR_setreuid: 3312 ret = get_errno(setreuid(low2highuid(arg1), low2highuid(arg2))); 3313 break; 3314 case TARGET_NR_setregid: 3315 ret = get_errno(setregid(low2highgid(arg1), low2highgid(arg2))); 3316 break; 3317 case TARGET_NR_getgroups: 3318 { 3319 int gidsetsize = arg1; 3320 uint16_t *target_grouplist; 3321 gid_t *grouplist; 3322 int i; 3323 3324 grouplist = alloca(gidsetsize * sizeof(gid_t)); 3325 ret = get_errno(getgroups(gidsetsize, grouplist)); 3326 if (!is_error(ret)) { 3327 target_grouplist = lock_user(arg2, gidsetsize * 2, 0); 3328 for(i = 0;i < gidsetsize; i++) 3329 target_grouplist[i] = tswap16(grouplist[i]); 3330 unlock_user(target_grouplist, arg2, gidsetsize * 2); 3331 } 3332 } 3333 break; 3334 case TARGET_NR_setgroups: 3335 { 3336 int gidsetsize = arg1; 3337 uint16_t *target_grouplist; 3338 gid_t *grouplist; 3339 int i; 3340 3341 grouplist = alloca(gidsetsize * sizeof(gid_t)); 3342 target_grouplist = lock_user(arg2, gidsetsize * 2, 1); 3343 for(i = 0;i < gidsetsize; i++) 3344 grouplist[i] = tswap16(target_grouplist[i]); 3345 unlock_user(target_grouplist, arg2, 0); 3346 ret = get_errno(setgroups(gidsetsize, grouplist)); 3347 } 3348 break; 3349 case TARGET_NR_fchown: 3350 ret = get_errno(fchown(arg1, low2highuid(arg2), low2highgid(arg3))); 3351 break; 3352 #ifdef TARGET_NR_setresuid 3353 case TARGET_NR_setresuid: 3354 ret = get_errno(setresuid(low2highuid(arg1), 3355 low2highuid(arg2), 3356 low2highuid(arg3))); 3357 break; 3358 #endif 3359 #ifdef TARGET_NR_getresuid 3360 case TARGET_NR_getresuid: 3361 { 3362 uid_t ruid, euid, suid; 3363 ret = get_errno(getresuid(&ruid, &euid, &suid)); 3364 if (!is_error(ret)) { 3365 tput16(arg1, tswap16(high2lowuid(ruid))); 3366 tput16(arg2, tswap16(high2lowuid(euid))); 3367 tput16(arg3, tswap16(high2lowuid(suid))); 3368 } 3369 } 3370 break; 3371 #endif 3372 #ifdef TARGET_NR_getresgid 3373 case TARGET_NR_setresgid: 3374 ret = get_errno(setresgid(low2highgid(arg1), 3375 low2highgid(arg2), 3376 low2highgid(arg3))); 3377 break; 3378 #endif 3379 #ifdef TARGET_NR_getresgid 3380 case TARGET_NR_getresgid: 3381 { 3382 gid_t rgid, egid, sgid; 3383 ret = get_errno(getresgid(&rgid, &egid, &sgid)); 3384 if (!is_error(ret)) { 3385 tput16(arg1, tswap16(high2lowgid(rgid))); 3386 tput16(arg2, tswap16(high2lowgid(egid))); 3387 tput16(arg3, tswap16(high2lowgid(sgid))); 3388 } 3389 } 3390 break; 3391 #endif 3392 case TARGET_NR_chown: 3393 p = lock_user_string(arg1); 3394 ret = get_errno(chown(p, low2highuid(arg2), low2highgid(arg3))); 3395 unlock_user(p, arg1, 0); 3396 break; 3397 case TARGET_NR_setuid: 3398 ret = get_errno(setuid(low2highuid(arg1))); 3399 break; 3400 case TARGET_NR_setgid: 3401 ret = get_errno(setgid(low2highgid(arg1))); 3402 break; 3403 case TARGET_NR_setfsuid: 3404 ret = get_errno(setfsuid(arg1)); 3405 break; 3406 case TARGET_NR_setfsgid: 3407 ret = get_errno(setfsgid(arg1)); 3408 break; 3409 #endif /* USE_UID16 */ 3410 3411 #ifdef TARGET_NR_lchown32 3412 case TARGET_NR_lchown32: 3413 p = lock_user_string(arg1); 3414 ret = get_errno(lchown(p, arg2, arg3)); 3415 unlock_user(p, arg1, 0); 3416 break; 3417 #endif 3418 #ifdef TARGET_NR_getuid32 3419 case TARGET_NR_getuid32: 3420 ret = get_errno(getuid()); 3421 break; 3422 #endif 3423 #ifdef TARGET_NR_getgid32 3424 case TARGET_NR_getgid32: 3425 ret = get_errno(getgid()); 3426 break; 3427 #endif 3428 #ifdef TARGET_NR_geteuid32 3429 case TARGET_NR_geteuid32: 3430 ret = get_errno(geteuid()); 3431 break; 3432 #endif 3433 #ifdef TARGET_NR_getegid32 3434 case TARGET_NR_getegid32: 3435 ret = get_errno(getegid()); 3436 break; 3437 #endif 3438 #ifdef TARGET_NR_setreuid32 3439 case TARGET_NR_setreuid32: 3440 ret = get_errno(setreuid(arg1, arg2)); 3441 break; 3442 #endif 3443 #ifdef TARGET_NR_setregid32 3444 case TARGET_NR_setregid32: 3445 ret = get_errno(setregid(arg1, arg2)); 3446 break; 3447 #endif 3448 #ifdef TARGET_NR_getgroups32 3449 case TARGET_NR_getgroups32: 3450 { 3451 int gidsetsize = arg1; 3452 uint32_t *target_grouplist; 3453 gid_t *grouplist; 3454 int i; 3455 3456 grouplist = alloca(gidsetsize * sizeof(gid_t)); 3457 ret = get_errno(getgroups(gidsetsize, grouplist)); 3458 if (!is_error(ret)) { 3459 target_grouplist = lock_user(arg2, gidsetsize * 4, 0); 3460 for(i = 0;i < gidsetsize; i++) 3461 target_grouplist[i] = tswap32(grouplist[i]); 3462 unlock_user(target_grouplist, arg2, gidsetsize * 4); 3463 } 3464 } 3465 break; 3466 #endif 3467 #ifdef TARGET_NR_setgroups32 3468 case TARGET_NR_setgroups32: 3469 { 3470 int gidsetsize = arg1; 3471 uint32_t *target_grouplist; 3472 gid_t *grouplist; 3473 int i; 3474 3475 grouplist = alloca(gidsetsize * sizeof(gid_t)); 3476 target_grouplist = lock_user(arg2, gidsetsize * 4, 1); 3477 for(i = 0;i < gidsetsize; i++) 3478 grouplist[i] = tswap32(target_grouplist[i]); 3479 unlock_user(target_grouplist, arg2, 0); 3480 ret = get_errno(setgroups(gidsetsize, grouplist)); 3481 } 3482 break; 3483 #endif 3484 #ifdef TARGET_NR_fchown32 3485 case TARGET_NR_fchown32: 3486 ret = get_errno(fchown(arg1, arg2, arg3)); 3487 break; 3488 #endif 3489 #ifdef TARGET_NR_setresuid32 3490 case TARGET_NR_setresuid32: 3491 ret = get_errno(setresuid(arg1, arg2, arg3)); 3492 break; 3493 #endif 3494 #ifdef TARGET_NR_getresuid32 3495 case TARGET_NR_getresuid32: 3496 { 3497 uid_t ruid, euid, suid; 3498 ret = get_errno(getresuid(&ruid, &euid, &suid)); 3499 if (!is_error(ret)) { 3500 tput32(arg1, tswap32(ruid)); 3501 tput32(arg2, tswap32(euid)); 3502 tput32(arg3, tswap32(suid)); 3503 } 3504 } 3505 break; 3506 #endif 3507 #ifdef TARGET_NR_setresgid32 3508 case TARGET_NR_setresgid32: 3509 ret = get_errno(setresgid(arg1, arg2, arg3)); 3510 break; 3511 #endif 3512 #ifdef TARGET_NR_getresgid32 3513 case TARGET_NR_getresgid32: 3514 { 3515 gid_t rgid, egid, sgid; 3516 ret = get_errno(getresgid(&rgid, &egid, &sgid)); 3517 if (!is_error(ret)) { 3518 tput32(arg1, tswap32(rgid)); 3519 tput32(arg2, tswap32(egid)); 3520 tput32(arg3, tswap32(sgid)); 3521 } 3522 } 3523 break; 3524 #endif 3525 #ifdef TARGET_NR_chown32 3526 case TARGET_NR_chown32: 3527 p = lock_user_string(arg1); 3528 ret = get_errno(chown(p, arg2, arg3)); 3529 unlock_user(p, arg1, 0); 3530 break; 3531 #endif 3532 #ifdef TARGET_NR_setuid32 3533 case TARGET_NR_setuid32: 3534 ret = get_errno(setuid(arg1)); 3535 break; 3536 #endif 3537 #ifdef TARGET_NR_setgid32 3538 case TARGET_NR_setgid32: 3539 ret = get_errno(setgid(arg1)); 3540 break; 3541 #endif 3542 #ifdef TARGET_NR_setfsuid32 3543 case TARGET_NR_setfsuid32: 3544 ret = get_errno(setfsuid(arg1)); 3545 break; 3546 #endif 3547 #ifdef TARGET_NR_setfsgid32 3548 case TARGET_NR_setfsgid32: 3549 ret = get_errno(setfsgid(arg1)); 3550 break; 3551 #endif 3552 3553 case TARGET_NR_pivot_root: 3554 goto unimplemented; 3555 #ifdef TARGET_NR_mincore 3556 case TARGET_NR_mincore: 3557 goto unimplemented; 3558 #endif 3559 #ifdef TARGET_NR_madvise 3560 case TARGET_NR_madvise: 3561 /* A straight passthrough may not be safe because qemu sometimes 3562 turns private flie-backed mappings into anonymous mappings. 3563 This will break MADV_DONTNEED. 3564 This is a hint, so ignoring and returning success is ok. */ 3565 ret = get_errno(0); 3566 break; 3567 #endif 3568 #if TARGET_LONG_BITS == 32 3569 case TARGET_NR_fcntl64: 3570 { 3571 struct flock64 fl; 3572 struct target_flock64 *target_fl; 3573 #ifdef TARGET_ARM 3574 struct target_eabi_flock64 *target_efl; 3575 #endif 3576 3577 switch(arg2) { 3578 case F_GETLK64: 3579 ret = get_errno(fcntl(arg1, arg2, &fl)); 3580 if (ret == 0) { 3581 #ifdef TARGET_ARM 3582 if (((CPUARMState *)cpu_env)->eabi) { 3583 lock_user_struct(target_efl, arg3, 0); 3584 target_efl->l_type = tswap16(fl.l_type); 3585 target_efl->l_whence = tswap16(fl.l_whence); 3586 target_efl->l_start = tswap64(fl.l_start); 3587 target_efl->l_len = tswap64(fl.l_len); 3588 target_efl->l_pid = tswapl(fl.l_pid); 3589 unlock_user_struct(target_efl, arg3, 1); 3590 } else 3591 #endif 3592 { 3593 lock_user_struct(target_fl, arg3, 0); 3594 target_fl->l_type = tswap16(fl.l_type); 3595 target_fl->l_whence = tswap16(fl.l_whence); 3596 target_fl->l_start = tswap64(fl.l_start); 3597 target_fl->l_len = tswap64(fl.l_len); 3598 target_fl->l_pid = tswapl(fl.l_pid); 3599 unlock_user_struct(target_fl, arg3, 1); 3600 } 3601 } 3602 break; 3603 3604 case F_SETLK64: 3605 case F_SETLKW64: 3606 #ifdef TARGET_ARM 3607 if (((CPUARMState *)cpu_env)->eabi) { 3608 lock_user_struct(target_efl, arg3, 1); 3609 fl.l_type = tswap16(target_efl->l_type); 3610 fl.l_whence = tswap16(target_efl->l_whence); 3611 fl.l_start = tswap64(target_efl->l_start); 3612 fl.l_len = tswap64(target_efl->l_len); 3613 fl.l_pid = tswapl(target_efl->l_pid); 3614 unlock_user_struct(target_efl, arg3, 0); 3615 } else 3616 #endif 3617 { 3618 lock_user_struct(target_fl, arg3, 1); 3619 fl.l_type = tswap16(target_fl->l_type); 3620 fl.l_whence = tswap16(target_fl->l_whence); 3621 fl.l_start = tswap64(target_fl->l_start); 3622 fl.l_len = tswap64(target_fl->l_len); 3623 fl.l_pid = tswapl(target_fl->l_pid); 3624 unlock_user_struct(target_fl, arg3, 0); 3625 } 3626 ret = get_errno(fcntl(arg1, arg2, &fl)); 3627 break; 3628 default: 3629 ret = get_errno(do_fcntl(arg1, arg2, arg3)); 3630 break; 3631 } 3632 break; 3633 } 3634 #endif 3635 #ifdef TARGET_NR_security 3636 case TARGET_NR_security: 3637 goto unimplemented; 3638 #endif 3639 #ifdef TARGET_NR_getpagesize 3640 case TARGET_NR_getpagesize: 3641 ret = TARGET_PAGE_SIZE; 3642 break; 3643 #endif 3644 case TARGET_NR_gettid: 3645 ret = get_errno(gettid()); 3646 break; 3647 case TARGET_NR_readahead: 3648 goto unimplemented; 3649 #ifdef TARGET_NR_setxattr 3650 case TARGET_NR_setxattr: 3651 case TARGET_NR_lsetxattr: 3652 case TARGET_NR_fsetxattr: 3653 case TARGET_NR_getxattr: 3654 case TARGET_NR_lgetxattr: 3655 case TARGET_NR_fgetxattr: 3656 case TARGET_NR_listxattr: 3657 case TARGET_NR_llistxattr: 3658 case TARGET_NR_flistxattr: 3659 case TARGET_NR_removexattr: 3660 case TARGET_NR_lremovexattr: 3661 case TARGET_NR_fremovexattr: 3662 goto unimplemented_nowarn; 3663 #endif 3664 #ifdef TARGET_NR_set_thread_area 3665 case TARGET_NR_set_thread_area: 3666 case TARGET_NR_get_thread_area: 3667 goto unimplemented_nowarn; 3668 #endif 3669 default: 3670 unimplemented: 3671 gemu_log("qemu: Unsupported syscall: %d\n", num); 3672 #if defined(TARGET_NR_setxattr) || defined(TARGET_NR_set_thread_area) 3673 unimplemented_nowarn: 3674 #endif 3675 ret = -ENOSYS; 3676 break; 3677 } 3678 fail: 3679 #ifdef DEBUG 3680 gemu_log(" = %ld\n", ret); 3681 #endif 3682 return ret; 3683 } 3684 3685