4 * Copyright (c) 2003 Fabrice Bellard
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
30 #include <sys/types.h>
36 #include <sys/mount.h>
37 #include <sys/prctl.h>
38 #include <sys/resource.h>
43 #include <sys/socket.h>
46 #include <sys/times.h>
49 #include <sys/statfs.h>
51 #include <sys/sysinfo.h>
52 //#include <sys/user.h>
53 #include <netinet/ip.h>
54 #include <netinet/tcp.h>
56 #define termios host_termios
57 #define winsize host_winsize
58 #define termio host_termio
59 #define sgttyb host_sgttyb /* same as target */
60 #define tchars host_tchars /* same as target */
61 #define ltchars host_ltchars /* same as target */
63 #include <linux/termios.h>
64 #include <linux/unistd.h>
65 #include <linux/utsname.h>
66 #include <linux/cdrom.h>
67 #include <linux/hdreg.h>
68 #include <linux/soundcard.h>
69 #include <linux/dirent.h>
76 #if defined(TARGET_I386) || defined(TARGET_ARM) || defined(TARGET_SPARC) \
77 || defined(TARGET_M68K) || defined(TARGET_SH4)
78 /* 16 bit uid wrappers emulation */
82 //#include <linux/msdos_fs.h>
83 #define VFAT_IOCTL_READDIR_BOTH _IOR('r', 1, struct dirent [2])
84 #define VFAT_IOCTL_READDIR_SHORT _IOR('r', 2, struct dirent [2])
95 #define _syscall0(type,name) \
98 return syscall(__NR_##name); \
101 #define _syscall1(type,name,type1,arg1) \
102 type name (type1 arg1) \
104 return syscall(__NR_##name, arg1); \
107 #define _syscall2(type,name,type1,arg1,type2,arg2) \
108 type name (type1 arg1,type2 arg2) \
110 return syscall(__NR_##name, arg1, arg2); \
113 #define _syscall3(type,name,type1,arg1,type2,arg2,type3,arg3) \
114 type name (type1 arg1,type2 arg2,type3 arg3) \
116 return syscall(__NR_##name, arg1, arg2, arg3); \
119 #define _syscall4(type,name,type1,arg1,type2,arg2,type3,arg3,type4,arg4) \
120 type name (type1 arg1,type2 arg2,type3 arg3,type4 arg4) \
122 return syscall(__NR_##name, arg1, arg2, arg3, arg4); \
125 #define _syscall5(type,name,type1,arg1,type2,arg2,type3,arg3,type4,arg4, \
127 type name (type1 arg1,type2 arg2,type3 arg3,type4 arg4,type5 arg5) \
129 return syscall(__NR_##name, arg1, arg2, arg3, arg4, arg5); \
133 #define _syscall6(type,name,type1,arg1,type2,arg2,type3,arg3,type4,arg4, \
134 type5,arg5,type6,arg6) \
135 type name (type1 arg1,type2 arg2,type3 arg3,type4 arg4,type5 arg5,type6 arg6) \
137 return syscall(__NR_##name, arg1, arg2, arg3, arg4, arg5, arg6); \
141 #define __NR_sys_uname __NR_uname
142 #define __NR_sys_fchownat __NR_fchownat
143 #define __NR_sys_getcwd1 __NR_getcwd
144 #define __NR_sys_getdents __NR_getdents
145 #define __NR_sys_getdents64 __NR_getdents64
146 #define __NR_sys_linkat __NR_linkat
147 #define __NR_sys_mkdirat __NR_mkdirat
148 #define __NR_sys_mknodat __NR_mknodat
149 #define __NR_sys_openat __NR_openat
150 #define __NR_sys_readlinkat __NR_readlinkat
151 #define __NR_sys_renameat __NR_renameat
152 #define __NR_sys_rt_sigqueueinfo __NR_rt_sigqueueinfo
153 #define __NR_sys_symlinkat __NR_symlinkat
154 #define __NR_sys_syslog __NR_syslog
155 #define __NR_sys_tgkill __NR_tgkill
156 #define __NR_sys_tkill __NR_tkill
157 #define __NR_sys_unlinkat __NR_unlinkat
159 #if defined(__alpha__) || defined (__ia64__) || defined(__x86_64__)
160 #define __NR__llseek __NR_lseek
164 _syscall0(int, gettid
)
166 static int gettid(void) {
170 _syscall1(int,sys_uname
,struct new_utsname
*,buf
)
171 #if defined(TARGET_NR_fchownat) && defined(__NR_fchownat)
172 _syscall5(int,sys_fchownat
,int,dirfd
,const char *,pathname
,
173 uid_t
,owner
,gid_t
,group
,int,flags
)
175 _syscall2(int,sys_getcwd1
,char *,buf
,size_t,size
)
176 _syscall3(int, sys_getdents
, uint
, fd
, struct dirent
*, dirp
, uint
, count
);
177 #if defined(TARGET_NR_getdents64) && defined(__NR_getdents64)
178 _syscall3(int, sys_getdents64
, uint
, fd
, struct dirent64
*, dirp
, uint
, count
);
180 _syscall5(int, _llseek
, uint
, fd
, ulong
, hi
, ulong
, lo
,
181 loff_t
*, res
, uint
, wh
);
182 #if defined(TARGET_NR_linkat) && defined(__NR_linkat)
183 _syscall5(int,sys_linkat
,int,olddirfd
,const char *,oldpath
,
184 int,newdirfd
,const char *,newpath
,int,flags
)
186 #if defined(TARGET_NR_mkdirat) && defined(__NR_mkdirat)
187 _syscall3(int,sys_mkdirat
,int,dirfd
,const char *,pathname
,mode_t
,mode
)
189 #if defined(TARGET_NR_mknodat) && defined(__NR_mknodat)
190 _syscall4(int,sys_mknodat
,int,dirfd
,const char *,pathname
,
191 mode_t
,mode
,dev_t
,dev
)
193 #if defined(TARGET_NR_openat) && defined(__NR_openat)
194 _syscall4(int,sys_openat
,int,dirfd
,const char *,pathname
,int,flags
,mode_t
,mode
)
196 #if defined(TARGET_NR_readlinkat) && defined(__NR_readlinkat)
197 _syscall4(int,sys_readlinkat
,int,dirfd
,const char *,pathname
,
198 char *,buf
,size_t,bufsize
)
200 #if defined(TARGET_NR_renameat) && defined(__NR_renameat)
201 _syscall4(int,sys_renameat
,int,olddirfd
,const char *,oldpath
,
202 int,newdirfd
,const char *,newpath
)
204 _syscall3(int,sys_rt_sigqueueinfo
,int,pid
,int,sig
,siginfo_t
*,uinfo
)
205 #ifdef TARGET_NR_symlinkat
206 _syscall3(int,sys_symlinkat
,const char *,oldpath
,
207 int,newdirfd
,const char *,newpath
)
209 _syscall3(int,sys_syslog
,int,type
,char*,bufp
,int,len
)
210 #if defined(TARGET_NR_tgkill) && defined(__NR_tgkill)
211 _syscall3(int,sys_tgkill
,int,tgid
,int,pid
,int,sig
)
213 #if defined(TARGET_NR_tkill) && defined(__NR_tkill)
214 _syscall2(int,sys_tkill
,int,tid
,int,sig
)
216 #ifdef __NR_exit_group
217 _syscall1(int,exit_group
,int,error_code
)
219 #if defined(TARGET_NR_set_tid_address) && defined(__NR_set_tid_address)
220 _syscall1(int,set_tid_address
,int *,tidptr
)
222 #if defined(TARGET_NR_unlinkat) && defined(__NR_unlinkat)
223 _syscall3(int,sys_unlinkat
,int,dirfd
,const char *,pathname
,int,flags
)
226 extern int personality(int);
227 extern int flock(int, int);
228 extern int setfsuid(int);
229 extern int setfsgid(int);
230 extern int setresuid(uid_t
, uid_t
, uid_t
);
231 extern int getresuid(uid_t
*, uid_t
*, uid_t
*);
232 extern int setresgid(gid_t
, gid_t
, gid_t
);
233 extern int getresgid(gid_t
*, gid_t
*, gid_t
*);
234 extern int setgroups(int, gid_t
*);
237 * This list is the union of errno values overridden in asm-<arch>/errno.h
238 * minus the errnos that are not actually generic to all archs.
240 static uint16_t host_to_target_errno_table
[1200] = {
241 [EIDRM
] = TARGET_EIDRM
,
242 [ECHRNG
] = TARGET_ECHRNG
,
243 [EL2NSYNC
] = TARGET_EL2NSYNC
,
244 [EL3HLT
] = TARGET_EL3HLT
,
245 [EL3RST
] = TARGET_EL3RST
,
246 [ELNRNG
] = TARGET_ELNRNG
,
247 [EUNATCH
] = TARGET_EUNATCH
,
248 [ENOCSI
] = TARGET_ENOCSI
,
249 [EL2HLT
] = TARGET_EL2HLT
,
250 [EDEADLK
] = TARGET_EDEADLK
,
251 [ENOLCK
] = TARGET_ENOLCK
,
252 [EBADE
] = TARGET_EBADE
,
253 [EBADR
] = TARGET_EBADR
,
254 [EXFULL
] = TARGET_EXFULL
,
255 [ENOANO
] = TARGET_ENOANO
,
256 [EBADRQC
] = TARGET_EBADRQC
,
257 [EBADSLT
] = TARGET_EBADSLT
,
258 [EBFONT
] = TARGET_EBFONT
,
259 [ENOSTR
] = TARGET_ENOSTR
,
260 [ENODATA
] = TARGET_ENODATA
,
261 [ETIME
] = TARGET_ETIME
,
262 [ENOSR
] = TARGET_ENOSR
,
263 [ENONET
] = TARGET_ENONET
,
264 [ENOPKG
] = TARGET_ENOPKG
,
265 [EREMOTE
] = TARGET_EREMOTE
,
266 [ENOLINK
] = TARGET_ENOLINK
,
267 [EADV
] = TARGET_EADV
,
268 [ESRMNT
] = TARGET_ESRMNT
,
269 [ECOMM
] = TARGET_ECOMM
,
270 [EPROTO
] = TARGET_EPROTO
,
271 [EDOTDOT
] = TARGET_EDOTDOT
,
272 [EMULTIHOP
] = TARGET_EMULTIHOP
,
273 [EBADMSG
] = TARGET_EBADMSG
,
274 [ENAMETOOLONG
] = TARGET_ENAMETOOLONG
,
275 [EOVERFLOW
] = TARGET_EOVERFLOW
,
276 [ENOTUNIQ
] = TARGET_ENOTUNIQ
,
277 [EBADFD
] = TARGET_EBADFD
,
278 [EREMCHG
] = TARGET_EREMCHG
,
279 [ELIBACC
] = TARGET_ELIBACC
,
280 [ELIBBAD
] = TARGET_ELIBBAD
,
281 [ELIBSCN
] = TARGET_ELIBSCN
,
282 [ELIBMAX
] = TARGET_ELIBMAX
,
283 [ELIBEXEC
] = TARGET_ELIBEXEC
,
284 [EILSEQ
] = TARGET_EILSEQ
,
285 [ENOSYS
] = TARGET_ENOSYS
,
286 [ELOOP
] = TARGET_ELOOP
,
287 [ERESTART
] = TARGET_ERESTART
,
288 [ESTRPIPE
] = TARGET_ESTRPIPE
,
289 [ENOTEMPTY
] = TARGET_ENOTEMPTY
,
290 [EUSERS
] = TARGET_EUSERS
,
291 [ENOTSOCK
] = TARGET_ENOTSOCK
,
292 [EDESTADDRREQ
] = TARGET_EDESTADDRREQ
,
293 [EMSGSIZE
] = TARGET_EMSGSIZE
,
294 [EPROTOTYPE
] = TARGET_EPROTOTYPE
,
295 [ENOPROTOOPT
] = TARGET_ENOPROTOOPT
,
296 [EPROTONOSUPPORT
] = TARGET_EPROTONOSUPPORT
,
297 [ESOCKTNOSUPPORT
] = TARGET_ESOCKTNOSUPPORT
,
298 [EOPNOTSUPP
] = TARGET_EOPNOTSUPP
,
299 [EPFNOSUPPORT
] = TARGET_EPFNOSUPPORT
,
300 [EAFNOSUPPORT
] = TARGET_EAFNOSUPPORT
,
301 [EADDRINUSE
] = TARGET_EADDRINUSE
,
302 [EADDRNOTAVAIL
] = TARGET_EADDRNOTAVAIL
,
303 [ENETDOWN
] = TARGET_ENETDOWN
,
304 [ENETUNREACH
] = TARGET_ENETUNREACH
,
305 [ENETRESET
] = TARGET_ENETRESET
,
306 [ECONNABORTED
] = TARGET_ECONNABORTED
,
307 [ECONNRESET
] = TARGET_ECONNRESET
,
308 [ENOBUFS
] = TARGET_ENOBUFS
,
309 [EISCONN
] = TARGET_EISCONN
,
310 [ENOTCONN
] = TARGET_ENOTCONN
,
311 [EUCLEAN
] = TARGET_EUCLEAN
,
312 [ENOTNAM
] = TARGET_ENOTNAM
,
313 [ENAVAIL
] = TARGET_ENAVAIL
,
314 [EISNAM
] = TARGET_EISNAM
,
315 [EREMOTEIO
] = TARGET_EREMOTEIO
,
316 [ESHUTDOWN
] = TARGET_ESHUTDOWN
,
317 [ETOOMANYREFS
] = TARGET_ETOOMANYREFS
,
318 [ETIMEDOUT
] = TARGET_ETIMEDOUT
,
319 [ECONNREFUSED
] = TARGET_ECONNREFUSED
,
320 [EHOSTDOWN
] = TARGET_EHOSTDOWN
,
321 [EHOSTUNREACH
] = TARGET_EHOSTUNREACH
,
322 [EALREADY
] = TARGET_EALREADY
,
323 [EINPROGRESS
] = TARGET_EINPROGRESS
,
324 [ESTALE
] = TARGET_ESTALE
,
325 [ECANCELED
] = TARGET_ECANCELED
,
326 [ENOMEDIUM
] = TARGET_ENOMEDIUM
,
327 [EMEDIUMTYPE
] = TARGET_EMEDIUMTYPE
,
329 [ENOKEY
] = TARGET_ENOKEY
,
332 [EKEYEXPIRED
] = TARGET_EKEYEXPIRED
,
335 [EKEYREVOKED
] = TARGET_EKEYREVOKED
,
338 [EKEYREJECTED
] = TARGET_EKEYREJECTED
,
341 [EOWNERDEAD
] = TARGET_EOWNERDEAD
,
343 #ifdef ENOTRECOVERABLE
344 [ENOTRECOVERABLE
] = TARGET_ENOTRECOVERABLE
,
348 static inline int host_to_target_errno(int err
)
350 if(host_to_target_errno_table
[err
])
351 return host_to_target_errno_table
[err
];
355 static inline long get_errno(long ret
)
358 return -host_to_target_errno(errno
);
363 static inline int is_error(long ret
)
365 return (unsigned long)ret
>= (unsigned long)(-4096);
368 static target_ulong target_brk
;
369 static target_ulong target_original_brk
;
371 void target_set_brk(target_ulong new_brk
)
373 target_original_brk
= target_brk
= HOST_PAGE_ALIGN(new_brk
);
376 long do_brk(target_ulong new_brk
)
378 target_ulong brk_page
;
384 if (new_brk
< target_original_brk
)
387 brk_page
= HOST_PAGE_ALIGN(target_brk
);
389 /* If the new brk is less than this, set it and we're done... */
390 if (new_brk
< brk_page
) {
391 target_brk
= new_brk
;
395 /* We need to allocate more memory after the brk... */
396 new_alloc_size
= HOST_PAGE_ALIGN(new_brk
- brk_page
+ 1);
397 mapped_addr
= get_errno(target_mmap(brk_page
, new_alloc_size
,
398 PROT_READ
|PROT_WRITE
,
399 MAP_ANON
|MAP_FIXED
|MAP_PRIVATE
, 0, 0));
400 if (is_error(mapped_addr
)) {
403 target_brk
= new_brk
;
408 static inline fd_set
*target_to_host_fds(fd_set
*fds
,
409 target_long
*target_fds
, int n
)
411 #if !defined(BSWAP_NEEDED) && !defined(WORDS_BIGENDIAN)
412 return (fd_set
*)target_fds
;
417 for(i
= 0;i
< n
; i
++) {
418 b
= (tswapl(target_fds
[i
/ TARGET_LONG_BITS
]) >>
419 (i
& (TARGET_LONG_BITS
- 1))) & 1;
430 static inline void host_to_target_fds(target_long
*target_fds
,
433 #if !defined(BSWAP_NEEDED) && !defined(WORDS_BIGENDIAN)
440 nw
= (n
+ TARGET_LONG_BITS
- 1) / TARGET_LONG_BITS
;
442 for(i
= 0;i
< nw
; i
++) {
444 for(j
= 0; j
< TARGET_LONG_BITS
; j
++) {
445 v
|= ((FD_ISSET(k
, fds
) != 0) << j
);
448 target_fds
[i
] = tswapl(v
);
454 #if defined(__alpha__)
460 static inline long host_to_target_clock_t(long ticks
)
462 #if HOST_HZ == TARGET_HZ
465 return ((int64_t)ticks
* TARGET_HZ
) / HOST_HZ
;
469 static inline void host_to_target_rusage(target_ulong target_addr
,
470 const struct rusage
*rusage
)
472 struct target_rusage
*target_rusage
;
474 lock_user_struct(target_rusage
, target_addr
, 0);
475 target_rusage
->ru_utime
.tv_sec
= tswapl(rusage
->ru_utime
.tv_sec
);
476 target_rusage
->ru_utime
.tv_usec
= tswapl(rusage
->ru_utime
.tv_usec
);
477 target_rusage
->ru_stime
.tv_sec
= tswapl(rusage
->ru_stime
.tv_sec
);
478 target_rusage
->ru_stime
.tv_usec
= tswapl(rusage
->ru_stime
.tv_usec
);
479 target_rusage
->ru_maxrss
= tswapl(rusage
->ru_maxrss
);
480 target_rusage
->ru_ixrss
= tswapl(rusage
->ru_ixrss
);
481 target_rusage
->ru_idrss
= tswapl(rusage
->ru_idrss
);
482 target_rusage
->ru_isrss
= tswapl(rusage
->ru_isrss
);
483 target_rusage
->ru_minflt
= tswapl(rusage
->ru_minflt
);
484 target_rusage
->ru_majflt
= tswapl(rusage
->ru_majflt
);
485 target_rusage
->ru_nswap
= tswapl(rusage
->ru_nswap
);
486 target_rusage
->ru_inblock
= tswapl(rusage
->ru_inblock
);
487 target_rusage
->ru_oublock
= tswapl(rusage
->ru_oublock
);
488 target_rusage
->ru_msgsnd
= tswapl(rusage
->ru_msgsnd
);
489 target_rusage
->ru_msgrcv
= tswapl(rusage
->ru_msgrcv
);
490 target_rusage
->ru_nsignals
= tswapl(rusage
->ru_nsignals
);
491 target_rusage
->ru_nvcsw
= tswapl(rusage
->ru_nvcsw
);
492 target_rusage
->ru_nivcsw
= tswapl(rusage
->ru_nivcsw
);
493 unlock_user_struct(target_rusage
, target_addr
, 1);
496 static inline void target_to_host_timeval(struct timeval
*tv
,
497 target_ulong target_addr
)
499 struct target_timeval
*target_tv
;
501 lock_user_struct(target_tv
, target_addr
, 1);
502 tv
->tv_sec
= tswapl(target_tv
->tv_sec
);
503 tv
->tv_usec
= tswapl(target_tv
->tv_usec
);
504 unlock_user_struct(target_tv
, target_addr
, 0);
507 static inline void host_to_target_timeval(target_ulong target_addr
,
508 const struct timeval
*tv
)
510 struct target_timeval
*target_tv
;
512 lock_user_struct(target_tv
, target_addr
, 0);
513 target_tv
->tv_sec
= tswapl(tv
->tv_sec
);
514 target_tv
->tv_usec
= tswapl(tv
->tv_usec
);
515 unlock_user_struct(target_tv
, target_addr
, 1);
519 static long do_select(long n
,
520 target_ulong rfd_p
, target_ulong wfd_p
,
521 target_ulong efd_p
, target_ulong target_tv
)
523 fd_set rfds
, wfds
, efds
;
524 fd_set
*rfds_ptr
, *wfds_ptr
, *efds_ptr
;
525 target_long
*target_rfds
, *target_wfds
, *target_efds
;
526 struct timeval tv
, *tv_ptr
;
531 target_rfds
= lock_user(rfd_p
, sizeof(target_long
) * n
, 1);
532 rfds_ptr
= target_to_host_fds(&rfds
, target_rfds
, n
);
538 target_wfds
= lock_user(wfd_p
, sizeof(target_long
) * n
, 1);
539 wfds_ptr
= target_to_host_fds(&wfds
, target_wfds
, n
);
545 target_efds
= lock_user(efd_p
, sizeof(target_long
) * n
, 1);
546 efds_ptr
= target_to_host_fds(&efds
, target_efds
, n
);
553 target_to_host_timeval(&tv
, target_tv
);
558 ret
= get_errno(select(n
, rfds_ptr
, wfds_ptr
, efds_ptr
, tv_ptr
));
562 host_to_target_fds(target_rfds
, rfds_ptr
, n
);
563 host_to_target_fds(target_wfds
, wfds_ptr
, n
);
564 host_to_target_fds(target_efds
, efds_ptr
, n
);
567 host_to_target_timeval(target_tv
, &tv
);
571 unlock_user(target_rfds
, rfd_p
, ok
? sizeof(target_long
) * n
: 0);
573 unlock_user(target_wfds
, wfd_p
, ok
? sizeof(target_long
) * n
: 0);
575 unlock_user(target_efds
, efd_p
, ok
? sizeof(target_long
) * n
: 0);
580 static inline void target_to_host_sockaddr(struct sockaddr
*addr
,
581 target_ulong target_addr
,
584 struct target_sockaddr
*target_saddr
;
586 target_saddr
= lock_user(target_addr
, len
, 1);
587 memcpy(addr
, target_saddr
, len
);
588 addr
->sa_family
= tswap16(target_saddr
->sa_family
);
589 unlock_user(target_saddr
, target_addr
, 0);
592 static inline void host_to_target_sockaddr(target_ulong target_addr
,
593 struct sockaddr
*addr
,
596 struct target_sockaddr
*target_saddr
;
598 target_saddr
= lock_user(target_addr
, len
, 0);
599 memcpy(target_saddr
, addr
, len
);
600 target_saddr
->sa_family
= tswap16(addr
->sa_family
);
601 unlock_user(target_saddr
, target_addr
, len
);
604 /* ??? Should this also swap msgh->name? */
605 static inline void target_to_host_cmsg(struct msghdr
*msgh
,
606 struct target_msghdr
*target_msgh
)
608 struct cmsghdr
*cmsg
= CMSG_FIRSTHDR(msgh
);
609 struct target_cmsghdr
*target_cmsg
= TARGET_CMSG_FIRSTHDR(target_msgh
);
612 while (cmsg
&& target_cmsg
) {
613 void *data
= CMSG_DATA(cmsg
);
614 void *target_data
= TARGET_CMSG_DATA(target_cmsg
);
616 int len
= tswapl(target_cmsg
->cmsg_len
)
617 - TARGET_CMSG_ALIGN(sizeof (struct target_cmsghdr
));
619 space
+= CMSG_SPACE(len
);
620 if (space
> msgh
->msg_controllen
) {
621 space
-= CMSG_SPACE(len
);
622 gemu_log("Host cmsg overflow\n");
626 cmsg
->cmsg_level
= tswap32(target_cmsg
->cmsg_level
);
627 cmsg
->cmsg_type
= tswap32(target_cmsg
->cmsg_type
);
628 cmsg
->cmsg_len
= CMSG_LEN(len
);
630 if (cmsg
->cmsg_level
!= TARGET_SOL_SOCKET
|| cmsg
->cmsg_type
!= SCM_RIGHTS
) {
631 gemu_log("Unsupported ancillary data: %d/%d\n", cmsg
->cmsg_level
, cmsg
->cmsg_type
);
632 memcpy(data
, target_data
, len
);
634 int *fd
= (int *)data
;
635 int *target_fd
= (int *)target_data
;
636 int i
, numfds
= len
/ sizeof(int);
638 for (i
= 0; i
< numfds
; i
++)
639 fd
[i
] = tswap32(target_fd
[i
]);
642 cmsg
= CMSG_NXTHDR(msgh
, cmsg
);
643 target_cmsg
= TARGET_CMSG_NXTHDR(target_msgh
, target_cmsg
);
646 msgh
->msg_controllen
= space
;
649 /* ??? Should this also swap msgh->name? */
650 static inline void host_to_target_cmsg(struct target_msghdr
*target_msgh
,
653 struct cmsghdr
*cmsg
= CMSG_FIRSTHDR(msgh
);
654 struct target_cmsghdr
*target_cmsg
= TARGET_CMSG_FIRSTHDR(target_msgh
);
657 while (cmsg
&& target_cmsg
) {
658 void *data
= CMSG_DATA(cmsg
);
659 void *target_data
= TARGET_CMSG_DATA(target_cmsg
);
661 int len
= cmsg
->cmsg_len
- CMSG_ALIGN(sizeof (struct cmsghdr
));
663 space
+= TARGET_CMSG_SPACE(len
);
664 if (space
> tswapl(target_msgh
->msg_controllen
)) {
665 space
-= TARGET_CMSG_SPACE(len
);
666 gemu_log("Target cmsg overflow\n");
670 target_cmsg
->cmsg_level
= tswap32(cmsg
->cmsg_level
);
671 target_cmsg
->cmsg_type
= tswap32(cmsg
->cmsg_type
);
672 target_cmsg
->cmsg_len
= tswapl(TARGET_CMSG_LEN(len
));
674 if (cmsg
->cmsg_level
!= TARGET_SOL_SOCKET
|| cmsg
->cmsg_type
!= SCM_RIGHTS
) {
675 gemu_log("Unsupported ancillary data: %d/%d\n", cmsg
->cmsg_level
, cmsg
->cmsg_type
);
676 memcpy(target_data
, data
, len
);
678 int *fd
= (int *)data
;
679 int *target_fd
= (int *)target_data
;
680 int i
, numfds
= len
/ sizeof(int);
682 for (i
= 0; i
< numfds
; i
++)
683 target_fd
[i
] = tswap32(fd
[i
]);
686 cmsg
= CMSG_NXTHDR(msgh
, cmsg
);
687 target_cmsg
= TARGET_CMSG_NXTHDR(target_msgh
, target_cmsg
);
690 msgh
->msg_controllen
= tswapl(space
);
693 static long do_setsockopt(int sockfd
, int level
, int optname
,
694 target_ulong optval
, socklen_t optlen
)
700 /* TCP options all take an 'int' value. */
701 if (optlen
< sizeof(uint32_t))
704 val
= tget32(optval
);
705 ret
= get_errno(setsockopt(sockfd
, level
, optname
, &val
, sizeof(val
)));
712 case IP_ROUTER_ALERT
:
716 case IP_MTU_DISCOVER
:
722 case IP_MULTICAST_TTL
:
723 case IP_MULTICAST_LOOP
:
725 if (optlen
>= sizeof(uint32_t)) {
726 val
= tget32(optval
);
727 } else if (optlen
>= 1) {
730 ret
= get_errno(setsockopt(sockfd
, level
, optname
, &val
, sizeof(val
)));
736 case TARGET_SOL_SOCKET
:
738 /* Options with 'int' argument. */
739 case TARGET_SO_DEBUG
:
742 case TARGET_SO_REUSEADDR
:
743 optname
= SO_REUSEADDR
;
748 case TARGET_SO_ERROR
:
751 case TARGET_SO_DONTROUTE
:
752 optname
= SO_DONTROUTE
;
754 case TARGET_SO_BROADCAST
:
755 optname
= SO_BROADCAST
;
757 case TARGET_SO_SNDBUF
:
760 case TARGET_SO_RCVBUF
:
763 case TARGET_SO_KEEPALIVE
:
764 optname
= SO_KEEPALIVE
;
766 case TARGET_SO_OOBINLINE
:
767 optname
= SO_OOBINLINE
;
769 case TARGET_SO_NO_CHECK
:
770 optname
= SO_NO_CHECK
;
772 case TARGET_SO_PRIORITY
:
773 optname
= SO_PRIORITY
;
776 case TARGET_SO_BSDCOMPAT
:
777 optname
= SO_BSDCOMPAT
;
780 case TARGET_SO_PASSCRED
:
781 optname
= SO_PASSCRED
;
783 case TARGET_SO_TIMESTAMP
:
784 optname
= SO_TIMESTAMP
;
786 case TARGET_SO_RCVLOWAT
:
787 optname
= SO_RCVLOWAT
;
789 case TARGET_SO_RCVTIMEO
:
790 optname
= SO_RCVTIMEO
;
792 case TARGET_SO_SNDTIMEO
:
793 optname
= SO_SNDTIMEO
;
799 if (optlen
< sizeof(uint32_t))
802 val
= tget32(optval
);
803 ret
= get_errno(setsockopt(sockfd
, SOL_SOCKET
, optname
, &val
, sizeof(val
)));
807 gemu_log("Unsupported setsockopt level=%d optname=%d \n", level
, optname
);
813 static long do_getsockopt(int sockfd
, int level
, int optname
,
814 target_ulong optval
, target_ulong optlen
)
816 int len
, lv
, val
, ret
;
819 case TARGET_SOL_SOCKET
:
822 case TARGET_SO_LINGER
:
823 case TARGET_SO_RCVTIMEO
:
824 case TARGET_SO_SNDTIMEO
:
825 case TARGET_SO_PEERCRED
:
826 case TARGET_SO_PEERNAME
:
827 /* These don't just return a single integer */
834 /* TCP options all take an 'int' value. */
836 len
= tget32(optlen
);
840 ret
= get_errno(getsockopt(sockfd
, level
, optname
, &val
, &lv
));
857 case IP_ROUTER_ALERT
:
861 case IP_MTU_DISCOVER
:
867 case IP_MULTICAST_TTL
:
868 case IP_MULTICAST_LOOP
:
869 len
= tget32(optlen
);
873 ret
= get_errno(getsockopt(sockfd
, level
, optname
, &val
, &lv
));
876 if (len
< sizeof(int) && len
> 0 && val
>= 0 && val
< 255) {
881 if (len
> sizeof(int))
893 gemu_log("getsockopt level=%d optname=%d not yet supported\n",
901 static void lock_iovec(struct iovec
*vec
, target_ulong target_addr
,
904 struct target_iovec
*target_vec
;
908 target_vec
= lock_user(target_addr
, count
* sizeof(struct target_iovec
), 1);
909 for(i
= 0;i
< count
; i
++) {
910 base
= tswapl(target_vec
[i
].iov_base
);
911 vec
[i
].iov_len
= tswapl(target_vec
[i
].iov_len
);
912 vec
[i
].iov_base
= lock_user(base
, vec
[i
].iov_len
, copy
);
914 unlock_user (target_vec
, target_addr
, 0);
917 static void unlock_iovec(struct iovec
*vec
, target_ulong target_addr
,
920 struct target_iovec
*target_vec
;
924 target_vec
= lock_user(target_addr
, count
* sizeof(struct target_iovec
), 1);
925 for(i
= 0;i
< count
; i
++) {
926 base
= tswapl(target_vec
[i
].iov_base
);
927 unlock_user(vec
[i
].iov_base
, base
, copy
? vec
[i
].iov_len
: 0);
929 unlock_user (target_vec
, target_addr
, 0);
932 static long do_socket(int domain
, int type
, int protocol
)
934 #if defined(TARGET_MIPS)
936 case TARGET_SOCK_DGRAM
:
939 case TARGET_SOCK_STREAM
:
942 case TARGET_SOCK_RAW
:
945 case TARGET_SOCK_RDM
:
948 case TARGET_SOCK_SEQPACKET
:
949 type
= SOCK_SEQPACKET
;
951 case TARGET_SOCK_PACKET
:
956 return get_errno(socket(domain
, type
, protocol
));
959 static long do_bind(int sockfd
, target_ulong target_addr
,
962 void *addr
= alloca(addrlen
);
964 target_to_host_sockaddr(addr
, target_addr
, addrlen
);
965 return get_errno(bind(sockfd
, addr
, addrlen
));
968 static long do_connect(int sockfd
, target_ulong target_addr
,
971 void *addr
= alloca(addrlen
);
973 target_to_host_sockaddr(addr
, target_addr
, addrlen
);
974 return get_errno(connect(sockfd
, addr
, addrlen
));
977 static long do_sendrecvmsg(int fd
, target_ulong target_msg
,
981 struct target_msghdr
*msgp
;
985 target_ulong target_vec
;
987 lock_user_struct(msgp
, target_msg
, 1);
988 if (msgp
->msg_name
) {
989 msg
.msg_namelen
= tswap32(msgp
->msg_namelen
);
990 msg
.msg_name
= alloca(msg
.msg_namelen
);
991 target_to_host_sockaddr(msg
.msg_name
, tswapl(msgp
->msg_name
),
997 msg
.msg_controllen
= 2 * tswapl(msgp
->msg_controllen
);
998 msg
.msg_control
= alloca(msg
.msg_controllen
);
999 msg
.msg_flags
= tswap32(msgp
->msg_flags
);
1001 count
= tswapl(msgp
->msg_iovlen
);
1002 vec
= alloca(count
* sizeof(struct iovec
));
1003 target_vec
= tswapl(msgp
->msg_iov
);
1004 lock_iovec(vec
, target_vec
, count
, send
);
1005 msg
.msg_iovlen
= count
;
1009 target_to_host_cmsg(&msg
, msgp
);
1010 ret
= get_errno(sendmsg(fd
, &msg
, flags
));
1012 ret
= get_errno(recvmsg(fd
, &msg
, flags
));
1014 host_to_target_cmsg(msgp
, &msg
);
1016 unlock_iovec(vec
, target_vec
, count
, !send
);
1020 static long do_accept(int fd
, target_ulong target_addr
,
1021 target_ulong target_addrlen
)
1023 socklen_t addrlen
= tget32(target_addrlen
);
1024 void *addr
= alloca(addrlen
);
1027 ret
= get_errno(accept(fd
, addr
, &addrlen
));
1028 if (!is_error(ret
)) {
1029 host_to_target_sockaddr(target_addr
, addr
, addrlen
);
1030 tput32(target_addrlen
, addrlen
);
1035 static long do_getpeername(int fd
, target_ulong target_addr
,
1036 target_ulong target_addrlen
)
1038 socklen_t addrlen
= tget32(target_addrlen
);
1039 void *addr
= alloca(addrlen
);
1042 ret
= get_errno(getpeername(fd
, addr
, &addrlen
));
1043 if (!is_error(ret
)) {
1044 host_to_target_sockaddr(target_addr
, addr
, addrlen
);
1045 tput32(target_addrlen
, addrlen
);
1050 static long do_getsockname(int fd
, target_ulong target_addr
,
1051 target_ulong target_addrlen
)
1053 socklen_t addrlen
= tget32(target_addrlen
);
1054 void *addr
= alloca(addrlen
);
1057 ret
= get_errno(getsockname(fd
, addr
, &addrlen
));
1058 if (!is_error(ret
)) {
1059 host_to_target_sockaddr(target_addr
, addr
, addrlen
);
1060 tput32(target_addrlen
, addrlen
);
1065 static long do_socketpair(int domain
, int type
, int protocol
,
1066 target_ulong target_tab
)
1071 ret
= get_errno(socketpair(domain
, type
, protocol
, tab
));
1072 if (!is_error(ret
)) {
1073 tput32(target_tab
, tab
[0]);
1074 tput32(target_tab
+ 4, tab
[1]);
1079 static long do_sendto(int fd
, target_ulong msg
, size_t len
, int flags
,
1080 target_ulong target_addr
, socklen_t addrlen
)
1086 host_msg
= lock_user(msg
, len
, 1);
1088 addr
= alloca(addrlen
);
1089 target_to_host_sockaddr(addr
, target_addr
, addrlen
);
1090 ret
= get_errno(sendto(fd
, host_msg
, len
, flags
, addr
, addrlen
));
1092 ret
= get_errno(send(fd
, host_msg
, len
, flags
));
1094 unlock_user(host_msg
, msg
, 0);
1098 static long do_recvfrom(int fd
, target_ulong msg
, size_t len
, int flags
,
1099 target_ulong target_addr
, target_ulong target_addrlen
)
1106 host_msg
= lock_user(msg
, len
, 0);
1108 addrlen
= tget32(target_addrlen
);
1109 addr
= alloca(addrlen
);
1110 ret
= get_errno(recvfrom(fd
, host_msg
, len
, flags
, addr
, &addrlen
));
1112 addr
= NULL
; /* To keep compiler quiet. */
1113 ret
= get_errno(recv(fd
, host_msg
, len
, flags
));
1115 if (!is_error(ret
)) {
1117 host_to_target_sockaddr(target_addr
, addr
, addrlen
);
1118 tput32(target_addrlen
, addrlen
);
1120 unlock_user(host_msg
, msg
, len
);
1122 unlock_user(host_msg
, msg
, 0);
1127 static long do_socketcall(int num
, target_ulong vptr
)
1130 const int n
= sizeof(target_ulong
);
1135 int domain
= tgetl(vptr
);
1136 int type
= tgetl(vptr
+ n
);
1137 int protocol
= tgetl(vptr
+ 2 * n
);
1138 ret
= do_socket(domain
, type
, protocol
);
1143 int sockfd
= tgetl(vptr
);
1144 target_ulong target_addr
= tgetl(vptr
+ n
);
1145 socklen_t addrlen
= tgetl(vptr
+ 2 * n
);
1146 ret
= do_bind(sockfd
, target_addr
, addrlen
);
1149 case SOCKOP_connect
:
1151 int sockfd
= tgetl(vptr
);
1152 target_ulong target_addr
= tgetl(vptr
+ n
);
1153 socklen_t addrlen
= tgetl(vptr
+ 2 * n
);
1154 ret
= do_connect(sockfd
, target_addr
, addrlen
);
1159 int sockfd
= tgetl(vptr
);
1160 int backlog
= tgetl(vptr
+ n
);
1161 ret
= get_errno(listen(sockfd
, backlog
));
1166 int sockfd
= tgetl(vptr
);
1167 target_ulong target_addr
= tgetl(vptr
+ n
);
1168 target_ulong target_addrlen
= tgetl(vptr
+ 2 * n
);
1169 ret
= do_accept(sockfd
, target_addr
, target_addrlen
);
1172 case SOCKOP_getsockname
:
1174 int sockfd
= tgetl(vptr
);
1175 target_ulong target_addr
= tgetl(vptr
+ n
);
1176 target_ulong target_addrlen
= tgetl(vptr
+ 2 * n
);
1177 ret
= do_getsockname(sockfd
, target_addr
, target_addrlen
);
1180 case SOCKOP_getpeername
:
1182 int sockfd
= tgetl(vptr
);
1183 target_ulong target_addr
= tgetl(vptr
+ n
);
1184 target_ulong target_addrlen
= tgetl(vptr
+ 2 * n
);
1185 ret
= do_getpeername(sockfd
, target_addr
, target_addrlen
);
1188 case SOCKOP_socketpair
:
1190 int domain
= tgetl(vptr
);
1191 int type
= tgetl(vptr
+ n
);
1192 int protocol
= tgetl(vptr
+ 2 * n
);
1193 target_ulong tab
= tgetl(vptr
+ 3 * n
);
1194 ret
= do_socketpair(domain
, type
, protocol
, tab
);
1199 int sockfd
= tgetl(vptr
);
1200 target_ulong msg
= tgetl(vptr
+ n
);
1201 size_t len
= tgetl(vptr
+ 2 * n
);
1202 int flags
= tgetl(vptr
+ 3 * n
);
1203 ret
= do_sendto(sockfd
, msg
, len
, flags
, 0, 0);
1208 int sockfd
= tgetl(vptr
);
1209 target_ulong msg
= tgetl(vptr
+ n
);
1210 size_t len
= tgetl(vptr
+ 2 * n
);
1211 int flags
= tgetl(vptr
+ 3 * n
);
1212 ret
= do_recvfrom(sockfd
, msg
, len
, flags
, 0, 0);
1217 int sockfd
= tgetl(vptr
);
1218 target_ulong msg
= tgetl(vptr
+ n
);
1219 size_t len
= tgetl(vptr
+ 2 * n
);
1220 int flags
= tgetl(vptr
+ 3 * n
);
1221 target_ulong addr
= tgetl(vptr
+ 4 * n
);
1222 socklen_t addrlen
= tgetl(vptr
+ 5 * n
);
1223 ret
= do_sendto(sockfd
, msg
, len
, flags
, addr
, addrlen
);
1226 case SOCKOP_recvfrom
:
1228 int sockfd
= tgetl(vptr
);
1229 target_ulong msg
= tgetl(vptr
+ n
);
1230 size_t len
= tgetl(vptr
+ 2 * n
);
1231 int flags
= tgetl(vptr
+ 3 * n
);
1232 target_ulong addr
= tgetl(vptr
+ 4 * n
);
1233 target_ulong addrlen
= tgetl(vptr
+ 5 * n
);
1234 ret
= do_recvfrom(sockfd
, msg
, len
, flags
, addr
, addrlen
);
1237 case SOCKOP_shutdown
:
1239 int sockfd
= tgetl(vptr
);
1240 int how
= tgetl(vptr
+ n
);
1242 ret
= get_errno(shutdown(sockfd
, how
));
1245 case SOCKOP_sendmsg
:
1246 case SOCKOP_recvmsg
:
1249 target_ulong target_msg
;
1253 target_msg
= tgetl(vptr
+ n
);
1254 flags
= tgetl(vptr
+ 2 * n
);
1256 ret
= do_sendrecvmsg(fd
, target_msg
, flags
,
1257 (num
== SOCKOP_sendmsg
));
1260 case SOCKOP_setsockopt
:
1262 int sockfd
= tgetl(vptr
);
1263 int level
= tgetl(vptr
+ n
);
1264 int optname
= tgetl(vptr
+ 2 * n
);
1265 target_ulong optval
= tgetl(vptr
+ 3 * n
);
1266 socklen_t optlen
= tgetl(vptr
+ 4 * n
);
1268 ret
= do_setsockopt(sockfd
, level
, optname
, optval
, optlen
);
1271 case SOCKOP_getsockopt
:
1273 int sockfd
= tgetl(vptr
);
1274 int level
= tgetl(vptr
+ n
);
1275 int optname
= tgetl(vptr
+ 2 * n
);
1276 target_ulong optval
= tgetl(vptr
+ 3 * n
);
1277 target_ulong poptlen
= tgetl(vptr
+ 4 * n
);
1279 ret
= do_getsockopt(sockfd
, level
, optname
, optval
, poptlen
);
1283 gemu_log("Unsupported socketcall: %d\n", num
);
1290 #define N_SHM_REGIONS 32
1292 static struct shm_region
{
1295 } shm_regions
[N_SHM_REGIONS
];
1297 struct target_ipc_perm
1304 unsigned short int mode
;
1305 unsigned short int __pad1
;
1306 unsigned short int __seq
;
1307 unsigned short int __pad2
;
1308 target_ulong __unused1
;
1309 target_ulong __unused2
;
1312 struct target_semid_ds
1314 struct target_ipc_perm sem_perm
;
1315 target_ulong sem_otime
;
1316 target_ulong __unused1
;
1317 target_ulong sem_ctime
;
1318 target_ulong __unused2
;
1319 target_ulong sem_nsems
;
1320 target_ulong __unused3
;
1321 target_ulong __unused4
;
1324 static inline void target_to_host_ipc_perm(struct ipc_perm
*host_ip
,
1325 target_ulong target_addr
)
1327 struct target_ipc_perm
*target_ip
;
1328 struct target_semid_ds
*target_sd
;
1330 lock_user_struct(target_sd
, target_addr
, 1);
1331 target_ip
=&(target_sd
->sem_perm
);
1332 host_ip
->__key
= tswapl(target_ip
->__key
);
1333 host_ip
->uid
= tswapl(target_ip
->uid
);
1334 host_ip
->gid
= tswapl(target_ip
->gid
);
1335 host_ip
->cuid
= tswapl(target_ip
->cuid
);
1336 host_ip
->cgid
= tswapl(target_ip
->cgid
);
1337 host_ip
->mode
= tswapl(target_ip
->mode
);
1338 unlock_user_struct(target_sd
, target_addr
, 0);
1341 static inline void host_to_target_ipc_perm(target_ulong target_addr
,
1342 struct ipc_perm
*host_ip
)
1344 struct target_ipc_perm
*target_ip
;
1345 struct target_semid_ds
*target_sd
;
1347 lock_user_struct(target_sd
, target_addr
, 0);
1348 target_ip
= &(target_sd
->sem_perm
);
1349 target_ip
->__key
= tswapl(host_ip
->__key
);
1350 target_ip
->uid
= tswapl(host_ip
->uid
);
1351 target_ip
->gid
= tswapl(host_ip
->gid
);
1352 target_ip
->cuid
= tswapl(host_ip
->cuid
);
1353 target_ip
->cgid
= tswapl(host_ip
->cgid
);
1354 target_ip
->mode
= tswapl(host_ip
->mode
);
1355 unlock_user_struct(target_sd
, target_addr
, 1);
1358 static inline void target_to_host_semid_ds(struct semid_ds
*host_sd
,
1359 target_ulong target_addr
)
1361 struct target_semid_ds
*target_sd
;
1363 lock_user_struct(target_sd
, target_addr
, 1);
1364 target_to_host_ipc_perm(&(host_sd
->sem_perm
),target_addr
);
1365 host_sd
->sem_nsems
= tswapl(target_sd
->sem_nsems
);
1366 host_sd
->sem_otime
= tswapl(target_sd
->sem_otime
);
1367 host_sd
->sem_ctime
= tswapl(target_sd
->sem_ctime
);
1368 unlock_user_struct(target_sd
, target_addr
, 0);
1371 static inline void host_to_target_semid_ds(target_ulong target_addr
,
1372 struct semid_ds
*host_sd
)
1374 struct target_semid_ds
*target_sd
;
1376 lock_user_struct(target_sd
, target_addr
, 0);
1377 host_to_target_ipc_perm(target_addr
,&(host_sd
->sem_perm
));
1378 target_sd
->sem_nsems
= tswapl(host_sd
->sem_nsems
);
1379 target_sd
->sem_otime
= tswapl(host_sd
->sem_otime
);
1380 target_sd
->sem_ctime
= tswapl(host_sd
->sem_ctime
);
1381 unlock_user_struct(target_sd
, target_addr
, 1);
1386 struct semid_ds
*buf
;
1387 unsigned short *array
;
1390 union target_semun
{
1393 unsigned short int *array
;
1396 static inline void target_to_host_semun(unsigned long cmd
,
1397 union semun
*host_su
,
1398 target_ulong target_addr
,
1399 struct semid_ds
*ds
)
1401 union target_semun
*target_su
;
1406 lock_user_struct(target_su
, target_addr
, 1);
1407 target_to_host_semid_ds(ds
,target_su
->buf
);
1409 unlock_user_struct(target_su
, target_addr
, 0);
1413 lock_user_struct(target_su
, target_addr
, 1);
1414 host_su
->val
= tswapl(target_su
->val
);
1415 unlock_user_struct(target_su
, target_addr
, 0);
1419 lock_user_struct(target_su
, target_addr
, 1);
1420 *host_su
->array
= tswap16(*target_su
->array
);
1421 unlock_user_struct(target_su
, target_addr
, 0);
1424 gemu_log("semun operation not fully supported: %d\n", (int)cmd
);
1428 static inline void host_to_target_semun(unsigned long cmd
,
1429 target_ulong target_addr
,
1430 union semun
*host_su
,
1431 struct semid_ds
*ds
)
1433 union target_semun
*target_su
;
1438 lock_user_struct(target_su
, target_addr
, 0);
1439 host_to_target_semid_ds(target_su
->buf
,ds
);
1440 unlock_user_struct(target_su
, target_addr
, 1);
1444 lock_user_struct(target_su
, target_addr
, 0);
1445 target_su
->val
= tswapl(host_su
->val
);
1446 unlock_user_struct(target_su
, target_addr
, 1);
1450 lock_user_struct(target_su
, target_addr
, 0);
1451 *target_su
->array
= tswap16(*host_su
->array
);
1452 unlock_user_struct(target_su
, target_addr
, 1);
1455 gemu_log("semun operation not fully supported: %d\n", (int)cmd
);
1459 static inline long do_semctl(long first
, long second
, long third
, long ptr
)
1462 struct semid_ds dsarg
;
1463 int cmd
= third
&0xff;
1468 target_to_host_semun(cmd
,&arg
,ptr
,&dsarg
);
1469 ret
= get_errno(semctl(first
, second
, cmd
, arg
));
1470 host_to_target_semun(cmd
,ptr
,&arg
,&dsarg
);
1473 target_to_host_semun(cmd
,&arg
,ptr
,&dsarg
);
1474 ret
= get_errno(semctl(first
, second
, cmd
, arg
));
1475 host_to_target_semun(cmd
,ptr
,&arg
,&dsarg
);
1478 target_to_host_semun(cmd
,&arg
,ptr
,&dsarg
);
1479 ret
= get_errno(semctl(first
, second
, cmd
, arg
));
1480 host_to_target_semun(cmd
,ptr
,&arg
,&dsarg
);
1483 target_to_host_semun(cmd
,&arg
,ptr
,&dsarg
);
1484 ret
= get_errno(semctl(first
, second
, cmd
, arg
));
1485 host_to_target_semun(cmd
,ptr
,&arg
,&dsarg
);
1488 target_to_host_semun(cmd
,&arg
,ptr
,&dsarg
);
1489 ret
= get_errno(semctl(first
, second
, cmd
, arg
));
1490 host_to_target_semun(cmd
,ptr
,&arg
,&dsarg
);
1493 target_to_host_semun(cmd
,&arg
,ptr
,&dsarg
);
1494 ret
= get_errno(semctl(first
, second
, cmd
, arg
));
1495 host_to_target_semun(cmd
,ptr
,&arg
,&dsarg
);
1498 ret
= get_errno(semctl(first
, second
, cmd
, arg
));
1504 struct target_msqid_ds
1506 struct target_ipc_perm msg_perm
;
1507 target_ulong msg_stime
;
1508 target_ulong __unused1
;
1509 target_ulong msg_rtime
;
1510 target_ulong __unused2
;
1511 target_ulong msg_ctime
;
1512 target_ulong __unused3
;
1513 target_ulong __msg_cbytes
;
1514 target_ulong msg_qnum
;
1515 target_ulong msg_qbytes
;
1516 target_ulong msg_lspid
;
1517 target_ulong msg_lrpid
;
1518 target_ulong __unused4
;
1519 target_ulong __unused5
;
1522 static inline void target_to_host_msqid_ds(struct msqid_ds
*host_md
,
1523 target_ulong target_addr
)
1525 struct target_msqid_ds
*target_md
;
1527 lock_user_struct(target_md
, target_addr
, 1);
1528 target_to_host_ipc_perm(&(host_md
->msg_perm
),target_addr
);
1529 host_md
->msg_stime
= tswapl(target_md
->msg_stime
);
1530 host_md
->msg_rtime
= tswapl(target_md
->msg_rtime
);
1531 host_md
->msg_ctime
= tswapl(target_md
->msg_ctime
);
1532 host_md
->__msg_cbytes
= tswapl(target_md
->__msg_cbytes
);
1533 host_md
->msg_qnum
= tswapl(target_md
->msg_qnum
);
1534 host_md
->msg_qbytes
= tswapl(target_md
->msg_qbytes
);
1535 host_md
->msg_lspid
= tswapl(target_md
->msg_lspid
);
1536 host_md
->msg_lrpid
= tswapl(target_md
->msg_lrpid
);
1537 unlock_user_struct(target_md
, target_addr
, 0);
1540 static inline void host_to_target_msqid_ds(target_ulong target_addr
,
1541 struct msqid_ds
*host_md
)
1543 struct target_msqid_ds
*target_md
;
1545 lock_user_struct(target_md
, target_addr
, 0);
1546 host_to_target_ipc_perm(target_addr
,&(host_md
->msg_perm
));
1547 target_md
->msg_stime
= tswapl(host_md
->msg_stime
);
1548 target_md
->msg_rtime
= tswapl(host_md
->msg_rtime
);
1549 target_md
->msg_ctime
= tswapl(host_md
->msg_ctime
);
1550 target_md
->__msg_cbytes
= tswapl(host_md
->__msg_cbytes
);
1551 target_md
->msg_qnum
= tswapl(host_md
->msg_qnum
);
1552 target_md
->msg_qbytes
= tswapl(host_md
->msg_qbytes
);
1553 target_md
->msg_lspid
= tswapl(host_md
->msg_lspid
);
1554 target_md
->msg_lrpid
= tswapl(host_md
->msg_lrpid
);
1555 unlock_user_struct(target_md
, target_addr
, 1);
1558 static inline long do_msgctl(long first
, long second
, long ptr
)
1560 struct msqid_ds dsarg
;
1561 int cmd
= second
&0xff;
1566 target_to_host_msqid_ds(&dsarg
,ptr
);
1567 ret
= get_errno(msgctl(first
, cmd
, &dsarg
));
1568 host_to_target_msqid_ds(ptr
,&dsarg
);
1570 ret
= get_errno(msgctl(first
, cmd
, &dsarg
));
1575 struct target_msgbuf
{
1580 static inline long do_msgsnd(long msqid
, long msgp
, long msgsz
, long msgflg
)
1582 struct target_msgbuf
*target_mb
;
1583 struct msgbuf
*host_mb
;
1586 lock_user_struct(target_mb
,msgp
,0);
1587 host_mb
= malloc(msgsz
+sizeof(long));
1588 host_mb
->mtype
= tswapl(target_mb
->mtype
);
1589 memcpy(host_mb
->mtext
,target_mb
->mtext
,msgsz
);
1590 ret
= get_errno(msgsnd(msqid
, host_mb
, msgsz
, msgflg
));
1592 unlock_user_struct(target_mb
, msgp
, 0);
1597 static inline long do_msgrcv(long msqid
, long msgp
, long msgsz
, long msgtype
, long msgflg
)
1599 struct target_msgbuf
*target_mb
;
1600 struct msgbuf
*host_mb
;
1603 lock_user_struct(target_mb
, msgp
, 0);
1604 host_mb
= malloc(msgsz
+sizeof(long));
1605 ret
= get_errno(msgrcv(msqid
, host_mb
, msgsz
, 1, msgflg
));
1607 memcpy(target_mb
->mtext
, host_mb
->mtext
, ret
);
1608 target_mb
->mtype
= tswapl(host_mb
->mtype
);
1610 unlock_user_struct(target_mb
, msgp
, 0);
1615 /* ??? This only works with linear mappings. */
1616 static long do_ipc(long call
, long first
, long second
, long third
,
1617 long ptr
, long fifth
)
1621 unsigned long raddr
;
1622 struct shmid_ds shm_info
;
1625 version
= call
>> 16;
1630 ret
= get_errno(semop(first
,(struct sembuf
*) ptr
, second
));
1634 ret
= get_errno(semget(first
, second
, third
));
1638 ret
= do_semctl(first
, second
, third
, ptr
);
1641 case IPCOP_semtimedop
:
1642 gemu_log("Unsupported ipc call: %ld (version %d)\n", call
, version
);
1647 ret
= get_errno(msgget(first
, second
));
1651 ret
= do_msgsnd(first
, ptr
, second
, third
);
1655 ret
= do_msgctl(first
, second
, ptr
);
1662 void *__unbounded msgp
;
1666 struct ipc_kludge
*foo
= (struct ipc_kludge
*) ptr
;
1667 struct msgbuf
*msgp
= (struct msgbuf
*) foo
->msgp
;
1669 ret
= do_msgrcv(first
, (long)msgp
, second
, 0, third
);
1675 /* SHM_* flags are the same on all linux platforms */
1676 ret
= get_errno((long) shmat(first
, (void *) ptr
, second
));
1680 /* find out the length of the shared memory segment */
1682 ret
= get_errno(shmctl(first
, IPC_STAT
, &shm_info
));
1683 if (is_error(ret
)) {
1684 /* can't get length, bail out */
1685 shmdt((void *) raddr
);
1688 page_set_flags(raddr
, raddr
+ shm_info
.shm_segsz
,
1689 PAGE_VALID
| PAGE_READ
|
1690 ((second
& SHM_RDONLY
)? 0: PAGE_WRITE
));
1691 for (i
= 0; i
< N_SHM_REGIONS
; ++i
) {
1692 if (shm_regions
[i
].start
== 0) {
1693 shm_regions
[i
].start
= raddr
;
1694 shm_regions
[i
].size
= shm_info
.shm_segsz
;
1698 if (put_user(raddr
, (uint32_t *)third
))
1703 for (i
= 0; i
< N_SHM_REGIONS
; ++i
) {
1704 if (shm_regions
[i
].start
== ptr
) {
1705 shm_regions
[i
].start
= 0;
1706 page_set_flags(ptr
, shm_regions
[i
].size
, 0);
1710 ret
= get_errno(shmdt((void *) ptr
));
1714 /* IPC_* flag values are the same on all linux platforms */
1715 ret
= get_errno(shmget(first
, second
, third
));
1718 /* IPC_* and SHM_* command values are the same on all linux platforms */
1724 ret
= get_errno(shmctl(first
, second
, NULL
));
1732 gemu_log("Unsupported ipc call: %ld (version %d)\n", call
, version
);
1739 /* kernel structure types definitions */
1742 #define STRUCT(name, list...) STRUCT_ ## name,
1743 #define STRUCT_SPECIAL(name) STRUCT_ ## name,
1745 #include "syscall_types.h"
1748 #undef STRUCT_SPECIAL
1750 #define STRUCT(name, list...) const argtype struct_ ## name ## _def[] = { list, TYPE_NULL };
1751 #define STRUCT_SPECIAL(name)
1752 #include "syscall_types.h"
1754 #undef STRUCT_SPECIAL
1756 typedef struct IOCTLEntry
{
1757 unsigned int target_cmd
;
1758 unsigned int host_cmd
;
1761 const argtype arg_type
[5];
1764 #define IOC_R 0x0001
1765 #define IOC_W 0x0002
1766 #define IOC_RW (IOC_R | IOC_W)
1768 #define MAX_STRUCT_SIZE 4096
1770 IOCTLEntry ioctl_entries
[] = {
1771 #define IOCTL(cmd, access, types...) \
1772 { TARGET_ ## cmd, cmd, #cmd, access, { types } },
1777 /* ??? Implement proper locking for ioctls. */
1778 static long do_ioctl(long fd
, long cmd
, long arg
)
1780 const IOCTLEntry
*ie
;
1781 const argtype
*arg_type
;
1783 uint8_t buf_temp
[MAX_STRUCT_SIZE
];
1789 if (ie
->target_cmd
== 0) {
1790 gemu_log("Unsupported ioctl: cmd=0x%04lx\n", cmd
);
1793 if (ie
->target_cmd
== cmd
)
1797 arg_type
= ie
->arg_type
;
1799 gemu_log("ioctl: cmd=0x%04lx (%s)\n", cmd
, ie
->name
);
1801 switch(arg_type
[0]) {
1804 ret
= get_errno(ioctl(fd
, ie
->host_cmd
));
1809 ret
= get_errno(ioctl(fd
, ie
->host_cmd
, arg
));
1813 target_size
= thunk_type_size(arg_type
, 0);
1814 switch(ie
->access
) {
1816 ret
= get_errno(ioctl(fd
, ie
->host_cmd
, buf_temp
));
1817 if (!is_error(ret
)) {
1818 argptr
= lock_user(arg
, target_size
, 0);
1819 thunk_convert(argptr
, buf_temp
, arg_type
, THUNK_TARGET
);
1820 unlock_user(argptr
, arg
, target_size
);
1824 argptr
= lock_user(arg
, target_size
, 1);
1825 thunk_convert(buf_temp
, argptr
, arg_type
, THUNK_HOST
);
1826 unlock_user(argptr
, arg
, 0);
1827 ret
= get_errno(ioctl(fd
, ie
->host_cmd
, buf_temp
));
1831 argptr
= lock_user(arg
, target_size
, 1);
1832 thunk_convert(buf_temp
, argptr
, arg_type
, THUNK_HOST
);
1833 unlock_user(argptr
, arg
, 0);
1834 ret
= get_errno(ioctl(fd
, ie
->host_cmd
, buf_temp
));
1835 if (!is_error(ret
)) {
1836 argptr
= lock_user(arg
, target_size
, 0);
1837 thunk_convert(argptr
, buf_temp
, arg_type
, THUNK_TARGET
);
1838 unlock_user(argptr
, arg
, target_size
);
1844 gemu_log("Unsupported ioctl type: cmd=0x%04lx type=%d\n", cmd
, arg_type
[0]);
1851 bitmask_transtbl iflag_tbl
[] = {
1852 { TARGET_IGNBRK
, TARGET_IGNBRK
, IGNBRK
, IGNBRK
},
1853 { TARGET_BRKINT
, TARGET_BRKINT
, BRKINT
, BRKINT
},
1854 { TARGET_IGNPAR
, TARGET_IGNPAR
, IGNPAR
, IGNPAR
},
1855 { TARGET_PARMRK
, TARGET_PARMRK
, PARMRK
, PARMRK
},
1856 { TARGET_INPCK
, TARGET_INPCK
, INPCK
, INPCK
},
1857 { TARGET_ISTRIP
, TARGET_ISTRIP
, ISTRIP
, ISTRIP
},
1858 { TARGET_INLCR
, TARGET_INLCR
, INLCR
, INLCR
},
1859 { TARGET_IGNCR
, TARGET_IGNCR
, IGNCR
, IGNCR
},
1860 { TARGET_ICRNL
, TARGET_ICRNL
, ICRNL
, ICRNL
},
1861 { TARGET_IUCLC
, TARGET_IUCLC
, IUCLC
, IUCLC
},
1862 { TARGET_IXON
, TARGET_IXON
, IXON
, IXON
},
1863 { TARGET_IXANY
, TARGET_IXANY
, IXANY
, IXANY
},
1864 { TARGET_IXOFF
, TARGET_IXOFF
, IXOFF
, IXOFF
},
1865 { TARGET_IMAXBEL
, TARGET_IMAXBEL
, IMAXBEL
, IMAXBEL
},
1869 bitmask_transtbl oflag_tbl
[] = {
1870 { TARGET_OPOST
, TARGET_OPOST
, OPOST
, OPOST
},
1871 { TARGET_OLCUC
, TARGET_OLCUC
, OLCUC
, OLCUC
},
1872 { TARGET_ONLCR
, TARGET_ONLCR
, ONLCR
, ONLCR
},
1873 { TARGET_OCRNL
, TARGET_OCRNL
, OCRNL
, OCRNL
},
1874 { TARGET_ONOCR
, TARGET_ONOCR
, ONOCR
, ONOCR
},
1875 { TARGET_ONLRET
, TARGET_ONLRET
, ONLRET
, ONLRET
},
1876 { TARGET_OFILL
, TARGET_OFILL
, OFILL
, OFILL
},
1877 { TARGET_OFDEL
, TARGET_OFDEL
, OFDEL
, OFDEL
},
1878 { TARGET_NLDLY
, TARGET_NL0
, NLDLY
, NL0
},
1879 { TARGET_NLDLY
, TARGET_NL1
, NLDLY
, NL1
},
1880 { TARGET_CRDLY
, TARGET_CR0
, CRDLY
, CR0
},
1881 { TARGET_CRDLY
, TARGET_CR1
, CRDLY
, CR1
},
1882 { TARGET_CRDLY
, TARGET_CR2
, CRDLY
, CR2
},
1883 { TARGET_CRDLY
, TARGET_CR3
, CRDLY
, CR3
},
1884 { TARGET_TABDLY
, TARGET_TAB0
, TABDLY
, TAB0
},
1885 { TARGET_TABDLY
, TARGET_TAB1
, TABDLY
, TAB1
},
1886 { TARGET_TABDLY
, TARGET_TAB2
, TABDLY
, TAB2
},
1887 { TARGET_TABDLY
, TARGET_TAB3
, TABDLY
, TAB3
},
1888 { TARGET_BSDLY
, TARGET_BS0
, BSDLY
, BS0
},
1889 { TARGET_BSDLY
, TARGET_BS1
, BSDLY
, BS1
},
1890 { TARGET_VTDLY
, TARGET_VT0
, VTDLY
, VT0
},
1891 { TARGET_VTDLY
, TARGET_VT1
, VTDLY
, VT1
},
1892 { TARGET_FFDLY
, TARGET_FF0
, FFDLY
, FF0
},
1893 { TARGET_FFDLY
, TARGET_FF1
, FFDLY
, FF1
},
1897 bitmask_transtbl cflag_tbl
[] = {
1898 { TARGET_CBAUD
, TARGET_B0
, CBAUD
, B0
},
1899 { TARGET_CBAUD
, TARGET_B50
, CBAUD
, B50
},
1900 { TARGET_CBAUD
, TARGET_B75
, CBAUD
, B75
},
1901 { TARGET_CBAUD
, TARGET_B110
, CBAUD
, B110
},
1902 { TARGET_CBAUD
, TARGET_B134
, CBAUD
, B134
},
1903 { TARGET_CBAUD
, TARGET_B150
, CBAUD
, B150
},
1904 { TARGET_CBAUD
, TARGET_B200
, CBAUD
, B200
},
1905 { TARGET_CBAUD
, TARGET_B300
, CBAUD
, B300
},
1906 { TARGET_CBAUD
, TARGET_B600
, CBAUD
, B600
},
1907 { TARGET_CBAUD
, TARGET_B1200
, CBAUD
, B1200
},
1908 { TARGET_CBAUD
, TARGET_B1800
, CBAUD
, B1800
},
1909 { TARGET_CBAUD
, TARGET_B2400
, CBAUD
, B2400
},
1910 { TARGET_CBAUD
, TARGET_B4800
, CBAUD
, B4800
},
1911 { TARGET_CBAUD
, TARGET_B9600
, CBAUD
, B9600
},
1912 { TARGET_CBAUD
, TARGET_B19200
, CBAUD
, B19200
},
1913 { TARGET_CBAUD
, TARGET_B38400
, CBAUD
, B38400
},
1914 { TARGET_CBAUD
, TARGET_B57600
, CBAUD
, B57600
},
1915 { TARGET_CBAUD
, TARGET_B115200
, CBAUD
, B115200
},
1916 { TARGET_CBAUD
, TARGET_B230400
, CBAUD
, B230400
},
1917 { TARGET_CBAUD
, TARGET_B460800
, CBAUD
, B460800
},
1918 { TARGET_CSIZE
, TARGET_CS5
, CSIZE
, CS5
},
1919 { TARGET_CSIZE
, TARGET_CS6
, CSIZE
, CS6
},
1920 { TARGET_CSIZE
, TARGET_CS7
, CSIZE
, CS7
},
1921 { TARGET_CSIZE
, TARGET_CS8
, CSIZE
, CS8
},
1922 { TARGET_CSTOPB
, TARGET_CSTOPB
, CSTOPB
, CSTOPB
},
1923 { TARGET_CREAD
, TARGET_CREAD
, CREAD
, CREAD
},
1924 { TARGET_PARENB
, TARGET_PARENB
, PARENB
, PARENB
},
1925 { TARGET_PARODD
, TARGET_PARODD
, PARODD
, PARODD
},
1926 { TARGET_HUPCL
, TARGET_HUPCL
, HUPCL
, HUPCL
},
1927 { TARGET_CLOCAL
, TARGET_CLOCAL
, CLOCAL
, CLOCAL
},
1928 { TARGET_CRTSCTS
, TARGET_CRTSCTS
, CRTSCTS
, CRTSCTS
},
1932 bitmask_transtbl lflag_tbl
[] = {
1933 { TARGET_ISIG
, TARGET_ISIG
, ISIG
, ISIG
},
1934 { TARGET_ICANON
, TARGET_ICANON
, ICANON
, ICANON
},
1935 { TARGET_XCASE
, TARGET_XCASE
, XCASE
, XCASE
},
1936 { TARGET_ECHO
, TARGET_ECHO
, ECHO
, ECHO
},
1937 { TARGET_ECHOE
, TARGET_ECHOE
, ECHOE
, ECHOE
},
1938 { TARGET_ECHOK
, TARGET_ECHOK
, ECHOK
, ECHOK
},
1939 { TARGET_ECHONL
, TARGET_ECHONL
, ECHONL
, ECHONL
},
1940 { TARGET_NOFLSH
, TARGET_NOFLSH
, NOFLSH
, NOFLSH
},
1941 { TARGET_TOSTOP
, TARGET_TOSTOP
, TOSTOP
, TOSTOP
},
1942 { TARGET_ECHOCTL
, TARGET_ECHOCTL
, ECHOCTL
, ECHOCTL
},
1943 { TARGET_ECHOPRT
, TARGET_ECHOPRT
, ECHOPRT
, ECHOPRT
},
1944 { TARGET_ECHOKE
, TARGET_ECHOKE
, ECHOKE
, ECHOKE
},
1945 { TARGET_FLUSHO
, TARGET_FLUSHO
, FLUSHO
, FLUSHO
},
1946 { TARGET_PENDIN
, TARGET_PENDIN
, PENDIN
, PENDIN
},
1947 { TARGET_IEXTEN
, TARGET_IEXTEN
, IEXTEN
, IEXTEN
},
1951 static void target_to_host_termios (void *dst
, const void *src
)
1953 struct host_termios
*host
= dst
;
1954 const struct target_termios
*target
= src
;
1957 target_to_host_bitmask(tswap32(target
->c_iflag
), iflag_tbl
);
1959 target_to_host_bitmask(tswap32(target
->c_oflag
), oflag_tbl
);
1961 target_to_host_bitmask(tswap32(target
->c_cflag
), cflag_tbl
);
1963 target_to_host_bitmask(tswap32(target
->c_lflag
), lflag_tbl
);
1964 host
->c_line
= target
->c_line
;
1966 host
->c_cc
[VINTR
] = target
->c_cc
[TARGET_VINTR
];
1967 host
->c_cc
[VQUIT
] = target
->c_cc
[TARGET_VQUIT
];
1968 host
->c_cc
[VERASE
] = target
->c_cc
[TARGET_VERASE
];
1969 host
->c_cc
[VKILL
] = target
->c_cc
[TARGET_VKILL
];
1970 host
->c_cc
[VEOF
] = target
->c_cc
[TARGET_VEOF
];
1971 host
->c_cc
[VTIME
] = target
->c_cc
[TARGET_VTIME
];
1972 host
->c_cc
[VMIN
] = target
->c_cc
[TARGET_VMIN
];
1973 host
->c_cc
[VSWTC
] = target
->c_cc
[TARGET_VSWTC
];
1974 host
->c_cc
[VSTART
] = target
->c_cc
[TARGET_VSTART
];
1975 host
->c_cc
[VSTOP
] = target
->c_cc
[TARGET_VSTOP
];
1976 host
->c_cc
[VSUSP
] = target
->c_cc
[TARGET_VSUSP
];
1977 host
->c_cc
[VEOL
] = target
->c_cc
[TARGET_VEOL
];
1978 host
->c_cc
[VREPRINT
] = target
->c_cc
[TARGET_VREPRINT
];
1979 host
->c_cc
[VDISCARD
] = target
->c_cc
[TARGET_VDISCARD
];
1980 host
->c_cc
[VWERASE
] = target
->c_cc
[TARGET_VWERASE
];
1981 host
->c_cc
[VLNEXT
] = target
->c_cc
[TARGET_VLNEXT
];
1982 host
->c_cc
[VEOL2
] = target
->c_cc
[TARGET_VEOL2
];
1985 static void host_to_target_termios (void *dst
, const void *src
)
1987 struct target_termios
*target
= dst
;
1988 const struct host_termios
*host
= src
;
1991 tswap32(host_to_target_bitmask(host
->c_iflag
, iflag_tbl
));
1993 tswap32(host_to_target_bitmask(host
->c_oflag
, oflag_tbl
));
1995 tswap32(host_to_target_bitmask(host
->c_cflag
, cflag_tbl
));
1997 tswap32(host_to_target_bitmask(host
->c_lflag
, lflag_tbl
));
1998 target
->c_line
= host
->c_line
;
2000 target
->c_cc
[TARGET_VINTR
] = host
->c_cc
[VINTR
];
2001 target
->c_cc
[TARGET_VQUIT
] = host
->c_cc
[VQUIT
];
2002 target
->c_cc
[TARGET_VERASE
] = host
->c_cc
[VERASE
];
2003 target
->c_cc
[TARGET_VKILL
] = host
->c_cc
[VKILL
];
2004 target
->c_cc
[TARGET_VEOF
] = host
->c_cc
[VEOF
];
2005 target
->c_cc
[TARGET_VTIME
] = host
->c_cc
[VTIME
];
2006 target
->c_cc
[TARGET_VMIN
] = host
->c_cc
[VMIN
];
2007 target
->c_cc
[TARGET_VSWTC
] = host
->c_cc
[VSWTC
];
2008 target
->c_cc
[TARGET_VSTART
] = host
->c_cc
[VSTART
];
2009 target
->c_cc
[TARGET_VSTOP
] = host
->c_cc
[VSTOP
];
2010 target
->c_cc
[TARGET_VSUSP
] = host
->c_cc
[VSUSP
];
2011 target
->c_cc
[TARGET_VEOL
] = host
->c_cc
[VEOL
];
2012 target
->c_cc
[TARGET_VREPRINT
] = host
->c_cc
[VREPRINT
];
2013 target
->c_cc
[TARGET_VDISCARD
] = host
->c_cc
[VDISCARD
];
2014 target
->c_cc
[TARGET_VWERASE
] = host
->c_cc
[VWERASE
];
2015 target
->c_cc
[TARGET_VLNEXT
] = host
->c_cc
[VLNEXT
];
2016 target
->c_cc
[TARGET_VEOL2
] = host
->c_cc
[VEOL2
];
2019 StructEntry struct_termios_def
= {
2020 .convert
= { host_to_target_termios
, target_to_host_termios
},
2021 .size
= { sizeof(struct target_termios
), sizeof(struct host_termios
) },
2022 .align
= { __alignof__(struct target_termios
), __alignof__(struct host_termios
) },
2025 static bitmask_transtbl mmap_flags_tbl
[] = {
2026 { TARGET_MAP_SHARED
, TARGET_MAP_SHARED
, MAP_SHARED
, MAP_SHARED
},
2027 { TARGET_MAP_PRIVATE
, TARGET_MAP_PRIVATE
, MAP_PRIVATE
, MAP_PRIVATE
},
2028 { TARGET_MAP_FIXED
, TARGET_MAP_FIXED
, MAP_FIXED
, MAP_FIXED
},
2029 { TARGET_MAP_ANONYMOUS
, TARGET_MAP_ANONYMOUS
, MAP_ANONYMOUS
, MAP_ANONYMOUS
},
2030 { TARGET_MAP_GROWSDOWN
, TARGET_MAP_GROWSDOWN
, MAP_GROWSDOWN
, MAP_GROWSDOWN
},
2031 { TARGET_MAP_DENYWRITE
, TARGET_MAP_DENYWRITE
, MAP_DENYWRITE
, MAP_DENYWRITE
},
2032 { TARGET_MAP_EXECUTABLE
, TARGET_MAP_EXECUTABLE
, MAP_EXECUTABLE
, MAP_EXECUTABLE
},
2033 { TARGET_MAP_LOCKED
, TARGET_MAP_LOCKED
, MAP_LOCKED
, MAP_LOCKED
},
2037 static bitmask_transtbl fcntl_flags_tbl
[] = {
2038 { TARGET_O_ACCMODE
, TARGET_O_WRONLY
, O_ACCMODE
, O_WRONLY
, },
2039 { TARGET_O_ACCMODE
, TARGET_O_RDWR
, O_ACCMODE
, O_RDWR
, },
2040 { TARGET_O_CREAT
, TARGET_O_CREAT
, O_CREAT
, O_CREAT
, },
2041 { TARGET_O_EXCL
, TARGET_O_EXCL
, O_EXCL
, O_EXCL
, },
2042 { TARGET_O_NOCTTY
, TARGET_O_NOCTTY
, O_NOCTTY
, O_NOCTTY
, },
2043 { TARGET_O_TRUNC
, TARGET_O_TRUNC
, O_TRUNC
, O_TRUNC
, },
2044 { TARGET_O_APPEND
, TARGET_O_APPEND
, O_APPEND
, O_APPEND
, },
2045 { TARGET_O_NONBLOCK
, TARGET_O_NONBLOCK
, O_NONBLOCK
, O_NONBLOCK
, },
2046 { TARGET_O_SYNC
, TARGET_O_SYNC
, O_SYNC
, O_SYNC
, },
2047 { TARGET_FASYNC
, TARGET_FASYNC
, FASYNC
, FASYNC
, },
2048 { TARGET_O_DIRECTORY
, TARGET_O_DIRECTORY
, O_DIRECTORY
, O_DIRECTORY
, },
2049 { TARGET_O_NOFOLLOW
, TARGET_O_NOFOLLOW
, O_NOFOLLOW
, O_NOFOLLOW
, },
2050 { TARGET_O_LARGEFILE
, TARGET_O_LARGEFILE
, O_LARGEFILE
, O_LARGEFILE
, },
2051 #if defined(O_DIRECT)
2052 { TARGET_O_DIRECT
, TARGET_O_DIRECT
, O_DIRECT
, O_DIRECT
, },
2057 #if defined(TARGET_I386)
2059 /* NOTE: there is really one LDT for all the threads */
2062 static int read_ldt(target_ulong ptr
, unsigned long bytecount
)
2069 size
= TARGET_LDT_ENTRIES
* TARGET_LDT_ENTRY_SIZE
;
2070 if (size
> bytecount
)
2072 p
= lock_user(ptr
, size
, 0);
2073 /* ??? Shoudl this by byteswapped? */
2074 memcpy(p
, ldt_table
, size
);
2075 unlock_user(p
, ptr
, size
);
2079 /* XXX: add locking support */
2080 static int write_ldt(CPUX86State
*env
,
2081 target_ulong ptr
, unsigned long bytecount
, int oldmode
)
2083 struct target_modify_ldt_ldt_s ldt_info
;
2084 struct target_modify_ldt_ldt_s
*target_ldt_info
;
2085 int seg_32bit
, contents
, read_exec_only
, limit_in_pages
;
2086 int seg_not_present
, useable
;
2087 uint32_t *lp
, entry_1
, entry_2
;
2089 if (bytecount
!= sizeof(ldt_info
))
2091 lock_user_struct(target_ldt_info
, ptr
, 1);
2092 ldt_info
.entry_number
= tswap32(target_ldt_info
->entry_number
);
2093 ldt_info
.base_addr
= tswapl(target_ldt_info
->base_addr
);
2094 ldt_info
.limit
= tswap32(target_ldt_info
->limit
);
2095 ldt_info
.flags
= tswap32(target_ldt_info
->flags
);
2096 unlock_user_struct(target_ldt_info
, ptr
, 0);
2098 if (ldt_info
.entry_number
>= TARGET_LDT_ENTRIES
)
2100 seg_32bit
= ldt_info
.flags
& 1;
2101 contents
= (ldt_info
.flags
>> 1) & 3;
2102 read_exec_only
= (ldt_info
.flags
>> 3) & 1;
2103 limit_in_pages
= (ldt_info
.flags
>> 4) & 1;
2104 seg_not_present
= (ldt_info
.flags
>> 5) & 1;
2105 useable
= (ldt_info
.flags
>> 6) & 1;
2107 if (contents
== 3) {
2110 if (seg_not_present
== 0)
2113 /* allocate the LDT */
2115 ldt_table
= malloc(TARGET_LDT_ENTRIES
* TARGET_LDT_ENTRY_SIZE
);
2118 memset(ldt_table
, 0, TARGET_LDT_ENTRIES
* TARGET_LDT_ENTRY_SIZE
);
2119 env
->ldt
.base
= h2g(ldt_table
);
2120 env
->ldt
.limit
= 0xffff;
2123 /* NOTE: same code as Linux kernel */
2124 /* Allow LDTs to be cleared by the user. */
2125 if (ldt_info
.base_addr
== 0 && ldt_info
.limit
== 0) {
2128 read_exec_only
== 1 &&
2130 limit_in_pages
== 0 &&
2131 seg_not_present
== 1 &&
2139 entry_1
= ((ldt_info
.base_addr
& 0x0000ffff) << 16) |
2140 (ldt_info
.limit
& 0x0ffff);
2141 entry_2
= (ldt_info
.base_addr
& 0xff000000) |
2142 ((ldt_info
.base_addr
& 0x00ff0000) >> 16) |
2143 (ldt_info
.limit
& 0xf0000) |
2144 ((read_exec_only
^ 1) << 9) |
2146 ((seg_not_present
^ 1) << 15) |
2148 (limit_in_pages
<< 23) |
2151 entry_2
|= (useable
<< 20);
2153 /* Install the new entry ... */
2155 lp
= (uint32_t *)(ldt_table
+ (ldt_info
.entry_number
<< 3));
2156 lp
[0] = tswap32(entry_1
);
2157 lp
[1] = tswap32(entry_2
);
2161 /* specific and weird i386 syscalls */
2162 int do_modify_ldt(CPUX86State
*env
, int func
, target_ulong ptr
, unsigned long bytecount
)
2168 ret
= read_ldt(ptr
, bytecount
);
2171 ret
= write_ldt(env
, ptr
, bytecount
, 1);
2174 ret
= write_ldt(env
, ptr
, bytecount
, 0);
2180 #endif /* defined(TARGET_I386) */
2182 /* this stack is the equivalent of the kernel stack associated with a
2184 #define NEW_STACK_SIZE 8192
2186 static int clone_func(void *arg
)
2188 CPUState
*env
= arg
;
2194 int do_fork(CPUState
*env
, unsigned int flags
, unsigned long newsp
)
2201 if (flags
& CLONE_VM
) {
2202 ts
= malloc(sizeof(TaskState
) + NEW_STACK_SIZE
);
2203 memset(ts
, 0, sizeof(TaskState
));
2204 new_stack
= ts
->stack
;
2206 /* add in task state list */
2207 ts
->next
= first_task_state
;
2208 first_task_state
= ts
;
2209 /* we create a new CPU instance. */
2210 new_env
= cpu_copy(env
);
2211 #if defined(TARGET_I386)
2213 newsp
= env
->regs
[R_ESP
];
2214 new_env
->regs
[R_ESP
] = newsp
;
2215 new_env
->regs
[R_EAX
] = 0;
2216 #elif defined(TARGET_ARM)
2218 newsp
= env
->regs
[13];
2219 new_env
->regs
[13] = newsp
;
2220 new_env
->regs
[0] = 0;
2221 #elif defined(TARGET_SPARC)
2223 newsp
= env
->regwptr
[22];
2224 new_env
->regwptr
[22] = newsp
;
2225 new_env
->regwptr
[0] = 0;
2227 printf ("HELPME: %s:%d\n", __FILE__
, __LINE__
);
2228 #elif defined(TARGET_M68K)
2230 newsp
= env
->aregs
[7];
2231 new_env
->aregs
[7] = newsp
;
2232 new_env
->dregs
[0] = 0;
2233 /* ??? is this sufficient? */
2234 #elif defined(TARGET_MIPS)
2236 newsp
= env
->gpr
[29][env
->current_tc
];
2237 new_env
->gpr
[29][env
->current_tc
] = newsp
;
2238 #elif defined(TARGET_PPC)
2240 newsp
= env
->gpr
[1];
2241 new_env
->gpr
[1] = newsp
;
2244 for (i
= 7; i
< 32; i
++)
2245 new_env
->gpr
[i
] = 0;
2247 #elif defined(TARGET_SH4)
2249 newsp
= env
->gregs
[15];
2250 new_env
->gregs
[15] = newsp
;
2252 #elif defined(TARGET_ALPHA)
2254 newsp
= env
->ir
[30];
2255 new_env
->ir
[30] = newsp
;
2259 for (i
= 7; i
< 30; i
++)
2263 #error unsupported target CPU
2265 new_env
->opaque
= ts
;
2267 ret
= __clone2(clone_func
, new_stack
+ NEW_STACK_SIZE
, flags
, new_env
);
2269 ret
= clone(clone_func
, new_stack
+ NEW_STACK_SIZE
, flags
, new_env
);
2272 /* if no CLONE_VM, we consider it is a fork */
2273 if ((flags
& ~CSIGNAL
) != 0)
2280 static long do_fcntl(int fd
, int cmd
, target_ulong arg
)
2283 struct target_flock
*target_fl
;
2284 struct flock64 fl64
;
2285 struct target_flock64
*target_fl64
;
2289 case TARGET_F_GETLK
:
2290 lock_user_struct(target_fl
, arg
, 1);
2291 fl
.l_type
= tswap16(target_fl
->l_type
);
2292 fl
.l_whence
= tswap16(target_fl
->l_whence
);
2293 fl
.l_start
= tswapl(target_fl
->l_start
);
2294 fl
.l_len
= tswapl(target_fl
->l_len
);
2295 fl
.l_pid
= tswapl(target_fl
->l_pid
);
2296 unlock_user_struct(target_fl
, arg
, 0);
2297 ret
= fcntl(fd
, cmd
, &fl
);
2299 lock_user_struct(target_fl
, arg
, 0);
2300 target_fl
->l_type
= tswap16(fl
.l_type
);
2301 target_fl
->l_whence
= tswap16(fl
.l_whence
);
2302 target_fl
->l_start
= tswapl(fl
.l_start
);
2303 target_fl
->l_len
= tswapl(fl
.l_len
);
2304 target_fl
->l_pid
= tswapl(fl
.l_pid
);
2305 unlock_user_struct(target_fl
, arg
, 1);
2309 case TARGET_F_SETLK
:
2310 case TARGET_F_SETLKW
:
2311 lock_user_struct(target_fl
, arg
, 1);
2312 fl
.l_type
= tswap16(target_fl
->l_type
);
2313 fl
.l_whence
= tswap16(target_fl
->l_whence
);
2314 fl
.l_start
= tswapl(target_fl
->l_start
);
2315 fl
.l_len
= tswapl(target_fl
->l_len
);
2316 fl
.l_pid
= tswapl(target_fl
->l_pid
);
2317 unlock_user_struct(target_fl
, arg
, 0);
2318 ret
= fcntl(fd
, cmd
, &fl
);
2321 case TARGET_F_GETLK64
:
2322 lock_user_struct(target_fl64
, arg
, 1);
2323 fl64
.l_type
= tswap16(target_fl64
->l_type
) >> 1;
2324 fl64
.l_whence
= tswap16(target_fl64
->l_whence
);
2325 fl64
.l_start
= tswapl(target_fl64
->l_start
);
2326 fl64
.l_len
= tswapl(target_fl64
->l_len
);
2327 fl64
.l_pid
= tswap16(target_fl64
->l_pid
);
2328 unlock_user_struct(target_fl64
, arg
, 0);
2329 ret
= fcntl(fd
, cmd
>> 1, &fl64
);
2331 lock_user_struct(target_fl64
, arg
, 0);
2332 target_fl64
->l_type
= tswap16(fl64
.l_type
) >> 1;
2333 target_fl64
->l_whence
= tswap16(fl64
.l_whence
);
2334 target_fl64
->l_start
= tswapl(fl64
.l_start
);
2335 target_fl64
->l_len
= tswapl(fl64
.l_len
);
2336 target_fl64
->l_pid
= tswapl(fl64
.l_pid
);
2337 unlock_user_struct(target_fl64
, arg
, 1);
2340 case TARGET_F_SETLK64
:
2341 case TARGET_F_SETLKW64
:
2342 lock_user_struct(target_fl64
, arg
, 1);
2343 fl64
.l_type
= tswap16(target_fl64
->l_type
) >> 1;
2344 fl64
.l_whence
= tswap16(target_fl64
->l_whence
);
2345 fl64
.l_start
= tswapl(target_fl64
->l_start
);
2346 fl64
.l_len
= tswapl(target_fl64
->l_len
);
2347 fl64
.l_pid
= tswap16(target_fl64
->l_pid
);
2348 unlock_user_struct(target_fl64
, arg
, 0);
2349 ret
= fcntl(fd
, cmd
>> 1, &fl64
);
2353 ret
= fcntl(fd
, cmd
, arg
);
2354 ret
= host_to_target_bitmask(ret
, fcntl_flags_tbl
);
2358 ret
= fcntl(fd
, cmd
, target_to_host_bitmask(arg
, fcntl_flags_tbl
));
2362 ret
= fcntl(fd
, cmd
, arg
);
2370 static inline int high2lowuid(int uid
)
2378 static inline int high2lowgid(int gid
)
2386 static inline int low2highuid(int uid
)
2388 if ((int16_t)uid
== -1)
2394 static inline int low2highgid(int gid
)
2396 if ((int16_t)gid
== -1)
2402 #endif /* USE_UID16 */
2404 void syscall_init(void)
2407 const argtype
*arg_type
;
2410 #define STRUCT(name, list...) thunk_register_struct(STRUCT_ ## name, #name, struct_ ## name ## _def);
2411 #define STRUCT_SPECIAL(name) thunk_register_struct_direct(STRUCT_ ## name, #name, &struct_ ## name ## _def);
2412 #include "syscall_types.h"
2414 #undef STRUCT_SPECIAL
2416 /* we patch the ioctl size if necessary. We rely on the fact that
2417 no ioctl has all the bits at '1' in the size field */
2419 while (ie
->target_cmd
!= 0) {
2420 if (((ie
->target_cmd
>> TARGET_IOC_SIZESHIFT
) & TARGET_IOC_SIZEMASK
) ==
2421 TARGET_IOC_SIZEMASK
) {
2422 arg_type
= ie
->arg_type
;
2423 if (arg_type
[0] != TYPE_PTR
) {
2424 fprintf(stderr
, "cannot patch size for ioctl 0x%x\n",
2429 size
= thunk_type_size(arg_type
, 0);
2430 ie
->target_cmd
= (ie
->target_cmd
&
2431 ~(TARGET_IOC_SIZEMASK
<< TARGET_IOC_SIZESHIFT
)) |
2432 (size
<< TARGET_IOC_SIZESHIFT
);
2434 /* automatic consistency check if same arch */
2435 #if defined(__i386__) && defined(TARGET_I386)
2436 if (ie
->target_cmd
!= ie
->host_cmd
) {
2437 fprintf(stderr
, "ERROR: ioctl: target=0x%x host=0x%x\n",
2438 ie
->target_cmd
, ie
->host_cmd
);
2445 static inline uint64_t target_offset64(uint32_t word0
, uint32_t word1
)
2447 #ifdef TARGET_WORDS_BIG_ENDIAN
2448 return ((uint64_t)word0
<< 32) | word1
;
2450 return ((uint64_t)word1
<< 32) | word0
;
2454 #ifdef TARGET_NR_truncate64
2455 static inline long target_truncate64(void *cpu_env
, const char *arg1
,
2456 long arg2
, long arg3
, long arg4
)
2459 if (((CPUARMState
*)cpu_env
)->eabi
)
2465 return get_errno(truncate64(arg1
, target_offset64(arg2
, arg3
)));
2469 #ifdef TARGET_NR_ftruncate64
2470 static inline long target_ftruncate64(void *cpu_env
, long arg1
, long arg2
,
2471 long arg3
, long arg4
)
2474 if (((CPUARMState
*)cpu_env
)->eabi
)
2480 return get_errno(ftruncate64(arg1
, target_offset64(arg2
, arg3
)));
2484 static inline void target_to_host_timespec(struct timespec
*host_ts
,
2485 target_ulong target_addr
)
2487 struct target_timespec
*target_ts
;
2489 lock_user_struct(target_ts
, target_addr
, 1);
2490 host_ts
->tv_sec
= tswapl(target_ts
->tv_sec
);
2491 host_ts
->tv_nsec
= tswapl(target_ts
->tv_nsec
);
2492 unlock_user_struct(target_ts
, target_addr
, 0);
2495 static inline void host_to_target_timespec(target_ulong target_addr
,
2496 struct timespec
*host_ts
)
2498 struct target_timespec
*target_ts
;
2500 lock_user_struct(target_ts
, target_addr
, 0);
2501 target_ts
->tv_sec
= tswapl(host_ts
->tv_sec
);
2502 target_ts
->tv_nsec
= tswapl(host_ts
->tv_nsec
);
2503 unlock_user_struct(target_ts
, target_addr
, 1);
2506 long do_syscall(void *cpu_env
, int num
, long arg1
, long arg2
, long arg3
,
2507 long arg4
, long arg5
, long arg6
)
2515 gemu_log("syscall %d", num
);
2518 case TARGET_NR_exit
:
2522 gdb_exit(cpu_env
, arg1
);
2523 /* XXX: should free thread stack and CPU env */
2525 ret
= 0; /* avoid warning */
2527 case TARGET_NR_read
:
2528 page_unprotect_range(arg2
, arg3
);
2529 p
= lock_user(arg2
, arg3
, 0);
2530 ret
= get_errno(read(arg1
, p
, arg3
));
2531 unlock_user(p
, arg2
, ret
);
2533 case TARGET_NR_write
:
2534 p
= lock_user(arg2
, arg3
, 1);
2535 ret
= get_errno(write(arg1
, p
, arg3
));
2536 unlock_user(p
, arg2
, 0);
2538 case TARGET_NR_open
:
2539 p
= lock_user_string(arg1
);
2540 ret
= get_errno(open(path(p
),
2541 target_to_host_bitmask(arg2
, fcntl_flags_tbl
),
2543 unlock_user(p
, arg1
, 0);
2545 #if defined(TARGET_NR_openat) && defined(__NR_openat)
2546 case TARGET_NR_openat
:
2551 p
= lock_user_string(arg2
);
2552 if (!access_ok(VERIFY_READ
, p
, 1))
2555 ret
= get_errno(sys_openat(arg1
,
2557 target_to_host_bitmask(arg3
, fcntl_flags_tbl
),
2560 unlock_user(p
, arg2
, 0);
2563 case TARGET_NR_close
:
2564 ret
= get_errno(close(arg1
));
2569 case TARGET_NR_fork
:
2570 ret
= get_errno(do_fork(cpu_env
, SIGCHLD
, 0));
2572 #ifdef TARGET_NR_waitpid
2573 case TARGET_NR_waitpid
:
2576 ret
= get_errno(waitpid(arg1
, &status
, arg3
));
2577 if (!is_error(ret
) && arg2
)
2578 tput32(arg2
, status
);
2582 #ifdef TARGET_NR_creat /* not on alpha */
2583 case TARGET_NR_creat
:
2584 p
= lock_user_string(arg1
);
2585 ret
= get_errno(creat(p
, arg2
));
2586 unlock_user(p
, arg1
, 0);
2589 case TARGET_NR_link
:
2592 p
= lock_user_string(arg1
);
2593 p2
= lock_user_string(arg2
);
2594 ret
= get_errno(link(p
, p2
));
2595 unlock_user(p2
, arg2
, 0);
2596 unlock_user(p
, arg1
, 0);
2599 #if defined(TARGET_NR_linkat) && defined(__NR_linkat)
2600 case TARGET_NR_linkat
:
2601 if (!arg2
|| !arg4
) {
2607 p
= lock_user_string(arg2
);
2608 p2
= lock_user_string(arg4
);
2609 if (!access_ok(VERIFY_READ
, p
, 1)
2610 || !access_ok(VERIFY_READ
, p2
, 1))
2613 ret
= get_errno(sys_linkat(arg1
, p
, arg3
, p2
, arg5
));
2615 unlock_user(p
, arg2
, 0);
2617 unlock_user(p2
, arg4
, 0);
2621 case TARGET_NR_unlink
:
2622 p
= lock_user_string(arg1
);
2623 ret
= get_errno(unlink(p
));
2624 unlock_user(p
, arg1
, 0);
2626 #if defined(TARGET_NR_unlinkat) && defined(__NR_unlinkat)
2627 case TARGET_NR_unlinkat
:
2632 p
= lock_user_string(arg2
);
2633 if (!access_ok(VERIFY_READ
, p
, 1))
2636 ret
= get_errno(sys_unlinkat(arg1
, p
, arg3
));
2638 unlock_user(p
, arg2
, 0);
2641 case TARGET_NR_execve
:
2643 char **argp
, **envp
;
2646 target_ulong guest_argp
;
2647 target_ulong guest_envp
;
2653 for (gp
= guest_argp
; tgetl(gp
); gp
++)
2657 for (gp
= guest_envp
; tgetl(gp
); gp
++)
2660 argp
= alloca((argc
+ 1) * sizeof(void *));
2661 envp
= alloca((envc
+ 1) * sizeof(void *));
2663 for (gp
= guest_argp
, q
= argp
; ;
2664 gp
+= sizeof(target_ulong
), q
++) {
2668 *q
= lock_user_string(addr
);
2672 for (gp
= guest_envp
, q
= envp
; ;
2673 gp
+= sizeof(target_ulong
), q
++) {
2677 *q
= lock_user_string(addr
);
2681 p
= lock_user_string(arg1
);
2682 ret
= get_errno(execve(p
, argp
, envp
));
2683 unlock_user(p
, arg1
, 0);
2685 for (gp
= guest_argp
, q
= argp
; *q
;
2686 gp
+= sizeof(target_ulong
), q
++) {
2688 unlock_user(*q
, addr
, 0);
2690 for (gp
= guest_envp
, q
= envp
; *q
;
2691 gp
+= sizeof(target_ulong
), q
++) {
2693 unlock_user(*q
, addr
, 0);
2697 case TARGET_NR_chdir
:
2698 p
= lock_user_string(arg1
);
2699 ret
= get_errno(chdir(p
));
2700 unlock_user(p
, arg1
, 0);
2702 #ifdef TARGET_NR_time
2703 case TARGET_NR_time
:
2706 ret
= get_errno(time(&host_time
));
2707 if (!is_error(ret
) && arg1
)
2708 tputl(arg1
, host_time
);
2712 case TARGET_NR_mknod
:
2713 p
= lock_user_string(arg1
);
2714 ret
= get_errno(mknod(p
, arg2
, arg3
));
2715 unlock_user(p
, arg1
, 0);
2717 #if defined(TARGET_NR_mknodat) && defined(__NR_mknodat)
2718 case TARGET_NR_mknodat
:
2723 p
= lock_user_string(arg2
);
2724 if (!access_ok(VERIFY_READ
, p
, 1))
2727 ret
= get_errno(sys_mknodat(arg1
, p
, arg3
, arg4
));
2729 unlock_user(p
, arg2
, 0);
2732 case TARGET_NR_chmod
:
2733 p
= lock_user_string(arg1
);
2734 ret
= get_errno(chmod(p
, arg2
));
2735 unlock_user(p
, arg1
, 0);
2737 #ifdef TARGET_NR_break
2738 case TARGET_NR_break
:
2741 #ifdef TARGET_NR_oldstat
2742 case TARGET_NR_oldstat
:
2745 case TARGET_NR_lseek
:
2746 ret
= get_errno(lseek(arg1
, arg2
, arg3
));
2748 #ifdef TARGET_NR_getxpid
2749 case TARGET_NR_getxpid
:
2751 case TARGET_NR_getpid
:
2753 ret
= get_errno(getpid());
2755 case TARGET_NR_mount
:
2757 /* need to look at the data field */
2759 p
= lock_user_string(arg1
);
2760 p2
= lock_user_string(arg2
);
2761 p3
= lock_user_string(arg3
);
2762 ret
= get_errno(mount(p
, p2
, p3
, (unsigned long)arg4
, (const void *)arg5
));
2763 unlock_user(p
, arg1
, 0);
2764 unlock_user(p2
, arg2
, 0);
2765 unlock_user(p3
, arg3
, 0);
2768 #ifdef TARGET_NR_umount
2769 case TARGET_NR_umount
:
2770 p
= lock_user_string(arg1
);
2771 ret
= get_errno(umount(p
));
2772 unlock_user(p
, arg1
, 0);
2775 #ifdef TARGET_NR_stime /* not on alpha */
2776 case TARGET_NR_stime
:
2779 host_time
= tgetl(arg1
);
2780 ret
= get_errno(stime(&host_time
));
2784 case TARGET_NR_ptrace
:
2786 #ifdef TARGET_NR_alarm /* not on alpha */
2787 case TARGET_NR_alarm
:
2791 #ifdef TARGET_NR_oldfstat
2792 case TARGET_NR_oldfstat
:
2795 #ifdef TARGET_NR_pause /* not on alpha */
2796 case TARGET_NR_pause
:
2797 ret
= get_errno(pause());
2800 #ifdef TARGET_NR_utime
2801 case TARGET_NR_utime
:
2803 struct utimbuf tbuf
, *host_tbuf
;
2804 struct target_utimbuf
*target_tbuf
;
2806 lock_user_struct(target_tbuf
, arg2
, 1);
2807 tbuf
.actime
= tswapl(target_tbuf
->actime
);
2808 tbuf
.modtime
= tswapl(target_tbuf
->modtime
);
2809 unlock_user_struct(target_tbuf
, arg2
, 0);
2814 p
= lock_user_string(arg1
);
2815 ret
= get_errno(utime(p
, host_tbuf
));
2816 unlock_user(p
, arg1
, 0);
2820 case TARGET_NR_utimes
:
2822 struct timeval
*tvp
, tv
[2];
2824 target_to_host_timeval(&tv
[0], arg2
);
2825 target_to_host_timeval(&tv
[1],
2826 arg2
+ sizeof (struct target_timeval
));
2831 p
= lock_user_string(arg1
);
2832 ret
= get_errno(utimes(p
, tvp
));
2833 unlock_user(p
, arg1
, 0);
2836 #ifdef TARGET_NR_stty
2837 case TARGET_NR_stty
:
2840 #ifdef TARGET_NR_gtty
2841 case TARGET_NR_gtty
:
2844 case TARGET_NR_access
:
2845 p
= lock_user_string(arg1
);
2846 ret
= get_errno(access(p
, arg2
));
2847 unlock_user(p
, arg1
, 0);
2849 #ifdef TARGET_NR_nice /* not on alpha */
2850 case TARGET_NR_nice
:
2851 ret
= get_errno(nice(arg1
));
2854 #ifdef TARGET_NR_ftime
2855 case TARGET_NR_ftime
:
2858 case TARGET_NR_sync
:
2862 case TARGET_NR_kill
:
2863 ret
= get_errno(kill(arg1
, arg2
));
2865 case TARGET_NR_rename
:
2868 p
= lock_user_string(arg1
);
2869 p2
= lock_user_string(arg2
);
2870 ret
= get_errno(rename(p
, p2
));
2871 unlock_user(p2
, arg2
, 0);
2872 unlock_user(p
, arg1
, 0);
2875 #if defined(TARGET_NR_renameat) && defined(__NR_renameat)
2876 case TARGET_NR_renameat
:
2877 if (!arg2
|| !arg4
) {
2883 p
= lock_user_string(arg2
);
2884 p2
= lock_user_string(arg4
);
2885 if (!access_ok(VERIFY_READ
, p
, 1)
2886 || !access_ok(VERIFY_READ
, p2
, 1))
2889 ret
= get_errno(sys_renameat(arg1
, p
, arg3
, p2
));
2891 unlock_user(p2
, arg4
, 0);
2893 unlock_user(p
, arg2
, 0);
2897 case TARGET_NR_mkdir
:
2898 p
= lock_user_string(arg1
);
2899 ret
= get_errno(mkdir(p
, arg2
));
2900 unlock_user(p
, arg1
, 0);
2902 #if defined(TARGET_NR_mkdirat) && defined(__NR_mkdirat)
2903 case TARGET_NR_mkdirat
:
2908 p
= lock_user_string(arg2
);
2909 if (!access_ok(VERIFY_READ
, p
, 1))
2912 ret
= get_errno(sys_mkdirat(arg1
, p
, arg3
));
2914 unlock_user(p
, arg2
, 0);
2917 case TARGET_NR_rmdir
:
2918 p
= lock_user_string(arg1
);
2919 ret
= get_errno(rmdir(p
));
2920 unlock_user(p
, arg1
, 0);
2923 ret
= get_errno(dup(arg1
));
2925 case TARGET_NR_pipe
:
2928 ret
= get_errno(pipe(host_pipe
));
2929 if (!is_error(ret
)) {
2930 #if defined(TARGET_MIPS)
2931 CPUMIPSState
*env
= (CPUMIPSState
*)cpu_env
;
2932 env
->gpr
[3][env
->current_tc
] = host_pipe
[1];
2935 tput32(arg1
, host_pipe
[0]);
2936 tput32(arg1
+ 4, host_pipe
[1]);
2941 case TARGET_NR_times
:
2943 struct target_tms
*tmsp
;
2945 ret
= get_errno(times(&tms
));
2947 tmsp
= lock_user(arg1
, sizeof(struct target_tms
), 0);
2948 tmsp
->tms_utime
= tswapl(host_to_target_clock_t(tms
.tms_utime
));
2949 tmsp
->tms_stime
= tswapl(host_to_target_clock_t(tms
.tms_stime
));
2950 tmsp
->tms_cutime
= tswapl(host_to_target_clock_t(tms
.tms_cutime
));
2951 tmsp
->tms_cstime
= tswapl(host_to_target_clock_t(tms
.tms_cstime
));
2954 ret
= host_to_target_clock_t(ret
);
2957 #ifdef TARGET_NR_prof
2958 case TARGET_NR_prof
:
2961 #ifdef TARGET_NR_signal
2962 case TARGET_NR_signal
:
2965 case TARGET_NR_acct
:
2966 p
= lock_user_string(arg1
);
2967 ret
= get_errno(acct(path(p
)));
2968 unlock_user(p
, arg1
, 0);
2970 #ifdef TARGET_NR_umount2 /* not on alpha */
2971 case TARGET_NR_umount2
:
2972 p
= lock_user_string(arg1
);
2973 ret
= get_errno(umount2(p
, arg2
));
2974 unlock_user(p
, arg1
, 0);
2977 #ifdef TARGET_NR_lock
2978 case TARGET_NR_lock
:
2981 case TARGET_NR_ioctl
:
2982 ret
= do_ioctl(arg1
, arg2
, arg3
);
2984 case TARGET_NR_fcntl
:
2985 ret
= get_errno(do_fcntl(arg1
, arg2
, arg3
));
2987 #ifdef TARGET_NR_mpx
2991 case TARGET_NR_setpgid
:
2992 ret
= get_errno(setpgid(arg1
, arg2
));
2994 #ifdef TARGET_NR_ulimit
2995 case TARGET_NR_ulimit
:
2998 #ifdef TARGET_NR_oldolduname
2999 case TARGET_NR_oldolduname
:
3002 case TARGET_NR_umask
:
3003 ret
= get_errno(umask(arg1
));
3005 case TARGET_NR_chroot
:
3006 p
= lock_user_string(arg1
);
3007 ret
= get_errno(chroot(p
));
3008 unlock_user(p
, arg1
, 0);
3010 case TARGET_NR_ustat
:
3012 case TARGET_NR_dup2
:
3013 ret
= get_errno(dup2(arg1
, arg2
));
3015 #ifdef TARGET_NR_getppid /* not on alpha */
3016 case TARGET_NR_getppid
:
3017 ret
= get_errno(getppid());
3020 case TARGET_NR_getpgrp
:
3021 ret
= get_errno(getpgrp());
3023 case TARGET_NR_setsid
:
3024 ret
= get_errno(setsid());
3026 #ifdef TARGET_NR_sigaction
3027 case TARGET_NR_sigaction
:
3029 #if !defined(TARGET_MIPS)
3030 struct target_old_sigaction
*old_act
;
3031 struct target_sigaction act
, oact
, *pact
;
3033 lock_user_struct(old_act
, arg2
, 1);
3034 act
._sa_handler
= old_act
->_sa_handler
;
3035 target_siginitset(&act
.sa_mask
, old_act
->sa_mask
);
3036 act
.sa_flags
= old_act
->sa_flags
;
3037 act
.sa_restorer
= old_act
->sa_restorer
;
3038 unlock_user_struct(old_act
, arg2
, 0);
3043 ret
= get_errno(do_sigaction(arg1
, pact
, &oact
));
3044 if (!is_error(ret
) && arg3
) {
3045 lock_user_struct(old_act
, arg3
, 0);
3046 old_act
->_sa_handler
= oact
._sa_handler
;
3047 old_act
->sa_mask
= oact
.sa_mask
.sig
[0];
3048 old_act
->sa_flags
= oact
.sa_flags
;
3049 old_act
->sa_restorer
= oact
.sa_restorer
;
3050 unlock_user_struct(old_act
, arg3
, 1);
3053 struct target_sigaction act
, oact
, *pact
, *old_act
;
3056 lock_user_struct(old_act
, arg2
, 1);
3057 act
._sa_handler
= old_act
->_sa_handler
;
3058 target_siginitset(&act
.sa_mask
, old_act
->sa_mask
.sig
[0]);
3059 act
.sa_flags
= old_act
->sa_flags
;
3060 unlock_user_struct(old_act
, arg2
, 0);
3066 ret
= get_errno(do_sigaction(arg1
, pact
, &oact
));
3068 if (!is_error(ret
) && arg3
) {
3069 lock_user_struct(old_act
, arg3
, 0);
3070 old_act
->_sa_handler
= oact
._sa_handler
;
3071 old_act
->sa_flags
= oact
.sa_flags
;
3072 old_act
->sa_mask
.sig
[0] = oact
.sa_mask
.sig
[0];
3073 old_act
->sa_mask
.sig
[1] = 0;
3074 old_act
->sa_mask
.sig
[2] = 0;
3075 old_act
->sa_mask
.sig
[3] = 0;
3076 unlock_user_struct(old_act
, arg3
, 1);
3082 case TARGET_NR_rt_sigaction
:
3084 struct target_sigaction
*act
;
3085 struct target_sigaction
*oact
;
3088 lock_user_struct(act
, arg2
, 1);
3092 lock_user_struct(oact
, arg3
, 0);
3095 ret
= get_errno(do_sigaction(arg1
, act
, oact
));
3097 unlock_user_struct(act
, arg2
, 0);
3099 unlock_user_struct(oact
, arg3
, 1);
3102 #ifdef TARGET_NR_sgetmask /* not on alpha */
3103 case TARGET_NR_sgetmask
:
3106 target_ulong target_set
;
3107 sigprocmask(0, NULL
, &cur_set
);
3108 host_to_target_old_sigset(&target_set
, &cur_set
);
3113 #ifdef TARGET_NR_ssetmask /* not on alpha */
3114 case TARGET_NR_ssetmask
:
3116 sigset_t set
, oset
, cur_set
;
3117 target_ulong target_set
= arg1
;
3118 sigprocmask(0, NULL
, &cur_set
);
3119 target_to_host_old_sigset(&set
, &target_set
);
3120 sigorset(&set
, &set
, &cur_set
);
3121 sigprocmask(SIG_SETMASK
, &set
, &oset
);
3122 host_to_target_old_sigset(&target_set
, &oset
);
3127 #ifdef TARGET_NR_sigprocmask
3128 case TARGET_NR_sigprocmask
:
3131 sigset_t set
, oldset
, *set_ptr
;
3135 case TARGET_SIG_BLOCK
:
3138 case TARGET_SIG_UNBLOCK
:
3141 case TARGET_SIG_SETMASK
:
3148 p
= lock_user(arg2
, sizeof(target_sigset_t
), 1);
3149 target_to_host_old_sigset(&set
, p
);
3150 unlock_user(p
, arg2
, 0);
3156 ret
= get_errno(sigprocmask(arg1
, set_ptr
, &oldset
));
3157 if (!is_error(ret
) && arg3
) {
3158 p
= lock_user(arg3
, sizeof(target_sigset_t
), 0);
3159 host_to_target_old_sigset(p
, &oldset
);
3160 unlock_user(p
, arg3
, sizeof(target_sigset_t
));
3165 case TARGET_NR_rt_sigprocmask
:
3168 sigset_t set
, oldset
, *set_ptr
;
3172 case TARGET_SIG_BLOCK
:
3175 case TARGET_SIG_UNBLOCK
:
3178 case TARGET_SIG_SETMASK
:
3185 p
= lock_user(arg2
, sizeof(target_sigset_t
), 1);
3186 target_to_host_sigset(&set
, p
);
3187 unlock_user(p
, arg2
, 0);
3193 ret
= get_errno(sigprocmask(how
, set_ptr
, &oldset
));
3194 if (!is_error(ret
) && arg3
) {
3195 p
= lock_user(arg3
, sizeof(target_sigset_t
), 0);
3196 host_to_target_sigset(p
, &oldset
);
3197 unlock_user(p
, arg3
, sizeof(target_sigset_t
));
3201 #ifdef TARGET_NR_sigpending
3202 case TARGET_NR_sigpending
:
3205 ret
= get_errno(sigpending(&set
));
3206 if (!is_error(ret
)) {
3207 p
= lock_user(arg1
, sizeof(target_sigset_t
), 0);
3208 host_to_target_old_sigset(p
, &set
);
3209 unlock_user(p
, arg1
, sizeof(target_sigset_t
));
3214 case TARGET_NR_rt_sigpending
:
3217 ret
= get_errno(sigpending(&set
));
3218 if (!is_error(ret
)) {
3219 p
= lock_user(arg1
, sizeof(target_sigset_t
), 0);
3220 host_to_target_sigset(p
, &set
);
3221 unlock_user(p
, arg1
, sizeof(target_sigset_t
));
3225 #ifdef TARGET_NR_sigsuspend
3226 case TARGET_NR_sigsuspend
:
3229 p
= lock_user(arg1
, sizeof(target_sigset_t
), 1);
3230 target_to_host_old_sigset(&set
, p
);
3231 unlock_user(p
, arg1
, 0);
3232 ret
= get_errno(sigsuspend(&set
));
3236 case TARGET_NR_rt_sigsuspend
:
3239 p
= lock_user(arg1
, sizeof(target_sigset_t
), 1);
3240 target_to_host_sigset(&set
, p
);
3241 unlock_user(p
, arg1
, 0);
3242 ret
= get_errno(sigsuspend(&set
));
3245 case TARGET_NR_rt_sigtimedwait
:
3248 struct timespec uts
, *puts
;
3251 p
= lock_user(arg1
, sizeof(target_sigset_t
), 1);
3252 target_to_host_sigset(&set
, p
);
3253 unlock_user(p
, arg1
, 0);
3256 target_to_host_timespec(puts
, arg3
);
3260 ret
= get_errno(sigtimedwait(&set
, &uinfo
, puts
));
3261 if (!is_error(ret
) && arg2
) {
3262 p
= lock_user(arg2
, sizeof(target_sigset_t
), 0);
3263 host_to_target_siginfo(p
, &uinfo
);
3264 unlock_user(p
, arg2
, sizeof(target_sigset_t
));
3268 case TARGET_NR_rt_sigqueueinfo
:
3271 p
= lock_user(arg3
, sizeof(target_sigset_t
), 1);
3272 target_to_host_siginfo(&uinfo
, p
);
3273 unlock_user(p
, arg1
, 0);
3274 ret
= get_errno(sys_rt_sigqueueinfo(arg1
, arg2
, &uinfo
));
3277 #ifdef TARGET_NR_sigreturn
3278 case TARGET_NR_sigreturn
:
3279 /* NOTE: ret is eax, so not transcoding must be done */
3280 ret
= do_sigreturn(cpu_env
);
3283 case TARGET_NR_rt_sigreturn
:
3284 /* NOTE: ret is eax, so not transcoding must be done */
3285 ret
= do_rt_sigreturn(cpu_env
);
3287 case TARGET_NR_sethostname
:
3288 p
= lock_user_string(arg1
);
3289 ret
= get_errno(sethostname(p
, arg2
));
3290 unlock_user(p
, arg1
, 0);
3292 case TARGET_NR_setrlimit
:
3294 /* XXX: convert resource ? */
3295 int resource
= arg1
;
3296 struct target_rlimit
*target_rlim
;
3298 lock_user_struct(target_rlim
, arg2
, 1);
3299 rlim
.rlim_cur
= tswapl(target_rlim
->rlim_cur
);
3300 rlim
.rlim_max
= tswapl(target_rlim
->rlim_max
);
3301 unlock_user_struct(target_rlim
, arg2
, 0);
3302 ret
= get_errno(setrlimit(resource
, &rlim
));
3305 case TARGET_NR_getrlimit
:
3307 /* XXX: convert resource ? */
3308 int resource
= arg1
;
3309 struct target_rlimit
*target_rlim
;
3312 ret
= get_errno(getrlimit(resource
, &rlim
));
3313 if (!is_error(ret
)) {
3314 lock_user_struct(target_rlim
, arg2
, 0);
3315 rlim
.rlim_cur
= tswapl(target_rlim
->rlim_cur
);
3316 rlim
.rlim_max
= tswapl(target_rlim
->rlim_max
);
3317 unlock_user_struct(target_rlim
, arg2
, 1);
3321 case TARGET_NR_getrusage
:
3323 struct rusage rusage
;
3324 ret
= get_errno(getrusage(arg1
, &rusage
));
3325 if (!is_error(ret
)) {
3326 host_to_target_rusage(arg2
, &rusage
);
3330 case TARGET_NR_gettimeofday
:
3333 ret
= get_errno(gettimeofday(&tv
, NULL
));
3334 if (!is_error(ret
)) {
3335 host_to_target_timeval(arg1
, &tv
);
3339 case TARGET_NR_settimeofday
:
3342 target_to_host_timeval(&tv
, arg1
);
3343 ret
= get_errno(settimeofday(&tv
, NULL
));
3346 #ifdef TARGET_NR_select
3347 case TARGET_NR_select
:
3349 struct target_sel_arg_struct
*sel
;
3350 target_ulong inp
, outp
, exp
, tvp
;
3353 lock_user_struct(sel
, arg1
, 1);
3354 nsel
= tswapl(sel
->n
);
3355 inp
= tswapl(sel
->inp
);
3356 outp
= tswapl(sel
->outp
);
3357 exp
= tswapl(sel
->exp
);
3358 tvp
= tswapl(sel
->tvp
);
3359 unlock_user_struct(sel
, arg1
, 0);
3360 ret
= do_select(nsel
, inp
, outp
, exp
, tvp
);
3364 case TARGET_NR_symlink
:
3367 p
= lock_user_string(arg1
);
3368 p2
= lock_user_string(arg2
);
3369 ret
= get_errno(symlink(p
, p2
));
3370 unlock_user(p2
, arg2
, 0);
3371 unlock_user(p
, arg1
, 0);
3374 #if defined(TARGET_NR_symlinkat) && defined(__NR_symlinkat)
3375 case TARGET_NR_symlinkat
:
3376 if (!arg1
|| !arg3
) {
3382 p
= lock_user_string(arg1
);
3383 p2
= lock_user_string(arg3
);
3384 if (!access_ok(VERIFY_READ
, p
, 1)
3385 || !access_ok(VERIFY_READ
, p2
, 1))
3388 ret
= get_errno(sys_symlinkat(p
, arg2
, p2
));
3390 unlock_user(p2
, arg3
, 0);
3392 unlock_user(p
, arg1
, 0);
3396 #ifdef TARGET_NR_oldlstat
3397 case TARGET_NR_oldlstat
:
3400 case TARGET_NR_readlink
:
3403 p
= lock_user_string(arg1
);
3404 p2
= lock_user(arg2
, arg3
, 0);
3405 ret
= get_errno(readlink(path(p
), p2
, arg3
));
3406 unlock_user(p2
, arg2
, ret
);
3407 unlock_user(p
, arg1
, 0);
3410 #if defined(TARGET_NR_readlinkat) && defined(__NR_readlinkat)
3411 case TARGET_NR_readlinkat
:
3412 if (!arg2
|| !arg3
) {
3418 p
= lock_user_string(arg2
);
3419 p2
= lock_user(arg3
, arg4
, 0);
3420 if (!access_ok(VERIFY_READ
, p
, 1)
3421 || !access_ok(VERIFY_READ
, p2
, 1))
3424 ret
= get_errno(sys_readlinkat(arg1
, path(p
), p2
, arg4
));
3426 unlock_user(p2
, arg3
, ret
);
3428 unlock_user(p
, arg2
, 0);
3432 #ifdef TARGET_NR_uselib
3433 case TARGET_NR_uselib
:
3436 #ifdef TARGET_NR_swapon
3437 case TARGET_NR_swapon
:
3438 p
= lock_user_string(arg1
);
3439 ret
= get_errno(swapon(p
, arg2
));
3440 unlock_user(p
, arg1
, 0);
3443 case TARGET_NR_reboot
:
3445 #ifdef TARGET_NR_readdir
3446 case TARGET_NR_readdir
:
3449 #ifdef TARGET_NR_mmap
3450 case TARGET_NR_mmap
:
3451 #if defined(TARGET_I386) || defined(TARGET_ARM) || defined(TARGET_M68K)
3454 target_ulong v1
, v2
, v3
, v4
, v5
, v6
;
3455 v
= lock_user(arg1
, 6 * sizeof(target_ulong
), 1);
3462 unlock_user(v
, arg1
, 0);
3463 ret
= get_errno(target_mmap(v1
, v2
, v3
,
3464 target_to_host_bitmask(v4
, mmap_flags_tbl
),
3468 ret
= get_errno(target_mmap(arg1
, arg2
, arg3
,
3469 target_to_host_bitmask(arg4
, mmap_flags_tbl
),
3475 #ifdef TARGET_NR_mmap2
3476 case TARGET_NR_mmap2
:
3477 #if defined(TARGET_SPARC) || defined(TARGET_MIPS)
3478 #define MMAP_SHIFT 12
3480 #define MMAP_SHIFT TARGET_PAGE_BITS
3482 ret
= get_errno(target_mmap(arg1
, arg2
, arg3
,
3483 target_to_host_bitmask(arg4
, mmap_flags_tbl
),
3485 arg6
<< MMAP_SHIFT
));
3488 case TARGET_NR_munmap
:
3489 ret
= get_errno(target_munmap(arg1
, arg2
));
3491 case TARGET_NR_mprotect
:
3492 ret
= get_errno(target_mprotect(arg1
, arg2
, arg3
));
3494 #ifdef TARGET_NR_mremap
3495 case TARGET_NR_mremap
:
3496 ret
= get_errno(target_mremap(arg1
, arg2
, arg3
, arg4
, arg5
));
3499 /* ??? msync/mlock/munlock are broken for softmmu. */
3500 #ifdef TARGET_NR_msync
3501 case TARGET_NR_msync
:
3502 ret
= get_errno(msync(g2h(arg1
), arg2
, arg3
));
3505 #ifdef TARGET_NR_mlock
3506 case TARGET_NR_mlock
:
3507 ret
= get_errno(mlock(g2h(arg1
), arg2
));
3510 #ifdef TARGET_NR_munlock
3511 case TARGET_NR_munlock
:
3512 ret
= get_errno(munlock(g2h(arg1
), arg2
));
3515 #ifdef TARGET_NR_mlockall
3516 case TARGET_NR_mlockall
:
3517 ret
= get_errno(mlockall(arg1
));
3520 #ifdef TARGET_NR_munlockall
3521 case TARGET_NR_munlockall
:
3522 ret
= get_errno(munlockall());
3525 case TARGET_NR_truncate
:
3526 p
= lock_user_string(arg1
);
3527 ret
= get_errno(truncate(p
, arg2
));
3528 unlock_user(p
, arg1
, 0);
3530 case TARGET_NR_ftruncate
:
3531 ret
= get_errno(ftruncate(arg1
, arg2
));
3533 case TARGET_NR_fchmod
:
3534 ret
= get_errno(fchmod(arg1
, arg2
));
3536 case TARGET_NR_getpriority
:
3537 ret
= get_errno(getpriority(arg1
, arg2
));
3539 case TARGET_NR_setpriority
:
3540 ret
= get_errno(setpriority(arg1
, arg2
, arg3
));
3542 #ifdef TARGET_NR_profil
3543 case TARGET_NR_profil
:
3546 case TARGET_NR_statfs
:
3547 p
= lock_user_string(arg1
);
3548 ret
= get_errno(statfs(path(p
), &stfs
));
3549 unlock_user(p
, arg1
, 0);
3551 if (!is_error(ret
)) {
3552 struct target_statfs
*target_stfs
;
3554 lock_user_struct(target_stfs
, arg2
, 0);
3555 /* ??? put_user is probably wrong. */
3556 put_user(stfs
.f_type
, &target_stfs
->f_type
);
3557 put_user(stfs
.f_bsize
, &target_stfs
->f_bsize
);
3558 put_user(stfs
.f_blocks
, &target_stfs
->f_blocks
);
3559 put_user(stfs
.f_bfree
, &target_stfs
->f_bfree
);
3560 put_user(stfs
.f_bavail
, &target_stfs
->f_bavail
);
3561 put_user(stfs
.f_files
, &target_stfs
->f_files
);
3562 put_user(stfs
.f_ffree
, &target_stfs
->f_ffree
);
3563 put_user(stfs
.f_fsid
.__val
[0], &target_stfs
->f_fsid
.val
[0]);
3564 put_user(stfs
.f_fsid
.__val
[1], &target_stfs
->f_fsid
.val
[1]);
3565 put_user(stfs
.f_namelen
, &target_stfs
->f_namelen
);
3566 unlock_user_struct(target_stfs
, arg2
, 1);
3569 case TARGET_NR_fstatfs
:
3570 ret
= get_errno(fstatfs(arg1
, &stfs
));
3571 goto convert_statfs
;
3572 #ifdef TARGET_NR_statfs64
3573 case TARGET_NR_statfs64
:
3574 p
= lock_user_string(arg1
);
3575 ret
= get_errno(statfs(path(p
), &stfs
));
3576 unlock_user(p
, arg1
, 0);
3578 if (!is_error(ret
)) {
3579 struct target_statfs64
*target_stfs
;
3581 lock_user_struct(target_stfs
, arg3
, 0);
3582 /* ??? put_user is probably wrong. */
3583 put_user(stfs
.f_type
, &target_stfs
->f_type
);
3584 put_user(stfs
.f_bsize
, &target_stfs
->f_bsize
);
3585 put_user(stfs
.f_blocks
, &target_stfs
->f_blocks
);
3586 put_user(stfs
.f_bfree
, &target_stfs
->f_bfree
);
3587 put_user(stfs
.f_bavail
, &target_stfs
->f_bavail
);
3588 put_user(stfs
.f_files
, &target_stfs
->f_files
);
3589 put_user(stfs
.f_ffree
, &target_stfs
->f_ffree
);
3590 put_user(stfs
.f_fsid
.__val
[0], &target_stfs
->f_fsid
.val
[0]);
3591 put_user(stfs
.f_fsid
.__val
[1], &target_stfs
->f_fsid
.val
[1]);
3592 put_user(stfs
.f_namelen
, &target_stfs
->f_namelen
);
3593 unlock_user_struct(target_stfs
, arg3
, 0);
3596 case TARGET_NR_fstatfs64
:
3597 ret
= get_errno(fstatfs(arg1
, &stfs
));
3598 goto convert_statfs64
;
3600 #ifdef TARGET_NR_ioperm
3601 case TARGET_NR_ioperm
:
3604 #ifdef TARGET_NR_socketcall
3605 case TARGET_NR_socketcall
:
3606 ret
= do_socketcall(arg1
, arg2
);
3609 #ifdef TARGET_NR_accept
3610 case TARGET_NR_accept
:
3611 ret
= do_accept(arg1
, arg2
, arg3
);
3614 #ifdef TARGET_NR_bind
3615 case TARGET_NR_bind
:
3616 ret
= do_bind(arg1
, arg2
, arg3
);
3619 #ifdef TARGET_NR_connect
3620 case TARGET_NR_connect
:
3621 ret
= do_connect(arg1
, arg2
, arg3
);
3624 #ifdef TARGET_NR_getpeername
3625 case TARGET_NR_getpeername
:
3626 ret
= do_getpeername(arg1
, arg2
, arg3
);
3629 #ifdef TARGET_NR_getsockname
3630 case TARGET_NR_getsockname
:
3631 ret
= do_getsockname(arg1
, arg2
, arg3
);
3634 #ifdef TARGET_NR_getsockopt
3635 case TARGET_NR_getsockopt
:
3636 ret
= do_getsockopt(arg1
, arg2
, arg3
, arg4
, arg5
);
3639 #ifdef TARGET_NR_listen
3640 case TARGET_NR_listen
:
3641 ret
= get_errno(listen(arg1
, arg2
));
3644 #ifdef TARGET_NR_recv
3645 case TARGET_NR_recv
:
3646 ret
= do_recvfrom(arg1
, arg2
, arg3
, arg4
, 0, 0);
3649 #ifdef TARGET_NR_recvfrom
3650 case TARGET_NR_recvfrom
:
3651 ret
= do_recvfrom(arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
3654 #ifdef TARGET_NR_recvmsg
3655 case TARGET_NR_recvmsg
:
3656 ret
= do_sendrecvmsg(arg1
, arg2
, arg3
, 0);
3659 #ifdef TARGET_NR_send
3660 case TARGET_NR_send
:
3661 ret
= do_sendto(arg1
, arg2
, arg3
, arg4
, 0, 0);
3664 #ifdef TARGET_NR_sendmsg
3665 case TARGET_NR_sendmsg
:
3666 ret
= do_sendrecvmsg(arg1
, arg2
, arg3
, 1);
3669 #ifdef TARGET_NR_sendto
3670 case TARGET_NR_sendto
:
3671 ret
= do_sendto(arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
3674 #ifdef TARGET_NR_shutdown
3675 case TARGET_NR_shutdown
:
3676 ret
= get_errno(shutdown(arg1
, arg2
));
3679 #ifdef TARGET_NR_socket
3680 case TARGET_NR_socket
:
3681 ret
= do_socket(arg1
, arg2
, arg3
);
3684 #ifdef TARGET_NR_socketpair
3685 case TARGET_NR_socketpair
:
3686 ret
= do_socketpair(arg1
, arg2
, arg3
, arg4
);
3689 #ifdef TARGET_NR_setsockopt
3690 case TARGET_NR_setsockopt
:
3691 ret
= do_setsockopt(arg1
, arg2
, arg3
, arg4
, (socklen_t
) arg5
);
3695 case TARGET_NR_syslog
:
3696 p
= lock_user_string(arg2
);
3697 ret
= get_errno(sys_syslog((int)arg1
, p
, (int)arg3
));
3698 unlock_user(p
, arg2
, 0);
3701 case TARGET_NR_setitimer
:
3703 struct itimerval value
, ovalue
, *pvalue
;
3707 target_to_host_timeval(&pvalue
->it_interval
,
3709 target_to_host_timeval(&pvalue
->it_value
,
3710 arg2
+ sizeof(struct target_timeval
));
3714 ret
= get_errno(setitimer(arg1
, pvalue
, &ovalue
));
3715 if (!is_error(ret
) && arg3
) {
3716 host_to_target_timeval(arg3
,
3717 &ovalue
.it_interval
);
3718 host_to_target_timeval(arg3
+ sizeof(struct target_timeval
),
3723 case TARGET_NR_getitimer
:
3725 struct itimerval value
;
3727 ret
= get_errno(getitimer(arg1
, &value
));
3728 if (!is_error(ret
) && arg2
) {
3729 host_to_target_timeval(arg2
,
3730 &value
.it_interval
);
3731 host_to_target_timeval(arg2
+ sizeof(struct target_timeval
),
3736 case TARGET_NR_stat
:
3737 p
= lock_user_string(arg1
);
3738 ret
= get_errno(stat(path(p
), &st
));
3739 unlock_user(p
, arg1
, 0);
3741 case TARGET_NR_lstat
:
3742 p
= lock_user_string(arg1
);
3743 ret
= get_errno(lstat(path(p
), &st
));
3744 unlock_user(p
, arg1
, 0);
3746 case TARGET_NR_fstat
:
3748 ret
= get_errno(fstat(arg1
, &st
));
3750 if (!is_error(ret
)) {
3751 struct target_stat
*target_st
;
3753 lock_user_struct(target_st
, arg2
, 0);
3754 #if defined(TARGET_MIPS) || defined(TARGET_SPARC64)
3755 target_st
->st_dev
= tswap32(st
.st_dev
);
3757 target_st
->st_dev
= tswap16(st
.st_dev
);
3759 target_st
->st_ino
= tswapl(st
.st_ino
);
3760 #if defined(TARGET_PPC) || defined(TARGET_MIPS)
3761 target_st
->st_mode
= tswapl(st
.st_mode
); /* XXX: check this */
3762 target_st
->st_uid
= tswap32(st
.st_uid
);
3763 target_st
->st_gid
= tswap32(st
.st_gid
);
3764 #elif defined(TARGET_SPARC64)
3765 target_st
->st_mode
= tswap32(st
.st_mode
);
3766 target_st
->st_uid
= tswap32(st
.st_uid
);
3767 target_st
->st_gid
= tswap32(st
.st_gid
);
3769 target_st
->st_mode
= tswap16(st
.st_mode
);
3770 target_st
->st_uid
= tswap16(st
.st_uid
);
3771 target_st
->st_gid
= tswap16(st
.st_gid
);
3773 #if defined(TARGET_MIPS)
3774 /* If this is the same on PPC, then just merge w/ the above ifdef */
3775 target_st
->st_nlink
= tswapl(st
.st_nlink
);
3776 target_st
->st_rdev
= tswapl(st
.st_rdev
);
3777 #elif defined(TARGET_SPARC64)
3778 target_st
->st_nlink
= tswap32(st
.st_nlink
);
3779 target_st
->st_rdev
= tswap32(st
.st_rdev
);
3781 target_st
->st_nlink
= tswap16(st
.st_nlink
);
3782 target_st
->st_rdev
= tswap16(st
.st_rdev
);
3784 target_st
->st_size
= tswapl(st
.st_size
);
3785 target_st
->st_blksize
= tswapl(st
.st_blksize
);
3786 target_st
->st_blocks
= tswapl(st
.st_blocks
);
3787 target_st
->target_st_atime
= tswapl(st
.st_atime
);
3788 target_st
->target_st_mtime
= tswapl(st
.st_mtime
);
3789 target_st
->target_st_ctime
= tswapl(st
.st_ctime
);
3790 unlock_user_struct(target_st
, arg2
, 1);
3794 #ifdef TARGET_NR_olduname
3795 case TARGET_NR_olduname
:
3798 #ifdef TARGET_NR_iopl
3799 case TARGET_NR_iopl
:
3802 case TARGET_NR_vhangup
:
3803 ret
= get_errno(vhangup());
3805 #ifdef TARGET_NR_idle
3806 case TARGET_NR_idle
:
3809 #ifdef TARGET_NR_syscall
3810 case TARGET_NR_syscall
:
3811 ret
= do_syscall(cpu_env
,arg1
& 0xffff,arg2
,arg3
,arg4
,arg5
,arg6
,0);
3814 case TARGET_NR_wait4
:
3817 target_long status_ptr
= arg2
;
3818 struct rusage rusage
, *rusage_ptr
;
3819 target_ulong target_rusage
= arg4
;
3821 rusage_ptr
= &rusage
;
3824 ret
= get_errno(wait4(arg1
, &status
, arg3
, rusage_ptr
));
3825 if (!is_error(ret
)) {
3827 tputl(status_ptr
, status
);
3828 if (target_rusage
) {
3829 host_to_target_rusage(target_rusage
, &rusage
);
3834 #ifdef TARGET_NR_swapoff
3835 case TARGET_NR_swapoff
:
3836 p
= lock_user_string(arg1
);
3837 ret
= get_errno(swapoff(p
));
3838 unlock_user(p
, arg1
, 0);
3841 case TARGET_NR_sysinfo
:
3843 struct target_sysinfo
*target_value
;
3844 struct sysinfo value
;
3845 ret
= get_errno(sysinfo(&value
));
3846 if (!is_error(ret
) && arg1
)
3848 /* ??? __put_user is probably wrong. */
3849 lock_user_struct(target_value
, arg1
, 0);
3850 __put_user(value
.uptime
, &target_value
->uptime
);
3851 __put_user(value
.loads
[0], &target_value
->loads
[0]);
3852 __put_user(value
.loads
[1], &target_value
->loads
[1]);
3853 __put_user(value
.loads
[2], &target_value
->loads
[2]);
3854 __put_user(value
.totalram
, &target_value
->totalram
);
3855 __put_user(value
.freeram
, &target_value
->freeram
);
3856 __put_user(value
.sharedram
, &target_value
->sharedram
);
3857 __put_user(value
.bufferram
, &target_value
->bufferram
);
3858 __put_user(value
.totalswap
, &target_value
->totalswap
);
3859 __put_user(value
.freeswap
, &target_value
->freeswap
);
3860 __put_user(value
.procs
, &target_value
->procs
);
3861 __put_user(value
.totalhigh
, &target_value
->totalhigh
);
3862 __put_user(value
.freehigh
, &target_value
->freehigh
);
3863 __put_user(value
.mem_unit
, &target_value
->mem_unit
);
3864 unlock_user_struct(target_value
, arg1
, 1);
3868 #ifdef TARGET_NR_ipc
3870 ret
= do_ipc(arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
3873 case TARGET_NR_fsync
:
3874 ret
= get_errno(fsync(arg1
));
3876 case TARGET_NR_clone
:
3877 ret
= get_errno(do_fork(cpu_env
, arg1
, arg2
));
3879 #ifdef __NR_exit_group
3880 /* new thread calls */
3881 case TARGET_NR_exit_group
:
3882 gdb_exit(cpu_env
, arg1
);
3883 ret
= get_errno(exit_group(arg1
));
3886 case TARGET_NR_setdomainname
:
3887 p
= lock_user_string(arg1
);
3888 ret
= get_errno(setdomainname(p
, arg2
));
3889 unlock_user(p
, arg1
, 0);
3891 case TARGET_NR_uname
:
3892 /* no need to transcode because we use the linux syscall */
3894 struct new_utsname
* buf
;
3896 lock_user_struct(buf
, arg1
, 0);
3897 ret
= get_errno(sys_uname(buf
));
3898 if (!is_error(ret
)) {
3899 /* Overrite the native machine name with whatever is being
3901 strcpy (buf
->machine
, UNAME_MACHINE
);
3902 /* Allow the user to override the reported release. */
3903 if (qemu_uname_release
&& *qemu_uname_release
)
3904 strcpy (buf
->release
, qemu_uname_release
);
3906 unlock_user_struct(buf
, arg1
, 1);
3910 case TARGET_NR_modify_ldt
:
3911 ret
= get_errno(do_modify_ldt(cpu_env
, arg1
, arg2
, arg3
));
3913 #if !defined(TARGET_X86_64)
3914 case TARGET_NR_vm86old
:
3916 case TARGET_NR_vm86
:
3917 ret
= do_vm86(cpu_env
, arg1
, arg2
);
3921 case TARGET_NR_adjtimex
:
3923 #ifdef TARGET_NR_create_module
3924 case TARGET_NR_create_module
:
3926 case TARGET_NR_init_module
:
3927 case TARGET_NR_delete_module
:
3928 #ifdef TARGET_NR_get_kernel_syms
3929 case TARGET_NR_get_kernel_syms
:
3932 case TARGET_NR_quotactl
:
3934 case TARGET_NR_getpgid
:
3935 ret
= get_errno(getpgid(arg1
));
3937 case TARGET_NR_fchdir
:
3938 ret
= get_errno(fchdir(arg1
));
3940 #ifdef TARGET_NR_bdflush /* not on x86_64 */
3941 case TARGET_NR_bdflush
:
3944 #ifdef TARGET_NR_sysfs
3945 case TARGET_NR_sysfs
:
3948 case TARGET_NR_personality
:
3949 ret
= get_errno(personality(arg1
));
3951 #ifdef TARGET_NR_afs_syscall
3952 case TARGET_NR_afs_syscall
:
3955 #ifdef TARGET_NR__llseek /* Not on alpha */
3956 case TARGET_NR__llseek
:
3958 #if defined (__x86_64__)
3959 ret
= get_errno(lseek(arg1
, ((uint64_t )arg2
<< 32) | arg3
, arg5
));
3963 ret
= get_errno(_llseek(arg1
, arg2
, arg3
, &res
, arg5
));
3969 case TARGET_NR_getdents
:
3970 #if TARGET_LONG_SIZE != 4
3972 #warning not supported
3973 #elif TARGET_LONG_SIZE == 4 && HOST_LONG_SIZE == 8
3975 struct target_dirent
*target_dirp
;
3976 struct dirent
*dirp
;
3979 dirp
= malloc(count
);
3983 ret
= get_errno(sys_getdents(arg1
, dirp
, count
));
3984 if (!is_error(ret
)) {
3986 struct target_dirent
*tde
;
3988 int reclen
, treclen
;
3989 int count1
, tnamelen
;
3993 target_dirp
= lock_user(arg2
, count
, 0);
3996 reclen
= de
->d_reclen
;
3997 treclen
= reclen
- (2 * (sizeof(long) - sizeof(target_long
)));
3998 tde
->d_reclen
= tswap16(treclen
);
3999 tde
->d_ino
= tswapl(de
->d_ino
);
4000 tde
->d_off
= tswapl(de
->d_off
);
4001 tnamelen
= treclen
- (2 * sizeof(target_long
) + 2);
4004 /* XXX: may not be correct */
4005 strncpy(tde
->d_name
, de
->d_name
, tnamelen
);
4006 de
= (struct dirent
*)((char *)de
+ reclen
);
4008 tde
= (struct target_dirent
*)((char *)tde
+ treclen
);
4013 unlock_user(target_dirp
, arg2
, ret
);
4018 struct dirent
*dirp
;
4021 dirp
= lock_user(arg2
, count
, 0);
4022 ret
= get_errno(sys_getdents(arg1
, dirp
, count
));
4023 if (!is_error(ret
)) {
4029 reclen
= de
->d_reclen
;
4032 de
->d_reclen
= tswap16(reclen
);
4033 tswapls(&de
->d_ino
);
4034 tswapls(&de
->d_off
);
4035 de
= (struct dirent
*)((char *)de
+ reclen
);
4039 unlock_user(dirp
, arg2
, ret
);
4043 #if defined(TARGET_NR_getdents64) && defined(__NR_getdents64)
4044 case TARGET_NR_getdents64
:
4046 struct dirent64
*dirp
;
4048 dirp
= lock_user(arg2
, count
, 0);
4049 ret
= get_errno(sys_getdents64(arg1
, dirp
, count
));
4050 if (!is_error(ret
)) {
4051 struct dirent64
*de
;
4056 reclen
= de
->d_reclen
;
4059 de
->d_reclen
= tswap16(reclen
);
4060 tswap64s(&de
->d_ino
);
4061 tswap64s(&de
->d_off
);
4062 de
= (struct dirent64
*)((char *)de
+ reclen
);
4066 unlock_user(dirp
, arg2
, ret
);
4069 #endif /* TARGET_NR_getdents64 */
4070 #ifdef TARGET_NR__newselect
4071 case TARGET_NR__newselect
:
4072 ret
= do_select(arg1
, arg2
, arg3
, arg4
, arg5
);
4075 #ifdef TARGET_NR_poll
4076 case TARGET_NR_poll
:
4078 struct target_pollfd
*target_pfd
;
4079 unsigned int nfds
= arg2
;
4084 target_pfd
= lock_user(arg1
, sizeof(struct target_pollfd
) * nfds
, 1);
4085 pfd
= alloca(sizeof(struct pollfd
) * nfds
);
4086 for(i
= 0; i
< nfds
; i
++) {
4087 pfd
[i
].fd
= tswap32(target_pfd
[i
].fd
);
4088 pfd
[i
].events
= tswap16(target_pfd
[i
].events
);
4090 ret
= get_errno(poll(pfd
, nfds
, timeout
));
4091 if (!is_error(ret
)) {
4092 for(i
= 0; i
< nfds
; i
++) {
4093 target_pfd
[i
].revents
= tswap16(pfd
[i
].revents
);
4095 ret
+= nfds
* (sizeof(struct target_pollfd
)
4096 - sizeof(struct pollfd
));
4098 unlock_user(target_pfd
, arg1
, ret
);
4102 case TARGET_NR_flock
:
4103 /* NOTE: the flock constant seems to be the same for every
4105 ret
= get_errno(flock(arg1
, arg2
));
4107 case TARGET_NR_readv
:
4112 vec
= alloca(count
* sizeof(struct iovec
));
4113 lock_iovec(vec
, arg2
, count
, 0);
4114 ret
= get_errno(readv(arg1
, vec
, count
));
4115 unlock_iovec(vec
, arg2
, count
, 1);
4118 case TARGET_NR_writev
:
4123 vec
= alloca(count
* sizeof(struct iovec
));
4124 lock_iovec(vec
, arg2
, count
, 1);
4125 ret
= get_errno(writev(arg1
, vec
, count
));
4126 unlock_iovec(vec
, arg2
, count
, 0);
4129 case TARGET_NR_getsid
:
4130 ret
= get_errno(getsid(arg1
));
4132 #if defined(TARGET_NR_fdatasync) /* Not on alpha (osf_datasync ?) */
4133 case TARGET_NR_fdatasync
:
4134 ret
= get_errno(fdatasync(arg1
));
4137 case TARGET_NR__sysctl
:
4138 /* We don't implement this, but ENODIR is always a safe
4141 case TARGET_NR_sched_setparam
:
4143 struct sched_param
*target_schp
;
4144 struct sched_param schp
;
4146 lock_user_struct(target_schp
, arg2
, 1);
4147 schp
.sched_priority
= tswap32(target_schp
->sched_priority
);
4148 unlock_user_struct(target_schp
, arg2
, 0);
4149 ret
= get_errno(sched_setparam(arg1
, &schp
));
4152 case TARGET_NR_sched_getparam
:
4154 struct sched_param
*target_schp
;
4155 struct sched_param schp
;
4156 ret
= get_errno(sched_getparam(arg1
, &schp
));
4157 if (!is_error(ret
)) {
4158 lock_user_struct(target_schp
, arg2
, 0);
4159 target_schp
->sched_priority
= tswap32(schp
.sched_priority
);
4160 unlock_user_struct(target_schp
, arg2
, 1);
4164 case TARGET_NR_sched_setscheduler
:
4166 struct sched_param
*target_schp
;
4167 struct sched_param schp
;
4168 lock_user_struct(target_schp
, arg3
, 1);
4169 schp
.sched_priority
= tswap32(target_schp
->sched_priority
);
4170 unlock_user_struct(target_schp
, arg3
, 0);
4171 ret
= get_errno(sched_setscheduler(arg1
, arg2
, &schp
));
4174 case TARGET_NR_sched_getscheduler
:
4175 ret
= get_errno(sched_getscheduler(arg1
));
4177 case TARGET_NR_sched_yield
:
4178 ret
= get_errno(sched_yield());
4180 case TARGET_NR_sched_get_priority_max
:
4181 ret
= get_errno(sched_get_priority_max(arg1
));
4183 case TARGET_NR_sched_get_priority_min
:
4184 ret
= get_errno(sched_get_priority_min(arg1
));
4186 case TARGET_NR_sched_rr_get_interval
:
4189 ret
= get_errno(sched_rr_get_interval(arg1
, &ts
));
4190 if (!is_error(ret
)) {
4191 host_to_target_timespec(arg2
, &ts
);
4195 case TARGET_NR_nanosleep
:
4197 struct timespec req
, rem
;
4198 target_to_host_timespec(&req
, arg1
);
4199 ret
= get_errno(nanosleep(&req
, &rem
));
4200 if (is_error(ret
) && arg2
) {
4201 host_to_target_timespec(arg2
, &rem
);
4205 #ifdef TARGET_NR_query_module
4206 case TARGET_NR_query_module
:
4209 #ifdef TARGET_NR_nfsservctl
4210 case TARGET_NR_nfsservctl
:
4213 case TARGET_NR_prctl
:
4216 case PR_GET_PDEATHSIG
:
4219 ret
= get_errno(prctl(arg1
, &deathsig
, arg3
, arg4
, arg5
));
4220 if (!is_error(ret
) && arg2
)
4221 tput32(arg2
, deathsig
);
4225 ret
= get_errno(prctl(arg1
, arg2
, arg3
, arg4
, arg5
));
4229 #ifdef TARGET_NR_pread
4230 case TARGET_NR_pread
:
4231 page_unprotect_range(arg2
, arg3
);
4232 p
= lock_user(arg2
, arg3
, 0);
4233 ret
= get_errno(pread(arg1
, p
, arg3
, arg4
));
4234 unlock_user(p
, arg2
, ret
);
4236 case TARGET_NR_pwrite
:
4237 p
= lock_user(arg2
, arg3
, 1);
4238 ret
= get_errno(pwrite(arg1
, p
, arg3
, arg4
));
4239 unlock_user(p
, arg2
, 0);
4242 case TARGET_NR_getcwd
:
4243 p
= lock_user(arg1
, arg2
, 0);
4244 ret
= get_errno(sys_getcwd1(p
, arg2
));
4245 unlock_user(p
, arg1
, ret
);
4247 case TARGET_NR_capget
:
4249 case TARGET_NR_capset
:
4251 case TARGET_NR_sigaltstack
:
4253 case TARGET_NR_sendfile
:
4255 #ifdef TARGET_NR_getpmsg
4256 case TARGET_NR_getpmsg
:
4259 #ifdef TARGET_NR_putpmsg
4260 case TARGET_NR_putpmsg
:
4263 #ifdef TARGET_NR_vfork
4264 case TARGET_NR_vfork
:
4265 ret
= get_errno(do_fork(cpu_env
, CLONE_VFORK
| CLONE_VM
| SIGCHLD
, 0));
4268 #ifdef TARGET_NR_ugetrlimit
4269 case TARGET_NR_ugetrlimit
:
4272 ret
= get_errno(getrlimit(arg1
, &rlim
));
4273 if (!is_error(ret
)) {
4274 struct target_rlimit
*target_rlim
;
4275 lock_user_struct(target_rlim
, arg2
, 0);
4276 target_rlim
->rlim_cur
= tswapl(rlim
.rlim_cur
);
4277 target_rlim
->rlim_max
= tswapl(rlim
.rlim_max
);
4278 unlock_user_struct(target_rlim
, arg2
, 1);
4283 #ifdef TARGET_NR_truncate64
4284 case TARGET_NR_truncate64
:
4285 p
= lock_user_string(arg1
);
4286 ret
= target_truncate64(cpu_env
, p
, arg2
, arg3
, arg4
);
4287 unlock_user(p
, arg1
, 0);
4290 #ifdef TARGET_NR_ftruncate64
4291 case TARGET_NR_ftruncate64
:
4292 ret
= target_ftruncate64(cpu_env
, arg1
, arg2
, arg3
, arg4
);
4295 #ifdef TARGET_NR_stat64
4296 case TARGET_NR_stat64
:
4297 p
= lock_user_string(arg1
);
4298 ret
= get_errno(stat(path(p
), &st
));
4299 unlock_user(p
, arg1
, 0);
4302 #ifdef TARGET_NR_lstat64
4303 case TARGET_NR_lstat64
:
4304 p
= lock_user_string(arg1
);
4305 ret
= get_errno(lstat(path(p
), &st
));
4306 unlock_user(p
, arg1
, 0);
4309 #ifdef TARGET_NR_fstat64
4310 case TARGET_NR_fstat64
:
4312 ret
= get_errno(fstat(arg1
, &st
));
4314 if (!is_error(ret
)) {
4316 if (((CPUARMState
*)cpu_env
)->eabi
) {
4317 struct target_eabi_stat64
*target_st
;
4318 lock_user_struct(target_st
, arg2
, 1);
4319 memset(target_st
, 0, sizeof(struct target_eabi_stat64
));
4320 /* put_user is probably wrong. */
4321 put_user(st
.st_dev
, &target_st
->st_dev
);
4322 put_user(st
.st_ino
, &target_st
->st_ino
);
4323 #ifdef TARGET_STAT64_HAS_BROKEN_ST_INO
4324 put_user(st
.st_ino
, &target_st
->__st_ino
);
4326 put_user(st
.st_mode
, &target_st
->st_mode
);
4327 put_user(st
.st_nlink
, &target_st
->st_nlink
);
4328 put_user(st
.st_uid
, &target_st
->st_uid
);
4329 put_user(st
.st_gid
, &target_st
->st_gid
);
4330 put_user(st
.st_rdev
, &target_st
->st_rdev
);
4331 /* XXX: better use of kernel struct */
4332 put_user(st
.st_size
, &target_st
->st_size
);
4333 put_user(st
.st_blksize
, &target_st
->st_blksize
);
4334 put_user(st
.st_blocks
, &target_st
->st_blocks
);
4335 put_user(st
.st_atime
, &target_st
->target_st_atime
);
4336 put_user(st
.st_mtime
, &target_st
->target_st_mtime
);
4337 put_user(st
.st_ctime
, &target_st
->target_st_ctime
);
4338 unlock_user_struct(target_st
, arg2
, 0);
4342 struct target_stat64
*target_st
;
4343 lock_user_struct(target_st
, arg2
, 1);
4344 memset(target_st
, 0, sizeof(struct target_stat64
));
4345 /* ??? put_user is probably wrong. */
4346 put_user(st
.st_dev
, &target_st
->st_dev
);
4347 put_user(st
.st_ino
, &target_st
->st_ino
);
4348 #ifdef TARGET_STAT64_HAS_BROKEN_ST_INO
4349 put_user(st
.st_ino
, &target_st
->__st_ino
);
4351 put_user(st
.st_mode
, &target_st
->st_mode
);
4352 put_user(st
.st_nlink
, &target_st
->st_nlink
);
4353 put_user(st
.st_uid
, &target_st
->st_uid
);
4354 put_user(st
.st_gid
, &target_st
->st_gid
);
4355 put_user(st
.st_rdev
, &target_st
->st_rdev
);
4356 /* XXX: better use of kernel struct */
4357 put_user(st
.st_size
, &target_st
->st_size
);
4358 put_user(st
.st_blksize
, &target_st
->st_blksize
);
4359 put_user(st
.st_blocks
, &target_st
->st_blocks
);
4360 put_user(st
.st_atime
, &target_st
->target_st_atime
);
4361 put_user(st
.st_mtime
, &target_st
->target_st_mtime
);
4362 put_user(st
.st_ctime
, &target_st
->target_st_ctime
);
4363 unlock_user_struct(target_st
, arg2
, 0);
4370 case TARGET_NR_lchown
:
4371 p
= lock_user_string(arg1
);
4372 ret
= get_errno(lchown(p
, low2highuid(arg2
), low2highgid(arg3
)));
4373 unlock_user(p
, arg1
, 0);
4375 case TARGET_NR_getuid
:
4376 ret
= get_errno(high2lowuid(getuid()));
4378 case TARGET_NR_getgid
:
4379 ret
= get_errno(high2lowgid(getgid()));
4381 case TARGET_NR_geteuid
:
4382 ret
= get_errno(high2lowuid(geteuid()));
4384 case TARGET_NR_getegid
:
4385 ret
= get_errno(high2lowgid(getegid()));
4387 case TARGET_NR_setreuid
:
4388 ret
= get_errno(setreuid(low2highuid(arg1
), low2highuid(arg2
)));
4390 case TARGET_NR_setregid
:
4391 ret
= get_errno(setregid(low2highgid(arg1
), low2highgid(arg2
)));
4393 case TARGET_NR_getgroups
:
4395 int gidsetsize
= arg1
;
4396 uint16_t *target_grouplist
;
4400 grouplist
= alloca(gidsetsize
* sizeof(gid_t
));
4401 ret
= get_errno(getgroups(gidsetsize
, grouplist
));
4402 if (!is_error(ret
)) {
4403 target_grouplist
= lock_user(arg2
, gidsetsize
* 2, 0);
4404 for(i
= 0;i
< gidsetsize
; i
++)
4405 target_grouplist
[i
] = tswap16(grouplist
[i
]);
4406 unlock_user(target_grouplist
, arg2
, gidsetsize
* 2);
4410 case TARGET_NR_setgroups
:
4412 int gidsetsize
= arg1
;
4413 uint16_t *target_grouplist
;
4417 grouplist
= alloca(gidsetsize
* sizeof(gid_t
));
4418 target_grouplist
= lock_user(arg2
, gidsetsize
* 2, 1);
4419 for(i
= 0;i
< gidsetsize
; i
++)
4420 grouplist
[i
] = tswap16(target_grouplist
[i
]);
4421 unlock_user(target_grouplist
, arg2
, 0);
4422 ret
= get_errno(setgroups(gidsetsize
, grouplist
));
4425 case TARGET_NR_fchown
:
4426 ret
= get_errno(fchown(arg1
, low2highuid(arg2
), low2highgid(arg3
)));
4428 #if defined(TARGET_NR_fchownat) && defined(__NR_fchownat)
4429 case TARGET_NR_fchownat
:
4434 p
= lock_user_string(arg2
);
4435 if (!access_ok(VERIFY_READ
, p
, 1))
4438 ret
= get_errno(sys_fchownat(arg1
, p
, low2highuid(arg3
), low2highgid(arg4
), arg5
));
4440 unlock_user(p
, arg2
, 0);
4443 #ifdef TARGET_NR_setresuid
4444 case TARGET_NR_setresuid
:
4445 ret
= get_errno(setresuid(low2highuid(arg1
),
4447 low2highuid(arg3
)));
4450 #ifdef TARGET_NR_getresuid
4451 case TARGET_NR_getresuid
:
4453 uid_t ruid
, euid
, suid
;
4454 ret
= get_errno(getresuid(&ruid
, &euid
, &suid
));
4455 if (!is_error(ret
)) {
4456 tput16(arg1
, tswap16(high2lowuid(ruid
)));
4457 tput16(arg2
, tswap16(high2lowuid(euid
)));
4458 tput16(arg3
, tswap16(high2lowuid(suid
)));
4463 #ifdef TARGET_NR_getresgid
4464 case TARGET_NR_setresgid
:
4465 ret
= get_errno(setresgid(low2highgid(arg1
),
4467 low2highgid(arg3
)));
4470 #ifdef TARGET_NR_getresgid
4471 case TARGET_NR_getresgid
:
4473 gid_t rgid
, egid
, sgid
;
4474 ret
= get_errno(getresgid(&rgid
, &egid
, &sgid
));
4475 if (!is_error(ret
)) {
4476 tput16(arg1
, tswap16(high2lowgid(rgid
)));
4477 tput16(arg2
, tswap16(high2lowgid(egid
)));
4478 tput16(arg3
, tswap16(high2lowgid(sgid
)));
4483 case TARGET_NR_chown
:
4484 p
= lock_user_string(arg1
);
4485 ret
= get_errno(chown(p
, low2highuid(arg2
), low2highgid(arg3
)));
4486 unlock_user(p
, arg1
, 0);
4488 case TARGET_NR_setuid
:
4489 ret
= get_errno(setuid(low2highuid(arg1
)));
4491 case TARGET_NR_setgid
:
4492 ret
= get_errno(setgid(low2highgid(arg1
)));
4494 case TARGET_NR_setfsuid
:
4495 ret
= get_errno(setfsuid(arg1
));
4497 case TARGET_NR_setfsgid
:
4498 ret
= get_errno(setfsgid(arg1
));
4500 #endif /* USE_UID16 */
4502 #ifdef TARGET_NR_lchown32
4503 case TARGET_NR_lchown32
:
4504 p
= lock_user_string(arg1
);
4505 ret
= get_errno(lchown(p
, arg2
, arg3
));
4506 unlock_user(p
, arg1
, 0);
4509 #ifdef TARGET_NR_getuid32
4510 case TARGET_NR_getuid32
:
4511 ret
= get_errno(getuid());
4514 #ifdef TARGET_NR_getgid32
4515 case TARGET_NR_getgid32
:
4516 ret
= get_errno(getgid());
4519 #ifdef TARGET_NR_geteuid32
4520 case TARGET_NR_geteuid32
:
4521 ret
= get_errno(geteuid());
4524 #ifdef TARGET_NR_getegid32
4525 case TARGET_NR_getegid32
:
4526 ret
= get_errno(getegid());
4529 #ifdef TARGET_NR_setreuid32
4530 case TARGET_NR_setreuid32
:
4531 ret
= get_errno(setreuid(arg1
, arg2
));
4534 #ifdef TARGET_NR_setregid32
4535 case TARGET_NR_setregid32
:
4536 ret
= get_errno(setregid(arg1
, arg2
));
4539 #ifdef TARGET_NR_getgroups32
4540 case TARGET_NR_getgroups32
:
4542 int gidsetsize
= arg1
;
4543 uint32_t *target_grouplist
;
4547 grouplist
= alloca(gidsetsize
* sizeof(gid_t
));
4548 ret
= get_errno(getgroups(gidsetsize
, grouplist
));
4549 if (!is_error(ret
)) {
4550 target_grouplist
= lock_user(arg2
, gidsetsize
* 4, 0);
4551 for(i
= 0;i
< gidsetsize
; i
++)
4552 target_grouplist
[i
] = tswap32(grouplist
[i
]);
4553 unlock_user(target_grouplist
, arg2
, gidsetsize
* 4);
4558 #ifdef TARGET_NR_setgroups32
4559 case TARGET_NR_setgroups32
:
4561 int gidsetsize
= arg1
;
4562 uint32_t *target_grouplist
;
4566 grouplist
= alloca(gidsetsize
* sizeof(gid_t
));
4567 target_grouplist
= lock_user(arg2
, gidsetsize
* 4, 1);
4568 for(i
= 0;i
< gidsetsize
; i
++)
4569 grouplist
[i
] = tswap32(target_grouplist
[i
]);
4570 unlock_user(target_grouplist
, arg2
, 0);
4571 ret
= get_errno(setgroups(gidsetsize
, grouplist
));
4575 #ifdef TARGET_NR_fchown32
4576 case TARGET_NR_fchown32
:
4577 ret
= get_errno(fchown(arg1
, arg2
, arg3
));
4580 #ifdef TARGET_NR_setresuid32
4581 case TARGET_NR_setresuid32
:
4582 ret
= get_errno(setresuid(arg1
, arg2
, arg3
));
4585 #ifdef TARGET_NR_getresuid32
4586 case TARGET_NR_getresuid32
:
4588 uid_t ruid
, euid
, suid
;
4589 ret
= get_errno(getresuid(&ruid
, &euid
, &suid
));
4590 if (!is_error(ret
)) {
4591 tput32(arg1
, tswap32(ruid
));
4592 tput32(arg2
, tswap32(euid
));
4593 tput32(arg3
, tswap32(suid
));
4598 #ifdef TARGET_NR_setresgid32
4599 case TARGET_NR_setresgid32
:
4600 ret
= get_errno(setresgid(arg1
, arg2
, arg3
));
4603 #ifdef TARGET_NR_getresgid32
4604 case TARGET_NR_getresgid32
:
4606 gid_t rgid
, egid
, sgid
;
4607 ret
= get_errno(getresgid(&rgid
, &egid
, &sgid
));
4608 if (!is_error(ret
)) {
4609 tput32(arg1
, tswap32(rgid
));
4610 tput32(arg2
, tswap32(egid
));
4611 tput32(arg3
, tswap32(sgid
));
4616 #ifdef TARGET_NR_chown32
4617 case TARGET_NR_chown32
:
4618 p
= lock_user_string(arg1
);
4619 ret
= get_errno(chown(p
, arg2
, arg3
));
4620 unlock_user(p
, arg1
, 0);
4623 #ifdef TARGET_NR_setuid32
4624 case TARGET_NR_setuid32
:
4625 ret
= get_errno(setuid(arg1
));
4628 #ifdef TARGET_NR_setgid32
4629 case TARGET_NR_setgid32
:
4630 ret
= get_errno(setgid(arg1
));
4633 #ifdef TARGET_NR_setfsuid32
4634 case TARGET_NR_setfsuid32
:
4635 ret
= get_errno(setfsuid(arg1
));
4638 #ifdef TARGET_NR_setfsgid32
4639 case TARGET_NR_setfsgid32
:
4640 ret
= get_errno(setfsgid(arg1
));
4644 case TARGET_NR_pivot_root
:
4646 #ifdef TARGET_NR_mincore
4647 case TARGET_NR_mincore
:
4650 #ifdef TARGET_NR_madvise
4651 case TARGET_NR_madvise
:
4652 /* A straight passthrough may not be safe because qemu sometimes
4653 turns private flie-backed mappings into anonymous mappings.
4654 This will break MADV_DONTNEED.
4655 This is a hint, so ignoring and returning success is ok. */
4659 #if TARGET_LONG_BITS == 32
4660 case TARGET_NR_fcntl64
:
4664 struct target_flock64
*target_fl
;
4666 struct target_eabi_flock64
*target_efl
;
4670 case TARGET_F_GETLK64
:
4673 case TARGET_F_SETLK64
:
4676 case TARGET_F_SETLKW64
:
4685 case TARGET_F_GETLK64
:
4687 if (((CPUARMState
*)cpu_env
)->eabi
) {
4688 lock_user_struct(target_efl
, arg3
, 1);
4689 fl
.l_type
= tswap16(target_efl
->l_type
);
4690 fl
.l_whence
= tswap16(target_efl
->l_whence
);
4691 fl
.l_start
= tswap64(target_efl
->l_start
);
4692 fl
.l_len
= tswap64(target_efl
->l_len
);
4693 fl
.l_pid
= tswapl(target_efl
->l_pid
);
4694 unlock_user_struct(target_efl
, arg3
, 0);
4698 lock_user_struct(target_fl
, arg3
, 1);
4699 fl
.l_type
= tswap16(target_fl
->l_type
);
4700 fl
.l_whence
= tswap16(target_fl
->l_whence
);
4701 fl
.l_start
= tswap64(target_fl
->l_start
);
4702 fl
.l_len
= tswap64(target_fl
->l_len
);
4703 fl
.l_pid
= tswapl(target_fl
->l_pid
);
4704 unlock_user_struct(target_fl
, arg3
, 0);
4706 ret
= get_errno(fcntl(arg1
, cmd
, &fl
));
4709 if (((CPUARMState
*)cpu_env
)->eabi
) {
4710 lock_user_struct(target_efl
, arg3
, 0);
4711 target_efl
->l_type
= tswap16(fl
.l_type
);
4712 target_efl
->l_whence
= tswap16(fl
.l_whence
);
4713 target_efl
->l_start
= tswap64(fl
.l_start
);
4714 target_efl
->l_len
= tswap64(fl
.l_len
);
4715 target_efl
->l_pid
= tswapl(fl
.l_pid
);
4716 unlock_user_struct(target_efl
, arg3
, 1);
4720 lock_user_struct(target_fl
, arg3
, 0);
4721 target_fl
->l_type
= tswap16(fl
.l_type
);
4722 target_fl
->l_whence
= tswap16(fl
.l_whence
);
4723 target_fl
->l_start
= tswap64(fl
.l_start
);
4724 target_fl
->l_len
= tswap64(fl
.l_len
);
4725 target_fl
->l_pid
= tswapl(fl
.l_pid
);
4726 unlock_user_struct(target_fl
, arg3
, 1);
4731 case TARGET_F_SETLK64
:
4732 case TARGET_F_SETLKW64
:
4734 if (((CPUARMState
*)cpu_env
)->eabi
) {
4735 lock_user_struct(target_efl
, arg3
, 1);
4736 fl
.l_type
= tswap16(target_efl
->l_type
);
4737 fl
.l_whence
= tswap16(target_efl
->l_whence
);
4738 fl
.l_start
= tswap64(target_efl
->l_start
);
4739 fl
.l_len
= tswap64(target_efl
->l_len
);
4740 fl
.l_pid
= tswapl(target_efl
->l_pid
);
4741 unlock_user_struct(target_efl
, arg3
, 0);
4745 lock_user_struct(target_fl
, arg3
, 1);
4746 fl
.l_type
= tswap16(target_fl
->l_type
);
4747 fl
.l_whence
= tswap16(target_fl
->l_whence
);
4748 fl
.l_start
= tswap64(target_fl
->l_start
);
4749 fl
.l_len
= tswap64(target_fl
->l_len
);
4750 fl
.l_pid
= tswapl(target_fl
->l_pid
);
4751 unlock_user_struct(target_fl
, arg3
, 0);
4753 ret
= get_errno(fcntl(arg1
, cmd
, &fl
));
4756 ret
= get_errno(do_fcntl(arg1
, cmd
, arg3
));
4762 #ifdef TARGET_NR_cacheflush
4763 case TARGET_NR_cacheflush
:
4764 /* self-modifying code is handled automatically, so nothing needed */
4768 #ifdef TARGET_NR_security
4769 case TARGET_NR_security
:
4772 #ifdef TARGET_NR_getpagesize
4773 case TARGET_NR_getpagesize
:
4774 ret
= TARGET_PAGE_SIZE
;
4777 case TARGET_NR_gettid
:
4778 ret
= get_errno(gettid());
4780 #ifdef TARGET_NR_readahead
4781 case TARGET_NR_readahead
:
4784 #ifdef TARGET_NR_setxattr
4785 case TARGET_NR_setxattr
:
4786 case TARGET_NR_lsetxattr
:
4787 case TARGET_NR_fsetxattr
:
4788 case TARGET_NR_getxattr
:
4789 case TARGET_NR_lgetxattr
:
4790 case TARGET_NR_fgetxattr
:
4791 case TARGET_NR_listxattr
:
4792 case TARGET_NR_llistxattr
:
4793 case TARGET_NR_flistxattr
:
4794 case TARGET_NR_removexattr
:
4795 case TARGET_NR_lremovexattr
:
4796 case TARGET_NR_fremovexattr
:
4797 goto unimplemented_nowarn
;
4799 #ifdef TARGET_NR_set_thread_area
4800 case TARGET_NR_set_thread_area
:
4802 ((CPUMIPSState
*) cpu_env
)->tls_value
= arg1
;
4806 goto unimplemented_nowarn
;
4809 #ifdef TARGET_NR_get_thread_area
4810 case TARGET_NR_get_thread_area
:
4811 goto unimplemented_nowarn
;
4813 #ifdef TARGET_NR_getdomainname
4814 case TARGET_NR_getdomainname
:
4815 goto unimplemented_nowarn
;
4818 #ifdef TARGET_NR_clock_gettime
4819 case TARGET_NR_clock_gettime
:
4822 ret
= get_errno(clock_gettime(arg1
, &ts
));
4823 if (!is_error(ret
)) {
4824 host_to_target_timespec(arg2
, &ts
);
4829 #ifdef TARGET_NR_clock_getres
4830 case TARGET_NR_clock_getres
:
4833 ret
= get_errno(clock_getres(arg1
, &ts
));
4834 if (!is_error(ret
)) {
4835 host_to_target_timespec(arg2
, &ts
);
4841 #if defined(TARGET_NR_set_tid_address) && defined(__NR_set_tid_address)
4842 case TARGET_NR_set_tid_address
:
4843 ret
= get_errno(set_tid_address((int *) arg1
));
4847 #if defined(TARGET_NR_tkill) && defined(__NR_tkill)
4848 case TARGET_NR_tkill
:
4849 ret
= get_errno(sys_tkill((int)arg1
, (int)arg2
));
4853 #if defined(TARGET_NR_tgkill) && defined(__NR_tgkill)
4854 case TARGET_NR_tgkill
:
4855 ret
= get_errno(sys_tgkill((int)arg1
, (int)arg2
, (int)arg3
));
4859 #ifdef TARGET_NR_set_robust_list
4860 case TARGET_NR_set_robust_list
:
4861 goto unimplemented_nowarn
;
4866 gemu_log("qemu: Unsupported syscall: %d\n", num
);
4867 #if defined(TARGET_NR_setxattr) || defined(TARGET_NR_get_thread_area) || defined(TARGET_NR_getdomainname) || defined(TARGET_NR_set_robust_list)
4868 unimplemented_nowarn
:
4875 gemu_log(" = %ld\n", ret
);