blob: 7eb09fa8d71b74752f35bfec7d7947e2d04ed972 [file] [log] [blame]
bellard31e31b82003-02-18 22:55:36 +00001/*
2 * Linux syscalls
ths5fafdf22007-09-16 21:08:06 +00003 *
bellard31e31b82003-02-18 22:55:36 +00004 * Copyright (c) 2003 Fabrice Bellard
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
Blue Swirl8167ee82009-07-16 20:47:01 +000017 * along with this program; if not, see <http://www.gnu.org/licenses/>.
bellard31e31b82003-02-18 22:55:36 +000018 */
Eduardo Habkostd5b3a9b2009-06-09 18:26:31 -030019#define _ATFILE_SOURCE
bellard31e31b82003-02-18 22:55:36 +000020#include <stdlib.h>
21#include <stdio.h>
22#include <stdarg.h>
bellard04369ff2003-03-20 22:33:23 +000023#include <string.h>
bellard31e31b82003-02-18 22:55:36 +000024#include <elf.h>
25#include <endian.h>
26#include <errno.h>
27#include <unistd.h>
28#include <fcntl.h>
bellard7854b052003-03-29 17:22:23 +000029#include <time.h>
pbrook82e671d2008-06-09 12:10:22 +000030#include <limits.h>
bellard31e31b82003-02-18 22:55:36 +000031#include <sys/types.h>
thsd08d3bb2007-03-19 13:09:22 +000032#include <sys/ipc.h>
33#include <sys/msg.h>
bellard31e31b82003-02-18 22:55:36 +000034#include <sys/wait.h>
35#include <sys/time.h>
36#include <sys/stat.h>
37#include <sys/mount.h>
ths39b9aae2007-02-11 18:36:44 +000038#include <sys/prctl.h>
bellard31e31b82003-02-18 22:55:36 +000039#include <sys/resource.h>
40#include <sys/mman.h>
41#include <sys/swap.h>
42#include <signal.h>
43#include <sched.h>
44#include <sys/socket.h>
aurel32607175e2009-04-15 16:11:59 +000045#include <sys/un.h>
bellard31e31b82003-02-18 22:55:36 +000046#include <sys/uio.h>
bellard9de5e442003-03-23 16:49:39 +000047#include <sys/poll.h>
bellard32f36bc2003-03-30 21:29:48 +000048#include <sys/times.h>
bellard8853f862004-02-22 14:57:26 +000049#include <sys/shm.h>
thsfa294812007-02-02 22:05:00 +000050#include <sys/sem.h>
bellard56c8f682005-11-28 22:28:41 +000051#include <sys/statfs.h>
bellardebc05482003-09-30 21:08:41 +000052#include <utime.h>
bellarda5448a72004-06-19 16:59:03 +000053#include <sys/sysinfo.h>
aurel323b3f24a2009-04-15 16:12:13 +000054#include <sys/utsname.h>
bellard72f03902003-02-18 23:33:18 +000055//#include <sys/user.h>
bellard8853f862004-02-22 14:57:26 +000056#include <netinet/ip.h>
bellard7854b052003-03-29 17:22:23 +000057#include <netinet/tcp.h>
aurel320b6d3ae2008-09-15 07:43:43 +000058#include <qemu-common.h>
Juan Quintela9788c9c2009-07-27 16:13:02 +020059#ifdef TARGET_GPROF
aurel326d946cd2008-11-06 16:15:18 +000060#include <sys/gmon.h>
61#endif
Riku Voipioc2882b92009-08-12 15:08:24 +030062#ifdef CONFIG_EVENTFD
63#include <sys/eventfd.h>
64#endif
bellard31e31b82003-02-18 22:55:36 +000065
66#define termios host_termios
67#define winsize host_winsize
68#define termio host_termio
bellard04369ff2003-03-20 22:33:23 +000069#define sgttyb host_sgttyb /* same as target */
70#define tchars host_tchars /* same as target */
71#define ltchars host_ltchars /* same as target */
bellard31e31b82003-02-18 22:55:36 +000072
73#include <linux/termios.h>
74#include <linux/unistd.h>
75#include <linux/utsname.h>
76#include <linux/cdrom.h>
77#include <linux/hdreg.h>
78#include <linux/soundcard.h>
bellard19b84f32003-05-08 15:41:49 +000079#include <linux/kd.h>
balrog8fbd6b52008-09-20 03:03:09 +000080#include <linux/mtio.h>
Martin Mohring350d1772009-05-04 21:21:41 +030081#include <linux/fs.h>
pbrookd7e40362008-05-23 16:06:43 +000082#include "linux_loop.h"
bellard31e31b82003-02-18 22:55:36 +000083
bellard3ef693a2003-03-23 20:17:16 +000084#include "qemu.h"
balrog526ccb72008-07-16 12:13:52 +000085#include "qemu-common.h"
bellard31e31b82003-02-18 22:55:36 +000086
Juan Quintela2f7bb872009-07-27 16:13:24 +020087#if defined(CONFIG_USE_NPTL)
pbrookd865bab2008-06-07 22:12:17 +000088#define CLONE_NPTL_FLAGS2 (CLONE_SETTLS | \
89 CLONE_PARENT_SETTID | CLONE_CHILD_SETTID | CLONE_CHILD_CLEARTID)
90#else
91/* XXX: Hardcode the above values. */
92#define CLONE_NPTL_FLAGS2 0
pbrook30813ce2008-06-02 15:45:44 +000093#endif
94
bellard72f03902003-02-18 23:33:18 +000095//#define DEBUG
bellard31e31b82003-02-18 22:55:36 +000096
bellard1a9353d2003-03-16 20:28:50 +000097//#include <linux/msdos_fs.h>
aurel326556a832008-10-13 21:08:17 +000098#define VFAT_IOCTL_READDIR_BOTH _IOR('r', 1, struct linux_dirent [2])
99#define VFAT_IOCTL_READDIR_SHORT _IOR('r', 2, struct linux_dirent [2])
bellard1a9353d2003-03-16 20:28:50 +0000100
bellard70a194b2003-08-11 22:20:16 +0000101
bellard70a194b2003-08-11 22:20:16 +0000102#undef _syscall0
103#undef _syscall1
104#undef _syscall2
105#undef _syscall3
106#undef _syscall4
107#undef _syscall5
bellard83fcb512006-06-14 13:37:16 +0000108#undef _syscall6
bellard70a194b2003-08-11 22:20:16 +0000109
bellard83fcb512006-06-14 13:37:16 +0000110#define _syscall0(type,name) \
blueswir18fcd3692008-08-17 20:26:25 +0000111static type name (void) \
bellard83fcb512006-06-14 13:37:16 +0000112{ \
113 return syscall(__NR_##name); \
bellard70a194b2003-08-11 22:20:16 +0000114}
115
bellard83fcb512006-06-14 13:37:16 +0000116#define _syscall1(type,name,type1,arg1) \
blueswir18fcd3692008-08-17 20:26:25 +0000117static type name (type1 arg1) \
bellard83fcb512006-06-14 13:37:16 +0000118{ \
119 return syscall(__NR_##name, arg1); \
bellard70a194b2003-08-11 22:20:16 +0000120}
121
bellard83fcb512006-06-14 13:37:16 +0000122#define _syscall2(type,name,type1,arg1,type2,arg2) \
blueswir18fcd3692008-08-17 20:26:25 +0000123static type name (type1 arg1,type2 arg2) \
bellard83fcb512006-06-14 13:37:16 +0000124{ \
125 return syscall(__NR_##name, arg1, arg2); \
bellard70a194b2003-08-11 22:20:16 +0000126}
127
bellard83fcb512006-06-14 13:37:16 +0000128#define _syscall3(type,name,type1,arg1,type2,arg2,type3,arg3) \
blueswir18fcd3692008-08-17 20:26:25 +0000129static type name (type1 arg1,type2 arg2,type3 arg3) \
bellard83fcb512006-06-14 13:37:16 +0000130{ \
131 return syscall(__NR_##name, arg1, arg2, arg3); \
bellard70a194b2003-08-11 22:20:16 +0000132}
133
bellard83fcb512006-06-14 13:37:16 +0000134#define _syscall4(type,name,type1,arg1,type2,arg2,type3,arg3,type4,arg4) \
blueswir18fcd3692008-08-17 20:26:25 +0000135static type name (type1 arg1,type2 arg2,type3 arg3,type4 arg4) \
bellard83fcb512006-06-14 13:37:16 +0000136{ \
137 return syscall(__NR_##name, arg1, arg2, arg3, arg4); \
bellard70a194b2003-08-11 22:20:16 +0000138}
139
bellard83fcb512006-06-14 13:37:16 +0000140#define _syscall5(type,name,type1,arg1,type2,arg2,type3,arg3,type4,arg4, \
141 type5,arg5) \
blueswir18fcd3692008-08-17 20:26:25 +0000142static type name (type1 arg1,type2 arg2,type3 arg3,type4 arg4,type5 arg5) \
bellard83fcb512006-06-14 13:37:16 +0000143{ \
144 return syscall(__NR_##name, arg1, arg2, arg3, arg4, arg5); \
bellard70a194b2003-08-11 22:20:16 +0000145}
bellard83fcb512006-06-14 13:37:16 +0000146
147
148#define _syscall6(type,name,type1,arg1,type2,arg2,type3,arg3,type4,arg4, \
149 type5,arg5,type6,arg6) \
blueswir18fcd3692008-08-17 20:26:25 +0000150static type name (type1 arg1,type2 arg2,type3 arg3,type4 arg4,type5 arg5, \
151 type6 arg6) \
bellard83fcb512006-06-14 13:37:16 +0000152{ \
153 return syscall(__NR_##name, arg1, arg2, arg3, arg4, arg5, arg6); \
154}
155
bellard70a194b2003-08-11 22:20:16 +0000156
bellard31e31b82003-02-18 22:55:36 +0000157#define __NR_sys_uname __NR_uname
ths92a34c12007-09-24 09:27:49 +0000158#define __NR_sys_faccessat __NR_faccessat
ths814d7972007-09-24 09:26:51 +0000159#define __NR_sys_fchmodat __NR_fchmodat
thsccfa72b2007-09-24 09:23:34 +0000160#define __NR_sys_fchownat __NR_fchownat
balrog6a24a772008-09-20 02:23:36 +0000161#define __NR_sys_fstatat64 __NR_fstatat64
balrogac8a6552008-09-20 02:25:39 +0000162#define __NR_sys_futimesat __NR_futimesat
bellard72f03902003-02-18 23:33:18 +0000163#define __NR_sys_getcwd1 __NR_getcwd
bellard72f03902003-02-18 23:33:18 +0000164#define __NR_sys_getdents __NR_getdents
bellarddab2ed92003-03-22 15:23:14 +0000165#define __NR_sys_getdents64 __NR_getdents64
thsc6cda172007-10-09 03:42:34 +0000166#define __NR_sys_getpriority __NR_getpriority
ths64f0ce42007-09-24 09:25:06 +0000167#define __NR_sys_linkat __NR_linkat
ths4472ad02007-09-24 09:22:32 +0000168#define __NR_sys_mkdirat __NR_mkdirat
ths75ac37a2007-09-24 09:23:05 +0000169#define __NR_sys_mknodat __NR_mknodat
aurel329d33b762009-04-08 23:07:05 +0000170#define __NR_sys_newfstatat __NR_newfstatat
ths82424832007-09-24 09:21:55 +0000171#define __NR_sys_openat __NR_openat
ths5e0ccb12007-09-24 09:26:10 +0000172#define __NR_sys_readlinkat __NR_readlinkat
ths722183f2007-09-24 09:24:37 +0000173#define __NR_sys_renameat __NR_renameat
bellard66fb9762003-03-23 01:06:05 +0000174#define __NR_sys_rt_sigqueueinfo __NR_rt_sigqueueinfo
thsf0b62432007-09-24 09:25:40 +0000175#define __NR_sys_symlinkat __NR_symlinkat
ths7494b0f2007-02-11 18:26:53 +0000176#define __NR_sys_syslog __NR_syslog
ths71455572007-06-21 21:45:30 +0000177#define __NR_sys_tgkill __NR_tgkill
ths4cae1d12007-07-12 11:06:53 +0000178#define __NR_sys_tkill __NR_tkill
ths8170f562007-09-24 09:24:11 +0000179#define __NR_sys_unlinkat __NR_unlinkat
ths9007f0e2007-09-25 17:50:37 +0000180#define __NR_sys_utimensat __NR_utimensat
pbrookbd0c5662008-05-29 14:34:11 +0000181#define __NR_sys_futex __NR_futex
aurel3239b59762008-10-01 21:46:50 +0000182#define __NR_sys_inotify_init __NR_inotify_init
183#define __NR_sys_inotify_add_watch __NR_inotify_add_watch
184#define __NR_sys_inotify_rm_watch __NR_inotify_rm_watch
bellard31e31b82003-02-18 22:55:36 +0000185
bellardbc51c5c2004-03-17 23:46:04 +0000186#if defined(__alpha__) || defined (__ia64__) || defined(__x86_64__)
bellard9af9eaa2003-04-07 21:34:41 +0000187#define __NR__llseek __NR_lseek
188#endif
189
bellard72f03902003-02-18 23:33:18 +0000190#ifdef __NR_gettid
bellard31e31b82003-02-18 22:55:36 +0000191_syscall0(int, gettid)
bellard72f03902003-02-18 23:33:18 +0000192#else
ths0da46a62007-10-20 20:23:07 +0000193/* This is a replacement for the host gettid() and must return a host
194 errno. */
bellard72f03902003-02-18 23:33:18 +0000195static int gettid(void) {
196 return -ENOSYS;
197}
198#endif
aurel323b3f24a2009-04-15 16:12:13 +0000199_syscall3(int, sys_getdents, uint, fd, struct linux_dirent *, dirp, uint, count);
aurel323b3f24a2009-04-15 16:12:13 +0000200#if defined(TARGET_NR_getdents64) && defined(__NR_getdents64)
201_syscall3(int, sys_getdents64, uint, fd, struct linux_dirent64 *, dirp, uint, count);
202#endif
203_syscall2(int, sys_getpriority, int, which, int, who);
Paul Brook909b69c2009-05-19 15:58:52 +0100204#if defined(TARGET_NR__llseek) && !defined (__x86_64__)
aurel323b3f24a2009-04-15 16:12:13 +0000205_syscall5(int, _llseek, uint, fd, ulong, hi, ulong, lo,
206 loff_t *, res, uint, wh);
207#endif
208_syscall3(int,sys_rt_sigqueueinfo,int,pid,int,sig,siginfo_t *,uinfo)
209_syscall3(int,sys_syslog,int,type,char*,bufp,int,len)
210#if defined(TARGET_NR_tgkill) && defined(__NR_tgkill)
211_syscall3(int,sys_tgkill,int,tgid,int,pid,int,sig)
212#endif
213#if defined(TARGET_NR_tkill) && defined(__NR_tkill)
214_syscall2(int,sys_tkill,int,tid,int,sig)
215#endif
216#ifdef __NR_exit_group
217_syscall1(int,exit_group,int,error_code)
218#endif
219#if defined(TARGET_NR_set_tid_address) && defined(__NR_set_tid_address)
220_syscall1(int,set_tid_address,int *,tidptr)
221#endif
Juan Quintela2f7bb872009-07-27 16:13:24 +0200222#if defined(CONFIG_USE_NPTL)
aurel323b3f24a2009-04-15 16:12:13 +0000223#if defined(TARGET_NR_futex) && defined(__NR_futex)
224_syscall6(int,sys_futex,int *,uaddr,int,op,int,val,
225 const struct timespec *,timeout,int *,uaddr2,int,val3)
226#endif
227#endif
228
229static bitmask_transtbl fcntl_flags_tbl[] = {
230 { TARGET_O_ACCMODE, TARGET_O_WRONLY, O_ACCMODE, O_WRONLY, },
231 { TARGET_O_ACCMODE, TARGET_O_RDWR, O_ACCMODE, O_RDWR, },
232 { TARGET_O_CREAT, TARGET_O_CREAT, O_CREAT, O_CREAT, },
233 { TARGET_O_EXCL, TARGET_O_EXCL, O_EXCL, O_EXCL, },
234 { TARGET_O_NOCTTY, TARGET_O_NOCTTY, O_NOCTTY, O_NOCTTY, },
235 { TARGET_O_TRUNC, TARGET_O_TRUNC, O_TRUNC, O_TRUNC, },
236 { TARGET_O_APPEND, TARGET_O_APPEND, O_APPEND, O_APPEND, },
237 { TARGET_O_NONBLOCK, TARGET_O_NONBLOCK, O_NONBLOCK, O_NONBLOCK, },
238 { TARGET_O_SYNC, TARGET_O_SYNC, O_SYNC, O_SYNC, },
239 { TARGET_FASYNC, TARGET_FASYNC, FASYNC, FASYNC, },
240 { TARGET_O_DIRECTORY, TARGET_O_DIRECTORY, O_DIRECTORY, O_DIRECTORY, },
241 { TARGET_O_NOFOLLOW, TARGET_O_NOFOLLOW, O_NOFOLLOW, O_NOFOLLOW, },
242 { TARGET_O_LARGEFILE, TARGET_O_LARGEFILE, O_LARGEFILE, O_LARGEFILE, },
243#if defined(O_DIRECT)
244 { TARGET_O_DIRECT, TARGET_O_DIRECT, O_DIRECT, O_DIRECT, },
245#endif
246 { 0, 0, 0, 0 }
247};
248
249#define COPY_UTSNAME_FIELD(dest, src) \
250 do { \
251 /* __NEW_UTS_LEN doesn't include terminating null */ \
252 (void) strncpy((dest), (src), __NEW_UTS_LEN); \
253 (dest)[__NEW_UTS_LEN] = '\0'; \
254 } while (0)
255
256static int sys_uname(struct new_utsname *buf)
257{
258 struct utsname uts_buf;
259
260 if (uname(&uts_buf) < 0)
261 return (-1);
262
263 /*
264 * Just in case these have some differences, we
265 * translate utsname to new_utsname (which is the
266 * struct linux kernel uses).
267 */
268
269 bzero(buf, sizeof (*buf));
270 COPY_UTSNAME_FIELD(buf->sysname, uts_buf.sysname);
271 COPY_UTSNAME_FIELD(buf->nodename, uts_buf.nodename);
272 COPY_UTSNAME_FIELD(buf->release, uts_buf.release);
273 COPY_UTSNAME_FIELD(buf->version, uts_buf.version);
274 COPY_UTSNAME_FIELD(buf->machine, uts_buf.machine);
275#ifdef _GNU_SOURCE
276 COPY_UTSNAME_FIELD(buf->domainname, uts_buf.domainname);
277#endif
278 return (0);
279
280#undef COPY_UTSNAME_FIELD
281}
282
283static int sys_getcwd1(char *buf, size_t size)
284{
285 if (getcwd(buf, size) == NULL) {
286 /* getcwd() sets errno */
287 return (-1);
288 }
aurel32aaf4ad32009-04-16 14:17:14 +0000289 return strlen(buf)+1;
aurel323b3f24a2009-04-15 16:12:13 +0000290}
291
292#ifdef CONFIG_ATFILE
293/*
294 * Host system seems to have atfile syscall stubs available. We
295 * now enable them one by one as specified by target syscall_nr.h.
296 */
297
298#ifdef TARGET_NR_faccessat
aurel32465c9f02009-04-19 08:52:17 +0000299static int sys_faccessat(int dirfd, const char *pathname, int mode)
aurel323b3f24a2009-04-15 16:12:13 +0000300{
aurel32465c9f02009-04-19 08:52:17 +0000301 return (faccessat(dirfd, pathname, mode, 0));
aurel323b3f24a2009-04-15 16:12:13 +0000302}
303#endif
304#ifdef TARGET_NR_fchmodat
aurel32465c9f02009-04-19 08:52:17 +0000305static int sys_fchmodat(int dirfd, const char *pathname, mode_t mode)
aurel323b3f24a2009-04-15 16:12:13 +0000306{
aurel32465c9f02009-04-19 08:52:17 +0000307 return (fchmodat(dirfd, pathname, mode, 0));
aurel323b3f24a2009-04-15 16:12:13 +0000308}
309#endif
aurel32fda33742009-04-15 17:12:01 +0000310#if defined(TARGET_NR_fchownat) && defined(USE_UID16)
aurel323b3f24a2009-04-15 16:12:13 +0000311static int sys_fchownat(int dirfd, const char *pathname, uid_t owner,
312 gid_t group, int flags)
313{
314 return (fchownat(dirfd, pathname, owner, group, flags));
315}
316#endif
317#ifdef __NR_fstatat64
318static int sys_fstatat64(int dirfd, const char *pathname, struct stat *buf,
319 int flags)
320{
321 return (fstatat(dirfd, pathname, buf, flags));
322}
323#endif
324#ifdef __NR_newfstatat
325static int sys_newfstatat(int dirfd, const char *pathname, struct stat *buf,
326 int flags)
327{
328 return (fstatat(dirfd, pathname, buf, flags));
329}
330#endif
331#ifdef TARGET_NR_futimesat
332static int sys_futimesat(int dirfd, const char *pathname,
333 const struct timeval times[2])
334{
335 return (futimesat(dirfd, pathname, times));
336}
337#endif
338#ifdef TARGET_NR_linkat
339static int sys_linkat(int olddirfd, const char *oldpath,
340 int newdirfd, const char *newpath, int flags)
341{
342 return (linkat(olddirfd, oldpath, newdirfd, newpath, flags));
343}
344#endif
345#ifdef TARGET_NR_mkdirat
346static int sys_mkdirat(int dirfd, const char *pathname, mode_t mode)
347{
348 return (mkdirat(dirfd, pathname, mode));
349}
350#endif
351#ifdef TARGET_NR_mknodat
352static int sys_mknodat(int dirfd, const char *pathname, mode_t mode,
353 dev_t dev)
354{
355 return (mknodat(dirfd, pathname, mode, dev));
356}
357#endif
358#ifdef TARGET_NR_openat
359static int sys_openat(int dirfd, const char *pathname, int flags, ...)
360{
361 /*
362 * open(2) has extra parameter 'mode' when called with
363 * flag O_CREAT.
364 */
365 if ((flags & O_CREAT) != 0) {
366 va_list ap;
367 mode_t mode;
368
369 /*
370 * Get the 'mode' parameter and translate it to
371 * host bits.
372 */
373 va_start(ap, flags);
374 mode = va_arg(ap, mode_t);
375 mode = target_to_host_bitmask(mode, fcntl_flags_tbl);
376 va_end(ap);
377
378 return (openat(dirfd, pathname, flags, mode));
379 }
380 return (openat(dirfd, pathname, flags));
381}
382#endif
383#ifdef TARGET_NR_readlinkat
384static int sys_readlinkat(int dirfd, const char *pathname, char *buf, size_t bufsiz)
385{
386 return (readlinkat(dirfd, pathname, buf, bufsiz));
387}
388#endif
389#ifdef TARGET_NR_renameat
390static int sys_renameat(int olddirfd, const char *oldpath,
391 int newdirfd, const char *newpath)
392{
393 return (renameat(olddirfd, oldpath, newdirfd, newpath));
394}
395#endif
396#ifdef TARGET_NR_symlinkat
397static int sys_symlinkat(const char *oldpath, int newdirfd, const char *newpath)
398{
399 return (symlinkat(oldpath, newdirfd, newpath));
400}
401#endif
402#ifdef TARGET_NR_unlinkat
403static int sys_unlinkat(int dirfd, const char *pathname, int flags)
404{
405 return (unlinkat(dirfd, pathname, flags));
406}
407#endif
aurel323b3f24a2009-04-15 16:12:13 +0000408#else /* !CONFIG_ATFILE */
409
410/*
411 * Try direct syscalls instead
412 */
ths92a34c12007-09-24 09:27:49 +0000413#if defined(TARGET_NR_faccessat) && defined(__NR_faccessat)
aurel32465c9f02009-04-19 08:52:17 +0000414_syscall3(int,sys_faccessat,int,dirfd,const char *,pathname,int,mode)
ths92a34c12007-09-24 09:27:49 +0000415#endif
ths814d7972007-09-24 09:26:51 +0000416#if defined(TARGET_NR_fchmodat) && defined(__NR_fchmodat)
aurel32465c9f02009-04-19 08:52:17 +0000417_syscall3(int,sys_fchmodat,int,dirfd,const char *,pathname, mode_t,mode)
ths814d7972007-09-24 09:26:51 +0000418#endif
blueswir14583f582008-08-24 10:35:55 +0000419#if defined(TARGET_NR_fchownat) && defined(__NR_fchownat) && defined(USE_UID16)
thsccfa72b2007-09-24 09:23:34 +0000420_syscall5(int,sys_fchownat,int,dirfd,const char *,pathname,
421 uid_t,owner,gid_t,group,int,flags)
422#endif
aurel329d33b762009-04-08 23:07:05 +0000423#if (defined(TARGET_NR_fstatat64) || defined(TARGET_NR_newfstatat)) && \
424 defined(__NR_fstatat64)
balrog6a24a772008-09-20 02:23:36 +0000425_syscall4(int,sys_fstatat64,int,dirfd,const char *,pathname,
426 struct stat *,buf,int,flags)
427#endif
balrogac8a6552008-09-20 02:25:39 +0000428#if defined(TARGET_NR_futimesat) && defined(__NR_futimesat)
429_syscall3(int,sys_futimesat,int,dirfd,const char *,pathname,
430 const struct timeval *,times)
431#endif
aurel323b3f24a2009-04-15 16:12:13 +0000432#if (defined(TARGET_NR_newfstatat) || defined(TARGET_NR_fstatat64) ) && \
433 defined(__NR_newfstatat)
434_syscall4(int,sys_newfstatat,int,dirfd,const char *,pathname,
435 struct stat *,buf,int,flags)
blueswir18fcd3692008-08-17 20:26:25 +0000436#endif
ths64f0ce42007-09-24 09:25:06 +0000437#if defined(TARGET_NR_linkat) && defined(__NR_linkat)
438_syscall5(int,sys_linkat,int,olddirfd,const char *,oldpath,
aurel323b3f24a2009-04-15 16:12:13 +0000439 int,newdirfd,const char *,newpath,int,flags)
ths64f0ce42007-09-24 09:25:06 +0000440#endif
ths4472ad02007-09-24 09:22:32 +0000441#if defined(TARGET_NR_mkdirat) && defined(__NR_mkdirat)
442_syscall3(int,sys_mkdirat,int,dirfd,const char *,pathname,mode_t,mode)
443#endif
ths75ac37a2007-09-24 09:23:05 +0000444#if defined(TARGET_NR_mknodat) && defined(__NR_mknodat)
445_syscall4(int,sys_mknodat,int,dirfd,const char *,pathname,
446 mode_t,mode,dev_t,dev)
447#endif
ths82424832007-09-24 09:21:55 +0000448#if defined(TARGET_NR_openat) && defined(__NR_openat)
449_syscall4(int,sys_openat,int,dirfd,const char *,pathname,int,flags,mode_t,mode)
450#endif
ths5e0ccb12007-09-24 09:26:10 +0000451#if defined(TARGET_NR_readlinkat) && defined(__NR_readlinkat)
452_syscall4(int,sys_readlinkat,int,dirfd,const char *,pathname,
453 char *,buf,size_t,bufsize)
454#endif
ths722183f2007-09-24 09:24:37 +0000455#if defined(TARGET_NR_renameat) && defined(__NR_renameat)
456_syscall4(int,sys_renameat,int,olddirfd,const char *,oldpath,
457 int,newdirfd,const char *,newpath)
458#endif
thsb51eaa82007-09-25 16:09:22 +0000459#if defined(TARGET_NR_symlinkat) && defined(__NR_symlinkat)
thsf0b62432007-09-24 09:25:40 +0000460_syscall3(int,sys_symlinkat,const char *,oldpath,
461 int,newdirfd,const char *,newpath)
462#endif
ths8170f562007-09-24 09:24:11 +0000463#if defined(TARGET_NR_unlinkat) && defined(__NR_unlinkat)
464_syscall3(int,sys_unlinkat,int,dirfd,const char *,pathname,int,flags)
465#endif
Riku Voipioebc996f2009-04-21 15:01:51 +0300466
467#endif /* CONFIG_ATFILE */
468
469#ifdef CONFIG_UTIMENSAT
470static int sys_utimensat(int dirfd, const char *pathname,
471 const struct timespec times[2], int flags)
472{
473 if (pathname == NULL)
474 return futimens(dirfd, times);
475 else
476 return utimensat(dirfd, pathname, times, flags);
477}
478#else
ths9007f0e2007-09-25 17:50:37 +0000479#if defined(TARGET_NR_utimensat) && defined(__NR_utimensat)
480_syscall4(int,sys_utimensat,int,dirfd,const char *,pathname,
481 const struct timespec *,tsp,int,flags)
482#endif
Riku Voipioebc996f2009-04-21 15:01:51 +0300483#endif /* CONFIG_UTIMENSAT */
aurel323b3f24a2009-04-15 16:12:13 +0000484
485#ifdef CONFIG_INOTIFY
aurel328690e422009-04-17 13:50:32 +0000486#include <sys/inotify.h>
aurel323b3f24a2009-04-15 16:12:13 +0000487
aurel3239b59762008-10-01 21:46:50 +0000488#if defined(TARGET_NR_inotify_init) && defined(__NR_inotify_init)
aurel323b3f24a2009-04-15 16:12:13 +0000489static int sys_inotify_init(void)
490{
491 return (inotify_init());
492}
aurel3239b59762008-10-01 21:46:50 +0000493#endif
494#if defined(TARGET_NR_inotify_add_watch) && defined(__NR_inotify_add_watch)
aurel323b3f24a2009-04-15 16:12:13 +0000495static int sys_inotify_add_watch(int fd,const char *pathname, int32_t mask)
496{
497 return (inotify_add_watch(fd, pathname, mask));
498}
aurel3239b59762008-10-01 21:46:50 +0000499#endif
500#if defined(TARGET_NR_inotify_rm_watch) && defined(__NR_inotify_rm_watch)
aurel323b3f24a2009-04-15 16:12:13 +0000501static int sys_inotify_rm_watch(int fd, int32_t wd)
502{
aurel328690e422009-04-17 13:50:32 +0000503 return (inotify_rm_watch(fd, wd));
aurel323b3f24a2009-04-15 16:12:13 +0000504}
aurel3239b59762008-10-01 21:46:50 +0000505#endif
aurel323b3f24a2009-04-15 16:12:13 +0000506#else
507/* Userspace can usually survive runtime without inotify */
508#undef TARGET_NR_inotify_init
509#undef TARGET_NR_inotify_add_watch
510#undef TARGET_NR_inotify_rm_watch
511#endif /* CONFIG_INOTIFY */
512
bellard66fb9762003-03-23 01:06:05 +0000513
514extern int personality(int);
bellard9de5e442003-03-23 16:49:39 +0000515extern int flock(int, int);
516extern int setfsuid(int);
517extern int setfsgid(int);
bellard19b84f32003-05-08 15:41:49 +0000518extern int setgroups(int, gid_t *);
bellard31e31b82003-02-18 22:55:36 +0000519
thsb92c47c2007-11-01 00:07:38 +0000520#define ERRNO_TABLE_SIZE 1200
521
522/* target_to_host_errno_table[] is initialized from
523 * host_to_target_errno_table[] in syscall_init(). */
524static uint16_t target_to_host_errno_table[ERRNO_TABLE_SIZE] = {
525};
526
ths637947f2007-06-01 12:09:19 +0000527/*
thsfe8f0962007-07-12 10:59:21 +0000528 * This list is the union of errno values overridden in asm-<arch>/errno.h
ths637947f2007-06-01 12:09:19 +0000529 * minus the errnos that are not actually generic to all archs.
530 */
thsb92c47c2007-11-01 00:07:38 +0000531static uint16_t host_to_target_errno_table[ERRNO_TABLE_SIZE] = {
ths637947f2007-06-01 12:09:19 +0000532 [EIDRM] = TARGET_EIDRM,
533 [ECHRNG] = TARGET_ECHRNG,
534 [EL2NSYNC] = TARGET_EL2NSYNC,
535 [EL3HLT] = TARGET_EL3HLT,
536 [EL3RST] = TARGET_EL3RST,
537 [ELNRNG] = TARGET_ELNRNG,
538 [EUNATCH] = TARGET_EUNATCH,
539 [ENOCSI] = TARGET_ENOCSI,
540 [EL2HLT] = TARGET_EL2HLT,
541 [EDEADLK] = TARGET_EDEADLK,
542 [ENOLCK] = TARGET_ENOLCK,
543 [EBADE] = TARGET_EBADE,
544 [EBADR] = TARGET_EBADR,
545 [EXFULL] = TARGET_EXFULL,
546 [ENOANO] = TARGET_ENOANO,
547 [EBADRQC] = TARGET_EBADRQC,
548 [EBADSLT] = TARGET_EBADSLT,
549 [EBFONT] = TARGET_EBFONT,
550 [ENOSTR] = TARGET_ENOSTR,
551 [ENODATA] = TARGET_ENODATA,
552 [ETIME] = TARGET_ETIME,
553 [ENOSR] = TARGET_ENOSR,
554 [ENONET] = TARGET_ENONET,
555 [ENOPKG] = TARGET_ENOPKG,
556 [EREMOTE] = TARGET_EREMOTE,
557 [ENOLINK] = TARGET_ENOLINK,
558 [EADV] = TARGET_EADV,
559 [ESRMNT] = TARGET_ESRMNT,
560 [ECOMM] = TARGET_ECOMM,
561 [EPROTO] = TARGET_EPROTO,
562 [EDOTDOT] = TARGET_EDOTDOT,
563 [EMULTIHOP] = TARGET_EMULTIHOP,
564 [EBADMSG] = TARGET_EBADMSG,
565 [ENAMETOOLONG] = TARGET_ENAMETOOLONG,
566 [EOVERFLOW] = TARGET_EOVERFLOW,
567 [ENOTUNIQ] = TARGET_ENOTUNIQ,
568 [EBADFD] = TARGET_EBADFD,
569 [EREMCHG] = TARGET_EREMCHG,
570 [ELIBACC] = TARGET_ELIBACC,
571 [ELIBBAD] = TARGET_ELIBBAD,
572 [ELIBSCN] = TARGET_ELIBSCN,
573 [ELIBMAX] = TARGET_ELIBMAX,
574 [ELIBEXEC] = TARGET_ELIBEXEC,
575 [EILSEQ] = TARGET_EILSEQ,
576 [ENOSYS] = TARGET_ENOSYS,
577 [ELOOP] = TARGET_ELOOP,
578 [ERESTART] = TARGET_ERESTART,
579 [ESTRPIPE] = TARGET_ESTRPIPE,
580 [ENOTEMPTY] = TARGET_ENOTEMPTY,
581 [EUSERS] = TARGET_EUSERS,
582 [ENOTSOCK] = TARGET_ENOTSOCK,
583 [EDESTADDRREQ] = TARGET_EDESTADDRREQ,
584 [EMSGSIZE] = TARGET_EMSGSIZE,
585 [EPROTOTYPE] = TARGET_EPROTOTYPE,
586 [ENOPROTOOPT] = TARGET_ENOPROTOOPT,
587 [EPROTONOSUPPORT] = TARGET_EPROTONOSUPPORT,
588 [ESOCKTNOSUPPORT] = TARGET_ESOCKTNOSUPPORT,
589 [EOPNOTSUPP] = TARGET_EOPNOTSUPP,
590 [EPFNOSUPPORT] = TARGET_EPFNOSUPPORT,
591 [EAFNOSUPPORT] = TARGET_EAFNOSUPPORT,
592 [EADDRINUSE] = TARGET_EADDRINUSE,
593 [EADDRNOTAVAIL] = TARGET_EADDRNOTAVAIL,
594 [ENETDOWN] = TARGET_ENETDOWN,
595 [ENETUNREACH] = TARGET_ENETUNREACH,
596 [ENETRESET] = TARGET_ENETRESET,
597 [ECONNABORTED] = TARGET_ECONNABORTED,
598 [ECONNRESET] = TARGET_ECONNRESET,
599 [ENOBUFS] = TARGET_ENOBUFS,
600 [EISCONN] = TARGET_EISCONN,
601 [ENOTCONN] = TARGET_ENOTCONN,
602 [EUCLEAN] = TARGET_EUCLEAN,
603 [ENOTNAM] = TARGET_ENOTNAM,
604 [ENAVAIL] = TARGET_ENAVAIL,
605 [EISNAM] = TARGET_EISNAM,
606 [EREMOTEIO] = TARGET_EREMOTEIO,
607 [ESHUTDOWN] = TARGET_ESHUTDOWN,
608 [ETOOMANYREFS] = TARGET_ETOOMANYREFS,
609 [ETIMEDOUT] = TARGET_ETIMEDOUT,
610 [ECONNREFUSED] = TARGET_ECONNREFUSED,
611 [EHOSTDOWN] = TARGET_EHOSTDOWN,
612 [EHOSTUNREACH] = TARGET_EHOSTUNREACH,
613 [EALREADY] = TARGET_EALREADY,
614 [EINPROGRESS] = TARGET_EINPROGRESS,
615 [ESTALE] = TARGET_ESTALE,
616 [ECANCELED] = TARGET_ECANCELED,
617 [ENOMEDIUM] = TARGET_ENOMEDIUM,
618 [EMEDIUMTYPE] = TARGET_EMEDIUMTYPE,
thsb7fe5db2007-07-23 15:37:46 +0000619#ifdef ENOKEY
ths637947f2007-06-01 12:09:19 +0000620 [ENOKEY] = TARGET_ENOKEY,
thsb7fe5db2007-07-23 15:37:46 +0000621#endif
622#ifdef EKEYEXPIRED
ths637947f2007-06-01 12:09:19 +0000623 [EKEYEXPIRED] = TARGET_EKEYEXPIRED,
thsb7fe5db2007-07-23 15:37:46 +0000624#endif
625#ifdef EKEYREVOKED
ths637947f2007-06-01 12:09:19 +0000626 [EKEYREVOKED] = TARGET_EKEYREVOKED,
thsb7fe5db2007-07-23 15:37:46 +0000627#endif
628#ifdef EKEYREJECTED
ths637947f2007-06-01 12:09:19 +0000629 [EKEYREJECTED] = TARGET_EKEYREJECTED,
thsb7fe5db2007-07-23 15:37:46 +0000630#endif
631#ifdef EOWNERDEAD
ths637947f2007-06-01 12:09:19 +0000632 [EOWNERDEAD] = TARGET_EOWNERDEAD,
thsb7fe5db2007-07-23 15:37:46 +0000633#endif
634#ifdef ENOTRECOVERABLE
ths637947f2007-06-01 12:09:19 +0000635 [ENOTRECOVERABLE] = TARGET_ENOTRECOVERABLE,
thsb7fe5db2007-07-23 15:37:46 +0000636#endif
thsb92c47c2007-11-01 00:07:38 +0000637};
ths637947f2007-06-01 12:09:19 +0000638
639static inline int host_to_target_errno(int err)
640{
641 if(host_to_target_errno_table[err])
642 return host_to_target_errno_table[err];
643 return err;
644}
645
thsb92c47c2007-11-01 00:07:38 +0000646static inline int target_to_host_errno(int err)
647{
648 if (target_to_host_errno_table[err])
649 return target_to_host_errno_table[err];
650 return err;
651}
652
blueswir1992f48a2007-10-14 16:27:31 +0000653static inline abi_long get_errno(abi_long ret)
bellard31e31b82003-02-18 22:55:36 +0000654{
655 if (ret == -1)
ths637947f2007-06-01 12:09:19 +0000656 return -host_to_target_errno(errno);
bellard31e31b82003-02-18 22:55:36 +0000657 else
658 return ret;
659}
660
blueswir1992f48a2007-10-14 16:27:31 +0000661static inline int is_error(abi_long ret)
bellard31e31b82003-02-18 22:55:36 +0000662{
blueswir1992f48a2007-10-14 16:27:31 +0000663 return (abi_ulong)ret >= (abi_ulong)(-4096);
bellard31e31b82003-02-18 22:55:36 +0000664}
665
thsb92c47c2007-11-01 00:07:38 +0000666char *target_strerror(int err)
667{
668 return strerror(target_to_host_errno(err));
669}
670
blueswir1992f48a2007-10-14 16:27:31 +0000671static abi_ulong target_brk;
672static abi_ulong target_original_brk;
bellard31e31b82003-02-18 22:55:36 +0000673
blueswir1992f48a2007-10-14 16:27:31 +0000674void target_set_brk(abi_ulong new_brk)
bellard31e31b82003-02-18 22:55:36 +0000675{
blueswir14c1de732007-07-07 20:45:44 +0000676 target_original_brk = target_brk = HOST_PAGE_ALIGN(new_brk);
bellard31e31b82003-02-18 22:55:36 +0000677}
678
ths0da46a62007-10-20 20:23:07 +0000679/* do_brk() must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +0000680abi_long do_brk(abi_ulong new_brk)
bellard31e31b82003-02-18 22:55:36 +0000681{
blueswir1992f48a2007-10-14 16:27:31 +0000682 abi_ulong brk_page;
683 abi_long mapped_addr;
bellard31e31b82003-02-18 22:55:36 +0000684 int new_alloc_size;
685
686 if (!new_brk)
pbrook53a59602006-03-25 19:31:22 +0000687 return target_brk;
bellard31e31b82003-02-18 22:55:36 +0000688 if (new_brk < target_original_brk)
balrog7ab240a2008-04-26 12:17:34 +0000689 return target_brk;
ths3b46e622007-09-17 08:09:54 +0000690
pbrook53a59602006-03-25 19:31:22 +0000691 brk_page = HOST_PAGE_ALIGN(target_brk);
bellard31e31b82003-02-18 22:55:36 +0000692
693 /* If the new brk is less than this, set it and we're done... */
694 if (new_brk < brk_page) {
695 target_brk = new_brk;
pbrook53a59602006-03-25 19:31:22 +0000696 return target_brk;
bellard31e31b82003-02-18 22:55:36 +0000697 }
698
699 /* We need to allocate more memory after the brk... */
bellard54936002003-05-13 00:25:15 +0000700 new_alloc_size = HOST_PAGE_ALIGN(new_brk - brk_page + 1);
ths5fafdf22007-09-16 21:08:06 +0000701 mapped_addr = get_errno(target_mmap(brk_page, new_alloc_size,
bellard54936002003-05-13 00:25:15 +0000702 PROT_READ|PROT_WRITE,
703 MAP_ANON|MAP_FIXED|MAP_PRIVATE, 0, 0));
balrog7ab240a2008-04-26 12:17:34 +0000704
705 if (!is_error(mapped_addr))
bellard31e31b82003-02-18 22:55:36 +0000706 target_brk = new_brk;
balrog7ab240a2008-04-26 12:17:34 +0000707
708 return target_brk;
bellard31e31b82003-02-18 22:55:36 +0000709}
710
ths26edcf42007-12-09 02:25:24 +0000711static inline abi_long copy_from_user_fdset(fd_set *fds,
712 abi_ulong target_fds_addr,
713 int n)
bellard31e31b82003-02-18 22:55:36 +0000714{
ths26edcf42007-12-09 02:25:24 +0000715 int i, nw, j, k;
716 abi_ulong b, *target_fds;
717
718 nw = (n + TARGET_ABI_BITS - 1) / TARGET_ABI_BITS;
719 if (!(target_fds = lock_user(VERIFY_READ,
720 target_fds_addr,
721 sizeof(abi_ulong) * nw,
722 1)))
723 return -TARGET_EFAULT;
724
725 FD_ZERO(fds);
726 k = 0;
727 for (i = 0; i < nw; i++) {
728 /* grab the abi_ulong */
729 __get_user(b, &target_fds[i]);
730 for (j = 0; j < TARGET_ABI_BITS; j++) {
731 /* check the bit inside the abi_ulong */
732 if ((b >> j) & 1)
733 FD_SET(k, fds);
734 k++;
bellard31e31b82003-02-18 22:55:36 +0000735 }
bellard31e31b82003-02-18 22:55:36 +0000736 }
ths26edcf42007-12-09 02:25:24 +0000737
738 unlock_user(target_fds, target_fds_addr, 0);
739
740 return 0;
bellard31e31b82003-02-18 22:55:36 +0000741}
742
ths26edcf42007-12-09 02:25:24 +0000743static inline abi_long copy_to_user_fdset(abi_ulong target_fds_addr,
744 const fd_set *fds,
745 int n)
bellard31e31b82003-02-18 22:55:36 +0000746{
bellard31e31b82003-02-18 22:55:36 +0000747 int i, nw, j, k;
blueswir1992f48a2007-10-14 16:27:31 +0000748 abi_long v;
ths26edcf42007-12-09 02:25:24 +0000749 abi_ulong *target_fds;
bellard31e31b82003-02-18 22:55:36 +0000750
ths26edcf42007-12-09 02:25:24 +0000751 nw = (n + TARGET_ABI_BITS - 1) / TARGET_ABI_BITS;
752 if (!(target_fds = lock_user(VERIFY_WRITE,
753 target_fds_addr,
754 sizeof(abi_ulong) * nw,
755 0)))
756 return -TARGET_EFAULT;
757
758 k = 0;
759 for (i = 0; i < nw; i++) {
760 v = 0;
761 for (j = 0; j < TARGET_ABI_BITS; j++) {
762 v |= ((FD_ISSET(k, fds) != 0) << j);
763 k++;
bellard31e31b82003-02-18 22:55:36 +0000764 }
ths26edcf42007-12-09 02:25:24 +0000765 __put_user(v, &target_fds[i]);
bellard31e31b82003-02-18 22:55:36 +0000766 }
ths26edcf42007-12-09 02:25:24 +0000767
768 unlock_user(target_fds, target_fds_addr, sizeof(abi_ulong) * nw);
769
770 return 0;
bellard31e31b82003-02-18 22:55:36 +0000771}
772
bellardc596ed12003-07-13 17:32:31 +0000773#if defined(__alpha__)
774#define HOST_HZ 1024
775#else
776#define HOST_HZ 100
777#endif
778
blueswir1992f48a2007-10-14 16:27:31 +0000779static inline abi_long host_to_target_clock_t(long ticks)
bellardc596ed12003-07-13 17:32:31 +0000780{
781#if HOST_HZ == TARGET_HZ
782 return ticks;
783#else
784 return ((int64_t)ticks * TARGET_HZ) / HOST_HZ;
785#endif
786}
787
bellard579a97f2007-11-11 14:26:47 +0000788static inline abi_long host_to_target_rusage(abi_ulong target_addr,
789 const struct rusage *rusage)
bellardb4091862003-05-16 15:39:34 +0000790{
pbrook53a59602006-03-25 19:31:22 +0000791 struct target_rusage *target_rusage;
792
bellard579a97f2007-11-11 14:26:47 +0000793 if (!lock_user_struct(VERIFY_WRITE, target_rusage, target_addr, 0))
794 return -TARGET_EFAULT;
bellardb4091862003-05-16 15:39:34 +0000795 target_rusage->ru_utime.tv_sec = tswapl(rusage->ru_utime.tv_sec);
796 target_rusage->ru_utime.tv_usec = tswapl(rusage->ru_utime.tv_usec);
797 target_rusage->ru_stime.tv_sec = tswapl(rusage->ru_stime.tv_sec);
798 target_rusage->ru_stime.tv_usec = tswapl(rusage->ru_stime.tv_usec);
799 target_rusage->ru_maxrss = tswapl(rusage->ru_maxrss);
800 target_rusage->ru_ixrss = tswapl(rusage->ru_ixrss);
801 target_rusage->ru_idrss = tswapl(rusage->ru_idrss);
802 target_rusage->ru_isrss = tswapl(rusage->ru_isrss);
803 target_rusage->ru_minflt = tswapl(rusage->ru_minflt);
804 target_rusage->ru_majflt = tswapl(rusage->ru_majflt);
805 target_rusage->ru_nswap = tswapl(rusage->ru_nswap);
806 target_rusage->ru_inblock = tswapl(rusage->ru_inblock);
807 target_rusage->ru_oublock = tswapl(rusage->ru_oublock);
808 target_rusage->ru_msgsnd = tswapl(rusage->ru_msgsnd);
809 target_rusage->ru_msgrcv = tswapl(rusage->ru_msgrcv);
810 target_rusage->ru_nsignals = tswapl(rusage->ru_nsignals);
811 target_rusage->ru_nvcsw = tswapl(rusage->ru_nvcsw);
812 target_rusage->ru_nivcsw = tswapl(rusage->ru_nivcsw);
pbrook53a59602006-03-25 19:31:22 +0000813 unlock_user_struct(target_rusage, target_addr, 1);
bellard579a97f2007-11-11 14:26:47 +0000814
815 return 0;
bellardb4091862003-05-16 15:39:34 +0000816}
817
ths788f5ec2007-12-09 02:37:05 +0000818static inline abi_long copy_from_user_timeval(struct timeval *tv,
819 abi_ulong target_tv_addr)
bellard31e31b82003-02-18 22:55:36 +0000820{
pbrook53a59602006-03-25 19:31:22 +0000821 struct target_timeval *target_tv;
822
ths788f5ec2007-12-09 02:37:05 +0000823 if (!lock_user_struct(VERIFY_READ, target_tv, target_tv_addr, 1))
bellard579a97f2007-11-11 14:26:47 +0000824 return -TARGET_EFAULT;
ths788f5ec2007-12-09 02:37:05 +0000825
826 __get_user(tv->tv_sec, &target_tv->tv_sec);
827 __get_user(tv->tv_usec, &target_tv->tv_usec);
828
829 unlock_user_struct(target_tv, target_tv_addr, 0);
bellard579a97f2007-11-11 14:26:47 +0000830
831 return 0;
bellard31e31b82003-02-18 22:55:36 +0000832}
833
ths788f5ec2007-12-09 02:37:05 +0000834static inline abi_long copy_to_user_timeval(abi_ulong target_tv_addr,
835 const struct timeval *tv)
bellard31e31b82003-02-18 22:55:36 +0000836{
pbrook53a59602006-03-25 19:31:22 +0000837 struct target_timeval *target_tv;
838
ths788f5ec2007-12-09 02:37:05 +0000839 if (!lock_user_struct(VERIFY_WRITE, target_tv, target_tv_addr, 0))
bellard579a97f2007-11-11 14:26:47 +0000840 return -TARGET_EFAULT;
ths788f5ec2007-12-09 02:37:05 +0000841
842 __put_user(tv->tv_sec, &target_tv->tv_sec);
843 __put_user(tv->tv_usec, &target_tv->tv_usec);
844
845 unlock_user_struct(target_tv, target_tv_addr, 1);
bellard579a97f2007-11-11 14:26:47 +0000846
847 return 0;
bellard31e31b82003-02-18 22:55:36 +0000848}
849
Nathan Froyd8ec9cf82009-07-22 09:14:36 -0700850#if defined(TARGET_NR_mq_open) && defined(__NR_mq_open)
851#include <mqueue.h>
852
aurel3224e10032009-04-15 16:11:43 +0000853static inline abi_long copy_from_user_mq_attr(struct mq_attr *attr,
854 abi_ulong target_mq_attr_addr)
855{
856 struct target_mq_attr *target_mq_attr;
857
858 if (!lock_user_struct(VERIFY_READ, target_mq_attr,
859 target_mq_attr_addr, 1))
860 return -TARGET_EFAULT;
861
862 __get_user(attr->mq_flags, &target_mq_attr->mq_flags);
863 __get_user(attr->mq_maxmsg, &target_mq_attr->mq_maxmsg);
864 __get_user(attr->mq_msgsize, &target_mq_attr->mq_msgsize);
865 __get_user(attr->mq_curmsgs, &target_mq_attr->mq_curmsgs);
866
867 unlock_user_struct(target_mq_attr, target_mq_attr_addr, 0);
868
869 return 0;
870}
871
872static inline abi_long copy_to_user_mq_attr(abi_ulong target_mq_attr_addr,
873 const struct mq_attr *attr)
874{
875 struct target_mq_attr *target_mq_attr;
876
877 if (!lock_user_struct(VERIFY_WRITE, target_mq_attr,
878 target_mq_attr_addr, 0))
879 return -TARGET_EFAULT;
880
881 __put_user(attr->mq_flags, &target_mq_attr->mq_flags);
882 __put_user(attr->mq_maxmsg, &target_mq_attr->mq_maxmsg);
883 __put_user(attr->mq_msgsize, &target_mq_attr->mq_msgsize);
884 __put_user(attr->mq_curmsgs, &target_mq_attr->mq_curmsgs);
885
886 unlock_user_struct(target_mq_attr, target_mq_attr_addr, 1);
887
888 return 0;
889}
Nathan Froyd8ec9cf82009-07-22 09:14:36 -0700890#endif
bellard31e31b82003-02-18 22:55:36 +0000891
ths0da46a62007-10-20 20:23:07 +0000892/* do_select() must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +0000893static abi_long do_select(int n,
ths26edcf42007-12-09 02:25:24 +0000894 abi_ulong rfd_addr, abi_ulong wfd_addr,
895 abi_ulong efd_addr, abi_ulong target_tv_addr)
bellard31e31b82003-02-18 22:55:36 +0000896{
897 fd_set rfds, wfds, efds;
898 fd_set *rfds_ptr, *wfds_ptr, *efds_ptr;
899 struct timeval tv, *tv_ptr;
blueswir1992f48a2007-10-14 16:27:31 +0000900 abi_long ret;
bellard31e31b82003-02-18 22:55:36 +0000901
ths26edcf42007-12-09 02:25:24 +0000902 if (rfd_addr) {
903 if (copy_from_user_fdset(&rfds, rfd_addr, n))
904 return -TARGET_EFAULT;
905 rfds_ptr = &rfds;
pbrook53a59602006-03-25 19:31:22 +0000906 } else {
pbrook53a59602006-03-25 19:31:22 +0000907 rfds_ptr = NULL;
908 }
ths26edcf42007-12-09 02:25:24 +0000909 if (wfd_addr) {
910 if (copy_from_user_fdset(&wfds, wfd_addr, n))
911 return -TARGET_EFAULT;
912 wfds_ptr = &wfds;
pbrook53a59602006-03-25 19:31:22 +0000913 } else {
pbrook53a59602006-03-25 19:31:22 +0000914 wfds_ptr = NULL;
915 }
ths26edcf42007-12-09 02:25:24 +0000916 if (efd_addr) {
917 if (copy_from_user_fdset(&efds, efd_addr, n))
918 return -TARGET_EFAULT;
919 efds_ptr = &efds;
pbrook53a59602006-03-25 19:31:22 +0000920 } else {
pbrook53a59602006-03-25 19:31:22 +0000921 efds_ptr = NULL;
922 }
ths3b46e622007-09-17 08:09:54 +0000923
ths26edcf42007-12-09 02:25:24 +0000924 if (target_tv_addr) {
ths788f5ec2007-12-09 02:37:05 +0000925 if (copy_from_user_timeval(&tv, target_tv_addr))
926 return -TARGET_EFAULT;
bellard31e31b82003-02-18 22:55:36 +0000927 tv_ptr = &tv;
928 } else {
929 tv_ptr = NULL;
930 }
ths26edcf42007-12-09 02:25:24 +0000931
bellard31e31b82003-02-18 22:55:36 +0000932 ret = get_errno(select(n, rfds_ptr, wfds_ptr, efds_ptr, tv_ptr));
pbrook53a59602006-03-25 19:31:22 +0000933
ths26edcf42007-12-09 02:25:24 +0000934 if (!is_error(ret)) {
935 if (rfd_addr && copy_to_user_fdset(rfd_addr, &rfds, n))
936 return -TARGET_EFAULT;
937 if (wfd_addr && copy_to_user_fdset(wfd_addr, &wfds, n))
938 return -TARGET_EFAULT;
939 if (efd_addr && copy_to_user_fdset(efd_addr, &efds, n))
940 return -TARGET_EFAULT;
bellard31e31b82003-02-18 22:55:36 +0000941
ths788f5ec2007-12-09 02:37:05 +0000942 if (target_tv_addr && copy_to_user_timeval(target_tv_addr, &tv))
943 return -TARGET_EFAULT;
bellard31e31b82003-02-18 22:55:36 +0000944 }
bellard579a97f2007-11-11 14:26:47 +0000945
bellard31e31b82003-02-18 22:55:36 +0000946 return ret;
947}
948
Riku Voipio099d6b02009-05-05 12:10:04 +0300949static abi_long do_pipe2(int host_pipe[], int flags)
950{
951#ifdef CONFIG_PIPE2
952 return pipe2(host_pipe, flags);
953#else
954 return -ENOSYS;
955#endif
956}
957
Ulrich Hecht784ccfd2009-07-03 17:09:26 +0200958static abi_long do_pipe(void *cpu_env, abi_ulong pipedes, int flags)
Riku Voipio099d6b02009-05-05 12:10:04 +0300959{
960 int host_pipe[2];
961 abi_long ret;
962 ret = flags ? do_pipe2(host_pipe, flags) : pipe(host_pipe);
963
964 if (is_error(ret))
965 return get_errno(ret);
966#if defined(TARGET_MIPS)
967 ((CPUMIPSState*)cpu_env)->active_tc.gpr[3] = host_pipe[1];
968 ret = host_pipe[0];
969#elif defined(TARGET_SH4)
970 ((CPUSH4State*)cpu_env)->gregs[1] = host_pipe[1];
971 ret = host_pipe[0];
972#else
973 if (put_user_s32(host_pipe[0], pipedes)
974 || put_user_s32(host_pipe[1], pipedes + sizeof(host_pipe[0])))
975 return -TARGET_EFAULT;
976#endif
977 return get_errno(ret);
978}
979
Lionel Landwerlinb975b832009-04-25 23:30:19 +0200980static inline abi_long target_to_host_ip_mreq(struct ip_mreqn *mreqn,
981 abi_ulong target_addr,
982 socklen_t len)
983{
984 struct target_ip_mreqn *target_smreqn;
985
986 target_smreqn = lock_user(VERIFY_READ, target_addr, len, 1);
987 if (!target_smreqn)
988 return -TARGET_EFAULT;
989 mreqn->imr_multiaddr.s_addr = target_smreqn->imr_multiaddr.s_addr;
990 mreqn->imr_address.s_addr = target_smreqn->imr_address.s_addr;
991 if (len == sizeof(struct target_ip_mreqn))
992 mreqn->imr_ifindex = tswapl(target_smreqn->imr_ifindex);
993 unlock_user(target_smreqn, target_addr, 0);
994
995 return 0;
996}
997
bellard579a97f2007-11-11 14:26:47 +0000998static inline abi_long target_to_host_sockaddr(struct sockaddr *addr,
999 abi_ulong target_addr,
1000 socklen_t len)
bellard7854b052003-03-29 17:22:23 +00001001{
aurel32607175e2009-04-15 16:11:59 +00001002 const socklen_t unix_maxlen = sizeof (struct sockaddr_un);
1003 sa_family_t sa_family;
pbrook53a59602006-03-25 19:31:22 +00001004 struct target_sockaddr *target_saddr;
1005
bellard579a97f2007-11-11 14:26:47 +00001006 target_saddr = lock_user(VERIFY_READ, target_addr, len, 1);
1007 if (!target_saddr)
1008 return -TARGET_EFAULT;
aurel32607175e2009-04-15 16:11:59 +00001009
1010 sa_family = tswap16(target_saddr->sa_family);
1011
1012 /* Oops. The caller might send a incomplete sun_path; sun_path
1013 * must be terminated by \0 (see the manual page), but
1014 * unfortunately it is quite common to specify sockaddr_un
1015 * length as "strlen(x->sun_path)" while it should be
1016 * "strlen(...) + 1". We'll fix that here if needed.
1017 * Linux kernel has a similar feature.
1018 */
1019
1020 if (sa_family == AF_UNIX) {
1021 if (len < unix_maxlen && len > 0) {
1022 char *cp = (char*)target_saddr;
1023
1024 if ( cp[len-1] && !cp[len] )
1025 len++;
1026 }
1027 if (len > unix_maxlen)
1028 len = unix_maxlen;
1029 }
1030
pbrook53a59602006-03-25 19:31:22 +00001031 memcpy(addr, target_saddr, len);
aurel32607175e2009-04-15 16:11:59 +00001032 addr->sa_family = sa_family;
pbrook53a59602006-03-25 19:31:22 +00001033 unlock_user(target_saddr, target_addr, 0);
bellard579a97f2007-11-11 14:26:47 +00001034
1035 return 0;
bellard7854b052003-03-29 17:22:23 +00001036}
1037
bellard579a97f2007-11-11 14:26:47 +00001038static inline abi_long host_to_target_sockaddr(abi_ulong target_addr,
1039 struct sockaddr *addr,
1040 socklen_t len)
bellard7854b052003-03-29 17:22:23 +00001041{
pbrook53a59602006-03-25 19:31:22 +00001042 struct target_sockaddr *target_saddr;
1043
bellard579a97f2007-11-11 14:26:47 +00001044 target_saddr = lock_user(VERIFY_WRITE, target_addr, len, 0);
1045 if (!target_saddr)
1046 return -TARGET_EFAULT;
pbrook53a59602006-03-25 19:31:22 +00001047 memcpy(target_saddr, addr, len);
1048 target_saddr->sa_family = tswap16(addr->sa_family);
1049 unlock_user(target_saddr, target_addr, len);
bellard579a97f2007-11-11 14:26:47 +00001050
1051 return 0;
bellard7854b052003-03-29 17:22:23 +00001052}
1053
pbrook53a59602006-03-25 19:31:22 +00001054/* ??? Should this also swap msgh->name? */
bellard5a4a8982007-11-11 17:39:18 +00001055static inline abi_long target_to_host_cmsg(struct msghdr *msgh,
1056 struct target_msghdr *target_msgh)
bellard7854b052003-03-29 17:22:23 +00001057{
1058 struct cmsghdr *cmsg = CMSG_FIRSTHDR(msgh);
bellard5a4a8982007-11-11 17:39:18 +00001059 abi_long msg_controllen;
1060 abi_ulong target_cmsg_addr;
1061 struct target_cmsghdr *target_cmsg;
bellard7854b052003-03-29 17:22:23 +00001062 socklen_t space = 0;
bellard5a4a8982007-11-11 17:39:18 +00001063
1064 msg_controllen = tswapl(target_msgh->msg_controllen);
1065 if (msg_controllen < sizeof (struct target_cmsghdr))
1066 goto the_end;
1067 target_cmsg_addr = tswapl(target_msgh->msg_control);
1068 target_cmsg = lock_user(VERIFY_READ, target_cmsg_addr, msg_controllen, 1);
1069 if (!target_cmsg)
1070 return -TARGET_EFAULT;
bellard7854b052003-03-29 17:22:23 +00001071
1072 while (cmsg && target_cmsg) {
1073 void *data = CMSG_DATA(cmsg);
1074 void *target_data = TARGET_CMSG_DATA(target_cmsg);
1075
ths5fafdf22007-09-16 21:08:06 +00001076 int len = tswapl(target_cmsg->cmsg_len)
bellard7854b052003-03-29 17:22:23 +00001077 - TARGET_CMSG_ALIGN(sizeof (struct target_cmsghdr));
1078
1079 space += CMSG_SPACE(len);
1080 if (space > msgh->msg_controllen) {
1081 space -= CMSG_SPACE(len);
bellard31febb72005-12-18 20:03:27 +00001082 gemu_log("Host cmsg overflow\n");
bellard7854b052003-03-29 17:22:23 +00001083 break;
1084 }
1085
1086 cmsg->cmsg_level = tswap32(target_cmsg->cmsg_level);
1087 cmsg->cmsg_type = tswap32(target_cmsg->cmsg_type);
1088 cmsg->cmsg_len = CMSG_LEN(len);
1089
bellard3532fa72006-06-24 15:06:03 +00001090 if (cmsg->cmsg_level != TARGET_SOL_SOCKET || cmsg->cmsg_type != SCM_RIGHTS) {
bellard7854b052003-03-29 17:22:23 +00001091 gemu_log("Unsupported ancillary data: %d/%d\n", cmsg->cmsg_level, cmsg->cmsg_type);
1092 memcpy(data, target_data, len);
1093 } else {
1094 int *fd = (int *)data;
1095 int *target_fd = (int *)target_data;
1096 int i, numfds = len / sizeof(int);
1097
1098 for (i = 0; i < numfds; i++)
1099 fd[i] = tswap32(target_fd[i]);
1100 }
1101
1102 cmsg = CMSG_NXTHDR(msgh, cmsg);
1103 target_cmsg = TARGET_CMSG_NXTHDR(target_msgh, target_cmsg);
1104 }
bellard5a4a8982007-11-11 17:39:18 +00001105 unlock_user(target_cmsg, target_cmsg_addr, 0);
1106 the_end:
bellard7854b052003-03-29 17:22:23 +00001107 msgh->msg_controllen = space;
bellard5a4a8982007-11-11 17:39:18 +00001108 return 0;
bellard7854b052003-03-29 17:22:23 +00001109}
1110
pbrook53a59602006-03-25 19:31:22 +00001111/* ??? Should this also swap msgh->name? */
bellard5a4a8982007-11-11 17:39:18 +00001112static inline abi_long host_to_target_cmsg(struct target_msghdr *target_msgh,
1113 struct msghdr *msgh)
bellard7854b052003-03-29 17:22:23 +00001114{
1115 struct cmsghdr *cmsg = CMSG_FIRSTHDR(msgh);
bellard5a4a8982007-11-11 17:39:18 +00001116 abi_long msg_controllen;
1117 abi_ulong target_cmsg_addr;
1118 struct target_cmsghdr *target_cmsg;
bellard7854b052003-03-29 17:22:23 +00001119 socklen_t space = 0;
1120
bellard5a4a8982007-11-11 17:39:18 +00001121 msg_controllen = tswapl(target_msgh->msg_controllen);
1122 if (msg_controllen < sizeof (struct target_cmsghdr))
1123 goto the_end;
1124 target_cmsg_addr = tswapl(target_msgh->msg_control);
1125 target_cmsg = lock_user(VERIFY_WRITE, target_cmsg_addr, msg_controllen, 0);
1126 if (!target_cmsg)
1127 return -TARGET_EFAULT;
1128
bellard7854b052003-03-29 17:22:23 +00001129 while (cmsg && target_cmsg) {
1130 void *data = CMSG_DATA(cmsg);
1131 void *target_data = TARGET_CMSG_DATA(target_cmsg);
1132
1133 int len = cmsg->cmsg_len - CMSG_ALIGN(sizeof (struct cmsghdr));
1134
1135 space += TARGET_CMSG_SPACE(len);
bellard5a4a8982007-11-11 17:39:18 +00001136 if (space > msg_controllen) {
bellard7854b052003-03-29 17:22:23 +00001137 space -= TARGET_CMSG_SPACE(len);
bellard31febb72005-12-18 20:03:27 +00001138 gemu_log("Target cmsg overflow\n");
bellard7854b052003-03-29 17:22:23 +00001139 break;
1140 }
1141
1142 target_cmsg->cmsg_level = tswap32(cmsg->cmsg_level);
1143 target_cmsg->cmsg_type = tswap32(cmsg->cmsg_type);
1144 target_cmsg->cmsg_len = tswapl(TARGET_CMSG_LEN(len));
1145
bellard3532fa72006-06-24 15:06:03 +00001146 if (cmsg->cmsg_level != TARGET_SOL_SOCKET || cmsg->cmsg_type != SCM_RIGHTS) {
bellard7854b052003-03-29 17:22:23 +00001147 gemu_log("Unsupported ancillary data: %d/%d\n", cmsg->cmsg_level, cmsg->cmsg_type);
1148 memcpy(target_data, data, len);
1149 } else {
1150 int *fd = (int *)data;
1151 int *target_fd = (int *)target_data;
1152 int i, numfds = len / sizeof(int);
1153
1154 for (i = 0; i < numfds; i++)
1155 target_fd[i] = tswap32(fd[i]);
1156 }
1157
1158 cmsg = CMSG_NXTHDR(msgh, cmsg);
1159 target_cmsg = TARGET_CMSG_NXTHDR(target_msgh, target_cmsg);
1160 }
bellard5a4a8982007-11-11 17:39:18 +00001161 unlock_user(target_cmsg, target_cmsg_addr, space);
1162 the_end:
1163 target_msgh->msg_controllen = tswapl(space);
1164 return 0;
bellard7854b052003-03-29 17:22:23 +00001165}
1166
ths0da46a62007-10-20 20:23:07 +00001167/* do_setsockopt() Must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +00001168static abi_long do_setsockopt(int sockfd, int level, int optname,
bellard2f619692007-11-16 10:46:05 +00001169 abi_ulong optval_addr, socklen_t optlen)
bellard7854b052003-03-29 17:22:23 +00001170{
blueswir1992f48a2007-10-14 16:27:31 +00001171 abi_long ret;
j_mayer32407102007-09-26 23:01:49 +00001172 int val;
Lionel Landwerlinb975b832009-04-25 23:30:19 +02001173 struct ip_mreqn *ip_mreq;
Lionel Landwerlin6e3cb582009-04-25 23:31:18 +02001174 struct ip_mreq_source *ip_mreq_source;
ths3b46e622007-09-17 08:09:54 +00001175
bellard8853f862004-02-22 14:57:26 +00001176 switch(level) {
1177 case SOL_TCP:
bellard7854b052003-03-29 17:22:23 +00001178 /* TCP options all take an 'int' value. */
bellard7854b052003-03-29 17:22:23 +00001179 if (optlen < sizeof(uint32_t))
ths0da46a62007-10-20 20:23:07 +00001180 return -TARGET_EINVAL;
ths3b46e622007-09-17 08:09:54 +00001181
bellard2f619692007-11-16 10:46:05 +00001182 if (get_user_u32(val, optval_addr))
1183 return -TARGET_EFAULT;
bellard8853f862004-02-22 14:57:26 +00001184 ret = get_errno(setsockopt(sockfd, level, optname, &val, sizeof(val)));
1185 break;
1186 case SOL_IP:
1187 switch(optname) {
bellard2efbe912005-07-23 15:10:20 +00001188 case IP_TOS:
1189 case IP_TTL:
bellard8853f862004-02-22 14:57:26 +00001190 case IP_HDRINCL:
bellard2efbe912005-07-23 15:10:20 +00001191 case IP_ROUTER_ALERT:
1192 case IP_RECVOPTS:
1193 case IP_RETOPTS:
1194 case IP_PKTINFO:
1195 case IP_MTU_DISCOVER:
1196 case IP_RECVERR:
1197 case IP_RECVTOS:
1198#ifdef IP_FREEBIND
1199 case IP_FREEBIND:
1200#endif
1201 case IP_MULTICAST_TTL:
1202 case IP_MULTICAST_LOOP:
bellard8853f862004-02-22 14:57:26 +00001203 val = 0;
1204 if (optlen >= sizeof(uint32_t)) {
bellard2f619692007-11-16 10:46:05 +00001205 if (get_user_u32(val, optval_addr))
1206 return -TARGET_EFAULT;
bellard8853f862004-02-22 14:57:26 +00001207 } else if (optlen >= 1) {
bellard2f619692007-11-16 10:46:05 +00001208 if (get_user_u8(val, optval_addr))
1209 return -TARGET_EFAULT;
bellard8853f862004-02-22 14:57:26 +00001210 }
1211 ret = get_errno(setsockopt(sockfd, level, optname, &val, sizeof(val)));
1212 break;
Lionel Landwerlinb975b832009-04-25 23:30:19 +02001213 case IP_ADD_MEMBERSHIP:
1214 case IP_DROP_MEMBERSHIP:
1215 if (optlen < sizeof (struct target_ip_mreq) ||
1216 optlen > sizeof (struct target_ip_mreqn))
1217 return -TARGET_EINVAL;
1218
1219 ip_mreq = (struct ip_mreqn *) alloca(optlen);
1220 target_to_host_ip_mreq(ip_mreq, optval_addr, optlen);
1221 ret = get_errno(setsockopt(sockfd, level, optname, ip_mreq, optlen));
1222 break;
1223
Lionel Landwerlin6e3cb582009-04-25 23:31:18 +02001224 case IP_BLOCK_SOURCE:
1225 case IP_UNBLOCK_SOURCE:
1226 case IP_ADD_SOURCE_MEMBERSHIP:
1227 case IP_DROP_SOURCE_MEMBERSHIP:
1228 if (optlen != sizeof (struct target_ip_mreq_source))
1229 return -TARGET_EINVAL;
1230
1231 ip_mreq_source = lock_user(VERIFY_READ, optval_addr, optlen, 1);
1232 ret = get_errno(setsockopt(sockfd, level, optname, ip_mreq_source, optlen));
1233 unlock_user (ip_mreq_source, optval_addr, 0);
1234 break;
1235
bellard8853f862004-02-22 14:57:26 +00001236 default:
1237 goto unimplemented;
1238 }
1239 break;
bellard3532fa72006-06-24 15:06:03 +00001240 case TARGET_SOL_SOCKET:
bellard8853f862004-02-22 14:57:26 +00001241 switch (optname) {
1242 /* Options with 'int' argument. */
bellard3532fa72006-06-24 15:06:03 +00001243 case TARGET_SO_DEBUG:
1244 optname = SO_DEBUG;
1245 break;
1246 case TARGET_SO_REUSEADDR:
1247 optname = SO_REUSEADDR;
1248 break;
1249 case TARGET_SO_TYPE:
1250 optname = SO_TYPE;
1251 break;
1252 case TARGET_SO_ERROR:
1253 optname = SO_ERROR;
1254 break;
1255 case TARGET_SO_DONTROUTE:
1256 optname = SO_DONTROUTE;
1257 break;
1258 case TARGET_SO_BROADCAST:
1259 optname = SO_BROADCAST;
1260 break;
1261 case TARGET_SO_SNDBUF:
1262 optname = SO_SNDBUF;
1263 break;
1264 case TARGET_SO_RCVBUF:
1265 optname = SO_RCVBUF;
1266 break;
1267 case TARGET_SO_KEEPALIVE:
1268 optname = SO_KEEPALIVE;
1269 break;
1270 case TARGET_SO_OOBINLINE:
1271 optname = SO_OOBINLINE;
1272 break;
1273 case TARGET_SO_NO_CHECK:
1274 optname = SO_NO_CHECK;
1275 break;
1276 case TARGET_SO_PRIORITY:
1277 optname = SO_PRIORITY;
1278 break;
bellard5e83e8e2005-03-01 22:32:06 +00001279#ifdef SO_BSDCOMPAT
bellard3532fa72006-06-24 15:06:03 +00001280 case TARGET_SO_BSDCOMPAT:
1281 optname = SO_BSDCOMPAT;
1282 break;
bellard5e83e8e2005-03-01 22:32:06 +00001283#endif
bellard3532fa72006-06-24 15:06:03 +00001284 case TARGET_SO_PASSCRED:
1285 optname = SO_PASSCRED;
1286 break;
1287 case TARGET_SO_TIMESTAMP:
1288 optname = SO_TIMESTAMP;
1289 break;
1290 case TARGET_SO_RCVLOWAT:
1291 optname = SO_RCVLOWAT;
1292 break;
1293 case TARGET_SO_RCVTIMEO:
1294 optname = SO_RCVTIMEO;
1295 break;
1296 case TARGET_SO_SNDTIMEO:
1297 optname = SO_SNDTIMEO;
1298 break;
bellard8853f862004-02-22 14:57:26 +00001299 break;
1300 default:
1301 goto unimplemented;
1302 }
bellard3532fa72006-06-24 15:06:03 +00001303 if (optlen < sizeof(uint32_t))
bellard2f619692007-11-16 10:46:05 +00001304 return -TARGET_EINVAL;
bellard3532fa72006-06-24 15:06:03 +00001305
bellard2f619692007-11-16 10:46:05 +00001306 if (get_user_u32(val, optval_addr))
1307 return -TARGET_EFAULT;
bellard3532fa72006-06-24 15:06:03 +00001308 ret = get_errno(setsockopt(sockfd, SOL_SOCKET, optname, &val, sizeof(val)));
bellard8853f862004-02-22 14:57:26 +00001309 break;
bellard7854b052003-03-29 17:22:23 +00001310 default:
bellard8853f862004-02-22 14:57:26 +00001311 unimplemented:
1312 gemu_log("Unsupported setsockopt level=%d optname=%d \n", level, optname);
ths6fa13c12007-12-18 02:41:04 +00001313 ret = -TARGET_ENOPROTOOPT;
bellard7854b052003-03-29 17:22:23 +00001314 }
bellard8853f862004-02-22 14:57:26 +00001315 return ret;
bellard7854b052003-03-29 17:22:23 +00001316}
1317
ths0da46a62007-10-20 20:23:07 +00001318/* do_getsockopt() Must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +00001319static abi_long do_getsockopt(int sockfd, int level, int optname,
bellard2f619692007-11-16 10:46:05 +00001320 abi_ulong optval_addr, abi_ulong optlen)
bellard7854b052003-03-29 17:22:23 +00001321{
blueswir1992f48a2007-10-14 16:27:31 +00001322 abi_long ret;
blueswir1b55266b2008-09-20 08:07:15 +00001323 int len, val;
1324 socklen_t lv;
bellard8853f862004-02-22 14:57:26 +00001325
1326 switch(level) {
bellard3532fa72006-06-24 15:06:03 +00001327 case TARGET_SOL_SOCKET:
1328 level = SOL_SOCKET;
bellard8853f862004-02-22 14:57:26 +00001329 switch (optname) {
bellard3532fa72006-06-24 15:06:03 +00001330 case TARGET_SO_LINGER:
1331 case TARGET_SO_RCVTIMEO:
1332 case TARGET_SO_SNDTIMEO:
1333 case TARGET_SO_PEERCRED:
1334 case TARGET_SO_PEERNAME:
bellard8853f862004-02-22 14:57:26 +00001335 /* These don't just return a single integer */
1336 goto unimplemented;
1337 default:
bellard2efbe912005-07-23 15:10:20 +00001338 goto int_case;
1339 }
1340 break;
1341 case SOL_TCP:
1342 /* TCP options all take an 'int' value. */
1343 int_case:
bellard2f619692007-11-16 10:46:05 +00001344 if (get_user_u32(len, optlen))
1345 return -TARGET_EFAULT;
bellard2efbe912005-07-23 15:10:20 +00001346 if (len < 0)
ths0da46a62007-10-20 20:23:07 +00001347 return -TARGET_EINVAL;
bellard2efbe912005-07-23 15:10:20 +00001348 lv = sizeof(int);
1349 ret = get_errno(getsockopt(sockfd, level, optname, &val, &lv));
1350 if (ret < 0)
1351 return ret;
bellard2efbe912005-07-23 15:10:20 +00001352 if (len > lv)
1353 len = lv;
bellard2f619692007-11-16 10:46:05 +00001354 if (len == 4) {
1355 if (put_user_u32(val, optval_addr))
1356 return -TARGET_EFAULT;
1357 } else {
1358 if (put_user_u8(val, optval_addr))
1359 return -TARGET_EFAULT;
1360 }
1361 if (put_user_u32(len, optlen))
1362 return -TARGET_EFAULT;
bellard2efbe912005-07-23 15:10:20 +00001363 break;
1364 case SOL_IP:
1365 switch(optname) {
1366 case IP_TOS:
1367 case IP_TTL:
1368 case IP_HDRINCL:
1369 case IP_ROUTER_ALERT:
1370 case IP_RECVOPTS:
1371 case IP_RETOPTS:
1372 case IP_PKTINFO:
1373 case IP_MTU_DISCOVER:
1374 case IP_RECVERR:
1375 case IP_RECVTOS:
1376#ifdef IP_FREEBIND
1377 case IP_FREEBIND:
1378#endif
1379 case IP_MULTICAST_TTL:
1380 case IP_MULTICAST_LOOP:
bellard2f619692007-11-16 10:46:05 +00001381 if (get_user_u32(len, optlen))
1382 return -TARGET_EFAULT;
bellard8853f862004-02-22 14:57:26 +00001383 if (len < 0)
ths0da46a62007-10-20 20:23:07 +00001384 return -TARGET_EINVAL;
bellard8853f862004-02-22 14:57:26 +00001385 lv = sizeof(int);
1386 ret = get_errno(getsockopt(sockfd, level, optname, &val, &lv));
1387 if (ret < 0)
1388 return ret;
bellard2efbe912005-07-23 15:10:20 +00001389 if (len < sizeof(int) && len > 0 && val >= 0 && val < 255) {
bellard2efbe912005-07-23 15:10:20 +00001390 len = 1;
bellard2f619692007-11-16 10:46:05 +00001391 if (put_user_u32(len, optlen)
1392 || put_user_u8(val, optval_addr))
1393 return -TARGET_EFAULT;
bellard2efbe912005-07-23 15:10:20 +00001394 } else {
bellard2efbe912005-07-23 15:10:20 +00001395 if (len > sizeof(int))
1396 len = sizeof(int);
bellard2f619692007-11-16 10:46:05 +00001397 if (put_user_u32(len, optlen)
1398 || put_user_u32(val, optval_addr))
1399 return -TARGET_EFAULT;
bellard2efbe912005-07-23 15:10:20 +00001400 }
bellard8853f862004-02-22 14:57:26 +00001401 break;
bellard2efbe912005-07-23 15:10:20 +00001402 default:
thsc02f4992007-12-18 02:39:59 +00001403 ret = -TARGET_ENOPROTOOPT;
1404 break;
bellard8853f862004-02-22 14:57:26 +00001405 }
1406 break;
1407 default:
1408 unimplemented:
1409 gemu_log("getsockopt level=%d optname=%d not yet supported\n",
1410 level, optname);
thsc02f4992007-12-18 02:39:59 +00001411 ret = -TARGET_EOPNOTSUPP;
bellard8853f862004-02-22 14:57:26 +00001412 break;
1413 }
1414 return ret;
bellard7854b052003-03-29 17:22:23 +00001415}
1416
bellard579a97f2007-11-11 14:26:47 +00001417/* FIXME
1418 * lock_iovec()/unlock_iovec() have a return code of 0 for success where
1419 * other lock functions have a return code of 0 for failure.
1420 */
1421static abi_long lock_iovec(int type, struct iovec *vec, abi_ulong target_addr,
1422 int count, int copy)
pbrook53a59602006-03-25 19:31:22 +00001423{
1424 struct target_iovec *target_vec;
blueswir1992f48a2007-10-14 16:27:31 +00001425 abi_ulong base;
balrogd732dcb2008-10-28 10:21:03 +00001426 int i;
pbrook53a59602006-03-25 19:31:22 +00001427
bellard579a97f2007-11-11 14:26:47 +00001428 target_vec = lock_user(VERIFY_READ, target_addr, count * sizeof(struct target_iovec), 1);
1429 if (!target_vec)
1430 return -TARGET_EFAULT;
pbrook53a59602006-03-25 19:31:22 +00001431 for(i = 0;i < count; i++) {
1432 base = tswapl(target_vec[i].iov_base);
1433 vec[i].iov_len = tswapl(target_vec[i].iov_len);
bellard41df8412008-02-04 22:26:57 +00001434 if (vec[i].iov_len != 0) {
1435 vec[i].iov_base = lock_user(type, base, vec[i].iov_len, copy);
balrogd732dcb2008-10-28 10:21:03 +00001436 /* Don't check lock_user return value. We must call writev even
1437 if a element has invalid base address. */
bellard41df8412008-02-04 22:26:57 +00001438 } else {
1439 /* zero length pointer is ignored */
1440 vec[i].iov_base = NULL;
1441 }
pbrook53a59602006-03-25 19:31:22 +00001442 }
1443 unlock_user (target_vec, target_addr, 0);
bellard579a97f2007-11-11 14:26:47 +00001444 return 0;
pbrook53a59602006-03-25 19:31:22 +00001445}
1446
bellard579a97f2007-11-11 14:26:47 +00001447static abi_long unlock_iovec(struct iovec *vec, abi_ulong target_addr,
1448 int count, int copy)
pbrook53a59602006-03-25 19:31:22 +00001449{
1450 struct target_iovec *target_vec;
blueswir1992f48a2007-10-14 16:27:31 +00001451 abi_ulong base;
pbrook53a59602006-03-25 19:31:22 +00001452 int i;
1453
bellard579a97f2007-11-11 14:26:47 +00001454 target_vec = lock_user(VERIFY_READ, target_addr, count * sizeof(struct target_iovec), 1);
1455 if (!target_vec)
1456 return -TARGET_EFAULT;
pbrook53a59602006-03-25 19:31:22 +00001457 for(i = 0;i < count; i++) {
balrogd732dcb2008-10-28 10:21:03 +00001458 if (target_vec[i].iov_base) {
1459 base = tswapl(target_vec[i].iov_base);
1460 unlock_user(vec[i].iov_base, base, copy ? vec[i].iov_len : 0);
1461 }
pbrook53a59602006-03-25 19:31:22 +00001462 }
1463 unlock_user (target_vec, target_addr, 0);
bellard579a97f2007-11-11 14:26:47 +00001464
1465 return 0;
pbrook53a59602006-03-25 19:31:22 +00001466}
1467
ths0da46a62007-10-20 20:23:07 +00001468/* do_socket() Must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +00001469static abi_long do_socket(int domain, int type, int protocol)
bellard3532fa72006-06-24 15:06:03 +00001470{
1471#if defined(TARGET_MIPS)
1472 switch(type) {
1473 case TARGET_SOCK_DGRAM:
1474 type = SOCK_DGRAM;
1475 break;
1476 case TARGET_SOCK_STREAM:
1477 type = SOCK_STREAM;
1478 break;
1479 case TARGET_SOCK_RAW:
1480 type = SOCK_RAW;
1481 break;
1482 case TARGET_SOCK_RDM:
1483 type = SOCK_RDM;
1484 break;
1485 case TARGET_SOCK_SEQPACKET:
1486 type = SOCK_SEQPACKET;
1487 break;
1488 case TARGET_SOCK_PACKET:
1489 type = SOCK_PACKET;
1490 break;
1491 }
1492#endif
balrog12bc92a2007-10-30 21:06:14 +00001493 if (domain == PF_NETLINK)
1494 return -EAFNOSUPPORT; /* do not NETLINK socket connections possible */
bellard3532fa72006-06-24 15:06:03 +00001495 return get_errno(socket(domain, type, protocol));
1496}
1497
ths0da46a62007-10-20 20:23:07 +00001498/* do_bind() Must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +00001499static abi_long do_bind(int sockfd, abi_ulong target_addr,
1500 socklen_t addrlen)
bellard3532fa72006-06-24 15:06:03 +00001501{
aurel328f7aeaf2009-01-30 19:47:57 +00001502 void *addr;
Arnaud Patard917507b2009-06-19 10:44:45 +03001503 abi_long ret;
aurel328f7aeaf2009-01-30 19:47:57 +00001504
aurel32be09ac42009-04-15 16:12:06 +00001505 if (addrlen < 0)
aurel328f7aeaf2009-01-30 19:47:57 +00001506 return -TARGET_EINVAL;
1507
aurel32607175e2009-04-15 16:11:59 +00001508 addr = alloca(addrlen+1);
ths3b46e622007-09-17 08:09:54 +00001509
Arnaud Patard917507b2009-06-19 10:44:45 +03001510 ret = target_to_host_sockaddr(addr, target_addr, addrlen);
1511 if (ret)
1512 return ret;
1513
bellard3532fa72006-06-24 15:06:03 +00001514 return get_errno(bind(sockfd, addr, addrlen));
1515}
1516
ths0da46a62007-10-20 20:23:07 +00001517/* do_connect() Must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +00001518static abi_long do_connect(int sockfd, abi_ulong target_addr,
1519 socklen_t addrlen)
bellard3532fa72006-06-24 15:06:03 +00001520{
aurel328f7aeaf2009-01-30 19:47:57 +00001521 void *addr;
Arnaud Patard917507b2009-06-19 10:44:45 +03001522 abi_long ret;
aurel328f7aeaf2009-01-30 19:47:57 +00001523
aurel32be09ac42009-04-15 16:12:06 +00001524 if (addrlen < 0)
aurel328f7aeaf2009-01-30 19:47:57 +00001525 return -TARGET_EINVAL;
1526
1527 addr = alloca(addrlen);
ths3b46e622007-09-17 08:09:54 +00001528
Arnaud Patard917507b2009-06-19 10:44:45 +03001529 ret = target_to_host_sockaddr(addr, target_addr, addrlen);
1530 if (ret)
1531 return ret;
1532
bellard3532fa72006-06-24 15:06:03 +00001533 return get_errno(connect(sockfd, addr, addrlen));
1534}
1535
ths0da46a62007-10-20 20:23:07 +00001536/* do_sendrecvmsg() Must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +00001537static abi_long do_sendrecvmsg(int fd, abi_ulong target_msg,
1538 int flags, int send)
bellard3532fa72006-06-24 15:06:03 +00001539{
balrog6de645c2008-10-28 10:26:29 +00001540 abi_long ret, len;
bellard3532fa72006-06-24 15:06:03 +00001541 struct target_msghdr *msgp;
1542 struct msghdr msg;
1543 int count;
1544 struct iovec *vec;
blueswir1992f48a2007-10-14 16:27:31 +00001545 abi_ulong target_vec;
bellard3532fa72006-06-24 15:06:03 +00001546
bellard579a97f2007-11-11 14:26:47 +00001547 /* FIXME */
1548 if (!lock_user_struct(send ? VERIFY_READ : VERIFY_WRITE,
1549 msgp,
1550 target_msg,
1551 send ? 1 : 0))
1552 return -TARGET_EFAULT;
bellard3532fa72006-06-24 15:06:03 +00001553 if (msgp->msg_name) {
1554 msg.msg_namelen = tswap32(msgp->msg_namelen);
1555 msg.msg_name = alloca(msg.msg_namelen);
Arnaud Patard917507b2009-06-19 10:44:45 +03001556 ret = target_to_host_sockaddr(msg.msg_name, tswapl(msgp->msg_name),
bellard3532fa72006-06-24 15:06:03 +00001557 msg.msg_namelen);
Arnaud Patard917507b2009-06-19 10:44:45 +03001558 if (ret) {
1559 unlock_user_struct(msgp, target_msg, send ? 0 : 1);
1560 return ret;
1561 }
bellard3532fa72006-06-24 15:06:03 +00001562 } else {
1563 msg.msg_name = NULL;
1564 msg.msg_namelen = 0;
1565 }
1566 msg.msg_controllen = 2 * tswapl(msgp->msg_controllen);
1567 msg.msg_control = alloca(msg.msg_controllen);
1568 msg.msg_flags = tswap32(msgp->msg_flags);
ths3b46e622007-09-17 08:09:54 +00001569
bellard3532fa72006-06-24 15:06:03 +00001570 count = tswapl(msgp->msg_iovlen);
1571 vec = alloca(count * sizeof(struct iovec));
1572 target_vec = tswapl(msgp->msg_iov);
bellard579a97f2007-11-11 14:26:47 +00001573 lock_iovec(send ? VERIFY_READ : VERIFY_WRITE, vec, target_vec, count, send);
bellard3532fa72006-06-24 15:06:03 +00001574 msg.msg_iovlen = count;
1575 msg.msg_iov = vec;
ths3b46e622007-09-17 08:09:54 +00001576
bellard3532fa72006-06-24 15:06:03 +00001577 if (send) {
bellard5a4a8982007-11-11 17:39:18 +00001578 ret = target_to_host_cmsg(&msg, msgp);
1579 if (ret == 0)
1580 ret = get_errno(sendmsg(fd, &msg, flags));
bellard3532fa72006-06-24 15:06:03 +00001581 } else {
1582 ret = get_errno(recvmsg(fd, &msg, flags));
balrog6de645c2008-10-28 10:26:29 +00001583 if (!is_error(ret)) {
1584 len = ret;
bellard5a4a8982007-11-11 17:39:18 +00001585 ret = host_to_target_cmsg(msgp, &msg);
balrog6de645c2008-10-28 10:26:29 +00001586 if (!is_error(ret))
1587 ret = len;
1588 }
bellard3532fa72006-06-24 15:06:03 +00001589 }
1590 unlock_iovec(vec, target_vec, count, !send);
bellard579a97f2007-11-11 14:26:47 +00001591 unlock_user_struct(msgp, target_msg, send ? 0 : 1);
bellard3532fa72006-06-24 15:06:03 +00001592 return ret;
1593}
1594
ths0da46a62007-10-20 20:23:07 +00001595/* do_accept() Must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +00001596static abi_long do_accept(int fd, abi_ulong target_addr,
bellard2f619692007-11-16 10:46:05 +00001597 abi_ulong target_addrlen_addr)
pbrook1be9e1d2006-11-19 15:26:04 +00001598{
bellard2f619692007-11-16 10:46:05 +00001599 socklen_t addrlen;
1600 void *addr;
blueswir1992f48a2007-10-14 16:27:31 +00001601 abi_long ret;
pbrook1be9e1d2006-11-19 15:26:04 +00001602
Arnaud Patard917507b2009-06-19 10:44:45 +03001603 if (target_addr == 0)
1604 return get_errno(accept(fd, NULL, NULL));
1605
1606 /* linux returns EINVAL if addrlen pointer is invalid */
bellard2f619692007-11-16 10:46:05 +00001607 if (get_user_u32(addrlen, target_addrlen_addr))
Arnaud Patard917507b2009-06-19 10:44:45 +03001608 return -TARGET_EINVAL;
bellard2f619692007-11-16 10:46:05 +00001609
aurel32be09ac42009-04-15 16:12:06 +00001610 if (addrlen < 0)
aurel328f7aeaf2009-01-30 19:47:57 +00001611 return -TARGET_EINVAL;
1612
Arnaud Patard917507b2009-06-19 10:44:45 +03001613 if (!access_ok(VERIFY_WRITE, target_addr, addrlen))
1614 return -TARGET_EINVAL;
1615
bellard2f619692007-11-16 10:46:05 +00001616 addr = alloca(addrlen);
1617
pbrook1be9e1d2006-11-19 15:26:04 +00001618 ret = get_errno(accept(fd, addr, &addrlen));
1619 if (!is_error(ret)) {
1620 host_to_target_sockaddr(target_addr, addr, addrlen);
bellard2f619692007-11-16 10:46:05 +00001621 if (put_user_u32(addrlen, target_addrlen_addr))
1622 ret = -TARGET_EFAULT;
pbrook1be9e1d2006-11-19 15:26:04 +00001623 }
1624 return ret;
1625}
1626
ths0da46a62007-10-20 20:23:07 +00001627/* do_getpeername() Must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +00001628static abi_long do_getpeername(int fd, abi_ulong target_addr,
bellard2f619692007-11-16 10:46:05 +00001629 abi_ulong target_addrlen_addr)
pbrook1be9e1d2006-11-19 15:26:04 +00001630{
bellard2f619692007-11-16 10:46:05 +00001631 socklen_t addrlen;
1632 void *addr;
blueswir1992f48a2007-10-14 16:27:31 +00001633 abi_long ret;
pbrook1be9e1d2006-11-19 15:26:04 +00001634
bellard2f619692007-11-16 10:46:05 +00001635 if (get_user_u32(addrlen, target_addrlen_addr))
1636 return -TARGET_EFAULT;
1637
aurel32be09ac42009-04-15 16:12:06 +00001638 if (addrlen < 0)
aurel328f7aeaf2009-01-30 19:47:57 +00001639 return -TARGET_EINVAL;
1640
Arnaud Patard917507b2009-06-19 10:44:45 +03001641 if (!access_ok(VERIFY_WRITE, target_addr, addrlen))
1642 return -TARGET_EFAULT;
1643
bellard2f619692007-11-16 10:46:05 +00001644 addr = alloca(addrlen);
1645
pbrook1be9e1d2006-11-19 15:26:04 +00001646 ret = get_errno(getpeername(fd, addr, &addrlen));
1647 if (!is_error(ret)) {
1648 host_to_target_sockaddr(target_addr, addr, addrlen);
bellard2f619692007-11-16 10:46:05 +00001649 if (put_user_u32(addrlen, target_addrlen_addr))
1650 ret = -TARGET_EFAULT;
pbrook1be9e1d2006-11-19 15:26:04 +00001651 }
1652 return ret;
1653}
1654
ths0da46a62007-10-20 20:23:07 +00001655/* do_getsockname() Must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +00001656static abi_long do_getsockname(int fd, abi_ulong target_addr,
bellard2f619692007-11-16 10:46:05 +00001657 abi_ulong target_addrlen_addr)
pbrook1be9e1d2006-11-19 15:26:04 +00001658{
bellard2f619692007-11-16 10:46:05 +00001659 socklen_t addrlen;
1660 void *addr;
blueswir1992f48a2007-10-14 16:27:31 +00001661 abi_long ret;
pbrook1be9e1d2006-11-19 15:26:04 +00001662
bellard2f619692007-11-16 10:46:05 +00001663 if (get_user_u32(addrlen, target_addrlen_addr))
1664 return -TARGET_EFAULT;
1665
aurel32be09ac42009-04-15 16:12:06 +00001666 if (addrlen < 0)
aurel328f7aeaf2009-01-30 19:47:57 +00001667 return -TARGET_EINVAL;
1668
Arnaud Patard917507b2009-06-19 10:44:45 +03001669 if (!access_ok(VERIFY_WRITE, target_addr, addrlen))
1670 return -TARGET_EFAULT;
1671
bellard2f619692007-11-16 10:46:05 +00001672 addr = alloca(addrlen);
1673
pbrook1be9e1d2006-11-19 15:26:04 +00001674 ret = get_errno(getsockname(fd, addr, &addrlen));
1675 if (!is_error(ret)) {
1676 host_to_target_sockaddr(target_addr, addr, addrlen);
bellard2f619692007-11-16 10:46:05 +00001677 if (put_user_u32(addrlen, target_addrlen_addr))
1678 ret = -TARGET_EFAULT;
pbrook1be9e1d2006-11-19 15:26:04 +00001679 }
1680 return ret;
1681}
1682
ths0da46a62007-10-20 20:23:07 +00001683/* do_socketpair() Must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +00001684static abi_long do_socketpair(int domain, int type, int protocol,
bellard2f619692007-11-16 10:46:05 +00001685 abi_ulong target_tab_addr)
pbrook1be9e1d2006-11-19 15:26:04 +00001686{
1687 int tab[2];
blueswir1992f48a2007-10-14 16:27:31 +00001688 abi_long ret;
pbrook1be9e1d2006-11-19 15:26:04 +00001689
1690 ret = get_errno(socketpair(domain, type, protocol, tab));
1691 if (!is_error(ret)) {
bellard2f619692007-11-16 10:46:05 +00001692 if (put_user_s32(tab[0], target_tab_addr)
1693 || put_user_s32(tab[1], target_tab_addr + sizeof(tab[0])))
1694 ret = -TARGET_EFAULT;
pbrook1be9e1d2006-11-19 15:26:04 +00001695 }
1696 return ret;
1697}
1698
ths0da46a62007-10-20 20:23:07 +00001699/* do_sendto() Must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +00001700static abi_long do_sendto(int fd, abi_ulong msg, size_t len, int flags,
1701 abi_ulong target_addr, socklen_t addrlen)
pbrook1be9e1d2006-11-19 15:26:04 +00001702{
1703 void *addr;
1704 void *host_msg;
blueswir1992f48a2007-10-14 16:27:31 +00001705 abi_long ret;
pbrook1be9e1d2006-11-19 15:26:04 +00001706
aurel32be09ac42009-04-15 16:12:06 +00001707 if (addrlen < 0)
aurel328f7aeaf2009-01-30 19:47:57 +00001708 return -TARGET_EINVAL;
1709
bellard579a97f2007-11-11 14:26:47 +00001710 host_msg = lock_user(VERIFY_READ, msg, len, 1);
1711 if (!host_msg)
1712 return -TARGET_EFAULT;
pbrook1be9e1d2006-11-19 15:26:04 +00001713 if (target_addr) {
1714 addr = alloca(addrlen);
Arnaud Patard917507b2009-06-19 10:44:45 +03001715 ret = target_to_host_sockaddr(addr, target_addr, addrlen);
1716 if (ret) {
1717 unlock_user(host_msg, msg, 0);
1718 return ret;
1719 }
pbrook1be9e1d2006-11-19 15:26:04 +00001720 ret = get_errno(sendto(fd, host_msg, len, flags, addr, addrlen));
1721 } else {
1722 ret = get_errno(send(fd, host_msg, len, flags));
1723 }
1724 unlock_user(host_msg, msg, 0);
1725 return ret;
1726}
1727
ths0da46a62007-10-20 20:23:07 +00001728/* do_recvfrom() Must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +00001729static abi_long do_recvfrom(int fd, abi_ulong msg, size_t len, int flags,
1730 abi_ulong target_addr,
1731 abi_ulong target_addrlen)
pbrook1be9e1d2006-11-19 15:26:04 +00001732{
1733 socklen_t addrlen;
1734 void *addr;
1735 void *host_msg;
blueswir1992f48a2007-10-14 16:27:31 +00001736 abi_long ret;
pbrook1be9e1d2006-11-19 15:26:04 +00001737
bellard579a97f2007-11-11 14:26:47 +00001738 host_msg = lock_user(VERIFY_WRITE, msg, len, 0);
1739 if (!host_msg)
1740 return -TARGET_EFAULT;
pbrook1be9e1d2006-11-19 15:26:04 +00001741 if (target_addr) {
bellard2f619692007-11-16 10:46:05 +00001742 if (get_user_u32(addrlen, target_addrlen)) {
1743 ret = -TARGET_EFAULT;
1744 goto fail;
1745 }
aurel32be09ac42009-04-15 16:12:06 +00001746 if (addrlen < 0) {
aurel328f7aeaf2009-01-30 19:47:57 +00001747 ret = -TARGET_EINVAL;
1748 goto fail;
1749 }
pbrook1be9e1d2006-11-19 15:26:04 +00001750 addr = alloca(addrlen);
1751 ret = get_errno(recvfrom(fd, host_msg, len, flags, addr, &addrlen));
1752 } else {
1753 addr = NULL; /* To keep compiler quiet. */
1754 ret = get_errno(recv(fd, host_msg, len, flags));
1755 }
1756 if (!is_error(ret)) {
1757 if (target_addr) {
1758 host_to_target_sockaddr(target_addr, addr, addrlen);
bellard2f619692007-11-16 10:46:05 +00001759 if (put_user_u32(addrlen, target_addrlen)) {
1760 ret = -TARGET_EFAULT;
1761 goto fail;
1762 }
pbrook1be9e1d2006-11-19 15:26:04 +00001763 }
1764 unlock_user(host_msg, msg, len);
1765 } else {
bellard2f619692007-11-16 10:46:05 +00001766fail:
pbrook1be9e1d2006-11-19 15:26:04 +00001767 unlock_user(host_msg, msg, 0);
1768 }
1769 return ret;
1770}
1771
j_mayer32407102007-09-26 23:01:49 +00001772#ifdef TARGET_NR_socketcall
ths0da46a62007-10-20 20:23:07 +00001773/* do_socketcall() Must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +00001774static abi_long do_socketcall(int num, abi_ulong vptr)
bellard31e31b82003-02-18 22:55:36 +00001775{
blueswir1992f48a2007-10-14 16:27:31 +00001776 abi_long ret;
1777 const int n = sizeof(abi_ulong);
bellard31e31b82003-02-18 22:55:36 +00001778
1779 switch(num) {
1780 case SOCKOP_socket:
bellard7854b052003-03-29 17:22:23 +00001781 {
Ulrich Hecht98818182009-07-03 17:09:28 +02001782 abi_ulong domain, type, protocol;
bellard2f619692007-11-16 10:46:05 +00001783
Ulrich Hecht98818182009-07-03 17:09:28 +02001784 if (get_user_ual(domain, vptr)
1785 || get_user_ual(type, vptr + n)
1786 || get_user_ual(protocol, vptr + 2 * n))
bellard2f619692007-11-16 10:46:05 +00001787 return -TARGET_EFAULT;
1788
bellard3532fa72006-06-24 15:06:03 +00001789 ret = do_socket(domain, type, protocol);
bellard7854b052003-03-29 17:22:23 +00001790 }
bellard31e31b82003-02-18 22:55:36 +00001791 break;
1792 case SOCKOP_bind:
bellard7854b052003-03-29 17:22:23 +00001793 {
Ulrich Hecht98818182009-07-03 17:09:28 +02001794 abi_ulong sockfd;
bellard2f619692007-11-16 10:46:05 +00001795 abi_ulong target_addr;
1796 socklen_t addrlen;
1797
Ulrich Hecht98818182009-07-03 17:09:28 +02001798 if (get_user_ual(sockfd, vptr)
bellard2f619692007-11-16 10:46:05 +00001799 || get_user_ual(target_addr, vptr + n)
Ulrich Hecht98818182009-07-03 17:09:28 +02001800 || get_user_ual(addrlen, vptr + 2 * n))
bellard2f619692007-11-16 10:46:05 +00001801 return -TARGET_EFAULT;
1802
bellard3532fa72006-06-24 15:06:03 +00001803 ret = do_bind(sockfd, target_addr, addrlen);
bellard7854b052003-03-29 17:22:23 +00001804 }
bellard31e31b82003-02-18 22:55:36 +00001805 break;
1806 case SOCKOP_connect:
bellard7854b052003-03-29 17:22:23 +00001807 {
Ulrich Hecht98818182009-07-03 17:09:28 +02001808 abi_ulong sockfd;
bellard2f619692007-11-16 10:46:05 +00001809 abi_ulong target_addr;
1810 socklen_t addrlen;
1811
Ulrich Hecht98818182009-07-03 17:09:28 +02001812 if (get_user_ual(sockfd, vptr)
bellard2f619692007-11-16 10:46:05 +00001813 || get_user_ual(target_addr, vptr + n)
Ulrich Hecht98818182009-07-03 17:09:28 +02001814 || get_user_ual(addrlen, vptr + 2 * n))
bellard2f619692007-11-16 10:46:05 +00001815 return -TARGET_EFAULT;
1816
bellard3532fa72006-06-24 15:06:03 +00001817 ret = do_connect(sockfd, target_addr, addrlen);
bellard7854b052003-03-29 17:22:23 +00001818 }
bellard31e31b82003-02-18 22:55:36 +00001819 break;
1820 case SOCKOP_listen:
bellard7854b052003-03-29 17:22:23 +00001821 {
Ulrich Hecht98818182009-07-03 17:09:28 +02001822 abi_ulong sockfd, backlog;
bellard2f619692007-11-16 10:46:05 +00001823
Ulrich Hecht98818182009-07-03 17:09:28 +02001824 if (get_user_ual(sockfd, vptr)
1825 || get_user_ual(backlog, vptr + n))
bellard2f619692007-11-16 10:46:05 +00001826 return -TARGET_EFAULT;
1827
bellard7854b052003-03-29 17:22:23 +00001828 ret = get_errno(listen(sockfd, backlog));
1829 }
bellard31e31b82003-02-18 22:55:36 +00001830 break;
1831 case SOCKOP_accept:
1832 {
Ulrich Hecht98818182009-07-03 17:09:28 +02001833 abi_ulong sockfd;
bellard2f619692007-11-16 10:46:05 +00001834 abi_ulong target_addr, target_addrlen;
1835
Ulrich Hecht98818182009-07-03 17:09:28 +02001836 if (get_user_ual(sockfd, vptr)
bellard2f619692007-11-16 10:46:05 +00001837 || get_user_ual(target_addr, vptr + n)
Ulrich Hecht98818182009-07-03 17:09:28 +02001838 || get_user_ual(target_addrlen, vptr + 2 * n))
bellard2f619692007-11-16 10:46:05 +00001839 return -TARGET_EFAULT;
1840
pbrook1be9e1d2006-11-19 15:26:04 +00001841 ret = do_accept(sockfd, target_addr, target_addrlen);
bellard31e31b82003-02-18 22:55:36 +00001842 }
1843 break;
1844 case SOCKOP_getsockname:
1845 {
Ulrich Hecht98818182009-07-03 17:09:28 +02001846 abi_ulong sockfd;
bellard2f619692007-11-16 10:46:05 +00001847 abi_ulong target_addr, target_addrlen;
1848
Ulrich Hecht98818182009-07-03 17:09:28 +02001849 if (get_user_ual(sockfd, vptr)
bellard2f619692007-11-16 10:46:05 +00001850 || get_user_ual(target_addr, vptr + n)
Ulrich Hecht98818182009-07-03 17:09:28 +02001851 || get_user_ual(target_addrlen, vptr + 2 * n))
bellard2f619692007-11-16 10:46:05 +00001852 return -TARGET_EFAULT;
1853
pbrook1be9e1d2006-11-19 15:26:04 +00001854 ret = do_getsockname(sockfd, target_addr, target_addrlen);
bellard31e31b82003-02-18 22:55:36 +00001855 }
1856 break;
1857 case SOCKOP_getpeername:
1858 {
Ulrich Hecht98818182009-07-03 17:09:28 +02001859 abi_ulong sockfd;
bellard2f619692007-11-16 10:46:05 +00001860 abi_ulong target_addr, target_addrlen;
1861
Ulrich Hecht98818182009-07-03 17:09:28 +02001862 if (get_user_ual(sockfd, vptr)
bellard2f619692007-11-16 10:46:05 +00001863 || get_user_ual(target_addr, vptr + n)
Ulrich Hecht98818182009-07-03 17:09:28 +02001864 || get_user_ual(target_addrlen, vptr + 2 * n))
bellard2f619692007-11-16 10:46:05 +00001865 return -TARGET_EFAULT;
1866
pbrook1be9e1d2006-11-19 15:26:04 +00001867 ret = do_getpeername(sockfd, target_addr, target_addrlen);
bellard31e31b82003-02-18 22:55:36 +00001868 }
1869 break;
1870 case SOCKOP_socketpair:
1871 {
Ulrich Hecht98818182009-07-03 17:09:28 +02001872 abi_ulong domain, type, protocol;
bellard2f619692007-11-16 10:46:05 +00001873 abi_ulong tab;
1874
Ulrich Hecht98818182009-07-03 17:09:28 +02001875 if (get_user_ual(domain, vptr)
1876 || get_user_ual(type, vptr + n)
1877 || get_user_ual(protocol, vptr + 2 * n)
bellard2f619692007-11-16 10:46:05 +00001878 || get_user_ual(tab, vptr + 3 * n))
1879 return -TARGET_EFAULT;
1880
pbrook1be9e1d2006-11-19 15:26:04 +00001881 ret = do_socketpair(domain, type, protocol, tab);
bellard31e31b82003-02-18 22:55:36 +00001882 }
1883 break;
1884 case SOCKOP_send:
bellard7854b052003-03-29 17:22:23 +00001885 {
Ulrich Hecht98818182009-07-03 17:09:28 +02001886 abi_ulong sockfd;
bellard2f619692007-11-16 10:46:05 +00001887 abi_ulong msg;
1888 size_t len;
Ulrich Hecht98818182009-07-03 17:09:28 +02001889 abi_ulong flags;
bellard2f619692007-11-16 10:46:05 +00001890
Ulrich Hecht98818182009-07-03 17:09:28 +02001891 if (get_user_ual(sockfd, vptr)
bellard2f619692007-11-16 10:46:05 +00001892 || get_user_ual(msg, vptr + n)
1893 || get_user_ual(len, vptr + 2 * n)
Ulrich Hecht98818182009-07-03 17:09:28 +02001894 || get_user_ual(flags, vptr + 3 * n))
bellard2f619692007-11-16 10:46:05 +00001895 return -TARGET_EFAULT;
1896
pbrook1be9e1d2006-11-19 15:26:04 +00001897 ret = do_sendto(sockfd, msg, len, flags, 0, 0);
bellard7854b052003-03-29 17:22:23 +00001898 }
bellard31e31b82003-02-18 22:55:36 +00001899 break;
1900 case SOCKOP_recv:
bellard7854b052003-03-29 17:22:23 +00001901 {
Ulrich Hecht98818182009-07-03 17:09:28 +02001902 abi_ulong sockfd;
bellard2f619692007-11-16 10:46:05 +00001903 abi_ulong msg;
1904 size_t len;
Ulrich Hecht98818182009-07-03 17:09:28 +02001905 abi_ulong flags;
bellard2f619692007-11-16 10:46:05 +00001906
Ulrich Hecht98818182009-07-03 17:09:28 +02001907 if (get_user_ual(sockfd, vptr)
bellard2f619692007-11-16 10:46:05 +00001908 || get_user_ual(msg, vptr + n)
1909 || get_user_ual(len, vptr + 2 * n)
Ulrich Hecht98818182009-07-03 17:09:28 +02001910 || get_user_ual(flags, vptr + 3 * n))
bellard2f619692007-11-16 10:46:05 +00001911 return -TARGET_EFAULT;
1912
pbrook1be9e1d2006-11-19 15:26:04 +00001913 ret = do_recvfrom(sockfd, msg, len, flags, 0, 0);
bellard7854b052003-03-29 17:22:23 +00001914 }
bellard31e31b82003-02-18 22:55:36 +00001915 break;
1916 case SOCKOP_sendto:
bellard7854b052003-03-29 17:22:23 +00001917 {
Ulrich Hecht98818182009-07-03 17:09:28 +02001918 abi_ulong sockfd;
bellard2f619692007-11-16 10:46:05 +00001919 abi_ulong msg;
1920 size_t len;
Ulrich Hecht98818182009-07-03 17:09:28 +02001921 abi_ulong flags;
bellard2f619692007-11-16 10:46:05 +00001922 abi_ulong addr;
1923 socklen_t addrlen;
1924
Ulrich Hecht98818182009-07-03 17:09:28 +02001925 if (get_user_ual(sockfd, vptr)
bellard2f619692007-11-16 10:46:05 +00001926 || get_user_ual(msg, vptr + n)
1927 || get_user_ual(len, vptr + 2 * n)
Ulrich Hecht98818182009-07-03 17:09:28 +02001928 || get_user_ual(flags, vptr + 3 * n)
bellard2f619692007-11-16 10:46:05 +00001929 || get_user_ual(addr, vptr + 4 * n)
Ulrich Hecht98818182009-07-03 17:09:28 +02001930 || get_user_ual(addrlen, vptr + 5 * n))
bellard2f619692007-11-16 10:46:05 +00001931 return -TARGET_EFAULT;
1932
pbrook1be9e1d2006-11-19 15:26:04 +00001933 ret = do_sendto(sockfd, msg, len, flags, addr, addrlen);
bellard7854b052003-03-29 17:22:23 +00001934 }
bellard31e31b82003-02-18 22:55:36 +00001935 break;
1936 case SOCKOP_recvfrom:
1937 {
Ulrich Hecht98818182009-07-03 17:09:28 +02001938 abi_ulong sockfd;
bellard2f619692007-11-16 10:46:05 +00001939 abi_ulong msg;
1940 size_t len;
Ulrich Hecht98818182009-07-03 17:09:28 +02001941 abi_ulong flags;
bellard2f619692007-11-16 10:46:05 +00001942 abi_ulong addr;
1943 socklen_t addrlen;
1944
Ulrich Hecht98818182009-07-03 17:09:28 +02001945 if (get_user_ual(sockfd, vptr)
bellard2f619692007-11-16 10:46:05 +00001946 || get_user_ual(msg, vptr + n)
1947 || get_user_ual(len, vptr + 2 * n)
Ulrich Hecht98818182009-07-03 17:09:28 +02001948 || get_user_ual(flags, vptr + 3 * n)
bellard2f619692007-11-16 10:46:05 +00001949 || get_user_ual(addr, vptr + 4 * n)
Ulrich Hecht98818182009-07-03 17:09:28 +02001950 || get_user_ual(addrlen, vptr + 5 * n))
bellard2f619692007-11-16 10:46:05 +00001951 return -TARGET_EFAULT;
1952
pbrook1be9e1d2006-11-19 15:26:04 +00001953 ret = do_recvfrom(sockfd, msg, len, flags, addr, addrlen);
bellard31e31b82003-02-18 22:55:36 +00001954 }
1955 break;
1956 case SOCKOP_shutdown:
bellard7854b052003-03-29 17:22:23 +00001957 {
Ulrich Hecht98818182009-07-03 17:09:28 +02001958 abi_ulong sockfd, how;
bellard2f619692007-11-16 10:46:05 +00001959
Ulrich Hecht98818182009-07-03 17:09:28 +02001960 if (get_user_ual(sockfd, vptr)
1961 || get_user_ual(how, vptr + n))
bellard2f619692007-11-16 10:46:05 +00001962 return -TARGET_EFAULT;
bellard7854b052003-03-29 17:22:23 +00001963
1964 ret = get_errno(shutdown(sockfd, how));
1965 }
bellard31e31b82003-02-18 22:55:36 +00001966 break;
1967 case SOCKOP_sendmsg:
1968 case SOCKOP_recvmsg:
bellard1a9353d2003-03-16 20:28:50 +00001969 {
Ulrich Hecht98818182009-07-03 17:09:28 +02001970 abi_ulong fd;
blueswir1992f48a2007-10-14 16:27:31 +00001971 abi_ulong target_msg;
Ulrich Hecht98818182009-07-03 17:09:28 +02001972 abi_ulong flags;
bellard1a9353d2003-03-16 20:28:50 +00001973
Ulrich Hecht98818182009-07-03 17:09:28 +02001974 if (get_user_ual(fd, vptr)
bellard2f619692007-11-16 10:46:05 +00001975 || get_user_ual(target_msg, vptr + n)
Ulrich Hecht98818182009-07-03 17:09:28 +02001976 || get_user_ual(flags, vptr + 2 * n))
bellard2f619692007-11-16 10:46:05 +00001977 return -TARGET_EFAULT;
bellard3532fa72006-06-24 15:06:03 +00001978
ths5fafdf22007-09-16 21:08:06 +00001979 ret = do_sendrecvmsg(fd, target_msg, flags,
bellard3532fa72006-06-24 15:06:03 +00001980 (num == SOCKOP_sendmsg));
bellard1a9353d2003-03-16 20:28:50 +00001981 }
1982 break;
bellard31e31b82003-02-18 22:55:36 +00001983 case SOCKOP_setsockopt:
bellard7854b052003-03-29 17:22:23 +00001984 {
Ulrich Hecht98818182009-07-03 17:09:28 +02001985 abi_ulong sockfd;
1986 abi_ulong level;
1987 abi_ulong optname;
bellard2f619692007-11-16 10:46:05 +00001988 abi_ulong optval;
1989 socklen_t optlen;
1990
Ulrich Hecht98818182009-07-03 17:09:28 +02001991 if (get_user_ual(sockfd, vptr)
1992 || get_user_ual(level, vptr + n)
1993 || get_user_ual(optname, vptr + 2 * n)
bellard2f619692007-11-16 10:46:05 +00001994 || get_user_ual(optval, vptr + 3 * n)
Ulrich Hecht98818182009-07-03 17:09:28 +02001995 || get_user_ual(optlen, vptr + 4 * n))
bellard2f619692007-11-16 10:46:05 +00001996 return -TARGET_EFAULT;
bellard7854b052003-03-29 17:22:23 +00001997
1998 ret = do_setsockopt(sockfd, level, optname, optval, optlen);
1999 }
2000 break;
bellard31e31b82003-02-18 22:55:36 +00002001 case SOCKOP_getsockopt:
bellard7854b052003-03-29 17:22:23 +00002002 {
Ulrich Hecht98818182009-07-03 17:09:28 +02002003 abi_ulong sockfd;
2004 abi_ulong level;
2005 abi_ulong optname;
bellard2f619692007-11-16 10:46:05 +00002006 abi_ulong optval;
2007 socklen_t optlen;
bellard7854b052003-03-29 17:22:23 +00002008
Ulrich Hecht98818182009-07-03 17:09:28 +02002009 if (get_user_ual(sockfd, vptr)
2010 || get_user_ual(level, vptr + n)
2011 || get_user_ual(optname, vptr + 2 * n)
bellard2f619692007-11-16 10:46:05 +00002012 || get_user_ual(optval, vptr + 3 * n)
Ulrich Hecht98818182009-07-03 17:09:28 +02002013 || get_user_ual(optlen, vptr + 4 * n))
bellard2f619692007-11-16 10:46:05 +00002014 return -TARGET_EFAULT;
2015
2016 ret = do_getsockopt(sockfd, level, optname, optval, optlen);
bellard7854b052003-03-29 17:22:23 +00002017 }
2018 break;
bellard31e31b82003-02-18 22:55:36 +00002019 default:
2020 gemu_log("Unsupported socketcall: %d\n", num);
ths0da46a62007-10-20 20:23:07 +00002021 ret = -TARGET_ENOSYS;
bellard31e31b82003-02-18 22:55:36 +00002022 break;
2023 }
2024 return ret;
2025}
j_mayer32407102007-09-26 23:01:49 +00002026#endif
bellard31e31b82003-02-18 22:55:36 +00002027
bellard8853f862004-02-22 14:57:26 +00002028#define N_SHM_REGIONS 32
2029
2030static struct shm_region {
bellard5a4a8982007-11-11 17:39:18 +00002031 abi_ulong start;
2032 abi_ulong size;
bellard8853f862004-02-22 14:57:26 +00002033} shm_regions[N_SHM_REGIONS];
2034
ths3eb6b042007-06-03 14:26:27 +00002035struct target_ipc_perm
2036{
blueswir1992f48a2007-10-14 16:27:31 +00002037 abi_long __key;
2038 abi_ulong uid;
2039 abi_ulong gid;
2040 abi_ulong cuid;
2041 abi_ulong cgid;
ths3eb6b042007-06-03 14:26:27 +00002042 unsigned short int mode;
2043 unsigned short int __pad1;
2044 unsigned short int __seq;
2045 unsigned short int __pad2;
blueswir1992f48a2007-10-14 16:27:31 +00002046 abi_ulong __unused1;
2047 abi_ulong __unused2;
ths3eb6b042007-06-03 14:26:27 +00002048};
2049
2050struct target_semid_ds
2051{
2052 struct target_ipc_perm sem_perm;
blueswir1992f48a2007-10-14 16:27:31 +00002053 abi_ulong sem_otime;
2054 abi_ulong __unused1;
2055 abi_ulong sem_ctime;
2056 abi_ulong __unused2;
2057 abi_ulong sem_nsems;
2058 abi_ulong __unused3;
2059 abi_ulong __unused4;
ths3eb6b042007-06-03 14:26:27 +00002060};
2061
bellard579a97f2007-11-11 14:26:47 +00002062static inline abi_long target_to_host_ipc_perm(struct ipc_perm *host_ip,
2063 abi_ulong target_addr)
ths3eb6b042007-06-03 14:26:27 +00002064{
2065 struct target_ipc_perm *target_ip;
2066 struct target_semid_ds *target_sd;
2067
bellard579a97f2007-11-11 14:26:47 +00002068 if (!lock_user_struct(VERIFY_READ, target_sd, target_addr, 1))
2069 return -TARGET_EFAULT;
ths3eb6b042007-06-03 14:26:27 +00002070 target_ip=&(target_sd->sem_perm);
2071 host_ip->__key = tswapl(target_ip->__key);
2072 host_ip->uid = tswapl(target_ip->uid);
2073 host_ip->gid = tswapl(target_ip->gid);
2074 host_ip->cuid = tswapl(target_ip->cuid);
2075 host_ip->cgid = tswapl(target_ip->cgid);
2076 host_ip->mode = tswapl(target_ip->mode);
2077 unlock_user_struct(target_sd, target_addr, 0);
bellard579a97f2007-11-11 14:26:47 +00002078 return 0;
ths3eb6b042007-06-03 14:26:27 +00002079}
2080
bellard579a97f2007-11-11 14:26:47 +00002081static inline abi_long host_to_target_ipc_perm(abi_ulong target_addr,
2082 struct ipc_perm *host_ip)
ths3eb6b042007-06-03 14:26:27 +00002083{
2084 struct target_ipc_perm *target_ip;
2085 struct target_semid_ds *target_sd;
2086
bellard579a97f2007-11-11 14:26:47 +00002087 if (!lock_user_struct(VERIFY_WRITE, target_sd, target_addr, 0))
2088 return -TARGET_EFAULT;
ths3eb6b042007-06-03 14:26:27 +00002089 target_ip = &(target_sd->sem_perm);
2090 target_ip->__key = tswapl(host_ip->__key);
2091 target_ip->uid = tswapl(host_ip->uid);
2092 target_ip->gid = tswapl(host_ip->gid);
2093 target_ip->cuid = tswapl(host_ip->cuid);
2094 target_ip->cgid = tswapl(host_ip->cgid);
2095 target_ip->mode = tswapl(host_ip->mode);
2096 unlock_user_struct(target_sd, target_addr, 1);
bellard579a97f2007-11-11 14:26:47 +00002097 return 0;
ths3eb6b042007-06-03 14:26:27 +00002098}
2099
bellard579a97f2007-11-11 14:26:47 +00002100static inline abi_long target_to_host_semid_ds(struct semid_ds *host_sd,
2101 abi_ulong target_addr)
ths3eb6b042007-06-03 14:26:27 +00002102{
2103 struct target_semid_ds *target_sd;
2104
bellard579a97f2007-11-11 14:26:47 +00002105 if (!lock_user_struct(VERIFY_READ, target_sd, target_addr, 1))
2106 return -TARGET_EFAULT;
aurel32e5289082009-04-18 16:16:12 +00002107 if (target_to_host_ipc_perm(&(host_sd->sem_perm),target_addr))
2108 return -TARGET_EFAULT;
ths3eb6b042007-06-03 14:26:27 +00002109 host_sd->sem_nsems = tswapl(target_sd->sem_nsems);
2110 host_sd->sem_otime = tswapl(target_sd->sem_otime);
2111 host_sd->sem_ctime = tswapl(target_sd->sem_ctime);
2112 unlock_user_struct(target_sd, target_addr, 0);
bellard579a97f2007-11-11 14:26:47 +00002113 return 0;
ths3eb6b042007-06-03 14:26:27 +00002114}
2115
bellard579a97f2007-11-11 14:26:47 +00002116static inline abi_long host_to_target_semid_ds(abi_ulong target_addr,
2117 struct semid_ds *host_sd)
ths3eb6b042007-06-03 14:26:27 +00002118{
2119 struct target_semid_ds *target_sd;
2120
bellard579a97f2007-11-11 14:26:47 +00002121 if (!lock_user_struct(VERIFY_WRITE, target_sd, target_addr, 0))
2122 return -TARGET_EFAULT;
aurel32e5289082009-04-18 16:16:12 +00002123 if (host_to_target_ipc_perm(target_addr,&(host_sd->sem_perm)))
2124 return -TARGET_EFAULT;;
ths3eb6b042007-06-03 14:26:27 +00002125 target_sd->sem_nsems = tswapl(host_sd->sem_nsems);
2126 target_sd->sem_otime = tswapl(host_sd->sem_otime);
2127 target_sd->sem_ctime = tswapl(host_sd->sem_ctime);
2128 unlock_user_struct(target_sd, target_addr, 1);
bellard579a97f2007-11-11 14:26:47 +00002129 return 0;
ths3eb6b042007-06-03 14:26:27 +00002130}
2131
aurel32e5289082009-04-18 16:16:12 +00002132struct target_seminfo {
2133 int semmap;
2134 int semmni;
2135 int semmns;
2136 int semmnu;
2137 int semmsl;
2138 int semopm;
2139 int semume;
2140 int semusz;
2141 int semvmx;
2142 int semaem;
2143};
2144
2145static inline abi_long host_to_target_seminfo(abi_ulong target_addr,
2146 struct seminfo *host_seminfo)
2147{
2148 struct target_seminfo *target_seminfo;
2149 if (!lock_user_struct(VERIFY_WRITE, target_seminfo, target_addr, 0))
2150 return -TARGET_EFAULT;
2151 __put_user(host_seminfo->semmap, &target_seminfo->semmap);
2152 __put_user(host_seminfo->semmni, &target_seminfo->semmni);
2153 __put_user(host_seminfo->semmns, &target_seminfo->semmns);
2154 __put_user(host_seminfo->semmnu, &target_seminfo->semmnu);
2155 __put_user(host_seminfo->semmsl, &target_seminfo->semmsl);
2156 __put_user(host_seminfo->semopm, &target_seminfo->semopm);
2157 __put_user(host_seminfo->semume, &target_seminfo->semume);
2158 __put_user(host_seminfo->semusz, &target_seminfo->semusz);
2159 __put_user(host_seminfo->semvmx, &target_seminfo->semvmx);
2160 __put_user(host_seminfo->semaem, &target_seminfo->semaem);
2161 unlock_user_struct(target_seminfo, target_addr, 1);
2162 return 0;
2163}
2164
thsfa294812007-02-02 22:05:00 +00002165union semun {
2166 int val;
ths3eb6b042007-06-03 14:26:27 +00002167 struct semid_ds *buf;
thsfa294812007-02-02 22:05:00 +00002168 unsigned short *array;
aurel32e5289082009-04-18 16:16:12 +00002169 struct seminfo *__buf;
thsfa294812007-02-02 22:05:00 +00002170};
2171
ths3eb6b042007-06-03 14:26:27 +00002172union target_semun {
2173 int val;
aurel32e5289082009-04-18 16:16:12 +00002174 abi_ulong buf;
2175 abi_ulong array;
2176 abi_ulong __buf;
ths3eb6b042007-06-03 14:26:27 +00002177};
2178
aurel32e5289082009-04-18 16:16:12 +00002179static inline abi_long target_to_host_semarray(int semid, unsigned short **host_array,
2180 abi_ulong target_addr)
ths3eb6b042007-06-03 14:26:27 +00002181{
aurel32e5289082009-04-18 16:16:12 +00002182 int nsems;
2183 unsigned short *array;
2184 union semun semun;
2185 struct semid_ds semid_ds;
2186 int i, ret;
ths3eb6b042007-06-03 14:26:27 +00002187
aurel32e5289082009-04-18 16:16:12 +00002188 semun.buf = &semid_ds;
2189
2190 ret = semctl(semid, 0, IPC_STAT, semun);
2191 if (ret == -1)
2192 return get_errno(ret);
2193
2194 nsems = semid_ds.sem_nsems;
2195
2196 *host_array = malloc(nsems*sizeof(unsigned short));
2197 array = lock_user(VERIFY_READ, target_addr,
2198 nsems*sizeof(unsigned short), 1);
2199 if (!array)
2200 return -TARGET_EFAULT;
2201
2202 for(i=0; i<nsems; i++) {
2203 __get_user((*host_array)[i], &array[i]);
ths3eb6b042007-06-03 14:26:27 +00002204 }
aurel32e5289082009-04-18 16:16:12 +00002205 unlock_user(array, target_addr, 0);
2206
bellard579a97f2007-11-11 14:26:47 +00002207 return 0;
ths3eb6b042007-06-03 14:26:27 +00002208}
2209
aurel32e5289082009-04-18 16:16:12 +00002210static inline abi_long host_to_target_semarray(int semid, abi_ulong target_addr,
2211 unsigned short **host_array)
ths3eb6b042007-06-03 14:26:27 +00002212{
aurel32e5289082009-04-18 16:16:12 +00002213 int nsems;
2214 unsigned short *array;
2215 union semun semun;
2216 struct semid_ds semid_ds;
2217 int i, ret;
ths3eb6b042007-06-03 14:26:27 +00002218
aurel32e5289082009-04-18 16:16:12 +00002219 semun.buf = &semid_ds;
2220
2221 ret = semctl(semid, 0, IPC_STAT, semun);
2222 if (ret == -1)
2223 return get_errno(ret);
2224
2225 nsems = semid_ds.sem_nsems;
2226
2227 array = lock_user(VERIFY_WRITE, target_addr,
2228 nsems*sizeof(unsigned short), 0);
2229 if (!array)
2230 return -TARGET_EFAULT;
2231
2232 for(i=0; i<nsems; i++) {
2233 __put_user((*host_array)[i], &array[i]);
ths3eb6b042007-06-03 14:26:27 +00002234 }
aurel32e5289082009-04-18 16:16:12 +00002235 free(*host_array);
2236 unlock_user(array, target_addr, 1);
2237
bellard579a97f2007-11-11 14:26:47 +00002238 return 0;
ths3eb6b042007-06-03 14:26:27 +00002239}
2240
aurel32e5289082009-04-18 16:16:12 +00002241static inline abi_long do_semctl(int semid, int semnum, int cmd,
2242 union target_semun target_su)
ths3eb6b042007-06-03 14:26:27 +00002243{
2244 union semun arg;
2245 struct semid_ds dsarg;
vibi sreenivasan7b8118e2009-06-19 13:34:39 +05302246 unsigned short *array = NULL;
aurel32e5289082009-04-18 16:16:12 +00002247 struct seminfo seminfo;
2248 abi_long ret = -TARGET_EINVAL;
2249 abi_long err;
2250 cmd &= 0xff;
ths3eb6b042007-06-03 14:26:27 +00002251
2252 switch( cmd ) {
2253 case GETVAL:
ths3eb6b042007-06-03 14:26:27 +00002254 case SETVAL:
aurel32e5289082009-04-18 16:16:12 +00002255 arg.val = tswapl(target_su.val);
2256 ret = get_errno(semctl(semid, semnum, cmd, arg));
2257 target_su.val = tswapl(arg.val);
ths3eb6b042007-06-03 14:26:27 +00002258 break;
2259 case GETALL:
ths3eb6b042007-06-03 14:26:27 +00002260 case SETALL:
aurel32e5289082009-04-18 16:16:12 +00002261 err = target_to_host_semarray(semid, &array, target_su.array);
2262 if (err)
2263 return err;
2264 arg.array = array;
2265 ret = get_errno(semctl(semid, semnum, cmd, arg));
2266 err = host_to_target_semarray(semid, target_su.array, &array);
2267 if (err)
2268 return err;
ths3eb6b042007-06-03 14:26:27 +00002269 break;
2270 case IPC_STAT:
ths3eb6b042007-06-03 14:26:27 +00002271 case IPC_SET:
aurel32e5289082009-04-18 16:16:12 +00002272 case SEM_STAT:
2273 err = target_to_host_semid_ds(&dsarg, target_su.buf);
2274 if (err)
2275 return err;
2276 arg.buf = &dsarg;
2277 ret = get_errno(semctl(semid, semnum, cmd, arg));
2278 err = host_to_target_semid_ds(target_su.buf, &dsarg);
2279 if (err)
2280 return err;
ths3eb6b042007-06-03 14:26:27 +00002281 break;
aurel32e5289082009-04-18 16:16:12 +00002282 case IPC_INFO:
2283 case SEM_INFO:
2284 arg.__buf = &seminfo;
2285 ret = get_errno(semctl(semid, semnum, cmd, arg));
2286 err = host_to_target_seminfo(target_su.__buf, &seminfo);
2287 if (err)
2288 return err;
2289 break;
2290 case IPC_RMID:
2291 case GETPID:
2292 case GETNCNT:
2293 case GETZCNT:
2294 ret = get_errno(semctl(semid, semnum, cmd, NULL));
2295 break;
ths3eb6b042007-06-03 14:26:27 +00002296 }
2297
2298 return ret;
2299}
2300
aurel32e5289082009-04-18 16:16:12 +00002301struct target_sembuf {
2302 unsigned short sem_num;
2303 short sem_op;
2304 short sem_flg;
2305};
2306
2307static inline abi_long target_to_host_sembuf(struct sembuf *host_sembuf,
2308 abi_ulong target_addr,
2309 unsigned nsops)
2310{
2311 struct target_sembuf *target_sembuf;
2312 int i;
2313
2314 target_sembuf = lock_user(VERIFY_READ, target_addr,
2315 nsops*sizeof(struct target_sembuf), 1);
2316 if (!target_sembuf)
2317 return -TARGET_EFAULT;
2318
2319 for(i=0; i<nsops; i++) {
2320 __get_user(host_sembuf[i].sem_num, &target_sembuf[i].sem_num);
2321 __get_user(host_sembuf[i].sem_op, &target_sembuf[i].sem_op);
2322 __get_user(host_sembuf[i].sem_flg, &target_sembuf[i].sem_flg);
2323 }
2324
2325 unlock_user(target_sembuf, target_addr, 0);
2326
2327 return 0;
2328}
2329
2330static inline abi_long do_semop(int semid, abi_long ptr, unsigned nsops)
2331{
2332 struct sembuf sops[nsops];
2333
2334 if (target_to_host_sembuf(sops, ptr, nsops))
2335 return -TARGET_EFAULT;
2336
2337 return semop(semid, sops, nsops);
2338}
2339
ths1bc012f2007-06-03 14:27:49 +00002340struct target_msqid_ds
2341{
aurel321c54ff92008-10-13 21:08:44 +00002342 struct target_ipc_perm msg_perm;
2343 abi_ulong msg_stime;
2344#if TARGET_ABI_BITS == 32
2345 abi_ulong __unused1;
2346#endif
2347 abi_ulong msg_rtime;
2348#if TARGET_ABI_BITS == 32
2349 abi_ulong __unused2;
2350#endif
2351 abi_ulong msg_ctime;
2352#if TARGET_ABI_BITS == 32
2353 abi_ulong __unused3;
2354#endif
2355 abi_ulong __msg_cbytes;
2356 abi_ulong msg_qnum;
2357 abi_ulong msg_qbytes;
2358 abi_ulong msg_lspid;
2359 abi_ulong msg_lrpid;
2360 abi_ulong __unused4;
2361 abi_ulong __unused5;
ths1bc012f2007-06-03 14:27:49 +00002362};
2363
bellard579a97f2007-11-11 14:26:47 +00002364static inline abi_long target_to_host_msqid_ds(struct msqid_ds *host_md,
2365 abi_ulong target_addr)
ths1bc012f2007-06-03 14:27:49 +00002366{
2367 struct target_msqid_ds *target_md;
2368
bellard579a97f2007-11-11 14:26:47 +00002369 if (!lock_user_struct(VERIFY_READ, target_md, target_addr, 1))
2370 return -TARGET_EFAULT;
aurel321c54ff92008-10-13 21:08:44 +00002371 if (target_to_host_ipc_perm(&(host_md->msg_perm),target_addr))
2372 return -TARGET_EFAULT;
ths1bc012f2007-06-03 14:27:49 +00002373 host_md->msg_stime = tswapl(target_md->msg_stime);
2374 host_md->msg_rtime = tswapl(target_md->msg_rtime);
2375 host_md->msg_ctime = tswapl(target_md->msg_ctime);
2376 host_md->__msg_cbytes = tswapl(target_md->__msg_cbytes);
2377 host_md->msg_qnum = tswapl(target_md->msg_qnum);
2378 host_md->msg_qbytes = tswapl(target_md->msg_qbytes);
2379 host_md->msg_lspid = tswapl(target_md->msg_lspid);
2380 host_md->msg_lrpid = tswapl(target_md->msg_lrpid);
2381 unlock_user_struct(target_md, target_addr, 0);
bellard579a97f2007-11-11 14:26:47 +00002382 return 0;
ths1bc012f2007-06-03 14:27:49 +00002383}
2384
bellard579a97f2007-11-11 14:26:47 +00002385static inline abi_long host_to_target_msqid_ds(abi_ulong target_addr,
2386 struct msqid_ds *host_md)
ths1bc012f2007-06-03 14:27:49 +00002387{
2388 struct target_msqid_ds *target_md;
2389
bellard579a97f2007-11-11 14:26:47 +00002390 if (!lock_user_struct(VERIFY_WRITE, target_md, target_addr, 0))
2391 return -TARGET_EFAULT;
aurel321c54ff92008-10-13 21:08:44 +00002392 if (host_to_target_ipc_perm(target_addr,&(host_md->msg_perm)))
2393 return -TARGET_EFAULT;
ths1bc012f2007-06-03 14:27:49 +00002394 target_md->msg_stime = tswapl(host_md->msg_stime);
2395 target_md->msg_rtime = tswapl(host_md->msg_rtime);
2396 target_md->msg_ctime = tswapl(host_md->msg_ctime);
2397 target_md->__msg_cbytes = tswapl(host_md->__msg_cbytes);
2398 target_md->msg_qnum = tswapl(host_md->msg_qnum);
2399 target_md->msg_qbytes = tswapl(host_md->msg_qbytes);
2400 target_md->msg_lspid = tswapl(host_md->msg_lspid);
2401 target_md->msg_lrpid = tswapl(host_md->msg_lrpid);
2402 unlock_user_struct(target_md, target_addr, 1);
bellard579a97f2007-11-11 14:26:47 +00002403 return 0;
ths1bc012f2007-06-03 14:27:49 +00002404}
2405
aurel321c54ff92008-10-13 21:08:44 +00002406struct target_msginfo {
2407 int msgpool;
2408 int msgmap;
2409 int msgmax;
2410 int msgmnb;
2411 int msgmni;
2412 int msgssz;
2413 int msgtql;
2414 unsigned short int msgseg;
2415};
2416
2417static inline abi_long host_to_target_msginfo(abi_ulong target_addr,
2418 struct msginfo *host_msginfo)
2419{
2420 struct target_msginfo *target_msginfo;
2421 if (!lock_user_struct(VERIFY_WRITE, target_msginfo, target_addr, 0))
2422 return -TARGET_EFAULT;
2423 __put_user(host_msginfo->msgpool, &target_msginfo->msgpool);
2424 __put_user(host_msginfo->msgmap, &target_msginfo->msgmap);
2425 __put_user(host_msginfo->msgmax, &target_msginfo->msgmax);
2426 __put_user(host_msginfo->msgmnb, &target_msginfo->msgmnb);
2427 __put_user(host_msginfo->msgmni, &target_msginfo->msgmni);
2428 __put_user(host_msginfo->msgssz, &target_msginfo->msgssz);
2429 __put_user(host_msginfo->msgtql, &target_msginfo->msgtql);
2430 __put_user(host_msginfo->msgseg, &target_msginfo->msgseg);
2431 unlock_user_struct(target_msginfo, target_addr, 1);
aurel3200b229a2008-10-24 13:12:52 +00002432 return 0;
aurel321c54ff92008-10-13 21:08:44 +00002433}
2434
2435static inline abi_long do_msgctl(int msgid, int cmd, abi_long ptr)
ths1bc012f2007-06-03 14:27:49 +00002436{
2437 struct msqid_ds dsarg;
aurel321c54ff92008-10-13 21:08:44 +00002438 struct msginfo msginfo;
2439 abi_long ret = -TARGET_EINVAL;
2440
2441 cmd &= 0xff;
2442
2443 switch (cmd) {
ths1bc012f2007-06-03 14:27:49 +00002444 case IPC_STAT:
2445 case IPC_SET:
aurel321c54ff92008-10-13 21:08:44 +00002446 case MSG_STAT:
2447 if (target_to_host_msqid_ds(&dsarg,ptr))
2448 return -TARGET_EFAULT;
2449 ret = get_errno(msgctl(msgid, cmd, &dsarg));
2450 if (host_to_target_msqid_ds(ptr,&dsarg))
2451 return -TARGET_EFAULT;
2452 break;
2453 case IPC_RMID:
2454 ret = get_errno(msgctl(msgid, cmd, NULL));
2455 break;
2456 case IPC_INFO:
2457 case MSG_INFO:
2458 ret = get_errno(msgctl(msgid, cmd, (struct msqid_ds *)&msginfo));
2459 if (host_to_target_msginfo(ptr, &msginfo))
2460 return -TARGET_EFAULT;
2461 break;
ths1bc012f2007-06-03 14:27:49 +00002462 }
aurel321c54ff92008-10-13 21:08:44 +00002463
ths1bc012f2007-06-03 14:27:49 +00002464 return ret;
2465}
2466
2467struct target_msgbuf {
aurel321c54ff92008-10-13 21:08:44 +00002468 abi_long mtype;
2469 char mtext[1];
ths1bc012f2007-06-03 14:27:49 +00002470};
2471
blueswir1992f48a2007-10-14 16:27:31 +00002472static inline abi_long do_msgsnd(int msqid, abi_long msgp,
2473 unsigned int msgsz, int msgflg)
ths1bc012f2007-06-03 14:27:49 +00002474{
2475 struct target_msgbuf *target_mb;
2476 struct msgbuf *host_mb;
blueswir1992f48a2007-10-14 16:27:31 +00002477 abi_long ret = 0;
ths1bc012f2007-06-03 14:27:49 +00002478
bellard579a97f2007-11-11 14:26:47 +00002479 if (!lock_user_struct(VERIFY_READ, target_mb, msgp, 0))
2480 return -TARGET_EFAULT;
ths1bc012f2007-06-03 14:27:49 +00002481 host_mb = malloc(msgsz+sizeof(long));
aurel321c54ff92008-10-13 21:08:44 +00002482 host_mb->mtype = (abi_long) tswapl(target_mb->mtype);
2483 memcpy(host_mb->mtext, target_mb->mtext, msgsz);
ths1bc012f2007-06-03 14:27:49 +00002484 ret = get_errno(msgsnd(msqid, host_mb, msgsz, msgflg));
2485 free(host_mb);
2486 unlock_user_struct(target_mb, msgp, 0);
2487
2488 return ret;
2489}
2490
blueswir1992f48a2007-10-14 16:27:31 +00002491static inline abi_long do_msgrcv(int msqid, abi_long msgp,
aurel321c54ff92008-10-13 21:08:44 +00002492 unsigned int msgsz, abi_long msgtyp,
blueswir1992f48a2007-10-14 16:27:31 +00002493 int msgflg)
ths1bc012f2007-06-03 14:27:49 +00002494{
2495 struct target_msgbuf *target_mb;
bellard579a97f2007-11-11 14:26:47 +00002496 char *target_mtext;
ths1bc012f2007-06-03 14:27:49 +00002497 struct msgbuf *host_mb;
blueswir1992f48a2007-10-14 16:27:31 +00002498 abi_long ret = 0;
ths1bc012f2007-06-03 14:27:49 +00002499
bellard579a97f2007-11-11 14:26:47 +00002500 if (!lock_user_struct(VERIFY_WRITE, target_mb, msgp, 0))
2501 return -TARGET_EFAULT;
aurel321c54ff92008-10-13 21:08:44 +00002502
ths1bc012f2007-06-03 14:27:49 +00002503 host_mb = malloc(msgsz+sizeof(long));
aurel321c54ff92008-10-13 21:08:44 +00002504 ret = get_errno(msgrcv(msqid, host_mb, msgsz, tswapl(msgtyp), msgflg));
2505
bellard579a97f2007-11-11 14:26:47 +00002506 if (ret > 0) {
2507 abi_ulong target_mtext_addr = msgp + sizeof(abi_ulong);
2508 target_mtext = lock_user(VERIFY_WRITE, target_mtext_addr, ret, 0);
2509 if (!target_mtext) {
2510 ret = -TARGET_EFAULT;
2511 goto end;
2512 }
aurel321c54ff92008-10-13 21:08:44 +00002513 memcpy(target_mb->mtext, host_mb->mtext, ret);
bellard579a97f2007-11-11 14:26:47 +00002514 unlock_user(target_mtext, target_mtext_addr, ret);
2515 }
aurel321c54ff92008-10-13 21:08:44 +00002516
ths1bc012f2007-06-03 14:27:49 +00002517 target_mb->mtype = tswapl(host_mb->mtype);
2518 free(host_mb);
ths1bc012f2007-06-03 14:27:49 +00002519
bellard579a97f2007-11-11 14:26:47 +00002520end:
2521 if (target_mb)
2522 unlock_user_struct(target_mb, msgp, 1);
ths1bc012f2007-06-03 14:27:49 +00002523 return ret;
2524}
2525
Riku Voipio88a8c982009-04-03 10:42:00 +03002526struct target_shmid_ds
2527{
2528 struct target_ipc_perm shm_perm;
2529 abi_ulong shm_segsz;
2530 abi_ulong shm_atime;
2531#if TARGET_ABI_BITS == 32
2532 abi_ulong __unused1;
2533#endif
2534 abi_ulong shm_dtime;
2535#if TARGET_ABI_BITS == 32
2536 abi_ulong __unused2;
2537#endif
2538 abi_ulong shm_ctime;
2539#if TARGET_ABI_BITS == 32
2540 abi_ulong __unused3;
2541#endif
2542 int shm_cpid;
2543 int shm_lpid;
2544 abi_ulong shm_nattch;
2545 unsigned long int __unused4;
2546 unsigned long int __unused5;
2547};
2548
2549static inline abi_long target_to_host_shmid_ds(struct shmid_ds *host_sd,
2550 abi_ulong target_addr)
2551{
2552 struct target_shmid_ds *target_sd;
2553
2554 if (!lock_user_struct(VERIFY_READ, target_sd, target_addr, 1))
2555 return -TARGET_EFAULT;
2556 if (target_to_host_ipc_perm(&(host_sd->shm_perm), target_addr))
2557 return -TARGET_EFAULT;
2558 __get_user(host_sd->shm_segsz, &target_sd->shm_segsz);
2559 __get_user(host_sd->shm_atime, &target_sd->shm_atime);
2560 __get_user(host_sd->shm_dtime, &target_sd->shm_dtime);
2561 __get_user(host_sd->shm_ctime, &target_sd->shm_ctime);
2562 __get_user(host_sd->shm_cpid, &target_sd->shm_cpid);
2563 __get_user(host_sd->shm_lpid, &target_sd->shm_lpid);
2564 __get_user(host_sd->shm_nattch, &target_sd->shm_nattch);
2565 unlock_user_struct(target_sd, target_addr, 0);
2566 return 0;
2567}
2568
2569static inline abi_long host_to_target_shmid_ds(abi_ulong target_addr,
2570 struct shmid_ds *host_sd)
2571{
2572 struct target_shmid_ds *target_sd;
2573
2574 if (!lock_user_struct(VERIFY_WRITE, target_sd, target_addr, 0))
2575 return -TARGET_EFAULT;
2576 if (host_to_target_ipc_perm(target_addr, &(host_sd->shm_perm)))
2577 return -TARGET_EFAULT;
2578 __put_user(host_sd->shm_segsz, &target_sd->shm_segsz);
2579 __put_user(host_sd->shm_atime, &target_sd->shm_atime);
2580 __put_user(host_sd->shm_dtime, &target_sd->shm_dtime);
2581 __put_user(host_sd->shm_ctime, &target_sd->shm_ctime);
2582 __put_user(host_sd->shm_cpid, &target_sd->shm_cpid);
2583 __put_user(host_sd->shm_lpid, &target_sd->shm_lpid);
2584 __put_user(host_sd->shm_nattch, &target_sd->shm_nattch);
2585 unlock_user_struct(target_sd, target_addr, 1);
2586 return 0;
2587}
2588
2589struct target_shminfo {
2590 abi_ulong shmmax;
2591 abi_ulong shmmin;
2592 abi_ulong shmmni;
2593 abi_ulong shmseg;
2594 abi_ulong shmall;
2595};
2596
2597static inline abi_long host_to_target_shminfo(abi_ulong target_addr,
2598 struct shminfo *host_shminfo)
2599{
2600 struct target_shminfo *target_shminfo;
2601 if (!lock_user_struct(VERIFY_WRITE, target_shminfo, target_addr, 0))
2602 return -TARGET_EFAULT;
2603 __put_user(host_shminfo->shmmax, &target_shminfo->shmmax);
2604 __put_user(host_shminfo->shmmin, &target_shminfo->shmmin);
2605 __put_user(host_shminfo->shmmni, &target_shminfo->shmmni);
2606 __put_user(host_shminfo->shmseg, &target_shminfo->shmseg);
2607 __put_user(host_shminfo->shmall, &target_shminfo->shmall);
2608 unlock_user_struct(target_shminfo, target_addr, 1);
2609 return 0;
2610}
2611
2612struct target_shm_info {
2613 int used_ids;
2614 abi_ulong shm_tot;
2615 abi_ulong shm_rss;
2616 abi_ulong shm_swp;
2617 abi_ulong swap_attempts;
2618 abi_ulong swap_successes;
2619};
2620
2621static inline abi_long host_to_target_shm_info(abi_ulong target_addr,
2622 struct shm_info *host_shm_info)
2623{
2624 struct target_shm_info *target_shm_info;
2625 if (!lock_user_struct(VERIFY_WRITE, target_shm_info, target_addr, 0))
2626 return -TARGET_EFAULT;
2627 __put_user(host_shm_info->used_ids, &target_shm_info->used_ids);
2628 __put_user(host_shm_info->shm_tot, &target_shm_info->shm_tot);
2629 __put_user(host_shm_info->shm_rss, &target_shm_info->shm_rss);
2630 __put_user(host_shm_info->shm_swp, &target_shm_info->shm_swp);
2631 __put_user(host_shm_info->swap_attempts, &target_shm_info->swap_attempts);
2632 __put_user(host_shm_info->swap_successes, &target_shm_info->swap_successes);
2633 unlock_user_struct(target_shm_info, target_addr, 1);
2634 return 0;
2635}
2636
2637static inline abi_long do_shmctl(int shmid, int cmd, abi_long buf)
2638{
2639 struct shmid_ds dsarg;
2640 struct shminfo shminfo;
2641 struct shm_info shm_info;
2642 abi_long ret = -TARGET_EINVAL;
2643
2644 cmd &= 0xff;
2645
2646 switch(cmd) {
2647 case IPC_STAT:
2648 case IPC_SET:
2649 case SHM_STAT:
2650 if (target_to_host_shmid_ds(&dsarg, buf))
2651 return -TARGET_EFAULT;
2652 ret = get_errno(shmctl(shmid, cmd, &dsarg));
2653 if (host_to_target_shmid_ds(buf, &dsarg))
2654 return -TARGET_EFAULT;
2655 break;
2656 case IPC_INFO:
2657 ret = get_errno(shmctl(shmid, cmd, (struct shmid_ds *)&shminfo));
2658 if (host_to_target_shminfo(buf, &shminfo))
2659 return -TARGET_EFAULT;
2660 break;
2661 case SHM_INFO:
2662 ret = get_errno(shmctl(shmid, cmd, (struct shmid_ds *)&shm_info));
2663 if (host_to_target_shm_info(buf, &shm_info))
2664 return -TARGET_EFAULT;
2665 break;
2666 case IPC_RMID:
2667 case SHM_LOCK:
2668 case SHM_UNLOCK:
2669 ret = get_errno(shmctl(shmid, cmd, NULL));
2670 break;
2671 }
2672
2673 return ret;
2674}
2675
2676static inline abi_ulong do_shmat(int shmid, abi_ulong shmaddr, int shmflg)
2677{
2678 abi_long raddr;
2679 void *host_raddr;
2680 struct shmid_ds shm_info;
2681 int i,ret;
2682
2683 /* find out the length of the shared memory segment */
2684 ret = get_errno(shmctl(shmid, IPC_STAT, &shm_info));
2685 if (is_error(ret)) {
2686 /* can't get length, bail out */
2687 return ret;
2688 }
2689
2690 mmap_lock();
2691
2692 if (shmaddr)
2693 host_raddr = shmat(shmid, (void *)g2h(shmaddr), shmflg);
2694 else {
2695 abi_ulong mmap_start;
2696
2697 mmap_start = mmap_find_vma(0, shm_info.shm_segsz);
2698
2699 if (mmap_start == -1) {
2700 errno = ENOMEM;
2701 host_raddr = (void *)-1;
2702 } else
2703 host_raddr = shmat(shmid, g2h(mmap_start), shmflg | SHM_REMAP);
2704 }
2705
2706 if (host_raddr == (void *)-1) {
2707 mmap_unlock();
2708 return get_errno((long)host_raddr);
2709 }
2710 raddr=h2g((unsigned long)host_raddr);
2711
2712 page_set_flags(raddr, raddr + shm_info.shm_segsz,
2713 PAGE_VALID | PAGE_READ |
2714 ((shmflg & SHM_RDONLY)? 0 : PAGE_WRITE));
2715
2716 for (i = 0; i < N_SHM_REGIONS; i++) {
2717 if (shm_regions[i].start == 0) {
2718 shm_regions[i].start = raddr;
2719 shm_regions[i].size = shm_info.shm_segsz;
2720 break;
2721 }
2722 }
2723
2724 mmap_unlock();
2725 return raddr;
2726
2727}
2728
2729static inline abi_long do_shmdt(abi_ulong shmaddr)
2730{
2731 int i;
2732
2733 for (i = 0; i < N_SHM_REGIONS; ++i) {
2734 if (shm_regions[i].start == shmaddr) {
2735 shm_regions[i].start = 0;
2736 page_set_flags(shmaddr, shm_regions[i].size, 0);
2737 break;
2738 }
2739 }
2740
2741 return get_errno(shmdt(g2h(shmaddr)));
2742}
2743
aurel321c54ff92008-10-13 21:08:44 +00002744#ifdef TARGET_NR_ipc
pbrook53a59602006-03-25 19:31:22 +00002745/* ??? This only works with linear mappings. */
ths0da46a62007-10-20 20:23:07 +00002746/* do_ipc() must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +00002747static abi_long do_ipc(unsigned int call, int first,
2748 int second, int third,
2749 abi_long ptr, abi_long fifth)
bellard8853f862004-02-22 14:57:26 +00002750{
2751 int version;
blueswir1992f48a2007-10-14 16:27:31 +00002752 abi_long ret = 0;
bellard8853f862004-02-22 14:57:26 +00002753
2754 version = call >> 16;
2755 call &= 0xffff;
2756
2757 switch (call) {
thsfa294812007-02-02 22:05:00 +00002758 case IPCOP_semop:
aurel32e5289082009-04-18 16:16:12 +00002759 ret = do_semop(first, ptr, second);
thsfa294812007-02-02 22:05:00 +00002760 break;
2761
2762 case IPCOP_semget:
2763 ret = get_errno(semget(first, second, third));
2764 break;
2765
2766 case IPCOP_semctl:
aurel32e5289082009-04-18 16:16:12 +00002767 ret = do_semctl(first, second, third, (union target_semun)(abi_ulong) ptr);
thsfa294812007-02-02 22:05:00 +00002768 break;
thsd96372e2007-02-02 22:05:44 +00002769
aurel321c54ff92008-10-13 21:08:44 +00002770 case IPCOP_msgget:
2771 ret = get_errno(msgget(first, second));
2772 break;
thsd96372e2007-02-02 22:05:44 +00002773
aurel321c54ff92008-10-13 21:08:44 +00002774 case IPCOP_msgsnd:
2775 ret = do_msgsnd(first, ptr, second, third);
2776 break;
thsd96372e2007-02-02 22:05:44 +00002777
aurel321c54ff92008-10-13 21:08:44 +00002778 case IPCOP_msgctl:
2779 ret = do_msgctl(first, second, ptr);
2780 break;
thsd96372e2007-02-02 22:05:44 +00002781
aurel321c54ff92008-10-13 21:08:44 +00002782 case IPCOP_msgrcv:
2783 switch (version) {
2784 case 0:
2785 {
2786 struct target_ipc_kludge {
2787 abi_long msgp;
2788 abi_long msgtyp;
2789 } *tmp;
thsd96372e2007-02-02 22:05:44 +00002790
aurel321c54ff92008-10-13 21:08:44 +00002791 if (!lock_user_struct(VERIFY_READ, tmp, ptr, 1)) {
2792 ret = -TARGET_EFAULT;
2793 break;
ths1bc012f2007-06-03 14:27:49 +00002794 }
aurel321c54ff92008-10-13 21:08:44 +00002795
2796 ret = do_msgrcv(first, tmp->msgp, second, tmp->msgtyp, third);
2797
2798 unlock_user_struct(tmp, ptr, 0);
2799 break;
2800 }
2801 default:
2802 ret = do_msgrcv(first, ptr, second, fifth, third);
2803 }
2804 break;
thsd96372e2007-02-02 22:05:44 +00002805
bellard8853f862004-02-22 14:57:26 +00002806 case IPCOP_shmat:
Riku Voipio88a8c982009-04-03 10:42:00 +03002807 switch (version) {
2808 default:
bellard5a4a8982007-11-11 17:39:18 +00002809 {
2810 abi_ulong raddr;
Riku Voipio88a8c982009-04-03 10:42:00 +03002811 raddr = do_shmat(first, ptr, second);
2812 if (is_error(raddr))
2813 return get_errno(raddr);
bellard2f619692007-11-16 10:46:05 +00002814 if (put_user_ual(raddr, third))
bellard5a4a8982007-11-11 17:39:18 +00002815 return -TARGET_EFAULT;
Riku Voipio88a8c982009-04-03 10:42:00 +03002816 break;
2817 }
2818 case 1:
2819 ret = -TARGET_EINVAL;
2820 break;
bellard5a4a8982007-11-11 17:39:18 +00002821 }
bellard8853f862004-02-22 14:57:26 +00002822 break;
2823 case IPCOP_shmdt:
Riku Voipio88a8c982009-04-03 10:42:00 +03002824 ret = do_shmdt(ptr);
bellard8853f862004-02-22 14:57:26 +00002825 break;
2826
2827 case IPCOP_shmget:
2828 /* IPC_* flag values are the same on all linux platforms */
2829 ret = get_errno(shmget(first, second, third));
2830 break;
2831
2832 /* IPC_* and SHM_* command values are the same on all linux platforms */
2833 case IPCOP_shmctl:
Riku Voipio88a8c982009-04-03 10:42:00 +03002834 ret = do_shmctl(first, second, third);
bellard8853f862004-02-22 14:57:26 +00002835 break;
2836 default:
j_mayer32407102007-09-26 23:01:49 +00002837 gemu_log("Unsupported ipc call: %d (version %d)\n", call, version);
ths0da46a62007-10-20 20:23:07 +00002838 ret = -TARGET_ENOSYS;
bellard8853f862004-02-22 14:57:26 +00002839 break;
2840 }
2841 return ret;
2842}
j_mayer32407102007-09-26 23:01:49 +00002843#endif
bellard8853f862004-02-22 14:57:26 +00002844
bellard31e31b82003-02-18 22:55:36 +00002845/* kernel structure types definitions */
2846#define IFNAMSIZ 16
2847
Blue Swirl001faf32009-05-13 17:53:17 +00002848#define STRUCT(name, ...) STRUCT_ ## name,
bellard31e31b82003-02-18 22:55:36 +00002849#define STRUCT_SPECIAL(name) STRUCT_ ## name,
2850enum {
2851#include "syscall_types.h"
2852};
2853#undef STRUCT
2854#undef STRUCT_SPECIAL
2855
Blue Swirl001faf32009-05-13 17:53:17 +00002856#define STRUCT(name, ...) static const argtype struct_ ## name ## _def[] = { __VA_ARGS__, TYPE_NULL };
bellard31e31b82003-02-18 22:55:36 +00002857#define STRUCT_SPECIAL(name)
2858#include "syscall_types.h"
2859#undef STRUCT
2860#undef STRUCT_SPECIAL
2861
2862typedef struct IOCTLEntry {
bellard2ab83ea2003-06-15 19:56:46 +00002863 unsigned int target_cmd;
2864 unsigned int host_cmd;
bellard31e31b82003-02-18 22:55:36 +00002865 const char *name;
2866 int access;
bellard1a9353d2003-03-16 20:28:50 +00002867 const argtype arg_type[5];
bellard31e31b82003-02-18 22:55:36 +00002868} IOCTLEntry;
2869
2870#define IOC_R 0x0001
2871#define IOC_W 0x0002
2872#define IOC_RW (IOC_R | IOC_W)
2873
2874#define MAX_STRUCT_SIZE 4096
2875
blueswir19f106a72008-10-05 10:52:52 +00002876static IOCTLEntry ioctl_entries[] = {
Blue Swirl001faf32009-05-13 17:53:17 +00002877#define IOCTL(cmd, access, ...) \
2878 { TARGET_ ## cmd, cmd, #cmd, access, { __VA_ARGS__ } },
bellard31e31b82003-02-18 22:55:36 +00002879#include "ioctls.h"
2880 { 0, 0, },
2881};
2882
pbrook53a59602006-03-25 19:31:22 +00002883/* ??? Implement proper locking for ioctls. */
ths0da46a62007-10-20 20:23:07 +00002884/* do_ioctl() Must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +00002885static abi_long do_ioctl(int fd, abi_long cmd, abi_long arg)
bellard31e31b82003-02-18 22:55:36 +00002886{
2887 const IOCTLEntry *ie;
2888 const argtype *arg_type;
blueswir1992f48a2007-10-14 16:27:31 +00002889 abi_long ret;
bellard31e31b82003-02-18 22:55:36 +00002890 uint8_t buf_temp[MAX_STRUCT_SIZE];
pbrook53a59602006-03-25 19:31:22 +00002891 int target_size;
2892 void *argptr;
bellard31e31b82003-02-18 22:55:36 +00002893
2894 ie = ioctl_entries;
2895 for(;;) {
2896 if (ie->target_cmd == 0) {
j_mayer32407102007-09-26 23:01:49 +00002897 gemu_log("Unsupported ioctl: cmd=0x%04lx\n", (long)cmd);
ths0da46a62007-10-20 20:23:07 +00002898 return -TARGET_ENOSYS;
bellard31e31b82003-02-18 22:55:36 +00002899 }
2900 if (ie->target_cmd == cmd)
2901 break;
2902 ie++;
2903 }
2904 arg_type = ie->arg_type;
bellard9de5e442003-03-23 16:49:39 +00002905#if defined(DEBUG)
j_mayer32407102007-09-26 23:01:49 +00002906 gemu_log("ioctl: cmd=0x%04lx (%s)\n", (long)cmd, ie->name);
bellard72f03902003-02-18 23:33:18 +00002907#endif
bellard31e31b82003-02-18 22:55:36 +00002908 switch(arg_type[0]) {
2909 case TYPE_NULL:
2910 /* no argument */
2911 ret = get_errno(ioctl(fd, ie->host_cmd));
2912 break;
2913 case TYPE_PTRVOID:
2914 case TYPE_INT:
2915 /* int argment */
2916 ret = get_errno(ioctl(fd, ie->host_cmd, arg));
2917 break;
2918 case TYPE_PTR:
2919 arg_type++;
pbrook53a59602006-03-25 19:31:22 +00002920 target_size = thunk_type_size(arg_type, 0);
bellard31e31b82003-02-18 22:55:36 +00002921 switch(ie->access) {
2922 case IOC_R:
2923 ret = get_errno(ioctl(fd, ie->host_cmd, buf_temp));
2924 if (!is_error(ret)) {
bellard579a97f2007-11-11 14:26:47 +00002925 argptr = lock_user(VERIFY_WRITE, arg, target_size, 0);
2926 if (!argptr)
2927 return -TARGET_EFAULT;
pbrook53a59602006-03-25 19:31:22 +00002928 thunk_convert(argptr, buf_temp, arg_type, THUNK_TARGET);
2929 unlock_user(argptr, arg, target_size);
bellard31e31b82003-02-18 22:55:36 +00002930 }
2931 break;
2932 case IOC_W:
bellard579a97f2007-11-11 14:26:47 +00002933 argptr = lock_user(VERIFY_READ, arg, target_size, 1);
2934 if (!argptr)
2935 return -TARGET_EFAULT;
pbrook53a59602006-03-25 19:31:22 +00002936 thunk_convert(buf_temp, argptr, arg_type, THUNK_HOST);
2937 unlock_user(argptr, arg, 0);
bellard31e31b82003-02-18 22:55:36 +00002938 ret = get_errno(ioctl(fd, ie->host_cmd, buf_temp));
2939 break;
2940 default:
2941 case IOC_RW:
bellard579a97f2007-11-11 14:26:47 +00002942 argptr = lock_user(VERIFY_READ, arg, target_size, 1);
2943 if (!argptr)
2944 return -TARGET_EFAULT;
pbrook53a59602006-03-25 19:31:22 +00002945 thunk_convert(buf_temp, argptr, arg_type, THUNK_HOST);
2946 unlock_user(argptr, arg, 0);
bellard31e31b82003-02-18 22:55:36 +00002947 ret = get_errno(ioctl(fd, ie->host_cmd, buf_temp));
2948 if (!is_error(ret)) {
bellard579a97f2007-11-11 14:26:47 +00002949 argptr = lock_user(VERIFY_WRITE, arg, target_size, 0);
2950 if (!argptr)
2951 return -TARGET_EFAULT;
pbrook53a59602006-03-25 19:31:22 +00002952 thunk_convert(argptr, buf_temp, arg_type, THUNK_TARGET);
2953 unlock_user(argptr, arg, target_size);
bellard31e31b82003-02-18 22:55:36 +00002954 }
2955 break;
2956 }
2957 break;
2958 default:
j_mayer32407102007-09-26 23:01:49 +00002959 gemu_log("Unsupported ioctl type: cmd=0x%04lx type=%d\n",
2960 (long)cmd, arg_type[0]);
ths0da46a62007-10-20 20:23:07 +00002961 ret = -TARGET_ENOSYS;
bellard31e31b82003-02-18 22:55:36 +00002962 break;
2963 }
2964 return ret;
2965}
2966
blueswir1b39bc502008-10-05 10:51:10 +00002967static const bitmask_transtbl iflag_tbl[] = {
bellard31e31b82003-02-18 22:55:36 +00002968 { TARGET_IGNBRK, TARGET_IGNBRK, IGNBRK, IGNBRK },
2969 { TARGET_BRKINT, TARGET_BRKINT, BRKINT, BRKINT },
2970 { TARGET_IGNPAR, TARGET_IGNPAR, IGNPAR, IGNPAR },
2971 { TARGET_PARMRK, TARGET_PARMRK, PARMRK, PARMRK },
2972 { TARGET_INPCK, TARGET_INPCK, INPCK, INPCK },
2973 { TARGET_ISTRIP, TARGET_ISTRIP, ISTRIP, ISTRIP },
2974 { TARGET_INLCR, TARGET_INLCR, INLCR, INLCR },
2975 { TARGET_IGNCR, TARGET_IGNCR, IGNCR, IGNCR },
2976 { TARGET_ICRNL, TARGET_ICRNL, ICRNL, ICRNL },
2977 { TARGET_IUCLC, TARGET_IUCLC, IUCLC, IUCLC },
2978 { TARGET_IXON, TARGET_IXON, IXON, IXON },
2979 { TARGET_IXANY, TARGET_IXANY, IXANY, IXANY },
2980 { TARGET_IXOFF, TARGET_IXOFF, IXOFF, IXOFF },
2981 { TARGET_IMAXBEL, TARGET_IMAXBEL, IMAXBEL, IMAXBEL },
2982 { 0, 0, 0, 0 }
2983};
2984
blueswir1b39bc502008-10-05 10:51:10 +00002985static const bitmask_transtbl oflag_tbl[] = {
bellard31e31b82003-02-18 22:55:36 +00002986 { TARGET_OPOST, TARGET_OPOST, OPOST, OPOST },
2987 { TARGET_OLCUC, TARGET_OLCUC, OLCUC, OLCUC },
2988 { TARGET_ONLCR, TARGET_ONLCR, ONLCR, ONLCR },
2989 { TARGET_OCRNL, TARGET_OCRNL, OCRNL, OCRNL },
2990 { TARGET_ONOCR, TARGET_ONOCR, ONOCR, ONOCR },
2991 { TARGET_ONLRET, TARGET_ONLRET, ONLRET, ONLRET },
2992 { TARGET_OFILL, TARGET_OFILL, OFILL, OFILL },
2993 { TARGET_OFDEL, TARGET_OFDEL, OFDEL, OFDEL },
2994 { TARGET_NLDLY, TARGET_NL0, NLDLY, NL0 },
2995 { TARGET_NLDLY, TARGET_NL1, NLDLY, NL1 },
2996 { TARGET_CRDLY, TARGET_CR0, CRDLY, CR0 },
2997 { TARGET_CRDLY, TARGET_CR1, CRDLY, CR1 },
2998 { TARGET_CRDLY, TARGET_CR2, CRDLY, CR2 },
2999 { TARGET_CRDLY, TARGET_CR3, CRDLY, CR3 },
3000 { TARGET_TABDLY, TARGET_TAB0, TABDLY, TAB0 },
3001 { TARGET_TABDLY, TARGET_TAB1, TABDLY, TAB1 },
3002 { TARGET_TABDLY, TARGET_TAB2, TABDLY, TAB2 },
3003 { TARGET_TABDLY, TARGET_TAB3, TABDLY, TAB3 },
3004 { TARGET_BSDLY, TARGET_BS0, BSDLY, BS0 },
3005 { TARGET_BSDLY, TARGET_BS1, BSDLY, BS1 },
3006 { TARGET_VTDLY, TARGET_VT0, VTDLY, VT0 },
3007 { TARGET_VTDLY, TARGET_VT1, VTDLY, VT1 },
3008 { TARGET_FFDLY, TARGET_FF0, FFDLY, FF0 },
3009 { TARGET_FFDLY, TARGET_FF1, FFDLY, FF1 },
3010 { 0, 0, 0, 0 }
3011};
3012
blueswir1b39bc502008-10-05 10:51:10 +00003013static const bitmask_transtbl cflag_tbl[] = {
bellard31e31b82003-02-18 22:55:36 +00003014 { TARGET_CBAUD, TARGET_B0, CBAUD, B0 },
3015 { TARGET_CBAUD, TARGET_B50, CBAUD, B50 },
3016 { TARGET_CBAUD, TARGET_B75, CBAUD, B75 },
3017 { TARGET_CBAUD, TARGET_B110, CBAUD, B110 },
3018 { TARGET_CBAUD, TARGET_B134, CBAUD, B134 },
3019 { TARGET_CBAUD, TARGET_B150, CBAUD, B150 },
3020 { TARGET_CBAUD, TARGET_B200, CBAUD, B200 },
3021 { TARGET_CBAUD, TARGET_B300, CBAUD, B300 },
3022 { TARGET_CBAUD, TARGET_B600, CBAUD, B600 },
3023 { TARGET_CBAUD, TARGET_B1200, CBAUD, B1200 },
3024 { TARGET_CBAUD, TARGET_B1800, CBAUD, B1800 },
3025 { TARGET_CBAUD, TARGET_B2400, CBAUD, B2400 },
3026 { TARGET_CBAUD, TARGET_B4800, CBAUD, B4800 },
3027 { TARGET_CBAUD, TARGET_B9600, CBAUD, B9600 },
3028 { TARGET_CBAUD, TARGET_B19200, CBAUD, B19200 },
3029 { TARGET_CBAUD, TARGET_B38400, CBAUD, B38400 },
3030 { TARGET_CBAUD, TARGET_B57600, CBAUD, B57600 },
3031 { TARGET_CBAUD, TARGET_B115200, CBAUD, B115200 },
3032 { TARGET_CBAUD, TARGET_B230400, CBAUD, B230400 },
3033 { TARGET_CBAUD, TARGET_B460800, CBAUD, B460800 },
3034 { TARGET_CSIZE, TARGET_CS5, CSIZE, CS5 },
3035 { TARGET_CSIZE, TARGET_CS6, CSIZE, CS6 },
3036 { TARGET_CSIZE, TARGET_CS7, CSIZE, CS7 },
3037 { TARGET_CSIZE, TARGET_CS8, CSIZE, CS8 },
3038 { TARGET_CSTOPB, TARGET_CSTOPB, CSTOPB, CSTOPB },
3039 { TARGET_CREAD, TARGET_CREAD, CREAD, CREAD },
3040 { TARGET_PARENB, TARGET_PARENB, PARENB, PARENB },
3041 { TARGET_PARODD, TARGET_PARODD, PARODD, PARODD },
3042 { TARGET_HUPCL, TARGET_HUPCL, HUPCL, HUPCL },
3043 { TARGET_CLOCAL, TARGET_CLOCAL, CLOCAL, CLOCAL },
3044 { TARGET_CRTSCTS, TARGET_CRTSCTS, CRTSCTS, CRTSCTS },
3045 { 0, 0, 0, 0 }
3046};
3047
blueswir1b39bc502008-10-05 10:51:10 +00003048static const bitmask_transtbl lflag_tbl[] = {
bellard31e31b82003-02-18 22:55:36 +00003049 { TARGET_ISIG, TARGET_ISIG, ISIG, ISIG },
3050 { TARGET_ICANON, TARGET_ICANON, ICANON, ICANON },
3051 { TARGET_XCASE, TARGET_XCASE, XCASE, XCASE },
3052 { TARGET_ECHO, TARGET_ECHO, ECHO, ECHO },
3053 { TARGET_ECHOE, TARGET_ECHOE, ECHOE, ECHOE },
3054 { TARGET_ECHOK, TARGET_ECHOK, ECHOK, ECHOK },
3055 { TARGET_ECHONL, TARGET_ECHONL, ECHONL, ECHONL },
3056 { TARGET_NOFLSH, TARGET_NOFLSH, NOFLSH, NOFLSH },
3057 { TARGET_TOSTOP, TARGET_TOSTOP, TOSTOP, TOSTOP },
3058 { TARGET_ECHOCTL, TARGET_ECHOCTL, ECHOCTL, ECHOCTL },
3059 { TARGET_ECHOPRT, TARGET_ECHOPRT, ECHOPRT, ECHOPRT },
3060 { TARGET_ECHOKE, TARGET_ECHOKE, ECHOKE, ECHOKE },
3061 { TARGET_FLUSHO, TARGET_FLUSHO, FLUSHO, FLUSHO },
3062 { TARGET_PENDIN, TARGET_PENDIN, PENDIN, PENDIN },
3063 { TARGET_IEXTEN, TARGET_IEXTEN, IEXTEN, IEXTEN },
3064 { 0, 0, 0, 0 }
3065};
3066
3067static void target_to_host_termios (void *dst, const void *src)
3068{
3069 struct host_termios *host = dst;
3070 const struct target_termios *target = src;
ths3b46e622007-09-17 08:09:54 +00003071
ths5fafdf22007-09-16 21:08:06 +00003072 host->c_iflag =
bellard31e31b82003-02-18 22:55:36 +00003073 target_to_host_bitmask(tswap32(target->c_iflag), iflag_tbl);
ths5fafdf22007-09-16 21:08:06 +00003074 host->c_oflag =
bellard31e31b82003-02-18 22:55:36 +00003075 target_to_host_bitmask(tswap32(target->c_oflag), oflag_tbl);
ths5fafdf22007-09-16 21:08:06 +00003076 host->c_cflag =
bellard31e31b82003-02-18 22:55:36 +00003077 target_to_host_bitmask(tswap32(target->c_cflag), cflag_tbl);
ths5fafdf22007-09-16 21:08:06 +00003078 host->c_lflag =
bellard31e31b82003-02-18 22:55:36 +00003079 target_to_host_bitmask(tswap32(target->c_lflag), lflag_tbl);
3080 host->c_line = target->c_line;
ths3b46e622007-09-17 08:09:54 +00003081
Arnaud Patard44607122009-04-21 17:39:08 +03003082 memset(host->c_cc, 0, sizeof(host->c_cc));
ths5fafdf22007-09-16 21:08:06 +00003083 host->c_cc[VINTR] = target->c_cc[TARGET_VINTR];
3084 host->c_cc[VQUIT] = target->c_cc[TARGET_VQUIT];
ths3b46e622007-09-17 08:09:54 +00003085 host->c_cc[VERASE] = target->c_cc[TARGET_VERASE];
ths5fafdf22007-09-16 21:08:06 +00003086 host->c_cc[VKILL] = target->c_cc[TARGET_VKILL];
ths3b46e622007-09-17 08:09:54 +00003087 host->c_cc[VEOF] = target->c_cc[TARGET_VEOF];
ths5fafdf22007-09-16 21:08:06 +00003088 host->c_cc[VTIME] = target->c_cc[TARGET_VTIME];
ths3b46e622007-09-17 08:09:54 +00003089 host->c_cc[VMIN] = target->c_cc[TARGET_VMIN];
ths5fafdf22007-09-16 21:08:06 +00003090 host->c_cc[VSWTC] = target->c_cc[TARGET_VSWTC];
ths3b46e622007-09-17 08:09:54 +00003091 host->c_cc[VSTART] = target->c_cc[TARGET_VSTART];
ths5fafdf22007-09-16 21:08:06 +00003092 host->c_cc[VSTOP] = target->c_cc[TARGET_VSTOP];
3093 host->c_cc[VSUSP] = target->c_cc[TARGET_VSUSP];
ths3b46e622007-09-17 08:09:54 +00003094 host->c_cc[VEOL] = target->c_cc[TARGET_VEOL];
3095 host->c_cc[VREPRINT] = target->c_cc[TARGET_VREPRINT];
3096 host->c_cc[VDISCARD] = target->c_cc[TARGET_VDISCARD];
3097 host->c_cc[VWERASE] = target->c_cc[TARGET_VWERASE];
3098 host->c_cc[VLNEXT] = target->c_cc[TARGET_VLNEXT];
ths5fafdf22007-09-16 21:08:06 +00003099 host->c_cc[VEOL2] = target->c_cc[TARGET_VEOL2];
bellard31e31b82003-02-18 22:55:36 +00003100}
ths3b46e622007-09-17 08:09:54 +00003101
bellard31e31b82003-02-18 22:55:36 +00003102static void host_to_target_termios (void *dst, const void *src)
3103{
3104 struct target_termios *target = dst;
3105 const struct host_termios *host = src;
3106
ths5fafdf22007-09-16 21:08:06 +00003107 target->c_iflag =
bellard31e31b82003-02-18 22:55:36 +00003108 tswap32(host_to_target_bitmask(host->c_iflag, iflag_tbl));
ths5fafdf22007-09-16 21:08:06 +00003109 target->c_oflag =
bellard31e31b82003-02-18 22:55:36 +00003110 tswap32(host_to_target_bitmask(host->c_oflag, oflag_tbl));
ths5fafdf22007-09-16 21:08:06 +00003111 target->c_cflag =
bellard31e31b82003-02-18 22:55:36 +00003112 tswap32(host_to_target_bitmask(host->c_cflag, cflag_tbl));
ths5fafdf22007-09-16 21:08:06 +00003113 target->c_lflag =
bellard31e31b82003-02-18 22:55:36 +00003114 tswap32(host_to_target_bitmask(host->c_lflag, lflag_tbl));
3115 target->c_line = host->c_line;
ths3b46e622007-09-17 08:09:54 +00003116
Arnaud Patard44607122009-04-21 17:39:08 +03003117 memset(target->c_cc, 0, sizeof(target->c_cc));
bellard31e31b82003-02-18 22:55:36 +00003118 target->c_cc[TARGET_VINTR] = host->c_cc[VINTR];
3119 target->c_cc[TARGET_VQUIT] = host->c_cc[VQUIT];
3120 target->c_cc[TARGET_VERASE] = host->c_cc[VERASE];
3121 target->c_cc[TARGET_VKILL] = host->c_cc[VKILL];
3122 target->c_cc[TARGET_VEOF] = host->c_cc[VEOF];
3123 target->c_cc[TARGET_VTIME] = host->c_cc[VTIME];
3124 target->c_cc[TARGET_VMIN] = host->c_cc[VMIN];
3125 target->c_cc[TARGET_VSWTC] = host->c_cc[VSWTC];
3126 target->c_cc[TARGET_VSTART] = host->c_cc[VSTART];
3127 target->c_cc[TARGET_VSTOP] = host->c_cc[VSTOP];
3128 target->c_cc[TARGET_VSUSP] = host->c_cc[VSUSP];
3129 target->c_cc[TARGET_VEOL] = host->c_cc[VEOL];
3130 target->c_cc[TARGET_VREPRINT] = host->c_cc[VREPRINT];
3131 target->c_cc[TARGET_VDISCARD] = host->c_cc[VDISCARD];
3132 target->c_cc[TARGET_VWERASE] = host->c_cc[VWERASE];
3133 target->c_cc[TARGET_VLNEXT] = host->c_cc[VLNEXT];
3134 target->c_cc[TARGET_VEOL2] = host->c_cc[VEOL2];
3135}
3136
blueswir18e853dc2008-10-05 10:49:32 +00003137static const StructEntry struct_termios_def = {
bellard31e31b82003-02-18 22:55:36 +00003138 .convert = { host_to_target_termios, target_to_host_termios },
3139 .size = { sizeof(struct target_termios), sizeof(struct host_termios) },
3140 .align = { __alignof__(struct target_termios), __alignof__(struct host_termios) },
3141};
3142
bellard5286db72003-06-05 00:57:30 +00003143static bitmask_transtbl mmap_flags_tbl[] = {
3144 { TARGET_MAP_SHARED, TARGET_MAP_SHARED, MAP_SHARED, MAP_SHARED },
3145 { TARGET_MAP_PRIVATE, TARGET_MAP_PRIVATE, MAP_PRIVATE, MAP_PRIVATE },
3146 { TARGET_MAP_FIXED, TARGET_MAP_FIXED, MAP_FIXED, MAP_FIXED },
3147 { TARGET_MAP_ANONYMOUS, TARGET_MAP_ANONYMOUS, MAP_ANONYMOUS, MAP_ANONYMOUS },
3148 { TARGET_MAP_GROWSDOWN, TARGET_MAP_GROWSDOWN, MAP_GROWSDOWN, MAP_GROWSDOWN },
3149 { TARGET_MAP_DENYWRITE, TARGET_MAP_DENYWRITE, MAP_DENYWRITE, MAP_DENYWRITE },
3150 { TARGET_MAP_EXECUTABLE, TARGET_MAP_EXECUTABLE, MAP_EXECUTABLE, MAP_EXECUTABLE },
3151 { TARGET_MAP_LOCKED, TARGET_MAP_LOCKED, MAP_LOCKED, MAP_LOCKED },
3152 { 0, 0, 0, 0 }
3153};
3154
bellard2ab83ea2003-06-15 19:56:46 +00003155#if defined(TARGET_I386)
bellard6dbad632003-03-16 18:05:05 +00003156
3157/* NOTE: there is really one LDT for all the threads */
blueswir1b1d8e522008-10-26 13:43:07 +00003158static uint8_t *ldt_table;
bellard6dbad632003-03-16 18:05:05 +00003159
bellard03acab62007-11-11 14:57:14 +00003160static abi_long read_ldt(abi_ulong ptr, unsigned long bytecount)
bellard6dbad632003-03-16 18:05:05 +00003161{
3162 int size;
pbrook53a59602006-03-25 19:31:22 +00003163 void *p;
bellard6dbad632003-03-16 18:05:05 +00003164
3165 if (!ldt_table)
3166 return 0;
3167 size = TARGET_LDT_ENTRIES * TARGET_LDT_ENTRY_SIZE;
3168 if (size > bytecount)
3169 size = bytecount;
bellard579a97f2007-11-11 14:26:47 +00003170 p = lock_user(VERIFY_WRITE, ptr, size, 0);
3171 if (!p)
bellard03acab62007-11-11 14:57:14 +00003172 return -TARGET_EFAULT;
bellard579a97f2007-11-11 14:26:47 +00003173 /* ??? Should this by byteswapped? */
pbrook53a59602006-03-25 19:31:22 +00003174 memcpy(p, ldt_table, size);
3175 unlock_user(p, ptr, size);
bellard6dbad632003-03-16 18:05:05 +00003176 return size;
3177}
3178
3179/* XXX: add locking support */
bellard03acab62007-11-11 14:57:14 +00003180static abi_long write_ldt(CPUX86State *env,
3181 abi_ulong ptr, unsigned long bytecount, int oldmode)
bellard6dbad632003-03-16 18:05:05 +00003182{
3183 struct target_modify_ldt_ldt_s ldt_info;
pbrook53a59602006-03-25 19:31:22 +00003184 struct target_modify_ldt_ldt_s *target_ldt_info;
bellard6dbad632003-03-16 18:05:05 +00003185 int seg_32bit, contents, read_exec_only, limit_in_pages;
bellard8d18e892007-11-14 15:18:40 +00003186 int seg_not_present, useable, lm;
bellard6dbad632003-03-16 18:05:05 +00003187 uint32_t *lp, entry_1, entry_2;
3188
3189 if (bytecount != sizeof(ldt_info))
bellard03acab62007-11-11 14:57:14 +00003190 return -TARGET_EINVAL;
bellard579a97f2007-11-11 14:26:47 +00003191 if (!lock_user_struct(VERIFY_READ, target_ldt_info, ptr, 1))
bellard03acab62007-11-11 14:57:14 +00003192 return -TARGET_EFAULT;
pbrook53a59602006-03-25 19:31:22 +00003193 ldt_info.entry_number = tswap32(target_ldt_info->entry_number);
3194 ldt_info.base_addr = tswapl(target_ldt_info->base_addr);
3195 ldt_info.limit = tswap32(target_ldt_info->limit);
3196 ldt_info.flags = tswap32(target_ldt_info->flags);
3197 unlock_user_struct(target_ldt_info, ptr, 0);
ths3b46e622007-09-17 08:09:54 +00003198
bellard6dbad632003-03-16 18:05:05 +00003199 if (ldt_info.entry_number >= TARGET_LDT_ENTRIES)
bellard03acab62007-11-11 14:57:14 +00003200 return -TARGET_EINVAL;
bellard6dbad632003-03-16 18:05:05 +00003201 seg_32bit = ldt_info.flags & 1;
3202 contents = (ldt_info.flags >> 1) & 3;
3203 read_exec_only = (ldt_info.flags >> 3) & 1;
3204 limit_in_pages = (ldt_info.flags >> 4) & 1;
3205 seg_not_present = (ldt_info.flags >> 5) & 1;
3206 useable = (ldt_info.flags >> 6) & 1;
bellard8d18e892007-11-14 15:18:40 +00003207#ifdef TARGET_ABI32
3208 lm = 0;
3209#else
3210 lm = (ldt_info.flags >> 7) & 1;
3211#endif
bellard6dbad632003-03-16 18:05:05 +00003212 if (contents == 3) {
3213 if (oldmode)
bellard03acab62007-11-11 14:57:14 +00003214 return -TARGET_EINVAL;
bellard6dbad632003-03-16 18:05:05 +00003215 if (seg_not_present == 0)
bellard03acab62007-11-11 14:57:14 +00003216 return -TARGET_EINVAL;
bellard6dbad632003-03-16 18:05:05 +00003217 }
3218 /* allocate the LDT */
3219 if (!ldt_table) {
balroge4415702008-11-10 02:55:33 +00003220 env->ldt.base = target_mmap(0,
3221 TARGET_LDT_ENTRIES * TARGET_LDT_ENTRY_SIZE,
3222 PROT_READ|PROT_WRITE,
3223 MAP_ANONYMOUS|MAP_PRIVATE, -1, 0);
3224 if (env->ldt.base == -1)
bellard03acab62007-11-11 14:57:14 +00003225 return -TARGET_ENOMEM;
balroge4415702008-11-10 02:55:33 +00003226 memset(g2h(env->ldt.base), 0,
3227 TARGET_LDT_ENTRIES * TARGET_LDT_ENTRY_SIZE);
bellard6dbad632003-03-16 18:05:05 +00003228 env->ldt.limit = 0xffff;
balroge4415702008-11-10 02:55:33 +00003229 ldt_table = g2h(env->ldt.base);
bellard6dbad632003-03-16 18:05:05 +00003230 }
3231
3232 /* NOTE: same code as Linux kernel */
3233 /* Allow LDTs to be cleared by the user. */
3234 if (ldt_info.base_addr == 0 && ldt_info.limit == 0) {
3235 if (oldmode ||
3236 (contents == 0 &&
3237 read_exec_only == 1 &&
3238 seg_32bit == 0 &&
3239 limit_in_pages == 0 &&
3240 seg_not_present == 1 &&
3241 useable == 0 )) {
3242 entry_1 = 0;
3243 entry_2 = 0;
3244 goto install;
3245 }
3246 }
ths3b46e622007-09-17 08:09:54 +00003247
bellard6dbad632003-03-16 18:05:05 +00003248 entry_1 = ((ldt_info.base_addr & 0x0000ffff) << 16) |
3249 (ldt_info.limit & 0x0ffff);
3250 entry_2 = (ldt_info.base_addr & 0xff000000) |
3251 ((ldt_info.base_addr & 0x00ff0000) >> 16) |
3252 (ldt_info.limit & 0xf0000) |
3253 ((read_exec_only ^ 1) << 9) |
3254 (contents << 10) |
3255 ((seg_not_present ^ 1) << 15) |
3256 (seg_32bit << 22) |
3257 (limit_in_pages << 23) |
bellard8d18e892007-11-14 15:18:40 +00003258 (lm << 21) |
bellard6dbad632003-03-16 18:05:05 +00003259 0x7000;
3260 if (!oldmode)
3261 entry_2 |= (useable << 20);
bellard14ae3ba2003-05-27 23:25:06 +00003262
bellard6dbad632003-03-16 18:05:05 +00003263 /* Install the new entry ... */
3264install:
3265 lp = (uint32_t *)(ldt_table + (ldt_info.entry_number << 3));
3266 lp[0] = tswap32(entry_1);
3267 lp[1] = tswap32(entry_2);
3268 return 0;
3269}
3270
3271/* specific and weird i386 syscalls */
blueswir18fcd3692008-08-17 20:26:25 +00003272static abi_long do_modify_ldt(CPUX86State *env, int func, abi_ulong ptr,
3273 unsigned long bytecount)
bellard6dbad632003-03-16 18:05:05 +00003274{
bellard03acab62007-11-11 14:57:14 +00003275 abi_long ret;
ths3b46e622007-09-17 08:09:54 +00003276
bellard6dbad632003-03-16 18:05:05 +00003277 switch (func) {
3278 case 0:
3279 ret = read_ldt(ptr, bytecount);
3280 break;
3281 case 1:
3282 ret = write_ldt(env, ptr, bytecount, 1);
3283 break;
3284 case 0x11:
3285 ret = write_ldt(env, ptr, bytecount, 0);
3286 break;
bellard03acab62007-11-11 14:57:14 +00003287 default:
3288 ret = -TARGET_ENOSYS;
3289 break;
bellard6dbad632003-03-16 18:05:05 +00003290 }
3291 return ret;
3292}
bellard1b6b0292003-03-22 17:31:38 +00003293
blueswir14583f582008-08-24 10:35:55 +00003294#if defined(TARGET_I386) && defined(TARGET_ABI32)
blueswir18fcd3692008-08-17 20:26:25 +00003295static abi_long do_set_thread_area(CPUX86State *env, abi_ulong ptr)
bellard8d18e892007-11-14 15:18:40 +00003296{
3297 uint64_t *gdt_table = g2h(env->gdt.base);
3298 struct target_modify_ldt_ldt_s ldt_info;
3299 struct target_modify_ldt_ldt_s *target_ldt_info;
3300 int seg_32bit, contents, read_exec_only, limit_in_pages;
3301 int seg_not_present, useable, lm;
3302 uint32_t *lp, entry_1, entry_2;
3303 int i;
3304
3305 lock_user_struct(VERIFY_WRITE, target_ldt_info, ptr, 1);
3306 if (!target_ldt_info)
3307 return -TARGET_EFAULT;
3308 ldt_info.entry_number = tswap32(target_ldt_info->entry_number);
3309 ldt_info.base_addr = tswapl(target_ldt_info->base_addr);
3310 ldt_info.limit = tswap32(target_ldt_info->limit);
3311 ldt_info.flags = tswap32(target_ldt_info->flags);
3312 if (ldt_info.entry_number == -1) {
3313 for (i=TARGET_GDT_ENTRY_TLS_MIN; i<=TARGET_GDT_ENTRY_TLS_MAX; i++) {
3314 if (gdt_table[i] == 0) {
3315 ldt_info.entry_number = i;
3316 target_ldt_info->entry_number = tswap32(i);
3317 break;
3318 }
3319 }
3320 }
3321 unlock_user_struct(target_ldt_info, ptr, 1);
3322
3323 if (ldt_info.entry_number < TARGET_GDT_ENTRY_TLS_MIN ||
3324 ldt_info.entry_number > TARGET_GDT_ENTRY_TLS_MAX)
3325 return -TARGET_EINVAL;
3326 seg_32bit = ldt_info.flags & 1;
3327 contents = (ldt_info.flags >> 1) & 3;
3328 read_exec_only = (ldt_info.flags >> 3) & 1;
3329 limit_in_pages = (ldt_info.flags >> 4) & 1;
3330 seg_not_present = (ldt_info.flags >> 5) & 1;
3331 useable = (ldt_info.flags >> 6) & 1;
3332#ifdef TARGET_ABI32
3333 lm = 0;
3334#else
3335 lm = (ldt_info.flags >> 7) & 1;
3336#endif
3337
3338 if (contents == 3) {
3339 if (seg_not_present == 0)
3340 return -TARGET_EINVAL;
3341 }
3342
3343 /* NOTE: same code as Linux kernel */
3344 /* Allow LDTs to be cleared by the user. */
3345 if (ldt_info.base_addr == 0 && ldt_info.limit == 0) {
3346 if ((contents == 0 &&
3347 read_exec_only == 1 &&
3348 seg_32bit == 0 &&
3349 limit_in_pages == 0 &&
3350 seg_not_present == 1 &&
3351 useable == 0 )) {
3352 entry_1 = 0;
3353 entry_2 = 0;
3354 goto install;
3355 }
3356 }
3357
3358 entry_1 = ((ldt_info.base_addr & 0x0000ffff) << 16) |
3359 (ldt_info.limit & 0x0ffff);
3360 entry_2 = (ldt_info.base_addr & 0xff000000) |
3361 ((ldt_info.base_addr & 0x00ff0000) >> 16) |
3362 (ldt_info.limit & 0xf0000) |
3363 ((read_exec_only ^ 1) << 9) |
3364 (contents << 10) |
3365 ((seg_not_present ^ 1) << 15) |
3366 (seg_32bit << 22) |
3367 (limit_in_pages << 23) |
3368 (useable << 20) |
3369 (lm << 21) |
3370 0x7000;
3371
3372 /* Install the new entry ... */
3373install:
3374 lp = (uint32_t *)(gdt_table + ldt_info.entry_number);
3375 lp[0] = tswap32(entry_1);
3376 lp[1] = tswap32(entry_2);
3377 return 0;
3378}
3379
blueswir18fcd3692008-08-17 20:26:25 +00003380static abi_long do_get_thread_area(CPUX86State *env, abi_ulong ptr)
bellard8d18e892007-11-14 15:18:40 +00003381{
3382 struct target_modify_ldt_ldt_s *target_ldt_info;
3383 uint64_t *gdt_table = g2h(env->gdt.base);
3384 uint32_t base_addr, limit, flags;
3385 int seg_32bit, contents, read_exec_only, limit_in_pages, idx;
3386 int seg_not_present, useable, lm;
3387 uint32_t *lp, entry_1, entry_2;
3388
3389 lock_user_struct(VERIFY_WRITE, target_ldt_info, ptr, 1);
3390 if (!target_ldt_info)
3391 return -TARGET_EFAULT;
3392 idx = tswap32(target_ldt_info->entry_number);
3393 if (idx < TARGET_GDT_ENTRY_TLS_MIN ||
3394 idx > TARGET_GDT_ENTRY_TLS_MAX) {
3395 unlock_user_struct(target_ldt_info, ptr, 1);
3396 return -TARGET_EINVAL;
3397 }
3398 lp = (uint32_t *)(gdt_table + idx);
3399 entry_1 = tswap32(lp[0]);
3400 entry_2 = tswap32(lp[1]);
3401
3402 read_exec_only = ((entry_2 >> 9) & 1) ^ 1;
3403 contents = (entry_2 >> 10) & 3;
3404 seg_not_present = ((entry_2 >> 15) & 1) ^ 1;
3405 seg_32bit = (entry_2 >> 22) & 1;
3406 limit_in_pages = (entry_2 >> 23) & 1;
3407 useable = (entry_2 >> 20) & 1;
3408#ifdef TARGET_ABI32
3409 lm = 0;
3410#else
3411 lm = (entry_2 >> 21) & 1;
3412#endif
3413 flags = (seg_32bit << 0) | (contents << 1) |
3414 (read_exec_only << 3) | (limit_in_pages << 4) |
3415 (seg_not_present << 5) | (useable << 6) | (lm << 7);
3416 limit = (entry_1 & 0xffff) | (entry_2 & 0xf0000);
3417 base_addr = (entry_1 >> 16) |
3418 (entry_2 & 0xff000000) |
3419 ((entry_2 & 0xff) << 16);
3420 target_ldt_info->base_addr = tswapl(base_addr);
3421 target_ldt_info->limit = tswap32(limit);
3422 target_ldt_info->flags = tswap32(flags);
3423 unlock_user_struct(target_ldt_info, ptr, 1);
3424 return 0;
3425}
blueswir14583f582008-08-24 10:35:55 +00003426#endif /* TARGET_I386 && TARGET_ABI32 */
bellard8d18e892007-11-14 15:18:40 +00003427
bellardd2fd1af2007-11-14 18:08:56 +00003428#ifndef TARGET_ABI32
blueswir18fcd3692008-08-17 20:26:25 +00003429static abi_long do_arch_prctl(CPUX86State *env, int code, abi_ulong addr)
bellardd2fd1af2007-11-14 18:08:56 +00003430{
3431 abi_long ret;
3432 abi_ulong val;
3433 int idx;
3434
3435 switch(code) {
3436 case TARGET_ARCH_SET_GS:
3437 case TARGET_ARCH_SET_FS:
3438 if (code == TARGET_ARCH_SET_GS)
3439 idx = R_GS;
3440 else
3441 idx = R_FS;
3442 cpu_x86_load_seg(env, idx, 0);
3443 env->segs[idx].base = addr;
3444 break;
3445 case TARGET_ARCH_GET_GS:
3446 case TARGET_ARCH_GET_FS:
3447 if (code == TARGET_ARCH_GET_GS)
3448 idx = R_GS;
3449 else
3450 idx = R_FS;
3451 val = env->segs[idx].base;
3452 if (put_user(val, addr, abi_ulong))
3453 return -TARGET_EFAULT;
3454 break;
3455 default:
3456 ret = -TARGET_EINVAL;
3457 break;
3458 }
3459 return 0;
3460}
3461#endif
3462
bellard2ab83ea2003-06-15 19:56:46 +00003463#endif /* defined(TARGET_I386) */
3464
Juan Quintela2f7bb872009-07-27 16:13:24 +02003465#if defined(CONFIG_USE_NPTL)
pbrookd865bab2008-06-07 22:12:17 +00003466
3467#define NEW_STACK_SIZE PTHREAD_STACK_MIN
3468
3469static pthread_mutex_t clone_lock = PTHREAD_MUTEX_INITIALIZER;
3470typedef struct {
3471 CPUState *env;
3472 pthread_mutex_t mutex;
3473 pthread_cond_t cond;
3474 pthread_t thread;
3475 uint32_t tid;
3476 abi_ulong child_tidptr;
3477 abi_ulong parent_tidptr;
3478 sigset_t sigmask;
3479} new_thread_info;
3480
3481static void *clone_func(void *arg)
3482{
3483 new_thread_info *info = arg;
3484 CPUState *env;
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03003485 TaskState *ts;
pbrookd865bab2008-06-07 22:12:17 +00003486
3487 env = info->env;
3488 thread_env = env;
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03003489 ts = (TaskState *)thread_env->opaque;
pbrookd865bab2008-06-07 22:12:17 +00003490 info->tid = gettid();
Nathan Froyd1e9fa732009-06-03 11:33:08 -07003491 env->host_tid = info->tid;
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03003492 task_settid(ts);
pbrookd865bab2008-06-07 22:12:17 +00003493 if (info->child_tidptr)
3494 put_user_u32(info->tid, info->child_tidptr);
3495 if (info->parent_tidptr)
3496 put_user_u32(info->tid, info->parent_tidptr);
3497 /* Enable signals. */
3498 sigprocmask(SIG_SETMASK, &info->sigmask, NULL);
3499 /* Signal to the parent that we're ready. */
3500 pthread_mutex_lock(&info->mutex);
3501 pthread_cond_broadcast(&info->cond);
3502 pthread_mutex_unlock(&info->mutex);
3503 /* Wait until the parent has finshed initializing the tls state. */
3504 pthread_mutex_lock(&clone_lock);
3505 pthread_mutex_unlock(&clone_lock);
3506 cpu_loop(env);
3507 /* never exits */
3508 return NULL;
3509}
3510#else
bellard1b6b0292003-03-22 17:31:38 +00003511/* this stack is the equivalent of the kernel stack associated with a
3512 thread/process */
3513#define NEW_STACK_SIZE 8192
3514
3515static int clone_func(void *arg)
3516{
bellard2ab83ea2003-06-15 19:56:46 +00003517 CPUState *env = arg;
bellard1b6b0292003-03-22 17:31:38 +00003518 cpu_loop(env);
3519 /* never exits */
3520 return 0;
3521}
pbrookd865bab2008-06-07 22:12:17 +00003522#endif
bellard1b6b0292003-03-22 17:31:38 +00003523
ths0da46a62007-10-20 20:23:07 +00003524/* do_fork() Must return host values and target errnos (unlike most
3525 do_*() functions). */
pbrookd865bab2008-06-07 22:12:17 +00003526static int do_fork(CPUState *env, unsigned int flags, abi_ulong newsp,
3527 abi_ulong parent_tidptr, target_ulong newtls,
3528 abi_ulong child_tidptr)
bellard1b6b0292003-03-22 17:31:38 +00003529{
3530 int ret;
bellard5cd43932003-03-29 16:54:36 +00003531 TaskState *ts;
bellard1b6b0292003-03-22 17:31:38 +00003532 uint8_t *new_stack;
bellard2ab83ea2003-06-15 19:56:46 +00003533 CPUState *new_env;
Juan Quintela2f7bb872009-07-27 16:13:24 +02003534#if defined(CONFIG_USE_NPTL)
pbrookd865bab2008-06-07 22:12:17 +00003535 unsigned int nptl_flags;
3536 sigset_t sigmask;
3537#endif
ths3b46e622007-09-17 08:09:54 +00003538
balrog436d1242008-09-21 02:39:45 +00003539 /* Emulate vfork() with fork() */
3540 if (flags & CLONE_VFORK)
3541 flags &= ~(CLONE_VFORK | CLONE_VM);
3542
bellard1b6b0292003-03-22 17:31:38 +00003543 if (flags & CLONE_VM) {
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03003544 TaskState *parent_ts = (TaskState *)env->opaque;
Juan Quintela2f7bb872009-07-27 16:13:24 +02003545#if defined(CONFIG_USE_NPTL)
pbrookd865bab2008-06-07 22:12:17 +00003546 new_thread_info info;
3547 pthread_attr_t attr;
pbrookbd0c5662008-05-29 14:34:11 +00003548#endif
pbrookc3a92832008-06-09 14:02:50 +00003549 ts = qemu_mallocz(sizeof(TaskState) + NEW_STACK_SIZE);
pbrook624f7972008-05-31 16:11:38 +00003550 init_task_state(ts);
bellard5cd43932003-03-29 16:54:36 +00003551 new_stack = ts->stack;
bellard1b6b0292003-03-22 17:31:38 +00003552 /* we create a new CPU instance. */
thsc5be9f02007-02-28 20:20:53 +00003553 new_env = cpu_copy(env);
pbrook6e68e072008-05-30 17:22:15 +00003554 /* Init regs that differ from the parent. */
3555 cpu_clone_regs(new_env, newsp);
bellard5cd43932003-03-29 16:54:36 +00003556 new_env->opaque = ts;
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03003557 ts->bprm = parent_ts->bprm;
3558 ts->info = parent_ts->info;
Juan Quintela2f7bb872009-07-27 16:13:24 +02003559#if defined(CONFIG_USE_NPTL)
pbrookd865bab2008-06-07 22:12:17 +00003560 nptl_flags = flags;
3561 flags &= ~CLONE_NPTL_FLAGS2;
3562
pbrookc2764712009-03-07 15:24:59 +00003563 if (nptl_flags & CLONE_CHILD_CLEARTID) {
3564 ts->child_tidptr = child_tidptr;
3565 }
3566
pbrookd865bab2008-06-07 22:12:17 +00003567 if (nptl_flags & CLONE_SETTLS)
3568 cpu_set_tls (new_env, newtls);
3569
3570 /* Grab a mutex so that thread setup appears atomic. */
3571 pthread_mutex_lock(&clone_lock);
3572
3573 memset(&info, 0, sizeof(info));
3574 pthread_mutex_init(&info.mutex, NULL);
3575 pthread_mutex_lock(&info.mutex);
3576 pthread_cond_init(&info.cond, NULL);
3577 info.env = new_env;
3578 if (nptl_flags & CLONE_CHILD_SETTID)
3579 info.child_tidptr = child_tidptr;
3580 if (nptl_flags & CLONE_PARENT_SETTID)
3581 info.parent_tidptr = parent_tidptr;
3582
3583 ret = pthread_attr_init(&attr);
3584 ret = pthread_attr_setstack(&attr, new_stack, NEW_STACK_SIZE);
3585 /* It is not safe to deliver signals until the child has finished
3586 initializing, so temporarily block all signals. */
3587 sigfillset(&sigmask);
3588 sigprocmask(SIG_BLOCK, &sigmask, &info.sigmask);
3589
3590 ret = pthread_create(&info.thread, &attr, clone_func, &info);
pbrookc2764712009-03-07 15:24:59 +00003591 /* TODO: Free new CPU state if thread creation failed. */
pbrookd865bab2008-06-07 22:12:17 +00003592
3593 sigprocmask(SIG_SETMASK, &info.sigmask, NULL);
3594 pthread_attr_destroy(&attr);
3595 if (ret == 0) {
3596 /* Wait for the child to initialize. */
3597 pthread_cond_wait(&info.cond, &info.mutex);
3598 ret = info.tid;
3599 if (flags & CLONE_PARENT_SETTID)
3600 put_user_u32(ret, parent_tidptr);
3601 } else {
3602 ret = -1;
3603 }
3604 pthread_mutex_unlock(&info.mutex);
3605 pthread_cond_destroy(&info.cond);
3606 pthread_mutex_destroy(&info.mutex);
3607 pthread_mutex_unlock(&clone_lock);
3608#else
3609 if (flags & CLONE_NPTL_FLAGS2)
3610 return -EINVAL;
3611 /* This is probably going to die very quickly, but do it anyway. */
bellard27725c12003-04-29 21:08:18 +00003612#ifdef __ia64__
bellardfd4a43e2006-04-24 20:32:17 +00003613 ret = __clone2(clone_func, new_stack + NEW_STACK_SIZE, flags, new_env);
bellard27725c12003-04-29 21:08:18 +00003614#else
3615 ret = clone(clone_func, new_stack + NEW_STACK_SIZE, flags, new_env);
3616#endif
pbrookd865bab2008-06-07 22:12:17 +00003617#endif
bellard1b6b0292003-03-22 17:31:38 +00003618 } else {
3619 /* if no CLONE_VM, we consider it is a fork */
pbrookd865bab2008-06-07 22:12:17 +00003620 if ((flags & ~(CSIGNAL | CLONE_NPTL_FLAGS2)) != 0)
bellard1b6b0292003-03-22 17:31:38 +00003621 return -EINVAL;
pbrookd865bab2008-06-07 22:12:17 +00003622 fork_start();
bellard1b6b0292003-03-22 17:31:38 +00003623 ret = fork();
pbrookd865bab2008-06-07 22:12:17 +00003624 if (ret == 0) {
aurel322b1319c2008-12-18 22:44:04 +00003625 /* Child Process. */
pbrookd865bab2008-06-07 22:12:17 +00003626 cpu_clone_regs(env, newsp);
3627 fork_end(1);
Juan Quintela2f7bb872009-07-27 16:13:24 +02003628#if defined(CONFIG_USE_NPTL)
aurel322b1319c2008-12-18 22:44:04 +00003629 /* There is a race condition here. The parent process could
3630 theoretically read the TID in the child process before the child
3631 tid is set. This would require using either ptrace
3632 (not implemented) or having *_tidptr to point at a shared memory
3633 mapping. We can't repeat the spinlock hack used above because
3634 the child process gets its own copy of the lock. */
pbrookd865bab2008-06-07 22:12:17 +00003635 if (flags & CLONE_CHILD_SETTID)
3636 put_user_u32(gettid(), child_tidptr);
3637 if (flags & CLONE_PARENT_SETTID)
3638 put_user_u32(gettid(), parent_tidptr);
3639 ts = (TaskState *)env->opaque;
3640 if (flags & CLONE_SETTLS)
3641 cpu_set_tls (env, newtls);
pbrookc2764712009-03-07 15:24:59 +00003642 if (flags & CLONE_CHILD_CLEARTID)
3643 ts->child_tidptr = child_tidptr;
aurel322b1319c2008-12-18 22:44:04 +00003644#endif
pbrookd865bab2008-06-07 22:12:17 +00003645 } else {
3646 fork_end(0);
3647 }
bellard1b6b0292003-03-22 17:31:38 +00003648 }
3649 return ret;
3650}
3651
Arnaud Patard (Rtp)5f106812009-06-03 14:35:04 +02003652/* warning : doesn't handle linux specific flags... */
3653static int target_to_host_fcntl_cmd(int cmd)
3654{
3655 switch(cmd) {
3656 case TARGET_F_DUPFD:
3657 case TARGET_F_GETFD:
3658 case TARGET_F_SETFD:
3659 case TARGET_F_GETFL:
3660 case TARGET_F_SETFL:
3661 return cmd;
3662 case TARGET_F_GETLK:
3663 return F_GETLK;
3664 case TARGET_F_SETLK:
3665 return F_SETLK;
3666 case TARGET_F_SETLKW:
3667 return F_SETLKW;
3668 case TARGET_F_GETOWN:
3669 return F_GETOWN;
3670 case TARGET_F_SETOWN:
3671 return F_SETOWN;
3672 case TARGET_F_GETSIG:
3673 return F_GETSIG;
3674 case TARGET_F_SETSIG:
3675 return F_SETSIG;
3676#if TARGET_ABI_BITS == 32
3677 case TARGET_F_GETLK64:
3678 return F_GETLK64;
3679 case TARGET_F_SETLK64:
3680 return F_SETLK64;
3681 case TARGET_F_SETLKW64:
3682 return F_SETLKW64;
3683#endif
Ulrich Hecht7e22e542009-07-24 19:10:27 +02003684 case TARGET_F_SETLEASE:
3685 return F_SETLEASE;
3686 case TARGET_F_GETLEASE:
3687 return F_GETLEASE;
3688 case TARGET_F_DUPFD_CLOEXEC:
3689 return F_DUPFD_CLOEXEC;
3690 case TARGET_F_NOTIFY:
3691 return F_NOTIFY;
Arnaud Patard (Rtp)5f106812009-06-03 14:35:04 +02003692 default:
3693 return -TARGET_EINVAL;
3694 }
3695 return -TARGET_EINVAL;
3696}
3697
blueswir1992f48a2007-10-14 16:27:31 +00003698static abi_long do_fcntl(int fd, int cmd, abi_ulong arg)
bellard7775e9e2003-05-14 22:46:48 +00003699{
3700 struct flock fl;
pbrook53a59602006-03-25 19:31:22 +00003701 struct target_flock *target_fl;
ths43f238d2007-01-05 20:55:49 +00003702 struct flock64 fl64;
3703 struct target_flock64 *target_fl64;
blueswir1992f48a2007-10-14 16:27:31 +00003704 abi_long ret;
Arnaud Patard (Rtp)5f106812009-06-03 14:35:04 +02003705 int host_cmd = target_to_host_fcntl_cmd(cmd);
3706
3707 if (host_cmd == -TARGET_EINVAL)
3708 return host_cmd;
pbrook53a59602006-03-25 19:31:22 +00003709
bellard7775e9e2003-05-14 22:46:48 +00003710 switch(cmd) {
3711 case TARGET_F_GETLK:
bellard579a97f2007-11-11 14:26:47 +00003712 if (!lock_user_struct(VERIFY_READ, target_fl, arg, 1))
3713 return -TARGET_EFAULT;
ths58134272007-03-31 18:59:32 +00003714 fl.l_type = tswap16(target_fl->l_type);
3715 fl.l_whence = tswap16(target_fl->l_whence);
3716 fl.l_start = tswapl(target_fl->l_start);
3717 fl.l_len = tswapl(target_fl->l_len);
Ulrich Hecht7e22e542009-07-24 19:10:27 +02003718 fl.l_pid = tswap32(target_fl->l_pid);
ths58134272007-03-31 18:59:32 +00003719 unlock_user_struct(target_fl, arg, 0);
Arnaud Patard (Rtp)5f106812009-06-03 14:35:04 +02003720 ret = get_errno(fcntl(fd, host_cmd, &fl));
bellard7775e9e2003-05-14 22:46:48 +00003721 if (ret == 0) {
bellard579a97f2007-11-11 14:26:47 +00003722 if (!lock_user_struct(VERIFY_WRITE, target_fl, arg, 0))
3723 return -TARGET_EFAULT;
bellard7775e9e2003-05-14 22:46:48 +00003724 target_fl->l_type = tswap16(fl.l_type);
3725 target_fl->l_whence = tswap16(fl.l_whence);
3726 target_fl->l_start = tswapl(fl.l_start);
3727 target_fl->l_len = tswapl(fl.l_len);
Ulrich Hecht7e22e542009-07-24 19:10:27 +02003728 target_fl->l_pid = tswap32(fl.l_pid);
pbrook53a59602006-03-25 19:31:22 +00003729 unlock_user_struct(target_fl, arg, 1);
bellard7775e9e2003-05-14 22:46:48 +00003730 }
3731 break;
ths3b46e622007-09-17 08:09:54 +00003732
bellard7775e9e2003-05-14 22:46:48 +00003733 case TARGET_F_SETLK:
3734 case TARGET_F_SETLKW:
bellard579a97f2007-11-11 14:26:47 +00003735 if (!lock_user_struct(VERIFY_READ, target_fl, arg, 1))
3736 return -TARGET_EFAULT;
bellard7775e9e2003-05-14 22:46:48 +00003737 fl.l_type = tswap16(target_fl->l_type);
3738 fl.l_whence = tswap16(target_fl->l_whence);
3739 fl.l_start = tswapl(target_fl->l_start);
3740 fl.l_len = tswapl(target_fl->l_len);
Ulrich Hecht7e22e542009-07-24 19:10:27 +02003741 fl.l_pid = tswap32(target_fl->l_pid);
pbrook53a59602006-03-25 19:31:22 +00003742 unlock_user_struct(target_fl, arg, 0);
Arnaud Patard (Rtp)5f106812009-06-03 14:35:04 +02003743 ret = get_errno(fcntl(fd, host_cmd, &fl));
bellard7775e9e2003-05-14 22:46:48 +00003744 break;
ths3b46e622007-09-17 08:09:54 +00003745
bellard7775e9e2003-05-14 22:46:48 +00003746 case TARGET_F_GETLK64:
bellard579a97f2007-11-11 14:26:47 +00003747 if (!lock_user_struct(VERIFY_READ, target_fl64, arg, 1))
3748 return -TARGET_EFAULT;
ths58134272007-03-31 18:59:32 +00003749 fl64.l_type = tswap16(target_fl64->l_type) >> 1;
3750 fl64.l_whence = tswap16(target_fl64->l_whence);
3751 fl64.l_start = tswapl(target_fl64->l_start);
3752 fl64.l_len = tswapl(target_fl64->l_len);
Ulrich Hecht7e22e542009-07-24 19:10:27 +02003753 fl64.l_pid = tswap32(target_fl64->l_pid);
ths58134272007-03-31 18:59:32 +00003754 unlock_user_struct(target_fl64, arg, 0);
Arnaud Patard (Rtp)5f106812009-06-03 14:35:04 +02003755 ret = get_errno(fcntl(fd, host_cmd, &fl64));
ths43f238d2007-01-05 20:55:49 +00003756 if (ret == 0) {
bellard579a97f2007-11-11 14:26:47 +00003757 if (!lock_user_struct(VERIFY_WRITE, target_fl64, arg, 0))
3758 return -TARGET_EFAULT;
ths43f238d2007-01-05 20:55:49 +00003759 target_fl64->l_type = tswap16(fl64.l_type) >> 1;
3760 target_fl64->l_whence = tswap16(fl64.l_whence);
3761 target_fl64->l_start = tswapl(fl64.l_start);
3762 target_fl64->l_len = tswapl(fl64.l_len);
Ulrich Hecht7e22e542009-07-24 19:10:27 +02003763 target_fl64->l_pid = tswap32(fl64.l_pid);
ths43f238d2007-01-05 20:55:49 +00003764 unlock_user_struct(target_fl64, arg, 1);
3765 }
bellard9ee1fa22007-11-11 15:11:19 +00003766 break;
bellard7775e9e2003-05-14 22:46:48 +00003767 case TARGET_F_SETLK64:
3768 case TARGET_F_SETLKW64:
bellard579a97f2007-11-11 14:26:47 +00003769 if (!lock_user_struct(VERIFY_READ, target_fl64, arg, 1))
3770 return -TARGET_EFAULT;
ths43f238d2007-01-05 20:55:49 +00003771 fl64.l_type = tswap16(target_fl64->l_type) >> 1;
3772 fl64.l_whence = tswap16(target_fl64->l_whence);
3773 fl64.l_start = tswapl(target_fl64->l_start);
3774 fl64.l_len = tswapl(target_fl64->l_len);
Ulrich Hecht7e22e542009-07-24 19:10:27 +02003775 fl64.l_pid = tswap32(target_fl64->l_pid);
ths43f238d2007-01-05 20:55:49 +00003776 unlock_user_struct(target_fl64, arg, 0);
Arnaud Patard (Rtp)5f106812009-06-03 14:35:04 +02003777 ret = get_errno(fcntl(fd, host_cmd, &fl64));
bellard7775e9e2003-05-14 22:46:48 +00003778 break;
3779
Arnaud Patard (Rtp)5f106812009-06-03 14:35:04 +02003780 case TARGET_F_GETFL:
3781 ret = get_errno(fcntl(fd, host_cmd, arg));
bellard9ee1fa22007-11-11 15:11:19 +00003782 if (ret >= 0) {
3783 ret = host_to_target_bitmask(ret, fcntl_flags_tbl);
3784 }
bellardffa65c32004-01-04 23:57:22 +00003785 break;
3786
Arnaud Patard (Rtp)5f106812009-06-03 14:35:04 +02003787 case TARGET_F_SETFL:
3788 ret = get_errno(fcntl(fd, host_cmd, target_to_host_bitmask(arg, fcntl_flags_tbl)));
3789 break;
3790
3791 case TARGET_F_SETOWN:
3792 case TARGET_F_GETOWN:
3793 case TARGET_F_SETSIG:
3794 case TARGET_F_GETSIG:
Ulrich Hecht7e22e542009-07-24 19:10:27 +02003795 case TARGET_F_SETLEASE:
3796 case TARGET_F_GETLEASE:
Arnaud Patard (Rtp)5f106812009-06-03 14:35:04 +02003797 ret = get_errno(fcntl(fd, host_cmd, arg));
bellardffa65c32004-01-04 23:57:22 +00003798 break;
3799
bellard7775e9e2003-05-14 22:46:48 +00003800 default:
bellard9ee1fa22007-11-11 15:11:19 +00003801 ret = get_errno(fcntl(fd, cmd, arg));
bellard7775e9e2003-05-14 22:46:48 +00003802 break;
3803 }
3804 return ret;
3805}
3806
bellard67867302003-11-23 17:05:30 +00003807#ifdef USE_UID16
bellard7775e9e2003-05-14 22:46:48 +00003808
bellard67867302003-11-23 17:05:30 +00003809static inline int high2lowuid(int uid)
3810{
3811 if (uid > 65535)
3812 return 65534;
3813 else
3814 return uid;
3815}
3816
3817static inline int high2lowgid(int gid)
3818{
3819 if (gid > 65535)
3820 return 65534;
3821 else
3822 return gid;
3823}
3824
3825static inline int low2highuid(int uid)
3826{
3827 if ((int16_t)uid == -1)
3828 return -1;
3829 else
3830 return uid;
3831}
3832
3833static inline int low2highgid(int gid)
3834{
3835 if ((int16_t)gid == -1)
3836 return -1;
3837 else
3838 return gid;
3839}
3840
3841#endif /* USE_UID16 */
bellard1b6b0292003-03-22 17:31:38 +00003842
bellard31e31b82003-02-18 22:55:36 +00003843void syscall_init(void)
3844{
bellard2ab83ea2003-06-15 19:56:46 +00003845 IOCTLEntry *ie;
3846 const argtype *arg_type;
3847 int size;
thsb92c47c2007-11-01 00:07:38 +00003848 int i;
bellard2ab83ea2003-06-15 19:56:46 +00003849
Blue Swirl001faf32009-05-13 17:53:17 +00003850#define STRUCT(name, ...) thunk_register_struct(STRUCT_ ## name, #name, struct_ ## name ## _def);
ths5fafdf22007-09-16 21:08:06 +00003851#define STRUCT_SPECIAL(name) thunk_register_struct_direct(STRUCT_ ## name, #name, &struct_ ## name ## _def);
bellard31e31b82003-02-18 22:55:36 +00003852#include "syscall_types.h"
3853#undef STRUCT
3854#undef STRUCT_SPECIAL
bellard2ab83ea2003-06-15 19:56:46 +00003855
3856 /* we patch the ioctl size if necessary. We rely on the fact that
3857 no ioctl has all the bits at '1' in the size field */
3858 ie = ioctl_entries;
3859 while (ie->target_cmd != 0) {
3860 if (((ie->target_cmd >> TARGET_IOC_SIZESHIFT) & TARGET_IOC_SIZEMASK) ==
3861 TARGET_IOC_SIZEMASK) {
3862 arg_type = ie->arg_type;
3863 if (arg_type[0] != TYPE_PTR) {
ths5fafdf22007-09-16 21:08:06 +00003864 fprintf(stderr, "cannot patch size for ioctl 0x%x\n",
bellard2ab83ea2003-06-15 19:56:46 +00003865 ie->target_cmd);
3866 exit(1);
3867 }
3868 arg_type++;
3869 size = thunk_type_size(arg_type, 0);
ths5fafdf22007-09-16 21:08:06 +00003870 ie->target_cmd = (ie->target_cmd &
bellard2ab83ea2003-06-15 19:56:46 +00003871 ~(TARGET_IOC_SIZEMASK << TARGET_IOC_SIZESHIFT)) |
3872 (size << TARGET_IOC_SIZESHIFT);
3873 }
thsb92c47c2007-11-01 00:07:38 +00003874
3875 /* Build target_to_host_errno_table[] table from
3876 * host_to_target_errno_table[]. */
3877 for (i=0; i < ERRNO_TABLE_SIZE; i++)
3878 target_to_host_errno_table[host_to_target_errno_table[i]] = i;
3879
bellard2ab83ea2003-06-15 19:56:46 +00003880 /* automatic consistency check if same arch */
balrog872ea0c2008-09-21 02:31:19 +00003881#if (defined(__i386__) && defined(TARGET_I386) && defined(TARGET_ABI32)) || \
3882 (defined(__x86_64__) && defined(TARGET_X86_64))
3883 if (unlikely(ie->target_cmd != ie->host_cmd)) {
3884 fprintf(stderr, "ERROR: ioctl(%s): target=0x%x host=0x%x\n",
3885 ie->name, ie->target_cmd, ie->host_cmd);
bellard2ab83ea2003-06-15 19:56:46 +00003886 }
3887#endif
3888 ie++;
3889 }
bellard31e31b82003-02-18 22:55:36 +00003890}
bellardc573ff62004-01-04 15:51:36 +00003891
blueswir1992f48a2007-10-14 16:27:31 +00003892#if TARGET_ABI_BITS == 32
pbrookce4defa2006-02-09 16:49:55 +00003893static inline uint64_t target_offset64(uint32_t word0, uint32_t word1)
3894{
thsaf325d32008-06-10 15:29:15 +00003895#ifdef TARGET_WORDS_BIGENDIAN
pbrookce4defa2006-02-09 16:49:55 +00003896 return ((uint64_t)word0 << 32) | word1;
3897#else
3898 return ((uint64_t)word1 << 32) | word0;
3899#endif
3900}
blueswir1992f48a2007-10-14 16:27:31 +00003901#else /* TARGET_ABI_BITS == 32 */
j_mayer32407102007-09-26 23:01:49 +00003902static inline uint64_t target_offset64(uint64_t word0, uint64_t word1)
3903{
3904 return word0;
3905}
blueswir1992f48a2007-10-14 16:27:31 +00003906#endif /* TARGET_ABI_BITS != 32 */
pbrookce4defa2006-02-09 16:49:55 +00003907
3908#ifdef TARGET_NR_truncate64
blueswir1992f48a2007-10-14 16:27:31 +00003909static inline abi_long target_truncate64(void *cpu_env, const char *arg1,
3910 abi_long arg2,
3911 abi_long arg3,
3912 abi_long arg4)
pbrookce4defa2006-02-09 16:49:55 +00003913{
3914#ifdef TARGET_ARM
3915 if (((CPUARMState *)cpu_env)->eabi)
3916 {
3917 arg2 = arg3;
3918 arg3 = arg4;
3919 }
3920#endif
3921 return get_errno(truncate64(arg1, target_offset64(arg2, arg3)));
3922}
3923#endif
3924
3925#ifdef TARGET_NR_ftruncate64
blueswir1992f48a2007-10-14 16:27:31 +00003926static inline abi_long target_ftruncate64(void *cpu_env, abi_long arg1,
3927 abi_long arg2,
3928 abi_long arg3,
3929 abi_long arg4)
pbrookce4defa2006-02-09 16:49:55 +00003930{
3931#ifdef TARGET_ARM
3932 if (((CPUARMState *)cpu_env)->eabi)
3933 {
3934 arg2 = arg3;
3935 arg3 = arg4;
3936 }
3937#endif
3938 return get_errno(ftruncate64(arg1, target_offset64(arg2, arg3)));
3939}
3940#endif
3941
bellard579a97f2007-11-11 14:26:47 +00003942static inline abi_long target_to_host_timespec(struct timespec *host_ts,
3943 abi_ulong target_addr)
pbrook53a59602006-03-25 19:31:22 +00003944{
3945 struct target_timespec *target_ts;
3946
bellard579a97f2007-11-11 14:26:47 +00003947 if (!lock_user_struct(VERIFY_READ, target_ts, target_addr, 1))
3948 return -TARGET_EFAULT;
pbrook53a59602006-03-25 19:31:22 +00003949 host_ts->tv_sec = tswapl(target_ts->tv_sec);
3950 host_ts->tv_nsec = tswapl(target_ts->tv_nsec);
3951 unlock_user_struct(target_ts, target_addr, 0);
bellardb255bfa2008-05-10 21:51:02 +00003952 return 0;
pbrook53a59602006-03-25 19:31:22 +00003953}
3954
bellard579a97f2007-11-11 14:26:47 +00003955static inline abi_long host_to_target_timespec(abi_ulong target_addr,
3956 struct timespec *host_ts)
pbrook53a59602006-03-25 19:31:22 +00003957{
3958 struct target_timespec *target_ts;
3959
bellard579a97f2007-11-11 14:26:47 +00003960 if (!lock_user_struct(VERIFY_WRITE, target_ts, target_addr, 0))
3961 return -TARGET_EFAULT;
pbrook53a59602006-03-25 19:31:22 +00003962 target_ts->tv_sec = tswapl(host_ts->tv_sec);
3963 target_ts->tv_nsec = tswapl(host_ts->tv_nsec);
3964 unlock_user_struct(target_ts, target_addr, 1);
bellardb255bfa2008-05-10 21:51:02 +00003965 return 0;
pbrook53a59602006-03-25 19:31:22 +00003966}
3967
aurel329d33b762009-04-08 23:07:05 +00003968#if defined(TARGET_NR_stat64) || defined(TARGET_NR_newfstatat)
balrog6a24a772008-09-20 02:23:36 +00003969static inline abi_long host_to_target_stat64(void *cpu_env,
3970 abi_ulong target_addr,
3971 struct stat *host_st)
3972{
3973#ifdef TARGET_ARM
3974 if (((CPUARMState *)cpu_env)->eabi) {
3975 struct target_eabi_stat64 *target_st;
3976
3977 if (!lock_user_struct(VERIFY_WRITE, target_st, target_addr, 0))
3978 return -TARGET_EFAULT;
3979 memset(target_st, 0, sizeof(struct target_eabi_stat64));
3980 __put_user(host_st->st_dev, &target_st->st_dev);
3981 __put_user(host_st->st_ino, &target_st->st_ino);
3982#ifdef TARGET_STAT64_HAS_BROKEN_ST_INO
3983 __put_user(host_st->st_ino, &target_st->__st_ino);
3984#endif
3985 __put_user(host_st->st_mode, &target_st->st_mode);
3986 __put_user(host_st->st_nlink, &target_st->st_nlink);
3987 __put_user(host_st->st_uid, &target_st->st_uid);
3988 __put_user(host_st->st_gid, &target_st->st_gid);
3989 __put_user(host_st->st_rdev, &target_st->st_rdev);
3990 __put_user(host_st->st_size, &target_st->st_size);
3991 __put_user(host_st->st_blksize, &target_st->st_blksize);
3992 __put_user(host_st->st_blocks, &target_st->st_blocks);
3993 __put_user(host_st->st_atime, &target_st->target_st_atime);
3994 __put_user(host_st->st_mtime, &target_st->target_st_mtime);
3995 __put_user(host_st->st_ctime, &target_st->target_st_ctime);
3996 unlock_user_struct(target_st, target_addr, 1);
3997 } else
3998#endif
3999 {
aurel329d33b762009-04-08 23:07:05 +00004000#if TARGET_LONG_BITS == 64
4001 struct target_stat *target_st;
4002#else
balrog6a24a772008-09-20 02:23:36 +00004003 struct target_stat64 *target_st;
aurel329d33b762009-04-08 23:07:05 +00004004#endif
balrog6a24a772008-09-20 02:23:36 +00004005
4006 if (!lock_user_struct(VERIFY_WRITE, target_st, target_addr, 0))
4007 return -TARGET_EFAULT;
aurel329d33b762009-04-08 23:07:05 +00004008 memset(target_st, 0, sizeof(*target_st));
balrog6a24a772008-09-20 02:23:36 +00004009 __put_user(host_st->st_dev, &target_st->st_dev);
4010 __put_user(host_st->st_ino, &target_st->st_ino);
4011#ifdef TARGET_STAT64_HAS_BROKEN_ST_INO
4012 __put_user(host_st->st_ino, &target_st->__st_ino);
4013#endif
4014 __put_user(host_st->st_mode, &target_st->st_mode);
4015 __put_user(host_st->st_nlink, &target_st->st_nlink);
4016 __put_user(host_st->st_uid, &target_st->st_uid);
4017 __put_user(host_st->st_gid, &target_st->st_gid);
4018 __put_user(host_st->st_rdev, &target_st->st_rdev);
4019 /* XXX: better use of kernel struct */
4020 __put_user(host_st->st_size, &target_st->st_size);
4021 __put_user(host_st->st_blksize, &target_st->st_blksize);
4022 __put_user(host_st->st_blocks, &target_st->st_blocks);
4023 __put_user(host_st->st_atime, &target_st->target_st_atime);
4024 __put_user(host_st->st_mtime, &target_st->target_st_mtime);
4025 __put_user(host_st->st_ctime, &target_st->target_st_ctime);
4026 unlock_user_struct(target_st, target_addr, 1);
4027 }
4028
4029 return 0;
4030}
4031#endif
4032
Juan Quintela2f7bb872009-07-27 16:13:24 +02004033#if defined(CONFIG_USE_NPTL)
pbrookbd0c5662008-05-29 14:34:11 +00004034/* ??? Using host futex calls even when target atomic operations
4035 are not really atomic probably breaks things. However implementing
4036 futexes locally would make futexes shared between multiple processes
4037 tricky. However they're probably useless because guest atomic
4038 operations won't work either. */
blueswir18fcd3692008-08-17 20:26:25 +00004039static int do_futex(target_ulong uaddr, int op, int val, target_ulong timeout,
4040 target_ulong uaddr2, int val3)
pbrookbd0c5662008-05-29 14:34:11 +00004041{
4042 struct timespec ts, *pts;
Nathan Froyda16aae02009-08-03 08:43:29 -07004043 int base_op;
pbrookbd0c5662008-05-29 14:34:11 +00004044
4045 /* ??? We assume FUTEX_* constants are the same on both host
4046 and target. */
Martin Mohringa29ccd62009-05-04 21:34:56 +03004047#ifdef FUTEX_CMD_MASK
Nathan Froyda16aae02009-08-03 08:43:29 -07004048 base_op = op & FUTEX_CMD_MASK;
Martin Mohringa29ccd62009-05-04 21:34:56 +03004049#else
Nathan Froyda16aae02009-08-03 08:43:29 -07004050 base_op = op;
Martin Mohringa29ccd62009-05-04 21:34:56 +03004051#endif
Nathan Froyda16aae02009-08-03 08:43:29 -07004052 switch (base_op) {
pbrookbd0c5662008-05-29 14:34:11 +00004053 case FUTEX_WAIT:
4054 if (timeout) {
4055 pts = &ts;
4056 target_to_host_timespec(pts, timeout);
4057 } else {
4058 pts = NULL;
4059 }
Martin Mohringa29ccd62009-05-04 21:34:56 +03004060 return get_errno(sys_futex(g2h(uaddr), op, tswap32(val),
pbrookbd0c5662008-05-29 14:34:11 +00004061 pts, NULL, 0));
4062 case FUTEX_WAKE:
Martin Mohringa29ccd62009-05-04 21:34:56 +03004063 return get_errno(sys_futex(g2h(uaddr), op, val, NULL, NULL, 0));
pbrookbd0c5662008-05-29 14:34:11 +00004064 case FUTEX_FD:
Martin Mohringa29ccd62009-05-04 21:34:56 +03004065 return get_errno(sys_futex(g2h(uaddr), op, val, NULL, NULL, 0));
pbrookbd0c5662008-05-29 14:34:11 +00004066 case FUTEX_REQUEUE:
pbrookbd0c5662008-05-29 14:34:11 +00004067 case FUTEX_CMP_REQUEUE:
Nathan Froyda16aae02009-08-03 08:43:29 -07004068 case FUTEX_WAKE_OP:
4069 /* For FUTEX_REQUEUE, FUTEX_CMP_REQUEUE, and FUTEX_WAKE_OP, the
4070 TIMEOUT parameter is interpreted as a uint32_t by the kernel.
4071 But the prototype takes a `struct timespec *'; insert casts
4072 to satisfy the compiler. We do not need to tswap TIMEOUT
4073 since it's not compared to guest memory. */
4074 pts = (struct timespec *)(uintptr_t) timeout;
4075 return get_errno(sys_futex(g2h(uaddr), op, val, pts,
4076 g2h(uaddr2),
4077 (base_op == FUTEX_CMP_REQUEUE
4078 ? tswap32(val3)
4079 : val3)));
pbrookbd0c5662008-05-29 14:34:11 +00004080 default:
4081 return -TARGET_ENOSYS;
4082 }
4083}
4084#endif
4085
pbrook1d9d8b52009-04-16 15:17:02 +00004086/* Map host to target signal numbers for the wait family of syscalls.
4087 Assume all other status bits are the same. */
4088static int host_to_target_waitstatus(int status)
4089{
4090 if (WIFSIGNALED(status)) {
4091 return host_to_target_signal(WTERMSIG(status)) | (status & ~0x7f);
4092 }
4093 if (WIFSTOPPED(status)) {
4094 return (host_to_target_signal(WSTOPSIG(status)) << 8)
4095 | (status & 0xff);
4096 }
4097 return status;
4098}
4099
pbrooka745ec62008-05-06 15:36:17 +00004100int get_osversion(void)
4101{
4102 static int osversion;
4103 struct new_utsname buf;
4104 const char *s;
4105 int i, n, tmp;
4106 if (osversion)
4107 return osversion;
4108 if (qemu_uname_release && *qemu_uname_release) {
4109 s = qemu_uname_release;
4110 } else {
4111 if (sys_uname(&buf))
4112 return 0;
4113 s = buf.release;
4114 }
4115 tmp = 0;
4116 for (i = 0; i < 3; i++) {
4117 n = 0;
4118 while (*s >= '0' && *s <= '9') {
4119 n *= 10;
4120 n += *s - '0';
4121 s++;
4122 }
4123 tmp = (tmp << 8) + n;
4124 if (*s == '.')
4125 s++;
4126 }
4127 osversion = tmp;
4128 return osversion;
4129}
4130
ths0da46a62007-10-20 20:23:07 +00004131/* do_syscall() should always have a single exit point at the end so
4132 that actions, such as logging of syscall results, can be performed.
4133 All errnos that do_syscall() returns must be -TARGET_<errcode>. */
blueswir1992f48a2007-10-14 16:27:31 +00004134abi_long do_syscall(void *cpu_env, int num, abi_long arg1,
4135 abi_long arg2, abi_long arg3, abi_long arg4,
4136 abi_long arg5, abi_long arg6)
bellard31e31b82003-02-18 22:55:36 +00004137{
blueswir1992f48a2007-10-14 16:27:31 +00004138 abi_long ret;
bellard31e31b82003-02-18 22:55:36 +00004139 struct stat st;
bellard56c8f682005-11-28 22:28:41 +00004140 struct statfs stfs;
pbrook53a59602006-03-25 19:31:22 +00004141 void *p;
ths3b46e622007-09-17 08:09:54 +00004142
bellard72f03902003-02-18 23:33:18 +00004143#ifdef DEBUG
bellardc573ff62004-01-04 15:51:36 +00004144 gemu_log("syscall %d", num);
bellard72f03902003-02-18 23:33:18 +00004145#endif
thsb92c47c2007-11-01 00:07:38 +00004146 if(do_strace)
4147 print_syscall(num, arg1, arg2, arg3, arg4, arg5, arg6);
4148
bellard31e31b82003-02-18 22:55:36 +00004149 switch(num) {
4150 case TARGET_NR_exit:
Juan Quintela2f7bb872009-07-27 16:13:24 +02004151#ifdef CONFIG_USE_NPTL
pbrookc2764712009-03-07 15:24:59 +00004152 /* In old applications this may be used to implement _exit(2).
4153 However in threaded applictions it is used for thread termination,
4154 and _exit_group is used for application termination.
4155 Do thread termination if we have more then one thread. */
4156 /* FIXME: This probably breaks if a signal arrives. We should probably
4157 be disabling signals. */
4158 if (first_cpu->next_cpu) {
Nathan Froyd1e9fa732009-06-03 11:33:08 -07004159 TaskState *ts;
pbrookc2764712009-03-07 15:24:59 +00004160 CPUState **lastp;
4161 CPUState *p;
4162
4163 cpu_list_lock();
4164 lastp = &first_cpu;
4165 p = first_cpu;
4166 while (p && p != (CPUState *)cpu_env) {
4167 lastp = &p->next_cpu;
4168 p = p->next_cpu;
4169 }
4170 /* If we didn't find the CPU for this thread then something is
4171 horribly wrong. */
4172 if (!p)
4173 abort();
4174 /* Remove the CPU from the list. */
4175 *lastp = p->next_cpu;
4176 cpu_list_unlock();
Nathan Froyd1e9fa732009-06-03 11:33:08 -07004177 ts = ((CPUState *)cpu_env)->opaque;
pbrookc2764712009-03-07 15:24:59 +00004178 if (ts->child_tidptr) {
4179 put_user_u32(0, ts->child_tidptr);
4180 sys_futex(g2h(ts->child_tidptr), FUTEX_WAKE, INT_MAX,
4181 NULL, NULL, 0);
4182 }
4183 /* TODO: Free CPU state. */
4184 pthread_exit(NULL);
4185 }
4186#endif
Juan Quintela9788c9c2009-07-27 16:13:02 +02004187#ifdef TARGET_GPROF
bellard7d132992003-03-06 23:23:54 +00004188 _mcleanup();
4189#endif
bellarde9009672005-04-26 20:42:36 +00004190 gdb_exit(cpu_env, arg1);
pbrookc2764712009-03-07 15:24:59 +00004191 _exit(arg1);
bellard31e31b82003-02-18 22:55:36 +00004192 ret = 0; /* avoid warning */
4193 break;
4194 case TARGET_NR_read:
aurel3238d840e2009-01-30 19:48:17 +00004195 if (arg3 == 0)
4196 ret = 0;
4197 else {
4198 if (!(p = lock_user(VERIFY_WRITE, arg2, arg3, 0)))
4199 goto efault;
4200 ret = get_errno(read(arg1, p, arg3));
4201 unlock_user(p, arg2, ret);
4202 }
bellard31e31b82003-02-18 22:55:36 +00004203 break;
4204 case TARGET_NR_write:
bellard579a97f2007-11-11 14:26:47 +00004205 if (!(p = lock_user(VERIFY_READ, arg2, arg3, 1)))
4206 goto efault;
pbrook53a59602006-03-25 19:31:22 +00004207 ret = get_errno(write(arg1, p, arg3));
4208 unlock_user(p, arg2, 0);
bellard31e31b82003-02-18 22:55:36 +00004209 break;
4210 case TARGET_NR_open:
bellard2f619692007-11-16 10:46:05 +00004211 if (!(p = lock_user_string(arg1)))
4212 goto efault;
pbrook53a59602006-03-25 19:31:22 +00004213 ret = get_errno(open(path(p),
bellardffa65c32004-01-04 23:57:22 +00004214 target_to_host_bitmask(arg2, fcntl_flags_tbl),
4215 arg3));
pbrook53a59602006-03-25 19:31:22 +00004216 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00004217 break;
ths82424832007-09-24 09:21:55 +00004218#if defined(TARGET_NR_openat) && defined(__NR_openat)
4219 case TARGET_NR_openat:
bellard579a97f2007-11-11 14:26:47 +00004220 if (!(p = lock_user_string(arg2)))
4221 goto efault;
4222 ret = get_errno(sys_openat(arg1,
4223 path(p),
4224 target_to_host_bitmask(arg3, fcntl_flags_tbl),
4225 arg4));
4226 unlock_user(p, arg2, 0);
ths82424832007-09-24 09:21:55 +00004227 break;
4228#endif
bellard31e31b82003-02-18 22:55:36 +00004229 case TARGET_NR_close:
4230 ret = get_errno(close(arg1));
4231 break;
4232 case TARGET_NR_brk:
pbrook53a59602006-03-25 19:31:22 +00004233 ret = do_brk(arg1);
bellard31e31b82003-02-18 22:55:36 +00004234 break;
4235 case TARGET_NR_fork:
pbrookd865bab2008-06-07 22:12:17 +00004236 ret = get_errno(do_fork(cpu_env, SIGCHLD, 0, 0, 0, 0));
bellard31e31b82003-02-18 22:55:36 +00004237 break;
thse5febef2007-04-01 18:31:35 +00004238#ifdef TARGET_NR_waitpid
bellard31e31b82003-02-18 22:55:36 +00004239 case TARGET_NR_waitpid:
4240 {
pbrook53a59602006-03-25 19:31:22 +00004241 int status;
4242 ret = get_errno(waitpid(arg1, &status, arg3));
bellard2f619692007-11-16 10:46:05 +00004243 if (!is_error(ret) && arg2
pbrook1d9d8b52009-04-16 15:17:02 +00004244 && put_user_s32(host_to_target_waitstatus(status), arg2))
bellard2f619692007-11-16 10:46:05 +00004245 goto efault;
bellard31e31b82003-02-18 22:55:36 +00004246 }
4247 break;
thse5febef2007-04-01 18:31:35 +00004248#endif
pbrookf0cbb612008-05-30 18:20:05 +00004249#ifdef TARGET_NR_waitid
4250 case TARGET_NR_waitid:
4251 {
4252 siginfo_t info;
4253 info.si_pid = 0;
4254 ret = get_errno(waitid(arg1, arg2, &info, arg4));
4255 if (!is_error(ret) && arg3 && info.si_pid != 0) {
4256 if (!(p = lock_user(VERIFY_WRITE, arg3, sizeof(target_siginfo_t), 0)))
4257 goto efault;
4258 host_to_target_siginfo(p, &info);
4259 unlock_user(p, arg3, sizeof(target_siginfo_t));
4260 }
4261 }
4262 break;
4263#endif
j_mayer7a3148a2007-04-05 07:13:51 +00004264#ifdef TARGET_NR_creat /* not on alpha */
bellard31e31b82003-02-18 22:55:36 +00004265 case TARGET_NR_creat:
bellard579a97f2007-11-11 14:26:47 +00004266 if (!(p = lock_user_string(arg1)))
4267 goto efault;
pbrook53a59602006-03-25 19:31:22 +00004268 ret = get_errno(creat(p, arg2));
4269 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00004270 break;
j_mayer7a3148a2007-04-05 07:13:51 +00004271#endif
bellard31e31b82003-02-18 22:55:36 +00004272 case TARGET_NR_link:
pbrook53a59602006-03-25 19:31:22 +00004273 {
4274 void * p2;
4275 p = lock_user_string(arg1);
4276 p2 = lock_user_string(arg2);
bellard579a97f2007-11-11 14:26:47 +00004277 if (!p || !p2)
4278 ret = -TARGET_EFAULT;
4279 else
4280 ret = get_errno(link(p, p2));
pbrook53a59602006-03-25 19:31:22 +00004281 unlock_user(p2, arg2, 0);
4282 unlock_user(p, arg1, 0);
4283 }
bellard31e31b82003-02-18 22:55:36 +00004284 break;
ths64f0ce42007-09-24 09:25:06 +00004285#if defined(TARGET_NR_linkat) && defined(__NR_linkat)
4286 case TARGET_NR_linkat:
ths64f0ce42007-09-24 09:25:06 +00004287 {
4288 void * p2 = NULL;
bellard579a97f2007-11-11 14:26:47 +00004289 if (!arg2 || !arg4)
4290 goto efault;
ths64f0ce42007-09-24 09:25:06 +00004291 p = lock_user_string(arg2);
4292 p2 = lock_user_string(arg4);
bellard579a97f2007-11-11 14:26:47 +00004293 if (!p || !p2)
ths0da46a62007-10-20 20:23:07 +00004294 ret = -TARGET_EFAULT;
ths64f0ce42007-09-24 09:25:06 +00004295 else
4296 ret = get_errno(sys_linkat(arg1, p, arg3, p2, arg5));
bellard579a97f2007-11-11 14:26:47 +00004297 unlock_user(p, arg2, 0);
4298 unlock_user(p2, arg4, 0);
ths64f0ce42007-09-24 09:25:06 +00004299 }
4300 break;
4301#endif
bellard31e31b82003-02-18 22:55:36 +00004302 case TARGET_NR_unlink:
bellard579a97f2007-11-11 14:26:47 +00004303 if (!(p = lock_user_string(arg1)))
4304 goto efault;
pbrook53a59602006-03-25 19:31:22 +00004305 ret = get_errno(unlink(p));
4306 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00004307 break;
ths8170f562007-09-24 09:24:11 +00004308#if defined(TARGET_NR_unlinkat) && defined(__NR_unlinkat)
4309 case TARGET_NR_unlinkat:
bellard579a97f2007-11-11 14:26:47 +00004310 if (!(p = lock_user_string(arg2)))
4311 goto efault;
4312 ret = get_errno(sys_unlinkat(arg1, p, arg3));
4313 unlock_user(p, arg2, 0);
balroged494d82007-12-11 23:23:52 +00004314 break;
balrogb7d35e62007-12-12 00:40:24 +00004315#endif
bellard31e31b82003-02-18 22:55:36 +00004316 case TARGET_NR_execve:
bellard7854b052003-03-29 17:22:23 +00004317 {
4318 char **argp, **envp;
bellardf7341ff2003-03-30 21:00:25 +00004319 int argc, envc;
blueswir1992f48a2007-10-14 16:27:31 +00004320 abi_ulong gp;
4321 abi_ulong guest_argp;
4322 abi_ulong guest_envp;
4323 abi_ulong addr;
bellard7854b052003-03-29 17:22:23 +00004324 char **q;
4325
bellardf7341ff2003-03-30 21:00:25 +00004326 argc = 0;
pbrook53a59602006-03-25 19:31:22 +00004327 guest_argp = arg2;
pbrookda94d262008-05-30 18:24:00 +00004328 for (gp = guest_argp; gp; gp += sizeof(abi_ulong)) {
ths03aa1972007-12-02 06:28:08 +00004329 if (get_user_ual(addr, gp))
bellard2f619692007-11-16 10:46:05 +00004330 goto efault;
ths03aa1972007-12-02 06:28:08 +00004331 if (!addr)
bellard2f619692007-11-16 10:46:05 +00004332 break;
bellard7854b052003-03-29 17:22:23 +00004333 argc++;
bellard2f619692007-11-16 10:46:05 +00004334 }
bellardf7341ff2003-03-30 21:00:25 +00004335 envc = 0;
pbrook53a59602006-03-25 19:31:22 +00004336 guest_envp = arg3;
pbrookda94d262008-05-30 18:24:00 +00004337 for (gp = guest_envp; gp; gp += sizeof(abi_ulong)) {
ths03aa1972007-12-02 06:28:08 +00004338 if (get_user_ual(addr, gp))
bellard2f619692007-11-16 10:46:05 +00004339 goto efault;
ths03aa1972007-12-02 06:28:08 +00004340 if (!addr)
bellard2f619692007-11-16 10:46:05 +00004341 break;
bellard7854b052003-03-29 17:22:23 +00004342 envc++;
bellard2f619692007-11-16 10:46:05 +00004343 }
bellard7854b052003-03-29 17:22:23 +00004344
bellardf7341ff2003-03-30 21:00:25 +00004345 argp = alloca((argc + 1) * sizeof(void *));
4346 envp = alloca((envc + 1) * sizeof(void *));
bellard7854b052003-03-29 17:22:23 +00004347
pbrookda94d262008-05-30 18:24:00 +00004348 for (gp = guest_argp, q = argp; gp;
blueswir1992f48a2007-10-14 16:27:31 +00004349 gp += sizeof(abi_ulong), q++) {
bellard2f619692007-11-16 10:46:05 +00004350 if (get_user_ual(addr, gp))
4351 goto execve_efault;
pbrook53a59602006-03-25 19:31:22 +00004352 if (!addr)
4353 break;
bellard2f619692007-11-16 10:46:05 +00004354 if (!(*q = lock_user_string(addr)))
4355 goto execve_efault;
pbrook53a59602006-03-25 19:31:22 +00004356 }
bellardf7341ff2003-03-30 21:00:25 +00004357 *q = NULL;
4358
pbrookda94d262008-05-30 18:24:00 +00004359 for (gp = guest_envp, q = envp; gp;
blueswir1992f48a2007-10-14 16:27:31 +00004360 gp += sizeof(abi_ulong), q++) {
bellard2f619692007-11-16 10:46:05 +00004361 if (get_user_ual(addr, gp))
4362 goto execve_efault;
pbrook53a59602006-03-25 19:31:22 +00004363 if (!addr)
4364 break;
bellard2f619692007-11-16 10:46:05 +00004365 if (!(*q = lock_user_string(addr)))
4366 goto execve_efault;
pbrook53a59602006-03-25 19:31:22 +00004367 }
bellardf7341ff2003-03-30 21:00:25 +00004368 *q = NULL;
bellard7854b052003-03-29 17:22:23 +00004369
bellard2f619692007-11-16 10:46:05 +00004370 if (!(p = lock_user_string(arg1)))
4371 goto execve_efault;
pbrook53a59602006-03-25 19:31:22 +00004372 ret = get_errno(execve(p, argp, envp));
4373 unlock_user(p, arg1, 0);
4374
bellard2f619692007-11-16 10:46:05 +00004375 goto execve_end;
4376
4377 execve_efault:
4378 ret = -TARGET_EFAULT;
4379
4380 execve_end:
pbrook53a59602006-03-25 19:31:22 +00004381 for (gp = guest_argp, q = argp; *q;
blueswir1992f48a2007-10-14 16:27:31 +00004382 gp += sizeof(abi_ulong), q++) {
bellard2f619692007-11-16 10:46:05 +00004383 if (get_user_ual(addr, gp)
4384 || !addr)
4385 break;
pbrook53a59602006-03-25 19:31:22 +00004386 unlock_user(*q, addr, 0);
4387 }
4388 for (gp = guest_envp, q = envp; *q;
blueswir1992f48a2007-10-14 16:27:31 +00004389 gp += sizeof(abi_ulong), q++) {
bellard2f619692007-11-16 10:46:05 +00004390 if (get_user_ual(addr, gp)
4391 || !addr)
4392 break;
pbrook53a59602006-03-25 19:31:22 +00004393 unlock_user(*q, addr, 0);
4394 }
bellard7854b052003-03-29 17:22:23 +00004395 }
bellard31e31b82003-02-18 22:55:36 +00004396 break;
4397 case TARGET_NR_chdir:
bellard579a97f2007-11-11 14:26:47 +00004398 if (!(p = lock_user_string(arg1)))
4399 goto efault;
pbrook53a59602006-03-25 19:31:22 +00004400 ret = get_errno(chdir(p));
4401 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00004402 break;
bellarda315a142005-01-30 22:59:18 +00004403#ifdef TARGET_NR_time
bellard31e31b82003-02-18 22:55:36 +00004404 case TARGET_NR_time:
4405 {
pbrook53a59602006-03-25 19:31:22 +00004406 time_t host_time;
4407 ret = get_errno(time(&host_time));
bellard2f619692007-11-16 10:46:05 +00004408 if (!is_error(ret)
4409 && arg1
4410 && put_user_sal(host_time, arg1))
4411 goto efault;
bellard31e31b82003-02-18 22:55:36 +00004412 }
4413 break;
bellarda315a142005-01-30 22:59:18 +00004414#endif
bellard31e31b82003-02-18 22:55:36 +00004415 case TARGET_NR_mknod:
bellard579a97f2007-11-11 14:26:47 +00004416 if (!(p = lock_user_string(arg1)))
4417 goto efault;
pbrook53a59602006-03-25 19:31:22 +00004418 ret = get_errno(mknod(p, arg2, arg3));
4419 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00004420 break;
ths75ac37a2007-09-24 09:23:05 +00004421#if defined(TARGET_NR_mknodat) && defined(__NR_mknodat)
4422 case TARGET_NR_mknodat:
bellard579a97f2007-11-11 14:26:47 +00004423 if (!(p = lock_user_string(arg2)))
4424 goto efault;
4425 ret = get_errno(sys_mknodat(arg1, p, arg3, arg4));
4426 unlock_user(p, arg2, 0);
ths75ac37a2007-09-24 09:23:05 +00004427 break;
4428#endif
bellard31e31b82003-02-18 22:55:36 +00004429 case TARGET_NR_chmod:
bellard579a97f2007-11-11 14:26:47 +00004430 if (!(p = lock_user_string(arg1)))
4431 goto efault;
pbrook53a59602006-03-25 19:31:22 +00004432 ret = get_errno(chmod(p, arg2));
4433 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00004434 break;
bellardebc05482003-09-30 21:08:41 +00004435#ifdef TARGET_NR_break
bellard31e31b82003-02-18 22:55:36 +00004436 case TARGET_NR_break:
4437 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00004438#endif
4439#ifdef TARGET_NR_oldstat
bellard31e31b82003-02-18 22:55:36 +00004440 case TARGET_NR_oldstat:
4441 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00004442#endif
bellard31e31b82003-02-18 22:55:36 +00004443 case TARGET_NR_lseek:
4444 ret = get_errno(lseek(arg1, arg2, arg3));
4445 break;
j_mayer7a3148a2007-04-05 07:13:51 +00004446#ifdef TARGET_NR_getxpid
4447 case TARGET_NR_getxpid:
4448#else
bellard31e31b82003-02-18 22:55:36 +00004449 case TARGET_NR_getpid:
j_mayer7a3148a2007-04-05 07:13:51 +00004450#endif
bellard31e31b82003-02-18 22:55:36 +00004451 ret = get_errno(getpid());
4452 break;
4453 case TARGET_NR_mount:
ths80265912007-02-17 22:25:41 +00004454 {
4455 /* need to look at the data field */
4456 void *p2, *p3;
4457 p = lock_user_string(arg1);
4458 p2 = lock_user_string(arg2);
4459 p3 = lock_user_string(arg3);
bellard579a97f2007-11-11 14:26:47 +00004460 if (!p || !p2 || !p3)
4461 ret = -TARGET_EFAULT;
4462 else
4463 /* FIXME - arg5 should be locked, but it isn't clear how to
4464 * do that since it's not guaranteed to be a NULL-terminated
4465 * string.
4466 */
4467 ret = get_errno(mount(p, p2, p3, (unsigned long)arg4, g2h(arg5)));
4468 unlock_user(p, arg1, 0);
4469 unlock_user(p2, arg2, 0);
4470 unlock_user(p3, arg3, 0);
ths80265912007-02-17 22:25:41 +00004471 break;
4472 }
thse5febef2007-04-01 18:31:35 +00004473#ifdef TARGET_NR_umount
bellard31e31b82003-02-18 22:55:36 +00004474 case TARGET_NR_umount:
bellard579a97f2007-11-11 14:26:47 +00004475 if (!(p = lock_user_string(arg1)))
4476 goto efault;
pbrook53a59602006-03-25 19:31:22 +00004477 ret = get_errno(umount(p));
4478 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00004479 break;
thse5febef2007-04-01 18:31:35 +00004480#endif
j_mayer7a3148a2007-04-05 07:13:51 +00004481#ifdef TARGET_NR_stime /* not on alpha */
bellard31e31b82003-02-18 22:55:36 +00004482 case TARGET_NR_stime:
4483 {
pbrook53a59602006-03-25 19:31:22 +00004484 time_t host_time;
bellard2f619692007-11-16 10:46:05 +00004485 if (get_user_sal(host_time, arg1))
4486 goto efault;
pbrook53a59602006-03-25 19:31:22 +00004487 ret = get_errno(stime(&host_time));
bellard31e31b82003-02-18 22:55:36 +00004488 }
4489 break;
j_mayer7a3148a2007-04-05 07:13:51 +00004490#endif
bellard31e31b82003-02-18 22:55:36 +00004491 case TARGET_NR_ptrace:
4492 goto unimplemented;
j_mayer7a3148a2007-04-05 07:13:51 +00004493#ifdef TARGET_NR_alarm /* not on alpha */
bellard31e31b82003-02-18 22:55:36 +00004494 case TARGET_NR_alarm:
4495 ret = alarm(arg1);
4496 break;
j_mayer7a3148a2007-04-05 07:13:51 +00004497#endif
bellardebc05482003-09-30 21:08:41 +00004498#ifdef TARGET_NR_oldfstat
bellard31e31b82003-02-18 22:55:36 +00004499 case TARGET_NR_oldfstat:
4500 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00004501#endif
j_mayer7a3148a2007-04-05 07:13:51 +00004502#ifdef TARGET_NR_pause /* not on alpha */
bellard31e31b82003-02-18 22:55:36 +00004503 case TARGET_NR_pause:
4504 ret = get_errno(pause());
4505 break;
j_mayer7a3148a2007-04-05 07:13:51 +00004506#endif
thse5febef2007-04-01 18:31:35 +00004507#ifdef TARGET_NR_utime
bellard31e31b82003-02-18 22:55:36 +00004508 case TARGET_NR_utime:
bellardebc05482003-09-30 21:08:41 +00004509 {
pbrook53a59602006-03-25 19:31:22 +00004510 struct utimbuf tbuf, *host_tbuf;
4511 struct target_utimbuf *target_tbuf;
4512 if (arg2) {
bellard579a97f2007-11-11 14:26:47 +00004513 if (!lock_user_struct(VERIFY_READ, target_tbuf, arg2, 1))
4514 goto efault;
pbrook53a59602006-03-25 19:31:22 +00004515 tbuf.actime = tswapl(target_tbuf->actime);
4516 tbuf.modtime = tswapl(target_tbuf->modtime);
4517 unlock_user_struct(target_tbuf, arg2, 0);
4518 host_tbuf = &tbuf;
bellardf72e8ff2004-05-03 19:23:07 +00004519 } else {
pbrook53a59602006-03-25 19:31:22 +00004520 host_tbuf = NULL;
bellardf72e8ff2004-05-03 19:23:07 +00004521 }
bellard579a97f2007-11-11 14:26:47 +00004522 if (!(p = lock_user_string(arg1)))
4523 goto efault;
pbrook53a59602006-03-25 19:31:22 +00004524 ret = get_errno(utime(p, host_tbuf));
4525 unlock_user(p, arg1, 0);
bellardebc05482003-09-30 21:08:41 +00004526 }
4527 break;
thse5febef2007-04-01 18:31:35 +00004528#endif
bellard978a66f2004-12-06 22:58:05 +00004529 case TARGET_NR_utimes:
4530 {
bellard978a66f2004-12-06 22:58:05 +00004531 struct timeval *tvp, tv[2];
pbrook53a59602006-03-25 19:31:22 +00004532 if (arg2) {
ths788f5ec2007-12-09 02:37:05 +00004533 if (copy_from_user_timeval(&tv[0], arg2)
4534 || copy_from_user_timeval(&tv[1],
4535 arg2 + sizeof(struct target_timeval)))
4536 goto efault;
bellard978a66f2004-12-06 22:58:05 +00004537 tvp = tv;
4538 } else {
4539 tvp = NULL;
4540 }
bellard579a97f2007-11-11 14:26:47 +00004541 if (!(p = lock_user_string(arg1)))
4542 goto efault;
pbrook53a59602006-03-25 19:31:22 +00004543 ret = get_errno(utimes(p, tvp));
4544 unlock_user(p, arg1, 0);
bellard978a66f2004-12-06 22:58:05 +00004545 }
4546 break;
balrogac8a6552008-09-20 02:25:39 +00004547#if defined(TARGET_NR_futimesat) && defined(__NR_futimesat)
4548 case TARGET_NR_futimesat:
4549 {
4550 struct timeval *tvp, tv[2];
4551 if (arg3) {
4552 if (copy_from_user_timeval(&tv[0], arg3)
4553 || copy_from_user_timeval(&tv[1],
4554 arg3 + sizeof(struct target_timeval)))
4555 goto efault;
4556 tvp = tv;
4557 } else {
4558 tvp = NULL;
4559 }
4560 if (!(p = lock_user_string(arg2)))
4561 goto efault;
4562 ret = get_errno(sys_futimesat(arg1, path(p), tvp));
4563 unlock_user(p, arg2, 0);
4564 }
4565 break;
4566#endif
bellardebc05482003-09-30 21:08:41 +00004567#ifdef TARGET_NR_stty
bellard31e31b82003-02-18 22:55:36 +00004568 case TARGET_NR_stty:
4569 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00004570#endif
4571#ifdef TARGET_NR_gtty
bellard31e31b82003-02-18 22:55:36 +00004572 case TARGET_NR_gtty:
4573 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00004574#endif
bellard31e31b82003-02-18 22:55:36 +00004575 case TARGET_NR_access:
bellard579a97f2007-11-11 14:26:47 +00004576 if (!(p = lock_user_string(arg1)))
4577 goto efault;
Ulrich Hecht719f9082009-07-03 17:09:29 +02004578 ret = get_errno(access(path(p), arg2));
pbrook53a59602006-03-25 19:31:22 +00004579 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00004580 break;
ths92a34c12007-09-24 09:27:49 +00004581#if defined(TARGET_NR_faccessat) && defined(__NR_faccessat)
4582 case TARGET_NR_faccessat:
bellard579a97f2007-11-11 14:26:47 +00004583 if (!(p = lock_user_string(arg2)))
4584 goto efault;
aurel32465c9f02009-04-19 08:52:17 +00004585 ret = get_errno(sys_faccessat(arg1, p, arg3));
bellard579a97f2007-11-11 14:26:47 +00004586 unlock_user(p, arg2, 0);
ths92a34c12007-09-24 09:27:49 +00004587 break;
4588#endif
j_mayer7a3148a2007-04-05 07:13:51 +00004589#ifdef TARGET_NR_nice /* not on alpha */
bellard31e31b82003-02-18 22:55:36 +00004590 case TARGET_NR_nice:
4591 ret = get_errno(nice(arg1));
4592 break;
j_mayer7a3148a2007-04-05 07:13:51 +00004593#endif
bellardebc05482003-09-30 21:08:41 +00004594#ifdef TARGET_NR_ftime
bellard31e31b82003-02-18 22:55:36 +00004595 case TARGET_NR_ftime:
4596 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00004597#endif
bellard31e31b82003-02-18 22:55:36 +00004598 case TARGET_NR_sync:
bellard04369ff2003-03-20 22:33:23 +00004599 sync();
4600 ret = 0;
bellard31e31b82003-02-18 22:55:36 +00004601 break;
4602 case TARGET_NR_kill:
pbrook4cb05962008-05-30 18:05:19 +00004603 ret = get_errno(kill(arg1, target_to_host_signal(arg2)));
bellard31e31b82003-02-18 22:55:36 +00004604 break;
4605 case TARGET_NR_rename:
pbrook53a59602006-03-25 19:31:22 +00004606 {
4607 void *p2;
4608 p = lock_user_string(arg1);
4609 p2 = lock_user_string(arg2);
bellard579a97f2007-11-11 14:26:47 +00004610 if (!p || !p2)
4611 ret = -TARGET_EFAULT;
4612 else
4613 ret = get_errno(rename(p, p2));
pbrook53a59602006-03-25 19:31:22 +00004614 unlock_user(p2, arg2, 0);
4615 unlock_user(p, arg1, 0);
4616 }
bellard31e31b82003-02-18 22:55:36 +00004617 break;
ths722183f2007-09-24 09:24:37 +00004618#if defined(TARGET_NR_renameat) && defined(__NR_renameat)
4619 case TARGET_NR_renameat:
ths722183f2007-09-24 09:24:37 +00004620 {
bellard579a97f2007-11-11 14:26:47 +00004621 void *p2;
ths722183f2007-09-24 09:24:37 +00004622 p = lock_user_string(arg2);
4623 p2 = lock_user_string(arg4);
bellard579a97f2007-11-11 14:26:47 +00004624 if (!p || !p2)
ths0da46a62007-10-20 20:23:07 +00004625 ret = -TARGET_EFAULT;
ths722183f2007-09-24 09:24:37 +00004626 else
4627 ret = get_errno(sys_renameat(arg1, p, arg3, p2));
bellard579a97f2007-11-11 14:26:47 +00004628 unlock_user(p2, arg4, 0);
4629 unlock_user(p, arg2, 0);
ths722183f2007-09-24 09:24:37 +00004630 }
4631 break;
4632#endif
bellard31e31b82003-02-18 22:55:36 +00004633 case TARGET_NR_mkdir:
bellard579a97f2007-11-11 14:26:47 +00004634 if (!(p = lock_user_string(arg1)))
4635 goto efault;
pbrook53a59602006-03-25 19:31:22 +00004636 ret = get_errno(mkdir(p, arg2));
4637 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00004638 break;
ths4472ad02007-09-24 09:22:32 +00004639#if defined(TARGET_NR_mkdirat) && defined(__NR_mkdirat)
4640 case TARGET_NR_mkdirat:
bellard579a97f2007-11-11 14:26:47 +00004641 if (!(p = lock_user_string(arg2)))
4642 goto efault;
4643 ret = get_errno(sys_mkdirat(arg1, p, arg3));
4644 unlock_user(p, arg2, 0);
ths4472ad02007-09-24 09:22:32 +00004645 break;
4646#endif
bellard31e31b82003-02-18 22:55:36 +00004647 case TARGET_NR_rmdir:
bellard579a97f2007-11-11 14:26:47 +00004648 if (!(p = lock_user_string(arg1)))
4649 goto efault;
pbrook53a59602006-03-25 19:31:22 +00004650 ret = get_errno(rmdir(p));
4651 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00004652 break;
4653 case TARGET_NR_dup:
4654 ret = get_errno(dup(arg1));
4655 break;
4656 case TARGET_NR_pipe:
Riku Voipio099d6b02009-05-05 12:10:04 +03004657 ret = do_pipe(cpu_env, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00004658 break;
Riku Voipio099d6b02009-05-05 12:10:04 +03004659#ifdef TARGET_NR_pipe2
4660 case TARGET_NR_pipe2:
4661 ret = do_pipe(cpu_env, arg1, arg2);
4662 break;
4663#endif
bellard31e31b82003-02-18 22:55:36 +00004664 case TARGET_NR_times:
bellard32f36bc2003-03-30 21:29:48 +00004665 {
pbrook53a59602006-03-25 19:31:22 +00004666 struct target_tms *tmsp;
bellard32f36bc2003-03-30 21:29:48 +00004667 struct tms tms;
4668 ret = get_errno(times(&tms));
pbrook53a59602006-03-25 19:31:22 +00004669 if (arg1) {
bellard579a97f2007-11-11 14:26:47 +00004670 tmsp = lock_user(VERIFY_WRITE, arg1, sizeof(struct target_tms), 0);
4671 if (!tmsp)
4672 goto efault;
bellardc596ed12003-07-13 17:32:31 +00004673 tmsp->tms_utime = tswapl(host_to_target_clock_t(tms.tms_utime));
4674 tmsp->tms_stime = tswapl(host_to_target_clock_t(tms.tms_stime));
4675 tmsp->tms_cutime = tswapl(host_to_target_clock_t(tms.tms_cutime));
4676 tmsp->tms_cstime = tswapl(host_to_target_clock_t(tms.tms_cstime));
bellard32f36bc2003-03-30 21:29:48 +00004677 }
bellardc596ed12003-07-13 17:32:31 +00004678 if (!is_error(ret))
4679 ret = host_to_target_clock_t(ret);
bellard32f36bc2003-03-30 21:29:48 +00004680 }
4681 break;
bellardebc05482003-09-30 21:08:41 +00004682#ifdef TARGET_NR_prof
bellard31e31b82003-02-18 22:55:36 +00004683 case TARGET_NR_prof:
4684 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00004685#endif
thse5febef2007-04-01 18:31:35 +00004686#ifdef TARGET_NR_signal
bellard31e31b82003-02-18 22:55:36 +00004687 case TARGET_NR_signal:
4688 goto unimplemented;
thse5febef2007-04-01 18:31:35 +00004689#endif
bellard31e31b82003-02-18 22:55:36 +00004690 case TARGET_NR_acct:
aurel3238d840e2009-01-30 19:48:17 +00004691 if (arg1 == 0) {
4692 ret = get_errno(acct(NULL));
4693 } else {
4694 if (!(p = lock_user_string(arg1)))
4695 goto efault;
4696 ret = get_errno(acct(path(p)));
4697 unlock_user(p, arg1, 0);
4698 }
pbrook24836682006-04-16 14:14:53 +00004699 break;
j_mayer7a3148a2007-04-05 07:13:51 +00004700#ifdef TARGET_NR_umount2 /* not on alpha */
bellard31e31b82003-02-18 22:55:36 +00004701 case TARGET_NR_umount2:
bellard579a97f2007-11-11 14:26:47 +00004702 if (!(p = lock_user_string(arg1)))
4703 goto efault;
pbrook53a59602006-03-25 19:31:22 +00004704 ret = get_errno(umount2(p, arg2));
4705 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00004706 break;
j_mayer7a3148a2007-04-05 07:13:51 +00004707#endif
bellardebc05482003-09-30 21:08:41 +00004708#ifdef TARGET_NR_lock
bellard31e31b82003-02-18 22:55:36 +00004709 case TARGET_NR_lock:
4710 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00004711#endif
bellard31e31b82003-02-18 22:55:36 +00004712 case TARGET_NR_ioctl:
4713 ret = do_ioctl(arg1, arg2, arg3);
4714 break;
4715 case TARGET_NR_fcntl:
bellard9ee1fa22007-11-11 15:11:19 +00004716 ret = do_fcntl(arg1, arg2, arg3);
bellard31e31b82003-02-18 22:55:36 +00004717 break;
bellardebc05482003-09-30 21:08:41 +00004718#ifdef TARGET_NR_mpx
bellard31e31b82003-02-18 22:55:36 +00004719 case TARGET_NR_mpx:
4720 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00004721#endif
bellard31e31b82003-02-18 22:55:36 +00004722 case TARGET_NR_setpgid:
4723 ret = get_errno(setpgid(arg1, arg2));
4724 break;
bellardebc05482003-09-30 21:08:41 +00004725#ifdef TARGET_NR_ulimit
bellard31e31b82003-02-18 22:55:36 +00004726 case TARGET_NR_ulimit:
4727 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00004728#endif
4729#ifdef TARGET_NR_oldolduname
bellard31e31b82003-02-18 22:55:36 +00004730 case TARGET_NR_oldolduname:
4731 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00004732#endif
bellard31e31b82003-02-18 22:55:36 +00004733 case TARGET_NR_umask:
4734 ret = get_errno(umask(arg1));
4735 break;
4736 case TARGET_NR_chroot:
bellard579a97f2007-11-11 14:26:47 +00004737 if (!(p = lock_user_string(arg1)))
4738 goto efault;
pbrook53a59602006-03-25 19:31:22 +00004739 ret = get_errno(chroot(p));
4740 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00004741 break;
4742 case TARGET_NR_ustat:
4743 goto unimplemented;
4744 case TARGET_NR_dup2:
4745 ret = get_errno(dup2(arg1, arg2));
4746 break;
j_mayer7a3148a2007-04-05 07:13:51 +00004747#ifdef TARGET_NR_getppid /* not on alpha */
bellard31e31b82003-02-18 22:55:36 +00004748 case TARGET_NR_getppid:
4749 ret = get_errno(getppid());
4750 break;
j_mayer7a3148a2007-04-05 07:13:51 +00004751#endif
bellard31e31b82003-02-18 22:55:36 +00004752 case TARGET_NR_getpgrp:
4753 ret = get_errno(getpgrp());
4754 break;
4755 case TARGET_NR_setsid:
4756 ret = get_errno(setsid());
4757 break;
thse5febef2007-04-01 18:31:35 +00004758#ifdef TARGET_NR_sigaction
bellard31e31b82003-02-18 22:55:36 +00004759 case TARGET_NR_sigaction:
bellard31e31b82003-02-18 22:55:36 +00004760 {
ths388bb212007-05-13 13:58:00 +00004761#if !defined(TARGET_MIPS)
pbrook53a59602006-03-25 19:31:22 +00004762 struct target_old_sigaction *old_act;
bellard66fb9762003-03-23 01:06:05 +00004763 struct target_sigaction act, oact, *pact;
pbrook53a59602006-03-25 19:31:22 +00004764 if (arg2) {
bellard579a97f2007-11-11 14:26:47 +00004765 if (!lock_user_struct(VERIFY_READ, old_act, arg2, 1))
4766 goto efault;
bellard66fb9762003-03-23 01:06:05 +00004767 act._sa_handler = old_act->_sa_handler;
4768 target_siginitset(&act.sa_mask, old_act->sa_mask);
4769 act.sa_flags = old_act->sa_flags;
4770 act.sa_restorer = old_act->sa_restorer;
pbrook53a59602006-03-25 19:31:22 +00004771 unlock_user_struct(old_act, arg2, 0);
bellard66fb9762003-03-23 01:06:05 +00004772 pact = &act;
4773 } else {
4774 pact = NULL;
4775 }
4776 ret = get_errno(do_sigaction(arg1, pact, &oact));
pbrook53a59602006-03-25 19:31:22 +00004777 if (!is_error(ret) && arg3) {
bellard579a97f2007-11-11 14:26:47 +00004778 if (!lock_user_struct(VERIFY_WRITE, old_act, arg3, 0))
4779 goto efault;
pbrook53a59602006-03-25 19:31:22 +00004780 old_act->_sa_handler = oact._sa_handler;
4781 old_act->sa_mask = oact.sa_mask.sig[0];
4782 old_act->sa_flags = oact.sa_flags;
4783 old_act->sa_restorer = oact.sa_restorer;
4784 unlock_user_struct(old_act, arg3, 1);
bellard66fb9762003-03-23 01:06:05 +00004785 }
ths388bb212007-05-13 13:58:00 +00004786#else
bellard106ec872006-06-27 21:08:10 +00004787 struct target_sigaction act, oact, *pact, *old_act;
4788
4789 if (arg2) {
bellard579a97f2007-11-11 14:26:47 +00004790 if (!lock_user_struct(VERIFY_READ, old_act, arg2, 1))
4791 goto efault;
bellard106ec872006-06-27 21:08:10 +00004792 act._sa_handler = old_act->_sa_handler;
4793 target_siginitset(&act.sa_mask, old_act->sa_mask.sig[0]);
4794 act.sa_flags = old_act->sa_flags;
4795 unlock_user_struct(old_act, arg2, 0);
4796 pact = &act;
4797 } else {
4798 pact = NULL;
4799 }
4800
4801 ret = get_errno(do_sigaction(arg1, pact, &oact));
4802
4803 if (!is_error(ret) && arg3) {
bellard579a97f2007-11-11 14:26:47 +00004804 if (!lock_user_struct(VERIFY_WRITE, old_act, arg3, 0))
4805 goto efault;
bellard106ec872006-06-27 21:08:10 +00004806 old_act->_sa_handler = oact._sa_handler;
4807 old_act->sa_flags = oact.sa_flags;
4808 old_act->sa_mask.sig[0] = oact.sa_mask.sig[0];
4809 old_act->sa_mask.sig[1] = 0;
4810 old_act->sa_mask.sig[2] = 0;
4811 old_act->sa_mask.sig[3] = 0;
4812 unlock_user_struct(old_act, arg3, 1);
4813 }
ths388bb212007-05-13 13:58:00 +00004814#endif
bellard31e31b82003-02-18 22:55:36 +00004815 }
4816 break;
thse5febef2007-04-01 18:31:35 +00004817#endif
bellard66fb9762003-03-23 01:06:05 +00004818 case TARGET_NR_rt_sigaction:
pbrook53a59602006-03-25 19:31:22 +00004819 {
4820 struct target_sigaction *act;
4821 struct target_sigaction *oact;
4822
bellard579a97f2007-11-11 14:26:47 +00004823 if (arg2) {
4824 if (!lock_user_struct(VERIFY_READ, act, arg2, 1))
4825 goto efault;
4826 } else
pbrook53a59602006-03-25 19:31:22 +00004827 act = NULL;
bellard579a97f2007-11-11 14:26:47 +00004828 if (arg3) {
4829 if (!lock_user_struct(VERIFY_WRITE, oact, arg3, 0)) {
4830 ret = -TARGET_EFAULT;
4831 goto rt_sigaction_fail;
4832 }
4833 } else
pbrook53a59602006-03-25 19:31:22 +00004834 oact = NULL;
4835 ret = get_errno(do_sigaction(arg1, act, oact));
bellard579a97f2007-11-11 14:26:47 +00004836 rt_sigaction_fail:
4837 if (act)
pbrook53a59602006-03-25 19:31:22 +00004838 unlock_user_struct(act, arg2, 0);
bellard579a97f2007-11-11 14:26:47 +00004839 if (oact)
pbrook53a59602006-03-25 19:31:22 +00004840 unlock_user_struct(oact, arg3, 1);
4841 }
bellard66fb9762003-03-23 01:06:05 +00004842 break;
j_mayer7a3148a2007-04-05 07:13:51 +00004843#ifdef TARGET_NR_sgetmask /* not on alpha */
bellard31e31b82003-02-18 22:55:36 +00004844 case TARGET_NR_sgetmask:
bellard66fb9762003-03-23 01:06:05 +00004845 {
4846 sigset_t cur_set;
blueswir1992f48a2007-10-14 16:27:31 +00004847 abi_ulong target_set;
bellard66fb9762003-03-23 01:06:05 +00004848 sigprocmask(0, NULL, &cur_set);
4849 host_to_target_old_sigset(&target_set, &cur_set);
4850 ret = target_set;
4851 }
4852 break;
j_mayer7a3148a2007-04-05 07:13:51 +00004853#endif
4854#ifdef TARGET_NR_ssetmask /* not on alpha */
bellard31e31b82003-02-18 22:55:36 +00004855 case TARGET_NR_ssetmask:
bellard66fb9762003-03-23 01:06:05 +00004856 {
4857 sigset_t set, oset, cur_set;
blueswir1992f48a2007-10-14 16:27:31 +00004858 abi_ulong target_set = arg1;
bellard66fb9762003-03-23 01:06:05 +00004859 sigprocmask(0, NULL, &cur_set);
4860 target_to_host_old_sigset(&set, &target_set);
4861 sigorset(&set, &set, &cur_set);
4862 sigprocmask(SIG_SETMASK, &set, &oset);
4863 host_to_target_old_sigset(&target_set, &oset);
4864 ret = target_set;
4865 }
4866 break;
j_mayer7a3148a2007-04-05 07:13:51 +00004867#endif
thse5febef2007-04-01 18:31:35 +00004868#ifdef TARGET_NR_sigprocmask
bellard66fb9762003-03-23 01:06:05 +00004869 case TARGET_NR_sigprocmask:
4870 {
4871 int how = arg1;
4872 sigset_t set, oldset, *set_ptr;
ths3b46e622007-09-17 08:09:54 +00004873
pbrook53a59602006-03-25 19:31:22 +00004874 if (arg2) {
bellard66fb9762003-03-23 01:06:05 +00004875 switch(how) {
4876 case TARGET_SIG_BLOCK:
4877 how = SIG_BLOCK;
4878 break;
4879 case TARGET_SIG_UNBLOCK:
4880 how = SIG_UNBLOCK;
4881 break;
4882 case TARGET_SIG_SETMASK:
4883 how = SIG_SETMASK;
4884 break;
4885 default:
ths0da46a62007-10-20 20:23:07 +00004886 ret = -TARGET_EINVAL;
bellard66fb9762003-03-23 01:06:05 +00004887 goto fail;
4888 }
bellard579a97f2007-11-11 14:26:47 +00004889 if (!(p = lock_user(VERIFY_READ, arg2, sizeof(target_sigset_t), 1)))
4890 goto efault;
pbrook53a59602006-03-25 19:31:22 +00004891 target_to_host_old_sigset(&set, p);
4892 unlock_user(p, arg2, 0);
bellard66fb9762003-03-23 01:06:05 +00004893 set_ptr = &set;
4894 } else {
4895 how = 0;
4896 set_ptr = NULL;
4897 }
4898 ret = get_errno(sigprocmask(arg1, set_ptr, &oldset));
pbrook53a59602006-03-25 19:31:22 +00004899 if (!is_error(ret) && arg3) {
bellard579a97f2007-11-11 14:26:47 +00004900 if (!(p = lock_user(VERIFY_WRITE, arg3, sizeof(target_sigset_t), 0)))
4901 goto efault;
pbrook53a59602006-03-25 19:31:22 +00004902 host_to_target_old_sigset(p, &oldset);
4903 unlock_user(p, arg3, sizeof(target_sigset_t));
bellard66fb9762003-03-23 01:06:05 +00004904 }
4905 }
4906 break;
thse5febef2007-04-01 18:31:35 +00004907#endif
bellard66fb9762003-03-23 01:06:05 +00004908 case TARGET_NR_rt_sigprocmask:
4909 {
4910 int how = arg1;
4911 sigset_t set, oldset, *set_ptr;
ths3b46e622007-09-17 08:09:54 +00004912
pbrook53a59602006-03-25 19:31:22 +00004913 if (arg2) {
bellard66fb9762003-03-23 01:06:05 +00004914 switch(how) {
4915 case TARGET_SIG_BLOCK:
4916 how = SIG_BLOCK;
4917 break;
4918 case TARGET_SIG_UNBLOCK:
4919 how = SIG_UNBLOCK;
4920 break;
4921 case TARGET_SIG_SETMASK:
4922 how = SIG_SETMASK;
4923 break;
4924 default:
ths0da46a62007-10-20 20:23:07 +00004925 ret = -TARGET_EINVAL;
bellard66fb9762003-03-23 01:06:05 +00004926 goto fail;
4927 }
bellard579a97f2007-11-11 14:26:47 +00004928 if (!(p = lock_user(VERIFY_READ, arg2, sizeof(target_sigset_t), 1)))
4929 goto efault;
pbrook53a59602006-03-25 19:31:22 +00004930 target_to_host_sigset(&set, p);
4931 unlock_user(p, arg2, 0);
bellard66fb9762003-03-23 01:06:05 +00004932 set_ptr = &set;
4933 } else {
4934 how = 0;
4935 set_ptr = NULL;
4936 }
4937 ret = get_errno(sigprocmask(how, set_ptr, &oldset));
pbrook53a59602006-03-25 19:31:22 +00004938 if (!is_error(ret) && arg3) {
bellard579a97f2007-11-11 14:26:47 +00004939 if (!(p = lock_user(VERIFY_WRITE, arg3, sizeof(target_sigset_t), 0)))
4940 goto efault;
pbrook53a59602006-03-25 19:31:22 +00004941 host_to_target_sigset(p, &oldset);
4942 unlock_user(p, arg3, sizeof(target_sigset_t));
bellard66fb9762003-03-23 01:06:05 +00004943 }
4944 }
4945 break;
thse5febef2007-04-01 18:31:35 +00004946#ifdef TARGET_NR_sigpending
bellard66fb9762003-03-23 01:06:05 +00004947 case TARGET_NR_sigpending:
4948 {
4949 sigset_t set;
4950 ret = get_errno(sigpending(&set));
4951 if (!is_error(ret)) {
bellard579a97f2007-11-11 14:26:47 +00004952 if (!(p = lock_user(VERIFY_WRITE, arg1, sizeof(target_sigset_t), 0)))
4953 goto efault;
pbrook53a59602006-03-25 19:31:22 +00004954 host_to_target_old_sigset(p, &set);
4955 unlock_user(p, arg1, sizeof(target_sigset_t));
bellard66fb9762003-03-23 01:06:05 +00004956 }
4957 }
4958 break;
thse5febef2007-04-01 18:31:35 +00004959#endif
bellard66fb9762003-03-23 01:06:05 +00004960 case TARGET_NR_rt_sigpending:
4961 {
4962 sigset_t set;
4963 ret = get_errno(sigpending(&set));
4964 if (!is_error(ret)) {
bellard579a97f2007-11-11 14:26:47 +00004965 if (!(p = lock_user(VERIFY_WRITE, arg1, sizeof(target_sigset_t), 0)))
4966 goto efault;
pbrook53a59602006-03-25 19:31:22 +00004967 host_to_target_sigset(p, &set);
4968 unlock_user(p, arg1, sizeof(target_sigset_t));
bellard66fb9762003-03-23 01:06:05 +00004969 }
4970 }
4971 break;
thse5febef2007-04-01 18:31:35 +00004972#ifdef TARGET_NR_sigsuspend
bellard66fb9762003-03-23 01:06:05 +00004973 case TARGET_NR_sigsuspend:
4974 {
4975 sigset_t set;
bellard579a97f2007-11-11 14:26:47 +00004976 if (!(p = lock_user(VERIFY_READ, arg1, sizeof(target_sigset_t), 1)))
4977 goto efault;
pbrook53a59602006-03-25 19:31:22 +00004978 target_to_host_old_sigset(&set, p);
4979 unlock_user(p, arg1, 0);
bellard66fb9762003-03-23 01:06:05 +00004980 ret = get_errno(sigsuspend(&set));
4981 }
4982 break;
thse5febef2007-04-01 18:31:35 +00004983#endif
bellard66fb9762003-03-23 01:06:05 +00004984 case TARGET_NR_rt_sigsuspend:
4985 {
4986 sigset_t set;
bellard579a97f2007-11-11 14:26:47 +00004987 if (!(p = lock_user(VERIFY_READ, arg1, sizeof(target_sigset_t), 1)))
4988 goto efault;
pbrook53a59602006-03-25 19:31:22 +00004989 target_to_host_sigset(&set, p);
4990 unlock_user(p, arg1, 0);
bellard66fb9762003-03-23 01:06:05 +00004991 ret = get_errno(sigsuspend(&set));
4992 }
4993 break;
4994 case TARGET_NR_rt_sigtimedwait:
4995 {
bellard66fb9762003-03-23 01:06:05 +00004996 sigset_t set;
4997 struct timespec uts, *puts;
4998 siginfo_t uinfo;
ths3b46e622007-09-17 08:09:54 +00004999
bellard579a97f2007-11-11 14:26:47 +00005000 if (!(p = lock_user(VERIFY_READ, arg1, sizeof(target_sigset_t), 1)))
5001 goto efault;
pbrook53a59602006-03-25 19:31:22 +00005002 target_to_host_sigset(&set, p);
5003 unlock_user(p, arg1, 0);
5004 if (arg3) {
bellard66fb9762003-03-23 01:06:05 +00005005 puts = &uts;
pbrook53a59602006-03-25 19:31:22 +00005006 target_to_host_timespec(puts, arg3);
bellard66fb9762003-03-23 01:06:05 +00005007 } else {
5008 puts = NULL;
5009 }
5010 ret = get_errno(sigtimedwait(&set, &uinfo, puts));
pbrook53a59602006-03-25 19:31:22 +00005011 if (!is_error(ret) && arg2) {
pbrooke1e3f302008-05-30 21:53:38 +00005012 if (!(p = lock_user(VERIFY_WRITE, arg2, sizeof(target_siginfo_t), 0)))
bellard579a97f2007-11-11 14:26:47 +00005013 goto efault;
pbrook53a59602006-03-25 19:31:22 +00005014 host_to_target_siginfo(p, &uinfo);
pbrooke1e3f302008-05-30 21:53:38 +00005015 unlock_user(p, arg2, sizeof(target_siginfo_t));
bellard66fb9762003-03-23 01:06:05 +00005016 }
5017 }
5018 break;
5019 case TARGET_NR_rt_sigqueueinfo:
5020 {
5021 siginfo_t uinfo;
bellard579a97f2007-11-11 14:26:47 +00005022 if (!(p = lock_user(VERIFY_READ, arg3, sizeof(target_sigset_t), 1)))
5023 goto efault;
pbrook53a59602006-03-25 19:31:22 +00005024 target_to_host_siginfo(&uinfo, p);
5025 unlock_user(p, arg1, 0);
bellard66fb9762003-03-23 01:06:05 +00005026 ret = get_errno(sys_rt_sigqueueinfo(arg1, arg2, &uinfo));
5027 }
5028 break;
thse5febef2007-04-01 18:31:35 +00005029#ifdef TARGET_NR_sigreturn
bellard66fb9762003-03-23 01:06:05 +00005030 case TARGET_NR_sigreturn:
5031 /* NOTE: ret is eax, so not transcoding must be done */
5032 ret = do_sigreturn(cpu_env);
5033 break;
thse5febef2007-04-01 18:31:35 +00005034#endif
bellard66fb9762003-03-23 01:06:05 +00005035 case TARGET_NR_rt_sigreturn:
5036 /* NOTE: ret is eax, so not transcoding must be done */
5037 ret = do_rt_sigreturn(cpu_env);
5038 break;
bellard31e31b82003-02-18 22:55:36 +00005039 case TARGET_NR_sethostname:
bellard579a97f2007-11-11 14:26:47 +00005040 if (!(p = lock_user_string(arg1)))
5041 goto efault;
pbrook53a59602006-03-25 19:31:22 +00005042 ret = get_errno(sethostname(p, arg2));
5043 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00005044 break;
5045 case TARGET_NR_setrlimit:
bellard9de5e442003-03-23 16:49:39 +00005046 {
5047 /* XXX: convert resource ? */
5048 int resource = arg1;
pbrook53a59602006-03-25 19:31:22 +00005049 struct target_rlimit *target_rlim;
bellard9de5e442003-03-23 16:49:39 +00005050 struct rlimit rlim;
bellard579a97f2007-11-11 14:26:47 +00005051 if (!lock_user_struct(VERIFY_READ, target_rlim, arg2, 1))
5052 goto efault;
bellard9de5e442003-03-23 16:49:39 +00005053 rlim.rlim_cur = tswapl(target_rlim->rlim_cur);
5054 rlim.rlim_max = tswapl(target_rlim->rlim_max);
pbrook53a59602006-03-25 19:31:22 +00005055 unlock_user_struct(target_rlim, arg2, 0);
bellard9de5e442003-03-23 16:49:39 +00005056 ret = get_errno(setrlimit(resource, &rlim));
5057 }
5058 break;
bellard31e31b82003-02-18 22:55:36 +00005059 case TARGET_NR_getrlimit:
bellard9de5e442003-03-23 16:49:39 +00005060 {
5061 /* XXX: convert resource ? */
5062 int resource = arg1;
pbrook53a59602006-03-25 19:31:22 +00005063 struct target_rlimit *target_rlim;
bellard9de5e442003-03-23 16:49:39 +00005064 struct rlimit rlim;
ths3b46e622007-09-17 08:09:54 +00005065
bellard9de5e442003-03-23 16:49:39 +00005066 ret = get_errno(getrlimit(resource, &rlim));
5067 if (!is_error(ret)) {
bellard579a97f2007-11-11 14:26:47 +00005068 if (!lock_user_struct(VERIFY_WRITE, target_rlim, arg2, 0))
5069 goto efault;
Ulrich Hecht666bcd92009-07-03 17:09:30 +02005070 target_rlim->rlim_cur = tswapl(rlim.rlim_cur);
5071 target_rlim->rlim_max = tswapl(rlim.rlim_max);
pbrook53a59602006-03-25 19:31:22 +00005072 unlock_user_struct(target_rlim, arg2, 1);
bellard9de5e442003-03-23 16:49:39 +00005073 }
5074 }
5075 break;
bellard31e31b82003-02-18 22:55:36 +00005076 case TARGET_NR_getrusage:
bellardb4091862003-05-16 15:39:34 +00005077 {
5078 struct rusage rusage;
bellardb4091862003-05-16 15:39:34 +00005079 ret = get_errno(getrusage(arg1, &rusage));
5080 if (!is_error(ret)) {
pbrook53a59602006-03-25 19:31:22 +00005081 host_to_target_rusage(arg2, &rusage);
bellardb4091862003-05-16 15:39:34 +00005082 }
5083 }
5084 break;
bellard31e31b82003-02-18 22:55:36 +00005085 case TARGET_NR_gettimeofday:
5086 {
bellard31e31b82003-02-18 22:55:36 +00005087 struct timeval tv;
5088 ret = get_errno(gettimeofday(&tv, NULL));
5089 if (!is_error(ret)) {
ths788f5ec2007-12-09 02:37:05 +00005090 if (copy_to_user_timeval(arg1, &tv))
5091 goto efault;
bellard31e31b82003-02-18 22:55:36 +00005092 }
5093 }
5094 break;
5095 case TARGET_NR_settimeofday:
5096 {
bellard31e31b82003-02-18 22:55:36 +00005097 struct timeval tv;
ths788f5ec2007-12-09 02:37:05 +00005098 if (copy_from_user_timeval(&tv, arg1))
5099 goto efault;
bellard31e31b82003-02-18 22:55:36 +00005100 ret = get_errno(settimeofday(&tv, NULL));
5101 }
5102 break;
bellard048f6b42005-11-26 18:47:20 +00005103#ifdef TARGET_NR_select
bellard31e31b82003-02-18 22:55:36 +00005104 case TARGET_NR_select:
bellardf2674e32003-07-09 12:26:09 +00005105 {
pbrook53a59602006-03-25 19:31:22 +00005106 struct target_sel_arg_struct *sel;
blueswir1992f48a2007-10-14 16:27:31 +00005107 abi_ulong inp, outp, exp, tvp;
pbrook53a59602006-03-25 19:31:22 +00005108 long nsel;
5109
bellard579a97f2007-11-11 14:26:47 +00005110 if (!lock_user_struct(VERIFY_READ, sel, arg1, 1))
5111 goto efault;
pbrook53a59602006-03-25 19:31:22 +00005112 nsel = tswapl(sel->n);
5113 inp = tswapl(sel->inp);
5114 outp = tswapl(sel->outp);
5115 exp = tswapl(sel->exp);
5116 tvp = tswapl(sel->tvp);
5117 unlock_user_struct(sel, arg1, 0);
5118 ret = do_select(nsel, inp, outp, exp, tvp);
bellardf2674e32003-07-09 12:26:09 +00005119 }
5120 break;
bellard048f6b42005-11-26 18:47:20 +00005121#endif
bellard31e31b82003-02-18 22:55:36 +00005122 case TARGET_NR_symlink:
pbrook53a59602006-03-25 19:31:22 +00005123 {
5124 void *p2;
5125 p = lock_user_string(arg1);
5126 p2 = lock_user_string(arg2);
bellard579a97f2007-11-11 14:26:47 +00005127 if (!p || !p2)
5128 ret = -TARGET_EFAULT;
5129 else
5130 ret = get_errno(symlink(p, p2));
pbrook53a59602006-03-25 19:31:22 +00005131 unlock_user(p2, arg2, 0);
5132 unlock_user(p, arg1, 0);
5133 }
bellard31e31b82003-02-18 22:55:36 +00005134 break;
thsf0b62432007-09-24 09:25:40 +00005135#if defined(TARGET_NR_symlinkat) && defined(__NR_symlinkat)
5136 case TARGET_NR_symlinkat:
thsf0b62432007-09-24 09:25:40 +00005137 {
bellard579a97f2007-11-11 14:26:47 +00005138 void *p2;
thsf0b62432007-09-24 09:25:40 +00005139 p = lock_user_string(arg1);
5140 p2 = lock_user_string(arg3);
bellard579a97f2007-11-11 14:26:47 +00005141 if (!p || !p2)
ths0da46a62007-10-20 20:23:07 +00005142 ret = -TARGET_EFAULT;
thsf0b62432007-09-24 09:25:40 +00005143 else
5144 ret = get_errno(sys_symlinkat(p, arg2, p2));
bellard579a97f2007-11-11 14:26:47 +00005145 unlock_user(p2, arg3, 0);
5146 unlock_user(p, arg1, 0);
thsf0b62432007-09-24 09:25:40 +00005147 }
5148 break;
5149#endif
bellardebc05482003-09-30 21:08:41 +00005150#ifdef TARGET_NR_oldlstat
bellard31e31b82003-02-18 22:55:36 +00005151 case TARGET_NR_oldlstat:
5152 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00005153#endif
bellard31e31b82003-02-18 22:55:36 +00005154 case TARGET_NR_readlink:
pbrook53a59602006-03-25 19:31:22 +00005155 {
aurel32d088d662009-01-30 20:09:01 +00005156 void *p2, *temp;
pbrook53a59602006-03-25 19:31:22 +00005157 p = lock_user_string(arg1);
bellard579a97f2007-11-11 14:26:47 +00005158 p2 = lock_user(VERIFY_WRITE, arg2, arg3, 0);
5159 if (!p || !p2)
5160 ret = -TARGET_EFAULT;
aurel32d088d662009-01-30 20:09:01 +00005161 else {
5162 if (strncmp((const char *)p, "/proc/self/exe", 14) == 0) {
5163 char real[PATH_MAX];
5164 temp = realpath(exec_path,real);
5165 ret = (temp==NULL) ? get_errno(-1) : strlen(real) ;
5166 snprintf((char *)p2, arg3, "%s", real);
5167 }
5168 else
5169 ret = get_errno(readlink(path(p), p2, arg3));
aurel32d088d662009-01-30 20:09:01 +00005170 }
pbrook53a59602006-03-25 19:31:22 +00005171 unlock_user(p2, arg2, ret);
5172 unlock_user(p, arg1, 0);
5173 }
bellard31e31b82003-02-18 22:55:36 +00005174 break;
ths5e0ccb12007-09-24 09:26:10 +00005175#if defined(TARGET_NR_readlinkat) && defined(__NR_readlinkat)
5176 case TARGET_NR_readlinkat:
ths5e0ccb12007-09-24 09:26:10 +00005177 {
bellard579a97f2007-11-11 14:26:47 +00005178 void *p2;
ths5e0ccb12007-09-24 09:26:10 +00005179 p = lock_user_string(arg2);
bellard579a97f2007-11-11 14:26:47 +00005180 p2 = lock_user(VERIFY_WRITE, arg3, arg4, 0);
5181 if (!p || !p2)
ths0da46a62007-10-20 20:23:07 +00005182 ret = -TARGET_EFAULT;
ths5e0ccb12007-09-24 09:26:10 +00005183 else
5184 ret = get_errno(sys_readlinkat(arg1, path(p), p2, arg4));
bellard579a97f2007-11-11 14:26:47 +00005185 unlock_user(p2, arg3, ret);
5186 unlock_user(p, arg2, 0);
ths5e0ccb12007-09-24 09:26:10 +00005187 }
5188 break;
5189#endif
thse5febef2007-04-01 18:31:35 +00005190#ifdef TARGET_NR_uselib
bellard31e31b82003-02-18 22:55:36 +00005191 case TARGET_NR_uselib:
5192 goto unimplemented;
thse5febef2007-04-01 18:31:35 +00005193#endif
5194#ifdef TARGET_NR_swapon
bellard31e31b82003-02-18 22:55:36 +00005195 case TARGET_NR_swapon:
bellard579a97f2007-11-11 14:26:47 +00005196 if (!(p = lock_user_string(arg1)))
5197 goto efault;
pbrook53a59602006-03-25 19:31:22 +00005198 ret = get_errno(swapon(p, arg2));
5199 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00005200 break;
thse5febef2007-04-01 18:31:35 +00005201#endif
bellard31e31b82003-02-18 22:55:36 +00005202 case TARGET_NR_reboot:
5203 goto unimplemented;
thse5febef2007-04-01 18:31:35 +00005204#ifdef TARGET_NR_readdir
bellard31e31b82003-02-18 22:55:36 +00005205 case TARGET_NR_readdir:
5206 goto unimplemented;
thse5febef2007-04-01 18:31:35 +00005207#endif
5208#ifdef TARGET_NR_mmap
bellard31e31b82003-02-18 22:55:36 +00005209 case TARGET_NR_mmap:
Edgar E. Iglesiasb779e292009-05-20 21:31:33 +02005210#if (defined(TARGET_I386) && defined(TARGET_ABI32)) || defined(TARGET_ARM) || defined(TARGET_M68K) || defined(TARGET_CRIS) || defined(TARGET_MICROBLAZE)
bellard31e31b82003-02-18 22:55:36 +00005211 {
blueswir1992f48a2007-10-14 16:27:31 +00005212 abi_ulong *v;
5213 abi_ulong v1, v2, v3, v4, v5, v6;
bellard579a97f2007-11-11 14:26:47 +00005214 if (!(v = lock_user(VERIFY_READ, arg1, 6 * sizeof(abi_ulong), 1)))
5215 goto efault;
pbrook53a59602006-03-25 19:31:22 +00005216 v1 = tswapl(v[0]);
5217 v2 = tswapl(v[1]);
5218 v3 = tswapl(v[2]);
5219 v4 = tswapl(v[3]);
5220 v5 = tswapl(v[4]);
5221 v6 = tswapl(v[5]);
5222 unlock_user(v, arg1, 0);
ths5fafdf22007-09-16 21:08:06 +00005223 ret = get_errno(target_mmap(v1, v2, v3,
bellard5286db72003-06-05 00:57:30 +00005224 target_to_host_bitmask(v4, mmap_flags_tbl),
5225 v5, v6));
bellard31e31b82003-02-18 22:55:36 +00005226 }
bellard31e31b82003-02-18 22:55:36 +00005227#else
ths5fafdf22007-09-16 21:08:06 +00005228 ret = get_errno(target_mmap(arg1, arg2, arg3,
5229 target_to_host_bitmask(arg4, mmap_flags_tbl),
bellard6fb883e2003-07-09 17:12:39 +00005230 arg5,
5231 arg6));
bellard31e31b82003-02-18 22:55:36 +00005232#endif
bellard6fb883e2003-07-09 17:12:39 +00005233 break;
thse5febef2007-04-01 18:31:35 +00005234#endif
bellarda315a142005-01-30 22:59:18 +00005235#ifdef TARGET_NR_mmap2
bellard6fb883e2003-07-09 17:12:39 +00005236 case TARGET_NR_mmap2:
pbrookbb7ec042008-03-25 22:28:25 +00005237#ifndef MMAP_SHIFT
bellardc573ff62004-01-04 15:51:36 +00005238#define MMAP_SHIFT 12
bellardc573ff62004-01-04 15:51:36 +00005239#endif
ths5fafdf22007-09-16 21:08:06 +00005240 ret = get_errno(target_mmap(arg1, arg2, arg3,
5241 target_to_host_bitmask(arg4, mmap_flags_tbl),
bellard5286db72003-06-05 00:57:30 +00005242 arg5,
bellardc573ff62004-01-04 15:51:36 +00005243 arg6 << MMAP_SHIFT));
bellard31e31b82003-02-18 22:55:36 +00005244 break;
bellarda315a142005-01-30 22:59:18 +00005245#endif
bellard31e31b82003-02-18 22:55:36 +00005246 case TARGET_NR_munmap:
bellard54936002003-05-13 00:25:15 +00005247 ret = get_errno(target_munmap(arg1, arg2));
bellard31e31b82003-02-18 22:55:36 +00005248 break;
bellard9de5e442003-03-23 16:49:39 +00005249 case TARGET_NR_mprotect:
bellard54936002003-05-13 00:25:15 +00005250 ret = get_errno(target_mprotect(arg1, arg2, arg3));
bellard9de5e442003-03-23 16:49:39 +00005251 break;
thse5febef2007-04-01 18:31:35 +00005252#ifdef TARGET_NR_mremap
bellard9de5e442003-03-23 16:49:39 +00005253 case TARGET_NR_mremap:
bellard54936002003-05-13 00:25:15 +00005254 ret = get_errno(target_mremap(arg1, arg2, arg3, arg4, arg5));
bellard9de5e442003-03-23 16:49:39 +00005255 break;
thse5febef2007-04-01 18:31:35 +00005256#endif
pbrook53a59602006-03-25 19:31:22 +00005257 /* ??? msync/mlock/munlock are broken for softmmu. */
thse5febef2007-04-01 18:31:35 +00005258#ifdef TARGET_NR_msync
bellard9de5e442003-03-23 16:49:39 +00005259 case TARGET_NR_msync:
pbrook53a59602006-03-25 19:31:22 +00005260 ret = get_errno(msync(g2h(arg1), arg2, arg3));
bellard9de5e442003-03-23 16:49:39 +00005261 break;
thse5febef2007-04-01 18:31:35 +00005262#endif
5263#ifdef TARGET_NR_mlock
bellard9de5e442003-03-23 16:49:39 +00005264 case TARGET_NR_mlock:
pbrook53a59602006-03-25 19:31:22 +00005265 ret = get_errno(mlock(g2h(arg1), arg2));
bellard9de5e442003-03-23 16:49:39 +00005266 break;
thse5febef2007-04-01 18:31:35 +00005267#endif
5268#ifdef TARGET_NR_munlock
bellard9de5e442003-03-23 16:49:39 +00005269 case TARGET_NR_munlock:
pbrook53a59602006-03-25 19:31:22 +00005270 ret = get_errno(munlock(g2h(arg1), arg2));
bellard9de5e442003-03-23 16:49:39 +00005271 break;
thse5febef2007-04-01 18:31:35 +00005272#endif
5273#ifdef TARGET_NR_mlockall
bellard9de5e442003-03-23 16:49:39 +00005274 case TARGET_NR_mlockall:
5275 ret = get_errno(mlockall(arg1));
5276 break;
thse5febef2007-04-01 18:31:35 +00005277#endif
5278#ifdef TARGET_NR_munlockall
bellard9de5e442003-03-23 16:49:39 +00005279 case TARGET_NR_munlockall:
5280 ret = get_errno(munlockall());
5281 break;
thse5febef2007-04-01 18:31:35 +00005282#endif
bellard31e31b82003-02-18 22:55:36 +00005283 case TARGET_NR_truncate:
bellard579a97f2007-11-11 14:26:47 +00005284 if (!(p = lock_user_string(arg1)))
5285 goto efault;
pbrook53a59602006-03-25 19:31:22 +00005286 ret = get_errno(truncate(p, arg2));
5287 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00005288 break;
5289 case TARGET_NR_ftruncate:
5290 ret = get_errno(ftruncate(arg1, arg2));
5291 break;
5292 case TARGET_NR_fchmod:
5293 ret = get_errno(fchmod(arg1, arg2));
5294 break;
ths814d7972007-09-24 09:26:51 +00005295#if defined(TARGET_NR_fchmodat) && defined(__NR_fchmodat)
5296 case TARGET_NR_fchmodat:
bellard579a97f2007-11-11 14:26:47 +00005297 if (!(p = lock_user_string(arg2)))
5298 goto efault;
aurel32465c9f02009-04-19 08:52:17 +00005299 ret = get_errno(sys_fchmodat(arg1, p, arg3));
bellard579a97f2007-11-11 14:26:47 +00005300 unlock_user(p, arg2, 0);
ths814d7972007-09-24 09:26:51 +00005301 break;
5302#endif
bellard31e31b82003-02-18 22:55:36 +00005303 case TARGET_NR_getpriority:
thsc6cda172007-10-09 03:42:34 +00005304 /* libc does special remapping of the return value of
5305 * sys_getpriority() so it's just easiest to call
5306 * sys_getpriority() directly rather than through libc. */
5307 ret = sys_getpriority(arg1, arg2);
bellard31e31b82003-02-18 22:55:36 +00005308 break;
5309 case TARGET_NR_setpriority:
5310 ret = get_errno(setpriority(arg1, arg2, arg3));
5311 break;
bellardebc05482003-09-30 21:08:41 +00005312#ifdef TARGET_NR_profil
bellard31e31b82003-02-18 22:55:36 +00005313 case TARGET_NR_profil:
5314 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00005315#endif
bellard31e31b82003-02-18 22:55:36 +00005316 case TARGET_NR_statfs:
bellard579a97f2007-11-11 14:26:47 +00005317 if (!(p = lock_user_string(arg1)))
5318 goto efault;
pbrook53a59602006-03-25 19:31:22 +00005319 ret = get_errno(statfs(path(p), &stfs));
5320 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00005321 convert_statfs:
5322 if (!is_error(ret)) {
pbrook53a59602006-03-25 19:31:22 +00005323 struct target_statfs *target_stfs;
ths3b46e622007-09-17 08:09:54 +00005324
bellard579a97f2007-11-11 14:26:47 +00005325 if (!lock_user_struct(VERIFY_WRITE, target_stfs, arg2, 0))
5326 goto efault;
5327 __put_user(stfs.f_type, &target_stfs->f_type);
5328 __put_user(stfs.f_bsize, &target_stfs->f_bsize);
5329 __put_user(stfs.f_blocks, &target_stfs->f_blocks);
5330 __put_user(stfs.f_bfree, &target_stfs->f_bfree);
5331 __put_user(stfs.f_bavail, &target_stfs->f_bavail);
5332 __put_user(stfs.f_files, &target_stfs->f_files);
5333 __put_user(stfs.f_ffree, &target_stfs->f_ffree);
5334 __put_user(stfs.f_fsid.__val[0], &target_stfs->f_fsid.val[0]);
5335 __put_user(stfs.f_fsid.__val[1], &target_stfs->f_fsid.val[1]);
5336 __put_user(stfs.f_namelen, &target_stfs->f_namelen);
pbrook53a59602006-03-25 19:31:22 +00005337 unlock_user_struct(target_stfs, arg2, 1);
bellard31e31b82003-02-18 22:55:36 +00005338 }
5339 break;
5340 case TARGET_NR_fstatfs:
bellard56c8f682005-11-28 22:28:41 +00005341 ret = get_errno(fstatfs(arg1, &stfs));
bellard31e31b82003-02-18 22:55:36 +00005342 goto convert_statfs;
bellard56c8f682005-11-28 22:28:41 +00005343#ifdef TARGET_NR_statfs64
5344 case TARGET_NR_statfs64:
bellard579a97f2007-11-11 14:26:47 +00005345 if (!(p = lock_user_string(arg1)))
5346 goto efault;
pbrook53a59602006-03-25 19:31:22 +00005347 ret = get_errno(statfs(path(p), &stfs));
5348 unlock_user(p, arg1, 0);
bellard56c8f682005-11-28 22:28:41 +00005349 convert_statfs64:
5350 if (!is_error(ret)) {
pbrook53a59602006-03-25 19:31:22 +00005351 struct target_statfs64 *target_stfs;
ths3b46e622007-09-17 08:09:54 +00005352
bellard579a97f2007-11-11 14:26:47 +00005353 if (!lock_user_struct(VERIFY_WRITE, target_stfs, arg3, 0))
5354 goto efault;
5355 __put_user(stfs.f_type, &target_stfs->f_type);
5356 __put_user(stfs.f_bsize, &target_stfs->f_bsize);
5357 __put_user(stfs.f_blocks, &target_stfs->f_blocks);
5358 __put_user(stfs.f_bfree, &target_stfs->f_bfree);
5359 __put_user(stfs.f_bavail, &target_stfs->f_bavail);
5360 __put_user(stfs.f_files, &target_stfs->f_files);
5361 __put_user(stfs.f_ffree, &target_stfs->f_ffree);
5362 __put_user(stfs.f_fsid.__val[0], &target_stfs->f_fsid.val[0]);
5363 __put_user(stfs.f_fsid.__val[1], &target_stfs->f_fsid.val[1]);
5364 __put_user(stfs.f_namelen, &target_stfs->f_namelen);
5365 unlock_user_struct(target_stfs, arg3, 1);
bellard56c8f682005-11-28 22:28:41 +00005366 }
5367 break;
5368 case TARGET_NR_fstatfs64:
5369 ret = get_errno(fstatfs(arg1, &stfs));
5370 goto convert_statfs64;
5371#endif
bellardebc05482003-09-30 21:08:41 +00005372#ifdef TARGET_NR_ioperm
bellard31e31b82003-02-18 22:55:36 +00005373 case TARGET_NR_ioperm:
5374 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00005375#endif
thse5febef2007-04-01 18:31:35 +00005376#ifdef TARGET_NR_socketcall
bellard31e31b82003-02-18 22:55:36 +00005377 case TARGET_NR_socketcall:
pbrook53a59602006-03-25 19:31:22 +00005378 ret = do_socketcall(arg1, arg2);
bellard31e31b82003-02-18 22:55:36 +00005379 break;
thse5febef2007-04-01 18:31:35 +00005380#endif
bellard3532fa72006-06-24 15:06:03 +00005381#ifdef TARGET_NR_accept
5382 case TARGET_NR_accept:
pbrook1be9e1d2006-11-19 15:26:04 +00005383 ret = do_accept(arg1, arg2, arg3);
bellard3532fa72006-06-24 15:06:03 +00005384 break;
5385#endif
5386#ifdef TARGET_NR_bind
5387 case TARGET_NR_bind:
5388 ret = do_bind(arg1, arg2, arg3);
5389 break;
5390#endif
5391#ifdef TARGET_NR_connect
5392 case TARGET_NR_connect:
5393 ret = do_connect(arg1, arg2, arg3);
5394 break;
5395#endif
5396#ifdef TARGET_NR_getpeername
5397 case TARGET_NR_getpeername:
pbrook1be9e1d2006-11-19 15:26:04 +00005398 ret = do_getpeername(arg1, arg2, arg3);
bellard3532fa72006-06-24 15:06:03 +00005399 break;
5400#endif
5401#ifdef TARGET_NR_getsockname
5402 case TARGET_NR_getsockname:
pbrook1be9e1d2006-11-19 15:26:04 +00005403 ret = do_getsockname(arg1, arg2, arg3);
bellard3532fa72006-06-24 15:06:03 +00005404 break;
5405#endif
5406#ifdef TARGET_NR_getsockopt
5407 case TARGET_NR_getsockopt:
5408 ret = do_getsockopt(arg1, arg2, arg3, arg4, arg5);
5409 break;
5410#endif
5411#ifdef TARGET_NR_listen
5412 case TARGET_NR_listen:
pbrook1be9e1d2006-11-19 15:26:04 +00005413 ret = get_errno(listen(arg1, arg2));
bellard3532fa72006-06-24 15:06:03 +00005414 break;
5415#endif
5416#ifdef TARGET_NR_recv
5417 case TARGET_NR_recv:
pbrook214201b2007-03-17 01:27:24 +00005418 ret = do_recvfrom(arg1, arg2, arg3, arg4, 0, 0);
bellard3532fa72006-06-24 15:06:03 +00005419 break;
5420#endif
5421#ifdef TARGET_NR_recvfrom
5422 case TARGET_NR_recvfrom:
pbrook214201b2007-03-17 01:27:24 +00005423 ret = do_recvfrom(arg1, arg2, arg3, arg4, arg5, arg6);
bellard3532fa72006-06-24 15:06:03 +00005424 break;
5425#endif
5426#ifdef TARGET_NR_recvmsg
5427 case TARGET_NR_recvmsg:
5428 ret = do_sendrecvmsg(arg1, arg2, arg3, 0);
5429 break;
5430#endif
5431#ifdef TARGET_NR_send
5432 case TARGET_NR_send:
pbrook1be9e1d2006-11-19 15:26:04 +00005433 ret = do_sendto(arg1, arg2, arg3, arg4, 0, 0);
bellard3532fa72006-06-24 15:06:03 +00005434 break;
5435#endif
5436#ifdef TARGET_NR_sendmsg
5437 case TARGET_NR_sendmsg:
5438 ret = do_sendrecvmsg(arg1, arg2, arg3, 1);
5439 break;
5440#endif
5441#ifdef TARGET_NR_sendto
5442 case TARGET_NR_sendto:
pbrook1be9e1d2006-11-19 15:26:04 +00005443 ret = do_sendto(arg1, arg2, arg3, arg4, arg5, arg6);
bellard3532fa72006-06-24 15:06:03 +00005444 break;
5445#endif
5446#ifdef TARGET_NR_shutdown
5447 case TARGET_NR_shutdown:
pbrook1be9e1d2006-11-19 15:26:04 +00005448 ret = get_errno(shutdown(arg1, arg2));
bellard3532fa72006-06-24 15:06:03 +00005449 break;
5450#endif
5451#ifdef TARGET_NR_socket
5452 case TARGET_NR_socket:
5453 ret = do_socket(arg1, arg2, arg3);
5454 break;
5455#endif
5456#ifdef TARGET_NR_socketpair
5457 case TARGET_NR_socketpair:
pbrook1be9e1d2006-11-19 15:26:04 +00005458 ret = do_socketpair(arg1, arg2, arg3, arg4);
bellard3532fa72006-06-24 15:06:03 +00005459 break;
5460#endif
5461#ifdef TARGET_NR_setsockopt
5462 case TARGET_NR_setsockopt:
5463 ret = do_setsockopt(arg1, arg2, arg3, arg4, (socklen_t) arg5);
5464 break;
5465#endif
ths7494b0f2007-02-11 18:26:53 +00005466
bellard31e31b82003-02-18 22:55:36 +00005467 case TARGET_NR_syslog:
bellard579a97f2007-11-11 14:26:47 +00005468 if (!(p = lock_user_string(arg2)))
5469 goto efault;
thse5574482007-02-11 20:03:13 +00005470 ret = get_errno(sys_syslog((int)arg1, p, (int)arg3));
5471 unlock_user(p, arg2, 0);
ths7494b0f2007-02-11 18:26:53 +00005472 break;
5473
bellard31e31b82003-02-18 22:55:36 +00005474 case TARGET_NR_setitimer:
bellard66fb9762003-03-23 01:06:05 +00005475 {
bellard66fb9762003-03-23 01:06:05 +00005476 struct itimerval value, ovalue, *pvalue;
5477
pbrook53a59602006-03-25 19:31:22 +00005478 if (arg2) {
bellard66fb9762003-03-23 01:06:05 +00005479 pvalue = &value;
ths788f5ec2007-12-09 02:37:05 +00005480 if (copy_from_user_timeval(&pvalue->it_interval, arg2)
5481 || copy_from_user_timeval(&pvalue->it_value,
5482 arg2 + sizeof(struct target_timeval)))
5483 goto efault;
bellard66fb9762003-03-23 01:06:05 +00005484 } else {
5485 pvalue = NULL;
5486 }
5487 ret = get_errno(setitimer(arg1, pvalue, &ovalue));
pbrook53a59602006-03-25 19:31:22 +00005488 if (!is_error(ret) && arg3) {
ths788f5ec2007-12-09 02:37:05 +00005489 if (copy_to_user_timeval(arg3,
5490 &ovalue.it_interval)
5491 || copy_to_user_timeval(arg3 + sizeof(struct target_timeval),
5492 &ovalue.it_value))
5493 goto efault;
bellard66fb9762003-03-23 01:06:05 +00005494 }
5495 }
5496 break;
bellard31e31b82003-02-18 22:55:36 +00005497 case TARGET_NR_getitimer:
bellard66fb9762003-03-23 01:06:05 +00005498 {
bellard66fb9762003-03-23 01:06:05 +00005499 struct itimerval value;
ths3b46e622007-09-17 08:09:54 +00005500
bellard66fb9762003-03-23 01:06:05 +00005501 ret = get_errno(getitimer(arg1, &value));
pbrook53a59602006-03-25 19:31:22 +00005502 if (!is_error(ret) && arg2) {
ths788f5ec2007-12-09 02:37:05 +00005503 if (copy_to_user_timeval(arg2,
5504 &value.it_interval)
5505 || copy_to_user_timeval(arg2 + sizeof(struct target_timeval),
5506 &value.it_value))
5507 goto efault;
bellard66fb9762003-03-23 01:06:05 +00005508 }
5509 }
5510 break;
bellard31e31b82003-02-18 22:55:36 +00005511 case TARGET_NR_stat:
bellard579a97f2007-11-11 14:26:47 +00005512 if (!(p = lock_user_string(arg1)))
5513 goto efault;
pbrook53a59602006-03-25 19:31:22 +00005514 ret = get_errno(stat(path(p), &st));
5515 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00005516 goto do_stat;
5517 case TARGET_NR_lstat:
bellard579a97f2007-11-11 14:26:47 +00005518 if (!(p = lock_user_string(arg1)))
5519 goto efault;
pbrook53a59602006-03-25 19:31:22 +00005520 ret = get_errno(lstat(path(p), &st));
5521 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00005522 goto do_stat;
5523 case TARGET_NR_fstat:
5524 {
5525 ret = get_errno(fstat(arg1, &st));
5526 do_stat:
5527 if (!is_error(ret)) {
pbrook53a59602006-03-25 19:31:22 +00005528 struct target_stat *target_st;
thse3584652007-06-01 11:49:38 +00005529
bellard579a97f2007-11-11 14:26:47 +00005530 if (!lock_user_struct(VERIFY_WRITE, target_st, arg2, 0))
5531 goto efault;
bellardd2fd1af2007-11-14 18:08:56 +00005532 __put_user(st.st_dev, &target_st->st_dev);
5533 __put_user(st.st_ino, &target_st->st_ino);
5534 __put_user(st.st_mode, &target_st->st_mode);
5535 __put_user(st.st_uid, &target_st->st_uid);
5536 __put_user(st.st_gid, &target_st->st_gid);
5537 __put_user(st.st_nlink, &target_st->st_nlink);
5538 __put_user(st.st_rdev, &target_st->st_rdev);
5539 __put_user(st.st_size, &target_st->st_size);
5540 __put_user(st.st_blksize, &target_st->st_blksize);
5541 __put_user(st.st_blocks, &target_st->st_blocks);
5542 __put_user(st.st_atime, &target_st->target_st_atime);
5543 __put_user(st.st_mtime, &target_st->target_st_mtime);
5544 __put_user(st.st_ctime, &target_st->target_st_ctime);
pbrook53a59602006-03-25 19:31:22 +00005545 unlock_user_struct(target_st, arg2, 1);
bellard31e31b82003-02-18 22:55:36 +00005546 }
5547 }
5548 break;
bellardebc05482003-09-30 21:08:41 +00005549#ifdef TARGET_NR_olduname
bellard31e31b82003-02-18 22:55:36 +00005550 case TARGET_NR_olduname:
5551 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00005552#endif
5553#ifdef TARGET_NR_iopl
bellard31e31b82003-02-18 22:55:36 +00005554 case TARGET_NR_iopl:
5555 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00005556#endif
bellard31e31b82003-02-18 22:55:36 +00005557 case TARGET_NR_vhangup:
5558 ret = get_errno(vhangup());
5559 break;
bellardebc05482003-09-30 21:08:41 +00005560#ifdef TARGET_NR_idle
bellard31e31b82003-02-18 22:55:36 +00005561 case TARGET_NR_idle:
5562 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00005563#endif
bellard42ad6ae2005-01-03 22:48:11 +00005564#ifdef TARGET_NR_syscall
5565 case TARGET_NR_syscall:
5566 ret = do_syscall(cpu_env,arg1 & 0xffff,arg2,arg3,arg4,arg5,arg6,0);
5567 break;
5568#endif
bellard31e31b82003-02-18 22:55:36 +00005569 case TARGET_NR_wait4:
5570 {
5571 int status;
blueswir1992f48a2007-10-14 16:27:31 +00005572 abi_long status_ptr = arg2;
bellard31e31b82003-02-18 22:55:36 +00005573 struct rusage rusage, *rusage_ptr;
blueswir1992f48a2007-10-14 16:27:31 +00005574 abi_ulong target_rusage = arg4;
bellard31e31b82003-02-18 22:55:36 +00005575 if (target_rusage)
5576 rusage_ptr = &rusage;
5577 else
5578 rusage_ptr = NULL;
5579 ret = get_errno(wait4(arg1, &status, arg3, rusage_ptr));
5580 if (!is_error(ret)) {
bellard2f619692007-11-16 10:46:05 +00005581 if (status_ptr) {
pbrook1d9d8b52009-04-16 15:17:02 +00005582 status = host_to_target_waitstatus(status);
bellard2f619692007-11-16 10:46:05 +00005583 if (put_user_s32(status, status_ptr))
5584 goto efault;
bellard31e31b82003-02-18 22:55:36 +00005585 }
bellard2f619692007-11-16 10:46:05 +00005586 if (target_rusage)
5587 host_to_target_rusage(target_rusage, &rusage);
bellard31e31b82003-02-18 22:55:36 +00005588 }
5589 }
5590 break;
thse5febef2007-04-01 18:31:35 +00005591#ifdef TARGET_NR_swapoff
bellard31e31b82003-02-18 22:55:36 +00005592 case TARGET_NR_swapoff:
bellard579a97f2007-11-11 14:26:47 +00005593 if (!(p = lock_user_string(arg1)))
5594 goto efault;
pbrook53a59602006-03-25 19:31:22 +00005595 ret = get_errno(swapoff(p));
5596 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00005597 break;
thse5febef2007-04-01 18:31:35 +00005598#endif
bellard31e31b82003-02-18 22:55:36 +00005599 case TARGET_NR_sysinfo:
bellarda5448a72004-06-19 16:59:03 +00005600 {
pbrook53a59602006-03-25 19:31:22 +00005601 struct target_sysinfo *target_value;
bellarda5448a72004-06-19 16:59:03 +00005602 struct sysinfo value;
5603 ret = get_errno(sysinfo(&value));
pbrook53a59602006-03-25 19:31:22 +00005604 if (!is_error(ret) && arg1)
bellarda5448a72004-06-19 16:59:03 +00005605 {
bellard579a97f2007-11-11 14:26:47 +00005606 if (!lock_user_struct(VERIFY_WRITE, target_value, arg1, 0))
5607 goto efault;
bellarda5448a72004-06-19 16:59:03 +00005608 __put_user(value.uptime, &target_value->uptime);
5609 __put_user(value.loads[0], &target_value->loads[0]);
5610 __put_user(value.loads[1], &target_value->loads[1]);
5611 __put_user(value.loads[2], &target_value->loads[2]);
5612 __put_user(value.totalram, &target_value->totalram);
5613 __put_user(value.freeram, &target_value->freeram);
5614 __put_user(value.sharedram, &target_value->sharedram);
5615 __put_user(value.bufferram, &target_value->bufferram);
5616 __put_user(value.totalswap, &target_value->totalswap);
5617 __put_user(value.freeswap, &target_value->freeswap);
5618 __put_user(value.procs, &target_value->procs);
5619 __put_user(value.totalhigh, &target_value->totalhigh);
5620 __put_user(value.freehigh, &target_value->freehigh);
5621 __put_user(value.mem_unit, &target_value->mem_unit);
pbrook53a59602006-03-25 19:31:22 +00005622 unlock_user_struct(target_value, arg1, 1);
bellarda5448a72004-06-19 16:59:03 +00005623 }
5624 }
5625 break;
thse5febef2007-04-01 18:31:35 +00005626#ifdef TARGET_NR_ipc
bellard31e31b82003-02-18 22:55:36 +00005627 case TARGET_NR_ipc:
bellard8853f862004-02-22 14:57:26 +00005628 ret = do_ipc(arg1, arg2, arg3, arg4, arg5, arg6);
5629 break;
thse5febef2007-04-01 18:31:35 +00005630#endif
aurel32e5289082009-04-18 16:16:12 +00005631#ifdef TARGET_NR_semget
5632 case TARGET_NR_semget:
5633 ret = get_errno(semget(arg1, arg2, arg3));
5634 break;
5635#endif
5636#ifdef TARGET_NR_semop
5637 case TARGET_NR_semop:
5638 ret = get_errno(do_semop(arg1, arg2, arg3));
5639 break;
5640#endif
5641#ifdef TARGET_NR_semctl
5642 case TARGET_NR_semctl:
5643 ret = do_semctl(arg1, arg2, arg3, (union target_semun)(abi_ulong)arg4);
5644 break;
5645#endif
aurel32eeb438c2008-10-13 21:08:55 +00005646#ifdef TARGET_NR_msgctl
5647 case TARGET_NR_msgctl:
5648 ret = do_msgctl(arg1, arg2, arg3);
5649 break;
5650#endif
5651#ifdef TARGET_NR_msgget
5652 case TARGET_NR_msgget:
5653 ret = get_errno(msgget(arg1, arg2));
5654 break;
5655#endif
5656#ifdef TARGET_NR_msgrcv
5657 case TARGET_NR_msgrcv:
5658 ret = do_msgrcv(arg1, arg2, arg3, arg4, arg5);
5659 break;
5660#endif
5661#ifdef TARGET_NR_msgsnd
5662 case TARGET_NR_msgsnd:
5663 ret = do_msgsnd(arg1, arg2, arg3, arg4);
5664 break;
5665#endif
Riku Voipio88a8c982009-04-03 10:42:00 +03005666#ifdef TARGET_NR_shmget
5667 case TARGET_NR_shmget:
5668 ret = get_errno(shmget(arg1, arg2, arg3));
5669 break;
5670#endif
5671#ifdef TARGET_NR_shmctl
5672 case TARGET_NR_shmctl:
5673 ret = do_shmctl(arg1, arg2, arg3);
5674 break;
5675#endif
5676#ifdef TARGET_NR_shmat
5677 case TARGET_NR_shmat:
5678 ret = do_shmat(arg1, arg2, arg3);
5679 break;
5680#endif
5681#ifdef TARGET_NR_shmdt
5682 case TARGET_NR_shmdt:
5683 ret = do_shmdt(arg1);
5684 break;
5685#endif
bellard31e31b82003-02-18 22:55:36 +00005686 case TARGET_NR_fsync:
5687 ret = get_errno(fsync(arg1));
5688 break;
bellard31e31b82003-02-18 22:55:36 +00005689 case TARGET_NR_clone:
aurel320b6d3ae2008-09-15 07:43:43 +00005690#if defined(TARGET_SH4)
5691 ret = get_errno(do_fork(cpu_env, arg1, arg2, arg3, arg5, arg4));
edgar_iglb15ad612009-01-07 19:43:47 +00005692#elif defined(TARGET_CRIS)
5693 ret = get_errno(do_fork(cpu_env, arg2, arg1, arg3, arg4, arg5));
aurel320b6d3ae2008-09-15 07:43:43 +00005694#else
pbrookd865bab2008-06-07 22:12:17 +00005695 ret = get_errno(do_fork(cpu_env, arg1, arg2, arg3, arg4, arg5));
aurel320b6d3ae2008-09-15 07:43:43 +00005696#endif
bellard1b6b0292003-03-22 17:31:38 +00005697 break;
bellardec86b0f2003-04-11 00:15:04 +00005698#ifdef __NR_exit_group
5699 /* new thread calls */
5700 case TARGET_NR_exit_group:
Juan Quintela9788c9c2009-07-27 16:13:02 +02005701#ifdef TARGET_GPROF
aurel326d946cd2008-11-06 16:15:18 +00005702 _mcleanup();
5703#endif
bellarde9009672005-04-26 20:42:36 +00005704 gdb_exit(cpu_env, arg1);
bellardec86b0f2003-04-11 00:15:04 +00005705 ret = get_errno(exit_group(arg1));
5706 break;
5707#endif
bellard31e31b82003-02-18 22:55:36 +00005708 case TARGET_NR_setdomainname:
bellard579a97f2007-11-11 14:26:47 +00005709 if (!(p = lock_user_string(arg1)))
5710 goto efault;
pbrook53a59602006-03-25 19:31:22 +00005711 ret = get_errno(setdomainname(p, arg2));
5712 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00005713 break;
5714 case TARGET_NR_uname:
5715 /* no need to transcode because we use the linux syscall */
bellard29e619b2004-09-13 21:41:04 +00005716 {
5717 struct new_utsname * buf;
ths3b46e622007-09-17 08:09:54 +00005718
bellard579a97f2007-11-11 14:26:47 +00005719 if (!lock_user_struct(VERIFY_WRITE, buf, arg1, 0))
5720 goto efault;
bellard29e619b2004-09-13 21:41:04 +00005721 ret = get_errno(sys_uname(buf));
5722 if (!is_error(ret)) {
5723 /* Overrite the native machine name with whatever is being
5724 emulated. */
5725 strcpy (buf->machine, UNAME_MACHINE);
pbrookc5937222006-05-14 11:30:38 +00005726 /* Allow the user to override the reported release. */
5727 if (qemu_uname_release && *qemu_uname_release)
5728 strcpy (buf->release, qemu_uname_release);
bellard29e619b2004-09-13 21:41:04 +00005729 }
pbrook53a59602006-03-25 19:31:22 +00005730 unlock_user_struct(buf, arg1, 1);
bellard29e619b2004-09-13 21:41:04 +00005731 }
bellard31e31b82003-02-18 22:55:36 +00005732 break;
bellard6dbad632003-03-16 18:05:05 +00005733#ifdef TARGET_I386
bellard31e31b82003-02-18 22:55:36 +00005734 case TARGET_NR_modify_ldt:
bellard03acab62007-11-11 14:57:14 +00005735 ret = do_modify_ldt(cpu_env, arg1, arg2, arg3);
bellard5cd43932003-03-29 16:54:36 +00005736 break;
j_mayer84409dd2007-04-06 08:56:50 +00005737#if !defined(TARGET_X86_64)
bellard5cd43932003-03-29 16:54:36 +00005738 case TARGET_NR_vm86old:
5739 goto unimplemented;
5740 case TARGET_NR_vm86:
pbrook53a59602006-03-25 19:31:22 +00005741 ret = do_vm86(cpu_env, arg1, arg2);
bellard6dbad632003-03-16 18:05:05 +00005742 break;
5743#endif
j_mayer84409dd2007-04-06 08:56:50 +00005744#endif
bellard31e31b82003-02-18 22:55:36 +00005745 case TARGET_NR_adjtimex:
5746 goto unimplemented;
thse5febef2007-04-01 18:31:35 +00005747#ifdef TARGET_NR_create_module
bellard31e31b82003-02-18 22:55:36 +00005748 case TARGET_NR_create_module:
thse5febef2007-04-01 18:31:35 +00005749#endif
bellard31e31b82003-02-18 22:55:36 +00005750 case TARGET_NR_init_module:
5751 case TARGET_NR_delete_module:
thse5febef2007-04-01 18:31:35 +00005752#ifdef TARGET_NR_get_kernel_syms
bellard31e31b82003-02-18 22:55:36 +00005753 case TARGET_NR_get_kernel_syms:
thse5febef2007-04-01 18:31:35 +00005754#endif
bellard31e31b82003-02-18 22:55:36 +00005755 goto unimplemented;
5756 case TARGET_NR_quotactl:
5757 goto unimplemented;
5758 case TARGET_NR_getpgid:
5759 ret = get_errno(getpgid(arg1));
5760 break;
5761 case TARGET_NR_fchdir:
5762 ret = get_errno(fchdir(arg1));
5763 break;
j_mayer84409dd2007-04-06 08:56:50 +00005764#ifdef TARGET_NR_bdflush /* not on x86_64 */
bellard31e31b82003-02-18 22:55:36 +00005765 case TARGET_NR_bdflush:
5766 goto unimplemented;
j_mayer84409dd2007-04-06 08:56:50 +00005767#endif
thse5febef2007-04-01 18:31:35 +00005768#ifdef TARGET_NR_sysfs
bellard31e31b82003-02-18 22:55:36 +00005769 case TARGET_NR_sysfs:
5770 goto unimplemented;
thse5febef2007-04-01 18:31:35 +00005771#endif
bellard31e31b82003-02-18 22:55:36 +00005772 case TARGET_NR_personality:
bellard1b6b0292003-03-22 17:31:38 +00005773 ret = get_errno(personality(arg1));
bellard31e31b82003-02-18 22:55:36 +00005774 break;
thse5febef2007-04-01 18:31:35 +00005775#ifdef TARGET_NR_afs_syscall
bellard31e31b82003-02-18 22:55:36 +00005776 case TARGET_NR_afs_syscall:
5777 goto unimplemented;
thse5febef2007-04-01 18:31:35 +00005778#endif
j_mayer7a3148a2007-04-05 07:13:51 +00005779#ifdef TARGET_NR__llseek /* Not on alpha */
bellard31e31b82003-02-18 22:55:36 +00005780 case TARGET_NR__llseek:
5781 {
bellard4f2ac232004-04-26 19:44:02 +00005782#if defined (__x86_64__)
5783 ret = get_errno(lseek(arg1, ((uint64_t )arg2 << 32) | arg3, arg5));
bellard2f619692007-11-16 10:46:05 +00005784 if (put_user_s64(ret, arg4))
5785 goto efault;
bellard4f2ac232004-04-26 19:44:02 +00005786#else
bellard31e31b82003-02-18 22:55:36 +00005787 int64_t res;
5788 ret = get_errno(_llseek(arg1, arg2, arg3, &res, arg5));
bellard2f619692007-11-16 10:46:05 +00005789 if (put_user_s64(res, arg4))
5790 goto efault;
bellard4f2ac232004-04-26 19:44:02 +00005791#endif
bellard31e31b82003-02-18 22:55:36 +00005792 }
5793 break;
j_mayer7a3148a2007-04-05 07:13:51 +00005794#endif
bellard31e31b82003-02-18 22:55:36 +00005795 case TARGET_NR_getdents:
Ulrich Hechtd83c8732009-07-24 19:10:28 +02005796#if TARGET_ABI_BITS == 32 && HOST_LONG_BITS == 64
bellard4add45b2003-06-05 01:52:59 +00005797 {
pbrook53a59602006-03-25 19:31:22 +00005798 struct target_dirent *target_dirp;
aurel326556a832008-10-13 21:08:17 +00005799 struct linux_dirent *dirp;
blueswir1992f48a2007-10-14 16:27:31 +00005800 abi_long count = arg3;
bellard4add45b2003-06-05 01:52:59 +00005801
5802 dirp = malloc(count);
ths0da46a62007-10-20 20:23:07 +00005803 if (!dirp) {
bellard579a97f2007-11-11 14:26:47 +00005804 ret = -TARGET_ENOMEM;
ths0da46a62007-10-20 20:23:07 +00005805 goto fail;
5806 }
ths3b46e622007-09-17 08:09:54 +00005807
bellard4add45b2003-06-05 01:52:59 +00005808 ret = get_errno(sys_getdents(arg1, dirp, count));
5809 if (!is_error(ret)) {
aurel326556a832008-10-13 21:08:17 +00005810 struct linux_dirent *de;
bellard4add45b2003-06-05 01:52:59 +00005811 struct target_dirent *tde;
5812 int len = ret;
5813 int reclen, treclen;
5814 int count1, tnamelen;
5815
5816 count1 = 0;
5817 de = dirp;
bellard579a97f2007-11-11 14:26:47 +00005818 if (!(target_dirp = lock_user(VERIFY_WRITE, arg2, count, 0)))
5819 goto efault;
bellard4add45b2003-06-05 01:52:59 +00005820 tde = target_dirp;
5821 while (len > 0) {
5822 reclen = de->d_reclen;
blueswir1992f48a2007-10-14 16:27:31 +00005823 treclen = reclen - (2 * (sizeof(long) - sizeof(abi_long)));
bellard4add45b2003-06-05 01:52:59 +00005824 tde->d_reclen = tswap16(treclen);
5825 tde->d_ino = tswapl(de->d_ino);
5826 tde->d_off = tswapl(de->d_off);
blueswir1992f48a2007-10-14 16:27:31 +00005827 tnamelen = treclen - (2 * sizeof(abi_long) + 2);
bellard4add45b2003-06-05 01:52:59 +00005828 if (tnamelen > 256)
5829 tnamelen = 256;
bellard80a9d032005-01-03 23:31:27 +00005830 /* XXX: may not be correct */
blueswir1be15b142008-10-25 11:21:28 +00005831 pstrcpy(tde->d_name, tnamelen, de->d_name);
aurel326556a832008-10-13 21:08:17 +00005832 de = (struct linux_dirent *)((char *)de + reclen);
bellard4add45b2003-06-05 01:52:59 +00005833 len -= reclen;
j_mayer1c5bf3b2007-04-14 12:17:59 +00005834 tde = (struct target_dirent *)((char *)tde + treclen);
bellard4add45b2003-06-05 01:52:59 +00005835 count1 += treclen;
5836 }
5837 ret = count1;
bellard579a97f2007-11-11 14:26:47 +00005838 unlock_user(target_dirp, arg2, ret);
bellard4add45b2003-06-05 01:52:59 +00005839 }
5840 free(dirp);
5841 }
5842#else
bellard31e31b82003-02-18 22:55:36 +00005843 {
aurel326556a832008-10-13 21:08:17 +00005844 struct linux_dirent *dirp;
blueswir1992f48a2007-10-14 16:27:31 +00005845 abi_long count = arg3;
bellarddab2ed92003-03-22 15:23:14 +00005846
bellard579a97f2007-11-11 14:26:47 +00005847 if (!(dirp = lock_user(VERIFY_WRITE, arg2, count, 0)))
5848 goto efault;
bellard72f03902003-02-18 23:33:18 +00005849 ret = get_errno(sys_getdents(arg1, dirp, count));
bellard31e31b82003-02-18 22:55:36 +00005850 if (!is_error(ret)) {
aurel326556a832008-10-13 21:08:17 +00005851 struct linux_dirent *de;
bellard31e31b82003-02-18 22:55:36 +00005852 int len = ret;
5853 int reclen;
5854 de = dirp;
5855 while (len > 0) {
bellard8083a3e2003-03-24 23:12:16 +00005856 reclen = de->d_reclen;
bellard31e31b82003-02-18 22:55:36 +00005857 if (reclen > len)
5858 break;
bellard8083a3e2003-03-24 23:12:16 +00005859 de->d_reclen = tswap16(reclen);
bellard31e31b82003-02-18 22:55:36 +00005860 tswapls(&de->d_ino);
5861 tswapls(&de->d_off);
aurel326556a832008-10-13 21:08:17 +00005862 de = (struct linux_dirent *)((char *)de + reclen);
bellard31e31b82003-02-18 22:55:36 +00005863 len -= reclen;
5864 }
5865 }
pbrook53a59602006-03-25 19:31:22 +00005866 unlock_user(dirp, arg2, ret);
bellard31e31b82003-02-18 22:55:36 +00005867 }
bellard4add45b2003-06-05 01:52:59 +00005868#endif
bellard31e31b82003-02-18 22:55:36 +00005869 break;
ths3ae43202007-09-16 21:39:48 +00005870#if defined(TARGET_NR_getdents64) && defined(__NR_getdents64)
bellarddab2ed92003-03-22 15:23:14 +00005871 case TARGET_NR_getdents64:
5872 {
aurel326556a832008-10-13 21:08:17 +00005873 struct linux_dirent64 *dirp;
blueswir1992f48a2007-10-14 16:27:31 +00005874 abi_long count = arg3;
bellard579a97f2007-11-11 14:26:47 +00005875 if (!(dirp = lock_user(VERIFY_WRITE, arg2, count, 0)))
5876 goto efault;
bellarddab2ed92003-03-22 15:23:14 +00005877 ret = get_errno(sys_getdents64(arg1, dirp, count));
5878 if (!is_error(ret)) {
aurel326556a832008-10-13 21:08:17 +00005879 struct linux_dirent64 *de;
bellarddab2ed92003-03-22 15:23:14 +00005880 int len = ret;
5881 int reclen;
5882 de = dirp;
5883 while (len > 0) {
bellard8083a3e2003-03-24 23:12:16 +00005884 reclen = de->d_reclen;
bellarddab2ed92003-03-22 15:23:14 +00005885 if (reclen > len)
5886 break;
bellard8083a3e2003-03-24 23:12:16 +00005887 de->d_reclen = tswap16(reclen);
bellard8582a532007-11-11 23:11:36 +00005888 tswap64s((uint64_t *)&de->d_ino);
5889 tswap64s((uint64_t *)&de->d_off);
aurel326556a832008-10-13 21:08:17 +00005890 de = (struct linux_dirent64 *)((char *)de + reclen);
bellarddab2ed92003-03-22 15:23:14 +00005891 len -= reclen;
5892 }
5893 }
pbrook53a59602006-03-25 19:31:22 +00005894 unlock_user(dirp, arg2, ret);
bellarddab2ed92003-03-22 15:23:14 +00005895 }
5896 break;
bellarda541f292004-04-12 20:39:29 +00005897#endif /* TARGET_NR_getdents64 */
thse5febef2007-04-01 18:31:35 +00005898#ifdef TARGET_NR__newselect
bellard31e31b82003-02-18 22:55:36 +00005899 case TARGET_NR__newselect:
pbrook53a59602006-03-25 19:31:22 +00005900 ret = do_select(arg1, arg2, arg3, arg4, arg5);
bellard31e31b82003-02-18 22:55:36 +00005901 break;
thse5febef2007-04-01 18:31:35 +00005902#endif
5903#ifdef TARGET_NR_poll
bellard9de5e442003-03-23 16:49:39 +00005904 case TARGET_NR_poll:
5905 {
pbrook53a59602006-03-25 19:31:22 +00005906 struct target_pollfd *target_pfd;
bellard9de5e442003-03-23 16:49:39 +00005907 unsigned int nfds = arg2;
5908 int timeout = arg3;
5909 struct pollfd *pfd;
bellard7854b052003-03-29 17:22:23 +00005910 unsigned int i;
bellard9de5e442003-03-23 16:49:39 +00005911
bellard579a97f2007-11-11 14:26:47 +00005912 target_pfd = lock_user(VERIFY_WRITE, arg1, sizeof(struct target_pollfd) * nfds, 1);
5913 if (!target_pfd)
5914 goto efault;
bellard9de5e442003-03-23 16:49:39 +00005915 pfd = alloca(sizeof(struct pollfd) * nfds);
5916 for(i = 0; i < nfds; i++) {
bellard5cd43932003-03-29 16:54:36 +00005917 pfd[i].fd = tswap32(target_pfd[i].fd);
5918 pfd[i].events = tswap16(target_pfd[i].events);
bellard9de5e442003-03-23 16:49:39 +00005919 }
5920 ret = get_errno(poll(pfd, nfds, timeout));
5921 if (!is_error(ret)) {
5922 for(i = 0; i < nfds; i++) {
bellard5cd43932003-03-29 16:54:36 +00005923 target_pfd[i].revents = tswap16(pfd[i].revents);
bellard9de5e442003-03-23 16:49:39 +00005924 }
pbrook53a59602006-03-25 19:31:22 +00005925 ret += nfds * (sizeof(struct target_pollfd)
5926 - sizeof(struct pollfd));
bellard9de5e442003-03-23 16:49:39 +00005927 }
pbrook53a59602006-03-25 19:31:22 +00005928 unlock_user(target_pfd, arg1, ret);
bellard9de5e442003-03-23 16:49:39 +00005929 }
5930 break;
thse5febef2007-04-01 18:31:35 +00005931#endif
bellard31e31b82003-02-18 22:55:36 +00005932 case TARGET_NR_flock:
bellard9de5e442003-03-23 16:49:39 +00005933 /* NOTE: the flock constant seems to be the same for every
5934 Linux platform */
5935 ret = get_errno(flock(arg1, arg2));
bellard31e31b82003-02-18 22:55:36 +00005936 break;
5937 case TARGET_NR_readv:
5938 {
5939 int count = arg3;
bellard31e31b82003-02-18 22:55:36 +00005940 struct iovec *vec;
bellard31e31b82003-02-18 22:55:36 +00005941
5942 vec = alloca(count * sizeof(struct iovec));
bellard41df8412008-02-04 22:26:57 +00005943 if (lock_iovec(VERIFY_WRITE, vec, arg2, count, 0) < 0)
5944 goto efault;
bellard31e31b82003-02-18 22:55:36 +00005945 ret = get_errno(readv(arg1, vec, count));
pbrook53a59602006-03-25 19:31:22 +00005946 unlock_iovec(vec, arg2, count, 1);
bellard31e31b82003-02-18 22:55:36 +00005947 }
5948 break;
5949 case TARGET_NR_writev:
5950 {
5951 int count = arg3;
bellard31e31b82003-02-18 22:55:36 +00005952 struct iovec *vec;
bellard31e31b82003-02-18 22:55:36 +00005953
5954 vec = alloca(count * sizeof(struct iovec));
bellard41df8412008-02-04 22:26:57 +00005955 if (lock_iovec(VERIFY_READ, vec, arg2, count, 1) < 0)
5956 goto efault;
bellard31e31b82003-02-18 22:55:36 +00005957 ret = get_errno(writev(arg1, vec, count));
pbrook53a59602006-03-25 19:31:22 +00005958 unlock_iovec(vec, arg2, count, 0);
bellard31e31b82003-02-18 22:55:36 +00005959 }
5960 break;
5961 case TARGET_NR_getsid:
5962 ret = get_errno(getsid(arg1));
5963 break;
j_mayer7a3148a2007-04-05 07:13:51 +00005964#if defined(TARGET_NR_fdatasync) /* Not on alpha (osf_datasync ?) */
bellard31e31b82003-02-18 22:55:36 +00005965 case TARGET_NR_fdatasync:
bellard5cd43932003-03-29 16:54:36 +00005966 ret = get_errno(fdatasync(arg1));
5967 break;
j_mayer7a3148a2007-04-05 07:13:51 +00005968#endif
bellard31e31b82003-02-18 22:55:36 +00005969 case TARGET_NR__sysctl:
ths0da46a62007-10-20 20:23:07 +00005970 /* We don't implement this, but ENOTDIR is always a safe
bellard29e619b2004-09-13 21:41:04 +00005971 return value. */
ths0da46a62007-10-20 20:23:07 +00005972 ret = -TARGET_ENOTDIR;
5973 break;
bellard31e31b82003-02-18 22:55:36 +00005974 case TARGET_NR_sched_setparam:
bellard5cd43932003-03-29 16:54:36 +00005975 {
pbrook53a59602006-03-25 19:31:22 +00005976 struct sched_param *target_schp;
bellard5cd43932003-03-29 16:54:36 +00005977 struct sched_param schp;
pbrook53a59602006-03-25 19:31:22 +00005978
bellard579a97f2007-11-11 14:26:47 +00005979 if (!lock_user_struct(VERIFY_READ, target_schp, arg2, 1))
5980 goto efault;
bellard5cd43932003-03-29 16:54:36 +00005981 schp.sched_priority = tswap32(target_schp->sched_priority);
pbrook53a59602006-03-25 19:31:22 +00005982 unlock_user_struct(target_schp, arg2, 0);
bellard5cd43932003-03-29 16:54:36 +00005983 ret = get_errno(sched_setparam(arg1, &schp));
5984 }
5985 break;
bellard31e31b82003-02-18 22:55:36 +00005986 case TARGET_NR_sched_getparam:
bellard5cd43932003-03-29 16:54:36 +00005987 {
pbrook53a59602006-03-25 19:31:22 +00005988 struct sched_param *target_schp;
bellard5cd43932003-03-29 16:54:36 +00005989 struct sched_param schp;
5990 ret = get_errno(sched_getparam(arg1, &schp));
5991 if (!is_error(ret)) {
bellard579a97f2007-11-11 14:26:47 +00005992 if (!lock_user_struct(VERIFY_WRITE, target_schp, arg2, 0))
5993 goto efault;
bellard5cd43932003-03-29 16:54:36 +00005994 target_schp->sched_priority = tswap32(schp.sched_priority);
pbrook53a59602006-03-25 19:31:22 +00005995 unlock_user_struct(target_schp, arg2, 1);
bellard5cd43932003-03-29 16:54:36 +00005996 }
5997 }
5998 break;
bellard31e31b82003-02-18 22:55:36 +00005999 case TARGET_NR_sched_setscheduler:
bellard5cd43932003-03-29 16:54:36 +00006000 {
pbrook53a59602006-03-25 19:31:22 +00006001 struct sched_param *target_schp;
bellard5cd43932003-03-29 16:54:36 +00006002 struct sched_param schp;
bellard579a97f2007-11-11 14:26:47 +00006003 if (!lock_user_struct(VERIFY_READ, target_schp, arg3, 1))
6004 goto efault;
bellard5cd43932003-03-29 16:54:36 +00006005 schp.sched_priority = tswap32(target_schp->sched_priority);
pbrook53a59602006-03-25 19:31:22 +00006006 unlock_user_struct(target_schp, arg3, 0);
bellard5cd43932003-03-29 16:54:36 +00006007 ret = get_errno(sched_setscheduler(arg1, arg2, &schp));
6008 }
6009 break;
bellard31e31b82003-02-18 22:55:36 +00006010 case TARGET_NR_sched_getscheduler:
bellard5cd43932003-03-29 16:54:36 +00006011 ret = get_errno(sched_getscheduler(arg1));
6012 break;
bellard31e31b82003-02-18 22:55:36 +00006013 case TARGET_NR_sched_yield:
6014 ret = get_errno(sched_yield());
6015 break;
6016 case TARGET_NR_sched_get_priority_max:
bellard5cd43932003-03-29 16:54:36 +00006017 ret = get_errno(sched_get_priority_max(arg1));
6018 break;
bellard31e31b82003-02-18 22:55:36 +00006019 case TARGET_NR_sched_get_priority_min:
bellard5cd43932003-03-29 16:54:36 +00006020 ret = get_errno(sched_get_priority_min(arg1));
6021 break;
bellard31e31b82003-02-18 22:55:36 +00006022 case TARGET_NR_sched_rr_get_interval:
bellard5cd43932003-03-29 16:54:36 +00006023 {
bellard5cd43932003-03-29 16:54:36 +00006024 struct timespec ts;
6025 ret = get_errno(sched_rr_get_interval(arg1, &ts));
6026 if (!is_error(ret)) {
pbrook53a59602006-03-25 19:31:22 +00006027 host_to_target_timespec(arg2, &ts);
bellard5cd43932003-03-29 16:54:36 +00006028 }
6029 }
6030 break;
bellard31e31b82003-02-18 22:55:36 +00006031 case TARGET_NR_nanosleep:
bellard1b6b0292003-03-22 17:31:38 +00006032 {
bellard1b6b0292003-03-22 17:31:38 +00006033 struct timespec req, rem;
pbrook53a59602006-03-25 19:31:22 +00006034 target_to_host_timespec(&req, arg1);
bellard1b6b0292003-03-22 17:31:38 +00006035 ret = get_errno(nanosleep(&req, &rem));
pbrook53a59602006-03-25 19:31:22 +00006036 if (is_error(ret) && arg2) {
6037 host_to_target_timespec(arg2, &rem);
bellard1b6b0292003-03-22 17:31:38 +00006038 }
6039 }
6040 break;
thse5febef2007-04-01 18:31:35 +00006041#ifdef TARGET_NR_query_module
bellard31e31b82003-02-18 22:55:36 +00006042 case TARGET_NR_query_module:
bellard5cd43932003-03-29 16:54:36 +00006043 goto unimplemented;
thse5febef2007-04-01 18:31:35 +00006044#endif
6045#ifdef TARGET_NR_nfsservctl
bellard31e31b82003-02-18 22:55:36 +00006046 case TARGET_NR_nfsservctl:
bellard5cd43932003-03-29 16:54:36 +00006047 goto unimplemented;
thse5febef2007-04-01 18:31:35 +00006048#endif
bellard31e31b82003-02-18 22:55:36 +00006049 case TARGET_NR_prctl:
thse5574482007-02-11 20:03:13 +00006050 switch (arg1)
6051 {
6052 case PR_GET_PDEATHSIG:
6053 {
6054 int deathsig;
6055 ret = get_errno(prctl(arg1, &deathsig, arg3, arg4, arg5));
bellard2f619692007-11-16 10:46:05 +00006056 if (!is_error(ret) && arg2
6057 && put_user_ual(deathsig, arg2))
6058 goto efault;
thse5574482007-02-11 20:03:13 +00006059 }
6060 break;
6061 default:
6062 ret = get_errno(prctl(arg1, arg2, arg3, arg4, arg5));
6063 break;
6064 }
ths39b9aae2007-02-11 18:36:44 +00006065 break;
bellardd2fd1af2007-11-14 18:08:56 +00006066#ifdef TARGET_NR_arch_prctl
6067 case TARGET_NR_arch_prctl:
6068#if defined(TARGET_I386) && !defined(TARGET_ABI32)
6069 ret = do_arch_prctl(cpu_env, arg1, arg2);
6070 break;
6071#else
6072 goto unimplemented;
6073#endif
6074#endif
bellard67867302003-11-23 17:05:30 +00006075#ifdef TARGET_NR_pread
bellard31e31b82003-02-18 22:55:36 +00006076 case TARGET_NR_pread:
balroga4ae00b2008-09-20 03:14:14 +00006077#ifdef TARGET_ARM
6078 if (((CPUARMState *)cpu_env)->eabi)
6079 arg4 = arg5;
6080#endif
bellard579a97f2007-11-11 14:26:47 +00006081 if (!(p = lock_user(VERIFY_WRITE, arg2, arg3, 0)))
6082 goto efault;
pbrook53a59602006-03-25 19:31:22 +00006083 ret = get_errno(pread(arg1, p, arg3, arg4));
6084 unlock_user(p, arg2, ret);
bellard206f0fa2003-05-14 19:01:56 +00006085 break;
bellard31e31b82003-02-18 22:55:36 +00006086 case TARGET_NR_pwrite:
balroga4ae00b2008-09-20 03:14:14 +00006087#ifdef TARGET_ARM
6088 if (((CPUARMState *)cpu_env)->eabi)
6089 arg4 = arg5;
6090#endif
bellard579a97f2007-11-11 14:26:47 +00006091 if (!(p = lock_user(VERIFY_READ, arg2, arg3, 1)))
6092 goto efault;
pbrook53a59602006-03-25 19:31:22 +00006093 ret = get_errno(pwrite(arg1, p, arg3, arg4));
6094 unlock_user(p, arg2, 0);
bellard206f0fa2003-05-14 19:01:56 +00006095 break;
bellard67867302003-11-23 17:05:30 +00006096#endif
aurel32f2c7ba12008-03-28 22:32:06 +00006097#ifdef TARGET_NR_pread64
6098 case TARGET_NR_pread64:
6099 if (!(p = lock_user(VERIFY_WRITE, arg2, arg3, 0)))
6100 goto efault;
6101 ret = get_errno(pread64(arg1, p, arg3, target_offset64(arg4, arg5)));
6102 unlock_user(p, arg2, ret);
6103 break;
6104 case TARGET_NR_pwrite64:
6105 if (!(p = lock_user(VERIFY_READ, arg2, arg3, 1)))
6106 goto efault;
6107 ret = get_errno(pwrite64(arg1, p, arg3, target_offset64(arg4, arg5)));
6108 unlock_user(p, arg2, 0);
6109 break;
6110#endif
bellard31e31b82003-02-18 22:55:36 +00006111 case TARGET_NR_getcwd:
bellard579a97f2007-11-11 14:26:47 +00006112 if (!(p = lock_user(VERIFY_WRITE, arg1, arg2, 0)))
6113 goto efault;
pbrook53a59602006-03-25 19:31:22 +00006114 ret = get_errno(sys_getcwd1(p, arg2));
6115 unlock_user(p, arg1, ret);
bellard31e31b82003-02-18 22:55:36 +00006116 break;
6117 case TARGET_NR_capget:
bellard5cd43932003-03-29 16:54:36 +00006118 goto unimplemented;
bellard31e31b82003-02-18 22:55:36 +00006119 case TARGET_NR_capset:
bellard5cd43932003-03-29 16:54:36 +00006120 goto unimplemented;
bellard31e31b82003-02-18 22:55:36 +00006121 case TARGET_NR_sigaltstack:
ths198a74d2007-09-27 16:44:32 +00006122#if defined(TARGET_I386) || defined(TARGET_ARM) || defined(TARGET_MIPS) || \
Laurent Vivierc761c152009-08-03 16:12:19 +02006123 defined(TARGET_SPARC) || defined(TARGET_PPC) || defined(TARGET_ALPHA) || \
6124 defined(TARGET_M68K)
bellard579a97f2007-11-11 14:26:47 +00006125 ret = do_sigaltstack(arg1, arg2, get_sp_from_cpustate((CPUState *)cpu_env));
thsa04e1342007-09-27 13:57:58 +00006126 break;
6127#else
bellard5cd43932003-03-29 16:54:36 +00006128 goto unimplemented;
thsa04e1342007-09-27 13:57:58 +00006129#endif
bellard31e31b82003-02-18 22:55:36 +00006130 case TARGET_NR_sendfile:
bellard5cd43932003-03-29 16:54:36 +00006131 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00006132#ifdef TARGET_NR_getpmsg
bellard31e31b82003-02-18 22:55:36 +00006133 case TARGET_NR_getpmsg:
bellard5cd43932003-03-29 16:54:36 +00006134 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00006135#endif
6136#ifdef TARGET_NR_putpmsg
bellard31e31b82003-02-18 22:55:36 +00006137 case TARGET_NR_putpmsg:
bellard5cd43932003-03-29 16:54:36 +00006138 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00006139#endif
bellard048f6b42005-11-26 18:47:20 +00006140#ifdef TARGET_NR_vfork
bellard31e31b82003-02-18 22:55:36 +00006141 case TARGET_NR_vfork:
pbrookd865bab2008-06-07 22:12:17 +00006142 ret = get_errno(do_fork(cpu_env, CLONE_VFORK | CLONE_VM | SIGCHLD,
6143 0, 0, 0, 0));
bellard31e31b82003-02-18 22:55:36 +00006144 break;
bellard048f6b42005-11-26 18:47:20 +00006145#endif
bellardebc05482003-09-30 21:08:41 +00006146#ifdef TARGET_NR_ugetrlimit
bellard31e31b82003-02-18 22:55:36 +00006147 case TARGET_NR_ugetrlimit:
bellard728584b2003-04-29 20:43:36 +00006148 {
6149 struct rlimit rlim;
6150 ret = get_errno(getrlimit(arg1, &rlim));
6151 if (!is_error(ret)) {
pbrook53a59602006-03-25 19:31:22 +00006152 struct target_rlimit *target_rlim;
bellard579a97f2007-11-11 14:26:47 +00006153 if (!lock_user_struct(VERIFY_WRITE, target_rlim, arg2, 0))
6154 goto efault;
bellard728584b2003-04-29 20:43:36 +00006155 target_rlim->rlim_cur = tswapl(rlim.rlim_cur);
6156 target_rlim->rlim_max = tswapl(rlim.rlim_max);
pbrook53a59602006-03-25 19:31:22 +00006157 unlock_user_struct(target_rlim, arg2, 1);
bellard728584b2003-04-29 20:43:36 +00006158 }
6159 break;
6160 }
bellardebc05482003-09-30 21:08:41 +00006161#endif
bellarda315a142005-01-30 22:59:18 +00006162#ifdef TARGET_NR_truncate64
bellard31e31b82003-02-18 22:55:36 +00006163 case TARGET_NR_truncate64:
bellard579a97f2007-11-11 14:26:47 +00006164 if (!(p = lock_user_string(arg1)))
6165 goto efault;
pbrook53a59602006-03-25 19:31:22 +00006166 ret = target_truncate64(cpu_env, p, arg2, arg3, arg4);
6167 unlock_user(p, arg1, 0);
bellard667f38b2005-07-23 14:46:27 +00006168 break;
bellarda315a142005-01-30 22:59:18 +00006169#endif
6170#ifdef TARGET_NR_ftruncate64
bellard31e31b82003-02-18 22:55:36 +00006171 case TARGET_NR_ftruncate64:
pbrookce4defa2006-02-09 16:49:55 +00006172 ret = target_ftruncate64(cpu_env, arg1, arg2, arg3, arg4);
bellard667f38b2005-07-23 14:46:27 +00006173 break;
bellarda315a142005-01-30 22:59:18 +00006174#endif
6175#ifdef TARGET_NR_stat64
bellard31e31b82003-02-18 22:55:36 +00006176 case TARGET_NR_stat64:
bellard579a97f2007-11-11 14:26:47 +00006177 if (!(p = lock_user_string(arg1)))
6178 goto efault;
pbrook53a59602006-03-25 19:31:22 +00006179 ret = get_errno(stat(path(p), &st));
6180 unlock_user(p, arg1, 0);
balrog6a24a772008-09-20 02:23:36 +00006181 if (!is_error(ret))
6182 ret = host_to_target_stat64(cpu_env, arg2, &st);
6183 break;
bellarda315a142005-01-30 22:59:18 +00006184#endif
6185#ifdef TARGET_NR_lstat64
bellard31e31b82003-02-18 22:55:36 +00006186 case TARGET_NR_lstat64:
bellard579a97f2007-11-11 14:26:47 +00006187 if (!(p = lock_user_string(arg1)))
6188 goto efault;
pbrook53a59602006-03-25 19:31:22 +00006189 ret = get_errno(lstat(path(p), &st));
6190 unlock_user(p, arg1, 0);
balrog6a24a772008-09-20 02:23:36 +00006191 if (!is_error(ret))
6192 ret = host_to_target_stat64(cpu_env, arg2, &st);
6193 break;
bellarda315a142005-01-30 22:59:18 +00006194#endif
6195#ifdef TARGET_NR_fstat64
bellard31e31b82003-02-18 22:55:36 +00006196 case TARGET_NR_fstat64:
balrog6a24a772008-09-20 02:23:36 +00006197 ret = get_errno(fstat(arg1, &st));
6198 if (!is_error(ret))
6199 ret = host_to_target_stat64(cpu_env, arg2, &st);
6200 break;
bellardec86b0f2003-04-11 00:15:04 +00006201#endif
aurel329d33b762009-04-08 23:07:05 +00006202#if (defined(TARGET_NR_fstatat64) || defined(TARGET_NR_newfstatat)) && \
6203 (defined(__NR_fstatat64) || defined(__NR_newfstatat))
6204#ifdef TARGET_NR_fstatat64
balrog6a24a772008-09-20 02:23:36 +00006205 case TARGET_NR_fstatat64:
aurel329d33b762009-04-08 23:07:05 +00006206#endif
6207#ifdef TARGET_NR_newfstatat
6208 case TARGET_NR_newfstatat:
6209#endif
balrog6a24a772008-09-20 02:23:36 +00006210 if (!(p = lock_user_string(arg2)))
6211 goto efault;
aurel329d33b762009-04-08 23:07:05 +00006212#ifdef __NR_fstatat64
balrog6a24a772008-09-20 02:23:36 +00006213 ret = get_errno(sys_fstatat64(arg1, path(p), &st, arg4));
aurel329d33b762009-04-08 23:07:05 +00006214#else
6215 ret = get_errno(sys_newfstatat(arg1, path(p), &st, arg4));
6216#endif
balrog6a24a772008-09-20 02:23:36 +00006217 if (!is_error(ret))
6218 ret = host_to_target_stat64(cpu_env, arg3, &st);
bellard60cd49d2003-03-16 22:53:56 +00006219 break;
bellarda315a142005-01-30 22:59:18 +00006220#endif
bellard67867302003-11-23 17:05:30 +00006221#ifdef USE_UID16
6222 case TARGET_NR_lchown:
bellard579a97f2007-11-11 14:26:47 +00006223 if (!(p = lock_user_string(arg1)))
6224 goto efault;
pbrook53a59602006-03-25 19:31:22 +00006225 ret = get_errno(lchown(p, low2highuid(arg2), low2highgid(arg3)));
6226 unlock_user(p, arg1, 0);
bellard67867302003-11-23 17:05:30 +00006227 break;
6228 case TARGET_NR_getuid:
6229 ret = get_errno(high2lowuid(getuid()));
6230 break;
6231 case TARGET_NR_getgid:
6232 ret = get_errno(high2lowgid(getgid()));
6233 break;
6234 case TARGET_NR_geteuid:
6235 ret = get_errno(high2lowuid(geteuid()));
6236 break;
6237 case TARGET_NR_getegid:
6238 ret = get_errno(high2lowgid(getegid()));
6239 break;
6240 case TARGET_NR_setreuid:
6241 ret = get_errno(setreuid(low2highuid(arg1), low2highuid(arg2)));
6242 break;
6243 case TARGET_NR_setregid:
6244 ret = get_errno(setregid(low2highgid(arg1), low2highgid(arg2)));
6245 break;
6246 case TARGET_NR_getgroups:
6247 {
6248 int gidsetsize = arg1;
pbrook53a59602006-03-25 19:31:22 +00006249 uint16_t *target_grouplist;
bellard67867302003-11-23 17:05:30 +00006250 gid_t *grouplist;
6251 int i;
6252
6253 grouplist = alloca(gidsetsize * sizeof(gid_t));
6254 ret = get_errno(getgroups(gidsetsize, grouplist));
balrogcb3bc232008-09-20 02:08:13 +00006255 if (gidsetsize == 0)
6256 break;
bellard67867302003-11-23 17:05:30 +00006257 if (!is_error(ret)) {
bellard579a97f2007-11-11 14:26:47 +00006258 target_grouplist = lock_user(VERIFY_WRITE, arg2, gidsetsize * 2, 0);
6259 if (!target_grouplist)
6260 goto efault;
balroga2155fc2008-09-20 02:12:08 +00006261 for(i = 0;i < ret; i++)
bellard67867302003-11-23 17:05:30 +00006262 target_grouplist[i] = tswap16(grouplist[i]);
pbrook53a59602006-03-25 19:31:22 +00006263 unlock_user(target_grouplist, arg2, gidsetsize * 2);
bellard67867302003-11-23 17:05:30 +00006264 }
6265 }
6266 break;
6267 case TARGET_NR_setgroups:
6268 {
6269 int gidsetsize = arg1;
pbrook53a59602006-03-25 19:31:22 +00006270 uint16_t *target_grouplist;
bellard67867302003-11-23 17:05:30 +00006271 gid_t *grouplist;
6272 int i;
6273
6274 grouplist = alloca(gidsetsize * sizeof(gid_t));
bellard579a97f2007-11-11 14:26:47 +00006275 target_grouplist = lock_user(VERIFY_READ, arg2, gidsetsize * 2, 1);
6276 if (!target_grouplist) {
6277 ret = -TARGET_EFAULT;
6278 goto fail;
6279 }
bellard67867302003-11-23 17:05:30 +00006280 for(i = 0;i < gidsetsize; i++)
6281 grouplist[i] = tswap16(target_grouplist[i]);
pbrook53a59602006-03-25 19:31:22 +00006282 unlock_user(target_grouplist, arg2, 0);
bellard67867302003-11-23 17:05:30 +00006283 ret = get_errno(setgroups(gidsetsize, grouplist));
6284 }
6285 break;
6286 case TARGET_NR_fchown:
6287 ret = get_errno(fchown(arg1, low2highuid(arg2), low2highgid(arg3)));
6288 break;
thsccfa72b2007-09-24 09:23:34 +00006289#if defined(TARGET_NR_fchownat) && defined(__NR_fchownat)
6290 case TARGET_NR_fchownat:
bellard579a97f2007-11-11 14:26:47 +00006291 if (!(p = lock_user_string(arg2)))
6292 goto efault;
6293 ret = get_errno(sys_fchownat(arg1, p, low2highuid(arg3), low2highgid(arg4), arg5));
6294 unlock_user(p, arg2, 0);
thsccfa72b2007-09-24 09:23:34 +00006295 break;
6296#endif
bellard67867302003-11-23 17:05:30 +00006297#ifdef TARGET_NR_setresuid
6298 case TARGET_NR_setresuid:
ths5fafdf22007-09-16 21:08:06 +00006299 ret = get_errno(setresuid(low2highuid(arg1),
6300 low2highuid(arg2),
bellard67867302003-11-23 17:05:30 +00006301 low2highuid(arg3)));
6302 break;
6303#endif
6304#ifdef TARGET_NR_getresuid
6305 case TARGET_NR_getresuid:
6306 {
pbrook53a59602006-03-25 19:31:22 +00006307 uid_t ruid, euid, suid;
bellard67867302003-11-23 17:05:30 +00006308 ret = get_errno(getresuid(&ruid, &euid, &suid));
6309 if (!is_error(ret)) {
bellard2f619692007-11-16 10:46:05 +00006310 if (put_user_u16(high2lowuid(ruid), arg1)
6311 || put_user_u16(high2lowuid(euid), arg2)
6312 || put_user_u16(high2lowuid(suid), arg3))
6313 goto efault;
bellard67867302003-11-23 17:05:30 +00006314 }
6315 }
6316 break;
6317#endif
6318#ifdef TARGET_NR_getresgid
6319 case TARGET_NR_setresgid:
ths5fafdf22007-09-16 21:08:06 +00006320 ret = get_errno(setresgid(low2highgid(arg1),
6321 low2highgid(arg2),
bellard67867302003-11-23 17:05:30 +00006322 low2highgid(arg3)));
6323 break;
6324#endif
6325#ifdef TARGET_NR_getresgid
6326 case TARGET_NR_getresgid:
6327 {
pbrook53a59602006-03-25 19:31:22 +00006328 gid_t rgid, egid, sgid;
bellard67867302003-11-23 17:05:30 +00006329 ret = get_errno(getresgid(&rgid, &egid, &sgid));
6330 if (!is_error(ret)) {
bellard2f619692007-11-16 10:46:05 +00006331 if (put_user_u16(high2lowgid(rgid), arg1)
6332 || put_user_u16(high2lowgid(egid), arg2)
6333 || put_user_u16(high2lowgid(sgid), arg3))
6334 goto efault;
bellard67867302003-11-23 17:05:30 +00006335 }
6336 }
6337 break;
6338#endif
6339 case TARGET_NR_chown:
bellard579a97f2007-11-11 14:26:47 +00006340 if (!(p = lock_user_string(arg1)))
6341 goto efault;
pbrook53a59602006-03-25 19:31:22 +00006342 ret = get_errno(chown(p, low2highuid(arg2), low2highgid(arg3)));
6343 unlock_user(p, arg1, 0);
bellard67867302003-11-23 17:05:30 +00006344 break;
6345 case TARGET_NR_setuid:
6346 ret = get_errno(setuid(low2highuid(arg1)));
6347 break;
6348 case TARGET_NR_setgid:
6349 ret = get_errno(setgid(low2highgid(arg1)));
6350 break;
6351 case TARGET_NR_setfsuid:
6352 ret = get_errno(setfsuid(arg1));
6353 break;
6354 case TARGET_NR_setfsgid:
6355 ret = get_errno(setfsgid(arg1));
6356 break;
6357#endif /* USE_UID16 */
6358
bellarda315a142005-01-30 22:59:18 +00006359#ifdef TARGET_NR_lchown32
bellard31e31b82003-02-18 22:55:36 +00006360 case TARGET_NR_lchown32:
bellard579a97f2007-11-11 14:26:47 +00006361 if (!(p = lock_user_string(arg1)))
6362 goto efault;
pbrook53a59602006-03-25 19:31:22 +00006363 ret = get_errno(lchown(p, arg2, arg3));
6364 unlock_user(p, arg1, 0);
bellardb03c60f2003-03-23 17:19:56 +00006365 break;
bellarda315a142005-01-30 22:59:18 +00006366#endif
6367#ifdef TARGET_NR_getuid32
bellard31e31b82003-02-18 22:55:36 +00006368 case TARGET_NR_getuid32:
bellardb03c60f2003-03-23 17:19:56 +00006369 ret = get_errno(getuid());
6370 break;
bellarda315a142005-01-30 22:59:18 +00006371#endif
aurel3264b4d282008-11-14 17:20:15 +00006372
6373#if defined(TARGET_NR_getxuid) && defined(TARGET_ALPHA)
6374 /* Alpha specific */
6375 case TARGET_NR_getxuid:
6376 {
6377 uid_t euid;
6378 euid=geteuid();
6379 ((CPUAlphaState *)cpu_env)->ir[IR_A4]=euid;
6380 }
6381 ret = get_errno(getuid());
6382 break;
6383#endif
6384#if defined(TARGET_NR_getxgid) && defined(TARGET_ALPHA)
6385 /* Alpha specific */
6386 case TARGET_NR_getxgid:
6387 {
6388 uid_t egid;
6389 egid=getegid();
6390 ((CPUAlphaState *)cpu_env)->ir[IR_A4]=egid;
6391 }
6392 ret = get_errno(getgid());
6393 break;
6394#endif
6395
bellarda315a142005-01-30 22:59:18 +00006396#ifdef TARGET_NR_getgid32
bellard31e31b82003-02-18 22:55:36 +00006397 case TARGET_NR_getgid32:
bellardb03c60f2003-03-23 17:19:56 +00006398 ret = get_errno(getgid());
6399 break;
bellarda315a142005-01-30 22:59:18 +00006400#endif
6401#ifdef TARGET_NR_geteuid32
bellard31e31b82003-02-18 22:55:36 +00006402 case TARGET_NR_geteuid32:
bellardb03c60f2003-03-23 17:19:56 +00006403 ret = get_errno(geteuid());
6404 break;
bellarda315a142005-01-30 22:59:18 +00006405#endif
6406#ifdef TARGET_NR_getegid32
bellard31e31b82003-02-18 22:55:36 +00006407 case TARGET_NR_getegid32:
bellardb03c60f2003-03-23 17:19:56 +00006408 ret = get_errno(getegid());
6409 break;
bellarda315a142005-01-30 22:59:18 +00006410#endif
6411#ifdef TARGET_NR_setreuid32
bellard31e31b82003-02-18 22:55:36 +00006412 case TARGET_NR_setreuid32:
bellardb03c60f2003-03-23 17:19:56 +00006413 ret = get_errno(setreuid(arg1, arg2));
6414 break;
bellarda315a142005-01-30 22:59:18 +00006415#endif
6416#ifdef TARGET_NR_setregid32
bellard31e31b82003-02-18 22:55:36 +00006417 case TARGET_NR_setregid32:
bellardb03c60f2003-03-23 17:19:56 +00006418 ret = get_errno(setregid(arg1, arg2));
6419 break;
bellarda315a142005-01-30 22:59:18 +00006420#endif
6421#ifdef TARGET_NR_getgroups32
bellard31e31b82003-02-18 22:55:36 +00006422 case TARGET_NR_getgroups32:
bellard99c475a2005-01-31 20:45:13 +00006423 {
6424 int gidsetsize = arg1;
pbrook53a59602006-03-25 19:31:22 +00006425 uint32_t *target_grouplist;
bellard99c475a2005-01-31 20:45:13 +00006426 gid_t *grouplist;
6427 int i;
6428
6429 grouplist = alloca(gidsetsize * sizeof(gid_t));
6430 ret = get_errno(getgroups(gidsetsize, grouplist));
balrogcb3bc232008-09-20 02:08:13 +00006431 if (gidsetsize == 0)
6432 break;
bellard99c475a2005-01-31 20:45:13 +00006433 if (!is_error(ret)) {
bellard579a97f2007-11-11 14:26:47 +00006434 target_grouplist = lock_user(VERIFY_WRITE, arg2, gidsetsize * 4, 0);
6435 if (!target_grouplist) {
6436 ret = -TARGET_EFAULT;
6437 goto fail;
6438 }
balroga2155fc2008-09-20 02:12:08 +00006439 for(i = 0;i < ret; i++)
pbrook53a59602006-03-25 19:31:22 +00006440 target_grouplist[i] = tswap32(grouplist[i]);
6441 unlock_user(target_grouplist, arg2, gidsetsize * 4);
bellard99c475a2005-01-31 20:45:13 +00006442 }
6443 }
6444 break;
bellarda315a142005-01-30 22:59:18 +00006445#endif
6446#ifdef TARGET_NR_setgroups32
bellard31e31b82003-02-18 22:55:36 +00006447 case TARGET_NR_setgroups32:
bellard99c475a2005-01-31 20:45:13 +00006448 {
6449 int gidsetsize = arg1;
pbrook53a59602006-03-25 19:31:22 +00006450 uint32_t *target_grouplist;
bellard99c475a2005-01-31 20:45:13 +00006451 gid_t *grouplist;
6452 int i;
ths3b46e622007-09-17 08:09:54 +00006453
bellard99c475a2005-01-31 20:45:13 +00006454 grouplist = alloca(gidsetsize * sizeof(gid_t));
bellard579a97f2007-11-11 14:26:47 +00006455 target_grouplist = lock_user(VERIFY_READ, arg2, gidsetsize * 4, 1);
6456 if (!target_grouplist) {
6457 ret = -TARGET_EFAULT;
6458 goto fail;
6459 }
bellard99c475a2005-01-31 20:45:13 +00006460 for(i = 0;i < gidsetsize; i++)
pbrook53a59602006-03-25 19:31:22 +00006461 grouplist[i] = tswap32(target_grouplist[i]);
6462 unlock_user(target_grouplist, arg2, 0);
bellard99c475a2005-01-31 20:45:13 +00006463 ret = get_errno(setgroups(gidsetsize, grouplist));
6464 }
6465 break;
bellarda315a142005-01-30 22:59:18 +00006466#endif
6467#ifdef TARGET_NR_fchown32
bellard31e31b82003-02-18 22:55:36 +00006468 case TARGET_NR_fchown32:
bellardb03c60f2003-03-23 17:19:56 +00006469 ret = get_errno(fchown(arg1, arg2, arg3));
6470 break;
bellarda315a142005-01-30 22:59:18 +00006471#endif
6472#ifdef TARGET_NR_setresuid32
bellard31e31b82003-02-18 22:55:36 +00006473 case TARGET_NR_setresuid32:
bellardb03c60f2003-03-23 17:19:56 +00006474 ret = get_errno(setresuid(arg1, arg2, arg3));
6475 break;
bellarda315a142005-01-30 22:59:18 +00006476#endif
6477#ifdef TARGET_NR_getresuid32
bellard31e31b82003-02-18 22:55:36 +00006478 case TARGET_NR_getresuid32:
bellardb03c60f2003-03-23 17:19:56 +00006479 {
pbrook53a59602006-03-25 19:31:22 +00006480 uid_t ruid, euid, suid;
bellardb03c60f2003-03-23 17:19:56 +00006481 ret = get_errno(getresuid(&ruid, &euid, &suid));
6482 if (!is_error(ret)) {
bellard2f619692007-11-16 10:46:05 +00006483 if (put_user_u32(ruid, arg1)
6484 || put_user_u32(euid, arg2)
6485 || put_user_u32(suid, arg3))
6486 goto efault;
bellardb03c60f2003-03-23 17:19:56 +00006487 }
6488 }
6489 break;
bellarda315a142005-01-30 22:59:18 +00006490#endif
6491#ifdef TARGET_NR_setresgid32
bellard31e31b82003-02-18 22:55:36 +00006492 case TARGET_NR_setresgid32:
bellardb03c60f2003-03-23 17:19:56 +00006493 ret = get_errno(setresgid(arg1, arg2, arg3));
6494 break;
bellarda315a142005-01-30 22:59:18 +00006495#endif
6496#ifdef TARGET_NR_getresgid32
bellard31e31b82003-02-18 22:55:36 +00006497 case TARGET_NR_getresgid32:
bellardb03c60f2003-03-23 17:19:56 +00006498 {
pbrook53a59602006-03-25 19:31:22 +00006499 gid_t rgid, egid, sgid;
bellardb03c60f2003-03-23 17:19:56 +00006500 ret = get_errno(getresgid(&rgid, &egid, &sgid));
6501 if (!is_error(ret)) {
bellard2f619692007-11-16 10:46:05 +00006502 if (put_user_u32(rgid, arg1)
6503 || put_user_u32(egid, arg2)
6504 || put_user_u32(sgid, arg3))
6505 goto efault;
bellardb03c60f2003-03-23 17:19:56 +00006506 }
6507 }
6508 break;
bellarda315a142005-01-30 22:59:18 +00006509#endif
6510#ifdef TARGET_NR_chown32
bellard31e31b82003-02-18 22:55:36 +00006511 case TARGET_NR_chown32:
bellard579a97f2007-11-11 14:26:47 +00006512 if (!(p = lock_user_string(arg1)))
6513 goto efault;
pbrook53a59602006-03-25 19:31:22 +00006514 ret = get_errno(chown(p, arg2, arg3));
6515 unlock_user(p, arg1, 0);
bellardb03c60f2003-03-23 17:19:56 +00006516 break;
bellarda315a142005-01-30 22:59:18 +00006517#endif
6518#ifdef TARGET_NR_setuid32
bellard31e31b82003-02-18 22:55:36 +00006519 case TARGET_NR_setuid32:
bellardb03c60f2003-03-23 17:19:56 +00006520 ret = get_errno(setuid(arg1));
6521 break;
bellarda315a142005-01-30 22:59:18 +00006522#endif
6523#ifdef TARGET_NR_setgid32
bellard31e31b82003-02-18 22:55:36 +00006524 case TARGET_NR_setgid32:
bellardb03c60f2003-03-23 17:19:56 +00006525 ret = get_errno(setgid(arg1));
6526 break;
bellarda315a142005-01-30 22:59:18 +00006527#endif
6528#ifdef TARGET_NR_setfsuid32
bellard31e31b82003-02-18 22:55:36 +00006529 case TARGET_NR_setfsuid32:
bellardb03c60f2003-03-23 17:19:56 +00006530 ret = get_errno(setfsuid(arg1));
6531 break;
bellarda315a142005-01-30 22:59:18 +00006532#endif
6533#ifdef TARGET_NR_setfsgid32
bellard31e31b82003-02-18 22:55:36 +00006534 case TARGET_NR_setfsgid32:
bellardb03c60f2003-03-23 17:19:56 +00006535 ret = get_errno(setfsgid(arg1));
6536 break;
bellarda315a142005-01-30 22:59:18 +00006537#endif
bellard67867302003-11-23 17:05:30 +00006538
bellard31e31b82003-02-18 22:55:36 +00006539 case TARGET_NR_pivot_root:
bellardb03c60f2003-03-23 17:19:56 +00006540 goto unimplemented;
bellardffa65c32004-01-04 23:57:22 +00006541#ifdef TARGET_NR_mincore
bellard31e31b82003-02-18 22:55:36 +00006542 case TARGET_NR_mincore:
aurel3204bb9ac2008-10-01 21:46:41 +00006543 {
6544 void *a;
6545 ret = -TARGET_EFAULT;
6546 if (!(a = lock_user(VERIFY_READ, arg1,arg2, 0)))
6547 goto efault;
6548 if (!(p = lock_user_string(arg3)))
6549 goto mincore_fail;
6550 ret = get_errno(mincore(a, arg2, p));
6551 unlock_user(p, arg3, ret);
6552 mincore_fail:
6553 unlock_user(a, arg1, 0);
6554 }
6555 break;
bellardffa65c32004-01-04 23:57:22 +00006556#endif
aurel32408321b2008-10-01 21:46:32 +00006557#ifdef TARGET_NR_arm_fadvise64_64
6558 case TARGET_NR_arm_fadvise64_64:
6559 {
6560 /*
6561 * arm_fadvise64_64 looks like fadvise64_64 but
6562 * with different argument order
6563 */
6564 abi_long temp;
6565 temp = arg3;
6566 arg3 = arg4;
6567 arg4 = temp;
6568 }
6569#endif
Ulrich Hechte72d2cc2009-07-24 19:10:31 +02006570#if defined(TARGET_NR_fadvise64_64) || defined(TARGET_NR_arm_fadvise64_64) || defined(TARGET_NR_fadvise64)
aurel32408321b2008-10-01 21:46:32 +00006571#ifdef TARGET_NR_fadvise64_64
6572 case TARGET_NR_fadvise64_64:
6573#endif
Ulrich Hechte72d2cc2009-07-24 19:10:31 +02006574#ifdef TARGET_NR_fadvise64
6575 case TARGET_NR_fadvise64:
6576#endif
6577#ifdef TARGET_S390X
6578 switch (arg4) {
6579 case 4: arg4 = POSIX_FADV_NOREUSE + 1; break; /* make sure it's an invalid value */
6580 case 5: arg4 = POSIX_FADV_NOREUSE + 2; break; /* ditto */
6581 case 6: arg4 = POSIX_FADV_DONTNEED; break;
6582 case 7: arg4 = POSIX_FADV_NOREUSE; break;
6583 default: break;
6584 }
6585#endif
6586 ret = -posix_fadvise(arg1, arg2, arg3, arg4);
aurel32408321b2008-10-01 21:46:32 +00006587 break;
6588#endif
bellardffa65c32004-01-04 23:57:22 +00006589#ifdef TARGET_NR_madvise
bellard31e31b82003-02-18 22:55:36 +00006590 case TARGET_NR_madvise:
pbrook24836682006-04-16 14:14:53 +00006591 /* A straight passthrough may not be safe because qemu sometimes
6592 turns private flie-backed mappings into anonymous mappings.
6593 This will break MADV_DONTNEED.
6594 This is a hint, so ignoring and returning success is ok. */
6595 ret = get_errno(0);
6596 break;
bellardffa65c32004-01-04 23:57:22 +00006597#endif
blueswir1992f48a2007-10-14 16:27:31 +00006598#if TARGET_ABI_BITS == 32
bellard31e31b82003-02-18 22:55:36 +00006599 case TARGET_NR_fcntl64:
bellard77e46722003-04-29 20:39:06 +00006600 {
thsb1e341e2007-03-20 21:50:52 +00006601 int cmd;
bellard77e46722003-04-29 20:39:06 +00006602 struct flock64 fl;
pbrook53a59602006-03-25 19:31:22 +00006603 struct target_flock64 *target_fl;
pbrookce4defa2006-02-09 16:49:55 +00006604#ifdef TARGET_ARM
pbrook53a59602006-03-25 19:31:22 +00006605 struct target_eabi_flock64 *target_efl;
pbrookce4defa2006-02-09 16:49:55 +00006606#endif
bellard77e46722003-04-29 20:39:06 +00006607
Arnaud Patard (Rtp)5f106812009-06-03 14:35:04 +02006608 cmd = target_to_host_fcntl_cmd(arg2);
6609 if (cmd == -TARGET_EINVAL)
6610 return cmd;
thsb1e341e2007-03-20 21:50:52 +00006611
bellard60cd49d2003-03-16 22:53:56 +00006612 switch(arg2) {
thsb1e341e2007-03-20 21:50:52 +00006613 case TARGET_F_GETLK64:
ths58134272007-03-31 18:59:32 +00006614#ifdef TARGET_ARM
6615 if (((CPUARMState *)cpu_env)->eabi) {
bellard9ee1fa22007-11-11 15:11:19 +00006616 if (!lock_user_struct(VERIFY_READ, target_efl, arg3, 1))
6617 goto efault;
ths58134272007-03-31 18:59:32 +00006618 fl.l_type = tswap16(target_efl->l_type);
6619 fl.l_whence = tswap16(target_efl->l_whence);
6620 fl.l_start = tswap64(target_efl->l_start);
6621 fl.l_len = tswap64(target_efl->l_len);
Ulrich Hecht7e22e542009-07-24 19:10:27 +02006622 fl.l_pid = tswap32(target_efl->l_pid);
ths58134272007-03-31 18:59:32 +00006623 unlock_user_struct(target_efl, arg3, 0);
6624 } else
6625#endif
6626 {
bellard9ee1fa22007-11-11 15:11:19 +00006627 if (!lock_user_struct(VERIFY_READ, target_fl, arg3, 1))
6628 goto efault;
ths58134272007-03-31 18:59:32 +00006629 fl.l_type = tswap16(target_fl->l_type);
6630 fl.l_whence = tswap16(target_fl->l_whence);
6631 fl.l_start = tswap64(target_fl->l_start);
6632 fl.l_len = tswap64(target_fl->l_len);
Ulrich Hecht7e22e542009-07-24 19:10:27 +02006633 fl.l_pid = tswap32(target_fl->l_pid);
ths58134272007-03-31 18:59:32 +00006634 unlock_user_struct(target_fl, arg3, 0);
6635 }
thsb1e341e2007-03-20 21:50:52 +00006636 ret = get_errno(fcntl(arg1, cmd, &fl));
bellard77e46722003-04-29 20:39:06 +00006637 if (ret == 0) {
pbrookce4defa2006-02-09 16:49:55 +00006638#ifdef TARGET_ARM
6639 if (((CPUARMState *)cpu_env)->eabi) {
bellard9ee1fa22007-11-11 15:11:19 +00006640 if (!lock_user_struct(VERIFY_WRITE, target_efl, arg3, 0))
6641 goto efault;
pbrookce4defa2006-02-09 16:49:55 +00006642 target_efl->l_type = tswap16(fl.l_type);
6643 target_efl->l_whence = tswap16(fl.l_whence);
6644 target_efl->l_start = tswap64(fl.l_start);
6645 target_efl->l_len = tswap64(fl.l_len);
Ulrich Hecht7e22e542009-07-24 19:10:27 +02006646 target_efl->l_pid = tswap32(fl.l_pid);
pbrook53a59602006-03-25 19:31:22 +00006647 unlock_user_struct(target_efl, arg3, 1);
pbrookce4defa2006-02-09 16:49:55 +00006648 } else
6649#endif
6650 {
bellard9ee1fa22007-11-11 15:11:19 +00006651 if (!lock_user_struct(VERIFY_WRITE, target_fl, arg3, 0))
6652 goto efault;
pbrookce4defa2006-02-09 16:49:55 +00006653 target_fl->l_type = tswap16(fl.l_type);
6654 target_fl->l_whence = tswap16(fl.l_whence);
6655 target_fl->l_start = tswap64(fl.l_start);
6656 target_fl->l_len = tswap64(fl.l_len);
Ulrich Hecht7e22e542009-07-24 19:10:27 +02006657 target_fl->l_pid = tswap32(fl.l_pid);
pbrook53a59602006-03-25 19:31:22 +00006658 unlock_user_struct(target_fl, arg3, 1);
pbrookce4defa2006-02-09 16:49:55 +00006659 }
bellard77e46722003-04-29 20:39:06 +00006660 }
6661 break;
6662
thsb1e341e2007-03-20 21:50:52 +00006663 case TARGET_F_SETLK64:
6664 case TARGET_F_SETLKW64:
pbrookce4defa2006-02-09 16:49:55 +00006665#ifdef TARGET_ARM
6666 if (((CPUARMState *)cpu_env)->eabi) {
bellard9ee1fa22007-11-11 15:11:19 +00006667 if (!lock_user_struct(VERIFY_READ, target_efl, arg3, 1))
6668 goto efault;
pbrookce4defa2006-02-09 16:49:55 +00006669 fl.l_type = tswap16(target_efl->l_type);
6670 fl.l_whence = tswap16(target_efl->l_whence);
6671 fl.l_start = tswap64(target_efl->l_start);
6672 fl.l_len = tswap64(target_efl->l_len);
Ulrich Hecht7e22e542009-07-24 19:10:27 +02006673 fl.l_pid = tswap32(target_efl->l_pid);
pbrook53a59602006-03-25 19:31:22 +00006674 unlock_user_struct(target_efl, arg3, 0);
pbrookce4defa2006-02-09 16:49:55 +00006675 } else
6676#endif
6677 {
bellard9ee1fa22007-11-11 15:11:19 +00006678 if (!lock_user_struct(VERIFY_READ, target_fl, arg3, 1))
6679 goto efault;
pbrookce4defa2006-02-09 16:49:55 +00006680 fl.l_type = tswap16(target_fl->l_type);
6681 fl.l_whence = tswap16(target_fl->l_whence);
6682 fl.l_start = tswap64(target_fl->l_start);
6683 fl.l_len = tswap64(target_fl->l_len);
Ulrich Hecht7e22e542009-07-24 19:10:27 +02006684 fl.l_pid = tswap32(target_fl->l_pid);
pbrook53a59602006-03-25 19:31:22 +00006685 unlock_user_struct(target_fl, arg3, 0);
pbrookce4defa2006-02-09 16:49:55 +00006686 }
thsb1e341e2007-03-20 21:50:52 +00006687 ret = get_errno(fcntl(arg1, cmd, &fl));
bellard77e46722003-04-29 20:39:06 +00006688 break;
bellard60cd49d2003-03-16 22:53:56 +00006689 default:
Arnaud Patard (Rtp)5f106812009-06-03 14:35:04 +02006690 ret = do_fcntl(arg1, arg2, arg3);
bellard60cd49d2003-03-16 22:53:56 +00006691 break;
6692 }
bellard77e46722003-04-29 20:39:06 +00006693 break;
6694 }
bellard60cd49d2003-03-16 22:53:56 +00006695#endif
ths7d600c82006-12-08 01:32:58 +00006696#ifdef TARGET_NR_cacheflush
6697 case TARGET_NR_cacheflush:
6698 /* self-modifying code is handled automatically, so nothing needed */
6699 ret = 0;
6700 break;
6701#endif
bellardebc05482003-09-30 21:08:41 +00006702#ifdef TARGET_NR_security
bellard31e31b82003-02-18 22:55:36 +00006703 case TARGET_NR_security:
6704 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00006705#endif
bellardc573ff62004-01-04 15:51:36 +00006706#ifdef TARGET_NR_getpagesize
6707 case TARGET_NR_getpagesize:
6708 ret = TARGET_PAGE_SIZE;
6709 break;
6710#endif
bellard31e31b82003-02-18 22:55:36 +00006711 case TARGET_NR_gettid:
6712 ret = get_errno(gettid());
6713 break;
thse5febef2007-04-01 18:31:35 +00006714#ifdef TARGET_NR_readahead
bellard31e31b82003-02-18 22:55:36 +00006715 case TARGET_NR_readahead:
aurel322054ac92008-10-13 21:08:07 +00006716#if TARGET_ABI_BITS == 32
6717#ifdef TARGET_ARM
6718 if (((CPUARMState *)cpu_env)->eabi)
6719 {
6720 arg2 = arg3;
6721 arg3 = arg4;
6722 arg4 = arg5;
6723 }
6724#endif
6725 ret = get_errno(readahead(arg1, ((off64_t)arg3 << 32) | arg2, arg4));
6726#else
6727 ret = get_errno(readahead(arg1, arg2, arg3));
6728#endif
6729 break;
thse5febef2007-04-01 18:31:35 +00006730#endif
bellardebc05482003-09-30 21:08:41 +00006731#ifdef TARGET_NR_setxattr
bellard31e31b82003-02-18 22:55:36 +00006732 case TARGET_NR_setxattr:
6733 case TARGET_NR_lsetxattr:
6734 case TARGET_NR_fsetxattr:
6735 case TARGET_NR_getxattr:
6736 case TARGET_NR_lgetxattr:
6737 case TARGET_NR_fgetxattr:
6738 case TARGET_NR_listxattr:
6739 case TARGET_NR_llistxattr:
6740 case TARGET_NR_flistxattr:
6741 case TARGET_NR_removexattr:
6742 case TARGET_NR_lremovexattr:
6743 case TARGET_NR_fremovexattr:
Arnaud Patard6f932f92009-04-21 21:04:18 +03006744 ret = -TARGET_EOPNOTSUPP;
6745 break;
bellardebc05482003-09-30 21:08:41 +00006746#endif
6747#ifdef TARGET_NR_set_thread_area
bellard5cd43932003-03-29 16:54:36 +00006748 case TARGET_NR_set_thread_area:
bellard8d18e892007-11-14 15:18:40 +00006749#if defined(TARGET_MIPS)
ths6f5b89a2007-03-02 20:48:00 +00006750 ((CPUMIPSState *) cpu_env)->tls_value = arg1;
6751 ret = 0;
6752 break;
edgar_iglef967792009-01-07 14:19:38 +00006753#elif defined(TARGET_CRIS)
6754 if (arg1 & 0xff)
6755 ret = -TARGET_EINVAL;
6756 else {
6757 ((CPUCRISState *) cpu_env)->pregs[PR_PID] = arg1;
6758 ret = 0;
6759 }
6760 break;
bellard8d18e892007-11-14 15:18:40 +00006761#elif defined(TARGET_I386) && defined(TARGET_ABI32)
6762 ret = do_set_thread_area(cpu_env, arg1);
6763 break;
ths6f5b89a2007-03-02 20:48:00 +00006764#else
6765 goto unimplemented_nowarn;
6766#endif
6767#endif
6768#ifdef TARGET_NR_get_thread_area
bellard5cd43932003-03-29 16:54:36 +00006769 case TARGET_NR_get_thread_area:
bellard8d18e892007-11-14 15:18:40 +00006770#if defined(TARGET_I386) && defined(TARGET_ABI32)
6771 ret = do_get_thread_area(cpu_env, arg1);
6772#else
bellard5cd43932003-03-29 16:54:36 +00006773 goto unimplemented_nowarn;
bellardebc05482003-09-30 21:08:41 +00006774#endif
bellard8d18e892007-11-14 15:18:40 +00006775#endif
bellard48dc41e2006-06-21 18:15:50 +00006776#ifdef TARGET_NR_getdomainname
6777 case TARGET_NR_getdomainname:
6778 goto unimplemented_nowarn;
6779#endif
ths6f5b89a2007-03-02 20:48:00 +00006780
thsb5906f92007-03-19 13:32:45 +00006781#ifdef TARGET_NR_clock_gettime
6782 case TARGET_NR_clock_gettime:
6783 {
6784 struct timespec ts;
6785 ret = get_errno(clock_gettime(arg1, &ts));
6786 if (!is_error(ret)) {
6787 host_to_target_timespec(arg2, &ts);
6788 }
6789 break;
6790 }
6791#endif
6792#ifdef TARGET_NR_clock_getres
6793 case TARGET_NR_clock_getres:
6794 {
6795 struct timespec ts;
6796 ret = get_errno(clock_getres(arg1, &ts));
6797 if (!is_error(ret)) {
6798 host_to_target_timespec(arg2, &ts);
6799 }
6800 break;
6801 }
6802#endif
pbrook63d76512008-05-29 13:43:29 +00006803#ifdef TARGET_NR_clock_nanosleep
6804 case TARGET_NR_clock_nanosleep:
6805 {
6806 struct timespec ts;
6807 target_to_host_timespec(&ts, arg3);
6808 ret = get_errno(clock_nanosleep(arg1, arg2, &ts, arg4 ? &ts : NULL));
6809 if (arg4)
6810 host_to_target_timespec(arg4, &ts);
6811 break;
6812 }
6813#endif
thsb5906f92007-03-19 13:32:45 +00006814
ths6f5b89a2007-03-02 20:48:00 +00006815#if defined(TARGET_NR_set_tid_address) && defined(__NR_set_tid_address)
6816 case TARGET_NR_set_tid_address:
bellard579a97f2007-11-11 14:26:47 +00006817 ret = get_errno(set_tid_address((int *)g2h(arg1)));
6818 break;
ths6f5b89a2007-03-02 20:48:00 +00006819#endif
6820
ths3ae43202007-09-16 21:39:48 +00006821#if defined(TARGET_NR_tkill) && defined(__NR_tkill)
ths4cae1d12007-07-12 11:06:53 +00006822 case TARGET_NR_tkill:
pbrook4cb05962008-05-30 18:05:19 +00006823 ret = get_errno(sys_tkill((int)arg1, target_to_host_signal(arg2)));
ths4cae1d12007-07-12 11:06:53 +00006824 break;
6825#endif
6826
ths3ae43202007-09-16 21:39:48 +00006827#if defined(TARGET_NR_tgkill) && defined(__NR_tgkill)
ths71455572007-06-21 21:45:30 +00006828 case TARGET_NR_tgkill:
pbrook4cb05962008-05-30 18:05:19 +00006829 ret = get_errno(sys_tgkill((int)arg1, (int)arg2,
6830 target_to_host_signal(arg3)));
ths71455572007-06-21 21:45:30 +00006831 break;
6832#endif
6833
ths4f2b1fe2007-06-21 21:57:12 +00006834#ifdef TARGET_NR_set_robust_list
6835 case TARGET_NR_set_robust_list:
6836 goto unimplemented_nowarn;
6837#endif
6838
ths9007f0e2007-09-25 17:50:37 +00006839#if defined(TARGET_NR_utimensat) && defined(__NR_utimensat)
6840 case TARGET_NR_utimensat:
6841 {
Riku Voipioebc996f2009-04-21 15:01:51 +03006842 struct timespec *tsp, ts[2];
6843 if (!arg3) {
6844 tsp = NULL;
6845 } else {
6846 target_to_host_timespec(ts, arg3);
6847 target_to_host_timespec(ts+1, arg3+sizeof(struct target_timespec));
6848 tsp = ts;
6849 }
ths9007f0e2007-09-25 17:50:37 +00006850 if (!arg2)
Riku Voipioebc996f2009-04-21 15:01:51 +03006851 ret = get_errno(sys_utimensat(arg1, NULL, tsp, arg4));
ths9007f0e2007-09-25 17:50:37 +00006852 else {
bellard579a97f2007-11-11 14:26:47 +00006853 if (!(p = lock_user_string(arg2))) {
ths0da46a62007-10-20 20:23:07 +00006854 ret = -TARGET_EFAULT;
bellard579a97f2007-11-11 14:26:47 +00006855 goto fail;
6856 }
Riku Voipioebc996f2009-04-21 15:01:51 +03006857 ret = get_errno(sys_utimensat(arg1, path(p), tsp, arg4));
bellard579a97f2007-11-11 14:26:47 +00006858 unlock_user(p, arg2, 0);
ths9007f0e2007-09-25 17:50:37 +00006859 }
6860 }
6861 break;
6862#endif
Juan Quintela2f7bb872009-07-27 16:13:24 +02006863#if defined(CONFIG_USE_NPTL)
pbrookbd0c5662008-05-29 14:34:11 +00006864 case TARGET_NR_futex:
6865 ret = do_futex(arg1, arg2, arg3, arg4, arg5, arg6);
6866 break;
6867#endif
aurel32dbfe4c32009-04-08 21:29:30 +00006868#if defined(TARGET_NR_inotify_init) && defined(__NR_inotify_init)
aurel3239b59762008-10-01 21:46:50 +00006869 case TARGET_NR_inotify_init:
6870 ret = get_errno(sys_inotify_init());
6871 break;
6872#endif
aurel32dbfe4c32009-04-08 21:29:30 +00006873#if defined(TARGET_NR_inotify_add_watch) && defined(__NR_inotify_add_watch)
aurel3239b59762008-10-01 21:46:50 +00006874 case TARGET_NR_inotify_add_watch:
6875 p = lock_user_string(arg2);
6876 ret = get_errno(sys_inotify_add_watch(arg1, path(p), arg3));
6877 unlock_user(p, arg2, 0);
6878 break;
6879#endif
aurel32dbfe4c32009-04-08 21:29:30 +00006880#if defined(TARGET_NR_inotify_rm_watch) && defined(__NR_inotify_rm_watch)
aurel3239b59762008-10-01 21:46:50 +00006881 case TARGET_NR_inotify_rm_watch:
6882 ret = get_errno(sys_inotify_rm_watch(arg1, arg2));
6883 break;
6884#endif
ths9007f0e2007-09-25 17:50:37 +00006885
Nathan Froyd8ec9cf82009-07-22 09:14:36 -07006886#if defined(TARGET_NR_mq_open) && defined(__NR_mq_open)
aurel3224e10032009-04-15 16:11:43 +00006887 case TARGET_NR_mq_open:
6888 {
6889 struct mq_attr posix_mq_attr;
6890
6891 p = lock_user_string(arg1 - 1);
6892 if (arg4 != 0)
6893 copy_from_user_mq_attr (&posix_mq_attr, arg4);
6894 ret = get_errno(mq_open(p, arg2, arg3, &posix_mq_attr));
6895 unlock_user (p, arg1, 0);
6896 }
6897 break;
6898
6899 case TARGET_NR_mq_unlink:
6900 p = lock_user_string(arg1 - 1);
6901 ret = get_errno(mq_unlink(p));
6902 unlock_user (p, arg1, 0);
6903 break;
6904
6905 case TARGET_NR_mq_timedsend:
6906 {
6907 struct timespec ts;
6908
6909 p = lock_user (VERIFY_READ, arg2, arg3, 1);
6910 if (arg5 != 0) {
6911 target_to_host_timespec(&ts, arg5);
6912 ret = get_errno(mq_timedsend(arg1, p, arg3, arg4, &ts));
6913 host_to_target_timespec(arg5, &ts);
6914 }
6915 else
6916 ret = get_errno(mq_send(arg1, p, arg3, arg4));
6917 unlock_user (p, arg2, arg3);
6918 }
6919 break;
6920
6921 case TARGET_NR_mq_timedreceive:
6922 {
6923 struct timespec ts;
6924 unsigned int prio;
6925
6926 p = lock_user (VERIFY_READ, arg2, arg3, 1);
6927 if (arg5 != 0) {
6928 target_to_host_timespec(&ts, arg5);
6929 ret = get_errno(mq_timedreceive(arg1, p, arg3, &prio, &ts));
6930 host_to_target_timespec(arg5, &ts);
6931 }
6932 else
6933 ret = get_errno(mq_receive(arg1, p, arg3, &prio));
6934 unlock_user (p, arg2, arg3);
6935 if (arg4 != 0)
6936 put_user_u32(prio, arg4);
6937 }
6938 break;
6939
6940 /* Not implemented for now... */
6941/* case TARGET_NR_mq_notify: */
6942/* break; */
6943
6944 case TARGET_NR_mq_getsetattr:
6945 {
6946 struct mq_attr posix_mq_attr_in, posix_mq_attr_out;
6947 ret = 0;
6948 if (arg3 != 0) {
6949 ret = mq_getattr(arg1, &posix_mq_attr_out);
6950 copy_to_user_mq_attr(arg3, &posix_mq_attr_out);
6951 }
6952 if (arg2 != 0) {
6953 copy_from_user_mq_attr(&posix_mq_attr_in, arg2);
6954 ret |= mq_setattr(arg1, &posix_mq_attr_in, &posix_mq_attr_out);
6955 }
6956
6957 }
6958 break;
6959#endif
6960
vibisreenivasan3ce34df2009-05-16 18:32:41 +05306961#ifdef CONFIG_SPLICE
6962#ifdef TARGET_NR_tee
6963 case TARGET_NR_tee:
6964 {
6965 ret = get_errno(tee(arg1,arg2,arg3,arg4));
6966 }
6967 break;
6968#endif
6969#ifdef TARGET_NR_splice
6970 case TARGET_NR_splice:
6971 {
6972 loff_t loff_in, loff_out;
6973 loff_t *ploff_in = NULL, *ploff_out = NULL;
6974 if(arg2) {
6975 get_user_u64(loff_in, arg2);
6976 ploff_in = &loff_in;
6977 }
6978 if(arg4) {
6979 get_user_u64(loff_out, arg2);
6980 ploff_out = &loff_out;
6981 }
6982 ret = get_errno(splice(arg1, ploff_in, arg3, ploff_out, arg5, arg6));
6983 }
6984 break;
6985#endif
6986#ifdef TARGET_NR_vmsplice
6987 case TARGET_NR_vmsplice:
6988 {
6989 int count = arg3;
6990 struct iovec *vec;
6991
6992 vec = alloca(count * sizeof(struct iovec));
6993 if (lock_iovec(VERIFY_READ, vec, arg2, count, 1) < 0)
6994 goto efault;
6995 ret = get_errno(vmsplice(arg1, vec, count, arg4));
6996 unlock_iovec(vec, arg2, count, 0);
6997 }
6998 break;
6999#endif
7000#endif /* CONFIG_SPLICE */
Riku Voipioc2882b92009-08-12 15:08:24 +03007001#ifdef CONFIG_EVENTFD
7002#if defined(TARGET_NR_eventfd)
7003 case TARGET_NR_eventfd:
7004 ret = get_errno(eventfd(arg1, 0));
7005 break;
7006#endif
7007#if defined(TARGET_NR_eventfd2)
7008 case TARGET_NR_eventfd2:
7009 ret = get_errno(eventfd(arg1, arg2));
7010 break;
7011#endif
7012#endif /* CONFIG_EVENTFD */
bellard31e31b82003-02-18 22:55:36 +00007013 default:
7014 unimplemented:
bellard5cd43932003-03-29 16:54:36 +00007015 gemu_log("qemu: Unsupported syscall: %d\n", num);
ths4f2b1fe2007-06-21 21:57:12 +00007016#if defined(TARGET_NR_setxattr) || defined(TARGET_NR_get_thread_area) || defined(TARGET_NR_getdomainname) || defined(TARGET_NR_set_robust_list)
bellard5cd43932003-03-29 16:54:36 +00007017 unimplemented_nowarn:
bellard80a9d032005-01-03 23:31:27 +00007018#endif
ths0da46a62007-10-20 20:23:07 +00007019 ret = -TARGET_ENOSYS;
bellard31e31b82003-02-18 22:55:36 +00007020 break;
7021 }
bellard579a97f2007-11-11 14:26:47 +00007022fail:
bellardc573ff62004-01-04 15:51:36 +00007023#ifdef DEBUG
Blue Swirl0bf9e312009-07-20 17:19:25 +00007024 gemu_log(" = " TARGET_ABI_FMT_ld "\n", ret);
bellardc573ff62004-01-04 15:51:36 +00007025#endif
thsb92c47c2007-11-01 00:07:38 +00007026 if(do_strace)
7027 print_syscall_ret(num, ret);
bellard31e31b82003-02-18 22:55:36 +00007028 return ret;
bellard579a97f2007-11-11 14:26:47 +00007029efault:
7030 ret = -TARGET_EFAULT;
7031 goto fail;
bellard31e31b82003-02-18 22:55:36 +00007032}