blob: 1c17b741c268146ed543cd80a8c8d2da5ce186cf [file] [log] [blame]
bellard31e31b82003-02-18 22:55:36 +00001/*
2 * Linux syscalls
ths5fafdf22007-09-16 21:08:06 +00003 *
bellard31e31b82003-02-18 22:55:36 +00004 * Copyright (c) 2003 Fabrice Bellard
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
Blue Swirl8167ee82009-07-16 20:47:01 +000017 * along with this program; if not, see <http://www.gnu.org/licenses/>.
bellard31e31b82003-02-18 22:55:36 +000018 */
Eduardo Habkostd5b3a9b2009-06-09 18:26:31 -030019#define _ATFILE_SOURCE
Peter Maydelld39594e2016-01-26 18:17:02 +000020#include "qemu/osdep.h"
Veronia Bahaaf348b6d2016-03-20 19:16:19 +020021#include "qemu/cutils.h"
22#include "qemu/path.h"
bellard31e31b82003-02-18 22:55:36 +000023#include <elf.h>
24#include <endian.h>
John Spencerc56dc772012-12-10 07:59:46 +010025#include <grp.h>
thsd08d3bb2007-03-19 13:09:22 +000026#include <sys/ipc.h>
27#include <sys/msg.h>
bellard31e31b82003-02-18 22:55:36 +000028#include <sys/wait.h>
bellard31e31b82003-02-18 22:55:36 +000029#include <sys/mount.h>
John Spencer586b0be2012-12-26 00:49:49 +010030#include <sys/file.h>
31#include <sys/fsuid.h>
32#include <sys/personality.h>
ths39b9aae2007-02-11 18:36:44 +000033#include <sys/prctl.h>
bellard31e31b82003-02-18 22:55:36 +000034#include <sys/resource.h>
bellard31e31b82003-02-18 22:55:36 +000035#include <sys/swap.h>
Peter Maydelle0eb2102014-03-17 12:15:35 +000036#include <linux/capability.h>
bellard31e31b82003-02-18 22:55:36 +000037#include <sched.h>
Aurelien Jarno60e99242010-03-29 02:12:51 +020038#ifdef __ia64__
39int __clone2(int (*fn)(void *), void *child_stack_base,
40 size_t stack_size, int flags, void *arg, ...);
41#endif
bellard31e31b82003-02-18 22:55:36 +000042#include <sys/socket.h>
aurel32607175e2009-04-15 16:11:59 +000043#include <sys/un.h>
bellard31e31b82003-02-18 22:55:36 +000044#include <sys/uio.h>
bellard9de5e442003-03-23 16:49:39 +000045#include <sys/poll.h>
bellard32f36bc2003-03-30 21:29:48 +000046#include <sys/times.h>
bellard8853f862004-02-22 14:57:26 +000047#include <sys/shm.h>
thsfa294812007-02-02 22:05:00 +000048#include <sys/sem.h>
bellard56c8f682005-11-28 22:28:41 +000049#include <sys/statfs.h>
bellardebc05482003-09-30 21:08:41 +000050#include <utime.h>
bellarda5448a72004-06-19 16:59:03 +000051#include <sys/sysinfo.h>
Laurent Viviere36800c2015-10-02 14:48:09 +020052#include <sys/signalfd.h>
bellard72f03902003-02-18 23:33:18 +000053//#include <sys/user.h>
bellard8853f862004-02-22 14:57:26 +000054#include <netinet/ip.h>
bellard7854b052003-03-29 17:22:23 +000055#include <netinet/tcp.h>
Laurent Vivier86fcd942011-03-30 01:35:23 +020056#include <linux/wireless.h>
Jing Huang920394d2012-07-24 13:59:23 +000057#include <linux/icmp.h>
Stefan Weil5a61cb62011-09-08 17:55:32 +020058#include "qemu-common.h"
Riku Voipiod80a1902014-10-01 16:05:46 +030059#ifdef CONFIG_TIMERFD
60#include <sys/timerfd.h>
61#endif
Juan Quintela9788c9c2009-07-27 16:13:02 +020062#ifdef TARGET_GPROF
aurel326d946cd2008-11-06 16:15:18 +000063#include <sys/gmon.h>
64#endif
Riku Voipioc2882b92009-08-12 15:08:24 +030065#ifdef CONFIG_EVENTFD
66#include <sys/eventfd.h>
67#endif
Peter Maydell3b6edd12011-02-15 18:35:05 +000068#ifdef CONFIG_EPOLL
69#include <sys/epoll.h>
70#endif
An-Cheng Huanga790ae32011-08-09 12:34:06 -070071#ifdef CONFIG_ATTR
Paolo Bonzini1de7afc2012-12-17 18:20:00 +010072#include "qemu/xattr.h"
An-Cheng Huanga790ae32011-08-09 12:34:06 -070073#endif
Peter Maydella8fd1ab2013-02-08 07:31:55 +000074#ifdef CONFIG_SENDFILE
75#include <sys/sendfile.h>
76#endif
bellard31e31b82003-02-18 22:55:36 +000077
78#define termios host_termios
79#define winsize host_winsize
80#define termio host_termio
bellard04369ff2003-03-20 22:33:23 +000081#define sgttyb host_sgttyb /* same as target */
82#define tchars host_tchars /* same as target */
83#define ltchars host_ltchars /* same as target */
bellard31e31b82003-02-18 22:55:36 +000084
85#include <linux/termios.h>
86#include <linux/unistd.h>
bellard31e31b82003-02-18 22:55:36 +000087#include <linux/cdrom.h>
88#include <linux/hdreg.h>
89#include <linux/soundcard.h>
bellard19b84f32003-05-08 15:41:49 +000090#include <linux/kd.h>
balrog8fbd6b52008-09-20 03:03:09 +000091#include <linux/mtio.h>
Martin Mohring350d1772009-05-04 21:21:41 +030092#include <linux/fs.h>
Peter Maydelldace20d2011-01-10 13:11:24 +000093#if defined(CONFIG_FIEMAP)
Peter Maydell285da2b2011-01-06 15:04:18 +000094#include <linux/fiemap.h>
Peter Maydelldace20d2011-01-10 13:11:24 +000095#endif
Ulrich Hechtf7680a52009-10-16 17:00:44 +020096#include <linux/fb.h>
97#include <linux/vt.h>
Alexander Graf56e904e2012-01-31 18:42:06 +010098#include <linux/dm-ioctl.h>
Laurent Vivierc07ecc62013-01-07 11:40:06 +000099#include <linux/reboot.h>
Laurent Vivier7ff7b662013-07-02 14:04:12 +0100100#include <linux/route.h>
Laurent Vivierf57d4192013-08-30 01:46:41 +0200101#include <linux/filter.h>
Andreas Färberfff8c532014-01-18 07:38:30 +0100102#include <linux/blkpg.h>
Laurent Vivier6c5b5642016-05-22 18:56:19 +0200103#include <linux/netlink.h>
Laurent Vivier575b22b2016-06-02 22:14:15 +0200104#ifdef CONFIG_RTNETLINK
Laurent Vivier6c5b5642016-05-22 18:56:19 +0200105#include <linux/rtnetlink.h>
Laurent Vivier575b22b2016-06-02 22:14:15 +0200106#endif
Laurent Vivier5ce9bb52016-05-22 18:56:21 +0200107#include <linux/audit.h>
pbrookd7e40362008-05-23 16:06:43 +0000108#include "linux_loop.h"
Riku Voipio18cb0082014-02-19 12:59:58 +0200109#include "uname.h"
bellard31e31b82003-02-18 22:55:36 +0000110
bellard3ef693a2003-03-23 20:17:16 +0000111#include "qemu.h"
bellard31e31b82003-02-18 22:55:36 +0000112
pbrookd865bab2008-06-07 22:12:17 +0000113#define CLONE_NPTL_FLAGS2 (CLONE_SETTLS | \
114 CLONE_PARENT_SETTID | CLONE_CHILD_SETTID | CLONE_CHILD_CLEARTID)
pbrook30813ce2008-06-02 15:45:44 +0000115
bellard72f03902003-02-18 23:33:18 +0000116//#define DEBUG
Timothy E Baldwin71a8f7f2016-05-12 18:47:45 +0100117/* Define DEBUG_ERESTARTSYS to force every syscall to be restarted
118 * once. This exercises the codepaths for restart.
119 */
120//#define DEBUG_ERESTARTSYS
bellard31e31b82003-02-18 22:55:36 +0000121
bellard1a9353d2003-03-16 20:28:50 +0000122//#include <linux/msdos_fs.h>
aurel326556a832008-10-13 21:08:17 +0000123#define VFAT_IOCTL_READDIR_BOTH _IOR('r', 1, struct linux_dirent [2])
124#define VFAT_IOCTL_READDIR_SHORT _IOR('r', 2, struct linux_dirent [2])
bellard1a9353d2003-03-16 20:28:50 +0000125
Peter Maydellb28a1f32016-05-27 15:51:47 +0100126/* This is the size of the host kernel's sigset_t, needed where we make
127 * direct system calls that take a sigset_t pointer and a size.
128 */
129#define SIGSET_T_SIZE (_NSIG / 8)
bellard70a194b2003-08-11 22:20:16 +0000130
bellard70a194b2003-08-11 22:20:16 +0000131#undef _syscall0
132#undef _syscall1
133#undef _syscall2
134#undef _syscall3
135#undef _syscall4
136#undef _syscall5
bellard83fcb512006-06-14 13:37:16 +0000137#undef _syscall6
bellard70a194b2003-08-11 22:20:16 +0000138
bellard83fcb512006-06-14 13:37:16 +0000139#define _syscall0(type,name) \
blueswir18fcd3692008-08-17 20:26:25 +0000140static type name (void) \
bellard83fcb512006-06-14 13:37:16 +0000141{ \
142 return syscall(__NR_##name); \
bellard70a194b2003-08-11 22:20:16 +0000143}
144
bellard83fcb512006-06-14 13:37:16 +0000145#define _syscall1(type,name,type1,arg1) \
blueswir18fcd3692008-08-17 20:26:25 +0000146static type name (type1 arg1) \
bellard83fcb512006-06-14 13:37:16 +0000147{ \
148 return syscall(__NR_##name, arg1); \
bellard70a194b2003-08-11 22:20:16 +0000149}
150
bellard83fcb512006-06-14 13:37:16 +0000151#define _syscall2(type,name,type1,arg1,type2,arg2) \
blueswir18fcd3692008-08-17 20:26:25 +0000152static type name (type1 arg1,type2 arg2) \
bellard83fcb512006-06-14 13:37:16 +0000153{ \
154 return syscall(__NR_##name, arg1, arg2); \
bellard70a194b2003-08-11 22:20:16 +0000155}
156
bellard83fcb512006-06-14 13:37:16 +0000157#define _syscall3(type,name,type1,arg1,type2,arg2,type3,arg3) \
blueswir18fcd3692008-08-17 20:26:25 +0000158static type name (type1 arg1,type2 arg2,type3 arg3) \
bellard83fcb512006-06-14 13:37:16 +0000159{ \
160 return syscall(__NR_##name, arg1, arg2, arg3); \
bellard70a194b2003-08-11 22:20:16 +0000161}
162
bellard83fcb512006-06-14 13:37:16 +0000163#define _syscall4(type,name,type1,arg1,type2,arg2,type3,arg3,type4,arg4) \
blueswir18fcd3692008-08-17 20:26:25 +0000164static type name (type1 arg1,type2 arg2,type3 arg3,type4 arg4) \
bellard83fcb512006-06-14 13:37:16 +0000165{ \
166 return syscall(__NR_##name, arg1, arg2, arg3, arg4); \
bellard70a194b2003-08-11 22:20:16 +0000167}
168
bellard83fcb512006-06-14 13:37:16 +0000169#define _syscall5(type,name,type1,arg1,type2,arg2,type3,arg3,type4,arg4, \
170 type5,arg5) \
blueswir18fcd3692008-08-17 20:26:25 +0000171static type name (type1 arg1,type2 arg2,type3 arg3,type4 arg4,type5 arg5) \
bellard83fcb512006-06-14 13:37:16 +0000172{ \
173 return syscall(__NR_##name, arg1, arg2, arg3, arg4, arg5); \
bellard70a194b2003-08-11 22:20:16 +0000174}
bellard83fcb512006-06-14 13:37:16 +0000175
176
177#define _syscall6(type,name,type1,arg1,type2,arg2,type3,arg3,type4,arg4, \
178 type5,arg5,type6,arg6) \
blueswir18fcd3692008-08-17 20:26:25 +0000179static type name (type1 arg1,type2 arg2,type3 arg3,type4 arg4,type5 arg5, \
180 type6 arg6) \
bellard83fcb512006-06-14 13:37:16 +0000181{ \
182 return syscall(__NR_##name, arg1, arg2, arg3, arg4, arg5, arg6); \
183}
184
bellard70a194b2003-08-11 22:20:16 +0000185
bellard31e31b82003-02-18 22:55:36 +0000186#define __NR_sys_uname __NR_uname
bellard72f03902003-02-18 23:33:18 +0000187#define __NR_sys_getcwd1 __NR_getcwd
bellard72f03902003-02-18 23:33:18 +0000188#define __NR_sys_getdents __NR_getdents
bellarddab2ed92003-03-22 15:23:14 +0000189#define __NR_sys_getdents64 __NR_getdents64
thsc6cda172007-10-09 03:42:34 +0000190#define __NR_sys_getpriority __NR_getpriority
bellard66fb9762003-03-23 01:06:05 +0000191#define __NR_sys_rt_sigqueueinfo __NR_rt_sigqueueinfo
ths7494b0f2007-02-11 18:26:53 +0000192#define __NR_sys_syslog __NR_syslog
pbrookbd0c5662008-05-29 14:34:11 +0000193#define __NR_sys_futex __NR_futex
aurel3239b59762008-10-01 21:46:50 +0000194#define __NR_sys_inotify_init __NR_inotify_init
195#define __NR_sys_inotify_add_watch __NR_inotify_add_watch
196#define __NR_sys_inotify_rm_watch __NR_inotify_rm_watch
bellard31e31b82003-02-18 22:55:36 +0000197
Alexander Graf42a39fb2011-04-15 17:32:45 +0200198#if defined(__alpha__) || defined (__ia64__) || defined(__x86_64__) || \
199 defined(__s390x__)
bellard9af9eaa2003-04-07 21:34:41 +0000200#define __NR__llseek __NR_lseek
201#endif
202
James Hogana29e5ba2014-03-25 21:51:08 +0000203/* Newer kernel ports have llseek() instead of _llseek() */
204#if defined(TARGET_NR_llseek) && !defined(TARGET_NR__llseek)
205#define TARGET_NR__llseek TARGET_NR_llseek
206#endif
207
bellard72f03902003-02-18 23:33:18 +0000208#ifdef __NR_gettid
bellard31e31b82003-02-18 22:55:36 +0000209_syscall0(int, gettid)
bellard72f03902003-02-18 23:33:18 +0000210#else
ths0da46a62007-10-20 20:23:07 +0000211/* This is a replacement for the host gettid() and must return a host
212 errno. */
bellard72f03902003-02-18 23:33:18 +0000213static int gettid(void) {
214 return -ENOSYS;
215}
216#endif
Chen Gang704eff62015-08-21 05:37:33 +0800217#if defined(TARGET_NR_getdents) && defined(__NR_getdents)
aurel323b3f24a2009-04-15 16:12:13 +0000218_syscall3(int, sys_getdents, uint, fd, struct linux_dirent *, dirp, uint, count);
Peter Maydell3307e232013-06-12 16:20:21 +0100219#endif
220#if !defined(__NR_getdents) || \
221 (defined(TARGET_NR_getdents64) && defined(__NR_getdents64))
aurel323b3f24a2009-04-15 16:12:13 +0000222_syscall3(int, sys_getdents64, uint, fd, struct linux_dirent64 *, dirp, uint, count);
223#endif
Richard Hendersond35b2612010-06-04 12:14:10 -0700224#if defined(TARGET_NR__llseek) && defined(__NR_llseek)
aurel323b3f24a2009-04-15 16:12:13 +0000225_syscall5(int, _llseek, uint, fd, ulong, hi, ulong, lo,
226 loff_t *, res, uint, wh);
227#endif
228_syscall3(int,sys_rt_sigqueueinfo,int,pid,int,sig,siginfo_t *,uinfo)
229_syscall3(int,sys_syslog,int,type,char*,bufp,int,len)
aurel323b3f24a2009-04-15 16:12:13 +0000230#ifdef __NR_exit_group
231_syscall1(int,exit_group,int,error_code)
232#endif
233#if defined(TARGET_NR_set_tid_address) && defined(__NR_set_tid_address)
234_syscall1(int,set_tid_address,int *,tidptr)
235#endif
aurel323b3f24a2009-04-15 16:12:13 +0000236#if defined(TARGET_NR_futex) && defined(__NR_futex)
237_syscall6(int,sys_futex,int *,uaddr,int,op,int,val,
238 const struct timespec *,timeout,int *,uaddr2,int,val3)
239#endif
Mike Frysinger737de1d2011-02-07 01:05:55 -0500240#define __NR_sys_sched_getaffinity __NR_sched_getaffinity
241_syscall3(int, sys_sched_getaffinity, pid_t, pid, unsigned int, len,
242 unsigned long *, user_mask_ptr);
243#define __NR_sys_sched_setaffinity __NR_sched_setaffinity
244_syscall3(int, sys_sched_setaffinity, pid_t, pid, unsigned int, len,
245 unsigned long *, user_mask_ptr);
Alexander Graf0f6b4d22011-09-27 14:39:42 +0200246_syscall4(int, reboot, int, magic1, int, magic2, unsigned int, cmd,
247 void *, arg);
Peter Maydelle0eb2102014-03-17 12:15:35 +0000248_syscall2(int, capget, struct __user_cap_header_struct *, header,
249 struct __user_cap_data_struct *, data);
250_syscall2(int, capset, struct __user_cap_header_struct *, header,
251 struct __user_cap_data_struct *, data);
Paul Burtonab31cda2014-06-22 11:25:43 +0100252#if defined(TARGET_NR_ioprio_get) && defined(__NR_ioprio_get)
253_syscall2(int, ioprio_get, int, which, int, who)
254#endif
255#if defined(TARGET_NR_ioprio_set) && defined(__NR_ioprio_set)
256_syscall3(int, ioprio_set, int, which, int, who, int, ioprio)
257#endif
Laurent Vivierf894efd2016-02-21 10:56:23 +0100258#if defined(TARGET_NR_getrandom) && defined(__NR_getrandom)
259_syscall3(int, getrandom, void *, buf, size_t, buflen, unsigned int, flags)
260#endif
aurel323b3f24a2009-04-15 16:12:13 +0000261
262static bitmask_transtbl fcntl_flags_tbl[] = {
263 { TARGET_O_ACCMODE, TARGET_O_WRONLY, O_ACCMODE, O_WRONLY, },
264 { TARGET_O_ACCMODE, TARGET_O_RDWR, O_ACCMODE, O_RDWR, },
265 { TARGET_O_CREAT, TARGET_O_CREAT, O_CREAT, O_CREAT, },
266 { TARGET_O_EXCL, TARGET_O_EXCL, O_EXCL, O_EXCL, },
267 { TARGET_O_NOCTTY, TARGET_O_NOCTTY, O_NOCTTY, O_NOCTTY, },
268 { TARGET_O_TRUNC, TARGET_O_TRUNC, O_TRUNC, O_TRUNC, },
269 { TARGET_O_APPEND, TARGET_O_APPEND, O_APPEND, O_APPEND, },
270 { TARGET_O_NONBLOCK, TARGET_O_NONBLOCK, O_NONBLOCK, O_NONBLOCK, },
Richard Hendersonafc87632012-07-25 14:30:34 -0700271 { TARGET_O_SYNC, TARGET_O_DSYNC, O_SYNC, O_DSYNC, },
aurel323b3f24a2009-04-15 16:12:13 +0000272 { TARGET_O_SYNC, TARGET_O_SYNC, O_SYNC, O_SYNC, },
273 { TARGET_FASYNC, TARGET_FASYNC, FASYNC, FASYNC, },
274 { TARGET_O_DIRECTORY, TARGET_O_DIRECTORY, O_DIRECTORY, O_DIRECTORY, },
275 { TARGET_O_NOFOLLOW, TARGET_O_NOFOLLOW, O_NOFOLLOW, O_NOFOLLOW, },
aurel323b3f24a2009-04-15 16:12:13 +0000276#if defined(O_DIRECT)
277 { TARGET_O_DIRECT, TARGET_O_DIRECT, O_DIRECT, O_DIRECT, },
278#endif
Richard Hendersonafc87632012-07-25 14:30:34 -0700279#if defined(O_NOATIME)
280 { TARGET_O_NOATIME, TARGET_O_NOATIME, O_NOATIME, O_NOATIME },
281#endif
282#if defined(O_CLOEXEC)
283 { TARGET_O_CLOEXEC, TARGET_O_CLOEXEC, O_CLOEXEC, O_CLOEXEC },
284#endif
285#if defined(O_PATH)
286 { TARGET_O_PATH, TARGET_O_PATH, O_PATH, O_PATH },
287#endif
288 /* Don't terminate the list prematurely on 64-bit host+guest. */
289#if TARGET_O_LARGEFILE != 0 || O_LARGEFILE != 0
290 { TARGET_O_LARGEFILE, TARGET_O_LARGEFILE, O_LARGEFILE, O_LARGEFILE, },
291#endif
aurel323b3f24a2009-04-15 16:12:13 +0000292 { 0, 0, 0, 0 }
293};
294
Laurent Vivier5d4d3662015-10-28 21:40:43 +0100295typedef abi_long (*TargetFdDataFunc)(void *, size_t);
Laurent Vivier7b36f782015-10-28 21:40:44 +0100296typedef abi_long (*TargetFdAddrFunc)(void *, abi_ulong, socklen_t);
Laurent Viviere36800c2015-10-02 14:48:09 +0200297typedef struct TargetFdTrans {
Laurent Vivier5d4d3662015-10-28 21:40:43 +0100298 TargetFdDataFunc host_to_target_data;
299 TargetFdDataFunc target_to_host_data;
Laurent Vivier7b36f782015-10-28 21:40:44 +0100300 TargetFdAddrFunc target_to_host_addr;
Laurent Viviere36800c2015-10-02 14:48:09 +0200301} TargetFdTrans;
302
303static TargetFdTrans **target_fd_trans;
304
305static unsigned int target_fd_max;
306
Laurent Vivier6c5b5642016-05-22 18:56:19 +0200307static TargetFdDataFunc fd_trans_target_to_host_data(int fd)
308{
309 if (fd >= 0 && fd < target_fd_max && target_fd_trans[fd]) {
310 return target_fd_trans[fd]->target_to_host_data;
311 }
312 return NULL;
313}
314
Laurent Vivier5d4d3662015-10-28 21:40:43 +0100315static TargetFdDataFunc fd_trans_host_to_target_data(int fd)
Laurent Viviere36800c2015-10-02 14:48:09 +0200316{
Laurent Vivier861d72c2015-10-28 21:40:46 +0100317 if (fd >= 0 && fd < target_fd_max && target_fd_trans[fd]) {
Laurent Vivier5d4d3662015-10-28 21:40:43 +0100318 return target_fd_trans[fd]->host_to_target_data;
Laurent Viviere36800c2015-10-02 14:48:09 +0200319 }
320 return NULL;
321}
322
Laurent Vivier7b36f782015-10-28 21:40:44 +0100323static TargetFdAddrFunc fd_trans_target_to_host_addr(int fd)
324{
Laurent Vivier861d72c2015-10-28 21:40:46 +0100325 if (fd >= 0 && fd < target_fd_max && target_fd_trans[fd]) {
Laurent Vivier7b36f782015-10-28 21:40:44 +0100326 return target_fd_trans[fd]->target_to_host_addr;
327 }
328 return NULL;
329}
330
Laurent Viviere36800c2015-10-02 14:48:09 +0200331static void fd_trans_register(int fd, TargetFdTrans *trans)
332{
333 unsigned int oldmax;
334
335 if (fd >= target_fd_max) {
336 oldmax = target_fd_max;
337 target_fd_max = ((fd >> 6) + 1) << 6; /* by slice of 64 entries */
Laurent Vivier5089c7c2016-01-18 23:50:45 +0100338 target_fd_trans = g_renew(TargetFdTrans *,
339 target_fd_trans, target_fd_max);
Laurent Viviere36800c2015-10-02 14:48:09 +0200340 memset((void *)(target_fd_trans + oldmax), 0,
341 (target_fd_max - oldmax) * sizeof(TargetFdTrans *));
342 }
343 target_fd_trans[fd] = trans;
344}
345
346static void fd_trans_unregister(int fd)
347{
348 if (fd >= 0 && fd < target_fd_max) {
349 target_fd_trans[fd] = NULL;
350 }
351}
352
353static void fd_trans_dup(int oldfd, int newfd)
354{
355 fd_trans_unregister(newfd);
356 if (oldfd < target_fd_max && target_fd_trans[oldfd]) {
357 fd_trans_register(newfd, target_fd_trans[oldfd]);
358 }
359}
360
aurel323b3f24a2009-04-15 16:12:13 +0000361static int sys_getcwd1(char *buf, size_t size)
362{
363 if (getcwd(buf, size) == NULL) {
364 /* getcwd() sets errno */
365 return (-1);
366 }
aurel32aaf4ad32009-04-16 14:17:14 +0000367 return strlen(buf)+1;
aurel323b3f24a2009-04-15 16:12:13 +0000368}
369
Peter Maydell1acae9f2013-07-02 14:04:12 +0100370#ifdef TARGET_NR_utimensat
Riku Voipioebc996f2009-04-21 15:01:51 +0300371#ifdef CONFIG_UTIMENSAT
372static int sys_utimensat(int dirfd, const char *pathname,
373 const struct timespec times[2], int flags)
374{
375 if (pathname == NULL)
376 return futimens(dirfd, times);
377 else
378 return utimensat(dirfd, pathname, times, flags);
379}
Peter Maydell1acae9f2013-07-02 14:04:12 +0100380#elif defined(__NR_utimensat)
381#define __NR_sys_utimensat __NR_utimensat
ths9007f0e2007-09-25 17:50:37 +0000382_syscall4(int,sys_utimensat,int,dirfd,const char *,pathname,
383 const struct timespec *,tsp,int,flags)
Peter Maydell1acae9f2013-07-02 14:04:12 +0100384#else
385static int sys_utimensat(int dirfd, const char *pathname,
386 const struct timespec times[2], int flags)
387{
388 errno = ENOSYS;
389 return -1;
390}
ths9007f0e2007-09-25 17:50:37 +0000391#endif
Peter Maydell1acae9f2013-07-02 14:04:12 +0100392#endif /* TARGET_NR_utimensat */
aurel323b3f24a2009-04-15 16:12:13 +0000393
394#ifdef CONFIG_INOTIFY
aurel328690e422009-04-17 13:50:32 +0000395#include <sys/inotify.h>
aurel323b3f24a2009-04-15 16:12:13 +0000396
aurel3239b59762008-10-01 21:46:50 +0000397#if defined(TARGET_NR_inotify_init) && defined(__NR_inotify_init)
aurel323b3f24a2009-04-15 16:12:13 +0000398static int sys_inotify_init(void)
399{
400 return (inotify_init());
401}
aurel3239b59762008-10-01 21:46:50 +0000402#endif
403#if defined(TARGET_NR_inotify_add_watch) && defined(__NR_inotify_add_watch)
aurel323b3f24a2009-04-15 16:12:13 +0000404static int sys_inotify_add_watch(int fd,const char *pathname, int32_t mask)
405{
406 return (inotify_add_watch(fd, pathname, mask));
407}
aurel3239b59762008-10-01 21:46:50 +0000408#endif
409#if defined(TARGET_NR_inotify_rm_watch) && defined(__NR_inotify_rm_watch)
aurel323b3f24a2009-04-15 16:12:13 +0000410static int sys_inotify_rm_watch(int fd, int32_t wd)
411{
aurel328690e422009-04-17 13:50:32 +0000412 return (inotify_rm_watch(fd, wd));
aurel323b3f24a2009-04-15 16:12:13 +0000413}
aurel3239b59762008-10-01 21:46:50 +0000414#endif
Riku Voipioc05c7a72010-03-26 15:25:11 +0000415#ifdef CONFIG_INOTIFY1
416#if defined(TARGET_NR_inotify_init1) && defined(__NR_inotify_init1)
417static int sys_inotify_init1(int flags)
418{
419 return (inotify_init1(flags));
420}
421#endif
422#endif
aurel323b3f24a2009-04-15 16:12:13 +0000423#else
424/* Userspace can usually survive runtime without inotify */
425#undef TARGET_NR_inotify_init
Riku Voipioc05c7a72010-03-26 15:25:11 +0000426#undef TARGET_NR_inotify_init1
aurel323b3f24a2009-04-15 16:12:13 +0000427#undef TARGET_NR_inotify_add_watch
428#undef TARGET_NR_inotify_rm_watch
429#endif /* CONFIG_INOTIFY */
430
Peter Maydell163a05a2011-06-27 17:44:52 +0100431#if defined(TARGET_NR_prlimit64)
432#ifndef __NR_prlimit64
433# define __NR_prlimit64 -1
434#endif
435#define __NR_sys_prlimit64 __NR_prlimit64
436/* The glibc rlimit structure may not be that used by the underlying syscall */
437struct host_rlimit64 {
438 uint64_t rlim_cur;
439 uint64_t rlim_max;
440};
441_syscall4(int, sys_prlimit64, pid_t, pid, int, resource,
442 const struct host_rlimit64 *, new_limit,
443 struct host_rlimit64 *, old_limit)
444#endif
445
Erik de Castro Lopof4f1e102013-11-29 18:39:23 +1100446
447#if defined(TARGET_NR_timer_create)
448/* Maxiumum of 32 active POSIX timers allowed at any one time. */
449static timer_t g_posix_timers[32] = { 0, } ;
450
451static inline int next_free_host_timer(void)
452{
453 int k ;
454 /* FIXME: Does finding the next free slot require a lock? */
455 for (k = 0; k < ARRAY_SIZE(g_posix_timers); k++) {
456 if (g_posix_timers[k] == 0) {
457 g_posix_timers[k] = (timer_t) 1;
458 return k;
459 }
460 }
461 return -1;
462}
463#endif
464
Riku Voipio48e515d2011-07-12 15:40:51 +0300465/* ARM EABI and MIPS expect 64bit types aligned even on pairs or registers */
Alexander Graf4a1def42012-09-29 15:32:38 +0000466#ifdef TARGET_ARM
Riku Voipio48e515d2011-07-12 15:40:51 +0300467static inline int regpairs_aligned(void *cpu_env) {
468 return ((((CPUARMState *)cpu_env)->eabi) == 1) ;
469}
470#elif defined(TARGET_MIPS)
471static inline int regpairs_aligned(void *cpu_env) { return 1; }
Alexander Graf4a1def42012-09-29 15:32:38 +0000472#elif defined(TARGET_PPC) && !defined(TARGET_PPC64)
473/* SysV AVI for PPC32 expects 64bit parameters to be passed on odd/even pairs
474 * of registers which translates to the same as ARM/MIPS, because we start with
475 * r3 as arg1 */
476static inline int regpairs_aligned(void *cpu_env) { return 1; }
Riku Voipio48e515d2011-07-12 15:40:51 +0300477#else
478static inline int regpairs_aligned(void *cpu_env) { return 0; }
479#endif
480
thsb92c47c2007-11-01 00:07:38 +0000481#define ERRNO_TABLE_SIZE 1200
482
483/* target_to_host_errno_table[] is initialized from
484 * host_to_target_errno_table[] in syscall_init(). */
485static uint16_t target_to_host_errno_table[ERRNO_TABLE_SIZE] = {
486};
487
ths637947f2007-06-01 12:09:19 +0000488/*
thsfe8f0962007-07-12 10:59:21 +0000489 * This list is the union of errno values overridden in asm-<arch>/errno.h
ths637947f2007-06-01 12:09:19 +0000490 * minus the errnos that are not actually generic to all archs.
491 */
thsb92c47c2007-11-01 00:07:38 +0000492static uint16_t host_to_target_errno_table[ERRNO_TABLE_SIZE] = {
Chen Gang08703b92015-09-07 10:35:06 +0800493 [EAGAIN] = TARGET_EAGAIN,
ths637947f2007-06-01 12:09:19 +0000494 [EIDRM] = TARGET_EIDRM,
495 [ECHRNG] = TARGET_ECHRNG,
496 [EL2NSYNC] = TARGET_EL2NSYNC,
497 [EL3HLT] = TARGET_EL3HLT,
498 [EL3RST] = TARGET_EL3RST,
499 [ELNRNG] = TARGET_ELNRNG,
500 [EUNATCH] = TARGET_EUNATCH,
501 [ENOCSI] = TARGET_ENOCSI,
502 [EL2HLT] = TARGET_EL2HLT,
503 [EDEADLK] = TARGET_EDEADLK,
504 [ENOLCK] = TARGET_ENOLCK,
505 [EBADE] = TARGET_EBADE,
506 [EBADR] = TARGET_EBADR,
507 [EXFULL] = TARGET_EXFULL,
508 [ENOANO] = TARGET_ENOANO,
509 [EBADRQC] = TARGET_EBADRQC,
510 [EBADSLT] = TARGET_EBADSLT,
511 [EBFONT] = TARGET_EBFONT,
512 [ENOSTR] = TARGET_ENOSTR,
513 [ENODATA] = TARGET_ENODATA,
514 [ETIME] = TARGET_ETIME,
515 [ENOSR] = TARGET_ENOSR,
516 [ENONET] = TARGET_ENONET,
517 [ENOPKG] = TARGET_ENOPKG,
518 [EREMOTE] = TARGET_EREMOTE,
519 [ENOLINK] = TARGET_ENOLINK,
520 [EADV] = TARGET_EADV,
521 [ESRMNT] = TARGET_ESRMNT,
522 [ECOMM] = TARGET_ECOMM,
523 [EPROTO] = TARGET_EPROTO,
524 [EDOTDOT] = TARGET_EDOTDOT,
525 [EMULTIHOP] = TARGET_EMULTIHOP,
526 [EBADMSG] = TARGET_EBADMSG,
527 [ENAMETOOLONG] = TARGET_ENAMETOOLONG,
528 [EOVERFLOW] = TARGET_EOVERFLOW,
529 [ENOTUNIQ] = TARGET_ENOTUNIQ,
530 [EBADFD] = TARGET_EBADFD,
531 [EREMCHG] = TARGET_EREMCHG,
532 [ELIBACC] = TARGET_ELIBACC,
533 [ELIBBAD] = TARGET_ELIBBAD,
534 [ELIBSCN] = TARGET_ELIBSCN,
535 [ELIBMAX] = TARGET_ELIBMAX,
536 [ELIBEXEC] = TARGET_ELIBEXEC,
537 [EILSEQ] = TARGET_EILSEQ,
538 [ENOSYS] = TARGET_ENOSYS,
539 [ELOOP] = TARGET_ELOOP,
540 [ERESTART] = TARGET_ERESTART,
541 [ESTRPIPE] = TARGET_ESTRPIPE,
542 [ENOTEMPTY] = TARGET_ENOTEMPTY,
543 [EUSERS] = TARGET_EUSERS,
544 [ENOTSOCK] = TARGET_ENOTSOCK,
545 [EDESTADDRREQ] = TARGET_EDESTADDRREQ,
546 [EMSGSIZE] = TARGET_EMSGSIZE,
547 [EPROTOTYPE] = TARGET_EPROTOTYPE,
548 [ENOPROTOOPT] = TARGET_ENOPROTOOPT,
549 [EPROTONOSUPPORT] = TARGET_EPROTONOSUPPORT,
550 [ESOCKTNOSUPPORT] = TARGET_ESOCKTNOSUPPORT,
551 [EOPNOTSUPP] = TARGET_EOPNOTSUPP,
552 [EPFNOSUPPORT] = TARGET_EPFNOSUPPORT,
553 [EAFNOSUPPORT] = TARGET_EAFNOSUPPORT,
554 [EADDRINUSE] = TARGET_EADDRINUSE,
555 [EADDRNOTAVAIL] = TARGET_EADDRNOTAVAIL,
556 [ENETDOWN] = TARGET_ENETDOWN,
557 [ENETUNREACH] = TARGET_ENETUNREACH,
558 [ENETRESET] = TARGET_ENETRESET,
559 [ECONNABORTED] = TARGET_ECONNABORTED,
560 [ECONNRESET] = TARGET_ECONNRESET,
561 [ENOBUFS] = TARGET_ENOBUFS,
562 [EISCONN] = TARGET_EISCONN,
563 [ENOTCONN] = TARGET_ENOTCONN,
564 [EUCLEAN] = TARGET_EUCLEAN,
565 [ENOTNAM] = TARGET_ENOTNAM,
566 [ENAVAIL] = TARGET_ENAVAIL,
567 [EISNAM] = TARGET_EISNAM,
568 [EREMOTEIO] = TARGET_EREMOTEIO,
569 [ESHUTDOWN] = TARGET_ESHUTDOWN,
570 [ETOOMANYREFS] = TARGET_ETOOMANYREFS,
571 [ETIMEDOUT] = TARGET_ETIMEDOUT,
572 [ECONNREFUSED] = TARGET_ECONNREFUSED,
573 [EHOSTDOWN] = TARGET_EHOSTDOWN,
574 [EHOSTUNREACH] = TARGET_EHOSTUNREACH,
575 [EALREADY] = TARGET_EALREADY,
576 [EINPROGRESS] = TARGET_EINPROGRESS,
577 [ESTALE] = TARGET_ESTALE,
578 [ECANCELED] = TARGET_ECANCELED,
579 [ENOMEDIUM] = TARGET_ENOMEDIUM,
580 [EMEDIUMTYPE] = TARGET_EMEDIUMTYPE,
thsb7fe5db2007-07-23 15:37:46 +0000581#ifdef ENOKEY
ths637947f2007-06-01 12:09:19 +0000582 [ENOKEY] = TARGET_ENOKEY,
thsb7fe5db2007-07-23 15:37:46 +0000583#endif
584#ifdef EKEYEXPIRED
ths637947f2007-06-01 12:09:19 +0000585 [EKEYEXPIRED] = TARGET_EKEYEXPIRED,
thsb7fe5db2007-07-23 15:37:46 +0000586#endif
587#ifdef EKEYREVOKED
ths637947f2007-06-01 12:09:19 +0000588 [EKEYREVOKED] = TARGET_EKEYREVOKED,
thsb7fe5db2007-07-23 15:37:46 +0000589#endif
590#ifdef EKEYREJECTED
ths637947f2007-06-01 12:09:19 +0000591 [EKEYREJECTED] = TARGET_EKEYREJECTED,
thsb7fe5db2007-07-23 15:37:46 +0000592#endif
593#ifdef EOWNERDEAD
ths637947f2007-06-01 12:09:19 +0000594 [EOWNERDEAD] = TARGET_EOWNERDEAD,
thsb7fe5db2007-07-23 15:37:46 +0000595#endif
596#ifdef ENOTRECOVERABLE
ths637947f2007-06-01 12:09:19 +0000597 [ENOTRECOVERABLE] = TARGET_ENOTRECOVERABLE,
thsb7fe5db2007-07-23 15:37:46 +0000598#endif
thsb92c47c2007-11-01 00:07:38 +0000599};
ths637947f2007-06-01 12:09:19 +0000600
601static inline int host_to_target_errno(int err)
602{
Timothy E Baldwin24661192016-05-12 18:47:25 +0100603 if (err >= 0 && err < ERRNO_TABLE_SIZE &&
604 host_to_target_errno_table[err]) {
ths637947f2007-06-01 12:09:19 +0000605 return host_to_target_errno_table[err];
Timothy E Baldwin24661192016-05-12 18:47:25 +0100606 }
ths637947f2007-06-01 12:09:19 +0000607 return err;
608}
609
thsb92c47c2007-11-01 00:07:38 +0000610static inline int target_to_host_errno(int err)
611{
Timothy E Baldwin24661192016-05-12 18:47:25 +0100612 if (err >= 0 && err < ERRNO_TABLE_SIZE &&
613 target_to_host_errno_table[err]) {
thsb92c47c2007-11-01 00:07:38 +0000614 return target_to_host_errno_table[err];
Timothy E Baldwin24661192016-05-12 18:47:25 +0100615 }
thsb92c47c2007-11-01 00:07:38 +0000616 return err;
617}
618
blueswir1992f48a2007-10-14 16:27:31 +0000619static inline abi_long get_errno(abi_long ret)
bellard31e31b82003-02-18 22:55:36 +0000620{
621 if (ret == -1)
ths637947f2007-06-01 12:09:19 +0000622 return -host_to_target_errno(errno);
bellard31e31b82003-02-18 22:55:36 +0000623 else
624 return ret;
625}
626
blueswir1992f48a2007-10-14 16:27:31 +0000627static inline int is_error(abi_long ret)
bellard31e31b82003-02-18 22:55:36 +0000628{
blueswir1992f48a2007-10-14 16:27:31 +0000629 return (abi_ulong)ret >= (abi_ulong)(-4096);
bellard31e31b82003-02-18 22:55:36 +0000630}
631
Peter Maydell7dcdaea2016-06-06 19:58:18 +0100632const char *target_strerror(int err)
thsb92c47c2007-11-01 00:07:38 +0000633{
Peter Maydellda2a34f2016-06-06 19:58:19 +0100634 if (err == TARGET_ERESTARTSYS) {
635 return "To be restarted";
636 }
637 if (err == TARGET_QEMU_ESIGRETURN) {
638 return "Successful exit from sigreturn";
639 }
640
Alexander Graf962b2892011-11-21 12:04:07 +0100641 if ((err >= ERRNO_TABLE_SIZE) || (err < 0)) {
642 return NULL;
643 }
thsb92c47c2007-11-01 00:07:38 +0000644 return strerror(target_to_host_errno(err));
645}
646
Timothy E Baldwin4d330ce2016-05-12 18:47:46 +0100647#define safe_syscall0(type, name) \
648static type safe_##name(void) \
649{ \
650 return safe_syscall(__NR_##name); \
651}
652
653#define safe_syscall1(type, name, type1, arg1) \
654static type safe_##name(type1 arg1) \
655{ \
656 return safe_syscall(__NR_##name, arg1); \
657}
658
659#define safe_syscall2(type, name, type1, arg1, type2, arg2) \
660static type safe_##name(type1 arg1, type2 arg2) \
661{ \
662 return safe_syscall(__NR_##name, arg1, arg2); \
663}
664
665#define safe_syscall3(type, name, type1, arg1, type2, arg2, type3, arg3) \
666static type safe_##name(type1 arg1, type2 arg2, type3 arg3) \
667{ \
668 return safe_syscall(__NR_##name, arg1, arg2, arg3); \
669}
670
671#define safe_syscall4(type, name, type1, arg1, type2, arg2, type3, arg3, \
672 type4, arg4) \
673static type safe_##name(type1 arg1, type2 arg2, type3 arg3, type4 arg4) \
674{ \
675 return safe_syscall(__NR_##name, arg1, arg2, arg3, arg4); \
676}
677
678#define safe_syscall5(type, name, type1, arg1, type2, arg2, type3, arg3, \
679 type4, arg4, type5, arg5) \
680static type safe_##name(type1 arg1, type2 arg2, type3 arg3, type4 arg4, \
681 type5 arg5) \
682{ \
683 return safe_syscall(__NR_##name, arg1, arg2, arg3, arg4, arg5); \
684}
685
686#define safe_syscall6(type, name, type1, arg1, type2, arg2, type3, arg3, \
687 type4, arg4, type5, arg5, type6, arg6) \
688static type safe_##name(type1 arg1, type2 arg2, type3 arg3, type4 arg4, \
689 type5 arg5, type6 arg6) \
690{ \
691 return safe_syscall(__NR_##name, arg1, arg2, arg3, arg4, arg5, arg6); \
692}
693
Timothy E Baldwin50afd022016-05-12 18:47:47 +0100694safe_syscall3(ssize_t, read, int, fd, void *, buff, size_t, count)
695safe_syscall3(ssize_t, write, int, fd, const void *, buff, size_t, count)
Timothy E Baldwinc10a0732016-05-12 18:47:48 +0100696safe_syscall4(int, openat, int, dirfd, const char *, pathname, \
697 int, flags, mode_t, mode)
Timothy E Baldwin4af80a32016-05-12 18:47:49 +0100698safe_syscall4(pid_t, wait4, pid_t, pid, int *, status, int, options, \
699 struct rusage *, rusage)
700safe_syscall5(int, waitid, idtype_t, idtype, id_t, id, siginfo_t *, infop, \
701 int, options, struct rusage *, rusage)
Timothy E Baldwinffdcbe22016-05-12 18:47:50 +0100702safe_syscall3(int, execve, const char *, filename, char **, argv, char **, envp)
Peter Maydell6df9d382016-05-12 18:47:51 +0100703safe_syscall6(int, pselect6, int, nfds, fd_set *, readfds, fd_set *, writefds, \
704 fd_set *, exceptfds, struct timespec *, timeout, void *, sig)
Peter Maydella6130232016-06-06 19:58:10 +0100705safe_syscall5(int, ppoll, struct pollfd *, ufds, unsigned int, nfds,
706 struct timespec *, tsp, const sigset_t *, sigmask,
707 size_t, sigsetsize)
Peter Maydell227f0212016-06-06 19:58:11 +0100708safe_syscall6(int, epoll_pwait, int, epfd, struct epoll_event *, events,
709 int, maxevents, int, timeout, const sigset_t *, sigmask,
710 size_t, sigsetsize)
Peter Maydelld509eeb2016-05-12 18:47:52 +0100711safe_syscall6(int,futex,int *,uaddr,int,op,int,val, \
712 const struct timespec *,timeout,int *,uaddr2,int,val3)
Peter Maydell2fe4fba2016-05-27 15:51:48 +0100713safe_syscall2(int, rt_sigsuspend, sigset_t *, newset, size_t, sigsetsize)
Peter Maydellbef653d2016-05-27 15:51:57 +0100714safe_syscall2(int, kill, pid_t, pid, int, sig)
715safe_syscall2(int, tkill, int, tid, int, sig)
716safe_syscall3(int, tgkill, int, tgid, int, pid, int, sig)
Peter Maydell918c03e2016-06-06 19:58:02 +0100717safe_syscall3(ssize_t, readv, int, fd, const struct iovec *, iov, int, iovcnt)
718safe_syscall3(ssize_t, writev, int, fd, const struct iovec *, iov, int, iovcnt)
Peter Maydell2a3c7612016-06-06 19:58:03 +0100719safe_syscall3(int, connect, int, fd, const struct sockaddr *, addr,
720 socklen_t, addrlen)
Peter Maydell66687532016-06-06 19:58:04 +0100721safe_syscall6(ssize_t, sendto, int, fd, const void *, buf, size_t, len,
722 int, flags, const struct sockaddr *, addr, socklen_t, addrlen)
723safe_syscall6(ssize_t, recvfrom, int, fd, void *, buf, size_t, len,
724 int, flags, struct sockaddr *, addr, socklen_t *, addrlen)
725safe_syscall3(ssize_t, sendmsg, int, fd, const struct msghdr *, msg, int, flags)
726safe_syscall3(ssize_t, recvmsg, int, fd, struct msghdr *, msg, int, flags)
Peter Maydell2a845982016-06-06 19:58:07 +0100727safe_syscall2(int, flock, int, fd, int, operation)
Peter Maydellb3f82332016-06-06 19:58:08 +0100728safe_syscall4(int, rt_sigtimedwait, const sigset_t *, these, siginfo_t *, uinfo,
729 const struct timespec *, uts, size_t, sigsetsize)
Peter Maydellff6dc132016-06-06 19:58:13 +0100730safe_syscall4(int, accept4, int, fd, struct sockaddr *, addr, socklen_t *, len,
731 int, flags)
Peter Maydell9e518222016-06-06 19:58:09 +0100732safe_syscall2(int, nanosleep, const struct timespec *, req,
733 struct timespec *, rem)
734#ifdef TARGET_NR_clock_nanosleep
735safe_syscall4(int, clock_nanosleep, const clockid_t, clock, int, flags,
736 const struct timespec *, req, struct timespec *, rem)
737#endif
Peter Maydell89f9fe42016-06-06 19:58:05 +0100738#ifdef __NR_msgsnd
739safe_syscall4(int, msgsnd, int, msgid, const void *, msgp, size_t, sz,
740 int, flags)
741safe_syscall5(int, msgrcv, int, msgid, void *, msgp, size_t, sz,
742 long, msgtype, int, flags)
Peter Maydellffb7ee72016-06-06 19:58:12 +0100743safe_syscall4(int, semtimedop, int, semid, struct sembuf *, tsops,
744 unsigned, nsops, const struct timespec *, timeout)
Peter Maydell89f9fe42016-06-06 19:58:05 +0100745#else
746/* This host kernel architecture uses a single ipc syscall; fake up
747 * wrappers for the sub-operations to hide this implementation detail.
748 * Annoyingly we can't include linux/ipc.h to get the constant definitions
749 * for the call parameter because some structs in there conflict with the
750 * sys/ipc.h ones. So we just define them here, and rely on them being
751 * the same for all host architectures.
752 */
Peter Maydellffb7ee72016-06-06 19:58:12 +0100753#define Q_SEMTIMEDOP 4
Peter Maydell89f9fe42016-06-06 19:58:05 +0100754#define Q_MSGSND 11
755#define Q_MSGRCV 12
756#define Q_IPCCALL(VERSION, OP) ((VERSION) << 16 | (OP))
757
758safe_syscall6(int, ipc, int, call, long, first, long, second, long, third,
759 void *, ptr, long, fifth)
760static int safe_msgsnd(int msgid, const void *msgp, size_t sz, int flags)
761{
762 return safe_ipc(Q_IPCCALL(0, Q_MSGSND), msgid, sz, flags, (void *)msgp, 0);
763}
764static int safe_msgrcv(int msgid, void *msgp, size_t sz, long type, int flags)
765{
766 return safe_ipc(Q_IPCCALL(1, Q_MSGRCV), msgid, sz, flags, msgp, type);
767}
Peter Maydellffb7ee72016-06-06 19:58:12 +0100768static int safe_semtimedop(int semid, struct sembuf *tsops, unsigned nsops,
769 const struct timespec *timeout)
770{
771 return safe_ipc(Q_IPCCALL(0, Q_SEMTIMEDOP), semid, nsops, 0, tsops,
772 (long)timeout);
773}
Peter Maydell89f9fe42016-06-06 19:58:05 +0100774#endif
Peter Maydelld40ecd62016-06-06 19:58:06 +0100775#if defined(TARGET_NR_mq_open) && defined(__NR_mq_open)
776safe_syscall5(int, mq_timedsend, int, mqdes, const char *, msg_ptr,
777 size_t, len, unsigned, prio, const struct timespec *, timeout)
778safe_syscall5(int, mq_timedreceive, int, mqdes, char *, msg_ptr,
779 size_t, len, unsigned *, prio, const struct timespec *, timeout)
780#endif
Peter Maydell49ca6f32016-06-06 19:58:14 +0100781/* We do ioctl like this rather than via safe_syscall3 to preserve the
782 * "third argument might be integer or pointer or not present" behaviour of
783 * the libc function.
784 */
785#define safe_ioctl(...) safe_syscall(__NR_ioctl, __VA_ARGS__)
Timothy E Baldwin50afd022016-05-12 18:47:47 +0100786
Paul Burton8289d112014-06-22 11:25:33 +0100787static inline int host_to_target_sock_type(int host_type)
788{
789 int target_type;
790
791 switch (host_type & 0xf /* SOCK_TYPE_MASK */) {
792 case SOCK_DGRAM:
793 target_type = TARGET_SOCK_DGRAM;
794 break;
795 case SOCK_STREAM:
796 target_type = TARGET_SOCK_STREAM;
797 break;
798 default:
799 target_type = host_type & 0xf /* SOCK_TYPE_MASK */;
800 break;
801 }
802
803#if defined(SOCK_CLOEXEC)
804 if (host_type & SOCK_CLOEXEC) {
805 target_type |= TARGET_SOCK_CLOEXEC;
806 }
807#endif
808
809#if defined(SOCK_NONBLOCK)
810 if (host_type & SOCK_NONBLOCK) {
811 target_type |= TARGET_SOCK_NONBLOCK;
812 }
813#endif
814
815 return target_type;
816}
817
blueswir1992f48a2007-10-14 16:27:31 +0000818static abi_ulong target_brk;
819static abi_ulong target_original_brk;
vincent4d1de872011-06-14 21:56:33 +0000820static abi_ulong brk_page;
bellard31e31b82003-02-18 22:55:36 +0000821
blueswir1992f48a2007-10-14 16:27:31 +0000822void target_set_brk(abi_ulong new_brk)
bellard31e31b82003-02-18 22:55:36 +0000823{
blueswir14c1de732007-07-07 20:45:44 +0000824 target_original_brk = target_brk = HOST_PAGE_ALIGN(new_brk);
vincent4d1de872011-06-14 21:56:33 +0000825 brk_page = HOST_PAGE_ALIGN(target_brk);
bellard31e31b82003-02-18 22:55:36 +0000826}
827
vincent4d1de872011-06-14 21:56:33 +0000828//#define DEBUGF_BRK(message, args...) do { fprintf(stderr, (message), ## args); } while (0)
829#define DEBUGF_BRK(message, args...)
830
ths0da46a62007-10-20 20:23:07 +0000831/* do_brk() must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +0000832abi_long do_brk(abi_ulong new_brk)
bellard31e31b82003-02-18 22:55:36 +0000833{
blueswir1992f48a2007-10-14 16:27:31 +0000834 abi_long mapped_addr;
bellard31e31b82003-02-18 22:55:36 +0000835 int new_alloc_size;
836
Paul Brook3a0c6c42012-02-09 19:04:27 +0000837 DEBUGF_BRK("do_brk(" TARGET_ABI_FMT_lx ") -> ", new_brk);
ths3b46e622007-09-17 08:09:54 +0000838
vincent4d1de872011-06-14 21:56:33 +0000839 if (!new_brk) {
Paul Brook3a0c6c42012-02-09 19:04:27 +0000840 DEBUGF_BRK(TARGET_ABI_FMT_lx " (!new_brk)\n", target_brk);
vincent4d1de872011-06-14 21:56:33 +0000841 return target_brk;
842 }
843 if (new_brk < target_original_brk) {
Paul Brook3a0c6c42012-02-09 19:04:27 +0000844 DEBUGF_BRK(TARGET_ABI_FMT_lx " (new_brk < target_original_brk)\n",
845 target_brk);
vincent4d1de872011-06-14 21:56:33 +0000846 return target_brk;
847 }
bellard31e31b82003-02-18 22:55:36 +0000848
vincent4d1de872011-06-14 21:56:33 +0000849 /* If the new brk is less than the highest page reserved to the
850 * target heap allocation, set it and we're almost done... */
851 if (new_brk <= brk_page) {
852 /* Heap contents are initialized to zero, as for anonymous
853 * mapped pages. */
854 if (new_brk > target_brk) {
855 memset(g2h(target_brk), 0, new_brk - target_brk);
856 }
bellard31e31b82003-02-18 22:55:36 +0000857 target_brk = new_brk;
Paul Brook3a0c6c42012-02-09 19:04:27 +0000858 DEBUGF_BRK(TARGET_ABI_FMT_lx " (new_brk <= brk_page)\n", target_brk);
pbrook53a59602006-03-25 19:31:22 +0000859 return target_brk;
bellard31e31b82003-02-18 22:55:36 +0000860 }
861
Peter Maydell00faf082011-04-18 16:34:24 +0100862 /* We need to allocate more memory after the brk... Note that
863 * we don't use MAP_FIXED because that will map over the top of
864 * any existing mapping (like the one with the host libc or qemu
865 * itself); instead we treat "mapped but at wrong address" as
866 * a failure and unmap again.
867 */
vincent4d1de872011-06-14 21:56:33 +0000868 new_alloc_size = HOST_PAGE_ALIGN(new_brk - brk_page);
ths5fafdf22007-09-16 21:08:06 +0000869 mapped_addr = get_errno(target_mmap(brk_page, new_alloc_size,
bellard54936002003-05-13 00:25:15 +0000870 PROT_READ|PROT_WRITE,
Peter Maydell00faf082011-04-18 16:34:24 +0100871 MAP_ANON|MAP_PRIVATE, 0, 0));
872
873 if (mapped_addr == brk_page) {
CĂ©dric VINCENT70afc342011-08-26 10:56:50 +0200874 /* Heap contents are initialized to zero, as for anonymous
875 * mapped pages. Technically the new pages are already
876 * initialized to zero since they *are* anonymous mapped
877 * pages, however we have to take care with the contents that
878 * come from the remaining part of the previous page: it may
879 * contains garbage data due to a previous heap usage (grown
880 * then shrunken). */
881 memset(g2h(target_brk), 0, brk_page - target_brk);
882
Peter Maydell00faf082011-04-18 16:34:24 +0100883 target_brk = new_brk;
vincent4d1de872011-06-14 21:56:33 +0000884 brk_page = HOST_PAGE_ALIGN(target_brk);
Paul Brook3a0c6c42012-02-09 19:04:27 +0000885 DEBUGF_BRK(TARGET_ABI_FMT_lx " (mapped_addr == brk_page)\n",
886 target_brk);
Peter Maydell00faf082011-04-18 16:34:24 +0100887 return target_brk;
888 } else if (mapped_addr != -1) {
889 /* Mapped but at wrong address, meaning there wasn't actually
890 * enough space for this brk.
891 */
892 target_munmap(mapped_addr, new_alloc_size);
893 mapped_addr = -1;
Paul Brook3a0c6c42012-02-09 19:04:27 +0000894 DEBUGF_BRK(TARGET_ABI_FMT_lx " (mapped_addr != -1)\n", target_brk);
vincent4d1de872011-06-14 21:56:33 +0000895 }
896 else {
Paul Brook3a0c6c42012-02-09 19:04:27 +0000897 DEBUGF_BRK(TARGET_ABI_FMT_lx " (otherwise)\n", target_brk);
Peter Maydell00faf082011-04-18 16:34:24 +0100898 }
balrog7ab240a2008-04-26 12:17:34 +0000899
Richard Henderson7dd46c02010-05-03 10:07:49 -0700900#if defined(TARGET_ALPHA)
901 /* We (partially) emulate OSF/1 on Alpha, which requires we
902 return a proper errno, not an unchanged brk value. */
Peter Maydell00faf082011-04-18 16:34:24 +0100903 return -TARGET_ENOMEM;
Richard Henderson7dd46c02010-05-03 10:07:49 -0700904#endif
Peter Maydell00faf082011-04-18 16:34:24 +0100905 /* For everything else, return the previous break. */
balrog7ab240a2008-04-26 12:17:34 +0000906 return target_brk;
bellard31e31b82003-02-18 22:55:36 +0000907}
908
ths26edcf42007-12-09 02:25:24 +0000909static inline abi_long copy_from_user_fdset(fd_set *fds,
910 abi_ulong target_fds_addr,
911 int n)
bellard31e31b82003-02-18 22:55:36 +0000912{
ths26edcf42007-12-09 02:25:24 +0000913 int i, nw, j, k;
914 abi_ulong b, *target_fds;
915
Laurent Vivierb1b2db22016-05-31 18:36:02 +0200916 nw = DIV_ROUND_UP(n, TARGET_ABI_BITS);
ths26edcf42007-12-09 02:25:24 +0000917 if (!(target_fds = lock_user(VERIFY_READ,
918 target_fds_addr,
919 sizeof(abi_ulong) * nw,
920 1)))
921 return -TARGET_EFAULT;
922
923 FD_ZERO(fds);
924 k = 0;
925 for (i = 0; i < nw; i++) {
926 /* grab the abi_ulong */
927 __get_user(b, &target_fds[i]);
928 for (j = 0; j < TARGET_ABI_BITS; j++) {
929 /* check the bit inside the abi_ulong */
930 if ((b >> j) & 1)
931 FD_SET(k, fds);
932 k++;
bellard31e31b82003-02-18 22:55:36 +0000933 }
bellard31e31b82003-02-18 22:55:36 +0000934 }
ths26edcf42007-12-09 02:25:24 +0000935
936 unlock_user(target_fds, target_fds_addr, 0);
937
938 return 0;
bellard31e31b82003-02-18 22:55:36 +0000939}
940
Mike Frysinger055e0902011-06-03 17:01:49 -0400941static inline abi_ulong copy_from_user_fdset_ptr(fd_set *fds, fd_set **fds_ptr,
942 abi_ulong target_fds_addr,
943 int n)
944{
945 if (target_fds_addr) {
946 if (copy_from_user_fdset(fds, target_fds_addr, n))
947 return -TARGET_EFAULT;
948 *fds_ptr = fds;
949 } else {
950 *fds_ptr = NULL;
951 }
952 return 0;
953}
954
ths26edcf42007-12-09 02:25:24 +0000955static inline abi_long copy_to_user_fdset(abi_ulong target_fds_addr,
956 const fd_set *fds,
957 int n)
bellard31e31b82003-02-18 22:55:36 +0000958{
bellard31e31b82003-02-18 22:55:36 +0000959 int i, nw, j, k;
blueswir1992f48a2007-10-14 16:27:31 +0000960 abi_long v;
ths26edcf42007-12-09 02:25:24 +0000961 abi_ulong *target_fds;
bellard31e31b82003-02-18 22:55:36 +0000962
Laurent Vivierb1b2db22016-05-31 18:36:02 +0200963 nw = DIV_ROUND_UP(n, TARGET_ABI_BITS);
ths26edcf42007-12-09 02:25:24 +0000964 if (!(target_fds = lock_user(VERIFY_WRITE,
965 target_fds_addr,
966 sizeof(abi_ulong) * nw,
967 0)))
968 return -TARGET_EFAULT;
969
970 k = 0;
971 for (i = 0; i < nw; i++) {
972 v = 0;
973 for (j = 0; j < TARGET_ABI_BITS; j++) {
Andreas Schwab9ab709b2013-04-09 01:02:34 +0000974 v |= ((abi_ulong)(FD_ISSET(k, fds) != 0) << j);
ths26edcf42007-12-09 02:25:24 +0000975 k++;
bellard31e31b82003-02-18 22:55:36 +0000976 }
ths26edcf42007-12-09 02:25:24 +0000977 __put_user(v, &target_fds[i]);
bellard31e31b82003-02-18 22:55:36 +0000978 }
ths26edcf42007-12-09 02:25:24 +0000979
980 unlock_user(target_fds, target_fds_addr, sizeof(abi_ulong) * nw);
981
982 return 0;
bellard31e31b82003-02-18 22:55:36 +0000983}
984
bellardc596ed12003-07-13 17:32:31 +0000985#if defined(__alpha__)
986#define HOST_HZ 1024
987#else
988#define HOST_HZ 100
989#endif
990
blueswir1992f48a2007-10-14 16:27:31 +0000991static inline abi_long host_to_target_clock_t(long ticks)
bellardc596ed12003-07-13 17:32:31 +0000992{
993#if HOST_HZ == TARGET_HZ
994 return ticks;
995#else
996 return ((int64_t)ticks * TARGET_HZ) / HOST_HZ;
997#endif
998}
999
bellard579a97f2007-11-11 14:26:47 +00001000static inline abi_long host_to_target_rusage(abi_ulong target_addr,
1001 const struct rusage *rusage)
bellardb4091862003-05-16 15:39:34 +00001002{
pbrook53a59602006-03-25 19:31:22 +00001003 struct target_rusage *target_rusage;
1004
bellard579a97f2007-11-11 14:26:47 +00001005 if (!lock_user_struct(VERIFY_WRITE, target_rusage, target_addr, 0))
1006 return -TARGET_EFAULT;
Matthias Brauncbb21ee2011-08-12 19:57:41 +02001007 target_rusage->ru_utime.tv_sec = tswapal(rusage->ru_utime.tv_sec);
1008 target_rusage->ru_utime.tv_usec = tswapal(rusage->ru_utime.tv_usec);
1009 target_rusage->ru_stime.tv_sec = tswapal(rusage->ru_stime.tv_sec);
1010 target_rusage->ru_stime.tv_usec = tswapal(rusage->ru_stime.tv_usec);
1011 target_rusage->ru_maxrss = tswapal(rusage->ru_maxrss);
1012 target_rusage->ru_ixrss = tswapal(rusage->ru_ixrss);
1013 target_rusage->ru_idrss = tswapal(rusage->ru_idrss);
1014 target_rusage->ru_isrss = tswapal(rusage->ru_isrss);
1015 target_rusage->ru_minflt = tswapal(rusage->ru_minflt);
1016 target_rusage->ru_majflt = tswapal(rusage->ru_majflt);
1017 target_rusage->ru_nswap = tswapal(rusage->ru_nswap);
1018 target_rusage->ru_inblock = tswapal(rusage->ru_inblock);
1019 target_rusage->ru_oublock = tswapal(rusage->ru_oublock);
1020 target_rusage->ru_msgsnd = tswapal(rusage->ru_msgsnd);
1021 target_rusage->ru_msgrcv = tswapal(rusage->ru_msgrcv);
1022 target_rusage->ru_nsignals = tswapal(rusage->ru_nsignals);
1023 target_rusage->ru_nvcsw = tswapal(rusage->ru_nvcsw);
1024 target_rusage->ru_nivcsw = tswapal(rusage->ru_nivcsw);
pbrook53a59602006-03-25 19:31:22 +00001025 unlock_user_struct(target_rusage, target_addr, 1);
bellard579a97f2007-11-11 14:26:47 +00001026
1027 return 0;
bellardb4091862003-05-16 15:39:34 +00001028}
1029
Matthias Brauncbb21ee2011-08-12 19:57:41 +02001030static inline rlim_t target_to_host_rlim(abi_ulong target_rlim)
takasi-y@ops.dti.ne.jp81bbe902010-04-12 04:07:35 +09001031{
Matthias Brauncbb21ee2011-08-12 19:57:41 +02001032 abi_ulong target_rlim_swap;
Wesley W. Terpstra95b33b22011-07-12 14:38:22 +03001033 rlim_t result;
1034
Matthias Brauncbb21ee2011-08-12 19:57:41 +02001035 target_rlim_swap = tswapal(target_rlim);
1036 if (target_rlim_swap == TARGET_RLIM_INFINITY)
1037 return RLIM_INFINITY;
1038
1039 result = target_rlim_swap;
1040 if (target_rlim_swap != (rlim_t)result)
1041 return RLIM_INFINITY;
Wesley W. Terpstra95b33b22011-07-12 14:38:22 +03001042
1043 return result;
takasi-y@ops.dti.ne.jp81bbe902010-04-12 04:07:35 +09001044}
1045
Matthias Brauncbb21ee2011-08-12 19:57:41 +02001046static inline abi_ulong host_to_target_rlim(rlim_t rlim)
takasi-y@ops.dti.ne.jp81bbe902010-04-12 04:07:35 +09001047{
Matthias Brauncbb21ee2011-08-12 19:57:41 +02001048 abi_ulong target_rlim_swap;
1049 abi_ulong result;
Wesley W. Terpstra95b33b22011-07-12 14:38:22 +03001050
Matthias Brauncbb21ee2011-08-12 19:57:41 +02001051 if (rlim == RLIM_INFINITY || rlim != (abi_long)rlim)
Wesley W. Terpstra95b33b22011-07-12 14:38:22 +03001052 target_rlim_swap = TARGET_RLIM_INFINITY;
takasi-y@ops.dti.ne.jp81bbe902010-04-12 04:07:35 +09001053 else
Wesley W. Terpstra95b33b22011-07-12 14:38:22 +03001054 target_rlim_swap = rlim;
Matthias Brauncbb21ee2011-08-12 19:57:41 +02001055 result = tswapal(target_rlim_swap);
Wesley W. Terpstra95b33b22011-07-12 14:38:22 +03001056
1057 return result;
takasi-y@ops.dti.ne.jp81bbe902010-04-12 04:07:35 +09001058}
1059
Wesley W. Terpstrae22b7012011-07-12 14:42:00 +03001060static inline int target_to_host_resource(int code)
1061{
1062 switch (code) {
1063 case TARGET_RLIMIT_AS:
1064 return RLIMIT_AS;
1065 case TARGET_RLIMIT_CORE:
1066 return RLIMIT_CORE;
1067 case TARGET_RLIMIT_CPU:
1068 return RLIMIT_CPU;
1069 case TARGET_RLIMIT_DATA:
1070 return RLIMIT_DATA;
1071 case TARGET_RLIMIT_FSIZE:
1072 return RLIMIT_FSIZE;
1073 case TARGET_RLIMIT_LOCKS:
1074 return RLIMIT_LOCKS;
1075 case TARGET_RLIMIT_MEMLOCK:
1076 return RLIMIT_MEMLOCK;
1077 case TARGET_RLIMIT_MSGQUEUE:
1078 return RLIMIT_MSGQUEUE;
1079 case TARGET_RLIMIT_NICE:
1080 return RLIMIT_NICE;
1081 case TARGET_RLIMIT_NOFILE:
1082 return RLIMIT_NOFILE;
1083 case TARGET_RLIMIT_NPROC:
1084 return RLIMIT_NPROC;
1085 case TARGET_RLIMIT_RSS:
1086 return RLIMIT_RSS;
1087 case TARGET_RLIMIT_RTPRIO:
1088 return RLIMIT_RTPRIO;
1089 case TARGET_RLIMIT_SIGPENDING:
1090 return RLIMIT_SIGPENDING;
1091 case TARGET_RLIMIT_STACK:
1092 return RLIMIT_STACK;
1093 default:
1094 return code;
1095 }
1096}
1097
ths788f5ec2007-12-09 02:37:05 +00001098static inline abi_long copy_from_user_timeval(struct timeval *tv,
1099 abi_ulong target_tv_addr)
bellard31e31b82003-02-18 22:55:36 +00001100{
pbrook53a59602006-03-25 19:31:22 +00001101 struct target_timeval *target_tv;
1102
ths788f5ec2007-12-09 02:37:05 +00001103 if (!lock_user_struct(VERIFY_READ, target_tv, target_tv_addr, 1))
bellard579a97f2007-11-11 14:26:47 +00001104 return -TARGET_EFAULT;
ths788f5ec2007-12-09 02:37:05 +00001105
1106 __get_user(tv->tv_sec, &target_tv->tv_sec);
1107 __get_user(tv->tv_usec, &target_tv->tv_usec);
1108
1109 unlock_user_struct(target_tv, target_tv_addr, 0);
bellard579a97f2007-11-11 14:26:47 +00001110
1111 return 0;
bellard31e31b82003-02-18 22:55:36 +00001112}
1113
ths788f5ec2007-12-09 02:37:05 +00001114static inline abi_long copy_to_user_timeval(abi_ulong target_tv_addr,
1115 const struct timeval *tv)
bellard31e31b82003-02-18 22:55:36 +00001116{
pbrook53a59602006-03-25 19:31:22 +00001117 struct target_timeval *target_tv;
1118
ths788f5ec2007-12-09 02:37:05 +00001119 if (!lock_user_struct(VERIFY_WRITE, target_tv, target_tv_addr, 0))
bellard579a97f2007-11-11 14:26:47 +00001120 return -TARGET_EFAULT;
ths788f5ec2007-12-09 02:37:05 +00001121
1122 __put_user(tv->tv_sec, &target_tv->tv_sec);
1123 __put_user(tv->tv_usec, &target_tv->tv_usec);
1124
1125 unlock_user_struct(target_tv, target_tv_addr, 1);
bellard579a97f2007-11-11 14:26:47 +00001126
1127 return 0;
bellard31e31b82003-02-18 22:55:36 +00001128}
1129
Paul Burtonef4467e2014-06-22 11:25:40 +01001130static inline abi_long copy_from_user_timezone(struct timezone *tz,
1131 abi_ulong target_tz_addr)
1132{
1133 struct target_timezone *target_tz;
1134
1135 if (!lock_user_struct(VERIFY_READ, target_tz, target_tz_addr, 1)) {
1136 return -TARGET_EFAULT;
1137 }
1138
1139 __get_user(tz->tz_minuteswest, &target_tz->tz_minuteswest);
1140 __get_user(tz->tz_dsttime, &target_tz->tz_dsttime);
1141
1142 unlock_user_struct(target_tz, target_tz_addr, 0);
1143
1144 return 0;
1145}
1146
Nathan Froyd8ec9cf82009-07-22 09:14:36 -07001147#if defined(TARGET_NR_mq_open) && defined(__NR_mq_open)
1148#include <mqueue.h>
1149
aurel3224e10032009-04-15 16:11:43 +00001150static inline abi_long copy_from_user_mq_attr(struct mq_attr *attr,
1151 abi_ulong target_mq_attr_addr)
1152{
1153 struct target_mq_attr *target_mq_attr;
1154
1155 if (!lock_user_struct(VERIFY_READ, target_mq_attr,
1156 target_mq_attr_addr, 1))
1157 return -TARGET_EFAULT;
1158
1159 __get_user(attr->mq_flags, &target_mq_attr->mq_flags);
1160 __get_user(attr->mq_maxmsg, &target_mq_attr->mq_maxmsg);
1161 __get_user(attr->mq_msgsize, &target_mq_attr->mq_msgsize);
1162 __get_user(attr->mq_curmsgs, &target_mq_attr->mq_curmsgs);
1163
1164 unlock_user_struct(target_mq_attr, target_mq_attr_addr, 0);
1165
1166 return 0;
1167}
1168
1169static inline abi_long copy_to_user_mq_attr(abi_ulong target_mq_attr_addr,
1170 const struct mq_attr *attr)
1171{
1172 struct target_mq_attr *target_mq_attr;
1173
1174 if (!lock_user_struct(VERIFY_WRITE, target_mq_attr,
1175 target_mq_attr_addr, 0))
1176 return -TARGET_EFAULT;
1177
1178 __put_user(attr->mq_flags, &target_mq_attr->mq_flags);
1179 __put_user(attr->mq_maxmsg, &target_mq_attr->mq_maxmsg);
1180 __put_user(attr->mq_msgsize, &target_mq_attr->mq_msgsize);
1181 __put_user(attr->mq_curmsgs, &target_mq_attr->mq_curmsgs);
1182
1183 unlock_user_struct(target_mq_attr, target_mq_attr_addr, 1);
1184
1185 return 0;
1186}
Nathan Froyd8ec9cf82009-07-22 09:14:36 -07001187#endif
bellard31e31b82003-02-18 22:55:36 +00001188
Mike Frysinger055e0902011-06-03 17:01:49 -04001189#if defined(TARGET_NR_select) || defined(TARGET_NR__newselect)
ths0da46a62007-10-20 20:23:07 +00001190/* do_select() must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +00001191static abi_long do_select(int n,
ths26edcf42007-12-09 02:25:24 +00001192 abi_ulong rfd_addr, abi_ulong wfd_addr,
1193 abi_ulong efd_addr, abi_ulong target_tv_addr)
bellard31e31b82003-02-18 22:55:36 +00001194{
1195 fd_set rfds, wfds, efds;
1196 fd_set *rfds_ptr, *wfds_ptr, *efds_ptr;
Peter Maydell6df9d382016-05-12 18:47:51 +01001197 struct timeval tv;
1198 struct timespec ts, *ts_ptr;
blueswir1992f48a2007-10-14 16:27:31 +00001199 abi_long ret;
bellard31e31b82003-02-18 22:55:36 +00001200
Mike Frysinger055e0902011-06-03 17:01:49 -04001201 ret = copy_from_user_fdset_ptr(&rfds, &rfds_ptr, rfd_addr, n);
1202 if (ret) {
1203 return ret;
pbrook53a59602006-03-25 19:31:22 +00001204 }
Mike Frysinger055e0902011-06-03 17:01:49 -04001205 ret = copy_from_user_fdset_ptr(&wfds, &wfds_ptr, wfd_addr, n);
1206 if (ret) {
1207 return ret;
pbrook53a59602006-03-25 19:31:22 +00001208 }
Mike Frysinger055e0902011-06-03 17:01:49 -04001209 ret = copy_from_user_fdset_ptr(&efds, &efds_ptr, efd_addr, n);
1210 if (ret) {
1211 return ret;
pbrook53a59602006-03-25 19:31:22 +00001212 }
ths3b46e622007-09-17 08:09:54 +00001213
ths26edcf42007-12-09 02:25:24 +00001214 if (target_tv_addr) {
ths788f5ec2007-12-09 02:37:05 +00001215 if (copy_from_user_timeval(&tv, target_tv_addr))
1216 return -TARGET_EFAULT;
Peter Maydell6df9d382016-05-12 18:47:51 +01001217 ts.tv_sec = tv.tv_sec;
1218 ts.tv_nsec = tv.tv_usec * 1000;
1219 ts_ptr = &ts;
bellard31e31b82003-02-18 22:55:36 +00001220 } else {
Peter Maydell6df9d382016-05-12 18:47:51 +01001221 ts_ptr = NULL;
bellard31e31b82003-02-18 22:55:36 +00001222 }
ths26edcf42007-12-09 02:25:24 +00001223
Peter Maydell6df9d382016-05-12 18:47:51 +01001224 ret = get_errno(safe_pselect6(n, rfds_ptr, wfds_ptr, efds_ptr,
1225 ts_ptr, NULL));
pbrook53a59602006-03-25 19:31:22 +00001226
ths26edcf42007-12-09 02:25:24 +00001227 if (!is_error(ret)) {
1228 if (rfd_addr && copy_to_user_fdset(rfd_addr, &rfds, n))
1229 return -TARGET_EFAULT;
1230 if (wfd_addr && copy_to_user_fdset(wfd_addr, &wfds, n))
1231 return -TARGET_EFAULT;
1232 if (efd_addr && copy_to_user_fdset(efd_addr, &efds, n))
1233 return -TARGET_EFAULT;
bellard31e31b82003-02-18 22:55:36 +00001234
Peter Maydell6df9d382016-05-12 18:47:51 +01001235 if (target_tv_addr) {
1236 tv.tv_sec = ts.tv_sec;
1237 tv.tv_usec = ts.tv_nsec / 1000;
1238 if (copy_to_user_timeval(target_tv_addr, &tv)) {
1239 return -TARGET_EFAULT;
1240 }
1241 }
bellard31e31b82003-02-18 22:55:36 +00001242 }
bellard579a97f2007-11-11 14:26:47 +00001243
bellard31e31b82003-02-18 22:55:36 +00001244 return ret;
1245}
Mike Frysinger055e0902011-06-03 17:01:49 -04001246#endif
bellard31e31b82003-02-18 22:55:36 +00001247
Riku Voipio099d6b02009-05-05 12:10:04 +03001248static abi_long do_pipe2(int host_pipe[], int flags)
1249{
1250#ifdef CONFIG_PIPE2
1251 return pipe2(host_pipe, flags);
1252#else
1253 return -ENOSYS;
1254#endif
1255}
1256
Richard Hendersonfb41a662010-05-03 10:07:52 -07001257static abi_long do_pipe(void *cpu_env, abi_ulong pipedes,
1258 int flags, int is_pipe2)
Riku Voipio099d6b02009-05-05 12:10:04 +03001259{
1260 int host_pipe[2];
1261 abi_long ret;
1262 ret = flags ? do_pipe2(host_pipe, flags) : pipe(host_pipe);
1263
1264 if (is_error(ret))
1265 return get_errno(ret);
Richard Hendersonfb41a662010-05-03 10:07:52 -07001266
1267 /* Several targets have special calling conventions for the original
1268 pipe syscall, but didn't replicate this into the pipe2 syscall. */
1269 if (!is_pipe2) {
1270#if defined(TARGET_ALPHA)
1271 ((CPUAlphaState *)cpu_env)->ir[IR_A4] = host_pipe[1];
1272 return host_pipe[0];
1273#elif defined(TARGET_MIPS)
1274 ((CPUMIPSState*)cpu_env)->active_tc.gpr[3] = host_pipe[1];
1275 return host_pipe[0];
1276#elif defined(TARGET_SH4)
takasi-y@ops.dti.ne.jp597c0212010-02-18 00:35:03 +09001277 ((CPUSH4State*)cpu_env)->gregs[1] = host_pipe[1];
Richard Hendersonfb41a662010-05-03 10:07:52 -07001278 return host_pipe[0];
Peter Maydell82f05b62013-07-06 17:39:48 +01001279#elif defined(TARGET_SPARC)
1280 ((CPUSPARCState*)cpu_env)->regwptr[1] = host_pipe[1];
1281 return host_pipe[0];
takasi-y@ops.dti.ne.jp597c0212010-02-18 00:35:03 +09001282#endif
Richard Hendersonfb41a662010-05-03 10:07:52 -07001283 }
1284
Riku Voipio099d6b02009-05-05 12:10:04 +03001285 if (put_user_s32(host_pipe[0], pipedes)
1286 || put_user_s32(host_pipe[1], pipedes + sizeof(host_pipe[0])))
1287 return -TARGET_EFAULT;
Riku Voipio099d6b02009-05-05 12:10:04 +03001288 return get_errno(ret);
1289}
1290
Lionel Landwerlinb975b832009-04-25 23:30:19 +02001291static inline abi_long target_to_host_ip_mreq(struct ip_mreqn *mreqn,
1292 abi_ulong target_addr,
1293 socklen_t len)
1294{
1295 struct target_ip_mreqn *target_smreqn;
1296
1297 target_smreqn = lock_user(VERIFY_READ, target_addr, len, 1);
1298 if (!target_smreqn)
1299 return -TARGET_EFAULT;
1300 mreqn->imr_multiaddr.s_addr = target_smreqn->imr_multiaddr.s_addr;
1301 mreqn->imr_address.s_addr = target_smreqn->imr_address.s_addr;
1302 if (len == sizeof(struct target_ip_mreqn))
Matthias Brauncbb21ee2011-08-12 19:57:41 +02001303 mreqn->imr_ifindex = tswapal(target_smreqn->imr_ifindex);
Lionel Landwerlinb975b832009-04-25 23:30:19 +02001304 unlock_user(target_smreqn, target_addr, 0);
1305
1306 return 0;
1307}
1308
Laurent Vivier7b36f782015-10-28 21:40:44 +01001309static inline abi_long target_to_host_sockaddr(int fd, struct sockaddr *addr,
bellard579a97f2007-11-11 14:26:47 +00001310 abi_ulong target_addr,
1311 socklen_t len)
bellard7854b052003-03-29 17:22:23 +00001312{
aurel32607175e2009-04-15 16:11:59 +00001313 const socklen_t unix_maxlen = sizeof (struct sockaddr_un);
1314 sa_family_t sa_family;
pbrook53a59602006-03-25 19:31:22 +00001315 struct target_sockaddr *target_saddr;
1316
Laurent Vivier7b36f782015-10-28 21:40:44 +01001317 if (fd_trans_target_to_host_addr(fd)) {
1318 return fd_trans_target_to_host_addr(fd)(addr, target_addr, len);
1319 }
1320
bellard579a97f2007-11-11 14:26:47 +00001321 target_saddr = lock_user(VERIFY_READ, target_addr, len, 1);
1322 if (!target_saddr)
1323 return -TARGET_EFAULT;
aurel32607175e2009-04-15 16:11:59 +00001324
1325 sa_family = tswap16(target_saddr->sa_family);
1326
1327 /* Oops. The caller might send a incomplete sun_path; sun_path
1328 * must be terminated by \0 (see the manual page), but
1329 * unfortunately it is quite common to specify sockaddr_un
1330 * length as "strlen(x->sun_path)" while it should be
1331 * "strlen(...) + 1". We'll fix that here if needed.
1332 * Linux kernel has a similar feature.
1333 */
1334
1335 if (sa_family == AF_UNIX) {
1336 if (len < unix_maxlen && len > 0) {
1337 char *cp = (char*)target_saddr;
1338
1339 if ( cp[len-1] && !cp[len] )
1340 len++;
1341 }
1342 if (len > unix_maxlen)
1343 len = unix_maxlen;
1344 }
1345
pbrook53a59602006-03-25 19:31:22 +00001346 memcpy(addr, target_saddr, len);
aurel32607175e2009-04-15 16:11:59 +00001347 addr->sa_family = sa_family;
Laurent Vivier6c5b5642016-05-22 18:56:19 +02001348 if (sa_family == AF_NETLINK) {
1349 struct sockaddr_nl *nladdr;
1350
1351 nladdr = (struct sockaddr_nl *)addr;
1352 nladdr->nl_pid = tswap32(nladdr->nl_pid);
1353 nladdr->nl_groups = tswap32(nladdr->nl_groups);
1354 } else if (sa_family == AF_PACKET) {
Joakim Tjernlund33a29b52014-07-12 15:47:07 +02001355 struct target_sockaddr_ll *lladdr;
1356
1357 lladdr = (struct target_sockaddr_ll *)addr;
1358 lladdr->sll_ifindex = tswap32(lladdr->sll_ifindex);
1359 lladdr->sll_hatype = tswap16(lladdr->sll_hatype);
1360 }
pbrook53a59602006-03-25 19:31:22 +00001361 unlock_user(target_saddr, target_addr, 0);
bellard579a97f2007-11-11 14:26:47 +00001362
1363 return 0;
bellard7854b052003-03-29 17:22:23 +00001364}
1365
bellard579a97f2007-11-11 14:26:47 +00001366static inline abi_long host_to_target_sockaddr(abi_ulong target_addr,
1367 struct sockaddr *addr,
1368 socklen_t len)
bellard7854b052003-03-29 17:22:23 +00001369{
pbrook53a59602006-03-25 19:31:22 +00001370 struct target_sockaddr *target_saddr;
1371
bellard579a97f2007-11-11 14:26:47 +00001372 target_saddr = lock_user(VERIFY_WRITE, target_addr, len, 0);
1373 if (!target_saddr)
1374 return -TARGET_EFAULT;
pbrook53a59602006-03-25 19:31:22 +00001375 memcpy(target_saddr, addr, len);
1376 target_saddr->sa_family = tswap16(addr->sa_family);
Laurent Vivier6c5b5642016-05-22 18:56:19 +02001377 if (addr->sa_family == AF_NETLINK) {
1378 struct sockaddr_nl *target_nl = (struct sockaddr_nl *)target_saddr;
1379 target_nl->nl_pid = tswap32(target_nl->nl_pid);
1380 target_nl->nl_groups = tswap32(target_nl->nl_groups);
1381 }
pbrook53a59602006-03-25 19:31:22 +00001382 unlock_user(target_saddr, target_addr, len);
bellard579a97f2007-11-11 14:26:47 +00001383
1384 return 0;
bellard7854b052003-03-29 17:22:23 +00001385}
1386
bellard5a4a8982007-11-11 17:39:18 +00001387static inline abi_long target_to_host_cmsg(struct msghdr *msgh,
1388 struct target_msghdr *target_msgh)
bellard7854b052003-03-29 17:22:23 +00001389{
1390 struct cmsghdr *cmsg = CMSG_FIRSTHDR(msgh);
bellard5a4a8982007-11-11 17:39:18 +00001391 abi_long msg_controllen;
1392 abi_ulong target_cmsg_addr;
Jonathan Neuschäferee104582015-09-03 07:27:26 +02001393 struct target_cmsghdr *target_cmsg, *target_cmsg_start;
bellard7854b052003-03-29 17:22:23 +00001394 socklen_t space = 0;
bellard5a4a8982007-11-11 17:39:18 +00001395
Matthias Brauncbb21ee2011-08-12 19:57:41 +02001396 msg_controllen = tswapal(target_msgh->msg_controllen);
bellard5a4a8982007-11-11 17:39:18 +00001397 if (msg_controllen < sizeof (struct target_cmsghdr))
1398 goto the_end;
Matthias Brauncbb21ee2011-08-12 19:57:41 +02001399 target_cmsg_addr = tswapal(target_msgh->msg_control);
bellard5a4a8982007-11-11 17:39:18 +00001400 target_cmsg = lock_user(VERIFY_READ, target_cmsg_addr, msg_controllen, 1);
Jonathan Neuschäferee104582015-09-03 07:27:26 +02001401 target_cmsg_start = target_cmsg;
bellard5a4a8982007-11-11 17:39:18 +00001402 if (!target_cmsg)
1403 return -TARGET_EFAULT;
bellard7854b052003-03-29 17:22:23 +00001404
1405 while (cmsg && target_cmsg) {
1406 void *data = CMSG_DATA(cmsg);
1407 void *target_data = TARGET_CMSG_DATA(target_cmsg);
1408
Matthias Brauncbb21ee2011-08-12 19:57:41 +02001409 int len = tswapal(target_cmsg->cmsg_len)
bellard7854b052003-03-29 17:22:23 +00001410 - TARGET_CMSG_ALIGN(sizeof (struct target_cmsghdr));
1411
1412 space += CMSG_SPACE(len);
1413 if (space > msgh->msg_controllen) {
1414 space -= CMSG_SPACE(len);
Peter Maydellc2aeb252015-05-26 19:46:31 +01001415 /* This is a QEMU bug, since we allocated the payload
1416 * area ourselves (unlike overflow in host-to-target
1417 * conversion, which is just the guest giving us a buffer
1418 * that's too small). It can't happen for the payload types
1419 * we currently support; if it becomes an issue in future
1420 * we would need to improve our allocation strategy to
1421 * something more intelligent than "twice the size of the
1422 * target buffer we're reading from".
1423 */
bellard31febb72005-12-18 20:03:27 +00001424 gemu_log("Host cmsg overflow\n");
bellard7854b052003-03-29 17:22:23 +00001425 break;
1426 }
1427
Petar Jovanovicdbf4f792013-09-13 19:27:29 +02001428 if (tswap32(target_cmsg->cmsg_level) == TARGET_SOL_SOCKET) {
1429 cmsg->cmsg_level = SOL_SOCKET;
1430 } else {
1431 cmsg->cmsg_level = tswap32(target_cmsg->cmsg_level);
1432 }
bellard7854b052003-03-29 17:22:23 +00001433 cmsg->cmsg_type = tswap32(target_cmsg->cmsg_type);
1434 cmsg->cmsg_len = CMSG_LEN(len);
1435
Alex Suykov30b8b682014-12-23 07:52:58 +02001436 if (cmsg->cmsg_level == SOL_SOCKET && cmsg->cmsg_type == SCM_RIGHTS) {
bellard7854b052003-03-29 17:22:23 +00001437 int *fd = (int *)data;
1438 int *target_fd = (int *)target_data;
1439 int i, numfds = len / sizeof(int);
1440
Peter Maydell876e23c2015-05-26 19:46:32 +01001441 for (i = 0; i < numfds; i++) {
1442 __get_user(fd[i], target_fd + i);
1443 }
Alex Suykov30b8b682014-12-23 07:52:58 +02001444 } else if (cmsg->cmsg_level == SOL_SOCKET
1445 && cmsg->cmsg_type == SCM_CREDENTIALS) {
1446 struct ucred *cred = (struct ucred *)data;
1447 struct target_ucred *target_cred =
1448 (struct target_ucred *)target_data;
1449
Peter Maydell876e23c2015-05-26 19:46:32 +01001450 __get_user(cred->pid, &target_cred->pid);
1451 __get_user(cred->uid, &target_cred->uid);
1452 __get_user(cred->gid, &target_cred->gid);
Alex Suykov30b8b682014-12-23 07:52:58 +02001453 } else {
1454 gemu_log("Unsupported ancillary data: %d/%d\n",
1455 cmsg->cmsg_level, cmsg->cmsg_type);
1456 memcpy(data, target_data, len);
bellard7854b052003-03-29 17:22:23 +00001457 }
1458
1459 cmsg = CMSG_NXTHDR(msgh, cmsg);
Jonathan Neuschäferee104582015-09-03 07:27:26 +02001460 target_cmsg = TARGET_CMSG_NXTHDR(target_msgh, target_cmsg,
1461 target_cmsg_start);
bellard7854b052003-03-29 17:22:23 +00001462 }
bellard5a4a8982007-11-11 17:39:18 +00001463 unlock_user(target_cmsg, target_cmsg_addr, 0);
1464 the_end:
bellard7854b052003-03-29 17:22:23 +00001465 msgh->msg_controllen = space;
bellard5a4a8982007-11-11 17:39:18 +00001466 return 0;
bellard7854b052003-03-29 17:22:23 +00001467}
1468
bellard5a4a8982007-11-11 17:39:18 +00001469static inline abi_long host_to_target_cmsg(struct target_msghdr *target_msgh,
1470 struct msghdr *msgh)
bellard7854b052003-03-29 17:22:23 +00001471{
1472 struct cmsghdr *cmsg = CMSG_FIRSTHDR(msgh);
bellard5a4a8982007-11-11 17:39:18 +00001473 abi_long msg_controllen;
1474 abi_ulong target_cmsg_addr;
Jonathan Neuschäferee104582015-09-03 07:27:26 +02001475 struct target_cmsghdr *target_cmsg, *target_cmsg_start;
bellard7854b052003-03-29 17:22:23 +00001476 socklen_t space = 0;
1477
Matthias Brauncbb21ee2011-08-12 19:57:41 +02001478 msg_controllen = tswapal(target_msgh->msg_controllen);
bellard5a4a8982007-11-11 17:39:18 +00001479 if (msg_controllen < sizeof (struct target_cmsghdr))
1480 goto the_end;
Matthias Brauncbb21ee2011-08-12 19:57:41 +02001481 target_cmsg_addr = tswapal(target_msgh->msg_control);
bellard5a4a8982007-11-11 17:39:18 +00001482 target_cmsg = lock_user(VERIFY_WRITE, target_cmsg_addr, msg_controllen, 0);
Jonathan Neuschäferee104582015-09-03 07:27:26 +02001483 target_cmsg_start = target_cmsg;
bellard5a4a8982007-11-11 17:39:18 +00001484 if (!target_cmsg)
1485 return -TARGET_EFAULT;
1486
bellard7854b052003-03-29 17:22:23 +00001487 while (cmsg && target_cmsg) {
1488 void *data = CMSG_DATA(cmsg);
1489 void *target_data = TARGET_CMSG_DATA(target_cmsg);
1490
1491 int len = cmsg->cmsg_len - CMSG_ALIGN(sizeof (struct cmsghdr));
Peter Maydellc2aeb252015-05-26 19:46:31 +01001492 int tgt_len, tgt_space;
bellard7854b052003-03-29 17:22:23 +00001493
Peter Maydellc2aeb252015-05-26 19:46:31 +01001494 /* We never copy a half-header but may copy half-data;
1495 * this is Linux's behaviour in put_cmsg(). Note that
1496 * truncation here is a guest problem (which we report
1497 * to the guest via the CTRUNC bit), unlike truncation
1498 * in target_to_host_cmsg, which is a QEMU bug.
1499 */
1500 if (msg_controllen < sizeof(struct cmsghdr)) {
1501 target_msgh->msg_flags |= tswap32(MSG_CTRUNC);
bellard7854b052003-03-29 17:22:23 +00001502 break;
1503 }
1504
Petar Jovanovicdbf4f792013-09-13 19:27:29 +02001505 if (cmsg->cmsg_level == SOL_SOCKET) {
1506 target_cmsg->cmsg_level = tswap32(TARGET_SOL_SOCKET);
1507 } else {
1508 target_cmsg->cmsg_level = tswap32(cmsg->cmsg_level);
1509 }
bellard7854b052003-03-29 17:22:23 +00001510 target_cmsg->cmsg_type = tswap32(cmsg->cmsg_type);
bellard7854b052003-03-29 17:22:23 +00001511
Peter Maydellc2aeb252015-05-26 19:46:31 +01001512 tgt_len = TARGET_CMSG_LEN(len);
1513
1514 /* Payload types which need a different size of payload on
1515 * the target must adjust tgt_len here.
1516 */
1517 switch (cmsg->cmsg_level) {
1518 case SOL_SOCKET:
1519 switch (cmsg->cmsg_type) {
1520 case SO_TIMESTAMP:
1521 tgt_len = sizeof(struct target_timeval);
1522 break;
1523 default:
1524 break;
1525 }
1526 default:
1527 break;
1528 }
1529
1530 if (msg_controllen < tgt_len) {
1531 target_msgh->msg_flags |= tswap32(MSG_CTRUNC);
1532 tgt_len = msg_controllen;
1533 }
1534
1535 /* We must now copy-and-convert len bytes of payload
1536 * into tgt_len bytes of destination space. Bear in mind
1537 * that in both source and destination we may be dealing
1538 * with a truncated value!
1539 */
Huw Davies52b65492014-04-17 14:02:47 +01001540 switch (cmsg->cmsg_level) {
1541 case SOL_SOCKET:
1542 switch (cmsg->cmsg_type) {
1543 case SCM_RIGHTS:
1544 {
1545 int *fd = (int *)data;
1546 int *target_fd = (int *)target_data;
Peter Maydellc2aeb252015-05-26 19:46:31 +01001547 int i, numfds = tgt_len / sizeof(int);
bellard7854b052003-03-29 17:22:23 +00001548
Peter Maydell876e23c2015-05-26 19:46:32 +01001549 for (i = 0; i < numfds; i++) {
1550 __put_user(fd[i], target_fd + i);
1551 }
Huw Davies52b65492014-04-17 14:02:47 +01001552 break;
1553 }
1554 case SO_TIMESTAMP:
1555 {
1556 struct timeval *tv = (struct timeval *)data;
1557 struct target_timeval *target_tv =
1558 (struct target_timeval *)target_data;
Jing Huangaebf5bc2012-07-24 14:01:42 +00001559
Peter Maydellc2aeb252015-05-26 19:46:31 +01001560 if (len != sizeof(struct timeval) ||
1561 tgt_len != sizeof(struct target_timeval)) {
Huw Davies52b65492014-04-17 14:02:47 +01001562 goto unimplemented;
Peter Maydellc2aeb252015-05-26 19:46:31 +01001563 }
Huw Davies52b65492014-04-17 14:02:47 +01001564
1565 /* copy struct timeval to target */
Peter Maydell876e23c2015-05-26 19:46:32 +01001566 __put_user(tv->tv_sec, &target_tv->tv_sec);
1567 __put_user(tv->tv_usec, &target_tv->tv_usec);
Huw Davies52b65492014-04-17 14:02:47 +01001568 break;
1569 }
Huw Davies4bc29752014-04-17 14:02:48 +01001570 case SCM_CREDENTIALS:
1571 {
1572 struct ucred *cred = (struct ucred *)data;
1573 struct target_ucred *target_cred =
1574 (struct target_ucred *)target_data;
1575
1576 __put_user(cred->pid, &target_cred->pid);
1577 __put_user(cred->uid, &target_cred->uid);
1578 __put_user(cred->gid, &target_cred->gid);
1579 break;
1580 }
Huw Davies52b65492014-04-17 14:02:47 +01001581 default:
1582 goto unimplemented;
1583 }
1584 break;
1585
1586 default:
1587 unimplemented:
Jing Huangaebf5bc2012-07-24 14:01:42 +00001588 gemu_log("Unsupported ancillary data: %d/%d\n",
1589 cmsg->cmsg_level, cmsg->cmsg_type);
Peter Maydellc2aeb252015-05-26 19:46:31 +01001590 memcpy(target_data, data, MIN(len, tgt_len));
1591 if (tgt_len > len) {
1592 memset(target_data + len, 0, tgt_len - len);
1593 }
bellard7854b052003-03-29 17:22:23 +00001594 }
1595
Peter Maydellc2aeb252015-05-26 19:46:31 +01001596 target_cmsg->cmsg_len = tswapal(tgt_len);
Jonathan Neuschäferee104582015-09-03 07:27:26 +02001597 tgt_space = TARGET_CMSG_SPACE(len);
Peter Maydellc2aeb252015-05-26 19:46:31 +01001598 if (msg_controllen < tgt_space) {
1599 tgt_space = msg_controllen;
1600 }
1601 msg_controllen -= tgt_space;
1602 space += tgt_space;
bellard7854b052003-03-29 17:22:23 +00001603 cmsg = CMSG_NXTHDR(msgh, cmsg);
Jonathan Neuschäferee104582015-09-03 07:27:26 +02001604 target_cmsg = TARGET_CMSG_NXTHDR(target_msgh, target_cmsg,
1605 target_cmsg_start);
bellard7854b052003-03-29 17:22:23 +00001606 }
bellard5a4a8982007-11-11 17:39:18 +00001607 unlock_user(target_cmsg, target_cmsg_addr, space);
1608 the_end:
Matthias Brauncbb21ee2011-08-12 19:57:41 +02001609 target_msgh->msg_controllen = tswapal(space);
bellard5a4a8982007-11-11 17:39:18 +00001610 return 0;
bellard7854b052003-03-29 17:22:23 +00001611}
1612
Laurent Vivier6c5b5642016-05-22 18:56:19 +02001613static void tswap_nlmsghdr(struct nlmsghdr *nlh)
1614{
1615 nlh->nlmsg_len = tswap32(nlh->nlmsg_len);
1616 nlh->nlmsg_type = tswap16(nlh->nlmsg_type);
1617 nlh->nlmsg_flags = tswap16(nlh->nlmsg_flags);
1618 nlh->nlmsg_seq = tswap32(nlh->nlmsg_seq);
1619 nlh->nlmsg_pid = tswap32(nlh->nlmsg_pid);
1620}
1621
1622static abi_long host_to_target_for_each_nlmsg(struct nlmsghdr *nlh,
1623 size_t len,
1624 abi_long (*host_to_target_nlmsg)
1625 (struct nlmsghdr *))
1626{
1627 uint32_t nlmsg_len;
1628 abi_long ret;
1629
1630 while (len > sizeof(struct nlmsghdr)) {
1631
1632 nlmsg_len = nlh->nlmsg_len;
1633 if (nlmsg_len < sizeof(struct nlmsghdr) ||
1634 nlmsg_len > len) {
1635 break;
1636 }
1637
1638 switch (nlh->nlmsg_type) {
1639 case NLMSG_DONE:
1640 tswap_nlmsghdr(nlh);
1641 return 0;
1642 case NLMSG_NOOP:
1643 break;
1644 case NLMSG_ERROR:
1645 {
1646 struct nlmsgerr *e = NLMSG_DATA(nlh);
1647 e->error = tswap32(e->error);
1648 tswap_nlmsghdr(&e->msg);
1649 tswap_nlmsghdr(nlh);
1650 return 0;
1651 }
1652 default:
1653 ret = host_to_target_nlmsg(nlh);
1654 if (ret < 0) {
1655 tswap_nlmsghdr(nlh);
1656 return ret;
1657 }
1658 break;
1659 }
1660 tswap_nlmsghdr(nlh);
1661 len -= NLMSG_ALIGN(nlmsg_len);
1662 nlh = (struct nlmsghdr *)(((char*)nlh) + NLMSG_ALIGN(nlmsg_len));
1663 }
1664 return 0;
1665}
1666
1667static abi_long target_to_host_for_each_nlmsg(struct nlmsghdr *nlh,
1668 size_t len,
1669 abi_long (*target_to_host_nlmsg)
1670 (struct nlmsghdr *))
1671{
1672 int ret;
1673
1674 while (len > sizeof(struct nlmsghdr)) {
1675 if (tswap32(nlh->nlmsg_len) < sizeof(struct nlmsghdr) ||
1676 tswap32(nlh->nlmsg_len) > len) {
1677 break;
1678 }
1679 tswap_nlmsghdr(nlh);
1680 switch (nlh->nlmsg_type) {
1681 case NLMSG_DONE:
1682 return 0;
1683 case NLMSG_NOOP:
1684 break;
1685 case NLMSG_ERROR:
1686 {
1687 struct nlmsgerr *e = NLMSG_DATA(nlh);
1688 e->error = tswap32(e->error);
1689 tswap_nlmsghdr(&e->msg);
1690 }
1691 default:
1692 ret = target_to_host_nlmsg(nlh);
1693 if (ret < 0) {
1694 return ret;
1695 }
1696 }
1697 len -= NLMSG_ALIGN(nlh->nlmsg_len);
1698 nlh = (struct nlmsghdr *)(((char *)nlh) + NLMSG_ALIGN(nlh->nlmsg_len));
1699 }
1700 return 0;
1701}
1702
Laurent Vivier575b22b2016-06-02 22:14:15 +02001703#ifdef CONFIG_RTNETLINK
Laurent Vivier6c5b5642016-05-22 18:56:19 +02001704static abi_long host_to_target_for_each_rtattr(struct rtattr *rtattr,
1705 size_t len,
1706 abi_long (*host_to_target_rtattr)
1707 (struct rtattr *))
1708{
1709 unsigned short rta_len;
1710 abi_long ret;
1711
1712 while (len > sizeof(struct rtattr)) {
1713 rta_len = rtattr->rta_len;
1714 if (rta_len < sizeof(struct rtattr) ||
1715 rta_len > len) {
1716 break;
1717 }
1718 ret = host_to_target_rtattr(rtattr);
1719 rtattr->rta_len = tswap16(rtattr->rta_len);
1720 rtattr->rta_type = tswap16(rtattr->rta_type);
1721 if (ret < 0) {
1722 return ret;
1723 }
1724 len -= RTA_ALIGN(rta_len);
1725 rtattr = (struct rtattr *)(((char *)rtattr) + RTA_ALIGN(rta_len));
1726 }
1727 return 0;
1728}
1729
1730static abi_long host_to_target_data_link_rtattr(struct rtattr *rtattr)
1731{
1732 uint32_t *u32;
1733 struct rtnl_link_stats *st;
1734 struct rtnl_link_stats64 *st64;
1735 struct rtnl_link_ifmap *map;
1736
1737 switch (rtattr->rta_type) {
1738 /* binary stream */
1739 case IFLA_ADDRESS:
1740 case IFLA_BROADCAST:
1741 /* string */
1742 case IFLA_IFNAME:
1743 case IFLA_QDISC:
1744 break;
1745 /* uin8_t */
1746 case IFLA_OPERSTATE:
1747 case IFLA_LINKMODE:
1748 case IFLA_CARRIER:
1749 case IFLA_PROTO_DOWN:
1750 break;
1751 /* uint32_t */
1752 case IFLA_MTU:
1753 case IFLA_LINK:
1754 case IFLA_WEIGHT:
1755 case IFLA_TXQLEN:
1756 case IFLA_CARRIER_CHANGES:
1757 case IFLA_NUM_RX_QUEUES:
1758 case IFLA_NUM_TX_QUEUES:
1759 case IFLA_PROMISCUITY:
1760 case IFLA_EXT_MASK:
1761 case IFLA_LINK_NETNSID:
1762 case IFLA_GROUP:
1763 case IFLA_MASTER:
1764 case IFLA_NUM_VF:
1765 u32 = RTA_DATA(rtattr);
1766 *u32 = tswap32(*u32);
1767 break;
1768 /* struct rtnl_link_stats */
1769 case IFLA_STATS:
1770 st = RTA_DATA(rtattr);
1771 st->rx_packets = tswap32(st->rx_packets);
1772 st->tx_packets = tswap32(st->tx_packets);
1773 st->rx_bytes = tswap32(st->rx_bytes);
1774 st->tx_bytes = tswap32(st->tx_bytes);
1775 st->rx_errors = tswap32(st->rx_errors);
1776 st->tx_errors = tswap32(st->tx_errors);
1777 st->rx_dropped = tswap32(st->rx_dropped);
1778 st->tx_dropped = tswap32(st->tx_dropped);
1779 st->multicast = tswap32(st->multicast);
1780 st->collisions = tswap32(st->collisions);
1781
1782 /* detailed rx_errors: */
1783 st->rx_length_errors = tswap32(st->rx_length_errors);
1784 st->rx_over_errors = tswap32(st->rx_over_errors);
1785 st->rx_crc_errors = tswap32(st->rx_crc_errors);
1786 st->rx_frame_errors = tswap32(st->rx_frame_errors);
1787 st->rx_fifo_errors = tswap32(st->rx_fifo_errors);
1788 st->rx_missed_errors = tswap32(st->rx_missed_errors);
1789
1790 /* detailed tx_errors */
1791 st->tx_aborted_errors = tswap32(st->tx_aborted_errors);
1792 st->tx_carrier_errors = tswap32(st->tx_carrier_errors);
1793 st->tx_fifo_errors = tswap32(st->tx_fifo_errors);
1794 st->tx_heartbeat_errors = tswap32(st->tx_heartbeat_errors);
1795 st->tx_window_errors = tswap32(st->tx_window_errors);
1796
1797 /* for cslip etc */
1798 st->rx_compressed = tswap32(st->rx_compressed);
1799 st->tx_compressed = tswap32(st->tx_compressed);
1800 break;
1801 /* struct rtnl_link_stats64 */
1802 case IFLA_STATS64:
1803 st64 = RTA_DATA(rtattr);
1804 st64->rx_packets = tswap64(st64->rx_packets);
1805 st64->tx_packets = tswap64(st64->tx_packets);
1806 st64->rx_bytes = tswap64(st64->rx_bytes);
1807 st64->tx_bytes = tswap64(st64->tx_bytes);
1808 st64->rx_errors = tswap64(st64->rx_errors);
1809 st64->tx_errors = tswap64(st64->tx_errors);
1810 st64->rx_dropped = tswap64(st64->rx_dropped);
1811 st64->tx_dropped = tswap64(st64->tx_dropped);
1812 st64->multicast = tswap64(st64->multicast);
1813 st64->collisions = tswap64(st64->collisions);
1814
1815 /* detailed rx_errors: */
1816 st64->rx_length_errors = tswap64(st64->rx_length_errors);
1817 st64->rx_over_errors = tswap64(st64->rx_over_errors);
1818 st64->rx_crc_errors = tswap64(st64->rx_crc_errors);
1819 st64->rx_frame_errors = tswap64(st64->rx_frame_errors);
1820 st64->rx_fifo_errors = tswap64(st64->rx_fifo_errors);
1821 st64->rx_missed_errors = tswap64(st64->rx_missed_errors);
1822
1823 /* detailed tx_errors */
1824 st64->tx_aborted_errors = tswap64(st64->tx_aborted_errors);
1825 st64->tx_carrier_errors = tswap64(st64->tx_carrier_errors);
1826 st64->tx_fifo_errors = tswap64(st64->tx_fifo_errors);
1827 st64->tx_heartbeat_errors = tswap64(st64->tx_heartbeat_errors);
1828 st64->tx_window_errors = tswap64(st64->tx_window_errors);
1829
1830 /* for cslip etc */
1831 st64->rx_compressed = tswap64(st64->rx_compressed);
1832 st64->tx_compressed = tswap64(st64->tx_compressed);
1833 break;
1834 /* struct rtnl_link_ifmap */
1835 case IFLA_MAP:
1836 map = RTA_DATA(rtattr);
1837 map->mem_start = tswap64(map->mem_start);
1838 map->mem_end = tswap64(map->mem_end);
1839 map->base_addr = tswap64(map->base_addr);
1840 map->irq = tswap16(map->irq);
1841 break;
1842 /* nested */
1843 case IFLA_AF_SPEC:
1844 case IFLA_LINKINFO:
1845 /* FIXME: implement nested type */
1846 gemu_log("Unimplemented nested type %d\n", rtattr->rta_type);
1847 break;
1848 default:
1849 gemu_log("Unknown host IFLA type: %d\n", rtattr->rta_type);
1850 break;
1851 }
1852 return 0;
1853}
1854
1855static abi_long host_to_target_data_addr_rtattr(struct rtattr *rtattr)
1856{
1857 uint32_t *u32;
1858 struct ifa_cacheinfo *ci;
1859
1860 switch (rtattr->rta_type) {
1861 /* binary: depends on family type */
1862 case IFA_ADDRESS:
1863 case IFA_LOCAL:
1864 break;
1865 /* string */
1866 case IFA_LABEL:
1867 break;
1868 /* u32 */
1869 case IFA_FLAGS:
1870 case IFA_BROADCAST:
1871 u32 = RTA_DATA(rtattr);
1872 *u32 = tswap32(*u32);
1873 break;
1874 /* struct ifa_cacheinfo */
1875 case IFA_CACHEINFO:
1876 ci = RTA_DATA(rtattr);
1877 ci->ifa_prefered = tswap32(ci->ifa_prefered);
1878 ci->ifa_valid = tswap32(ci->ifa_valid);
1879 ci->cstamp = tswap32(ci->cstamp);
1880 ci->tstamp = tswap32(ci->tstamp);
1881 break;
1882 default:
1883 gemu_log("Unknown host IFA type: %d\n", rtattr->rta_type);
1884 break;
1885 }
1886 return 0;
1887}
1888
1889static abi_long host_to_target_data_route_rtattr(struct rtattr *rtattr)
1890{
1891 uint32_t *u32;
1892 switch (rtattr->rta_type) {
1893 /* binary: depends on family type */
1894 case RTA_GATEWAY:
1895 case RTA_DST:
1896 case RTA_PREFSRC:
1897 break;
1898 /* u32 */
1899 case RTA_PRIORITY:
1900 case RTA_TABLE:
1901 case RTA_OIF:
1902 u32 = RTA_DATA(rtattr);
1903 *u32 = tswap32(*u32);
1904 break;
1905 default:
1906 gemu_log("Unknown host RTA type: %d\n", rtattr->rta_type);
1907 break;
1908 }
1909 return 0;
1910}
1911
1912static abi_long host_to_target_link_rtattr(struct rtattr *rtattr,
1913 uint32_t rtattr_len)
1914{
1915 return host_to_target_for_each_rtattr(rtattr, rtattr_len,
1916 host_to_target_data_link_rtattr);
1917}
1918
1919static abi_long host_to_target_addr_rtattr(struct rtattr *rtattr,
1920 uint32_t rtattr_len)
1921{
1922 return host_to_target_for_each_rtattr(rtattr, rtattr_len,
1923 host_to_target_data_addr_rtattr);
1924}
1925
1926static abi_long host_to_target_route_rtattr(struct rtattr *rtattr,
1927 uint32_t rtattr_len)
1928{
1929 return host_to_target_for_each_rtattr(rtattr, rtattr_len,
1930 host_to_target_data_route_rtattr);
1931}
1932
1933static abi_long host_to_target_data_route(struct nlmsghdr *nlh)
1934{
1935 uint32_t nlmsg_len;
1936 struct ifinfomsg *ifi;
1937 struct ifaddrmsg *ifa;
1938 struct rtmsg *rtm;
1939
1940 nlmsg_len = nlh->nlmsg_len;
1941 switch (nlh->nlmsg_type) {
1942 case RTM_NEWLINK:
1943 case RTM_DELLINK:
1944 case RTM_GETLINK:
1945 ifi = NLMSG_DATA(nlh);
1946 ifi->ifi_type = tswap16(ifi->ifi_type);
1947 ifi->ifi_index = tswap32(ifi->ifi_index);
1948 ifi->ifi_flags = tswap32(ifi->ifi_flags);
1949 ifi->ifi_change = tswap32(ifi->ifi_change);
1950 host_to_target_link_rtattr(IFLA_RTA(ifi),
1951 nlmsg_len - NLMSG_LENGTH(sizeof(*ifi)));
1952 break;
1953 case RTM_NEWADDR:
1954 case RTM_DELADDR:
1955 case RTM_GETADDR:
1956 ifa = NLMSG_DATA(nlh);
1957 ifa->ifa_index = tswap32(ifa->ifa_index);
1958 host_to_target_addr_rtattr(IFA_RTA(ifa),
1959 nlmsg_len - NLMSG_LENGTH(sizeof(*ifa)));
1960 break;
1961 case RTM_NEWROUTE:
1962 case RTM_DELROUTE:
1963 case RTM_GETROUTE:
1964 rtm = NLMSG_DATA(nlh);
1965 rtm->rtm_flags = tswap32(rtm->rtm_flags);
1966 host_to_target_route_rtattr(RTM_RTA(rtm),
1967 nlmsg_len - NLMSG_LENGTH(sizeof(*rtm)));
1968 break;
1969 default:
1970 return -TARGET_EINVAL;
1971 }
1972 return 0;
1973}
1974
1975static inline abi_long host_to_target_nlmsg_route(struct nlmsghdr *nlh,
1976 size_t len)
1977{
1978 return host_to_target_for_each_nlmsg(nlh, len, host_to_target_data_route);
1979}
1980
1981static abi_long target_to_host_for_each_rtattr(struct rtattr *rtattr,
1982 size_t len,
1983 abi_long (*target_to_host_rtattr)
1984 (struct rtattr *))
1985{
1986 abi_long ret;
1987
1988 while (len >= sizeof(struct rtattr)) {
1989 if (tswap16(rtattr->rta_len) < sizeof(struct rtattr) ||
1990 tswap16(rtattr->rta_len) > len) {
1991 break;
1992 }
1993 rtattr->rta_len = tswap16(rtattr->rta_len);
1994 rtattr->rta_type = tswap16(rtattr->rta_type);
1995 ret = target_to_host_rtattr(rtattr);
1996 if (ret < 0) {
1997 return ret;
1998 }
1999 len -= RTA_ALIGN(rtattr->rta_len);
2000 rtattr = (struct rtattr *)(((char *)rtattr) +
2001 RTA_ALIGN(rtattr->rta_len));
2002 }
2003 return 0;
2004}
2005
2006static abi_long target_to_host_data_link_rtattr(struct rtattr *rtattr)
2007{
2008 switch (rtattr->rta_type) {
2009 default:
2010 gemu_log("Unknown target IFLA type: %d\n", rtattr->rta_type);
2011 break;
2012 }
2013 return 0;
2014}
2015
2016static abi_long target_to_host_data_addr_rtattr(struct rtattr *rtattr)
2017{
2018 switch (rtattr->rta_type) {
2019 /* binary: depends on family type */
2020 case IFA_LOCAL:
2021 case IFA_ADDRESS:
2022 break;
2023 default:
2024 gemu_log("Unknown target IFA type: %d\n", rtattr->rta_type);
2025 break;
2026 }
2027 return 0;
2028}
2029
2030static abi_long target_to_host_data_route_rtattr(struct rtattr *rtattr)
2031{
2032 uint32_t *u32;
2033 switch (rtattr->rta_type) {
2034 /* binary: depends on family type */
2035 case RTA_DST:
2036 case RTA_SRC:
2037 case RTA_GATEWAY:
2038 break;
2039 /* u32 */
2040 case RTA_OIF:
2041 u32 = RTA_DATA(rtattr);
2042 *u32 = tswap32(*u32);
2043 break;
2044 default:
2045 gemu_log("Unknown target RTA type: %d\n", rtattr->rta_type);
2046 break;
2047 }
2048 return 0;
2049}
2050
2051static void target_to_host_link_rtattr(struct rtattr *rtattr,
2052 uint32_t rtattr_len)
2053{
2054 target_to_host_for_each_rtattr(rtattr, rtattr_len,
2055 target_to_host_data_link_rtattr);
2056}
2057
2058static void target_to_host_addr_rtattr(struct rtattr *rtattr,
2059 uint32_t rtattr_len)
2060{
2061 target_to_host_for_each_rtattr(rtattr, rtattr_len,
2062 target_to_host_data_addr_rtattr);
2063}
2064
2065static void target_to_host_route_rtattr(struct rtattr *rtattr,
2066 uint32_t rtattr_len)
2067{
2068 target_to_host_for_each_rtattr(rtattr, rtattr_len,
2069 target_to_host_data_route_rtattr);
2070}
2071
2072static abi_long target_to_host_data_route(struct nlmsghdr *nlh)
2073{
2074 struct ifinfomsg *ifi;
2075 struct ifaddrmsg *ifa;
2076 struct rtmsg *rtm;
2077
2078 switch (nlh->nlmsg_type) {
2079 case RTM_GETLINK:
2080 break;
2081 case RTM_NEWLINK:
2082 case RTM_DELLINK:
2083 ifi = NLMSG_DATA(nlh);
2084 ifi->ifi_type = tswap16(ifi->ifi_type);
2085 ifi->ifi_index = tswap32(ifi->ifi_index);
2086 ifi->ifi_flags = tswap32(ifi->ifi_flags);
2087 ifi->ifi_change = tswap32(ifi->ifi_change);
2088 target_to_host_link_rtattr(IFLA_RTA(ifi), nlh->nlmsg_len -
2089 NLMSG_LENGTH(sizeof(*ifi)));
2090 break;
2091 case RTM_GETADDR:
2092 case RTM_NEWADDR:
2093 case RTM_DELADDR:
2094 ifa = NLMSG_DATA(nlh);
2095 ifa->ifa_index = tswap32(ifa->ifa_index);
2096 target_to_host_addr_rtattr(IFA_RTA(ifa), nlh->nlmsg_len -
2097 NLMSG_LENGTH(sizeof(*ifa)));
2098 break;
2099 case RTM_GETROUTE:
2100 break;
2101 case RTM_NEWROUTE:
2102 case RTM_DELROUTE:
2103 rtm = NLMSG_DATA(nlh);
2104 rtm->rtm_flags = tswap32(rtm->rtm_flags);
2105 target_to_host_route_rtattr(RTM_RTA(rtm), nlh->nlmsg_len -
2106 NLMSG_LENGTH(sizeof(*rtm)));
2107 break;
2108 default:
2109 return -TARGET_EOPNOTSUPP;
2110 }
2111 return 0;
2112}
2113
2114static abi_long target_to_host_nlmsg_route(struct nlmsghdr *nlh, size_t len)
2115{
2116 return target_to_host_for_each_nlmsg(nlh, len, target_to_host_data_route);
2117}
Laurent Vivier575b22b2016-06-02 22:14:15 +02002118#endif /* CONFIG_RTNETLINK */
Laurent Vivier6c5b5642016-05-22 18:56:19 +02002119
Laurent Vivier5ce9bb52016-05-22 18:56:21 +02002120static abi_long host_to_target_data_audit(struct nlmsghdr *nlh)
2121{
2122 switch (nlh->nlmsg_type) {
2123 default:
2124 gemu_log("Unknown host audit message type %d\n",
2125 nlh->nlmsg_type);
2126 return -TARGET_EINVAL;
2127 }
2128 return 0;
2129}
2130
2131static inline abi_long host_to_target_nlmsg_audit(struct nlmsghdr *nlh,
2132 size_t len)
2133{
2134 return host_to_target_for_each_nlmsg(nlh, len, host_to_target_data_audit);
2135}
2136
2137static abi_long target_to_host_data_audit(struct nlmsghdr *nlh)
2138{
2139 switch (nlh->nlmsg_type) {
2140 case AUDIT_USER:
2141 case AUDIT_FIRST_USER_MSG ... AUDIT_LAST_USER_MSG:
2142 case AUDIT_FIRST_USER_MSG2 ... AUDIT_LAST_USER_MSG2:
2143 break;
2144 default:
2145 gemu_log("Unknown target audit message type %d\n",
2146 nlh->nlmsg_type);
2147 return -TARGET_EINVAL;
2148 }
2149
2150 return 0;
2151}
2152
2153static abi_long target_to_host_nlmsg_audit(struct nlmsghdr *nlh, size_t len)
2154{
2155 return target_to_host_for_each_nlmsg(nlh, len, target_to_host_data_audit);
2156}
2157
ths0da46a62007-10-20 20:23:07 +00002158/* do_setsockopt() Must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +00002159static abi_long do_setsockopt(int sockfd, int level, int optname,
bellard2f619692007-11-16 10:46:05 +00002160 abi_ulong optval_addr, socklen_t optlen)
bellard7854b052003-03-29 17:22:23 +00002161{
blueswir1992f48a2007-10-14 16:27:31 +00002162 abi_long ret;
j_mayer32407102007-09-26 23:01:49 +00002163 int val;
Lionel Landwerlinb975b832009-04-25 23:30:19 +02002164 struct ip_mreqn *ip_mreq;
Lionel Landwerlin6e3cb582009-04-25 23:31:18 +02002165 struct ip_mreq_source *ip_mreq_source;
ths3b46e622007-09-17 08:09:54 +00002166
bellard8853f862004-02-22 14:57:26 +00002167 switch(level) {
2168 case SOL_TCP:
bellard7854b052003-03-29 17:22:23 +00002169 /* TCP options all take an 'int' value. */
bellard7854b052003-03-29 17:22:23 +00002170 if (optlen < sizeof(uint32_t))
ths0da46a62007-10-20 20:23:07 +00002171 return -TARGET_EINVAL;
ths3b46e622007-09-17 08:09:54 +00002172
bellard2f619692007-11-16 10:46:05 +00002173 if (get_user_u32(val, optval_addr))
2174 return -TARGET_EFAULT;
bellard8853f862004-02-22 14:57:26 +00002175 ret = get_errno(setsockopt(sockfd, level, optname, &val, sizeof(val)));
2176 break;
2177 case SOL_IP:
2178 switch(optname) {
bellard2efbe912005-07-23 15:10:20 +00002179 case IP_TOS:
2180 case IP_TTL:
bellard8853f862004-02-22 14:57:26 +00002181 case IP_HDRINCL:
bellard2efbe912005-07-23 15:10:20 +00002182 case IP_ROUTER_ALERT:
2183 case IP_RECVOPTS:
2184 case IP_RETOPTS:
2185 case IP_PKTINFO:
2186 case IP_MTU_DISCOVER:
2187 case IP_RECVERR:
2188 case IP_RECVTOS:
2189#ifdef IP_FREEBIND
2190 case IP_FREEBIND:
2191#endif
2192 case IP_MULTICAST_TTL:
2193 case IP_MULTICAST_LOOP:
bellard8853f862004-02-22 14:57:26 +00002194 val = 0;
2195 if (optlen >= sizeof(uint32_t)) {
bellard2f619692007-11-16 10:46:05 +00002196 if (get_user_u32(val, optval_addr))
2197 return -TARGET_EFAULT;
bellard8853f862004-02-22 14:57:26 +00002198 } else if (optlen >= 1) {
bellard2f619692007-11-16 10:46:05 +00002199 if (get_user_u8(val, optval_addr))
2200 return -TARGET_EFAULT;
bellard8853f862004-02-22 14:57:26 +00002201 }
2202 ret = get_errno(setsockopt(sockfd, level, optname, &val, sizeof(val)));
2203 break;
Lionel Landwerlinb975b832009-04-25 23:30:19 +02002204 case IP_ADD_MEMBERSHIP:
2205 case IP_DROP_MEMBERSHIP:
2206 if (optlen < sizeof (struct target_ip_mreq) ||
2207 optlen > sizeof (struct target_ip_mreqn))
2208 return -TARGET_EINVAL;
2209
2210 ip_mreq = (struct ip_mreqn *) alloca(optlen);
2211 target_to_host_ip_mreq(ip_mreq, optval_addr, optlen);
2212 ret = get_errno(setsockopt(sockfd, level, optname, ip_mreq, optlen));
2213 break;
2214
Lionel Landwerlin6e3cb582009-04-25 23:31:18 +02002215 case IP_BLOCK_SOURCE:
2216 case IP_UNBLOCK_SOURCE:
2217 case IP_ADD_SOURCE_MEMBERSHIP:
2218 case IP_DROP_SOURCE_MEMBERSHIP:
2219 if (optlen != sizeof (struct target_ip_mreq_source))
2220 return -TARGET_EINVAL;
2221
2222 ip_mreq_source = lock_user(VERIFY_READ, optval_addr, optlen, 1);
2223 ret = get_errno(setsockopt(sockfd, level, optname, ip_mreq_source, optlen));
2224 unlock_user (ip_mreq_source, optval_addr, 0);
2225 break;
2226
bellard8853f862004-02-22 14:57:26 +00002227 default:
2228 goto unimplemented;
2229 }
2230 break;
Laurent Vivier0d78b3b2013-08-30 01:46:43 +02002231 case SOL_IPV6:
2232 switch (optname) {
2233 case IPV6_MTU_DISCOVER:
2234 case IPV6_MTU:
2235 case IPV6_V6ONLY:
2236 case IPV6_RECVPKTINFO:
2237 val = 0;
2238 if (optlen < sizeof(uint32_t)) {
2239 return -TARGET_EINVAL;
2240 }
2241 if (get_user_u32(val, optval_addr)) {
2242 return -TARGET_EFAULT;
2243 }
2244 ret = get_errno(setsockopt(sockfd, level, optname,
2245 &val, sizeof(val)));
2246 break;
2247 default:
2248 goto unimplemented;
2249 }
2250 break;
Jing Huang920394d2012-07-24 13:59:23 +00002251 case SOL_RAW:
2252 switch (optname) {
2253 case ICMP_FILTER:
2254 /* struct icmp_filter takes an u32 value */
2255 if (optlen < sizeof(uint32_t)) {
2256 return -TARGET_EINVAL;
2257 }
2258
2259 if (get_user_u32(val, optval_addr)) {
2260 return -TARGET_EFAULT;
2261 }
2262 ret = get_errno(setsockopt(sockfd, level, optname,
2263 &val, sizeof(val)));
2264 break;
2265
2266 default:
2267 goto unimplemented;
2268 }
2269 break;
bellard3532fa72006-06-24 15:06:03 +00002270 case TARGET_SOL_SOCKET:
bellard8853f862004-02-22 14:57:26 +00002271 switch (optname) {
Laurent Vivier1b09aeb2013-01-01 08:24:11 +00002272 case TARGET_SO_RCVTIMEO:
2273 {
2274 struct timeval tv;
2275
2276 optname = SO_RCVTIMEO;
2277
2278set_timeout:
2279 if (optlen != sizeof(struct target_timeval)) {
2280 return -TARGET_EINVAL;
2281 }
2282
2283 if (copy_from_user_timeval(&tv, optval_addr)) {
2284 return -TARGET_EFAULT;
2285 }
2286
2287 ret = get_errno(setsockopt(sockfd, SOL_SOCKET, optname,
2288 &tv, sizeof(tv)));
2289 return ret;
2290 }
2291 case TARGET_SO_SNDTIMEO:
2292 optname = SO_SNDTIMEO;
2293 goto set_timeout;
Laurent Vivierf57d4192013-08-30 01:46:41 +02002294 case TARGET_SO_ATTACH_FILTER:
2295 {
2296 struct target_sock_fprog *tfprog;
2297 struct target_sock_filter *tfilter;
2298 struct sock_fprog fprog;
2299 struct sock_filter *filter;
2300 int i;
2301
2302 if (optlen != sizeof(*tfprog)) {
2303 return -TARGET_EINVAL;
2304 }
2305 if (!lock_user_struct(VERIFY_READ, tfprog, optval_addr, 0)) {
2306 return -TARGET_EFAULT;
2307 }
2308 if (!lock_user_struct(VERIFY_READ, tfilter,
2309 tswapal(tfprog->filter), 0)) {
2310 unlock_user_struct(tfprog, optval_addr, 1);
2311 return -TARGET_EFAULT;
2312 }
2313
2314 fprog.len = tswap16(tfprog->len);
Harmandeep Kaur0e173b22015-10-06 21:47:12 +05302315 filter = g_try_new(struct sock_filter, fprog.len);
Laurent Vivierf57d4192013-08-30 01:46:41 +02002316 if (filter == NULL) {
2317 unlock_user_struct(tfilter, tfprog->filter, 1);
2318 unlock_user_struct(tfprog, optval_addr, 1);
2319 return -TARGET_ENOMEM;
2320 }
2321 for (i = 0; i < fprog.len; i++) {
2322 filter[i].code = tswap16(tfilter[i].code);
2323 filter[i].jt = tfilter[i].jt;
2324 filter[i].jf = tfilter[i].jf;
2325 filter[i].k = tswap32(tfilter[i].k);
2326 }
2327 fprog.filter = filter;
2328
2329 ret = get_errno(setsockopt(sockfd, SOL_SOCKET,
2330 SO_ATTACH_FILTER, &fprog, sizeof(fprog)));
Harmandeep Kaur0e173b22015-10-06 21:47:12 +05302331 g_free(filter);
Laurent Vivierf57d4192013-08-30 01:46:41 +02002332
2333 unlock_user_struct(tfilter, tfprog->filter, 1);
2334 unlock_user_struct(tfprog, optval_addr, 1);
2335 return ret;
2336 }
Joakim Tjernlund451aaf62014-07-12 15:47:06 +02002337 case TARGET_SO_BINDTODEVICE:
2338 {
2339 char *dev_ifname, *addr_ifname;
2340
2341 if (optlen > IFNAMSIZ - 1) {
2342 optlen = IFNAMSIZ - 1;
2343 }
2344 dev_ifname = lock_user(VERIFY_READ, optval_addr, optlen, 1);
2345 if (!dev_ifname) {
2346 return -TARGET_EFAULT;
2347 }
2348 optname = SO_BINDTODEVICE;
2349 addr_ifname = alloca(IFNAMSIZ);
2350 memcpy(addr_ifname, dev_ifname, optlen);
2351 addr_ifname[optlen] = 0;
Chen Gangfad6c582016-01-11 13:58:50 +08002352 ret = get_errno(setsockopt(sockfd, SOL_SOCKET, optname,
2353 addr_ifname, optlen));
Joakim Tjernlund451aaf62014-07-12 15:47:06 +02002354 unlock_user (dev_ifname, optval_addr, 0);
2355 return ret;
2356 }
bellard8853f862004-02-22 14:57:26 +00002357 /* Options with 'int' argument. */
bellard3532fa72006-06-24 15:06:03 +00002358 case TARGET_SO_DEBUG:
2359 optname = SO_DEBUG;
2360 break;
2361 case TARGET_SO_REUSEADDR:
2362 optname = SO_REUSEADDR;
2363 break;
2364 case TARGET_SO_TYPE:
2365 optname = SO_TYPE;
2366 break;
2367 case TARGET_SO_ERROR:
2368 optname = SO_ERROR;
2369 break;
2370 case TARGET_SO_DONTROUTE:
2371 optname = SO_DONTROUTE;
2372 break;
2373 case TARGET_SO_BROADCAST:
2374 optname = SO_BROADCAST;
2375 break;
2376 case TARGET_SO_SNDBUF:
2377 optname = SO_SNDBUF;
2378 break;
Paul Burtond79b6cc2014-06-22 11:25:35 +01002379 case TARGET_SO_SNDBUFFORCE:
2380 optname = SO_SNDBUFFORCE;
2381 break;
bellard3532fa72006-06-24 15:06:03 +00002382 case TARGET_SO_RCVBUF:
2383 optname = SO_RCVBUF;
2384 break;
Paul Burtond79b6cc2014-06-22 11:25:35 +01002385 case TARGET_SO_RCVBUFFORCE:
2386 optname = SO_RCVBUFFORCE;
2387 break;
bellard3532fa72006-06-24 15:06:03 +00002388 case TARGET_SO_KEEPALIVE:
2389 optname = SO_KEEPALIVE;
2390 break;
2391 case TARGET_SO_OOBINLINE:
2392 optname = SO_OOBINLINE;
2393 break;
2394 case TARGET_SO_NO_CHECK:
2395 optname = SO_NO_CHECK;
2396 break;
2397 case TARGET_SO_PRIORITY:
2398 optname = SO_PRIORITY;
2399 break;
bellard5e83e8e2005-03-01 22:32:06 +00002400#ifdef SO_BSDCOMPAT
bellard3532fa72006-06-24 15:06:03 +00002401 case TARGET_SO_BSDCOMPAT:
2402 optname = SO_BSDCOMPAT;
2403 break;
bellard5e83e8e2005-03-01 22:32:06 +00002404#endif
bellard3532fa72006-06-24 15:06:03 +00002405 case TARGET_SO_PASSCRED:
2406 optname = SO_PASSCRED;
2407 break;
Paul Burton82d0fe62014-06-22 11:25:36 +01002408 case TARGET_SO_PASSSEC:
2409 optname = SO_PASSSEC;
2410 break;
bellard3532fa72006-06-24 15:06:03 +00002411 case TARGET_SO_TIMESTAMP:
2412 optname = SO_TIMESTAMP;
2413 break;
2414 case TARGET_SO_RCVLOWAT:
2415 optname = SO_RCVLOWAT;
2416 break;
bellard8853f862004-02-22 14:57:26 +00002417 break;
2418 default:
2419 goto unimplemented;
2420 }
bellard3532fa72006-06-24 15:06:03 +00002421 if (optlen < sizeof(uint32_t))
bellard2f619692007-11-16 10:46:05 +00002422 return -TARGET_EINVAL;
bellard3532fa72006-06-24 15:06:03 +00002423
bellard2f619692007-11-16 10:46:05 +00002424 if (get_user_u32(val, optval_addr))
2425 return -TARGET_EFAULT;
bellard3532fa72006-06-24 15:06:03 +00002426 ret = get_errno(setsockopt(sockfd, SOL_SOCKET, optname, &val, sizeof(val)));
bellard8853f862004-02-22 14:57:26 +00002427 break;
bellard7854b052003-03-29 17:22:23 +00002428 default:
bellard8853f862004-02-22 14:57:26 +00002429 unimplemented:
Stefan Weilb2bedb22011-09-12 22:33:01 +02002430 gemu_log("Unsupported setsockopt level=%d optname=%d\n", level, optname);
ths6fa13c12007-12-18 02:41:04 +00002431 ret = -TARGET_ENOPROTOOPT;
bellard7854b052003-03-29 17:22:23 +00002432 }
bellard8853f862004-02-22 14:57:26 +00002433 return ret;
bellard7854b052003-03-29 17:22:23 +00002434}
2435
ths0da46a62007-10-20 20:23:07 +00002436/* do_getsockopt() Must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +00002437static abi_long do_getsockopt(int sockfd, int level, int optname,
bellard2f619692007-11-16 10:46:05 +00002438 abi_ulong optval_addr, abi_ulong optlen)
bellard7854b052003-03-29 17:22:23 +00002439{
blueswir1992f48a2007-10-14 16:27:31 +00002440 abi_long ret;
blueswir1b55266b2008-09-20 08:07:15 +00002441 int len, val;
2442 socklen_t lv;
bellard8853f862004-02-22 14:57:26 +00002443
2444 switch(level) {
bellard3532fa72006-06-24 15:06:03 +00002445 case TARGET_SOL_SOCKET:
Jamie Lentinf3b974c2010-11-26 15:04:08 +02002446 level = SOL_SOCKET;
2447 switch (optname) {
2448 /* These don't just return a single integer */
2449 case TARGET_SO_LINGER:
2450 case TARGET_SO_RCVTIMEO:
2451 case TARGET_SO_SNDTIMEO:
Jamie Lentinf3b974c2010-11-26 15:04:08 +02002452 case TARGET_SO_PEERNAME:
2453 goto unimplemented;
Akos PASZTORY583359a2011-11-14 15:09:49 +02002454 case TARGET_SO_PEERCRED: {
2455 struct ucred cr;
2456 socklen_t crlen;
2457 struct target_ucred *tcr;
2458
2459 if (get_user_u32(len, optlen)) {
2460 return -TARGET_EFAULT;
2461 }
2462 if (len < 0) {
2463 return -TARGET_EINVAL;
2464 }
2465
2466 crlen = sizeof(cr);
2467 ret = get_errno(getsockopt(sockfd, level, SO_PEERCRED,
2468 &cr, &crlen));
2469 if (ret < 0) {
2470 return ret;
2471 }
2472 if (len > crlen) {
2473 len = crlen;
2474 }
2475 if (!lock_user_struct(VERIFY_WRITE, tcr, optval_addr, 0)) {
2476 return -TARGET_EFAULT;
2477 }
2478 __put_user(cr.pid, &tcr->pid);
2479 __put_user(cr.uid, &tcr->uid);
2480 __put_user(cr.gid, &tcr->gid);
2481 unlock_user_struct(tcr, optval_addr, 1);
2482 if (put_user_u32(len, optlen)) {
2483 return -TARGET_EFAULT;
2484 }
2485 break;
2486 }
Jamie Lentinf3b974c2010-11-26 15:04:08 +02002487 /* Options with 'int' argument. */
2488 case TARGET_SO_DEBUG:
2489 optname = SO_DEBUG;
2490 goto int_case;
2491 case TARGET_SO_REUSEADDR:
2492 optname = SO_REUSEADDR;
2493 goto int_case;
2494 case TARGET_SO_TYPE:
2495 optname = SO_TYPE;
2496 goto int_case;
2497 case TARGET_SO_ERROR:
2498 optname = SO_ERROR;
2499 goto int_case;
2500 case TARGET_SO_DONTROUTE:
2501 optname = SO_DONTROUTE;
2502 goto int_case;
2503 case TARGET_SO_BROADCAST:
2504 optname = SO_BROADCAST;
2505 goto int_case;
2506 case TARGET_SO_SNDBUF:
2507 optname = SO_SNDBUF;
2508 goto int_case;
2509 case TARGET_SO_RCVBUF:
2510 optname = SO_RCVBUF;
2511 goto int_case;
2512 case TARGET_SO_KEEPALIVE:
2513 optname = SO_KEEPALIVE;
2514 goto int_case;
2515 case TARGET_SO_OOBINLINE:
2516 optname = SO_OOBINLINE;
2517 goto int_case;
2518 case TARGET_SO_NO_CHECK:
2519 optname = SO_NO_CHECK;
2520 goto int_case;
2521 case TARGET_SO_PRIORITY:
2522 optname = SO_PRIORITY;
2523 goto int_case;
2524#ifdef SO_BSDCOMPAT
2525 case TARGET_SO_BSDCOMPAT:
2526 optname = SO_BSDCOMPAT;
2527 goto int_case;
2528#endif
2529 case TARGET_SO_PASSCRED:
2530 optname = SO_PASSCRED;
2531 goto int_case;
2532 case TARGET_SO_TIMESTAMP:
2533 optname = SO_TIMESTAMP;
2534 goto int_case;
2535 case TARGET_SO_RCVLOWAT:
2536 optname = SO_RCVLOWAT;
2537 goto int_case;
Paul Burtonaec1ca42014-06-22 11:25:34 +01002538 case TARGET_SO_ACCEPTCONN:
2539 optname = SO_ACCEPTCONN;
2540 goto int_case;
bellard8853f862004-02-22 14:57:26 +00002541 default:
bellard2efbe912005-07-23 15:10:20 +00002542 goto int_case;
2543 }
2544 break;
2545 case SOL_TCP:
2546 /* TCP options all take an 'int' value. */
2547 int_case:
bellard2f619692007-11-16 10:46:05 +00002548 if (get_user_u32(len, optlen))
2549 return -TARGET_EFAULT;
bellard2efbe912005-07-23 15:10:20 +00002550 if (len < 0)
ths0da46a62007-10-20 20:23:07 +00002551 return -TARGET_EINVAL;
Mike Frysinger73160d92011-02-07 01:05:49 -05002552 lv = sizeof(lv);
bellard2efbe912005-07-23 15:10:20 +00002553 ret = get_errno(getsockopt(sockfd, level, optname, &val, &lv));
2554 if (ret < 0)
2555 return ret;
Paul Burton8289d112014-06-22 11:25:33 +01002556 if (optname == SO_TYPE) {
2557 val = host_to_target_sock_type(val);
2558 }
bellard2efbe912005-07-23 15:10:20 +00002559 if (len > lv)
2560 len = lv;
bellard2f619692007-11-16 10:46:05 +00002561 if (len == 4) {
2562 if (put_user_u32(val, optval_addr))
2563 return -TARGET_EFAULT;
2564 } else {
2565 if (put_user_u8(val, optval_addr))
2566 return -TARGET_EFAULT;
Jamie Lentinf3b974c2010-11-26 15:04:08 +02002567 }
bellard2f619692007-11-16 10:46:05 +00002568 if (put_user_u32(len, optlen))
2569 return -TARGET_EFAULT;
bellard2efbe912005-07-23 15:10:20 +00002570 break;
2571 case SOL_IP:
2572 switch(optname) {
2573 case IP_TOS:
2574 case IP_TTL:
2575 case IP_HDRINCL:
2576 case IP_ROUTER_ALERT:
2577 case IP_RECVOPTS:
2578 case IP_RETOPTS:
2579 case IP_PKTINFO:
2580 case IP_MTU_DISCOVER:
2581 case IP_RECVERR:
2582 case IP_RECVTOS:
2583#ifdef IP_FREEBIND
2584 case IP_FREEBIND:
2585#endif
2586 case IP_MULTICAST_TTL:
2587 case IP_MULTICAST_LOOP:
bellard2f619692007-11-16 10:46:05 +00002588 if (get_user_u32(len, optlen))
2589 return -TARGET_EFAULT;
bellard8853f862004-02-22 14:57:26 +00002590 if (len < 0)
ths0da46a62007-10-20 20:23:07 +00002591 return -TARGET_EINVAL;
Mike Frysinger73160d92011-02-07 01:05:49 -05002592 lv = sizeof(lv);
bellard8853f862004-02-22 14:57:26 +00002593 ret = get_errno(getsockopt(sockfd, level, optname, &val, &lv));
2594 if (ret < 0)
2595 return ret;
bellard2efbe912005-07-23 15:10:20 +00002596 if (len < sizeof(int) && len > 0 && val >= 0 && val < 255) {
bellard2efbe912005-07-23 15:10:20 +00002597 len = 1;
bellard2f619692007-11-16 10:46:05 +00002598 if (put_user_u32(len, optlen)
2599 || put_user_u8(val, optval_addr))
2600 return -TARGET_EFAULT;
bellard2efbe912005-07-23 15:10:20 +00002601 } else {
bellard2efbe912005-07-23 15:10:20 +00002602 if (len > sizeof(int))
2603 len = sizeof(int);
bellard2f619692007-11-16 10:46:05 +00002604 if (put_user_u32(len, optlen)
2605 || put_user_u32(val, optval_addr))
2606 return -TARGET_EFAULT;
bellard2efbe912005-07-23 15:10:20 +00002607 }
bellard8853f862004-02-22 14:57:26 +00002608 break;
bellard2efbe912005-07-23 15:10:20 +00002609 default:
thsc02f4992007-12-18 02:39:59 +00002610 ret = -TARGET_ENOPROTOOPT;
2611 break;
bellard8853f862004-02-22 14:57:26 +00002612 }
2613 break;
2614 default:
2615 unimplemented:
2616 gemu_log("getsockopt level=%d optname=%d not yet supported\n",
2617 level, optname);
thsc02f4992007-12-18 02:39:59 +00002618 ret = -TARGET_EOPNOTSUPP;
bellard8853f862004-02-22 14:57:26 +00002619 break;
2620 }
2621 return ret;
bellard7854b052003-03-29 17:22:23 +00002622}
2623
Richard Hendersonf287b2c2012-09-15 13:20:25 -07002624static struct iovec *lock_iovec(int type, abi_ulong target_addr,
2625 int count, int copy)
pbrook53a59602006-03-25 19:31:22 +00002626{
2627 struct target_iovec *target_vec;
Richard Hendersonf287b2c2012-09-15 13:20:25 -07002628 struct iovec *vec;
2629 abi_ulong total_len, max_len;
balrogd732dcb2008-10-28 10:21:03 +00002630 int i;
Peter Maydell501bb4b2014-02-17 18:55:33 +00002631 int err = 0;
Tom Musta29560a62014-08-12 13:53:43 -05002632 bool bad_address = false;
pbrook53a59602006-03-25 19:31:22 +00002633
Richard Hendersonf287b2c2012-09-15 13:20:25 -07002634 if (count == 0) {
2635 errno = 0;
2636 return NULL;
pbrook53a59602006-03-25 19:31:22 +00002637 }
Peter Maydelldfae8e02013-02-08 07:58:41 +00002638 if (count < 0 || count > IOV_MAX) {
Richard Hendersonf287b2c2012-09-15 13:20:25 -07002639 errno = EINVAL;
2640 return NULL;
2641 }
2642
Harmandeep Kaur0e173b22015-10-06 21:47:12 +05302643 vec = g_try_new0(struct iovec, count);
Richard Hendersonf287b2c2012-09-15 13:20:25 -07002644 if (vec == NULL) {
2645 errno = ENOMEM;
2646 return NULL;
2647 }
2648
2649 target_vec = lock_user(VERIFY_READ, target_addr,
2650 count * sizeof(struct target_iovec), 1);
2651 if (target_vec == NULL) {
Peter Maydell501bb4b2014-02-17 18:55:33 +00002652 err = EFAULT;
Richard Hendersonf287b2c2012-09-15 13:20:25 -07002653 goto fail2;
2654 }
2655
2656 /* ??? If host page size > target page size, this will result in a
2657 value larger than what we can actually support. */
2658 max_len = 0x7fffffff & TARGET_PAGE_MASK;
2659 total_len = 0;
2660
2661 for (i = 0; i < count; i++) {
2662 abi_ulong base = tswapal(target_vec[i].iov_base);
2663 abi_long len = tswapal(target_vec[i].iov_len);
2664
2665 if (len < 0) {
Peter Maydell501bb4b2014-02-17 18:55:33 +00002666 err = EINVAL;
Richard Hendersonf287b2c2012-09-15 13:20:25 -07002667 goto fail;
2668 } else if (len == 0) {
2669 /* Zero length pointer is ignored. */
2670 vec[i].iov_base = 0;
2671 } else {
2672 vec[i].iov_base = lock_user(type, base, len, copy);
Tom Musta29560a62014-08-12 13:53:43 -05002673 /* If the first buffer pointer is bad, this is a fault. But
2674 * subsequent bad buffers will result in a partial write; this
2675 * is realized by filling the vector with null pointers and
2676 * zero lengths. */
Richard Hendersonf287b2c2012-09-15 13:20:25 -07002677 if (!vec[i].iov_base) {
Tom Musta29560a62014-08-12 13:53:43 -05002678 if (i == 0) {
2679 err = EFAULT;
2680 goto fail;
2681 } else {
2682 bad_address = true;
2683 }
2684 }
2685 if (bad_address) {
2686 len = 0;
Richard Hendersonf287b2c2012-09-15 13:20:25 -07002687 }
2688 if (len > max_len - total_len) {
2689 len = max_len - total_len;
2690 }
2691 }
2692 vec[i].iov_len = len;
2693 total_len += len;
2694 }
2695
2696 unlock_user(target_vec, target_addr, 0);
2697 return vec;
2698
2699 fail:
Chen Gang S7eff5182015-01-23 18:01:09 +08002700 while (--i >= 0) {
2701 if (tswapal(target_vec[i].iov_len) > 0) {
2702 unlock_user(vec[i].iov_base, tswapal(target_vec[i].iov_base), 0);
2703 }
2704 }
Richard Hendersonf287b2c2012-09-15 13:20:25 -07002705 unlock_user(target_vec, target_addr, 0);
Peter Maydell501bb4b2014-02-17 18:55:33 +00002706 fail2:
Harmandeep Kaur0e173b22015-10-06 21:47:12 +05302707 g_free(vec);
Peter Maydell501bb4b2014-02-17 18:55:33 +00002708 errno = err;
Richard Hendersonf287b2c2012-09-15 13:20:25 -07002709 return NULL;
pbrook53a59602006-03-25 19:31:22 +00002710}
2711
Richard Hendersonf287b2c2012-09-15 13:20:25 -07002712static void unlock_iovec(struct iovec *vec, abi_ulong target_addr,
2713 int count, int copy)
pbrook53a59602006-03-25 19:31:22 +00002714{
2715 struct target_iovec *target_vec;
pbrook53a59602006-03-25 19:31:22 +00002716 int i;
2717
Richard Hendersonf287b2c2012-09-15 13:20:25 -07002718 target_vec = lock_user(VERIFY_READ, target_addr,
2719 count * sizeof(struct target_iovec), 1);
2720 if (target_vec) {
2721 for (i = 0; i < count; i++) {
2722 abi_ulong base = tswapal(target_vec[i].iov_base);
Chen Gang S71ec7ce2015-01-23 18:07:50 +08002723 abi_long len = tswapal(target_vec[i].iov_len);
Richard Hendersonf287b2c2012-09-15 13:20:25 -07002724 if (len < 0) {
2725 break;
2726 }
balrogd732dcb2008-10-28 10:21:03 +00002727 unlock_user(vec[i].iov_base, base, copy ? vec[i].iov_len : 0);
2728 }
Richard Hendersonf287b2c2012-09-15 13:20:25 -07002729 unlock_user(target_vec, target_addr, 0);
pbrook53a59602006-03-25 19:31:22 +00002730 }
bellard579a97f2007-11-11 14:26:47 +00002731
Harmandeep Kaur0e173b22015-10-06 21:47:12 +05302732 g_free(vec);
pbrook53a59602006-03-25 19:31:22 +00002733}
2734
Edgar E. Iglesias53d09b72013-09-23 14:11:53 +02002735static inline int target_to_host_sock_type(int *type)
Petar Jovanovicf651e6a2013-07-01 02:44:14 +02002736{
2737 int host_type = 0;
2738 int target_type = *type;
2739
2740 switch (target_type & TARGET_SOCK_TYPE_MASK) {
2741 case TARGET_SOCK_DGRAM:
2742 host_type = SOCK_DGRAM;
2743 break;
2744 case TARGET_SOCK_STREAM:
2745 host_type = SOCK_STREAM;
2746 break;
2747 default:
2748 host_type = target_type & TARGET_SOCK_TYPE_MASK;
2749 break;
2750 }
2751 if (target_type & TARGET_SOCK_CLOEXEC) {
Edgar E. Iglesias53d09b72013-09-23 14:11:53 +02002752#if defined(SOCK_CLOEXEC)
Petar Jovanovicf651e6a2013-07-01 02:44:14 +02002753 host_type |= SOCK_CLOEXEC;
Edgar E. Iglesias53d09b72013-09-23 14:11:53 +02002754#else
2755 return -TARGET_EINVAL;
2756#endif
Petar Jovanovicf651e6a2013-07-01 02:44:14 +02002757 }
2758 if (target_type & TARGET_SOCK_NONBLOCK) {
Edgar E. Iglesias53d09b72013-09-23 14:11:53 +02002759#if defined(SOCK_NONBLOCK)
Petar Jovanovicf651e6a2013-07-01 02:44:14 +02002760 host_type |= SOCK_NONBLOCK;
Edgar E. Iglesias53d09b72013-09-23 14:11:53 +02002761#elif !defined(O_NONBLOCK)
2762 return -TARGET_EINVAL;
2763#endif
Petar Jovanovicf651e6a2013-07-01 02:44:14 +02002764 }
2765 *type = host_type;
Edgar E. Iglesias53d09b72013-09-23 14:11:53 +02002766 return 0;
2767}
2768
2769/* Try to emulate socket type flags after socket creation. */
2770static int sock_flags_fixup(int fd, int target_type)
2771{
2772#if !defined(SOCK_NONBLOCK) && defined(O_NONBLOCK)
2773 if (target_type & TARGET_SOCK_NONBLOCK) {
2774 int flags = fcntl(fd, F_GETFL);
2775 if (fcntl(fd, F_SETFL, O_NONBLOCK | flags) == -1) {
2776 close(fd);
2777 return -TARGET_EINVAL;
2778 }
2779 }
2780#endif
2781 return fd;
Petar Jovanovicf651e6a2013-07-01 02:44:14 +02002782}
2783
Laurent Vivier0cf22722015-10-28 21:40:45 +01002784static abi_long packet_target_to_host_sockaddr(void *host_addr,
2785 abi_ulong target_addr,
2786 socklen_t len)
2787{
2788 struct sockaddr *addr = host_addr;
2789 struct target_sockaddr *target_saddr;
2790
2791 target_saddr = lock_user(VERIFY_READ, target_addr, len, 1);
2792 if (!target_saddr) {
2793 return -TARGET_EFAULT;
2794 }
2795
2796 memcpy(addr, target_saddr, len);
2797 addr->sa_family = tswap16(target_saddr->sa_family);
2798 /* spkt_protocol is big-endian */
2799
2800 unlock_user(target_saddr, target_addr, 0);
2801 return 0;
2802}
2803
2804static TargetFdTrans target_packet_trans = {
2805 .target_to_host_addr = packet_target_to_host_sockaddr,
2806};
2807
Laurent Vivier575b22b2016-06-02 22:14:15 +02002808#ifdef CONFIG_RTNETLINK
Laurent Vivier6c5b5642016-05-22 18:56:19 +02002809static abi_long netlink_route_target_to_host(void *buf, size_t len)
2810{
2811 return target_to_host_nlmsg_route(buf, len);
2812}
2813
2814static abi_long netlink_route_host_to_target(void *buf, size_t len)
2815{
2816 return host_to_target_nlmsg_route(buf, len);
2817}
2818
2819static TargetFdTrans target_netlink_route_trans = {
2820 .target_to_host_data = netlink_route_target_to_host,
2821 .host_to_target_data = netlink_route_host_to_target,
2822};
Laurent Vivier575b22b2016-06-02 22:14:15 +02002823#endif /* CONFIG_RTNETLINK */
Laurent Vivier6c5b5642016-05-22 18:56:19 +02002824
Laurent Vivier5ce9bb52016-05-22 18:56:21 +02002825static abi_long netlink_audit_target_to_host(void *buf, size_t len)
2826{
2827 return target_to_host_nlmsg_audit(buf, len);
2828}
2829
2830static abi_long netlink_audit_host_to_target(void *buf, size_t len)
2831{
2832 return host_to_target_nlmsg_audit(buf, len);
2833}
2834
2835static TargetFdTrans target_netlink_audit_trans = {
2836 .target_to_host_data = netlink_audit_target_to_host,
2837 .host_to_target_data = netlink_audit_host_to_target,
2838};
2839
ths0da46a62007-10-20 20:23:07 +00002840/* do_socket() Must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +00002841static abi_long do_socket(int domain, int type, int protocol)
bellard3532fa72006-06-24 15:06:03 +00002842{
Edgar E. Iglesias53d09b72013-09-23 14:11:53 +02002843 int target_type = type;
2844 int ret;
2845
2846 ret = target_to_host_sock_type(&type);
2847 if (ret) {
2848 return ret;
2849 }
Petar Jovanovicf651e6a2013-07-01 02:44:14 +02002850
Laurent Vivier575b22b2016-06-02 22:14:15 +02002851 if (domain == PF_NETLINK && !(
2852#ifdef CONFIG_RTNETLINK
2853 protocol == NETLINK_ROUTE ||
2854#endif
2855 protocol == NETLINK_KOBJECT_UEVENT ||
2856 protocol == NETLINK_AUDIT)) {
Laurent Vivier6c5b5642016-05-22 18:56:19 +02002857 return -EPFNOSUPPORT;
2858 }
Laurent Vivierff626f22015-10-28 21:40:42 +01002859
2860 if (domain == AF_PACKET ||
2861 (domain == AF_INET && type == SOCK_PACKET)) {
2862 protocol = tswap16(protocol);
2863 }
2864
Edgar E. Iglesias53d09b72013-09-23 14:11:53 +02002865 ret = get_errno(socket(domain, type, protocol));
2866 if (ret >= 0) {
2867 ret = sock_flags_fixup(ret, target_type);
Laurent Vivier0cf22722015-10-28 21:40:45 +01002868 if (type == SOCK_PACKET) {
2869 /* Manage an obsolete case :
2870 * if socket type is SOCK_PACKET, bind by name
2871 */
2872 fd_trans_register(ret, &target_packet_trans);
Laurent Vivier6c5b5642016-05-22 18:56:19 +02002873 } else if (domain == PF_NETLINK) {
2874 switch (protocol) {
Laurent Vivier575b22b2016-06-02 22:14:15 +02002875#ifdef CONFIG_RTNETLINK
Laurent Vivier6c5b5642016-05-22 18:56:19 +02002876 case NETLINK_ROUTE:
2877 fd_trans_register(ret, &target_netlink_route_trans);
2878 break;
Laurent Vivier575b22b2016-06-02 22:14:15 +02002879#endif
Laurent Vivierb2656202016-05-22 18:56:20 +02002880 case NETLINK_KOBJECT_UEVENT:
2881 /* nothing to do: messages are strings */
2882 break;
Laurent Vivier5ce9bb52016-05-22 18:56:21 +02002883 case NETLINK_AUDIT:
2884 fd_trans_register(ret, &target_netlink_audit_trans);
2885 break;
Laurent Vivier6c5b5642016-05-22 18:56:19 +02002886 default:
2887 g_assert_not_reached();
2888 }
Laurent Vivier0cf22722015-10-28 21:40:45 +01002889 }
Edgar E. Iglesias53d09b72013-09-23 14:11:53 +02002890 }
2891 return ret;
bellard3532fa72006-06-24 15:06:03 +00002892}
2893
ths0da46a62007-10-20 20:23:07 +00002894/* do_bind() Must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +00002895static abi_long do_bind(int sockfd, abi_ulong target_addr,
2896 socklen_t addrlen)
bellard3532fa72006-06-24 15:06:03 +00002897{
aurel328f7aeaf2009-01-30 19:47:57 +00002898 void *addr;
Arnaud Patard917507b2009-06-19 10:44:45 +03002899 abi_long ret;
aurel328f7aeaf2009-01-30 19:47:57 +00002900
Blue Swirl38724252010-09-18 05:53:14 +00002901 if ((int)addrlen < 0) {
aurel328f7aeaf2009-01-30 19:47:57 +00002902 return -TARGET_EINVAL;
Blue Swirl38724252010-09-18 05:53:14 +00002903 }
aurel328f7aeaf2009-01-30 19:47:57 +00002904
aurel32607175e2009-04-15 16:11:59 +00002905 addr = alloca(addrlen+1);
ths3b46e622007-09-17 08:09:54 +00002906
Laurent Vivier7b36f782015-10-28 21:40:44 +01002907 ret = target_to_host_sockaddr(sockfd, addr, target_addr, addrlen);
Arnaud Patard917507b2009-06-19 10:44:45 +03002908 if (ret)
2909 return ret;
2910
bellard3532fa72006-06-24 15:06:03 +00002911 return get_errno(bind(sockfd, addr, addrlen));
2912}
2913
ths0da46a62007-10-20 20:23:07 +00002914/* do_connect() Must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +00002915static abi_long do_connect(int sockfd, abi_ulong target_addr,
2916 socklen_t addrlen)
bellard3532fa72006-06-24 15:06:03 +00002917{
aurel328f7aeaf2009-01-30 19:47:57 +00002918 void *addr;
Arnaud Patard917507b2009-06-19 10:44:45 +03002919 abi_long ret;
aurel328f7aeaf2009-01-30 19:47:57 +00002920
Blue Swirl38724252010-09-18 05:53:14 +00002921 if ((int)addrlen < 0) {
aurel328f7aeaf2009-01-30 19:47:57 +00002922 return -TARGET_EINVAL;
Blue Swirl38724252010-09-18 05:53:14 +00002923 }
aurel328f7aeaf2009-01-30 19:47:57 +00002924
Joakim Tjernlund2dd08df2014-07-11 17:18:03 +02002925 addr = alloca(addrlen+1);
ths3b46e622007-09-17 08:09:54 +00002926
Laurent Vivier7b36f782015-10-28 21:40:44 +01002927 ret = target_to_host_sockaddr(sockfd, addr, target_addr, addrlen);
Arnaud Patard917507b2009-06-19 10:44:45 +03002928 if (ret)
2929 return ret;
2930
Peter Maydell2a3c7612016-06-06 19:58:03 +01002931 return get_errno(safe_connect(sockfd, addr, addrlen));
bellard3532fa72006-06-24 15:06:03 +00002932}
2933
Alexander Graff19e00d2014-03-02 19:36:42 +00002934/* do_sendrecvmsg_locked() Must return target values and target errnos. */
2935static abi_long do_sendrecvmsg_locked(int fd, struct target_msghdr *msgp,
2936 int flags, int send)
bellard3532fa72006-06-24 15:06:03 +00002937{
balrog6de645c2008-10-28 10:26:29 +00002938 abi_long ret, len;
bellard3532fa72006-06-24 15:06:03 +00002939 struct msghdr msg;
2940 int count;
2941 struct iovec *vec;
blueswir1992f48a2007-10-14 16:27:31 +00002942 abi_ulong target_vec;
bellard3532fa72006-06-24 15:06:03 +00002943
bellard3532fa72006-06-24 15:06:03 +00002944 if (msgp->msg_name) {
2945 msg.msg_namelen = tswap32(msgp->msg_namelen);
Joakim Tjernlund2dd08df2014-07-11 17:18:03 +02002946 msg.msg_name = alloca(msg.msg_namelen+1);
Laurent Vivier7b36f782015-10-28 21:40:44 +01002947 ret = target_to_host_sockaddr(fd, msg.msg_name,
2948 tswapal(msgp->msg_name),
2949 msg.msg_namelen);
Arnaud Patard917507b2009-06-19 10:44:45 +03002950 if (ret) {
Richard Hendersonf287b2c2012-09-15 13:20:25 -07002951 goto out2;
Arnaud Patard917507b2009-06-19 10:44:45 +03002952 }
bellard3532fa72006-06-24 15:06:03 +00002953 } else {
2954 msg.msg_name = NULL;
2955 msg.msg_namelen = 0;
2956 }
Matthias Brauncbb21ee2011-08-12 19:57:41 +02002957 msg.msg_controllen = 2 * tswapal(msgp->msg_controllen);
bellard3532fa72006-06-24 15:06:03 +00002958 msg.msg_control = alloca(msg.msg_controllen);
2959 msg.msg_flags = tswap32(msgp->msg_flags);
ths3b46e622007-09-17 08:09:54 +00002960
Matthias Brauncbb21ee2011-08-12 19:57:41 +02002961 count = tswapal(msgp->msg_iovlen);
Matthias Brauncbb21ee2011-08-12 19:57:41 +02002962 target_vec = tswapal(msgp->msg_iov);
Richard Hendersonf287b2c2012-09-15 13:20:25 -07002963 vec = lock_iovec(send ? VERIFY_READ : VERIFY_WRITE,
2964 target_vec, count, send);
2965 if (vec == NULL) {
2966 ret = -host_to_target_errno(errno);
2967 goto out2;
2968 }
bellard3532fa72006-06-24 15:06:03 +00002969 msg.msg_iovlen = count;
2970 msg.msg_iov = vec;
ths3b46e622007-09-17 08:09:54 +00002971
bellard3532fa72006-06-24 15:06:03 +00002972 if (send) {
Laurent Vivier6c5b5642016-05-22 18:56:19 +02002973 if (fd_trans_target_to_host_data(fd)) {
2974 ret = fd_trans_target_to_host_data(fd)(msg.msg_iov->iov_base,
2975 msg.msg_iov->iov_len);
2976 } else {
2977 ret = target_to_host_cmsg(&msg, msgp);
2978 }
2979 if (ret == 0) {
Peter Maydell66687532016-06-06 19:58:04 +01002980 ret = get_errno(safe_sendmsg(fd, &msg, flags));
Laurent Vivier6c5b5642016-05-22 18:56:19 +02002981 }
bellard3532fa72006-06-24 15:06:03 +00002982 } else {
Peter Maydell66687532016-06-06 19:58:04 +01002983 ret = get_errno(safe_recvmsg(fd, &msg, flags));
balrog6de645c2008-10-28 10:26:29 +00002984 if (!is_error(ret)) {
2985 len = ret;
Laurent Vivier6c5b5642016-05-22 18:56:19 +02002986 if (fd_trans_host_to_target_data(fd)) {
2987 ret = fd_trans_host_to_target_data(fd)(msg.msg_iov->iov_base,
2988 msg.msg_iov->iov_len);
2989 } else {
2990 ret = host_to_target_cmsg(msgp, &msg);
2991 }
Jing Huangca619062012-07-24 13:58:02 +00002992 if (!is_error(ret)) {
2993 msgp->msg_namelen = tswap32(msg.msg_namelen);
2994 if (msg.msg_name != NULL) {
2995 ret = host_to_target_sockaddr(tswapal(msgp->msg_name),
2996 msg.msg_name, msg.msg_namelen);
2997 if (ret) {
2998 goto out;
2999 }
3000 }
3001
balrog6de645c2008-10-28 10:26:29 +00003002 ret = len;
Jing Huangca619062012-07-24 13:58:02 +00003003 }
balrog6de645c2008-10-28 10:26:29 +00003004 }
bellard3532fa72006-06-24 15:06:03 +00003005 }
Jing Huangca619062012-07-24 13:58:02 +00003006
3007out:
bellard3532fa72006-06-24 15:06:03 +00003008 unlock_iovec(vec, target_vec, count, !send);
Richard Hendersonf287b2c2012-09-15 13:20:25 -07003009out2:
Alexander Graff19e00d2014-03-02 19:36:42 +00003010 return ret;
3011}
3012
3013static abi_long do_sendrecvmsg(int fd, abi_ulong target_msg,
3014 int flags, int send)
3015{
3016 abi_long ret;
3017 struct target_msghdr *msgp;
3018
3019 if (!lock_user_struct(send ? VERIFY_READ : VERIFY_WRITE,
3020 msgp,
3021 target_msg,
3022 send ? 1 : 0)) {
3023 return -TARGET_EFAULT;
3024 }
3025 ret = do_sendrecvmsg_locked(fd, msgp, flags, send);
bellard579a97f2007-11-11 14:26:47 +00003026 unlock_user_struct(msgp, target_msg, send ? 0 : 1);
bellard3532fa72006-06-24 15:06:03 +00003027 return ret;
3028}
3029
Alexander Graff19e00d2014-03-02 19:36:42 +00003030/* We don't rely on the C library to have sendmmsg/recvmmsg support,
3031 * so it might not have this *mmsg-specific flag either.
3032 */
3033#ifndef MSG_WAITFORONE
3034#define MSG_WAITFORONE 0x10000
3035#endif
3036
3037static abi_long do_sendrecvmmsg(int fd, abi_ulong target_msgvec,
3038 unsigned int vlen, unsigned int flags,
3039 int send)
3040{
3041 struct target_mmsghdr *mmsgp;
3042 abi_long ret = 0;
3043 int i;
3044
3045 if (vlen > UIO_MAXIOV) {
3046 vlen = UIO_MAXIOV;
3047 }
3048
3049 mmsgp = lock_user(VERIFY_WRITE, target_msgvec, sizeof(*mmsgp) * vlen, 1);
3050 if (!mmsgp) {
3051 return -TARGET_EFAULT;
3052 }
3053
3054 for (i = 0; i < vlen; i++) {
3055 ret = do_sendrecvmsg_locked(fd, &mmsgp[i].msg_hdr, flags, send);
3056 if (is_error(ret)) {
3057 break;
3058 }
3059 mmsgp[i].msg_len = tswap32(ret);
3060 /* MSG_WAITFORONE turns on MSG_DONTWAIT after one packet */
3061 if (flags & MSG_WAITFORONE) {
3062 flags |= MSG_DONTWAIT;
3063 }
3064 }
3065
3066 unlock_user(mmsgp, target_msgvec, sizeof(*mmsgp) * i);
3067
3068 /* Return number of datagrams sent if we sent any at all;
3069 * otherwise return the error.
3070 */
3071 if (i) {
3072 return i;
3073 }
3074 return ret;
3075}
Alexander Graff19e00d2014-03-02 19:36:42 +00003076
Peter Maydella94b4982013-02-08 04:35:04 +00003077/* do_accept4() Must return target values and target errnos. */
3078static abi_long do_accept4(int fd, abi_ulong target_addr,
3079 abi_ulong target_addrlen_addr, int flags)
pbrook1be9e1d2006-11-19 15:26:04 +00003080{
bellard2f619692007-11-16 10:46:05 +00003081 socklen_t addrlen;
3082 void *addr;
blueswir1992f48a2007-10-14 16:27:31 +00003083 abi_long ret;
Petar Jovanovicd25295d2014-03-31 17:41:23 +02003084 int host_flags;
3085
3086 host_flags = target_to_host_bitmask(flags, fcntl_flags_tbl);
pbrook1be9e1d2006-11-19 15:26:04 +00003087
Peter Maydella94b4982013-02-08 04:35:04 +00003088 if (target_addr == 0) {
Peter Maydellff6dc132016-06-06 19:58:13 +01003089 return get_errno(safe_accept4(fd, NULL, NULL, host_flags));
Peter Maydella94b4982013-02-08 04:35:04 +00003090 }
Arnaud Patard917507b2009-06-19 10:44:45 +03003091
3092 /* linux returns EINVAL if addrlen pointer is invalid */
bellard2f619692007-11-16 10:46:05 +00003093 if (get_user_u32(addrlen, target_addrlen_addr))
Arnaud Patard917507b2009-06-19 10:44:45 +03003094 return -TARGET_EINVAL;
bellard2f619692007-11-16 10:46:05 +00003095
Blue Swirl38724252010-09-18 05:53:14 +00003096 if ((int)addrlen < 0) {
aurel328f7aeaf2009-01-30 19:47:57 +00003097 return -TARGET_EINVAL;
Blue Swirl38724252010-09-18 05:53:14 +00003098 }
aurel328f7aeaf2009-01-30 19:47:57 +00003099
Arnaud Patard917507b2009-06-19 10:44:45 +03003100 if (!access_ok(VERIFY_WRITE, target_addr, addrlen))
3101 return -TARGET_EINVAL;
3102
bellard2f619692007-11-16 10:46:05 +00003103 addr = alloca(addrlen);
3104
Peter Maydellff6dc132016-06-06 19:58:13 +01003105 ret = get_errno(safe_accept4(fd, addr, &addrlen, host_flags));
pbrook1be9e1d2006-11-19 15:26:04 +00003106 if (!is_error(ret)) {
3107 host_to_target_sockaddr(target_addr, addr, addrlen);
bellard2f619692007-11-16 10:46:05 +00003108 if (put_user_u32(addrlen, target_addrlen_addr))
3109 ret = -TARGET_EFAULT;
pbrook1be9e1d2006-11-19 15:26:04 +00003110 }
3111 return ret;
3112}
3113
ths0da46a62007-10-20 20:23:07 +00003114/* do_getpeername() Must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +00003115static abi_long do_getpeername(int fd, abi_ulong target_addr,
bellard2f619692007-11-16 10:46:05 +00003116 abi_ulong target_addrlen_addr)
pbrook1be9e1d2006-11-19 15:26:04 +00003117{
bellard2f619692007-11-16 10:46:05 +00003118 socklen_t addrlen;
3119 void *addr;
blueswir1992f48a2007-10-14 16:27:31 +00003120 abi_long ret;
pbrook1be9e1d2006-11-19 15:26:04 +00003121
bellard2f619692007-11-16 10:46:05 +00003122 if (get_user_u32(addrlen, target_addrlen_addr))
3123 return -TARGET_EFAULT;
3124
Blue Swirl38724252010-09-18 05:53:14 +00003125 if ((int)addrlen < 0) {
aurel328f7aeaf2009-01-30 19:47:57 +00003126 return -TARGET_EINVAL;
Blue Swirl38724252010-09-18 05:53:14 +00003127 }
aurel328f7aeaf2009-01-30 19:47:57 +00003128
Arnaud Patard917507b2009-06-19 10:44:45 +03003129 if (!access_ok(VERIFY_WRITE, target_addr, addrlen))
3130 return -TARGET_EFAULT;
3131
bellard2f619692007-11-16 10:46:05 +00003132 addr = alloca(addrlen);
3133
pbrook1be9e1d2006-11-19 15:26:04 +00003134 ret = get_errno(getpeername(fd, addr, &addrlen));
3135 if (!is_error(ret)) {
3136 host_to_target_sockaddr(target_addr, addr, addrlen);
bellard2f619692007-11-16 10:46:05 +00003137 if (put_user_u32(addrlen, target_addrlen_addr))
3138 ret = -TARGET_EFAULT;
pbrook1be9e1d2006-11-19 15:26:04 +00003139 }
3140 return ret;
3141}
3142
ths0da46a62007-10-20 20:23:07 +00003143/* do_getsockname() Must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +00003144static abi_long do_getsockname(int fd, abi_ulong target_addr,
bellard2f619692007-11-16 10:46:05 +00003145 abi_ulong target_addrlen_addr)
pbrook1be9e1d2006-11-19 15:26:04 +00003146{
bellard2f619692007-11-16 10:46:05 +00003147 socklen_t addrlen;
3148 void *addr;
blueswir1992f48a2007-10-14 16:27:31 +00003149 abi_long ret;
pbrook1be9e1d2006-11-19 15:26:04 +00003150
bellard2f619692007-11-16 10:46:05 +00003151 if (get_user_u32(addrlen, target_addrlen_addr))
3152 return -TARGET_EFAULT;
3153
Blue Swirl38724252010-09-18 05:53:14 +00003154 if ((int)addrlen < 0) {
aurel328f7aeaf2009-01-30 19:47:57 +00003155 return -TARGET_EINVAL;
Blue Swirl38724252010-09-18 05:53:14 +00003156 }
aurel328f7aeaf2009-01-30 19:47:57 +00003157
Arnaud Patard917507b2009-06-19 10:44:45 +03003158 if (!access_ok(VERIFY_WRITE, target_addr, addrlen))
3159 return -TARGET_EFAULT;
3160
bellard2f619692007-11-16 10:46:05 +00003161 addr = alloca(addrlen);
3162
pbrook1be9e1d2006-11-19 15:26:04 +00003163 ret = get_errno(getsockname(fd, addr, &addrlen));
3164 if (!is_error(ret)) {
3165 host_to_target_sockaddr(target_addr, addr, addrlen);
bellard2f619692007-11-16 10:46:05 +00003166 if (put_user_u32(addrlen, target_addrlen_addr))
3167 ret = -TARGET_EFAULT;
pbrook1be9e1d2006-11-19 15:26:04 +00003168 }
3169 return ret;
3170}
3171
ths0da46a62007-10-20 20:23:07 +00003172/* do_socketpair() Must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +00003173static abi_long do_socketpair(int domain, int type, int protocol,
bellard2f619692007-11-16 10:46:05 +00003174 abi_ulong target_tab_addr)
pbrook1be9e1d2006-11-19 15:26:04 +00003175{
3176 int tab[2];
blueswir1992f48a2007-10-14 16:27:31 +00003177 abi_long ret;
pbrook1be9e1d2006-11-19 15:26:04 +00003178
Petar Jovanovicf651e6a2013-07-01 02:44:14 +02003179 target_to_host_sock_type(&type);
3180
pbrook1be9e1d2006-11-19 15:26:04 +00003181 ret = get_errno(socketpair(domain, type, protocol, tab));
3182 if (!is_error(ret)) {
bellard2f619692007-11-16 10:46:05 +00003183 if (put_user_s32(tab[0], target_tab_addr)
3184 || put_user_s32(tab[1], target_tab_addr + sizeof(tab[0])))
3185 ret = -TARGET_EFAULT;
pbrook1be9e1d2006-11-19 15:26:04 +00003186 }
3187 return ret;
3188}
3189
ths0da46a62007-10-20 20:23:07 +00003190/* do_sendto() Must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +00003191static abi_long do_sendto(int fd, abi_ulong msg, size_t len, int flags,
3192 abi_ulong target_addr, socklen_t addrlen)
pbrook1be9e1d2006-11-19 15:26:04 +00003193{
3194 void *addr;
3195 void *host_msg;
blueswir1992f48a2007-10-14 16:27:31 +00003196 abi_long ret;
pbrook1be9e1d2006-11-19 15:26:04 +00003197
Blue Swirl38724252010-09-18 05:53:14 +00003198 if ((int)addrlen < 0) {
aurel328f7aeaf2009-01-30 19:47:57 +00003199 return -TARGET_EINVAL;
Blue Swirl38724252010-09-18 05:53:14 +00003200 }
aurel328f7aeaf2009-01-30 19:47:57 +00003201
bellard579a97f2007-11-11 14:26:47 +00003202 host_msg = lock_user(VERIFY_READ, msg, len, 1);
3203 if (!host_msg)
3204 return -TARGET_EFAULT;
Laurent Vivier6c5b5642016-05-22 18:56:19 +02003205 if (fd_trans_target_to_host_data(fd)) {
3206 ret = fd_trans_target_to_host_data(fd)(host_msg, len);
3207 if (ret < 0) {
3208 unlock_user(host_msg, msg, 0);
3209 return ret;
3210 }
3211 }
pbrook1be9e1d2006-11-19 15:26:04 +00003212 if (target_addr) {
Joakim Tjernlund2dd08df2014-07-11 17:18:03 +02003213 addr = alloca(addrlen+1);
Laurent Vivier7b36f782015-10-28 21:40:44 +01003214 ret = target_to_host_sockaddr(fd, addr, target_addr, addrlen);
Arnaud Patard917507b2009-06-19 10:44:45 +03003215 if (ret) {
3216 unlock_user(host_msg, msg, 0);
3217 return ret;
3218 }
Peter Maydell66687532016-06-06 19:58:04 +01003219 ret = get_errno(safe_sendto(fd, host_msg, len, flags, addr, addrlen));
pbrook1be9e1d2006-11-19 15:26:04 +00003220 } else {
Peter Maydell66687532016-06-06 19:58:04 +01003221 ret = get_errno(safe_sendto(fd, host_msg, len, flags, NULL, 0));
pbrook1be9e1d2006-11-19 15:26:04 +00003222 }
3223 unlock_user(host_msg, msg, 0);
3224 return ret;
3225}
3226
ths0da46a62007-10-20 20:23:07 +00003227/* do_recvfrom() Must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +00003228static abi_long do_recvfrom(int fd, abi_ulong msg, size_t len, int flags,
3229 abi_ulong target_addr,
3230 abi_ulong target_addrlen)
pbrook1be9e1d2006-11-19 15:26:04 +00003231{
3232 socklen_t addrlen;
3233 void *addr;
3234 void *host_msg;
blueswir1992f48a2007-10-14 16:27:31 +00003235 abi_long ret;
pbrook1be9e1d2006-11-19 15:26:04 +00003236
bellard579a97f2007-11-11 14:26:47 +00003237 host_msg = lock_user(VERIFY_WRITE, msg, len, 0);
3238 if (!host_msg)
3239 return -TARGET_EFAULT;
pbrook1be9e1d2006-11-19 15:26:04 +00003240 if (target_addr) {
bellard2f619692007-11-16 10:46:05 +00003241 if (get_user_u32(addrlen, target_addrlen)) {
3242 ret = -TARGET_EFAULT;
3243 goto fail;
3244 }
Blue Swirl38724252010-09-18 05:53:14 +00003245 if ((int)addrlen < 0) {
aurel328f7aeaf2009-01-30 19:47:57 +00003246 ret = -TARGET_EINVAL;
3247 goto fail;
3248 }
pbrook1be9e1d2006-11-19 15:26:04 +00003249 addr = alloca(addrlen);
Peter Maydell66687532016-06-06 19:58:04 +01003250 ret = get_errno(safe_recvfrom(fd, host_msg, len, flags,
3251 addr, &addrlen));
pbrook1be9e1d2006-11-19 15:26:04 +00003252 } else {
3253 addr = NULL; /* To keep compiler quiet. */
Peter Maydell66687532016-06-06 19:58:04 +01003254 ret = get_errno(safe_recvfrom(fd, host_msg, len, flags, NULL, 0));
pbrook1be9e1d2006-11-19 15:26:04 +00003255 }
3256 if (!is_error(ret)) {
3257 if (target_addr) {
3258 host_to_target_sockaddr(target_addr, addr, addrlen);
bellard2f619692007-11-16 10:46:05 +00003259 if (put_user_u32(addrlen, target_addrlen)) {
3260 ret = -TARGET_EFAULT;
3261 goto fail;
3262 }
pbrook1be9e1d2006-11-19 15:26:04 +00003263 }
3264 unlock_user(host_msg, msg, len);
3265 } else {
bellard2f619692007-11-16 10:46:05 +00003266fail:
pbrook1be9e1d2006-11-19 15:26:04 +00003267 unlock_user(host_msg, msg, 0);
3268 }
3269 return ret;
3270}
3271
j_mayer32407102007-09-26 23:01:49 +00003272#ifdef TARGET_NR_socketcall
ths0da46a62007-10-20 20:23:07 +00003273/* do_socketcall() Must return target values and target errnos. */
blueswir1992f48a2007-10-14 16:27:31 +00003274static abi_long do_socketcall(int num, abi_ulong vptr)
bellard31e31b82003-02-18 22:55:36 +00003275{
Michael Tokarev62dc90c2014-01-17 14:23:51 +04003276 static const unsigned ac[] = { /* number of arguments per call */
3277 [SOCKOP_socket] = 3, /* domain, type, protocol */
3278 [SOCKOP_bind] = 3, /* sockfd, addr, addrlen */
3279 [SOCKOP_connect] = 3, /* sockfd, addr, addrlen */
3280 [SOCKOP_listen] = 2, /* sockfd, backlog */
3281 [SOCKOP_accept] = 3, /* sockfd, addr, addrlen */
3282 [SOCKOP_accept4] = 4, /* sockfd, addr, addrlen, flags */
3283 [SOCKOP_getsockname] = 3, /* sockfd, addr, addrlen */
3284 [SOCKOP_getpeername] = 3, /* sockfd, addr, addrlen */
3285 [SOCKOP_socketpair] = 4, /* domain, type, protocol, tab */
3286 [SOCKOP_send] = 4, /* sockfd, msg, len, flags */
3287 [SOCKOP_recv] = 4, /* sockfd, msg, len, flags */
3288 [SOCKOP_sendto] = 6, /* sockfd, msg, len, flags, addr, addrlen */
3289 [SOCKOP_recvfrom] = 6, /* sockfd, msg, len, flags, addr, addrlen */
3290 [SOCKOP_shutdown] = 2, /* sockfd, how */
3291 [SOCKOP_sendmsg] = 3, /* sockfd, msg, flags */
3292 [SOCKOP_recvmsg] = 3, /* sockfd, msg, flags */
John Paul Adrian Glaubitz5a53dc52015-12-24 19:59:59 +01003293 [SOCKOP_sendmmsg] = 4, /* sockfd, msgvec, vlen, flags */
3294 [SOCKOP_recvmmsg] = 4, /* sockfd, msgvec, vlen, flags */
Michael Tokarev62dc90c2014-01-17 14:23:51 +04003295 [SOCKOP_setsockopt] = 5, /* sockfd, level, optname, optval, optlen */
3296 [SOCKOP_getsockopt] = 5, /* sockfd, level, optname, optval, optlen */
3297 };
3298 abi_long a[6]; /* max 6 args */
bellard31e31b82003-02-18 22:55:36 +00003299
Michael Tokarev62dc90c2014-01-17 14:23:51 +04003300 /* first, collect the arguments in a[] according to ac[] */
3301 if (num >= 0 && num < ARRAY_SIZE(ac)) {
3302 unsigned i;
3303 assert(ARRAY_SIZE(a) >= ac[num]); /* ensure we have space for args */
3304 for (i = 0; i < ac[num]; ++i) {
3305 if (get_user_ual(a[i], vptr + i * sizeof(abi_long)) != 0) {
André Hentschelb9d36eb2014-01-06 20:18:52 +01003306 return -TARGET_EFAULT;
3307 }
André Hentschelb9d36eb2014-01-06 20:18:52 +01003308 }
Michael Tokarev62dc90c2014-01-17 14:23:51 +04003309 }
bellard2f619692007-11-16 10:46:05 +00003310
Michael Tokarev62dc90c2014-01-17 14:23:51 +04003311 /* now when we have the args, actually handle the call */
3312 switch (num) {
3313 case SOCKOP_socket: /* domain, type, protocol */
3314 return do_socket(a[0], a[1], a[2]);
3315 case SOCKOP_bind: /* sockfd, addr, addrlen */
3316 return do_bind(a[0], a[1], a[2]);
3317 case SOCKOP_connect: /* sockfd, addr, addrlen */
3318 return do_connect(a[0], a[1], a[2]);
3319 case SOCKOP_listen: /* sockfd, backlog */
3320 return get_errno(listen(a[0], a[1]));
3321 case SOCKOP_accept: /* sockfd, addr, addrlen */
3322 return do_accept4(a[0], a[1], a[2], 0);
3323 case SOCKOP_accept4: /* sockfd, addr, addrlen, flags */
3324 return do_accept4(a[0], a[1], a[2], a[3]);
3325 case SOCKOP_getsockname: /* sockfd, addr, addrlen */
3326 return do_getsockname(a[0], a[1], a[2]);
3327 case SOCKOP_getpeername: /* sockfd, addr, addrlen */
3328 return do_getpeername(a[0], a[1], a[2]);
3329 case SOCKOP_socketpair: /* domain, type, protocol, tab */
3330 return do_socketpair(a[0], a[1], a[2], a[3]);
3331 case SOCKOP_send: /* sockfd, msg, len, flags */
3332 return do_sendto(a[0], a[1], a[2], a[3], 0, 0);
3333 case SOCKOP_recv: /* sockfd, msg, len, flags */
3334 return do_recvfrom(a[0], a[1], a[2], a[3], 0, 0);
3335 case SOCKOP_sendto: /* sockfd, msg, len, flags, addr, addrlen */
3336 return do_sendto(a[0], a[1], a[2], a[3], a[4], a[5]);
3337 case SOCKOP_recvfrom: /* sockfd, msg, len, flags, addr, addrlen */
3338 return do_recvfrom(a[0], a[1], a[2], a[3], a[4], a[5]);
3339 case SOCKOP_shutdown: /* sockfd, how */
3340 return get_errno(shutdown(a[0], a[1]));
3341 case SOCKOP_sendmsg: /* sockfd, msg, flags */
3342 return do_sendrecvmsg(a[0], a[1], a[2], 1);
3343 case SOCKOP_recvmsg: /* sockfd, msg, flags */
3344 return do_sendrecvmsg(a[0], a[1], a[2], 0);
John Paul Adrian Glaubitz5a53dc52015-12-24 19:59:59 +01003345 case SOCKOP_sendmmsg: /* sockfd, msgvec, vlen, flags */
3346 return do_sendrecvmmsg(a[0], a[1], a[2], a[3], 1);
3347 case SOCKOP_recvmmsg: /* sockfd, msgvec, vlen, flags */
3348 return do_sendrecvmmsg(a[0], a[1], a[2], a[3], 0);
Michael Tokarev62dc90c2014-01-17 14:23:51 +04003349 case SOCKOP_setsockopt: /* sockfd, level, optname, optval, optlen */
3350 return do_setsockopt(a[0], a[1], a[2], a[3], a[4]);
3351 case SOCKOP_getsockopt: /* sockfd, level, optname, optval, optlen */
3352 return do_getsockopt(a[0], a[1], a[2], a[3], a[4]);
bellard31e31b82003-02-18 22:55:36 +00003353 default:
3354 gemu_log("Unsupported socketcall: %d\n", num);
Michael Tokarev62dc90c2014-01-17 14:23:51 +04003355 return -TARGET_ENOSYS;
bellard31e31b82003-02-18 22:55:36 +00003356 }
bellard31e31b82003-02-18 22:55:36 +00003357}
j_mayer32407102007-09-26 23:01:49 +00003358#endif
bellard31e31b82003-02-18 22:55:36 +00003359
bellard8853f862004-02-22 14:57:26 +00003360#define N_SHM_REGIONS 32
3361
3362static struct shm_region {
Peter Maydellb6e17872016-02-09 15:57:11 +00003363 abi_ulong start;
3364 abi_ulong size;
3365 bool in_use;
bellard8853f862004-02-22 14:57:26 +00003366} shm_regions[N_SHM_REGIONS];
3367
ths3eb6b042007-06-03 14:26:27 +00003368struct target_semid_ds
3369{
3370 struct target_ipc_perm sem_perm;
blueswir1992f48a2007-10-14 16:27:31 +00003371 abi_ulong sem_otime;
Tom Musta03527342014-08-12 13:53:32 -05003372#if !defined(TARGET_PPC64)
blueswir1992f48a2007-10-14 16:27:31 +00003373 abi_ulong __unused1;
Tom Musta03527342014-08-12 13:53:32 -05003374#endif
blueswir1992f48a2007-10-14 16:27:31 +00003375 abi_ulong sem_ctime;
Tom Musta03527342014-08-12 13:53:32 -05003376#if !defined(TARGET_PPC64)
blueswir1992f48a2007-10-14 16:27:31 +00003377 abi_ulong __unused2;
Tom Musta03527342014-08-12 13:53:32 -05003378#endif
blueswir1992f48a2007-10-14 16:27:31 +00003379 abi_ulong sem_nsems;
3380 abi_ulong __unused3;
3381 abi_ulong __unused4;
ths3eb6b042007-06-03 14:26:27 +00003382};
3383
bellard579a97f2007-11-11 14:26:47 +00003384static inline abi_long target_to_host_ipc_perm(struct ipc_perm *host_ip,
3385 abi_ulong target_addr)
ths3eb6b042007-06-03 14:26:27 +00003386{
3387 struct target_ipc_perm *target_ip;
3388 struct target_semid_ds *target_sd;
3389
bellard579a97f2007-11-11 14:26:47 +00003390 if (!lock_user_struct(VERIFY_READ, target_sd, target_addr, 1))
3391 return -TARGET_EFAULT;
Michael S. Tsirkine8bbe362009-09-30 18:56:44 +00003392 target_ip = &(target_sd->sem_perm);
Petar Jovanovic55a2b162013-10-30 14:46:31 +01003393 host_ip->__key = tswap32(target_ip->__key);
3394 host_ip->uid = tswap32(target_ip->uid);
3395 host_ip->gid = tswap32(target_ip->gid);
3396 host_ip->cuid = tswap32(target_ip->cuid);
3397 host_ip->cgid = tswap32(target_ip->cgid);
3398#if defined(TARGET_ALPHA) || defined(TARGET_MIPS) || defined(TARGET_PPC)
3399 host_ip->mode = tswap32(target_ip->mode);
3400#else
Matthias Brauncbb21ee2011-08-12 19:57:41 +02003401 host_ip->mode = tswap16(target_ip->mode);
Petar Jovanovic55a2b162013-10-30 14:46:31 +01003402#endif
3403#if defined(TARGET_PPC)
3404 host_ip->__seq = tswap32(target_ip->__seq);
3405#else
3406 host_ip->__seq = tswap16(target_ip->__seq);
3407#endif
ths3eb6b042007-06-03 14:26:27 +00003408 unlock_user_struct(target_sd, target_addr, 0);
bellard579a97f2007-11-11 14:26:47 +00003409 return 0;
ths3eb6b042007-06-03 14:26:27 +00003410}
3411
bellard579a97f2007-11-11 14:26:47 +00003412static inline abi_long host_to_target_ipc_perm(abi_ulong target_addr,
3413 struct ipc_perm *host_ip)
ths3eb6b042007-06-03 14:26:27 +00003414{
3415 struct target_ipc_perm *target_ip;
3416 struct target_semid_ds *target_sd;
3417
bellard579a97f2007-11-11 14:26:47 +00003418 if (!lock_user_struct(VERIFY_WRITE, target_sd, target_addr, 0))
3419 return -TARGET_EFAULT;
ths3eb6b042007-06-03 14:26:27 +00003420 target_ip = &(target_sd->sem_perm);
Petar Jovanovic55a2b162013-10-30 14:46:31 +01003421 target_ip->__key = tswap32(host_ip->__key);
3422 target_ip->uid = tswap32(host_ip->uid);
3423 target_ip->gid = tswap32(host_ip->gid);
3424 target_ip->cuid = tswap32(host_ip->cuid);
3425 target_ip->cgid = tswap32(host_ip->cgid);
3426#if defined(TARGET_ALPHA) || defined(TARGET_MIPS) || defined(TARGET_PPC)
3427 target_ip->mode = tswap32(host_ip->mode);
3428#else
Matthias Brauncbb21ee2011-08-12 19:57:41 +02003429 target_ip->mode = tswap16(host_ip->mode);
Petar Jovanovic55a2b162013-10-30 14:46:31 +01003430#endif
3431#if defined(TARGET_PPC)
3432 target_ip->__seq = tswap32(host_ip->__seq);
3433#else
3434 target_ip->__seq = tswap16(host_ip->__seq);
3435#endif
ths3eb6b042007-06-03 14:26:27 +00003436 unlock_user_struct(target_sd, target_addr, 1);
bellard579a97f2007-11-11 14:26:47 +00003437 return 0;
ths3eb6b042007-06-03 14:26:27 +00003438}
3439
bellard579a97f2007-11-11 14:26:47 +00003440static inline abi_long target_to_host_semid_ds(struct semid_ds *host_sd,
3441 abi_ulong target_addr)
ths3eb6b042007-06-03 14:26:27 +00003442{
3443 struct target_semid_ds *target_sd;
3444
bellard579a97f2007-11-11 14:26:47 +00003445 if (!lock_user_struct(VERIFY_READ, target_sd, target_addr, 1))
3446 return -TARGET_EFAULT;
aurel32e5289082009-04-18 16:16:12 +00003447 if (target_to_host_ipc_perm(&(host_sd->sem_perm),target_addr))
3448 return -TARGET_EFAULT;
Matthias Brauncbb21ee2011-08-12 19:57:41 +02003449 host_sd->sem_nsems = tswapal(target_sd->sem_nsems);
3450 host_sd->sem_otime = tswapal(target_sd->sem_otime);
3451 host_sd->sem_ctime = tswapal(target_sd->sem_ctime);
ths3eb6b042007-06-03 14:26:27 +00003452 unlock_user_struct(target_sd, target_addr, 0);
bellard579a97f2007-11-11 14:26:47 +00003453 return 0;
ths3eb6b042007-06-03 14:26:27 +00003454}
3455
bellard579a97f2007-11-11 14:26:47 +00003456static inline abi_long host_to_target_semid_ds(abi_ulong target_addr,
3457 struct semid_ds *host_sd)
ths3eb6b042007-06-03 14:26:27 +00003458{
3459 struct target_semid_ds *target_sd;
3460
bellard579a97f2007-11-11 14:26:47 +00003461 if (!lock_user_struct(VERIFY_WRITE, target_sd, target_addr, 0))
3462 return -TARGET_EFAULT;
aurel32e5289082009-04-18 16:16:12 +00003463 if (host_to_target_ipc_perm(target_addr,&(host_sd->sem_perm)))
Dong Xu Wang3a931132011-11-29 16:52:38 +08003464 return -TARGET_EFAULT;
Matthias Brauncbb21ee2011-08-12 19:57:41 +02003465 target_sd->sem_nsems = tswapal(host_sd->sem_nsems);
3466 target_sd->sem_otime = tswapal(host_sd->sem_otime);
3467 target_sd->sem_ctime = tswapal(host_sd->sem_ctime);
ths3eb6b042007-06-03 14:26:27 +00003468 unlock_user_struct(target_sd, target_addr, 1);
bellard579a97f2007-11-11 14:26:47 +00003469 return 0;
ths3eb6b042007-06-03 14:26:27 +00003470}
3471
aurel32e5289082009-04-18 16:16:12 +00003472struct target_seminfo {
3473 int semmap;
3474 int semmni;
3475 int semmns;
3476 int semmnu;
3477 int semmsl;
3478 int semopm;
3479 int semume;
3480 int semusz;
3481 int semvmx;
3482 int semaem;
3483};
3484
3485static inline abi_long host_to_target_seminfo(abi_ulong target_addr,
3486 struct seminfo *host_seminfo)
3487{
3488 struct target_seminfo *target_seminfo;
3489 if (!lock_user_struct(VERIFY_WRITE, target_seminfo, target_addr, 0))
3490 return -TARGET_EFAULT;
3491 __put_user(host_seminfo->semmap, &target_seminfo->semmap);
3492 __put_user(host_seminfo->semmni, &target_seminfo->semmni);
3493 __put_user(host_seminfo->semmns, &target_seminfo->semmns);
3494 __put_user(host_seminfo->semmnu, &target_seminfo->semmnu);
3495 __put_user(host_seminfo->semmsl, &target_seminfo->semmsl);
3496 __put_user(host_seminfo->semopm, &target_seminfo->semopm);
3497 __put_user(host_seminfo->semume, &target_seminfo->semume);
3498 __put_user(host_seminfo->semusz, &target_seminfo->semusz);
3499 __put_user(host_seminfo->semvmx, &target_seminfo->semvmx);
3500 __put_user(host_seminfo->semaem, &target_seminfo->semaem);
3501 unlock_user_struct(target_seminfo, target_addr, 1);
3502 return 0;
3503}
3504
thsfa294812007-02-02 22:05:00 +00003505union semun {
3506 int val;
ths3eb6b042007-06-03 14:26:27 +00003507 struct semid_ds *buf;
thsfa294812007-02-02 22:05:00 +00003508 unsigned short *array;
aurel32e5289082009-04-18 16:16:12 +00003509 struct seminfo *__buf;
thsfa294812007-02-02 22:05:00 +00003510};
3511
ths3eb6b042007-06-03 14:26:27 +00003512union target_semun {
3513 int val;
aurel32e5289082009-04-18 16:16:12 +00003514 abi_ulong buf;
3515 abi_ulong array;
3516 abi_ulong __buf;
ths3eb6b042007-06-03 14:26:27 +00003517};
3518
aurel32e5289082009-04-18 16:16:12 +00003519static inline abi_long target_to_host_semarray(int semid, unsigned short **host_array,
3520 abi_ulong target_addr)
ths3eb6b042007-06-03 14:26:27 +00003521{
aurel32e5289082009-04-18 16:16:12 +00003522 int nsems;
3523 unsigned short *array;
3524 union semun semun;
3525 struct semid_ds semid_ds;
3526 int i, ret;
ths3eb6b042007-06-03 14:26:27 +00003527
aurel32e5289082009-04-18 16:16:12 +00003528 semun.buf = &semid_ds;
3529
3530 ret = semctl(semid, 0, IPC_STAT, semun);
3531 if (ret == -1)
3532 return get_errno(ret);
3533
3534 nsems = semid_ds.sem_nsems;
3535
Harmandeep Kaur0e173b22015-10-06 21:47:12 +05303536 *host_array = g_try_new(unsigned short, nsems);
Peter Maydell69d4c702014-02-17 18:55:34 +00003537 if (!*host_array) {
3538 return -TARGET_ENOMEM;
3539 }
aurel32e5289082009-04-18 16:16:12 +00003540 array = lock_user(VERIFY_READ, target_addr,
3541 nsems*sizeof(unsigned short), 1);
Peter Maydell69d4c702014-02-17 18:55:34 +00003542 if (!array) {
Harmandeep Kaur0e173b22015-10-06 21:47:12 +05303543 g_free(*host_array);
aurel32e5289082009-04-18 16:16:12 +00003544 return -TARGET_EFAULT;
Peter Maydell69d4c702014-02-17 18:55:34 +00003545 }
aurel32e5289082009-04-18 16:16:12 +00003546
3547 for(i=0; i<nsems; i++) {
3548 __get_user((*host_array)[i], &array[i]);
ths3eb6b042007-06-03 14:26:27 +00003549 }
aurel32e5289082009-04-18 16:16:12 +00003550 unlock_user(array, target_addr, 0);
3551
bellard579a97f2007-11-11 14:26:47 +00003552 return 0;
ths3eb6b042007-06-03 14:26:27 +00003553}
3554
aurel32e5289082009-04-18 16:16:12 +00003555static inline abi_long host_to_target_semarray(int semid, abi_ulong target_addr,
3556 unsigned short **host_array)
ths3eb6b042007-06-03 14:26:27 +00003557{
aurel32e5289082009-04-18 16:16:12 +00003558 int nsems;
3559 unsigned short *array;
3560 union semun semun;
3561 struct semid_ds semid_ds;
3562 int i, ret;
ths3eb6b042007-06-03 14:26:27 +00003563
aurel32e5289082009-04-18 16:16:12 +00003564 semun.buf = &semid_ds;
3565
3566 ret = semctl(semid, 0, IPC_STAT, semun);
3567 if (ret == -1)
3568 return get_errno(ret);
3569
3570 nsems = semid_ds.sem_nsems;
3571
3572 array = lock_user(VERIFY_WRITE, target_addr,
3573 nsems*sizeof(unsigned short), 0);
3574 if (!array)
3575 return -TARGET_EFAULT;
3576
3577 for(i=0; i<nsems; i++) {
3578 __put_user((*host_array)[i], &array[i]);
ths3eb6b042007-06-03 14:26:27 +00003579 }
Harmandeep Kaur0e173b22015-10-06 21:47:12 +05303580 g_free(*host_array);
aurel32e5289082009-04-18 16:16:12 +00003581 unlock_user(array, target_addr, 1);
3582
bellard579a97f2007-11-11 14:26:47 +00003583 return 0;
ths3eb6b042007-06-03 14:26:27 +00003584}
3585
aurel32e5289082009-04-18 16:16:12 +00003586static inline abi_long do_semctl(int semid, int semnum, int cmd,
Stefan Weild1c002b2015-02-08 15:40:58 +01003587 abi_ulong target_arg)
ths3eb6b042007-06-03 14:26:27 +00003588{
Stefan Weild1c002b2015-02-08 15:40:58 +01003589 union target_semun target_su = { .buf = target_arg };
ths3eb6b042007-06-03 14:26:27 +00003590 union semun arg;
3591 struct semid_ds dsarg;
vibi sreenivasan7b8118e2009-06-19 13:34:39 +05303592 unsigned short *array = NULL;
aurel32e5289082009-04-18 16:16:12 +00003593 struct seminfo seminfo;
3594 abi_long ret = -TARGET_EINVAL;
3595 abi_long err;
3596 cmd &= 0xff;
ths3eb6b042007-06-03 14:26:27 +00003597
3598 switch( cmd ) {
3599 case GETVAL:
ths3eb6b042007-06-03 14:26:27 +00003600 case SETVAL:
Tom Musta5464bae2014-08-12 13:53:34 -05003601 /* In 64 bit cross-endian situations, we will erroneously pick up
3602 * the wrong half of the union for the "val" element. To rectify
3603 * this, the entire 8-byte structure is byteswapped, followed by
3604 * a swap of the 4 byte val field. In other cases, the data is
3605 * already in proper host byte order. */
3606 if (sizeof(target_su.val) != (sizeof(target_su.buf))) {
3607 target_su.buf = tswapal(target_su.buf);
3608 arg.val = tswap32(target_su.val);
3609 } else {
3610 arg.val = target_su.val;
3611 }
aurel32e5289082009-04-18 16:16:12 +00003612 ret = get_errno(semctl(semid, semnum, cmd, arg));
ths3eb6b042007-06-03 14:26:27 +00003613 break;
3614 case GETALL:
ths3eb6b042007-06-03 14:26:27 +00003615 case SETALL:
aurel32e5289082009-04-18 16:16:12 +00003616 err = target_to_host_semarray(semid, &array, target_su.array);
3617 if (err)
3618 return err;
3619 arg.array = array;
3620 ret = get_errno(semctl(semid, semnum, cmd, arg));
3621 err = host_to_target_semarray(semid, target_su.array, &array);
3622 if (err)
3623 return err;
ths3eb6b042007-06-03 14:26:27 +00003624 break;
3625 case IPC_STAT:
ths3eb6b042007-06-03 14:26:27 +00003626 case IPC_SET:
aurel32e5289082009-04-18 16:16:12 +00003627 case SEM_STAT:
3628 err = target_to_host_semid_ds(&dsarg, target_su.buf);
3629 if (err)
3630 return err;
3631 arg.buf = &dsarg;
3632 ret = get_errno(semctl(semid, semnum, cmd, arg));
3633 err = host_to_target_semid_ds(target_su.buf, &dsarg);
3634 if (err)
3635 return err;
ths3eb6b042007-06-03 14:26:27 +00003636 break;
aurel32e5289082009-04-18 16:16:12 +00003637 case IPC_INFO:
3638 case SEM_INFO:
3639 arg.__buf = &seminfo;
3640 ret = get_errno(semctl(semid, semnum, cmd, arg));
3641 err = host_to_target_seminfo(target_su.__buf, &seminfo);
3642 if (err)
3643 return err;
3644 break;
3645 case IPC_RMID:
3646 case GETPID:
3647 case GETNCNT:
3648 case GETZCNT:
3649 ret = get_errno(semctl(semid, semnum, cmd, NULL));
3650 break;
ths3eb6b042007-06-03 14:26:27 +00003651 }
3652
3653 return ret;
3654}
3655
aurel32e5289082009-04-18 16:16:12 +00003656struct target_sembuf {
3657 unsigned short sem_num;
3658 short sem_op;
3659 short sem_flg;
3660};
3661
3662static inline abi_long target_to_host_sembuf(struct sembuf *host_sembuf,
3663 abi_ulong target_addr,
3664 unsigned nsops)
3665{
3666 struct target_sembuf *target_sembuf;
3667 int i;
3668
3669 target_sembuf = lock_user(VERIFY_READ, target_addr,
3670 nsops*sizeof(struct target_sembuf), 1);
3671 if (!target_sembuf)
3672 return -TARGET_EFAULT;
3673
3674 for(i=0; i<nsops; i++) {
3675 __get_user(host_sembuf[i].sem_num, &target_sembuf[i].sem_num);
3676 __get_user(host_sembuf[i].sem_op, &target_sembuf[i].sem_op);
3677 __get_user(host_sembuf[i].sem_flg, &target_sembuf[i].sem_flg);
3678 }
3679
3680 unlock_user(target_sembuf, target_addr, 0);
3681
3682 return 0;
3683}
3684
3685static inline abi_long do_semop(int semid, abi_long ptr, unsigned nsops)
3686{
3687 struct sembuf sops[nsops];
3688
3689 if (target_to_host_sembuf(sops, ptr, nsops))
3690 return -TARGET_EFAULT;
3691
Peter Maydellffb7ee72016-06-06 19:58:12 +01003692 return get_errno(safe_semtimedop(semid, sops, nsops, NULL));
aurel32e5289082009-04-18 16:16:12 +00003693}
3694
ths1bc012f2007-06-03 14:27:49 +00003695struct target_msqid_ds
3696{
aurel321c54ff92008-10-13 21:08:44 +00003697 struct target_ipc_perm msg_perm;
3698 abi_ulong msg_stime;
3699#if TARGET_ABI_BITS == 32
3700 abi_ulong __unused1;
3701#endif
3702 abi_ulong msg_rtime;
3703#if TARGET_ABI_BITS == 32
3704 abi_ulong __unused2;
3705#endif
3706 abi_ulong msg_ctime;
3707#if TARGET_ABI_BITS == 32
3708 abi_ulong __unused3;
3709#endif
3710 abi_ulong __msg_cbytes;
3711 abi_ulong msg_qnum;
3712 abi_ulong msg_qbytes;
3713 abi_ulong msg_lspid;
3714 abi_ulong msg_lrpid;
3715 abi_ulong __unused4;
3716 abi_ulong __unused5;
ths1bc012f2007-06-03 14:27:49 +00003717};
3718
bellard579a97f2007-11-11 14:26:47 +00003719static inline abi_long target_to_host_msqid_ds(struct msqid_ds *host_md,
3720 abi_ulong target_addr)
ths1bc012f2007-06-03 14:27:49 +00003721{
3722 struct target_msqid_ds *target_md;
3723
bellard579a97f2007-11-11 14:26:47 +00003724 if (!lock_user_struct(VERIFY_READ, target_md, target_addr, 1))
3725 return -TARGET_EFAULT;
aurel321c54ff92008-10-13 21:08:44 +00003726 if (target_to_host_ipc_perm(&(host_md->msg_perm),target_addr))
3727 return -TARGET_EFAULT;
Matthias Brauncbb21ee2011-08-12 19:57:41 +02003728 host_md->msg_stime = tswapal(target_md->msg_stime);
3729 host_md->msg_rtime = tswapal(target_md->msg_rtime);
3730 host_md->msg_ctime = tswapal(target_md->msg_ctime);
3731 host_md->__msg_cbytes = tswapal(target_md->__msg_cbytes);
3732 host_md->msg_qnum = tswapal(target_md->msg_qnum);
3733 host_md->msg_qbytes = tswapal(target_md->msg_qbytes);
3734 host_md->msg_lspid = tswapal(target_md->msg_lspid);
3735 host_md->msg_lrpid = tswapal(target_md->msg_lrpid);
ths1bc012f2007-06-03 14:27:49 +00003736 unlock_user_struct(target_md, target_addr, 0);
bellard579a97f2007-11-11 14:26:47 +00003737 return 0;
ths1bc012f2007-06-03 14:27:49 +00003738}
3739
bellard579a97f2007-11-11 14:26:47 +00003740static inline abi_long host_to_target_msqid_ds(abi_ulong target_addr,
3741 struct msqid_ds *host_md)
ths1bc012f2007-06-03 14:27:49 +00003742{
3743 struct target_msqid_ds *target_md;
3744
bellard579a97f2007-11-11 14:26:47 +00003745 if (!lock_user_struct(VERIFY_WRITE, target_md, target_addr, 0))
3746 return -TARGET_EFAULT;
aurel321c54ff92008-10-13 21:08:44 +00003747 if (host_to_target_ipc_perm(target_addr,&(host_md->msg_perm)))
3748 return -TARGET_EFAULT;
Matthias Brauncbb21ee2011-08-12 19:57:41 +02003749 target_md->msg_stime = tswapal(host_md->msg_stime);
3750 target_md->msg_rtime = tswapal(host_md->msg_rtime);
3751 target_md->msg_ctime = tswapal(host_md->msg_ctime);
3752 target_md->__msg_cbytes = tswapal(host_md->__msg_cbytes);
3753 target_md->msg_qnum = tswapal(host_md->msg_qnum);
3754 target_md->msg_qbytes = tswapal(host_md->msg_qbytes);
3755 target_md->msg_lspid = tswapal(host_md->msg_lspid);
3756 target_md->msg_lrpid = tswapal(host_md->msg_lrpid);
ths1bc012f2007-06-03 14:27:49 +00003757 unlock_user_struct(target_md, target_addr, 1);
bellard579a97f2007-11-11 14:26:47 +00003758 return 0;
ths1bc012f2007-06-03 14:27:49 +00003759}
3760
aurel321c54ff92008-10-13 21:08:44 +00003761struct target_msginfo {
3762 int msgpool;
3763 int msgmap;
3764 int msgmax;
3765 int msgmnb;
3766 int msgmni;
3767 int msgssz;
3768 int msgtql;
3769 unsigned short int msgseg;
3770};
3771
3772static inline abi_long host_to_target_msginfo(abi_ulong target_addr,
3773 struct msginfo *host_msginfo)
3774{
3775 struct target_msginfo *target_msginfo;
3776 if (!lock_user_struct(VERIFY_WRITE, target_msginfo, target_addr, 0))
3777 return -TARGET_EFAULT;
3778 __put_user(host_msginfo->msgpool, &target_msginfo->msgpool);
3779 __put_user(host_msginfo->msgmap, &target_msginfo->msgmap);
3780 __put_user(host_msginfo->msgmax, &target_msginfo->msgmax);
3781 __put_user(host_msginfo->msgmnb, &target_msginfo->msgmnb);
3782 __put_user(host_msginfo->msgmni, &target_msginfo->msgmni);
3783 __put_user(host_msginfo->msgssz, &target_msginfo->msgssz);
3784 __put_user(host_msginfo->msgtql, &target_msginfo->msgtql);
3785 __put_user(host_msginfo->msgseg, &target_msginfo->msgseg);
3786 unlock_user_struct(target_msginfo, target_addr, 1);
aurel3200b229a2008-10-24 13:12:52 +00003787 return 0;
aurel321c54ff92008-10-13 21:08:44 +00003788}
3789
3790static inline abi_long do_msgctl(int msgid, int cmd, abi_long ptr)
ths1bc012f2007-06-03 14:27:49 +00003791{
3792 struct msqid_ds dsarg;
aurel321c54ff92008-10-13 21:08:44 +00003793 struct msginfo msginfo;
3794 abi_long ret = -TARGET_EINVAL;
3795
3796 cmd &= 0xff;
3797
3798 switch (cmd) {
ths1bc012f2007-06-03 14:27:49 +00003799 case IPC_STAT:
3800 case IPC_SET:
aurel321c54ff92008-10-13 21:08:44 +00003801 case MSG_STAT:
3802 if (target_to_host_msqid_ds(&dsarg,ptr))
3803 return -TARGET_EFAULT;
3804 ret = get_errno(msgctl(msgid, cmd, &dsarg));
3805 if (host_to_target_msqid_ds(ptr,&dsarg))
3806 return -TARGET_EFAULT;
3807 break;
3808 case IPC_RMID:
3809 ret = get_errno(msgctl(msgid, cmd, NULL));
3810 break;
3811 case IPC_INFO:
3812 case MSG_INFO:
3813 ret = get_errno(msgctl(msgid, cmd, (struct msqid_ds *)&msginfo));
3814 if (host_to_target_msginfo(ptr, &msginfo))
3815 return -TARGET_EFAULT;
3816 break;
ths1bc012f2007-06-03 14:27:49 +00003817 }
aurel321c54ff92008-10-13 21:08:44 +00003818
ths1bc012f2007-06-03 14:27:49 +00003819 return ret;
3820}
3821
3822struct target_msgbuf {
aurel321c54ff92008-10-13 21:08:44 +00003823 abi_long mtype;
3824 char mtext[1];
ths1bc012f2007-06-03 14:27:49 +00003825};
3826
blueswir1992f48a2007-10-14 16:27:31 +00003827static inline abi_long do_msgsnd(int msqid, abi_long msgp,
Tom Mustaedcc5f92014-08-12 13:53:37 -05003828 ssize_t msgsz, int msgflg)
ths1bc012f2007-06-03 14:27:49 +00003829{
3830 struct target_msgbuf *target_mb;
3831 struct msgbuf *host_mb;
blueswir1992f48a2007-10-14 16:27:31 +00003832 abi_long ret = 0;
ths1bc012f2007-06-03 14:27:49 +00003833
Tom Mustaedcc5f92014-08-12 13:53:37 -05003834 if (msgsz < 0) {
3835 return -TARGET_EINVAL;
3836 }
3837
bellard579a97f2007-11-11 14:26:47 +00003838 if (!lock_user_struct(VERIFY_READ, target_mb, msgp, 0))
3839 return -TARGET_EFAULT;
Harmandeep Kaur0e173b22015-10-06 21:47:12 +05303840 host_mb = g_try_malloc(msgsz + sizeof(long));
zhanghailiang29e03fc2014-08-14 15:29:18 +08003841 if (!host_mb) {
3842 unlock_user_struct(target_mb, msgp, 0);
3843 return -TARGET_ENOMEM;
3844 }
Matthias Brauncbb21ee2011-08-12 19:57:41 +02003845 host_mb->mtype = (abi_long) tswapal(target_mb->mtype);
aurel321c54ff92008-10-13 21:08:44 +00003846 memcpy(host_mb->mtext, target_mb->mtext, msgsz);
Peter Maydell89f9fe42016-06-06 19:58:05 +01003847 ret = get_errno(safe_msgsnd(msqid, host_mb, msgsz, msgflg));
Harmandeep Kaur0e173b22015-10-06 21:47:12 +05303848 g_free(host_mb);
ths1bc012f2007-06-03 14:27:49 +00003849 unlock_user_struct(target_mb, msgp, 0);
3850
3851 return ret;
3852}
3853
blueswir1992f48a2007-10-14 16:27:31 +00003854static inline abi_long do_msgrcv(int msqid, abi_long msgp,
Peter Maydell99874f62016-05-20 19:00:56 +01003855 ssize_t msgsz, abi_long msgtyp,
blueswir1992f48a2007-10-14 16:27:31 +00003856 int msgflg)
ths1bc012f2007-06-03 14:27:49 +00003857{
3858 struct target_msgbuf *target_mb;
bellard579a97f2007-11-11 14:26:47 +00003859 char *target_mtext;
ths1bc012f2007-06-03 14:27:49 +00003860 struct msgbuf *host_mb;
blueswir1992f48a2007-10-14 16:27:31 +00003861 abi_long ret = 0;
ths1bc012f2007-06-03 14:27:49 +00003862
Peter Maydell99874f62016-05-20 19:00:56 +01003863 if (msgsz < 0) {
3864 return -TARGET_EINVAL;
3865 }
3866
bellard579a97f2007-11-11 14:26:47 +00003867 if (!lock_user_struct(VERIFY_WRITE, target_mb, msgp, 0))
3868 return -TARGET_EFAULT;
aurel321c54ff92008-10-13 21:08:44 +00003869
Peter Maydell415d8472016-05-20 19:00:57 +01003870 host_mb = g_try_malloc(msgsz + sizeof(long));
3871 if (!host_mb) {
3872 ret = -TARGET_ENOMEM;
3873 goto end;
3874 }
Peter Maydell89f9fe42016-06-06 19:58:05 +01003875 ret = get_errno(safe_msgrcv(msqid, host_mb, msgsz, msgtyp, msgflg));
aurel321c54ff92008-10-13 21:08:44 +00003876
bellard579a97f2007-11-11 14:26:47 +00003877 if (ret > 0) {
3878 abi_ulong target_mtext_addr = msgp + sizeof(abi_ulong);
3879 target_mtext = lock_user(VERIFY_WRITE, target_mtext_addr, ret, 0);
3880 if (!target_mtext) {
3881 ret = -TARGET_EFAULT;
3882 goto end;
3883 }
aurel321c54ff92008-10-13 21:08:44 +00003884 memcpy(target_mb->mtext, host_mb->mtext, ret);
bellard579a97f2007-11-11 14:26:47 +00003885 unlock_user(target_mtext, target_mtext_addr, ret);
3886 }
aurel321c54ff92008-10-13 21:08:44 +00003887
Matthias Brauncbb21ee2011-08-12 19:57:41 +02003888 target_mb->mtype = tswapal(host_mb->mtype);
ths1bc012f2007-06-03 14:27:49 +00003889
bellard579a97f2007-11-11 14:26:47 +00003890end:
3891 if (target_mb)
3892 unlock_user_struct(target_mb, msgp, 1);
Jim Meyering0d07fe42012-08-22 13:55:53 +02003893 g_free(host_mb);
ths1bc012f2007-06-03 14:27:49 +00003894 return ret;
3895}
3896
Riku Voipio88a8c982009-04-03 10:42:00 +03003897static inline abi_long target_to_host_shmid_ds(struct shmid_ds *host_sd,
3898 abi_ulong target_addr)
3899{
3900 struct target_shmid_ds *target_sd;
3901
3902 if (!lock_user_struct(VERIFY_READ, target_sd, target_addr, 1))
3903 return -TARGET_EFAULT;
3904 if (target_to_host_ipc_perm(&(host_sd->shm_perm), target_addr))
3905 return -TARGET_EFAULT;
3906 __get_user(host_sd->shm_segsz, &target_sd->shm_segsz);
3907 __get_user(host_sd->shm_atime, &target_sd->shm_atime);
3908 __get_user(host_sd->shm_dtime, &target_sd->shm_dtime);
3909 __get_user(host_sd->shm_ctime, &target_sd->shm_ctime);
3910 __get_user(host_sd->shm_cpid, &target_sd->shm_cpid);
3911 __get_user(host_sd->shm_lpid, &target_sd->shm_lpid);
3912 __get_user(host_sd->shm_nattch, &target_sd->shm_nattch);
3913 unlock_user_struct(target_sd, target_addr, 0);
3914 return 0;
3915}
3916
3917static inline abi_long host_to_target_shmid_ds(abi_ulong target_addr,
3918 struct shmid_ds *host_sd)
3919{
3920 struct target_shmid_ds *target_sd;
3921
3922 if (!lock_user_struct(VERIFY_WRITE, target_sd, target_addr, 0))
3923 return -TARGET_EFAULT;
3924 if (host_to_target_ipc_perm(target_addr, &(host_sd->shm_perm)))
3925 return -TARGET_EFAULT;
3926 __put_user(host_sd->shm_segsz, &target_sd->shm_segsz);
3927 __put_user(host_sd->shm_atime, &target_sd->shm_atime);
3928 __put_user(host_sd->shm_dtime, &target_sd->shm_dtime);
3929 __put_user(host_sd->shm_ctime, &target_sd->shm_ctime);
3930 __put_user(host_sd->shm_cpid, &target_sd->shm_cpid);
3931 __put_user(host_sd->shm_lpid, &target_sd->shm_lpid);
3932 __put_user(host_sd->shm_nattch, &target_sd->shm_nattch);
3933 unlock_user_struct(target_sd, target_addr, 1);
3934 return 0;
3935}
3936
3937struct target_shminfo {
3938 abi_ulong shmmax;
3939 abi_ulong shmmin;
3940 abi_ulong shmmni;
3941 abi_ulong shmseg;
3942 abi_ulong shmall;
3943};
3944
3945static inline abi_long host_to_target_shminfo(abi_ulong target_addr,
3946 struct shminfo *host_shminfo)
3947{
3948 struct target_shminfo *target_shminfo;
3949 if (!lock_user_struct(VERIFY_WRITE, target_shminfo, target_addr, 0))
3950 return -TARGET_EFAULT;
3951 __put_user(host_shminfo->shmmax, &target_shminfo->shmmax);
3952 __put_user(host_shminfo->shmmin, &target_shminfo->shmmin);
3953 __put_user(host_shminfo->shmmni, &target_shminfo->shmmni);
3954 __put_user(host_shminfo->shmseg, &target_shminfo->shmseg);
3955 __put_user(host_shminfo->shmall, &target_shminfo->shmall);
3956 unlock_user_struct(target_shminfo, target_addr, 1);
3957 return 0;
3958}
3959
3960struct target_shm_info {
3961 int used_ids;
3962 abi_ulong shm_tot;
3963 abi_ulong shm_rss;
3964 abi_ulong shm_swp;
3965 abi_ulong swap_attempts;
3966 abi_ulong swap_successes;
3967};
3968
3969static inline abi_long host_to_target_shm_info(abi_ulong target_addr,
3970 struct shm_info *host_shm_info)
3971{
3972 struct target_shm_info *target_shm_info;
3973 if (!lock_user_struct(VERIFY_WRITE, target_shm_info, target_addr, 0))
3974 return -TARGET_EFAULT;
3975 __put_user(host_shm_info->used_ids, &target_shm_info->used_ids);
3976 __put_user(host_shm_info->shm_tot, &target_shm_info->shm_tot);
3977 __put_user(host_shm_info->shm_rss, &target_shm_info->shm_rss);
3978 __put_user(host_shm_info->shm_swp, &target_shm_info->shm_swp);
3979 __put_user(host_shm_info->swap_attempts, &target_shm_info->swap_attempts);
3980 __put_user(host_shm_info->swap_successes, &target_shm_info->swap_successes);
3981 unlock_user_struct(target_shm_info, target_addr, 1);
3982 return 0;
3983}
3984
3985static inline abi_long do_shmctl(int shmid, int cmd, abi_long buf)
3986{
3987 struct shmid_ds dsarg;
3988 struct shminfo shminfo;
3989 struct shm_info shm_info;
3990 abi_long ret = -TARGET_EINVAL;
3991
3992 cmd &= 0xff;
3993
3994 switch(cmd) {
3995 case IPC_STAT:
3996 case IPC_SET:
3997 case SHM_STAT:
3998 if (target_to_host_shmid_ds(&dsarg, buf))
3999 return -TARGET_EFAULT;
4000 ret = get_errno(shmctl(shmid, cmd, &dsarg));
4001 if (host_to_target_shmid_ds(buf, &dsarg))
4002 return -TARGET_EFAULT;
4003 break;
4004 case IPC_INFO:
4005 ret = get_errno(shmctl(shmid, cmd, (struct shmid_ds *)&shminfo));
4006 if (host_to_target_shminfo(buf, &shminfo))
4007 return -TARGET_EFAULT;
4008 break;
4009 case SHM_INFO:
4010 ret = get_errno(shmctl(shmid, cmd, (struct shmid_ds *)&shm_info));
4011 if (host_to_target_shm_info(buf, &shm_info))
4012 return -TARGET_EFAULT;
4013 break;
4014 case IPC_RMID:
4015 case SHM_LOCK:
4016 case SHM_UNLOCK:
4017 ret = get_errno(shmctl(shmid, cmd, NULL));
4018 break;
4019 }
4020
4021 return ret;
4022}
4023
4024static inline abi_ulong do_shmat(int shmid, abi_ulong shmaddr, int shmflg)
4025{
4026 abi_long raddr;
4027 void *host_raddr;
4028 struct shmid_ds shm_info;
4029 int i,ret;
4030
4031 /* find out the length of the shared memory segment */
4032 ret = get_errno(shmctl(shmid, IPC_STAT, &shm_info));
4033 if (is_error(ret)) {
4034 /* can't get length, bail out */
4035 return ret;
4036 }
4037
4038 mmap_lock();
4039
4040 if (shmaddr)
4041 host_raddr = shmat(shmid, (void *)g2h(shmaddr), shmflg);
4042 else {
4043 abi_ulong mmap_start;
4044
4045 mmap_start = mmap_find_vma(0, shm_info.shm_segsz);
4046
4047 if (mmap_start == -1) {
4048 errno = ENOMEM;
4049 host_raddr = (void *)-1;
4050 } else
4051 host_raddr = shmat(shmid, g2h(mmap_start), shmflg | SHM_REMAP);
4052 }
4053
4054 if (host_raddr == (void *)-1) {
4055 mmap_unlock();
4056 return get_errno((long)host_raddr);
4057 }
4058 raddr=h2g((unsigned long)host_raddr);
4059
4060 page_set_flags(raddr, raddr + shm_info.shm_segsz,
4061 PAGE_VALID | PAGE_READ |
4062 ((shmflg & SHM_RDONLY)? 0 : PAGE_WRITE));
4063
4064 for (i = 0; i < N_SHM_REGIONS; i++) {
Peter Maydellb6e17872016-02-09 15:57:11 +00004065 if (!shm_regions[i].in_use) {
4066 shm_regions[i].in_use = true;
Riku Voipio88a8c982009-04-03 10:42:00 +03004067 shm_regions[i].start = raddr;
4068 shm_regions[i].size = shm_info.shm_segsz;
4069 break;
4070 }
4071 }
4072
4073 mmap_unlock();
4074 return raddr;
4075
4076}
4077
4078static inline abi_long do_shmdt(abi_ulong shmaddr)
4079{
4080 int i;
4081
4082 for (i = 0; i < N_SHM_REGIONS; ++i) {
Peter Maydellb6e17872016-02-09 15:57:11 +00004083 if (shm_regions[i].in_use && shm_regions[i].start == shmaddr) {
4084 shm_regions[i].in_use = false;
takasi-y@ops.dti.ne.jpe00ac242010-04-11 02:09:57 +09004085 page_set_flags(shmaddr, shmaddr + shm_regions[i].size, 0);
Riku Voipio88a8c982009-04-03 10:42:00 +03004086 break;
4087 }
4088 }
4089
4090 return get_errno(shmdt(g2h(shmaddr)));
4091}
4092
aurel321c54ff92008-10-13 21:08:44 +00004093#ifdef TARGET_NR_ipc
pbrook53a59602006-03-25 19:31:22 +00004094/* ??? This only works with linear mappings. */
ths0da46a62007-10-20 20:23:07 +00004095/* do_ipc() must return target values and target errnos. */
Tom Musta37ed0952014-08-12 13:53:35 -05004096static abi_long do_ipc(unsigned int call, abi_long first,
4097 abi_long second, abi_long third,
blueswir1992f48a2007-10-14 16:27:31 +00004098 abi_long ptr, abi_long fifth)
bellard8853f862004-02-22 14:57:26 +00004099{
4100 int version;
blueswir1992f48a2007-10-14 16:27:31 +00004101 abi_long ret = 0;
bellard8853f862004-02-22 14:57:26 +00004102
4103 version = call >> 16;
4104 call &= 0xffff;
4105
4106 switch (call) {
thsfa294812007-02-02 22:05:00 +00004107 case IPCOP_semop:
aurel32e5289082009-04-18 16:16:12 +00004108 ret = do_semop(first, ptr, second);
thsfa294812007-02-02 22:05:00 +00004109 break;
4110
4111 case IPCOP_semget:
4112 ret = get_errno(semget(first, second, third));
4113 break;
4114
Tom Musta5d2fa8e2014-08-12 13:53:33 -05004115 case IPCOP_semctl: {
4116 /* The semun argument to semctl is passed by value, so dereference the
4117 * ptr argument. */
4118 abi_ulong atptr;
Tom Musta37ed0952014-08-12 13:53:35 -05004119 get_user_ual(atptr, ptr);
Stefan Weild1c002b2015-02-08 15:40:58 +01004120 ret = do_semctl(first, second, third, atptr);
thsfa294812007-02-02 22:05:00 +00004121 break;
Tom Musta5d2fa8e2014-08-12 13:53:33 -05004122 }
thsd96372e2007-02-02 22:05:44 +00004123
aurel321c54ff92008-10-13 21:08:44 +00004124 case IPCOP_msgget:
4125 ret = get_errno(msgget(first, second));
4126 break;
thsd96372e2007-02-02 22:05:44 +00004127
aurel321c54ff92008-10-13 21:08:44 +00004128 case IPCOP_msgsnd:
4129 ret = do_msgsnd(first, ptr, second, third);
4130 break;
thsd96372e2007-02-02 22:05:44 +00004131
aurel321c54ff92008-10-13 21:08:44 +00004132 case IPCOP_msgctl:
4133 ret = do_msgctl(first, second, ptr);
4134 break;
thsd96372e2007-02-02 22:05:44 +00004135
aurel321c54ff92008-10-13 21:08:44 +00004136 case IPCOP_msgrcv:
4137 switch (version) {
4138 case 0:
4139 {
4140 struct target_ipc_kludge {
4141 abi_long msgp;
4142 abi_long msgtyp;
4143 } *tmp;
thsd96372e2007-02-02 22:05:44 +00004144
aurel321c54ff92008-10-13 21:08:44 +00004145 if (!lock_user_struct(VERIFY_READ, tmp, ptr, 1)) {
4146 ret = -TARGET_EFAULT;
4147 break;
ths1bc012f2007-06-03 14:27:49 +00004148 }
aurel321c54ff92008-10-13 21:08:44 +00004149
Laurent Vivier79dd77d2012-12-20 11:00:11 +00004150 ret = do_msgrcv(first, tswapal(tmp->msgp), second, tswapal(tmp->msgtyp), third);
aurel321c54ff92008-10-13 21:08:44 +00004151
4152 unlock_user_struct(tmp, ptr, 0);
4153 break;
4154 }
4155 default:
4156 ret = do_msgrcv(first, ptr, second, fifth, third);
4157 }
4158 break;
thsd96372e2007-02-02 22:05:44 +00004159
bellard8853f862004-02-22 14:57:26 +00004160 case IPCOP_shmat:
Riku Voipio88a8c982009-04-03 10:42:00 +03004161 switch (version) {
4162 default:
bellard5a4a8982007-11-11 17:39:18 +00004163 {
4164 abi_ulong raddr;
Riku Voipio88a8c982009-04-03 10:42:00 +03004165 raddr = do_shmat(first, ptr, second);
4166 if (is_error(raddr))
4167 return get_errno(raddr);
bellard2f619692007-11-16 10:46:05 +00004168 if (put_user_ual(raddr, third))
bellard5a4a8982007-11-11 17:39:18 +00004169 return -TARGET_EFAULT;
Riku Voipio88a8c982009-04-03 10:42:00 +03004170 break;
4171 }
4172 case 1:
4173 ret = -TARGET_EINVAL;
4174 break;
bellard5a4a8982007-11-11 17:39:18 +00004175 }
bellard8853f862004-02-22 14:57:26 +00004176 break;
4177 case IPCOP_shmdt:
Riku Voipio88a8c982009-04-03 10:42:00 +03004178 ret = do_shmdt(ptr);
bellard8853f862004-02-22 14:57:26 +00004179 break;
4180
4181 case IPCOP_shmget:
4182 /* IPC_* flag values are the same on all linux platforms */
4183 ret = get_errno(shmget(first, second, third));
4184 break;
4185
4186 /* IPC_* and SHM_* command values are the same on all linux platforms */
4187 case IPCOP_shmctl:
Petar Jovanovica2926782013-10-30 14:46:32 +01004188 ret = do_shmctl(first, second, ptr);
bellard8853f862004-02-22 14:57:26 +00004189 break;
4190 default:
j_mayer32407102007-09-26 23:01:49 +00004191 gemu_log("Unsupported ipc call: %d (version %d)\n", call, version);
ths0da46a62007-10-20 20:23:07 +00004192 ret = -TARGET_ENOSYS;
bellard8853f862004-02-22 14:57:26 +00004193 break;
4194 }
4195 return ret;
4196}
j_mayer32407102007-09-26 23:01:49 +00004197#endif
bellard8853f862004-02-22 14:57:26 +00004198
bellard31e31b82003-02-18 22:55:36 +00004199/* kernel structure types definitions */
bellard31e31b82003-02-18 22:55:36 +00004200
Blue Swirl001faf32009-05-13 17:53:17 +00004201#define STRUCT(name, ...) STRUCT_ ## name,
bellard31e31b82003-02-18 22:55:36 +00004202#define STRUCT_SPECIAL(name) STRUCT_ ## name,
4203enum {
4204#include "syscall_types.h"
Alexander Graf8be656b2015-05-06 23:47:32 +02004205STRUCT_MAX
bellard31e31b82003-02-18 22:55:36 +00004206};
4207#undef STRUCT
4208#undef STRUCT_SPECIAL
4209
Blue Swirl001faf32009-05-13 17:53:17 +00004210#define STRUCT(name, ...) static const argtype struct_ ## name ## _def[] = { __VA_ARGS__, TYPE_NULL };
bellard31e31b82003-02-18 22:55:36 +00004211#define STRUCT_SPECIAL(name)
4212#include "syscall_types.h"
4213#undef STRUCT
4214#undef STRUCT_SPECIAL
4215
Peter Maydelld2ef05b2011-01-06 15:04:17 +00004216typedef struct IOCTLEntry IOCTLEntry;
4217
4218typedef abi_long do_ioctl_fn(const IOCTLEntry *ie, uint8_t *buf_temp,
Laurent Vivier45c874e2015-06-16 00:35:28 +02004219 int fd, int cmd, abi_long arg);
Peter Maydelld2ef05b2011-01-06 15:04:17 +00004220
4221struct IOCTLEntry {
Ed Swierk9c6bf9c2014-12-16 12:55:31 -08004222 int target_cmd;
bellard2ab83ea2003-06-15 19:56:46 +00004223 unsigned int host_cmd;
bellard31e31b82003-02-18 22:55:36 +00004224 const char *name;
4225 int access;
Peter Maydelld2ef05b2011-01-06 15:04:17 +00004226 do_ioctl_fn *do_ioctl;
bellard1a9353d2003-03-16 20:28:50 +00004227 const argtype arg_type[5];
Peter Maydelld2ef05b2011-01-06 15:04:17 +00004228};
bellard31e31b82003-02-18 22:55:36 +00004229
4230#define IOC_R 0x0001
4231#define IOC_W 0x0002
4232#define IOC_RW (IOC_R | IOC_W)
4233
4234#define MAX_STRUCT_SIZE 4096
4235
Peter Maydelldace20d2011-01-10 13:11:24 +00004236#ifdef CONFIG_FIEMAP
Peter Maydell285da2b2011-01-06 15:04:18 +00004237/* So fiemap access checks don't overflow on 32 bit systems.
4238 * This is very slightly smaller than the limit imposed by
4239 * the underlying kernel.
4240 */
4241#define FIEMAP_MAX_EXTENTS ((UINT_MAX - sizeof(struct fiemap)) \
4242 / sizeof(struct fiemap_extent))
4243
4244static abi_long do_ioctl_fs_ioc_fiemap(const IOCTLEntry *ie, uint8_t *buf_temp,
Laurent Vivier45c874e2015-06-16 00:35:28 +02004245 int fd, int cmd, abi_long arg)
Peter Maydell285da2b2011-01-06 15:04:18 +00004246{
4247 /* The parameter for this ioctl is a struct fiemap followed
4248 * by an array of struct fiemap_extent whose size is set
4249 * in fiemap->fm_extent_count. The array is filled in by the
4250 * ioctl.
4251 */
4252 int target_size_in, target_size_out;
4253 struct fiemap *fm;
4254 const argtype *arg_type = ie->arg_type;
4255 const argtype extent_arg_type[] = { MK_STRUCT(STRUCT_fiemap_extent) };
4256 void *argptr, *p;
4257 abi_long ret;
4258 int i, extent_size = thunk_type_size(extent_arg_type, 0);
4259 uint32_t outbufsz;
4260 int free_fm = 0;
4261
4262 assert(arg_type[0] == TYPE_PTR);
4263 assert(ie->access == IOC_RW);
4264 arg_type++;
4265 target_size_in = thunk_type_size(arg_type, 0);
4266 argptr = lock_user(VERIFY_READ, arg, target_size_in, 1);
4267 if (!argptr) {
4268 return -TARGET_EFAULT;
4269 }
4270 thunk_convert(buf_temp, argptr, arg_type, THUNK_HOST);
4271 unlock_user(argptr, arg, 0);
4272 fm = (struct fiemap *)buf_temp;
4273 if (fm->fm_extent_count > FIEMAP_MAX_EXTENTS) {
4274 return -TARGET_EINVAL;
4275 }
4276
4277 outbufsz = sizeof (*fm) +
4278 (sizeof(struct fiemap_extent) * fm->fm_extent_count);
4279
4280 if (outbufsz > MAX_STRUCT_SIZE) {
4281 /* We can't fit all the extents into the fixed size buffer.
4282 * Allocate one that is large enough and use it instead.
4283 */
Harmandeep Kaur0e173b22015-10-06 21:47:12 +05304284 fm = g_try_malloc(outbufsz);
Peter Maydell285da2b2011-01-06 15:04:18 +00004285 if (!fm) {
4286 return -TARGET_ENOMEM;
4287 }
4288 memcpy(fm, buf_temp, sizeof(struct fiemap));
4289 free_fm = 1;
4290 }
Peter Maydell49ca6f32016-06-06 19:58:14 +01004291 ret = get_errno(safe_ioctl(fd, ie->host_cmd, fm));
Peter Maydell285da2b2011-01-06 15:04:18 +00004292 if (!is_error(ret)) {
4293 target_size_out = target_size_in;
4294 /* An extent_count of 0 means we were only counting the extents
4295 * so there are no structs to copy
4296 */
4297 if (fm->fm_extent_count != 0) {
4298 target_size_out += fm->fm_mapped_extents * extent_size;
4299 }
4300 argptr = lock_user(VERIFY_WRITE, arg, target_size_out, 0);
4301 if (!argptr) {
4302 ret = -TARGET_EFAULT;
4303 } else {
4304 /* Convert the struct fiemap */
4305 thunk_convert(argptr, fm, arg_type, THUNK_TARGET);
4306 if (fm->fm_extent_count != 0) {
4307 p = argptr + target_size_in;
4308 /* ...and then all the struct fiemap_extents */
4309 for (i = 0; i < fm->fm_mapped_extents; i++) {
4310 thunk_convert(p, &fm->fm_extents[i], extent_arg_type,
4311 THUNK_TARGET);
4312 p += extent_size;
4313 }
4314 }
4315 unlock_user(argptr, arg, target_size_out);
4316 }
4317 }
4318 if (free_fm) {
Harmandeep Kaur0e173b22015-10-06 21:47:12 +05304319 g_free(fm);
Peter Maydell285da2b2011-01-06 15:04:18 +00004320 }
4321 return ret;
4322}
Peter Maydelldace20d2011-01-10 13:11:24 +00004323#endif
Peter Maydell285da2b2011-01-06 15:04:18 +00004324
Laurent Vivier059c2f22011-03-30 00:12:12 +02004325static abi_long do_ioctl_ifconf(const IOCTLEntry *ie, uint8_t *buf_temp,
Laurent Vivier45c874e2015-06-16 00:35:28 +02004326 int fd, int cmd, abi_long arg)
Laurent Vivier059c2f22011-03-30 00:12:12 +02004327{
4328 const argtype *arg_type = ie->arg_type;
4329 int target_size;
4330 void *argptr;
4331 int ret;
4332 struct ifconf *host_ifconf;
4333 uint32_t outbufsz;
4334 const argtype ifreq_arg_type[] = { MK_STRUCT(STRUCT_sockaddr_ifreq) };
4335 int target_ifreq_size;
4336 int nb_ifreq;
4337 int free_buf = 0;
4338 int i;
4339 int target_ifc_len;
4340 abi_long target_ifc_buf;
4341 int host_ifc_len;
4342 char *host_ifc_buf;
4343
4344 assert(arg_type[0] == TYPE_PTR);
4345 assert(ie->access == IOC_RW);
4346
4347 arg_type++;
4348 target_size = thunk_type_size(arg_type, 0);
4349
4350 argptr = lock_user(VERIFY_READ, arg, target_size, 1);
4351 if (!argptr)
4352 return -TARGET_EFAULT;
4353 thunk_convert(buf_temp, argptr, arg_type, THUNK_HOST);
4354 unlock_user(argptr, arg, 0);
4355
4356 host_ifconf = (struct ifconf *)(unsigned long)buf_temp;
4357 target_ifc_len = host_ifconf->ifc_len;
4358 target_ifc_buf = (abi_long)(unsigned long)host_ifconf->ifc_buf;
4359
4360 target_ifreq_size = thunk_type_size(ifreq_arg_type, 0);
4361 nb_ifreq = target_ifc_len / target_ifreq_size;
4362 host_ifc_len = nb_ifreq * sizeof(struct ifreq);
4363
4364 outbufsz = sizeof(*host_ifconf) + host_ifc_len;
4365 if (outbufsz > MAX_STRUCT_SIZE) {
4366 /* We can't fit all the extents into the fixed size buffer.
4367 * Allocate one that is large enough and use it instead.
4368 */
4369 host_ifconf = malloc(outbufsz);
4370 if (!host_ifconf) {
4371 return -TARGET_ENOMEM;
4372 }
4373 memcpy(host_ifconf, buf_temp, sizeof(*host_ifconf));
4374 free_buf = 1;
4375 }
4376 host_ifc_buf = (char*)host_ifconf + sizeof(*host_ifconf);
4377
4378 host_ifconf->ifc_len = host_ifc_len;
4379 host_ifconf->ifc_buf = host_ifc_buf;
4380
Peter Maydell49ca6f32016-06-06 19:58:14 +01004381 ret = get_errno(safe_ioctl(fd, ie->host_cmd, host_ifconf));
Laurent Vivier059c2f22011-03-30 00:12:12 +02004382 if (!is_error(ret)) {
4383 /* convert host ifc_len to target ifc_len */
4384
4385 nb_ifreq = host_ifconf->ifc_len / sizeof(struct ifreq);
4386 target_ifc_len = nb_ifreq * target_ifreq_size;
4387 host_ifconf->ifc_len = target_ifc_len;
4388
4389 /* restore target ifc_buf */
4390
4391 host_ifconf->ifc_buf = (char *)(unsigned long)target_ifc_buf;
4392
4393 /* copy struct ifconf to target user */
4394
4395 argptr = lock_user(VERIFY_WRITE, arg, target_size, 0);
4396 if (!argptr)
4397 return -TARGET_EFAULT;
4398 thunk_convert(argptr, host_ifconf, arg_type, THUNK_TARGET);
4399 unlock_user(argptr, arg, target_size);
4400
4401 /* copy ifreq[] to target user */
4402
4403 argptr = lock_user(VERIFY_WRITE, target_ifc_buf, target_ifc_len, 0);
4404 for (i = 0; i < nb_ifreq ; i++) {
4405 thunk_convert(argptr + i * target_ifreq_size,
4406 host_ifc_buf + i * sizeof(struct ifreq),
4407 ifreq_arg_type, THUNK_TARGET);
4408 }
4409 unlock_user(argptr, target_ifc_buf, target_ifc_len);
4410 }
4411
4412 if (free_buf) {
4413 free(host_ifconf);
4414 }
4415
4416 return ret;
4417}
4418
Alexander Graf56e904e2012-01-31 18:42:06 +01004419static abi_long do_ioctl_dm(const IOCTLEntry *ie, uint8_t *buf_temp, int fd,
Laurent Vivier45c874e2015-06-16 00:35:28 +02004420 int cmd, abi_long arg)
Alexander Graf56e904e2012-01-31 18:42:06 +01004421{
4422 void *argptr;
4423 struct dm_ioctl *host_dm;
4424 abi_long guest_data;
4425 uint32_t guest_data_size;
4426 int target_size;
4427 const argtype *arg_type = ie->arg_type;
4428 abi_long ret;
4429 void *big_buf = NULL;
4430 char *host_data;
4431
4432 arg_type++;
4433 target_size = thunk_type_size(arg_type, 0);
4434 argptr = lock_user(VERIFY_READ, arg, target_size, 1);
4435 if (!argptr) {
4436 ret = -TARGET_EFAULT;
4437 goto out;
4438 }
4439 thunk_convert(buf_temp, argptr, arg_type, THUNK_HOST);
4440 unlock_user(argptr, arg, 0);
4441
4442 /* buf_temp is too small, so fetch things into a bigger buffer */
4443 big_buf = g_malloc0(((struct dm_ioctl*)buf_temp)->data_size * 2);
4444 memcpy(big_buf, buf_temp, target_size);
4445 buf_temp = big_buf;
4446 host_dm = big_buf;
4447
4448 guest_data = arg + host_dm->data_start;
4449 if ((guest_data - arg) < 0) {
4450 ret = -EINVAL;
4451 goto out;
4452 }
4453 guest_data_size = host_dm->data_size - host_dm->data_start;
4454 host_data = (char*)host_dm + host_dm->data_start;
4455
4456 argptr = lock_user(VERIFY_READ, guest_data, guest_data_size, 1);
4457 switch (ie->host_cmd) {
4458 case DM_REMOVE_ALL:
4459 case DM_LIST_DEVICES:
4460 case DM_DEV_CREATE:
4461 case DM_DEV_REMOVE:
4462 case DM_DEV_SUSPEND:
4463 case DM_DEV_STATUS:
4464 case DM_DEV_WAIT:
4465 case DM_TABLE_STATUS:
4466 case DM_TABLE_CLEAR:
4467 case DM_TABLE_DEPS:
4468 case DM_LIST_VERSIONS:
4469 /* no input data */
4470 break;
4471 case DM_DEV_RENAME:
4472 case DM_DEV_SET_GEOMETRY:
4473 /* data contains only strings */
4474 memcpy(host_data, argptr, guest_data_size);
4475 break;
4476 case DM_TARGET_MSG:
4477 memcpy(host_data, argptr, guest_data_size);
4478 *(uint64_t*)host_data = tswap64(*(uint64_t*)argptr);
4479 break;
4480 case DM_TABLE_LOAD:
4481 {
4482 void *gspec = argptr;
4483 void *cur_data = host_data;
4484 const argtype arg_type[] = { MK_STRUCT(STRUCT_dm_target_spec) };
4485 int spec_size = thunk_type_size(arg_type, 0);
4486 int i;
4487
4488 for (i = 0; i < host_dm->target_count; i++) {
4489 struct dm_target_spec *spec = cur_data;
4490 uint32_t next;
4491 int slen;
4492
4493 thunk_convert(spec, gspec, arg_type, THUNK_HOST);
4494 slen = strlen((char*)gspec + spec_size) + 1;
4495 next = spec->next;
4496 spec->next = sizeof(*spec) + slen;
4497 strcpy((char*)&spec[1], gspec + spec_size);
4498 gspec += next;
4499 cur_data += spec->next;
4500 }
4501 break;
4502 }
4503 default:
4504 ret = -TARGET_EINVAL;
Chen Gang Sdec04732015-01-25 08:00:42 +08004505 unlock_user(argptr, guest_data, 0);
Alexander Graf56e904e2012-01-31 18:42:06 +01004506 goto out;
4507 }
4508 unlock_user(argptr, guest_data, 0);
4509
Peter Maydell49ca6f32016-06-06 19:58:14 +01004510 ret = get_errno(safe_ioctl(fd, ie->host_cmd, buf_temp));
Alexander Graf56e904e2012-01-31 18:42:06 +01004511 if (!is_error(ret)) {
4512 guest_data = arg + host_dm->data_start;
4513 guest_data_size = host_dm->data_size - host_dm->data_start;
4514 argptr = lock_user(VERIFY_WRITE, guest_data, guest_data_size, 0);
4515 switch (ie->host_cmd) {
4516 case DM_REMOVE_ALL:
4517 case DM_DEV_CREATE:
4518 case DM_DEV_REMOVE:
4519 case DM_DEV_RENAME:
4520 case DM_DEV_SUSPEND:
4521 case DM_DEV_STATUS:
4522 case DM_TABLE_LOAD:
4523 case DM_TABLE_CLEAR:
4524 case DM_TARGET_MSG:
4525 case DM_DEV_SET_GEOMETRY:
4526 /* no return data */
4527 break;
4528 case DM_LIST_DEVICES:
4529 {
4530 struct dm_name_list *nl = (void*)host_dm + host_dm->data_start;
4531 uint32_t remaining_data = guest_data_size;
4532 void *cur_data = argptr;
4533 const argtype arg_type[] = { MK_STRUCT(STRUCT_dm_name_list) };
4534 int nl_size = 12; /* can't use thunk_size due to alignment */
4535
4536 while (1) {
4537 uint32_t next = nl->next;
4538 if (next) {
4539 nl->next = nl_size + (strlen(nl->name) + 1);
4540 }
4541 if (remaining_data < nl->next) {
4542 host_dm->flags |= DM_BUFFER_FULL_FLAG;
4543 break;
4544 }
4545 thunk_convert(cur_data, nl, arg_type, THUNK_TARGET);
4546 strcpy(cur_data + nl_size, nl->name);
4547 cur_data += nl->next;
4548 remaining_data -= nl->next;
4549 if (!next) {
4550 break;
4551 }
4552 nl = (void*)nl + next;
4553 }
4554 break;
4555 }
4556 case DM_DEV_WAIT:
4557 case DM_TABLE_STATUS:
4558 {
4559 struct dm_target_spec *spec = (void*)host_dm + host_dm->data_start;
4560 void *cur_data = argptr;
4561 const argtype arg_type[] = { MK_STRUCT(STRUCT_dm_target_spec) };
4562 int spec_size = thunk_type_size(arg_type, 0);
4563 int i;
4564
4565 for (i = 0; i < host_dm->target_count; i++) {
4566 uint32_t next = spec->next;
4567 int slen = strlen((char*)&spec[1]) + 1;
4568 spec->next = (cur_data - argptr) + spec_size + slen;
4569 if (guest_data_size < spec->next) {
4570 host_dm->flags |= DM_BUFFER_FULL_FLAG;
4571 break;
4572 }
4573 thunk_convert(cur_data, spec, arg_type, THUNK_TARGET);
4574 strcpy(cur_data + spec_size, (char*)&spec[1]);
4575 cur_data = argptr + spec->next;
4576 spec = (void*)host_dm + host_dm->data_start + next;
4577 }
4578 break;
4579 }
4580 case DM_TABLE_DEPS:
4581 {
4582 void *hdata = (void*)host_dm + host_dm->data_start;
4583 int count = *(uint32_t*)hdata;
4584 uint64_t *hdev = hdata + 8;
4585 uint64_t *gdev = argptr + 8;
4586 int i;
4587
4588 *(uint32_t*)argptr = tswap32(count);
4589 for (i = 0; i < count; i++) {
4590 *gdev = tswap64(*hdev);
4591 gdev++;
4592 hdev++;
4593 }
4594 break;
4595 }
4596 case DM_LIST_VERSIONS:
4597 {
4598 struct dm_target_versions *vers = (void*)host_dm + host_dm->data_start;
4599 uint32_t remaining_data = guest_data_size;
4600 void *cur_data = argptr;
4601 const argtype arg_type[] = { MK_STRUCT(STRUCT_dm_target_versions) };
4602 int vers_size = thunk_type_size(arg_type, 0);
4603
4604 while (1) {
4605 uint32_t next = vers->next;
4606 if (next) {
4607 vers->next = vers_size + (strlen(vers->name) + 1);
4608 }
4609 if (remaining_data < vers->next) {
4610 host_dm->flags |= DM_BUFFER_FULL_FLAG;
4611 break;
4612 }
4613 thunk_convert(cur_data, vers, arg_type, THUNK_TARGET);
4614 strcpy(cur_data + vers_size, vers->name);
4615 cur_data += vers->next;
4616 remaining_data -= vers->next;
4617 if (!next) {
4618 break;
4619 }
4620 vers = (void*)vers + next;
4621 }
4622 break;
4623 }
4624 default:
Chen Gang Sdec04732015-01-25 08:00:42 +08004625 unlock_user(argptr, guest_data, 0);
Alexander Graf56e904e2012-01-31 18:42:06 +01004626 ret = -TARGET_EINVAL;
4627 goto out;
4628 }
4629 unlock_user(argptr, guest_data, guest_data_size);
4630
4631 argptr = lock_user(VERIFY_WRITE, arg, target_size, 0);
4632 if (!argptr) {
4633 ret = -TARGET_EFAULT;
4634 goto out;
4635 }
4636 thunk_convert(argptr, buf_temp, arg_type, THUNK_TARGET);
4637 unlock_user(argptr, arg, target_size);
4638 }
4639out:
Stefan Weilad11ad72012-09-04 22:14:19 +02004640 g_free(big_buf);
Alexander Graf56e904e2012-01-31 18:42:06 +01004641 return ret;
4642}
4643
Alexander Grafa59b5e32014-08-22 13:15:50 +02004644static abi_long do_ioctl_blkpg(const IOCTLEntry *ie, uint8_t *buf_temp, int fd,
Laurent Vivier45c874e2015-06-16 00:35:28 +02004645 int cmd, abi_long arg)
Alexander Grafa59b5e32014-08-22 13:15:50 +02004646{
4647 void *argptr;
4648 int target_size;
4649 const argtype *arg_type = ie->arg_type;
4650 const argtype part_arg_type[] = { MK_STRUCT(STRUCT_blkpg_partition) };
4651 abi_long ret;
4652
4653 struct blkpg_ioctl_arg *host_blkpg = (void*)buf_temp;
4654 struct blkpg_partition host_part;
4655
4656 /* Read and convert blkpg */
4657 arg_type++;
4658 target_size = thunk_type_size(arg_type, 0);
4659 argptr = lock_user(VERIFY_READ, arg, target_size, 1);
4660 if (!argptr) {
4661 ret = -TARGET_EFAULT;
4662 goto out;
4663 }
4664 thunk_convert(buf_temp, argptr, arg_type, THUNK_HOST);
4665 unlock_user(argptr, arg, 0);
4666
4667 switch (host_blkpg->op) {
4668 case BLKPG_ADD_PARTITION:
4669 case BLKPG_DEL_PARTITION:
4670 /* payload is struct blkpg_partition */
4671 break;
4672 default:
4673 /* Unknown opcode */
4674 ret = -TARGET_EINVAL;
4675 goto out;
4676 }
4677
4678 /* Read and convert blkpg->data */
4679 arg = (abi_long)(uintptr_t)host_blkpg->data;
4680 target_size = thunk_type_size(part_arg_type, 0);
4681 argptr = lock_user(VERIFY_READ, arg, target_size, 1);
4682 if (!argptr) {
4683 ret = -TARGET_EFAULT;
4684 goto out;
4685 }
4686 thunk_convert(&host_part, argptr, part_arg_type, THUNK_HOST);
4687 unlock_user(argptr, arg, 0);
4688
4689 /* Swizzle the data pointer to our local copy and call! */
4690 host_blkpg->data = &host_part;
Peter Maydell49ca6f32016-06-06 19:58:14 +01004691 ret = get_errno(safe_ioctl(fd, ie->host_cmd, host_blkpg));
Alexander Grafa59b5e32014-08-22 13:15:50 +02004692
4693out:
4694 return ret;
4695}
4696
Laurent Vivier7ff7b662013-07-02 14:04:12 +01004697static abi_long do_ioctl_rt(const IOCTLEntry *ie, uint8_t *buf_temp,
Laurent Vivier45c874e2015-06-16 00:35:28 +02004698 int fd, int cmd, abi_long arg)
Laurent Vivier7ff7b662013-07-02 14:04:12 +01004699{
4700 const argtype *arg_type = ie->arg_type;
4701 const StructEntry *se;
4702 const argtype *field_types;
4703 const int *dst_offsets, *src_offsets;
4704 int target_size;
4705 void *argptr;
4706 abi_ulong *target_rt_dev_ptr;
4707 unsigned long *host_rt_dev_ptr;
4708 abi_long ret;
4709 int i;
4710
4711 assert(ie->access == IOC_W);
4712 assert(*arg_type == TYPE_PTR);
4713 arg_type++;
4714 assert(*arg_type == TYPE_STRUCT);
4715 target_size = thunk_type_size(arg_type, 0);
4716 argptr = lock_user(VERIFY_READ, arg, target_size, 1);
4717 if (!argptr) {
4718 return -TARGET_EFAULT;
4719 }
4720 arg_type++;
4721 assert(*arg_type == (int)STRUCT_rtentry);
4722 se = struct_entries + *arg_type++;
4723 assert(se->convert[0] == NULL);
4724 /* convert struct here to be able to catch rt_dev string */
4725 field_types = se->field_types;
4726 dst_offsets = se->field_offsets[THUNK_HOST];
4727 src_offsets = se->field_offsets[THUNK_TARGET];
4728 for (i = 0; i < se->nb_fields; i++) {
4729 if (dst_offsets[i] == offsetof(struct rtentry, rt_dev)) {
4730 assert(*field_types == TYPE_PTRVOID);
4731 target_rt_dev_ptr = (abi_ulong *)(argptr + src_offsets[i]);
4732 host_rt_dev_ptr = (unsigned long *)(buf_temp + dst_offsets[i]);
4733 if (*target_rt_dev_ptr != 0) {
4734 *host_rt_dev_ptr = (unsigned long)lock_user_string(
4735 tswapal(*target_rt_dev_ptr));
4736 if (!*host_rt_dev_ptr) {
4737 unlock_user(argptr, arg, 0);
4738 return -TARGET_EFAULT;
4739 }
4740 } else {
4741 *host_rt_dev_ptr = 0;
4742 }
4743 field_types++;
4744 continue;
4745 }
4746 field_types = thunk_convert(buf_temp + dst_offsets[i],
4747 argptr + src_offsets[i],
4748 field_types, THUNK_HOST);
4749 }
4750 unlock_user(argptr, arg, 0);
4751
Peter Maydell49ca6f32016-06-06 19:58:14 +01004752 ret = get_errno(safe_ioctl(fd, ie->host_cmd, buf_temp));
Laurent Vivier7ff7b662013-07-02 14:04:12 +01004753 if (*host_rt_dev_ptr != 0) {
4754 unlock_user((void *)*host_rt_dev_ptr,
4755 *target_rt_dev_ptr, 0);
4756 }
4757 return ret;
4758}
4759
Paul Burtonca56f5b2014-06-22 11:25:47 +01004760static abi_long do_ioctl_kdsigaccept(const IOCTLEntry *ie, uint8_t *buf_temp,
Laurent Vivier45c874e2015-06-16 00:35:28 +02004761 int fd, int cmd, abi_long arg)
Paul Burtonca56f5b2014-06-22 11:25:47 +01004762{
4763 int sig = target_to_host_signal(arg);
Peter Maydell49ca6f32016-06-06 19:58:14 +01004764 return get_errno(safe_ioctl(fd, ie->host_cmd, sig));
Paul Burtonca56f5b2014-06-22 11:25:47 +01004765}
4766
blueswir19f106a72008-10-05 10:52:52 +00004767static IOCTLEntry ioctl_entries[] = {
Blue Swirl001faf32009-05-13 17:53:17 +00004768#define IOCTL(cmd, access, ...) \
Peter Maydelld2ef05b2011-01-06 15:04:17 +00004769 { TARGET_ ## cmd, cmd, #cmd, access, 0, { __VA_ARGS__ } },
4770#define IOCTL_SPECIAL(cmd, access, dofn, ...) \
4771 { TARGET_ ## cmd, cmd, #cmd, access, dofn, { __VA_ARGS__ } },
bellard31e31b82003-02-18 22:55:36 +00004772#include "ioctls.h"
4773 { 0, 0, },
4774};
4775
pbrook53a59602006-03-25 19:31:22 +00004776/* ??? Implement proper locking for ioctls. */
ths0da46a62007-10-20 20:23:07 +00004777/* do_ioctl() Must return target values and target errnos. */
Laurent Vivier45c874e2015-06-16 00:35:28 +02004778static abi_long do_ioctl(int fd, int cmd, abi_long arg)
bellard31e31b82003-02-18 22:55:36 +00004779{
4780 const IOCTLEntry *ie;
4781 const argtype *arg_type;
blueswir1992f48a2007-10-14 16:27:31 +00004782 abi_long ret;
bellard31e31b82003-02-18 22:55:36 +00004783 uint8_t buf_temp[MAX_STRUCT_SIZE];
pbrook53a59602006-03-25 19:31:22 +00004784 int target_size;
4785 void *argptr;
bellard31e31b82003-02-18 22:55:36 +00004786
4787 ie = ioctl_entries;
4788 for(;;) {
4789 if (ie->target_cmd == 0) {
j_mayer32407102007-09-26 23:01:49 +00004790 gemu_log("Unsupported ioctl: cmd=0x%04lx\n", (long)cmd);
ths0da46a62007-10-20 20:23:07 +00004791 return -TARGET_ENOSYS;
bellard31e31b82003-02-18 22:55:36 +00004792 }
4793 if (ie->target_cmd == cmd)
4794 break;
4795 ie++;
4796 }
4797 arg_type = ie->arg_type;
bellard9de5e442003-03-23 16:49:39 +00004798#if defined(DEBUG)
j_mayer32407102007-09-26 23:01:49 +00004799 gemu_log("ioctl: cmd=0x%04lx (%s)\n", (long)cmd, ie->name);
bellard72f03902003-02-18 23:33:18 +00004800#endif
Peter Maydelld2ef05b2011-01-06 15:04:17 +00004801 if (ie->do_ioctl) {
4802 return ie->do_ioctl(ie, buf_temp, fd, cmd, arg);
4803 }
4804
bellard31e31b82003-02-18 22:55:36 +00004805 switch(arg_type[0]) {
4806 case TYPE_NULL:
4807 /* no argument */
Peter Maydell49ca6f32016-06-06 19:58:14 +01004808 ret = get_errno(safe_ioctl(fd, ie->host_cmd));
bellard31e31b82003-02-18 22:55:36 +00004809 break;
4810 case TYPE_PTRVOID:
4811 case TYPE_INT:
Peter Maydell49ca6f32016-06-06 19:58:14 +01004812 ret = get_errno(safe_ioctl(fd, ie->host_cmd, arg));
bellard31e31b82003-02-18 22:55:36 +00004813 break;
4814 case TYPE_PTR:
4815 arg_type++;
pbrook53a59602006-03-25 19:31:22 +00004816 target_size = thunk_type_size(arg_type, 0);
bellard31e31b82003-02-18 22:55:36 +00004817 switch(ie->access) {
4818 case IOC_R:
Peter Maydell49ca6f32016-06-06 19:58:14 +01004819 ret = get_errno(safe_ioctl(fd, ie->host_cmd, buf_temp));
bellard31e31b82003-02-18 22:55:36 +00004820 if (!is_error(ret)) {
bellard579a97f2007-11-11 14:26:47 +00004821 argptr = lock_user(VERIFY_WRITE, arg, target_size, 0);
4822 if (!argptr)
4823 return -TARGET_EFAULT;
pbrook53a59602006-03-25 19:31:22 +00004824 thunk_convert(argptr, buf_temp, arg_type, THUNK_TARGET);
4825 unlock_user(argptr, arg, target_size);
bellard31e31b82003-02-18 22:55:36 +00004826 }
4827 break;
4828 case IOC_W:
bellard579a97f2007-11-11 14:26:47 +00004829 argptr = lock_user(VERIFY_READ, arg, target_size, 1);
4830 if (!argptr)
4831 return -TARGET_EFAULT;
pbrook53a59602006-03-25 19:31:22 +00004832 thunk_convert(buf_temp, argptr, arg_type, THUNK_HOST);
4833 unlock_user(argptr, arg, 0);
Peter Maydell49ca6f32016-06-06 19:58:14 +01004834 ret = get_errno(safe_ioctl(fd, ie->host_cmd, buf_temp));
bellard31e31b82003-02-18 22:55:36 +00004835 break;
4836 default:
4837 case IOC_RW:
bellard579a97f2007-11-11 14:26:47 +00004838 argptr = lock_user(VERIFY_READ, arg, target_size, 1);
4839 if (!argptr)
4840 return -TARGET_EFAULT;
pbrook53a59602006-03-25 19:31:22 +00004841 thunk_convert(buf_temp, argptr, arg_type, THUNK_HOST);
4842 unlock_user(argptr, arg, 0);
Peter Maydell49ca6f32016-06-06 19:58:14 +01004843 ret = get_errno(safe_ioctl(fd, ie->host_cmd, buf_temp));
bellard31e31b82003-02-18 22:55:36 +00004844 if (!is_error(ret)) {
bellard579a97f2007-11-11 14:26:47 +00004845 argptr = lock_user(VERIFY_WRITE, arg, target_size, 0);
4846 if (!argptr)
4847 return -TARGET_EFAULT;
pbrook53a59602006-03-25 19:31:22 +00004848 thunk_convert(argptr, buf_temp, arg_type, THUNK_TARGET);
4849 unlock_user(argptr, arg, target_size);
bellard31e31b82003-02-18 22:55:36 +00004850 }
4851 break;
4852 }
4853 break;
4854 default:
j_mayer32407102007-09-26 23:01:49 +00004855 gemu_log("Unsupported ioctl type: cmd=0x%04lx type=%d\n",
4856 (long)cmd, arg_type[0]);
ths0da46a62007-10-20 20:23:07 +00004857 ret = -TARGET_ENOSYS;
bellard31e31b82003-02-18 22:55:36 +00004858 break;
4859 }
4860 return ret;
4861}
4862
blueswir1b39bc502008-10-05 10:51:10 +00004863static const bitmask_transtbl iflag_tbl[] = {
bellard31e31b82003-02-18 22:55:36 +00004864 { TARGET_IGNBRK, TARGET_IGNBRK, IGNBRK, IGNBRK },
4865 { TARGET_BRKINT, TARGET_BRKINT, BRKINT, BRKINT },
4866 { TARGET_IGNPAR, TARGET_IGNPAR, IGNPAR, IGNPAR },
4867 { TARGET_PARMRK, TARGET_PARMRK, PARMRK, PARMRK },
4868 { TARGET_INPCK, TARGET_INPCK, INPCK, INPCK },
4869 { TARGET_ISTRIP, TARGET_ISTRIP, ISTRIP, ISTRIP },
4870 { TARGET_INLCR, TARGET_INLCR, INLCR, INLCR },
4871 { TARGET_IGNCR, TARGET_IGNCR, IGNCR, IGNCR },
4872 { TARGET_ICRNL, TARGET_ICRNL, ICRNL, ICRNL },
4873 { TARGET_IUCLC, TARGET_IUCLC, IUCLC, IUCLC },
4874 { TARGET_IXON, TARGET_IXON, IXON, IXON },
4875 { TARGET_IXANY, TARGET_IXANY, IXANY, IXANY },
4876 { TARGET_IXOFF, TARGET_IXOFF, IXOFF, IXOFF },
4877 { TARGET_IMAXBEL, TARGET_IMAXBEL, IMAXBEL, IMAXBEL },
4878 { 0, 0, 0, 0 }
4879};
4880
blueswir1b39bc502008-10-05 10:51:10 +00004881static const bitmask_transtbl oflag_tbl[] = {
bellard31e31b82003-02-18 22:55:36 +00004882 { TARGET_OPOST, TARGET_OPOST, OPOST, OPOST },
4883 { TARGET_OLCUC, TARGET_OLCUC, OLCUC, OLCUC },
4884 { TARGET_ONLCR, TARGET_ONLCR, ONLCR, ONLCR },
4885 { TARGET_OCRNL, TARGET_OCRNL, OCRNL, OCRNL },
4886 { TARGET_ONOCR, TARGET_ONOCR, ONOCR, ONOCR },
4887 { TARGET_ONLRET, TARGET_ONLRET, ONLRET, ONLRET },
4888 { TARGET_OFILL, TARGET_OFILL, OFILL, OFILL },
4889 { TARGET_OFDEL, TARGET_OFDEL, OFDEL, OFDEL },
4890 { TARGET_NLDLY, TARGET_NL0, NLDLY, NL0 },
4891 { TARGET_NLDLY, TARGET_NL1, NLDLY, NL1 },
4892 { TARGET_CRDLY, TARGET_CR0, CRDLY, CR0 },
4893 { TARGET_CRDLY, TARGET_CR1, CRDLY, CR1 },
4894 { TARGET_CRDLY, TARGET_CR2, CRDLY, CR2 },
4895 { TARGET_CRDLY, TARGET_CR3, CRDLY, CR3 },
4896 { TARGET_TABDLY, TARGET_TAB0, TABDLY, TAB0 },
4897 { TARGET_TABDLY, TARGET_TAB1, TABDLY, TAB1 },
4898 { TARGET_TABDLY, TARGET_TAB2, TABDLY, TAB2 },
4899 { TARGET_TABDLY, TARGET_TAB3, TABDLY, TAB3 },
4900 { TARGET_BSDLY, TARGET_BS0, BSDLY, BS0 },
4901 { TARGET_BSDLY, TARGET_BS1, BSDLY, BS1 },
4902 { TARGET_VTDLY, TARGET_VT0, VTDLY, VT0 },
4903 { TARGET_VTDLY, TARGET_VT1, VTDLY, VT1 },
4904 { TARGET_FFDLY, TARGET_FF0, FFDLY, FF0 },
4905 { TARGET_FFDLY, TARGET_FF1, FFDLY, FF1 },
4906 { 0, 0, 0, 0 }
4907};
4908
blueswir1b39bc502008-10-05 10:51:10 +00004909static const bitmask_transtbl cflag_tbl[] = {
bellard31e31b82003-02-18 22:55:36 +00004910 { TARGET_CBAUD, TARGET_B0, CBAUD, B0 },
4911 { TARGET_CBAUD, TARGET_B50, CBAUD, B50 },
4912 { TARGET_CBAUD, TARGET_B75, CBAUD, B75 },
4913 { TARGET_CBAUD, TARGET_B110, CBAUD, B110 },
4914 { TARGET_CBAUD, TARGET_B134, CBAUD, B134 },
4915 { TARGET_CBAUD, TARGET_B150, CBAUD, B150 },
4916 { TARGET_CBAUD, TARGET_B200, CBAUD, B200 },
4917 { TARGET_CBAUD, TARGET_B300, CBAUD, B300 },
4918 { TARGET_CBAUD, TARGET_B600, CBAUD, B600 },
4919 { TARGET_CBAUD, TARGET_B1200, CBAUD, B1200 },
4920 { TARGET_CBAUD, TARGET_B1800, CBAUD, B1800 },
4921 { TARGET_CBAUD, TARGET_B2400, CBAUD, B2400 },
4922 { TARGET_CBAUD, TARGET_B4800, CBAUD, B4800 },
4923 { TARGET_CBAUD, TARGET_B9600, CBAUD, B9600 },
4924 { TARGET_CBAUD, TARGET_B19200, CBAUD, B19200 },
4925 { TARGET_CBAUD, TARGET_B38400, CBAUD, B38400 },
4926 { TARGET_CBAUD, TARGET_B57600, CBAUD, B57600 },
4927 { TARGET_CBAUD, TARGET_B115200, CBAUD, B115200 },
4928 { TARGET_CBAUD, TARGET_B230400, CBAUD, B230400 },
4929 { TARGET_CBAUD, TARGET_B460800, CBAUD, B460800 },
4930 { TARGET_CSIZE, TARGET_CS5, CSIZE, CS5 },
4931 { TARGET_CSIZE, TARGET_CS6, CSIZE, CS6 },
4932 { TARGET_CSIZE, TARGET_CS7, CSIZE, CS7 },
4933 { TARGET_CSIZE, TARGET_CS8, CSIZE, CS8 },
4934 { TARGET_CSTOPB, TARGET_CSTOPB, CSTOPB, CSTOPB },
4935 { TARGET_CREAD, TARGET_CREAD, CREAD, CREAD },
4936 { TARGET_PARENB, TARGET_PARENB, PARENB, PARENB },
4937 { TARGET_PARODD, TARGET_PARODD, PARODD, PARODD },
4938 { TARGET_HUPCL, TARGET_HUPCL, HUPCL, HUPCL },
4939 { TARGET_CLOCAL, TARGET_CLOCAL, CLOCAL, CLOCAL },
4940 { TARGET_CRTSCTS, TARGET_CRTSCTS, CRTSCTS, CRTSCTS },
4941 { 0, 0, 0, 0 }
4942};
4943
blueswir1b39bc502008-10-05 10:51:10 +00004944static const bitmask_transtbl lflag_tbl[] = {
bellard31e31b82003-02-18 22:55:36 +00004945 { TARGET_ISIG, TARGET_ISIG, ISIG, ISIG },
4946 { TARGET_ICANON, TARGET_ICANON, ICANON, ICANON },
4947 { TARGET_XCASE, TARGET_XCASE, XCASE, XCASE },
4948 { TARGET_ECHO, TARGET_ECHO, ECHO, ECHO },
4949 { TARGET_ECHOE, TARGET_ECHOE, ECHOE, ECHOE },
4950 { TARGET_ECHOK, TARGET_ECHOK, ECHOK, ECHOK },
4951 { TARGET_ECHONL, TARGET_ECHONL, ECHONL, ECHONL },
4952 { TARGET_NOFLSH, TARGET_NOFLSH, NOFLSH, NOFLSH },
4953 { TARGET_TOSTOP, TARGET_TOSTOP, TOSTOP, TOSTOP },
4954 { TARGET_ECHOCTL, TARGET_ECHOCTL, ECHOCTL, ECHOCTL },
4955 { TARGET_ECHOPRT, TARGET_ECHOPRT, ECHOPRT, ECHOPRT },
4956 { TARGET_ECHOKE, TARGET_ECHOKE, ECHOKE, ECHOKE },
4957 { TARGET_FLUSHO, TARGET_FLUSHO, FLUSHO, FLUSHO },
4958 { TARGET_PENDIN, TARGET_PENDIN, PENDIN, PENDIN },
4959 { TARGET_IEXTEN, TARGET_IEXTEN, IEXTEN, IEXTEN },
4960 { 0, 0, 0, 0 }
4961};
4962
4963static void target_to_host_termios (void *dst, const void *src)
4964{
4965 struct host_termios *host = dst;
4966 const struct target_termios *target = src;
ths3b46e622007-09-17 08:09:54 +00004967
ths5fafdf22007-09-16 21:08:06 +00004968 host->c_iflag =
bellard31e31b82003-02-18 22:55:36 +00004969 target_to_host_bitmask(tswap32(target->c_iflag), iflag_tbl);
ths5fafdf22007-09-16 21:08:06 +00004970 host->c_oflag =
bellard31e31b82003-02-18 22:55:36 +00004971 target_to_host_bitmask(tswap32(target->c_oflag), oflag_tbl);
ths5fafdf22007-09-16 21:08:06 +00004972 host->c_cflag =
bellard31e31b82003-02-18 22:55:36 +00004973 target_to_host_bitmask(tswap32(target->c_cflag), cflag_tbl);
ths5fafdf22007-09-16 21:08:06 +00004974 host->c_lflag =
bellard31e31b82003-02-18 22:55:36 +00004975 target_to_host_bitmask(tswap32(target->c_lflag), lflag_tbl);
4976 host->c_line = target->c_line;
ths3b46e622007-09-17 08:09:54 +00004977
Arnaud Patard44607122009-04-21 17:39:08 +03004978 memset(host->c_cc, 0, sizeof(host->c_cc));
ths5fafdf22007-09-16 21:08:06 +00004979 host->c_cc[VINTR] = target->c_cc[TARGET_VINTR];
4980 host->c_cc[VQUIT] = target->c_cc[TARGET_VQUIT];
ths3b46e622007-09-17 08:09:54 +00004981 host->c_cc[VERASE] = target->c_cc[TARGET_VERASE];
ths5fafdf22007-09-16 21:08:06 +00004982 host->c_cc[VKILL] = target->c_cc[TARGET_VKILL];
ths3b46e622007-09-17 08:09:54 +00004983 host->c_cc[VEOF] = target->c_cc[TARGET_VEOF];
ths5fafdf22007-09-16 21:08:06 +00004984 host->c_cc[VTIME] = target->c_cc[TARGET_VTIME];
ths3b46e622007-09-17 08:09:54 +00004985 host->c_cc[VMIN] = target->c_cc[TARGET_VMIN];
ths5fafdf22007-09-16 21:08:06 +00004986 host->c_cc[VSWTC] = target->c_cc[TARGET_VSWTC];
ths3b46e622007-09-17 08:09:54 +00004987 host->c_cc[VSTART] = target->c_cc[TARGET_VSTART];
ths5fafdf22007-09-16 21:08:06 +00004988 host->c_cc[VSTOP] = target->c_cc[TARGET_VSTOP];
4989 host->c_cc[VSUSP] = target->c_cc[TARGET_VSUSP];
ths3b46e622007-09-17 08:09:54 +00004990 host->c_cc[VEOL] = target->c_cc[TARGET_VEOL];
4991 host->c_cc[VREPRINT] = target->c_cc[TARGET_VREPRINT];
4992 host->c_cc[VDISCARD] = target->c_cc[TARGET_VDISCARD];
4993 host->c_cc[VWERASE] = target->c_cc[TARGET_VWERASE];
4994 host->c_cc[VLNEXT] = target->c_cc[TARGET_VLNEXT];
ths5fafdf22007-09-16 21:08:06 +00004995 host->c_cc[VEOL2] = target->c_cc[TARGET_VEOL2];
bellard31e31b82003-02-18 22:55:36 +00004996}
ths3b46e622007-09-17 08:09:54 +00004997
bellard31e31b82003-02-18 22:55:36 +00004998static void host_to_target_termios (void *dst, const void *src)
4999{
5000 struct target_termios *target = dst;
5001 const struct host_termios *host = src;
5002
ths5fafdf22007-09-16 21:08:06 +00005003 target->c_iflag =
bellard31e31b82003-02-18 22:55:36 +00005004 tswap32(host_to_target_bitmask(host->c_iflag, iflag_tbl));
ths5fafdf22007-09-16 21:08:06 +00005005 target->c_oflag =
bellard31e31b82003-02-18 22:55:36 +00005006 tswap32(host_to_target_bitmask(host->c_oflag, oflag_tbl));
ths5fafdf22007-09-16 21:08:06 +00005007 target->c_cflag =
bellard31e31b82003-02-18 22:55:36 +00005008 tswap32(host_to_target_bitmask(host->c_cflag, cflag_tbl));
ths5fafdf22007-09-16 21:08:06 +00005009 target->c_lflag =
bellard31e31b82003-02-18 22:55:36 +00005010 tswap32(host_to_target_bitmask(host->c_lflag, lflag_tbl));
5011 target->c_line = host->c_line;
ths3b46e622007-09-17 08:09:54 +00005012
Arnaud Patard44607122009-04-21 17:39:08 +03005013 memset(target->c_cc, 0, sizeof(target->c_cc));
bellard31e31b82003-02-18 22:55:36 +00005014 target->c_cc[TARGET_VINTR] = host->c_cc[VINTR];
5015 target->c_cc[TARGET_VQUIT] = host->c_cc[VQUIT];
5016 target->c_cc[TARGET_VERASE] = host->c_cc[VERASE];
5017 target->c_cc[TARGET_VKILL] = host->c_cc[VKILL];
5018 target->c_cc[TARGET_VEOF] = host->c_cc[VEOF];
5019 target->c_cc[TARGET_VTIME] = host->c_cc[VTIME];
5020 target->c_cc[TARGET_VMIN] = host->c_cc[VMIN];
5021 target->c_cc[TARGET_VSWTC] = host->c_cc[VSWTC];
5022 target->c_cc[TARGET_VSTART] = host->c_cc[VSTART];
5023 target->c_cc[TARGET_VSTOP] = host->c_cc[VSTOP];
5024 target->c_cc[TARGET_VSUSP] = host->c_cc[VSUSP];
5025 target->c_cc[TARGET_VEOL] = host->c_cc[VEOL];
5026 target->c_cc[TARGET_VREPRINT] = host->c_cc[VREPRINT];
5027 target->c_cc[TARGET_VDISCARD] = host->c_cc[VDISCARD];
5028 target->c_cc[TARGET_VWERASE] = host->c_cc[VWERASE];
5029 target->c_cc[TARGET_VLNEXT] = host->c_cc[VLNEXT];
5030 target->c_cc[TARGET_VEOL2] = host->c_cc[VEOL2];
5031}
5032
blueswir18e853dc2008-10-05 10:49:32 +00005033static const StructEntry struct_termios_def = {
bellard31e31b82003-02-18 22:55:36 +00005034 .convert = { host_to_target_termios, target_to_host_termios },
5035 .size = { sizeof(struct target_termios), sizeof(struct host_termios) },
5036 .align = { __alignof__(struct target_termios), __alignof__(struct host_termios) },
5037};
5038
bellard5286db72003-06-05 00:57:30 +00005039static bitmask_transtbl mmap_flags_tbl[] = {
5040 { TARGET_MAP_SHARED, TARGET_MAP_SHARED, MAP_SHARED, MAP_SHARED },
5041 { TARGET_MAP_PRIVATE, TARGET_MAP_PRIVATE, MAP_PRIVATE, MAP_PRIVATE },
5042 { TARGET_MAP_FIXED, TARGET_MAP_FIXED, MAP_FIXED, MAP_FIXED },
5043 { TARGET_MAP_ANONYMOUS, TARGET_MAP_ANONYMOUS, MAP_ANONYMOUS, MAP_ANONYMOUS },
5044 { TARGET_MAP_GROWSDOWN, TARGET_MAP_GROWSDOWN, MAP_GROWSDOWN, MAP_GROWSDOWN },
5045 { TARGET_MAP_DENYWRITE, TARGET_MAP_DENYWRITE, MAP_DENYWRITE, MAP_DENYWRITE },
5046 { TARGET_MAP_EXECUTABLE, TARGET_MAP_EXECUTABLE, MAP_EXECUTABLE, MAP_EXECUTABLE },
5047 { TARGET_MAP_LOCKED, TARGET_MAP_LOCKED, MAP_LOCKED, MAP_LOCKED },
Christophe Lyone8efd8e2014-02-03 17:04:32 +01005048 { TARGET_MAP_NORESERVE, TARGET_MAP_NORESERVE, MAP_NORESERVE,
5049 MAP_NORESERVE },
bellard5286db72003-06-05 00:57:30 +00005050 { 0, 0, 0, 0 }
5051};
5052
bellard2ab83ea2003-06-15 19:56:46 +00005053#if defined(TARGET_I386)
bellard6dbad632003-03-16 18:05:05 +00005054
5055/* NOTE: there is really one LDT for all the threads */
blueswir1b1d8e522008-10-26 13:43:07 +00005056static uint8_t *ldt_table;
bellard6dbad632003-03-16 18:05:05 +00005057
bellard03acab62007-11-11 14:57:14 +00005058static abi_long read_ldt(abi_ulong ptr, unsigned long bytecount)
bellard6dbad632003-03-16 18:05:05 +00005059{
5060 int size;
pbrook53a59602006-03-25 19:31:22 +00005061 void *p;
bellard6dbad632003-03-16 18:05:05 +00005062
5063 if (!ldt_table)
5064 return 0;
5065 size = TARGET_LDT_ENTRIES * TARGET_LDT_ENTRY_SIZE;
5066 if (size > bytecount)
5067 size = bytecount;
bellard579a97f2007-11-11 14:26:47 +00005068 p = lock_user(VERIFY_WRITE, ptr, size, 0);
5069 if (!p)
bellard03acab62007-11-11 14:57:14 +00005070 return -TARGET_EFAULT;
bellard579a97f2007-11-11 14:26:47 +00005071 /* ??? Should this by byteswapped? */
pbrook53a59602006-03-25 19:31:22 +00005072 memcpy(p, ldt_table, size);
5073 unlock_user(p, ptr, size);
bellard6dbad632003-03-16 18:05:05 +00005074 return size;
5075}
5076
5077/* XXX: add locking support */
bellard03acab62007-11-11 14:57:14 +00005078static abi_long write_ldt(CPUX86State *env,
5079 abi_ulong ptr, unsigned long bytecount, int oldmode)
bellard6dbad632003-03-16 18:05:05 +00005080{
5081 struct target_modify_ldt_ldt_s ldt_info;
pbrook53a59602006-03-25 19:31:22 +00005082 struct target_modify_ldt_ldt_s *target_ldt_info;
bellard6dbad632003-03-16 18:05:05 +00005083 int seg_32bit, contents, read_exec_only, limit_in_pages;
bellard8d18e892007-11-14 15:18:40 +00005084 int seg_not_present, useable, lm;
bellard6dbad632003-03-16 18:05:05 +00005085 uint32_t *lp, entry_1, entry_2;
5086
5087 if (bytecount != sizeof(ldt_info))
bellard03acab62007-11-11 14:57:14 +00005088 return -TARGET_EINVAL;
bellard579a97f2007-11-11 14:26:47 +00005089 if (!lock_user_struct(VERIFY_READ, target_ldt_info, ptr, 1))
bellard03acab62007-11-11 14:57:14 +00005090 return -TARGET_EFAULT;
pbrook53a59602006-03-25 19:31:22 +00005091 ldt_info.entry_number = tswap32(target_ldt_info->entry_number);
Matthias Brauncbb21ee2011-08-12 19:57:41 +02005092 ldt_info.base_addr = tswapal(target_ldt_info->base_addr);
pbrook53a59602006-03-25 19:31:22 +00005093 ldt_info.limit = tswap32(target_ldt_info->limit);
5094 ldt_info.flags = tswap32(target_ldt_info->flags);
5095 unlock_user_struct(target_ldt_info, ptr, 0);
ths3b46e622007-09-17 08:09:54 +00005096
bellard6dbad632003-03-16 18:05:05 +00005097 if (ldt_info.entry_number >= TARGET_LDT_ENTRIES)
bellard03acab62007-11-11 14:57:14 +00005098 return -TARGET_EINVAL;
bellard6dbad632003-03-16 18:05:05 +00005099 seg_32bit = ldt_info.flags & 1;
5100 contents = (ldt_info.flags >> 1) & 3;
5101 read_exec_only = (ldt_info.flags >> 3) & 1;
5102 limit_in_pages = (ldt_info.flags >> 4) & 1;
5103 seg_not_present = (ldt_info.flags >> 5) & 1;
5104 useable = (ldt_info.flags >> 6) & 1;
bellard8d18e892007-11-14 15:18:40 +00005105#ifdef TARGET_ABI32
5106 lm = 0;
5107#else
5108 lm = (ldt_info.flags >> 7) & 1;
5109#endif
bellard6dbad632003-03-16 18:05:05 +00005110 if (contents == 3) {
5111 if (oldmode)
bellard03acab62007-11-11 14:57:14 +00005112 return -TARGET_EINVAL;
bellard6dbad632003-03-16 18:05:05 +00005113 if (seg_not_present == 0)
bellard03acab62007-11-11 14:57:14 +00005114 return -TARGET_EINVAL;
bellard6dbad632003-03-16 18:05:05 +00005115 }
5116 /* allocate the LDT */
5117 if (!ldt_table) {
balroge4415702008-11-10 02:55:33 +00005118 env->ldt.base = target_mmap(0,
5119 TARGET_LDT_ENTRIES * TARGET_LDT_ENTRY_SIZE,
5120 PROT_READ|PROT_WRITE,
5121 MAP_ANONYMOUS|MAP_PRIVATE, -1, 0);
5122 if (env->ldt.base == -1)
bellard03acab62007-11-11 14:57:14 +00005123 return -TARGET_ENOMEM;
balroge4415702008-11-10 02:55:33 +00005124 memset(g2h(env->ldt.base), 0,
5125 TARGET_LDT_ENTRIES * TARGET_LDT_ENTRY_SIZE);
bellard6dbad632003-03-16 18:05:05 +00005126 env->ldt.limit = 0xffff;
balroge4415702008-11-10 02:55:33 +00005127 ldt_table = g2h(env->ldt.base);
bellard6dbad632003-03-16 18:05:05 +00005128 }
5129
5130 /* NOTE: same code as Linux kernel */
5131 /* Allow LDTs to be cleared by the user. */
5132 if (ldt_info.base_addr == 0 && ldt_info.limit == 0) {
5133 if (oldmode ||
5134 (contents == 0 &&
5135 read_exec_only == 1 &&
5136 seg_32bit == 0 &&
5137 limit_in_pages == 0 &&
5138 seg_not_present == 1 &&
5139 useable == 0 )) {
5140 entry_1 = 0;
5141 entry_2 = 0;
5142 goto install;
5143 }
5144 }
ths3b46e622007-09-17 08:09:54 +00005145
bellard6dbad632003-03-16 18:05:05 +00005146 entry_1 = ((ldt_info.base_addr & 0x0000ffff) << 16) |
5147 (ldt_info.limit & 0x0ffff);
5148 entry_2 = (ldt_info.base_addr & 0xff000000) |
5149 ((ldt_info.base_addr & 0x00ff0000) >> 16) |
5150 (ldt_info.limit & 0xf0000) |
5151 ((read_exec_only ^ 1) << 9) |
5152 (contents << 10) |
5153 ((seg_not_present ^ 1) << 15) |
5154 (seg_32bit << 22) |
5155 (limit_in_pages << 23) |
bellard8d18e892007-11-14 15:18:40 +00005156 (lm << 21) |
bellard6dbad632003-03-16 18:05:05 +00005157 0x7000;
5158 if (!oldmode)
5159 entry_2 |= (useable << 20);
bellard14ae3ba2003-05-27 23:25:06 +00005160
bellard6dbad632003-03-16 18:05:05 +00005161 /* Install the new entry ... */
5162install:
5163 lp = (uint32_t *)(ldt_table + (ldt_info.entry_number << 3));
5164 lp[0] = tswap32(entry_1);
5165 lp[1] = tswap32(entry_2);
5166 return 0;
5167}
5168
5169/* specific and weird i386 syscalls */
blueswir18fcd3692008-08-17 20:26:25 +00005170static abi_long do_modify_ldt(CPUX86State *env, int func, abi_ulong ptr,
5171 unsigned long bytecount)
bellard6dbad632003-03-16 18:05:05 +00005172{
bellard03acab62007-11-11 14:57:14 +00005173 abi_long ret;
ths3b46e622007-09-17 08:09:54 +00005174
bellard6dbad632003-03-16 18:05:05 +00005175 switch (func) {
5176 case 0:
5177 ret = read_ldt(ptr, bytecount);
5178 break;
5179 case 1:
5180 ret = write_ldt(env, ptr, bytecount, 1);
5181 break;
5182 case 0x11:
5183 ret = write_ldt(env, ptr, bytecount, 0);
5184 break;
bellard03acab62007-11-11 14:57:14 +00005185 default:
5186 ret = -TARGET_ENOSYS;
5187 break;
bellard6dbad632003-03-16 18:05:05 +00005188 }
5189 return ret;
5190}
bellard1b6b0292003-03-22 17:31:38 +00005191
blueswir14583f582008-08-24 10:35:55 +00005192#if defined(TARGET_I386) && defined(TARGET_ABI32)
Alexander Grafbc22eb42013-07-16 18:44:58 +01005193abi_long do_set_thread_area(CPUX86State *env, abi_ulong ptr)
bellard8d18e892007-11-14 15:18:40 +00005194{
5195 uint64_t *gdt_table = g2h(env->gdt.base);
5196 struct target_modify_ldt_ldt_s ldt_info;
5197 struct target_modify_ldt_ldt_s *target_ldt_info;
5198 int seg_32bit, contents, read_exec_only, limit_in_pages;
5199 int seg_not_present, useable, lm;
5200 uint32_t *lp, entry_1, entry_2;
5201 int i;
5202
5203 lock_user_struct(VERIFY_WRITE, target_ldt_info, ptr, 1);
5204 if (!target_ldt_info)
5205 return -TARGET_EFAULT;
5206 ldt_info.entry_number = tswap32(target_ldt_info->entry_number);
Matthias Brauncbb21ee2011-08-12 19:57:41 +02005207 ldt_info.base_addr = tswapal(target_ldt_info->base_addr);
bellard8d18e892007-11-14 15:18:40 +00005208 ldt_info.limit = tswap32(target_ldt_info->limit);
5209 ldt_info.flags = tswap32(target_ldt_info->flags);
5210 if (ldt_info.entry_number == -1) {
5211 for (i=TARGET_GDT_ENTRY_TLS_MIN; i<=TARGET_GDT_ENTRY_TLS_MAX; i++) {
5212 if (gdt_table[i] == 0) {
5213 ldt_info.entry_number = i;
5214 target_ldt_info->entry_number = tswap32(i);
5215 break;
5216 }
5217 }
5218 }
5219 unlock_user_struct(target_ldt_info, ptr, 1);
5220
5221 if (ldt_info.entry_number < TARGET_GDT_ENTRY_TLS_MIN ||
5222 ldt_info.entry_number > TARGET_GDT_ENTRY_TLS_MAX)
5223 return -TARGET_EINVAL;
5224 seg_32bit = ldt_info.flags & 1;
5225 contents = (ldt_info.flags >> 1) & 3;
5226 read_exec_only = (ldt_info.flags >> 3) & 1;
5227 limit_in_pages = (ldt_info.flags >> 4) & 1;
5228 seg_not_present = (ldt_info.flags >> 5) & 1;
5229 useable = (ldt_info.flags >> 6) & 1;
5230#ifdef TARGET_ABI32
5231 lm = 0;
5232#else
5233 lm = (ldt_info.flags >> 7) & 1;
5234#endif
5235
5236 if (contents == 3) {
5237 if (seg_not_present == 0)
5238 return -TARGET_EINVAL;
5239 }
5240
5241 /* NOTE: same code as Linux kernel */
5242 /* Allow LDTs to be cleared by the user. */
5243 if (ldt_info.base_addr == 0 && ldt_info.limit == 0) {
5244 if ((contents == 0 &&
5245 read_exec_only == 1 &&
5246 seg_32bit == 0 &&
5247 limit_in_pages == 0 &&
5248 seg_not_present == 1 &&
5249 useable == 0 )) {
5250 entry_1 = 0;
5251 entry_2 = 0;
5252 goto install;
5253 }
5254 }
5255
5256 entry_1 = ((ldt_info.base_addr & 0x0000ffff) << 16) |
5257 (ldt_info.limit & 0x0ffff);
5258 entry_2 = (ldt_info.base_addr & 0xff000000) |
5259 ((ldt_info.base_addr & 0x00ff0000) >> 16) |
5260 (ldt_info.limit & 0xf0000) |
5261 ((read_exec_only ^ 1) << 9) |
5262 (contents << 10) |
5263 ((seg_not_present ^ 1) << 15) |
5264 (seg_32bit << 22) |
5265 (limit_in_pages << 23) |
5266 (useable << 20) |
5267 (lm << 21) |
5268 0x7000;
5269
5270 /* Install the new entry ... */
5271install:
5272 lp = (uint32_t *)(gdt_table + ldt_info.entry_number);
5273 lp[0] = tswap32(entry_1);
5274 lp[1] = tswap32(entry_2);
5275 return 0;
5276}
5277
blueswir18fcd3692008-08-17 20:26:25 +00005278static abi_long do_get_thread_area(CPUX86State *env, abi_ulong ptr)
bellard8d18e892007-11-14 15:18:40 +00005279{
5280 struct target_modify_ldt_ldt_s *target_ldt_info;
5281 uint64_t *gdt_table = g2h(env->gdt.base);
5282 uint32_t base_addr, limit, flags;
5283 int seg_32bit, contents, read_exec_only, limit_in_pages, idx;
5284 int seg_not_present, useable, lm;
5285 uint32_t *lp, entry_1, entry_2;
5286
5287 lock_user_struct(VERIFY_WRITE, target_ldt_info, ptr, 1);
5288 if (!target_ldt_info)
5289 return -TARGET_EFAULT;
5290 idx = tswap32(target_ldt_info->entry_number);
5291 if (idx < TARGET_GDT_ENTRY_TLS_MIN ||
5292 idx > TARGET_GDT_ENTRY_TLS_MAX) {
5293 unlock_user_struct(target_ldt_info, ptr, 1);
5294 return -TARGET_EINVAL;
5295 }
5296 lp = (uint32_t *)(gdt_table + idx);
5297 entry_1 = tswap32(lp[0]);
5298 entry_2 = tswap32(lp[1]);
5299
5300 read_exec_only = ((entry_2 >> 9) & 1) ^ 1;
5301 contents = (entry_2 >> 10) & 3;
5302 seg_not_present = ((entry_2 >> 15) & 1) ^ 1;
5303 seg_32bit = (entry_2 >> 22) & 1;
5304 limit_in_pages = (entry_2 >> 23) & 1;
5305 useable = (entry_2 >> 20) & 1;
5306#ifdef TARGET_ABI32
5307 lm = 0;
5308#else
5309 lm = (entry_2 >> 21) & 1;
5310#endif
5311 flags = (seg_32bit << 0) | (contents << 1) |
5312 (read_exec_only << 3) | (limit_in_pages << 4) |
5313 (seg_not_present << 5) | (useable << 6) | (lm << 7);
5314 limit = (entry_1 & 0xffff) | (entry_2 & 0xf0000);
5315 base_addr = (entry_1 >> 16) |
5316 (entry_2 & 0xff000000) |
5317 ((entry_2 & 0xff) << 16);
Matthias Brauncbb21ee2011-08-12 19:57:41 +02005318 target_ldt_info->base_addr = tswapal(base_addr);
bellard8d18e892007-11-14 15:18:40 +00005319 target_ldt_info->limit = tswap32(limit);
5320 target_ldt_info->flags = tswap32(flags);
5321 unlock_user_struct(target_ldt_info, ptr, 1);
5322 return 0;
5323}
blueswir14583f582008-08-24 10:35:55 +00005324#endif /* TARGET_I386 && TARGET_ABI32 */
bellard8d18e892007-11-14 15:18:40 +00005325
bellardd2fd1af2007-11-14 18:08:56 +00005326#ifndef TARGET_ABI32
Peter Maydell2667e712013-07-16 18:44:59 +01005327abi_long do_arch_prctl(CPUX86State *env, int code, abi_ulong addr)
bellardd2fd1af2007-11-14 18:08:56 +00005328{
Juan Quintela1add8692011-06-16 17:37:09 +01005329 abi_long ret = 0;
bellardd2fd1af2007-11-14 18:08:56 +00005330 abi_ulong val;
5331 int idx;
Juan Quintela1add8692011-06-16 17:37:09 +01005332
bellardd2fd1af2007-11-14 18:08:56 +00005333 switch(code) {
5334 case TARGET_ARCH_SET_GS:
5335 case TARGET_ARCH_SET_FS:
5336 if (code == TARGET_ARCH_SET_GS)
5337 idx = R_GS;
5338 else
5339 idx = R_FS;
5340 cpu_x86_load_seg(env, idx, 0);
5341 env->segs[idx].base = addr;
5342 break;
5343 case TARGET_ARCH_GET_GS:
5344 case TARGET_ARCH_GET_FS:
5345 if (code == TARGET_ARCH_GET_GS)
5346 idx = R_GS;
5347 else
5348 idx = R_FS;
5349 val = env->segs[idx].base;
5350 if (put_user(val, addr, abi_ulong))
Juan Quintela1add8692011-06-16 17:37:09 +01005351 ret = -TARGET_EFAULT;
bellardd2fd1af2007-11-14 18:08:56 +00005352 break;
5353 default:
5354 ret = -TARGET_EINVAL;
5355 break;
5356 }
Juan Quintela1add8692011-06-16 17:37:09 +01005357 return ret;
bellardd2fd1af2007-11-14 18:08:56 +00005358}
5359#endif
5360
bellard2ab83ea2003-06-15 19:56:46 +00005361#endif /* defined(TARGET_I386) */
5362
Riku Voipio05098a92011-03-04 15:27:29 +02005363#define NEW_STACK_SIZE 0x40000
pbrookd865bab2008-06-07 22:12:17 +00005364
pbrookd865bab2008-06-07 22:12:17 +00005365
5366static pthread_mutex_t clone_lock = PTHREAD_MUTEX_INITIALIZER;
5367typedef struct {
Andreas Färber9349b4f2012-03-14 01:38:32 +01005368 CPUArchState *env;
pbrookd865bab2008-06-07 22:12:17 +00005369 pthread_mutex_t mutex;
5370 pthread_cond_t cond;
5371 pthread_t thread;
5372 uint32_t tid;
5373 abi_ulong child_tidptr;
5374 abi_ulong parent_tidptr;
5375 sigset_t sigmask;
5376} new_thread_info;
5377
5378static void *clone_func(void *arg)
5379{
5380 new_thread_info *info = arg;
Andreas Färber9349b4f2012-03-14 01:38:32 +01005381 CPUArchState *env;
Andreas Färber0d342822012-12-17 07:12:13 +01005382 CPUState *cpu;
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03005383 TaskState *ts;
pbrookd865bab2008-06-07 22:12:17 +00005384
Emilio G. Cota70903762015-08-23 20:23:41 -04005385 rcu_register_thread();
pbrookd865bab2008-06-07 22:12:17 +00005386 env = info->env;
Andreas Färber0d342822012-12-17 07:12:13 +01005387 cpu = ENV_GET_CPU(env);
Andreas Färbera2247f82013-06-09 19:47:04 +02005388 thread_cpu = cpu;
Andreas Färber0429a972013-08-26 18:14:44 +02005389 ts = (TaskState *)cpu->opaque;
pbrookd865bab2008-06-07 22:12:17 +00005390 info->tid = gettid();
Andreas Färber0d342822012-12-17 07:12:13 +01005391 cpu->host_tid = info->tid;
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03005392 task_settid(ts);
pbrookd865bab2008-06-07 22:12:17 +00005393 if (info->child_tidptr)
5394 put_user_u32(info->tid, info->child_tidptr);
5395 if (info->parent_tidptr)
5396 put_user_u32(info->tid, info->parent_tidptr);
5397 /* Enable signals. */
5398 sigprocmask(SIG_SETMASK, &info->sigmask, NULL);
5399 /* Signal to the parent that we're ready. */
5400 pthread_mutex_lock(&info->mutex);
5401 pthread_cond_broadcast(&info->cond);
5402 pthread_mutex_unlock(&info->mutex);
5403 /* Wait until the parent has finshed initializing the tls state. */
5404 pthread_mutex_lock(&clone_lock);
5405 pthread_mutex_unlock(&clone_lock);
5406 cpu_loop(env);
5407 /* never exits */
5408 return NULL;
5409}
bellard1b6b0292003-03-22 17:31:38 +00005410
ths0da46a62007-10-20 20:23:07 +00005411/* do_fork() Must return host values and target errnos (unlike most
5412 do_*() functions). */
Andreas Färber9349b4f2012-03-14 01:38:32 +01005413static int do_fork(CPUArchState *env, unsigned int flags, abi_ulong newsp,
pbrookd865bab2008-06-07 22:12:17 +00005414 abi_ulong parent_tidptr, target_ulong newtls,
5415 abi_ulong child_tidptr)
bellard1b6b0292003-03-22 17:31:38 +00005416{
Andreas Färber0429a972013-08-26 18:14:44 +02005417 CPUState *cpu = ENV_GET_CPU(env);
bellard1b6b0292003-03-22 17:31:38 +00005418 int ret;
bellard5cd43932003-03-29 16:54:36 +00005419 TaskState *ts;
Andreas Färber0429a972013-08-26 18:14:44 +02005420 CPUState *new_cpu;
Andreas Färber9349b4f2012-03-14 01:38:32 +01005421 CPUArchState *new_env;
pbrookd865bab2008-06-07 22:12:17 +00005422 unsigned int nptl_flags;
5423 sigset_t sigmask;
ths3b46e622007-09-17 08:09:54 +00005424
balrog436d1242008-09-21 02:39:45 +00005425 /* Emulate vfork() with fork() */
5426 if (flags & CLONE_VFORK)
5427 flags &= ~(CLONE_VFORK | CLONE_VM);
5428
bellard1b6b0292003-03-22 17:31:38 +00005429 if (flags & CLONE_VM) {
Andreas Färber0429a972013-08-26 18:14:44 +02005430 TaskState *parent_ts = (TaskState *)cpu->opaque;
pbrookd865bab2008-06-07 22:12:17 +00005431 new_thread_info info;
5432 pthread_attr_t attr;
Peter Maydell24cb36a2013-07-16 18:45:00 +01005433
Markus Armbrusterc78d65e2015-09-14 13:53:03 +02005434 ts = g_new0(TaskState, 1);
pbrook624f7972008-05-31 16:11:38 +00005435 init_task_state(ts);
bellard1b6b0292003-03-22 17:31:38 +00005436 /* we create a new CPU instance. */
thsc5be9f02007-02-28 20:20:53 +00005437 new_env = cpu_copy(env);
pbrook6e68e072008-05-30 17:22:15 +00005438 /* Init regs that differ from the parent. */
5439 cpu_clone_regs(new_env, newsp);
Andreas Färber0429a972013-08-26 18:14:44 +02005440 new_cpu = ENV_GET_CPU(new_env);
5441 new_cpu->opaque = ts;
Mika Westerbergedf8e2a2009-04-07 09:57:11 +03005442 ts->bprm = parent_ts->bprm;
5443 ts->info = parent_ts->info;
Peter Maydell3d3efba2016-05-27 15:51:49 +01005444 ts->signal_mask = parent_ts->signal_mask;
pbrookd865bab2008-06-07 22:12:17 +00005445 nptl_flags = flags;
5446 flags &= ~CLONE_NPTL_FLAGS2;
5447
pbrookc2764712009-03-07 15:24:59 +00005448 if (nptl_flags & CLONE_CHILD_CLEARTID) {
5449 ts->child_tidptr = child_tidptr;
5450 }
5451
pbrookd865bab2008-06-07 22:12:17 +00005452 if (nptl_flags & CLONE_SETTLS)
5453 cpu_set_tls (new_env, newtls);
5454
5455 /* Grab a mutex so that thread setup appears atomic. */
5456 pthread_mutex_lock(&clone_lock);
5457
5458 memset(&info, 0, sizeof(info));
5459 pthread_mutex_init(&info.mutex, NULL);
5460 pthread_mutex_lock(&info.mutex);
5461 pthread_cond_init(&info.cond, NULL);
5462 info.env = new_env;
5463 if (nptl_flags & CLONE_CHILD_SETTID)
5464 info.child_tidptr = child_tidptr;
5465 if (nptl_flags & CLONE_PARENT_SETTID)
5466 info.parent_tidptr = parent_tidptr;
5467
5468 ret = pthread_attr_init(&attr);
Nathan Froyd48e15fc2010-10-29 07:48:57 -07005469 ret = pthread_attr_setstacksize(&attr, NEW_STACK_SIZE);
5470 ret = pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED);
pbrookd865bab2008-06-07 22:12:17 +00005471 /* It is not safe to deliver signals until the child has finished
5472 initializing, so temporarily block all signals. */
5473 sigfillset(&sigmask);
5474 sigprocmask(SIG_BLOCK, &sigmask, &info.sigmask);
5475
5476 ret = pthread_create(&info.thread, &attr, clone_func, &info);
pbrookc2764712009-03-07 15:24:59 +00005477 /* TODO: Free new CPU state if thread creation failed. */
pbrookd865bab2008-06-07 22:12:17 +00005478
5479 sigprocmask(SIG_SETMASK, &info.sigmask, NULL);
5480 pthread_attr_destroy(&attr);
5481 if (ret == 0) {
5482 /* Wait for the child to initialize. */
5483 pthread_cond_wait(&info.cond, &info.mutex);
5484 ret = info.tid;
5485 if (flags & CLONE_PARENT_SETTID)
5486 put_user_u32(ret, parent_tidptr);
5487 } else {
5488 ret = -1;
5489 }
5490 pthread_mutex_unlock(&info.mutex);
5491 pthread_cond_destroy(&info.cond);
5492 pthread_mutex_destroy(&info.mutex);
5493 pthread_mutex_unlock(&clone_lock);
bellard1b6b0292003-03-22 17:31:38 +00005494 } else {
5495 /* if no CLONE_VM, we consider it is a fork */
Timothy E Baldwin93b4eff2015-08-31 00:26:21 +01005496 if ((flags & ~(CSIGNAL | CLONE_NPTL_FLAGS2)) != 0) {
5497 return -TARGET_EINVAL;
5498 }
Timothy E Baldwin7d92d342016-05-27 15:51:58 +01005499
5500 if (block_signals()) {
5501 return -TARGET_ERESTARTSYS;
5502 }
5503
pbrookd865bab2008-06-07 22:12:17 +00005504 fork_start();
bellard1b6b0292003-03-22 17:31:38 +00005505 ret = fork();
pbrookd865bab2008-06-07 22:12:17 +00005506 if (ret == 0) {
aurel322b1319c2008-12-18 22:44:04 +00005507 /* Child Process. */
Paolo Bonzinia59629f2015-03-31 13:01:05 +02005508 rcu_after_fork();
pbrookd865bab2008-06-07 22:12:17 +00005509 cpu_clone_regs(env, newsp);
5510 fork_end(1);
aurel322b1319c2008-12-18 22:44:04 +00005511 /* There is a race condition here. The parent process could
5512 theoretically read the TID in the child process before the child
5513 tid is set. This would require using either ptrace
5514 (not implemented) or having *_tidptr to point at a shared memory
5515 mapping. We can't repeat the spinlock hack used above because
5516 the child process gets its own copy of the lock. */
pbrookd865bab2008-06-07 22:12:17 +00005517 if (flags & CLONE_CHILD_SETTID)
5518 put_user_u32(gettid(), child_tidptr);
5519 if (flags & CLONE_PARENT_SETTID)
5520 put_user_u32(gettid(), parent_tidptr);
Andreas Färber0429a972013-08-26 18:14:44 +02005521 ts = (TaskState *)cpu->opaque;
pbrookd865bab2008-06-07 22:12:17 +00005522 if (flags & CLONE_SETTLS)
5523 cpu_set_tls (env, newtls);
pbrookc2764712009-03-07 15:24:59 +00005524 if (flags & CLONE_CHILD_CLEARTID)
5525 ts->child_tidptr = child_tidptr;
pbrookd865bab2008-06-07 22:12:17 +00005526 } else {
5527 fork_end(0);
5528 }
bellard1b6b0292003-03-22 17:31:38 +00005529 }
5530 return ret;
5531}
5532
Arnaud Patard (Rtp)5f106812009-06-03 14:35:04 +02005533/* warning : doesn't handle linux specific flags... */
5534static int target_to_host_fcntl_cmd(int cmd)
5535{
5536 switch(cmd) {
5537 case TARGET_F_DUPFD:
5538 case TARGET_F_GETFD:
5539 case TARGET_F_SETFD:
5540 case TARGET_F_GETFL:
5541 case TARGET_F_SETFL:
5542 return cmd;
5543 case TARGET_F_GETLK:
5544 return F_GETLK;
5545 case TARGET_F_SETLK:
5546 return F_SETLK;
5547 case TARGET_F_SETLKW:
5548 return F_SETLKW;
5549 case TARGET_F_GETOWN:
5550 return F_GETOWN;
5551 case TARGET_F_SETOWN:
5552 return F_SETOWN;
5553 case TARGET_F_GETSIG:
5554 return F_GETSIG;
5555 case TARGET_F_SETSIG:
5556 return F_SETSIG;
5557#if TARGET_ABI_BITS == 32
5558 case TARGET_F_GETLK64:
5559 return F_GETLK64;
5560 case TARGET_F_SETLK64:
5561 return F_SETLK64;
5562 case TARGET_F_SETLKW64:
5563 return F_SETLKW64;
5564#endif
Ulrich Hecht7e22e542009-07-24 19:10:27 +02005565 case TARGET_F_SETLEASE:
5566 return F_SETLEASE;
5567 case TARGET_F_GETLEASE:
5568 return F_GETLEASE;
malcfbd5de92009-09-06 06:31:59 +04005569#ifdef F_DUPFD_CLOEXEC
Ulrich Hecht7e22e542009-07-24 19:10:27 +02005570 case TARGET_F_DUPFD_CLOEXEC:
5571 return F_DUPFD_CLOEXEC;
malcfbd5de92009-09-06 06:31:59 +04005572#endif
Ulrich Hecht7e22e542009-07-24 19:10:27 +02005573 case TARGET_F_NOTIFY:
5574 return F_NOTIFY;
Andreas Schwab8d5d3002014-03-07 15:24:08 +01005575#ifdef F_GETOWN_EX
5576 case TARGET_F_GETOWN_EX:
5577 return F_GETOWN_EX;
5578#endif
5579#ifdef F_SETOWN_EX
5580 case TARGET_F_SETOWN_EX:
5581 return F_SETOWN_EX;
5582#endif
Arnaud Patard (Rtp)5f106812009-06-03 14:35:04 +02005583 default:
5584 return -TARGET_EINVAL;
5585 }
5586 return -TARGET_EINVAL;
5587}
5588
Laurent Vivier2ba7f732013-01-10 21:42:48 +01005589#define TRANSTBL_CONVERT(a) { -1, TARGET_##a, -1, a }
5590static const bitmask_transtbl flock_tbl[] = {
5591 TRANSTBL_CONVERT(F_RDLCK),
5592 TRANSTBL_CONVERT(F_WRLCK),
5593 TRANSTBL_CONVERT(F_UNLCK),
5594 TRANSTBL_CONVERT(F_EXLCK),
5595 TRANSTBL_CONVERT(F_SHLCK),
5596 { 0, 0, 0, 0 }
5597};
5598
blueswir1992f48a2007-10-14 16:27:31 +00005599static abi_long do_fcntl(int fd, int cmd, abi_ulong arg)
bellard7775e9e2003-05-14 22:46:48 +00005600{
5601 struct flock fl;
pbrook53a59602006-03-25 19:31:22 +00005602 struct target_flock *target_fl;
ths43f238d2007-01-05 20:55:49 +00005603 struct flock64 fl64;
5604 struct target_flock64 *target_fl64;
Andreas Schwab8d5d3002014-03-07 15:24:08 +01005605#ifdef F_GETOWN_EX
5606 struct f_owner_ex fox;
5607 struct target_f_owner_ex *target_fox;
5608#endif
blueswir1992f48a2007-10-14 16:27:31 +00005609 abi_long ret;
Arnaud Patard (Rtp)5f106812009-06-03 14:35:04 +02005610 int host_cmd = target_to_host_fcntl_cmd(cmd);
5611
5612 if (host_cmd == -TARGET_EINVAL)
5613 return host_cmd;
pbrook53a59602006-03-25 19:31:22 +00005614
bellard7775e9e2003-05-14 22:46:48 +00005615 switch(cmd) {
5616 case TARGET_F_GETLK:
bellard579a97f2007-11-11 14:26:47 +00005617 if (!lock_user_struct(VERIFY_READ, target_fl, arg, 1))
5618 return -TARGET_EFAULT;
Laurent Vivier2ba7f732013-01-10 21:42:48 +01005619 fl.l_type =
5620 target_to_host_bitmask(tswap16(target_fl->l_type), flock_tbl);
ths58134272007-03-31 18:59:32 +00005621 fl.l_whence = tswap16(target_fl->l_whence);
Matthias Brauncbb21ee2011-08-12 19:57:41 +02005622 fl.l_start = tswapal(target_fl->l_start);
5623 fl.l_len = tswapal(target_fl->l_len);
Ulrich Hecht7e22e542009-07-24 19:10:27 +02005624 fl.l_pid = tswap32(target_fl->l_pid);
ths58134272007-03-31 18:59:32 +00005625 unlock_user_struct(target_fl, arg, 0);
Arnaud Patard (Rtp)5f106812009-06-03 14:35:04 +02005626 ret = get_errno(fcntl(fd, host_cmd, &fl));
bellard7775e9e2003-05-14 22:46:48 +00005627 if (ret == 0) {
bellard579a97f2007-11-11 14:26:47 +00005628 if (!lock_user_struct(VERIFY_WRITE, target_fl, arg, 0))
5629 return -TARGET_EFAULT;
Laurent Vivier2ba7f732013-01-10 21:42:48 +01005630 target_fl->l_type =
5631 host_to_target_bitmask(tswap16(fl.l_type), flock_tbl);
bellard7775e9e2003-05-14 22:46:48 +00005632 target_fl->l_whence = tswap16(fl.l_whence);
Matthias Brauncbb21ee2011-08-12 19:57:41 +02005633 target_fl->l_start = tswapal(fl.l_start);
5634 target_fl->l_len = tswapal(fl.l_len);
Ulrich Hecht7e22e542009-07-24 19:10:27 +02005635 target_fl->l_pid = tswap32(fl.l_pid);
pbrook53a59602006-03-25 19:31:22 +00005636 unlock_user_struct(target_fl, arg, 1);
bellard7775e9e2003-05-14 22:46:48 +00005637 }
5638 break;
ths3b46e622007-09-17 08:09:54 +00005639
bellard7775e9e2003-05-14 22:46:48 +00005640 case TARGET_F_SETLK:
5641 case TARGET_F_SETLKW:
bellard579a97f2007-11-11 14:26:47 +00005642 if (!lock_user_struct(VERIFY_READ, target_fl, arg, 1))
5643 return -TARGET_EFAULT;
Laurent Vivier2ba7f732013-01-10 21:42:48 +01005644 fl.l_type =
5645 target_to_host_bitmask(tswap16(target_fl->l_type), flock_tbl);
bellard7775e9e2003-05-14 22:46:48 +00005646 fl.l_whence = tswap16(target_fl->l_whence);
Matthias Brauncbb21ee2011-08-12 19:57:41 +02005647 fl.l_start = tswapal(target_fl->l_start);
5648 fl.l_len = tswapal(target_fl->l_len);
Ulrich Hecht7e22e542009-07-24 19:10:27 +02005649 fl.l_pid = tswap32(target_fl->l_pid);
pbrook53a59602006-03-25 19:31:22 +00005650 unlock_user_struct(target_fl, arg, 0);
Arnaud Patard (Rtp)5f106812009-06-03 14:35:04 +02005651 ret = get_errno(fcntl(fd, host_cmd, &fl));
bellard7775e9e2003-05-14 22:46:48 +00005652 break;
ths3b46e622007-09-17 08:09:54 +00005653
bellard7775e9e2003-05-14 22:46:48 +00005654 case TARGET_F_GETLK64:
bellard579a97f2007-11-11 14:26:47 +00005655 if (!lock_user_struct(VERIFY_READ, target_fl64, arg, 1))
5656 return -TARGET_EFAULT;
Laurent Vivier2ba7f732013-01-10 21:42:48 +01005657 fl64.l_type =
5658 target_to_host_bitmask(tswap16(target_fl64->l_type), flock_tbl) >> 1;
ths58134272007-03-31 18:59:32 +00005659 fl64.l_whence = tswap16(target_fl64->l_whence);
Matthias Brauncbb21ee2011-08-12 19:57:41 +02005660 fl64.l_start = tswap64(target_fl64->l_start);
5661 fl64.l_len = tswap64(target_fl64->l_len);
Ulrich Hecht7e22e542009-07-24 19:10:27 +02005662 fl64.l_pid = tswap32(target_fl64->l_pid);
ths58134272007-03-31 18:59:32 +00005663 unlock_user_struct(target_fl64, arg, 0);
Arnaud Patard (Rtp)5f106812009-06-03 14:35:04 +02005664 ret = get_errno(fcntl(fd, host_cmd, &fl64));
ths43f238d2007-01-05 20:55:49 +00005665 if (ret == 0) {
bellard579a97f2007-11-11 14:26:47 +00005666 if (!lock_user_struct(VERIFY_WRITE, target_fl64, arg, 0))
5667 return -TARGET_EFAULT;
Laurent Vivier2ba7f732013-01-10 21:42:48 +01005668 target_fl64->l_type =
5669 host_to_target_bitmask(tswap16(fl64.l_type), flock_tbl) >> 1;
ths43f238d2007-01-05 20:55:49 +00005670 target_fl64->l_whence = tswap16(fl64.l_whence);
Matthias Brauncbb21ee2011-08-12 19:57:41 +02005671 target_fl64->l_start = tswap64(fl64.l_start);
5672 target_fl64->l_len = tswap64(fl64.l_len);
Ulrich Hecht7e22e542009-07-24 19:10:27 +02005673 target_fl64->l_pid = tswap32(fl64.l_pid);
ths43f238d2007-01-05 20:55:49 +00005674 unlock_user_struct(target_fl64, arg, 1);
5675 }
bellard9ee1fa22007-11-11 15:11:19 +00005676 break;
bellard7775e9e2003-05-14 22:46:48 +00005677 case TARGET_F_SETLK64:
5678 case TARGET_F_SETLKW64:
bellard579a97f2007-11-11 14:26:47 +00005679 if (!lock_user_struct(VERIFY_READ, target_fl64, arg, 1))
5680 return -TARGET_EFAULT;
Laurent Vivier2ba7f732013-01-10 21:42:48 +01005681 fl64.l_type =
5682 target_to_host_bitmask(tswap16(target_fl64->l_type), flock_tbl) >> 1;
ths43f238d2007-01-05 20:55:49 +00005683 fl64.l_whence = tswap16(target_fl64->l_whence);
Matthias Brauncbb21ee2011-08-12 19:57:41 +02005684 fl64.l_start = tswap64(target_fl64->l_start);
5685 fl64.l_len = tswap64(target_fl64->l_len);
Ulrich Hecht7e22e542009-07-24 19:10:27 +02005686 fl64.l_pid = tswap32(target_fl64->l_pid);
ths43f238d2007-01-05 20:55:49 +00005687 unlock_user_struct(target_fl64, arg, 0);
Arnaud Patard (Rtp)5f106812009-06-03 14:35:04 +02005688 ret = get_errno(fcntl(fd, host_cmd, &fl64));
bellard7775e9e2003-05-14 22:46:48 +00005689 break;
5690
Arnaud Patard (Rtp)5f106812009-06-03 14:35:04 +02005691 case TARGET_F_GETFL:
5692 ret = get_errno(fcntl(fd, host_cmd, arg));
bellard9ee1fa22007-11-11 15:11:19 +00005693 if (ret >= 0) {
5694 ret = host_to_target_bitmask(ret, fcntl_flags_tbl);
5695 }
bellardffa65c32004-01-04 23:57:22 +00005696 break;
5697
Arnaud Patard (Rtp)5f106812009-06-03 14:35:04 +02005698 case TARGET_F_SETFL:
5699 ret = get_errno(fcntl(fd, host_cmd, target_to_host_bitmask(arg, fcntl_flags_tbl)));
5700 break;
5701
Andreas Schwab8d5d3002014-03-07 15:24:08 +01005702#ifdef F_GETOWN_EX
5703 case TARGET_F_GETOWN_EX:
5704 ret = get_errno(fcntl(fd, host_cmd, &fox));
5705 if (ret >= 0) {
5706 if (!lock_user_struct(VERIFY_WRITE, target_fox, arg, 0))
5707 return -TARGET_EFAULT;
5708 target_fox->type = tswap32(fox.type);
5709 target_fox->pid = tswap32(fox.pid);
5710 unlock_user_struct(target_fox, arg, 1);
5711 }
5712 break;
5713#endif
5714
5715#ifdef F_SETOWN_EX
5716 case TARGET_F_SETOWN_EX:
5717 if (!lock_user_struct(VERIFY_READ, target_fox, arg, 1))
5718 return -TARGET_EFAULT;
5719 fox.type = tswap32(target_fox->type);
5720 fox.pid = tswap32(target_fox->pid);
5721 unlock_user_struct(target_fox, arg, 0);
5722 ret = get_errno(fcntl(fd, host_cmd, &fox));
5723 break;
5724#endif
5725
Arnaud Patard (Rtp)5f106812009-06-03 14:35:04 +02005726 case TARGET_F_SETOWN:
5727 case TARGET_F_GETOWN:
5728 case TARGET_F_SETSIG:
5729 case TARGET_F_GETSIG:
Ulrich Hecht7e22e542009-07-24 19:10:27 +02005730 case TARGET_F_SETLEASE:
5731 case TARGET_F_GETLEASE:
Arnaud Patard (Rtp)5f106812009-06-03 14:35:04 +02005732 ret = get_errno(fcntl(fd, host_cmd, arg));
bellardffa65c32004-01-04 23:57:22 +00005733 break;
5734
bellard7775e9e2003-05-14 22:46:48 +00005735 default:
bellard9ee1fa22007-11-11 15:11:19 +00005736 ret = get_errno(fcntl(fd, cmd, arg));
bellard7775e9e2003-05-14 22:46:48 +00005737 break;
5738 }
5739 return ret;
5740}
5741
bellard67867302003-11-23 17:05:30 +00005742#ifdef USE_UID16
bellard7775e9e2003-05-14 22:46:48 +00005743
bellard67867302003-11-23 17:05:30 +00005744static inline int high2lowuid(int uid)
5745{
5746 if (uid > 65535)
5747 return 65534;
5748 else
5749 return uid;
5750}
5751
5752static inline int high2lowgid(int gid)
5753{
5754 if (gid > 65535)
5755 return 65534;
5756 else
5757 return gid;
5758}
5759
5760static inline int low2highuid(int uid)
5761{
5762 if ((int16_t)uid == -1)
5763 return -1;
5764 else
5765 return uid;
5766}
5767
5768static inline int low2highgid(int gid)
5769{
5770 if ((int16_t)gid == -1)
5771 return -1;
5772 else
5773 return gid;
5774}
Riku Voipio0c866a72011-04-18 15:23:06 +03005775static inline int tswapid(int id)
5776{
5777 return tswap16(id);
5778}
Peter Maydell76ca3102014-03-02 19:36:41 +00005779
5780#define put_user_id(x, gaddr) put_user_u16(x, gaddr)
5781
Riku Voipio0c866a72011-04-18 15:23:06 +03005782#else /* !USE_UID16 */
5783static inline int high2lowuid(int uid)
5784{
5785 return uid;
5786}
5787static inline int high2lowgid(int gid)
5788{
5789 return gid;
5790}
5791static inline int low2highuid(int uid)
5792{
5793 return uid;
5794}
5795static inline int low2highgid(int gid)
5796{
5797 return gid;
5798}
5799static inline int tswapid(int id)
5800{
5801 return tswap32(id);
5802}
Peter Maydell76ca3102014-03-02 19:36:41 +00005803
5804#define put_user_id(x, gaddr) put_user_u32(x, gaddr)
5805
bellard67867302003-11-23 17:05:30 +00005806#endif /* USE_UID16 */
bellard1b6b0292003-03-22 17:31:38 +00005807
Peter Maydellfd6f7792016-03-01 16:33:02 +00005808/* We must do direct syscalls for setting UID/GID, because we want to
5809 * implement the Linux system call semantics of "change only for this thread",
5810 * not the libc/POSIX semantics of "change for all threads in process".
5811 * (See http://ewontfix.com/17/ for more details.)
5812 * We use the 32-bit version of the syscalls if present; if it is not
5813 * then either the host architecture supports 32-bit UIDs natively with
5814 * the standard syscall, or the 16-bit UID is the best we can do.
5815 */
5816#ifdef __NR_setuid32
5817#define __NR_sys_setuid __NR_setuid32
5818#else
5819#define __NR_sys_setuid __NR_setuid
5820#endif
5821#ifdef __NR_setgid32
5822#define __NR_sys_setgid __NR_setgid32
5823#else
5824#define __NR_sys_setgid __NR_setgid
5825#endif
5826#ifdef __NR_setresuid32
5827#define __NR_sys_setresuid __NR_setresuid32
5828#else
5829#define __NR_sys_setresuid __NR_setresuid
5830#endif
5831#ifdef __NR_setresgid32
5832#define __NR_sys_setresgid __NR_setresgid32
5833#else
5834#define __NR_sys_setresgid __NR_setresgid
5835#endif
5836
5837_syscall1(int, sys_setuid, uid_t, uid)
5838_syscall1(int, sys_setgid, gid_t, gid)
5839_syscall3(int, sys_setresuid, uid_t, ruid, uid_t, euid, uid_t, suid)
5840_syscall3(int, sys_setresgid, gid_t, rgid, gid_t, egid, gid_t, sgid)
5841
bellard31e31b82003-02-18 22:55:36 +00005842void syscall_init(void)
5843{
bellard2ab83ea2003-06-15 19:56:46 +00005844 IOCTLEntry *ie;
5845 const argtype *arg_type;
5846 int size;
thsb92c47c2007-11-01 00:07:38 +00005847 int i;
bellard2ab83ea2003-06-15 19:56:46 +00005848
Alexander Graf8be656b2015-05-06 23:47:32 +02005849 thunk_init(STRUCT_MAX);
5850
Blue Swirl001faf32009-05-13 17:53:17 +00005851#define STRUCT(name, ...) thunk_register_struct(STRUCT_ ## name, #name, struct_ ## name ## _def);
ths5fafdf22007-09-16 21:08:06 +00005852#define STRUCT_SPECIAL(name) thunk_register_struct_direct(STRUCT_ ## name, #name, &struct_ ## name ## _def);
bellard31e31b82003-02-18 22:55:36 +00005853#include "syscall_types.h"
5854#undef STRUCT
5855#undef STRUCT_SPECIAL
bellard2ab83ea2003-06-15 19:56:46 +00005856
Peter Maydelldd6e9572012-07-23 08:07:22 +00005857 /* Build target_to_host_errno_table[] table from
5858 * host_to_target_errno_table[]. */
5859 for (i = 0; i < ERRNO_TABLE_SIZE; i++) {
5860 target_to_host_errno_table[host_to_target_errno_table[i]] = i;
5861 }
5862
bellard2ab83ea2003-06-15 19:56:46 +00005863 /* we patch the ioctl size if necessary. We rely on the fact that
5864 no ioctl has all the bits at '1' in the size field */
5865 ie = ioctl_entries;
5866 while (ie->target_cmd != 0) {
5867 if (((ie->target_cmd >> TARGET_IOC_SIZESHIFT) & TARGET_IOC_SIZEMASK) ==
5868 TARGET_IOC_SIZEMASK) {
5869 arg_type = ie->arg_type;
5870 if (arg_type[0] != TYPE_PTR) {
ths5fafdf22007-09-16 21:08:06 +00005871 fprintf(stderr, "cannot patch size for ioctl 0x%x\n",
bellard2ab83ea2003-06-15 19:56:46 +00005872 ie->target_cmd);
5873 exit(1);
5874 }
5875 arg_type++;
5876 size = thunk_type_size(arg_type, 0);
ths5fafdf22007-09-16 21:08:06 +00005877 ie->target_cmd = (ie->target_cmd &
bellard2ab83ea2003-06-15 19:56:46 +00005878 ~(TARGET_IOC_SIZEMASK << TARGET_IOC_SIZESHIFT)) |
5879 (size << TARGET_IOC_SIZESHIFT);
5880 }
thsb92c47c2007-11-01 00:07:38 +00005881
bellard2ab83ea2003-06-15 19:56:46 +00005882 /* automatic consistency check if same arch */
balrog872ea0c2008-09-21 02:31:19 +00005883#if (defined(__i386__) && defined(TARGET_I386) && defined(TARGET_ABI32)) || \
5884 (defined(__x86_64__) && defined(TARGET_X86_64))
5885 if (unlikely(ie->target_cmd != ie->host_cmd)) {
5886 fprintf(stderr, "ERROR: ioctl(%s): target=0x%x host=0x%x\n",
5887 ie->name, ie->target_cmd, ie->host_cmd);
bellard2ab83ea2003-06-15 19:56:46 +00005888 }
5889#endif
5890 ie++;
5891 }
bellard31e31b82003-02-18 22:55:36 +00005892}
bellardc573ff62004-01-04 15:51:36 +00005893
blueswir1992f48a2007-10-14 16:27:31 +00005894#if TARGET_ABI_BITS == 32
pbrookce4defa2006-02-09 16:49:55 +00005895static inline uint64_t target_offset64(uint32_t word0, uint32_t word1)
5896{
thsaf325d32008-06-10 15:29:15 +00005897#ifdef TARGET_WORDS_BIGENDIAN
pbrookce4defa2006-02-09 16:49:55 +00005898 return ((uint64_t)word0 << 32) | word1;
5899#else
5900 return ((uint64_t)word1 << 32) | word0;
5901#endif
5902}
blueswir1992f48a2007-10-14 16:27:31 +00005903#else /* TARGET_ABI_BITS == 32 */
j_mayer32407102007-09-26 23:01:49 +00005904static inline uint64_t target_offset64(uint64_t word0, uint64_t word1)
5905{
5906 return word0;
5907}
blueswir1992f48a2007-10-14 16:27:31 +00005908#endif /* TARGET_ABI_BITS != 32 */
pbrookce4defa2006-02-09 16:49:55 +00005909
5910#ifdef TARGET_NR_truncate64
blueswir1992f48a2007-10-14 16:27:31 +00005911static inline abi_long target_truncate64(void *cpu_env, const char *arg1,
5912 abi_long arg2,
5913 abi_long arg3,
5914 abi_long arg4)
pbrookce4defa2006-02-09 16:49:55 +00005915{
Riku Voipio48e515d2011-07-12 15:40:51 +03005916 if (regpairs_aligned(cpu_env)) {
pbrookce4defa2006-02-09 16:49:55 +00005917 arg2 = arg3;
5918 arg3 = arg4;
Riku Voipio48e515d2011-07-12 15:40:51 +03005919 }
pbrookce4defa2006-02-09 16:49:55 +00005920 return get_errno(truncate64(arg1, target_offset64(arg2, arg3)));
5921}
5922#endif
5923
5924#ifdef TARGET_NR_ftruncate64
blueswir1992f48a2007-10-14 16:27:31 +00005925static inline abi_long target_ftruncate64(void *cpu_env, abi_long arg1,
5926 abi_long arg2,
5927 abi_long arg3,
5928 abi_long arg4)
pbrookce4defa2006-02-09 16:49:55 +00005929{
Riku Voipio48e515d2011-07-12 15:40:51 +03005930 if (regpairs_aligned(cpu_env)) {
pbrookce4defa2006-02-09 16:49:55 +00005931 arg2 = arg3;
5932 arg3 = arg4;
Riku Voipio48e515d2011-07-12 15:40:51 +03005933 }
pbrookce4defa2006-02-09 16:49:55 +00005934 return get_errno(ftruncate64(arg1, target_offset64(arg2, arg3)));
5935}
5936#endif
5937
bellard579a97f2007-11-11 14:26:47 +00005938static inline abi_long target_to_host_timespec(struct timespec *host_ts,
5939 abi_ulong target_addr)
pbrook53a59602006-03-25 19:31:22 +00005940{
5941 struct target_timespec *target_ts;
5942
bellard579a97f2007-11-11 14:26:47 +00005943 if (!lock_user_struct(VERIFY_READ, target_ts, target_addr, 1))
5944 return -TARGET_EFAULT;
Peter Maydellc7e35da2016-05-19 12:01:40 +01005945 __get_user(host_ts->tv_sec, &target_ts->tv_sec);
5946 __get_user(host_ts->tv_nsec, &target_ts->tv_nsec);
pbrook53a59602006-03-25 19:31:22 +00005947 unlock_user_struct(target_ts, target_addr, 0);
bellardb255bfa2008-05-10 21:51:02 +00005948 return 0;
pbrook53a59602006-03-25 19:31:22 +00005949}
5950
bellard579a97f2007-11-11 14:26:47 +00005951static inline abi_long host_to_target_timespec(abi_ulong target_addr,
5952 struct timespec *host_ts)
pbrook53a59602006-03-25 19:31:22 +00005953{
5954 struct target_timespec *target_ts;
5955
bellard579a97f2007-11-11 14:26:47 +00005956 if (!lock_user_struct(VERIFY_WRITE, target_ts, target_addr, 0))
5957 return -TARGET_EFAULT;
Peter Maydellc7e35da2016-05-19 12:01:40 +01005958 __put_user(host_ts->tv_sec, &target_ts->tv_sec);
5959 __put_user(host_ts->tv_nsec, &target_ts->tv_nsec);
pbrook53a59602006-03-25 19:31:22 +00005960 unlock_user_struct(target_ts, target_addr, 1);
bellardb255bfa2008-05-10 21:51:02 +00005961 return 0;
pbrook53a59602006-03-25 19:31:22 +00005962}
5963
Erik de Castro Lopof4f1e102013-11-29 18:39:23 +11005964static inline abi_long target_to_host_itimerspec(struct itimerspec *host_itspec,
5965 abi_ulong target_addr)
5966{
5967 struct target_itimerspec *target_itspec;
5968
5969 if (!lock_user_struct(VERIFY_READ, target_itspec, target_addr, 1)) {
5970 return -TARGET_EFAULT;
5971 }
5972
5973 host_itspec->it_interval.tv_sec =
5974 tswapal(target_itspec->it_interval.tv_sec);
5975 host_itspec->it_interval.tv_nsec =
5976 tswapal(target_itspec->it_interval.tv_nsec);
5977 host_itspec->it_value.tv_sec = tswapal(target_itspec->it_value.tv_sec);
5978 host_itspec->it_value.tv_nsec = tswapal(target_itspec->it_value.tv_nsec);
5979
5980 unlock_user_struct(target_itspec, target_addr, 1);
5981 return 0;
5982}
5983
5984static inline abi_long host_to_target_itimerspec(abi_ulong target_addr,
5985 struct itimerspec *host_its)
5986{
5987 struct target_itimerspec *target_itspec;
5988
5989 if (!lock_user_struct(VERIFY_WRITE, target_itspec, target_addr, 0)) {
5990 return -TARGET_EFAULT;
5991 }
5992
5993 target_itspec->it_interval.tv_sec = tswapal(host_its->it_interval.tv_sec);
5994 target_itspec->it_interval.tv_nsec = tswapal(host_its->it_interval.tv_nsec);
5995
5996 target_itspec->it_value.tv_sec = tswapal(host_its->it_value.tv_sec);
5997 target_itspec->it_value.tv_nsec = tswapal(host_its->it_value.tv_nsec);
5998
5999 unlock_user_struct(target_itspec, target_addr, 0);
6000 return 0;
6001}
6002
Peter Maydellc0659762014-08-09 15:42:32 +01006003static inline abi_long target_to_host_sigevent(struct sigevent *host_sevp,
6004 abi_ulong target_addr)
6005{
6006 struct target_sigevent *target_sevp;
6007
6008 if (!lock_user_struct(VERIFY_READ, target_sevp, target_addr, 1)) {
6009 return -TARGET_EFAULT;
6010 }
6011
6012 /* This union is awkward on 64 bit systems because it has a 32 bit
6013 * integer and a pointer in it; we follow the conversion approach
6014 * used for handling sigval types in signal.c so the guest should get
6015 * the correct value back even if we did a 64 bit byteswap and it's
6016 * using the 32 bit integer.
6017 */
6018 host_sevp->sigev_value.sival_ptr =
6019 (void *)(uintptr_t)tswapal(target_sevp->sigev_value.sival_ptr);
6020 host_sevp->sigev_signo =
6021 target_to_host_signal(tswap32(target_sevp->sigev_signo));
6022 host_sevp->sigev_notify = tswap32(target_sevp->sigev_notify);
6023 host_sevp->_sigev_un._tid = tswap32(target_sevp->_sigev_un._tid);
6024
6025 unlock_user_struct(target_sevp, target_addr, 1);
6026 return 0;
6027}
6028
Tom Musta6f6a4032014-08-12 13:53:42 -05006029#if defined(TARGET_NR_mlockall)
6030static inline int target_to_host_mlockall_arg(int arg)
6031{
6032 int result = 0;
6033
6034 if (arg & TARGET_MLOCKALL_MCL_CURRENT) {
6035 result |= MCL_CURRENT;
6036 }
6037 if (arg & TARGET_MLOCKALL_MCL_FUTURE) {
6038 result |= MCL_FUTURE;
6039 }
6040 return result;
6041}
6042#endif
6043
balrog6a24a772008-09-20 02:23:36 +00006044static inline abi_long host_to_target_stat64(void *cpu_env,
6045 abi_ulong target_addr,
6046 struct stat *host_st)
6047{
Alexander Graf09701192013-09-03 20:12:15 +01006048#if defined(TARGET_ARM) && defined(TARGET_ABI32)
balrog6a24a772008-09-20 02:23:36 +00006049 if (((CPUARMState *)cpu_env)->eabi) {
6050 struct target_eabi_stat64 *target_st;
6051
6052 if (!lock_user_struct(VERIFY_WRITE, target_st, target_addr, 0))
6053 return -TARGET_EFAULT;
6054 memset(target_st, 0, sizeof(struct target_eabi_stat64));
6055 __put_user(host_st->st_dev, &target_st->st_dev);
6056 __put_user(host_st->st_ino, &target_st->st_ino);
6057#ifdef TARGET_STAT64_HAS_BROKEN_ST_INO
6058 __put_user(host_st->st_ino, &target_st->__st_ino);
6059#endif
6060 __put_user(host_st->st_mode, &target_st->st_mode);
6061 __put_user(host_st->st_nlink, &target_st->st_nlink);
6062 __put_user(host_st->st_uid, &target_st->st_uid);
6063 __put_user(host_st->st_gid, &target_st->st_gid);
6064 __put_user(host_st->st_rdev, &target_st->st_rdev);
6065 __put_user(host_st->st_size, &target_st->st_size);
6066 __put_user(host_st->st_blksize, &target_st->st_blksize);
6067 __put_user(host_st->st_blocks, &target_st->st_blocks);
6068 __put_user(host_st->st_atime, &target_st->target_st_atime);
6069 __put_user(host_st->st_mtime, &target_st->target_st_mtime);
6070 __put_user(host_st->st_ctime, &target_st->target_st_ctime);
6071 unlock_user_struct(target_st, target_addr, 1);
6072 } else
6073#endif
6074 {
Stefan Weil20d155b2013-10-30 22:52:24 +01006075#if defined(TARGET_HAS_STRUCT_STAT64)
balrog6a24a772008-09-20 02:23:36 +00006076 struct target_stat64 *target_st;
Stefan Weil20d155b2013-10-30 22:52:24 +01006077#else
6078 struct target_stat *target_st;
aurel329d33b762009-04-08 23:07:05 +00006079#endif
balrog6a24a772008-09-20 02:23:36 +00006080
6081 if (!lock_user_struct(VERIFY_WRITE, target_st, target_addr, 0))
6082 return -TARGET_EFAULT;
aurel329d33b762009-04-08 23:07:05 +00006083 memset(target_st, 0, sizeof(*target_st));
balrog6a24a772008-09-20 02:23:36 +00006084 __put_user(host_st->st_dev, &target_st->st_dev);
6085 __put_user(host_st->st_ino, &target_st->st_ino);
6086#ifdef TARGET_STAT64_HAS_BROKEN_ST_INO
6087 __put_user(host_st->st_ino, &target_st->__st_ino);
6088#endif
6089 __put_user(host_st->st_mode, &target_st->st_mode);
6090 __put_user(host_st->st_nlink, &target_st->st_nlink);
6091 __put_user(host_st->st_uid, &target_st->st_uid);
6092 __put_user(host_st->st_gid, &target_st->st_gid);
6093 __put_user(host_st->st_rdev, &target_st->st_rdev);
6094 /* XXX: better use of kernel struct */
6095 __put_user(host_st->st_size, &target_st->st_size);
6096 __put_user(host_st->st_blksize, &target_st->st_blksize);
6097 __put_user(host_st->st_blocks, &target_st->st_blocks);
6098 __put_user(host_st->st_atime, &target_st->target_st_atime);
6099 __put_user(host_st->st_mtime, &target_st->target_st_mtime);
6100 __put_user(host_st->st_ctime, &target_st->target_st_ctime);
6101 unlock_user_struct(target_st, target_addr, 1);
6102 }
6103
6104 return 0;
6105}
balrog6a24a772008-09-20 02:23:36 +00006106
pbrookbd0c5662008-05-29 14:34:11 +00006107/* ??? Using host futex calls even when target atomic operations
6108 are not really atomic probably breaks things. However implementing
6109 futexes locally would make futexes shared between multiple processes
6110 tricky. However they're probably useless because guest atomic
6111 operations won't work either. */
blueswir18fcd3692008-08-17 20:26:25 +00006112static int do_futex(target_ulong uaddr, int op, int val, target_ulong timeout,
6113 target_ulong uaddr2, int val3)
pbrookbd0c5662008-05-29 14:34:11 +00006114{
6115 struct timespec ts, *pts;
Nathan Froyda16aae02009-08-03 08:43:29 -07006116 int base_op;
pbrookbd0c5662008-05-29 14:34:11 +00006117
6118 /* ??? We assume FUTEX_* constants are the same on both host
6119 and target. */
Martin Mohringa29ccd62009-05-04 21:34:56 +03006120#ifdef FUTEX_CMD_MASK
Nathan Froyda16aae02009-08-03 08:43:29 -07006121 base_op = op & FUTEX_CMD_MASK;
Martin Mohringa29ccd62009-05-04 21:34:56 +03006122#else
Nathan Froyda16aae02009-08-03 08:43:29 -07006123 base_op = op;
Martin Mohringa29ccd62009-05-04 21:34:56 +03006124#endif
Nathan Froyda16aae02009-08-03 08:43:29 -07006125 switch (base_op) {
pbrookbd0c5662008-05-29 14:34:11 +00006126 case FUTEX_WAIT:
John Rigbycce246e2013-02-23 16:14:07 -07006127 case FUTEX_WAIT_BITSET:
pbrookbd0c5662008-05-29 14:34:11 +00006128 if (timeout) {
6129 pts = &ts;
6130 target_to_host_timespec(pts, timeout);
6131 } else {
6132 pts = NULL;
6133 }
Peter Maydelld509eeb2016-05-12 18:47:52 +01006134 return get_errno(safe_futex(g2h(uaddr), op, tswap32(val),
John Rigbycce246e2013-02-23 16:14:07 -07006135 pts, NULL, val3));
pbrookbd0c5662008-05-29 14:34:11 +00006136 case FUTEX_WAKE:
Peter Maydelld509eeb2016-05-12 18:47:52 +01006137 return get_errno(safe_futex(g2h(uaddr), op, val, NULL, NULL, 0));
pbrookbd0c5662008-05-29 14:34:11 +00006138 case FUTEX_FD:
Peter Maydelld509eeb2016-05-12 18:47:52 +01006139 return get_errno(safe_futex(g2h(uaddr), op, val, NULL, NULL, 0));
pbrookbd0c5662008-05-29 14:34:11 +00006140 case FUTEX_REQUEUE:
pbrookbd0c5662008-05-29 14:34:11 +00006141 case FUTEX_CMP_REQUEUE:
Nathan Froyda16aae02009-08-03 08:43:29 -07006142 case FUTEX_WAKE_OP:
6143 /* For FUTEX_REQUEUE, FUTEX_CMP_REQUEUE, and FUTEX_WAKE_OP, the
6144 TIMEOUT parameter is interpreted as a uint32_t by the kernel.
6145 But the prototype takes a `struct timespec *'; insert casts
6146 to satisfy the compiler. We do not need to tswap TIMEOUT
6147 since it's not compared to guest memory. */
6148 pts = (struct timespec *)(uintptr_t) timeout;
Peter Maydelld509eeb2016-05-12 18:47:52 +01006149 return get_errno(safe_futex(g2h(uaddr), op, val, pts,
6150 g2h(uaddr2),
6151 (base_op == FUTEX_CMP_REQUEUE
6152 ? tswap32(val3)
6153 : val3)));
pbrookbd0c5662008-05-29 14:34:11 +00006154 default:
6155 return -TARGET_ENOSYS;
6156 }
6157}
Laurent Vivier0f0426f2015-09-01 22:27:33 +02006158#if defined(TARGET_NR_name_to_handle_at) && defined(CONFIG_OPEN_BY_HANDLE)
6159static abi_long do_name_to_handle_at(abi_long dirfd, abi_long pathname,
6160 abi_long handle, abi_long mount_id,
6161 abi_long flags)
6162{
6163 struct file_handle *target_fh;
6164 struct file_handle *fh;
6165 int mid = 0;
6166 abi_long ret;
6167 char *name;
6168 unsigned int size, total_size;
6169
6170 if (get_user_s32(size, handle)) {
6171 return -TARGET_EFAULT;
6172 }
6173
6174 name = lock_user_string(pathname);
6175 if (!name) {
6176 return -TARGET_EFAULT;
6177 }
6178
6179 total_size = sizeof(struct file_handle) + size;
6180 target_fh = lock_user(VERIFY_WRITE, handle, total_size, 0);
6181 if (!target_fh) {
6182 unlock_user(name, pathname, 0);
6183 return -TARGET_EFAULT;
6184 }
6185
6186 fh = g_malloc0(total_size);
6187 fh->handle_bytes = size;
6188
6189 ret = get_errno(name_to_handle_at(dirfd, path(name), fh, &mid, flags));
6190 unlock_user(name, pathname, 0);
6191
6192 /* man name_to_handle_at(2):
6193 * Other than the use of the handle_bytes field, the caller should treat
6194 * the file_handle structure as an opaque data type
6195 */
6196
6197 memcpy(target_fh, fh, total_size);
6198 target_fh->handle_bytes = tswap32(fh->handle_bytes);
6199 target_fh->handle_type = tswap32(fh->handle_type);
6200 g_free(fh);
6201 unlock_user(target_fh, handle, total_size);
6202
6203 if (put_user_s32(mid, mount_id)) {
6204 return -TARGET_EFAULT;
6205 }
6206
6207 return ret;
6208
6209}
6210#endif
6211
6212#if defined(TARGET_NR_open_by_handle_at) && defined(CONFIG_OPEN_BY_HANDLE)
6213static abi_long do_open_by_handle_at(abi_long mount_fd, abi_long handle,
6214 abi_long flags)
6215{
6216 struct file_handle *target_fh;
6217 struct file_handle *fh;
6218 unsigned int size, total_size;
6219 abi_long ret;
6220
6221 if (get_user_s32(size, handle)) {
6222 return -TARGET_EFAULT;
6223 }
6224
6225 total_size = sizeof(struct file_handle) + size;
6226 target_fh = lock_user(VERIFY_READ, handle, total_size, 1);
6227 if (!target_fh) {
6228 return -TARGET_EFAULT;
6229 }
6230
Thomas Huthe9d49d52015-10-09 17:56:38 +02006231 fh = g_memdup(target_fh, total_size);
Laurent Vivier0f0426f2015-09-01 22:27:33 +02006232 fh->handle_bytes = size;
6233 fh->handle_type = tswap32(target_fh->handle_type);
6234
6235 ret = get_errno(open_by_handle_at(mount_fd, fh,
6236 target_to_host_bitmask(flags, fcntl_flags_tbl)));
6237
6238 g_free(fh);
6239
6240 unlock_user(target_fh, handle, total_size);
6241
6242 return ret;
6243}
6244#endif
pbrookbd0c5662008-05-29 14:34:11 +00006245
Laurent Viviere36800c2015-10-02 14:48:09 +02006246#if defined(TARGET_NR_signalfd) || defined(TARGET_NR_signalfd4)
6247
6248/* signalfd siginfo conversion */
6249
6250static void
6251host_to_target_signalfd_siginfo(struct signalfd_siginfo *tinfo,
6252 const struct signalfd_siginfo *info)
6253{
6254 int sig = host_to_target_signal(info->ssi_signo);
6255
6256 /* linux/signalfd.h defines a ssi_addr_lsb
6257 * not defined in sys/signalfd.h but used by some kernels
6258 */
6259
6260#ifdef BUS_MCEERR_AO
6261 if (tinfo->ssi_signo == SIGBUS &&
6262 (tinfo->ssi_code == BUS_MCEERR_AR ||
6263 tinfo->ssi_code == BUS_MCEERR_AO)) {
6264 uint16_t *ssi_addr_lsb = (uint16_t *)(&info->ssi_addr + 1);
6265 uint16_t *tssi_addr_lsb = (uint16_t *)(&tinfo->ssi_addr + 1);
6266 *tssi_addr_lsb = tswap16(*ssi_addr_lsb);
6267 }
6268#endif
6269
6270 tinfo->ssi_signo = tswap32(sig);
6271 tinfo->ssi_errno = tswap32(tinfo->ssi_errno);
6272 tinfo->ssi_code = tswap32(info->ssi_code);
6273 tinfo->ssi_pid = tswap32(info->ssi_pid);
6274 tinfo->ssi_uid = tswap32(info->ssi_uid);
6275 tinfo->ssi_fd = tswap32(info->ssi_fd);
6276 tinfo->ssi_tid = tswap32(info->ssi_tid);
6277 tinfo->ssi_band = tswap32(info->ssi_band);
6278 tinfo->ssi_overrun = tswap32(info->ssi_overrun);
6279 tinfo->ssi_trapno = tswap32(info->ssi_trapno);
6280 tinfo->ssi_status = tswap32(info->ssi_status);
6281 tinfo->ssi_int = tswap32(info->ssi_int);
6282 tinfo->ssi_ptr = tswap64(info->ssi_ptr);
6283 tinfo->ssi_utime = tswap64(info->ssi_utime);
6284 tinfo->ssi_stime = tswap64(info->ssi_stime);
6285 tinfo->ssi_addr = tswap64(info->ssi_addr);
6286}
6287
Laurent Vivier5d4d3662015-10-28 21:40:43 +01006288static abi_long host_to_target_data_signalfd(void *buf, size_t len)
Laurent Viviere36800c2015-10-02 14:48:09 +02006289{
6290 int i;
6291
6292 for (i = 0; i < len; i += sizeof(struct signalfd_siginfo)) {
6293 host_to_target_signalfd_siginfo(buf + i, buf + i);
6294 }
6295
6296 return len;
6297}
6298
6299static TargetFdTrans target_signalfd_trans = {
Laurent Vivier5d4d3662015-10-28 21:40:43 +01006300 .host_to_target_data = host_to_target_data_signalfd,
Laurent Viviere36800c2015-10-02 14:48:09 +02006301};
6302
6303static abi_long do_signalfd4(int fd, abi_long mask, int flags)
6304{
6305 int host_flags;
6306 target_sigset_t *target_mask;
6307 sigset_t host_mask;
6308 abi_long ret;
6309
6310 if (flags & ~(TARGET_O_NONBLOCK | TARGET_O_CLOEXEC)) {
6311 return -TARGET_EINVAL;
6312 }
6313 if (!lock_user_struct(VERIFY_READ, target_mask, mask, 1)) {
6314 return -TARGET_EFAULT;
6315 }
6316
6317 target_to_host_sigset(&host_mask, target_mask);
6318
6319 host_flags = target_to_host_bitmask(flags, fcntl_flags_tbl);
6320
6321 ret = get_errno(signalfd(fd, &host_mask, host_flags));
6322 if (ret >= 0) {
6323 fd_trans_register(ret, &target_signalfd_trans);
6324 }
6325
6326 unlock_user_struct(target_mask, mask, 0);
6327
6328 return ret;
6329}
6330#endif
6331
pbrook1d9d8b52009-04-16 15:17:02 +00006332/* Map host to target signal numbers for the wait family of syscalls.
6333 Assume all other status bits are the same. */
Richard Hendersona05c6402012-09-15 11:34:20 -07006334int host_to_target_waitstatus(int status)
pbrook1d9d8b52009-04-16 15:17:02 +00006335{
6336 if (WIFSIGNALED(status)) {
6337 return host_to_target_signal(WTERMSIG(status)) | (status & ~0x7f);
6338 }
6339 if (WIFSTOPPED(status)) {
6340 return (host_to_target_signal(WSTOPSIG(status)) << 8)
6341 | (status & 0xff);
6342 }
6343 return status;
6344}
6345
Wim Vander Schelden76b94242014-06-18 11:02:39 +02006346static int open_self_cmdline(void *cpu_env, int fd)
6347{
6348 int fd_orig = -1;
6349 bool word_skipped = false;
6350
6351 fd_orig = open("/proc/self/cmdline", O_RDONLY);
6352 if (fd_orig < 0) {
6353 return fd_orig;
6354 }
6355
6356 while (true) {
6357 ssize_t nb_read;
6358 char buf[128];
6359 char *cp_buf = buf;
6360
6361 nb_read = read(fd_orig, buf, sizeof(buf));
6362 if (nb_read < 0) {
Peter Maydella3ca7bb2016-05-12 18:47:26 +01006363 int e = errno;
Wim Vander Schelden76b94242014-06-18 11:02:39 +02006364 fd_orig = close(fd_orig);
Peter Maydella3ca7bb2016-05-12 18:47:26 +01006365 errno = e;
Wim Vander Schelden76b94242014-06-18 11:02:39 +02006366 return -1;
6367 } else if (nb_read == 0) {
6368 break;
6369 }
6370
6371 if (!word_skipped) {
6372 /* Skip the first string, which is the path to qemu-*-static
6373 instead of the actual command. */
6374 cp_buf = memchr(buf, 0, sizeof(buf));
6375 if (cp_buf) {
6376 /* Null byte found, skip one string */
6377 cp_buf++;
6378 nb_read -= cp_buf - buf;
6379 word_skipped = true;
6380 }
6381 }
6382
6383 if (word_skipped) {
6384 if (write(fd, cp_buf, nb_read) != nb_read) {
Peter Maydella3ca7bb2016-05-12 18:47:26 +01006385 int e = errno;
zhanghailiang680dfde2014-08-22 16:23:51 +08006386 close(fd_orig);
Peter Maydella3ca7bb2016-05-12 18:47:26 +01006387 errno = e;
Wim Vander Schelden76b94242014-06-18 11:02:39 +02006388 return -1;
6389 }
6390 }
6391 }
6392
6393 return close(fd_orig);
6394}
6395
Alexander Graf36c08d42011-11-02 20:23:24 +01006396static int open_self_maps(void *cpu_env, int fd)
6397{
Andreas Färber0429a972013-08-26 18:14:44 +02006398 CPUState *cpu = ENV_GET_CPU((CPUArchState *)cpu_env);
6399 TaskState *ts = cpu->opaque;
Alexander Graf1a49ef22012-05-01 16:30:28 +01006400 FILE *fp;
6401 char *line = NULL;
6402 size_t len = 0;
6403 ssize_t read;
Alexander Graf36c08d42011-11-02 20:23:24 +01006404
Alexander Graf1a49ef22012-05-01 16:30:28 +01006405 fp = fopen("/proc/self/maps", "r");
6406 if (fp == NULL) {
Peter Maydella3ca7bb2016-05-12 18:47:26 +01006407 return -1;
Alexander Graf1a49ef22012-05-01 16:30:28 +01006408 }
6409
6410 while ((read = getline(&line, &len, fp)) != -1) {
6411 int fields, dev_maj, dev_min, inode;
6412 uint64_t min, max, offset;
6413 char flag_r, flag_w, flag_x, flag_p;
6414 char path[512] = "";
6415 fields = sscanf(line, "%"PRIx64"-%"PRIx64" %c%c%c%c %"PRIx64" %x:%x %d"
6416 " %512s", &min, &max, &flag_r, &flag_w, &flag_x,
6417 &flag_p, &offset, &dev_maj, &dev_min, &inode, path);
6418
6419 if ((fields < 10) || (fields > 11)) {
6420 continue;
6421 }
Mikhail Ilyind67f4aa2014-08-05 17:33:51 +04006422 if (h2g_valid(min)) {
6423 int flags = page_get_flags(h2g(min));
6424 max = h2g_valid(max - 1) ? max : (uintptr_t)g2h(GUEST_ADDR_MAX);
6425 if (page_check_range(h2g(min), max - min, flags) == -1) {
6426 continue;
6427 }
6428 if (h2g(min) == ts->info->stack_limit) {
6429 pstrcpy(path, sizeof(path), " [stack]");
6430 }
Alexander Graf1a49ef22012-05-01 16:30:28 +01006431 dprintf(fd, TARGET_ABI_FMT_lx "-" TARGET_ABI_FMT_lx
Christophe Lyone24fed42013-04-02 14:03:38 +02006432 " %c%c%c%c %08" PRIx64 " %02x:%02x %d %s%s\n",
Mikhail Ilyind67f4aa2014-08-05 17:33:51 +04006433 h2g(min), h2g(max - 1) + 1, flag_r, flag_w,
Alexander Graf1a49ef22012-05-01 16:30:28 +01006434 flag_x, flag_p, offset, dev_maj, dev_min, inode,
Christophe Lyone24fed42013-04-02 14:03:38 +02006435 path[0] ? " " : "", path);
Alexander Graf1a49ef22012-05-01 16:30:28 +01006436 }
6437 }
6438
6439 free(line);
6440 fclose(fp);
6441
Alexander Graf36c08d42011-11-02 20:23:24 +01006442 return 0;
6443}
6444
Alexander Graf480b8e72011-11-02 20:23:25 +01006445static int open_self_stat(void *cpu_env, int fd)
6446{
Andreas Färber0429a972013-08-26 18:14:44 +02006447 CPUState *cpu = ENV_GET_CPU((CPUArchState *)cpu_env);
6448 TaskState *ts = cpu->opaque;
Alexander Graf480b8e72011-11-02 20:23:25 +01006449 abi_ulong start_stack = ts->info->start_stack;
6450 int i;
6451
6452 for (i = 0; i < 44; i++) {
6453 char buf[128];
6454 int len;
6455 uint64_t val = 0;
6456
Fabio Erculianie0e65be2012-01-03 09:38:34 +00006457 if (i == 0) {
6458 /* pid */
6459 val = getpid();
6460 snprintf(buf, sizeof(buf), "%"PRId64 " ", val);
6461 } else if (i == 1) {
6462 /* app name */
6463 snprintf(buf, sizeof(buf), "(%s) ", ts->bprm->argv[0]);
6464 } else if (i == 27) {
6465 /* stack bottom */
6466 val = start_stack;
6467 snprintf(buf, sizeof(buf), "%"PRId64 " ", val);
6468 } else {
6469 /* for the rest, there is MasterCard */
6470 snprintf(buf, sizeof(buf), "0%c", i == 43 ? '\n' : ' ');
Alexander Graf480b8e72011-11-02 20:23:25 +01006471 }
Fabio Erculianie0e65be2012-01-03 09:38:34 +00006472
Alexander Graf480b8e72011-11-02 20:23:25 +01006473 len = strlen(buf);
6474 if (write(fd, buf, len) != len) {
6475 return -1;
6476 }
6477 }
6478
6479 return 0;
6480}
6481
Alexander Graf257450e2011-11-02 20:23:26 +01006482static int open_self_auxv(void *cpu_env, int fd)
6483{
Andreas Färber0429a972013-08-26 18:14:44 +02006484 CPUState *cpu = ENV_GET_CPU((CPUArchState *)cpu_env);
6485 TaskState *ts = cpu->opaque;
Alexander Graf257450e2011-11-02 20:23:26 +01006486 abi_ulong auxv = ts->info->saved_auxv;
6487 abi_ulong len = ts->info->auxv_len;
6488 char *ptr;
6489
6490 /*
6491 * Auxiliary vector is stored in target process stack.
6492 * read in whole auxv vector and copy it to file
6493 */
6494 ptr = lock_user(VERIFY_READ, auxv, len, 0);
6495 if (ptr != NULL) {
6496 while (len > 0) {
6497 ssize_t r;
6498 r = write(fd, ptr, len);
6499 if (r <= 0) {
6500 break;
6501 }
6502 len -= r;
6503 ptr += r;
6504 }
6505 lseek(fd, 0, SEEK_SET);
6506 unlock_user(ptr, auxv, len);
6507 }
6508
6509 return 0;
6510}
6511
Andreas Schwab463d8e72013-07-02 14:04:12 +01006512static int is_proc_myself(const char *filename, const char *entry)
6513{
6514 if (!strncmp(filename, "/proc/", strlen("/proc/"))) {
6515 filename += strlen("/proc/");
6516 if (!strncmp(filename, "self/", strlen("self/"))) {
6517 filename += strlen("self/");
6518 } else if (*filename >= '1' && *filename <= '9') {
6519 char myself[80];
6520 snprintf(myself, sizeof(myself), "%d/", getpid());
6521 if (!strncmp(filename, myself, strlen(myself))) {
6522 filename += strlen(myself);
6523 } else {
6524 return 0;
6525 }
6526 } else {
6527 return 0;
6528 }
6529 if (!strcmp(filename, entry)) {
6530 return 1;
6531 }
6532 }
6533 return 0;
6534}
6535
Laurent Vivierde6b9932013-08-30 01:46:40 +02006536#if defined(HOST_WORDS_BIGENDIAN) != defined(TARGET_WORDS_BIGENDIAN)
6537static int is_proc(const char *filename, const char *entry)
6538{
6539 return strcmp(filename, entry) == 0;
6540}
6541
6542static int open_net_route(void *cpu_env, int fd)
6543{
6544 FILE *fp;
6545 char *line = NULL;
6546 size_t len = 0;
6547 ssize_t read;
6548
6549 fp = fopen("/proc/net/route", "r");
6550 if (fp == NULL) {
Peter Maydella3ca7bb2016-05-12 18:47:26 +01006551 return -1;
Laurent Vivierde6b9932013-08-30 01:46:40 +02006552 }
6553
6554 /* read header */
6555
6556 read = getline(&line, &len, fp);
6557 dprintf(fd, "%s", line);
6558
6559 /* read routes */
6560
6561 while ((read = getline(&line, &len, fp)) != -1) {
6562 char iface[16];
6563 uint32_t dest, gw, mask;
6564 unsigned int flags, refcnt, use, metric, mtu, window, irtt;
6565 sscanf(line, "%s\t%08x\t%08x\t%04x\t%d\t%d\t%d\t%08x\t%d\t%u\t%u\n",
6566 iface, &dest, &gw, &flags, &refcnt, &use, &metric,
6567 &mask, &mtu, &window, &irtt);
6568 dprintf(fd, "%s\t%08x\t%08x\t%04x\t%d\t%d\t%d\t%08x\t%d\t%u\t%u\n",
6569 iface, tswap32(dest), tswap32(gw), flags, refcnt, use,
6570 metric, tswap32(mask), mtu, window, irtt);
6571 }
6572
6573 free(line);
6574 fclose(fp);
6575
6576 return 0;
6577}
6578#endif
6579
Riku Voipio0b2effd2014-08-06 10:36:37 +03006580static int do_openat(void *cpu_env, int dirfd, const char *pathname, int flags, mode_t mode)
Alexander Graf3be14d02011-11-02 20:23:23 +01006581{
6582 struct fake_open {
6583 const char *filename;
6584 int (*fill)(void *cpu_env, int fd);
Laurent Vivierde6b9932013-08-30 01:46:40 +02006585 int (*cmp)(const char *s1, const char *s2);
Alexander Graf3be14d02011-11-02 20:23:23 +01006586 };
6587 const struct fake_open *fake_open;
6588 static const struct fake_open fakes[] = {
Laurent Vivierde6b9932013-08-30 01:46:40 +02006589 { "maps", open_self_maps, is_proc_myself },
6590 { "stat", open_self_stat, is_proc_myself },
6591 { "auxv", open_self_auxv, is_proc_myself },
Wim Vander Schelden76b94242014-06-18 11:02:39 +02006592 { "cmdline", open_self_cmdline, is_proc_myself },
Laurent Vivierde6b9932013-08-30 01:46:40 +02006593#if defined(HOST_WORDS_BIGENDIAN) != defined(TARGET_WORDS_BIGENDIAN)
6594 { "/proc/net/route", open_net_route, is_proc },
6595#endif
6596 { NULL, NULL, NULL }
Alexander Graf3be14d02011-11-02 20:23:23 +01006597 };
6598
Maxim Ostapenkoaa07f5e2014-05-02 11:17:07 +03006599 if (is_proc_myself(pathname, "exe")) {
6600 int execfd = qemu_getauxval(AT_EXECFD);
Timothy E Baldwinc10a0732016-05-12 18:47:48 +01006601 return execfd ? execfd : safe_openat(dirfd, exec_path, flags, mode);
Maxim Ostapenkoaa07f5e2014-05-02 11:17:07 +03006602 }
6603
Alexander Graf3be14d02011-11-02 20:23:23 +01006604 for (fake_open = fakes; fake_open->filename; fake_open++) {
Laurent Vivierde6b9932013-08-30 01:46:40 +02006605 if (fake_open->cmp(pathname, fake_open->filename)) {
Alexander Graf3be14d02011-11-02 20:23:23 +01006606 break;
6607 }
6608 }
6609
6610 if (fake_open->filename) {
6611 const char *tmpdir;
6612 char filename[PATH_MAX];
6613 int fd, r;
6614
6615 /* create temporary file to map stat to */
6616 tmpdir = getenv("TMPDIR");
6617 if (!tmpdir)
6618 tmpdir = "/tmp";
6619 snprintf(filename, sizeof(filename), "%s/qemu-open.XXXXXX", tmpdir);
6620 fd = mkstemp(filename);
6621 if (fd < 0) {
6622 return fd;
6623 }
6624 unlink(filename);
6625
6626 if ((r = fake_open->fill(cpu_env, fd))) {
Peter Maydella3ca7bb2016-05-12 18:47:26 +01006627 int e = errno;
Alexander Graf3be14d02011-11-02 20:23:23 +01006628 close(fd);
Peter Maydella3ca7bb2016-05-12 18:47:26 +01006629 errno = e;
Alexander Graf3be14d02011-11-02 20:23:23 +01006630 return r;
6631 }
6632 lseek(fd, 0, SEEK_SET);
6633
6634 return fd;
6635 }
6636
Timothy E Baldwinc10a0732016-05-12 18:47:48 +01006637 return safe_openat(dirfd, path(pathname), flags, mode);
Alexander Graf3be14d02011-11-02 20:23:23 +01006638}
6639
Alexander Grafaecc8862014-11-10 21:33:03 +01006640#define TIMER_MAGIC 0x0caf0000
6641#define TIMER_MAGIC_MASK 0xffff0000
6642
6643/* Convert QEMU provided timer ID back to internal 16bit index format */
6644static target_timer_t get_timer_id(abi_long arg)
6645{
6646 target_timer_t timerid = arg;
6647
6648 if ((timerid & TIMER_MAGIC_MASK) != TIMER_MAGIC) {
6649 return -TARGET_EINVAL;
6650 }
6651
6652 timerid &= 0xffff;
6653
6654 if (timerid >= ARRAY_SIZE(g_posix_timers)) {
6655 return -TARGET_EINVAL;
6656 }
6657
6658 return timerid;
6659}
6660
ths0da46a62007-10-20 20:23:07 +00006661/* do_syscall() should always have a single exit point at the end so
6662 that actions, such as logging of syscall results, can be performed.
6663 All errnos that do_syscall() returns must be -TARGET_<errcode>. */
blueswir1992f48a2007-10-14 16:27:31 +00006664abi_long do_syscall(void *cpu_env, int num, abi_long arg1,
6665 abi_long arg2, abi_long arg3, abi_long arg4,
Peter Maydell5945cfc2011-06-16 17:37:13 +01006666 abi_long arg5, abi_long arg6, abi_long arg7,
6667 abi_long arg8)
bellard31e31b82003-02-18 22:55:36 +00006668{
Andreas Färber182735e2013-05-29 22:29:20 +02006669 CPUState *cpu = ENV_GET_CPU(cpu_env);
blueswir1992f48a2007-10-14 16:27:31 +00006670 abi_long ret;
bellard31e31b82003-02-18 22:55:36 +00006671 struct stat st;
bellard56c8f682005-11-28 22:28:41 +00006672 struct statfs stfs;
pbrook53a59602006-03-25 19:31:22 +00006673 void *p;
ths3b46e622007-09-17 08:09:54 +00006674
Timothy E Baldwin71a8f7f2016-05-12 18:47:45 +01006675#if defined(DEBUG_ERESTARTSYS)
6676 /* Debug-only code for exercising the syscall-restart code paths
6677 * in the per-architecture cpu main loops: restart every syscall
6678 * the guest makes once before letting it through.
6679 */
6680 {
6681 static int flag;
6682
6683 flag = !flag;
6684 if (flag) {
6685 return -TARGET_ERESTARTSYS;
6686 }
6687 }
6688#endif
6689
bellard72f03902003-02-18 23:33:18 +00006690#ifdef DEBUG
bellardc573ff62004-01-04 15:51:36 +00006691 gemu_log("syscall %d", num);
bellard72f03902003-02-18 23:33:18 +00006692#endif
thsb92c47c2007-11-01 00:07:38 +00006693 if(do_strace)
6694 print_syscall(num, arg1, arg2, arg3, arg4, arg5, arg6);
6695
bellard31e31b82003-02-18 22:55:36 +00006696 switch(num) {
6697 case TARGET_NR_exit:
Andreas Färber9b056fc2013-06-24 23:53:10 +02006698 /* In old applications this may be used to implement _exit(2).
6699 However in threaded applictions it is used for thread termination,
6700 and _exit_group is used for application termination.
6701 Do thread termination if we have more then one thread. */
Timothy E Baldwina0995882016-05-27 15:51:56 +01006702
6703 if (block_signals()) {
6704 ret = -TARGET_ERESTARTSYS;
6705 break;
6706 }
6707
Andreas Färberbdc44642013-06-24 23:50:24 +02006708 if (CPU_NEXT(first_cpu)) {
Andreas Färber9b056fc2013-06-24 23:53:10 +02006709 TaskState *ts;
pbrookc2764712009-03-07 15:24:59 +00006710
Andreas Färber9b056fc2013-06-24 23:53:10 +02006711 cpu_list_lock();
Andreas Färber9b056fc2013-06-24 23:53:10 +02006712 /* Remove the CPU from the list. */
Andreas Färberbdc44642013-06-24 23:50:24 +02006713 QTAILQ_REMOVE(&cpus, cpu, node);
Andreas Färber9b056fc2013-06-24 23:53:10 +02006714 cpu_list_unlock();
Andreas Färber0429a972013-08-26 18:14:44 +02006715 ts = cpu->opaque;
Andreas Färber9b056fc2013-06-24 23:53:10 +02006716 if (ts->child_tidptr) {
6717 put_user_u32(0, ts->child_tidptr);
6718 sys_futex(g2h(ts->child_tidptr), FUTEX_WAKE, INT_MAX,
6719 NULL, NULL, 0);
6720 }
Andreas Färbera2247f82013-06-09 19:47:04 +02006721 thread_cpu = NULL;
Andreas Färber0429a972013-08-26 18:14:44 +02006722 object_unref(OBJECT(cpu));
Andreas Färber9b056fc2013-06-24 23:53:10 +02006723 g_free(ts);
Emilio G. Cota70903762015-08-23 20:23:41 -04006724 rcu_unregister_thread();
Andreas Färber9b056fc2013-06-24 23:53:10 +02006725 pthread_exit(NULL);
6726 }
Juan Quintela9788c9c2009-07-27 16:13:02 +02006727#ifdef TARGET_GPROF
bellard7d132992003-03-06 23:23:54 +00006728 _mcleanup();
6729#endif
bellarde9009672005-04-26 20:42:36 +00006730 gdb_exit(cpu_env, arg1);
pbrookc2764712009-03-07 15:24:59 +00006731 _exit(arg1);
bellard31e31b82003-02-18 22:55:36 +00006732 ret = 0; /* avoid warning */
6733 break;
6734 case TARGET_NR_read:
aurel3238d840e2009-01-30 19:48:17 +00006735 if (arg3 == 0)
6736 ret = 0;
6737 else {
6738 if (!(p = lock_user(VERIFY_WRITE, arg2, arg3, 0)))
6739 goto efault;
Timothy E Baldwin50afd022016-05-12 18:47:47 +01006740 ret = get_errno(safe_read(arg1, p, arg3));
Laurent Viviere36800c2015-10-02 14:48:09 +02006741 if (ret >= 0 &&
Laurent Vivier5d4d3662015-10-28 21:40:43 +01006742 fd_trans_host_to_target_data(arg1)) {
6743 ret = fd_trans_host_to_target_data(arg1)(p, ret);
Laurent Viviere36800c2015-10-02 14:48:09 +02006744 }
aurel3238d840e2009-01-30 19:48:17 +00006745 unlock_user(p, arg2, ret);
6746 }
bellard31e31b82003-02-18 22:55:36 +00006747 break;
6748 case TARGET_NR_write:
bellard579a97f2007-11-11 14:26:47 +00006749 if (!(p = lock_user(VERIFY_READ, arg2, arg3, 1)))
6750 goto efault;
Timothy E Baldwin50afd022016-05-12 18:47:47 +01006751 ret = get_errno(safe_write(arg1, p, arg3));
pbrook53a59602006-03-25 19:31:22 +00006752 unlock_user(p, arg2, 0);
bellard31e31b82003-02-18 22:55:36 +00006753 break;
Chen Gang704eff62015-08-21 05:37:33 +08006754#ifdef TARGET_NR_open
bellard31e31b82003-02-18 22:55:36 +00006755 case TARGET_NR_open:
bellard2f619692007-11-16 10:46:05 +00006756 if (!(p = lock_user_string(arg1)))
6757 goto efault;
Riku Voipio0b2effd2014-08-06 10:36:37 +03006758 ret = get_errno(do_openat(cpu_env, AT_FDCWD, p,
6759 target_to_host_bitmask(arg2, fcntl_flags_tbl),
6760 arg3));
Laurent Viviere36800c2015-10-02 14:48:09 +02006761 fd_trans_unregister(ret);
pbrook53a59602006-03-25 19:31:22 +00006762 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00006763 break;
Chen Gang704eff62015-08-21 05:37:33 +08006764#endif
ths82424832007-09-24 09:21:55 +00006765 case TARGET_NR_openat:
bellard579a97f2007-11-11 14:26:47 +00006766 if (!(p = lock_user_string(arg2)))
6767 goto efault;
Riku Voipio0b2effd2014-08-06 10:36:37 +03006768 ret = get_errno(do_openat(cpu_env, arg1, p,
6769 target_to_host_bitmask(arg3, fcntl_flags_tbl),
6770 arg4));
Laurent Viviere36800c2015-10-02 14:48:09 +02006771 fd_trans_unregister(ret);
bellard579a97f2007-11-11 14:26:47 +00006772 unlock_user(p, arg2, 0);
ths82424832007-09-24 09:21:55 +00006773 break;
Laurent Vivier0f0426f2015-09-01 22:27:33 +02006774#if defined(TARGET_NR_name_to_handle_at) && defined(CONFIG_OPEN_BY_HANDLE)
6775 case TARGET_NR_name_to_handle_at:
6776 ret = do_name_to_handle_at(arg1, arg2, arg3, arg4, arg5);
6777 break;
6778#endif
6779#if defined(TARGET_NR_open_by_handle_at) && defined(CONFIG_OPEN_BY_HANDLE)
6780 case TARGET_NR_open_by_handle_at:
6781 ret = do_open_by_handle_at(arg1, arg2, arg3);
Laurent Viviere36800c2015-10-02 14:48:09 +02006782 fd_trans_unregister(ret);
Laurent Vivier0f0426f2015-09-01 22:27:33 +02006783 break;
6784#endif
bellard31e31b82003-02-18 22:55:36 +00006785 case TARGET_NR_close:
Laurent Viviere36800c2015-10-02 14:48:09 +02006786 fd_trans_unregister(arg1);
bellard31e31b82003-02-18 22:55:36 +00006787 ret = get_errno(close(arg1));
6788 break;
6789 case TARGET_NR_brk:
pbrook53a59602006-03-25 19:31:22 +00006790 ret = do_brk(arg1);
bellard31e31b82003-02-18 22:55:36 +00006791 break;
Chen Gang704eff62015-08-21 05:37:33 +08006792#ifdef TARGET_NR_fork
bellard31e31b82003-02-18 22:55:36 +00006793 case TARGET_NR_fork:
pbrookd865bab2008-06-07 22:12:17 +00006794 ret = get_errno(do_fork(cpu_env, SIGCHLD, 0, 0, 0, 0));
bellard31e31b82003-02-18 22:55:36 +00006795 break;
Chen Gang704eff62015-08-21 05:37:33 +08006796#endif
thse5febef2007-04-01 18:31:35 +00006797#ifdef TARGET_NR_waitpid
bellard31e31b82003-02-18 22:55:36 +00006798 case TARGET_NR_waitpid:
6799 {
pbrook53a59602006-03-25 19:31:22 +00006800 int status;
Timothy E Baldwin4af80a32016-05-12 18:47:49 +01006801 ret = get_errno(safe_wait4(arg1, &status, arg3, 0));
Alexander Graf53795572011-11-24 00:44:43 +01006802 if (!is_error(ret) && arg2 && ret
pbrook1d9d8b52009-04-16 15:17:02 +00006803 && put_user_s32(host_to_target_waitstatus(status), arg2))
bellard2f619692007-11-16 10:46:05 +00006804 goto efault;
bellard31e31b82003-02-18 22:55:36 +00006805 }
6806 break;
thse5febef2007-04-01 18:31:35 +00006807#endif
pbrookf0cbb612008-05-30 18:20:05 +00006808#ifdef TARGET_NR_waitid
6809 case TARGET_NR_waitid:
6810 {
6811 siginfo_t info;
6812 info.si_pid = 0;
Timothy E Baldwin4af80a32016-05-12 18:47:49 +01006813 ret = get_errno(safe_waitid(arg1, arg2, &info, arg4, NULL));
pbrookf0cbb612008-05-30 18:20:05 +00006814 if (!is_error(ret) && arg3 && info.si_pid != 0) {
Anthony Liguoric227f092009-10-01 16:12:16 -05006815 if (!(p = lock_user(VERIFY_WRITE, arg3, sizeof(target_siginfo_t), 0)))
pbrookf0cbb612008-05-30 18:20:05 +00006816 goto efault;
6817 host_to_target_siginfo(p, &info);
Anthony Liguoric227f092009-10-01 16:12:16 -05006818 unlock_user(p, arg3, sizeof(target_siginfo_t));
pbrookf0cbb612008-05-30 18:20:05 +00006819 }
6820 }
6821 break;
6822#endif
j_mayer7a3148a2007-04-05 07:13:51 +00006823#ifdef TARGET_NR_creat /* not on alpha */
bellard31e31b82003-02-18 22:55:36 +00006824 case TARGET_NR_creat:
bellard579a97f2007-11-11 14:26:47 +00006825 if (!(p = lock_user_string(arg1)))
6826 goto efault;
pbrook53a59602006-03-25 19:31:22 +00006827 ret = get_errno(creat(p, arg2));
Laurent Viviere36800c2015-10-02 14:48:09 +02006828 fd_trans_unregister(ret);
pbrook53a59602006-03-25 19:31:22 +00006829 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00006830 break;
j_mayer7a3148a2007-04-05 07:13:51 +00006831#endif
Chen Gang704eff62015-08-21 05:37:33 +08006832#ifdef TARGET_NR_link
bellard31e31b82003-02-18 22:55:36 +00006833 case TARGET_NR_link:
pbrook53a59602006-03-25 19:31:22 +00006834 {
6835 void * p2;
6836 p = lock_user_string(arg1);
6837 p2 = lock_user_string(arg2);
bellard579a97f2007-11-11 14:26:47 +00006838 if (!p || !p2)
6839 ret = -TARGET_EFAULT;
6840 else
6841 ret = get_errno(link(p, p2));
pbrook53a59602006-03-25 19:31:22 +00006842 unlock_user(p2, arg2, 0);
6843 unlock_user(p, arg1, 0);
6844 }
bellard31e31b82003-02-18 22:55:36 +00006845 break;
Chen Gang704eff62015-08-21 05:37:33 +08006846#endif
Peter Maydellc0d472b2013-06-12 16:20:21 +01006847#if defined(TARGET_NR_linkat)
ths64f0ce42007-09-24 09:25:06 +00006848 case TARGET_NR_linkat:
ths64f0ce42007-09-24 09:25:06 +00006849 {
6850 void * p2 = NULL;
bellard579a97f2007-11-11 14:26:47 +00006851 if (!arg2 || !arg4)
6852 goto efault;
ths64f0ce42007-09-24 09:25:06 +00006853 p = lock_user_string(arg2);
6854 p2 = lock_user_string(arg4);
bellard579a97f2007-11-11 14:26:47 +00006855 if (!p || !p2)
ths0da46a62007-10-20 20:23:07 +00006856 ret = -TARGET_EFAULT;
ths64f0ce42007-09-24 09:25:06 +00006857 else
Peter Maydellc0d472b2013-06-12 16:20:21 +01006858 ret = get_errno(linkat(arg1, p, arg3, p2, arg5));
bellard579a97f2007-11-11 14:26:47 +00006859 unlock_user(p, arg2, 0);
6860 unlock_user(p2, arg4, 0);
ths64f0ce42007-09-24 09:25:06 +00006861 }
6862 break;
6863#endif
Chen Gang704eff62015-08-21 05:37:33 +08006864#ifdef TARGET_NR_unlink
bellard31e31b82003-02-18 22:55:36 +00006865 case TARGET_NR_unlink:
bellard579a97f2007-11-11 14:26:47 +00006866 if (!(p = lock_user_string(arg1)))
6867 goto efault;
pbrook53a59602006-03-25 19:31:22 +00006868 ret = get_errno(unlink(p));
6869 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00006870 break;
Chen Gang704eff62015-08-21 05:37:33 +08006871#endif
Peter Maydellc0d472b2013-06-12 16:20:21 +01006872#if defined(TARGET_NR_unlinkat)
ths8170f562007-09-24 09:24:11 +00006873 case TARGET_NR_unlinkat:
bellard579a97f2007-11-11 14:26:47 +00006874 if (!(p = lock_user_string(arg2)))
6875 goto efault;
Peter Maydellc0d472b2013-06-12 16:20:21 +01006876 ret = get_errno(unlinkat(arg1, p, arg3));
bellard579a97f2007-11-11 14:26:47 +00006877 unlock_user(p, arg2, 0);
balroged494d82007-12-11 23:23:52 +00006878 break;
balrogb7d35e62007-12-12 00:40:24 +00006879#endif
bellard31e31b82003-02-18 22:55:36 +00006880 case TARGET_NR_execve:
bellard7854b052003-03-29 17:22:23 +00006881 {
6882 char **argp, **envp;
bellardf7341ff2003-03-30 21:00:25 +00006883 int argc, envc;
blueswir1992f48a2007-10-14 16:27:31 +00006884 abi_ulong gp;
6885 abi_ulong guest_argp;
6886 abi_ulong guest_envp;
6887 abi_ulong addr;
bellard7854b052003-03-29 17:22:23 +00006888 char **q;
Ulrich Hechta6f79cc2012-01-31 12:43:16 +01006889 int total_size = 0;
bellard7854b052003-03-29 17:22:23 +00006890
bellardf7341ff2003-03-30 21:00:25 +00006891 argc = 0;
pbrook53a59602006-03-25 19:31:22 +00006892 guest_argp = arg2;
pbrookda94d262008-05-30 18:24:00 +00006893 for (gp = guest_argp; gp; gp += sizeof(abi_ulong)) {
ths03aa1972007-12-02 06:28:08 +00006894 if (get_user_ual(addr, gp))
bellard2f619692007-11-16 10:46:05 +00006895 goto efault;
ths03aa1972007-12-02 06:28:08 +00006896 if (!addr)
bellard2f619692007-11-16 10:46:05 +00006897 break;
bellard7854b052003-03-29 17:22:23 +00006898 argc++;
bellard2f619692007-11-16 10:46:05 +00006899 }
bellardf7341ff2003-03-30 21:00:25 +00006900 envc = 0;
pbrook53a59602006-03-25 19:31:22 +00006901 guest_envp = arg3;
pbrookda94d262008-05-30 18:24:00 +00006902 for (gp = guest_envp; gp; gp += sizeof(abi_ulong)) {
ths03aa1972007-12-02 06:28:08 +00006903 if (get_user_ual(addr, gp))
bellard2f619692007-11-16 10:46:05 +00006904 goto efault;
ths03aa1972007-12-02 06:28:08 +00006905 if (!addr)
bellard2f619692007-11-16 10:46:05 +00006906 break;
bellard7854b052003-03-29 17:22:23 +00006907 envc++;
bellard2f619692007-11-16 10:46:05 +00006908 }
bellard7854b052003-03-29 17:22:23 +00006909
bellardf7341ff2003-03-30 21:00:25 +00006910 argp = alloca((argc + 1) * sizeof(void *));
6911 envp = alloca((envc + 1) * sizeof(void *));
bellard7854b052003-03-29 17:22:23 +00006912
pbrookda94d262008-05-30 18:24:00 +00006913 for (gp = guest_argp, q = argp; gp;
blueswir1992f48a2007-10-14 16:27:31 +00006914 gp += sizeof(abi_ulong), q++) {
bellard2f619692007-11-16 10:46:05 +00006915 if (get_user_ual(addr, gp))
6916 goto execve_efault;
pbrook53a59602006-03-25 19:31:22 +00006917 if (!addr)
6918 break;
bellard2f619692007-11-16 10:46:05 +00006919 if (!(*q = lock_user_string(addr)))
6920 goto execve_efault;
Ulrich Hechta6f79cc2012-01-31 12:43:16 +01006921 total_size += strlen(*q) + 1;
pbrook53a59602006-03-25 19:31:22 +00006922 }
bellardf7341ff2003-03-30 21:00:25 +00006923 *q = NULL;
6924
pbrookda94d262008-05-30 18:24:00 +00006925 for (gp = guest_envp, q = envp; gp;
blueswir1992f48a2007-10-14 16:27:31 +00006926 gp += sizeof(abi_ulong), q++) {
bellard2f619692007-11-16 10:46:05 +00006927 if (get_user_ual(addr, gp))
6928 goto execve_efault;
pbrook53a59602006-03-25 19:31:22 +00006929 if (!addr)
6930 break;
bellard2f619692007-11-16 10:46:05 +00006931 if (!(*q = lock_user_string(addr)))
6932 goto execve_efault;
Ulrich Hechta6f79cc2012-01-31 12:43:16 +01006933 total_size += strlen(*q) + 1;
pbrook53a59602006-03-25 19:31:22 +00006934 }
bellardf7341ff2003-03-30 21:00:25 +00006935 *q = NULL;
bellard7854b052003-03-29 17:22:23 +00006936
bellard2f619692007-11-16 10:46:05 +00006937 if (!(p = lock_user_string(arg1)))
6938 goto execve_efault;
Timothy E Baldwinffdcbe22016-05-12 18:47:50 +01006939 /* Although execve() is not an interruptible syscall it is
6940 * a special case where we must use the safe_syscall wrapper:
6941 * if we allow a signal to happen before we make the host
6942 * syscall then we will 'lose' it, because at the point of
6943 * execve the process leaves QEMU's control. So we use the
6944 * safe syscall wrapper to ensure that we either take the
6945 * signal as a guest signal, or else it does not happen
6946 * before the execve completes and makes it the other
6947 * program's problem.
6948 */
6949 ret = get_errno(safe_execve(p, argp, envp));
pbrook53a59602006-03-25 19:31:22 +00006950 unlock_user(p, arg1, 0);
6951
bellard2f619692007-11-16 10:46:05 +00006952 goto execve_end;
6953
6954 execve_efault:
6955 ret = -TARGET_EFAULT;
6956
6957 execve_end:
pbrook53a59602006-03-25 19:31:22 +00006958 for (gp = guest_argp, q = argp; *q;
blueswir1992f48a2007-10-14 16:27:31 +00006959 gp += sizeof(abi_ulong), q++) {
bellard2f619692007-11-16 10:46:05 +00006960 if (get_user_ual(addr, gp)
6961 || !addr)
6962 break;
pbrook53a59602006-03-25 19:31:22 +00006963 unlock_user(*q, addr, 0);
6964 }
6965 for (gp = guest_envp, q = envp; *q;
blueswir1992f48a2007-10-14 16:27:31 +00006966 gp += sizeof(abi_ulong), q++) {
bellard2f619692007-11-16 10:46:05 +00006967 if (get_user_ual(addr, gp)
6968 || !addr)
6969 break;
pbrook53a59602006-03-25 19:31:22 +00006970 unlock_user(*q, addr, 0);
6971 }
bellard7854b052003-03-29 17:22:23 +00006972 }
bellard31e31b82003-02-18 22:55:36 +00006973 break;
6974 case TARGET_NR_chdir:
bellard579a97f2007-11-11 14:26:47 +00006975 if (!(p = lock_user_string(arg1)))
6976 goto efault;
pbrook53a59602006-03-25 19:31:22 +00006977 ret = get_errno(chdir(p));
6978 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00006979 break;
bellarda315a142005-01-30 22:59:18 +00006980#ifdef TARGET_NR_time
bellard31e31b82003-02-18 22:55:36 +00006981 case TARGET_NR_time:
6982 {
pbrook53a59602006-03-25 19:31:22 +00006983 time_t host_time;
6984 ret = get_errno(time(&host_time));
bellard2f619692007-11-16 10:46:05 +00006985 if (!is_error(ret)
6986 && arg1
6987 && put_user_sal(host_time, arg1))
6988 goto efault;
bellard31e31b82003-02-18 22:55:36 +00006989 }
6990 break;
bellarda315a142005-01-30 22:59:18 +00006991#endif
Chen Gang704eff62015-08-21 05:37:33 +08006992#ifdef TARGET_NR_mknod
bellard31e31b82003-02-18 22:55:36 +00006993 case TARGET_NR_mknod:
bellard579a97f2007-11-11 14:26:47 +00006994 if (!(p = lock_user_string(arg1)))
6995 goto efault;
pbrook53a59602006-03-25 19:31:22 +00006996 ret = get_errno(mknod(p, arg2, arg3));
6997 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00006998 break;
Chen Gang704eff62015-08-21 05:37:33 +08006999#endif
Peter Maydellc0d472b2013-06-12 16:20:21 +01007000#if defined(TARGET_NR_mknodat)
ths75ac37a2007-09-24 09:23:05 +00007001 case TARGET_NR_mknodat:
bellard579a97f2007-11-11 14:26:47 +00007002 if (!(p = lock_user_string(arg2)))
7003 goto efault;
Peter Maydellc0d472b2013-06-12 16:20:21 +01007004 ret = get_errno(mknodat(arg1, p, arg3, arg4));
bellard579a97f2007-11-11 14:26:47 +00007005 unlock_user(p, arg2, 0);
ths75ac37a2007-09-24 09:23:05 +00007006 break;
7007#endif
Chen Gang704eff62015-08-21 05:37:33 +08007008#ifdef TARGET_NR_chmod
bellard31e31b82003-02-18 22:55:36 +00007009 case TARGET_NR_chmod:
bellard579a97f2007-11-11 14:26:47 +00007010 if (!(p = lock_user_string(arg1)))
7011 goto efault;
pbrook53a59602006-03-25 19:31:22 +00007012 ret = get_errno(chmod(p, arg2));
7013 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00007014 break;
Chen Gang704eff62015-08-21 05:37:33 +08007015#endif
bellardebc05482003-09-30 21:08:41 +00007016#ifdef TARGET_NR_break
bellard31e31b82003-02-18 22:55:36 +00007017 case TARGET_NR_break:
7018 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00007019#endif
7020#ifdef TARGET_NR_oldstat
bellard31e31b82003-02-18 22:55:36 +00007021 case TARGET_NR_oldstat:
7022 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00007023#endif
bellard31e31b82003-02-18 22:55:36 +00007024 case TARGET_NR_lseek:
7025 ret = get_errno(lseek(arg1, arg2, arg3));
7026 break;
Richard Henderson92317332010-05-03 10:07:53 -07007027#if defined(TARGET_NR_getxpid) && defined(TARGET_ALPHA)
7028 /* Alpha specific */
j_mayer7a3148a2007-04-05 07:13:51 +00007029 case TARGET_NR_getxpid:
Richard Henderson92317332010-05-03 10:07:53 -07007030 ((CPUAlphaState *)cpu_env)->ir[IR_A4] = getppid();
bellard31e31b82003-02-18 22:55:36 +00007031 ret = get_errno(getpid());
7032 break;
Richard Henderson92317332010-05-03 10:07:53 -07007033#endif
7034#ifdef TARGET_NR_getpid
7035 case TARGET_NR_getpid:
7036 ret = get_errno(getpid());
7037 break;
7038#endif
bellard31e31b82003-02-18 22:55:36 +00007039 case TARGET_NR_mount:
Paul Burton356d7712014-06-22 11:25:37 +01007040 {
7041 /* need to look at the data field */
7042 void *p2, *p3;
7043
7044 if (arg1) {
7045 p = lock_user_string(arg1);
7046 if (!p) {
7047 goto efault;
7048 }
7049 } else {
7050 p = NULL;
7051 }
7052
7053 p2 = lock_user_string(arg2);
7054 if (!p2) {
7055 if (arg1) {
7056 unlock_user(p, arg1, 0);
7057 }
7058 goto efault;
7059 }
7060
7061 if (arg3) {
7062 p3 = lock_user_string(arg3);
7063 if (!p3) {
7064 if (arg1) {
bellard579a97f2007-11-11 14:26:47 +00007065 unlock_user(p, arg1, 0);
Paul Burton356d7712014-06-22 11:25:37 +01007066 }
7067 unlock_user(p2, arg2, 0);
7068 goto efault;
7069 }
7070 } else {
7071 p3 = NULL;
7072 }
7073
7074 /* FIXME - arg5 should be locked, but it isn't clear how to
7075 * do that since it's not guaranteed to be a NULL-terminated
7076 * string.
7077 */
7078 if (!arg5) {
7079 ret = mount(p, p2, p3, (unsigned long)arg4, NULL);
7080 } else {
7081 ret = mount(p, p2, p3, (unsigned long)arg4, g2h(arg5));
7082 }
7083 ret = get_errno(ret);
7084
7085 if (arg1) {
7086 unlock_user(p, arg1, 0);
7087 }
7088 unlock_user(p2, arg2, 0);
7089 if (arg3) {
7090 unlock_user(p3, arg3, 0);
7091 }
7092 }
7093 break;
thse5febef2007-04-01 18:31:35 +00007094#ifdef TARGET_NR_umount
bellard31e31b82003-02-18 22:55:36 +00007095 case TARGET_NR_umount:
bellard579a97f2007-11-11 14:26:47 +00007096 if (!(p = lock_user_string(arg1)))
7097 goto efault;
pbrook53a59602006-03-25 19:31:22 +00007098 ret = get_errno(umount(p));
7099 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00007100 break;
thse5febef2007-04-01 18:31:35 +00007101#endif
j_mayer7a3148a2007-04-05 07:13:51 +00007102#ifdef TARGET_NR_stime /* not on alpha */
bellard31e31b82003-02-18 22:55:36 +00007103 case TARGET_NR_stime:
7104 {
pbrook53a59602006-03-25 19:31:22 +00007105 time_t host_time;
bellard2f619692007-11-16 10:46:05 +00007106 if (get_user_sal(host_time, arg1))
7107 goto efault;
pbrook53a59602006-03-25 19:31:22 +00007108 ret = get_errno(stime(&host_time));
bellard31e31b82003-02-18 22:55:36 +00007109 }
7110 break;
j_mayer7a3148a2007-04-05 07:13:51 +00007111#endif
bellard31e31b82003-02-18 22:55:36 +00007112 case TARGET_NR_ptrace:
7113 goto unimplemented;
j_mayer7a3148a2007-04-05 07:13:51 +00007114#ifdef TARGET_NR_alarm /* not on alpha */
bellard31e31b82003-02-18 22:55:36 +00007115 case TARGET_NR_alarm:
7116 ret = alarm(arg1);
7117 break;
j_mayer7a3148a2007-04-05 07:13:51 +00007118#endif
bellardebc05482003-09-30 21:08:41 +00007119#ifdef TARGET_NR_oldfstat
bellard31e31b82003-02-18 22:55:36 +00007120 case TARGET_NR_oldfstat:
7121 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00007122#endif
j_mayer7a3148a2007-04-05 07:13:51 +00007123#ifdef TARGET_NR_pause /* not on alpha */
bellard31e31b82003-02-18 22:55:36 +00007124 case TARGET_NR_pause:
Timothy E Baldwinf59ec602016-05-27 15:51:55 +01007125 if (!block_signals()) {
7126 sigsuspend(&((TaskState *)cpu->opaque)->signal_mask);
7127 }
7128 ret = -TARGET_EINTR;
bellard31e31b82003-02-18 22:55:36 +00007129 break;
j_mayer7a3148a2007-04-05 07:13:51 +00007130#endif
thse5febef2007-04-01 18:31:35 +00007131#ifdef TARGET_NR_utime
bellard31e31b82003-02-18 22:55:36 +00007132 case TARGET_NR_utime:
bellardebc05482003-09-30 21:08:41 +00007133 {
pbrook53a59602006-03-25 19:31:22 +00007134 struct utimbuf tbuf, *host_tbuf;
7135 struct target_utimbuf *target_tbuf;
7136 if (arg2) {
bellard579a97f2007-11-11 14:26:47 +00007137 if (!lock_user_struct(VERIFY_READ, target_tbuf, arg2, 1))
7138 goto efault;
Matthias Brauncbb21ee2011-08-12 19:57:41 +02007139 tbuf.actime = tswapal(target_tbuf->actime);
7140 tbuf.modtime = tswapal(target_tbuf->modtime);
pbrook53a59602006-03-25 19:31:22 +00007141 unlock_user_struct(target_tbuf, arg2, 0);
7142 host_tbuf = &tbuf;
bellardf72e8ff2004-05-03 19:23:07 +00007143 } else {
pbrook53a59602006-03-25 19:31:22 +00007144 host_tbuf = NULL;
bellardf72e8ff2004-05-03 19:23:07 +00007145 }
bellard579a97f2007-11-11 14:26:47 +00007146 if (!(p = lock_user_string(arg1)))
7147 goto efault;
pbrook53a59602006-03-25 19:31:22 +00007148 ret = get_errno(utime(p, host_tbuf));
7149 unlock_user(p, arg1, 0);
bellardebc05482003-09-30 21:08:41 +00007150 }
7151 break;
thse5febef2007-04-01 18:31:35 +00007152#endif
Chen Gang704eff62015-08-21 05:37:33 +08007153#ifdef TARGET_NR_utimes
bellard978a66f2004-12-06 22:58:05 +00007154 case TARGET_NR_utimes:
7155 {
bellard978a66f2004-12-06 22:58:05 +00007156 struct timeval *tvp, tv[2];
pbrook53a59602006-03-25 19:31:22 +00007157 if (arg2) {
ths788f5ec2007-12-09 02:37:05 +00007158 if (copy_from_user_timeval(&tv[0], arg2)
7159 || copy_from_user_timeval(&tv[1],
7160 arg2 + sizeof(struct target_timeval)))
7161 goto efault;
bellard978a66f2004-12-06 22:58:05 +00007162 tvp = tv;
7163 } else {
7164 tvp = NULL;
7165 }
bellard579a97f2007-11-11 14:26:47 +00007166 if (!(p = lock_user_string(arg1)))
7167 goto efault;
pbrook53a59602006-03-25 19:31:22 +00007168 ret = get_errno(utimes(p, tvp));
7169 unlock_user(p, arg1, 0);
bellard978a66f2004-12-06 22:58:05 +00007170 }
7171 break;
Chen Gang704eff62015-08-21 05:37:33 +08007172#endif
Peter Maydellc0d472b2013-06-12 16:20:21 +01007173#if defined(TARGET_NR_futimesat)
balrogac8a6552008-09-20 02:25:39 +00007174 case TARGET_NR_futimesat:
7175 {
7176 struct timeval *tvp, tv[2];
7177 if (arg3) {
7178 if (copy_from_user_timeval(&tv[0], arg3)
7179 || copy_from_user_timeval(&tv[1],
7180 arg3 + sizeof(struct target_timeval)))
7181 goto efault;
7182 tvp = tv;
7183 } else {
7184 tvp = NULL;
7185 }
7186 if (!(p = lock_user_string(arg2)))
7187 goto efault;
Peter Maydellc0d472b2013-06-12 16:20:21 +01007188 ret = get_errno(futimesat(arg1, path(p), tvp));
balrogac8a6552008-09-20 02:25:39 +00007189 unlock_user(p, arg2, 0);
7190 }
7191 break;
7192#endif
bellardebc05482003-09-30 21:08:41 +00007193#ifdef TARGET_NR_stty
bellard31e31b82003-02-18 22:55:36 +00007194 case TARGET_NR_stty:
7195 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00007196#endif
7197#ifdef TARGET_NR_gtty
bellard31e31b82003-02-18 22:55:36 +00007198 case TARGET_NR_gtty:
7199 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00007200#endif
Chen Gang704eff62015-08-21 05:37:33 +08007201#ifdef TARGET_NR_access
bellard31e31b82003-02-18 22:55:36 +00007202 case TARGET_NR_access:
bellard579a97f2007-11-11 14:26:47 +00007203 if (!(p = lock_user_string(arg1)))
7204 goto efault;
Ulrich Hecht719f9082009-07-03 17:09:29 +02007205 ret = get_errno(access(path(p), arg2));
pbrook53a59602006-03-25 19:31:22 +00007206 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00007207 break;
Chen Gang704eff62015-08-21 05:37:33 +08007208#endif
ths92a34c12007-09-24 09:27:49 +00007209#if defined(TARGET_NR_faccessat) && defined(__NR_faccessat)
7210 case TARGET_NR_faccessat:
bellard579a97f2007-11-11 14:26:47 +00007211 if (!(p = lock_user_string(arg2)))
7212 goto efault;
Peter Maydellc0d472b2013-06-12 16:20:21 +01007213 ret = get_errno(faccessat(arg1, p, arg3, 0));
bellard579a97f2007-11-11 14:26:47 +00007214 unlock_user(p, arg2, 0);
ths92a34c12007-09-24 09:27:49 +00007215 break;
7216#endif
j_mayer7a3148a2007-04-05 07:13:51 +00007217#ifdef TARGET_NR_nice /* not on alpha */
bellard31e31b82003-02-18 22:55:36 +00007218 case TARGET_NR_nice:
7219 ret = get_errno(nice(arg1));
7220 break;
j_mayer7a3148a2007-04-05 07:13:51 +00007221#endif
bellardebc05482003-09-30 21:08:41 +00007222#ifdef TARGET_NR_ftime
bellard31e31b82003-02-18 22:55:36 +00007223 case TARGET_NR_ftime:
7224 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00007225#endif
bellard31e31b82003-02-18 22:55:36 +00007226 case TARGET_NR_sync:
bellard04369ff2003-03-20 22:33:23 +00007227 sync();
7228 ret = 0;
bellard31e31b82003-02-18 22:55:36 +00007229 break;
7230 case TARGET_NR_kill:
Peter Maydellbef653d2016-05-27 15:51:57 +01007231 ret = get_errno(safe_kill(arg1, target_to_host_signal(arg2)));
bellard31e31b82003-02-18 22:55:36 +00007232 break;
Chen Gang704eff62015-08-21 05:37:33 +08007233#ifdef TARGET_NR_rename
bellard31e31b82003-02-18 22:55:36 +00007234 case TARGET_NR_rename:
pbrook53a59602006-03-25 19:31:22 +00007235 {
7236 void *p2;
7237 p = lock_user_string(arg1);
7238 p2 = lock_user_string(arg2);
bellard579a97f2007-11-11 14:26:47 +00007239 if (!p || !p2)
7240 ret = -TARGET_EFAULT;
7241 else
7242 ret = get_errno(rename(p, p2));
pbrook53a59602006-03-25 19:31:22 +00007243 unlock_user(p2, arg2, 0);
7244 unlock_user(p, arg1, 0);
7245 }
bellard31e31b82003-02-18 22:55:36 +00007246 break;
Chen Gang704eff62015-08-21 05:37:33 +08007247#endif
Peter Maydellc0d472b2013-06-12 16:20:21 +01007248#if defined(TARGET_NR_renameat)
ths722183f2007-09-24 09:24:37 +00007249 case TARGET_NR_renameat:
ths722183f2007-09-24 09:24:37 +00007250 {
bellard579a97f2007-11-11 14:26:47 +00007251 void *p2;
ths722183f2007-09-24 09:24:37 +00007252 p = lock_user_string(arg2);
7253 p2 = lock_user_string(arg4);
bellard579a97f2007-11-11 14:26:47 +00007254 if (!p || !p2)
ths0da46a62007-10-20 20:23:07 +00007255 ret = -TARGET_EFAULT;
ths722183f2007-09-24 09:24:37 +00007256 else
Peter Maydellc0d472b2013-06-12 16:20:21 +01007257 ret = get_errno(renameat(arg1, p, arg3, p2));
bellard579a97f2007-11-11 14:26:47 +00007258 unlock_user(p2, arg4, 0);
7259 unlock_user(p, arg2, 0);
ths722183f2007-09-24 09:24:37 +00007260 }
7261 break;
7262#endif
Chen Gang704eff62015-08-21 05:37:33 +08007263#ifdef TARGET_NR_mkdir
bellard31e31b82003-02-18 22:55:36 +00007264 case TARGET_NR_mkdir:
bellard579a97f2007-11-11 14:26:47 +00007265 if (!(p = lock_user_string(arg1)))
7266 goto efault;
pbrook53a59602006-03-25 19:31:22 +00007267 ret = get_errno(mkdir(p, arg2));
7268 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00007269 break;
Chen Gang704eff62015-08-21 05:37:33 +08007270#endif
Peter Maydellc0d472b2013-06-12 16:20:21 +01007271#if defined(TARGET_NR_mkdirat)
ths4472ad02007-09-24 09:22:32 +00007272 case TARGET_NR_mkdirat:
bellard579a97f2007-11-11 14:26:47 +00007273 if (!(p = lock_user_string(arg2)))
7274 goto efault;
Peter Maydellc0d472b2013-06-12 16:20:21 +01007275 ret = get_errno(mkdirat(arg1, p, arg3));
bellard579a97f2007-11-11 14:26:47 +00007276 unlock_user(p, arg2, 0);
ths4472ad02007-09-24 09:22:32 +00007277 break;
7278#endif
Chen Gang704eff62015-08-21 05:37:33 +08007279#ifdef TARGET_NR_rmdir
bellard31e31b82003-02-18 22:55:36 +00007280 case TARGET_NR_rmdir:
bellard579a97f2007-11-11 14:26:47 +00007281 if (!(p = lock_user_string(arg1)))
7282 goto efault;
pbrook53a59602006-03-25 19:31:22 +00007283 ret = get_errno(rmdir(p));
7284 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00007285 break;
Chen Gang704eff62015-08-21 05:37:33 +08007286#endif
bellard31e31b82003-02-18 22:55:36 +00007287 case TARGET_NR_dup:
7288 ret = get_errno(dup(arg1));
Laurent Viviere36800c2015-10-02 14:48:09 +02007289 if (ret >= 0) {
7290 fd_trans_dup(arg1, ret);
7291 }
bellard31e31b82003-02-18 22:55:36 +00007292 break;
Chen Gang704eff62015-08-21 05:37:33 +08007293#ifdef TARGET_NR_pipe
bellard31e31b82003-02-18 22:55:36 +00007294 case TARGET_NR_pipe:
Richard Hendersonfb41a662010-05-03 10:07:52 -07007295 ret = do_pipe(cpu_env, arg1, 0, 0);
bellard31e31b82003-02-18 22:55:36 +00007296 break;
Chen Gang704eff62015-08-21 05:37:33 +08007297#endif
Riku Voipio099d6b02009-05-05 12:10:04 +03007298#ifdef TARGET_NR_pipe2
7299 case TARGET_NR_pipe2:
Richard Hendersone7ea6cb2012-06-01 18:48:39 -07007300 ret = do_pipe(cpu_env, arg1,
7301 target_to_host_bitmask(arg2, fcntl_flags_tbl), 1);
Riku Voipio099d6b02009-05-05 12:10:04 +03007302 break;
7303#endif
bellard31e31b82003-02-18 22:55:36 +00007304 case TARGET_NR_times:
bellard32f36bc2003-03-30 21:29:48 +00007305 {
pbrook53a59602006-03-25 19:31:22 +00007306 struct target_tms *tmsp;
bellard32f36bc2003-03-30 21:29:48 +00007307 struct tms tms;
7308 ret = get_errno(times(&tms));
pbrook53a59602006-03-25 19:31:22 +00007309 if (arg1) {
bellard579a97f2007-11-11 14:26:47 +00007310 tmsp = lock_user(VERIFY_WRITE, arg1, sizeof(struct target_tms), 0);
7311 if (!tmsp)
7312 goto efault;
Matthias Brauncbb21ee2011-08-12 19:57:41 +02007313 tmsp->tms_utime = tswapal(host_to_target_clock_t(tms.tms_utime));
7314 tmsp->tms_stime = tswapal(host_to_target_clock_t(tms.tms_stime));
7315 tmsp->tms_cutime = tswapal(host_to_target_clock_t(tms.tms_cutime));
7316 tmsp->tms_cstime = tswapal(host_to_target_clock_t(tms.tms_cstime));
bellard32f36bc2003-03-30 21:29:48 +00007317 }
bellardc596ed12003-07-13 17:32:31 +00007318 if (!is_error(ret))
7319 ret = host_to_target_clock_t(ret);
bellard32f36bc2003-03-30 21:29:48 +00007320 }
7321 break;
bellardebc05482003-09-30 21:08:41 +00007322#ifdef TARGET_NR_prof
bellard31e31b82003-02-18 22:55:36 +00007323 case TARGET_NR_prof:
7324 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00007325#endif
thse5febef2007-04-01 18:31:35 +00007326#ifdef TARGET_NR_signal
bellard31e31b82003-02-18 22:55:36 +00007327 case TARGET_NR_signal:
7328 goto unimplemented;
thse5febef2007-04-01 18:31:35 +00007329#endif
bellard31e31b82003-02-18 22:55:36 +00007330 case TARGET_NR_acct:
aurel3238d840e2009-01-30 19:48:17 +00007331 if (arg1 == 0) {
7332 ret = get_errno(acct(NULL));
7333 } else {
7334 if (!(p = lock_user_string(arg1)))
7335 goto efault;
7336 ret = get_errno(acct(path(p)));
7337 unlock_user(p, arg1, 0);
7338 }
pbrook24836682006-04-16 14:14:53 +00007339 break;
Richard Henderson8070e7b2013-07-24 09:50:00 -10007340#ifdef TARGET_NR_umount2
bellard31e31b82003-02-18 22:55:36 +00007341 case TARGET_NR_umount2:
bellard579a97f2007-11-11 14:26:47 +00007342 if (!(p = lock_user_string(arg1)))
7343 goto efault;
pbrook53a59602006-03-25 19:31:22 +00007344 ret = get_errno(umount2(p, arg2));
7345 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00007346 break;
j_mayer7a3148a2007-04-05 07:13:51 +00007347#endif
bellardebc05482003-09-30 21:08:41 +00007348#ifdef TARGET_NR_lock
bellard31e31b82003-02-18 22:55:36 +00007349 case TARGET_NR_lock:
7350 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00007351#endif
bellard31e31b82003-02-18 22:55:36 +00007352 case TARGET_NR_ioctl:
7353 ret = do_ioctl(arg1, arg2, arg3);
7354 break;
7355 case TARGET_NR_fcntl:
bellard9ee1fa22007-11-11 15:11:19 +00007356 ret = do_fcntl(arg1, arg2, arg3);
bellard31e31b82003-02-18 22:55:36 +00007357 break;
bellardebc05482003-09-30 21:08:41 +00007358#ifdef TARGET_NR_mpx
bellard31e31b82003-02-18 22:55:36 +00007359 case TARGET_NR_mpx:
7360 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00007361#endif
bellard31e31b82003-02-18 22:55:36 +00007362 case TARGET_NR_setpgid:
7363 ret = get_errno(setpgid(arg1, arg2));
7364 break;
bellardebc05482003-09-30 21:08:41 +00007365#ifdef TARGET_NR_ulimit
bellard31e31b82003-02-18 22:55:36 +00007366 case TARGET_NR_ulimit:
7367 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00007368#endif
7369#ifdef TARGET_NR_oldolduname
bellard31e31b82003-02-18 22:55:36 +00007370 case TARGET_NR_oldolduname:
7371 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00007372#endif
bellard31e31b82003-02-18 22:55:36 +00007373 case TARGET_NR_umask:
7374 ret = get_errno(umask(arg1));
7375 break;
7376 case TARGET_NR_chroot:
bellard579a97f2007-11-11 14:26:47 +00007377 if (!(p = lock_user_string(arg1)))
7378 goto efault;
pbrook53a59602006-03-25 19:31:22 +00007379 ret = get_errno(chroot(p));
7380 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00007381 break;
Chen Gang704eff62015-08-21 05:37:33 +08007382#ifdef TARGET_NR_ustat
bellard31e31b82003-02-18 22:55:36 +00007383 case TARGET_NR_ustat:
7384 goto unimplemented;
Chen Gang704eff62015-08-21 05:37:33 +08007385#endif
7386#ifdef TARGET_NR_dup2
bellard31e31b82003-02-18 22:55:36 +00007387 case TARGET_NR_dup2:
7388 ret = get_errno(dup2(arg1, arg2));
Laurent Viviere36800c2015-10-02 14:48:09 +02007389 if (ret >= 0) {
7390 fd_trans_dup(arg1, arg2);
7391 }
bellard31e31b82003-02-18 22:55:36 +00007392 break;
Chen Gang704eff62015-08-21 05:37:33 +08007393#endif
Ulrich Hechtd0927932009-09-17 20:22:14 +03007394#if defined(CONFIG_DUP3) && defined(TARGET_NR_dup3)
7395 case TARGET_NR_dup3:
7396 ret = get_errno(dup3(arg1, arg2, arg3));
Laurent Viviere36800c2015-10-02 14:48:09 +02007397 if (ret >= 0) {
7398 fd_trans_dup(arg1, arg2);
7399 }
Ulrich Hechtd0927932009-09-17 20:22:14 +03007400 break;
7401#endif
j_mayer7a3148a2007-04-05 07:13:51 +00007402#ifdef TARGET_NR_getppid /* not on alpha */
bellard31e31b82003-02-18 22:55:36 +00007403 case TARGET_NR_getppid:
7404 ret = get_errno(getppid());
7405 break;
j_mayer7a3148a2007-04-05 07:13:51 +00007406#endif
Chen Gang704eff62015-08-21 05:37:33 +08007407#ifdef TARGET_NR_getpgrp
bellard31e31b82003-02-18 22:55:36 +00007408 case TARGET_NR_getpgrp:
7409 ret = get_errno(getpgrp());
7410 break;
Chen Gang704eff62015-08-21 05:37:33 +08007411#endif
bellard31e31b82003-02-18 22:55:36 +00007412 case TARGET_NR_setsid:
7413 ret = get_errno(setsid());
7414 break;
thse5febef2007-04-01 18:31:35 +00007415#ifdef TARGET_NR_sigaction
bellard31e31b82003-02-18 22:55:36 +00007416 case TARGET_NR_sigaction:
bellard31e31b82003-02-18 22:55:36 +00007417 {
Richard Henderson6049f4f2009-12-27 18:30:03 -08007418#if defined(TARGET_ALPHA)
7419 struct target_sigaction act, oact, *pact = 0;
pbrook53a59602006-03-25 19:31:22 +00007420 struct target_old_sigaction *old_act;
pbrook53a59602006-03-25 19:31:22 +00007421 if (arg2) {
bellard579a97f2007-11-11 14:26:47 +00007422 if (!lock_user_struct(VERIFY_READ, old_act, arg2, 1))
7423 goto efault;
bellard66fb9762003-03-23 01:06:05 +00007424 act._sa_handler = old_act->_sa_handler;
7425 target_siginitset(&act.sa_mask, old_act->sa_mask);
7426 act.sa_flags = old_act->sa_flags;
Richard Henderson6049f4f2009-12-27 18:30:03 -08007427 act.sa_restorer = 0;
pbrook53a59602006-03-25 19:31:22 +00007428 unlock_user_struct(old_act, arg2, 0);
bellard66fb9762003-03-23 01:06:05 +00007429 pact = &act;
bellard66fb9762003-03-23 01:06:05 +00007430 }
7431 ret = get_errno(do_sigaction(arg1, pact, &oact));
pbrook53a59602006-03-25 19:31:22 +00007432 if (!is_error(ret) && arg3) {
bellard579a97f2007-11-11 14:26:47 +00007433 if (!lock_user_struct(VERIFY_WRITE, old_act, arg3, 0))
7434 goto efault;
pbrook53a59602006-03-25 19:31:22 +00007435 old_act->_sa_handler = oact._sa_handler;
7436 old_act->sa_mask = oact.sa_mask.sig[0];
7437 old_act->sa_flags = oact.sa_flags;
pbrook53a59602006-03-25 19:31:22 +00007438 unlock_user_struct(old_act, arg3, 1);
bellard66fb9762003-03-23 01:06:05 +00007439 }
Richard Henderson6049f4f2009-12-27 18:30:03 -08007440#elif defined(TARGET_MIPS)
bellard106ec872006-06-27 21:08:10 +00007441 struct target_sigaction act, oact, *pact, *old_act;
7442
7443 if (arg2) {
bellard579a97f2007-11-11 14:26:47 +00007444 if (!lock_user_struct(VERIFY_READ, old_act, arg2, 1))
7445 goto efault;
bellard106ec872006-06-27 21:08:10 +00007446 act._sa_handler = old_act->_sa_handler;
7447 target_siginitset(&act.sa_mask, old_act->sa_mask.sig[0]);
7448 act.sa_flags = old_act->sa_flags;
7449 unlock_user_struct(old_act, arg2, 0);
7450 pact = &act;
7451 } else {
7452 pact = NULL;
7453 }
7454
7455 ret = get_errno(do_sigaction(arg1, pact, &oact));
7456
7457 if (!is_error(ret) && arg3) {
bellard579a97f2007-11-11 14:26:47 +00007458 if (!lock_user_struct(VERIFY_WRITE, old_act, arg3, 0))
7459 goto efault;
bellard106ec872006-06-27 21:08:10 +00007460 old_act->_sa_handler = oact._sa_handler;
7461 old_act->sa_flags = oact.sa_flags;
7462 old_act->sa_mask.sig[0] = oact.sa_mask.sig[0];
7463 old_act->sa_mask.sig[1] = 0;
7464 old_act->sa_mask.sig[2] = 0;
7465 old_act->sa_mask.sig[3] = 0;
7466 unlock_user_struct(old_act, arg3, 1);
7467 }
Richard Henderson6049f4f2009-12-27 18:30:03 -08007468#else
7469 struct target_old_sigaction *old_act;
7470 struct target_sigaction act, oact, *pact;
7471 if (arg2) {
7472 if (!lock_user_struct(VERIFY_READ, old_act, arg2, 1))
7473 goto efault;
7474 act._sa_handler = old_act->_sa_handler;
7475 target_siginitset(&act.sa_mask, old_act->sa_mask);
7476 act.sa_flags = old_act->sa_flags;
7477 act.sa_restorer = old_act->sa_restorer;
7478 unlock_user_struct(old_act, arg2, 0);
7479 pact = &act;
7480 } else {
7481 pact = NULL;
7482 }
7483 ret = get_errno(do_sigaction(arg1, pact, &oact));
7484 if (!is_error(ret) && arg3) {
7485 if (!lock_user_struct(VERIFY_WRITE, old_act, arg3, 0))
7486 goto efault;
7487 old_act->_sa_handler = oact._sa_handler;
7488 old_act->sa_mask = oact.sa_mask.sig[0];
7489 old_act->sa_flags = oact.sa_flags;
7490 old_act->sa_restorer = oact.sa_restorer;
7491 unlock_user_struct(old_act, arg3, 1);
7492 }
ths388bb212007-05-13 13:58:00 +00007493#endif
bellard31e31b82003-02-18 22:55:36 +00007494 }
7495 break;
thse5febef2007-04-01 18:31:35 +00007496#endif
bellard66fb9762003-03-23 01:06:05 +00007497 case TARGET_NR_rt_sigaction:
pbrook53a59602006-03-25 19:31:22 +00007498 {
Richard Henderson6049f4f2009-12-27 18:30:03 -08007499#if defined(TARGET_ALPHA)
7500 struct target_sigaction act, oact, *pact = 0;
7501 struct target_rt_sigaction *rt_act;
7502 /* ??? arg4 == sizeof(sigset_t). */
7503 if (arg2) {
7504 if (!lock_user_struct(VERIFY_READ, rt_act, arg2, 1))
7505 goto efault;
7506 act._sa_handler = rt_act->_sa_handler;
7507 act.sa_mask = rt_act->sa_mask;
7508 act.sa_flags = rt_act->sa_flags;
7509 act.sa_restorer = arg5;
7510 unlock_user_struct(rt_act, arg2, 0);
7511 pact = &act;
7512 }
7513 ret = get_errno(do_sigaction(arg1, pact, &oact));
7514 if (!is_error(ret) && arg3) {
7515 if (!lock_user_struct(VERIFY_WRITE, rt_act, arg3, 0))
7516 goto efault;
7517 rt_act->_sa_handler = oact._sa_handler;
7518 rt_act->sa_mask = oact.sa_mask;
7519 rt_act->sa_flags = oact.sa_flags;
7520 unlock_user_struct(rt_act, arg3, 1);
7521 }
7522#else
pbrook53a59602006-03-25 19:31:22 +00007523 struct target_sigaction *act;
7524 struct target_sigaction *oact;
7525
bellard579a97f2007-11-11 14:26:47 +00007526 if (arg2) {
7527 if (!lock_user_struct(VERIFY_READ, act, arg2, 1))
7528 goto efault;
7529 } else
pbrook53a59602006-03-25 19:31:22 +00007530 act = NULL;
bellard579a97f2007-11-11 14:26:47 +00007531 if (arg3) {
7532 if (!lock_user_struct(VERIFY_WRITE, oact, arg3, 0)) {
7533 ret = -TARGET_EFAULT;
7534 goto rt_sigaction_fail;
7535 }
7536 } else
pbrook53a59602006-03-25 19:31:22 +00007537 oact = NULL;
7538 ret = get_errno(do_sigaction(arg1, act, oact));
bellard579a97f2007-11-11 14:26:47 +00007539 rt_sigaction_fail:
7540 if (act)
pbrook53a59602006-03-25 19:31:22 +00007541 unlock_user_struct(act, arg2, 0);
bellard579a97f2007-11-11 14:26:47 +00007542 if (oact)
pbrook53a59602006-03-25 19:31:22 +00007543 unlock_user_struct(oact, arg3, 1);
Richard Henderson6049f4f2009-12-27 18:30:03 -08007544#endif
pbrook53a59602006-03-25 19:31:22 +00007545 }
bellard66fb9762003-03-23 01:06:05 +00007546 break;
j_mayer7a3148a2007-04-05 07:13:51 +00007547#ifdef TARGET_NR_sgetmask /* not on alpha */
bellard31e31b82003-02-18 22:55:36 +00007548 case TARGET_NR_sgetmask:
bellard66fb9762003-03-23 01:06:05 +00007549 {
7550 sigset_t cur_set;
blueswir1992f48a2007-10-14 16:27:31 +00007551 abi_ulong target_set;
Peter Maydell3d3efba2016-05-27 15:51:49 +01007552 ret = do_sigprocmask(0, NULL, &cur_set);
7553 if (!ret) {
7554 host_to_target_old_sigset(&target_set, &cur_set);
7555 ret = target_set;
7556 }
bellard66fb9762003-03-23 01:06:05 +00007557 }
7558 break;
j_mayer7a3148a2007-04-05 07:13:51 +00007559#endif
7560#ifdef TARGET_NR_ssetmask /* not on alpha */
bellard31e31b82003-02-18 22:55:36 +00007561 case TARGET_NR_ssetmask:
bellard66fb9762003-03-23 01:06:05 +00007562 {
7563 sigset_t set, oset, cur_set;
blueswir1992f48a2007-10-14 16:27:31 +00007564 abi_ulong target_set = arg1;
Peter Maydell3d3efba2016-05-27 15:51:49 +01007565 /* We only have one word of the new mask so we must read
7566 * the rest of it with do_sigprocmask() and OR in this word.
7567 * We are guaranteed that a do_sigprocmask() that only queries
7568 * the signal mask will not fail.
7569 */
7570 ret = do_sigprocmask(0, NULL, &cur_set);
7571 assert(!ret);
bellard66fb9762003-03-23 01:06:05 +00007572 target_to_host_old_sigset(&set, &target_set);
7573 sigorset(&set, &set, &cur_set);
Peter Maydell3d3efba2016-05-27 15:51:49 +01007574 ret = do_sigprocmask(SIG_SETMASK, &set, &oset);
7575 if (!ret) {
7576 host_to_target_old_sigset(&target_set, &oset);
7577 ret = target_set;
7578 }
bellard66fb9762003-03-23 01:06:05 +00007579 }
7580 break;
j_mayer7a3148a2007-04-05 07:13:51 +00007581#endif
thse5febef2007-04-01 18:31:35 +00007582#ifdef TARGET_NR_sigprocmask
bellard66fb9762003-03-23 01:06:05 +00007583 case TARGET_NR_sigprocmask:
7584 {
Richard Hendersona5b3b132010-05-03 10:07:55 -07007585#if defined(TARGET_ALPHA)
7586 sigset_t set, oldset;
7587 abi_ulong mask;
7588 int how;
7589
7590 switch (arg1) {
7591 case TARGET_SIG_BLOCK:
7592 how = SIG_BLOCK;
7593 break;
7594 case TARGET_SIG_UNBLOCK:
7595 how = SIG_UNBLOCK;
7596 break;
7597 case TARGET_SIG_SETMASK:
7598 how = SIG_SETMASK;
7599 break;
7600 default:
7601 ret = -TARGET_EINVAL;
7602 goto fail;
7603 }
7604 mask = arg2;
7605 target_to_host_old_sigset(&set, &mask);
7606
Peter Maydell3d3efba2016-05-27 15:51:49 +01007607 ret = do_sigprocmask(how, &set, &oldset);
Richard Hendersona5b3b132010-05-03 10:07:55 -07007608 if (!is_error(ret)) {
7609 host_to_target_old_sigset(&mask, &oldset);
7610 ret = mask;
Richard Henderson0229f5a2012-06-07 15:02:49 -07007611 ((CPUAlphaState *)cpu_env)->ir[IR_V0] = 0; /* force no error */
Richard Hendersona5b3b132010-05-03 10:07:55 -07007612 }
7613#else
bellard66fb9762003-03-23 01:06:05 +00007614 sigset_t set, oldset, *set_ptr;
Richard Hendersona5b3b132010-05-03 10:07:55 -07007615 int how;
ths3b46e622007-09-17 08:09:54 +00007616
pbrook53a59602006-03-25 19:31:22 +00007617 if (arg2) {
Richard Hendersona5b3b132010-05-03 10:07:55 -07007618 switch (arg1) {
bellard66fb9762003-03-23 01:06:05 +00007619 case TARGET_SIG_BLOCK:
7620 how = SIG_BLOCK;
7621 break;
7622 case TARGET_SIG_UNBLOCK:
7623 how = SIG_UNBLOCK;
7624 break;
7625 case TARGET_SIG_SETMASK:
7626 how = SIG_SETMASK;
7627 break;
7628 default:
ths0da46a62007-10-20 20:23:07 +00007629 ret = -TARGET_EINVAL;
bellard66fb9762003-03-23 01:06:05 +00007630 goto fail;
7631 }
Anthony Liguoric227f092009-10-01 16:12:16 -05007632 if (!(p = lock_user(VERIFY_READ, arg2, sizeof(target_sigset_t), 1)))
bellard579a97f2007-11-11 14:26:47 +00007633 goto efault;
pbrook53a59602006-03-25 19:31:22 +00007634 target_to_host_old_sigset(&set, p);
7635 unlock_user(p, arg2, 0);
bellard66fb9762003-03-23 01:06:05 +00007636 set_ptr = &set;
7637 } else {
7638 how = 0;
7639 set_ptr = NULL;
7640 }
Peter Maydell3d3efba2016-05-27 15:51:49 +01007641 ret = do_sigprocmask(how, set_ptr, &oldset);
pbrook53a59602006-03-25 19:31:22 +00007642 if (!is_error(ret) && arg3) {
Anthony Liguoric227f092009-10-01 16:12:16 -05007643 if (!(p = lock_user(VERIFY_WRITE, arg3, sizeof(target_sigset_t), 0)))
bellard579a97f2007-11-11 14:26:47 +00007644 goto efault;
pbrook53a59602006-03-25 19:31:22 +00007645 host_to_target_old_sigset(p, &oldset);
Anthony Liguoric227f092009-10-01 16:12:16 -05007646 unlock_user(p, arg3, sizeof(target_sigset_t));
bellard66fb9762003-03-23 01:06:05 +00007647 }
Richard Hendersona5b3b132010-05-03 10:07:55 -07007648#endif
bellard66fb9762003-03-23 01:06:05 +00007649 }
7650 break;
thse5febef2007-04-01 18:31:35 +00007651#endif
bellard66fb9762003-03-23 01:06:05 +00007652 case TARGET_NR_rt_sigprocmask:
7653 {
7654 int how = arg1;
7655 sigset_t set, oldset, *set_ptr;
ths3b46e622007-09-17 08:09:54 +00007656
pbrook53a59602006-03-25 19:31:22 +00007657 if (arg2) {
bellard66fb9762003-03-23 01:06:05 +00007658 switch(how) {
7659 case TARGET_SIG_BLOCK:
7660 how = SIG_BLOCK;
7661 break;
7662 case TARGET_SIG_UNBLOCK:
7663 how = SIG_UNBLOCK;
7664 break;
7665 case TARGET_SIG_SETMASK:
7666 how = SIG_SETMASK;
7667 break;
7668 default:
ths0da46a62007-10-20 20:23:07 +00007669 ret = -TARGET_EINVAL;
bellard66fb9762003-03-23 01:06:05 +00007670 goto fail;
7671 }
Anthony Liguoric227f092009-10-01 16:12:16 -05007672 if (!(p = lock_user(VERIFY_READ, arg2, sizeof(target_sigset_t), 1)))
bellard579a97f2007-11-11 14:26:47 +00007673 goto efault;
pbrook53a59602006-03-25 19:31:22 +00007674 target_to_host_sigset(&set, p);
7675 unlock_user(p, arg2, 0);
bellard66fb9762003-03-23 01:06:05 +00007676 set_ptr = &set;
7677 } else {
7678 how = 0;
7679 set_ptr = NULL;
7680 }
Peter Maydell3d3efba2016-05-27 15:51:49 +01007681 ret = do_sigprocmask(how, set_ptr, &oldset);
pbrook53a59602006-03-25 19:31:22 +00007682 if (!is_error(ret) && arg3) {
Anthony Liguoric227f092009-10-01 16:12:16 -05007683 if (!(p = lock_user(VERIFY_WRITE, arg3, sizeof(target_sigset_t), 0)))
bellard579a97f2007-11-11 14:26:47 +00007684 goto efault;
pbrook53a59602006-03-25 19:31:22 +00007685 host_to_target_sigset(p, &oldset);
Anthony Liguoric227f092009-10-01 16:12:16 -05007686 unlock_user(p, arg3, sizeof(target_sigset_t));
bellard66fb9762003-03-23 01:06:05 +00007687 }
7688 }
7689 break;
thse5febef2007-04-01 18:31:35 +00007690#ifdef TARGET_NR_sigpending
bellard66fb9762003-03-23 01:06:05 +00007691 case TARGET_NR_sigpending:
7692 {
7693 sigset_t set;
7694 ret = get_errno(sigpending(&set));
7695 if (!is_error(ret)) {
Anthony Liguoric227f092009-10-01 16:12:16 -05007696 if (!(p = lock_user(VERIFY_WRITE, arg1, sizeof(target_sigset_t), 0)))
bellard579a97f2007-11-11 14:26:47 +00007697 goto efault;
pbrook53a59602006-03-25 19:31:22 +00007698 host_to_target_old_sigset(p, &set);
Anthony Liguoric227f092009-10-01 16:12:16 -05007699 unlock_user(p, arg1, sizeof(target_sigset_t));
bellard66fb9762003-03-23 01:06:05 +00007700 }
7701 }
7702 break;
thse5febef2007-04-01 18:31:35 +00007703#endif
bellard66fb9762003-03-23 01:06:05 +00007704 case TARGET_NR_rt_sigpending:
7705 {
7706 sigset_t set;
7707 ret = get_errno(sigpending(&set));
7708 if (!is_error(ret)) {
Anthony Liguoric227f092009-10-01 16:12:16 -05007709 if (!(p = lock_user(VERIFY_WRITE, arg1, sizeof(target_sigset_t), 0)))
bellard579a97f2007-11-11 14:26:47 +00007710 goto efault;
pbrook53a59602006-03-25 19:31:22 +00007711 host_to_target_sigset(p, &set);
Anthony Liguoric227f092009-10-01 16:12:16 -05007712 unlock_user(p, arg1, sizeof(target_sigset_t));
bellard66fb9762003-03-23 01:06:05 +00007713 }
7714 }
7715 break;
thse5febef2007-04-01 18:31:35 +00007716#ifdef TARGET_NR_sigsuspend
bellard66fb9762003-03-23 01:06:05 +00007717 case TARGET_NR_sigsuspend:
7718 {
Peter Maydell3d3efba2016-05-27 15:51:49 +01007719 TaskState *ts = cpu->opaque;
Richard Hendersonf43ce122010-05-03 10:07:54 -07007720#if defined(TARGET_ALPHA)
7721 abi_ulong mask = arg1;
Peter Maydell3d3efba2016-05-27 15:51:49 +01007722 target_to_host_old_sigset(&ts->sigsuspend_mask, &mask);
Richard Hendersonf43ce122010-05-03 10:07:54 -07007723#else
Anthony Liguoric227f092009-10-01 16:12:16 -05007724 if (!(p = lock_user(VERIFY_READ, arg1, sizeof(target_sigset_t), 1)))
bellard579a97f2007-11-11 14:26:47 +00007725 goto efault;
Peter Maydell3d3efba2016-05-27 15:51:49 +01007726 target_to_host_old_sigset(&ts->sigsuspend_mask, p);
pbrook53a59602006-03-25 19:31:22 +00007727 unlock_user(p, arg1, 0);
Richard Hendersonf43ce122010-05-03 10:07:54 -07007728#endif
Peter Maydell3d3efba2016-05-27 15:51:49 +01007729 ret = get_errno(safe_rt_sigsuspend(&ts->sigsuspend_mask,
7730 SIGSET_T_SIZE));
7731 if (ret != -TARGET_ERESTARTSYS) {
7732 ts->in_sigsuspend = 1;
7733 }
bellard66fb9762003-03-23 01:06:05 +00007734 }
7735 break;
thse5febef2007-04-01 18:31:35 +00007736#endif
bellard66fb9762003-03-23 01:06:05 +00007737 case TARGET_NR_rt_sigsuspend:
7738 {
Peter Maydell3d3efba2016-05-27 15:51:49 +01007739 TaskState *ts = cpu->opaque;
Anthony Liguoric227f092009-10-01 16:12:16 -05007740 if (!(p = lock_user(VERIFY_READ, arg1, sizeof(target_sigset_t), 1)))
bellard579a97f2007-11-11 14:26:47 +00007741 goto efault;
Peter Maydell3d3efba2016-05-27 15:51:49 +01007742 target_to_host_sigset(&ts->sigsuspend_mask, p);
pbrook53a59602006-03-25 19:31:22 +00007743 unlock_user(p, arg1, 0);
Peter Maydell3d3efba2016-05-27 15:51:49 +01007744 ret = get_errno(safe_rt_sigsuspend(&ts->sigsuspend_mask,
7745 SIGSET_T_SIZE));
7746 if (ret != -TARGET_ERESTARTSYS) {
7747 ts->in_sigsuspend = 1;
7748 }
bellard66fb9762003-03-23 01:06:05 +00007749 }
7750 break;
7751 case TARGET_NR_rt_sigtimedwait:
7752 {
bellard66fb9762003-03-23 01:06:05 +00007753 sigset_t set;
7754 struct timespec uts, *puts;
7755 siginfo_t uinfo;
ths3b46e622007-09-17 08:09:54 +00007756
Anthony Liguoric227f092009-10-01 16:12:16 -05007757 if (!(p = lock_user(VERIFY_READ, arg1, sizeof(target_sigset_t), 1)))
bellard579a97f2007-11-11 14:26:47 +00007758 goto efault;
pbrook53a59602006-03-25 19:31:22 +00007759 target_to_host_sigset(&set, p);
7760 unlock_user(p, arg1, 0);
7761 if (arg3) {
bellard66fb9762003-03-23 01:06:05 +00007762 puts = &uts;
pbrook53a59602006-03-25 19:31:22 +00007763 target_to_host_timespec(puts, arg3);
bellard66fb9762003-03-23 01:06:05 +00007764 } else {
7765 puts = NULL;
7766 }
Peter Maydellb3f82332016-06-06 19:58:08 +01007767 ret = get_errno(safe_rt_sigtimedwait(&set, &uinfo, puts,
7768 SIGSET_T_SIZE));
Petar Jovanovic974a1962014-03-03 15:07:41 +01007769 if (!is_error(ret)) {
7770 if (arg2) {
7771 p = lock_user(VERIFY_WRITE, arg2, sizeof(target_siginfo_t),
7772 0);
7773 if (!p) {
7774 goto efault;
7775 }
7776 host_to_target_siginfo(p, &uinfo);
7777 unlock_user(p, arg2, sizeof(target_siginfo_t));
7778 }
7779 ret = host_to_target_signal(ret);
bellard66fb9762003-03-23 01:06:05 +00007780 }
7781 }
7782 break;
7783 case TARGET_NR_rt_sigqueueinfo:
7784 {
7785 siginfo_t uinfo;
Anthony Liguoric227f092009-10-01 16:12:16 -05007786 if (!(p = lock_user(VERIFY_READ, arg3, sizeof(target_sigset_t), 1)))
bellard579a97f2007-11-11 14:26:47 +00007787 goto efault;
pbrook53a59602006-03-25 19:31:22 +00007788 target_to_host_siginfo(&uinfo, p);
7789 unlock_user(p, arg1, 0);
bellard66fb9762003-03-23 01:06:05 +00007790 ret = get_errno(sys_rt_sigqueueinfo(arg1, arg2, &uinfo));
7791 }
7792 break;
thse5febef2007-04-01 18:31:35 +00007793#ifdef TARGET_NR_sigreturn
bellard66fb9762003-03-23 01:06:05 +00007794 case TARGET_NR_sigreturn:
Peter Maydell3d3efba2016-05-27 15:51:49 +01007795 if (block_signals()) {
7796 ret = -TARGET_ERESTARTSYS;
7797 } else {
7798 ret = do_sigreturn(cpu_env);
7799 }
bellard66fb9762003-03-23 01:06:05 +00007800 break;
thse5febef2007-04-01 18:31:35 +00007801#endif
bellard66fb9762003-03-23 01:06:05 +00007802 case TARGET_NR_rt_sigreturn:
Peter Maydell3d3efba2016-05-27 15:51:49 +01007803 if (block_signals()) {
7804 ret = -TARGET_ERESTARTSYS;
7805 } else {
7806 ret = do_rt_sigreturn(cpu_env);
7807 }
bellard66fb9762003-03-23 01:06:05 +00007808 break;
bellard31e31b82003-02-18 22:55:36 +00007809 case TARGET_NR_sethostname:
bellard579a97f2007-11-11 14:26:47 +00007810 if (!(p = lock_user_string(arg1)))
7811 goto efault;
pbrook53a59602006-03-25 19:31:22 +00007812 ret = get_errno(sethostname(p, arg2));
7813 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00007814 break;
7815 case TARGET_NR_setrlimit:
bellard9de5e442003-03-23 16:49:39 +00007816 {
Wesley W. Terpstrae22b7012011-07-12 14:42:00 +03007817 int resource = target_to_host_resource(arg1);
pbrook53a59602006-03-25 19:31:22 +00007818 struct target_rlimit *target_rlim;
bellard9de5e442003-03-23 16:49:39 +00007819 struct rlimit rlim;
bellard579a97f2007-11-11 14:26:47 +00007820 if (!lock_user_struct(VERIFY_READ, target_rlim, arg2, 1))
7821 goto efault;
takasi-y@ops.dti.ne.jp81bbe902010-04-12 04:07:35 +09007822 rlim.rlim_cur = target_to_host_rlim(target_rlim->rlim_cur);
7823 rlim.rlim_max = target_to_host_rlim(target_rlim->rlim_max);
pbrook53a59602006-03-25 19:31:22 +00007824 unlock_user_struct(target_rlim, arg2, 0);
bellard9de5e442003-03-23 16:49:39 +00007825 ret = get_errno(setrlimit(resource, &rlim));
7826 }
7827 break;
bellard31e31b82003-02-18 22:55:36 +00007828 case TARGET_NR_getrlimit:
bellard9de5e442003-03-23 16:49:39 +00007829 {
Wesley W. Terpstrae22b7012011-07-12 14:42:00 +03007830 int resource = target_to_host_resource(arg1);
pbrook53a59602006-03-25 19:31:22 +00007831 struct target_rlimit *target_rlim;
bellard9de5e442003-03-23 16:49:39 +00007832 struct rlimit rlim;
ths3b46e622007-09-17 08:09:54 +00007833
bellard9de5e442003-03-23 16:49:39 +00007834 ret = get_errno(getrlimit(resource, &rlim));
7835 if (!is_error(ret)) {
bellard579a97f2007-11-11 14:26:47 +00007836 if (!lock_user_struct(VERIFY_WRITE, target_rlim, arg2, 0))
7837 goto efault;
takasi-y@ops.dti.ne.jp81bbe902010-04-12 04:07:35 +09007838 target_rlim->rlim_cur = host_to_target_rlim(rlim.rlim_cur);
7839 target_rlim->rlim_max = host_to_target_rlim(rlim.rlim_max);
pbrook53a59602006-03-25 19:31:22 +00007840 unlock_user_struct(target_rlim, arg2, 1);
bellard9de5e442003-03-23 16:49:39 +00007841 }
7842 }
7843 break;
bellard31e31b82003-02-18 22:55:36 +00007844 case TARGET_NR_getrusage:
bellardb4091862003-05-16 15:39:34 +00007845 {
7846 struct rusage rusage;
bellardb4091862003-05-16 15:39:34 +00007847 ret = get_errno(getrusage(arg1, &rusage));
7848 if (!is_error(ret)) {
Petar Jovanovica39fb272014-04-08 19:24:30 +02007849 ret = host_to_target_rusage(arg2, &rusage);
bellardb4091862003-05-16 15:39:34 +00007850 }
7851 }
7852 break;
bellard31e31b82003-02-18 22:55:36 +00007853 case TARGET_NR_gettimeofday:
7854 {
bellard31e31b82003-02-18 22:55:36 +00007855 struct timeval tv;
7856 ret = get_errno(gettimeofday(&tv, NULL));
7857 if (!is_error(ret)) {
ths788f5ec2007-12-09 02:37:05 +00007858 if (copy_to_user_timeval(arg1, &tv))
7859 goto efault;
bellard31e31b82003-02-18 22:55:36 +00007860 }
7861 }
7862 break;
7863 case TARGET_NR_settimeofday:
7864 {
Paul Burtonb67d8032014-06-22 11:25:41 +01007865 struct timeval tv, *ptv = NULL;
Paul Burtonef4467e2014-06-22 11:25:40 +01007866 struct timezone tz, *ptz = NULL;
7867
Paul Burtonb67d8032014-06-22 11:25:41 +01007868 if (arg1) {
7869 if (copy_from_user_timeval(&tv, arg1)) {
7870 goto efault;
7871 }
7872 ptv = &tv;
7873 }
Paul Burtonef4467e2014-06-22 11:25:40 +01007874
7875 if (arg2) {
7876 if (copy_from_user_timezone(&tz, arg2)) {
7877 goto efault;
7878 }
7879 ptz = &tz;
7880 }
7881
Paul Burtonb67d8032014-06-22 11:25:41 +01007882 ret = get_errno(settimeofday(ptv, ptz));
bellard31e31b82003-02-18 22:55:36 +00007883 }
7884 break;
Laurent Vivier9468a5d2013-01-10 22:30:50 +01007885#if defined(TARGET_NR_select)
bellard31e31b82003-02-18 22:55:36 +00007886 case TARGET_NR_select:
Laurent Vivier9468a5d2013-01-10 22:30:50 +01007887#if defined(TARGET_S390X) || defined(TARGET_ALPHA)
7888 ret = do_select(arg1, arg2, arg3, arg4, arg5);
7889#else
bellardf2674e32003-07-09 12:26:09 +00007890 {
pbrook53a59602006-03-25 19:31:22 +00007891 struct target_sel_arg_struct *sel;
blueswir1992f48a2007-10-14 16:27:31 +00007892 abi_ulong inp, outp, exp, tvp;
pbrook53a59602006-03-25 19:31:22 +00007893 long nsel;
7894
bellard579a97f2007-11-11 14:26:47 +00007895 if (!lock_user_struct(VERIFY_READ, sel, arg1, 1))
7896 goto efault;
Matthias Brauncbb21ee2011-08-12 19:57:41 +02007897 nsel = tswapal(sel->n);
7898 inp = tswapal(sel->inp);
7899 outp = tswapal(sel->outp);
7900 exp = tswapal(sel->exp);
7901 tvp = tswapal(sel->tvp);
pbrook53a59602006-03-25 19:31:22 +00007902 unlock_user_struct(sel, arg1, 0);
7903 ret = do_select(nsel, inp, outp, exp, tvp);
bellardf2674e32003-07-09 12:26:09 +00007904 }
Laurent Vivier9468a5d2013-01-10 22:30:50 +01007905#endif
bellardf2674e32003-07-09 12:26:09 +00007906 break;
bellard048f6b42005-11-26 18:47:20 +00007907#endif
Riku Voipio9e423822010-05-07 12:28:05 +00007908#ifdef TARGET_NR_pselect6
7909 case TARGET_NR_pselect6:
Mike Frysinger055e0902011-06-03 17:01:49 -04007910 {
7911 abi_long rfd_addr, wfd_addr, efd_addr, n, ts_addr;
7912 fd_set rfds, wfds, efds;
7913 fd_set *rfds_ptr, *wfds_ptr, *efds_ptr;
7914 struct timespec ts, *ts_ptr;
7915
7916 /*
7917 * The 6th arg is actually two args smashed together,
7918 * so we cannot use the C library.
7919 */
7920 sigset_t set;
7921 struct {
7922 sigset_t *set;
7923 size_t size;
7924 } sig, *sig_ptr;
7925
7926 abi_ulong arg_sigset, arg_sigsize, *arg7;
7927 target_sigset_t *target_sigset;
7928
7929 n = arg1;
7930 rfd_addr = arg2;
7931 wfd_addr = arg3;
7932 efd_addr = arg4;
7933 ts_addr = arg5;
7934
7935 ret = copy_from_user_fdset_ptr(&rfds, &rfds_ptr, rfd_addr, n);
7936 if (ret) {
7937 goto fail;
7938 }
7939 ret = copy_from_user_fdset_ptr(&wfds, &wfds_ptr, wfd_addr, n);
7940 if (ret) {
7941 goto fail;
7942 }
7943 ret = copy_from_user_fdset_ptr(&efds, &efds_ptr, efd_addr, n);
7944 if (ret) {
7945 goto fail;
7946 }
7947
7948 /*
7949 * This takes a timespec, and not a timeval, so we cannot
7950 * use the do_select() helper ...
7951 */
7952 if (ts_addr) {
7953 if (target_to_host_timespec(&ts, ts_addr)) {
7954 goto efault;
7955 }
7956 ts_ptr = &ts;
7957 } else {
7958 ts_ptr = NULL;
7959 }
7960
7961 /* Extract the two packed args for the sigset */
7962 if (arg6) {
7963 sig_ptr = &sig;
Peter Maydellb28a1f32016-05-27 15:51:47 +01007964 sig.size = SIGSET_T_SIZE;
Mike Frysinger055e0902011-06-03 17:01:49 -04007965
7966 arg7 = lock_user(VERIFY_READ, arg6, sizeof(*arg7) * 2, 1);
7967 if (!arg7) {
7968 goto efault;
7969 }
Matthias Brauncbb21ee2011-08-12 19:57:41 +02007970 arg_sigset = tswapal(arg7[0]);
7971 arg_sigsize = tswapal(arg7[1]);
Mike Frysinger055e0902011-06-03 17:01:49 -04007972 unlock_user(arg7, arg6, 0);
7973
7974 if (arg_sigset) {
7975 sig.set = &set;
Peter Maydell8f04eeb2011-06-28 12:21:57 +01007976 if (arg_sigsize != sizeof(*target_sigset)) {
7977 /* Like the kernel, we enforce correct size sigsets */
7978 ret = -TARGET_EINVAL;
7979 goto fail;
7980 }
Mike Frysinger055e0902011-06-03 17:01:49 -04007981 target_sigset = lock_user(VERIFY_READ, arg_sigset,
7982 sizeof(*target_sigset), 1);
7983 if (!target_sigset) {
7984 goto efault;
7985 }
7986 target_to_host_sigset(&set, target_sigset);
7987 unlock_user(target_sigset, arg_sigset, 0);
7988 } else {
7989 sig.set = NULL;
7990 }
7991 } else {
7992 sig_ptr = NULL;
7993 }
7994
Peter Maydell6df9d382016-05-12 18:47:51 +01007995 ret = get_errno(safe_pselect6(n, rfds_ptr, wfds_ptr, efds_ptr,
7996 ts_ptr, sig_ptr));
Mike Frysinger055e0902011-06-03 17:01:49 -04007997
7998 if (!is_error(ret)) {
7999 if (rfd_addr && copy_to_user_fdset(rfd_addr, &rfds, n))
8000 goto efault;
8001 if (wfd_addr && copy_to_user_fdset(wfd_addr, &wfds, n))
8002 goto efault;
8003 if (efd_addr && copy_to_user_fdset(efd_addr, &efds, n))
8004 goto efault;
8005
8006 if (ts_addr && host_to_target_timespec(ts_addr, &ts))
8007 goto efault;
8008 }
8009 }
8010 break;
Riku Voipio9e423822010-05-07 12:28:05 +00008011#endif
Chen Gang704eff62015-08-21 05:37:33 +08008012#ifdef TARGET_NR_symlink
bellard31e31b82003-02-18 22:55:36 +00008013 case TARGET_NR_symlink:
pbrook53a59602006-03-25 19:31:22 +00008014 {
8015 void *p2;
8016 p = lock_user_string(arg1);
8017 p2 = lock_user_string(arg2);
bellard579a97f2007-11-11 14:26:47 +00008018 if (!p || !p2)
8019 ret = -TARGET_EFAULT;
8020 else
8021 ret = get_errno(symlink(p, p2));
pbrook53a59602006-03-25 19:31:22 +00008022 unlock_user(p2, arg2, 0);
8023 unlock_user(p, arg1, 0);
8024 }
bellard31e31b82003-02-18 22:55:36 +00008025 break;
Chen Gang704eff62015-08-21 05:37:33 +08008026#endif
Peter Maydellc0d472b2013-06-12 16:20:21 +01008027#if defined(TARGET_NR_symlinkat)
thsf0b62432007-09-24 09:25:40 +00008028 case TARGET_NR_symlinkat:
thsf0b62432007-09-24 09:25:40 +00008029 {
bellard579a97f2007-11-11 14:26:47 +00008030 void *p2;
thsf0b62432007-09-24 09:25:40 +00008031 p = lock_user_string(arg1);
8032 p2 = lock_user_string(arg3);
bellard579a97f2007-11-11 14:26:47 +00008033 if (!p || !p2)
ths0da46a62007-10-20 20:23:07 +00008034 ret = -TARGET_EFAULT;
thsf0b62432007-09-24 09:25:40 +00008035 else
Peter Maydellc0d472b2013-06-12 16:20:21 +01008036 ret = get_errno(symlinkat(p, arg2, p2));
bellard579a97f2007-11-11 14:26:47 +00008037 unlock_user(p2, arg3, 0);
8038 unlock_user(p, arg1, 0);
thsf0b62432007-09-24 09:25:40 +00008039 }
8040 break;
8041#endif
bellardebc05482003-09-30 21:08:41 +00008042#ifdef TARGET_NR_oldlstat
bellard31e31b82003-02-18 22:55:36 +00008043 case TARGET_NR_oldlstat:
8044 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00008045#endif
Chen Gang704eff62015-08-21 05:37:33 +08008046#ifdef TARGET_NR_readlink
bellard31e31b82003-02-18 22:55:36 +00008047 case TARGET_NR_readlink:
pbrook53a59602006-03-25 19:31:22 +00008048 {
Andreas Schwab463d8e72013-07-02 14:04:12 +01008049 void *p2;
pbrook53a59602006-03-25 19:31:22 +00008050 p = lock_user_string(arg1);
bellard579a97f2007-11-11 14:26:47 +00008051 p2 = lock_user(VERIFY_WRITE, arg2, arg3, 0);
Andreas Schwab463d8e72013-07-02 14:04:12 +01008052 if (!p || !p2) {
bellard579a97f2007-11-11 14:26:47 +00008053 ret = -TARGET_EFAULT;
Mike Frysingerf17f4982014-08-08 09:40:25 +09008054 } else if (!arg3) {
8055 /* Short circuit this for the magic exe check. */
8056 ret = -TARGET_EINVAL;
Andreas Schwab463d8e72013-07-02 14:04:12 +01008057 } else if (is_proc_myself((const char *)p, "exe")) {
8058 char real[PATH_MAX], *temp;
8059 temp = realpath(exec_path, real);
Mike Frysingerf17f4982014-08-08 09:40:25 +09008060 /* Return value is # of bytes that we wrote to the buffer. */
8061 if (temp == NULL) {
8062 ret = get_errno(-1);
8063 } else {
8064 /* Don't worry about sign mismatch as earlier mapping
8065 * logic would have thrown a bad address error. */
8066 ret = MIN(strlen(real), arg3);
8067 /* We cannot NUL terminate the string. */
8068 memcpy(p2, real, ret);
8069 }
Andreas Schwab463d8e72013-07-02 14:04:12 +01008070 } else {
8071 ret = get_errno(readlink(path(p), p2, arg3));
aurel32d088d662009-01-30 20:09:01 +00008072 }
pbrook53a59602006-03-25 19:31:22 +00008073 unlock_user(p2, arg2, ret);
8074 unlock_user(p, arg1, 0);
8075 }
bellard31e31b82003-02-18 22:55:36 +00008076 break;
Chen Gang704eff62015-08-21 05:37:33 +08008077#endif
Peter Maydellc0d472b2013-06-12 16:20:21 +01008078#if defined(TARGET_NR_readlinkat)
ths5e0ccb12007-09-24 09:26:10 +00008079 case TARGET_NR_readlinkat:
ths5e0ccb12007-09-24 09:26:10 +00008080 {
bellard579a97f2007-11-11 14:26:47 +00008081 void *p2;
ths5e0ccb12007-09-24 09:26:10 +00008082 p = lock_user_string(arg2);
bellard579a97f2007-11-11 14:26:47 +00008083 p2 = lock_user(VERIFY_WRITE, arg3, arg4, 0);
Andreas Schwab463d8e72013-07-02 14:04:12 +01008084 if (!p || !p2) {
8085 ret = -TARGET_EFAULT;
8086 } else if (is_proc_myself((const char *)p, "exe")) {
8087 char real[PATH_MAX], *temp;
8088 temp = realpath(exec_path, real);
8089 ret = temp == NULL ? get_errno(-1) : strlen(real) ;
8090 snprintf((char *)p2, arg4, "%s", real);
8091 } else {
Peter Maydellc0d472b2013-06-12 16:20:21 +01008092 ret = get_errno(readlinkat(arg1, path(p), p2, arg4));
Andreas Schwab463d8e72013-07-02 14:04:12 +01008093 }
bellard579a97f2007-11-11 14:26:47 +00008094 unlock_user(p2, arg3, ret);
8095 unlock_user(p, arg2, 0);
ths5e0ccb12007-09-24 09:26:10 +00008096 }
8097 break;
8098#endif
thse5febef2007-04-01 18:31:35 +00008099#ifdef TARGET_NR_uselib
bellard31e31b82003-02-18 22:55:36 +00008100 case TARGET_NR_uselib:
8101 goto unimplemented;
thse5febef2007-04-01 18:31:35 +00008102#endif
8103#ifdef TARGET_NR_swapon
bellard31e31b82003-02-18 22:55:36 +00008104 case TARGET_NR_swapon:
bellard579a97f2007-11-11 14:26:47 +00008105 if (!(p = lock_user_string(arg1)))
8106 goto efault;
pbrook53a59602006-03-25 19:31:22 +00008107 ret = get_errno(swapon(p, arg2));
8108 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00008109 break;
thse5febef2007-04-01 18:31:35 +00008110#endif
bellard31e31b82003-02-18 22:55:36 +00008111 case TARGET_NR_reboot:
Laurent Vivierc07ecc62013-01-07 11:40:06 +00008112 if (arg3 == LINUX_REBOOT_CMD_RESTART2) {
8113 /* arg4 must be ignored in all other cases */
8114 p = lock_user_string(arg4);
8115 if (!p) {
8116 goto efault;
8117 }
8118 ret = get_errno(reboot(arg1, arg2, arg3, p));
8119 unlock_user(p, arg4, 0);
8120 } else {
8121 ret = get_errno(reboot(arg1, arg2, arg3, NULL));
8122 }
Alexander Graf0f6b4d22011-09-27 14:39:42 +02008123 break;
thse5febef2007-04-01 18:31:35 +00008124#ifdef TARGET_NR_readdir
bellard31e31b82003-02-18 22:55:36 +00008125 case TARGET_NR_readdir:
8126 goto unimplemented;
thse5febef2007-04-01 18:31:35 +00008127#endif
8128#ifdef TARGET_NR_mmap
bellard31e31b82003-02-18 22:55:36 +00008129 case TARGET_NR_mmap:
Alexander Graf09701192013-09-03 20:12:15 +01008130#if (defined(TARGET_I386) && defined(TARGET_ABI32)) || \
8131 (defined(TARGET_ARM) && defined(TARGET_ABI32)) || \
Ulrich Hechta4c075f2009-07-24 16:57:31 +02008132 defined(TARGET_M68K) || defined(TARGET_CRIS) || defined(TARGET_MICROBLAZE) \
8133 || defined(TARGET_S390X)
bellard31e31b82003-02-18 22:55:36 +00008134 {
blueswir1992f48a2007-10-14 16:27:31 +00008135 abi_ulong *v;
8136 abi_ulong v1, v2, v3, v4, v5, v6;
bellard579a97f2007-11-11 14:26:47 +00008137 if (!(v = lock_user(VERIFY_READ, arg1, 6 * sizeof(abi_ulong), 1)))
8138 goto efault;
Matthias Brauncbb21ee2011-08-12 19:57:41 +02008139 v1 = tswapal(v[0]);
8140 v2 = tswapal(v[1]);
8141 v3 = tswapal(v[2]);
8142 v4 = tswapal(v[3]);
8143 v5 = tswapal(v[4]);
8144 v6 = tswapal(v[5]);
pbrook53a59602006-03-25 19:31:22 +00008145 unlock_user(v, arg1, 0);
ths5fafdf22007-09-16 21:08:06 +00008146 ret = get_errno(target_mmap(v1, v2, v3,
bellard5286db72003-06-05 00:57:30 +00008147 target_to_host_bitmask(v4, mmap_flags_tbl),
8148 v5, v6));
bellard31e31b82003-02-18 22:55:36 +00008149 }
bellard31e31b82003-02-18 22:55:36 +00008150#else
ths5fafdf22007-09-16 21:08:06 +00008151 ret = get_errno(target_mmap(arg1, arg2, arg3,
8152 target_to_host_bitmask(arg4, mmap_flags_tbl),
bellard6fb883e2003-07-09 17:12:39 +00008153 arg5,
8154 arg6));
bellard31e31b82003-02-18 22:55:36 +00008155#endif
bellard6fb883e2003-07-09 17:12:39 +00008156 break;
thse5febef2007-04-01 18:31:35 +00008157#endif
bellarda315a142005-01-30 22:59:18 +00008158#ifdef TARGET_NR_mmap2
bellard6fb883e2003-07-09 17:12:39 +00008159 case TARGET_NR_mmap2:
pbrookbb7ec042008-03-25 22:28:25 +00008160#ifndef MMAP_SHIFT
bellardc573ff62004-01-04 15:51:36 +00008161#define MMAP_SHIFT 12
bellardc573ff62004-01-04 15:51:36 +00008162#endif
ths5fafdf22007-09-16 21:08:06 +00008163 ret = get_errno(target_mmap(arg1, arg2, arg3,
8164 target_to_host_bitmask(arg4, mmap_flags_tbl),
bellard5286db72003-06-05 00:57:30 +00008165 arg5,
bellardc573ff62004-01-04 15:51:36 +00008166 arg6 << MMAP_SHIFT));
bellard31e31b82003-02-18 22:55:36 +00008167 break;
bellarda315a142005-01-30 22:59:18 +00008168#endif
bellard31e31b82003-02-18 22:55:36 +00008169 case TARGET_NR_munmap:
bellard54936002003-05-13 00:25:15 +00008170 ret = get_errno(target_munmap(arg1, arg2));
bellard31e31b82003-02-18 22:55:36 +00008171 break;
bellard9de5e442003-03-23 16:49:39 +00008172 case TARGET_NR_mprotect:
Paul Brook97374d32010-06-16 13:03:51 +01008173 {
Andreas Färber0429a972013-08-26 18:14:44 +02008174 TaskState *ts = cpu->opaque;
Paul Brook97374d32010-06-16 13:03:51 +01008175 /* Special hack to detect libc making the stack executable. */
8176 if ((arg3 & PROT_GROWSDOWN)
8177 && arg1 >= ts->info->stack_limit
8178 && arg1 <= ts->info->start_stack) {
8179 arg3 &= ~PROT_GROWSDOWN;
8180 arg2 = arg2 + arg1 - ts->info->stack_limit;
8181 arg1 = ts->info->stack_limit;
8182 }
8183 }
bellard54936002003-05-13 00:25:15 +00008184 ret = get_errno(target_mprotect(arg1, arg2, arg3));
bellard9de5e442003-03-23 16:49:39 +00008185 break;
thse5febef2007-04-01 18:31:35 +00008186#ifdef TARGET_NR_mremap
bellard9de5e442003-03-23 16:49:39 +00008187 case TARGET_NR_mremap:
bellard54936002003-05-13 00:25:15 +00008188 ret = get_errno(target_mremap(arg1, arg2, arg3, arg4, arg5));
bellard9de5e442003-03-23 16:49:39 +00008189 break;
thse5febef2007-04-01 18:31:35 +00008190#endif
pbrook53a59602006-03-25 19:31:22 +00008191 /* ??? msync/mlock/munlock are broken for softmmu. */
thse5febef2007-04-01 18:31:35 +00008192#ifdef TARGET_NR_msync
bellard9de5e442003-03-23 16:49:39 +00008193 case TARGET_NR_msync:
pbrook53a59602006-03-25 19:31:22 +00008194 ret = get_errno(msync(g2h(arg1), arg2, arg3));
bellard9de5e442003-03-23 16:49:39 +00008195 break;
thse5febef2007-04-01 18:31:35 +00008196#endif
8197#ifdef TARGET_NR_mlock
bellard9de5e442003-03-23 16:49:39 +00008198 case TARGET_NR_mlock:
pbrook53a59602006-03-25 19:31:22 +00008199 ret = get_errno(mlock(g2h(arg1), arg2));
bellard9de5e442003-03-23 16:49:39 +00008200 break;
thse5febef2007-04-01 18:31:35 +00008201#endif
8202#ifdef TARGET_NR_munlock
bellard9de5e442003-03-23 16:49:39 +00008203 case TARGET_NR_munlock:
pbrook53a59602006-03-25 19:31:22 +00008204 ret = get_errno(munlock(g2h(arg1), arg2));
bellard9de5e442003-03-23 16:49:39 +00008205 break;
thse5febef2007-04-01 18:31:35 +00008206#endif
8207#ifdef TARGET_NR_mlockall
bellard9de5e442003-03-23 16:49:39 +00008208 case TARGET_NR_mlockall:
Tom Musta6f6a4032014-08-12 13:53:42 -05008209 ret = get_errno(mlockall(target_to_host_mlockall_arg(arg1)));
bellard9de5e442003-03-23 16:49:39 +00008210 break;
thse5febef2007-04-01 18:31:35 +00008211#endif
8212#ifdef TARGET_NR_munlockall
bellard9de5e442003-03-23 16:49:39 +00008213 case TARGET_NR_munlockall:
8214 ret = get_errno(munlockall());
8215 break;
thse5febef2007-04-01 18:31:35 +00008216#endif
bellard31e31b82003-02-18 22:55:36 +00008217 case TARGET_NR_truncate:
bellard579a97f2007-11-11 14:26:47 +00008218 if (!(p = lock_user_string(arg1)))
8219 goto efault;
pbrook53a59602006-03-25 19:31:22 +00008220 ret = get_errno(truncate(p, arg2));
8221 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00008222 break;
8223 case TARGET_NR_ftruncate:
8224 ret = get_errno(ftruncate(arg1, arg2));
8225 break;
8226 case TARGET_NR_fchmod:
8227 ret = get_errno(fchmod(arg1, arg2));
8228 break;
Peter Maydellc0d472b2013-06-12 16:20:21 +01008229#if defined(TARGET_NR_fchmodat)
ths814d7972007-09-24 09:26:51 +00008230 case TARGET_NR_fchmodat:
bellard579a97f2007-11-11 14:26:47 +00008231 if (!(p = lock_user_string(arg2)))
8232 goto efault;
Peter Maydellc0d472b2013-06-12 16:20:21 +01008233 ret = get_errno(fchmodat(arg1, p, arg3, 0));
bellard579a97f2007-11-11 14:26:47 +00008234 unlock_user(p, arg2, 0);
ths814d7972007-09-24 09:26:51 +00008235 break;
8236#endif
bellard31e31b82003-02-18 22:55:36 +00008237 case TARGET_NR_getpriority:
Richard Henderson95c09822012-06-07 15:14:50 -07008238 /* Note that negative values are valid for getpriority, so we must
8239 differentiate based on errno settings. */
8240 errno = 0;
8241 ret = getpriority(arg1, arg2);
8242 if (ret == -1 && errno != 0) {
8243 ret = -host_to_target_errno(errno);
8244 break;
8245 }
8246#ifdef TARGET_ALPHA
8247 /* Return value is the unbiased priority. Signal no error. */
8248 ((CPUAlphaState *)cpu_env)->ir[IR_V0] = 0;
8249#else
8250 /* Return value is a biased priority to avoid negative numbers. */
8251 ret = 20 - ret;
8252#endif
bellard31e31b82003-02-18 22:55:36 +00008253 break;
8254 case TARGET_NR_setpriority:
8255 ret = get_errno(setpriority(arg1, arg2, arg3));
8256 break;
bellardebc05482003-09-30 21:08:41 +00008257#ifdef TARGET_NR_profil
bellard31e31b82003-02-18 22:55:36 +00008258 case TARGET_NR_profil:
8259 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00008260#endif
bellard31e31b82003-02-18 22:55:36 +00008261 case TARGET_NR_statfs:
bellard579a97f2007-11-11 14:26:47 +00008262 if (!(p = lock_user_string(arg1)))
8263 goto efault;
pbrook53a59602006-03-25 19:31:22 +00008264 ret = get_errno(statfs(path(p), &stfs));
8265 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00008266 convert_statfs:
8267 if (!is_error(ret)) {
pbrook53a59602006-03-25 19:31:22 +00008268 struct target_statfs *target_stfs;
ths3b46e622007-09-17 08:09:54 +00008269
bellard579a97f2007-11-11 14:26:47 +00008270 if (!lock_user_struct(VERIFY_WRITE, target_stfs, arg2, 0))
8271 goto efault;
8272 __put_user(stfs.f_type, &target_stfs->f_type);
8273 __put_user(stfs.f_bsize, &target_stfs->f_bsize);
8274 __put_user(stfs.f_blocks, &target_stfs->f_blocks);
8275 __put_user(stfs.f_bfree, &target_stfs->f_bfree);
8276 __put_user(stfs.f_bavail, &target_stfs->f_bavail);
8277 __put_user(stfs.f_files, &target_stfs->f_files);
8278 __put_user(stfs.f_ffree, &target_stfs->f_ffree);
8279 __put_user(stfs.f_fsid.__val[0], &target_stfs->f_fsid.val[0]);
8280 __put_user(stfs.f_fsid.__val[1], &target_stfs->f_fsid.val[1]);
8281 __put_user(stfs.f_namelen, &target_stfs->f_namelen);
Alexander Graf229d3372012-09-19 04:39:53 +02008282 __put_user(stfs.f_frsize, &target_stfs->f_frsize);
8283 memset(target_stfs->f_spare, 0, sizeof(target_stfs->f_spare));
pbrook53a59602006-03-25 19:31:22 +00008284 unlock_user_struct(target_stfs, arg2, 1);
bellard31e31b82003-02-18 22:55:36 +00008285 }
8286 break;
8287 case TARGET_NR_fstatfs:
bellard56c8f682005-11-28 22:28:41 +00008288 ret = get_errno(fstatfs(arg1, &stfs));
bellard31e31b82003-02-18 22:55:36 +00008289 goto convert_statfs;
bellard56c8f682005-11-28 22:28:41 +00008290#ifdef TARGET_NR_statfs64
8291 case TARGET_NR_statfs64:
bellard579a97f2007-11-11 14:26:47 +00008292 if (!(p = lock_user_string(arg1)))
8293 goto efault;
pbrook53a59602006-03-25 19:31:22 +00008294 ret = get_errno(statfs(path(p), &stfs));
8295 unlock_user(p, arg1, 0);
bellard56c8f682005-11-28 22:28:41 +00008296 convert_statfs64:
8297 if (!is_error(ret)) {
pbrook53a59602006-03-25 19:31:22 +00008298 struct target_statfs64 *target_stfs;
ths3b46e622007-09-17 08:09:54 +00008299
bellard579a97f2007-11-11 14:26:47 +00008300 if (!lock_user_struct(VERIFY_WRITE, target_stfs, arg3, 0))
8301 goto efault;
8302 __put_user(stfs.f_type, &target_stfs->f_type);
8303 __put_user(stfs.f_bsize, &target_stfs->f_bsize);
8304 __put_user(stfs.f_blocks, &target_stfs->f_blocks);
8305 __put_user(stfs.f_bfree, &target_stfs->f_bfree);
8306 __put_user(stfs.f_bavail, &target_stfs->f_bavail);
8307 __put_user(stfs.f_files, &target_stfs->f_files);
8308 __put_user(stfs.f_ffree, &target_stfs->f_ffree);
8309 __put_user(stfs.f_fsid.__val[0], &target_stfs->f_fsid.val[0]);
8310 __put_user(stfs.f_fsid.__val[1], &target_stfs->f_fsid.val[1]);
8311 __put_user(stfs.f_namelen, &target_stfs->f_namelen);
Alexander Graf229d3372012-09-19 04:39:53 +02008312 __put_user(stfs.f_frsize, &target_stfs->f_frsize);
8313 memset(target_stfs->f_spare, 0, sizeof(target_stfs->f_spare));
bellard579a97f2007-11-11 14:26:47 +00008314 unlock_user_struct(target_stfs, arg3, 1);
bellard56c8f682005-11-28 22:28:41 +00008315 }
8316 break;
8317 case TARGET_NR_fstatfs64:
8318 ret = get_errno(fstatfs(arg1, &stfs));
8319 goto convert_statfs64;
8320#endif
bellardebc05482003-09-30 21:08:41 +00008321#ifdef TARGET_NR_ioperm
bellard31e31b82003-02-18 22:55:36 +00008322 case TARGET_NR_ioperm:
8323 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00008324#endif
thse5febef2007-04-01 18:31:35 +00008325#ifdef TARGET_NR_socketcall
bellard31e31b82003-02-18 22:55:36 +00008326 case TARGET_NR_socketcall:
pbrook53a59602006-03-25 19:31:22 +00008327 ret = do_socketcall(arg1, arg2);
bellard31e31b82003-02-18 22:55:36 +00008328 break;
thse5febef2007-04-01 18:31:35 +00008329#endif
bellard3532fa72006-06-24 15:06:03 +00008330#ifdef TARGET_NR_accept
8331 case TARGET_NR_accept:
Peter Maydella94b4982013-02-08 04:35:04 +00008332 ret = do_accept4(arg1, arg2, arg3, 0);
8333 break;
8334#endif
8335#ifdef TARGET_NR_accept4
8336 case TARGET_NR_accept4:
Peter Maydella94b4982013-02-08 04:35:04 +00008337 ret = do_accept4(arg1, arg2, arg3, arg4);
bellard3532fa72006-06-24 15:06:03 +00008338 break;
8339#endif
8340#ifdef TARGET_NR_bind
8341 case TARGET_NR_bind:
8342 ret = do_bind(arg1, arg2, arg3);
8343 break;
8344#endif
8345#ifdef TARGET_NR_connect
8346 case TARGET_NR_connect:
8347 ret = do_connect(arg1, arg2, arg3);
8348 break;
8349#endif
8350#ifdef TARGET_NR_getpeername
8351 case TARGET_NR_getpeername:
pbrook1be9e1d2006-11-19 15:26:04 +00008352 ret = do_getpeername(arg1, arg2, arg3);
bellard3532fa72006-06-24 15:06:03 +00008353 break;
8354#endif
8355#ifdef TARGET_NR_getsockname
8356 case TARGET_NR_getsockname:
pbrook1be9e1d2006-11-19 15:26:04 +00008357 ret = do_getsockname(arg1, arg2, arg3);
bellard3532fa72006-06-24 15:06:03 +00008358 break;
8359#endif
8360#ifdef TARGET_NR_getsockopt
8361 case TARGET_NR_getsockopt:
8362 ret = do_getsockopt(arg1, arg2, arg3, arg4, arg5);
8363 break;
8364#endif
8365#ifdef TARGET_NR_listen
8366 case TARGET_NR_listen:
pbrook1be9e1d2006-11-19 15:26:04 +00008367 ret = get_errno(listen(arg1, arg2));
bellard3532fa72006-06-24 15:06:03 +00008368 break;
8369#endif
8370#ifdef TARGET_NR_recv
8371 case TARGET_NR_recv:
pbrook214201b2007-03-17 01:27:24 +00008372 ret = do_recvfrom(arg1, arg2, arg3, arg4, 0, 0);
bellard3532fa72006-06-24 15:06:03 +00008373 break;
8374#endif
8375#ifdef TARGET_NR_recvfrom
8376 case TARGET_NR_recvfrom:
pbrook214201b2007-03-17 01:27:24 +00008377 ret = do_recvfrom(arg1, arg2, arg3, arg4, arg5, arg6);
bellard3532fa72006-06-24 15:06:03 +00008378 break;
8379#endif
8380#ifdef TARGET_NR_recvmsg
8381 case TARGET_NR_recvmsg:
8382 ret = do_sendrecvmsg(arg1, arg2, arg3, 0);
8383 break;
8384#endif
8385#ifdef TARGET_NR_send
8386 case TARGET_NR_send:
pbrook1be9e1d2006-11-19 15:26:04 +00008387 ret = do_sendto(arg1, arg2, arg3, arg4, 0, 0);
bellard3532fa72006-06-24 15:06:03 +00008388 break;
8389#endif
8390#ifdef TARGET_NR_sendmsg
8391 case TARGET_NR_sendmsg:
8392 ret = do_sendrecvmsg(arg1, arg2, arg3, 1);
8393 break;
8394#endif
Alexander Graff19e00d2014-03-02 19:36:42 +00008395#ifdef TARGET_NR_sendmmsg
8396 case TARGET_NR_sendmmsg:
8397 ret = do_sendrecvmmsg(arg1, arg2, arg3, arg4, 1);
8398 break;
8399 case TARGET_NR_recvmmsg:
8400 ret = do_sendrecvmmsg(arg1, arg2, arg3, arg4, 0);
8401 break;
8402#endif
bellard3532fa72006-06-24 15:06:03 +00008403#ifdef TARGET_NR_sendto
8404 case TARGET_NR_sendto:
pbrook1be9e1d2006-11-19 15:26:04 +00008405 ret = do_sendto(arg1, arg2, arg3, arg4, arg5, arg6);
bellard3532fa72006-06-24 15:06:03 +00008406 break;
8407#endif
8408#ifdef TARGET_NR_shutdown
8409 case TARGET_NR_shutdown:
pbrook1be9e1d2006-11-19 15:26:04 +00008410 ret = get_errno(shutdown(arg1, arg2));
bellard3532fa72006-06-24 15:06:03 +00008411 break;
8412#endif
Laurent Vivierf894efd2016-02-21 10:56:23 +01008413#if defined(TARGET_NR_getrandom) && defined(__NR_getrandom)
8414 case TARGET_NR_getrandom:
8415 p = lock_user(VERIFY_WRITE, arg1, arg2, 0);
8416 if (!p) {
8417 goto efault;
8418 }
8419 ret = get_errno(getrandom(p, arg2, arg3));
8420 unlock_user(p, arg1, ret);
8421 break;
8422#endif
bellard3532fa72006-06-24 15:06:03 +00008423#ifdef TARGET_NR_socket
8424 case TARGET_NR_socket:
8425 ret = do_socket(arg1, arg2, arg3);
Laurent Viviere36800c2015-10-02 14:48:09 +02008426 fd_trans_unregister(ret);
bellard3532fa72006-06-24 15:06:03 +00008427 break;
8428#endif
8429#ifdef TARGET_NR_socketpair
8430 case TARGET_NR_socketpair:
pbrook1be9e1d2006-11-19 15:26:04 +00008431 ret = do_socketpair(arg1, arg2, arg3, arg4);
bellard3532fa72006-06-24 15:06:03 +00008432 break;
8433#endif
8434#ifdef TARGET_NR_setsockopt
8435 case TARGET_NR_setsockopt:
8436 ret = do_setsockopt(arg1, arg2, arg3, arg4, (socklen_t) arg5);
8437 break;
8438#endif
ths7494b0f2007-02-11 18:26:53 +00008439
bellard31e31b82003-02-18 22:55:36 +00008440 case TARGET_NR_syslog:
bellard579a97f2007-11-11 14:26:47 +00008441 if (!(p = lock_user_string(arg2)))
8442 goto efault;
thse5574482007-02-11 20:03:13 +00008443 ret = get_errno(sys_syslog((int)arg1, p, (int)arg3));
8444 unlock_user(p, arg2, 0);
ths7494b0f2007-02-11 18:26:53 +00008445 break;
8446
bellard31e31b82003-02-18 22:55:36 +00008447 case TARGET_NR_setitimer:
bellard66fb9762003-03-23 01:06:05 +00008448 {
bellard66fb9762003-03-23 01:06:05 +00008449 struct itimerval value, ovalue, *pvalue;
8450
pbrook53a59602006-03-25 19:31:22 +00008451 if (arg2) {
bellard66fb9762003-03-23 01:06:05 +00008452 pvalue = &value;
ths788f5ec2007-12-09 02:37:05 +00008453 if (copy_from_user_timeval(&pvalue->it_interval, arg2)
8454 || copy_from_user_timeval(&pvalue->it_value,
8455 arg2 + sizeof(struct target_timeval)))
8456 goto efault;
bellard66fb9762003-03-23 01:06:05 +00008457 } else {
8458 pvalue = NULL;
8459 }
8460 ret = get_errno(setitimer(arg1, pvalue, &ovalue));
pbrook53a59602006-03-25 19:31:22 +00008461 if (!is_error(ret) && arg3) {
ths788f5ec2007-12-09 02:37:05 +00008462 if (copy_to_user_timeval(arg3,
8463 &ovalue.it_interval)
8464 || copy_to_user_timeval(arg3 + sizeof(struct target_timeval),
8465 &ovalue.it_value))
8466 goto efault;
bellard66fb9762003-03-23 01:06:05 +00008467 }
8468 }
8469 break;
bellard31e31b82003-02-18 22:55:36 +00008470 case TARGET_NR_getitimer:
bellard66fb9762003-03-23 01:06:05 +00008471 {
bellard66fb9762003-03-23 01:06:05 +00008472 struct itimerval value;
ths3b46e622007-09-17 08:09:54 +00008473
bellard66fb9762003-03-23 01:06:05 +00008474 ret = get_errno(getitimer(arg1, &value));
pbrook53a59602006-03-25 19:31:22 +00008475 if (!is_error(ret) && arg2) {
ths788f5ec2007-12-09 02:37:05 +00008476 if (copy_to_user_timeval(arg2,
8477 &value.it_interval)
8478 || copy_to_user_timeval(arg2 + sizeof(struct target_timeval),
8479 &value.it_value))
8480 goto efault;
bellard66fb9762003-03-23 01:06:05 +00008481 }
8482 }
8483 break;
Chen Gang704eff62015-08-21 05:37:33 +08008484#ifdef TARGET_NR_stat
bellard31e31b82003-02-18 22:55:36 +00008485 case TARGET_NR_stat:
bellard579a97f2007-11-11 14:26:47 +00008486 if (!(p = lock_user_string(arg1)))
8487 goto efault;
pbrook53a59602006-03-25 19:31:22 +00008488 ret = get_errno(stat(path(p), &st));
8489 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00008490 goto do_stat;
Chen Gang704eff62015-08-21 05:37:33 +08008491#endif
8492#ifdef TARGET_NR_lstat
bellard31e31b82003-02-18 22:55:36 +00008493 case TARGET_NR_lstat:
bellard579a97f2007-11-11 14:26:47 +00008494 if (!(p = lock_user_string(arg1)))
8495 goto efault;
pbrook53a59602006-03-25 19:31:22 +00008496 ret = get_errno(lstat(path(p), &st));
8497 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00008498 goto do_stat;
Chen Gang704eff62015-08-21 05:37:33 +08008499#endif
bellard31e31b82003-02-18 22:55:36 +00008500 case TARGET_NR_fstat:
8501 {
8502 ret = get_errno(fstat(arg1, &st));
Chen Gang704eff62015-08-21 05:37:33 +08008503#if defined(TARGET_NR_stat) || defined(TARGET_NR_lstat)
bellard31e31b82003-02-18 22:55:36 +00008504 do_stat:
Chen Gang704eff62015-08-21 05:37:33 +08008505#endif
bellard31e31b82003-02-18 22:55:36 +00008506 if (!is_error(ret)) {
pbrook53a59602006-03-25 19:31:22 +00008507 struct target_stat *target_st;
thse3584652007-06-01 11:49:38 +00008508
bellard579a97f2007-11-11 14:26:47 +00008509 if (!lock_user_struct(VERIFY_WRITE, target_st, arg2, 0))
8510 goto efault;
Ulrich Hecht12727912009-07-24 19:10:32 +02008511 memset(target_st, 0, sizeof(*target_st));
bellardd2fd1af2007-11-14 18:08:56 +00008512 __put_user(st.st_dev, &target_st->st_dev);
8513 __put_user(st.st_ino, &target_st->st_ino);
8514 __put_user(st.st_mode, &target_st->st_mode);
8515 __put_user(st.st_uid, &target_st->st_uid);
8516 __put_user(st.st_gid, &target_st->st_gid);
8517 __put_user(st.st_nlink, &target_st->st_nlink);
8518 __put_user(st.st_rdev, &target_st->st_rdev);
8519 __put_user(st.st_size, &target_st->st_size);
8520 __put_user(st.st_blksize, &target_st->st_blksize);
8521 __put_user(st.st_blocks, &target_st->st_blocks);
8522 __put_user(st.st_atime, &target_st->target_st_atime);
8523 __put_user(st.st_mtime, &target_st->target_st_mtime);
8524 __put_user(st.st_ctime, &target_st->target_st_ctime);
pbrook53a59602006-03-25 19:31:22 +00008525 unlock_user_struct(target_st, arg2, 1);
bellard31e31b82003-02-18 22:55:36 +00008526 }
8527 }
8528 break;
bellardebc05482003-09-30 21:08:41 +00008529#ifdef TARGET_NR_olduname
bellard31e31b82003-02-18 22:55:36 +00008530 case TARGET_NR_olduname:
8531 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00008532#endif
8533#ifdef TARGET_NR_iopl
bellard31e31b82003-02-18 22:55:36 +00008534 case TARGET_NR_iopl:
8535 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00008536#endif
bellard31e31b82003-02-18 22:55:36 +00008537 case TARGET_NR_vhangup:
8538 ret = get_errno(vhangup());
8539 break;
bellardebc05482003-09-30 21:08:41 +00008540#ifdef TARGET_NR_idle
bellard31e31b82003-02-18 22:55:36 +00008541 case TARGET_NR_idle:
8542 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00008543#endif
bellard42ad6ae2005-01-03 22:48:11 +00008544#ifdef TARGET_NR_syscall
8545 case TARGET_NR_syscall:
Peter Maydell5945cfc2011-06-16 17:37:13 +01008546 ret = do_syscall(cpu_env, arg1 & 0xffff, arg2, arg3, arg4, arg5,
8547 arg6, arg7, arg8, 0);
8548 break;
bellard42ad6ae2005-01-03 22:48:11 +00008549#endif
bellard31e31b82003-02-18 22:55:36 +00008550 case TARGET_NR_wait4:
8551 {
8552 int status;
blueswir1992f48a2007-10-14 16:27:31 +00008553 abi_long status_ptr = arg2;
bellard31e31b82003-02-18 22:55:36 +00008554 struct rusage rusage, *rusage_ptr;
blueswir1992f48a2007-10-14 16:27:31 +00008555 abi_ulong target_rusage = arg4;
Petar Jovanovica39fb272014-04-08 19:24:30 +02008556 abi_long rusage_err;
bellard31e31b82003-02-18 22:55:36 +00008557 if (target_rusage)
8558 rusage_ptr = &rusage;
8559 else
8560 rusage_ptr = NULL;
Timothy E Baldwin4af80a32016-05-12 18:47:49 +01008561 ret = get_errno(safe_wait4(arg1, &status, arg3, rusage_ptr));
bellard31e31b82003-02-18 22:55:36 +00008562 if (!is_error(ret)) {
Alexander Graf53795572011-11-24 00:44:43 +01008563 if (status_ptr && ret) {
pbrook1d9d8b52009-04-16 15:17:02 +00008564 status = host_to_target_waitstatus(status);
bellard2f619692007-11-16 10:46:05 +00008565 if (put_user_s32(status, status_ptr))
8566 goto efault;
bellard31e31b82003-02-18 22:55:36 +00008567 }
Petar Jovanovica39fb272014-04-08 19:24:30 +02008568 if (target_rusage) {
8569 rusage_err = host_to_target_rusage(target_rusage, &rusage);
8570 if (rusage_err) {
8571 ret = rusage_err;
8572 }
8573 }
bellard31e31b82003-02-18 22:55:36 +00008574 }
8575 }
8576 break;
thse5febef2007-04-01 18:31:35 +00008577#ifdef TARGET_NR_swapoff
bellard31e31b82003-02-18 22:55:36 +00008578 case TARGET_NR_swapoff:
bellard579a97f2007-11-11 14:26:47 +00008579 if (!(p = lock_user_string(arg1)))
8580 goto efault;
pbrook53a59602006-03-25 19:31:22 +00008581 ret = get_errno(swapoff(p));
8582 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00008583 break;
thse5febef2007-04-01 18:31:35 +00008584#endif
bellard31e31b82003-02-18 22:55:36 +00008585 case TARGET_NR_sysinfo:
bellarda5448a72004-06-19 16:59:03 +00008586 {
pbrook53a59602006-03-25 19:31:22 +00008587 struct target_sysinfo *target_value;
bellarda5448a72004-06-19 16:59:03 +00008588 struct sysinfo value;
8589 ret = get_errno(sysinfo(&value));
pbrook53a59602006-03-25 19:31:22 +00008590 if (!is_error(ret) && arg1)
bellarda5448a72004-06-19 16:59:03 +00008591 {
bellard579a97f2007-11-11 14:26:47 +00008592 if (!lock_user_struct(VERIFY_WRITE, target_value, arg1, 0))
8593 goto efault;
bellarda5448a72004-06-19 16:59:03 +00008594 __put_user(value.uptime, &target_value->uptime);
8595 __put_user(value.loads[0], &target_value->loads[0]);
8596 __put_user(value.loads[1], &target_value->loads[1]);
8597 __put_user(value.loads[2], &target_value->loads[2]);
8598 __put_user(value.totalram, &target_value->totalram);
8599 __put_user(value.freeram, &target_value->freeram);
8600 __put_user(value.sharedram, &target_value->sharedram);
8601 __put_user(value.bufferram, &target_value->bufferram);
8602 __put_user(value.totalswap, &target_value->totalswap);
8603 __put_user(value.freeswap, &target_value->freeswap);
8604 __put_user(value.procs, &target_value->procs);
8605 __put_user(value.totalhigh, &target_value->totalhigh);
8606 __put_user(value.freehigh, &target_value->freehigh);
8607 __put_user(value.mem_unit, &target_value->mem_unit);
pbrook53a59602006-03-25 19:31:22 +00008608 unlock_user_struct(target_value, arg1, 1);
bellarda5448a72004-06-19 16:59:03 +00008609 }
8610 }
8611 break;
thse5febef2007-04-01 18:31:35 +00008612#ifdef TARGET_NR_ipc
bellard31e31b82003-02-18 22:55:36 +00008613 case TARGET_NR_ipc:
bellard8853f862004-02-22 14:57:26 +00008614 ret = do_ipc(arg1, arg2, arg3, arg4, arg5, arg6);
8615 break;
thse5febef2007-04-01 18:31:35 +00008616#endif
aurel32e5289082009-04-18 16:16:12 +00008617#ifdef TARGET_NR_semget
8618 case TARGET_NR_semget:
8619 ret = get_errno(semget(arg1, arg2, arg3));
8620 break;
8621#endif
8622#ifdef TARGET_NR_semop
8623 case TARGET_NR_semop:
Petar Jovanovicc7128c92013-03-21 07:57:36 +00008624 ret = do_semop(arg1, arg2, arg3);
aurel32e5289082009-04-18 16:16:12 +00008625 break;
8626#endif
8627#ifdef TARGET_NR_semctl
8628 case TARGET_NR_semctl:
Stefan Weild1c002b2015-02-08 15:40:58 +01008629 ret = do_semctl(arg1, arg2, arg3, arg4);
aurel32e5289082009-04-18 16:16:12 +00008630 break;
8631#endif
aurel32eeb438c2008-10-13 21:08:55 +00008632#ifdef TARGET_NR_msgctl
8633 case TARGET_NR_msgctl:
8634 ret = do_msgctl(arg1, arg2, arg3);
8635 break;
8636#endif
8637#ifdef TARGET_NR_msgget
8638 case TARGET_NR_msgget:
8639 ret = get_errno(msgget(arg1, arg2));
8640 break;
8641#endif
8642#ifdef TARGET_NR_msgrcv
8643 case TARGET_NR_msgrcv:
8644 ret = do_msgrcv(arg1, arg2, arg3, arg4, arg5);
8645 break;
8646#endif
8647#ifdef TARGET_NR_msgsnd
8648 case TARGET_NR_msgsnd:
8649 ret = do_msgsnd(arg1, arg2, arg3, arg4);
8650 break;
8651#endif
Riku Voipio88a8c982009-04-03 10:42:00 +03008652#ifdef TARGET_NR_shmget
8653 case TARGET_NR_shmget:
8654 ret = get_errno(shmget(arg1, arg2, arg3));
8655 break;
8656#endif
8657#ifdef TARGET_NR_shmctl
8658 case TARGET_NR_shmctl:
8659 ret = do_shmctl(arg1, arg2, arg3);
8660 break;
8661#endif
8662#ifdef TARGET_NR_shmat
8663 case TARGET_NR_shmat:
8664 ret = do_shmat(arg1, arg2, arg3);
8665 break;
8666#endif
8667#ifdef TARGET_NR_shmdt
8668 case TARGET_NR_shmdt:
8669 ret = do_shmdt(arg1);
8670 break;
8671#endif
bellard31e31b82003-02-18 22:55:36 +00008672 case TARGET_NR_fsync:
8673 ret = get_errno(fsync(arg1));
8674 break;
bellard31e31b82003-02-18 22:55:36 +00008675 case TARGET_NR_clone:
Peter Maydell4ce62432013-07-16 18:44:57 +01008676 /* Linux manages to have three different orderings for its
8677 * arguments to clone(); the BACKWARDS and BACKWARDS2 defines
8678 * match the kernel's CONFIG_CLONE_* settings.
8679 * Microblaze is further special in that it uses a sixth
8680 * implicit argument to clone for the TLS pointer.
8681 */
8682#if defined(TARGET_MICROBLAZE)
Edgar E. Iglesiasa5b3bdc2012-04-26 14:17:41 +02008683 ret = get_errno(do_fork(cpu_env, arg1, arg2, arg4, arg6, arg5));
Peter Maydell4ce62432013-07-16 18:44:57 +01008684#elif defined(TARGET_CLONE_BACKWARDS)
8685 ret = get_errno(do_fork(cpu_env, arg1, arg2, arg3, arg4, arg5));
8686#elif defined(TARGET_CLONE_BACKWARDS2)
Ulrich Hechta4c075f2009-07-24 16:57:31 +02008687 ret = get_errno(do_fork(cpu_env, arg2, arg1, arg3, arg5, arg4));
aurel320b6d3ae2008-09-15 07:43:43 +00008688#else
Peter Maydell4ce62432013-07-16 18:44:57 +01008689 ret = get_errno(do_fork(cpu_env, arg1, arg2, arg3, arg5, arg4));
aurel320b6d3ae2008-09-15 07:43:43 +00008690#endif
bellard1b6b0292003-03-22 17:31:38 +00008691 break;
bellardec86b0f2003-04-11 00:15:04 +00008692#ifdef __NR_exit_group
8693 /* new thread calls */
8694 case TARGET_NR_exit_group:
Juan Quintela9788c9c2009-07-27 16:13:02 +02008695#ifdef TARGET_GPROF
aurel326d946cd2008-11-06 16:15:18 +00008696 _mcleanup();
8697#endif
bellarde9009672005-04-26 20:42:36 +00008698 gdb_exit(cpu_env, arg1);
bellardec86b0f2003-04-11 00:15:04 +00008699 ret = get_errno(exit_group(arg1));
8700 break;
8701#endif
bellard31e31b82003-02-18 22:55:36 +00008702 case TARGET_NR_setdomainname:
bellard579a97f2007-11-11 14:26:47 +00008703 if (!(p = lock_user_string(arg1)))
8704 goto efault;
pbrook53a59602006-03-25 19:31:22 +00008705 ret = get_errno(setdomainname(p, arg2));
8706 unlock_user(p, arg1, 0);
bellard31e31b82003-02-18 22:55:36 +00008707 break;
8708 case TARGET_NR_uname:
8709 /* no need to transcode because we use the linux syscall */
bellard29e619b2004-09-13 21:41:04 +00008710 {
8711 struct new_utsname * buf;
ths3b46e622007-09-17 08:09:54 +00008712
bellard579a97f2007-11-11 14:26:47 +00008713 if (!lock_user_struct(VERIFY_WRITE, buf, arg1, 0))
8714 goto efault;
bellard29e619b2004-09-13 21:41:04 +00008715 ret = get_errno(sys_uname(buf));
8716 if (!is_error(ret)) {
8717 /* Overrite the native machine name with whatever is being
8718 emulated. */
LoĂŻc Minierda790302009-12-29 22:06:13 +01008719 strcpy (buf->machine, cpu_to_uname_machine(cpu_env));
pbrookc5937222006-05-14 11:30:38 +00008720 /* Allow the user to override the reported release. */
8721 if (qemu_uname_release && *qemu_uname_release)
8722 strcpy (buf->release, qemu_uname_release);
bellard29e619b2004-09-13 21:41:04 +00008723 }
pbrook53a59602006-03-25 19:31:22 +00008724 unlock_user_struct(buf, arg1, 1);
bellard29e619b2004-09-13 21:41:04 +00008725 }
bellard31e31b82003-02-18 22:55:36 +00008726 break;
bellard6dbad632003-03-16 18:05:05 +00008727#ifdef TARGET_I386
bellard31e31b82003-02-18 22:55:36 +00008728 case TARGET_NR_modify_ldt:
bellard03acab62007-11-11 14:57:14 +00008729 ret = do_modify_ldt(cpu_env, arg1, arg2, arg3);
bellard5cd43932003-03-29 16:54:36 +00008730 break;
j_mayer84409dd2007-04-06 08:56:50 +00008731#if !defined(TARGET_X86_64)
bellard5cd43932003-03-29 16:54:36 +00008732 case TARGET_NR_vm86old:
8733 goto unimplemented;
8734 case TARGET_NR_vm86:
pbrook53a59602006-03-25 19:31:22 +00008735 ret = do_vm86(cpu_env, arg1, arg2);
bellard6dbad632003-03-16 18:05:05 +00008736 break;
8737#endif
j_mayer84409dd2007-04-06 08:56:50 +00008738#endif
bellard31e31b82003-02-18 22:55:36 +00008739 case TARGET_NR_adjtimex:
8740 goto unimplemented;
thse5febef2007-04-01 18:31:35 +00008741#ifdef TARGET_NR_create_module
bellard31e31b82003-02-18 22:55:36 +00008742 case TARGET_NR_create_module:
thse5febef2007-04-01 18:31:35 +00008743#endif
bellard31e31b82003-02-18 22:55:36 +00008744 case TARGET_NR_init_module:
8745 case TARGET_NR_delete_module:
thse5febef2007-04-01 18:31:35 +00008746#ifdef TARGET_NR_get_kernel_syms
bellard31e31b82003-02-18 22:55:36 +00008747 case TARGET_NR_get_kernel_syms:
thse5febef2007-04-01 18:31:35 +00008748#endif
bellard31e31b82003-02-18 22:55:36 +00008749 goto unimplemented;
8750 case TARGET_NR_quotactl:
8751 goto unimplemented;
8752 case TARGET_NR_getpgid:
8753 ret = get_errno(getpgid(arg1));
8754 break;
8755 case TARGET_NR_fchdir:
8756 ret = get_errno(fchdir(arg1));
8757 break;
j_mayer84409dd2007-04-06 08:56:50 +00008758#ifdef TARGET_NR_bdflush /* not on x86_64 */
bellard31e31b82003-02-18 22:55:36 +00008759 case TARGET_NR_bdflush:
8760 goto unimplemented;
j_mayer84409dd2007-04-06 08:56:50 +00008761#endif
thse5febef2007-04-01 18:31:35 +00008762#ifdef TARGET_NR_sysfs
bellard31e31b82003-02-18 22:55:36 +00008763 case TARGET_NR_sysfs:
8764 goto unimplemented;
thse5febef2007-04-01 18:31:35 +00008765#endif
bellard31e31b82003-02-18 22:55:36 +00008766 case TARGET_NR_personality:
bellard1b6b0292003-03-22 17:31:38 +00008767 ret = get_errno(personality(arg1));
bellard31e31b82003-02-18 22:55:36 +00008768 break;
thse5febef2007-04-01 18:31:35 +00008769#ifdef TARGET_NR_afs_syscall
bellard31e31b82003-02-18 22:55:36 +00008770 case TARGET_NR_afs_syscall:
8771 goto unimplemented;
thse5febef2007-04-01 18:31:35 +00008772#endif
j_mayer7a3148a2007-04-05 07:13:51 +00008773#ifdef TARGET_NR__llseek /* Not on alpha */
bellard31e31b82003-02-18 22:55:36 +00008774 case TARGET_NR__llseek:
8775 {
8776 int64_t res;
Peter Maydell0c1592d2011-02-22 13:02:26 +00008777#if !defined(__NR_llseek)
8778 res = lseek(arg1, ((uint64_t)arg2 << 32) | arg3, arg5);
8779 if (res == -1) {
8780 ret = get_errno(res);
8781 } else {
8782 ret = 0;
8783 }
8784#else
bellard31e31b82003-02-18 22:55:36 +00008785 ret = get_errno(_llseek(arg1, arg2, arg3, &res, arg5));
bellard4f2ac232004-04-26 19:44:02 +00008786#endif
Peter Maydell0c1592d2011-02-22 13:02:26 +00008787 if ((ret == 0) && put_user_s64(res, arg4)) {
8788 goto efault;
8789 }
bellard31e31b82003-02-18 22:55:36 +00008790 }
8791 break;
j_mayer7a3148a2007-04-05 07:13:51 +00008792#endif
Chen Gang704eff62015-08-21 05:37:33 +08008793#ifdef TARGET_NR_getdents
bellard31e31b82003-02-18 22:55:36 +00008794 case TARGET_NR_getdents:
Peter Maydell3307e232013-06-12 16:20:21 +01008795#ifdef __NR_getdents
Ulrich Hechtd83c8732009-07-24 19:10:28 +02008796#if TARGET_ABI_BITS == 32 && HOST_LONG_BITS == 64
bellard4add45b2003-06-05 01:52:59 +00008797 {
pbrook53a59602006-03-25 19:31:22 +00008798 struct target_dirent *target_dirp;
aurel326556a832008-10-13 21:08:17 +00008799 struct linux_dirent *dirp;
blueswir1992f48a2007-10-14 16:27:31 +00008800 abi_long count = arg3;
bellard4add45b2003-06-05 01:52:59 +00008801
Harmandeep Kaur0e173b22015-10-06 21:47:12 +05308802 dirp = g_try_malloc(count);
8803 if (!dirp) {
bellard579a97f2007-11-11 14:26:47 +00008804 ret = -TARGET_ENOMEM;
ths0da46a62007-10-20 20:23:07 +00008805 goto fail;
8806 }
ths3b46e622007-09-17 08:09:54 +00008807
bellard4add45b2003-06-05 01:52:59 +00008808 ret = get_errno(sys_getdents(arg1, dirp, count));
8809 if (!is_error(ret)) {
aurel326556a832008-10-13 21:08:17 +00008810 struct linux_dirent *de;
bellard4add45b2003-06-05 01:52:59 +00008811 struct target_dirent *tde;
8812 int len = ret;
8813 int reclen, treclen;
8814 int count1, tnamelen;
8815
8816 count1 = 0;
8817 de = dirp;
bellard579a97f2007-11-11 14:26:47 +00008818 if (!(target_dirp = lock_user(VERIFY_WRITE, arg2, count, 0)))
8819 goto efault;
bellard4add45b2003-06-05 01:52:59 +00008820 tde = target_dirp;
8821 while (len > 0) {
8822 reclen = de->d_reclen;
Dmitry V. Levin333858b2012-08-21 02:13:12 +04008823 tnamelen = reclen - offsetof(struct linux_dirent, d_name);
8824 assert(tnamelen >= 0);
8825 treclen = tnamelen + offsetof(struct target_dirent, d_name);
8826 assert(count1 + treclen <= count);
bellard4add45b2003-06-05 01:52:59 +00008827 tde->d_reclen = tswap16(treclen);
Matthias Brauncbb21ee2011-08-12 19:57:41 +02008828 tde->d_ino = tswapal(de->d_ino);
8829 tde->d_off = tswapal(de->d_off);
Dmitry V. Levin333858b2012-08-21 02:13:12 +04008830 memcpy(tde->d_name, de->d_name, tnamelen);
aurel326556a832008-10-13 21:08:17 +00008831 de = (struct linux_dirent *)((char *)de + reclen);
bellard4add45b2003-06-05 01:52:59 +00008832 len -= reclen;
j_mayer1c5bf3b2007-04-14 12:17:59 +00008833 tde = (struct target_dirent *)((char *)tde + treclen);
bellard4add45b2003-06-05 01:52:59 +00008834 count1 += treclen;
8835 }
8836 ret = count1;
bellard579a97f2007-11-11 14:26:47 +00008837 unlock_user(target_dirp, arg2, ret);
bellard4add45b2003-06-05 01:52:59 +00008838 }
Harmandeep Kaur0e173b22015-10-06 21:47:12 +05308839 g_free(dirp);
bellard4add45b2003-06-05 01:52:59 +00008840 }
8841#else
bellard31e31b82003-02-18 22:55:36 +00008842 {
aurel326556a832008-10-13 21:08:17 +00008843 struct linux_dirent *dirp;
blueswir1992f48a2007-10-14 16:27:31 +00008844 abi_long count = arg3;
bellarddab2ed92003-03-22 15:23:14 +00008845
bellard579a97f2007-11-11 14:26:47 +00008846 if (!(dirp = lock_user(VERIFY_WRITE, arg2, count, 0)))
8847 goto efault;
bellard72f03902003-02-18 23:33:18 +00008848 ret = get_errno(sys_getdents(arg1, dirp, count));
bellard31e31b82003-02-18 22:55:36 +00008849 if (!is_error(ret)) {
aurel326556a832008-10-13 21:08:17 +00008850 struct linux_dirent *de;
bellard31e31b82003-02-18 22:55:36 +00008851 int len = ret;
8852 int reclen;
8853 de = dirp;
8854 while (len > 0) {
bellard8083a3e2003-03-24 23:12:16 +00008855 reclen = de->d_reclen;
bellard31e31b82003-02-18 22:55:36 +00008856 if (reclen > len)
8857 break;
bellard8083a3e2003-03-24 23:12:16 +00008858 de->d_reclen = tswap16(reclen);
bellard31e31b82003-02-18 22:55:36 +00008859 tswapls(&de->d_ino);
8860 tswapls(&de->d_off);
aurel326556a832008-10-13 21:08:17 +00008861 de = (struct linux_dirent *)((char *)de + reclen);
bellard31e31b82003-02-18 22:55:36 +00008862 len -= reclen;
8863 }
8864 }
pbrook53a59602006-03-25 19:31:22 +00008865 unlock_user(dirp, arg2, ret);
bellard31e31b82003-02-18 22:55:36 +00008866 }
bellard4add45b2003-06-05 01:52:59 +00008867#endif
Peter Maydell3307e232013-06-12 16:20:21 +01008868#else
8869 /* Implement getdents in terms of getdents64 */
8870 {
8871 struct linux_dirent64 *dirp;
8872 abi_long count = arg3;
8873
8874 dirp = lock_user(VERIFY_WRITE, arg2, count, 0);
8875 if (!dirp) {
8876 goto efault;
8877 }
8878 ret = get_errno(sys_getdents64(arg1, dirp, count));
8879 if (!is_error(ret)) {
8880 /* Convert the dirent64 structs to target dirent. We do this
8881 * in-place, since we can guarantee that a target_dirent is no
8882 * larger than a dirent64; however this means we have to be
8883 * careful to read everything before writing in the new format.
8884 */
8885 struct linux_dirent64 *de;
8886 struct target_dirent *tde;
8887 int len = ret;
8888 int tlen = 0;
8889
8890 de = dirp;
8891 tde = (struct target_dirent *)dirp;
8892 while (len > 0) {
8893 int namelen, treclen;
8894 int reclen = de->d_reclen;
8895 uint64_t ino = de->d_ino;
8896 int64_t off = de->d_off;
8897 uint8_t type = de->d_type;
8898
8899 namelen = strlen(de->d_name);
8900 treclen = offsetof(struct target_dirent, d_name)
8901 + namelen + 2;
8902 treclen = QEMU_ALIGN_UP(treclen, sizeof(abi_long));
8903
8904 memmove(tde->d_name, de->d_name, namelen + 1);
8905 tde->d_ino = tswapal(ino);
8906 tde->d_off = tswapal(off);
8907 tde->d_reclen = tswap16(treclen);
8908 /* The target_dirent type is in what was formerly a padding
8909 * byte at the end of the structure:
8910 */
8911 *(((char *)tde) + treclen - 1) = type;
8912
8913 de = (struct linux_dirent64 *)((char *)de + reclen);
8914 tde = (struct target_dirent *)((char *)tde + treclen);
8915 len -= reclen;
8916 tlen += treclen;
8917 }
8918 ret = tlen;
8919 }
8920 unlock_user(dirp, arg2, ret);
8921 }
8922#endif
bellard31e31b82003-02-18 22:55:36 +00008923 break;
Chen Gang704eff62015-08-21 05:37:33 +08008924#endif /* TARGET_NR_getdents */
ths3ae43202007-09-16 21:39:48 +00008925#if defined(TARGET_NR_getdents64) && defined(__NR_getdents64)
bellarddab2ed92003-03-22 15:23:14 +00008926 case TARGET_NR_getdents64:
8927 {
aurel326556a832008-10-13 21:08:17 +00008928 struct linux_dirent64 *dirp;
blueswir1992f48a2007-10-14 16:27:31 +00008929 abi_long count = arg3;
bellard579a97f2007-11-11 14:26:47 +00008930 if (!(dirp = lock_user(VERIFY_WRITE, arg2, count, 0)))
8931 goto efault;
bellarddab2ed92003-03-22 15:23:14 +00008932 ret = get_errno(sys_getdents64(arg1, dirp, count));
8933 if (!is_error(ret)) {
aurel326556a832008-10-13 21:08:17 +00008934 struct linux_dirent64 *de;
bellarddab2ed92003-03-22 15:23:14 +00008935 int len = ret;
8936 int reclen;
8937 de = dirp;
8938 while (len > 0) {
bellard8083a3e2003-03-24 23:12:16 +00008939 reclen = de->d_reclen;
bellarddab2ed92003-03-22 15:23:14 +00008940 if (reclen > len)
8941 break;
bellard8083a3e2003-03-24 23:12:16 +00008942 de->d_reclen = tswap16(reclen);
bellard8582a532007-11-11 23:11:36 +00008943 tswap64s((uint64_t *)&de->d_ino);
8944 tswap64s((uint64_t *)&de->d_off);
aurel326556a832008-10-13 21:08:17 +00008945 de = (struct linux_dirent64 *)((char *)de + reclen);
bellarddab2ed92003-03-22 15:23:14 +00008946 len -= reclen;
8947 }
8948 }
pbrook53a59602006-03-25 19:31:22 +00008949 unlock_user(dirp, arg2, ret);
bellarddab2ed92003-03-22 15:23:14 +00008950 }
8951 break;
bellarda541f292004-04-12 20:39:29 +00008952#endif /* TARGET_NR_getdents64 */
Laurent Vivier9468a5d2013-01-10 22:30:50 +01008953#if defined(TARGET_NR__newselect)
bellard31e31b82003-02-18 22:55:36 +00008954 case TARGET_NR__newselect:
pbrook53a59602006-03-25 19:31:22 +00008955 ret = do_select(arg1, arg2, arg3, arg4, arg5);
bellard31e31b82003-02-18 22:55:36 +00008956 break;
thse5febef2007-04-01 18:31:35 +00008957#endif
Mike Frysingerd8035d42011-02-07 01:05:51 -05008958#if defined(TARGET_NR_poll) || defined(TARGET_NR_ppoll)
8959# ifdef TARGET_NR_poll
bellard9de5e442003-03-23 16:49:39 +00008960 case TARGET_NR_poll:
Mike Frysingerd8035d42011-02-07 01:05:51 -05008961# endif
8962# ifdef TARGET_NR_ppoll
8963 case TARGET_NR_ppoll:
8964# endif
bellard9de5e442003-03-23 16:49:39 +00008965 {
pbrook53a59602006-03-25 19:31:22 +00008966 struct target_pollfd *target_pfd;
bellard9de5e442003-03-23 16:49:39 +00008967 unsigned int nfds = arg2;
bellard9de5e442003-03-23 16:49:39 +00008968 struct pollfd *pfd;
bellard7854b052003-03-29 17:22:23 +00008969 unsigned int i;
bellard9de5e442003-03-23 16:49:39 +00008970
Laurent Vivier3e24bb32015-10-06 01:20:48 +02008971 pfd = NULL;
8972 target_pfd = NULL;
8973 if (nfds) {
8974 target_pfd = lock_user(VERIFY_WRITE, arg1,
8975 sizeof(struct target_pollfd) * nfds, 1);
8976 if (!target_pfd) {
8977 goto efault;
8978 }
Mike Frysingerd8035d42011-02-07 01:05:51 -05008979
Laurent Vivier3e24bb32015-10-06 01:20:48 +02008980 pfd = alloca(sizeof(struct pollfd) * nfds);
8981 for (i = 0; i < nfds; i++) {
8982 pfd[i].fd = tswap32(target_pfd[i].fd);
8983 pfd[i].events = tswap16(target_pfd[i].events);
8984 }
bellard9de5e442003-03-23 16:49:39 +00008985 }
Mike Frysingerd8035d42011-02-07 01:05:51 -05008986
Peter Maydella6130232016-06-06 19:58:10 +01008987 switch (num) {
Mike Frysingerd8035d42011-02-07 01:05:51 -05008988# ifdef TARGET_NR_ppoll
Peter Maydella6130232016-06-06 19:58:10 +01008989 case TARGET_NR_ppoll:
8990 {
Mike Frysingerd8035d42011-02-07 01:05:51 -05008991 struct timespec _timeout_ts, *timeout_ts = &_timeout_ts;
8992 target_sigset_t *target_set;
8993 sigset_t _set, *set = &_set;
8994
8995 if (arg3) {
8996 if (target_to_host_timespec(timeout_ts, arg3)) {
8997 unlock_user(target_pfd, arg1, 0);
8998 goto efault;
8999 }
9000 } else {
9001 timeout_ts = NULL;
9002 }
9003
9004 if (arg4) {
9005 target_set = lock_user(VERIFY_READ, arg4, sizeof(target_sigset_t), 1);
9006 if (!target_set) {
9007 unlock_user(target_pfd, arg1, 0);
9008 goto efault;
9009 }
9010 target_to_host_sigset(set, target_set);
9011 } else {
9012 set = NULL;
9013 }
9014
Peter Maydella6130232016-06-06 19:58:10 +01009015 ret = get_errno(safe_ppoll(pfd, nfds, timeout_ts,
9016 set, SIGSET_T_SIZE));
Mike Frysingerd8035d42011-02-07 01:05:51 -05009017
9018 if (!is_error(ret) && arg3) {
9019 host_to_target_timespec(arg3, timeout_ts);
9020 }
9021 if (arg4) {
9022 unlock_user(target_set, arg4, 0);
9023 }
Peter Maydella6130232016-06-06 19:58:10 +01009024 break;
9025 }
Mike Frysingerd8035d42011-02-07 01:05:51 -05009026# endif
Peter Maydella6130232016-06-06 19:58:10 +01009027# ifdef TARGET_NR_poll
9028 case TARGET_NR_poll:
9029 {
9030 struct timespec ts, *pts;
9031
9032 if (arg3 >= 0) {
9033 /* Convert ms to secs, ns */
9034 ts.tv_sec = arg3 / 1000;
9035 ts.tv_nsec = (arg3 % 1000) * 1000000LL;
9036 pts = &ts;
9037 } else {
9038 /* -ve poll() timeout means "infinite" */
9039 pts = NULL;
9040 }
9041 ret = get_errno(safe_ppoll(pfd, nfds, pts, NULL, 0));
9042 break;
9043 }
9044# endif
9045 default:
9046 g_assert_not_reached();
9047 }
Mike Frysingerd8035d42011-02-07 01:05:51 -05009048
bellard9de5e442003-03-23 16:49:39 +00009049 if (!is_error(ret)) {
9050 for(i = 0; i < nfds; i++) {
bellard5cd43932003-03-29 16:54:36 +00009051 target_pfd[i].revents = tswap16(pfd[i].revents);
bellard9de5e442003-03-23 16:49:39 +00009052 }
9053 }
Peter Maydell30cb4cd2011-02-25 10:27:40 +00009054 unlock_user(target_pfd, arg1, sizeof(struct target_pollfd) * nfds);
bellard9de5e442003-03-23 16:49:39 +00009055 }
9056 break;
thse5febef2007-04-01 18:31:35 +00009057#endif
bellard31e31b82003-02-18 22:55:36 +00009058 case TARGET_NR_flock:
bellard9de5e442003-03-23 16:49:39 +00009059 /* NOTE: the flock constant seems to be the same for every
9060 Linux platform */
Peter Maydell2a845982016-06-06 19:58:07 +01009061 ret = get_errno(safe_flock(arg1, arg2));
bellard31e31b82003-02-18 22:55:36 +00009062 break;
9063 case TARGET_NR_readv:
9064 {
Richard Hendersonf287b2c2012-09-15 13:20:25 -07009065 struct iovec *vec = lock_iovec(VERIFY_WRITE, arg2, arg3, 0);
9066 if (vec != NULL) {
Peter Maydell918c03e2016-06-06 19:58:02 +01009067 ret = get_errno(safe_readv(arg1, vec, arg3));
Richard Hendersonf287b2c2012-09-15 13:20:25 -07009068 unlock_iovec(vec, arg2, arg3, 1);
9069 } else {
9070 ret = -host_to_target_errno(errno);
9071 }
bellard31e31b82003-02-18 22:55:36 +00009072 }
9073 break;
9074 case TARGET_NR_writev:
9075 {
Richard Hendersonf287b2c2012-09-15 13:20:25 -07009076 struct iovec *vec = lock_iovec(VERIFY_READ, arg2, arg3, 1);
9077 if (vec != NULL) {
Peter Maydell918c03e2016-06-06 19:58:02 +01009078 ret = get_errno(safe_writev(arg1, vec, arg3));
Richard Hendersonf287b2c2012-09-15 13:20:25 -07009079 unlock_iovec(vec, arg2, arg3, 0);
9080 } else {
9081 ret = -host_to_target_errno(errno);
9082 }
bellard31e31b82003-02-18 22:55:36 +00009083 }
9084 break;
9085 case TARGET_NR_getsid:
9086 ret = get_errno(getsid(arg1));
9087 break;
j_mayer7a3148a2007-04-05 07:13:51 +00009088#if defined(TARGET_NR_fdatasync) /* Not on alpha (osf_datasync ?) */
bellard31e31b82003-02-18 22:55:36 +00009089 case TARGET_NR_fdatasync:
bellard5cd43932003-03-29 16:54:36 +00009090 ret = get_errno(fdatasync(arg1));
9091 break;
j_mayer7a3148a2007-04-05 07:13:51 +00009092#endif
Chen Gang704eff62015-08-21 05:37:33 +08009093#ifdef TARGET_NR__sysctl
bellard31e31b82003-02-18 22:55:36 +00009094 case TARGET_NR__sysctl:
ths0da46a62007-10-20 20:23:07 +00009095 /* We don't implement this, but ENOTDIR is always a safe
bellard29e619b2004-09-13 21:41:04 +00009096 return value. */
ths0da46a62007-10-20 20:23:07 +00009097 ret = -TARGET_ENOTDIR;
9098 break;
Chen Gang704eff62015-08-21 05:37:33 +08009099#endif
Mike Frysinger737de1d2011-02-07 01:05:55 -05009100 case TARGET_NR_sched_getaffinity:
9101 {
9102 unsigned int mask_size;
9103 unsigned long *mask;
9104
9105 /*
9106 * sched_getaffinity needs multiples of ulong, so need to take
9107 * care of mismatches between target ulong and host ulong sizes.
9108 */
9109 if (arg2 & (sizeof(abi_ulong) - 1)) {
9110 ret = -TARGET_EINVAL;
9111 break;
9112 }
9113 mask_size = (arg2 + (sizeof(*mask) - 1)) & ~(sizeof(*mask) - 1);
9114
9115 mask = alloca(mask_size);
9116 ret = get_errno(sys_sched_getaffinity(arg1, mask_size, mask));
9117
9118 if (!is_error(ret)) {
Peter Maydellbe3bd282014-05-15 14:40:23 +01009119 if (ret > arg2) {
9120 /* More data returned than the caller's buffer will fit.
9121 * This only happens if sizeof(abi_long) < sizeof(long)
9122 * and the caller passed us a buffer holding an odd number
9123 * of abi_longs. If the host kernel is actually using the
9124 * extra 4 bytes then fail EINVAL; otherwise we can just
9125 * ignore them and only copy the interesting part.
9126 */
9127 int numcpus = sysconf(_SC_NPROCESSORS_CONF);
9128 if (numcpus > arg2 * 8) {
9129 ret = -TARGET_EINVAL;
9130 break;
9131 }
9132 ret = arg2;
9133 }
9134
Mike McCormackcd18f052011-04-18 14:43:36 +09009135 if (copy_to_user(arg3, mask, ret)) {
Mike Frysinger737de1d2011-02-07 01:05:55 -05009136 goto efault;
9137 }
Mike Frysinger737de1d2011-02-07 01:05:55 -05009138 }
9139 }
9140 break;
9141 case TARGET_NR_sched_setaffinity:
9142 {
9143 unsigned int mask_size;
9144 unsigned long *mask;
9145
9146 /*
9147 * sched_setaffinity needs multiples of ulong, so need to take
9148 * care of mismatches between target ulong and host ulong sizes.
9149 */
9150 if (arg2 & (sizeof(abi_ulong) - 1)) {
9151 ret = -TARGET_EINVAL;
9152 break;
9153 }
9154 mask_size = (arg2 + (sizeof(*mask) - 1)) & ~(sizeof(*mask) - 1);
9155
9156 mask = alloca(mask_size);
9157 if (!lock_user_struct(VERIFY_READ, p, arg3, 1)) {
9158 goto efault;
9159 }
9160 memcpy(mask, p, arg2);
9161 unlock_user_struct(p, arg2, 0);
9162
9163 ret = get_errno(sys_sched_setaffinity(arg1, mask_size, mask));
9164 }
9165 break;
bellard31e31b82003-02-18 22:55:36 +00009166 case TARGET_NR_sched_setparam:
bellard5cd43932003-03-29 16:54:36 +00009167 {
pbrook53a59602006-03-25 19:31:22 +00009168 struct sched_param *target_schp;
bellard5cd43932003-03-29 16:54:36 +00009169 struct sched_param schp;
pbrook53a59602006-03-25 19:31:22 +00009170
Tom Mustaa1d5c5b2014-08-12 13:53:38 -05009171 if (arg2 == 0) {
9172 return -TARGET_EINVAL;
9173 }
bellard579a97f2007-11-11 14:26:47 +00009174 if (!lock_user_struct(VERIFY_READ, target_schp, arg2, 1))
9175 goto efault;
bellard5cd43932003-03-29 16:54:36 +00009176 schp.sched_priority = tswap32(target_schp->sched_priority);
pbrook53a59602006-03-25 19:31:22 +00009177 unlock_user_struct(target_schp, arg2, 0);
bellard5cd43932003-03-29 16:54:36 +00009178 ret = get_errno(sched_setparam(arg1, &schp));
9179 }
9180 break;
bellard31e31b82003-02-18 22:55:36 +00009181 case TARGET_NR_sched_getparam:
bellard5cd43932003-03-29 16:54:36 +00009182 {
pbrook53a59602006-03-25 19:31:22 +00009183 struct sched_param *target_schp;
bellard5cd43932003-03-29 16:54:36 +00009184 struct sched_param schp;
Tom Mustaa1d5c5b2014-08-12 13:53:38 -05009185
9186 if (arg2 == 0) {
9187 return -TARGET_EINVAL;
9188 }
bellard5cd43932003-03-29 16:54:36 +00009189 ret = get_errno(sched_getparam(arg1, &schp));
9190 if (!is_error(ret)) {
bellard579a97f2007-11-11 14:26:47 +00009191 if (!lock_user_struct(VERIFY_WRITE, target_schp, arg2, 0))
9192 goto efault;
bellard5cd43932003-03-29 16:54:36 +00009193 target_schp->sched_priority = tswap32(schp.sched_priority);
pbrook53a59602006-03-25 19:31:22 +00009194 unlock_user_struct(target_schp, arg2, 1);
bellard5cd43932003-03-29 16:54:36 +00009195 }
9196 }
9197 break;
bellard31e31b82003-02-18 22:55:36 +00009198 case TARGET_NR_sched_setscheduler:
bellard5cd43932003-03-29 16:54:36 +00009199 {
pbrook53a59602006-03-25 19:31:22 +00009200 struct sched_param *target_schp;
bellard5cd43932003-03-29 16:54:36 +00009201 struct sched_param schp;
Tom Mustaa1d5c5b2014-08-12 13:53:38 -05009202 if (arg3 == 0) {
9203 return -TARGET_EINVAL;
9204 }
bellard579a97f2007-11-11 14:26:47 +00009205 if (!lock_user_struct(VERIFY_READ, target_schp, arg3, 1))
9206 goto efault;
bellard5cd43932003-03-29 16:54:36 +00009207 schp.sched_priority = tswap32(target_schp->sched_priority);
pbrook53a59602006-03-25 19:31:22 +00009208 unlock_user_struct(target_schp, arg3, 0);
bellard5cd43932003-03-29 16:54:36 +00009209 ret = get_errno(sched_setscheduler(arg1, arg2, &schp));
9210 }
9211 break;
bellard31e31b82003-02-18 22:55:36 +00009212 case TARGET_NR_sched_getscheduler:
bellard5cd43932003-03-29 16:54:36 +00009213 ret = get_errno(sched_getscheduler(arg1));
9214 break;
bellard31e31b82003-02-18 22:55:36 +00009215 case TARGET_NR_sched_yield:
9216 ret = get_errno(sched_yield());
9217 break;
9218 case TARGET_NR_sched_get_priority_max:
bellard5cd43932003-03-29 16:54:36 +00009219 ret = get_errno(sched_get_priority_max(arg1));
9220 break;
bellard31e31b82003-02-18 22:55:36 +00009221 case TARGET_NR_sched_get_priority_min:
bellard5cd43932003-03-29 16:54:36 +00009222 ret = get_errno(sched_get_priority_min(arg1));
9223 break;
bellard31e31b82003-02-18 22:55:36 +00009224 case TARGET_NR_sched_rr_get_interval:
bellard5cd43932003-03-29 16:54:36 +00009225 {
bellard5cd43932003-03-29 16:54:36 +00009226 struct timespec ts;
9227 ret = get_errno(sched_rr_get_interval(arg1, &ts));
9228 if (!is_error(ret)) {
Tom Mustad4290c42014-08-12 13:53:39 -05009229 ret = host_to_target_timespec(arg2, &ts);
bellard5cd43932003-03-29 16:54:36 +00009230 }
9231 }
9232 break;
bellard31e31b82003-02-18 22:55:36 +00009233 case TARGET_NR_nanosleep:
bellard1b6b0292003-03-22 17:31:38 +00009234 {
bellard1b6b0292003-03-22 17:31:38 +00009235 struct timespec req, rem;
pbrook53a59602006-03-25 19:31:22 +00009236 target_to_host_timespec(&req, arg1);
Peter Maydell9e518222016-06-06 19:58:09 +01009237 ret = get_errno(safe_nanosleep(&req, &rem));
pbrook53a59602006-03-25 19:31:22 +00009238 if (is_error(ret) && arg2) {
9239 host_to_target_timespec(arg2, &rem);
bellard1b6b0292003-03-22 17:31:38 +00009240 }
9241 }
9242 break;
thse5febef2007-04-01 18:31:35 +00009243#ifdef TARGET_NR_query_module
bellard31e31b82003-02-18 22:55:36 +00009244 case TARGET_NR_query_module:
bellard5cd43932003-03-29 16:54:36 +00009245 goto unimplemented;
thse5febef2007-04-01 18:31:35 +00009246#endif
9247#ifdef TARGET_NR_nfsservctl
bellard31e31b82003-02-18 22:55:36 +00009248 case TARGET_NR_nfsservctl:
bellard5cd43932003-03-29 16:54:36 +00009249 goto unimplemented;
thse5febef2007-04-01 18:31:35 +00009250#endif
bellard31e31b82003-02-18 22:55:36 +00009251 case TARGET_NR_prctl:
Peter Maydell1e6722f2012-02-03 14:48:03 +00009252 switch (arg1) {
9253 case PR_GET_PDEATHSIG:
9254 {
9255 int deathsig;
9256 ret = get_errno(prctl(arg1, &deathsig, arg3, arg4, arg5));
9257 if (!is_error(ret) && arg2
9258 && put_user_ual(deathsig, arg2)) {
9259 goto efault;
thse5574482007-02-11 20:03:13 +00009260 }
Peter Maydell1e6722f2012-02-03 14:48:03 +00009261 break;
9262 }
Peter Maydelldb9526b2012-02-03 14:48:03 +00009263#ifdef PR_GET_NAME
9264 case PR_GET_NAME:
9265 {
9266 void *name = lock_user(VERIFY_WRITE, arg2, 16, 1);
9267 if (!name) {
9268 goto efault;
9269 }
9270 ret = get_errno(prctl(arg1, (unsigned long)name,
9271 arg3, arg4, arg5));
9272 unlock_user(name, arg2, 16);
9273 break;
9274 }
9275 case PR_SET_NAME:
9276 {
9277 void *name = lock_user(VERIFY_READ, arg2, 16, 1);
9278 if (!name) {
9279 goto efault;
9280 }
9281 ret = get_errno(prctl(arg1, (unsigned long)name,
9282 arg3, arg4, arg5));
9283 unlock_user(name, arg2, 0);
9284 break;
9285 }
9286#endif
Peter Maydell1e6722f2012-02-03 14:48:03 +00009287 default:
9288 /* Most prctl options have no pointer arguments */
9289 ret = get_errno(prctl(arg1, arg2, arg3, arg4, arg5));
9290 break;
9291 }
ths39b9aae2007-02-11 18:36:44 +00009292 break;
bellardd2fd1af2007-11-14 18:08:56 +00009293#ifdef TARGET_NR_arch_prctl
9294 case TARGET_NR_arch_prctl:
9295#if defined(TARGET_I386) && !defined(TARGET_ABI32)
9296 ret = do_arch_prctl(cpu_env, arg1, arg2);
9297 break;
9298#else
9299 goto unimplemented;
9300#endif
9301#endif
aurel32f2c7ba12008-03-28 22:32:06 +00009302#ifdef TARGET_NR_pread64
9303 case TARGET_NR_pread64:
Alexander Grafae017a52012-09-29 15:32:39 +00009304 if (regpairs_aligned(cpu_env)) {
9305 arg4 = arg5;
9306 arg5 = arg6;
9307 }
aurel32f2c7ba12008-03-28 22:32:06 +00009308 if (!(p = lock_user(VERIFY_WRITE, arg2, arg3, 0)))
9309 goto efault;
9310 ret = get_errno(pread64(arg1, p, arg3, target_offset64(arg4, arg5)));
9311 unlock_user(p, arg2, ret);
9312 break;
9313 case TARGET_NR_pwrite64:
Alexander Grafae017a52012-09-29 15:32:39 +00009314 if (regpairs_aligned(cpu_env)) {
9315 arg4 = arg5;
9316 arg5 = arg6;
9317 }
aurel32f2c7ba12008-03-28 22:32:06 +00009318 if (!(p = lock_user(VERIFY_READ, arg2, arg3, 1)))
9319 goto efault;
9320 ret = get_errno(pwrite64(arg1, p, arg3, target_offset64(arg4, arg5)));
9321 unlock_user(p, arg2, 0);
9322 break;
9323#endif
bellard31e31b82003-02-18 22:55:36 +00009324 case TARGET_NR_getcwd:
bellard579a97f2007-11-11 14:26:47 +00009325 if (!(p = lock_user(VERIFY_WRITE, arg1, arg2, 0)))
9326 goto efault;
pbrook53a59602006-03-25 19:31:22 +00009327 ret = get_errno(sys_getcwd1(p, arg2));
9328 unlock_user(p, arg1, ret);
bellard31e31b82003-02-18 22:55:36 +00009329 break;
9330 case TARGET_NR_capget:
9331 case TARGET_NR_capset:
Peter Maydelle0eb2102014-03-17 12:15:35 +00009332 {
9333 struct target_user_cap_header *target_header;
9334 struct target_user_cap_data *target_data = NULL;
9335 struct __user_cap_header_struct header;
9336 struct __user_cap_data_struct data[2];
9337 struct __user_cap_data_struct *dataptr = NULL;
9338 int i, target_datalen;
9339 int data_items = 1;
9340
9341 if (!lock_user_struct(VERIFY_WRITE, target_header, arg1, 1)) {
9342 goto efault;
9343 }
9344 header.version = tswap32(target_header->version);
9345 header.pid = tswap32(target_header->pid);
9346
Peter Maydellec864872014-03-19 16:07:30 +00009347 if (header.version != _LINUX_CAPABILITY_VERSION) {
Peter Maydelle0eb2102014-03-17 12:15:35 +00009348 /* Version 2 and up takes pointer to two user_data structs */
9349 data_items = 2;
9350 }
9351
9352 target_datalen = sizeof(*target_data) * data_items;
9353
9354 if (arg2) {
9355 if (num == TARGET_NR_capget) {
9356 target_data = lock_user(VERIFY_WRITE, arg2, target_datalen, 0);
9357 } else {
9358 target_data = lock_user(VERIFY_READ, arg2, target_datalen, 1);
9359 }
9360 if (!target_data) {
9361 unlock_user_struct(target_header, arg1, 0);
9362 goto efault;
9363 }
9364
9365 if (num == TARGET_NR_capset) {
9366 for (i = 0; i < data_items; i++) {
9367 data[i].effective = tswap32(target_data[i].effective);
9368 data[i].permitted = tswap32(target_data[i].permitted);
9369 data[i].inheritable = tswap32(target_data[i].inheritable);
9370 }
9371 }
9372
9373 dataptr = data;
9374 }
9375
9376 if (num == TARGET_NR_capget) {
9377 ret = get_errno(capget(&header, dataptr));
9378 } else {
9379 ret = get_errno(capset(&header, dataptr));
9380 }
9381
9382 /* The kernel always updates version for both capget and capset */
9383 target_header->version = tswap32(header.version);
9384 unlock_user_struct(target_header, arg1, 1);
9385
9386 if (arg2) {
9387 if (num == TARGET_NR_capget) {
9388 for (i = 0; i < data_items; i++) {
9389 target_data[i].effective = tswap32(data[i].effective);
9390 target_data[i].permitted = tswap32(data[i].permitted);
9391 target_data[i].inheritable = tswap32(data[i].inheritable);
9392 }
9393 unlock_user(target_data, arg2, target_datalen);
9394 } else {
9395 unlock_user(target_data, arg2, 0);
9396 }
9397 }
9398 break;
9399 }
bellard31e31b82003-02-18 22:55:36 +00009400 case TARGET_NR_sigaltstack:
Andreas Färber9349b4f2012-03-14 01:38:32 +01009401 ret = do_sigaltstack(arg1, arg2, get_sp_from_cpustate((CPUArchState *)cpu_env));
thsa04e1342007-09-27 13:57:58 +00009402 break;
Peter Maydella8fd1ab2013-02-08 07:31:55 +00009403
9404#ifdef CONFIG_SENDFILE
bellard31e31b82003-02-18 22:55:36 +00009405 case TARGET_NR_sendfile:
Peter Maydella8fd1ab2013-02-08 07:31:55 +00009406 {
9407 off_t *offp = NULL;
9408 off_t off;
9409 if (arg3) {
9410 ret = get_user_sal(off, arg3);
9411 if (is_error(ret)) {
9412 break;
9413 }
9414 offp = &off;
9415 }
9416 ret = get_errno(sendfile(arg1, arg2, offp, arg4));
9417 if (!is_error(ret) && arg3) {
9418 abi_long ret2 = put_user_sal(off, arg3);
9419 if (is_error(ret2)) {
9420 ret = ret2;
9421 }
9422 }
9423 break;
9424 }
9425#ifdef TARGET_NR_sendfile64
9426 case TARGET_NR_sendfile64:
9427 {
9428 off_t *offp = NULL;
9429 off_t off;
9430 if (arg3) {
9431 ret = get_user_s64(off, arg3);
9432 if (is_error(ret)) {
9433 break;
9434 }
9435 offp = &off;
9436 }
9437 ret = get_errno(sendfile(arg1, arg2, offp, arg4));
9438 if (!is_error(ret) && arg3) {
9439 abi_long ret2 = put_user_s64(off, arg3);
9440 if (is_error(ret2)) {
9441 ret = ret2;
9442 }
9443 }
9444 break;
9445 }
9446#endif
9447#else
9448 case TARGET_NR_sendfile:
Peter Maydell7edd2cf2013-04-21 13:30:03 +01009449#ifdef TARGET_NR_sendfile64
Peter Maydella8fd1ab2013-02-08 07:31:55 +00009450 case TARGET_NR_sendfile64:
9451#endif
bellard5cd43932003-03-29 16:54:36 +00009452 goto unimplemented;
Peter Maydella8fd1ab2013-02-08 07:31:55 +00009453#endif
9454
bellardebc05482003-09-30 21:08:41 +00009455#ifdef TARGET_NR_getpmsg
bellard31e31b82003-02-18 22:55:36 +00009456 case TARGET_NR_getpmsg:
bellard5cd43932003-03-29 16:54:36 +00009457 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00009458#endif
9459#ifdef TARGET_NR_putpmsg
bellard31e31b82003-02-18 22:55:36 +00009460 case TARGET_NR_putpmsg:
bellard5cd43932003-03-29 16:54:36 +00009461 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +00009462#endif
bellard048f6b42005-11-26 18:47:20 +00009463#ifdef TARGET_NR_vfork
bellard31e31b82003-02-18 22:55:36 +00009464 case TARGET_NR_vfork:
pbrookd865bab2008-06-07 22:12:17 +00009465 ret = get_errno(do_fork(cpu_env, CLONE_VFORK | CLONE_VM | SIGCHLD,
9466 0, 0, 0, 0));
bellard31e31b82003-02-18 22:55:36 +00009467 break;
bellard048f6b42005-11-26 18:47:20 +00009468#endif
bellardebc05482003-09-30 21:08:41 +00009469#ifdef TARGET_NR_ugetrlimit
bellard31e31b82003-02-18 22:55:36 +00009470 case TARGET_NR_ugetrlimit:
bellard728584b2003-04-29 20:43:36 +00009471 {
9472 struct rlimit rlim;
Wesley W. Terpstrae22b7012011-07-12 14:42:00 +03009473 int resource = target_to_host_resource(arg1);
9474 ret = get_errno(getrlimit(resource, &rlim));
bellard728584b2003-04-29 20:43:36 +00009475 if (!is_error(ret)) {
pbrook53a59602006-03-25 19:31:22 +00009476 struct target_rlimit *target_rlim;
bellard579a97f2007-11-11 14:26:47 +00009477 if (!lock_user_struct(VERIFY_WRITE, target_rlim, arg2, 0))
9478 goto efault;
takasi-y@ops.dti.ne.jp81bbe902010-04-12 04:07:35 +09009479 target_rlim->rlim_cur = host_to_target_rlim(rlim.rlim_cur);
9480 target_rlim->rlim_max = host_to_target_rlim(rlim.rlim_max);
pbrook53a59602006-03-25 19:31:22 +00009481 unlock_user_struct(target_rlim, arg2, 1);
bellard728584b2003-04-29 20:43:36 +00009482 }
9483 break;
9484 }
bellardebc05482003-09-30 21:08:41 +00009485#endif
bellarda315a142005-01-30 22:59:18 +00009486#ifdef TARGET_NR_truncate64
bellard31e31b82003-02-18 22:55:36 +00009487 case TARGET_NR_truncate64:
bellard579a97f2007-11-11 14:26:47 +00009488 if (!(p = lock_user_string(arg1)))
9489 goto efault;
pbrook53a59602006-03-25 19:31:22 +00009490 ret = target_truncate64(cpu_env, p, arg2, arg3, arg4);
9491 unlock_user(p, arg1, 0);
bellard667f38b2005-07-23 14:46:27 +00009492 break;
bellarda315a142005-01-30 22:59:18 +00009493#endif
9494#ifdef TARGET_NR_ftruncate64
bellard31e31b82003-02-18 22:55:36 +00009495 case TARGET_NR_ftruncate64:
pbrookce4defa2006-02-09 16:49:55 +00009496 ret = target_ftruncate64(cpu_env, arg1, arg2, arg3, arg4);
bellard667f38b2005-07-23 14:46:27 +00009497 break;
bellarda315a142005-01-30 22:59:18 +00009498#endif
9499#ifdef TARGET_NR_stat64
bellard31e31b82003-02-18 22:55:36 +00009500 case TARGET_NR_stat64:
bellard579a97f2007-11-11 14:26:47 +00009501 if (!(p = lock_user_string(arg1)))
9502 goto efault;
pbrook53a59602006-03-25 19:31:22 +00009503 ret = get_errno(stat(path(p), &st));
9504 unlock_user(p, arg1, 0);
balrog6a24a772008-09-20 02:23:36 +00009505 if (!is_error(ret))
9506 ret = host_to_target_stat64(cpu_env, arg2, &st);
9507 break;
bellarda315a142005-01-30 22:59:18 +00009508#endif
9509#ifdef TARGET_NR_lstat64
bellard31e31b82003-02-18 22:55:36 +00009510 case TARGET_NR_lstat64:
bellard579a97f2007-11-11 14:26:47 +00009511 if (!(p = lock_user_string(arg1)))
9512 goto efault;
pbrook53a59602006-03-25 19:31:22 +00009513 ret = get_errno(lstat(path(p), &st));
9514 unlock_user(p, arg1, 0);
balrog6a24a772008-09-20 02:23:36 +00009515 if (!is_error(ret))
9516 ret = host_to_target_stat64(cpu_env, arg2, &st);
9517 break;
bellarda315a142005-01-30 22:59:18 +00009518#endif
9519#ifdef TARGET_NR_fstat64
bellard31e31b82003-02-18 22:55:36 +00009520 case TARGET_NR_fstat64:
balrog6a24a772008-09-20 02:23:36 +00009521 ret = get_errno(fstat(arg1, &st));
9522 if (!is_error(ret))
9523 ret = host_to_target_stat64(cpu_env, arg2, &st);
9524 break;
bellardec86b0f2003-04-11 00:15:04 +00009525#endif
Peter Maydellc0d472b2013-06-12 16:20:21 +01009526#if (defined(TARGET_NR_fstatat64) || defined(TARGET_NR_newfstatat))
aurel329d33b762009-04-08 23:07:05 +00009527#ifdef TARGET_NR_fstatat64
balrog6a24a772008-09-20 02:23:36 +00009528 case TARGET_NR_fstatat64:
aurel329d33b762009-04-08 23:07:05 +00009529#endif
9530#ifdef TARGET_NR_newfstatat
9531 case TARGET_NR_newfstatat:
9532#endif
balrog6a24a772008-09-20 02:23:36 +00009533 if (!(p = lock_user_string(arg2)))
9534 goto efault;
Peter Maydellc0d472b2013-06-12 16:20:21 +01009535 ret = get_errno(fstatat(arg1, path(p), &st, arg4));
balrog6a24a772008-09-20 02:23:36 +00009536 if (!is_error(ret))
9537 ret = host_to_target_stat64(cpu_env, arg3, &st);
bellard60cd49d2003-03-16 22:53:56 +00009538 break;
bellarda315a142005-01-30 22:59:18 +00009539#endif
Chen Gang704eff62015-08-21 05:37:33 +08009540#ifdef TARGET_NR_lchown
bellard67867302003-11-23 17:05:30 +00009541 case TARGET_NR_lchown:
bellard579a97f2007-11-11 14:26:47 +00009542 if (!(p = lock_user_string(arg1)))
9543 goto efault;
pbrook53a59602006-03-25 19:31:22 +00009544 ret = get_errno(lchown(p, low2highuid(arg2), low2highgid(arg3)));
9545 unlock_user(p, arg1, 0);
bellard67867302003-11-23 17:05:30 +00009546 break;
Chen Gang704eff62015-08-21 05:37:33 +08009547#endif
Riku Voipio0c866a72011-04-18 15:23:06 +03009548#ifdef TARGET_NR_getuid
bellard67867302003-11-23 17:05:30 +00009549 case TARGET_NR_getuid:
9550 ret = get_errno(high2lowuid(getuid()));
9551 break;
Riku Voipio0c866a72011-04-18 15:23:06 +03009552#endif
9553#ifdef TARGET_NR_getgid
bellard67867302003-11-23 17:05:30 +00009554 case TARGET_NR_getgid:
9555 ret = get_errno(high2lowgid(getgid()));
9556 break;
Riku Voipio0c866a72011-04-18 15:23:06 +03009557#endif
9558#ifdef TARGET_NR_geteuid
bellard67867302003-11-23 17:05:30 +00009559 case TARGET_NR_geteuid:
9560 ret = get_errno(high2lowuid(geteuid()));
9561 break;
Riku Voipio0c866a72011-04-18 15:23:06 +03009562#endif
9563#ifdef TARGET_NR_getegid
bellard67867302003-11-23 17:05:30 +00009564 case TARGET_NR_getegid:
9565 ret = get_errno(high2lowgid(getegid()));
9566 break;
Riku Voipio0c866a72011-04-18 15:23:06 +03009567#endif
bellard67867302003-11-23 17:05:30 +00009568 case TARGET_NR_setreuid:
9569 ret = get_errno(setreuid(low2highuid(arg1), low2highuid(arg2)));
9570 break;
9571 case TARGET_NR_setregid:
9572 ret = get_errno(setregid(low2highgid(arg1), low2highgid(arg2)));
9573 break;
9574 case TARGET_NR_getgroups:
9575 {
9576 int gidsetsize = arg1;
Riku Voipio0c866a72011-04-18 15:23:06 +03009577 target_id *target_grouplist;
bellard67867302003-11-23 17:05:30 +00009578 gid_t *grouplist;
9579 int i;
9580
9581 grouplist = alloca(gidsetsize * sizeof(gid_t));
9582 ret = get_errno(getgroups(gidsetsize, grouplist));
balrogcb3bc232008-09-20 02:08:13 +00009583 if (gidsetsize == 0)
9584 break;
bellard67867302003-11-23 17:05:30 +00009585 if (!is_error(ret)) {
Andreas Schwab03903ff2013-04-09 05:41:33 +00009586 target_grouplist = lock_user(VERIFY_WRITE, arg2, gidsetsize * sizeof(target_id), 0);
bellard579a97f2007-11-11 14:26:47 +00009587 if (!target_grouplist)
9588 goto efault;
balroga2155fc2008-09-20 02:12:08 +00009589 for(i = 0;i < ret; i++)
Riku Voipio0c866a72011-04-18 15:23:06 +03009590 target_grouplist[i] = tswapid(high2lowgid(grouplist[i]));
Andreas Schwab03903ff2013-04-09 05:41:33 +00009591 unlock_user(target_grouplist, arg2, gidsetsize * sizeof(target_id));
bellard67867302003-11-23 17:05:30 +00009592 }
9593 }
9594 break;
9595 case TARGET_NR_setgroups:
9596 {
9597 int gidsetsize = arg1;
Riku Voipio0c866a72011-04-18 15:23:06 +03009598 target_id *target_grouplist;
Dillon Amburgeyf2b79ce2013-02-02 18:04:48 -05009599 gid_t *grouplist = NULL;
bellard67867302003-11-23 17:05:30 +00009600 int i;
Dillon Amburgeyf2b79ce2013-02-02 18:04:48 -05009601 if (gidsetsize) {
9602 grouplist = alloca(gidsetsize * sizeof(gid_t));
Andreas Schwab03903ff2013-04-09 05:41:33 +00009603 target_grouplist = lock_user(VERIFY_READ, arg2, gidsetsize * sizeof(target_id), 1);
Dillon Amburgeyf2b79ce2013-02-02 18:04:48 -05009604 if (!target_grouplist) {
9605 ret = -TARGET_EFAULT;
9606 goto fail;
9607 }
9608 for (i = 0; i < gidsetsize; i++) {
9609 grouplist[i] = low2highgid(tswapid(target_grouplist[i]));
9610 }
9611 unlock_user(target_grouplist, arg2, 0);
bellard579a97f2007-11-11 14:26:47 +00009612 }
bellard67867302003-11-23 17:05:30 +00009613 ret = get_errno(setgroups(gidsetsize, grouplist));
9614 }
9615 break;
9616 case TARGET_NR_fchown:
9617 ret = get_errno(fchown(arg1, low2highuid(arg2), low2highgid(arg3)));
9618 break;
Peter Maydellc0d472b2013-06-12 16:20:21 +01009619#if defined(TARGET_NR_fchownat)
thsccfa72b2007-09-24 09:23:34 +00009620 case TARGET_NR_fchownat:
bellard579a97f2007-11-11 14:26:47 +00009621 if (!(p = lock_user_string(arg2)))
9622 goto efault;
Peter Maydellc0d472b2013-06-12 16:20:21 +01009623 ret = get_errno(fchownat(arg1, p, low2highuid(arg3),
9624 low2highgid(arg4), arg5));
bellard579a97f2007-11-11 14:26:47 +00009625 unlock_user(p, arg2, 0);
thsccfa72b2007-09-24 09:23:34 +00009626 break;
9627#endif
bellard67867302003-11-23 17:05:30 +00009628#ifdef TARGET_NR_setresuid
9629 case TARGET_NR_setresuid:
Peter Maydellfd6f7792016-03-01 16:33:02 +00009630 ret = get_errno(sys_setresuid(low2highuid(arg1),
9631 low2highuid(arg2),
9632 low2highuid(arg3)));
bellard67867302003-11-23 17:05:30 +00009633 break;
9634#endif
9635#ifdef TARGET_NR_getresuid
9636 case TARGET_NR_getresuid:
9637 {
pbrook53a59602006-03-25 19:31:22 +00009638 uid_t ruid, euid, suid;
bellard67867302003-11-23 17:05:30 +00009639 ret = get_errno(getresuid(&ruid, &euid, &suid));
9640 if (!is_error(ret)) {
Peter Maydell76ca3102014-03-02 19:36:41 +00009641 if (put_user_id(high2lowuid(ruid), arg1)
9642 || put_user_id(high2lowuid(euid), arg2)
9643 || put_user_id(high2lowuid(suid), arg3))
bellard2f619692007-11-16 10:46:05 +00009644 goto efault;
bellard67867302003-11-23 17:05:30 +00009645 }
9646 }
9647 break;
9648#endif
9649#ifdef TARGET_NR_getresgid
9650 case TARGET_NR_setresgid:
Peter Maydellfd6f7792016-03-01 16:33:02 +00009651 ret = get_errno(sys_setresgid(low2highgid(arg1),
9652 low2highgid(arg2),
9653 low2highgid(arg3)));
bellard67867302003-11-23 17:05:30 +00009654 break;
9655#endif
9656#ifdef TARGET_NR_getresgid
9657 case TARGET_NR_getresgid:
9658 {
pbrook53a59602006-03-25 19:31:22 +00009659 gid_t rgid, egid, sgid;
bellard67867302003-11-23 17:05:30 +00009660 ret = get_errno(getresgid(&rgid, &egid, &sgid));
9661 if (!is_error(ret)) {
Peter Maydell76ca3102014-03-02 19:36:41 +00009662 if (put_user_id(high2lowgid(rgid), arg1)
9663 || put_user_id(high2lowgid(egid), arg2)
9664 || put_user_id(high2lowgid(sgid), arg3))
bellard2f619692007-11-16 10:46:05 +00009665 goto efault;
bellard67867302003-11-23 17:05:30 +00009666 }
9667 }
9668 break;
9669#endif
Chen Gang704eff62015-08-21 05:37:33 +08009670#ifdef TARGET_NR_chown
bellard67867302003-11-23 17:05:30 +00009671 case TARGET_NR_chown:
bellard579a97f2007-11-11 14:26:47 +00009672 if (!(p = lock_user_string(arg1)))
9673 goto efault;
pbrook53a59602006-03-25 19:31:22 +00009674 ret = get_errno(chown(p, low2highuid(arg2), low2highgid(arg3)));
9675 unlock_user(p, arg1, 0);
bellard67867302003-11-23 17:05:30 +00009676 break;
Chen Gang704eff62015-08-21 05:37:33 +08009677#endif
bellard67867302003-11-23 17:05:30 +00009678 case TARGET_NR_setuid:
Peter Maydellfd6f7792016-03-01 16:33:02 +00009679 ret = get_errno(sys_setuid(low2highuid(arg1)));
bellard67867302003-11-23 17:05:30 +00009680 break;
9681 case TARGET_NR_setgid:
Peter Maydellfd6f7792016-03-01 16:33:02 +00009682 ret = get_errno(sys_setgid(low2highgid(arg1)));
bellard67867302003-11-23 17:05:30 +00009683 break;
9684 case TARGET_NR_setfsuid:
9685 ret = get_errno(setfsuid(arg1));
9686 break;
9687 case TARGET_NR_setfsgid:
9688 ret = get_errno(setfsgid(arg1));
9689 break;
bellard67867302003-11-23 17:05:30 +00009690
bellarda315a142005-01-30 22:59:18 +00009691#ifdef TARGET_NR_lchown32
bellard31e31b82003-02-18 22:55:36 +00009692 case TARGET_NR_lchown32:
bellard579a97f2007-11-11 14:26:47 +00009693 if (!(p = lock_user_string(arg1)))
9694 goto efault;
pbrook53a59602006-03-25 19:31:22 +00009695 ret = get_errno(lchown(p, arg2, arg3));
9696 unlock_user(p, arg1, 0);
bellardb03c60f2003-03-23 17:19:56 +00009697 break;
bellarda315a142005-01-30 22:59:18 +00009698#endif
9699#ifdef TARGET_NR_getuid32
bellard31e31b82003-02-18 22:55:36 +00009700 case TARGET_NR_getuid32:
bellardb03c60f2003-03-23 17:19:56 +00009701 ret = get_errno(getuid());
9702 break;
bellarda315a142005-01-30 22:59:18 +00009703#endif
aurel3264b4d282008-11-14 17:20:15 +00009704
9705#if defined(TARGET_NR_getxuid) && defined(TARGET_ALPHA)
9706 /* Alpha specific */
9707 case TARGET_NR_getxuid:
Richard Hendersonba0e2762009-12-09 15:56:29 -08009708 {
9709 uid_t euid;
9710 euid=geteuid();
9711 ((CPUAlphaState *)cpu_env)->ir[IR_A4]=euid;
9712 }
aurel3264b4d282008-11-14 17:20:15 +00009713 ret = get_errno(getuid());
9714 break;
9715#endif
9716#if defined(TARGET_NR_getxgid) && defined(TARGET_ALPHA)
9717 /* Alpha specific */
9718 case TARGET_NR_getxgid:
Richard Hendersonba0e2762009-12-09 15:56:29 -08009719 {
9720 uid_t egid;
9721 egid=getegid();
9722 ((CPUAlphaState *)cpu_env)->ir[IR_A4]=egid;
9723 }
aurel3264b4d282008-11-14 17:20:15 +00009724 ret = get_errno(getgid());
9725 break;
9726#endif
Richard Hendersonba0e2762009-12-09 15:56:29 -08009727#if defined(TARGET_NR_osf_getsysinfo) && defined(TARGET_ALPHA)
9728 /* Alpha specific */
9729 case TARGET_NR_osf_getsysinfo:
9730 ret = -TARGET_EOPNOTSUPP;
9731 switch (arg1) {
9732 case TARGET_GSI_IEEE_FP_CONTROL:
9733 {
9734 uint64_t swcr, fpcr = cpu_alpha_load_fpcr (cpu_env);
9735
9736 /* Copied from linux ieee_fpcr_to_swcr. */
9737 swcr = (fpcr >> 35) & SWCR_STATUS_MASK;
9738 swcr |= (fpcr >> 36) & SWCR_MAP_DMZ;
9739 swcr |= (~fpcr >> 48) & (SWCR_TRAP_ENABLE_INV
9740 | SWCR_TRAP_ENABLE_DZE
9741 | SWCR_TRAP_ENABLE_OVF);
9742 swcr |= (~fpcr >> 57) & (SWCR_TRAP_ENABLE_UNF
9743 | SWCR_TRAP_ENABLE_INE);
9744 swcr |= (fpcr >> 47) & SWCR_MAP_UMZ;
9745 swcr |= (~fpcr >> 41) & SWCR_TRAP_ENABLE_DNO;
9746
9747 if (put_user_u64 (swcr, arg2))
9748 goto efault;
9749 ret = 0;
9750 }
9751 break;
9752
9753 /* case GSI_IEEE_STATE_AT_SIGNAL:
9754 -- Not implemented in linux kernel.
9755 case GSI_UACPROC:
9756 -- Retrieves current unaligned access state; not much used.
9757 case GSI_PROC_TYPE:
9758 -- Retrieves implver information; surely not used.
9759 case GSI_GET_HWRPB:
9760 -- Grabs a copy of the HWRPB; surely not used.
9761 */
9762 }
9763 break;
9764#endif
9765#if defined(TARGET_NR_osf_setsysinfo) && defined(TARGET_ALPHA)
9766 /* Alpha specific */
9767 case TARGET_NR_osf_setsysinfo:
9768 ret = -TARGET_EOPNOTSUPP;
9769 switch (arg1) {
9770 case TARGET_SSI_IEEE_FP_CONTROL:
Richard Hendersonba0e2762009-12-09 15:56:29 -08009771 {
9772 uint64_t swcr, fpcr, orig_fpcr;
9773
Richard Henderson6e06d512012-06-01 09:08:21 -07009774 if (get_user_u64 (swcr, arg2)) {
Richard Hendersonba0e2762009-12-09 15:56:29 -08009775 goto efault;
Richard Henderson6e06d512012-06-01 09:08:21 -07009776 }
9777 orig_fpcr = cpu_alpha_load_fpcr(cpu_env);
Richard Hendersonba0e2762009-12-09 15:56:29 -08009778 fpcr = orig_fpcr & FPCR_DYN_MASK;
9779
9780 /* Copied from linux ieee_swcr_to_fpcr. */
9781 fpcr |= (swcr & SWCR_STATUS_MASK) << 35;
9782 fpcr |= (swcr & SWCR_MAP_DMZ) << 36;
9783 fpcr |= (~swcr & (SWCR_TRAP_ENABLE_INV
9784 | SWCR_TRAP_ENABLE_DZE
9785 | SWCR_TRAP_ENABLE_OVF)) << 48;
9786 fpcr |= (~swcr & (SWCR_TRAP_ENABLE_UNF
9787 | SWCR_TRAP_ENABLE_INE)) << 57;
9788 fpcr |= (swcr & SWCR_MAP_UMZ ? FPCR_UNDZ | FPCR_UNFD : 0);
9789 fpcr |= (~swcr & SWCR_TRAP_ENABLE_DNO) << 41;
9790
Richard Henderson6e06d512012-06-01 09:08:21 -07009791 cpu_alpha_store_fpcr(cpu_env, fpcr);
9792 ret = 0;
9793 }
9794 break;
9795
9796 case TARGET_SSI_IEEE_RAISE_EXCEPTION:
9797 {
9798 uint64_t exc, fpcr, orig_fpcr;
9799 int si_code;
9800
9801 if (get_user_u64(exc, arg2)) {
9802 goto efault;
9803 }
9804
9805 orig_fpcr = cpu_alpha_load_fpcr(cpu_env);
9806
9807 /* We only add to the exception status here. */
9808 fpcr = orig_fpcr | ((exc & SWCR_STATUS_MASK) << 35);
9809
9810 cpu_alpha_store_fpcr(cpu_env, fpcr);
Richard Hendersonba0e2762009-12-09 15:56:29 -08009811 ret = 0;
9812
Richard Henderson6e06d512012-06-01 09:08:21 -07009813 /* Old exceptions are not signaled. */
9814 fpcr &= ~(orig_fpcr & FPCR_STATUS_MASK);
Richard Hendersonba0e2762009-12-09 15:56:29 -08009815
Richard Henderson6e06d512012-06-01 09:08:21 -07009816 /* If any exceptions set by this call,
9817 and are unmasked, send a signal. */
9818 si_code = 0;
9819 if ((fpcr & (FPCR_INE | FPCR_INED)) == FPCR_INE) {
9820 si_code = TARGET_FPE_FLTRES;
9821 }
9822 if ((fpcr & (FPCR_UNF | FPCR_UNFD)) == FPCR_UNF) {
9823 si_code = TARGET_FPE_FLTUND;
9824 }
9825 if ((fpcr & (FPCR_OVF | FPCR_OVFD)) == FPCR_OVF) {
9826 si_code = TARGET_FPE_FLTOVF;
9827 }
9828 if ((fpcr & (FPCR_DZE | FPCR_DZED)) == FPCR_DZE) {
9829 si_code = TARGET_FPE_FLTDIV;
9830 }
9831 if ((fpcr & (FPCR_INV | FPCR_INVD)) == FPCR_INV) {
9832 si_code = TARGET_FPE_FLTINV;
9833 }
9834 if (si_code != 0) {
9835 target_siginfo_t info;
9836 info.si_signo = SIGFPE;
9837 info.si_errno = 0;
9838 info.si_code = si_code;
9839 info._sifields._sigfault._addr
9840 = ((CPUArchState *)cpu_env)->pc;
9841 queue_signal((CPUArchState *)cpu_env, info.si_signo, &info);
Richard Hendersonba0e2762009-12-09 15:56:29 -08009842 }
9843 }
9844 break;
9845
9846 /* case SSI_NVPAIRS:
9847 -- Used with SSIN_UACPROC to enable unaligned accesses.
9848 case SSI_IEEE_STATE_AT_SIGNAL:
9849 case SSI_IEEE_IGNORE_STATE_AT_SIGNAL:
9850 -- Not implemented in linux kernel
9851 */
9852 }
9853 break;
9854#endif
9855#ifdef TARGET_NR_osf_sigprocmask
9856 /* Alpha specific. */
9857 case TARGET_NR_osf_sigprocmask:
9858 {
9859 abi_ulong mask;
Juan Quintelabc088ba2011-06-16 17:37:10 +01009860 int how;
Richard Hendersonba0e2762009-12-09 15:56:29 -08009861 sigset_t set, oldset;
9862
9863 switch(arg1) {
9864 case TARGET_SIG_BLOCK:
9865 how = SIG_BLOCK;
9866 break;
9867 case TARGET_SIG_UNBLOCK:
9868 how = SIG_UNBLOCK;
9869 break;
9870 case TARGET_SIG_SETMASK:
9871 how = SIG_SETMASK;
9872 break;
9873 default:
9874 ret = -TARGET_EINVAL;
9875 goto fail;
9876 }
9877 mask = arg2;
9878 target_to_host_old_sigset(&set, &mask);
Peter Maydell3d3efba2016-05-27 15:51:49 +01009879 ret = do_sigprocmask(how, &set, &oldset);
9880 if (!ret) {
9881 host_to_target_old_sigset(&mask, &oldset);
9882 ret = mask;
9883 }
Richard Hendersonba0e2762009-12-09 15:56:29 -08009884 }
9885 break;
9886#endif
aurel3264b4d282008-11-14 17:20:15 +00009887
bellarda315a142005-01-30 22:59:18 +00009888#ifdef TARGET_NR_getgid32
bellard31e31b82003-02-18 22:55:36 +00009889 case TARGET_NR_getgid32:
bellardb03c60f2003-03-23 17:19:56 +00009890 ret = get_errno(getgid());
9891 break;
bellarda315a142005-01-30 22:59:18 +00009892#endif
9893#ifdef TARGET_NR_geteuid32
bellard31e31b82003-02-18 22:55:36 +00009894 case TARGET_NR_geteuid32:
bellardb03c60f2003-03-23 17:19:56 +00009895 ret = get_errno(geteuid());
9896 break;
bellarda315a142005-01-30 22:59:18 +00009897#endif
9898#ifdef TARGET_NR_getegid32
bellard31e31b82003-02-18 22:55:36 +00009899 case TARGET_NR_getegid32:
bellardb03c60f2003-03-23 17:19:56 +00009900 ret = get_errno(getegid());
9901 break;
bellarda315a142005-01-30 22:59:18 +00009902#endif
9903#ifdef TARGET_NR_setreuid32
bellard31e31b82003-02-18 22:55:36 +00009904 case TARGET_NR_setreuid32:
bellardb03c60f2003-03-23 17:19:56 +00009905 ret = get_errno(setreuid(arg1, arg2));
9906 break;
bellarda315a142005-01-30 22:59:18 +00009907#endif
9908#ifdef TARGET_NR_setregid32
bellard31e31b82003-02-18 22:55:36 +00009909 case TARGET_NR_setregid32:
bellardb03c60f2003-03-23 17:19:56 +00009910 ret = get_errno(setregid(arg1, arg2));
9911 break;
bellarda315a142005-01-30 22:59:18 +00009912#endif
9913#ifdef TARGET_NR_getgroups32
bellard31e31b82003-02-18 22:55:36 +00009914 case TARGET_NR_getgroups32:
bellard99c475a2005-01-31 20:45:13 +00009915 {
9916 int gidsetsize = arg1;
pbrook53a59602006-03-25 19:31:22 +00009917 uint32_t *target_grouplist;
bellard99c475a2005-01-31 20:45:13 +00009918 gid_t *grouplist;
9919 int i;
9920
9921 grouplist = alloca(gidsetsize * sizeof(gid_t));
9922 ret = get_errno(getgroups(gidsetsize, grouplist));
balrogcb3bc232008-09-20 02:08:13 +00009923 if (gidsetsize == 0)
9924 break;
bellard99c475a2005-01-31 20:45:13 +00009925 if (!is_error(ret)) {
bellard579a97f2007-11-11 14:26:47 +00009926 target_grouplist = lock_user(VERIFY_WRITE, arg2, gidsetsize * 4, 0);
9927 if (!target_grouplist) {
9928 ret = -TARGET_EFAULT;
9929 goto fail;
9930 }
balroga2155fc2008-09-20 02:12:08 +00009931 for(i = 0;i < ret; i++)
pbrook53a59602006-03-25 19:31:22 +00009932 target_grouplist[i] = tswap32(grouplist[i]);
9933 unlock_user(target_grouplist, arg2, gidsetsize * 4);
bellard99c475a2005-01-31 20:45:13 +00009934 }
9935 }
9936 break;
bellarda315a142005-01-30 22:59:18 +00009937#endif
9938#ifdef TARGET_NR_setgroups32
bellard31e31b82003-02-18 22:55:36 +00009939 case TARGET_NR_setgroups32:
bellard99c475a2005-01-31 20:45:13 +00009940 {
9941 int gidsetsize = arg1;
pbrook53a59602006-03-25 19:31:22 +00009942 uint32_t *target_grouplist;
bellard99c475a2005-01-31 20:45:13 +00009943 gid_t *grouplist;
9944 int i;
ths3b46e622007-09-17 08:09:54 +00009945
bellard99c475a2005-01-31 20:45:13 +00009946 grouplist = alloca(gidsetsize * sizeof(gid_t));
bellard579a97f2007-11-11 14:26:47 +00009947 target_grouplist = lock_user(VERIFY_READ, arg2, gidsetsize * 4, 1);
9948 if (!target_grouplist) {
9949 ret = -TARGET_EFAULT;
9950 goto fail;
9951 }
bellard99c475a2005-01-31 20:45:13 +00009952 for(i = 0;i < gidsetsize; i++)
pbrook53a59602006-03-25 19:31:22 +00009953 grouplist[i] = tswap32(target_grouplist[i]);
9954 unlock_user(target_grouplist, arg2, 0);
bellard99c475a2005-01-31 20:45:13 +00009955 ret = get_errno(setgroups(gidsetsize, grouplist));
9956 }
9957 break;
bellarda315a142005-01-30 22:59:18 +00009958#endif
9959#ifdef TARGET_NR_fchown32
bellard31e31b82003-02-18 22:55:36 +00009960 case TARGET_NR_fchown32:
bellardb03c60f2003-03-23 17:19:56 +00009961 ret = get_errno(fchown(arg1, arg2, arg3));
9962 break;
bellarda315a142005-01-30 22:59:18 +00009963#endif
9964#ifdef TARGET_NR_setresuid32
bellard31e31b82003-02-18 22:55:36 +00009965 case TARGET_NR_setresuid32:
Peter Maydellfd6f7792016-03-01 16:33:02 +00009966 ret = get_errno(sys_setresuid(arg1, arg2, arg3));
bellardb03c60f2003-03-23 17:19:56 +00009967 break;
bellarda315a142005-01-30 22:59:18 +00009968#endif
9969#ifdef TARGET_NR_getresuid32
bellard31e31b82003-02-18 22:55:36 +00009970 case TARGET_NR_getresuid32:
bellardb03c60f2003-03-23 17:19:56 +00009971 {
pbrook53a59602006-03-25 19:31:22 +00009972 uid_t ruid, euid, suid;
bellardb03c60f2003-03-23 17:19:56 +00009973 ret = get_errno(getresuid(&ruid, &euid, &suid));
9974 if (!is_error(ret)) {
bellard2f619692007-11-16 10:46:05 +00009975 if (put_user_u32(ruid, arg1)
9976 || put_user_u32(euid, arg2)
9977 || put_user_u32(suid, arg3))
9978 goto efault;
bellardb03c60f2003-03-23 17:19:56 +00009979 }
9980 }
9981 break;
bellarda315a142005-01-30 22:59:18 +00009982#endif
9983#ifdef TARGET_NR_setresgid32
bellard31e31b82003-02-18 22:55:36 +00009984 case TARGET_NR_setresgid32:
Peter Maydellfd6f7792016-03-01 16:33:02 +00009985 ret = get_errno(sys_setresgid(arg1, arg2, arg3));
bellardb03c60f2003-03-23 17:19:56 +00009986 break;
bellarda315a142005-01-30 22:59:18 +00009987#endif
9988#ifdef TARGET_NR_getresgid32
bellard31e31b82003-02-18 22:55:36 +00009989 case TARGET_NR_getresgid32:
bellardb03c60f2003-03-23 17:19:56 +00009990 {
pbrook53a59602006-03-25 19:31:22 +00009991 gid_t rgid, egid, sgid;
bellardb03c60f2003-03-23 17:19:56 +00009992 ret = get_errno(getresgid(&rgid, &egid, &sgid));
9993 if (!is_error(ret)) {
bellard2f619692007-11-16 10:46:05 +00009994 if (put_user_u32(rgid, arg1)
9995 || put_user_u32(egid, arg2)
9996 || put_user_u32(sgid, arg3))
9997 goto efault;
bellardb03c60f2003-03-23 17:19:56 +00009998 }
9999 }
10000 break;
bellarda315a142005-01-30 22:59:18 +000010001#endif
10002#ifdef TARGET_NR_chown32
bellard31e31b82003-02-18 22:55:36 +000010003 case TARGET_NR_chown32:
bellard579a97f2007-11-11 14:26:47 +000010004 if (!(p = lock_user_string(arg1)))
10005 goto efault;
pbrook53a59602006-03-25 19:31:22 +000010006 ret = get_errno(chown(p, arg2, arg3));
10007 unlock_user(p, arg1, 0);
bellardb03c60f2003-03-23 17:19:56 +000010008 break;
bellarda315a142005-01-30 22:59:18 +000010009#endif
10010#ifdef TARGET_NR_setuid32
bellard31e31b82003-02-18 22:55:36 +000010011 case TARGET_NR_setuid32:
Peter Maydellfd6f7792016-03-01 16:33:02 +000010012 ret = get_errno(sys_setuid(arg1));
bellardb03c60f2003-03-23 17:19:56 +000010013 break;
bellarda315a142005-01-30 22:59:18 +000010014#endif
10015#ifdef TARGET_NR_setgid32
bellard31e31b82003-02-18 22:55:36 +000010016 case TARGET_NR_setgid32:
Peter Maydellfd6f7792016-03-01 16:33:02 +000010017 ret = get_errno(sys_setgid(arg1));
bellardb03c60f2003-03-23 17:19:56 +000010018 break;
bellarda315a142005-01-30 22:59:18 +000010019#endif
10020#ifdef TARGET_NR_setfsuid32
bellard31e31b82003-02-18 22:55:36 +000010021 case TARGET_NR_setfsuid32:
bellardb03c60f2003-03-23 17:19:56 +000010022 ret = get_errno(setfsuid(arg1));
10023 break;
bellarda315a142005-01-30 22:59:18 +000010024#endif
10025#ifdef TARGET_NR_setfsgid32
bellard31e31b82003-02-18 22:55:36 +000010026 case TARGET_NR_setfsgid32:
bellardb03c60f2003-03-23 17:19:56 +000010027 ret = get_errno(setfsgid(arg1));
10028 break;
bellarda315a142005-01-30 22:59:18 +000010029#endif
bellard67867302003-11-23 17:05:30 +000010030
bellard31e31b82003-02-18 22:55:36 +000010031 case TARGET_NR_pivot_root:
bellardb03c60f2003-03-23 17:19:56 +000010032 goto unimplemented;
bellardffa65c32004-01-04 23:57:22 +000010033#ifdef TARGET_NR_mincore
bellard31e31b82003-02-18 22:55:36 +000010034 case TARGET_NR_mincore:
aurel3204bb9ac2008-10-01 21:46:41 +000010035 {
10036 void *a;
10037 ret = -TARGET_EFAULT;
10038 if (!(a = lock_user(VERIFY_READ, arg1,arg2, 0)))
10039 goto efault;
10040 if (!(p = lock_user_string(arg3)))
10041 goto mincore_fail;
10042 ret = get_errno(mincore(a, arg2, p));
10043 unlock_user(p, arg3, ret);
10044 mincore_fail:
10045 unlock_user(a, arg1, 0);
10046 }
10047 break;
bellardffa65c32004-01-04 23:57:22 +000010048#endif
aurel32408321b2008-10-01 21:46:32 +000010049#ifdef TARGET_NR_arm_fadvise64_64
10050 case TARGET_NR_arm_fadvise64_64:
Peter Maydelle0156a92016-05-31 15:45:09 +010010051 /* arm_fadvise64_64 looks like fadvise64_64 but
10052 * with different argument order: fd, advice, offset, len
10053 * rather than the usual fd, offset, len, advice.
10054 * Note that offset and len are both 64-bit so appear as
10055 * pairs of 32-bit registers.
10056 */
10057 ret = posix_fadvise(arg1, target_offset64(arg3, arg4),
10058 target_offset64(arg5, arg6), arg2);
10059 ret = -host_to_target_errno(ret);
10060 break;
aurel32408321b2008-10-01 21:46:32 +000010061#endif
Peter Maydellbadd3cd2016-05-31 15:45:10 +010010062
10063#if TARGET_ABI_BITS == 32
10064
10065#ifdef TARGET_NR_fadvise64_64
10066 case TARGET_NR_fadvise64_64:
10067 /* 6 args: fd, offset (high, low), len (high, low), advice */
10068 if (regpairs_aligned(cpu_env)) {
10069 /* offset is in (3,4), len in (5,6) and advice in 7 */
10070 arg2 = arg3;
10071 arg3 = arg4;
10072 arg4 = arg5;
10073 arg5 = arg6;
10074 arg6 = arg7;
10075 }
10076 ret = -host_to_target_errno(posix_fadvise(arg1,
10077 target_offset64(arg2, arg3),
10078 target_offset64(arg4, arg5),
10079 arg6));
10080 break;
10081#endif
10082
10083#ifdef TARGET_NR_fadvise64
10084 case TARGET_NR_fadvise64:
10085 /* 5 args: fd, offset (high, low), len, advice */
10086 if (regpairs_aligned(cpu_env)) {
10087 /* offset is in (3,4), len in 5 and advice in 6 */
10088 arg2 = arg3;
10089 arg3 = arg4;
10090 arg4 = arg5;
10091 arg5 = arg6;
10092 }
10093 ret = -host_to_target_errno(posix_fadvise(arg1,
10094 target_offset64(arg2, arg3),
10095 arg4, arg5));
10096 break;
10097#endif
10098
10099#else /* not a 32-bit ABI */
Peter Maydelle0156a92016-05-31 15:45:09 +010010100#if defined(TARGET_NR_fadvise64_64) || defined(TARGET_NR_fadvise64)
aurel32408321b2008-10-01 21:46:32 +000010101#ifdef TARGET_NR_fadvise64_64
10102 case TARGET_NR_fadvise64_64:
10103#endif
Ulrich Hechte72d2cc2009-07-24 19:10:31 +020010104#ifdef TARGET_NR_fadvise64
10105 case TARGET_NR_fadvise64:
10106#endif
10107#ifdef TARGET_S390X
10108 switch (arg4) {
10109 case 4: arg4 = POSIX_FADV_NOREUSE + 1; break; /* make sure it's an invalid value */
10110 case 5: arg4 = POSIX_FADV_NOREUSE + 2; break; /* ditto */
10111 case 6: arg4 = POSIX_FADV_DONTNEED; break;
10112 case 7: arg4 = POSIX_FADV_NOREUSE; break;
10113 default: break;
10114 }
10115#endif
Peter Maydell977d8242016-05-31 15:45:11 +010010116 ret = -host_to_target_errno(posix_fadvise(arg1, arg2, arg3, arg4));
10117 break;
aurel32408321b2008-10-01 21:46:32 +000010118#endif
Peter Maydellbadd3cd2016-05-31 15:45:10 +010010119#endif /* end of 64-bit ABI fadvise handling */
10120
bellardffa65c32004-01-04 23:57:22 +000010121#ifdef TARGET_NR_madvise
bellard31e31b82003-02-18 22:55:36 +000010122 case TARGET_NR_madvise:
pbrook24836682006-04-16 14:14:53 +000010123 /* A straight passthrough may not be safe because qemu sometimes
Lei Lid2d6b852013-05-20 17:20:50 +080010124 turns private file-backed mappings into anonymous mappings.
pbrook24836682006-04-16 14:14:53 +000010125 This will break MADV_DONTNEED.
10126 This is a hint, so ignoring and returning success is ok. */
10127 ret = get_errno(0);
10128 break;
bellardffa65c32004-01-04 23:57:22 +000010129#endif
blueswir1992f48a2007-10-14 16:27:31 +000010130#if TARGET_ABI_BITS == 32
bellard31e31b82003-02-18 22:55:36 +000010131 case TARGET_NR_fcntl64:
bellard77e46722003-04-29 20:39:06 +000010132 {
thsb1e341e2007-03-20 21:50:52 +000010133 int cmd;
bellard77e46722003-04-29 20:39:06 +000010134 struct flock64 fl;
pbrook53a59602006-03-25 19:31:22 +000010135 struct target_flock64 *target_fl;
pbrookce4defa2006-02-09 16:49:55 +000010136#ifdef TARGET_ARM
pbrook53a59602006-03-25 19:31:22 +000010137 struct target_eabi_flock64 *target_efl;
pbrookce4defa2006-02-09 16:49:55 +000010138#endif
bellard77e46722003-04-29 20:39:06 +000010139
Arnaud Patard (Rtp)5f106812009-06-03 14:35:04 +020010140 cmd = target_to_host_fcntl_cmd(arg2);
Peter Maydell31b63192011-12-05 23:11:50 +000010141 if (cmd == -TARGET_EINVAL) {
10142 ret = cmd;
10143 break;
10144 }
thsb1e341e2007-03-20 21:50:52 +000010145
bellard60cd49d2003-03-16 22:53:56 +000010146 switch(arg2) {
thsb1e341e2007-03-20 21:50:52 +000010147 case TARGET_F_GETLK64:
ths58134272007-03-31 18:59:32 +000010148#ifdef TARGET_ARM
10149 if (((CPUARMState *)cpu_env)->eabi) {
bellard9ee1fa22007-11-11 15:11:19 +000010150 if (!lock_user_struct(VERIFY_READ, target_efl, arg3, 1))
10151 goto efault;
ths58134272007-03-31 18:59:32 +000010152 fl.l_type = tswap16(target_efl->l_type);
10153 fl.l_whence = tswap16(target_efl->l_whence);
10154 fl.l_start = tswap64(target_efl->l_start);
10155 fl.l_len = tswap64(target_efl->l_len);
Ulrich Hecht7e22e542009-07-24 19:10:27 +020010156 fl.l_pid = tswap32(target_efl->l_pid);
ths58134272007-03-31 18:59:32 +000010157 unlock_user_struct(target_efl, arg3, 0);
10158 } else
10159#endif
10160 {
bellard9ee1fa22007-11-11 15:11:19 +000010161 if (!lock_user_struct(VERIFY_READ, target_fl, arg3, 1))
10162 goto efault;
ths58134272007-03-31 18:59:32 +000010163 fl.l_type = tswap16(target_fl->l_type);
10164 fl.l_whence = tswap16(target_fl->l_whence);
10165 fl.l_start = tswap64(target_fl->l_start);
10166 fl.l_len = tswap64(target_fl->l_len);
Ulrich Hecht7e22e542009-07-24 19:10:27 +020010167 fl.l_pid = tswap32(target_fl->l_pid);
ths58134272007-03-31 18:59:32 +000010168 unlock_user_struct(target_fl, arg3, 0);
10169 }
thsb1e341e2007-03-20 21:50:52 +000010170 ret = get_errno(fcntl(arg1, cmd, &fl));
bellard77e46722003-04-29 20:39:06 +000010171 if (ret == 0) {
pbrookce4defa2006-02-09 16:49:55 +000010172#ifdef TARGET_ARM
10173 if (((CPUARMState *)cpu_env)->eabi) {
bellard9ee1fa22007-11-11 15:11:19 +000010174 if (!lock_user_struct(VERIFY_WRITE, target_efl, arg3, 0))
10175 goto efault;
pbrookce4defa2006-02-09 16:49:55 +000010176 target_efl->l_type = tswap16(fl.l_type);
10177 target_efl->l_whence = tswap16(fl.l_whence);
10178 target_efl->l_start = tswap64(fl.l_start);
10179 target_efl->l_len = tswap64(fl.l_len);
Ulrich Hecht7e22e542009-07-24 19:10:27 +020010180 target_efl->l_pid = tswap32(fl.l_pid);
pbrook53a59602006-03-25 19:31:22 +000010181 unlock_user_struct(target_efl, arg3, 1);
pbrookce4defa2006-02-09 16:49:55 +000010182 } else
10183#endif
10184 {
bellard9ee1fa22007-11-11 15:11:19 +000010185 if (!lock_user_struct(VERIFY_WRITE, target_fl, arg3, 0))
10186 goto efault;
pbrookce4defa2006-02-09 16:49:55 +000010187 target_fl->l_type = tswap16(fl.l_type);
10188 target_fl->l_whence = tswap16(fl.l_whence);
10189 target_fl->l_start = tswap64(fl.l_start);
10190 target_fl->l_len = tswap64(fl.l_len);
Ulrich Hecht7e22e542009-07-24 19:10:27 +020010191 target_fl->l_pid = tswap32(fl.l_pid);
pbrook53a59602006-03-25 19:31:22 +000010192 unlock_user_struct(target_fl, arg3, 1);
pbrookce4defa2006-02-09 16:49:55 +000010193 }
bellard77e46722003-04-29 20:39:06 +000010194 }
10195 break;
10196
thsb1e341e2007-03-20 21:50:52 +000010197 case TARGET_F_SETLK64:
10198 case TARGET_F_SETLKW64:
pbrookce4defa2006-02-09 16:49:55 +000010199#ifdef TARGET_ARM
10200 if (((CPUARMState *)cpu_env)->eabi) {
bellard9ee1fa22007-11-11 15:11:19 +000010201 if (!lock_user_struct(VERIFY_READ, target_efl, arg3, 1))
10202 goto efault;
pbrookce4defa2006-02-09 16:49:55 +000010203 fl.l_type = tswap16(target_efl->l_type);
10204 fl.l_whence = tswap16(target_efl->l_whence);
10205 fl.l_start = tswap64(target_efl->l_start);
10206 fl.l_len = tswap64(target_efl->l_len);
Ulrich Hecht7e22e542009-07-24 19:10:27 +020010207 fl.l_pid = tswap32(target_efl->l_pid);
pbrook53a59602006-03-25 19:31:22 +000010208 unlock_user_struct(target_efl, arg3, 0);
pbrookce4defa2006-02-09 16:49:55 +000010209 } else
10210#endif
10211 {
bellard9ee1fa22007-11-11 15:11:19 +000010212 if (!lock_user_struct(VERIFY_READ, target_fl, arg3, 1))
10213 goto efault;
pbrookce4defa2006-02-09 16:49:55 +000010214 fl.l_type = tswap16(target_fl->l_type);
10215 fl.l_whence = tswap16(target_fl->l_whence);
10216 fl.l_start = tswap64(target_fl->l_start);
10217 fl.l_len = tswap64(target_fl->l_len);
Ulrich Hecht7e22e542009-07-24 19:10:27 +020010218 fl.l_pid = tswap32(target_fl->l_pid);
pbrook53a59602006-03-25 19:31:22 +000010219 unlock_user_struct(target_fl, arg3, 0);
pbrookce4defa2006-02-09 16:49:55 +000010220 }
thsb1e341e2007-03-20 21:50:52 +000010221 ret = get_errno(fcntl(arg1, cmd, &fl));
bellard77e46722003-04-29 20:39:06 +000010222 break;
bellard60cd49d2003-03-16 22:53:56 +000010223 default:
Arnaud Patard (Rtp)5f106812009-06-03 14:35:04 +020010224 ret = do_fcntl(arg1, arg2, arg3);
bellard60cd49d2003-03-16 22:53:56 +000010225 break;
10226 }
bellard77e46722003-04-29 20:39:06 +000010227 break;
10228 }
bellard60cd49d2003-03-16 22:53:56 +000010229#endif
ths7d600c82006-12-08 01:32:58 +000010230#ifdef TARGET_NR_cacheflush
10231 case TARGET_NR_cacheflush:
10232 /* self-modifying code is handled automatically, so nothing needed */
10233 ret = 0;
10234 break;
10235#endif
bellardebc05482003-09-30 21:08:41 +000010236#ifdef TARGET_NR_security
bellard31e31b82003-02-18 22:55:36 +000010237 case TARGET_NR_security:
10238 goto unimplemented;
bellardebc05482003-09-30 21:08:41 +000010239#endif
bellardc573ff62004-01-04 15:51:36 +000010240#ifdef TARGET_NR_getpagesize
10241 case TARGET_NR_getpagesize:
10242 ret = TARGET_PAGE_SIZE;
10243 break;
10244#endif
bellard31e31b82003-02-18 22:55:36 +000010245 case TARGET_NR_gettid:
10246 ret = get_errno(gettid());
10247 break;
thse5febef2007-04-01 18:31:35 +000010248#ifdef TARGET_NR_readahead
bellard31e31b82003-02-18 22:55:36 +000010249 case TARGET_NR_readahead:
aurel322054ac92008-10-13 21:08:07 +000010250#if TARGET_ABI_BITS == 32
Riku Voipio48e515d2011-07-12 15:40:51 +030010251 if (regpairs_aligned(cpu_env)) {
aurel322054ac92008-10-13 21:08:07 +000010252 arg2 = arg3;
10253 arg3 = arg4;
10254 arg4 = arg5;
10255 }
aurel322054ac92008-10-13 21:08:07 +000010256 ret = get_errno(readahead(arg1, ((off64_t)arg3 << 32) | arg2, arg4));
10257#else
10258 ret = get_errno(readahead(arg1, arg2, arg3));
10259#endif
10260 break;
thse5febef2007-04-01 18:31:35 +000010261#endif
An-Cheng Huanga790ae32011-08-09 12:34:06 -070010262#ifdef CONFIG_ATTR
bellardebc05482003-09-30 21:08:41 +000010263#ifdef TARGET_NR_setxattr
bellard31e31b82003-02-18 22:55:36 +000010264 case TARGET_NR_listxattr:
10265 case TARGET_NR_llistxattr:
Peter Maydellfb5590f2011-12-14 15:37:19 +000010266 {
10267 void *p, *b = 0;
10268 if (arg2) {
10269 b = lock_user(VERIFY_WRITE, arg2, arg3, 0);
10270 if (!b) {
10271 ret = -TARGET_EFAULT;
10272 break;
10273 }
10274 }
10275 p = lock_user_string(arg1);
10276 if (p) {
10277 if (num == TARGET_NR_listxattr) {
10278 ret = get_errno(listxattr(p, b, arg3));
10279 } else {
10280 ret = get_errno(llistxattr(p, b, arg3));
10281 }
10282 } else {
10283 ret = -TARGET_EFAULT;
10284 }
10285 unlock_user(p, arg1, 0);
10286 unlock_user(b, arg2, arg3);
Arnaud Patard6f932f92009-04-21 21:04:18 +030010287 break;
Peter Maydellfb5590f2011-12-14 15:37:19 +000010288 }
10289 case TARGET_NR_flistxattr:
10290 {
10291 void *b = 0;
10292 if (arg2) {
10293 b = lock_user(VERIFY_WRITE, arg2, arg3, 0);
10294 if (!b) {
10295 ret = -TARGET_EFAULT;
10296 break;
10297 }
10298 }
10299 ret = get_errno(flistxattr(arg1, b, arg3));
10300 unlock_user(b, arg2, arg3);
10301 break;
10302 }
An-Cheng Huanga790ae32011-08-09 12:34:06 -070010303 case TARGET_NR_setxattr:
Peter Maydell30297b52011-12-14 15:37:18 +000010304 case TARGET_NR_lsetxattr:
An-Cheng Huanga790ae32011-08-09 12:34:06 -070010305 {
Peter Maydelle3c33ec2011-12-14 15:37:17 +000010306 void *p, *n, *v = 0;
10307 if (arg3) {
10308 v = lock_user(VERIFY_READ, arg3, arg4, 1);
10309 if (!v) {
10310 ret = -TARGET_EFAULT;
10311 break;
10312 }
10313 }
An-Cheng Huanga790ae32011-08-09 12:34:06 -070010314 p = lock_user_string(arg1);
10315 n = lock_user_string(arg2);
Peter Maydelle3c33ec2011-12-14 15:37:17 +000010316 if (p && n) {
Peter Maydell30297b52011-12-14 15:37:18 +000010317 if (num == TARGET_NR_setxattr) {
10318 ret = get_errno(setxattr(p, n, v, arg4, arg5));
10319 } else {
10320 ret = get_errno(lsetxattr(p, n, v, arg4, arg5));
10321 }
An-Cheng Huanga790ae32011-08-09 12:34:06 -070010322 } else {
10323 ret = -TARGET_EFAULT;
10324 }
10325 unlock_user(p, arg1, 0);
10326 unlock_user(n, arg2, 0);
10327 unlock_user(v, arg3, 0);
10328 }
10329 break;
Peter Maydell30297b52011-12-14 15:37:18 +000010330 case TARGET_NR_fsetxattr:
10331 {
10332 void *n, *v = 0;
10333 if (arg3) {
10334 v = lock_user(VERIFY_READ, arg3, arg4, 1);
10335 if (!v) {
10336 ret = -TARGET_EFAULT;
10337 break;
10338 }
10339 }
10340 n = lock_user_string(arg2);
10341 if (n) {
10342 ret = get_errno(fsetxattr(arg1, n, v, arg4, arg5));
10343 } else {
10344 ret = -TARGET_EFAULT;
10345 }
10346 unlock_user(n, arg2, 0);
10347 unlock_user(v, arg3, 0);
10348 }
10349 break;
An-Cheng Huanga790ae32011-08-09 12:34:06 -070010350 case TARGET_NR_getxattr:
Peter Maydell30297b52011-12-14 15:37:18 +000010351 case TARGET_NR_lgetxattr:
An-Cheng Huanga790ae32011-08-09 12:34:06 -070010352 {
Peter Maydelle3c33ec2011-12-14 15:37:17 +000010353 void *p, *n, *v = 0;
10354 if (arg3) {
10355 v = lock_user(VERIFY_WRITE, arg3, arg4, 0);
10356 if (!v) {
10357 ret = -TARGET_EFAULT;
10358 break;
10359 }
10360 }
An-Cheng Huanga790ae32011-08-09 12:34:06 -070010361 p = lock_user_string(arg1);
10362 n = lock_user_string(arg2);
Peter Maydelle3c33ec2011-12-14 15:37:17 +000010363 if (p && n) {
Peter Maydell30297b52011-12-14 15:37:18 +000010364 if (num == TARGET_NR_getxattr) {
10365 ret = get_errno(getxattr(p, n, v, arg4));
10366 } else {
10367 ret = get_errno(lgetxattr(p, n, v, arg4));
10368 }
An-Cheng Huanga790ae32011-08-09 12:34:06 -070010369 } else {
10370 ret = -TARGET_EFAULT;
10371 }
10372 unlock_user(p, arg1, 0);
10373 unlock_user(n, arg2, 0);
10374 unlock_user(v, arg3, arg4);
10375 }
10376 break;
Peter Maydell30297b52011-12-14 15:37:18 +000010377 case TARGET_NR_fgetxattr:
10378 {
10379 void *n, *v = 0;
10380 if (arg3) {
10381 v = lock_user(VERIFY_WRITE, arg3, arg4, 0);
10382 if (!v) {
10383 ret = -TARGET_EFAULT;
10384 break;
10385 }
10386 }
10387 n = lock_user_string(arg2);
10388 if (n) {
10389 ret = get_errno(fgetxattr(arg1, n, v, arg4));
10390 } else {
10391 ret = -TARGET_EFAULT;
10392 }
10393 unlock_user(n, arg2, 0);
10394 unlock_user(v, arg3, arg4);
10395 }
10396 break;
An-Cheng Huanga790ae32011-08-09 12:34:06 -070010397 case TARGET_NR_removexattr:
Peter Maydell30297b52011-12-14 15:37:18 +000010398 case TARGET_NR_lremovexattr:
An-Cheng Huanga790ae32011-08-09 12:34:06 -070010399 {
10400 void *p, *n;
10401 p = lock_user_string(arg1);
10402 n = lock_user_string(arg2);
10403 if (p && n) {
Peter Maydell30297b52011-12-14 15:37:18 +000010404 if (num == TARGET_NR_removexattr) {
10405 ret = get_errno(removexattr(p, n));
10406 } else {
10407 ret = get_errno(lremovexattr(p, n));
10408 }
An-Cheng Huanga790ae32011-08-09 12:34:06 -070010409 } else {
10410 ret = -TARGET_EFAULT;
10411 }
10412 unlock_user(p, arg1, 0);
10413 unlock_user(n, arg2, 0);
10414 }
10415 break;
Peter Maydell30297b52011-12-14 15:37:18 +000010416 case TARGET_NR_fremovexattr:
10417 {
10418 void *n;
10419 n = lock_user_string(arg2);
10420 if (n) {
10421 ret = get_errno(fremovexattr(arg1, n));
10422 } else {
10423 ret = -TARGET_EFAULT;
10424 }
10425 unlock_user(n, arg2, 0);
10426 }
10427 break;
bellardebc05482003-09-30 21:08:41 +000010428#endif
An-Cheng Huanga790ae32011-08-09 12:34:06 -070010429#endif /* CONFIG_ATTR */
bellardebc05482003-09-30 21:08:41 +000010430#ifdef TARGET_NR_set_thread_area
bellard5cd43932003-03-29 16:54:36 +000010431 case TARGET_NR_set_thread_area:
bellard8d18e892007-11-14 15:18:40 +000010432#if defined(TARGET_MIPS)
Petar Jovanovicd2792792014-06-18 17:48:20 +020010433 ((CPUMIPSState *) cpu_env)->active_tc.CP0_UserLocal = arg1;
ths6f5b89a2007-03-02 20:48:00 +000010434 ret = 0;
10435 break;
edgar_iglef967792009-01-07 14:19:38 +000010436#elif defined(TARGET_CRIS)
10437 if (arg1 & 0xff)
10438 ret = -TARGET_EINVAL;
10439 else {
10440 ((CPUCRISState *) cpu_env)->pregs[PR_PID] = arg1;
10441 ret = 0;
10442 }
10443 break;
bellard8d18e892007-11-14 15:18:40 +000010444#elif defined(TARGET_I386) && defined(TARGET_ABI32)
10445 ret = do_set_thread_area(cpu_env, arg1);
10446 break;
Peter Maydell1ccd9372013-07-16 18:44:55 +010010447#elif defined(TARGET_M68K)
10448 {
Andreas Färber0429a972013-08-26 18:14:44 +020010449 TaskState *ts = cpu->opaque;
Peter Maydell1ccd9372013-07-16 18:44:55 +010010450 ts->tp_value = arg1;
Peter Maydell95c1eb12013-07-29 11:31:49 +010010451 ret = 0;
Peter Maydell1ccd9372013-07-16 18:44:55 +010010452 break;
10453 }
ths6f5b89a2007-03-02 20:48:00 +000010454#else
10455 goto unimplemented_nowarn;
10456#endif
10457#endif
10458#ifdef TARGET_NR_get_thread_area
bellard5cd43932003-03-29 16:54:36 +000010459 case TARGET_NR_get_thread_area:
bellard8d18e892007-11-14 15:18:40 +000010460#if defined(TARGET_I386) && defined(TARGET_ABI32)
10461 ret = do_get_thread_area(cpu_env, arg1);
Peter Maydelld312bbe2013-07-16 18:44:56 +010010462 break;
Peter Maydell1ccd9372013-07-16 18:44:55 +010010463#elif defined(TARGET_M68K)
10464 {
Andreas Färber0429a972013-08-26 18:14:44 +020010465 TaskState *ts = cpu->opaque;
Peter Maydell1ccd9372013-07-16 18:44:55 +010010466 ret = ts->tp_value;
10467 break;
10468 }
bellard8d18e892007-11-14 15:18:40 +000010469#else
bellard5cd43932003-03-29 16:54:36 +000010470 goto unimplemented_nowarn;
bellardebc05482003-09-30 21:08:41 +000010471#endif
bellard8d18e892007-11-14 15:18:40 +000010472#endif
bellard48dc41e2006-06-21 18:15:50 +000010473#ifdef TARGET_NR_getdomainname
10474 case TARGET_NR_getdomainname:
10475 goto unimplemented_nowarn;
10476#endif
ths6f5b89a2007-03-02 20:48:00 +000010477
thsb5906f92007-03-19 13:32:45 +000010478#ifdef TARGET_NR_clock_gettime
10479 case TARGET_NR_clock_gettime:
10480 {
10481 struct timespec ts;
10482 ret = get_errno(clock_gettime(arg1, &ts));
10483 if (!is_error(ret)) {
10484 host_to_target_timespec(arg2, &ts);
10485 }
10486 break;
10487 }
10488#endif
10489#ifdef TARGET_NR_clock_getres
10490 case TARGET_NR_clock_getres:
10491 {
10492 struct timespec ts;
10493 ret = get_errno(clock_getres(arg1, &ts));
10494 if (!is_error(ret)) {
10495 host_to_target_timespec(arg2, &ts);
10496 }
10497 break;
10498 }
10499#endif
pbrook63d76512008-05-29 13:43:29 +000010500#ifdef TARGET_NR_clock_nanosleep
10501 case TARGET_NR_clock_nanosleep:
10502 {
10503 struct timespec ts;
10504 target_to_host_timespec(&ts, arg3);
Peter Maydell9e518222016-06-06 19:58:09 +010010505 ret = get_errno(safe_clock_nanosleep(arg1, arg2,
10506 &ts, arg4 ? &ts : NULL));
pbrook63d76512008-05-29 13:43:29 +000010507 if (arg4)
10508 host_to_target_timespec(arg4, &ts);
Tom Musta8fbe8fd2014-08-12 13:53:41 -050010509
10510#if defined(TARGET_PPC)
10511 /* clock_nanosleep is odd in that it returns positive errno values.
10512 * On PPC, CR0 bit 3 should be set in such a situation. */
Peter Maydell9e518222016-06-06 19:58:09 +010010513 if (ret && ret != -TARGET_ERESTARTSYS) {
Tom Musta8fbe8fd2014-08-12 13:53:41 -050010514 ((CPUPPCState *)cpu_env)->crf[0] |= 1;
10515 }
10516#endif
pbrook63d76512008-05-29 13:43:29 +000010517 break;
10518 }
10519#endif
thsb5906f92007-03-19 13:32:45 +000010520
ths6f5b89a2007-03-02 20:48:00 +000010521#if defined(TARGET_NR_set_tid_address) && defined(__NR_set_tid_address)
10522 case TARGET_NR_set_tid_address:
bellard579a97f2007-11-11 14:26:47 +000010523 ret = get_errno(set_tid_address((int *)g2h(arg1)));
10524 break;
ths6f5b89a2007-03-02 20:48:00 +000010525#endif
10526
ths4cae1d12007-07-12 11:06:53 +000010527 case TARGET_NR_tkill:
Peter Maydellbef653d2016-05-27 15:51:57 +010010528 ret = get_errno(safe_tkill((int)arg1, target_to_host_signal(arg2)));
ths4cae1d12007-07-12 11:06:53 +000010529 break;
ths4cae1d12007-07-12 11:06:53 +000010530
ths71455572007-06-21 21:45:30 +000010531 case TARGET_NR_tgkill:
Peter Maydellbef653d2016-05-27 15:51:57 +010010532 ret = get_errno(safe_tgkill((int)arg1, (int)arg2,
pbrook4cb05962008-05-30 18:05:19 +000010533 target_to_host_signal(arg3)));
Peter Maydellbef653d2016-05-27 15:51:57 +010010534 break;
ths71455572007-06-21 21:45:30 +000010535
ths4f2b1fe2007-06-21 21:57:12 +000010536#ifdef TARGET_NR_set_robust_list
10537 case TARGET_NR_set_robust_list:
Peter Maydelle9a970a2013-02-08 04:34:54 +000010538 case TARGET_NR_get_robust_list:
10539 /* The ABI for supporting robust futexes has userspace pass
10540 * the kernel a pointer to a linked list which is updated by
10541 * userspace after the syscall; the list is walked by the kernel
10542 * when the thread exits. Since the linked list in QEMU guest
10543 * memory isn't a valid linked list for the host and we have
10544 * no way to reliably intercept the thread-death event, we can't
10545 * support these. Silently return ENOSYS so that guest userspace
10546 * falls back to a non-robust futex implementation (which should
10547 * be OK except in the corner case of the guest crashing while
10548 * holding a mutex that is shared with another process via
10549 * shared memory).
10550 */
10551 goto unimplemented_nowarn;
ths4f2b1fe2007-06-21 21:57:12 +000010552#endif
10553
Peter Maydell1acae9f2013-07-02 14:04:12 +010010554#if defined(TARGET_NR_utimensat)
ths9007f0e2007-09-25 17:50:37 +000010555 case TARGET_NR_utimensat:
10556 {
Riku Voipioebc996f2009-04-21 15:01:51 +030010557 struct timespec *tsp, ts[2];
10558 if (!arg3) {
10559 tsp = NULL;
10560 } else {
10561 target_to_host_timespec(ts, arg3);
10562 target_to_host_timespec(ts+1, arg3+sizeof(struct target_timespec));
10563 tsp = ts;
10564 }
ths9007f0e2007-09-25 17:50:37 +000010565 if (!arg2)
Riku Voipioebc996f2009-04-21 15:01:51 +030010566 ret = get_errno(sys_utimensat(arg1, NULL, tsp, arg4));
ths9007f0e2007-09-25 17:50:37 +000010567 else {
bellard579a97f2007-11-11 14:26:47 +000010568 if (!(p = lock_user_string(arg2))) {
ths0da46a62007-10-20 20:23:07 +000010569 ret = -TARGET_EFAULT;
bellard579a97f2007-11-11 14:26:47 +000010570 goto fail;
10571 }
Riku Voipioebc996f2009-04-21 15:01:51 +030010572 ret = get_errno(sys_utimensat(arg1, path(p), tsp, arg4));
bellard579a97f2007-11-11 14:26:47 +000010573 unlock_user(p, arg2, 0);
ths9007f0e2007-09-25 17:50:37 +000010574 }
10575 }
10576 break;
10577#endif
pbrookbd0c5662008-05-29 14:34:11 +000010578 case TARGET_NR_futex:
10579 ret = do_futex(arg1, arg2, arg3, arg4, arg5, arg6);
10580 break;
aurel32dbfe4c32009-04-08 21:29:30 +000010581#if defined(TARGET_NR_inotify_init) && defined(__NR_inotify_init)
aurel3239b59762008-10-01 21:46:50 +000010582 case TARGET_NR_inotify_init:
10583 ret = get_errno(sys_inotify_init());
10584 break;
10585#endif
Stefan Weila1606b02010-03-28 11:44:41 +020010586#ifdef CONFIG_INOTIFY1
Riku Voipioc05c7a72010-03-26 15:25:11 +000010587#if defined(TARGET_NR_inotify_init1) && defined(__NR_inotify_init1)
10588 case TARGET_NR_inotify_init1:
10589 ret = get_errno(sys_inotify_init1(arg1));
10590 break;
10591#endif
Stefan Weila1606b02010-03-28 11:44:41 +020010592#endif
aurel32dbfe4c32009-04-08 21:29:30 +000010593#if defined(TARGET_NR_inotify_add_watch) && defined(__NR_inotify_add_watch)
aurel3239b59762008-10-01 21:46:50 +000010594 case TARGET_NR_inotify_add_watch:
10595 p = lock_user_string(arg2);
10596 ret = get_errno(sys_inotify_add_watch(arg1, path(p), arg3));
10597 unlock_user(p, arg2, 0);
10598 break;
10599#endif
aurel32dbfe4c32009-04-08 21:29:30 +000010600#if defined(TARGET_NR_inotify_rm_watch) && defined(__NR_inotify_rm_watch)
aurel3239b59762008-10-01 21:46:50 +000010601 case TARGET_NR_inotify_rm_watch:
10602 ret = get_errno(sys_inotify_rm_watch(arg1, arg2));
10603 break;
10604#endif
ths9007f0e2007-09-25 17:50:37 +000010605
Nathan Froyd8ec9cf82009-07-22 09:14:36 -070010606#if defined(TARGET_NR_mq_open) && defined(__NR_mq_open)
aurel3224e10032009-04-15 16:11:43 +000010607 case TARGET_NR_mq_open:
10608 {
Tom Mustab6ce1f62014-08-12 13:53:36 -050010609 struct mq_attr posix_mq_attr, *attrp;
aurel3224e10032009-04-15 16:11:43 +000010610
10611 p = lock_user_string(arg1 - 1);
Tom Mustab6ce1f62014-08-12 13:53:36 -050010612 if (arg4 != 0) {
aurel3224e10032009-04-15 16:11:43 +000010613 copy_from_user_mq_attr (&posix_mq_attr, arg4);
Tom Mustab6ce1f62014-08-12 13:53:36 -050010614 attrp = &posix_mq_attr;
10615 } else {
10616 attrp = 0;
10617 }
10618 ret = get_errno(mq_open(p, arg2, arg3, attrp));
aurel3224e10032009-04-15 16:11:43 +000010619 unlock_user (p, arg1, 0);
10620 }
10621 break;
10622
10623 case TARGET_NR_mq_unlink:
10624 p = lock_user_string(arg1 - 1);
10625 ret = get_errno(mq_unlink(p));
10626 unlock_user (p, arg1, 0);
10627 break;
10628
10629 case TARGET_NR_mq_timedsend:
10630 {
10631 struct timespec ts;
10632
10633 p = lock_user (VERIFY_READ, arg2, arg3, 1);
10634 if (arg5 != 0) {
10635 target_to_host_timespec(&ts, arg5);
Peter Maydelld40ecd62016-06-06 19:58:06 +010010636 ret = get_errno(safe_mq_timedsend(arg1, p, arg3, arg4, &ts));
aurel3224e10032009-04-15 16:11:43 +000010637 host_to_target_timespec(arg5, &ts);
Peter Maydelld40ecd62016-06-06 19:58:06 +010010638 } else {
10639 ret = get_errno(safe_mq_timedsend(arg1, p, arg3, arg4, NULL));
aurel3224e10032009-04-15 16:11:43 +000010640 }
aurel3224e10032009-04-15 16:11:43 +000010641 unlock_user (p, arg2, arg3);
10642 }
10643 break;
10644
10645 case TARGET_NR_mq_timedreceive:
10646 {
10647 struct timespec ts;
10648 unsigned int prio;
10649
10650 p = lock_user (VERIFY_READ, arg2, arg3, 1);
10651 if (arg5 != 0) {
10652 target_to_host_timespec(&ts, arg5);
Peter Maydelld40ecd62016-06-06 19:58:06 +010010653 ret = get_errno(safe_mq_timedreceive(arg1, p, arg3,
10654 &prio, &ts));
aurel3224e10032009-04-15 16:11:43 +000010655 host_to_target_timespec(arg5, &ts);
Peter Maydelld40ecd62016-06-06 19:58:06 +010010656 } else {
10657 ret = get_errno(safe_mq_timedreceive(arg1, p, arg3,
10658 &prio, NULL));
aurel3224e10032009-04-15 16:11:43 +000010659 }
aurel3224e10032009-04-15 16:11:43 +000010660 unlock_user (p, arg2, arg3);
10661 if (arg4 != 0)
10662 put_user_u32(prio, arg4);
10663 }
10664 break;
10665
10666 /* Not implemented for now... */
10667/* case TARGET_NR_mq_notify: */
10668/* break; */
10669
10670 case TARGET_NR_mq_getsetattr:
10671 {
10672 struct mq_attr posix_mq_attr_in, posix_mq_attr_out;
10673 ret = 0;
10674 if (arg3 != 0) {
10675 ret = mq_getattr(arg1, &posix_mq_attr_out);
10676 copy_to_user_mq_attr(arg3, &posix_mq_attr_out);
10677 }
10678 if (arg2 != 0) {
10679 copy_from_user_mq_attr(&posix_mq_attr_in, arg2);
10680 ret |= mq_setattr(arg1, &posix_mq_attr_in, &posix_mq_attr_out);
10681 }
10682
10683 }
10684 break;
10685#endif
10686
vibisreenivasan3ce34df2009-05-16 18:32:41 +053010687#ifdef CONFIG_SPLICE
10688#ifdef TARGET_NR_tee
10689 case TARGET_NR_tee:
10690 {
10691 ret = get_errno(tee(arg1,arg2,arg3,arg4));
10692 }
10693 break;
10694#endif
10695#ifdef TARGET_NR_splice
10696 case TARGET_NR_splice:
10697 {
10698 loff_t loff_in, loff_out;
10699 loff_t *ploff_in = NULL, *ploff_out = NULL;
Andreas Schwab17644b32015-03-10 17:11:35 +010010700 if (arg2) {
10701 if (get_user_u64(loff_in, arg2)) {
10702 goto efault;
10703 }
vibisreenivasan3ce34df2009-05-16 18:32:41 +053010704 ploff_in = &loff_in;
10705 }
Andreas Schwab17644b32015-03-10 17:11:35 +010010706 if (arg4) {
10707 if (get_user_u64(loff_out, arg4)) {
10708 goto efault;
10709 }
vibisreenivasan3ce34df2009-05-16 18:32:41 +053010710 ploff_out = &loff_out;
10711 }
10712 ret = get_errno(splice(arg1, ploff_in, arg3, ploff_out, arg5, arg6));
Andreas Schwab17644b32015-03-10 17:11:35 +010010713 if (arg2) {
10714 if (put_user_u64(loff_in, arg2)) {
10715 goto efault;
10716 }
10717 }
10718 if (arg4) {
10719 if (put_user_u64(loff_out, arg4)) {
10720 goto efault;
10721 }
10722 }
vibisreenivasan3ce34df2009-05-16 18:32:41 +053010723 }
10724 break;
10725#endif
10726#ifdef TARGET_NR_vmsplice
10727 case TARGET_NR_vmsplice:
10728 {
Richard Hendersonf287b2c2012-09-15 13:20:25 -070010729 struct iovec *vec = lock_iovec(VERIFY_READ, arg2, arg3, 1);
10730 if (vec != NULL) {
10731 ret = get_errno(vmsplice(arg1, vec, arg3, arg4));
10732 unlock_iovec(vec, arg2, arg3, 0);
10733 } else {
10734 ret = -host_to_target_errno(errno);
10735 }
vibisreenivasan3ce34df2009-05-16 18:32:41 +053010736 }
10737 break;
10738#endif
10739#endif /* CONFIG_SPLICE */
Riku Voipioc2882b92009-08-12 15:08:24 +030010740#ifdef CONFIG_EVENTFD
10741#if defined(TARGET_NR_eventfd)
10742 case TARGET_NR_eventfd:
10743 ret = get_errno(eventfd(arg1, 0));
Laurent Viviere36800c2015-10-02 14:48:09 +020010744 fd_trans_unregister(ret);
Riku Voipioc2882b92009-08-12 15:08:24 +030010745 break;
10746#endif
10747#if defined(TARGET_NR_eventfd2)
10748 case TARGET_NR_eventfd2:
Petar Jovanovic5947c692013-04-08 20:26:10 +020010749 {
10750 int host_flags = arg2 & (~(TARGET_O_NONBLOCK | TARGET_O_CLOEXEC));
10751 if (arg2 & TARGET_O_NONBLOCK) {
10752 host_flags |= O_NONBLOCK;
10753 }
10754 if (arg2 & TARGET_O_CLOEXEC) {
10755 host_flags |= O_CLOEXEC;
10756 }
10757 ret = get_errno(eventfd(arg1, host_flags));
Laurent Viviere36800c2015-10-02 14:48:09 +020010758 fd_trans_unregister(ret);
Riku Voipioc2882b92009-08-12 15:08:24 +030010759 break;
Petar Jovanovic5947c692013-04-08 20:26:10 +020010760 }
Riku Voipioc2882b92009-08-12 15:08:24 +030010761#endif
10762#endif /* CONFIG_EVENTFD */
Ulrich Hechtd0927932009-09-17 20:22:14 +030010763#if defined(CONFIG_FALLOCATE) && defined(TARGET_NR_fallocate)
10764 case TARGET_NR_fallocate:
Alexander Graf20249ae2012-02-06 21:37:07 +010010765#if TARGET_ABI_BITS == 32
10766 ret = get_errno(fallocate(arg1, arg2, target_offset64(arg3, arg4),
10767 target_offset64(arg5, arg6)));
10768#else
Ulrich Hechtd0927932009-09-17 20:22:14 +030010769 ret = get_errno(fallocate(arg1, arg2, arg3, arg4));
Alexander Graf20249ae2012-02-06 21:37:07 +010010770#endif
Ulrich Hechtd0927932009-09-17 20:22:14 +030010771 break;
10772#endif
Peter Maydellc727f472011-01-06 11:05:10 +000010773#if defined(CONFIG_SYNC_FILE_RANGE)
10774#if defined(TARGET_NR_sync_file_range)
10775 case TARGET_NR_sync_file_range:
10776#if TARGET_ABI_BITS == 32
Riku Voipiobfcedc52011-06-20 16:24:39 +030010777#if defined(TARGET_MIPS)
10778 ret = get_errno(sync_file_range(arg1, target_offset64(arg3, arg4),
10779 target_offset64(arg5, arg6), arg7));
10780#else
Peter Maydellc727f472011-01-06 11:05:10 +000010781 ret = get_errno(sync_file_range(arg1, target_offset64(arg2, arg3),
10782 target_offset64(arg4, arg5), arg6));
Riku Voipiobfcedc52011-06-20 16:24:39 +030010783#endif /* !TARGET_MIPS */
Peter Maydellc727f472011-01-06 11:05:10 +000010784#else
10785 ret = get_errno(sync_file_range(arg1, arg2, arg3, arg4));
10786#endif
10787 break;
10788#endif
10789#if defined(TARGET_NR_sync_file_range2)
10790 case TARGET_NR_sync_file_range2:
10791 /* This is like sync_file_range but the arguments are reordered */
10792#if TARGET_ABI_BITS == 32
10793 ret = get_errno(sync_file_range(arg1, target_offset64(arg3, arg4),
10794 target_offset64(arg5, arg6), arg2));
10795#else
10796 ret = get_errno(sync_file_range(arg1, arg3, arg4, arg2));
10797#endif
10798 break;
10799#endif
10800#endif
Laurent Viviere36800c2015-10-02 14:48:09 +020010801#if defined(TARGET_NR_signalfd4)
10802 case TARGET_NR_signalfd4:
10803 ret = do_signalfd4(arg1, arg2, arg4);
10804 break;
10805#endif
10806#if defined(TARGET_NR_signalfd)
10807 case TARGET_NR_signalfd:
10808 ret = do_signalfd4(arg1, arg2, 0);
10809 break;
10810#endif
Peter Maydell3b6edd12011-02-15 18:35:05 +000010811#if defined(CONFIG_EPOLL)
10812#if defined(TARGET_NR_epoll_create)
10813 case TARGET_NR_epoll_create:
10814 ret = get_errno(epoll_create(arg1));
10815 break;
10816#endif
10817#if defined(TARGET_NR_epoll_create1) && defined(CONFIG_EPOLL_CREATE1)
10818 case TARGET_NR_epoll_create1:
10819 ret = get_errno(epoll_create1(arg1));
10820 break;
10821#endif
10822#if defined(TARGET_NR_epoll_ctl)
10823 case TARGET_NR_epoll_ctl:
10824 {
10825 struct epoll_event ep;
10826 struct epoll_event *epp = 0;
10827 if (arg4) {
10828 struct target_epoll_event *target_ep;
10829 if (!lock_user_struct(VERIFY_READ, target_ep, arg4, 1)) {
10830 goto efault;
10831 }
10832 ep.events = tswap32(target_ep->events);
10833 /* The epoll_data_t union is just opaque data to the kernel,
10834 * so we transfer all 64 bits across and need not worry what
10835 * actual data type it is.
10836 */
10837 ep.data.u64 = tswap64(target_ep->data.u64);
10838 unlock_user_struct(target_ep, arg4, 0);
10839 epp = &ep;
10840 }
10841 ret = get_errno(epoll_ctl(arg1, arg2, arg3, epp));
10842 break;
10843 }
10844#endif
10845
Peter Maydell227f0212016-06-06 19:58:11 +010010846#if defined(TARGET_NR_epoll_wait) || defined(TARGET_NR_epoll_pwait)
Peter Maydell3b6edd12011-02-15 18:35:05 +000010847#if defined(TARGET_NR_epoll_wait)
10848 case TARGET_NR_epoll_wait:
10849#endif
Peter Maydell227f0212016-06-06 19:58:11 +010010850#if defined(TARGET_NR_epoll_pwait)
Peter Maydell3b6edd12011-02-15 18:35:05 +000010851 case TARGET_NR_epoll_pwait:
10852#endif
10853 {
10854 struct target_epoll_event *target_ep;
10855 struct epoll_event *ep;
10856 int epfd = arg1;
10857 int maxevents = arg3;
10858 int timeout = arg4;
10859
10860 target_ep = lock_user(VERIFY_WRITE, arg2,
10861 maxevents * sizeof(struct target_epoll_event), 1);
10862 if (!target_ep) {
10863 goto efault;
10864 }
10865
10866 ep = alloca(maxevents * sizeof(struct epoll_event));
10867
10868 switch (num) {
Peter Maydell227f0212016-06-06 19:58:11 +010010869#if defined(TARGET_NR_epoll_pwait)
Peter Maydell3b6edd12011-02-15 18:35:05 +000010870 case TARGET_NR_epoll_pwait:
10871 {
10872 target_sigset_t *target_set;
10873 sigset_t _set, *set = &_set;
10874
10875 if (arg5) {
10876 target_set = lock_user(VERIFY_READ, arg5,
10877 sizeof(target_sigset_t), 1);
10878 if (!target_set) {
10879 unlock_user(target_ep, arg2, 0);
10880 goto efault;
10881 }
10882 target_to_host_sigset(set, target_set);
10883 unlock_user(target_set, arg5, 0);
10884 } else {
10885 set = NULL;
10886 }
10887
Peter Maydell227f0212016-06-06 19:58:11 +010010888 ret = get_errno(safe_epoll_pwait(epfd, ep, maxevents, timeout,
10889 set, SIGSET_T_SIZE));
Peter Maydell3b6edd12011-02-15 18:35:05 +000010890 break;
10891 }
10892#endif
10893#if defined(TARGET_NR_epoll_wait)
10894 case TARGET_NR_epoll_wait:
Peter Maydell227f0212016-06-06 19:58:11 +010010895 ret = get_errno(safe_epoll_pwait(epfd, ep, maxevents, timeout,
10896 NULL, 0));
Peter Maydell3b6edd12011-02-15 18:35:05 +000010897 break;
10898#endif
10899 default:
10900 ret = -TARGET_ENOSYS;
10901 }
10902 if (!is_error(ret)) {
10903 int i;
10904 for (i = 0; i < ret; i++) {
10905 target_ep[i].events = tswap32(ep[i].events);
10906 target_ep[i].data.u64 = tswap64(ep[i].data.u64);
10907 }
10908 }
10909 unlock_user(target_ep, arg2, ret * sizeof(struct target_epoll_event));
10910 break;
10911 }
10912#endif
10913#endif
Peter Maydell163a05a2011-06-27 17:44:52 +010010914#ifdef TARGET_NR_prlimit64
10915 case TARGET_NR_prlimit64:
10916 {
10917 /* args: pid, resource number, ptr to new rlimit, ptr to old rlimit */
10918 struct target_rlimit64 *target_rnew, *target_rold;
10919 struct host_rlimit64 rnew, rold, *rnewp = 0;
Felix Janda95018012014-12-02 22:11:17 +010010920 int resource = target_to_host_resource(arg2);
Peter Maydell163a05a2011-06-27 17:44:52 +010010921 if (arg3) {
10922 if (!lock_user_struct(VERIFY_READ, target_rnew, arg3, 1)) {
10923 goto efault;
10924 }
10925 rnew.rlim_cur = tswap64(target_rnew->rlim_cur);
10926 rnew.rlim_max = tswap64(target_rnew->rlim_max);
10927 unlock_user_struct(target_rnew, arg3, 0);
10928 rnewp = &rnew;
10929 }
10930
Felix Janda95018012014-12-02 22:11:17 +010010931 ret = get_errno(sys_prlimit64(arg1, resource, rnewp, arg4 ? &rold : 0));
Peter Maydell163a05a2011-06-27 17:44:52 +010010932 if (!is_error(ret) && arg4) {
10933 if (!lock_user_struct(VERIFY_WRITE, target_rold, arg4, 1)) {
10934 goto efault;
10935 }
10936 target_rold->rlim_cur = tswap64(rold.rlim_cur);
10937 target_rold->rlim_max = tswap64(rold.rlim_max);
10938 unlock_user_struct(target_rold, arg4, 1);
10939 }
10940 break;
10941 }
10942#endif
Richard Henderson3d21d292012-09-15 13:20:46 -070010943#ifdef TARGET_NR_gethostname
10944 case TARGET_NR_gethostname:
10945 {
10946 char *name = lock_user(VERIFY_WRITE, arg1, arg2, 0);
10947 if (name) {
10948 ret = get_errno(gethostname(name, arg2));
10949 unlock_user(name, arg1, arg2);
10950 } else {
10951 ret = -TARGET_EFAULT;
10952 }
10953 break;
10954 }
10955#endif
Riku Voipio89aaf1a2013-07-24 09:44:26 +030010956#ifdef TARGET_NR_atomic_cmpxchg_32
10957 case TARGET_NR_atomic_cmpxchg_32:
10958 {
10959 /* should use start_exclusive from main.c */
10960 abi_ulong mem_value;
10961 if (get_user_u32(mem_value, arg6)) {
10962 target_siginfo_t info;
10963 info.si_signo = SIGSEGV;
10964 info.si_errno = 0;
10965 info.si_code = TARGET_SEGV_MAPERR;
10966 info._sifields._sigfault._addr = arg6;
10967 queue_signal((CPUArchState *)cpu_env, info.si_signo, &info);
10968 ret = 0xdeadbeef;
10969
10970 }
10971 if (mem_value == arg2)
10972 put_user_u32(arg1, arg6);
10973 ret = mem_value;
10974 break;
10975 }
10976#endif
10977#ifdef TARGET_NR_atomic_barrier
10978 case TARGET_NR_atomic_barrier:
10979 {
10980 /* Like the kernel implementation and the qemu arm barrier, no-op this? */
Peter Maydell3b899ea2014-03-12 13:06:01 +000010981 ret = 0;
Riku Voipio89aaf1a2013-07-24 09:44:26 +030010982 break;
10983 }
10984#endif
Erik de Castro Lopof4f1e102013-11-29 18:39:23 +110010985
10986#ifdef TARGET_NR_timer_create
10987 case TARGET_NR_timer_create:
10988 {
10989 /* args: clockid_t clockid, struct sigevent *sevp, timer_t *timerid */
10990
10991 struct sigevent host_sevp = { {0}, }, *phost_sevp = NULL;
Erik de Castro Lopof4f1e102013-11-29 18:39:23 +110010992
10993 int clkid = arg1;
10994 int timer_index = next_free_host_timer();
10995
10996 if (timer_index < 0) {
10997 ret = -TARGET_EAGAIN;
10998 } else {
10999 timer_t *phtimer = g_posix_timers + timer_index;
11000
11001 if (arg2) {
Erik de Castro Lopof4f1e102013-11-29 18:39:23 +110011002 phost_sevp = &host_sevp;
Peter Maydellc0659762014-08-09 15:42:32 +010011003 ret = target_to_host_sigevent(phost_sevp, arg2);
11004 if (ret != 0) {
11005 break;
11006 }
Erik de Castro Lopof4f1e102013-11-29 18:39:23 +110011007 }
11008
11009 ret = get_errno(timer_create(clkid, phost_sevp, phtimer));
11010 if (ret) {
11011 phtimer = NULL;
11012 } else {
Alexander Grafaecc8862014-11-10 21:33:03 +010011013 if (put_user(TIMER_MAGIC | timer_index, arg3, target_timer_t)) {
Erik de Castro Lopof4f1e102013-11-29 18:39:23 +110011014 goto efault;
11015 }
Erik de Castro Lopof4f1e102013-11-29 18:39:23 +110011016 }
11017 }
11018 break;
11019 }
11020#endif
11021
11022#ifdef TARGET_NR_timer_settime
11023 case TARGET_NR_timer_settime:
11024 {
11025 /* args: timer_t timerid, int flags, const struct itimerspec *new_value,
11026 * struct itimerspec * old_value */
Alexander Grafaecc8862014-11-10 21:33:03 +010011027 target_timer_t timerid = get_timer_id(arg1);
Alexander Grafe52a99f2014-08-22 13:56:18 +020011028
Alexander Grafaecc8862014-11-10 21:33:03 +010011029 if (timerid < 0) {
11030 ret = timerid;
11031 } else if (arg3 == 0) {
Erik de Castro Lopof4f1e102013-11-29 18:39:23 +110011032 ret = -TARGET_EINVAL;
11033 } else {
Alexander Grafe52a99f2014-08-22 13:56:18 +020011034 timer_t htimer = g_posix_timers[timerid];
Erik de Castro Lopof4f1e102013-11-29 18:39:23 +110011035 struct itimerspec hspec_new = {{0},}, hspec_old = {{0},};
11036
11037 target_to_host_itimerspec(&hspec_new, arg3);
11038 ret = get_errno(
11039 timer_settime(htimer, arg2, &hspec_new, &hspec_old));
11040 host_to_target_itimerspec(arg2, &hspec_old);
11041 }
11042 break;
11043 }
11044#endif
11045
11046#ifdef TARGET_NR_timer_gettime
11047 case TARGET_NR_timer_gettime:
11048 {
11049 /* args: timer_t timerid, struct itimerspec *curr_value */
Alexander Grafaecc8862014-11-10 21:33:03 +010011050 target_timer_t timerid = get_timer_id(arg1);
Alexander Grafe52a99f2014-08-22 13:56:18 +020011051
Alexander Grafaecc8862014-11-10 21:33:03 +010011052 if (timerid < 0) {
11053 ret = timerid;
11054 } else if (!arg2) {
11055 ret = -TARGET_EFAULT;
Erik de Castro Lopof4f1e102013-11-29 18:39:23 +110011056 } else {
Alexander Grafe52a99f2014-08-22 13:56:18 +020011057 timer_t htimer = g_posix_timers[timerid];
Erik de Castro Lopof4f1e102013-11-29 18:39:23 +110011058 struct itimerspec hspec;
11059 ret = get_errno(timer_gettime(htimer, &hspec));
11060
11061 if (host_to_target_itimerspec(arg2, &hspec)) {
11062 ret = -TARGET_EFAULT;
11063 }
11064 }
11065 break;
11066 }
11067#endif
11068
11069#ifdef TARGET_NR_timer_getoverrun
11070 case TARGET_NR_timer_getoverrun:
11071 {
11072 /* args: timer_t timerid */
Alexander Grafaecc8862014-11-10 21:33:03 +010011073 target_timer_t timerid = get_timer_id(arg1);
Alexander Grafe52a99f2014-08-22 13:56:18 +020011074
Alexander Grafaecc8862014-11-10 21:33:03 +010011075 if (timerid < 0) {
11076 ret = timerid;
Erik de Castro Lopof4f1e102013-11-29 18:39:23 +110011077 } else {
Alexander Grafe52a99f2014-08-22 13:56:18 +020011078 timer_t htimer = g_posix_timers[timerid];
Erik de Castro Lopof4f1e102013-11-29 18:39:23 +110011079 ret = get_errno(timer_getoverrun(htimer));
11080 }
Laurent Viviere36800c2015-10-02 14:48:09 +020011081 fd_trans_unregister(ret);
Erik de Castro Lopof4f1e102013-11-29 18:39:23 +110011082 break;
11083 }
11084#endif
11085
11086#ifdef TARGET_NR_timer_delete
11087 case TARGET_NR_timer_delete:
11088 {
11089 /* args: timer_t timerid */
Alexander Grafaecc8862014-11-10 21:33:03 +010011090 target_timer_t timerid = get_timer_id(arg1);
Alexander Grafe52a99f2014-08-22 13:56:18 +020011091
Alexander Grafaecc8862014-11-10 21:33:03 +010011092 if (timerid < 0) {
11093 ret = timerid;
Erik de Castro Lopof4f1e102013-11-29 18:39:23 +110011094 } else {
Alexander Grafe52a99f2014-08-22 13:56:18 +020011095 timer_t htimer = g_posix_timers[timerid];
Erik de Castro Lopof4f1e102013-11-29 18:39:23 +110011096 ret = get_errno(timer_delete(htimer));
Alexander Grafe52a99f2014-08-22 13:56:18 +020011097 g_posix_timers[timerid] = 0;
Erik de Castro Lopof4f1e102013-11-29 18:39:23 +110011098 }
11099 break;
11100 }
11101#endif
11102
Riku Voipio51834342014-06-22 11:25:42 +010011103#if defined(TARGET_NR_timerfd_create) && defined(CONFIG_TIMERFD)
11104 case TARGET_NR_timerfd_create:
11105 ret = get_errno(timerfd_create(arg1,
11106 target_to_host_bitmask(arg2, fcntl_flags_tbl)));
11107 break;
11108#endif
11109
11110#if defined(TARGET_NR_timerfd_gettime) && defined(CONFIG_TIMERFD)
11111 case TARGET_NR_timerfd_gettime:
11112 {
11113 struct itimerspec its_curr;
11114
11115 ret = get_errno(timerfd_gettime(arg1, &its_curr));
11116
11117 if (arg2 && host_to_target_itimerspec(arg2, &its_curr)) {
11118 goto efault;
11119 }
11120 }
11121 break;
11122#endif
11123
11124#if defined(TARGET_NR_timerfd_settime) && defined(CONFIG_TIMERFD)
11125 case TARGET_NR_timerfd_settime:
11126 {
11127 struct itimerspec its_new, its_old, *p_new;
11128
11129 if (arg3) {
11130 if (target_to_host_itimerspec(&its_new, arg3)) {
11131 goto efault;
11132 }
11133 p_new = &its_new;
11134 } else {
11135 p_new = NULL;
11136 }
11137
11138 ret = get_errno(timerfd_settime(arg1, arg2, p_new, &its_old));
11139
11140 if (arg4 && host_to_target_itimerspec(arg4, &its_old)) {
11141 goto efault;
11142 }
11143 }
11144 break;
11145#endif
11146
Paul Burtonab31cda2014-06-22 11:25:43 +010011147#if defined(TARGET_NR_ioprio_get) && defined(__NR_ioprio_get)
11148 case TARGET_NR_ioprio_get:
11149 ret = get_errno(ioprio_get(arg1, arg2));
11150 break;
11151#endif
11152
11153#if defined(TARGET_NR_ioprio_set) && defined(__NR_ioprio_set)
11154 case TARGET_NR_ioprio_set:
11155 ret = get_errno(ioprio_set(arg1, arg2, arg3));
11156 break;
11157#endif
11158
Riku Voipio9af5c902014-08-12 15:58:57 +030011159#if defined(TARGET_NR_setns) && defined(CONFIG_SETNS)
11160 case TARGET_NR_setns:
11161 ret = get_errno(setns(arg1, arg2));
11162 break;
11163#endif
11164#if defined(TARGET_NR_unshare) && defined(CONFIG_SETNS)
11165 case TARGET_NR_unshare:
11166 ret = get_errno(unshare(arg1));
11167 break;
11168#endif
11169
bellard31e31b82003-02-18 22:55:36 +000011170 default:
11171 unimplemented:
bellard5cd43932003-03-29 16:54:36 +000011172 gemu_log("qemu: Unsupported syscall: %d\n", num);
ths4f2b1fe2007-06-21 21:57:12 +000011173#if defined(TARGET_NR_setxattr) || defined(TARGET_NR_get_thread_area) || defined(TARGET_NR_getdomainname) || defined(TARGET_NR_set_robust_list)
bellard5cd43932003-03-29 16:54:36 +000011174 unimplemented_nowarn:
bellard80a9d032005-01-03 23:31:27 +000011175#endif
ths0da46a62007-10-20 20:23:07 +000011176 ret = -TARGET_ENOSYS;
bellard31e31b82003-02-18 22:55:36 +000011177 break;
11178 }
bellard579a97f2007-11-11 14:26:47 +000011179fail:
bellardc573ff62004-01-04 15:51:36 +000011180#ifdef DEBUG
Blue Swirl0bf9e312009-07-20 17:19:25 +000011181 gemu_log(" = " TARGET_ABI_FMT_ld "\n", ret);
bellardc573ff62004-01-04 15:51:36 +000011182#endif
thsb92c47c2007-11-01 00:07:38 +000011183 if(do_strace)
11184 print_syscall_ret(num, ret);
bellard31e31b82003-02-18 22:55:36 +000011185 return ret;
bellard579a97f2007-11-11 14:26:47 +000011186efault:
11187 ret = -TARGET_EFAULT;
11188 goto fail;
bellard31e31b82003-02-18 22:55:36 +000011189}