mirror of https://github.com/xemu-project/xemu.git
Merge remote-tracking branch 'remotes/riku/linux-user-for-upstream' into staging
* remotes/riku/linux-user-for-upstream: linux-user: use TARGET_SA_ONSTACK in get_sigframe alloca one extra byte sockets linux-user: handle AF_PACKET sockaddrs in target_to_host_sockaddr qemu-user: Impl. setsockopt(SO_BINDTODEVICE) SIOCGIFINDEX: fix typo Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
This commit is contained in:
commit
cbb46f5f49
|
@ -118,7 +118,7 @@
|
|||
IOCTL(SIOCSIFMEM, IOC_W, MK_PTR(MK_STRUCT(STRUCT_ptr_ifreq)))
|
||||
IOCTL(SIOCADDMULTI, IOC_W, MK_PTR(MK_STRUCT(STRUCT_sockaddr_ifreq)))
|
||||
IOCTL(SIOCDELMULTI, IOC_W, MK_PTR(MK_STRUCT(STRUCT_sockaddr_ifreq)))
|
||||
IOCTL(SIOCGIFINDEX, IOC_W | IOC_R, MK_PTR(MK_STRUCT(STRUCT_sockaddr_ifreq)))
|
||||
IOCTL(SIOCGIFINDEX, IOC_W | IOC_R, MK_PTR(MK_STRUCT(STRUCT_int_ifreq)))
|
||||
IOCTL(SIOCSIFLINK, 0, TYPE_NULL)
|
||||
IOCTL_SPECIAL(SIOCGIFCONF, IOC_W | IOC_R, do_ioctl_ifconf,
|
||||
MK_PTR(MK_STRUCT(STRUCT_ifconf)))
|
||||
|
|
|
@ -1305,7 +1305,7 @@ static abi_ulong get_sigframe(struct target_sigaction *ka, CPUARMState *env)
|
|||
/*
|
||||
* This is the X/Open sanctioned signal stack switching.
|
||||
*/
|
||||
if ((ka->sa_flags & SA_ONSTACK) && !sas_ss_flags(sp)) {
|
||||
if ((ka->sa_flags & TARGET_SA_ONSTACK) && !sas_ss_flags(sp)) {
|
||||
sp = target_sigaltstack_used.ss_sp + target_sigaltstack_used.ss_size;
|
||||
}
|
||||
|
||||
|
@ -3509,8 +3509,9 @@ static abi_ulong get_sigframe(struct target_sigaction *ka,
|
|||
{
|
||||
abi_ulong sp = env->regs[1];
|
||||
|
||||
if ((ka->sa_flags & SA_ONSTACK) != 0 && !on_sig_stack(sp))
|
||||
if ((ka->sa_flags & TARGET_SA_ONSTACK) != 0 && !on_sig_stack(sp)) {
|
||||
sp = target_sigaltstack_used.ss_sp + target_sigaltstack_used.ss_size;
|
||||
}
|
||||
|
||||
return ((sp - frame_size) & -8UL);
|
||||
}
|
||||
|
@ -3891,7 +3892,7 @@ static inline abi_ulong get_sigframe(struct target_sigaction *ka,
|
|||
|
||||
/* redzone */
|
||||
/* This is the X/Open sanctioned signal stack switching. */
|
||||
if ((ka->sa_flags & SA_ONSTACK) != 0 && !onsigstack) {
|
||||
if ((ka->sa_flags & TARGET_SA_ONSTACK) != 0 && !onsigstack) {
|
||||
sp = target_sigaltstack_used.ss_sp + target_sigaltstack_used.ss_size;
|
||||
}
|
||||
|
||||
|
|
|
@ -1140,6 +1140,13 @@ static inline abi_long target_to_host_sockaddr(struct sockaddr *addr,
|
|||
|
||||
memcpy(addr, target_saddr, len);
|
||||
addr->sa_family = sa_family;
|
||||
if (sa_family == AF_PACKET) {
|
||||
struct target_sockaddr_ll *lladdr;
|
||||
|
||||
lladdr = (struct target_sockaddr_ll *)addr;
|
||||
lladdr->sll_ifindex = tswap32(lladdr->sll_ifindex);
|
||||
lladdr->sll_hatype = tswap16(lladdr->sll_hatype);
|
||||
}
|
||||
unlock_user(target_saddr, target_addr, 0);
|
||||
|
||||
return 0;
|
||||
|
@ -1497,6 +1504,25 @@ set_timeout:
|
|||
unlock_user_struct(tfprog, optval_addr, 1);
|
||||
return ret;
|
||||
}
|
||||
case TARGET_SO_BINDTODEVICE:
|
||||
{
|
||||
char *dev_ifname, *addr_ifname;
|
||||
|
||||
if (optlen > IFNAMSIZ - 1) {
|
||||
optlen = IFNAMSIZ - 1;
|
||||
}
|
||||
dev_ifname = lock_user(VERIFY_READ, optval_addr, optlen, 1);
|
||||
if (!dev_ifname) {
|
||||
return -TARGET_EFAULT;
|
||||
}
|
||||
optname = SO_BINDTODEVICE;
|
||||
addr_ifname = alloca(IFNAMSIZ);
|
||||
memcpy(addr_ifname, dev_ifname, optlen);
|
||||
addr_ifname[optlen] = 0;
|
||||
ret = get_errno(setsockopt(sockfd, level, optname, addr_ifname, optlen));
|
||||
unlock_user (dev_ifname, optval_addr, 0);
|
||||
return ret;
|
||||
}
|
||||
/* Options with 'int' argument. */
|
||||
case TARGET_SO_DEBUG:
|
||||
optname = SO_DEBUG;
|
||||
|
@ -1958,7 +1984,7 @@ static abi_long do_connect(int sockfd, abi_ulong target_addr,
|
|||
return -TARGET_EINVAL;
|
||||
}
|
||||
|
||||
addr = alloca(addrlen);
|
||||
addr = alloca(addrlen+1);
|
||||
|
||||
ret = target_to_host_sockaddr(addr, target_addr, addrlen);
|
||||
if (ret)
|
||||
|
@ -1979,7 +2005,7 @@ static abi_long do_sendrecvmsg_locked(int fd, struct target_msghdr *msgp,
|
|||
|
||||
if (msgp->msg_name) {
|
||||
msg.msg_namelen = tswap32(msgp->msg_namelen);
|
||||
msg.msg_name = alloca(msg.msg_namelen);
|
||||
msg.msg_name = alloca(msg.msg_namelen+1);
|
||||
ret = target_to_host_sockaddr(msg.msg_name, tswapal(msgp->msg_name),
|
||||
msg.msg_namelen);
|
||||
if (ret) {
|
||||
|
@ -2242,7 +2268,7 @@ static abi_long do_sendto(int fd, abi_ulong msg, size_t len, int flags,
|
|||
if (!host_msg)
|
||||
return -TARGET_EFAULT;
|
||||
if (target_addr) {
|
||||
addr = alloca(addrlen);
|
||||
addr = alloca(addrlen+1);
|
||||
ret = target_to_host_sockaddr(addr, target_addr, addrlen);
|
||||
if (ret) {
|
||||
unlock_user(host_msg, msg, 0);
|
||||
|
|
|
@ -121,6 +121,16 @@ struct target_sockaddr {
|
|||
uint8_t sa_data[14];
|
||||
};
|
||||
|
||||
struct target_sockaddr_ll {
|
||||
uint16_t sll_family; /* Always AF_PACKET */
|
||||
uint16_t sll_protocol; /* Physical layer protocol */
|
||||
int sll_ifindex; /* Interface number */
|
||||
uint16_t sll_hatype; /* ARP hardware type */
|
||||
uint8_t sll_pkttype; /* Packet type */
|
||||
uint8_t sll_halen; /* Length of address */
|
||||
uint8_t sll_addr[8]; /* Physical layer address */
|
||||
};
|
||||
|
||||
struct target_sock_filter {
|
||||
abi_ushort code;
|
||||
uint8_t jt;
|
||||
|
|
Loading…
Reference in New Issue