Merge remote-tracking branch 'remotes/riku/linux-user-for-upstream' into staging
* remotes/riku/linux-user-for-upstream: linux-user: use TARGET_SA_ONSTACK in get_sigframe alloca one extra byte sockets linux-user: handle AF_PACKET sockaddrs in target_to_host_sockaddr qemu-user: Impl. setsockopt(SO_BINDTODEVICE) SIOCGIFINDEX: fix typo Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
This commit is contained in:
		
						commit
						cbb46f5f49
					
				@ -118,7 +118,7 @@
 | 
			
		||||
  IOCTL(SIOCSIFMEM, IOC_W, MK_PTR(MK_STRUCT(STRUCT_ptr_ifreq)))
 | 
			
		||||
  IOCTL(SIOCADDMULTI, IOC_W, MK_PTR(MK_STRUCT(STRUCT_sockaddr_ifreq)))
 | 
			
		||||
  IOCTL(SIOCDELMULTI, IOC_W, MK_PTR(MK_STRUCT(STRUCT_sockaddr_ifreq)))
 | 
			
		||||
  IOCTL(SIOCGIFINDEX, IOC_W | IOC_R, MK_PTR(MK_STRUCT(STRUCT_sockaddr_ifreq)))
 | 
			
		||||
  IOCTL(SIOCGIFINDEX, IOC_W | IOC_R, MK_PTR(MK_STRUCT(STRUCT_int_ifreq)))
 | 
			
		||||
  IOCTL(SIOCSIFLINK, 0, TYPE_NULL)
 | 
			
		||||
  IOCTL_SPECIAL(SIOCGIFCONF, IOC_W | IOC_R, do_ioctl_ifconf,
 | 
			
		||||
                MK_PTR(MK_STRUCT(STRUCT_ifconf)))
 | 
			
		||||
 | 
			
		||||
@ -1305,7 +1305,7 @@ static abi_ulong get_sigframe(struct target_sigaction *ka, CPUARMState *env)
 | 
			
		||||
    /*
 | 
			
		||||
     * This is the X/Open sanctioned signal stack switching.
 | 
			
		||||
     */
 | 
			
		||||
    if ((ka->sa_flags & SA_ONSTACK) && !sas_ss_flags(sp)) {
 | 
			
		||||
    if ((ka->sa_flags & TARGET_SA_ONSTACK) && !sas_ss_flags(sp)) {
 | 
			
		||||
        sp = target_sigaltstack_used.ss_sp + target_sigaltstack_used.ss_size;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
@ -3509,8 +3509,9 @@ static abi_ulong get_sigframe(struct target_sigaction *ka,
 | 
			
		||||
{
 | 
			
		||||
    abi_ulong sp = env->regs[1];
 | 
			
		||||
 | 
			
		||||
    if ((ka->sa_flags & SA_ONSTACK) != 0 && !on_sig_stack(sp))
 | 
			
		||||
    if ((ka->sa_flags & TARGET_SA_ONSTACK) != 0 && !on_sig_stack(sp)) {
 | 
			
		||||
        sp = target_sigaltstack_used.ss_sp + target_sigaltstack_used.ss_size;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    return ((sp - frame_size) & -8UL);
 | 
			
		||||
}
 | 
			
		||||
@ -3891,7 +3892,7 @@ static inline abi_ulong get_sigframe(struct target_sigaction *ka,
 | 
			
		||||
 | 
			
		||||
    /* redzone */
 | 
			
		||||
    /* This is the X/Open sanctioned signal stack switching.  */
 | 
			
		||||
    if ((ka->sa_flags & SA_ONSTACK) != 0 && !onsigstack) {
 | 
			
		||||
    if ((ka->sa_flags & TARGET_SA_ONSTACK) != 0 && !onsigstack) {
 | 
			
		||||
        sp = target_sigaltstack_used.ss_sp + target_sigaltstack_used.ss_size;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
@ -1140,6 +1140,13 @@ static inline abi_long target_to_host_sockaddr(struct sockaddr *addr,
 | 
			
		||||
 | 
			
		||||
    memcpy(addr, target_saddr, len);
 | 
			
		||||
    addr->sa_family = sa_family;
 | 
			
		||||
    if (sa_family == AF_PACKET) {
 | 
			
		||||
	struct target_sockaddr_ll *lladdr;
 | 
			
		||||
 | 
			
		||||
	lladdr = (struct target_sockaddr_ll *)addr;
 | 
			
		||||
	lladdr->sll_ifindex = tswap32(lladdr->sll_ifindex);
 | 
			
		||||
	lladdr->sll_hatype = tswap16(lladdr->sll_hatype);
 | 
			
		||||
    }
 | 
			
		||||
    unlock_user(target_saddr, target_addr, 0);
 | 
			
		||||
 | 
			
		||||
    return 0;
 | 
			
		||||
@ -1496,6 +1503,25 @@ set_timeout:
 | 
			
		||||
                unlock_user_struct(tfilter, tfprog->filter, 1);
 | 
			
		||||
                unlock_user_struct(tfprog, optval_addr, 1);
 | 
			
		||||
                return ret;
 | 
			
		||||
        }
 | 
			
		||||
	case TARGET_SO_BINDTODEVICE:
 | 
			
		||||
	{
 | 
			
		||||
		char *dev_ifname, *addr_ifname;
 | 
			
		||||
 | 
			
		||||
		if (optlen > IFNAMSIZ - 1) {
 | 
			
		||||
		    optlen = IFNAMSIZ - 1;
 | 
			
		||||
		}
 | 
			
		||||
		dev_ifname = lock_user(VERIFY_READ, optval_addr, optlen, 1);
 | 
			
		||||
		if (!dev_ifname) {
 | 
			
		||||
		    return -TARGET_EFAULT;
 | 
			
		||||
		}
 | 
			
		||||
		optname = SO_BINDTODEVICE;
 | 
			
		||||
		addr_ifname = alloca(IFNAMSIZ);
 | 
			
		||||
		memcpy(addr_ifname, dev_ifname, optlen);
 | 
			
		||||
		addr_ifname[optlen] = 0;
 | 
			
		||||
		ret = get_errno(setsockopt(sockfd, level, optname, addr_ifname, optlen));
 | 
			
		||||
		unlock_user (dev_ifname, optval_addr, 0);
 | 
			
		||||
		return ret;
 | 
			
		||||
	}
 | 
			
		||||
            /* Options with 'int' argument.  */
 | 
			
		||||
        case TARGET_SO_DEBUG:
 | 
			
		||||
@ -1958,7 +1984,7 @@ static abi_long do_connect(int sockfd, abi_ulong target_addr,
 | 
			
		||||
        return -TARGET_EINVAL;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    addr = alloca(addrlen);
 | 
			
		||||
    addr = alloca(addrlen+1);
 | 
			
		||||
 | 
			
		||||
    ret = target_to_host_sockaddr(addr, target_addr, addrlen);
 | 
			
		||||
    if (ret)
 | 
			
		||||
@ -1979,7 +2005,7 @@ static abi_long do_sendrecvmsg_locked(int fd, struct target_msghdr *msgp,
 | 
			
		||||
 | 
			
		||||
    if (msgp->msg_name) {
 | 
			
		||||
        msg.msg_namelen = tswap32(msgp->msg_namelen);
 | 
			
		||||
        msg.msg_name = alloca(msg.msg_namelen);
 | 
			
		||||
        msg.msg_name = alloca(msg.msg_namelen+1);
 | 
			
		||||
        ret = target_to_host_sockaddr(msg.msg_name, tswapal(msgp->msg_name),
 | 
			
		||||
                                msg.msg_namelen);
 | 
			
		||||
        if (ret) {
 | 
			
		||||
@ -2242,7 +2268,7 @@ static abi_long do_sendto(int fd, abi_ulong msg, size_t len, int flags,
 | 
			
		||||
    if (!host_msg)
 | 
			
		||||
        return -TARGET_EFAULT;
 | 
			
		||||
    if (target_addr) {
 | 
			
		||||
        addr = alloca(addrlen);
 | 
			
		||||
        addr = alloca(addrlen+1);
 | 
			
		||||
        ret = target_to_host_sockaddr(addr, target_addr, addrlen);
 | 
			
		||||
        if (ret) {
 | 
			
		||||
            unlock_user(host_msg, msg, 0);
 | 
			
		||||
 | 
			
		||||
@ -121,6 +121,16 @@ struct target_sockaddr {
 | 
			
		||||
    uint8_t sa_data[14];
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
struct target_sockaddr_ll {
 | 
			
		||||
    uint16_t sll_family;   /* Always AF_PACKET */
 | 
			
		||||
    uint16_t sll_protocol; /* Physical layer protocol */
 | 
			
		||||
    int      sll_ifindex;  /* Interface number */
 | 
			
		||||
    uint16_t sll_hatype;   /* ARP hardware type */
 | 
			
		||||
    uint8_t  sll_pkttype;  /* Packet type */
 | 
			
		||||
    uint8_t  sll_halen;    /* Length of address */
 | 
			
		||||
    uint8_t  sll_addr[8];  /* Physical layer address */
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
struct target_sock_filter {
 | 
			
		||||
    abi_ushort code;
 | 
			
		||||
    uint8_t jt;
 | 
			
		||||
 | 
			
		||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user