Additions/fixes for Tru64 syscall emulation.

We can now run the SimpleScalar wupwise binary
to completion on the test input.
Didn't have time to do more testing, but I fixed
a major problem w/getdirentries that should help
a lot more programs run.

arch/alpha/alpha_tru64_process.cc:
    Add truncate, ftruncate, statfs, and fstatfs.
    Add v4.x (pre-F64) stat, fstat, and lstat.
    Add setsysinfo (though all it does is provide more
    specific warning messages).
    Fix subtle but major bug in getdirentries.
sim/syscall_emul.cc:
sim/syscall_emul.hh:
    Add truncate, ftruncate, statfs, and fstatfs.

--HG--
extra : convert_revision : 9037393d00dc49b0074a41603ea647587f5a9ec7
This commit is contained in:
Steve Reinhardt
2005-06-03 16:19:34 -04:00
parent 890e37ecd9
commit 22eccce34b
3 changed files with 325 additions and 48 deletions

View File

@@ -193,7 +193,7 @@ gethostnameFunc(SyscallDesc *desc, int num, Process *p, ExecContext *xc)
SyscallReturn
unlinkFunc(SyscallDesc *desc, int num, Process *p, ExecContext *xc)
{
std::string path;
string path;
if (xc->mem->readString(path, xc->getSyscallArg(0)) != No_Fault)
return (TheISA::IntReg)-EFAULT;
@@ -205,17 +205,44 @@ unlinkFunc(SyscallDesc *desc, int num, Process *p, ExecContext *xc)
SyscallReturn
renameFunc(SyscallDesc *desc, int num, Process *p, ExecContext *xc)
{
std::string old_name;
string old_name;
if (xc->mem->readString(old_name, xc->getSyscallArg(0)) != No_Fault)
return -EFAULT;
std::string new_name;
string new_name;
if (xc->mem->readString(new_name, xc->getSyscallArg(1)) != No_Fault)
return -EFAULT;
int64_t result = rename(old_name.c_str(),new_name.c_str());
int64_t result = rename(old_name.c_str(), new_name.c_str());
return (result == -1) ? -errno : result;
}
SyscallReturn
truncateFunc(SyscallDesc *desc, int num, Process *p, ExecContext *xc)
{
string path;
if (xc->mem->readString(path, xc->getSyscallArg(0)) != No_Fault)
return -EFAULT;
off_t length = xc->getSyscallArg(1);
int result = truncate(path.c_str(), length);
return (result == -1) ? -errno : result;
}
SyscallReturn
ftruncateFunc(SyscallDesc *desc, int num, Process *process, ExecContext *xc)
{
int fd = process->sim_fd(xc->getSyscallArg(0));
if (fd < 0)
return -EBADF;
off_t length = xc->getSyscallArg(1);
int result = ftruncate(fd, length);
return (result == -1) ? -errno : result;
}

View File

@@ -158,46 +158,70 @@ class TypedBufferArg : public BaseBufferArg
/// Handler for unimplemented syscalls that we haven't thought about.
SyscallReturn unimplementedFunc(SyscallDesc *desc, int num, Process *p, ExecContext *xc);
SyscallReturn unimplementedFunc(SyscallDesc *desc, int num,
Process *p, ExecContext *xc);
/// Handler for unimplemented syscalls that we never intend to
/// implement (signal handling, etc.) and should not affect the correct
/// behavior of the program. Print a warning only if the appropriate
/// trace flag is enabled. Return success to the target program.
SyscallReturn ignoreFunc(SyscallDesc *desc, int num, Process *p, ExecContext *xc);
SyscallReturn ignoreFunc(SyscallDesc *desc, int num,
Process *p, ExecContext *xc);
/// Target exit() handler: terminate simulation.
SyscallReturn exitFunc(SyscallDesc *desc, int num, Process *p, ExecContext *xc);
SyscallReturn exitFunc(SyscallDesc *desc, int num,
Process *p, ExecContext *xc);
/// Target getpagesize() handler.
SyscallReturn getpagesizeFunc(SyscallDesc *desc, int num, Process *p, ExecContext *xc);
SyscallReturn getpagesizeFunc(SyscallDesc *desc, int num,
Process *p, ExecContext *xc);
/// Target obreak() handler: set brk address.
SyscallReturn obreakFunc(SyscallDesc *desc, int num, Process *p, ExecContext *xc);
SyscallReturn obreakFunc(SyscallDesc *desc, int num,
Process *p, ExecContext *xc);
/// Target close() handler.
SyscallReturn closeFunc(SyscallDesc *desc, int num, Process *p, ExecContext *xc);
SyscallReturn closeFunc(SyscallDesc *desc, int num,
Process *p, ExecContext *xc);
/// Target read() handler.
SyscallReturn readFunc(SyscallDesc *desc, int num, Process *p, ExecContext *xc);
SyscallReturn readFunc(SyscallDesc *desc, int num,
Process *p, ExecContext *xc);
/// Target write() handler.
SyscallReturn writeFunc(SyscallDesc *desc, int num, Process *p, ExecContext *xc);
SyscallReturn writeFunc(SyscallDesc *desc, int num,
Process *p, ExecContext *xc);
/// Target lseek() handler.
SyscallReturn lseekFunc(SyscallDesc *desc, int num, Process *p, ExecContext *xc);
SyscallReturn lseekFunc(SyscallDesc *desc, int num,
Process *p, ExecContext *xc);
/// Target munmap() handler.
SyscallReturn munmapFunc(SyscallDesc *desc, int num, Process *p, ExecContext *xc);
SyscallReturn munmapFunc(SyscallDesc *desc, int num,
Process *p, ExecContext *xc);
/// Target gethostname() handler.
SyscallReturn gethostnameFunc(SyscallDesc *desc, int num, Process *p, ExecContext *xc);
SyscallReturn gethostnameFunc(SyscallDesc *desc, int num,
Process *p, ExecContext *xc);
/// Target unlink() handler.
SyscallReturn unlinkFunc(SyscallDesc *desc, int num, Process *p, ExecContext *xc);
SyscallReturn unlinkFunc(SyscallDesc *desc, int num,
Process *p, ExecContext *xc);
/// Target rename() handler.
SyscallReturn renameFunc(SyscallDesc *desc, int num, Process *p, ExecContext *xc);
SyscallReturn renameFunc(SyscallDesc *desc, int num,
Process *p, ExecContext *xc);
/// Target truncate() handler.
SyscallReturn truncateFunc(SyscallDesc *desc, int num,
Process *p, ExecContext *xc);
/// Target ftruncate() handler.
SyscallReturn ftruncateFunc(SyscallDesc *desc, int num,
Process *p, ExecContext *xc);
/// This struct is used to build an target-OS-dependent table that
/// maps the target's open() flags to the host open() flags.
@@ -264,7 +288,8 @@ ioctlFunc(SyscallDesc *desc, int callnum, Process *process,
return -ENOTTY;
default:
fatal("Unsupported ioctl call: ioctl(%d, 0x%x, ...) @ 0x%llx\n", fd, req, xc->readPC());
fatal("Unsupported ioctl call: ioctl(%d, 0x%x, ...) @ 0x%llx\n",
fd, req, xc->readPC());
}
}
@@ -282,7 +307,7 @@ openFunc(SyscallDesc *desc, int callnum, Process *process,
if (path == "/dev/sysdev0") {
// This is a memory-mapped high-resolution timer device on Alpha.
// We don't support it, so just punt.
DCOUT(SyscallWarnings) << "Ignoring open(" << path << ", ...)" << std::endl;
warn("Ignoring open(%s, ...)\n", path);
return -ENOENT;
}
@@ -300,12 +325,14 @@ openFunc(SyscallDesc *desc, int callnum, Process *process,
// any target flags left?
if (tgtFlags != 0)
std::cerr << "Syscall: open: cannot decode flags: " << tgtFlags << std::endl;
warn("Syscall: open: cannot decode flags 0x%x", tgtFlags);
#ifdef __CYGWIN32__
hostFlags |= O_BINARY;
#endif
DPRINTF(SyscallVerbose, "opening file %s\n", path.c_str());
// open the file
int fd = open(path.c_str(), hostFlags, mode);
@@ -383,6 +410,52 @@ fstatFunc(SyscallDesc *desc, int callnum, Process *process,
}
/// Target statfs() handler.
template <class OS>
SyscallReturn
statfsFunc(SyscallDesc *desc, int callnum, Process *process,
ExecContext *xc)
{
std::string path;
if (xc->mem->readString(path, xc->getSyscallArg(0)) != No_Fault)
return -EFAULT;
struct statfs hostBuf;
int result = statfs(path.c_str(), &hostBuf);
if (result < 0)
return errno;
OS::copyOutStatfsBuf(xc->mem, xc->getSyscallArg(1), &hostBuf);
return 0;
}
/// Target fstatfs() handler.
template <class OS>
SyscallReturn
fstatfsFunc(SyscallDesc *desc, int callnum, Process *process,
ExecContext *xc)
{
int fd = process->sim_fd(xc->getSyscallArg(0));
if (fd < 0)
return -EBADF;
struct statfs hostBuf;
int result = fstatfs(fd, &hostBuf);
if (result < 0)
return errno;
OS::copyOutStatfsBuf(xc->mem, xc->getSyscallArg(1), &hostBuf);
return 0;
}
/// Target mmap() handler.
///
/// We don't really handle mmap(). If the target is mmaping an
@@ -440,7 +513,8 @@ getrlimitFunc(SyscallDesc *desc, int callnum, Process *process,
break;
default:
std::cerr << "getrlimitFunc: unimplemented resource " << resource << std::endl;
std::cerr << "getrlimitFunc: unimplemented resource " << resource
<< std::endl;
abort();
break;
}