syscall_emul.cc revision 3669
1360SN/A/* 21458SN/A * Copyright (c) 2003-2005 The Regents of The University of Michigan 3360SN/A * All rights reserved. 4360SN/A * 5360SN/A * Redistribution and use in source and binary forms, with or without 6360SN/A * modification, are permitted provided that the following conditions are 7360SN/A * met: redistributions of source code must retain the above copyright 8360SN/A * notice, this list of conditions and the following disclaimer; 9360SN/A * redistributions in binary form must reproduce the above copyright 10360SN/A * notice, this list of conditions and the following disclaimer in the 11360SN/A * documentation and/or other materials provided with the distribution; 12360SN/A * neither the name of the copyright holders nor the names of its 13360SN/A * contributors may be used to endorse or promote products derived from 14360SN/A * this software without specific prior written permission. 15360SN/A * 16360SN/A * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 17360SN/A * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 18360SN/A * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR 19360SN/A * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT 20360SN/A * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 21360SN/A * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT 22360SN/A * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 23360SN/A * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 24360SN/A * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 25360SN/A * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE 26360SN/A * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 272665Ssaidi@eecs.umich.edu * 282665Ssaidi@eecs.umich.edu * Authors: Steve Reinhardt 292665Ssaidi@eecs.umich.edu * Ali Saidi 30360SN/A */ 31360SN/A 322093SN/A#include <fcntl.h> 33360SN/A#include <unistd.h> 34360SN/A 35360SN/A#include <string> 36360SN/A#include <iostream> 37360SN/A 38360SN/A#include "sim/syscall_emul.hh" 392474SN/A#include "base/chunk_generator.hh" 40360SN/A#include "base/trace.hh" 412680Sktlim@umich.edu#include "cpu/thread_context.hh" 421717SN/A#include "cpu/base.hh" 432474SN/A#include "mem/page_table.hh" 44360SN/A#include "sim/process.hh" 45360SN/A 462667Sstever@eecs.umich.edu#include "sim/sim_exit.hh" 47360SN/A 48360SN/Ausing namespace std; 492107SN/Ausing namespace TheISA; 50360SN/A 51360SN/Avoid 523114Sgblack@eecs.umich.eduSyscallDesc::doSyscall(int callnum, LiveProcess *process, ThreadContext *tc) 53360SN/A{ 542495SN/A DPRINTFR(SyscallVerbose, "%d: %s: syscall %s called w/arguments %d,%d,%d,%d\n", 552680Sktlim@umich.edu curTick,tc->getCpuPtr()->name(), name, 562680Sktlim@umich.edu tc->getSyscallArg(0),tc->getSyscallArg(1), 572680Sktlim@umich.edu tc->getSyscallArg(2),tc->getSyscallArg(3)); 58360SN/A 592680Sktlim@umich.edu SyscallReturn retval = (*funcPtr)(this, callnum, process, tc); 60360SN/A 612495SN/A DPRINTFR(SyscallVerbose, "%d: %s: syscall %s returns %d\n", 622680Sktlim@umich.edu curTick,tc->getCpuPtr()->name(), name, retval.value()); 63360SN/A 641450SN/A if (!(flags & SyscallDesc::SuppressReturnValue)) 652680Sktlim@umich.edu tc->setSyscallReturn(retval); 66360SN/A} 67360SN/A 68360SN/A 691450SN/ASyscallReturn 703114Sgblack@eecs.umich.eduunimplementedFunc(SyscallDesc *desc, int callnum, LiveProcess *process, 712680Sktlim@umich.edu ThreadContext *tc) 72360SN/A{ 731969SN/A fatal("syscall %s (#%d) unimplemented.", desc->name, callnum); 742484SN/A 752484SN/A return 1; 76360SN/A} 77360SN/A 78360SN/A 791450SN/ASyscallReturn 803114Sgblack@eecs.umich.eduignoreFunc(SyscallDesc *desc, int callnum, LiveProcess *process, 812680Sktlim@umich.edu ThreadContext *tc) 82360SN/A{ 831969SN/A warn("ignoring syscall %s(%d, %d, ...)", desc->name, 842680Sktlim@umich.edu tc->getSyscallArg(0), tc->getSyscallArg(1)); 85360SN/A 861458SN/A return 0; 87360SN/A} 88360SN/A 89360SN/A 901450SN/ASyscallReturn 913114Sgblack@eecs.umich.eduexitFunc(SyscallDesc *desc, int callnum, LiveProcess *process, 922680Sktlim@umich.edu ThreadContext *tc) 93360SN/A{ 942834Sksewell@umich.edu if (tc->exit()) { 952834Sksewell@umich.edu exitSimLoop("target called exit()", tc->getSyscallArg(0) & 0xff); 962834Sksewell@umich.edu } 97360SN/A 981458SN/A return 1; 99360SN/A} 100360SN/A 101360SN/A 1021450SN/ASyscallReturn 1033114Sgblack@eecs.umich.edugetpagesizeFunc(SyscallDesc *desc, int num, LiveProcess *p, ThreadContext *tc) 104360SN/A{ 1052107SN/A return (int)VMPageSize; 106360SN/A} 107360SN/A 108360SN/A 1091450SN/ASyscallReturn 1103114Sgblack@eecs.umich.eduobreakFunc(SyscallDesc *desc, int num, LiveProcess *p, ThreadContext *tc) 111360SN/A{ 1122474SN/A Addr junk; 1132474SN/A 114360SN/A // change brk addr to first arg 1152680Sktlim@umich.edu Addr new_brk = tc->getSyscallArg(0); 1162474SN/A if (new_brk != 0) { 1172474SN/A for (ChunkGenerator gen(p->brk_point, new_brk - p->brk_point, 1182474SN/A VMPageSize); !gen.done(); gen.next()) { 1192474SN/A if (!p->pTable->translate(gen.addr(), junk)) 1202474SN/A p->pTable->allocate(roundDown(gen.addr(), VMPageSize), 1212474SN/A VMPageSize); 1222474SN/A } 1232474SN/A p->brk_point = new_brk; 1241450SN/A } 1251458SN/A DPRINTF(SyscallVerbose, "Break Point changed to: %#X\n", p->brk_point); 1261458SN/A return p->brk_point; 127360SN/A} 128360SN/A 129360SN/A 1301450SN/ASyscallReturn 1313114Sgblack@eecs.umich.educloseFunc(SyscallDesc *desc, int num, LiveProcess *p, ThreadContext *tc) 132360SN/A{ 1332680Sktlim@umich.edu int target_fd = tc->getSyscallArg(0); 1341970SN/A int status = close(p->sim_fd(target_fd)); 1351970SN/A if (status >= 0) 1361970SN/A p->free_fd(target_fd); 1371970SN/A return status; 138360SN/A} 139360SN/A 140360SN/A 1411450SN/ASyscallReturn 1423114Sgblack@eecs.umich.edureadFunc(SyscallDesc *desc, int num, LiveProcess *p, ThreadContext *tc) 143360SN/A{ 1442680Sktlim@umich.edu int fd = p->sim_fd(tc->getSyscallArg(0)); 1452680Sktlim@umich.edu int nbytes = tc->getSyscallArg(2); 1462680Sktlim@umich.edu BufferArg bufArg(tc->getSyscallArg(1), nbytes); 147360SN/A 148360SN/A int bytes_read = read(fd, bufArg.bufferPtr(), nbytes); 149360SN/A 150360SN/A if (bytes_read != -1) 1512680Sktlim@umich.edu bufArg.copyOut(tc->getMemPort()); 152360SN/A 1531458SN/A return bytes_read; 154360SN/A} 155360SN/A 1561450SN/ASyscallReturn 1573114Sgblack@eecs.umich.eduwriteFunc(SyscallDesc *desc, int num, LiveProcess *p, ThreadContext *tc) 158360SN/A{ 1592680Sktlim@umich.edu int fd = p->sim_fd(tc->getSyscallArg(0)); 1602680Sktlim@umich.edu int nbytes = tc->getSyscallArg(2); 1612680Sktlim@umich.edu BufferArg bufArg(tc->getSyscallArg(1), nbytes); 162360SN/A 1632680Sktlim@umich.edu bufArg.copyIn(tc->getMemPort()); 164360SN/A 165360SN/A int bytes_written = write(fd, bufArg.bufferPtr(), nbytes); 166360SN/A 167360SN/A fsync(fd); 168360SN/A 1691458SN/A return bytes_written; 170360SN/A} 171360SN/A 172360SN/A 1731450SN/ASyscallReturn 1743114Sgblack@eecs.umich.edulseekFunc(SyscallDesc *desc, int num, LiveProcess *p, ThreadContext *tc) 175360SN/A{ 1762680Sktlim@umich.edu int fd = p->sim_fd(tc->getSyscallArg(0)); 1772680Sktlim@umich.edu uint64_t offs = tc->getSyscallArg(1); 1782680Sktlim@umich.edu int whence = tc->getSyscallArg(2); 179360SN/A 180360SN/A off_t result = lseek(fd, offs, whence); 181360SN/A 1821458SN/A return (result == (off_t)-1) ? -errno : result; 183360SN/A} 184360SN/A 185360SN/A 1861450SN/ASyscallReturn 1873114Sgblack@eecs.umich.edumunmapFunc(SyscallDesc *desc, int num, LiveProcess *p, ThreadContext *tc) 188360SN/A{ 189360SN/A // given that we don't really implement mmap, munmap is really easy 1901458SN/A return 0; 191360SN/A} 192360SN/A 193360SN/A 194360SN/Aconst char *hostname = "m5.eecs.umich.edu"; 195360SN/A 1961450SN/ASyscallReturn 1973114Sgblack@eecs.umich.edugethostnameFunc(SyscallDesc *desc, int num, LiveProcess *p, ThreadContext *tc) 198360SN/A{ 1992680Sktlim@umich.edu int name_len = tc->getSyscallArg(1); 2002680Sktlim@umich.edu BufferArg name(tc->getSyscallArg(0), name_len); 201360SN/A 202360SN/A strncpy((char *)name.bufferPtr(), hostname, name_len); 203360SN/A 2042680Sktlim@umich.edu name.copyOut(tc->getMemPort()); 205360SN/A 2061458SN/A return 0; 207360SN/A} 208360SN/A 2091450SN/ASyscallReturn 2103114Sgblack@eecs.umich.eduunlinkFunc(SyscallDesc *desc, int num, LiveProcess *p, ThreadContext *tc) 211511SN/A{ 2121706SN/A string path; 213360SN/A 2142680Sktlim@umich.edu if (!tc->getMemPort()->tryReadString(path, tc->getSyscallArg(0))) 2151450SN/A return (TheISA::IntReg)-EFAULT; 216511SN/A 2173669Sbinkertn@umich.edu // Adjust path for current working directory 2183669Sbinkertn@umich.edu path = p->fullPath(path); 2193669Sbinkertn@umich.edu 220511SN/A int result = unlink(path.c_str()); 2211458SN/A return (result == -1) ? -errno : result; 222511SN/A} 223511SN/A 2241450SN/ASyscallReturn 2253114Sgblack@eecs.umich.edurenameFunc(SyscallDesc *desc, int num, LiveProcess *p, ThreadContext *tc) 226511SN/A{ 2271706SN/A string old_name; 228511SN/A 2292680Sktlim@umich.edu if (!tc->getMemPort()->tryReadString(old_name, tc->getSyscallArg(0))) 2301458SN/A return -EFAULT; 231511SN/A 2321706SN/A string new_name; 233511SN/A 2342680Sktlim@umich.edu if (!tc->getMemPort()->tryReadString(new_name, tc->getSyscallArg(1))) 2351458SN/A return -EFAULT; 236511SN/A 2373669Sbinkertn@umich.edu // Adjust path for current working directory 2383669Sbinkertn@umich.edu old_name = p->fullPath(old_name); 2393669Sbinkertn@umich.edu new_name = p->fullPath(new_name); 2403669Sbinkertn@umich.edu 2411706SN/A int64_t result = rename(old_name.c_str(), new_name.c_str()); 2421458SN/A return (result == -1) ? -errno : result; 243511SN/A} 244511SN/A 2451706SN/ASyscallReturn 2463114Sgblack@eecs.umich.edutruncateFunc(SyscallDesc *desc, int num, LiveProcess *p, ThreadContext *tc) 2471706SN/A{ 2481706SN/A string path; 2491706SN/A 2502680Sktlim@umich.edu if (!tc->getMemPort()->tryReadString(path, tc->getSyscallArg(0))) 2511706SN/A return -EFAULT; 2521706SN/A 2532680Sktlim@umich.edu off_t length = tc->getSyscallArg(1); 2541706SN/A 2553669Sbinkertn@umich.edu // Adjust path for current working directory 2563669Sbinkertn@umich.edu path = p->fullPath(path); 2573669Sbinkertn@umich.edu 2581706SN/A int result = truncate(path.c_str(), length); 2591706SN/A return (result == -1) ? -errno : result; 2601706SN/A} 2611706SN/A 2621706SN/ASyscallReturn 2633114Sgblack@eecs.umich.eduftruncateFunc(SyscallDesc *desc, int num, LiveProcess *process, ThreadContext *tc) 2641706SN/A{ 2652680Sktlim@umich.edu int fd = process->sim_fd(tc->getSyscallArg(0)); 2661706SN/A 2671706SN/A if (fd < 0) 2681706SN/A return -EBADF; 2691706SN/A 2702680Sktlim@umich.edu off_t length = tc->getSyscallArg(1); 2711706SN/A 2721706SN/A int result = ftruncate(fd, length); 2731706SN/A return (result == -1) ? -errno : result; 2741706SN/A} 2751999SN/A 2761999SN/ASyscallReturn 2773114Sgblack@eecs.umich.educhownFunc(SyscallDesc *desc, int num, LiveProcess *p, ThreadContext *tc) 2781999SN/A{ 2791999SN/A string path; 2801999SN/A 2812680Sktlim@umich.edu if (!tc->getMemPort()->tryReadString(path, tc->getSyscallArg(0))) 2821999SN/A return -EFAULT; 2831999SN/A 2841999SN/A /* XXX endianess */ 2852680Sktlim@umich.edu uint32_t owner = tc->getSyscallArg(1); 2861999SN/A uid_t hostOwner = owner; 2872680Sktlim@umich.edu uint32_t group = tc->getSyscallArg(2); 2881999SN/A gid_t hostGroup = group; 2891999SN/A 2903669Sbinkertn@umich.edu // Adjust path for current working directory 2913669Sbinkertn@umich.edu path = p->fullPath(path); 2923669Sbinkertn@umich.edu 2931999SN/A int result = chown(path.c_str(), hostOwner, hostGroup); 2941999SN/A return (result == -1) ? -errno : result; 2951999SN/A} 2961999SN/A 2971999SN/ASyscallReturn 2983114Sgblack@eecs.umich.edufchownFunc(SyscallDesc *desc, int num, LiveProcess *process, ThreadContext *tc) 2991999SN/A{ 3002680Sktlim@umich.edu int fd = process->sim_fd(tc->getSyscallArg(0)); 3011999SN/A 3021999SN/A if (fd < 0) 3031999SN/A return -EBADF; 3041999SN/A 3051999SN/A /* XXX endianess */ 3062680Sktlim@umich.edu uint32_t owner = tc->getSyscallArg(1); 3071999SN/A uid_t hostOwner = owner; 3082680Sktlim@umich.edu uint32_t group = tc->getSyscallArg(2); 3091999SN/A gid_t hostGroup = group; 3101999SN/A 3111999SN/A int result = fchown(fd, hostOwner, hostGroup); 3121999SN/A return (result == -1) ? -errno : result; 3131999SN/A} 3142093SN/A 3152093SN/A 3162093SN/ASyscallReturn 3173114Sgblack@eecs.umich.edudupFunc(SyscallDesc *desc, int num, LiveProcess *process, ThreadContext *tc) 3183079Sstever@eecs.umich.edu{ 3193079Sstever@eecs.umich.edu int fd = process->sim_fd(tc->getSyscallArg(0)); 3203079Sstever@eecs.umich.edu 3213079Sstever@eecs.umich.edu if (fd < 0) 3223079Sstever@eecs.umich.edu return -EBADF; 3233079Sstever@eecs.umich.edu 3243079Sstever@eecs.umich.edu int result = dup(fd); 3253079Sstever@eecs.umich.edu return (result == -1) ? -errno : process->alloc_fd(result); 3263079Sstever@eecs.umich.edu} 3273079Sstever@eecs.umich.edu 3283079Sstever@eecs.umich.edu 3293079Sstever@eecs.umich.eduSyscallReturn 3303114Sgblack@eecs.umich.edufcntlFunc(SyscallDesc *desc, int num, LiveProcess *process, 3312680Sktlim@umich.edu ThreadContext *tc) 3322093SN/A{ 3332680Sktlim@umich.edu int fd = tc->getSyscallArg(0); 3342093SN/A 3352093SN/A if (fd < 0 || process->sim_fd(fd) < 0) 3362093SN/A return -EBADF; 3372093SN/A 3382680Sktlim@umich.edu int cmd = tc->getSyscallArg(1); 3392093SN/A switch (cmd) { 3402093SN/A case 0: // F_DUPFD 3412093SN/A // if we really wanted to support this, we'd need to do it 3422093SN/A // in the target fd space. 3432093SN/A warn("fcntl(%d, F_DUPFD) not supported, error returned\n", fd); 3442093SN/A return -EMFILE; 3452093SN/A 3462093SN/A case 1: // F_GETFD (get close-on-exec flag) 3472093SN/A case 2: // F_SETFD (set close-on-exec flag) 3482093SN/A return 0; 3492093SN/A 3502093SN/A case 3: // F_GETFL (get file flags) 3512093SN/A case 4: // F_SETFL (set file flags) 3522093SN/A // not sure if this is totally valid, but we'll pass it through 3532093SN/A // to the underlying OS 3542093SN/A warn("fcntl(%d, %d) passed through to host\n", fd, cmd); 3552093SN/A return fcntl(process->sim_fd(fd), cmd); 3562093SN/A // return 0; 3572093SN/A 3582093SN/A case 7: // F_GETLK (get lock) 3592093SN/A case 8: // F_SETLK (set lock) 3602093SN/A case 9: // F_SETLKW (set lock and wait) 3612093SN/A // don't mess with file locking... just act like it's OK 3622093SN/A warn("File lock call (fcntl(%d, %d)) ignored.\n", fd, cmd); 3632093SN/A return 0; 3642093SN/A 3652093SN/A default: 3662093SN/A warn("Unknown fcntl command %d\n", cmd); 3672093SN/A return 0; 3682093SN/A } 3692093SN/A} 3702093SN/A 3712238SN/ASyscallReturn 3723114Sgblack@eecs.umich.edufcntl64Func(SyscallDesc *desc, int num, LiveProcess *process, 3732687Sksewell@umich.edu ThreadContext *tc) 3742687Sksewell@umich.edu{ 3752687Sksewell@umich.edu int fd = tc->getSyscallArg(0); 3762687Sksewell@umich.edu 3772687Sksewell@umich.edu if (fd < 0 || process->sim_fd(fd) < 0) 3782687Sksewell@umich.edu return -EBADF; 3792687Sksewell@umich.edu 3802687Sksewell@umich.edu int cmd = tc->getSyscallArg(1); 3812687Sksewell@umich.edu switch (cmd) { 3822687Sksewell@umich.edu case 33: //F_GETLK64 3832687Sksewell@umich.edu warn("fcntl64(%d, F_GETLK64) not supported, error returned\n", fd); 3842687Sksewell@umich.edu return -EMFILE; 3852687Sksewell@umich.edu 3862687Sksewell@umich.edu case 34: // F_SETLK64 3872687Sksewell@umich.edu case 35: // F_SETLKW64 3882687Sksewell@umich.edu warn("fcntl64(%d, F_SETLK(W)64) not supported, error returned\n", fd); 3892687Sksewell@umich.edu return -EMFILE; 3902687Sksewell@umich.edu 3912687Sksewell@umich.edu default: 3922687Sksewell@umich.edu // not sure if this is totally valid, but we'll pass it through 3932687Sksewell@umich.edu // to the underlying OS 3942687Sksewell@umich.edu warn("fcntl64(%d, %d) passed through to host\n", fd, cmd); 3952687Sksewell@umich.edu return fcntl(process->sim_fd(fd), cmd); 3962687Sksewell@umich.edu // return 0; 3972687Sksewell@umich.edu } 3982687Sksewell@umich.edu} 3992687Sksewell@umich.edu 4002687Sksewell@umich.eduSyscallReturn 4013114Sgblack@eecs.umich.edupipePseudoFunc(SyscallDesc *desc, int callnum, LiveProcess *process, 4022680Sktlim@umich.edu ThreadContext *tc) 4032238SN/A{ 4042238SN/A int fds[2], sim_fds[2]; 4052238SN/A int pipe_retval = pipe(fds); 4062093SN/A 4072238SN/A if (pipe_retval < 0) { 4082238SN/A // error 4092238SN/A return pipe_retval; 4102238SN/A } 4112238SN/A 4122238SN/A sim_fds[0] = process->alloc_fd(fds[0]); 4132238SN/A sim_fds[1] = process->alloc_fd(fds[1]); 4142238SN/A 4152238SN/A // Alpha Linux convention for pipe() is that fd[0] is returned as 4162238SN/A // the return value of the function, and fd[1] is returned in r20. 4172680Sktlim@umich.edu tc->setIntReg(SyscallPseudoReturnReg, sim_fds[1]); 4182238SN/A return sim_fds[0]; 4192238SN/A} 4202238SN/A 4212238SN/A 4222238SN/ASyscallReturn 4233114Sgblack@eecs.umich.edugetpidPseudoFunc(SyscallDesc *desc, int callnum, LiveProcess *process, 4242680Sktlim@umich.edu ThreadContext *tc) 4252238SN/A{ 4262238SN/A // Make up a PID. There's no interprocess communication in 4272238SN/A // fake_syscall mode, so there's no way for a process to know it's 4282238SN/A // not getting a unique value. 4292238SN/A 4303114Sgblack@eecs.umich.edu tc->setIntReg(SyscallPseudoReturnReg, process->ppid()); 4313114Sgblack@eecs.umich.edu return process->pid(); 4322238SN/A} 4332238SN/A 4342238SN/A 4352238SN/ASyscallReturn 4363114Sgblack@eecs.umich.edugetuidPseudoFunc(SyscallDesc *desc, int callnum, LiveProcess *process, 4372680Sktlim@umich.edu ThreadContext *tc) 4382238SN/A{ 4392238SN/A // Make up a UID and EUID... it shouldn't matter, and we want the 4402238SN/A // simulation to be deterministic. 4412238SN/A 4422238SN/A // EUID goes in r20. 4433114Sgblack@eecs.umich.edu tc->setIntReg(SyscallPseudoReturnReg, process->euid()); //EUID 4443114Sgblack@eecs.umich.edu return process->uid(); // UID 4452238SN/A} 4462238SN/A 4472238SN/A 4482238SN/ASyscallReturn 4493114Sgblack@eecs.umich.edugetgidPseudoFunc(SyscallDesc *desc, int callnum, LiveProcess *process, 4502680Sktlim@umich.edu ThreadContext *tc) 4512238SN/A{ 4522238SN/A // Get current group ID. EGID goes in r20. 4533114Sgblack@eecs.umich.edu tc->setIntReg(SyscallPseudoReturnReg, process->egid()); //EGID 4543114Sgblack@eecs.umich.edu return process->gid(); 4552238SN/A} 4562238SN/A 4572238SN/A 4582238SN/ASyscallReturn 4593114Sgblack@eecs.umich.edusetuidFunc(SyscallDesc *desc, int callnum, LiveProcess *process, 4602680Sktlim@umich.edu ThreadContext *tc) 4612238SN/A{ 4622238SN/A // can't fathom why a benchmark would call this. 4632680Sktlim@umich.edu warn("Ignoring call to setuid(%d)\n", tc->getSyscallArg(0)); 4642238SN/A return 0; 4652238SN/A} 4662238SN/A 4672238SN/ASyscallReturn 4683114Sgblack@eecs.umich.edugetpidFunc(SyscallDesc *desc, int callnum, LiveProcess *process, 4692680Sktlim@umich.edu ThreadContext *tc) 4702238SN/A{ 4712238SN/A // Make up a PID. There's no interprocess communication in 4722238SN/A // fake_syscall mode, so there's no way for a process to know it's 4732238SN/A // not getting a unique value. 4742238SN/A 4753114Sgblack@eecs.umich.edu tc->setIntReg(SyscallPseudoReturnReg, process->ppid()); //PID 4763114Sgblack@eecs.umich.edu return process->pid(); 4772238SN/A} 4782238SN/A 4792238SN/ASyscallReturn 4803114Sgblack@eecs.umich.edugetppidFunc(SyscallDesc *desc, int callnum, LiveProcess *process, 4812680Sktlim@umich.edu ThreadContext *tc) 4822238SN/A{ 4833114Sgblack@eecs.umich.edu return process->ppid(); 4842238SN/A} 4852238SN/A 4862238SN/ASyscallReturn 4873114Sgblack@eecs.umich.edugetuidFunc(SyscallDesc *desc, int callnum, LiveProcess *process, 4882680Sktlim@umich.edu ThreadContext *tc) 4892238SN/A{ 4903114Sgblack@eecs.umich.edu return process->uid(); // UID 4912238SN/A} 4922238SN/A 4932238SN/ASyscallReturn 4943114Sgblack@eecs.umich.edugeteuidFunc(SyscallDesc *desc, int callnum, LiveProcess *process, 4952680Sktlim@umich.edu ThreadContext *tc) 4962238SN/A{ 4973114Sgblack@eecs.umich.edu return process->euid(); // UID 4982238SN/A} 4992238SN/A 5002238SN/ASyscallReturn 5013114Sgblack@eecs.umich.edugetgidFunc(SyscallDesc *desc, int callnum, LiveProcess *process, 5022680Sktlim@umich.edu ThreadContext *tc) 5032238SN/A{ 5043114Sgblack@eecs.umich.edu return process->gid(); 5052238SN/A} 5062238SN/A 5072238SN/ASyscallReturn 5083114Sgblack@eecs.umich.edugetegidFunc(SyscallDesc *desc, int callnum, LiveProcess *process, 5092680Sktlim@umich.edu ThreadContext *tc) 5102238SN/A{ 5113114Sgblack@eecs.umich.edu return process->egid(); 5122238SN/A} 5132238SN/A 5142238SN/A 515