Fix pread() and pwrite() syscall on ARM EABI (Kirill Shutemov).
pread() and pwrite() have differences in arguments between ARM EABI and OABI. See arch/arm/kernel/entry-common.S in Linux kernel source for additional information. Signed-off-by: Kirill A. Shutemov <kirill@shutemov.name> git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@5272 c046a42c-6fe2-441c-8c8c-71466251a162
This commit is contained in:
parent
8fbd6b5267
commit
a4ae00bc07
@ -5139,12 +5139,20 @@ abi_long do_syscall(void *cpu_env, int num, abi_long arg1,
|
||||
#endif
|
||||
#ifdef TARGET_NR_pread
|
||||
case TARGET_NR_pread:
|
||||
#ifdef TARGET_ARM
|
||||
if (((CPUARMState *)cpu_env)->eabi)
|
||||
arg4 = arg5;
|
||||
#endif
|
||||
if (!(p = lock_user(VERIFY_WRITE, arg2, arg3, 0)))
|
||||
goto efault;
|
||||
ret = get_errno(pread(arg1, p, arg3, arg4));
|
||||
unlock_user(p, arg2, ret);
|
||||
break;
|
||||
case TARGET_NR_pwrite:
|
||||
#ifdef TARGET_ARM
|
||||
if (((CPUARMState *)cpu_env)->eabi)
|
||||
arg4 = arg5;
|
||||
#endif
|
||||
if (!(p = lock_user(VERIFY_READ, arg2, arg3, 1)))
|
||||
goto efault;
|
||||
ret = get_errno(pwrite(arg1, p, arg3, arg4));
|
||||
|
Loading…
Reference in New Issue
Block a user