From: Tom Deseyn <tom.des...@gmail.com> v2: default to unimplemented v3: match kernel behavior v4: braces code-style
Signed-off-by: Tom Deseyn <tom.des...@gmail.com> --- linux-user/syscall.c | 41 +++++++++++++++++++++++++++++++++++++++++ 1 file changed, 41 insertions(+) diff --git a/linux-user/syscall.c b/linux-user/syscall.c index 280137da8c..bbcc0e86c6 100644 --- a/linux-user/syscall.c +++ b/linux-user/syscall.c @@ -2352,6 +2352,47 @@ static abi_long do_getsockopt(int sockfd, int level, int optname, break; } break; + case SOL_IPV6: + switch (optname) { + case IPV6_MTU_DISCOVER: + case IPV6_MTU: + case IPV6_V6ONLY: + case IPV6_RECVPKTINFO: + case IPV6_UNICAST_HOPS: + case IPV6_MULTICAST_HOPS: + case IPV6_MULTICAST_LOOP: + case IPV6_RECVERR: + case IPV6_RECVHOPLIMIT: + case IPV6_2292HOPLIMIT: + case IPV6_CHECKSUM: { + void* target_addr; + if (get_user_u32(len, optlen)) { + return -TARGET_EFAULT; + } + if (len < 0) { + return -TARGET_EINVAL; + } + lv = sizeof(val); + ret = get_errno(getsockopt(sockfd, level, optname, &val, &lv)); + if (ret < 0) { + return ret; + } + if (lv < len) { + len = lv; + } + if (put_user_u32(len, optlen)) { + return -TARGET_EFAULT; + } + target_addr = lock_user(VERIFY_WRITE, optval_addr, len, 0); + tswap32s((uint32_t*)&val); + memcpy(target_addr, &val, len); + unlock_user(target_addr, optval_addr, len); + break; + } + default: + goto unimplemented; + } + break; default: unimplemented: gemu_log("getsockopt level=%d optname=%d not yet supported\n", -- 2.19.2