From 7e4967995e4bbcfac877852437c4ab6bf6d70e47 Mon Sep 17 00:00:00 2001 From: Giacomo Travaglini Date: Mon, 2 Dec 2019 12:39:26 +0000 Subject: [PATCH] sim-se: Avoid function overloading for syscall implementation This patch is aligning the readlink and access syscalls to the open one, which is not overloading the openFunc, but it is factoring the implementation into a openImpl, which is used by both open and openat. This is needed if passing them to std::function, whose constructor is not able to handle overloaded functions. Change-Id: I50a8aacdfd675181b6fe9a2696220ee29cc5bc4b Signed-off-by: Giacomo Travaglini Reviewed-on: https://gem5-review.googlesource.com/c/public/gem5/+/23260 Reviewed-by: Brandon Potter Maintainer: Brandon Potter Tested-by: kokoro --- src/sim/syscall_emul.cc | 8 ++++---- src/sim/syscall_emul.hh | 12 ++++++------ 2 files changed, 10 insertions(+), 10 deletions(-) diff --git a/src/sim/syscall_emul.cc b/src/sim/syscall_emul.cc index 49fee7e8f..8dc055c5d 100644 --- a/src/sim/syscall_emul.cc +++ b/src/sim/syscall_emul.cc @@ -422,11 +422,11 @@ getcwdFunc(SyscallDesc *desc, int num, ThreadContext *tc) SyscallReturn readlinkFunc(SyscallDesc *desc, int callnum, ThreadContext *tc) { - return readlinkFunc(desc, callnum, tc, 0); + return readlinkImpl(desc, callnum, tc, 0); } SyscallReturn -readlinkFunc(SyscallDesc *desc, int num, ThreadContext *tc, int index) +readlinkImpl(SyscallDesc *desc, int num, ThreadContext *tc, int index) { string path; auto p = tc->getProcessPtr(); @@ -1147,7 +1147,7 @@ fallocateFunc(SyscallDesc *desc, int callnum, ThreadContext *tc) } SyscallReturn -accessFunc(SyscallDesc *desc, int callnum, ThreadContext *tc, int index) +accessImpl(SyscallDesc *desc, int callnum, ThreadContext *tc, int index) { string path; auto p = tc->getProcessPtr(); @@ -1166,7 +1166,7 @@ accessFunc(SyscallDesc *desc, int callnum, ThreadContext *tc, int index) SyscallReturn accessFunc(SyscallDesc *desc, int callnum, ThreadContext *tc) { - return accessFunc(desc, callnum, tc, 0); + return accessImpl(desc, callnum, tc, 0); } SyscallReturn diff --git a/src/sim/syscall_emul.hh b/src/sim/syscall_emul.hh index 0eaec4c1f..fc6ed62d1 100644 --- a/src/sim/syscall_emul.hh +++ b/src/sim/syscall_emul.hh @@ -171,8 +171,8 @@ SyscallReturn gethostnameFunc(SyscallDesc *desc, int num, ThreadContext *tc); SyscallReturn getcwdFunc(SyscallDesc *desc, int num, ThreadContext *tc); /// Target readlink() handler. -SyscallReturn readlinkFunc(SyscallDesc *desc, int num, ThreadContext *tc, - int index = 0); +SyscallReturn readlinkImpl(SyscallDesc *desc, int num, ThreadContext *tc, + int index); SyscallReturn readlinkFunc(SyscallDesc *desc, int num, ThreadContext *tc); /// Target unlink() handler. @@ -313,9 +313,9 @@ SyscallReturn geteuidFunc(SyscallDesc *desc, int num, ThreadContext *tc); SyscallReturn getegidFunc(SyscallDesc *desc, int num, ThreadContext *tc); /// Target access() handler -SyscallReturn accessFunc(SyscallDesc *desc, int num, ThreadContext *tc); -SyscallReturn accessFunc(SyscallDesc *desc, int num, ThreadContext *tc, +SyscallReturn accessImpl(SyscallDesc *desc, int num, ThreadContext *tc, int index); +SyscallReturn accessFunc(SyscallDesc *desc, int num, ThreadContext *tc); // Target getsockopt() handler. SyscallReturn getsockoptFunc(SyscallDesc *desc, int num, ThreadContext *tc); @@ -953,7 +953,7 @@ faccessatFunc(SyscallDesc *desc, int callnum, ThreadContext *tc) int dirfd = process->getSyscallArg(tc, index); if (dirfd != OS::TGT_AT_FDCWD) warn("faccessat: first argument not AT_FDCWD; unlikely to work"); - return accessFunc(desc, callnum, tc, 1); + return accessImpl(desc, callnum, tc, 1); } /// Target readlinkat() handler @@ -966,7 +966,7 @@ readlinkatFunc(SyscallDesc *desc, int callnum, ThreadContext *tc) int dirfd = process->getSyscallArg(tc, index); if (dirfd != OS::TGT_AT_FDCWD) warn("openat: first argument not AT_FDCWD; unlikely to work"); - return readlinkFunc(desc, callnum, tc, 1); + return readlinkImpl(desc, callnum, tc, 1); } /// Target renameat() handler. -- 2.30.2