4 * Copyright (c) 2003-2008 Fabrice Bellard
5 * Copyright (c) 2013-2014 Stacey D. Son
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 2 of the License, or
10 * (at your option) any later version.
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, see <http://www.gnu.org/licenses/>.
22 * We need the FreeBSD "legacy" definitions. Rust needs the FreeBSD 11 system
23 * calls since it doesn't use libc at all, so we have to emulate that despite
24 * FreeBSD 11 being EOL'd.
26 #define _WANT_FREEBSD11_STAT
27 #define _WANT_FREEBSD11_STATFS
28 #define _WANT_FREEBSD11_DIRENT
29 #define _WANT_KERNEL_ERRNO
31 #include "qemu/osdep.h"
32 #include "qemu/cutils.h"
33 #include "qemu/path.h"
34 #include <sys/syscall.h>
35 #include <sys/param.h>
36 #include <sys/sysctl.h>
40 #include "signal-common.h"
41 #include "user/syscall-trace.h"
47 safe_syscall3(ssize_t
, read
, int, fd
, void *, buf
, size_t, nbytes
);
48 safe_syscall4(ssize_t
, pread
, int, fd
, void *, buf
, size_t, nbytes
, off_t
,
50 safe_syscall3(ssize_t
, readv
, int, fd
, const struct iovec
*, iov
, int, iovcnt
);
51 safe_syscall4(ssize_t
, preadv
, int, fd
, const struct iovec
*, iov
, int, iovcnt
,
54 safe_syscall3(ssize_t
, write
, int, fd
, void *, buf
, size_t, nbytes
);
55 safe_syscall4(ssize_t
, pwrite
, int, fd
, void *, buf
, size_t, nbytes
, off_t
,
57 safe_syscall3(ssize_t
, writev
, int, fd
, const struct iovec
*, iov
, int, iovcnt
);
58 safe_syscall4(ssize_t
, pwritev
, int, fd
, const struct iovec
*, iov
, int, iovcnt
,
61 void target_set_brk(abi_ulong new_brk
)
68 abi_long
get_errno(abi_long ret
)
71 return -host_to_target_errno(errno
);
77 int host_to_target_errno(int err
)
80 * All the BSDs have the property that the error numbers are uniform across
81 * all architectures for a given BSD, though they may vary between different
87 bool is_error(abi_long ret
)
89 return (abi_ulong
)ret
>= (abi_ulong
)(-4096);
93 * Unlocks a iovec. Unlike unlock_iovec, it assumes the tvec array itself is
94 * already locked from target_addr. It will be unlocked as well as all the iovec
97 static void helper_unlock_iovec(struct target_iovec
*target_vec
,
98 abi_ulong target_addr
, struct iovec
*vec
,
101 for (int i
= 0; i
< count
; i
++) {
102 abi_ulong base
= tswapal(target_vec
[i
].iov_base
);
104 if (vec
[i
].iov_base
) {
105 unlock_user(vec
[i
].iov_base
, base
, copy
? vec
[i
].iov_len
: 0);
108 unlock_user(target_vec
, target_addr
, 0);
111 struct iovec
*lock_iovec(int type
, abi_ulong target_addr
,
114 struct target_iovec
*target_vec
;
116 abi_ulong total_len
, max_len
;
124 if (count
< 0 || count
> IOV_MAX
) {
129 vec
= g_try_new0(struct iovec
, count
);
135 target_vec
= lock_user(VERIFY_READ
, target_addr
,
136 count
* sizeof(struct target_iovec
), 1);
137 if (target_vec
== NULL
) {
142 max_len
= 0x7fffffff & MIN(TARGET_PAGE_MASK
, PAGE_MASK
);
145 for (i
= 0; i
< count
; i
++) {
146 abi_ulong base
= tswapal(target_vec
[i
].iov_base
);
147 abi_long len
= tswapal(target_vec
[i
].iov_len
);
152 } else if (len
== 0) {
153 /* Zero length pointer is ignored. */
156 vec
[i
].iov_base
= lock_user(type
, base
, len
, copy
);
158 * If the first buffer pointer is bad, this is a fault. But
159 * subsequent bad buffers will result in a partial write; this is
160 * realized by filling the vector with null pointers and zero
163 if (!vec
[i
].iov_base
) {
169 * Fail all the subsequent addresses, they are already
175 if (len
> max_len
- total_len
) {
176 len
= max_len
- total_len
;
179 vec
[i
].iov_len
= len
;
183 unlock_user(target_vec
, target_addr
, 0);
187 helper_unlock_iovec(target_vec
, target_addr
, vec
, i
, copy
);
194 void unlock_iovec(struct iovec
*vec
, abi_ulong target_addr
,
197 struct target_iovec
*target_vec
;
199 target_vec
= lock_user(VERIFY_READ
, target_addr
,
200 count
* sizeof(struct target_iovec
), 1);
202 helper_unlock_iovec(target_vec
, target_addr
, vec
, count
, copy
);
209 * All errnos that freebsd_syscall() returns must be -TARGET_<errcode>.
211 static abi_long
freebsd_syscall(void *cpu_env
, int num
, abi_long arg1
,
212 abi_long arg2
, abi_long arg3
, abi_long arg4
,
213 abi_long arg5
, abi_long arg6
, abi_long arg7
,
220 * process system calls
222 case TARGET_FREEBSD_NR_exit
: /* exit(2) */
223 ret
= do_bsd_exit(cpu_env
, arg1
);
229 case TARGET_FREEBSD_NR_read
: /* read(2) */
230 ret
= do_bsd_read(arg1
, arg2
, arg3
);
233 case TARGET_FREEBSD_NR_pread
: /* pread(2) */
234 ret
= do_bsd_pread(cpu_env
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
237 case TARGET_FREEBSD_NR_readv
: /* readv(2) */
238 ret
= do_bsd_readv(arg1
, arg2
, arg3
);
241 case TARGET_FREEBSD_NR_preadv
: /* preadv(2) */
242 ret
= do_bsd_preadv(cpu_env
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
244 case TARGET_FREEBSD_NR_write
: /* write(2) */
245 ret
= do_bsd_write(arg1
, arg2
, arg3
);
248 case TARGET_FREEBSD_NR_pwrite
: /* pwrite(2) */
249 ret
= do_bsd_pwrite(cpu_env
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
252 case TARGET_FREEBSD_NR_writev
: /* writev(2) */
253 ret
= do_bsd_writev(arg1
, arg2
, arg3
);
256 case TARGET_FREEBSD_NR_pwritev
: /* pwritev(2) */
257 ret
= do_bsd_pwritev(cpu_env
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
261 qemu_log_mask(LOG_UNIMP
, "Unsupported syscall: %d\n", num
);
262 ret
= -TARGET_ENOSYS
;
270 * do_freebsd_syscall() should always have a single exit point at the end so
271 * that actions, such as logging of syscall results, can be performed. This
272 * as a wrapper around freebsd_syscall() so that actually happens. Since
273 * that is a singleton, modern compilers will inline it anyway...
275 abi_long
do_freebsd_syscall(void *cpu_env
, int num
, abi_long arg1
,
276 abi_long arg2
, abi_long arg3
, abi_long arg4
,
277 abi_long arg5
, abi_long arg6
, abi_long arg7
,
280 CPUState
*cpu
= env_cpu(cpu_env
);
283 trace_guest_user_syscall(cpu
, num
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
, arg7
, arg8
);
285 print_freebsd_syscall(num
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
288 ret
= freebsd_syscall(cpu_env
, num
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
,
291 print_freebsd_syscall_ret(num
, ret
);
293 trace_guest_user_syscall_ret(cpu
, num
, ret
);
298 void syscall_init(void)