4 * Copyright (c) 2003-2008 Fabrice Bellard
5 * Copyright (c) 2013-2014 Stacey D. Son
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 2 of the License, or
10 * (at your option) any later version.
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, see <http://www.gnu.org/licenses/>.
22 * We need the FreeBSD "legacy" definitions. Rust needs the FreeBSD 11 system
23 * calls since it doesn't use libc at all, so we have to emulate that despite
24 * FreeBSD 11 being EOL'd.
26 #define _WANT_FREEBSD11_STAT
27 #define _WANT_FREEBSD11_STATFS
28 #define _WANT_FREEBSD11_DIRENT
29 #define _WANT_KERNEL_ERRNO
31 #include "qemu/osdep.h"
32 #include "qemu/cutils.h"
33 #include "qemu/path.h"
34 #include <sys/syscall.h>
35 #include <sys/param.h>
36 #include <sys/sysctl.h>
40 #include "signal-common.h"
41 #include "user/syscall-trace.h"
47 safe_syscall3(int, open
, const char *, path
, int, flags
, mode_t
, mode
);
48 safe_syscall4(int, openat
, int, fd
, const char *, path
, int, flags
, mode_t
,
51 safe_syscall3(ssize_t
, read
, int, fd
, void *, buf
, size_t, nbytes
);
52 safe_syscall4(ssize_t
, pread
, int, fd
, void *, buf
, size_t, nbytes
, off_t
,
54 safe_syscall3(ssize_t
, readv
, int, fd
, const struct iovec
*, iov
, int, iovcnt
);
55 safe_syscall4(ssize_t
, preadv
, int, fd
, const struct iovec
*, iov
, int, iovcnt
,
58 safe_syscall3(ssize_t
, write
, int, fd
, void *, buf
, size_t, nbytes
);
59 safe_syscall4(ssize_t
, pwrite
, int, fd
, void *, buf
, size_t, nbytes
, off_t
,
61 safe_syscall3(ssize_t
, writev
, int, fd
, const struct iovec
*, iov
, int, iovcnt
);
62 safe_syscall4(ssize_t
, pwritev
, int, fd
, const struct iovec
*, iov
, int, iovcnt
,
65 void target_set_brk(abi_ulong new_brk
)
72 abi_long
get_errno(abi_long ret
)
75 return -host_to_target_errno(errno
);
81 int host_to_target_errno(int err
)
84 * All the BSDs have the property that the error numbers are uniform across
85 * all architectures for a given BSD, though they may vary between different
91 bool is_error(abi_long ret
)
93 return (abi_ulong
)ret
>= (abi_ulong
)(-4096);
97 * Unlocks a iovec. Unlike unlock_iovec, it assumes the tvec array itself is
98 * already locked from target_addr. It will be unlocked as well as all the iovec
101 static void helper_unlock_iovec(struct target_iovec
*target_vec
,
102 abi_ulong target_addr
, struct iovec
*vec
,
105 for (int i
= 0; i
< count
; i
++) {
106 abi_ulong base
= tswapal(target_vec
[i
].iov_base
);
108 if (vec
[i
].iov_base
) {
109 unlock_user(vec
[i
].iov_base
, base
, copy
? vec
[i
].iov_len
: 0);
112 unlock_user(target_vec
, target_addr
, 0);
115 struct iovec
*lock_iovec(int type
, abi_ulong target_addr
,
118 struct target_iovec
*target_vec
;
120 abi_ulong total_len
, max_len
;
128 if (count
< 0 || count
> IOV_MAX
) {
133 vec
= g_try_new0(struct iovec
, count
);
139 target_vec
= lock_user(VERIFY_READ
, target_addr
,
140 count
* sizeof(struct target_iovec
), 1);
141 if (target_vec
== NULL
) {
146 max_len
= 0x7fffffff & MIN(TARGET_PAGE_MASK
, PAGE_MASK
);
149 for (i
= 0; i
< count
; i
++) {
150 abi_ulong base
= tswapal(target_vec
[i
].iov_base
);
151 abi_long len
= tswapal(target_vec
[i
].iov_len
);
156 } else if (len
== 0) {
157 /* Zero length pointer is ignored. */
160 vec
[i
].iov_base
= lock_user(type
, base
, len
, copy
);
162 * If the first buffer pointer is bad, this is a fault. But
163 * subsequent bad buffers will result in a partial write; this is
164 * realized by filling the vector with null pointers and zero
167 if (!vec
[i
].iov_base
) {
173 * Fail all the subsequent addresses, they are already
179 if (len
> max_len
- total_len
) {
180 len
= max_len
- total_len
;
183 vec
[i
].iov_len
= len
;
187 unlock_user(target_vec
, target_addr
, 0);
191 helper_unlock_iovec(target_vec
, target_addr
, vec
, i
, copy
);
198 void unlock_iovec(struct iovec
*vec
, abi_ulong target_addr
,
201 struct target_iovec
*target_vec
;
203 target_vec
= lock_user(VERIFY_READ
, target_addr
,
204 count
* sizeof(struct target_iovec
), 1);
206 helper_unlock_iovec(target_vec
, target_addr
, vec
, count
, copy
);
213 * All errnos that freebsd_syscall() returns must be -TARGET_<errcode>.
215 static abi_long
freebsd_syscall(void *cpu_env
, int num
, abi_long arg1
,
216 abi_long arg2
, abi_long arg3
, abi_long arg4
,
217 abi_long arg5
, abi_long arg6
, abi_long arg7
,
224 * process system calls
226 case TARGET_FREEBSD_NR_exit
: /* exit(2) */
227 ret
= do_bsd_exit(cpu_env
, arg1
);
233 case TARGET_FREEBSD_NR_read
: /* read(2) */
234 ret
= do_bsd_read(arg1
, arg2
, arg3
);
237 case TARGET_FREEBSD_NR_pread
: /* pread(2) */
238 ret
= do_bsd_pread(cpu_env
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
241 case TARGET_FREEBSD_NR_readv
: /* readv(2) */
242 ret
= do_bsd_readv(arg1
, arg2
, arg3
);
245 case TARGET_FREEBSD_NR_preadv
: /* preadv(2) */
246 ret
= do_bsd_preadv(cpu_env
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
248 case TARGET_FREEBSD_NR_write
: /* write(2) */
249 ret
= do_bsd_write(arg1
, arg2
, arg3
);
252 case TARGET_FREEBSD_NR_pwrite
: /* pwrite(2) */
253 ret
= do_bsd_pwrite(cpu_env
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
256 case TARGET_FREEBSD_NR_writev
: /* writev(2) */
257 ret
= do_bsd_writev(arg1
, arg2
, arg3
);
260 case TARGET_FREEBSD_NR_pwritev
: /* pwritev(2) */
261 ret
= do_bsd_pwritev(cpu_env
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
264 case TARGET_FREEBSD_NR_open
: /* open(2) */
265 ret
= do_bsd_open(arg1
, arg2
, arg3
);
268 case TARGET_FREEBSD_NR_openat
: /* openat(2) */
269 ret
= do_bsd_openat(arg1
, arg2
, arg3
, arg4
);
272 case TARGET_FREEBSD_NR_close
: /* close(2) */
273 ret
= do_bsd_close(arg1
);
276 case TARGET_FREEBSD_NR_fdatasync
: /* fdatasync(2) */
277 ret
= do_bsd_fdatasync(arg1
);
280 case TARGET_FREEBSD_NR_fsync
: /* fsync(2) */
281 ret
= do_bsd_fsync(arg1
);
284 case TARGET_FREEBSD_NR_freebsd12_closefrom
: /* closefrom(2) */
285 ret
= do_bsd_closefrom(arg1
);
288 case TARGET_FREEBSD_NR_revoke
: /* revoke(2) */
289 ret
= do_bsd_revoke(arg1
);
292 case TARGET_FREEBSD_NR_access
: /* access(2) */
293 ret
= do_bsd_access(arg1
, arg2
);
296 case TARGET_FREEBSD_NR_eaccess
: /* eaccess(2) */
297 ret
= do_bsd_eaccess(arg1
, arg2
);
300 case TARGET_FREEBSD_NR_faccessat
: /* faccessat(2) */
301 ret
= do_bsd_faccessat(arg1
, arg2
, arg3
, arg4
);
304 case TARGET_FREEBSD_NR_chdir
: /* chdir(2) */
305 ret
= do_bsd_chdir(arg1
);
308 case TARGET_FREEBSD_NR_fchdir
: /* fchdir(2) */
309 ret
= do_bsd_fchdir(arg1
);
312 case TARGET_FREEBSD_NR_rename
: /* rename(2) */
313 ret
= do_bsd_rename(arg1
, arg2
);
316 case TARGET_FREEBSD_NR_renameat
: /* renameat(2) */
317 ret
= do_bsd_renameat(arg1
, arg2
, arg3
, arg4
);
320 case TARGET_FREEBSD_NR_link
: /* link(2) */
321 ret
= do_bsd_link(arg1
, arg2
);
324 case TARGET_FREEBSD_NR_linkat
: /* linkat(2) */
325 ret
= do_bsd_linkat(arg1
, arg2
, arg3
, arg4
, arg5
);
328 case TARGET_FREEBSD_NR_unlink
: /* unlink(2) */
329 ret
= do_bsd_unlink(arg1
);
332 case TARGET_FREEBSD_NR_unlinkat
: /* unlinkat(2) */
333 ret
= do_bsd_unlinkat(arg1
, arg2
, arg3
);
337 qemu_log_mask(LOG_UNIMP
, "Unsupported syscall: %d\n", num
);
338 ret
= -TARGET_ENOSYS
;
346 * do_freebsd_syscall() should always have a single exit point at the end so
347 * that actions, such as logging of syscall results, can be performed. This
348 * as a wrapper around freebsd_syscall() so that actually happens. Since
349 * that is a singleton, modern compilers will inline it anyway...
351 abi_long
do_freebsd_syscall(void *cpu_env
, int num
, abi_long arg1
,
352 abi_long arg2
, abi_long arg3
, abi_long arg4
,
353 abi_long arg5
, abi_long arg6
, abi_long arg7
,
356 CPUState
*cpu
= env_cpu(cpu_env
);
359 trace_guest_user_syscall(cpu
, num
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
, arg7
, arg8
);
361 print_freebsd_syscall(num
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
364 ret
= freebsd_syscall(cpu_env
, num
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
,
367 print_freebsd_syscall_ret(num
, ret
);
369 trace_guest_user_syscall_ret(cpu
, num
, ret
);
374 void syscall_init(void)