4 * Copyright (c) 2003-2008 Fabrice Bellard
5 * Copyright (c) 2013-2014 Stacey D. Son
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 2 of the License, or
10 * (at your option) any later version.
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, see <http://www.gnu.org/licenses/>.
22 * We need the FreeBSD "legacy" definitions. Rust needs the FreeBSD 11 system
23 * calls since it doesn't use libc at all, so we have to emulate that despite
24 * FreeBSD 11 being EOL'd.
26 #define _WANT_FREEBSD11_STAT
27 #define _WANT_FREEBSD11_STATFS
28 #define _WANT_FREEBSD11_DIRENT
29 #define _WANT_KERNEL_ERRNO
31 #include "qemu/osdep.h"
32 #include "qemu/cutils.h"
33 #include "qemu/path.h"
34 #include <sys/syscall.h>
35 #include <sys/param.h>
36 #include <sys/sysctl.h>
40 #include "signal-common.h"
41 #include "user/syscall-trace.h"
46 safe_syscall3(ssize_t
, read
, int, fd
, void *, buf
, size_t, nbytes
);
47 safe_syscall4(ssize_t
, pread
, int, fd
, void *, buf
, size_t, nbytes
, off_t
,
49 safe_syscall3(ssize_t
, readv
, int, fd
, const struct iovec
*, iov
, int, iovcnt
);
50 safe_syscall4(ssize_t
, preadv
, int, fd
, const struct iovec
*, iov
, int, iovcnt
,
53 safe_syscall3(ssize_t
, write
, int, fd
, void *, buf
, size_t, nbytes
);
54 safe_syscall4(ssize_t
, pwrite
, int, fd
, void *, buf
, size_t, nbytes
, off_t
,
56 safe_syscall3(ssize_t
, writev
, int, fd
, const struct iovec
*, iov
, int, iovcnt
);
57 safe_syscall4(ssize_t
, pwritev
, int, fd
, const struct iovec
*, iov
, int, iovcnt
,
60 void target_set_brk(abi_ulong new_brk
)
67 abi_long
get_errno(abi_long ret
)
70 return -host_to_target_errno(errno
);
76 int host_to_target_errno(int err
)
79 * All the BSDs have the property that the error numbers are uniform across
80 * all architectures for a given BSD, though they may vary between different
86 bool is_error(abi_long ret
)
88 return (abi_ulong
)ret
>= (abi_ulong
)(-4096);
92 * Unlocks a iovec. Unlike unlock_iovec, it assumes the tvec array itself is
93 * already locked from target_addr. It will be unlocked as well as all the iovec
96 static void helper_unlock_iovec(struct target_iovec
*target_vec
,
97 abi_ulong target_addr
, struct iovec
*vec
,
100 for (int i
= 0; i
< count
; i
++) {
101 abi_ulong base
= tswapal(target_vec
[i
].iov_base
);
103 if (vec
[i
].iov_base
) {
104 unlock_user(vec
[i
].iov_base
, base
, copy
? vec
[i
].iov_len
: 0);
107 unlock_user(target_vec
, target_addr
, 0);
110 struct iovec
*lock_iovec(int type
, abi_ulong target_addr
,
113 struct target_iovec
*target_vec
;
115 abi_ulong total_len
, max_len
;
123 if (count
< 0 || count
> IOV_MAX
) {
128 vec
= g_try_new0(struct iovec
, count
);
134 target_vec
= lock_user(VERIFY_READ
, target_addr
,
135 count
* sizeof(struct target_iovec
), 1);
136 if (target_vec
== NULL
) {
141 max_len
= 0x7fffffff & MIN(TARGET_PAGE_MASK
, PAGE_MASK
);
144 for (i
= 0; i
< count
; i
++) {
145 abi_ulong base
= tswapal(target_vec
[i
].iov_base
);
146 abi_long len
= tswapal(target_vec
[i
].iov_len
);
151 } else if (len
== 0) {
152 /* Zero length pointer is ignored. */
155 vec
[i
].iov_base
= lock_user(type
, base
, len
, copy
);
157 * If the first buffer pointer is bad, this is a fault. But
158 * subsequent bad buffers will result in a partial write; this is
159 * realized by filling the vector with null pointers and zero
162 if (!vec
[i
].iov_base
) {
168 * Fail all the subsequent addresses, they are already
174 if (len
> max_len
- total_len
) {
175 len
= max_len
- total_len
;
178 vec
[i
].iov_len
= len
;
182 unlock_user(target_vec
, target_addr
, 0);
186 helper_unlock_iovec(target_vec
, target_addr
, vec
, i
, copy
);
193 void unlock_iovec(struct iovec
*vec
, abi_ulong target_addr
,
196 struct target_iovec
*target_vec
;
198 target_vec
= lock_user(VERIFY_READ
, target_addr
,
199 count
* sizeof(struct target_iovec
), 1);
201 helper_unlock_iovec(target_vec
, target_addr
, vec
, count
, copy
);
208 * All errnos that freebsd_syscall() returns must be -TARGET_<errcode>.
210 static abi_long
freebsd_syscall(void *cpu_env
, int num
, abi_long arg1
,
211 abi_long arg2
, abi_long arg3
, abi_long arg4
,
212 abi_long arg5
, abi_long arg6
, abi_long arg7
,
222 case TARGET_FREEBSD_NR_read
: /* read(2) */
223 ret
= do_bsd_read(arg1
, arg2
, arg3
);
226 case TARGET_FREEBSD_NR_pread
: /* pread(2) */
227 ret
= do_bsd_pread(cpu_env
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
230 case TARGET_FREEBSD_NR_readv
: /* readv(2) */
231 ret
= do_bsd_readv(arg1
, arg2
, arg3
);
234 case TARGET_FREEBSD_NR_preadv
: /* preadv(2) */
235 ret
= do_bsd_preadv(cpu_env
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
237 case TARGET_FREEBSD_NR_write
: /* write(2) */
238 ret
= do_bsd_write(arg1
, arg2
, arg3
);
241 case TARGET_FREEBSD_NR_pwrite
: /* pwrite(2) */
242 ret
= do_bsd_pwrite(cpu_env
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
245 case TARGET_FREEBSD_NR_writev
: /* writev(2) */
246 ret
= do_bsd_writev(arg1
, arg2
, arg3
);
249 case TARGET_FREEBSD_NR_pwritev
: /* pwritev(2) */
250 ret
= do_bsd_pwritev(cpu_env
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
254 qemu_log_mask(LOG_UNIMP
, "Unsupported syscall: %d\n", num
);
255 ret
= -TARGET_ENOSYS
;
263 * do_freebsd_syscall() should always have a single exit point at the end so
264 * that actions, such as logging of syscall results, can be performed. This
265 * as a wrapper around freebsd_syscall() so that actually happens. Since
266 * that is a singleton, modern compilers will inline it anyway...
268 abi_long
do_freebsd_syscall(void *cpu_env
, int num
, abi_long arg1
,
269 abi_long arg2
, abi_long arg3
, abi_long arg4
,
270 abi_long arg5
, abi_long arg6
, abi_long arg7
,
273 CPUState
*cpu
= env_cpu(cpu_env
);
276 trace_guest_user_syscall(cpu
, num
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
, arg7
, arg8
);
278 print_freebsd_syscall(num
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
281 ret
= freebsd_syscall(cpu_env
, num
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
,
284 print_freebsd_syscall_ret(num
, ret
);
286 trace_guest_user_syscall_ret(cpu
, num
, ret
);
291 void syscall_init(void)