root / bsd-user / syscall.c @ 8ab9b418
History | View | Annotate | Download (16 kB)
1 | 84778508 | blueswir1 | /*
|
---|---|---|---|
2 | 84778508 | blueswir1 | * BSD syscalls
|
3 | 84778508 | blueswir1 | *
|
4 | 84778508 | blueswir1 | * Copyright (c) 2003 - 2008 Fabrice Bellard
|
5 | 84778508 | blueswir1 | *
|
6 | 84778508 | blueswir1 | * This program is free software; you can redistribute it and/or modify
|
7 | 84778508 | blueswir1 | * it under the terms of the GNU General Public License as published by
|
8 | 84778508 | blueswir1 | * the Free Software Foundation; either version 2 of the License, or
|
9 | 84778508 | blueswir1 | * (at your option) any later version.
|
10 | 84778508 | blueswir1 | *
|
11 | 84778508 | blueswir1 | * This program is distributed in the hope that it will be useful,
|
12 | 84778508 | blueswir1 | * but WITHOUT ANY WARRANTY; without even the implied warranty of
|
13 | 84778508 | blueswir1 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
14 | 84778508 | blueswir1 | * GNU General Public License for more details.
|
15 | 84778508 | blueswir1 | *
|
16 | 84778508 | blueswir1 | * You should have received a copy of the GNU General Public License
|
17 | 8167ee88 | Blue Swirl | * along with this program; if not, see <http://www.gnu.org/licenses/>.
|
18 | 84778508 | blueswir1 | */
|
19 | 84778508 | blueswir1 | #include <stdlib.h> |
20 | 84778508 | blueswir1 | #include <stdio.h> |
21 | 84778508 | blueswir1 | #include <stdint.h> |
22 | 84778508 | blueswir1 | #include <stdarg.h> |
23 | 84778508 | blueswir1 | #include <string.h> |
24 | 84778508 | blueswir1 | #include <errno.h> |
25 | 84778508 | blueswir1 | #include <unistd.h> |
26 | 84778508 | blueswir1 | #include <fcntl.h> |
27 | 84778508 | blueswir1 | #include <time.h> |
28 | 84778508 | blueswir1 | #include <limits.h> |
29 | 84778508 | blueswir1 | #include <sys/types.h> |
30 | 84778508 | blueswir1 | #include <sys/mman.h> |
31 | 84778508 | blueswir1 | #include <sys/syscall.h> |
32 | 544f4f0b | Blue Swirl | #include <sys/param.h> |
33 | 78cfb07f | Juergen Lock | #include <sys/sysctl.h> |
34 | 84778508 | blueswir1 | #include <utime.h> |
35 | 84778508 | blueswir1 | |
36 | 84778508 | blueswir1 | #include "qemu.h" |
37 | 84778508 | blueswir1 | #include "qemu-common.h" |
38 | 84778508 | blueswir1 | |
39 | 84778508 | blueswir1 | //#define DEBUG
|
40 | 84778508 | blueswir1 | |
41 | 84778508 | blueswir1 | static abi_ulong target_brk;
|
42 | 84778508 | blueswir1 | static abi_ulong target_original_brk;
|
43 | 84778508 | blueswir1 | |
44 | 78cfb07f | Juergen Lock | static inline abi_long get_errno(abi_long ret) |
45 | 78cfb07f | Juergen Lock | { |
46 | 78cfb07f | Juergen Lock | if (ret == -1) |
47 | 78cfb07f | Juergen Lock | /* XXX need to translate host -> target errnos here */
|
48 | 78cfb07f | Juergen Lock | return -(errno);
|
49 | 78cfb07f | Juergen Lock | else
|
50 | 78cfb07f | Juergen Lock | return ret;
|
51 | 78cfb07f | Juergen Lock | } |
52 | 78cfb07f | Juergen Lock | |
53 | 84778508 | blueswir1 | #define target_to_host_bitmask(x, tbl) (x)
|
54 | 84778508 | blueswir1 | |
55 | 78cfb07f | Juergen Lock | static inline int is_error(abi_long ret) |
56 | 78cfb07f | Juergen Lock | { |
57 | 78cfb07f | Juergen Lock | return (abi_ulong)ret >= (abi_ulong)(-4096); |
58 | 78cfb07f | Juergen Lock | } |
59 | 78cfb07f | Juergen Lock | |
60 | 84778508 | blueswir1 | void target_set_brk(abi_ulong new_brk)
|
61 | 84778508 | blueswir1 | { |
62 | 84778508 | blueswir1 | target_original_brk = target_brk = HOST_PAGE_ALIGN(new_brk); |
63 | 84778508 | blueswir1 | } |
64 | 84778508 | blueswir1 | |
65 | 78cfb07f | Juergen Lock | /* do_obreak() must return target errnos. */
|
66 | 78cfb07f | Juergen Lock | static abi_long do_obreak(abi_ulong new_brk)
|
67 | 78cfb07f | Juergen Lock | { |
68 | 78cfb07f | Juergen Lock | abi_ulong brk_page; |
69 | 78cfb07f | Juergen Lock | abi_long mapped_addr; |
70 | 78cfb07f | Juergen Lock | int new_alloc_size;
|
71 | 78cfb07f | Juergen Lock | |
72 | 78cfb07f | Juergen Lock | if (!new_brk)
|
73 | 78cfb07f | Juergen Lock | return 0; |
74 | 78cfb07f | Juergen Lock | if (new_brk < target_original_brk)
|
75 | 78cfb07f | Juergen Lock | return -TARGET_EINVAL;
|
76 | 78cfb07f | Juergen Lock | |
77 | 78cfb07f | Juergen Lock | brk_page = HOST_PAGE_ALIGN(target_brk); |
78 | 78cfb07f | Juergen Lock | |
79 | 78cfb07f | Juergen Lock | /* If the new brk is less than this, set it and we're done... */
|
80 | 78cfb07f | Juergen Lock | if (new_brk < brk_page) {
|
81 | 78cfb07f | Juergen Lock | target_brk = new_brk; |
82 | 78cfb07f | Juergen Lock | return 0; |
83 | 78cfb07f | Juergen Lock | } |
84 | 78cfb07f | Juergen Lock | |
85 | 78cfb07f | Juergen Lock | /* We need to allocate more memory after the brk... */
|
86 | 78cfb07f | Juergen Lock | new_alloc_size = HOST_PAGE_ALIGN(new_brk - brk_page + 1);
|
87 | 78cfb07f | Juergen Lock | mapped_addr = get_errno(target_mmap(brk_page, new_alloc_size, |
88 | 78cfb07f | Juergen Lock | PROT_READ|PROT_WRITE, |
89 | 78cfb07f | Juergen Lock | MAP_ANON|MAP_FIXED|MAP_PRIVATE, -1, 0)); |
90 | 78cfb07f | Juergen Lock | |
91 | 78cfb07f | Juergen Lock | if (!is_error(mapped_addr))
|
92 | 78cfb07f | Juergen Lock | target_brk = new_brk; |
93 | 78cfb07f | Juergen Lock | else
|
94 | 78cfb07f | Juergen Lock | return mapped_addr;
|
95 | 78cfb07f | Juergen Lock | |
96 | 78cfb07f | Juergen Lock | return 0; |
97 | 78cfb07f | Juergen Lock | } |
98 | 78cfb07f | Juergen Lock | |
99 | 78cfb07f | Juergen Lock | #if defined(TARGET_I386)
|
100 | 78cfb07f | Juergen Lock | static abi_long do_freebsd_sysarch(CPUX86State *env, int op, abi_ulong parms) |
101 | 78cfb07f | Juergen Lock | { |
102 | 78cfb07f | Juergen Lock | abi_long ret = 0;
|
103 | 78cfb07f | Juergen Lock | abi_ulong val; |
104 | 78cfb07f | Juergen Lock | int idx;
|
105 | 78cfb07f | Juergen Lock | |
106 | 78cfb07f | Juergen Lock | switch(op) {
|
107 | 78cfb07f | Juergen Lock | #ifdef TARGET_ABI32
|
108 | 78cfb07f | Juergen Lock | case TARGET_FREEBSD_I386_SET_GSBASE:
|
109 | 78cfb07f | Juergen Lock | case TARGET_FREEBSD_I386_SET_FSBASE:
|
110 | 78cfb07f | Juergen Lock | if (op == TARGET_FREEBSD_I386_SET_GSBASE)
|
111 | 78cfb07f | Juergen Lock | #else
|
112 | 78cfb07f | Juergen Lock | case TARGET_FREEBSD_AMD64_SET_GSBASE:
|
113 | 78cfb07f | Juergen Lock | case TARGET_FREEBSD_AMD64_SET_FSBASE:
|
114 | 78cfb07f | Juergen Lock | if (op == TARGET_FREEBSD_AMD64_SET_GSBASE)
|
115 | 78cfb07f | Juergen Lock | #endif
|
116 | 78cfb07f | Juergen Lock | idx = R_GS; |
117 | 78cfb07f | Juergen Lock | else
|
118 | 78cfb07f | Juergen Lock | idx = R_FS; |
119 | 78cfb07f | Juergen Lock | if (get_user(val, parms, abi_ulong))
|
120 | 78cfb07f | Juergen Lock | return -TARGET_EFAULT;
|
121 | 78cfb07f | Juergen Lock | cpu_x86_load_seg(env, idx, 0);
|
122 | 78cfb07f | Juergen Lock | env->segs[idx].base = val; |
123 | 78cfb07f | Juergen Lock | break;
|
124 | 78cfb07f | Juergen Lock | #ifdef TARGET_ABI32
|
125 | 78cfb07f | Juergen Lock | case TARGET_FREEBSD_I386_GET_GSBASE:
|
126 | 78cfb07f | Juergen Lock | case TARGET_FREEBSD_I386_GET_FSBASE:
|
127 | 78cfb07f | Juergen Lock | if (op == TARGET_FREEBSD_I386_GET_GSBASE)
|
128 | 78cfb07f | Juergen Lock | #else
|
129 | 78cfb07f | Juergen Lock | case TARGET_FREEBSD_AMD64_GET_GSBASE:
|
130 | 78cfb07f | Juergen Lock | case TARGET_FREEBSD_AMD64_GET_FSBASE:
|
131 | 78cfb07f | Juergen Lock | if (op == TARGET_FREEBSD_AMD64_GET_GSBASE)
|
132 | 78cfb07f | Juergen Lock | #endif
|
133 | 78cfb07f | Juergen Lock | idx = R_GS; |
134 | 78cfb07f | Juergen Lock | else
|
135 | 78cfb07f | Juergen Lock | idx = R_FS; |
136 | 78cfb07f | Juergen Lock | val = env->segs[idx].base; |
137 | 78cfb07f | Juergen Lock | if (put_user(val, parms, abi_ulong))
|
138 | 78cfb07f | Juergen Lock | return -TARGET_EFAULT;
|
139 | 78cfb07f | Juergen Lock | break;
|
140 | 78cfb07f | Juergen Lock | /* XXX handle the others... */
|
141 | 78cfb07f | Juergen Lock | default:
|
142 | 78cfb07f | Juergen Lock | ret = -TARGET_EINVAL; |
143 | 78cfb07f | Juergen Lock | break;
|
144 | 78cfb07f | Juergen Lock | } |
145 | 78cfb07f | Juergen Lock | return ret;
|
146 | 78cfb07f | Juergen Lock | } |
147 | 78cfb07f | Juergen Lock | #endif
|
148 | 78cfb07f | Juergen Lock | |
149 | 78cfb07f | Juergen Lock | #ifdef TARGET_SPARC
|
150 | 78cfb07f | Juergen Lock | static abi_long do_freebsd_sysarch(void *env, int op, abi_ulong parms) |
151 | 78cfb07f | Juergen Lock | { |
152 | 78cfb07f | Juergen Lock | /* XXX handle
|
153 | 78cfb07f | Juergen Lock | * TARGET_FREEBSD_SPARC_UTRAP_INSTALL,
|
154 | 78cfb07f | Juergen Lock | * TARGET_FREEBSD_SPARC_SIGTRAMP_INSTALL
|
155 | 78cfb07f | Juergen Lock | */
|
156 | 78cfb07f | Juergen Lock | return -TARGET_EINVAL;
|
157 | 78cfb07f | Juergen Lock | } |
158 | 78cfb07f | Juergen Lock | #endif
|
159 | 78cfb07f | Juergen Lock | |
160 | 78cfb07f | Juergen Lock | #ifdef __FreeBSD__
|
161 | 78cfb07f | Juergen Lock | /*
|
162 | 78cfb07f | Juergen Lock | * XXX this uses the undocumented oidfmt interface to find the kind of
|
163 | 78cfb07f | Juergen Lock | * a requested sysctl, see /sys/kern/kern_sysctl.c:sysctl_sysctl_oidfmt()
|
164 | 78cfb07f | Juergen Lock | * (this is mostly copied from src/sbin/sysctl/sysctl.c)
|
165 | 78cfb07f | Juergen Lock | */
|
166 | 78cfb07f | Juergen Lock | static int |
167 | 78cfb07f | Juergen Lock | oidfmt(int *oid, int len, char *fmt, uint32_t *kind) |
168 | 78cfb07f | Juergen Lock | { |
169 | 78cfb07f | Juergen Lock | int qoid[CTL_MAXNAME+2]; |
170 | 78cfb07f | Juergen Lock | uint8_t buf[BUFSIZ]; |
171 | 78cfb07f | Juergen Lock | int i;
|
172 | 78cfb07f | Juergen Lock | size_t j; |
173 | 78cfb07f | Juergen Lock | |
174 | 78cfb07f | Juergen Lock | qoid[0] = 0; |
175 | 78cfb07f | Juergen Lock | qoid[1] = 4; |
176 | 78cfb07f | Juergen Lock | memcpy(qoid + 2, oid, len * sizeof(int)); |
177 | 78cfb07f | Juergen Lock | |
178 | 78cfb07f | Juergen Lock | j = sizeof(buf);
|
179 | 78cfb07f | Juergen Lock | i = sysctl(qoid, len + 2, buf, &j, 0, 0); |
180 | 78cfb07f | Juergen Lock | if (i)
|
181 | 78cfb07f | Juergen Lock | return i;
|
182 | 78cfb07f | Juergen Lock | |
183 | 78cfb07f | Juergen Lock | if (kind)
|
184 | 78cfb07f | Juergen Lock | *kind = *(uint32_t *)buf; |
185 | 78cfb07f | Juergen Lock | |
186 | 78cfb07f | Juergen Lock | if (fmt)
|
187 | 78cfb07f | Juergen Lock | strcpy(fmt, (char *)(buf + sizeof(uint32_t))); |
188 | 78cfb07f | Juergen Lock | return (0); |
189 | 78cfb07f | Juergen Lock | } |
190 | 78cfb07f | Juergen Lock | |
191 | 78cfb07f | Juergen Lock | /*
|
192 | 78cfb07f | Juergen Lock | * try and convert sysctl return data for the target.
|
193 | 78cfb07f | Juergen Lock | * XXX doesn't handle CTLTYPE_OPAQUE and CTLTYPE_STRUCT.
|
194 | 78cfb07f | Juergen Lock | */
|
195 | 78cfb07f | Juergen Lock | static int sysctl_oldcvt(void *holdp, size_t holdlen, uint32_t kind) |
196 | 78cfb07f | Juergen Lock | { |
197 | 78cfb07f | Juergen Lock | switch (kind & CTLTYPE) {
|
198 | 78cfb07f | Juergen Lock | case CTLTYPE_INT:
|
199 | 78cfb07f | Juergen Lock | case CTLTYPE_UINT:
|
200 | 78cfb07f | Juergen Lock | *(uint32_t *)holdp = tswap32(*(uint32_t *)holdp); |
201 | 78cfb07f | Juergen Lock | break;
|
202 | 78cfb07f | Juergen Lock | #ifdef TARGET_ABI32
|
203 | 78cfb07f | Juergen Lock | case CTLTYPE_LONG:
|
204 | 78cfb07f | Juergen Lock | case CTLTYPE_ULONG:
|
205 | 78cfb07f | Juergen Lock | *(uint32_t *)holdp = tswap32(*(long *)holdp);
|
206 | 78cfb07f | Juergen Lock | break;
|
207 | 78cfb07f | Juergen Lock | #else
|
208 | 78cfb07f | Juergen Lock | case CTLTYPE_LONG:
|
209 | 78cfb07f | Juergen Lock | *(uint64_t *)holdp = tswap64(*(long *)holdp);
|
210 | 78cfb07f | Juergen Lock | case CTLTYPE_ULONG:
|
211 | 78cfb07f | Juergen Lock | *(uint64_t *)holdp = tswap64(*(unsigned long *)holdp); |
212 | 78cfb07f | Juergen Lock | break;
|
213 | 78cfb07f | Juergen Lock | #endif
|
214 | e6a3ee5f | Ed Maste | #ifdef CTLTYPE_U64
|
215 | e6a3ee5f | Ed Maste | case CTLTYPE_S64:
|
216 | 6ea8430d | Ed Maste | case CTLTYPE_U64:
|
217 | e6a3ee5f | Ed Maste | #else
|
218 | e6a3ee5f | Ed Maste | case CTLTYPE_QUAD:
|
219 | 6ea8430d | Ed Maste | #endif
|
220 | 78cfb07f | Juergen Lock | *(uint64_t *)holdp = tswap64(*(uint64_t *)holdp); |
221 | 78cfb07f | Juergen Lock | break;
|
222 | 78cfb07f | Juergen Lock | case CTLTYPE_STRING:
|
223 | 78cfb07f | Juergen Lock | break;
|
224 | 78cfb07f | Juergen Lock | default:
|
225 | 78cfb07f | Juergen Lock | /* XXX unhandled */
|
226 | 78cfb07f | Juergen Lock | return -1; |
227 | 78cfb07f | Juergen Lock | } |
228 | 78cfb07f | Juergen Lock | return 0; |
229 | 78cfb07f | Juergen Lock | } |
230 | 78cfb07f | Juergen Lock | |
231 | 78cfb07f | Juergen Lock | /* XXX this needs to be emulated on non-FreeBSD hosts... */
|
232 | 78cfb07f | Juergen Lock | static abi_long do_freebsd_sysctl(abi_ulong namep, int32_t namelen, abi_ulong oldp,
|
233 | 78cfb07f | Juergen Lock | abi_ulong oldlenp, abi_ulong newp, abi_ulong newlen) |
234 | 78cfb07f | Juergen Lock | { |
235 | 78cfb07f | Juergen Lock | abi_long ret; |
236 | 78cfb07f | Juergen Lock | void *hnamep, *holdp, *hnewp = NULL; |
237 | 78cfb07f | Juergen Lock | size_t holdlen; |
238 | 78cfb07f | Juergen Lock | abi_ulong oldlen = 0;
|
239 | 7267c094 | Anthony Liguori | int32_t *snamep = g_malloc(sizeof(int32_t) * namelen), *p, *q, i;
|
240 | 78cfb07f | Juergen Lock | uint32_t kind = 0;
|
241 | 78cfb07f | Juergen Lock | |
242 | 78cfb07f | Juergen Lock | if (oldlenp)
|
243 | 78cfb07f | Juergen Lock | get_user_ual(oldlen, oldlenp); |
244 | 78cfb07f | Juergen Lock | if (!(hnamep = lock_user(VERIFY_READ, namep, namelen, 1))) |
245 | 78cfb07f | Juergen Lock | return -TARGET_EFAULT;
|
246 | 78cfb07f | Juergen Lock | if (newp && !(hnewp = lock_user(VERIFY_READ, newp, newlen, 1))) |
247 | 78cfb07f | Juergen Lock | return -TARGET_EFAULT;
|
248 | 78cfb07f | Juergen Lock | if (!(holdp = lock_user(VERIFY_WRITE, oldp, oldlen, 0))) |
249 | 78cfb07f | Juergen Lock | return -TARGET_EFAULT;
|
250 | 78cfb07f | Juergen Lock | holdlen = oldlen; |
251 | 78cfb07f | Juergen Lock | for (p = hnamep, q = snamep, i = 0; i < namelen; p++, i++) |
252 | 78cfb07f | Juergen Lock | *q++ = tswap32(*p); |
253 | 78cfb07f | Juergen Lock | oidfmt(snamep, namelen, NULL, &kind);
|
254 | 78cfb07f | Juergen Lock | /* XXX swap hnewp */
|
255 | 78cfb07f | Juergen Lock | ret = get_errno(sysctl(snamep, namelen, holdp, &holdlen, hnewp, newlen)); |
256 | 78cfb07f | Juergen Lock | if (!ret)
|
257 | 78cfb07f | Juergen Lock | sysctl_oldcvt(holdp, holdlen, kind); |
258 | 78cfb07f | Juergen Lock | put_user_ual(holdlen, oldlenp); |
259 | 78cfb07f | Juergen Lock | unlock_user(hnamep, namep, 0);
|
260 | 78cfb07f | Juergen Lock | unlock_user(holdp, oldp, holdlen); |
261 | 78cfb07f | Juergen Lock | if (hnewp)
|
262 | 78cfb07f | Juergen Lock | unlock_user(hnewp, newp, 0);
|
263 | 7267c094 | Anthony Liguori | g_free(snamep); |
264 | 78cfb07f | Juergen Lock | return ret;
|
265 | 78cfb07f | Juergen Lock | } |
266 | 78cfb07f | Juergen Lock | #endif
|
267 | 78cfb07f | Juergen Lock | |
268 | 78cfb07f | Juergen Lock | /* FIXME
|
269 | 78cfb07f | Juergen Lock | * lock_iovec()/unlock_iovec() have a return code of 0 for success where
|
270 | 78cfb07f | Juergen Lock | * other lock functions have a return code of 0 for failure.
|
271 | 78cfb07f | Juergen Lock | */
|
272 | 78cfb07f | Juergen Lock | static abi_long lock_iovec(int type, struct iovec *vec, abi_ulong target_addr, |
273 | 78cfb07f | Juergen Lock | int count, int copy) |
274 | 78cfb07f | Juergen Lock | { |
275 | 78cfb07f | Juergen Lock | struct target_iovec *target_vec;
|
276 | 78cfb07f | Juergen Lock | abi_ulong base; |
277 | 78cfb07f | Juergen Lock | int i;
|
278 | 78cfb07f | Juergen Lock | |
279 | 78cfb07f | Juergen Lock | target_vec = lock_user(VERIFY_READ, target_addr, count * sizeof(struct target_iovec), 1); |
280 | 78cfb07f | Juergen Lock | if (!target_vec)
|
281 | 78cfb07f | Juergen Lock | return -TARGET_EFAULT;
|
282 | 78cfb07f | Juergen Lock | for(i = 0;i < count; i++) { |
283 | 78cfb07f | Juergen Lock | base = tswapl(target_vec[i].iov_base); |
284 | 78cfb07f | Juergen Lock | vec[i].iov_len = tswapl(target_vec[i].iov_len); |
285 | 78cfb07f | Juergen Lock | if (vec[i].iov_len != 0) { |
286 | 78cfb07f | Juergen Lock | vec[i].iov_base = lock_user(type, base, vec[i].iov_len, copy); |
287 | 78cfb07f | Juergen Lock | /* Don't check lock_user return value. We must call writev even
|
288 | 78cfb07f | Juergen Lock | if a element has invalid base address. */
|
289 | 78cfb07f | Juergen Lock | } else {
|
290 | 78cfb07f | Juergen Lock | /* zero length pointer is ignored */
|
291 | 78cfb07f | Juergen Lock | vec[i].iov_base = NULL;
|
292 | 78cfb07f | Juergen Lock | } |
293 | 78cfb07f | Juergen Lock | } |
294 | 78cfb07f | Juergen Lock | unlock_user (target_vec, target_addr, 0);
|
295 | 78cfb07f | Juergen Lock | return 0; |
296 | 78cfb07f | Juergen Lock | } |
297 | 78cfb07f | Juergen Lock | |
298 | 78cfb07f | Juergen Lock | static abi_long unlock_iovec(struct iovec *vec, abi_ulong target_addr, |
299 | 78cfb07f | Juergen Lock | int count, int copy) |
300 | 78cfb07f | Juergen Lock | { |
301 | 78cfb07f | Juergen Lock | struct target_iovec *target_vec;
|
302 | 78cfb07f | Juergen Lock | abi_ulong base; |
303 | 78cfb07f | Juergen Lock | int i;
|
304 | 78cfb07f | Juergen Lock | |
305 | 78cfb07f | Juergen Lock | target_vec = lock_user(VERIFY_READ, target_addr, count * sizeof(struct target_iovec), 1); |
306 | 78cfb07f | Juergen Lock | if (!target_vec)
|
307 | 78cfb07f | Juergen Lock | return -TARGET_EFAULT;
|
308 | 78cfb07f | Juergen Lock | for(i = 0;i < count; i++) { |
309 | 78cfb07f | Juergen Lock | if (target_vec[i].iov_base) {
|
310 | 78cfb07f | Juergen Lock | base = tswapl(target_vec[i].iov_base); |
311 | 78cfb07f | Juergen Lock | unlock_user(vec[i].iov_base, base, copy ? vec[i].iov_len : 0);
|
312 | 78cfb07f | Juergen Lock | } |
313 | 78cfb07f | Juergen Lock | } |
314 | 78cfb07f | Juergen Lock | unlock_user (target_vec, target_addr, 0);
|
315 | 78cfb07f | Juergen Lock | |
316 | 78cfb07f | Juergen Lock | return 0; |
317 | 78cfb07f | Juergen Lock | } |
318 | 78cfb07f | Juergen Lock | |
319 | 84778508 | blueswir1 | /* do_syscall() should always have a single exit point at the end so
|
320 | 84778508 | blueswir1 | that actions, such as logging of syscall results, can be performed.
|
321 | 84778508 | blueswir1 | All errnos that do_syscall() returns must be -TARGET_<errcode>. */
|
322 | 84778508 | blueswir1 | abi_long do_freebsd_syscall(void *cpu_env, int num, abi_long arg1, |
323 | 84778508 | blueswir1 | abi_long arg2, abi_long arg3, abi_long arg4, |
324 | 78cfb07f | Juergen Lock | abi_long arg5, abi_long arg6, abi_long arg7, |
325 | 78cfb07f | Juergen Lock | abi_long arg8) |
326 | 84778508 | blueswir1 | { |
327 | 84778508 | blueswir1 | abi_long ret; |
328 | 84778508 | blueswir1 | void *p;
|
329 | 84778508 | blueswir1 | |
330 | 84778508 | blueswir1 | #ifdef DEBUG
|
331 | 84778508 | blueswir1 | gemu_log("freebsd syscall %d\n", num);
|
332 | 84778508 | blueswir1 | #endif
|
333 | 84778508 | blueswir1 | if(do_strace)
|
334 | 84778508 | blueswir1 | print_freebsd_syscall(num, arg1, arg2, arg3, arg4, arg5, arg6); |
335 | 84778508 | blueswir1 | |
336 | 84778508 | blueswir1 | switch(num) {
|
337 | 84778508 | blueswir1 | case TARGET_FREEBSD_NR_exit:
|
338 | 9788c9ca | Juan Quintela | #ifdef TARGET_GPROF
|
339 | 84778508 | blueswir1 | _mcleanup(); |
340 | 84778508 | blueswir1 | #endif
|
341 | 84778508 | blueswir1 | gdb_exit(cpu_env, arg1); |
342 | 84778508 | blueswir1 | /* XXX: should free thread stack and CPU env */
|
343 | 84778508 | blueswir1 | _exit(arg1); |
344 | 84778508 | blueswir1 | ret = 0; /* avoid warning */ |
345 | 84778508 | blueswir1 | break;
|
346 | 84778508 | blueswir1 | case TARGET_FREEBSD_NR_read:
|
347 | 84778508 | blueswir1 | if (!(p = lock_user(VERIFY_WRITE, arg2, arg3, 0))) |
348 | 84778508 | blueswir1 | goto efault;
|
349 | 84778508 | blueswir1 | ret = get_errno(read(arg1, p, arg3)); |
350 | 84778508 | blueswir1 | unlock_user(p, arg2, ret); |
351 | 84778508 | blueswir1 | break;
|
352 | 84778508 | blueswir1 | case TARGET_FREEBSD_NR_write:
|
353 | 84778508 | blueswir1 | if (!(p = lock_user(VERIFY_READ, arg2, arg3, 1))) |
354 | 84778508 | blueswir1 | goto efault;
|
355 | 84778508 | blueswir1 | ret = get_errno(write(arg1, p, arg3)); |
356 | 84778508 | blueswir1 | unlock_user(p, arg2, 0);
|
357 | 84778508 | blueswir1 | break;
|
358 | 78cfb07f | Juergen Lock | case TARGET_FREEBSD_NR_writev:
|
359 | 78cfb07f | Juergen Lock | { |
360 | 78cfb07f | Juergen Lock | int count = arg3;
|
361 | 78cfb07f | Juergen Lock | struct iovec *vec;
|
362 | 78cfb07f | Juergen Lock | |
363 | 78cfb07f | Juergen Lock | vec = alloca(count * sizeof(struct iovec)); |
364 | 78cfb07f | Juergen Lock | if (lock_iovec(VERIFY_READ, vec, arg2, count, 1) < 0) |
365 | 78cfb07f | Juergen Lock | goto efault;
|
366 | 78cfb07f | Juergen Lock | ret = get_errno(writev(arg1, vec, count)); |
367 | 78cfb07f | Juergen Lock | unlock_iovec(vec, arg2, count, 0);
|
368 | 78cfb07f | Juergen Lock | } |
369 | 78cfb07f | Juergen Lock | break;
|
370 | 84778508 | blueswir1 | case TARGET_FREEBSD_NR_open:
|
371 | 84778508 | blueswir1 | if (!(p = lock_user_string(arg1)))
|
372 | 84778508 | blueswir1 | goto efault;
|
373 | 84778508 | blueswir1 | ret = get_errno(open(path(p), |
374 | 84778508 | blueswir1 | target_to_host_bitmask(arg2, fcntl_flags_tbl), |
375 | 84778508 | blueswir1 | arg3)); |
376 | 84778508 | blueswir1 | unlock_user(p, arg1, 0);
|
377 | 84778508 | blueswir1 | break;
|
378 | 84778508 | blueswir1 | case TARGET_FREEBSD_NR_mmap:
|
379 | 84778508 | blueswir1 | ret = get_errno(target_mmap(arg1, arg2, arg3, |
380 | 84778508 | blueswir1 | target_to_host_bitmask(arg4, mmap_flags_tbl), |
381 | 84778508 | blueswir1 | arg5, |
382 | 84778508 | blueswir1 | arg6)); |
383 | 84778508 | blueswir1 | break;
|
384 | 84778508 | blueswir1 | case TARGET_FREEBSD_NR_mprotect:
|
385 | 84778508 | blueswir1 | ret = get_errno(target_mprotect(arg1, arg2, arg3)); |
386 | 84778508 | blueswir1 | break;
|
387 | 78cfb07f | Juergen Lock | case TARGET_FREEBSD_NR_break:
|
388 | 78cfb07f | Juergen Lock | ret = do_obreak(arg1); |
389 | 78cfb07f | Juergen Lock | break;
|
390 | 78cfb07f | Juergen Lock | #ifdef __FreeBSD__
|
391 | 78cfb07f | Juergen Lock | case TARGET_FREEBSD_NR___sysctl:
|
392 | 78cfb07f | Juergen Lock | ret = do_freebsd_sysctl(arg1, arg2, arg3, arg4, arg5, arg6); |
393 | 78cfb07f | Juergen Lock | break;
|
394 | 78cfb07f | Juergen Lock | #endif
|
395 | 78cfb07f | Juergen Lock | case TARGET_FREEBSD_NR_sysarch:
|
396 | 78cfb07f | Juergen Lock | ret = do_freebsd_sysarch(cpu_env, arg1, arg2); |
397 | 78cfb07f | Juergen Lock | break;
|
398 | 84778508 | blueswir1 | case TARGET_FREEBSD_NR_syscall:
|
399 | 84778508 | blueswir1 | case TARGET_FREEBSD_NR___syscall:
|
400 | 78cfb07f | Juergen Lock | ret = do_freebsd_syscall(cpu_env,arg1 & 0xffff,arg2,arg3,arg4,arg5,arg6,arg7,arg8,0); |
401 | 84778508 | blueswir1 | break;
|
402 | 84778508 | blueswir1 | default:
|
403 | 78cfb07f | Juergen Lock | ret = get_errno(syscall(num, arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8)); |
404 | 84778508 | blueswir1 | break;
|
405 | 84778508 | blueswir1 | } |
406 | 84778508 | blueswir1 | fail:
|
407 | 84778508 | blueswir1 | #ifdef DEBUG
|
408 | 84778508 | blueswir1 | gemu_log(" = %ld\n", ret);
|
409 | 84778508 | blueswir1 | #endif
|
410 | 84778508 | blueswir1 | if (do_strace)
|
411 | 84778508 | blueswir1 | print_freebsd_syscall_ret(num, ret); |
412 | 84778508 | blueswir1 | return ret;
|
413 | 84778508 | blueswir1 | efault:
|
414 | 84778508 | blueswir1 | ret = -TARGET_EFAULT; |
415 | 84778508 | blueswir1 | goto fail;
|
416 | 84778508 | blueswir1 | } |
417 | 84778508 | blueswir1 | |
418 | 84778508 | blueswir1 | abi_long do_netbsd_syscall(void *cpu_env, int num, abi_long arg1, |
419 | 84778508 | blueswir1 | abi_long arg2, abi_long arg3, abi_long arg4, |
420 | 84778508 | blueswir1 | abi_long arg5, abi_long arg6) |
421 | 84778508 | blueswir1 | { |
422 | 84778508 | blueswir1 | abi_long ret; |
423 | 84778508 | blueswir1 | void *p;
|
424 | 84778508 | blueswir1 | |
425 | 84778508 | blueswir1 | #ifdef DEBUG
|
426 | 84778508 | blueswir1 | gemu_log("netbsd syscall %d\n", num);
|
427 | 84778508 | blueswir1 | #endif
|
428 | 84778508 | blueswir1 | if(do_strace)
|
429 | 84778508 | blueswir1 | print_netbsd_syscall(num, arg1, arg2, arg3, arg4, arg5, arg6); |
430 | 84778508 | blueswir1 | |
431 | 84778508 | blueswir1 | switch(num) {
|
432 | 84778508 | blueswir1 | case TARGET_NETBSD_NR_exit:
|
433 | 9788c9ca | Juan Quintela | #ifdef TARGET_GPROF
|
434 | 84778508 | blueswir1 | _mcleanup(); |
435 | 84778508 | blueswir1 | #endif
|
436 | 84778508 | blueswir1 | gdb_exit(cpu_env, arg1); |
437 | 84778508 | blueswir1 | /* XXX: should free thread stack and CPU env */
|
438 | 84778508 | blueswir1 | _exit(arg1); |
439 | 84778508 | blueswir1 | ret = 0; /* avoid warning */ |
440 | 84778508 | blueswir1 | break;
|
441 | 84778508 | blueswir1 | case TARGET_NETBSD_NR_read:
|
442 | 84778508 | blueswir1 | if (!(p = lock_user(VERIFY_WRITE, arg2, arg3, 0))) |
443 | 84778508 | blueswir1 | goto efault;
|
444 | 84778508 | blueswir1 | ret = get_errno(read(arg1, p, arg3)); |
445 | 84778508 | blueswir1 | unlock_user(p, arg2, ret); |
446 | 84778508 | blueswir1 | break;
|
447 | 84778508 | blueswir1 | case TARGET_NETBSD_NR_write:
|
448 | 84778508 | blueswir1 | if (!(p = lock_user(VERIFY_READ, arg2, arg3, 1))) |
449 | 84778508 | blueswir1 | goto efault;
|
450 | 84778508 | blueswir1 | ret = get_errno(write(arg1, p, arg3)); |
451 | 84778508 | blueswir1 | unlock_user(p, arg2, 0);
|
452 | 84778508 | blueswir1 | break;
|
453 | 84778508 | blueswir1 | case TARGET_NETBSD_NR_open:
|
454 | 84778508 | blueswir1 | if (!(p = lock_user_string(arg1)))
|
455 | 84778508 | blueswir1 | goto efault;
|
456 | 84778508 | blueswir1 | ret = get_errno(open(path(p), |
457 | 84778508 | blueswir1 | target_to_host_bitmask(arg2, fcntl_flags_tbl), |
458 | 84778508 | blueswir1 | arg3)); |
459 | 84778508 | blueswir1 | unlock_user(p, arg1, 0);
|
460 | 84778508 | blueswir1 | break;
|
461 | 84778508 | blueswir1 | case TARGET_NETBSD_NR_mmap:
|
462 | 84778508 | blueswir1 | ret = get_errno(target_mmap(arg1, arg2, arg3, |
463 | 84778508 | blueswir1 | target_to_host_bitmask(arg4, mmap_flags_tbl), |
464 | 84778508 | blueswir1 | arg5, |
465 | 84778508 | blueswir1 | arg6)); |
466 | 84778508 | blueswir1 | break;
|
467 | 84778508 | blueswir1 | case TARGET_NETBSD_NR_mprotect:
|
468 | 84778508 | blueswir1 | ret = get_errno(target_mprotect(arg1, arg2, arg3)); |
469 | 84778508 | blueswir1 | break;
|
470 | 84778508 | blueswir1 | case TARGET_NETBSD_NR_syscall:
|
471 | 84778508 | blueswir1 | case TARGET_NETBSD_NR___syscall:
|
472 | 84778508 | blueswir1 | ret = do_netbsd_syscall(cpu_env,arg1 & 0xffff,arg2,arg3,arg4,arg5,arg6,0); |
473 | 84778508 | blueswir1 | break;
|
474 | 84778508 | blueswir1 | default:
|
475 | 84778508 | blueswir1 | ret = syscall(num, arg1, arg2, arg3, arg4, arg5, arg6); |
476 | 84778508 | blueswir1 | break;
|
477 | 84778508 | blueswir1 | } |
478 | 84778508 | blueswir1 | fail:
|
479 | 84778508 | blueswir1 | #ifdef DEBUG
|
480 | 84778508 | blueswir1 | gemu_log(" = %ld\n", ret);
|
481 | 84778508 | blueswir1 | #endif
|
482 | 84778508 | blueswir1 | if (do_strace)
|
483 | 84778508 | blueswir1 | print_netbsd_syscall_ret(num, ret); |
484 | 84778508 | blueswir1 | return ret;
|
485 | 84778508 | blueswir1 | efault:
|
486 | 84778508 | blueswir1 | ret = -TARGET_EFAULT; |
487 | 84778508 | blueswir1 | goto fail;
|
488 | 84778508 | blueswir1 | } |
489 | 84778508 | blueswir1 | |
490 | 84778508 | blueswir1 | abi_long do_openbsd_syscall(void *cpu_env, int num, abi_long arg1, |
491 | 84778508 | blueswir1 | abi_long arg2, abi_long arg3, abi_long arg4, |
492 | 84778508 | blueswir1 | abi_long arg5, abi_long arg6) |
493 | 84778508 | blueswir1 | { |
494 | 84778508 | blueswir1 | abi_long ret; |
495 | 84778508 | blueswir1 | void *p;
|
496 | 84778508 | blueswir1 | |
497 | 84778508 | blueswir1 | #ifdef DEBUG
|
498 | 84778508 | blueswir1 | gemu_log("openbsd syscall %d\n", num);
|
499 | 84778508 | blueswir1 | #endif
|
500 | 84778508 | blueswir1 | if(do_strace)
|
501 | 84778508 | blueswir1 | print_openbsd_syscall(num, arg1, arg2, arg3, arg4, arg5, arg6); |
502 | 84778508 | blueswir1 | |
503 | 84778508 | blueswir1 | switch(num) {
|
504 | 84778508 | blueswir1 | case TARGET_OPENBSD_NR_exit:
|
505 | 9788c9ca | Juan Quintela | #ifdef TARGET_GPROF
|
506 | 84778508 | blueswir1 | _mcleanup(); |
507 | 84778508 | blueswir1 | #endif
|
508 | 84778508 | blueswir1 | gdb_exit(cpu_env, arg1); |
509 | 84778508 | blueswir1 | /* XXX: should free thread stack and CPU env */
|
510 | 84778508 | blueswir1 | _exit(arg1); |
511 | 84778508 | blueswir1 | ret = 0; /* avoid warning */ |
512 | 84778508 | blueswir1 | break;
|
513 | 84778508 | blueswir1 | case TARGET_OPENBSD_NR_read:
|
514 | 84778508 | blueswir1 | if (!(p = lock_user(VERIFY_WRITE, arg2, arg3, 0))) |
515 | 84778508 | blueswir1 | goto efault;
|
516 | 84778508 | blueswir1 | ret = get_errno(read(arg1, p, arg3)); |
517 | 84778508 | blueswir1 | unlock_user(p, arg2, ret); |
518 | 84778508 | blueswir1 | break;
|
519 | 84778508 | blueswir1 | case TARGET_OPENBSD_NR_write:
|
520 | 84778508 | blueswir1 | if (!(p = lock_user(VERIFY_READ, arg2, arg3, 1))) |
521 | 84778508 | blueswir1 | goto efault;
|
522 | 84778508 | blueswir1 | ret = get_errno(write(arg1, p, arg3)); |
523 | 84778508 | blueswir1 | unlock_user(p, arg2, 0);
|
524 | 84778508 | blueswir1 | break;
|
525 | 84778508 | blueswir1 | case TARGET_OPENBSD_NR_open:
|
526 | 84778508 | blueswir1 | if (!(p = lock_user_string(arg1)))
|
527 | 84778508 | blueswir1 | goto efault;
|
528 | 84778508 | blueswir1 | ret = get_errno(open(path(p), |
529 | 84778508 | blueswir1 | target_to_host_bitmask(arg2, fcntl_flags_tbl), |
530 | 84778508 | blueswir1 | arg3)); |
531 | 84778508 | blueswir1 | unlock_user(p, arg1, 0);
|
532 | 84778508 | blueswir1 | break;
|
533 | 84778508 | blueswir1 | case TARGET_OPENBSD_NR_mmap:
|
534 | 84778508 | blueswir1 | ret = get_errno(target_mmap(arg1, arg2, arg3, |
535 | 84778508 | blueswir1 | target_to_host_bitmask(arg4, mmap_flags_tbl), |
536 | 84778508 | blueswir1 | arg5, |
537 | 84778508 | blueswir1 | arg6)); |
538 | 84778508 | blueswir1 | break;
|
539 | 84778508 | blueswir1 | case TARGET_OPENBSD_NR_mprotect:
|
540 | 84778508 | blueswir1 | ret = get_errno(target_mprotect(arg1, arg2, arg3)); |
541 | 84778508 | blueswir1 | break;
|
542 | 84778508 | blueswir1 | case TARGET_OPENBSD_NR_syscall:
|
543 | 84778508 | blueswir1 | case TARGET_OPENBSD_NR___syscall:
|
544 | 84778508 | blueswir1 | ret = do_openbsd_syscall(cpu_env,arg1 & 0xffff,arg2,arg3,arg4,arg5,arg6,0); |
545 | 84778508 | blueswir1 | break;
|
546 | 84778508 | blueswir1 | default:
|
547 | 84778508 | blueswir1 | ret = syscall(num, arg1, arg2, arg3, arg4, arg5, arg6); |
548 | 84778508 | blueswir1 | break;
|
549 | 84778508 | blueswir1 | } |
550 | 84778508 | blueswir1 | fail:
|
551 | 84778508 | blueswir1 | #ifdef DEBUG
|
552 | 84778508 | blueswir1 | gemu_log(" = %ld\n", ret);
|
553 | 84778508 | blueswir1 | #endif
|
554 | 84778508 | blueswir1 | if (do_strace)
|
555 | 84778508 | blueswir1 | print_openbsd_syscall_ret(num, ret); |
556 | 84778508 | blueswir1 | return ret;
|
557 | 84778508 | blueswir1 | efault:
|
558 | 84778508 | blueswir1 | ret = -TARGET_EFAULT; |
559 | 84778508 | blueswir1 | goto fail;
|
560 | 84778508 | blueswir1 | } |
561 | 84778508 | blueswir1 | |
562 | 84778508 | blueswir1 | void syscall_init(void) |
563 | 84778508 | blueswir1 | { |
564 | 84778508 | blueswir1 | } |