4 * Copyright (c) 2003-2008 Fabrice Bellard
5 * Copyright (c) 2013-2014 Stacey D. Son
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 2 of the License, or
10 * (at your option) any later version.
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, see <http://www.gnu.org/licenses/>.
22 * We need the FreeBSD "legacy" definitions. Rust needs the FreeBSD 11 system
23 * calls since it doesn't use libc at all, so we have to emulate that despite
24 * FreeBSD 11 being EOL'd.
26 #define _WANT_FREEBSD11_STAT
27 #define _WANT_FREEBSD11_STATFS
28 #define _WANT_FREEBSD11_DIRENT
29 #define _WANT_KERNEL_ERRNO
31 #include "qemu/osdep.h"
32 #include "qemu/cutils.h"
33 #include "qemu/path.h"
34 #include <sys/syscall.h>
35 #include <sys/cdefs.h>
36 #include <sys/param.h>
37 #include <sys/mount.h>
38 #include <sys/sysctl.h>
42 #include "signal-common.h"
43 #include "user/syscall-trace.h"
49 safe_syscall3(int, open
, const char *, path
, int, flags
, mode_t
, mode
);
50 safe_syscall4(int, openat
, int, fd
, const char *, path
, int, flags
, mode_t
,
53 safe_syscall3(ssize_t
, read
, int, fd
, void *, buf
, size_t, nbytes
);
54 safe_syscall4(ssize_t
, pread
, int, fd
, void *, buf
, size_t, nbytes
, off_t
,
56 safe_syscall3(ssize_t
, readv
, int, fd
, const struct iovec
*, iov
, int, iovcnt
);
57 safe_syscall4(ssize_t
, preadv
, int, fd
, const struct iovec
*, iov
, int, iovcnt
,
60 safe_syscall3(ssize_t
, write
, int, fd
, void *, buf
, size_t, nbytes
);
61 safe_syscall4(ssize_t
, pwrite
, int, fd
, void *, buf
, size_t, nbytes
, off_t
,
63 safe_syscall3(ssize_t
, writev
, int, fd
, const struct iovec
*, iov
, int, iovcnt
);
64 safe_syscall4(ssize_t
, pwritev
, int, fd
, const struct iovec
*, iov
, int, iovcnt
,
67 void target_set_brk(abi_ulong new_brk
)
74 abi_long
get_errno(abi_long ret
)
77 return -host_to_target_errno(errno
);
83 int host_to_target_errno(int err
)
86 * All the BSDs have the property that the error numbers are uniform across
87 * all architectures for a given BSD, though they may vary between different
93 bool is_error(abi_long ret
)
95 return (abi_ulong
)ret
>= (abi_ulong
)(-4096);
99 * Unlocks a iovec. Unlike unlock_iovec, it assumes the tvec array itself is
100 * already locked from target_addr. It will be unlocked as well as all the iovec
103 static void helper_unlock_iovec(struct target_iovec
*target_vec
,
104 abi_ulong target_addr
, struct iovec
*vec
,
107 for (int i
= 0; i
< count
; i
++) {
108 abi_ulong base
= tswapal(target_vec
[i
].iov_base
);
110 if (vec
[i
].iov_base
) {
111 unlock_user(vec
[i
].iov_base
, base
, copy
? vec
[i
].iov_len
: 0);
114 unlock_user(target_vec
, target_addr
, 0);
117 struct iovec
*lock_iovec(int type
, abi_ulong target_addr
,
120 struct target_iovec
*target_vec
;
122 abi_ulong total_len
, max_len
;
130 if (count
< 0 || count
> IOV_MAX
) {
135 vec
= g_try_new0(struct iovec
, count
);
141 target_vec
= lock_user(VERIFY_READ
, target_addr
,
142 count
* sizeof(struct target_iovec
), 1);
143 if (target_vec
== NULL
) {
148 max_len
= 0x7fffffff & MIN(TARGET_PAGE_MASK
, PAGE_MASK
);
151 for (i
= 0; i
< count
; i
++) {
152 abi_ulong base
= tswapal(target_vec
[i
].iov_base
);
153 abi_long len
= tswapal(target_vec
[i
].iov_len
);
158 } else if (len
== 0) {
159 /* Zero length pointer is ignored. */
162 vec
[i
].iov_base
= lock_user(type
, base
, len
, copy
);
164 * If the first buffer pointer is bad, this is a fault. But
165 * subsequent bad buffers will result in a partial write; this is
166 * realized by filling the vector with null pointers and zero
169 if (!vec
[i
].iov_base
) {
175 * Fail all the subsequent addresses, they are already
181 if (len
> max_len
- total_len
) {
182 len
= max_len
- total_len
;
185 vec
[i
].iov_len
= len
;
189 unlock_user(target_vec
, target_addr
, 0);
193 helper_unlock_iovec(target_vec
, target_addr
, vec
, i
, copy
);
200 void unlock_iovec(struct iovec
*vec
, abi_ulong target_addr
,
203 struct target_iovec
*target_vec
;
205 target_vec
= lock_user(VERIFY_READ
, target_addr
,
206 count
* sizeof(struct target_iovec
), 1);
208 helper_unlock_iovec(target_vec
, target_addr
, vec
, count
, copy
);
215 * All errnos that freebsd_syscall() returns must be -TARGET_<errcode>.
217 static abi_long
freebsd_syscall(void *cpu_env
, int num
, abi_long arg1
,
218 abi_long arg2
, abi_long arg3
, abi_long arg4
,
219 abi_long arg5
, abi_long arg6
, abi_long arg7
,
226 * process system calls
228 case TARGET_FREEBSD_NR_exit
: /* exit(2) */
229 ret
= do_bsd_exit(cpu_env
, arg1
);
235 case TARGET_FREEBSD_NR_read
: /* read(2) */
236 ret
= do_bsd_read(arg1
, arg2
, arg3
);
239 case TARGET_FREEBSD_NR_pread
: /* pread(2) */
240 ret
= do_bsd_pread(cpu_env
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
243 case TARGET_FREEBSD_NR_readv
: /* readv(2) */
244 ret
= do_bsd_readv(arg1
, arg2
, arg3
);
247 case TARGET_FREEBSD_NR_preadv
: /* preadv(2) */
248 ret
= do_bsd_preadv(cpu_env
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
250 case TARGET_FREEBSD_NR_write
: /* write(2) */
251 ret
= do_bsd_write(arg1
, arg2
, arg3
);
254 case TARGET_FREEBSD_NR_pwrite
: /* pwrite(2) */
255 ret
= do_bsd_pwrite(cpu_env
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
258 case TARGET_FREEBSD_NR_writev
: /* writev(2) */
259 ret
= do_bsd_writev(arg1
, arg2
, arg3
);
262 case TARGET_FREEBSD_NR_pwritev
: /* pwritev(2) */
263 ret
= do_bsd_pwritev(cpu_env
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
266 case TARGET_FREEBSD_NR_open
: /* open(2) */
267 ret
= do_bsd_open(arg1
, arg2
, arg3
);
270 case TARGET_FREEBSD_NR_openat
: /* openat(2) */
271 ret
= do_bsd_openat(arg1
, arg2
, arg3
, arg4
);
274 case TARGET_FREEBSD_NR_close
: /* close(2) */
275 ret
= do_bsd_close(arg1
);
278 case TARGET_FREEBSD_NR_fdatasync
: /* fdatasync(2) */
279 ret
= do_bsd_fdatasync(arg1
);
282 case TARGET_FREEBSD_NR_fsync
: /* fsync(2) */
283 ret
= do_bsd_fsync(arg1
);
286 case TARGET_FREEBSD_NR_freebsd12_closefrom
: /* closefrom(2) */
287 ret
= do_bsd_closefrom(arg1
);
290 case TARGET_FREEBSD_NR_revoke
: /* revoke(2) */
291 ret
= do_bsd_revoke(arg1
);
294 case TARGET_FREEBSD_NR_access
: /* access(2) */
295 ret
= do_bsd_access(arg1
, arg2
);
298 case TARGET_FREEBSD_NR_eaccess
: /* eaccess(2) */
299 ret
= do_bsd_eaccess(arg1
, arg2
);
302 case TARGET_FREEBSD_NR_faccessat
: /* faccessat(2) */
303 ret
= do_bsd_faccessat(arg1
, arg2
, arg3
, arg4
);
306 case TARGET_FREEBSD_NR_chdir
: /* chdir(2) */
307 ret
= do_bsd_chdir(arg1
);
310 case TARGET_FREEBSD_NR_fchdir
: /* fchdir(2) */
311 ret
= do_bsd_fchdir(arg1
);
314 case TARGET_FREEBSD_NR_rename
: /* rename(2) */
315 ret
= do_bsd_rename(arg1
, arg2
);
318 case TARGET_FREEBSD_NR_renameat
: /* renameat(2) */
319 ret
= do_bsd_renameat(arg1
, arg2
, arg3
, arg4
);
322 case TARGET_FREEBSD_NR_link
: /* link(2) */
323 ret
= do_bsd_link(arg1
, arg2
);
326 case TARGET_FREEBSD_NR_linkat
: /* linkat(2) */
327 ret
= do_bsd_linkat(arg1
, arg2
, arg3
, arg4
, arg5
);
330 case TARGET_FREEBSD_NR_unlink
: /* unlink(2) */
331 ret
= do_bsd_unlink(arg1
);
334 case TARGET_FREEBSD_NR_unlinkat
: /* unlinkat(2) */
335 ret
= do_bsd_unlinkat(arg1
, arg2
, arg3
);
338 case TARGET_FREEBSD_NR_mkdir
: /* mkdir(2) */
339 ret
= do_bsd_mkdir(arg1
, arg2
);
342 case TARGET_FREEBSD_NR_mkdirat
: /* mkdirat(2) */
343 ret
= do_bsd_mkdirat(arg1
, arg2
, arg3
);
346 case TARGET_FREEBSD_NR_rmdir
: /* rmdir(2) (XXX no rmdirat()?) */
347 ret
= do_bsd_rmdir(arg1
);
350 case TARGET_FREEBSD_NR___getcwd
: /* undocumented __getcwd() */
351 ret
= do_bsd___getcwd(arg1
, arg2
);
354 case TARGET_FREEBSD_NR_dup
: /* dup(2) */
355 ret
= do_bsd_dup(arg1
);
358 case TARGET_FREEBSD_NR_dup2
: /* dup2(2) */
359 ret
= do_bsd_dup2(arg1
, arg2
);
362 case TARGET_FREEBSD_NR_truncate
: /* truncate(2) */
363 ret
= do_bsd_truncate(cpu_env
, arg1
, arg2
, arg3
, arg4
);
366 case TARGET_FREEBSD_NR_ftruncate
: /* ftruncate(2) */
367 ret
= do_bsd_ftruncate(cpu_env
, arg1
, arg2
, arg3
, arg4
);
370 case TARGET_FREEBSD_NR_acct
: /* acct(2) */
371 ret
= do_bsd_acct(arg1
);
374 case TARGET_FREEBSD_NR_sync
: /* sync(2) */
378 case TARGET_FREEBSD_NR_mount
: /* mount(2) */
379 ret
= do_bsd_mount(arg1
, arg2
, arg3
, arg4
);
382 case TARGET_FREEBSD_NR_unmount
: /* unmount(2) */
383 ret
= do_bsd_unmount(arg1
, arg2
);
386 case TARGET_FREEBSD_NR_nmount
: /* nmount(2) */
387 ret
= do_bsd_nmount(arg1
, arg2
, arg3
);
390 case TARGET_FREEBSD_NR_symlink
: /* symlink(2) */
391 ret
= do_bsd_symlink(arg1
, arg2
);
394 case TARGET_FREEBSD_NR_symlinkat
: /* symlinkat(2) */
395 ret
= do_bsd_symlinkat(arg1
, arg2
, arg3
);
398 case TARGET_FREEBSD_NR_readlink
: /* readlink(2) */
399 ret
= do_bsd_readlink(cpu_env
, arg1
, arg2
, arg3
);
402 case TARGET_FREEBSD_NR_readlinkat
: /* readlinkat(2) */
403 ret
= do_bsd_readlinkat(arg1
, arg2
, arg3
, arg4
);
406 case TARGET_FREEBSD_NR_chmod
: /* chmod(2) */
407 ret
= do_bsd_chmod(arg1
, arg2
);
410 case TARGET_FREEBSD_NR_fchmod
: /* fchmod(2) */
411 ret
= do_bsd_fchmod(arg1
, arg2
);
414 case TARGET_FREEBSD_NR_lchmod
: /* lchmod(2) */
415 ret
= do_bsd_lchmod(arg1
, arg2
);
418 case TARGET_FREEBSD_NR_fchmodat
: /* fchmodat(2) */
419 ret
= do_bsd_fchmodat(arg1
, arg2
, arg3
, arg4
);
422 case TARGET_FREEBSD_NR_freebsd11_mknod
: /* mknod(2) */
423 ret
= do_bsd_freebsd11_mknod(arg1
, arg2
, arg3
);
426 case TARGET_FREEBSD_NR_freebsd11_mknodat
: /* mknodat(2) */
427 ret
= do_bsd_freebsd11_mknodat(arg1
, arg2
, arg3
, arg4
);
430 case TARGET_FREEBSD_NR_mknodat
: /* mknodat(2) */
431 ret
= do_bsd_mknodat(cpu_env
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
434 case TARGET_FREEBSD_NR_chown
: /* chown(2) */
435 ret
= do_bsd_chown(arg1
, arg2
, arg3
);
438 case TARGET_FREEBSD_NR_fchown
: /* fchown(2) */
439 ret
= do_bsd_fchown(arg1
, arg2
, arg3
);
442 case TARGET_FREEBSD_NR_lchown
: /* lchown(2) */
443 ret
= do_bsd_lchown(arg1
, arg2
, arg3
);
446 case TARGET_FREEBSD_NR_fchownat
: /* fchownat(2) */
447 ret
= do_bsd_fchownat(arg1
, arg2
, arg3
, arg4
, arg5
);
450 case TARGET_FREEBSD_NR_chflags
: /* chflags(2) */
451 ret
= do_bsd_chflags(arg1
, arg2
);
454 case TARGET_FREEBSD_NR_lchflags
: /* lchflags(2) */
455 ret
= do_bsd_lchflags(arg1
, arg2
);
458 case TARGET_FREEBSD_NR_fchflags
: /* fchflags(2) */
459 ret
= do_bsd_fchflags(arg1
, arg2
);
462 case TARGET_FREEBSD_NR_chroot
: /* chroot(2) */
463 ret
= do_bsd_chroot(arg1
);
466 case TARGET_FREEBSD_NR_flock
: /* flock(2) */
467 ret
= do_bsd_flock(arg1
, arg2
);
470 case TARGET_FREEBSD_NR_mkfifo
: /* mkfifo(2) */
471 ret
= do_bsd_mkfifo(arg1
, arg2
);
474 case TARGET_FREEBSD_NR_mkfifoat
: /* mkfifoat(2) */
475 ret
= do_bsd_mkfifoat(arg1
, arg2
, arg3
);
478 case TARGET_FREEBSD_NR_pathconf
: /* pathconf(2) */
479 ret
= do_bsd_pathconf(arg1
, arg2
);
482 case TARGET_FREEBSD_NR_lpathconf
: /* lpathconf(2) */
483 ret
= do_bsd_lpathconf(arg1
, arg2
);
486 case TARGET_FREEBSD_NR_fpathconf
: /* fpathconf(2) */
487 ret
= do_bsd_fpathconf(arg1
, arg2
);
490 case TARGET_FREEBSD_NR_undelete
: /* undelete(2) */
491 ret
= do_bsd_undelete(arg1
);
495 qemu_log_mask(LOG_UNIMP
, "Unsupported syscall: %d\n", num
);
496 ret
= -TARGET_ENOSYS
;
504 * do_freebsd_syscall() should always have a single exit point at the end so
505 * that actions, such as logging of syscall results, can be performed. This
506 * as a wrapper around freebsd_syscall() so that actually happens. Since
507 * that is a singleton, modern compilers will inline it anyway...
509 abi_long
do_freebsd_syscall(void *cpu_env
, int num
, abi_long arg1
,
510 abi_long arg2
, abi_long arg3
, abi_long arg4
,
511 abi_long arg5
, abi_long arg6
, abi_long arg7
,
514 CPUState
*cpu
= env_cpu(cpu_env
);
517 trace_guest_user_syscall(cpu
, num
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
, arg7
, arg8
);
519 print_freebsd_syscall(num
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
);
522 ret
= freebsd_syscall(cpu_env
, num
, arg1
, arg2
, arg3
, arg4
, arg5
, arg6
,
525 print_freebsd_syscall_ret(num
, ret
);
527 trace_guest_user_syscall_ret(cpu
, num
, ret
);
532 void syscall_init(void)