2005-04-23 22:25:41 +04:00
|
|
|
/*
|
|
|
|
* Arm "Angel" semihosting syscalls
|
2007-09-17 01:08:06 +04:00
|
|
|
*
|
2007-01-20 20:12:09 +03:00
|
|
|
* Copyright (c) 2005, 2007 CodeSourcery.
|
2019-05-14 14:08:39 +03:00
|
|
|
* Copyright (c) 2019 Linaro
|
2007-01-20 20:12:09 +03:00
|
|
|
* Written by Paul Brook.
|
2005-04-23 22:25:41 +04:00
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
2009-07-17 00:47:01 +04:00
|
|
|
* along with this program; if not, see <http://www.gnu.org/licenses/>.
|
2019-05-14 14:08:39 +03:00
|
|
|
*
|
|
|
|
* ARM Semihosting is documented in:
|
|
|
|
* Semihosting for AArch32 and AArch64 Release 2.0
|
|
|
|
* https://static.docs.arm.com/100863/0200/semihosting.pdf
|
2005-04-23 22:25:41 +04:00
|
|
|
*/
|
|
|
|
|
2015-12-07 19:23:44 +03:00
|
|
|
#include "qemu/osdep.h"
|
2005-04-23 22:25:41 +04:00
|
|
|
|
2007-01-20 20:12:09 +03:00
|
|
|
#include "cpu.h"
|
2019-05-13 16:43:57 +03:00
|
|
|
#include "hw/semihosting/semihost.h"
|
2019-05-14 13:07:15 +03:00
|
|
|
#include "hw/semihosting/console.h"
|
2019-05-14 14:15:38 +03:00
|
|
|
#include "qemu/log.h"
|
2007-01-20 20:12:09 +03:00
|
|
|
#ifdef CONFIG_USER_ONLY
|
2005-04-23 22:25:41 +04:00
|
|
|
#include "qemu.h"
|
|
|
|
|
|
|
|
#define ARM_ANGEL_HEAP_SIZE (128 * 1024 * 1024)
|
2007-01-20 20:12:09 +03:00
|
|
|
#else
|
2012-12-17 21:19:49 +04:00
|
|
|
#include "exec/gdbstub.h"
|
2016-03-20 20:16:19 +03:00
|
|
|
#include "qemu/cutils.h"
|
2007-01-20 20:12:09 +03:00
|
|
|
#endif
|
2005-04-23 22:25:41 +04:00
|
|
|
|
2012-04-28 09:07:47 +04:00
|
|
|
#define TARGET_SYS_OPEN 0x01
|
|
|
|
#define TARGET_SYS_CLOSE 0x02
|
|
|
|
#define TARGET_SYS_WRITEC 0x03
|
|
|
|
#define TARGET_SYS_WRITE0 0x04
|
|
|
|
#define TARGET_SYS_WRITE 0x05
|
|
|
|
#define TARGET_SYS_READ 0x06
|
|
|
|
#define TARGET_SYS_READC 0x07
|
|
|
|
#define TARGET_SYS_ISTTY 0x09
|
|
|
|
#define TARGET_SYS_SEEK 0x0a
|
|
|
|
#define TARGET_SYS_FLEN 0x0c
|
|
|
|
#define TARGET_SYS_TMPNAM 0x0d
|
|
|
|
#define TARGET_SYS_REMOVE 0x0e
|
|
|
|
#define TARGET_SYS_RENAME 0x0f
|
|
|
|
#define TARGET_SYS_CLOCK 0x10
|
|
|
|
#define TARGET_SYS_TIME 0x11
|
|
|
|
#define TARGET_SYS_SYSTEM 0x12
|
|
|
|
#define TARGET_SYS_ERRNO 0x13
|
|
|
|
#define TARGET_SYS_GET_CMDLINE 0x15
|
|
|
|
#define TARGET_SYS_HEAPINFO 0x16
|
|
|
|
#define TARGET_SYS_EXIT 0x18
|
2015-09-07 12:39:28 +03:00
|
|
|
#define TARGET_SYS_SYNCCACHE 0x19
|
2005-04-23 22:25:41 +04:00
|
|
|
|
2014-12-11 15:07:48 +03:00
|
|
|
/* ADP_Stopped_ApplicationExit is used for exit(0),
|
|
|
|
* anything else is implemented as exit(1) */
|
|
|
|
#define ADP_Stopped_ApplicationExit (0x20026)
|
|
|
|
|
2005-04-23 22:25:41 +04:00
|
|
|
#ifndef O_BINARY
|
|
|
|
#define O_BINARY 0
|
|
|
|
#endif
|
|
|
|
|
2007-01-28 06:10:55 +03:00
|
|
|
#define GDB_O_RDONLY 0x000
|
|
|
|
#define GDB_O_WRONLY 0x001
|
|
|
|
#define GDB_O_RDWR 0x002
|
|
|
|
#define GDB_O_APPEND 0x008
|
|
|
|
#define GDB_O_CREAT 0x200
|
|
|
|
#define GDB_O_TRUNC 0x400
|
|
|
|
#define GDB_O_BINARY 0
|
|
|
|
|
|
|
|
static int gdb_open_modeflags[12] = {
|
|
|
|
GDB_O_RDONLY,
|
|
|
|
GDB_O_RDONLY | GDB_O_BINARY,
|
|
|
|
GDB_O_RDWR,
|
|
|
|
GDB_O_RDWR | GDB_O_BINARY,
|
|
|
|
GDB_O_WRONLY | GDB_O_CREAT | GDB_O_TRUNC,
|
|
|
|
GDB_O_WRONLY | GDB_O_CREAT | GDB_O_TRUNC | GDB_O_BINARY,
|
|
|
|
GDB_O_RDWR | GDB_O_CREAT | GDB_O_TRUNC,
|
|
|
|
GDB_O_RDWR | GDB_O_CREAT | GDB_O_TRUNC | GDB_O_BINARY,
|
|
|
|
GDB_O_WRONLY | GDB_O_CREAT | GDB_O_APPEND,
|
|
|
|
GDB_O_WRONLY | GDB_O_CREAT | GDB_O_APPEND | GDB_O_BINARY,
|
|
|
|
GDB_O_RDWR | GDB_O_CREAT | GDB_O_APPEND,
|
|
|
|
GDB_O_RDWR | GDB_O_CREAT | GDB_O_APPEND | GDB_O_BINARY
|
|
|
|
};
|
|
|
|
|
|
|
|
static int open_modeflags[12] = {
|
2005-04-23 22:25:41 +04:00
|
|
|
O_RDONLY,
|
|
|
|
O_RDONLY | O_BINARY,
|
|
|
|
O_RDWR,
|
|
|
|
O_RDWR | O_BINARY,
|
|
|
|
O_WRONLY | O_CREAT | O_TRUNC,
|
|
|
|
O_WRONLY | O_CREAT | O_TRUNC | O_BINARY,
|
|
|
|
O_RDWR | O_CREAT | O_TRUNC,
|
|
|
|
O_RDWR | O_CREAT | O_TRUNC | O_BINARY,
|
|
|
|
O_WRONLY | O_CREAT | O_APPEND,
|
|
|
|
O_WRONLY | O_CREAT | O_APPEND | O_BINARY,
|
|
|
|
O_RDWR | O_CREAT | O_APPEND,
|
|
|
|
O_RDWR | O_CREAT | O_APPEND | O_BINARY
|
|
|
|
};
|
|
|
|
|
2019-09-16 17:15:33 +03:00
|
|
|
typedef enum GuestFDType {
|
|
|
|
GuestFDUnused = 0,
|
|
|
|
GuestFDHost = 1,
|
2019-09-16 17:15:36 +03:00
|
|
|
GuestFDGDB = 2,
|
2019-09-16 17:15:33 +03:00
|
|
|
} GuestFDType;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Guest file descriptors are integer indexes into an array of
|
|
|
|
* these structures (we will dynamically resize as necessary).
|
|
|
|
*/
|
|
|
|
typedef struct GuestFD {
|
|
|
|
GuestFDType type;
|
|
|
|
int hostfd;
|
|
|
|
} GuestFD;
|
|
|
|
|
|
|
|
static GArray *guestfd_array;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Allocate a new guest file descriptor and return it; if we
|
|
|
|
* couldn't allocate a new fd then return -1.
|
|
|
|
* This is a fairly simplistic implementation because we don't
|
|
|
|
* expect that most semihosting guest programs will make very
|
|
|
|
* heavy use of opening and closing fds.
|
|
|
|
*/
|
|
|
|
static int alloc_guestfd(void)
|
|
|
|
{
|
|
|
|
guint i;
|
|
|
|
|
|
|
|
if (!guestfd_array) {
|
|
|
|
/* New entries zero-initialized, i.e. type GuestFDUnused */
|
|
|
|
guestfd_array = g_array_new(FALSE, TRUE, sizeof(GuestFD));
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < guestfd_array->len; i++) {
|
|
|
|
GuestFD *gf = &g_array_index(guestfd_array, GuestFD, i);
|
|
|
|
|
|
|
|
if (gf->type == GuestFDUnused) {
|
|
|
|
return i;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* All elements already in use: expand the array */
|
|
|
|
g_array_set_size(guestfd_array, i + 1);
|
|
|
|
return i;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Look up the guestfd in the data structure; return NULL
|
|
|
|
* for out of bounds, but don't check whether the slot is unused.
|
|
|
|
* This is used internally by the other guestfd functions.
|
|
|
|
*/
|
|
|
|
static GuestFD *do_get_guestfd(int guestfd)
|
|
|
|
{
|
|
|
|
if (!guestfd_array) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (guestfd < 0 || guestfd >= guestfd_array->len) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return &g_array_index(guestfd_array, GuestFD, guestfd);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Associate the specified guest fd (which must have been
|
|
|
|
* allocated via alloc_fd() and not previously used) with
|
2019-09-16 17:15:36 +03:00
|
|
|
* the specified host/gdb fd.
|
2019-09-16 17:15:33 +03:00
|
|
|
*/
|
|
|
|
static void associate_guestfd(int guestfd, int hostfd)
|
|
|
|
{
|
|
|
|
GuestFD *gf = do_get_guestfd(guestfd);
|
|
|
|
|
|
|
|
assert(gf);
|
2019-09-16 17:15:36 +03:00
|
|
|
gf->type = use_gdb_syscalls() ? GuestFDGDB : GuestFDHost;
|
2019-09-16 17:15:33 +03:00
|
|
|
gf->hostfd = hostfd;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Deallocate the specified guest file descriptor. This doesn't
|
|
|
|
* close the host fd, it merely undoes the work of alloc_fd().
|
|
|
|
*/
|
|
|
|
static void dealloc_guestfd(int guestfd)
|
|
|
|
{
|
|
|
|
GuestFD *gf = do_get_guestfd(guestfd);
|
|
|
|
|
|
|
|
assert(gf);
|
|
|
|
gf->type = GuestFDUnused;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Given a guest file descriptor, get the associated struct.
|
|
|
|
* If the fd is not valid, return NULL. This is the function
|
|
|
|
* used by the various semihosting calls to validate a handle
|
|
|
|
* from the guest.
|
|
|
|
* Note: calling alloc_guestfd() or dealloc_guestfd() will
|
|
|
|
* invalidate any GuestFD* obtained by calling this function.
|
|
|
|
*/
|
|
|
|
static GuestFD *get_guestfd(int guestfd)
|
|
|
|
{
|
|
|
|
GuestFD *gf = do_get_guestfd(guestfd);
|
|
|
|
|
|
|
|
if (!gf || gf->type == GuestFDUnused) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
return gf;
|
|
|
|
}
|
|
|
|
|
2019-09-16 17:15:34 +03:00
|
|
|
/*
|
|
|
|
* The semihosting API has no concept of its errno being thread-safe,
|
|
|
|
* as the API design predates SMP CPUs and was intended as a simple
|
|
|
|
* real-hardware set of debug functionality. For QEMU, we make the
|
|
|
|
* errno be per-thread in linux-user mode; in softmmu it is a simple
|
|
|
|
* global, and we assume that the guest takes care of avoiding any races.
|
|
|
|
*/
|
|
|
|
#ifndef CONFIG_USER_ONLY
|
2019-09-16 17:15:30 +03:00
|
|
|
static target_ulong syscall_err;
|
|
|
|
|
2019-09-16 17:15:34 +03:00
|
|
|
#include "exec/softmmu-semi.h"
|
|
|
|
#endif
|
|
|
|
|
2012-03-14 04:38:23 +04:00
|
|
|
static inline uint32_t set_swi_errno(CPUARMState *env, uint32_t code)
|
2007-01-20 20:12:09 +03:00
|
|
|
{
|
2019-09-16 17:15:30 +03:00
|
|
|
if (code == (uint32_t)-1) {
|
2019-09-16 17:15:34 +03:00
|
|
|
#ifdef CONFIG_USER_ONLY
|
|
|
|
CPUState *cs = env_cpu(env);
|
|
|
|
TaskState *ts = cs->opaque;
|
|
|
|
|
|
|
|
ts->swi_errno = errno;
|
|
|
|
#else
|
2019-09-16 17:15:30 +03:00
|
|
|
syscall_err = errno;
|
2019-09-16 17:15:34 +03:00
|
|
|
#endif
|
2019-09-16 17:15:30 +03:00
|
|
|
}
|
2007-01-20 20:12:09 +03:00
|
|
|
return code;
|
|
|
|
}
|
|
|
|
|
2019-09-16 17:15:34 +03:00
|
|
|
static inline uint32_t get_swi_errno(CPUARMState *env)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_USER_ONLY
|
|
|
|
CPUState *cs = env_cpu(env);
|
|
|
|
TaskState *ts = cs->opaque;
|
|
|
|
|
|
|
|
return ts->swi_errno;
|
|
|
|
#else
|
|
|
|
return syscall_err;
|
2007-01-20 20:12:09 +03:00
|
|
|
#endif
|
2019-09-16 17:15:34 +03:00
|
|
|
}
|
2005-04-23 22:25:41 +04:00
|
|
|
|
2007-01-28 06:10:55 +03:00
|
|
|
static target_ulong arm_semi_syscall_len;
|
|
|
|
|
2013-06-27 19:45:01 +04:00
|
|
|
static void arm_semi_cb(CPUState *cs, target_ulong ret, target_ulong err)
|
2007-01-28 06:10:55 +03:00
|
|
|
{
|
2013-06-27 19:45:01 +04:00
|
|
|
ARMCPU *cpu = ARM_CPU(cs);
|
|
|
|
CPUARMState *env = &cpu->env;
|
2015-09-07 12:39:28 +03:00
|
|
|
target_ulong reg0 = is_a64(env) ? env->xregs[0] : env->regs[0];
|
2007-06-09 18:44:00 +04:00
|
|
|
|
2007-01-28 06:10:55 +03:00
|
|
|
if (ret == (target_ulong)-1) {
|
2019-09-16 17:15:35 +03:00
|
|
|
errno = err;
|
|
|
|
set_swi_errno(env, -1);
|
2015-09-07 12:39:27 +03:00
|
|
|
reg0 = ret;
|
2007-01-28 06:10:55 +03:00
|
|
|
} else {
|
|
|
|
/* Fixup syscalls that use nonstardard return conventions. */
|
2015-09-07 12:39:27 +03:00
|
|
|
switch (reg0) {
|
2012-04-28 09:07:47 +04:00
|
|
|
case TARGET_SYS_WRITE:
|
|
|
|
case TARGET_SYS_READ:
|
2015-09-07 12:39:27 +03:00
|
|
|
reg0 = arm_semi_syscall_len - ret;
|
2007-01-28 06:10:55 +03:00
|
|
|
break;
|
2012-04-28 09:07:47 +04:00
|
|
|
case TARGET_SYS_SEEK:
|
2015-09-07 12:39:27 +03:00
|
|
|
reg0 = 0;
|
2007-01-28 06:10:55 +03:00
|
|
|
break;
|
|
|
|
default:
|
2015-09-07 12:39:27 +03:00
|
|
|
reg0 = ret;
|
2007-01-28 06:10:55 +03:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2015-09-07 12:39:28 +03:00
|
|
|
if (is_a64(env)) {
|
|
|
|
env->xregs[0] = reg0;
|
|
|
|
} else {
|
|
|
|
env->regs[0] = reg0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static target_ulong arm_flen_buf(ARMCPU *cpu)
|
|
|
|
{
|
|
|
|
/* Return an address in target memory of 64 bytes where the remote
|
|
|
|
* gdb should write its stat struct. (The format of this structure
|
|
|
|
* is defined by GDB's remote protocol and is not target-specific.)
|
|
|
|
* We put this on the guest's stack just below SP.
|
|
|
|
*/
|
|
|
|
CPUARMState *env = &cpu->env;
|
|
|
|
target_ulong sp;
|
|
|
|
|
|
|
|
if (is_a64(env)) {
|
|
|
|
sp = env->xregs[31];
|
|
|
|
} else {
|
|
|
|
sp = env->regs[13];
|
|
|
|
}
|
|
|
|
|
|
|
|
return sp - 64;
|
2007-01-28 06:10:55 +03:00
|
|
|
}
|
|
|
|
|
2013-06-27 19:45:01 +04:00
|
|
|
static void arm_semi_flen_cb(CPUState *cs, target_ulong ret, target_ulong err)
|
2007-06-09 18:44:00 +04:00
|
|
|
{
|
2013-06-27 19:45:01 +04:00
|
|
|
ARMCPU *cpu = ARM_CPU(cs);
|
|
|
|
CPUARMState *env = &cpu->env;
|
2007-06-09 18:44:00 +04:00
|
|
|
/* The size is always stored in big-endian order, extract
|
|
|
|
the value. We assume the size always fit in 32 bits. */
|
|
|
|
uint32_t size;
|
2015-09-07 12:39:28 +03:00
|
|
|
cpu_memory_rw_debug(cs, arm_flen_buf(cpu) + 32, (uint8_t *)&size, 4, 0);
|
|
|
|
size = be32_to_cpu(size);
|
|
|
|
if (is_a64(env)) {
|
|
|
|
env->xregs[0] = size;
|
|
|
|
} else {
|
|
|
|
env->regs[0] = size;
|
|
|
|
}
|
2019-09-16 17:15:35 +03:00
|
|
|
errno = err;
|
|
|
|
set_swi_errno(env, -1);
|
2007-06-09 18:44:00 +04:00
|
|
|
}
|
|
|
|
|
2019-09-16 17:15:33 +03:00
|
|
|
static int arm_semi_open_guestfd;
|
|
|
|
|
|
|
|
static void arm_semi_open_cb(CPUState *cs, target_ulong ret, target_ulong err)
|
|
|
|
{
|
|
|
|
ARMCPU *cpu = ARM_CPU(cs);
|
|
|
|
CPUARMState *env = &cpu->env;
|
|
|
|
if (ret == (target_ulong)-1) {
|
2019-09-16 17:15:35 +03:00
|
|
|
errno = err;
|
|
|
|
set_swi_errno(env, -1);
|
2019-09-16 17:15:33 +03:00
|
|
|
dealloc_guestfd(arm_semi_open_guestfd);
|
|
|
|
} else {
|
|
|
|
associate_guestfd(arm_semi_open_guestfd, ret);
|
|
|
|
ret = arm_semi_open_guestfd;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (is_a64(env)) {
|
|
|
|
env->xregs[0] = ret;
|
|
|
|
} else {
|
|
|
|
env->regs[0] = ret;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-09-07 12:39:27 +03:00
|
|
|
static target_ulong arm_gdb_syscall(ARMCPU *cpu, gdb_syscall_complete_cb cb,
|
|
|
|
const char *fmt, ...)
|
|
|
|
{
|
|
|
|
va_list va;
|
|
|
|
CPUARMState *env = &cpu->env;
|
|
|
|
|
|
|
|
va_start(va, fmt);
|
|
|
|
gdb_do_syscallv(cb, fmt, va);
|
|
|
|
va_end(va);
|
|
|
|
|
2019-09-16 17:15:32 +03:00
|
|
|
/*
|
|
|
|
* FIXME: in softmmu mode, the gdbstub will schedule our callback
|
|
|
|
* to occur, but will not actually call it to complete the syscall
|
|
|
|
* until after this function has returned and we are back in the
|
|
|
|
* CPU main loop. Therefore callers to this function must not
|
|
|
|
* do anything with its return value, because it is not necessarily
|
|
|
|
* the result of the syscall, but could just be the old value of X0.
|
|
|
|
* The only thing safe to do with this is that the callers of
|
|
|
|
* do_arm_semihosting() will write it straight back into X0.
|
|
|
|
* (In linux-user mode, the callback will have happened before
|
|
|
|
* gdb_do_syscallv() returns.)
|
|
|
|
*
|
|
|
|
* We should tidy this up so neither this function nor
|
|
|
|
* do_arm_semihosting() return a value, so the mistake of
|
|
|
|
* doing something with the return value is not possible to make.
|
2015-09-07 12:39:27 +03:00
|
|
|
*/
|
|
|
|
|
2015-09-07 12:39:28 +03:00
|
|
|
return is_a64(env) ? env->xregs[0] : env->regs[0];
|
2015-09-07 12:39:27 +03:00
|
|
|
}
|
|
|
|
|
2019-09-16 17:15:36 +03:00
|
|
|
/*
|
|
|
|
* Types for functions implementing various semihosting calls
|
|
|
|
* for specific types of guest file descriptor. These must all
|
|
|
|
* do the work and return the required return value for the guest,
|
|
|
|
* setting the guest errno if appropriate.
|
|
|
|
*/
|
|
|
|
typedef uint32_t sys_closefn(ARMCPU *cpu, GuestFD *gf);
|
|
|
|
|
|
|
|
static uint32_t host_closefn(ARMCPU *cpu, GuestFD *gf)
|
|
|
|
{
|
|
|
|
CPUARMState *env = &cpu->env;
|
|
|
|
|
|
|
|
return set_swi_errno(env, close(gf->hostfd));
|
|
|
|
}
|
|
|
|
|
|
|
|
static uint32_t gdb_closefn(ARMCPU *cpu, GuestFD *gf)
|
|
|
|
{
|
|
|
|
return arm_gdb_syscall(cpu, arm_semi_cb, "close,%x", gf->hostfd);
|
|
|
|
}
|
|
|
|
|
|
|
|
typedef struct GuestFDFunctions {
|
|
|
|
sys_closefn *closefn;
|
|
|
|
} GuestFDFunctions;
|
|
|
|
|
|
|
|
static const GuestFDFunctions guestfd_fns[] = {
|
|
|
|
[GuestFDHost] = {
|
|
|
|
.closefn = host_closefn,
|
|
|
|
},
|
|
|
|
[GuestFDGDB] = {
|
|
|
|
.closefn = gdb_closefn,
|
|
|
|
},
|
|
|
|
};
|
|
|
|
|
2012-10-14 13:52:27 +04:00
|
|
|
/* Read the input value from the argument block; fail the semihosting
|
|
|
|
* call if the memory read fails.
|
|
|
|
*/
|
|
|
|
#define GET_ARG(n) do { \
|
2015-09-07 12:39:28 +03:00
|
|
|
if (is_a64(env)) { \
|
|
|
|
if (get_user_u64(arg ## n, args + (n) * 8)) { \
|
2019-09-16 17:15:31 +03:00
|
|
|
errno = EFAULT; \
|
2019-09-16 17:15:34 +03:00
|
|
|
return set_swi_errno(env, -1); \
|
2015-09-07 12:39:28 +03:00
|
|
|
} \
|
|
|
|
} else { \
|
|
|
|
if (get_user_u32(arg ## n, args + (n) * 4)) { \
|
2019-09-16 17:15:31 +03:00
|
|
|
errno = EFAULT; \
|
2019-09-16 17:15:34 +03:00
|
|
|
return set_swi_errno(env, -1); \
|
2015-09-07 12:39:28 +03:00
|
|
|
} \
|
2012-10-14 13:52:27 +04:00
|
|
|
} \
|
|
|
|
} while (0)
|
|
|
|
|
2015-09-07 12:39:28 +03:00
|
|
|
#define SET_ARG(n, val) \
|
|
|
|
(is_a64(env) ? \
|
|
|
|
put_user_u64(val, args + (n) * 8) : \
|
|
|
|
put_user_u32(val, args + (n) * 4))
|
|
|
|
|
2019-05-14 14:08:39 +03:00
|
|
|
/*
|
|
|
|
* Do a semihosting call.
|
|
|
|
*
|
|
|
|
* The specification always says that the "return register" either
|
|
|
|
* returns a specific value or is corrupted, so we don't need to
|
|
|
|
* report to our caller whether we are returning a value or trying to
|
|
|
|
* leave the register unchanged. We use 0xdeadbeef as the return value
|
|
|
|
* when there isn't a defined return value for the call.
|
|
|
|
*/
|
2015-09-07 12:39:28 +03:00
|
|
|
target_ulong do_arm_semihosting(CPUARMState *env)
|
2005-04-23 22:25:41 +04:00
|
|
|
{
|
2019-03-23 03:41:14 +03:00
|
|
|
ARMCPU *cpu = env_archcpu(env);
|
|
|
|
CPUState *cs = env_cpu(env);
|
2006-03-25 22:31:22 +03:00
|
|
|
target_ulong args;
|
2012-10-14 13:52:27 +04:00
|
|
|
target_ulong arg0, arg1, arg2, arg3;
|
2005-04-23 22:25:41 +04:00
|
|
|
char * s;
|
|
|
|
int nr;
|
|
|
|
uint32_t ret;
|
2007-01-20 20:12:09 +03:00
|
|
|
uint32_t len;
|
2019-09-16 17:15:33 +03:00
|
|
|
GuestFD *gf;
|
2005-04-23 22:25:41 +04:00
|
|
|
|
2015-09-07 12:39:28 +03:00
|
|
|
if (is_a64(env)) {
|
|
|
|
/* Note that the syscall number is in W0, not X0 */
|
|
|
|
nr = env->xregs[0] & 0xffffffffU;
|
|
|
|
args = env->xregs[1];
|
|
|
|
} else {
|
|
|
|
nr = env->regs[0];
|
|
|
|
args = env->regs[1];
|
|
|
|
}
|
|
|
|
|
2005-04-23 22:25:41 +04:00
|
|
|
switch (nr) {
|
2012-04-28 09:07:47 +04:00
|
|
|
case TARGET_SYS_OPEN:
|
2019-09-16 17:15:33 +03:00
|
|
|
{
|
|
|
|
int guestfd;
|
|
|
|
|
2012-10-14 13:52:27 +04:00
|
|
|
GET_ARG(0);
|
|
|
|
GET_ARG(1);
|
|
|
|
GET_ARG(2);
|
|
|
|
s = lock_user_string(arg0);
|
|
|
|
if (!s) {
|
2019-09-16 17:15:31 +03:00
|
|
|
errno = EFAULT;
|
2019-09-16 17:15:34 +03:00
|
|
|
return set_swi_errno(env, -1);
|
2012-10-14 13:52:27 +04:00
|
|
|
}
|
|
|
|
if (arg1 >= 12) {
|
|
|
|
unlock_user(s, arg0, 0);
|
2019-09-16 17:15:31 +03:00
|
|
|
errno = EINVAL;
|
2019-09-16 17:15:34 +03:00
|
|
|
return set_swi_errno(env, -1);
|
2012-08-22 15:55:55 +04:00
|
|
|
}
|
2019-09-16 17:15:33 +03:00
|
|
|
|
|
|
|
guestfd = alloc_guestfd();
|
|
|
|
if (guestfd < 0) {
|
|
|
|
unlock_user(s, arg0, 0);
|
|
|
|
errno = EMFILE;
|
2019-09-16 17:15:34 +03:00
|
|
|
return set_swi_errno(env, -1);
|
2019-09-16 17:15:33 +03:00
|
|
|
}
|
|
|
|
|
2005-04-23 22:25:41 +04:00
|
|
|
if (strcmp(s, ":tt") == 0) {
|
2012-10-14 13:52:27 +04:00
|
|
|
int result_fileno = arg1 < 4 ? STDIN_FILENO : STDOUT_FILENO;
|
2019-09-16 17:15:33 +03:00
|
|
|
associate_guestfd(guestfd, result_fileno);
|
2012-10-14 13:52:27 +04:00
|
|
|
unlock_user(s, arg0, 0);
|
2019-09-16 17:15:33 +03:00
|
|
|
return guestfd;
|
2005-04-23 22:25:41 +04:00
|
|
|
}
|
2007-01-28 06:10:55 +03:00
|
|
|
if (use_gdb_syscalls()) {
|
2019-09-16 17:15:33 +03:00
|
|
|
arm_semi_open_guestfd = guestfd;
|
|
|
|
ret = arm_gdb_syscall(cpu, arm_semi_open_cb, "open,%s,%x,1a4", arg0,
|
2015-09-07 12:39:27 +03:00
|
|
|
(int)arg2+1, gdb_open_modeflags[arg1]);
|
2007-01-28 06:10:55 +03:00
|
|
|
} else {
|
2019-09-16 17:15:34 +03:00
|
|
|
ret = set_swi_errno(env, open(s, open_modeflags[arg1], 0644));
|
2019-09-16 17:15:33 +03:00
|
|
|
if (ret == (uint32_t)-1) {
|
|
|
|
dealloc_guestfd(guestfd);
|
|
|
|
} else {
|
|
|
|
associate_guestfd(guestfd, ret);
|
|
|
|
ret = guestfd;
|
|
|
|
}
|
2007-01-28 06:10:55 +03:00
|
|
|
}
|
2012-10-14 13:52:27 +04:00
|
|
|
unlock_user(s, arg0, 0);
|
2007-01-20 20:12:09 +03:00
|
|
|
return ret;
|
2019-09-16 17:15:33 +03:00
|
|
|
}
|
2012-04-28 09:07:47 +04:00
|
|
|
case TARGET_SYS_CLOSE:
|
2012-10-14 13:52:27 +04:00
|
|
|
GET_ARG(0);
|
2019-09-16 17:15:33 +03:00
|
|
|
|
|
|
|
gf = get_guestfd(arg0);
|
|
|
|
if (!gf) {
|
|
|
|
errno = EBADF;
|
2019-09-16 17:15:34 +03:00
|
|
|
return set_swi_errno(env, -1);
|
2019-09-16 17:15:33 +03:00
|
|
|
}
|
|
|
|
|
2019-09-16 17:15:36 +03:00
|
|
|
ret = guestfd_fns[gf->type].closefn(cpu, gf);
|
2019-09-16 17:15:33 +03:00
|
|
|
dealloc_guestfd(arg0);
|
|
|
|
return ret;
|
2012-04-28 09:07:47 +04:00
|
|
|
case TARGET_SYS_WRITEC:
|
2019-05-30 17:35:14 +03:00
|
|
|
qemu_semihosting_console_outc(env, args);
|
2019-05-14 13:07:15 +03:00
|
|
|
return 0xdeadbeef;
|
2012-04-28 09:07:47 +04:00
|
|
|
case TARGET_SYS_WRITE0:
|
2019-05-30 17:35:14 +03:00
|
|
|
return qemu_semihosting_console_outs(env, args);
|
2012-04-28 09:07:47 +04:00
|
|
|
case TARGET_SYS_WRITE:
|
2012-10-14 13:52:27 +04:00
|
|
|
GET_ARG(0);
|
|
|
|
GET_ARG(1);
|
|
|
|
GET_ARG(2);
|
|
|
|
len = arg2;
|
2019-09-16 17:15:33 +03:00
|
|
|
|
|
|
|
gf = get_guestfd(arg0);
|
|
|
|
if (!gf) {
|
|
|
|
errno = EBADF;
|
2019-09-16 17:15:34 +03:00
|
|
|
return set_swi_errno(env, -1);
|
2019-09-16 17:15:33 +03:00
|
|
|
}
|
|
|
|
|
2007-01-28 06:10:55 +03:00
|
|
|
if (use_gdb_syscalls()) {
|
|
|
|
arm_semi_syscall_len = len;
|
2015-09-07 12:39:27 +03:00
|
|
|
return arm_gdb_syscall(cpu, arm_semi_cb, "write,%x,%x,%x",
|
2019-09-16 17:15:33 +03:00
|
|
|
gf->hostfd, arg1, len);
|
2007-01-28 06:10:55 +03:00
|
|
|
} else {
|
2012-10-14 13:52:27 +04:00
|
|
|
s = lock_user(VERIFY_READ, arg1, len, 1);
|
|
|
|
if (!s) {
|
2019-05-14 14:21:45 +03:00
|
|
|
/* Return bytes not written on error */
|
|
|
|
return len;
|
2012-10-14 13:52:27 +04:00
|
|
|
}
|
2019-09-16 17:15:34 +03:00
|
|
|
ret = set_swi_errno(env, write(gf->hostfd, s, len));
|
2012-10-14 13:52:27 +04:00
|
|
|
unlock_user(s, arg1, 0);
|
2019-05-14 14:21:45 +03:00
|
|
|
if (ret == (uint32_t)-1) {
|
|
|
|
ret = 0;
|
|
|
|
}
|
|
|
|
/* Return bytes not written */
|
2007-01-28 06:10:55 +03:00
|
|
|
return len - ret;
|
|
|
|
}
|
2012-04-28 09:07:47 +04:00
|
|
|
case TARGET_SYS_READ:
|
2012-10-14 13:52:27 +04:00
|
|
|
GET_ARG(0);
|
|
|
|
GET_ARG(1);
|
|
|
|
GET_ARG(2);
|
|
|
|
len = arg2;
|
2019-09-16 17:15:33 +03:00
|
|
|
|
|
|
|
gf = get_guestfd(arg0);
|
|
|
|
if (!gf) {
|
|
|
|
errno = EBADF;
|
2019-09-16 17:15:34 +03:00
|
|
|
return set_swi_errno(env, -1);
|
2019-09-16 17:15:33 +03:00
|
|
|
}
|
|
|
|
|
2007-01-28 06:10:55 +03:00
|
|
|
if (use_gdb_syscalls()) {
|
|
|
|
arm_semi_syscall_len = len;
|
2015-09-07 12:39:27 +03:00
|
|
|
return arm_gdb_syscall(cpu, arm_semi_cb, "read,%x,%x,%x",
|
2019-09-16 17:15:33 +03:00
|
|
|
gf->hostfd, arg1, len);
|
2007-01-28 06:10:55 +03:00
|
|
|
} else {
|
2012-10-14 13:52:27 +04:00
|
|
|
s = lock_user(VERIFY_WRITE, arg1, len, 0);
|
|
|
|
if (!s) {
|
2019-05-14 14:21:45 +03:00
|
|
|
/* return bytes not read */
|
|
|
|
return len;
|
2012-10-14 13:52:27 +04:00
|
|
|
}
|
|
|
|
do {
|
2019-09-16 17:15:34 +03:00
|
|
|
ret = set_swi_errno(env, read(gf->hostfd, s, len));
|
2012-10-14 13:52:27 +04:00
|
|
|
} while (ret == -1 && errno == EINTR);
|
|
|
|
unlock_user(s, arg1, len);
|
2019-05-14 14:21:45 +03:00
|
|
|
if (ret == (uint32_t)-1) {
|
|
|
|
ret = 0;
|
|
|
|
}
|
|
|
|
/* Return bytes not read */
|
2007-01-28 06:10:55 +03:00
|
|
|
return len - ret;
|
|
|
|
}
|
2012-04-28 09:07:47 +04:00
|
|
|
case TARGET_SYS_READC:
|
2019-05-14 14:15:38 +03:00
|
|
|
qemu_log_mask(LOG_UNIMP, "%s: SYS_READC not implemented", __func__);
|
2005-04-23 22:25:41 +04:00
|
|
|
return 0;
|
2012-04-28 09:07:47 +04:00
|
|
|
case TARGET_SYS_ISTTY:
|
2012-10-14 13:52:27 +04:00
|
|
|
GET_ARG(0);
|
2019-09-16 17:15:33 +03:00
|
|
|
|
|
|
|
gf = get_guestfd(arg0);
|
|
|
|
if (!gf) {
|
|
|
|
errno = EBADF;
|
2019-09-16 17:15:34 +03:00
|
|
|
return set_swi_errno(env, -1);
|
2019-09-16 17:15:33 +03:00
|
|
|
}
|
|
|
|
|
2007-01-28 06:10:55 +03:00
|
|
|
if (use_gdb_syscalls()) {
|
2019-09-16 17:15:33 +03:00
|
|
|
return arm_gdb_syscall(cpu, arm_semi_cb, "isatty,%x", gf->hostfd);
|
2007-01-28 06:10:55 +03:00
|
|
|
} else {
|
2019-09-16 17:15:33 +03:00
|
|
|
return isatty(gf->hostfd);
|
2007-01-28 06:10:55 +03:00
|
|
|
}
|
2012-04-28 09:07:47 +04:00
|
|
|
case TARGET_SYS_SEEK:
|
2012-10-14 13:52:27 +04:00
|
|
|
GET_ARG(0);
|
|
|
|
GET_ARG(1);
|
2019-09-16 17:15:33 +03:00
|
|
|
|
|
|
|
gf = get_guestfd(arg0);
|
|
|
|
if (!gf) {
|
|
|
|
errno = EBADF;
|
2019-09-16 17:15:34 +03:00
|
|
|
return set_swi_errno(env, -1);
|
2019-09-16 17:15:33 +03:00
|
|
|
}
|
|
|
|
|
2007-01-28 06:10:55 +03:00
|
|
|
if (use_gdb_syscalls()) {
|
2015-09-07 12:39:27 +03:00
|
|
|
return arm_gdb_syscall(cpu, arm_semi_cb, "lseek,%x,%x,0",
|
2019-09-16 17:15:33 +03:00
|
|
|
gf->hostfd, arg1);
|
2007-01-28 06:10:55 +03:00
|
|
|
} else {
|
2019-09-16 17:15:34 +03:00
|
|
|
ret = set_swi_errno(env, lseek(gf->hostfd, arg1, SEEK_SET));
|
2007-01-28 06:10:55 +03:00
|
|
|
if (ret == (uint32_t)-1)
|
|
|
|
return -1;
|
|
|
|
return 0;
|
|
|
|
}
|
2012-04-28 09:07:47 +04:00
|
|
|
case TARGET_SYS_FLEN:
|
2012-10-14 13:52:27 +04:00
|
|
|
GET_ARG(0);
|
2019-09-16 17:15:33 +03:00
|
|
|
|
|
|
|
gf = get_guestfd(arg0);
|
|
|
|
if (!gf) {
|
|
|
|
errno = EBADF;
|
2019-09-16 17:15:34 +03:00
|
|
|
return set_swi_errno(env, -1);
|
2019-09-16 17:15:33 +03:00
|
|
|
}
|
|
|
|
|
2007-01-28 06:10:55 +03:00
|
|
|
if (use_gdb_syscalls()) {
|
2015-09-07 12:39:27 +03:00
|
|
|
return arm_gdb_syscall(cpu, arm_semi_flen_cb, "fstat,%x,%x",
|
2019-09-16 17:15:33 +03:00
|
|
|
gf->hostfd, arm_flen_buf(cpu));
|
2007-01-28 06:10:55 +03:00
|
|
|
} else {
|
2005-04-23 22:25:41 +04:00
|
|
|
struct stat buf;
|
2019-09-16 17:15:34 +03:00
|
|
|
ret = set_swi_errno(env, fstat(gf->hostfd, &buf));
|
2005-04-23 22:25:41 +04:00
|
|
|
if (ret == (uint32_t)-1)
|
|
|
|
return -1;
|
|
|
|
return buf.st_size;
|
|
|
|
}
|
2012-04-28 09:07:47 +04:00
|
|
|
case TARGET_SYS_TMPNAM:
|
2019-05-14 14:15:38 +03:00
|
|
|
qemu_log_mask(LOG_UNIMP, "%s: SYS_TMPNAM not implemented", __func__);
|
2005-04-23 22:25:41 +04:00
|
|
|
return -1;
|
2012-04-28 09:07:47 +04:00
|
|
|
case TARGET_SYS_REMOVE:
|
2012-10-14 13:52:27 +04:00
|
|
|
GET_ARG(0);
|
|
|
|
GET_ARG(1);
|
2007-01-28 06:10:55 +03:00
|
|
|
if (use_gdb_syscalls()) {
|
2015-09-07 12:39:27 +03:00
|
|
|
ret = arm_gdb_syscall(cpu, arm_semi_cb, "unlink,%s",
|
|
|
|
arg0, (int)arg1+1);
|
2007-01-28 06:10:55 +03:00
|
|
|
} else {
|
2012-10-14 13:52:27 +04:00
|
|
|
s = lock_user_string(arg0);
|
|
|
|
if (!s) {
|
2019-09-16 17:15:31 +03:00
|
|
|
errno = EFAULT;
|
2019-09-16 17:15:34 +03:00
|
|
|
return set_swi_errno(env, -1);
|
2012-10-14 13:52:27 +04:00
|
|
|
}
|
2019-09-16 17:15:34 +03:00
|
|
|
ret = set_swi_errno(env, remove(s));
|
2012-10-14 13:52:27 +04:00
|
|
|
unlock_user(s, arg0, 0);
|
2007-01-28 06:10:55 +03:00
|
|
|
}
|
2007-01-20 20:12:09 +03:00
|
|
|
return ret;
|
2012-04-28 09:07:47 +04:00
|
|
|
case TARGET_SYS_RENAME:
|
2012-10-14 13:52:27 +04:00
|
|
|
GET_ARG(0);
|
|
|
|
GET_ARG(1);
|
|
|
|
GET_ARG(2);
|
|
|
|
GET_ARG(3);
|
2007-01-28 06:10:55 +03:00
|
|
|
if (use_gdb_syscalls()) {
|
2015-09-07 12:39:27 +03:00
|
|
|
return arm_gdb_syscall(cpu, arm_semi_cb, "rename,%s,%s",
|
|
|
|
arg0, (int)arg1+1, arg2, (int)arg3+1);
|
2007-01-28 06:10:55 +03:00
|
|
|
} else {
|
2007-01-20 20:12:09 +03:00
|
|
|
char *s2;
|
2012-10-14 13:52:27 +04:00
|
|
|
s = lock_user_string(arg0);
|
|
|
|
s2 = lock_user_string(arg2);
|
2019-09-16 17:15:31 +03:00
|
|
|
if (!s || !s2) {
|
|
|
|
errno = EFAULT;
|
2019-09-16 17:15:34 +03:00
|
|
|
ret = set_swi_errno(env, -1);
|
2019-09-16 17:15:31 +03:00
|
|
|
} else {
|
2019-09-16 17:15:34 +03:00
|
|
|
ret = set_swi_errno(env, rename(s, s2));
|
2019-09-16 17:15:31 +03:00
|
|
|
}
|
2007-11-11 17:26:47 +03:00
|
|
|
if (s2)
|
2012-10-14 13:52:27 +04:00
|
|
|
unlock_user(s2, arg2, 0);
|
2007-11-11 17:26:47 +03:00
|
|
|
if (s)
|
2012-10-14 13:52:27 +04:00
|
|
|
unlock_user(s, arg0, 0);
|
2007-01-20 20:12:09 +03:00
|
|
|
return ret;
|
|
|
|
}
|
2012-04-28 09:07:47 +04:00
|
|
|
case TARGET_SYS_CLOCK:
|
2005-04-23 22:25:41 +04:00
|
|
|
return clock() / (CLOCKS_PER_SEC / 100);
|
2012-04-28 09:07:47 +04:00
|
|
|
case TARGET_SYS_TIME:
|
2019-09-16 17:15:34 +03:00
|
|
|
return set_swi_errno(env, time(NULL));
|
2012-04-28 09:07:47 +04:00
|
|
|
case TARGET_SYS_SYSTEM:
|
2012-10-14 13:52:27 +04:00
|
|
|
GET_ARG(0);
|
|
|
|
GET_ARG(1);
|
2007-01-28 06:10:55 +03:00
|
|
|
if (use_gdb_syscalls()) {
|
2015-09-07 12:39:27 +03:00
|
|
|
return arm_gdb_syscall(cpu, arm_semi_cb, "system,%s",
|
|
|
|
arg0, (int)arg1+1);
|
2007-01-28 06:10:55 +03:00
|
|
|
} else {
|
2012-10-14 13:52:27 +04:00
|
|
|
s = lock_user_string(arg0);
|
|
|
|
if (!s) {
|
2019-09-16 17:15:31 +03:00
|
|
|
errno = EFAULT;
|
2019-09-16 17:15:34 +03:00
|
|
|
return set_swi_errno(env, -1);
|
2012-10-14 13:52:27 +04:00
|
|
|
}
|
2019-09-16 17:15:34 +03:00
|
|
|
ret = set_swi_errno(env, system(s));
|
2012-10-14 13:52:27 +04:00
|
|
|
unlock_user(s, arg0, 0);
|
2008-07-01 20:40:04 +04:00
|
|
|
return ret;
|
2007-01-28 06:10:55 +03:00
|
|
|
}
|
2012-04-28 09:07:47 +04:00
|
|
|
case TARGET_SYS_ERRNO:
|
2019-09-16 17:15:34 +03:00
|
|
|
return get_swi_errno(env);
|
2012-04-28 09:07:47 +04:00
|
|
|
case TARGET_SYS_GET_CMDLINE:
|
2006-11-19 23:29:35 +03:00
|
|
|
{
|
2011-06-29 14:49:41 +04:00
|
|
|
/* Build a command-line from the original argv.
|
|
|
|
*
|
|
|
|
* The inputs are:
|
2012-10-14 13:52:27 +04:00
|
|
|
* * arg0, pointer to a buffer of at least the size
|
|
|
|
* specified in arg1.
|
|
|
|
* * arg1, size of the buffer pointed to by arg0 in
|
2011-06-29 14:49:41 +04:00
|
|
|
* bytes.
|
|
|
|
*
|
|
|
|
* The outputs are:
|
2012-10-14 13:52:27 +04:00
|
|
|
* * arg0, pointer to null-terminated string of the
|
2011-06-29 14:49:41 +04:00
|
|
|
* command line.
|
2012-10-14 13:52:27 +04:00
|
|
|
* * arg1, length of the string pointed to by arg0.
|
2011-06-29 14:49:41 +04:00
|
|
|
*/
|
2007-11-11 17:26:47 +03:00
|
|
|
|
2011-06-29 14:49:41 +04:00
|
|
|
char *output_buffer;
|
2012-10-14 13:52:27 +04:00
|
|
|
size_t input_size;
|
2011-06-29 14:49:41 +04:00
|
|
|
size_t output_size;
|
|
|
|
int status = 0;
|
2015-06-26 16:22:36 +03:00
|
|
|
#if !defined(CONFIG_USER_ONLY)
|
|
|
|
const char *cmdline;
|
2019-09-16 17:15:34 +03:00
|
|
|
#else
|
|
|
|
TaskState *ts = cs->opaque;
|
2015-06-26 16:22:36 +03:00
|
|
|
#endif
|
2012-10-14 13:52:27 +04:00
|
|
|
GET_ARG(0);
|
|
|
|
GET_ARG(1);
|
|
|
|
input_size = arg1;
|
2011-06-29 14:49:41 +04:00
|
|
|
/* Compute the size of the output string. */
|
|
|
|
#if !defined(CONFIG_USER_ONLY)
|
2015-06-26 16:22:36 +03:00
|
|
|
cmdline = semihosting_get_cmdline();
|
|
|
|
if (cmdline == NULL) {
|
|
|
|
cmdline = ""; /* Default to an empty line. */
|
|
|
|
}
|
|
|
|
output_size = strlen(cmdline) + 1; /* Count terminating 0. */
|
2011-06-29 14:49:41 +04:00
|
|
|
#else
|
|
|
|
unsigned int i;
|
2006-11-19 23:29:35 +03:00
|
|
|
|
2011-06-29 14:49:41 +04:00
|
|
|
output_size = ts->info->arg_end - ts->info->arg_start;
|
|
|
|
if (!output_size) {
|
2019-05-14 14:08:39 +03:00
|
|
|
/*
|
|
|
|
* We special-case the "empty command line" case (argc==0).
|
|
|
|
* Just provide the terminating 0.
|
|
|
|
*/
|
2011-06-29 14:49:41 +04:00
|
|
|
output_size = 1;
|
|
|
|
}
|
|
|
|
#endif
|
2006-11-19 23:29:35 +03:00
|
|
|
|
2011-06-29 14:49:41 +04:00
|
|
|
if (output_size > input_size) {
|
2019-05-14 14:08:39 +03:00
|
|
|
/* Not enough space to store command-line arguments. */
|
2019-09-16 17:15:31 +03:00
|
|
|
errno = E2BIG;
|
2019-09-16 17:15:34 +03:00
|
|
|
return set_swi_errno(env, -1);
|
2006-11-19 23:29:35 +03:00
|
|
|
}
|
|
|
|
|
2011-06-29 14:49:41 +04:00
|
|
|
/* Adjust the command-line length. */
|
2012-10-14 13:52:27 +04:00
|
|
|
if (SET_ARG(1, output_size - 1)) {
|
|
|
|
/* Couldn't write back to argument block */
|
2019-09-16 17:15:31 +03:00
|
|
|
errno = EFAULT;
|
2019-09-16 17:15:34 +03:00
|
|
|
return set_swi_errno(env, -1);
|
2012-10-14 13:52:27 +04:00
|
|
|
}
|
2006-11-19 23:29:35 +03:00
|
|
|
|
2011-06-29 14:49:41 +04:00
|
|
|
/* Lock the buffer on the ARM side. */
|
2012-10-14 13:52:27 +04:00
|
|
|
output_buffer = lock_user(VERIFY_WRITE, arg0, output_size, 0);
|
2011-06-29 14:49:41 +04:00
|
|
|
if (!output_buffer) {
|
2019-09-16 17:15:31 +03:00
|
|
|
errno = EFAULT;
|
2019-09-16 17:15:34 +03:00
|
|
|
return set_swi_errno(env, -1);
|
2011-06-29 14:49:41 +04:00
|
|
|
}
|
2006-11-19 23:29:35 +03:00
|
|
|
|
2011-06-29 14:49:41 +04:00
|
|
|
/* Copy the command-line arguments. */
|
|
|
|
#if !defined(CONFIG_USER_ONLY)
|
2015-06-26 16:22:36 +03:00
|
|
|
pstrcpy(output_buffer, output_size, cmdline);
|
2011-06-29 14:49:41 +04:00
|
|
|
#else
|
|
|
|
if (output_size == 1) {
|
|
|
|
/* Empty command-line. */
|
|
|
|
output_buffer[0] = '\0';
|
|
|
|
goto out;
|
|
|
|
}
|
2010-12-06 18:06:05 +03:00
|
|
|
|
2011-06-29 14:49:41 +04:00
|
|
|
if (copy_from_user(output_buffer, ts->info->arg_start,
|
|
|
|
output_size)) {
|
2019-09-16 17:15:31 +03:00
|
|
|
errno = EFAULT;
|
2019-09-16 17:15:34 +03:00
|
|
|
status = set_swi_errno(env, -1);
|
2011-06-29 14:49:41 +04:00
|
|
|
goto out;
|
2010-12-06 18:06:05 +03:00
|
|
|
}
|
|
|
|
|
2011-06-29 14:49:41 +04:00
|
|
|
/* Separate arguments by white spaces. */
|
|
|
|
for (i = 0; i < output_size - 1; i++) {
|
|
|
|
if (output_buffer[i] == 0) {
|
|
|
|
output_buffer[i] = ' ';
|
|
|
|
}
|
|
|
|
}
|
|
|
|
out:
|
|
|
|
#endif
|
|
|
|
/* Unlock the buffer on the ARM side. */
|
2012-10-14 13:52:27 +04:00
|
|
|
unlock_user(output_buffer, arg0, output_size);
|
2010-12-06 18:06:05 +03:00
|
|
|
|
2011-06-29 14:49:41 +04:00
|
|
|
return status;
|
2006-11-19 23:29:35 +03:00
|
|
|
}
|
2012-04-28 09:07:47 +04:00
|
|
|
case TARGET_SYS_HEAPINFO:
|
2005-04-23 22:25:41 +04:00
|
|
|
{
|
2016-07-04 15:06:35 +03:00
|
|
|
target_ulong retvals[4];
|
2016-07-07 15:47:00 +03:00
|
|
|
target_ulong limit;
|
2016-07-04 15:06:35 +03:00
|
|
|
int i;
|
2019-09-16 17:15:34 +03:00
|
|
|
#ifdef CONFIG_USER_ONLY
|
|
|
|
TaskState *ts = cs->opaque;
|
|
|
|
#endif
|
2016-07-04 15:06:35 +03:00
|
|
|
|
2012-10-14 13:52:27 +04:00
|
|
|
GET_ARG(0);
|
2005-04-23 22:25:41 +04:00
|
|
|
|
2007-01-20 20:12:09 +03:00
|
|
|
#ifdef CONFIG_USER_ONLY
|
2019-05-14 14:08:39 +03:00
|
|
|
/*
|
|
|
|
* Some C libraries assume the heap immediately follows .bss, so
|
|
|
|
* allocate it using sbrk.
|
|
|
|
*/
|
2005-04-23 22:25:41 +04:00
|
|
|
if (!ts->heap_limit) {
|
2011-04-18 19:34:25 +04:00
|
|
|
abi_ulong ret;
|
2005-04-23 22:25:41 +04:00
|
|
|
|
2006-03-25 22:31:22 +03:00
|
|
|
ts->heap_base = do_brk(0);
|
2005-04-23 22:25:41 +04:00
|
|
|
limit = ts->heap_base + ARM_ANGEL_HEAP_SIZE;
|
|
|
|
/* Try a big heap, and reduce the size if that fails. */
|
|
|
|
for (;;) {
|
2006-03-25 22:31:22 +03:00
|
|
|
ret = do_brk(limit);
|
2011-04-18 19:34:25 +04:00
|
|
|
if (ret >= limit) {
|
2005-04-23 22:25:41 +04:00
|
|
|
break;
|
2011-04-18 19:34:25 +04:00
|
|
|
}
|
2005-04-23 22:25:41 +04:00
|
|
|
limit = (ts->heap_base >> 1) + (limit >> 1);
|
|
|
|
}
|
|
|
|
ts->heap_limit = limit;
|
|
|
|
}
|
2007-09-17 12:09:54 +04:00
|
|
|
|
2016-07-04 15:06:35 +03:00
|
|
|
retvals[0] = ts->heap_base;
|
|
|
|
retvals[1] = ts->heap_limit;
|
|
|
|
retvals[2] = ts->stack_base;
|
|
|
|
retvals[3] = 0; /* Stack limit. */
|
2007-01-20 20:12:09 +03:00
|
|
|
#else
|
|
|
|
limit = ram_size;
|
|
|
|
/* TODO: Make this use the limit of the loaded application. */
|
2016-07-04 15:06:35 +03:00
|
|
|
retvals[0] = limit / 2;
|
|
|
|
retvals[1] = limit;
|
|
|
|
retvals[2] = limit; /* Stack base */
|
|
|
|
retvals[3] = 0; /* Stack limit. */
|
2007-01-20 20:12:09 +03:00
|
|
|
#endif
|
2016-07-04 15:06:35 +03:00
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(retvals); i++) {
|
|
|
|
bool fail;
|
|
|
|
|
|
|
|
if (is_a64(env)) {
|
|
|
|
fail = put_user_u64(retvals[i], arg0 + i * 8);
|
|
|
|
} else {
|
|
|
|
fail = put_user_u32(retvals[i], arg0 + i * 4);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (fail) {
|
|
|
|
/* Couldn't write back to argument block */
|
2019-09-16 17:15:31 +03:00
|
|
|
errno = EFAULT;
|
2019-09-16 17:15:34 +03:00
|
|
|
return set_swi_errno(env, -1);
|
2016-07-04 15:06:35 +03:00
|
|
|
}
|
|
|
|
}
|
2005-04-23 22:25:41 +04:00
|
|
|
return 0;
|
|
|
|
}
|
2012-04-28 09:07:47 +04:00
|
|
|
case TARGET_SYS_EXIT:
|
2015-09-07 12:39:28 +03:00
|
|
|
if (is_a64(env)) {
|
2019-05-14 14:08:39 +03:00
|
|
|
/*
|
|
|
|
* The A64 version of this call takes a parameter block,
|
2015-09-07 12:39:28 +03:00
|
|
|
* so the application-exit type can return a subcode which
|
|
|
|
* is the exit status code from the application.
|
|
|
|
*/
|
|
|
|
GET_ARG(0);
|
|
|
|
GET_ARG(1);
|
|
|
|
|
|
|
|
if (arg0 == ADP_Stopped_ApplicationExit) {
|
|
|
|
ret = arg1;
|
|
|
|
} else {
|
|
|
|
ret = 1;
|
|
|
|
}
|
|
|
|
} else {
|
2019-05-14 14:08:39 +03:00
|
|
|
/*
|
|
|
|
* ARM specifies only Stopped_ApplicationExit as normal
|
|
|
|
* exit, everything else is considered an error
|
|
|
|
*/
|
2015-09-07 12:39:28 +03:00
|
|
|
ret = (args == ADP_Stopped_ApplicationExit) ? 0 : 1;
|
|
|
|
}
|
2014-12-11 15:07:48 +03:00
|
|
|
gdb_exit(env, ret);
|
|
|
|
exit(ret);
|
2015-09-07 12:39:28 +03:00
|
|
|
case TARGET_SYS_SYNCCACHE:
|
2019-05-14 14:08:39 +03:00
|
|
|
/*
|
|
|
|
* Clean the D-cache and invalidate the I-cache for the specified
|
2015-09-07 12:39:28 +03:00
|
|
|
* virtual address range. This is a nop for us since we don't
|
|
|
|
* implement caches. This is only present on A64.
|
|
|
|
*/
|
|
|
|
if (is_a64(env)) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
/* fall through -- invalid for A32/T32 */
|
2005-04-23 22:25:41 +04:00
|
|
|
default:
|
|
|
|
fprintf(stderr, "qemu: Unsupported SemiHosting SWI 0x%02x\n", nr);
|
2019-04-17 22:18:02 +03:00
|
|
|
cpu_dump_state(cs, stderr, 0);
|
2005-04-23 22:25:41 +04:00
|
|
|
abort();
|
|
|
|
}
|
|
|
|
}
|