2020-10-06 10:05:29 +03:00
|
|
|
/*
|
|
|
|
* Target-specific parts of the CPU object
|
|
|
|
*
|
|
|
|
* Copyright (c) 2003 Fabrice Bellard
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 2 of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library; if not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "qemu/osdep.h"
|
|
|
|
#include "qapi/error.h"
|
|
|
|
|
|
|
|
#include "exec/target_page.h"
|
2023-12-06 22:27:32 +03:00
|
|
|
#include "exec/page-protection.h"
|
2020-10-06 10:05:29 +03:00
|
|
|
#include "hw/qdev-core.h"
|
|
|
|
#include "hw/qdev-properties.h"
|
|
|
|
#include "qemu/error-report.h"
|
2023-11-15 02:56:03 +03:00
|
|
|
#include "qemu/qemu-print.h"
|
2020-10-06 10:05:29 +03:00
|
|
|
#include "migration/vmstate.h"
|
|
|
|
#ifdef CONFIG_USER_ONLY
|
|
|
|
#include "qemu.h"
|
|
|
|
#else
|
2021-05-17 13:51:31 +03:00
|
|
|
#include "hw/core/sysemu-cpu-ops.h"
|
2020-10-06 10:05:29 +03:00
|
|
|
#include "exec/address-spaces.h"
|
2024-02-09 18:00:37 +03:00
|
|
|
#include "exec/memory.h"
|
2020-10-06 10:05:29 +03:00
|
|
|
#endif
|
2023-03-03 05:58:05 +03:00
|
|
|
#include "sysemu/cpus.h"
|
2020-10-06 10:05:29 +03:00
|
|
|
#include "sysemu/tcg.h"
|
2023-12-12 13:34:25 +03:00
|
|
|
#include "exec/tswap.h"
|
2022-12-19 20:09:43 +03:00
|
|
|
#include "exec/replay-core.h"
|
2022-03-14 17:01:08 +03:00
|
|
|
#include "exec/cpu-common.h"
|
2022-02-07 17:28:56 +03:00
|
|
|
#include "exec/exec-all.h"
|
2023-03-03 05:57:43 +03:00
|
|
|
#include "exec/tb-flush.h"
|
2020-12-16 15:27:58 +03:00
|
|
|
#include "exec/translate-all.h"
|
2020-10-06 10:05:29 +03:00
|
|
|
#include "exec/log.h"
|
2021-03-22 16:27:41 +03:00
|
|
|
#include "hw/core/accel-cpu.h"
|
2021-07-01 18:10:53 +03:00
|
|
|
#include "trace/trace-root.h"
|
2022-02-07 17:28:56 +03:00
|
|
|
#include "qemu/accel.h"
|
2020-10-06 10:05:29 +03:00
|
|
|
|
|
|
|
#ifndef CONFIG_USER_ONLY
|
|
|
|
static int cpu_common_post_load(void *opaque, int version_id)
|
|
|
|
{
|
|
|
|
CPUState *cpu = opaque;
|
|
|
|
|
|
|
|
/* 0x01 was CPU_INTERRUPT_EXIT. This line can be removed when the
|
|
|
|
version_id is increased. */
|
|
|
|
cpu->interrupt_request &= ~0x01;
|
|
|
|
tlb_flush(cpu);
|
|
|
|
|
|
|
|
/* loadvm has just updated the content of RAM, bypassing the
|
|
|
|
* usual mechanisms that ensure we flush TBs for writes to
|
|
|
|
* memory we've translated code from. So we must flush all TBs,
|
|
|
|
* which will now be stale.
|
|
|
|
*/
|
|
|
|
tb_flush(cpu);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int cpu_common_pre_load(void *opaque)
|
|
|
|
{
|
|
|
|
CPUState *cpu = opaque;
|
|
|
|
|
|
|
|
cpu->exception_index = -1;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool cpu_common_exception_index_needed(void *opaque)
|
|
|
|
{
|
|
|
|
CPUState *cpu = opaque;
|
|
|
|
|
|
|
|
return tcg_enabled() && cpu->exception_index != -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const VMStateDescription vmstate_cpu_common_exception_index = {
|
|
|
|
.name = "cpu_common/exception_index",
|
|
|
|
.version_id = 1,
|
|
|
|
.minimum_version_id = 1,
|
|
|
|
.needed = cpu_common_exception_index_needed,
|
2023-12-21 06:16:46 +03:00
|
|
|
.fields = (const VMStateField[]) {
|
2020-10-06 10:05:29 +03:00
|
|
|
VMSTATE_INT32(exception_index, CPUState),
|
|
|
|
VMSTATE_END_OF_LIST()
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
static bool cpu_common_crash_occurred_needed(void *opaque)
|
|
|
|
{
|
|
|
|
CPUState *cpu = opaque;
|
|
|
|
|
|
|
|
return cpu->crash_occurred;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const VMStateDescription vmstate_cpu_common_crash_occurred = {
|
|
|
|
.name = "cpu_common/crash_occurred",
|
|
|
|
.version_id = 1,
|
|
|
|
.minimum_version_id = 1,
|
|
|
|
.needed = cpu_common_crash_occurred_needed,
|
2023-12-21 06:16:46 +03:00
|
|
|
.fields = (const VMStateField[]) {
|
2020-10-06 10:05:29 +03:00
|
|
|
VMSTATE_BOOL(crash_occurred, CPUState),
|
|
|
|
VMSTATE_END_OF_LIST()
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
const VMStateDescription vmstate_cpu_common = {
|
|
|
|
.name = "cpu_common",
|
|
|
|
.version_id = 1,
|
|
|
|
.minimum_version_id = 1,
|
|
|
|
.pre_load = cpu_common_pre_load,
|
|
|
|
.post_load = cpu_common_post_load,
|
2023-12-21 06:16:46 +03:00
|
|
|
.fields = (const VMStateField[]) {
|
2020-10-06 10:05:29 +03:00
|
|
|
VMSTATE_UINT32(halted, CPUState),
|
|
|
|
VMSTATE_UINT32(interrupt_request, CPUState),
|
|
|
|
VMSTATE_END_OF_LIST()
|
|
|
|
},
|
2023-12-21 06:16:46 +03:00
|
|
|
.subsections = (const VMStateDescription * const []) {
|
2020-10-06 10:05:29 +03:00
|
|
|
&vmstate_cpu_common_exception_index,
|
|
|
|
&vmstate_cpu_common_crash_occurred,
|
|
|
|
NULL
|
|
|
|
}
|
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
2023-09-15 17:26:52 +03:00
|
|
|
bool cpu_exec_realizefn(CPUState *cpu, Error **errp)
|
2020-10-06 10:05:29 +03:00
|
|
|
{
|
2022-09-23 11:47:59 +03:00
|
|
|
/* cache the cpu class for the hotpath */
|
|
|
|
cpu->cc = CPU_GET_CLASS(cpu);
|
2020-10-06 10:05:29 +03:00
|
|
|
|
2023-10-03 15:30:21 +03:00
|
|
|
if (!accel_cpu_common_realize(cpu, errp)) {
|
2023-09-15 17:26:52 +03:00
|
|
|
return false;
|
2021-03-22 16:27:44 +03:00
|
|
|
}
|
2022-10-31 05:26:36 +03:00
|
|
|
|
|
|
|
/* Wait until cpu initialization complete before exposing cpu. */
|
|
|
|
cpu_list_add(cpu);
|
|
|
|
|
2021-02-04 19:39:11 +03:00
|
|
|
#ifdef CONFIG_USER_ONLY
|
2021-05-17 13:51:28 +03:00
|
|
|
assert(qdev_get_vmsd(DEVICE(cpu)) == NULL ||
|
|
|
|
qdev_get_vmsd(DEVICE(cpu))->unmigratable);
|
2021-02-04 19:39:11 +03:00
|
|
|
#else
|
|
|
|
if (qdev_get_vmsd(DEVICE(cpu)) == NULL) {
|
|
|
|
vmstate_register(NULL, cpu->cpu_index, &vmstate_cpu_common, cpu);
|
|
|
|
}
|
2022-09-23 11:47:59 +03:00
|
|
|
if (cpu->cc->sysemu_ops->legacy_vmsd != NULL) {
|
|
|
|
vmstate_register(NULL, cpu->cpu_index, cpu->cc->sysemu_ops->legacy_vmsd, cpu);
|
2021-02-04 19:39:11 +03:00
|
|
|
}
|
|
|
|
#endif /* CONFIG_USER_ONLY */
|
2023-09-15 17:26:52 +03:00
|
|
|
|
|
|
|
return true;
|
2021-02-04 19:39:11 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
void cpu_exec_unrealizefn(CPUState *cpu)
|
|
|
|
{
|
2021-05-17 13:51:32 +03:00
|
|
|
#ifndef CONFIG_USER_ONLY
|
2021-02-04 19:39:11 +03:00
|
|
|
CPUClass *cc = CPU_GET_CLASS(cpu);
|
2020-10-06 10:05:29 +03:00
|
|
|
|
2021-05-17 13:51:32 +03:00
|
|
|
if (cc->sysemu_ops->legacy_vmsd != NULL) {
|
|
|
|
vmstate_unregister(NULL, cc->sysemu_ops->legacy_vmsd, cpu);
|
2020-10-06 10:05:29 +03:00
|
|
|
}
|
|
|
|
if (qdev_get_vmsd(DEVICE(cpu)) == NULL) {
|
|
|
|
vmstate_unregister(NULL, &vmstate_cpu_common, cpu);
|
|
|
|
}
|
|
|
|
#endif
|
2023-01-24 21:01:18 +03:00
|
|
|
|
2021-02-04 19:39:11 +03:00
|
|
|
cpu_list_remove(cpu);
|
2023-01-24 21:01:18 +03:00
|
|
|
/*
|
|
|
|
* Now that the vCPU has been removed from the RCU list, we can call
|
2023-10-03 15:30:22 +03:00
|
|
|
* accel_cpu_common_unrealize, which may free fields using call_rcu.
|
2023-01-24 21:01:18 +03:00
|
|
|
*/
|
2023-10-03 15:30:22 +03:00
|
|
|
accel_cpu_common_unrealize(cpu);
|
2020-10-06 10:05:29 +03:00
|
|
|
}
|
|
|
|
|
2021-12-27 18:01:24 +03:00
|
|
|
/*
|
|
|
|
* This can't go in hw/core/cpu.c because that file is compiled only
|
|
|
|
* once for both user-mode and system builds.
|
|
|
|
*/
|
2021-08-22 10:25:28 +03:00
|
|
|
static Property cpu_common_props[] = {
|
2021-12-27 18:01:24 +03:00
|
|
|
#ifdef CONFIG_USER_ONLY
|
|
|
|
/*
|
|
|
|
* Create a property for the user-only object, so users can
|
|
|
|
* adjust prctl(PR_SET_UNALIGN) from the command-line.
|
|
|
|
* Has no effect if the target does not support the feature.
|
|
|
|
*/
|
|
|
|
DEFINE_PROP_BOOL("prctl-unalign-sigbus", CPUState,
|
|
|
|
prctl_unalign_sigbus, false),
|
|
|
|
#else
|
2021-08-22 10:25:28 +03:00
|
|
|
/*
|
2023-10-04 12:06:18 +03:00
|
|
|
* Create a memory property for system CPU object, so users can
|
2021-12-27 18:01:24 +03:00
|
|
|
* wire up its memory. The default if no link is set up is to use
|
2021-08-22 10:25:28 +03:00
|
|
|
* the system address space.
|
|
|
|
*/
|
|
|
|
DEFINE_PROP_LINK("memory", CPUState, memory, TYPE_MEMORY_REGION,
|
|
|
|
MemoryRegion *),
|
|
|
|
#endif
|
|
|
|
DEFINE_PROP_END_OF_LIST(),
|
|
|
|
};
|
|
|
|
|
2024-01-10 12:03:11 +03:00
|
|
|
#ifndef CONFIG_USER_ONLY
|
2022-01-27 18:46:25 +03:00
|
|
|
static bool cpu_get_start_powered_off(Object *obj, Error **errp)
|
|
|
|
{
|
|
|
|
CPUState *cpu = CPU(obj);
|
|
|
|
return cpu->start_powered_off;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void cpu_set_start_powered_off(Object *obj, bool value, Error **errp)
|
|
|
|
{
|
|
|
|
CPUState *cpu = CPU(obj);
|
|
|
|
cpu->start_powered_off = value;
|
|
|
|
}
|
2024-01-10 12:03:11 +03:00
|
|
|
#endif
|
2022-01-27 18:46:25 +03:00
|
|
|
|
2021-08-22 10:25:28 +03:00
|
|
|
void cpu_class_init_props(DeviceClass *dc)
|
|
|
|
{
|
2024-01-10 12:03:11 +03:00
|
|
|
#ifndef CONFIG_USER_ONLY
|
2022-01-27 18:46:25 +03:00
|
|
|
ObjectClass *oc = OBJECT_CLASS(dc);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We can't use DEFINE_PROP_BOOL in the Property array for this
|
|
|
|
* property, because we want this to be settable after realize.
|
|
|
|
*/
|
|
|
|
object_class_property_add_bool(oc, "start-powered-off",
|
|
|
|
cpu_get_start_powered_off,
|
|
|
|
cpu_set_start_powered_off);
|
2024-01-10 12:03:11 +03:00
|
|
|
#endif
|
|
|
|
|
|
|
|
device_class_set_props(dc, cpu_common_props);
|
2021-08-22 10:25:28 +03:00
|
|
|
}
|
|
|
|
|
2020-10-06 10:05:29 +03:00
|
|
|
void cpu_exec_initfn(CPUState *cpu)
|
|
|
|
{
|
|
|
|
cpu->as = NULL;
|
|
|
|
cpu->num_ases = 0;
|
|
|
|
|
|
|
|
#ifndef CONFIG_USER_ONLY
|
|
|
|
cpu->thread_id = qemu_get_thread_id();
|
|
|
|
cpu->memory = get_system_memory();
|
|
|
|
object_ref(OBJECT(cpu->memory));
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2023-11-15 02:56:02 +03:00
|
|
|
char *cpu_model_from_type(const char *typename)
|
|
|
|
{
|
|
|
|
const char *suffix = "-" CPU_RESOLVING_TYPE;
|
|
|
|
|
|
|
|
if (!object_class_by_name(typename)) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (g_str_has_suffix(typename, suffix)) {
|
|
|
|
return g_strndup(typename, strlen(typename) - strlen(suffix));
|
|
|
|
}
|
|
|
|
|
|
|
|
return g_strdup(typename);
|
|
|
|
}
|
|
|
|
|
2020-10-06 10:05:29 +03:00
|
|
|
const char *parse_cpu_option(const char *cpu_option)
|
|
|
|
{
|
|
|
|
ObjectClass *oc;
|
|
|
|
CPUClass *cc;
|
|
|
|
gchar **model_pieces;
|
|
|
|
const char *cpu_type;
|
|
|
|
|
|
|
|
model_pieces = g_strsplit(cpu_option, ",", 2);
|
|
|
|
if (!model_pieces[0]) {
|
|
|
|
error_report("-cpu option cannot be empty");
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
oc = cpu_class_by_name(CPU_RESOLVING_TYPE, model_pieces[0]);
|
|
|
|
if (oc == NULL) {
|
|
|
|
error_report("unable to find CPU model '%s'", model_pieces[0]);
|
|
|
|
g_strfreev(model_pieces);
|
|
|
|
exit(EXIT_FAILURE);
|
|
|
|
}
|
|
|
|
|
|
|
|
cpu_type = object_class_get_name(oc);
|
|
|
|
cc = CPU_CLASS(oc);
|
|
|
|
cc->parse_features(cpu_type, model_pieces[1], &error_fatal);
|
|
|
|
g_strfreev(model_pieces);
|
|
|
|
return cpu_type;
|
|
|
|
}
|
|
|
|
|
2023-11-15 02:56:03 +03:00
|
|
|
#ifndef cpu_list
|
|
|
|
static void cpu_list_entry(gpointer data, gpointer user_data)
|
|
|
|
{
|
|
|
|
CPUClass *cc = CPU_CLASS(OBJECT_CLASS(data));
|
|
|
|
const char *typename = object_class_get_name(OBJECT_CLASS(data));
|
|
|
|
g_autofree char *model = cpu_model_from_type(typename);
|
|
|
|
|
|
|
|
if (cc->deprecation_note) {
|
|
|
|
qemu_printf(" %s (deprecated)\n", model);
|
|
|
|
} else {
|
|
|
|
qemu_printf(" %s\n", model);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void cpu_list(void)
|
|
|
|
{
|
|
|
|
GSList *list;
|
|
|
|
|
|
|
|
list = object_class_get_list_sorted(TYPE_CPU, false);
|
|
|
|
qemu_printf("Available CPUs:\n");
|
|
|
|
g_slist_foreach(list, cpu_list_entry, NULL);
|
|
|
|
g_slist_free(list);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2023-04-19 15:48:31 +03:00
|
|
|
void list_cpus(void)
|
2022-03-14 17:01:08 +03:00
|
|
|
{
|
|
|
|
cpu_list();
|
|
|
|
}
|
|
|
|
|
2020-10-06 10:05:29 +03:00
|
|
|
/* enable or disable single step mode. EXCP_DEBUG is returned by the
|
|
|
|
CPU loop after each instruction */
|
|
|
|
void cpu_single_step(CPUState *cpu, int enabled)
|
|
|
|
{
|
|
|
|
if (cpu->singlestep_enabled != enabled) {
|
|
|
|
cpu->singlestep_enabled = enabled;
|
2023-03-03 05:58:05 +03:00
|
|
|
|
|
|
|
#if !defined(CONFIG_USER_ONLY)
|
|
|
|
const AccelOpsClass *ops = cpus_get_accel();
|
|
|
|
if (ops->update_guest_debug) {
|
|
|
|
ops->update_guest_debug(cpu);
|
2020-10-06 10:05:29 +03:00
|
|
|
}
|
2023-03-03 05:58:05 +03:00
|
|
|
#endif
|
|
|
|
|
2021-07-01 18:10:53 +03:00
|
|
|
trace_breakpoint_singlestep(cpu->cpu_index, enabled);
|
2020-10-06 10:05:29 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void cpu_abort(CPUState *cpu, const char *fmt, ...)
|
|
|
|
{
|
|
|
|
va_list ap;
|
|
|
|
va_list ap2;
|
|
|
|
|
|
|
|
va_start(ap, fmt);
|
|
|
|
va_copy(ap2, ap);
|
|
|
|
fprintf(stderr, "qemu: fatal: ");
|
|
|
|
vfprintf(stderr, fmt, ap);
|
|
|
|
fprintf(stderr, "\n");
|
|
|
|
cpu_dump_state(cpu, stderr, CPU_DUMP_FPU | CPU_DUMP_CCOP);
|
|
|
|
if (qemu_log_separate()) {
|
2022-04-17 21:29:47 +03:00
|
|
|
FILE *logfile = qemu_log_trylock();
|
2022-04-17 21:29:49 +03:00
|
|
|
if (logfile) {
|
|
|
|
fprintf(logfile, "qemu: fatal: ");
|
|
|
|
vfprintf(logfile, fmt, ap2);
|
|
|
|
fprintf(logfile, "\n");
|
|
|
|
cpu_dump_state(cpu, logfile, CPU_DUMP_FPU | CPU_DUMP_CCOP);
|
|
|
|
qemu_log_unlock(logfile);
|
|
|
|
}
|
2020-10-06 10:05:29 +03:00
|
|
|
}
|
|
|
|
va_end(ap2);
|
|
|
|
va_end(ap);
|
|
|
|
replay_finish();
|
|
|
|
#if defined(CONFIG_USER_ONLY)
|
|
|
|
{
|
|
|
|
struct sigaction act;
|
|
|
|
sigfillset(&act.sa_mask);
|
|
|
|
act.sa_handler = SIG_DFL;
|
|
|
|
act.sa_flags = 0;
|
|
|
|
sigaction(SIGABRT, &act, NULL);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
|
|
|
|
/* physical memory access (slow version, mainly for debug) */
|
|
|
|
#if defined(CONFIG_USER_ONLY)
|
2022-02-03 04:13:28 +03:00
|
|
|
int cpu_memory_rw_debug(CPUState *cpu, vaddr addr,
|
|
|
|
void *ptr, size_t len, bool is_write)
|
2020-10-06 10:05:29 +03:00
|
|
|
{
|
|
|
|
int flags;
|
2022-02-03 04:13:28 +03:00
|
|
|
vaddr l, page;
|
2020-10-06 10:05:29 +03:00
|
|
|
void * p;
|
|
|
|
uint8_t *buf = ptr;
|
2024-01-29 12:32:14 +03:00
|
|
|
ssize_t written;
|
|
|
|
int ret = -1;
|
|
|
|
int fd = -1;
|
2020-10-06 10:05:29 +03:00
|
|
|
|
|
|
|
while (len > 0) {
|
|
|
|
page = addr & TARGET_PAGE_MASK;
|
|
|
|
l = (page + TARGET_PAGE_SIZE) - addr;
|
|
|
|
if (l > len)
|
|
|
|
l = len;
|
|
|
|
flags = page_get_flags(page);
|
2024-01-29 12:32:14 +03:00
|
|
|
if (!(flags & PAGE_VALID)) {
|
|
|
|
goto out_close;
|
|
|
|
}
|
2020-10-06 10:05:29 +03:00
|
|
|
if (is_write) {
|
2024-01-29 12:32:14 +03:00
|
|
|
if (flags & PAGE_WRITE) {
|
|
|
|
/* XXX: this code should not depend on lock_user */
|
|
|
|
p = lock_user(VERIFY_WRITE, addr, l, 0);
|
|
|
|
if (!p) {
|
|
|
|
goto out_close;
|
|
|
|
}
|
|
|
|
memcpy(p, buf, l);
|
|
|
|
unlock_user(p, addr, l);
|
|
|
|
} else {
|
|
|
|
/* Bypass the host page protection using ptrace. */
|
|
|
|
if (fd == -1) {
|
|
|
|
fd = open("/proc/self/mem", O_WRONLY);
|
|
|
|
if (fd == -1) {
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* If there is a TranslationBlock and we weren't bypassing the
|
|
|
|
* host page protection, the memcpy() above would SEGV,
|
|
|
|
* ultimately leading to page_unprotect(). So invalidate the
|
|
|
|
* translations manually. Both invalidation and pwrite() must
|
|
|
|
* be under mmap_lock() in order to prevent the creation of
|
|
|
|
* another TranslationBlock in between.
|
|
|
|
*/
|
|
|
|
mmap_lock();
|
|
|
|
tb_invalidate_phys_range(addr, addr + l - 1);
|
|
|
|
written = pwrite(fd, buf, l,
|
|
|
|
(off_t)(uintptr_t)g2h_untagged(addr));
|
|
|
|
mmap_unlock();
|
|
|
|
if (written != l) {
|
|
|
|
goto out_close;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else if (flags & PAGE_READ) {
|
2020-10-06 10:05:29 +03:00
|
|
|
/* XXX: this code should not depend on lock_user */
|
2024-01-29 12:32:14 +03:00
|
|
|
p = lock_user(VERIFY_READ, addr, l, 1);
|
|
|
|
if (!p) {
|
|
|
|
goto out_close;
|
|
|
|
}
|
2020-10-06 10:05:29 +03:00
|
|
|
memcpy(buf, p, l);
|
|
|
|
unlock_user(p, addr, 0);
|
2024-01-29 12:32:14 +03:00
|
|
|
} else {
|
|
|
|
/* Bypass the host page protection using ptrace. */
|
|
|
|
if (fd == -1) {
|
|
|
|
fd = open("/proc/self/mem", O_RDONLY);
|
|
|
|
if (fd == -1) {
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (pread(fd, buf, l,
|
|
|
|
(off_t)(uintptr_t)g2h_untagged(addr)) != l) {
|
|
|
|
goto out_close;
|
|
|
|
}
|
2020-10-06 10:05:29 +03:00
|
|
|
}
|
|
|
|
len -= l;
|
|
|
|
buf += l;
|
|
|
|
addr += l;
|
|
|
|
}
|
2024-01-29 12:32:14 +03:00
|
|
|
ret = 0;
|
|
|
|
out_close:
|
|
|
|
if (fd != -1) {
|
|
|
|
close(fd);
|
|
|
|
}
|
|
|
|
out:
|
|
|
|
return ret;
|
2020-10-06 10:05:29 +03:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
bool target_words_bigendian(void)
|
|
|
|
{
|
2023-09-07 14:35:00 +03:00
|
|
|
return TARGET_BIG_ENDIAN;
|
2020-10-06 10:05:29 +03:00
|
|
|
}
|
|
|
|
|
2023-04-24 19:04:33 +03:00
|
|
|
const char *target_name(void)
|
|
|
|
{
|
|
|
|
return TARGET_NAME;
|
|
|
|
}
|