accel: Target agnostic code movement accel/tcg: Cleanups to use CPUState instead of CPUArchState accel/tcg: Move CPUNegativeOffsetState into CPUState tcg: Split out tcg init functions to tcg/startup.h linux-user/hppa: Fix struct target_sigcontext layout build: Remove --enable-gprof -----BEGIN PGP SIGNATURE----- iQFRBAABCgA7FiEEekgeeIaLTbaoWgXAZN846K9+IV8FAmUdsL4dHHJpY2hhcmQu aGVuZGVyc29uQGxpbmFyby5vcmcACgkQZN846K9+IV/iYggAvDJEyMCAXSSH97BA wZT/2D/MFIhOMk6xrQRnrXfrG70N0iVKz44jl9j7k1D+9BOHcso//DDJH3c96k9A MgDb6W2bsWvC15/Qw6BALf5bb/II0MJuCcQvj3CNX5lNkXAWhwIOBhsZx7V9ST1+ rihN4nowpRWdV5GeCjDGaJW455Y1gc96hICYHy6Eqw1cUgUFt9vm5aYU3FHlat29 sYRaVYKUL2hRUPPNcPiPq0AaJ8wN6/s8gT+V1UvTzkhHqskoM4ZU89RchuXVoq1h SvhKElyULMRzM7thWtpW8qYJPj4mxZsKArESvHjsunGD6KEz3Fh1sy6EKRcdmpG/ II1vkg== =k2Io -----END PGP SIGNATURE----- Merge tag 'pull-tcg-20231004' of https://gitlab.com/rth7680/qemu into staging accel: Introduce AccelClass::cpu_common_[un]realize accel: Target agnostic code movement accel/tcg: Cleanups to use CPUState instead of CPUArchState accel/tcg: Move CPUNegativeOffsetState into CPUState tcg: Split out tcg init functions to tcg/startup.h linux-user/hppa: Fix struct target_sigcontext layout build: Remove --enable-gprof # -----BEGIN PGP SIGNATURE----- # # iQFRBAABCgA7FiEEekgeeIaLTbaoWgXAZN846K9+IV8FAmUdsL4dHHJpY2hhcmQu # aGVuZGVyc29uQGxpbmFyby5vcmcACgkQZN846K9+IV/iYggAvDJEyMCAXSSH97BA # wZT/2D/MFIhOMk6xrQRnrXfrG70N0iVKz44jl9j7k1D+9BOHcso//DDJH3c96k9A # MgDb6W2bsWvC15/Qw6BALf5bb/II0MJuCcQvj3CNX5lNkXAWhwIOBhsZx7V9ST1+ # rihN4nowpRWdV5GeCjDGaJW455Y1gc96hICYHy6Eqw1cUgUFt9vm5aYU3FHlat29 # sYRaVYKUL2hRUPPNcPiPq0AaJ8wN6/s8gT+V1UvTzkhHqskoM4ZU89RchuXVoq1h # SvhKElyULMRzM7thWtpW8qYJPj4mxZsKArESvHjsunGD6KEz3Fh1sy6EKRcdmpG/ # II1vkg== # =k2Io # -----END PGP SIGNATURE----- # gpg: Signature made Wed 04 Oct 2023 14:36:46 EDT # gpg: using RSA key 7A481E78868B4DB6A85A05C064DF38E8AF7E215F # gpg: issuer "richard.henderson@linaro.org" # gpg: Good signature from "Richard Henderson <richard.henderson@linaro.org>" [full] # Primary key fingerprint: 7A48 1E78 868B 4DB6 A85A 05C0 64DF 38E8 AF7E 215F * tag 'pull-tcg-20231004' of https://gitlab.com/rth7680/qemu: (47 commits) tcg/loongarch64: Fix buid error tests/avocado: Re-enable MIPS Malta tests (GitLab issue #1884 fixed) build: Remove --enable-gprof linux-user/hppa: Fix struct target_sigcontext layout tcg: Split out tcg init functions to tcg/startup.h tcg: Remove argument to tcg_prologue_init accel/tcg: Make cpu-exec-common.c a target agnostic unit accel/tcg: Make icount.o a target agnostic unit accel/tcg: Make monitor.c a target-agnostic unit accel/tcg: Rename target-specific 'internal.h' -> 'internal-target.h' exec: Rename target specific page-vary.c -> page-vary-target.c exec: Rename cpu.c -> cpu-target.c accel: Rename accel-common.c -> accel-target.c accel: Make accel-blocker.o target agnostic accel/tcg: Restrict dump_exec_info() declaration exec: Move cpu_loop_foo() target agnostic functions to 'cpu-common.h' exec: Make EXCP_FOO definitions target agnostic accel/tcg: move ld/st helpers to ldst_common.c.inc accel/tcg: Unify user and softmmu do_[st|ld]*_mmu() accel/tcg: Remove env_tlb() ... Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
		
			
				
	
	
		
			415 lines
		
	
	
		
			9.5 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			415 lines
		
	
	
		
			9.5 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/*
 | 
						|
 *  process related system call shims and definitions
 | 
						|
 *
 | 
						|
 *  Copyright (c) 2013-2014 Stacey D. Son
 | 
						|
 *
 | 
						|
 *  This program is free software; you can redistribute it and/or modify
 | 
						|
 *  it under the terms of the GNU General Public License as published by
 | 
						|
 *  the Free Software Foundation; either version 2 of the License, or
 | 
						|
 *  (at your option) any later version.
 | 
						|
 *
 | 
						|
 *  This program is distributed in the hope that it will be useful,
 | 
						|
 *  but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
						|
 *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
						|
 *  GNU General Public License for more details.
 | 
						|
 *
 | 
						|
 *  You should have received a copy of the GNU General Public License
 | 
						|
 *  along with this program; if not, see <http://www.gnu.org/licenses/>.
 | 
						|
 */
 | 
						|
 | 
						|
#ifndef BSD_PROC_H_
 | 
						|
#define BSD_PROC_H_
 | 
						|
 | 
						|
#include <sys/resource.h>
 | 
						|
 | 
						|
#include "qemu-bsd.h"
 | 
						|
#include "gdbstub/syscalls.h"
 | 
						|
#include "qemu/plugin.h"
 | 
						|
 | 
						|
extern int _getlogin(char*, int);
 | 
						|
int bsd_get_ncpu(void);
 | 
						|
 | 
						|
/* exit(2) */
 | 
						|
static inline abi_long do_bsd_exit(void *cpu_env, abi_long arg1)
 | 
						|
{
 | 
						|
    gdb_exit(arg1);
 | 
						|
    qemu_plugin_user_exit();
 | 
						|
    _exit(arg1);
 | 
						|
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
/* getgroups(2) */
 | 
						|
static inline abi_long do_bsd_getgroups(abi_long gidsetsize, abi_long arg2)
 | 
						|
{
 | 
						|
    abi_long ret;
 | 
						|
    uint32_t *target_grouplist;
 | 
						|
    g_autofree gid_t *grouplist;
 | 
						|
    int i;
 | 
						|
 | 
						|
    grouplist = g_try_new(gid_t, gidsetsize);
 | 
						|
    ret = get_errno(getgroups(gidsetsize, grouplist));
 | 
						|
    if (gidsetsize != 0) {
 | 
						|
        if (!is_error(ret)) {
 | 
						|
            target_grouplist = lock_user(VERIFY_WRITE, arg2, gidsetsize * 2, 0);
 | 
						|
            if (!target_grouplist) {
 | 
						|
                return -TARGET_EFAULT;
 | 
						|
            }
 | 
						|
            for (i = 0; i < ret; i++) {
 | 
						|
                target_grouplist[i] = tswap32(grouplist[i]);
 | 
						|
            }
 | 
						|
            unlock_user(target_grouplist, arg2, gidsetsize * 2);
 | 
						|
        }
 | 
						|
    }
 | 
						|
    return ret;
 | 
						|
}
 | 
						|
 | 
						|
/* setgroups(2) */
 | 
						|
static inline abi_long do_bsd_setgroups(abi_long gidsetsize, abi_long arg2)
 | 
						|
{
 | 
						|
    uint32_t *target_grouplist;
 | 
						|
    g_autofree gid_t *grouplist;
 | 
						|
    int i;
 | 
						|
 | 
						|
    grouplist = g_try_new(gid_t, gidsetsize);
 | 
						|
    target_grouplist = lock_user(VERIFY_READ, arg2, gidsetsize * 2, 1);
 | 
						|
    if (!target_grouplist) {
 | 
						|
        return -TARGET_EFAULT;
 | 
						|
    }
 | 
						|
    for (i = 0; i < gidsetsize; i++) {
 | 
						|
        grouplist[i] = tswap32(target_grouplist[i]);
 | 
						|
    }
 | 
						|
    unlock_user(target_grouplist, arg2, 0);
 | 
						|
    return get_errno(setgroups(gidsetsize, grouplist));
 | 
						|
}
 | 
						|
 | 
						|
/* umask(2) */
 | 
						|
static inline abi_long do_bsd_umask(abi_long arg1)
 | 
						|
{
 | 
						|
    return get_errno(umask(arg1));
 | 
						|
}
 | 
						|
 | 
						|
/* setlogin(2) */
 | 
						|
static inline abi_long do_bsd_setlogin(abi_long arg1)
 | 
						|
{
 | 
						|
    abi_long ret;
 | 
						|
    void *p;
 | 
						|
 | 
						|
    p = lock_user_string(arg1);
 | 
						|
    if (p == NULL) {
 | 
						|
        return -TARGET_EFAULT;
 | 
						|
    }
 | 
						|
    ret = get_errno(setlogin(p));
 | 
						|
    unlock_user(p, arg1, 0);
 | 
						|
 | 
						|
    return ret;
 | 
						|
}
 | 
						|
 | 
						|
/* getlogin(2) */
 | 
						|
static inline abi_long do_bsd_getlogin(abi_long arg1, abi_long arg2)
 | 
						|
{
 | 
						|
    abi_long ret;
 | 
						|
    void *p;
 | 
						|
 | 
						|
    p = lock_user(VERIFY_WRITE, arg1, arg2, 0);
 | 
						|
    if (p == NULL) {
 | 
						|
        return -TARGET_EFAULT;
 | 
						|
    }
 | 
						|
    ret = get_errno(_getlogin(p, arg2));
 | 
						|
    unlock_user(p, arg1, arg2);
 | 
						|
 | 
						|
    return ret;
 | 
						|
}
 | 
						|
 | 
						|
/* getrusage(2) */
 | 
						|
static inline abi_long do_bsd_getrusage(abi_long who, abi_ulong target_addr)
 | 
						|
{
 | 
						|
    abi_long ret;
 | 
						|
    struct rusage rusage;
 | 
						|
 | 
						|
    ret = get_errno(getrusage(who, &rusage));
 | 
						|
    if (!is_error(ret)) {
 | 
						|
        host_to_target_rusage(target_addr, &rusage);
 | 
						|
    }
 | 
						|
    return ret;
 | 
						|
}
 | 
						|
 | 
						|
/* getrlimit(2) */
 | 
						|
static inline abi_long do_bsd_getrlimit(abi_long arg1, abi_ulong arg2)
 | 
						|
{
 | 
						|
    abi_long ret;
 | 
						|
    int resource = target_to_host_resource(arg1);
 | 
						|
    struct target_rlimit *target_rlim;
 | 
						|
    struct rlimit rlim;
 | 
						|
 | 
						|
    switch (resource) {
 | 
						|
    case RLIMIT_STACK:
 | 
						|
        rlim.rlim_cur = target_dflssiz;
 | 
						|
        rlim.rlim_max = target_maxssiz;
 | 
						|
        ret = 0;
 | 
						|
        break;
 | 
						|
 | 
						|
    case RLIMIT_DATA:
 | 
						|
        rlim.rlim_cur = target_dfldsiz;
 | 
						|
        rlim.rlim_max = target_maxdsiz;
 | 
						|
        ret = 0;
 | 
						|
        break;
 | 
						|
 | 
						|
    default:
 | 
						|
        ret = get_errno(getrlimit(resource, &rlim));
 | 
						|
        break;
 | 
						|
    }
 | 
						|
    if (!is_error(ret)) {
 | 
						|
        if (!lock_user_struct(VERIFY_WRITE, target_rlim, arg2, 0)) {
 | 
						|
            return -TARGET_EFAULT;
 | 
						|
        }
 | 
						|
        target_rlim->rlim_cur = host_to_target_rlim(rlim.rlim_cur);
 | 
						|
        target_rlim->rlim_max = host_to_target_rlim(rlim.rlim_max);
 | 
						|
        unlock_user_struct(target_rlim, arg2, 1);
 | 
						|
    }
 | 
						|
    return ret;
 | 
						|
}
 | 
						|
 | 
						|
/* setrlimit(2) */
 | 
						|
static inline abi_long do_bsd_setrlimit(abi_long arg1, abi_ulong arg2)
 | 
						|
{
 | 
						|
    abi_long ret;
 | 
						|
    int resource = target_to_host_resource(arg1);
 | 
						|
    struct target_rlimit *target_rlim;
 | 
						|
    struct rlimit rlim;
 | 
						|
 | 
						|
    if (RLIMIT_STACK == resource) {
 | 
						|
        /* XXX We should, maybe, allow the stack size to shrink */
 | 
						|
        ret = -TARGET_EPERM;
 | 
						|
    } else {
 | 
						|
        if (!lock_user_struct(VERIFY_READ, target_rlim, arg2, 1)) {
 | 
						|
            return -TARGET_EFAULT;
 | 
						|
        }
 | 
						|
        rlim.rlim_cur = target_to_host_rlim(target_rlim->rlim_cur);
 | 
						|
        rlim.rlim_max = target_to_host_rlim(target_rlim->rlim_max);
 | 
						|
        unlock_user_struct(target_rlim, arg2, 0);
 | 
						|
        ret = get_errno(setrlimit(resource, &rlim));
 | 
						|
    }
 | 
						|
    return ret;
 | 
						|
}
 | 
						|
 | 
						|
/* getpid(2) */
 | 
						|
static inline abi_long do_bsd_getpid(void)
 | 
						|
{
 | 
						|
    return get_errno(getpid());
 | 
						|
}
 | 
						|
 | 
						|
/* getppid(2) */
 | 
						|
static inline abi_long do_bsd_getppid(void)
 | 
						|
{
 | 
						|
    return get_errno(getppid());
 | 
						|
}
 | 
						|
 | 
						|
/* getuid(2) */
 | 
						|
static inline abi_long do_bsd_getuid(void)
 | 
						|
{
 | 
						|
    return get_errno(getuid());
 | 
						|
}
 | 
						|
 | 
						|
/* geteuid(2) */
 | 
						|
static inline abi_long do_bsd_geteuid(void)
 | 
						|
{
 | 
						|
    return get_errno(geteuid());
 | 
						|
}
 | 
						|
 | 
						|
/* getgid(2) */
 | 
						|
static inline abi_long do_bsd_getgid(void)
 | 
						|
{
 | 
						|
    return get_errno(getgid());
 | 
						|
}
 | 
						|
 | 
						|
/* getegid(2) */
 | 
						|
static inline abi_long do_bsd_getegid(void)
 | 
						|
{
 | 
						|
    return get_errno(getegid());
 | 
						|
}
 | 
						|
 | 
						|
/* setuid(2) */
 | 
						|
static inline abi_long do_bsd_setuid(abi_long arg1)
 | 
						|
{
 | 
						|
    return get_errno(setuid(arg1));
 | 
						|
}
 | 
						|
 | 
						|
/* seteuid(2) */
 | 
						|
static inline abi_long do_bsd_seteuid(abi_long arg1)
 | 
						|
{
 | 
						|
    return get_errno(seteuid(arg1));
 | 
						|
}
 | 
						|
 | 
						|
/* setgid(2) */
 | 
						|
static inline abi_long do_bsd_setgid(abi_long arg1)
 | 
						|
{
 | 
						|
    return get_errno(setgid(arg1));
 | 
						|
}
 | 
						|
 | 
						|
/* setegid(2) */
 | 
						|
static inline abi_long do_bsd_setegid(abi_long arg1)
 | 
						|
{
 | 
						|
    return get_errno(setegid(arg1));
 | 
						|
}
 | 
						|
 | 
						|
/* getpgid(2) */
 | 
						|
static inline abi_long do_bsd_getpgid(pid_t pid)
 | 
						|
{
 | 
						|
    return get_errno(getpgid(pid));
 | 
						|
}
 | 
						|
 | 
						|
/* setpgid(2) */
 | 
						|
static inline abi_long do_bsd_setpgid(int pid, int pgrp)
 | 
						|
{
 | 
						|
    return get_errno(setpgid(pid, pgrp));
 | 
						|
}
 | 
						|
 | 
						|
/* getpgrp(2) */
 | 
						|
static inline abi_long do_bsd_getpgrp(void)
 | 
						|
{
 | 
						|
    return get_errno(getpgrp());
 | 
						|
}
 | 
						|
 | 
						|
/* setreuid(2) */
 | 
						|
static inline abi_long do_bsd_setreuid(abi_long arg1, abi_long arg2)
 | 
						|
{
 | 
						|
    return get_errno(setreuid(arg1, arg2));
 | 
						|
}
 | 
						|
 | 
						|
/* setregid(2) */
 | 
						|
static inline abi_long do_bsd_setregid(abi_long arg1, abi_long arg2)
 | 
						|
{
 | 
						|
    return get_errno(setregid(arg1, arg2));
 | 
						|
}
 | 
						|
 | 
						|
/* setresgid(2) */
 | 
						|
static inline abi_long do_bsd_setresgid(gid_t rgid, gid_t egid, gid_t sgid)
 | 
						|
{
 | 
						|
    return get_errno(setresgid(rgid, egid, sgid));
 | 
						|
}
 | 
						|
 | 
						|
/* setresuid(2) */
 | 
						|
static inline abi_long do_bsd_setresuid(uid_t ruid, uid_t euid, uid_t suid)
 | 
						|
{
 | 
						|
    return get_errno(setresuid(ruid, euid, suid));
 | 
						|
}
 | 
						|
 | 
						|
/* getresuid(2) */
 | 
						|
static inline abi_long do_bsd_getresuid(abi_ulong arg1, abi_ulong arg2,
 | 
						|
        abi_ulong arg3)
 | 
						|
{
 | 
						|
    abi_long ret;
 | 
						|
    uid_t ruid, euid, suid;
 | 
						|
 | 
						|
    ret = get_errno(getresuid(&ruid, &euid, &suid));
 | 
						|
    if (is_error(ret)) {
 | 
						|
            return ret;
 | 
						|
    }
 | 
						|
    if (put_user_s32(ruid, arg1)) {
 | 
						|
        return -TARGET_EFAULT;
 | 
						|
    }
 | 
						|
    if (put_user_s32(euid, arg2)) {
 | 
						|
        return -TARGET_EFAULT;
 | 
						|
    }
 | 
						|
    if (put_user_s32(suid, arg3)) {
 | 
						|
        return -TARGET_EFAULT;
 | 
						|
    }
 | 
						|
    return ret;
 | 
						|
}
 | 
						|
 | 
						|
/* getresgid(2) */
 | 
						|
static inline abi_long do_bsd_getresgid(abi_ulong arg1, abi_ulong arg2,
 | 
						|
                                        abi_ulong arg3)
 | 
						|
{
 | 
						|
    abi_long ret;
 | 
						|
    uid_t ruid, euid, suid;
 | 
						|
 | 
						|
    ret = get_errno(getresgid(&ruid, &euid, &suid));
 | 
						|
    if (is_error(ret)) {
 | 
						|
            return ret;
 | 
						|
    }
 | 
						|
    if (put_user_s32(ruid, arg1)) {
 | 
						|
        return -TARGET_EFAULT;
 | 
						|
    }
 | 
						|
    if (put_user_s32(euid, arg2)) {
 | 
						|
        return -TARGET_EFAULT;
 | 
						|
    }
 | 
						|
    if (put_user_s32(suid, arg3)) {
 | 
						|
        return -TARGET_EFAULT;
 | 
						|
    }
 | 
						|
    return ret;
 | 
						|
}
 | 
						|
 | 
						|
/* getsid(2) */
 | 
						|
static inline abi_long do_bsd_getsid(abi_long arg1)
 | 
						|
{
 | 
						|
    return get_errno(getsid(arg1));
 | 
						|
}
 | 
						|
 | 
						|
/* setsid(2) */
 | 
						|
static inline abi_long do_bsd_setsid(void)
 | 
						|
{
 | 
						|
    return get_errno(setsid());
 | 
						|
}
 | 
						|
 | 
						|
/* issetugid(2) */
 | 
						|
static inline abi_long do_bsd_issetugid(void)
 | 
						|
{
 | 
						|
    return get_errno(issetugid());
 | 
						|
}
 | 
						|
 | 
						|
/* profil(2) */
 | 
						|
static inline abi_long do_bsd_profil(abi_long arg1, abi_long arg2,
 | 
						|
                                     abi_long arg3, abi_long arg4)
 | 
						|
{
 | 
						|
    return -TARGET_ENOSYS;
 | 
						|
}
 | 
						|
 | 
						|
/* ktrace(2) */
 | 
						|
static inline abi_long do_bsd_ktrace(abi_long arg1, abi_long arg2,
 | 
						|
                                     abi_long arg3, abi_long arg4)
 | 
						|
{
 | 
						|
    return -TARGET_ENOSYS;
 | 
						|
}
 | 
						|
 | 
						|
/* utrace(2) */
 | 
						|
static inline abi_long do_bsd_utrace(abi_long arg1, abi_long arg2)
 | 
						|
{
 | 
						|
    return -TARGET_ENOSYS;
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
/* ptrace(2) */
 | 
						|
static inline abi_long do_bsd_ptrace(abi_long arg1, abi_long arg2,
 | 
						|
        abi_long arg3, abi_long arg4)
 | 
						|
{
 | 
						|
    return -TARGET_ENOSYS;
 | 
						|
}
 | 
						|
 | 
						|
/* getpriority(2) */
 | 
						|
static inline abi_long do_bsd_getpriority(abi_long which, abi_long who)
 | 
						|
{
 | 
						|
    abi_long ret;
 | 
						|
    /*
 | 
						|
     * Note that negative values are valid for getpriority, so we must
 | 
						|
     * differentiate based on errno settings.
 | 
						|
     */
 | 
						|
    errno = 0;
 | 
						|
    ret = getpriority(which, who);
 | 
						|
    if (ret == -1 && errno != 0) {
 | 
						|
        return -host_to_target_errno(errno);
 | 
						|
    }
 | 
						|
 | 
						|
    return ret;
 | 
						|
}
 | 
						|
 | 
						|
/* setpriority(2) */
 | 
						|
static inline abi_long do_bsd_setpriority(abi_long which, abi_long who,
 | 
						|
                                          abi_long prio)
 | 
						|
{
 | 
						|
    return get_errno(setpriority(which, who, prio));
 | 
						|
}
 | 
						|
 | 
						|
#endif /* !BSD_PROC_H_ */
 |