2005-02-07 13:35:39 +01:00
|
|
|
#ifndef QEMU_H
|
|
|
|
#define QEMU_H
|
2003-02-18 23:55:36 +01:00
|
|
|
|
2003-09-30 23:04:53 +02:00
|
|
|
#include "cpu.h"
|
2014-03-28 19:42:10 +01:00
|
|
|
#include "exec/cpu_ldst.h"
|
2007-10-14 18:27:31 +02:00
|
|
|
|
2007-12-24 14:47:52 +01:00
|
|
|
#undef DEBUG_REMAP
|
|
|
|
|
2012-12-17 18:19:49 +01:00
|
|
|
#include "exec/user/abitypes.h"
|
2007-10-14 18:27:31 +02:00
|
|
|
|
|
|
|
#include "syscall_defs.h"
|
2016-02-01 19:38:42 +01:00
|
|
|
#include "target_syscall.h"
|
2003-03-23 02:06:05 +01:00
|
|
|
|
2021-09-08 17:43:57 +02:00
|
|
|
/*
|
|
|
|
* This is the size of the host kernel's sigset_t, needed where we make
|
2016-06-14 13:49:18 +02:00
|
|
|
* direct system calls that take a sigset_t pointer and a size.
|
|
|
|
*/
|
|
|
|
#define SIGSET_T_SIZE (_NSIG / 8)
|
|
|
|
|
2021-09-08 17:43:57 +02:00
|
|
|
/*
|
|
|
|
* This struct is used to hold certain information about the image.
|
2003-02-18 23:55:36 +01:00
|
|
|
* Basically, it replicates in user space what would be certain
|
|
|
|
* task_struct fields in the kernel
|
|
|
|
*/
|
|
|
|
struct image_info {
|
2010-07-27 19:25:30 +02:00
|
|
|
abi_ulong load_bias;
|
2007-10-14 18:27:31 +02:00
|
|
|
abi_ulong load_addr;
|
|
|
|
abi_ulong start_code;
|
|
|
|
abi_ulong end_code;
|
|
|
|
abi_ulong start_data;
|
|
|
|
abi_ulong end_data;
|
|
|
|
abi_ulong brk;
|
|
|
|
abi_ulong start_stack;
|
2010-06-16 14:03:51 +02:00
|
|
|
abi_ulong stack_limit;
|
2023-08-16 19:54:57 +02:00
|
|
|
abi_ulong vdso;
|
2007-10-14 18:27:31 +02:00
|
|
|
abi_ulong entry;
|
|
|
|
abi_ulong code_offset;
|
|
|
|
abi_ulong data_offset;
|
2009-04-07 08:57:11 +02:00
|
|
|
abi_ulong saved_auxv;
|
2012-01-28 20:12:14 +01:00
|
|
|
abi_ulong auxv_len;
|
2022-04-27 04:51:29 +02:00
|
|
|
abi_ulong argc;
|
|
|
|
abi_ulong argv;
|
|
|
|
abi_ulong envc;
|
|
|
|
abi_ulong envp;
|
2016-12-15 18:38:11 +01:00
|
|
|
abi_ulong file_string;
|
2012-03-30 19:02:50 +02:00
|
|
|
uint32_t elf_flags;
|
2021-09-08 17:43:57 +02:00
|
|
|
int personality;
|
linux-user: fix ELF load alignment error
When we try to use some targets on ppc64, it can happen the target
doesn't support the host page size to align ELF load sections and
fails with:
ELF load command alignment not page-aligned
Since commit a70daba3771 ("linux-user: Tell guest about big host
page sizes") the host page size is used to align ELF sections, but
this doesn't work if the alignment required by the load section is
smaller than the host one. For these cases, we continue to use the
TARGET_PAGE_SIZE instead of the host one.
I have tested this change on ppc64, and it fixes qemu linux-user for:
s390x, m68k, i386, arm, aarch64, hppa
and I have tested it doesn't break the following targets:
x86_64, mips64el, sh4
mips and mipsel abort, but I think for another reason.
Signed-off-by: Laurent Vivier <laurent@vivier.eu>
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
[lv: fixed "info->alignment = 0"]
Message-Id: <20180716195349.29959-1-laurent@vivier.eu>
2018-07-16 21:53:49 +02:00
|
|
|
abi_ulong alignment;
|
2022-08-11 08:00:52 +02:00
|
|
|
bool exec_stack;
|
2018-04-30 10:03:41 +02:00
|
|
|
|
2022-04-27 04:51:29 +02:00
|
|
|
/* Generic semihosting knows about these pointers. */
|
|
|
|
abi_ulong arg_strings; /* strings for argv */
|
|
|
|
abi_ulong env_strings; /* strings for envp; ends arg_strings */
|
|
|
|
|
2018-04-30 10:03:41 +02:00
|
|
|
/* The fields below are used in FDPIC mode. */
|
2011-02-07 07:05:50 +01:00
|
|
|
abi_ulong loadmap_addr;
|
|
|
|
uint16_t nsegs;
|
2021-09-08 17:43:57 +02:00
|
|
|
void *loadsegs;
|
2011-02-07 07:05:50 +01:00
|
|
|
abi_ulong pt_dynamic_addr;
|
2018-04-30 10:03:43 +02:00
|
|
|
abi_ulong interpreter_loadmap_addr;
|
|
|
|
abi_ulong interpreter_pt_dynamic_addr;
|
2011-02-07 07:05:50 +01:00
|
|
|
struct image_info *other_info;
|
2020-10-21 19:37:47 +02:00
|
|
|
|
|
|
|
/* For target-specific processing of NT_GNU_PROPERTY_TYPE_0. */
|
|
|
|
uint32_t note_flags;
|
|
|
|
|
2018-10-22 16:43:40 +02:00
|
|
|
#ifdef TARGET_MIPS
|
|
|
|
int fp_abi;
|
|
|
|
int interp_fp_abi;
|
|
|
|
#endif
|
2003-02-18 23:55:36 +01:00
|
|
|
};
|
|
|
|
|
2003-06-15 22:05:50 +02:00
|
|
|
#ifdef TARGET_I386
|
2003-03-29 17:53:14 +01:00
|
|
|
/* Information about the current linux thread */
|
|
|
|
struct vm86_saved_state {
|
|
|
|
uint32_t eax; /* return code */
|
|
|
|
uint32_t ebx;
|
|
|
|
uint32_t ecx;
|
|
|
|
uint32_t edx;
|
|
|
|
uint32_t esi;
|
|
|
|
uint32_t edi;
|
|
|
|
uint32_t ebp;
|
|
|
|
uint32_t esp;
|
|
|
|
uint32_t eflags;
|
|
|
|
uint32_t eip;
|
|
|
|
uint16_t cs, ss, ds, es, fs, gs;
|
|
|
|
};
|
2003-06-15 22:05:50 +02:00
|
|
|
#endif
|
2003-03-29 17:53:14 +01:00
|
|
|
|
2013-09-03 21:12:17 +02:00
|
|
|
#if defined(TARGET_ARM) && defined(TARGET_ABI32)
|
2004-02-16 22:47:43 +01:00
|
|
|
/* FPU emulator */
|
|
|
|
#include "nwfpe/fpa11.h"
|
|
|
|
#endif
|
|
|
|
|
2008-05-31 18:11:38 +02:00
|
|
|
struct emulated_sigtable {
|
|
|
|
int pending; /* true if signal is pending */
|
2016-05-27 16:51:52 +02:00
|
|
|
target_siginfo_t info;
|
2008-05-31 18:11:38 +02:00
|
|
|
};
|
|
|
|
|
2003-03-29 17:53:14 +01:00
|
|
|
typedef struct TaskState {
|
2009-04-07 08:57:11 +02:00
|
|
|
pid_t ts_tid; /* tid (or pid) of this task */
|
2004-02-16 22:47:43 +01:00
|
|
|
#ifdef TARGET_ARM
|
2013-09-03 21:12:17 +02:00
|
|
|
# ifdef TARGET_ABI32
|
2004-02-16 22:47:43 +01:00
|
|
|
/* FPA state */
|
|
|
|
FPA11 fpa;
|
2013-09-03 21:12:17 +02:00
|
|
|
# endif
|
2021-01-08 23:42:52 +01:00
|
|
|
#endif
|
|
|
|
#if defined(TARGET_ARM) || defined(TARGET_RISCV)
|
2005-04-23 20:25:41 +02:00
|
|
|
int swi_errno;
|
2004-02-16 22:47:43 +01:00
|
|
|
#endif
|
2007-04-06 10:56:50 +02:00
|
|
|
#if defined(TARGET_I386) && !defined(TARGET_X86_64)
|
2007-10-14 18:27:31 +02:00
|
|
|
abi_ulong target_v86;
|
2003-03-29 17:53:14 +01:00
|
|
|
struct vm86_saved_state vm86_saved_regs;
|
2003-05-14 23:48:51 +02:00
|
|
|
struct target_vm86plus_struct vm86plus;
|
2003-05-10 15:14:52 +02:00
|
|
|
uint32_t v86flags;
|
|
|
|
uint32_t v86mask;
|
2006-10-22 02:18:54 +02:00
|
|
|
#endif
|
2009-03-07 16:24:59 +01:00
|
|
|
abi_ulong child_tidptr;
|
2006-10-22 02:18:54 +02:00
|
|
|
#ifdef TARGET_M68K
|
2013-07-16 19:44:55 +02:00
|
|
|
abi_ulong tp_value;
|
2007-05-26 17:09:38 +02:00
|
|
|
#endif
|
2021-01-08 23:42:52 +01:00
|
|
|
#if defined(TARGET_ARM) || defined(TARGET_M68K) || defined(TARGET_RISCV)
|
2007-05-26 17:09:38 +02:00
|
|
|
/* Extra fields for semihosted binaries. */
|
2016-07-04 14:06:35 +02:00
|
|
|
abi_ulong heap_base;
|
|
|
|
abi_ulong heap_limit;
|
2003-06-15 22:05:50 +02:00
|
|
|
#endif
|
2016-07-04 14:06:35 +02:00
|
|
|
abi_ulong stack_base;
|
2003-03-29 17:53:14 +01:00
|
|
|
int used; /* non zero if used */
|
2006-06-17 20:30:42 +02:00
|
|
|
struct image_info *info;
|
2009-04-07 08:57:11 +02:00
|
|
|
struct linux_binprm *bprm;
|
2008-05-31 18:11:38 +02:00
|
|
|
|
2016-05-27 16:51:53 +02:00
|
|
|
struct emulated_sigtable sync_signal;
|
2008-05-31 18:11:38 +02:00
|
|
|
struct emulated_sigtable sigtab[TARGET_NSIG];
|
2021-09-08 17:43:57 +02:00
|
|
|
/*
|
|
|
|
* This thread's signal mask, as requested by the guest program.
|
2016-05-27 16:51:49 +02:00
|
|
|
* The actual signal mask of this thread may differ:
|
|
|
|
* + we don't let SIGSEGV and SIGBUS be blocked while running guest code
|
|
|
|
* + sometimes we block all signals to avoid races
|
|
|
|
*/
|
|
|
|
sigset_t signal_mask;
|
2021-09-08 17:43:57 +02:00
|
|
|
/*
|
|
|
|
* The signal mask imposed by a guest sigsuspend syscall, if we are
|
2016-05-27 16:51:49 +02:00
|
|
|
* currently in the middle of such a syscall
|
|
|
|
*/
|
|
|
|
sigset_t sigsuspend_mask;
|
|
|
|
/* Nonzero if we're leaving a sigsuspend and sigsuspend_mask is valid. */
|
|
|
|
int in_sigsuspend;
|
|
|
|
|
2021-09-08 17:43:57 +02:00
|
|
|
/*
|
|
|
|
* Nonzero if process_pending_signals() needs to do something (either
|
2016-05-27 16:51:49 +02:00
|
|
|
* handle a pending signal or unblock signals).
|
|
|
|
* This flag is written from a signal handler so should be accessed via
|
2020-09-23 12:56:46 +02:00
|
|
|
* the qatomic_read() and qatomic_set() functions. (It is not accessed
|
2016-05-27 16:51:49 +02:00
|
|
|
* from multiple threads.)
|
|
|
|
*/
|
|
|
|
int signal_pending;
|
|
|
|
|
2019-07-25 15:16:45 +02:00
|
|
|
/* This thread's sigaltstack, if it has one */
|
|
|
|
struct target_sigaltstack sigaltstack_used;
|
2022-01-28 01:12:51 +01:00
|
|
|
|
|
|
|
/* Start time of task after system boot in clock ticks */
|
|
|
|
uint64_t start_boottime;
|
2022-01-14 16:37:30 +01:00
|
|
|
} TaskState;
|
2003-03-29 17:53:14 +01:00
|
|
|
|
2024-03-05 13:09:39 +01:00
|
|
|
static inline TaskState *get_task_state(CPUState *cs)
|
|
|
|
{
|
|
|
|
return cs->opaque;
|
|
|
|
}
|
|
|
|
|
2021-09-08 17:44:03 +02:00
|
|
|
abi_long do_brk(abi_ulong new_brk);
|
2023-06-30 20:04:16 +02:00
|
|
|
int do_guest_openat(CPUArchState *cpu_env, int dirfd, const char *pathname,
|
2023-06-30 20:04:17 +02:00
|
|
|
int flags, mode_t mode, bool safe);
|
2023-06-30 20:04:16 +02:00
|
|
|
ssize_t do_guest_readlink(const char *pathname, char *buf, size_t bufsiz);
|
2003-05-10 15:14:52 +02:00
|
|
|
|
2004-02-22 14:40:13 +01:00
|
|
|
/* user access */
|
|
|
|
|
2023-04-22 12:03:13 +02:00
|
|
|
#define VERIFY_NONE 0
|
2021-02-12 19:48:38 +01:00
|
|
|
#define VERIFY_READ PAGE_READ
|
|
|
|
#define VERIFY_WRITE (PAGE_READ | PAGE_WRITE)
|
2004-02-22 14:40:13 +01:00
|
|
|
|
2021-02-12 19:48:47 +01:00
|
|
|
static inline bool access_ok_untagged(int type, abi_ulong addr, abi_ulong size)
|
2007-11-14 11:51:00 +01:00
|
|
|
{
|
2021-02-12 19:48:45 +01:00
|
|
|
if (size == 0
|
2021-02-12 19:48:46 +01:00
|
|
|
? !guest_addr_valid_untagged(addr)
|
|
|
|
: !guest_range_valid_untagged(addr, size)) {
|
2021-02-12 19:48:37 +01:00
|
|
|
return false;
|
|
|
|
}
|
2023-07-07 22:40:52 +02:00
|
|
|
return page_check_range((target_ulong)addr, size, type);
|
2007-11-14 11:51:00 +01:00
|
|
|
}
|
2004-02-22 14:40:13 +01:00
|
|
|
|
2021-02-12 19:48:47 +01:00
|
|
|
static inline bool access_ok(CPUState *cpu, int type,
|
|
|
|
abi_ulong addr, abi_ulong size)
|
|
|
|
{
|
|
|
|
return access_ok_untagged(type, cpu_untagged_addr(cpu, addr), size);
|
|
|
|
}
|
|
|
|
|
2013-01-05 01:39:31 +01:00
|
|
|
/* NOTE __get_user and __put_user use host pointers and don't check access.
|
|
|
|
These are usually used to access struct data members once the struct has
|
|
|
|
been locked - usually with lock_user_struct. */
|
|
|
|
|
2018-10-09 18:18:14 +02:00
|
|
|
/*
|
|
|
|
* Tricky points:
|
|
|
|
* - Use __builtin_choose_expr to avoid type promotion from ?:,
|
|
|
|
* - Invalid sizes result in a compile time error stemming from
|
|
|
|
* the fact that abort has no parameters.
|
|
|
|
* - It's easier to use the endian-specific unaligned load/store
|
|
|
|
* functions than host-endian unaligned load/store plus tswapN.
|
|
|
|
* - The pragmas are necessary only to silence a clang false-positive
|
|
|
|
* warning: see https://bugs.llvm.org/show_bug.cgi?id=39113 .
|
|
|
|
* - gcc has bugs in its _Pragma() support in some versions, eg
|
|
|
|
* https://gcc.gnu.org/bugzilla/show_bug.cgi?id=83256 -- so we only
|
|
|
|
* include the warning-suppression pragmas for clang
|
|
|
|
*/
|
2018-11-30 09:23:16 +01:00
|
|
|
#if defined(__clang__) && __has_warning("-Waddress-of-packed-member")
|
2018-10-09 18:18:14 +02:00
|
|
|
#define PRAGMA_DISABLE_PACKED_WARNING \
|
|
|
|
_Pragma("GCC diagnostic push"); \
|
|
|
|
_Pragma("GCC diagnostic ignored \"-Waddress-of-packed-member\"")
|
|
|
|
|
|
|
|
#define PRAGMA_REENABLE_PACKED_WARNING \
|
|
|
|
_Pragma("GCC diagnostic pop")
|
|
|
|
|
|
|
|
#else
|
|
|
|
#define PRAGMA_DISABLE_PACKED_WARNING
|
|
|
|
#define PRAGMA_REENABLE_PACKED_WARNING
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#define __put_user_e(x, hptr, e) \
|
|
|
|
do { \
|
|
|
|
PRAGMA_DISABLE_PACKED_WARNING; \
|
|
|
|
(__builtin_choose_expr(sizeof(*(hptr)) == 1, stb_p, \
|
|
|
|
__builtin_choose_expr(sizeof(*(hptr)) == 2, stw_##e##_p, \
|
|
|
|
__builtin_choose_expr(sizeof(*(hptr)) == 4, stl_##e##_p, \
|
|
|
|
__builtin_choose_expr(sizeof(*(hptr)) == 8, stq_##e##_p, abort)))) \
|
|
|
|
((hptr), (x)), (void)0); \
|
|
|
|
PRAGMA_REENABLE_PACKED_WARNING; \
|
|
|
|
} while (0)
|
|
|
|
|
|
|
|
#define __get_user_e(x, hptr, e) \
|
|
|
|
do { \
|
|
|
|
PRAGMA_DISABLE_PACKED_WARNING; \
|
|
|
|
((x) = (typeof(*hptr))( \
|
|
|
|
__builtin_choose_expr(sizeof(*(hptr)) == 1, ldub_p, \
|
|
|
|
__builtin_choose_expr(sizeof(*(hptr)) == 2, lduw_##e##_p, \
|
|
|
|
__builtin_choose_expr(sizeof(*(hptr)) == 4, ldl_##e##_p, \
|
|
|
|
__builtin_choose_expr(sizeof(*(hptr)) == 8, ldq_##e##_p, abort)))) \
|
|
|
|
(hptr)), (void)0); \
|
|
|
|
PRAGMA_REENABLE_PACKED_WARNING; \
|
|
|
|
} while (0)
|
|
|
|
|
2013-01-05 01:39:31 +01:00
|
|
|
|
2022-03-23 16:57:18 +01:00
|
|
|
#if TARGET_BIG_ENDIAN
|
2013-01-05 01:39:31 +01:00
|
|
|
# define __put_user(x, hptr) __put_user_e(x, hptr, be)
|
|
|
|
# define __get_user(x, hptr) __get_user_e(x, hptr, be)
|
|
|
|
#else
|
|
|
|
# define __put_user(x, hptr) __put_user_e(x, hptr, le)
|
|
|
|
# define __get_user(x, hptr) __get_user_e(x, hptr, le)
|
|
|
|
#endif
|
2004-02-22 14:40:13 +01:00
|
|
|
|
2007-11-11 15:26:47 +01:00
|
|
|
/* put_user()/get_user() take a guest address and check access */
|
|
|
|
/* These are usually used to access an atomic data type, such as an int,
|
|
|
|
* that has been passed by address. These internally perform locking
|
|
|
|
* and unlocking on the data type.
|
|
|
|
*/
|
|
|
|
#define put_user(x, gaddr, target_type) \
|
|
|
|
({ \
|
|
|
|
abi_ulong __gaddr = (gaddr); \
|
|
|
|
target_type *__hptr; \
|
2014-04-22 14:40:50 +02:00
|
|
|
abi_long __ret = 0; \
|
2007-11-11 15:26:47 +01:00
|
|
|
if ((__hptr = lock_user(VERIFY_WRITE, __gaddr, sizeof(target_type), 0))) { \
|
2014-04-22 14:40:50 +02:00
|
|
|
__put_user((x), __hptr); \
|
2007-11-11 15:26:47 +01:00
|
|
|
unlock_user(__hptr, __gaddr, sizeof(target_type)); \
|
|
|
|
} else \
|
|
|
|
__ret = -TARGET_EFAULT; \
|
|
|
|
__ret; \
|
2004-02-22 14:40:13 +01:00
|
|
|
})
|
|
|
|
|
2007-11-11 15:26:47 +01:00
|
|
|
#define get_user(x, gaddr, target_type) \
|
|
|
|
({ \
|
|
|
|
abi_ulong __gaddr = (gaddr); \
|
|
|
|
target_type *__hptr; \
|
2014-04-22 14:40:50 +02:00
|
|
|
abi_long __ret = 0; \
|
2007-11-11 15:26:47 +01:00
|
|
|
if ((__hptr = lock_user(VERIFY_READ, __gaddr, sizeof(target_type), 1))) { \
|
2014-04-22 14:40:50 +02:00
|
|
|
__get_user((x), __hptr); \
|
2007-11-11 15:26:47 +01:00
|
|
|
unlock_user(__hptr, __gaddr, 0); \
|
2007-11-16 11:46:05 +01:00
|
|
|
} else { \
|
|
|
|
/* avoid warning */ \
|
|
|
|
(x) = 0; \
|
2007-11-11 15:26:47 +01:00
|
|
|
__ret = -TARGET_EFAULT; \
|
2007-11-16 11:46:05 +01:00
|
|
|
} \
|
2007-11-11 15:26:47 +01:00
|
|
|
__ret; \
|
2004-02-22 14:40:13 +01:00
|
|
|
})
|
|
|
|
|
2007-11-16 11:46:05 +01:00
|
|
|
#define put_user_ual(x, gaddr) put_user((x), (gaddr), abi_ulong)
|
|
|
|
#define put_user_sal(x, gaddr) put_user((x), (gaddr), abi_long)
|
|
|
|
#define put_user_u64(x, gaddr) put_user((x), (gaddr), uint64_t)
|
|
|
|
#define put_user_s64(x, gaddr) put_user((x), (gaddr), int64_t)
|
|
|
|
#define put_user_u32(x, gaddr) put_user((x), (gaddr), uint32_t)
|
|
|
|
#define put_user_s32(x, gaddr) put_user((x), (gaddr), int32_t)
|
|
|
|
#define put_user_u16(x, gaddr) put_user((x), (gaddr), uint16_t)
|
|
|
|
#define put_user_s16(x, gaddr) put_user((x), (gaddr), int16_t)
|
|
|
|
#define put_user_u8(x, gaddr) put_user((x), (gaddr), uint8_t)
|
|
|
|
#define put_user_s8(x, gaddr) put_user((x), (gaddr), int8_t)
|
|
|
|
|
|
|
|
#define get_user_ual(x, gaddr) get_user((x), (gaddr), abi_ulong)
|
|
|
|
#define get_user_sal(x, gaddr) get_user((x), (gaddr), abi_long)
|
|
|
|
#define get_user_u64(x, gaddr) get_user((x), (gaddr), uint64_t)
|
|
|
|
#define get_user_s64(x, gaddr) get_user((x), (gaddr), int64_t)
|
|
|
|
#define get_user_u32(x, gaddr) get_user((x), (gaddr), uint32_t)
|
|
|
|
#define get_user_s32(x, gaddr) get_user((x), (gaddr), int32_t)
|
|
|
|
#define get_user_u16(x, gaddr) get_user((x), (gaddr), uint16_t)
|
|
|
|
#define get_user_s16(x, gaddr) get_user((x), (gaddr), int16_t)
|
|
|
|
#define get_user_u8(x, gaddr) get_user((x), (gaddr), uint8_t)
|
|
|
|
#define get_user_s8(x, gaddr) get_user((x), (gaddr), int8_t)
|
|
|
|
|
2007-11-11 15:26:47 +01:00
|
|
|
/* copy_from_user() and copy_to_user() are usually used to copy data
|
|
|
|
* buffers between the target and host. These internally perform
|
|
|
|
* locking/unlocking of the memory.
|
|
|
|
*/
|
2021-03-15 21:40:04 +01:00
|
|
|
int copy_from_user(void *hptr, abi_ulong gaddr, ssize_t len);
|
|
|
|
int copy_to_user(abi_ulong gaddr, void *hptr, ssize_t len);
|
2007-11-11 15:26:47 +01:00
|
|
|
|
2006-03-25 20:31:22 +01:00
|
|
|
/* Functions for accessing guest memory. The tget and tput functions
|
2013-09-12 19:57:15 +02:00
|
|
|
read/write single values, byteswapping as necessary. The lock_user function
|
2006-03-25 20:31:22 +01:00
|
|
|
gets a pointer to a contiguous area of guest memory, but does not perform
|
2013-09-12 19:57:15 +02:00
|
|
|
any byteswapping. lock_user may return either a pointer to the guest
|
2006-03-25 20:31:22 +01:00
|
|
|
memory, or a temporary buffer. */
|
|
|
|
|
|
|
|
/* Lock an area of guest memory into the host. If copy is true then the
|
|
|
|
host area will have the same contents as the guest. */
|
2021-03-15 21:40:04 +01:00
|
|
|
void *lock_user(int type, abi_ulong guest_addr, ssize_t len, bool copy);
|
2004-02-22 14:40:13 +01:00
|
|
|
|
2007-11-11 15:26:47 +01:00
|
|
|
/* Unlock an area of guest memory. The first LEN bytes must be
|
2008-06-03 21:51:57 +02:00
|
|
|
flushed back to guest memory. host_ptr = NULL is explicitly
|
2007-11-11 15:26:47 +01:00
|
|
|
allowed and does nothing. */
|
2021-02-12 19:48:48 +01:00
|
|
|
#ifndef DEBUG_REMAP
|
2021-03-15 21:40:04 +01:00
|
|
|
static inline void unlock_user(void *host_ptr, abi_ulong guest_addr,
|
|
|
|
ssize_t len)
|
|
|
|
{
|
|
|
|
/* no-op */
|
|
|
|
}
|
2021-02-12 19:48:48 +01:00
|
|
|
#else
|
2021-03-15 21:40:04 +01:00
|
|
|
void unlock_user(void *host_ptr, abi_ulong guest_addr, ssize_t len);
|
2006-03-25 20:31:22 +01:00
|
|
|
#endif
|
2004-02-22 14:40:13 +01:00
|
|
|
|
2007-11-11 15:26:47 +01:00
|
|
|
/* Return the length of a string in target memory or -TARGET_EFAULT if
|
|
|
|
access error. */
|
2021-02-12 19:48:49 +01:00
|
|
|
ssize_t target_strlen(abi_ulong gaddr);
|
2006-03-25 20:31:22 +01:00
|
|
|
|
|
|
|
/* Like lock_user but for null terminated strings. */
|
2021-02-12 19:48:48 +01:00
|
|
|
void *lock_user_string(abi_ulong guest_addr);
|
2004-02-22 14:40:13 +01:00
|
|
|
|
2013-09-12 19:57:41 +02:00
|
|
|
/* Helper macros for locking/unlocking a target struct. */
|
2007-11-11 15:26:47 +01:00
|
|
|
#define lock_user_struct(type, host_ptr, guest_addr, copy) \
|
|
|
|
(host_ptr = lock_user(type, guest_addr, sizeof(*host_ptr), copy))
|
|
|
|
#define unlock_user_struct(host_ptr, guest_addr, copy) \
|
2006-03-25 20:31:22 +01:00
|
|
|
unlock_user(host_ptr, guest_addr, (copy) ? sizeof(*host_ptr) : 0)
|
|
|
|
|
2005-02-07 13:35:39 +01:00
|
|
|
#endif /* QEMU_H */
|