0a7f82da7d
--HG-- extra : convert_revision : 72eced315bbb331d3068279e60f1f0a390eb687a
1845 lines
59 KiB
C++
1845 lines
59 KiB
C++
/*
|
|
* Copyright (c) 2003 The Regents of The University of Michigan
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions are
|
|
* met: redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer;
|
|
* redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution;
|
|
* neither the name of the copyright holders nor the names of its
|
|
* contributors may be used to endorse or promote products derived from
|
|
* this software without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
|
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
#include <errno.h>
|
|
#include <unistd.h>
|
|
#include <sys/types.h>
|
|
#include <sys/stat.h>
|
|
#include <string.h> // for memset()
|
|
#include <dirent.h>
|
|
|
|
#include "sim/host.hh"
|
|
#include "cpu/base_cpu.hh"
|
|
#include "mem/functional_mem/functional_memory.hh"
|
|
#include "sim/prog.hh"
|
|
#include "cpu/exec_context.hh"
|
|
#include "sim/fake_syscall.hh"
|
|
#include "sim/sim_events.hh"
|
|
|
|
#include "targetarch/osf_syscalls.h"
|
|
#include "sim/universe.hh" // for curTick & ticksPerSecond
|
|
|
|
#include "base/trace.hh"
|
|
|
|
using namespace std;
|
|
|
|
//
|
|
// System call descriptor
|
|
//
|
|
class SyscallDesc {
|
|
|
|
public:
|
|
|
|
typedef int (*FuncPtr)(SyscallDesc *, int num,
|
|
Process *, ExecContext *);
|
|
|
|
const char *name;
|
|
FuncPtr funcPtr;
|
|
int flags;
|
|
|
|
enum Flags {
|
|
SuppressReturnValue = 1
|
|
};
|
|
|
|
SyscallDesc(const char *_name, FuncPtr _funcPtr, int _flags = 0)
|
|
: name(_name), funcPtr(_funcPtr), flags(_flags)
|
|
{
|
|
}
|
|
|
|
int doFunc(int num, Process *proc, ExecContext *xc)
|
|
{
|
|
return (*funcPtr)(this, num, proc, xc);
|
|
}
|
|
};
|
|
|
|
|
|
class BaseBufferArg {
|
|
|
|
public:
|
|
|
|
BaseBufferArg(Addr _addr, int _size) : addr(_addr), size(_size)
|
|
{
|
|
bufPtr = new uint8_t[size];
|
|
// clear out buffer: in case we only partially populate this,
|
|
// and then do a copyOut(), we want to make sure we don't
|
|
// introduce any random junk into the simulated address space
|
|
memset(bufPtr, 0, size);
|
|
}
|
|
|
|
virtual ~BaseBufferArg() { delete [] bufPtr; }
|
|
|
|
//
|
|
// copy data into simulator space (read from target memory)
|
|
//
|
|
virtual bool copyIn(FunctionalMemory *mem)
|
|
{
|
|
mem->access(Read, addr, bufPtr, size);
|
|
return true; // no EFAULT detection for now
|
|
}
|
|
|
|
//
|
|
// copy data out of simulator space (write to target memory)
|
|
//
|
|
virtual bool copyOut(FunctionalMemory *mem)
|
|
{
|
|
mem->access(Write, addr, bufPtr, size);
|
|
return true; // no EFAULT detection for now
|
|
}
|
|
|
|
protected:
|
|
Addr addr;
|
|
int size;
|
|
uint8_t *bufPtr;
|
|
};
|
|
|
|
|
|
class BufferArg : public BaseBufferArg
|
|
{
|
|
public:
|
|
BufferArg(Addr _addr, int _size) : BaseBufferArg(_addr, _size) { }
|
|
void *bufferPtr() { return bufPtr; }
|
|
};
|
|
|
|
template <class T>
|
|
class TypedBufferArg : public BaseBufferArg
|
|
{
|
|
public:
|
|
// user can optionally specify a specific number of bytes to
|
|
// allocate to deal with those structs that have variable-size
|
|
// arrays at the end
|
|
TypedBufferArg(Addr _addr, int _size = sizeof(T))
|
|
: BaseBufferArg(_addr, _size)
|
|
{ }
|
|
|
|
// type case
|
|
operator T*() { return (T *)bufPtr; }
|
|
|
|
// dereference operators
|
|
T& operator*() { return *((T *)bufPtr); }
|
|
T* operator->() { return (T *)bufPtr; }
|
|
T& operator[](int i) { return ((T *)bufPtr)[i]; }
|
|
};
|
|
|
|
|
|
static IntReg
|
|
getArg(ExecContext *xc, int i)
|
|
{
|
|
return xc->regs.intRegFile[ArgumentReg0 + i];
|
|
}
|
|
|
|
|
|
//
|
|
// used to shift args for indirect syscall
|
|
//
|
|
static void
|
|
setArg(ExecContext *xc, int i, IntReg val)
|
|
{
|
|
xc->regs.intRegFile[ArgumentReg0 + i] = val;
|
|
}
|
|
|
|
|
|
static void
|
|
set_return_value(ExecContext *xc, int64_t return_value)
|
|
{
|
|
// check for error condition. Alpha syscall convention is to
|
|
// indicate success/failure in reg a3 (r19) and put the
|
|
// return value itself in the standard return value reg (v0).
|
|
const int RegA3 = 19; // only place this is used
|
|
if (return_value >= 0) {
|
|
// no error
|
|
xc->regs.intRegFile[RegA3] = 0;
|
|
xc->regs.intRegFile[ReturnValueReg] = return_value;
|
|
} else {
|
|
// got an error, return details
|
|
xc->regs.intRegFile[RegA3] = (IntReg) -1;
|
|
xc->regs.intRegFile[ReturnValueReg] = -return_value;
|
|
}
|
|
}
|
|
|
|
|
|
int
|
|
getpagesizeFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
return VMPageSize;
|
|
}
|
|
|
|
|
|
int
|
|
obreakFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
// change brk addr to first arg
|
|
process->brk_point = getArg(xc, 0);
|
|
return process->brk_point;
|
|
}
|
|
|
|
|
|
int
|
|
ioctlFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
int fd = getArg(xc, 0);
|
|
unsigned req = getArg(xc, 1);
|
|
|
|
DPRINTFR(SyscallVerbose, "ioctl(%d, 0x%x, ...)\n", fd, req);
|
|
|
|
if (fd < 0 || process->sim_fd(fd) < 0) {
|
|
// doesn't map to any simulator fd: not a valid target fd
|
|
return -EBADF;
|
|
}
|
|
|
|
switch (req) {
|
|
case OSF::TIOCISATTY:
|
|
case OSF::TIOCGETP:
|
|
case OSF::TIOCSETP:
|
|
case OSF::TIOCSETN:
|
|
case OSF::TIOCSETC:
|
|
case OSF::TIOCGETC:
|
|
return -ENOTTY;
|
|
|
|
default:
|
|
fatal("Unsupported ioctl call: ioctl(%d, 0x%x, ...)\n", fd, req);
|
|
}
|
|
}
|
|
|
|
|
|
int
|
|
openFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
string path;
|
|
|
|
if (xc->mem->readString(path, getArg(xc, 0)) != No_Fault)
|
|
return -EFAULT;
|
|
|
|
if (path == "/dev/sysdev0") {
|
|
// This is a memory-mapped high-resolution timer device on Alpha.
|
|
// We don't support it, so just punt.
|
|
DCOUT(SyscallWarnings) << "Ignoring open(" << path << ", ...)" << endl;
|
|
return -ENOENT;
|
|
}
|
|
|
|
int osfFlags = getArg(xc, 1);
|
|
int mode = getArg(xc, 2);
|
|
int hostFlags = 0;
|
|
|
|
// translate open flags
|
|
for (int i = 0; i < OSF::NUM_OPEN_FLAGS; i++) {
|
|
if (osfFlags & OSF::openFlagTable[i].osfFlag) {
|
|
osfFlags &= ~OSF::openFlagTable[i].osfFlag;
|
|
hostFlags |= OSF::openFlagTable[i].hostFlag;
|
|
}
|
|
}
|
|
|
|
// any target flags left?
|
|
if (osfFlags != 0)
|
|
cerr << "Syscall: open: cannot decode flags: " << osfFlags << endl;
|
|
|
|
#ifdef __CYGWIN32__
|
|
hostFlags |= O_BINARY;
|
|
#endif
|
|
|
|
// open the file
|
|
int fd = open(path.c_str(), hostFlags, mode);
|
|
|
|
return (fd == -1) ? -errno : process->open_fd(fd);
|
|
}
|
|
|
|
|
|
int
|
|
closeFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
int fd = process->sim_fd(getArg(xc, 0));
|
|
return close(fd);
|
|
}
|
|
|
|
|
|
int
|
|
readFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
int fd = process->sim_fd(getArg(xc, 0));
|
|
int nbytes = getArg(xc, 2);
|
|
BufferArg bufArg(getArg(xc, 1), nbytes);
|
|
|
|
int bytes_read = read(fd, bufArg.bufferPtr(), nbytes);
|
|
|
|
if (bytes_read != -1)
|
|
bufArg.copyOut(xc->mem);
|
|
|
|
return bytes_read;
|
|
}
|
|
|
|
int
|
|
writeFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
int fd = process->sim_fd(getArg(xc, 0));
|
|
int nbytes = getArg(xc, 2);
|
|
BufferArg bufArg(getArg(xc, 1), nbytes);
|
|
|
|
bufArg.copyIn(xc->mem);
|
|
|
|
int bytes_written = write(fd, bufArg.bufferPtr(), nbytes);
|
|
|
|
fsync(fd);
|
|
|
|
return bytes_written;
|
|
}
|
|
|
|
|
|
int
|
|
lseekFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
int fd = process->sim_fd(getArg(xc, 0));
|
|
uint64_t offs = getArg(xc, 1);
|
|
int whence = getArg(xc, 2);
|
|
|
|
off_t result = lseek(fd, offs, whence);
|
|
|
|
return (result == (off_t)-1) ? -errno : result;
|
|
}
|
|
|
|
static
|
|
void
|
|
copyOutStatBuf(FunctionalMemory *mem, Addr addr, struct stat *host)
|
|
{
|
|
TypedBufferArg<OSF::F64_stat> tgt(addr);
|
|
|
|
tgt->st_dev = host->st_dev;
|
|
tgt->st_ino = host->st_ino;
|
|
tgt->st_mode = host->st_mode;
|
|
tgt->st_nlink = host->st_nlink;
|
|
tgt->st_uid = host->st_uid;
|
|
tgt->st_gid = host->st_gid;
|
|
tgt->st_rdev = host->st_rdev;
|
|
tgt->st_size = host->st_size;
|
|
tgt->st_atimeX = host->st_atime;
|
|
tgt->st_mtimeX = host->st_mtime;
|
|
tgt->st_ctimeX = host->st_ctime;
|
|
tgt->st_blksize = host->st_blksize;
|
|
tgt->st_blocks = host->st_blocks;
|
|
|
|
tgt.copyOut(mem);
|
|
}
|
|
|
|
int
|
|
statFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
string path;
|
|
|
|
if (xc->mem->readString(path, getArg(xc, 0)) != No_Fault)
|
|
return -EFAULT;
|
|
|
|
struct stat hostBuf;
|
|
int result = stat(path.c_str(), &hostBuf);
|
|
|
|
if (result < 0)
|
|
return -errno;
|
|
|
|
copyOutStatBuf(xc->mem, getArg(xc, 1), &hostBuf);
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
int
|
|
lstatFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
string path;
|
|
|
|
if (xc->mem->readString(path, getArg(xc, 0)) != No_Fault)
|
|
return -EFAULT;
|
|
|
|
struct stat hostBuf;
|
|
int result = lstat(path.c_str(), &hostBuf);
|
|
|
|
if (result < 0)
|
|
return -errno;
|
|
|
|
copyOutStatBuf(xc->mem, getArg(xc, 1), &hostBuf);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
fstatFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
int fd = process->sim_fd(getArg(xc, 0));
|
|
|
|
DPRINTFR(SyscallVerbose, "fstat(%d, ...)\n", fd);
|
|
|
|
if (fd < 0)
|
|
return -EBADF;
|
|
|
|
struct stat hostBuf;
|
|
int result = fstat(fd, &hostBuf);
|
|
|
|
if (result < 0)
|
|
return -errno;
|
|
|
|
copyOutStatBuf(xc->mem, getArg(xc, 1), &hostBuf);
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
//
|
|
// We don't handle mmap(). If the target is really mmaping /dev/zero,
|
|
// we can get away with doing nothing (since the simulator doesn't
|
|
// really check addresses anyway). Always print a warning, since this
|
|
// could be seriously broken if we're not mapping /dev/zero.
|
|
//
|
|
// Someday we should explicitly check for /dev/zero in open, flag the
|
|
// file descriptor, and fail an mmap to anything else.
|
|
//
|
|
int
|
|
mmapFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
Addr start = getArg(xc, 0);
|
|
uint64_t length = getArg(xc, 1);
|
|
int prot = getArg(xc, 2);
|
|
int flags = getArg(xc, 3);
|
|
int fd = process->sim_fd(getArg(xc, 4));
|
|
int offset = getArg(xc, 5);
|
|
|
|
cerr << "Warning: ignoring syscall mmap("
|
|
<< start << ", " << length << ", "
|
|
<< prot << ", " << flags << ", "
|
|
<< fd << " " << getArg(xc, 4) << ", "
|
|
<< offset << ")" << endl;
|
|
|
|
return start;
|
|
}
|
|
|
|
|
|
const char *hostname = "m5.eecs.umich.edu";
|
|
|
|
int
|
|
unameFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
TypedBufferArg<OSF::utsname> name(getArg(xc, 0));
|
|
|
|
strcpy(name->sysname, "OSF1");
|
|
strcpy(name->nodename, hostname);
|
|
strcpy(name->release, "V5.1");
|
|
strcpy(name->version, "732");
|
|
strcpy(name->machine, "alpha");
|
|
|
|
name.copyOut(xc->mem);
|
|
return 0;
|
|
}
|
|
|
|
|
|
int
|
|
gethostnameFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
int name_len = getArg(xc, 1);
|
|
BufferArg name(getArg(xc, 0), name_len);
|
|
|
|
strncpy((char *)name.bufferPtr(), hostname, name_len);
|
|
|
|
name.copyOut(xc->mem);
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
int
|
|
getsysinfoFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
unsigned op = getArg(xc, 0);
|
|
unsigned nbytes = getArg(xc, 2);
|
|
|
|
switch (op) {
|
|
|
|
case OSF::GSI_MAX_CPU: {
|
|
TypedBufferArg<uint32_t> max_cpu(getArg(xc, 1));
|
|
*max_cpu = process->numCpus();
|
|
max_cpu.copyOut(xc->mem);
|
|
return 1;
|
|
}
|
|
|
|
case OSF::GSI_CPUS_IN_BOX: {
|
|
TypedBufferArg<uint32_t> cpus_in_box(getArg(xc, 1));
|
|
*cpus_in_box = process->numCpus();
|
|
cpus_in_box.copyOut(xc->mem);
|
|
return 1;
|
|
}
|
|
|
|
case OSF::GSI_PHYSMEM: {
|
|
TypedBufferArg<uint64_t> physmem(getArg(xc, 1));
|
|
*physmem = 1024 * 1024; // physical memory in KB
|
|
physmem.copyOut(xc->mem);
|
|
return 1;
|
|
}
|
|
|
|
case OSF::GSI_CPU_INFO: {
|
|
TypedBufferArg<OSF::cpu_info> infop(getArg(xc, 1));
|
|
|
|
infop->current_cpu = 0;
|
|
infop->cpus_in_box = process->numCpus();
|
|
infop->cpu_type = 57;
|
|
infop->ncpus = process->numCpus();
|
|
int cpumask = (1 << process->numCpus()) - 1;
|
|
infop->cpus_present = infop->cpus_running = cpumask;
|
|
infop->cpu_binding = 0;
|
|
infop->cpu_ex_binding = 0;
|
|
infop->mhz = 667;
|
|
|
|
infop.copyOut(xc->mem);
|
|
return 1;
|
|
}
|
|
|
|
case OSF::GSI_PROC_TYPE: {
|
|
TypedBufferArg<uint64_t> proc_type(getArg(xc, 1));
|
|
*proc_type = 11;
|
|
proc_type.copyOut(xc->mem);
|
|
return 1;
|
|
}
|
|
|
|
case OSF::GSI_PLATFORM_NAME: {
|
|
BufferArg bufArg(getArg(xc, 1), nbytes);
|
|
strncpy((char *)bufArg.bufferPtr(),
|
|
"COMPAQ Professional Workstation XP1000",
|
|
nbytes);
|
|
bufArg.copyOut(xc->mem);
|
|
return 1;
|
|
}
|
|
|
|
case OSF::GSI_CLK_TCK: {
|
|
TypedBufferArg<uint64_t> clk_hz(getArg(xc, 1));
|
|
*clk_hz = 1024;
|
|
clk_hz.copyOut(xc->mem);
|
|
return 1;
|
|
}
|
|
|
|
default:
|
|
cerr << "getsysinfo: unknown op " << op << endl;
|
|
abort();
|
|
break;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
getpidFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
// Make up a PID. There's no interprocess communication in
|
|
// fake_syscall mode, so there's no way for a process to know it's
|
|
// not getting a unique value.
|
|
|
|
// This is one of the funky syscalls that has two return values,
|
|
// with the second one (parent PID) going in r20.
|
|
xc->regs.intRegFile[20] = 99;
|
|
return 100;
|
|
}
|
|
|
|
|
|
int
|
|
getuidFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
// Make up a UID and EUID... it shouldn't matter, and we want the
|
|
// simulation to be deterministic.
|
|
|
|
// EUID goes in r20.
|
|
xc->regs.intRegFile[20] = 100; // EUID
|
|
return 100; // UID
|
|
}
|
|
|
|
|
|
int
|
|
getgidFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
// Get current group ID. EGID goes in r20.
|
|
xc->regs.intRegFile[20] = 100;
|
|
return 100;
|
|
}
|
|
|
|
|
|
int
|
|
setuidFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
// can't fathom why a benchmark would call this.
|
|
warn("Ignoring call to setuid(%d)\n", getArg(xc, 0));
|
|
return 0;
|
|
}
|
|
|
|
|
|
int
|
|
fcntlFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
int fd = getArg(xc,0);
|
|
|
|
if (fd < 0 || process->sim_fd(fd) < 0)
|
|
return -EBADF;
|
|
|
|
int cmd = getArg(xc,1);
|
|
switch (cmd) {
|
|
case 0: // F_DUPFD
|
|
// if we really wanted to support this, we'd need to do it
|
|
// in the target fd space.
|
|
warn("fcntl(%d, F_DUPFD) not supported, error returned\n", fd);
|
|
return -EMFILE;
|
|
|
|
case 1: // F_GETFD (get fd flags)
|
|
case 2: // F_SETFD (set fd flags)
|
|
case 3: // F_GETFL (get file flags)
|
|
case 4: // F_SETFL (set file flags)
|
|
// not sure if this is totally valid, but we'll pass it through
|
|
// to the underlying OS
|
|
warn("fcntl(%d, %d) passed through to host\n", fd, cmd);
|
|
return fcntl(process->sim_fd(fd), cmd);
|
|
// return 0;
|
|
|
|
case 7: // F_GETLK (get lock)
|
|
case 8: // F_SETLK (set lock)
|
|
case 9: // F_SETLKW (set lock and wait)
|
|
// don't mess with file locking... just act like it's OK
|
|
warn("File lock call (fcntl(%d, %d)) ignored.\n", fd, cmd);
|
|
return 0;
|
|
|
|
default:
|
|
warn("Unknown fcntl command %d\n", cmd);
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
|
|
int
|
|
getdirentriesFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
int fd = process->sim_fd(getArg(xc, 0));
|
|
Addr tgt_buf = getArg(xc, 1);
|
|
int tgt_nbytes = getArg(xc, 2);
|
|
Addr tgt_basep = getArg(xc, 3);
|
|
|
|
char * const host_buf = new char[tgt_nbytes];
|
|
|
|
// just pass basep through uninterpreted.
|
|
TypedBufferArg<int64_t> basep(tgt_basep);
|
|
basep.copyIn(xc->mem);
|
|
off_t host_basep = (off_t)*basep;
|
|
int host_result = getdirentries(fd, host_buf, tgt_nbytes, &host_basep);
|
|
|
|
// check for error
|
|
if (host_result < 0) {
|
|
delete [] host_buf;
|
|
return -errno;
|
|
}
|
|
|
|
// no error: copy results back to target space
|
|
Addr tgt_buf_ptr = tgt_buf;
|
|
char *host_buf_ptr = host_buf;
|
|
char *host_buf_end = host_buf + host_result;
|
|
while (host_buf_ptr < host_buf_end) {
|
|
struct dirent *host_dp = (struct dirent *)host_buf_ptr;
|
|
int namelen = strlen(host_dp->d_name);
|
|
|
|
// Actual size includes padded string rounded up for alignment.
|
|
// Subtract 256 for dummy char array in OSF::dirent definition.
|
|
// Add 1 to namelen for terminating null char.
|
|
int tgt_bufsize = sizeof(OSF::dirent) - 256 + RoundUp(namelen+1, 8);
|
|
TypedBufferArg<OSF::dirent> tgt_dp(tgt_buf_ptr, tgt_bufsize);
|
|
tgt_dp->d_ino = host_dp->d_ino;
|
|
tgt_dp->d_reclen = tgt_bufsize;
|
|
tgt_dp->d_namlen = namelen;
|
|
strcpy(tgt_dp->d_name, host_dp->d_name);
|
|
tgt_dp.copyOut(xc->mem);
|
|
|
|
tgt_buf_ptr += tgt_bufsize;
|
|
host_buf_ptr += host_dp->d_reclen;
|
|
}
|
|
|
|
delete [] host_buf;
|
|
|
|
*basep = host_basep;
|
|
basep.copyOut(xc->mem);
|
|
|
|
return (tgt_buf_ptr - tgt_buf);
|
|
}
|
|
|
|
|
|
int
|
|
getrlimitFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
unsigned resource = getArg(xc, 0);
|
|
TypedBufferArg<OSF::rlimit> rlp(getArg(xc, 1));
|
|
|
|
switch (resource) {
|
|
case OSF::RLIMIT_STACK:
|
|
// max stack size in bytes: make up a number (2MB for now)
|
|
rlp->rlim_cur = rlp->rlim_max = 8 * 1024 * 1024;
|
|
break;
|
|
|
|
default:
|
|
cerr << "getrlimitFunc: unimplemented resource " << resource << endl;
|
|
abort();
|
|
break;
|
|
}
|
|
|
|
rlp.copyOut(xc->mem);
|
|
return 0;
|
|
}
|
|
|
|
// 1M usecs in 1 sec, for readability
|
|
static const int one_million = 1000000;
|
|
|
|
// seconds since the epoch (1/1/1970)... about a billion, by my reckoning
|
|
static const unsigned seconds_since_epoch = 1000000000;
|
|
|
|
//
|
|
// helper function: populate struct timeval with approximation of
|
|
// current elapsed time
|
|
//
|
|
static void
|
|
getElapsedTime(OSF::timeval *tp)
|
|
{
|
|
int cycles_per_usec = ticksPerSecond / one_million;
|
|
|
|
int elapsed_usecs = curTick / cycles_per_usec;
|
|
tp->tv_sec = elapsed_usecs / one_million;
|
|
tp->tv_usec = elapsed_usecs % one_million;
|
|
}
|
|
|
|
|
|
int
|
|
gettimeofdayFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
TypedBufferArg<OSF::timeval> tp(getArg(xc, 0));
|
|
|
|
getElapsedTime(tp);
|
|
tp->tv_sec += seconds_since_epoch;
|
|
|
|
tp.copyOut(xc->mem);
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
int
|
|
getrusageFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
int who = getArg(xc, 0); // THREAD, SELF, or CHILDREN
|
|
TypedBufferArg<OSF::rusage> rup(getArg(xc, 1));
|
|
|
|
if (who != OSF::RUSAGE_SELF) {
|
|
// don't really handle THREAD or CHILDREN, but just warn and
|
|
// plow ahead
|
|
DCOUT(SyscallWarnings)
|
|
<< "Warning: getrusage() only supports RUSAGE_SELF."
|
|
<< " Parameter " << who << " ignored." << endl;
|
|
}
|
|
|
|
getElapsedTime(&rup->ru_utime);
|
|
rup->ru_stime.tv_sec = 0;
|
|
rup->ru_stime.tv_usec = 0;
|
|
rup->ru_maxrss = 0;
|
|
rup->ru_ixrss = 0;
|
|
rup->ru_idrss = 0;
|
|
rup->ru_isrss = 0;
|
|
rup->ru_minflt = 0;
|
|
rup->ru_majflt = 0;
|
|
rup->ru_nswap = 0;
|
|
rup->ru_inblock = 0;
|
|
rup->ru_oublock = 0;
|
|
rup->ru_msgsnd = 0;
|
|
rup->ru_msgrcv = 0;
|
|
rup->ru_nsignals = 0;
|
|
rup->ru_nvcsw = 0;
|
|
rup->ru_nivcsw = 0;
|
|
|
|
rup.copyOut(xc->mem);
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
int
|
|
sigreturnFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
RegFile *regs = &xc->regs;
|
|
TypedBufferArg<OSF::sigcontext> sc(getArg(xc, 0));
|
|
|
|
sc.copyIn(xc->mem);
|
|
|
|
// Restore state from sigcontext structure.
|
|
// Note that we'll advance PC <- NPC before the end of the cycle,
|
|
// so we need to restore the desired PC into NPC.
|
|
// The current regs->pc will get clobbered.
|
|
regs->npc = sc->sc_pc;
|
|
|
|
for (int i = 0; i < 31; ++i) {
|
|
regs->intRegFile[i] = sc->sc_regs[i];
|
|
regs->floatRegFile.q[i] = sc->sc_fpregs[i];
|
|
}
|
|
|
|
regs->miscRegs.fpcr = sc->sc_fpcr;
|
|
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
tableFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
int id = getArg(xc, 0); // table ID
|
|
int index = getArg(xc, 1); // index into table
|
|
// arg 2 is buffer pointer; type depends on table ID
|
|
int nel = getArg(xc, 3); // number of elements
|
|
int lel = getArg(xc, 4); // expected element size
|
|
|
|
switch (id) {
|
|
case OSF::TBL_SYSINFO: {
|
|
if (index != 0 || nel != 1 || lel != sizeof(OSF::tbl_sysinfo))
|
|
return -EINVAL;
|
|
TypedBufferArg<OSF::tbl_sysinfo> elp(getArg(xc, 2));
|
|
|
|
const int clk_hz = one_million;
|
|
elp->si_user = curTick / (ticksPerSecond / clk_hz);
|
|
elp->si_nice = 0;
|
|
elp->si_sys = 0;
|
|
elp->si_idle = 0;
|
|
elp->wait = 0;
|
|
elp->si_hz = clk_hz;
|
|
elp->si_phz = clk_hz;
|
|
elp->si_boottime = seconds_since_epoch; // seconds since epoch?
|
|
elp->si_max_procs = process->numCpus();
|
|
elp.copyOut(xc->mem);
|
|
return 0;
|
|
}
|
|
|
|
default:
|
|
cerr << "table(): id " << id << " unknown." << endl;
|
|
return -EINVAL;
|
|
}
|
|
}
|
|
|
|
//
|
|
// forward declaration... defined below table
|
|
//
|
|
int
|
|
indirectSyscallFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc);
|
|
|
|
//
|
|
// Handler for unimplemented syscalls that we haven't thought about.
|
|
//
|
|
int
|
|
unimplementedFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
cerr << "Error: syscall " << desc->name
|
|
<< " (#" << callnum << ") unimplemented.";
|
|
cerr << " Args: " << getArg(xc, 0) << ", " << getArg(xc, 1)
|
|
<< ", ..." << endl;
|
|
|
|
abort();
|
|
}
|
|
|
|
|
|
//
|
|
// Handler for unimplemented syscalls that we never intend to
|
|
// implement (signal handling, etc.) and should not affect the correct
|
|
// behavior of the program. Print a warning only if the appropriate
|
|
// trace flag is enabled. Return success to the target program.
|
|
//
|
|
int
|
|
ignoreFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
DCOUT(SyscallWarnings) << "Warning: ignoring syscall " << desc->name
|
|
<< "(" << getArg(xc, 0)
|
|
<< ", " << getArg(xc, 1)
|
|
<< ", ...)" << endl;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
int
|
|
exitFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
new SimExitEvent("syscall caused exit", getArg(xc, 0) & 0xff);
|
|
|
|
return 1;
|
|
}
|
|
|
|
|
|
SyscallDesc syscallDescs[] = {
|
|
/* 0 */ SyscallDesc("syscall (#0)", indirectSyscallFunc, SyscallDesc::SuppressReturnValue),
|
|
/* 1 */ SyscallDesc("exit", exitFunc),
|
|
/* 2 */ SyscallDesc("fork", unimplementedFunc),
|
|
/* 3 */ SyscallDesc("read", readFunc),
|
|
/* 4 */ SyscallDesc("write", writeFunc),
|
|
/* 5 */ SyscallDesc("old_open", unimplementedFunc),
|
|
/* 6 */ SyscallDesc("close", closeFunc),
|
|
/* 7 */ SyscallDesc("wait4", unimplementedFunc),
|
|
/* 8 */ SyscallDesc("old_creat", unimplementedFunc),
|
|
/* 9 */ SyscallDesc("link", unimplementedFunc),
|
|
/* 10 */ SyscallDesc("unlink", unimplementedFunc),
|
|
/* 11 */ SyscallDesc("execv", unimplementedFunc),
|
|
/* 12 */ SyscallDesc("chdir", unimplementedFunc),
|
|
/* 13 */ SyscallDesc("fchdir", unimplementedFunc),
|
|
/* 14 */ SyscallDesc("mknod", unimplementedFunc),
|
|
/* 15 */ SyscallDesc("chmod", unimplementedFunc),
|
|
/* 16 */ SyscallDesc("chown", unimplementedFunc),
|
|
/* 17 */ SyscallDesc("obreak", obreakFunc),
|
|
/* 18 */ SyscallDesc("pre_F64_getfsstat", unimplementedFunc),
|
|
/* 19 */ SyscallDesc("lseek", lseekFunc),
|
|
/* 20 */ SyscallDesc("getpid", getpidFunc),
|
|
/* 21 */ SyscallDesc("mount", unimplementedFunc),
|
|
/* 22 */ SyscallDesc("unmount", unimplementedFunc),
|
|
/* 23 */ SyscallDesc("setuid", setuidFunc),
|
|
/* 24 */ SyscallDesc("getuid", getuidFunc),
|
|
/* 25 */ SyscallDesc("exec_with_loader", unimplementedFunc),
|
|
/* 26 */ SyscallDesc("ptrace", unimplementedFunc),
|
|
/* 27 */ SyscallDesc("recvmsg", unimplementedFunc),
|
|
/* 28 */ SyscallDesc("sendmsg", unimplementedFunc),
|
|
/* 29 */ SyscallDesc("recvfrom", unimplementedFunc),
|
|
/* 30 */ SyscallDesc("accept", unimplementedFunc),
|
|
/* 31 */ SyscallDesc("getpeername", unimplementedFunc),
|
|
/* 32 */ SyscallDesc("getsockname", unimplementedFunc),
|
|
/* 33 */ SyscallDesc("access", unimplementedFunc),
|
|
/* 34 */ SyscallDesc("chflags", unimplementedFunc),
|
|
/* 35 */ SyscallDesc("fchflags", unimplementedFunc),
|
|
/* 36 */ SyscallDesc("sync", unimplementedFunc),
|
|
/* 37 */ SyscallDesc("kill", unimplementedFunc),
|
|
/* 38 */ SyscallDesc("old_stat", unimplementedFunc),
|
|
/* 39 */ SyscallDesc("setpgid", unimplementedFunc),
|
|
/* 40 */ SyscallDesc("old_lstat", unimplementedFunc),
|
|
/* 41 */ SyscallDesc("dup", unimplementedFunc),
|
|
/* 42 */ SyscallDesc("pipe", unimplementedFunc),
|
|
/* 43 */ SyscallDesc("set_program_attributes", unimplementedFunc),
|
|
/* 44 */ SyscallDesc("profil", unimplementedFunc),
|
|
/* 45 */ SyscallDesc("open", openFunc),
|
|
/* 46 */ SyscallDesc("obsolete osigaction", unimplementedFunc),
|
|
/* 47 */ SyscallDesc("getgid", getgidFunc),
|
|
/* 48 */ SyscallDesc("sigprocmask", ignoreFunc),
|
|
/* 49 */ SyscallDesc("getlogin", unimplementedFunc),
|
|
/* 50 */ SyscallDesc("setlogin", unimplementedFunc),
|
|
/* 51 */ SyscallDesc("acct", unimplementedFunc),
|
|
/* 52 */ SyscallDesc("sigpending", unimplementedFunc),
|
|
/* 53 */ SyscallDesc("classcntl", unimplementedFunc),
|
|
/* 54 */ SyscallDesc("ioctl", ioctlFunc),
|
|
/* 55 */ SyscallDesc("reboot", unimplementedFunc),
|
|
/* 56 */ SyscallDesc("revoke", unimplementedFunc),
|
|
/* 57 */ SyscallDesc("symlink", unimplementedFunc),
|
|
/* 58 */ SyscallDesc("readlink", unimplementedFunc),
|
|
/* 59 */ SyscallDesc("execve", unimplementedFunc),
|
|
/* 60 */ SyscallDesc("umask", unimplementedFunc),
|
|
/* 61 */ SyscallDesc("chroot", unimplementedFunc),
|
|
/* 62 */ SyscallDesc("old_fstat", unimplementedFunc),
|
|
/* 63 */ SyscallDesc("getpgrp", unimplementedFunc),
|
|
/* 64 */ SyscallDesc("getpagesize", getpagesizeFunc),
|
|
/* 65 */ SyscallDesc("mremap", unimplementedFunc),
|
|
/* 66 */ SyscallDesc("vfork", unimplementedFunc),
|
|
/* 67 */ SyscallDesc("pre_F64_stat", unimplementedFunc),
|
|
/* 68 */ SyscallDesc("pre_F64_lstat", unimplementedFunc),
|
|
/* 69 */ SyscallDesc("sbrk", unimplementedFunc),
|
|
/* 70 */ SyscallDesc("sstk", unimplementedFunc),
|
|
/* 71 */ SyscallDesc("mmap", mmapFunc),
|
|
/* 72 */ SyscallDesc("ovadvise", unimplementedFunc),
|
|
/* 73 */ SyscallDesc("munmap", unimplementedFunc),
|
|
/* 74 */ SyscallDesc("mprotect", ignoreFunc),
|
|
/* 75 */ SyscallDesc("madvise", unimplementedFunc),
|
|
/* 76 */ SyscallDesc("old_vhangup", unimplementedFunc),
|
|
/* 77 */ SyscallDesc("kmodcall", unimplementedFunc),
|
|
/* 78 */ SyscallDesc("mincore", unimplementedFunc),
|
|
/* 79 */ SyscallDesc("getgroups", unimplementedFunc),
|
|
/* 80 */ SyscallDesc("setgroups", unimplementedFunc),
|
|
/* 81 */ SyscallDesc("old_getpgrp", unimplementedFunc),
|
|
/* 82 */ SyscallDesc("setpgrp", unimplementedFunc),
|
|
/* 83 */ SyscallDesc("setitimer", unimplementedFunc),
|
|
/* 84 */ SyscallDesc("old_wait", unimplementedFunc),
|
|
/* 85 */ SyscallDesc("table", tableFunc),
|
|
/* 86 */ SyscallDesc("getitimer", unimplementedFunc),
|
|
/* 87 */ SyscallDesc("gethostname", gethostnameFunc),
|
|
/* 88 */ SyscallDesc("sethostname", unimplementedFunc),
|
|
/* 89 */ SyscallDesc("getdtablesize", unimplementedFunc),
|
|
/* 90 */ SyscallDesc("dup2", unimplementedFunc),
|
|
/* 91 */ SyscallDesc("pre_F64_fstat", unimplementedFunc),
|
|
/* 92 */ SyscallDesc("fcntl", fcntlFunc),
|
|
/* 93 */ SyscallDesc("select", unimplementedFunc),
|
|
/* 94 */ SyscallDesc("poll", unimplementedFunc),
|
|
/* 95 */ SyscallDesc("fsync", unimplementedFunc),
|
|
/* 96 */ SyscallDesc("setpriority", unimplementedFunc),
|
|
/* 97 */ SyscallDesc("socket", unimplementedFunc),
|
|
/* 98 */ SyscallDesc("connect", unimplementedFunc),
|
|
/* 99 */ SyscallDesc("old_accept", unimplementedFunc),
|
|
/* 100 */ SyscallDesc("getpriority", unimplementedFunc),
|
|
/* 101 */ SyscallDesc("old_send", unimplementedFunc),
|
|
/* 102 */ SyscallDesc("old_recv", unimplementedFunc),
|
|
/* 103 */ SyscallDesc("sigreturn", sigreturnFunc, SyscallDesc::SuppressReturnValue),
|
|
/* 104 */ SyscallDesc("bind", unimplementedFunc),
|
|
/* 105 */ SyscallDesc("setsockopt", unimplementedFunc),
|
|
/* 106 */ SyscallDesc("listen", unimplementedFunc),
|
|
/* 107 */ SyscallDesc("plock", unimplementedFunc),
|
|
/* 108 */ SyscallDesc("old_sigvec", unimplementedFunc),
|
|
/* 109 */ SyscallDesc("old_sigblock", unimplementedFunc),
|
|
/* 110 */ SyscallDesc("old_sigsetmask", unimplementedFunc),
|
|
/* 111 */ SyscallDesc("sigsuspend", unimplementedFunc),
|
|
/* 112 */ SyscallDesc("sigstack", ignoreFunc),
|
|
/* 113 */ SyscallDesc("old_recvmsg", unimplementedFunc),
|
|
/* 114 */ SyscallDesc("old_sendmsg", unimplementedFunc),
|
|
/* 115 */ SyscallDesc("obsolete vtrace", unimplementedFunc),
|
|
/* 116 */ SyscallDesc("gettimeofday", gettimeofdayFunc),
|
|
/* 117 */ SyscallDesc("getrusage", getrusageFunc),
|
|
/* 118 */ SyscallDesc("getsockopt", unimplementedFunc),
|
|
/* 119 */ SyscallDesc("numa_syscalls", unimplementedFunc),
|
|
/* 120 */ SyscallDesc("readv", unimplementedFunc),
|
|
/* 121 */ SyscallDesc("writev", unimplementedFunc),
|
|
/* 122 */ SyscallDesc("settimeofday", unimplementedFunc),
|
|
/* 123 */ SyscallDesc("fchown", unimplementedFunc),
|
|
/* 124 */ SyscallDesc("fchmod", unimplementedFunc),
|
|
/* 125 */ SyscallDesc("old_recvfrom", unimplementedFunc),
|
|
/* 126 */ SyscallDesc("setreuid", unimplementedFunc),
|
|
/* 127 */ SyscallDesc("setregid", unimplementedFunc),
|
|
/* 128 */ SyscallDesc("rename", unimplementedFunc),
|
|
/* 129 */ SyscallDesc("truncate", unimplementedFunc),
|
|
/* 130 */ SyscallDesc("ftruncate", unimplementedFunc),
|
|
/* 131 */ SyscallDesc("flock", unimplementedFunc),
|
|
/* 132 */ SyscallDesc("setgid", unimplementedFunc),
|
|
/* 133 */ SyscallDesc("sendto", unimplementedFunc),
|
|
/* 134 */ SyscallDesc("shutdown", unimplementedFunc),
|
|
/* 135 */ SyscallDesc("socketpair", unimplementedFunc),
|
|
/* 136 */ SyscallDesc("mkdir", unimplementedFunc),
|
|
/* 137 */ SyscallDesc("rmdir", unimplementedFunc),
|
|
/* 138 */ SyscallDesc("utimes", unimplementedFunc),
|
|
/* 139 */ SyscallDesc("obsolete 4.2 sigreturn", unimplementedFunc),
|
|
/* 140 */ SyscallDesc("adjtime", unimplementedFunc),
|
|
/* 141 */ SyscallDesc("old_getpeername", unimplementedFunc),
|
|
/* 142 */ SyscallDesc("gethostid", unimplementedFunc),
|
|
/* 143 */ SyscallDesc("sethostid", unimplementedFunc),
|
|
/* 144 */ SyscallDesc("getrlimit", getrlimitFunc),
|
|
/* 145 */ SyscallDesc("setrlimit", unimplementedFunc),
|
|
/* 146 */ SyscallDesc("old_killpg", unimplementedFunc),
|
|
/* 147 */ SyscallDesc("setsid", unimplementedFunc),
|
|
/* 148 */ SyscallDesc("quotactl", unimplementedFunc),
|
|
/* 149 */ SyscallDesc("oldquota", unimplementedFunc),
|
|
/* 150 */ SyscallDesc("old_getsockname", unimplementedFunc),
|
|
/* 151 */ SyscallDesc("pread", unimplementedFunc),
|
|
/* 152 */ SyscallDesc("pwrite", unimplementedFunc),
|
|
/* 153 */ SyscallDesc("pid_block", unimplementedFunc),
|
|
/* 154 */ SyscallDesc("pid_unblock", unimplementedFunc),
|
|
/* 155 */ SyscallDesc("signal_urti", unimplementedFunc),
|
|
/* 156 */ SyscallDesc("sigaction", ignoreFunc),
|
|
/* 157 */ SyscallDesc("sigwaitprim", unimplementedFunc),
|
|
/* 158 */ SyscallDesc("nfssvc", unimplementedFunc),
|
|
/* 159 */ SyscallDesc("getdirentries", getdirentriesFunc),
|
|
/* 160 */ SyscallDesc("pre_F64_statfs", unimplementedFunc),
|
|
/* 161 */ SyscallDesc("pre_F64_fstatfs", unimplementedFunc),
|
|
/* 162 */ SyscallDesc("unknown #162", unimplementedFunc),
|
|
/* 163 */ SyscallDesc("async_daemon", unimplementedFunc),
|
|
/* 164 */ SyscallDesc("getfh", unimplementedFunc),
|
|
/* 165 */ SyscallDesc("getdomainname", unimplementedFunc),
|
|
/* 166 */ SyscallDesc("setdomainname", unimplementedFunc),
|
|
/* 167 */ SyscallDesc("unknown #167", unimplementedFunc),
|
|
/* 168 */ SyscallDesc("unknown #168", unimplementedFunc),
|
|
/* 169 */ SyscallDesc("exportfs", unimplementedFunc),
|
|
/* 170 */ SyscallDesc("unknown #170", unimplementedFunc),
|
|
/* 171 */ SyscallDesc("unknown #171", unimplementedFunc),
|
|
/* 172 */ SyscallDesc("unknown #172", unimplementedFunc),
|
|
/* 173 */ SyscallDesc("unknown #173", unimplementedFunc),
|
|
/* 174 */ SyscallDesc("unknown #174", unimplementedFunc),
|
|
/* 175 */ SyscallDesc("unknown #175", unimplementedFunc),
|
|
/* 176 */ SyscallDesc("unknown #176", unimplementedFunc),
|
|
/* 177 */ SyscallDesc("unknown #177", unimplementedFunc),
|
|
/* 178 */ SyscallDesc("unknown #178", unimplementedFunc),
|
|
/* 179 */ SyscallDesc("unknown #179", unimplementedFunc),
|
|
/* 180 */ SyscallDesc("unknown #180", unimplementedFunc),
|
|
/* 181 */ SyscallDesc("alt_plock", unimplementedFunc),
|
|
/* 182 */ SyscallDesc("unknown #182", unimplementedFunc),
|
|
/* 183 */ SyscallDesc("unknown #183", unimplementedFunc),
|
|
/* 184 */ SyscallDesc("getmnt", unimplementedFunc),
|
|
/* 185 */ SyscallDesc("unknown #185", unimplementedFunc),
|
|
/* 186 */ SyscallDesc("unknown #186", unimplementedFunc),
|
|
/* 187 */ SyscallDesc("alt_sigpending", unimplementedFunc),
|
|
/* 188 */ SyscallDesc("alt_setsid", unimplementedFunc),
|
|
/* 189 */ SyscallDesc("unknown #189", unimplementedFunc),
|
|
/* 190 */ SyscallDesc("unknown #190", unimplementedFunc),
|
|
/* 191 */ SyscallDesc("unknown #191", unimplementedFunc),
|
|
/* 192 */ SyscallDesc("unknown #192", unimplementedFunc),
|
|
/* 193 */ SyscallDesc("unknown #193", unimplementedFunc),
|
|
/* 194 */ SyscallDesc("unknown #194", unimplementedFunc),
|
|
/* 195 */ SyscallDesc("unknown #195", unimplementedFunc),
|
|
/* 196 */ SyscallDesc("unknown #196", unimplementedFunc),
|
|
/* 197 */ SyscallDesc("unknown #197", unimplementedFunc),
|
|
/* 198 */ SyscallDesc("unknown #198", unimplementedFunc),
|
|
/* 199 */ SyscallDesc("swapon", unimplementedFunc),
|
|
/* 200 */ SyscallDesc("msgctl", unimplementedFunc),
|
|
/* 201 */ SyscallDesc("msgget", unimplementedFunc),
|
|
/* 202 */ SyscallDesc("msgrcv", unimplementedFunc),
|
|
/* 203 */ SyscallDesc("msgsnd", unimplementedFunc),
|
|
/* 204 */ SyscallDesc("semctl", unimplementedFunc),
|
|
/* 205 */ SyscallDesc("semget", unimplementedFunc),
|
|
/* 206 */ SyscallDesc("semop", unimplementedFunc),
|
|
/* 207 */ SyscallDesc("uname", unameFunc),
|
|
/* 208 */ SyscallDesc("lchown", unimplementedFunc),
|
|
/* 209 */ SyscallDesc("shmat", unimplementedFunc),
|
|
/* 210 */ SyscallDesc("shmctl", unimplementedFunc),
|
|
/* 211 */ SyscallDesc("shmdt", unimplementedFunc),
|
|
/* 212 */ SyscallDesc("shmget", unimplementedFunc),
|
|
/* 213 */ SyscallDesc("mvalid", unimplementedFunc),
|
|
/* 214 */ SyscallDesc("getaddressconf", unimplementedFunc),
|
|
/* 215 */ SyscallDesc("msleep", unimplementedFunc),
|
|
/* 216 */ SyscallDesc("mwakeup", unimplementedFunc),
|
|
/* 217 */ SyscallDesc("msync", unimplementedFunc),
|
|
/* 218 */ SyscallDesc("signal", unimplementedFunc),
|
|
/* 219 */ SyscallDesc("utc_gettime", unimplementedFunc),
|
|
/* 220 */ SyscallDesc("utc_adjtime", unimplementedFunc),
|
|
/* 221 */ SyscallDesc("unknown #221", unimplementedFunc),
|
|
/* 222 */ SyscallDesc("security", unimplementedFunc),
|
|
/* 223 */ SyscallDesc("kloadcall", unimplementedFunc),
|
|
/* 224 */ SyscallDesc("stat", statFunc),
|
|
/* 225 */ SyscallDesc("lstat", lstatFunc),
|
|
/* 226 */ SyscallDesc("fstat", fstatFunc),
|
|
/* 227 */ SyscallDesc("statfs", unimplementedFunc),
|
|
/* 228 */ SyscallDesc("fstatfs", unimplementedFunc),
|
|
/* 229 */ SyscallDesc("getfsstat", unimplementedFunc),
|
|
/* 230 */ SyscallDesc("gettimeofday64", unimplementedFunc),
|
|
/* 231 */ SyscallDesc("settimeofday64", unimplementedFunc),
|
|
/* 232 */ SyscallDesc("unknown #232", unimplementedFunc),
|
|
/* 233 */ SyscallDesc("getpgid", unimplementedFunc),
|
|
/* 234 */ SyscallDesc("getsid", unimplementedFunc),
|
|
/* 235 */ SyscallDesc("sigaltstack", ignoreFunc),
|
|
/* 236 */ SyscallDesc("waitid", unimplementedFunc),
|
|
/* 237 */ SyscallDesc("priocntlset", unimplementedFunc),
|
|
/* 238 */ SyscallDesc("sigsendset", unimplementedFunc),
|
|
/* 239 */ SyscallDesc("set_speculative", unimplementedFunc),
|
|
/* 240 */ SyscallDesc("msfs_syscall", unimplementedFunc),
|
|
/* 241 */ SyscallDesc("sysinfo", unimplementedFunc),
|
|
/* 242 */ SyscallDesc("uadmin", unimplementedFunc),
|
|
/* 243 */ SyscallDesc("fuser", unimplementedFunc),
|
|
/* 244 */ SyscallDesc("proplist_syscall", unimplementedFunc),
|
|
/* 245 */ SyscallDesc("ntp_adjtime", unimplementedFunc),
|
|
/* 246 */ SyscallDesc("ntp_gettime", unimplementedFunc),
|
|
/* 247 */ SyscallDesc("pathconf", unimplementedFunc),
|
|
/* 248 */ SyscallDesc("fpathconf", unimplementedFunc),
|
|
/* 249 */ SyscallDesc("sync2", unimplementedFunc),
|
|
/* 250 */ SyscallDesc("uswitch", unimplementedFunc),
|
|
/* 251 */ SyscallDesc("usleep_thread", unimplementedFunc),
|
|
/* 252 */ SyscallDesc("audcntl", unimplementedFunc),
|
|
/* 253 */ SyscallDesc("audgen", unimplementedFunc),
|
|
/* 254 */ SyscallDesc("sysfs", unimplementedFunc),
|
|
/* 255 */ SyscallDesc("subsys_info", unimplementedFunc),
|
|
/* 256 */ SyscallDesc("getsysinfo", getsysinfoFunc),
|
|
/* 257 */ SyscallDesc("setsysinfo", unimplementedFunc),
|
|
/* 258 */ SyscallDesc("afs_syscall", unimplementedFunc),
|
|
/* 259 */ SyscallDesc("swapctl", unimplementedFunc),
|
|
/* 260 */ SyscallDesc("memcntl", unimplementedFunc),
|
|
/* 261 */ SyscallDesc("fdatasync", unimplementedFunc),
|
|
/* 262 */ SyscallDesc("oflock", unimplementedFunc),
|
|
/* 263 */ SyscallDesc("F64_readv", unimplementedFunc),
|
|
/* 264 */ SyscallDesc("F64_writev", unimplementedFunc),
|
|
/* 265 */ SyscallDesc("cdslxlate", unimplementedFunc),
|
|
/* 266 */ SyscallDesc("sendfile", unimplementedFunc),
|
|
};
|
|
|
|
const int Num_Syscall_Descs = sizeof(syscallDescs) / sizeof(SyscallDesc);
|
|
|
|
const int Max_Syscall_Desc = Num_Syscall_Descs - 1;
|
|
|
|
//
|
|
// Mach syscalls -- identified by negated syscall numbers
|
|
//
|
|
|
|
// Create a stack region for a thread.
|
|
int
|
|
stack_createFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
TypedBufferArg<OSF::vm_stack> argp(getArg(xc, 0));
|
|
|
|
argp.copyIn(xc->mem);
|
|
|
|
// if the user chose an address, just let them have it. Otherwise
|
|
// pick one for them.
|
|
if (argp->address == 0) {
|
|
argp->address = process->next_thread_stack_base;
|
|
int stack_size = (argp->rsize + argp->ysize + argp->gsize);
|
|
process->next_thread_stack_base -= stack_size;
|
|
argp.copyOut(xc->mem);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
const int NXM_LIB_VERSION = 301003;
|
|
|
|
//
|
|
// This call sets up the interface between the user and kernel
|
|
// schedulers by creating a shared-memory region. The shared memory
|
|
// region has several structs, some global, some per-RAD, some per-VP.
|
|
//
|
|
int
|
|
nxm_task_initFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
TypedBufferArg<OSF::nxm_task_attr> attrp(getArg(xc, 0));
|
|
TypedBufferArg<Addr> configptr_ptr(getArg(xc, 1));
|
|
|
|
attrp.copyIn(xc->mem);
|
|
|
|
if (attrp->nxm_version != NXM_LIB_VERSION) {
|
|
cerr << "nxm_task_init: thread library version mismatch! "
|
|
<< "got " << attrp->nxm_version
|
|
<< ", expected " << NXM_LIB_VERSION << endl;
|
|
abort();
|
|
}
|
|
|
|
if (attrp->flags != OSF::NXM_TASK_INIT_VP) {
|
|
cerr << "nxm_task_init: bad flag value " << attrp->flags
|
|
<< " (expected " << OSF::NXM_TASK_INIT_VP << ")" << endl;
|
|
abort();
|
|
}
|
|
|
|
const Addr base_addr = 0x12000; // was 0x3f0000000LL;
|
|
Addr cur_addr = base_addr; // next addresses to use
|
|
// first comes the config_info struct
|
|
Addr config_addr = cur_addr;
|
|
cur_addr += sizeof(OSF::nxm_config_info);
|
|
// next comes the per-cpu state vector
|
|
Addr slot_state_addr = cur_addr;
|
|
int slot_state_size = process->numCpus() * sizeof(OSF::nxm_slot_state_t);
|
|
cur_addr += slot_state_size;
|
|
// now the per-RAD state struct (we only support one RAD)
|
|
cur_addr = 0x14000; // bump up addr for alignment
|
|
Addr rad_state_addr = cur_addr;
|
|
int rad_state_size =
|
|
(sizeof(OSF::nxm_shared)
|
|
+ (process->numCpus()-1) * sizeof(OSF::nxm_sched_state));
|
|
cur_addr += rad_state_size;
|
|
|
|
// now initialize a config_info struct and copy it out to user space
|
|
TypedBufferArg<OSF::nxm_config_info> config(config_addr);
|
|
|
|
config->nxm_nslots_per_rad = process->numCpus();
|
|
config->nxm_nrads = 1; // only one RAD in our system!
|
|
config->nxm_slot_state = slot_state_addr;
|
|
config->nxm_rad[0] = rad_state_addr;
|
|
|
|
config.copyOut(xc->mem);
|
|
|
|
// initialize the slot_state array and copy it out
|
|
TypedBufferArg<OSF::nxm_slot_state_t> slot_state(slot_state_addr,
|
|
slot_state_size);
|
|
for (int i = 0; i < process->numCpus(); ++i) {
|
|
// CPU 0 is bound to the calling process; all others are available
|
|
slot_state[i] = (i == 0) ? OSF::NXM_SLOT_BOUND : OSF::NXM_SLOT_AVAIL;
|
|
}
|
|
|
|
slot_state.copyOut(xc->mem);
|
|
|
|
// same for the per-RAD "shared" struct. Note that we need to
|
|
// allocate extra bytes for the per-VP array which is embedded at
|
|
// the end.
|
|
TypedBufferArg<OSF::nxm_shared> rad_state(rad_state_addr,
|
|
rad_state_size);
|
|
|
|
rad_state->nxm_callback = attrp->nxm_callback;
|
|
rad_state->nxm_version = attrp->nxm_version;
|
|
rad_state->nxm_uniq_offset = attrp->nxm_uniq_offset;
|
|
for (int i = 0; i < process->numCpus(); ++i) {
|
|
OSF::nxm_sched_state *ssp = &rad_state->nxm_ss[i];
|
|
ssp->nxm_u.sigmask = 0;
|
|
ssp->nxm_u.sig = 0;
|
|
ssp->nxm_u.flags = 0;
|
|
ssp->nxm_u.cancel_state = 0;
|
|
ssp->nxm_u.nxm_ssig = 0;
|
|
ssp->nxm_bits = 0;
|
|
ssp->nxm_quantum = attrp->nxm_quantum;
|
|
ssp->nxm_set_quantum = attrp->nxm_quantum;
|
|
ssp->nxm_sysevent = 0;
|
|
|
|
if (i == 0) {
|
|
uint64_t uniq = xc->regs.miscRegs.uniq;
|
|
ssp->nxm_u.pth_id = uniq + attrp->nxm_uniq_offset;
|
|
ssp->nxm_u.nxm_active = uniq | 1;
|
|
}
|
|
else {
|
|
ssp->nxm_u.pth_id = 0;
|
|
ssp->nxm_u.nxm_active = 0;
|
|
}
|
|
}
|
|
|
|
rad_state.copyOut(xc->mem);
|
|
|
|
//
|
|
// copy pointer to shared config area out to user
|
|
//
|
|
*configptr_ptr = config_addr;
|
|
configptr_ptr.copyOut(xc->mem);
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static void
|
|
init_exec_context(ExecContext *ec,
|
|
OSF::nxm_thread_attr *attrp, uint64_t uniq_val)
|
|
{
|
|
memset(&ec->regs, 0, sizeof(ec->regs));
|
|
|
|
ec->regs.intRegFile[ArgumentReg0] = attrp->registers.a0;
|
|
ec->regs.intRegFile[27/*t12*/] = attrp->registers.pc;
|
|
ec->regs.intRegFile[StackPointerReg] = attrp->registers.sp;
|
|
ec->regs.miscRegs.uniq = uniq_val;
|
|
|
|
ec->regs.pc = attrp->registers.pc;
|
|
ec->regs.npc = attrp->registers.pc + sizeof(MachInst);
|
|
|
|
ec->setStatus(ExecContext::Active);
|
|
}
|
|
|
|
int
|
|
nxm_thread_createFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
TypedBufferArg<OSF::nxm_thread_attr> attrp(getArg(xc, 0));
|
|
TypedBufferArg<uint64_t> kidp(getArg(xc, 1));
|
|
int thread_index = getArg(xc, 2);
|
|
|
|
// get attribute args
|
|
attrp.copyIn(xc->mem);
|
|
|
|
if (attrp->version != NXM_LIB_VERSION) {
|
|
cerr << "nxm_thread_create: thread library version mismatch! "
|
|
<< "got " << attrp->version
|
|
<< ", expected " << NXM_LIB_VERSION << endl;
|
|
abort();
|
|
}
|
|
|
|
if (thread_index < 0 | thread_index > process->numCpus()) {
|
|
cerr << "nxm_thread_create: bad thread index " << thread_index
|
|
<< endl;
|
|
abort();
|
|
}
|
|
|
|
// On a real machine, the per-RAD shared structure is in
|
|
// shared memory, so both the user and kernel can get at it.
|
|
// We don't have that luxury, so we just copy it in and then
|
|
// back out again.
|
|
int rad_state_size =
|
|
(sizeof(OSF::nxm_shared) +
|
|
(process->numCpus()-1) * sizeof(OSF::nxm_sched_state));
|
|
|
|
TypedBufferArg<OSF::nxm_shared> rad_state(0x14000,
|
|
rad_state_size);
|
|
rad_state.copyIn(xc->mem);
|
|
|
|
uint64_t uniq_val = attrp->pthid - rad_state->nxm_uniq_offset;
|
|
|
|
if (attrp->type == OSF::NXM_TYPE_MANAGER) {
|
|
// DEC pthreads seems to always create one of these (in
|
|
// addition to N application threads), but we don't use it,
|
|
// so don't bother creating it.
|
|
|
|
// This is supposed to be a port number. Make something up.
|
|
*kidp = 99;
|
|
kidp.copyOut(xc->mem);
|
|
|
|
return 0;
|
|
} else if (attrp->type == OSF::NXM_TYPE_VP) {
|
|
// A real "virtual processor" kernel thread. Need to fork
|
|
// this thread on another CPU.
|
|
OSF::nxm_sched_state *ssp = &rad_state->nxm_ss[thread_index];
|
|
|
|
if (ssp->nxm_u.nxm_active != 0)
|
|
return OSF::KERN_NOT_RECEIVER;
|
|
|
|
ssp->nxm_u.pth_id = attrp->pthid;
|
|
ssp->nxm_u.nxm_active = uniq_val | 1;
|
|
|
|
rad_state.copyOut(xc->mem);
|
|
|
|
Addr slot_state_addr = 0x12000 + sizeof(OSF::nxm_config_info);
|
|
int slot_state_size = process->numCpus() * sizeof(OSF::nxm_slot_state_t);
|
|
|
|
TypedBufferArg<OSF::nxm_slot_state_t> slot_state(slot_state_addr,
|
|
slot_state_size);
|
|
|
|
slot_state.copyIn(xc->mem);
|
|
|
|
if (slot_state[thread_index] != OSF::NXM_SLOT_AVAIL) {
|
|
cerr << "nxm_thread_createFunc: requested VP slot "
|
|
<< thread_index << " not available!" << endl;
|
|
fatal("");
|
|
}
|
|
|
|
slot_state[thread_index] = OSF::NXM_SLOT_BOUND;
|
|
|
|
slot_state.copyOut(xc->mem);
|
|
|
|
// Find a free simulator execution context.
|
|
for (int i = 0; i < process->numCpus(); ++i) {
|
|
ExecContext *xc = process->execContexts[i];
|
|
|
|
if (xc->status() == ExecContext::Unallocated) {
|
|
// inactive context... grab it
|
|
init_exec_context(xc, attrp, uniq_val);
|
|
|
|
// This is supposed to be a port number, but we'll try
|
|
// and get away with just sticking the thread index
|
|
// here.
|
|
*kidp = thread_index;
|
|
kidp.copyOut(xc->mem);
|
|
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
// fell out of loop... no available inactive context
|
|
cerr << "nxm_thread_create: no idle contexts available." << endl;
|
|
abort();
|
|
} else {
|
|
cerr << "nxm_thread_create: can't handle thread type "
|
|
<< attrp->type << endl;
|
|
abort();
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
int
|
|
nxm_idleFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
nxm_thread_blockFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
uint64_t tid = getArg(xc, 0);
|
|
uint64_t secs = getArg(xc, 1);
|
|
uint64_t flags = getArg(xc, 2);
|
|
uint64_t action = getArg(xc, 3);
|
|
uint64_t usecs = getArg(xc, 4);
|
|
|
|
cout << xc->cpu->name() << ": nxm_thread_block " << tid << " " << secs
|
|
<< " " << flags << " " << action << " " << usecs << endl;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
int
|
|
nxm_blockFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
Addr uaddr = getArg(xc, 0);
|
|
uint64_t val = getArg(xc, 1);
|
|
uint64_t secs = getArg(xc, 2);
|
|
uint64_t usecs = getArg(xc, 3);
|
|
uint64_t flags = getArg(xc, 4);
|
|
|
|
BaseCPU *cpu = xc->cpu;
|
|
|
|
cout << cpu->name() << ": nxm_block " << hex << uaddr << dec << " " << val
|
|
<< " " << secs << " " << usecs
|
|
<< " " << flags << endl;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
int
|
|
nxm_unblockFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
Addr uaddr = getArg(xc, 0);
|
|
|
|
cout << xc->cpu->name() << ": nxm_unblock "
|
|
<< hex << uaddr << dec << endl;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
int
|
|
swtch_priFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
// Attempts to switch to another runnable thread (if there is
|
|
// one). Returns false if there are no other threads to run
|
|
// (i.e., the thread can reasonably spin-wait) or true if there
|
|
// are other threads.
|
|
//
|
|
// Since we assume at most one "kernel" thread per CPU, it's
|
|
// always safe to return false here.
|
|
return false;
|
|
}
|
|
|
|
|
|
// just activate one by default
|
|
static int
|
|
activate_waiting_context(Addr uaddr, Process *process,
|
|
bool activate_all = false)
|
|
{
|
|
int num_activated = 0;
|
|
|
|
list<Process::WaitRec>::iterator i = process->waitList.begin();
|
|
list<Process::WaitRec>::iterator end = process->waitList.end();
|
|
|
|
while (i != end && (num_activated == 0 || activate_all)) {
|
|
if (i->waitChan == uaddr) {
|
|
// found waiting process: make it active
|
|
ExecContext *newCtx = i->waitingContext;
|
|
assert(newCtx->status() == ExecContext::Suspended);
|
|
newCtx->setStatus(ExecContext::Active);
|
|
|
|
// get rid of this record
|
|
i = process->waitList.erase(i);
|
|
|
|
++num_activated;
|
|
} else {
|
|
++i;
|
|
}
|
|
}
|
|
|
|
return num_activated;
|
|
}
|
|
|
|
|
|
static void
|
|
m5_lock_mutex(Addr uaddr, Process *process, ExecContext *xc)
|
|
{
|
|
TypedBufferArg<uint64_t> lockp(uaddr);
|
|
|
|
lockp.copyIn(xc->mem);
|
|
|
|
if (*lockp == 0) {
|
|
// lock is free: grab it
|
|
*lockp = 1;
|
|
lockp.copyOut(xc->mem);
|
|
} else {
|
|
// lock is busy: disable until free
|
|
process->waitList.push_back(Process::WaitRec(uaddr, xc));
|
|
xc->setStatus(ExecContext::Suspended);
|
|
}
|
|
}
|
|
|
|
static void
|
|
m5_unlock_mutex(Addr uaddr, Process *process, ExecContext *xc)
|
|
{
|
|
TypedBufferArg<uint64_t> lockp(uaddr);
|
|
|
|
lockp.copyIn(xc->mem);
|
|
assert(*lockp != 0);
|
|
|
|
// Check for a process waiting on the lock.
|
|
int num_waiting = activate_waiting_context(uaddr, process);
|
|
|
|
// clear lock field if no waiting context is taking over the lock
|
|
if (num_waiting == 0) {
|
|
*lockp = 0;
|
|
lockp.copyOut(xc->mem);
|
|
}
|
|
}
|
|
|
|
|
|
int
|
|
m5_mutex_lockFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
Addr uaddr = getArg(xc, 0);
|
|
|
|
m5_lock_mutex(uaddr, process, xc);
|
|
|
|
// Return 0 since we will always return to the user with the lock
|
|
// acquired. We will just keep the context inactive until that is
|
|
// true.
|
|
return 0;
|
|
}
|
|
|
|
|
|
int
|
|
m5_mutex_trylockFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
Addr uaddr = getArg(xc, 0);
|
|
TypedBufferArg<uint64_t> lockp(uaddr);
|
|
|
|
lockp.copyIn(xc->mem);
|
|
|
|
if (*lockp == 0) {
|
|
// lock is free: grab it
|
|
*lockp = 1;
|
|
lockp.copyOut(xc->mem);
|
|
return 0;
|
|
} else {
|
|
return 1;
|
|
}
|
|
}
|
|
|
|
|
|
int
|
|
m5_mutex_unlockFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
Addr uaddr = getArg(xc, 0);
|
|
|
|
m5_unlock_mutex(uaddr, process, xc);
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
int
|
|
m5_cond_signalFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
Addr cond_addr = getArg(xc, 0);
|
|
|
|
// Wqake up one process waiting on the condition variable.
|
|
activate_waiting_context(cond_addr, process);
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
int
|
|
m5_cond_broadcastFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
Addr cond_addr = getArg(xc, 0);
|
|
|
|
// Wake up all processes waiting on the condition variable.
|
|
activate_waiting_context(cond_addr, process, true);
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
int
|
|
m5_cond_waitFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
Addr cond_addr = getArg(xc, 0);
|
|
Addr lock_addr = getArg(xc, 1);
|
|
TypedBufferArg<uint64_t> condp(cond_addr);
|
|
TypedBufferArg<uint64_t> lockp(lock_addr);
|
|
|
|
// user is supposed to acquire lock before entering
|
|
lockp.copyIn(xc->mem);
|
|
assert(*lockp != 0);
|
|
|
|
m5_unlock_mutex(lock_addr, process, xc);
|
|
|
|
process->waitList.push_back(Process::WaitRec(cond_addr, xc));
|
|
xc->setStatus(ExecContext::Suspended);
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
int
|
|
m5_thread_exitFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
assert(xc->status() == ExecContext::Active);
|
|
xc->setStatus(ExecContext::Unallocated);
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
SyscallDesc machSyscallDescs[] = {
|
|
/* 0 */ SyscallDesc("kern_invalid", unimplementedFunc),
|
|
/* 1 */ SyscallDesc("m5_mutex_lock", m5_mutex_lockFunc),
|
|
/* 2 */ SyscallDesc("m5_mutex_trylock", m5_mutex_trylockFunc),
|
|
/* 3 */ SyscallDesc("m5_mutex_unlock", m5_mutex_unlockFunc),
|
|
/* 4 */ SyscallDesc("m5_cond_signal", m5_cond_signalFunc),
|
|
/* 5 */ SyscallDesc("m5_cond_broadcast", m5_cond_broadcastFunc),
|
|
/* 6 */ SyscallDesc("m5_cond_wait", m5_cond_waitFunc),
|
|
/* 7 */ SyscallDesc("m5_thread_exit", m5_thread_exitFunc),
|
|
/* 8 */ SyscallDesc("kern_invalid", unimplementedFunc),
|
|
/* 9 */ SyscallDesc("kern_invalid", unimplementedFunc),
|
|
/* 10 */ SyscallDesc("task_self", unimplementedFunc),
|
|
/* 11 */ SyscallDesc("thread_reply", unimplementedFunc),
|
|
/* 12 */ SyscallDesc("task_notify", unimplementedFunc),
|
|
/* 13 */ SyscallDesc("thread_self", unimplementedFunc),
|
|
/* 14 */ SyscallDesc("kern_invalid", unimplementedFunc),
|
|
/* 15 */ SyscallDesc("kern_invalid", unimplementedFunc),
|
|
/* 16 */ SyscallDesc("kern_invalid", unimplementedFunc),
|
|
/* 17 */ SyscallDesc("kern_invalid", unimplementedFunc),
|
|
/* 18 */ SyscallDesc("kern_invalid", unimplementedFunc),
|
|
/* 19 */ SyscallDesc("kern_invalid", unimplementedFunc),
|
|
/* 20 */ SyscallDesc("msg_send_trap", unimplementedFunc),
|
|
/* 21 */ SyscallDesc("msg_receive_trap", unimplementedFunc),
|
|
/* 22 */ SyscallDesc("msg_rpc_trap", unimplementedFunc),
|
|
/* 23 */ SyscallDesc("kern_invalid", unimplementedFunc),
|
|
/* 24 */ SyscallDesc("nxm_block", nxm_blockFunc),
|
|
/* 25 */ SyscallDesc("nxm_unblock", nxm_unblockFunc),
|
|
/* 26 */ SyscallDesc("kern_invalid", unimplementedFunc),
|
|
/* 27 */ SyscallDesc("kern_invalid", unimplementedFunc),
|
|
/* 28 */ SyscallDesc("kern_invalid", unimplementedFunc),
|
|
/* 29 */ SyscallDesc("nxm_thread_destroy", unimplementedFunc),
|
|
/* 30 */ SyscallDesc("lw_wire", unimplementedFunc),
|
|
/* 31 */ SyscallDesc("lw_unwire", unimplementedFunc),
|
|
/* 32 */ SyscallDesc("nxm_thread_create", nxm_thread_createFunc),
|
|
/* 33 */ SyscallDesc("nxm_task_init", nxm_task_initFunc),
|
|
/* 34 */ SyscallDesc("kern_invalid", unimplementedFunc),
|
|
/* 35 */ SyscallDesc("nxm_idle", nxm_idleFunc),
|
|
/* 36 */ SyscallDesc("nxm_wakeup_idle", unimplementedFunc),
|
|
/* 37 */ SyscallDesc("nxm_set_pthid", unimplementedFunc),
|
|
/* 38 */ SyscallDesc("nxm_thread_kill", unimplementedFunc),
|
|
/* 39 */ SyscallDesc("nxm_thread_block", nxm_thread_blockFunc),
|
|
/* 40 */ SyscallDesc("nxm_thread_wakeup", unimplementedFunc),
|
|
/* 41 */ SyscallDesc("init_process", unimplementedFunc),
|
|
/* 42 */ SyscallDesc("nxm_get_binding", unimplementedFunc),
|
|
/* 43 */ SyscallDesc("map_fd", unimplementedFunc),
|
|
/* 44 */ SyscallDesc("nxm_resched", unimplementedFunc),
|
|
/* 45 */ SyscallDesc("nxm_set_cancel", unimplementedFunc),
|
|
/* 46 */ SyscallDesc("nxm_set_binding", unimplementedFunc),
|
|
/* 47 */ SyscallDesc("stack_create", stack_createFunc),
|
|
/* 48 */ SyscallDesc("nxm_get_state", unimplementedFunc),
|
|
/* 49 */ SyscallDesc("nxm_thread_suspend", unimplementedFunc),
|
|
/* 50 */ SyscallDesc("nxm_thread_resume", unimplementedFunc),
|
|
/* 51 */ SyscallDesc("nxm_signal_check", unimplementedFunc),
|
|
/* 52 */ SyscallDesc("htg_unix_syscall", unimplementedFunc),
|
|
/* 53 */ SyscallDesc("kern_invalid", unimplementedFunc),
|
|
/* 54 */ SyscallDesc("kern_invalid", unimplementedFunc),
|
|
/* 55 */ SyscallDesc("host_self", unimplementedFunc),
|
|
/* 56 */ SyscallDesc("host_priv_self", unimplementedFunc),
|
|
/* 57 */ SyscallDesc("kern_invalid", unimplementedFunc),
|
|
/* 58 */ SyscallDesc("kern_invalid", unimplementedFunc),
|
|
/* 59 */ SyscallDesc("swtch_pri", swtch_priFunc),
|
|
/* 60 */ SyscallDesc("swtch", unimplementedFunc),
|
|
/* 61 */ SyscallDesc("thread_switch", unimplementedFunc),
|
|
/* 62 */ SyscallDesc("semop_fast", unimplementedFunc),
|
|
/* 63 */ SyscallDesc("nxm_pshared_init", unimplementedFunc),
|
|
/* 64 */ SyscallDesc("nxm_pshared_block", unimplementedFunc),
|
|
/* 65 */ SyscallDesc("nxm_pshared_unblock", unimplementedFunc),
|
|
/* 66 */ SyscallDesc("nxm_pshared_destroy", unimplementedFunc),
|
|
/* 67 */ SyscallDesc("nxm_swtch_pri", swtch_priFunc),
|
|
/* 68 */ SyscallDesc("lw_syscall", unimplementedFunc),
|
|
/* 69 */ SyscallDesc("kern_invalid", unimplementedFunc),
|
|
/* 70 */ SyscallDesc("mach_sctimes_0", unimplementedFunc),
|
|
/* 71 */ SyscallDesc("mach_sctimes_1", unimplementedFunc),
|
|
/* 72 */ SyscallDesc("mach_sctimes_2", unimplementedFunc),
|
|
/* 73 */ SyscallDesc("mach_sctimes_3", unimplementedFunc),
|
|
/* 74 */ SyscallDesc("mach_sctimes_4", unimplementedFunc),
|
|
/* 75 */ SyscallDesc("mach_sctimes_5", unimplementedFunc),
|
|
/* 76 */ SyscallDesc("mach_sctimes_6", unimplementedFunc),
|
|
/* 77 */ SyscallDesc("mach_sctimes_7", unimplementedFunc),
|
|
/* 78 */ SyscallDesc("mach_sctimes_8", unimplementedFunc),
|
|
/* 79 */ SyscallDesc("mach_sctimes_9", unimplementedFunc),
|
|
/* 80 */ SyscallDesc("mach_sctimes_10", unimplementedFunc),
|
|
/* 81 */ SyscallDesc("mach_sctimes_11", unimplementedFunc),
|
|
/* 82 */ SyscallDesc("mach_sctimes_port_alloc_dealloc", unimplementedFunc)
|
|
};
|
|
|
|
const int Num_Mach_Syscall_Descs =
|
|
sizeof(machSyscallDescs) / sizeof(SyscallDesc);
|
|
|
|
const int Max_Mach_Syscall_Desc = Num_Mach_Syscall_Descs - 1;
|
|
|
|
// Since negated values are used to identify Mach syscalls, the
|
|
// minimum (signed) valid syscall number is the negated max Mach
|
|
// syscall number.
|
|
const int Min_Syscall_Desc = -Max_Mach_Syscall_Desc;
|
|
|
|
|
|
//
|
|
// helper function for invoking syscalls
|
|
//
|
|
static
|
|
void
|
|
doSyscall(int callnum, Process *process, ExecContext *xc)
|
|
{
|
|
if (callnum < Min_Syscall_Desc || callnum > Max_Syscall_Desc) {
|
|
cerr << "Syscall " << callnum << " out of range" << endl;
|
|
abort();
|
|
}
|
|
|
|
SyscallDesc *desc =
|
|
(callnum < 0) ? &machSyscallDescs[-callnum] : &syscallDescs[callnum];
|
|
|
|
DPRINTFR(SyscallVerbose, "%s: syscall %s called\n",
|
|
xc->cpu->name(), desc->name);
|
|
|
|
int retval = desc->doFunc(callnum, process, xc);
|
|
|
|
DPRINTFR(SyscallVerbose, "%s: syscall %s returns %d\n",
|
|
xc->cpu->name(), desc->name, retval);
|
|
|
|
if (!((desc->flags & SyscallDesc::SuppressReturnValue) && retval == 0))
|
|
set_return_value(xc, retval);
|
|
}
|
|
|
|
//
|
|
// Indirect syscall invocation (call #0)
|
|
//
|
|
int
|
|
indirectSyscallFunc(SyscallDesc *desc, int callnum, Process *process,
|
|
ExecContext *xc)
|
|
{
|
|
int new_callnum = getArg(xc, 0);
|
|
|
|
for (int i = 0; i < 5; ++i)
|
|
setArg(xc, i, getArg(xc, i+1));
|
|
|
|
doSyscall(new_callnum, process, xc);
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
void
|
|
fake_syscall(Process *process, ExecContext *xc)
|
|
{
|
|
int64_t callnum = xc->regs.intRegFile[ReturnValueReg];
|
|
|
|
doSyscall(callnum, process, xc);
|
|
}
|