2 * file related system call shims and definitions
4 * Copyright (c) 2013 Stacey D. Son
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, see <http://www.gnu.org/licenses/>.
23 #include "qemu/path.h"
25 #define LOCK_PATH(p, arg) \
27 (p) = lock_user_string(arg); \
29 return -TARGET_EFAULT; \
33 #define UNLOCK_PATH(p, arg) unlock_user(p, arg, 0)
35 #define LOCK_PATH2(p1, arg1, p2, arg2) \
37 (p1) = lock_user_string(arg1); \
39 return -TARGET_EFAULT; \
41 (p2) = lock_user_string(arg2); \
43 unlock_user(p1, arg1, 0); \
44 return -TARGET_EFAULT; \
48 #define UNLOCK_PATH2(p1, arg1, p2, arg2) \
50 unlock_user(p2, arg2, 0); \
51 unlock_user(p1, arg1, 0); \
54 extern struct iovec
*lock_iovec(int type
, abi_ulong target_addr
, int count
,
56 extern void unlock_iovec(struct iovec
*vec
, abi_ulong target_addr
, int count
,
59 int safe_open(const char *path
, int flags
, mode_t mode
);
60 int safe_openat(int fd
, const char *path
, int flags
, mode_t mode
);
62 ssize_t
safe_read(int fd
, void *buf
, size_t nbytes
);
63 ssize_t
safe_pread(int fd
, void *buf
, size_t nbytes
, off_t offset
);
64 ssize_t
safe_readv(int fd
, const struct iovec
*iov
, int iovcnt
);
65 ssize_t
safe_preadv(int fd
, const struct iovec
*iov
, int iovcnt
, off_t offset
);
67 ssize_t
safe_write(int fd
, void *buf
, size_t nbytes
);
68 ssize_t
safe_pwrite(int fd
, void *buf
, size_t nbytes
, off_t offset
);
69 ssize_t
safe_writev(int fd
, const struct iovec
*iov
, int iovcnt
);
70 ssize_t
safe_pwritev(int fd
, const struct iovec
*iov
, int iovcnt
, off_t offset
);
73 static abi_long
do_bsd_read(abi_long arg1
, abi_long arg2
, abi_long arg3
)
78 p
= lock_user(VERIFY_WRITE
, arg2
, arg3
, 0);
80 return -TARGET_EFAULT
;
82 ret
= get_errno(safe_read(arg1
, p
, arg3
));
83 unlock_user(p
, arg2
, ret
);
89 static abi_long
do_bsd_pread(void *cpu_env
, abi_long arg1
,
90 abi_long arg2
, abi_long arg3
, abi_long arg4
, abi_long arg5
, abi_long arg6
)
95 p
= lock_user(VERIFY_WRITE
, arg2
, arg3
, 0);
97 return -TARGET_EFAULT
;
99 if (regpairs_aligned(cpu_env
) != 0) {
103 ret
= get_errno(safe_pread(arg1
, p
, arg3
, target_arg64(arg4
, arg5
)));
104 unlock_user(p
, arg2
, ret
);
110 static abi_long
do_bsd_readv(abi_long arg1
, abi_long arg2
, abi_long arg3
)
113 struct iovec
*vec
= lock_iovec(VERIFY_WRITE
, arg2
, arg3
, 0);
116 ret
= get_errno(safe_readv(arg1
, vec
, arg3
));
117 unlock_iovec(vec
, arg2
, arg3
, 1);
119 ret
= -host_to_target_errno(errno
);
126 static abi_long
do_bsd_preadv(void *cpu_env
, abi_long arg1
,
127 abi_long arg2
, abi_long arg3
, abi_long arg4
, abi_long arg5
, abi_long arg6
)
130 struct iovec
*vec
= lock_iovec(VERIFY_WRITE
, arg2
, arg3
, 1);
133 if (regpairs_aligned(cpu_env
) != 0) {
137 ret
= get_errno(safe_preadv(arg1
, vec
, arg3
, target_arg64(arg4
, arg5
)));
138 unlock_iovec(vec
, arg2
, arg3
, 0);
140 ret
= -host_to_target_errno(errno
);
147 static abi_long
do_bsd_write(abi_long arg1
, abi_long arg2
, abi_long arg3
)
149 abi_long nbytes
, ret
;
152 /* nbytes < 0 implies that it was larger than SIZE_MAX. */
155 return -TARGET_EINVAL
;
157 p
= lock_user(VERIFY_READ
, arg2
, nbytes
, 1);
159 return -TARGET_EFAULT
;
161 ret
= get_errno(safe_write(arg1
, p
, arg3
));
162 unlock_user(p
, arg2
, 0);
168 static abi_long
do_bsd_pwrite(void *cpu_env
, abi_long arg1
,
169 abi_long arg2
, abi_long arg3
, abi_long arg4
, abi_long arg5
, abi_long arg6
)
174 p
= lock_user(VERIFY_READ
, arg2
, arg3
, 1);
176 return -TARGET_EFAULT
;
178 if (regpairs_aligned(cpu_env
) != 0) {
182 ret
= get_errno(safe_pwrite(arg1
, p
, arg3
, target_arg64(arg4
, arg5
)));
183 unlock_user(p
, arg2
, 0);
189 static abi_long
do_bsd_writev(abi_long arg1
, abi_long arg2
, abi_long arg3
)
192 struct iovec
*vec
= lock_iovec(VERIFY_READ
, arg2
, arg3
, 1);
195 ret
= get_errno(safe_writev(arg1
, vec
, arg3
));
196 unlock_iovec(vec
, arg2
, arg3
, 0);
198 ret
= -host_to_target_errno(errno
);
205 static abi_long
do_bsd_pwritev(void *cpu_env
, abi_long arg1
,
206 abi_long arg2
, abi_long arg3
, abi_long arg4
, abi_long arg5
, abi_long arg6
)
209 struct iovec
*vec
= lock_iovec(VERIFY_READ
, arg2
, arg3
, 1);
212 if (regpairs_aligned(cpu_env
) != 0) {
216 ret
= get_errno(safe_pwritev(arg1
, vec
, arg3
, target_arg64(arg4
, arg5
)));
217 unlock_iovec(vec
, arg2
, arg3
, 0);
219 ret
= -host_to_target_errno(errno
);
226 static abi_long
do_bsd_open(abi_long arg1
, abi_long arg2
, abi_long arg3
)
232 ret
= get_errno(safe_open(path(p
), target_to_host_bitmask(arg2
,
233 fcntl_flags_tbl
), arg3
));
234 UNLOCK_PATH(p
, arg1
);
240 static abi_long
do_bsd_openat(abi_long arg1
, abi_long arg2
,
241 abi_long arg3
, abi_long arg4
)
247 ret
= get_errno(safe_openat(arg1
, path(p
),
248 target_to_host_bitmask(arg3
, fcntl_flags_tbl
), arg4
));
249 UNLOCK_PATH(p
, arg2
);
255 static inline abi_long
do_bsd_close(abi_long arg1
)
257 return get_errno(close(arg1
));
261 static abi_long
do_bsd_fdatasync(abi_long arg1
)
263 return get_errno(fdatasync(arg1
));
267 static abi_long
do_bsd_fsync(abi_long arg1
)
269 return get_errno(fsync(arg1
));
273 static abi_long
do_bsd_closefrom(abi_long arg1
)
275 closefrom(arg1
); /* returns void */
280 static abi_long
do_bsd_revoke(abi_long arg1
)
286 ret
= get_errno(revoke(p
)); /* XXX path(p)? */
287 UNLOCK_PATH(p
, arg1
);
293 static abi_long
do_bsd_access(abi_long arg1
, abi_long arg2
)
299 ret
= get_errno(access(path(p
), arg2
));
300 UNLOCK_PATH(p
, arg1
);
306 static abi_long
do_bsd_eaccess(abi_long arg1
, abi_long arg2
)
312 ret
= get_errno(eaccess(path(p
), arg2
));
313 UNLOCK_PATH(p
, arg1
);
319 static abi_long
do_bsd_faccessat(abi_long arg1
, abi_long arg2
,
320 abi_long arg3
, abi_long arg4
)
326 ret
= get_errno(faccessat(arg1
, p
, arg3
, arg4
)); /* XXX path(p)? */
327 UNLOCK_PATH(p
, arg2
);
333 static abi_long
do_bsd_chdir(abi_long arg1
)
339 ret
= get_errno(chdir(p
)); /* XXX path(p)? */
340 UNLOCK_PATH(p
, arg1
);
346 static abi_long
do_bsd_fchdir(abi_long arg1
)
348 return get_errno(fchdir(arg1
));
352 static abi_long
do_bsd_rename(abi_long arg1
, abi_long arg2
)
357 LOCK_PATH2(p1
, arg1
, p2
, arg2
);
358 ret
= get_errno(rename(p1
, p2
)); /* XXX path(p1), path(p2) */
359 UNLOCK_PATH2(p1
, arg1
, p2
, arg2
);
365 static abi_long
do_bsd_renameat(abi_long arg1
, abi_long arg2
,
366 abi_long arg3
, abi_long arg4
)
371 LOCK_PATH2(p1
, arg2
, p2
, arg4
);
372 ret
= get_errno(renameat(arg1
, p1
, arg3
, p2
));
373 UNLOCK_PATH2(p1
, arg2
, p2
, arg4
);
379 static abi_long
do_bsd_link(abi_long arg1
, abi_long arg2
)
384 LOCK_PATH2(p1
, arg1
, p2
, arg2
);
385 ret
= get_errno(link(p1
, p2
)); /* XXX path(p1), path(p2) */
386 UNLOCK_PATH2(p1
, arg1
, p2
, arg2
);
392 static abi_long
do_bsd_linkat(abi_long arg1
, abi_long arg2
,
393 abi_long arg3
, abi_long arg4
, abi_long arg5
)
398 LOCK_PATH2(p1
, arg2
, p2
, arg4
);
399 ret
= get_errno(linkat(arg1
, p1
, arg3
, p2
, arg5
));
400 UNLOCK_PATH2(p1
, arg2
, p2
, arg4
);
406 static abi_long
do_bsd_unlink(abi_long arg1
)
412 ret
= get_errno(unlink(p
)); /* XXX path(p) */
413 UNLOCK_PATH(p
, arg1
);
419 static abi_long
do_bsd_unlinkat(abi_long arg1
, abi_long arg2
,
426 ret
= get_errno(unlinkat(arg1
, p
, arg3
)); /* XXX path(p) */
427 UNLOCK_PATH(p
, arg2
);
433 static abi_long
do_bsd_mkdir(abi_long arg1
, abi_long arg2
)
439 ret
= get_errno(mkdir(p
, arg2
)); /* XXX path(p) */
440 UNLOCK_PATH(p
, arg1
);
446 static abi_long
do_bsd_mkdirat(abi_long arg1
, abi_long arg2
,
453 ret
= get_errno(mkdirat(arg1
, p
, arg3
));
454 UNLOCK_PATH(p
, arg2
);
460 static abi_long
do_bsd_rmdir(abi_long arg1
)
466 ret
= get_errno(rmdir(p
)); /* XXX path(p)? */
467 UNLOCK_PATH(p
, arg1
);
472 /* undocumented __getcwd(char *buf, size_t len) system call */
473 static abi_long
do_bsd___getcwd(abi_long arg1
, abi_long arg2
)
478 p
= lock_user(VERIFY_WRITE
, arg1
, arg2
, 0);
480 return -TARGET_EFAULT
;
482 ret
= safe_syscall(SYS___getcwd
, p
, arg2
);
483 unlock_user(p
, arg1
, ret
== 0 ? strlen(p
) + 1 : 0);
485 return get_errno(ret
);
489 static abi_long
do_bsd_dup(abi_long arg1
)
491 return get_errno(dup(arg1
));
495 static abi_long
do_bsd_dup2(abi_long arg1
, abi_long arg2
)
497 return get_errno(dup2(arg1
, arg2
));
501 static abi_long
do_bsd_truncate(void *cpu_env
, abi_long arg1
,
502 abi_long arg2
, abi_long arg3
, abi_long arg4
)
508 if (regpairs_aligned(cpu_env
) != 0) {
512 ret
= get_errno(truncate(p
, target_arg64(arg2
, arg3
)));
513 UNLOCK_PATH(p
, arg1
);
519 static abi_long
do_bsd_ftruncate(void *cpu_env
, abi_long arg1
,
520 abi_long arg2
, abi_long arg3
, abi_long arg4
)
522 if (regpairs_aligned(cpu_env
) != 0) {
526 return get_errno(ftruncate(arg1
, target_arg64(arg2
, arg3
)));
530 static abi_long
do_bsd_acct(abi_long arg1
)
536 ret
= get_errno(acct(NULL
));
539 ret
= get_errno(acct(path(p
)));
540 UNLOCK_PATH(p
, arg1
);
546 static abi_long
do_bsd_sync(void)
552 #endif /* BSD_FILE_H */