hw/arm/aspeed: Add MAX31785 Fan controllers
[qemu.git] / bsd-user / bsd-file.h
blobb2dca5861295f7979d87d63f93332cdf411c07a1
1 /*
2 * file related system call shims and definitions
4 * Copyright (c) 2013 Stacey D. Son
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, see <http://www.gnu.org/licenses/>.
20 #ifndef BSD_FILE_H
21 #define BSD_FILE_H
23 #include "qemu/path.h"
25 #define LOCK_PATH(p, arg) \
26 do { \
27 (p) = lock_user_string(arg); \
28 if ((p) == NULL) { \
29 return -TARGET_EFAULT; \
30 } \
31 } while (0)
33 #define UNLOCK_PATH(p, arg) unlock_user(p, arg, 0)
35 #define LOCK_PATH2(p1, arg1, p2, arg2) \
36 do { \
37 (p1) = lock_user_string(arg1); \
38 if ((p1) == NULL) { \
39 return -TARGET_EFAULT; \
40 } \
41 (p2) = lock_user_string(arg2); \
42 if ((p2) == NULL) { \
43 unlock_user(p1, arg1, 0); \
44 return -TARGET_EFAULT; \
45 } \
46 } while (0)
48 #define UNLOCK_PATH2(p1, arg1, p2, arg2) \
49 do { \
50 unlock_user(p2, arg2, 0); \
51 unlock_user(p1, arg1, 0); \
52 } while (0)
54 extern struct iovec *lock_iovec(int type, abi_ulong target_addr, int count,
55 int copy);
56 extern void unlock_iovec(struct iovec *vec, abi_ulong target_addr, int count,
57 int copy);
59 int safe_open(const char *path, int flags, mode_t mode);
60 int safe_openat(int fd, const char *path, int flags, mode_t mode);
62 ssize_t safe_read(int fd, void *buf, size_t nbytes);
63 ssize_t safe_pread(int fd, void *buf, size_t nbytes, off_t offset);
64 ssize_t safe_readv(int fd, const struct iovec *iov, int iovcnt);
65 ssize_t safe_preadv(int fd, const struct iovec *iov, int iovcnt, off_t offset);
67 ssize_t safe_write(int fd, void *buf, size_t nbytes);
68 ssize_t safe_pwrite(int fd, void *buf, size_t nbytes, off_t offset);
69 ssize_t safe_writev(int fd, const struct iovec *iov, int iovcnt);
70 ssize_t safe_pwritev(int fd, const struct iovec *iov, int iovcnt, off_t offset);
72 /* read(2) */
73 static abi_long do_bsd_read(abi_long arg1, abi_long arg2, abi_long arg3)
75 abi_long ret;
76 void *p;
78 p = lock_user(VERIFY_WRITE, arg2, arg3, 0);
79 if (p == NULL) {
80 return -TARGET_EFAULT;
82 ret = get_errno(safe_read(arg1, p, arg3));
83 unlock_user(p, arg2, ret);
85 return ret;
88 /* pread(2) */
89 static abi_long do_bsd_pread(void *cpu_env, abi_long arg1,
90 abi_long arg2, abi_long arg3, abi_long arg4, abi_long arg5, abi_long arg6)
92 abi_long ret;
93 void *p;
95 p = lock_user(VERIFY_WRITE, arg2, arg3, 0);
96 if (p == NULL) {
97 return -TARGET_EFAULT;
99 if (regpairs_aligned(cpu_env) != 0) {
100 arg4 = arg5;
101 arg5 = arg6;
103 ret = get_errno(safe_pread(arg1, p, arg3, target_arg64(arg4, arg5)));
104 unlock_user(p, arg2, ret);
106 return ret;
109 /* readv(2) */
110 static abi_long do_bsd_readv(abi_long arg1, abi_long arg2, abi_long arg3)
112 abi_long ret;
113 struct iovec *vec = lock_iovec(VERIFY_WRITE, arg2, arg3, 0);
115 if (vec != NULL) {
116 ret = get_errno(safe_readv(arg1, vec, arg3));
117 unlock_iovec(vec, arg2, arg3, 1);
118 } else {
119 ret = -host_to_target_errno(errno);
122 return ret;
125 /* preadv(2) */
126 static abi_long do_bsd_preadv(void *cpu_env, abi_long arg1,
127 abi_long arg2, abi_long arg3, abi_long arg4, abi_long arg5, abi_long arg6)
129 abi_long ret;
130 struct iovec *vec = lock_iovec(VERIFY_WRITE, arg2, arg3, 1);
132 if (vec != NULL) {
133 if (regpairs_aligned(cpu_env) != 0) {
134 arg4 = arg5;
135 arg5 = arg6;
137 ret = get_errno(safe_preadv(arg1, vec, arg3, target_arg64(arg4, arg5)));
138 unlock_iovec(vec, arg2, arg3, 0);
139 } else {
140 ret = -host_to_target_errno(errno);
143 return ret;
146 /* write(2) */
147 static abi_long do_bsd_write(abi_long arg1, abi_long arg2, abi_long arg3)
149 abi_long nbytes, ret;
150 void *p;
152 /* nbytes < 0 implies that it was larger than SIZE_MAX. */
153 nbytes = arg3;
154 if (nbytes < 0) {
155 return -TARGET_EINVAL;
157 p = lock_user(VERIFY_READ, arg2, nbytes, 1);
158 if (p == NULL) {
159 return -TARGET_EFAULT;
161 ret = get_errno(safe_write(arg1, p, arg3));
162 unlock_user(p, arg2, 0);
164 return ret;
167 /* pwrite(2) */
168 static abi_long do_bsd_pwrite(void *cpu_env, abi_long arg1,
169 abi_long arg2, abi_long arg3, abi_long arg4, abi_long arg5, abi_long arg6)
171 abi_long ret;
172 void *p;
174 p = lock_user(VERIFY_READ, arg2, arg3, 1);
175 if (p == NULL) {
176 return -TARGET_EFAULT;
178 if (regpairs_aligned(cpu_env) != 0) {
179 arg4 = arg5;
180 arg5 = arg6;
182 ret = get_errno(safe_pwrite(arg1, p, arg3, target_arg64(arg4, arg5)));
183 unlock_user(p, arg2, 0);
185 return ret;
188 /* writev(2) */
189 static abi_long do_bsd_writev(abi_long arg1, abi_long arg2, abi_long arg3)
191 abi_long ret;
192 struct iovec *vec = lock_iovec(VERIFY_READ, arg2, arg3, 1);
194 if (vec != NULL) {
195 ret = get_errno(safe_writev(arg1, vec, arg3));
196 unlock_iovec(vec, arg2, arg3, 0);
197 } else {
198 ret = -host_to_target_errno(errno);
201 return ret;
204 /* pwritev(2) */
205 static abi_long do_bsd_pwritev(void *cpu_env, abi_long arg1,
206 abi_long arg2, abi_long arg3, abi_long arg4, abi_long arg5, abi_long arg6)
208 abi_long ret;
209 struct iovec *vec = lock_iovec(VERIFY_READ, arg2, arg3, 1);
211 if (vec != NULL) {
212 if (regpairs_aligned(cpu_env) != 0) {
213 arg4 = arg5;
214 arg5 = arg6;
216 ret = get_errno(safe_pwritev(arg1, vec, arg3, target_arg64(arg4, arg5)));
217 unlock_iovec(vec, arg2, arg3, 0);
218 } else {
219 ret = -host_to_target_errno(errno);
222 return ret;
225 /* open(2) */
226 static abi_long do_bsd_open(abi_long arg1, abi_long arg2, abi_long arg3)
228 abi_long ret;
229 void *p;
231 LOCK_PATH(p, arg1);
232 ret = get_errno(safe_open(path(p), target_to_host_bitmask(arg2,
233 fcntl_flags_tbl), arg3));
234 UNLOCK_PATH(p, arg1);
236 return ret;
239 /* openat(2) */
240 static abi_long do_bsd_openat(abi_long arg1, abi_long arg2,
241 abi_long arg3, abi_long arg4)
243 abi_long ret;
244 void *p;
246 LOCK_PATH(p, arg2);
247 ret = get_errno(safe_openat(arg1, path(p),
248 target_to_host_bitmask(arg3, fcntl_flags_tbl), arg4));
249 UNLOCK_PATH(p, arg2);
251 return ret;
254 /* close(2) */
255 static inline abi_long do_bsd_close(abi_long arg1)
257 return get_errno(close(arg1));
260 /* fdatasync(2) */
261 static abi_long do_bsd_fdatasync(abi_long arg1)
263 return get_errno(fdatasync(arg1));
266 /* fsync(2) */
267 static abi_long do_bsd_fsync(abi_long arg1)
269 return get_errno(fsync(arg1));
272 /* closefrom(2) */
273 static abi_long do_bsd_closefrom(abi_long arg1)
275 closefrom(arg1); /* returns void */
276 return get_errno(0);
279 /* revoke(2) */
280 static abi_long do_bsd_revoke(abi_long arg1)
282 abi_long ret;
283 void *p;
285 LOCK_PATH(p, arg1);
286 ret = get_errno(revoke(p)); /* XXX path(p)? */
287 UNLOCK_PATH(p, arg1);
289 return ret;
292 /* access(2) */
293 static abi_long do_bsd_access(abi_long arg1, abi_long arg2)
295 abi_long ret;
296 void *p;
298 LOCK_PATH(p, arg1);
299 ret = get_errno(access(path(p), arg2));
300 UNLOCK_PATH(p, arg1);
302 return ret;
305 /* eaccess(2) */
306 static abi_long do_bsd_eaccess(abi_long arg1, abi_long arg2)
308 abi_long ret;
309 void *p;
311 LOCK_PATH(p, arg1);
312 ret = get_errno(eaccess(path(p), arg2));
313 UNLOCK_PATH(p, arg1);
315 return ret;
318 /* faccessat(2) */
319 static abi_long do_bsd_faccessat(abi_long arg1, abi_long arg2,
320 abi_long arg3, abi_long arg4)
322 abi_long ret;
323 void *p;
325 LOCK_PATH(p, arg2);
326 ret = get_errno(faccessat(arg1, p, arg3, arg4)); /* XXX path(p)? */
327 UNLOCK_PATH(p, arg2);
329 return ret;
332 /* chdir(2) */
333 static abi_long do_bsd_chdir(abi_long arg1)
335 abi_long ret;
336 void *p;
338 LOCK_PATH(p, arg1);
339 ret = get_errno(chdir(p)); /* XXX path(p)? */
340 UNLOCK_PATH(p, arg1);
342 return ret;
345 /* fchdir(2) */
346 static abi_long do_bsd_fchdir(abi_long arg1)
348 return get_errno(fchdir(arg1));
351 /* rename(2) */
352 static abi_long do_bsd_rename(abi_long arg1, abi_long arg2)
354 abi_long ret;
355 void *p1, *p2;
357 LOCK_PATH2(p1, arg1, p2, arg2);
358 ret = get_errno(rename(p1, p2)); /* XXX path(p1), path(p2) */
359 UNLOCK_PATH2(p1, arg1, p2, arg2);
361 return ret;
364 /* renameat(2) */
365 static abi_long do_bsd_renameat(abi_long arg1, abi_long arg2,
366 abi_long arg3, abi_long arg4)
368 abi_long ret;
369 void *p1, *p2;
371 LOCK_PATH2(p1, arg2, p2, arg4);
372 ret = get_errno(renameat(arg1, p1, arg3, p2));
373 UNLOCK_PATH2(p1, arg2, p2, arg4);
375 return ret;
378 /* link(2) */
379 static abi_long do_bsd_link(abi_long arg1, abi_long arg2)
381 abi_long ret;
382 void *p1, *p2;
384 LOCK_PATH2(p1, arg1, p2, arg2);
385 ret = get_errno(link(p1, p2)); /* XXX path(p1), path(p2) */
386 UNLOCK_PATH2(p1, arg1, p2, arg2);
388 return ret;
391 /* linkat(2) */
392 static abi_long do_bsd_linkat(abi_long arg1, abi_long arg2,
393 abi_long arg3, abi_long arg4, abi_long arg5)
395 abi_long ret;
396 void *p1, *p2;
398 LOCK_PATH2(p1, arg2, p2, arg4);
399 ret = get_errno(linkat(arg1, p1, arg3, p2, arg5));
400 UNLOCK_PATH2(p1, arg2, p2, arg4);
402 return ret;
405 /* unlink(2) */
406 static abi_long do_bsd_unlink(abi_long arg1)
408 abi_long ret;
409 void *p;
411 LOCK_PATH(p, arg1);
412 ret = get_errno(unlink(p)); /* XXX path(p) */
413 UNLOCK_PATH(p, arg1);
415 return ret;
418 /* unlinkat(2) */
419 static abi_long do_bsd_unlinkat(abi_long arg1, abi_long arg2,
420 abi_long arg3)
422 abi_long ret;
423 void *p;
425 LOCK_PATH(p, arg2);
426 ret = get_errno(unlinkat(arg1, p, arg3)); /* XXX path(p) */
427 UNLOCK_PATH(p, arg2);
429 return ret;
432 /* mkdir(2) */
433 static abi_long do_bsd_mkdir(abi_long arg1, abi_long arg2)
435 abi_long ret;
436 void *p;
438 LOCK_PATH(p, arg1);
439 ret = get_errno(mkdir(p, arg2)); /* XXX path(p) */
440 UNLOCK_PATH(p, arg1);
442 return ret;
445 /* mkdirat(2) */
446 static abi_long do_bsd_mkdirat(abi_long arg1, abi_long arg2,
447 abi_long arg3)
449 abi_long ret;
450 void *p;
452 LOCK_PATH(p, arg2);
453 ret = get_errno(mkdirat(arg1, p, arg3));
454 UNLOCK_PATH(p, arg2);
456 return ret;
459 /* rmdir(2) */
460 static abi_long do_bsd_rmdir(abi_long arg1)
462 abi_long ret;
463 void *p;
465 LOCK_PATH(p, arg1);
466 ret = get_errno(rmdir(p)); /* XXX path(p)? */
467 UNLOCK_PATH(p, arg1);
469 return ret;
472 /* undocumented __getcwd(char *buf, size_t len) system call */
473 static abi_long do_bsd___getcwd(abi_long arg1, abi_long arg2)
475 abi_long ret;
476 void *p;
478 p = lock_user(VERIFY_WRITE, arg1, arg2, 0);
479 if (p == NULL) {
480 return -TARGET_EFAULT;
482 ret = safe_syscall(SYS___getcwd, p, arg2);
483 unlock_user(p, arg1, ret == 0 ? strlen(p) + 1 : 0);
485 return get_errno(ret);
488 /* dup(2) */
489 static abi_long do_bsd_dup(abi_long arg1)
491 return get_errno(dup(arg1));
494 /* dup2(2) */
495 static abi_long do_bsd_dup2(abi_long arg1, abi_long arg2)
497 return get_errno(dup2(arg1, arg2));
500 /* truncate(2) */
501 static abi_long do_bsd_truncate(void *cpu_env, abi_long arg1,
502 abi_long arg2, abi_long arg3, abi_long arg4)
504 abi_long ret;
505 void *p;
507 LOCK_PATH(p, arg1);
508 if (regpairs_aligned(cpu_env) != 0) {
509 arg2 = arg3;
510 arg3 = arg4;
512 ret = get_errno(truncate(p, target_arg64(arg2, arg3)));
513 UNLOCK_PATH(p, arg1);
515 return ret;
518 /* ftruncate(2) */
519 static abi_long do_bsd_ftruncate(void *cpu_env, abi_long arg1,
520 abi_long arg2, abi_long arg3, abi_long arg4)
522 if (regpairs_aligned(cpu_env) != 0) {
523 arg2 = arg3;
524 arg3 = arg4;
526 return get_errno(ftruncate(arg1, target_arg64(arg2, arg3)));
529 /* acct(2) */
530 static abi_long do_bsd_acct(abi_long arg1)
532 abi_long ret;
533 void *p;
535 if (arg1 == 0) {
536 ret = get_errno(acct(NULL));
537 } else {
538 LOCK_PATH(p, arg1);
539 ret = get_errno(acct(path(p)));
540 UNLOCK_PATH(p, arg1);
542 return ret;
545 /* sync(2) */
546 static abi_long do_bsd_sync(void)
548 sync();
549 return 0;
552 #endif /* BSD_FILE_H */