bsd-file.h 9.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378
  1. /*
  2. * file related system call shims and definitions
  3. *
  4. * Copyright (c) 2013 Stacey D. Son
  5. *
  6. * This program is free software; you can redistribute it and/or modify
  7. * it under the terms of the GNU General Public License as published by
  8. * the Free Software Foundation; either version 2 of the License, or
  9. * (at your option) any later version.
  10. *
  11. * This program is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. * GNU General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU General Public License
  17. * along with this program; if not, see <http://www.gnu.org/licenses/>.
  18. */
  19. #ifndef BSD_FILE_H
  20. #define BSD_FILE_H
  21. #include "qemu/path.h"
  22. #define LOCK_PATH(p, arg) \
  23. do { \
  24. (p) = lock_user_string(arg); \
  25. if ((p) == NULL) { \
  26. return -TARGET_EFAULT; \
  27. } \
  28. } while (0)
  29. #define UNLOCK_PATH(p, arg) unlock_user(p, arg, 0)
  30. #define LOCK_PATH2(p1, arg1, p2, arg2) \
  31. do { \
  32. (p1) = lock_user_string(arg1); \
  33. if ((p1) == NULL) { \
  34. return -TARGET_EFAULT; \
  35. } \
  36. (p2) = lock_user_string(arg2); \
  37. if ((p2) == NULL) { \
  38. unlock_user(p1, arg1, 0); \
  39. return -TARGET_EFAULT; \
  40. } \
  41. } while (0)
  42. #define UNLOCK_PATH2(p1, arg1, p2, arg2) \
  43. do { \
  44. unlock_user(p2, arg2, 0); \
  45. unlock_user(p1, arg1, 0); \
  46. } while (0)
  47. extern struct iovec *lock_iovec(int type, abi_ulong target_addr, int count,
  48. int copy);
  49. extern void unlock_iovec(struct iovec *vec, abi_ulong target_addr, int count,
  50. int copy);
  51. int safe_open(const char *path, int flags, mode_t mode);
  52. int safe_openat(int fd, const char *path, int flags, mode_t mode);
  53. ssize_t safe_read(int fd, void *buf, size_t nbytes);
  54. ssize_t safe_pread(int fd, void *buf, size_t nbytes, off_t offset);
  55. ssize_t safe_readv(int fd, const struct iovec *iov, int iovcnt);
  56. ssize_t safe_preadv(int fd, const struct iovec *iov, int iovcnt, off_t offset);
  57. ssize_t safe_write(int fd, void *buf, size_t nbytes);
  58. ssize_t safe_pwrite(int fd, void *buf, size_t nbytes, off_t offset);
  59. ssize_t safe_writev(int fd, const struct iovec *iov, int iovcnt);
  60. ssize_t safe_pwritev(int fd, const struct iovec *iov, int iovcnt, off_t offset);
  61. /* read(2) */
  62. static abi_long do_bsd_read(abi_long arg1, abi_long arg2, abi_long arg3)
  63. {
  64. abi_long ret;
  65. void *p;
  66. p = lock_user(VERIFY_WRITE, arg2, arg3, 0);
  67. if (p == NULL) {
  68. return -TARGET_EFAULT;
  69. }
  70. ret = get_errno(safe_read(arg1, p, arg3));
  71. unlock_user(p, arg2, ret);
  72. return ret;
  73. }
  74. /* pread(2) */
  75. static abi_long do_bsd_pread(void *cpu_env, abi_long arg1,
  76. abi_long arg2, abi_long arg3, abi_long arg4, abi_long arg5, abi_long arg6)
  77. {
  78. abi_long ret;
  79. void *p;
  80. p = lock_user(VERIFY_WRITE, arg2, arg3, 0);
  81. if (p == NULL) {
  82. return -TARGET_EFAULT;
  83. }
  84. if (regpairs_aligned(cpu_env) != 0) {
  85. arg4 = arg5;
  86. arg5 = arg6;
  87. }
  88. ret = get_errno(safe_pread(arg1, p, arg3, target_arg64(arg4, arg5)));
  89. unlock_user(p, arg2, ret);
  90. return ret;
  91. }
  92. /* readv(2) */
  93. static abi_long do_bsd_readv(abi_long arg1, abi_long arg2, abi_long arg3)
  94. {
  95. abi_long ret;
  96. struct iovec *vec = lock_iovec(VERIFY_WRITE, arg2, arg3, 0);
  97. if (vec != NULL) {
  98. ret = get_errno(safe_readv(arg1, vec, arg3));
  99. unlock_iovec(vec, arg2, arg3, 1);
  100. } else {
  101. ret = -host_to_target_errno(errno);
  102. }
  103. return ret;
  104. }
  105. /* preadv(2) */
  106. static abi_long do_bsd_preadv(void *cpu_env, abi_long arg1,
  107. abi_long arg2, abi_long arg3, abi_long arg4, abi_long arg5, abi_long arg6)
  108. {
  109. abi_long ret;
  110. struct iovec *vec = lock_iovec(VERIFY_WRITE, arg2, arg3, 1);
  111. if (vec != NULL) {
  112. if (regpairs_aligned(cpu_env) != 0) {
  113. arg4 = arg5;
  114. arg5 = arg6;
  115. }
  116. ret = get_errno(safe_preadv(arg1, vec, arg3, target_arg64(arg4, arg5)));
  117. unlock_iovec(vec, arg2, arg3, 0);
  118. } else {
  119. ret = -host_to_target_errno(errno);
  120. }
  121. return ret;
  122. }
  123. /* write(2) */
  124. static abi_long do_bsd_write(abi_long arg1, abi_long arg2, abi_long arg3)
  125. {
  126. abi_long nbytes, ret;
  127. void *p;
  128. /* nbytes < 0 implies that it was larger than SIZE_MAX. */
  129. nbytes = arg3;
  130. if (nbytes < 0) {
  131. return -TARGET_EINVAL;
  132. }
  133. p = lock_user(VERIFY_READ, arg2, nbytes, 1);
  134. if (p == NULL) {
  135. return -TARGET_EFAULT;
  136. }
  137. ret = get_errno(safe_write(arg1, p, arg3));
  138. unlock_user(p, arg2, 0);
  139. return ret;
  140. }
  141. /* pwrite(2) */
  142. static abi_long do_bsd_pwrite(void *cpu_env, abi_long arg1,
  143. abi_long arg2, abi_long arg3, abi_long arg4, abi_long arg5, abi_long arg6)
  144. {
  145. abi_long ret;
  146. void *p;
  147. p = lock_user(VERIFY_READ, arg2, arg3, 1);
  148. if (p == NULL) {
  149. return -TARGET_EFAULT;
  150. }
  151. if (regpairs_aligned(cpu_env) != 0) {
  152. arg4 = arg5;
  153. arg5 = arg6;
  154. }
  155. ret = get_errno(safe_pwrite(arg1, p, arg3, target_arg64(arg4, arg5)));
  156. unlock_user(p, arg2, 0);
  157. return ret;
  158. }
  159. /* writev(2) */
  160. static abi_long do_bsd_writev(abi_long arg1, abi_long arg2, abi_long arg3)
  161. {
  162. abi_long ret;
  163. struct iovec *vec = lock_iovec(VERIFY_READ, arg2, arg3, 1);
  164. if (vec != NULL) {
  165. ret = get_errno(safe_writev(arg1, vec, arg3));
  166. unlock_iovec(vec, arg2, arg3, 0);
  167. } else {
  168. ret = -host_to_target_errno(errno);
  169. }
  170. return ret;
  171. }
  172. /* pwritev(2) */
  173. static abi_long do_bsd_pwritev(void *cpu_env, abi_long arg1,
  174. abi_long arg2, abi_long arg3, abi_long arg4, abi_long arg5, abi_long arg6)
  175. {
  176. abi_long ret;
  177. struct iovec *vec = lock_iovec(VERIFY_READ, arg2, arg3, 1);
  178. if (vec != NULL) {
  179. if (regpairs_aligned(cpu_env) != 0) {
  180. arg4 = arg5;
  181. arg5 = arg6;
  182. }
  183. ret = get_errno(safe_pwritev(arg1, vec, arg3, target_arg64(arg4, arg5)));
  184. unlock_iovec(vec, arg2, arg3, 0);
  185. } else {
  186. ret = -host_to_target_errno(errno);
  187. }
  188. return ret;
  189. }
  190. /* open(2) */
  191. static abi_long do_bsd_open(abi_long arg1, abi_long arg2, abi_long arg3)
  192. {
  193. abi_long ret;
  194. void *p;
  195. LOCK_PATH(p, arg1);
  196. ret = get_errno(safe_open(path(p), target_to_host_bitmask(arg2,
  197. fcntl_flags_tbl), arg3));
  198. UNLOCK_PATH(p, arg1);
  199. return ret;
  200. }
  201. /* openat(2) */
  202. static abi_long do_bsd_openat(abi_long arg1, abi_long arg2,
  203. abi_long arg3, abi_long arg4)
  204. {
  205. abi_long ret;
  206. void *p;
  207. LOCK_PATH(p, arg2);
  208. ret = get_errno(safe_openat(arg1, path(p),
  209. target_to_host_bitmask(arg3, fcntl_flags_tbl), arg4));
  210. UNLOCK_PATH(p, arg2);
  211. return ret;
  212. }
  213. /* close(2) */
  214. static inline abi_long do_bsd_close(abi_long arg1)
  215. {
  216. return get_errno(close(arg1));
  217. }
  218. /* fdatasync(2) */
  219. static abi_long do_bsd_fdatasync(abi_long arg1)
  220. {
  221. return get_errno(fdatasync(arg1));
  222. }
  223. /* fsync(2) */
  224. static abi_long do_bsd_fsync(abi_long arg1)
  225. {
  226. return get_errno(fsync(arg1));
  227. }
  228. /* closefrom(2) */
  229. static abi_long do_bsd_closefrom(abi_long arg1)
  230. {
  231. closefrom(arg1); /* returns void */
  232. return get_errno(0);
  233. }
  234. /* revoke(2) */
  235. static abi_long do_bsd_revoke(abi_long arg1)
  236. {
  237. abi_long ret;
  238. void *p;
  239. LOCK_PATH(p, arg1);
  240. ret = get_errno(revoke(p)); /* XXX path(p)? */
  241. UNLOCK_PATH(p, arg1);
  242. return ret;
  243. }
  244. /* access(2) */
  245. static abi_long do_bsd_access(abi_long arg1, abi_long arg2)
  246. {
  247. abi_long ret;
  248. void *p;
  249. LOCK_PATH(p, arg1);
  250. ret = get_errno(access(path(p), arg2));
  251. UNLOCK_PATH(p, arg1);
  252. return ret;
  253. }
  254. /* eaccess(2) */
  255. static abi_long do_bsd_eaccess(abi_long arg1, abi_long arg2)
  256. {
  257. abi_long ret;
  258. void *p;
  259. LOCK_PATH(p, arg1);
  260. ret = get_errno(eaccess(path(p), arg2));
  261. UNLOCK_PATH(p, arg1);
  262. return ret;
  263. }
  264. /* faccessat(2) */
  265. static abi_long do_bsd_faccessat(abi_long arg1, abi_long arg2,
  266. abi_long arg3, abi_long arg4)
  267. {
  268. abi_long ret;
  269. void *p;
  270. LOCK_PATH(p, arg2);
  271. ret = get_errno(faccessat(arg1, p, arg3, arg4)); /* XXX path(p)? */
  272. UNLOCK_PATH(p, arg2);
  273. return ret;
  274. }
  275. /* chdir(2) */
  276. static abi_long do_bsd_chdir(abi_long arg1)
  277. {
  278. abi_long ret;
  279. void *p;
  280. LOCK_PATH(p, arg1);
  281. ret = get_errno(chdir(p)); /* XXX path(p)? */
  282. UNLOCK_PATH(p, arg1);
  283. return ret;
  284. }
  285. /* fchdir(2) */
  286. static abi_long do_bsd_fchdir(abi_long arg1)
  287. {
  288. return get_errno(fchdir(arg1));
  289. }
  290. /* rename(2) */
  291. static abi_long do_bsd_rename(abi_long arg1, abi_long arg2)
  292. {
  293. abi_long ret;
  294. void *p1, *p2;
  295. LOCK_PATH2(p1, arg1, p2, arg2);
  296. ret = get_errno(rename(p1, p2)); /* XXX path(p1), path(p2) */
  297. UNLOCK_PATH2(p1, arg1, p2, arg2);
  298. return ret;
  299. }
  300. /* renameat(2) */
  301. static abi_long do_bsd_renameat(abi_long arg1, abi_long arg2,
  302. abi_long arg3, abi_long arg4)
  303. {
  304. abi_long ret;
  305. void *p1, *p2;
  306. LOCK_PATH2(p1, arg2, p2, arg4);
  307. ret = get_errno(renameat(arg1, p1, arg3, p2));
  308. UNLOCK_PATH2(p1, arg2, p2, arg4);
  309. return ret;
  310. }
  311. #endif /* BSD_FILE_H */