2
0

bsd-file.h 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940
  1. /*
  2. * file related system call shims and definitions
  3. *
  4. * Copyright (c) 2013 Stacey D. Son
  5. *
  6. * This program is free software; you can redistribute it and/or modify
  7. * it under the terms of the GNU General Public License as published by
  8. * the Free Software Foundation; either version 2 of the License, or
  9. * (at your option) any later version.
  10. *
  11. * This program is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. * GNU General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU General Public License
  17. * along with this program; if not, see <http://www.gnu.org/licenses/>.
  18. */
  19. #ifndef BSD_FILE_H
  20. #define BSD_FILE_H
  21. #include "qemu/path.h"
  22. #define LOCK_PATH(p, arg) \
  23. do { \
  24. (p) = lock_user_string(arg); \
  25. if ((p) == NULL) { \
  26. return -TARGET_EFAULT; \
  27. } \
  28. } while (0)
  29. #define UNLOCK_PATH(p, arg) unlock_user(p, arg, 0)
  30. #define LOCK_PATH2(p1, arg1, p2, arg2) \
  31. do { \
  32. (p1) = lock_user_string(arg1); \
  33. if ((p1) == NULL) { \
  34. return -TARGET_EFAULT; \
  35. } \
  36. (p2) = lock_user_string(arg2); \
  37. if ((p2) == NULL) { \
  38. unlock_user(p1, arg1, 0); \
  39. return -TARGET_EFAULT; \
  40. } \
  41. } while (0)
  42. #define UNLOCK_PATH2(p1, arg1, p2, arg2) \
  43. do { \
  44. unlock_user(p2, arg2, 0); \
  45. unlock_user(p1, arg1, 0); \
  46. } while (0)
  47. struct iovec *lock_iovec(int type, abi_ulong target_addr, int count, int copy);
  48. void unlock_iovec(struct iovec *vec, abi_ulong target_addr, int count, int copy);
  49. int safe_open(const char *path, int flags, mode_t mode);
  50. int safe_openat(int fd, const char *path, int flags, mode_t mode);
  51. ssize_t safe_read(int fd, void *buf, size_t nbytes);
  52. ssize_t safe_pread(int fd, void *buf, size_t nbytes, off_t offset);
  53. ssize_t safe_readv(int fd, const struct iovec *iov, int iovcnt);
  54. ssize_t safe_preadv(int fd, const struct iovec *iov, int iovcnt, off_t offset);
  55. ssize_t safe_write(int fd, void *buf, size_t nbytes);
  56. ssize_t safe_pwrite(int fd, void *buf, size_t nbytes, off_t offset);
  57. ssize_t safe_writev(int fd, const struct iovec *iov, int iovcnt);
  58. ssize_t safe_pwritev(int fd, const struct iovec *iov, int iovcnt, off_t offset);
  59. /* read(2) */
  60. static abi_long do_bsd_read(abi_long arg1, abi_long arg2, abi_long arg3)
  61. {
  62. abi_long ret;
  63. void *p;
  64. p = lock_user(VERIFY_WRITE, arg2, arg3, 0);
  65. if (p == NULL) {
  66. return -TARGET_EFAULT;
  67. }
  68. ret = get_errno(safe_read(arg1, p, arg3));
  69. unlock_user(p, arg2, ret);
  70. return ret;
  71. }
  72. /* pread(2) */
  73. static abi_long do_bsd_pread(void *cpu_env, abi_long arg1,
  74. abi_long arg2, abi_long arg3, abi_long arg4, abi_long arg5, abi_long arg6)
  75. {
  76. abi_long ret;
  77. void *p;
  78. p = lock_user(VERIFY_WRITE, arg2, arg3, 0);
  79. if (p == NULL) {
  80. return -TARGET_EFAULT;
  81. }
  82. if (regpairs_aligned(cpu_env) != 0) {
  83. arg4 = arg5;
  84. arg5 = arg6;
  85. }
  86. ret = get_errno(safe_pread(arg1, p, arg3, target_arg64(arg4, arg5)));
  87. unlock_user(p, arg2, ret);
  88. return ret;
  89. }
  90. /* readv(2) */
  91. static abi_long do_bsd_readv(abi_long arg1, abi_long arg2, abi_long arg3)
  92. {
  93. abi_long ret;
  94. struct iovec *vec = lock_iovec(VERIFY_WRITE, arg2, arg3, 0);
  95. if (vec != NULL) {
  96. ret = get_errno(safe_readv(arg1, vec, arg3));
  97. unlock_iovec(vec, arg2, arg3, 1);
  98. } else {
  99. ret = -host_to_target_errno(errno);
  100. }
  101. return ret;
  102. }
  103. /* preadv(2) */
  104. static abi_long do_bsd_preadv(void *cpu_env, abi_long arg1,
  105. abi_long arg2, abi_long arg3, abi_long arg4, abi_long arg5, abi_long arg6)
  106. {
  107. abi_long ret;
  108. struct iovec *vec = lock_iovec(VERIFY_WRITE, arg2, arg3, 1);
  109. if (vec != NULL) {
  110. if (regpairs_aligned(cpu_env) != 0) {
  111. arg4 = arg5;
  112. arg5 = arg6;
  113. }
  114. ret = get_errno(safe_preadv(arg1, vec, arg3, target_arg64(arg4, arg5)));
  115. unlock_iovec(vec, arg2, arg3, 0);
  116. } else {
  117. ret = -host_to_target_errno(errno);
  118. }
  119. return ret;
  120. }
  121. /* write(2) */
  122. static abi_long do_bsd_write(abi_long arg1, abi_long arg2, abi_long arg3)
  123. {
  124. abi_long nbytes, ret;
  125. void *p;
  126. /* nbytes < 0 implies that it was larger than SIZE_MAX. */
  127. nbytes = arg3;
  128. if (nbytes < 0) {
  129. return -TARGET_EINVAL;
  130. }
  131. p = lock_user(VERIFY_READ, arg2, nbytes, 1);
  132. if (p == NULL) {
  133. return -TARGET_EFAULT;
  134. }
  135. ret = get_errno(safe_write(arg1, p, arg3));
  136. unlock_user(p, arg2, 0);
  137. return ret;
  138. }
  139. /* pwrite(2) */
  140. static abi_long do_bsd_pwrite(void *cpu_env, abi_long arg1,
  141. abi_long arg2, abi_long arg3, abi_long arg4, abi_long arg5, abi_long arg6)
  142. {
  143. abi_long ret;
  144. void *p;
  145. p = lock_user(VERIFY_READ, arg2, arg3, 1);
  146. if (p == NULL) {
  147. return -TARGET_EFAULT;
  148. }
  149. if (regpairs_aligned(cpu_env) != 0) {
  150. arg4 = arg5;
  151. arg5 = arg6;
  152. }
  153. ret = get_errno(safe_pwrite(arg1, p, arg3, target_arg64(arg4, arg5)));
  154. unlock_user(p, arg2, 0);
  155. return ret;
  156. }
  157. /* writev(2) */
  158. static abi_long do_bsd_writev(abi_long arg1, abi_long arg2, abi_long arg3)
  159. {
  160. abi_long ret;
  161. struct iovec *vec = lock_iovec(VERIFY_READ, arg2, arg3, 1);
  162. if (vec != NULL) {
  163. ret = get_errno(safe_writev(arg1, vec, arg3));
  164. unlock_iovec(vec, arg2, arg3, 0);
  165. } else {
  166. ret = -host_to_target_errno(errno);
  167. }
  168. return ret;
  169. }
  170. /* pwritev(2) */
  171. static abi_long do_bsd_pwritev(void *cpu_env, abi_long arg1,
  172. abi_long arg2, abi_long arg3, abi_long arg4, abi_long arg5, abi_long arg6)
  173. {
  174. abi_long ret;
  175. struct iovec *vec = lock_iovec(VERIFY_READ, arg2, arg3, 1);
  176. if (vec != NULL) {
  177. if (regpairs_aligned(cpu_env) != 0) {
  178. arg4 = arg5;
  179. arg5 = arg6;
  180. }
  181. ret = get_errno(safe_pwritev(arg1, vec, arg3, target_arg64(arg4, arg5)));
  182. unlock_iovec(vec, arg2, arg3, 0);
  183. } else {
  184. ret = -host_to_target_errno(errno);
  185. }
  186. return ret;
  187. }
  188. /* open(2) */
  189. static abi_long do_bsd_open(abi_long arg1, abi_long arg2, abi_long arg3)
  190. {
  191. abi_long ret;
  192. void *p;
  193. LOCK_PATH(p, arg1);
  194. ret = get_errno(safe_open(path(p), target_to_host_bitmask(arg2,
  195. fcntl_flags_tbl), arg3));
  196. UNLOCK_PATH(p, arg1);
  197. return ret;
  198. }
  199. /* openat(2) */
  200. static abi_long do_bsd_openat(abi_long arg1, abi_long arg2,
  201. abi_long arg3, abi_long arg4)
  202. {
  203. abi_long ret;
  204. void *p;
  205. LOCK_PATH(p, arg2);
  206. ret = get_errno(safe_openat(arg1, path(p),
  207. target_to_host_bitmask(arg3, fcntl_flags_tbl), arg4));
  208. UNLOCK_PATH(p, arg2);
  209. return ret;
  210. }
  211. /* close(2) */
  212. static abi_long do_bsd_close(abi_long arg1)
  213. {
  214. return get_errno(close(arg1));
  215. }
  216. /* fdatasync(2) */
  217. static abi_long do_bsd_fdatasync(abi_long arg1)
  218. {
  219. return get_errno(fdatasync(arg1));
  220. }
  221. /* fsync(2) */
  222. static abi_long do_bsd_fsync(abi_long arg1)
  223. {
  224. return get_errno(fsync(arg1));
  225. }
  226. /* closefrom(2) */
  227. static abi_long do_bsd_closefrom(abi_long arg1)
  228. {
  229. closefrom(arg1); /* returns void */
  230. return get_errno(0);
  231. }
  232. /* revoke(2) */
  233. static abi_long do_bsd_revoke(abi_long arg1)
  234. {
  235. abi_long ret;
  236. void *p;
  237. LOCK_PATH(p, arg1);
  238. ret = get_errno(revoke(p)); /* XXX path(p)? */
  239. UNLOCK_PATH(p, arg1);
  240. return ret;
  241. }
  242. /* access(2) */
  243. static abi_long do_bsd_access(abi_long arg1, abi_long arg2)
  244. {
  245. abi_long ret;
  246. void *p;
  247. LOCK_PATH(p, arg1);
  248. ret = get_errno(access(path(p), arg2));
  249. UNLOCK_PATH(p, arg1);
  250. return ret;
  251. }
  252. /* eaccess(2) */
  253. static abi_long do_bsd_eaccess(abi_long arg1, abi_long arg2)
  254. {
  255. abi_long ret;
  256. void *p;
  257. LOCK_PATH(p, arg1);
  258. ret = get_errno(eaccess(path(p), arg2));
  259. UNLOCK_PATH(p, arg1);
  260. return ret;
  261. }
  262. /* faccessat(2) */
  263. static abi_long do_bsd_faccessat(abi_long arg1, abi_long arg2,
  264. abi_long arg3, abi_long arg4)
  265. {
  266. abi_long ret;
  267. void *p;
  268. LOCK_PATH(p, arg2);
  269. ret = get_errno(faccessat(arg1, p, arg3, arg4)); /* XXX path(p)? */
  270. UNLOCK_PATH(p, arg2);
  271. return ret;
  272. }
  273. /* chdir(2) */
  274. static abi_long do_bsd_chdir(abi_long arg1)
  275. {
  276. abi_long ret;
  277. void *p;
  278. LOCK_PATH(p, arg1);
  279. ret = get_errno(chdir(p)); /* XXX path(p)? */
  280. UNLOCK_PATH(p, arg1);
  281. return ret;
  282. }
  283. /* fchdir(2) */
  284. static abi_long do_bsd_fchdir(abi_long arg1)
  285. {
  286. return get_errno(fchdir(arg1));
  287. }
  288. /* rename(2) */
  289. static abi_long do_bsd_rename(abi_long arg1, abi_long arg2)
  290. {
  291. abi_long ret;
  292. void *p1, *p2;
  293. LOCK_PATH2(p1, arg1, p2, arg2);
  294. ret = get_errno(rename(p1, p2)); /* XXX path(p1), path(p2) */
  295. UNLOCK_PATH2(p1, arg1, p2, arg2);
  296. return ret;
  297. }
  298. /* renameat(2) */
  299. static abi_long do_bsd_renameat(abi_long arg1, abi_long arg2,
  300. abi_long arg3, abi_long arg4)
  301. {
  302. abi_long ret;
  303. void *p1, *p2;
  304. LOCK_PATH2(p1, arg2, p2, arg4);
  305. ret = get_errno(renameat(arg1, p1, arg3, p2));
  306. UNLOCK_PATH2(p1, arg2, p2, arg4);
  307. return ret;
  308. }
  309. /* link(2) */
  310. static abi_long do_bsd_link(abi_long arg1, abi_long arg2)
  311. {
  312. abi_long ret;
  313. void *p1, *p2;
  314. LOCK_PATH2(p1, arg1, p2, arg2);
  315. ret = get_errno(link(p1, p2)); /* XXX path(p1), path(p2) */
  316. UNLOCK_PATH2(p1, arg1, p2, arg2);
  317. return ret;
  318. }
  319. /* linkat(2) */
  320. static abi_long do_bsd_linkat(abi_long arg1, abi_long arg2,
  321. abi_long arg3, abi_long arg4, abi_long arg5)
  322. {
  323. abi_long ret;
  324. void *p1, *p2;
  325. LOCK_PATH2(p1, arg2, p2, arg4);
  326. ret = get_errno(linkat(arg1, p1, arg3, p2, arg5));
  327. UNLOCK_PATH2(p1, arg2, p2, arg4);
  328. return ret;
  329. }
  330. /* unlink(2) */
  331. static abi_long do_bsd_unlink(abi_long arg1)
  332. {
  333. abi_long ret;
  334. void *p;
  335. LOCK_PATH(p, arg1);
  336. ret = get_errno(unlink(p)); /* XXX path(p) */
  337. UNLOCK_PATH(p, arg1);
  338. return ret;
  339. }
  340. /* unlinkat(2) */
  341. static abi_long do_bsd_unlinkat(abi_long arg1, abi_long arg2,
  342. abi_long arg3)
  343. {
  344. abi_long ret;
  345. void *p;
  346. LOCK_PATH(p, arg2);
  347. ret = get_errno(unlinkat(arg1, p, arg3)); /* XXX path(p) */
  348. UNLOCK_PATH(p, arg2);
  349. return ret;
  350. }
  351. /* mkdir(2) */
  352. static abi_long do_bsd_mkdir(abi_long arg1, abi_long arg2)
  353. {
  354. abi_long ret;
  355. void *p;
  356. LOCK_PATH(p, arg1);
  357. ret = get_errno(mkdir(p, arg2)); /* XXX path(p) */
  358. UNLOCK_PATH(p, arg1);
  359. return ret;
  360. }
  361. /* mkdirat(2) */
  362. static abi_long do_bsd_mkdirat(abi_long arg1, abi_long arg2,
  363. abi_long arg3)
  364. {
  365. abi_long ret;
  366. void *p;
  367. LOCK_PATH(p, arg2);
  368. ret = get_errno(mkdirat(arg1, p, arg3));
  369. UNLOCK_PATH(p, arg2);
  370. return ret;
  371. }
  372. /* rmdir(2) */
  373. static abi_long do_bsd_rmdir(abi_long arg1)
  374. {
  375. abi_long ret;
  376. void *p;
  377. LOCK_PATH(p, arg1);
  378. ret = get_errno(rmdir(p)); /* XXX path(p)? */
  379. UNLOCK_PATH(p, arg1);
  380. return ret;
  381. }
  382. /* undocumented __getcwd(char *buf, size_t len) system call */
  383. static abi_long do_bsd___getcwd(abi_long arg1, abi_long arg2)
  384. {
  385. abi_long ret;
  386. void *p;
  387. p = lock_user(VERIFY_WRITE, arg1, arg2, 0);
  388. if (p == NULL) {
  389. return -TARGET_EFAULT;
  390. }
  391. ret = safe_syscall(SYS___getcwd, p, arg2);
  392. unlock_user(p, arg1, ret == 0 ? strlen(p) + 1 : 0);
  393. return get_errno(ret);
  394. }
  395. /* dup(2) */
  396. static abi_long do_bsd_dup(abi_long arg1)
  397. {
  398. return get_errno(dup(arg1));
  399. }
  400. /* dup2(2) */
  401. static abi_long do_bsd_dup2(abi_long arg1, abi_long arg2)
  402. {
  403. return get_errno(dup2(arg1, arg2));
  404. }
  405. /* truncate(2) */
  406. static abi_long do_bsd_truncate(void *cpu_env, abi_long arg1,
  407. abi_long arg2, abi_long arg3, abi_long arg4)
  408. {
  409. abi_long ret;
  410. void *p;
  411. LOCK_PATH(p, arg1);
  412. if (regpairs_aligned(cpu_env) != 0) {
  413. arg2 = arg3;
  414. arg3 = arg4;
  415. }
  416. ret = get_errno(truncate(p, target_arg64(arg2, arg3)));
  417. UNLOCK_PATH(p, arg1);
  418. return ret;
  419. }
  420. /* ftruncate(2) */
  421. static abi_long do_bsd_ftruncate(void *cpu_env, abi_long arg1,
  422. abi_long arg2, abi_long arg3, abi_long arg4)
  423. {
  424. if (regpairs_aligned(cpu_env) != 0) {
  425. arg2 = arg3;
  426. arg3 = arg4;
  427. }
  428. return get_errno(ftruncate(arg1, target_arg64(arg2, arg3)));
  429. }
  430. /* acct(2) */
  431. static abi_long do_bsd_acct(abi_long arg1)
  432. {
  433. abi_long ret;
  434. void *p;
  435. if (arg1 == 0) {
  436. ret = get_errno(acct(NULL));
  437. } else {
  438. LOCK_PATH(p, arg1);
  439. ret = get_errno(acct(path(p)));
  440. UNLOCK_PATH(p, arg1);
  441. }
  442. return ret;
  443. }
  444. /* sync(2) */
  445. static abi_long do_bsd_sync(void)
  446. {
  447. sync();
  448. return 0;
  449. }
  450. /* mount(2) */
  451. static abi_long do_bsd_mount(abi_long arg1, abi_long arg2, abi_long arg3,
  452. abi_long arg4)
  453. {
  454. abi_long ret;
  455. void *p1, *p2;
  456. LOCK_PATH2(p1, arg1, p2, arg2);
  457. /*
  458. * XXX arg4 should be locked, but it isn't clear how to do that since it may
  459. * be not be a NULL-terminated string.
  460. */
  461. if (arg4 == 0) {
  462. ret = get_errno(mount(p1, p2, arg3, NULL)); /* XXX path(p2)? */
  463. } else {
  464. ret = get_errno(mount(p1, p2, arg3, g2h_untagged(arg4))); /* XXX path(p2)? */
  465. }
  466. UNLOCK_PATH2(p1, arg1, p2, arg2);
  467. return ret;
  468. }
  469. /* unmount(2) */
  470. static abi_long do_bsd_unmount(abi_long arg1, abi_long arg2)
  471. {
  472. abi_long ret;
  473. void *p;
  474. LOCK_PATH(p, arg1);
  475. ret = get_errno(unmount(p, arg2)); /* XXX path(p)? */
  476. UNLOCK_PATH(p, arg1);
  477. return ret;
  478. }
  479. /* nmount(2) */
  480. static abi_long do_bsd_nmount(abi_long arg1, abi_long count,
  481. abi_long flags)
  482. {
  483. abi_long ret;
  484. struct iovec *vec = lock_iovec(VERIFY_READ, arg1, count, 1);
  485. if (vec != NULL) {
  486. ret = get_errno(nmount(vec, count, flags));
  487. unlock_iovec(vec, arg1, count, 0);
  488. } else {
  489. return -TARGET_EFAULT;
  490. }
  491. return ret;
  492. }
  493. /* symlink(2) */
  494. static abi_long do_bsd_symlink(abi_long arg1, abi_long arg2)
  495. {
  496. abi_long ret;
  497. void *p1, *p2;
  498. LOCK_PATH2(p1, arg1, p2, arg2);
  499. ret = get_errno(symlink(p1, p2)); /* XXX path(p1), path(p2) */
  500. UNLOCK_PATH2(p1, arg1, p2, arg2);
  501. return ret;
  502. }
  503. /* symlinkat(2) */
  504. static abi_long do_bsd_symlinkat(abi_long arg1, abi_long arg2,
  505. abi_long arg3)
  506. {
  507. abi_long ret;
  508. void *p1, *p2;
  509. LOCK_PATH2(p1, arg1, p2, arg3);
  510. ret = get_errno(symlinkat(p1, arg2, p2)); /* XXX path(p1), path(p2) */
  511. UNLOCK_PATH2(p1, arg1, p2, arg3);
  512. return ret;
  513. }
  514. /* readlink(2) */
  515. static abi_long do_bsd_readlink(CPUArchState *env, abi_long arg1,
  516. abi_long arg2, abi_long arg3)
  517. {
  518. abi_long ret;
  519. void *p1, *p2;
  520. LOCK_PATH(p1, arg1);
  521. p2 = lock_user(VERIFY_WRITE, arg2, arg3, 0);
  522. if (p2 == NULL) {
  523. UNLOCK_PATH(p1, arg1);
  524. return -TARGET_EFAULT;
  525. }
  526. if (strcmp(p1, "/proc/curproc/file") == 0) {
  527. CPUState *cpu = env_cpu(env);
  528. TaskState *ts = get_task_state(cpu);
  529. strncpy(p2, ts->bprm->fullpath, arg3);
  530. ret = MIN((abi_long)strlen(ts->bprm->fullpath), arg3);
  531. } else {
  532. ret = get_errno(readlink(path(p1), p2, arg3));
  533. }
  534. unlock_user(p2, arg2, ret);
  535. UNLOCK_PATH(p1, arg1);
  536. return ret;
  537. }
  538. /* readlinkat(2) */
  539. static abi_long do_bsd_readlinkat(abi_long arg1, abi_long arg2,
  540. abi_long arg3, abi_long arg4)
  541. {
  542. abi_long ret;
  543. void *p1, *p2;
  544. LOCK_PATH(p1, arg2);
  545. p2 = lock_user(VERIFY_WRITE, arg3, arg4, 0);
  546. if (p2 == NULL) {
  547. UNLOCK_PATH(p1, arg2);
  548. return -TARGET_EFAULT;
  549. }
  550. ret = get_errno(readlinkat(arg1, p1, p2, arg4));
  551. unlock_user(p2, arg3, ret);
  552. UNLOCK_PATH(p1, arg2);
  553. return ret;
  554. }
  555. /* chmod(2) */
  556. static abi_long do_bsd_chmod(abi_long arg1, abi_long arg2)
  557. {
  558. abi_long ret;
  559. void *p;
  560. LOCK_PATH(p, arg1);
  561. ret = get_errno(chmod(p, arg2)); /* XXX path(p)? */
  562. UNLOCK_PATH(p, arg1);
  563. return ret;
  564. }
  565. /* fchmod(2) */
  566. static abi_long do_bsd_fchmod(abi_long arg1, abi_long arg2)
  567. {
  568. return get_errno(fchmod(arg1, arg2));
  569. }
  570. /* lchmod(2) */
  571. static abi_long do_bsd_lchmod(abi_long arg1, abi_long arg2)
  572. {
  573. abi_long ret;
  574. void *p;
  575. LOCK_PATH(p, arg1);
  576. ret = get_errno(lchmod(p, arg2)); /* XXX path(p)? */
  577. UNLOCK_PATH(p, arg1);
  578. return ret;
  579. }
  580. /* fchmodat(2) */
  581. static abi_long do_bsd_fchmodat(abi_long arg1, abi_long arg2,
  582. abi_long arg3, abi_long arg4)
  583. {
  584. abi_long ret;
  585. void *p;
  586. LOCK_PATH(p, arg2);
  587. ret = get_errno(fchmodat(arg1, p, arg3, arg4));
  588. UNLOCK_PATH(p, arg2);
  589. return ret;
  590. }
  591. /* pre-ino64 mknod(2) */
  592. static abi_long do_bsd_freebsd11_mknod(abi_long arg1, abi_long arg2, abi_long arg3)
  593. {
  594. abi_long ret;
  595. void *p;
  596. LOCK_PATH(p, arg1);
  597. ret = get_errno(syscall(SYS_freebsd11_mknod, p, arg2, arg3));
  598. UNLOCK_PATH(p, arg1);
  599. return ret;
  600. }
  601. /* pre-ino64 mknodat(2) */
  602. static abi_long do_bsd_freebsd11_mknodat(abi_long arg1, abi_long arg2,
  603. abi_long arg3, abi_long arg4)
  604. {
  605. abi_long ret;
  606. void *p;
  607. LOCK_PATH(p, arg2);
  608. ret = get_errno(syscall(SYS_freebsd11_mknodat, arg1, p, arg3, arg4));
  609. UNLOCK_PATH(p, arg2);
  610. return ret;
  611. }
  612. /* post-ino64 mknodat(2) */
  613. static abi_long do_bsd_mknodat(void *cpu_env, abi_long arg1,
  614. abi_long arg2, abi_long arg3, abi_long arg4, abi_long arg5,
  615. abi_long arg6)
  616. {
  617. abi_long ret;
  618. void *p;
  619. LOCK_PATH(p, arg2);
  620. /* 32-bit arch's use two 32 registers for 64 bit return value */
  621. if (regpairs_aligned(cpu_env) != 0) {
  622. ret = get_errno(mknodat(arg1, p, arg3, target_arg64(arg5, arg6)));
  623. } else {
  624. ret = get_errno(mknodat(arg1, p, arg3, target_arg64(arg4, arg5)));
  625. }
  626. UNLOCK_PATH(p, arg2);
  627. return ret;
  628. }
  629. /* chown(2) */
  630. static abi_long do_bsd_chown(abi_long arg1, abi_long arg2, abi_long arg3)
  631. {
  632. abi_long ret;
  633. void *p;
  634. LOCK_PATH(p, arg1);
  635. ret = get_errno(chown(p, arg2, arg3)); /* XXX path(p)? */
  636. UNLOCK_PATH(p, arg1);
  637. return ret;
  638. }
  639. /* fchown(2) */
  640. static abi_long do_bsd_fchown(abi_long arg1, abi_long arg2,
  641. abi_long arg3)
  642. {
  643. return get_errno(fchown(arg1, arg2, arg3));
  644. }
  645. /* lchown(2) */
  646. static abi_long do_bsd_lchown(abi_long arg1, abi_long arg2,
  647. abi_long arg3)
  648. {
  649. abi_long ret;
  650. void *p;
  651. LOCK_PATH(p, arg1);
  652. ret = get_errno(lchown(p, arg2, arg3)); /* XXX path(p)? */
  653. UNLOCK_PATH(p, arg1);
  654. return ret;
  655. }
  656. /* fchownat(2) */
  657. static abi_long do_bsd_fchownat(abi_long arg1, abi_long arg2,
  658. abi_long arg3, abi_long arg4, abi_long arg5)
  659. {
  660. abi_long ret;
  661. void *p;
  662. LOCK_PATH(p, arg2);
  663. ret = get_errno(fchownat(arg1, p, arg3, arg4, arg5)); /* XXX path(p)? */
  664. UNLOCK_PATH(p, arg2);
  665. return ret;
  666. }
  667. /* chflags(2) */
  668. static abi_long do_bsd_chflags(abi_long arg1, abi_long arg2)
  669. {
  670. abi_long ret;
  671. void *p;
  672. LOCK_PATH(p, arg1);
  673. ret = get_errno(chflags(p, arg2)); /* XXX path(p)? */
  674. UNLOCK_PATH(p, arg1);
  675. return ret;
  676. }
  677. /* lchflags(2) */
  678. static abi_long do_bsd_lchflags(abi_long arg1, abi_long arg2)
  679. {
  680. abi_long ret;
  681. void *p;
  682. LOCK_PATH(p, arg1);
  683. ret = get_errno(lchflags(p, arg2)); /* XXX path(p)? */
  684. UNLOCK_PATH(p, arg1);
  685. return ret;
  686. }
  687. /* fchflags(2) */
  688. static abi_long do_bsd_fchflags(abi_long arg1, abi_long arg2)
  689. {
  690. return get_errno(fchflags(arg1, arg2));
  691. }
  692. /* chroot(2) */
  693. static abi_long do_bsd_chroot(abi_long arg1)
  694. {
  695. abi_long ret;
  696. void *p;
  697. LOCK_PATH(p, arg1);
  698. ret = get_errno(chroot(p)); /* XXX path(p)? */
  699. UNLOCK_PATH(p, arg1);
  700. return ret;
  701. }
  702. /* flock(2) */
  703. static abi_long do_bsd_flock(abi_long arg1, abi_long arg2)
  704. {
  705. return get_errno(flock(arg1, arg2));
  706. }
  707. /* mkfifo(2) */
  708. static abi_long do_bsd_mkfifo(abi_long arg1, abi_long arg2)
  709. {
  710. abi_long ret;
  711. void *p;
  712. LOCK_PATH(p, arg1);
  713. ret = get_errno(mkfifo(p, arg2)); /* XXX path(p)? */
  714. UNLOCK_PATH(p, arg1);
  715. return ret;
  716. }
  717. /* mkfifoat(2) */
  718. static abi_long do_bsd_mkfifoat(abi_long arg1, abi_long arg2,
  719. abi_long arg3)
  720. {
  721. abi_long ret;
  722. void *p;
  723. LOCK_PATH(p, arg2);
  724. ret = get_errno(mkfifoat(arg1, p, arg3));
  725. UNLOCK_PATH(p, arg2);
  726. return ret;
  727. }
  728. /* pathconf(2) */
  729. static abi_long do_bsd_pathconf(abi_long arg1, abi_long arg2)
  730. {
  731. abi_long ret;
  732. void *p;
  733. LOCK_PATH(p, arg1);
  734. ret = get_errno(pathconf(p, arg2)); /* XXX path(p)? */
  735. UNLOCK_PATH(p, arg1);
  736. return ret;
  737. }
  738. /* lpathconf(2) */
  739. static abi_long do_bsd_lpathconf(abi_long arg1, abi_long arg2)
  740. {
  741. abi_long ret;
  742. void *p;
  743. LOCK_PATH(p, arg1);
  744. ret = get_errno(lpathconf(p, arg2)); /* XXX path(p)? */
  745. UNLOCK_PATH(p, arg1);
  746. return ret;
  747. }
  748. /* fpathconf(2) */
  749. static abi_long do_bsd_fpathconf(abi_long arg1, abi_long arg2)
  750. {
  751. return get_errno(fpathconf(arg1, arg2));
  752. }
  753. /* undelete(2) */
  754. static abi_long do_bsd_undelete(abi_long arg1)
  755. {
  756. abi_long ret;
  757. void *p;
  758. LOCK_PATH(p, arg1);
  759. ret = get_errno(undelete(p)); /* XXX path(p)? */
  760. UNLOCK_PATH(p, arg1);
  761. return ret;
  762. }
  763. #endif /* BSD_FILE_H */