2
0

bsd-file.h 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942
  1. /*
  2. * file related system call shims and definitions
  3. *
  4. * Copyright (c) 2013 Stacey D. Son
  5. *
  6. * This program is free software; you can redistribute it and/or modify
  7. * it under the terms of the GNU General Public License as published by
  8. * the Free Software Foundation; either version 2 of the License, or
  9. * (at your option) any later version.
  10. *
  11. * This program is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. * GNU General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU General Public License
  17. * along with this program; if not, see <http://www.gnu.org/licenses/>.
  18. */
  19. #ifndef BSD_FILE_H
  20. #define BSD_FILE_H
  21. #include "qemu/path.h"
  22. #define LOCK_PATH(p, arg) \
  23. do { \
  24. (p) = lock_user_string(arg); \
  25. if ((p) == NULL) { \
  26. return -TARGET_EFAULT; \
  27. } \
  28. } while (0)
  29. #define UNLOCK_PATH(p, arg) unlock_user(p, arg, 0)
  30. #define LOCK_PATH2(p1, arg1, p2, arg2) \
  31. do { \
  32. (p1) = lock_user_string(arg1); \
  33. if ((p1) == NULL) { \
  34. return -TARGET_EFAULT; \
  35. } \
  36. (p2) = lock_user_string(arg2); \
  37. if ((p2) == NULL) { \
  38. unlock_user(p1, arg1, 0); \
  39. return -TARGET_EFAULT; \
  40. } \
  41. } while (0)
  42. #define UNLOCK_PATH2(p1, arg1, p2, arg2) \
  43. do { \
  44. unlock_user(p2, arg2, 0); \
  45. unlock_user(p1, arg1, 0); \
  46. } while (0)
  47. extern struct iovec *lock_iovec(int type, abi_ulong target_addr, int count,
  48. int copy);
  49. extern void unlock_iovec(struct iovec *vec, abi_ulong target_addr, int count,
  50. int copy);
  51. int safe_open(const char *path, int flags, mode_t mode);
  52. int safe_openat(int fd, const char *path, int flags, mode_t mode);
  53. ssize_t safe_read(int fd, void *buf, size_t nbytes);
  54. ssize_t safe_pread(int fd, void *buf, size_t nbytes, off_t offset);
  55. ssize_t safe_readv(int fd, const struct iovec *iov, int iovcnt);
  56. ssize_t safe_preadv(int fd, const struct iovec *iov, int iovcnt, off_t offset);
  57. ssize_t safe_write(int fd, void *buf, size_t nbytes);
  58. ssize_t safe_pwrite(int fd, void *buf, size_t nbytes, off_t offset);
  59. ssize_t safe_writev(int fd, const struct iovec *iov, int iovcnt);
  60. ssize_t safe_pwritev(int fd, const struct iovec *iov, int iovcnt, off_t offset);
  61. /* read(2) */
  62. static abi_long do_bsd_read(abi_long arg1, abi_long arg2, abi_long arg3)
  63. {
  64. abi_long ret;
  65. void *p;
  66. p = lock_user(VERIFY_WRITE, arg2, arg3, 0);
  67. if (p == NULL) {
  68. return -TARGET_EFAULT;
  69. }
  70. ret = get_errno(safe_read(arg1, p, arg3));
  71. unlock_user(p, arg2, ret);
  72. return ret;
  73. }
  74. /* pread(2) */
  75. static abi_long do_bsd_pread(void *cpu_env, abi_long arg1,
  76. abi_long arg2, abi_long arg3, abi_long arg4, abi_long arg5, abi_long arg6)
  77. {
  78. abi_long ret;
  79. void *p;
  80. p = lock_user(VERIFY_WRITE, arg2, arg3, 0);
  81. if (p == NULL) {
  82. return -TARGET_EFAULT;
  83. }
  84. if (regpairs_aligned(cpu_env) != 0) {
  85. arg4 = arg5;
  86. arg5 = arg6;
  87. }
  88. ret = get_errno(safe_pread(arg1, p, arg3, target_arg64(arg4, arg5)));
  89. unlock_user(p, arg2, ret);
  90. return ret;
  91. }
  92. /* readv(2) */
  93. static abi_long do_bsd_readv(abi_long arg1, abi_long arg2, abi_long arg3)
  94. {
  95. abi_long ret;
  96. struct iovec *vec = lock_iovec(VERIFY_WRITE, arg2, arg3, 0);
  97. if (vec != NULL) {
  98. ret = get_errno(safe_readv(arg1, vec, arg3));
  99. unlock_iovec(vec, arg2, arg3, 1);
  100. } else {
  101. ret = -host_to_target_errno(errno);
  102. }
  103. return ret;
  104. }
  105. /* preadv(2) */
  106. static abi_long do_bsd_preadv(void *cpu_env, abi_long arg1,
  107. abi_long arg2, abi_long arg3, abi_long arg4, abi_long arg5, abi_long arg6)
  108. {
  109. abi_long ret;
  110. struct iovec *vec = lock_iovec(VERIFY_WRITE, arg2, arg3, 1);
  111. if (vec != NULL) {
  112. if (regpairs_aligned(cpu_env) != 0) {
  113. arg4 = arg5;
  114. arg5 = arg6;
  115. }
  116. ret = get_errno(safe_preadv(arg1, vec, arg3, target_arg64(arg4, arg5)));
  117. unlock_iovec(vec, arg2, arg3, 0);
  118. } else {
  119. ret = -host_to_target_errno(errno);
  120. }
  121. return ret;
  122. }
  123. /* write(2) */
  124. static abi_long do_bsd_write(abi_long arg1, abi_long arg2, abi_long arg3)
  125. {
  126. abi_long nbytes, ret;
  127. void *p;
  128. /* nbytes < 0 implies that it was larger than SIZE_MAX. */
  129. nbytes = arg3;
  130. if (nbytes < 0) {
  131. return -TARGET_EINVAL;
  132. }
  133. p = lock_user(VERIFY_READ, arg2, nbytes, 1);
  134. if (p == NULL) {
  135. return -TARGET_EFAULT;
  136. }
  137. ret = get_errno(safe_write(arg1, p, arg3));
  138. unlock_user(p, arg2, 0);
  139. return ret;
  140. }
  141. /* pwrite(2) */
  142. static abi_long do_bsd_pwrite(void *cpu_env, abi_long arg1,
  143. abi_long arg2, abi_long arg3, abi_long arg4, abi_long arg5, abi_long arg6)
  144. {
  145. abi_long ret;
  146. void *p;
  147. p = lock_user(VERIFY_READ, arg2, arg3, 1);
  148. if (p == NULL) {
  149. return -TARGET_EFAULT;
  150. }
  151. if (regpairs_aligned(cpu_env) != 0) {
  152. arg4 = arg5;
  153. arg5 = arg6;
  154. }
  155. ret = get_errno(safe_pwrite(arg1, p, arg3, target_arg64(arg4, arg5)));
  156. unlock_user(p, arg2, 0);
  157. return ret;
  158. }
  159. /* writev(2) */
  160. static abi_long do_bsd_writev(abi_long arg1, abi_long arg2, abi_long arg3)
  161. {
  162. abi_long ret;
  163. struct iovec *vec = lock_iovec(VERIFY_READ, arg2, arg3, 1);
  164. if (vec != NULL) {
  165. ret = get_errno(safe_writev(arg1, vec, arg3));
  166. unlock_iovec(vec, arg2, arg3, 0);
  167. } else {
  168. ret = -host_to_target_errno(errno);
  169. }
  170. return ret;
  171. }
  172. /* pwritev(2) */
  173. static abi_long do_bsd_pwritev(void *cpu_env, abi_long arg1,
  174. abi_long arg2, abi_long arg3, abi_long arg4, abi_long arg5, abi_long arg6)
  175. {
  176. abi_long ret;
  177. struct iovec *vec = lock_iovec(VERIFY_READ, arg2, arg3, 1);
  178. if (vec != NULL) {
  179. if (regpairs_aligned(cpu_env) != 0) {
  180. arg4 = arg5;
  181. arg5 = arg6;
  182. }
  183. ret = get_errno(safe_pwritev(arg1, vec, arg3, target_arg64(arg4, arg5)));
  184. unlock_iovec(vec, arg2, arg3, 0);
  185. } else {
  186. ret = -host_to_target_errno(errno);
  187. }
  188. return ret;
  189. }
  190. /* open(2) */
  191. static abi_long do_bsd_open(abi_long arg1, abi_long arg2, abi_long arg3)
  192. {
  193. abi_long ret;
  194. void *p;
  195. LOCK_PATH(p, arg1);
  196. ret = get_errno(safe_open(path(p), target_to_host_bitmask(arg2,
  197. fcntl_flags_tbl), arg3));
  198. UNLOCK_PATH(p, arg1);
  199. return ret;
  200. }
  201. /* openat(2) */
  202. static abi_long do_bsd_openat(abi_long arg1, abi_long arg2,
  203. abi_long arg3, abi_long arg4)
  204. {
  205. abi_long ret;
  206. void *p;
  207. LOCK_PATH(p, arg2);
  208. ret = get_errno(safe_openat(arg1, path(p),
  209. target_to_host_bitmask(arg3, fcntl_flags_tbl), arg4));
  210. UNLOCK_PATH(p, arg2);
  211. return ret;
  212. }
  213. /* close(2) */
  214. static abi_long do_bsd_close(abi_long arg1)
  215. {
  216. return get_errno(close(arg1));
  217. }
  218. /* fdatasync(2) */
  219. static abi_long do_bsd_fdatasync(abi_long arg1)
  220. {
  221. return get_errno(fdatasync(arg1));
  222. }
  223. /* fsync(2) */
  224. static abi_long do_bsd_fsync(abi_long arg1)
  225. {
  226. return get_errno(fsync(arg1));
  227. }
  228. /* closefrom(2) */
  229. static abi_long do_bsd_closefrom(abi_long arg1)
  230. {
  231. closefrom(arg1); /* returns void */
  232. return get_errno(0);
  233. }
  234. /* revoke(2) */
  235. static abi_long do_bsd_revoke(abi_long arg1)
  236. {
  237. abi_long ret;
  238. void *p;
  239. LOCK_PATH(p, arg1);
  240. ret = get_errno(revoke(p)); /* XXX path(p)? */
  241. UNLOCK_PATH(p, arg1);
  242. return ret;
  243. }
  244. /* access(2) */
  245. static abi_long do_bsd_access(abi_long arg1, abi_long arg2)
  246. {
  247. abi_long ret;
  248. void *p;
  249. LOCK_PATH(p, arg1);
  250. ret = get_errno(access(path(p), arg2));
  251. UNLOCK_PATH(p, arg1);
  252. return ret;
  253. }
  254. /* eaccess(2) */
  255. static abi_long do_bsd_eaccess(abi_long arg1, abi_long arg2)
  256. {
  257. abi_long ret;
  258. void *p;
  259. LOCK_PATH(p, arg1);
  260. ret = get_errno(eaccess(path(p), arg2));
  261. UNLOCK_PATH(p, arg1);
  262. return ret;
  263. }
  264. /* faccessat(2) */
  265. static abi_long do_bsd_faccessat(abi_long arg1, abi_long arg2,
  266. abi_long arg3, abi_long arg4)
  267. {
  268. abi_long ret;
  269. void *p;
  270. LOCK_PATH(p, arg2);
  271. ret = get_errno(faccessat(arg1, p, arg3, arg4)); /* XXX path(p)? */
  272. UNLOCK_PATH(p, arg2);
  273. return ret;
  274. }
  275. /* chdir(2) */
  276. static abi_long do_bsd_chdir(abi_long arg1)
  277. {
  278. abi_long ret;
  279. void *p;
  280. LOCK_PATH(p, arg1);
  281. ret = get_errno(chdir(p)); /* XXX path(p)? */
  282. UNLOCK_PATH(p, arg1);
  283. return ret;
  284. }
  285. /* fchdir(2) */
  286. static abi_long do_bsd_fchdir(abi_long arg1)
  287. {
  288. return get_errno(fchdir(arg1));
  289. }
  290. /* rename(2) */
  291. static abi_long do_bsd_rename(abi_long arg1, abi_long arg2)
  292. {
  293. abi_long ret;
  294. void *p1, *p2;
  295. LOCK_PATH2(p1, arg1, p2, arg2);
  296. ret = get_errno(rename(p1, p2)); /* XXX path(p1), path(p2) */
  297. UNLOCK_PATH2(p1, arg1, p2, arg2);
  298. return ret;
  299. }
  300. /* renameat(2) */
  301. static abi_long do_bsd_renameat(abi_long arg1, abi_long arg2,
  302. abi_long arg3, abi_long arg4)
  303. {
  304. abi_long ret;
  305. void *p1, *p2;
  306. LOCK_PATH2(p1, arg2, p2, arg4);
  307. ret = get_errno(renameat(arg1, p1, arg3, p2));
  308. UNLOCK_PATH2(p1, arg2, p2, arg4);
  309. return ret;
  310. }
  311. /* link(2) */
  312. static abi_long do_bsd_link(abi_long arg1, abi_long arg2)
  313. {
  314. abi_long ret;
  315. void *p1, *p2;
  316. LOCK_PATH2(p1, arg1, p2, arg2);
  317. ret = get_errno(link(p1, p2)); /* XXX path(p1), path(p2) */
  318. UNLOCK_PATH2(p1, arg1, p2, arg2);
  319. return ret;
  320. }
  321. /* linkat(2) */
  322. static abi_long do_bsd_linkat(abi_long arg1, abi_long arg2,
  323. abi_long arg3, abi_long arg4, abi_long arg5)
  324. {
  325. abi_long ret;
  326. void *p1, *p2;
  327. LOCK_PATH2(p1, arg2, p2, arg4);
  328. ret = get_errno(linkat(arg1, p1, arg3, p2, arg5));
  329. UNLOCK_PATH2(p1, arg2, p2, arg4);
  330. return ret;
  331. }
  332. /* unlink(2) */
  333. static abi_long do_bsd_unlink(abi_long arg1)
  334. {
  335. abi_long ret;
  336. void *p;
  337. LOCK_PATH(p, arg1);
  338. ret = get_errno(unlink(p)); /* XXX path(p) */
  339. UNLOCK_PATH(p, arg1);
  340. return ret;
  341. }
  342. /* unlinkat(2) */
  343. static abi_long do_bsd_unlinkat(abi_long arg1, abi_long arg2,
  344. abi_long arg3)
  345. {
  346. abi_long ret;
  347. void *p;
  348. LOCK_PATH(p, arg2);
  349. ret = get_errno(unlinkat(arg1, p, arg3)); /* XXX path(p) */
  350. UNLOCK_PATH(p, arg2);
  351. return ret;
  352. }
  353. /* mkdir(2) */
  354. static abi_long do_bsd_mkdir(abi_long arg1, abi_long arg2)
  355. {
  356. abi_long ret;
  357. void *p;
  358. LOCK_PATH(p, arg1);
  359. ret = get_errno(mkdir(p, arg2)); /* XXX path(p) */
  360. UNLOCK_PATH(p, arg1);
  361. return ret;
  362. }
  363. /* mkdirat(2) */
  364. static abi_long do_bsd_mkdirat(abi_long arg1, abi_long arg2,
  365. abi_long arg3)
  366. {
  367. abi_long ret;
  368. void *p;
  369. LOCK_PATH(p, arg2);
  370. ret = get_errno(mkdirat(arg1, p, arg3));
  371. UNLOCK_PATH(p, arg2);
  372. return ret;
  373. }
  374. /* rmdir(2) */
  375. static abi_long do_bsd_rmdir(abi_long arg1)
  376. {
  377. abi_long ret;
  378. void *p;
  379. LOCK_PATH(p, arg1);
  380. ret = get_errno(rmdir(p)); /* XXX path(p)? */
  381. UNLOCK_PATH(p, arg1);
  382. return ret;
  383. }
  384. /* undocumented __getcwd(char *buf, size_t len) system call */
  385. static abi_long do_bsd___getcwd(abi_long arg1, abi_long arg2)
  386. {
  387. abi_long ret;
  388. void *p;
  389. p = lock_user(VERIFY_WRITE, arg1, arg2, 0);
  390. if (p == NULL) {
  391. return -TARGET_EFAULT;
  392. }
  393. ret = safe_syscall(SYS___getcwd, p, arg2);
  394. unlock_user(p, arg1, ret == 0 ? strlen(p) + 1 : 0);
  395. return get_errno(ret);
  396. }
  397. /* dup(2) */
  398. static abi_long do_bsd_dup(abi_long arg1)
  399. {
  400. return get_errno(dup(arg1));
  401. }
  402. /* dup2(2) */
  403. static abi_long do_bsd_dup2(abi_long arg1, abi_long arg2)
  404. {
  405. return get_errno(dup2(arg1, arg2));
  406. }
  407. /* truncate(2) */
  408. static abi_long do_bsd_truncate(void *cpu_env, abi_long arg1,
  409. abi_long arg2, abi_long arg3, abi_long arg4)
  410. {
  411. abi_long ret;
  412. void *p;
  413. LOCK_PATH(p, arg1);
  414. if (regpairs_aligned(cpu_env) != 0) {
  415. arg2 = arg3;
  416. arg3 = arg4;
  417. }
  418. ret = get_errno(truncate(p, target_arg64(arg2, arg3)));
  419. UNLOCK_PATH(p, arg1);
  420. return ret;
  421. }
  422. /* ftruncate(2) */
  423. static abi_long do_bsd_ftruncate(void *cpu_env, abi_long arg1,
  424. abi_long arg2, abi_long arg3, abi_long arg4)
  425. {
  426. if (regpairs_aligned(cpu_env) != 0) {
  427. arg2 = arg3;
  428. arg3 = arg4;
  429. }
  430. return get_errno(ftruncate(arg1, target_arg64(arg2, arg3)));
  431. }
  432. /* acct(2) */
  433. static abi_long do_bsd_acct(abi_long arg1)
  434. {
  435. abi_long ret;
  436. void *p;
  437. if (arg1 == 0) {
  438. ret = get_errno(acct(NULL));
  439. } else {
  440. LOCK_PATH(p, arg1);
  441. ret = get_errno(acct(path(p)));
  442. UNLOCK_PATH(p, arg1);
  443. }
  444. return ret;
  445. }
  446. /* sync(2) */
  447. static abi_long do_bsd_sync(void)
  448. {
  449. sync();
  450. return 0;
  451. }
  452. /* mount(2) */
  453. static abi_long do_bsd_mount(abi_long arg1, abi_long arg2, abi_long arg3,
  454. abi_long arg4)
  455. {
  456. abi_long ret;
  457. void *p1, *p2;
  458. LOCK_PATH2(p1, arg1, p2, arg2);
  459. /*
  460. * XXX arg4 should be locked, but it isn't clear how to do that since it may
  461. * be not be a NULL-terminated string.
  462. */
  463. if (arg4 == 0) {
  464. ret = get_errno(mount(p1, p2, arg3, NULL)); /* XXX path(p2)? */
  465. } else {
  466. ret = get_errno(mount(p1, p2, arg3, g2h_untagged(arg4))); /* XXX path(p2)? */
  467. }
  468. UNLOCK_PATH2(p1, arg1, p2, arg2);
  469. return ret;
  470. }
  471. /* unmount(2) */
  472. static abi_long do_bsd_unmount(abi_long arg1, abi_long arg2)
  473. {
  474. abi_long ret;
  475. void *p;
  476. LOCK_PATH(p, arg1);
  477. ret = get_errno(unmount(p, arg2)); /* XXX path(p)? */
  478. UNLOCK_PATH(p, arg1);
  479. return ret;
  480. }
  481. /* nmount(2) */
  482. static abi_long do_bsd_nmount(abi_long arg1, abi_long count,
  483. abi_long flags)
  484. {
  485. abi_long ret;
  486. struct iovec *vec = lock_iovec(VERIFY_READ, arg1, count, 1);
  487. if (vec != NULL) {
  488. ret = get_errno(nmount(vec, count, flags));
  489. unlock_iovec(vec, arg1, count, 0);
  490. } else {
  491. return -TARGET_EFAULT;
  492. }
  493. return ret;
  494. }
  495. /* symlink(2) */
  496. static abi_long do_bsd_symlink(abi_long arg1, abi_long arg2)
  497. {
  498. abi_long ret;
  499. void *p1, *p2;
  500. LOCK_PATH2(p1, arg1, p2, arg2);
  501. ret = get_errno(symlink(p1, p2)); /* XXX path(p1), path(p2) */
  502. UNLOCK_PATH2(p1, arg1, p2, arg2);
  503. return ret;
  504. }
  505. /* symlinkat(2) */
  506. static abi_long do_bsd_symlinkat(abi_long arg1, abi_long arg2,
  507. abi_long arg3)
  508. {
  509. abi_long ret;
  510. void *p1, *p2;
  511. LOCK_PATH2(p1, arg1, p2, arg3);
  512. ret = get_errno(symlinkat(p1, arg2, p2)); /* XXX path(p1), path(p2) */
  513. UNLOCK_PATH2(p1, arg1, p2, arg3);
  514. return ret;
  515. }
  516. /* readlink(2) */
  517. static abi_long do_bsd_readlink(CPUArchState *env, abi_long arg1,
  518. abi_long arg2, abi_long arg3)
  519. {
  520. abi_long ret;
  521. void *p1, *p2;
  522. LOCK_PATH(p1, arg1);
  523. p2 = lock_user(VERIFY_WRITE, arg2, arg3, 0);
  524. if (p2 == NULL) {
  525. UNLOCK_PATH(p1, arg1);
  526. return -TARGET_EFAULT;
  527. }
  528. if (strcmp(p1, "/proc/curproc/file") == 0) {
  529. CPUState *cpu = env_cpu(env);
  530. TaskState *ts = (TaskState *)cpu->opaque;
  531. strncpy(p2, ts->bprm->fullpath, arg3);
  532. ret = MIN((abi_long)strlen(ts->bprm->fullpath), arg3);
  533. } else {
  534. ret = get_errno(readlink(path(p1), p2, arg3));
  535. }
  536. unlock_user(p2, arg2, ret);
  537. UNLOCK_PATH(p1, arg1);
  538. return ret;
  539. }
  540. /* readlinkat(2) */
  541. static abi_long do_bsd_readlinkat(abi_long arg1, abi_long arg2,
  542. abi_long arg3, abi_long arg4)
  543. {
  544. abi_long ret;
  545. void *p1, *p2;
  546. LOCK_PATH(p1, arg2);
  547. p2 = lock_user(VERIFY_WRITE, arg3, arg4, 0);
  548. if (p2 == NULL) {
  549. UNLOCK_PATH(p1, arg2);
  550. return -TARGET_EFAULT;
  551. }
  552. ret = get_errno(readlinkat(arg1, p1, p2, arg4));
  553. unlock_user(p2, arg3, ret);
  554. UNLOCK_PATH(p1, arg2);
  555. return ret;
  556. }
  557. /* chmod(2) */
  558. static abi_long do_bsd_chmod(abi_long arg1, abi_long arg2)
  559. {
  560. abi_long ret;
  561. void *p;
  562. LOCK_PATH(p, arg1);
  563. ret = get_errno(chmod(p, arg2)); /* XXX path(p)? */
  564. UNLOCK_PATH(p, arg1);
  565. return ret;
  566. }
  567. /* fchmod(2) */
  568. static abi_long do_bsd_fchmod(abi_long arg1, abi_long arg2)
  569. {
  570. return get_errno(fchmod(arg1, arg2));
  571. }
  572. /* lchmod(2) */
  573. static abi_long do_bsd_lchmod(abi_long arg1, abi_long arg2)
  574. {
  575. abi_long ret;
  576. void *p;
  577. LOCK_PATH(p, arg1);
  578. ret = get_errno(lchmod(p, arg2)); /* XXX path(p)? */
  579. UNLOCK_PATH(p, arg1);
  580. return ret;
  581. }
  582. /* fchmodat(2) */
  583. static abi_long do_bsd_fchmodat(abi_long arg1, abi_long arg2,
  584. abi_long arg3, abi_long arg4)
  585. {
  586. abi_long ret;
  587. void *p;
  588. LOCK_PATH(p, arg2);
  589. ret = get_errno(fchmodat(arg1, p, arg3, arg4));
  590. UNLOCK_PATH(p, arg2);
  591. return ret;
  592. }
  593. /* pre-ino64 mknod(2) */
  594. static abi_long do_bsd_freebsd11_mknod(abi_long arg1, abi_long arg2, abi_long arg3)
  595. {
  596. abi_long ret;
  597. void *p;
  598. LOCK_PATH(p, arg1);
  599. ret = get_errno(syscall(SYS_freebsd11_mknod, p, arg2, arg3));
  600. UNLOCK_PATH(p, arg1);
  601. return ret;
  602. }
  603. /* pre-ino64 mknodat(2) */
  604. static abi_long do_bsd_freebsd11_mknodat(abi_long arg1, abi_long arg2,
  605. abi_long arg3, abi_long arg4)
  606. {
  607. abi_long ret;
  608. void *p;
  609. LOCK_PATH(p, arg2);
  610. ret = get_errno(syscall(SYS_freebsd11_mknodat, arg1, p, arg3, arg4));
  611. UNLOCK_PATH(p, arg2);
  612. return ret;
  613. }
  614. /* post-ino64 mknodat(2) */
  615. static abi_long do_bsd_mknodat(void *cpu_env, abi_long arg1,
  616. abi_long arg2, abi_long arg3, abi_long arg4, abi_long arg5,
  617. abi_long arg6)
  618. {
  619. abi_long ret;
  620. void *p;
  621. LOCK_PATH(p, arg2);
  622. /* 32-bit arch's use two 32 registers for 64 bit return value */
  623. if (regpairs_aligned(cpu_env) != 0) {
  624. ret = get_errno(mknodat(arg1, p, arg3, target_arg64(arg5, arg6)));
  625. } else {
  626. ret = get_errno(mknodat(arg1, p, arg3, target_arg64(arg4, arg5)));
  627. }
  628. UNLOCK_PATH(p, arg2);
  629. return ret;
  630. }
  631. /* chown(2) */
  632. static abi_long do_bsd_chown(abi_long arg1, abi_long arg2, abi_long arg3)
  633. {
  634. abi_long ret;
  635. void *p;
  636. LOCK_PATH(p, arg1);
  637. ret = get_errno(chown(p, arg2, arg3)); /* XXX path(p)? */
  638. UNLOCK_PATH(p, arg1);
  639. return ret;
  640. }
  641. /* fchown(2) */
  642. static abi_long do_bsd_fchown(abi_long arg1, abi_long arg2,
  643. abi_long arg3)
  644. {
  645. return get_errno(fchown(arg1, arg2, arg3));
  646. }
  647. /* lchown(2) */
  648. static abi_long do_bsd_lchown(abi_long arg1, abi_long arg2,
  649. abi_long arg3)
  650. {
  651. abi_long ret;
  652. void *p;
  653. LOCK_PATH(p, arg1);
  654. ret = get_errno(lchown(p, arg2, arg3)); /* XXX path(p)? */
  655. UNLOCK_PATH(p, arg1);
  656. return ret;
  657. }
  658. /* fchownat(2) */
  659. static abi_long do_bsd_fchownat(abi_long arg1, abi_long arg2,
  660. abi_long arg3, abi_long arg4, abi_long arg5)
  661. {
  662. abi_long ret;
  663. void *p;
  664. LOCK_PATH(p, arg2);
  665. ret = get_errno(fchownat(arg1, p, arg3, arg4, arg5)); /* XXX path(p)? */
  666. UNLOCK_PATH(p, arg2);
  667. return ret;
  668. }
  669. /* chflags(2) */
  670. static abi_long do_bsd_chflags(abi_long arg1, abi_long arg2)
  671. {
  672. abi_long ret;
  673. void *p;
  674. LOCK_PATH(p, arg1);
  675. ret = get_errno(chflags(p, arg2)); /* XXX path(p)? */
  676. UNLOCK_PATH(p, arg1);
  677. return ret;
  678. }
  679. /* lchflags(2) */
  680. static abi_long do_bsd_lchflags(abi_long arg1, abi_long arg2)
  681. {
  682. abi_long ret;
  683. void *p;
  684. LOCK_PATH(p, arg1);
  685. ret = get_errno(lchflags(p, arg2)); /* XXX path(p)? */
  686. UNLOCK_PATH(p, arg1);
  687. return ret;
  688. }
  689. /* fchflags(2) */
  690. static abi_long do_bsd_fchflags(abi_long arg1, abi_long arg2)
  691. {
  692. return get_errno(fchflags(arg1, arg2));
  693. }
  694. /* chroot(2) */
  695. static abi_long do_bsd_chroot(abi_long arg1)
  696. {
  697. abi_long ret;
  698. void *p;
  699. LOCK_PATH(p, arg1);
  700. ret = get_errno(chroot(p)); /* XXX path(p)? */
  701. UNLOCK_PATH(p, arg1);
  702. return ret;
  703. }
  704. /* flock(2) */
  705. static abi_long do_bsd_flock(abi_long arg1, abi_long arg2)
  706. {
  707. return get_errno(flock(arg1, arg2));
  708. }
  709. /* mkfifo(2) */
  710. static abi_long do_bsd_mkfifo(abi_long arg1, abi_long arg2)
  711. {
  712. abi_long ret;
  713. void *p;
  714. LOCK_PATH(p, arg1);
  715. ret = get_errno(mkfifo(p, arg2)); /* XXX path(p)? */
  716. UNLOCK_PATH(p, arg1);
  717. return ret;
  718. }
  719. /* mkfifoat(2) */
  720. static abi_long do_bsd_mkfifoat(abi_long arg1, abi_long arg2,
  721. abi_long arg3)
  722. {
  723. abi_long ret;
  724. void *p;
  725. LOCK_PATH(p, arg2);
  726. ret = get_errno(mkfifoat(arg1, p, arg3));
  727. UNLOCK_PATH(p, arg2);
  728. return ret;
  729. }
  730. /* pathconf(2) */
  731. static abi_long do_bsd_pathconf(abi_long arg1, abi_long arg2)
  732. {
  733. abi_long ret;
  734. void *p;
  735. LOCK_PATH(p, arg1);
  736. ret = get_errno(pathconf(p, arg2)); /* XXX path(p)? */
  737. UNLOCK_PATH(p, arg1);
  738. return ret;
  739. }
  740. /* lpathconf(2) */
  741. static abi_long do_bsd_lpathconf(abi_long arg1, abi_long arg2)
  742. {
  743. abi_long ret;
  744. void *p;
  745. LOCK_PATH(p, arg1);
  746. ret = get_errno(lpathconf(p, arg2)); /* XXX path(p)? */
  747. UNLOCK_PATH(p, arg1);
  748. return ret;
  749. }
  750. /* fpathconf(2) */
  751. static abi_long do_bsd_fpathconf(abi_long arg1, abi_long arg2)
  752. {
  753. return get_errno(fpathconf(arg1, arg2));
  754. }
  755. /* undelete(2) */
  756. static abi_long do_bsd_undelete(abi_long arg1)
  757. {
  758. abi_long ret;
  759. void *p;
  760. LOCK_PATH(p, arg1);
  761. ret = get_errno(undelete(p)); /* XXX path(p)? */
  762. UNLOCK_PATH(p, arg1);
  763. return ret;
  764. }
  765. #endif /* BSD_FILE_H */