b488893a39
This is the largest patch in the set. Make all (I hope) the places where the pid is shown to or get from user operate on the virtual pids. The idea is: - all in-kernel data structures must store either struct pid itself or the pid's global nr, obtained with pid_nr() call; - when seeking the task from kernel code with the stored id one should use find_task_by_pid() call that works with global pids; - when showing pid's numerical value to the user the virtual one should be used, but however when one shows task's pid outside this task's namespace the global one is to be used; - when getting the pid from userspace one need to consider this as the virtual one and use appropriate task/pid-searching functions. [akpm@linux-foundation.org: build fix] [akpm@linux-foundation.org: nuther build fix] [akpm@linux-foundation.org: yet nuther build fix] [akpm@linux-foundation.org: remove unneeded casts] Signed-off-by: Pavel Emelyanov <xemul@openvz.org> Signed-off-by: Alexey Dobriyan <adobriyan@openvz.org> Cc: Sukadev Bhattiprolu <sukadev@us.ibm.com> Cc: Oleg Nesterov <oleg@tv-sign.ru> Cc: Paul Menage <menage@google.com> Cc: "Eric W. Biederman" <ebiederm@xmission.com> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
1361 lines
33 KiB
C
1361 lines
33 KiB
C
/* $Id: sys_sunos32.c,v 1.64 2002/02/09 19:49:31 davem Exp $
|
|
* sys_sunos32.c: SunOS binary compatibility layer on sparc64.
|
|
*
|
|
* Copyright (C) 1995, 1996, 1997 David S. Miller (davem@caip.rutgers.edu)
|
|
* Copyright (C) 1995 Miguel de Icaza (miguel@nuclecu.unam.mx)
|
|
*
|
|
* Based upon preliminary work which is:
|
|
*
|
|
* Copyright (C) 1995 Adrian M. Rodriguez (adrian@remus.rutgers.edu)
|
|
*/
|
|
|
|
#include <linux/kernel.h>
|
|
#include <linux/sched.h>
|
|
#include <linux/types.h>
|
|
#include <linux/capability.h>
|
|
#include <linux/compat.h>
|
|
#include <linux/mman.h>
|
|
#include <linux/mm.h>
|
|
#include <linux/swap.h>
|
|
#include <linux/fs.h>
|
|
#include <linux/file.h>
|
|
#include <linux/resource.h>
|
|
#include <linux/ipc.h>
|
|
#include <linux/shm.h>
|
|
#include <linux/msg.h>
|
|
#include <linux/sem.h>
|
|
#include <linux/signal.h>
|
|
#include <linux/uio.h>
|
|
#include <linux/utsname.h>
|
|
#include <linux/major.h>
|
|
#include <linux/stat.h>
|
|
#include <linux/slab.h>
|
|
#include <linux/pagemap.h>
|
|
#include <linux/errno.h>
|
|
#include <linux/smp.h>
|
|
#include <linux/smp_lock.h>
|
|
#include <linux/syscalls.h>
|
|
|
|
#include <asm/uaccess.h>
|
|
#include <asm/page.h>
|
|
#include <asm/pgtable.h>
|
|
#include <asm/pconf.h>
|
|
#include <asm/idprom.h> /* for gethostid() */
|
|
#include <asm/unistd.h>
|
|
#include <asm/system.h>
|
|
#include <asm/compat_signal.h>
|
|
|
|
/* For the nfs mount emulation */
|
|
#include <linux/socket.h>
|
|
#include <linux/in.h>
|
|
#include <linux/nfs.h>
|
|
#include <linux/nfs2.h>
|
|
#include <linux/nfs_mount.h>
|
|
|
|
/* for sunos_select */
|
|
#include <linux/time.h>
|
|
#include <linux/personality.h>
|
|
|
|
/* For SOCKET_I */
|
|
#include <linux/socket.h>
|
|
#include <net/sock.h>
|
|
#include <net/compat.h>
|
|
|
|
#define SUNOS_NR_OPEN 256
|
|
|
|
asmlinkage u32 sunos_mmap(u32 addr, u32 len, u32 prot, u32 flags, u32 fd, u32 off)
|
|
{
|
|
struct file *file = NULL;
|
|
unsigned long retval, ret_type;
|
|
|
|
if (flags & MAP_NORESERVE) {
|
|
static int cnt;
|
|
if (cnt++ < 10)
|
|
printk("%s: unimplemented SunOS MAP_NORESERVE mmap() flag\n",
|
|
current->comm);
|
|
flags &= ~MAP_NORESERVE;
|
|
}
|
|
retval = -EBADF;
|
|
if (!(flags & MAP_ANONYMOUS)) {
|
|
struct inode * inode;
|
|
if (fd >= SUNOS_NR_OPEN)
|
|
goto out;
|
|
file = fget(fd);
|
|
if (!file)
|
|
goto out;
|
|
inode = file->f_path.dentry->d_inode;
|
|
if (imajor(inode) == MEM_MAJOR && iminor(inode) == 5) {
|
|
flags |= MAP_ANONYMOUS;
|
|
fput(file);
|
|
file = NULL;
|
|
}
|
|
}
|
|
|
|
retval = -EINVAL;
|
|
if (!(flags & MAP_FIXED))
|
|
addr = 0;
|
|
else if (len > 0xf0000000 || addr > 0xf0000000 - len)
|
|
goto out_putf;
|
|
ret_type = flags & _MAP_NEW;
|
|
flags &= ~_MAP_NEW;
|
|
|
|
flags &= ~(MAP_EXECUTABLE | MAP_DENYWRITE);
|
|
down_write(¤t->mm->mmap_sem);
|
|
retval = do_mmap(file,
|
|
(unsigned long) addr, (unsigned long) len,
|
|
(unsigned long) prot, (unsigned long) flags,
|
|
(unsigned long) off);
|
|
up_write(¤t->mm->mmap_sem);
|
|
if (!ret_type)
|
|
retval = ((retval < 0xf0000000) ? 0 : retval);
|
|
out_putf:
|
|
if (file)
|
|
fput(file);
|
|
out:
|
|
return (u32) retval;
|
|
}
|
|
|
|
asmlinkage int sunos_mctl(u32 addr, u32 len, int function, u32 arg)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
asmlinkage int sunos_brk(u32 baddr)
|
|
{
|
|
int freepages, retval = -ENOMEM;
|
|
unsigned long rlim;
|
|
unsigned long newbrk, oldbrk, brk = (unsigned long) baddr;
|
|
|
|
down_write(¤t->mm->mmap_sem);
|
|
if (brk < current->mm->end_code)
|
|
goto out;
|
|
newbrk = PAGE_ALIGN(brk);
|
|
oldbrk = PAGE_ALIGN(current->mm->brk);
|
|
retval = 0;
|
|
if (oldbrk == newbrk) {
|
|
current->mm->brk = brk;
|
|
goto out;
|
|
}
|
|
/* Always allow shrinking brk. */
|
|
if (brk <= current->mm->brk) {
|
|
current->mm->brk = brk;
|
|
do_munmap(current->mm, newbrk, oldbrk-newbrk);
|
|
goto out;
|
|
}
|
|
/* Check against rlimit and stack.. */
|
|
retval = -ENOMEM;
|
|
rlim = current->signal->rlim[RLIMIT_DATA].rlim_cur;
|
|
if (rlim >= RLIM_INFINITY)
|
|
rlim = ~0;
|
|
if (brk - current->mm->end_code > rlim)
|
|
goto out;
|
|
/* Check against existing mmap mappings. */
|
|
if (find_vma_intersection(current->mm, oldbrk, newbrk+PAGE_SIZE))
|
|
goto out;
|
|
/* stupid algorithm to decide if we have enough memory: while
|
|
* simple, it hopefully works in most obvious cases.. Easy to
|
|
* fool it, but this should catch most mistakes.
|
|
*/
|
|
freepages = global_page_state(NR_FILE_PAGES);
|
|
freepages >>= 1;
|
|
freepages += nr_free_pages();
|
|
freepages += nr_swap_pages;
|
|
freepages -= num_physpages >> 4;
|
|
freepages -= (newbrk-oldbrk) >> PAGE_SHIFT;
|
|
if (freepages < 0)
|
|
goto out;
|
|
/* Ok, we have probably got enough memory - let it rip. */
|
|
current->mm->brk = brk;
|
|
do_brk(oldbrk, newbrk-oldbrk);
|
|
retval = 0;
|
|
out:
|
|
up_write(¤t->mm->mmap_sem);
|
|
return retval;
|
|
}
|
|
|
|
asmlinkage u32 sunos_sbrk(int increment)
|
|
{
|
|
int error, oldbrk;
|
|
|
|
/* This should do it hopefully... */
|
|
oldbrk = (int)current->mm->brk;
|
|
error = sunos_brk(((int) current->mm->brk) + increment);
|
|
if (!error)
|
|
error = oldbrk;
|
|
return error;
|
|
}
|
|
|
|
asmlinkage u32 sunos_sstk(int increment)
|
|
{
|
|
printk("%s: Call to sunos_sstk(increment<%d>) is unsupported\n",
|
|
current->comm, increment);
|
|
|
|
return (u32)-1;
|
|
}
|
|
|
|
/* Give hints to the kernel as to what paging strategy to use...
|
|
* Completely bogus, don't remind me.
|
|
*/
|
|
#define VA_NORMAL 0 /* Normal vm usage expected */
|
|
#define VA_ABNORMAL 1 /* Abnormal/random vm usage probable */
|
|
#define VA_SEQUENTIAL 2 /* Accesses will be of a sequential nature */
|
|
#define VA_INVALIDATE 3 /* Page table entries should be flushed ??? */
|
|
static char *vstrings[] = {
|
|
"VA_NORMAL",
|
|
"VA_ABNORMAL",
|
|
"VA_SEQUENTIAL",
|
|
"VA_INVALIDATE",
|
|
};
|
|
|
|
asmlinkage void sunos_vadvise(u32 strategy)
|
|
{
|
|
static int count;
|
|
|
|
/* I wanna see who uses this... */
|
|
if (count++ < 5)
|
|
printk("%s: Advises us to use %s paging strategy\n",
|
|
current->comm,
|
|
strategy <= 3 ? vstrings[strategy] : "BOGUS");
|
|
}
|
|
|
|
/* This just wants the soft limit (ie. rlim_cur element) of the RLIMIT_NOFILE
|
|
* resource limit and is for backwards compatibility with older sunos
|
|
* revs.
|
|
*/
|
|
asmlinkage int sunos_getdtablesize(void)
|
|
{
|
|
return SUNOS_NR_OPEN;
|
|
}
|
|
|
|
|
|
#define _BLOCKABLE (~(sigmask(SIGKILL) | sigmask(SIGSTOP)))
|
|
|
|
asmlinkage u32 sunos_sigblock(u32 blk_mask)
|
|
{
|
|
u32 old;
|
|
|
|
spin_lock_irq(¤t->sighand->siglock);
|
|
old = (u32) current->blocked.sig[0];
|
|
current->blocked.sig[0] |= (blk_mask & _BLOCKABLE);
|
|
recalc_sigpending();
|
|
spin_unlock_irq(¤t->sighand->siglock);
|
|
return old;
|
|
}
|
|
|
|
asmlinkage u32 sunos_sigsetmask(u32 newmask)
|
|
{
|
|
u32 retval;
|
|
|
|
spin_lock_irq(¤t->sighand->siglock);
|
|
retval = (u32) current->blocked.sig[0];
|
|
current->blocked.sig[0] = (newmask & _BLOCKABLE);
|
|
recalc_sigpending();
|
|
spin_unlock_irq(¤t->sighand->siglock);
|
|
return retval;
|
|
}
|
|
|
|
/* SunOS getdents is very similar to the newer Linux (iBCS2 compliant) */
|
|
/* getdents system call, the format of the structure just has a different */
|
|
/* layout (d_off+d_ino instead of d_ino+d_off) */
|
|
struct sunos_dirent {
|
|
s32 d_off;
|
|
u32 d_ino;
|
|
u16 d_reclen;
|
|
u16 d_namlen;
|
|
char d_name[1];
|
|
};
|
|
|
|
struct sunos_dirent_callback {
|
|
struct sunos_dirent __user *curr;
|
|
struct sunos_dirent __user *previous;
|
|
int count;
|
|
int error;
|
|
};
|
|
|
|
#define NAME_OFFSET(de) ((int) ((de)->d_name - (char __user *) (de)))
|
|
#define ROUND_UP(x) (((x)+sizeof(s32)-1) & ~(sizeof(s32)-1))
|
|
|
|
static int sunos_filldir(void * __buf, const char * name, int namlen,
|
|
loff_t offset, ino_t ino, unsigned int d_type)
|
|
{
|
|
struct sunos_dirent __user *dirent;
|
|
struct sunos_dirent_callback * buf = (struct sunos_dirent_callback *) __buf;
|
|
int reclen = ROUND_UP(NAME_OFFSET(dirent) + namlen + 1);
|
|
u32 d_ino;
|
|
|
|
buf->error = -EINVAL; /* only used if we fail.. */
|
|
if (reclen > buf->count)
|
|
return -EINVAL;
|
|
d_ino = ino;
|
|
if (sizeof(d_ino) < sizeof(ino) && d_ino != ino)
|
|
return -EOVERFLOW;
|
|
dirent = buf->previous;
|
|
if (dirent)
|
|
put_user(offset, &dirent->d_off);
|
|
dirent = buf->curr;
|
|
buf->previous = dirent;
|
|
put_user(d_ino, &dirent->d_ino);
|
|
put_user(namlen, &dirent->d_namlen);
|
|
put_user(reclen, &dirent->d_reclen);
|
|
if (copy_to_user(dirent->d_name, name, namlen))
|
|
return -EFAULT;
|
|
put_user(0, dirent->d_name + namlen);
|
|
dirent = (void __user *) dirent + reclen;
|
|
buf->curr = dirent;
|
|
buf->count -= reclen;
|
|
return 0;
|
|
}
|
|
|
|
asmlinkage int sunos_getdents(unsigned int fd, void __user *dirent, int cnt)
|
|
{
|
|
struct file * file;
|
|
struct sunos_dirent __user *lastdirent;
|
|
struct sunos_dirent_callback buf;
|
|
int error = -EBADF;
|
|
|
|
if (fd >= SUNOS_NR_OPEN)
|
|
goto out;
|
|
|
|
file = fget(fd);
|
|
if (!file)
|
|
goto out;
|
|
|
|
error = -EINVAL;
|
|
if (cnt < (sizeof(struct sunos_dirent) + 255))
|
|
goto out_putf;
|
|
|
|
buf.curr = (struct sunos_dirent __user *) dirent;
|
|
buf.previous = NULL;
|
|
buf.count = cnt;
|
|
buf.error = 0;
|
|
|
|
error = vfs_readdir(file, sunos_filldir, &buf);
|
|
if (error < 0)
|
|
goto out_putf;
|
|
|
|
lastdirent = buf.previous;
|
|
error = buf.error;
|
|
if (lastdirent) {
|
|
put_user(file->f_pos, &lastdirent->d_off);
|
|
error = cnt - buf.count;
|
|
}
|
|
|
|
out_putf:
|
|
fput(file);
|
|
out:
|
|
return error;
|
|
}
|
|
|
|
/* Old sunos getdirentries, severely broken compatibility stuff here. */
|
|
struct sunos_direntry {
|
|
u32 d_ino;
|
|
u16 d_reclen;
|
|
u16 d_namlen;
|
|
char d_name[1];
|
|
};
|
|
|
|
struct sunos_direntry_callback {
|
|
struct sunos_direntry __user *curr;
|
|
struct sunos_direntry __user *previous;
|
|
int count;
|
|
int error;
|
|
};
|
|
|
|
static int sunos_filldirentry(void * __buf, const char * name, int namlen,
|
|
loff_t offset, ino_t ino, unsigned int d_type)
|
|
{
|
|
struct sunos_direntry __user *dirent;
|
|
struct sunos_direntry_callback * buf =
|
|
(struct sunos_direntry_callback *) __buf;
|
|
int reclen = ROUND_UP(NAME_OFFSET(dirent) + namlen + 1);
|
|
u32 d_ino;
|
|
|
|
buf->error = -EINVAL; /* only used if we fail.. */
|
|
if (reclen > buf->count)
|
|
return -EINVAL;
|
|
d_ino = ino;
|
|
if (sizeof(d_ino) < sizeof(ino) && d_ino != ino)
|
|
return -EOVERFLOW;
|
|
dirent = buf->previous;
|
|
dirent = buf->curr;
|
|
buf->previous = dirent;
|
|
put_user(d_ino, &dirent->d_ino);
|
|
put_user(namlen, &dirent->d_namlen);
|
|
put_user(reclen, &dirent->d_reclen);
|
|
if (copy_to_user(dirent->d_name, name, namlen))
|
|
return -EFAULT;
|
|
put_user(0, dirent->d_name + namlen);
|
|
dirent = (void __user *) dirent + reclen;
|
|
buf->curr = dirent;
|
|
buf->count -= reclen;
|
|
return 0;
|
|
}
|
|
|
|
asmlinkage int sunos_getdirentries(unsigned int fd,
|
|
void __user *dirent,
|
|
int cnt,
|
|
unsigned int __user *basep)
|
|
{
|
|
struct file * file;
|
|
struct sunos_direntry __user *lastdirent;
|
|
int error = -EBADF;
|
|
struct sunos_direntry_callback buf;
|
|
|
|
if (fd >= SUNOS_NR_OPEN)
|
|
goto out;
|
|
|
|
file = fget(fd);
|
|
if (!file)
|
|
goto out;
|
|
|
|
error = -EINVAL;
|
|
if (cnt < (sizeof(struct sunos_direntry) + 255))
|
|
goto out_putf;
|
|
|
|
buf.curr = (struct sunos_direntry __user *) dirent;
|
|
buf.previous = NULL;
|
|
buf.count = cnt;
|
|
buf.error = 0;
|
|
|
|
error = vfs_readdir(file, sunos_filldirentry, &buf);
|
|
if (error < 0)
|
|
goto out_putf;
|
|
|
|
lastdirent = buf.previous;
|
|
error = buf.error;
|
|
if (lastdirent) {
|
|
put_user(file->f_pos, basep);
|
|
error = cnt - buf.count;
|
|
}
|
|
|
|
out_putf:
|
|
fput(file);
|
|
out:
|
|
return error;
|
|
}
|
|
|
|
struct sunos_utsname {
|
|
char sname[9];
|
|
char nname[9];
|
|
char nnext[56];
|
|
char rel[9];
|
|
char ver[9];
|
|
char mach[9];
|
|
};
|
|
|
|
asmlinkage int sunos_uname(struct sunos_utsname __user *name)
|
|
{
|
|
int ret;
|
|
|
|
down_read(&uts_sem);
|
|
ret = copy_to_user(&name->sname[0], &utsname()->sysname[0],
|
|
sizeof(name->sname) - 1);
|
|
ret |= copy_to_user(&name->nname[0], &utsname()->nodename[0],
|
|
sizeof(name->nname) - 1);
|
|
ret |= put_user('\0', &name->nname[8]);
|
|
ret |= copy_to_user(&name->rel[0], &utsname()->release[0],
|
|
sizeof(name->rel) - 1);
|
|
ret |= copy_to_user(&name->ver[0], &utsname()->version[0],
|
|
sizeof(name->ver) - 1);
|
|
ret |= copy_to_user(&name->mach[0], &utsname()->machine[0],
|
|
sizeof(name->mach) - 1);
|
|
up_read(&uts_sem);
|
|
return (ret ? -EFAULT : 0);
|
|
}
|
|
|
|
asmlinkage int sunos_nosys(void)
|
|
{
|
|
struct pt_regs *regs;
|
|
siginfo_t info;
|
|
static int cnt;
|
|
|
|
regs = current_thread_info()->kregs;
|
|
if (test_thread_flag(TIF_32BIT)) {
|
|
regs->tpc &= 0xffffffff;
|
|
regs->tnpc &= 0xffffffff;
|
|
}
|
|
info.si_signo = SIGSYS;
|
|
info.si_errno = 0;
|
|
info.si_code = __SI_FAULT|0x100;
|
|
info.si_addr = (void __user *)regs->tpc;
|
|
info.si_trapno = regs->u_regs[UREG_G1];
|
|
send_sig_info(SIGSYS, &info, current);
|
|
if (cnt++ < 4) {
|
|
printk("Process makes ni_syscall number %d, register dump:\n",
|
|
(int) regs->u_regs[UREG_G1]);
|
|
show_regs(regs);
|
|
}
|
|
return -ENOSYS;
|
|
}
|
|
|
|
/* This is not a real and complete implementation yet, just to keep
|
|
* the easy SunOS binaries happy.
|
|
*/
|
|
asmlinkage int sunos_fpathconf(int fd, int name)
|
|
{
|
|
int ret;
|
|
|
|
switch(name) {
|
|
case _PCONF_LINK:
|
|
ret = LINK_MAX;
|
|
break;
|
|
case _PCONF_CANON:
|
|
ret = MAX_CANON;
|
|
break;
|
|
case _PCONF_INPUT:
|
|
ret = MAX_INPUT;
|
|
break;
|
|
case _PCONF_NAME:
|
|
ret = NAME_MAX;
|
|
break;
|
|
case _PCONF_PATH:
|
|
ret = PATH_MAX;
|
|
break;
|
|
case _PCONF_PIPE:
|
|
ret = PIPE_BUF;
|
|
break;
|
|
case _PCONF_CHRESTRICT: /* XXX Investigate XXX */
|
|
ret = 1;
|
|
break;
|
|
case _PCONF_NOTRUNC: /* XXX Investigate XXX */
|
|
case _PCONF_VDISABLE:
|
|
ret = 0;
|
|
break;
|
|
default:
|
|
ret = -EINVAL;
|
|
break;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
asmlinkage int sunos_pathconf(u32 u_path, int name)
|
|
{
|
|
int ret;
|
|
|
|
ret = sunos_fpathconf(0, name); /* XXX cheese XXX */
|
|
return ret;
|
|
}
|
|
|
|
asmlinkage int sunos_select(int width, u32 inp, u32 outp, u32 exp, u32 tvp_x)
|
|
{
|
|
int ret;
|
|
|
|
/* SunOS binaries expect that select won't change the tvp contents */
|
|
ret = compat_sys_select(width, compat_ptr(inp), compat_ptr(outp),
|
|
compat_ptr(exp), compat_ptr(tvp_x));
|
|
if (ret == -EINTR && tvp_x) {
|
|
struct compat_timeval __user *tvp = compat_ptr(tvp_x);
|
|
time_t sec, usec;
|
|
|
|
__get_user(sec, &tvp->tv_sec);
|
|
__get_user(usec, &tvp->tv_usec);
|
|
if (sec == 0 && usec == 0)
|
|
ret = 0;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
asmlinkage void sunos_nop(void)
|
|
{
|
|
return;
|
|
}
|
|
|
|
#if 0 /* This code doesn't translate user pointers correctly,
|
|
* disable for now. -DaveM
|
|
*/
|
|
|
|
/* XXXXXXXXXX SunOS mount/umount. XXXXXXXXXXX */
|
|
#define SMNT_RDONLY 1
|
|
#define SMNT_NOSUID 2
|
|
#define SMNT_NEWTYPE 4
|
|
#define SMNT_GRPID 8
|
|
#define SMNT_REMOUNT 16
|
|
#define SMNT_NOSUB 32
|
|
#define SMNT_MULTI 64
|
|
#define SMNT_SYS5 128
|
|
|
|
struct sunos_fh_t {
|
|
char fh_data [NFS_FHSIZE];
|
|
};
|
|
|
|
struct sunos_nfs_mount_args {
|
|
struct sockaddr_in *addr; /* file server address */
|
|
struct nfs_fh *fh; /* File handle to be mounted */
|
|
int flags; /* flags */
|
|
int wsize; /* write size in bytes */
|
|
int rsize; /* read size in bytes */
|
|
int timeo; /* initial timeout in .1 secs */
|
|
int retrans; /* times to retry send */
|
|
char *hostname; /* server's hostname */
|
|
int acregmin; /* attr cache file min secs */
|
|
int acregmax; /* attr cache file max secs */
|
|
int acdirmin; /* attr cache dir min secs */
|
|
int acdirmax; /* attr cache dir max secs */
|
|
char *netname; /* server's netname */
|
|
};
|
|
|
|
|
|
/* Bind the socket on a local reserved port and connect it to the
|
|
* remote server. This on Linux/i386 is done by the mount program,
|
|
* not by the kernel.
|
|
*/
|
|
/* XXXXXXXXXXXXXXXXXXXX */
|
|
static int
|
|
sunos_nfs_get_server_fd (int fd, struct sockaddr_in *addr)
|
|
{
|
|
struct sockaddr_in local;
|
|
struct sockaddr_in server;
|
|
int try_port;
|
|
int ret;
|
|
struct socket *socket;
|
|
struct inode *inode;
|
|
struct file *file;
|
|
|
|
file = fget(fd);
|
|
if (!file)
|
|
return 0;
|
|
|
|
inode = file->f_path.dentry->d_inode;
|
|
|
|
socket = SOCKET_I(inode);
|
|
local.sin_family = AF_INET;
|
|
local.sin_addr.s_addr = INADDR_ANY;
|
|
|
|
/* IPPORT_RESERVED = 1024, can't find the definition in the kernel */
|
|
try_port = 1024;
|
|
do {
|
|
local.sin_port = htons (--try_port);
|
|
ret = socket->ops->bind(socket, (struct sockaddr*)&local,
|
|
sizeof(local));
|
|
} while (ret && try_port > (1024 / 2));
|
|
|
|
if (ret) {
|
|
fput(file);
|
|
return 0;
|
|
}
|
|
|
|
server.sin_family = AF_INET;
|
|
server.sin_addr = addr->sin_addr;
|
|
server.sin_port = NFS_PORT;
|
|
|
|
/* Call sys_connect */
|
|
ret = socket->ops->connect (socket, (struct sockaddr *) &server,
|
|
sizeof (server), file->f_flags);
|
|
fput(file);
|
|
if (ret < 0)
|
|
return 0;
|
|
return 1;
|
|
}
|
|
|
|
/* XXXXXXXXXXXXXXXXXXXX */
|
|
static int get_default (int value, int def_value)
|
|
{
|
|
if (value)
|
|
return value;
|
|
else
|
|
return def_value;
|
|
}
|
|
|
|
/* XXXXXXXXXXXXXXXXXXXX */
|
|
static int sunos_nfs_mount(char *dir_name, int linux_flags, void __user *data)
|
|
{
|
|
int server_fd, err;
|
|
char *the_name, *mount_page;
|
|
struct nfs_mount_data linux_nfs_mount;
|
|
struct sunos_nfs_mount_args sunos_mount;
|
|
|
|
/* Ok, here comes the fun part: Linux's nfs mount needs a
|
|
* socket connection to the server, but SunOS mount does not
|
|
* require this, so we use the information on the destination
|
|
* address to create a socket and bind it to a reserved
|
|
* port on this system
|
|
*/
|
|
if (copy_from_user(&sunos_mount, data, sizeof(sunos_mount)))
|
|
return -EFAULT;
|
|
|
|
server_fd = sys_socket (AF_INET, SOCK_DGRAM, IPPROTO_UDP);
|
|
if (server_fd < 0)
|
|
return -ENXIO;
|
|
|
|
if (copy_from_user(&linux_nfs_mount.addr, sunos_mount.addr,
|
|
sizeof(*sunos_mount.addr)) ||
|
|
copy_from_user(&linux_nfs_mount.root, sunos_mount.fh,
|
|
sizeof(*sunos_mount.fh))) {
|
|
sys_close (server_fd);
|
|
return -EFAULT;
|
|
}
|
|
|
|
if (!sunos_nfs_get_server_fd (server_fd, &linux_nfs_mount.addr)){
|
|
sys_close (server_fd);
|
|
return -ENXIO;
|
|
}
|
|
|
|
/* Now, bind it to a locally reserved port */
|
|
linux_nfs_mount.version = NFS_MOUNT_VERSION;
|
|
linux_nfs_mount.flags = sunos_mount.flags;
|
|
linux_nfs_mount.fd = server_fd;
|
|
|
|
linux_nfs_mount.rsize = get_default (sunos_mount.rsize, 8192);
|
|
linux_nfs_mount.wsize = get_default (sunos_mount.wsize, 8192);
|
|
linux_nfs_mount.timeo = get_default (sunos_mount.timeo, 10);
|
|
linux_nfs_mount.retrans = sunos_mount.retrans;
|
|
|
|
linux_nfs_mount.acregmin = sunos_mount.acregmin;
|
|
linux_nfs_mount.acregmax = sunos_mount.acregmax;
|
|
linux_nfs_mount.acdirmin = sunos_mount.acdirmin;
|
|
linux_nfs_mount.acdirmax = sunos_mount.acdirmax;
|
|
|
|
the_name = getname(sunos_mount.hostname);
|
|
if (IS_ERR(the_name))
|
|
return PTR_ERR(the_name);
|
|
|
|
strlcpy(linux_nfs_mount.hostname, the_name,
|
|
sizeof(linux_nfs_mount.hostname));
|
|
putname (the_name);
|
|
|
|
mount_page = (char *) get_zeroed_page(GFP_KERNEL);
|
|
if (!mount_page)
|
|
return -ENOMEM;
|
|
|
|
memcpy(mount_page, &linux_nfs_mount, sizeof(linux_nfs_mount));
|
|
|
|
err = do_mount("", dir_name, "nfs", linux_flags, mount_page);
|
|
|
|
free_page((unsigned long) mount_page);
|
|
return err;
|
|
}
|
|
|
|
/* XXXXXXXXXXXXXXXXXXXX */
|
|
asmlinkage int
|
|
sunos_mount(char *type, char *dir, int flags, void *data)
|
|
{
|
|
int linux_flags = 0;
|
|
int ret = -EINVAL;
|
|
char *dev_fname = 0;
|
|
char *dir_page, *type_page;
|
|
|
|
if (!capable (CAP_SYS_ADMIN))
|
|
return -EPERM;
|
|
|
|
/* We don't handle the integer fs type */
|
|
if ((flags & SMNT_NEWTYPE) == 0)
|
|
goto out;
|
|
|
|
/* Do not allow for those flags we don't support */
|
|
if (flags & (SMNT_GRPID|SMNT_NOSUB|SMNT_MULTI|SMNT_SYS5))
|
|
goto out;
|
|
|
|
if (flags & SMNT_REMOUNT)
|
|
linux_flags |= MS_REMOUNT;
|
|
if (flags & SMNT_RDONLY)
|
|
linux_flags |= MS_RDONLY;
|
|
if (flags & SMNT_NOSUID)
|
|
linux_flags |= MS_NOSUID;
|
|
|
|
dir_page = getname(dir);
|
|
ret = PTR_ERR(dir_page);
|
|
if (IS_ERR(dir_page))
|
|
goto out;
|
|
|
|
type_page = getname(type);
|
|
ret = PTR_ERR(type_page);
|
|
if (IS_ERR(type_page))
|
|
goto out1;
|
|
|
|
if (strcmp(type_page, "ext2") == 0) {
|
|
dev_fname = getname(data);
|
|
} else if (strcmp(type_page, "iso9660") == 0) {
|
|
dev_fname = getname(data);
|
|
} else if (strcmp(type_page, "minix") == 0) {
|
|
dev_fname = getname(data);
|
|
} else if (strcmp(type_page, "nfs") == 0) {
|
|
ret = sunos_nfs_mount (dir_page, flags, data);
|
|
goto out2;
|
|
} else if (strcmp(type_page, "ufs") == 0) {
|
|
printk("Warning: UFS filesystem mounts unsupported.\n");
|
|
ret = -ENODEV;
|
|
goto out2;
|
|
} else if (strcmp(type_page, "proc")) {
|
|
ret = -ENODEV;
|
|
goto out2;
|
|
}
|
|
ret = PTR_ERR(dev_fname);
|
|
if (IS_ERR(dev_fname))
|
|
goto out2;
|
|
lock_kernel();
|
|
ret = do_mount(dev_fname, dir_page, type_page, linux_flags, NULL);
|
|
unlock_kernel();
|
|
if (dev_fname)
|
|
putname(dev_fname);
|
|
out2:
|
|
putname(type_page);
|
|
out1:
|
|
putname(dir_page);
|
|
out:
|
|
return ret;
|
|
}
|
|
#endif
|
|
|
|
asmlinkage int sunos_setpgrp(pid_t pid, pid_t pgid)
|
|
{
|
|
int ret;
|
|
|
|
/* So stupid... */
|
|
if ((!pid || pid == current->pid) &&
|
|
!pgid) {
|
|
sys_setsid();
|
|
ret = 0;
|
|
} else {
|
|
ret = sys_setpgid(pid, pgid);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
/* So stupid... */
|
|
extern long compat_sys_wait4(compat_pid_t, compat_uint_t __user *, int,
|
|
struct compat_rusage __user *);
|
|
|
|
asmlinkage int sunos_wait4(compat_pid_t pid, compat_uint_t __user *stat_addr, int options, struct compat_rusage __user *ru)
|
|
{
|
|
int ret;
|
|
|
|
ret = compat_sys_wait4((pid ? pid : ((compat_pid_t)-1)),
|
|
stat_addr, options, ru);
|
|
return ret;
|
|
}
|
|
|
|
asmlinkage int sunos_killpg(int pgrp, int sig)
|
|
{
|
|
int ret;
|
|
|
|
rcu_read_lock();
|
|
ret = -EINVAL;
|
|
if (pgrp > 0)
|
|
ret = kill_pgrp(find_vpid(pgrp), sig, 0);
|
|
rcu_read_unlock();
|
|
|
|
return ret;
|
|
}
|
|
|
|
asmlinkage int sunos_audit(void)
|
|
{
|
|
printk ("sys_audit\n");
|
|
return -1;
|
|
}
|
|
|
|
asmlinkage u32 sunos_gethostid(void)
|
|
{
|
|
u32 ret;
|
|
|
|
ret = (((u32)idprom->id_machtype << 24) | ((u32)idprom->id_sernum));
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* sysconf options, for SunOS compatibility */
|
|
#define _SC_ARG_MAX 1
|
|
#define _SC_CHILD_MAX 2
|
|
#define _SC_CLK_TCK 3
|
|
#define _SC_NGROUPS_MAX 4
|
|
#define _SC_OPEN_MAX 5
|
|
#define _SC_JOB_CONTROL 6
|
|
#define _SC_SAVED_IDS 7
|
|
#define _SC_VERSION 8
|
|
|
|
asmlinkage s32 sunos_sysconf (int name)
|
|
{
|
|
s32 ret;
|
|
|
|
switch (name){
|
|
case _SC_ARG_MAX:
|
|
ret = ARG_MAX;
|
|
break;
|
|
case _SC_CHILD_MAX:
|
|
ret = current->signal->rlim[RLIMIT_NPROC].rlim_cur;
|
|
break;
|
|
case _SC_CLK_TCK:
|
|
ret = HZ;
|
|
break;
|
|
case _SC_NGROUPS_MAX:
|
|
ret = NGROUPS_MAX;
|
|
break;
|
|
case _SC_OPEN_MAX:
|
|
ret = current->signal->rlim[RLIMIT_NOFILE].rlim_cur;
|
|
break;
|
|
case _SC_JOB_CONTROL:
|
|
ret = 1; /* yes, we do support job control */
|
|
break;
|
|
case _SC_SAVED_IDS:
|
|
ret = 1; /* yes, we do support saved uids */
|
|
break;
|
|
case _SC_VERSION:
|
|
/* mhm, POSIX_VERSION is in /usr/include/unistd.h
|
|
* should it go on /usr/include/linux?
|
|
*/
|
|
ret = 199009;
|
|
break;
|
|
default:
|
|
ret = -1;
|
|
break;
|
|
};
|
|
return ret;
|
|
}
|
|
|
|
asmlinkage int sunos_semsys(int op, u32 arg1, u32 arg2, u32 arg3, void __user *ptr)
|
|
{
|
|
union semun arg4;
|
|
int ret;
|
|
|
|
switch (op) {
|
|
case 0:
|
|
/* Most arguments match on a 1:1 basis but cmd doesn't */
|
|
switch(arg3) {
|
|
case 4:
|
|
arg3=GETPID; break;
|
|
case 5:
|
|
arg3=GETVAL; break;
|
|
case 6:
|
|
arg3=GETALL; break;
|
|
case 3:
|
|
arg3=GETNCNT; break;
|
|
case 7:
|
|
arg3=GETZCNT; break;
|
|
case 8:
|
|
arg3=SETVAL; break;
|
|
case 9:
|
|
arg3=SETALL; break;
|
|
}
|
|
/* sys_semctl(): */
|
|
/* value to modify semaphore to */
|
|
arg4.__pad = ptr;
|
|
ret = sys_semctl((int)arg1, (int)arg2, (int)arg3, arg4);
|
|
break;
|
|
case 1:
|
|
/* sys_semget(): */
|
|
ret = sys_semget((key_t)arg1, (int)arg2, (int)arg3);
|
|
break;
|
|
case 2:
|
|
/* sys_semop(): */
|
|
ret = sys_semop((int)arg1, (struct sembuf __user *)(unsigned long)arg2,
|
|
(unsigned int) arg3);
|
|
break;
|
|
default:
|
|
ret = -EINVAL;
|
|
break;
|
|
};
|
|
return ret;
|
|
}
|
|
|
|
struct msgbuf32 {
|
|
s32 mtype;
|
|
char mtext[1];
|
|
};
|
|
|
|
struct ipc_perm32
|
|
{
|
|
key_t key;
|
|
compat_uid_t uid;
|
|
compat_gid_t gid;
|
|
compat_uid_t cuid;
|
|
compat_gid_t cgid;
|
|
compat_mode_t mode;
|
|
unsigned short seq;
|
|
};
|
|
|
|
struct msqid_ds32
|
|
{
|
|
struct ipc_perm32 msg_perm;
|
|
u32 msg_first;
|
|
u32 msg_last;
|
|
compat_time_t msg_stime;
|
|
compat_time_t msg_rtime;
|
|
compat_time_t msg_ctime;
|
|
u32 wwait;
|
|
u32 rwait;
|
|
unsigned short msg_cbytes;
|
|
unsigned short msg_qnum;
|
|
unsigned short msg_qbytes;
|
|
compat_ipc_pid_t msg_lspid;
|
|
compat_ipc_pid_t msg_lrpid;
|
|
};
|
|
|
|
static inline int sunos_msqid_get(struct msqid_ds32 __user *user,
|
|
struct msqid_ds *kern)
|
|
{
|
|
if (get_user(kern->msg_perm.key, &user->msg_perm.key) ||
|
|
__get_user(kern->msg_perm.uid, &user->msg_perm.uid) ||
|
|
__get_user(kern->msg_perm.gid, &user->msg_perm.gid) ||
|
|
__get_user(kern->msg_perm.cuid, &user->msg_perm.cuid) ||
|
|
__get_user(kern->msg_perm.cgid, &user->msg_perm.cgid) ||
|
|
__get_user(kern->msg_stime, &user->msg_stime) ||
|
|
__get_user(kern->msg_rtime, &user->msg_rtime) ||
|
|
__get_user(kern->msg_ctime, &user->msg_ctime) ||
|
|
__get_user(kern->msg_ctime, &user->msg_cbytes) ||
|
|
__get_user(kern->msg_ctime, &user->msg_qnum) ||
|
|
__get_user(kern->msg_ctime, &user->msg_qbytes) ||
|
|
__get_user(kern->msg_ctime, &user->msg_lspid) ||
|
|
__get_user(kern->msg_ctime, &user->msg_lrpid))
|
|
return -EFAULT;
|
|
return 0;
|
|
}
|
|
|
|
static inline int sunos_msqid_put(struct msqid_ds32 __user *user,
|
|
struct msqid_ds *kern)
|
|
{
|
|
if (put_user(kern->msg_perm.key, &user->msg_perm.key) ||
|
|
__put_user(kern->msg_perm.uid, &user->msg_perm.uid) ||
|
|
__put_user(kern->msg_perm.gid, &user->msg_perm.gid) ||
|
|
__put_user(kern->msg_perm.cuid, &user->msg_perm.cuid) ||
|
|
__put_user(kern->msg_perm.cgid, &user->msg_perm.cgid) ||
|
|
__put_user(kern->msg_stime, &user->msg_stime) ||
|
|
__put_user(kern->msg_rtime, &user->msg_rtime) ||
|
|
__put_user(kern->msg_ctime, &user->msg_ctime) ||
|
|
__put_user(kern->msg_ctime, &user->msg_cbytes) ||
|
|
__put_user(kern->msg_ctime, &user->msg_qnum) ||
|
|
__put_user(kern->msg_ctime, &user->msg_qbytes) ||
|
|
__put_user(kern->msg_ctime, &user->msg_lspid) ||
|
|
__put_user(kern->msg_ctime, &user->msg_lrpid))
|
|
return -EFAULT;
|
|
return 0;
|
|
}
|
|
|
|
static inline int sunos_msgbuf_get(struct msgbuf32 __user *user, struct msgbuf *kern, int len)
|
|
{
|
|
if (get_user(kern->mtype, &user->mtype) ||
|
|
__copy_from_user(kern->mtext, &user->mtext, len))
|
|
return -EFAULT;
|
|
return 0;
|
|
}
|
|
|
|
static inline int sunos_msgbuf_put(struct msgbuf32 __user *user, struct msgbuf *kern, int len)
|
|
{
|
|
if (put_user(kern->mtype, &user->mtype) ||
|
|
__copy_to_user(user->mtext, kern->mtext, len))
|
|
return -EFAULT;
|
|
return 0;
|
|
}
|
|
|
|
asmlinkage int sunos_msgsys(int op, u32 arg1, u32 arg2, u32 arg3, u32 arg4)
|
|
{
|
|
struct sparc_stackf32 __user *sp;
|
|
struct msqid_ds kds;
|
|
struct msgbuf *kmbuf;
|
|
mm_segment_t old_fs = get_fs();
|
|
u32 arg5;
|
|
int rval;
|
|
|
|
switch(op) {
|
|
case 0:
|
|
rval = sys_msgget((key_t)arg1, (int)arg2);
|
|
break;
|
|
case 1:
|
|
if (!sunos_msqid_get((struct msqid_ds32 __user *)(unsigned long)arg3, &kds)) {
|
|
set_fs(KERNEL_DS);
|
|
rval = sys_msgctl((int)arg1, (int)arg2,
|
|
(struct msqid_ds __user *)(unsigned long)arg3);
|
|
set_fs(old_fs);
|
|
if (!rval)
|
|
rval = sunos_msqid_put((struct msqid_ds32 __user *)(unsigned long)arg3,
|
|
&kds);
|
|
} else
|
|
rval = -EFAULT;
|
|
break;
|
|
case 2:
|
|
rval = -EFAULT;
|
|
kmbuf = kmalloc(sizeof(struct msgbuf) + arg3,
|
|
GFP_KERNEL);
|
|
if (!kmbuf)
|
|
break;
|
|
sp = (struct sparc_stackf32 __user *)
|
|
(current_thread_info()->kregs->u_regs[UREG_FP] & 0xffffffffUL);
|
|
if (get_user(arg5, &sp->xxargs[0])) {
|
|
rval = -EFAULT;
|
|
kfree(kmbuf);
|
|
break;
|
|
}
|
|
set_fs(KERNEL_DS);
|
|
rval = sys_msgrcv((int)arg1, (struct msgbuf __user *) kmbuf,
|
|
(size_t)arg3,
|
|
(long)arg4, (int)arg5);
|
|
set_fs(old_fs);
|
|
if (!rval)
|
|
rval = sunos_msgbuf_put((struct msgbuf32 __user *)(unsigned long)arg2,
|
|
kmbuf, arg3);
|
|
kfree(kmbuf);
|
|
break;
|
|
case 3:
|
|
rval = -EFAULT;
|
|
kmbuf = kmalloc(sizeof(struct msgbuf) + arg3,
|
|
GFP_KERNEL);
|
|
if (!kmbuf || sunos_msgbuf_get((struct msgbuf32 __user *)(unsigned long)arg2,
|
|
kmbuf, arg3))
|
|
break;
|
|
set_fs(KERNEL_DS);
|
|
rval = sys_msgsnd((int)arg1, (struct msgbuf __user *) kmbuf,
|
|
(size_t)arg3, (int)arg4);
|
|
set_fs(old_fs);
|
|
kfree(kmbuf);
|
|
break;
|
|
default:
|
|
rval = -EINVAL;
|
|
break;
|
|
}
|
|
return rval;
|
|
}
|
|
|
|
struct shmid_ds32 {
|
|
struct ipc_perm32 shm_perm;
|
|
int shm_segsz;
|
|
compat_time_t shm_atime;
|
|
compat_time_t shm_dtime;
|
|
compat_time_t shm_ctime;
|
|
compat_ipc_pid_t shm_cpid;
|
|
compat_ipc_pid_t shm_lpid;
|
|
unsigned short shm_nattch;
|
|
};
|
|
|
|
static inline int sunos_shmid_get(struct shmid_ds32 __user *user,
|
|
struct shmid_ds *kern)
|
|
{
|
|
if (get_user(kern->shm_perm.key, &user->shm_perm.key) ||
|
|
__get_user(kern->shm_perm.uid, &user->shm_perm.uid) ||
|
|
__get_user(kern->shm_perm.gid, &user->shm_perm.gid) ||
|
|
__get_user(kern->shm_perm.cuid, &user->shm_perm.cuid) ||
|
|
__get_user(kern->shm_perm.cgid, &user->shm_perm.cgid) ||
|
|
__get_user(kern->shm_segsz, &user->shm_segsz) ||
|
|
__get_user(kern->shm_atime, &user->shm_atime) ||
|
|
__get_user(kern->shm_dtime, &user->shm_dtime) ||
|
|
__get_user(kern->shm_ctime, &user->shm_ctime) ||
|
|
__get_user(kern->shm_cpid, &user->shm_cpid) ||
|
|
__get_user(kern->shm_lpid, &user->shm_lpid) ||
|
|
__get_user(kern->shm_nattch, &user->shm_nattch))
|
|
return -EFAULT;
|
|
return 0;
|
|
}
|
|
|
|
static inline int sunos_shmid_put(struct shmid_ds32 __user *user,
|
|
struct shmid_ds *kern)
|
|
{
|
|
if (put_user(kern->shm_perm.key, &user->shm_perm.key) ||
|
|
__put_user(kern->shm_perm.uid, &user->shm_perm.uid) ||
|
|
__put_user(kern->shm_perm.gid, &user->shm_perm.gid) ||
|
|
__put_user(kern->shm_perm.cuid, &user->shm_perm.cuid) ||
|
|
__put_user(kern->shm_perm.cgid, &user->shm_perm.cgid) ||
|
|
__put_user(kern->shm_segsz, &user->shm_segsz) ||
|
|
__put_user(kern->shm_atime, &user->shm_atime) ||
|
|
__put_user(kern->shm_dtime, &user->shm_dtime) ||
|
|
__put_user(kern->shm_ctime, &user->shm_ctime) ||
|
|
__put_user(kern->shm_cpid, &user->shm_cpid) ||
|
|
__put_user(kern->shm_lpid, &user->shm_lpid) ||
|
|
__put_user(kern->shm_nattch, &user->shm_nattch))
|
|
return -EFAULT;
|
|
return 0;
|
|
}
|
|
|
|
asmlinkage int sunos_shmsys(int op, u32 arg1, u32 arg2, u32 arg3)
|
|
{
|
|
struct shmid_ds ksds;
|
|
unsigned long raddr;
|
|
mm_segment_t old_fs = get_fs();
|
|
int rval;
|
|
|
|
switch(op) {
|
|
case 0:
|
|
/* do_shmat(): attach a shared memory area */
|
|
rval = do_shmat((int)arg1,(char __user *)(unsigned long)arg2,(int)arg3,&raddr);
|
|
if (!rval)
|
|
rval = (int) raddr;
|
|
break;
|
|
case 1:
|
|
/* sys_shmctl(): modify shared memory area attr. */
|
|
if (!sunos_shmid_get((struct shmid_ds32 __user *)(unsigned long)arg3, &ksds)) {
|
|
set_fs(KERNEL_DS);
|
|
rval = sys_shmctl((int) arg1,(int) arg2,
|
|
(struct shmid_ds __user *) &ksds);
|
|
set_fs(old_fs);
|
|
if (!rval)
|
|
rval = sunos_shmid_put((struct shmid_ds32 __user *)(unsigned long)arg3,
|
|
&ksds);
|
|
} else
|
|
rval = -EFAULT;
|
|
break;
|
|
case 2:
|
|
/* sys_shmdt(): detach a shared memory area */
|
|
rval = sys_shmdt((char __user *)(unsigned long)arg1);
|
|
break;
|
|
case 3:
|
|
/* sys_shmget(): get a shared memory area */
|
|
rval = sys_shmget((key_t)arg1,(int)arg2,(int)arg3);
|
|
break;
|
|
default:
|
|
rval = -EINVAL;
|
|
break;
|
|
};
|
|
return rval;
|
|
}
|
|
|
|
extern asmlinkage long sparc32_open(const char __user * filename, int flags, int mode);
|
|
|
|
asmlinkage int sunos_open(u32 fname, int flags, int mode)
|
|
{
|
|
const char __user *filename = compat_ptr(fname);
|
|
|
|
return sparc32_open(filename, flags, mode);
|
|
}
|
|
|
|
#define SUNOS_EWOULDBLOCK 35
|
|
|
|
/* see the sunos man page read(2v) for an explanation
|
|
of this garbage. We use O_NDELAY to mark
|
|
file descriptors that have been set non-blocking
|
|
using 4.2BSD style calls. (tridge) */
|
|
|
|
static inline int check_nonblock(int ret, int fd)
|
|
{
|
|
if (ret == -EAGAIN) {
|
|
struct file * file = fget(fd);
|
|
if (file) {
|
|
if (file->f_flags & O_NDELAY)
|
|
ret = -SUNOS_EWOULDBLOCK;
|
|
fput(file);
|
|
}
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
asmlinkage int sunos_read(unsigned int fd, char __user *buf, u32 count)
|
|
{
|
|
int ret;
|
|
|
|
ret = check_nonblock(sys_read(fd, buf, count), fd);
|
|
return ret;
|
|
}
|
|
|
|
asmlinkage int sunos_readv(u32 fd, void __user *vector, s32 count)
|
|
{
|
|
int ret;
|
|
|
|
ret = check_nonblock(compat_sys_readv(fd, vector, count), fd);
|
|
return ret;
|
|
}
|
|
|
|
asmlinkage int sunos_write(unsigned int fd, char __user *buf, u32 count)
|
|
{
|
|
int ret;
|
|
|
|
ret = check_nonblock(sys_write(fd, buf, count), fd);
|
|
return ret;
|
|
}
|
|
|
|
asmlinkage int sunos_writev(u32 fd, void __user *vector, s32 count)
|
|
{
|
|
int ret;
|
|
|
|
ret = check_nonblock(compat_sys_writev(fd, vector, count), fd);
|
|
return ret;
|
|
}
|
|
|
|
asmlinkage int sunos_recv(u32 __fd, void __user *ubuf, int size, unsigned flags)
|
|
{
|
|
int ret, fd = (int) __fd;
|
|
|
|
ret = check_nonblock(sys_recv(fd, ubuf, size, flags), fd);
|
|
return ret;
|
|
}
|
|
|
|
asmlinkage int sunos_send(u32 __fd, void __user *buff, int len, unsigned flags)
|
|
{
|
|
int ret, fd = (int) __fd;
|
|
|
|
ret = check_nonblock(sys_send(fd, buff, len, flags), fd);
|
|
return ret;
|
|
}
|
|
|
|
asmlinkage int sunos_accept(u32 __fd, struct sockaddr __user *sa, int __user *addrlen)
|
|
{
|
|
int ret, fd = (int) __fd;
|
|
|
|
while (1) {
|
|
ret = check_nonblock(sys_accept(fd, sa, addrlen), fd);
|
|
if (ret != -ENETUNREACH && ret != -EHOSTUNREACH)
|
|
break;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
#define SUNOS_SV_INTERRUPT 2
|
|
|
|
asmlinkage int sunos_sigaction (int sig,
|
|
struct old_sigaction32 __user *act,
|
|
struct old_sigaction32 __user *oact)
|
|
{
|
|
struct k_sigaction new_ka, old_ka;
|
|
int ret;
|
|
|
|
if (act) {
|
|
compat_old_sigset_t mask;
|
|
u32 u_handler;
|
|
|
|
if (get_user(u_handler, &act->sa_handler) ||
|
|
__get_user(new_ka.sa.sa_flags, &act->sa_flags))
|
|
return -EFAULT;
|
|
new_ka.sa.sa_handler = compat_ptr(u_handler);
|
|
__get_user(mask, &act->sa_mask);
|
|
new_ka.sa.sa_restorer = NULL;
|
|
new_ka.ka_restorer = NULL;
|
|
siginitset(&new_ka.sa.sa_mask, mask);
|
|
new_ka.sa.sa_flags ^= SUNOS_SV_INTERRUPT;
|
|
}
|
|
|
|
ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
|
|
|
|
if (!ret && oact) {
|
|
old_ka.sa.sa_flags ^= SUNOS_SV_INTERRUPT;
|
|
if (put_user(ptr_to_compat(old_ka.sa.sa_handler), &oact->sa_handler) ||
|
|
__put_user(old_ka.sa.sa_flags, &oact->sa_flags))
|
|
return -EFAULT;
|
|
__put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
asmlinkage int sunos_setsockopt(u32 __fd, u32 __level, u32 __optname,
|
|
char __user *optval, u32 __optlen)
|
|
{
|
|
int fd = (int) __fd;
|
|
int level = (int) __level;
|
|
int optname = (int) __optname;
|
|
int optlen = (int) __optlen;
|
|
int tr_opt = optname;
|
|
int ret;
|
|
|
|
if (level == SOL_IP) {
|
|
/* Multicast socketopts (ttl, membership) */
|
|
if (tr_opt >=2 && tr_opt <= 6)
|
|
tr_opt += 30;
|
|
}
|
|
ret = sys_setsockopt(fd, level, tr_opt,
|
|
optval, optlen);
|
|
return ret;
|
|
}
|
|
|
|
asmlinkage int sunos_getsockopt(u32 __fd, u32 __level, u32 __optname,
|
|
char __user *optval, int __user *optlen)
|
|
{
|
|
int fd = (int) __fd;
|
|
int level = (int) __level;
|
|
int optname = (int) __optname;
|
|
int tr_opt = optname;
|
|
int ret;
|
|
|
|
if (level == SOL_IP) {
|
|
/* Multicast socketopts (ttl, membership) */
|
|
if (tr_opt >=2 && tr_opt <= 6)
|
|
tr_opt += 30;
|
|
}
|
|
ret = compat_sys_getsockopt(fd, level, tr_opt,
|
|
optval, optlen);
|
|
return ret;
|
|
}
|