| /* $Id: sys_sunos32.c,v 1.64 2002/02/09 19:49:31 davem Exp $ |
| * sys_sunos32.c: SunOS binary compatibility layer on sparc64. |
| * |
| * Copyright (C) 1995, 1996, 1997 David S. Miller (davem@caip.rutgers.edu) |
| * Copyright (C) 1995 Miguel de Icaza (miguel@nuclecu.unam.mx) |
| * |
| * Based upon preliminary work which is: |
| * |
| * Copyright (C) 1995 Adrian M. Rodriguez (adrian@remus.rutgers.edu) |
| */ |
| |
| #include <linux/kernel.h> |
| #include <linux/sched.h> |
| #include <linux/types.h> |
| #include <linux/capability.h> |
| #include <linux/compat.h> |
| #include <linux/mman.h> |
| #include <linux/mm.h> |
| #include <linux/swap.h> |
| #include <linux/fs.h> |
| #include <linux/file.h> |
| #include <linux/resource.h> |
| #include <linux/ipc.h> |
| #include <linux/shm.h> |
| #include <linux/msg.h> |
| #include <linux/sem.h> |
| #include <linux/signal.h> |
| #include <linux/uio.h> |
| #include <linux/utsname.h> |
| #include <linux/major.h> |
| #include <linux/stat.h> |
| #include <linux/slab.h> |
| #include <linux/pagemap.h> |
| #include <linux/errno.h> |
| #include <linux/smp.h> |
| #include <linux/smp_lock.h> |
| #include <linux/syscalls.h> |
| |
| #include <asm/uaccess.h> |
| #include <asm/page.h> |
| #include <asm/pgtable.h> |
| #include <asm/pconf.h> |
| #include <asm/idprom.h> /* for gethostid() */ |
| #include <asm/unistd.h> |
| #include <asm/system.h> |
| #include <asm/compat_signal.h> |
| |
| /* For the nfs mount emulation */ |
| #include <linux/socket.h> |
| #include <linux/in.h> |
| #include <linux/nfs.h> |
| #include <linux/nfs2.h> |
| #include <linux/nfs_mount.h> |
| |
| /* for sunos_select */ |
| #include <linux/time.h> |
| #include <linux/personality.h> |
| |
| /* For SOCKET_I */ |
| #include <net/sock.h> |
| #include <net/compat.h> |
| |
| #define SUNOS_NR_OPEN 256 |
| |
| asmlinkage u32 sunos_mmap(u32 addr, u32 len, u32 prot, u32 flags, u32 fd, u32 off) |
| { |
| struct file *file = NULL; |
| unsigned long retval, ret_type; |
| |
| if (flags & MAP_NORESERVE) { |
| static int cnt; |
| if (cnt++ < 10) |
| printk("%s: unimplemented SunOS MAP_NORESERVE mmap() flag\n", |
| current->comm); |
| flags &= ~MAP_NORESERVE; |
| } |
| retval = -EBADF; |
| if (!(flags & MAP_ANONYMOUS)) { |
| struct inode * inode; |
| if (fd >= SUNOS_NR_OPEN) |
| goto out; |
| file = fget(fd); |
| if (!file) |
| goto out; |
| inode = file->f_path.dentry->d_inode; |
| if (imajor(inode) == MEM_MAJOR && iminor(inode) == 5) { |
| flags |= MAP_ANONYMOUS; |
| fput(file); |
| file = NULL; |
| } |
| } |
| |
| retval = -EINVAL; |
| if (!(flags & MAP_FIXED)) |
| addr = 0; |
| else if (len > 0xf0000000 || addr > 0xf0000000 - len) |
| goto out_putf; |
| ret_type = flags & _MAP_NEW; |
| flags &= ~_MAP_NEW; |
| |
| flags &= ~(MAP_EXECUTABLE | MAP_DENYWRITE); |
| down_write(¤t->mm->mmap_sem); |
| retval = do_mmap(file, |
| (unsigned long) addr, (unsigned long) len, |
| (unsigned long) prot, (unsigned long) flags, |
| (unsigned long) off); |
| up_write(¤t->mm->mmap_sem); |
| if (!ret_type) |
| retval = ((retval < 0xf0000000) ? 0 : retval); |
| out_putf: |
| if (file) |
| fput(file); |
| out: |
| return (u32) retval; |
| } |
| |
| asmlinkage int sunos_mctl(u32 addr, u32 len, int function, u32 arg) |
| { |
| return 0; |
| } |
| |
| asmlinkage int sunos_brk(u32 baddr) |
| { |
| int freepages, retval = -ENOMEM; |
| unsigned long rlim; |
| unsigned long newbrk, oldbrk, brk = (unsigned long) baddr; |
| |
| down_write(¤t->mm->mmap_sem); |
| if (brk < current->mm->end_code) |
| goto out; |
| newbrk = PAGE_ALIGN(brk); |
| oldbrk = PAGE_ALIGN(current->mm->brk); |
| retval = 0; |
| if (oldbrk == newbrk) { |
| current->mm->brk = brk; |
| goto out; |
| } |
| /* Always allow shrinking brk. */ |
| if (brk <= current->mm->brk) { |
| current->mm->brk = brk; |
| do_munmap(current->mm, newbrk, oldbrk-newbrk); |
| goto out; |
| } |
| /* Check against rlimit and stack.. */ |
| retval = -ENOMEM; |
| rlim = current->signal->rlim[RLIMIT_DATA].rlim_cur; |
| if (rlim >= RLIM_INFINITY) |
| rlim = ~0; |
| if (brk - current->mm->end_code > rlim) |
| goto out; |
| /* Check against existing mmap mappings. */ |
| if (find_vma_intersection(current->mm, oldbrk, newbrk+PAGE_SIZE)) |
| goto out; |
| /* stupid algorithm to decide if we have enough memory: while |
| * simple, it hopefully works in most obvious cases.. Easy to |
| * fool it, but this should catch most mistakes. |
| */ |
| freepages = global_page_state(NR_FILE_PAGES); |
| freepages >>= 1; |
| freepages += nr_free_pages(); |
| freepages += nr_swap_pages; |
| freepages -= num_physpages >> 4; |
| freepages -= (newbrk-oldbrk) >> PAGE_SHIFT; |
| if (freepages < 0) |
| goto out; |
| /* Ok, we have probably got enough memory - let it rip. */ |
| current->mm->brk = brk; |
| do_brk(oldbrk, newbrk-oldbrk); |
| retval = 0; |
| out: |
| up_write(¤t->mm->mmap_sem); |
| return retval; |
| } |
| |
| asmlinkage u32 sunos_sbrk(int increment) |
| { |
| int error, oldbrk; |
| |
| /* This should do it hopefully... */ |
| oldbrk = (int)current->mm->brk; |
| error = sunos_brk(((int) current->mm->brk) + increment); |
| if (!error) |
| error = oldbrk; |
| return error; |
| } |
| |
| asmlinkage u32 sunos_sstk(int increment) |
| { |
| printk("%s: Call to sunos_sstk(increment<%d>) is unsupported\n", |
| current->comm, increment); |
| |
| return (u32)-1; |
| } |
| |
| /* Give hints to the kernel as to what paging strategy to use... |
| * Completely bogus, don't remind me. |
| */ |
| #define VA_NORMAL 0 /* Normal vm usage expected */ |
| #define VA_ABNORMAL 1 /* Abnormal/random vm usage probable */ |
| #define VA_SEQUENTIAL 2 /* Accesses will be of a sequential nature */ |
| #define VA_INVALIDATE 3 /* Page table entries should be flushed ??? */ |
| static char *vstrings[] = { |
| "VA_NORMAL", |
| "VA_ABNORMAL", |
| "VA_SEQUENTIAL", |
| "VA_INVALIDATE", |
| }; |
| |
| asmlinkage void sunos_vadvise(u32 strategy) |
| { |
| static int count; |
| |
| /* I wanna see who uses this... */ |
| if (count++ < 5) |
| printk("%s: Advises us to use %s paging strategy\n", |
| current->comm, |
| strategy <= 3 ? vstrings[strategy] : "BOGUS"); |
| } |
| |
| /* This just wants the soft limit (ie. rlim_cur element) of the RLIMIT_NOFILE |
| * resource limit and is for backwards compatibility with older sunos |
| * revs. |
| */ |
| asmlinkage int sunos_getdtablesize(void) |
| { |
| return SUNOS_NR_OPEN; |
| } |
| |
| |
| #define _BLOCKABLE (~(sigmask(SIGKILL) | sigmask(SIGSTOP))) |
| |
| asmlinkage u32 sunos_sigblock(u32 blk_mask) |
| { |
| u32 old; |
| |
| spin_lock_irq(¤t->sighand->siglock); |
| old = (u32) current->blocked.sig[0]; |
| current->blocked.sig[0] |= (blk_mask & _BLOCKABLE); |
| recalc_sigpending(); |
| spin_unlock_irq(¤t->sighand->siglock); |
| return old; |
| } |
| |
| asmlinkage u32 sunos_sigsetmask(u32 newmask) |
| { |
| u32 retval; |
| |
| spin_lock_irq(¤t->sighand->siglock); |
| retval = (u32) current->blocked.sig[0]; |
| current->blocked.sig[0] = (newmask & _BLOCKABLE); |
| recalc_sigpending(); |
| spin_unlock_irq(¤t->sighand->siglock); |
| return retval; |
| } |
| |
| /* SunOS getdents is very similar to the newer Linux (iBCS2 compliant) */ |
| /* getdents system call, the format of the structure just has a different */ |
| /* layout (d_off+d_ino instead of d_ino+d_off) */ |
| struct sunos_dirent { |
| s32 d_off; |
| u32 d_ino; |
| u16 d_reclen; |
| u16 d_namlen; |
| char d_name[1]; |
| }; |
| |
| struct sunos_dirent_callback { |
| struct sunos_dirent __user *curr; |
| struct sunos_dirent __user *previous; |
| int count; |
| int error; |
| }; |
| |
| #define NAME_OFFSET(de) ((int) ((de)->d_name - (char __user *) (de))) |
| #define ROUND_UP(x) (((x)+sizeof(s32)-1) & ~(sizeof(s32)-1)) |
| |
| static int sunos_filldir(void * __buf, const char * name, int namlen, |
| loff_t offset, ino_t ino, unsigned int d_type) |
| { |
| struct sunos_dirent __user *dirent; |
| struct sunos_dirent_callback * buf = (struct sunos_dirent_callback *) __buf; |
| int reclen = ROUND_UP(NAME_OFFSET(dirent) + namlen + 1); |
| u32 d_ino; |
| |
| buf->error = -EINVAL; /* only used if we fail.. */ |
| if (reclen > buf->count) |
| return -EINVAL; |
| d_ino = ino; |
| if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) |
| return -EOVERFLOW; |
| dirent = buf->previous; |
| if (dirent) |
| put_user(offset, &dirent->d_off); |
| dirent = buf->curr; |
| buf->previous = dirent; |
| put_user(d_ino, &dirent->d_ino); |
| put_user(namlen, &dirent->d_namlen); |
| put_user(reclen, &dirent->d_reclen); |
| if (copy_to_user(dirent->d_name, name, namlen)) |
| return -EFAULT; |
| put_user(0, dirent->d_name + namlen); |
| dirent = (void __user *) dirent + reclen; |
| buf->curr = dirent; |
| buf->count -= reclen; |
| return 0; |
| } |
| |
| asmlinkage int sunos_getdents(unsigned int fd, void __user *dirent, int cnt) |
| { |
| struct file * file; |
| struct sunos_dirent __user *lastdirent; |
| struct sunos_dirent_callback buf; |
| int error = -EBADF; |
| |
| if (fd >= SUNOS_NR_OPEN) |
| goto out; |
| |
| file = fget(fd); |
| if (!file) |
| goto out; |
| |
| error = -EINVAL; |
| if (cnt < (sizeof(struct sunos_dirent) + 255)) |
| goto out_putf; |
| |
| buf.curr = (struct sunos_dirent __user *) dirent; |
| buf.previous = NULL; |
| buf.count = cnt; |
| buf.error = 0; |
| |
| error = vfs_readdir(file, sunos_filldir, &buf); |
| if (error < 0) |
| goto out_putf; |
| |
| lastdirent = buf.previous; |
| error = buf.error; |
| if (lastdirent) { |
| put_user(file->f_pos, &lastdirent->d_off); |
| error = cnt - buf.count; |
| } |
| |
| out_putf: |
| fput(file); |
| out: |
| return error; |
| } |
| |
| /* Old sunos getdirentries, severely broken compatibility stuff here. */ |
| struct sunos_direntry { |
| u32 d_ino; |
| u16 d_reclen; |
| u16 d_namlen; |
| char d_name[1]; |
| }; |
| |
| struct sunos_direntry_callback { |
| struct sunos_direntry __user *curr; |
| struct sunos_direntry __user *previous; |
| int count; |
| int error; |
| }; |
| |
| static int sunos_filldirentry(void * __buf, const char * name, int namlen, |
| loff_t offset, ino_t ino, unsigned int d_type) |
| { |
| struct sunos_direntry __user *dirent; |
| struct sunos_direntry_callback * buf = |
| (struct sunos_direntry_callback *) __buf; |
| int reclen = ROUND_UP(NAME_OFFSET(dirent) + namlen + 1); |
| u32 d_ino; |
| |
| buf->error = -EINVAL; /* only used if we fail.. */ |
| if (reclen > buf->count) |
| return -EINVAL; |
| d_ino = ino; |
| if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) |
| return -EOVERFLOW; |
| dirent = buf->previous; |
| dirent = buf->curr; |
| buf->previous = dirent; |
| put_user(d_ino, &dirent->d_ino); |
| put_user(namlen, &dirent->d_namlen); |
| put_user(reclen, &dirent->d_reclen); |
| if (copy_to_user(dirent->d_name, name, namlen)) |
| return -EFAULT; |
| put_user(0, dirent->d_name + namlen); |
| dirent = (void __user *) dirent + reclen; |
| buf->curr = dirent; |
| buf->count -= reclen; |
| return 0; |
| } |
| |
| asmlinkage int sunos_getdirentries(unsigned int fd, |
| void __user *dirent, |
| int cnt, |
| unsigned int __user *basep) |
| { |
| struct file * file; |
| struct sunos_direntry __user *lastdirent; |
| int error = -EBADF; |
| struct sunos_direntry_callback buf; |
| |
| if (fd >= SUNOS_NR_OPEN) |
| goto out; |
| |
| file = fget(fd); |
| if (!file) |
| goto out; |
| |
| error = -EINVAL; |
| if (cnt < (sizeof(struct sunos_direntry) + 255)) |
| goto out_putf; |
| |
| buf.curr = (struct sunos_direntry __user *) dirent; |
| buf.previous = NULL; |
| buf.count = cnt; |
| buf.error = 0; |
| |
| error = vfs_readdir(file, sunos_filldirentry, &buf); |
| if (error < 0) |
| goto out_putf; |
| |
| lastdirent = buf.previous; |
| error = buf.error; |
| if (lastdirent) { |
| put_user(file->f_pos, basep); |
| error = cnt - buf.count; |
| } |
| |
| out_putf: |
| fput(file); |
| out: |
| return error; |
| } |
| |
| struct sunos_utsname { |
| char sname[9]; |
| char nname[9]; |
| char nnext[56]; |
| char rel[9]; |
| char ver[9]; |
| char mach[9]; |
| }; |
| |
| asmlinkage int sunos_uname(struct sunos_utsname __user *name) |
| { |
| int ret; |
| |
| down_read(&uts_sem); |
| ret = copy_to_user(&name->sname[0], &utsname()->sysname[0], |
| sizeof(name->sname) - 1); |
| ret |= copy_to_user(&name->nname[0], &utsname()->nodename[0], |
| sizeof(name->nname) - 1); |
| ret |= put_user('\0', &name->nname[8]); |
| ret |= copy_to_user(&name->rel[0], &utsname()->release[0], |
| sizeof(name->rel) - 1); |
| ret |= copy_to_user(&name->ver[0], &utsname()->version[0], |
| sizeof(name->ver) - 1); |
| ret |= copy_to_user(&name->mach[0], &utsname()->machine[0], |
| sizeof(name->mach) - 1); |
| up_read(&uts_sem); |
| return (ret ? -EFAULT : 0); |
| } |
| |
| asmlinkage int sunos_nosys(void) |
| { |
| struct pt_regs *regs; |
| siginfo_t info; |
| static int cnt; |
| |
| regs = current_thread_info()->kregs; |
| if (test_thread_flag(TIF_32BIT)) { |
| regs->tpc &= 0xffffffff; |
| regs->tnpc &= 0xffffffff; |
| } |
| info.si_signo = SIGSYS; |
| info.si_errno = 0; |
| info.si_code = __SI_FAULT|0x100; |
| info.si_addr = (void __user *)regs->tpc; |
| info.si_trapno = regs->u_regs[UREG_G1]; |
| send_sig_info(SIGSYS, &info, current); |
| if (cnt++ < 4) { |
| printk("Process makes ni_syscall number %d, register dump:\n", |
| (int) regs->u_regs[UREG_G1]); |
| show_regs(regs); |
| } |
| return -ENOSYS; |
| } |
| |
| /* This is not a real and complete implementation yet, just to keep |
| * the easy SunOS binaries happy. |
| */ |
| asmlinkage int sunos_fpathconf(int fd, int name) |
| { |
| int ret; |
| |
| switch(name) { |
| case _PCONF_LINK: |
| ret = LINK_MAX; |
| break; |
| case _PCONF_CANON: |
| ret = MAX_CANON; |
| break; |
| case _PCONF_INPUT: |
| ret = MAX_INPUT; |
| break; |
| case _PCONF_NAME: |
| ret = NAME_MAX; |
| break; |
| case _PCONF_PATH: |
| ret = PATH_MAX; |
| break; |
| case _PCONF_PIPE: |
| ret = PIPE_BUF; |
| break; |
| case _PCONF_CHRESTRICT: /* XXX Investigate XXX */ |
| ret = 1; |
| break; |
| case _PCONF_NOTRUNC: /* XXX Investigate XXX */ |
| case _PCONF_VDISABLE: |
| ret = 0; |
| break; |
| default: |
| ret = -EINVAL; |
| break; |
| } |
| return ret; |
| } |
| |
| asmlinkage int sunos_pathconf(u32 u_path, int name) |
| { |
| int ret; |
| |
| ret = sunos_fpathconf(0, name); /* XXX cheese XXX */ |
| return ret; |
| } |
| |
| asmlinkage int sunos_select(int width, u32 inp, u32 outp, u32 exp, u32 tvp_x) |
| { |
| int ret; |
| |
| /* SunOS binaries expect that select won't change the tvp contents */ |
| ret = compat_sys_select(width, compat_ptr(inp), compat_ptr(outp), |
| compat_ptr(exp), compat_ptr(tvp_x)); |
| if (ret == -EINTR && tvp_x) { |
| struct compat_timeval __user *tvp = compat_ptr(tvp_x); |
| time_t sec, usec; |
| |
| __get_user(sec, &tvp->tv_sec); |
| __get_user(usec, &tvp->tv_usec); |
| if (sec == 0 && usec == 0) |
| ret = 0; |
| } |
| return ret; |
| } |
| |
| asmlinkage void sunos_nop(void) |
| { |
| return; |
| } |
| |
| #if 0 /* This code doesn't translate user pointers correctly, |
| * disable for now. -DaveM |
| */ |
| |
| /* XXXXXXXXXX SunOS mount/umount. XXXXXXXXXXX */ |
| #define SMNT_RDONLY 1 |
| #define SMNT_NOSUID 2 |
| #define SMNT_NEWTYPE 4 |
| #define SMNT_GRPID 8 |
| #define SMNT_REMOUNT 16 |
| #define SMNT_NOSUB 32 |
| #define SMNT_MULTI 64 |
| #define SMNT_SYS5 128 |
| |
| struct sunos_fh_t { |
| char fh_data [NFS_FHSIZE]; |
| }; |
| |
| struct sunos_nfs_mount_args { |
| struct sockaddr_in *addr; /* file server address */ |
| struct nfs_fh *fh; /* File handle to be mounted */ |
| int flags; /* flags */ |
| int wsize; /* write size in bytes */ |
| int rsize; /* read size in bytes */ |
| int timeo; /* initial timeout in .1 secs */ |
| int retrans; /* times to retry send */ |
| char *hostname; /* server's hostname */ |
| int acregmin; /* attr cache file min secs */ |
| int acregmax; /* attr cache file max secs */ |
| int acdirmin; /* attr cache dir min secs */ |
| int acdirmax; /* attr cache dir max secs */ |
| char *netname; /* server's netname */ |
| }; |
| |
| |
| /* Bind the socket on a local reserved port and connect it to the |
| * remote server. This on Linux/i386 is done by the mount program, |
| * not by the kernel. |
| */ |
| /* XXXXXXXXXXXXXXXXXXXX */ |
| static int |
| sunos_nfs_get_server_fd (int fd, struct sockaddr_in *addr) |
| { |
| struct sockaddr_in local; |
| struct sockaddr_in server; |
| int try_port; |
| int ret; |
| struct socket *socket; |
| struct inode *inode; |
| struct file *file; |
| |
| file = fget(fd); |
| if (!file) |
| return 0; |
| |
| inode = file->f_path.dentry->d_inode; |
| |
| socket = SOCKET_I(inode); |
| local.sin_family = AF_INET; |
| local.sin_addr.s_addr = INADDR_ANY; |
| |
| /* IPPORT_RESERVED = 1024, can't find the definition in the kernel */ |
| try_port = 1024; |
| do { |
| local.sin_port = htons (--try_port); |
| ret = socket->ops->bind(socket, (struct sockaddr*)&local, |
| sizeof(local)); |
| } while (ret && try_port > (1024 / 2)); |
| |
| if (ret) { |
| fput(file); |
| return 0; |
| } |
| |
| server.sin_family = AF_INET; |
| server.sin_addr = addr->sin_addr; |
| server.sin_port = NFS_PORT; |
| |
| /* Call sys_connect */ |
| ret = socket->ops->connect (socket, (struct sockaddr *) &server, |
| sizeof (server), file->f_flags); |
| fput(file); |
| if (ret < 0) |
| return 0; |
| return 1; |
| } |
| |
| /* XXXXXXXXXXXXXXXXXXXX */ |
| static int get_default (int value, int def_value) |
| { |
| if (value) |
| return value; |
| else |
| return def_value; |
| } |
| |
| /* XXXXXXXXXXXXXXXXXXXX */ |
| static int sunos_nfs_mount(char *dir_name, int linux_flags, void __user *data) |
| { |
| int server_fd, err; |
| char *the_name, *mount_page; |
| struct nfs_mount_data linux_nfs_mount; |
| struct sunos_nfs_mount_args sunos_mount; |
| |
| /* Ok, here comes the fun part: Linux's nfs mount needs a |
| * socket connection to the server, but SunOS mount does not |
| * require this, so we use the information on the destination |
| * address to create a socket and bind it to a reserved |
| * port on this system |
| */ |
| if (copy_from_user(&sunos_mount, data, sizeof(sunos_mount))) |
| return -EFAULT; |
| |
| server_fd = sys_socket (AF_INET, SOCK_DGRAM, IPPROTO_UDP); |
| if (server_fd < 0) |
| return -ENXIO; |
| |
| if (copy_from_user(&linux_nfs_mount.addr, sunos_mount.addr, |
| sizeof(*sunos_mount.addr)) || |
| copy_from_user(&linux_nfs_mount.root, sunos_mount.fh, |
| sizeof(*sunos_mount.fh))) { |
| sys_close (server_fd); |
| return -EFAULT; |
| } |
| |
| if (!sunos_nfs_get_server_fd (server_fd, &linux_nfs_mount.addr)){ |
| sys_close (server_fd); |
| return -ENXIO; |
| } |
| |
| /* Now, bind it to a locally reserved port */ |
| linux_nfs_mount.version = NFS_MOUNT_VERSION; |
| linux_nfs_mount.flags = sunos_mount.flags; |
| linux_nfs_mount.fd = server_fd; |
| |
| linux_nfs_mount.rsize = get_default (sunos_mount.rsize, 8192); |
| linux_nfs_mount.wsize = get_default (sunos_mount.wsize, 8192); |
| linux_nfs_mount.timeo = get_default (sunos_mount.timeo, 10); |
| linux_nfs_mount.retrans = sunos_mount.retrans; |
| |
| linux_nfs_mount.acregmin = sunos_mount.acregmin; |
| linux_nfs_mount.acregmax = sunos_mount.acregmax; |
| linux_nfs_mount.acdirmin = sunos_mount.acdirmin; |
| linux_nfs_mount.acdirmax = sunos_mount.acdirmax; |
| |
| the_name = getname(sunos_mount.hostname); |
| if (IS_ERR(the_name)) |
| return PTR_ERR(the_name); |
| |
| strlcpy(linux_nfs_mount.hostname, the_name, |
| sizeof(linux_nfs_mount.hostname)); |
| putname (the_name); |
| |
| mount_page = (char *) get_zeroed_page(GFP_KERNEL); |
| if (!mount_page) |
| return -ENOMEM; |
| |
| memcpy(mount_page, &linux_nfs_mount, sizeof(linux_nfs_mount)); |
| |
| err = do_mount("", dir_name, "nfs", linux_flags, mount_page); |
| |
| free_page((unsigned long) mount_page); |
| return err; |
| } |
| |
| /* XXXXXXXXXXXXXXXXXXXX */ |
| asmlinkage int |
| sunos_mount(char *type, char *dir, int flags, void *data) |
| { |
| int linux_flags = 0; |
| int ret = -EINVAL; |
| char *dev_fname = 0; |
| char *dir_page, *type_page; |
| |
| if (!capable (CAP_SYS_ADMIN)) |
| return -EPERM; |
| |
| /* We don't handle the integer fs type */ |
| if ((flags & SMNT_NEWTYPE) == 0) |
| goto out; |
| |
| /* Do not allow for those flags we don't support */ |
| if (flags & (SMNT_GRPID|SMNT_NOSUB|SMNT_MULTI|SMNT_SYS5)) |
| goto out; |
| |
| if (flags & SMNT_REMOUNT) |
| linux_flags |= MS_REMOUNT; |
| if (flags & SMNT_RDONLY) |
| linux_flags |= MS_RDONLY; |
| if (flags & SMNT_NOSUID) |
| linux_flags |= MS_NOSUID; |
| |
| dir_page = getname(dir); |
| ret = PTR_ERR(dir_page); |
| if (IS_ERR(dir_page)) |
| goto out; |
| |
| type_page = getname(type); |
| ret = PTR_ERR(type_page); |
| if (IS_ERR(type_page)) |
| goto out1; |
| |
| if (strcmp(type_page, "ext2") == 0) { |
| dev_fname = getname(data); |
| } else if (strcmp(type_page, "iso9660") == 0) { |
| dev_fname = getname(data); |
| } else if (strcmp(type_page, "minix") == 0) { |
| dev_fname = getname(data); |
| } else if (strcmp(type_page, "nfs") == 0) { |
| ret = sunos_nfs_mount (dir_page, flags, data); |
| goto out2; |
| } else if (strcmp(type_page, "ufs") == 0) { |
| printk("Warning: UFS filesystem mounts unsupported.\n"); |
| ret = -ENODEV; |
| goto out2; |
| } else if (strcmp(type_page, "proc")) { |
| ret = -ENODEV; |
| goto out2; |
| } |
| ret = PTR_ERR(dev_fname); |
| if (IS_ERR(dev_fname)) |
| goto out2; |
| lock_kernel(); |
| ret = do_mount(dev_fname, dir_page, type_page, linux_flags, NULL); |
| unlock_kernel(); |
| if (dev_fname) |
| putname(dev_fname); |
| out2: |
| putname(type_page); |
| out1: |
| putname(dir_page); |
| out: |
| return ret; |
| } |
| #endif |
| |
| asmlinkage int sunos_setpgrp(pid_t pid, pid_t pgid) |
| { |
| int ret; |
| |
| /* So stupid... */ |
| if ((!pid || pid == current->pid) && |
| !pgid) { |
| sys_setsid(); |
| ret = 0; |
| } else { |
| ret = sys_setpgid(pid, pgid); |
| } |
| return ret; |
| } |
| |
| /* So stupid... */ |
| extern long compat_sys_wait4(compat_pid_t, compat_uint_t __user *, int, |
| struct compat_rusage __user *); |
| |
| asmlinkage int sunos_wait4(compat_pid_t pid, compat_uint_t __user *stat_addr, int options, struct compat_rusage __user *ru) |
| { |
| int ret; |
| |
| ret = compat_sys_wait4((pid ? pid : ((compat_pid_t)-1)), |
| stat_addr, options, ru); |
| return ret; |
| } |
| |
| asmlinkage int sunos_killpg(int pgrp, int sig) |
| { |
| int ret; |
| |
| rcu_read_lock(); |
| ret = -EINVAL; |
| if (pgrp > 0) |
| ret = kill_pgrp(find_vpid(pgrp), sig, 0); |
| rcu_read_unlock(); |
| |
| return ret; |
| } |
| |
| asmlinkage int sunos_audit(void) |
| { |
| printk ("sys_audit\n"); |
| return -1; |
| } |
| |
| asmlinkage u32 sunos_gethostid(void) |
| { |
| u32 ret; |
| |
| ret = (((u32)idprom->id_machtype << 24) | ((u32)idprom->id_sernum)); |
| |
| return ret; |
| } |
| |
| /* sysconf options, for SunOS compatibility */ |
| #define _SC_ARG_MAX 1 |
| #define _SC_CHILD_MAX 2 |
| #define _SC_CLK_TCK 3 |
| #define _SC_NGROUPS_MAX 4 |
| #define _SC_OPEN_MAX 5 |
| #define _SC_JOB_CONTROL 6 |
| #define _SC_SAVED_IDS 7 |
| #define _SC_VERSION 8 |
| |
| asmlinkage s32 sunos_sysconf (int name) |
| { |
| s32 ret; |
| |
| switch (name){ |
| case _SC_ARG_MAX: |
| ret = ARG_MAX; |
| break; |
| case _SC_CHILD_MAX: |
| ret = current->signal->rlim[RLIMIT_NPROC].rlim_cur; |
| break; |
| case _SC_CLK_TCK: |
| ret = HZ; |
| break; |
| case _SC_NGROUPS_MAX: |
| ret = NGROUPS_MAX; |
| break; |
| case _SC_OPEN_MAX: |
| ret = current->signal->rlim[RLIMIT_NOFILE].rlim_cur; |
| break; |
| case _SC_JOB_CONTROL: |
| ret = 1; /* yes, we do support job control */ |
| break; |
| case _SC_SAVED_IDS: |
| ret = 1; /* yes, we do support saved uids */ |
| break; |
| case _SC_VERSION: |
| /* mhm, POSIX_VERSION is in /usr/include/unistd.h |
| * should it go on /usr/include/linux? |
| */ |
| ret = 199009; |
| break; |
| default: |
| ret = -1; |
| break; |
| }; |
| return ret; |
| } |
| |
| asmlinkage int sunos_semsys(int op, u32 arg1, u32 arg2, u32 arg3, void __user *ptr) |
| { |
| union semun arg4; |
| int ret; |
| |
| switch (op) { |
| case 0: |
| /* Most arguments match on a 1:1 basis but cmd doesn't */ |
| switch(arg3) { |
| case 4: |
| arg3=GETPID; break; |
| case 5: |
| arg3=GETVAL; break; |
| case 6: |
| arg3=GETALL; break; |
| case 3: |
| arg3=GETNCNT; break; |
| case 7: |
| arg3=GETZCNT; break; |
| case 8: |
| arg3=SETVAL; break; |
| case 9: |
| arg3=SETALL; break; |
| } |
| /* sys_semctl(): */ |
| /* value to modify semaphore to */ |
| arg4.__pad = ptr; |
| ret = sys_semctl((int)arg1, (int)arg2, (int)arg3, arg4); |
| break; |
| case 1: |
| /* sys_semget(): */ |
| ret = sys_semget((key_t)arg1, (int)arg2, (int)arg3); |
| break; |
| case 2: |
| /* sys_semop(): */ |
| ret = sys_semop((int)arg1, (struct sembuf __user *)(unsigned long)arg2, |
| (unsigned int) arg3); |
| break; |
| default: |
| ret = -EINVAL; |
| break; |
| }; |
| return ret; |
| } |
| |
| struct msgbuf32 { |
| s32 mtype; |
| char mtext[1]; |
| }; |
| |
| struct ipc_perm32 |
| { |
| key_t key; |
| compat_uid_t uid; |
| compat_gid_t gid; |
| compat_uid_t cuid; |
| compat_gid_t cgid; |
| compat_mode_t mode; |
| unsigned short seq; |
| }; |
| |
| struct msqid_ds32 |
| { |
| struct ipc_perm32 msg_perm; |
| u32 msg_first; |
| u32 msg_last; |
| compat_time_t msg_stime; |
| compat_time_t msg_rtime; |
| compat_time_t msg_ctime; |
| u32 wwait; |
| u32 rwait; |
| unsigned short msg_cbytes; |
| unsigned short msg_qnum; |
| unsigned short msg_qbytes; |
| compat_ipc_pid_t msg_lspid; |
| compat_ipc_pid_t msg_lrpid; |
| }; |
| |
| static inline int sunos_msqid_get(struct msqid_ds32 __user *user, |
| struct msqid_ds *kern) |
| { |
| if (get_user(kern->msg_perm.key, &user->msg_perm.key) || |
| __get_user(kern->msg_perm.uid, &user->msg_perm.uid) || |
| __get_user(kern->msg_perm.gid, &user->msg_perm.gid) || |
| __get_user(kern->msg_perm.cuid, &user->msg_perm.cuid) || |
| __get_user(kern->msg_perm.cgid, &user->msg_perm.cgid) || |
| __get_user(kern->msg_stime, &user->msg_stime) || |
| __get_user(kern->msg_rtime, &user->msg_rtime) || |
| __get_user(kern->msg_ctime, &user->msg_ctime) || |
| __get_user(kern->msg_ctime, &user->msg_cbytes) || |
| __get_user(kern->msg_ctime, &user->msg_qnum) || |
| __get_user(kern->msg_ctime, &user->msg_qbytes) || |
| __get_user(kern->msg_ctime, &user->msg_lspid) || |
| __get_user(kern->msg_ctime, &user->msg_lrpid)) |
| return -EFAULT; |
| return 0; |
| } |
| |
| static inline int sunos_msqid_put(struct msqid_ds32 __user *user, |
| struct msqid_ds *kern) |
| { |
| if (put_user(kern->msg_perm.key, &user->msg_perm.key) || |
| __put_user(kern->msg_perm.uid, &user->msg_perm.uid) || |
| __put_user(kern->msg_perm.gid, &user->msg_perm.gid) || |
| __put_user(kern->msg_perm.cuid, &user->msg_perm.cuid) || |
| __put_user(kern->msg_perm.cgid, &user->msg_perm.cgid) || |
| __put_user(kern->msg_stime, &user->msg_stime) || |
| __put_user(kern->msg_rtime, &user->msg_rtime) || |
| __put_user(kern->msg_ctime, &user->msg_ctime) || |
| __put_user(kern->msg_ctime, &user->msg_cbytes) || |
| __put_user(kern->msg_ctime, &user->msg_qnum) || |
| __put_user(kern->msg_ctime, &user->msg_qbytes) || |
| __put_user(kern->msg_ctime, &user->msg_lspid) || |
| __put_user(kern->msg_ctime, &user->msg_lrpid)) |
| return -EFAULT; |
| return 0; |
| } |
| |
| static inline int sunos_msgbuf_get(struct msgbuf32 __user *user, struct msgbuf *kern, int len) |
| { |
| if (get_user(kern->mtype, &user->mtype) || |
| __copy_from_user(kern->mtext, &user->mtext, len)) |
| return -EFAULT; |
| return 0; |
| } |
| |
| static inline int sunos_msgbuf_put(struct msgbuf32 __user *user, struct msgbuf *kern, int len) |
| { |
| if (put_user(kern->mtype, &user->mtype) || |
| __copy_to_user(user->mtext, kern->mtext, len)) |
| return -EFAULT; |
| return 0; |
| } |
| |
| asmlinkage int sunos_msgsys(int op, u32 arg1, u32 arg2, u32 arg3, u32 arg4) |
| { |
| struct sparc_stackf32 __user *sp; |
| struct msqid_ds kds; |
| struct msgbuf *kmbuf; |
| mm_segment_t old_fs = get_fs(); |
| u32 arg5; |
| int rval; |
| |
| switch(op) { |
| case 0: |
| rval = sys_msgget((key_t)arg1, (int)arg2); |
| break; |
| case 1: |
| if (!sunos_msqid_get((struct msqid_ds32 __user *)(unsigned long)arg3, &kds)) { |
| set_fs(KERNEL_DS); |
| rval = sys_msgctl((int)arg1, (int)arg2, |
| (struct msqid_ds __user *)(unsigned long)arg3); |
| set_fs(old_fs); |
| if (!rval) |
| rval = sunos_msqid_put((struct msqid_ds32 __user *)(unsigned long)arg3, |
| &kds); |
| } else |
| rval = -EFAULT; |
| break; |
| case 2: |
| rval = -EFAULT; |
| kmbuf = kmalloc(sizeof(struct msgbuf) + arg3, |
| GFP_KERNEL); |
| if (!kmbuf) |
| break; |
| sp = (struct sparc_stackf32 __user *) |
| (current_thread_info()->kregs->u_regs[UREG_FP] & 0xffffffffUL); |
| if (get_user(arg5, &sp->xxargs[0])) { |
| rval = -EFAULT; |
| kfree(kmbuf); |
| break; |
| } |
| set_fs(KERNEL_DS); |
| rval = sys_msgrcv((int)arg1, (struct msgbuf __user *) kmbuf, |
| (size_t)arg3, |
| (long)arg4, (int)arg5); |
| set_fs(old_fs); |
| if (!rval) |
| rval = sunos_msgbuf_put((struct msgbuf32 __user *)(unsigned long)arg2, |
| kmbuf, arg3); |
| kfree(kmbuf); |
| break; |
| case 3: |
| rval = -EFAULT; |
| kmbuf = kmalloc(sizeof(struct msgbuf) + arg3, |
| GFP_KERNEL); |
| if (!kmbuf || sunos_msgbuf_get((struct msgbuf32 __user *)(unsigned long)arg2, |
| kmbuf, arg3)) |
| break; |
| set_fs(KERNEL_DS); |
| rval = sys_msgsnd((int)arg1, (struct msgbuf __user *) kmbuf, |
| (size_t)arg3, (int)arg4); |
| set_fs(old_fs); |
| kfree(kmbuf); |
| break; |
| default: |
| rval = -EINVAL; |
| break; |
| } |
| return rval; |
| } |
| |
| struct shmid_ds32 { |
| struct ipc_perm32 shm_perm; |
| int shm_segsz; |
| compat_time_t shm_atime; |
| compat_time_t shm_dtime; |
| compat_time_t shm_ctime; |
| compat_ipc_pid_t shm_cpid; |
| compat_ipc_pid_t shm_lpid; |
| unsigned short shm_nattch; |
| }; |
| |
| static inline int sunos_shmid_get(struct shmid_ds32 __user *user, |
| struct shmid_ds *kern) |
| { |
| if (get_user(kern->shm_perm.key, &user->shm_perm.key) || |
| __get_user(kern->shm_perm.uid, &user->shm_perm.uid) || |
| __get_user(kern->shm_perm.gid, &user->shm_perm.gid) || |
| __get_user(kern->shm_perm.cuid, &user->shm_perm.cuid) || |
| __get_user(kern->shm_perm.cgid, &user->shm_perm.cgid) || |
| __get_user(kern->shm_segsz, &user->shm_segsz) || |
| __get_user(kern->shm_atime, &user->shm_atime) || |
| __get_user(kern->shm_dtime, &user->shm_dtime) || |
| __get_user(kern->shm_ctime, &user->shm_ctime) || |
| __get_user(kern->shm_cpid, &user->shm_cpid) || |
| __get_user(kern->shm_lpid, &user->shm_lpid) || |
| __get_user(kern->shm_nattch, &user->shm_nattch)) |
| return -EFAULT; |
| return 0; |
| } |
| |
| static inline int sunos_shmid_put(struct shmid_ds32 __user *user, |
| struct shmid_ds *kern) |
| { |
| if (put_user(kern->shm_perm.key, &user->shm_perm.key) || |
| __put_user(kern->shm_perm.uid, &user->shm_perm.uid) || |
| __put_user(kern->shm_perm.gid, &user->shm_perm.gid) || |
| __put_user(kern->shm_perm.cuid, &user->shm_perm.cuid) || |
| __put_user(kern->shm_perm.cgid, &user->shm_perm.cgid) || |
| __put_user(kern->shm_segsz, &user->shm_segsz) || |
| __put_user(kern->shm_atime, &user->shm_atime) || |
| __put_user(kern->shm_dtime, &user->shm_dtime) || |
| __put_user(kern->shm_ctime, &user->shm_ctime) || |
| __put_user(kern->shm_cpid, &user->shm_cpid) || |
| __put_user(kern->shm_lpid, &user->shm_lpid) || |
| __put_user(kern->shm_nattch, &user->shm_nattch)) |
| return -EFAULT; |
| return 0; |
| } |
| |
| asmlinkage int sunos_shmsys(int op, u32 arg1, u32 arg2, u32 arg3) |
| { |
| struct shmid_ds ksds; |
| unsigned long raddr; |
| mm_segment_t old_fs = get_fs(); |
| int rval; |
| |
| switch(op) { |
| case 0: |
| /* do_shmat(): attach a shared memory area */ |
| rval = do_shmat((int)arg1,(char __user *)(unsigned long)arg2,(int)arg3,&raddr); |
| if (!rval) |
| rval = (int) raddr; |
| break; |
| case 1: |
| /* sys_shmctl(): modify shared memory area attr. */ |
| if (!sunos_shmid_get((struct shmid_ds32 __user *)(unsigned long)arg3, &ksds)) { |
| set_fs(KERNEL_DS); |
| rval = sys_shmctl((int) arg1,(int) arg2, |
| (struct shmid_ds __user *) &ksds); |
| set_fs(old_fs); |
| if (!rval) |
| rval = sunos_shmid_put((struct shmid_ds32 __user *)(unsigned long)arg3, |
| &ksds); |
| } else |
| rval = -EFAULT; |
| break; |
| case 2: |
| /* sys_shmdt(): detach a shared memory area */ |
| rval = sys_shmdt((char __user *)(unsigned long)arg1); |
| break; |
| case 3: |
| /* sys_shmget(): get a shared memory area */ |
| rval = sys_shmget((key_t)arg1,(int)arg2,(int)arg3); |
| break; |
| default: |
| rval = -EINVAL; |
| break; |
| }; |
| return rval; |
| } |
| |
| extern asmlinkage long sparc32_open(const char __user * filename, int flags, int mode); |
| |
| asmlinkage int sunos_open(u32 fname, int flags, int mode) |
| { |
| const char __user *filename = compat_ptr(fname); |
| |
| return sparc32_open(filename, flags, mode); |
| } |
| |
| #define SUNOS_EWOULDBLOCK 35 |
| |
| /* see the sunos man page read(2v) for an explanation |
| of this garbage. We use O_NDELAY to mark |
| file descriptors that have been set non-blocking |
| using 4.2BSD style calls. (tridge) */ |
| |
| static inline int check_nonblock(int ret, int fd) |
| { |
| if (ret == -EAGAIN) { |
| struct file * file = fget(fd); |
| if (file) { |
| if (file->f_flags & O_NDELAY) |
| ret = -SUNOS_EWOULDBLOCK; |
| fput(file); |
| } |
| } |
| return ret; |
| } |
| |
| asmlinkage int sunos_read(unsigned int fd, char __user *buf, u32 count) |
| { |
| int ret; |
| |
| ret = check_nonblock(sys_read(fd, buf, count), fd); |
| return ret; |
| } |
| |
| asmlinkage int sunos_readv(u32 fd, void __user *vector, s32 count) |
| { |
| int ret; |
| |
| ret = check_nonblock(compat_sys_readv(fd, vector, count), fd); |
| return ret; |
| } |
| |
| asmlinkage int sunos_write(unsigned int fd, char __user *buf, u32 count) |
| { |
| int ret; |
| |
| ret = check_nonblock(sys_write(fd, buf, count), fd); |
| return ret; |
| } |
| |
| asmlinkage int sunos_writev(u32 fd, void __user *vector, s32 count) |
| { |
| int ret; |
| |
| ret = check_nonblock(compat_sys_writev(fd, vector, count), fd); |
| return ret; |
| } |
| |
| asmlinkage int sunos_recv(u32 __fd, void __user *ubuf, int size, unsigned flags) |
| { |
| int ret, fd = (int) __fd; |
| |
| ret = check_nonblock(sys_recv(fd, ubuf, size, flags), fd); |
| return ret; |
| } |
| |
| asmlinkage int sunos_send(u32 __fd, void __user *buff, int len, unsigned flags) |
| { |
| int ret, fd = (int) __fd; |
| |
| ret = check_nonblock(sys_send(fd, buff, len, flags), fd); |
| return ret; |
| } |
| |
| asmlinkage int sunos_accept(u32 __fd, struct sockaddr __user *sa, int __user *addrlen) |
| { |
| int ret, fd = (int) __fd; |
| |
| while (1) { |
| ret = check_nonblock(sys_accept(fd, sa, addrlen), fd); |
| if (ret != -ENETUNREACH && ret != -EHOSTUNREACH) |
| break; |
| } |
| return ret; |
| } |
| |
| #define SUNOS_SV_INTERRUPT 2 |
| |
| asmlinkage int sunos_sigaction (int sig, |
| struct old_sigaction32 __user *act, |
| struct old_sigaction32 __user *oact) |
| { |
| struct k_sigaction new_ka, old_ka; |
| int ret; |
| |
| if (act) { |
| compat_old_sigset_t mask; |
| u32 u_handler; |
| |
| if (get_user(u_handler, &act->sa_handler) || |
| __get_user(new_ka.sa.sa_flags, &act->sa_flags)) |
| return -EFAULT; |
| new_ka.sa.sa_handler = compat_ptr(u_handler); |
| __get_user(mask, &act->sa_mask); |
| new_ka.sa.sa_restorer = NULL; |
| new_ka.ka_restorer = NULL; |
| siginitset(&new_ka.sa.sa_mask, mask); |
| new_ka.sa.sa_flags ^= SUNOS_SV_INTERRUPT; |
| } |
| |
| ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); |
| |
| if (!ret && oact) { |
| old_ka.sa.sa_flags ^= SUNOS_SV_INTERRUPT; |
| if (put_user(ptr_to_compat(old_ka.sa.sa_handler), &oact->sa_handler) || |
| __put_user(old_ka.sa.sa_flags, &oact->sa_flags)) |
| return -EFAULT; |
| __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask); |
| } |
| |
| return ret; |
| } |
| |
| asmlinkage int sunos_setsockopt(u32 __fd, u32 __level, u32 __optname, |
| char __user *optval, u32 __optlen) |
| { |
| int fd = (int) __fd; |
| int level = (int) __level; |
| int optname = (int) __optname; |
| int optlen = (int) __optlen; |
| int tr_opt = optname; |
| int ret; |
| |
| if (level == SOL_IP) { |
| /* Multicast socketopts (ttl, membership) */ |
| if (tr_opt >=2 && tr_opt <= 6) |
| tr_opt += 30; |
| } |
| ret = sys_setsockopt(fd, level, tr_opt, |
| optval, optlen); |
| return ret; |
| } |
| |
| asmlinkage int sunos_getsockopt(u32 __fd, u32 __level, u32 __optname, |
| char __user *optval, int __user *optlen) |
| { |
| int fd = (int) __fd; |
| int level = (int) __level; |
| int optname = (int) __optname; |
| int tr_opt = optname; |
| int ret; |
| |
| if (level == SOL_IP) { |
| /* Multicast socketopts (ttl, membership) */ |
| if (tr_opt >=2 && tr_opt <= 6) |
| tr_opt += 30; |
| } |
| ret = compat_sys_getsockopt(fd, level, tr_opt, |
| optval, optlen); |
| return ret; |
| } |