1211 lines
28 KiB
C
1211 lines
28 KiB
C
/* $Id: sys_sunos.c,v 1.137 2002/02/08 03:57:14 davem Exp $
|
|
* sys_sunos.c: SunOS specific syscall compatibility support.
|
|
*
|
|
* Copyright (C) 1995 David S. Miller (davem@caip.rutgers.edu)
|
|
* Copyright (C) 1995 Miguel de Icaza (miguel@nuclecu.unam.mx)
|
|
*
|
|
* Based upon preliminary work which is:
|
|
*
|
|
* Copyright (C) 1995 Adrian M. Rodriguez (adrian@remus.rutgers.edu)
|
|
*
|
|
*/
|
|
|
|
#include <linux/kernel.h>
|
|
#include <linux/sched.h>
|
|
#include <linux/types.h>
|
|
#include <linux/mman.h>
|
|
#include <linux/mm.h>
|
|
#include <linux/swap.h>
|
|
#include <linux/fs.h>
|
|
#include <linux/file.h>
|
|
#include <linux/resource.h>
|
|
#include <linux/ipc.h>
|
|
#include <linux/shm.h>
|
|
#include <linux/msg.h>
|
|
#include <linux/sem.h>
|
|
#include <linux/signal.h>
|
|
#include <linux/uio.h>
|
|
#include <linux/utsname.h>
|
|
#include <linux/major.h>
|
|
#include <linux/stat.h>
|
|
#include <linux/slab.h>
|
|
#include <linux/pagemap.h>
|
|
#include <linux/capability.h>
|
|
#include <linux/errno.h>
|
|
#include <linux/smp.h>
|
|
#include <linux/smp_lock.h>
|
|
#include <linux/syscalls.h>
|
|
|
|
#include <net/sock.h>
|
|
|
|
#include <asm/uaccess.h>
|
|
#ifndef KERNEL_DS
|
|
#include <linux/segment.h>
|
|
#endif
|
|
|
|
#include <asm/page.h>
|
|
#include <asm/pgtable.h>
|
|
#include <asm/pconf.h>
|
|
#include <asm/idprom.h> /* for gethostid() */
|
|
#include <asm/unistd.h>
|
|
#include <asm/system.h>
|
|
|
|
/* For the nfs mount emulation */
|
|
#include <linux/socket.h>
|
|
#include <linux/in.h>
|
|
#include <linux/nfs.h>
|
|
#include <linux/nfs2.h>
|
|
#include <linux/nfs_mount.h>
|
|
|
|
/* for sunos_select */
|
|
#include <linux/time.h>
|
|
#include <linux/personality.h>
|
|
|
|
/* NR_OPEN is now larger and dynamic in recent kernels. */
|
|
#define SUNOS_NR_OPEN 256
|
|
|
|
/* We use the SunOS mmap() semantics. */
|
|
asmlinkage unsigned long sunos_mmap(unsigned long addr, unsigned long len,
|
|
unsigned long prot, unsigned long flags,
|
|
unsigned long fd, unsigned long off)
|
|
{
|
|
struct file * file = NULL;
|
|
unsigned long retval, ret_type;
|
|
|
|
if (flags & MAP_NORESERVE) {
|
|
static int cnt;
|
|
if (cnt++ < 10)
|
|
printk("%s: unimplemented SunOS MAP_NORESERVE mmap() flag\n",
|
|
current->comm);
|
|
flags &= ~MAP_NORESERVE;
|
|
}
|
|
retval = -EBADF;
|
|
if (!(flags & MAP_ANONYMOUS)) {
|
|
if (fd >= SUNOS_NR_OPEN)
|
|
goto out;
|
|
file = fget(fd);
|
|
if (!file)
|
|
goto out;
|
|
}
|
|
|
|
retval = -EINVAL;
|
|
/* If this is ld.so or a shared library doing an mmap
|
|
* of /dev/zero, transform it into an anonymous mapping.
|
|
* SunOS is so stupid some times... hmph!
|
|
*/
|
|
if (file) {
|
|
if (imajor(file->f_path.dentry->d_inode) == MEM_MAJOR &&
|
|
iminor(file->f_path.dentry->d_inode) == 5) {
|
|
flags |= MAP_ANONYMOUS;
|
|
fput(file);
|
|
file = NULL;
|
|
}
|
|
}
|
|
ret_type = flags & _MAP_NEW;
|
|
flags &= ~_MAP_NEW;
|
|
|
|
if (!(flags & MAP_FIXED))
|
|
addr = 0;
|
|
else {
|
|
if (ARCH_SUN4C_SUN4 &&
|
|
(len > 0x20000000 ||
|
|
((flags & MAP_FIXED) &&
|
|
addr < 0xe0000000 && addr + len > 0x20000000)))
|
|
goto out_putf;
|
|
|
|
/* See asm-sparc/uaccess.h */
|
|
if (len > TASK_SIZE - PAGE_SIZE ||
|
|
addr + len > TASK_SIZE - PAGE_SIZE)
|
|
goto out_putf;
|
|
}
|
|
|
|
flags &= ~(MAP_EXECUTABLE | MAP_DENYWRITE);
|
|
down_write(¤t->mm->mmap_sem);
|
|
retval = do_mmap(file, addr, len, prot, flags, off);
|
|
up_write(¤t->mm->mmap_sem);
|
|
if (!ret_type)
|
|
retval = ((retval < PAGE_OFFSET) ? 0 : retval);
|
|
|
|
out_putf:
|
|
if (file)
|
|
fput(file);
|
|
out:
|
|
return retval;
|
|
}
|
|
|
|
/* lmbench calls this, just say "yeah, ok" */
|
|
asmlinkage int sunos_mctl(unsigned long addr, unsigned long len, int function, char *arg)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
/* SunOS is completely broken... it returns 0 on success, otherwise
|
|
* ENOMEM. For sys_sbrk() it wants the old brk value as a return
|
|
* on success and ENOMEM as before on failure.
|
|
*/
|
|
asmlinkage int sunos_brk(unsigned long brk)
|
|
{
|
|
int freepages, retval = -ENOMEM;
|
|
unsigned long rlim;
|
|
unsigned long newbrk, oldbrk;
|
|
|
|
down_write(¤t->mm->mmap_sem);
|
|
if (ARCH_SUN4C_SUN4) {
|
|
if (brk >= 0x20000000 && brk < 0xe0000000) {
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
if (brk < current->mm->end_code)
|
|
goto out;
|
|
|
|
newbrk = PAGE_ALIGN(brk);
|
|
oldbrk = PAGE_ALIGN(current->mm->brk);
|
|
retval = 0;
|
|
if (oldbrk == newbrk) {
|
|
current->mm->brk = brk;
|
|
goto out;
|
|
}
|
|
|
|
/*
|
|
* Always allow shrinking brk
|
|
*/
|
|
if (brk <= current->mm->brk) {
|
|
current->mm->brk = brk;
|
|
do_munmap(current->mm, newbrk, oldbrk-newbrk);
|
|
goto out;
|
|
}
|
|
/*
|
|
* Check against rlimit and stack..
|
|
*/
|
|
retval = -ENOMEM;
|
|
rlim = current->signal->rlim[RLIMIT_DATA].rlim_cur;
|
|
if (rlim >= RLIM_INFINITY)
|
|
rlim = ~0;
|
|
if (brk - current->mm->end_code > rlim)
|
|
goto out;
|
|
|
|
/*
|
|
* Check against existing mmap mappings.
|
|
*/
|
|
if (find_vma_intersection(current->mm, oldbrk, newbrk+PAGE_SIZE))
|
|
goto out;
|
|
|
|
/*
|
|
* stupid algorithm to decide if we have enough memory: while
|
|
* simple, it hopefully works in most obvious cases.. Easy to
|
|
* fool it, but this should catch most mistakes.
|
|
*/
|
|
freepages = global_page_state(NR_FILE_PAGES);
|
|
freepages >>= 1;
|
|
freepages += nr_free_pages();
|
|
freepages += nr_swap_pages;
|
|
freepages -= num_physpages >> 4;
|
|
freepages -= (newbrk-oldbrk) >> PAGE_SHIFT;
|
|
if (freepages < 0)
|
|
goto out;
|
|
/*
|
|
* Ok, we have probably got enough memory - let it rip.
|
|
*/
|
|
current->mm->brk = brk;
|
|
do_brk(oldbrk, newbrk-oldbrk);
|
|
retval = 0;
|
|
out:
|
|
up_write(¤t->mm->mmap_sem);
|
|
return retval;
|
|
}
|
|
|
|
asmlinkage unsigned long sunos_sbrk(int increment)
|
|
{
|
|
int error;
|
|
unsigned long oldbrk;
|
|
|
|
/* This should do it hopefully... */
|
|
lock_kernel();
|
|
oldbrk = current->mm->brk;
|
|
error = sunos_brk(((int) current->mm->brk) + increment);
|
|
if (!error)
|
|
error = oldbrk;
|
|
unlock_kernel();
|
|
return error;
|
|
}
|
|
|
|
/* XXX Completely undocumented, and completely magic...
|
|
* XXX I believe it is to increase the size of the stack by
|
|
* XXX argument 'increment' and return the new end of stack
|
|
* XXX area. Wheee...
|
|
*/
|
|
asmlinkage unsigned long sunos_sstk(int increment)
|
|
{
|
|
lock_kernel();
|
|
printk("%s: Call to sunos_sstk(increment<%d>) is unsupported\n",
|
|
current->comm, increment);
|
|
unlock_kernel();
|
|
return -1;
|
|
}
|
|
|
|
/* Give hints to the kernel as to what paging strategy to use...
|
|
* Completely bogus, don't remind me.
|
|
*/
|
|
#define VA_NORMAL 0 /* Normal vm usage expected */
|
|
#define VA_ABNORMAL 1 /* Abnormal/random vm usage probable */
|
|
#define VA_SEQUENTIAL 2 /* Accesses will be of a sequential nature */
|
|
#define VA_INVALIDATE 3 /* Page table entries should be flushed ??? */
|
|
static char *vstrings[] = {
|
|
"VA_NORMAL",
|
|
"VA_ABNORMAL",
|
|
"VA_SEQUENTIAL",
|
|
"VA_INVALIDATE",
|
|
};
|
|
|
|
asmlinkage void sunos_vadvise(unsigned long strategy)
|
|
{
|
|
/* I wanna see who uses this... */
|
|
lock_kernel();
|
|
printk("%s: Advises us to use %s paging strategy\n",
|
|
current->comm,
|
|
strategy <= 3 ? vstrings[strategy] : "BOGUS");
|
|
unlock_kernel();
|
|
}
|
|
|
|
/* This just wants the soft limit (ie. rlim_cur element) of the RLIMIT_NOFILE
|
|
* resource limit and is for backwards compatibility with older sunos
|
|
* revs.
|
|
*/
|
|
asmlinkage long sunos_getdtablesize(void)
|
|
{
|
|
return SUNOS_NR_OPEN;
|
|
}
|
|
|
|
#define _BLOCKABLE (~(sigmask(SIGKILL) | sigmask(SIGSTOP)))
|
|
|
|
asmlinkage unsigned long sunos_sigblock(unsigned long blk_mask)
|
|
{
|
|
unsigned long old;
|
|
|
|
spin_lock_irq(¤t->sighand->siglock);
|
|
old = current->blocked.sig[0];
|
|
current->blocked.sig[0] |= (blk_mask & _BLOCKABLE);
|
|
recalc_sigpending();
|
|
spin_unlock_irq(¤t->sighand->siglock);
|
|
return old;
|
|
}
|
|
|
|
asmlinkage unsigned long sunos_sigsetmask(unsigned long newmask)
|
|
{
|
|
unsigned long retval;
|
|
|
|
spin_lock_irq(¤t->sighand->siglock);
|
|
retval = current->blocked.sig[0];
|
|
current->blocked.sig[0] = (newmask & _BLOCKABLE);
|
|
recalc_sigpending();
|
|
spin_unlock_irq(¤t->sighand->siglock);
|
|
return retval;
|
|
}
|
|
|
|
/* SunOS getdents is very similar to the newer Linux (iBCS2 compliant) */
|
|
/* getdents system call, the format of the structure just has a different */
|
|
/* layout (d_off+d_ino instead of d_ino+d_off) */
|
|
struct sunos_dirent {
|
|
long d_off;
|
|
unsigned long d_ino;
|
|
unsigned short d_reclen;
|
|
unsigned short d_namlen;
|
|
char d_name[1];
|
|
};
|
|
|
|
struct sunos_dirent_callback {
|
|
struct sunos_dirent __user *curr;
|
|
struct sunos_dirent __user *previous;
|
|
int count;
|
|
int error;
|
|
};
|
|
|
|
#define NAME_OFFSET(de) ((int) ((de)->d_name - (char __user *) (de)))
|
|
#define ROUND_UP(x) (((x)+sizeof(long)-1) & ~(sizeof(long)-1))
|
|
|
|
static int sunos_filldir(void * __buf, const char * name, int namlen,
|
|
loff_t offset, u64 ino, unsigned int d_type)
|
|
{
|
|
struct sunos_dirent __user *dirent;
|
|
struct sunos_dirent_callback * buf = __buf;
|
|
unsigned long d_ino;
|
|
int reclen = ROUND_UP(NAME_OFFSET(dirent) + namlen + 1);
|
|
|
|
buf->error = -EINVAL; /* only used if we fail.. */
|
|
if (reclen > buf->count)
|
|
return -EINVAL;
|
|
d_ino = ino;
|
|
if (sizeof(d_ino) < sizeof(ino) && d_ino != ino)
|
|
return -EOVERFLOW;
|
|
dirent = buf->previous;
|
|
if (dirent)
|
|
put_user(offset, &dirent->d_off);
|
|
dirent = buf->curr;
|
|
buf->previous = dirent;
|
|
put_user(d_ino, &dirent->d_ino);
|
|
put_user(namlen, &dirent->d_namlen);
|
|
put_user(reclen, &dirent->d_reclen);
|
|
copy_to_user(dirent->d_name, name, namlen);
|
|
put_user(0, dirent->d_name + namlen);
|
|
dirent = (void __user *) dirent + reclen;
|
|
buf->curr = dirent;
|
|
buf->count -= reclen;
|
|
return 0;
|
|
}
|
|
|
|
asmlinkage int sunos_getdents(unsigned int fd, void __user *dirent, int cnt)
|
|
{
|
|
struct file * file;
|
|
struct sunos_dirent __user *lastdirent;
|
|
struct sunos_dirent_callback buf;
|
|
int error = -EBADF;
|
|
|
|
if (fd >= SUNOS_NR_OPEN)
|
|
goto out;
|
|
|
|
file = fget(fd);
|
|
if (!file)
|
|
goto out;
|
|
|
|
error = -EINVAL;
|
|
if (cnt < (sizeof(struct sunos_dirent) + 255))
|
|
goto out_putf;
|
|
|
|
buf.curr = (struct sunos_dirent __user *) dirent;
|
|
buf.previous = NULL;
|
|
buf.count = cnt;
|
|
buf.error = 0;
|
|
|
|
error = vfs_readdir(file, sunos_filldir, &buf);
|
|
if (error < 0)
|
|
goto out_putf;
|
|
|
|
lastdirent = buf.previous;
|
|
error = buf.error;
|
|
if (lastdirent) {
|
|
put_user(file->f_pos, &lastdirent->d_off);
|
|
error = cnt - buf.count;
|
|
}
|
|
|
|
out_putf:
|
|
fput(file);
|
|
out:
|
|
return error;
|
|
}
|
|
|
|
/* Old sunos getdirentries, severely broken compatibility stuff here. */
|
|
struct sunos_direntry {
|
|
unsigned long d_ino;
|
|
unsigned short d_reclen;
|
|
unsigned short d_namlen;
|
|
char d_name[1];
|
|
};
|
|
|
|
struct sunos_direntry_callback {
|
|
struct sunos_direntry __user *curr;
|
|
struct sunos_direntry __user *previous;
|
|
int count;
|
|
int error;
|
|
};
|
|
|
|
static int sunos_filldirentry(void * __buf, const char * name, int namlen,
|
|
loff_t offset, u64 ino, unsigned int d_type)
|
|
{
|
|
struct sunos_direntry __user *dirent;
|
|
struct sunos_direntry_callback *buf = __buf;
|
|
unsigned long d_ino;
|
|
int reclen = ROUND_UP(NAME_OFFSET(dirent) + namlen + 1);
|
|
|
|
buf->error = -EINVAL; /* only used if we fail.. */
|
|
if (reclen > buf->count)
|
|
return -EINVAL;
|
|
d_ino = ino;
|
|
if (sizeof(d_ino) < sizeof(ino) && d_ino != ino)
|
|
return -EOVERFLOW;
|
|
dirent = buf->previous;
|
|
dirent = buf->curr;
|
|
buf->previous = dirent;
|
|
put_user(d_ino, &dirent->d_ino);
|
|
put_user(namlen, &dirent->d_namlen);
|
|
put_user(reclen, &dirent->d_reclen);
|
|
copy_to_user(dirent->d_name, name, namlen);
|
|
put_user(0, dirent->d_name + namlen);
|
|
dirent = (void __user *) dirent + reclen;
|
|
buf->curr = dirent;
|
|
buf->count -= reclen;
|
|
return 0;
|
|
}
|
|
|
|
asmlinkage int sunos_getdirentries(unsigned int fd, void __user *dirent,
|
|
int cnt, unsigned int __user *basep)
|
|
{
|
|
struct file * file;
|
|
struct sunos_direntry __user *lastdirent;
|
|
struct sunos_direntry_callback buf;
|
|
int error = -EBADF;
|
|
|
|
if (fd >= SUNOS_NR_OPEN)
|
|
goto out;
|
|
|
|
file = fget(fd);
|
|
if (!file)
|
|
goto out;
|
|
|
|
error = -EINVAL;
|
|
if (cnt < (sizeof(struct sunos_direntry) + 255))
|
|
goto out_putf;
|
|
|
|
buf.curr = (struct sunos_direntry __user *) dirent;
|
|
buf.previous = NULL;
|
|
buf.count = cnt;
|
|
buf.error = 0;
|
|
|
|
error = vfs_readdir(file, sunos_filldirentry, &buf);
|
|
if (error < 0)
|
|
goto out_putf;
|
|
|
|
lastdirent = buf.previous;
|
|
error = buf.error;
|
|
if (lastdirent) {
|
|
put_user(file->f_pos, basep);
|
|
error = cnt - buf.count;
|
|
}
|
|
|
|
out_putf:
|
|
fput(file);
|
|
out:
|
|
return error;
|
|
}
|
|
|
|
struct sunos_utsname {
|
|
char sname[9];
|
|
char nname[9];
|
|
char nnext[56];
|
|
char rel[9];
|
|
char ver[9];
|
|
char mach[9];
|
|
};
|
|
|
|
asmlinkage int sunos_uname(struct sunos_utsname __user *name)
|
|
{
|
|
int ret;
|
|
down_read(&uts_sem);
|
|
ret = copy_to_user(&name->sname[0], &utsname()->sysname[0],
|
|
sizeof(name->sname) - 1);
|
|
if (!ret) {
|
|
ret |= __copy_to_user(&name->nname[0], &utsname()->nodename[0],
|
|
sizeof(name->nname) - 1);
|
|
ret |= __put_user('\0', &name->nname[8]);
|
|
ret |= __copy_to_user(&name->rel[0], &utsname()->release[0],
|
|
sizeof(name->rel) - 1);
|
|
ret |= __copy_to_user(&name->ver[0], &utsname()->version[0],
|
|
sizeof(name->ver) - 1);
|
|
ret |= __copy_to_user(&name->mach[0], &utsname()->machine[0],
|
|
sizeof(name->mach) - 1);
|
|
}
|
|
up_read(&uts_sem);
|
|
return ret ? -EFAULT : 0;
|
|
}
|
|
|
|
asmlinkage int sunos_nosys(void)
|
|
{
|
|
struct pt_regs *regs;
|
|
siginfo_t info;
|
|
static int cnt;
|
|
|
|
lock_kernel();
|
|
regs = current->thread.kregs;
|
|
info.si_signo = SIGSYS;
|
|
info.si_errno = 0;
|
|
info.si_code = __SI_FAULT|0x100;
|
|
info.si_addr = (void __user *)regs->pc;
|
|
info.si_trapno = regs->u_regs[UREG_G1];
|
|
send_sig_info(SIGSYS, &info, current);
|
|
if (cnt++ < 4) {
|
|
printk("Process makes ni_syscall number %d, register dump:\n",
|
|
(int) regs->u_regs[UREG_G1]);
|
|
show_regs(regs);
|
|
}
|
|
unlock_kernel();
|
|
return -ENOSYS;
|
|
}
|
|
|
|
/* This is not a real and complete implementation yet, just to keep
|
|
* the easy SunOS binaries happy.
|
|
*/
|
|
asmlinkage int sunos_fpathconf(int fd, int name)
|
|
{
|
|
int ret;
|
|
|
|
switch(name) {
|
|
case _PCONF_LINK:
|
|
ret = LINK_MAX;
|
|
break;
|
|
case _PCONF_CANON:
|
|
ret = MAX_CANON;
|
|
break;
|
|
case _PCONF_INPUT:
|
|
ret = MAX_INPUT;
|
|
break;
|
|
case _PCONF_NAME:
|
|
ret = NAME_MAX;
|
|
break;
|
|
case _PCONF_PATH:
|
|
ret = PATH_MAX;
|
|
break;
|
|
case _PCONF_PIPE:
|
|
ret = PIPE_BUF;
|
|
break;
|
|
case _PCONF_CHRESTRICT: /* XXX Investigate XXX */
|
|
ret = 1;
|
|
break;
|
|
case _PCONF_NOTRUNC: /* XXX Investigate XXX */
|
|
case _PCONF_VDISABLE:
|
|
ret = 0;
|
|
break;
|
|
default:
|
|
ret = -EINVAL;
|
|
break;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
asmlinkage int sunos_pathconf(char __user *path, int name)
|
|
{
|
|
int ret;
|
|
|
|
ret = sunos_fpathconf(0, name); /* XXX cheese XXX */
|
|
return ret;
|
|
}
|
|
|
|
/* SunOS mount system call emulation */
|
|
|
|
asmlinkage int sunos_select(int width, fd_set __user *inp, fd_set __user *outp,
|
|
fd_set __user *exp, struct timeval __user *tvp)
|
|
{
|
|
int ret;
|
|
|
|
/* SunOS binaries expect that select won't change the tvp contents */
|
|
ret = sys_select (width, inp, outp, exp, tvp);
|
|
if (ret == -EINTR && tvp) {
|
|
time_t sec, usec;
|
|
|
|
__get_user(sec, &tvp->tv_sec);
|
|
__get_user(usec, &tvp->tv_usec);
|
|
|
|
if (sec == 0 && usec == 0)
|
|
ret = 0;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
asmlinkage void sunos_nop(void)
|
|
{
|
|
return;
|
|
}
|
|
|
|
/* SunOS mount/umount. */
|
|
#define SMNT_RDONLY 1
|
|
#define SMNT_NOSUID 2
|
|
#define SMNT_NEWTYPE 4
|
|
#define SMNT_GRPID 8
|
|
#define SMNT_REMOUNT 16
|
|
#define SMNT_NOSUB 32
|
|
#define SMNT_MULTI 64
|
|
#define SMNT_SYS5 128
|
|
|
|
struct sunos_fh_t {
|
|
char fh_data [NFS_FHSIZE];
|
|
};
|
|
|
|
struct sunos_nfs_mount_args {
|
|
struct sockaddr_in __user *addr; /* file server address */
|
|
struct nfs_fh __user *fh; /* File handle to be mounted */
|
|
int flags; /* flags */
|
|
int wsize; /* write size in bytes */
|
|
int rsize; /* read size in bytes */
|
|
int timeo; /* initial timeout in .1 secs */
|
|
int retrans; /* times to retry send */
|
|
char __user *hostname; /* server's hostname */
|
|
int acregmin; /* attr cache file min secs */
|
|
int acregmax; /* attr cache file max secs */
|
|
int acdirmin; /* attr cache dir min secs */
|
|
int acdirmax; /* attr cache dir max secs */
|
|
char __user *netname; /* server's netname */
|
|
};
|
|
|
|
|
|
/* Bind the socket on a local reserved port and connect it to the
|
|
* remote server. This on Linux/i386 is done by the mount program,
|
|
* not by the kernel.
|
|
*/
|
|
static int
|
|
sunos_nfs_get_server_fd (int fd, struct sockaddr_in *addr)
|
|
{
|
|
struct sockaddr_in local;
|
|
struct sockaddr_in server;
|
|
int try_port;
|
|
struct socket *socket;
|
|
struct inode *inode;
|
|
struct file *file;
|
|
int ret, result = 0;
|
|
|
|
file = fget(fd);
|
|
if (!file)
|
|
goto out;
|
|
|
|
inode = file->f_path.dentry->d_inode;
|
|
|
|
socket = SOCKET_I(inode);
|
|
local.sin_family = AF_INET;
|
|
local.sin_addr.s_addr = INADDR_ANY;
|
|
|
|
/* IPPORT_RESERVED = 1024, can't find the definition in the kernel */
|
|
try_port = 1024;
|
|
do {
|
|
local.sin_port = htons (--try_port);
|
|
ret = socket->ops->bind(socket, (struct sockaddr*)&local,
|
|
sizeof(local));
|
|
} while (ret && try_port > (1024 / 2));
|
|
|
|
if (ret)
|
|
goto out_putf;
|
|
|
|
server.sin_family = AF_INET;
|
|
server.sin_addr = addr->sin_addr;
|
|
server.sin_port = NFS_PORT;
|
|
|
|
/* Call sys_connect */
|
|
ret = socket->ops->connect (socket, (struct sockaddr *) &server,
|
|
sizeof (server), file->f_flags);
|
|
if (ret >= 0)
|
|
result = 1;
|
|
|
|
out_putf:
|
|
fput(file);
|
|
out:
|
|
return result;
|
|
}
|
|
|
|
static int get_default (int value, int def_value)
|
|
{
|
|
if (value)
|
|
return value;
|
|
else
|
|
return def_value;
|
|
}
|
|
|
|
static int sunos_nfs_mount(char *dir_name, int linux_flags, void __user *data)
|
|
{
|
|
int server_fd, err;
|
|
char *the_name, *mount_page;
|
|
struct nfs_mount_data linux_nfs_mount;
|
|
struct sunos_nfs_mount_args sunos_mount;
|
|
|
|
/* Ok, here comes the fun part: Linux's nfs mount needs a
|
|
* socket connection to the server, but SunOS mount does not
|
|
* require this, so we use the information on the destination
|
|
* address to create a socket and bind it to a reserved
|
|
* port on this system
|
|
*/
|
|
if (copy_from_user(&sunos_mount, data, sizeof(sunos_mount)))
|
|
return -EFAULT;
|
|
|
|
server_fd = sys_socket (AF_INET, SOCK_DGRAM, IPPROTO_UDP);
|
|
if (server_fd < 0)
|
|
return -ENXIO;
|
|
|
|
if (copy_from_user(&linux_nfs_mount.addr,sunos_mount.addr,
|
|
sizeof(*sunos_mount.addr)) ||
|
|
copy_from_user(&linux_nfs_mount.root,sunos_mount.fh,
|
|
sizeof(*sunos_mount.fh))) {
|
|
sys_close (server_fd);
|
|
return -EFAULT;
|
|
}
|
|
|
|
if (!sunos_nfs_get_server_fd (server_fd, &linux_nfs_mount.addr)){
|
|
sys_close (server_fd);
|
|
return -ENXIO;
|
|
}
|
|
|
|
/* Now, bind it to a locally reserved port */
|
|
linux_nfs_mount.version = NFS_MOUNT_VERSION;
|
|
linux_nfs_mount.flags = sunos_mount.flags;
|
|
linux_nfs_mount.fd = server_fd;
|
|
|
|
linux_nfs_mount.rsize = get_default (sunos_mount.rsize, 8192);
|
|
linux_nfs_mount.wsize = get_default (sunos_mount.wsize, 8192);
|
|
linux_nfs_mount.timeo = get_default (sunos_mount.timeo, 10);
|
|
linux_nfs_mount.retrans = sunos_mount.retrans;
|
|
|
|
linux_nfs_mount.acregmin = sunos_mount.acregmin;
|
|
linux_nfs_mount.acregmax = sunos_mount.acregmax;
|
|
linux_nfs_mount.acdirmin = sunos_mount.acdirmin;
|
|
linux_nfs_mount.acdirmax = sunos_mount.acdirmax;
|
|
|
|
the_name = getname(sunos_mount.hostname);
|
|
if (IS_ERR(the_name))
|
|
return PTR_ERR(the_name);
|
|
|
|
strlcpy(linux_nfs_mount.hostname, the_name,
|
|
sizeof(linux_nfs_mount.hostname));
|
|
putname (the_name);
|
|
|
|
mount_page = (char *) get_zeroed_page(GFP_KERNEL);
|
|
if (!mount_page)
|
|
return -ENOMEM;
|
|
|
|
memcpy(mount_page, &linux_nfs_mount, sizeof(linux_nfs_mount));
|
|
|
|
err = do_mount("", dir_name, "nfs", linux_flags, mount_page);
|
|
|
|
free_page((unsigned long) mount_page);
|
|
return err;
|
|
}
|
|
|
|
asmlinkage int
|
|
sunos_mount(char __user *type, char __user *dir, int flags, void __user *data)
|
|
{
|
|
int linux_flags = 0;
|
|
int ret = -EINVAL;
|
|
char *dev_fname = NULL;
|
|
char *dir_page, *type_page;
|
|
|
|
if (!capable (CAP_SYS_ADMIN))
|
|
return -EPERM;
|
|
|
|
lock_kernel();
|
|
/* We don't handle the integer fs type */
|
|
if ((flags & SMNT_NEWTYPE) == 0)
|
|
goto out;
|
|
|
|
/* Do not allow for those flags we don't support */
|
|
if (flags & (SMNT_GRPID|SMNT_NOSUB|SMNT_MULTI|SMNT_SYS5))
|
|
goto out;
|
|
|
|
if (flags & SMNT_REMOUNT)
|
|
linux_flags |= MS_REMOUNT;
|
|
if (flags & SMNT_RDONLY)
|
|
linux_flags |= MS_RDONLY;
|
|
if (flags & SMNT_NOSUID)
|
|
linux_flags |= MS_NOSUID;
|
|
|
|
dir_page = getname(dir);
|
|
ret = PTR_ERR(dir_page);
|
|
if (IS_ERR(dir_page))
|
|
goto out;
|
|
|
|
type_page = getname(type);
|
|
ret = PTR_ERR(type_page);
|
|
if (IS_ERR(type_page))
|
|
goto out1;
|
|
|
|
if (strcmp(type_page, "ext2") == 0) {
|
|
dev_fname = getname(data);
|
|
} else if (strcmp(type_page, "iso9660") == 0) {
|
|
dev_fname = getname(data);
|
|
} else if (strcmp(type_page, "minix") == 0) {
|
|
dev_fname = getname(data);
|
|
} else if (strcmp(type_page, "nfs") == 0) {
|
|
ret = sunos_nfs_mount (dir_page, flags, data);
|
|
goto out2;
|
|
} else if (strcmp(type_page, "ufs") == 0) {
|
|
printk("Warning: UFS filesystem mounts unsupported.\n");
|
|
ret = -ENODEV;
|
|
goto out2;
|
|
} else if (strcmp(type_page, "proc")) {
|
|
ret = -ENODEV;
|
|
goto out2;
|
|
}
|
|
ret = PTR_ERR(dev_fname);
|
|
if (IS_ERR(dev_fname))
|
|
goto out2;
|
|
ret = do_mount(dev_fname, dir_page, type_page, linux_flags, NULL);
|
|
if (dev_fname)
|
|
putname(dev_fname);
|
|
out2:
|
|
putname(type_page);
|
|
out1:
|
|
putname(dir_page);
|
|
out:
|
|
unlock_kernel();
|
|
return ret;
|
|
}
|
|
|
|
|
|
asmlinkage int sunos_setpgrp(pid_t pid, pid_t pgid)
|
|
{
|
|
int ret;
|
|
|
|
/* So stupid... */
|
|
if ((!pid || pid == current->pid) &&
|
|
!pgid) {
|
|
sys_setsid();
|
|
ret = 0;
|
|
} else {
|
|
ret = sys_setpgid(pid, pgid);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
/* So stupid... */
|
|
asmlinkage int sunos_wait4(pid_t pid, unsigned int __user *stat_addr,
|
|
int options, struct rusage __user*ru)
|
|
{
|
|
int ret;
|
|
|
|
ret = sys_wait4((pid ? pid : -1), stat_addr, options, ru);
|
|
return ret;
|
|
}
|
|
|
|
asmlinkage int sunos_killpg(int pgrp, int sig)
|
|
{
|
|
int ret;
|
|
|
|
rcu_read_lock();
|
|
ret = -EINVAL;
|
|
if (pgrp > 0)
|
|
ret = kill_pgrp(find_pid(pgrp), sig, 0);
|
|
rcu_read_unlock();
|
|
|
|
return ret;
|
|
}
|
|
|
|
asmlinkage int sunos_audit(void)
|
|
{
|
|
lock_kernel();
|
|
printk ("sys_audit\n");
|
|
unlock_kernel();
|
|
return -1;
|
|
}
|
|
|
|
asmlinkage unsigned long sunos_gethostid(void)
|
|
{
|
|
unsigned long ret;
|
|
|
|
lock_kernel();
|
|
ret = ((unsigned long)idprom->id_machtype << 24) |
|
|
(unsigned long)idprom->id_sernum;
|
|
unlock_kernel();
|
|
return ret;
|
|
}
|
|
|
|
/* sysconf options, for SunOS compatibility */
|
|
#define _SC_ARG_MAX 1
|
|
#define _SC_CHILD_MAX 2
|
|
#define _SC_CLK_TCK 3
|
|
#define _SC_NGROUPS_MAX 4
|
|
#define _SC_OPEN_MAX 5
|
|
#define _SC_JOB_CONTROL 6
|
|
#define _SC_SAVED_IDS 7
|
|
#define _SC_VERSION 8
|
|
|
|
asmlinkage long sunos_sysconf (int name)
|
|
{
|
|
long ret;
|
|
|
|
switch (name){
|
|
case _SC_ARG_MAX:
|
|
ret = ARG_MAX;
|
|
break;
|
|
case _SC_CHILD_MAX:
|
|
ret = current->signal->rlim[RLIMIT_NPROC].rlim_cur;
|
|
break;
|
|
case _SC_CLK_TCK:
|
|
ret = HZ;
|
|
break;
|
|
case _SC_NGROUPS_MAX:
|
|
ret = NGROUPS_MAX;
|
|
break;
|
|
case _SC_OPEN_MAX:
|
|
ret = current->signal->rlim[RLIMIT_NOFILE].rlim_cur;
|
|
break;
|
|
case _SC_JOB_CONTROL:
|
|
ret = 1; /* yes, we do support job control */
|
|
break;
|
|
case _SC_SAVED_IDS:
|
|
ret = 1; /* yes, we do support saved uids */
|
|
break;
|
|
case _SC_VERSION:
|
|
/* mhm, POSIX_VERSION is in /usr/include/unistd.h
|
|
* should it go on /usr/include/linux?
|
|
*/
|
|
ret = 199009L;
|
|
break;
|
|
default:
|
|
ret = -1;
|
|
break;
|
|
};
|
|
return ret;
|
|
}
|
|
|
|
asmlinkage int sunos_semsys(int op, unsigned long arg1, unsigned long arg2,
|
|
unsigned long arg3, void *ptr)
|
|
{
|
|
union semun arg4;
|
|
int ret;
|
|
|
|
switch (op) {
|
|
case 0:
|
|
/* Most arguments match on a 1:1 basis but cmd doesn't */
|
|
switch(arg3) {
|
|
case 4:
|
|
arg3=GETPID; break;
|
|
case 5:
|
|
arg3=GETVAL; break;
|
|
case 6:
|
|
arg3=GETALL; break;
|
|
case 3:
|
|
arg3=GETNCNT; break;
|
|
case 7:
|
|
arg3=GETZCNT; break;
|
|
case 8:
|
|
arg3=SETVAL; break;
|
|
case 9:
|
|
arg3=SETALL; break;
|
|
}
|
|
/* sys_semctl(): */
|
|
/* value to modify semaphore to */
|
|
arg4.__pad = (void __user *) ptr;
|
|
ret = sys_semctl((int)arg1, (int)arg2, (int)arg3, arg4 );
|
|
break;
|
|
case 1:
|
|
/* sys_semget(): */
|
|
ret = sys_semget((key_t)arg1, (int)arg2, (int)arg3);
|
|
break;
|
|
case 2:
|
|
/* sys_semop(): */
|
|
ret = sys_semop((int)arg1, (struct sembuf __user *)arg2, (unsigned)arg3);
|
|
break;
|
|
default:
|
|
ret = -EINVAL;
|
|
break;
|
|
};
|
|
return ret;
|
|
}
|
|
|
|
asmlinkage int sunos_msgsys(int op, unsigned long arg1, unsigned long arg2,
|
|
unsigned long arg3, unsigned long arg4)
|
|
{
|
|
struct sparc_stackf *sp;
|
|
unsigned long arg5;
|
|
int rval;
|
|
|
|
switch(op) {
|
|
case 0:
|
|
rval = sys_msgget((key_t)arg1, (int)arg2);
|
|
break;
|
|
case 1:
|
|
rval = sys_msgctl((int)arg1, (int)arg2,
|
|
(struct msqid_ds __user *)arg3);
|
|
break;
|
|
case 2:
|
|
lock_kernel();
|
|
sp = (struct sparc_stackf *)current->thread.kregs->u_regs[UREG_FP];
|
|
arg5 = sp->xxargs[0];
|
|
unlock_kernel();
|
|
rval = sys_msgrcv((int)arg1, (struct msgbuf __user *)arg2,
|
|
(size_t)arg3, (long)arg4, (int)arg5);
|
|
break;
|
|
case 3:
|
|
rval = sys_msgsnd((int)arg1, (struct msgbuf __user *)arg2,
|
|
(size_t)arg3, (int)arg4);
|
|
break;
|
|
default:
|
|
rval = -EINVAL;
|
|
break;
|
|
}
|
|
return rval;
|
|
}
|
|
|
|
asmlinkage int sunos_shmsys(int op, unsigned long arg1, unsigned long arg2,
|
|
unsigned long arg3)
|
|
{
|
|
unsigned long raddr;
|
|
int rval;
|
|
|
|
switch(op) {
|
|
case 0:
|
|
/* do_shmat(): attach a shared memory area */
|
|
rval = do_shmat((int)arg1,(char __user *)arg2,(int)arg3,&raddr);
|
|
if (!rval)
|
|
rval = (int) raddr;
|
|
break;
|
|
case 1:
|
|
/* sys_shmctl(): modify shared memory area attr. */
|
|
rval = sys_shmctl((int)arg1,(int)arg2,(struct shmid_ds __user *)arg3);
|
|
break;
|
|
case 2:
|
|
/* sys_shmdt(): detach a shared memory area */
|
|
rval = sys_shmdt((char __user *)arg1);
|
|
break;
|
|
case 3:
|
|
/* sys_shmget(): get a shared memory area */
|
|
rval = sys_shmget((key_t)arg1,(int)arg2,(int)arg3);
|
|
break;
|
|
default:
|
|
rval = -EINVAL;
|
|
break;
|
|
};
|
|
return rval;
|
|
}
|
|
|
|
#define SUNOS_EWOULDBLOCK 35
|
|
|
|
/* see the sunos man page read(2v) for an explanation
|
|
of this garbage. We use O_NDELAY to mark
|
|
file descriptors that have been set non-blocking
|
|
using 4.2BSD style calls. (tridge) */
|
|
|
|
static inline int check_nonblock(int ret, int fd)
|
|
{
|
|
if (ret == -EAGAIN) {
|
|
struct file * file = fget(fd);
|
|
if (file) {
|
|
if (file->f_flags & O_NDELAY)
|
|
ret = -SUNOS_EWOULDBLOCK;
|
|
fput(file);
|
|
}
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
asmlinkage int sunos_read(unsigned int fd, char __user *buf, int count)
|
|
{
|
|
int ret;
|
|
|
|
ret = check_nonblock(sys_read(fd,buf,count),fd);
|
|
return ret;
|
|
}
|
|
|
|
asmlinkage int sunos_readv(unsigned long fd, const struct iovec __user *vector,
|
|
long count)
|
|
{
|
|
int ret;
|
|
|
|
ret = check_nonblock(sys_readv(fd,vector,count),fd);
|
|
return ret;
|
|
}
|
|
|
|
asmlinkage int sunos_write(unsigned int fd, char __user *buf, int count)
|
|
{
|
|
int ret;
|
|
|
|
ret = check_nonblock(sys_write(fd,buf,count),fd);
|
|
return ret;
|
|
}
|
|
|
|
asmlinkage int sunos_writev(unsigned long fd,
|
|
const struct iovec __user *vector, long count)
|
|
{
|
|
int ret;
|
|
|
|
ret = check_nonblock(sys_writev(fd,vector,count),fd);
|
|
return ret;
|
|
}
|
|
|
|
asmlinkage int sunos_recv(int fd, void __user *ubuf, int size, unsigned flags)
|
|
{
|
|
int ret;
|
|
|
|
ret = check_nonblock(sys_recv(fd,ubuf,size,flags),fd);
|
|
return ret;
|
|
}
|
|
|
|
asmlinkage int sunos_send(int fd, void __user *buff, int len, unsigned flags)
|
|
{
|
|
int ret;
|
|
|
|
ret = check_nonblock(sys_send(fd,buff,len,flags),fd);
|
|
return ret;
|
|
}
|
|
|
|
asmlinkage int sunos_accept(int fd, struct sockaddr __user *sa,
|
|
int __user *addrlen)
|
|
{
|
|
int ret;
|
|
|
|
while (1) {
|
|
ret = check_nonblock(sys_accept(fd,sa,addrlen),fd);
|
|
if (ret != -ENETUNREACH && ret != -EHOSTUNREACH)
|
|
break;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
#define SUNOS_SV_INTERRUPT 2
|
|
|
|
asmlinkage int
|
|
sunos_sigaction(int sig, const struct old_sigaction __user *act,
|
|
struct old_sigaction __user *oact)
|
|
{
|
|
struct k_sigaction new_ka, old_ka;
|
|
int ret;
|
|
|
|
if (act) {
|
|
old_sigset_t mask;
|
|
|
|
if (!access_ok(VERIFY_READ, act, sizeof(*act)) ||
|
|
__get_user(new_ka.sa.sa_handler, &act->sa_handler) ||
|
|
__get_user(new_ka.sa.sa_flags, &act->sa_flags))
|
|
return -EFAULT;
|
|
__get_user(mask, &act->sa_mask);
|
|
new_ka.sa.sa_restorer = NULL;
|
|
new_ka.ka_restorer = NULL;
|
|
siginitset(&new_ka.sa.sa_mask, mask);
|
|
new_ka.sa.sa_flags ^= SUNOS_SV_INTERRUPT;
|
|
}
|
|
|
|
ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
|
|
|
|
if (!ret && oact) {
|
|
/* In the clone() case we could copy half consistent
|
|
* state to the user, however this could sleep and
|
|
* deadlock us if we held the signal lock on SMP. So for
|
|
* now I take the easy way out and do no locking.
|
|
* But then again we don't support SunOS lwp's anyways ;-)
|
|
*/
|
|
old_ka.sa.sa_flags ^= SUNOS_SV_INTERRUPT;
|
|
if (!access_ok(VERIFY_WRITE, oact, sizeof(*oact)) ||
|
|
__put_user(old_ka.sa.sa_handler, &oact->sa_handler) ||
|
|
__put_user(old_ka.sa.sa_flags, &oact->sa_flags))
|
|
return -EFAULT;
|
|
__put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
asmlinkage int sunos_setsockopt(int fd, int level, int optname,
|
|
char __user *optval, int optlen)
|
|
{
|
|
int tr_opt = optname;
|
|
int ret;
|
|
|
|
if (level == SOL_IP) {
|
|
/* Multicast socketopts (ttl, membership) */
|
|
if (tr_opt >=2 && tr_opt <= 6)
|
|
tr_opt += 30;
|
|
}
|
|
ret = sys_setsockopt(fd, level, tr_opt, optval, optlen);
|
|
return ret;
|
|
}
|
|
|
|
asmlinkage int sunos_getsockopt(int fd, int level, int optname,
|
|
char __user *optval, int __user *optlen)
|
|
{
|
|
int tr_opt = optname;
|
|
int ret;
|
|
|
|
if (level == SOL_IP) {
|
|
/* Multicast socketopts (ttl, membership) */
|
|
if (tr_opt >=2 && tr_opt <= 6)
|
|
tr_opt += 30;
|
|
}
|
|
ret = sys_getsockopt(fd, level, tr_opt, optval, optlen);
|
|
return ret;
|
|
}
|