sys_sunos32.c 33 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359
  1. /* $Id: sys_sunos32.c,v 1.64 2002/02/09 19:49:31 davem Exp $
  2. * sys_sunos32.c: SunOS binary compatibility layer on sparc64.
  3. *
  4. * Copyright (C) 1995, 1996, 1997 David S. Miller (davem@caip.rutgers.edu)
  5. * Copyright (C) 1995 Miguel de Icaza (miguel@nuclecu.unam.mx)
  6. *
  7. * Based upon preliminary work which is:
  8. *
  9. * Copyright (C) 1995 Adrian M. Rodriguez (adrian@remus.rutgers.edu)
  10. */
  11. #include <linux/kernel.h>
  12. #include <linux/sched.h>
  13. #include <linux/types.h>
  14. #include <linux/capability.h>
  15. #include <linux/compat.h>
  16. #include <linux/mman.h>
  17. #include <linux/mm.h>
  18. #include <linux/swap.h>
  19. #include <linux/fs.h>
  20. #include <linux/file.h>
  21. #include <linux/resource.h>
  22. #include <linux/ipc.h>
  23. #include <linux/shm.h>
  24. #include <linux/msg.h>
  25. #include <linux/sem.h>
  26. #include <linux/signal.h>
  27. #include <linux/uio.h>
  28. #include <linux/utsname.h>
  29. #include <linux/major.h>
  30. #include <linux/stat.h>
  31. #include <linux/slab.h>
  32. #include <linux/pagemap.h>
  33. #include <linux/errno.h>
  34. #include <linux/smp.h>
  35. #include <linux/smp_lock.h>
  36. #include <linux/syscalls.h>
  37. #include <asm/uaccess.h>
  38. #include <asm/page.h>
  39. #include <asm/pgtable.h>
  40. #include <asm/pconf.h>
  41. #include <asm/idprom.h> /* for gethostid() */
  42. #include <asm/unistd.h>
  43. #include <asm/system.h>
  44. #include <asm/compat_signal.h>
  45. /* For the nfs mount emulation */
  46. #include <linux/socket.h>
  47. #include <linux/in.h>
  48. #include <linux/nfs.h>
  49. #include <linux/nfs2.h>
  50. #include <linux/nfs_mount.h>
  51. /* for sunos_select */
  52. #include <linux/time.h>
  53. #include <linux/personality.h>
  54. /* For SOCKET_I */
  55. #include <net/sock.h>
  56. #include <net/compat.h>
  57. #define SUNOS_NR_OPEN 256
  58. asmlinkage u32 sunos_mmap(u32 addr, u32 len, u32 prot, u32 flags, u32 fd, u32 off)
  59. {
  60. struct file *file = NULL;
  61. unsigned long retval, ret_type;
  62. if (flags & MAP_NORESERVE) {
  63. static int cnt;
  64. if (cnt++ < 10)
  65. printk("%s: unimplemented SunOS MAP_NORESERVE mmap() flag\n",
  66. current->comm);
  67. flags &= ~MAP_NORESERVE;
  68. }
  69. retval = -EBADF;
  70. if (!(flags & MAP_ANONYMOUS)) {
  71. struct inode * inode;
  72. if (fd >= SUNOS_NR_OPEN)
  73. goto out;
  74. file = fget(fd);
  75. if (!file)
  76. goto out;
  77. inode = file->f_path.dentry->d_inode;
  78. if (imajor(inode) == MEM_MAJOR && iminor(inode) == 5) {
  79. flags |= MAP_ANONYMOUS;
  80. fput(file);
  81. file = NULL;
  82. }
  83. }
  84. retval = -EINVAL;
  85. if (!(flags & MAP_FIXED))
  86. addr = 0;
  87. else if (len > 0xf0000000 || addr > 0xf0000000 - len)
  88. goto out_putf;
  89. ret_type = flags & _MAP_NEW;
  90. flags &= ~_MAP_NEW;
  91. flags &= ~(MAP_EXECUTABLE | MAP_DENYWRITE);
  92. down_write(&current->mm->mmap_sem);
  93. retval = do_mmap(file,
  94. (unsigned long) addr, (unsigned long) len,
  95. (unsigned long) prot, (unsigned long) flags,
  96. (unsigned long) off);
  97. up_write(&current->mm->mmap_sem);
  98. if (!ret_type)
  99. retval = ((retval < 0xf0000000) ? 0 : retval);
  100. out_putf:
  101. if (file)
  102. fput(file);
  103. out:
  104. return (u32) retval;
  105. }
  106. asmlinkage int sunos_mctl(u32 addr, u32 len, int function, u32 arg)
  107. {
  108. return 0;
  109. }
  110. asmlinkage int sunos_brk(u32 baddr)
  111. {
  112. int freepages, retval = -ENOMEM;
  113. unsigned long rlim;
  114. unsigned long newbrk, oldbrk, brk = (unsigned long) baddr;
  115. down_write(&current->mm->mmap_sem);
  116. if (brk < current->mm->end_code)
  117. goto out;
  118. newbrk = PAGE_ALIGN(brk);
  119. oldbrk = PAGE_ALIGN(current->mm->brk);
  120. retval = 0;
  121. if (oldbrk == newbrk) {
  122. current->mm->brk = brk;
  123. goto out;
  124. }
  125. /* Always allow shrinking brk. */
  126. if (brk <= current->mm->brk) {
  127. current->mm->brk = brk;
  128. do_munmap(current->mm, newbrk, oldbrk-newbrk);
  129. goto out;
  130. }
  131. /* Check against rlimit and stack.. */
  132. retval = -ENOMEM;
  133. rlim = current->signal->rlim[RLIMIT_DATA].rlim_cur;
  134. if (rlim >= RLIM_INFINITY)
  135. rlim = ~0;
  136. if (brk - current->mm->end_code > rlim)
  137. goto out;
  138. /* Check against existing mmap mappings. */
  139. if (find_vma_intersection(current->mm, oldbrk, newbrk+PAGE_SIZE))
  140. goto out;
  141. /* stupid algorithm to decide if we have enough memory: while
  142. * simple, it hopefully works in most obvious cases.. Easy to
  143. * fool it, but this should catch most mistakes.
  144. */
  145. freepages = global_page_state(NR_FILE_PAGES);
  146. freepages >>= 1;
  147. freepages += nr_free_pages();
  148. freepages += nr_swap_pages;
  149. freepages -= num_physpages >> 4;
  150. freepages -= (newbrk-oldbrk) >> PAGE_SHIFT;
  151. if (freepages < 0)
  152. goto out;
  153. /* Ok, we have probably got enough memory - let it rip. */
  154. current->mm->brk = brk;
  155. do_brk(oldbrk, newbrk-oldbrk);
  156. retval = 0;
  157. out:
  158. up_write(&current->mm->mmap_sem);
  159. return retval;
  160. }
  161. asmlinkage u32 sunos_sbrk(int increment)
  162. {
  163. int error, oldbrk;
  164. /* This should do it hopefully... */
  165. oldbrk = (int)current->mm->brk;
  166. error = sunos_brk(((int) current->mm->brk) + increment);
  167. if (!error)
  168. error = oldbrk;
  169. return error;
  170. }
  171. asmlinkage u32 sunos_sstk(int increment)
  172. {
  173. printk("%s: Call to sunos_sstk(increment<%d>) is unsupported\n",
  174. current->comm, increment);
  175. return (u32)-1;
  176. }
  177. /* Give hints to the kernel as to what paging strategy to use...
  178. * Completely bogus, don't remind me.
  179. */
  180. #define VA_NORMAL 0 /* Normal vm usage expected */
  181. #define VA_ABNORMAL 1 /* Abnormal/random vm usage probable */
  182. #define VA_SEQUENTIAL 2 /* Accesses will be of a sequential nature */
  183. #define VA_INVALIDATE 3 /* Page table entries should be flushed ??? */
  184. static char *vstrings[] = {
  185. "VA_NORMAL",
  186. "VA_ABNORMAL",
  187. "VA_SEQUENTIAL",
  188. "VA_INVALIDATE",
  189. };
  190. asmlinkage void sunos_vadvise(u32 strategy)
  191. {
  192. static int count;
  193. /* I wanna see who uses this... */
  194. if (count++ < 5)
  195. printk("%s: Advises us to use %s paging strategy\n",
  196. current->comm,
  197. strategy <= 3 ? vstrings[strategy] : "BOGUS");
  198. }
  199. /* This just wants the soft limit (ie. rlim_cur element) of the RLIMIT_NOFILE
  200. * resource limit and is for backwards compatibility with older sunos
  201. * revs.
  202. */
  203. asmlinkage int sunos_getdtablesize(void)
  204. {
  205. return SUNOS_NR_OPEN;
  206. }
  207. #define _BLOCKABLE (~(sigmask(SIGKILL) | sigmask(SIGSTOP)))
  208. asmlinkage u32 sunos_sigblock(u32 blk_mask)
  209. {
  210. u32 old;
  211. spin_lock_irq(&current->sighand->siglock);
  212. old = (u32) current->blocked.sig[0];
  213. current->blocked.sig[0] |= (blk_mask & _BLOCKABLE);
  214. recalc_sigpending();
  215. spin_unlock_irq(&current->sighand->siglock);
  216. return old;
  217. }
  218. asmlinkage u32 sunos_sigsetmask(u32 newmask)
  219. {
  220. u32 retval;
  221. spin_lock_irq(&current->sighand->siglock);
  222. retval = (u32) current->blocked.sig[0];
  223. current->blocked.sig[0] = (newmask & _BLOCKABLE);
  224. recalc_sigpending();
  225. spin_unlock_irq(&current->sighand->siglock);
  226. return retval;
  227. }
  228. /* SunOS getdents is very similar to the newer Linux (iBCS2 compliant) */
  229. /* getdents system call, the format of the structure just has a different */
  230. /* layout (d_off+d_ino instead of d_ino+d_off) */
  231. struct sunos_dirent {
  232. s32 d_off;
  233. u32 d_ino;
  234. u16 d_reclen;
  235. u16 d_namlen;
  236. char d_name[1];
  237. };
  238. struct sunos_dirent_callback {
  239. struct sunos_dirent __user *curr;
  240. struct sunos_dirent __user *previous;
  241. int count;
  242. int error;
  243. };
  244. #define NAME_OFFSET(de) ((int) ((de)->d_name - (char __user *) (de)))
  245. #define ROUND_UP(x) (((x)+sizeof(s32)-1) & ~(sizeof(s32)-1))
  246. static int sunos_filldir(void * __buf, const char * name, int namlen,
  247. loff_t offset, ino_t ino, unsigned int d_type)
  248. {
  249. struct sunos_dirent __user *dirent;
  250. struct sunos_dirent_callback * buf = (struct sunos_dirent_callback *) __buf;
  251. int reclen = ROUND_UP(NAME_OFFSET(dirent) + namlen + 1);
  252. u32 d_ino;
  253. buf->error = -EINVAL; /* only used if we fail.. */
  254. if (reclen > buf->count)
  255. return -EINVAL;
  256. d_ino = ino;
  257. if (sizeof(d_ino) < sizeof(ino) && d_ino != ino)
  258. return -EOVERFLOW;
  259. dirent = buf->previous;
  260. if (dirent)
  261. put_user(offset, &dirent->d_off);
  262. dirent = buf->curr;
  263. buf->previous = dirent;
  264. put_user(d_ino, &dirent->d_ino);
  265. put_user(namlen, &dirent->d_namlen);
  266. put_user(reclen, &dirent->d_reclen);
  267. if (copy_to_user(dirent->d_name, name, namlen))
  268. return -EFAULT;
  269. put_user(0, dirent->d_name + namlen);
  270. dirent = (void __user *) dirent + reclen;
  271. buf->curr = dirent;
  272. buf->count -= reclen;
  273. return 0;
  274. }
  275. asmlinkage int sunos_getdents(unsigned int fd, void __user *dirent, int cnt)
  276. {
  277. struct file * file;
  278. struct sunos_dirent __user *lastdirent;
  279. struct sunos_dirent_callback buf;
  280. int error = -EBADF;
  281. if (fd >= SUNOS_NR_OPEN)
  282. goto out;
  283. file = fget(fd);
  284. if (!file)
  285. goto out;
  286. error = -EINVAL;
  287. if (cnt < (sizeof(struct sunos_dirent) + 255))
  288. goto out_putf;
  289. buf.curr = (struct sunos_dirent __user *) dirent;
  290. buf.previous = NULL;
  291. buf.count = cnt;
  292. buf.error = 0;
  293. error = vfs_readdir(file, sunos_filldir, &buf);
  294. if (error < 0)
  295. goto out_putf;
  296. lastdirent = buf.previous;
  297. error = buf.error;
  298. if (lastdirent) {
  299. put_user(file->f_pos, &lastdirent->d_off);
  300. error = cnt - buf.count;
  301. }
  302. out_putf:
  303. fput(file);
  304. out:
  305. return error;
  306. }
  307. /* Old sunos getdirentries, severely broken compatibility stuff here. */
  308. struct sunos_direntry {
  309. u32 d_ino;
  310. u16 d_reclen;
  311. u16 d_namlen;
  312. char d_name[1];
  313. };
  314. struct sunos_direntry_callback {
  315. struct sunos_direntry __user *curr;
  316. struct sunos_direntry __user *previous;
  317. int count;
  318. int error;
  319. };
  320. static int sunos_filldirentry(void * __buf, const char * name, int namlen,
  321. loff_t offset, ino_t ino, unsigned int d_type)
  322. {
  323. struct sunos_direntry __user *dirent;
  324. struct sunos_direntry_callback * buf =
  325. (struct sunos_direntry_callback *) __buf;
  326. int reclen = ROUND_UP(NAME_OFFSET(dirent) + namlen + 1);
  327. u32 d_ino;
  328. buf->error = -EINVAL; /* only used if we fail.. */
  329. if (reclen > buf->count)
  330. return -EINVAL;
  331. d_ino = ino;
  332. if (sizeof(d_ino) < sizeof(ino) && d_ino != ino)
  333. return -EOVERFLOW;
  334. dirent = buf->previous;
  335. dirent = buf->curr;
  336. buf->previous = dirent;
  337. put_user(d_ino, &dirent->d_ino);
  338. put_user(namlen, &dirent->d_namlen);
  339. put_user(reclen, &dirent->d_reclen);
  340. if (copy_to_user(dirent->d_name, name, namlen))
  341. return -EFAULT;
  342. put_user(0, dirent->d_name + namlen);
  343. dirent = (void __user *) dirent + reclen;
  344. buf->curr = dirent;
  345. buf->count -= reclen;
  346. return 0;
  347. }
  348. asmlinkage int sunos_getdirentries(unsigned int fd,
  349. void __user *dirent,
  350. int cnt,
  351. unsigned int __user *basep)
  352. {
  353. struct file * file;
  354. struct sunos_direntry __user *lastdirent;
  355. int error = -EBADF;
  356. struct sunos_direntry_callback buf;
  357. if (fd >= SUNOS_NR_OPEN)
  358. goto out;
  359. file = fget(fd);
  360. if (!file)
  361. goto out;
  362. error = -EINVAL;
  363. if (cnt < (sizeof(struct sunos_direntry) + 255))
  364. goto out_putf;
  365. buf.curr = (struct sunos_direntry __user *) dirent;
  366. buf.previous = NULL;
  367. buf.count = cnt;
  368. buf.error = 0;
  369. error = vfs_readdir(file, sunos_filldirentry, &buf);
  370. if (error < 0)
  371. goto out_putf;
  372. lastdirent = buf.previous;
  373. error = buf.error;
  374. if (lastdirent) {
  375. put_user(file->f_pos, basep);
  376. error = cnt - buf.count;
  377. }
  378. out_putf:
  379. fput(file);
  380. out:
  381. return error;
  382. }
  383. struct sunos_utsname {
  384. char sname[9];
  385. char nname[9];
  386. char nnext[56];
  387. char rel[9];
  388. char ver[9];
  389. char mach[9];
  390. };
  391. asmlinkage int sunos_uname(struct sunos_utsname __user *name)
  392. {
  393. int ret;
  394. down_read(&uts_sem);
  395. ret = copy_to_user(&name->sname[0], &utsname()->sysname[0],
  396. sizeof(name->sname) - 1);
  397. ret |= copy_to_user(&name->nname[0], &utsname()->nodename[0],
  398. sizeof(name->nname) - 1);
  399. ret |= put_user('\0', &name->nname[8]);
  400. ret |= copy_to_user(&name->rel[0], &utsname()->release[0],
  401. sizeof(name->rel) - 1);
  402. ret |= copy_to_user(&name->ver[0], &utsname()->version[0],
  403. sizeof(name->ver) - 1);
  404. ret |= copy_to_user(&name->mach[0], &utsname()->machine[0],
  405. sizeof(name->mach) - 1);
  406. up_read(&uts_sem);
  407. return (ret ? -EFAULT : 0);
  408. }
  409. asmlinkage int sunos_nosys(void)
  410. {
  411. struct pt_regs *regs;
  412. siginfo_t info;
  413. static int cnt;
  414. regs = current_thread_info()->kregs;
  415. if (test_thread_flag(TIF_32BIT)) {
  416. regs->tpc &= 0xffffffff;
  417. regs->tnpc &= 0xffffffff;
  418. }
  419. info.si_signo = SIGSYS;
  420. info.si_errno = 0;
  421. info.si_code = __SI_FAULT|0x100;
  422. info.si_addr = (void __user *)regs->tpc;
  423. info.si_trapno = regs->u_regs[UREG_G1];
  424. send_sig_info(SIGSYS, &info, current);
  425. if (cnt++ < 4) {
  426. printk("Process makes ni_syscall number %d, register dump:\n",
  427. (int) regs->u_regs[UREG_G1]);
  428. show_regs(regs);
  429. }
  430. return -ENOSYS;
  431. }
  432. /* This is not a real and complete implementation yet, just to keep
  433. * the easy SunOS binaries happy.
  434. */
  435. asmlinkage int sunos_fpathconf(int fd, int name)
  436. {
  437. int ret;
  438. switch(name) {
  439. case _PCONF_LINK:
  440. ret = LINK_MAX;
  441. break;
  442. case _PCONF_CANON:
  443. ret = MAX_CANON;
  444. break;
  445. case _PCONF_INPUT:
  446. ret = MAX_INPUT;
  447. break;
  448. case _PCONF_NAME:
  449. ret = NAME_MAX;
  450. break;
  451. case _PCONF_PATH:
  452. ret = PATH_MAX;
  453. break;
  454. case _PCONF_PIPE:
  455. ret = PIPE_BUF;
  456. break;
  457. case _PCONF_CHRESTRICT: /* XXX Investigate XXX */
  458. ret = 1;
  459. break;
  460. case _PCONF_NOTRUNC: /* XXX Investigate XXX */
  461. case _PCONF_VDISABLE:
  462. ret = 0;
  463. break;
  464. default:
  465. ret = -EINVAL;
  466. break;
  467. }
  468. return ret;
  469. }
  470. asmlinkage int sunos_pathconf(u32 u_path, int name)
  471. {
  472. int ret;
  473. ret = sunos_fpathconf(0, name); /* XXX cheese XXX */
  474. return ret;
  475. }
  476. asmlinkage int sunos_select(int width, u32 inp, u32 outp, u32 exp, u32 tvp_x)
  477. {
  478. int ret;
  479. /* SunOS binaries expect that select won't change the tvp contents */
  480. ret = compat_sys_select(width, compat_ptr(inp), compat_ptr(outp),
  481. compat_ptr(exp), compat_ptr(tvp_x));
  482. if (ret == -EINTR && tvp_x) {
  483. struct compat_timeval __user *tvp = compat_ptr(tvp_x);
  484. time_t sec, usec;
  485. __get_user(sec, &tvp->tv_sec);
  486. __get_user(usec, &tvp->tv_usec);
  487. if (sec == 0 && usec == 0)
  488. ret = 0;
  489. }
  490. return ret;
  491. }
  492. asmlinkage void sunos_nop(void)
  493. {
  494. return;
  495. }
  496. #if 0 /* This code doesn't translate user pointers correctly,
  497. * disable for now. -DaveM
  498. */
  499. /* XXXXXXXXXX SunOS mount/umount. XXXXXXXXXXX */
  500. #define SMNT_RDONLY 1
  501. #define SMNT_NOSUID 2
  502. #define SMNT_NEWTYPE 4
  503. #define SMNT_GRPID 8
  504. #define SMNT_REMOUNT 16
  505. #define SMNT_NOSUB 32
  506. #define SMNT_MULTI 64
  507. #define SMNT_SYS5 128
  508. struct sunos_fh_t {
  509. char fh_data [NFS_FHSIZE];
  510. };
  511. struct sunos_nfs_mount_args {
  512. struct sockaddr_in *addr; /* file server address */
  513. struct nfs_fh *fh; /* File handle to be mounted */
  514. int flags; /* flags */
  515. int wsize; /* write size in bytes */
  516. int rsize; /* read size in bytes */
  517. int timeo; /* initial timeout in .1 secs */
  518. int retrans; /* times to retry send */
  519. char *hostname; /* server's hostname */
  520. int acregmin; /* attr cache file min secs */
  521. int acregmax; /* attr cache file max secs */
  522. int acdirmin; /* attr cache dir min secs */
  523. int acdirmax; /* attr cache dir max secs */
  524. char *netname; /* server's netname */
  525. };
  526. /* Bind the socket on a local reserved port and connect it to the
  527. * remote server. This on Linux/i386 is done by the mount program,
  528. * not by the kernel.
  529. */
  530. /* XXXXXXXXXXXXXXXXXXXX */
  531. static int
  532. sunos_nfs_get_server_fd (int fd, struct sockaddr_in *addr)
  533. {
  534. struct sockaddr_in local;
  535. struct sockaddr_in server;
  536. int try_port;
  537. int ret;
  538. struct socket *socket;
  539. struct inode *inode;
  540. struct file *file;
  541. file = fget(fd);
  542. if (!file)
  543. return 0;
  544. inode = file->f_path.dentry->d_inode;
  545. socket = SOCKET_I(inode);
  546. local.sin_family = AF_INET;
  547. local.sin_addr.s_addr = INADDR_ANY;
  548. /* IPPORT_RESERVED = 1024, can't find the definition in the kernel */
  549. try_port = 1024;
  550. do {
  551. local.sin_port = htons (--try_port);
  552. ret = socket->ops->bind(socket, (struct sockaddr*)&local,
  553. sizeof(local));
  554. } while (ret && try_port > (1024 / 2));
  555. if (ret) {
  556. fput(file);
  557. return 0;
  558. }
  559. server.sin_family = AF_INET;
  560. server.sin_addr = addr->sin_addr;
  561. server.sin_port = NFS_PORT;
  562. /* Call sys_connect */
  563. ret = socket->ops->connect (socket, (struct sockaddr *) &server,
  564. sizeof (server), file->f_flags);
  565. fput(file);
  566. if (ret < 0)
  567. return 0;
  568. return 1;
  569. }
  570. /* XXXXXXXXXXXXXXXXXXXX */
  571. static int get_default (int value, int def_value)
  572. {
  573. if (value)
  574. return value;
  575. else
  576. return def_value;
  577. }
  578. /* XXXXXXXXXXXXXXXXXXXX */
  579. static int sunos_nfs_mount(char *dir_name, int linux_flags, void __user *data)
  580. {
  581. int server_fd, err;
  582. char *the_name, *mount_page;
  583. struct nfs_mount_data linux_nfs_mount;
  584. struct sunos_nfs_mount_args sunos_mount;
  585. /* Ok, here comes the fun part: Linux's nfs mount needs a
  586. * socket connection to the server, but SunOS mount does not
  587. * require this, so we use the information on the destination
  588. * address to create a socket and bind it to a reserved
  589. * port on this system
  590. */
  591. if (copy_from_user(&sunos_mount, data, sizeof(sunos_mount)))
  592. return -EFAULT;
  593. server_fd = sys_socket (AF_INET, SOCK_DGRAM, IPPROTO_UDP);
  594. if (server_fd < 0)
  595. return -ENXIO;
  596. if (copy_from_user(&linux_nfs_mount.addr, sunos_mount.addr,
  597. sizeof(*sunos_mount.addr)) ||
  598. copy_from_user(&linux_nfs_mount.root, sunos_mount.fh,
  599. sizeof(*sunos_mount.fh))) {
  600. sys_close (server_fd);
  601. return -EFAULT;
  602. }
  603. if (!sunos_nfs_get_server_fd (server_fd, &linux_nfs_mount.addr)){
  604. sys_close (server_fd);
  605. return -ENXIO;
  606. }
  607. /* Now, bind it to a locally reserved port */
  608. linux_nfs_mount.version = NFS_MOUNT_VERSION;
  609. linux_nfs_mount.flags = sunos_mount.flags;
  610. linux_nfs_mount.fd = server_fd;
  611. linux_nfs_mount.rsize = get_default (sunos_mount.rsize, 8192);
  612. linux_nfs_mount.wsize = get_default (sunos_mount.wsize, 8192);
  613. linux_nfs_mount.timeo = get_default (sunos_mount.timeo, 10);
  614. linux_nfs_mount.retrans = sunos_mount.retrans;
  615. linux_nfs_mount.acregmin = sunos_mount.acregmin;
  616. linux_nfs_mount.acregmax = sunos_mount.acregmax;
  617. linux_nfs_mount.acdirmin = sunos_mount.acdirmin;
  618. linux_nfs_mount.acdirmax = sunos_mount.acdirmax;
  619. the_name = getname(sunos_mount.hostname);
  620. if (IS_ERR(the_name))
  621. return PTR_ERR(the_name);
  622. strlcpy(linux_nfs_mount.hostname, the_name,
  623. sizeof(linux_nfs_mount.hostname));
  624. putname (the_name);
  625. mount_page = (char *) get_zeroed_page(GFP_KERNEL);
  626. if (!mount_page)
  627. return -ENOMEM;
  628. memcpy(mount_page, &linux_nfs_mount, sizeof(linux_nfs_mount));
  629. err = do_mount("", dir_name, "nfs", linux_flags, mount_page);
  630. free_page((unsigned long) mount_page);
  631. return err;
  632. }
  633. /* XXXXXXXXXXXXXXXXXXXX */
  634. asmlinkage int
  635. sunos_mount(char *type, char *dir, int flags, void *data)
  636. {
  637. int linux_flags = 0;
  638. int ret = -EINVAL;
  639. char *dev_fname = 0;
  640. char *dir_page, *type_page;
  641. if (!capable (CAP_SYS_ADMIN))
  642. return -EPERM;
  643. /* We don't handle the integer fs type */
  644. if ((flags & SMNT_NEWTYPE) == 0)
  645. goto out;
  646. /* Do not allow for those flags we don't support */
  647. if (flags & (SMNT_GRPID|SMNT_NOSUB|SMNT_MULTI|SMNT_SYS5))
  648. goto out;
  649. if (flags & SMNT_REMOUNT)
  650. linux_flags |= MS_REMOUNT;
  651. if (flags & SMNT_RDONLY)
  652. linux_flags |= MS_RDONLY;
  653. if (flags & SMNT_NOSUID)
  654. linux_flags |= MS_NOSUID;
  655. dir_page = getname(dir);
  656. ret = PTR_ERR(dir_page);
  657. if (IS_ERR(dir_page))
  658. goto out;
  659. type_page = getname(type);
  660. ret = PTR_ERR(type_page);
  661. if (IS_ERR(type_page))
  662. goto out1;
  663. if (strcmp(type_page, "ext2") == 0) {
  664. dev_fname = getname(data);
  665. } else if (strcmp(type_page, "iso9660") == 0) {
  666. dev_fname = getname(data);
  667. } else if (strcmp(type_page, "minix") == 0) {
  668. dev_fname = getname(data);
  669. } else if (strcmp(type_page, "nfs") == 0) {
  670. ret = sunos_nfs_mount (dir_page, flags, data);
  671. goto out2;
  672. } else if (strcmp(type_page, "ufs") == 0) {
  673. printk("Warning: UFS filesystem mounts unsupported.\n");
  674. ret = -ENODEV;
  675. goto out2;
  676. } else if (strcmp(type_page, "proc")) {
  677. ret = -ENODEV;
  678. goto out2;
  679. }
  680. ret = PTR_ERR(dev_fname);
  681. if (IS_ERR(dev_fname))
  682. goto out2;
  683. lock_kernel();
  684. ret = do_mount(dev_fname, dir_page, type_page, linux_flags, NULL);
  685. unlock_kernel();
  686. if (dev_fname)
  687. putname(dev_fname);
  688. out2:
  689. putname(type_page);
  690. out1:
  691. putname(dir_page);
  692. out:
  693. return ret;
  694. }
  695. #endif
  696. asmlinkage int sunos_setpgrp(pid_t pid, pid_t pgid)
  697. {
  698. int ret;
  699. /* So stupid... */
  700. if ((!pid || pid == current->pid) &&
  701. !pgid) {
  702. sys_setsid();
  703. ret = 0;
  704. } else {
  705. ret = sys_setpgid(pid, pgid);
  706. }
  707. return ret;
  708. }
  709. /* So stupid... */
  710. extern long compat_sys_wait4(compat_pid_t, compat_uint_t __user *, int,
  711. struct compat_rusage __user *);
  712. asmlinkage int sunos_wait4(compat_pid_t pid, compat_uint_t __user *stat_addr, int options, struct compat_rusage __user *ru)
  713. {
  714. int ret;
  715. ret = compat_sys_wait4((pid ? pid : ((compat_pid_t)-1)),
  716. stat_addr, options, ru);
  717. return ret;
  718. }
  719. asmlinkage int sunos_killpg(int pgrp, int sig)
  720. {
  721. int ret;
  722. rcu_read_lock();
  723. ret = -EINVAL;
  724. if (pgrp > 0)
  725. ret = kill_pgrp(find_vpid(pgrp), sig, 0);
  726. rcu_read_unlock();
  727. return ret;
  728. }
  729. asmlinkage int sunos_audit(void)
  730. {
  731. printk ("sys_audit\n");
  732. return -1;
  733. }
  734. asmlinkage u32 sunos_gethostid(void)
  735. {
  736. u32 ret;
  737. ret = (((u32)idprom->id_machtype << 24) | ((u32)idprom->id_sernum));
  738. return ret;
  739. }
  740. /* sysconf options, for SunOS compatibility */
  741. #define _SC_ARG_MAX 1
  742. #define _SC_CHILD_MAX 2
  743. #define _SC_CLK_TCK 3
  744. #define _SC_NGROUPS_MAX 4
  745. #define _SC_OPEN_MAX 5
  746. #define _SC_JOB_CONTROL 6
  747. #define _SC_SAVED_IDS 7
  748. #define _SC_VERSION 8
  749. asmlinkage s32 sunos_sysconf (int name)
  750. {
  751. s32 ret;
  752. switch (name){
  753. case _SC_ARG_MAX:
  754. ret = ARG_MAX;
  755. break;
  756. case _SC_CHILD_MAX:
  757. ret = current->signal->rlim[RLIMIT_NPROC].rlim_cur;
  758. break;
  759. case _SC_CLK_TCK:
  760. ret = HZ;
  761. break;
  762. case _SC_NGROUPS_MAX:
  763. ret = NGROUPS_MAX;
  764. break;
  765. case _SC_OPEN_MAX:
  766. ret = current->signal->rlim[RLIMIT_NOFILE].rlim_cur;
  767. break;
  768. case _SC_JOB_CONTROL:
  769. ret = 1; /* yes, we do support job control */
  770. break;
  771. case _SC_SAVED_IDS:
  772. ret = 1; /* yes, we do support saved uids */
  773. break;
  774. case _SC_VERSION:
  775. /* mhm, POSIX_VERSION is in /usr/include/unistd.h
  776. * should it go on /usr/include/linux?
  777. */
  778. ret = 199009;
  779. break;
  780. default:
  781. ret = -1;
  782. break;
  783. };
  784. return ret;
  785. }
  786. asmlinkage int sunos_semsys(int op, u32 arg1, u32 arg2, u32 arg3, void __user *ptr)
  787. {
  788. union semun arg4;
  789. int ret;
  790. switch (op) {
  791. case 0:
  792. /* Most arguments match on a 1:1 basis but cmd doesn't */
  793. switch(arg3) {
  794. case 4:
  795. arg3=GETPID; break;
  796. case 5:
  797. arg3=GETVAL; break;
  798. case 6:
  799. arg3=GETALL; break;
  800. case 3:
  801. arg3=GETNCNT; break;
  802. case 7:
  803. arg3=GETZCNT; break;
  804. case 8:
  805. arg3=SETVAL; break;
  806. case 9:
  807. arg3=SETALL; break;
  808. }
  809. /* sys_semctl(): */
  810. /* value to modify semaphore to */
  811. arg4.__pad = ptr;
  812. ret = sys_semctl((int)arg1, (int)arg2, (int)arg3, arg4);
  813. break;
  814. case 1:
  815. /* sys_semget(): */
  816. ret = sys_semget((key_t)arg1, (int)arg2, (int)arg3);
  817. break;
  818. case 2:
  819. /* sys_semop(): */
  820. ret = sys_semop((int)arg1, (struct sembuf __user *)(unsigned long)arg2,
  821. (unsigned int) arg3);
  822. break;
  823. default:
  824. ret = -EINVAL;
  825. break;
  826. };
  827. return ret;
  828. }
  829. struct msgbuf32 {
  830. s32 mtype;
  831. char mtext[1];
  832. };
  833. struct ipc_perm32
  834. {
  835. key_t key;
  836. compat_uid_t uid;
  837. compat_gid_t gid;
  838. compat_uid_t cuid;
  839. compat_gid_t cgid;
  840. compat_mode_t mode;
  841. unsigned short seq;
  842. };
  843. struct msqid_ds32
  844. {
  845. struct ipc_perm32 msg_perm;
  846. u32 msg_first;
  847. u32 msg_last;
  848. compat_time_t msg_stime;
  849. compat_time_t msg_rtime;
  850. compat_time_t msg_ctime;
  851. u32 wwait;
  852. u32 rwait;
  853. unsigned short msg_cbytes;
  854. unsigned short msg_qnum;
  855. unsigned short msg_qbytes;
  856. compat_ipc_pid_t msg_lspid;
  857. compat_ipc_pid_t msg_lrpid;
  858. };
  859. static inline int sunos_msqid_get(struct msqid_ds32 __user *user,
  860. struct msqid_ds *kern)
  861. {
  862. if (get_user(kern->msg_perm.key, &user->msg_perm.key) ||
  863. __get_user(kern->msg_perm.uid, &user->msg_perm.uid) ||
  864. __get_user(kern->msg_perm.gid, &user->msg_perm.gid) ||
  865. __get_user(kern->msg_perm.cuid, &user->msg_perm.cuid) ||
  866. __get_user(kern->msg_perm.cgid, &user->msg_perm.cgid) ||
  867. __get_user(kern->msg_stime, &user->msg_stime) ||
  868. __get_user(kern->msg_rtime, &user->msg_rtime) ||
  869. __get_user(kern->msg_ctime, &user->msg_ctime) ||
  870. __get_user(kern->msg_ctime, &user->msg_cbytes) ||
  871. __get_user(kern->msg_ctime, &user->msg_qnum) ||
  872. __get_user(kern->msg_ctime, &user->msg_qbytes) ||
  873. __get_user(kern->msg_ctime, &user->msg_lspid) ||
  874. __get_user(kern->msg_ctime, &user->msg_lrpid))
  875. return -EFAULT;
  876. return 0;
  877. }
  878. static inline int sunos_msqid_put(struct msqid_ds32 __user *user,
  879. struct msqid_ds *kern)
  880. {
  881. if (put_user(kern->msg_perm.key, &user->msg_perm.key) ||
  882. __put_user(kern->msg_perm.uid, &user->msg_perm.uid) ||
  883. __put_user(kern->msg_perm.gid, &user->msg_perm.gid) ||
  884. __put_user(kern->msg_perm.cuid, &user->msg_perm.cuid) ||
  885. __put_user(kern->msg_perm.cgid, &user->msg_perm.cgid) ||
  886. __put_user(kern->msg_stime, &user->msg_stime) ||
  887. __put_user(kern->msg_rtime, &user->msg_rtime) ||
  888. __put_user(kern->msg_ctime, &user->msg_ctime) ||
  889. __put_user(kern->msg_ctime, &user->msg_cbytes) ||
  890. __put_user(kern->msg_ctime, &user->msg_qnum) ||
  891. __put_user(kern->msg_ctime, &user->msg_qbytes) ||
  892. __put_user(kern->msg_ctime, &user->msg_lspid) ||
  893. __put_user(kern->msg_ctime, &user->msg_lrpid))
  894. return -EFAULT;
  895. return 0;
  896. }
  897. static inline int sunos_msgbuf_get(struct msgbuf32 __user *user, struct msgbuf *kern, int len)
  898. {
  899. if (get_user(kern->mtype, &user->mtype) ||
  900. __copy_from_user(kern->mtext, &user->mtext, len))
  901. return -EFAULT;
  902. return 0;
  903. }
  904. static inline int sunos_msgbuf_put(struct msgbuf32 __user *user, struct msgbuf *kern, int len)
  905. {
  906. if (put_user(kern->mtype, &user->mtype) ||
  907. __copy_to_user(user->mtext, kern->mtext, len))
  908. return -EFAULT;
  909. return 0;
  910. }
  911. asmlinkage int sunos_msgsys(int op, u32 arg1, u32 arg2, u32 arg3, u32 arg4)
  912. {
  913. struct sparc_stackf32 __user *sp;
  914. struct msqid_ds kds;
  915. struct msgbuf *kmbuf;
  916. mm_segment_t old_fs = get_fs();
  917. u32 arg5;
  918. int rval;
  919. switch(op) {
  920. case 0:
  921. rval = sys_msgget((key_t)arg1, (int)arg2);
  922. break;
  923. case 1:
  924. if (!sunos_msqid_get((struct msqid_ds32 __user *)(unsigned long)arg3, &kds)) {
  925. set_fs(KERNEL_DS);
  926. rval = sys_msgctl((int)arg1, (int)arg2,
  927. (struct msqid_ds __user *)(unsigned long)arg3);
  928. set_fs(old_fs);
  929. if (!rval)
  930. rval = sunos_msqid_put((struct msqid_ds32 __user *)(unsigned long)arg3,
  931. &kds);
  932. } else
  933. rval = -EFAULT;
  934. break;
  935. case 2:
  936. rval = -EFAULT;
  937. kmbuf = kmalloc(sizeof(struct msgbuf) + arg3,
  938. GFP_KERNEL);
  939. if (!kmbuf)
  940. break;
  941. sp = (struct sparc_stackf32 __user *)
  942. (current_thread_info()->kregs->u_regs[UREG_FP] & 0xffffffffUL);
  943. if (get_user(arg5, &sp->xxargs[0])) {
  944. rval = -EFAULT;
  945. kfree(kmbuf);
  946. break;
  947. }
  948. set_fs(KERNEL_DS);
  949. rval = sys_msgrcv((int)arg1, (struct msgbuf __user *) kmbuf,
  950. (size_t)arg3,
  951. (long)arg4, (int)arg5);
  952. set_fs(old_fs);
  953. if (!rval)
  954. rval = sunos_msgbuf_put((struct msgbuf32 __user *)(unsigned long)arg2,
  955. kmbuf, arg3);
  956. kfree(kmbuf);
  957. break;
  958. case 3:
  959. rval = -EFAULT;
  960. kmbuf = kmalloc(sizeof(struct msgbuf) + arg3,
  961. GFP_KERNEL);
  962. if (!kmbuf || sunos_msgbuf_get((struct msgbuf32 __user *)(unsigned long)arg2,
  963. kmbuf, arg3))
  964. break;
  965. set_fs(KERNEL_DS);
  966. rval = sys_msgsnd((int)arg1, (struct msgbuf __user *) kmbuf,
  967. (size_t)arg3, (int)arg4);
  968. set_fs(old_fs);
  969. kfree(kmbuf);
  970. break;
  971. default:
  972. rval = -EINVAL;
  973. break;
  974. }
  975. return rval;
  976. }
  977. struct shmid_ds32 {
  978. struct ipc_perm32 shm_perm;
  979. int shm_segsz;
  980. compat_time_t shm_atime;
  981. compat_time_t shm_dtime;
  982. compat_time_t shm_ctime;
  983. compat_ipc_pid_t shm_cpid;
  984. compat_ipc_pid_t shm_lpid;
  985. unsigned short shm_nattch;
  986. };
  987. static inline int sunos_shmid_get(struct shmid_ds32 __user *user,
  988. struct shmid_ds *kern)
  989. {
  990. if (get_user(kern->shm_perm.key, &user->shm_perm.key) ||
  991. __get_user(kern->shm_perm.uid, &user->shm_perm.uid) ||
  992. __get_user(kern->shm_perm.gid, &user->shm_perm.gid) ||
  993. __get_user(kern->shm_perm.cuid, &user->shm_perm.cuid) ||
  994. __get_user(kern->shm_perm.cgid, &user->shm_perm.cgid) ||
  995. __get_user(kern->shm_segsz, &user->shm_segsz) ||
  996. __get_user(kern->shm_atime, &user->shm_atime) ||
  997. __get_user(kern->shm_dtime, &user->shm_dtime) ||
  998. __get_user(kern->shm_ctime, &user->shm_ctime) ||
  999. __get_user(kern->shm_cpid, &user->shm_cpid) ||
  1000. __get_user(kern->shm_lpid, &user->shm_lpid) ||
  1001. __get_user(kern->shm_nattch, &user->shm_nattch))
  1002. return -EFAULT;
  1003. return 0;
  1004. }
  1005. static inline int sunos_shmid_put(struct shmid_ds32 __user *user,
  1006. struct shmid_ds *kern)
  1007. {
  1008. if (put_user(kern->shm_perm.key, &user->shm_perm.key) ||
  1009. __put_user(kern->shm_perm.uid, &user->shm_perm.uid) ||
  1010. __put_user(kern->shm_perm.gid, &user->shm_perm.gid) ||
  1011. __put_user(kern->shm_perm.cuid, &user->shm_perm.cuid) ||
  1012. __put_user(kern->shm_perm.cgid, &user->shm_perm.cgid) ||
  1013. __put_user(kern->shm_segsz, &user->shm_segsz) ||
  1014. __put_user(kern->shm_atime, &user->shm_atime) ||
  1015. __put_user(kern->shm_dtime, &user->shm_dtime) ||
  1016. __put_user(kern->shm_ctime, &user->shm_ctime) ||
  1017. __put_user(kern->shm_cpid, &user->shm_cpid) ||
  1018. __put_user(kern->shm_lpid, &user->shm_lpid) ||
  1019. __put_user(kern->shm_nattch, &user->shm_nattch))
  1020. return -EFAULT;
  1021. return 0;
  1022. }
  1023. asmlinkage int sunos_shmsys(int op, u32 arg1, u32 arg2, u32 arg3)
  1024. {
  1025. struct shmid_ds ksds;
  1026. unsigned long raddr;
  1027. mm_segment_t old_fs = get_fs();
  1028. int rval;
  1029. switch(op) {
  1030. case 0:
  1031. /* do_shmat(): attach a shared memory area */
  1032. rval = do_shmat((int)arg1,(char __user *)(unsigned long)arg2,(int)arg3,&raddr);
  1033. if (!rval)
  1034. rval = (int) raddr;
  1035. break;
  1036. case 1:
  1037. /* sys_shmctl(): modify shared memory area attr. */
  1038. if (!sunos_shmid_get((struct shmid_ds32 __user *)(unsigned long)arg3, &ksds)) {
  1039. set_fs(KERNEL_DS);
  1040. rval = sys_shmctl((int) arg1,(int) arg2,
  1041. (struct shmid_ds __user *) &ksds);
  1042. set_fs(old_fs);
  1043. if (!rval)
  1044. rval = sunos_shmid_put((struct shmid_ds32 __user *)(unsigned long)arg3,
  1045. &ksds);
  1046. } else
  1047. rval = -EFAULT;
  1048. break;
  1049. case 2:
  1050. /* sys_shmdt(): detach a shared memory area */
  1051. rval = sys_shmdt((char __user *)(unsigned long)arg1);
  1052. break;
  1053. case 3:
  1054. /* sys_shmget(): get a shared memory area */
  1055. rval = sys_shmget((key_t)arg1,(int)arg2,(int)arg3);
  1056. break;
  1057. default:
  1058. rval = -EINVAL;
  1059. break;
  1060. };
  1061. return rval;
  1062. }
  1063. extern asmlinkage long sparc32_open(const char __user * filename, int flags, int mode);
  1064. asmlinkage int sunos_open(u32 fname, int flags, int mode)
  1065. {
  1066. const char __user *filename = compat_ptr(fname);
  1067. return sparc32_open(filename, flags, mode);
  1068. }
  1069. #define SUNOS_EWOULDBLOCK 35
  1070. /* see the sunos man page read(2v) for an explanation
  1071. of this garbage. We use O_NDELAY to mark
  1072. file descriptors that have been set non-blocking
  1073. using 4.2BSD style calls. (tridge) */
  1074. static inline int check_nonblock(int ret, int fd)
  1075. {
  1076. if (ret == -EAGAIN) {
  1077. struct file * file = fget(fd);
  1078. if (file) {
  1079. if (file->f_flags & O_NDELAY)
  1080. ret = -SUNOS_EWOULDBLOCK;
  1081. fput(file);
  1082. }
  1083. }
  1084. return ret;
  1085. }
  1086. asmlinkage int sunos_read(unsigned int fd, char __user *buf, u32 count)
  1087. {
  1088. int ret;
  1089. ret = check_nonblock(sys_read(fd, buf, count), fd);
  1090. return ret;
  1091. }
  1092. asmlinkage int sunos_readv(u32 fd, void __user *vector, s32 count)
  1093. {
  1094. int ret;
  1095. ret = check_nonblock(compat_sys_readv(fd, vector, count), fd);
  1096. return ret;
  1097. }
  1098. asmlinkage int sunos_write(unsigned int fd, char __user *buf, u32 count)
  1099. {
  1100. int ret;
  1101. ret = check_nonblock(sys_write(fd, buf, count), fd);
  1102. return ret;
  1103. }
  1104. asmlinkage int sunos_writev(u32 fd, void __user *vector, s32 count)
  1105. {
  1106. int ret;
  1107. ret = check_nonblock(compat_sys_writev(fd, vector, count), fd);
  1108. return ret;
  1109. }
  1110. asmlinkage int sunos_recv(u32 __fd, void __user *ubuf, int size, unsigned flags)
  1111. {
  1112. int ret, fd = (int) __fd;
  1113. ret = check_nonblock(sys_recv(fd, ubuf, size, flags), fd);
  1114. return ret;
  1115. }
  1116. asmlinkage int sunos_send(u32 __fd, void __user *buff, int len, unsigned flags)
  1117. {
  1118. int ret, fd = (int) __fd;
  1119. ret = check_nonblock(sys_send(fd, buff, len, flags), fd);
  1120. return ret;
  1121. }
  1122. asmlinkage int sunos_accept(u32 __fd, struct sockaddr __user *sa, int __user *addrlen)
  1123. {
  1124. int ret, fd = (int) __fd;
  1125. while (1) {
  1126. ret = check_nonblock(sys_accept(fd, sa, addrlen), fd);
  1127. if (ret != -ENETUNREACH && ret != -EHOSTUNREACH)
  1128. break;
  1129. }
  1130. return ret;
  1131. }
  1132. #define SUNOS_SV_INTERRUPT 2
  1133. asmlinkage int sunos_sigaction (int sig,
  1134. struct old_sigaction32 __user *act,
  1135. struct old_sigaction32 __user *oact)
  1136. {
  1137. struct k_sigaction new_ka, old_ka;
  1138. int ret;
  1139. if (act) {
  1140. compat_old_sigset_t mask;
  1141. u32 u_handler;
  1142. if (get_user(u_handler, &act->sa_handler) ||
  1143. __get_user(new_ka.sa.sa_flags, &act->sa_flags))
  1144. return -EFAULT;
  1145. new_ka.sa.sa_handler = compat_ptr(u_handler);
  1146. __get_user(mask, &act->sa_mask);
  1147. new_ka.sa.sa_restorer = NULL;
  1148. new_ka.ka_restorer = NULL;
  1149. siginitset(&new_ka.sa.sa_mask, mask);
  1150. new_ka.sa.sa_flags ^= SUNOS_SV_INTERRUPT;
  1151. }
  1152. ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
  1153. if (!ret && oact) {
  1154. old_ka.sa.sa_flags ^= SUNOS_SV_INTERRUPT;
  1155. if (put_user(ptr_to_compat(old_ka.sa.sa_handler), &oact->sa_handler) ||
  1156. __put_user(old_ka.sa.sa_flags, &oact->sa_flags))
  1157. return -EFAULT;
  1158. __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask);
  1159. }
  1160. return ret;
  1161. }
  1162. asmlinkage int sunos_setsockopt(u32 __fd, u32 __level, u32 __optname,
  1163. char __user *optval, u32 __optlen)
  1164. {
  1165. int fd = (int) __fd;
  1166. int level = (int) __level;
  1167. int optname = (int) __optname;
  1168. int optlen = (int) __optlen;
  1169. int tr_opt = optname;
  1170. int ret;
  1171. if (level == SOL_IP) {
  1172. /* Multicast socketopts (ttl, membership) */
  1173. if (tr_opt >=2 && tr_opt <= 6)
  1174. tr_opt += 30;
  1175. }
  1176. ret = sys_setsockopt(fd, level, tr_opt,
  1177. optval, optlen);
  1178. return ret;
  1179. }
  1180. asmlinkage int sunos_getsockopt(u32 __fd, u32 __level, u32 __optname,
  1181. char __user *optval, int __user *optlen)
  1182. {
  1183. int fd = (int) __fd;
  1184. int level = (int) __level;
  1185. int optname = (int) __optname;
  1186. int tr_opt = optname;
  1187. int ret;
  1188. if (level == SOL_IP) {
  1189. /* Multicast socketopts (ttl, membership) */
  1190. if (tr_opt >=2 && tr_opt <= 6)
  1191. tr_opt += 30;
  1192. }
  1193. ret = compat_sys_getsockopt(fd, level, tr_opt,
  1194. optval, optlen);
  1195. return ret;
  1196. }