sys_sunos32.c 33 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352
  1. /* $Id: sys_sunos32.c,v 1.64 2002/02/09 19:49:31 davem Exp $
  2. * sys_sunos32.c: SunOS binary compatibility layer on sparc64.
  3. *
  4. * Copyright (C) 1995, 1996, 1997 David S. Miller (davem@caip.rutgers.edu)
  5. * Copyright (C) 1995 Miguel de Icaza (miguel@nuclecu.unam.mx)
  6. *
  7. * Based upon preliminary work which is:
  8. *
  9. * Copyright (C) 1995 Adrian M. Rodriguez (adrian@remus.rutgers.edu)
  10. */
  11. #include <linux/kernel.h>
  12. #include <linux/sched.h>
  13. #include <linux/types.h>
  14. #include <linux/capability.h>
  15. #include <linux/compat.h>
  16. #include <linux/mman.h>
  17. #include <linux/mm.h>
  18. #include <linux/swap.h>
  19. #include <linux/fs.h>
  20. #include <linux/file.h>
  21. #include <linux/resource.h>
  22. #include <linux/ipc.h>
  23. #include <linux/shm.h>
  24. #include <linux/msg.h>
  25. #include <linux/sem.h>
  26. #include <linux/signal.h>
  27. #include <linux/uio.h>
  28. #include <linux/utsname.h>
  29. #include <linux/major.h>
  30. #include <linux/stat.h>
  31. #include <linux/slab.h>
  32. #include <linux/pagemap.h>
  33. #include <linux/errno.h>
  34. #include <linux/smp.h>
  35. #include <linux/smp_lock.h>
  36. #include <linux/syscalls.h>
  37. #include <asm/uaccess.h>
  38. #include <asm/page.h>
  39. #include <asm/pgtable.h>
  40. #include <asm/pconf.h>
  41. #include <asm/idprom.h> /* for gethostid() */
  42. #include <asm/unistd.h>
  43. #include <asm/system.h>
  44. /* For the nfs mount emulation */
  45. #include <linux/socket.h>
  46. #include <linux/in.h>
  47. #include <linux/nfs.h>
  48. #include <linux/nfs2.h>
  49. #include <linux/nfs_mount.h>
  50. /* for sunos_select */
  51. #include <linux/time.h>
  52. #include <linux/personality.h>
  53. /* For SOCKET_I */
  54. #include <linux/socket.h>
  55. #include <net/sock.h>
  56. #include <net/compat.h>
  57. #define SUNOS_NR_OPEN 256
  58. asmlinkage u32 sunos_mmap(u32 addr, u32 len, u32 prot, u32 flags, u32 fd, u32 off)
  59. {
  60. struct file *file = NULL;
  61. unsigned long retval, ret_type;
  62. if (flags & MAP_NORESERVE) {
  63. static int cnt;
  64. if (cnt++ < 10)
  65. printk("%s: unimplemented SunOS MAP_NORESERVE mmap() flag\n",
  66. current->comm);
  67. flags &= ~MAP_NORESERVE;
  68. }
  69. retval = -EBADF;
  70. if (!(flags & MAP_ANONYMOUS)) {
  71. struct inode * inode;
  72. if (fd >= SUNOS_NR_OPEN)
  73. goto out;
  74. file = fget(fd);
  75. if (!file)
  76. goto out;
  77. inode = file->f_dentry->d_inode;
  78. if (imajor(inode) == MEM_MAJOR && iminor(inode) == 5) {
  79. flags |= MAP_ANONYMOUS;
  80. fput(file);
  81. file = NULL;
  82. }
  83. }
  84. retval = -EINVAL;
  85. if (!(flags & MAP_FIXED))
  86. addr = 0;
  87. else if (len > 0xf0000000 || addr > 0xf0000000 - len)
  88. goto out_putf;
  89. ret_type = flags & _MAP_NEW;
  90. flags &= ~_MAP_NEW;
  91. flags &= ~(MAP_EXECUTABLE | MAP_DENYWRITE);
  92. down_write(&current->mm->mmap_sem);
  93. retval = do_mmap(file,
  94. (unsigned long) addr, (unsigned long) len,
  95. (unsigned long) prot, (unsigned long) flags,
  96. (unsigned long) off);
  97. up_write(&current->mm->mmap_sem);
  98. if (!ret_type)
  99. retval = ((retval < 0xf0000000) ? 0 : retval);
  100. out_putf:
  101. if (file)
  102. fput(file);
  103. out:
  104. return (u32) retval;
  105. }
  106. asmlinkage int sunos_mctl(u32 addr, u32 len, int function, u32 arg)
  107. {
  108. return 0;
  109. }
  110. asmlinkage int sunos_brk(u32 baddr)
  111. {
  112. int freepages, retval = -ENOMEM;
  113. unsigned long rlim;
  114. unsigned long newbrk, oldbrk, brk = (unsigned long) baddr;
  115. down_write(&current->mm->mmap_sem);
  116. if (brk < current->mm->end_code)
  117. goto out;
  118. newbrk = PAGE_ALIGN(brk);
  119. oldbrk = PAGE_ALIGN(current->mm->brk);
  120. retval = 0;
  121. if (oldbrk == newbrk) {
  122. current->mm->brk = brk;
  123. goto out;
  124. }
  125. /* Always allow shrinking brk. */
  126. if (brk <= current->mm->brk) {
  127. current->mm->brk = brk;
  128. do_munmap(current->mm, newbrk, oldbrk-newbrk);
  129. goto out;
  130. }
  131. /* Check against rlimit and stack.. */
  132. retval = -ENOMEM;
  133. rlim = current->signal->rlim[RLIMIT_DATA].rlim_cur;
  134. if (rlim >= RLIM_INFINITY)
  135. rlim = ~0;
  136. if (brk - current->mm->end_code > rlim)
  137. goto out;
  138. /* Check against existing mmap mappings. */
  139. if (find_vma_intersection(current->mm, oldbrk, newbrk+PAGE_SIZE))
  140. goto out;
  141. /* stupid algorithm to decide if we have enough memory: while
  142. * simple, it hopefully works in most obvious cases.. Easy to
  143. * fool it, but this should catch most mistakes.
  144. */
  145. freepages = global_page_state(NR_FILE_PAGES);
  146. freepages >>= 1;
  147. freepages += nr_free_pages();
  148. freepages += nr_swap_pages;
  149. freepages -= num_physpages >> 4;
  150. freepages -= (newbrk-oldbrk) >> PAGE_SHIFT;
  151. if (freepages < 0)
  152. goto out;
  153. /* Ok, we have probably got enough memory - let it rip. */
  154. current->mm->brk = brk;
  155. do_brk(oldbrk, newbrk-oldbrk);
  156. retval = 0;
  157. out:
  158. up_write(&current->mm->mmap_sem);
  159. return retval;
  160. }
  161. asmlinkage u32 sunos_sbrk(int increment)
  162. {
  163. int error, oldbrk;
  164. /* This should do it hopefully... */
  165. oldbrk = (int)current->mm->brk;
  166. error = sunos_brk(((int) current->mm->brk) + increment);
  167. if (!error)
  168. error = oldbrk;
  169. return error;
  170. }
  171. asmlinkage u32 sunos_sstk(int increment)
  172. {
  173. printk("%s: Call to sunos_sstk(increment<%d>) is unsupported\n",
  174. current->comm, increment);
  175. return (u32)-1;
  176. }
  177. /* Give hints to the kernel as to what paging strategy to use...
  178. * Completely bogus, don't remind me.
  179. */
  180. #define VA_NORMAL 0 /* Normal vm usage expected */
  181. #define VA_ABNORMAL 1 /* Abnormal/random vm usage probable */
  182. #define VA_SEQUENTIAL 2 /* Accesses will be of a sequential nature */
  183. #define VA_INVALIDATE 3 /* Page table entries should be flushed ??? */
  184. static char *vstrings[] = {
  185. "VA_NORMAL",
  186. "VA_ABNORMAL",
  187. "VA_SEQUENTIAL",
  188. "VA_INVALIDATE",
  189. };
  190. asmlinkage void sunos_vadvise(u32 strategy)
  191. {
  192. static int count;
  193. /* I wanna see who uses this... */
  194. if (count++ < 5)
  195. printk("%s: Advises us to use %s paging strategy\n",
  196. current->comm,
  197. strategy <= 3 ? vstrings[strategy] : "BOGUS");
  198. }
  199. /* This just wants the soft limit (ie. rlim_cur element) of the RLIMIT_NOFILE
  200. * resource limit and is for backwards compatibility with older sunos
  201. * revs.
  202. */
  203. asmlinkage int sunos_getdtablesize(void)
  204. {
  205. return SUNOS_NR_OPEN;
  206. }
  207. #define _BLOCKABLE (~(sigmask(SIGKILL) | sigmask(SIGSTOP)))
  208. asmlinkage u32 sunos_sigblock(u32 blk_mask)
  209. {
  210. u32 old;
  211. spin_lock_irq(&current->sighand->siglock);
  212. old = (u32) current->blocked.sig[0];
  213. current->blocked.sig[0] |= (blk_mask & _BLOCKABLE);
  214. recalc_sigpending();
  215. spin_unlock_irq(&current->sighand->siglock);
  216. return old;
  217. }
  218. asmlinkage u32 sunos_sigsetmask(u32 newmask)
  219. {
  220. u32 retval;
  221. spin_lock_irq(&current->sighand->siglock);
  222. retval = (u32) current->blocked.sig[0];
  223. current->blocked.sig[0] = (newmask & _BLOCKABLE);
  224. recalc_sigpending();
  225. spin_unlock_irq(&current->sighand->siglock);
  226. return retval;
  227. }
  228. /* SunOS getdents is very similar to the newer Linux (iBCS2 compliant) */
  229. /* getdents system call, the format of the structure just has a different */
  230. /* layout (d_off+d_ino instead of d_ino+d_off) */
  231. struct sunos_dirent {
  232. s32 d_off;
  233. u32 d_ino;
  234. u16 d_reclen;
  235. u16 d_namlen;
  236. char d_name[1];
  237. };
  238. struct sunos_dirent_callback {
  239. struct sunos_dirent __user *curr;
  240. struct sunos_dirent __user *previous;
  241. int count;
  242. int error;
  243. };
  244. #define NAME_OFFSET(de) ((int) ((de)->d_name - (char __user *) (de)))
  245. #define ROUND_UP(x) (((x)+sizeof(s32)-1) & ~(sizeof(s32)-1))
  246. static int sunos_filldir(void * __buf, const char * name, int namlen,
  247. loff_t offset, ino_t ino, unsigned int d_type)
  248. {
  249. struct sunos_dirent __user *dirent;
  250. struct sunos_dirent_callback * buf = (struct sunos_dirent_callback *) __buf;
  251. int reclen = ROUND_UP(NAME_OFFSET(dirent) + namlen + 1);
  252. u32 d_ino;
  253. buf->error = -EINVAL; /* only used if we fail.. */
  254. if (reclen > buf->count)
  255. return -EINVAL;
  256. d_ino = ino;
  257. if (sizeof(d_ino) < sizeof(ino) && d_ino != ino)
  258. return -EOVERFLOW;
  259. dirent = buf->previous;
  260. if (dirent)
  261. put_user(offset, &dirent->d_off);
  262. dirent = buf->curr;
  263. buf->previous = dirent;
  264. put_user(d_ino, &dirent->d_ino);
  265. put_user(namlen, &dirent->d_namlen);
  266. put_user(reclen, &dirent->d_reclen);
  267. if (copy_to_user(dirent->d_name, name, namlen))
  268. return -EFAULT;
  269. put_user(0, dirent->d_name + namlen);
  270. dirent = (void __user *) dirent + reclen;
  271. buf->curr = dirent;
  272. buf->count -= reclen;
  273. return 0;
  274. }
  275. asmlinkage int sunos_getdents(unsigned int fd, void __user *dirent, int cnt)
  276. {
  277. struct file * file;
  278. struct sunos_dirent __user *lastdirent;
  279. struct sunos_dirent_callback buf;
  280. int error = -EBADF;
  281. if (fd >= SUNOS_NR_OPEN)
  282. goto out;
  283. file = fget(fd);
  284. if (!file)
  285. goto out;
  286. error = -EINVAL;
  287. if (cnt < (sizeof(struct sunos_dirent) + 255))
  288. goto out_putf;
  289. buf.curr = (struct sunos_dirent __user *) dirent;
  290. buf.previous = NULL;
  291. buf.count = cnt;
  292. buf.error = 0;
  293. error = vfs_readdir(file, sunos_filldir, &buf);
  294. if (error < 0)
  295. goto out_putf;
  296. lastdirent = buf.previous;
  297. error = buf.error;
  298. if (lastdirent) {
  299. put_user(file->f_pos, &lastdirent->d_off);
  300. error = cnt - buf.count;
  301. }
  302. out_putf:
  303. fput(file);
  304. out:
  305. return error;
  306. }
  307. /* Old sunos getdirentries, severely broken compatibility stuff here. */
  308. struct sunos_direntry {
  309. u32 d_ino;
  310. u16 d_reclen;
  311. u16 d_namlen;
  312. char d_name[1];
  313. };
  314. struct sunos_direntry_callback {
  315. struct sunos_direntry __user *curr;
  316. struct sunos_direntry __user *previous;
  317. int count;
  318. int error;
  319. };
  320. static int sunos_filldirentry(void * __buf, const char * name, int namlen,
  321. loff_t offset, ino_t ino, unsigned int d_type)
  322. {
  323. struct sunos_direntry __user *dirent;
  324. struct sunos_direntry_callback * buf =
  325. (struct sunos_direntry_callback *) __buf;
  326. int reclen = ROUND_UP(NAME_OFFSET(dirent) + namlen + 1);
  327. u32 d_ino;
  328. buf->error = -EINVAL; /* only used if we fail.. */
  329. if (reclen > buf->count)
  330. return -EINVAL;
  331. d_ino = ino;
  332. if (sizeof(d_ino) < sizeof(ino) && d_ino != ino)
  333. return -EOVERFLOW;
  334. dirent = buf->previous;
  335. dirent = buf->curr;
  336. buf->previous = dirent;
  337. put_user(d_ino, &dirent->d_ino);
  338. put_user(namlen, &dirent->d_namlen);
  339. put_user(reclen, &dirent->d_reclen);
  340. if (copy_to_user(dirent->d_name, name, namlen))
  341. return -EFAULT;
  342. put_user(0, dirent->d_name + namlen);
  343. dirent = (void __user *) dirent + reclen;
  344. buf->curr = dirent;
  345. buf->count -= reclen;
  346. return 0;
  347. }
  348. asmlinkage int sunos_getdirentries(unsigned int fd,
  349. void __user *dirent,
  350. int cnt,
  351. unsigned int __user *basep)
  352. {
  353. struct file * file;
  354. struct sunos_direntry __user *lastdirent;
  355. int error = -EBADF;
  356. struct sunos_direntry_callback buf;
  357. if (fd >= SUNOS_NR_OPEN)
  358. goto out;
  359. file = fget(fd);
  360. if (!file)
  361. goto out;
  362. error = -EINVAL;
  363. if (cnt < (sizeof(struct sunos_direntry) + 255))
  364. goto out_putf;
  365. buf.curr = (struct sunos_direntry __user *) dirent;
  366. buf.previous = NULL;
  367. buf.count = cnt;
  368. buf.error = 0;
  369. error = vfs_readdir(file, sunos_filldirentry, &buf);
  370. if (error < 0)
  371. goto out_putf;
  372. lastdirent = buf.previous;
  373. error = buf.error;
  374. if (lastdirent) {
  375. put_user(file->f_pos, basep);
  376. error = cnt - buf.count;
  377. }
  378. out_putf:
  379. fput(file);
  380. out:
  381. return error;
  382. }
  383. struct sunos_utsname {
  384. char sname[9];
  385. char nname[9];
  386. char nnext[56];
  387. char rel[9];
  388. char ver[9];
  389. char mach[9];
  390. };
  391. asmlinkage int sunos_uname(struct sunos_utsname __user *name)
  392. {
  393. int ret;
  394. down_read(&uts_sem);
  395. ret = copy_to_user(&name->sname[0], &utsname()->sysname[0],
  396. sizeof(name->sname) - 1);
  397. ret |= copy_to_user(&name->nname[0], &utsname()->nodename[0],
  398. sizeof(name->nname) - 1);
  399. ret |= put_user('\0', &name->nname[8]);
  400. ret |= copy_to_user(&name->rel[0], &utsname()->release[0],
  401. sizeof(name->rel) - 1);
  402. ret |= copy_to_user(&name->ver[0], &utsname()->version[0],
  403. sizeof(name->ver) - 1);
  404. ret |= copy_to_user(&name->mach[0], &utsname()->machine[0],
  405. sizeof(name->mach) - 1);
  406. up_read(&uts_sem);
  407. return (ret ? -EFAULT : 0);
  408. }
  409. asmlinkage int sunos_nosys(void)
  410. {
  411. struct pt_regs *regs;
  412. siginfo_t info;
  413. static int cnt;
  414. regs = current_thread_info()->kregs;
  415. if (test_thread_flag(TIF_32BIT)) {
  416. regs->tpc &= 0xffffffff;
  417. regs->tnpc &= 0xffffffff;
  418. }
  419. info.si_signo = SIGSYS;
  420. info.si_errno = 0;
  421. info.si_code = __SI_FAULT|0x100;
  422. info.si_addr = (void __user *)regs->tpc;
  423. info.si_trapno = regs->u_regs[UREG_G1];
  424. send_sig_info(SIGSYS, &info, current);
  425. if (cnt++ < 4) {
  426. printk("Process makes ni_syscall number %d, register dump:\n",
  427. (int) regs->u_regs[UREG_G1]);
  428. show_regs(regs);
  429. }
  430. return -ENOSYS;
  431. }
  432. /* This is not a real and complete implementation yet, just to keep
  433. * the easy SunOS binaries happy.
  434. */
  435. asmlinkage int sunos_fpathconf(int fd, int name)
  436. {
  437. int ret;
  438. switch(name) {
  439. case _PCONF_LINK:
  440. ret = LINK_MAX;
  441. break;
  442. case _PCONF_CANON:
  443. ret = MAX_CANON;
  444. break;
  445. case _PCONF_INPUT:
  446. ret = MAX_INPUT;
  447. break;
  448. case _PCONF_NAME:
  449. ret = NAME_MAX;
  450. break;
  451. case _PCONF_PATH:
  452. ret = PATH_MAX;
  453. break;
  454. case _PCONF_PIPE:
  455. ret = PIPE_BUF;
  456. break;
  457. case _PCONF_CHRESTRICT: /* XXX Investigate XXX */
  458. ret = 1;
  459. break;
  460. case _PCONF_NOTRUNC: /* XXX Investigate XXX */
  461. case _PCONF_VDISABLE:
  462. ret = 0;
  463. break;
  464. default:
  465. ret = -EINVAL;
  466. break;
  467. }
  468. return ret;
  469. }
  470. asmlinkage int sunos_pathconf(u32 u_path, int name)
  471. {
  472. int ret;
  473. ret = sunos_fpathconf(0, name); /* XXX cheese XXX */
  474. return ret;
  475. }
  476. asmlinkage int sunos_select(int width, u32 inp, u32 outp, u32 exp, u32 tvp_x)
  477. {
  478. int ret;
  479. /* SunOS binaries expect that select won't change the tvp contents */
  480. ret = compat_sys_select(width, compat_ptr(inp), compat_ptr(outp),
  481. compat_ptr(exp), compat_ptr(tvp_x));
  482. if (ret == -EINTR && tvp_x) {
  483. struct compat_timeval __user *tvp = compat_ptr(tvp_x);
  484. time_t sec, usec;
  485. __get_user(sec, &tvp->tv_sec);
  486. __get_user(usec, &tvp->tv_usec);
  487. if (sec == 0 && usec == 0)
  488. ret = 0;
  489. }
  490. return ret;
  491. }
  492. asmlinkage void sunos_nop(void)
  493. {
  494. return;
  495. }
  496. #if 0 /* This code doesn't translate user pointers correctly,
  497. * disable for now. -DaveM
  498. */
  499. /* XXXXXXXXXX SunOS mount/umount. XXXXXXXXXXX */
  500. #define SMNT_RDONLY 1
  501. #define SMNT_NOSUID 2
  502. #define SMNT_NEWTYPE 4
  503. #define SMNT_GRPID 8
  504. #define SMNT_REMOUNT 16
  505. #define SMNT_NOSUB 32
  506. #define SMNT_MULTI 64
  507. #define SMNT_SYS5 128
  508. struct sunos_fh_t {
  509. char fh_data [NFS_FHSIZE];
  510. };
  511. struct sunos_nfs_mount_args {
  512. struct sockaddr_in *addr; /* file server address */
  513. struct nfs_fh *fh; /* File handle to be mounted */
  514. int flags; /* flags */
  515. int wsize; /* write size in bytes */
  516. int rsize; /* read size in bytes */
  517. int timeo; /* initial timeout in .1 secs */
  518. int retrans; /* times to retry send */
  519. char *hostname; /* server's hostname */
  520. int acregmin; /* attr cache file min secs */
  521. int acregmax; /* attr cache file max secs */
  522. int acdirmin; /* attr cache dir min secs */
  523. int acdirmax; /* attr cache dir max secs */
  524. char *netname; /* server's netname */
  525. };
  526. /* Bind the socket on a local reserved port and connect it to the
  527. * remote server. This on Linux/i386 is done by the mount program,
  528. * not by the kernel.
  529. */
  530. /* XXXXXXXXXXXXXXXXXXXX */
  531. static int
  532. sunos_nfs_get_server_fd (int fd, struct sockaddr_in *addr)
  533. {
  534. struct sockaddr_in local;
  535. struct sockaddr_in server;
  536. int try_port;
  537. int ret;
  538. struct socket *socket;
  539. struct inode *inode;
  540. struct file *file;
  541. file = fget(fd);
  542. if (!file)
  543. return 0;
  544. inode = file->f_dentry->d_inode;
  545. socket = SOCKET_I(inode);
  546. local.sin_family = AF_INET;
  547. local.sin_addr.s_addr = INADDR_ANY;
  548. /* IPPORT_RESERVED = 1024, can't find the definition in the kernel */
  549. try_port = 1024;
  550. do {
  551. local.sin_port = htons (--try_port);
  552. ret = socket->ops->bind(socket, (struct sockaddr*)&local,
  553. sizeof(local));
  554. } while (ret && try_port > (1024 / 2));
  555. if (ret) {
  556. fput(file);
  557. return 0;
  558. }
  559. server.sin_family = AF_INET;
  560. server.sin_addr = addr->sin_addr;
  561. server.sin_port = NFS_PORT;
  562. /* Call sys_connect */
  563. ret = socket->ops->connect (socket, (struct sockaddr *) &server,
  564. sizeof (server), file->f_flags);
  565. fput(file);
  566. if (ret < 0)
  567. return 0;
  568. return 1;
  569. }
  570. /* XXXXXXXXXXXXXXXXXXXX */
  571. static int get_default (int value, int def_value)
  572. {
  573. if (value)
  574. return value;
  575. else
  576. return def_value;
  577. }
  578. /* XXXXXXXXXXXXXXXXXXXX */
  579. static int sunos_nfs_mount(char *dir_name, int linux_flags, void __user *data)
  580. {
  581. int server_fd, err;
  582. char *the_name, *mount_page;
  583. struct nfs_mount_data linux_nfs_mount;
  584. struct sunos_nfs_mount_args sunos_mount;
  585. /* Ok, here comes the fun part: Linux's nfs mount needs a
  586. * socket connection to the server, but SunOS mount does not
  587. * require this, so we use the information on the destination
  588. * address to create a socket and bind it to a reserved
  589. * port on this system
  590. */
  591. if (copy_from_user(&sunos_mount, data, sizeof(sunos_mount)))
  592. return -EFAULT;
  593. server_fd = sys_socket (AF_INET, SOCK_DGRAM, IPPROTO_UDP);
  594. if (server_fd < 0)
  595. return -ENXIO;
  596. if (copy_from_user(&linux_nfs_mount.addr, sunos_mount.addr,
  597. sizeof(*sunos_mount.addr)) ||
  598. copy_from_user(&linux_nfs_mount.root, sunos_mount.fh,
  599. sizeof(*sunos_mount.fh))) {
  600. sys_close (server_fd);
  601. return -EFAULT;
  602. }
  603. if (!sunos_nfs_get_server_fd (server_fd, &linux_nfs_mount.addr)){
  604. sys_close (server_fd);
  605. return -ENXIO;
  606. }
  607. /* Now, bind it to a locally reserved port */
  608. linux_nfs_mount.version = NFS_MOUNT_VERSION;
  609. linux_nfs_mount.flags = sunos_mount.flags;
  610. linux_nfs_mount.fd = server_fd;
  611. linux_nfs_mount.rsize = get_default (sunos_mount.rsize, 8192);
  612. linux_nfs_mount.wsize = get_default (sunos_mount.wsize, 8192);
  613. linux_nfs_mount.timeo = get_default (sunos_mount.timeo, 10);
  614. linux_nfs_mount.retrans = sunos_mount.retrans;
  615. linux_nfs_mount.acregmin = sunos_mount.acregmin;
  616. linux_nfs_mount.acregmax = sunos_mount.acregmax;
  617. linux_nfs_mount.acdirmin = sunos_mount.acdirmin;
  618. linux_nfs_mount.acdirmax = sunos_mount.acdirmax;
  619. the_name = getname(sunos_mount.hostname);
  620. if (IS_ERR(the_name))
  621. return PTR_ERR(the_name);
  622. strlcpy(linux_nfs_mount.hostname, the_name,
  623. sizeof(linux_nfs_mount.hostname));
  624. putname (the_name);
  625. mount_page = (char *) get_zeroed_page(GFP_KERNEL);
  626. if (!mount_page)
  627. return -ENOMEM;
  628. memcpy(mount_page, &linux_nfs_mount, sizeof(linux_nfs_mount));
  629. err = do_mount("", dir_name, "nfs", linux_flags, mount_page);
  630. free_page((unsigned long) mount_page);
  631. return err;
  632. }
  633. /* XXXXXXXXXXXXXXXXXXXX */
  634. asmlinkage int
  635. sunos_mount(char *type, char *dir, int flags, void *data)
  636. {
  637. int linux_flags = 0;
  638. int ret = -EINVAL;
  639. char *dev_fname = 0;
  640. char *dir_page, *type_page;
  641. if (!capable (CAP_SYS_ADMIN))
  642. return -EPERM;
  643. /* We don't handle the integer fs type */
  644. if ((flags & SMNT_NEWTYPE) == 0)
  645. goto out;
  646. /* Do not allow for those flags we don't support */
  647. if (flags & (SMNT_GRPID|SMNT_NOSUB|SMNT_MULTI|SMNT_SYS5))
  648. goto out;
  649. if (flags & SMNT_REMOUNT)
  650. linux_flags |= MS_REMOUNT;
  651. if (flags & SMNT_RDONLY)
  652. linux_flags |= MS_RDONLY;
  653. if (flags & SMNT_NOSUID)
  654. linux_flags |= MS_NOSUID;
  655. dir_page = getname(dir);
  656. ret = PTR_ERR(dir_page);
  657. if (IS_ERR(dir_page))
  658. goto out;
  659. type_page = getname(type);
  660. ret = PTR_ERR(type_page);
  661. if (IS_ERR(type_page))
  662. goto out1;
  663. if (strcmp(type_page, "ext2") == 0) {
  664. dev_fname = getname(data);
  665. } else if (strcmp(type_page, "iso9660") == 0) {
  666. dev_fname = getname(data);
  667. } else if (strcmp(type_page, "minix") == 0) {
  668. dev_fname = getname(data);
  669. } else if (strcmp(type_page, "nfs") == 0) {
  670. ret = sunos_nfs_mount (dir_page, flags, data);
  671. goto out2;
  672. } else if (strcmp(type_page, "ufs") == 0) {
  673. printk("Warning: UFS filesystem mounts unsupported.\n");
  674. ret = -ENODEV;
  675. goto out2;
  676. } else if (strcmp(type_page, "proc")) {
  677. ret = -ENODEV;
  678. goto out2;
  679. }
  680. ret = PTR_ERR(dev_fname);
  681. if (IS_ERR(dev_fname))
  682. goto out2;
  683. lock_kernel();
  684. ret = do_mount(dev_fname, dir_page, type_page, linux_flags, NULL);
  685. unlock_kernel();
  686. if (dev_fname)
  687. putname(dev_fname);
  688. out2:
  689. putname(type_page);
  690. out1:
  691. putname(dir_page);
  692. out:
  693. return ret;
  694. }
  695. #endif
  696. asmlinkage int sunos_setpgrp(pid_t pid, pid_t pgid)
  697. {
  698. int ret;
  699. /* So stupid... */
  700. if ((!pid || pid == current->pid) &&
  701. !pgid) {
  702. sys_setsid();
  703. ret = 0;
  704. } else {
  705. ret = sys_setpgid(pid, pgid);
  706. }
  707. return ret;
  708. }
  709. /* So stupid... */
  710. extern long compat_sys_wait4(compat_pid_t, compat_uint_t __user *, int,
  711. struct compat_rusage __user *);
  712. asmlinkage int sunos_wait4(compat_pid_t pid, compat_uint_t __user *stat_addr, int options, struct compat_rusage __user *ru)
  713. {
  714. int ret;
  715. ret = compat_sys_wait4((pid ? pid : ((compat_pid_t)-1)),
  716. stat_addr, options, ru);
  717. return ret;
  718. }
  719. extern int kill_pg(int, int, int);
  720. asmlinkage int sunos_killpg(int pgrp, int sig)
  721. {
  722. return kill_pg(pgrp, sig, 0);
  723. }
  724. asmlinkage int sunos_audit(void)
  725. {
  726. printk ("sys_audit\n");
  727. return -1;
  728. }
  729. asmlinkage u32 sunos_gethostid(void)
  730. {
  731. u32 ret;
  732. ret = (((u32)idprom->id_machtype << 24) | ((u32)idprom->id_sernum));
  733. return ret;
  734. }
  735. /* sysconf options, for SunOS compatibility */
  736. #define _SC_ARG_MAX 1
  737. #define _SC_CHILD_MAX 2
  738. #define _SC_CLK_TCK 3
  739. #define _SC_NGROUPS_MAX 4
  740. #define _SC_OPEN_MAX 5
  741. #define _SC_JOB_CONTROL 6
  742. #define _SC_SAVED_IDS 7
  743. #define _SC_VERSION 8
  744. asmlinkage s32 sunos_sysconf (int name)
  745. {
  746. s32 ret;
  747. switch (name){
  748. case _SC_ARG_MAX:
  749. ret = ARG_MAX;
  750. break;
  751. case _SC_CHILD_MAX:
  752. ret = -1; /* no limit */
  753. break;
  754. case _SC_CLK_TCK:
  755. ret = HZ;
  756. break;
  757. case _SC_NGROUPS_MAX:
  758. ret = NGROUPS_MAX;
  759. break;
  760. case _SC_OPEN_MAX:
  761. ret = OPEN_MAX;
  762. break;
  763. case _SC_JOB_CONTROL:
  764. ret = 1; /* yes, we do support job control */
  765. break;
  766. case _SC_SAVED_IDS:
  767. ret = 1; /* yes, we do support saved uids */
  768. break;
  769. case _SC_VERSION:
  770. /* mhm, POSIX_VERSION is in /usr/include/unistd.h
  771. * should it go on /usr/include/linux?
  772. */
  773. ret = 199009;
  774. break;
  775. default:
  776. ret = -1;
  777. break;
  778. };
  779. return ret;
  780. }
  781. asmlinkage int sunos_semsys(int op, u32 arg1, u32 arg2, u32 arg3, void __user *ptr)
  782. {
  783. union semun arg4;
  784. int ret;
  785. switch (op) {
  786. case 0:
  787. /* Most arguments match on a 1:1 basis but cmd doesn't */
  788. switch(arg3) {
  789. case 4:
  790. arg3=GETPID; break;
  791. case 5:
  792. arg3=GETVAL; break;
  793. case 6:
  794. arg3=GETALL; break;
  795. case 3:
  796. arg3=GETNCNT; break;
  797. case 7:
  798. arg3=GETZCNT; break;
  799. case 8:
  800. arg3=SETVAL; break;
  801. case 9:
  802. arg3=SETALL; break;
  803. }
  804. /* sys_semctl(): */
  805. /* value to modify semaphore to */
  806. arg4.__pad = ptr;
  807. ret = sys_semctl((int)arg1, (int)arg2, (int)arg3, arg4);
  808. break;
  809. case 1:
  810. /* sys_semget(): */
  811. ret = sys_semget((key_t)arg1, (int)arg2, (int)arg3);
  812. break;
  813. case 2:
  814. /* sys_semop(): */
  815. ret = sys_semop((int)arg1, (struct sembuf __user *)(unsigned long)arg2,
  816. (unsigned int) arg3);
  817. break;
  818. default:
  819. ret = -EINVAL;
  820. break;
  821. };
  822. return ret;
  823. }
  824. struct msgbuf32 {
  825. s32 mtype;
  826. char mtext[1];
  827. };
  828. struct ipc_perm32
  829. {
  830. key_t key;
  831. compat_uid_t uid;
  832. compat_gid_t gid;
  833. compat_uid_t cuid;
  834. compat_gid_t cgid;
  835. compat_mode_t mode;
  836. unsigned short seq;
  837. };
  838. struct msqid_ds32
  839. {
  840. struct ipc_perm32 msg_perm;
  841. u32 msg_first;
  842. u32 msg_last;
  843. compat_time_t msg_stime;
  844. compat_time_t msg_rtime;
  845. compat_time_t msg_ctime;
  846. u32 wwait;
  847. u32 rwait;
  848. unsigned short msg_cbytes;
  849. unsigned short msg_qnum;
  850. unsigned short msg_qbytes;
  851. compat_ipc_pid_t msg_lspid;
  852. compat_ipc_pid_t msg_lrpid;
  853. };
  854. static inline int sunos_msqid_get(struct msqid_ds32 __user *user,
  855. struct msqid_ds *kern)
  856. {
  857. if (get_user(kern->msg_perm.key, &user->msg_perm.key) ||
  858. __get_user(kern->msg_perm.uid, &user->msg_perm.uid) ||
  859. __get_user(kern->msg_perm.gid, &user->msg_perm.gid) ||
  860. __get_user(kern->msg_perm.cuid, &user->msg_perm.cuid) ||
  861. __get_user(kern->msg_perm.cgid, &user->msg_perm.cgid) ||
  862. __get_user(kern->msg_stime, &user->msg_stime) ||
  863. __get_user(kern->msg_rtime, &user->msg_rtime) ||
  864. __get_user(kern->msg_ctime, &user->msg_ctime) ||
  865. __get_user(kern->msg_ctime, &user->msg_cbytes) ||
  866. __get_user(kern->msg_ctime, &user->msg_qnum) ||
  867. __get_user(kern->msg_ctime, &user->msg_qbytes) ||
  868. __get_user(kern->msg_ctime, &user->msg_lspid) ||
  869. __get_user(kern->msg_ctime, &user->msg_lrpid))
  870. return -EFAULT;
  871. return 0;
  872. }
  873. static inline int sunos_msqid_put(struct msqid_ds32 __user *user,
  874. struct msqid_ds *kern)
  875. {
  876. if (put_user(kern->msg_perm.key, &user->msg_perm.key) ||
  877. __put_user(kern->msg_perm.uid, &user->msg_perm.uid) ||
  878. __put_user(kern->msg_perm.gid, &user->msg_perm.gid) ||
  879. __put_user(kern->msg_perm.cuid, &user->msg_perm.cuid) ||
  880. __put_user(kern->msg_perm.cgid, &user->msg_perm.cgid) ||
  881. __put_user(kern->msg_stime, &user->msg_stime) ||
  882. __put_user(kern->msg_rtime, &user->msg_rtime) ||
  883. __put_user(kern->msg_ctime, &user->msg_ctime) ||
  884. __put_user(kern->msg_ctime, &user->msg_cbytes) ||
  885. __put_user(kern->msg_ctime, &user->msg_qnum) ||
  886. __put_user(kern->msg_ctime, &user->msg_qbytes) ||
  887. __put_user(kern->msg_ctime, &user->msg_lspid) ||
  888. __put_user(kern->msg_ctime, &user->msg_lrpid))
  889. return -EFAULT;
  890. return 0;
  891. }
  892. static inline int sunos_msgbuf_get(struct msgbuf32 __user *user, struct msgbuf *kern, int len)
  893. {
  894. if (get_user(kern->mtype, &user->mtype) ||
  895. __copy_from_user(kern->mtext, &user->mtext, len))
  896. return -EFAULT;
  897. return 0;
  898. }
  899. static inline int sunos_msgbuf_put(struct msgbuf32 __user *user, struct msgbuf *kern, int len)
  900. {
  901. if (put_user(kern->mtype, &user->mtype) ||
  902. __copy_to_user(user->mtext, kern->mtext, len))
  903. return -EFAULT;
  904. return 0;
  905. }
  906. asmlinkage int sunos_msgsys(int op, u32 arg1, u32 arg2, u32 arg3, u32 arg4)
  907. {
  908. struct sparc_stackf32 __user *sp;
  909. struct msqid_ds kds;
  910. struct msgbuf *kmbuf;
  911. mm_segment_t old_fs = get_fs();
  912. u32 arg5;
  913. int rval;
  914. switch(op) {
  915. case 0:
  916. rval = sys_msgget((key_t)arg1, (int)arg2);
  917. break;
  918. case 1:
  919. if (!sunos_msqid_get((struct msqid_ds32 __user *)(unsigned long)arg3, &kds)) {
  920. set_fs(KERNEL_DS);
  921. rval = sys_msgctl((int)arg1, (int)arg2,
  922. (struct msqid_ds __user *)(unsigned long)arg3);
  923. set_fs(old_fs);
  924. if (!rval)
  925. rval = sunos_msqid_put((struct msqid_ds32 __user *)(unsigned long)arg3,
  926. &kds);
  927. } else
  928. rval = -EFAULT;
  929. break;
  930. case 2:
  931. rval = -EFAULT;
  932. kmbuf = (struct msgbuf *)kmalloc(sizeof(struct msgbuf) + arg3,
  933. GFP_KERNEL);
  934. if (!kmbuf)
  935. break;
  936. sp = (struct sparc_stackf32 __user *)
  937. (current_thread_info()->kregs->u_regs[UREG_FP] & 0xffffffffUL);
  938. if (get_user(arg5, &sp->xxargs[0])) {
  939. rval = -EFAULT;
  940. kfree(kmbuf);
  941. break;
  942. }
  943. set_fs(KERNEL_DS);
  944. rval = sys_msgrcv((int)arg1, (struct msgbuf __user *) kmbuf,
  945. (size_t)arg3,
  946. (long)arg4, (int)arg5);
  947. set_fs(old_fs);
  948. if (!rval)
  949. rval = sunos_msgbuf_put((struct msgbuf32 __user *)(unsigned long)arg2,
  950. kmbuf, arg3);
  951. kfree(kmbuf);
  952. break;
  953. case 3:
  954. rval = -EFAULT;
  955. kmbuf = (struct msgbuf *)kmalloc(sizeof(struct msgbuf) + arg3,
  956. GFP_KERNEL);
  957. if (!kmbuf || sunos_msgbuf_get((struct msgbuf32 __user *)(unsigned long)arg2,
  958. kmbuf, arg3))
  959. break;
  960. set_fs(KERNEL_DS);
  961. rval = sys_msgsnd((int)arg1, (struct msgbuf __user *) kmbuf,
  962. (size_t)arg3, (int)arg4);
  963. set_fs(old_fs);
  964. kfree(kmbuf);
  965. break;
  966. default:
  967. rval = -EINVAL;
  968. break;
  969. }
  970. return rval;
  971. }
  972. struct shmid_ds32 {
  973. struct ipc_perm32 shm_perm;
  974. int shm_segsz;
  975. compat_time_t shm_atime;
  976. compat_time_t shm_dtime;
  977. compat_time_t shm_ctime;
  978. compat_ipc_pid_t shm_cpid;
  979. compat_ipc_pid_t shm_lpid;
  980. unsigned short shm_nattch;
  981. };
  982. static inline int sunos_shmid_get(struct shmid_ds32 __user *user,
  983. struct shmid_ds *kern)
  984. {
  985. if (get_user(kern->shm_perm.key, &user->shm_perm.key) ||
  986. __get_user(kern->shm_perm.uid, &user->shm_perm.uid) ||
  987. __get_user(kern->shm_perm.gid, &user->shm_perm.gid) ||
  988. __get_user(kern->shm_perm.cuid, &user->shm_perm.cuid) ||
  989. __get_user(kern->shm_perm.cgid, &user->shm_perm.cgid) ||
  990. __get_user(kern->shm_segsz, &user->shm_segsz) ||
  991. __get_user(kern->shm_atime, &user->shm_atime) ||
  992. __get_user(kern->shm_dtime, &user->shm_dtime) ||
  993. __get_user(kern->shm_ctime, &user->shm_ctime) ||
  994. __get_user(kern->shm_cpid, &user->shm_cpid) ||
  995. __get_user(kern->shm_lpid, &user->shm_lpid) ||
  996. __get_user(kern->shm_nattch, &user->shm_nattch))
  997. return -EFAULT;
  998. return 0;
  999. }
  1000. static inline int sunos_shmid_put(struct shmid_ds32 __user *user,
  1001. struct shmid_ds *kern)
  1002. {
  1003. if (put_user(kern->shm_perm.key, &user->shm_perm.key) ||
  1004. __put_user(kern->shm_perm.uid, &user->shm_perm.uid) ||
  1005. __put_user(kern->shm_perm.gid, &user->shm_perm.gid) ||
  1006. __put_user(kern->shm_perm.cuid, &user->shm_perm.cuid) ||
  1007. __put_user(kern->shm_perm.cgid, &user->shm_perm.cgid) ||
  1008. __put_user(kern->shm_segsz, &user->shm_segsz) ||
  1009. __put_user(kern->shm_atime, &user->shm_atime) ||
  1010. __put_user(kern->shm_dtime, &user->shm_dtime) ||
  1011. __put_user(kern->shm_ctime, &user->shm_ctime) ||
  1012. __put_user(kern->shm_cpid, &user->shm_cpid) ||
  1013. __put_user(kern->shm_lpid, &user->shm_lpid) ||
  1014. __put_user(kern->shm_nattch, &user->shm_nattch))
  1015. return -EFAULT;
  1016. return 0;
  1017. }
  1018. asmlinkage int sunos_shmsys(int op, u32 arg1, u32 arg2, u32 arg3)
  1019. {
  1020. struct shmid_ds ksds;
  1021. unsigned long raddr;
  1022. mm_segment_t old_fs = get_fs();
  1023. int rval;
  1024. switch(op) {
  1025. case 0:
  1026. /* do_shmat(): attach a shared memory area */
  1027. rval = do_shmat((int)arg1,(char __user *)(unsigned long)arg2,(int)arg3,&raddr);
  1028. if (!rval)
  1029. rval = (int) raddr;
  1030. break;
  1031. case 1:
  1032. /* sys_shmctl(): modify shared memory area attr. */
  1033. if (!sunos_shmid_get((struct shmid_ds32 __user *)(unsigned long)arg3, &ksds)) {
  1034. set_fs(KERNEL_DS);
  1035. rval = sys_shmctl((int) arg1,(int) arg2,
  1036. (struct shmid_ds __user *) &ksds);
  1037. set_fs(old_fs);
  1038. if (!rval)
  1039. rval = sunos_shmid_put((struct shmid_ds32 __user *)(unsigned long)arg3,
  1040. &ksds);
  1041. } else
  1042. rval = -EFAULT;
  1043. break;
  1044. case 2:
  1045. /* sys_shmdt(): detach a shared memory area */
  1046. rval = sys_shmdt((char __user *)(unsigned long)arg1);
  1047. break;
  1048. case 3:
  1049. /* sys_shmget(): get a shared memory area */
  1050. rval = sys_shmget((key_t)arg1,(int)arg2,(int)arg3);
  1051. break;
  1052. default:
  1053. rval = -EINVAL;
  1054. break;
  1055. };
  1056. return rval;
  1057. }
  1058. extern asmlinkage long sparc32_open(const char __user * filename, int flags, int mode);
  1059. asmlinkage int sunos_open(u32 fname, int flags, int mode)
  1060. {
  1061. const char __user *filename = compat_ptr(fname);
  1062. return sparc32_open(filename, flags, mode);
  1063. }
  1064. #define SUNOS_EWOULDBLOCK 35
  1065. /* see the sunos man page read(2v) for an explanation
  1066. of this garbage. We use O_NDELAY to mark
  1067. file descriptors that have been set non-blocking
  1068. using 4.2BSD style calls. (tridge) */
  1069. static inline int check_nonblock(int ret, int fd)
  1070. {
  1071. if (ret == -EAGAIN) {
  1072. struct file * file = fget(fd);
  1073. if (file) {
  1074. if (file->f_flags & O_NDELAY)
  1075. ret = -SUNOS_EWOULDBLOCK;
  1076. fput(file);
  1077. }
  1078. }
  1079. return ret;
  1080. }
  1081. asmlinkage int sunos_read(unsigned int fd, char __user *buf, u32 count)
  1082. {
  1083. int ret;
  1084. ret = check_nonblock(sys_read(fd, buf, count), fd);
  1085. return ret;
  1086. }
  1087. asmlinkage int sunos_readv(u32 fd, void __user *vector, s32 count)
  1088. {
  1089. int ret;
  1090. ret = check_nonblock(compat_sys_readv(fd, vector, count), fd);
  1091. return ret;
  1092. }
  1093. asmlinkage int sunos_write(unsigned int fd, char __user *buf, u32 count)
  1094. {
  1095. int ret;
  1096. ret = check_nonblock(sys_write(fd, buf, count), fd);
  1097. return ret;
  1098. }
  1099. asmlinkage int sunos_writev(u32 fd, void __user *vector, s32 count)
  1100. {
  1101. int ret;
  1102. ret = check_nonblock(compat_sys_writev(fd, vector, count), fd);
  1103. return ret;
  1104. }
  1105. asmlinkage int sunos_recv(u32 __fd, void __user *ubuf, int size, unsigned flags)
  1106. {
  1107. int ret, fd = (int) __fd;
  1108. ret = check_nonblock(sys_recv(fd, ubuf, size, flags), fd);
  1109. return ret;
  1110. }
  1111. asmlinkage int sunos_send(u32 __fd, void __user *buff, int len, unsigned flags)
  1112. {
  1113. int ret, fd = (int) __fd;
  1114. ret = check_nonblock(sys_send(fd, buff, len, flags), fd);
  1115. return ret;
  1116. }
  1117. asmlinkage int sunos_accept(u32 __fd, struct sockaddr __user *sa, int __user *addrlen)
  1118. {
  1119. int ret, fd = (int) __fd;
  1120. while (1) {
  1121. ret = check_nonblock(sys_accept(fd, sa, addrlen), fd);
  1122. if (ret != -ENETUNREACH && ret != -EHOSTUNREACH)
  1123. break;
  1124. }
  1125. return ret;
  1126. }
  1127. #define SUNOS_SV_INTERRUPT 2
  1128. asmlinkage int sunos_sigaction (int sig,
  1129. struct old_sigaction32 __user *act,
  1130. struct old_sigaction32 __user *oact)
  1131. {
  1132. struct k_sigaction new_ka, old_ka;
  1133. int ret;
  1134. if (act) {
  1135. compat_old_sigset_t mask;
  1136. u32 u_handler;
  1137. if (get_user(u_handler, &act->sa_handler) ||
  1138. __get_user(new_ka.sa.sa_flags, &act->sa_flags))
  1139. return -EFAULT;
  1140. new_ka.sa.sa_handler = compat_ptr(u_handler);
  1141. __get_user(mask, &act->sa_mask);
  1142. new_ka.sa.sa_restorer = NULL;
  1143. new_ka.ka_restorer = NULL;
  1144. siginitset(&new_ka.sa.sa_mask, mask);
  1145. new_ka.sa.sa_flags ^= SUNOS_SV_INTERRUPT;
  1146. }
  1147. ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
  1148. if (!ret && oact) {
  1149. old_ka.sa.sa_flags ^= SUNOS_SV_INTERRUPT;
  1150. if (put_user(ptr_to_compat(old_ka.sa.sa_handler), &oact->sa_handler) ||
  1151. __put_user(old_ka.sa.sa_flags, &oact->sa_flags))
  1152. return -EFAULT;
  1153. __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask);
  1154. }
  1155. return ret;
  1156. }
  1157. asmlinkage int sunos_setsockopt(u32 __fd, u32 __level, u32 __optname,
  1158. char __user *optval, u32 __optlen)
  1159. {
  1160. int fd = (int) __fd;
  1161. int level = (int) __level;
  1162. int optname = (int) __optname;
  1163. int optlen = (int) __optlen;
  1164. int tr_opt = optname;
  1165. int ret;
  1166. if (level == SOL_IP) {
  1167. /* Multicast socketopts (ttl, membership) */
  1168. if (tr_opt >=2 && tr_opt <= 6)
  1169. tr_opt += 30;
  1170. }
  1171. ret = sys_setsockopt(fd, level, tr_opt,
  1172. optval, optlen);
  1173. return ret;
  1174. }
  1175. asmlinkage int sunos_getsockopt(u32 __fd, u32 __level, u32 __optname,
  1176. char __user *optval, int __user *optlen)
  1177. {
  1178. int fd = (int) __fd;
  1179. int level = (int) __level;
  1180. int optname = (int) __optname;
  1181. int tr_opt = optname;
  1182. int ret;
  1183. if (level == SOL_IP) {
  1184. /* Multicast socketopts (ttl, membership) */
  1185. if (tr_opt >=2 && tr_opt <= 6)
  1186. tr_opt += 30;
  1187. }
  1188. ret = compat_sys_getsockopt(fd, level, tr_opt,
  1189. optval, optlen);
  1190. return ret;
  1191. }