sys_sunos32.c 33 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360
  1. /* $Id: sys_sunos32.c,v 1.64 2002/02/09 19:49:31 davem Exp $
  2. * sys_sunos32.c: SunOS binary compatibility layer on sparc64.
  3. *
  4. * Copyright (C) 1995, 1996, 1997 David S. Miller (davem@caip.rutgers.edu)
  5. * Copyright (C) 1995 Miguel de Icaza (miguel@nuclecu.unam.mx)
  6. *
  7. * Based upon preliminary work which is:
  8. *
  9. * Copyright (C) 1995 Adrian M. Rodriguez (adrian@remus.rutgers.edu)
  10. */
  11. #include <linux/kernel.h>
  12. #include <linux/sched.h>
  13. #include <linux/types.h>
  14. #include <linux/capability.h>
  15. #include <linux/compat.h>
  16. #include <linux/mman.h>
  17. #include <linux/mm.h>
  18. #include <linux/swap.h>
  19. #include <linux/fs.h>
  20. #include <linux/file.h>
  21. #include <linux/resource.h>
  22. #include <linux/ipc.h>
  23. #include <linux/shm.h>
  24. #include <linux/msg.h>
  25. #include <linux/sem.h>
  26. #include <linux/signal.h>
  27. #include <linux/uio.h>
  28. #include <linux/utsname.h>
  29. #include <linux/major.h>
  30. #include <linux/stat.h>
  31. #include <linux/slab.h>
  32. #include <linux/pagemap.h>
  33. #include <linux/errno.h>
  34. #include <linux/smp.h>
  35. #include <linux/smp_lock.h>
  36. #include <linux/syscalls.h>
  37. #include <asm/uaccess.h>
  38. #include <asm/page.h>
  39. #include <asm/pgtable.h>
  40. #include <asm/pconf.h>
  41. #include <asm/idprom.h> /* for gethostid() */
  42. #include <asm/unistd.h>
  43. #include <asm/system.h>
  44. #include <asm/compat_signal.h>
  45. /* For the nfs mount emulation */
  46. #include <linux/socket.h>
  47. #include <linux/in.h>
  48. #include <linux/nfs.h>
  49. #include <linux/nfs2.h>
  50. #include <linux/nfs_mount.h>
  51. /* for sunos_select */
  52. #include <linux/time.h>
  53. #include <linux/personality.h>
  54. /* For SOCKET_I */
  55. #include <linux/socket.h>
  56. #include <net/sock.h>
  57. #include <net/compat.h>
  58. #define SUNOS_NR_OPEN 256
  59. asmlinkage u32 sunos_mmap(u32 addr, u32 len, u32 prot, u32 flags, u32 fd, u32 off)
  60. {
  61. struct file *file = NULL;
  62. unsigned long retval, ret_type;
  63. if (flags & MAP_NORESERVE) {
  64. static int cnt;
  65. if (cnt++ < 10)
  66. printk("%s: unimplemented SunOS MAP_NORESERVE mmap() flag\n",
  67. current->comm);
  68. flags &= ~MAP_NORESERVE;
  69. }
  70. retval = -EBADF;
  71. if (!(flags & MAP_ANONYMOUS)) {
  72. struct inode * inode;
  73. if (fd >= SUNOS_NR_OPEN)
  74. goto out;
  75. file = fget(fd);
  76. if (!file)
  77. goto out;
  78. inode = file->f_path.dentry->d_inode;
  79. if (imajor(inode) == MEM_MAJOR && iminor(inode) == 5) {
  80. flags |= MAP_ANONYMOUS;
  81. fput(file);
  82. file = NULL;
  83. }
  84. }
  85. retval = -EINVAL;
  86. if (!(flags & MAP_FIXED))
  87. addr = 0;
  88. else if (len > 0xf0000000 || addr > 0xf0000000 - len)
  89. goto out_putf;
  90. ret_type = flags & _MAP_NEW;
  91. flags &= ~_MAP_NEW;
  92. flags &= ~(MAP_EXECUTABLE | MAP_DENYWRITE);
  93. down_write(&current->mm->mmap_sem);
  94. retval = do_mmap(file,
  95. (unsigned long) addr, (unsigned long) len,
  96. (unsigned long) prot, (unsigned long) flags,
  97. (unsigned long) off);
  98. up_write(&current->mm->mmap_sem);
  99. if (!ret_type)
  100. retval = ((retval < 0xf0000000) ? 0 : retval);
  101. out_putf:
  102. if (file)
  103. fput(file);
  104. out:
  105. return (u32) retval;
  106. }
  107. asmlinkage int sunos_mctl(u32 addr, u32 len, int function, u32 arg)
  108. {
  109. return 0;
  110. }
  111. asmlinkage int sunos_brk(u32 baddr)
  112. {
  113. int freepages, retval = -ENOMEM;
  114. unsigned long rlim;
  115. unsigned long newbrk, oldbrk, brk = (unsigned long) baddr;
  116. down_write(&current->mm->mmap_sem);
  117. if (brk < current->mm->end_code)
  118. goto out;
  119. newbrk = PAGE_ALIGN(brk);
  120. oldbrk = PAGE_ALIGN(current->mm->brk);
  121. retval = 0;
  122. if (oldbrk == newbrk) {
  123. current->mm->brk = brk;
  124. goto out;
  125. }
  126. /* Always allow shrinking brk. */
  127. if (brk <= current->mm->brk) {
  128. current->mm->brk = brk;
  129. do_munmap(current->mm, newbrk, oldbrk-newbrk);
  130. goto out;
  131. }
  132. /* Check against rlimit and stack.. */
  133. retval = -ENOMEM;
  134. rlim = current->signal->rlim[RLIMIT_DATA].rlim_cur;
  135. if (rlim >= RLIM_INFINITY)
  136. rlim = ~0;
  137. if (brk - current->mm->end_code > rlim)
  138. goto out;
  139. /* Check against existing mmap mappings. */
  140. if (find_vma_intersection(current->mm, oldbrk, newbrk+PAGE_SIZE))
  141. goto out;
  142. /* stupid algorithm to decide if we have enough memory: while
  143. * simple, it hopefully works in most obvious cases.. Easy to
  144. * fool it, but this should catch most mistakes.
  145. */
  146. freepages = global_page_state(NR_FILE_PAGES);
  147. freepages >>= 1;
  148. freepages += nr_free_pages();
  149. freepages += nr_swap_pages;
  150. freepages -= num_physpages >> 4;
  151. freepages -= (newbrk-oldbrk) >> PAGE_SHIFT;
  152. if (freepages < 0)
  153. goto out;
  154. /* Ok, we have probably got enough memory - let it rip. */
  155. current->mm->brk = brk;
  156. do_brk(oldbrk, newbrk-oldbrk);
  157. retval = 0;
  158. out:
  159. up_write(&current->mm->mmap_sem);
  160. return retval;
  161. }
  162. asmlinkage u32 sunos_sbrk(int increment)
  163. {
  164. int error, oldbrk;
  165. /* This should do it hopefully... */
  166. oldbrk = (int)current->mm->brk;
  167. error = sunos_brk(((int) current->mm->brk) + increment);
  168. if (!error)
  169. error = oldbrk;
  170. return error;
  171. }
  172. asmlinkage u32 sunos_sstk(int increment)
  173. {
  174. printk("%s: Call to sunos_sstk(increment<%d>) is unsupported\n",
  175. current->comm, increment);
  176. return (u32)-1;
  177. }
  178. /* Give hints to the kernel as to what paging strategy to use...
  179. * Completely bogus, don't remind me.
  180. */
  181. #define VA_NORMAL 0 /* Normal vm usage expected */
  182. #define VA_ABNORMAL 1 /* Abnormal/random vm usage probable */
  183. #define VA_SEQUENTIAL 2 /* Accesses will be of a sequential nature */
  184. #define VA_INVALIDATE 3 /* Page table entries should be flushed ??? */
  185. static char *vstrings[] = {
  186. "VA_NORMAL",
  187. "VA_ABNORMAL",
  188. "VA_SEQUENTIAL",
  189. "VA_INVALIDATE",
  190. };
  191. asmlinkage void sunos_vadvise(u32 strategy)
  192. {
  193. static int count;
  194. /* I wanna see who uses this... */
  195. if (count++ < 5)
  196. printk("%s: Advises us to use %s paging strategy\n",
  197. current->comm,
  198. strategy <= 3 ? vstrings[strategy] : "BOGUS");
  199. }
  200. /* This just wants the soft limit (ie. rlim_cur element) of the RLIMIT_NOFILE
  201. * resource limit and is for backwards compatibility with older sunos
  202. * revs.
  203. */
  204. asmlinkage int sunos_getdtablesize(void)
  205. {
  206. return SUNOS_NR_OPEN;
  207. }
  208. #define _BLOCKABLE (~(sigmask(SIGKILL) | sigmask(SIGSTOP)))
  209. asmlinkage u32 sunos_sigblock(u32 blk_mask)
  210. {
  211. u32 old;
  212. spin_lock_irq(&current->sighand->siglock);
  213. old = (u32) current->blocked.sig[0];
  214. current->blocked.sig[0] |= (blk_mask & _BLOCKABLE);
  215. recalc_sigpending();
  216. spin_unlock_irq(&current->sighand->siglock);
  217. return old;
  218. }
  219. asmlinkage u32 sunos_sigsetmask(u32 newmask)
  220. {
  221. u32 retval;
  222. spin_lock_irq(&current->sighand->siglock);
  223. retval = (u32) current->blocked.sig[0];
  224. current->blocked.sig[0] = (newmask & _BLOCKABLE);
  225. recalc_sigpending();
  226. spin_unlock_irq(&current->sighand->siglock);
  227. return retval;
  228. }
  229. /* SunOS getdents is very similar to the newer Linux (iBCS2 compliant) */
  230. /* getdents system call, the format of the structure just has a different */
  231. /* layout (d_off+d_ino instead of d_ino+d_off) */
  232. struct sunos_dirent {
  233. s32 d_off;
  234. u32 d_ino;
  235. u16 d_reclen;
  236. u16 d_namlen;
  237. char d_name[1];
  238. };
  239. struct sunos_dirent_callback {
  240. struct sunos_dirent __user *curr;
  241. struct sunos_dirent __user *previous;
  242. int count;
  243. int error;
  244. };
  245. #define NAME_OFFSET(de) ((int) ((de)->d_name - (char __user *) (de)))
  246. #define ROUND_UP(x) (((x)+sizeof(s32)-1) & ~(sizeof(s32)-1))
  247. static int sunos_filldir(void * __buf, const char * name, int namlen,
  248. loff_t offset, ino_t ino, unsigned int d_type)
  249. {
  250. struct sunos_dirent __user *dirent;
  251. struct sunos_dirent_callback * buf = (struct sunos_dirent_callback *) __buf;
  252. int reclen = ROUND_UP(NAME_OFFSET(dirent) + namlen + 1);
  253. u32 d_ino;
  254. buf->error = -EINVAL; /* only used if we fail.. */
  255. if (reclen > buf->count)
  256. return -EINVAL;
  257. d_ino = ino;
  258. if (sizeof(d_ino) < sizeof(ino) && d_ino != ino)
  259. return -EOVERFLOW;
  260. dirent = buf->previous;
  261. if (dirent)
  262. put_user(offset, &dirent->d_off);
  263. dirent = buf->curr;
  264. buf->previous = dirent;
  265. put_user(d_ino, &dirent->d_ino);
  266. put_user(namlen, &dirent->d_namlen);
  267. put_user(reclen, &dirent->d_reclen);
  268. if (copy_to_user(dirent->d_name, name, namlen))
  269. return -EFAULT;
  270. put_user(0, dirent->d_name + namlen);
  271. dirent = (void __user *) dirent + reclen;
  272. buf->curr = dirent;
  273. buf->count -= reclen;
  274. return 0;
  275. }
  276. asmlinkage int sunos_getdents(unsigned int fd, void __user *dirent, int cnt)
  277. {
  278. struct file * file;
  279. struct sunos_dirent __user *lastdirent;
  280. struct sunos_dirent_callback buf;
  281. int error = -EBADF;
  282. if (fd >= SUNOS_NR_OPEN)
  283. goto out;
  284. file = fget(fd);
  285. if (!file)
  286. goto out;
  287. error = -EINVAL;
  288. if (cnt < (sizeof(struct sunos_dirent) + 255))
  289. goto out_putf;
  290. buf.curr = (struct sunos_dirent __user *) dirent;
  291. buf.previous = NULL;
  292. buf.count = cnt;
  293. buf.error = 0;
  294. error = vfs_readdir(file, sunos_filldir, &buf);
  295. if (error < 0)
  296. goto out_putf;
  297. lastdirent = buf.previous;
  298. error = buf.error;
  299. if (lastdirent) {
  300. put_user(file->f_pos, &lastdirent->d_off);
  301. error = cnt - buf.count;
  302. }
  303. out_putf:
  304. fput(file);
  305. out:
  306. return error;
  307. }
  308. /* Old sunos getdirentries, severely broken compatibility stuff here. */
  309. struct sunos_direntry {
  310. u32 d_ino;
  311. u16 d_reclen;
  312. u16 d_namlen;
  313. char d_name[1];
  314. };
  315. struct sunos_direntry_callback {
  316. struct sunos_direntry __user *curr;
  317. struct sunos_direntry __user *previous;
  318. int count;
  319. int error;
  320. };
  321. static int sunos_filldirentry(void * __buf, const char * name, int namlen,
  322. loff_t offset, ino_t ino, unsigned int d_type)
  323. {
  324. struct sunos_direntry __user *dirent;
  325. struct sunos_direntry_callback * buf =
  326. (struct sunos_direntry_callback *) __buf;
  327. int reclen = ROUND_UP(NAME_OFFSET(dirent) + namlen + 1);
  328. u32 d_ino;
  329. buf->error = -EINVAL; /* only used if we fail.. */
  330. if (reclen > buf->count)
  331. return -EINVAL;
  332. d_ino = ino;
  333. if (sizeof(d_ino) < sizeof(ino) && d_ino != ino)
  334. return -EOVERFLOW;
  335. dirent = buf->previous;
  336. dirent = buf->curr;
  337. buf->previous = dirent;
  338. put_user(d_ino, &dirent->d_ino);
  339. put_user(namlen, &dirent->d_namlen);
  340. put_user(reclen, &dirent->d_reclen);
  341. if (copy_to_user(dirent->d_name, name, namlen))
  342. return -EFAULT;
  343. put_user(0, dirent->d_name + namlen);
  344. dirent = (void __user *) dirent + reclen;
  345. buf->curr = dirent;
  346. buf->count -= reclen;
  347. return 0;
  348. }
  349. asmlinkage int sunos_getdirentries(unsigned int fd,
  350. void __user *dirent,
  351. int cnt,
  352. unsigned int __user *basep)
  353. {
  354. struct file * file;
  355. struct sunos_direntry __user *lastdirent;
  356. int error = -EBADF;
  357. struct sunos_direntry_callback buf;
  358. if (fd >= SUNOS_NR_OPEN)
  359. goto out;
  360. file = fget(fd);
  361. if (!file)
  362. goto out;
  363. error = -EINVAL;
  364. if (cnt < (sizeof(struct sunos_direntry) + 255))
  365. goto out_putf;
  366. buf.curr = (struct sunos_direntry __user *) dirent;
  367. buf.previous = NULL;
  368. buf.count = cnt;
  369. buf.error = 0;
  370. error = vfs_readdir(file, sunos_filldirentry, &buf);
  371. if (error < 0)
  372. goto out_putf;
  373. lastdirent = buf.previous;
  374. error = buf.error;
  375. if (lastdirent) {
  376. put_user(file->f_pos, basep);
  377. error = cnt - buf.count;
  378. }
  379. out_putf:
  380. fput(file);
  381. out:
  382. return error;
  383. }
  384. struct sunos_utsname {
  385. char sname[9];
  386. char nname[9];
  387. char nnext[56];
  388. char rel[9];
  389. char ver[9];
  390. char mach[9];
  391. };
  392. asmlinkage int sunos_uname(struct sunos_utsname __user *name)
  393. {
  394. int ret;
  395. down_read(&uts_sem);
  396. ret = copy_to_user(&name->sname[0], &utsname()->sysname[0],
  397. sizeof(name->sname) - 1);
  398. ret |= copy_to_user(&name->nname[0], &utsname()->nodename[0],
  399. sizeof(name->nname) - 1);
  400. ret |= put_user('\0', &name->nname[8]);
  401. ret |= copy_to_user(&name->rel[0], &utsname()->release[0],
  402. sizeof(name->rel) - 1);
  403. ret |= copy_to_user(&name->ver[0], &utsname()->version[0],
  404. sizeof(name->ver) - 1);
  405. ret |= copy_to_user(&name->mach[0], &utsname()->machine[0],
  406. sizeof(name->mach) - 1);
  407. up_read(&uts_sem);
  408. return (ret ? -EFAULT : 0);
  409. }
  410. asmlinkage int sunos_nosys(void)
  411. {
  412. struct pt_regs *regs;
  413. siginfo_t info;
  414. static int cnt;
  415. regs = current_thread_info()->kregs;
  416. if (test_thread_flag(TIF_32BIT)) {
  417. regs->tpc &= 0xffffffff;
  418. regs->tnpc &= 0xffffffff;
  419. }
  420. info.si_signo = SIGSYS;
  421. info.si_errno = 0;
  422. info.si_code = __SI_FAULT|0x100;
  423. info.si_addr = (void __user *)regs->tpc;
  424. info.si_trapno = regs->u_regs[UREG_G1];
  425. send_sig_info(SIGSYS, &info, current);
  426. if (cnt++ < 4) {
  427. printk("Process makes ni_syscall number %d, register dump:\n",
  428. (int) regs->u_regs[UREG_G1]);
  429. show_regs(regs);
  430. }
  431. return -ENOSYS;
  432. }
  433. /* This is not a real and complete implementation yet, just to keep
  434. * the easy SunOS binaries happy.
  435. */
  436. asmlinkage int sunos_fpathconf(int fd, int name)
  437. {
  438. int ret;
  439. switch(name) {
  440. case _PCONF_LINK:
  441. ret = LINK_MAX;
  442. break;
  443. case _PCONF_CANON:
  444. ret = MAX_CANON;
  445. break;
  446. case _PCONF_INPUT:
  447. ret = MAX_INPUT;
  448. break;
  449. case _PCONF_NAME:
  450. ret = NAME_MAX;
  451. break;
  452. case _PCONF_PATH:
  453. ret = PATH_MAX;
  454. break;
  455. case _PCONF_PIPE:
  456. ret = PIPE_BUF;
  457. break;
  458. case _PCONF_CHRESTRICT: /* XXX Investigate XXX */
  459. ret = 1;
  460. break;
  461. case _PCONF_NOTRUNC: /* XXX Investigate XXX */
  462. case _PCONF_VDISABLE:
  463. ret = 0;
  464. break;
  465. default:
  466. ret = -EINVAL;
  467. break;
  468. }
  469. return ret;
  470. }
  471. asmlinkage int sunos_pathconf(u32 u_path, int name)
  472. {
  473. int ret;
  474. ret = sunos_fpathconf(0, name); /* XXX cheese XXX */
  475. return ret;
  476. }
  477. asmlinkage int sunos_select(int width, u32 inp, u32 outp, u32 exp, u32 tvp_x)
  478. {
  479. int ret;
  480. /* SunOS binaries expect that select won't change the tvp contents */
  481. ret = compat_sys_select(width, compat_ptr(inp), compat_ptr(outp),
  482. compat_ptr(exp), compat_ptr(tvp_x));
  483. if (ret == -EINTR && tvp_x) {
  484. struct compat_timeval __user *tvp = compat_ptr(tvp_x);
  485. time_t sec, usec;
  486. __get_user(sec, &tvp->tv_sec);
  487. __get_user(usec, &tvp->tv_usec);
  488. if (sec == 0 && usec == 0)
  489. ret = 0;
  490. }
  491. return ret;
  492. }
  493. asmlinkage void sunos_nop(void)
  494. {
  495. return;
  496. }
  497. #if 0 /* This code doesn't translate user pointers correctly,
  498. * disable for now. -DaveM
  499. */
  500. /* XXXXXXXXXX SunOS mount/umount. XXXXXXXXXXX */
  501. #define SMNT_RDONLY 1
  502. #define SMNT_NOSUID 2
  503. #define SMNT_NEWTYPE 4
  504. #define SMNT_GRPID 8
  505. #define SMNT_REMOUNT 16
  506. #define SMNT_NOSUB 32
  507. #define SMNT_MULTI 64
  508. #define SMNT_SYS5 128
  509. struct sunos_fh_t {
  510. char fh_data [NFS_FHSIZE];
  511. };
  512. struct sunos_nfs_mount_args {
  513. struct sockaddr_in *addr; /* file server address */
  514. struct nfs_fh *fh; /* File handle to be mounted */
  515. int flags; /* flags */
  516. int wsize; /* write size in bytes */
  517. int rsize; /* read size in bytes */
  518. int timeo; /* initial timeout in .1 secs */
  519. int retrans; /* times to retry send */
  520. char *hostname; /* server's hostname */
  521. int acregmin; /* attr cache file min secs */
  522. int acregmax; /* attr cache file max secs */
  523. int acdirmin; /* attr cache dir min secs */
  524. int acdirmax; /* attr cache dir max secs */
  525. char *netname; /* server's netname */
  526. };
  527. /* Bind the socket on a local reserved port and connect it to the
  528. * remote server. This on Linux/i386 is done by the mount program,
  529. * not by the kernel.
  530. */
  531. /* XXXXXXXXXXXXXXXXXXXX */
  532. static int
  533. sunos_nfs_get_server_fd (int fd, struct sockaddr_in *addr)
  534. {
  535. struct sockaddr_in local;
  536. struct sockaddr_in server;
  537. int try_port;
  538. int ret;
  539. struct socket *socket;
  540. struct inode *inode;
  541. struct file *file;
  542. file = fget(fd);
  543. if (!file)
  544. return 0;
  545. inode = file->f_path.dentry->d_inode;
  546. socket = SOCKET_I(inode);
  547. local.sin_family = AF_INET;
  548. local.sin_addr.s_addr = INADDR_ANY;
  549. /* IPPORT_RESERVED = 1024, can't find the definition in the kernel */
  550. try_port = 1024;
  551. do {
  552. local.sin_port = htons (--try_port);
  553. ret = socket->ops->bind(socket, (struct sockaddr*)&local,
  554. sizeof(local));
  555. } while (ret && try_port > (1024 / 2));
  556. if (ret) {
  557. fput(file);
  558. return 0;
  559. }
  560. server.sin_family = AF_INET;
  561. server.sin_addr = addr->sin_addr;
  562. server.sin_port = NFS_PORT;
  563. /* Call sys_connect */
  564. ret = socket->ops->connect (socket, (struct sockaddr *) &server,
  565. sizeof (server), file->f_flags);
  566. fput(file);
  567. if (ret < 0)
  568. return 0;
  569. return 1;
  570. }
  571. /* XXXXXXXXXXXXXXXXXXXX */
  572. static int get_default (int value, int def_value)
  573. {
  574. if (value)
  575. return value;
  576. else
  577. return def_value;
  578. }
  579. /* XXXXXXXXXXXXXXXXXXXX */
  580. static int sunos_nfs_mount(char *dir_name, int linux_flags, void __user *data)
  581. {
  582. int server_fd, err;
  583. char *the_name, *mount_page;
  584. struct nfs_mount_data linux_nfs_mount;
  585. struct sunos_nfs_mount_args sunos_mount;
  586. /* Ok, here comes the fun part: Linux's nfs mount needs a
  587. * socket connection to the server, but SunOS mount does not
  588. * require this, so we use the information on the destination
  589. * address to create a socket and bind it to a reserved
  590. * port on this system
  591. */
  592. if (copy_from_user(&sunos_mount, data, sizeof(sunos_mount)))
  593. return -EFAULT;
  594. server_fd = sys_socket (AF_INET, SOCK_DGRAM, IPPROTO_UDP);
  595. if (server_fd < 0)
  596. return -ENXIO;
  597. if (copy_from_user(&linux_nfs_mount.addr, sunos_mount.addr,
  598. sizeof(*sunos_mount.addr)) ||
  599. copy_from_user(&linux_nfs_mount.root, sunos_mount.fh,
  600. sizeof(*sunos_mount.fh))) {
  601. sys_close (server_fd);
  602. return -EFAULT;
  603. }
  604. if (!sunos_nfs_get_server_fd (server_fd, &linux_nfs_mount.addr)){
  605. sys_close (server_fd);
  606. return -ENXIO;
  607. }
  608. /* Now, bind it to a locally reserved port */
  609. linux_nfs_mount.version = NFS_MOUNT_VERSION;
  610. linux_nfs_mount.flags = sunos_mount.flags;
  611. linux_nfs_mount.fd = server_fd;
  612. linux_nfs_mount.rsize = get_default (sunos_mount.rsize, 8192);
  613. linux_nfs_mount.wsize = get_default (sunos_mount.wsize, 8192);
  614. linux_nfs_mount.timeo = get_default (sunos_mount.timeo, 10);
  615. linux_nfs_mount.retrans = sunos_mount.retrans;
  616. linux_nfs_mount.acregmin = sunos_mount.acregmin;
  617. linux_nfs_mount.acregmax = sunos_mount.acregmax;
  618. linux_nfs_mount.acdirmin = sunos_mount.acdirmin;
  619. linux_nfs_mount.acdirmax = sunos_mount.acdirmax;
  620. the_name = getname(sunos_mount.hostname);
  621. if (IS_ERR(the_name))
  622. return PTR_ERR(the_name);
  623. strlcpy(linux_nfs_mount.hostname, the_name,
  624. sizeof(linux_nfs_mount.hostname));
  625. putname (the_name);
  626. mount_page = (char *) get_zeroed_page(GFP_KERNEL);
  627. if (!mount_page)
  628. return -ENOMEM;
  629. memcpy(mount_page, &linux_nfs_mount, sizeof(linux_nfs_mount));
  630. err = do_mount("", dir_name, "nfs", linux_flags, mount_page);
  631. free_page((unsigned long) mount_page);
  632. return err;
  633. }
  634. /* XXXXXXXXXXXXXXXXXXXX */
  635. asmlinkage int
  636. sunos_mount(char *type, char *dir, int flags, void *data)
  637. {
  638. int linux_flags = 0;
  639. int ret = -EINVAL;
  640. char *dev_fname = 0;
  641. char *dir_page, *type_page;
  642. if (!capable (CAP_SYS_ADMIN))
  643. return -EPERM;
  644. /* We don't handle the integer fs type */
  645. if ((flags & SMNT_NEWTYPE) == 0)
  646. goto out;
  647. /* Do not allow for those flags we don't support */
  648. if (flags & (SMNT_GRPID|SMNT_NOSUB|SMNT_MULTI|SMNT_SYS5))
  649. goto out;
  650. if (flags & SMNT_REMOUNT)
  651. linux_flags |= MS_REMOUNT;
  652. if (flags & SMNT_RDONLY)
  653. linux_flags |= MS_RDONLY;
  654. if (flags & SMNT_NOSUID)
  655. linux_flags |= MS_NOSUID;
  656. dir_page = getname(dir);
  657. ret = PTR_ERR(dir_page);
  658. if (IS_ERR(dir_page))
  659. goto out;
  660. type_page = getname(type);
  661. ret = PTR_ERR(type_page);
  662. if (IS_ERR(type_page))
  663. goto out1;
  664. if (strcmp(type_page, "ext2") == 0) {
  665. dev_fname = getname(data);
  666. } else if (strcmp(type_page, "iso9660") == 0) {
  667. dev_fname = getname(data);
  668. } else if (strcmp(type_page, "minix") == 0) {
  669. dev_fname = getname(data);
  670. } else if (strcmp(type_page, "nfs") == 0) {
  671. ret = sunos_nfs_mount (dir_page, flags, data);
  672. goto out2;
  673. } else if (strcmp(type_page, "ufs") == 0) {
  674. printk("Warning: UFS filesystem mounts unsupported.\n");
  675. ret = -ENODEV;
  676. goto out2;
  677. } else if (strcmp(type_page, "proc")) {
  678. ret = -ENODEV;
  679. goto out2;
  680. }
  681. ret = PTR_ERR(dev_fname);
  682. if (IS_ERR(dev_fname))
  683. goto out2;
  684. lock_kernel();
  685. ret = do_mount(dev_fname, dir_page, type_page, linux_flags, NULL);
  686. unlock_kernel();
  687. if (dev_fname)
  688. putname(dev_fname);
  689. out2:
  690. putname(type_page);
  691. out1:
  692. putname(dir_page);
  693. out:
  694. return ret;
  695. }
  696. #endif
  697. asmlinkage int sunos_setpgrp(pid_t pid, pid_t pgid)
  698. {
  699. int ret;
  700. /* So stupid... */
  701. if ((!pid || pid == current->pid) &&
  702. !pgid) {
  703. sys_setsid();
  704. ret = 0;
  705. } else {
  706. ret = sys_setpgid(pid, pgid);
  707. }
  708. return ret;
  709. }
  710. /* So stupid... */
  711. extern long compat_sys_wait4(compat_pid_t, compat_uint_t __user *, int,
  712. struct compat_rusage __user *);
  713. asmlinkage int sunos_wait4(compat_pid_t pid, compat_uint_t __user *stat_addr, int options, struct compat_rusage __user *ru)
  714. {
  715. int ret;
  716. ret = compat_sys_wait4((pid ? pid : ((compat_pid_t)-1)),
  717. stat_addr, options, ru);
  718. return ret;
  719. }
  720. asmlinkage int sunos_killpg(int pgrp, int sig)
  721. {
  722. int ret;
  723. rcu_read_lock();
  724. ret = -EINVAL;
  725. if (pgrp > 0)
  726. ret = kill_pgrp(find_pid(pgrp), sig, 0);
  727. rcu_read_unlock();
  728. return ret;
  729. }
  730. asmlinkage int sunos_audit(void)
  731. {
  732. printk ("sys_audit\n");
  733. return -1;
  734. }
  735. asmlinkage u32 sunos_gethostid(void)
  736. {
  737. u32 ret;
  738. ret = (((u32)idprom->id_machtype << 24) | ((u32)idprom->id_sernum));
  739. return ret;
  740. }
  741. /* sysconf options, for SunOS compatibility */
  742. #define _SC_ARG_MAX 1
  743. #define _SC_CHILD_MAX 2
  744. #define _SC_CLK_TCK 3
  745. #define _SC_NGROUPS_MAX 4
  746. #define _SC_OPEN_MAX 5
  747. #define _SC_JOB_CONTROL 6
  748. #define _SC_SAVED_IDS 7
  749. #define _SC_VERSION 8
  750. asmlinkage s32 sunos_sysconf (int name)
  751. {
  752. s32 ret;
  753. switch (name){
  754. case _SC_ARG_MAX:
  755. ret = ARG_MAX;
  756. break;
  757. case _SC_CHILD_MAX:
  758. ret = current->signal->rlim[RLIMIT_NPROC].rlim_cur;
  759. break;
  760. case _SC_CLK_TCK:
  761. ret = HZ;
  762. break;
  763. case _SC_NGROUPS_MAX:
  764. ret = NGROUPS_MAX;
  765. break;
  766. case _SC_OPEN_MAX:
  767. ret = current->signal->rlim[RLIMIT_NOFILE].rlim_cur;
  768. break;
  769. case _SC_JOB_CONTROL:
  770. ret = 1; /* yes, we do support job control */
  771. break;
  772. case _SC_SAVED_IDS:
  773. ret = 1; /* yes, we do support saved uids */
  774. break;
  775. case _SC_VERSION:
  776. /* mhm, POSIX_VERSION is in /usr/include/unistd.h
  777. * should it go on /usr/include/linux?
  778. */
  779. ret = 199009;
  780. break;
  781. default:
  782. ret = -1;
  783. break;
  784. };
  785. return ret;
  786. }
  787. asmlinkage int sunos_semsys(int op, u32 arg1, u32 arg2, u32 arg3, void __user *ptr)
  788. {
  789. union semun arg4;
  790. int ret;
  791. switch (op) {
  792. case 0:
  793. /* Most arguments match on a 1:1 basis but cmd doesn't */
  794. switch(arg3) {
  795. case 4:
  796. arg3=GETPID; break;
  797. case 5:
  798. arg3=GETVAL; break;
  799. case 6:
  800. arg3=GETALL; break;
  801. case 3:
  802. arg3=GETNCNT; break;
  803. case 7:
  804. arg3=GETZCNT; break;
  805. case 8:
  806. arg3=SETVAL; break;
  807. case 9:
  808. arg3=SETALL; break;
  809. }
  810. /* sys_semctl(): */
  811. /* value to modify semaphore to */
  812. arg4.__pad = ptr;
  813. ret = sys_semctl((int)arg1, (int)arg2, (int)arg3, arg4);
  814. break;
  815. case 1:
  816. /* sys_semget(): */
  817. ret = sys_semget((key_t)arg1, (int)arg2, (int)arg3);
  818. break;
  819. case 2:
  820. /* sys_semop(): */
  821. ret = sys_semop((int)arg1, (struct sembuf __user *)(unsigned long)arg2,
  822. (unsigned int) arg3);
  823. break;
  824. default:
  825. ret = -EINVAL;
  826. break;
  827. };
  828. return ret;
  829. }
  830. struct msgbuf32 {
  831. s32 mtype;
  832. char mtext[1];
  833. };
  834. struct ipc_perm32
  835. {
  836. key_t key;
  837. compat_uid_t uid;
  838. compat_gid_t gid;
  839. compat_uid_t cuid;
  840. compat_gid_t cgid;
  841. compat_mode_t mode;
  842. unsigned short seq;
  843. };
  844. struct msqid_ds32
  845. {
  846. struct ipc_perm32 msg_perm;
  847. u32 msg_first;
  848. u32 msg_last;
  849. compat_time_t msg_stime;
  850. compat_time_t msg_rtime;
  851. compat_time_t msg_ctime;
  852. u32 wwait;
  853. u32 rwait;
  854. unsigned short msg_cbytes;
  855. unsigned short msg_qnum;
  856. unsigned short msg_qbytes;
  857. compat_ipc_pid_t msg_lspid;
  858. compat_ipc_pid_t msg_lrpid;
  859. };
  860. static inline int sunos_msqid_get(struct msqid_ds32 __user *user,
  861. struct msqid_ds *kern)
  862. {
  863. if (get_user(kern->msg_perm.key, &user->msg_perm.key) ||
  864. __get_user(kern->msg_perm.uid, &user->msg_perm.uid) ||
  865. __get_user(kern->msg_perm.gid, &user->msg_perm.gid) ||
  866. __get_user(kern->msg_perm.cuid, &user->msg_perm.cuid) ||
  867. __get_user(kern->msg_perm.cgid, &user->msg_perm.cgid) ||
  868. __get_user(kern->msg_stime, &user->msg_stime) ||
  869. __get_user(kern->msg_rtime, &user->msg_rtime) ||
  870. __get_user(kern->msg_ctime, &user->msg_ctime) ||
  871. __get_user(kern->msg_ctime, &user->msg_cbytes) ||
  872. __get_user(kern->msg_ctime, &user->msg_qnum) ||
  873. __get_user(kern->msg_ctime, &user->msg_qbytes) ||
  874. __get_user(kern->msg_ctime, &user->msg_lspid) ||
  875. __get_user(kern->msg_ctime, &user->msg_lrpid))
  876. return -EFAULT;
  877. return 0;
  878. }
  879. static inline int sunos_msqid_put(struct msqid_ds32 __user *user,
  880. struct msqid_ds *kern)
  881. {
  882. if (put_user(kern->msg_perm.key, &user->msg_perm.key) ||
  883. __put_user(kern->msg_perm.uid, &user->msg_perm.uid) ||
  884. __put_user(kern->msg_perm.gid, &user->msg_perm.gid) ||
  885. __put_user(kern->msg_perm.cuid, &user->msg_perm.cuid) ||
  886. __put_user(kern->msg_perm.cgid, &user->msg_perm.cgid) ||
  887. __put_user(kern->msg_stime, &user->msg_stime) ||
  888. __put_user(kern->msg_rtime, &user->msg_rtime) ||
  889. __put_user(kern->msg_ctime, &user->msg_ctime) ||
  890. __put_user(kern->msg_ctime, &user->msg_cbytes) ||
  891. __put_user(kern->msg_ctime, &user->msg_qnum) ||
  892. __put_user(kern->msg_ctime, &user->msg_qbytes) ||
  893. __put_user(kern->msg_ctime, &user->msg_lspid) ||
  894. __put_user(kern->msg_ctime, &user->msg_lrpid))
  895. return -EFAULT;
  896. return 0;
  897. }
  898. static inline int sunos_msgbuf_get(struct msgbuf32 __user *user, struct msgbuf *kern, int len)
  899. {
  900. if (get_user(kern->mtype, &user->mtype) ||
  901. __copy_from_user(kern->mtext, &user->mtext, len))
  902. return -EFAULT;
  903. return 0;
  904. }
  905. static inline int sunos_msgbuf_put(struct msgbuf32 __user *user, struct msgbuf *kern, int len)
  906. {
  907. if (put_user(kern->mtype, &user->mtype) ||
  908. __copy_to_user(user->mtext, kern->mtext, len))
  909. return -EFAULT;
  910. return 0;
  911. }
  912. asmlinkage int sunos_msgsys(int op, u32 arg1, u32 arg2, u32 arg3, u32 arg4)
  913. {
  914. struct sparc_stackf32 __user *sp;
  915. struct msqid_ds kds;
  916. struct msgbuf *kmbuf;
  917. mm_segment_t old_fs = get_fs();
  918. u32 arg5;
  919. int rval;
  920. switch(op) {
  921. case 0:
  922. rval = sys_msgget((key_t)arg1, (int)arg2);
  923. break;
  924. case 1:
  925. if (!sunos_msqid_get((struct msqid_ds32 __user *)(unsigned long)arg3, &kds)) {
  926. set_fs(KERNEL_DS);
  927. rval = sys_msgctl((int)arg1, (int)arg2,
  928. (struct msqid_ds __user *)(unsigned long)arg3);
  929. set_fs(old_fs);
  930. if (!rval)
  931. rval = sunos_msqid_put((struct msqid_ds32 __user *)(unsigned long)arg3,
  932. &kds);
  933. } else
  934. rval = -EFAULT;
  935. break;
  936. case 2:
  937. rval = -EFAULT;
  938. kmbuf = kmalloc(sizeof(struct msgbuf) + arg3,
  939. GFP_KERNEL);
  940. if (!kmbuf)
  941. break;
  942. sp = (struct sparc_stackf32 __user *)
  943. (current_thread_info()->kregs->u_regs[UREG_FP] & 0xffffffffUL);
  944. if (get_user(arg5, &sp->xxargs[0])) {
  945. rval = -EFAULT;
  946. kfree(kmbuf);
  947. break;
  948. }
  949. set_fs(KERNEL_DS);
  950. rval = sys_msgrcv((int)arg1, (struct msgbuf __user *) kmbuf,
  951. (size_t)arg3,
  952. (long)arg4, (int)arg5);
  953. set_fs(old_fs);
  954. if (!rval)
  955. rval = sunos_msgbuf_put((struct msgbuf32 __user *)(unsigned long)arg2,
  956. kmbuf, arg3);
  957. kfree(kmbuf);
  958. break;
  959. case 3:
  960. rval = -EFAULT;
  961. kmbuf = kmalloc(sizeof(struct msgbuf) + arg3,
  962. GFP_KERNEL);
  963. if (!kmbuf || sunos_msgbuf_get((struct msgbuf32 __user *)(unsigned long)arg2,
  964. kmbuf, arg3))
  965. break;
  966. set_fs(KERNEL_DS);
  967. rval = sys_msgsnd((int)arg1, (struct msgbuf __user *) kmbuf,
  968. (size_t)arg3, (int)arg4);
  969. set_fs(old_fs);
  970. kfree(kmbuf);
  971. break;
  972. default:
  973. rval = -EINVAL;
  974. break;
  975. }
  976. return rval;
  977. }
  978. struct shmid_ds32 {
  979. struct ipc_perm32 shm_perm;
  980. int shm_segsz;
  981. compat_time_t shm_atime;
  982. compat_time_t shm_dtime;
  983. compat_time_t shm_ctime;
  984. compat_ipc_pid_t shm_cpid;
  985. compat_ipc_pid_t shm_lpid;
  986. unsigned short shm_nattch;
  987. };
  988. static inline int sunos_shmid_get(struct shmid_ds32 __user *user,
  989. struct shmid_ds *kern)
  990. {
  991. if (get_user(kern->shm_perm.key, &user->shm_perm.key) ||
  992. __get_user(kern->shm_perm.uid, &user->shm_perm.uid) ||
  993. __get_user(kern->shm_perm.gid, &user->shm_perm.gid) ||
  994. __get_user(kern->shm_perm.cuid, &user->shm_perm.cuid) ||
  995. __get_user(kern->shm_perm.cgid, &user->shm_perm.cgid) ||
  996. __get_user(kern->shm_segsz, &user->shm_segsz) ||
  997. __get_user(kern->shm_atime, &user->shm_atime) ||
  998. __get_user(kern->shm_dtime, &user->shm_dtime) ||
  999. __get_user(kern->shm_ctime, &user->shm_ctime) ||
  1000. __get_user(kern->shm_cpid, &user->shm_cpid) ||
  1001. __get_user(kern->shm_lpid, &user->shm_lpid) ||
  1002. __get_user(kern->shm_nattch, &user->shm_nattch))
  1003. return -EFAULT;
  1004. return 0;
  1005. }
  1006. static inline int sunos_shmid_put(struct shmid_ds32 __user *user,
  1007. struct shmid_ds *kern)
  1008. {
  1009. if (put_user(kern->shm_perm.key, &user->shm_perm.key) ||
  1010. __put_user(kern->shm_perm.uid, &user->shm_perm.uid) ||
  1011. __put_user(kern->shm_perm.gid, &user->shm_perm.gid) ||
  1012. __put_user(kern->shm_perm.cuid, &user->shm_perm.cuid) ||
  1013. __put_user(kern->shm_perm.cgid, &user->shm_perm.cgid) ||
  1014. __put_user(kern->shm_segsz, &user->shm_segsz) ||
  1015. __put_user(kern->shm_atime, &user->shm_atime) ||
  1016. __put_user(kern->shm_dtime, &user->shm_dtime) ||
  1017. __put_user(kern->shm_ctime, &user->shm_ctime) ||
  1018. __put_user(kern->shm_cpid, &user->shm_cpid) ||
  1019. __put_user(kern->shm_lpid, &user->shm_lpid) ||
  1020. __put_user(kern->shm_nattch, &user->shm_nattch))
  1021. return -EFAULT;
  1022. return 0;
  1023. }
  1024. asmlinkage int sunos_shmsys(int op, u32 arg1, u32 arg2, u32 arg3)
  1025. {
  1026. struct shmid_ds ksds;
  1027. unsigned long raddr;
  1028. mm_segment_t old_fs = get_fs();
  1029. int rval;
  1030. switch(op) {
  1031. case 0:
  1032. /* do_shmat(): attach a shared memory area */
  1033. rval = do_shmat((int)arg1,(char __user *)(unsigned long)arg2,(int)arg3,&raddr);
  1034. if (!rval)
  1035. rval = (int) raddr;
  1036. break;
  1037. case 1:
  1038. /* sys_shmctl(): modify shared memory area attr. */
  1039. if (!sunos_shmid_get((struct shmid_ds32 __user *)(unsigned long)arg3, &ksds)) {
  1040. set_fs(KERNEL_DS);
  1041. rval = sys_shmctl((int) arg1,(int) arg2,
  1042. (struct shmid_ds __user *) &ksds);
  1043. set_fs(old_fs);
  1044. if (!rval)
  1045. rval = sunos_shmid_put((struct shmid_ds32 __user *)(unsigned long)arg3,
  1046. &ksds);
  1047. } else
  1048. rval = -EFAULT;
  1049. break;
  1050. case 2:
  1051. /* sys_shmdt(): detach a shared memory area */
  1052. rval = sys_shmdt((char __user *)(unsigned long)arg1);
  1053. break;
  1054. case 3:
  1055. /* sys_shmget(): get a shared memory area */
  1056. rval = sys_shmget((key_t)arg1,(int)arg2,(int)arg3);
  1057. break;
  1058. default:
  1059. rval = -EINVAL;
  1060. break;
  1061. };
  1062. return rval;
  1063. }
  1064. extern asmlinkage long sparc32_open(const char __user * filename, int flags, int mode);
  1065. asmlinkage int sunos_open(u32 fname, int flags, int mode)
  1066. {
  1067. const char __user *filename = compat_ptr(fname);
  1068. return sparc32_open(filename, flags, mode);
  1069. }
  1070. #define SUNOS_EWOULDBLOCK 35
  1071. /* see the sunos man page read(2v) for an explanation
  1072. of this garbage. We use O_NDELAY to mark
  1073. file descriptors that have been set non-blocking
  1074. using 4.2BSD style calls. (tridge) */
  1075. static inline int check_nonblock(int ret, int fd)
  1076. {
  1077. if (ret == -EAGAIN) {
  1078. struct file * file = fget(fd);
  1079. if (file) {
  1080. if (file->f_flags & O_NDELAY)
  1081. ret = -SUNOS_EWOULDBLOCK;
  1082. fput(file);
  1083. }
  1084. }
  1085. return ret;
  1086. }
  1087. asmlinkage int sunos_read(unsigned int fd, char __user *buf, u32 count)
  1088. {
  1089. int ret;
  1090. ret = check_nonblock(sys_read(fd, buf, count), fd);
  1091. return ret;
  1092. }
  1093. asmlinkage int sunos_readv(u32 fd, void __user *vector, s32 count)
  1094. {
  1095. int ret;
  1096. ret = check_nonblock(compat_sys_readv(fd, vector, count), fd);
  1097. return ret;
  1098. }
  1099. asmlinkage int sunos_write(unsigned int fd, char __user *buf, u32 count)
  1100. {
  1101. int ret;
  1102. ret = check_nonblock(sys_write(fd, buf, count), fd);
  1103. return ret;
  1104. }
  1105. asmlinkage int sunos_writev(u32 fd, void __user *vector, s32 count)
  1106. {
  1107. int ret;
  1108. ret = check_nonblock(compat_sys_writev(fd, vector, count), fd);
  1109. return ret;
  1110. }
  1111. asmlinkage int sunos_recv(u32 __fd, void __user *ubuf, int size, unsigned flags)
  1112. {
  1113. int ret, fd = (int) __fd;
  1114. ret = check_nonblock(sys_recv(fd, ubuf, size, flags), fd);
  1115. return ret;
  1116. }
  1117. asmlinkage int sunos_send(u32 __fd, void __user *buff, int len, unsigned flags)
  1118. {
  1119. int ret, fd = (int) __fd;
  1120. ret = check_nonblock(sys_send(fd, buff, len, flags), fd);
  1121. return ret;
  1122. }
  1123. asmlinkage int sunos_accept(u32 __fd, struct sockaddr __user *sa, int __user *addrlen)
  1124. {
  1125. int ret, fd = (int) __fd;
  1126. while (1) {
  1127. ret = check_nonblock(sys_accept(fd, sa, addrlen), fd);
  1128. if (ret != -ENETUNREACH && ret != -EHOSTUNREACH)
  1129. break;
  1130. }
  1131. return ret;
  1132. }
  1133. #define SUNOS_SV_INTERRUPT 2
  1134. asmlinkage int sunos_sigaction (int sig,
  1135. struct old_sigaction32 __user *act,
  1136. struct old_sigaction32 __user *oact)
  1137. {
  1138. struct k_sigaction new_ka, old_ka;
  1139. int ret;
  1140. if (act) {
  1141. compat_old_sigset_t mask;
  1142. u32 u_handler;
  1143. if (get_user(u_handler, &act->sa_handler) ||
  1144. __get_user(new_ka.sa.sa_flags, &act->sa_flags))
  1145. return -EFAULT;
  1146. new_ka.sa.sa_handler = compat_ptr(u_handler);
  1147. __get_user(mask, &act->sa_mask);
  1148. new_ka.sa.sa_restorer = NULL;
  1149. new_ka.ka_restorer = NULL;
  1150. siginitset(&new_ka.sa.sa_mask, mask);
  1151. new_ka.sa.sa_flags ^= SUNOS_SV_INTERRUPT;
  1152. }
  1153. ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
  1154. if (!ret && oact) {
  1155. old_ka.sa.sa_flags ^= SUNOS_SV_INTERRUPT;
  1156. if (put_user(ptr_to_compat(old_ka.sa.sa_handler), &oact->sa_handler) ||
  1157. __put_user(old_ka.sa.sa_flags, &oact->sa_flags))
  1158. return -EFAULT;
  1159. __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask);
  1160. }
  1161. return ret;
  1162. }
  1163. asmlinkage int sunos_setsockopt(u32 __fd, u32 __level, u32 __optname,
  1164. char __user *optval, u32 __optlen)
  1165. {
  1166. int fd = (int) __fd;
  1167. int level = (int) __level;
  1168. int optname = (int) __optname;
  1169. int optlen = (int) __optlen;
  1170. int tr_opt = optname;
  1171. int ret;
  1172. if (level == SOL_IP) {
  1173. /* Multicast socketopts (ttl, membership) */
  1174. if (tr_opt >=2 && tr_opt <= 6)
  1175. tr_opt += 30;
  1176. }
  1177. ret = sys_setsockopt(fd, level, tr_opt,
  1178. optval, optlen);
  1179. return ret;
  1180. }
  1181. asmlinkage int sunos_getsockopt(u32 __fd, u32 __level, u32 __optname,
  1182. char __user *optval, int __user *optlen)
  1183. {
  1184. int fd = (int) __fd;
  1185. int level = (int) __level;
  1186. int optname = (int) __optname;
  1187. int tr_opt = optname;
  1188. int ret;
  1189. if (level == SOL_IP) {
  1190. /* Multicast socketopts (ttl, membership) */
  1191. if (tr_opt >=2 && tr_opt <= 6)
  1192. tr_opt += 30;
  1193. }
  1194. ret = compat_sys_getsockopt(fd, level, tr_opt,
  1195. optval, optlen);
  1196. return ret;
  1197. }