]> bbs.cooldavid.org Git - net-next-2.6.git/blame - arch/sparc64/kernel/sys_sunos32.c
[PATCH] VFS: Make filldir_t and struct kstat deal in 64-bit inode numbers
[net-next-2.6.git] / arch / sparc64 / kernel / sys_sunos32.c
CommitLineData
1da177e4
LT
1/* $Id: sys_sunos32.c,v 1.64 2002/02/09 19:49:31 davem Exp $
2 * sys_sunos32.c: SunOS binary compatibility layer on sparc64.
3 *
4 * Copyright (C) 1995, 1996, 1997 David S. Miller (davem@caip.rutgers.edu)
5 * Copyright (C) 1995 Miguel de Icaza (miguel@nuclecu.unam.mx)
6 *
7 * Based upon preliminary work which is:
8 *
9 * Copyright (C) 1995 Adrian M. Rodriguez (adrian@remus.rutgers.edu)
10 */
11
12#include <linux/kernel.h>
13#include <linux/sched.h>
14#include <linux/types.h>
a9415644 15#include <linux/capability.h>
1da177e4
LT
16#include <linux/compat.h>
17#include <linux/mman.h>
18#include <linux/mm.h>
19#include <linux/swap.h>
20#include <linux/fs.h>
21#include <linux/file.h>
22#include <linux/resource.h>
23#include <linux/ipc.h>
24#include <linux/shm.h>
25#include <linux/msg.h>
26#include <linux/sem.h>
27#include <linux/signal.h>
28#include <linux/uio.h>
29#include <linux/utsname.h>
30#include <linux/major.h>
31#include <linux/stat.h>
32#include <linux/slab.h>
33#include <linux/pagemap.h>
34#include <linux/errno.h>
35#include <linux/smp.h>
36#include <linux/smp_lock.h>
37#include <linux/syscalls.h>
38
39#include <asm/uaccess.h>
40#include <asm/page.h>
41#include <asm/pgtable.h>
42#include <asm/pconf.h>
43#include <asm/idprom.h> /* for gethostid() */
44#include <asm/unistd.h>
45#include <asm/system.h>
46
47/* For the nfs mount emulation */
48#include <linux/socket.h>
49#include <linux/in.h>
50#include <linux/nfs.h>
51#include <linux/nfs2.h>
52#include <linux/nfs_mount.h>
53
54/* for sunos_select */
55#include <linux/time.h>
56#include <linux/personality.h>
57
58/* For SOCKET_I */
59#include <linux/socket.h>
60#include <net/sock.h>
61#include <net/compat.h>
62
63#define SUNOS_NR_OPEN 256
64
65asmlinkage u32 sunos_mmap(u32 addr, u32 len, u32 prot, u32 flags, u32 fd, u32 off)
66{
67 struct file *file = NULL;
68 unsigned long retval, ret_type;
69
70 if (flags & MAP_NORESERVE) {
71 static int cnt;
72 if (cnt++ < 10)
73 printk("%s: unimplemented SunOS MAP_NORESERVE mmap() flag\n",
74 current->comm);
75 flags &= ~MAP_NORESERVE;
76 }
77 retval = -EBADF;
78 if (!(flags & MAP_ANONYMOUS)) {
79 struct inode * inode;
80 if (fd >= SUNOS_NR_OPEN)
81 goto out;
82 file = fget(fd);
83 if (!file)
84 goto out;
85 inode = file->f_dentry->d_inode;
86 if (imajor(inode) == MEM_MAJOR && iminor(inode) == 5) {
87 flags |= MAP_ANONYMOUS;
88 fput(file);
89 file = NULL;
90 }
91 }
92
93 retval = -EINVAL;
94 if (!(flags & MAP_FIXED))
95 addr = 0;
96 else if (len > 0xf0000000 || addr > 0xf0000000 - len)
97 goto out_putf;
98 ret_type = flags & _MAP_NEW;
99 flags &= ~_MAP_NEW;
100
101 flags &= ~(MAP_EXECUTABLE | MAP_DENYWRITE);
102 down_write(&current->mm->mmap_sem);
103 retval = do_mmap(file,
104 (unsigned long) addr, (unsigned long) len,
105 (unsigned long) prot, (unsigned long) flags,
106 (unsigned long) off);
107 up_write(&current->mm->mmap_sem);
108 if (!ret_type)
109 retval = ((retval < 0xf0000000) ? 0 : retval);
110out_putf:
111 if (file)
112 fput(file);
113out:
114 return (u32) retval;
115}
116
117asmlinkage int sunos_mctl(u32 addr, u32 len, int function, u32 arg)
118{
119 return 0;
120}
121
122asmlinkage int sunos_brk(u32 baddr)
123{
124 int freepages, retval = -ENOMEM;
125 unsigned long rlim;
126 unsigned long newbrk, oldbrk, brk = (unsigned long) baddr;
127
128 down_write(&current->mm->mmap_sem);
129 if (brk < current->mm->end_code)
130 goto out;
131 newbrk = PAGE_ALIGN(brk);
132 oldbrk = PAGE_ALIGN(current->mm->brk);
133 retval = 0;
134 if (oldbrk == newbrk) {
135 current->mm->brk = brk;
136 goto out;
137 }
138 /* Always allow shrinking brk. */
139 if (brk <= current->mm->brk) {
140 current->mm->brk = brk;
141 do_munmap(current->mm, newbrk, oldbrk-newbrk);
142 goto out;
143 }
144 /* Check against rlimit and stack.. */
145 retval = -ENOMEM;
146 rlim = current->signal->rlim[RLIMIT_DATA].rlim_cur;
147 if (rlim >= RLIM_INFINITY)
148 rlim = ~0;
149 if (brk - current->mm->end_code > rlim)
150 goto out;
151 /* Check against existing mmap mappings. */
152 if (find_vma_intersection(current->mm, oldbrk, newbrk+PAGE_SIZE))
153 goto out;
154 /* stupid algorithm to decide if we have enough memory: while
155 * simple, it hopefully works in most obvious cases.. Easy to
156 * fool it, but this should catch most mistakes.
157 */
347ce434 158 freepages = global_page_state(NR_FILE_PAGES);
1da177e4
LT
159 freepages >>= 1;
160 freepages += nr_free_pages();
161 freepages += nr_swap_pages;
162 freepages -= num_physpages >> 4;
163 freepages -= (newbrk-oldbrk) >> PAGE_SHIFT;
164 if (freepages < 0)
165 goto out;
166 /* Ok, we have probably got enough memory - let it rip. */
167 current->mm->brk = brk;
168 do_brk(oldbrk, newbrk-oldbrk);
169 retval = 0;
170out:
171 up_write(&current->mm->mmap_sem);
172 return retval;
173}
174
175asmlinkage u32 sunos_sbrk(int increment)
176{
177 int error, oldbrk;
178
179 /* This should do it hopefully... */
180 oldbrk = (int)current->mm->brk;
181 error = sunos_brk(((int) current->mm->brk) + increment);
182 if (!error)
183 error = oldbrk;
184 return error;
185}
186
187asmlinkage u32 sunos_sstk(int increment)
188{
189 printk("%s: Call to sunos_sstk(increment<%d>) is unsupported\n",
190 current->comm, increment);
191
192 return (u32)-1;
193}
194
195/* Give hints to the kernel as to what paging strategy to use...
196 * Completely bogus, don't remind me.
197 */
198#define VA_NORMAL 0 /* Normal vm usage expected */
199#define VA_ABNORMAL 1 /* Abnormal/random vm usage probable */
200#define VA_SEQUENTIAL 2 /* Accesses will be of a sequential nature */
201#define VA_INVALIDATE 3 /* Page table entries should be flushed ??? */
202static char *vstrings[] = {
203 "VA_NORMAL",
204 "VA_ABNORMAL",
205 "VA_SEQUENTIAL",
206 "VA_INVALIDATE",
207};
208
209asmlinkage void sunos_vadvise(u32 strategy)
210{
211 static int count;
212
213 /* I wanna see who uses this... */
214 if (count++ < 5)
215 printk("%s: Advises us to use %s paging strategy\n",
216 current->comm,
217 strategy <= 3 ? vstrings[strategy] : "BOGUS");
218}
219
220/* This just wants the soft limit (ie. rlim_cur element) of the RLIMIT_NOFILE
221 * resource limit and is for backwards compatibility with older sunos
222 * revs.
223 */
224asmlinkage int sunos_getdtablesize(void)
225{
226 return SUNOS_NR_OPEN;
227}
228
229
230#define _BLOCKABLE (~(sigmask(SIGKILL) | sigmask(SIGSTOP)))
231
232asmlinkage u32 sunos_sigblock(u32 blk_mask)
233{
234 u32 old;
235
236 spin_lock_irq(&current->sighand->siglock);
237 old = (u32) current->blocked.sig[0];
238 current->blocked.sig[0] |= (blk_mask & _BLOCKABLE);
239 recalc_sigpending();
240 spin_unlock_irq(&current->sighand->siglock);
241 return old;
242}
243
244asmlinkage u32 sunos_sigsetmask(u32 newmask)
245{
246 u32 retval;
247
248 spin_lock_irq(&current->sighand->siglock);
249 retval = (u32) current->blocked.sig[0];
250 current->blocked.sig[0] = (newmask & _BLOCKABLE);
251 recalc_sigpending();
252 spin_unlock_irq(&current->sighand->siglock);
253 return retval;
254}
255
256/* SunOS getdents is very similar to the newer Linux (iBCS2 compliant) */
257/* getdents system call, the format of the structure just has a different */
258/* layout (d_off+d_ino instead of d_ino+d_off) */
259struct sunos_dirent {
260 s32 d_off;
261 u32 d_ino;
262 u16 d_reclen;
263 u16 d_namlen;
264 char d_name[1];
265};
266
267struct sunos_dirent_callback {
268 struct sunos_dirent __user *curr;
269 struct sunos_dirent __user *previous;
270 int count;
271 int error;
272};
273
274#define NAME_OFFSET(de) ((int) ((de)->d_name - (char __user *) (de)))
275#define ROUND_UP(x) (((x)+sizeof(s32)-1) & ~(sizeof(s32)-1))
276
277static int sunos_filldir(void * __buf, const char * name, int namlen,
278 loff_t offset, ino_t ino, unsigned int d_type)
279{
280 struct sunos_dirent __user *dirent;
281 struct sunos_dirent_callback * buf = (struct sunos_dirent_callback *) __buf;
282 int reclen = ROUND_UP(NAME_OFFSET(dirent) + namlen + 1);
afefdbb2 283 u32 d_ino;
1da177e4
LT
284
285 buf->error = -EINVAL; /* only used if we fail.. */
286 if (reclen > buf->count)
287 return -EINVAL;
afefdbb2
DH
288 d_ino = ino;
289 if (sizeof(d_ino) < sizeof(ino) && d_ino != ino)
290 return -EOVERFLOW;
1da177e4
LT
291 dirent = buf->previous;
292 if (dirent)
293 put_user(offset, &dirent->d_off);
294 dirent = buf->curr;
295 buf->previous = dirent;
afefdbb2 296 put_user(d_ino, &dirent->d_ino);
1da177e4
LT
297 put_user(namlen, &dirent->d_namlen);
298 put_user(reclen, &dirent->d_reclen);
299 if (copy_to_user(dirent->d_name, name, namlen))
300 return -EFAULT;
301 put_user(0, dirent->d_name + namlen);
302 dirent = (void __user *) dirent + reclen;
303 buf->curr = dirent;
304 buf->count -= reclen;
305 return 0;
306}
307
308asmlinkage int sunos_getdents(unsigned int fd, void __user *dirent, int cnt)
309{
310 struct file * file;
311 struct sunos_dirent __user *lastdirent;
312 struct sunos_dirent_callback buf;
313 int error = -EBADF;
314
315 if (fd >= SUNOS_NR_OPEN)
316 goto out;
317
318 file = fget(fd);
319 if (!file)
320 goto out;
321
322 error = -EINVAL;
323 if (cnt < (sizeof(struct sunos_dirent) + 255))
324 goto out_putf;
325
326 buf.curr = (struct sunos_dirent __user *) dirent;
327 buf.previous = NULL;
328 buf.count = cnt;
329 buf.error = 0;
330
331 error = vfs_readdir(file, sunos_filldir, &buf);
332 if (error < 0)
333 goto out_putf;
334
335 lastdirent = buf.previous;
336 error = buf.error;
337 if (lastdirent) {
338 put_user(file->f_pos, &lastdirent->d_off);
339 error = cnt - buf.count;
340 }
341
342out_putf:
343 fput(file);
344out:
345 return error;
346}
347
348/* Old sunos getdirentries, severely broken compatibility stuff here. */
349struct sunos_direntry {
350 u32 d_ino;
351 u16 d_reclen;
352 u16 d_namlen;
353 char d_name[1];
354};
355
356struct sunos_direntry_callback {
357 struct sunos_direntry __user *curr;
358 struct sunos_direntry __user *previous;
359 int count;
360 int error;
361};
362
363static int sunos_filldirentry(void * __buf, const char * name, int namlen,
364 loff_t offset, ino_t ino, unsigned int d_type)
365{
366 struct sunos_direntry __user *dirent;
367 struct sunos_direntry_callback * buf =
368 (struct sunos_direntry_callback *) __buf;
369 int reclen = ROUND_UP(NAME_OFFSET(dirent) + namlen + 1);
afefdbb2 370 u32 d_ino;
1da177e4
LT
371
372 buf->error = -EINVAL; /* only used if we fail.. */
373 if (reclen > buf->count)
374 return -EINVAL;
afefdbb2
DH
375 d_ino = ino;
376 if (sizeof(d_ino) < sizeof(ino) && d_ino != ino)
377 return -EOVERFLOW;
1da177e4
LT
378 dirent = buf->previous;
379 dirent = buf->curr;
380 buf->previous = dirent;
afefdbb2 381 put_user(d_ino, &dirent->d_ino);
1da177e4
LT
382 put_user(namlen, &dirent->d_namlen);
383 put_user(reclen, &dirent->d_reclen);
384 if (copy_to_user(dirent->d_name, name, namlen))
385 return -EFAULT;
386 put_user(0, dirent->d_name + namlen);
387 dirent = (void __user *) dirent + reclen;
388 buf->curr = dirent;
389 buf->count -= reclen;
390 return 0;
391}
392
393asmlinkage int sunos_getdirentries(unsigned int fd,
394 void __user *dirent,
395 int cnt,
396 unsigned int __user *basep)
397{
398 struct file * file;
399 struct sunos_direntry __user *lastdirent;
400 int error = -EBADF;
401 struct sunos_direntry_callback buf;
402
403 if (fd >= SUNOS_NR_OPEN)
404 goto out;
405
406 file = fget(fd);
407 if (!file)
408 goto out;
409
410 error = -EINVAL;
411 if (cnt < (sizeof(struct sunos_direntry) + 255))
412 goto out_putf;
413
414 buf.curr = (struct sunos_direntry __user *) dirent;
415 buf.previous = NULL;
416 buf.count = cnt;
417 buf.error = 0;
418
419 error = vfs_readdir(file, sunos_filldirentry, &buf);
420 if (error < 0)
421 goto out_putf;
422
423 lastdirent = buf.previous;
424 error = buf.error;
425 if (lastdirent) {
426 put_user(file->f_pos, basep);
427 error = cnt - buf.count;
428 }
429
430out_putf:
431 fput(file);
432out:
433 return error;
434}
435
436struct sunos_utsname {
437 char sname[9];
438 char nname[9];
439 char nnext[56];
440 char rel[9];
441 char ver[9];
442 char mach[9];
443};
444
445asmlinkage int sunos_uname(struct sunos_utsname __user *name)
446{
447 int ret;
448
449 down_read(&uts_sem);
e9ff3990 450 ret = copy_to_user(&name->sname[0], &utsname()->sysname[0],
1da177e4 451 sizeof(name->sname) - 1);
e9ff3990 452 ret |= copy_to_user(&name->nname[0], &utsname()->nodename[0],
1da177e4
LT
453 sizeof(name->nname) - 1);
454 ret |= put_user('\0', &name->nname[8]);
e9ff3990 455 ret |= copy_to_user(&name->rel[0], &utsname()->release[0],
1da177e4 456 sizeof(name->rel) - 1);
e9ff3990 457 ret |= copy_to_user(&name->ver[0], &utsname()->version[0],
1da177e4 458 sizeof(name->ver) - 1);
e9ff3990 459 ret |= copy_to_user(&name->mach[0], &utsname()->machine[0],
1da177e4
LT
460 sizeof(name->mach) - 1);
461 up_read(&uts_sem);
462 return (ret ? -EFAULT : 0);
463}
464
465asmlinkage int sunos_nosys(void)
466{
467 struct pt_regs *regs;
468 siginfo_t info;
469 static int cnt;
470
471 regs = current_thread_info()->kregs;
472 if (test_thread_flag(TIF_32BIT)) {
473 regs->tpc &= 0xffffffff;
474 regs->tnpc &= 0xffffffff;
475 }
476 info.si_signo = SIGSYS;
477 info.si_errno = 0;
478 info.si_code = __SI_FAULT|0x100;
479 info.si_addr = (void __user *)regs->tpc;
480 info.si_trapno = regs->u_regs[UREG_G1];
481 send_sig_info(SIGSYS, &info, current);
482 if (cnt++ < 4) {
483 printk("Process makes ni_syscall number %d, register dump:\n",
484 (int) regs->u_regs[UREG_G1]);
485 show_regs(regs);
486 }
487 return -ENOSYS;
488}
489
490/* This is not a real and complete implementation yet, just to keep
491 * the easy SunOS binaries happy.
492 */
493asmlinkage int sunos_fpathconf(int fd, int name)
494{
495 int ret;
496
497 switch(name) {
498 case _PCONF_LINK:
499 ret = LINK_MAX;
500 break;
501 case _PCONF_CANON:
502 ret = MAX_CANON;
503 break;
504 case _PCONF_INPUT:
505 ret = MAX_INPUT;
506 break;
507 case _PCONF_NAME:
508 ret = NAME_MAX;
509 break;
510 case _PCONF_PATH:
511 ret = PATH_MAX;
512 break;
513 case _PCONF_PIPE:
514 ret = PIPE_BUF;
515 break;
516 case _PCONF_CHRESTRICT: /* XXX Investigate XXX */
517 ret = 1;
518 break;
519 case _PCONF_NOTRUNC: /* XXX Investigate XXX */
520 case _PCONF_VDISABLE:
521 ret = 0;
522 break;
523 default:
524 ret = -EINVAL;
525 break;
526 }
527 return ret;
528}
529
530asmlinkage int sunos_pathconf(u32 u_path, int name)
531{
532 int ret;
533
534 ret = sunos_fpathconf(0, name); /* XXX cheese XXX */
535 return ret;
536}
537
538asmlinkage int sunos_select(int width, u32 inp, u32 outp, u32 exp, u32 tvp_x)
539{
540 int ret;
541
542 /* SunOS binaries expect that select won't change the tvp contents */
543 ret = compat_sys_select(width, compat_ptr(inp), compat_ptr(outp),
544 compat_ptr(exp), compat_ptr(tvp_x));
545 if (ret == -EINTR && tvp_x) {
546 struct compat_timeval __user *tvp = compat_ptr(tvp_x);
547 time_t sec, usec;
548
549 __get_user(sec, &tvp->tv_sec);
550 __get_user(usec, &tvp->tv_usec);
551 if (sec == 0 && usec == 0)
552 ret = 0;
553 }
554 return ret;
555}
556
557asmlinkage void sunos_nop(void)
558{
559 return;
560}
561
562#if 0 /* This code doesn't translate user pointers correctly,
563 * disable for now. -DaveM
564 */
565
566/* XXXXXXXXXX SunOS mount/umount. XXXXXXXXXXX */
567#define SMNT_RDONLY 1
568#define SMNT_NOSUID 2
569#define SMNT_NEWTYPE 4
570#define SMNT_GRPID 8
571#define SMNT_REMOUNT 16
572#define SMNT_NOSUB 32
573#define SMNT_MULTI 64
574#define SMNT_SYS5 128
575
576struct sunos_fh_t {
577 char fh_data [NFS_FHSIZE];
578};
579
580struct sunos_nfs_mount_args {
581 struct sockaddr_in *addr; /* file server address */
582 struct nfs_fh *fh; /* File handle to be mounted */
583 int flags; /* flags */
584 int wsize; /* write size in bytes */
585 int rsize; /* read size in bytes */
586 int timeo; /* initial timeout in .1 secs */
587 int retrans; /* times to retry send */
588 char *hostname; /* server's hostname */
589 int acregmin; /* attr cache file min secs */
590 int acregmax; /* attr cache file max secs */
591 int acdirmin; /* attr cache dir min secs */
592 int acdirmax; /* attr cache dir max secs */
593 char *netname; /* server's netname */
594};
595
596
597/* Bind the socket on a local reserved port and connect it to the
598 * remote server. This on Linux/i386 is done by the mount program,
599 * not by the kernel.
600 */
601/* XXXXXXXXXXXXXXXXXXXX */
602static int
603sunos_nfs_get_server_fd (int fd, struct sockaddr_in *addr)
604{
605 struct sockaddr_in local;
606 struct sockaddr_in server;
607 int try_port;
608 int ret;
609 struct socket *socket;
610 struct inode *inode;
611 struct file *file;
612
613 file = fget(fd);
614 if (!file)
615 return 0;
616
617 inode = file->f_dentry->d_inode;
618
619 socket = SOCKET_I(inode);
620 local.sin_family = AF_INET;
621 local.sin_addr.s_addr = INADDR_ANY;
622
623 /* IPPORT_RESERVED = 1024, can't find the definition in the kernel */
624 try_port = 1024;
625 do {
626 local.sin_port = htons (--try_port);
627 ret = socket->ops->bind(socket, (struct sockaddr*)&local,
628 sizeof(local));
629 } while (ret && try_port > (1024 / 2));
630
631 if (ret) {
632 fput(file);
633 return 0;
634 }
635
636 server.sin_family = AF_INET;
637 server.sin_addr = addr->sin_addr;
638 server.sin_port = NFS_PORT;
639
640 /* Call sys_connect */
641 ret = socket->ops->connect (socket, (struct sockaddr *) &server,
642 sizeof (server), file->f_flags);
643 fput(file);
644 if (ret < 0)
645 return 0;
646 return 1;
647}
648
649/* XXXXXXXXXXXXXXXXXXXX */
650static int get_default (int value, int def_value)
651{
652 if (value)
653 return value;
654 else
655 return def_value;
656}
657
658/* XXXXXXXXXXXXXXXXXXXX */
659static int sunos_nfs_mount(char *dir_name, int linux_flags, void __user *data)
660{
661 int server_fd, err;
662 char *the_name, *mount_page;
663 struct nfs_mount_data linux_nfs_mount;
664 struct sunos_nfs_mount_args sunos_mount;
665
666 /* Ok, here comes the fun part: Linux's nfs mount needs a
667 * socket connection to the server, but SunOS mount does not
668 * require this, so we use the information on the destination
669 * address to create a socket and bind it to a reserved
670 * port on this system
671 */
672 if (copy_from_user(&sunos_mount, data, sizeof(sunos_mount)))
673 return -EFAULT;
674
675 server_fd = sys_socket (AF_INET, SOCK_DGRAM, IPPROTO_UDP);
676 if (server_fd < 0)
677 return -ENXIO;
678
679 if (copy_from_user(&linux_nfs_mount.addr, sunos_mount.addr,
680 sizeof(*sunos_mount.addr)) ||
681 copy_from_user(&linux_nfs_mount.root, sunos_mount.fh,
682 sizeof(*sunos_mount.fh))) {
683 sys_close (server_fd);
684 return -EFAULT;
685 }
686
687 if (!sunos_nfs_get_server_fd (server_fd, &linux_nfs_mount.addr)){
688 sys_close (server_fd);
689 return -ENXIO;
690 }
691
692 /* Now, bind it to a locally reserved port */
693 linux_nfs_mount.version = NFS_MOUNT_VERSION;
694 linux_nfs_mount.flags = sunos_mount.flags;
695 linux_nfs_mount.fd = server_fd;
696
697 linux_nfs_mount.rsize = get_default (sunos_mount.rsize, 8192);
698 linux_nfs_mount.wsize = get_default (sunos_mount.wsize, 8192);
699 linux_nfs_mount.timeo = get_default (sunos_mount.timeo, 10);
700 linux_nfs_mount.retrans = sunos_mount.retrans;
701
702 linux_nfs_mount.acregmin = sunos_mount.acregmin;
703 linux_nfs_mount.acregmax = sunos_mount.acregmax;
704 linux_nfs_mount.acdirmin = sunos_mount.acdirmin;
705 linux_nfs_mount.acdirmax = sunos_mount.acdirmax;
706
707 the_name = getname(sunos_mount.hostname);
708 if (IS_ERR(the_name))
709 return PTR_ERR(the_name);
710
711 strlcpy(linux_nfs_mount.hostname, the_name,
712 sizeof(linux_nfs_mount.hostname));
713 putname (the_name);
714
715 mount_page = (char *) get_zeroed_page(GFP_KERNEL);
716 if (!mount_page)
717 return -ENOMEM;
718
719 memcpy(mount_page, &linux_nfs_mount, sizeof(linux_nfs_mount));
720
721 err = do_mount("", dir_name, "nfs", linux_flags, mount_page);
722
723 free_page((unsigned long) mount_page);
724 return err;
725}
726
727/* XXXXXXXXXXXXXXXXXXXX */
728asmlinkage int
729sunos_mount(char *type, char *dir, int flags, void *data)
730{
731 int linux_flags = 0;
732 int ret = -EINVAL;
733 char *dev_fname = 0;
734 char *dir_page, *type_page;
735
736 if (!capable (CAP_SYS_ADMIN))
737 return -EPERM;
738
739 /* We don't handle the integer fs type */
740 if ((flags & SMNT_NEWTYPE) == 0)
741 goto out;
742
743 /* Do not allow for those flags we don't support */
744 if (flags & (SMNT_GRPID|SMNT_NOSUB|SMNT_MULTI|SMNT_SYS5))
745 goto out;
746
747 if (flags & SMNT_REMOUNT)
748 linux_flags |= MS_REMOUNT;
749 if (flags & SMNT_RDONLY)
750 linux_flags |= MS_RDONLY;
751 if (flags & SMNT_NOSUID)
752 linux_flags |= MS_NOSUID;
753
754 dir_page = getname(dir);
755 ret = PTR_ERR(dir_page);
756 if (IS_ERR(dir_page))
757 goto out;
758
759 type_page = getname(type);
760 ret = PTR_ERR(type_page);
761 if (IS_ERR(type_page))
762 goto out1;
763
764 if (strcmp(type_page, "ext2") == 0) {
765 dev_fname = getname(data);
766 } else if (strcmp(type_page, "iso9660") == 0) {
767 dev_fname = getname(data);
768 } else if (strcmp(type_page, "minix") == 0) {
769 dev_fname = getname(data);
770 } else if (strcmp(type_page, "nfs") == 0) {
771 ret = sunos_nfs_mount (dir_page, flags, data);
772 goto out2;
773 } else if (strcmp(type_page, "ufs") == 0) {
774 printk("Warning: UFS filesystem mounts unsupported.\n");
775 ret = -ENODEV;
776 goto out2;
777 } else if (strcmp(type_page, "proc")) {
778 ret = -ENODEV;
779 goto out2;
780 }
781 ret = PTR_ERR(dev_fname);
782 if (IS_ERR(dev_fname))
783 goto out2;
784 lock_kernel();
785 ret = do_mount(dev_fname, dir_page, type_page, linux_flags, NULL);
786 unlock_kernel();
787 if (dev_fname)
788 putname(dev_fname);
789out2:
790 putname(type_page);
791out1:
792 putname(dir_page);
793out:
794 return ret;
795}
796#endif
797
798asmlinkage int sunos_setpgrp(pid_t pid, pid_t pgid)
799{
800 int ret;
801
802 /* So stupid... */
803 if ((!pid || pid == current->pid) &&
804 !pgid) {
805 sys_setsid();
806 ret = 0;
807 } else {
808 ret = sys_setpgid(pid, pgid);
809 }
810 return ret;
811}
812
813/* So stupid... */
814extern long compat_sys_wait4(compat_pid_t, compat_uint_t __user *, int,
815 struct compat_rusage __user *);
816
817asmlinkage int sunos_wait4(compat_pid_t pid, compat_uint_t __user *stat_addr, int options, struct compat_rusage __user *ru)
818{
819 int ret;
820
821 ret = compat_sys_wait4((pid ? pid : ((compat_pid_t)-1)),
822 stat_addr, options, ru);
823 return ret;
824}
825
826extern int kill_pg(int, int, int);
827asmlinkage int sunos_killpg(int pgrp, int sig)
828{
829 return kill_pg(pgrp, sig, 0);
830}
831
832asmlinkage int sunos_audit(void)
833{
834 printk ("sys_audit\n");
835 return -1;
836}
837
838asmlinkage u32 sunos_gethostid(void)
839{
840 u32 ret;
841
842 ret = (((u32)idprom->id_machtype << 24) | ((u32)idprom->id_sernum));
843
844 return ret;
845}
846
847/* sysconf options, for SunOS compatibility */
848#define _SC_ARG_MAX 1
849#define _SC_CHILD_MAX 2
850#define _SC_CLK_TCK 3
851#define _SC_NGROUPS_MAX 4
852#define _SC_OPEN_MAX 5
853#define _SC_JOB_CONTROL 6
854#define _SC_SAVED_IDS 7
855#define _SC_VERSION 8
856
857asmlinkage s32 sunos_sysconf (int name)
858{
859 s32 ret;
860
861 switch (name){
862 case _SC_ARG_MAX:
863 ret = ARG_MAX;
864 break;
865 case _SC_CHILD_MAX:
597d1f06 866 ret = -1; /* no limit */
1da177e4
LT
867 break;
868 case _SC_CLK_TCK:
869 ret = HZ;
870 break;
871 case _SC_NGROUPS_MAX:
872 ret = NGROUPS_MAX;
873 break;
874 case _SC_OPEN_MAX:
875 ret = OPEN_MAX;
876 break;
877 case _SC_JOB_CONTROL:
878 ret = 1; /* yes, we do support job control */
879 break;
880 case _SC_SAVED_IDS:
881 ret = 1; /* yes, we do support saved uids */
882 break;
883 case _SC_VERSION:
884 /* mhm, POSIX_VERSION is in /usr/include/unistd.h
885 * should it go on /usr/include/linux?
886 */
887 ret = 199009;
888 break;
889 default:
890 ret = -1;
891 break;
892 };
893 return ret;
894}
895
896asmlinkage int sunos_semsys(int op, u32 arg1, u32 arg2, u32 arg3, void __user *ptr)
897{
898 union semun arg4;
899 int ret;
900
901 switch (op) {
902 case 0:
903 /* Most arguments match on a 1:1 basis but cmd doesn't */
904 switch(arg3) {
905 case 4:
906 arg3=GETPID; break;
907 case 5:
908 arg3=GETVAL; break;
909 case 6:
910 arg3=GETALL; break;
911 case 3:
912 arg3=GETNCNT; break;
913 case 7:
914 arg3=GETZCNT; break;
915 case 8:
916 arg3=SETVAL; break;
917 case 9:
918 arg3=SETALL; break;
919 }
920 /* sys_semctl(): */
921 /* value to modify semaphore to */
922 arg4.__pad = ptr;
923 ret = sys_semctl((int)arg1, (int)arg2, (int)arg3, arg4);
924 break;
925 case 1:
926 /* sys_semget(): */
927 ret = sys_semget((key_t)arg1, (int)arg2, (int)arg3);
928 break;
929 case 2:
930 /* sys_semop(): */
931 ret = sys_semop((int)arg1, (struct sembuf __user *)(unsigned long)arg2,
932 (unsigned int) arg3);
933 break;
934 default:
935 ret = -EINVAL;
936 break;
937 };
938 return ret;
939}
940
941struct msgbuf32 {
942 s32 mtype;
943 char mtext[1];
944};
945
946struct ipc_perm32
947{
948 key_t key;
949 compat_uid_t uid;
950 compat_gid_t gid;
951 compat_uid_t cuid;
952 compat_gid_t cgid;
953 compat_mode_t mode;
954 unsigned short seq;
955};
956
957struct msqid_ds32
958{
959 struct ipc_perm32 msg_perm;
960 u32 msg_first;
961 u32 msg_last;
962 compat_time_t msg_stime;
963 compat_time_t msg_rtime;
964 compat_time_t msg_ctime;
965 u32 wwait;
966 u32 rwait;
967 unsigned short msg_cbytes;
968 unsigned short msg_qnum;
969 unsigned short msg_qbytes;
970 compat_ipc_pid_t msg_lspid;
971 compat_ipc_pid_t msg_lrpid;
972};
973
974static inline int sunos_msqid_get(struct msqid_ds32 __user *user,
975 struct msqid_ds *kern)
976{
977 if (get_user(kern->msg_perm.key, &user->msg_perm.key) ||
978 __get_user(kern->msg_perm.uid, &user->msg_perm.uid) ||
979 __get_user(kern->msg_perm.gid, &user->msg_perm.gid) ||
980 __get_user(kern->msg_perm.cuid, &user->msg_perm.cuid) ||
981 __get_user(kern->msg_perm.cgid, &user->msg_perm.cgid) ||
982 __get_user(kern->msg_stime, &user->msg_stime) ||
983 __get_user(kern->msg_rtime, &user->msg_rtime) ||
984 __get_user(kern->msg_ctime, &user->msg_ctime) ||
985 __get_user(kern->msg_ctime, &user->msg_cbytes) ||
986 __get_user(kern->msg_ctime, &user->msg_qnum) ||
987 __get_user(kern->msg_ctime, &user->msg_qbytes) ||
988 __get_user(kern->msg_ctime, &user->msg_lspid) ||
989 __get_user(kern->msg_ctime, &user->msg_lrpid))
990 return -EFAULT;
991 return 0;
992}
993
994static inline int sunos_msqid_put(struct msqid_ds32 __user *user,
995 struct msqid_ds *kern)
996{
997 if (put_user(kern->msg_perm.key, &user->msg_perm.key) ||
998 __put_user(kern->msg_perm.uid, &user->msg_perm.uid) ||
999 __put_user(kern->msg_perm.gid, &user->msg_perm.gid) ||
1000 __put_user(kern->msg_perm.cuid, &user->msg_perm.cuid) ||
1001 __put_user(kern->msg_perm.cgid, &user->msg_perm.cgid) ||
1002 __put_user(kern->msg_stime, &user->msg_stime) ||
1003 __put_user(kern->msg_rtime, &user->msg_rtime) ||
1004 __put_user(kern->msg_ctime, &user->msg_ctime) ||
1005 __put_user(kern->msg_ctime, &user->msg_cbytes) ||
1006 __put_user(kern->msg_ctime, &user->msg_qnum) ||
1007 __put_user(kern->msg_ctime, &user->msg_qbytes) ||
1008 __put_user(kern->msg_ctime, &user->msg_lspid) ||
1009 __put_user(kern->msg_ctime, &user->msg_lrpid))
1010 return -EFAULT;
1011 return 0;
1012}
1013
1014static inline int sunos_msgbuf_get(struct msgbuf32 __user *user, struct msgbuf *kern, int len)
1015{
1016 if (get_user(kern->mtype, &user->mtype) ||
1017 __copy_from_user(kern->mtext, &user->mtext, len))
1018 return -EFAULT;
1019 return 0;
1020}
1021
1022static inline int sunos_msgbuf_put(struct msgbuf32 __user *user, struct msgbuf *kern, int len)
1023{
1024 if (put_user(kern->mtype, &user->mtype) ||
1025 __copy_to_user(user->mtext, kern->mtext, len))
1026 return -EFAULT;
1027 return 0;
1028}
1029
1030asmlinkage int sunos_msgsys(int op, u32 arg1, u32 arg2, u32 arg3, u32 arg4)
1031{
1032 struct sparc_stackf32 __user *sp;
1033 struct msqid_ds kds;
1034 struct msgbuf *kmbuf;
1035 mm_segment_t old_fs = get_fs();
1036 u32 arg5;
1037 int rval;
1038
1039 switch(op) {
1040 case 0:
1041 rval = sys_msgget((key_t)arg1, (int)arg2);
1042 break;
1043 case 1:
1044 if (!sunos_msqid_get((struct msqid_ds32 __user *)(unsigned long)arg3, &kds)) {
1045 set_fs(KERNEL_DS);
1046 rval = sys_msgctl((int)arg1, (int)arg2,
1047 (struct msqid_ds __user *)(unsigned long)arg3);
1048 set_fs(old_fs);
1049 if (!rval)
1050 rval = sunos_msqid_put((struct msqid_ds32 __user *)(unsigned long)arg3,
1051 &kds);
1052 } else
1053 rval = -EFAULT;
1054 break;
1055 case 2:
1056 rval = -EFAULT;
1057 kmbuf = (struct msgbuf *)kmalloc(sizeof(struct msgbuf) + arg3,
1058 GFP_KERNEL);
1059 if (!kmbuf)
1060 break;
1061 sp = (struct sparc_stackf32 __user *)
1062 (current_thread_info()->kregs->u_regs[UREG_FP] & 0xffffffffUL);
1063 if (get_user(arg5, &sp->xxargs[0])) {
1064 rval = -EFAULT;
1065 kfree(kmbuf);
1066 break;
1067 }
1068 set_fs(KERNEL_DS);
1069 rval = sys_msgrcv((int)arg1, (struct msgbuf __user *) kmbuf,
1070 (size_t)arg3,
1071 (long)arg4, (int)arg5);
1072 set_fs(old_fs);
1073 if (!rval)
1074 rval = sunos_msgbuf_put((struct msgbuf32 __user *)(unsigned long)arg2,
1075 kmbuf, arg3);
1076 kfree(kmbuf);
1077 break;
1078 case 3:
1079 rval = -EFAULT;
1080 kmbuf = (struct msgbuf *)kmalloc(sizeof(struct msgbuf) + arg3,
1081 GFP_KERNEL);
1082 if (!kmbuf || sunos_msgbuf_get((struct msgbuf32 __user *)(unsigned long)arg2,
1083 kmbuf, arg3))
1084 break;
1085 set_fs(KERNEL_DS);
1086 rval = sys_msgsnd((int)arg1, (struct msgbuf __user *) kmbuf,
1087 (size_t)arg3, (int)arg4);
1088 set_fs(old_fs);
1089 kfree(kmbuf);
1090 break;
1091 default:
1092 rval = -EINVAL;
1093 break;
1094 }
1095 return rval;
1096}
1097
1098struct shmid_ds32 {
1099 struct ipc_perm32 shm_perm;
1100 int shm_segsz;
1101 compat_time_t shm_atime;
1102 compat_time_t shm_dtime;
1103 compat_time_t shm_ctime;
1104 compat_ipc_pid_t shm_cpid;
1105 compat_ipc_pid_t shm_lpid;
1106 unsigned short shm_nattch;
1107};
1108
1109static inline int sunos_shmid_get(struct shmid_ds32 __user *user,
1110 struct shmid_ds *kern)
1111{
1112 if (get_user(kern->shm_perm.key, &user->shm_perm.key) ||
1113 __get_user(kern->shm_perm.uid, &user->shm_perm.uid) ||
1114 __get_user(kern->shm_perm.gid, &user->shm_perm.gid) ||
1115 __get_user(kern->shm_perm.cuid, &user->shm_perm.cuid) ||
1116 __get_user(kern->shm_perm.cgid, &user->shm_perm.cgid) ||
1117 __get_user(kern->shm_segsz, &user->shm_segsz) ||
1118 __get_user(kern->shm_atime, &user->shm_atime) ||
1119 __get_user(kern->shm_dtime, &user->shm_dtime) ||
1120 __get_user(kern->shm_ctime, &user->shm_ctime) ||
1121 __get_user(kern->shm_cpid, &user->shm_cpid) ||
1122 __get_user(kern->shm_lpid, &user->shm_lpid) ||
1123 __get_user(kern->shm_nattch, &user->shm_nattch))
1124 return -EFAULT;
1125 return 0;
1126}
1127
1128static inline int sunos_shmid_put(struct shmid_ds32 __user *user,
1129 struct shmid_ds *kern)
1130{
1131 if (put_user(kern->shm_perm.key, &user->shm_perm.key) ||
1132 __put_user(kern->shm_perm.uid, &user->shm_perm.uid) ||
1133 __put_user(kern->shm_perm.gid, &user->shm_perm.gid) ||
1134 __put_user(kern->shm_perm.cuid, &user->shm_perm.cuid) ||
1135 __put_user(kern->shm_perm.cgid, &user->shm_perm.cgid) ||
1136 __put_user(kern->shm_segsz, &user->shm_segsz) ||
1137 __put_user(kern->shm_atime, &user->shm_atime) ||
1138 __put_user(kern->shm_dtime, &user->shm_dtime) ||
1139 __put_user(kern->shm_ctime, &user->shm_ctime) ||
1140 __put_user(kern->shm_cpid, &user->shm_cpid) ||
1141 __put_user(kern->shm_lpid, &user->shm_lpid) ||
1142 __put_user(kern->shm_nattch, &user->shm_nattch))
1143 return -EFAULT;
1144 return 0;
1145}
1146
1147asmlinkage int sunos_shmsys(int op, u32 arg1, u32 arg2, u32 arg3)
1148{
1149 struct shmid_ds ksds;
1150 unsigned long raddr;
1151 mm_segment_t old_fs = get_fs();
1152 int rval;
1153
1154 switch(op) {
1155 case 0:
1156 /* do_shmat(): attach a shared memory area */
1157 rval = do_shmat((int)arg1,(char __user *)(unsigned long)arg2,(int)arg3,&raddr);
1158 if (!rval)
1159 rval = (int) raddr;
1160 break;
1161 case 1:
1162 /* sys_shmctl(): modify shared memory area attr. */
1163 if (!sunos_shmid_get((struct shmid_ds32 __user *)(unsigned long)arg3, &ksds)) {
1164 set_fs(KERNEL_DS);
1165 rval = sys_shmctl((int) arg1,(int) arg2,
1166 (struct shmid_ds __user *) &ksds);
1167 set_fs(old_fs);
1168 if (!rval)
1169 rval = sunos_shmid_put((struct shmid_ds32 __user *)(unsigned long)arg3,
1170 &ksds);
1171 } else
1172 rval = -EFAULT;
1173 break;
1174 case 2:
1175 /* sys_shmdt(): detach a shared memory area */
1176 rval = sys_shmdt((char __user *)(unsigned long)arg1);
1177 break;
1178 case 3:
1179 /* sys_shmget(): get a shared memory area */
1180 rval = sys_shmget((key_t)arg1,(int)arg2,(int)arg3);
1181 break;
1182 default:
1183 rval = -EINVAL;
1184 break;
1185 };
1186 return rval;
1187}
1188
1189extern asmlinkage long sparc32_open(const char __user * filename, int flags, int mode);
1190
1191asmlinkage int sunos_open(u32 fname, int flags, int mode)
1192{
1193 const char __user *filename = compat_ptr(fname);
1194
1195 return sparc32_open(filename, flags, mode);
1196}
1197
1198#define SUNOS_EWOULDBLOCK 35
1199
1200/* see the sunos man page read(2v) for an explanation
1201 of this garbage. We use O_NDELAY to mark
1202 file descriptors that have been set non-blocking
1203 using 4.2BSD style calls. (tridge) */
1204
1205static inline int check_nonblock(int ret, int fd)
1206{
1207 if (ret == -EAGAIN) {
1208 struct file * file = fget(fd);
1209 if (file) {
1210 if (file->f_flags & O_NDELAY)
1211 ret = -SUNOS_EWOULDBLOCK;
1212 fput(file);
1213 }
1214 }
1215 return ret;
1216}
1217
1218asmlinkage int sunos_read(unsigned int fd, char __user *buf, u32 count)
1219{
1220 int ret;
1221
1222 ret = check_nonblock(sys_read(fd, buf, count), fd);
1223 return ret;
1224}
1225
1226asmlinkage int sunos_readv(u32 fd, void __user *vector, s32 count)
1227{
1228 int ret;
1229
1230 ret = check_nonblock(compat_sys_readv(fd, vector, count), fd);
1231 return ret;
1232}
1233
1234asmlinkage int sunos_write(unsigned int fd, char __user *buf, u32 count)
1235{
1236 int ret;
1237
1238 ret = check_nonblock(sys_write(fd, buf, count), fd);
1239 return ret;
1240}
1241
1242asmlinkage int sunos_writev(u32 fd, void __user *vector, s32 count)
1243{
1244 int ret;
1245
1246 ret = check_nonblock(compat_sys_writev(fd, vector, count), fd);
1247 return ret;
1248}
1249
1250asmlinkage int sunos_recv(u32 __fd, void __user *ubuf, int size, unsigned flags)
1251{
1252 int ret, fd = (int) __fd;
1253
1254 ret = check_nonblock(sys_recv(fd, ubuf, size, flags), fd);
1255 return ret;
1256}
1257
1258asmlinkage int sunos_send(u32 __fd, void __user *buff, int len, unsigned flags)
1259{
1260 int ret, fd = (int) __fd;
1261
1262 ret = check_nonblock(sys_send(fd, buff, len, flags), fd);
1263 return ret;
1264}
1265
1266asmlinkage int sunos_accept(u32 __fd, struct sockaddr __user *sa, int __user *addrlen)
1267{
1268 int ret, fd = (int) __fd;
1269
1270 while (1) {
1271 ret = check_nonblock(sys_accept(fd, sa, addrlen), fd);
1272 if (ret != -ENETUNREACH && ret != -EHOSTUNREACH)
1273 break;
1274 }
1275 return ret;
1276}
1277
1278#define SUNOS_SV_INTERRUPT 2
1279
1280asmlinkage int sunos_sigaction (int sig,
1281 struct old_sigaction32 __user *act,
1282 struct old_sigaction32 __user *oact)
1283{
1284 struct k_sigaction new_ka, old_ka;
1285 int ret;
1286
1287 if (act) {
1288 compat_old_sigset_t mask;
1289 u32 u_handler;
1290
1291 if (get_user(u_handler, &act->sa_handler) ||
1292 __get_user(new_ka.sa.sa_flags, &act->sa_flags))
1293 return -EFAULT;
1294 new_ka.sa.sa_handler = compat_ptr(u_handler);
1295 __get_user(mask, &act->sa_mask);
1296 new_ka.sa.sa_restorer = NULL;
1297 new_ka.ka_restorer = NULL;
1298 siginitset(&new_ka.sa.sa_mask, mask);
1299 new_ka.sa.sa_flags ^= SUNOS_SV_INTERRUPT;
1300 }
1301
1302 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
1303
1304 if (!ret && oact) {
1305 old_ka.sa.sa_flags ^= SUNOS_SV_INTERRUPT;
1306 if (put_user(ptr_to_compat(old_ka.sa.sa_handler), &oact->sa_handler) ||
1307 __put_user(old_ka.sa.sa_flags, &oact->sa_flags))
1308 return -EFAULT;
1309 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask);
1310 }
1311
1312 return ret;
1313}
1314
1315asmlinkage int sunos_setsockopt(u32 __fd, u32 __level, u32 __optname,
1316 char __user *optval, u32 __optlen)
1317{
1318 int fd = (int) __fd;
1319 int level = (int) __level;
1320 int optname = (int) __optname;
1321 int optlen = (int) __optlen;
1322 int tr_opt = optname;
1323 int ret;
1324
1325 if (level == SOL_IP) {
1326 /* Multicast socketopts (ttl, membership) */
1327 if (tr_opt >=2 && tr_opt <= 6)
1328 tr_opt += 30;
1329 }
1330 ret = sys_setsockopt(fd, level, tr_opt,
1331 optval, optlen);
1332 return ret;
1333}
1334
1335asmlinkage int sunos_getsockopt(u32 __fd, u32 __level, u32 __optname,
1336 char __user *optval, int __user *optlen)
1337{
1338 int fd = (int) __fd;
1339 int level = (int) __level;
1340 int optname = (int) __optname;
1341 int tr_opt = optname;
1342 int ret;
1343
1344 if (level == SOL_IP) {
1345 /* Multicast socketopts (ttl, membership) */
1346 if (tr_opt >=2 && tr_opt <= 6)
1347 tr_opt += 30;
1348 }
1349 ret = compat_sys_getsockopt(fd, level, tr_opt,
1350 optval, optlen);
1351 return ret;
1352}