Home | History | Annotate | Line # | Download | only in common
      1 /*	$NetBSD: linux_file.c,v 1.133 2024/10/01 17:46:51 riastradh Exp $	*/
      2 
      3 /*-
      4  * Copyright (c) 1995, 1998, 2008 The NetBSD Foundation, Inc.
      5  * All rights reserved.
      6  *
      7  * This code is derived from software contributed to The NetBSD Foundation
      8  * by Frank van der Linden and Eric Haszlakiewicz.
      9  *
     10  * Redistribution and use in source and binary forms, with or without
     11  * modification, are permitted provided that the following conditions
     12  * are met:
     13  * 1. Redistributions of source code must retain the above copyright
     14  *    notice, this list of conditions and the following disclaimer.
     15  * 2. Redistributions in binary form must reproduce the above copyright
     16  *    notice, this list of conditions and the following disclaimer in the
     17  *    documentation and/or other materials provided with the distribution.
     18  *
     19  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     20  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     21  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     22  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     23  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     24  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     25  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     26  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     27  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     28  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     29  * POSSIBILITY OF SUCH DAMAGE.
     30  */
     31 
     32 /*
     33  * Functions in multiarch:
     34  *	linux_sys_llseek	: linux_llseek.c
     35  */
     36 
     37 #include <sys/cdefs.h>
     38 __KERNEL_RCSID(0, "$NetBSD: linux_file.c,v 1.133 2024/10/01 17:46:51 riastradh Exp $");
     39 
     40 #include <sys/types.h>
     41 #include <sys/param.h>
     42 #include <sys/systm.h>
     43 #include <sys/namei.h>
     44 #include <sys/proc.h>
     45 #include <sys/file.h>
     46 #include <sys/fcntl.h>
     47 #include <sys/stat.h>
     48 #include <sys/vfs_syscalls.h>
     49 #include <sys/filedesc.h>
     50 #include <sys/ioctl.h>
     51 #include <sys/kernel.h>
     52 #include <sys/mount.h>
     53 #include <sys/namei.h>
     54 #include <sys/vnode.h>
     55 #include <sys/tty.h>
     56 #include <sys/socketvar.h>
     57 #include <sys/conf.h>
     58 #include <sys/pipe.h>
     59 #include <sys/fstrans.h>
     60 #include <sys/syscallargs.h>
     61 #include <sys/vfs_syscalls.h>
     62 
     63 #include <compat/linux/common/linux_types.h>
     64 #include <compat/linux/common/linux_signal.h>
     65 #include <compat/linux/common/linux_fcntl.h>
     66 #include <compat/linux/common/linux_util.h>
     67 #include <compat/linux/common/linux_machdep.h>
     68 #include <compat/linux/common/linux_ipc.h>
     69 #include <compat/linux/common/linux_sem.h>
     70 
     71 #include <compat/linux/linux_syscallargs.h>
     72 
     73 #ifdef DEBUG_LINUX
     74 #define DPRINTF(a, ...)	uprintf(a, __VA_ARGS__)
     75 #else
     76 #define DPRINTF(a, ...)
     77 #endif
     78 
     79 #define LINUX_COPY_FILE_RANGE_MAX_CHUNK 8192
     80 
     81 static int bsd_to_linux_ioflags(int);
     82 #if !defined(__aarch64__) && !defined(__amd64__)
     83 static void bsd_to_linux_stat(struct stat *, struct linux_stat *);
     84 #endif
     85 
     86 conv_linux_flock(linux, flock)
     87 
     88 /*
     89  * Some file-related calls are handled here. The usual flag conversion
     90  * an structure conversion is done, and alternate emul path searching.
     91  */
     92 
     93 /*
     94  * The next two functions convert between the Linux and NetBSD values
     95  * of the flags used in open(2) and fcntl(2).
     96  */
     97 int
     98 linux_to_bsd_ioflags(int lflags)
     99 {
    100 	int res = 0;
    101 
    102 	res |= cvtto_bsd_mask(lflags, LINUX_O_WRONLY, O_WRONLY);
    103 	res |= cvtto_bsd_mask(lflags, LINUX_O_RDONLY, O_RDONLY);
    104 	res |= cvtto_bsd_mask(lflags, LINUX_O_RDWR, O_RDWR);
    105 
    106 	res |= cvtto_bsd_mask(lflags, LINUX_O_CREAT, O_CREAT);
    107 	res |= cvtto_bsd_mask(lflags, LINUX_O_EXCL, O_EXCL);
    108 	res |= cvtto_bsd_mask(lflags, LINUX_O_NOCTTY, O_NOCTTY);
    109 	res |= cvtto_bsd_mask(lflags, LINUX_O_TRUNC, O_TRUNC);
    110 	res |= cvtto_bsd_mask(lflags, LINUX_O_APPEND, O_APPEND);
    111 	res |= cvtto_bsd_mask(lflags, LINUX_O_NONBLOCK, O_NONBLOCK);
    112 	res |= cvtto_bsd_mask(lflags, LINUX_O_NDELAY, O_NDELAY);
    113 	res |= cvtto_bsd_mask(lflags, LINUX_O_SYNC, O_FSYNC);
    114 	res |= cvtto_bsd_mask(lflags, LINUX_FASYNC, O_ASYNC);
    115 	res |= cvtto_bsd_mask(lflags, LINUX_O_DIRECT, O_DIRECT);
    116 	res |= cvtto_bsd_mask(lflags, LINUX_O_DIRECTORY, O_DIRECTORY);
    117 	res |= cvtto_bsd_mask(lflags, LINUX_O_NOFOLLOW, O_NOFOLLOW);
    118 	res |= cvtto_bsd_mask(lflags, LINUX_O_CLOEXEC, O_CLOEXEC);
    119 
    120 	return res;
    121 }
    122 
    123 static int
    124 bsd_to_linux_ioflags(int bflags)
    125 {
    126 	int res = 0;
    127 
    128 	res |= cvtto_linux_mask(bflags, O_WRONLY, LINUX_O_WRONLY);
    129 	res |= cvtto_linux_mask(bflags, O_RDONLY, LINUX_O_RDONLY);
    130 	res |= cvtto_linux_mask(bflags, O_RDWR, LINUX_O_RDWR);
    131 
    132 	res |= cvtto_linux_mask(bflags, O_CREAT, LINUX_O_CREAT);
    133 	res |= cvtto_linux_mask(bflags, O_EXCL, LINUX_O_EXCL);
    134 	res |= cvtto_linux_mask(bflags, O_NOCTTY, LINUX_O_NOCTTY);
    135 	res |= cvtto_linux_mask(bflags, O_TRUNC, LINUX_O_TRUNC);
    136 	res |= cvtto_linux_mask(bflags, O_APPEND, LINUX_O_APPEND);
    137 	res |= cvtto_linux_mask(bflags, O_NONBLOCK, LINUX_O_NONBLOCK);
    138 	res |= cvtto_linux_mask(bflags, O_NDELAY, LINUX_O_NDELAY);
    139 	res |= cvtto_linux_mask(bflags, O_FSYNC, LINUX_O_SYNC);
    140 	res |= cvtto_linux_mask(bflags, O_ASYNC, LINUX_FASYNC);
    141 	res |= cvtto_linux_mask(bflags, O_DIRECT, LINUX_O_DIRECT);
    142 	res |= cvtto_linux_mask(bflags, O_DIRECTORY, LINUX_O_DIRECTORY);
    143 	res |= cvtto_linux_mask(bflags, O_NOFOLLOW, LINUX_O_NOFOLLOW);
    144 	res |= cvtto_linux_mask(bflags, O_CLOEXEC, LINUX_O_CLOEXEC);
    145 
    146 	return res;
    147 }
    148 
    149 static inline off_t
    150 linux_hilo_to_off_t(unsigned long hi, unsigned long lo)
    151 {
    152 #ifdef _LP64
    153 	/*
    154 	 * Linux discards the "hi" portion on LP64 platforms; even though
    155 	 * glibc puts of the upper 32-bits of the offset into the "hi"
    156 	 * argument regardless, the "lo" argument has all the bits in
    157 	 * this case.
    158 	 */
    159 	(void) hi;
    160 	return (off_t)lo;
    161 #else
    162 	return (((off_t)hi) << 32) | lo;
    163 #endif /* _LP64 */
    164 }
    165 
    166 #if !defined(__aarch64__)
    167 /*
    168  * creat(2) is an obsolete function, but it's present as a Linux
    169  * system call, so let's deal with it.
    170  *
    171  * Note: On the Alpha this doesn't really exist in Linux, but it's defined
    172  * in syscalls.master anyway so this doesn't have to be special cased.
    173  *
    174  * Just call open(2) with the TRUNC, CREAT and WRONLY flags.
    175  */
    176 int
    177 linux_sys_creat(struct lwp *l, const struct linux_sys_creat_args *uap,
    178     register_t *retval)
    179 {
    180 	/* {
    181 		syscallarg(const char *) path;
    182 		syscallarg(linux_umode_t) mode;
    183 	} */
    184 	struct sys_open_args oa;
    185 
    186 	SCARG(&oa, path) = SCARG(uap, path);
    187 	SCARG(&oa, flags) = O_CREAT | O_TRUNC | O_WRONLY;
    188 	SCARG(&oa, mode) = SCARG(uap, mode);
    189 
    190 	return sys_open(l, &oa, retval);
    191 }
    192 #endif
    193 
    194 static void
    195 linux_open_ctty(struct lwp *l, int flags, int fd)
    196 {
    197 	struct proc *p = l->l_proc;
    198 
    199 	/*
    200 	 * this bit from sunos_misc.c (and svr4_fcntl.c).
    201 	 * If we are a session leader, and we don't have a controlling
    202 	 * terminal yet, and the O_NOCTTY flag is not set, try to make
    203 	 * this the controlling terminal.
    204 	 */
    205         if (!(flags & O_NOCTTY) && SESS_LEADER(p) && !(p->p_lflag & PL_CONTROLT)) {
    206                 file_t *fp;
    207 
    208 		fp = fd_getfile(fd);
    209 
    210                 /* ignore any error, just give it a try */
    211                 if (fp != NULL) {
    212 			if (fp->f_type == DTYPE_VNODE) {
    213 				(fp->f_ops->fo_ioctl) (fp, TIOCSCTTY, NULL);
    214 			}
    215 			fd_putfile(fd);
    216 		}
    217         }
    218 }
    219 
    220 /*
    221  * open(2). Take care of the different flag values, and let the
    222  * NetBSD syscall do the real work. See if this operation
    223  * gives the current process a controlling terminal.
    224  * (XXX is this necessary?)
    225  */
    226 int
    227 linux_sys_open(struct lwp *l, const struct linux_sys_open_args *uap,
    228     register_t *retval)
    229 {
    230 	/* {
    231 		syscallarg(const char *) path;
    232 		syscallarg(int) flags;
    233 		syscallarg(linux_umode_t) mode;
    234 	} */
    235 	int error, fl;
    236 	struct sys_open_args boa;
    237 
    238 	fl = linux_to_bsd_ioflags(SCARG(uap, flags));
    239 
    240 	SCARG(&boa, path) = SCARG(uap, path);
    241 	SCARG(&boa, flags) = fl;
    242 	SCARG(&boa, mode) = SCARG(uap, mode);
    243 
    244 	if ((error = sys_open(l, &boa, retval)))
    245 		return (error == EFTYPE) ? ELOOP : error;
    246 
    247 	linux_open_ctty(l, fl, *retval);
    248 	return 0;
    249 }
    250 
    251 int
    252 linux_sys_openat(struct lwp *l, const struct linux_sys_openat_args *uap,
    253     register_t *retval)
    254 {
    255 	/* {
    256 		syscallarg(int) fd;
    257 		syscallarg(const char *) path;
    258 		syscallarg(int) flags;
    259 		syscallarg(linux_umode_t) mode;
    260 	} */
    261 	int error, fl;
    262 	struct sys_openat_args boa;
    263 
    264 	fl = linux_to_bsd_ioflags(SCARG(uap, flags));
    265 
    266 	SCARG(&boa, fd) = SCARG(uap, fd);
    267 	SCARG(&boa, path) = SCARG(uap, path);
    268 	SCARG(&boa, oflags) = fl;
    269 	SCARG(&boa, mode) = SCARG(uap, mode);
    270 
    271 	if ((error = sys_openat(l, &boa, retval)))
    272 		return (error == EFTYPE) ? ELOOP : error;
    273 
    274 	linux_open_ctty(l, fl, *retval);
    275 	return 0;
    276 }
    277 
    278 /*
    279  * Most actions in the fcntl() call are straightforward; simply
    280  * pass control to the NetBSD system call. A few commands need
    281  * conversions after the actual system call has done its work,
    282  * because the flag values and lock structure are different.
    283  */
    284 int
    285 linux_sys_fcntl(struct lwp *l, const struct linux_sys_fcntl_args *uap,
    286     register_t *retval)
    287 {
    288 	/* {
    289 		syscallarg(int) fd;
    290 		syscallarg(int) cmd;
    291 		syscallarg(void *) arg;
    292 	} */
    293 	struct proc *p = l->l_proc;
    294 	int fd, cmd, error;
    295 	u_long val;
    296 	void *arg;
    297 	struct sys_fcntl_args fca;
    298 	file_t *fp;
    299 	struct vnode *vp;
    300 	struct vattr va;
    301 	long pgid;
    302 	struct pgrp *pgrp;
    303 	struct tty *tp;
    304 
    305 	fd = SCARG(uap, fd);
    306 	cmd = SCARG(uap, cmd);
    307 	arg = SCARG(uap, arg);
    308 
    309 	switch (cmd) {
    310 
    311 	case LINUX_F_DUPFD:
    312 		cmd = F_DUPFD;
    313 		break;
    314 
    315 	case LINUX_F_GETFD:
    316 		cmd = F_GETFD;
    317 		break;
    318 
    319 	case LINUX_F_SETFD:
    320 		cmd = F_SETFD;
    321 		break;
    322 
    323 	case LINUX_F_GETFL:
    324 		SCARG(&fca, fd) = fd;
    325 		SCARG(&fca, cmd) = F_GETFL;
    326 		SCARG(&fca, arg) = arg;
    327 		if ((error = sys_fcntl(l, &fca, retval)))
    328 			return error;
    329 		retval[0] = bsd_to_linux_ioflags(retval[0]);
    330 		return 0;
    331 
    332 	case LINUX_F_SETFL: {
    333 		file_t	*fp1 = NULL;
    334 
    335 		val = linux_to_bsd_ioflags((unsigned long)SCARG(uap, arg));
    336 		/*
    337 		 * Linux seems to have same semantics for sending SIGIO to the
    338 		 * read side of socket, but slightly different semantics
    339 		 * for SIGIO to the write side.  Rather than sending the SIGIO
    340 		 * every time it's possible to write (directly) more data, it
    341 		 * only sends SIGIO if last write(2) failed due to insufficient
    342 		 * memory to hold the data. This is compatible enough
    343 		 * with NetBSD semantics to not do anything about the
    344 		 * difference.
    345 		 *
    346 		 * Linux does NOT send SIGIO for pipes. Deal with socketpair
    347 		 * ones and DTYPE_PIPE ones. For these, we don't set
    348 		 * the underlying flags (we don't pass O_ASYNC flag down
    349 		 * to sys_fcntl()), but set the FASYNC flag for file descriptor,
    350 		 * so that F_GETFL would report the ASYNC i/o is on.
    351 		 */
    352 		if (val & O_ASYNC) {
    353 			if (((fp1 = fd_getfile(fd)) == NULL))
    354 			    return (EBADF);
    355 			if (((fp1->f_type == DTYPE_SOCKET) && fp1->f_data
    356 			      && ((struct socket *)fp1->f_data)->so_state & SS_ISAPIPE)
    357 			    || (fp1->f_type == DTYPE_PIPE))
    358 				val &= ~O_ASYNC;
    359 			else {
    360 				/* not a pipe, do not modify anything */
    361 				fd_putfile(fd);
    362 				fp1 = NULL;
    363 			}
    364 		}
    365 
    366 		SCARG(&fca, fd) = fd;
    367 		SCARG(&fca, cmd) = F_SETFL;
    368 		SCARG(&fca, arg) = (void *) val;
    369 
    370 		error = sys_fcntl(l, &fca, retval);
    371 
    372 		/* Now set the FASYNC flag for pipes */
    373 		if (fp1) {
    374 			if (!error) {
    375 				mutex_enter(&fp1->f_lock);
    376 				fp1->f_flag |= FASYNC;
    377 				mutex_exit(&fp1->f_lock);
    378 			}
    379 			fd_putfile(fd);
    380 		}
    381 
    382 		return (error);
    383 	    }
    384 
    385 	case LINUX_F_GETLK:
    386 		do_linux_getlk(fd, cmd, arg, linux, flock);
    387 
    388 	case LINUX_F_SETLK:
    389 	case LINUX_F_SETLKW:
    390 		do_linux_setlk(fd, cmd, arg, linux, flock, LINUX_F_SETLK);
    391 
    392 	case LINUX_F_SETOWN:
    393 	case LINUX_F_GETOWN:
    394 		/*
    395 		 * We need to route fcntl() for tty descriptors around normal
    396 		 * fcntl(), since NetBSD tty TIOC{G,S}PGRP semantics is too
    397 		 * restrictive for Linux F_{G,S}ETOWN. For non-tty descriptors,
    398 		 * this is not a problem.
    399 		 */
    400 		if ((fp = fd_getfile(fd)) == NULL)
    401 			return EBADF;
    402 
    403 		/* Check it's a character device vnode */
    404 		if (fp->f_type != DTYPE_VNODE
    405 		    || (vp = (struct vnode *)fp->f_data) == NULL
    406 		    || vp->v_type != VCHR) {
    407 			fd_putfile(fd);
    408 
    409 	    not_tty:
    410 			/* Not a tty, proceed with common fcntl() */
    411 			cmd = cmd == LINUX_F_SETOWN ? F_SETOWN : F_GETOWN;
    412 			break;
    413 		}
    414 
    415 		vn_lock(vp, LK_SHARED | LK_RETRY);
    416 		error = VOP_GETATTR(vp, &va, l->l_cred);
    417 		VOP_UNLOCK(vp);
    418 
    419 		fd_putfile(fd);
    420 
    421 		if (error)
    422 			return error;
    423 
    424 		if ((tp = cdev_tty(va.va_rdev)) == NULL)
    425 			goto not_tty;
    426 
    427 		/* set tty pg_id appropriately */
    428 		mutex_enter(&proc_lock);
    429 		if (cmd == LINUX_F_GETOWN) {
    430 			retval[0] = tp->t_pgrp ? tp->t_pgrp->pg_id : NO_PGID;
    431 			mutex_exit(&proc_lock);
    432 			return 0;
    433 		}
    434 		if ((long)arg <= 0) {
    435 			pgid = -(long)arg;
    436 		} else {
    437 			struct proc *p1 = proc_find((long)arg);
    438 			if (p1 == NULL) {
    439 				mutex_exit(&proc_lock);
    440 				return (ESRCH);
    441 			}
    442 			pgid = (long)p1->p_pgrp->pg_id;
    443 		}
    444 		pgrp = pgrp_find(pgid);
    445 		if (pgrp == NULL || pgrp->pg_session != p->p_session) {
    446 			mutex_exit(&proc_lock);
    447 			return EPERM;
    448 		}
    449 		tp->t_pgrp = pgrp;
    450 		mutex_exit(&proc_lock);
    451 		return 0;
    452 
    453 	case LINUX_F_DUPFD_CLOEXEC:
    454 		cmd = F_DUPFD_CLOEXEC;
    455 		break;
    456 
    457 	case LINUX_F_ADD_SEALS:
    458 		cmd = F_ADD_SEALS;
    459 		break;
    460 
    461 	case LINUX_F_GET_SEALS:
    462 		cmd = F_GET_SEALS;
    463 		break;
    464 
    465 	default:
    466 		return EOPNOTSUPP;
    467 	}
    468 
    469 	SCARG(&fca, fd) = fd;
    470 	SCARG(&fca, cmd) = cmd;
    471 	SCARG(&fca, arg) = arg;
    472 
    473 	return sys_fcntl(l, &fca, retval);
    474 }
    475 
    476 #if !defined(__aarch64__) && !defined(__amd64__)
    477 /*
    478  * Convert a NetBSD stat structure to a Linux stat structure.
    479  * Only the order of the fields and the padding in the structure
    480  * is different. linux_fakedev is a machine-dependent function
    481  * which optionally converts device driver major/minor numbers
    482  * (XXX horrible, but what can you do against code that compares
    483  * things against constant major device numbers? sigh)
    484  */
    485 static void
    486 bsd_to_linux_stat(struct stat *bsp, struct linux_stat *lsp)
    487 {
    488 
    489 	memset(lsp, 0, sizeof(*lsp));
    490 	lsp->lst_dev     = linux_fakedev(bsp->st_dev, 0);
    491 	lsp->lst_ino     = bsp->st_ino;
    492 	lsp->lst_mode    = (linux_mode_t)bsp->st_mode;
    493 	if (bsp->st_nlink >= (1 << 15))
    494 		lsp->lst_nlink = (1 << 15) - 1;
    495 	else
    496 		lsp->lst_nlink = (linux_nlink_t)bsp->st_nlink;
    497 	lsp->lst_uid     = bsp->st_uid;
    498 	lsp->lst_gid     = bsp->st_gid;
    499 	lsp->lst_rdev    = linux_fakedev(bsp->st_rdev, 1);
    500 	lsp->lst_size    = bsp->st_size;
    501 	lsp->lst_blksize = bsp->st_blksize;
    502 	lsp->lst_blocks  = bsp->st_blocks;
    503 	lsp->lst_atime   = bsp->st_atime;
    504 	lsp->lst_mtime   = bsp->st_mtime;
    505 	lsp->lst_ctime   = bsp->st_ctime;
    506 #ifdef LINUX_STAT_HAS_NSEC
    507 	lsp->lst_atime_nsec   = bsp->st_atimensec;
    508 	lsp->lst_mtime_nsec   = bsp->st_mtimensec;
    509 	lsp->lst_ctime_nsec   = bsp->st_ctimensec;
    510 #endif
    511 }
    512 
    513 /*
    514  * The stat functions below are plain sailing. stat and lstat are handled
    515  * by one function to avoid code duplication.
    516  */
    517 int
    518 linux_sys_fstat(struct lwp *l, const struct linux_sys_fstat_args *uap,
    519     register_t *retval)
    520 {
    521 	/* {
    522 		syscallarg(int) fd;
    523 		syscallarg(linux_stat *) sp;
    524 	} */
    525 	struct linux_stat tmplst;
    526 	struct stat tmpst;
    527 	int error;
    528 
    529 	error = do_sys_fstat(SCARG(uap, fd), &tmpst);
    530 	if (error != 0)
    531 		return error;
    532 	bsd_to_linux_stat(&tmpst, &tmplst);
    533 
    534 	return copyout(&tmplst, SCARG(uap, sp), sizeof tmplst);
    535 }
    536 
    537 static int
    538 linux_stat1(const struct linux_sys_stat_args *uap, register_t *retval,
    539     int flags)
    540 {
    541 	struct linux_stat tmplst;
    542 	struct stat tmpst;
    543 	int error;
    544 
    545 	error = do_sys_stat(SCARG(uap, path), flags, &tmpst);
    546 	if (error != 0)
    547 		return error;
    548 
    549 	bsd_to_linux_stat(&tmpst, &tmplst);
    550 
    551 	return copyout(&tmplst, SCARG(uap, sp), sizeof tmplst);
    552 }
    553 
    554 int
    555 linux_sys_stat(struct lwp *l, const struct linux_sys_stat_args *uap,
    556     register_t *retval)
    557 {
    558 	/* {
    559 		syscallarg(const char *) path;
    560 		syscallarg(struct linux_stat *) sp;
    561 	} */
    562 
    563 	return linux_stat1(uap, retval, FOLLOW);
    564 }
    565 
    566 /* Note: this is "newlstat" in the Linux sources */
    567 /*	(we don't bother with the old lstat currently) */
    568 int
    569 linux_sys_lstat(struct lwp *l, const struct linux_sys_lstat_args *uap,
    570     register_t *retval)
    571 {
    572 	/* {
    573 		syscallarg(const char *) path;
    574 		syscallarg(struct linux_stat *) sp;
    575 	} */
    576 
    577 	return linux_stat1((const void *)uap, retval, NOFOLLOW);
    578 }
    579 #endif /* !__aarch64__ && !__amd64__ */
    580 
    581 /*
    582  * The following syscalls are mostly here because of the alternate path check.
    583  */
    584 
    585 int
    586 linux_sys_linkat(struct lwp *l, const struct linux_sys_linkat_args *uap,
    587     register_t *retval)
    588 {
    589 	/* {
    590 		syscallarg(int) fd1;
    591 		syscallarg(const char *) name1;
    592 		syscallarg(int) fd2;
    593 		syscallarg(const char *) name2;
    594 		syscallarg(int) flags;
    595 	} */
    596 	int fd1 = SCARG(uap, fd1);
    597 	const char *name1 = SCARG(uap, name1);
    598 	int fd2 = SCARG(uap, fd2);
    599 	const char *name2 = SCARG(uap, name2);
    600 	int follow;
    601 
    602 	follow = SCARG(uap, flags) & LINUX_AT_SYMLINK_FOLLOW;
    603 
    604 	return do_sys_linkat(l, fd1, name1, fd2, name2, follow, retval);
    605 }
    606 
    607 static int
    608 linux_unlink_dircheck(const char *path)
    609 {
    610 	struct nameidata nd;
    611 	struct pathbuf *pb;
    612 	int error;
    613 
    614 	/*
    615 	 * Linux returns EISDIR if unlink(2) is called on a directory.
    616 	 * We return EPERM in such cases. To emulate correct behaviour,
    617 	 * check if the path points to directory and return EISDIR if this
    618 	 * is the case.
    619 	 *
    620 	 * XXX this should really not copy in the path buffer twice...
    621 	 */
    622 	error = pathbuf_copyin(path, &pb);
    623 	if (error) {
    624 		return error;
    625 	}
    626 	NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | TRYEMULROOT, pb);
    627 	if (namei(&nd) == 0) {
    628 		struct stat sb;
    629 
    630 		if (vn_stat(nd.ni_vp, &sb) == 0
    631 		    && S_ISDIR(sb.st_mode))
    632 			error = EISDIR;
    633 
    634 		vput(nd.ni_vp);
    635 	}
    636 	pathbuf_destroy(pb);
    637 	return error ? error : EPERM;
    638 }
    639 
    640 int
    641 linux_sys_unlink(struct lwp *l, const struct linux_sys_unlink_args *uap,
    642     register_t *retval)
    643 {
    644 	/* {
    645 		syscallarg(const char *) path;
    646 	} */
    647 	int error;
    648 
    649 	error = sys_unlink(l, (const void *)uap, retval);
    650 	if (error == EPERM)
    651 		error = linux_unlink_dircheck(SCARG(uap, path));
    652 
    653 	return error;
    654 }
    655 
    656 int
    657 linux_sys_unlinkat(struct lwp *l, const struct linux_sys_unlinkat_args *uap,
    658     register_t *retval)
    659 {
    660 	/* {
    661 		syscallarg(int) fd;
    662 		syscallarg(const char *) path;
    663 		syscallarg(int) flag;
    664 	} */
    665 	struct sys_unlinkat_args ua;
    666 	int error;
    667 
    668 	SCARG(&ua, fd) = SCARG(uap, fd);
    669 	SCARG(&ua, path) = SCARG(uap, path);
    670 	SCARG(&ua, flag) = linux_to_bsd_atflags(SCARG(uap, flag));
    671 
    672 	error = sys_unlinkat(l, &ua, retval);
    673 	if (error == EPERM)
    674 		error = linux_unlink_dircheck(SCARG(uap, path));
    675 
    676 	return error;
    677 }
    678 
    679 int
    680 linux_sys_mknod(struct lwp *l, const struct linux_sys_mknod_args *uap,
    681     register_t *retval)
    682 {
    683 	/* {
    684 		syscallarg(const char *) path;
    685 		syscallarg(linux_umode_t) mode;
    686 		syscallarg(unsigned) dev;
    687 	} */
    688 	struct linux_sys_mknodat_args ua;
    689 
    690 	SCARG(&ua, fd) = LINUX_AT_FDCWD;
    691 	SCARG(&ua, path) = SCARG(uap, path);
    692 	SCARG(&ua, mode) = SCARG(uap, mode);
    693 	SCARG(&ua, dev) = SCARG(uap, dev);
    694 
    695 	return linux_sys_mknodat(l, &ua, retval);
    696 }
    697 
    698 int
    699 linux_sys_mknodat(struct lwp *l, const struct linux_sys_mknodat_args *uap,
    700     register_t *retval)
    701 {
    702 	/* {
    703 		syscallarg(int) fd;
    704 		syscallarg(const char *) path;
    705 		syscallarg(linux_umode_t) mode;
    706 		syscallarg(unsigned) dev;
    707 	} */
    708 
    709 	/*
    710 	 * BSD handles FIFOs separately
    711 	 */
    712 	if (S_ISFIFO(SCARG(uap, mode))) {
    713 		struct sys_mkfifoat_args bma;
    714 
    715 		SCARG(&bma, fd) = SCARG(uap, fd);
    716 		SCARG(&bma, path) = SCARG(uap, path);
    717 		SCARG(&bma, mode) = SCARG(uap, mode);
    718 		return sys_mkfifoat(l, &bma, retval);
    719 	} else {
    720 
    721 		/*
    722 		 * Linux device numbers uses 8 bits for minor and 8 bits
    723 		 * for major. Due to how we map our major and minor,
    724 		 * this just fits into our dev_t. Just mask off the
    725 		 * upper 16bit to remove any random junk.
    726 		 */
    727 
    728 		return do_sys_mknodat(l, SCARG(uap, fd), SCARG(uap, path),
    729 		    SCARG(uap, mode), SCARG(uap, dev) & 0xffff, UIO_USERSPACE);
    730 	}
    731 }
    732 
    733 int
    734 linux_sys_fchmodat(struct lwp *l, const struct linux_sys_fchmodat_args *uap,
    735     register_t *retval)
    736 {
    737 	/* {
    738 		syscallarg(int) fd;
    739 		syscallarg(const char *) path;
    740 		syscallarg(linux_umode_t) mode;
    741 	} */
    742 
    743 	return do_sys_chmodat(l, SCARG(uap, fd), SCARG(uap, path),
    744 			      SCARG(uap, mode), AT_SYMLINK_FOLLOW);
    745 }
    746 
    747 int
    748 linux_sys_fchownat(struct lwp *l, const struct linux_sys_fchownat_args *uap,
    749     register_t *retval)
    750 {
    751 	/* {
    752 		syscallarg(int) fd;
    753 		syscallarg(const char *) path;
    754 		syscallarg(uid_t) owner;
    755 		syscallarg(gid_t) group;
    756 		syscallarg(int) flag;
    757 	} */
    758 	int flag;
    759 
    760 	flag = linux_to_bsd_atflags(SCARG(uap, flag));
    761 	return do_sys_chownat(l, SCARG(uap, fd), SCARG(uap, path),
    762 			      SCARG(uap, owner), SCARG(uap, group), flag);
    763 }
    764 
    765 int
    766 linux_sys_faccessat(struct lwp *l, const struct linux_sys_faccessat_args *uap,
    767     register_t *retval)
    768 {
    769 	/* {
    770 		syscallarg(int) fd;
    771 		syscallarg(const char *) path;
    772 		syscallarg(int) amode;
    773 	} */
    774 
    775 	return do_sys_accessat(l, SCARG(uap, fd), SCARG(uap, path),
    776 	     SCARG(uap, amode), AT_SYMLINK_FOLLOW);
    777 }
    778 
    779 /*
    780  * This is just fsync() for now (just as it is in the Linux kernel)
    781  * Note: this is not implemented under Linux on Alpha and Arm
    782  *	but should still be defined in our syscalls.master.
    783  *	(syscall #148 on the arm)
    784  */
    785 int
    786 linux_sys_fdatasync(struct lwp *l, const struct linux_sys_fdatasync_args *uap,
    787     register_t *retval)
    788 {
    789 	/* {
    790 		syscallarg(int) fd;
    791 	} */
    792 
    793 	return sys_fsync(l, (const void *)uap, retval);
    794 }
    795 
    796 /*
    797  * pread(2).
    798  */
    799 int
    800 linux_sys_pread(struct lwp *l, const struct linux_sys_pread_args *uap,
    801     register_t *retval)
    802 {
    803 	/* {
    804 		syscallarg(int) fd;
    805 		syscallarg(void *) buf;
    806 		syscallarg(size_t) nbyte;
    807 		syscallarg(off_t) offset;
    808 	} */
    809 	struct sys_pread_args pra;
    810 
    811 	SCARG(&pra, fd) = SCARG(uap, fd);
    812 	SCARG(&pra, buf) = SCARG(uap, buf);
    813 	SCARG(&pra, nbyte) = SCARG(uap, nbyte);
    814 	SCARG(&pra, PAD) = 0;
    815 	SCARG(&pra, offset) = SCARG(uap, offset);
    816 
    817 	return sys_pread(l, &pra, retval);
    818 }
    819 
    820 /*
    821  * pwrite(2).
    822  */
    823 int
    824 linux_sys_pwrite(struct lwp *l, const struct linux_sys_pwrite_args *uap,
    825     register_t *retval)
    826 {
    827 	/* {
    828 		syscallarg(int) fd;
    829 		syscallarg(void *) buf;
    830 		syscallarg(size_t) nbyte;
    831 		syscallarg(off_t) offset;
    832 	} */
    833 	struct sys_pwrite_args pra;
    834 
    835 	SCARG(&pra, fd) = SCARG(uap, fd);
    836 	SCARG(&pra, buf) = SCARG(uap, buf);
    837 	SCARG(&pra, nbyte) = SCARG(uap, nbyte);
    838 	SCARG(&pra, PAD) = 0;
    839 	SCARG(&pra, offset) = SCARG(uap, offset);
    840 
    841 	return sys_pwrite(l, &pra, retval);
    842 }
    843 
    844 /*
    845  * preadv(2)
    846  */
    847 int
    848 linux_sys_preadv(struct lwp *l, const struct linux_sys_preadv_args *uap,
    849     register_t *retval)
    850 {
    851 	/* {
    852 		syscallarg(int) fd;
    853 		syscallarg(const struct iovec *) iovp;
    854 		syscallarg(int) iovcnt;
    855 		syscallarg(unsigned long) off_lo;
    856 		syscallarg(unsigned long) off_hi;
    857 	} */
    858 	struct sys_preadv_args ua;
    859 
    860 	SCARG(&ua, fd) = SCARG(uap, fd);
    861 	SCARG(&ua, iovp) = SCARG(uap, iovp);
    862 	SCARG(&ua, iovcnt) = SCARG(uap, iovcnt);
    863 	SCARG(&ua, PAD) = 0;
    864 	SCARG(&ua, offset) = linux_hilo_to_off_t(SCARG(uap, off_hi),
    865 						 SCARG(uap, off_lo));
    866 	return sys_preadv(l, &ua, retval);
    867 }
    868 
    869 /*
    870  * pwritev(2)
    871  */
    872 int
    873 linux_sys_pwritev(struct lwp *l, const struct linux_sys_pwritev_args *uap,
    874     register_t *retval)
    875 {
    876 	/* {
    877 		syscallarg(int) fd;
    878 		syscallarg(const struct iovec *) iovp;
    879 		syscallarg(int) iovcnt;
    880 		syscallarg(unsigned long) off_lo;
    881 		syscallarg(unsigned long) off_hi;
    882 	} */
    883 	struct sys_pwritev_args ua;
    884 
    885 	SCARG(&ua, fd) = SCARG(uap, fd);
    886 	SCARG(&ua, iovp) = (const void *)SCARG(uap, iovp);
    887 	SCARG(&ua, iovcnt) = SCARG(uap, iovcnt);
    888 	SCARG(&ua, PAD) = 0;
    889 	SCARG(&ua, offset) = linux_hilo_to_off_t(SCARG(uap, off_hi),
    890 						 SCARG(uap, off_lo));
    891 	return sys_pwritev(l, &ua, retval);
    892 }
    893 
    894 int
    895 linux_sys_dup3(struct lwp *l, const struct linux_sys_dup3_args *uap,
    896     register_t *retval)
    897 {
    898 	/* {
    899 		syscallarg(int) from;
    900 		syscallarg(int) to;
    901 		syscallarg(int) flags;
    902 	} */
    903 	int flags;
    904 
    905 	flags = linux_to_bsd_ioflags(SCARG(uap, flags));
    906 	if ((flags & ~O_CLOEXEC) != 0)
    907 		return EINVAL;
    908 
    909 	if (SCARG(uap, from) == SCARG(uap, to))
    910 		return EINVAL;
    911 
    912 	return dodup(l, SCARG(uap, from), SCARG(uap, to), flags, retval);
    913 }
    914 
    915 int
    916 linux_to_bsd_atflags(int lflags)
    917 {
    918 	int bflags = 0;
    919 
    920 	if (lflags & LINUX_AT_SYMLINK_NOFOLLOW)
    921 		bflags |= AT_SYMLINK_NOFOLLOW;
    922 	if (lflags & LINUX_AT_REMOVEDIR)
    923 		bflags |= AT_REMOVEDIR;
    924 	if (lflags & LINUX_AT_SYMLINK_FOLLOW)
    925 		bflags |= AT_SYMLINK_FOLLOW;
    926 
    927 	return bflags;
    928 }
    929 
    930 int
    931 linux_sys_faccessat2(lwp_t *l, const struct linux_sys_faccessat2_args *uap,
    932     register_t *retval)
    933 {
    934 	/* {
    935 		syscallarg(int) fd;
    936 		syscallarg(const char *) path;
    937 		syscallarg(int) amode;
    938 		syscallarg(int) flags;
    939 	} */
    940 	int flag = linux_to_bsd_atflags(SCARG(uap, flags));
    941 	int mode = SCARG(uap, amode);
    942 	int fd = SCARG(uap, fd);
    943 	const char *path = SCARG(uap, path);
    944 
    945 	return do_sys_accessat(l, fd, path, mode, flag);
    946 }
    947 
    948 int
    949 linux_sys_sync_file_range(lwp_t *l,
    950     const struct linux_sys_sync_file_range_args *uap, register_t *retval)
    951 {
    952 	/* {
    953 		syscallarg(int) fd;
    954 		syscallarg(off_t) offset;
    955 		syscallarg(off_t) nbytes;
    956 		syscallarg(unsigned int) flags;
    957 	} */
    958 
    959 	struct sys_fsync_range_args ua;
    960 
    961 	if (SCARG(uap, offset) < 0 || SCARG(uap, nbytes) < 0 ||
    962 	    ((SCARG(uap, flags) & ~LINUX_SYNC_FILE_RANGE_ALL) != 0))
    963 		return EINVAL;
    964 
    965 	/* Fill ua with uap */
    966 	SCARG(&ua, fd) = SCARG(uap, fd);
    967 	SCARG(&ua, flags) = SCARG(uap, flags);
    968 
    969 	/* Round down offset to page boundary */
    970 	SCARG(&ua, start) = rounddown(SCARG(uap, offset), PAGE_SIZE);
    971 	SCARG(&ua, length) = SCARG(uap, nbytes);
    972 	if (SCARG(&ua, length) != 0) {
    973 		/* Round up length to nbytes+offset to page boundary */
    974 		SCARG(&ua, length) = roundup(SCARG(uap, nbytes)
    975 		    + SCARG(uap, offset) - SCARG(&ua, start), PAGE_SIZE);
    976 	}
    977 
    978 	return sys_fsync_range(l, &ua, retval);
    979 }
    980 
    981 int
    982 linux_sys_syncfs(lwp_t *l, const struct linux_sys_syncfs_args *uap,
    983     register_t *retval)
    984 {
    985 	/* {
    986 		syscallarg(int) fd;
    987 	} */
    988 
    989 	struct mount *mp;
    990 	struct vnode *vp;
    991 	file_t *fp;
    992 	int error, fd;
    993 	fd = SCARG(uap, fd);
    994 
    995 	/* Get file pointer */
    996 	if ((error = fd_getvnode(fd, &fp)) != 0)
    997 		return error;
    998 
    999 	/* Get vnode and mount point */
   1000 	vp = fp->f_vnode;
   1001 	mp = vp->v_mount;
   1002 
   1003 	mutex_enter(mp->mnt_updating);
   1004 	if ((mp->mnt_flag & MNT_RDONLY) == 0) {
   1005 		int asyncflag = mp->mnt_flag & MNT_ASYNC;
   1006 		mp->mnt_flag &= ~MNT_ASYNC;
   1007 		VFS_SYNC(mp, MNT_NOWAIT, l->l_cred);
   1008 		if (asyncflag)
   1009 			mp->mnt_flag |= MNT_ASYNC;
   1010 	}
   1011 	mutex_exit(mp->mnt_updating);
   1012 
   1013 	/* Cleanup vnode and file pointer */
   1014 	vrele(vp);
   1015 	fd_putfile(fd);
   1016 	return 0;
   1017 
   1018 }
   1019 
   1020 int
   1021 linux_sys_renameat2(struct lwp *l, const struct linux_sys_renameat2_args *uap,
   1022     register_t *retval)
   1023 {
   1024 	/* {
   1025 		syscallarg(int) fromfd;
   1026 		syscallarg(const char *) from;
   1027 		syscallarg(int) tofd;
   1028 		syscallarg(const char *) to;
   1029 		syscallarg(unsigned int) flags;
   1030 	} */
   1031 
   1032 	struct sys_renameat_args ua;
   1033 	SCARG(&ua, fromfd) = SCARG(uap, fromfd);
   1034 	SCARG(&ua, from) = SCARG(uap, from);
   1035 	SCARG(&ua, tofd) = SCARG(uap, tofd);
   1036 	SCARG(&ua, to) = SCARG(uap, to);
   1037 
   1038 	unsigned int flags = SCARG(uap, flags);
   1039 	int error;
   1040 
   1041 	if (flags != 0) {
   1042 		if (flags & ~LINUX_RENAME_ALL)
   1043 			return EINVAL;
   1044 		if ((flags & LINUX_RENAME_EXCHANGE) != 0 &&
   1045 		    (flags & (LINUX_RENAME_NOREPLACE | LINUX_RENAME_WHITEOUT))
   1046 		    != 0)
   1047 			return EINVAL;
   1048 		/*
   1049 		 * Suppoting renameat2 flags without support from file systems
   1050 		 * becomes a messy affair cause of locks and how VOP_RENAME
   1051 		 * protocol is implemented. So, return EOPNOTSUPP for now.
   1052 		 */
   1053 		return EOPNOTSUPP;
   1054 	}
   1055 
   1056 	error = sys_renameat(l, &ua, retval);
   1057 	return error;
   1058 }
   1059 
   1060 int
   1061 linux_sys_copy_file_range(lwp_t *l,
   1062     const struct linux_sys_copy_file_range_args *uap, register_t *retval)
   1063 {
   1064 	/* {
   1065 		syscallarg(int) fd_in;
   1066 		syscallarg(unsigned long) off_in;
   1067 		syscallarg(int) fd_out;
   1068 		syscallarg(unsigned long) off_out;
   1069 		syscallarg(size_t) len;
   1070 		syscallarg(unsigned int) flags;
   1071 	} */
   1072 	const off_t OFF_MAX = __type_max(off_t);
   1073 	int fd_in, fd_out;
   1074 	file_t *fp_in, *fp_out;
   1075 	struct vnode *invp, *outvp;
   1076 	off_t off_in = 0, off_out = 0;
   1077 	struct vattr vattr_in, vattr_out;
   1078 	ssize_t total_copied = 0;
   1079 	size_t bytes_left, to_copy;
   1080 	bool have_off_in = false, have_off_out = false;
   1081 	int error = 0;
   1082 	size_t len = SCARG(uap, len);
   1083 	unsigned int flags = SCARG(uap, flags);
   1084 	/* Structures for actual copy */
   1085 	char *buffer = NULL;
   1086 	struct uio auio;
   1087 	struct iovec aiov;
   1088 
   1089 	if (len > SSIZE_MAX) {
   1090 		DPRINTF("%s: len is greater than SSIZE_MAX\n",
   1091 		    __func__);
   1092 		return EOVERFLOW;
   1093 	}
   1094 
   1095 	if (flags != 0) {
   1096 		DPRINTF("%s: unsupported flags %#x\n", __func__, flags);
   1097 		return EINVAL;
   1098 	}
   1099 
   1100 	fd_in = SCARG(uap, fd_in);
   1101 	fd_out = SCARG(uap, fd_out);
   1102 	error = fd_getvnode(fd_in, &fp_in);
   1103 	if (error) {
   1104 		return error;
   1105 	}
   1106 
   1107 	error = fd_getvnode(fd_out, &fp_out);
   1108 	if (error) {
   1109 		fd_putfile(fd_in);
   1110 		return error;
   1111 	}
   1112 
   1113 	invp = fp_in->f_vnode;
   1114 	outvp = fp_out->f_vnode;
   1115 
   1116 	/* Get attributes of input and output files */
   1117 	VOP_GETATTR(invp, &vattr_in, l->l_cred);
   1118 	VOP_GETATTR(outvp, &vattr_out, l->l_cred);
   1119 
   1120 	/* Check if input and output files are regular files */
   1121 	if (vattr_in.va_type == VDIR || vattr_out.va_type == VDIR) {
   1122 		error = EISDIR;
   1123 		DPRINTF("%s: Input or output is a directory\n", __func__);
   1124 		goto out;
   1125 	}
   1126 	if ((SCARG(uap, off_in) != NULL && *SCARG(uap, off_in) < 0) ||
   1127 	    (SCARG(uap, off_out) != NULL && *SCARG(uap, off_out) < 0) ||
   1128 	    vattr_in.va_type != VREG || vattr_out.va_type != VREG) {
   1129 		error = EINVAL;
   1130 		DPRINTF("%s: Invalid offset or file type\n", __func__);
   1131 		goto out;
   1132 	}
   1133 
   1134 	if ((fp_in->f_flag & FREAD) == 0 ||
   1135 	    (fp_out->f_flag & FWRITE) == 0 ||
   1136 	    (fp_out->f_flag & FAPPEND) != 0) {
   1137 		DPRINTF("%s: input file can't be read or output file "
   1138 		    "can't be written\n", __func__);
   1139 		error = EBADF;
   1140 		goto out;
   1141 	}
   1142 	/* Retrieve and validate offsets if provided */
   1143 	if (SCARG(uap, off_in) != NULL) {
   1144 		error = copyin(SCARG(uap, off_in), &off_in, sizeof(off_in));
   1145 		if (error) {
   1146 			goto out;
   1147 		}
   1148 		have_off_in = true;
   1149 	}
   1150 
   1151 	if (SCARG(uap, off_out) != NULL) {
   1152 		error = copyin(SCARG(uap, off_out), &off_out, sizeof(off_out));
   1153 		if (error) {
   1154 			goto out;
   1155 		}
   1156 		have_off_out = true;
   1157 	}
   1158 
   1159 	if (off_out < 0 || len > OFF_MAX - off_out ||
   1160 	    off_in < 0 || len > OFF_MAX - off_in) {
   1161 		DPRINTF("%s: New size is greater than OFF_MAX\n", __func__);
   1162 		error = EFBIG;
   1163 		goto out;
   1164 	}
   1165 
   1166 	/* Identify overlapping ranges */
   1167 	if ((invp == outvp) &&
   1168 	    ((off_in <= off_out && off_in + (off_t)len > off_out) ||
   1169 		(off_in > off_out && off_out + (off_t)len > off_in))) {
   1170 		DPRINTF("%s: Ranges overlap\n", __func__);
   1171 		error = EINVAL;
   1172 		goto out;
   1173 	}
   1174 
   1175 	buffer = kmem_alloc(LINUX_COPY_FILE_RANGE_MAX_CHUNK, KM_SLEEP);
   1176 
   1177 	bytes_left = len;
   1178 
   1179 	while (bytes_left > 0) {
   1180 		to_copy = MIN(bytes_left, LINUX_COPY_FILE_RANGE_MAX_CHUNK);
   1181 
   1182 		/* Lock the input vnode for reading */
   1183 		vn_lock(fp_in->f_vnode, LK_SHARED | LK_RETRY);
   1184 		/* Set up iovec and uio for reading */
   1185 		aiov.iov_base = buffer;
   1186 		aiov.iov_len = to_copy;
   1187 		auio.uio_iov = &aiov;
   1188 		auio.uio_iovcnt = 1;
   1189 		auio.uio_offset = have_off_in ? off_in : fp_in->f_offset;
   1190 		auio.uio_resid = to_copy;
   1191 		auio.uio_rw = UIO_READ;
   1192 		auio.uio_vmspace = l->l_proc->p_vmspace;
   1193 		UIO_SETUP_SYSSPACE(&auio);
   1194 
   1195 		/* Perform read using vn_read */
   1196 		error = VOP_READ(fp_in->f_vnode, &auio, 0, l->l_cred);
   1197 		VOP_UNLOCK(fp_in->f_vnode);
   1198 		if (error) {
   1199 			DPRINTF("%s: Read error %d\n", __func__, error);
   1200 			break;
   1201 		}
   1202 
   1203 		size_t read_bytes = to_copy - auio.uio_resid;
   1204 		if (read_bytes == 0) {
   1205 			/* EOF reached */
   1206 			break;
   1207 		}
   1208 
   1209 		/* Lock the output vnode for writing */
   1210 		vn_lock(fp_out->f_vnode, LK_EXCLUSIVE | LK_RETRY);
   1211 		/* Set up iovec and uio for writing */
   1212 		aiov.iov_base = buffer;
   1213 		aiov.iov_len = read_bytes;
   1214 		auio.uio_iov = &aiov;
   1215 		auio.uio_iovcnt = 1;
   1216 		auio.uio_offset = have_off_out ? off_out : fp_out->f_offset;
   1217 		auio.uio_resid = read_bytes;
   1218 		auio.uio_rw = UIO_WRITE;
   1219 		auio.uio_vmspace = l->l_proc->p_vmspace;
   1220 		UIO_SETUP_SYSSPACE(&auio);
   1221 
   1222 		/* Perform the write */
   1223 		error = VOP_WRITE(fp_out->f_vnode, &auio, 0, l->l_cred);
   1224 		VOP_UNLOCK(fp_out->f_vnode);
   1225 		if (error) {
   1226 			DPRINTF("%s: Write error %d\n", __func__, error);
   1227 			break;
   1228 		}
   1229 		size_t written_bytes = read_bytes - auio.uio_resid;
   1230 		total_copied += written_bytes;
   1231 		bytes_left -= written_bytes;
   1232 
   1233 		/* Update offsets if provided */
   1234 		if (have_off_in) {
   1235 			off_in += written_bytes;
   1236 		} else {
   1237 			fp_in->f_offset += written_bytes;
   1238 		}
   1239 		if (have_off_out) {
   1240 			off_out += written_bytes;
   1241 		} else {
   1242 			fp_out->f_offset += written_bytes;
   1243 		}
   1244 	}
   1245 
   1246 	if (have_off_in) {
   1247 		/* Adjust user space offset */
   1248 		error = copyout(&off_in, SCARG(uap, off_in), sizeof(off_t));
   1249 		if (error) {
   1250 			DPRINTF("%s: Error adjusting user space offset\n",
   1251 			    __func__);
   1252 		}
   1253 		goto out;
   1254 	}
   1255 
   1256 	if (have_off_out) {
   1257 		/* Adjust user space offset */
   1258 		error = copyout(&off_out, SCARG(uap, off_out), sizeof(off_t));
   1259 		if (error) {
   1260 			DPRINTF("%s: Error adjusting user space offset\n",
   1261 			    __func__);
   1262 		}
   1263 	}
   1264 
   1265 	*retval = total_copied;
   1266 out:
   1267 	if (buffer) {
   1268 		kmem_free(buffer, LINUX_COPY_FILE_RANGE_MAX_CHUNK);
   1269 	}
   1270 	if (fp_out) {
   1271 		fd_putfile(fd_out);
   1272 	}
   1273 	if (fp_in) {
   1274 		fd_putfile(fd_in);
   1275 	}
   1276 	return error;
   1277 }
   1278 
   1279 #define LINUX_NOT_SUPPORTED(fun) \
   1280 int \
   1281 fun(struct lwp *l, const struct fun##_args *uap, register_t *retval) \
   1282 { \
   1283 	return EOPNOTSUPP; \
   1284 }
   1285 
   1286 LINUX_NOT_SUPPORTED(linux_sys_setxattr)
   1287 LINUX_NOT_SUPPORTED(linux_sys_lsetxattr)
   1288 LINUX_NOT_SUPPORTED(linux_sys_fsetxattr)
   1289 
   1290 LINUX_NOT_SUPPORTED(linux_sys_getxattr)
   1291 LINUX_NOT_SUPPORTED(linux_sys_lgetxattr)
   1292 LINUX_NOT_SUPPORTED(linux_sys_fgetxattr)
   1293 
   1294 LINUX_NOT_SUPPORTED(linux_sys_listxattr)
   1295 LINUX_NOT_SUPPORTED(linux_sys_llistxattr)
   1296 LINUX_NOT_SUPPORTED(linux_sys_flistxattr)
   1297 
   1298 LINUX_NOT_SUPPORTED(linux_sys_removexattr)
   1299 LINUX_NOT_SUPPORTED(linux_sys_lremovexattr)
   1300 LINUX_NOT_SUPPORTED(linux_sys_fremovexattr)
   1301 
   1302 /*
   1303  * For now just return EOPNOTSUPP, this makes glibc posix_fallocate()
   1304  * to fallback to emulation.
   1305  * XXX Right now no filesystem actually implements fallocate support,
   1306  * so no need for mapping.
   1307  */
   1308 LINUX_NOT_SUPPORTED(linux_sys_fallocate)
   1309