Home | History | Annotate | Line # | Download | only in common
linux_file.c revision 1.104.12.2
      1  1.104.12.1       tls /*	$NetBSD: linux_file.c,v 1.104.12.2 2017/12/03 11:36:54 jdolecek Exp $	*/
      2        1.23       erh 
      3        1.23       erh /*-
      4        1.93        ad  * Copyright (c) 1995, 1998, 2008 The NetBSD Foundation, Inc.
      5        1.23       erh  * All rights reserved.
      6        1.23       erh  *
      7        1.23       erh  * This code is derived from software contributed to The NetBSD Foundation
      8        1.25      fvdl  * by Frank van der Linden and Eric Haszlakiewicz.
      9        1.23       erh  *
     10        1.23       erh  * Redistribution and use in source and binary forms, with or without
     11        1.23       erh  * modification, are permitted provided that the following conditions
     12        1.23       erh  * are met:
     13        1.23       erh  * 1. Redistributions of source code must retain the above copyright
     14        1.23       erh  *    notice, this list of conditions and the following disclaimer.
     15        1.23       erh  * 2. Redistributions in binary form must reproduce the above copyright
     16        1.23       erh  *    notice, this list of conditions and the following disclaimer in the
     17        1.23       erh  *    documentation and/or other materials provided with the distribution.
     18        1.23       erh  *
     19        1.23       erh  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     20        1.23       erh  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     21        1.23       erh  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     22        1.23       erh  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     23        1.23       erh  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     24        1.23       erh  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     25        1.23       erh  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     26        1.23       erh  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     27        1.23       erh  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     28        1.23       erh  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     29        1.23       erh  * POSSIBILITY OF SUCH DAMAGE.
     30         1.1      fvdl  */
     31         1.1      fvdl 
     32        1.23       erh /*
     33        1.23       erh  * Functions in multiarch:
     34        1.23       erh  *	linux_sys_llseek	: linux_llseek.c
     35        1.23       erh  */
     36        1.43     lukem 
     37        1.43     lukem #include <sys/cdefs.h>
     38  1.104.12.1       tls __KERNEL_RCSID(0, "$NetBSD: linux_file.c,v 1.104.12.2 2017/12/03 11:36:54 jdolecek Exp $");
     39        1.23       erh 
     40         1.1      fvdl #include <sys/param.h>
     41         1.1      fvdl #include <sys/systm.h>
     42         1.1      fvdl #include <sys/namei.h>
     43         1.1      fvdl #include <sys/proc.h>
     44         1.1      fvdl #include <sys/file.h>
     45       1.103  christos #include <sys/fcntl.h>
     46         1.1      fvdl #include <sys/stat.h>
     47         1.1      fvdl #include <sys/filedesc.h>
     48         1.1      fvdl #include <sys/ioctl.h>
     49         1.1      fvdl #include <sys/kernel.h>
     50         1.1      fvdl #include <sys/mount.h>
     51        1.81       dsl #include <sys/namei.h>
     52        1.13      fvdl #include <sys/vnode.h>
     53        1.13      fvdl #include <sys/tty.h>
     54        1.39      manu #include <sys/socketvar.h>
     55        1.13      fvdl #include <sys/conf.h>
     56        1.41  jdolecek #include <sys/pipe.h>
     57         1.1      fvdl 
     58         1.1      fvdl #include <sys/syscallargs.h>
     59        1.81       dsl #include <sys/vfs_syscalls.h>
     60         1.1      fvdl 
     61        1.24  christos #include <compat/linux/common/linux_types.h>
     62        1.24  christos #include <compat/linux/common/linux_signal.h>
     63        1.24  christos #include <compat/linux/common/linux_fcntl.h>
     64        1.24  christos #include <compat/linux/common/linux_util.h>
     65        1.24  christos #include <compat/linux/common/linux_machdep.h>
     66        1.84     njoly #include <compat/linux/common/linux_ipc.h>
     67        1.84     njoly #include <compat/linux/common/linux_sem.h>
     68        1.24  christos 
     69         1.1      fvdl #include <compat/linux/linux_syscallargs.h>
     70        1.14  christos 
     71        1.87       dsl static int bsd_to_linux_ioflags(int);
     72        1.67      manu #ifndef __amd64__
     73        1.87       dsl static void bsd_to_linux_stat(struct stat *, struct linux_stat *);
     74        1.67      manu #endif
     75        1.14  christos 
     76        1.92       dsl conv_linux_flock(linux, flock)
     77        1.92       dsl 
     78         1.1      fvdl /*
     79         1.1      fvdl  * Some file-related calls are handled here. The usual flag conversion
     80         1.1      fvdl  * an structure conversion is done, and alternate emul path searching.
     81         1.1      fvdl  */
     82         1.1      fvdl 
     83         1.1      fvdl /*
     84         1.1      fvdl  * The next two functions convert between the Linux and NetBSD values
     85         1.1      fvdl  * of the flags used in open(2) and fcntl(2).
     86         1.1      fvdl  */
     87  1.104.12.1       tls int
     88        1.88       dsl linux_to_bsd_ioflags(int lflags)
     89         1.1      fvdl {
     90         1.1      fvdl 	int res = 0;
     91         1.1      fvdl 
     92         1.1      fvdl 	res |= cvtto_bsd_mask(lflags, LINUX_O_WRONLY, O_WRONLY);
     93         1.1      fvdl 	res |= cvtto_bsd_mask(lflags, LINUX_O_RDONLY, O_RDONLY);
     94         1.1      fvdl 	res |= cvtto_bsd_mask(lflags, LINUX_O_RDWR, O_RDWR);
     95  1.104.12.1       tls 
     96         1.1      fvdl 	res |= cvtto_bsd_mask(lflags, LINUX_O_CREAT, O_CREAT);
     97         1.1      fvdl 	res |= cvtto_bsd_mask(lflags, LINUX_O_EXCL, O_EXCL);
     98         1.1      fvdl 	res |= cvtto_bsd_mask(lflags, LINUX_O_NOCTTY, O_NOCTTY);
     99         1.1      fvdl 	res |= cvtto_bsd_mask(lflags, LINUX_O_TRUNC, O_TRUNC);
    100  1.104.12.1       tls 	res |= cvtto_bsd_mask(lflags, LINUX_O_APPEND, O_APPEND);
    101  1.104.12.1       tls 	res |= cvtto_bsd_mask(lflags, LINUX_O_NONBLOCK, O_NONBLOCK);
    102         1.1      fvdl 	res |= cvtto_bsd_mask(lflags, LINUX_O_NDELAY, O_NDELAY);
    103         1.1      fvdl 	res |= cvtto_bsd_mask(lflags, LINUX_O_SYNC, O_FSYNC);
    104         1.1      fvdl 	res |= cvtto_bsd_mask(lflags, LINUX_FASYNC, O_ASYNC);
    105  1.104.12.1       tls 	res |= cvtto_bsd_mask(lflags, LINUX_O_DIRECT, O_DIRECT);
    106       1.100       chs 	res |= cvtto_bsd_mask(lflags, LINUX_O_DIRECTORY, O_DIRECTORY);
    107  1.104.12.1       tls 	res |= cvtto_bsd_mask(lflags, LINUX_O_NOFOLLOW, O_NOFOLLOW);
    108       1.102  christos 	res |= cvtto_bsd_mask(lflags, LINUX_O_CLOEXEC, O_CLOEXEC);
    109         1.1      fvdl 
    110         1.1      fvdl 	return res;
    111         1.1      fvdl }
    112         1.1      fvdl 
    113         1.1      fvdl static int
    114        1.88       dsl bsd_to_linux_ioflags(int bflags)
    115         1.1      fvdl {
    116         1.1      fvdl 	int res = 0;
    117         1.1      fvdl 
    118         1.1      fvdl 	res |= cvtto_linux_mask(bflags, O_WRONLY, LINUX_O_WRONLY);
    119         1.1      fvdl 	res |= cvtto_linux_mask(bflags, O_RDONLY, LINUX_O_RDONLY);
    120         1.1      fvdl 	res |= cvtto_linux_mask(bflags, O_RDWR, LINUX_O_RDWR);
    121  1.104.12.1       tls 
    122         1.1      fvdl 	res |= cvtto_linux_mask(bflags, O_CREAT, LINUX_O_CREAT);
    123         1.1      fvdl 	res |= cvtto_linux_mask(bflags, O_EXCL, LINUX_O_EXCL);
    124         1.1      fvdl 	res |= cvtto_linux_mask(bflags, O_NOCTTY, LINUX_O_NOCTTY);
    125         1.1      fvdl 	res |= cvtto_linux_mask(bflags, O_TRUNC, LINUX_O_TRUNC);
    126  1.104.12.1       tls 	res |= cvtto_linux_mask(bflags, O_APPEND, LINUX_O_APPEND);
    127  1.104.12.1       tls 	res |= cvtto_linux_mask(bflags, O_NONBLOCK, LINUX_O_NONBLOCK);
    128         1.1      fvdl 	res |= cvtto_linux_mask(bflags, O_NDELAY, LINUX_O_NDELAY);
    129         1.1      fvdl 	res |= cvtto_linux_mask(bflags, O_FSYNC, LINUX_O_SYNC);
    130         1.1      fvdl 	res |= cvtto_linux_mask(bflags, O_ASYNC, LINUX_FASYNC);
    131  1.104.12.1       tls 	res |= cvtto_linux_mask(bflags, O_DIRECT, LINUX_O_DIRECT);
    132       1.100       chs 	res |= cvtto_linux_mask(bflags, O_DIRECTORY, LINUX_O_DIRECTORY);
    133  1.104.12.1       tls 	res |= cvtto_linux_mask(bflags, O_NOFOLLOW, LINUX_O_NOFOLLOW);
    134       1.102  christos 	res |= cvtto_linux_mask(bflags, O_CLOEXEC, LINUX_O_CLOEXEC);
    135         1.1      fvdl 
    136         1.1      fvdl 	return res;
    137         1.1      fvdl }
    138         1.1      fvdl 
    139         1.1      fvdl /*
    140         1.1      fvdl  * creat(2) is an obsolete function, but it's present as a Linux
    141         1.1      fvdl  * system call, so let's deal with it.
    142         1.1      fvdl  *
    143        1.23       erh  * Note: On the Alpha this doesn't really exist in Linux, but it's defined
    144        1.23       erh  * in syscalls.master anyway so this doesn't have to be special cased.
    145        1.23       erh  *
    146         1.1      fvdl  * Just call open(2) with the TRUNC, CREAT and WRONLY flags.
    147         1.1      fvdl  */
    148         1.1      fvdl int
    149        1.90       dsl linux_sys_creat(struct lwp *l, const struct linux_sys_creat_args *uap, register_t *retval)
    150        1.11   thorpej {
    151        1.90       dsl 	/* {
    152        1.27  christos 		syscallarg(const char *) path;
    153  1.104.12.1       tls 		syscallarg(linux_umode_t) mode;
    154        1.90       dsl 	} */
    155        1.12   mycroft 	struct sys_open_args oa;
    156         1.1      fvdl 
    157         1.1      fvdl 	SCARG(&oa, path) = SCARG(uap, path);
    158         1.1      fvdl 	SCARG(&oa, flags) = O_CREAT | O_TRUNC | O_WRONLY;
    159         1.1      fvdl 	SCARG(&oa, mode) = SCARG(uap, mode);
    160        1.12   mycroft 
    161        1.56   thorpej 	return sys_open(l, &oa, retval);
    162         1.1      fvdl }
    163         1.1      fvdl 
    164  1.104.12.1       tls static void
    165  1.104.12.1       tls linux_open_ctty(struct lwp *l, int flags, int fd)
    166  1.104.12.1       tls {
    167  1.104.12.1       tls 	struct proc *p = l->l_proc;
    168  1.104.12.1       tls 
    169  1.104.12.1       tls 	/*
    170  1.104.12.1       tls 	 * this bit from sunos_misc.c (and svr4_fcntl.c).
    171  1.104.12.1       tls 	 * If we are a session leader, and we don't have a controlling
    172  1.104.12.1       tls 	 * terminal yet, and the O_NOCTTY flag is not set, try to make
    173  1.104.12.1       tls 	 * this the controlling terminal.
    174  1.104.12.1       tls 	 */
    175  1.104.12.1       tls         if (!(flags & O_NOCTTY) && SESS_LEADER(p) && !(p->p_lflag & PL_CONTROLT)) {
    176  1.104.12.1       tls                 file_t *fp;
    177  1.104.12.1       tls 
    178  1.104.12.1       tls 		fp = fd_getfile(fd);
    179  1.104.12.1       tls 
    180  1.104.12.1       tls                 /* ignore any error, just give it a try */
    181  1.104.12.1       tls                 if (fp != NULL) {
    182  1.104.12.1       tls 			if (fp->f_type == DTYPE_VNODE) {
    183  1.104.12.1       tls 				(fp->f_ops->fo_ioctl) (fp, TIOCSCTTY, NULL);
    184  1.104.12.1       tls 			}
    185  1.104.12.1       tls 			fd_putfile(fd);
    186  1.104.12.1       tls 		}
    187  1.104.12.1       tls         }
    188  1.104.12.1       tls }
    189  1.104.12.1       tls 
    190         1.1      fvdl /*
    191         1.1      fvdl  * open(2). Take care of the different flag values, and let the
    192         1.1      fvdl  * NetBSD syscall do the real work. See if this operation
    193         1.1      fvdl  * gives the current process a controlling terminal.
    194         1.1      fvdl  * (XXX is this necessary?)
    195         1.1      fvdl  */
    196         1.1      fvdl int
    197        1.90       dsl linux_sys_open(struct lwp *l, const struct linux_sys_open_args *uap, register_t *retval)
    198        1.11   thorpej {
    199        1.90       dsl 	/* {
    200        1.27  christos 		syscallarg(const char *) path;
    201         1.1      fvdl 		syscallarg(int) flags;
    202  1.104.12.1       tls 		syscallarg(linux_umode_t) mode;
    203        1.90       dsl 	} */
    204         1.1      fvdl 	int error, fl;
    205        1.12   mycroft 	struct sys_open_args boa;
    206         1.1      fvdl 
    207         1.2      fvdl 	fl = linux_to_bsd_ioflags(SCARG(uap, flags));
    208         1.1      fvdl 
    209         1.1      fvdl 	SCARG(&boa, path) = SCARG(uap, path);
    210         1.1      fvdl 	SCARG(&boa, flags) = fl;
    211         1.1      fvdl 	SCARG(&boa, mode) = SCARG(uap, mode);
    212         1.2      fvdl 
    213        1.56   thorpej 	if ((error = sys_open(l, &boa, retval)))
    214  1.104.12.1       tls 		return (error == EFTYPE) ? ELOOP : error;
    215         1.1      fvdl 
    216  1.104.12.1       tls 	linux_open_ctty(l, fl, *retval);
    217  1.104.12.1       tls 	return 0;
    218  1.104.12.1       tls }
    219        1.38   thorpej 
    220  1.104.12.1       tls int
    221  1.104.12.1       tls linux_sys_openat(struct lwp *l, const struct linux_sys_openat_args *uap, register_t *retval)
    222  1.104.12.1       tls {
    223  1.104.12.1       tls 	/* {
    224  1.104.12.1       tls 		syscallarg(int) fd;
    225  1.104.12.1       tls 		syscallarg(const char *) path;
    226  1.104.12.1       tls 		syscallarg(int) flags;
    227  1.104.12.1       tls 		syscallarg(linux_umode_t) mode;
    228  1.104.12.1       tls 	} */
    229  1.104.12.1       tls 	int error, fl;
    230  1.104.12.1       tls 	struct sys_openat_args boa;
    231         1.1      fvdl 
    232  1.104.12.1       tls 	fl = linux_to_bsd_ioflags(SCARG(uap, flags));
    233  1.104.12.1       tls 
    234  1.104.12.1       tls 	SCARG(&boa, fd) = SCARG(uap, fd);
    235  1.104.12.1       tls 	SCARG(&boa, path) = SCARG(uap, path);
    236  1.104.12.1       tls 	SCARG(&boa, oflags) = fl;
    237  1.104.12.1       tls 	SCARG(&boa, mode) = SCARG(uap, mode);
    238  1.104.12.1       tls 
    239  1.104.12.1       tls 	if ((error = sys_openat(l, &boa, retval)))
    240  1.104.12.1       tls 		return (error == EFTYPE) ? ELOOP : error;
    241  1.104.12.1       tls 
    242  1.104.12.1       tls 	linux_open_ctty(l, fl, *retval);
    243         1.1      fvdl 	return 0;
    244         1.1      fvdl }
    245         1.1      fvdl 
    246         1.1      fvdl /*
    247         1.1      fvdl  * Most actions in the fcntl() call are straightforward; simply
    248         1.1      fvdl  * pass control to the NetBSD system call. A few commands need
    249         1.1      fvdl  * conversions after the actual system call has done its work,
    250         1.1      fvdl  * because the flag values and lock structure are different.
    251         1.1      fvdl  */
    252         1.1      fvdl int
    253        1.90       dsl linux_sys_fcntl(struct lwp *l, const struct linux_sys_fcntl_args *uap, register_t *retval)
    254        1.11   thorpej {
    255        1.90       dsl 	/* {
    256         1.1      fvdl 		syscallarg(int) fd;
    257         1.1      fvdl 		syscallarg(int) cmd;
    258         1.1      fvdl 		syscallarg(void *) arg;
    259        1.90       dsl 	} */
    260        1.56   thorpej 	struct proc *p = l->l_proc;
    261        1.23       erh 	int fd, cmd, error;
    262        1.23       erh 	u_long val;
    263        1.83       dsl 	void *arg;
    264        1.12   mycroft 	struct sys_fcntl_args fca;
    265        1.93        ad 	file_t *fp;
    266        1.13      fvdl 	struct vnode *vp;
    267        1.13      fvdl 	struct vattr va;
    268        1.13      fvdl 	long pgid;
    269        1.13      fvdl 	struct pgrp *pgrp;
    270        1.94        ad 	struct tty *tp;
    271         1.1      fvdl 
    272         1.1      fvdl 	fd = SCARG(uap, fd);
    273         1.1      fvdl 	cmd = SCARG(uap, cmd);
    274        1.92       dsl 	arg = SCARG(uap, arg);
    275         1.1      fvdl 
    276         1.1      fvdl 	switch (cmd) {
    277        1.92       dsl 
    278         1.1      fvdl 	case LINUX_F_DUPFD:
    279         1.1      fvdl 		cmd = F_DUPFD;
    280         1.1      fvdl 		break;
    281        1.92       dsl 
    282         1.1      fvdl 	case LINUX_F_GETFD:
    283         1.1      fvdl 		cmd = F_GETFD;
    284         1.1      fvdl 		break;
    285        1.92       dsl 
    286         1.1      fvdl 	case LINUX_F_SETFD:
    287         1.1      fvdl 		cmd = F_SETFD;
    288         1.1      fvdl 		break;
    289        1.92       dsl 
    290         1.1      fvdl 	case LINUX_F_GETFL:
    291         1.1      fvdl 		SCARG(&fca, fd) = fd;
    292         1.1      fvdl 		SCARG(&fca, cmd) = F_GETFL;
    293         1.1      fvdl 		SCARG(&fca, arg) = arg;
    294        1.56   thorpej 		if ((error = sys_fcntl(l, &fca, retval)))
    295         1.1      fvdl 			return error;
    296         1.1      fvdl 		retval[0] = bsd_to_linux_ioflags(retval[0]);
    297         1.1      fvdl 		return 0;
    298        1.92       dsl 
    299        1.41  jdolecek 	case LINUX_F_SETFL: {
    300        1.93        ad 		file_t	*fp1 = NULL;
    301        1.41  jdolecek 
    302        1.23       erh 		val = linux_to_bsd_ioflags((unsigned long)SCARG(uap, arg));
    303        1.39      manu 		/*
    304        1.41  jdolecek 		 * Linux seems to have same semantics for sending SIGIO to the
    305        1.64       abs 		 * read side of socket, but slightly different semantics
    306        1.41  jdolecek 		 * for SIGIO to the write side.  Rather than sending the SIGIO
    307        1.41  jdolecek 		 * every time it's possible to write (directly) more data, it
    308        1.41  jdolecek 		 * only sends SIGIO if last write(2) failed due to insufficient
    309        1.41  jdolecek 		 * memory to hold the data. This is compatible enough
    310        1.41  jdolecek 		 * with NetBSD semantics to not do anything about the
    311        1.41  jdolecek 		 * difference.
    312        1.65     perry 		 *
    313        1.41  jdolecek 		 * Linux does NOT send SIGIO for pipes. Deal with socketpair
    314        1.41  jdolecek 		 * ones and DTYPE_PIPE ones. For these, we don't set
    315        1.41  jdolecek 		 * the underlying flags (we don't pass O_ASYNC flag down
    316        1.41  jdolecek 		 * to sys_fcntl()), but set the FASYNC flag for file descriptor,
    317        1.41  jdolecek 		 * so that F_GETFL would report the ASYNC i/o is on.
    318        1.39      manu 		 */
    319        1.41  jdolecek 		if (val & O_ASYNC) {
    320        1.93        ad 			if (((fp1 = fd_getfile(fd)) == NULL))
    321        1.39      manu 			    return (EBADF);
    322        1.69  christos 			if (((fp1->f_type == DTYPE_SOCKET) && fp1->f_data
    323        1.69  christos 			      && ((struct socket *)fp1->f_data)->so_state & SS_ISAPIPE)
    324        1.69  christos 			    || (fp1->f_type == DTYPE_PIPE))
    325        1.41  jdolecek 				val &= ~O_ASYNC;
    326        1.41  jdolecek 			else {
    327        1.41  jdolecek 				/* not a pipe, do not modify anything */
    328        1.93        ad 				fd_putfile(fd);
    329        1.69  christos 				fp1 = NULL;
    330        1.39      manu 			}
    331        1.41  jdolecek 		}
    332        1.41  jdolecek 
    333        1.41  jdolecek 		SCARG(&fca, fd) = fd;
    334        1.41  jdolecek 		SCARG(&fca, cmd) = F_SETFL;
    335        1.79  christos 		SCARG(&fca, arg) = (void *) val;
    336        1.39      manu 
    337        1.56   thorpej 		error = sys_fcntl(l, &fca, retval);
    338        1.41  jdolecek 
    339        1.41  jdolecek 		/* Now set the FASYNC flag for pipes */
    340        1.69  christos 		if (fp1) {
    341        1.93        ad 			if (!error) {
    342        1.93        ad 				mutex_enter(&fp1->f_lock);
    343        1.69  christos 				fp1->f_flag |= FASYNC;
    344        1.93        ad 				mutex_exit(&fp1->f_lock);
    345        1.93        ad 			}
    346        1.93        ad 			fd_putfile(fd);
    347        1.39      manu 		}
    348        1.41  jdolecek 
    349        1.41  jdolecek 		return (error);
    350        1.41  jdolecek 	    }
    351        1.92       dsl 
    352         1.1      fvdl 	case LINUX_F_GETLK:
    353        1.92       dsl 		do_linux_getlk(fd, cmd, arg, linux, flock);
    354        1.47  christos 
    355         1.1      fvdl 	case LINUX_F_SETLK:
    356         1.1      fvdl 	case LINUX_F_SETLKW:
    357        1.92       dsl 		do_linux_setlk(fd, cmd, arg, linux, flock, LINUX_F_SETLK);
    358        1.47  christos 
    359         1.1      fvdl 	case LINUX_F_SETOWN:
    360        1.65     perry 	case LINUX_F_GETOWN:
    361        1.13      fvdl 		/*
    362        1.49  jdolecek 		 * We need to route fcntl() for tty descriptors around normal
    363        1.49  jdolecek 		 * fcntl(), since NetBSD tty TIOC{G,S}PGRP semantics is too
    364        1.49  jdolecek 		 * restrictive for Linux F_{G,S}ETOWN. For non-tty descriptors,
    365        1.49  jdolecek 		 * this is not a problem.
    366        1.13      fvdl 		 */
    367        1.93        ad 		if ((fp = fd_getfile(fd)) == NULL)
    368        1.13      fvdl 			return EBADF;
    369        1.60  jdolecek 
    370        1.60  jdolecek 		/* Check it's a character device vnode */
    371        1.60  jdolecek 		if (fp->f_type != DTYPE_VNODE
    372        1.60  jdolecek 		    || (vp = (struct vnode *)fp->f_data) == NULL
    373        1.60  jdolecek 		    || vp->v_type != VCHR) {
    374        1.93        ad 			fd_putfile(fd);
    375        1.60  jdolecek 
    376        1.53   gehenna 	    not_tty:
    377        1.49  jdolecek 			/* Not a tty, proceed with common fcntl() */
    378        1.13      fvdl 			cmd = cmd == LINUX_F_SETOWN ? F_SETOWN : F_GETOWN;
    379        1.49  jdolecek 			break;
    380        1.49  jdolecek 		}
    381        1.47  christos 
    382       1.104   hannken 		vn_lock(vp, LK_SHARED | LK_RETRY);
    383        1.86     pooka 		error = VOP_GETATTR(vp, &va, l->l_cred);
    384       1.104   hannken 		VOP_UNLOCK(vp);
    385        1.60  jdolecek 
    386        1.93        ad 		fd_putfile(fd);
    387        1.60  jdolecek 
    388        1.60  jdolecek 		if (error)
    389        1.49  jdolecek 			return error;
    390        1.60  jdolecek 
    391        1.94        ad 		if ((tp = cdev_tty(va.va_rdev)) == NULL)
    392        1.53   gehenna 			goto not_tty;
    393        1.49  jdolecek 
    394        1.49  jdolecek 		/* set tty pg_id appropriately */
    395        1.95        ad 		mutex_enter(proc_lock);
    396        1.49  jdolecek 		if (cmd == LINUX_F_GETOWN) {
    397        1.58       dsl 			retval[0] = tp->t_pgrp ? tp->t_pgrp->pg_id : NO_PGID;
    398        1.95        ad 			mutex_exit(proc_lock);
    399        1.49  jdolecek 			return 0;
    400        1.49  jdolecek 		}
    401        1.49  jdolecek 		if ((long)arg <= 0) {
    402        1.49  jdolecek 			pgid = -(long)arg;
    403        1.49  jdolecek 		} else {
    404        1.99     rmind 			struct proc *p1 = proc_find((long)arg);
    405        1.99     rmind 			if (p1 == NULL) {
    406        1.99     rmind 				mutex_exit(proc_lock);
    407        1.49  jdolecek 				return (ESRCH);
    408        1.99     rmind 			}
    409        1.49  jdolecek 			pgid = (long)p1->p_pgrp->pg_id;
    410        1.13      fvdl 		}
    411        1.99     rmind 		pgrp = pgrp_find(pgid);
    412        1.78       dsl 		if (pgrp == NULL || pgrp->pg_session != p->p_session) {
    413        1.95        ad 			mutex_exit(proc_lock);
    414        1.49  jdolecek 			return EPERM;
    415        1.78       dsl 		}
    416        1.49  jdolecek 		tp->t_pgrp = pgrp;
    417        1.95        ad 		mutex_exit(proc_lock);
    418        1.49  jdolecek 		return 0;
    419        1.47  christos 
    420  1.104.12.2  jdolecek 	case LINUX_F_DUPFD_CLOEXEC:
    421  1.104.12.2  jdolecek 		cmd = F_DUPFD_CLOEXEC;
    422  1.104.12.2  jdolecek 		break;
    423  1.104.12.2  jdolecek 
    424         1.1      fvdl 	default:
    425         1.1      fvdl 		return EOPNOTSUPP;
    426         1.1      fvdl 	}
    427         1.1      fvdl 
    428         1.1      fvdl 	SCARG(&fca, fd) = fd;
    429         1.1      fvdl 	SCARG(&fca, cmd) = cmd;
    430         1.1      fvdl 	SCARG(&fca, arg) = arg;
    431        1.12   mycroft 
    432        1.56   thorpej 	return sys_fcntl(l, &fca, retval);
    433         1.1      fvdl }
    434         1.1      fvdl 
    435        1.67      manu #if !defined(__amd64__)
    436         1.1      fvdl /*
    437         1.1      fvdl  * Convert a NetBSD stat structure to a Linux stat structure.
    438         1.1      fvdl  * Only the order of the fields and the padding in the structure
    439         1.9      fvdl  * is different. linux_fakedev is a machine-dependent function
    440         1.9      fvdl  * which optionally converts device driver major/minor numbers
    441         1.9      fvdl  * (XXX horrible, but what can you do against code that compares
    442         1.9      fvdl  * things against constant major device numbers? sigh)
    443         1.1      fvdl  */
    444         1.1      fvdl static void
    445        1.88       dsl bsd_to_linux_stat(struct stat *bsp, struct linux_stat *lsp)
    446         1.1      fvdl {
    447        1.12   mycroft 
    448        1.45  christos 	lsp->lst_dev     = linux_fakedev(bsp->st_dev, 0);
    449         1.1      fvdl 	lsp->lst_ino     = bsp->st_ino;
    450        1.19  christos 	lsp->lst_mode    = (linux_mode_t)bsp->st_mode;
    451        1.19  christos 	if (bsp->st_nlink >= (1 << 15))
    452        1.19  christos 		lsp->lst_nlink = (1 << 15) - 1;
    453        1.19  christos 	else
    454        1.19  christos 		lsp->lst_nlink = (linux_nlink_t)bsp->st_nlink;
    455         1.1      fvdl 	lsp->lst_uid     = bsp->st_uid;
    456         1.1      fvdl 	lsp->lst_gid     = bsp->st_gid;
    457        1.45  christos 	lsp->lst_rdev    = linux_fakedev(bsp->st_rdev, 1);
    458         1.1      fvdl 	lsp->lst_size    = bsp->st_size;
    459         1.1      fvdl 	lsp->lst_blksize = bsp->st_blksize;
    460         1.1      fvdl 	lsp->lst_blocks  = bsp->st_blocks;
    461         1.1      fvdl 	lsp->lst_atime   = bsp->st_atime;
    462         1.1      fvdl 	lsp->lst_mtime   = bsp->st_mtime;
    463         1.1      fvdl 	lsp->lst_ctime   = bsp->st_ctime;
    464        1.66  christos #ifdef LINUX_STAT_HAS_NSEC
    465        1.66  christos 	lsp->lst_atime_nsec   = bsp->st_atimensec;
    466        1.66  christos 	lsp->lst_mtime_nsec   = bsp->st_mtimensec;
    467        1.66  christos 	lsp->lst_ctime_nsec   = bsp->st_ctimensec;
    468        1.66  christos #endif
    469         1.1      fvdl }
    470         1.1      fvdl 
    471         1.1      fvdl /*
    472         1.1      fvdl  * The stat functions below are plain sailing. stat and lstat are handled
    473         1.1      fvdl  * by one function to avoid code duplication.
    474         1.1      fvdl  */
    475         1.1      fvdl int
    476        1.90       dsl linux_sys_fstat(struct lwp *l, const struct linux_sys_fstat_args *uap, register_t *retval)
    477        1.11   thorpej {
    478        1.90       dsl 	/* {
    479         1.1      fvdl 		syscallarg(int) fd;
    480         1.1      fvdl 		syscallarg(linux_stat *) sp;
    481        1.90       dsl 	} */
    482         1.1      fvdl 	struct linux_stat tmplst;
    483        1.81       dsl 	struct stat tmpst;
    484         1.1      fvdl 	int error;
    485         1.1      fvdl 
    486        1.93        ad 	error = do_sys_fstat(SCARG(uap, fd), &tmpst);
    487        1.81       dsl 	if (error != 0)
    488         1.1      fvdl 		return error;
    489         1.1      fvdl 	bsd_to_linux_stat(&tmpst, &tmplst);
    490         1.1      fvdl 
    491        1.81       dsl 	return copyout(&tmplst, SCARG(uap, sp), sizeof tmplst);
    492         1.1      fvdl }
    493         1.1      fvdl 
    494         1.1      fvdl static int
    495        1.93        ad linux_stat1(const struct linux_sys_stat_args *uap, register_t *retval, int flags)
    496         1.1      fvdl {
    497         1.1      fvdl 	struct linux_stat tmplst;
    498        1.81       dsl 	struct stat tmpst;
    499         1.1      fvdl 	int error;
    500         1.1      fvdl 
    501        1.93        ad 	error = do_sys_stat(SCARG(uap, path), flags, &tmpst);
    502        1.81       dsl 	if (error != 0)
    503         1.1      fvdl 		return error;
    504         1.1      fvdl 
    505         1.1      fvdl 	bsd_to_linux_stat(&tmpst, &tmplst);
    506         1.1      fvdl 
    507        1.81       dsl 	return copyout(&tmplst, SCARG(uap, sp), sizeof tmplst);
    508         1.1      fvdl }
    509         1.1      fvdl 
    510         1.1      fvdl int
    511        1.90       dsl linux_sys_stat(struct lwp *l, const struct linux_sys_stat_args *uap, register_t *retval)
    512        1.11   thorpej {
    513        1.90       dsl 	/* {
    514        1.27  christos 		syscallarg(const char *) path;
    515         1.1      fvdl 		syscallarg(struct linux_stat *) sp;
    516        1.90       dsl 	} */
    517        1.11   thorpej 
    518        1.93        ad 	return linux_stat1(uap, retval, FOLLOW);
    519         1.1      fvdl }
    520         1.1      fvdl 
    521        1.23       erh /* Note: this is "newlstat" in the Linux sources */
    522        1.23       erh /*	(we don't bother with the old lstat currently) */
    523         1.1      fvdl int
    524        1.90       dsl linux_sys_lstat(struct lwp *l, const struct linux_sys_lstat_args *uap, register_t *retval)
    525        1.11   thorpej {
    526        1.90       dsl 	/* {
    527        1.27  christos 		syscallarg(const char *) path;
    528         1.1      fvdl 		syscallarg(struct linux_stat *) sp;
    529        1.90       dsl 	} */
    530        1.11   thorpej 
    531        1.93        ad 	return linux_stat1((const void *)uap, retval, NOFOLLOW);
    532         1.1      fvdl }
    533        1.67      manu #endif /* !__amd64__ */
    534         1.1      fvdl 
    535         1.1      fvdl /*
    536        1.10      fvdl  * The following syscalls are mostly here because of the alternate path check.
    537         1.1      fvdl  */
    538  1.104.12.1       tls 
    539         1.1      fvdl int
    540  1.104.12.1       tls linux_sys_linkat(struct lwp *l, const struct linux_sys_linkat_args *uap, register_t *retval)
    541         1.2      fvdl {
    542        1.90       dsl 	/* {
    543  1.104.12.1       tls 		syscallarg(int) fd1;
    544  1.104.12.1       tls 		syscallarg(const char *) name1;
    545  1.104.12.1       tls 		syscallarg(int) fd2;
    546  1.104.12.1       tls 		syscallarg(const char *) name2;
    547  1.104.12.1       tls 		syscallarg(int) flags;
    548        1.90       dsl 	} */
    549  1.104.12.1       tls 	int fd1 = SCARG(uap, fd1);
    550  1.104.12.1       tls 	const char *name1 = SCARG(uap, name1);
    551  1.104.12.1       tls 	int fd2 = SCARG(uap, fd2);
    552  1.104.12.1       tls 	const char *name2 = SCARG(uap, name2);
    553  1.104.12.1       tls 	int follow;
    554         1.2      fvdl 
    555  1.104.12.1       tls 	follow = SCARG(uap, flags) & LINUX_AT_SYMLINK_FOLLOW;
    556  1.104.12.1       tls 
    557  1.104.12.1       tls 	return do_sys_linkat(l, fd1, name1, fd2, name2, follow, retval);
    558  1.104.12.1       tls }
    559  1.104.12.1       tls 
    560  1.104.12.1       tls static int
    561  1.104.12.1       tls linux_unlink_dircheck(const char *path)
    562  1.104.12.1       tls {
    563  1.104.12.1       tls 	struct nameidata nd;
    564  1.104.12.1       tls 	struct pathbuf *pb;
    565  1.104.12.1       tls 	int error;
    566        1.63  jdolecek 
    567        1.63  jdolecek 	/*
    568        1.63  jdolecek 	 * Linux returns EISDIR if unlink(2) is called on a directory.
    569        1.63  jdolecek 	 * We return EPERM in such cases. To emulate correct behaviour,
    570        1.63  jdolecek 	 * check if the path points to directory and return EISDIR if this
    571        1.63  jdolecek 	 * is the case.
    572       1.101  dholland 	 *
    573       1.101  dholland 	 * XXX this should really not copy in the path buffer twice...
    574        1.63  jdolecek 	 */
    575  1.104.12.1       tls 	error = pathbuf_copyin(path, &pb);
    576  1.104.12.1       tls 	if (error) {
    577  1.104.12.1       tls 		return error;
    578       1.101  dholland 	}
    579       1.101  dholland 	NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | TRYEMULROOT, pb);
    580        1.63  jdolecek 	if (namei(&nd) == 0) {
    581        1.63  jdolecek 		struct stat sb;
    582        1.63  jdolecek 
    583        1.93        ad 		if (vn_stat(nd.ni_vp, &sb) == 0
    584        1.63  jdolecek 		    && S_ISDIR(sb.st_mode))
    585        1.63  jdolecek 			error = EISDIR;
    586        1.63  jdolecek 
    587        1.63  jdolecek 		vput(nd.ni_vp);
    588        1.63  jdolecek 	}
    589       1.101  dholland 	pathbuf_destroy(pb);
    590  1.104.12.1       tls 	return error ? error : EPERM;
    591  1.104.12.1       tls }
    592  1.104.12.1       tls 
    593  1.104.12.1       tls int
    594  1.104.12.1       tls linux_sys_unlink(struct lwp *l, const struct linux_sys_unlink_args *uap, register_t *retval)
    595  1.104.12.1       tls {
    596  1.104.12.1       tls 	/* {
    597  1.104.12.1       tls 		syscallarg(const char *) path;
    598  1.104.12.1       tls 	} */
    599  1.104.12.1       tls 	int error;
    600  1.104.12.1       tls 
    601  1.104.12.1       tls 	error = sys_unlink(l, (const void *)uap, retval);
    602  1.104.12.1       tls 	if (error == EPERM)
    603  1.104.12.1       tls 		error = linux_unlink_dircheck(SCARG(uap, path));
    604  1.104.12.1       tls 
    605  1.104.12.1       tls 	return error;
    606  1.104.12.1       tls }
    607  1.104.12.1       tls 
    608  1.104.12.1       tls int
    609  1.104.12.1       tls linux_sys_unlinkat(struct lwp *l, const struct linux_sys_unlinkat_args *uap, register_t *retval)
    610  1.104.12.1       tls {
    611  1.104.12.1       tls 	/* {
    612  1.104.12.1       tls 		syscallarg(int) fd;
    613  1.104.12.1       tls 		syscallarg(const char *) path;
    614  1.104.12.1       tls 		syscallarg(int) flag;
    615  1.104.12.1       tls 	} */
    616  1.104.12.1       tls 	struct sys_unlinkat_args ua;
    617  1.104.12.1       tls 	int error;
    618  1.104.12.1       tls 
    619  1.104.12.1       tls 	SCARG(&ua, fd) = SCARG(uap, fd);
    620  1.104.12.1       tls 	SCARG(&ua, path) = SCARG(uap, path);
    621  1.104.12.1       tls 	SCARG(&ua, flag) = linux_to_bsd_atflags(SCARG(uap, flag));
    622  1.104.12.1       tls 
    623  1.104.12.1       tls 	error = sys_unlinkat(l, &ua, retval);
    624  1.104.12.1       tls 	if (error == EPERM)
    625  1.104.12.1       tls 		error = linux_unlink_dircheck(SCARG(uap, path));
    626        1.63  jdolecek 
    627  1.104.12.1       tls 	return error;
    628         1.2      fvdl }
    629         1.2      fvdl 
    630        1.10      fvdl int
    631        1.90       dsl linux_sys_mknod(struct lwp *l, const struct linux_sys_mknod_args *uap, register_t *retval)
    632        1.11   thorpej {
    633        1.90       dsl 	/* {
    634        1.27  christos 		syscallarg(const char *) path;
    635  1.104.12.1       tls 		syscallarg(linux_umode_t) mode;
    636  1.104.12.1       tls 		syscallarg(unsigned) dev;
    637  1.104.12.1       tls 	} */
    638  1.104.12.1       tls 	struct linux_sys_mknodat_args ua;
    639  1.104.12.1       tls 
    640  1.104.12.1       tls 	SCARG(&ua, fd) = LINUX_AT_FDCWD;
    641  1.104.12.1       tls 	SCARG(&ua, path) = SCARG(uap, path);
    642  1.104.12.1       tls 	SCARG(&ua, mode) = SCARG(uap, mode);
    643  1.104.12.1       tls 	SCARG(&ua, dev) = SCARG(uap, dev);
    644  1.104.12.1       tls 
    645  1.104.12.1       tls 	return linux_sys_mknodat(l, &ua, retval);
    646  1.104.12.1       tls }
    647  1.104.12.1       tls 
    648  1.104.12.1       tls int
    649  1.104.12.1       tls linux_sys_mknodat(struct lwp *l, const struct linux_sys_mknodat_args *uap, register_t *retval)
    650  1.104.12.1       tls {
    651  1.104.12.1       tls 	/* {
    652  1.104.12.1       tls 		syscallarg(int) fd;
    653  1.104.12.1       tls 		syscallarg(const char *) path;
    654  1.104.12.1       tls 		syscallarg(linux_umode_t) mode;
    655  1.104.12.1       tls 		syscallarg(unsigned) dev;
    656        1.90       dsl 	} */
    657         1.2      fvdl 
    658        1.10      fvdl 	/*
    659        1.40       wiz 	 * BSD handles FIFOs separately
    660        1.10      fvdl 	 */
    661        1.74     pavel 	if (S_ISFIFO(SCARG(uap, mode))) {
    662  1.104.12.1       tls 		struct sys_mkfifoat_args bma;
    663        1.54  jdolecek 
    664  1.104.12.1       tls 		SCARG(&bma, fd) = SCARG(uap, fd);
    665        1.21   thorpej 		SCARG(&bma, path) = SCARG(uap, path);
    666        1.21   thorpej 		SCARG(&bma, mode) = SCARG(uap, mode);
    667  1.104.12.1       tls 		return sys_mkfifoat(l, &bma, retval);
    668        1.54  jdolecek 	} else {
    669        1.54  jdolecek 
    670        1.54  jdolecek 		/*
    671        1.54  jdolecek 		 * Linux device numbers uses 8 bits for minor and 8 bits
    672        1.54  jdolecek 		 * for major. Due to how we map our major and minor,
    673        1.82       dsl 		 * this just fits into our dev_t. Just mask off the
    674        1.54  jdolecek 		 * upper 16bit to remove any random junk.
    675        1.54  jdolecek 		 */
    676  1.104.12.1       tls 
    677  1.104.12.1       tls 		return do_sys_mknodat(l, SCARG(uap, fd), SCARG(uap, path),
    678  1.104.12.1       tls 		    SCARG(uap, mode), SCARG(uap, dev) & 0xffff, retval,
    679  1.104.12.1       tls 		    UIO_USERSPACE);
    680        1.54  jdolecek 	}
    681         1.2      fvdl }
    682         1.2      fvdl 
    683  1.104.12.1       tls int
    684  1.104.12.1       tls linux_sys_fchmodat(struct lwp *l, const struct linux_sys_fchmodat_args *uap, register_t *retval)
    685  1.104.12.1       tls {
    686  1.104.12.1       tls 	/* {
    687  1.104.12.1       tls 		syscallarg(int) fd;
    688  1.104.12.1       tls 		syscallarg(const char *) path;
    689  1.104.12.1       tls 		syscallarg(linux_umode_t) mode;
    690  1.104.12.1       tls 	} */
    691  1.104.12.1       tls 
    692  1.104.12.1       tls 	return do_sys_chmodat(l, SCARG(uap, fd), SCARG(uap, path),
    693  1.104.12.1       tls 			      SCARG(uap, mode), AT_SYMLINK_FOLLOW);
    694  1.104.12.1       tls }
    695  1.104.12.1       tls 
    696  1.104.12.1       tls int
    697  1.104.12.1       tls linux_sys_fchownat(struct lwp *l, const struct linux_sys_fchownat_args *uap, register_t *retval)
    698  1.104.12.1       tls {
    699  1.104.12.1       tls 	/* {
    700  1.104.12.1       tls 		syscallarg(int) fd;
    701  1.104.12.1       tls 		syscallarg(const char *) path;
    702  1.104.12.1       tls 		syscallarg(uid_t) owner;
    703  1.104.12.1       tls 		syscallarg(gid_t) group;
    704  1.104.12.1       tls 		syscallarg(int) flag;
    705  1.104.12.1       tls 	} */
    706  1.104.12.1       tls 	int flag;
    707  1.104.12.1       tls 
    708  1.104.12.1       tls 	flag = linux_to_bsd_atflags(SCARG(uap, flag));
    709  1.104.12.1       tls 	return do_sys_chownat(l, SCARG(uap, fd), SCARG(uap, path),
    710  1.104.12.1       tls 			      SCARG(uap, owner), SCARG(uap, group), flag);
    711  1.104.12.1       tls }
    712  1.104.12.1       tls 
    713  1.104.12.1       tls int
    714  1.104.12.1       tls linux_sys_faccessat(struct lwp *l, const struct linux_sys_faccessat_args *uap, register_t *retval)
    715  1.104.12.1       tls {
    716  1.104.12.1       tls 	/* {
    717  1.104.12.1       tls 		syscallarg(int) fd;
    718  1.104.12.1       tls 		syscallarg(const char *) path;
    719  1.104.12.1       tls 		syscallarg(int) amode;
    720  1.104.12.1       tls 	} */
    721  1.104.12.1       tls 
    722  1.104.12.1       tls 	return do_sys_accessat(l, SCARG(uap, fd), SCARG(uap, path),
    723  1.104.12.1       tls 	     SCARG(uap, amode), AT_SYMLINK_FOLLOW);
    724  1.104.12.1       tls }
    725  1.104.12.1       tls 
    726        1.15      fvdl /*
    727        1.15      fvdl  * This is just fsync() for now (just as it is in the Linux kernel)
    728        1.23       erh  * Note: this is not implemented under Linux on Alpha and Arm
    729        1.23       erh  *	but should still be defined in our syscalls.master.
    730        1.23       erh  *	(syscall #148 on the arm)
    731        1.15      fvdl  */
    732        1.15      fvdl int
    733        1.90       dsl linux_sys_fdatasync(struct lwp *l, const struct linux_sys_fdatasync_args *uap, register_t *retval)
    734        1.15      fvdl {
    735        1.90       dsl 	/* {
    736        1.15      fvdl 		syscallarg(int) fd;
    737        1.90       dsl 	} */
    738        1.90       dsl 
    739        1.90       dsl 	return sys_fsync(l, (const void *)uap, retval);
    740        1.28      tron }
    741        1.28      tron 
    742        1.28      tron /*
    743        1.28      tron  * pread(2).
    744        1.28      tron  */
    745        1.28      tron int
    746        1.90       dsl linux_sys_pread(struct lwp *l, const struct linux_sys_pread_args *uap, register_t *retval)
    747        1.28      tron {
    748        1.90       dsl 	/* {
    749        1.28      tron 		syscallarg(int) fd;
    750        1.28      tron 		syscallarg(void *) buf;
    751        1.28      tron 		syscallarg(size_t) nbyte;
    752  1.104.12.1       tls 		syscallarg(off_t) offset;
    753        1.90       dsl 	} */
    754        1.28      tron 	struct sys_pread_args pra;
    755        1.28      tron 
    756        1.28      tron 	SCARG(&pra, fd) = SCARG(uap, fd);
    757        1.28      tron 	SCARG(&pra, buf) = SCARG(uap, buf);
    758        1.28      tron 	SCARG(&pra, nbyte) = SCARG(uap, nbyte);
    759  1.104.12.1       tls 	SCARG(&pra, PAD) = 0;
    760        1.28      tron 	SCARG(&pra, offset) = SCARG(uap, offset);
    761        1.28      tron 
    762        1.62  jdolecek 	return sys_pread(l, &pra, retval);
    763        1.28      tron }
    764        1.28      tron 
    765        1.28      tron /*
    766        1.28      tron  * pwrite(2).
    767        1.28      tron  */
    768        1.28      tron int
    769        1.90       dsl linux_sys_pwrite(struct lwp *l, const struct linux_sys_pwrite_args *uap, register_t *retval)
    770        1.28      tron {
    771        1.90       dsl 	/* {
    772        1.28      tron 		syscallarg(int) fd;
    773        1.28      tron 		syscallarg(void *) buf;
    774        1.28      tron 		syscallarg(size_t) nbyte;
    775  1.104.12.1       tls 		syscallarg(off_t) offset;
    776        1.90       dsl 	} */
    777        1.28      tron 	struct sys_pwrite_args pra;
    778        1.28      tron 
    779        1.28      tron 	SCARG(&pra, fd) = SCARG(uap, fd);
    780        1.28      tron 	SCARG(&pra, buf) = SCARG(uap, buf);
    781        1.28      tron 	SCARG(&pra, nbyte) = SCARG(uap, nbyte);
    782  1.104.12.1       tls 	SCARG(&pra, PAD) = 0;
    783        1.28      tron 	SCARG(&pra, offset) = SCARG(uap, offset);
    784        1.28      tron 
    785        1.62  jdolecek 	return sys_pwrite(l, &pra, retval);
    786         1.1      fvdl }
    787        1.68      fvdl 
    788       1.103  christos int
    789       1.103  christos linux_sys_dup3(struct lwp *l, const struct linux_sys_dup3_args *uap,
    790       1.103  christos     register_t *retval)
    791       1.103  christos {
    792       1.103  christos 	/* {
    793       1.103  christos 		syscallarg(int) from;
    794       1.103  christos 		syscallarg(int) to;
    795       1.103  christos 		syscallarg(int) flags;
    796       1.103  christos 	} */
    797  1.104.12.1       tls 	int flags;
    798       1.103  christos 
    799  1.104.12.1       tls 	flags = linux_to_bsd_ioflags(SCARG(uap, flags));
    800  1.104.12.1       tls 	if ((flags & ~O_CLOEXEC) != 0)
    801  1.104.12.1       tls 		return EINVAL;
    802       1.103  christos 
    803  1.104.12.1       tls 	if (SCARG(uap, from) == SCARG(uap, to))
    804  1.104.12.1       tls 		return EINVAL;
    805  1.104.12.1       tls 
    806  1.104.12.1       tls 	return dodup(l, SCARG(uap, from), SCARG(uap, to), flags, retval);
    807       1.103  christos }
    808       1.103  christos 
    809  1.104.12.1       tls 
    810  1.104.12.1       tls int
    811  1.104.12.1       tls linux_to_bsd_atflags(int lflags)
    812  1.104.12.1       tls {
    813  1.104.12.1       tls 	int bflags = 0;
    814  1.104.12.1       tls 
    815  1.104.12.1       tls 	if (lflags & LINUX_AT_SYMLINK_NOFOLLOW)
    816  1.104.12.1       tls 		bflags |= AT_SYMLINK_NOFOLLOW;
    817  1.104.12.1       tls 	if (lflags & LINUX_AT_REMOVEDIR)
    818  1.104.12.1       tls 		bflags |= AT_REMOVEDIR;
    819  1.104.12.1       tls 	if (lflags & LINUX_AT_SYMLINK_FOLLOW)
    820  1.104.12.1       tls 		bflags |= AT_SYMLINK_FOLLOW;
    821  1.104.12.1       tls 
    822  1.104.12.1       tls 	return bflags;
    823  1.104.12.1       tls }
    824  1.104.12.1       tls 
    825  1.104.12.1       tls 
    826        1.75  christos #define LINUX_NOT_SUPPORTED(fun) \
    827        1.75  christos int \
    828        1.90       dsl fun(struct lwp *l, const struct fun##_args *uap, register_t *retval) \
    829        1.75  christos { \
    830        1.75  christos 	return EOPNOTSUPP; \
    831        1.75  christos }
    832        1.75  christos 
    833        1.75  christos LINUX_NOT_SUPPORTED(linux_sys_setxattr)
    834        1.75  christos LINUX_NOT_SUPPORTED(linux_sys_lsetxattr)
    835        1.75  christos LINUX_NOT_SUPPORTED(linux_sys_fsetxattr)
    836        1.75  christos 
    837        1.75  christos LINUX_NOT_SUPPORTED(linux_sys_getxattr)
    838        1.75  christos LINUX_NOT_SUPPORTED(linux_sys_lgetxattr)
    839        1.75  christos LINUX_NOT_SUPPORTED(linux_sys_fgetxattr)
    840        1.75  christos 
    841        1.75  christos LINUX_NOT_SUPPORTED(linux_sys_listxattr)
    842        1.75  christos LINUX_NOT_SUPPORTED(linux_sys_llistxattr)
    843        1.75  christos LINUX_NOT_SUPPORTED(linux_sys_flistxattr)
    844        1.75  christos 
    845        1.75  christos LINUX_NOT_SUPPORTED(linux_sys_removexattr)
    846        1.75  christos LINUX_NOT_SUPPORTED(linux_sys_lremovexattr)
    847        1.75  christos LINUX_NOT_SUPPORTED(linux_sys_fremovexattr)
    848