Home | History | Annotate | Line # | Download | only in common
linux_file.c revision 1.113
      1  1.113     njoly /*	$NetBSD: linux_file.c,v 1.113 2014/06/25 16:38:53 njoly Exp $	*/
      2   1.23       erh 
      3   1.23       erh /*-
      4   1.93        ad  * Copyright (c) 1995, 1998, 2008 The NetBSD Foundation, Inc.
      5   1.23       erh  * All rights reserved.
      6   1.23       erh  *
      7   1.23       erh  * This code is derived from software contributed to The NetBSD Foundation
      8   1.25      fvdl  * by Frank van der Linden and Eric Haszlakiewicz.
      9   1.23       erh  *
     10   1.23       erh  * Redistribution and use in source and binary forms, with or without
     11   1.23       erh  * modification, are permitted provided that the following conditions
     12   1.23       erh  * are met:
     13   1.23       erh  * 1. Redistributions of source code must retain the above copyright
     14   1.23       erh  *    notice, this list of conditions and the following disclaimer.
     15   1.23       erh  * 2. Redistributions in binary form must reproduce the above copyright
     16   1.23       erh  *    notice, this list of conditions and the following disclaimer in the
     17   1.23       erh  *    documentation and/or other materials provided with the distribution.
     18   1.23       erh  *
     19   1.23       erh  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     20   1.23       erh  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     21   1.23       erh  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     22   1.23       erh  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     23   1.23       erh  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     24   1.23       erh  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     25   1.23       erh  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     26   1.23       erh  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     27   1.23       erh  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     28   1.23       erh  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     29   1.23       erh  * POSSIBILITY OF SUCH DAMAGE.
     30    1.1      fvdl  */
     31    1.1      fvdl 
     32   1.23       erh /*
     33   1.23       erh  * Functions in multiarch:
     34   1.23       erh  *	linux_sys_llseek	: linux_llseek.c
     35   1.23       erh  */
     36   1.43     lukem 
     37   1.43     lukem #include <sys/cdefs.h>
     38  1.113     njoly __KERNEL_RCSID(0, "$NetBSD: linux_file.c,v 1.113 2014/06/25 16:38:53 njoly Exp $");
     39   1.23       erh 
     40    1.1      fvdl #include <sys/param.h>
     41    1.1      fvdl #include <sys/systm.h>
     42    1.1      fvdl #include <sys/namei.h>
     43    1.1      fvdl #include <sys/proc.h>
     44    1.1      fvdl #include <sys/file.h>
     45  1.103  christos #include <sys/fcntl.h>
     46    1.1      fvdl #include <sys/stat.h>
     47    1.1      fvdl #include <sys/filedesc.h>
     48    1.1      fvdl #include <sys/ioctl.h>
     49    1.1      fvdl #include <sys/kernel.h>
     50    1.1      fvdl #include <sys/mount.h>
     51    1.1      fvdl #include <sys/malloc.h>
     52   1.81       dsl #include <sys/namei.h>
     53   1.13      fvdl #include <sys/vnode.h>
     54   1.13      fvdl #include <sys/tty.h>
     55   1.39      manu #include <sys/socketvar.h>
     56   1.13      fvdl #include <sys/conf.h>
     57   1.41  jdolecek #include <sys/pipe.h>
     58    1.1      fvdl 
     59    1.1      fvdl #include <sys/syscallargs.h>
     60   1.81       dsl #include <sys/vfs_syscalls.h>
     61    1.1      fvdl 
     62   1.24  christos #include <compat/linux/common/linux_types.h>
     63   1.24  christos #include <compat/linux/common/linux_signal.h>
     64   1.24  christos #include <compat/linux/common/linux_fcntl.h>
     65   1.24  christos #include <compat/linux/common/linux_util.h>
     66   1.24  christos #include <compat/linux/common/linux_machdep.h>
     67   1.84     njoly #include <compat/linux/common/linux_ipc.h>
     68   1.84     njoly #include <compat/linux/common/linux_sem.h>
     69   1.24  christos 
     70    1.1      fvdl #include <compat/linux/linux_syscallargs.h>
     71   1.14  christos 
     72   1.87       dsl static int bsd_to_linux_ioflags(int);
     73   1.67      manu #ifndef __amd64__
     74   1.87       dsl static void bsd_to_linux_stat(struct stat *, struct linux_stat *);
     75   1.67      manu #endif
     76   1.14  christos 
     77   1.92       dsl conv_linux_flock(linux, flock)
     78   1.92       dsl 
     79    1.1      fvdl /*
     80    1.1      fvdl  * Some file-related calls are handled here. The usual flag conversion
     81    1.1      fvdl  * an structure conversion is done, and alternate emul path searching.
     82    1.1      fvdl  */
     83    1.1      fvdl 
     84    1.1      fvdl /*
     85    1.1      fvdl  * The next two functions convert between the Linux and NetBSD values
     86    1.1      fvdl  * of the flags used in open(2) and fcntl(2).
     87    1.1      fvdl  */
     88  1.112     njoly int
     89   1.88       dsl linux_to_bsd_ioflags(int lflags)
     90    1.1      fvdl {
     91    1.1      fvdl 	int res = 0;
     92    1.1      fvdl 
     93    1.1      fvdl 	res |= cvtto_bsd_mask(lflags, LINUX_O_WRONLY, O_WRONLY);
     94    1.1      fvdl 	res |= cvtto_bsd_mask(lflags, LINUX_O_RDONLY, O_RDONLY);
     95    1.1      fvdl 	res |= cvtto_bsd_mask(lflags, LINUX_O_RDWR, O_RDWR);
     96  1.113     njoly 
     97    1.1      fvdl 	res |= cvtto_bsd_mask(lflags, LINUX_O_CREAT, O_CREAT);
     98    1.1      fvdl 	res |= cvtto_bsd_mask(lflags, LINUX_O_EXCL, O_EXCL);
     99    1.1      fvdl 	res |= cvtto_bsd_mask(lflags, LINUX_O_NOCTTY, O_NOCTTY);
    100    1.1      fvdl 	res |= cvtto_bsd_mask(lflags, LINUX_O_TRUNC, O_TRUNC);
    101  1.113     njoly 	res |= cvtto_bsd_mask(lflags, LINUX_O_APPEND, O_APPEND);
    102  1.113     njoly 	res |= cvtto_bsd_mask(lflags, LINUX_O_NONBLOCK, O_NONBLOCK);
    103    1.1      fvdl 	res |= cvtto_bsd_mask(lflags, LINUX_O_NDELAY, O_NDELAY);
    104    1.1      fvdl 	res |= cvtto_bsd_mask(lflags, LINUX_O_SYNC, O_FSYNC);
    105    1.1      fvdl 	res |= cvtto_bsd_mask(lflags, LINUX_FASYNC, O_ASYNC);
    106  1.113     njoly 	res |= cvtto_bsd_mask(lflags, LINUX_O_DIRECT, O_DIRECT);
    107  1.100       chs 	res |= cvtto_bsd_mask(lflags, LINUX_O_DIRECTORY, O_DIRECTORY);
    108  1.113     njoly 	res |= cvtto_bsd_mask(lflags, LINUX_O_NOFOLLOW, O_NOFOLLOW);
    109  1.102  christos 	res |= cvtto_bsd_mask(lflags, LINUX_O_CLOEXEC, O_CLOEXEC);
    110    1.1      fvdl 
    111    1.1      fvdl 	return res;
    112    1.1      fvdl }
    113    1.1      fvdl 
    114    1.1      fvdl static int
    115   1.88       dsl bsd_to_linux_ioflags(int bflags)
    116    1.1      fvdl {
    117    1.1      fvdl 	int res = 0;
    118    1.1      fvdl 
    119    1.1      fvdl 	res |= cvtto_linux_mask(bflags, O_WRONLY, LINUX_O_WRONLY);
    120    1.1      fvdl 	res |= cvtto_linux_mask(bflags, O_RDONLY, LINUX_O_RDONLY);
    121    1.1      fvdl 	res |= cvtto_linux_mask(bflags, O_RDWR, LINUX_O_RDWR);
    122  1.113     njoly 
    123    1.1      fvdl 	res |= cvtto_linux_mask(bflags, O_CREAT, LINUX_O_CREAT);
    124    1.1      fvdl 	res |= cvtto_linux_mask(bflags, O_EXCL, LINUX_O_EXCL);
    125    1.1      fvdl 	res |= cvtto_linux_mask(bflags, O_NOCTTY, LINUX_O_NOCTTY);
    126    1.1      fvdl 	res |= cvtto_linux_mask(bflags, O_TRUNC, LINUX_O_TRUNC);
    127  1.113     njoly 	res |= cvtto_linux_mask(bflags, O_APPEND, LINUX_O_APPEND);
    128  1.113     njoly 	res |= cvtto_linux_mask(bflags, O_NONBLOCK, LINUX_O_NONBLOCK);
    129    1.1      fvdl 	res |= cvtto_linux_mask(bflags, O_NDELAY, LINUX_O_NDELAY);
    130    1.1      fvdl 	res |= cvtto_linux_mask(bflags, O_FSYNC, LINUX_O_SYNC);
    131    1.1      fvdl 	res |= cvtto_linux_mask(bflags, O_ASYNC, LINUX_FASYNC);
    132  1.113     njoly 	res |= cvtto_linux_mask(bflags, O_DIRECT, LINUX_O_DIRECT);
    133  1.100       chs 	res |= cvtto_linux_mask(bflags, O_DIRECTORY, LINUX_O_DIRECTORY);
    134  1.113     njoly 	res |= cvtto_linux_mask(bflags, O_NOFOLLOW, LINUX_O_NOFOLLOW);
    135  1.102  christos 	res |= cvtto_linux_mask(bflags, O_CLOEXEC, LINUX_O_CLOEXEC);
    136    1.1      fvdl 
    137    1.1      fvdl 	return res;
    138    1.1      fvdl }
    139    1.1      fvdl 
    140    1.1      fvdl /*
    141    1.1      fvdl  * creat(2) is an obsolete function, but it's present as a Linux
    142    1.1      fvdl  * system call, so let's deal with it.
    143    1.1      fvdl  *
    144   1.23       erh  * Note: On the Alpha this doesn't really exist in Linux, but it's defined
    145   1.23       erh  * in syscalls.master anyway so this doesn't have to be special cased.
    146   1.23       erh  *
    147    1.1      fvdl  * Just call open(2) with the TRUNC, CREAT and WRONLY flags.
    148    1.1      fvdl  */
    149    1.1      fvdl int
    150   1.90       dsl linux_sys_creat(struct lwp *l, const struct linux_sys_creat_args *uap, register_t *retval)
    151   1.11   thorpej {
    152   1.90       dsl 	/* {
    153   1.27  christos 		syscallarg(const char *) path;
    154  1.108     njoly 		syscallarg(linux_umode_t) mode;
    155   1.90       dsl 	} */
    156   1.12   mycroft 	struct sys_open_args oa;
    157    1.1      fvdl 
    158    1.1      fvdl 	SCARG(&oa, path) = SCARG(uap, path);
    159    1.1      fvdl 	SCARG(&oa, flags) = O_CREAT | O_TRUNC | O_WRONLY;
    160    1.1      fvdl 	SCARG(&oa, mode) = SCARG(uap, mode);
    161   1.12   mycroft 
    162   1.56   thorpej 	return sys_open(l, &oa, retval);
    163    1.1      fvdl }
    164    1.1      fvdl 
    165  1.106       chs static void
    166  1.106       chs linux_open_ctty(struct lwp *l, int flags, int fd)
    167  1.106       chs {
    168  1.106       chs 	struct proc *p = l->l_proc;
    169  1.106       chs 
    170  1.106       chs 	/*
    171  1.106       chs 	 * this bit from sunos_misc.c (and svr4_fcntl.c).
    172  1.106       chs 	 * If we are a session leader, and we don't have a controlling
    173  1.106       chs 	 * terminal yet, and the O_NOCTTY flag is not set, try to make
    174  1.106       chs 	 * this the controlling terminal.
    175  1.106       chs 	 */
    176  1.106       chs         if (!(flags & O_NOCTTY) && SESS_LEADER(p) && !(p->p_lflag & PL_CONTROLT)) {
    177  1.106       chs                 file_t *fp;
    178  1.106       chs 
    179  1.106       chs 		fp = fd_getfile(fd);
    180  1.106       chs 
    181  1.106       chs                 /* ignore any error, just give it a try */
    182  1.106       chs                 if (fp != NULL) {
    183  1.106       chs 			if (fp->f_type == DTYPE_VNODE) {
    184  1.106       chs 				(fp->f_ops->fo_ioctl) (fp, TIOCSCTTY, NULL);
    185  1.106       chs 			}
    186  1.106       chs 			fd_putfile(fd);
    187  1.106       chs 		}
    188  1.106       chs         }
    189  1.106       chs }
    190  1.106       chs 
    191    1.1      fvdl /*
    192    1.1      fvdl  * open(2). Take care of the different flag values, and let the
    193    1.1      fvdl  * NetBSD syscall do the real work. See if this operation
    194    1.1      fvdl  * gives the current process a controlling terminal.
    195    1.1      fvdl  * (XXX is this necessary?)
    196    1.1      fvdl  */
    197    1.1      fvdl int
    198   1.90       dsl linux_sys_open(struct lwp *l, const struct linux_sys_open_args *uap, register_t *retval)
    199   1.11   thorpej {
    200   1.90       dsl 	/* {
    201   1.27  christos 		syscallarg(const char *) path;
    202    1.1      fvdl 		syscallarg(int) flags;
    203  1.108     njoly 		syscallarg(linux_umode_t) mode;
    204   1.90       dsl 	} */
    205    1.1      fvdl 	int error, fl;
    206   1.12   mycroft 	struct sys_open_args boa;
    207    1.1      fvdl 
    208    1.2      fvdl 	fl = linux_to_bsd_ioflags(SCARG(uap, flags));
    209    1.1      fvdl 
    210    1.1      fvdl 	SCARG(&boa, path) = SCARG(uap, path);
    211    1.1      fvdl 	SCARG(&boa, flags) = fl;
    212    1.1      fvdl 	SCARG(&boa, mode) = SCARG(uap, mode);
    213    1.2      fvdl 
    214   1.56   thorpej 	if ((error = sys_open(l, &boa, retval)))
    215  1.113     njoly 		return (error == EFTYPE) ? ELOOP : error;
    216    1.1      fvdl 
    217  1.106       chs 	linux_open_ctty(l, fl, *retval);
    218  1.106       chs 	return 0;
    219  1.106       chs }
    220  1.106       chs 
    221  1.106       chs int
    222  1.106       chs linux_sys_openat(struct lwp *l, const struct linux_sys_openat_args *uap, register_t *retval)
    223  1.106       chs {
    224  1.106       chs 	/* {
    225  1.107     njoly 		syscallarg(int) fd;
    226  1.106       chs 		syscallarg(const char *) path;
    227  1.106       chs 		syscallarg(int) flags;
    228  1.108     njoly 		syscallarg(linux_umode_t) mode;
    229  1.106       chs 	} */
    230  1.106       chs 	int error, fl;
    231  1.106       chs 	struct sys_openat_args boa;
    232  1.106       chs 
    233  1.106       chs 	fl = linux_to_bsd_ioflags(SCARG(uap, flags));
    234  1.106       chs 
    235  1.106       chs 	SCARG(&boa, fd) = SCARG(uap, fd);
    236  1.106       chs 	SCARG(&boa, path) = SCARG(uap, path);
    237  1.106       chs 	SCARG(&boa, oflags) = fl;
    238  1.106       chs 	SCARG(&boa, mode) = SCARG(uap, mode);
    239   1.38   thorpej 
    240  1.106       chs 	if ((error = sys_openat(l, &boa, retval)))
    241  1.113     njoly 		return (error == EFTYPE) ? ELOOP : error;
    242    1.1      fvdl 
    243  1.106       chs 	linux_open_ctty(l, fl, *retval);
    244    1.1      fvdl 	return 0;
    245    1.1      fvdl }
    246    1.1      fvdl 
    247    1.1      fvdl /*
    248    1.1      fvdl  * Most actions in the fcntl() call are straightforward; simply
    249    1.1      fvdl  * pass control to the NetBSD system call. A few commands need
    250    1.1      fvdl  * conversions after the actual system call has done its work,
    251    1.1      fvdl  * because the flag values and lock structure are different.
    252    1.1      fvdl  */
    253    1.1      fvdl int
    254   1.90       dsl linux_sys_fcntl(struct lwp *l, const struct linux_sys_fcntl_args *uap, register_t *retval)
    255   1.11   thorpej {
    256   1.90       dsl 	/* {
    257    1.1      fvdl 		syscallarg(int) fd;
    258    1.1      fvdl 		syscallarg(int) cmd;
    259    1.1      fvdl 		syscallarg(void *) arg;
    260   1.90       dsl 	} */
    261   1.56   thorpej 	struct proc *p = l->l_proc;
    262   1.23       erh 	int fd, cmd, error;
    263   1.23       erh 	u_long val;
    264   1.83       dsl 	void *arg;
    265   1.12   mycroft 	struct sys_fcntl_args fca;
    266   1.93        ad 	file_t *fp;
    267   1.13      fvdl 	struct vnode *vp;
    268   1.13      fvdl 	struct vattr va;
    269   1.13      fvdl 	long pgid;
    270   1.13      fvdl 	struct pgrp *pgrp;
    271   1.94        ad 	struct tty *tp;
    272    1.1      fvdl 
    273    1.1      fvdl 	fd = SCARG(uap, fd);
    274    1.1      fvdl 	cmd = SCARG(uap, cmd);
    275   1.92       dsl 	arg = SCARG(uap, arg);
    276    1.1      fvdl 
    277    1.1      fvdl 	switch (cmd) {
    278   1.92       dsl 
    279    1.1      fvdl 	case LINUX_F_DUPFD:
    280    1.1      fvdl 		cmd = F_DUPFD;
    281    1.1      fvdl 		break;
    282   1.92       dsl 
    283    1.1      fvdl 	case LINUX_F_GETFD:
    284    1.1      fvdl 		cmd = F_GETFD;
    285    1.1      fvdl 		break;
    286   1.92       dsl 
    287    1.1      fvdl 	case LINUX_F_SETFD:
    288    1.1      fvdl 		cmd = F_SETFD;
    289    1.1      fvdl 		break;
    290   1.92       dsl 
    291    1.1      fvdl 	case LINUX_F_GETFL:
    292    1.1      fvdl 		SCARG(&fca, fd) = fd;
    293    1.1      fvdl 		SCARG(&fca, cmd) = F_GETFL;
    294    1.1      fvdl 		SCARG(&fca, arg) = arg;
    295   1.56   thorpej 		if ((error = sys_fcntl(l, &fca, retval)))
    296    1.1      fvdl 			return error;
    297    1.1      fvdl 		retval[0] = bsd_to_linux_ioflags(retval[0]);
    298    1.1      fvdl 		return 0;
    299   1.92       dsl 
    300   1.41  jdolecek 	case LINUX_F_SETFL: {
    301   1.93        ad 		file_t	*fp1 = NULL;
    302   1.41  jdolecek 
    303   1.23       erh 		val = linux_to_bsd_ioflags((unsigned long)SCARG(uap, arg));
    304   1.39      manu 		/*
    305   1.41  jdolecek 		 * Linux seems to have same semantics for sending SIGIO to the
    306   1.64       abs 		 * read side of socket, but slightly different semantics
    307   1.41  jdolecek 		 * for SIGIO to the write side.  Rather than sending the SIGIO
    308   1.41  jdolecek 		 * every time it's possible to write (directly) more data, it
    309   1.41  jdolecek 		 * only sends SIGIO if last write(2) failed due to insufficient
    310   1.41  jdolecek 		 * memory to hold the data. This is compatible enough
    311   1.41  jdolecek 		 * with NetBSD semantics to not do anything about the
    312   1.41  jdolecek 		 * difference.
    313   1.65     perry 		 *
    314   1.41  jdolecek 		 * Linux does NOT send SIGIO for pipes. Deal with socketpair
    315   1.41  jdolecek 		 * ones and DTYPE_PIPE ones. For these, we don't set
    316   1.41  jdolecek 		 * the underlying flags (we don't pass O_ASYNC flag down
    317   1.41  jdolecek 		 * to sys_fcntl()), but set the FASYNC flag for file descriptor,
    318   1.41  jdolecek 		 * so that F_GETFL would report the ASYNC i/o is on.
    319   1.39      manu 		 */
    320   1.41  jdolecek 		if (val & O_ASYNC) {
    321   1.93        ad 			if (((fp1 = fd_getfile(fd)) == NULL))
    322   1.39      manu 			    return (EBADF);
    323   1.69  christos 			if (((fp1->f_type == DTYPE_SOCKET) && fp1->f_data
    324   1.69  christos 			      && ((struct socket *)fp1->f_data)->so_state & SS_ISAPIPE)
    325   1.69  christos 			    || (fp1->f_type == DTYPE_PIPE))
    326   1.41  jdolecek 				val &= ~O_ASYNC;
    327   1.41  jdolecek 			else {
    328   1.41  jdolecek 				/* not a pipe, do not modify anything */
    329   1.93        ad 				fd_putfile(fd);
    330   1.69  christos 				fp1 = NULL;
    331   1.39      manu 			}
    332   1.41  jdolecek 		}
    333   1.41  jdolecek 
    334   1.41  jdolecek 		SCARG(&fca, fd) = fd;
    335   1.41  jdolecek 		SCARG(&fca, cmd) = F_SETFL;
    336   1.79  christos 		SCARG(&fca, arg) = (void *) val;
    337   1.39      manu 
    338   1.56   thorpej 		error = sys_fcntl(l, &fca, retval);
    339   1.41  jdolecek 
    340   1.41  jdolecek 		/* Now set the FASYNC flag for pipes */
    341   1.69  christos 		if (fp1) {
    342   1.93        ad 			if (!error) {
    343   1.93        ad 				mutex_enter(&fp1->f_lock);
    344   1.69  christos 				fp1->f_flag |= FASYNC;
    345   1.93        ad 				mutex_exit(&fp1->f_lock);
    346   1.93        ad 			}
    347   1.93        ad 			fd_putfile(fd);
    348   1.39      manu 		}
    349   1.41  jdolecek 
    350   1.41  jdolecek 		return (error);
    351   1.41  jdolecek 	    }
    352   1.92       dsl 
    353    1.1      fvdl 	case LINUX_F_GETLK:
    354   1.92       dsl 		do_linux_getlk(fd, cmd, arg, linux, flock);
    355   1.47  christos 
    356    1.1      fvdl 	case LINUX_F_SETLK:
    357    1.1      fvdl 	case LINUX_F_SETLKW:
    358   1.92       dsl 		do_linux_setlk(fd, cmd, arg, linux, flock, LINUX_F_SETLK);
    359   1.47  christos 
    360    1.1      fvdl 	case LINUX_F_SETOWN:
    361   1.65     perry 	case LINUX_F_GETOWN:
    362   1.13      fvdl 		/*
    363   1.49  jdolecek 		 * We need to route fcntl() for tty descriptors around normal
    364   1.49  jdolecek 		 * fcntl(), since NetBSD tty TIOC{G,S}PGRP semantics is too
    365   1.49  jdolecek 		 * restrictive for Linux F_{G,S}ETOWN. For non-tty descriptors,
    366   1.49  jdolecek 		 * this is not a problem.
    367   1.13      fvdl 		 */
    368   1.93        ad 		if ((fp = fd_getfile(fd)) == NULL)
    369   1.13      fvdl 			return EBADF;
    370   1.60  jdolecek 
    371   1.60  jdolecek 		/* Check it's a character device vnode */
    372   1.60  jdolecek 		if (fp->f_type != DTYPE_VNODE
    373   1.60  jdolecek 		    || (vp = (struct vnode *)fp->f_data) == NULL
    374   1.60  jdolecek 		    || vp->v_type != VCHR) {
    375   1.93        ad 			fd_putfile(fd);
    376   1.60  jdolecek 
    377   1.53   gehenna 	    not_tty:
    378   1.49  jdolecek 			/* Not a tty, proceed with common fcntl() */
    379   1.13      fvdl 			cmd = cmd == LINUX_F_SETOWN ? F_SETOWN : F_GETOWN;
    380   1.49  jdolecek 			break;
    381   1.49  jdolecek 		}
    382   1.47  christos 
    383  1.104   hannken 		vn_lock(vp, LK_SHARED | LK_RETRY);
    384   1.86     pooka 		error = VOP_GETATTR(vp, &va, l->l_cred);
    385  1.104   hannken 		VOP_UNLOCK(vp);
    386   1.60  jdolecek 
    387   1.93        ad 		fd_putfile(fd);
    388   1.60  jdolecek 
    389   1.60  jdolecek 		if (error)
    390   1.49  jdolecek 			return error;
    391   1.60  jdolecek 
    392   1.94        ad 		if ((tp = cdev_tty(va.va_rdev)) == NULL)
    393   1.53   gehenna 			goto not_tty;
    394   1.49  jdolecek 
    395   1.49  jdolecek 		/* set tty pg_id appropriately */
    396   1.95        ad 		mutex_enter(proc_lock);
    397   1.49  jdolecek 		if (cmd == LINUX_F_GETOWN) {
    398   1.58       dsl 			retval[0] = tp->t_pgrp ? tp->t_pgrp->pg_id : NO_PGID;
    399   1.95        ad 			mutex_exit(proc_lock);
    400   1.49  jdolecek 			return 0;
    401   1.49  jdolecek 		}
    402   1.49  jdolecek 		if ((long)arg <= 0) {
    403   1.49  jdolecek 			pgid = -(long)arg;
    404   1.49  jdolecek 		} else {
    405   1.99     rmind 			struct proc *p1 = proc_find((long)arg);
    406   1.99     rmind 			if (p1 == NULL) {
    407   1.99     rmind 				mutex_exit(proc_lock);
    408   1.49  jdolecek 				return (ESRCH);
    409   1.99     rmind 			}
    410   1.49  jdolecek 			pgid = (long)p1->p_pgrp->pg_id;
    411   1.13      fvdl 		}
    412   1.99     rmind 		pgrp = pgrp_find(pgid);
    413   1.78       dsl 		if (pgrp == NULL || pgrp->pg_session != p->p_session) {
    414   1.95        ad 			mutex_exit(proc_lock);
    415   1.49  jdolecek 			return EPERM;
    416   1.78       dsl 		}
    417   1.49  jdolecek 		tp->t_pgrp = pgrp;
    418   1.95        ad 		mutex_exit(proc_lock);
    419   1.49  jdolecek 		return 0;
    420   1.47  christos 
    421    1.1      fvdl 	default:
    422    1.1      fvdl 		return EOPNOTSUPP;
    423    1.1      fvdl 	}
    424    1.1      fvdl 
    425    1.1      fvdl 	SCARG(&fca, fd) = fd;
    426    1.1      fvdl 	SCARG(&fca, cmd) = cmd;
    427    1.1      fvdl 	SCARG(&fca, arg) = arg;
    428   1.12   mycroft 
    429   1.56   thorpej 	return sys_fcntl(l, &fca, retval);
    430    1.1      fvdl }
    431    1.1      fvdl 
    432   1.67      manu #if !defined(__amd64__)
    433    1.1      fvdl /*
    434    1.1      fvdl  * Convert a NetBSD stat structure to a Linux stat structure.
    435    1.1      fvdl  * Only the order of the fields and the padding in the structure
    436    1.9      fvdl  * is different. linux_fakedev is a machine-dependent function
    437    1.9      fvdl  * which optionally converts device driver major/minor numbers
    438    1.9      fvdl  * (XXX horrible, but what can you do against code that compares
    439    1.9      fvdl  * things against constant major device numbers? sigh)
    440    1.1      fvdl  */
    441    1.1      fvdl static void
    442   1.88       dsl bsd_to_linux_stat(struct stat *bsp, struct linux_stat *lsp)
    443    1.1      fvdl {
    444   1.12   mycroft 
    445   1.45  christos 	lsp->lst_dev     = linux_fakedev(bsp->st_dev, 0);
    446    1.1      fvdl 	lsp->lst_ino     = bsp->st_ino;
    447   1.19  christos 	lsp->lst_mode    = (linux_mode_t)bsp->st_mode;
    448   1.19  christos 	if (bsp->st_nlink >= (1 << 15))
    449   1.19  christos 		lsp->lst_nlink = (1 << 15) - 1;
    450   1.19  christos 	else
    451   1.19  christos 		lsp->lst_nlink = (linux_nlink_t)bsp->st_nlink;
    452    1.1      fvdl 	lsp->lst_uid     = bsp->st_uid;
    453    1.1      fvdl 	lsp->lst_gid     = bsp->st_gid;
    454   1.45  christos 	lsp->lst_rdev    = linux_fakedev(bsp->st_rdev, 1);
    455    1.1      fvdl 	lsp->lst_size    = bsp->st_size;
    456    1.1      fvdl 	lsp->lst_blksize = bsp->st_blksize;
    457    1.1      fvdl 	lsp->lst_blocks  = bsp->st_blocks;
    458    1.1      fvdl 	lsp->lst_atime   = bsp->st_atime;
    459    1.1      fvdl 	lsp->lst_mtime   = bsp->st_mtime;
    460    1.1      fvdl 	lsp->lst_ctime   = bsp->st_ctime;
    461   1.66  christos #ifdef LINUX_STAT_HAS_NSEC
    462   1.66  christos 	lsp->lst_atime_nsec   = bsp->st_atimensec;
    463   1.66  christos 	lsp->lst_mtime_nsec   = bsp->st_mtimensec;
    464   1.66  christos 	lsp->lst_ctime_nsec   = bsp->st_ctimensec;
    465   1.66  christos #endif
    466    1.1      fvdl }
    467    1.1      fvdl 
    468    1.1      fvdl /*
    469    1.1      fvdl  * The stat functions below are plain sailing. stat and lstat are handled
    470    1.1      fvdl  * by one function to avoid code duplication.
    471    1.1      fvdl  */
    472    1.1      fvdl int
    473   1.90       dsl linux_sys_fstat(struct lwp *l, const struct linux_sys_fstat_args *uap, register_t *retval)
    474   1.11   thorpej {
    475   1.90       dsl 	/* {
    476    1.1      fvdl 		syscallarg(int) fd;
    477    1.1      fvdl 		syscallarg(linux_stat *) sp;
    478   1.90       dsl 	} */
    479    1.1      fvdl 	struct linux_stat tmplst;
    480   1.81       dsl 	struct stat tmpst;
    481    1.1      fvdl 	int error;
    482    1.1      fvdl 
    483   1.93        ad 	error = do_sys_fstat(SCARG(uap, fd), &tmpst);
    484   1.81       dsl 	if (error != 0)
    485    1.1      fvdl 		return error;
    486    1.1      fvdl 	bsd_to_linux_stat(&tmpst, &tmplst);
    487    1.1      fvdl 
    488   1.81       dsl 	return copyout(&tmplst, SCARG(uap, sp), sizeof tmplst);
    489    1.1      fvdl }
    490    1.1      fvdl 
    491    1.1      fvdl static int
    492   1.93        ad linux_stat1(const struct linux_sys_stat_args *uap, register_t *retval, int flags)
    493    1.1      fvdl {
    494    1.1      fvdl 	struct linux_stat tmplst;
    495   1.81       dsl 	struct stat tmpst;
    496    1.1      fvdl 	int error;
    497    1.1      fvdl 
    498   1.93        ad 	error = do_sys_stat(SCARG(uap, path), flags, &tmpst);
    499   1.81       dsl 	if (error != 0)
    500    1.1      fvdl 		return error;
    501    1.1      fvdl 
    502    1.1      fvdl 	bsd_to_linux_stat(&tmpst, &tmplst);
    503    1.1      fvdl 
    504   1.81       dsl 	return copyout(&tmplst, SCARG(uap, sp), sizeof tmplst);
    505    1.1      fvdl }
    506    1.1      fvdl 
    507    1.1      fvdl int
    508   1.90       dsl linux_sys_stat(struct lwp *l, const struct linux_sys_stat_args *uap, register_t *retval)
    509   1.11   thorpej {
    510   1.90       dsl 	/* {
    511   1.27  christos 		syscallarg(const char *) path;
    512    1.1      fvdl 		syscallarg(struct linux_stat *) sp;
    513   1.90       dsl 	} */
    514   1.11   thorpej 
    515   1.93        ad 	return linux_stat1(uap, retval, FOLLOW);
    516    1.1      fvdl }
    517    1.1      fvdl 
    518   1.23       erh /* Note: this is "newlstat" in the Linux sources */
    519   1.23       erh /*	(we don't bother with the old lstat currently) */
    520    1.1      fvdl int
    521   1.90       dsl linux_sys_lstat(struct lwp *l, const struct linux_sys_lstat_args *uap, register_t *retval)
    522   1.11   thorpej {
    523   1.90       dsl 	/* {
    524   1.27  christos 		syscallarg(const char *) path;
    525    1.1      fvdl 		syscallarg(struct linux_stat *) sp;
    526   1.90       dsl 	} */
    527   1.11   thorpej 
    528   1.93        ad 	return linux_stat1((const void *)uap, retval, NOFOLLOW);
    529    1.1      fvdl }
    530   1.67      manu #endif /* !__amd64__ */
    531    1.1      fvdl 
    532    1.1      fvdl /*
    533   1.10      fvdl  * The following syscalls are mostly here because of the alternate path check.
    534    1.1      fvdl  */
    535  1.106       chs 
    536    1.1      fvdl int
    537  1.106       chs linux_sys_linkat(struct lwp *l, const struct linux_sys_linkat_args *uap, register_t *retval)
    538    1.2      fvdl {
    539   1.90       dsl 	/* {
    540  1.106       chs 		syscallarg(int) fd1;
    541  1.106       chs 		syscallarg(const char *) name1;
    542  1.106       chs 		syscallarg(int) fd2;
    543  1.106       chs 		syscallarg(const char *) name2;
    544  1.106       chs 		syscallarg(int) flags;
    545   1.90       dsl 	} */
    546  1.106       chs 	int fd1 = SCARG(uap, fd1);
    547  1.106       chs 	const char *name1 = SCARG(uap, name1);
    548  1.106       chs 	int fd2 = SCARG(uap, fd2);
    549  1.106       chs 	const char *name2 = SCARG(uap, name2);
    550  1.106       chs 	int follow;
    551  1.106       chs 
    552  1.106       chs 	follow = SCARG(uap, flags) & LINUX_AT_SYMLINK_FOLLOW;
    553  1.106       chs 
    554  1.106       chs 	return do_sys_linkat(l, fd1, name1, fd2, name2, follow, retval);
    555  1.106       chs }
    556  1.106       chs 
    557  1.106       chs static int
    558  1.106       chs linux_unlink_dircheck(const char *path)
    559  1.106       chs {
    560  1.106       chs 	struct nameidata nd;
    561  1.101  dholland 	struct pathbuf *pb;
    562  1.106       chs 	int error;
    563   1.63  jdolecek 
    564   1.63  jdolecek 	/*
    565   1.63  jdolecek 	 * Linux returns EISDIR if unlink(2) is called on a directory.
    566   1.63  jdolecek 	 * We return EPERM in such cases. To emulate correct behaviour,
    567   1.63  jdolecek 	 * check if the path points to directory and return EISDIR if this
    568   1.63  jdolecek 	 * is the case.
    569  1.101  dholland 	 *
    570  1.101  dholland 	 * XXX this should really not copy in the path buffer twice...
    571   1.63  jdolecek 	 */
    572  1.106       chs 	error = pathbuf_copyin(path, &pb);
    573  1.106       chs 	if (error) {
    574  1.106       chs 		return error;
    575  1.101  dholland 	}
    576  1.101  dholland 	NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | TRYEMULROOT, pb);
    577   1.63  jdolecek 	if (namei(&nd) == 0) {
    578   1.63  jdolecek 		struct stat sb;
    579   1.63  jdolecek 
    580   1.93        ad 		if (vn_stat(nd.ni_vp, &sb) == 0
    581   1.63  jdolecek 		    && S_ISDIR(sb.st_mode))
    582   1.63  jdolecek 			error = EISDIR;
    583   1.63  jdolecek 
    584   1.63  jdolecek 		vput(nd.ni_vp);
    585   1.63  jdolecek 	}
    586  1.101  dholland 	pathbuf_destroy(pb);
    587  1.106       chs 	return error ? error : EPERM;
    588  1.106       chs }
    589   1.63  jdolecek 
    590  1.106       chs int
    591  1.106       chs linux_sys_unlink(struct lwp *l, const struct linux_sys_unlink_args *uap, register_t *retval)
    592  1.106       chs {
    593  1.106       chs 	/* {
    594  1.106       chs 		syscallarg(const char *) path;
    595  1.106       chs 	} */
    596  1.106       chs 	int error;
    597  1.106       chs 
    598  1.106       chs 	error = sys_unlink(l, (const void *)uap, retval);
    599  1.106       chs 	if (error == EPERM)
    600  1.106       chs 		error = linux_unlink_dircheck(SCARG(uap, path));
    601  1.106       chs 
    602  1.106       chs 	return error;
    603  1.106       chs }
    604  1.106       chs 
    605  1.106       chs int
    606  1.106       chs linux_sys_unlinkat(struct lwp *l, const struct linux_sys_unlinkat_args *uap, register_t *retval)
    607  1.106       chs {
    608  1.106       chs 	/* {
    609  1.106       chs 		syscallarg(int) fd;
    610  1.106       chs 		syscallarg(const char *) path;
    611  1.106       chs 		syscallarg(int) flag;
    612  1.106       chs 	} */
    613  1.106       chs 	struct sys_unlinkat_args ua;
    614  1.106       chs 	int error;
    615  1.106       chs 
    616  1.106       chs 	SCARG(&ua, fd) = SCARG(uap, fd);
    617  1.106       chs 	SCARG(&ua, path) = SCARG(uap, path);
    618  1.106       chs 	SCARG(&ua, flag) = linux_to_bsd_atflags(SCARG(uap, flag));
    619  1.106       chs 
    620  1.106       chs 	error = sys_unlinkat(l, &ua, retval);
    621  1.106       chs 	if (error == EPERM)
    622  1.106       chs 		error = linux_unlink_dircheck(SCARG(uap, path));
    623  1.106       chs 
    624  1.106       chs 	return error;
    625    1.2      fvdl }
    626    1.2      fvdl 
    627   1.10      fvdl int
    628   1.90       dsl linux_sys_mknod(struct lwp *l, const struct linux_sys_mknod_args *uap, register_t *retval)
    629   1.11   thorpej {
    630   1.90       dsl 	/* {
    631   1.27  christos 		syscallarg(const char *) path;
    632  1.106       chs 		syscallarg(linux_umode_t) mode;
    633  1.106       chs 		syscallarg(unsigned) dev;
    634  1.106       chs 	} */
    635  1.106       chs 	struct linux_sys_mknodat_args ua;
    636  1.106       chs 
    637  1.106       chs 	SCARG(&ua, fd) = LINUX_AT_FDCWD;
    638  1.106       chs 	SCARG(&ua, path) = SCARG(uap, path);
    639  1.106       chs 	SCARG(&ua, mode) = SCARG(uap, mode);
    640  1.106       chs 	SCARG(&ua, dev) = SCARG(uap, dev);
    641  1.106       chs 
    642  1.106       chs 	return linux_sys_mknodat(l, &ua, retval);
    643  1.106       chs }
    644  1.106       chs 
    645  1.106       chs int
    646  1.106       chs linux_sys_mknodat(struct lwp *l, const struct linux_sys_mknodat_args *uap, register_t *retval)
    647  1.106       chs {
    648  1.106       chs 	/* {
    649  1.106       chs 		syscallarg(int) fd;
    650  1.106       chs 		syscallarg(const char *) path;
    651  1.106       chs 		syscallarg(linux_umode_t) mode;
    652  1.106       chs 		syscallarg(unsigned) dev;
    653   1.90       dsl 	} */
    654    1.2      fvdl 
    655   1.10      fvdl 	/*
    656   1.40       wiz 	 * BSD handles FIFOs separately
    657   1.10      fvdl 	 */
    658   1.74     pavel 	if (S_ISFIFO(SCARG(uap, mode))) {
    659  1.106       chs 		struct sys_mkfifoat_args bma;
    660   1.54  jdolecek 
    661  1.106       chs 		SCARG(&bma, fd) = SCARG(uap, fd);
    662   1.21   thorpej 		SCARG(&bma, path) = SCARG(uap, path);
    663   1.21   thorpej 		SCARG(&bma, mode) = SCARG(uap, mode);
    664  1.106       chs 		return sys_mkfifoat(l, &bma, retval);
    665   1.54  jdolecek 	} else {
    666   1.54  jdolecek 
    667   1.54  jdolecek 		/*
    668   1.54  jdolecek 		 * Linux device numbers uses 8 bits for minor and 8 bits
    669   1.54  jdolecek 		 * for major. Due to how we map our major and minor,
    670   1.82       dsl 		 * this just fits into our dev_t. Just mask off the
    671   1.54  jdolecek 		 * upper 16bit to remove any random junk.
    672   1.54  jdolecek 		 */
    673  1.106       chs 
    674  1.106       chs 		return do_sys_mknodat(l, SCARG(uap, fd), SCARG(uap, path),
    675  1.106       chs 		    SCARG(uap, mode), SCARG(uap, dev) & 0xffff, retval,
    676  1.106       chs 		    UIO_USERSPACE);
    677   1.54  jdolecek 	}
    678    1.2      fvdl }
    679    1.2      fvdl 
    680  1.106       chs int
    681  1.106       chs linux_sys_fchmodat(struct lwp *l, const struct linux_sys_fchmodat_args *uap, register_t *retval)
    682  1.106       chs {
    683  1.106       chs 	/* {
    684  1.106       chs 		syscallarg(int) fd;
    685  1.106       chs 		syscallarg(const char *) path;
    686  1.106       chs 		syscallarg(linux_umode_t) mode;
    687  1.106       chs 	} */
    688  1.106       chs 
    689  1.106       chs 	return do_sys_chmodat(l, SCARG(uap, fd), SCARG(uap, path),
    690  1.106       chs 			      SCARG(uap, mode), AT_SYMLINK_FOLLOW);
    691  1.106       chs }
    692  1.106       chs 
    693  1.106       chs int
    694  1.106       chs linux_sys_fchownat(struct lwp *l, const struct linux_sys_fchownat_args *uap, register_t *retval)
    695  1.106       chs {
    696  1.106       chs 	/* {
    697  1.106       chs 		syscallarg(int) fd;
    698  1.106       chs 		syscallarg(const char *) path;
    699  1.106       chs 		syscallarg(uid_t) owner;
    700  1.106       chs 		syscallarg(gid_t) group;
    701  1.106       chs 		syscallarg(int) flag;
    702  1.106       chs 	} */
    703  1.106       chs 	int flag;
    704  1.106       chs 
    705  1.106       chs 	flag = linux_to_bsd_atflags(SCARG(uap, flag));
    706  1.106       chs 	return do_sys_chownat(l, SCARG(uap, fd), SCARG(uap, path),
    707  1.106       chs 			      SCARG(uap, owner), SCARG(uap, group), flag);
    708  1.106       chs }
    709  1.106       chs 
    710  1.106       chs int
    711  1.106       chs linux_sys_faccessat(struct lwp *l, const struct linux_sys_faccessat_args *uap, register_t *retval)
    712  1.106       chs {
    713  1.106       chs 	/* {
    714  1.106       chs 		syscallarg(int) fd;
    715  1.106       chs 		syscallarg(const char *) path;
    716  1.106       chs 		syscallarg(int) amode;
    717  1.106       chs 	} */
    718  1.106       chs 
    719  1.106       chs 	return do_sys_accessat(l, SCARG(uap, fd), SCARG(uap, path),
    720  1.106       chs 	     SCARG(uap, amode), AT_SYMLINK_FOLLOW);
    721  1.106       chs }
    722  1.106       chs 
    723   1.15      fvdl /*
    724   1.15      fvdl  * This is just fsync() for now (just as it is in the Linux kernel)
    725   1.23       erh  * Note: this is not implemented under Linux on Alpha and Arm
    726   1.23       erh  *	but should still be defined in our syscalls.master.
    727   1.23       erh  *	(syscall #148 on the arm)
    728   1.15      fvdl  */
    729   1.15      fvdl int
    730   1.90       dsl linux_sys_fdatasync(struct lwp *l, const struct linux_sys_fdatasync_args *uap, register_t *retval)
    731   1.15      fvdl {
    732   1.90       dsl 	/* {
    733   1.15      fvdl 		syscallarg(int) fd;
    734   1.90       dsl 	} */
    735   1.90       dsl 
    736   1.90       dsl 	return sys_fsync(l, (const void *)uap, retval);
    737   1.28      tron }
    738   1.28      tron 
    739   1.28      tron /*
    740   1.28      tron  * pread(2).
    741   1.28      tron  */
    742   1.28      tron int
    743   1.90       dsl linux_sys_pread(struct lwp *l, const struct linux_sys_pread_args *uap, register_t *retval)
    744   1.28      tron {
    745   1.90       dsl 	/* {
    746   1.28      tron 		syscallarg(int) fd;
    747   1.28      tron 		syscallarg(void *) buf;
    748   1.28      tron 		syscallarg(size_t) nbyte;
    749  1.109     njoly 		syscallarg(off_t) offset;
    750   1.90       dsl 	} */
    751   1.28      tron 	struct sys_pread_args pra;
    752   1.28      tron 
    753   1.28      tron 	SCARG(&pra, fd) = SCARG(uap, fd);
    754   1.28      tron 	SCARG(&pra, buf) = SCARG(uap, buf);
    755   1.28      tron 	SCARG(&pra, nbyte) = SCARG(uap, nbyte);
    756  1.109     njoly 	SCARG(&pra, PAD) = 0;
    757   1.28      tron 	SCARG(&pra, offset) = SCARG(uap, offset);
    758   1.28      tron 
    759   1.62  jdolecek 	return sys_pread(l, &pra, retval);
    760   1.28      tron }
    761   1.28      tron 
    762   1.28      tron /*
    763   1.28      tron  * pwrite(2).
    764   1.28      tron  */
    765   1.28      tron int
    766   1.90       dsl linux_sys_pwrite(struct lwp *l, const struct linux_sys_pwrite_args *uap, register_t *retval)
    767   1.28      tron {
    768   1.90       dsl 	/* {
    769   1.28      tron 		syscallarg(int) fd;
    770   1.28      tron 		syscallarg(void *) buf;
    771   1.28      tron 		syscallarg(size_t) nbyte;
    772  1.110     njoly 		syscallarg(off_t) offset;
    773   1.90       dsl 	} */
    774   1.28      tron 	struct sys_pwrite_args pra;
    775   1.28      tron 
    776   1.28      tron 	SCARG(&pra, fd) = SCARG(uap, fd);
    777   1.28      tron 	SCARG(&pra, buf) = SCARG(uap, buf);
    778   1.28      tron 	SCARG(&pra, nbyte) = SCARG(uap, nbyte);
    779  1.109     njoly 	SCARG(&pra, PAD) = 0;
    780   1.28      tron 	SCARG(&pra, offset) = SCARG(uap, offset);
    781   1.28      tron 
    782   1.62  jdolecek 	return sys_pwrite(l, &pra, retval);
    783    1.1      fvdl }
    784   1.68      fvdl 
    785  1.103  christos int
    786  1.103  christos linux_sys_dup3(struct lwp *l, const struct linux_sys_dup3_args *uap,
    787  1.103  christos     register_t *retval)
    788  1.103  christos {
    789  1.103  christos 	/* {
    790  1.103  christos 		syscallarg(int) from;
    791  1.103  christos 		syscallarg(int) to;
    792  1.103  christos 		syscallarg(int) flags;
    793  1.103  christos 	} */
    794  1.111     njoly 	int flags;
    795  1.111     njoly 
    796  1.111     njoly 	flags = linux_to_bsd_ioflags(SCARG(uap, flags));
    797  1.111     njoly 	if ((flags & ~O_CLOEXEC) != 0)
    798  1.111     njoly 		return EINVAL;
    799  1.103  christos 
    800  1.111     njoly 	if (SCARG(uap, from) == SCARG(uap, to))
    801  1.111     njoly 		return EINVAL;
    802  1.103  christos 
    803  1.111     njoly 	return dodup(l, SCARG(uap, from), SCARG(uap, to), flags, retval);
    804  1.103  christos }
    805  1.103  christos 
    806  1.105     njoly 
    807  1.105     njoly int
    808  1.105     njoly linux_to_bsd_atflags(int lflags)
    809  1.105     njoly {
    810  1.105     njoly 	int bflags = 0;
    811  1.105     njoly 
    812  1.105     njoly 	if (lflags & LINUX_AT_SYMLINK_NOFOLLOW)
    813  1.105     njoly 		bflags |= AT_SYMLINK_NOFOLLOW;
    814  1.105     njoly 	if (lflags & LINUX_AT_REMOVEDIR)
    815  1.105     njoly 		bflags |= AT_REMOVEDIR;
    816  1.105     njoly 	if (lflags & LINUX_AT_SYMLINK_FOLLOW)
    817  1.105     njoly 		bflags |= AT_SYMLINK_FOLLOW;
    818  1.105     njoly 
    819  1.105     njoly 	return bflags;
    820  1.105     njoly }
    821  1.105     njoly 
    822  1.105     njoly 
    823   1.75  christos #define LINUX_NOT_SUPPORTED(fun) \
    824   1.75  christos int \
    825   1.90       dsl fun(struct lwp *l, const struct fun##_args *uap, register_t *retval) \
    826   1.75  christos { \
    827   1.75  christos 	return EOPNOTSUPP; \
    828   1.75  christos }
    829   1.75  christos 
    830   1.75  christos LINUX_NOT_SUPPORTED(linux_sys_setxattr)
    831   1.75  christos LINUX_NOT_SUPPORTED(linux_sys_lsetxattr)
    832   1.75  christos LINUX_NOT_SUPPORTED(linux_sys_fsetxattr)
    833   1.75  christos 
    834   1.75  christos LINUX_NOT_SUPPORTED(linux_sys_getxattr)
    835   1.75  christos LINUX_NOT_SUPPORTED(linux_sys_lgetxattr)
    836   1.75  christos LINUX_NOT_SUPPORTED(linux_sys_fgetxattr)
    837   1.75  christos 
    838   1.75  christos LINUX_NOT_SUPPORTED(linux_sys_listxattr)
    839   1.75  christos LINUX_NOT_SUPPORTED(linux_sys_llistxattr)
    840   1.75  christos LINUX_NOT_SUPPORTED(linux_sys_flistxattr)
    841   1.75  christos 
    842   1.75  christos LINUX_NOT_SUPPORTED(linux_sys_removexattr)
    843   1.75  christos LINUX_NOT_SUPPORTED(linux_sys_lremovexattr)
    844   1.75  christos LINUX_NOT_SUPPORTED(linux_sys_fremovexattr)
    845