linux_file.c revision 1.113 1 /* $NetBSD: linux_file.c,v 1.113 2014/06/25 16:38:53 njoly Exp $ */
2
3 /*-
4 * Copyright (c) 1995, 1998, 2008 The NetBSD Foundation, Inc.
5 * All rights reserved.
6 *
7 * This code is derived from software contributed to The NetBSD Foundation
8 * by Frank van der Linden and Eric Haszlakiewicz.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 * POSSIBILITY OF SUCH DAMAGE.
30 */
31
32 /*
33 * Functions in multiarch:
34 * linux_sys_llseek : linux_llseek.c
35 */
36
37 #include <sys/cdefs.h>
38 __KERNEL_RCSID(0, "$NetBSD: linux_file.c,v 1.113 2014/06/25 16:38:53 njoly Exp $");
39
40 #include <sys/param.h>
41 #include <sys/systm.h>
42 #include <sys/namei.h>
43 #include <sys/proc.h>
44 #include <sys/file.h>
45 #include <sys/fcntl.h>
46 #include <sys/stat.h>
47 #include <sys/filedesc.h>
48 #include <sys/ioctl.h>
49 #include <sys/kernel.h>
50 #include <sys/mount.h>
51 #include <sys/malloc.h>
52 #include <sys/namei.h>
53 #include <sys/vnode.h>
54 #include <sys/tty.h>
55 #include <sys/socketvar.h>
56 #include <sys/conf.h>
57 #include <sys/pipe.h>
58
59 #include <sys/syscallargs.h>
60 #include <sys/vfs_syscalls.h>
61
62 #include <compat/linux/common/linux_types.h>
63 #include <compat/linux/common/linux_signal.h>
64 #include <compat/linux/common/linux_fcntl.h>
65 #include <compat/linux/common/linux_util.h>
66 #include <compat/linux/common/linux_machdep.h>
67 #include <compat/linux/common/linux_ipc.h>
68 #include <compat/linux/common/linux_sem.h>
69
70 #include <compat/linux/linux_syscallargs.h>
71
72 static int bsd_to_linux_ioflags(int);
73 #ifndef __amd64__
74 static void bsd_to_linux_stat(struct stat *, struct linux_stat *);
75 #endif
76
77 conv_linux_flock(linux, flock)
78
79 /*
80 * Some file-related calls are handled here. The usual flag conversion
81 * an structure conversion is done, and alternate emul path searching.
82 */
83
84 /*
85 * The next two functions convert between the Linux and NetBSD values
86 * of the flags used in open(2) and fcntl(2).
87 */
88 int
89 linux_to_bsd_ioflags(int lflags)
90 {
91 int res = 0;
92
93 res |= cvtto_bsd_mask(lflags, LINUX_O_WRONLY, O_WRONLY);
94 res |= cvtto_bsd_mask(lflags, LINUX_O_RDONLY, O_RDONLY);
95 res |= cvtto_bsd_mask(lflags, LINUX_O_RDWR, O_RDWR);
96
97 res |= cvtto_bsd_mask(lflags, LINUX_O_CREAT, O_CREAT);
98 res |= cvtto_bsd_mask(lflags, LINUX_O_EXCL, O_EXCL);
99 res |= cvtto_bsd_mask(lflags, LINUX_O_NOCTTY, O_NOCTTY);
100 res |= cvtto_bsd_mask(lflags, LINUX_O_TRUNC, O_TRUNC);
101 res |= cvtto_bsd_mask(lflags, LINUX_O_APPEND, O_APPEND);
102 res |= cvtto_bsd_mask(lflags, LINUX_O_NONBLOCK, O_NONBLOCK);
103 res |= cvtto_bsd_mask(lflags, LINUX_O_NDELAY, O_NDELAY);
104 res |= cvtto_bsd_mask(lflags, LINUX_O_SYNC, O_FSYNC);
105 res |= cvtto_bsd_mask(lflags, LINUX_FASYNC, O_ASYNC);
106 res |= cvtto_bsd_mask(lflags, LINUX_O_DIRECT, O_DIRECT);
107 res |= cvtto_bsd_mask(lflags, LINUX_O_DIRECTORY, O_DIRECTORY);
108 res |= cvtto_bsd_mask(lflags, LINUX_O_NOFOLLOW, O_NOFOLLOW);
109 res |= cvtto_bsd_mask(lflags, LINUX_O_CLOEXEC, O_CLOEXEC);
110
111 return res;
112 }
113
114 static int
115 bsd_to_linux_ioflags(int bflags)
116 {
117 int res = 0;
118
119 res |= cvtto_linux_mask(bflags, O_WRONLY, LINUX_O_WRONLY);
120 res |= cvtto_linux_mask(bflags, O_RDONLY, LINUX_O_RDONLY);
121 res |= cvtto_linux_mask(bflags, O_RDWR, LINUX_O_RDWR);
122
123 res |= cvtto_linux_mask(bflags, O_CREAT, LINUX_O_CREAT);
124 res |= cvtto_linux_mask(bflags, O_EXCL, LINUX_O_EXCL);
125 res |= cvtto_linux_mask(bflags, O_NOCTTY, LINUX_O_NOCTTY);
126 res |= cvtto_linux_mask(bflags, O_TRUNC, LINUX_O_TRUNC);
127 res |= cvtto_linux_mask(bflags, O_APPEND, LINUX_O_APPEND);
128 res |= cvtto_linux_mask(bflags, O_NONBLOCK, LINUX_O_NONBLOCK);
129 res |= cvtto_linux_mask(bflags, O_NDELAY, LINUX_O_NDELAY);
130 res |= cvtto_linux_mask(bflags, O_FSYNC, LINUX_O_SYNC);
131 res |= cvtto_linux_mask(bflags, O_ASYNC, LINUX_FASYNC);
132 res |= cvtto_linux_mask(bflags, O_DIRECT, LINUX_O_DIRECT);
133 res |= cvtto_linux_mask(bflags, O_DIRECTORY, LINUX_O_DIRECTORY);
134 res |= cvtto_linux_mask(bflags, O_NOFOLLOW, LINUX_O_NOFOLLOW);
135 res |= cvtto_linux_mask(bflags, O_CLOEXEC, LINUX_O_CLOEXEC);
136
137 return res;
138 }
139
140 /*
141 * creat(2) is an obsolete function, but it's present as a Linux
142 * system call, so let's deal with it.
143 *
144 * Note: On the Alpha this doesn't really exist in Linux, but it's defined
145 * in syscalls.master anyway so this doesn't have to be special cased.
146 *
147 * Just call open(2) with the TRUNC, CREAT and WRONLY flags.
148 */
149 int
150 linux_sys_creat(struct lwp *l, const struct linux_sys_creat_args *uap, register_t *retval)
151 {
152 /* {
153 syscallarg(const char *) path;
154 syscallarg(linux_umode_t) mode;
155 } */
156 struct sys_open_args oa;
157
158 SCARG(&oa, path) = SCARG(uap, path);
159 SCARG(&oa, flags) = O_CREAT | O_TRUNC | O_WRONLY;
160 SCARG(&oa, mode) = SCARG(uap, mode);
161
162 return sys_open(l, &oa, retval);
163 }
164
165 static void
166 linux_open_ctty(struct lwp *l, int flags, int fd)
167 {
168 struct proc *p = l->l_proc;
169
170 /*
171 * this bit from sunos_misc.c (and svr4_fcntl.c).
172 * If we are a session leader, and we don't have a controlling
173 * terminal yet, and the O_NOCTTY flag is not set, try to make
174 * this the controlling terminal.
175 */
176 if (!(flags & O_NOCTTY) && SESS_LEADER(p) && !(p->p_lflag & PL_CONTROLT)) {
177 file_t *fp;
178
179 fp = fd_getfile(fd);
180
181 /* ignore any error, just give it a try */
182 if (fp != NULL) {
183 if (fp->f_type == DTYPE_VNODE) {
184 (fp->f_ops->fo_ioctl) (fp, TIOCSCTTY, NULL);
185 }
186 fd_putfile(fd);
187 }
188 }
189 }
190
191 /*
192 * open(2). Take care of the different flag values, and let the
193 * NetBSD syscall do the real work. See if this operation
194 * gives the current process a controlling terminal.
195 * (XXX is this necessary?)
196 */
197 int
198 linux_sys_open(struct lwp *l, const struct linux_sys_open_args *uap, register_t *retval)
199 {
200 /* {
201 syscallarg(const char *) path;
202 syscallarg(int) flags;
203 syscallarg(linux_umode_t) mode;
204 } */
205 int error, fl;
206 struct sys_open_args boa;
207
208 fl = linux_to_bsd_ioflags(SCARG(uap, flags));
209
210 SCARG(&boa, path) = SCARG(uap, path);
211 SCARG(&boa, flags) = fl;
212 SCARG(&boa, mode) = SCARG(uap, mode);
213
214 if ((error = sys_open(l, &boa, retval)))
215 return (error == EFTYPE) ? ELOOP : error;
216
217 linux_open_ctty(l, fl, *retval);
218 return 0;
219 }
220
221 int
222 linux_sys_openat(struct lwp *l, const struct linux_sys_openat_args *uap, register_t *retval)
223 {
224 /* {
225 syscallarg(int) fd;
226 syscallarg(const char *) path;
227 syscallarg(int) flags;
228 syscallarg(linux_umode_t) mode;
229 } */
230 int error, fl;
231 struct sys_openat_args boa;
232
233 fl = linux_to_bsd_ioflags(SCARG(uap, flags));
234
235 SCARG(&boa, fd) = SCARG(uap, fd);
236 SCARG(&boa, path) = SCARG(uap, path);
237 SCARG(&boa, oflags) = fl;
238 SCARG(&boa, mode) = SCARG(uap, mode);
239
240 if ((error = sys_openat(l, &boa, retval)))
241 return (error == EFTYPE) ? ELOOP : error;
242
243 linux_open_ctty(l, fl, *retval);
244 return 0;
245 }
246
247 /*
248 * Most actions in the fcntl() call are straightforward; simply
249 * pass control to the NetBSD system call. A few commands need
250 * conversions after the actual system call has done its work,
251 * because the flag values and lock structure are different.
252 */
253 int
254 linux_sys_fcntl(struct lwp *l, const struct linux_sys_fcntl_args *uap, register_t *retval)
255 {
256 /* {
257 syscallarg(int) fd;
258 syscallarg(int) cmd;
259 syscallarg(void *) arg;
260 } */
261 struct proc *p = l->l_proc;
262 int fd, cmd, error;
263 u_long val;
264 void *arg;
265 struct sys_fcntl_args fca;
266 file_t *fp;
267 struct vnode *vp;
268 struct vattr va;
269 long pgid;
270 struct pgrp *pgrp;
271 struct tty *tp;
272
273 fd = SCARG(uap, fd);
274 cmd = SCARG(uap, cmd);
275 arg = SCARG(uap, arg);
276
277 switch (cmd) {
278
279 case LINUX_F_DUPFD:
280 cmd = F_DUPFD;
281 break;
282
283 case LINUX_F_GETFD:
284 cmd = F_GETFD;
285 break;
286
287 case LINUX_F_SETFD:
288 cmd = F_SETFD;
289 break;
290
291 case LINUX_F_GETFL:
292 SCARG(&fca, fd) = fd;
293 SCARG(&fca, cmd) = F_GETFL;
294 SCARG(&fca, arg) = arg;
295 if ((error = sys_fcntl(l, &fca, retval)))
296 return error;
297 retval[0] = bsd_to_linux_ioflags(retval[0]);
298 return 0;
299
300 case LINUX_F_SETFL: {
301 file_t *fp1 = NULL;
302
303 val = linux_to_bsd_ioflags((unsigned long)SCARG(uap, arg));
304 /*
305 * Linux seems to have same semantics for sending SIGIO to the
306 * read side of socket, but slightly different semantics
307 * for SIGIO to the write side. Rather than sending the SIGIO
308 * every time it's possible to write (directly) more data, it
309 * only sends SIGIO if last write(2) failed due to insufficient
310 * memory to hold the data. This is compatible enough
311 * with NetBSD semantics to not do anything about the
312 * difference.
313 *
314 * Linux does NOT send SIGIO for pipes. Deal with socketpair
315 * ones and DTYPE_PIPE ones. For these, we don't set
316 * the underlying flags (we don't pass O_ASYNC flag down
317 * to sys_fcntl()), but set the FASYNC flag for file descriptor,
318 * so that F_GETFL would report the ASYNC i/o is on.
319 */
320 if (val & O_ASYNC) {
321 if (((fp1 = fd_getfile(fd)) == NULL))
322 return (EBADF);
323 if (((fp1->f_type == DTYPE_SOCKET) && fp1->f_data
324 && ((struct socket *)fp1->f_data)->so_state & SS_ISAPIPE)
325 || (fp1->f_type == DTYPE_PIPE))
326 val &= ~O_ASYNC;
327 else {
328 /* not a pipe, do not modify anything */
329 fd_putfile(fd);
330 fp1 = NULL;
331 }
332 }
333
334 SCARG(&fca, fd) = fd;
335 SCARG(&fca, cmd) = F_SETFL;
336 SCARG(&fca, arg) = (void *) val;
337
338 error = sys_fcntl(l, &fca, retval);
339
340 /* Now set the FASYNC flag for pipes */
341 if (fp1) {
342 if (!error) {
343 mutex_enter(&fp1->f_lock);
344 fp1->f_flag |= FASYNC;
345 mutex_exit(&fp1->f_lock);
346 }
347 fd_putfile(fd);
348 }
349
350 return (error);
351 }
352
353 case LINUX_F_GETLK:
354 do_linux_getlk(fd, cmd, arg, linux, flock);
355
356 case LINUX_F_SETLK:
357 case LINUX_F_SETLKW:
358 do_linux_setlk(fd, cmd, arg, linux, flock, LINUX_F_SETLK);
359
360 case LINUX_F_SETOWN:
361 case LINUX_F_GETOWN:
362 /*
363 * We need to route fcntl() for tty descriptors around normal
364 * fcntl(), since NetBSD tty TIOC{G,S}PGRP semantics is too
365 * restrictive for Linux F_{G,S}ETOWN. For non-tty descriptors,
366 * this is not a problem.
367 */
368 if ((fp = fd_getfile(fd)) == NULL)
369 return EBADF;
370
371 /* Check it's a character device vnode */
372 if (fp->f_type != DTYPE_VNODE
373 || (vp = (struct vnode *)fp->f_data) == NULL
374 || vp->v_type != VCHR) {
375 fd_putfile(fd);
376
377 not_tty:
378 /* Not a tty, proceed with common fcntl() */
379 cmd = cmd == LINUX_F_SETOWN ? F_SETOWN : F_GETOWN;
380 break;
381 }
382
383 vn_lock(vp, LK_SHARED | LK_RETRY);
384 error = VOP_GETATTR(vp, &va, l->l_cred);
385 VOP_UNLOCK(vp);
386
387 fd_putfile(fd);
388
389 if (error)
390 return error;
391
392 if ((tp = cdev_tty(va.va_rdev)) == NULL)
393 goto not_tty;
394
395 /* set tty pg_id appropriately */
396 mutex_enter(proc_lock);
397 if (cmd == LINUX_F_GETOWN) {
398 retval[0] = tp->t_pgrp ? tp->t_pgrp->pg_id : NO_PGID;
399 mutex_exit(proc_lock);
400 return 0;
401 }
402 if ((long)arg <= 0) {
403 pgid = -(long)arg;
404 } else {
405 struct proc *p1 = proc_find((long)arg);
406 if (p1 == NULL) {
407 mutex_exit(proc_lock);
408 return (ESRCH);
409 }
410 pgid = (long)p1->p_pgrp->pg_id;
411 }
412 pgrp = pgrp_find(pgid);
413 if (pgrp == NULL || pgrp->pg_session != p->p_session) {
414 mutex_exit(proc_lock);
415 return EPERM;
416 }
417 tp->t_pgrp = pgrp;
418 mutex_exit(proc_lock);
419 return 0;
420
421 default:
422 return EOPNOTSUPP;
423 }
424
425 SCARG(&fca, fd) = fd;
426 SCARG(&fca, cmd) = cmd;
427 SCARG(&fca, arg) = arg;
428
429 return sys_fcntl(l, &fca, retval);
430 }
431
432 #if !defined(__amd64__)
433 /*
434 * Convert a NetBSD stat structure to a Linux stat structure.
435 * Only the order of the fields and the padding in the structure
436 * is different. linux_fakedev is a machine-dependent function
437 * which optionally converts device driver major/minor numbers
438 * (XXX horrible, but what can you do against code that compares
439 * things against constant major device numbers? sigh)
440 */
441 static void
442 bsd_to_linux_stat(struct stat *bsp, struct linux_stat *lsp)
443 {
444
445 lsp->lst_dev = linux_fakedev(bsp->st_dev, 0);
446 lsp->lst_ino = bsp->st_ino;
447 lsp->lst_mode = (linux_mode_t)bsp->st_mode;
448 if (bsp->st_nlink >= (1 << 15))
449 lsp->lst_nlink = (1 << 15) - 1;
450 else
451 lsp->lst_nlink = (linux_nlink_t)bsp->st_nlink;
452 lsp->lst_uid = bsp->st_uid;
453 lsp->lst_gid = bsp->st_gid;
454 lsp->lst_rdev = linux_fakedev(bsp->st_rdev, 1);
455 lsp->lst_size = bsp->st_size;
456 lsp->lst_blksize = bsp->st_blksize;
457 lsp->lst_blocks = bsp->st_blocks;
458 lsp->lst_atime = bsp->st_atime;
459 lsp->lst_mtime = bsp->st_mtime;
460 lsp->lst_ctime = bsp->st_ctime;
461 #ifdef LINUX_STAT_HAS_NSEC
462 lsp->lst_atime_nsec = bsp->st_atimensec;
463 lsp->lst_mtime_nsec = bsp->st_mtimensec;
464 lsp->lst_ctime_nsec = bsp->st_ctimensec;
465 #endif
466 }
467
468 /*
469 * The stat functions below are plain sailing. stat and lstat are handled
470 * by one function to avoid code duplication.
471 */
472 int
473 linux_sys_fstat(struct lwp *l, const struct linux_sys_fstat_args *uap, register_t *retval)
474 {
475 /* {
476 syscallarg(int) fd;
477 syscallarg(linux_stat *) sp;
478 } */
479 struct linux_stat tmplst;
480 struct stat tmpst;
481 int error;
482
483 error = do_sys_fstat(SCARG(uap, fd), &tmpst);
484 if (error != 0)
485 return error;
486 bsd_to_linux_stat(&tmpst, &tmplst);
487
488 return copyout(&tmplst, SCARG(uap, sp), sizeof tmplst);
489 }
490
491 static int
492 linux_stat1(const struct linux_sys_stat_args *uap, register_t *retval, int flags)
493 {
494 struct linux_stat tmplst;
495 struct stat tmpst;
496 int error;
497
498 error = do_sys_stat(SCARG(uap, path), flags, &tmpst);
499 if (error != 0)
500 return error;
501
502 bsd_to_linux_stat(&tmpst, &tmplst);
503
504 return copyout(&tmplst, SCARG(uap, sp), sizeof tmplst);
505 }
506
507 int
508 linux_sys_stat(struct lwp *l, const struct linux_sys_stat_args *uap, register_t *retval)
509 {
510 /* {
511 syscallarg(const char *) path;
512 syscallarg(struct linux_stat *) sp;
513 } */
514
515 return linux_stat1(uap, retval, FOLLOW);
516 }
517
518 /* Note: this is "newlstat" in the Linux sources */
519 /* (we don't bother with the old lstat currently) */
520 int
521 linux_sys_lstat(struct lwp *l, const struct linux_sys_lstat_args *uap, register_t *retval)
522 {
523 /* {
524 syscallarg(const char *) path;
525 syscallarg(struct linux_stat *) sp;
526 } */
527
528 return linux_stat1((const void *)uap, retval, NOFOLLOW);
529 }
530 #endif /* !__amd64__ */
531
532 /*
533 * The following syscalls are mostly here because of the alternate path check.
534 */
535
536 int
537 linux_sys_linkat(struct lwp *l, const struct linux_sys_linkat_args *uap, register_t *retval)
538 {
539 /* {
540 syscallarg(int) fd1;
541 syscallarg(const char *) name1;
542 syscallarg(int) fd2;
543 syscallarg(const char *) name2;
544 syscallarg(int) flags;
545 } */
546 int fd1 = SCARG(uap, fd1);
547 const char *name1 = SCARG(uap, name1);
548 int fd2 = SCARG(uap, fd2);
549 const char *name2 = SCARG(uap, name2);
550 int follow;
551
552 follow = SCARG(uap, flags) & LINUX_AT_SYMLINK_FOLLOW;
553
554 return do_sys_linkat(l, fd1, name1, fd2, name2, follow, retval);
555 }
556
557 static int
558 linux_unlink_dircheck(const char *path)
559 {
560 struct nameidata nd;
561 struct pathbuf *pb;
562 int error;
563
564 /*
565 * Linux returns EISDIR if unlink(2) is called on a directory.
566 * We return EPERM in such cases. To emulate correct behaviour,
567 * check if the path points to directory and return EISDIR if this
568 * is the case.
569 *
570 * XXX this should really not copy in the path buffer twice...
571 */
572 error = pathbuf_copyin(path, &pb);
573 if (error) {
574 return error;
575 }
576 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | TRYEMULROOT, pb);
577 if (namei(&nd) == 0) {
578 struct stat sb;
579
580 if (vn_stat(nd.ni_vp, &sb) == 0
581 && S_ISDIR(sb.st_mode))
582 error = EISDIR;
583
584 vput(nd.ni_vp);
585 }
586 pathbuf_destroy(pb);
587 return error ? error : EPERM;
588 }
589
590 int
591 linux_sys_unlink(struct lwp *l, const struct linux_sys_unlink_args *uap, register_t *retval)
592 {
593 /* {
594 syscallarg(const char *) path;
595 } */
596 int error;
597
598 error = sys_unlink(l, (const void *)uap, retval);
599 if (error == EPERM)
600 error = linux_unlink_dircheck(SCARG(uap, path));
601
602 return error;
603 }
604
605 int
606 linux_sys_unlinkat(struct lwp *l, const struct linux_sys_unlinkat_args *uap, register_t *retval)
607 {
608 /* {
609 syscallarg(int) fd;
610 syscallarg(const char *) path;
611 syscallarg(int) flag;
612 } */
613 struct sys_unlinkat_args ua;
614 int error;
615
616 SCARG(&ua, fd) = SCARG(uap, fd);
617 SCARG(&ua, path) = SCARG(uap, path);
618 SCARG(&ua, flag) = linux_to_bsd_atflags(SCARG(uap, flag));
619
620 error = sys_unlinkat(l, &ua, retval);
621 if (error == EPERM)
622 error = linux_unlink_dircheck(SCARG(uap, path));
623
624 return error;
625 }
626
627 int
628 linux_sys_mknod(struct lwp *l, const struct linux_sys_mknod_args *uap, register_t *retval)
629 {
630 /* {
631 syscallarg(const char *) path;
632 syscallarg(linux_umode_t) mode;
633 syscallarg(unsigned) dev;
634 } */
635 struct linux_sys_mknodat_args ua;
636
637 SCARG(&ua, fd) = LINUX_AT_FDCWD;
638 SCARG(&ua, path) = SCARG(uap, path);
639 SCARG(&ua, mode) = SCARG(uap, mode);
640 SCARG(&ua, dev) = SCARG(uap, dev);
641
642 return linux_sys_mknodat(l, &ua, retval);
643 }
644
645 int
646 linux_sys_mknodat(struct lwp *l, const struct linux_sys_mknodat_args *uap, register_t *retval)
647 {
648 /* {
649 syscallarg(int) fd;
650 syscallarg(const char *) path;
651 syscallarg(linux_umode_t) mode;
652 syscallarg(unsigned) dev;
653 } */
654
655 /*
656 * BSD handles FIFOs separately
657 */
658 if (S_ISFIFO(SCARG(uap, mode))) {
659 struct sys_mkfifoat_args bma;
660
661 SCARG(&bma, fd) = SCARG(uap, fd);
662 SCARG(&bma, path) = SCARG(uap, path);
663 SCARG(&bma, mode) = SCARG(uap, mode);
664 return sys_mkfifoat(l, &bma, retval);
665 } else {
666
667 /*
668 * Linux device numbers uses 8 bits for minor and 8 bits
669 * for major. Due to how we map our major and minor,
670 * this just fits into our dev_t. Just mask off the
671 * upper 16bit to remove any random junk.
672 */
673
674 return do_sys_mknodat(l, SCARG(uap, fd), SCARG(uap, path),
675 SCARG(uap, mode), SCARG(uap, dev) & 0xffff, retval,
676 UIO_USERSPACE);
677 }
678 }
679
680 int
681 linux_sys_fchmodat(struct lwp *l, const struct linux_sys_fchmodat_args *uap, register_t *retval)
682 {
683 /* {
684 syscallarg(int) fd;
685 syscallarg(const char *) path;
686 syscallarg(linux_umode_t) mode;
687 } */
688
689 return do_sys_chmodat(l, SCARG(uap, fd), SCARG(uap, path),
690 SCARG(uap, mode), AT_SYMLINK_FOLLOW);
691 }
692
693 int
694 linux_sys_fchownat(struct lwp *l, const struct linux_sys_fchownat_args *uap, register_t *retval)
695 {
696 /* {
697 syscallarg(int) fd;
698 syscallarg(const char *) path;
699 syscallarg(uid_t) owner;
700 syscallarg(gid_t) group;
701 syscallarg(int) flag;
702 } */
703 int flag;
704
705 flag = linux_to_bsd_atflags(SCARG(uap, flag));
706 return do_sys_chownat(l, SCARG(uap, fd), SCARG(uap, path),
707 SCARG(uap, owner), SCARG(uap, group), flag);
708 }
709
710 int
711 linux_sys_faccessat(struct lwp *l, const struct linux_sys_faccessat_args *uap, register_t *retval)
712 {
713 /* {
714 syscallarg(int) fd;
715 syscallarg(const char *) path;
716 syscallarg(int) amode;
717 } */
718
719 return do_sys_accessat(l, SCARG(uap, fd), SCARG(uap, path),
720 SCARG(uap, amode), AT_SYMLINK_FOLLOW);
721 }
722
723 /*
724 * This is just fsync() for now (just as it is in the Linux kernel)
725 * Note: this is not implemented under Linux on Alpha and Arm
726 * but should still be defined in our syscalls.master.
727 * (syscall #148 on the arm)
728 */
729 int
730 linux_sys_fdatasync(struct lwp *l, const struct linux_sys_fdatasync_args *uap, register_t *retval)
731 {
732 /* {
733 syscallarg(int) fd;
734 } */
735
736 return sys_fsync(l, (const void *)uap, retval);
737 }
738
739 /*
740 * pread(2).
741 */
742 int
743 linux_sys_pread(struct lwp *l, const struct linux_sys_pread_args *uap, register_t *retval)
744 {
745 /* {
746 syscallarg(int) fd;
747 syscallarg(void *) buf;
748 syscallarg(size_t) nbyte;
749 syscallarg(off_t) offset;
750 } */
751 struct sys_pread_args pra;
752
753 SCARG(&pra, fd) = SCARG(uap, fd);
754 SCARG(&pra, buf) = SCARG(uap, buf);
755 SCARG(&pra, nbyte) = SCARG(uap, nbyte);
756 SCARG(&pra, PAD) = 0;
757 SCARG(&pra, offset) = SCARG(uap, offset);
758
759 return sys_pread(l, &pra, retval);
760 }
761
762 /*
763 * pwrite(2).
764 */
765 int
766 linux_sys_pwrite(struct lwp *l, const struct linux_sys_pwrite_args *uap, register_t *retval)
767 {
768 /* {
769 syscallarg(int) fd;
770 syscallarg(void *) buf;
771 syscallarg(size_t) nbyte;
772 syscallarg(off_t) offset;
773 } */
774 struct sys_pwrite_args pra;
775
776 SCARG(&pra, fd) = SCARG(uap, fd);
777 SCARG(&pra, buf) = SCARG(uap, buf);
778 SCARG(&pra, nbyte) = SCARG(uap, nbyte);
779 SCARG(&pra, PAD) = 0;
780 SCARG(&pra, offset) = SCARG(uap, offset);
781
782 return sys_pwrite(l, &pra, retval);
783 }
784
785 int
786 linux_sys_dup3(struct lwp *l, const struct linux_sys_dup3_args *uap,
787 register_t *retval)
788 {
789 /* {
790 syscallarg(int) from;
791 syscallarg(int) to;
792 syscallarg(int) flags;
793 } */
794 int flags;
795
796 flags = linux_to_bsd_ioflags(SCARG(uap, flags));
797 if ((flags & ~O_CLOEXEC) != 0)
798 return EINVAL;
799
800 if (SCARG(uap, from) == SCARG(uap, to))
801 return EINVAL;
802
803 return dodup(l, SCARG(uap, from), SCARG(uap, to), flags, retval);
804 }
805
806
807 int
808 linux_to_bsd_atflags(int lflags)
809 {
810 int bflags = 0;
811
812 if (lflags & LINUX_AT_SYMLINK_NOFOLLOW)
813 bflags |= AT_SYMLINK_NOFOLLOW;
814 if (lflags & LINUX_AT_REMOVEDIR)
815 bflags |= AT_REMOVEDIR;
816 if (lflags & LINUX_AT_SYMLINK_FOLLOW)
817 bflags |= AT_SYMLINK_FOLLOW;
818
819 return bflags;
820 }
821
822
823 #define LINUX_NOT_SUPPORTED(fun) \
824 int \
825 fun(struct lwp *l, const struct fun##_args *uap, register_t *retval) \
826 { \
827 return EOPNOTSUPP; \
828 }
829
830 LINUX_NOT_SUPPORTED(linux_sys_setxattr)
831 LINUX_NOT_SUPPORTED(linux_sys_lsetxattr)
832 LINUX_NOT_SUPPORTED(linux_sys_fsetxattr)
833
834 LINUX_NOT_SUPPORTED(linux_sys_getxattr)
835 LINUX_NOT_SUPPORTED(linux_sys_lgetxattr)
836 LINUX_NOT_SUPPORTED(linux_sys_fgetxattr)
837
838 LINUX_NOT_SUPPORTED(linux_sys_listxattr)
839 LINUX_NOT_SUPPORTED(linux_sys_llistxattr)
840 LINUX_NOT_SUPPORTED(linux_sys_flistxattr)
841
842 LINUX_NOT_SUPPORTED(linux_sys_removexattr)
843 LINUX_NOT_SUPPORTED(linux_sys_lremovexattr)
844 LINUX_NOT_SUPPORTED(linux_sys_fremovexattr)
845