linux_file.c revision 1.116.2.1 1 /* $NetBSD: linux_file.c,v 1.116.2.1 2022/08/03 11:11:32 martin Exp $ */
2
3 /*-
4 * Copyright (c) 1995, 1998, 2008 The NetBSD Foundation, Inc.
5 * All rights reserved.
6 *
7 * This code is derived from software contributed to The NetBSD Foundation
8 * by Frank van der Linden and Eric Haszlakiewicz.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 * POSSIBILITY OF SUCH DAMAGE.
30 */
31
32 /*
33 * Functions in multiarch:
34 * linux_sys_llseek : linux_llseek.c
35 */
36
37 #include <sys/cdefs.h>
38 __KERNEL_RCSID(0, "$NetBSD: linux_file.c,v 1.116.2.1 2022/08/03 11:11:32 martin Exp $");
39
40 #include <sys/param.h>
41 #include <sys/systm.h>
42 #include <sys/namei.h>
43 #include <sys/proc.h>
44 #include <sys/file.h>
45 #include <sys/fcntl.h>
46 #include <sys/stat.h>
47 #include <sys/filedesc.h>
48 #include <sys/ioctl.h>
49 #include <sys/kernel.h>
50 #include <sys/mount.h>
51 #include <sys/namei.h>
52 #include <sys/vnode.h>
53 #include <sys/tty.h>
54 #include <sys/socketvar.h>
55 #include <sys/conf.h>
56 #include <sys/pipe.h>
57
58 #include <sys/syscallargs.h>
59 #include <sys/vfs_syscalls.h>
60
61 #include <compat/linux/common/linux_types.h>
62 #include <compat/linux/common/linux_signal.h>
63 #include <compat/linux/common/linux_fcntl.h>
64 #include <compat/linux/common/linux_util.h>
65 #include <compat/linux/common/linux_machdep.h>
66 #include <compat/linux/common/linux_ipc.h>
67 #include <compat/linux/common/linux_sem.h>
68
69 #include <compat/linux/linux_syscallargs.h>
70
71 static int bsd_to_linux_ioflags(int);
72 #ifndef __amd64__
73 static void bsd_to_linux_stat(struct stat *, struct linux_stat *);
74 #endif
75
76 conv_linux_flock(linux, flock)
77
78 /*
79 * Some file-related calls are handled here. The usual flag conversion
80 * an structure conversion is done, and alternate emul path searching.
81 */
82
83 /*
84 * The next two functions convert between the Linux and NetBSD values
85 * of the flags used in open(2) and fcntl(2).
86 */
87 int
88 linux_to_bsd_ioflags(int lflags)
89 {
90 int res = 0;
91
92 res |= cvtto_bsd_mask(lflags, LINUX_O_WRONLY, O_WRONLY);
93 res |= cvtto_bsd_mask(lflags, LINUX_O_RDONLY, O_RDONLY);
94 res |= cvtto_bsd_mask(lflags, LINUX_O_RDWR, O_RDWR);
95
96 res |= cvtto_bsd_mask(lflags, LINUX_O_CREAT, O_CREAT);
97 res |= cvtto_bsd_mask(lflags, LINUX_O_EXCL, O_EXCL);
98 res |= cvtto_bsd_mask(lflags, LINUX_O_NOCTTY, O_NOCTTY);
99 res |= cvtto_bsd_mask(lflags, LINUX_O_TRUNC, O_TRUNC);
100 res |= cvtto_bsd_mask(lflags, LINUX_O_APPEND, O_APPEND);
101 res |= cvtto_bsd_mask(lflags, LINUX_O_NONBLOCK, O_NONBLOCK);
102 res |= cvtto_bsd_mask(lflags, LINUX_O_NDELAY, O_NDELAY);
103 res |= cvtto_bsd_mask(lflags, LINUX_O_SYNC, O_FSYNC);
104 res |= cvtto_bsd_mask(lflags, LINUX_FASYNC, O_ASYNC);
105 res |= cvtto_bsd_mask(lflags, LINUX_O_DIRECT, O_DIRECT);
106 res |= cvtto_bsd_mask(lflags, LINUX_O_DIRECTORY, O_DIRECTORY);
107 res |= cvtto_bsd_mask(lflags, LINUX_O_NOFOLLOW, O_NOFOLLOW);
108 res |= cvtto_bsd_mask(lflags, LINUX_O_CLOEXEC, O_CLOEXEC);
109
110 return res;
111 }
112
113 static int
114 bsd_to_linux_ioflags(int bflags)
115 {
116 int res = 0;
117
118 res |= cvtto_linux_mask(bflags, O_WRONLY, LINUX_O_WRONLY);
119 res |= cvtto_linux_mask(bflags, O_RDONLY, LINUX_O_RDONLY);
120 res |= cvtto_linux_mask(bflags, O_RDWR, LINUX_O_RDWR);
121
122 res |= cvtto_linux_mask(bflags, O_CREAT, LINUX_O_CREAT);
123 res |= cvtto_linux_mask(bflags, O_EXCL, LINUX_O_EXCL);
124 res |= cvtto_linux_mask(bflags, O_NOCTTY, LINUX_O_NOCTTY);
125 res |= cvtto_linux_mask(bflags, O_TRUNC, LINUX_O_TRUNC);
126 res |= cvtto_linux_mask(bflags, O_APPEND, LINUX_O_APPEND);
127 res |= cvtto_linux_mask(bflags, O_NONBLOCK, LINUX_O_NONBLOCK);
128 res |= cvtto_linux_mask(bflags, O_NDELAY, LINUX_O_NDELAY);
129 res |= cvtto_linux_mask(bflags, O_FSYNC, LINUX_O_SYNC);
130 res |= cvtto_linux_mask(bflags, O_ASYNC, LINUX_FASYNC);
131 res |= cvtto_linux_mask(bflags, O_DIRECT, LINUX_O_DIRECT);
132 res |= cvtto_linux_mask(bflags, O_DIRECTORY, LINUX_O_DIRECTORY);
133 res |= cvtto_linux_mask(bflags, O_NOFOLLOW, LINUX_O_NOFOLLOW);
134 res |= cvtto_linux_mask(bflags, O_CLOEXEC, LINUX_O_CLOEXEC);
135
136 return res;
137 }
138
139 /*
140 * creat(2) is an obsolete function, but it's present as a Linux
141 * system call, so let's deal with it.
142 *
143 * Note: On the Alpha this doesn't really exist in Linux, but it's defined
144 * in syscalls.master anyway so this doesn't have to be special cased.
145 *
146 * Just call open(2) with the TRUNC, CREAT and WRONLY flags.
147 */
148 int
149 linux_sys_creat(struct lwp *l, const struct linux_sys_creat_args *uap, register_t *retval)
150 {
151 /* {
152 syscallarg(const char *) path;
153 syscallarg(linux_umode_t) mode;
154 } */
155 struct sys_open_args oa;
156
157 SCARG(&oa, path) = SCARG(uap, path);
158 SCARG(&oa, flags) = O_CREAT | O_TRUNC | O_WRONLY;
159 SCARG(&oa, mode) = SCARG(uap, mode);
160
161 return sys_open(l, &oa, retval);
162 }
163
164 static void
165 linux_open_ctty(struct lwp *l, int flags, int fd)
166 {
167 struct proc *p = l->l_proc;
168
169 /*
170 * this bit from sunos_misc.c (and svr4_fcntl.c).
171 * If we are a session leader, and we don't have a controlling
172 * terminal yet, and the O_NOCTTY flag is not set, try to make
173 * this the controlling terminal.
174 */
175 if (!(flags & O_NOCTTY) && SESS_LEADER(p) && !(p->p_lflag & PL_CONTROLT)) {
176 file_t *fp;
177
178 fp = fd_getfile(fd);
179
180 /* ignore any error, just give it a try */
181 if (fp != NULL) {
182 if (fp->f_type == DTYPE_VNODE) {
183 (fp->f_ops->fo_ioctl) (fp, TIOCSCTTY, NULL);
184 }
185 fd_putfile(fd);
186 }
187 }
188 }
189
190 /*
191 * open(2). Take care of the different flag values, and let the
192 * NetBSD syscall do the real work. See if this operation
193 * gives the current process a controlling terminal.
194 * (XXX is this necessary?)
195 */
196 int
197 linux_sys_open(struct lwp *l, const struct linux_sys_open_args *uap, register_t *retval)
198 {
199 /* {
200 syscallarg(const char *) path;
201 syscallarg(int) flags;
202 syscallarg(linux_umode_t) mode;
203 } */
204 int error, fl;
205 struct sys_open_args boa;
206
207 fl = linux_to_bsd_ioflags(SCARG(uap, flags));
208
209 SCARG(&boa, path) = SCARG(uap, path);
210 SCARG(&boa, flags) = fl;
211 SCARG(&boa, mode) = SCARG(uap, mode);
212
213 if ((error = sys_open(l, &boa, retval)))
214 return (error == EFTYPE) ? ELOOP : error;
215
216 linux_open_ctty(l, fl, *retval);
217 return 0;
218 }
219
220 int
221 linux_sys_openat(struct lwp *l, const struct linux_sys_openat_args *uap, register_t *retval)
222 {
223 /* {
224 syscallarg(int) fd;
225 syscallarg(const char *) path;
226 syscallarg(int) flags;
227 syscallarg(linux_umode_t) mode;
228 } */
229 int error, fl;
230 struct sys_openat_args boa;
231
232 fl = linux_to_bsd_ioflags(SCARG(uap, flags));
233
234 SCARG(&boa, fd) = SCARG(uap, fd);
235 SCARG(&boa, path) = SCARG(uap, path);
236 SCARG(&boa, oflags) = fl;
237 SCARG(&boa, mode) = SCARG(uap, mode);
238
239 if ((error = sys_openat(l, &boa, retval)))
240 return (error == EFTYPE) ? ELOOP : error;
241
242 linux_open_ctty(l, fl, *retval);
243 return 0;
244 }
245
246 /*
247 * Most actions in the fcntl() call are straightforward; simply
248 * pass control to the NetBSD system call. A few commands need
249 * conversions after the actual system call has done its work,
250 * because the flag values and lock structure are different.
251 */
252 int
253 linux_sys_fcntl(struct lwp *l, const struct linux_sys_fcntl_args *uap, register_t *retval)
254 {
255 /* {
256 syscallarg(int) fd;
257 syscallarg(int) cmd;
258 syscallarg(void *) arg;
259 } */
260 struct proc *p = l->l_proc;
261 int fd, cmd, error;
262 u_long val;
263 void *arg;
264 struct sys_fcntl_args fca;
265 file_t *fp;
266 struct vnode *vp;
267 struct vattr va;
268 long pgid;
269 struct pgrp *pgrp;
270 struct tty *tp;
271
272 fd = SCARG(uap, fd);
273 cmd = SCARG(uap, cmd);
274 arg = SCARG(uap, arg);
275
276 switch (cmd) {
277
278 case LINUX_F_DUPFD:
279 cmd = F_DUPFD;
280 break;
281
282 case LINUX_F_GETFD:
283 cmd = F_GETFD;
284 break;
285
286 case LINUX_F_SETFD:
287 cmd = F_SETFD;
288 break;
289
290 case LINUX_F_GETFL:
291 SCARG(&fca, fd) = fd;
292 SCARG(&fca, cmd) = F_GETFL;
293 SCARG(&fca, arg) = arg;
294 if ((error = sys_fcntl(l, &fca, retval)))
295 return error;
296 retval[0] = bsd_to_linux_ioflags(retval[0]);
297 return 0;
298
299 case LINUX_F_SETFL: {
300 file_t *fp1 = NULL;
301
302 val = linux_to_bsd_ioflags((unsigned long)SCARG(uap, arg));
303 /*
304 * Linux seems to have same semantics for sending SIGIO to the
305 * read side of socket, but slightly different semantics
306 * for SIGIO to the write side. Rather than sending the SIGIO
307 * every time it's possible to write (directly) more data, it
308 * only sends SIGIO if last write(2) failed due to insufficient
309 * memory to hold the data. This is compatible enough
310 * with NetBSD semantics to not do anything about the
311 * difference.
312 *
313 * Linux does NOT send SIGIO for pipes. Deal with socketpair
314 * ones and DTYPE_PIPE ones. For these, we don't set
315 * the underlying flags (we don't pass O_ASYNC flag down
316 * to sys_fcntl()), but set the FASYNC flag for file descriptor,
317 * so that F_GETFL would report the ASYNC i/o is on.
318 */
319 if (val & O_ASYNC) {
320 if (((fp1 = fd_getfile(fd)) == NULL))
321 return (EBADF);
322 if (((fp1->f_type == DTYPE_SOCKET) && fp1->f_data
323 && ((struct socket *)fp1->f_data)->so_state & SS_ISAPIPE)
324 || (fp1->f_type == DTYPE_PIPE))
325 val &= ~O_ASYNC;
326 else {
327 /* not a pipe, do not modify anything */
328 fd_putfile(fd);
329 fp1 = NULL;
330 }
331 }
332
333 SCARG(&fca, fd) = fd;
334 SCARG(&fca, cmd) = F_SETFL;
335 SCARG(&fca, arg) = (void *) val;
336
337 error = sys_fcntl(l, &fca, retval);
338
339 /* Now set the FASYNC flag for pipes */
340 if (fp1) {
341 if (!error) {
342 mutex_enter(&fp1->f_lock);
343 fp1->f_flag |= FASYNC;
344 mutex_exit(&fp1->f_lock);
345 }
346 fd_putfile(fd);
347 }
348
349 return (error);
350 }
351
352 case LINUX_F_GETLK:
353 do_linux_getlk(fd, cmd, arg, linux, flock);
354
355 case LINUX_F_SETLK:
356 case LINUX_F_SETLKW:
357 do_linux_setlk(fd, cmd, arg, linux, flock, LINUX_F_SETLK);
358
359 case LINUX_F_SETOWN:
360 case LINUX_F_GETOWN:
361 /*
362 * We need to route fcntl() for tty descriptors around normal
363 * fcntl(), since NetBSD tty TIOC{G,S}PGRP semantics is too
364 * restrictive for Linux F_{G,S}ETOWN. For non-tty descriptors,
365 * this is not a problem.
366 */
367 if ((fp = fd_getfile(fd)) == NULL)
368 return EBADF;
369
370 /* Check it's a character device vnode */
371 if (fp->f_type != DTYPE_VNODE
372 || (vp = (struct vnode *)fp->f_data) == NULL
373 || vp->v_type != VCHR) {
374 fd_putfile(fd);
375
376 not_tty:
377 /* Not a tty, proceed with common fcntl() */
378 cmd = cmd == LINUX_F_SETOWN ? F_SETOWN : F_GETOWN;
379 break;
380 }
381
382 vn_lock(vp, LK_SHARED | LK_RETRY);
383 error = VOP_GETATTR(vp, &va, l->l_cred);
384 VOP_UNLOCK(vp);
385
386 fd_putfile(fd);
387
388 if (error)
389 return error;
390
391 if ((tp = cdev_tty(va.va_rdev)) == NULL)
392 goto not_tty;
393
394 /* set tty pg_id appropriately */
395 mutex_enter(proc_lock);
396 if (cmd == LINUX_F_GETOWN) {
397 retval[0] = tp->t_pgrp ? tp->t_pgrp->pg_id : NO_PGID;
398 mutex_exit(proc_lock);
399 return 0;
400 }
401 if ((long)arg <= 0) {
402 pgid = -(long)arg;
403 } else {
404 struct proc *p1 = proc_find((long)arg);
405 if (p1 == NULL) {
406 mutex_exit(proc_lock);
407 return (ESRCH);
408 }
409 pgid = (long)p1->p_pgrp->pg_id;
410 }
411 pgrp = pgrp_find(pgid);
412 if (pgrp == NULL || pgrp->pg_session != p->p_session) {
413 mutex_exit(proc_lock);
414 return EPERM;
415 }
416 tp->t_pgrp = pgrp;
417 mutex_exit(proc_lock);
418 return 0;
419
420 case LINUX_F_DUPFD_CLOEXEC:
421 cmd = F_DUPFD_CLOEXEC;
422 break;
423
424 default:
425 return EOPNOTSUPP;
426 }
427
428 SCARG(&fca, fd) = fd;
429 SCARG(&fca, cmd) = cmd;
430 SCARG(&fca, arg) = arg;
431
432 return sys_fcntl(l, &fca, retval);
433 }
434
435 #if !defined(__amd64__)
436 /*
437 * Convert a NetBSD stat structure to a Linux stat structure.
438 * Only the order of the fields and the padding in the structure
439 * is different. linux_fakedev is a machine-dependent function
440 * which optionally converts device driver major/minor numbers
441 * (XXX horrible, but what can you do against code that compares
442 * things against constant major device numbers? sigh)
443 */
444 static void
445 bsd_to_linux_stat(struct stat *bsp, struct linux_stat *lsp)
446 {
447
448 memset(lsp, 0, sizeof(*lsp));
449 lsp->lst_dev = linux_fakedev(bsp->st_dev, 0);
450 lsp->lst_ino = bsp->st_ino;
451 lsp->lst_mode = (linux_mode_t)bsp->st_mode;
452 if (bsp->st_nlink >= (1 << 15))
453 lsp->lst_nlink = (1 << 15) - 1;
454 else
455 lsp->lst_nlink = (linux_nlink_t)bsp->st_nlink;
456 lsp->lst_uid = bsp->st_uid;
457 lsp->lst_gid = bsp->st_gid;
458 lsp->lst_rdev = linux_fakedev(bsp->st_rdev, 1);
459 lsp->lst_size = bsp->st_size;
460 lsp->lst_blksize = bsp->st_blksize;
461 lsp->lst_blocks = bsp->st_blocks;
462 lsp->lst_atime = bsp->st_atime;
463 lsp->lst_mtime = bsp->st_mtime;
464 lsp->lst_ctime = bsp->st_ctime;
465 #ifdef LINUX_STAT_HAS_NSEC
466 lsp->lst_atime_nsec = bsp->st_atimensec;
467 lsp->lst_mtime_nsec = bsp->st_mtimensec;
468 lsp->lst_ctime_nsec = bsp->st_ctimensec;
469 #endif
470 }
471
472 /*
473 * The stat functions below are plain sailing. stat and lstat are handled
474 * by one function to avoid code duplication.
475 */
476 int
477 linux_sys_fstat(struct lwp *l, const struct linux_sys_fstat_args *uap, register_t *retval)
478 {
479 /* {
480 syscallarg(int) fd;
481 syscallarg(linux_stat *) sp;
482 } */
483 struct linux_stat tmplst;
484 struct stat tmpst;
485 int error;
486
487 error = do_sys_fstat(SCARG(uap, fd), &tmpst);
488 if (error != 0)
489 return error;
490 bsd_to_linux_stat(&tmpst, &tmplst);
491
492 return copyout(&tmplst, SCARG(uap, sp), sizeof tmplst);
493 }
494
495 static int
496 linux_stat1(const struct linux_sys_stat_args *uap, register_t *retval, int flags)
497 {
498 struct linux_stat tmplst;
499 struct stat tmpst;
500 int error;
501
502 error = do_sys_stat(SCARG(uap, path), flags, &tmpst);
503 if (error != 0)
504 return error;
505
506 bsd_to_linux_stat(&tmpst, &tmplst);
507
508 return copyout(&tmplst, SCARG(uap, sp), sizeof tmplst);
509 }
510
511 int
512 linux_sys_stat(struct lwp *l, const struct linux_sys_stat_args *uap, register_t *retval)
513 {
514 /* {
515 syscallarg(const char *) path;
516 syscallarg(struct linux_stat *) sp;
517 } */
518
519 return linux_stat1(uap, retval, FOLLOW);
520 }
521
522 /* Note: this is "newlstat" in the Linux sources */
523 /* (we don't bother with the old lstat currently) */
524 int
525 linux_sys_lstat(struct lwp *l, const struct linux_sys_lstat_args *uap, register_t *retval)
526 {
527 /* {
528 syscallarg(const char *) path;
529 syscallarg(struct linux_stat *) sp;
530 } */
531
532 return linux_stat1((const void *)uap, retval, NOFOLLOW);
533 }
534 #endif /* !__amd64__ */
535
536 /*
537 * The following syscalls are mostly here because of the alternate path check.
538 */
539
540 int
541 linux_sys_linkat(struct lwp *l, const struct linux_sys_linkat_args *uap, register_t *retval)
542 {
543 /* {
544 syscallarg(int) fd1;
545 syscallarg(const char *) name1;
546 syscallarg(int) fd2;
547 syscallarg(const char *) name2;
548 syscallarg(int) flags;
549 } */
550 int fd1 = SCARG(uap, fd1);
551 const char *name1 = SCARG(uap, name1);
552 int fd2 = SCARG(uap, fd2);
553 const char *name2 = SCARG(uap, name2);
554 int follow;
555
556 follow = SCARG(uap, flags) & LINUX_AT_SYMLINK_FOLLOW;
557
558 return do_sys_linkat(l, fd1, name1, fd2, name2, follow, retval);
559 }
560
561 static int
562 linux_unlink_dircheck(const char *path)
563 {
564 struct nameidata nd;
565 struct pathbuf *pb;
566 int error;
567
568 /*
569 * Linux returns EISDIR if unlink(2) is called on a directory.
570 * We return EPERM in such cases. To emulate correct behaviour,
571 * check if the path points to directory and return EISDIR if this
572 * is the case.
573 *
574 * XXX this should really not copy in the path buffer twice...
575 */
576 error = pathbuf_copyin(path, &pb);
577 if (error) {
578 return error;
579 }
580 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | TRYEMULROOT, pb);
581 if (namei(&nd) == 0) {
582 struct stat sb;
583
584 if (vn_stat(nd.ni_vp, &sb) == 0
585 && S_ISDIR(sb.st_mode))
586 error = EISDIR;
587
588 vput(nd.ni_vp);
589 }
590 pathbuf_destroy(pb);
591 return error ? error : EPERM;
592 }
593
594 int
595 linux_sys_unlink(struct lwp *l, const struct linux_sys_unlink_args *uap, register_t *retval)
596 {
597 /* {
598 syscallarg(const char *) path;
599 } */
600 int error;
601
602 error = sys_unlink(l, (const void *)uap, retval);
603 if (error == EPERM)
604 error = linux_unlink_dircheck(SCARG(uap, path));
605
606 return error;
607 }
608
609 int
610 linux_sys_unlinkat(struct lwp *l, const struct linux_sys_unlinkat_args *uap, register_t *retval)
611 {
612 /* {
613 syscallarg(int) fd;
614 syscallarg(const char *) path;
615 syscallarg(int) flag;
616 } */
617 struct sys_unlinkat_args ua;
618 int error;
619
620 SCARG(&ua, fd) = SCARG(uap, fd);
621 SCARG(&ua, path) = SCARG(uap, path);
622 SCARG(&ua, flag) = linux_to_bsd_atflags(SCARG(uap, flag));
623
624 error = sys_unlinkat(l, &ua, retval);
625 if (error == EPERM)
626 error = linux_unlink_dircheck(SCARG(uap, path));
627
628 return error;
629 }
630
631 int
632 linux_sys_mknod(struct lwp *l, const struct linux_sys_mknod_args *uap, register_t *retval)
633 {
634 /* {
635 syscallarg(const char *) path;
636 syscallarg(linux_umode_t) mode;
637 syscallarg(unsigned) dev;
638 } */
639 struct linux_sys_mknodat_args ua;
640
641 SCARG(&ua, fd) = LINUX_AT_FDCWD;
642 SCARG(&ua, path) = SCARG(uap, path);
643 SCARG(&ua, mode) = SCARG(uap, mode);
644 SCARG(&ua, dev) = SCARG(uap, dev);
645
646 return linux_sys_mknodat(l, &ua, retval);
647 }
648
649 int
650 linux_sys_mknodat(struct lwp *l, const struct linux_sys_mknodat_args *uap, register_t *retval)
651 {
652 /* {
653 syscallarg(int) fd;
654 syscallarg(const char *) path;
655 syscallarg(linux_umode_t) mode;
656 syscallarg(unsigned) dev;
657 } */
658
659 /*
660 * BSD handles FIFOs separately
661 */
662 if (S_ISFIFO(SCARG(uap, mode))) {
663 struct sys_mkfifoat_args bma;
664
665 SCARG(&bma, fd) = SCARG(uap, fd);
666 SCARG(&bma, path) = SCARG(uap, path);
667 SCARG(&bma, mode) = SCARG(uap, mode);
668 return sys_mkfifoat(l, &bma, retval);
669 } else {
670
671 /*
672 * Linux device numbers uses 8 bits for minor and 8 bits
673 * for major. Due to how we map our major and minor,
674 * this just fits into our dev_t. Just mask off the
675 * upper 16bit to remove any random junk.
676 */
677
678 return do_sys_mknodat(l, SCARG(uap, fd), SCARG(uap, path),
679 SCARG(uap, mode), SCARG(uap, dev) & 0xffff, UIO_USERSPACE);
680 }
681 }
682
683 int
684 linux_sys_fchmodat(struct lwp *l, const struct linux_sys_fchmodat_args *uap, register_t *retval)
685 {
686 /* {
687 syscallarg(int) fd;
688 syscallarg(const char *) path;
689 syscallarg(linux_umode_t) mode;
690 } */
691
692 return do_sys_chmodat(l, SCARG(uap, fd), SCARG(uap, path),
693 SCARG(uap, mode), AT_SYMLINK_FOLLOW);
694 }
695
696 int
697 linux_sys_fchownat(struct lwp *l, const struct linux_sys_fchownat_args *uap, register_t *retval)
698 {
699 /* {
700 syscallarg(int) fd;
701 syscallarg(const char *) path;
702 syscallarg(uid_t) owner;
703 syscallarg(gid_t) group;
704 syscallarg(int) flag;
705 } */
706 int flag;
707
708 flag = linux_to_bsd_atflags(SCARG(uap, flag));
709 return do_sys_chownat(l, SCARG(uap, fd), SCARG(uap, path),
710 SCARG(uap, owner), SCARG(uap, group), flag);
711 }
712
713 int
714 linux_sys_faccessat(struct lwp *l, const struct linux_sys_faccessat_args *uap, register_t *retval)
715 {
716 /* {
717 syscallarg(int) fd;
718 syscallarg(const char *) path;
719 syscallarg(int) amode;
720 } */
721
722 return do_sys_accessat(l, SCARG(uap, fd), SCARG(uap, path),
723 SCARG(uap, amode), AT_SYMLINK_FOLLOW);
724 }
725
726 /*
727 * This is just fsync() for now (just as it is in the Linux kernel)
728 * Note: this is not implemented under Linux on Alpha and Arm
729 * but should still be defined in our syscalls.master.
730 * (syscall #148 on the arm)
731 */
732 int
733 linux_sys_fdatasync(struct lwp *l, const struct linux_sys_fdatasync_args *uap, register_t *retval)
734 {
735 /* {
736 syscallarg(int) fd;
737 } */
738
739 return sys_fsync(l, (const void *)uap, retval);
740 }
741
742 /*
743 * pread(2).
744 */
745 int
746 linux_sys_pread(struct lwp *l, const struct linux_sys_pread_args *uap, register_t *retval)
747 {
748 /* {
749 syscallarg(int) fd;
750 syscallarg(void *) buf;
751 syscallarg(size_t) nbyte;
752 syscallarg(off_t) offset;
753 } */
754 struct sys_pread_args pra;
755
756 SCARG(&pra, fd) = SCARG(uap, fd);
757 SCARG(&pra, buf) = SCARG(uap, buf);
758 SCARG(&pra, nbyte) = SCARG(uap, nbyte);
759 SCARG(&pra, PAD) = 0;
760 SCARG(&pra, offset) = SCARG(uap, offset);
761
762 return sys_pread(l, &pra, retval);
763 }
764
765 /*
766 * pwrite(2).
767 */
768 int
769 linux_sys_pwrite(struct lwp *l, const struct linux_sys_pwrite_args *uap, register_t *retval)
770 {
771 /* {
772 syscallarg(int) fd;
773 syscallarg(void *) buf;
774 syscallarg(size_t) nbyte;
775 syscallarg(off_t) offset;
776 } */
777 struct sys_pwrite_args pra;
778
779 SCARG(&pra, fd) = SCARG(uap, fd);
780 SCARG(&pra, buf) = SCARG(uap, buf);
781 SCARG(&pra, nbyte) = SCARG(uap, nbyte);
782 SCARG(&pra, PAD) = 0;
783 SCARG(&pra, offset) = SCARG(uap, offset);
784
785 return sys_pwrite(l, &pra, retval);
786 }
787
788 int
789 linux_sys_dup3(struct lwp *l, const struct linux_sys_dup3_args *uap,
790 register_t *retval)
791 {
792 /* {
793 syscallarg(int) from;
794 syscallarg(int) to;
795 syscallarg(int) flags;
796 } */
797 int flags;
798
799 flags = linux_to_bsd_ioflags(SCARG(uap, flags));
800 if ((flags & ~O_CLOEXEC) != 0)
801 return EINVAL;
802
803 if (SCARG(uap, from) == SCARG(uap, to))
804 return EINVAL;
805
806 return dodup(l, SCARG(uap, from), SCARG(uap, to), flags, retval);
807 }
808
809
810 int
811 linux_to_bsd_atflags(int lflags)
812 {
813 int bflags = 0;
814
815 if (lflags & LINUX_AT_SYMLINK_NOFOLLOW)
816 bflags |= AT_SYMLINK_NOFOLLOW;
817 if (lflags & LINUX_AT_REMOVEDIR)
818 bflags |= AT_REMOVEDIR;
819 if (lflags & LINUX_AT_SYMLINK_FOLLOW)
820 bflags |= AT_SYMLINK_FOLLOW;
821
822 return bflags;
823 }
824
825
826 #define LINUX_NOT_SUPPORTED(fun) \
827 int \
828 fun(struct lwp *l, const struct fun##_args *uap, register_t *retval) \
829 { \
830 return EOPNOTSUPP; \
831 }
832
833 LINUX_NOT_SUPPORTED(linux_sys_setxattr)
834 LINUX_NOT_SUPPORTED(linux_sys_lsetxattr)
835 LINUX_NOT_SUPPORTED(linux_sys_fsetxattr)
836
837 LINUX_NOT_SUPPORTED(linux_sys_getxattr)
838 LINUX_NOT_SUPPORTED(linux_sys_lgetxattr)
839 LINUX_NOT_SUPPORTED(linux_sys_fgetxattr)
840
841 LINUX_NOT_SUPPORTED(linux_sys_listxattr)
842 LINUX_NOT_SUPPORTED(linux_sys_llistxattr)
843 LINUX_NOT_SUPPORTED(linux_sys_flistxattr)
844
845 LINUX_NOT_SUPPORTED(linux_sys_removexattr)
846 LINUX_NOT_SUPPORTED(linux_sys_lremovexattr)
847 LINUX_NOT_SUPPORTED(linux_sys_fremovexattr)
848