linux_file.c revision 1.131 1 /* $NetBSD: linux_file.c,v 1.131 2024/10/01 17:15:59 riastradh Exp $ */
2
3 /*-
4 * Copyright (c) 1995, 1998, 2008 The NetBSD Foundation, Inc.
5 * All rights reserved.
6 *
7 * This code is derived from software contributed to The NetBSD Foundation
8 * by Frank van der Linden and Eric Haszlakiewicz.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 * POSSIBILITY OF SUCH DAMAGE.
30 */
31
32 /*
33 * Functions in multiarch:
34 * linux_sys_llseek : linux_llseek.c
35 */
36
37 #include <sys/cdefs.h>
38 __KERNEL_RCSID(0, "$NetBSD: linux_file.c,v 1.131 2024/10/01 17:15:59 riastradh Exp $");
39
40 #include <sys/types.h>
41 #include <sys/param.h>
42 #include <sys/systm.h>
43 #include <sys/namei.h>
44 #include <sys/proc.h>
45 #include <sys/file.h>
46 #include <sys/fcntl.h>
47 #include <sys/stat.h>
48 #include <sys/vfs_syscalls.h>
49 #include <sys/filedesc.h>
50 #include <sys/ioctl.h>
51 #include <sys/kernel.h>
52 #include <sys/mount.h>
53 #include <sys/namei.h>
54 #include <sys/vnode.h>
55 #include <sys/tty.h>
56 #include <sys/socketvar.h>
57 #include <sys/conf.h>
58 #include <sys/pipe.h>
59 #include <sys/fstrans.h>
60 #include <sys/syscallargs.h>
61 #include <sys/vfs_syscalls.h>
62
63 #include <compat/linux/common/linux_types.h>
64 #include <compat/linux/common/linux_signal.h>
65 #include <compat/linux/common/linux_fcntl.h>
66 #include <compat/linux/common/linux_util.h>
67 #include <compat/linux/common/linux_machdep.h>
68 #include <compat/linux/common/linux_ipc.h>
69 #include <compat/linux/common/linux_sem.h>
70
71 #include <compat/linux/linux_syscallargs.h>
72
73 #ifdef DEBUG_LINUX
74 #define DPRINTF(a, ...) uprintf(a, __VA_ARGS__)
75 #else
76 #define DPRINTF(a, ...)
77 #endif
78
79 #define LINUX_COPY_FILE_RANGE_MAX_CHUNK 8192
80
81 static int bsd_to_linux_ioflags(int);
82 #if !defined(__aarch64__) && !defined(__amd64__)
83 static void bsd_to_linux_stat(struct stat *, struct linux_stat *);
84 #endif
85
86 conv_linux_flock(linux, flock)
87
88 /*
89 * Some file-related calls are handled here. The usual flag conversion
90 * an structure conversion is done, and alternate emul path searching.
91 */
92
93 /*
94 * The next two functions convert between the Linux and NetBSD values
95 * of the flags used in open(2) and fcntl(2).
96 */
97 int
98 linux_to_bsd_ioflags(int lflags)
99 {
100 int res = 0;
101
102 res |= cvtto_bsd_mask(lflags, LINUX_O_WRONLY, O_WRONLY);
103 res |= cvtto_bsd_mask(lflags, LINUX_O_RDONLY, O_RDONLY);
104 res |= cvtto_bsd_mask(lflags, LINUX_O_RDWR, O_RDWR);
105
106 res |= cvtto_bsd_mask(lflags, LINUX_O_CREAT, O_CREAT);
107 res |= cvtto_bsd_mask(lflags, LINUX_O_EXCL, O_EXCL);
108 res |= cvtto_bsd_mask(lflags, LINUX_O_NOCTTY, O_NOCTTY);
109 res |= cvtto_bsd_mask(lflags, LINUX_O_TRUNC, O_TRUNC);
110 res |= cvtto_bsd_mask(lflags, LINUX_O_APPEND, O_APPEND);
111 res |= cvtto_bsd_mask(lflags, LINUX_O_NONBLOCK, O_NONBLOCK);
112 res |= cvtto_bsd_mask(lflags, LINUX_O_NDELAY, O_NDELAY);
113 res |= cvtto_bsd_mask(lflags, LINUX_O_SYNC, O_FSYNC);
114 res |= cvtto_bsd_mask(lflags, LINUX_FASYNC, O_ASYNC);
115 res |= cvtto_bsd_mask(lflags, LINUX_O_DIRECT, O_DIRECT);
116 res |= cvtto_bsd_mask(lflags, LINUX_O_DIRECTORY, O_DIRECTORY);
117 res |= cvtto_bsd_mask(lflags, LINUX_O_NOFOLLOW, O_NOFOLLOW);
118 res |= cvtto_bsd_mask(lflags, LINUX_O_CLOEXEC, O_CLOEXEC);
119
120 return res;
121 }
122
123 static int
124 bsd_to_linux_ioflags(int bflags)
125 {
126 int res = 0;
127
128 res |= cvtto_linux_mask(bflags, O_WRONLY, LINUX_O_WRONLY);
129 res |= cvtto_linux_mask(bflags, O_RDONLY, LINUX_O_RDONLY);
130 res |= cvtto_linux_mask(bflags, O_RDWR, LINUX_O_RDWR);
131
132 res |= cvtto_linux_mask(bflags, O_CREAT, LINUX_O_CREAT);
133 res |= cvtto_linux_mask(bflags, O_EXCL, LINUX_O_EXCL);
134 res |= cvtto_linux_mask(bflags, O_NOCTTY, LINUX_O_NOCTTY);
135 res |= cvtto_linux_mask(bflags, O_TRUNC, LINUX_O_TRUNC);
136 res |= cvtto_linux_mask(bflags, O_APPEND, LINUX_O_APPEND);
137 res |= cvtto_linux_mask(bflags, O_NONBLOCK, LINUX_O_NONBLOCK);
138 res |= cvtto_linux_mask(bflags, O_NDELAY, LINUX_O_NDELAY);
139 res |= cvtto_linux_mask(bflags, O_FSYNC, LINUX_O_SYNC);
140 res |= cvtto_linux_mask(bflags, O_ASYNC, LINUX_FASYNC);
141 res |= cvtto_linux_mask(bflags, O_DIRECT, LINUX_O_DIRECT);
142 res |= cvtto_linux_mask(bflags, O_DIRECTORY, LINUX_O_DIRECTORY);
143 res |= cvtto_linux_mask(bflags, O_NOFOLLOW, LINUX_O_NOFOLLOW);
144 res |= cvtto_linux_mask(bflags, O_CLOEXEC, LINUX_O_CLOEXEC);
145
146 return res;
147 }
148
149 static inline off_t
150 linux_hilo_to_off_t(unsigned long hi, unsigned long lo)
151 {
152 #ifdef _LP64
153 /*
154 * Linux discards the "hi" portion on LP64 platforms; even though
155 * glibc puts of the upper 32-bits of the offset into the "hi"
156 * argument regardless, the "lo" argument has all the bits in
157 * this case.
158 */
159 (void) hi;
160 return (off_t)lo;
161 #else
162 return (((off_t)hi) << 32) | lo;
163 #endif /* _LP64 */
164 }
165
166 #if !defined(__aarch64__)
167 /*
168 * creat(2) is an obsolete function, but it's present as a Linux
169 * system call, so let's deal with it.
170 *
171 * Note: On the Alpha this doesn't really exist in Linux, but it's defined
172 * in syscalls.master anyway so this doesn't have to be special cased.
173 *
174 * Just call open(2) with the TRUNC, CREAT and WRONLY flags.
175 */
176 int
177 linux_sys_creat(struct lwp *l, const struct linux_sys_creat_args *uap,
178 register_t *retval)
179 {
180 /* {
181 syscallarg(const char *) path;
182 syscallarg(linux_umode_t) mode;
183 } */
184 struct sys_open_args oa;
185
186 SCARG(&oa, path) = SCARG(uap, path);
187 SCARG(&oa, flags) = O_CREAT | O_TRUNC | O_WRONLY;
188 SCARG(&oa, mode) = SCARG(uap, mode);
189
190 return sys_open(l, &oa, retval);
191 }
192 #endif
193
194 static void
195 linux_open_ctty(struct lwp *l, int flags, int fd)
196 {
197 struct proc *p = l->l_proc;
198
199 /*
200 * this bit from sunos_misc.c (and svr4_fcntl.c).
201 * If we are a session leader, and we don't have a controlling
202 * terminal yet, and the O_NOCTTY flag is not set, try to make
203 * this the controlling terminal.
204 */
205 if (!(flags & O_NOCTTY) && SESS_LEADER(p) && !(p->p_lflag & PL_CONTROLT)) {
206 file_t *fp;
207
208 fp = fd_getfile(fd);
209
210 /* ignore any error, just give it a try */
211 if (fp != NULL) {
212 if (fp->f_type == DTYPE_VNODE) {
213 (fp->f_ops->fo_ioctl) (fp, TIOCSCTTY, NULL);
214 }
215 fd_putfile(fd);
216 }
217 }
218 }
219
220 /*
221 * open(2). Take care of the different flag values, and let the
222 * NetBSD syscall do the real work. See if this operation
223 * gives the current process a controlling terminal.
224 * (XXX is this necessary?)
225 */
226 int
227 linux_sys_open(struct lwp *l, const struct linux_sys_open_args *uap,
228 register_t *retval)
229 {
230 /* {
231 syscallarg(const char *) path;
232 syscallarg(int) flags;
233 syscallarg(linux_umode_t) mode;
234 } */
235 int error, fl;
236 struct sys_open_args boa;
237
238 fl = linux_to_bsd_ioflags(SCARG(uap, flags));
239
240 SCARG(&boa, path) = SCARG(uap, path);
241 SCARG(&boa, flags) = fl;
242 SCARG(&boa, mode) = SCARG(uap, mode);
243
244 if ((error = sys_open(l, &boa, retval)))
245 return (error == EFTYPE) ? ELOOP : error;
246
247 linux_open_ctty(l, fl, *retval);
248 return 0;
249 }
250
251 int
252 linux_sys_openat(struct lwp *l, const struct linux_sys_openat_args *uap,
253 register_t *retval)
254 {
255 /* {
256 syscallarg(int) fd;
257 syscallarg(const char *) path;
258 syscallarg(int) flags;
259 syscallarg(linux_umode_t) mode;
260 } */
261 int error, fl;
262 struct sys_openat_args boa;
263
264 fl = linux_to_bsd_ioflags(SCARG(uap, flags));
265
266 SCARG(&boa, fd) = SCARG(uap, fd);
267 SCARG(&boa, path) = SCARG(uap, path);
268 SCARG(&boa, oflags) = fl;
269 SCARG(&boa, mode) = SCARG(uap, mode);
270
271 if ((error = sys_openat(l, &boa, retval)))
272 return (error == EFTYPE) ? ELOOP : error;
273
274 linux_open_ctty(l, fl, *retval);
275 return 0;
276 }
277
278 /*
279 * Most actions in the fcntl() call are straightforward; simply
280 * pass control to the NetBSD system call. A few commands need
281 * conversions after the actual system call has done its work,
282 * because the flag values and lock structure are different.
283 */
284 int
285 linux_sys_fcntl(struct lwp *l, const struct linux_sys_fcntl_args *uap,
286 register_t *retval)
287 {
288 /* {
289 syscallarg(int) fd;
290 syscallarg(int) cmd;
291 syscallarg(void *) arg;
292 } */
293 struct proc *p = l->l_proc;
294 int fd, cmd, error;
295 u_long val;
296 void *arg;
297 struct sys_fcntl_args fca;
298 file_t *fp;
299 struct vnode *vp;
300 struct vattr va;
301 long pgid;
302 struct pgrp *pgrp;
303 struct tty *tp;
304
305 fd = SCARG(uap, fd);
306 cmd = SCARG(uap, cmd);
307 arg = SCARG(uap, arg);
308
309 switch (cmd) {
310
311 case LINUX_F_DUPFD:
312 cmd = F_DUPFD;
313 break;
314
315 case LINUX_F_GETFD:
316 cmd = F_GETFD;
317 break;
318
319 case LINUX_F_SETFD:
320 cmd = F_SETFD;
321 break;
322
323 case LINUX_F_GETFL:
324 SCARG(&fca, fd) = fd;
325 SCARG(&fca, cmd) = F_GETFL;
326 SCARG(&fca, arg) = arg;
327 if ((error = sys_fcntl(l, &fca, retval)))
328 return error;
329 retval[0] = bsd_to_linux_ioflags(retval[0]);
330 return 0;
331
332 case LINUX_F_SETFL: {
333 file_t *fp1 = NULL;
334
335 val = linux_to_bsd_ioflags((unsigned long)SCARG(uap, arg));
336 /*
337 * Linux seems to have same semantics for sending SIGIO to the
338 * read side of socket, but slightly different semantics
339 * for SIGIO to the write side. Rather than sending the SIGIO
340 * every time it's possible to write (directly) more data, it
341 * only sends SIGIO if last write(2) failed due to insufficient
342 * memory to hold the data. This is compatible enough
343 * with NetBSD semantics to not do anything about the
344 * difference.
345 *
346 * Linux does NOT send SIGIO for pipes. Deal with socketpair
347 * ones and DTYPE_PIPE ones. For these, we don't set
348 * the underlying flags (we don't pass O_ASYNC flag down
349 * to sys_fcntl()), but set the FASYNC flag for file descriptor,
350 * so that F_GETFL would report the ASYNC i/o is on.
351 */
352 if (val & O_ASYNC) {
353 if (((fp1 = fd_getfile(fd)) == NULL))
354 return (EBADF);
355 if (((fp1->f_type == DTYPE_SOCKET) && fp1->f_data
356 && ((struct socket *)fp1->f_data)->so_state & SS_ISAPIPE)
357 || (fp1->f_type == DTYPE_PIPE))
358 val &= ~O_ASYNC;
359 else {
360 /* not a pipe, do not modify anything */
361 fd_putfile(fd);
362 fp1 = NULL;
363 }
364 }
365
366 SCARG(&fca, fd) = fd;
367 SCARG(&fca, cmd) = F_SETFL;
368 SCARG(&fca, arg) = (void *) val;
369
370 error = sys_fcntl(l, &fca, retval);
371
372 /* Now set the FASYNC flag for pipes */
373 if (fp1) {
374 if (!error) {
375 mutex_enter(&fp1->f_lock);
376 fp1->f_flag |= FASYNC;
377 mutex_exit(&fp1->f_lock);
378 }
379 fd_putfile(fd);
380 }
381
382 return (error);
383 }
384
385 case LINUX_F_GETLK:
386 do_linux_getlk(fd, cmd, arg, linux, flock);
387
388 case LINUX_F_SETLK:
389 case LINUX_F_SETLKW:
390 do_linux_setlk(fd, cmd, arg, linux, flock, LINUX_F_SETLK);
391
392 case LINUX_F_SETOWN:
393 case LINUX_F_GETOWN:
394 /*
395 * We need to route fcntl() for tty descriptors around normal
396 * fcntl(), since NetBSD tty TIOC{G,S}PGRP semantics is too
397 * restrictive for Linux F_{G,S}ETOWN. For non-tty descriptors,
398 * this is not a problem.
399 */
400 if ((fp = fd_getfile(fd)) == NULL)
401 return EBADF;
402
403 /* Check it's a character device vnode */
404 if (fp->f_type != DTYPE_VNODE
405 || (vp = (struct vnode *)fp->f_data) == NULL
406 || vp->v_type != VCHR) {
407 fd_putfile(fd);
408
409 not_tty:
410 /* Not a tty, proceed with common fcntl() */
411 cmd = cmd == LINUX_F_SETOWN ? F_SETOWN : F_GETOWN;
412 break;
413 }
414
415 vn_lock(vp, LK_SHARED | LK_RETRY);
416 error = VOP_GETATTR(vp, &va, l->l_cred);
417 VOP_UNLOCK(vp);
418
419 fd_putfile(fd);
420
421 if (error)
422 return error;
423
424 if ((tp = cdev_tty(va.va_rdev)) == NULL)
425 goto not_tty;
426
427 /* set tty pg_id appropriately */
428 mutex_enter(&proc_lock);
429 if (cmd == LINUX_F_GETOWN) {
430 retval[0] = tp->t_pgrp ? tp->t_pgrp->pg_id : NO_PGID;
431 mutex_exit(&proc_lock);
432 return 0;
433 }
434 if ((long)arg <= 0) {
435 pgid = -(long)arg;
436 } else {
437 struct proc *p1 = proc_find((long)arg);
438 if (p1 == NULL) {
439 mutex_exit(&proc_lock);
440 return (ESRCH);
441 }
442 pgid = (long)p1->p_pgrp->pg_id;
443 }
444 pgrp = pgrp_find(pgid);
445 if (pgrp == NULL || pgrp->pg_session != p->p_session) {
446 mutex_exit(&proc_lock);
447 return EPERM;
448 }
449 tp->t_pgrp = pgrp;
450 mutex_exit(&proc_lock);
451 return 0;
452
453 case LINUX_F_DUPFD_CLOEXEC:
454 cmd = F_DUPFD_CLOEXEC;
455 break;
456
457 case LINUX_F_ADD_SEALS:
458 cmd = F_ADD_SEALS;
459 break;
460
461 case LINUX_F_GET_SEALS:
462 cmd = F_GET_SEALS;
463 break;
464
465 default:
466 return EOPNOTSUPP;
467 }
468
469 SCARG(&fca, fd) = fd;
470 SCARG(&fca, cmd) = cmd;
471 SCARG(&fca, arg) = arg;
472
473 return sys_fcntl(l, &fca, retval);
474 }
475
476 #if !defined(__aarch64__) && !defined(__amd64__)
477 /*
478 * Convert a NetBSD stat structure to a Linux stat structure.
479 * Only the order of the fields and the padding in the structure
480 * is different. linux_fakedev is a machine-dependent function
481 * which optionally converts device driver major/minor numbers
482 * (XXX horrible, but what can you do against code that compares
483 * things against constant major device numbers? sigh)
484 */
485 static void
486 bsd_to_linux_stat(struct stat *bsp, struct linux_stat *lsp)
487 {
488
489 memset(lsp, 0, sizeof(*lsp));
490 lsp->lst_dev = linux_fakedev(bsp->st_dev, 0);
491 lsp->lst_ino = bsp->st_ino;
492 lsp->lst_mode = (linux_mode_t)bsp->st_mode;
493 if (bsp->st_nlink >= (1 << 15))
494 lsp->lst_nlink = (1 << 15) - 1;
495 else
496 lsp->lst_nlink = (linux_nlink_t)bsp->st_nlink;
497 lsp->lst_uid = bsp->st_uid;
498 lsp->lst_gid = bsp->st_gid;
499 lsp->lst_rdev = linux_fakedev(bsp->st_rdev, 1);
500 lsp->lst_size = bsp->st_size;
501 lsp->lst_blksize = bsp->st_blksize;
502 lsp->lst_blocks = bsp->st_blocks;
503 lsp->lst_atime = bsp->st_atime;
504 lsp->lst_mtime = bsp->st_mtime;
505 lsp->lst_ctime = bsp->st_ctime;
506 #ifdef LINUX_STAT_HAS_NSEC
507 lsp->lst_atime_nsec = bsp->st_atimensec;
508 lsp->lst_mtime_nsec = bsp->st_mtimensec;
509 lsp->lst_ctime_nsec = bsp->st_ctimensec;
510 #endif
511 }
512
513 /*
514 * The stat functions below are plain sailing. stat and lstat are handled
515 * by one function to avoid code duplication.
516 */
517 int
518 linux_sys_fstat(struct lwp *l, const struct linux_sys_fstat_args *uap,
519 register_t *retval)
520 {
521 /* {
522 syscallarg(int) fd;
523 syscallarg(linux_stat *) sp;
524 } */
525 struct linux_stat tmplst;
526 struct stat tmpst;
527 int error;
528
529 error = do_sys_fstat(SCARG(uap, fd), &tmpst);
530 if (error != 0)
531 return error;
532 bsd_to_linux_stat(&tmpst, &tmplst);
533
534 return copyout(&tmplst, SCARG(uap, sp), sizeof tmplst);
535 }
536
537 static int
538 linux_stat1(const struct linux_sys_stat_args *uap, register_t *retval,
539 int flags)
540 {
541 struct linux_stat tmplst;
542 struct stat tmpst;
543 int error;
544
545 error = do_sys_stat(SCARG(uap, path), flags, &tmpst);
546 if (error != 0)
547 return error;
548
549 bsd_to_linux_stat(&tmpst, &tmplst);
550
551 return copyout(&tmplst, SCARG(uap, sp), sizeof tmplst);
552 }
553
554 int
555 linux_sys_stat(struct lwp *l, const struct linux_sys_stat_args *uap,
556 register_t *retval)
557 {
558 /* {
559 syscallarg(const char *) path;
560 syscallarg(struct linux_stat *) sp;
561 } */
562
563 return linux_stat1(uap, retval, FOLLOW);
564 }
565
566 /* Note: this is "newlstat" in the Linux sources */
567 /* (we don't bother with the old lstat currently) */
568 int
569 linux_sys_lstat(struct lwp *l, const struct linux_sys_lstat_args *uap,
570 register_t *retval)
571 {
572 /* {
573 syscallarg(const char *) path;
574 syscallarg(struct linux_stat *) sp;
575 } */
576
577 return linux_stat1((const void *)uap, retval, NOFOLLOW);
578 }
579 #endif /* !__aarch64__ && !__amd64__ */
580
581 /*
582 * The following syscalls are mostly here because of the alternate path check.
583 */
584
585 int
586 linux_sys_linkat(struct lwp *l, const struct linux_sys_linkat_args *uap,
587 register_t *retval)
588 {
589 /* {
590 syscallarg(int) fd1;
591 syscallarg(const char *) name1;
592 syscallarg(int) fd2;
593 syscallarg(const char *) name2;
594 syscallarg(int) flags;
595 } */
596 int fd1 = SCARG(uap, fd1);
597 const char *name1 = SCARG(uap, name1);
598 int fd2 = SCARG(uap, fd2);
599 const char *name2 = SCARG(uap, name2);
600 int follow;
601
602 follow = SCARG(uap, flags) & LINUX_AT_SYMLINK_FOLLOW;
603
604 return do_sys_linkat(l, fd1, name1, fd2, name2, follow, retval);
605 }
606
607 static int
608 linux_unlink_dircheck(const char *path)
609 {
610 struct nameidata nd;
611 struct pathbuf *pb;
612 int error;
613
614 /*
615 * Linux returns EISDIR if unlink(2) is called on a directory.
616 * We return EPERM in such cases. To emulate correct behaviour,
617 * check if the path points to directory and return EISDIR if this
618 * is the case.
619 *
620 * XXX this should really not copy in the path buffer twice...
621 */
622 error = pathbuf_copyin(path, &pb);
623 if (error) {
624 return error;
625 }
626 NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF | TRYEMULROOT, pb);
627 if (namei(&nd) == 0) {
628 struct stat sb;
629
630 if (vn_stat(nd.ni_vp, &sb) == 0
631 && S_ISDIR(sb.st_mode))
632 error = EISDIR;
633
634 vput(nd.ni_vp);
635 }
636 pathbuf_destroy(pb);
637 return error ? error : EPERM;
638 }
639
640 int
641 linux_sys_unlink(struct lwp *l, const struct linux_sys_unlink_args *uap,
642 register_t *retval)
643 {
644 /* {
645 syscallarg(const char *) path;
646 } */
647 int error;
648
649 error = sys_unlink(l, (const void *)uap, retval);
650 if (error == EPERM)
651 error = linux_unlink_dircheck(SCARG(uap, path));
652
653 return error;
654 }
655
656 int
657 linux_sys_unlinkat(struct lwp *l, const struct linux_sys_unlinkat_args *uap,
658 register_t *retval)
659 {
660 /* {
661 syscallarg(int) fd;
662 syscallarg(const char *) path;
663 syscallarg(int) flag;
664 } */
665 struct sys_unlinkat_args ua;
666 int error;
667
668 SCARG(&ua, fd) = SCARG(uap, fd);
669 SCARG(&ua, path) = SCARG(uap, path);
670 SCARG(&ua, flag) = linux_to_bsd_atflags(SCARG(uap, flag));
671
672 error = sys_unlinkat(l, &ua, retval);
673 if (error == EPERM)
674 error = linux_unlink_dircheck(SCARG(uap, path));
675
676 return error;
677 }
678
679 int
680 linux_sys_mknod(struct lwp *l, const struct linux_sys_mknod_args *uap,
681 register_t *retval)
682 {
683 /* {
684 syscallarg(const char *) path;
685 syscallarg(linux_umode_t) mode;
686 syscallarg(unsigned) dev;
687 } */
688 struct linux_sys_mknodat_args ua;
689
690 SCARG(&ua, fd) = LINUX_AT_FDCWD;
691 SCARG(&ua, path) = SCARG(uap, path);
692 SCARG(&ua, mode) = SCARG(uap, mode);
693 SCARG(&ua, dev) = SCARG(uap, dev);
694
695 return linux_sys_mknodat(l, &ua, retval);
696 }
697
698 int
699 linux_sys_mknodat(struct lwp *l, const struct linux_sys_mknodat_args *uap,
700 register_t *retval)
701 {
702 /* {
703 syscallarg(int) fd;
704 syscallarg(const char *) path;
705 syscallarg(linux_umode_t) mode;
706 syscallarg(unsigned) dev;
707 } */
708
709 /*
710 * BSD handles FIFOs separately
711 */
712 if (S_ISFIFO(SCARG(uap, mode))) {
713 struct sys_mkfifoat_args bma;
714
715 SCARG(&bma, fd) = SCARG(uap, fd);
716 SCARG(&bma, path) = SCARG(uap, path);
717 SCARG(&bma, mode) = SCARG(uap, mode);
718 return sys_mkfifoat(l, &bma, retval);
719 } else {
720
721 /*
722 * Linux device numbers uses 8 bits for minor and 8 bits
723 * for major. Due to how we map our major and minor,
724 * this just fits into our dev_t. Just mask off the
725 * upper 16bit to remove any random junk.
726 */
727
728 return do_sys_mknodat(l, SCARG(uap, fd), SCARG(uap, path),
729 SCARG(uap, mode), SCARG(uap, dev) & 0xffff, UIO_USERSPACE);
730 }
731 }
732
733 int
734 linux_sys_fchmodat(struct lwp *l, const struct linux_sys_fchmodat_args *uap,
735 register_t *retval)
736 {
737 /* {
738 syscallarg(int) fd;
739 syscallarg(const char *) path;
740 syscallarg(linux_umode_t) mode;
741 } */
742
743 return do_sys_chmodat(l, SCARG(uap, fd), SCARG(uap, path),
744 SCARG(uap, mode), AT_SYMLINK_FOLLOW);
745 }
746
747 int
748 linux_sys_fchownat(struct lwp *l, const struct linux_sys_fchownat_args *uap,
749 register_t *retval)
750 {
751 /* {
752 syscallarg(int) fd;
753 syscallarg(const char *) path;
754 syscallarg(uid_t) owner;
755 syscallarg(gid_t) group;
756 syscallarg(int) flag;
757 } */
758 int flag;
759
760 flag = linux_to_bsd_atflags(SCARG(uap, flag));
761 return do_sys_chownat(l, SCARG(uap, fd), SCARG(uap, path),
762 SCARG(uap, owner), SCARG(uap, group), flag);
763 }
764
765 int
766 linux_sys_faccessat(struct lwp *l, const struct linux_sys_faccessat_args *uap,
767 register_t *retval)
768 {
769 /* {
770 syscallarg(int) fd;
771 syscallarg(const char *) path;
772 syscallarg(int) amode;
773 } */
774
775 return do_sys_accessat(l, SCARG(uap, fd), SCARG(uap, path),
776 SCARG(uap, amode), AT_SYMLINK_FOLLOW);
777 }
778
779 /*
780 * This is just fsync() for now (just as it is in the Linux kernel)
781 * Note: this is not implemented under Linux on Alpha and Arm
782 * but should still be defined in our syscalls.master.
783 * (syscall #148 on the arm)
784 */
785 int
786 linux_sys_fdatasync(struct lwp *l, const struct linux_sys_fdatasync_args *uap,
787 register_t *retval)
788 {
789 /* {
790 syscallarg(int) fd;
791 } */
792
793 return sys_fsync(l, (const void *)uap, retval);
794 }
795
796 /*
797 * pread(2).
798 */
799 int
800 linux_sys_pread(struct lwp *l, const struct linux_sys_pread_args *uap,
801 register_t *retval)
802 {
803 /* {
804 syscallarg(int) fd;
805 syscallarg(void *) buf;
806 syscallarg(size_t) nbyte;
807 syscallarg(off_t) offset;
808 } */
809 struct sys_pread_args pra;
810
811 SCARG(&pra, fd) = SCARG(uap, fd);
812 SCARG(&pra, buf) = SCARG(uap, buf);
813 SCARG(&pra, nbyte) = SCARG(uap, nbyte);
814 SCARG(&pra, PAD) = 0;
815 SCARG(&pra, offset) = SCARG(uap, offset);
816
817 return sys_pread(l, &pra, retval);
818 }
819
820 /*
821 * pwrite(2).
822 */
823 int
824 linux_sys_pwrite(struct lwp *l, const struct linux_sys_pwrite_args *uap,
825 register_t *retval)
826 {
827 /* {
828 syscallarg(int) fd;
829 syscallarg(void *) buf;
830 syscallarg(size_t) nbyte;
831 syscallarg(off_t) offset;
832 } */
833 struct sys_pwrite_args pra;
834
835 SCARG(&pra, fd) = SCARG(uap, fd);
836 SCARG(&pra, buf) = SCARG(uap, buf);
837 SCARG(&pra, nbyte) = SCARG(uap, nbyte);
838 SCARG(&pra, PAD) = 0;
839 SCARG(&pra, offset) = SCARG(uap, offset);
840
841 return sys_pwrite(l, &pra, retval);
842 }
843
844 /*
845 * preadv(2)
846 */
847 int
848 linux_sys_preadv(struct lwp *l, const struct linux_sys_preadv_args *uap,
849 register_t *retval)
850 {
851 /* {
852 syscallarg(int) fd;
853 syscallarg(const struct iovec *) iovp;
854 syscallarg(int) iovcnt;
855 syscallarg(unsigned long) off_lo;
856 syscallarg(unsigned long) off_hi;
857 } */
858 struct sys_preadv_args ua;
859
860 SCARG(&ua, fd) = SCARG(uap, fd);
861 SCARG(&ua, iovp) = SCARG(uap, iovp);
862 SCARG(&ua, iovcnt) = SCARG(uap, iovcnt);
863 SCARG(&ua, PAD) = 0;
864 SCARG(&ua, offset) = linux_hilo_to_off_t(SCARG(uap, off_hi),
865 SCARG(uap, off_lo));
866 return sys_preadv(l, &ua, retval);
867 }
868
869 /*
870 * pwritev(2)
871 */
872 int
873 linux_sys_pwritev(struct lwp *l, const struct linux_sys_pwritev_args *uap,
874 register_t *retval)
875 {
876 /* {
877 syscallarg(int) fd;
878 syscallarg(const struct iovec *) iovp;
879 syscallarg(int) iovcnt;
880 syscallarg(unsigned long) off_lo;
881 syscallarg(unsigned long) off_hi;
882 } */
883 struct sys_pwritev_args ua;
884
885 SCARG(&ua, fd) = SCARG(uap, fd);
886 SCARG(&ua, iovp) = (const void *)SCARG(uap, iovp);
887 SCARG(&ua, iovcnt) = SCARG(uap, iovcnt);
888 SCARG(&ua, PAD) = 0;
889 SCARG(&ua, offset) = linux_hilo_to_off_t(SCARG(uap, off_hi),
890 SCARG(uap, off_lo));
891 return sys_pwritev(l, &ua, retval);
892 }
893
894 int
895 linux_sys_dup3(struct lwp *l, const struct linux_sys_dup3_args *uap,
896 register_t *retval)
897 {
898 /* {
899 syscallarg(int) from;
900 syscallarg(int) to;
901 syscallarg(int) flags;
902 } */
903 int flags;
904
905 flags = linux_to_bsd_ioflags(SCARG(uap, flags));
906 if ((flags & ~O_CLOEXEC) != 0)
907 return EINVAL;
908
909 if (SCARG(uap, from) == SCARG(uap, to))
910 return EINVAL;
911
912 return dodup(l, SCARG(uap, from), SCARG(uap, to), flags, retval);
913 }
914
915 int
916 linux_to_bsd_atflags(int lflags)
917 {
918 int bflags = 0;
919
920 if (lflags & LINUX_AT_SYMLINK_NOFOLLOW)
921 bflags |= AT_SYMLINK_NOFOLLOW;
922 if (lflags & LINUX_AT_REMOVEDIR)
923 bflags |= AT_REMOVEDIR;
924 if (lflags & LINUX_AT_SYMLINK_FOLLOW)
925 bflags |= AT_SYMLINK_FOLLOW;
926
927 return bflags;
928 }
929
930 int
931 linux_sys_faccessat2(lwp_t *l, const struct linux_sys_faccessat2_args *uap,
932 register_t *retval)
933 {
934 /* {
935 syscallarg(int) fd;
936 syscallarg(const char *) path;
937 syscallarg(int) amode;
938 syscallarg(int) flags;
939 } */
940 int flag = linux_to_bsd_atflags(SCARG(uap, flags));
941 int mode = SCARG(uap, amode);
942 int fd = SCARG(uap, fd);
943 const char *path = SCARG(uap, path);
944
945 return do_sys_accessat(l, fd, path, mode, flag);
946 }
947
948 int
949 linux_sys_sync_file_range(lwp_t *l,
950 const struct linux_sys_sync_file_range_args *uap, register_t *retval)
951 {
952 /* {
953 syscallarg(int) fd;
954 syscallarg(off_t) offset;
955 syscallarg(off_t) nbytes;
956 syscallarg(unsigned int) flags;
957 } */
958
959 struct sys_fsync_range_args ua;
960
961 if (SCARG(uap, offset) < 0 || SCARG(uap, nbytes) < 0 ||
962 ((SCARG(uap, flags) & ~LINUX_SYNC_FILE_RANGE_ALL) != 0))
963 return EINVAL;
964
965 /* Fill ua with uap */
966 SCARG(&ua, fd) = SCARG(uap, fd);
967 SCARG(&ua, flags) = SCARG(uap, flags);
968
969 /* Round down offset to page boundary */
970 SCARG(&ua, start) = rounddown(SCARG(uap, offset), PAGE_SIZE);
971 SCARG(&ua, length) = SCARG(uap, nbytes);
972 if (SCARG(&ua, length) != 0) {
973 /* Round up length to nbytes+offset to page boundary */
974 SCARG(&ua, length) = roundup(SCARG(uap, nbytes)
975 + SCARG(uap, offset) - SCARG(&ua, start), PAGE_SIZE);
976 }
977
978 return sys_fsync_range(l, &ua, retval);
979 }
980
981 int
982 linux_sys_syncfs(lwp_t *l, const struct linux_sys_syncfs_args *uap,
983 register_t *retval)
984 {
985 /* {
986 syscallarg(int) fd;
987 } */
988
989 struct mount *mp;
990 struct vnode *vp;
991 file_t *fp;
992 int error, fd;
993 fd = SCARG(uap, fd);
994
995 /* Get file pointer */
996 if ((error = fd_getvnode(fd, &fp)) != 0)
997 return error;
998
999 /* Get vnode and mount point */
1000 vp = fp->f_vnode;
1001 mp = vp->v_mount;
1002
1003 mutex_enter(mp->mnt_updating);
1004 if ((mp->mnt_flag & MNT_RDONLY) == 0) {
1005 int asyncflag = mp->mnt_flag & MNT_ASYNC;
1006 mp->mnt_flag &= ~MNT_ASYNC;
1007 VFS_SYNC(mp, MNT_NOWAIT, l->l_cred);
1008 if (asyncflag)
1009 mp->mnt_flag |= MNT_ASYNC;
1010 }
1011 mutex_exit(mp->mnt_updating);
1012
1013 /* Cleanup vnode and file pointer */
1014 vrele(vp);
1015 fd_putfile(fd);
1016 return 0;
1017
1018 }
1019
1020 int
1021 linux_sys_renameat2(struct lwp *l, const struct linux_sys_renameat2_args *uap,
1022 register_t *retval)
1023 {
1024 /* {
1025 syscallarg(int) fromfd;
1026 syscallarg(const char *) from;
1027 syscallarg(int) tofd;
1028 syscallarg(const char *) to;
1029 syscallarg(unsigned int) flags;
1030 } */
1031
1032 struct sys_renameat_args ua;
1033 SCARG(&ua, fromfd) = SCARG(uap, fromfd);
1034 SCARG(&ua, from) = SCARG(uap, from);
1035 SCARG(&ua, tofd) = SCARG(uap, tofd);
1036 SCARG(&ua, to) = SCARG(uap, to);
1037
1038 unsigned int flags = SCARG(uap, flags);
1039 int error;
1040
1041 if (flags != 0) {
1042 if (flags & ~LINUX_RENAME_ALL)
1043 return EINVAL;
1044 if ((flags & LINUX_RENAME_EXCHANGE) != 0 &&
1045 (flags & (LINUX_RENAME_NOREPLACE | LINUX_RENAME_WHITEOUT))
1046 != 0)
1047 return EINVAL;
1048 /*
1049 * Suppoting renameat2 flags without support from file systems
1050 * becomes a messy affair cause of locks and how VOP_RENAME
1051 * protocol is implemented. So, return EOPNOTSUPP for now.
1052 */
1053 return EOPNOTSUPP;
1054 }
1055
1056 error = sys_renameat(l, &ua, retval);
1057 return error;
1058 }
1059
1060 int
1061 linux_sys_copy_file_range(lwp_t *l,
1062 const struct linux_sys_copy_file_range_args *uap, register_t *retval)
1063 {
1064 /* {
1065 syscallarg(int) fd_in;
1066 syscallarg(unsigned long) off_in;
1067 syscallarg(int) fd_out;
1068 syscallarg(unsigned long) off_out;
1069 syscallarg(size_t) len;
1070 syscallarg(unsigned int) flags;
1071 } */
1072 const off_t OFF_MAX = __type_max(off_t);
1073 int fd_in, fd_out;
1074 file_t *fp_in, *fp_out;
1075 struct vnode *invp, *outvp;
1076 off_t off_in = 0, off_out = 0;
1077 struct vattr vattr_in, vattr_out;
1078 ssize_t total_copied = 0;
1079 size_t bytes_left, to_copy;
1080 bool have_off_in = false, have_off_out = false;
1081 int error = 0;
1082 size_t len = SCARG(uap, len);
1083 unsigned int flags = SCARG(uap, flags);
1084 /* Structures for actual copy */
1085 char *buffer = NULL;
1086 struct uio auio;
1087 struct iovec aiov;
1088
1089 if (len > SSIZE_MAX) {
1090 DPRINTF("%s: len is greater than SSIZE_MAX\n",
1091 __func__);
1092 return EOVERFLOW;
1093 }
1094
1095 if (flags != 0) {
1096 DPRINTF("%s: unsupported flags %#x\n", __func__, flags);
1097 return EINVAL;
1098 }
1099
1100 fd_in = SCARG(uap, fd_in);
1101 fd_out = SCARG(uap, fd_out);
1102 error = fd_getvnode(fd_in, &fp_in);
1103 if (error) {
1104 return error;
1105 }
1106
1107 error = fd_getvnode(fd_out, &fp_out);
1108 if (error) {
1109 fd_putfile(fd_in);
1110 return error;
1111 }
1112
1113 invp = fp_in->f_vnode;
1114 outvp = fp_out->f_vnode;
1115
1116 /* Get attributes of input and output files */
1117 VOP_GETATTR(invp, &vattr_in, l->l_cred);
1118 VOP_GETATTR(outvp, &vattr_out, l->l_cred);
1119
1120 /* Check if input and output files are regular files */
1121 if (vattr_in.va_type == VDIR || vattr_out.va_type == VDIR) {
1122 error = EISDIR;
1123 DPRINTF("%s: Input or output is a directory\n", __func__);
1124 goto out;
1125 }
1126 if ((SCARG(uap, off_in) != NULL && *SCARG(uap, off_in) < 0) ||
1127 (SCARG(uap, off_out) != NULL && *SCARG(uap, off_out) < 0) ||
1128 vattr_in.va_type != VREG || vattr_out.va_type != VREG) {
1129 error = EINVAL;
1130 DPRINTF("%s: Invalid offset or file type\n", __func__);
1131 goto out;
1132 }
1133
1134 if ((fp_in->f_flag & FREAD) == 0 ||
1135 (fp_out->f_flag & FWRITE) == 0 ||
1136 (fp_out->f_flag & FAPPEND) != 0) {
1137 DPRINTF("%s: input file can't be read or output file "
1138 "can't be written\n", __func__);
1139 error = EBADF;
1140 goto out;
1141 }
1142 /* Retrieve and validate offsets if provided */
1143 if (SCARG(uap, off_in) != NULL) {
1144 error = copyin(SCARG(uap, off_in), &off_in, sizeof(off_in));
1145 if (error) {
1146 goto out;
1147 }
1148 have_off_in = true;
1149 }
1150
1151 if (SCARG(uap, off_out) != NULL) {
1152 error = copyin(SCARG(uap, off_out), &off_out, sizeof(off_out));
1153 if (error) {
1154 goto out;
1155 }
1156 have_off_out = true;
1157 }
1158
1159 if (off_out < 0 || len > OFF_MAX - off_out) {
1160 DPRINTF("%s: New size is greater than OFF_MAX\n", __func__);
1161 error = EFBIG;
1162 goto out;
1163 }
1164 const off_t new_size = off_out + len;
1165
1166 /* Identify overlapping ranges */
1167 if ((invp == outvp) &&
1168 ((off_in <= off_out && off_in + (off_t)len > off_out) ||
1169 (off_in > off_out && off_out + (off_t)len > off_in))) {
1170 DPRINTF("%s: Ranges overlap\n", __func__);
1171 error = EINVAL;
1172 goto out;
1173 }
1174
1175 buffer = kmem_alloc(LINUX_COPY_FILE_RANGE_MAX_CHUNK, KM_SLEEP);
1176
1177 bytes_left = len;
1178
1179 while (bytes_left > 0) {
1180 to_copy = MIN(bytes_left, LINUX_COPY_FILE_RANGE_MAX_CHUNK);
1181
1182 /* Lock the input vnode for reading */
1183 vn_lock(fp_in->f_vnode, LK_SHARED | LK_RETRY);
1184 /* Set up iovec and uio for reading */
1185 aiov.iov_base = buffer;
1186 aiov.iov_len = to_copy;
1187 auio.uio_iov = &aiov;
1188 auio.uio_iovcnt = 1;
1189 auio.uio_offset = have_off_in ? off_in : fp_in->f_offset;
1190 auio.uio_resid = to_copy;
1191 auio.uio_rw = UIO_READ;
1192 auio.uio_vmspace = l->l_proc->p_vmspace;
1193 UIO_SETUP_SYSSPACE(&auio);
1194
1195 /* Perform read using vn_read */
1196 error = VOP_READ(fp_in->f_vnode, &auio, 0, l->l_cred);
1197 VOP_UNLOCK(fp_in->f_vnode);
1198 if (error) {
1199 DPRINTF("%s: Read error %d\n", __func__, error);
1200 break;
1201 }
1202
1203 size_t read_bytes = to_copy - auio.uio_resid;
1204 if (read_bytes == 0) {
1205 /* EOF reached */
1206 break;
1207 }
1208
1209 /* Lock the output vnode for writing */
1210 vn_lock(fp_out->f_vnode, LK_EXCLUSIVE | LK_RETRY);
1211 /* Set up iovec and uio for writing */
1212 aiov.iov_base = buffer;
1213 aiov.iov_len = read_bytes;
1214 auio.uio_iov = &aiov;
1215 auio.uio_iovcnt = 1;
1216 auio.uio_offset = have_off_out ? off_out : fp_out->f_offset;
1217 auio.uio_resid = read_bytes;
1218 auio.uio_rw = UIO_WRITE;
1219 auio.uio_vmspace = l->l_proc->p_vmspace;
1220 UIO_SETUP_SYSSPACE(&auio);
1221
1222 /* Perform the write */
1223 error = VOP_WRITE(fp_out->f_vnode, &auio, 0, l->l_cred);
1224 VOP_UNLOCK(fp_out->f_vnode);
1225 if (error) {
1226 DPRINTF("%s: Write error %d\n", __func__, error);
1227 break;
1228 }
1229 size_t written_bytes = read_bytes - auio.uio_resid;
1230 total_copied += written_bytes;
1231 bytes_left -= written_bytes;
1232
1233 /* Update offsets if provided */
1234 if (have_off_in) {
1235 off_in += written_bytes;
1236 } else {
1237 fp_in->f_offset += written_bytes;
1238 }
1239 if (have_off_out) {
1240 off_out += written_bytes;
1241 } else {
1242 fp_out->f_offset += written_bytes;
1243 }
1244 }
1245
1246 if (have_off_in) {
1247 /* Adjust user space offset */
1248 error = copyout(&off_in, SCARG(uap, off_in), sizeof(off_t));
1249 if (error) {
1250 DPRINTF("%s: Error adjusting user space offset\n",
1251 __func__);
1252 }
1253 goto out;
1254 }
1255
1256 if (have_off_out) {
1257 /* Adjust user space offset */
1258 error = copyout(&off_out, SCARG(uap, off_out), sizeof(off_t));
1259 if (error) {
1260 DPRINTF("%s: Error adjusting user space offset\n",
1261 __func__);
1262 }
1263 }
1264
1265 *retval = total_copied;
1266 out:
1267 if (buffer) {
1268 kmem_free(buffer, LINUX_COPY_FILE_RANGE_MAX_CHUNK);
1269 }
1270 if (fp_out) {
1271 fd_putfile(fd_out);
1272 }
1273 if (fp_in) {
1274 fd_putfile(fd_in);
1275 }
1276 return error;
1277 }
1278
1279 #define LINUX_NOT_SUPPORTED(fun) \
1280 int \
1281 fun(struct lwp *l, const struct fun##_args *uap, register_t *retval) \
1282 { \
1283 return EOPNOTSUPP; \
1284 }
1285
1286 LINUX_NOT_SUPPORTED(linux_sys_setxattr)
1287 LINUX_NOT_SUPPORTED(linux_sys_lsetxattr)
1288 LINUX_NOT_SUPPORTED(linux_sys_fsetxattr)
1289
1290 LINUX_NOT_SUPPORTED(linux_sys_getxattr)
1291 LINUX_NOT_SUPPORTED(linux_sys_lgetxattr)
1292 LINUX_NOT_SUPPORTED(linux_sys_fgetxattr)
1293
1294 LINUX_NOT_SUPPORTED(linux_sys_listxattr)
1295 LINUX_NOT_SUPPORTED(linux_sys_llistxattr)
1296 LINUX_NOT_SUPPORTED(linux_sys_flistxattr)
1297
1298 LINUX_NOT_SUPPORTED(linux_sys_removexattr)
1299 LINUX_NOT_SUPPORTED(linux_sys_lremovexattr)
1300 LINUX_NOT_SUPPORTED(linux_sys_fremovexattr)
1301
1302 /*
1303 * For now just return EOPNOTSUPP, this makes glibc posix_fallocate()
1304 * to fallback to emulation.
1305 * XXX Right now no filesystem actually implements fallocate support,
1306 * so no need for mapping.
1307 */
1308 LINUX_NOT_SUPPORTED(linux_sys_fallocate)
1309