linux_file.c revision 1.40 1 /* $NetBSD: linux_file.c,v 1.40 2001/07/22 13:34:09 wiz Exp $ */
2
3 /*-
4 * Copyright (c) 1995, 1998 The NetBSD Foundation, Inc.
5 * All rights reserved.
6 *
7 * This code is derived from software contributed to The NetBSD Foundation
8 * by Frank van der Linden and Eric Haszlakiewicz.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 * 3. All advertising materials mentioning features or use of this software
19 * must display the following acknowledgement:
20 * This product includes software developed by the NetBSD
21 * Foundation, Inc. and its contributors.
22 * 4. Neither the name of The NetBSD Foundation nor the names of its
23 * contributors may be used to endorse or promote products derived
24 * from this software without specific prior written permission.
25 *
26 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
27 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
28 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
29 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
30 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
31 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
32 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
33 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
34 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
35 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
36 * POSSIBILITY OF SUCH DAMAGE.
37 */
38
39 /*
40 * Functions in multiarch:
41 * linux_sys_llseek : linux_llseek.c
42 */
43
44 #include <sys/param.h>
45 #include <sys/systm.h>
46 #include <sys/namei.h>
47 #include <sys/proc.h>
48 #include <sys/file.h>
49 #include <sys/stat.h>
50 #include <sys/filedesc.h>
51 #include <sys/ioctl.h>
52 #include <sys/kernel.h>
53 #include <sys/mount.h>
54 #include <sys/malloc.h>
55 #include <sys/vnode.h>
56 #include <sys/tty.h>
57 #include <sys/socketvar.h>
58 #include <sys/conf.h>
59
60 #include <sys/syscallargs.h>
61
62 #include <compat/linux/common/linux_types.h>
63 #include <compat/linux/common/linux_signal.h>
64 #include <compat/linux/common/linux_fcntl.h>
65 #include <compat/linux/common/linux_util.h>
66 #include <compat/linux/common/linux_machdep.h>
67
68 #include <compat/linux/linux_syscallargs.h>
69
70 static int linux_to_bsd_ioflags __P((int));
71 static int bsd_to_linux_ioflags __P((int));
72 static void bsd_to_linux_flock __P((struct flock *, struct linux_flock *));
73 static void linux_to_bsd_flock __P((struct linux_flock *, struct flock *));
74 static void bsd_to_linux_stat __P((struct stat *, struct linux_stat *));
75 static int linux_stat1 __P((struct proc *, void *, register_t *, int));
76
77 /*
78 * Some file-related calls are handled here. The usual flag conversion
79 * an structure conversion is done, and alternate emul path searching.
80 */
81
82 /*
83 * The next two functions convert between the Linux and NetBSD values
84 * of the flags used in open(2) and fcntl(2).
85 */
86 static int
87 linux_to_bsd_ioflags(lflags)
88 int lflags;
89 {
90 int res = 0;
91
92 res |= cvtto_bsd_mask(lflags, LINUX_O_WRONLY, O_WRONLY);
93 res |= cvtto_bsd_mask(lflags, LINUX_O_RDONLY, O_RDONLY);
94 res |= cvtto_bsd_mask(lflags, LINUX_O_RDWR, O_RDWR);
95 res |= cvtto_bsd_mask(lflags, LINUX_O_CREAT, O_CREAT);
96 res |= cvtto_bsd_mask(lflags, LINUX_O_EXCL, O_EXCL);
97 res |= cvtto_bsd_mask(lflags, LINUX_O_NOCTTY, O_NOCTTY);
98 res |= cvtto_bsd_mask(lflags, LINUX_O_TRUNC, O_TRUNC);
99 res |= cvtto_bsd_mask(lflags, LINUX_O_NDELAY, O_NDELAY);
100 res |= cvtto_bsd_mask(lflags, LINUX_O_SYNC, O_FSYNC);
101 res |= cvtto_bsd_mask(lflags, LINUX_FASYNC, O_ASYNC);
102 res |= cvtto_bsd_mask(lflags, LINUX_O_APPEND, O_APPEND);
103
104 return res;
105 }
106
107 static int
108 bsd_to_linux_ioflags(bflags)
109 int bflags;
110 {
111 int res = 0;
112
113 res |= cvtto_linux_mask(bflags, O_WRONLY, LINUX_O_WRONLY);
114 res |= cvtto_linux_mask(bflags, O_RDONLY, LINUX_O_RDONLY);
115 res |= cvtto_linux_mask(bflags, O_RDWR, LINUX_O_RDWR);
116 res |= cvtto_linux_mask(bflags, O_CREAT, LINUX_O_CREAT);
117 res |= cvtto_linux_mask(bflags, O_EXCL, LINUX_O_EXCL);
118 res |= cvtto_linux_mask(bflags, O_NOCTTY, LINUX_O_NOCTTY);
119 res |= cvtto_linux_mask(bflags, O_TRUNC, LINUX_O_TRUNC);
120 res |= cvtto_linux_mask(bflags, O_NDELAY, LINUX_O_NDELAY);
121 res |= cvtto_linux_mask(bflags, O_FSYNC, LINUX_O_SYNC);
122 res |= cvtto_linux_mask(bflags, O_ASYNC, LINUX_FASYNC);
123 res |= cvtto_linux_mask(bflags, O_APPEND, LINUX_O_APPEND);
124
125 return res;
126 }
127
128 /*
129 * creat(2) is an obsolete function, but it's present as a Linux
130 * system call, so let's deal with it.
131 *
132 * Note: On the Alpha this doesn't really exist in Linux, but it's defined
133 * in syscalls.master anyway so this doesn't have to be special cased.
134 *
135 * Just call open(2) with the TRUNC, CREAT and WRONLY flags.
136 */
137 int
138 linux_sys_creat(p, v, retval)
139 struct proc *p;
140 void *v;
141 register_t *retval;
142 {
143 struct linux_sys_creat_args /* {
144 syscallarg(const char *) path;
145 syscallarg(int) mode;
146 } */ *uap = v;
147 struct sys_open_args oa;
148 caddr_t sg;
149
150 sg = stackgap_init(p->p_emul);
151 CHECK_ALT_CREAT(p, &sg, SCARG(uap, path));
152
153 SCARG(&oa, path) = SCARG(uap, path);
154 SCARG(&oa, flags) = O_CREAT | O_TRUNC | O_WRONLY;
155 SCARG(&oa, mode) = SCARG(uap, mode);
156
157 return sys_open(p, &oa, retval);
158 }
159
160 /*
161 * open(2). Take care of the different flag values, and let the
162 * NetBSD syscall do the real work. See if this operation
163 * gives the current process a controlling terminal.
164 * (XXX is this necessary?)
165 */
166 int
167 linux_sys_open(p, v, retval)
168 struct proc *p;
169 void *v;
170 register_t *retval;
171 {
172 struct linux_sys_open_args /* {
173 syscallarg(const char *) path;
174 syscallarg(int) flags;
175 syscallarg(int) mode;
176 } */ *uap = v;
177 int error, fl;
178 struct sys_open_args boa;
179 caddr_t sg;
180
181 sg = stackgap_init(p->p_emul);
182
183 fl = linux_to_bsd_ioflags(SCARG(uap, flags));
184
185 if (fl & O_CREAT)
186 CHECK_ALT_CREAT(p, &sg, SCARG(uap, path));
187 else
188 CHECK_ALT_EXIST(p, &sg, SCARG(uap, path));
189
190 SCARG(&boa, path) = SCARG(uap, path);
191 SCARG(&boa, flags) = fl;
192 SCARG(&boa, mode) = SCARG(uap, mode);
193
194 if ((error = sys_open(p, &boa, retval)))
195 return error;
196
197 /*
198 * this bit from sunos_misc.c (and svr4_fcntl.c).
199 * If we are a session leader, and we don't have a controlling
200 * terminal yet, and the O_NOCTTY flag is not set, try to make
201 * this the controlling terminal.
202 */
203 if (!(fl & O_NOCTTY) && SESS_LEADER(p) && !(p->p_flag & P_CONTROLT)) {
204 struct filedesc *fdp = p->p_fd;
205 struct file *fp;
206
207 fp = fd_getfile(fdp, *retval);
208
209 /* ignore any error, just give it a try */
210 if (fp != NULL && fp->f_type == DTYPE_VNODE)
211 (fp->f_ops->fo_ioctl) (fp, TIOCSCTTY, (caddr_t) 0, p);
212 }
213 return 0;
214 }
215
216 /*
217 * The next two functions take care of converting the flock
218 * structure back and forth between Linux and NetBSD format.
219 * The only difference in the structures is the order of
220 * the fields, and the 'whence' value.
221 */
222 static void
223 bsd_to_linux_flock(bfp, lfp)
224 struct flock *bfp;
225 struct linux_flock *lfp;
226 {
227
228 lfp->l_start = bfp->l_start;
229 lfp->l_len = bfp->l_len;
230 lfp->l_pid = bfp->l_pid;
231 lfp->l_whence = bfp->l_whence;
232 switch (bfp->l_type) {
233 case F_RDLCK:
234 lfp->l_type = LINUX_F_RDLCK;
235 break;
236 case F_UNLCK:
237 lfp->l_type = LINUX_F_UNLCK;
238 break;
239 case F_WRLCK:
240 lfp->l_type = LINUX_F_WRLCK;
241 break;
242 }
243 }
244
245 static void
246 linux_to_bsd_flock(lfp, bfp)
247 struct linux_flock *lfp;
248 struct flock *bfp;
249 {
250
251 bfp->l_start = lfp->l_start;
252 bfp->l_len = lfp->l_len;
253 bfp->l_pid = lfp->l_pid;
254 bfp->l_whence = lfp->l_whence;
255 switch (lfp->l_type) {
256 case LINUX_F_RDLCK:
257 bfp->l_type = F_RDLCK;
258 break;
259 case LINUX_F_UNLCK:
260 bfp->l_type = F_UNLCK;
261 break;
262 case LINUX_F_WRLCK:
263 bfp->l_type = F_WRLCK;
264 break;
265 }
266 }
267
268 /*
269 * Most actions in the fcntl() call are straightforward; simply
270 * pass control to the NetBSD system call. A few commands need
271 * conversions after the actual system call has done its work,
272 * because the flag values and lock structure are different.
273 */
274 int
275 linux_sys_fcntl(p, v, retval)
276 struct proc *p;
277 void *v;
278 register_t *retval;
279 {
280 struct linux_sys_fcntl_args /* {
281 syscallarg(int) fd;
282 syscallarg(int) cmd;
283 syscallarg(void *) arg;
284 } */ *uap = v;
285 int fd, cmd, error;
286 u_long val;
287 caddr_t arg, sg;
288 struct linux_flock lfl;
289 struct flock *bfp, bfl;
290 struct sys_fcntl_args fca;
291 struct filedesc *fdp;
292 struct file *fp;
293 struct vnode *vp;
294 struct vattr va;
295 long pgid;
296 struct pgrp *pgrp;
297 struct tty *tp, *(*d_tty) __P((dev_t));
298
299 fd = SCARG(uap, fd);
300 cmd = SCARG(uap, cmd);
301 arg = (caddr_t) SCARG(uap, arg);
302
303 switch (cmd) {
304 case LINUX_F_DUPFD:
305 cmd = F_DUPFD;
306 break;
307 case LINUX_F_GETFD:
308 cmd = F_GETFD;
309 break;
310 case LINUX_F_SETFD:
311 cmd = F_SETFD;
312 break;
313 case LINUX_F_GETFL:
314 SCARG(&fca, fd) = fd;
315 SCARG(&fca, cmd) = F_GETFL;
316 SCARG(&fca, arg) = arg;
317 if ((error = sys_fcntl(p, &fca, retval)))
318 return error;
319 retval[0] = bsd_to_linux_ioflags(retval[0]);
320 return 0;
321 case LINUX_F_SETFL:
322 val = linux_to_bsd_ioflags((unsigned long)SCARG(uap, arg));
323 SCARG(&fca, fd) = fd;
324 SCARG(&fca, cmd) = F_SETFL;
325 SCARG(&fca, arg) = (caddr_t) val;
326 error = sys_fcntl(p, &fca, retval);
327 /*
328 * Linux does not send a SIGIO to the write end of a socket,
329 * neither it does send any SIGIO for pipes. If async I/O
330 * was requested, we keep the SS_ASYNC in struct socket flag
331 * set, but we clear SB_ASYNC flags on the sending buffer
332 * (for socket), and on the sending and the receiving buffer
333 * (for pipes).
334 *
335 * Because we do not alter to SS_ASYNC in struct socket,
336 * the Linux process keeps a consistent view of async I/O
337 * status if it attemps to read the async flag (SS_ASYNC)
338 *
339 * This async I/O problem does matters, since some Linux
340 * programs such as the JDK request async I/O on pipes,
341 * but they fail if they happen to get a SIGIO to the write
342 * end of the pipe.
343 */
344 if ((error == 0) && (val & O_ASYNC)) {
345 struct filedesc *fdp;
346 struct file *fp;
347 struct socket *so;
348
349 fdp = p->p_fd;
350
351 if (((fp = fd_getfile(fdp, fd)) == NULL) ||
352 (fp->f_iflags & FIF_WANTCLOSE) != 0)
353 return (EBADF);
354
355 FILE_USE(fp);
356
357 if ((fp->f_type == DTYPE_SOCKET) &&
358 (so = (struct socket*)fp->f_data)) {
359 /*
360 * Clear async I/O on sending buffer
361 * This will disable SIGIO for the
362 * write end of sockets and pipes.
363 */
364 so->so_snd.sb_flags &= ~SB_ASYNC;
365 /*
366 * If it's a pipe, also clear
367 * it on the receiving buffer.
368 * This will disable SIGIO for the
369 * read end of pipes.
370 */
371 if (so->so_state & SS_ISAPIPE)
372 so->so_rcv.sb_flags &= ~SB_ASYNC;
373 }
374
375 FILE_UNUSE(fp, p);
376 }
377 return error;
378 case LINUX_F_GETLK:
379 sg = stackgap_init(p->p_emul);
380 bfp = (struct flock *) stackgap_alloc(&sg, sizeof *bfp);
381 if ((error = copyin(arg, &lfl, sizeof lfl)))
382 return error;
383 linux_to_bsd_flock(&lfl, &bfl);
384 if ((error = copyout(&bfl, bfp, sizeof bfl)))
385 return error;
386 SCARG(&fca, fd) = fd;
387 SCARG(&fca, cmd) = F_GETLK;
388 SCARG(&fca, arg) = bfp;
389 if ((error = sys_fcntl(p, &fca, retval)))
390 return error;
391 if ((error = copyin(bfp, &bfl, sizeof bfl)))
392 return error;
393 bsd_to_linux_flock(&bfl, &lfl);
394 return copyout(&lfl, arg, sizeof lfl);
395 break;
396 case LINUX_F_SETLK:
397 case LINUX_F_SETLKW:
398 cmd = (cmd == LINUX_F_SETLK ? F_SETLK : F_SETLKW);
399 if ((error = copyin(arg, &lfl, sizeof lfl)))
400 return error;
401 linux_to_bsd_flock(&lfl, &bfl);
402 sg = stackgap_init(p->p_emul);
403 bfp = (struct flock *) stackgap_alloc(&sg, sizeof *bfp);
404 if ((error = copyout(&bfl, bfp, sizeof bfl)))
405 return error;
406 SCARG(&fca, fd) = fd;
407 SCARG(&fca, cmd) = cmd;
408 SCARG(&fca, arg) = bfp;
409 return sys_fcntl(p, &fca, retval);
410 break;
411 case LINUX_F_SETOWN:
412 case LINUX_F_GETOWN:
413 /*
414 * We need to route around the normal fcntl() for these calls,
415 * since it uses TIOC{G,S}PGRP, which is too restrictive for
416 * Linux F_{G,S}ETOWN semantics. For sockets, this problem
417 * does not exist.
418 */
419 fdp = p->p_fd;
420 if ((fp = fd_getfile(fdp, fd)) == NULL)
421 return EBADF;
422 if (fp->f_type == DTYPE_SOCKET) {
423 cmd = cmd == LINUX_F_SETOWN ? F_SETOWN : F_GETOWN;
424 break;
425 }
426 vp = (struct vnode *)fp->f_data;
427 if (vp->v_type != VCHR)
428 return EINVAL;
429 if ((error = VOP_GETATTR(vp, &va, p->p_ucred, p)))
430 return error;
431 d_tty = cdevsw[major(va.va_rdev)].d_tty;
432 if (!d_tty || (!(tp = (*d_tty)(va.va_rdev))))
433 return EINVAL;
434 if (cmd == LINUX_F_GETOWN) {
435 retval[0] = tp->t_pgrp ? tp->t_pgrp->pg_id : NO_PID;
436 return 0;
437 }
438 if ((long)arg <= 0) {
439 pgid = -(long)arg;
440 } else {
441 struct proc *p1 = pfind((long)arg);
442 if (p1 == 0)
443 return (ESRCH);
444 pgid = (long)p1->p_pgrp->pg_id;
445 }
446 pgrp = pgfind(pgid);
447 if (pgrp == NULL || pgrp->pg_session != p->p_session)
448 return EPERM;
449 tp->t_pgrp = pgrp;
450 return 0;
451 default:
452 return EOPNOTSUPP;
453 }
454
455 SCARG(&fca, fd) = fd;
456 SCARG(&fca, cmd) = cmd;
457 SCARG(&fca, arg) = arg;
458
459 return sys_fcntl(p, &fca, retval);
460 }
461
462 /*
463 * Convert a NetBSD stat structure to a Linux stat structure.
464 * Only the order of the fields and the padding in the structure
465 * is different. linux_fakedev is a machine-dependent function
466 * which optionally converts device driver major/minor numbers
467 * (XXX horrible, but what can you do against code that compares
468 * things against constant major device numbers? sigh)
469 */
470 static void
471 bsd_to_linux_stat(bsp, lsp)
472 struct stat *bsp;
473 struct linux_stat *lsp;
474 {
475
476 lsp->lst_dev = bsp->st_dev;
477 lsp->lst_ino = bsp->st_ino;
478 lsp->lst_mode = (linux_mode_t)bsp->st_mode;
479 if (bsp->st_nlink >= (1 << 15))
480 lsp->lst_nlink = (1 << 15) - 1;
481 else
482 lsp->lst_nlink = (linux_nlink_t)bsp->st_nlink;
483 lsp->lst_uid = bsp->st_uid;
484 lsp->lst_gid = bsp->st_gid;
485 lsp->lst_rdev = linux_fakedev(bsp->st_rdev);
486 lsp->lst_size = bsp->st_size;
487 lsp->lst_blksize = bsp->st_blksize;
488 lsp->lst_blocks = bsp->st_blocks;
489 lsp->lst_atime = bsp->st_atime;
490 lsp->lst_mtime = bsp->st_mtime;
491 lsp->lst_ctime = bsp->st_ctime;
492 }
493
494 /*
495 * The stat functions below are plain sailing. stat and lstat are handled
496 * by one function to avoid code duplication.
497 */
498 int
499 linux_sys_fstat(p, v, retval)
500 struct proc *p;
501 void *v;
502 register_t *retval;
503 {
504 struct linux_sys_fstat_args /* {
505 syscallarg(int) fd;
506 syscallarg(linux_stat *) sp;
507 } */ *uap = v;
508 struct sys___fstat13_args fsa;
509 struct linux_stat tmplst;
510 struct stat *st,tmpst;
511 caddr_t sg;
512 int error;
513
514 sg = stackgap_init(p->p_emul);
515
516 st = stackgap_alloc(&sg, sizeof (struct stat));
517
518 SCARG(&fsa, fd) = SCARG(uap, fd);
519 SCARG(&fsa, sb) = st;
520
521 if ((error = sys___fstat13(p, &fsa, retval)))
522 return error;
523
524 if ((error = copyin(st, &tmpst, sizeof tmpst)))
525 return error;
526
527 bsd_to_linux_stat(&tmpst, &tmplst);
528
529 if ((error = copyout(&tmplst, SCARG(uap, sp), sizeof tmplst)))
530 return error;
531
532 return 0;
533 }
534
535 static int
536 linux_stat1(p, v, retval, dolstat)
537 struct proc *p;
538 void *v;
539 register_t *retval;
540 int dolstat;
541 {
542 struct sys___stat13_args sa;
543 struct linux_stat tmplst;
544 struct stat *st, tmpst;
545 caddr_t sg;
546 int error;
547 struct linux_sys_stat_args *uap = v;
548
549 sg = stackgap_init(p->p_emul);
550 st = stackgap_alloc(&sg, sizeof (struct stat));
551 if (dolstat)
552 CHECK_ALT_SYMLINK(p, &sg, SCARG(uap, path));
553 else
554 CHECK_ALT_EXIST(p, &sg, SCARG(uap, path));
555
556 SCARG(&sa, ub) = st;
557 SCARG(&sa, path) = SCARG(uap, path);
558
559 if ((error = (dolstat ? sys___lstat13(p, &sa, retval) :
560 sys___stat13(p, &sa, retval))))
561 return error;
562
563 if ((error = copyin(st, &tmpst, sizeof tmpst)))
564 return error;
565
566 bsd_to_linux_stat(&tmpst, &tmplst);
567
568 if ((error = copyout(&tmplst, SCARG(uap, sp), sizeof tmplst)))
569 return error;
570
571 return 0;
572 }
573
574 int
575 linux_sys_stat(p, v, retval)
576 struct proc *p;
577 void *v;
578 register_t *retval;
579 {
580 struct linux_sys_stat_args /* {
581 syscallarg(const char *) path;
582 syscallarg(struct linux_stat *) sp;
583 } */ *uap = v;
584
585 return linux_stat1(p, uap, retval, 0);
586 }
587
588 /* Note: this is "newlstat" in the Linux sources */
589 /* (we don't bother with the old lstat currently) */
590 int
591 linux_sys_lstat(p, v, retval)
592 struct proc *p;
593 void *v;
594 register_t *retval;
595 {
596 struct linux_sys_lstat_args /* {
597 syscallarg(const char *) path;
598 syscallarg(struct linux_stat *) sp;
599 } */ *uap = v;
600
601 return linux_stat1(p, uap, retval, 1);
602 }
603
604 /*
605 * The following syscalls are mostly here because of the alternate path check.
606 */
607 int
608 linux_sys_access(p, v, retval)
609 struct proc *p;
610 void *v;
611 register_t *retval;
612 {
613 struct linux_sys_access_args /* {
614 syscallarg(const char *) path;
615 syscallarg(int) flags;
616 } */ *uap = v;
617 caddr_t sg = stackgap_init(p->p_emul);
618
619 CHECK_ALT_EXIST(p, &sg, SCARG(uap, path));
620
621 return sys_access(p, uap, retval);
622 }
623
624 int
625 linux_sys_unlink(p, v, retval)
626 struct proc *p;
627 void *v;
628 register_t *retval;
629
630 {
631 struct linux_sys_unlink_args /* {
632 syscallarg(const char *) path;
633 } */ *uap = v;
634 caddr_t sg = stackgap_init(p->p_emul);
635
636 CHECK_ALT_EXIST(p, &sg, SCARG(uap, path));
637
638 return sys_unlink(p, uap, retval);
639 }
640
641 int
642 linux_sys_chdir(p, v, retval)
643 struct proc *p;
644 void *v;
645 register_t *retval;
646 {
647 struct linux_sys_chdir_args /* {
648 syscallarg(const char *) path;
649 } */ *uap = v;
650 caddr_t sg = stackgap_init(p->p_emul);
651
652 CHECK_ALT_EXIST(p, &sg, SCARG(uap, path));
653
654 return sys_chdir(p, uap, retval);
655 }
656
657 int
658 linux_sys_mknod(p, v, retval)
659 struct proc *p;
660 void *v;
661 register_t *retval;
662 {
663 struct linux_sys_mknod_args /* {
664 syscallarg(const char *) path;
665 syscallarg(int) mode;
666 syscallarg(int) dev;
667 } */ *uap = v;
668 caddr_t sg = stackgap_init(p->p_emul);
669 struct sys_mkfifo_args bma;
670
671 CHECK_ALT_CREAT(p, &sg, SCARG(uap, path));
672
673 /*
674 * BSD handles FIFOs separately
675 */
676 if (SCARG(uap, mode) & S_IFIFO) {
677 SCARG(&bma, path) = SCARG(uap, path);
678 SCARG(&bma, mode) = SCARG(uap, mode);
679 return sys_mkfifo(p, uap, retval);
680 } else
681 return sys_mknod(p, uap, retval);
682 }
683
684 int
685 linux_sys_chmod(p, v, retval)
686 struct proc *p;
687 void *v;
688 register_t *retval;
689 {
690 struct linux_sys_chmod_args /* {
691 syscallarg(const char *) path;
692 syscallarg(int) mode;
693 } */ *uap = v;
694 caddr_t sg = stackgap_init(p->p_emul);
695
696 CHECK_ALT_EXIST(p, &sg, SCARG(uap, path));
697
698 return sys_chmod(p, uap, retval);
699 }
700
701 #if defined(__i386__) || defined(__m68k__)
702 int
703 linux_sys_chown16(p, v, retval)
704 struct proc *p;
705 void *v;
706 register_t *retval;
707 {
708 struct linux_sys_chown16_args /* {
709 syscallarg(const char *) path;
710 syscallarg(int) uid;
711 syscallarg(int) gid;
712 } */ *uap = v;
713 struct sys___posix_chown_args bca;
714 caddr_t sg = stackgap_init(p->p_emul);
715
716 CHECK_ALT_EXIST(p, &sg, SCARG(uap, path));
717
718 SCARG(&bca, path) = SCARG(uap, path);
719 SCARG(&bca, uid) = ((linux_uid_t)SCARG(uap, uid) == (linux_uid_t)-1) ?
720 (uid_t)-1 : SCARG(uap, uid);
721 SCARG(&bca, gid) = ((linux_gid_t)SCARG(uap, gid) == (linux_gid_t)-1) ?
722 (gid_t)-1 : SCARG(uap, gid);
723
724 return sys___posix_chown(p, &bca, retval);
725 }
726
727 int
728 linux_sys_fchown16(p, v, retval)
729 struct proc *p;
730 void *v;
731 register_t *retval;
732 {
733 struct linux_sys_fchown16_args /* {
734 syscallarg(int) fd;
735 syscallarg(int) uid;
736 syscallarg(int) gid;
737 } */ *uap = v;
738 struct sys___posix_fchown_args bfa;
739
740 SCARG(&bfa, fd) = SCARG(uap, fd);
741 SCARG(&bfa, uid) = ((linux_uid_t)SCARG(uap, uid) == (linux_uid_t)-1) ?
742 (uid_t)-1 : SCARG(uap, uid);
743 SCARG(&bfa, gid) = ((linux_gid_t)SCARG(uap, gid) == (linux_gid_t)-1) ?
744 (gid_t)-1 : SCARG(uap, gid);
745
746 return sys___posix_fchown(p, &bfa, retval);
747 }
748
749 int
750 linux_sys_lchown16(p, v, retval)
751 struct proc *p;
752 void *v;
753 register_t *retval;
754 {
755 struct linux_sys_lchown16_args /* {
756 syscallarg(char *) path;
757 syscallarg(int) uid;
758 syscallarg(int) gid;
759 } */ *uap = v;
760 struct sys___posix_lchown_args bla;
761 caddr_t sg = stackgap_init(p->p_emul);
762
763 CHECK_ALT_SYMLINK(p, &sg, SCARG(uap, path));
764
765 SCARG(&bla, path) = SCARG(uap, path);
766 SCARG(&bla, uid) = ((linux_uid_t)SCARG(uap, uid) == (linux_uid_t)-1) ?
767 (uid_t)-1 : SCARG(uap, uid);
768 SCARG(&bla, gid) = ((linux_gid_t)SCARG(uap, gid) == (linux_gid_t)-1) ?
769 (gid_t)-1 : SCARG(uap, gid);
770
771 return sys___posix_lchown(p, &bla, retval);
772 }
773 #endif /* __i386__ || __m68k__ */
774 #if defined (__i386__) || defined (__m68k__) || defined (__powerpc__)
775 int
776 linux_sys_chown(p, v, retval)
777 struct proc *p;
778 void *v;
779 register_t *retval;
780 {
781 struct linux_sys_chown_args /* {
782 syscallarg(char *) path;
783 syscallarg(int) uid;
784 syscallarg(int) gid;
785 } */ *uap = v;
786 caddr_t sg = stackgap_init(p->p_emul);
787
788 CHECK_ALT_EXIST(p, &sg, SCARG(uap, path));
789
790 return sys___posix_chown(p, uap, retval);
791 }
792
793 int
794 linux_sys_lchown(p, v, retval)
795 struct proc *p;
796 void *v;
797 register_t *retval;
798 {
799 struct linux_sys_lchown_args /* {
800 syscallarg(char *) path;
801 syscallarg(int) uid;
802 syscallarg(int) gid;
803 } */ *uap = v;
804 caddr_t sg = stackgap_init(p->p_emul);
805
806 CHECK_ALT_SYMLINK(p, &sg, SCARG(uap, path));
807
808 return sys___posix_lchown(p, uap, retval);
809 }
810 #endif /* __i386__ || __m68k__ || __powerpc__ */
811
812 int
813 linux_sys_rename(p, v, retval)
814 struct proc *p;
815 void *v;
816 register_t *retval;
817 {
818 struct linux_sys_rename_args /* {
819 syscallarg(const char *) from;
820 syscallarg(const char *) to;
821 } */ *uap = v;
822 caddr_t sg = stackgap_init(p->p_emul);
823
824 CHECK_ALT_EXIST(p, &sg, SCARG(uap, from));
825 CHECK_ALT_CREAT(p, &sg, SCARG(uap, to));
826
827 return sys___posix_rename(p, uap, retval);
828 }
829
830 int
831 linux_sys_mkdir(p, v, retval)
832 struct proc *p;
833 void *v;
834 register_t *retval;
835 {
836 struct linux_sys_mkdir_args /* {
837 syscallarg(const char *) path;
838 syscallarg(int) mode;
839 } */ *uap = v;
840 caddr_t sg = stackgap_init(p->p_emul);
841
842 CHECK_ALT_CREAT(p, &sg, SCARG(uap, path));
843
844 return sys_mkdir(p, uap, retval);
845 }
846
847 int
848 linux_sys_rmdir(p, v, retval)
849 struct proc *p;
850 void *v;
851 register_t *retval;
852 {
853 struct linux_sys_rmdir_args /* {
854 syscallarg(const char *) path;
855 } */ *uap = v;
856 caddr_t sg = stackgap_init(p->p_emul);
857
858 CHECK_ALT_EXIST(p, &sg, SCARG(uap, path));
859
860 return sys_rmdir(p, uap, retval);
861 }
862
863 int
864 linux_sys_symlink(p, v, retval)
865 struct proc *p;
866 void *v;
867 register_t *retval;
868 {
869 struct linux_sys_symlink_args /* {
870 syscallarg(const char *) path;
871 syscallarg(const char *) to;
872 } */ *uap = v;
873 caddr_t sg = stackgap_init(p->p_emul);
874
875 CHECK_ALT_EXIST(p, &sg, SCARG(uap, path));
876 CHECK_ALT_CREAT(p, &sg, SCARG(uap, to));
877
878 return sys_symlink(p, uap, retval);
879 }
880
881 int
882 linux_sys_link(p, v, retval)
883 struct proc *p;
884 void *v;
885 register_t *retval;
886 {
887 struct linux_sys_link_args /* {
888 syscallarg(const char *) path;
889 syscallarg(const char *) link;
890 } */ *uap = v;
891 caddr_t sg = stackgap_init(p->p_emul);
892
893 CHECK_ALT_EXIST(p, &sg, SCARG(uap, path));
894 CHECK_ALT_CREAT(p, &sg, SCARG(uap, link));
895
896 return sys_link(p, uap, retval);
897 }
898
899 int
900 linux_sys_readlink(p, v, retval)
901 struct proc *p;
902 void *v;
903 register_t *retval;
904 {
905 struct linux_sys_readlink_args /* {
906 syscallarg(const char *) name;
907 syscallarg(char *) buf;
908 syscallarg(int) count;
909 } */ *uap = v;
910 caddr_t sg = stackgap_init(p->p_emul);
911
912 CHECK_ALT_SYMLINK(p, &sg, SCARG(uap, name));
913
914 return sys_readlink(p, uap, retval);
915 }
916
917 int
918 linux_sys_truncate(p, v, retval)
919 struct proc *p;
920 void *v;
921 register_t *retval;
922 {
923 struct linux_sys_truncate_args /* {
924 syscallarg(const char *) path;
925 syscallarg(long) length;
926 } */ *uap = v;
927 caddr_t sg = stackgap_init(p->p_emul);
928
929 CHECK_ALT_EXIST(p, &sg, SCARG(uap, path));
930
931 return compat_43_sys_truncate(p, uap, retval);
932 }
933
934 /*
935 * This is just fsync() for now (just as it is in the Linux kernel)
936 * Note: this is not implemented under Linux on Alpha and Arm
937 * but should still be defined in our syscalls.master.
938 * (syscall #148 on the arm)
939 */
940 int
941 linux_sys_fdatasync(p, v, retval)
942 struct proc *p;
943 void *v;
944 register_t *retval;
945 {
946 #ifdef notdef
947 struct linux_sys_fdatasync_args /* {
948 syscallarg(int) fd;
949 } */ *uap = v;
950 #endif
951 return sys_fsync(p, v, retval);
952 }
953
954 /*
955 * pread(2).
956 */
957 int
958 linux_sys_pread(p, v, retval)
959 struct proc *p;
960 void *v;
961 register_t *retval;
962 {
963 struct linux_sys_pread_args /* {
964 syscallarg(int) fd;
965 syscallarg(void *) buf;
966 syscallarg(size_t) nbyte;
967 syscallarg(linux_off_t) offset;
968 } */ *uap = v;
969 struct sys_pread_args pra;
970
971 SCARG(&pra, fd) = SCARG(uap, fd);
972 SCARG(&pra, buf) = SCARG(uap, buf);
973 SCARG(&pra, nbyte) = SCARG(uap, nbyte);
974 SCARG(&pra, offset) = SCARG(uap, offset);
975
976 return sys_read(p, &pra, retval);
977 }
978
979 /*
980 * pwrite(2).
981 */
982 int
983 linux_sys_pwrite(p, v, retval)
984 struct proc *p;
985 void *v;
986 register_t *retval;
987 {
988 struct linux_sys_pwrite_args /* {
989 syscallarg(int) fd;
990 syscallarg(void *) buf;
991 syscallarg(size_t) nbyte;
992 syscallarg(linux_off_t) offset;
993 } */ *uap = v;
994 struct sys_pwrite_args pra;
995
996 SCARG(&pra, fd) = SCARG(uap, fd);
997 SCARG(&pra, buf) = SCARG(uap, buf);
998 SCARG(&pra, nbyte) = SCARG(uap, nbyte);
999 SCARG(&pra, offset) = SCARG(uap, offset);
1000
1001 return sys_write(p, &pra, retval);
1002 }
1003