linux_file.c revision 1.44 1 /* $NetBSD: linux_file.c,v 1.44 2002/01/14 23:14:42 bjh21 Exp $ */
2
3 /*-
4 * Copyright (c) 1995, 1998 The NetBSD Foundation, Inc.
5 * All rights reserved.
6 *
7 * This code is derived from software contributed to The NetBSD Foundation
8 * by Frank van der Linden and Eric Haszlakiewicz.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 * 3. All advertising materials mentioning features or use of this software
19 * must display the following acknowledgement:
20 * This product includes software developed by the NetBSD
21 * Foundation, Inc. and its contributors.
22 * 4. Neither the name of The NetBSD Foundation nor the names of its
23 * contributors may be used to endorse or promote products derived
24 * from this software without specific prior written permission.
25 *
26 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
27 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
28 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
29 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
30 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
31 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
32 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
33 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
34 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
35 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
36 * POSSIBILITY OF SUCH DAMAGE.
37 */
38
39 /*
40 * Functions in multiarch:
41 * linux_sys_llseek : linux_llseek.c
42 */
43
44 #include <sys/cdefs.h>
45 __KERNEL_RCSID(0, "$NetBSD: linux_file.c,v 1.44 2002/01/14 23:14:42 bjh21 Exp $");
46
47 #include <sys/param.h>
48 #include <sys/systm.h>
49 #include <sys/namei.h>
50 #include <sys/proc.h>
51 #include <sys/file.h>
52 #include <sys/stat.h>
53 #include <sys/filedesc.h>
54 #include <sys/ioctl.h>
55 #include <sys/kernel.h>
56 #include <sys/mount.h>
57 #include <sys/malloc.h>
58 #include <sys/vnode.h>
59 #include <sys/tty.h>
60 #include <sys/socketvar.h>
61 #include <sys/conf.h>
62 #include <sys/pipe.h>
63
64 #include <sys/syscallargs.h>
65
66 #include <compat/linux/common/linux_types.h>
67 #include <compat/linux/common/linux_signal.h>
68 #include <compat/linux/common/linux_fcntl.h>
69 #include <compat/linux/common/linux_util.h>
70 #include <compat/linux/common/linux_machdep.h>
71
72 #include <compat/linux/linux_syscallargs.h>
73
74 static int linux_to_bsd_ioflags __P((int));
75 static int bsd_to_linux_ioflags __P((int));
76 static void bsd_to_linux_flock __P((struct flock *, struct linux_flock *));
77 static void linux_to_bsd_flock __P((struct linux_flock *, struct flock *));
78 static void bsd_to_linux_stat __P((struct stat *, struct linux_stat *));
79 static int linux_stat1 __P((struct proc *, void *, register_t *, int));
80
81 /*
82 * Some file-related calls are handled here. The usual flag conversion
83 * an structure conversion is done, and alternate emul path searching.
84 */
85
86 /*
87 * The next two functions convert between the Linux and NetBSD values
88 * of the flags used in open(2) and fcntl(2).
89 */
90 static int
91 linux_to_bsd_ioflags(lflags)
92 int lflags;
93 {
94 int res = 0;
95
96 res |= cvtto_bsd_mask(lflags, LINUX_O_WRONLY, O_WRONLY);
97 res |= cvtto_bsd_mask(lflags, LINUX_O_RDONLY, O_RDONLY);
98 res |= cvtto_bsd_mask(lflags, LINUX_O_RDWR, O_RDWR);
99 res |= cvtto_bsd_mask(lflags, LINUX_O_CREAT, O_CREAT);
100 res |= cvtto_bsd_mask(lflags, LINUX_O_EXCL, O_EXCL);
101 res |= cvtto_bsd_mask(lflags, LINUX_O_NOCTTY, O_NOCTTY);
102 res |= cvtto_bsd_mask(lflags, LINUX_O_TRUNC, O_TRUNC);
103 res |= cvtto_bsd_mask(lflags, LINUX_O_NDELAY, O_NDELAY);
104 res |= cvtto_bsd_mask(lflags, LINUX_O_SYNC, O_FSYNC);
105 res |= cvtto_bsd_mask(lflags, LINUX_FASYNC, O_ASYNC);
106 res |= cvtto_bsd_mask(lflags, LINUX_O_APPEND, O_APPEND);
107
108 return res;
109 }
110
111 static int
112 bsd_to_linux_ioflags(bflags)
113 int bflags;
114 {
115 int res = 0;
116
117 res |= cvtto_linux_mask(bflags, O_WRONLY, LINUX_O_WRONLY);
118 res |= cvtto_linux_mask(bflags, O_RDONLY, LINUX_O_RDONLY);
119 res |= cvtto_linux_mask(bflags, O_RDWR, LINUX_O_RDWR);
120 res |= cvtto_linux_mask(bflags, O_CREAT, LINUX_O_CREAT);
121 res |= cvtto_linux_mask(bflags, O_EXCL, LINUX_O_EXCL);
122 res |= cvtto_linux_mask(bflags, O_NOCTTY, LINUX_O_NOCTTY);
123 res |= cvtto_linux_mask(bflags, O_TRUNC, LINUX_O_TRUNC);
124 res |= cvtto_linux_mask(bflags, O_NDELAY, LINUX_O_NDELAY);
125 res |= cvtto_linux_mask(bflags, O_FSYNC, LINUX_O_SYNC);
126 res |= cvtto_linux_mask(bflags, O_ASYNC, LINUX_FASYNC);
127 res |= cvtto_linux_mask(bflags, O_APPEND, LINUX_O_APPEND);
128
129 return res;
130 }
131
132 /*
133 * creat(2) is an obsolete function, but it's present as a Linux
134 * system call, so let's deal with it.
135 *
136 * Note: On the Alpha this doesn't really exist in Linux, but it's defined
137 * in syscalls.master anyway so this doesn't have to be special cased.
138 *
139 * Just call open(2) with the TRUNC, CREAT and WRONLY flags.
140 */
141 int
142 linux_sys_creat(p, v, retval)
143 struct proc *p;
144 void *v;
145 register_t *retval;
146 {
147 struct linux_sys_creat_args /* {
148 syscallarg(const char *) path;
149 syscallarg(int) mode;
150 } */ *uap = v;
151 struct sys_open_args oa;
152 caddr_t sg;
153
154 sg = stackgap_init(p->p_emul);
155 CHECK_ALT_CREAT(p, &sg, SCARG(uap, path));
156
157 SCARG(&oa, path) = SCARG(uap, path);
158 SCARG(&oa, flags) = O_CREAT | O_TRUNC | O_WRONLY;
159 SCARG(&oa, mode) = SCARG(uap, mode);
160
161 return sys_open(p, &oa, retval);
162 }
163
164 /*
165 * open(2). Take care of the different flag values, and let the
166 * NetBSD syscall do the real work. See if this operation
167 * gives the current process a controlling terminal.
168 * (XXX is this necessary?)
169 */
170 int
171 linux_sys_open(p, v, retval)
172 struct proc *p;
173 void *v;
174 register_t *retval;
175 {
176 struct linux_sys_open_args /* {
177 syscallarg(const char *) path;
178 syscallarg(int) flags;
179 syscallarg(int) mode;
180 } */ *uap = v;
181 int error, fl;
182 struct sys_open_args boa;
183 caddr_t sg;
184
185 sg = stackgap_init(p->p_emul);
186
187 fl = linux_to_bsd_ioflags(SCARG(uap, flags));
188
189 if (fl & O_CREAT)
190 CHECK_ALT_CREAT(p, &sg, SCARG(uap, path));
191 else
192 CHECK_ALT_EXIST(p, &sg, SCARG(uap, path));
193
194 SCARG(&boa, path) = SCARG(uap, path);
195 SCARG(&boa, flags) = fl;
196 SCARG(&boa, mode) = SCARG(uap, mode);
197
198 if ((error = sys_open(p, &boa, retval)))
199 return error;
200
201 /*
202 * this bit from sunos_misc.c (and svr4_fcntl.c).
203 * If we are a session leader, and we don't have a controlling
204 * terminal yet, and the O_NOCTTY flag is not set, try to make
205 * this the controlling terminal.
206 */
207 if (!(fl & O_NOCTTY) && SESS_LEADER(p) && !(p->p_flag & P_CONTROLT)) {
208 struct filedesc *fdp = p->p_fd;
209 struct file *fp;
210
211 fp = fd_getfile(fdp, *retval);
212
213 /* ignore any error, just give it a try */
214 if (fp != NULL && fp->f_type == DTYPE_VNODE)
215 (fp->f_ops->fo_ioctl) (fp, TIOCSCTTY, (caddr_t) 0, p);
216 }
217 return 0;
218 }
219
220 /*
221 * The next two functions take care of converting the flock
222 * structure back and forth between Linux and NetBSD format.
223 * The only difference in the structures is the order of
224 * the fields, and the 'whence' value.
225 */
226 static void
227 bsd_to_linux_flock(bfp, lfp)
228 struct flock *bfp;
229 struct linux_flock *lfp;
230 {
231
232 lfp->l_start = bfp->l_start;
233 lfp->l_len = bfp->l_len;
234 lfp->l_pid = bfp->l_pid;
235 lfp->l_whence = bfp->l_whence;
236 switch (bfp->l_type) {
237 case F_RDLCK:
238 lfp->l_type = LINUX_F_RDLCK;
239 break;
240 case F_UNLCK:
241 lfp->l_type = LINUX_F_UNLCK;
242 break;
243 case F_WRLCK:
244 lfp->l_type = LINUX_F_WRLCK;
245 break;
246 }
247 }
248
249 static void
250 linux_to_bsd_flock(lfp, bfp)
251 struct linux_flock *lfp;
252 struct flock *bfp;
253 {
254
255 bfp->l_start = lfp->l_start;
256 bfp->l_len = lfp->l_len;
257 bfp->l_pid = lfp->l_pid;
258 bfp->l_whence = lfp->l_whence;
259 switch (lfp->l_type) {
260 case LINUX_F_RDLCK:
261 bfp->l_type = F_RDLCK;
262 break;
263 case LINUX_F_UNLCK:
264 bfp->l_type = F_UNLCK;
265 break;
266 case LINUX_F_WRLCK:
267 bfp->l_type = F_WRLCK;
268 break;
269 }
270 }
271
272 /*
273 * Most actions in the fcntl() call are straightforward; simply
274 * pass control to the NetBSD system call. A few commands need
275 * conversions after the actual system call has done its work,
276 * because the flag values and lock structure are different.
277 */
278 int
279 linux_sys_fcntl(p, v, retval)
280 struct proc *p;
281 void *v;
282 register_t *retval;
283 {
284 struct linux_sys_fcntl_args /* {
285 syscallarg(int) fd;
286 syscallarg(int) cmd;
287 syscallarg(void *) arg;
288 } */ *uap = v;
289 int fd, cmd, error;
290 u_long val;
291 caddr_t arg, sg;
292 struct linux_flock lfl;
293 struct flock *bfp, bfl;
294 struct sys_fcntl_args fca;
295 struct filedesc *fdp;
296 struct file *fp;
297 struct vnode *vp;
298 struct vattr va;
299 long pgid;
300 struct pgrp *pgrp;
301 struct tty *tp, *(*d_tty) __P((dev_t));
302
303 fd = SCARG(uap, fd);
304 cmd = SCARG(uap, cmd);
305 arg = (caddr_t) SCARG(uap, arg);
306
307 switch (cmd) {
308 case LINUX_F_DUPFD:
309 cmd = F_DUPFD;
310 break;
311 case LINUX_F_GETFD:
312 cmd = F_GETFD;
313 break;
314 case LINUX_F_SETFD:
315 cmd = F_SETFD;
316 break;
317 case LINUX_F_GETFL:
318 SCARG(&fca, fd) = fd;
319 SCARG(&fca, cmd) = F_GETFL;
320 SCARG(&fca, arg) = arg;
321 if ((error = sys_fcntl(p, &fca, retval)))
322 return error;
323 retval[0] = bsd_to_linux_ioflags(retval[0]);
324 return 0;
325 case LINUX_F_SETFL: {
326 struct file *fp = NULL;
327
328 val = linux_to_bsd_ioflags((unsigned long)SCARG(uap, arg));
329
330 /*
331 * Linux seems to have same semantics for sending SIGIO to the
332 * read side of socket, but slighly different semantics
333 * for SIGIO to the write side. Rather than sending the SIGIO
334 * every time it's possible to write (directly) more data, it
335 * only sends SIGIO if last write(2) failed due to insufficient
336 * memory to hold the data. This is compatible enough
337 * with NetBSD semantics to not do anything about the
338 * difference.
339 *
340 * Linux does NOT send SIGIO for pipes. Deal with socketpair
341 * ones and DTYPE_PIPE ones. For these, we don't set
342 * the underlying flags (we don't pass O_ASYNC flag down
343 * to sys_fcntl()), but set the FASYNC flag for file descriptor,
344 * so that F_GETFL would report the ASYNC i/o is on.
345 */
346 if (val & O_ASYNC) {
347 if (((fp = fd_getfile(p->p_fd, fd)) == NULL))
348 return (EBADF);
349
350 FILE_USE(fp);
351
352 if (((fp->f_type == DTYPE_SOCKET) && fp->f_data
353 && ((struct socket *)fp->f_data)->so_state & SS_ISAPIPE)
354 || (fp->f_type == DTYPE_PIPE))
355 val &= ~O_ASYNC;
356 else {
357 /* not a pipe, do not modify anything */
358 FILE_UNUSE(fp, p);
359 fp = NULL;
360 }
361 }
362
363 SCARG(&fca, fd) = fd;
364 SCARG(&fca, cmd) = F_SETFL;
365 SCARG(&fca, arg) = (caddr_t) val;
366
367 error = sys_fcntl(p, &fca, retval);
368
369 /* Now set the FASYNC flag for pipes */
370 if (fp) {
371 if (!error)
372 fp->f_flag |= FASYNC;
373 FILE_UNUSE(fp, p);
374 }
375
376 return (error);
377 }
378 case LINUX_F_GETLK:
379 sg = stackgap_init(p->p_emul);
380 bfp = (struct flock *) stackgap_alloc(&sg, sizeof *bfp);
381 if ((error = copyin(arg, &lfl, sizeof lfl)))
382 return error;
383 linux_to_bsd_flock(&lfl, &bfl);
384 if ((error = copyout(&bfl, bfp, sizeof bfl)))
385 return error;
386 SCARG(&fca, fd) = fd;
387 SCARG(&fca, cmd) = F_GETLK;
388 SCARG(&fca, arg) = bfp;
389 if ((error = sys_fcntl(p, &fca, retval)))
390 return error;
391 if ((error = copyin(bfp, &bfl, sizeof bfl)))
392 return error;
393 bsd_to_linux_flock(&bfl, &lfl);
394 return copyout(&lfl, arg, sizeof lfl);
395 break;
396 case LINUX_F_SETLK:
397 case LINUX_F_SETLKW:
398 cmd = (cmd == LINUX_F_SETLK ? F_SETLK : F_SETLKW);
399 if ((error = copyin(arg, &lfl, sizeof lfl)))
400 return error;
401 linux_to_bsd_flock(&lfl, &bfl);
402 sg = stackgap_init(p->p_emul);
403 bfp = (struct flock *) stackgap_alloc(&sg, sizeof *bfp);
404 if ((error = copyout(&bfl, bfp, sizeof bfl)))
405 return error;
406 SCARG(&fca, fd) = fd;
407 SCARG(&fca, cmd) = cmd;
408 SCARG(&fca, arg) = bfp;
409 return sys_fcntl(p, &fca, retval);
410 break;
411 case LINUX_F_SETOWN:
412 case LINUX_F_GETOWN:
413 /*
414 * We need to route around the normal fcntl() for these calls,
415 * since it uses TIOC{G,S}PGRP, which is too restrictive for
416 * Linux F_{G,S}ETOWN semantics. For sockets, this problem
417 * does not exist.
418 */
419 fdp = p->p_fd;
420 if ((fp = fd_getfile(fdp, fd)) == NULL)
421 return EBADF;
422 if (fp->f_type == DTYPE_SOCKET) {
423 cmd = cmd == LINUX_F_SETOWN ? F_SETOWN : F_GETOWN;
424 break;
425 }
426 vp = (struct vnode *)fp->f_data;
427 if (vp->v_type != VCHR)
428 return EINVAL;
429 if ((error = VOP_GETATTR(vp, &va, p->p_ucred, p)))
430 return error;
431 d_tty = cdevsw[major(va.va_rdev)].d_tty;
432 if (!d_tty || (!(tp = (*d_tty)(va.va_rdev))))
433 return EINVAL;
434 if (cmd == LINUX_F_GETOWN) {
435 retval[0] = tp->t_pgrp ? tp->t_pgrp->pg_id : NO_PID;
436 return 0;
437 }
438 if ((long)arg <= 0) {
439 pgid = -(long)arg;
440 } else {
441 struct proc *p1 = pfind((long)arg);
442 if (p1 == 0)
443 return (ESRCH);
444 pgid = (long)p1->p_pgrp->pg_id;
445 }
446 pgrp = pgfind(pgid);
447 if (pgrp == NULL || pgrp->pg_session != p->p_session)
448 return EPERM;
449 tp->t_pgrp = pgrp;
450 return 0;
451 default:
452 return EOPNOTSUPP;
453 }
454
455 SCARG(&fca, fd) = fd;
456 SCARG(&fca, cmd) = cmd;
457 SCARG(&fca, arg) = arg;
458
459 return sys_fcntl(p, &fca, retval);
460 }
461
462 /*
463 * Convert a NetBSD stat structure to a Linux stat structure.
464 * Only the order of the fields and the padding in the structure
465 * is different. linux_fakedev is a machine-dependent function
466 * which optionally converts device driver major/minor numbers
467 * (XXX horrible, but what can you do against code that compares
468 * things against constant major device numbers? sigh)
469 */
470 static void
471 bsd_to_linux_stat(bsp, lsp)
472 struct stat *bsp;
473 struct linux_stat *lsp;
474 {
475
476 lsp->lst_dev = bsp->st_dev;
477 lsp->lst_ino = bsp->st_ino;
478 lsp->lst_mode = (linux_mode_t)bsp->st_mode;
479 if (bsp->st_nlink >= (1 << 15))
480 lsp->lst_nlink = (1 << 15) - 1;
481 else
482 lsp->lst_nlink = (linux_nlink_t)bsp->st_nlink;
483 lsp->lst_uid = bsp->st_uid;
484 lsp->lst_gid = bsp->st_gid;
485 lsp->lst_rdev = linux_fakedev(bsp->st_rdev);
486 lsp->lst_size = bsp->st_size;
487 lsp->lst_blksize = bsp->st_blksize;
488 lsp->lst_blocks = bsp->st_blocks;
489 lsp->lst_atime = bsp->st_atime;
490 lsp->lst_mtime = bsp->st_mtime;
491 lsp->lst_ctime = bsp->st_ctime;
492 }
493
494 /*
495 * The stat functions below are plain sailing. stat and lstat are handled
496 * by one function to avoid code duplication.
497 */
498 int
499 linux_sys_fstat(p, v, retval)
500 struct proc *p;
501 void *v;
502 register_t *retval;
503 {
504 struct linux_sys_fstat_args /* {
505 syscallarg(int) fd;
506 syscallarg(linux_stat *) sp;
507 } */ *uap = v;
508 struct sys___fstat13_args fsa;
509 struct linux_stat tmplst;
510 struct stat *st,tmpst;
511 caddr_t sg;
512 int error;
513
514 sg = stackgap_init(p->p_emul);
515
516 st = stackgap_alloc(&sg, sizeof (struct stat));
517
518 SCARG(&fsa, fd) = SCARG(uap, fd);
519 SCARG(&fsa, sb) = st;
520
521 if ((error = sys___fstat13(p, &fsa, retval)))
522 return error;
523
524 if ((error = copyin(st, &tmpst, sizeof tmpst)))
525 return error;
526
527 bsd_to_linux_stat(&tmpst, &tmplst);
528
529 if ((error = copyout(&tmplst, SCARG(uap, sp), sizeof tmplst)))
530 return error;
531
532 return 0;
533 }
534
535 static int
536 linux_stat1(p, v, retval, dolstat)
537 struct proc *p;
538 void *v;
539 register_t *retval;
540 int dolstat;
541 {
542 struct sys___stat13_args sa;
543 struct linux_stat tmplst;
544 struct stat *st, tmpst;
545 caddr_t sg;
546 int error;
547 struct linux_sys_stat_args *uap = v;
548
549 sg = stackgap_init(p->p_emul);
550 st = stackgap_alloc(&sg, sizeof (struct stat));
551 if (dolstat)
552 CHECK_ALT_SYMLINK(p, &sg, SCARG(uap, path));
553 else
554 CHECK_ALT_EXIST(p, &sg, SCARG(uap, path));
555
556 SCARG(&sa, ub) = st;
557 SCARG(&sa, path) = SCARG(uap, path);
558
559 if ((error = (dolstat ? sys___lstat13(p, &sa, retval) :
560 sys___stat13(p, &sa, retval))))
561 return error;
562
563 if ((error = copyin(st, &tmpst, sizeof tmpst)))
564 return error;
565
566 bsd_to_linux_stat(&tmpst, &tmplst);
567
568 if ((error = copyout(&tmplst, SCARG(uap, sp), sizeof tmplst)))
569 return error;
570
571 return 0;
572 }
573
574 int
575 linux_sys_stat(p, v, retval)
576 struct proc *p;
577 void *v;
578 register_t *retval;
579 {
580 struct linux_sys_stat_args /* {
581 syscallarg(const char *) path;
582 syscallarg(struct linux_stat *) sp;
583 } */ *uap = v;
584
585 return linux_stat1(p, uap, retval, 0);
586 }
587
588 /* Note: this is "newlstat" in the Linux sources */
589 /* (we don't bother with the old lstat currently) */
590 int
591 linux_sys_lstat(p, v, retval)
592 struct proc *p;
593 void *v;
594 register_t *retval;
595 {
596 struct linux_sys_lstat_args /* {
597 syscallarg(const char *) path;
598 syscallarg(struct linux_stat *) sp;
599 } */ *uap = v;
600
601 return linux_stat1(p, uap, retval, 1);
602 }
603
604 /*
605 * The following syscalls are mostly here because of the alternate path check.
606 */
607 int
608 linux_sys_access(p, v, retval)
609 struct proc *p;
610 void *v;
611 register_t *retval;
612 {
613 struct linux_sys_access_args /* {
614 syscallarg(const char *) path;
615 syscallarg(int) flags;
616 } */ *uap = v;
617 caddr_t sg = stackgap_init(p->p_emul);
618
619 CHECK_ALT_EXIST(p, &sg, SCARG(uap, path));
620
621 return sys_access(p, uap, retval);
622 }
623
624 int
625 linux_sys_unlink(p, v, retval)
626 struct proc *p;
627 void *v;
628 register_t *retval;
629
630 {
631 struct linux_sys_unlink_args /* {
632 syscallarg(const char *) path;
633 } */ *uap = v;
634 caddr_t sg = stackgap_init(p->p_emul);
635
636 CHECK_ALT_EXIST(p, &sg, SCARG(uap, path));
637
638 return sys_unlink(p, uap, retval);
639 }
640
641 int
642 linux_sys_chdir(p, v, retval)
643 struct proc *p;
644 void *v;
645 register_t *retval;
646 {
647 struct linux_sys_chdir_args /* {
648 syscallarg(const char *) path;
649 } */ *uap = v;
650 caddr_t sg = stackgap_init(p->p_emul);
651
652 CHECK_ALT_EXIST(p, &sg, SCARG(uap, path));
653
654 return sys_chdir(p, uap, retval);
655 }
656
657 int
658 linux_sys_mknod(p, v, retval)
659 struct proc *p;
660 void *v;
661 register_t *retval;
662 {
663 struct linux_sys_mknod_args /* {
664 syscallarg(const char *) path;
665 syscallarg(int) mode;
666 syscallarg(int) dev;
667 } */ *uap = v;
668 caddr_t sg = stackgap_init(p->p_emul);
669 struct sys_mkfifo_args bma;
670
671 CHECK_ALT_CREAT(p, &sg, SCARG(uap, path));
672
673 /*
674 * BSD handles FIFOs separately
675 */
676 if (SCARG(uap, mode) & S_IFIFO) {
677 SCARG(&bma, path) = SCARG(uap, path);
678 SCARG(&bma, mode) = SCARG(uap, mode);
679 return sys_mkfifo(p, uap, retval);
680 } else
681 return sys_mknod(p, uap, retval);
682 }
683
684 int
685 linux_sys_chmod(p, v, retval)
686 struct proc *p;
687 void *v;
688 register_t *retval;
689 {
690 struct linux_sys_chmod_args /* {
691 syscallarg(const char *) path;
692 syscallarg(int) mode;
693 } */ *uap = v;
694 caddr_t sg = stackgap_init(p->p_emul);
695
696 CHECK_ALT_EXIST(p, &sg, SCARG(uap, path));
697
698 return sys_chmod(p, uap, retval);
699 }
700
701 #if defined(__i386__) || defined(__m68k__) || defined(__arm__)
702 int
703 linux_sys_chown16(p, v, retval)
704 struct proc *p;
705 void *v;
706 register_t *retval;
707 {
708 struct linux_sys_chown16_args /* {
709 syscallarg(const char *) path;
710 syscallarg(int) uid;
711 syscallarg(int) gid;
712 } */ *uap = v;
713 struct sys___posix_chown_args bca;
714 caddr_t sg = stackgap_init(p->p_emul);
715
716 CHECK_ALT_EXIST(p, &sg, SCARG(uap, path));
717
718 SCARG(&bca, path) = SCARG(uap, path);
719 SCARG(&bca, uid) = ((linux_uid_t)SCARG(uap, uid) == (linux_uid_t)-1) ?
720 (uid_t)-1 : SCARG(uap, uid);
721 SCARG(&bca, gid) = ((linux_gid_t)SCARG(uap, gid) == (linux_gid_t)-1) ?
722 (gid_t)-1 : SCARG(uap, gid);
723
724 return sys___posix_chown(p, &bca, retval);
725 }
726
727 int
728 linux_sys_fchown16(p, v, retval)
729 struct proc *p;
730 void *v;
731 register_t *retval;
732 {
733 struct linux_sys_fchown16_args /* {
734 syscallarg(int) fd;
735 syscallarg(int) uid;
736 syscallarg(int) gid;
737 } */ *uap = v;
738 struct sys___posix_fchown_args bfa;
739
740 SCARG(&bfa, fd) = SCARG(uap, fd);
741 SCARG(&bfa, uid) = ((linux_uid_t)SCARG(uap, uid) == (linux_uid_t)-1) ?
742 (uid_t)-1 : SCARG(uap, uid);
743 SCARG(&bfa, gid) = ((linux_gid_t)SCARG(uap, gid) == (linux_gid_t)-1) ?
744 (gid_t)-1 : SCARG(uap, gid);
745
746 return sys___posix_fchown(p, &bfa, retval);
747 }
748
749 int
750 linux_sys_lchown16(p, v, retval)
751 struct proc *p;
752 void *v;
753 register_t *retval;
754 {
755 struct linux_sys_lchown16_args /* {
756 syscallarg(char *) path;
757 syscallarg(int) uid;
758 syscallarg(int) gid;
759 } */ *uap = v;
760 struct sys___posix_lchown_args bla;
761 caddr_t sg = stackgap_init(p->p_emul);
762
763 CHECK_ALT_SYMLINK(p, &sg, SCARG(uap, path));
764
765 SCARG(&bla, path) = SCARG(uap, path);
766 SCARG(&bla, uid) = ((linux_uid_t)SCARG(uap, uid) == (linux_uid_t)-1) ?
767 (uid_t)-1 : SCARG(uap, uid);
768 SCARG(&bla, gid) = ((linux_gid_t)SCARG(uap, gid) == (linux_gid_t)-1) ?
769 (gid_t)-1 : SCARG(uap, gid);
770
771 return sys___posix_lchown(p, &bla, retval);
772 }
773 #endif /* __i386__ || __m68k__ || __arm__ */
774 #if defined (__i386__) || defined (__m68k__) || \
775 defined (__powerpc__) || defined (__mips__) || defined(__arm__)
776 int
777 linux_sys_chown(p, v, retval)
778 struct proc *p;
779 void *v;
780 register_t *retval;
781 {
782 struct linux_sys_chown_args /* {
783 syscallarg(char *) path;
784 syscallarg(int) uid;
785 syscallarg(int) gid;
786 } */ *uap = v;
787 caddr_t sg = stackgap_init(p->p_emul);
788
789 CHECK_ALT_EXIST(p, &sg, SCARG(uap, path));
790
791 return sys___posix_chown(p, uap, retval);
792 }
793
794 int
795 linux_sys_lchown(p, v, retval)
796 struct proc *p;
797 void *v;
798 register_t *retval;
799 {
800 struct linux_sys_lchown_args /* {
801 syscallarg(char *) path;
802 syscallarg(int) uid;
803 syscallarg(int) gid;
804 } */ *uap = v;
805 caddr_t sg = stackgap_init(p->p_emul);
806
807 CHECK_ALT_SYMLINK(p, &sg, SCARG(uap, path));
808
809 return sys___posix_lchown(p, uap, retval);
810 }
811 #endif /* __i386__ || __m68k__ || __powerpc__ || __mips__ || __arm__ */
812
813 int
814 linux_sys_rename(p, v, retval)
815 struct proc *p;
816 void *v;
817 register_t *retval;
818 {
819 struct linux_sys_rename_args /* {
820 syscallarg(const char *) from;
821 syscallarg(const char *) to;
822 } */ *uap = v;
823 caddr_t sg = stackgap_init(p->p_emul);
824
825 CHECK_ALT_EXIST(p, &sg, SCARG(uap, from));
826 CHECK_ALT_CREAT(p, &sg, SCARG(uap, to));
827
828 return sys___posix_rename(p, uap, retval);
829 }
830
831 int
832 linux_sys_mkdir(p, v, retval)
833 struct proc *p;
834 void *v;
835 register_t *retval;
836 {
837 struct linux_sys_mkdir_args /* {
838 syscallarg(const char *) path;
839 syscallarg(int) mode;
840 } */ *uap = v;
841 caddr_t sg = stackgap_init(p->p_emul);
842
843 CHECK_ALT_CREAT(p, &sg, SCARG(uap, path));
844
845 return sys_mkdir(p, uap, retval);
846 }
847
848 int
849 linux_sys_rmdir(p, v, retval)
850 struct proc *p;
851 void *v;
852 register_t *retval;
853 {
854 struct linux_sys_rmdir_args /* {
855 syscallarg(const char *) path;
856 } */ *uap = v;
857 caddr_t sg = stackgap_init(p->p_emul);
858
859 CHECK_ALT_EXIST(p, &sg, SCARG(uap, path));
860
861 return sys_rmdir(p, uap, retval);
862 }
863
864 int
865 linux_sys_symlink(p, v, retval)
866 struct proc *p;
867 void *v;
868 register_t *retval;
869 {
870 struct linux_sys_symlink_args /* {
871 syscallarg(const char *) path;
872 syscallarg(const char *) to;
873 } */ *uap = v;
874 caddr_t sg = stackgap_init(p->p_emul);
875
876 CHECK_ALT_EXIST(p, &sg, SCARG(uap, path));
877 CHECK_ALT_CREAT(p, &sg, SCARG(uap, to));
878
879 return sys_symlink(p, uap, retval);
880 }
881
882 int
883 linux_sys_link(p, v, retval)
884 struct proc *p;
885 void *v;
886 register_t *retval;
887 {
888 struct linux_sys_link_args /* {
889 syscallarg(const char *) path;
890 syscallarg(const char *) link;
891 } */ *uap = v;
892 caddr_t sg = stackgap_init(p->p_emul);
893
894 CHECK_ALT_EXIST(p, &sg, SCARG(uap, path));
895 CHECK_ALT_CREAT(p, &sg, SCARG(uap, link));
896
897 return sys_link(p, uap, retval);
898 }
899
900 int
901 linux_sys_readlink(p, v, retval)
902 struct proc *p;
903 void *v;
904 register_t *retval;
905 {
906 struct linux_sys_readlink_args /* {
907 syscallarg(const char *) name;
908 syscallarg(char *) buf;
909 syscallarg(int) count;
910 } */ *uap = v;
911 caddr_t sg = stackgap_init(p->p_emul);
912
913 CHECK_ALT_SYMLINK(p, &sg, SCARG(uap, name));
914
915 return sys_readlink(p, uap, retval);
916 }
917
918 int
919 linux_sys_truncate(p, v, retval)
920 struct proc *p;
921 void *v;
922 register_t *retval;
923 {
924 struct linux_sys_truncate_args /* {
925 syscallarg(const char *) path;
926 syscallarg(long) length;
927 } */ *uap = v;
928 caddr_t sg = stackgap_init(p->p_emul);
929
930 CHECK_ALT_EXIST(p, &sg, SCARG(uap, path));
931
932 return compat_43_sys_truncate(p, uap, retval);
933 }
934
935 /*
936 * This is just fsync() for now (just as it is in the Linux kernel)
937 * Note: this is not implemented under Linux on Alpha and Arm
938 * but should still be defined in our syscalls.master.
939 * (syscall #148 on the arm)
940 */
941 int
942 linux_sys_fdatasync(p, v, retval)
943 struct proc *p;
944 void *v;
945 register_t *retval;
946 {
947 #ifdef notdef
948 struct linux_sys_fdatasync_args /* {
949 syscallarg(int) fd;
950 } */ *uap = v;
951 #endif
952 return sys_fsync(p, v, retval);
953 }
954
955 /*
956 * pread(2).
957 */
958 int
959 linux_sys_pread(p, v, retval)
960 struct proc *p;
961 void *v;
962 register_t *retval;
963 {
964 struct linux_sys_pread_args /* {
965 syscallarg(int) fd;
966 syscallarg(void *) buf;
967 syscallarg(size_t) nbyte;
968 syscallarg(linux_off_t) offset;
969 } */ *uap = v;
970 struct sys_pread_args pra;
971
972 SCARG(&pra, fd) = SCARG(uap, fd);
973 SCARG(&pra, buf) = SCARG(uap, buf);
974 SCARG(&pra, nbyte) = SCARG(uap, nbyte);
975 SCARG(&pra, offset) = SCARG(uap, offset);
976
977 return sys_read(p, &pra, retval);
978 }
979
980 /*
981 * pwrite(2).
982 */
983 int
984 linux_sys_pwrite(p, v, retval)
985 struct proc *p;
986 void *v;
987 register_t *retval;
988 {
989 struct linux_sys_pwrite_args /* {
990 syscallarg(int) fd;
991 syscallarg(void *) buf;
992 syscallarg(size_t) nbyte;
993 syscallarg(linux_off_t) offset;
994 } */ *uap = v;
995 struct sys_pwrite_args pra;
996
997 SCARG(&pra, fd) = SCARG(uap, fd);
998 SCARG(&pra, buf) = SCARG(uap, buf);
999 SCARG(&pra, nbyte) = SCARG(uap, nbyte);
1000 SCARG(&pra, offset) = SCARG(uap, offset);
1001
1002 return sys_write(p, &pra, retval);
1003 }
1004