1 /* $Id: sys_sunos32.c,v 1.64 2002/02/09 19:49:31 davem Exp $
2 * sys_sunos32.c: SunOS binary compatibility layer on sparc64.
4 * Copyright (C) 1995, 1996, 1997 David S. Miller (davem@caip.rutgers.edu)
5 * Copyright (C) 1995 Miguel de Icaza (miguel@nuclecu.unam.mx)
7 * Based upon preliminary work which is:
9 * Copyright (C) 1995 Adrian M. Rodriguez (adrian@remus.rutgers.edu)
12 #include <linux/kernel.h>
13 #include <linux/sched.h>
14 #include <linux/types.h>
15 #include <linux/capability.h>
16 #include <linux/compat.h>
17 #include <linux/mman.h>
19 #include <linux/swap.h>
21 #include <linux/file.h>
22 #include <linux/resource.h>
23 #include <linux/ipc.h>
24 #include <linux/shm.h>
25 #include <linux/msg.h>
26 #include <linux/sem.h>
27 #include <linux/signal.h>
28 #include <linux/uio.h>
29 #include <linux/utsname.h>
30 #include <linux/major.h>
31 #include <linux/stat.h>
32 #include <linux/slab.h>
33 #include <linux/pagemap.h>
34 #include <linux/errno.h>
35 #include <linux/smp.h>
36 #include <linux/smp_lock.h>
37 #include <linux/syscalls.h>
38 #include <linux/vs_cvirt.h>
40 #include <asm/uaccess.h>
42 #include <asm/pgtable.h>
43 #include <asm/pconf.h>
44 #include <asm/idprom.h> /* for gethostid() */
45 #include <asm/unistd.h>
46 #include <asm/system.h>
48 /* For the nfs mount emulation */
49 #include <linux/socket.h>
51 #include <linux/nfs.h>
52 #include <linux/nfs2.h>
53 #include <linux/nfs_mount.h>
55 /* for sunos_select */
56 #include <linux/time.h>
57 #include <linux/personality.h>
60 #include <linux/socket.h>
62 #include <net/compat.h>
64 #define SUNOS_NR_OPEN 256
66 asmlinkage u32 sunos_mmap(u32 addr, u32 len, u32 prot, u32 flags, u32 fd, u32 off)
68 struct file *file = NULL;
69 unsigned long retval, ret_type;
71 if (flags & MAP_NORESERVE) {
74 printk("%s: unimplemented SunOS MAP_NORESERVE mmap() flag\n",
76 flags &= ~MAP_NORESERVE;
79 if (!(flags & MAP_ANONYMOUS)) {
81 if (fd >= SUNOS_NR_OPEN)
86 inode = file->f_dentry->d_inode;
87 if (imajor(inode) == MEM_MAJOR && iminor(inode) == 5) {
88 flags |= MAP_ANONYMOUS;
95 if (!(flags & MAP_FIXED))
97 else if (len > 0xf0000000 || addr > 0xf0000000 - len)
99 ret_type = flags & _MAP_NEW;
102 flags &= ~(MAP_EXECUTABLE | MAP_DENYWRITE);
103 down_write(¤t->mm->mmap_sem);
104 retval = do_mmap(file,
105 (unsigned long) addr, (unsigned long) len,
106 (unsigned long) prot, (unsigned long) flags,
107 (unsigned long) off);
108 up_write(¤t->mm->mmap_sem);
110 retval = ((retval < 0xf0000000) ? 0 : retval);
118 asmlinkage int sunos_mctl(u32 addr, u32 len, int function, u32 arg)
123 asmlinkage int sunos_brk(u32 baddr)
125 int freepages, retval = -ENOMEM;
127 unsigned long newbrk, oldbrk, brk = (unsigned long) baddr;
129 down_write(¤t->mm->mmap_sem);
130 if (brk < current->mm->end_code)
132 newbrk = PAGE_ALIGN(brk);
133 oldbrk = PAGE_ALIGN(current->mm->brk);
135 if (oldbrk == newbrk) {
136 current->mm->brk = brk;
139 /* Always allow shrinking brk. */
140 if (brk <= current->mm->brk) {
141 current->mm->brk = brk;
142 do_munmap(current->mm, newbrk, oldbrk-newbrk);
145 /* Check against rlimit and stack.. */
147 rlim = current->signal->rlim[RLIMIT_DATA].rlim_cur;
148 if (rlim >= RLIM_INFINITY)
150 if (brk - current->mm->end_code > rlim)
152 /* Check against existing mmap mappings. */
153 if (find_vma_intersection(current->mm, oldbrk, newbrk+PAGE_SIZE))
155 /* stupid algorithm to decide if we have enough memory: while
156 * simple, it hopefully works in most obvious cases.. Easy to
157 * fool it, but this should catch most mistakes.
159 freepages = global_page_state(NR_FILE_PAGES);
161 freepages += nr_free_pages();
162 freepages += nr_swap_pages;
163 freepages -= num_physpages >> 4;
164 freepages -= (newbrk-oldbrk) >> PAGE_SHIFT;
167 /* Ok, we have probably got enough memory - let it rip. */
168 current->mm->brk = brk;
169 do_brk(oldbrk, newbrk-oldbrk);
172 up_write(¤t->mm->mmap_sem);
176 asmlinkage u32 sunos_sbrk(int increment)
180 /* This should do it hopefully... */
181 oldbrk = (int)current->mm->brk;
182 error = sunos_brk(((int) current->mm->brk) + increment);
188 asmlinkage u32 sunos_sstk(int increment)
190 printk("%s: Call to sunos_sstk(increment<%d>) is unsupported\n",
191 current->comm, increment);
196 /* Give hints to the kernel as to what paging strategy to use...
197 * Completely bogus, don't remind me.
199 #define VA_NORMAL 0 /* Normal vm usage expected */
200 #define VA_ABNORMAL 1 /* Abnormal/random vm usage probable */
201 #define VA_SEQUENTIAL 2 /* Accesses will be of a sequential nature */
202 #define VA_INVALIDATE 3 /* Page table entries should be flushed ??? */
203 static char *vstrings[] = {
210 asmlinkage void sunos_vadvise(u32 strategy)
214 /* I wanna see who uses this... */
216 printk("%s: Advises us to use %s paging strategy\n",
218 strategy <= 3 ? vstrings[strategy] : "BOGUS");
221 /* This just wants the soft limit (ie. rlim_cur element) of the RLIMIT_NOFILE
222 * resource limit and is for backwards compatibility with older sunos
225 asmlinkage int sunos_getdtablesize(void)
227 return SUNOS_NR_OPEN;
231 #define _BLOCKABLE (~(sigmask(SIGKILL) | sigmask(SIGSTOP)))
233 asmlinkage u32 sunos_sigblock(u32 blk_mask)
237 spin_lock_irq(¤t->sighand->siglock);
238 old = (u32) current->blocked.sig[0];
239 current->blocked.sig[0] |= (blk_mask & _BLOCKABLE);
241 spin_unlock_irq(¤t->sighand->siglock);
245 asmlinkage u32 sunos_sigsetmask(u32 newmask)
249 spin_lock_irq(¤t->sighand->siglock);
250 retval = (u32) current->blocked.sig[0];
251 current->blocked.sig[0] = (newmask & _BLOCKABLE);
253 spin_unlock_irq(¤t->sighand->siglock);
257 /* SunOS getdents is very similar to the newer Linux (iBCS2 compliant) */
258 /* getdents system call, the format of the structure just has a different */
259 /* layout (d_off+d_ino instead of d_ino+d_off) */
260 struct sunos_dirent {
268 struct sunos_dirent_callback {
269 struct sunos_dirent __user *curr;
270 struct sunos_dirent __user *previous;
275 #define NAME_OFFSET(de) ((int) ((de)->d_name - (char __user *) (de)))
276 #define ROUND_UP(x) (((x)+sizeof(s32)-1) & ~(sizeof(s32)-1))
278 static int sunos_filldir(void * __buf, const char * name, int namlen,
279 loff_t offset, ino_t ino, unsigned int d_type)
281 struct sunos_dirent __user *dirent;
282 struct sunos_dirent_callback * buf = (struct sunos_dirent_callback *) __buf;
283 int reclen = ROUND_UP(NAME_OFFSET(dirent) + namlen + 1);
286 buf->error = -EINVAL; /* only used if we fail.. */
287 if (reclen > buf->count)
290 if (sizeof(d_ino) < sizeof(ino) && d_ino != ino)
292 dirent = buf->previous;
294 put_user(offset, &dirent->d_off);
296 buf->previous = dirent;
297 put_user(d_ino, &dirent->d_ino);
298 put_user(namlen, &dirent->d_namlen);
299 put_user(reclen, &dirent->d_reclen);
300 if (copy_to_user(dirent->d_name, name, namlen))
302 put_user(0, dirent->d_name + namlen);
303 dirent = (void __user *) dirent + reclen;
305 buf->count -= reclen;
309 asmlinkage int sunos_getdents(unsigned int fd, void __user *dirent, int cnt)
312 struct sunos_dirent __user *lastdirent;
313 struct sunos_dirent_callback buf;
316 if (fd >= SUNOS_NR_OPEN)
324 if (cnt < (sizeof(struct sunos_dirent) + 255))
327 buf.curr = (struct sunos_dirent __user *) dirent;
332 error = vfs_readdir(file, sunos_filldir, &buf);
336 lastdirent = buf.previous;
339 put_user(file->f_pos, &lastdirent->d_off);
340 error = cnt - buf.count;
349 /* Old sunos getdirentries, severely broken compatibility stuff here. */
350 struct sunos_direntry {
357 struct sunos_direntry_callback {
358 struct sunos_direntry __user *curr;
359 struct sunos_direntry __user *previous;
364 static int sunos_filldirentry(void * __buf, const char * name, int namlen,
365 loff_t offset, ino_t ino, unsigned int d_type)
367 struct sunos_direntry __user *dirent;
368 struct sunos_direntry_callback * buf =
369 (struct sunos_direntry_callback *) __buf;
370 int reclen = ROUND_UP(NAME_OFFSET(dirent) + namlen + 1);
373 buf->error = -EINVAL; /* only used if we fail.. */
374 if (reclen > buf->count)
377 if (sizeof(d_ino) < sizeof(ino) && d_ino != ino)
379 dirent = buf->previous;
381 buf->previous = dirent;
382 put_user(d_ino, &dirent->d_ino);
383 put_user(namlen, &dirent->d_namlen);
384 put_user(reclen, &dirent->d_reclen);
385 if (copy_to_user(dirent->d_name, name, namlen))
387 put_user(0, dirent->d_name + namlen);
388 dirent = (void __user *) dirent + reclen;
390 buf->count -= reclen;
394 asmlinkage int sunos_getdirentries(unsigned int fd,
397 unsigned int __user *basep)
400 struct sunos_direntry __user *lastdirent;
402 struct sunos_direntry_callback buf;
404 if (fd >= SUNOS_NR_OPEN)
412 if (cnt < (sizeof(struct sunos_direntry) + 255))
415 buf.curr = (struct sunos_direntry __user *) dirent;
420 error = vfs_readdir(file, sunos_filldirentry, &buf);
424 lastdirent = buf.previous;
427 put_user(file->f_pos, basep);
428 error = cnt - buf.count;
437 struct sunos_utsname {
446 asmlinkage int sunos_uname(struct sunos_utsname __user *name)
449 struct new_utsname *ptr;
452 ptr = vx_new_utsname();
453 ret = copy_to_user(&name->sname[0], ptr->sysname,
454 sizeof(name->sname) - 1);
455 ret |= copy_to_user(&name->nname[0], ptr->nodename,
456 sizeof(name->nname) - 1);
457 ret |= put_user('\0', &name->nname[8]);
458 ret |= copy_to_user(&name->rel[0], ptr->release,
459 sizeof(name->rel) - 1);
460 ret |= copy_to_user(&name->ver[0], ptr->version,
461 sizeof(name->ver) - 1);
462 ret |= copy_to_user(&name->mach[0], ptr->machine,
463 sizeof(name->mach) - 1);
465 return (ret ? -EFAULT : 0);
468 asmlinkage int sunos_nosys(void)
470 struct pt_regs *regs;
474 regs = current_thread_info()->kregs;
475 if (test_thread_flag(TIF_32BIT)) {
476 regs->tpc &= 0xffffffff;
477 regs->tnpc &= 0xffffffff;
479 info.si_signo = SIGSYS;
481 info.si_code = __SI_FAULT|0x100;
482 info.si_addr = (void __user *)regs->tpc;
483 info.si_trapno = regs->u_regs[UREG_G1];
484 send_sig_info(SIGSYS, &info, current);
486 printk("Process makes ni_syscall number %d, register dump:\n",
487 (int) regs->u_regs[UREG_G1]);
493 /* This is not a real and complete implementation yet, just to keep
494 * the easy SunOS binaries happy.
496 asmlinkage int sunos_fpathconf(int fd, int name)
519 case _PCONF_CHRESTRICT: /* XXX Investigate XXX */
522 case _PCONF_NOTRUNC: /* XXX Investigate XXX */
523 case _PCONF_VDISABLE:
533 asmlinkage int sunos_pathconf(u32 u_path, int name)
537 ret = sunos_fpathconf(0, name); /* XXX cheese XXX */
541 asmlinkage int sunos_select(int width, u32 inp, u32 outp, u32 exp, u32 tvp_x)
545 /* SunOS binaries expect that select won't change the tvp contents */
546 ret = compat_sys_select(width, compat_ptr(inp), compat_ptr(outp),
547 compat_ptr(exp), compat_ptr(tvp_x));
548 if (ret == -EINTR && tvp_x) {
549 struct compat_timeval __user *tvp = compat_ptr(tvp_x);
552 __get_user(sec, &tvp->tv_sec);
553 __get_user(usec, &tvp->tv_usec);
554 if (sec == 0 && usec == 0)
560 asmlinkage void sunos_nop(void)
565 #if 0 /* This code doesn't translate user pointers correctly,
566 * disable for now. -DaveM
569 /* XXXXXXXXXX SunOS mount/umount. XXXXXXXXXXX */
570 #define SMNT_RDONLY 1
571 #define SMNT_NOSUID 2
572 #define SMNT_NEWTYPE 4
574 #define SMNT_REMOUNT 16
575 #define SMNT_NOSUB 32
576 #define SMNT_MULTI 64
577 #define SMNT_SYS5 128
580 char fh_data [NFS_FHSIZE];
583 struct sunos_nfs_mount_args {
584 struct sockaddr_in *addr; /* file server address */
585 struct nfs_fh *fh; /* File handle to be mounted */
586 int flags; /* flags */
587 int wsize; /* write size in bytes */
588 int rsize; /* read size in bytes */
589 int timeo; /* initial timeout in .1 secs */
590 int retrans; /* times to retry send */
591 char *hostname; /* server's hostname */
592 int acregmin; /* attr cache file min secs */
593 int acregmax; /* attr cache file max secs */
594 int acdirmin; /* attr cache dir min secs */
595 int acdirmax; /* attr cache dir max secs */
596 char *netname; /* server's netname */
600 /* Bind the socket on a local reserved port and connect it to the
601 * remote server. This on Linux/i386 is done by the mount program,
604 /* XXXXXXXXXXXXXXXXXXXX */
606 sunos_nfs_get_server_fd (int fd, struct sockaddr_in *addr)
608 struct sockaddr_in local;
609 struct sockaddr_in server;
612 struct socket *socket;
620 inode = file->f_dentry->d_inode;
622 socket = SOCKET_I(inode);
623 local.sin_family = AF_INET;
624 local.sin_addr.s_addr = INADDR_ANY;
626 /* IPPORT_RESERVED = 1024, can't find the definition in the kernel */
629 local.sin_port = htons (--try_port);
630 ret = socket->ops->bind(socket, (struct sockaddr*)&local,
632 } while (ret && try_port > (1024 / 2));
639 server.sin_family = AF_INET;
640 server.sin_addr = addr->sin_addr;
641 server.sin_port = NFS_PORT;
643 /* Call sys_connect */
644 ret = socket->ops->connect (socket, (struct sockaddr *) &server,
645 sizeof (server), file->f_flags);
652 /* XXXXXXXXXXXXXXXXXXXX */
653 static int get_default (int value, int def_value)
661 /* XXXXXXXXXXXXXXXXXXXX */
662 static int sunos_nfs_mount(char *dir_name, int linux_flags, void __user *data)
665 char *the_name, *mount_page;
666 struct nfs_mount_data linux_nfs_mount;
667 struct sunos_nfs_mount_args sunos_mount;
669 /* Ok, here comes the fun part: Linux's nfs mount needs a
670 * socket connection to the server, but SunOS mount does not
671 * require this, so we use the information on the destination
672 * address to create a socket and bind it to a reserved
673 * port on this system
675 if (copy_from_user(&sunos_mount, data, sizeof(sunos_mount)))
678 server_fd = sys_socket (AF_INET, SOCK_DGRAM, IPPROTO_UDP);
682 if (copy_from_user(&linux_nfs_mount.addr, sunos_mount.addr,
683 sizeof(*sunos_mount.addr)) ||
684 copy_from_user(&linux_nfs_mount.root, sunos_mount.fh,
685 sizeof(*sunos_mount.fh))) {
686 sys_close (server_fd);
690 if (!sunos_nfs_get_server_fd (server_fd, &linux_nfs_mount.addr)){
691 sys_close (server_fd);
695 /* Now, bind it to a locally reserved port */
696 linux_nfs_mount.version = NFS_MOUNT_VERSION;
697 linux_nfs_mount.flags = sunos_mount.flags;
698 linux_nfs_mount.fd = server_fd;
700 linux_nfs_mount.rsize = get_default (sunos_mount.rsize, 8192);
701 linux_nfs_mount.wsize = get_default (sunos_mount.wsize, 8192);
702 linux_nfs_mount.timeo = get_default (sunos_mount.timeo, 10);
703 linux_nfs_mount.retrans = sunos_mount.retrans;
705 linux_nfs_mount.acregmin = sunos_mount.acregmin;
706 linux_nfs_mount.acregmax = sunos_mount.acregmax;
707 linux_nfs_mount.acdirmin = sunos_mount.acdirmin;
708 linux_nfs_mount.acdirmax = sunos_mount.acdirmax;
710 the_name = getname(sunos_mount.hostname);
711 if (IS_ERR(the_name))
712 return PTR_ERR(the_name);
714 strlcpy(linux_nfs_mount.hostname, the_name,
715 sizeof(linux_nfs_mount.hostname));
718 mount_page = (char *) get_zeroed_page(GFP_KERNEL);
722 memcpy(mount_page, &linux_nfs_mount, sizeof(linux_nfs_mount));
724 err = do_mount("", dir_name, "nfs", linux_flags, mount_page);
726 free_page((unsigned long) mount_page);
730 /* XXXXXXXXXXXXXXXXXXXX */
732 sunos_mount(char *type, char *dir, int flags, void *data)
737 char *dir_page, *type_page;
739 if (!capable (CAP_SYS_ADMIN))
742 /* We don't handle the integer fs type */
743 if ((flags & SMNT_NEWTYPE) == 0)
746 /* Do not allow for those flags we don't support */
747 if (flags & (SMNT_GRPID|SMNT_NOSUB|SMNT_MULTI|SMNT_SYS5))
750 if (flags & SMNT_REMOUNT)
751 linux_flags |= MS_REMOUNT;
752 if (flags & SMNT_RDONLY)
753 linux_flags |= MS_RDONLY;
754 if (flags & SMNT_NOSUID)
755 linux_flags |= MS_NOSUID;
757 dir_page = getname(dir);
758 ret = PTR_ERR(dir_page);
759 if (IS_ERR(dir_page))
762 type_page = getname(type);
763 ret = PTR_ERR(type_page);
764 if (IS_ERR(type_page))
767 if (strcmp(type_page, "ext2") == 0) {
768 dev_fname = getname(data);
769 } else if (strcmp(type_page, "iso9660") == 0) {
770 dev_fname = getname(data);
771 } else if (strcmp(type_page, "minix") == 0) {
772 dev_fname = getname(data);
773 } else if (strcmp(type_page, "nfs") == 0) {
774 ret = sunos_nfs_mount (dir_page, flags, data);
776 } else if (strcmp(type_page, "ufs") == 0) {
777 printk("Warning: UFS filesystem mounts unsupported.\n");
780 } else if (strcmp(type_page, "proc")) {
784 ret = PTR_ERR(dev_fname);
785 if (IS_ERR(dev_fname))
788 ret = do_mount(dev_fname, dir_page, type_page, linux_flags, NULL);
801 asmlinkage int sunos_setpgrp(pid_t pid, pid_t pgid)
806 if ((!pid || pid == current->pid) &&
811 ret = sys_setpgid(pid, pgid);
817 extern long compat_sys_wait4(compat_pid_t, compat_uint_t __user *, int,
818 struct compat_rusage __user *);
820 asmlinkage int sunos_wait4(compat_pid_t pid, compat_uint_t __user *stat_addr, int options, struct compat_rusage __user *ru)
824 ret = compat_sys_wait4((pid ? pid : ((compat_pid_t)-1)),
825 stat_addr, options, ru);
829 extern int kill_pg(int, int, int);
830 asmlinkage int sunos_killpg(int pgrp, int sig)
832 return kill_pg(pgrp, sig, 0);
835 asmlinkage int sunos_audit(void)
837 printk ("sys_audit\n");
841 asmlinkage u32 sunos_gethostid(void)
845 ret = (((u32)idprom->id_machtype << 24) | ((u32)idprom->id_sernum));
850 /* sysconf options, for SunOS compatibility */
851 #define _SC_ARG_MAX 1
852 #define _SC_CHILD_MAX 2
853 #define _SC_CLK_TCK 3
854 #define _SC_NGROUPS_MAX 4
855 #define _SC_OPEN_MAX 5
856 #define _SC_JOB_CONTROL 6
857 #define _SC_SAVED_IDS 7
858 #define _SC_VERSION 8
860 asmlinkage s32 sunos_sysconf (int name)
869 ret = -1; /* no limit */
874 case _SC_NGROUPS_MAX:
880 case _SC_JOB_CONTROL:
881 ret = 1; /* yes, we do support job control */
884 ret = 1; /* yes, we do support saved uids */
887 /* mhm, POSIX_VERSION is in /usr/include/unistd.h
888 * should it go on /usr/include/linux?
899 asmlinkage int sunos_semsys(int op, u32 arg1, u32 arg2, u32 arg3, void __user *ptr)
906 /* Most arguments match on a 1:1 basis but cmd doesn't */
924 /* value to modify semaphore to */
926 ret = sys_semctl((int)arg1, (int)arg2, (int)arg3, arg4);
930 ret = sys_semget((key_t)arg1, (int)arg2, (int)arg3);
934 ret = sys_semop((int)arg1, (struct sembuf __user *)(unsigned long)arg2,
935 (unsigned int) arg3);
962 struct ipc_perm32 msg_perm;
965 compat_time_t msg_stime;
966 compat_time_t msg_rtime;
967 compat_time_t msg_ctime;
970 unsigned short msg_cbytes;
971 unsigned short msg_qnum;
972 unsigned short msg_qbytes;
973 compat_ipc_pid_t msg_lspid;
974 compat_ipc_pid_t msg_lrpid;
977 static inline int sunos_msqid_get(struct msqid_ds32 __user *user,
978 struct msqid_ds *kern)
980 if (get_user(kern->msg_perm.key, &user->msg_perm.key) ||
981 __get_user(kern->msg_perm.uid, &user->msg_perm.uid) ||
982 __get_user(kern->msg_perm.gid, &user->msg_perm.gid) ||
983 __get_user(kern->msg_perm.cuid, &user->msg_perm.cuid) ||
984 __get_user(kern->msg_perm.cgid, &user->msg_perm.cgid) ||
985 __get_user(kern->msg_stime, &user->msg_stime) ||
986 __get_user(kern->msg_rtime, &user->msg_rtime) ||
987 __get_user(kern->msg_ctime, &user->msg_ctime) ||
988 __get_user(kern->msg_ctime, &user->msg_cbytes) ||
989 __get_user(kern->msg_ctime, &user->msg_qnum) ||
990 __get_user(kern->msg_ctime, &user->msg_qbytes) ||
991 __get_user(kern->msg_ctime, &user->msg_lspid) ||
992 __get_user(kern->msg_ctime, &user->msg_lrpid))
997 static inline int sunos_msqid_put(struct msqid_ds32 __user *user,
998 struct msqid_ds *kern)
1000 if (put_user(kern->msg_perm.key, &user->msg_perm.key) ||
1001 __put_user(kern->msg_perm.uid, &user->msg_perm.uid) ||
1002 __put_user(kern->msg_perm.gid, &user->msg_perm.gid) ||
1003 __put_user(kern->msg_perm.cuid, &user->msg_perm.cuid) ||
1004 __put_user(kern->msg_perm.cgid, &user->msg_perm.cgid) ||
1005 __put_user(kern->msg_stime, &user->msg_stime) ||
1006 __put_user(kern->msg_rtime, &user->msg_rtime) ||
1007 __put_user(kern->msg_ctime, &user->msg_ctime) ||
1008 __put_user(kern->msg_ctime, &user->msg_cbytes) ||
1009 __put_user(kern->msg_ctime, &user->msg_qnum) ||
1010 __put_user(kern->msg_ctime, &user->msg_qbytes) ||
1011 __put_user(kern->msg_ctime, &user->msg_lspid) ||
1012 __put_user(kern->msg_ctime, &user->msg_lrpid))
1017 static inline int sunos_msgbuf_get(struct msgbuf32 __user *user, struct msgbuf *kern, int len)
1019 if (get_user(kern->mtype, &user->mtype) ||
1020 __copy_from_user(kern->mtext, &user->mtext, len))
1025 static inline int sunos_msgbuf_put(struct msgbuf32 __user *user, struct msgbuf *kern, int len)
1027 if (put_user(kern->mtype, &user->mtype) ||
1028 __copy_to_user(user->mtext, kern->mtext, len))
1033 asmlinkage int sunos_msgsys(int op, u32 arg1, u32 arg2, u32 arg3, u32 arg4)
1035 struct sparc_stackf32 __user *sp;
1036 struct msqid_ds kds;
1037 struct msgbuf *kmbuf;
1038 mm_segment_t old_fs = get_fs();
1044 rval = sys_msgget((key_t)arg1, (int)arg2);
1047 if (!sunos_msqid_get((struct msqid_ds32 __user *)(unsigned long)arg3, &kds)) {
1049 rval = sys_msgctl((int)arg1, (int)arg2,
1050 (struct msqid_ds __user *)(unsigned long)arg3);
1053 rval = sunos_msqid_put((struct msqid_ds32 __user *)(unsigned long)arg3,
1060 kmbuf = (struct msgbuf *)kmalloc(sizeof(struct msgbuf) + arg3,
1064 sp = (struct sparc_stackf32 __user *)
1065 (current_thread_info()->kregs->u_regs[UREG_FP] & 0xffffffffUL);
1066 if (get_user(arg5, &sp->xxargs[0])) {
1072 rval = sys_msgrcv((int)arg1, (struct msgbuf __user *) kmbuf,
1074 (long)arg4, (int)arg5);
1077 rval = sunos_msgbuf_put((struct msgbuf32 __user *)(unsigned long)arg2,
1083 kmbuf = (struct msgbuf *)kmalloc(sizeof(struct msgbuf) + arg3,
1085 if (!kmbuf || sunos_msgbuf_get((struct msgbuf32 __user *)(unsigned long)arg2,
1089 rval = sys_msgsnd((int)arg1, (struct msgbuf __user *) kmbuf,
1090 (size_t)arg3, (int)arg4);
1102 struct ipc_perm32 shm_perm;
1104 compat_time_t shm_atime;
1105 compat_time_t shm_dtime;
1106 compat_time_t shm_ctime;
1107 compat_ipc_pid_t shm_cpid;
1108 compat_ipc_pid_t shm_lpid;
1109 unsigned short shm_nattch;
1112 static inline int sunos_shmid_get(struct shmid_ds32 __user *user,
1113 struct shmid_ds *kern)
1115 if (get_user(kern->shm_perm.key, &user->shm_perm.key) ||
1116 __get_user(kern->shm_perm.uid, &user->shm_perm.uid) ||
1117 __get_user(kern->shm_perm.gid, &user->shm_perm.gid) ||
1118 __get_user(kern->shm_perm.cuid, &user->shm_perm.cuid) ||
1119 __get_user(kern->shm_perm.cgid, &user->shm_perm.cgid) ||
1120 __get_user(kern->shm_segsz, &user->shm_segsz) ||
1121 __get_user(kern->shm_atime, &user->shm_atime) ||
1122 __get_user(kern->shm_dtime, &user->shm_dtime) ||
1123 __get_user(kern->shm_ctime, &user->shm_ctime) ||
1124 __get_user(kern->shm_cpid, &user->shm_cpid) ||
1125 __get_user(kern->shm_lpid, &user->shm_lpid) ||
1126 __get_user(kern->shm_nattch, &user->shm_nattch))
1131 static inline int sunos_shmid_put(struct shmid_ds32 __user *user,
1132 struct shmid_ds *kern)
1134 if (put_user(kern->shm_perm.key, &user->shm_perm.key) ||
1135 __put_user(kern->shm_perm.uid, &user->shm_perm.uid) ||
1136 __put_user(kern->shm_perm.gid, &user->shm_perm.gid) ||
1137 __put_user(kern->shm_perm.cuid, &user->shm_perm.cuid) ||
1138 __put_user(kern->shm_perm.cgid, &user->shm_perm.cgid) ||
1139 __put_user(kern->shm_segsz, &user->shm_segsz) ||
1140 __put_user(kern->shm_atime, &user->shm_atime) ||
1141 __put_user(kern->shm_dtime, &user->shm_dtime) ||
1142 __put_user(kern->shm_ctime, &user->shm_ctime) ||
1143 __put_user(kern->shm_cpid, &user->shm_cpid) ||
1144 __put_user(kern->shm_lpid, &user->shm_lpid) ||
1145 __put_user(kern->shm_nattch, &user->shm_nattch))
1150 asmlinkage int sunos_shmsys(int op, u32 arg1, u32 arg2, u32 arg3)
1152 struct shmid_ds ksds;
1153 unsigned long raddr;
1154 mm_segment_t old_fs = get_fs();
1159 /* do_shmat(): attach a shared memory area */
1160 rval = do_shmat((int)arg1,(char __user *)(unsigned long)arg2,(int)arg3,&raddr);
1165 /* sys_shmctl(): modify shared memory area attr. */
1166 if (!sunos_shmid_get((struct shmid_ds32 __user *)(unsigned long)arg3, &ksds)) {
1168 rval = sys_shmctl((int) arg1,(int) arg2,
1169 (struct shmid_ds __user *) &ksds);
1172 rval = sunos_shmid_put((struct shmid_ds32 __user *)(unsigned long)arg3,
1178 /* sys_shmdt(): detach a shared memory area */
1179 rval = sys_shmdt((char __user *)(unsigned long)arg1);
1182 /* sys_shmget(): get a shared memory area */
1183 rval = sys_shmget((key_t)arg1,(int)arg2,(int)arg3);
1192 extern asmlinkage long sparc32_open(const char __user * filename, int flags, int mode);
1194 asmlinkage int sunos_open(u32 fname, int flags, int mode)
1196 const char __user *filename = compat_ptr(fname);
1198 return sparc32_open(filename, flags, mode);
1201 #define SUNOS_EWOULDBLOCK 35
1203 /* see the sunos man page read(2v) for an explanation
1204 of this garbage. We use O_NDELAY to mark
1205 file descriptors that have been set non-blocking
1206 using 4.2BSD style calls. (tridge) */
1208 static inline int check_nonblock(int ret, int fd)
1210 if (ret == -EAGAIN) {
1211 struct file * file = fget(fd);
1213 if (file->f_flags & O_NDELAY)
1214 ret = -SUNOS_EWOULDBLOCK;
1221 asmlinkage int sunos_read(unsigned int fd, char __user *buf, u32 count)
1225 ret = check_nonblock(sys_read(fd, buf, count), fd);
1229 asmlinkage int sunos_readv(u32 fd, void __user *vector, s32 count)
1233 ret = check_nonblock(compat_sys_readv(fd, vector, count), fd);
1237 asmlinkage int sunos_write(unsigned int fd, char __user *buf, u32 count)
1241 ret = check_nonblock(sys_write(fd, buf, count), fd);
1245 asmlinkage int sunos_writev(u32 fd, void __user *vector, s32 count)
1249 ret = check_nonblock(compat_sys_writev(fd, vector, count), fd);
1253 asmlinkage int sunos_recv(u32 __fd, void __user *ubuf, int size, unsigned flags)
1255 int ret, fd = (int) __fd;
1257 ret = check_nonblock(sys_recv(fd, ubuf, size, flags), fd);
1261 asmlinkage int sunos_send(u32 __fd, void __user *buff, int len, unsigned flags)
1263 int ret, fd = (int) __fd;
1265 ret = check_nonblock(sys_send(fd, buff, len, flags), fd);
1269 asmlinkage int sunos_accept(u32 __fd, struct sockaddr __user *sa, int __user *addrlen)
1271 int ret, fd = (int) __fd;
1274 ret = check_nonblock(sys_accept(fd, sa, addrlen), fd);
1275 if (ret != -ENETUNREACH && ret != -EHOSTUNREACH)
1281 #define SUNOS_SV_INTERRUPT 2
1283 asmlinkage int sunos_sigaction (int sig,
1284 struct old_sigaction32 __user *act,
1285 struct old_sigaction32 __user *oact)
1287 struct k_sigaction new_ka, old_ka;
1291 compat_old_sigset_t mask;
1294 if (get_user(u_handler, &act->sa_handler) ||
1295 __get_user(new_ka.sa.sa_flags, &act->sa_flags))
1297 new_ka.sa.sa_handler = compat_ptr(u_handler);
1298 __get_user(mask, &act->sa_mask);
1299 new_ka.sa.sa_restorer = NULL;
1300 new_ka.ka_restorer = NULL;
1301 siginitset(&new_ka.sa.sa_mask, mask);
1302 new_ka.sa.sa_flags ^= SUNOS_SV_INTERRUPT;
1305 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
1308 old_ka.sa.sa_flags ^= SUNOS_SV_INTERRUPT;
1309 if (put_user(ptr_to_compat(old_ka.sa.sa_handler), &oact->sa_handler) ||
1310 __put_user(old_ka.sa.sa_flags, &oact->sa_flags))
1312 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask);
1318 asmlinkage int sunos_setsockopt(u32 __fd, u32 __level, u32 __optname,
1319 char __user *optval, u32 __optlen)
1321 int fd = (int) __fd;
1322 int level = (int) __level;
1323 int optname = (int) __optname;
1324 int optlen = (int) __optlen;
1325 int tr_opt = optname;
1328 if (level == SOL_IP) {
1329 /* Multicast socketopts (ttl, membership) */
1330 if (tr_opt >=2 && tr_opt <= 6)
1333 ret = sys_setsockopt(fd, level, tr_opt,
1338 asmlinkage int sunos_getsockopt(u32 __fd, u32 __level, u32 __optname,
1339 char __user *optval, int __user *optlen)
1341 int fd = (int) __fd;
1342 int level = (int) __level;
1343 int optname = (int) __optname;
1344 int tr_opt = optname;
1347 if (level == SOL_IP) {
1348 /* Multicast socketopts (ttl, membership) */
1349 if (tr_opt >=2 && tr_opt <= 6)
1352 ret = compat_sys_getsockopt(fd, level, tr_opt,