Import 2.4.0-test3pre5
[davej-history.git] / arch / sparc64 / kernel / sys_sunos32.c
blob4d2a9173d447f80755c3949d433f225aa520f726
1 /* $Id: sys_sunos32.c,v 1.51 2000/07/06 01:41:29 davem Exp $
2 * sys_sunos32.c: SunOS binary compatability layer on sparc64.
4 * Copyright (C) 1995, 1996, 1997 David S. Miller (davem@caip.rutgers.edu)
5 * Copyright (C) 1995 Miguel de Icaza (miguel@nuclecu.unam.mx)
7 * Based upon preliminary work which is:
9 * Copyright (C) 1995 Adrian M. Rodriguez (adrian@remus.rutgers.edu)
12 #include <linux/kernel.h>
13 #include <linux/sched.h>
14 #include <linux/types.h>
15 #include <linux/mman.h>
16 #include <linux/mm.h>
17 #include <linux/swap.h>
18 #include <linux/fs.h>
19 #include <linux/file.h>
20 #include <linux/resource.h>
21 #include <linux/ipc.h>
22 #include <linux/shm.h>
23 #include <linux/msg.h>
24 #include <linux/sem.h>
25 #include <linux/signal.h>
26 #include <linux/uio.h>
27 #include <linux/utsname.h>
28 #include <linux/major.h>
29 #include <linux/stat.h>
30 #include <linux/malloc.h>
31 #include <linux/pagemap.h>
32 #include <linux/errno.h>
33 #include <linux/smp.h>
34 #include <linux/smp_lock.h>
36 #include <asm/uaccess.h>
37 #include <asm/page.h>
38 #include <asm/pgtable.h>
39 #include <asm/pconf.h>
40 #include <asm/idprom.h> /* for gethostid() */
41 #include <asm/unistd.h>
42 #include <asm/system.h>
44 /* For the nfs mount emulation */
45 #include <linux/socket.h>
46 #include <linux/in.h>
47 #include <linux/nfs.h>
48 #include <linux/nfs2.h>
49 #include <linux/nfs_mount.h>
51 /* for sunos_select */
52 #include <linux/time.h>
53 #include <linux/personality.h>
55 /* Use this to get at 32-bit user passed pointers. */
56 #define A(__x) \
57 ({ unsigned long __ret; \
58 __asm__ ("srl %0, 0, %0" \
59 : "=r" (__ret) \
60 : "0" (__x)); \
61 __ret; \
64 #define SUNOS_NR_OPEN 256
66 asmlinkage u32 sunos_mmap(u32 addr, u32 len, u32 prot, u32 flags, u32 fd, u32 off)
68 struct file *file = NULL;
69 unsigned long retval, ret_type;
71 if(flags & MAP_NORESERVE) {
72 static int cnt;
73 if (cnt++ < 10)
74 printk("%s: unimplemented SunOS MAP_NORESERVE mmap() flag\n",
75 current->comm);
76 flags &= ~MAP_NORESERVE;
78 retval = -EBADF;
79 if(!(flags & MAP_ANONYMOUS)) {
80 struct inode * inode;
81 if(fd >= SUNOS_NR_OPEN)
82 goto out;
83 file = fget(fd);
84 if (!file)
85 goto out;
86 inode = file->f_dentry->d_inode;
87 if(MAJOR(inode->i_rdev)==MEM_MAJOR && MINOR(inode->i_rdev)==5) {
88 flags |= MAP_ANONYMOUS;
89 fput(file);
90 file = NULL;
94 retval = -EINVAL;
95 if(!(flags & MAP_FIXED))
96 addr = 0;
97 else if (len > 0xf0000000 || addr > 0xf0000000 - len)
98 goto out_putf;
99 ret_type = flags & _MAP_NEW;
100 flags &= ~_MAP_NEW;
102 flags &= ~(MAP_EXECUTABLE | MAP_DENYWRITE);
103 down(&current->mm->mmap_sem);
104 retval = do_mmap(file,
105 (unsigned long) addr, (unsigned long) len,
106 (unsigned long) prot, (unsigned long) flags,
107 (unsigned long) off);
108 up(&current->mm->mmap_sem);
109 if(!ret_type)
110 retval = ((retval < 0xf0000000) ? 0 : retval);
111 out_putf:
112 if (file)
113 fput(file);
114 out:
115 return (u32) retval;
118 asmlinkage int sunos_mctl(u32 addr, u32 len, int function, u32 arg)
120 return 0;
123 asmlinkage int sunos_brk(u32 baddr)
125 int freepages, retval = -ENOMEM;
126 unsigned long rlim;
127 unsigned long newbrk, oldbrk, brk = (unsigned long) baddr;
129 down(&current->mm->mmap_sem);
130 if (brk < current->mm->end_code)
131 goto out;
132 newbrk = PAGE_ALIGN(brk);
133 oldbrk = PAGE_ALIGN(current->mm->brk);
134 retval = 0;
135 if (oldbrk == newbrk) {
136 current->mm->brk = brk;
137 goto out;
139 /* Always allow shrinking brk. */
140 if (brk <= current->mm->brk) {
141 current->mm->brk = brk;
142 do_munmap(current->mm, newbrk, oldbrk-newbrk);
143 goto out;
145 /* Check against rlimit and stack.. */
146 retval = -ENOMEM;
147 rlim = current->rlim[RLIMIT_DATA].rlim_cur;
148 if (rlim >= RLIM_INFINITY)
149 rlim = ~0;
150 if (brk - current->mm->end_code > rlim)
151 goto out;
152 /* Check against existing mmap mappings. */
153 if (find_vma_intersection(current->mm, oldbrk, newbrk+PAGE_SIZE))
154 goto out;
155 /* stupid algorithm to decide if we have enough memory: while
156 * simple, it hopefully works in most obvious cases.. Easy to
157 * fool it, but this should catch most mistakes.
159 freepages = atomic_read(&buffermem_pages) >> PAGE_SHIFT;
160 freepages += atomic_read(&page_cache_size);
161 freepages >>= 1;
162 freepages += nr_free_pages();
163 freepages += nr_swap_pages;
164 freepages -= num_physpages >> 4;
165 freepages -= (newbrk-oldbrk) >> PAGE_SHIFT;
166 if (freepages < 0)
167 goto out;
168 /* Ok, we have probably got enough memory - let it rip. */
169 current->mm->brk = brk;
170 do_brk(oldbrk, newbrk-oldbrk);
171 retval = 0;
172 out:
173 up(&current->mm->mmap_sem);
174 return retval;
177 asmlinkage u32 sunos_sbrk(int increment)
179 int error, oldbrk;
181 /* This should do it hopefully... */
182 lock_kernel();
183 oldbrk = (int)current->mm->brk;
184 error = sunos_brk(((int) current->mm->brk) + increment);
185 if(!error)
186 error = oldbrk;
187 unlock_kernel();
188 return error;
191 asmlinkage u32 sunos_sstk(int increment)
193 lock_kernel();
194 printk("%s: Call to sunos_sstk(increment<%d>) is unsupported\n",
195 current->comm, increment);
196 unlock_kernel();
197 return (u32)-1;
200 /* Give hints to the kernel as to what paging strategy to use...
201 * Completely bogus, don't remind me.
203 #define VA_NORMAL 0 /* Normal vm usage expected */
204 #define VA_ABNORMAL 1 /* Abnormal/random vm usage probable */
205 #define VA_SEQUENTIAL 2 /* Accesses will be of a sequential nature */
206 #define VA_INVALIDATE 3 /* Page table entries should be flushed ??? */
207 static char *vstrings[] = {
208 "VA_NORMAL",
209 "VA_ABNORMAL",
210 "VA_SEQUENTIAL",
211 "VA_INVALIDATE",
214 asmlinkage void sunos_vadvise(u32 strategy)
216 /* I wanna see who uses this... */
217 lock_kernel();
218 printk("%s: Advises us to use %s paging strategy\n",
219 current->comm,
220 strategy <= 3 ? vstrings[strategy] : "BOGUS");
221 unlock_kernel();
224 /* This just wants the soft limit (ie. rlim_cur element) of the RLIMIT_NOFILE
225 * resource limit and is for backwards compatibility with older sunos
226 * revs.
228 asmlinkage int sunos_getdtablesize(void)
230 return SUNOS_NR_OPEN;
234 #define _BLOCKABLE (~(sigmask(SIGKILL) | sigmask(SIGSTOP)))
236 asmlinkage u32 sunos_sigblock(u32 blk_mask)
238 u32 old;
240 spin_lock_irq(&current->sigmask_lock);
241 old = (u32) current->blocked.sig[0];
242 current->blocked.sig[0] |= (blk_mask & _BLOCKABLE);
243 recalc_sigpending(current);
244 spin_unlock_irq(&current->sigmask_lock);
245 return old;
248 asmlinkage u32 sunos_sigsetmask(u32 newmask)
250 u32 retval;
252 spin_lock_irq(&current->sigmask_lock);
253 retval = (u32) current->blocked.sig[0];
254 current->blocked.sig[0] = (newmask & _BLOCKABLE);
255 recalc_sigpending(current);
256 spin_unlock_irq(&current->sigmask_lock);
257 return retval;
260 /* SunOS getdents is very similar to the newer Linux (iBCS2 compliant) */
261 /* getdents system call, the format of the structure just has a different */
262 /* layout (d_off+d_ino instead of d_ino+d_off) */
263 struct sunos_dirent {
264 s32 d_off;
265 u32 d_ino;
266 u16 d_reclen;
267 u16 d_namlen;
268 char d_name[1];
271 struct sunos_dirent_callback {
272 struct sunos_dirent *curr;
273 struct sunos_dirent *previous;
274 int count;
275 int error;
278 #define NAME_OFFSET(de) ((int) ((de)->d_name - (char *) (de)))
279 #define ROUND_UP(x) (((x)+sizeof(s32)-1) & ~(sizeof(s32)-1))
281 static int sunos_filldir(void * __buf, const char * name, int namlen,
282 off_t offset, ino_t ino)
284 struct sunos_dirent * dirent;
285 struct sunos_dirent_callback * buf = (struct sunos_dirent_callback *) __buf;
286 int reclen = ROUND_UP(NAME_OFFSET(dirent) + namlen + 1);
288 buf->error = -EINVAL; /* only used if we fail.. */
289 if (reclen > buf->count)
290 return -EINVAL;
291 dirent = buf->previous;
292 if (dirent)
293 put_user(offset, &dirent->d_off);
294 dirent = buf->curr;
295 buf->previous = dirent;
296 put_user(ino, &dirent->d_ino);
297 put_user(namlen, &dirent->d_namlen);
298 put_user(reclen, &dirent->d_reclen);
299 copy_to_user(dirent->d_name, name, namlen);
300 put_user(0, dirent->d_name + namlen);
301 ((char *) dirent) += reclen;
302 buf->curr = dirent;
303 buf->count -= reclen;
304 return 0;
307 asmlinkage int sunos_getdents(unsigned int fd, u32 u_dirent, int cnt)
309 struct file * file;
310 struct sunos_dirent * lastdirent;
311 struct sunos_dirent_callback buf;
312 int error = -EBADF;
313 void *dirent = (void *)A(u_dirent);
315 if(fd >= SUNOS_NR_OPEN)
316 goto out;
318 file = fget(fd);
319 if(!file)
320 goto out;
322 error = -EINVAL;
323 if(cnt < (sizeof(struct sunos_dirent) + 255))
324 goto out_putf;
326 buf.curr = (struct sunos_dirent *) dirent;
327 buf.previous = NULL;
328 buf.count = cnt;
329 buf.error = 0;
331 error = vfs_readdir(file, sunos_filldir, &buf);
332 if (error < 0)
333 goto out_putf;
335 lastdirent = buf.previous;
336 error = buf.error;
337 if (lastdirent) {
338 put_user(file->f_pos, &lastdirent->d_off);
339 error = cnt - buf.count;
342 out_putf:
343 fput(file);
344 out:
345 return error;
348 /* Old sunos getdirentries, severely broken compatibility stuff here. */
349 struct sunos_direntry {
350 u32 d_ino;
351 u16 d_reclen;
352 u16 d_namlen;
353 char d_name[1];
356 struct sunos_direntry_callback {
357 struct sunos_direntry *curr;
358 struct sunos_direntry *previous;
359 int count;
360 int error;
363 static int sunos_filldirentry(void * __buf, const char * name, int namlen,
364 off_t offset, ino_t ino)
366 struct sunos_direntry * dirent;
367 struct sunos_direntry_callback * buf = (struct sunos_direntry_callback *) __buf;
368 int reclen = ROUND_UP(NAME_OFFSET(dirent) + namlen + 1);
370 buf->error = -EINVAL; /* only used if we fail.. */
371 if (reclen > buf->count)
372 return -EINVAL;
373 dirent = buf->previous;
374 dirent = buf->curr;
375 buf->previous = dirent;
376 put_user(ino, &dirent->d_ino);
377 put_user(namlen, &dirent->d_namlen);
378 put_user(reclen, &dirent->d_reclen);
379 copy_to_user(dirent->d_name, name, namlen);
380 put_user(0, dirent->d_name + namlen);
381 ((char *) dirent) += reclen;
382 buf->curr = dirent;
383 buf->count -= reclen;
384 return 0;
387 asmlinkage int sunos_getdirentries(unsigned int fd, u32 u_dirent,
388 int cnt, u32 u_basep)
390 void *dirent = (void *) A(u_dirent);
391 unsigned int *basep = (unsigned int *)A(u_basep);
392 struct file * file;
393 struct sunos_direntry * lastdirent;
394 int error = -EBADF;
395 struct sunos_direntry_callback buf;
397 if(fd >= SUNOS_NR_OPEN)
398 goto out;
400 file = fget(fd);
401 if(!file)
402 goto out;
404 error = -EINVAL;
405 if(cnt < (sizeof(struct sunos_direntry) + 255))
406 goto out_putf;
408 buf.curr = (struct sunos_direntry *) dirent;
409 buf.previous = NULL;
410 buf.count = cnt;
411 buf.error = 0;
413 error = vfs_readdir(file, sunos_filldirentry, &buf);
414 if (error < 0)
415 goto out_putf;
417 lastdirent = buf.previous;
418 error = buf.error;
419 if (lastdirent) {
420 put_user(file->f_pos, basep);
421 error = cnt - buf.count;
424 out_putf:
425 fput(file);
426 out:
427 return error;
430 struct sunos_utsname {
431 char sname[9];
432 char nname[9];
433 char nnext[56];
434 char rel[9];
435 char ver[9];
436 char mach[9];
439 asmlinkage int sunos_uname(struct sunos_utsname *name)
441 int ret;
443 down_read(&uts_sem);
444 ret = copy_to_user(&name->sname[0], &system_utsname.sysname[0], sizeof(name->sname) - 1);
445 ret |= copy_to_user(&name->nname[0], &system_utsname.nodename[0], sizeof(name->nname) - 1);
446 ret |= put_user('\0', &name->nname[8]);
447 ret |= copy_to_user(&name->rel[0], &system_utsname.release[0], sizeof(name->rel) - 1);
448 ret |= copy_to_user(&name->ver[0], &system_utsname.version[0], sizeof(name->ver) - 1);
449 ret |= copy_to_user(&name->mach[0], &system_utsname.machine[0], sizeof(name->mach) - 1);
450 up_read(&uts_sem);
451 return ret;
454 asmlinkage int sunos_nosys(void)
456 struct pt_regs *regs;
457 siginfo_t info;
458 static int cnt;
460 lock_kernel();
461 regs = current->thread.kregs;
462 info.si_signo = SIGSYS;
463 info.si_errno = 0;
464 info.si_code = __SI_FAULT|0x100;
465 info.si_addr = (void *)regs->tpc;
466 info.si_trapno = regs->u_regs[UREG_G1];
467 send_sig_info(SIGSYS, &info, current);
468 if (cnt++ < 4) {
469 printk("Process makes ni_syscall number %d, register dump:\n",
470 (int) regs->u_regs[UREG_G1]);
471 show_regs(regs);
473 unlock_kernel();
474 return -ENOSYS;
477 /* This is not a real and complete implementation yet, just to keep
478 * the easy SunOS binaries happy.
480 asmlinkage int sunos_fpathconf(int fd, int name)
482 int ret;
484 lock_kernel();
485 switch(name) {
486 case _PCONF_LINK:
487 ret = LINK_MAX;
488 break;
489 case _PCONF_CANON:
490 ret = MAX_CANON;
491 break;
492 case _PCONF_INPUT:
493 ret = MAX_INPUT;
494 break;
495 case _PCONF_NAME:
496 ret = NAME_MAX;
497 break;
498 case _PCONF_PATH:
499 ret = PATH_MAX;
500 break;
501 case _PCONF_PIPE:
502 ret = PIPE_BUF;
503 break;
504 case _PCONF_CHRESTRICT: /* XXX Investigate XXX */
505 ret = 1;
506 break;
507 case _PCONF_NOTRUNC: /* XXX Investigate XXX */
508 case _PCONF_VDISABLE:
509 ret = 0;
510 break;
511 default:
512 ret = -EINVAL;
513 break;
515 unlock_kernel();
516 return ret;
519 asmlinkage int sunos_pathconf(u32 u_path, int name)
521 int ret;
523 lock_kernel();
524 ret = sunos_fpathconf(0, name); /* XXX cheese XXX */
525 unlock_kernel();
526 return ret;
529 /* SunOS mount system call emulation */
530 extern asmlinkage int
531 sys32_select(int n, u32 inp, u32 outp, u32 exp, u32 tvp);
533 struct timeval32
535 int tv_sec, tv_usec;
538 asmlinkage int sunos_select(int width, u32 inp, u32 outp, u32 exp, u32 tvp_x)
540 int ret;
542 /* SunOS binaries expect that select won't change the tvp contents */
543 lock_kernel();
544 ret = sys32_select (width, inp, outp, exp, tvp_x);
545 if (ret == -EINTR && tvp_x) {
546 struct timeval32 *tvp = (struct timeval32 *)A(tvp_x);
547 time_t sec, usec;
549 __get_user(sec, &tvp->tv_sec);
550 __get_user(usec, &tvp->tv_usec);
551 if (sec == 0 && usec == 0)
552 ret = 0;
554 unlock_kernel();
555 return ret;
558 asmlinkage void sunos_nop(void)
560 return;
563 /* XXXXXXXXXX SunOS mount/umount. XXXXXXXXXXX */
564 #define SMNT_RDONLY 1
565 #define SMNT_NOSUID 2
566 #define SMNT_NEWTYPE 4
567 #define SMNT_GRPID 8
568 #define SMNT_REMOUNT 16
569 #define SMNT_NOSUB 32
570 #define SMNT_MULTI 64
571 #define SMNT_SYS5 128
573 struct sunos_fh_t {
574 char fh_data [NFS_FHSIZE];
577 struct sunos_nfs_mount_args {
578 struct sockaddr_in *addr; /* file server address */
579 struct nfs_fh *fh; /* File handle to be mounted */
580 int flags; /* flags */
581 int wsize; /* write size in bytes */
582 int rsize; /* read size in bytes */
583 int timeo; /* initial timeout in .1 secs */
584 int retrans; /* times to retry send */
585 char *hostname; /* server's hostname */
586 int acregmin; /* attr cache file min secs */
587 int acregmax; /* attr cache file max secs */
588 int acdirmin; /* attr cache dir min secs */
589 int acdirmax; /* attr cache dir max secs */
590 char *netname; /* server's netname */
593 extern dev_t get_unnamed_dev(void);
594 extern void put_unnamed_dev(dev_t);
595 extern asmlinkage int sys_mount(char *, char *, char *, unsigned long, void *);
596 extern asmlinkage int sys_connect(int fd, struct sockaddr *uservaddr, int addrlen);
597 extern asmlinkage int sys_socket(int family, int type, int protocol);
598 extern asmlinkage int sys_bind(int fd, struct sockaddr *umyaddr, int addrlen);
601 /* Bind the socket on a local reserved port and connect it to the
602 * remote server. This on Linux/i386 is done by the mount program,
603 * not by the kernel.
605 /* XXXXXXXXXXXXXXXXXXXX */
606 static int
607 sunos_nfs_get_server_fd (int fd, struct sockaddr_in *addr)
609 struct sockaddr_in local;
610 struct sockaddr_in server;
611 int try_port;
612 int ret;
613 struct socket *socket;
614 struct dentry *dentry;
615 struct inode *inode;
616 struct file *file;
618 file = fget(fd);
619 if(!file)
620 return 0;
622 dentry = file->f_dentry;
623 inode = dentry->d_inode;
625 socket = &inode->u.socket_i;
626 local.sin_family = AF_INET;
627 local.sin_addr.s_addr = INADDR_ANY;
629 /* IPPORT_RESERVED = 1024, can't find the definition in the kernel */
630 try_port = 1024;
631 do {
632 local.sin_port = htons (--try_port);
633 ret = socket->ops->bind(socket, (struct sockaddr*)&local,
634 sizeof(local));
635 } while (ret && try_port > (1024 / 2));
637 if (ret) {
638 fput(file);
639 return 0;
642 server.sin_family = AF_INET;
643 server.sin_addr = addr->sin_addr;
644 server.sin_port = NFS_PORT;
646 /* Call sys_connect */
647 ret = socket->ops->connect (socket, (struct sockaddr *) &server,
648 sizeof (server), file->f_flags);
649 fput(file);
650 if (ret < 0)
651 return 0;
652 return 1;
655 /* XXXXXXXXXXXXXXXXXXXX */
656 static int get_default (int value, int def_value)
658 if (value)
659 return value;
660 else
661 return def_value;
664 /* XXXXXXXXXXXXXXXXXXXX */
665 static int sunos_nfs_mount(char *dir_name, int linux_flags, void *data)
667 int server_fd;
668 char *the_name;
669 struct nfs_mount_data linux_nfs_mount;
670 struct sunos_nfs_mount_args sunos_mount;
672 /* Ok, here comes the fun part: Linux's nfs mount needs a
673 * socket connection to the server, but SunOS mount does not
674 * require this, so we use the information on the destination
675 * address to create a socket and bind it to a reserved
676 * port on this system
678 if (copy_from_user(&sunos_mount, data, sizeof(sunos_mount)))
679 return -EFAULT;
681 server_fd = sys_socket (AF_INET, SOCK_DGRAM, IPPROTO_UDP);
682 if (server_fd < 0)
683 return -ENXIO;
685 if (copy_from_user(&linux_nfs_mount.addr,sunos_mount.addr,
686 sizeof(*sunos_mount.addr)) ||
687 copy_from_user(&linux_nfs_mount.root,sunos_mount.fh,
688 sizeof(*sunos_mount.fh))) {
689 sys_close (server_fd);
690 return -EFAULT;
693 if (!sunos_nfs_get_server_fd (server_fd, &linux_nfs_mount.addr)){
694 sys_close (server_fd);
695 return -ENXIO;
698 /* Now, bind it to a locally reserved port */
699 linux_nfs_mount.version = NFS_MOUNT_VERSION;
700 linux_nfs_mount.flags = sunos_mount.flags;
701 linux_nfs_mount.fd = server_fd;
703 linux_nfs_mount.rsize = get_default (sunos_mount.rsize, 8192);
704 linux_nfs_mount.wsize = get_default (sunos_mount.wsize, 8192);
705 linux_nfs_mount.timeo = get_default (sunos_mount.timeo, 10);
706 linux_nfs_mount.retrans = sunos_mount.retrans;
708 linux_nfs_mount.acregmin = sunos_mount.acregmin;
709 linux_nfs_mount.acregmax = sunos_mount.acregmax;
710 linux_nfs_mount.acdirmin = sunos_mount.acdirmin;
711 linux_nfs_mount.acdirmax = sunos_mount.acdirmax;
713 the_name = getname(sunos_mount.hostname);
714 if(IS_ERR(the_name))
715 return PTR_ERR(the_name);
717 strncpy (linux_nfs_mount.hostname, the_name, 254);
718 linux_nfs_mount.hostname [255] = 0;
719 putname (the_name);
721 return do_mount ("", dir_name, "nfs", linux_flags, &linux_nfs_mount);
724 /* XXXXXXXXXXXXXXXXXXXX */
725 asmlinkage int
726 sunos_mount(char *type, char *dir, int flags, void *data)
728 int linux_flags = MS_MGC_MSK; /* new semantics */
729 int ret = -EINVAL;
730 char *dev_fname = 0;
731 char *dir_page, *type_page;
733 if (!capable (CAP_SYS_ADMIN))
734 return -EPERM;
735 lock_kernel();
736 /* We don't handle the integer fs type */
737 if ((flags & SMNT_NEWTYPE) == 0)
738 goto out;
740 /* Do not allow for those flags we don't support */
741 if (flags & (SMNT_GRPID|SMNT_NOSUB|SMNT_MULTI|SMNT_SYS5))
742 goto out;
744 if(flags & SMNT_REMOUNT)
745 linux_flags |= MS_REMOUNT;
746 if(flags & SMNT_RDONLY)
747 linux_flags |= MS_RDONLY;
748 if(flags & SMNT_NOSUID)
749 linux_flags |= MS_NOSUID;
751 dir_page = getname(dir);
752 ret = PTR_ERR(dir_page);
753 if (IS_ERR(dir_page))
754 goto out;
756 type_page = getname(type);
757 ret = PTR_ERR(type_page);
758 if (IS_ERR(type_page))
759 goto out1;
761 if(strcmp(type_page, "ext2") == 0) {
762 dev_fname = getname(data);
763 } else if(strcmp(type_page, "iso9660") == 0) {
764 dev_fname = getname(data);
765 } else if(strcmp(type_page, "minix") == 0) {
766 dev_fname = getname(data);
767 } else if(strcmp(type_page, "nfs") == 0) {
768 ret = sunos_nfs_mount (dir_page, flags, data);
769 goto out2;
770 } else if(strcmp(type_page, "ufs") == 0) {
771 printk("Warning: UFS filesystem mounts unsupported.\n");
772 ret = -ENODEV;
773 goto out2;
774 } else if(strcmp(type_page, "proc")) {
775 ret = -ENODEV;
776 goto out2;
778 ret = PTR_ERR(dev_fname);
779 if (IS_ERR(dev_fname))
780 goto out2;
781 ret = do_mount(dev_fname, dir_page, type_page, linux_flags, NULL);
782 if (dev_fname)
783 putname(dev_fname);
784 out2:
785 putname(type_page);
786 out1:
787 putname(dir_page);
788 out:
789 unlock_kernel();
790 return ret;
793 extern asmlinkage int sys_setsid(void);
794 extern asmlinkage int sys_setpgid(pid_t, pid_t);
796 asmlinkage int sunos_setpgrp(pid_t pid, pid_t pgid)
798 int ret;
800 /* So stupid... */
801 lock_kernel();
802 if((!pid || pid == current->pid) &&
803 !pgid) {
804 sys_setsid();
805 ret = 0;
806 } else {
807 ret = sys_setpgid(pid, pgid);
809 unlock_kernel();
810 return ret;
813 /* So stupid... */
814 extern asmlinkage int sys32_wait4(__kernel_pid_t32 pid,
815 u32 stat_addr, int options, u32 ru);
817 asmlinkage int sunos_wait4(__kernel_pid_t32 pid, u32 stat_addr, int options, u32 ru)
819 int ret;
821 lock_kernel();
822 ret = sys32_wait4((pid ? pid : ((__kernel_pid_t32)-1)),
823 stat_addr, options, ru);
824 unlock_kernel();
825 return ret;
828 extern int kill_pg(int, int, int);
829 asmlinkage int sunos_killpg(int pgrp, int sig)
831 int ret;
833 lock_kernel();
834 ret = kill_pg(pgrp, sig, 0);
835 unlock_kernel();
836 return ret;
839 asmlinkage int sunos_audit(void)
841 lock_kernel();
842 printk ("sys_audit\n");
843 unlock_kernel();
844 return -1;
847 extern asmlinkage u32 sunos_gethostid(void)
849 u32 ret;
851 lock_kernel();
852 ret = (((u32)idprom->id_machtype << 24) | ((u32)idprom->id_sernum));
853 unlock_kernel();
854 return ret;
857 /* sysconf options, for SunOS compatibility */
858 #define _SC_ARG_MAX 1
859 #define _SC_CHILD_MAX 2
860 #define _SC_CLK_TCK 3
861 #define _SC_NGROUPS_MAX 4
862 #define _SC_OPEN_MAX 5
863 #define _SC_JOB_CONTROL 6
864 #define _SC_SAVED_IDS 7
865 #define _SC_VERSION 8
867 extern asmlinkage s32 sunos_sysconf (int name)
869 s32 ret;
871 lock_kernel();
872 switch (name){
873 case _SC_ARG_MAX:
874 ret = ARG_MAX;
875 break;
876 case _SC_CHILD_MAX:
877 ret = CHILD_MAX;
878 break;
879 case _SC_CLK_TCK:
880 ret = HZ;
881 break;
882 case _SC_NGROUPS_MAX:
883 ret = NGROUPS_MAX;
884 break;
885 case _SC_OPEN_MAX:
886 ret = OPEN_MAX;
887 break;
888 case _SC_JOB_CONTROL:
889 ret = 1; /* yes, we do support job control */
890 break;
891 case _SC_SAVED_IDS:
892 ret = 1; /* yes, we do support saved uids */
893 break;
894 case _SC_VERSION:
895 /* mhm, POSIX_VERSION is in /usr/include/unistd.h
896 * should it go on /usr/include/linux?
898 ret = 199009;
899 break;
900 default:
901 ret = -1;
902 break;
904 unlock_kernel();
905 return ret;
908 asmlinkage int sunos_semsys(int op, u32 arg1, u32 arg2, u32 arg3, u32 ptr)
910 union semun arg4;
911 int ret;
913 lock_kernel();
914 switch (op) {
915 case 0:
916 /* Most arguments match on a 1:1 basis but cmd doesn't */
917 switch(arg3) {
918 case 4:
919 arg3=GETPID; break;
920 case 5:
921 arg3=GETVAL; break;
922 case 6:
923 arg3=GETALL; break;
924 case 3:
925 arg3=GETNCNT; break;
926 case 7:
927 arg3=GETZCNT; break;
928 case 8:
929 arg3=SETVAL; break;
930 case 9:
931 arg3=SETALL; break;
933 /* sys_semctl(): */
934 arg4.__pad=(void *)A(ptr); /* value to modify semaphore to */
935 ret = sys_semctl((int)arg1, (int)arg2, (int)arg3, arg4);
936 break;
937 case 1:
938 /* sys_semget(): */
939 ret = sys_semget((key_t)arg1, (int)arg2, (int)arg3);
940 break;
941 case 2:
942 /* sys_semop(): */
943 ret = sys_semop((int)arg1, (struct sembuf *)A(arg2), (unsigned)arg3);
944 break;
945 default:
946 ret = -EINVAL;
947 break;
949 unlock_kernel();
950 return ret;
953 struct msgbuf32 {
954 s32 mtype;
955 char mtext[1];
958 struct ipc_perm32
960 key_t key;
961 __kernel_uid_t32 uid;
962 __kernel_gid_t32 gid;
963 __kernel_uid_t32 cuid;
964 __kernel_gid_t32 cgid;
965 __kernel_mode_t32 mode;
966 unsigned short seq;
969 struct msqid_ds32
971 struct ipc_perm32 msg_perm;
972 u32 msg_first;
973 u32 msg_last;
974 __kernel_time_t32 msg_stime;
975 __kernel_time_t32 msg_rtime;
976 __kernel_time_t32 msg_ctime;
977 u32 wwait;
978 u32 rwait;
979 unsigned short msg_cbytes;
980 unsigned short msg_qnum;
981 unsigned short msg_qbytes;
982 __kernel_ipc_pid_t32 msg_lspid;
983 __kernel_ipc_pid_t32 msg_lrpid;
986 static inline int sunos_msqid_get(struct msqid_ds32 *user,
987 struct msqid_ds *kern)
989 if(get_user(kern->msg_perm.key, &user->msg_perm.key) ||
990 __get_user(kern->msg_perm.uid, &user->msg_perm.uid) ||
991 __get_user(kern->msg_perm.gid, &user->msg_perm.gid) ||
992 __get_user(kern->msg_perm.cuid, &user->msg_perm.cuid) ||
993 __get_user(kern->msg_perm.cgid, &user->msg_perm.cgid) ||
994 __get_user(kern->msg_stime, &user->msg_stime) ||
995 __get_user(kern->msg_rtime, &user->msg_rtime) ||
996 __get_user(kern->msg_ctime, &user->msg_ctime) ||
997 __get_user(kern->msg_ctime, &user->msg_cbytes) ||
998 __get_user(kern->msg_ctime, &user->msg_qnum) ||
999 __get_user(kern->msg_ctime, &user->msg_qbytes) ||
1000 __get_user(kern->msg_ctime, &user->msg_lspid) ||
1001 __get_user(kern->msg_ctime, &user->msg_lrpid))
1002 return -EFAULT;
1003 return 0;
1006 static inline int sunos_msqid_put(struct msqid_ds32 *user,
1007 struct msqid_ds *kern)
1009 if(put_user(kern->msg_perm.key, &user->msg_perm.key) ||
1010 __put_user(kern->msg_perm.uid, &user->msg_perm.uid) ||
1011 __put_user(kern->msg_perm.gid, &user->msg_perm.gid) ||
1012 __put_user(kern->msg_perm.cuid, &user->msg_perm.cuid) ||
1013 __put_user(kern->msg_perm.cgid, &user->msg_perm.cgid) ||
1014 __put_user(kern->msg_stime, &user->msg_stime) ||
1015 __put_user(kern->msg_rtime, &user->msg_rtime) ||
1016 __put_user(kern->msg_ctime, &user->msg_ctime) ||
1017 __put_user(kern->msg_ctime, &user->msg_cbytes) ||
1018 __put_user(kern->msg_ctime, &user->msg_qnum) ||
1019 __put_user(kern->msg_ctime, &user->msg_qbytes) ||
1020 __put_user(kern->msg_ctime, &user->msg_lspid) ||
1021 __put_user(kern->msg_ctime, &user->msg_lrpid))
1022 return -EFAULT;
1023 return 0;
1026 static inline int sunos_msgbuf_get(struct msgbuf32 *user, struct msgbuf *kern, int len)
1028 if(get_user(kern->mtype, &user->mtype) ||
1029 __copy_from_user(kern->mtext, &user->mtext, len))
1030 return -EFAULT;
1031 return 0;
1034 static inline int sunos_msgbuf_put(struct msgbuf32 *user, struct msgbuf *kern, int len)
1036 if(put_user(kern->mtype, &user->mtype) ||
1037 __copy_to_user(user->mtext, kern->mtext, len))
1038 return -EFAULT;
1039 return 0;
1042 asmlinkage int sunos_msgsys(int op, u32 arg1, u32 arg2, u32 arg3, u32 arg4)
1044 struct sparc_stackf32 *sp;
1045 struct msqid_ds kds;
1046 struct msgbuf *kmbuf;
1047 mm_segment_t old_fs = get_fs();
1048 u32 arg5;
1049 int rval;
1051 lock_kernel();
1052 switch(op) {
1053 case 0:
1054 rval = sys_msgget((key_t)arg1, (int)arg2);
1055 break;
1056 case 1:
1057 if(!sunos_msqid_get((struct msqid_ds32 *)A(arg3), &kds)) {
1058 set_fs(KERNEL_DS);
1059 rval = sys_msgctl((int)arg1, (int)arg2,
1060 (struct msqid_ds *)A(arg3));
1061 set_fs(old_fs);
1062 if(!rval)
1063 rval = sunos_msqid_put((struct msqid_ds32 *)A(arg3),
1064 &kds);
1065 } else
1066 rval = -EFAULT;
1067 break;
1068 case 2:
1069 rval = -EFAULT;
1070 kmbuf = (struct msgbuf *)kmalloc(sizeof(struct msgbuf) + arg3,
1071 GFP_KERNEL);
1072 if(!kmbuf)
1073 break;
1074 sp = (struct sparc_stackf32 *)
1075 (current->thread.kregs->u_regs[UREG_FP] & 0xffffffffUL);
1076 if(get_user(arg5, &sp->xxargs[0])) {
1077 rval = -EFAULT;
1078 break;
1080 set_fs(KERNEL_DS);
1081 rval = sys_msgrcv((int)arg1, kmbuf, (size_t)arg3,
1082 (long)arg4, (int)arg5);
1083 set_fs(old_fs);
1084 if(!rval)
1085 rval = sunos_msgbuf_put((struct msgbuf32 *)A(arg2),
1086 kmbuf, arg3);
1087 kfree(kmbuf);
1088 break;
1089 case 3:
1090 rval = -EFAULT;
1091 kmbuf = (struct msgbuf *)kmalloc(sizeof(struct msgbuf) + arg3,
1092 GFP_KERNEL);
1093 if(!kmbuf || sunos_msgbuf_get((struct msgbuf32 *)A(arg2),
1094 kmbuf, arg3))
1095 break;
1096 set_fs(KERNEL_DS);
1097 rval = sys_msgsnd((int)arg1, kmbuf, (size_t)arg3, (int)arg4);
1098 set_fs(old_fs);
1099 kfree(kmbuf);
1100 break;
1101 default:
1102 rval = -EINVAL;
1103 break;
1105 unlock_kernel();
1106 return rval;
1109 struct shmid_ds32 {
1110 struct ipc_perm32 shm_perm;
1111 int shm_segsz;
1112 __kernel_time_t32 shm_atime;
1113 __kernel_time_t32 shm_dtime;
1114 __kernel_time_t32 shm_ctime;
1115 __kernel_ipc_pid_t32 shm_cpid;
1116 __kernel_ipc_pid_t32 shm_lpid;
1117 unsigned short shm_nattch;
1120 static inline int sunos_shmid_get(struct shmid_ds32 *user,
1121 struct shmid_ds *kern)
1123 if(get_user(kern->shm_perm.key, &user->shm_perm.key) ||
1124 __get_user(kern->shm_perm.uid, &user->shm_perm.uid) ||
1125 __get_user(kern->shm_perm.gid, &user->shm_perm.gid) ||
1126 __get_user(kern->shm_perm.cuid, &user->shm_perm.cuid) ||
1127 __get_user(kern->shm_perm.cgid, &user->shm_perm.cgid) ||
1128 __get_user(kern->shm_segsz, &user->shm_segsz) ||
1129 __get_user(kern->shm_atime, &user->shm_atime) ||
1130 __get_user(kern->shm_dtime, &user->shm_dtime) ||
1131 __get_user(kern->shm_ctime, &user->shm_ctime) ||
1132 __get_user(kern->shm_cpid, &user->shm_cpid) ||
1133 __get_user(kern->shm_lpid, &user->shm_lpid) ||
1134 __get_user(kern->shm_nattch, &user->shm_nattch))
1135 return -EFAULT;
1136 return 0;
1139 static inline int sunos_shmid_put(struct shmid_ds32 *user,
1140 struct shmid_ds *kern)
1142 if(put_user(kern->shm_perm.key, &user->shm_perm.key) ||
1143 __put_user(kern->shm_perm.uid, &user->shm_perm.uid) ||
1144 __put_user(kern->shm_perm.gid, &user->shm_perm.gid) ||
1145 __put_user(kern->shm_perm.cuid, &user->shm_perm.cuid) ||
1146 __put_user(kern->shm_perm.cgid, &user->shm_perm.cgid) ||
1147 __put_user(kern->shm_segsz, &user->shm_segsz) ||
1148 __put_user(kern->shm_atime, &user->shm_atime) ||
1149 __put_user(kern->shm_dtime, &user->shm_dtime) ||
1150 __put_user(kern->shm_ctime, &user->shm_ctime) ||
1151 __put_user(kern->shm_cpid, &user->shm_cpid) ||
1152 __put_user(kern->shm_lpid, &user->shm_lpid) ||
1153 __put_user(kern->shm_nattch, &user->shm_nattch))
1154 return -EFAULT;
1155 return 0;
1158 asmlinkage int sunos_shmsys(int op, u32 arg1, u32 arg2, u32 arg3)
1160 struct shmid_ds ksds;
1161 unsigned long raddr;
1162 mm_segment_t old_fs = get_fs();
1163 int rval;
1165 lock_kernel();
1166 switch(op) {
1167 case 0:
1168 /* sys_shmat(): attach a shared memory area */
1169 rval = sys_shmat((int)arg1,(char *)A(arg2),(int)arg3,&raddr);
1170 if(!rval)
1171 rval = (int) raddr;
1172 break;
1173 case 1:
1174 /* sys_shmctl(): modify shared memory area attr. */
1175 if(!sunos_shmid_get((struct shmid_ds32 *)A(arg3), &ksds)) {
1176 set_fs(KERNEL_DS);
1177 rval = sys_shmctl((int)arg1,(int)arg2, &ksds);
1178 set_fs(old_fs);
1179 if(!rval)
1180 rval = sunos_shmid_put((struct shmid_ds32 *)A(arg3),
1181 &ksds);
1182 } else
1183 rval = -EFAULT;
1184 break;
1185 case 2:
1186 /* sys_shmdt(): detach a shared memory area */
1187 rval = sys_shmdt((char *)A(arg1));
1188 break;
1189 case 3:
1190 /* sys_shmget(): get a shared memory area */
1191 rval = sys_shmget((key_t)arg1,(int)arg2,(int)arg3);
1192 break;
1193 default:
1194 rval = -EINVAL;
1195 break;
1197 unlock_kernel();
1198 return rval;
1201 extern asmlinkage long sparc32_open(const char * filename, int flags, int mode);
1203 asmlinkage int sunos_open(u32 fname, int flags, int mode)
1205 const char *filename = (const char *)(long)fname;
1207 return sparc32_open(filename, flags, mode);
1210 #define SUNOS_EWOULDBLOCK 35
1212 /* see the sunos man page read(2v) for an explanation
1213 of this garbage. We use O_NDELAY to mark
1214 file descriptors that have been set non-blocking
1215 using 4.2BSD style calls. (tridge) */
1217 static inline int check_nonblock(int ret, int fd)
1219 if (ret == -EAGAIN) {
1220 struct file * file = fcheck(fd);
1221 if (file && (file->f_flags & O_NDELAY))
1222 ret = -SUNOS_EWOULDBLOCK;
1224 return ret;
1227 extern asmlinkage int sys_read(unsigned int fd, char *buf, unsigned long count);
1228 extern asmlinkage int sys_write(unsigned int fd, char *buf, unsigned long count);
1229 extern asmlinkage int sys_recv(int fd, void *ubuf, size_t size, unsigned flags);
1230 extern asmlinkage int sys_send(int fd, void *buff, size_t len, unsigned flags);
1231 extern asmlinkage int sys_accept(int fd, struct sockaddr *sa, int *addrlen);
1232 extern asmlinkage int sys32_readv(u32 fd, u32 vector, s32 count);
1233 extern asmlinkage int sys32_writev(u32 fd, u32 vector, s32 count);
1235 asmlinkage int sunos_read(unsigned int fd, u32 buf, u32 count)
1237 int ret;
1239 lock_kernel();
1240 ret = check_nonblock(sys_read(fd, (char *)A(buf), count), fd);
1241 unlock_kernel();
1242 return ret;
1245 asmlinkage int sunos_readv(u32 fd, u32 vector, s32 count)
1247 int ret;
1249 lock_kernel();
1250 ret = check_nonblock(sys32_readv(fd, vector, count), fd);
1251 unlock_kernel();
1252 return ret;
1255 asmlinkage int sunos_write(unsigned int fd, u32 buf, u32 count)
1257 int ret;
1259 lock_kernel();
1260 ret = check_nonblock(sys_write(fd, (char *)A(buf), count), fd);
1261 unlock_kernel();
1262 return ret;
1265 asmlinkage int sunos_writev(u32 fd, u32 vector, s32 count)
1267 int ret;
1269 lock_kernel();
1270 ret = check_nonblock(sys32_writev(fd, vector, count), fd);
1271 unlock_kernel();
1272 return ret;
1275 asmlinkage int sunos_recv(int fd, u32 ubuf, int size, unsigned flags)
1277 int ret;
1279 lock_kernel();
1280 ret = check_nonblock(sys_recv(fd, (void *)A(ubuf), size, flags), fd);
1281 unlock_kernel();
1282 return ret;
1285 asmlinkage int sunos_send(int fd, u32 buff, int len, unsigned flags)
1287 int ret;
1289 lock_kernel();
1290 ret = check_nonblock(sys_send(fd, (void *)A(buff), len, flags), fd);
1291 unlock_kernel();
1292 return ret;
1295 extern asmlinkage int sys_setsockopt(int fd, int level, int optname,
1296 char *optval, int optlen);
1298 asmlinkage int sunos_socket(int family, int type, int protocol)
1300 int ret, one = 1;
1302 lock_kernel();
1303 ret = sys_socket(family, type, protocol);
1304 if (ret < 0)
1305 goto out;
1307 sys_setsockopt(ret, SOL_SOCKET, SO_BSDCOMPAT,
1308 (char *)&one, sizeof(one));
1309 out:
1310 unlock_kernel();
1311 return ret;
1314 asmlinkage int sunos_accept(int fd, u32 sa, u32 addrlen)
1316 int ret, one = 1;
1318 lock_kernel();
1319 while (1) {
1320 ret = check_nonblock(sys_accept(fd, (struct sockaddr *)A(sa),
1321 (int *)A(addrlen)), fd);
1322 if (ret != -ENETUNREACH && ret != -EHOSTUNREACH)
1323 break;
1325 if (ret < 0)
1326 goto out;
1328 sys_setsockopt(ret, SOL_SOCKET, SO_BSDCOMPAT,
1329 (char *)&one, sizeof(one));
1330 out:
1331 unlock_kernel();
1332 return ret;
1335 #define SUNOS_SV_INTERRUPT 2
1337 asmlinkage int sunos_sigaction (int sig, u32 act, u32 oact)
1339 struct k_sigaction new_ka, old_ka;
1340 int ret;
1342 if (act) {
1343 old_sigset_t32 mask;
1345 if (get_user((long)new_ka.sa.sa_handler, &((struct old_sigaction32 *)A(act))->sa_handler) ||
1346 __get_user(new_ka.sa.sa_flags, &((struct old_sigaction32 *)A(act))->sa_flags))
1347 return -EFAULT;
1348 __get_user(mask, &((struct old_sigaction32 *)A(act))->sa_mask);
1349 new_ka.sa.sa_restorer = NULL;
1350 new_ka.ka_restorer = NULL;
1351 siginitset(&new_ka.sa.sa_mask, mask);
1352 new_ka.sa.sa_flags ^= SUNOS_SV_INTERRUPT;
1355 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
1357 if (!ret && oact) {
1358 old_ka.sa.sa_flags ^= SUNOS_SV_INTERRUPT;
1359 if (put_user((long)old_ka.sa.sa_handler, &((struct old_sigaction32 *)A(oact))->sa_handler) ||
1360 __put_user(old_ka.sa.sa_flags, &((struct old_sigaction32 *)A(oact))->sa_flags))
1361 return -EFAULT;
1362 __put_user(old_ka.sa.sa_mask.sig[0], &((struct old_sigaction32 *)A(oact))->sa_mask);
1365 return ret;
1368 extern asmlinkage int sys_setsockopt(int fd, int level, int optname,
1369 char *optval, int optlen);
1370 extern asmlinkage int sys32_getsockopt(int fd, int level, int optname,
1371 u32 optval, u32 optlen);
1373 asmlinkage int sunos_setsockopt(int fd, int level, int optname, u32 optval,
1374 int optlen)
1376 int tr_opt = optname;
1377 int ret;
1379 lock_kernel();
1380 if (level == SOL_IP) {
1381 /* Multicast socketopts (ttl, membership) */
1382 if (tr_opt >=2 && tr_opt <= 6)
1383 tr_opt += 30;
1385 ret = sys_setsockopt(fd, level, tr_opt, (char *)A(optval), optlen);
1386 unlock_kernel();
1387 return ret;
1390 asmlinkage int sunos_getsockopt(int fd, int level, int optname,
1391 u32 optval, u32 optlen)
1393 int tr_opt = optname;
1394 int ret;
1396 lock_kernel();
1397 if (level == SOL_IP) {
1398 /* Multicast socketopts (ttl, membership) */
1399 if (tr_opt >=2 && tr_opt <= 6)
1400 tr_opt += 30;
1402 ret = sys32_getsockopt(fd, level, tr_opt, optval, optlen);
1403 unlock_kernel();
1404 return ret;