diff options
author | dchagin <dchagin@FreeBSD.org> | 2009-05-16 18:48:41 +0000 |
---|---|---|
committer | dchagin <dchagin@FreeBSD.org> | 2009-05-16 18:48:41 +0000 |
commit | 5351e066994a3d70d5c9b6c7a9d290bd517a8966 (patch) | |
tree | 4a61d560f65b84512f56bd4994c667b74585cb37 | |
parent | a0c026b20b499c61df6fa4153a626efb7ccb0e59 (diff) | |
download | FreeBSD-src-5351e066994a3d70d5c9b6c7a9d290bd517a8966.zip FreeBSD-src-5351e066994a3d70d5c9b6c7a9d290bd517a8966.tar.gz |
Somewhere between 2.6.23 and 2.6.27, Linux added SOCK_CLOEXEC and
SOCK_NONBLOCK flags, that allow to save fcntl() calls.
Implement a variation of the socket() syscall which takes a flags
in addition to the type argument.
Approved by: kib (mentor)
MFC after: 1 month
-rw-r--r-- | sys/amd64/linux32/linux.h | 1 | ||||
-rw-r--r-- | sys/compat/linux/linux_socket.c | 25 | ||||
-rw-r--r-- | sys/compat/linux/linux_socket.h | 7 | ||||
-rw-r--r-- | sys/i386/linux/linux.h | 1 |
4 files changed, 32 insertions, 2 deletions
diff --git a/sys/amd64/linux32/linux.h b/sys/amd64/linux32/linux.h index 59970fd..781acbb 100644 --- a/sys/amd64/linux32/linux.h +++ b/sys/amd64/linux32/linux.h @@ -571,6 +571,7 @@ int linux_ioctl_unregister_handler(struct linux_ioctl_handler *h); #define LINUX_O_DIRECTORY 00200000 /* Must be a directory */ #define LINUX_O_NOFOLLOW 00400000 /* Do not follow links */ #define LINUX_O_NOATIME 01000000 +#define LINUX_O_CLOEXEC 02000000 #define LINUX_F_DUPFD 0 #define LINUX_F_GETFD 1 diff --git a/sys/compat/linux/linux_socket.c b/sys/compat/linux/linux_socket.c index e99ef84..86cbcd6 100644 --- a/sys/compat/linux/linux_socket.c +++ b/sys/compat/linux/linux_socket.c @@ -593,10 +593,13 @@ linux_socket(struct thread *td, struct linux_socket_args *args) int type; int protocol; } */ bsd_args; - int retval_socket; + int retval_socket, socket_flags; bsd_args.protocol = args->protocol; - bsd_args.type = args->type; + socket_flags = args->type & ~LINUX_SOCK_TYPE_MASK; + if (socket_flags & ~(LINUX_SOCK_CLOEXEC | LINUX_SOCK_NONBLOCK)) + return (EINVAL); + bsd_args.type = args->type & LINUX_SOCK_TYPE_MASK; if (bsd_args.type < 0 || bsd_args.type > LINUX_SOCK_MAX) return (EINVAL); bsd_args.domain = linux_to_bsd_domain(args->domain); @@ -607,6 +610,23 @@ linux_socket(struct thread *td, struct linux_socket_args *args) if (retval_socket) return (retval_socket); + if (socket_flags & LINUX_SOCK_NONBLOCK) { + retval_socket = kern_fcntl(td, td->td_retval[0], + F_SETFL, O_NONBLOCK); + if (retval_socket) { + (void)kern_close(td, td->td_retval[0]); + goto out; + } + } + if (socket_flags & LINUX_SOCK_CLOEXEC) { + retval_socket = kern_fcntl(td, td->td_retval[0], + F_SETFD, FD_CLOEXEC); + if (retval_socket) { + (void)kern_close(td, td->td_retval[0]); + goto out; + } + } + if (bsd_args.type == SOCK_RAW && (bsd_args.protocol == IPPROTO_RAW || bsd_args.protocol == 0) && bsd_args.domain == PF_INET) { @@ -642,6 +662,7 @@ linux_socket(struct thread *td, struct linux_socket_args *args) } #endif +out: return (retval_socket); } diff --git a/sys/compat/linux/linux_socket.h b/sys/compat/linux/linux_socket.h index 0730761..67903c5 100644 --- a/sys/compat/linux/linux_socket.h +++ b/sys/compat/linux/linux_socket.h @@ -100,6 +100,13 @@ #define LINUX_SOCK_MAX LINUX_SOCK_SEQPACKET +#define LINUX_SOCK_TYPE_MASK 0xf + +/* Flags for socket, socketpair, accept4 */ + +#define LINUX_SOCK_CLOEXEC LINUX_O_CLOEXEC +#define LINUX_SOCK_NONBLOCK LINUX_O_NONBLOCK + struct l_ucred { uint32_t pid; uint32_t uid; diff --git a/sys/i386/linux/linux.h b/sys/i386/linux/linux.h index 132e431..b7a8830 100644 --- a/sys/i386/linux/linux.h +++ b/sys/i386/linux/linux.h @@ -547,6 +547,7 @@ int linux_ioctl_unregister_handler(struct linux_ioctl_handler *h); #define LINUX_O_DIRECTORY 00200000 /* Must be a directory */ #define LINUX_O_NOFOLLOW 00400000 /* Do not follow links */ #define LINUX_O_NOATIME 01000000 +#define LINUX_O_CLOEXEC 02000000 #define LINUX_F_DUPFD 0 #define LINUX_F_GETFD 1 |