1 /* 2 * linux/arch/alpha/kernel/osf_sys.c 3 * 4 * Copyright (C) 1995 Linus Torvalds 5 */ 6 7 /* 8 * This file handles some of the stranger OSF/1 system call interfaces. 9 * Some of the system calls expect a non-C calling standard, others have 10 * special parameter blocks.. 11 */ 12 13 #include <linux/errno.h> 14 #include <linux/sched.h> 15 #include <linux/kernel.h> 16 #include <linux/mm.h> 17 #include <linux/smp.h> 18 #include <linux/smp_lock.h> 19 #include <linux/stddef.h> 20 #include <linux/syscalls.h> 21 #include <linux/unistd.h> 22 #include <linux/ptrace.h> 23 #include <linux/slab.h> 24 #include <linux/user.h> 25 #include <linux/utsname.h> 26 #include <linux/time.h> 27 #include <linux/timex.h> 28 #include <linux/major.h> 29 #include <linux/stat.h> 30 #include <linux/mman.h> 31 #include <linux/shm.h> 32 #include <linux/poll.h> 33 #include <linux/file.h> 34 #include <linux/types.h> 35 #include <linux/ipc.h> 36 #include <linux/namei.h> 37 #include <linux/uio.h> 38 #include <linux/vfs.h> 39 #include <linux/rcupdate.h> 40 41 #include <asm/fpu.h> 42 #include <asm/io.h> 43 #include <asm/uaccess.h> 44 #include <asm/system.h> 45 #include <asm/sysinfo.h> 46 #include <asm/hwrpb.h> 47 #include <asm/processor.h> 48 49 extern int do_pipe(int *); 50 51 /* 52 * Brk needs to return an error. Still support Linux's brk(0) query idiom, 53 * which OSF programs just shouldn't be doing. We're still not quite 54 * identical to OSF as we don't return 0 on success, but doing otherwise 55 * would require changes to libc. Hopefully this is good enough. 56 */ 57 asmlinkage unsigned long 58 osf_brk(unsigned long brk) 59 { 60 unsigned long retval = sys_brk(brk); 61 if (brk && brk != retval) 62 retval = -ENOMEM; 63 return retval; 64 } 65 66 /* 67 * This is pure guess-work.. 68 */ 69 asmlinkage int 70 osf_set_program_attributes(unsigned long text_start, unsigned long text_len, 71 unsigned long bss_start, unsigned long bss_len) 72 { 73 struct mm_struct *mm; 74 75 lock_kernel(); 76 mm = current->mm; 77 mm->end_code = bss_start + bss_len; 78 mm->start_brk = bss_start + bss_len; 79 mm->brk = bss_start + bss_len; 80 #if 0 81 printk("set_program_attributes(%lx %lx %lx %lx)\n", 82 text_start, text_len, bss_start, bss_len); 83 #endif 84 unlock_kernel(); 85 return 0; 86 } 87 88 /* 89 * OSF/1 directory handling functions... 90 * 91 * The "getdents()" interface is much more sane: the "basep" stuff is 92 * braindamage (it can't really handle filesystems where the directory 93 * offset differences aren't the same as "d_reclen"). 94 */ 95 #define NAME_OFFSET offsetof (struct osf_dirent, d_name) 96 97 struct osf_dirent { 98 unsigned int d_ino; 99 unsigned short d_reclen; 100 unsigned short d_namlen; 101 char d_name[1]; 102 }; 103 104 struct osf_dirent_callback { 105 struct osf_dirent __user *dirent; 106 long __user *basep; 107 unsigned int count; 108 int error; 109 }; 110 111 static int 112 osf_filldir(void *__buf, const char *name, int namlen, loff_t offset, 113 u64 ino, unsigned int d_type) 114 { 115 struct osf_dirent __user *dirent; 116 struct osf_dirent_callback *buf = (struct osf_dirent_callback *) __buf; 117 unsigned int reclen = ALIGN(NAME_OFFSET + namlen + 1, sizeof(u32)); 118 unsigned int d_ino; 119 120 buf->error = -EINVAL; /* only used if we fail */ 121 if (reclen > buf->count) 122 return -EINVAL; 123 d_ino = ino; 124 if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) { 125 buf->error = -EOVERFLOW; 126 return -EOVERFLOW; 127 } 128 if (buf->basep) { 129 if (put_user(offset, buf->basep)) 130 goto Efault; 131 buf->basep = NULL; 132 } 133 dirent = buf->dirent; 134 if (put_user(d_ino, &dirent->d_ino) || 135 put_user(namlen, &dirent->d_namlen) || 136 put_user(reclen, &dirent->d_reclen) || 137 copy_to_user(dirent->d_name, name, namlen) || 138 put_user(0, dirent->d_name + namlen)) 139 goto Efault; 140 dirent = (void __user *)dirent + reclen; 141 buf->dirent = dirent; 142 buf->count -= reclen; 143 return 0; 144 Efault: 145 buf->error = -EFAULT; 146 return -EFAULT; 147 } 148 149 asmlinkage int 150 osf_getdirentries(unsigned int fd, struct osf_dirent __user *dirent, 151 unsigned int count, long __user *basep) 152 { 153 int error; 154 struct file *file; 155 struct osf_dirent_callback buf; 156 157 error = -EBADF; 158 file = fget(fd); 159 if (!file) 160 goto out; 161 162 buf.dirent = dirent; 163 buf.basep = basep; 164 buf.count = count; 165 buf.error = 0; 166 167 error = vfs_readdir(file, osf_filldir, &buf); 168 if (error < 0) 169 goto out_putf; 170 171 error = buf.error; 172 if (count != buf.count) 173 error = count - buf.count; 174 175 out_putf: 176 fput(file); 177 out: 178 return error; 179 } 180 181 #undef NAME_OFFSET 182 183 asmlinkage unsigned long 184 osf_mmap(unsigned long addr, unsigned long len, unsigned long prot, 185 unsigned long flags, unsigned long fd, unsigned long off) 186 { 187 struct file *file = NULL; 188 unsigned long ret = -EBADF; 189 190 #if 0 191 if (flags & (_MAP_HASSEMAPHORE | _MAP_INHERIT | _MAP_UNALIGNED)) 192 printk("%s: unimplemented OSF mmap flags %04lx\n", 193 current->comm, flags); 194 #endif 195 if (!(flags & MAP_ANONYMOUS)) { 196 file = fget(fd); 197 if (!file) 198 goto out; 199 } 200 flags &= ~(MAP_EXECUTABLE | MAP_DENYWRITE); 201 down_write(¤t->mm->mmap_sem); 202 ret = do_mmap(file, addr, len, prot, flags, off); 203 up_write(¤t->mm->mmap_sem); 204 if (file) 205 fput(file); 206 out: 207 return ret; 208 } 209 210 211 /* 212 * The OSF/1 statfs structure is much larger, but this should 213 * match the beginning, at least. 214 */ 215 struct osf_statfs { 216 short f_type; 217 short f_flags; 218 int f_fsize; 219 int f_bsize; 220 int f_blocks; 221 int f_bfree; 222 int f_bavail; 223 int f_files; 224 int f_ffree; 225 __kernel_fsid_t f_fsid; 226 }; 227 228 static int 229 linux_to_osf_statfs(struct kstatfs *linux_stat, struct osf_statfs __user *osf_stat, 230 unsigned long bufsiz) 231 { 232 struct osf_statfs tmp_stat; 233 234 tmp_stat.f_type = linux_stat->f_type; 235 tmp_stat.f_flags = 0; /* mount flags */ 236 tmp_stat.f_fsize = linux_stat->f_frsize; 237 tmp_stat.f_bsize = linux_stat->f_bsize; 238 tmp_stat.f_blocks = linux_stat->f_blocks; 239 tmp_stat.f_bfree = linux_stat->f_bfree; 240 tmp_stat.f_bavail = linux_stat->f_bavail; 241 tmp_stat.f_files = linux_stat->f_files; 242 tmp_stat.f_ffree = linux_stat->f_ffree; 243 tmp_stat.f_fsid = linux_stat->f_fsid; 244 if (bufsiz > sizeof(tmp_stat)) 245 bufsiz = sizeof(tmp_stat); 246 return copy_to_user(osf_stat, &tmp_stat, bufsiz) ? -EFAULT : 0; 247 } 248 249 static int 250 do_osf_statfs(struct dentry * dentry, struct osf_statfs __user *buffer, 251 unsigned long bufsiz) 252 { 253 struct kstatfs linux_stat; 254 int error = vfs_statfs(dentry, &linux_stat); 255 if (!error) 256 error = linux_to_osf_statfs(&linux_stat, buffer, bufsiz); 257 return error; 258 } 259 260 asmlinkage int 261 osf_statfs(char __user *pathname, struct osf_statfs __user *buffer, unsigned long bufsiz) 262 { 263 struct path path; 264 int retval; 265 266 retval = user_path(pathname, &path); 267 if (!retval) { 268 retval = do_osf_statfs(path.dentry, buffer, bufsiz); 269 path_put(&path); 270 } 271 return retval; 272 } 273 274 asmlinkage int 275 osf_fstatfs(unsigned long fd, struct osf_statfs __user *buffer, unsigned long bufsiz) 276 { 277 struct file *file; 278 int retval; 279 280 retval = -EBADF; 281 file = fget(fd); 282 if (file) { 283 retval = do_osf_statfs(file->f_path.dentry, buffer, bufsiz); 284 fput(file); 285 } 286 return retval; 287 } 288 289 /* 290 * Uhh.. OSF/1 mount parameters aren't exactly obvious.. 291 * 292 * Although to be frank, neither are the native Linux/i386 ones.. 293 */ 294 struct ufs_args { 295 char __user *devname; 296 int flags; 297 uid_t exroot; 298 }; 299 300 struct cdfs_args { 301 char __user *devname; 302 int flags; 303 uid_t exroot; 304 305 /* This has lots more here, which Linux handles with the option block 306 but I'm too lazy to do the translation into ASCII. */ 307 }; 308 309 struct procfs_args { 310 char __user *devname; 311 int flags; 312 uid_t exroot; 313 }; 314 315 /* 316 * We can't actually handle ufs yet, so we translate UFS mounts to 317 * ext2fs mounts. I wouldn't mind a UFS filesystem, but the UFS 318 * layout is so braindead it's a major headache doing it. 319 * 320 * Just how long ago was it written? OTOH our UFS driver may be still 321 * unhappy with OSF UFS. [CHECKME] 322 */ 323 static int 324 osf_ufs_mount(char *dirname, struct ufs_args __user *args, int flags) 325 { 326 int retval; 327 struct cdfs_args tmp; 328 char *devname; 329 330 retval = -EFAULT; 331 if (copy_from_user(&tmp, args, sizeof(tmp))) 332 goto out; 333 devname = getname(tmp.devname); 334 retval = PTR_ERR(devname); 335 if (IS_ERR(devname)) 336 goto out; 337 retval = do_mount(devname, dirname, "ext2", flags, NULL); 338 putname(devname); 339 out: 340 return retval; 341 } 342 343 static int 344 osf_cdfs_mount(char *dirname, struct cdfs_args __user *args, int flags) 345 { 346 int retval; 347 struct cdfs_args tmp; 348 char *devname; 349 350 retval = -EFAULT; 351 if (copy_from_user(&tmp, args, sizeof(tmp))) 352 goto out; 353 devname = getname(tmp.devname); 354 retval = PTR_ERR(devname); 355 if (IS_ERR(devname)) 356 goto out; 357 retval = do_mount(devname, dirname, "iso9660", flags, NULL); 358 putname(devname); 359 out: 360 return retval; 361 } 362 363 static int 364 osf_procfs_mount(char *dirname, struct procfs_args __user *args, int flags) 365 { 366 struct procfs_args tmp; 367 368 if (copy_from_user(&tmp, args, sizeof(tmp))) 369 return -EFAULT; 370 371 return do_mount("", dirname, "proc", flags, NULL); 372 } 373 374 asmlinkage int 375 osf_mount(unsigned long typenr, char __user *path, int flag, void __user *data) 376 { 377 int retval = -EINVAL; 378 char *name; 379 380 lock_kernel(); 381 382 name = getname(path); 383 retval = PTR_ERR(name); 384 if (IS_ERR(name)) 385 goto out; 386 switch (typenr) { 387 case 1: 388 retval = osf_ufs_mount(name, data, flag); 389 break; 390 case 6: 391 retval = osf_cdfs_mount(name, data, flag); 392 break; 393 case 9: 394 retval = osf_procfs_mount(name, data, flag); 395 break; 396 default: 397 printk("osf_mount(%ld, %x)\n", typenr, flag); 398 } 399 putname(name); 400 out: 401 unlock_kernel(); 402 return retval; 403 } 404 405 asmlinkage int 406 osf_utsname(char __user *name) 407 { 408 int error; 409 410 down_read(&uts_sem); 411 error = -EFAULT; 412 if (copy_to_user(name + 0, utsname()->sysname, 32)) 413 goto out; 414 if (copy_to_user(name + 32, utsname()->nodename, 32)) 415 goto out; 416 if (copy_to_user(name + 64, utsname()->release, 32)) 417 goto out; 418 if (copy_to_user(name + 96, utsname()->version, 32)) 419 goto out; 420 if (copy_to_user(name + 128, utsname()->machine, 32)) 421 goto out; 422 423 error = 0; 424 out: 425 up_read(&uts_sem); 426 return error; 427 } 428 429 asmlinkage unsigned long 430 sys_getpagesize(void) 431 { 432 return PAGE_SIZE; 433 } 434 435 asmlinkage unsigned long 436 sys_getdtablesize(void) 437 { 438 return sysctl_nr_open; 439 } 440 441 /* 442 * For compatibility with OSF/1 only. Use utsname(2) instead. 443 */ 444 asmlinkage int 445 osf_getdomainname(char __user *name, int namelen) 446 { 447 unsigned len; 448 int i; 449 450 if (!access_ok(VERIFY_WRITE, name, namelen)) 451 return -EFAULT; 452 453 len = namelen; 454 if (namelen > 32) 455 len = 32; 456 457 down_read(&uts_sem); 458 for (i = 0; i < len; ++i) { 459 __put_user(utsname()->domainname[i], name + i); 460 if (utsname()->domainname[i] == '\0') 461 break; 462 } 463 up_read(&uts_sem); 464 465 return 0; 466 } 467 468 /* 469 * The following stuff should move into a header file should it ever 470 * be labeled "officially supported." Right now, there is just enough 471 * support to avoid applications (such as tar) printing error 472 * messages. The attributes are not really implemented. 473 */ 474 475 /* 476 * Values for Property list entry flag 477 */ 478 #define PLE_PROPAGATE_ON_COPY 0x1 /* cp(1) will copy entry 479 by default */ 480 #define PLE_FLAG_MASK 0x1 /* Valid flag values */ 481 #define PLE_FLAG_ALL -1 /* All flag value */ 482 483 struct proplistname_args { 484 unsigned int pl_mask; 485 unsigned int pl_numnames; 486 char **pl_names; 487 }; 488 489 union pl_args { 490 struct setargs { 491 char __user *path; 492 long follow; 493 long nbytes; 494 char __user *buf; 495 } set; 496 struct fsetargs { 497 long fd; 498 long nbytes; 499 char __user *buf; 500 } fset; 501 struct getargs { 502 char __user *path; 503 long follow; 504 struct proplistname_args __user *name_args; 505 long nbytes; 506 char __user *buf; 507 int __user *min_buf_size; 508 } get; 509 struct fgetargs { 510 long fd; 511 struct proplistname_args __user *name_args; 512 long nbytes; 513 char __user *buf; 514 int __user *min_buf_size; 515 } fget; 516 struct delargs { 517 char __user *path; 518 long follow; 519 struct proplistname_args __user *name_args; 520 } del; 521 struct fdelargs { 522 long fd; 523 struct proplistname_args __user *name_args; 524 } fdel; 525 }; 526 527 enum pl_code { 528 PL_SET = 1, PL_FSET = 2, 529 PL_GET = 3, PL_FGET = 4, 530 PL_DEL = 5, PL_FDEL = 6 531 }; 532 533 asmlinkage long 534 osf_proplist_syscall(enum pl_code code, union pl_args __user *args) 535 { 536 long error; 537 int __user *min_buf_size_ptr; 538 539 lock_kernel(); 540 switch (code) { 541 case PL_SET: 542 if (get_user(error, &args->set.nbytes)) 543 error = -EFAULT; 544 break; 545 case PL_FSET: 546 if (get_user(error, &args->fset.nbytes)) 547 error = -EFAULT; 548 break; 549 case PL_GET: 550 error = get_user(min_buf_size_ptr, &args->get.min_buf_size); 551 if (error) 552 break; 553 error = put_user(0, min_buf_size_ptr); 554 break; 555 case PL_FGET: 556 error = get_user(min_buf_size_ptr, &args->fget.min_buf_size); 557 if (error) 558 break; 559 error = put_user(0, min_buf_size_ptr); 560 break; 561 case PL_DEL: 562 case PL_FDEL: 563 error = 0; 564 break; 565 default: 566 error = -EOPNOTSUPP; 567 break; 568 }; 569 unlock_kernel(); 570 return error; 571 } 572 573 asmlinkage int 574 osf_sigstack(struct sigstack __user *uss, struct sigstack __user *uoss) 575 { 576 unsigned long usp = rdusp(); 577 unsigned long oss_sp = current->sas_ss_sp + current->sas_ss_size; 578 unsigned long oss_os = on_sig_stack(usp); 579 int error; 580 581 if (uss) { 582 void __user *ss_sp; 583 584 error = -EFAULT; 585 if (get_user(ss_sp, &uss->ss_sp)) 586 goto out; 587 588 /* If the current stack was set with sigaltstack, don't 589 swap stacks while we are on it. */ 590 error = -EPERM; 591 if (current->sas_ss_sp && on_sig_stack(usp)) 592 goto out; 593 594 /* Since we don't know the extent of the stack, and we don't 595 track onstack-ness, but rather calculate it, we must 596 presume a size. Ho hum this interface is lossy. */ 597 current->sas_ss_sp = (unsigned long)ss_sp - SIGSTKSZ; 598 current->sas_ss_size = SIGSTKSZ; 599 } 600 601 if (uoss) { 602 error = -EFAULT; 603 if (! access_ok(VERIFY_WRITE, uoss, sizeof(*uoss)) 604 || __put_user(oss_sp, &uoss->ss_sp) 605 || __put_user(oss_os, &uoss->ss_onstack)) 606 goto out; 607 } 608 609 error = 0; 610 out: 611 return error; 612 } 613 614 asmlinkage long 615 osf_sysinfo(int command, char __user *buf, long count) 616 { 617 char *sysinfo_table[] = { 618 utsname()->sysname, 619 utsname()->nodename, 620 utsname()->release, 621 utsname()->version, 622 utsname()->machine, 623 "alpha", /* instruction set architecture */ 624 "dummy", /* hardware serial number */ 625 "dummy", /* hardware manufacturer */ 626 "dummy", /* secure RPC domain */ 627 }; 628 unsigned long offset; 629 char *res; 630 long len, err = -EINVAL; 631 632 offset = command-1; 633 if (offset >= ARRAY_SIZE(sysinfo_table)) { 634 /* Digital UNIX has a few unpublished interfaces here */ 635 printk("sysinfo(%d)", command); 636 goto out; 637 } 638 639 down_read(&uts_sem); 640 res = sysinfo_table[offset]; 641 len = strlen(res)+1; 642 if (len > count) 643 len = count; 644 if (copy_to_user(buf, res, len)) 645 err = -EFAULT; 646 else 647 err = 0; 648 up_read(&uts_sem); 649 out: 650 return err; 651 } 652 653 asmlinkage unsigned long 654 osf_getsysinfo(unsigned long op, void __user *buffer, unsigned long nbytes, 655 int __user *start, void __user *arg) 656 { 657 unsigned long w; 658 struct percpu_struct *cpu; 659 660 switch (op) { 661 case GSI_IEEE_FP_CONTROL: 662 /* Return current software fp control & status bits. */ 663 /* Note that DU doesn't verify available space here. */ 664 665 w = current_thread_info()->ieee_state & IEEE_SW_MASK; 666 w = swcr_update_status(w, rdfpcr()); 667 if (put_user(w, (unsigned long __user *) buffer)) 668 return -EFAULT; 669 return 0; 670 671 case GSI_IEEE_STATE_AT_SIGNAL: 672 /* 673 * Not sure anybody will ever use this weird stuff. These 674 * ops can be used (under OSF/1) to set the fpcr that should 675 * be used when a signal handler starts executing. 676 */ 677 break; 678 679 case GSI_UACPROC: 680 if (nbytes < sizeof(unsigned int)) 681 return -EINVAL; 682 w = (current_thread_info()->flags >> UAC_SHIFT) & UAC_BITMASK; 683 if (put_user(w, (unsigned int __user *)buffer)) 684 return -EFAULT; 685 return 1; 686 687 case GSI_PROC_TYPE: 688 if (nbytes < sizeof(unsigned long)) 689 return -EINVAL; 690 cpu = (struct percpu_struct*) 691 ((char*)hwrpb + hwrpb->processor_offset); 692 w = cpu->type; 693 if (put_user(w, (unsigned long __user*)buffer)) 694 return -EFAULT; 695 return 1; 696 697 case GSI_GET_HWRPB: 698 if (nbytes < sizeof(*hwrpb)) 699 return -EINVAL; 700 if (copy_to_user(buffer, hwrpb, nbytes) != 0) 701 return -EFAULT; 702 return 1; 703 704 default: 705 break; 706 } 707 708 return -EOPNOTSUPP; 709 } 710 711 asmlinkage unsigned long 712 osf_setsysinfo(unsigned long op, void __user *buffer, unsigned long nbytes, 713 int __user *start, void __user *arg) 714 { 715 switch (op) { 716 case SSI_IEEE_FP_CONTROL: { 717 unsigned long swcr, fpcr; 718 unsigned int *state; 719 720 /* 721 * Alpha Architecture Handbook 4.7.7.3: 722 * To be fully IEEE compiant, we must track the current IEEE 723 * exception state in software, because spurious bits can be 724 * set in the trap shadow of a software-complete insn. 725 */ 726 727 if (get_user(swcr, (unsigned long __user *)buffer)) 728 return -EFAULT; 729 state = ¤t_thread_info()->ieee_state; 730 731 /* Update softare trap enable bits. */ 732 *state = (*state & ~IEEE_SW_MASK) | (swcr & IEEE_SW_MASK); 733 734 /* Update the real fpcr. */ 735 fpcr = rdfpcr() & FPCR_DYN_MASK; 736 fpcr |= ieee_swcr_to_fpcr(swcr); 737 wrfpcr(fpcr); 738 739 return 0; 740 } 741 742 case SSI_IEEE_RAISE_EXCEPTION: { 743 unsigned long exc, swcr, fpcr, fex; 744 unsigned int *state; 745 746 if (get_user(exc, (unsigned long __user *)buffer)) 747 return -EFAULT; 748 state = ¤t_thread_info()->ieee_state; 749 exc &= IEEE_STATUS_MASK; 750 751 /* Update softare trap enable bits. */ 752 swcr = (*state & IEEE_SW_MASK) | exc; 753 *state |= exc; 754 755 /* Update the real fpcr. */ 756 fpcr = rdfpcr(); 757 fpcr |= ieee_swcr_to_fpcr(swcr); 758 wrfpcr(fpcr); 759 760 /* If any exceptions set by this call, and are unmasked, 761 send a signal. Old exceptions are not signaled. */ 762 fex = (exc >> IEEE_STATUS_TO_EXCSUM_SHIFT) & swcr; 763 if (fex) { 764 siginfo_t info; 765 int si_code = 0; 766 767 if (fex & IEEE_TRAP_ENABLE_DNO) si_code = FPE_FLTUND; 768 if (fex & IEEE_TRAP_ENABLE_INE) si_code = FPE_FLTRES; 769 if (fex & IEEE_TRAP_ENABLE_UNF) si_code = FPE_FLTUND; 770 if (fex & IEEE_TRAP_ENABLE_OVF) si_code = FPE_FLTOVF; 771 if (fex & IEEE_TRAP_ENABLE_DZE) si_code = FPE_FLTDIV; 772 if (fex & IEEE_TRAP_ENABLE_INV) si_code = FPE_FLTINV; 773 774 info.si_signo = SIGFPE; 775 info.si_errno = 0; 776 info.si_code = si_code; 777 info.si_addr = NULL; /* FIXME */ 778 send_sig_info(SIGFPE, &info, current); 779 } 780 return 0; 781 } 782 783 case SSI_IEEE_STATE_AT_SIGNAL: 784 case SSI_IEEE_IGNORE_STATE_AT_SIGNAL: 785 /* 786 * Not sure anybody will ever use this weird stuff. These 787 * ops can be used (under OSF/1) to set the fpcr that should 788 * be used when a signal handler starts executing. 789 */ 790 break; 791 792 case SSI_NVPAIRS: { 793 unsigned long v, w, i; 794 unsigned int old, new; 795 796 for (i = 0; i < nbytes; ++i) { 797 798 if (get_user(v, 2*i + (unsigned int __user *)buffer)) 799 return -EFAULT; 800 if (get_user(w, 2*i + 1 + (unsigned int __user *)buffer)) 801 return -EFAULT; 802 switch (v) { 803 case SSIN_UACPROC: 804 again: 805 old = current_thread_info()->flags; 806 new = old & ~(UAC_BITMASK << UAC_SHIFT); 807 new = new | (w & UAC_BITMASK) << UAC_SHIFT; 808 if (cmpxchg(¤t_thread_info()->flags, 809 old, new) != old) 810 goto again; 811 break; 812 813 default: 814 return -EOPNOTSUPP; 815 } 816 } 817 return 0; 818 } 819 820 default: 821 break; 822 } 823 824 return -EOPNOTSUPP; 825 } 826 827 /* Translations due to the fact that OSF's time_t is an int. Which 828 affects all sorts of things, like timeval and itimerval. */ 829 830 extern struct timezone sys_tz; 831 832 struct timeval32 833 { 834 int tv_sec, tv_usec; 835 }; 836 837 struct itimerval32 838 { 839 struct timeval32 it_interval; 840 struct timeval32 it_value; 841 }; 842 843 static inline long 844 get_tv32(struct timeval *o, struct timeval32 __user *i) 845 { 846 return (!access_ok(VERIFY_READ, i, sizeof(*i)) || 847 (__get_user(o->tv_sec, &i->tv_sec) | 848 __get_user(o->tv_usec, &i->tv_usec))); 849 } 850 851 static inline long 852 put_tv32(struct timeval32 __user *o, struct timeval *i) 853 { 854 return (!access_ok(VERIFY_WRITE, o, sizeof(*o)) || 855 (__put_user(i->tv_sec, &o->tv_sec) | 856 __put_user(i->tv_usec, &o->tv_usec))); 857 } 858 859 static inline long 860 get_it32(struct itimerval *o, struct itimerval32 __user *i) 861 { 862 return (!access_ok(VERIFY_READ, i, sizeof(*i)) || 863 (__get_user(o->it_interval.tv_sec, &i->it_interval.tv_sec) | 864 __get_user(o->it_interval.tv_usec, &i->it_interval.tv_usec) | 865 __get_user(o->it_value.tv_sec, &i->it_value.tv_sec) | 866 __get_user(o->it_value.tv_usec, &i->it_value.tv_usec))); 867 } 868 869 static inline long 870 put_it32(struct itimerval32 __user *o, struct itimerval *i) 871 { 872 return (!access_ok(VERIFY_WRITE, o, sizeof(*o)) || 873 (__put_user(i->it_interval.tv_sec, &o->it_interval.tv_sec) | 874 __put_user(i->it_interval.tv_usec, &o->it_interval.tv_usec) | 875 __put_user(i->it_value.tv_sec, &o->it_value.tv_sec) | 876 __put_user(i->it_value.tv_usec, &o->it_value.tv_usec))); 877 } 878 879 static inline void 880 jiffies_to_timeval32(unsigned long jiffies, struct timeval32 *value) 881 { 882 value->tv_usec = (jiffies % HZ) * (1000000L / HZ); 883 value->tv_sec = jiffies / HZ; 884 } 885 886 asmlinkage int 887 osf_gettimeofday(struct timeval32 __user *tv, struct timezone __user *tz) 888 { 889 if (tv) { 890 struct timeval ktv; 891 do_gettimeofday(&ktv); 892 if (put_tv32(tv, &ktv)) 893 return -EFAULT; 894 } 895 if (tz) { 896 if (copy_to_user(tz, &sys_tz, sizeof(sys_tz))) 897 return -EFAULT; 898 } 899 return 0; 900 } 901 902 asmlinkage int 903 osf_settimeofday(struct timeval32 __user *tv, struct timezone __user *tz) 904 { 905 struct timespec kts; 906 struct timezone ktz; 907 908 if (tv) { 909 if (get_tv32((struct timeval *)&kts, tv)) 910 return -EFAULT; 911 } 912 if (tz) { 913 if (copy_from_user(&ktz, tz, sizeof(*tz))) 914 return -EFAULT; 915 } 916 917 kts.tv_nsec *= 1000; 918 919 return do_sys_settimeofday(tv ? &kts : NULL, tz ? &ktz : NULL); 920 } 921 922 asmlinkage int 923 osf_getitimer(int which, struct itimerval32 __user *it) 924 { 925 struct itimerval kit; 926 int error; 927 928 error = do_getitimer(which, &kit); 929 if (!error && put_it32(it, &kit)) 930 error = -EFAULT; 931 932 return error; 933 } 934 935 asmlinkage int 936 osf_setitimer(int which, struct itimerval32 __user *in, struct itimerval32 __user *out) 937 { 938 struct itimerval kin, kout; 939 int error; 940 941 if (in) { 942 if (get_it32(&kin, in)) 943 return -EFAULT; 944 } else 945 memset(&kin, 0, sizeof(kin)); 946 947 error = do_setitimer(which, &kin, out ? &kout : NULL); 948 if (error || !out) 949 return error; 950 951 if (put_it32(out, &kout)) 952 return -EFAULT; 953 954 return 0; 955 956 } 957 958 asmlinkage int 959 osf_utimes(char __user *filename, struct timeval32 __user *tvs) 960 { 961 struct timespec tv[2]; 962 963 if (tvs) { 964 struct timeval ktvs[2]; 965 if (get_tv32(&ktvs[0], &tvs[0]) || 966 get_tv32(&ktvs[1], &tvs[1])) 967 return -EFAULT; 968 969 if (ktvs[0].tv_usec < 0 || ktvs[0].tv_usec >= 1000000 || 970 ktvs[1].tv_usec < 0 || ktvs[1].tv_usec >= 1000000) 971 return -EINVAL; 972 973 tv[0].tv_sec = ktvs[0].tv_sec; 974 tv[0].tv_nsec = 1000 * ktvs[0].tv_usec; 975 tv[1].tv_sec = ktvs[1].tv_sec; 976 tv[1].tv_nsec = 1000 * ktvs[1].tv_usec; 977 } 978 979 return do_utimes(AT_FDCWD, filename, tvs ? tv : NULL, 0); 980 } 981 982 #define MAX_SELECT_SECONDS \ 983 ((unsigned long) (MAX_SCHEDULE_TIMEOUT / HZ)-1) 984 985 asmlinkage int 986 osf_select(int n, fd_set __user *inp, fd_set __user *outp, fd_set __user *exp, 987 struct timeval32 __user *tvp) 988 { 989 s64 timeout = MAX_SCHEDULE_TIMEOUT; 990 if (tvp) { 991 time_t sec, usec; 992 993 if (!access_ok(VERIFY_READ, tvp, sizeof(*tvp)) 994 || __get_user(sec, &tvp->tv_sec) 995 || __get_user(usec, &tvp->tv_usec)) { 996 return -EFAULT; 997 } 998 999 if (sec < 0 || usec < 0) 1000 return -EINVAL; 1001 1002 if ((unsigned long) sec < MAX_SELECT_SECONDS) { 1003 timeout = (usec + 1000000/HZ - 1) / (1000000/HZ); 1004 timeout += sec * (unsigned long) HZ; 1005 } 1006 } 1007 1008 /* OSF does not copy back the remaining time. */ 1009 return core_sys_select(n, inp, outp, exp, &timeout); 1010 } 1011 1012 struct rusage32 { 1013 struct timeval32 ru_utime; /* user time used */ 1014 struct timeval32 ru_stime; /* system time used */ 1015 long ru_maxrss; /* maximum resident set size */ 1016 long ru_ixrss; /* integral shared memory size */ 1017 long ru_idrss; /* integral unshared data size */ 1018 long ru_isrss; /* integral unshared stack size */ 1019 long ru_minflt; /* page reclaims */ 1020 long ru_majflt; /* page faults */ 1021 long ru_nswap; /* swaps */ 1022 long ru_inblock; /* block input operations */ 1023 long ru_oublock; /* block output operations */ 1024 long ru_msgsnd; /* messages sent */ 1025 long ru_msgrcv; /* messages received */ 1026 long ru_nsignals; /* signals received */ 1027 long ru_nvcsw; /* voluntary context switches */ 1028 long ru_nivcsw; /* involuntary " */ 1029 }; 1030 1031 asmlinkage int 1032 osf_getrusage(int who, struct rusage32 __user *ru) 1033 { 1034 struct rusage32 r; 1035 1036 if (who != RUSAGE_SELF && who != RUSAGE_CHILDREN) 1037 return -EINVAL; 1038 1039 memset(&r, 0, sizeof(r)); 1040 switch (who) { 1041 case RUSAGE_SELF: 1042 jiffies_to_timeval32(current->utime, &r.ru_utime); 1043 jiffies_to_timeval32(current->stime, &r.ru_stime); 1044 r.ru_minflt = current->min_flt; 1045 r.ru_majflt = current->maj_flt; 1046 break; 1047 case RUSAGE_CHILDREN: 1048 jiffies_to_timeval32(current->signal->cutime, &r.ru_utime); 1049 jiffies_to_timeval32(current->signal->cstime, &r.ru_stime); 1050 r.ru_minflt = current->signal->cmin_flt; 1051 r.ru_majflt = current->signal->cmaj_flt; 1052 break; 1053 } 1054 1055 return copy_to_user(ru, &r, sizeof(r)) ? -EFAULT : 0; 1056 } 1057 1058 asmlinkage long 1059 osf_wait4(pid_t pid, int __user *ustatus, int options, 1060 struct rusage32 __user *ur) 1061 { 1062 struct rusage r; 1063 long ret, err; 1064 mm_segment_t old_fs; 1065 1066 if (!ur) 1067 return sys_wait4(pid, ustatus, options, NULL); 1068 1069 old_fs = get_fs(); 1070 1071 set_fs (KERNEL_DS); 1072 ret = sys_wait4(pid, ustatus, options, (struct rusage __user *) &r); 1073 set_fs (old_fs); 1074 1075 if (!access_ok(VERIFY_WRITE, ur, sizeof(*ur))) 1076 return -EFAULT; 1077 1078 err = 0; 1079 err |= __put_user(r.ru_utime.tv_sec, &ur->ru_utime.tv_sec); 1080 err |= __put_user(r.ru_utime.tv_usec, &ur->ru_utime.tv_usec); 1081 err |= __put_user(r.ru_stime.tv_sec, &ur->ru_stime.tv_sec); 1082 err |= __put_user(r.ru_stime.tv_usec, &ur->ru_stime.tv_usec); 1083 err |= __put_user(r.ru_maxrss, &ur->ru_maxrss); 1084 err |= __put_user(r.ru_ixrss, &ur->ru_ixrss); 1085 err |= __put_user(r.ru_idrss, &ur->ru_idrss); 1086 err |= __put_user(r.ru_isrss, &ur->ru_isrss); 1087 err |= __put_user(r.ru_minflt, &ur->ru_minflt); 1088 err |= __put_user(r.ru_majflt, &ur->ru_majflt); 1089 err |= __put_user(r.ru_nswap, &ur->ru_nswap); 1090 err |= __put_user(r.ru_inblock, &ur->ru_inblock); 1091 err |= __put_user(r.ru_oublock, &ur->ru_oublock); 1092 err |= __put_user(r.ru_msgsnd, &ur->ru_msgsnd); 1093 err |= __put_user(r.ru_msgrcv, &ur->ru_msgrcv); 1094 err |= __put_user(r.ru_nsignals, &ur->ru_nsignals); 1095 err |= __put_user(r.ru_nvcsw, &ur->ru_nvcsw); 1096 err |= __put_user(r.ru_nivcsw, &ur->ru_nivcsw); 1097 1098 return err ? err : ret; 1099 } 1100 1101 /* 1102 * I don't know what the parameters are: the first one 1103 * seems to be a timeval pointer, and I suspect the second 1104 * one is the time remaining.. Ho humm.. No documentation. 1105 */ 1106 asmlinkage int 1107 osf_usleep_thread(struct timeval32 __user *sleep, struct timeval32 __user *remain) 1108 { 1109 struct timeval tmp; 1110 unsigned long ticks; 1111 1112 if (get_tv32(&tmp, sleep)) 1113 goto fault; 1114 1115 ticks = timeval_to_jiffies(&tmp); 1116 1117 ticks = schedule_timeout_interruptible(ticks); 1118 1119 if (remain) { 1120 jiffies_to_timeval(ticks, &tmp); 1121 if (put_tv32(remain, &tmp)) 1122 goto fault; 1123 } 1124 1125 return 0; 1126 fault: 1127 return -EFAULT; 1128 } 1129 1130 1131 struct timex32 { 1132 unsigned int modes; /* mode selector */ 1133 long offset; /* time offset (usec) */ 1134 long freq; /* frequency offset (scaled ppm) */ 1135 long maxerror; /* maximum error (usec) */ 1136 long esterror; /* estimated error (usec) */ 1137 int status; /* clock command/status */ 1138 long constant; /* pll time constant */ 1139 long precision; /* clock precision (usec) (read only) */ 1140 long tolerance; /* clock frequency tolerance (ppm) 1141 * (read only) 1142 */ 1143 struct timeval32 time; /* (read only) */ 1144 long tick; /* (modified) usecs between clock ticks */ 1145 1146 long ppsfreq; /* pps frequency (scaled ppm) (ro) */ 1147 long jitter; /* pps jitter (us) (ro) */ 1148 int shift; /* interval duration (s) (shift) (ro) */ 1149 long stabil; /* pps stability (scaled ppm) (ro) */ 1150 long jitcnt; /* jitter limit exceeded (ro) */ 1151 long calcnt; /* calibration intervals (ro) */ 1152 long errcnt; /* calibration errors (ro) */ 1153 long stbcnt; /* stability limit exceeded (ro) */ 1154 1155 int :32; int :32; int :32; int :32; 1156 int :32; int :32; int :32; int :32; 1157 int :32; int :32; int :32; int :32; 1158 }; 1159 1160 asmlinkage int 1161 sys_old_adjtimex(struct timex32 __user *txc_p) 1162 { 1163 struct timex txc; 1164 int ret; 1165 1166 /* copy relevant bits of struct timex. */ 1167 if (copy_from_user(&txc, txc_p, offsetof(struct timex32, time)) || 1168 copy_from_user(&txc.tick, &txc_p->tick, sizeof(struct timex32) - 1169 offsetof(struct timex32, time))) 1170 return -EFAULT; 1171 1172 ret = do_adjtimex(&txc); 1173 if (ret < 0) 1174 return ret; 1175 1176 /* copy back to timex32 */ 1177 if (copy_to_user(txc_p, &txc, offsetof(struct timex32, time)) || 1178 (copy_to_user(&txc_p->tick, &txc.tick, sizeof(struct timex32) - 1179 offsetof(struct timex32, tick))) || 1180 (put_tv32(&txc_p->time, &txc.time))) 1181 return -EFAULT; 1182 1183 return ret; 1184 } 1185 1186 /* Get an address range which is currently unmapped. Similar to the 1187 generic version except that we know how to honor ADDR_LIMIT_32BIT. */ 1188 1189 static unsigned long 1190 arch_get_unmapped_area_1(unsigned long addr, unsigned long len, 1191 unsigned long limit) 1192 { 1193 struct vm_area_struct *vma = find_vma(current->mm, addr); 1194 1195 while (1) { 1196 /* At this point: (!vma || addr < vma->vm_end). */ 1197 if (limit - len < addr) 1198 return -ENOMEM; 1199 if (!vma || addr + len <= vma->vm_start) 1200 return addr; 1201 addr = vma->vm_end; 1202 vma = vma->vm_next; 1203 } 1204 } 1205 1206 unsigned long 1207 arch_get_unmapped_area(struct file *filp, unsigned long addr, 1208 unsigned long len, unsigned long pgoff, 1209 unsigned long flags) 1210 { 1211 unsigned long limit; 1212 1213 /* "32 bit" actually means 31 bit, since pointers sign extend. */ 1214 if (current->personality & ADDR_LIMIT_32BIT) 1215 limit = 0x80000000; 1216 else 1217 limit = TASK_SIZE; 1218 1219 if (len > limit) 1220 return -ENOMEM; 1221 1222 if (flags & MAP_FIXED) 1223 return addr; 1224 1225 /* First, see if the given suggestion fits. 1226 1227 The OSF/1 loader (/sbin/loader) relies on us returning an 1228 address larger than the requested if one exists, which is 1229 a terribly broken way to program. 1230 1231 That said, I can see the use in being able to suggest not 1232 merely specific addresses, but regions of memory -- perhaps 1233 this feature should be incorporated into all ports? */ 1234 1235 if (addr) { 1236 addr = arch_get_unmapped_area_1 (PAGE_ALIGN(addr), len, limit); 1237 if (addr != (unsigned long) -ENOMEM) 1238 return addr; 1239 } 1240 1241 /* Next, try allocating at TASK_UNMAPPED_BASE. */ 1242 addr = arch_get_unmapped_area_1 (PAGE_ALIGN(TASK_UNMAPPED_BASE), 1243 len, limit); 1244 if (addr != (unsigned long) -ENOMEM) 1245 return addr; 1246 1247 /* Finally, try allocating in low memory. */ 1248 addr = arch_get_unmapped_area_1 (PAGE_SIZE, len, limit); 1249 1250 return addr; 1251 } 1252 1253 #ifdef CONFIG_OSF4_COMPAT 1254 1255 /* Clear top 32 bits of iov_len in the user's buffer for 1256 compatibility with old versions of OSF/1 where iov_len 1257 was defined as int. */ 1258 static int 1259 osf_fix_iov_len(const struct iovec __user *iov, unsigned long count) 1260 { 1261 unsigned long i; 1262 1263 for (i = 0 ; i < count ; i++) { 1264 int __user *iov_len_high = (int __user *)&iov[i].iov_len + 1; 1265 1266 if (put_user(0, iov_len_high)) 1267 return -EFAULT; 1268 } 1269 return 0; 1270 } 1271 1272 asmlinkage ssize_t 1273 osf_readv(unsigned long fd, const struct iovec __user * vector, unsigned long count) 1274 { 1275 if (unlikely(personality(current->personality) == PER_OSF4)) 1276 if (osf_fix_iov_len(vector, count)) 1277 return -EFAULT; 1278 return sys_readv(fd, vector, count); 1279 } 1280 1281 asmlinkage ssize_t 1282 osf_writev(unsigned long fd, const struct iovec __user * vector, unsigned long count) 1283 { 1284 if (unlikely(personality(current->personality) == PER_OSF4)) 1285 if (osf_fix_iov_len(vector, count)) 1286 return -EFAULT; 1287 return sys_writev(fd, vector, count); 1288 } 1289 1290 #endif 1291