1 /* 2 * linux/arch/alpha/kernel/osf_sys.c 3 * 4 * Copyright (C) 1995 Linus Torvalds 5 */ 6 7 /* 8 * This file handles some of the stranger OSF/1 system call interfaces. 9 * Some of the system calls expect a non-C calling standard, others have 10 * special parameter blocks.. 11 */ 12 13 #include <linux/errno.h> 14 #include <linux/sched.h> 15 #include <linux/kernel.h> 16 #include <linux/mm.h> 17 #include <linux/smp.h> 18 #include <linux/smp_lock.h> 19 #include <linux/stddef.h> 20 #include <linux/syscalls.h> 21 #include <linux/unistd.h> 22 #include <linux/ptrace.h> 23 #include <linux/slab.h> 24 #include <linux/user.h> 25 #include <linux/utsname.h> 26 #include <linux/time.h> 27 #include <linux/timex.h> 28 #include <linux/major.h> 29 #include <linux/stat.h> 30 #include <linux/mman.h> 31 #include <linux/shm.h> 32 #include <linux/poll.h> 33 #include <linux/file.h> 34 #include <linux/types.h> 35 #include <linux/ipc.h> 36 #include <linux/namei.h> 37 #include <linux/uio.h> 38 #include <linux/vfs.h> 39 #include <linux/rcupdate.h> 40 41 #include <asm/fpu.h> 42 #include <asm/io.h> 43 #include <asm/uaccess.h> 44 #include <asm/system.h> 45 #include <asm/sysinfo.h> 46 #include <asm/hwrpb.h> 47 #include <asm/processor.h> 48 49 /* 50 * Brk needs to return an error. Still support Linux's brk(0) query idiom, 51 * which OSF programs just shouldn't be doing. We're still not quite 52 * identical to OSF as we don't return 0 on success, but doing otherwise 53 * would require changes to libc. Hopefully this is good enough. 54 */ 55 SYSCALL_DEFINE1(osf_brk, unsigned long, brk) 56 { 57 unsigned long retval = sys_brk(brk); 58 if (brk && brk != retval) 59 retval = -ENOMEM; 60 return retval; 61 } 62 63 /* 64 * This is pure guess-work.. 65 */ 66 SYSCALL_DEFINE4(osf_set_program_attributes, unsigned long, text_start, 67 unsigned long, text_len, unsigned long, bss_start, 68 unsigned long, bss_len) 69 { 70 struct mm_struct *mm; 71 72 lock_kernel(); 73 mm = current->mm; 74 mm->end_code = bss_start + bss_len; 75 mm->start_brk = bss_start + bss_len; 76 mm->brk = bss_start + bss_len; 77 #if 0 78 printk("set_program_attributes(%lx %lx %lx %lx)\n", 79 text_start, text_len, bss_start, bss_len); 80 #endif 81 unlock_kernel(); 82 return 0; 83 } 84 85 /* 86 * OSF/1 directory handling functions... 87 * 88 * The "getdents()" interface is much more sane: the "basep" stuff is 89 * braindamage (it can't really handle filesystems where the directory 90 * offset differences aren't the same as "d_reclen"). 91 */ 92 #define NAME_OFFSET offsetof (struct osf_dirent, d_name) 93 94 struct osf_dirent { 95 unsigned int d_ino; 96 unsigned short d_reclen; 97 unsigned short d_namlen; 98 char d_name[1]; 99 }; 100 101 struct osf_dirent_callback { 102 struct osf_dirent __user *dirent; 103 long __user *basep; 104 unsigned int count; 105 int error; 106 }; 107 108 static int 109 osf_filldir(void *__buf, const char *name, int namlen, loff_t offset, 110 u64 ino, unsigned int d_type) 111 { 112 struct osf_dirent __user *dirent; 113 struct osf_dirent_callback *buf = (struct osf_dirent_callback *) __buf; 114 unsigned int reclen = ALIGN(NAME_OFFSET + namlen + 1, sizeof(u32)); 115 unsigned int d_ino; 116 117 buf->error = -EINVAL; /* only used if we fail */ 118 if (reclen > buf->count) 119 return -EINVAL; 120 d_ino = ino; 121 if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) { 122 buf->error = -EOVERFLOW; 123 return -EOVERFLOW; 124 } 125 if (buf->basep) { 126 if (put_user(offset, buf->basep)) 127 goto Efault; 128 buf->basep = NULL; 129 } 130 dirent = buf->dirent; 131 if (put_user(d_ino, &dirent->d_ino) || 132 put_user(namlen, &dirent->d_namlen) || 133 put_user(reclen, &dirent->d_reclen) || 134 copy_to_user(dirent->d_name, name, namlen) || 135 put_user(0, dirent->d_name + namlen)) 136 goto Efault; 137 dirent = (void __user *)dirent + reclen; 138 buf->dirent = dirent; 139 buf->count -= reclen; 140 return 0; 141 Efault: 142 buf->error = -EFAULT; 143 return -EFAULT; 144 } 145 146 SYSCALL_DEFINE4(osf_getdirentries, unsigned int, fd, 147 struct osf_dirent __user *, dirent, unsigned int, count, 148 long __user *, basep) 149 { 150 int error; 151 struct file *file; 152 struct osf_dirent_callback buf; 153 154 error = -EBADF; 155 file = fget(fd); 156 if (!file) 157 goto out; 158 159 buf.dirent = dirent; 160 buf.basep = basep; 161 buf.count = count; 162 buf.error = 0; 163 164 error = vfs_readdir(file, osf_filldir, &buf); 165 if (error >= 0) 166 error = buf.error; 167 if (count != buf.count) 168 error = count - buf.count; 169 170 fput(file); 171 out: 172 return error; 173 } 174 175 #undef NAME_OFFSET 176 177 SYSCALL_DEFINE6(osf_mmap, unsigned long, addr, unsigned long, len, 178 unsigned long, prot, unsigned long, flags, unsigned long, fd, 179 unsigned long, off) 180 { 181 struct file *file = NULL; 182 unsigned long ret = -EBADF; 183 184 #if 0 185 if (flags & (_MAP_HASSEMAPHORE | _MAP_INHERIT | _MAP_UNALIGNED)) 186 printk("%s: unimplemented OSF mmap flags %04lx\n", 187 current->comm, flags); 188 #endif 189 if (!(flags & MAP_ANONYMOUS)) { 190 file = fget(fd); 191 if (!file) 192 goto out; 193 } 194 flags &= ~(MAP_EXECUTABLE | MAP_DENYWRITE); 195 down_write(¤t->mm->mmap_sem); 196 ret = do_mmap(file, addr, len, prot, flags, off); 197 up_write(¤t->mm->mmap_sem); 198 if (file) 199 fput(file); 200 out: 201 return ret; 202 } 203 204 205 /* 206 * The OSF/1 statfs structure is much larger, but this should 207 * match the beginning, at least. 208 */ 209 struct osf_statfs { 210 short f_type; 211 short f_flags; 212 int f_fsize; 213 int f_bsize; 214 int f_blocks; 215 int f_bfree; 216 int f_bavail; 217 int f_files; 218 int f_ffree; 219 __kernel_fsid_t f_fsid; 220 }; 221 222 static int 223 linux_to_osf_statfs(struct kstatfs *linux_stat, struct osf_statfs __user *osf_stat, 224 unsigned long bufsiz) 225 { 226 struct osf_statfs tmp_stat; 227 228 tmp_stat.f_type = linux_stat->f_type; 229 tmp_stat.f_flags = 0; /* mount flags */ 230 tmp_stat.f_fsize = linux_stat->f_frsize; 231 tmp_stat.f_bsize = linux_stat->f_bsize; 232 tmp_stat.f_blocks = linux_stat->f_blocks; 233 tmp_stat.f_bfree = linux_stat->f_bfree; 234 tmp_stat.f_bavail = linux_stat->f_bavail; 235 tmp_stat.f_files = linux_stat->f_files; 236 tmp_stat.f_ffree = linux_stat->f_ffree; 237 tmp_stat.f_fsid = linux_stat->f_fsid; 238 if (bufsiz > sizeof(tmp_stat)) 239 bufsiz = sizeof(tmp_stat); 240 return copy_to_user(osf_stat, &tmp_stat, bufsiz) ? -EFAULT : 0; 241 } 242 243 static int 244 do_osf_statfs(struct dentry * dentry, struct osf_statfs __user *buffer, 245 unsigned long bufsiz) 246 { 247 struct kstatfs linux_stat; 248 int error = vfs_statfs(dentry, &linux_stat); 249 if (!error) 250 error = linux_to_osf_statfs(&linux_stat, buffer, bufsiz); 251 return error; 252 } 253 254 SYSCALL_DEFINE3(osf_statfs, char __user *, pathname, 255 struct osf_statfs __user *, buffer, unsigned long, bufsiz) 256 { 257 struct path path; 258 int retval; 259 260 retval = user_path(pathname, &path); 261 if (!retval) { 262 retval = do_osf_statfs(path.dentry, buffer, bufsiz); 263 path_put(&path); 264 } 265 return retval; 266 } 267 268 SYSCALL_DEFINE3(osf_fstatfs, unsigned long, fd, 269 struct osf_statfs __user *, buffer, unsigned long, bufsiz) 270 { 271 struct file *file; 272 int retval; 273 274 retval = -EBADF; 275 file = fget(fd); 276 if (file) { 277 retval = do_osf_statfs(file->f_path.dentry, buffer, bufsiz); 278 fput(file); 279 } 280 return retval; 281 } 282 283 /* 284 * Uhh.. OSF/1 mount parameters aren't exactly obvious.. 285 * 286 * Although to be frank, neither are the native Linux/i386 ones.. 287 */ 288 struct ufs_args { 289 char __user *devname; 290 int flags; 291 uid_t exroot; 292 }; 293 294 struct cdfs_args { 295 char __user *devname; 296 int flags; 297 uid_t exroot; 298 299 /* This has lots more here, which Linux handles with the option block 300 but I'm too lazy to do the translation into ASCII. */ 301 }; 302 303 struct procfs_args { 304 char __user *devname; 305 int flags; 306 uid_t exroot; 307 }; 308 309 /* 310 * We can't actually handle ufs yet, so we translate UFS mounts to 311 * ext2fs mounts. I wouldn't mind a UFS filesystem, but the UFS 312 * layout is so braindead it's a major headache doing it. 313 * 314 * Just how long ago was it written? OTOH our UFS driver may be still 315 * unhappy with OSF UFS. [CHECKME] 316 */ 317 static int 318 osf_ufs_mount(char *dirname, struct ufs_args __user *args, int flags) 319 { 320 int retval; 321 struct cdfs_args tmp; 322 char *devname; 323 324 retval = -EFAULT; 325 if (copy_from_user(&tmp, args, sizeof(tmp))) 326 goto out; 327 devname = getname(tmp.devname); 328 retval = PTR_ERR(devname); 329 if (IS_ERR(devname)) 330 goto out; 331 retval = do_mount(devname, dirname, "ext2", flags, NULL); 332 putname(devname); 333 out: 334 return retval; 335 } 336 337 static int 338 osf_cdfs_mount(char *dirname, struct cdfs_args __user *args, int flags) 339 { 340 int retval; 341 struct cdfs_args tmp; 342 char *devname; 343 344 retval = -EFAULT; 345 if (copy_from_user(&tmp, args, sizeof(tmp))) 346 goto out; 347 devname = getname(tmp.devname); 348 retval = PTR_ERR(devname); 349 if (IS_ERR(devname)) 350 goto out; 351 retval = do_mount(devname, dirname, "iso9660", flags, NULL); 352 putname(devname); 353 out: 354 return retval; 355 } 356 357 static int 358 osf_procfs_mount(char *dirname, struct procfs_args __user *args, int flags) 359 { 360 struct procfs_args tmp; 361 362 if (copy_from_user(&tmp, args, sizeof(tmp))) 363 return -EFAULT; 364 365 return do_mount("", dirname, "proc", flags, NULL); 366 } 367 368 SYSCALL_DEFINE4(osf_mount, unsigned long, typenr, char __user *, path, 369 int, flag, void __user *, data) 370 { 371 int retval = -EINVAL; 372 char *name; 373 374 lock_kernel(); 375 376 name = getname(path); 377 retval = PTR_ERR(name); 378 if (IS_ERR(name)) 379 goto out; 380 switch (typenr) { 381 case 1: 382 retval = osf_ufs_mount(name, data, flag); 383 break; 384 case 6: 385 retval = osf_cdfs_mount(name, data, flag); 386 break; 387 case 9: 388 retval = osf_procfs_mount(name, data, flag); 389 break; 390 default: 391 printk("osf_mount(%ld, %x)\n", typenr, flag); 392 } 393 putname(name); 394 out: 395 unlock_kernel(); 396 return retval; 397 } 398 399 SYSCALL_DEFINE1(osf_utsname, char __user *, name) 400 { 401 int error; 402 403 down_read(&uts_sem); 404 error = -EFAULT; 405 if (copy_to_user(name + 0, utsname()->sysname, 32)) 406 goto out; 407 if (copy_to_user(name + 32, utsname()->nodename, 32)) 408 goto out; 409 if (copy_to_user(name + 64, utsname()->release, 32)) 410 goto out; 411 if (copy_to_user(name + 96, utsname()->version, 32)) 412 goto out; 413 if (copy_to_user(name + 128, utsname()->machine, 32)) 414 goto out; 415 416 error = 0; 417 out: 418 up_read(&uts_sem); 419 return error; 420 } 421 422 SYSCALL_DEFINE0(getpagesize) 423 { 424 return PAGE_SIZE; 425 } 426 427 SYSCALL_DEFINE0(getdtablesize) 428 { 429 return sysctl_nr_open; 430 } 431 432 /* 433 * For compatibility with OSF/1 only. Use utsname(2) instead. 434 */ 435 SYSCALL_DEFINE2(osf_getdomainname, char __user *, name, int, namelen) 436 { 437 unsigned len; 438 int i; 439 440 if (!access_ok(VERIFY_WRITE, name, namelen)) 441 return -EFAULT; 442 443 len = namelen; 444 if (namelen > 32) 445 len = 32; 446 447 down_read(&uts_sem); 448 for (i = 0; i < len; ++i) { 449 __put_user(utsname()->domainname[i], name + i); 450 if (utsname()->domainname[i] == '\0') 451 break; 452 } 453 up_read(&uts_sem); 454 455 return 0; 456 } 457 458 /* 459 * The following stuff should move into a header file should it ever 460 * be labeled "officially supported." Right now, there is just enough 461 * support to avoid applications (such as tar) printing error 462 * messages. The attributes are not really implemented. 463 */ 464 465 /* 466 * Values for Property list entry flag 467 */ 468 #define PLE_PROPAGATE_ON_COPY 0x1 /* cp(1) will copy entry 469 by default */ 470 #define PLE_FLAG_MASK 0x1 /* Valid flag values */ 471 #define PLE_FLAG_ALL -1 /* All flag value */ 472 473 struct proplistname_args { 474 unsigned int pl_mask; 475 unsigned int pl_numnames; 476 char **pl_names; 477 }; 478 479 union pl_args { 480 struct setargs { 481 char __user *path; 482 long follow; 483 long nbytes; 484 char __user *buf; 485 } set; 486 struct fsetargs { 487 long fd; 488 long nbytes; 489 char __user *buf; 490 } fset; 491 struct getargs { 492 char __user *path; 493 long follow; 494 struct proplistname_args __user *name_args; 495 long nbytes; 496 char __user *buf; 497 int __user *min_buf_size; 498 } get; 499 struct fgetargs { 500 long fd; 501 struct proplistname_args __user *name_args; 502 long nbytes; 503 char __user *buf; 504 int __user *min_buf_size; 505 } fget; 506 struct delargs { 507 char __user *path; 508 long follow; 509 struct proplistname_args __user *name_args; 510 } del; 511 struct fdelargs { 512 long fd; 513 struct proplistname_args __user *name_args; 514 } fdel; 515 }; 516 517 enum pl_code { 518 PL_SET = 1, PL_FSET = 2, 519 PL_GET = 3, PL_FGET = 4, 520 PL_DEL = 5, PL_FDEL = 6 521 }; 522 523 SYSCALL_DEFINE2(osf_proplist_syscall, enum pl_code, code, 524 union pl_args __user *, args) 525 { 526 long error; 527 int __user *min_buf_size_ptr; 528 529 lock_kernel(); 530 switch (code) { 531 case PL_SET: 532 if (get_user(error, &args->set.nbytes)) 533 error = -EFAULT; 534 break; 535 case PL_FSET: 536 if (get_user(error, &args->fset.nbytes)) 537 error = -EFAULT; 538 break; 539 case PL_GET: 540 error = get_user(min_buf_size_ptr, &args->get.min_buf_size); 541 if (error) 542 break; 543 error = put_user(0, min_buf_size_ptr); 544 break; 545 case PL_FGET: 546 error = get_user(min_buf_size_ptr, &args->fget.min_buf_size); 547 if (error) 548 break; 549 error = put_user(0, min_buf_size_ptr); 550 break; 551 case PL_DEL: 552 case PL_FDEL: 553 error = 0; 554 break; 555 default: 556 error = -EOPNOTSUPP; 557 break; 558 }; 559 unlock_kernel(); 560 return error; 561 } 562 563 SYSCALL_DEFINE2(osf_sigstack, struct sigstack __user *, uss, 564 struct sigstack __user *, uoss) 565 { 566 unsigned long usp = rdusp(); 567 unsigned long oss_sp = current->sas_ss_sp + current->sas_ss_size; 568 unsigned long oss_os = on_sig_stack(usp); 569 int error; 570 571 if (uss) { 572 void __user *ss_sp; 573 574 error = -EFAULT; 575 if (get_user(ss_sp, &uss->ss_sp)) 576 goto out; 577 578 /* If the current stack was set with sigaltstack, don't 579 swap stacks while we are on it. */ 580 error = -EPERM; 581 if (current->sas_ss_sp && on_sig_stack(usp)) 582 goto out; 583 584 /* Since we don't know the extent of the stack, and we don't 585 track onstack-ness, but rather calculate it, we must 586 presume a size. Ho hum this interface is lossy. */ 587 current->sas_ss_sp = (unsigned long)ss_sp - SIGSTKSZ; 588 current->sas_ss_size = SIGSTKSZ; 589 } 590 591 if (uoss) { 592 error = -EFAULT; 593 if (! access_ok(VERIFY_WRITE, uoss, sizeof(*uoss)) 594 || __put_user(oss_sp, &uoss->ss_sp) 595 || __put_user(oss_os, &uoss->ss_onstack)) 596 goto out; 597 } 598 599 error = 0; 600 out: 601 return error; 602 } 603 604 SYSCALL_DEFINE3(osf_sysinfo, int, command, char __user *, buf, long, count) 605 { 606 char *sysinfo_table[] = { 607 utsname()->sysname, 608 utsname()->nodename, 609 utsname()->release, 610 utsname()->version, 611 utsname()->machine, 612 "alpha", /* instruction set architecture */ 613 "dummy", /* hardware serial number */ 614 "dummy", /* hardware manufacturer */ 615 "dummy", /* secure RPC domain */ 616 }; 617 unsigned long offset; 618 char *res; 619 long len, err = -EINVAL; 620 621 offset = command-1; 622 if (offset >= ARRAY_SIZE(sysinfo_table)) { 623 /* Digital UNIX has a few unpublished interfaces here */ 624 printk("sysinfo(%d)", command); 625 goto out; 626 } 627 628 down_read(&uts_sem); 629 res = sysinfo_table[offset]; 630 len = strlen(res)+1; 631 if (len > count) 632 len = count; 633 if (copy_to_user(buf, res, len)) 634 err = -EFAULT; 635 else 636 err = 0; 637 up_read(&uts_sem); 638 out: 639 return err; 640 } 641 642 SYSCALL_DEFINE5(osf_getsysinfo, unsigned long, op, void __user *, buffer, 643 unsigned long, nbytes, int __user *, start, void __user *, arg) 644 { 645 unsigned long w; 646 struct percpu_struct *cpu; 647 648 switch (op) { 649 case GSI_IEEE_FP_CONTROL: 650 /* Return current software fp control & status bits. */ 651 /* Note that DU doesn't verify available space here. */ 652 653 w = current_thread_info()->ieee_state & IEEE_SW_MASK; 654 w = swcr_update_status(w, rdfpcr()); 655 if (put_user(w, (unsigned long __user *) buffer)) 656 return -EFAULT; 657 return 0; 658 659 case GSI_IEEE_STATE_AT_SIGNAL: 660 /* 661 * Not sure anybody will ever use this weird stuff. These 662 * ops can be used (under OSF/1) to set the fpcr that should 663 * be used when a signal handler starts executing. 664 */ 665 break; 666 667 case GSI_UACPROC: 668 if (nbytes < sizeof(unsigned int)) 669 return -EINVAL; 670 w = (current_thread_info()->flags >> UAC_SHIFT) & UAC_BITMASK; 671 if (put_user(w, (unsigned int __user *)buffer)) 672 return -EFAULT; 673 return 1; 674 675 case GSI_PROC_TYPE: 676 if (nbytes < sizeof(unsigned long)) 677 return -EINVAL; 678 cpu = (struct percpu_struct*) 679 ((char*)hwrpb + hwrpb->processor_offset); 680 w = cpu->type; 681 if (put_user(w, (unsigned long __user*)buffer)) 682 return -EFAULT; 683 return 1; 684 685 case GSI_GET_HWRPB: 686 if (nbytes < sizeof(*hwrpb)) 687 return -EINVAL; 688 if (copy_to_user(buffer, hwrpb, nbytes) != 0) 689 return -EFAULT; 690 return 1; 691 692 default: 693 break; 694 } 695 696 return -EOPNOTSUPP; 697 } 698 699 SYSCALL_DEFINE5(osf_setsysinfo, unsigned long, op, void __user *, buffer, 700 unsigned long, nbytes, int __user *, start, void __user *, arg) 701 { 702 switch (op) { 703 case SSI_IEEE_FP_CONTROL: { 704 unsigned long swcr, fpcr; 705 unsigned int *state; 706 707 /* 708 * Alpha Architecture Handbook 4.7.7.3: 709 * To be fully IEEE compiant, we must track the current IEEE 710 * exception state in software, because spurious bits can be 711 * set in the trap shadow of a software-complete insn. 712 */ 713 714 if (get_user(swcr, (unsigned long __user *)buffer)) 715 return -EFAULT; 716 state = ¤t_thread_info()->ieee_state; 717 718 /* Update softare trap enable bits. */ 719 *state = (*state & ~IEEE_SW_MASK) | (swcr & IEEE_SW_MASK); 720 721 /* Update the real fpcr. */ 722 fpcr = rdfpcr() & FPCR_DYN_MASK; 723 fpcr |= ieee_swcr_to_fpcr(swcr); 724 wrfpcr(fpcr); 725 726 return 0; 727 } 728 729 case SSI_IEEE_RAISE_EXCEPTION: { 730 unsigned long exc, swcr, fpcr, fex; 731 unsigned int *state; 732 733 if (get_user(exc, (unsigned long __user *)buffer)) 734 return -EFAULT; 735 state = ¤t_thread_info()->ieee_state; 736 exc &= IEEE_STATUS_MASK; 737 738 /* Update softare trap enable bits. */ 739 swcr = (*state & IEEE_SW_MASK) | exc; 740 *state |= exc; 741 742 /* Update the real fpcr. */ 743 fpcr = rdfpcr(); 744 fpcr |= ieee_swcr_to_fpcr(swcr); 745 wrfpcr(fpcr); 746 747 /* If any exceptions set by this call, and are unmasked, 748 send a signal. Old exceptions are not signaled. */ 749 fex = (exc >> IEEE_STATUS_TO_EXCSUM_SHIFT) & swcr; 750 if (fex) { 751 siginfo_t info; 752 int si_code = 0; 753 754 if (fex & IEEE_TRAP_ENABLE_DNO) si_code = FPE_FLTUND; 755 if (fex & IEEE_TRAP_ENABLE_INE) si_code = FPE_FLTRES; 756 if (fex & IEEE_TRAP_ENABLE_UNF) si_code = FPE_FLTUND; 757 if (fex & IEEE_TRAP_ENABLE_OVF) si_code = FPE_FLTOVF; 758 if (fex & IEEE_TRAP_ENABLE_DZE) si_code = FPE_FLTDIV; 759 if (fex & IEEE_TRAP_ENABLE_INV) si_code = FPE_FLTINV; 760 761 info.si_signo = SIGFPE; 762 info.si_errno = 0; 763 info.si_code = si_code; 764 info.si_addr = NULL; /* FIXME */ 765 send_sig_info(SIGFPE, &info, current); 766 } 767 return 0; 768 } 769 770 case SSI_IEEE_STATE_AT_SIGNAL: 771 case SSI_IEEE_IGNORE_STATE_AT_SIGNAL: 772 /* 773 * Not sure anybody will ever use this weird stuff. These 774 * ops can be used (under OSF/1) to set the fpcr that should 775 * be used when a signal handler starts executing. 776 */ 777 break; 778 779 case SSI_NVPAIRS: { 780 unsigned long v, w, i; 781 unsigned int old, new; 782 783 for (i = 0; i < nbytes; ++i) { 784 785 if (get_user(v, 2*i + (unsigned int __user *)buffer)) 786 return -EFAULT; 787 if (get_user(w, 2*i + 1 + (unsigned int __user *)buffer)) 788 return -EFAULT; 789 switch (v) { 790 case SSIN_UACPROC: 791 again: 792 old = current_thread_info()->flags; 793 new = old & ~(UAC_BITMASK << UAC_SHIFT); 794 new = new | (w & UAC_BITMASK) << UAC_SHIFT; 795 if (cmpxchg(¤t_thread_info()->flags, 796 old, new) != old) 797 goto again; 798 break; 799 800 default: 801 return -EOPNOTSUPP; 802 } 803 } 804 return 0; 805 } 806 807 default: 808 break; 809 } 810 811 return -EOPNOTSUPP; 812 } 813 814 /* Translations due to the fact that OSF's time_t is an int. Which 815 affects all sorts of things, like timeval and itimerval. */ 816 817 extern struct timezone sys_tz; 818 819 struct timeval32 820 { 821 int tv_sec, tv_usec; 822 }; 823 824 struct itimerval32 825 { 826 struct timeval32 it_interval; 827 struct timeval32 it_value; 828 }; 829 830 static inline long 831 get_tv32(struct timeval *o, struct timeval32 __user *i) 832 { 833 return (!access_ok(VERIFY_READ, i, sizeof(*i)) || 834 (__get_user(o->tv_sec, &i->tv_sec) | 835 __get_user(o->tv_usec, &i->tv_usec))); 836 } 837 838 static inline long 839 put_tv32(struct timeval32 __user *o, struct timeval *i) 840 { 841 return (!access_ok(VERIFY_WRITE, o, sizeof(*o)) || 842 (__put_user(i->tv_sec, &o->tv_sec) | 843 __put_user(i->tv_usec, &o->tv_usec))); 844 } 845 846 static inline long 847 get_it32(struct itimerval *o, struct itimerval32 __user *i) 848 { 849 return (!access_ok(VERIFY_READ, i, sizeof(*i)) || 850 (__get_user(o->it_interval.tv_sec, &i->it_interval.tv_sec) | 851 __get_user(o->it_interval.tv_usec, &i->it_interval.tv_usec) | 852 __get_user(o->it_value.tv_sec, &i->it_value.tv_sec) | 853 __get_user(o->it_value.tv_usec, &i->it_value.tv_usec))); 854 } 855 856 static inline long 857 put_it32(struct itimerval32 __user *o, struct itimerval *i) 858 { 859 return (!access_ok(VERIFY_WRITE, o, sizeof(*o)) || 860 (__put_user(i->it_interval.tv_sec, &o->it_interval.tv_sec) | 861 __put_user(i->it_interval.tv_usec, &o->it_interval.tv_usec) | 862 __put_user(i->it_value.tv_sec, &o->it_value.tv_sec) | 863 __put_user(i->it_value.tv_usec, &o->it_value.tv_usec))); 864 } 865 866 static inline void 867 jiffies_to_timeval32(unsigned long jiffies, struct timeval32 *value) 868 { 869 value->tv_usec = (jiffies % HZ) * (1000000L / HZ); 870 value->tv_sec = jiffies / HZ; 871 } 872 873 SYSCALL_DEFINE2(osf_gettimeofday, struct timeval32 __user *, tv, 874 struct timezone __user *, tz) 875 { 876 if (tv) { 877 struct timeval ktv; 878 do_gettimeofday(&ktv); 879 if (put_tv32(tv, &ktv)) 880 return -EFAULT; 881 } 882 if (tz) { 883 if (copy_to_user(tz, &sys_tz, sizeof(sys_tz))) 884 return -EFAULT; 885 } 886 return 0; 887 } 888 889 SYSCALL_DEFINE2(osf_settimeofday, struct timeval32 __user *, tv, 890 struct timezone __user *, tz) 891 { 892 struct timespec kts; 893 struct timezone ktz; 894 895 if (tv) { 896 if (get_tv32((struct timeval *)&kts, tv)) 897 return -EFAULT; 898 } 899 if (tz) { 900 if (copy_from_user(&ktz, tz, sizeof(*tz))) 901 return -EFAULT; 902 } 903 904 kts.tv_nsec *= 1000; 905 906 return do_sys_settimeofday(tv ? &kts : NULL, tz ? &ktz : NULL); 907 } 908 909 SYSCALL_DEFINE2(osf_getitimer, int, which, struct itimerval32 __user *, it) 910 { 911 struct itimerval kit; 912 int error; 913 914 error = do_getitimer(which, &kit); 915 if (!error && put_it32(it, &kit)) 916 error = -EFAULT; 917 918 return error; 919 } 920 921 SYSCALL_DEFINE3(osf_setitimer, int, which, struct itimerval32 __user *, in, 922 struct itimerval32 __user *, out) 923 { 924 struct itimerval kin, kout; 925 int error; 926 927 if (in) { 928 if (get_it32(&kin, in)) 929 return -EFAULT; 930 } else 931 memset(&kin, 0, sizeof(kin)); 932 933 error = do_setitimer(which, &kin, out ? &kout : NULL); 934 if (error || !out) 935 return error; 936 937 if (put_it32(out, &kout)) 938 return -EFAULT; 939 940 return 0; 941 942 } 943 944 SYSCALL_DEFINE2(osf_utimes, char __user *, filename, 945 struct timeval32 __user *, tvs) 946 { 947 struct timespec tv[2]; 948 949 if (tvs) { 950 struct timeval ktvs[2]; 951 if (get_tv32(&ktvs[0], &tvs[0]) || 952 get_tv32(&ktvs[1], &tvs[1])) 953 return -EFAULT; 954 955 if (ktvs[0].tv_usec < 0 || ktvs[0].tv_usec >= 1000000 || 956 ktvs[1].tv_usec < 0 || ktvs[1].tv_usec >= 1000000) 957 return -EINVAL; 958 959 tv[0].tv_sec = ktvs[0].tv_sec; 960 tv[0].tv_nsec = 1000 * ktvs[0].tv_usec; 961 tv[1].tv_sec = ktvs[1].tv_sec; 962 tv[1].tv_nsec = 1000 * ktvs[1].tv_usec; 963 } 964 965 return do_utimes(AT_FDCWD, filename, tvs ? tv : NULL, 0); 966 } 967 968 #define MAX_SELECT_SECONDS \ 969 ((unsigned long) (MAX_SCHEDULE_TIMEOUT / HZ)-1) 970 971 SYSCALL_DEFINE5(osf_select, int, n, fd_set __user *, inp, fd_set __user *, outp, 972 fd_set __user *, exp, struct timeval32 __user *, tvp) 973 { 974 struct timespec end_time, *to = NULL; 975 if (tvp) { 976 time_t sec, usec; 977 978 to = &end_time; 979 980 if (!access_ok(VERIFY_READ, tvp, sizeof(*tvp)) 981 || __get_user(sec, &tvp->tv_sec) 982 || __get_user(usec, &tvp->tv_usec)) { 983 return -EFAULT; 984 } 985 986 if (sec < 0 || usec < 0) 987 return -EINVAL; 988 989 if (poll_select_set_timeout(to, sec, usec * NSEC_PER_USEC)) 990 return -EINVAL; 991 992 } 993 994 /* OSF does not copy back the remaining time. */ 995 return core_sys_select(n, inp, outp, exp, to); 996 } 997 998 struct rusage32 { 999 struct timeval32 ru_utime; /* user time used */ 1000 struct timeval32 ru_stime; /* system time used */ 1001 long ru_maxrss; /* maximum resident set size */ 1002 long ru_ixrss; /* integral shared memory size */ 1003 long ru_idrss; /* integral unshared data size */ 1004 long ru_isrss; /* integral unshared stack size */ 1005 long ru_minflt; /* page reclaims */ 1006 long ru_majflt; /* page faults */ 1007 long ru_nswap; /* swaps */ 1008 long ru_inblock; /* block input operations */ 1009 long ru_oublock; /* block output operations */ 1010 long ru_msgsnd; /* messages sent */ 1011 long ru_msgrcv; /* messages received */ 1012 long ru_nsignals; /* signals received */ 1013 long ru_nvcsw; /* voluntary context switches */ 1014 long ru_nivcsw; /* involuntary " */ 1015 }; 1016 1017 SYSCALL_DEFINE2(osf_getrusage, int, who, struct rusage32 __user *, ru) 1018 { 1019 struct rusage32 r; 1020 1021 if (who != RUSAGE_SELF && who != RUSAGE_CHILDREN) 1022 return -EINVAL; 1023 1024 memset(&r, 0, sizeof(r)); 1025 switch (who) { 1026 case RUSAGE_SELF: 1027 jiffies_to_timeval32(current->utime, &r.ru_utime); 1028 jiffies_to_timeval32(current->stime, &r.ru_stime); 1029 r.ru_minflt = current->min_flt; 1030 r.ru_majflt = current->maj_flt; 1031 break; 1032 case RUSAGE_CHILDREN: 1033 jiffies_to_timeval32(current->signal->cutime, &r.ru_utime); 1034 jiffies_to_timeval32(current->signal->cstime, &r.ru_stime); 1035 r.ru_minflt = current->signal->cmin_flt; 1036 r.ru_majflt = current->signal->cmaj_flt; 1037 break; 1038 } 1039 1040 return copy_to_user(ru, &r, sizeof(r)) ? -EFAULT : 0; 1041 } 1042 1043 SYSCALL_DEFINE4(osf_wait4, pid_t, pid, int __user *, ustatus, int, options, 1044 struct rusage32 __user *, ur) 1045 { 1046 struct rusage r; 1047 long ret, err; 1048 mm_segment_t old_fs; 1049 1050 if (!ur) 1051 return sys_wait4(pid, ustatus, options, NULL); 1052 1053 old_fs = get_fs(); 1054 1055 set_fs (KERNEL_DS); 1056 ret = sys_wait4(pid, ustatus, options, (struct rusage __user *) &r); 1057 set_fs (old_fs); 1058 1059 if (!access_ok(VERIFY_WRITE, ur, sizeof(*ur))) 1060 return -EFAULT; 1061 1062 err = 0; 1063 err |= __put_user(r.ru_utime.tv_sec, &ur->ru_utime.tv_sec); 1064 err |= __put_user(r.ru_utime.tv_usec, &ur->ru_utime.tv_usec); 1065 err |= __put_user(r.ru_stime.tv_sec, &ur->ru_stime.tv_sec); 1066 err |= __put_user(r.ru_stime.tv_usec, &ur->ru_stime.tv_usec); 1067 err |= __put_user(r.ru_maxrss, &ur->ru_maxrss); 1068 err |= __put_user(r.ru_ixrss, &ur->ru_ixrss); 1069 err |= __put_user(r.ru_idrss, &ur->ru_idrss); 1070 err |= __put_user(r.ru_isrss, &ur->ru_isrss); 1071 err |= __put_user(r.ru_minflt, &ur->ru_minflt); 1072 err |= __put_user(r.ru_majflt, &ur->ru_majflt); 1073 err |= __put_user(r.ru_nswap, &ur->ru_nswap); 1074 err |= __put_user(r.ru_inblock, &ur->ru_inblock); 1075 err |= __put_user(r.ru_oublock, &ur->ru_oublock); 1076 err |= __put_user(r.ru_msgsnd, &ur->ru_msgsnd); 1077 err |= __put_user(r.ru_msgrcv, &ur->ru_msgrcv); 1078 err |= __put_user(r.ru_nsignals, &ur->ru_nsignals); 1079 err |= __put_user(r.ru_nvcsw, &ur->ru_nvcsw); 1080 err |= __put_user(r.ru_nivcsw, &ur->ru_nivcsw); 1081 1082 return err ? err : ret; 1083 } 1084 1085 /* 1086 * I don't know what the parameters are: the first one 1087 * seems to be a timeval pointer, and I suspect the second 1088 * one is the time remaining.. Ho humm.. No documentation. 1089 */ 1090 SYSCALL_DEFINE2(osf_usleep_thread, struct timeval32 __user *, sleep, 1091 struct timeval32 __user *, remain) 1092 { 1093 struct timeval tmp; 1094 unsigned long ticks; 1095 1096 if (get_tv32(&tmp, sleep)) 1097 goto fault; 1098 1099 ticks = timeval_to_jiffies(&tmp); 1100 1101 ticks = schedule_timeout_interruptible(ticks); 1102 1103 if (remain) { 1104 jiffies_to_timeval(ticks, &tmp); 1105 if (put_tv32(remain, &tmp)) 1106 goto fault; 1107 } 1108 1109 return 0; 1110 fault: 1111 return -EFAULT; 1112 } 1113 1114 1115 struct timex32 { 1116 unsigned int modes; /* mode selector */ 1117 long offset; /* time offset (usec) */ 1118 long freq; /* frequency offset (scaled ppm) */ 1119 long maxerror; /* maximum error (usec) */ 1120 long esterror; /* estimated error (usec) */ 1121 int status; /* clock command/status */ 1122 long constant; /* pll time constant */ 1123 long precision; /* clock precision (usec) (read only) */ 1124 long tolerance; /* clock frequency tolerance (ppm) 1125 * (read only) 1126 */ 1127 struct timeval32 time; /* (read only) */ 1128 long tick; /* (modified) usecs between clock ticks */ 1129 1130 long ppsfreq; /* pps frequency (scaled ppm) (ro) */ 1131 long jitter; /* pps jitter (us) (ro) */ 1132 int shift; /* interval duration (s) (shift) (ro) */ 1133 long stabil; /* pps stability (scaled ppm) (ro) */ 1134 long jitcnt; /* jitter limit exceeded (ro) */ 1135 long calcnt; /* calibration intervals (ro) */ 1136 long errcnt; /* calibration errors (ro) */ 1137 long stbcnt; /* stability limit exceeded (ro) */ 1138 1139 int :32; int :32; int :32; int :32; 1140 int :32; int :32; int :32; int :32; 1141 int :32; int :32; int :32; int :32; 1142 }; 1143 1144 SYSCALL_DEFINE1(old_adjtimex, struct timex32 __user *, txc_p) 1145 { 1146 struct timex txc; 1147 int ret; 1148 1149 /* copy relevant bits of struct timex. */ 1150 if (copy_from_user(&txc, txc_p, offsetof(struct timex32, time)) || 1151 copy_from_user(&txc.tick, &txc_p->tick, sizeof(struct timex32) - 1152 offsetof(struct timex32, time))) 1153 return -EFAULT; 1154 1155 ret = do_adjtimex(&txc); 1156 if (ret < 0) 1157 return ret; 1158 1159 /* copy back to timex32 */ 1160 if (copy_to_user(txc_p, &txc, offsetof(struct timex32, time)) || 1161 (copy_to_user(&txc_p->tick, &txc.tick, sizeof(struct timex32) - 1162 offsetof(struct timex32, tick))) || 1163 (put_tv32(&txc_p->time, &txc.time))) 1164 return -EFAULT; 1165 1166 return ret; 1167 } 1168 1169 /* Get an address range which is currently unmapped. Similar to the 1170 generic version except that we know how to honor ADDR_LIMIT_32BIT. */ 1171 1172 static unsigned long 1173 arch_get_unmapped_area_1(unsigned long addr, unsigned long len, 1174 unsigned long limit) 1175 { 1176 struct vm_area_struct *vma = find_vma(current->mm, addr); 1177 1178 while (1) { 1179 /* At this point: (!vma || addr < vma->vm_end). */ 1180 if (limit - len < addr) 1181 return -ENOMEM; 1182 if (!vma || addr + len <= vma->vm_start) 1183 return addr; 1184 addr = vma->vm_end; 1185 vma = vma->vm_next; 1186 } 1187 } 1188 1189 unsigned long 1190 arch_get_unmapped_area(struct file *filp, unsigned long addr, 1191 unsigned long len, unsigned long pgoff, 1192 unsigned long flags) 1193 { 1194 unsigned long limit; 1195 1196 /* "32 bit" actually means 31 bit, since pointers sign extend. */ 1197 if (current->personality & ADDR_LIMIT_32BIT) 1198 limit = 0x80000000; 1199 else 1200 limit = TASK_SIZE; 1201 1202 if (len > limit) 1203 return -ENOMEM; 1204 1205 if (flags & MAP_FIXED) 1206 return addr; 1207 1208 /* First, see if the given suggestion fits. 1209 1210 The OSF/1 loader (/sbin/loader) relies on us returning an 1211 address larger than the requested if one exists, which is 1212 a terribly broken way to program. 1213 1214 That said, I can see the use in being able to suggest not 1215 merely specific addresses, but regions of memory -- perhaps 1216 this feature should be incorporated into all ports? */ 1217 1218 if (addr) { 1219 addr = arch_get_unmapped_area_1 (PAGE_ALIGN(addr), len, limit); 1220 if (addr != (unsigned long) -ENOMEM) 1221 return addr; 1222 } 1223 1224 /* Next, try allocating at TASK_UNMAPPED_BASE. */ 1225 addr = arch_get_unmapped_area_1 (PAGE_ALIGN(TASK_UNMAPPED_BASE), 1226 len, limit); 1227 if (addr != (unsigned long) -ENOMEM) 1228 return addr; 1229 1230 /* Finally, try allocating in low memory. */ 1231 addr = arch_get_unmapped_area_1 (PAGE_SIZE, len, limit); 1232 1233 return addr; 1234 } 1235 1236 #ifdef CONFIG_OSF4_COMPAT 1237 1238 /* Clear top 32 bits of iov_len in the user's buffer for 1239 compatibility with old versions of OSF/1 where iov_len 1240 was defined as int. */ 1241 static int 1242 osf_fix_iov_len(const struct iovec __user *iov, unsigned long count) 1243 { 1244 unsigned long i; 1245 1246 for (i = 0 ; i < count ; i++) { 1247 int __user *iov_len_high = (int __user *)&iov[i].iov_len + 1; 1248 1249 if (put_user(0, iov_len_high)) 1250 return -EFAULT; 1251 } 1252 return 0; 1253 } 1254 1255 SYSCALL_DEFINE3(osf_readv, unsigned long, fd, 1256 const struct iovec __user *, vector, unsigned long, count) 1257 { 1258 if (unlikely(personality(current->personality) == PER_OSF4)) 1259 if (osf_fix_iov_len(vector, count)) 1260 return -EFAULT; 1261 return sys_readv(fd, vector, count); 1262 } 1263 1264 SYSCALL_DEFINE3(osf_writev, unsigned long, fd, 1265 const struct iovec __user *, vector, unsigned long, count) 1266 { 1267 if (unlikely(personality(current->personality) == PER_OSF4)) 1268 if (osf_fix_iov_len(vector, count)) 1269 return -EFAULT; 1270 return sys_writev(fd, vector, count); 1271 } 1272 1273 #endif 1274