1 /* 2 * linux/arch/alpha/kernel/osf_sys.c 3 * 4 * Copyright (C) 1995 Linus Torvalds 5 */ 6 7 /* 8 * This file handles some of the stranger OSF/1 system call interfaces. 9 * Some of the system calls expect a non-C calling standard, others have 10 * special parameter blocks.. 11 */ 12 13 #include <linux/errno.h> 14 #include <linux/sched.h> 15 #include <linux/kernel.h> 16 #include <linux/mm.h> 17 #include <linux/smp.h> 18 #include <linux/smp_lock.h> 19 #include <linux/stddef.h> 20 #include <linux/syscalls.h> 21 #include <linux/unistd.h> 22 #include <linux/ptrace.h> 23 #include <linux/slab.h> 24 #include <linux/user.h> 25 #include <linux/utsname.h> 26 #include <linux/time.h> 27 #include <linux/timex.h> 28 #include <linux/major.h> 29 #include <linux/stat.h> 30 #include <linux/mman.h> 31 #include <linux/shm.h> 32 #include <linux/poll.h> 33 #include <linux/file.h> 34 #include <linux/types.h> 35 #include <linux/ipc.h> 36 #include <linux/namei.h> 37 #include <linux/uio.h> 38 #include <linux/vfs.h> 39 #include <linux/rcupdate.h> 40 41 #include <asm/fpu.h> 42 #include <asm/io.h> 43 #include <asm/uaccess.h> 44 #include <asm/system.h> 45 #include <asm/sysinfo.h> 46 #include <asm/hwrpb.h> 47 #include <asm/processor.h> 48 49 /* 50 * Brk needs to return an error. Still support Linux's brk(0) query idiom, 51 * which OSF programs just shouldn't be doing. We're still not quite 52 * identical to OSF as we don't return 0 on success, but doing otherwise 53 * would require changes to libc. Hopefully this is good enough. 54 */ 55 SYSCALL_DEFINE1(osf_brk, unsigned long, brk) 56 { 57 unsigned long retval = sys_brk(brk); 58 if (brk && brk != retval) 59 retval = -ENOMEM; 60 return retval; 61 } 62 63 /* 64 * This is pure guess-work.. 65 */ 66 SYSCALL_DEFINE4(osf_set_program_attributes, unsigned long, text_start, 67 unsigned long, text_len, unsigned long, bss_start, 68 unsigned long, bss_len) 69 { 70 struct mm_struct *mm; 71 72 lock_kernel(); 73 mm = current->mm; 74 mm->end_code = bss_start + bss_len; 75 mm->start_brk = bss_start + bss_len; 76 mm->brk = bss_start + bss_len; 77 #if 0 78 printk("set_program_attributes(%lx %lx %lx %lx)\n", 79 text_start, text_len, bss_start, bss_len); 80 #endif 81 unlock_kernel(); 82 return 0; 83 } 84 85 /* 86 * OSF/1 directory handling functions... 87 * 88 * The "getdents()" interface is much more sane: the "basep" stuff is 89 * braindamage (it can't really handle filesystems where the directory 90 * offset differences aren't the same as "d_reclen"). 91 */ 92 #define NAME_OFFSET offsetof (struct osf_dirent, d_name) 93 94 struct osf_dirent { 95 unsigned int d_ino; 96 unsigned short d_reclen; 97 unsigned short d_namlen; 98 char d_name[1]; 99 }; 100 101 struct osf_dirent_callback { 102 struct osf_dirent __user *dirent; 103 long __user *basep; 104 unsigned int count; 105 int error; 106 }; 107 108 static int 109 osf_filldir(void *__buf, const char *name, int namlen, loff_t offset, 110 u64 ino, unsigned int d_type) 111 { 112 struct osf_dirent __user *dirent; 113 struct osf_dirent_callback *buf = (struct osf_dirent_callback *) __buf; 114 unsigned int reclen = ALIGN(NAME_OFFSET + namlen + 1, sizeof(u32)); 115 unsigned int d_ino; 116 117 buf->error = -EINVAL; /* only used if we fail */ 118 if (reclen > buf->count) 119 return -EINVAL; 120 d_ino = ino; 121 if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) { 122 buf->error = -EOVERFLOW; 123 return -EOVERFLOW; 124 } 125 if (buf->basep) { 126 if (put_user(offset, buf->basep)) 127 goto Efault; 128 buf->basep = NULL; 129 } 130 dirent = buf->dirent; 131 if (put_user(d_ino, &dirent->d_ino) || 132 put_user(namlen, &dirent->d_namlen) || 133 put_user(reclen, &dirent->d_reclen) || 134 copy_to_user(dirent->d_name, name, namlen) || 135 put_user(0, dirent->d_name + namlen)) 136 goto Efault; 137 dirent = (void __user *)dirent + reclen; 138 buf->dirent = dirent; 139 buf->count -= reclen; 140 return 0; 141 Efault: 142 buf->error = -EFAULT; 143 return -EFAULT; 144 } 145 146 SYSCALL_DEFINE4(osf_getdirentries, unsigned int, fd, 147 struct osf_dirent __user *, dirent, unsigned int, count, 148 long __user *, basep) 149 { 150 int error; 151 struct file *file; 152 struct osf_dirent_callback buf; 153 154 error = -EBADF; 155 file = fget(fd); 156 if (!file) 157 goto out; 158 159 buf.dirent = dirent; 160 buf.basep = basep; 161 buf.count = count; 162 buf.error = 0; 163 164 error = vfs_readdir(file, osf_filldir, &buf); 165 if (error >= 0) 166 error = buf.error; 167 if (count != buf.count) 168 error = count - buf.count; 169 170 fput(file); 171 out: 172 return error; 173 } 174 175 #undef NAME_OFFSET 176 177 SYSCALL_DEFINE6(osf_mmap, unsigned long, addr, unsigned long, len, 178 unsigned long, prot, unsigned long, flags, unsigned long, fd, 179 unsigned long, off) 180 { 181 unsigned long ret = -EINVAL; 182 183 #if 0 184 if (flags & (_MAP_HASSEMAPHORE | _MAP_INHERIT | _MAP_UNALIGNED)) 185 printk("%s: unimplemented OSF mmap flags %04lx\n", 186 current->comm, flags); 187 #endif 188 if ((off + PAGE_ALIGN(len)) < off) 189 goto out; 190 if (off & ~PAGE_MASK) 191 goto out; 192 ret = sys_mmap_pgoff(addr, len, prot, flags, fd, off >> PAGE_SHIFT); 193 out: 194 return ret; 195 } 196 197 198 /* 199 * The OSF/1 statfs structure is much larger, but this should 200 * match the beginning, at least. 201 */ 202 struct osf_statfs { 203 short f_type; 204 short f_flags; 205 int f_fsize; 206 int f_bsize; 207 int f_blocks; 208 int f_bfree; 209 int f_bavail; 210 int f_files; 211 int f_ffree; 212 __kernel_fsid_t f_fsid; 213 }; 214 215 static int 216 linux_to_osf_statfs(struct kstatfs *linux_stat, struct osf_statfs __user *osf_stat, 217 unsigned long bufsiz) 218 { 219 struct osf_statfs tmp_stat; 220 221 tmp_stat.f_type = linux_stat->f_type; 222 tmp_stat.f_flags = 0; /* mount flags */ 223 tmp_stat.f_fsize = linux_stat->f_frsize; 224 tmp_stat.f_bsize = linux_stat->f_bsize; 225 tmp_stat.f_blocks = linux_stat->f_blocks; 226 tmp_stat.f_bfree = linux_stat->f_bfree; 227 tmp_stat.f_bavail = linux_stat->f_bavail; 228 tmp_stat.f_files = linux_stat->f_files; 229 tmp_stat.f_ffree = linux_stat->f_ffree; 230 tmp_stat.f_fsid = linux_stat->f_fsid; 231 if (bufsiz > sizeof(tmp_stat)) 232 bufsiz = sizeof(tmp_stat); 233 return copy_to_user(osf_stat, &tmp_stat, bufsiz) ? -EFAULT : 0; 234 } 235 236 static int 237 do_osf_statfs(struct dentry * dentry, struct osf_statfs __user *buffer, 238 unsigned long bufsiz) 239 { 240 struct kstatfs linux_stat; 241 int error = vfs_statfs(dentry, &linux_stat); 242 if (!error) 243 error = linux_to_osf_statfs(&linux_stat, buffer, bufsiz); 244 return error; 245 } 246 247 SYSCALL_DEFINE3(osf_statfs, char __user *, pathname, 248 struct osf_statfs __user *, buffer, unsigned long, bufsiz) 249 { 250 struct path path; 251 int retval; 252 253 retval = user_path(pathname, &path); 254 if (!retval) { 255 retval = do_osf_statfs(path.dentry, buffer, bufsiz); 256 path_put(&path); 257 } 258 return retval; 259 } 260 261 SYSCALL_DEFINE3(osf_fstatfs, unsigned long, fd, 262 struct osf_statfs __user *, buffer, unsigned long, bufsiz) 263 { 264 struct file *file; 265 int retval; 266 267 retval = -EBADF; 268 file = fget(fd); 269 if (file) { 270 retval = do_osf_statfs(file->f_path.dentry, buffer, bufsiz); 271 fput(file); 272 } 273 return retval; 274 } 275 276 /* 277 * Uhh.. OSF/1 mount parameters aren't exactly obvious.. 278 * 279 * Although to be frank, neither are the native Linux/i386 ones.. 280 */ 281 struct ufs_args { 282 char __user *devname; 283 int flags; 284 uid_t exroot; 285 }; 286 287 struct cdfs_args { 288 char __user *devname; 289 int flags; 290 uid_t exroot; 291 292 /* This has lots more here, which Linux handles with the option block 293 but I'm too lazy to do the translation into ASCII. */ 294 }; 295 296 struct procfs_args { 297 char __user *devname; 298 int flags; 299 uid_t exroot; 300 }; 301 302 /* 303 * We can't actually handle ufs yet, so we translate UFS mounts to 304 * ext2fs mounts. I wouldn't mind a UFS filesystem, but the UFS 305 * layout is so braindead it's a major headache doing it. 306 * 307 * Just how long ago was it written? OTOH our UFS driver may be still 308 * unhappy with OSF UFS. [CHECKME] 309 */ 310 static int 311 osf_ufs_mount(char *dirname, struct ufs_args __user *args, int flags) 312 { 313 int retval; 314 struct cdfs_args tmp; 315 char *devname; 316 317 retval = -EFAULT; 318 if (copy_from_user(&tmp, args, sizeof(tmp))) 319 goto out; 320 devname = getname(tmp.devname); 321 retval = PTR_ERR(devname); 322 if (IS_ERR(devname)) 323 goto out; 324 retval = do_mount(devname, dirname, "ext2", flags, NULL); 325 putname(devname); 326 out: 327 return retval; 328 } 329 330 static int 331 osf_cdfs_mount(char *dirname, struct cdfs_args __user *args, int flags) 332 { 333 int retval; 334 struct cdfs_args tmp; 335 char *devname; 336 337 retval = -EFAULT; 338 if (copy_from_user(&tmp, args, sizeof(tmp))) 339 goto out; 340 devname = getname(tmp.devname); 341 retval = PTR_ERR(devname); 342 if (IS_ERR(devname)) 343 goto out; 344 retval = do_mount(devname, dirname, "iso9660", flags, NULL); 345 putname(devname); 346 out: 347 return retval; 348 } 349 350 static int 351 osf_procfs_mount(char *dirname, struct procfs_args __user *args, int flags) 352 { 353 struct procfs_args tmp; 354 355 if (copy_from_user(&tmp, args, sizeof(tmp))) 356 return -EFAULT; 357 358 return do_mount("", dirname, "proc", flags, NULL); 359 } 360 361 SYSCALL_DEFINE4(osf_mount, unsigned long, typenr, char __user *, path, 362 int, flag, void __user *, data) 363 { 364 int retval = -EINVAL; 365 char *name; 366 367 name = getname(path); 368 retval = PTR_ERR(name); 369 if (IS_ERR(name)) 370 goto out; 371 switch (typenr) { 372 case 1: 373 retval = osf_ufs_mount(name, data, flag); 374 break; 375 case 6: 376 retval = osf_cdfs_mount(name, data, flag); 377 break; 378 case 9: 379 retval = osf_procfs_mount(name, data, flag); 380 break; 381 default: 382 printk("osf_mount(%ld, %x)\n", typenr, flag); 383 } 384 putname(name); 385 out: 386 return retval; 387 } 388 389 SYSCALL_DEFINE1(osf_utsname, char __user *, name) 390 { 391 int error; 392 393 down_read(&uts_sem); 394 error = -EFAULT; 395 if (copy_to_user(name + 0, utsname()->sysname, 32)) 396 goto out; 397 if (copy_to_user(name + 32, utsname()->nodename, 32)) 398 goto out; 399 if (copy_to_user(name + 64, utsname()->release, 32)) 400 goto out; 401 if (copy_to_user(name + 96, utsname()->version, 32)) 402 goto out; 403 if (copy_to_user(name + 128, utsname()->machine, 32)) 404 goto out; 405 406 error = 0; 407 out: 408 up_read(&uts_sem); 409 return error; 410 } 411 412 SYSCALL_DEFINE0(getpagesize) 413 { 414 return PAGE_SIZE; 415 } 416 417 SYSCALL_DEFINE0(getdtablesize) 418 { 419 return sysctl_nr_open; 420 } 421 422 /* 423 * For compatibility with OSF/1 only. Use utsname(2) instead. 424 */ 425 SYSCALL_DEFINE2(osf_getdomainname, char __user *, name, int, namelen) 426 { 427 unsigned len; 428 int i; 429 430 if (!access_ok(VERIFY_WRITE, name, namelen)) 431 return -EFAULT; 432 433 len = namelen; 434 if (namelen > 32) 435 len = 32; 436 437 down_read(&uts_sem); 438 for (i = 0; i < len; ++i) { 439 __put_user(utsname()->domainname[i], name + i); 440 if (utsname()->domainname[i] == '\0') 441 break; 442 } 443 up_read(&uts_sem); 444 445 return 0; 446 } 447 448 /* 449 * The following stuff should move into a header file should it ever 450 * be labeled "officially supported." Right now, there is just enough 451 * support to avoid applications (such as tar) printing error 452 * messages. The attributes are not really implemented. 453 */ 454 455 /* 456 * Values for Property list entry flag 457 */ 458 #define PLE_PROPAGATE_ON_COPY 0x1 /* cp(1) will copy entry 459 by default */ 460 #define PLE_FLAG_MASK 0x1 /* Valid flag values */ 461 #define PLE_FLAG_ALL -1 /* All flag value */ 462 463 struct proplistname_args { 464 unsigned int pl_mask; 465 unsigned int pl_numnames; 466 char **pl_names; 467 }; 468 469 union pl_args { 470 struct setargs { 471 char __user *path; 472 long follow; 473 long nbytes; 474 char __user *buf; 475 } set; 476 struct fsetargs { 477 long fd; 478 long nbytes; 479 char __user *buf; 480 } fset; 481 struct getargs { 482 char __user *path; 483 long follow; 484 struct proplistname_args __user *name_args; 485 long nbytes; 486 char __user *buf; 487 int __user *min_buf_size; 488 } get; 489 struct fgetargs { 490 long fd; 491 struct proplistname_args __user *name_args; 492 long nbytes; 493 char __user *buf; 494 int __user *min_buf_size; 495 } fget; 496 struct delargs { 497 char __user *path; 498 long follow; 499 struct proplistname_args __user *name_args; 500 } del; 501 struct fdelargs { 502 long fd; 503 struct proplistname_args __user *name_args; 504 } fdel; 505 }; 506 507 enum pl_code { 508 PL_SET = 1, PL_FSET = 2, 509 PL_GET = 3, PL_FGET = 4, 510 PL_DEL = 5, PL_FDEL = 6 511 }; 512 513 SYSCALL_DEFINE2(osf_proplist_syscall, enum pl_code, code, 514 union pl_args __user *, args) 515 { 516 long error; 517 int __user *min_buf_size_ptr; 518 519 lock_kernel(); 520 switch (code) { 521 case PL_SET: 522 if (get_user(error, &args->set.nbytes)) 523 error = -EFAULT; 524 break; 525 case PL_FSET: 526 if (get_user(error, &args->fset.nbytes)) 527 error = -EFAULT; 528 break; 529 case PL_GET: 530 error = get_user(min_buf_size_ptr, &args->get.min_buf_size); 531 if (error) 532 break; 533 error = put_user(0, min_buf_size_ptr); 534 break; 535 case PL_FGET: 536 error = get_user(min_buf_size_ptr, &args->fget.min_buf_size); 537 if (error) 538 break; 539 error = put_user(0, min_buf_size_ptr); 540 break; 541 case PL_DEL: 542 case PL_FDEL: 543 error = 0; 544 break; 545 default: 546 error = -EOPNOTSUPP; 547 break; 548 }; 549 unlock_kernel(); 550 return error; 551 } 552 553 SYSCALL_DEFINE2(osf_sigstack, struct sigstack __user *, uss, 554 struct sigstack __user *, uoss) 555 { 556 unsigned long usp = rdusp(); 557 unsigned long oss_sp = current->sas_ss_sp + current->sas_ss_size; 558 unsigned long oss_os = on_sig_stack(usp); 559 int error; 560 561 if (uss) { 562 void __user *ss_sp; 563 564 error = -EFAULT; 565 if (get_user(ss_sp, &uss->ss_sp)) 566 goto out; 567 568 /* If the current stack was set with sigaltstack, don't 569 swap stacks while we are on it. */ 570 error = -EPERM; 571 if (current->sas_ss_sp && on_sig_stack(usp)) 572 goto out; 573 574 /* Since we don't know the extent of the stack, and we don't 575 track onstack-ness, but rather calculate it, we must 576 presume a size. Ho hum this interface is lossy. */ 577 current->sas_ss_sp = (unsigned long)ss_sp - SIGSTKSZ; 578 current->sas_ss_size = SIGSTKSZ; 579 } 580 581 if (uoss) { 582 error = -EFAULT; 583 if (! access_ok(VERIFY_WRITE, uoss, sizeof(*uoss)) 584 || __put_user(oss_sp, &uoss->ss_sp) 585 || __put_user(oss_os, &uoss->ss_onstack)) 586 goto out; 587 } 588 589 error = 0; 590 out: 591 return error; 592 } 593 594 SYSCALL_DEFINE3(osf_sysinfo, int, command, char __user *, buf, long, count) 595 { 596 char *sysinfo_table[] = { 597 utsname()->sysname, 598 utsname()->nodename, 599 utsname()->release, 600 utsname()->version, 601 utsname()->machine, 602 "alpha", /* instruction set architecture */ 603 "dummy", /* hardware serial number */ 604 "dummy", /* hardware manufacturer */ 605 "dummy", /* secure RPC domain */ 606 }; 607 unsigned long offset; 608 char *res; 609 long len, err = -EINVAL; 610 611 offset = command-1; 612 if (offset >= ARRAY_SIZE(sysinfo_table)) { 613 /* Digital UNIX has a few unpublished interfaces here */ 614 printk("sysinfo(%d)", command); 615 goto out; 616 } 617 618 down_read(&uts_sem); 619 res = sysinfo_table[offset]; 620 len = strlen(res)+1; 621 if (len > count) 622 len = count; 623 if (copy_to_user(buf, res, len)) 624 err = -EFAULT; 625 else 626 err = 0; 627 up_read(&uts_sem); 628 out: 629 return err; 630 } 631 632 SYSCALL_DEFINE5(osf_getsysinfo, unsigned long, op, void __user *, buffer, 633 unsigned long, nbytes, int __user *, start, void __user *, arg) 634 { 635 unsigned long w; 636 struct percpu_struct *cpu; 637 638 switch (op) { 639 case GSI_IEEE_FP_CONTROL: 640 /* Return current software fp control & status bits. */ 641 /* Note that DU doesn't verify available space here. */ 642 643 w = current_thread_info()->ieee_state & IEEE_SW_MASK; 644 w = swcr_update_status(w, rdfpcr()); 645 if (put_user(w, (unsigned long __user *) buffer)) 646 return -EFAULT; 647 return 0; 648 649 case GSI_IEEE_STATE_AT_SIGNAL: 650 /* 651 * Not sure anybody will ever use this weird stuff. These 652 * ops can be used (under OSF/1) to set the fpcr that should 653 * be used when a signal handler starts executing. 654 */ 655 break; 656 657 case GSI_UACPROC: 658 if (nbytes < sizeof(unsigned int)) 659 return -EINVAL; 660 w = (current_thread_info()->flags >> UAC_SHIFT) & UAC_BITMASK; 661 if (put_user(w, (unsigned int __user *)buffer)) 662 return -EFAULT; 663 return 1; 664 665 case GSI_PROC_TYPE: 666 if (nbytes < sizeof(unsigned long)) 667 return -EINVAL; 668 cpu = (struct percpu_struct*) 669 ((char*)hwrpb + hwrpb->processor_offset); 670 w = cpu->type; 671 if (put_user(w, (unsigned long __user*)buffer)) 672 return -EFAULT; 673 return 1; 674 675 case GSI_GET_HWRPB: 676 if (nbytes < sizeof(*hwrpb)) 677 return -EINVAL; 678 if (copy_to_user(buffer, hwrpb, nbytes) != 0) 679 return -EFAULT; 680 return 1; 681 682 default: 683 break; 684 } 685 686 return -EOPNOTSUPP; 687 } 688 689 SYSCALL_DEFINE5(osf_setsysinfo, unsigned long, op, void __user *, buffer, 690 unsigned long, nbytes, int __user *, start, void __user *, arg) 691 { 692 switch (op) { 693 case SSI_IEEE_FP_CONTROL: { 694 unsigned long swcr, fpcr; 695 unsigned int *state; 696 697 /* 698 * Alpha Architecture Handbook 4.7.7.3: 699 * To be fully IEEE compiant, we must track the current IEEE 700 * exception state in software, because spurious bits can be 701 * set in the trap shadow of a software-complete insn. 702 */ 703 704 if (get_user(swcr, (unsigned long __user *)buffer)) 705 return -EFAULT; 706 state = ¤t_thread_info()->ieee_state; 707 708 /* Update softare trap enable bits. */ 709 *state = (*state & ~IEEE_SW_MASK) | (swcr & IEEE_SW_MASK); 710 711 /* Update the real fpcr. */ 712 fpcr = rdfpcr() & FPCR_DYN_MASK; 713 fpcr |= ieee_swcr_to_fpcr(swcr); 714 wrfpcr(fpcr); 715 716 return 0; 717 } 718 719 case SSI_IEEE_RAISE_EXCEPTION: { 720 unsigned long exc, swcr, fpcr, fex; 721 unsigned int *state; 722 723 if (get_user(exc, (unsigned long __user *)buffer)) 724 return -EFAULT; 725 state = ¤t_thread_info()->ieee_state; 726 exc &= IEEE_STATUS_MASK; 727 728 /* Update softare trap enable bits. */ 729 swcr = (*state & IEEE_SW_MASK) | exc; 730 *state |= exc; 731 732 /* Update the real fpcr. */ 733 fpcr = rdfpcr(); 734 fpcr |= ieee_swcr_to_fpcr(swcr); 735 wrfpcr(fpcr); 736 737 /* If any exceptions set by this call, and are unmasked, 738 send a signal. Old exceptions are not signaled. */ 739 fex = (exc >> IEEE_STATUS_TO_EXCSUM_SHIFT) & swcr; 740 if (fex) { 741 siginfo_t info; 742 int si_code = 0; 743 744 if (fex & IEEE_TRAP_ENABLE_DNO) si_code = FPE_FLTUND; 745 if (fex & IEEE_TRAP_ENABLE_INE) si_code = FPE_FLTRES; 746 if (fex & IEEE_TRAP_ENABLE_UNF) si_code = FPE_FLTUND; 747 if (fex & IEEE_TRAP_ENABLE_OVF) si_code = FPE_FLTOVF; 748 if (fex & IEEE_TRAP_ENABLE_DZE) si_code = FPE_FLTDIV; 749 if (fex & IEEE_TRAP_ENABLE_INV) si_code = FPE_FLTINV; 750 751 info.si_signo = SIGFPE; 752 info.si_errno = 0; 753 info.si_code = si_code; 754 info.si_addr = NULL; /* FIXME */ 755 send_sig_info(SIGFPE, &info, current); 756 } 757 return 0; 758 } 759 760 case SSI_IEEE_STATE_AT_SIGNAL: 761 case SSI_IEEE_IGNORE_STATE_AT_SIGNAL: 762 /* 763 * Not sure anybody will ever use this weird stuff. These 764 * ops can be used (under OSF/1) to set the fpcr that should 765 * be used when a signal handler starts executing. 766 */ 767 break; 768 769 case SSI_NVPAIRS: { 770 unsigned long v, w, i; 771 unsigned int old, new; 772 773 for (i = 0; i < nbytes; ++i) { 774 775 if (get_user(v, 2*i + (unsigned int __user *)buffer)) 776 return -EFAULT; 777 if (get_user(w, 2*i + 1 + (unsigned int __user *)buffer)) 778 return -EFAULT; 779 switch (v) { 780 case SSIN_UACPROC: 781 again: 782 old = current_thread_info()->flags; 783 new = old & ~(UAC_BITMASK << UAC_SHIFT); 784 new = new | (w & UAC_BITMASK) << UAC_SHIFT; 785 if (cmpxchg(¤t_thread_info()->flags, 786 old, new) != old) 787 goto again; 788 break; 789 790 default: 791 return -EOPNOTSUPP; 792 } 793 } 794 return 0; 795 } 796 797 default: 798 break; 799 } 800 801 return -EOPNOTSUPP; 802 } 803 804 /* Translations due to the fact that OSF's time_t is an int. Which 805 affects all sorts of things, like timeval and itimerval. */ 806 807 extern struct timezone sys_tz; 808 809 struct timeval32 810 { 811 int tv_sec, tv_usec; 812 }; 813 814 struct itimerval32 815 { 816 struct timeval32 it_interval; 817 struct timeval32 it_value; 818 }; 819 820 static inline long 821 get_tv32(struct timeval *o, struct timeval32 __user *i) 822 { 823 return (!access_ok(VERIFY_READ, i, sizeof(*i)) || 824 (__get_user(o->tv_sec, &i->tv_sec) | 825 __get_user(o->tv_usec, &i->tv_usec))); 826 } 827 828 static inline long 829 put_tv32(struct timeval32 __user *o, struct timeval *i) 830 { 831 return (!access_ok(VERIFY_WRITE, o, sizeof(*o)) || 832 (__put_user(i->tv_sec, &o->tv_sec) | 833 __put_user(i->tv_usec, &o->tv_usec))); 834 } 835 836 static inline long 837 get_it32(struct itimerval *o, struct itimerval32 __user *i) 838 { 839 return (!access_ok(VERIFY_READ, i, sizeof(*i)) || 840 (__get_user(o->it_interval.tv_sec, &i->it_interval.tv_sec) | 841 __get_user(o->it_interval.tv_usec, &i->it_interval.tv_usec) | 842 __get_user(o->it_value.tv_sec, &i->it_value.tv_sec) | 843 __get_user(o->it_value.tv_usec, &i->it_value.tv_usec))); 844 } 845 846 static inline long 847 put_it32(struct itimerval32 __user *o, struct itimerval *i) 848 { 849 return (!access_ok(VERIFY_WRITE, o, sizeof(*o)) || 850 (__put_user(i->it_interval.tv_sec, &o->it_interval.tv_sec) | 851 __put_user(i->it_interval.tv_usec, &o->it_interval.tv_usec) | 852 __put_user(i->it_value.tv_sec, &o->it_value.tv_sec) | 853 __put_user(i->it_value.tv_usec, &o->it_value.tv_usec))); 854 } 855 856 static inline void 857 jiffies_to_timeval32(unsigned long jiffies, struct timeval32 *value) 858 { 859 value->tv_usec = (jiffies % HZ) * (1000000L / HZ); 860 value->tv_sec = jiffies / HZ; 861 } 862 863 SYSCALL_DEFINE2(osf_gettimeofday, struct timeval32 __user *, tv, 864 struct timezone __user *, tz) 865 { 866 if (tv) { 867 struct timeval ktv; 868 do_gettimeofday(&ktv); 869 if (put_tv32(tv, &ktv)) 870 return -EFAULT; 871 } 872 if (tz) { 873 if (copy_to_user(tz, &sys_tz, sizeof(sys_tz))) 874 return -EFAULT; 875 } 876 return 0; 877 } 878 879 SYSCALL_DEFINE2(osf_settimeofday, struct timeval32 __user *, tv, 880 struct timezone __user *, tz) 881 { 882 struct timespec kts; 883 struct timezone ktz; 884 885 if (tv) { 886 if (get_tv32((struct timeval *)&kts, tv)) 887 return -EFAULT; 888 } 889 if (tz) { 890 if (copy_from_user(&ktz, tz, sizeof(*tz))) 891 return -EFAULT; 892 } 893 894 kts.tv_nsec *= 1000; 895 896 return do_sys_settimeofday(tv ? &kts : NULL, tz ? &ktz : NULL); 897 } 898 899 SYSCALL_DEFINE2(osf_getitimer, int, which, struct itimerval32 __user *, it) 900 { 901 struct itimerval kit; 902 int error; 903 904 error = do_getitimer(which, &kit); 905 if (!error && put_it32(it, &kit)) 906 error = -EFAULT; 907 908 return error; 909 } 910 911 SYSCALL_DEFINE3(osf_setitimer, int, which, struct itimerval32 __user *, in, 912 struct itimerval32 __user *, out) 913 { 914 struct itimerval kin, kout; 915 int error; 916 917 if (in) { 918 if (get_it32(&kin, in)) 919 return -EFAULT; 920 } else 921 memset(&kin, 0, sizeof(kin)); 922 923 error = do_setitimer(which, &kin, out ? &kout : NULL); 924 if (error || !out) 925 return error; 926 927 if (put_it32(out, &kout)) 928 return -EFAULT; 929 930 return 0; 931 932 } 933 934 SYSCALL_DEFINE2(osf_utimes, char __user *, filename, 935 struct timeval32 __user *, tvs) 936 { 937 struct timespec tv[2]; 938 939 if (tvs) { 940 struct timeval ktvs[2]; 941 if (get_tv32(&ktvs[0], &tvs[0]) || 942 get_tv32(&ktvs[1], &tvs[1])) 943 return -EFAULT; 944 945 if (ktvs[0].tv_usec < 0 || ktvs[0].tv_usec >= 1000000 || 946 ktvs[1].tv_usec < 0 || ktvs[1].tv_usec >= 1000000) 947 return -EINVAL; 948 949 tv[0].tv_sec = ktvs[0].tv_sec; 950 tv[0].tv_nsec = 1000 * ktvs[0].tv_usec; 951 tv[1].tv_sec = ktvs[1].tv_sec; 952 tv[1].tv_nsec = 1000 * ktvs[1].tv_usec; 953 } 954 955 return do_utimes(AT_FDCWD, filename, tvs ? tv : NULL, 0); 956 } 957 958 #define MAX_SELECT_SECONDS \ 959 ((unsigned long) (MAX_SCHEDULE_TIMEOUT / HZ)-1) 960 961 SYSCALL_DEFINE5(osf_select, int, n, fd_set __user *, inp, fd_set __user *, outp, 962 fd_set __user *, exp, struct timeval32 __user *, tvp) 963 { 964 struct timespec end_time, *to = NULL; 965 if (tvp) { 966 time_t sec, usec; 967 968 to = &end_time; 969 970 if (!access_ok(VERIFY_READ, tvp, sizeof(*tvp)) 971 || __get_user(sec, &tvp->tv_sec) 972 || __get_user(usec, &tvp->tv_usec)) { 973 return -EFAULT; 974 } 975 976 if (sec < 0 || usec < 0) 977 return -EINVAL; 978 979 if (poll_select_set_timeout(to, sec, usec * NSEC_PER_USEC)) 980 return -EINVAL; 981 982 } 983 984 /* OSF does not copy back the remaining time. */ 985 return core_sys_select(n, inp, outp, exp, to); 986 } 987 988 struct rusage32 { 989 struct timeval32 ru_utime; /* user time used */ 990 struct timeval32 ru_stime; /* system time used */ 991 long ru_maxrss; /* maximum resident set size */ 992 long ru_ixrss; /* integral shared memory size */ 993 long ru_idrss; /* integral unshared data size */ 994 long ru_isrss; /* integral unshared stack size */ 995 long ru_minflt; /* page reclaims */ 996 long ru_majflt; /* page faults */ 997 long ru_nswap; /* swaps */ 998 long ru_inblock; /* block input operations */ 999 long ru_oublock; /* block output operations */ 1000 long ru_msgsnd; /* messages sent */ 1001 long ru_msgrcv; /* messages received */ 1002 long ru_nsignals; /* signals received */ 1003 long ru_nvcsw; /* voluntary context switches */ 1004 long ru_nivcsw; /* involuntary " */ 1005 }; 1006 1007 SYSCALL_DEFINE2(osf_getrusage, int, who, struct rusage32 __user *, ru) 1008 { 1009 struct rusage32 r; 1010 1011 if (who != RUSAGE_SELF && who != RUSAGE_CHILDREN) 1012 return -EINVAL; 1013 1014 memset(&r, 0, sizeof(r)); 1015 switch (who) { 1016 case RUSAGE_SELF: 1017 jiffies_to_timeval32(current->utime, &r.ru_utime); 1018 jiffies_to_timeval32(current->stime, &r.ru_stime); 1019 r.ru_minflt = current->min_flt; 1020 r.ru_majflt = current->maj_flt; 1021 break; 1022 case RUSAGE_CHILDREN: 1023 jiffies_to_timeval32(current->signal->cutime, &r.ru_utime); 1024 jiffies_to_timeval32(current->signal->cstime, &r.ru_stime); 1025 r.ru_minflt = current->signal->cmin_flt; 1026 r.ru_majflt = current->signal->cmaj_flt; 1027 break; 1028 } 1029 1030 return copy_to_user(ru, &r, sizeof(r)) ? -EFAULT : 0; 1031 } 1032 1033 SYSCALL_DEFINE4(osf_wait4, pid_t, pid, int __user *, ustatus, int, options, 1034 struct rusage32 __user *, ur) 1035 { 1036 struct rusage r; 1037 long ret, err; 1038 mm_segment_t old_fs; 1039 1040 if (!ur) 1041 return sys_wait4(pid, ustatus, options, NULL); 1042 1043 old_fs = get_fs(); 1044 1045 set_fs (KERNEL_DS); 1046 ret = sys_wait4(pid, ustatus, options, (struct rusage __user *) &r); 1047 set_fs (old_fs); 1048 1049 if (!access_ok(VERIFY_WRITE, ur, sizeof(*ur))) 1050 return -EFAULT; 1051 1052 err = 0; 1053 err |= __put_user(r.ru_utime.tv_sec, &ur->ru_utime.tv_sec); 1054 err |= __put_user(r.ru_utime.tv_usec, &ur->ru_utime.tv_usec); 1055 err |= __put_user(r.ru_stime.tv_sec, &ur->ru_stime.tv_sec); 1056 err |= __put_user(r.ru_stime.tv_usec, &ur->ru_stime.tv_usec); 1057 err |= __put_user(r.ru_maxrss, &ur->ru_maxrss); 1058 err |= __put_user(r.ru_ixrss, &ur->ru_ixrss); 1059 err |= __put_user(r.ru_idrss, &ur->ru_idrss); 1060 err |= __put_user(r.ru_isrss, &ur->ru_isrss); 1061 err |= __put_user(r.ru_minflt, &ur->ru_minflt); 1062 err |= __put_user(r.ru_majflt, &ur->ru_majflt); 1063 err |= __put_user(r.ru_nswap, &ur->ru_nswap); 1064 err |= __put_user(r.ru_inblock, &ur->ru_inblock); 1065 err |= __put_user(r.ru_oublock, &ur->ru_oublock); 1066 err |= __put_user(r.ru_msgsnd, &ur->ru_msgsnd); 1067 err |= __put_user(r.ru_msgrcv, &ur->ru_msgrcv); 1068 err |= __put_user(r.ru_nsignals, &ur->ru_nsignals); 1069 err |= __put_user(r.ru_nvcsw, &ur->ru_nvcsw); 1070 err |= __put_user(r.ru_nivcsw, &ur->ru_nivcsw); 1071 1072 return err ? err : ret; 1073 } 1074 1075 /* 1076 * I don't know what the parameters are: the first one 1077 * seems to be a timeval pointer, and I suspect the second 1078 * one is the time remaining.. Ho humm.. No documentation. 1079 */ 1080 SYSCALL_DEFINE2(osf_usleep_thread, struct timeval32 __user *, sleep, 1081 struct timeval32 __user *, remain) 1082 { 1083 struct timeval tmp; 1084 unsigned long ticks; 1085 1086 if (get_tv32(&tmp, sleep)) 1087 goto fault; 1088 1089 ticks = timeval_to_jiffies(&tmp); 1090 1091 ticks = schedule_timeout_interruptible(ticks); 1092 1093 if (remain) { 1094 jiffies_to_timeval(ticks, &tmp); 1095 if (put_tv32(remain, &tmp)) 1096 goto fault; 1097 } 1098 1099 return 0; 1100 fault: 1101 return -EFAULT; 1102 } 1103 1104 1105 struct timex32 { 1106 unsigned int modes; /* mode selector */ 1107 long offset; /* time offset (usec) */ 1108 long freq; /* frequency offset (scaled ppm) */ 1109 long maxerror; /* maximum error (usec) */ 1110 long esterror; /* estimated error (usec) */ 1111 int status; /* clock command/status */ 1112 long constant; /* pll time constant */ 1113 long precision; /* clock precision (usec) (read only) */ 1114 long tolerance; /* clock frequency tolerance (ppm) 1115 * (read only) 1116 */ 1117 struct timeval32 time; /* (read only) */ 1118 long tick; /* (modified) usecs between clock ticks */ 1119 1120 long ppsfreq; /* pps frequency (scaled ppm) (ro) */ 1121 long jitter; /* pps jitter (us) (ro) */ 1122 int shift; /* interval duration (s) (shift) (ro) */ 1123 long stabil; /* pps stability (scaled ppm) (ro) */ 1124 long jitcnt; /* jitter limit exceeded (ro) */ 1125 long calcnt; /* calibration intervals (ro) */ 1126 long errcnt; /* calibration errors (ro) */ 1127 long stbcnt; /* stability limit exceeded (ro) */ 1128 1129 int :32; int :32; int :32; int :32; 1130 int :32; int :32; int :32; int :32; 1131 int :32; int :32; int :32; int :32; 1132 }; 1133 1134 SYSCALL_DEFINE1(old_adjtimex, struct timex32 __user *, txc_p) 1135 { 1136 struct timex txc; 1137 int ret; 1138 1139 /* copy relevant bits of struct timex. */ 1140 if (copy_from_user(&txc, txc_p, offsetof(struct timex32, time)) || 1141 copy_from_user(&txc.tick, &txc_p->tick, sizeof(struct timex32) - 1142 offsetof(struct timex32, time))) 1143 return -EFAULT; 1144 1145 ret = do_adjtimex(&txc); 1146 if (ret < 0) 1147 return ret; 1148 1149 /* copy back to timex32 */ 1150 if (copy_to_user(txc_p, &txc, offsetof(struct timex32, time)) || 1151 (copy_to_user(&txc_p->tick, &txc.tick, sizeof(struct timex32) - 1152 offsetof(struct timex32, tick))) || 1153 (put_tv32(&txc_p->time, &txc.time))) 1154 return -EFAULT; 1155 1156 return ret; 1157 } 1158 1159 /* Get an address range which is currently unmapped. Similar to the 1160 generic version except that we know how to honor ADDR_LIMIT_32BIT. */ 1161 1162 static unsigned long 1163 arch_get_unmapped_area_1(unsigned long addr, unsigned long len, 1164 unsigned long limit) 1165 { 1166 struct vm_area_struct *vma = find_vma(current->mm, addr); 1167 1168 while (1) { 1169 /* At this point: (!vma || addr < vma->vm_end). */ 1170 if (limit - len < addr) 1171 return -ENOMEM; 1172 if (!vma || addr + len <= vma->vm_start) 1173 return addr; 1174 addr = vma->vm_end; 1175 vma = vma->vm_next; 1176 } 1177 } 1178 1179 unsigned long 1180 arch_get_unmapped_area(struct file *filp, unsigned long addr, 1181 unsigned long len, unsigned long pgoff, 1182 unsigned long flags) 1183 { 1184 unsigned long limit; 1185 1186 /* "32 bit" actually means 31 bit, since pointers sign extend. */ 1187 if (current->personality & ADDR_LIMIT_32BIT) 1188 limit = 0x80000000; 1189 else 1190 limit = TASK_SIZE; 1191 1192 if (len > limit) 1193 return -ENOMEM; 1194 1195 if (flags & MAP_FIXED) 1196 return addr; 1197 1198 /* First, see if the given suggestion fits. 1199 1200 The OSF/1 loader (/sbin/loader) relies on us returning an 1201 address larger than the requested if one exists, which is 1202 a terribly broken way to program. 1203 1204 That said, I can see the use in being able to suggest not 1205 merely specific addresses, but regions of memory -- perhaps 1206 this feature should be incorporated into all ports? */ 1207 1208 if (addr) { 1209 addr = arch_get_unmapped_area_1 (PAGE_ALIGN(addr), len, limit); 1210 if (addr != (unsigned long) -ENOMEM) 1211 return addr; 1212 } 1213 1214 /* Next, try allocating at TASK_UNMAPPED_BASE. */ 1215 addr = arch_get_unmapped_area_1 (PAGE_ALIGN(TASK_UNMAPPED_BASE), 1216 len, limit); 1217 if (addr != (unsigned long) -ENOMEM) 1218 return addr; 1219 1220 /* Finally, try allocating in low memory. */ 1221 addr = arch_get_unmapped_area_1 (PAGE_SIZE, len, limit); 1222 1223 return addr; 1224 } 1225 1226 #ifdef CONFIG_OSF4_COMPAT 1227 1228 /* Clear top 32 bits of iov_len in the user's buffer for 1229 compatibility with old versions of OSF/1 where iov_len 1230 was defined as int. */ 1231 static int 1232 osf_fix_iov_len(const struct iovec __user *iov, unsigned long count) 1233 { 1234 unsigned long i; 1235 1236 for (i = 0 ; i < count ; i++) { 1237 int __user *iov_len_high = (int __user *)&iov[i].iov_len + 1; 1238 1239 if (put_user(0, iov_len_high)) 1240 return -EFAULT; 1241 } 1242 return 0; 1243 } 1244 1245 SYSCALL_DEFINE3(osf_readv, unsigned long, fd, 1246 const struct iovec __user *, vector, unsigned long, count) 1247 { 1248 if (unlikely(personality(current->personality) == PER_OSF4)) 1249 if (osf_fix_iov_len(vector, count)) 1250 return -EFAULT; 1251 return sys_readv(fd, vector, count); 1252 } 1253 1254 SYSCALL_DEFINE3(osf_writev, unsigned long, fd, 1255 const struct iovec __user *, vector, unsigned long, count) 1256 { 1257 if (unlikely(personality(current->personality) == PER_OSF4)) 1258 if (osf_fix_iov_len(vector, count)) 1259 return -EFAULT; 1260 return sys_writev(fd, vector, count); 1261 } 1262 1263 #endif 1264