xref: /openbmc/linux/arch/alpha/kernel/osf_sys.c (revision b9ccfda2)
1 /*
2  *  linux/arch/alpha/kernel/osf_sys.c
3  *
4  *  Copyright (C) 1995  Linus Torvalds
5  */
6 
7 /*
8  * This file handles some of the stranger OSF/1 system call interfaces.
9  * Some of the system calls expect a non-C calling standard, others have
10  * special parameter blocks..
11  */
12 
13 #include <linux/errno.h>
14 #include <linux/sched.h>
15 #include <linux/kernel.h>
16 #include <linux/mm.h>
17 #include <linux/smp.h>
18 #include <linux/stddef.h>
19 #include <linux/syscalls.h>
20 #include <linux/unistd.h>
21 #include <linux/ptrace.h>
22 #include <linux/user.h>
23 #include <linux/utsname.h>
24 #include <linux/time.h>
25 #include <linux/timex.h>
26 #include <linux/major.h>
27 #include <linux/stat.h>
28 #include <linux/mman.h>
29 #include <linux/shm.h>
30 #include <linux/poll.h>
31 #include <linux/file.h>
32 #include <linux/types.h>
33 #include <linux/ipc.h>
34 #include <linux/namei.h>
35 #include <linux/uio.h>
36 #include <linux/vfs.h>
37 #include <linux/rcupdate.h>
38 #include <linux/slab.h>
39 
40 #include <asm/fpu.h>
41 #include <asm/io.h>
42 #include <asm/uaccess.h>
43 #include <asm/sysinfo.h>
44 #include <asm/thread_info.h>
45 #include <asm/hwrpb.h>
46 #include <asm/processor.h>
47 
48 /*
49  * Brk needs to return an error.  Still support Linux's brk(0) query idiom,
50  * which OSF programs just shouldn't be doing.  We're still not quite
51  * identical to OSF as we don't return 0 on success, but doing otherwise
52  * would require changes to libc.  Hopefully this is good enough.
53  */
54 SYSCALL_DEFINE1(osf_brk, unsigned long, brk)
55 {
56 	unsigned long retval = sys_brk(brk);
57 	if (brk && brk != retval)
58 		retval = -ENOMEM;
59 	return retval;
60 }
61 
62 /*
63  * This is pure guess-work..
64  */
65 SYSCALL_DEFINE4(osf_set_program_attributes, unsigned long, text_start,
66 		unsigned long, text_len, unsigned long, bss_start,
67 		unsigned long, bss_len)
68 {
69 	struct mm_struct *mm;
70 
71 	mm = current->mm;
72 	mm->end_code = bss_start + bss_len;
73 	mm->start_brk = bss_start + bss_len;
74 	mm->brk = bss_start + bss_len;
75 #if 0
76 	printk("set_program_attributes(%lx %lx %lx %lx)\n",
77 		text_start, text_len, bss_start, bss_len);
78 #endif
79 	return 0;
80 }
81 
82 /*
83  * OSF/1 directory handling functions...
84  *
85  * The "getdents()" interface is much more sane: the "basep" stuff is
86  * braindamage (it can't really handle filesystems where the directory
87  * offset differences aren't the same as "d_reclen").
88  */
89 #define NAME_OFFSET	offsetof (struct osf_dirent, d_name)
90 
91 struct osf_dirent {
92 	unsigned int d_ino;
93 	unsigned short d_reclen;
94 	unsigned short d_namlen;
95 	char d_name[1];
96 };
97 
98 struct osf_dirent_callback {
99 	struct osf_dirent __user *dirent;
100 	long __user *basep;
101 	unsigned int count;
102 	int error;
103 };
104 
105 static int
106 osf_filldir(void *__buf, const char *name, int namlen, loff_t offset,
107 	    u64 ino, unsigned int d_type)
108 {
109 	struct osf_dirent __user *dirent;
110 	struct osf_dirent_callback *buf = (struct osf_dirent_callback *) __buf;
111 	unsigned int reclen = ALIGN(NAME_OFFSET + namlen + 1, sizeof(u32));
112 	unsigned int d_ino;
113 
114 	buf->error = -EINVAL;	/* only used if we fail */
115 	if (reclen > buf->count)
116 		return -EINVAL;
117 	d_ino = ino;
118 	if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) {
119 		buf->error = -EOVERFLOW;
120 		return -EOVERFLOW;
121 	}
122 	if (buf->basep) {
123 		if (put_user(offset, buf->basep))
124 			goto Efault;
125 		buf->basep = NULL;
126 	}
127 	dirent = buf->dirent;
128 	if (put_user(d_ino, &dirent->d_ino) ||
129 	    put_user(namlen, &dirent->d_namlen) ||
130 	    put_user(reclen, &dirent->d_reclen) ||
131 	    copy_to_user(dirent->d_name, name, namlen) ||
132 	    put_user(0, dirent->d_name + namlen))
133 		goto Efault;
134 	dirent = (void __user *)dirent + reclen;
135 	buf->dirent = dirent;
136 	buf->count -= reclen;
137 	return 0;
138 Efault:
139 	buf->error = -EFAULT;
140 	return -EFAULT;
141 }
142 
143 SYSCALL_DEFINE4(osf_getdirentries, unsigned int, fd,
144 		struct osf_dirent __user *, dirent, unsigned int, count,
145 		long __user *, basep)
146 {
147 	int error;
148 	struct file *file;
149 	struct osf_dirent_callback buf;
150 
151 	error = -EBADF;
152 	file = fget(fd);
153 	if (!file)
154 		goto out;
155 
156 	buf.dirent = dirent;
157 	buf.basep = basep;
158 	buf.count = count;
159 	buf.error = 0;
160 
161 	error = vfs_readdir(file, osf_filldir, &buf);
162 	if (error >= 0)
163 		error = buf.error;
164 	if (count != buf.count)
165 		error = count - buf.count;
166 
167 	fput(file);
168  out:
169 	return error;
170 }
171 
172 #undef NAME_OFFSET
173 
174 SYSCALL_DEFINE6(osf_mmap, unsigned long, addr, unsigned long, len,
175 		unsigned long, prot, unsigned long, flags, unsigned long, fd,
176 		unsigned long, off)
177 {
178 	unsigned long ret = -EINVAL;
179 
180 #if 0
181 	if (flags & (_MAP_HASSEMAPHORE | _MAP_INHERIT | _MAP_UNALIGNED))
182 		printk("%s: unimplemented OSF mmap flags %04lx\n",
183 			current->comm, flags);
184 #endif
185 	if ((off + PAGE_ALIGN(len)) < off)
186 		goto out;
187 	if (off & ~PAGE_MASK)
188 		goto out;
189 	ret = sys_mmap_pgoff(addr, len, prot, flags, fd, off >> PAGE_SHIFT);
190  out:
191 	return ret;
192 }
193 
194 struct osf_stat {
195 	int		st_dev;
196 	int		st_pad1;
197 	unsigned	st_mode;
198 	unsigned short	st_nlink;
199 	short		st_nlink_reserved;
200 	unsigned	st_uid;
201 	unsigned	st_gid;
202 	int		st_rdev;
203 	int		st_ldev;
204 	long		st_size;
205 	int		st_pad2;
206 	int		st_uatime;
207 	int		st_pad3;
208 	int		st_umtime;
209 	int		st_pad4;
210 	int		st_uctime;
211 	int		st_pad5;
212 	int		st_pad6;
213 	unsigned	st_flags;
214 	unsigned	st_gen;
215 	long		st_spare[4];
216 	unsigned	st_ino;
217 	int		st_ino_reserved;
218 	int		st_atime;
219 	int		st_atime_reserved;
220 	int		st_mtime;
221 	int		st_mtime_reserved;
222 	int		st_ctime;
223 	int		st_ctime_reserved;
224 	long		st_blksize;
225 	long		st_blocks;
226 };
227 
228 /*
229  * The OSF/1 statfs structure is much larger, but this should
230  * match the beginning, at least.
231  */
232 struct osf_statfs {
233 	short f_type;
234 	short f_flags;
235 	int f_fsize;
236 	int f_bsize;
237 	int f_blocks;
238 	int f_bfree;
239 	int f_bavail;
240 	int f_files;
241 	int f_ffree;
242 	__kernel_fsid_t f_fsid;
243 };
244 
245 struct osf_statfs64 {
246 	short f_type;
247 	short f_flags;
248 	int f_pad1;
249 	int f_pad2;
250 	int f_pad3;
251 	int f_pad4;
252 	int f_pad5;
253 	int f_pad6;
254 	int f_pad7;
255 	__kernel_fsid_t f_fsid;
256 	u_short f_namemax;
257 	short f_reserved1;
258 	int f_spare[8];
259 	char f_pad8[90];
260 	char f_pad9[90];
261 	long mount_info[10];
262 	u_long f_flags2;
263 	long f_spare2[14];
264 	long f_fsize;
265 	long f_bsize;
266 	long f_blocks;
267 	long f_bfree;
268 	long f_bavail;
269 	long f_files;
270 	long f_ffree;
271 };
272 
273 static int
274 linux_to_osf_stat(struct kstat *lstat, struct osf_stat __user *osf_stat)
275 {
276 	struct osf_stat tmp = { 0 };
277 
278 	tmp.st_dev	= lstat->dev;
279 	tmp.st_mode	= lstat->mode;
280 	tmp.st_nlink	= lstat->nlink;
281 	tmp.st_uid	= lstat->uid;
282 	tmp.st_gid	= lstat->gid;
283 	tmp.st_rdev	= lstat->rdev;
284 	tmp.st_ldev	= lstat->rdev;
285 	tmp.st_size	= lstat->size;
286 	tmp.st_uatime	= lstat->atime.tv_nsec / 1000;
287 	tmp.st_umtime	= lstat->mtime.tv_nsec / 1000;
288 	tmp.st_uctime	= lstat->ctime.tv_nsec / 1000;
289 	tmp.st_ino	= lstat->ino;
290 	tmp.st_atime	= lstat->atime.tv_sec;
291 	tmp.st_mtime	= lstat->mtime.tv_sec;
292 	tmp.st_ctime	= lstat->ctime.tv_sec;
293 	tmp.st_blksize	= lstat->blksize;
294 	tmp.st_blocks	= lstat->blocks;
295 
296 	return copy_to_user(osf_stat, &tmp, sizeof(tmp)) ? -EFAULT : 0;
297 }
298 
299 static int
300 linux_to_osf_statfs(struct kstatfs *linux_stat, struct osf_statfs __user *osf_stat,
301 		    unsigned long bufsiz)
302 {
303 	struct osf_statfs tmp_stat;
304 
305 	tmp_stat.f_type = linux_stat->f_type;
306 	tmp_stat.f_flags = 0;	/* mount flags */
307 	tmp_stat.f_fsize = linux_stat->f_frsize;
308 	tmp_stat.f_bsize = linux_stat->f_bsize;
309 	tmp_stat.f_blocks = linux_stat->f_blocks;
310 	tmp_stat.f_bfree = linux_stat->f_bfree;
311 	tmp_stat.f_bavail = linux_stat->f_bavail;
312 	tmp_stat.f_files = linux_stat->f_files;
313 	tmp_stat.f_ffree = linux_stat->f_ffree;
314 	tmp_stat.f_fsid = linux_stat->f_fsid;
315 	if (bufsiz > sizeof(tmp_stat))
316 		bufsiz = sizeof(tmp_stat);
317 	return copy_to_user(osf_stat, &tmp_stat, bufsiz) ? -EFAULT : 0;
318 }
319 
320 static int
321 linux_to_osf_statfs64(struct kstatfs *linux_stat, struct osf_statfs64 __user *osf_stat,
322 		      unsigned long bufsiz)
323 {
324 	struct osf_statfs64 tmp_stat = { 0 };
325 
326 	tmp_stat.f_type = linux_stat->f_type;
327 	tmp_stat.f_fsize = linux_stat->f_frsize;
328 	tmp_stat.f_bsize = linux_stat->f_bsize;
329 	tmp_stat.f_blocks = linux_stat->f_blocks;
330 	tmp_stat.f_bfree = linux_stat->f_bfree;
331 	tmp_stat.f_bavail = linux_stat->f_bavail;
332 	tmp_stat.f_files = linux_stat->f_files;
333 	tmp_stat.f_ffree = linux_stat->f_ffree;
334 	tmp_stat.f_fsid = linux_stat->f_fsid;
335 	if (bufsiz > sizeof(tmp_stat))
336 		bufsiz = sizeof(tmp_stat);
337 	return copy_to_user(osf_stat, &tmp_stat, bufsiz) ? -EFAULT : 0;
338 }
339 
340 SYSCALL_DEFINE3(osf_statfs, const char __user *, pathname,
341 		struct osf_statfs __user *, buffer, unsigned long, bufsiz)
342 {
343 	struct kstatfs linux_stat;
344 	int error = user_statfs(pathname, &linux_stat);
345 	if (!error)
346 		error = linux_to_osf_statfs(&linux_stat, buffer, bufsiz);
347 	return error;
348 }
349 
350 SYSCALL_DEFINE2(osf_stat, char __user *, name, struct osf_stat __user *, buf)
351 {
352 	struct kstat stat;
353 	int error;
354 
355 	error = vfs_stat(name, &stat);
356 	if (error)
357 		return error;
358 
359 	return linux_to_osf_stat(&stat, buf);
360 }
361 
362 SYSCALL_DEFINE2(osf_lstat, char __user *, name, struct osf_stat __user *, buf)
363 {
364 	struct kstat stat;
365 	int error;
366 
367 	error = vfs_lstat(name, &stat);
368 	if (error)
369 		return error;
370 
371 	return linux_to_osf_stat(&stat, buf);
372 }
373 
374 SYSCALL_DEFINE2(osf_fstat, int, fd, struct osf_stat __user *, buf)
375 {
376 	struct kstat stat;
377 	int error;
378 
379 	error = vfs_fstat(fd, &stat);
380 	if (error)
381 		return error;
382 
383 	return linux_to_osf_stat(&stat, buf);
384 }
385 
386 SYSCALL_DEFINE3(osf_fstatfs, unsigned long, fd,
387 		struct osf_statfs __user *, buffer, unsigned long, bufsiz)
388 {
389 	struct kstatfs linux_stat;
390 	int error = fd_statfs(fd, &linux_stat);
391 	if (!error)
392 		error = linux_to_osf_statfs(&linux_stat, buffer, bufsiz);
393 	return error;
394 }
395 
396 SYSCALL_DEFINE3(osf_statfs64, char __user *, pathname,
397 		struct osf_statfs64 __user *, buffer, unsigned long, bufsiz)
398 {
399 	struct kstatfs linux_stat;
400 	int error = user_statfs(pathname, &linux_stat);
401 	if (!error)
402 		error = linux_to_osf_statfs64(&linux_stat, buffer, bufsiz);
403 	return error;
404 }
405 
406 SYSCALL_DEFINE3(osf_fstatfs64, unsigned long, fd,
407 		struct osf_statfs64 __user *, buffer, unsigned long, bufsiz)
408 {
409 	struct kstatfs linux_stat;
410 	int error = fd_statfs(fd, &linux_stat);
411 	if (!error)
412 		error = linux_to_osf_statfs64(&linux_stat, buffer, bufsiz);
413 	return error;
414 }
415 
416 /*
417  * Uhh.. OSF/1 mount parameters aren't exactly obvious..
418  *
419  * Although to be frank, neither are the native Linux/i386 ones..
420  */
421 struct ufs_args {
422 	char __user *devname;
423 	int flags;
424 	uid_t exroot;
425 };
426 
427 struct cdfs_args {
428 	char __user *devname;
429 	int flags;
430 	uid_t exroot;
431 
432 	/* This has lots more here, which Linux handles with the option block
433 	   but I'm too lazy to do the translation into ASCII.  */
434 };
435 
436 struct procfs_args {
437 	char __user *devname;
438 	int flags;
439 	uid_t exroot;
440 };
441 
442 /*
443  * We can't actually handle ufs yet, so we translate UFS mounts to
444  * ext2fs mounts. I wouldn't mind a UFS filesystem, but the UFS
445  * layout is so braindead it's a major headache doing it.
446  *
447  * Just how long ago was it written? OTOH our UFS driver may be still
448  * unhappy with OSF UFS. [CHECKME]
449  */
450 static int
451 osf_ufs_mount(char *dirname, struct ufs_args __user *args, int flags)
452 {
453 	int retval;
454 	struct cdfs_args tmp;
455 	char *devname;
456 
457 	retval = -EFAULT;
458 	if (copy_from_user(&tmp, args, sizeof(tmp)))
459 		goto out;
460 	devname = getname(tmp.devname);
461 	retval = PTR_ERR(devname);
462 	if (IS_ERR(devname))
463 		goto out;
464 	retval = do_mount(devname, dirname, "ext2", flags, NULL);
465 	putname(devname);
466  out:
467 	return retval;
468 }
469 
470 static int
471 osf_cdfs_mount(char *dirname, struct cdfs_args __user *args, int flags)
472 {
473 	int retval;
474 	struct cdfs_args tmp;
475 	char *devname;
476 
477 	retval = -EFAULT;
478 	if (copy_from_user(&tmp, args, sizeof(tmp)))
479 		goto out;
480 	devname = getname(tmp.devname);
481 	retval = PTR_ERR(devname);
482 	if (IS_ERR(devname))
483 		goto out;
484 	retval = do_mount(devname, dirname, "iso9660", flags, NULL);
485 	putname(devname);
486  out:
487 	return retval;
488 }
489 
490 static int
491 osf_procfs_mount(char *dirname, struct procfs_args __user *args, int flags)
492 {
493 	struct procfs_args tmp;
494 
495 	if (copy_from_user(&tmp, args, sizeof(tmp)))
496 		return -EFAULT;
497 
498 	return do_mount("", dirname, "proc", flags, NULL);
499 }
500 
501 SYSCALL_DEFINE4(osf_mount, unsigned long, typenr, const char __user *, path,
502 		int, flag, void __user *, data)
503 {
504 	int retval;
505 	char *name;
506 
507 	name = getname(path);
508 	retval = PTR_ERR(name);
509 	if (IS_ERR(name))
510 		goto out;
511 	switch (typenr) {
512 	case 1:
513 		retval = osf_ufs_mount(name, data, flag);
514 		break;
515 	case 6:
516 		retval = osf_cdfs_mount(name, data, flag);
517 		break;
518 	case 9:
519 		retval = osf_procfs_mount(name, data, flag);
520 		break;
521 	default:
522 		retval = -EINVAL;
523 		printk("osf_mount(%ld, %x)\n", typenr, flag);
524 	}
525 	putname(name);
526  out:
527 	return retval;
528 }
529 
530 SYSCALL_DEFINE1(osf_utsname, char __user *, name)
531 {
532 	int error;
533 
534 	down_read(&uts_sem);
535 	error = -EFAULT;
536 	if (copy_to_user(name + 0, utsname()->sysname, 32))
537 		goto out;
538 	if (copy_to_user(name + 32, utsname()->nodename, 32))
539 		goto out;
540 	if (copy_to_user(name + 64, utsname()->release, 32))
541 		goto out;
542 	if (copy_to_user(name + 96, utsname()->version, 32))
543 		goto out;
544 	if (copy_to_user(name + 128, utsname()->machine, 32))
545 		goto out;
546 
547 	error = 0;
548  out:
549 	up_read(&uts_sem);
550 	return error;
551 }
552 
553 SYSCALL_DEFINE0(getpagesize)
554 {
555 	return PAGE_SIZE;
556 }
557 
558 SYSCALL_DEFINE0(getdtablesize)
559 {
560 	return sysctl_nr_open;
561 }
562 
563 /*
564  * For compatibility with OSF/1 only.  Use utsname(2) instead.
565  */
566 SYSCALL_DEFINE2(osf_getdomainname, char __user *, name, int, namelen)
567 {
568 	unsigned len;
569 	int i;
570 
571 	if (!access_ok(VERIFY_WRITE, name, namelen))
572 		return -EFAULT;
573 
574 	len = namelen;
575 	if (len > 32)
576 		len = 32;
577 
578 	down_read(&uts_sem);
579 	for (i = 0; i < len; ++i) {
580 		__put_user(utsname()->domainname[i], name + i);
581 		if (utsname()->domainname[i] == '\0')
582 			break;
583 	}
584 	up_read(&uts_sem);
585 
586 	return 0;
587 }
588 
589 /*
590  * The following stuff should move into a header file should it ever
591  * be labeled "officially supported."  Right now, there is just enough
592  * support to avoid applications (such as tar) printing error
593  * messages.  The attributes are not really implemented.
594  */
595 
596 /*
597  * Values for Property list entry flag
598  */
599 #define PLE_PROPAGATE_ON_COPY		0x1	/* cp(1) will copy entry
600 						   by default */
601 #define PLE_FLAG_MASK			0x1	/* Valid flag values */
602 #define PLE_FLAG_ALL			-1	/* All flag value */
603 
604 struct proplistname_args {
605 	unsigned int pl_mask;
606 	unsigned int pl_numnames;
607 	char **pl_names;
608 };
609 
610 union pl_args {
611 	struct setargs {
612 		char __user *path;
613 		long follow;
614 		long nbytes;
615 		char __user *buf;
616 	} set;
617 	struct fsetargs {
618 		long fd;
619 		long nbytes;
620 		char __user *buf;
621 	} fset;
622 	struct getargs {
623 		char __user *path;
624 		long follow;
625 		struct proplistname_args __user *name_args;
626 		long nbytes;
627 		char __user *buf;
628 		int __user *min_buf_size;
629 	} get;
630 	struct fgetargs {
631 		long fd;
632 		struct proplistname_args __user *name_args;
633 		long nbytes;
634 		char __user *buf;
635 		int __user *min_buf_size;
636 	} fget;
637 	struct delargs {
638 		char __user *path;
639 		long follow;
640 		struct proplistname_args __user *name_args;
641 	} del;
642 	struct fdelargs {
643 		long fd;
644 		struct proplistname_args __user *name_args;
645 	} fdel;
646 };
647 
648 enum pl_code {
649 	PL_SET = 1, PL_FSET = 2,
650 	PL_GET = 3, PL_FGET = 4,
651 	PL_DEL = 5, PL_FDEL = 6
652 };
653 
654 SYSCALL_DEFINE2(osf_proplist_syscall, enum pl_code, code,
655 		union pl_args __user *, args)
656 {
657 	long error;
658 	int __user *min_buf_size_ptr;
659 
660 	switch (code) {
661 	case PL_SET:
662 		if (get_user(error, &args->set.nbytes))
663 			error = -EFAULT;
664 		break;
665 	case PL_FSET:
666 		if (get_user(error, &args->fset.nbytes))
667 			error = -EFAULT;
668 		break;
669 	case PL_GET:
670 		error = get_user(min_buf_size_ptr, &args->get.min_buf_size);
671 		if (error)
672 			break;
673 		error = put_user(0, min_buf_size_ptr);
674 		break;
675 	case PL_FGET:
676 		error = get_user(min_buf_size_ptr, &args->fget.min_buf_size);
677 		if (error)
678 			break;
679 		error = put_user(0, min_buf_size_ptr);
680 		break;
681 	case PL_DEL:
682 	case PL_FDEL:
683 		error = 0;
684 		break;
685 	default:
686 		error = -EOPNOTSUPP;
687 		break;
688 	};
689 	return error;
690 }
691 
692 SYSCALL_DEFINE2(osf_sigstack, struct sigstack __user *, uss,
693 		struct sigstack __user *, uoss)
694 {
695 	unsigned long usp = rdusp();
696 	unsigned long oss_sp = current->sas_ss_sp + current->sas_ss_size;
697 	unsigned long oss_os = on_sig_stack(usp);
698 	int error;
699 
700 	if (uss) {
701 		void __user *ss_sp;
702 
703 		error = -EFAULT;
704 		if (get_user(ss_sp, &uss->ss_sp))
705 			goto out;
706 
707 		/* If the current stack was set with sigaltstack, don't
708 		   swap stacks while we are on it.  */
709 		error = -EPERM;
710 		if (current->sas_ss_sp && on_sig_stack(usp))
711 			goto out;
712 
713 		/* Since we don't know the extent of the stack, and we don't
714 		   track onstack-ness, but rather calculate it, we must
715 		   presume a size.  Ho hum this interface is lossy.  */
716 		current->sas_ss_sp = (unsigned long)ss_sp - SIGSTKSZ;
717 		current->sas_ss_size = SIGSTKSZ;
718 	}
719 
720 	if (uoss) {
721 		error = -EFAULT;
722 		if (! access_ok(VERIFY_WRITE, uoss, sizeof(*uoss))
723 		    || __put_user(oss_sp, &uoss->ss_sp)
724 		    || __put_user(oss_os, &uoss->ss_onstack))
725 			goto out;
726 	}
727 
728 	error = 0;
729  out:
730 	return error;
731 }
732 
733 SYSCALL_DEFINE3(osf_sysinfo, int, command, char __user *, buf, long, count)
734 {
735 	const char *sysinfo_table[] = {
736 		utsname()->sysname,
737 		utsname()->nodename,
738 		utsname()->release,
739 		utsname()->version,
740 		utsname()->machine,
741 		"alpha",	/* instruction set architecture */
742 		"dummy",	/* hardware serial number */
743 		"dummy",	/* hardware manufacturer */
744 		"dummy",	/* secure RPC domain */
745 	};
746 	unsigned long offset;
747 	const char *res;
748 	long len, err = -EINVAL;
749 
750 	offset = command-1;
751 	if (offset >= ARRAY_SIZE(sysinfo_table)) {
752 		/* Digital UNIX has a few unpublished interfaces here */
753 		printk("sysinfo(%d)", command);
754 		goto out;
755 	}
756 
757 	down_read(&uts_sem);
758 	res = sysinfo_table[offset];
759 	len = strlen(res)+1;
760 	if ((unsigned long)len > (unsigned long)count)
761 		len = count;
762 	if (copy_to_user(buf, res, len))
763 		err = -EFAULT;
764 	else
765 		err = 0;
766 	up_read(&uts_sem);
767  out:
768 	return err;
769 }
770 
771 SYSCALL_DEFINE5(osf_getsysinfo, unsigned long, op, void __user *, buffer,
772 		unsigned long, nbytes, int __user *, start, void __user *, arg)
773 {
774 	unsigned long w;
775 	struct percpu_struct *cpu;
776 
777 	switch (op) {
778 	case GSI_IEEE_FP_CONTROL:
779 		/* Return current software fp control & status bits.  */
780 		/* Note that DU doesn't verify available space here.  */
781 
782  		w = current_thread_info()->ieee_state & IEEE_SW_MASK;
783  		w = swcr_update_status(w, rdfpcr());
784 		if (put_user(w, (unsigned long __user *) buffer))
785 			return -EFAULT;
786 		return 0;
787 
788 	case GSI_IEEE_STATE_AT_SIGNAL:
789 		/*
790 		 * Not sure anybody will ever use this weird stuff.  These
791 		 * ops can be used (under OSF/1) to set the fpcr that should
792 		 * be used when a signal handler starts executing.
793 		 */
794 		break;
795 
796  	case GSI_UACPROC:
797 		if (nbytes < sizeof(unsigned int))
798 			return -EINVAL;
799 		w = (current_thread_info()->flags >> ALPHA_UAC_SHIFT) &
800 			UAC_BITMASK;
801 		if (put_user(w, (unsigned int __user *)buffer))
802 			return -EFAULT;
803  		return 1;
804 
805 	case GSI_PROC_TYPE:
806 		if (nbytes < sizeof(unsigned long))
807 			return -EINVAL;
808 		cpu = (struct percpu_struct*)
809 		  ((char*)hwrpb + hwrpb->processor_offset);
810 		w = cpu->type;
811 		if (put_user(w, (unsigned long  __user*)buffer))
812 			return -EFAULT;
813 		return 1;
814 
815 	case GSI_GET_HWRPB:
816 		if (nbytes > sizeof(*hwrpb))
817 			return -EINVAL;
818 		if (copy_to_user(buffer, hwrpb, nbytes) != 0)
819 			return -EFAULT;
820 		return 1;
821 
822 	default:
823 		break;
824 	}
825 
826 	return -EOPNOTSUPP;
827 }
828 
829 SYSCALL_DEFINE5(osf_setsysinfo, unsigned long, op, void __user *, buffer,
830 		unsigned long, nbytes, int __user *, start, void __user *, arg)
831 {
832 	switch (op) {
833 	case SSI_IEEE_FP_CONTROL: {
834 		unsigned long swcr, fpcr;
835 		unsigned int *state;
836 
837 		/*
838 		 * Alpha Architecture Handbook 4.7.7.3:
839 		 * To be fully IEEE compiant, we must track the current IEEE
840 		 * exception state in software, because spurious bits can be
841 		 * set in the trap shadow of a software-complete insn.
842 		 */
843 
844 		if (get_user(swcr, (unsigned long __user *)buffer))
845 			return -EFAULT;
846 		state = &current_thread_info()->ieee_state;
847 
848 		/* Update softare trap enable bits.  */
849 		*state = (*state & ~IEEE_SW_MASK) | (swcr & IEEE_SW_MASK);
850 
851 		/* Update the real fpcr.  */
852 		fpcr = rdfpcr() & FPCR_DYN_MASK;
853 		fpcr |= ieee_swcr_to_fpcr(swcr);
854 		wrfpcr(fpcr);
855 
856 		return 0;
857 	}
858 
859 	case SSI_IEEE_RAISE_EXCEPTION: {
860 		unsigned long exc, swcr, fpcr, fex;
861 		unsigned int *state;
862 
863 		if (get_user(exc, (unsigned long __user *)buffer))
864 			return -EFAULT;
865 		state = &current_thread_info()->ieee_state;
866 		exc &= IEEE_STATUS_MASK;
867 
868 		/* Update softare trap enable bits.  */
869  		swcr = (*state & IEEE_SW_MASK) | exc;
870 		*state |= exc;
871 
872 		/* Update the real fpcr.  */
873 		fpcr = rdfpcr();
874 		fpcr |= ieee_swcr_to_fpcr(swcr);
875 		wrfpcr(fpcr);
876 
877  		/* If any exceptions set by this call, and are unmasked,
878 		   send a signal.  Old exceptions are not signaled.  */
879 		fex = (exc >> IEEE_STATUS_TO_EXCSUM_SHIFT) & swcr;
880  		if (fex) {
881 			siginfo_t info;
882 			int si_code = 0;
883 
884 			if (fex & IEEE_TRAP_ENABLE_DNO) si_code = FPE_FLTUND;
885 			if (fex & IEEE_TRAP_ENABLE_INE) si_code = FPE_FLTRES;
886 			if (fex & IEEE_TRAP_ENABLE_UNF) si_code = FPE_FLTUND;
887 			if (fex & IEEE_TRAP_ENABLE_OVF) si_code = FPE_FLTOVF;
888 			if (fex & IEEE_TRAP_ENABLE_DZE) si_code = FPE_FLTDIV;
889 			if (fex & IEEE_TRAP_ENABLE_INV) si_code = FPE_FLTINV;
890 
891 			info.si_signo = SIGFPE;
892 			info.si_errno = 0;
893 			info.si_code = si_code;
894 			info.si_addr = NULL;  /* FIXME */
895  			send_sig_info(SIGFPE, &info, current);
896  		}
897 		return 0;
898 	}
899 
900 	case SSI_IEEE_STATE_AT_SIGNAL:
901 	case SSI_IEEE_IGNORE_STATE_AT_SIGNAL:
902 		/*
903 		 * Not sure anybody will ever use this weird stuff.  These
904 		 * ops can be used (under OSF/1) to set the fpcr that should
905 		 * be used when a signal handler starts executing.
906 		 */
907 		break;
908 
909  	case SSI_NVPAIRS: {
910 		unsigned long v, w, i;
911 		unsigned int old, new;
912 
913  		for (i = 0; i < nbytes; ++i) {
914 
915  			if (get_user(v, 2*i + (unsigned int __user *)buffer))
916  				return -EFAULT;
917  			if (get_user(w, 2*i + 1 + (unsigned int __user *)buffer))
918  				return -EFAULT;
919  			switch (v) {
920  			case SSIN_UACPROC:
921 			again:
922 				old = current_thread_info()->flags;
923 				new = old & ~(UAC_BITMASK << ALPHA_UAC_SHIFT);
924 				new = new | (w & UAC_BITMASK) << ALPHA_UAC_SHIFT;
925 				if (cmpxchg(&current_thread_info()->flags,
926 					    old, new) != old)
927 					goto again;
928  				break;
929 
930  			default:
931  				return -EOPNOTSUPP;
932  			}
933  		}
934  		return 0;
935 	}
936 
937 	case SSI_LMF:
938 		return 0;
939 
940 	default:
941 		break;
942 	}
943 
944 	return -EOPNOTSUPP;
945 }
946 
947 /* Translations due to the fact that OSF's time_t is an int.  Which
948    affects all sorts of things, like timeval and itimerval.  */
949 
950 extern struct timezone sys_tz;
951 
952 struct timeval32
953 {
954     int tv_sec, tv_usec;
955 };
956 
957 struct itimerval32
958 {
959     struct timeval32 it_interval;
960     struct timeval32 it_value;
961 };
962 
963 static inline long
964 get_tv32(struct timeval *o, struct timeval32 __user *i)
965 {
966 	return (!access_ok(VERIFY_READ, i, sizeof(*i)) ||
967 		(__get_user(o->tv_sec, &i->tv_sec) |
968 		 __get_user(o->tv_usec, &i->tv_usec)));
969 }
970 
971 static inline long
972 put_tv32(struct timeval32 __user *o, struct timeval *i)
973 {
974 	return (!access_ok(VERIFY_WRITE, o, sizeof(*o)) ||
975 		(__put_user(i->tv_sec, &o->tv_sec) |
976 		 __put_user(i->tv_usec, &o->tv_usec)));
977 }
978 
979 static inline long
980 get_it32(struct itimerval *o, struct itimerval32 __user *i)
981 {
982 	return (!access_ok(VERIFY_READ, i, sizeof(*i)) ||
983 		(__get_user(o->it_interval.tv_sec, &i->it_interval.tv_sec) |
984 		 __get_user(o->it_interval.tv_usec, &i->it_interval.tv_usec) |
985 		 __get_user(o->it_value.tv_sec, &i->it_value.tv_sec) |
986 		 __get_user(o->it_value.tv_usec, &i->it_value.tv_usec)));
987 }
988 
989 static inline long
990 put_it32(struct itimerval32 __user *o, struct itimerval *i)
991 {
992 	return (!access_ok(VERIFY_WRITE, o, sizeof(*o)) ||
993 		(__put_user(i->it_interval.tv_sec, &o->it_interval.tv_sec) |
994 		 __put_user(i->it_interval.tv_usec, &o->it_interval.tv_usec) |
995 		 __put_user(i->it_value.tv_sec, &o->it_value.tv_sec) |
996 		 __put_user(i->it_value.tv_usec, &o->it_value.tv_usec)));
997 }
998 
999 static inline void
1000 jiffies_to_timeval32(unsigned long jiffies, struct timeval32 *value)
1001 {
1002 	value->tv_usec = (jiffies % HZ) * (1000000L / HZ);
1003 	value->tv_sec = jiffies / HZ;
1004 }
1005 
1006 SYSCALL_DEFINE2(osf_gettimeofday, struct timeval32 __user *, tv,
1007 		struct timezone __user *, tz)
1008 {
1009 	if (tv) {
1010 		struct timeval ktv;
1011 		do_gettimeofday(&ktv);
1012 		if (put_tv32(tv, &ktv))
1013 			return -EFAULT;
1014 	}
1015 	if (tz) {
1016 		if (copy_to_user(tz, &sys_tz, sizeof(sys_tz)))
1017 			return -EFAULT;
1018 	}
1019 	return 0;
1020 }
1021 
1022 SYSCALL_DEFINE2(osf_settimeofday, struct timeval32 __user *, tv,
1023 		struct timezone __user *, tz)
1024 {
1025 	struct timespec kts;
1026 	struct timezone ktz;
1027 
1028  	if (tv) {
1029 		if (get_tv32((struct timeval *)&kts, tv))
1030 			return -EFAULT;
1031 	}
1032 	if (tz) {
1033 		if (copy_from_user(&ktz, tz, sizeof(*tz)))
1034 			return -EFAULT;
1035 	}
1036 
1037 	kts.tv_nsec *= 1000;
1038 
1039 	return do_sys_settimeofday(tv ? &kts : NULL, tz ? &ktz : NULL);
1040 }
1041 
1042 SYSCALL_DEFINE2(osf_getitimer, int, which, struct itimerval32 __user *, it)
1043 {
1044 	struct itimerval kit;
1045 	int error;
1046 
1047 	error = do_getitimer(which, &kit);
1048 	if (!error && put_it32(it, &kit))
1049 		error = -EFAULT;
1050 
1051 	return error;
1052 }
1053 
1054 SYSCALL_DEFINE3(osf_setitimer, int, which, struct itimerval32 __user *, in,
1055 		struct itimerval32 __user *, out)
1056 {
1057 	struct itimerval kin, kout;
1058 	int error;
1059 
1060 	if (in) {
1061 		if (get_it32(&kin, in))
1062 			return -EFAULT;
1063 	} else
1064 		memset(&kin, 0, sizeof(kin));
1065 
1066 	error = do_setitimer(which, &kin, out ? &kout : NULL);
1067 	if (error || !out)
1068 		return error;
1069 
1070 	if (put_it32(out, &kout))
1071 		return -EFAULT;
1072 
1073 	return 0;
1074 
1075 }
1076 
1077 SYSCALL_DEFINE2(osf_utimes, const char __user *, filename,
1078 		struct timeval32 __user *, tvs)
1079 {
1080 	struct timespec tv[2];
1081 
1082 	if (tvs) {
1083 		struct timeval ktvs[2];
1084 		if (get_tv32(&ktvs[0], &tvs[0]) ||
1085 		    get_tv32(&ktvs[1], &tvs[1]))
1086 			return -EFAULT;
1087 
1088 		if (ktvs[0].tv_usec < 0 || ktvs[0].tv_usec >= 1000000 ||
1089 		    ktvs[1].tv_usec < 0 || ktvs[1].tv_usec >= 1000000)
1090 			return -EINVAL;
1091 
1092 		tv[0].tv_sec = ktvs[0].tv_sec;
1093 		tv[0].tv_nsec = 1000 * ktvs[0].tv_usec;
1094 		tv[1].tv_sec = ktvs[1].tv_sec;
1095 		tv[1].tv_nsec = 1000 * ktvs[1].tv_usec;
1096 	}
1097 
1098 	return do_utimes(AT_FDCWD, filename, tvs ? tv : NULL, 0);
1099 }
1100 
1101 SYSCALL_DEFINE5(osf_select, int, n, fd_set __user *, inp, fd_set __user *, outp,
1102 		fd_set __user *, exp, struct timeval32 __user *, tvp)
1103 {
1104 	struct timespec end_time, *to = NULL;
1105 	if (tvp) {
1106 		time_t sec, usec;
1107 
1108 		to = &end_time;
1109 
1110 		if (!access_ok(VERIFY_READ, tvp, sizeof(*tvp))
1111 		    || __get_user(sec, &tvp->tv_sec)
1112 		    || __get_user(usec, &tvp->tv_usec)) {
1113 		    	return -EFAULT;
1114 		}
1115 
1116 		if (sec < 0 || usec < 0)
1117 			return -EINVAL;
1118 
1119 		if (poll_select_set_timeout(to, sec, usec * NSEC_PER_USEC))
1120 			return -EINVAL;
1121 
1122 	}
1123 
1124 	/* OSF does not copy back the remaining time.  */
1125 	return core_sys_select(n, inp, outp, exp, to);
1126 }
1127 
1128 struct rusage32 {
1129 	struct timeval32 ru_utime;	/* user time used */
1130 	struct timeval32 ru_stime;	/* system time used */
1131 	long	ru_maxrss;		/* maximum resident set size */
1132 	long	ru_ixrss;		/* integral shared memory size */
1133 	long	ru_idrss;		/* integral unshared data size */
1134 	long	ru_isrss;		/* integral unshared stack size */
1135 	long	ru_minflt;		/* page reclaims */
1136 	long	ru_majflt;		/* page faults */
1137 	long	ru_nswap;		/* swaps */
1138 	long	ru_inblock;		/* block input operations */
1139 	long	ru_oublock;		/* block output operations */
1140 	long	ru_msgsnd;		/* messages sent */
1141 	long	ru_msgrcv;		/* messages received */
1142 	long	ru_nsignals;		/* signals received */
1143 	long	ru_nvcsw;		/* voluntary context switches */
1144 	long	ru_nivcsw;		/* involuntary " */
1145 };
1146 
1147 SYSCALL_DEFINE2(osf_getrusage, int, who, struct rusage32 __user *, ru)
1148 {
1149 	struct rusage32 r;
1150 
1151 	if (who != RUSAGE_SELF && who != RUSAGE_CHILDREN)
1152 		return -EINVAL;
1153 
1154 	memset(&r, 0, sizeof(r));
1155 	switch (who) {
1156 	case RUSAGE_SELF:
1157 		jiffies_to_timeval32(current->utime, &r.ru_utime);
1158 		jiffies_to_timeval32(current->stime, &r.ru_stime);
1159 		r.ru_minflt = current->min_flt;
1160 		r.ru_majflt = current->maj_flt;
1161 		break;
1162 	case RUSAGE_CHILDREN:
1163 		jiffies_to_timeval32(current->signal->cutime, &r.ru_utime);
1164 		jiffies_to_timeval32(current->signal->cstime, &r.ru_stime);
1165 		r.ru_minflt = current->signal->cmin_flt;
1166 		r.ru_majflt = current->signal->cmaj_flt;
1167 		break;
1168 	}
1169 
1170 	return copy_to_user(ru, &r, sizeof(r)) ? -EFAULT : 0;
1171 }
1172 
1173 SYSCALL_DEFINE4(osf_wait4, pid_t, pid, int __user *, ustatus, int, options,
1174 		struct rusage32 __user *, ur)
1175 {
1176 	struct rusage r;
1177 	long ret, err;
1178 	unsigned int status = 0;
1179 	mm_segment_t old_fs;
1180 
1181 	if (!ur)
1182 		return sys_wait4(pid, ustatus, options, NULL);
1183 
1184 	old_fs = get_fs();
1185 
1186 	set_fs (KERNEL_DS);
1187 	ret = sys_wait4(pid, (unsigned int __user *) &status, options,
1188 			(struct rusage __user *) &r);
1189 	set_fs (old_fs);
1190 
1191 	if (!access_ok(VERIFY_WRITE, ur, sizeof(*ur)))
1192 		return -EFAULT;
1193 
1194 	err = 0;
1195 	err |= put_user(status, ustatus);
1196 	err |= __put_user(r.ru_utime.tv_sec, &ur->ru_utime.tv_sec);
1197 	err |= __put_user(r.ru_utime.tv_usec, &ur->ru_utime.tv_usec);
1198 	err |= __put_user(r.ru_stime.tv_sec, &ur->ru_stime.tv_sec);
1199 	err |= __put_user(r.ru_stime.tv_usec, &ur->ru_stime.tv_usec);
1200 	err |= __put_user(r.ru_maxrss, &ur->ru_maxrss);
1201 	err |= __put_user(r.ru_ixrss, &ur->ru_ixrss);
1202 	err |= __put_user(r.ru_idrss, &ur->ru_idrss);
1203 	err |= __put_user(r.ru_isrss, &ur->ru_isrss);
1204 	err |= __put_user(r.ru_minflt, &ur->ru_minflt);
1205 	err |= __put_user(r.ru_majflt, &ur->ru_majflt);
1206 	err |= __put_user(r.ru_nswap, &ur->ru_nswap);
1207 	err |= __put_user(r.ru_inblock, &ur->ru_inblock);
1208 	err |= __put_user(r.ru_oublock, &ur->ru_oublock);
1209 	err |= __put_user(r.ru_msgsnd, &ur->ru_msgsnd);
1210 	err |= __put_user(r.ru_msgrcv, &ur->ru_msgrcv);
1211 	err |= __put_user(r.ru_nsignals, &ur->ru_nsignals);
1212 	err |= __put_user(r.ru_nvcsw, &ur->ru_nvcsw);
1213 	err |= __put_user(r.ru_nivcsw, &ur->ru_nivcsw);
1214 
1215 	return err ? err : ret;
1216 }
1217 
1218 /*
1219  * I don't know what the parameters are: the first one
1220  * seems to be a timeval pointer, and I suspect the second
1221  * one is the time remaining.. Ho humm.. No documentation.
1222  */
1223 SYSCALL_DEFINE2(osf_usleep_thread, struct timeval32 __user *, sleep,
1224 		struct timeval32 __user *, remain)
1225 {
1226 	struct timeval tmp;
1227 	unsigned long ticks;
1228 
1229 	if (get_tv32(&tmp, sleep))
1230 		goto fault;
1231 
1232 	ticks = timeval_to_jiffies(&tmp);
1233 
1234 	ticks = schedule_timeout_interruptible(ticks);
1235 
1236 	if (remain) {
1237 		jiffies_to_timeval(ticks, &tmp);
1238 		if (put_tv32(remain, &tmp))
1239 			goto fault;
1240 	}
1241 
1242 	return 0;
1243  fault:
1244 	return -EFAULT;
1245 }
1246 
1247 
1248 struct timex32 {
1249 	unsigned int modes;	/* mode selector */
1250 	long offset;		/* time offset (usec) */
1251 	long freq;		/* frequency offset (scaled ppm) */
1252 	long maxerror;		/* maximum error (usec) */
1253 	long esterror;		/* estimated error (usec) */
1254 	int status;		/* clock command/status */
1255 	long constant;		/* pll time constant */
1256 	long precision;		/* clock precision (usec) (read only) */
1257 	long tolerance;		/* clock frequency tolerance (ppm)
1258 				 * (read only)
1259 				 */
1260 	struct timeval32 time;	/* (read only) */
1261 	long tick;		/* (modified) usecs between clock ticks */
1262 
1263 	long ppsfreq;           /* pps frequency (scaled ppm) (ro) */
1264 	long jitter;            /* pps jitter (us) (ro) */
1265 	int shift;              /* interval duration (s) (shift) (ro) */
1266 	long stabil;            /* pps stability (scaled ppm) (ro) */
1267 	long jitcnt;            /* jitter limit exceeded (ro) */
1268 	long calcnt;            /* calibration intervals (ro) */
1269 	long errcnt;            /* calibration errors (ro) */
1270 	long stbcnt;            /* stability limit exceeded (ro) */
1271 
1272 	int  :32; int  :32; int  :32; int  :32;
1273 	int  :32; int  :32; int  :32; int  :32;
1274 	int  :32; int  :32; int  :32; int  :32;
1275 };
1276 
1277 SYSCALL_DEFINE1(old_adjtimex, struct timex32 __user *, txc_p)
1278 {
1279         struct timex txc;
1280 	int ret;
1281 
1282 	/* copy relevant bits of struct timex. */
1283 	if (copy_from_user(&txc, txc_p, offsetof(struct timex32, time)) ||
1284 	    copy_from_user(&txc.tick, &txc_p->tick, sizeof(struct timex32) -
1285 			   offsetof(struct timex32, time)))
1286 	  return -EFAULT;
1287 
1288 	ret = do_adjtimex(&txc);
1289 	if (ret < 0)
1290 	  return ret;
1291 
1292 	/* copy back to timex32 */
1293 	if (copy_to_user(txc_p, &txc, offsetof(struct timex32, time)) ||
1294 	    (copy_to_user(&txc_p->tick, &txc.tick, sizeof(struct timex32) -
1295 			  offsetof(struct timex32, tick))) ||
1296 	    (put_tv32(&txc_p->time, &txc.time)))
1297 	  return -EFAULT;
1298 
1299 	return ret;
1300 }
1301 
1302 /* Get an address range which is currently unmapped.  Similar to the
1303    generic version except that we know how to honor ADDR_LIMIT_32BIT.  */
1304 
1305 static unsigned long
1306 arch_get_unmapped_area_1(unsigned long addr, unsigned long len,
1307 		         unsigned long limit)
1308 {
1309 	struct vm_area_struct *vma = find_vma(current->mm, addr);
1310 
1311 	while (1) {
1312 		/* At this point:  (!vma || addr < vma->vm_end). */
1313 		if (limit - len < addr)
1314 			return -ENOMEM;
1315 		if (!vma || addr + len <= vma->vm_start)
1316 			return addr;
1317 		addr = vma->vm_end;
1318 		vma = vma->vm_next;
1319 	}
1320 }
1321 
1322 unsigned long
1323 arch_get_unmapped_area(struct file *filp, unsigned long addr,
1324 		       unsigned long len, unsigned long pgoff,
1325 		       unsigned long flags)
1326 {
1327 	unsigned long limit;
1328 
1329 	/* "32 bit" actually means 31 bit, since pointers sign extend.  */
1330 	if (current->personality & ADDR_LIMIT_32BIT)
1331 		limit = 0x80000000;
1332 	else
1333 		limit = TASK_SIZE;
1334 
1335 	if (len > limit)
1336 		return -ENOMEM;
1337 
1338 	if (flags & MAP_FIXED)
1339 		return addr;
1340 
1341 	/* First, see if the given suggestion fits.
1342 
1343 	   The OSF/1 loader (/sbin/loader) relies on us returning an
1344 	   address larger than the requested if one exists, which is
1345 	   a terribly broken way to program.
1346 
1347 	   That said, I can see the use in being able to suggest not
1348 	   merely specific addresses, but regions of memory -- perhaps
1349 	   this feature should be incorporated into all ports?  */
1350 
1351 	if (addr) {
1352 		addr = arch_get_unmapped_area_1 (PAGE_ALIGN(addr), len, limit);
1353 		if (addr != (unsigned long) -ENOMEM)
1354 			return addr;
1355 	}
1356 
1357 	/* Next, try allocating at TASK_UNMAPPED_BASE.  */
1358 	addr = arch_get_unmapped_area_1 (PAGE_ALIGN(TASK_UNMAPPED_BASE),
1359 					 len, limit);
1360 	if (addr != (unsigned long) -ENOMEM)
1361 		return addr;
1362 
1363 	/* Finally, try allocating in low memory.  */
1364 	addr = arch_get_unmapped_area_1 (PAGE_SIZE, len, limit);
1365 
1366 	return addr;
1367 }
1368 
1369 #ifdef CONFIG_OSF4_COMPAT
1370 
1371 /* Clear top 32 bits of iov_len in the user's buffer for
1372    compatibility with old versions of OSF/1 where iov_len
1373    was defined as int. */
1374 static int
1375 osf_fix_iov_len(const struct iovec __user *iov, unsigned long count)
1376 {
1377 	unsigned long i;
1378 
1379 	for (i = 0 ; i < count ; i++) {
1380 		int __user *iov_len_high = (int __user *)&iov[i].iov_len + 1;
1381 
1382 		if (put_user(0, iov_len_high))
1383 			return -EFAULT;
1384 	}
1385 	return 0;
1386 }
1387 
1388 SYSCALL_DEFINE3(osf_readv, unsigned long, fd,
1389 		const struct iovec __user *, vector, unsigned long, count)
1390 {
1391 	if (unlikely(personality(current->personality) == PER_OSF4))
1392 		if (osf_fix_iov_len(vector, count))
1393 			return -EFAULT;
1394 	return sys_readv(fd, vector, count);
1395 }
1396 
1397 SYSCALL_DEFINE3(osf_writev, unsigned long, fd,
1398 		const struct iovec __user *, vector, unsigned long, count)
1399 {
1400 	if (unlikely(personality(current->personality) == PER_OSF4))
1401 		if (osf_fix_iov_len(vector, count))
1402 			return -EFAULT;
1403 	return sys_writev(fd, vector, count);
1404 }
1405 
1406 #endif
1407