1 /* 2 * linux/arch/alpha/kernel/osf_sys.c 3 * 4 * Copyright (C) 1995 Linus Torvalds 5 */ 6 7 /* 8 * This file handles some of the stranger OSF/1 system call interfaces. 9 * Some of the system calls expect a non-C calling standard, others have 10 * special parameter blocks.. 11 */ 12 13 #include <linux/errno.h> 14 #include <linux/sched.h> 15 #include <linux/kernel.h> 16 #include <linux/mm.h> 17 #include <linux/smp.h> 18 #include <linux/stddef.h> 19 #include <linux/syscalls.h> 20 #include <linux/unistd.h> 21 #include <linux/ptrace.h> 22 #include <linux/user.h> 23 #include <linux/utsname.h> 24 #include <linux/time.h> 25 #include <linux/timex.h> 26 #include <linux/major.h> 27 #include <linux/stat.h> 28 #include <linux/mman.h> 29 #include <linux/shm.h> 30 #include <linux/poll.h> 31 #include <linux/file.h> 32 #include <linux/types.h> 33 #include <linux/ipc.h> 34 #include <linux/namei.h> 35 #include <linux/uio.h> 36 #include <linux/vfs.h> 37 #include <linux/rcupdate.h> 38 #include <linux/slab.h> 39 40 #include <asm/fpu.h> 41 #include <asm/io.h> 42 #include <asm/uaccess.h> 43 #include <asm/system.h> 44 #include <asm/sysinfo.h> 45 #include <asm/hwrpb.h> 46 #include <asm/processor.h> 47 48 /* 49 * Brk needs to return an error. Still support Linux's brk(0) query idiom, 50 * which OSF programs just shouldn't be doing. We're still not quite 51 * identical to OSF as we don't return 0 on success, but doing otherwise 52 * would require changes to libc. Hopefully this is good enough. 53 */ 54 SYSCALL_DEFINE1(osf_brk, unsigned long, brk) 55 { 56 unsigned long retval = sys_brk(brk); 57 if (brk && brk != retval) 58 retval = -ENOMEM; 59 return retval; 60 } 61 62 /* 63 * This is pure guess-work.. 64 */ 65 SYSCALL_DEFINE4(osf_set_program_attributes, unsigned long, text_start, 66 unsigned long, text_len, unsigned long, bss_start, 67 unsigned long, bss_len) 68 { 69 struct mm_struct *mm; 70 71 mm = current->mm; 72 mm->end_code = bss_start + bss_len; 73 mm->start_brk = bss_start + bss_len; 74 mm->brk = bss_start + bss_len; 75 #if 0 76 printk("set_program_attributes(%lx %lx %lx %lx)\n", 77 text_start, text_len, bss_start, bss_len); 78 #endif 79 return 0; 80 } 81 82 /* 83 * OSF/1 directory handling functions... 84 * 85 * The "getdents()" interface is much more sane: the "basep" stuff is 86 * braindamage (it can't really handle filesystems where the directory 87 * offset differences aren't the same as "d_reclen"). 88 */ 89 #define NAME_OFFSET offsetof (struct osf_dirent, d_name) 90 91 struct osf_dirent { 92 unsigned int d_ino; 93 unsigned short d_reclen; 94 unsigned short d_namlen; 95 char d_name[1]; 96 }; 97 98 struct osf_dirent_callback { 99 struct osf_dirent __user *dirent; 100 long __user *basep; 101 unsigned int count; 102 int error; 103 }; 104 105 static int 106 osf_filldir(void *__buf, const char *name, int namlen, loff_t offset, 107 u64 ino, unsigned int d_type) 108 { 109 struct osf_dirent __user *dirent; 110 struct osf_dirent_callback *buf = (struct osf_dirent_callback *) __buf; 111 unsigned int reclen = ALIGN(NAME_OFFSET + namlen + 1, sizeof(u32)); 112 unsigned int d_ino; 113 114 buf->error = -EINVAL; /* only used if we fail */ 115 if (reclen > buf->count) 116 return -EINVAL; 117 d_ino = ino; 118 if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) { 119 buf->error = -EOVERFLOW; 120 return -EOVERFLOW; 121 } 122 if (buf->basep) { 123 if (put_user(offset, buf->basep)) 124 goto Efault; 125 buf->basep = NULL; 126 } 127 dirent = buf->dirent; 128 if (put_user(d_ino, &dirent->d_ino) || 129 put_user(namlen, &dirent->d_namlen) || 130 put_user(reclen, &dirent->d_reclen) || 131 copy_to_user(dirent->d_name, name, namlen) || 132 put_user(0, dirent->d_name + namlen)) 133 goto Efault; 134 dirent = (void __user *)dirent + reclen; 135 buf->dirent = dirent; 136 buf->count -= reclen; 137 return 0; 138 Efault: 139 buf->error = -EFAULT; 140 return -EFAULT; 141 } 142 143 SYSCALL_DEFINE4(osf_getdirentries, unsigned int, fd, 144 struct osf_dirent __user *, dirent, unsigned int, count, 145 long __user *, basep) 146 { 147 int error; 148 struct file *file; 149 struct osf_dirent_callback buf; 150 151 error = -EBADF; 152 file = fget(fd); 153 if (!file) 154 goto out; 155 156 buf.dirent = dirent; 157 buf.basep = basep; 158 buf.count = count; 159 buf.error = 0; 160 161 error = vfs_readdir(file, osf_filldir, &buf); 162 if (error >= 0) 163 error = buf.error; 164 if (count != buf.count) 165 error = count - buf.count; 166 167 fput(file); 168 out: 169 return error; 170 } 171 172 #undef NAME_OFFSET 173 174 SYSCALL_DEFINE6(osf_mmap, unsigned long, addr, unsigned long, len, 175 unsigned long, prot, unsigned long, flags, unsigned long, fd, 176 unsigned long, off) 177 { 178 unsigned long ret = -EINVAL; 179 180 #if 0 181 if (flags & (_MAP_HASSEMAPHORE | _MAP_INHERIT | _MAP_UNALIGNED)) 182 printk("%s: unimplemented OSF mmap flags %04lx\n", 183 current->comm, flags); 184 #endif 185 if ((off + PAGE_ALIGN(len)) < off) 186 goto out; 187 if (off & ~PAGE_MASK) 188 goto out; 189 ret = sys_mmap_pgoff(addr, len, prot, flags, fd, off >> PAGE_SHIFT); 190 out: 191 return ret; 192 } 193 194 195 /* 196 * The OSF/1 statfs structure is much larger, but this should 197 * match the beginning, at least. 198 */ 199 struct osf_statfs { 200 short f_type; 201 short f_flags; 202 int f_fsize; 203 int f_bsize; 204 int f_blocks; 205 int f_bfree; 206 int f_bavail; 207 int f_files; 208 int f_ffree; 209 __kernel_fsid_t f_fsid; 210 }; 211 212 static int 213 linux_to_osf_statfs(struct kstatfs *linux_stat, struct osf_statfs __user *osf_stat, 214 unsigned long bufsiz) 215 { 216 struct osf_statfs tmp_stat; 217 218 tmp_stat.f_type = linux_stat->f_type; 219 tmp_stat.f_flags = 0; /* mount flags */ 220 tmp_stat.f_fsize = linux_stat->f_frsize; 221 tmp_stat.f_bsize = linux_stat->f_bsize; 222 tmp_stat.f_blocks = linux_stat->f_blocks; 223 tmp_stat.f_bfree = linux_stat->f_bfree; 224 tmp_stat.f_bavail = linux_stat->f_bavail; 225 tmp_stat.f_files = linux_stat->f_files; 226 tmp_stat.f_ffree = linux_stat->f_ffree; 227 tmp_stat.f_fsid = linux_stat->f_fsid; 228 if (bufsiz > sizeof(tmp_stat)) 229 bufsiz = sizeof(tmp_stat); 230 return copy_to_user(osf_stat, &tmp_stat, bufsiz) ? -EFAULT : 0; 231 } 232 233 static int 234 do_osf_statfs(struct path *path, struct osf_statfs __user *buffer, 235 unsigned long bufsiz) 236 { 237 struct kstatfs linux_stat; 238 int error = vfs_statfs(path, &linux_stat); 239 if (!error) 240 error = linux_to_osf_statfs(&linux_stat, buffer, bufsiz); 241 return error; 242 } 243 244 SYSCALL_DEFINE3(osf_statfs, const char __user *, pathname, 245 struct osf_statfs __user *, buffer, unsigned long, bufsiz) 246 { 247 struct path path; 248 int retval; 249 250 retval = user_path(pathname, &path); 251 if (!retval) { 252 retval = do_osf_statfs(&path, buffer, bufsiz); 253 path_put(&path); 254 } 255 return retval; 256 } 257 258 SYSCALL_DEFINE3(osf_fstatfs, unsigned long, fd, 259 struct osf_statfs __user *, buffer, unsigned long, bufsiz) 260 { 261 struct file *file; 262 int retval; 263 264 retval = -EBADF; 265 file = fget(fd); 266 if (file) { 267 retval = do_osf_statfs(&file->f_path, buffer, bufsiz); 268 fput(file); 269 } 270 return retval; 271 } 272 273 /* 274 * Uhh.. OSF/1 mount parameters aren't exactly obvious.. 275 * 276 * Although to be frank, neither are the native Linux/i386 ones.. 277 */ 278 struct ufs_args { 279 char __user *devname; 280 int flags; 281 uid_t exroot; 282 }; 283 284 struct cdfs_args { 285 char __user *devname; 286 int flags; 287 uid_t exroot; 288 289 /* This has lots more here, which Linux handles with the option block 290 but I'm too lazy to do the translation into ASCII. */ 291 }; 292 293 struct procfs_args { 294 char __user *devname; 295 int flags; 296 uid_t exroot; 297 }; 298 299 /* 300 * We can't actually handle ufs yet, so we translate UFS mounts to 301 * ext2fs mounts. I wouldn't mind a UFS filesystem, but the UFS 302 * layout is so braindead it's a major headache doing it. 303 * 304 * Just how long ago was it written? OTOH our UFS driver may be still 305 * unhappy with OSF UFS. [CHECKME] 306 */ 307 static int 308 osf_ufs_mount(char *dirname, struct ufs_args __user *args, int flags) 309 { 310 int retval; 311 struct cdfs_args tmp; 312 char *devname; 313 314 retval = -EFAULT; 315 if (copy_from_user(&tmp, args, sizeof(tmp))) 316 goto out; 317 devname = getname(tmp.devname); 318 retval = PTR_ERR(devname); 319 if (IS_ERR(devname)) 320 goto out; 321 retval = do_mount(devname, dirname, "ext2", flags, NULL); 322 putname(devname); 323 out: 324 return retval; 325 } 326 327 static int 328 osf_cdfs_mount(char *dirname, struct cdfs_args __user *args, int flags) 329 { 330 int retval; 331 struct cdfs_args tmp; 332 char *devname; 333 334 retval = -EFAULT; 335 if (copy_from_user(&tmp, args, sizeof(tmp))) 336 goto out; 337 devname = getname(tmp.devname); 338 retval = PTR_ERR(devname); 339 if (IS_ERR(devname)) 340 goto out; 341 retval = do_mount(devname, dirname, "iso9660", flags, NULL); 342 putname(devname); 343 out: 344 return retval; 345 } 346 347 static int 348 osf_procfs_mount(char *dirname, struct procfs_args __user *args, int flags) 349 { 350 struct procfs_args tmp; 351 352 if (copy_from_user(&tmp, args, sizeof(tmp))) 353 return -EFAULT; 354 355 return do_mount("", dirname, "proc", flags, NULL); 356 } 357 358 SYSCALL_DEFINE4(osf_mount, unsigned long, typenr, const char __user *, path, 359 int, flag, void __user *, data) 360 { 361 int retval; 362 char *name; 363 364 name = getname(path); 365 retval = PTR_ERR(name); 366 if (IS_ERR(name)) 367 goto out; 368 switch (typenr) { 369 case 1: 370 retval = osf_ufs_mount(name, data, flag); 371 break; 372 case 6: 373 retval = osf_cdfs_mount(name, data, flag); 374 break; 375 case 9: 376 retval = osf_procfs_mount(name, data, flag); 377 break; 378 default: 379 retval = -EINVAL; 380 printk("osf_mount(%ld, %x)\n", typenr, flag); 381 } 382 putname(name); 383 out: 384 return retval; 385 } 386 387 SYSCALL_DEFINE1(osf_utsname, char __user *, name) 388 { 389 int error; 390 391 down_read(&uts_sem); 392 error = -EFAULT; 393 if (copy_to_user(name + 0, utsname()->sysname, 32)) 394 goto out; 395 if (copy_to_user(name + 32, utsname()->nodename, 32)) 396 goto out; 397 if (copy_to_user(name + 64, utsname()->release, 32)) 398 goto out; 399 if (copy_to_user(name + 96, utsname()->version, 32)) 400 goto out; 401 if (copy_to_user(name + 128, utsname()->machine, 32)) 402 goto out; 403 404 error = 0; 405 out: 406 up_read(&uts_sem); 407 return error; 408 } 409 410 SYSCALL_DEFINE0(getpagesize) 411 { 412 return PAGE_SIZE; 413 } 414 415 SYSCALL_DEFINE0(getdtablesize) 416 { 417 return sysctl_nr_open; 418 } 419 420 /* 421 * For compatibility with OSF/1 only. Use utsname(2) instead. 422 */ 423 SYSCALL_DEFINE2(osf_getdomainname, char __user *, name, int, namelen) 424 { 425 unsigned len; 426 int i; 427 428 if (!access_ok(VERIFY_WRITE, name, namelen)) 429 return -EFAULT; 430 431 len = namelen; 432 if (namelen > 32) 433 len = 32; 434 435 down_read(&uts_sem); 436 for (i = 0; i < len; ++i) { 437 __put_user(utsname()->domainname[i], name + i); 438 if (utsname()->domainname[i] == '\0') 439 break; 440 } 441 up_read(&uts_sem); 442 443 return 0; 444 } 445 446 /* 447 * The following stuff should move into a header file should it ever 448 * be labeled "officially supported." Right now, there is just enough 449 * support to avoid applications (such as tar) printing error 450 * messages. The attributes are not really implemented. 451 */ 452 453 /* 454 * Values for Property list entry flag 455 */ 456 #define PLE_PROPAGATE_ON_COPY 0x1 /* cp(1) will copy entry 457 by default */ 458 #define PLE_FLAG_MASK 0x1 /* Valid flag values */ 459 #define PLE_FLAG_ALL -1 /* All flag value */ 460 461 struct proplistname_args { 462 unsigned int pl_mask; 463 unsigned int pl_numnames; 464 char **pl_names; 465 }; 466 467 union pl_args { 468 struct setargs { 469 char __user *path; 470 long follow; 471 long nbytes; 472 char __user *buf; 473 } set; 474 struct fsetargs { 475 long fd; 476 long nbytes; 477 char __user *buf; 478 } fset; 479 struct getargs { 480 char __user *path; 481 long follow; 482 struct proplistname_args __user *name_args; 483 long nbytes; 484 char __user *buf; 485 int __user *min_buf_size; 486 } get; 487 struct fgetargs { 488 long fd; 489 struct proplistname_args __user *name_args; 490 long nbytes; 491 char __user *buf; 492 int __user *min_buf_size; 493 } fget; 494 struct delargs { 495 char __user *path; 496 long follow; 497 struct proplistname_args __user *name_args; 498 } del; 499 struct fdelargs { 500 long fd; 501 struct proplistname_args __user *name_args; 502 } fdel; 503 }; 504 505 enum pl_code { 506 PL_SET = 1, PL_FSET = 2, 507 PL_GET = 3, PL_FGET = 4, 508 PL_DEL = 5, PL_FDEL = 6 509 }; 510 511 SYSCALL_DEFINE2(osf_proplist_syscall, enum pl_code, code, 512 union pl_args __user *, args) 513 { 514 long error; 515 int __user *min_buf_size_ptr; 516 517 switch (code) { 518 case PL_SET: 519 if (get_user(error, &args->set.nbytes)) 520 error = -EFAULT; 521 break; 522 case PL_FSET: 523 if (get_user(error, &args->fset.nbytes)) 524 error = -EFAULT; 525 break; 526 case PL_GET: 527 error = get_user(min_buf_size_ptr, &args->get.min_buf_size); 528 if (error) 529 break; 530 error = put_user(0, min_buf_size_ptr); 531 break; 532 case PL_FGET: 533 error = get_user(min_buf_size_ptr, &args->fget.min_buf_size); 534 if (error) 535 break; 536 error = put_user(0, min_buf_size_ptr); 537 break; 538 case PL_DEL: 539 case PL_FDEL: 540 error = 0; 541 break; 542 default: 543 error = -EOPNOTSUPP; 544 break; 545 }; 546 return error; 547 } 548 549 SYSCALL_DEFINE2(osf_sigstack, struct sigstack __user *, uss, 550 struct sigstack __user *, uoss) 551 { 552 unsigned long usp = rdusp(); 553 unsigned long oss_sp = current->sas_ss_sp + current->sas_ss_size; 554 unsigned long oss_os = on_sig_stack(usp); 555 int error; 556 557 if (uss) { 558 void __user *ss_sp; 559 560 error = -EFAULT; 561 if (get_user(ss_sp, &uss->ss_sp)) 562 goto out; 563 564 /* If the current stack was set with sigaltstack, don't 565 swap stacks while we are on it. */ 566 error = -EPERM; 567 if (current->sas_ss_sp && on_sig_stack(usp)) 568 goto out; 569 570 /* Since we don't know the extent of the stack, and we don't 571 track onstack-ness, but rather calculate it, we must 572 presume a size. Ho hum this interface is lossy. */ 573 current->sas_ss_sp = (unsigned long)ss_sp - SIGSTKSZ; 574 current->sas_ss_size = SIGSTKSZ; 575 } 576 577 if (uoss) { 578 error = -EFAULT; 579 if (! access_ok(VERIFY_WRITE, uoss, sizeof(*uoss)) 580 || __put_user(oss_sp, &uoss->ss_sp) 581 || __put_user(oss_os, &uoss->ss_onstack)) 582 goto out; 583 } 584 585 error = 0; 586 out: 587 return error; 588 } 589 590 SYSCALL_DEFINE3(osf_sysinfo, int, command, char __user *, buf, long, count) 591 { 592 const char *sysinfo_table[] = { 593 utsname()->sysname, 594 utsname()->nodename, 595 utsname()->release, 596 utsname()->version, 597 utsname()->machine, 598 "alpha", /* instruction set architecture */ 599 "dummy", /* hardware serial number */ 600 "dummy", /* hardware manufacturer */ 601 "dummy", /* secure RPC domain */ 602 }; 603 unsigned long offset; 604 const char *res; 605 long len, err = -EINVAL; 606 607 offset = command-1; 608 if (offset >= ARRAY_SIZE(sysinfo_table)) { 609 /* Digital UNIX has a few unpublished interfaces here */ 610 printk("sysinfo(%d)", command); 611 goto out; 612 } 613 614 down_read(&uts_sem); 615 res = sysinfo_table[offset]; 616 len = strlen(res)+1; 617 if (len > count) 618 len = count; 619 if (copy_to_user(buf, res, len)) 620 err = -EFAULT; 621 else 622 err = 0; 623 up_read(&uts_sem); 624 out: 625 return err; 626 } 627 628 SYSCALL_DEFINE5(osf_getsysinfo, unsigned long, op, void __user *, buffer, 629 unsigned long, nbytes, int __user *, start, void __user *, arg) 630 { 631 unsigned long w; 632 struct percpu_struct *cpu; 633 634 switch (op) { 635 case GSI_IEEE_FP_CONTROL: 636 /* Return current software fp control & status bits. */ 637 /* Note that DU doesn't verify available space here. */ 638 639 w = current_thread_info()->ieee_state & IEEE_SW_MASK; 640 w = swcr_update_status(w, rdfpcr()); 641 if (put_user(w, (unsigned long __user *) buffer)) 642 return -EFAULT; 643 return 0; 644 645 case GSI_IEEE_STATE_AT_SIGNAL: 646 /* 647 * Not sure anybody will ever use this weird stuff. These 648 * ops can be used (under OSF/1) to set the fpcr that should 649 * be used when a signal handler starts executing. 650 */ 651 break; 652 653 case GSI_UACPROC: 654 if (nbytes < sizeof(unsigned int)) 655 return -EINVAL; 656 w = (current_thread_info()->flags >> UAC_SHIFT) & UAC_BITMASK; 657 if (put_user(w, (unsigned int __user *)buffer)) 658 return -EFAULT; 659 return 1; 660 661 case GSI_PROC_TYPE: 662 if (nbytes < sizeof(unsigned long)) 663 return -EINVAL; 664 cpu = (struct percpu_struct*) 665 ((char*)hwrpb + hwrpb->processor_offset); 666 w = cpu->type; 667 if (put_user(w, (unsigned long __user*)buffer)) 668 return -EFAULT; 669 return 1; 670 671 case GSI_GET_HWRPB: 672 if (nbytes < sizeof(*hwrpb)) 673 return -EINVAL; 674 if (copy_to_user(buffer, hwrpb, nbytes) != 0) 675 return -EFAULT; 676 return 1; 677 678 default: 679 break; 680 } 681 682 return -EOPNOTSUPP; 683 } 684 685 SYSCALL_DEFINE5(osf_setsysinfo, unsigned long, op, void __user *, buffer, 686 unsigned long, nbytes, int __user *, start, void __user *, arg) 687 { 688 switch (op) { 689 case SSI_IEEE_FP_CONTROL: { 690 unsigned long swcr, fpcr; 691 unsigned int *state; 692 693 /* 694 * Alpha Architecture Handbook 4.7.7.3: 695 * To be fully IEEE compiant, we must track the current IEEE 696 * exception state in software, because spurious bits can be 697 * set in the trap shadow of a software-complete insn. 698 */ 699 700 if (get_user(swcr, (unsigned long __user *)buffer)) 701 return -EFAULT; 702 state = ¤t_thread_info()->ieee_state; 703 704 /* Update softare trap enable bits. */ 705 *state = (*state & ~IEEE_SW_MASK) | (swcr & IEEE_SW_MASK); 706 707 /* Update the real fpcr. */ 708 fpcr = rdfpcr() & FPCR_DYN_MASK; 709 fpcr |= ieee_swcr_to_fpcr(swcr); 710 wrfpcr(fpcr); 711 712 return 0; 713 } 714 715 case SSI_IEEE_RAISE_EXCEPTION: { 716 unsigned long exc, swcr, fpcr, fex; 717 unsigned int *state; 718 719 if (get_user(exc, (unsigned long __user *)buffer)) 720 return -EFAULT; 721 state = ¤t_thread_info()->ieee_state; 722 exc &= IEEE_STATUS_MASK; 723 724 /* Update softare trap enable bits. */ 725 swcr = (*state & IEEE_SW_MASK) | exc; 726 *state |= exc; 727 728 /* Update the real fpcr. */ 729 fpcr = rdfpcr(); 730 fpcr |= ieee_swcr_to_fpcr(swcr); 731 wrfpcr(fpcr); 732 733 /* If any exceptions set by this call, and are unmasked, 734 send a signal. Old exceptions are not signaled. */ 735 fex = (exc >> IEEE_STATUS_TO_EXCSUM_SHIFT) & swcr; 736 if (fex) { 737 siginfo_t info; 738 int si_code = 0; 739 740 if (fex & IEEE_TRAP_ENABLE_DNO) si_code = FPE_FLTUND; 741 if (fex & IEEE_TRAP_ENABLE_INE) si_code = FPE_FLTRES; 742 if (fex & IEEE_TRAP_ENABLE_UNF) si_code = FPE_FLTUND; 743 if (fex & IEEE_TRAP_ENABLE_OVF) si_code = FPE_FLTOVF; 744 if (fex & IEEE_TRAP_ENABLE_DZE) si_code = FPE_FLTDIV; 745 if (fex & IEEE_TRAP_ENABLE_INV) si_code = FPE_FLTINV; 746 747 info.si_signo = SIGFPE; 748 info.si_errno = 0; 749 info.si_code = si_code; 750 info.si_addr = NULL; /* FIXME */ 751 send_sig_info(SIGFPE, &info, current); 752 } 753 return 0; 754 } 755 756 case SSI_IEEE_STATE_AT_SIGNAL: 757 case SSI_IEEE_IGNORE_STATE_AT_SIGNAL: 758 /* 759 * Not sure anybody will ever use this weird stuff. These 760 * ops can be used (under OSF/1) to set the fpcr that should 761 * be used when a signal handler starts executing. 762 */ 763 break; 764 765 case SSI_NVPAIRS: { 766 unsigned long v, w, i; 767 unsigned int old, new; 768 769 for (i = 0; i < nbytes; ++i) { 770 771 if (get_user(v, 2*i + (unsigned int __user *)buffer)) 772 return -EFAULT; 773 if (get_user(w, 2*i + 1 + (unsigned int __user *)buffer)) 774 return -EFAULT; 775 switch (v) { 776 case SSIN_UACPROC: 777 again: 778 old = current_thread_info()->flags; 779 new = old & ~(UAC_BITMASK << UAC_SHIFT); 780 new = new | (w & UAC_BITMASK) << UAC_SHIFT; 781 if (cmpxchg(¤t_thread_info()->flags, 782 old, new) != old) 783 goto again; 784 break; 785 786 default: 787 return -EOPNOTSUPP; 788 } 789 } 790 return 0; 791 } 792 793 default: 794 break; 795 } 796 797 return -EOPNOTSUPP; 798 } 799 800 /* Translations due to the fact that OSF's time_t is an int. Which 801 affects all sorts of things, like timeval and itimerval. */ 802 803 extern struct timezone sys_tz; 804 805 struct timeval32 806 { 807 int tv_sec, tv_usec; 808 }; 809 810 struct itimerval32 811 { 812 struct timeval32 it_interval; 813 struct timeval32 it_value; 814 }; 815 816 static inline long 817 get_tv32(struct timeval *o, struct timeval32 __user *i) 818 { 819 return (!access_ok(VERIFY_READ, i, sizeof(*i)) || 820 (__get_user(o->tv_sec, &i->tv_sec) | 821 __get_user(o->tv_usec, &i->tv_usec))); 822 } 823 824 static inline long 825 put_tv32(struct timeval32 __user *o, struct timeval *i) 826 { 827 return (!access_ok(VERIFY_WRITE, o, sizeof(*o)) || 828 (__put_user(i->tv_sec, &o->tv_sec) | 829 __put_user(i->tv_usec, &o->tv_usec))); 830 } 831 832 static inline long 833 get_it32(struct itimerval *o, struct itimerval32 __user *i) 834 { 835 return (!access_ok(VERIFY_READ, i, sizeof(*i)) || 836 (__get_user(o->it_interval.tv_sec, &i->it_interval.tv_sec) | 837 __get_user(o->it_interval.tv_usec, &i->it_interval.tv_usec) | 838 __get_user(o->it_value.tv_sec, &i->it_value.tv_sec) | 839 __get_user(o->it_value.tv_usec, &i->it_value.tv_usec))); 840 } 841 842 static inline long 843 put_it32(struct itimerval32 __user *o, struct itimerval *i) 844 { 845 return (!access_ok(VERIFY_WRITE, o, sizeof(*o)) || 846 (__put_user(i->it_interval.tv_sec, &o->it_interval.tv_sec) | 847 __put_user(i->it_interval.tv_usec, &o->it_interval.tv_usec) | 848 __put_user(i->it_value.tv_sec, &o->it_value.tv_sec) | 849 __put_user(i->it_value.tv_usec, &o->it_value.tv_usec))); 850 } 851 852 static inline void 853 jiffies_to_timeval32(unsigned long jiffies, struct timeval32 *value) 854 { 855 value->tv_usec = (jiffies % HZ) * (1000000L / HZ); 856 value->tv_sec = jiffies / HZ; 857 } 858 859 SYSCALL_DEFINE2(osf_gettimeofday, struct timeval32 __user *, tv, 860 struct timezone __user *, tz) 861 { 862 if (tv) { 863 struct timeval ktv; 864 do_gettimeofday(&ktv); 865 if (put_tv32(tv, &ktv)) 866 return -EFAULT; 867 } 868 if (tz) { 869 if (copy_to_user(tz, &sys_tz, sizeof(sys_tz))) 870 return -EFAULT; 871 } 872 return 0; 873 } 874 875 SYSCALL_DEFINE2(osf_settimeofday, struct timeval32 __user *, tv, 876 struct timezone __user *, tz) 877 { 878 struct timespec kts; 879 struct timezone ktz; 880 881 if (tv) { 882 if (get_tv32((struct timeval *)&kts, tv)) 883 return -EFAULT; 884 } 885 if (tz) { 886 if (copy_from_user(&ktz, tz, sizeof(*tz))) 887 return -EFAULT; 888 } 889 890 kts.tv_nsec *= 1000; 891 892 return do_sys_settimeofday(tv ? &kts : NULL, tz ? &ktz : NULL); 893 } 894 895 SYSCALL_DEFINE2(osf_getitimer, int, which, struct itimerval32 __user *, it) 896 { 897 struct itimerval kit; 898 int error; 899 900 error = do_getitimer(which, &kit); 901 if (!error && put_it32(it, &kit)) 902 error = -EFAULT; 903 904 return error; 905 } 906 907 SYSCALL_DEFINE3(osf_setitimer, int, which, struct itimerval32 __user *, in, 908 struct itimerval32 __user *, out) 909 { 910 struct itimerval kin, kout; 911 int error; 912 913 if (in) { 914 if (get_it32(&kin, in)) 915 return -EFAULT; 916 } else 917 memset(&kin, 0, sizeof(kin)); 918 919 error = do_setitimer(which, &kin, out ? &kout : NULL); 920 if (error || !out) 921 return error; 922 923 if (put_it32(out, &kout)) 924 return -EFAULT; 925 926 return 0; 927 928 } 929 930 SYSCALL_DEFINE2(osf_utimes, const char __user *, filename, 931 struct timeval32 __user *, tvs) 932 { 933 struct timespec tv[2]; 934 935 if (tvs) { 936 struct timeval ktvs[2]; 937 if (get_tv32(&ktvs[0], &tvs[0]) || 938 get_tv32(&ktvs[1], &tvs[1])) 939 return -EFAULT; 940 941 if (ktvs[0].tv_usec < 0 || ktvs[0].tv_usec >= 1000000 || 942 ktvs[1].tv_usec < 0 || ktvs[1].tv_usec >= 1000000) 943 return -EINVAL; 944 945 tv[0].tv_sec = ktvs[0].tv_sec; 946 tv[0].tv_nsec = 1000 * ktvs[0].tv_usec; 947 tv[1].tv_sec = ktvs[1].tv_sec; 948 tv[1].tv_nsec = 1000 * ktvs[1].tv_usec; 949 } 950 951 return do_utimes(AT_FDCWD, filename, tvs ? tv : NULL, 0); 952 } 953 954 SYSCALL_DEFINE5(osf_select, int, n, fd_set __user *, inp, fd_set __user *, outp, 955 fd_set __user *, exp, struct timeval32 __user *, tvp) 956 { 957 struct timespec end_time, *to = NULL; 958 if (tvp) { 959 time_t sec, usec; 960 961 to = &end_time; 962 963 if (!access_ok(VERIFY_READ, tvp, sizeof(*tvp)) 964 || __get_user(sec, &tvp->tv_sec) 965 || __get_user(usec, &tvp->tv_usec)) { 966 return -EFAULT; 967 } 968 969 if (sec < 0 || usec < 0) 970 return -EINVAL; 971 972 if (poll_select_set_timeout(to, sec, usec * NSEC_PER_USEC)) 973 return -EINVAL; 974 975 } 976 977 /* OSF does not copy back the remaining time. */ 978 return core_sys_select(n, inp, outp, exp, to); 979 } 980 981 struct rusage32 { 982 struct timeval32 ru_utime; /* user time used */ 983 struct timeval32 ru_stime; /* system time used */ 984 long ru_maxrss; /* maximum resident set size */ 985 long ru_ixrss; /* integral shared memory size */ 986 long ru_idrss; /* integral unshared data size */ 987 long ru_isrss; /* integral unshared stack size */ 988 long ru_minflt; /* page reclaims */ 989 long ru_majflt; /* page faults */ 990 long ru_nswap; /* swaps */ 991 long ru_inblock; /* block input operations */ 992 long ru_oublock; /* block output operations */ 993 long ru_msgsnd; /* messages sent */ 994 long ru_msgrcv; /* messages received */ 995 long ru_nsignals; /* signals received */ 996 long ru_nvcsw; /* voluntary context switches */ 997 long ru_nivcsw; /* involuntary " */ 998 }; 999 1000 SYSCALL_DEFINE2(osf_getrusage, int, who, struct rusage32 __user *, ru) 1001 { 1002 struct rusage32 r; 1003 1004 if (who != RUSAGE_SELF && who != RUSAGE_CHILDREN) 1005 return -EINVAL; 1006 1007 memset(&r, 0, sizeof(r)); 1008 switch (who) { 1009 case RUSAGE_SELF: 1010 jiffies_to_timeval32(current->utime, &r.ru_utime); 1011 jiffies_to_timeval32(current->stime, &r.ru_stime); 1012 r.ru_minflt = current->min_flt; 1013 r.ru_majflt = current->maj_flt; 1014 break; 1015 case RUSAGE_CHILDREN: 1016 jiffies_to_timeval32(current->signal->cutime, &r.ru_utime); 1017 jiffies_to_timeval32(current->signal->cstime, &r.ru_stime); 1018 r.ru_minflt = current->signal->cmin_flt; 1019 r.ru_majflt = current->signal->cmaj_flt; 1020 break; 1021 } 1022 1023 return copy_to_user(ru, &r, sizeof(r)) ? -EFAULT : 0; 1024 } 1025 1026 SYSCALL_DEFINE4(osf_wait4, pid_t, pid, int __user *, ustatus, int, options, 1027 struct rusage32 __user *, ur) 1028 { 1029 struct rusage r; 1030 long ret, err; 1031 mm_segment_t old_fs; 1032 1033 if (!ur) 1034 return sys_wait4(pid, ustatus, options, NULL); 1035 1036 old_fs = get_fs(); 1037 1038 set_fs (KERNEL_DS); 1039 ret = sys_wait4(pid, ustatus, options, (struct rusage __user *) &r); 1040 set_fs (old_fs); 1041 1042 if (!access_ok(VERIFY_WRITE, ur, sizeof(*ur))) 1043 return -EFAULT; 1044 1045 err = 0; 1046 err |= __put_user(r.ru_utime.tv_sec, &ur->ru_utime.tv_sec); 1047 err |= __put_user(r.ru_utime.tv_usec, &ur->ru_utime.tv_usec); 1048 err |= __put_user(r.ru_stime.tv_sec, &ur->ru_stime.tv_sec); 1049 err |= __put_user(r.ru_stime.tv_usec, &ur->ru_stime.tv_usec); 1050 err |= __put_user(r.ru_maxrss, &ur->ru_maxrss); 1051 err |= __put_user(r.ru_ixrss, &ur->ru_ixrss); 1052 err |= __put_user(r.ru_idrss, &ur->ru_idrss); 1053 err |= __put_user(r.ru_isrss, &ur->ru_isrss); 1054 err |= __put_user(r.ru_minflt, &ur->ru_minflt); 1055 err |= __put_user(r.ru_majflt, &ur->ru_majflt); 1056 err |= __put_user(r.ru_nswap, &ur->ru_nswap); 1057 err |= __put_user(r.ru_inblock, &ur->ru_inblock); 1058 err |= __put_user(r.ru_oublock, &ur->ru_oublock); 1059 err |= __put_user(r.ru_msgsnd, &ur->ru_msgsnd); 1060 err |= __put_user(r.ru_msgrcv, &ur->ru_msgrcv); 1061 err |= __put_user(r.ru_nsignals, &ur->ru_nsignals); 1062 err |= __put_user(r.ru_nvcsw, &ur->ru_nvcsw); 1063 err |= __put_user(r.ru_nivcsw, &ur->ru_nivcsw); 1064 1065 return err ? err : ret; 1066 } 1067 1068 /* 1069 * I don't know what the parameters are: the first one 1070 * seems to be a timeval pointer, and I suspect the second 1071 * one is the time remaining.. Ho humm.. No documentation. 1072 */ 1073 SYSCALL_DEFINE2(osf_usleep_thread, struct timeval32 __user *, sleep, 1074 struct timeval32 __user *, remain) 1075 { 1076 struct timeval tmp; 1077 unsigned long ticks; 1078 1079 if (get_tv32(&tmp, sleep)) 1080 goto fault; 1081 1082 ticks = timeval_to_jiffies(&tmp); 1083 1084 ticks = schedule_timeout_interruptible(ticks); 1085 1086 if (remain) { 1087 jiffies_to_timeval(ticks, &tmp); 1088 if (put_tv32(remain, &tmp)) 1089 goto fault; 1090 } 1091 1092 return 0; 1093 fault: 1094 return -EFAULT; 1095 } 1096 1097 1098 struct timex32 { 1099 unsigned int modes; /* mode selector */ 1100 long offset; /* time offset (usec) */ 1101 long freq; /* frequency offset (scaled ppm) */ 1102 long maxerror; /* maximum error (usec) */ 1103 long esterror; /* estimated error (usec) */ 1104 int status; /* clock command/status */ 1105 long constant; /* pll time constant */ 1106 long precision; /* clock precision (usec) (read only) */ 1107 long tolerance; /* clock frequency tolerance (ppm) 1108 * (read only) 1109 */ 1110 struct timeval32 time; /* (read only) */ 1111 long tick; /* (modified) usecs between clock ticks */ 1112 1113 long ppsfreq; /* pps frequency (scaled ppm) (ro) */ 1114 long jitter; /* pps jitter (us) (ro) */ 1115 int shift; /* interval duration (s) (shift) (ro) */ 1116 long stabil; /* pps stability (scaled ppm) (ro) */ 1117 long jitcnt; /* jitter limit exceeded (ro) */ 1118 long calcnt; /* calibration intervals (ro) */ 1119 long errcnt; /* calibration errors (ro) */ 1120 long stbcnt; /* stability limit exceeded (ro) */ 1121 1122 int :32; int :32; int :32; int :32; 1123 int :32; int :32; int :32; int :32; 1124 int :32; int :32; int :32; int :32; 1125 }; 1126 1127 SYSCALL_DEFINE1(old_adjtimex, struct timex32 __user *, txc_p) 1128 { 1129 struct timex txc; 1130 int ret; 1131 1132 /* copy relevant bits of struct timex. */ 1133 if (copy_from_user(&txc, txc_p, offsetof(struct timex32, time)) || 1134 copy_from_user(&txc.tick, &txc_p->tick, sizeof(struct timex32) - 1135 offsetof(struct timex32, time))) 1136 return -EFAULT; 1137 1138 ret = do_adjtimex(&txc); 1139 if (ret < 0) 1140 return ret; 1141 1142 /* copy back to timex32 */ 1143 if (copy_to_user(txc_p, &txc, offsetof(struct timex32, time)) || 1144 (copy_to_user(&txc_p->tick, &txc.tick, sizeof(struct timex32) - 1145 offsetof(struct timex32, tick))) || 1146 (put_tv32(&txc_p->time, &txc.time))) 1147 return -EFAULT; 1148 1149 return ret; 1150 } 1151 1152 /* Get an address range which is currently unmapped. Similar to the 1153 generic version except that we know how to honor ADDR_LIMIT_32BIT. */ 1154 1155 static unsigned long 1156 arch_get_unmapped_area_1(unsigned long addr, unsigned long len, 1157 unsigned long limit) 1158 { 1159 struct vm_area_struct *vma = find_vma(current->mm, addr); 1160 1161 while (1) { 1162 /* At this point: (!vma || addr < vma->vm_end). */ 1163 if (limit - len < addr) 1164 return -ENOMEM; 1165 if (!vma || addr + len <= vma->vm_start) 1166 return addr; 1167 addr = vma->vm_end; 1168 vma = vma->vm_next; 1169 } 1170 } 1171 1172 unsigned long 1173 arch_get_unmapped_area(struct file *filp, unsigned long addr, 1174 unsigned long len, unsigned long pgoff, 1175 unsigned long flags) 1176 { 1177 unsigned long limit; 1178 1179 /* "32 bit" actually means 31 bit, since pointers sign extend. */ 1180 if (current->personality & ADDR_LIMIT_32BIT) 1181 limit = 0x80000000; 1182 else 1183 limit = TASK_SIZE; 1184 1185 if (len > limit) 1186 return -ENOMEM; 1187 1188 if (flags & MAP_FIXED) 1189 return addr; 1190 1191 /* First, see if the given suggestion fits. 1192 1193 The OSF/1 loader (/sbin/loader) relies on us returning an 1194 address larger than the requested if one exists, which is 1195 a terribly broken way to program. 1196 1197 That said, I can see the use in being able to suggest not 1198 merely specific addresses, but regions of memory -- perhaps 1199 this feature should be incorporated into all ports? */ 1200 1201 if (addr) { 1202 addr = arch_get_unmapped_area_1 (PAGE_ALIGN(addr), len, limit); 1203 if (addr != (unsigned long) -ENOMEM) 1204 return addr; 1205 } 1206 1207 /* Next, try allocating at TASK_UNMAPPED_BASE. */ 1208 addr = arch_get_unmapped_area_1 (PAGE_ALIGN(TASK_UNMAPPED_BASE), 1209 len, limit); 1210 if (addr != (unsigned long) -ENOMEM) 1211 return addr; 1212 1213 /* Finally, try allocating in low memory. */ 1214 addr = arch_get_unmapped_area_1 (PAGE_SIZE, len, limit); 1215 1216 return addr; 1217 } 1218 1219 #ifdef CONFIG_OSF4_COMPAT 1220 1221 /* Clear top 32 bits of iov_len in the user's buffer for 1222 compatibility with old versions of OSF/1 where iov_len 1223 was defined as int. */ 1224 static int 1225 osf_fix_iov_len(const struct iovec __user *iov, unsigned long count) 1226 { 1227 unsigned long i; 1228 1229 for (i = 0 ; i < count ; i++) { 1230 int __user *iov_len_high = (int __user *)&iov[i].iov_len + 1; 1231 1232 if (put_user(0, iov_len_high)) 1233 return -EFAULT; 1234 } 1235 return 0; 1236 } 1237 1238 SYSCALL_DEFINE3(osf_readv, unsigned long, fd, 1239 const struct iovec __user *, vector, unsigned long, count) 1240 { 1241 if (unlikely(personality(current->personality) == PER_OSF4)) 1242 if (osf_fix_iov_len(vector, count)) 1243 return -EFAULT; 1244 return sys_readv(fd, vector, count); 1245 } 1246 1247 SYSCALL_DEFINE3(osf_writev, unsigned long, fd, 1248 const struct iovec __user *, vector, unsigned long, count) 1249 { 1250 if (unlikely(personality(current->personality) == PER_OSF4)) 1251 if (osf_fix_iov_len(vector, count)) 1252 return -EFAULT; 1253 return sys_writev(fd, vector, count); 1254 } 1255 1256 #endif 1257