1 /* 2 * linux/arch/alpha/kernel/osf_sys.c 3 * 4 * Copyright (C) 1995 Linus Torvalds 5 */ 6 7 /* 8 * This file handles some of the stranger OSF/1 system call interfaces. 9 * Some of the system calls expect a non-C calling standard, others have 10 * special parameter blocks.. 11 */ 12 13 #include <linux/errno.h> 14 #include <linux/sched.h> 15 #include <linux/kernel.h> 16 #include <linux/mm.h> 17 #include <linux/smp.h> 18 #include <linux/smp_lock.h> 19 #include <linux/stddef.h> 20 #include <linux/syscalls.h> 21 #include <linux/unistd.h> 22 #include <linux/ptrace.h> 23 #include <linux/slab.h> 24 #include <linux/user.h> 25 #include <linux/utsname.h> 26 #include <linux/time.h> 27 #include <linux/timex.h> 28 #include <linux/major.h> 29 #include <linux/stat.h> 30 #include <linux/mman.h> 31 #include <linux/shm.h> 32 #include <linux/poll.h> 33 #include <linux/file.h> 34 #include <linux/types.h> 35 #include <linux/ipc.h> 36 #include <linux/namei.h> 37 #include <linux/uio.h> 38 #include <linux/vfs.h> 39 #include <linux/rcupdate.h> 40 41 #include <asm/fpu.h> 42 #include <asm/io.h> 43 #include <asm/uaccess.h> 44 #include <asm/system.h> 45 #include <asm/sysinfo.h> 46 #include <asm/hwrpb.h> 47 #include <asm/processor.h> 48 49 /* 50 * Brk needs to return an error. Still support Linux's brk(0) query idiom, 51 * which OSF programs just shouldn't be doing. We're still not quite 52 * identical to OSF as we don't return 0 on success, but doing otherwise 53 * would require changes to libc. Hopefully this is good enough. 54 */ 55 SYSCALL_DEFINE1(osf_brk, unsigned long, brk) 56 { 57 unsigned long retval = sys_brk(brk); 58 if (brk && brk != retval) 59 retval = -ENOMEM; 60 return retval; 61 } 62 63 /* 64 * This is pure guess-work.. 65 */ 66 SYSCALL_DEFINE4(osf_set_program_attributes, unsigned long, text_start, 67 unsigned long, text_len, unsigned long, bss_start, 68 unsigned long, bss_len) 69 { 70 struct mm_struct *mm; 71 72 lock_kernel(); 73 mm = current->mm; 74 mm->end_code = bss_start + bss_len; 75 mm->start_brk = bss_start + bss_len; 76 mm->brk = bss_start + bss_len; 77 #if 0 78 printk("set_program_attributes(%lx %lx %lx %lx)\n", 79 text_start, text_len, bss_start, bss_len); 80 #endif 81 unlock_kernel(); 82 return 0; 83 } 84 85 /* 86 * OSF/1 directory handling functions... 87 * 88 * The "getdents()" interface is much more sane: the "basep" stuff is 89 * braindamage (it can't really handle filesystems where the directory 90 * offset differences aren't the same as "d_reclen"). 91 */ 92 #define NAME_OFFSET offsetof (struct osf_dirent, d_name) 93 94 struct osf_dirent { 95 unsigned int d_ino; 96 unsigned short d_reclen; 97 unsigned short d_namlen; 98 char d_name[1]; 99 }; 100 101 struct osf_dirent_callback { 102 struct osf_dirent __user *dirent; 103 long __user *basep; 104 unsigned int count; 105 int error; 106 }; 107 108 static int 109 osf_filldir(void *__buf, const char *name, int namlen, loff_t offset, 110 u64 ino, unsigned int d_type) 111 { 112 struct osf_dirent __user *dirent; 113 struct osf_dirent_callback *buf = (struct osf_dirent_callback *) __buf; 114 unsigned int reclen = ALIGN(NAME_OFFSET + namlen + 1, sizeof(u32)); 115 unsigned int d_ino; 116 117 buf->error = -EINVAL; /* only used if we fail */ 118 if (reclen > buf->count) 119 return -EINVAL; 120 d_ino = ino; 121 if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) { 122 buf->error = -EOVERFLOW; 123 return -EOVERFLOW; 124 } 125 if (buf->basep) { 126 if (put_user(offset, buf->basep)) 127 goto Efault; 128 buf->basep = NULL; 129 } 130 dirent = buf->dirent; 131 if (put_user(d_ino, &dirent->d_ino) || 132 put_user(namlen, &dirent->d_namlen) || 133 put_user(reclen, &dirent->d_reclen) || 134 copy_to_user(dirent->d_name, name, namlen) || 135 put_user(0, dirent->d_name + namlen)) 136 goto Efault; 137 dirent = (void __user *)dirent + reclen; 138 buf->dirent = dirent; 139 buf->count -= reclen; 140 return 0; 141 Efault: 142 buf->error = -EFAULT; 143 return -EFAULT; 144 } 145 146 SYSCALL_DEFINE4(osf_getdirentries, unsigned int, fd, 147 struct osf_dirent __user *, dirent, unsigned int, count, 148 long __user *, basep) 149 { 150 int error; 151 struct file *file; 152 struct osf_dirent_callback buf; 153 154 error = -EBADF; 155 file = fget(fd); 156 if (!file) 157 goto out; 158 159 buf.dirent = dirent; 160 buf.basep = basep; 161 buf.count = count; 162 buf.error = 0; 163 164 error = vfs_readdir(file, osf_filldir, &buf); 165 if (error >= 0) 166 error = buf.error; 167 if (count != buf.count) 168 error = count - buf.count; 169 170 fput(file); 171 out: 172 return error; 173 } 174 175 #undef NAME_OFFSET 176 177 SYSCALL_DEFINE6(osf_mmap, unsigned long, addr, unsigned long, len, 178 unsigned long, prot, unsigned long, flags, unsigned long, fd, 179 unsigned long, off) 180 { 181 struct file *file = NULL; 182 unsigned long ret = -EBADF; 183 184 #if 0 185 if (flags & (_MAP_HASSEMAPHORE | _MAP_INHERIT | _MAP_UNALIGNED)) 186 printk("%s: unimplemented OSF mmap flags %04lx\n", 187 current->comm, flags); 188 #endif 189 if (!(flags & MAP_ANONYMOUS)) { 190 file = fget(fd); 191 if (!file) 192 goto out; 193 } 194 flags &= ~(MAP_EXECUTABLE | MAP_DENYWRITE); 195 down_write(¤t->mm->mmap_sem); 196 ret = do_mmap(file, addr, len, prot, flags, off); 197 up_write(¤t->mm->mmap_sem); 198 if (file) 199 fput(file); 200 out: 201 return ret; 202 } 203 204 205 /* 206 * The OSF/1 statfs structure is much larger, but this should 207 * match the beginning, at least. 208 */ 209 struct osf_statfs { 210 short f_type; 211 short f_flags; 212 int f_fsize; 213 int f_bsize; 214 int f_blocks; 215 int f_bfree; 216 int f_bavail; 217 int f_files; 218 int f_ffree; 219 __kernel_fsid_t f_fsid; 220 }; 221 222 static int 223 linux_to_osf_statfs(struct kstatfs *linux_stat, struct osf_statfs __user *osf_stat, 224 unsigned long bufsiz) 225 { 226 struct osf_statfs tmp_stat; 227 228 tmp_stat.f_type = linux_stat->f_type; 229 tmp_stat.f_flags = 0; /* mount flags */ 230 tmp_stat.f_fsize = linux_stat->f_frsize; 231 tmp_stat.f_bsize = linux_stat->f_bsize; 232 tmp_stat.f_blocks = linux_stat->f_blocks; 233 tmp_stat.f_bfree = linux_stat->f_bfree; 234 tmp_stat.f_bavail = linux_stat->f_bavail; 235 tmp_stat.f_files = linux_stat->f_files; 236 tmp_stat.f_ffree = linux_stat->f_ffree; 237 tmp_stat.f_fsid = linux_stat->f_fsid; 238 if (bufsiz > sizeof(tmp_stat)) 239 bufsiz = sizeof(tmp_stat); 240 return copy_to_user(osf_stat, &tmp_stat, bufsiz) ? -EFAULT : 0; 241 } 242 243 static int 244 do_osf_statfs(struct dentry * dentry, struct osf_statfs __user *buffer, 245 unsigned long bufsiz) 246 { 247 struct kstatfs linux_stat; 248 int error = vfs_statfs(dentry, &linux_stat); 249 if (!error) 250 error = linux_to_osf_statfs(&linux_stat, buffer, bufsiz); 251 return error; 252 } 253 254 SYSCALL_DEFINE3(osf_statfs, char __user *, pathname, 255 struct osf_statfs __user *, buffer, unsigned long, bufsiz) 256 { 257 struct path path; 258 int retval; 259 260 retval = user_path(pathname, &path); 261 if (!retval) { 262 retval = do_osf_statfs(path.dentry, buffer, bufsiz); 263 path_put(&path); 264 } 265 return retval; 266 } 267 268 SYSCALL_DEFINE3(osf_fstatfs, unsigned long, fd, 269 struct osf_statfs __user *, buffer, unsigned long, bufsiz) 270 { 271 struct file *file; 272 int retval; 273 274 retval = -EBADF; 275 file = fget(fd); 276 if (file) { 277 retval = do_osf_statfs(file->f_path.dentry, buffer, bufsiz); 278 fput(file); 279 } 280 return retval; 281 } 282 283 /* 284 * Uhh.. OSF/1 mount parameters aren't exactly obvious.. 285 * 286 * Although to be frank, neither are the native Linux/i386 ones.. 287 */ 288 struct ufs_args { 289 char __user *devname; 290 int flags; 291 uid_t exroot; 292 }; 293 294 struct cdfs_args { 295 char __user *devname; 296 int flags; 297 uid_t exroot; 298 299 /* This has lots more here, which Linux handles with the option block 300 but I'm too lazy to do the translation into ASCII. */ 301 }; 302 303 struct procfs_args { 304 char __user *devname; 305 int flags; 306 uid_t exroot; 307 }; 308 309 /* 310 * We can't actually handle ufs yet, so we translate UFS mounts to 311 * ext2fs mounts. I wouldn't mind a UFS filesystem, but the UFS 312 * layout is so braindead it's a major headache doing it. 313 * 314 * Just how long ago was it written? OTOH our UFS driver may be still 315 * unhappy with OSF UFS. [CHECKME] 316 */ 317 static int 318 osf_ufs_mount(char *dirname, struct ufs_args __user *args, int flags) 319 { 320 int retval; 321 struct cdfs_args tmp; 322 char *devname; 323 324 retval = -EFAULT; 325 if (copy_from_user(&tmp, args, sizeof(tmp))) 326 goto out; 327 devname = getname(tmp.devname); 328 retval = PTR_ERR(devname); 329 if (IS_ERR(devname)) 330 goto out; 331 retval = do_mount(devname, dirname, "ext2", flags, NULL); 332 putname(devname); 333 out: 334 return retval; 335 } 336 337 static int 338 osf_cdfs_mount(char *dirname, struct cdfs_args __user *args, int flags) 339 { 340 int retval; 341 struct cdfs_args tmp; 342 char *devname; 343 344 retval = -EFAULT; 345 if (copy_from_user(&tmp, args, sizeof(tmp))) 346 goto out; 347 devname = getname(tmp.devname); 348 retval = PTR_ERR(devname); 349 if (IS_ERR(devname)) 350 goto out; 351 retval = do_mount(devname, dirname, "iso9660", flags, NULL); 352 putname(devname); 353 out: 354 return retval; 355 } 356 357 static int 358 osf_procfs_mount(char *dirname, struct procfs_args __user *args, int flags) 359 { 360 struct procfs_args tmp; 361 362 if (copy_from_user(&tmp, args, sizeof(tmp))) 363 return -EFAULT; 364 365 return do_mount("", dirname, "proc", flags, NULL); 366 } 367 368 SYSCALL_DEFINE4(osf_mount, unsigned long, typenr, char __user *, path, 369 int, flag, void __user *, data) 370 { 371 int retval = -EINVAL; 372 char *name; 373 374 name = getname(path); 375 retval = PTR_ERR(name); 376 if (IS_ERR(name)) 377 goto out; 378 switch (typenr) { 379 case 1: 380 retval = osf_ufs_mount(name, data, flag); 381 break; 382 case 6: 383 retval = osf_cdfs_mount(name, data, flag); 384 break; 385 case 9: 386 retval = osf_procfs_mount(name, data, flag); 387 break; 388 default: 389 printk("osf_mount(%ld, %x)\n", typenr, flag); 390 } 391 putname(name); 392 out: 393 return retval; 394 } 395 396 SYSCALL_DEFINE1(osf_utsname, char __user *, name) 397 { 398 int error; 399 400 down_read(&uts_sem); 401 error = -EFAULT; 402 if (copy_to_user(name + 0, utsname()->sysname, 32)) 403 goto out; 404 if (copy_to_user(name + 32, utsname()->nodename, 32)) 405 goto out; 406 if (copy_to_user(name + 64, utsname()->release, 32)) 407 goto out; 408 if (copy_to_user(name + 96, utsname()->version, 32)) 409 goto out; 410 if (copy_to_user(name + 128, utsname()->machine, 32)) 411 goto out; 412 413 error = 0; 414 out: 415 up_read(&uts_sem); 416 return error; 417 } 418 419 SYSCALL_DEFINE0(getpagesize) 420 { 421 return PAGE_SIZE; 422 } 423 424 SYSCALL_DEFINE0(getdtablesize) 425 { 426 return sysctl_nr_open; 427 } 428 429 /* 430 * For compatibility with OSF/1 only. Use utsname(2) instead. 431 */ 432 SYSCALL_DEFINE2(osf_getdomainname, char __user *, name, int, namelen) 433 { 434 unsigned len; 435 int i; 436 437 if (!access_ok(VERIFY_WRITE, name, namelen)) 438 return -EFAULT; 439 440 len = namelen; 441 if (namelen > 32) 442 len = 32; 443 444 down_read(&uts_sem); 445 for (i = 0; i < len; ++i) { 446 __put_user(utsname()->domainname[i], name + i); 447 if (utsname()->domainname[i] == '\0') 448 break; 449 } 450 up_read(&uts_sem); 451 452 return 0; 453 } 454 455 /* 456 * The following stuff should move into a header file should it ever 457 * be labeled "officially supported." Right now, there is just enough 458 * support to avoid applications (such as tar) printing error 459 * messages. The attributes are not really implemented. 460 */ 461 462 /* 463 * Values for Property list entry flag 464 */ 465 #define PLE_PROPAGATE_ON_COPY 0x1 /* cp(1) will copy entry 466 by default */ 467 #define PLE_FLAG_MASK 0x1 /* Valid flag values */ 468 #define PLE_FLAG_ALL -1 /* All flag value */ 469 470 struct proplistname_args { 471 unsigned int pl_mask; 472 unsigned int pl_numnames; 473 char **pl_names; 474 }; 475 476 union pl_args { 477 struct setargs { 478 char __user *path; 479 long follow; 480 long nbytes; 481 char __user *buf; 482 } set; 483 struct fsetargs { 484 long fd; 485 long nbytes; 486 char __user *buf; 487 } fset; 488 struct getargs { 489 char __user *path; 490 long follow; 491 struct proplistname_args __user *name_args; 492 long nbytes; 493 char __user *buf; 494 int __user *min_buf_size; 495 } get; 496 struct fgetargs { 497 long fd; 498 struct proplistname_args __user *name_args; 499 long nbytes; 500 char __user *buf; 501 int __user *min_buf_size; 502 } fget; 503 struct delargs { 504 char __user *path; 505 long follow; 506 struct proplistname_args __user *name_args; 507 } del; 508 struct fdelargs { 509 long fd; 510 struct proplistname_args __user *name_args; 511 } fdel; 512 }; 513 514 enum pl_code { 515 PL_SET = 1, PL_FSET = 2, 516 PL_GET = 3, PL_FGET = 4, 517 PL_DEL = 5, PL_FDEL = 6 518 }; 519 520 SYSCALL_DEFINE2(osf_proplist_syscall, enum pl_code, code, 521 union pl_args __user *, args) 522 { 523 long error; 524 int __user *min_buf_size_ptr; 525 526 lock_kernel(); 527 switch (code) { 528 case PL_SET: 529 if (get_user(error, &args->set.nbytes)) 530 error = -EFAULT; 531 break; 532 case PL_FSET: 533 if (get_user(error, &args->fset.nbytes)) 534 error = -EFAULT; 535 break; 536 case PL_GET: 537 error = get_user(min_buf_size_ptr, &args->get.min_buf_size); 538 if (error) 539 break; 540 error = put_user(0, min_buf_size_ptr); 541 break; 542 case PL_FGET: 543 error = get_user(min_buf_size_ptr, &args->fget.min_buf_size); 544 if (error) 545 break; 546 error = put_user(0, min_buf_size_ptr); 547 break; 548 case PL_DEL: 549 case PL_FDEL: 550 error = 0; 551 break; 552 default: 553 error = -EOPNOTSUPP; 554 break; 555 }; 556 unlock_kernel(); 557 return error; 558 } 559 560 SYSCALL_DEFINE2(osf_sigstack, struct sigstack __user *, uss, 561 struct sigstack __user *, uoss) 562 { 563 unsigned long usp = rdusp(); 564 unsigned long oss_sp = current->sas_ss_sp + current->sas_ss_size; 565 unsigned long oss_os = on_sig_stack(usp); 566 int error; 567 568 if (uss) { 569 void __user *ss_sp; 570 571 error = -EFAULT; 572 if (get_user(ss_sp, &uss->ss_sp)) 573 goto out; 574 575 /* If the current stack was set with sigaltstack, don't 576 swap stacks while we are on it. */ 577 error = -EPERM; 578 if (current->sas_ss_sp && on_sig_stack(usp)) 579 goto out; 580 581 /* Since we don't know the extent of the stack, and we don't 582 track onstack-ness, but rather calculate it, we must 583 presume a size. Ho hum this interface is lossy. */ 584 current->sas_ss_sp = (unsigned long)ss_sp - SIGSTKSZ; 585 current->sas_ss_size = SIGSTKSZ; 586 } 587 588 if (uoss) { 589 error = -EFAULT; 590 if (! access_ok(VERIFY_WRITE, uoss, sizeof(*uoss)) 591 || __put_user(oss_sp, &uoss->ss_sp) 592 || __put_user(oss_os, &uoss->ss_onstack)) 593 goto out; 594 } 595 596 error = 0; 597 out: 598 return error; 599 } 600 601 SYSCALL_DEFINE3(osf_sysinfo, int, command, char __user *, buf, long, count) 602 { 603 char *sysinfo_table[] = { 604 utsname()->sysname, 605 utsname()->nodename, 606 utsname()->release, 607 utsname()->version, 608 utsname()->machine, 609 "alpha", /* instruction set architecture */ 610 "dummy", /* hardware serial number */ 611 "dummy", /* hardware manufacturer */ 612 "dummy", /* secure RPC domain */ 613 }; 614 unsigned long offset; 615 char *res; 616 long len, err = -EINVAL; 617 618 offset = command-1; 619 if (offset >= ARRAY_SIZE(sysinfo_table)) { 620 /* Digital UNIX has a few unpublished interfaces here */ 621 printk("sysinfo(%d)", command); 622 goto out; 623 } 624 625 down_read(&uts_sem); 626 res = sysinfo_table[offset]; 627 len = strlen(res)+1; 628 if (len > count) 629 len = count; 630 if (copy_to_user(buf, res, len)) 631 err = -EFAULT; 632 else 633 err = 0; 634 up_read(&uts_sem); 635 out: 636 return err; 637 } 638 639 SYSCALL_DEFINE5(osf_getsysinfo, unsigned long, op, void __user *, buffer, 640 unsigned long, nbytes, int __user *, start, void __user *, arg) 641 { 642 unsigned long w; 643 struct percpu_struct *cpu; 644 645 switch (op) { 646 case GSI_IEEE_FP_CONTROL: 647 /* Return current software fp control & status bits. */ 648 /* Note that DU doesn't verify available space here. */ 649 650 w = current_thread_info()->ieee_state & IEEE_SW_MASK; 651 w = swcr_update_status(w, rdfpcr()); 652 if (put_user(w, (unsigned long __user *) buffer)) 653 return -EFAULT; 654 return 0; 655 656 case GSI_IEEE_STATE_AT_SIGNAL: 657 /* 658 * Not sure anybody will ever use this weird stuff. These 659 * ops can be used (under OSF/1) to set the fpcr that should 660 * be used when a signal handler starts executing. 661 */ 662 break; 663 664 case GSI_UACPROC: 665 if (nbytes < sizeof(unsigned int)) 666 return -EINVAL; 667 w = (current_thread_info()->flags >> UAC_SHIFT) & UAC_BITMASK; 668 if (put_user(w, (unsigned int __user *)buffer)) 669 return -EFAULT; 670 return 1; 671 672 case GSI_PROC_TYPE: 673 if (nbytes < sizeof(unsigned long)) 674 return -EINVAL; 675 cpu = (struct percpu_struct*) 676 ((char*)hwrpb + hwrpb->processor_offset); 677 w = cpu->type; 678 if (put_user(w, (unsigned long __user*)buffer)) 679 return -EFAULT; 680 return 1; 681 682 case GSI_GET_HWRPB: 683 if (nbytes < sizeof(*hwrpb)) 684 return -EINVAL; 685 if (copy_to_user(buffer, hwrpb, nbytes) != 0) 686 return -EFAULT; 687 return 1; 688 689 default: 690 break; 691 } 692 693 return -EOPNOTSUPP; 694 } 695 696 SYSCALL_DEFINE5(osf_setsysinfo, unsigned long, op, void __user *, buffer, 697 unsigned long, nbytes, int __user *, start, void __user *, arg) 698 { 699 switch (op) { 700 case SSI_IEEE_FP_CONTROL: { 701 unsigned long swcr, fpcr; 702 unsigned int *state; 703 704 /* 705 * Alpha Architecture Handbook 4.7.7.3: 706 * To be fully IEEE compiant, we must track the current IEEE 707 * exception state in software, because spurious bits can be 708 * set in the trap shadow of a software-complete insn. 709 */ 710 711 if (get_user(swcr, (unsigned long __user *)buffer)) 712 return -EFAULT; 713 state = ¤t_thread_info()->ieee_state; 714 715 /* Update softare trap enable bits. */ 716 *state = (*state & ~IEEE_SW_MASK) | (swcr & IEEE_SW_MASK); 717 718 /* Update the real fpcr. */ 719 fpcr = rdfpcr() & FPCR_DYN_MASK; 720 fpcr |= ieee_swcr_to_fpcr(swcr); 721 wrfpcr(fpcr); 722 723 return 0; 724 } 725 726 case SSI_IEEE_RAISE_EXCEPTION: { 727 unsigned long exc, swcr, fpcr, fex; 728 unsigned int *state; 729 730 if (get_user(exc, (unsigned long __user *)buffer)) 731 return -EFAULT; 732 state = ¤t_thread_info()->ieee_state; 733 exc &= IEEE_STATUS_MASK; 734 735 /* Update softare trap enable bits. */ 736 swcr = (*state & IEEE_SW_MASK) | exc; 737 *state |= exc; 738 739 /* Update the real fpcr. */ 740 fpcr = rdfpcr(); 741 fpcr |= ieee_swcr_to_fpcr(swcr); 742 wrfpcr(fpcr); 743 744 /* If any exceptions set by this call, and are unmasked, 745 send a signal. Old exceptions are not signaled. */ 746 fex = (exc >> IEEE_STATUS_TO_EXCSUM_SHIFT) & swcr; 747 if (fex) { 748 siginfo_t info; 749 int si_code = 0; 750 751 if (fex & IEEE_TRAP_ENABLE_DNO) si_code = FPE_FLTUND; 752 if (fex & IEEE_TRAP_ENABLE_INE) si_code = FPE_FLTRES; 753 if (fex & IEEE_TRAP_ENABLE_UNF) si_code = FPE_FLTUND; 754 if (fex & IEEE_TRAP_ENABLE_OVF) si_code = FPE_FLTOVF; 755 if (fex & IEEE_TRAP_ENABLE_DZE) si_code = FPE_FLTDIV; 756 if (fex & IEEE_TRAP_ENABLE_INV) si_code = FPE_FLTINV; 757 758 info.si_signo = SIGFPE; 759 info.si_errno = 0; 760 info.si_code = si_code; 761 info.si_addr = NULL; /* FIXME */ 762 send_sig_info(SIGFPE, &info, current); 763 } 764 return 0; 765 } 766 767 case SSI_IEEE_STATE_AT_SIGNAL: 768 case SSI_IEEE_IGNORE_STATE_AT_SIGNAL: 769 /* 770 * Not sure anybody will ever use this weird stuff. These 771 * ops can be used (under OSF/1) to set the fpcr that should 772 * be used when a signal handler starts executing. 773 */ 774 break; 775 776 case SSI_NVPAIRS: { 777 unsigned long v, w, i; 778 unsigned int old, new; 779 780 for (i = 0; i < nbytes; ++i) { 781 782 if (get_user(v, 2*i + (unsigned int __user *)buffer)) 783 return -EFAULT; 784 if (get_user(w, 2*i + 1 + (unsigned int __user *)buffer)) 785 return -EFAULT; 786 switch (v) { 787 case SSIN_UACPROC: 788 again: 789 old = current_thread_info()->flags; 790 new = old & ~(UAC_BITMASK << UAC_SHIFT); 791 new = new | (w & UAC_BITMASK) << UAC_SHIFT; 792 if (cmpxchg(¤t_thread_info()->flags, 793 old, new) != old) 794 goto again; 795 break; 796 797 default: 798 return -EOPNOTSUPP; 799 } 800 } 801 return 0; 802 } 803 804 default: 805 break; 806 } 807 808 return -EOPNOTSUPP; 809 } 810 811 /* Translations due to the fact that OSF's time_t is an int. Which 812 affects all sorts of things, like timeval and itimerval. */ 813 814 extern struct timezone sys_tz; 815 816 struct timeval32 817 { 818 int tv_sec, tv_usec; 819 }; 820 821 struct itimerval32 822 { 823 struct timeval32 it_interval; 824 struct timeval32 it_value; 825 }; 826 827 static inline long 828 get_tv32(struct timeval *o, struct timeval32 __user *i) 829 { 830 return (!access_ok(VERIFY_READ, i, sizeof(*i)) || 831 (__get_user(o->tv_sec, &i->tv_sec) | 832 __get_user(o->tv_usec, &i->tv_usec))); 833 } 834 835 static inline long 836 put_tv32(struct timeval32 __user *o, struct timeval *i) 837 { 838 return (!access_ok(VERIFY_WRITE, o, sizeof(*o)) || 839 (__put_user(i->tv_sec, &o->tv_sec) | 840 __put_user(i->tv_usec, &o->tv_usec))); 841 } 842 843 static inline long 844 get_it32(struct itimerval *o, struct itimerval32 __user *i) 845 { 846 return (!access_ok(VERIFY_READ, i, sizeof(*i)) || 847 (__get_user(o->it_interval.tv_sec, &i->it_interval.tv_sec) | 848 __get_user(o->it_interval.tv_usec, &i->it_interval.tv_usec) | 849 __get_user(o->it_value.tv_sec, &i->it_value.tv_sec) | 850 __get_user(o->it_value.tv_usec, &i->it_value.tv_usec))); 851 } 852 853 static inline long 854 put_it32(struct itimerval32 __user *o, struct itimerval *i) 855 { 856 return (!access_ok(VERIFY_WRITE, o, sizeof(*o)) || 857 (__put_user(i->it_interval.tv_sec, &o->it_interval.tv_sec) | 858 __put_user(i->it_interval.tv_usec, &o->it_interval.tv_usec) | 859 __put_user(i->it_value.tv_sec, &o->it_value.tv_sec) | 860 __put_user(i->it_value.tv_usec, &o->it_value.tv_usec))); 861 } 862 863 static inline void 864 jiffies_to_timeval32(unsigned long jiffies, struct timeval32 *value) 865 { 866 value->tv_usec = (jiffies % HZ) * (1000000L / HZ); 867 value->tv_sec = jiffies / HZ; 868 } 869 870 SYSCALL_DEFINE2(osf_gettimeofday, struct timeval32 __user *, tv, 871 struct timezone __user *, tz) 872 { 873 if (tv) { 874 struct timeval ktv; 875 do_gettimeofday(&ktv); 876 if (put_tv32(tv, &ktv)) 877 return -EFAULT; 878 } 879 if (tz) { 880 if (copy_to_user(tz, &sys_tz, sizeof(sys_tz))) 881 return -EFAULT; 882 } 883 return 0; 884 } 885 886 SYSCALL_DEFINE2(osf_settimeofday, struct timeval32 __user *, tv, 887 struct timezone __user *, tz) 888 { 889 struct timespec kts; 890 struct timezone ktz; 891 892 if (tv) { 893 if (get_tv32((struct timeval *)&kts, tv)) 894 return -EFAULT; 895 } 896 if (tz) { 897 if (copy_from_user(&ktz, tz, sizeof(*tz))) 898 return -EFAULT; 899 } 900 901 kts.tv_nsec *= 1000; 902 903 return do_sys_settimeofday(tv ? &kts : NULL, tz ? &ktz : NULL); 904 } 905 906 SYSCALL_DEFINE2(osf_getitimer, int, which, struct itimerval32 __user *, it) 907 { 908 struct itimerval kit; 909 int error; 910 911 error = do_getitimer(which, &kit); 912 if (!error && put_it32(it, &kit)) 913 error = -EFAULT; 914 915 return error; 916 } 917 918 SYSCALL_DEFINE3(osf_setitimer, int, which, struct itimerval32 __user *, in, 919 struct itimerval32 __user *, out) 920 { 921 struct itimerval kin, kout; 922 int error; 923 924 if (in) { 925 if (get_it32(&kin, in)) 926 return -EFAULT; 927 } else 928 memset(&kin, 0, sizeof(kin)); 929 930 error = do_setitimer(which, &kin, out ? &kout : NULL); 931 if (error || !out) 932 return error; 933 934 if (put_it32(out, &kout)) 935 return -EFAULT; 936 937 return 0; 938 939 } 940 941 SYSCALL_DEFINE2(osf_utimes, char __user *, filename, 942 struct timeval32 __user *, tvs) 943 { 944 struct timespec tv[2]; 945 946 if (tvs) { 947 struct timeval ktvs[2]; 948 if (get_tv32(&ktvs[0], &tvs[0]) || 949 get_tv32(&ktvs[1], &tvs[1])) 950 return -EFAULT; 951 952 if (ktvs[0].tv_usec < 0 || ktvs[0].tv_usec >= 1000000 || 953 ktvs[1].tv_usec < 0 || ktvs[1].tv_usec >= 1000000) 954 return -EINVAL; 955 956 tv[0].tv_sec = ktvs[0].tv_sec; 957 tv[0].tv_nsec = 1000 * ktvs[0].tv_usec; 958 tv[1].tv_sec = ktvs[1].tv_sec; 959 tv[1].tv_nsec = 1000 * ktvs[1].tv_usec; 960 } 961 962 return do_utimes(AT_FDCWD, filename, tvs ? tv : NULL, 0); 963 } 964 965 #define MAX_SELECT_SECONDS \ 966 ((unsigned long) (MAX_SCHEDULE_TIMEOUT / HZ)-1) 967 968 SYSCALL_DEFINE5(osf_select, int, n, fd_set __user *, inp, fd_set __user *, outp, 969 fd_set __user *, exp, struct timeval32 __user *, tvp) 970 { 971 struct timespec end_time, *to = NULL; 972 if (tvp) { 973 time_t sec, usec; 974 975 to = &end_time; 976 977 if (!access_ok(VERIFY_READ, tvp, sizeof(*tvp)) 978 || __get_user(sec, &tvp->tv_sec) 979 || __get_user(usec, &tvp->tv_usec)) { 980 return -EFAULT; 981 } 982 983 if (sec < 0 || usec < 0) 984 return -EINVAL; 985 986 if (poll_select_set_timeout(to, sec, usec * NSEC_PER_USEC)) 987 return -EINVAL; 988 989 } 990 991 /* OSF does not copy back the remaining time. */ 992 return core_sys_select(n, inp, outp, exp, to); 993 } 994 995 struct rusage32 { 996 struct timeval32 ru_utime; /* user time used */ 997 struct timeval32 ru_stime; /* system time used */ 998 long ru_maxrss; /* maximum resident set size */ 999 long ru_ixrss; /* integral shared memory size */ 1000 long ru_idrss; /* integral unshared data size */ 1001 long ru_isrss; /* integral unshared stack size */ 1002 long ru_minflt; /* page reclaims */ 1003 long ru_majflt; /* page faults */ 1004 long ru_nswap; /* swaps */ 1005 long ru_inblock; /* block input operations */ 1006 long ru_oublock; /* block output operations */ 1007 long ru_msgsnd; /* messages sent */ 1008 long ru_msgrcv; /* messages received */ 1009 long ru_nsignals; /* signals received */ 1010 long ru_nvcsw; /* voluntary context switches */ 1011 long ru_nivcsw; /* involuntary " */ 1012 }; 1013 1014 SYSCALL_DEFINE2(osf_getrusage, int, who, struct rusage32 __user *, ru) 1015 { 1016 struct rusage32 r; 1017 1018 if (who != RUSAGE_SELF && who != RUSAGE_CHILDREN) 1019 return -EINVAL; 1020 1021 memset(&r, 0, sizeof(r)); 1022 switch (who) { 1023 case RUSAGE_SELF: 1024 jiffies_to_timeval32(current->utime, &r.ru_utime); 1025 jiffies_to_timeval32(current->stime, &r.ru_stime); 1026 r.ru_minflt = current->min_flt; 1027 r.ru_majflt = current->maj_flt; 1028 break; 1029 case RUSAGE_CHILDREN: 1030 jiffies_to_timeval32(current->signal->cutime, &r.ru_utime); 1031 jiffies_to_timeval32(current->signal->cstime, &r.ru_stime); 1032 r.ru_minflt = current->signal->cmin_flt; 1033 r.ru_majflt = current->signal->cmaj_flt; 1034 break; 1035 } 1036 1037 return copy_to_user(ru, &r, sizeof(r)) ? -EFAULT : 0; 1038 } 1039 1040 SYSCALL_DEFINE4(osf_wait4, pid_t, pid, int __user *, ustatus, int, options, 1041 struct rusage32 __user *, ur) 1042 { 1043 struct rusage r; 1044 long ret, err; 1045 mm_segment_t old_fs; 1046 1047 if (!ur) 1048 return sys_wait4(pid, ustatus, options, NULL); 1049 1050 old_fs = get_fs(); 1051 1052 set_fs (KERNEL_DS); 1053 ret = sys_wait4(pid, ustatus, options, (struct rusage __user *) &r); 1054 set_fs (old_fs); 1055 1056 if (!access_ok(VERIFY_WRITE, ur, sizeof(*ur))) 1057 return -EFAULT; 1058 1059 err = 0; 1060 err |= __put_user(r.ru_utime.tv_sec, &ur->ru_utime.tv_sec); 1061 err |= __put_user(r.ru_utime.tv_usec, &ur->ru_utime.tv_usec); 1062 err |= __put_user(r.ru_stime.tv_sec, &ur->ru_stime.tv_sec); 1063 err |= __put_user(r.ru_stime.tv_usec, &ur->ru_stime.tv_usec); 1064 err |= __put_user(r.ru_maxrss, &ur->ru_maxrss); 1065 err |= __put_user(r.ru_ixrss, &ur->ru_ixrss); 1066 err |= __put_user(r.ru_idrss, &ur->ru_idrss); 1067 err |= __put_user(r.ru_isrss, &ur->ru_isrss); 1068 err |= __put_user(r.ru_minflt, &ur->ru_minflt); 1069 err |= __put_user(r.ru_majflt, &ur->ru_majflt); 1070 err |= __put_user(r.ru_nswap, &ur->ru_nswap); 1071 err |= __put_user(r.ru_inblock, &ur->ru_inblock); 1072 err |= __put_user(r.ru_oublock, &ur->ru_oublock); 1073 err |= __put_user(r.ru_msgsnd, &ur->ru_msgsnd); 1074 err |= __put_user(r.ru_msgrcv, &ur->ru_msgrcv); 1075 err |= __put_user(r.ru_nsignals, &ur->ru_nsignals); 1076 err |= __put_user(r.ru_nvcsw, &ur->ru_nvcsw); 1077 err |= __put_user(r.ru_nivcsw, &ur->ru_nivcsw); 1078 1079 return err ? err : ret; 1080 } 1081 1082 /* 1083 * I don't know what the parameters are: the first one 1084 * seems to be a timeval pointer, and I suspect the second 1085 * one is the time remaining.. Ho humm.. No documentation. 1086 */ 1087 SYSCALL_DEFINE2(osf_usleep_thread, struct timeval32 __user *, sleep, 1088 struct timeval32 __user *, remain) 1089 { 1090 struct timeval tmp; 1091 unsigned long ticks; 1092 1093 if (get_tv32(&tmp, sleep)) 1094 goto fault; 1095 1096 ticks = timeval_to_jiffies(&tmp); 1097 1098 ticks = schedule_timeout_interruptible(ticks); 1099 1100 if (remain) { 1101 jiffies_to_timeval(ticks, &tmp); 1102 if (put_tv32(remain, &tmp)) 1103 goto fault; 1104 } 1105 1106 return 0; 1107 fault: 1108 return -EFAULT; 1109 } 1110 1111 1112 struct timex32 { 1113 unsigned int modes; /* mode selector */ 1114 long offset; /* time offset (usec) */ 1115 long freq; /* frequency offset (scaled ppm) */ 1116 long maxerror; /* maximum error (usec) */ 1117 long esterror; /* estimated error (usec) */ 1118 int status; /* clock command/status */ 1119 long constant; /* pll time constant */ 1120 long precision; /* clock precision (usec) (read only) */ 1121 long tolerance; /* clock frequency tolerance (ppm) 1122 * (read only) 1123 */ 1124 struct timeval32 time; /* (read only) */ 1125 long tick; /* (modified) usecs between clock ticks */ 1126 1127 long ppsfreq; /* pps frequency (scaled ppm) (ro) */ 1128 long jitter; /* pps jitter (us) (ro) */ 1129 int shift; /* interval duration (s) (shift) (ro) */ 1130 long stabil; /* pps stability (scaled ppm) (ro) */ 1131 long jitcnt; /* jitter limit exceeded (ro) */ 1132 long calcnt; /* calibration intervals (ro) */ 1133 long errcnt; /* calibration errors (ro) */ 1134 long stbcnt; /* stability limit exceeded (ro) */ 1135 1136 int :32; int :32; int :32; int :32; 1137 int :32; int :32; int :32; int :32; 1138 int :32; int :32; int :32; int :32; 1139 }; 1140 1141 SYSCALL_DEFINE1(old_adjtimex, struct timex32 __user *, txc_p) 1142 { 1143 struct timex txc; 1144 int ret; 1145 1146 /* copy relevant bits of struct timex. */ 1147 if (copy_from_user(&txc, txc_p, offsetof(struct timex32, time)) || 1148 copy_from_user(&txc.tick, &txc_p->tick, sizeof(struct timex32) - 1149 offsetof(struct timex32, time))) 1150 return -EFAULT; 1151 1152 ret = do_adjtimex(&txc); 1153 if (ret < 0) 1154 return ret; 1155 1156 /* copy back to timex32 */ 1157 if (copy_to_user(txc_p, &txc, offsetof(struct timex32, time)) || 1158 (copy_to_user(&txc_p->tick, &txc.tick, sizeof(struct timex32) - 1159 offsetof(struct timex32, tick))) || 1160 (put_tv32(&txc_p->time, &txc.time))) 1161 return -EFAULT; 1162 1163 return ret; 1164 } 1165 1166 /* Get an address range which is currently unmapped. Similar to the 1167 generic version except that we know how to honor ADDR_LIMIT_32BIT. */ 1168 1169 static unsigned long 1170 arch_get_unmapped_area_1(unsigned long addr, unsigned long len, 1171 unsigned long limit) 1172 { 1173 struct vm_area_struct *vma = find_vma(current->mm, addr); 1174 1175 while (1) { 1176 /* At this point: (!vma || addr < vma->vm_end). */ 1177 if (limit - len < addr) 1178 return -ENOMEM; 1179 if (!vma || addr + len <= vma->vm_start) 1180 return addr; 1181 addr = vma->vm_end; 1182 vma = vma->vm_next; 1183 } 1184 } 1185 1186 unsigned long 1187 arch_get_unmapped_area(struct file *filp, unsigned long addr, 1188 unsigned long len, unsigned long pgoff, 1189 unsigned long flags) 1190 { 1191 unsigned long limit; 1192 1193 /* "32 bit" actually means 31 bit, since pointers sign extend. */ 1194 if (current->personality & ADDR_LIMIT_32BIT) 1195 limit = 0x80000000; 1196 else 1197 limit = TASK_SIZE; 1198 1199 if (len > limit) 1200 return -ENOMEM; 1201 1202 if (flags & MAP_FIXED) 1203 return addr; 1204 1205 /* First, see if the given suggestion fits. 1206 1207 The OSF/1 loader (/sbin/loader) relies on us returning an 1208 address larger than the requested if one exists, which is 1209 a terribly broken way to program. 1210 1211 That said, I can see the use in being able to suggest not 1212 merely specific addresses, but regions of memory -- perhaps 1213 this feature should be incorporated into all ports? */ 1214 1215 if (addr) { 1216 addr = arch_get_unmapped_area_1 (PAGE_ALIGN(addr), len, limit); 1217 if (addr != (unsigned long) -ENOMEM) 1218 return addr; 1219 } 1220 1221 /* Next, try allocating at TASK_UNMAPPED_BASE. */ 1222 addr = arch_get_unmapped_area_1 (PAGE_ALIGN(TASK_UNMAPPED_BASE), 1223 len, limit); 1224 if (addr != (unsigned long) -ENOMEM) 1225 return addr; 1226 1227 /* Finally, try allocating in low memory. */ 1228 addr = arch_get_unmapped_area_1 (PAGE_SIZE, len, limit); 1229 1230 return addr; 1231 } 1232 1233 #ifdef CONFIG_OSF4_COMPAT 1234 1235 /* Clear top 32 bits of iov_len in the user's buffer for 1236 compatibility with old versions of OSF/1 where iov_len 1237 was defined as int. */ 1238 static int 1239 osf_fix_iov_len(const struct iovec __user *iov, unsigned long count) 1240 { 1241 unsigned long i; 1242 1243 for (i = 0 ; i < count ; i++) { 1244 int __user *iov_len_high = (int __user *)&iov[i].iov_len + 1; 1245 1246 if (put_user(0, iov_len_high)) 1247 return -EFAULT; 1248 } 1249 return 0; 1250 } 1251 1252 SYSCALL_DEFINE3(osf_readv, unsigned long, fd, 1253 const struct iovec __user *, vector, unsigned long, count) 1254 { 1255 if (unlikely(personality(current->personality) == PER_OSF4)) 1256 if (osf_fix_iov_len(vector, count)) 1257 return -EFAULT; 1258 return sys_readv(fd, vector, count); 1259 } 1260 1261 SYSCALL_DEFINE3(osf_writev, unsigned long, fd, 1262 const struct iovec __user *, vector, unsigned long, count) 1263 { 1264 if (unlikely(personality(current->personality) == PER_OSF4)) 1265 if (osf_fix_iov_len(vector, count)) 1266 return -EFAULT; 1267 return sys_writev(fd, vector, count); 1268 } 1269 1270 #endif 1271