1 /* 2 * linux/arch/alpha/kernel/osf_sys.c 3 * 4 * Copyright (C) 1995 Linus Torvalds 5 */ 6 7 /* 8 * This file handles some of the stranger OSF/1 system call interfaces. 9 * Some of the system calls expect a non-C calling standard, others have 10 * special parameter blocks.. 11 */ 12 13 #include <linux/errno.h> 14 #include <linux/sched.h> 15 #include <linux/kernel.h> 16 #include <linux/mm.h> 17 #include <linux/smp.h> 18 #include <linux/smp_lock.h> 19 #include <linux/stddef.h> 20 #include <linux/syscalls.h> 21 #include <linux/unistd.h> 22 #include <linux/ptrace.h> 23 #include <linux/user.h> 24 #include <linux/utsname.h> 25 #include <linux/time.h> 26 #include <linux/timex.h> 27 #include <linux/major.h> 28 #include <linux/stat.h> 29 #include <linux/mman.h> 30 #include <linux/shm.h> 31 #include <linux/poll.h> 32 #include <linux/file.h> 33 #include <linux/types.h> 34 #include <linux/ipc.h> 35 #include <linux/namei.h> 36 #include <linux/uio.h> 37 #include <linux/vfs.h> 38 #include <linux/rcupdate.h> 39 #include <linux/slab.h> 40 41 #include <asm/fpu.h> 42 #include <asm/io.h> 43 #include <asm/uaccess.h> 44 #include <asm/system.h> 45 #include <asm/sysinfo.h> 46 #include <asm/hwrpb.h> 47 #include <asm/processor.h> 48 49 /* 50 * Brk needs to return an error. Still support Linux's brk(0) query idiom, 51 * which OSF programs just shouldn't be doing. We're still not quite 52 * identical to OSF as we don't return 0 on success, but doing otherwise 53 * would require changes to libc. Hopefully this is good enough. 54 */ 55 SYSCALL_DEFINE1(osf_brk, unsigned long, brk) 56 { 57 unsigned long retval = sys_brk(brk); 58 if (brk && brk != retval) 59 retval = -ENOMEM; 60 return retval; 61 } 62 63 /* 64 * This is pure guess-work.. 65 */ 66 SYSCALL_DEFINE4(osf_set_program_attributes, unsigned long, text_start, 67 unsigned long, text_len, unsigned long, bss_start, 68 unsigned long, bss_len) 69 { 70 struct mm_struct *mm; 71 72 lock_kernel(); 73 mm = current->mm; 74 mm->end_code = bss_start + bss_len; 75 mm->start_brk = bss_start + bss_len; 76 mm->brk = bss_start + bss_len; 77 #if 0 78 printk("set_program_attributes(%lx %lx %lx %lx)\n", 79 text_start, text_len, bss_start, bss_len); 80 #endif 81 unlock_kernel(); 82 return 0; 83 } 84 85 /* 86 * OSF/1 directory handling functions... 87 * 88 * The "getdents()" interface is much more sane: the "basep" stuff is 89 * braindamage (it can't really handle filesystems where the directory 90 * offset differences aren't the same as "d_reclen"). 91 */ 92 #define NAME_OFFSET offsetof (struct osf_dirent, d_name) 93 94 struct osf_dirent { 95 unsigned int d_ino; 96 unsigned short d_reclen; 97 unsigned short d_namlen; 98 char d_name[1]; 99 }; 100 101 struct osf_dirent_callback { 102 struct osf_dirent __user *dirent; 103 long __user *basep; 104 unsigned int count; 105 int error; 106 }; 107 108 static int 109 osf_filldir(void *__buf, const char *name, int namlen, loff_t offset, 110 u64 ino, unsigned int d_type) 111 { 112 struct osf_dirent __user *dirent; 113 struct osf_dirent_callback *buf = (struct osf_dirent_callback *) __buf; 114 unsigned int reclen = ALIGN(NAME_OFFSET + namlen + 1, sizeof(u32)); 115 unsigned int d_ino; 116 117 buf->error = -EINVAL; /* only used if we fail */ 118 if (reclen > buf->count) 119 return -EINVAL; 120 d_ino = ino; 121 if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) { 122 buf->error = -EOVERFLOW; 123 return -EOVERFLOW; 124 } 125 if (buf->basep) { 126 if (put_user(offset, buf->basep)) 127 goto Efault; 128 buf->basep = NULL; 129 } 130 dirent = buf->dirent; 131 if (put_user(d_ino, &dirent->d_ino) || 132 put_user(namlen, &dirent->d_namlen) || 133 put_user(reclen, &dirent->d_reclen) || 134 copy_to_user(dirent->d_name, name, namlen) || 135 put_user(0, dirent->d_name + namlen)) 136 goto Efault; 137 dirent = (void __user *)dirent + reclen; 138 buf->dirent = dirent; 139 buf->count -= reclen; 140 return 0; 141 Efault: 142 buf->error = -EFAULT; 143 return -EFAULT; 144 } 145 146 SYSCALL_DEFINE4(osf_getdirentries, unsigned int, fd, 147 struct osf_dirent __user *, dirent, unsigned int, count, 148 long __user *, basep) 149 { 150 int error; 151 struct file *file; 152 struct osf_dirent_callback buf; 153 154 error = -EBADF; 155 file = fget(fd); 156 if (!file) 157 goto out; 158 159 buf.dirent = dirent; 160 buf.basep = basep; 161 buf.count = count; 162 buf.error = 0; 163 164 error = vfs_readdir(file, osf_filldir, &buf); 165 if (error >= 0) 166 error = buf.error; 167 if (count != buf.count) 168 error = count - buf.count; 169 170 fput(file); 171 out: 172 return error; 173 } 174 175 #undef NAME_OFFSET 176 177 SYSCALL_DEFINE6(osf_mmap, unsigned long, addr, unsigned long, len, 178 unsigned long, prot, unsigned long, flags, unsigned long, fd, 179 unsigned long, off) 180 { 181 unsigned long ret = -EINVAL; 182 183 #if 0 184 if (flags & (_MAP_HASSEMAPHORE | _MAP_INHERIT | _MAP_UNALIGNED)) 185 printk("%s: unimplemented OSF mmap flags %04lx\n", 186 current->comm, flags); 187 #endif 188 if ((off + PAGE_ALIGN(len)) < off) 189 goto out; 190 if (off & ~PAGE_MASK) 191 goto out; 192 ret = sys_mmap_pgoff(addr, len, prot, flags, fd, off >> PAGE_SHIFT); 193 out: 194 return ret; 195 } 196 197 198 /* 199 * The OSF/1 statfs structure is much larger, but this should 200 * match the beginning, at least. 201 */ 202 struct osf_statfs { 203 short f_type; 204 short f_flags; 205 int f_fsize; 206 int f_bsize; 207 int f_blocks; 208 int f_bfree; 209 int f_bavail; 210 int f_files; 211 int f_ffree; 212 __kernel_fsid_t f_fsid; 213 }; 214 215 static int 216 linux_to_osf_statfs(struct kstatfs *linux_stat, struct osf_statfs __user *osf_stat, 217 unsigned long bufsiz) 218 { 219 struct osf_statfs tmp_stat; 220 221 tmp_stat.f_type = linux_stat->f_type; 222 tmp_stat.f_flags = 0; /* mount flags */ 223 tmp_stat.f_fsize = linux_stat->f_frsize; 224 tmp_stat.f_bsize = linux_stat->f_bsize; 225 tmp_stat.f_blocks = linux_stat->f_blocks; 226 tmp_stat.f_bfree = linux_stat->f_bfree; 227 tmp_stat.f_bavail = linux_stat->f_bavail; 228 tmp_stat.f_files = linux_stat->f_files; 229 tmp_stat.f_ffree = linux_stat->f_ffree; 230 tmp_stat.f_fsid = linux_stat->f_fsid; 231 if (bufsiz > sizeof(tmp_stat)) 232 bufsiz = sizeof(tmp_stat); 233 return copy_to_user(osf_stat, &tmp_stat, bufsiz) ? -EFAULT : 0; 234 } 235 236 static int 237 do_osf_statfs(struct path *path, struct osf_statfs __user *buffer, 238 unsigned long bufsiz) 239 { 240 struct kstatfs linux_stat; 241 int error = vfs_statfs(path, &linux_stat); 242 if (!error) 243 error = linux_to_osf_statfs(&linux_stat, buffer, bufsiz); 244 return error; 245 } 246 247 SYSCALL_DEFINE3(osf_statfs, const char __user *, pathname, 248 struct osf_statfs __user *, buffer, unsigned long, bufsiz) 249 { 250 struct path path; 251 int retval; 252 253 retval = user_path(pathname, &path); 254 if (!retval) { 255 retval = do_osf_statfs(&path buffer, bufsiz); 256 path_put(&path); 257 } 258 return retval; 259 } 260 261 SYSCALL_DEFINE3(osf_fstatfs, unsigned long, fd, 262 struct osf_statfs __user *, buffer, unsigned long, bufsiz) 263 { 264 struct file *file; 265 int retval; 266 267 retval = -EBADF; 268 file = fget(fd); 269 if (file) { 270 retval = do_osf_statfs(&file->f_path, buffer, bufsiz); 271 fput(file); 272 } 273 return retval; 274 } 275 276 /* 277 * Uhh.. OSF/1 mount parameters aren't exactly obvious.. 278 * 279 * Although to be frank, neither are the native Linux/i386 ones.. 280 */ 281 struct ufs_args { 282 char __user *devname; 283 int flags; 284 uid_t exroot; 285 }; 286 287 struct cdfs_args { 288 char __user *devname; 289 int flags; 290 uid_t exroot; 291 292 /* This has lots more here, which Linux handles with the option block 293 but I'm too lazy to do the translation into ASCII. */ 294 }; 295 296 struct procfs_args { 297 char __user *devname; 298 int flags; 299 uid_t exroot; 300 }; 301 302 /* 303 * We can't actually handle ufs yet, so we translate UFS mounts to 304 * ext2fs mounts. I wouldn't mind a UFS filesystem, but the UFS 305 * layout is so braindead it's a major headache doing it. 306 * 307 * Just how long ago was it written? OTOH our UFS driver may be still 308 * unhappy with OSF UFS. [CHECKME] 309 */ 310 static int 311 osf_ufs_mount(char *dirname, struct ufs_args __user *args, int flags) 312 { 313 int retval; 314 struct cdfs_args tmp; 315 char *devname; 316 317 retval = -EFAULT; 318 if (copy_from_user(&tmp, args, sizeof(tmp))) 319 goto out; 320 devname = getname(tmp.devname); 321 retval = PTR_ERR(devname); 322 if (IS_ERR(devname)) 323 goto out; 324 retval = do_mount(devname, dirname, "ext2", flags, NULL); 325 putname(devname); 326 out: 327 return retval; 328 } 329 330 static int 331 osf_cdfs_mount(char *dirname, struct cdfs_args __user *args, int flags) 332 { 333 int retval; 334 struct cdfs_args tmp; 335 char *devname; 336 337 retval = -EFAULT; 338 if (copy_from_user(&tmp, args, sizeof(tmp))) 339 goto out; 340 devname = getname(tmp.devname); 341 retval = PTR_ERR(devname); 342 if (IS_ERR(devname)) 343 goto out; 344 retval = do_mount(devname, dirname, "iso9660", flags, NULL); 345 putname(devname); 346 out: 347 return retval; 348 } 349 350 static int 351 osf_procfs_mount(char *dirname, struct procfs_args __user *args, int flags) 352 { 353 struct procfs_args tmp; 354 355 if (copy_from_user(&tmp, args, sizeof(tmp))) 356 return -EFAULT; 357 358 return do_mount("", dirname, "proc", flags, NULL); 359 } 360 361 SYSCALL_DEFINE4(osf_mount, unsigned long, typenr, const char __user *, path, 362 int, flag, void __user *, data) 363 { 364 int retval; 365 char *name; 366 367 name = getname(path); 368 retval = PTR_ERR(name); 369 if (IS_ERR(name)) 370 goto out; 371 switch (typenr) { 372 case 1: 373 retval = osf_ufs_mount(name, data, flag); 374 break; 375 case 6: 376 retval = osf_cdfs_mount(name, data, flag); 377 break; 378 case 9: 379 retval = osf_procfs_mount(name, data, flag); 380 break; 381 default: 382 retval = -EINVAL; 383 printk("osf_mount(%ld, %x)\n", typenr, flag); 384 } 385 putname(name); 386 out: 387 return retval; 388 } 389 390 SYSCALL_DEFINE1(osf_utsname, char __user *, name) 391 { 392 int error; 393 394 down_read(&uts_sem); 395 error = -EFAULT; 396 if (copy_to_user(name + 0, utsname()->sysname, 32)) 397 goto out; 398 if (copy_to_user(name + 32, utsname()->nodename, 32)) 399 goto out; 400 if (copy_to_user(name + 64, utsname()->release, 32)) 401 goto out; 402 if (copy_to_user(name + 96, utsname()->version, 32)) 403 goto out; 404 if (copy_to_user(name + 128, utsname()->machine, 32)) 405 goto out; 406 407 error = 0; 408 out: 409 up_read(&uts_sem); 410 return error; 411 } 412 413 SYSCALL_DEFINE0(getpagesize) 414 { 415 return PAGE_SIZE; 416 } 417 418 SYSCALL_DEFINE0(getdtablesize) 419 { 420 return sysctl_nr_open; 421 } 422 423 /* 424 * For compatibility with OSF/1 only. Use utsname(2) instead. 425 */ 426 SYSCALL_DEFINE2(osf_getdomainname, char __user *, name, int, namelen) 427 { 428 unsigned len; 429 int i; 430 431 if (!access_ok(VERIFY_WRITE, name, namelen)) 432 return -EFAULT; 433 434 len = namelen; 435 if (namelen > 32) 436 len = 32; 437 438 down_read(&uts_sem); 439 for (i = 0; i < len; ++i) { 440 __put_user(utsname()->domainname[i], name + i); 441 if (utsname()->domainname[i] == '\0') 442 break; 443 } 444 up_read(&uts_sem); 445 446 return 0; 447 } 448 449 /* 450 * The following stuff should move into a header file should it ever 451 * be labeled "officially supported." Right now, there is just enough 452 * support to avoid applications (such as tar) printing error 453 * messages. The attributes are not really implemented. 454 */ 455 456 /* 457 * Values for Property list entry flag 458 */ 459 #define PLE_PROPAGATE_ON_COPY 0x1 /* cp(1) will copy entry 460 by default */ 461 #define PLE_FLAG_MASK 0x1 /* Valid flag values */ 462 #define PLE_FLAG_ALL -1 /* All flag value */ 463 464 struct proplistname_args { 465 unsigned int pl_mask; 466 unsigned int pl_numnames; 467 char **pl_names; 468 }; 469 470 union pl_args { 471 struct setargs { 472 char __user *path; 473 long follow; 474 long nbytes; 475 char __user *buf; 476 } set; 477 struct fsetargs { 478 long fd; 479 long nbytes; 480 char __user *buf; 481 } fset; 482 struct getargs { 483 char __user *path; 484 long follow; 485 struct proplistname_args __user *name_args; 486 long nbytes; 487 char __user *buf; 488 int __user *min_buf_size; 489 } get; 490 struct fgetargs { 491 long fd; 492 struct proplistname_args __user *name_args; 493 long nbytes; 494 char __user *buf; 495 int __user *min_buf_size; 496 } fget; 497 struct delargs { 498 char __user *path; 499 long follow; 500 struct proplistname_args __user *name_args; 501 } del; 502 struct fdelargs { 503 long fd; 504 struct proplistname_args __user *name_args; 505 } fdel; 506 }; 507 508 enum pl_code { 509 PL_SET = 1, PL_FSET = 2, 510 PL_GET = 3, PL_FGET = 4, 511 PL_DEL = 5, PL_FDEL = 6 512 }; 513 514 SYSCALL_DEFINE2(osf_proplist_syscall, enum pl_code, code, 515 union pl_args __user *, args) 516 { 517 long error; 518 int __user *min_buf_size_ptr; 519 520 lock_kernel(); 521 switch (code) { 522 case PL_SET: 523 if (get_user(error, &args->set.nbytes)) 524 error = -EFAULT; 525 break; 526 case PL_FSET: 527 if (get_user(error, &args->fset.nbytes)) 528 error = -EFAULT; 529 break; 530 case PL_GET: 531 error = get_user(min_buf_size_ptr, &args->get.min_buf_size); 532 if (error) 533 break; 534 error = put_user(0, min_buf_size_ptr); 535 break; 536 case PL_FGET: 537 error = get_user(min_buf_size_ptr, &args->fget.min_buf_size); 538 if (error) 539 break; 540 error = put_user(0, min_buf_size_ptr); 541 break; 542 case PL_DEL: 543 case PL_FDEL: 544 error = 0; 545 break; 546 default: 547 error = -EOPNOTSUPP; 548 break; 549 }; 550 unlock_kernel(); 551 return error; 552 } 553 554 SYSCALL_DEFINE2(osf_sigstack, struct sigstack __user *, uss, 555 struct sigstack __user *, uoss) 556 { 557 unsigned long usp = rdusp(); 558 unsigned long oss_sp = current->sas_ss_sp + current->sas_ss_size; 559 unsigned long oss_os = on_sig_stack(usp); 560 int error; 561 562 if (uss) { 563 void __user *ss_sp; 564 565 error = -EFAULT; 566 if (get_user(ss_sp, &uss->ss_sp)) 567 goto out; 568 569 /* If the current stack was set with sigaltstack, don't 570 swap stacks while we are on it. */ 571 error = -EPERM; 572 if (current->sas_ss_sp && on_sig_stack(usp)) 573 goto out; 574 575 /* Since we don't know the extent of the stack, and we don't 576 track onstack-ness, but rather calculate it, we must 577 presume a size. Ho hum this interface is lossy. */ 578 current->sas_ss_sp = (unsigned long)ss_sp - SIGSTKSZ; 579 current->sas_ss_size = SIGSTKSZ; 580 } 581 582 if (uoss) { 583 error = -EFAULT; 584 if (! access_ok(VERIFY_WRITE, uoss, sizeof(*uoss)) 585 || __put_user(oss_sp, &uoss->ss_sp) 586 || __put_user(oss_os, &uoss->ss_onstack)) 587 goto out; 588 } 589 590 error = 0; 591 out: 592 return error; 593 } 594 595 SYSCALL_DEFINE3(osf_sysinfo, int, command, char __user *, buf, long, count) 596 { 597 char *sysinfo_table[] = { 598 utsname()->sysname, 599 utsname()->nodename, 600 utsname()->release, 601 utsname()->version, 602 utsname()->machine, 603 "alpha", /* instruction set architecture */ 604 "dummy", /* hardware serial number */ 605 "dummy", /* hardware manufacturer */ 606 "dummy", /* secure RPC domain */ 607 }; 608 unsigned long offset; 609 char *res; 610 long len, err = -EINVAL; 611 612 offset = command-1; 613 if (offset >= ARRAY_SIZE(sysinfo_table)) { 614 /* Digital UNIX has a few unpublished interfaces here */ 615 printk("sysinfo(%d)", command); 616 goto out; 617 } 618 619 down_read(&uts_sem); 620 res = sysinfo_table[offset]; 621 len = strlen(res)+1; 622 if (len > count) 623 len = count; 624 if (copy_to_user(buf, res, len)) 625 err = -EFAULT; 626 else 627 err = 0; 628 up_read(&uts_sem); 629 out: 630 return err; 631 } 632 633 SYSCALL_DEFINE5(osf_getsysinfo, unsigned long, op, void __user *, buffer, 634 unsigned long, nbytes, int __user *, start, void __user *, arg) 635 { 636 unsigned long w; 637 struct percpu_struct *cpu; 638 639 switch (op) { 640 case GSI_IEEE_FP_CONTROL: 641 /* Return current software fp control & status bits. */ 642 /* Note that DU doesn't verify available space here. */ 643 644 w = current_thread_info()->ieee_state & IEEE_SW_MASK; 645 w = swcr_update_status(w, rdfpcr()); 646 if (put_user(w, (unsigned long __user *) buffer)) 647 return -EFAULT; 648 return 0; 649 650 case GSI_IEEE_STATE_AT_SIGNAL: 651 /* 652 * Not sure anybody will ever use this weird stuff. These 653 * ops can be used (under OSF/1) to set the fpcr that should 654 * be used when a signal handler starts executing. 655 */ 656 break; 657 658 case GSI_UACPROC: 659 if (nbytes < sizeof(unsigned int)) 660 return -EINVAL; 661 w = (current_thread_info()->flags >> UAC_SHIFT) & UAC_BITMASK; 662 if (put_user(w, (unsigned int __user *)buffer)) 663 return -EFAULT; 664 return 1; 665 666 case GSI_PROC_TYPE: 667 if (nbytes < sizeof(unsigned long)) 668 return -EINVAL; 669 cpu = (struct percpu_struct*) 670 ((char*)hwrpb + hwrpb->processor_offset); 671 w = cpu->type; 672 if (put_user(w, (unsigned long __user*)buffer)) 673 return -EFAULT; 674 return 1; 675 676 case GSI_GET_HWRPB: 677 if (nbytes < sizeof(*hwrpb)) 678 return -EINVAL; 679 if (copy_to_user(buffer, hwrpb, nbytes) != 0) 680 return -EFAULT; 681 return 1; 682 683 default: 684 break; 685 } 686 687 return -EOPNOTSUPP; 688 } 689 690 SYSCALL_DEFINE5(osf_setsysinfo, unsigned long, op, void __user *, buffer, 691 unsigned long, nbytes, int __user *, start, void __user *, arg) 692 { 693 switch (op) { 694 case SSI_IEEE_FP_CONTROL: { 695 unsigned long swcr, fpcr; 696 unsigned int *state; 697 698 /* 699 * Alpha Architecture Handbook 4.7.7.3: 700 * To be fully IEEE compiant, we must track the current IEEE 701 * exception state in software, because spurious bits can be 702 * set in the trap shadow of a software-complete insn. 703 */ 704 705 if (get_user(swcr, (unsigned long __user *)buffer)) 706 return -EFAULT; 707 state = ¤t_thread_info()->ieee_state; 708 709 /* Update softare trap enable bits. */ 710 *state = (*state & ~IEEE_SW_MASK) | (swcr & IEEE_SW_MASK); 711 712 /* Update the real fpcr. */ 713 fpcr = rdfpcr() & FPCR_DYN_MASK; 714 fpcr |= ieee_swcr_to_fpcr(swcr); 715 wrfpcr(fpcr); 716 717 return 0; 718 } 719 720 case SSI_IEEE_RAISE_EXCEPTION: { 721 unsigned long exc, swcr, fpcr, fex; 722 unsigned int *state; 723 724 if (get_user(exc, (unsigned long __user *)buffer)) 725 return -EFAULT; 726 state = ¤t_thread_info()->ieee_state; 727 exc &= IEEE_STATUS_MASK; 728 729 /* Update softare trap enable bits. */ 730 swcr = (*state & IEEE_SW_MASK) | exc; 731 *state |= exc; 732 733 /* Update the real fpcr. */ 734 fpcr = rdfpcr(); 735 fpcr |= ieee_swcr_to_fpcr(swcr); 736 wrfpcr(fpcr); 737 738 /* If any exceptions set by this call, and are unmasked, 739 send a signal. Old exceptions are not signaled. */ 740 fex = (exc >> IEEE_STATUS_TO_EXCSUM_SHIFT) & swcr; 741 if (fex) { 742 siginfo_t info; 743 int si_code = 0; 744 745 if (fex & IEEE_TRAP_ENABLE_DNO) si_code = FPE_FLTUND; 746 if (fex & IEEE_TRAP_ENABLE_INE) si_code = FPE_FLTRES; 747 if (fex & IEEE_TRAP_ENABLE_UNF) si_code = FPE_FLTUND; 748 if (fex & IEEE_TRAP_ENABLE_OVF) si_code = FPE_FLTOVF; 749 if (fex & IEEE_TRAP_ENABLE_DZE) si_code = FPE_FLTDIV; 750 if (fex & IEEE_TRAP_ENABLE_INV) si_code = FPE_FLTINV; 751 752 info.si_signo = SIGFPE; 753 info.si_errno = 0; 754 info.si_code = si_code; 755 info.si_addr = NULL; /* FIXME */ 756 send_sig_info(SIGFPE, &info, current); 757 } 758 return 0; 759 } 760 761 case SSI_IEEE_STATE_AT_SIGNAL: 762 case SSI_IEEE_IGNORE_STATE_AT_SIGNAL: 763 /* 764 * Not sure anybody will ever use this weird stuff. These 765 * ops can be used (under OSF/1) to set the fpcr that should 766 * be used when a signal handler starts executing. 767 */ 768 break; 769 770 case SSI_NVPAIRS: { 771 unsigned long v, w, i; 772 unsigned int old, new; 773 774 for (i = 0; i < nbytes; ++i) { 775 776 if (get_user(v, 2*i + (unsigned int __user *)buffer)) 777 return -EFAULT; 778 if (get_user(w, 2*i + 1 + (unsigned int __user *)buffer)) 779 return -EFAULT; 780 switch (v) { 781 case SSIN_UACPROC: 782 again: 783 old = current_thread_info()->flags; 784 new = old & ~(UAC_BITMASK << UAC_SHIFT); 785 new = new | (w & UAC_BITMASK) << UAC_SHIFT; 786 if (cmpxchg(¤t_thread_info()->flags, 787 old, new) != old) 788 goto again; 789 break; 790 791 default: 792 return -EOPNOTSUPP; 793 } 794 } 795 return 0; 796 } 797 798 default: 799 break; 800 } 801 802 return -EOPNOTSUPP; 803 } 804 805 /* Translations due to the fact that OSF's time_t is an int. Which 806 affects all sorts of things, like timeval and itimerval. */ 807 808 extern struct timezone sys_tz; 809 810 struct timeval32 811 { 812 int tv_sec, tv_usec; 813 }; 814 815 struct itimerval32 816 { 817 struct timeval32 it_interval; 818 struct timeval32 it_value; 819 }; 820 821 static inline long 822 get_tv32(struct timeval *o, struct timeval32 __user *i) 823 { 824 return (!access_ok(VERIFY_READ, i, sizeof(*i)) || 825 (__get_user(o->tv_sec, &i->tv_sec) | 826 __get_user(o->tv_usec, &i->tv_usec))); 827 } 828 829 static inline long 830 put_tv32(struct timeval32 __user *o, struct timeval *i) 831 { 832 return (!access_ok(VERIFY_WRITE, o, sizeof(*o)) || 833 (__put_user(i->tv_sec, &o->tv_sec) | 834 __put_user(i->tv_usec, &o->tv_usec))); 835 } 836 837 static inline long 838 get_it32(struct itimerval *o, struct itimerval32 __user *i) 839 { 840 return (!access_ok(VERIFY_READ, i, sizeof(*i)) || 841 (__get_user(o->it_interval.tv_sec, &i->it_interval.tv_sec) | 842 __get_user(o->it_interval.tv_usec, &i->it_interval.tv_usec) | 843 __get_user(o->it_value.tv_sec, &i->it_value.tv_sec) | 844 __get_user(o->it_value.tv_usec, &i->it_value.tv_usec))); 845 } 846 847 static inline long 848 put_it32(struct itimerval32 __user *o, struct itimerval *i) 849 { 850 return (!access_ok(VERIFY_WRITE, o, sizeof(*o)) || 851 (__put_user(i->it_interval.tv_sec, &o->it_interval.tv_sec) | 852 __put_user(i->it_interval.tv_usec, &o->it_interval.tv_usec) | 853 __put_user(i->it_value.tv_sec, &o->it_value.tv_sec) | 854 __put_user(i->it_value.tv_usec, &o->it_value.tv_usec))); 855 } 856 857 static inline void 858 jiffies_to_timeval32(unsigned long jiffies, struct timeval32 *value) 859 { 860 value->tv_usec = (jiffies % HZ) * (1000000L / HZ); 861 value->tv_sec = jiffies / HZ; 862 } 863 864 SYSCALL_DEFINE2(osf_gettimeofday, struct timeval32 __user *, tv, 865 struct timezone __user *, tz) 866 { 867 if (tv) { 868 struct timeval ktv; 869 do_gettimeofday(&ktv); 870 if (put_tv32(tv, &ktv)) 871 return -EFAULT; 872 } 873 if (tz) { 874 if (copy_to_user(tz, &sys_tz, sizeof(sys_tz))) 875 return -EFAULT; 876 } 877 return 0; 878 } 879 880 SYSCALL_DEFINE2(osf_settimeofday, struct timeval32 __user *, tv, 881 struct timezone __user *, tz) 882 { 883 struct timespec kts; 884 struct timezone ktz; 885 886 if (tv) { 887 if (get_tv32((struct timeval *)&kts, tv)) 888 return -EFAULT; 889 } 890 if (tz) { 891 if (copy_from_user(&ktz, tz, sizeof(*tz))) 892 return -EFAULT; 893 } 894 895 kts.tv_nsec *= 1000; 896 897 return do_sys_settimeofday(tv ? &kts : NULL, tz ? &ktz : NULL); 898 } 899 900 SYSCALL_DEFINE2(osf_getitimer, int, which, struct itimerval32 __user *, it) 901 { 902 struct itimerval kit; 903 int error; 904 905 error = do_getitimer(which, &kit); 906 if (!error && put_it32(it, &kit)) 907 error = -EFAULT; 908 909 return error; 910 } 911 912 SYSCALL_DEFINE3(osf_setitimer, int, which, struct itimerval32 __user *, in, 913 struct itimerval32 __user *, out) 914 { 915 struct itimerval kin, kout; 916 int error; 917 918 if (in) { 919 if (get_it32(&kin, in)) 920 return -EFAULT; 921 } else 922 memset(&kin, 0, sizeof(kin)); 923 924 error = do_setitimer(which, &kin, out ? &kout : NULL); 925 if (error || !out) 926 return error; 927 928 if (put_it32(out, &kout)) 929 return -EFAULT; 930 931 return 0; 932 933 } 934 935 SYSCALL_DEFINE2(osf_utimes, const char __user *, filename, 936 struct timeval32 __user *, tvs) 937 { 938 struct timespec tv[2]; 939 940 if (tvs) { 941 struct timeval ktvs[2]; 942 if (get_tv32(&ktvs[0], &tvs[0]) || 943 get_tv32(&ktvs[1], &tvs[1])) 944 return -EFAULT; 945 946 if (ktvs[0].tv_usec < 0 || ktvs[0].tv_usec >= 1000000 || 947 ktvs[1].tv_usec < 0 || ktvs[1].tv_usec >= 1000000) 948 return -EINVAL; 949 950 tv[0].tv_sec = ktvs[0].tv_sec; 951 tv[0].tv_nsec = 1000 * ktvs[0].tv_usec; 952 tv[1].tv_sec = ktvs[1].tv_sec; 953 tv[1].tv_nsec = 1000 * ktvs[1].tv_usec; 954 } 955 956 return do_utimes(AT_FDCWD, filename, tvs ? tv : NULL, 0); 957 } 958 959 #define MAX_SELECT_SECONDS \ 960 ((unsigned long) (MAX_SCHEDULE_TIMEOUT / HZ)-1) 961 962 SYSCALL_DEFINE5(osf_select, int, n, fd_set __user *, inp, fd_set __user *, outp, 963 fd_set __user *, exp, struct timeval32 __user *, tvp) 964 { 965 struct timespec end_time, *to = NULL; 966 if (tvp) { 967 time_t sec, usec; 968 969 to = &end_time; 970 971 if (!access_ok(VERIFY_READ, tvp, sizeof(*tvp)) 972 || __get_user(sec, &tvp->tv_sec) 973 || __get_user(usec, &tvp->tv_usec)) { 974 return -EFAULT; 975 } 976 977 if (sec < 0 || usec < 0) 978 return -EINVAL; 979 980 if (poll_select_set_timeout(to, sec, usec * NSEC_PER_USEC)) 981 return -EINVAL; 982 983 } 984 985 /* OSF does not copy back the remaining time. */ 986 return core_sys_select(n, inp, outp, exp, to); 987 } 988 989 struct rusage32 { 990 struct timeval32 ru_utime; /* user time used */ 991 struct timeval32 ru_stime; /* system time used */ 992 long ru_maxrss; /* maximum resident set size */ 993 long ru_ixrss; /* integral shared memory size */ 994 long ru_idrss; /* integral unshared data size */ 995 long ru_isrss; /* integral unshared stack size */ 996 long ru_minflt; /* page reclaims */ 997 long ru_majflt; /* page faults */ 998 long ru_nswap; /* swaps */ 999 long ru_inblock; /* block input operations */ 1000 long ru_oublock; /* block output operations */ 1001 long ru_msgsnd; /* messages sent */ 1002 long ru_msgrcv; /* messages received */ 1003 long ru_nsignals; /* signals received */ 1004 long ru_nvcsw; /* voluntary context switches */ 1005 long ru_nivcsw; /* involuntary " */ 1006 }; 1007 1008 SYSCALL_DEFINE2(osf_getrusage, int, who, struct rusage32 __user *, ru) 1009 { 1010 struct rusage32 r; 1011 1012 if (who != RUSAGE_SELF && who != RUSAGE_CHILDREN) 1013 return -EINVAL; 1014 1015 memset(&r, 0, sizeof(r)); 1016 switch (who) { 1017 case RUSAGE_SELF: 1018 jiffies_to_timeval32(current->utime, &r.ru_utime); 1019 jiffies_to_timeval32(current->stime, &r.ru_stime); 1020 r.ru_minflt = current->min_flt; 1021 r.ru_majflt = current->maj_flt; 1022 break; 1023 case RUSAGE_CHILDREN: 1024 jiffies_to_timeval32(current->signal->cutime, &r.ru_utime); 1025 jiffies_to_timeval32(current->signal->cstime, &r.ru_stime); 1026 r.ru_minflt = current->signal->cmin_flt; 1027 r.ru_majflt = current->signal->cmaj_flt; 1028 break; 1029 } 1030 1031 return copy_to_user(ru, &r, sizeof(r)) ? -EFAULT : 0; 1032 } 1033 1034 SYSCALL_DEFINE4(osf_wait4, pid_t, pid, int __user *, ustatus, int, options, 1035 struct rusage32 __user *, ur) 1036 { 1037 struct rusage r; 1038 long ret, err; 1039 mm_segment_t old_fs; 1040 1041 if (!ur) 1042 return sys_wait4(pid, ustatus, options, NULL); 1043 1044 old_fs = get_fs(); 1045 1046 set_fs (KERNEL_DS); 1047 ret = sys_wait4(pid, ustatus, options, (struct rusage __user *) &r); 1048 set_fs (old_fs); 1049 1050 if (!access_ok(VERIFY_WRITE, ur, sizeof(*ur))) 1051 return -EFAULT; 1052 1053 err = 0; 1054 err |= __put_user(r.ru_utime.tv_sec, &ur->ru_utime.tv_sec); 1055 err |= __put_user(r.ru_utime.tv_usec, &ur->ru_utime.tv_usec); 1056 err |= __put_user(r.ru_stime.tv_sec, &ur->ru_stime.tv_sec); 1057 err |= __put_user(r.ru_stime.tv_usec, &ur->ru_stime.tv_usec); 1058 err |= __put_user(r.ru_maxrss, &ur->ru_maxrss); 1059 err |= __put_user(r.ru_ixrss, &ur->ru_ixrss); 1060 err |= __put_user(r.ru_idrss, &ur->ru_idrss); 1061 err |= __put_user(r.ru_isrss, &ur->ru_isrss); 1062 err |= __put_user(r.ru_minflt, &ur->ru_minflt); 1063 err |= __put_user(r.ru_majflt, &ur->ru_majflt); 1064 err |= __put_user(r.ru_nswap, &ur->ru_nswap); 1065 err |= __put_user(r.ru_inblock, &ur->ru_inblock); 1066 err |= __put_user(r.ru_oublock, &ur->ru_oublock); 1067 err |= __put_user(r.ru_msgsnd, &ur->ru_msgsnd); 1068 err |= __put_user(r.ru_msgrcv, &ur->ru_msgrcv); 1069 err |= __put_user(r.ru_nsignals, &ur->ru_nsignals); 1070 err |= __put_user(r.ru_nvcsw, &ur->ru_nvcsw); 1071 err |= __put_user(r.ru_nivcsw, &ur->ru_nivcsw); 1072 1073 return err ? err : ret; 1074 } 1075 1076 /* 1077 * I don't know what the parameters are: the first one 1078 * seems to be a timeval pointer, and I suspect the second 1079 * one is the time remaining.. Ho humm.. No documentation. 1080 */ 1081 SYSCALL_DEFINE2(osf_usleep_thread, struct timeval32 __user *, sleep, 1082 struct timeval32 __user *, remain) 1083 { 1084 struct timeval tmp; 1085 unsigned long ticks; 1086 1087 if (get_tv32(&tmp, sleep)) 1088 goto fault; 1089 1090 ticks = timeval_to_jiffies(&tmp); 1091 1092 ticks = schedule_timeout_interruptible(ticks); 1093 1094 if (remain) { 1095 jiffies_to_timeval(ticks, &tmp); 1096 if (put_tv32(remain, &tmp)) 1097 goto fault; 1098 } 1099 1100 return 0; 1101 fault: 1102 return -EFAULT; 1103 } 1104 1105 1106 struct timex32 { 1107 unsigned int modes; /* mode selector */ 1108 long offset; /* time offset (usec) */ 1109 long freq; /* frequency offset (scaled ppm) */ 1110 long maxerror; /* maximum error (usec) */ 1111 long esterror; /* estimated error (usec) */ 1112 int status; /* clock command/status */ 1113 long constant; /* pll time constant */ 1114 long precision; /* clock precision (usec) (read only) */ 1115 long tolerance; /* clock frequency tolerance (ppm) 1116 * (read only) 1117 */ 1118 struct timeval32 time; /* (read only) */ 1119 long tick; /* (modified) usecs between clock ticks */ 1120 1121 long ppsfreq; /* pps frequency (scaled ppm) (ro) */ 1122 long jitter; /* pps jitter (us) (ro) */ 1123 int shift; /* interval duration (s) (shift) (ro) */ 1124 long stabil; /* pps stability (scaled ppm) (ro) */ 1125 long jitcnt; /* jitter limit exceeded (ro) */ 1126 long calcnt; /* calibration intervals (ro) */ 1127 long errcnt; /* calibration errors (ro) */ 1128 long stbcnt; /* stability limit exceeded (ro) */ 1129 1130 int :32; int :32; int :32; int :32; 1131 int :32; int :32; int :32; int :32; 1132 int :32; int :32; int :32; int :32; 1133 }; 1134 1135 SYSCALL_DEFINE1(old_adjtimex, struct timex32 __user *, txc_p) 1136 { 1137 struct timex txc; 1138 int ret; 1139 1140 /* copy relevant bits of struct timex. */ 1141 if (copy_from_user(&txc, txc_p, offsetof(struct timex32, time)) || 1142 copy_from_user(&txc.tick, &txc_p->tick, sizeof(struct timex32) - 1143 offsetof(struct timex32, time))) 1144 return -EFAULT; 1145 1146 ret = do_adjtimex(&txc); 1147 if (ret < 0) 1148 return ret; 1149 1150 /* copy back to timex32 */ 1151 if (copy_to_user(txc_p, &txc, offsetof(struct timex32, time)) || 1152 (copy_to_user(&txc_p->tick, &txc.tick, sizeof(struct timex32) - 1153 offsetof(struct timex32, tick))) || 1154 (put_tv32(&txc_p->time, &txc.time))) 1155 return -EFAULT; 1156 1157 return ret; 1158 } 1159 1160 /* Get an address range which is currently unmapped. Similar to the 1161 generic version except that we know how to honor ADDR_LIMIT_32BIT. */ 1162 1163 static unsigned long 1164 arch_get_unmapped_area_1(unsigned long addr, unsigned long len, 1165 unsigned long limit) 1166 { 1167 struct vm_area_struct *vma = find_vma(current->mm, addr); 1168 1169 while (1) { 1170 /* At this point: (!vma || addr < vma->vm_end). */ 1171 if (limit - len < addr) 1172 return -ENOMEM; 1173 if (!vma || addr + len <= vma->vm_start) 1174 return addr; 1175 addr = vma->vm_end; 1176 vma = vma->vm_next; 1177 } 1178 } 1179 1180 unsigned long 1181 arch_get_unmapped_area(struct file *filp, unsigned long addr, 1182 unsigned long len, unsigned long pgoff, 1183 unsigned long flags) 1184 { 1185 unsigned long limit; 1186 1187 /* "32 bit" actually means 31 bit, since pointers sign extend. */ 1188 if (current->personality & ADDR_LIMIT_32BIT) 1189 limit = 0x80000000; 1190 else 1191 limit = TASK_SIZE; 1192 1193 if (len > limit) 1194 return -ENOMEM; 1195 1196 if (flags & MAP_FIXED) 1197 return addr; 1198 1199 /* First, see if the given suggestion fits. 1200 1201 The OSF/1 loader (/sbin/loader) relies on us returning an 1202 address larger than the requested if one exists, which is 1203 a terribly broken way to program. 1204 1205 That said, I can see the use in being able to suggest not 1206 merely specific addresses, but regions of memory -- perhaps 1207 this feature should be incorporated into all ports? */ 1208 1209 if (addr) { 1210 addr = arch_get_unmapped_area_1 (PAGE_ALIGN(addr), len, limit); 1211 if (addr != (unsigned long) -ENOMEM) 1212 return addr; 1213 } 1214 1215 /* Next, try allocating at TASK_UNMAPPED_BASE. */ 1216 addr = arch_get_unmapped_area_1 (PAGE_ALIGN(TASK_UNMAPPED_BASE), 1217 len, limit); 1218 if (addr != (unsigned long) -ENOMEM) 1219 return addr; 1220 1221 /* Finally, try allocating in low memory. */ 1222 addr = arch_get_unmapped_area_1 (PAGE_SIZE, len, limit); 1223 1224 return addr; 1225 } 1226 1227 #ifdef CONFIG_OSF4_COMPAT 1228 1229 /* Clear top 32 bits of iov_len in the user's buffer for 1230 compatibility with old versions of OSF/1 where iov_len 1231 was defined as int. */ 1232 static int 1233 osf_fix_iov_len(const struct iovec __user *iov, unsigned long count) 1234 { 1235 unsigned long i; 1236 1237 for (i = 0 ; i < count ; i++) { 1238 int __user *iov_len_high = (int __user *)&iov[i].iov_len + 1; 1239 1240 if (put_user(0, iov_len_high)) 1241 return -EFAULT; 1242 } 1243 return 0; 1244 } 1245 1246 SYSCALL_DEFINE3(osf_readv, unsigned long, fd, 1247 const struct iovec __user *, vector, unsigned long, count) 1248 { 1249 if (unlikely(personality(current->personality) == PER_OSF4)) 1250 if (osf_fix_iov_len(vector, count)) 1251 return -EFAULT; 1252 return sys_readv(fd, vector, count); 1253 } 1254 1255 SYSCALL_DEFINE3(osf_writev, unsigned long, fd, 1256 const struct iovec __user *, vector, unsigned long, count) 1257 { 1258 if (unlikely(personality(current->personality) == PER_OSF4)) 1259 if (osf_fix_iov_len(vector, count)) 1260 return -EFAULT; 1261 return sys_writev(fd, vector, count); 1262 } 1263 1264 #endif 1265