1 // SPDX-License-Identifier: GPL-2.0
2 /* linux/arch/sparc64/kernel/sys_sparc.c
4 * This file contains various random system calls that
5 * have a non-standard calling sequence on the Linux/sparc
9 #include <linux/errno.h>
10 #include <linux/types.h>
11 #include <linux/sched/signal.h>
12 #include <linux/sched/mm.h>
13 #include <linux/sched/debug.h>
15 #include <linux/file.h>
17 #include <linux/sem.h>
18 #include <linux/msg.h>
19 #include <linux/shm.h>
20 #include <linux/stat.h>
21 #include <linux/mman.h>
22 #include <linux/utsname.h>
23 #include <linux/smp.h>
24 #include <linux/slab.h>
25 #include <linux/syscalls.h>
26 #include <linux/ipc.h>
27 #include <linux/personality.h>
28 #include <linux/random.h>
29 #include <linux/export.h>
30 #include <linux/context_tracking.h>
31 #include <linux/timex.h>
32 #include <linux/uaccess.h>
33 #include <linux/hugetlb.h>
35 #include <asm/utrap.h>
36 #include <asm/unistd.h>
42 /* #define DEBUG_UNIMP_SYSCALL */
44 SYSCALL_DEFINE0(getpagesize
)
49 /* Does addr --> addr+len fall within 4GB of the VA-space hole or
50 * overflow past the end of the 64-bit address space?
52 static inline int invalid_64bit_range(unsigned long addr
, unsigned long len
)
54 unsigned long va_exclude_start
, va_exclude_end
;
56 va_exclude_start
= VA_EXCLUDE_START
;
57 va_exclude_end
= VA_EXCLUDE_END
;
59 if (unlikely(len
>= va_exclude_start
))
62 if (unlikely((addr
+ len
) < addr
))
65 if (unlikely((addr
>= va_exclude_start
&& addr
< va_exclude_end
) ||
66 ((addr
+ len
) >= va_exclude_start
&&
67 (addr
+ len
) < va_exclude_end
)))
73 /* These functions differ from the default implementations in
74 * mm/mmap.c in two ways:
76 * 1) For file backed MAP_SHARED mmap()'s we D-cache color align,
77 * for fixed such mappings we just validate what the user gave us.
78 * 2) For 64-bit tasks we avoid mapping anything within 4GB of
79 * the spitfire/niagara VA-hole.
82 static inline unsigned long COLOR_ALIGN(unsigned long addr
,
85 unsigned long base
= (addr
+SHMLBA
-1)&~(SHMLBA
-1);
86 unsigned long off
= (pgoff
<<PAGE_SHIFT
) & (SHMLBA
-1);
91 static unsigned long get_align_mask(struct file
*filp
, unsigned long flags
)
93 if (filp
&& is_file_hugepages(filp
))
94 return huge_page_mask_align(filp
);
95 if (filp
|| (flags
& MAP_SHARED
))
96 return PAGE_MASK
& (SHMLBA
- 1);
101 unsigned long arch_get_unmapped_area(struct file
*filp
, unsigned long addr
, unsigned long len
, unsigned long pgoff
, unsigned long flags
, vm_flags_t vm_flags
)
103 struct mm_struct
*mm
= current
->mm
;
104 struct vm_area_struct
* vma
;
105 unsigned long task_size
= TASK_SIZE
;
107 struct vm_unmapped_area_info info
= {};
108 bool file_hugepage
= false;
110 if (filp
&& is_file_hugepages(filp
))
111 file_hugepage
= true;
113 if (flags
& MAP_FIXED
) {
114 /* We do not accept a shared mapping if it would violate
115 * cache aliasing constraints.
117 if (!file_hugepage
&& (flags
& MAP_SHARED
) &&
118 ((addr
- (pgoff
<< PAGE_SHIFT
)) & (SHMLBA
- 1)))
123 if (test_thread_flag(TIF_32BIT
))
124 task_size
= STACK_TOP32
;
125 if (unlikely(len
> task_size
|| len
>= VA_EXCLUDE_START
))
129 if ((filp
|| (flags
& MAP_SHARED
)) && !file_hugepage
)
134 addr
= COLOR_ALIGN(addr
, pgoff
);
136 addr
= PAGE_ALIGN(addr
);
138 vma
= find_vma(mm
, addr
);
139 if (task_size
- len
>= addr
&&
140 (!vma
|| addr
+ len
<= vm_start_gap(vma
)))
145 info
.low_limit
= TASK_UNMAPPED_BASE
;
146 info
.high_limit
= min(task_size
, VA_EXCLUDE_START
);
147 info
.align_mask
= get_align_mask(filp
, flags
);
149 info
.align_offset
= pgoff
<< PAGE_SHIFT
;
150 addr
= vm_unmapped_area(&info
);
152 if ((addr
& ~PAGE_MASK
) && task_size
> VA_EXCLUDE_END
) {
153 VM_BUG_ON(addr
!= -ENOMEM
);
154 info
.low_limit
= VA_EXCLUDE_END
;
155 info
.high_limit
= task_size
;
156 addr
= vm_unmapped_area(&info
);
163 arch_get_unmapped_area_topdown(struct file
*filp
, const unsigned long addr0
,
164 const unsigned long len
, const unsigned long pgoff
,
165 const unsigned long flags
, vm_flags_t vm_flags
)
167 struct vm_area_struct
*vma
;
168 struct mm_struct
*mm
= current
->mm
;
169 unsigned long task_size
= STACK_TOP32
;
170 unsigned long addr
= addr0
;
172 struct vm_unmapped_area_info info
= {};
173 bool file_hugepage
= false;
175 /* This should only ever run for 32-bit processes. */
176 BUG_ON(!test_thread_flag(TIF_32BIT
));
178 if (filp
&& is_file_hugepages(filp
))
179 file_hugepage
= true;
181 if (flags
& MAP_FIXED
) {
182 /* We do not accept a shared mapping if it would violate
183 * cache aliasing constraints.
185 if (!file_hugepage
&& (flags
& MAP_SHARED
) &&
186 ((addr
- (pgoff
<< PAGE_SHIFT
)) & (SHMLBA
- 1)))
191 if (unlikely(len
> task_size
))
195 if ((filp
|| (flags
& MAP_SHARED
)) && !file_hugepage
)
198 /* requesting a specific address */
201 addr
= COLOR_ALIGN(addr
, pgoff
);
203 addr
= PAGE_ALIGN(addr
);
205 vma
= find_vma(mm
, addr
);
206 if (task_size
- len
>= addr
&&
207 (!vma
|| addr
+ len
<= vm_start_gap(vma
)))
211 info
.flags
= VM_UNMAPPED_AREA_TOPDOWN
;
213 info
.low_limit
= PAGE_SIZE
;
214 info
.high_limit
= mm
->mmap_base
;
215 info
.align_mask
= get_align_mask(filp
, flags
);
217 info
.align_offset
= pgoff
<< PAGE_SHIFT
;
218 addr
= vm_unmapped_area(&info
);
221 * A failed mmap() very likely causes application failure,
222 * so fall back to the bottom-up function here. This scenario
223 * can happen with large stack limits and large mmap()
226 if (addr
& ~PAGE_MASK
) {
227 VM_BUG_ON(addr
!= -ENOMEM
);
229 info
.low_limit
= TASK_UNMAPPED_BASE
;
230 info
.high_limit
= STACK_TOP32
;
231 addr
= vm_unmapped_area(&info
);
237 /* Try to align mapping such that we align it as much as possible. */
238 unsigned long get_fb_unmapped_area(struct file
*filp
, unsigned long orig_addr
, unsigned long len
, unsigned long pgoff
, unsigned long flags
)
240 unsigned long align_goal
, addr
= -ENOMEM
;
242 if (flags
& MAP_FIXED
) {
243 /* Ok, don't mess with it. */
244 return mm_get_unmapped_area(current
->mm
, NULL
, orig_addr
, len
, pgoff
, flags
);
246 flags
&= ~MAP_SHARED
;
248 align_goal
= PAGE_SIZE
;
249 if (len
>= (4UL * 1024 * 1024))
250 align_goal
= (4UL * 1024 * 1024);
251 else if (len
>= (512UL * 1024))
252 align_goal
= (512UL * 1024);
253 else if (len
>= (64UL * 1024))
254 align_goal
= (64UL * 1024);
257 addr
= mm_get_unmapped_area(current
->mm
, NULL
, orig_addr
,
258 len
+ (align_goal
- PAGE_SIZE
), pgoff
, flags
);
259 if (!(addr
& ~PAGE_MASK
)) {
260 addr
= (addr
+ (align_goal
- 1UL)) & ~(align_goal
- 1UL);
264 if (align_goal
== (4UL * 1024 * 1024))
265 align_goal
= (512UL * 1024);
266 else if (align_goal
== (512UL * 1024))
267 align_goal
= (64UL * 1024);
269 align_goal
= PAGE_SIZE
;
270 } while ((addr
& ~PAGE_MASK
) && align_goal
> PAGE_SIZE
);
272 /* Mapping is smaller than 64K or larger areas could not
275 if (addr
& ~PAGE_MASK
)
276 addr
= mm_get_unmapped_area(current
->mm
, NULL
, orig_addr
, len
, pgoff
, flags
);
280 EXPORT_SYMBOL(get_fb_unmapped_area
);
282 /* Essentially the same as PowerPC. */
283 static unsigned long mmap_rnd(void)
285 unsigned long rnd
= 0UL;
287 if (current
->flags
& PF_RANDOMIZE
) {
288 unsigned long val
= get_random_long();
289 if (test_thread_flag(TIF_32BIT
))
290 rnd
= (val
% (1UL << (23UL-PAGE_SHIFT
)));
292 rnd
= (val
% (1UL << (30UL-PAGE_SHIFT
)));
294 return rnd
<< PAGE_SHIFT
;
297 void arch_pick_mmap_layout(struct mm_struct
*mm
, struct rlimit
*rlim_stack
)
299 unsigned long random_factor
= mmap_rnd();
303 * Fall back to the standard layout if the personality
304 * bit is set, or if the expected stack growth is unlimited:
306 gap
= rlim_stack
->rlim_cur
;
307 if (!test_thread_flag(TIF_32BIT
) ||
308 (current
->personality
& ADDR_COMPAT_LAYOUT
) ||
309 gap
== RLIM_INFINITY
||
310 sysctl_legacy_va_layout
) {
311 mm
->mmap_base
= TASK_UNMAPPED_BASE
+ random_factor
;
312 clear_bit(MMF_TOPDOWN
, &mm
->flags
);
314 /* We know it's 32-bit */
315 unsigned long task_size
= STACK_TOP32
;
317 if (gap
< 128 * 1024 * 1024)
318 gap
= 128 * 1024 * 1024;
319 if (gap
> (task_size
/ 6 * 5))
320 gap
= (task_size
/ 6 * 5);
322 mm
->mmap_base
= PAGE_ALIGN(task_size
- gap
- random_factor
);
323 set_bit(MMF_TOPDOWN
, &mm
->flags
);
328 * sys_pipe() is the normal C calling standard for creating
329 * a pipe. It's not the way unix traditionally does this, though.
331 SYSCALL_DEFINE0(sparc_pipe
)
336 error
= do_pipe_flags(fd
, 0);
339 current_pt_regs()->u_regs
[UREG_I1
] = fd
[1];
346 * sys_ipc() is the de-multiplexer for the SysV IPC calls..
348 * This is really horribly ugly.
351 SYSCALL_DEFINE6(sparc_ipc
, unsigned int, call
, int, first
, unsigned long, second
,
352 unsigned long, third
, void __user
*, ptr
, long, fifth
)
356 if (!IS_ENABLED(CONFIG_SYSVIPC
))
359 /* No need for backward compatibility. We can start fresh... */
360 if (call
<= SEMTIMEDOP
) {
363 err
= ksys_semtimedop(first
, ptr
,
364 (unsigned int)second
, NULL
);
367 err
= ksys_semtimedop(first
, ptr
, (unsigned int)second
,
368 (const struct __kernel_timespec __user
*)
369 (unsigned long) fifth
);
372 err
= ksys_semget(first
, (int)second
, (int)third
);
375 err
= ksys_old_semctl(first
, second
,
377 (unsigned long) ptr
);
385 if (call
<= MSGCTL
) {
388 err
= ksys_msgsnd(first
, ptr
, (size_t)second
,
392 err
= ksys_msgrcv(first
, ptr
, (size_t)second
, fifth
,
396 err
= ksys_msgget((key_t
)first
, (int)second
);
399 err
= ksys_old_msgctl(first
, (int)second
| IPC_64
, ptr
);
406 if (call
<= SHMCTL
) {
410 err
= do_shmat(first
, ptr
, (int)second
, &raddr
, SHMLBA
);
413 (ulong __user
*) third
))
419 err
= ksys_shmdt(ptr
);
422 err
= ksys_shmget(first
, (size_t)second
, (int)third
);
425 err
= ksys_old_shmctl(first
, (int)second
| IPC_64
, ptr
);
438 SYSCALL_DEFINE1(sparc64_personality
, unsigned long, personality
)
442 if (personality(current
->personality
) == PER_LINUX32
&&
443 personality(personality
) == PER_LINUX
)
444 personality
|= PER_LINUX32
;
445 ret
= sys_personality(personality
);
446 if (personality(ret
) == PER_LINUX32
)
452 int sparc_mmap_check(unsigned long addr
, unsigned long len
)
454 if (test_thread_flag(TIF_32BIT
)) {
455 if (len
>= STACK_TOP32
)
458 if (addr
> STACK_TOP32
- len
)
461 if (len
>= VA_EXCLUDE_START
)
464 if (invalid_64bit_range(addr
, len
))
471 /* Linux version of mmap */
472 SYSCALL_DEFINE6(mmap
, unsigned long, addr
, unsigned long, len
,
473 unsigned long, prot
, unsigned long, flags
, unsigned long, fd
,
476 unsigned long retval
= -EINVAL
;
478 if ((off
+ PAGE_ALIGN(len
)) < off
)
480 if (off
& ~PAGE_MASK
)
482 retval
= ksys_mmap_pgoff(addr
, len
, prot
, flags
, fd
, off
>> PAGE_SHIFT
);
487 SYSCALL_DEFINE2(64_munmap
, unsigned long, addr
, size_t, len
)
489 if (invalid_64bit_range(addr
, len
))
492 return vm_munmap(addr
, len
);
495 SYSCALL_DEFINE5(64_mremap
, unsigned long, addr
, unsigned long, old_len
,
496 unsigned long, new_len
, unsigned long, flags
,
497 unsigned long, new_addr
)
499 if (test_thread_flag(TIF_32BIT
))
501 return sys_mremap(addr
, old_len
, new_len
, flags
, new_addr
);
504 SYSCALL_DEFINE0(nis_syscall
)
507 struct pt_regs
*regs
= current_pt_regs();
509 /* Don't make the system unusable, if someone goes stuck */
513 printk ("Unimplemented SPARC system call %ld\n",regs
->u_regs
[1]);
514 #ifdef DEBUG_UNIMP_SYSCALL
521 /* #define DEBUG_SPARC_BREAKPOINT */
523 asmlinkage
void sparc_breakpoint(struct pt_regs
*regs
)
525 enum ctx_state prev_state
= exception_enter();
527 if (test_thread_flag(TIF_32BIT
)) {
528 regs
->tpc
&= 0xffffffff;
529 regs
->tnpc
&= 0xffffffff;
531 #ifdef DEBUG_SPARC_BREAKPOINT
532 printk ("TRAP: Entering kernel PC=%lx, nPC=%lx\n", regs
->tpc
, regs
->tnpc
);
534 force_sig_fault(SIGTRAP
, TRAP_BRKPT
, (void __user
*)regs
->tpc
);
535 #ifdef DEBUG_SPARC_BREAKPOINT
536 printk ("TRAP: Returning to space: PC=%lx nPC=%lx\n", regs
->tpc
, regs
->tnpc
);
538 exception_exit(prev_state
);
541 SYSCALL_DEFINE2(getdomainname
, char __user
*, name
, int, len
)
544 char tmp
[__NEW_UTS_LEN
+ 1];
551 nlen
= strlen(utsname()->domainname
) + 1;
555 memcpy(tmp
, utsname()->domainname
, nlen
);
559 if (copy_to_user(name
, tmp
, nlen
))
568 SYSCALL_DEFINE1(sparc_adjtimex
, struct __kernel_timex __user
*, txc_p
)
570 struct __kernel_timex txc
;
571 struct __kernel_old_timeval
*tv
= (void *)&txc
.time
;
574 /* Copy the user data space into the kernel copy
575 * structure. But bear in mind that the structures
578 if (copy_from_user(&txc
, txc_p
, sizeof(txc
)))
582 * override for sparc64 specific timeval type: tv_usec
583 * is 32 bit wide instead of 64-bit in __kernel_timex
585 txc
.time
.tv_usec
= tv
->tv_usec
;
586 ret
= do_adjtimex(&txc
);
587 tv
->tv_usec
= txc
.time
.tv_usec
;
589 return copy_to_user(txc_p
, &txc
, sizeof(txc
)) ? -EFAULT
: ret
;
592 SYSCALL_DEFINE2(sparc_clock_adjtime
, const clockid_t
, which_clock
,
593 struct __kernel_timex __user
*, txc_p
)
595 struct __kernel_timex txc
;
596 struct __kernel_old_timeval
*tv
= (void *)&txc
.time
;
599 if (!IS_ENABLED(CONFIG_POSIX_TIMERS
)) {
600 pr_err_once("process %d (%s) attempted a POSIX timer syscall "
601 "while CONFIG_POSIX_TIMERS is not set\n",
602 current
->pid
, current
->comm
);
607 /* Copy the user data space into the kernel copy
608 * structure. But bear in mind that the structures
611 if (copy_from_user(&txc
, txc_p
, sizeof(txc
)))
615 * override for sparc64 specific timeval type: tv_usec
616 * is 32 bit wide instead of 64-bit in __kernel_timex
618 txc
.time
.tv_usec
= tv
->tv_usec
;
619 ret
= do_clock_adjtime(which_clock
, &txc
);
620 tv
->tv_usec
= txc
.time
.tv_usec
;
622 return copy_to_user(txc_p
, &txc
, sizeof(txc
)) ? -EFAULT
: ret
;
625 SYSCALL_DEFINE5(utrap_install
, utrap_entry_t
, type
,
626 utrap_handler_t
, new_p
, utrap_handler_t
, new_d
,
627 utrap_handler_t __user
*, old_p
,
628 utrap_handler_t __user
*, old_d
)
630 if (type
< UT_INSTRUCTION_EXCEPTION
|| type
> UT_TRAP_INSTRUCTION_31
)
632 if (new_p
== (utrap_handler_t
)(long)UTH_NOCHANGE
) {
634 if (!current_thread_info()->utraps
) {
635 if (put_user(NULL
, old_p
))
638 if (put_user((utrap_handler_t
)(current_thread_info()->utraps
[type
]), old_p
))
643 if (put_user(NULL
, old_d
))
648 if (!current_thread_info()->utraps
) {
649 current_thread_info()->utraps
=
650 kcalloc(UT_TRAP_INSTRUCTION_31
+ 1, sizeof(long),
652 if (!current_thread_info()->utraps
)
654 current_thread_info()->utraps
[0] = 1;
656 if ((utrap_handler_t
)current_thread_info()->utraps
[type
] != new_p
&&
657 current_thread_info()->utraps
[0] > 1) {
658 unsigned long *p
= current_thread_info()->utraps
;
660 current_thread_info()->utraps
=
661 kmalloc_array(UT_TRAP_INSTRUCTION_31
+ 1,
664 if (!current_thread_info()->utraps
) {
665 current_thread_info()->utraps
= p
;
669 current_thread_info()->utraps
[0] = 1;
670 memcpy(current_thread_info()->utraps
+1, p
+1,
671 UT_TRAP_INSTRUCTION_31
*sizeof(long));
675 if (put_user((utrap_handler_t
)(current_thread_info()->utraps
[type
]), old_p
))
679 if (put_user(NULL
, old_d
))
682 current_thread_info()->utraps
[type
] = (long)new_p
;
687 SYSCALL_DEFINE1(memory_ordering
, unsigned long, model
)
689 struct pt_regs
*regs
= current_pt_regs();
692 regs
->tstate
= (regs
->tstate
& ~TSTATE_MM
) | (model
<< 14);
696 SYSCALL_DEFINE5(rt_sigaction
, int, sig
, const struct sigaction __user
*, act
,
697 struct sigaction __user
*, oact
, void __user
*, restorer
,
700 struct k_sigaction new_ka
, old_ka
;
703 /* XXX: Don't preclude handling different sized sigset_t's. */
704 if (sigsetsize
!= sizeof(sigset_t
))
708 new_ka
.ka_restorer
= restorer
;
709 if (copy_from_user(&new_ka
.sa
, act
, sizeof(*act
)))
713 ret
= do_sigaction(sig
, act
? &new_ka
: NULL
, oact
? &old_ka
: NULL
);
716 if (copy_to_user(oact
, &old_ka
.sa
, sizeof(*oact
)))
723 SYSCALL_DEFINE0(kern_features
)
725 return KERN_FEATURE_MIXED_MODE_STACK
;