1 // SPDX-License-Identifier: GPL-2.0
3 * linux/arch/alpha/kernel/osf_sys.c
5 * Copyright (C) 1995 Linus Torvalds
9 * This file handles some of the stranger OSF/1 system call interfaces.
10 * Some of the system calls expect a non-C calling standard, others have
11 * special parameter blocks..
14 #include <linux/errno.h>
15 #include <linux/sched/signal.h>
16 #include <linux/sched/mm.h>
17 #include <linux/sched/task_stack.h>
18 #include <linux/sched/cputime.h>
19 #include <linux/kernel.h>
21 #include <linux/smp.h>
22 #include <linux/stddef.h>
23 #include <linux/syscalls.h>
24 #include <linux/unistd.h>
25 #include <linux/ptrace.h>
26 #include <linux/user.h>
27 #include <linux/utsname.h>
28 #include <linux/time.h>
29 #include <linux/timex.h>
30 #include <linux/major.h>
31 #include <linux/stat.h>
32 #include <linux/mman.h>
33 #include <linux/shm.h>
34 #include <linux/poll.h>
35 #include <linux/file.h>
36 #include <linux/types.h>
37 #include <linux/ipc.h>
38 #include <linux/namei.h>
39 #include <linux/uio.h>
40 #include <linux/vfs.h>
41 #include <linux/rcupdate.h>
42 #include <linux/slab.h>
46 #include <linux/uaccess.h>
47 #include <asm/sysinfo.h>
48 #include <asm/thread_info.h>
49 #include <asm/hwrpb.h>
50 #include <asm/processor.h>
53 * Brk needs to return an error. Still support Linux's brk(0) query idiom,
54 * which OSF programs just shouldn't be doing. We're still not quite
55 * identical to OSF as we don't return 0 on success, but doing otherwise
56 * would require changes to libc. Hopefully this is good enough.
58 SYSCALL_DEFINE1(osf_brk
, unsigned long, brk
)
60 unsigned long retval
= sys_brk(brk
);
61 if (brk
&& brk
!= retval
)
67 * This is pure guess-work..
69 SYSCALL_DEFINE4(osf_set_program_attributes
, unsigned long, text_start
,
70 unsigned long, text_len
, unsigned long, bss_start
,
71 unsigned long, bss_len
)
76 mm
->end_code
= bss_start
+ bss_len
;
77 mm
->start_brk
= bss_start
+ bss_len
;
78 mm
->brk
= bss_start
+ bss_len
;
80 printk("set_program_attributes(%lx %lx %lx %lx)\n",
81 text_start
, text_len
, bss_start
, bss_len
);
87 * OSF/1 directory handling functions...
89 * The "getdents()" interface is much more sane: the "basep" stuff is
90 * braindamage (it can't really handle filesystems where the directory
91 * offset differences aren't the same as "d_reclen").
93 #define NAME_OFFSET offsetof (struct osf_dirent, d_name)
97 unsigned short d_reclen
;
98 unsigned short d_namlen
;
102 struct osf_dirent_callback
{
103 struct dir_context ctx
;
104 struct osf_dirent __user
*dirent
;
111 osf_filldir(struct dir_context
*ctx
, const char *name
, int namlen
,
112 loff_t offset
, u64 ino
, unsigned int d_type
)
114 struct osf_dirent __user
*dirent
;
115 struct osf_dirent_callback
*buf
=
116 container_of(ctx
, struct osf_dirent_callback
, ctx
);
117 unsigned int reclen
= ALIGN(NAME_OFFSET
+ namlen
+ 1, sizeof(u32
));
120 buf
->error
= -EINVAL
; /* only used if we fail */
121 if (reclen
> buf
->count
)
124 if (sizeof(d_ino
) < sizeof(ino
) && d_ino
!= ino
) {
125 buf
->error
= -EOVERFLOW
;
129 if (put_user(offset
, buf
->basep
))
133 dirent
= buf
->dirent
;
134 if (put_user(d_ino
, &dirent
->d_ino
) ||
135 put_user(namlen
, &dirent
->d_namlen
) ||
136 put_user(reclen
, &dirent
->d_reclen
) ||
137 copy_to_user(dirent
->d_name
, name
, namlen
) ||
138 put_user(0, dirent
->d_name
+ namlen
))
140 dirent
= (void __user
*)dirent
+ reclen
;
141 buf
->dirent
= dirent
;
142 buf
->count
-= reclen
;
145 buf
->error
= -EFAULT
;
149 SYSCALL_DEFINE4(osf_getdirentries
, unsigned int, fd
,
150 struct osf_dirent __user
*, dirent
, unsigned int, count
,
151 long __user
*, basep
)
154 struct fd arg
= fdget_pos(fd
);
155 struct osf_dirent_callback buf
= {
156 .ctx
.actor
= osf_filldir
,
165 error
= iterate_dir(arg
.file
, &buf
.ctx
);
168 if (count
!= buf
.count
)
169 error
= count
- buf
.count
;
177 SYSCALL_DEFINE6(osf_mmap
, unsigned long, addr
, unsigned long, len
,
178 unsigned long, prot
, unsigned long, flags
, unsigned long, fd
,
181 unsigned long ret
= -EINVAL
;
184 if (flags
& (_MAP_HASSEMAPHORE
| _MAP_INHERIT
| _MAP_UNALIGNED
))
185 printk("%s: unimplemented OSF mmap flags %04lx\n",
186 current
->comm
, flags
);
188 if ((off
+ PAGE_ALIGN(len
)) < off
)
190 if (off
& ~PAGE_MASK
)
192 ret
= ksys_mmap_pgoff(addr
, len
, prot
, flags
, fd
, off
>> PAGE_SHIFT
);
201 unsigned short st_nlink
;
202 short st_nlink_reserved
;
222 int st_atime_reserved
;
224 int st_mtime_reserved
;
226 int st_ctime_reserved
;
232 * The OSF/1 statfs structure is much larger, but this should
233 * match the beginning, at least.
245 __kernel_fsid_t f_fsid
;
248 struct osf_statfs64
{
258 __kernel_fsid_t f_fsid
;
277 linux_to_osf_stat(struct kstat
*lstat
, struct osf_stat __user
*osf_stat
)
279 struct osf_stat tmp
= { 0 };
281 tmp
.st_dev
= lstat
->dev
;
282 tmp
.st_mode
= lstat
->mode
;
283 tmp
.st_nlink
= lstat
->nlink
;
284 tmp
.st_uid
= from_kuid_munged(current_user_ns(), lstat
->uid
);
285 tmp
.st_gid
= from_kgid_munged(current_user_ns(), lstat
->gid
);
286 tmp
.st_rdev
= lstat
->rdev
;
287 tmp
.st_ldev
= lstat
->rdev
;
288 tmp
.st_size
= lstat
->size
;
289 tmp
.st_uatime
= lstat
->atime
.tv_nsec
/ 1000;
290 tmp
.st_umtime
= lstat
->mtime
.tv_nsec
/ 1000;
291 tmp
.st_uctime
= lstat
->ctime
.tv_nsec
/ 1000;
292 tmp
.st_ino
= lstat
->ino
;
293 tmp
.st_atime
= lstat
->atime
.tv_sec
;
294 tmp
.st_mtime
= lstat
->mtime
.tv_sec
;
295 tmp
.st_ctime
= lstat
->ctime
.tv_sec
;
296 tmp
.st_blksize
= lstat
->blksize
;
297 tmp
.st_blocks
= lstat
->blocks
;
299 return copy_to_user(osf_stat
, &tmp
, sizeof(tmp
)) ? -EFAULT
: 0;
303 linux_to_osf_statfs(struct kstatfs
*linux_stat
, struct osf_statfs __user
*osf_stat
,
304 unsigned long bufsiz
)
306 struct osf_statfs tmp_stat
;
308 tmp_stat
.f_type
= linux_stat
->f_type
;
309 tmp_stat
.f_flags
= 0; /* mount flags */
310 tmp_stat
.f_fsize
= linux_stat
->f_frsize
;
311 tmp_stat
.f_bsize
= linux_stat
->f_bsize
;
312 tmp_stat
.f_blocks
= linux_stat
->f_blocks
;
313 tmp_stat
.f_bfree
= linux_stat
->f_bfree
;
314 tmp_stat
.f_bavail
= linux_stat
->f_bavail
;
315 tmp_stat
.f_files
= linux_stat
->f_files
;
316 tmp_stat
.f_ffree
= linux_stat
->f_ffree
;
317 tmp_stat
.f_fsid
= linux_stat
->f_fsid
;
318 if (bufsiz
> sizeof(tmp_stat
))
319 bufsiz
= sizeof(tmp_stat
);
320 return copy_to_user(osf_stat
, &tmp_stat
, bufsiz
) ? -EFAULT
: 0;
324 linux_to_osf_statfs64(struct kstatfs
*linux_stat
, struct osf_statfs64 __user
*osf_stat
,
325 unsigned long bufsiz
)
327 struct osf_statfs64 tmp_stat
= { 0 };
329 tmp_stat
.f_type
= linux_stat
->f_type
;
330 tmp_stat
.f_fsize
= linux_stat
->f_frsize
;
331 tmp_stat
.f_bsize
= linux_stat
->f_bsize
;
332 tmp_stat
.f_blocks
= linux_stat
->f_blocks
;
333 tmp_stat
.f_bfree
= linux_stat
->f_bfree
;
334 tmp_stat
.f_bavail
= linux_stat
->f_bavail
;
335 tmp_stat
.f_files
= linux_stat
->f_files
;
336 tmp_stat
.f_ffree
= linux_stat
->f_ffree
;
337 tmp_stat
.f_fsid
= linux_stat
->f_fsid
;
338 if (bufsiz
> sizeof(tmp_stat
))
339 bufsiz
= sizeof(tmp_stat
);
340 return copy_to_user(osf_stat
, &tmp_stat
, bufsiz
) ? -EFAULT
: 0;
343 SYSCALL_DEFINE3(osf_statfs
, const char __user
*, pathname
,
344 struct osf_statfs __user
*, buffer
, unsigned long, bufsiz
)
346 struct kstatfs linux_stat
;
347 int error
= user_statfs(pathname
, &linux_stat
);
349 error
= linux_to_osf_statfs(&linux_stat
, buffer
, bufsiz
);
353 SYSCALL_DEFINE2(osf_stat
, char __user
*, name
, struct osf_stat __user
*, buf
)
358 error
= vfs_stat(name
, &stat
);
362 return linux_to_osf_stat(&stat
, buf
);
365 SYSCALL_DEFINE2(osf_lstat
, char __user
*, name
, struct osf_stat __user
*, buf
)
370 error
= vfs_lstat(name
, &stat
);
374 return linux_to_osf_stat(&stat
, buf
);
377 SYSCALL_DEFINE2(osf_fstat
, int, fd
, struct osf_stat __user
*, buf
)
382 error
= vfs_fstat(fd
, &stat
);
386 return linux_to_osf_stat(&stat
, buf
);
389 SYSCALL_DEFINE3(osf_fstatfs
, unsigned long, fd
,
390 struct osf_statfs __user
*, buffer
, unsigned long, bufsiz
)
392 struct kstatfs linux_stat
;
393 int error
= fd_statfs(fd
, &linux_stat
);
395 error
= linux_to_osf_statfs(&linux_stat
, buffer
, bufsiz
);
399 SYSCALL_DEFINE3(osf_statfs64
, char __user
*, pathname
,
400 struct osf_statfs64 __user
*, buffer
, unsigned long, bufsiz
)
402 struct kstatfs linux_stat
;
403 int error
= user_statfs(pathname
, &linux_stat
);
405 error
= linux_to_osf_statfs64(&linux_stat
, buffer
, bufsiz
);
409 SYSCALL_DEFINE3(osf_fstatfs64
, unsigned long, fd
,
410 struct osf_statfs64 __user
*, buffer
, unsigned long, bufsiz
)
412 struct kstatfs linux_stat
;
413 int error
= fd_statfs(fd
, &linux_stat
);
415 error
= linux_to_osf_statfs64(&linux_stat
, buffer
, bufsiz
);
420 * Uhh.. OSF/1 mount parameters aren't exactly obvious..
422 * Although to be frank, neither are the native Linux/i386 ones..
425 char __user
*devname
;
431 char __user
*devname
;
435 /* This has lots more here, which Linux handles with the option block
436 but I'm too lazy to do the translation into ASCII. */
440 char __user
*devname
;
446 * We can't actually handle ufs yet, so we translate UFS mounts to
447 * ext2fs mounts. I wouldn't mind a UFS filesystem, but the UFS
448 * layout is so braindead it's a major headache doing it.
450 * Just how long ago was it written? OTOH our UFS driver may be still
451 * unhappy with OSF UFS. [CHECKME]
454 osf_ufs_mount(const char __user
*dirname
,
455 struct ufs_args __user
*args
, int flags
)
458 struct cdfs_args tmp
;
459 struct filename
*devname
;
462 if (copy_from_user(&tmp
, args
, sizeof(tmp
)))
464 devname
= getname(tmp
.devname
);
465 retval
= PTR_ERR(devname
);
468 retval
= do_mount(devname
->name
, dirname
, "ext2", flags
, NULL
);
475 osf_cdfs_mount(const char __user
*dirname
,
476 struct cdfs_args __user
*args
, int flags
)
479 struct cdfs_args tmp
;
480 struct filename
*devname
;
483 if (copy_from_user(&tmp
, args
, sizeof(tmp
)))
485 devname
= getname(tmp
.devname
);
486 retval
= PTR_ERR(devname
);
489 retval
= do_mount(devname
->name
, dirname
, "iso9660", flags
, NULL
);
496 osf_procfs_mount(const char __user
*dirname
,
497 struct procfs_args __user
*args
, int flags
)
499 struct procfs_args tmp
;
501 if (copy_from_user(&tmp
, args
, sizeof(tmp
)))
504 return do_mount("", dirname
, "proc", flags
, NULL
);
507 SYSCALL_DEFINE4(osf_mount
, unsigned long, typenr
, const char __user
*, path
,
508 int, flag
, void __user
*, data
)
514 retval
= osf_ufs_mount(path
, data
, flag
);
517 retval
= osf_cdfs_mount(path
, data
, flag
);
520 retval
= osf_procfs_mount(path
, data
, flag
);
524 printk("osf_mount(%ld, %x)\n", typenr
, flag
);
530 SYSCALL_DEFINE1(osf_utsname
, char __user
*, name
)
535 memcpy(tmp
+ 0 * 32, utsname()->sysname
, 32);
536 memcpy(tmp
+ 1 * 32, utsname()->nodename
, 32);
537 memcpy(tmp
+ 2 * 32, utsname()->release
, 32);
538 memcpy(tmp
+ 3 * 32, utsname()->version
, 32);
539 memcpy(tmp
+ 4 * 32, utsname()->machine
, 32);
542 if (copy_to_user(name
, tmp
, sizeof(tmp
)))
547 SYSCALL_DEFINE0(getpagesize
)
552 SYSCALL_DEFINE0(getdtablesize
)
554 return sysctl_nr_open
;
558 * For compatibility with OSF/1 only. Use utsname(2) instead.
560 SYSCALL_DEFINE2(osf_getdomainname
, char __user
*, name
, int, namelen
)
566 if (namelen
< 0 || namelen
> 32)
570 kname
= utsname()->domainname
;
571 len
= strnlen(kname
, namelen
);
572 len
= min(len
+ 1, namelen
);
573 memcpy(tmp
, kname
, len
);
576 if (copy_to_user(name
, tmp
, len
))
582 * The following stuff should move into a header file should it ever
583 * be labeled "officially supported." Right now, there is just enough
584 * support to avoid applications (such as tar) printing error
585 * messages. The attributes are not really implemented.
589 * Values for Property list entry flag
591 #define PLE_PROPAGATE_ON_COPY 0x1 /* cp(1) will copy entry
593 #define PLE_FLAG_MASK 0x1 /* Valid flag values */
594 #define PLE_FLAG_ALL -1 /* All flag value */
596 struct proplistname_args
{
597 unsigned int pl_mask
;
598 unsigned int pl_numnames
;
617 struct proplistname_args __user
*name_args
;
620 int __user
*min_buf_size
;
624 struct proplistname_args __user
*name_args
;
627 int __user
*min_buf_size
;
632 struct proplistname_args __user
*name_args
;
636 struct proplistname_args __user
*name_args
;
641 PL_SET
= 1, PL_FSET
= 2,
642 PL_GET
= 3, PL_FGET
= 4,
643 PL_DEL
= 5, PL_FDEL
= 6
646 SYSCALL_DEFINE2(osf_proplist_syscall
, enum pl_code
, code
,
647 union pl_args __user
*, args
)
650 int __user
*min_buf_size_ptr
;
654 if (get_user(error
, &args
->set
.nbytes
))
658 if (get_user(error
, &args
->fset
.nbytes
))
662 error
= get_user(min_buf_size_ptr
, &args
->get
.min_buf_size
);
665 error
= put_user(0, min_buf_size_ptr
);
668 error
= get_user(min_buf_size_ptr
, &args
->fget
.min_buf_size
);
671 error
= put_user(0, min_buf_size_ptr
);
684 SYSCALL_DEFINE2(osf_sigstack
, struct sigstack __user
*, uss
,
685 struct sigstack __user
*, uoss
)
687 unsigned long usp
= rdusp();
688 unsigned long oss_sp
= current
->sas_ss_sp
+ current
->sas_ss_size
;
689 unsigned long oss_os
= on_sig_stack(usp
);
696 if (get_user(ss_sp
, &uss
->ss_sp
))
699 /* If the current stack was set with sigaltstack, don't
700 swap stacks while we are on it. */
702 if (current
->sas_ss_sp
&& on_sig_stack(usp
))
705 /* Since we don't know the extent of the stack, and we don't
706 track onstack-ness, but rather calculate it, we must
707 presume a size. Ho hum this interface is lossy. */
708 current
->sas_ss_sp
= (unsigned long)ss_sp
- SIGSTKSZ
;
709 current
->sas_ss_size
= SIGSTKSZ
;
714 if (put_user(oss_sp
, &uoss
->ss_sp
) ||
715 put_user(oss_os
, &uoss
->ss_onstack
))
724 SYSCALL_DEFINE3(osf_sysinfo
, int, command
, char __user
*, buf
, long, count
)
726 const char *sysinfo_table
[] = {
732 "alpha", /* instruction set architecture */
733 "dummy", /* hardware serial number */
734 "dummy", /* hardware manufacturer */
735 "dummy", /* secure RPC domain */
737 unsigned long offset
;
740 char tmp
[__NEW_UTS_LEN
+ 1];
743 if (offset
>= ARRAY_SIZE(sysinfo_table
)) {
744 /* Digital UNIX has a few unpublished interfaces here */
745 printk("sysinfo(%d)", command
);
750 res
= sysinfo_table
[offset
];
752 if ((unsigned long)len
> (unsigned long)count
)
754 memcpy(tmp
, res
, len
);
756 if (copy_to_user(buf
, tmp
, len
))
761 SYSCALL_DEFINE5(osf_getsysinfo
, unsigned long, op
, void __user
*, buffer
,
762 unsigned long, nbytes
, int __user
*, start
, void __user
*, arg
)
765 struct percpu_struct
*cpu
;
768 case GSI_IEEE_FP_CONTROL
:
769 /* Return current software fp control & status bits. */
770 /* Note that DU doesn't verify available space here. */
772 w
= current_thread_info()->ieee_state
& IEEE_SW_MASK
;
773 w
= swcr_update_status(w
, rdfpcr());
774 if (put_user(w
, (unsigned long __user
*) buffer
))
778 case GSI_IEEE_STATE_AT_SIGNAL
:
780 * Not sure anybody will ever use this weird stuff. These
781 * ops can be used (under OSF/1) to set the fpcr that should
782 * be used when a signal handler starts executing.
787 if (nbytes
< sizeof(unsigned int))
789 w
= current_thread_info()->status
& UAC_BITMASK
;
790 if (put_user(w
, (unsigned int __user
*)buffer
))
795 if (nbytes
< sizeof(unsigned long))
797 cpu
= (struct percpu_struct
*)
798 ((char*)hwrpb
+ hwrpb
->processor_offset
);
800 if (put_user(w
, (unsigned long __user
*)buffer
))
805 if (nbytes
> sizeof(*hwrpb
))
807 if (copy_to_user(buffer
, hwrpb
, nbytes
) != 0)
818 SYSCALL_DEFINE5(osf_setsysinfo
, unsigned long, op
, void __user
*, buffer
,
819 unsigned long, nbytes
, int __user
*, start
, void __user
*, arg
)
822 case SSI_IEEE_FP_CONTROL
: {
823 unsigned long swcr
, fpcr
;
827 * Alpha Architecture Handbook 4.7.7.3:
828 * To be fully IEEE compiant, we must track the current IEEE
829 * exception state in software, because spurious bits can be
830 * set in the trap shadow of a software-complete insn.
833 if (get_user(swcr
, (unsigned long __user
*)buffer
))
835 state
= ¤t_thread_info()->ieee_state
;
837 /* Update softare trap enable bits. */
838 *state
= (*state
& ~IEEE_SW_MASK
) | (swcr
& IEEE_SW_MASK
);
840 /* Update the real fpcr. */
841 fpcr
= rdfpcr() & FPCR_DYN_MASK
;
842 fpcr
|= ieee_swcr_to_fpcr(swcr
);
848 case SSI_IEEE_RAISE_EXCEPTION
: {
849 unsigned long exc
, swcr
, fpcr
, fex
;
852 if (get_user(exc
, (unsigned long __user
*)buffer
))
854 state
= ¤t_thread_info()->ieee_state
;
855 exc
&= IEEE_STATUS_MASK
;
857 /* Update softare trap enable bits. */
858 swcr
= (*state
& IEEE_SW_MASK
) | exc
;
861 /* Update the real fpcr. */
863 fpcr
|= ieee_swcr_to_fpcr(swcr
);
866 /* If any exceptions set by this call, and are unmasked,
867 send a signal. Old exceptions are not signaled. */
868 fex
= (exc
>> IEEE_STATUS_TO_EXCSUM_SHIFT
) & swcr
;
870 int si_code
= FPE_FLTUNK
;
872 if (fex
& IEEE_TRAP_ENABLE_DNO
) si_code
= FPE_FLTUND
;
873 if (fex
& IEEE_TRAP_ENABLE_INE
) si_code
= FPE_FLTRES
;
874 if (fex
& IEEE_TRAP_ENABLE_UNF
) si_code
= FPE_FLTUND
;
875 if (fex
& IEEE_TRAP_ENABLE_OVF
) si_code
= FPE_FLTOVF
;
876 if (fex
& IEEE_TRAP_ENABLE_DZE
) si_code
= FPE_FLTDIV
;
877 if (fex
& IEEE_TRAP_ENABLE_INV
) si_code
= FPE_FLTINV
;
879 send_sig_fault(SIGFPE
, si_code
,
880 (void __user
*)NULL
, /* FIXME */
886 case SSI_IEEE_STATE_AT_SIGNAL
:
887 case SSI_IEEE_IGNORE_STATE_AT_SIGNAL
:
889 * Not sure anybody will ever use this weird stuff. These
890 * ops can be used (under OSF/1) to set the fpcr that should
891 * be used when a signal handler starts executing.
896 unsigned __user
*p
= buffer
;
899 for (i
= 0, p
= buffer
; i
< nbytes
; ++i
, p
+= 2) {
900 unsigned v
, w
, status
;
902 if (get_user(v
, p
) || get_user(w
, p
+ 1))
907 status
= current_thread_info()->status
;
908 status
= (status
& ~UAC_BITMASK
) | w
;
909 current_thread_info()->status
= status
;
929 /* Translations due to the fact that OSF's time_t is an int. Which
930 affects all sorts of things, like timeval and itimerval. */
932 extern struct timezone sys_tz
;
941 struct timeval32 it_interval
;
942 struct timeval32 it_value
;
946 get_tv32(struct timespec64
*o
, struct timeval32 __user
*i
)
949 if (copy_from_user(&tv
, i
, sizeof(struct timeval32
)))
951 o
->tv_sec
= tv
.tv_sec
;
952 o
->tv_nsec
= tv
.tv_usec
* NSEC_PER_USEC
;
957 put_tv32(struct timeval32 __user
*o
, struct timespec64
*i
)
959 return copy_to_user(o
, &(struct timeval32
){
961 .tv_usec
= i
->tv_nsec
/ NSEC_PER_USEC
},
962 sizeof(struct timeval32
));
966 put_tv_to_tv32(struct timeval32 __user
*o
, struct __kernel_old_timeval
*i
)
968 return copy_to_user(o
, &(struct timeval32
){
970 .tv_usec
= i
->tv_usec
},
971 sizeof(struct timeval32
));
975 jiffies_to_timeval32(unsigned long jiffies
, struct timeval32
*value
)
977 value
->tv_usec
= (jiffies
% HZ
) * (1000000L / HZ
);
978 value
->tv_sec
= jiffies
/ HZ
;
981 SYSCALL_DEFINE2(osf_gettimeofday
, struct timeval32 __user
*, tv
,
982 struct timezone __user
*, tz
)
985 struct timespec64 kts
;
987 ktime_get_real_ts64(&kts
);
988 if (put_tv32(tv
, &kts
))
992 if (copy_to_user(tz
, &sys_tz
, sizeof(sys_tz
)))
998 SYSCALL_DEFINE2(osf_settimeofday
, struct timeval32 __user
*, tv
,
999 struct timezone __user
*, tz
)
1001 struct timespec64 kts
;
1002 struct timezone ktz
;
1005 if (get_tv32(&kts
, tv
))
1009 if (copy_from_user(&ktz
, tz
, sizeof(*tz
)))
1013 return do_sys_settimeofday64(tv
? &kts
: NULL
, tz
? &ktz
: NULL
);
1016 asmlinkage
long sys_ni_posix_timers(void);
1018 SYSCALL_DEFINE2(osf_utimes
, const char __user
*, filename
,
1019 struct timeval32 __user
*, tvs
)
1021 struct timespec64 tv
[2];
1024 if (get_tv32(&tv
[0], &tvs
[0]) ||
1025 get_tv32(&tv
[1], &tvs
[1]))
1028 if (tv
[0].tv_nsec
< 0 || tv
[0].tv_nsec
>= 1000000000 ||
1029 tv
[1].tv_nsec
< 0 || tv
[1].tv_nsec
>= 1000000000)
1033 return do_utimes(AT_FDCWD
, filename
, tvs
? tv
: NULL
, 0);
1036 SYSCALL_DEFINE5(osf_select
, int, n
, fd_set __user
*, inp
, fd_set __user
*, outp
,
1037 fd_set __user
*, exp
, struct timeval32 __user
*, tvp
)
1039 struct timespec64 end_time
, *to
= NULL
;
1041 struct timespec64 tv
;
1044 if (get_tv32(&tv
, tvp
))
1047 if (tv
.tv_sec
< 0 || tv
.tv_nsec
< 0)
1050 if (poll_select_set_timeout(to
, tv
.tv_sec
, tv
.tv_nsec
))
1055 /* OSF does not copy back the remaining time. */
1056 return core_sys_select(n
, inp
, outp
, exp
, to
);
1060 struct timeval32 ru_utime
; /* user time used */
1061 struct timeval32 ru_stime
; /* system time used */
1062 long ru_maxrss
; /* maximum resident set size */
1063 long ru_ixrss
; /* integral shared memory size */
1064 long ru_idrss
; /* integral unshared data size */
1065 long ru_isrss
; /* integral unshared stack size */
1066 long ru_minflt
; /* page reclaims */
1067 long ru_majflt
; /* page faults */
1068 long ru_nswap
; /* swaps */
1069 long ru_inblock
; /* block input operations */
1070 long ru_oublock
; /* block output operations */
1071 long ru_msgsnd
; /* messages sent */
1072 long ru_msgrcv
; /* messages received */
1073 long ru_nsignals
; /* signals received */
1074 long ru_nvcsw
; /* voluntary context switches */
1075 long ru_nivcsw
; /* involuntary " */
1078 SYSCALL_DEFINE2(osf_getrusage
, int, who
, struct rusage32 __user
*, ru
)
1082 unsigned long utime_jiffies
, stime_jiffies
;
1084 if (who
!= RUSAGE_SELF
&& who
!= RUSAGE_CHILDREN
)
1087 memset(&r
, 0, sizeof(r
));
1090 task_cputime(current
, &utime
, &stime
);
1091 utime_jiffies
= nsecs_to_jiffies(utime
);
1092 stime_jiffies
= nsecs_to_jiffies(stime
);
1093 jiffies_to_timeval32(utime_jiffies
, &r
.ru_utime
);
1094 jiffies_to_timeval32(stime_jiffies
, &r
.ru_stime
);
1095 r
.ru_minflt
= current
->min_flt
;
1096 r
.ru_majflt
= current
->maj_flt
;
1098 case RUSAGE_CHILDREN
:
1099 utime_jiffies
= nsecs_to_jiffies(current
->signal
->cutime
);
1100 stime_jiffies
= nsecs_to_jiffies(current
->signal
->cstime
);
1101 jiffies_to_timeval32(utime_jiffies
, &r
.ru_utime
);
1102 jiffies_to_timeval32(stime_jiffies
, &r
.ru_stime
);
1103 r
.ru_minflt
= current
->signal
->cmin_flt
;
1104 r
.ru_majflt
= current
->signal
->cmaj_flt
;
1108 return copy_to_user(ru
, &r
, sizeof(r
)) ? -EFAULT
: 0;
1111 SYSCALL_DEFINE4(osf_wait4
, pid_t
, pid
, int __user
*, ustatus
, int, options
,
1112 struct rusage32 __user
*, ur
)
1115 long err
= kernel_wait4(pid
, ustatus
, options
, &r
);
1120 if (put_tv_to_tv32(&ur
->ru_utime
, &r
.ru_utime
))
1122 if (put_tv_to_tv32(&ur
->ru_stime
, &r
.ru_stime
))
1124 if (copy_to_user(&ur
->ru_maxrss
, &r
.ru_maxrss
,
1125 sizeof(struct rusage32
) - offsetof(struct rusage32
, ru_maxrss
)))
1131 * I don't know what the parameters are: the first one
1132 * seems to be a timeval pointer, and I suspect the second
1133 * one is the time remaining.. Ho humm.. No documentation.
1135 SYSCALL_DEFINE2(osf_usleep_thread
, struct timeval32 __user
*, sleep
,
1136 struct timeval32 __user
*, remain
)
1138 struct timespec64 tmp
;
1139 unsigned long ticks
;
1141 if (get_tv32(&tmp
, sleep
))
1144 ticks
= timespec64_to_jiffies(&tmp
);
1146 ticks
= schedule_timeout_interruptible(ticks
);
1149 jiffies_to_timespec64(ticks
, &tmp
);
1150 if (put_tv32(remain
, &tmp
))
1161 unsigned int modes
; /* mode selector */
1162 long offset
; /* time offset (usec) */
1163 long freq
; /* frequency offset (scaled ppm) */
1164 long maxerror
; /* maximum error (usec) */
1165 long esterror
; /* estimated error (usec) */
1166 int status
; /* clock command/status */
1167 long constant
; /* pll time constant */
1168 long precision
; /* clock precision (usec) (read only) */
1169 long tolerance
; /* clock frequency tolerance (ppm)
1172 struct timeval32 time
; /* (read only) */
1173 long tick
; /* (modified) usecs between clock ticks */
1175 long ppsfreq
; /* pps frequency (scaled ppm) (ro) */
1176 long jitter
; /* pps jitter (us) (ro) */
1177 int shift
; /* interval duration (s) (shift) (ro) */
1178 long stabil
; /* pps stability (scaled ppm) (ro) */
1179 long jitcnt
; /* jitter limit exceeded (ro) */
1180 long calcnt
; /* calibration intervals (ro) */
1181 long errcnt
; /* calibration errors (ro) */
1182 long stbcnt
; /* stability limit exceeded (ro) */
1184 int :32; int :32; int :32; int :32;
1185 int :32; int :32; int :32; int :32;
1186 int :32; int :32; int :32; int :32;
1189 SYSCALL_DEFINE1(old_adjtimex
, struct timex32 __user
*, txc_p
)
1191 struct __kernel_timex txc
;
1194 /* copy relevant bits of struct timex. */
1195 if (copy_from_user(&txc
, txc_p
, offsetof(struct timex32
, time
)) ||
1196 copy_from_user(&txc
.tick
, &txc_p
->tick
, sizeof(struct timex32
) -
1197 offsetof(struct timex32
, tick
)))
1200 ret
= do_adjtimex(&txc
);
1204 /* copy back to timex32 */
1205 if (copy_to_user(txc_p
, &txc
, offsetof(struct timex32
, time
)) ||
1206 (copy_to_user(&txc_p
->tick
, &txc
.tick
, sizeof(struct timex32
) -
1207 offsetof(struct timex32
, tick
))) ||
1208 (put_user(txc
.time
.tv_sec
, &txc_p
->time
.tv_sec
)) ||
1209 (put_user(txc
.time
.tv_usec
, &txc_p
->time
.tv_usec
)))
1215 /* Get an address range which is currently unmapped. Similar to the
1216 generic version except that we know how to honor ADDR_LIMIT_32BIT. */
1218 static unsigned long
1219 arch_get_unmapped_area_1(unsigned long addr
, unsigned long len
,
1220 unsigned long limit
)
1222 struct vm_unmapped_area_info info
;
1226 info
.low_limit
= addr
;
1227 info
.high_limit
= limit
;
1228 info
.align_mask
= 0;
1229 info
.align_offset
= 0;
1230 return vm_unmapped_area(&info
);
1234 arch_get_unmapped_area(struct file
*filp
, unsigned long addr
,
1235 unsigned long len
, unsigned long pgoff
,
1236 unsigned long flags
)
1238 unsigned long limit
;
1240 /* "32 bit" actually means 31 bit, since pointers sign extend. */
1241 if (current
->personality
& ADDR_LIMIT_32BIT
)
1249 if (flags
& MAP_FIXED
)
1252 /* First, see if the given suggestion fits.
1254 The OSF/1 loader (/sbin/loader) relies on us returning an
1255 address larger than the requested if one exists, which is
1256 a terribly broken way to program.
1258 That said, I can see the use in being able to suggest not
1259 merely specific addresses, but regions of memory -- perhaps
1260 this feature should be incorporated into all ports? */
1263 addr
= arch_get_unmapped_area_1 (PAGE_ALIGN(addr
), len
, limit
);
1264 if (addr
!= (unsigned long) -ENOMEM
)
1268 /* Next, try allocating at TASK_UNMAPPED_BASE. */
1269 addr
= arch_get_unmapped_area_1 (PAGE_ALIGN(TASK_UNMAPPED_BASE
),
1271 if (addr
!= (unsigned long) -ENOMEM
)
1274 /* Finally, try allocating in low memory. */
1275 addr
= arch_get_unmapped_area_1 (PAGE_SIZE
, len
, limit
);
1280 #ifdef CONFIG_OSF4_COMPAT
1281 /* Clear top 32 bits of iov_len in the user's buffer for
1282 compatibility with old versions of OSF/1 where iov_len
1283 was defined as int. */
1285 osf_fix_iov_len(const struct iovec __user
*iov
, unsigned long count
)
1289 for (i
= 0 ; i
< count
; i
++) {
1290 int __user
*iov_len_high
= (int __user
*)&iov
[i
].iov_len
+ 1;
1292 if (put_user(0, iov_len_high
))
1299 SYSCALL_DEFINE3(osf_readv
, unsigned long, fd
,
1300 const struct iovec __user
*, vector
, unsigned long, count
)
1302 #ifdef CONFIG_OSF4_COMPAT
1303 if (unlikely(personality(current
->personality
) == PER_OSF4
))
1304 if (osf_fix_iov_len(vector
, count
))
1308 return sys_readv(fd
, vector
, count
);
1311 SYSCALL_DEFINE3(osf_writev
, unsigned long, fd
,
1312 const struct iovec __user
*, vector
, unsigned long, count
)
1314 #ifdef CONFIG_OSF4_COMPAT
1315 if (unlikely(personality(current
->personality
) == PER_OSF4
))
1316 if (osf_fix_iov_len(vector
, count
))
1319 return sys_writev(fd
, vector
, count
);
1322 SYSCALL_DEFINE2(osf_getpriority
, int, which
, int, who
)
1324 int prio
= sys_getpriority(which
, who
);
1326 /* Return value is the unbiased priority, i.e. 20 - prio.
1327 This does result in negative return values, so signal
1329 force_successful_syscall_return();
1335 SYSCALL_DEFINE0(getxuid
)
1337 current_pt_regs()->r20
= sys_geteuid();
1338 return sys_getuid();
1341 SYSCALL_DEFINE0(getxgid
)
1343 current_pt_regs()->r20
= sys_getegid();
1344 return sys_getgid();
1347 SYSCALL_DEFINE0(getxpid
)
1349 current_pt_regs()->r20
= sys_getppid();
1350 return sys_getpid();
1353 SYSCALL_DEFINE0(alpha_pipe
)
1356 int res
= do_pipe_flags(fd
, 0);
1358 /* The return values are in $0 and $20. */
1359 current_pt_regs()->r20
= fd
[1];
1365 SYSCALL_DEFINE1(sethae
, unsigned long, val
)
1367 current_pt_regs()->hae
= val
;