2 * sys_ia32.c: Conversion between 32bit and 64bit native syscalls. Derived from sys_sparc32.c.
4 * Copyright (C) 2000 VA Linux Co
5 * Copyright (C) 2000 Don Dugger <n0ano@valinux.com>
6 * Copyright (C) 1999 Arun Sharma <arun.sharma@intel.com>
7 * Copyright (C) 1997,1998 Jakub Jelinek (jj@sunsite.mff.cuni.cz)
8 * Copyright (C) 1997 David S. Miller (davem@caip.rutgers.edu)
9 * Copyright (C) 2000-2003 Hewlett-Packard Co
10 * David Mosberger-Tang <davidm@hpl.hp.com>
12 * These routines maintain argument size conversion between 32bit and 64bit
16 #include <linux/config.h>
17 #include <linux/kernel.h>
18 #include <linux/syscalls.h>
19 #include <linux/sysctl.h>
20 #include <linux/sched.h>
22 #include <linux/file.h>
23 #include <linux/signal.h>
24 #include <linux/resource.h>
25 #include <linux/times.h>
26 #include <linux/utsname.h>
27 #include <linux/timex.h>
28 #include <linux/smp.h>
29 #include <linux/smp_lock.h>
30 #include <linux/sem.h>
31 #include <linux/msg.h>
33 #include <linux/shm.h>
34 #include <linux/slab.h>
35 #include <linux/uio.h>
36 #include <linux/nfs_fs.h>
37 #include <linux/quota.h>
38 #include <linux/sunrpc/svc.h>
39 #include <linux/nfsd/nfsd.h>
40 #include <linux/nfsd/cache.h>
41 #include <linux/nfsd/xdr.h>
42 #include <linux/nfsd/syscall.h>
43 #include <linux/poll.h>
44 #include <linux/eventpoll.h>
45 #include <linux/personality.h>
46 #include <linux/ptrace.h>
47 #include <linux/stat.h>
48 #include <linux/ipc.h>
49 #include <linux/compat.h>
50 #include <linux/vfs.h>
52 #include <asm/intrinsics.h>
53 #include <asm/semaphore.h>
54 #include <asm/types.h>
55 #include <asm/uaccess.h>
56 #include <asm/unistd.h>
66 # define DBG(fmt...) printk(KERN_DEBUG fmt)
71 #define A(__x) ((unsigned long)(__x))
72 #define AA(__x) ((unsigned long)(__x))
73 #define ROUND_UP(x,a) ((__typeof__(x))(((unsigned long)(x) + ((a) - 1)) & ~((a) - 1)))
74 #define NAME_OFFSET(de) ((int) ((de)->d_name - (char *) (de)))
76 #define OFFSET4K(a) ((a) & 0xfff)
77 #define PAGE_START(addr) ((addr) & PAGE_MASK)
78 #define MINSIGSTKSZ_IA32 2048
80 #define high2lowuid(uid) ((uid) > 65535 ? 65534 : (uid))
81 #define high2lowgid(gid) ((gid) > 65535 ? 65534 : (gid))
83 extern unsigned long arch_get_unmapped_area (struct file *, unsigned long, unsigned long,
84 unsigned long, unsigned long);
87 * Anything that modifies or inspects ia32 user virtual memory must hold this semaphore
90 /* XXX make per-mm: */
91 static DECLARE_MUTEX(ia32_mmap_sem);
94 sys32_execve (char *name, compat_uptr_t __user *argv, compat_uptr_t __user *envp, struct pt_regs *regs)
98 unsigned long old_map_base, old_task_size, tssd;
100 filename = getname(name);
101 error = PTR_ERR(filename);
102 if (IS_ERR(filename))
105 old_map_base = current->thread.map_base;
106 old_task_size = current->thread.task_size;
107 tssd = ia64_get_kr(IA64_KR_TSSD);
109 /* we may be exec'ing a 64-bit process: reset map base, task-size, and io-base: */
110 current->thread.map_base = DEFAULT_MAP_BASE;
111 current->thread.task_size = DEFAULT_TASK_SIZE;
112 ia64_set_kr(IA64_KR_IO_BASE, current->thread.old_iob);
113 ia64_set_kr(IA64_KR_TSSD, current->thread.old_k1);
115 error = compat_do_execve(filename, argv, envp, regs);
119 /* oops, execve failed, switch back to old values... */
120 ia64_set_kr(IA64_KR_IO_BASE, IA32_IOBASE);
121 ia64_set_kr(IA64_KR_TSSD, tssd);
122 current->thread.map_base = old_map_base;
123 current->thread.task_size = old_task_size;
129 int cp_compat_stat(struct kstat *stat, struct compat_stat *ubuf)
133 if ((u64) stat->size > MAX_NON_LFS ||
134 !old_valid_dev(stat->dev) ||
135 !old_valid_dev(stat->rdev))
138 if (clear_user(ubuf, sizeof(*ubuf)))
141 err = __put_user(old_encode_dev(stat->dev), &ubuf->st_dev);
142 err |= __put_user(stat->ino, &ubuf->st_ino);
143 err |= __put_user(stat->mode, &ubuf->st_mode);
144 err |= __put_user(stat->nlink, &ubuf->st_nlink);
145 err |= __put_user(high2lowuid(stat->uid), &ubuf->st_uid);
146 err |= __put_user(high2lowgid(stat->gid), &ubuf->st_gid);
147 err |= __put_user(old_encode_dev(stat->rdev), &ubuf->st_rdev);
148 err |= __put_user(stat->size, &ubuf->st_size);
149 err |= __put_user(stat->atime.tv_sec, &ubuf->st_atime);
150 err |= __put_user(stat->atime.tv_nsec, &ubuf->st_atime_nsec);
151 err |= __put_user(stat->mtime.tv_sec, &ubuf->st_mtime);
152 err |= __put_user(stat->mtime.tv_nsec, &ubuf->st_mtime_nsec);
153 err |= __put_user(stat->ctime.tv_sec, &ubuf->st_ctime);
154 err |= __put_user(stat->ctime.tv_nsec, &ubuf->st_ctime_nsec);
155 err |= __put_user(stat->blksize, &ubuf->st_blksize);
156 err |= __put_user(stat->blocks, &ubuf->st_blocks);
160 #if PAGE_SHIFT > IA32_PAGE_SHIFT
164 get_page_prot (struct vm_area_struct *vma, unsigned long addr)
168 if (!vma || vma->vm_start > addr)
171 if (vma->vm_flags & VM_READ)
173 if (vma->vm_flags & VM_WRITE)
175 if (vma->vm_flags & VM_EXEC)
181 * Map a subpage by creating an anonymous page that contains the union of the old page and
185 mmap_subpage (struct file *file, unsigned long start, unsigned long end, int prot, int flags,
190 unsigned long ret = 0;
191 struct vm_area_struct *vma = find_vma(current->mm, start);
192 int old_prot = get_page_prot(vma, start);
194 DBG("mmap_subpage(file=%p,start=0x%lx,end=0x%lx,prot=%x,flags=%x,off=0x%llx)\n",
195 file, start, end, prot, flags, off);
198 /* Optimize the case where the old mmap and the new mmap are both anonymous */
199 if ((old_prot & PROT_WRITE) && (flags & MAP_ANONYMOUS) && !vma->vm_file) {
200 if (clear_user((void *) start, end - start)) {
207 page = (void *) get_zeroed_page(GFP_KERNEL);
212 copy_from_user(page, (void *) PAGE_START(start), PAGE_SIZE);
214 down_write(¤t->mm->mmap_sem);
216 ret = do_mmap(0, PAGE_START(start), PAGE_SIZE, prot | PROT_WRITE,
217 flags | MAP_FIXED | MAP_ANONYMOUS, 0);
219 up_write(¤t->mm->mmap_sem);
221 if (IS_ERR((void *) ret))
225 /* copy back the old page contents. */
226 if (offset_in_page(start))
227 copy_to_user((void *) PAGE_START(start), page, offset_in_page(start));
228 if (offset_in_page(end))
229 copy_to_user((void *) end, page + offset_in_page(end),
230 PAGE_SIZE - offset_in_page(end));
233 if (!(flags & MAP_ANONYMOUS)) {
234 /* read the file contents */
235 inode = file->f_dentry->d_inode;
236 if (!inode->i_fop || !file->f_op->read
237 || ((*file->f_op->read)(file, (char *) start, end - start, &off) < 0))
245 if (!(prot & PROT_WRITE))
246 ret = sys_mprotect(PAGE_START(start), PAGE_SIZE, prot | old_prot);
249 free_page((unsigned long) page);
254 emulate_mmap (struct file *file, unsigned long start, unsigned long len, int prot, int flags,
257 unsigned long tmp, end, pend, pstart, ret, is_congruent, fudge = 0;
262 pstart = PAGE_START(start);
263 pend = PAGE_ALIGN(end);
265 if (flags & MAP_FIXED) {
266 if (start > pstart) {
267 if (flags & MAP_SHARED)
269 "%s(%d): emulate_mmap() can't share head (addr=0x%lx)\n",
270 current->comm, current->pid, start);
271 ret = mmap_subpage(file, start, min(PAGE_ALIGN(start), end), prot, flags,
273 if (IS_ERR((void *) ret))
277 return start; /* done */
280 if (flags & MAP_SHARED)
282 "%s(%d): emulate_mmap() can't share tail (end=0x%lx)\n",
283 current->comm, current->pid, end);
284 ret = mmap_subpage(file, max(start, PAGE_START(end)), end, prot, flags,
285 (off + len) - offset_in_page(end));
286 if (IS_ERR((void *) ret))
290 return start; /* done */
294 * If a start address was specified, use it if the entire rounded out area
297 if (start && !pstart)
298 fudge = 1; /* handle case of mapping to range (0,PAGE_SIZE) */
299 tmp = arch_get_unmapped_area(file, pstart - fudge, pend - pstart, 0, flags);
302 start = pstart + offset_in_page(off); /* make start congruent with off */
304 pend = PAGE_ALIGN(end);
308 poff = off + (pstart - start); /* note: (pstart - start) may be negative */
309 is_congruent = (flags & MAP_ANONYMOUS) || (offset_in_page(poff) == 0);
311 if ((flags & MAP_SHARED) && !is_congruent)
312 printk(KERN_INFO "%s(%d): emulate_mmap() can't share contents of incongruent mmap "
313 "(addr=0x%lx,off=0x%llx)\n", current->comm, current->pid, start, off);
315 DBG("mmap_body: mapping [0x%lx-0x%lx) %s with poff 0x%llx\n", pstart, pend,
316 is_congruent ? "congruent" : "not congruent", poff);
318 down_write(¤t->mm->mmap_sem);
320 if (!(flags & MAP_ANONYMOUS) && is_congruent)
321 ret = do_mmap(file, pstart, pend - pstart, prot, flags | MAP_FIXED, poff);
323 ret = do_mmap(0, pstart, pend - pstart,
324 prot | ((flags & MAP_ANONYMOUS) ? 0 : PROT_WRITE),
325 flags | MAP_FIXED | MAP_ANONYMOUS, 0);
327 up_write(¤t->mm->mmap_sem);
329 if (IS_ERR((void *) ret))
333 /* read the file contents */
334 inode = file->f_dentry->d_inode;
335 if (!inode->i_fop || !file->f_op->read
336 || ((*file->f_op->read)(file, (char *) pstart, pend - pstart, &poff) < 0))
338 sys_munmap(pstart, pend - pstart);
341 if (!(prot & PROT_WRITE) && sys_mprotect(pstart, pend - pstart, prot) < 0)
347 #endif /* PAGE_SHIFT > IA32_PAGE_SHIFT */
349 static inline unsigned int
350 get_prot32 (unsigned int prot)
352 if (prot & PROT_WRITE)
353 /* on x86, PROT_WRITE implies PROT_READ which implies PROT_EEC */
354 prot |= PROT_READ | PROT_WRITE | PROT_EXEC;
355 else if (prot & (PROT_READ | PROT_EXEC))
356 /* on x86, there is no distinction between PROT_READ and PROT_EXEC */
357 prot |= (PROT_READ | PROT_EXEC);
363 ia32_do_mmap (struct file *file, unsigned long addr, unsigned long len, int prot, int flags,
366 DBG("ia32_do_mmap(file=%p,addr=0x%lx,len=0x%lx,prot=%x,flags=%x,offset=0x%llx)\n",
367 file, addr, len, prot, flags, offset);
369 if (file && (!file->f_op || !file->f_op->mmap))
372 len = IA32_PAGE_ALIGN(len);
376 if (len > IA32_PAGE_OFFSET || addr > IA32_PAGE_OFFSET - len)
378 if (flags & MAP_FIXED)
384 if (OFFSET4K(offset))
387 prot = get_prot32(prot);
389 #if PAGE_SHIFT > IA32_PAGE_SHIFT
390 down(&ia32_mmap_sem);
392 addr = emulate_mmap(file, addr, len, prot, flags, offset);
396 down_write(¤t->mm->mmap_sem);
398 addr = do_mmap(file, addr, len, prot, flags, offset);
400 up_write(¤t->mm->mmap_sem);
402 DBG("ia32_do_mmap: returning 0x%lx\n", addr);
407 * Linux/i386 didn't use to be able to handle more than 4 system call parameters, so these
408 * system calls used a memory block for parameter passing..
411 struct mmap_arg_struct {
421 sys32_mmap (struct mmap_arg_struct *arg)
423 struct mmap_arg_struct a;
424 struct file *file = NULL;
428 if (copy_from_user(&a, arg, sizeof(a)))
431 if (OFFSET4K(a.offset))
436 flags &= ~(MAP_EXECUTABLE | MAP_DENYWRITE);
437 if (!(flags & MAP_ANONYMOUS)) {
443 addr = ia32_do_mmap(file, a.addr, a.len, a.prot, flags, a.offset);
451 sys32_mmap2 (unsigned int addr, unsigned int len, unsigned int prot, unsigned int flags,
452 unsigned int fd, unsigned int pgoff)
454 struct file *file = NULL;
455 unsigned long retval;
457 flags &= ~(MAP_EXECUTABLE | MAP_DENYWRITE);
458 if (!(flags & MAP_ANONYMOUS)) {
464 retval = ia32_do_mmap(file, addr, len, prot, flags,
465 (unsigned long) pgoff << IA32_PAGE_SHIFT);
473 sys32_munmap (unsigned int start, unsigned int len)
475 unsigned int end = start + len;
478 #if PAGE_SHIFT <= IA32_PAGE_SHIFT
479 ret = sys_munmap(start, end - start);
484 start = PAGE_ALIGN(start);
485 end = PAGE_START(end);
490 down(&ia32_mmap_sem);
492 ret = sys_munmap(start, end - start);
499 #if PAGE_SHIFT > IA32_PAGE_SHIFT
502 * When mprotect()ing a partial page, we set the permission to the union of the old
503 * settings and the new settings. In other words, it's only possible to make access to a
504 * partial page less restrictive.
507 mprotect_subpage (unsigned long address, int new_prot)
510 struct vm_area_struct *vma;
512 if (new_prot == PROT_NONE)
513 return 0; /* optimize case where nothing changes... */
514 vma = find_vma(current->mm, address);
515 old_prot = get_page_prot(vma, address);
516 return sys_mprotect(address, PAGE_SIZE, new_prot | old_prot);
519 #endif /* PAGE_SHIFT > IA32_PAGE_SHIFT */
522 sys32_mprotect (unsigned int start, unsigned int len, int prot)
524 unsigned long end = start + len;
525 #if PAGE_SHIFT > IA32_PAGE_SHIFT
529 prot = get_prot32(prot);
531 #if PAGE_SHIFT <= IA32_PAGE_SHIFT
532 return sys_mprotect(start, end - start, prot);
537 end = IA32_PAGE_ALIGN(end);
541 down(&ia32_mmap_sem);
543 if (offset_in_page(start)) {
544 /* start address is 4KB aligned but not page aligned. */
545 retval = mprotect_subpage(PAGE_START(start), prot);
549 start = PAGE_ALIGN(start);
551 goto out; /* retval is already zero... */
554 if (offset_in_page(end)) {
555 /* end address is 4KB aligned but not page aligned. */
556 retval = mprotect_subpage(PAGE_START(end), prot);
560 end = PAGE_START(end);
562 retval = sys_mprotect(start, end - start, prot);
576 retval = do_pipe(fds);
579 if (copy_to_user(fd, fds, sizeof(fds)))
586 get_tv32 (struct timeval *o, struct compat_timeval *i)
588 return (!access_ok(VERIFY_READ, i, sizeof(*i)) ||
589 (__get_user(o->tv_sec, &i->tv_sec) | __get_user(o->tv_usec, &i->tv_usec)));
593 put_tv32 (struct compat_timeval *o, struct timeval *i)
595 return (!access_ok(VERIFY_WRITE, o, sizeof(*o)) ||
596 (__put_user(i->tv_sec, &o->tv_sec) | __put_user(i->tv_usec, &o->tv_usec)));
599 asmlinkage unsigned long
600 sys32_alarm (unsigned int seconds)
602 struct itimerval it_new, it_old;
603 unsigned int oldalarm;
605 it_new.it_interval.tv_sec = it_new.it_interval.tv_usec = 0;
606 it_new.it_value.tv_sec = seconds;
607 it_new.it_value.tv_usec = 0;
608 do_setitimer(ITIMER_REAL, &it_new, &it_old);
609 oldalarm = it_old.it_value.tv_sec;
610 /* ehhh.. We can't return 0 if we have an alarm pending.. */
611 /* And we'd better return too much than too little anyway */
612 if (it_old.it_value.tv_usec)
617 /* Translations due to time_t size differences. Which affects all
618 sorts of things, like timeval and itimerval. */
620 extern struct timezone sys_tz;
623 sys32_gettimeofday (struct compat_timeval *tv, struct timezone *tz)
627 do_gettimeofday(&ktv);
628 if (put_tv32(tv, &ktv))
632 if (copy_to_user(tz, &sys_tz, sizeof(sys_tz)))
639 sys32_settimeofday (struct compat_timeval *tv, struct timezone *tz)
646 if (get_tv32(&ktv, tv))
648 kts.tv_sec = ktv.tv_sec;
649 kts.tv_nsec = ktv.tv_usec * 1000;
652 if (copy_from_user(&ktz, tz, sizeof(ktz)))
656 return do_sys_settimeofday(tv ? &kts : NULL, tz ? &ktz : NULL);
659 struct getdents32_callback {
660 struct compat_dirent * current_dir;
661 struct compat_dirent * previous;
666 struct readdir32_callback {
667 struct old_linux32_dirent * dirent;
672 filldir32 (void *__buf, const char *name, int namlen, loff_t offset, ino_t ino,
675 struct compat_dirent * dirent;
676 struct getdents32_callback * buf = (struct getdents32_callback *) __buf;
677 int reclen = ROUND_UP(NAME_OFFSET(dirent) + namlen + 1, 4);
679 buf->error = -EINVAL; /* only used if we fail.. */
680 if (reclen > buf->count)
682 buf->error = -EFAULT; /* only used if we fail.. */
683 dirent = buf->previous;
685 if (put_user(offset, &dirent->d_off))
687 dirent = buf->current_dir;
688 buf->previous = dirent;
689 if (put_user(ino, &dirent->d_ino)
690 || put_user(reclen, &dirent->d_reclen)
691 || copy_to_user(dirent->d_name, name, namlen)
692 || put_user(0, dirent->d_name + namlen))
694 dirent = (struct compat_dirent *) ((char *) dirent + reclen);
695 buf->current_dir = dirent;
696 buf->count -= reclen;
701 sys32_getdents (unsigned int fd, struct compat_dirent *dirent, unsigned int count)
704 struct compat_dirent * lastdirent;
705 struct getdents32_callback buf;
713 buf.current_dir = dirent;
718 error = vfs_readdir(file, filldir32, &buf);
722 lastdirent = buf.previous;
725 if (put_user(file->f_pos, &lastdirent->d_off))
727 error = count - buf.count;
737 fillonedir32 (void * __buf, const char * name, int namlen, loff_t offset, ino_t ino,
740 struct readdir32_callback * buf = (struct readdir32_callback *) __buf;
741 struct old_linux32_dirent * dirent;
746 dirent = buf->dirent;
747 if (put_user(ino, &dirent->d_ino)
748 || put_user(offset, &dirent->d_offset)
749 || put_user(namlen, &dirent->d_namlen)
750 || copy_to_user(dirent->d_name, name, namlen)
751 || put_user(0, dirent->d_name + namlen))
757 sys32_readdir (unsigned int fd, void *dirent, unsigned int count)
761 struct readdir32_callback buf;
771 error = vfs_readdir(file, fillonedir32, &buf);
779 struct sel_arg_struct {
788 sys32_old_select (struct sel_arg_struct *arg)
790 struct sel_arg_struct a;
792 if (copy_from_user(&a, arg, sizeof(a)))
794 return compat_sys_select(a.n, compat_ptr(a.inp), compat_ptr(a.outp),
795 compat_ptr(a.exp), compat_ptr(a.tvp));
812 sys32_ipc(u32 call, int first, int second, int third, u32 ptr, u32 fifth)
816 version = call >> 16; /* hack for backward compatibility */
822 return compat_sys_semtimedop(first, compat_ptr(ptr),
823 second, compat_ptr(fifth));
824 /* else fall through for normal semop() */
826 /* struct sembuf is the same on 32 and 64bit :)) */
827 return sys_semtimedop(first, compat_ptr(ptr), second,
830 return sys_semget(first, second, third);
832 return compat_sys_semctl(first, second, third, compat_ptr(ptr));
835 return compat_sys_msgsnd(first, second, third, compat_ptr(ptr));
837 return compat_sys_msgrcv(first, second, fifth, third, version, compat_ptr(ptr));
839 return sys_msgget((key_t) first, second);
841 return compat_sys_msgctl(first, second, compat_ptr(ptr));
844 return compat_sys_shmat(first, second, third, version, compat_ptr(ptr));
847 return sys_shmdt(compat_ptr(ptr));
849 return sys_shmget(first, second, third);
851 return compat_sys_shmctl(first, second, compat_ptr(ptr));
860 * sys_time() can be implemented in user-level using
861 * sys_gettimeofday(). IA64 did this but i386 Linux did not
862 * so we have to implement this system call here.
865 sys32_time (int *tloc)
870 do_gettimeofday(&tv);
874 if (put_user(i, tloc))
881 compat_sys_wait4 (compat_pid_t pid, compat_uint_t * stat_addr, int options,
882 struct compat_rusage *ru);
885 sys32_waitpid (int pid, unsigned int *stat_addr, int options)
887 return compat_sys_wait4(pid, stat_addr, options, NULL);
891 ia32_peek (struct pt_regs *regs, struct task_struct *child, unsigned long addr, unsigned int *val)
896 copied = access_process_vm(child, addr, val, sizeof(*val), 0);
897 return (copied != sizeof(ret)) ? -EIO : 0;
901 ia32_poke (struct pt_regs *regs, struct task_struct *child, unsigned long addr, unsigned int val)
904 if (access_process_vm(child, addr, &val, sizeof(val), 1) != sizeof(val))
910 * The order in which registers are stored in the ptrace regs structure
923 #define PT_ORIG_EAX 11
931 getreg (struct task_struct *child, int regno)
933 struct pt_regs *child_regs;
935 child_regs = ia64_task_regs(child);
936 switch (regno / sizeof(int)) {
937 case PT_EBX: return child_regs->r11;
938 case PT_ECX: return child_regs->r9;
939 case PT_EDX: return child_regs->r10;
940 case PT_ESI: return child_regs->r14;
941 case PT_EDI: return child_regs->r15;
942 case PT_EBP: return child_regs->r13;
943 case PT_EAX: return child_regs->r8;
944 case PT_ORIG_EAX: return child_regs->r1; /* see dispatch_to_ia32_handler() */
945 case PT_EIP: return child_regs->cr_iip;
946 case PT_UESP: return child_regs->r12;
947 case PT_EFL: return child->thread.eflag;
948 case PT_DS: case PT_ES: case PT_FS: case PT_GS: case PT_SS:
950 case PT_CS: return __USER_CS;
952 printk(KERN_ERR "ia32.getreg(): unknown register %d\n", regno);
959 putreg (struct task_struct *child, int regno, unsigned int value)
961 struct pt_regs *child_regs;
963 child_regs = ia64_task_regs(child);
964 switch (regno / sizeof(int)) {
965 case PT_EBX: child_regs->r11 = value; break;
966 case PT_ECX: child_regs->r9 = value; break;
967 case PT_EDX: child_regs->r10 = value; break;
968 case PT_ESI: child_regs->r14 = value; break;
969 case PT_EDI: child_regs->r15 = value; break;
970 case PT_EBP: child_regs->r13 = value; break;
971 case PT_EAX: child_regs->r8 = value; break;
972 case PT_ORIG_EAX: child_regs->r1 = value; break;
973 case PT_EIP: child_regs->cr_iip = value; break;
974 case PT_UESP: child_regs->r12 = value; break;
975 case PT_EFL: child->thread.eflag = value; break;
976 case PT_DS: case PT_ES: case PT_FS: case PT_GS: case PT_SS:
977 if (value != __USER_DS)
979 "ia32.putreg: attempt to set invalid segment register %d = %x\n",
983 if (value != __USER_CS)
985 "ia32.putreg: attempt to to set invalid segment register %d = %x\n",
989 printk(KERN_ERR "ia32.putreg: unknown register %d\n", regno);
995 put_fpreg (int regno, struct _fpreg_ia32 *reg, struct pt_regs *ptp, struct switch_stack *swp,
998 struct _fpreg_ia32 *f;
1001 f = (struct _fpreg_ia32 *)(((unsigned long)buf + 15) & ~15);
1002 if ((regno += tos) >= 8)
1006 ia64f2ia32f(f, &ptp->f8);
1009 ia64f2ia32f(f, &ptp->f9);
1012 ia64f2ia32f(f, &ptp->f10);
1015 ia64f2ia32f(f, &ptp->f11);
1021 ia64f2ia32f(f, &swp->f12 + (regno - 4));
1024 copy_to_user(reg, f, sizeof(*reg));
1028 get_fpreg (int regno, struct _fpreg_ia32 *reg, struct pt_regs *ptp, struct switch_stack *swp,
1032 if ((regno += tos) >= 8)
1036 copy_from_user(&ptp->f8, reg, sizeof(*reg));
1039 copy_from_user(&ptp->f9, reg, sizeof(*reg));
1042 copy_from_user(&ptp->f10, reg, sizeof(*reg));
1045 copy_from_user(&ptp->f11, reg, sizeof(*reg));
1051 copy_from_user(&swp->f12 + (regno - 4), reg, sizeof(*reg));
1058 save_ia32_fpstate (struct task_struct *tsk, struct ia32_user_i387_struct *save)
1060 struct switch_stack *swp;
1061 struct pt_regs *ptp;
1064 if (!access_ok(VERIFY_WRITE, save, sizeof(*save)))
1067 __put_user(tsk->thread.fcr & 0xffff, &save->cwd);
1068 __put_user(tsk->thread.fsr & 0xffff, &save->swd);
1069 __put_user((tsk->thread.fsr>>16) & 0xffff, &save->twd);
1070 __put_user(tsk->thread.fir, &save->fip);
1071 __put_user((tsk->thread.fir>>32) & 0xffff, &save->fcs);
1072 __put_user(tsk->thread.fdr, &save->foo);
1073 __put_user((tsk->thread.fdr>>32) & 0xffff, &save->fos);
1076 * Stack frames start with 16-bytes of temp space
1078 swp = (struct switch_stack *)(tsk->thread.ksp + 16);
1079 ptp = ia64_task_regs(tsk);
1080 tos = (tsk->thread.fsr >> 11) & 7;
1081 for (i = 0; i < 8; i++)
1082 put_fpreg(i, &save->st_space[i], ptp, swp, tos);
1087 restore_ia32_fpstate (struct task_struct *tsk, struct ia32_user_i387_struct *save)
1089 struct switch_stack *swp;
1090 struct pt_regs *ptp;
1092 unsigned int fsrlo, fsrhi, num32;
1094 if (!access_ok(VERIFY_READ, save, sizeof(*save)))
1097 __get_user(num32, (unsigned int *)&save->cwd);
1098 tsk->thread.fcr = (tsk->thread.fcr & (~0x1f3f)) | (num32 & 0x1f3f);
1099 __get_user(fsrlo, (unsigned int *)&save->swd);
1100 __get_user(fsrhi, (unsigned int *)&save->twd);
1101 num32 = (fsrhi << 16) | fsrlo;
1102 tsk->thread.fsr = (tsk->thread.fsr & (~0xffffffff)) | num32;
1103 __get_user(num32, (unsigned int *)&save->fip);
1104 tsk->thread.fir = (tsk->thread.fir & (~0xffffffff)) | num32;
1105 __get_user(num32, (unsigned int *)&save->foo);
1106 tsk->thread.fdr = (tsk->thread.fdr & (~0xffffffff)) | num32;
1109 * Stack frames start with 16-bytes of temp space
1111 swp = (struct switch_stack *)(tsk->thread.ksp + 16);
1112 ptp = ia64_task_regs(tsk);
1113 tos = (tsk->thread.fsr >> 11) & 7;
1114 for (i = 0; i < 8; i++)
1115 get_fpreg(i, &save->st_space[i], ptp, swp, tos);
1120 save_ia32_fpxstate (struct task_struct *tsk, struct ia32_user_fxsr_struct *save)
1122 struct switch_stack *swp;
1123 struct pt_regs *ptp;
1125 unsigned long mxcsr=0;
1126 unsigned long num128[2];
1128 if (!access_ok(VERIFY_WRITE, save, sizeof(*save)))
1131 __put_user(tsk->thread.fcr & 0xffff, &save->cwd);
1132 __put_user(tsk->thread.fsr & 0xffff, &save->swd);
1133 __put_user((tsk->thread.fsr>>16) & 0xffff, &save->twd);
1134 __put_user(tsk->thread.fir, &save->fip);
1135 __put_user((tsk->thread.fir>>32) & 0xffff, &save->fcs);
1136 __put_user(tsk->thread.fdr, &save->foo);
1137 __put_user((tsk->thread.fdr>>32) & 0xffff, &save->fos);
1140 * Stack frames start with 16-bytes of temp space
1142 swp = (struct switch_stack *)(tsk->thread.ksp + 16);
1143 ptp = ia64_task_regs(tsk);
1144 tos = (tsk->thread.fsr >> 11) & 7;
1145 for (i = 0; i < 8; i++)
1146 put_fpreg(i, (struct _fpreg_ia32 *)&save->st_space[4*i], ptp, swp, tos);
1148 mxcsr = ((tsk->thread.fcr>>32) & 0xff80) | ((tsk->thread.fsr>>32) & 0x3f);
1149 __put_user(mxcsr & 0xffff, &save->mxcsr);
1150 for (i = 0; i < 8; i++) {
1151 memcpy(&(num128[0]), &(swp->f16) + i*2, sizeof(unsigned long));
1152 memcpy(&(num128[1]), &(swp->f17) + i*2, sizeof(unsigned long));
1153 copy_to_user(&save->xmm_space[0] + 4*i, num128, sizeof(struct _xmmreg_ia32));
1159 restore_ia32_fpxstate (struct task_struct *tsk, struct ia32_user_fxsr_struct *save)
1161 struct switch_stack *swp;
1162 struct pt_regs *ptp;
1164 unsigned int fsrlo, fsrhi, num32;
1166 unsigned long num64;
1167 unsigned long num128[2];
1169 if (!access_ok(VERIFY_READ, save, sizeof(*save)))
1172 __get_user(num32, (unsigned int *)&save->cwd);
1173 tsk->thread.fcr = (tsk->thread.fcr & (~0x1f3f)) | (num32 & 0x1f3f);
1174 __get_user(fsrlo, (unsigned int *)&save->swd);
1175 __get_user(fsrhi, (unsigned int *)&save->twd);
1176 num32 = (fsrhi << 16) | fsrlo;
1177 tsk->thread.fsr = (tsk->thread.fsr & (~0xffffffff)) | num32;
1178 __get_user(num32, (unsigned int *)&save->fip);
1179 tsk->thread.fir = (tsk->thread.fir & (~0xffffffff)) | num32;
1180 __get_user(num32, (unsigned int *)&save->foo);
1181 tsk->thread.fdr = (tsk->thread.fdr & (~0xffffffff)) | num32;
1184 * Stack frames start with 16-bytes of temp space
1186 swp = (struct switch_stack *)(tsk->thread.ksp + 16);
1187 ptp = ia64_task_regs(tsk);
1188 tos = (tsk->thread.fsr >> 11) & 7;
1189 for (i = 0; i < 8; i++)
1190 get_fpreg(i, (struct _fpreg_ia32 *)&save->st_space[4*i], ptp, swp, tos);
1192 __get_user(mxcsr, (unsigned int *)&save->mxcsr);
1193 num64 = mxcsr & 0xff10;
1194 tsk->thread.fcr = (tsk->thread.fcr & (~0xff1000000000)) | (num64<<32);
1195 num64 = mxcsr & 0x3f;
1196 tsk->thread.fsr = (tsk->thread.fsr & (~0x3f00000000)) | (num64<<32);
1198 for (i = 0; i < 8; i++) {
1199 copy_from_user(num128, &save->xmm_space[0] + 4*i, sizeof(struct _xmmreg_ia32));
1200 memcpy(&(swp->f16) + i*2, &(num128[0]), sizeof(unsigned long));
1201 memcpy(&(swp->f17) + i*2, &(num128[1]), sizeof(unsigned long));
1207 * Note that the IA32 version of `ptrace' calls the IA64 routine for
1208 * many of the requests. This will only work for requests that do
1209 * not need access to the calling processes `pt_regs' which is located
1210 * at the address of `stack'. Once we call the IA64 `sys_ptrace' then
1211 * the address of `stack' will not be the address of the `pt_regs'.
1214 sys32_ptrace (int request, pid_t pid, unsigned int addr, unsigned int data,
1215 long arg4, long arg5, long arg6, long arg7, long stack)
1217 struct pt_regs *regs = (struct pt_regs *) &stack;
1218 struct task_struct *child;
1219 unsigned int value, tmp;
1223 if (request == PTRACE_TRACEME) {
1224 ret = sys_ptrace(request, pid, addr, data, arg4, arg5, arg6, arg7, stack);
1229 read_lock(&tasklist_lock);
1230 child = find_task_by_pid(pid);
1232 get_task_struct(child);
1233 read_unlock(&tasklist_lock);
1237 if (pid == 1) /* no messing around with init! */
1240 if (request == PTRACE_ATTACH) {
1241 ret = sys_ptrace(request, pid, addr, data, arg4, arg5, arg6, arg7, stack);
1245 ret = ptrace_check_attach(child, request == PTRACE_KILL);
1250 case PTRACE_PEEKTEXT:
1251 case PTRACE_PEEKDATA: /* read word at location addr */
1252 ret = ia32_peek(regs, child, addr, &value);
1254 ret = put_user(value, (unsigned int *) A(data));
1259 case PTRACE_POKETEXT:
1260 case PTRACE_POKEDATA: /* write the word at location addr */
1261 ret = ia32_poke(regs, child, addr, data);
1264 case PTRACE_PEEKUSR: /* read word at addr in USER area */
1266 if ((addr & 3) || addr > 17*sizeof(int))
1269 tmp = getreg(child, addr);
1270 if (!put_user(tmp, (unsigned int *) A(data)))
1274 case PTRACE_POKEUSR: /* write word at addr in USER area */
1276 if ((addr & 3) || addr > 17*sizeof(int))
1279 putreg(child, addr, data);
1283 case IA32_PTRACE_GETREGS:
1284 if (!access_ok(VERIFY_WRITE, (int *) A(data), 17*sizeof(int))) {
1288 for (i = 0; i < (int) (17*sizeof(int)); i += sizeof(int) ) {
1289 put_user(getreg(child, i), (unsigned int *) A(data));
1290 data += sizeof(int);
1295 case IA32_PTRACE_SETREGS:
1296 if (!access_ok(VERIFY_READ, (int *) A(data), 17*sizeof(int))) {
1300 for (i = 0; i < (int) (17*sizeof(int)); i += sizeof(int) ) {
1301 get_user(tmp, (unsigned int *) A(data));
1302 putreg(child, i, tmp);
1303 data += sizeof(int);
1308 case IA32_PTRACE_GETFPREGS:
1309 ret = save_ia32_fpstate(child, (struct ia32_user_i387_struct *) A(data));
1312 case IA32_PTRACE_GETFPXREGS:
1313 ret = save_ia32_fpxstate(child, (struct ia32_user_fxsr_struct *) A(data));
1316 case IA32_PTRACE_SETFPREGS:
1317 ret = restore_ia32_fpstate(child, (struct ia32_user_i387_struct *) A(data));
1320 case IA32_PTRACE_SETFPXREGS:
1321 ret = restore_ia32_fpxstate(child, (struct ia32_user_fxsr_struct *) A(data));
1324 case PTRACE_SYSCALL: /* continue, stop after next syscall */
1325 case PTRACE_CONT: /* restart after signal. */
1327 case PTRACE_SINGLESTEP: /* execute chile for one instruction */
1328 case PTRACE_DETACH: /* detach a process */
1329 ret = sys_ptrace(request, pid, addr, data, arg4, arg5, arg6, arg7, stack);
1333 ret = ptrace_request(child, request, addr, data);
1338 put_task_struct(child);
1345 * The IA64 maps 4 I/O ports for each 4K page
1347 #define IOLEN ((65536 / 4) * 4096)
1350 sys32_iopl (int level)
1352 extern unsigned long ia64_iobase;
1357 mm_segment_t old_fs = get_fs ();
1361 /* Trying to gain more privileges? */
1362 old = ia64_getreg(_IA64_REG_AR_EFLAG);
1363 if ((unsigned int) level > ((old >> 12) & 3)) {
1364 if (!capable(CAP_SYS_RAWIO))
1368 fd = sys_open("/dev/mem", O_SYNC | O_RDWR, 0);
1378 down_write(¤t->mm->mmap_sem);
1379 addr = do_mmap_pgoff(file, IA32_IOBASE,
1380 IOLEN, PROT_READ|PROT_WRITE, MAP_SHARED,
1381 (ia64_iobase & ~PAGE_OFFSET) >> PAGE_SHIFT);
1382 up_write(¤t->mm->mmap_sem);
1385 old = (old & ~0x3000) | (level << 12);
1386 ia64_setreg(_IA64_REG_AR_EFLAG, old);
1395 sys32_ioperm (unsigned int from, unsigned int num, int on)
1399 * Since IA64 doesn't have permission bits we'd have to go to
1400 * a lot of trouble to simulate them in software. There's
1401 * no point, only trusted programs can make this call so we'll
1402 * just turn it into an iopl call and let the process have
1403 * access to all I/O ports.
1405 * XXX proper ioperm() support should be emulated by
1406 * manipulating the page protections...
1408 return sys32_iopl(3);
1413 unsigned int ss_flags;
1414 unsigned int ss_size;
1418 sys32_sigaltstack (ia32_stack_t *uss32, ia32_stack_t *uoss32,
1419 long arg2, long arg3, long arg4, long arg5, long arg6, long arg7, long stack)
1421 struct pt_regs *pt = (struct pt_regs *) &stack;
1425 mm_segment_t old_fs = get_fs();
1428 if (copy_from_user(&buf32, uss32, sizeof(ia32_stack_t)))
1430 uss.ss_sp = (void *) (long) buf32.ss_sp;
1431 uss.ss_flags = buf32.ss_flags;
1432 /* MINSIGSTKSZ is different for ia32 vs ia64. We lie here to pass the
1433 check and set it to the user requested value later */
1434 if ((buf32.ss_flags != SS_DISABLE) && (buf32.ss_size < MINSIGSTKSZ_IA32)) {
1438 uss.ss_size = MINSIGSTKSZ;
1440 ret = do_sigaltstack(uss32 ? &uss : NULL, &uoss, pt->r12);
1441 current->sas_ss_size = buf32.ss_size;
1447 buf32.ss_sp = (long) uoss.ss_sp;
1448 buf32.ss_flags = uoss.ss_flags;
1449 buf32.ss_size = uoss.ss_size;
1450 if (copy_to_user(uoss32, &buf32, sizeof(ia32_stack_t)))
1459 current->state = TASK_INTERRUPTIBLE;
1461 return -ERESTARTNOHAND;
1465 sys32_msync (unsigned int start, unsigned int len, int flags)
1469 if (OFFSET4K(start))
1471 addr = PAGE_START(start);
1472 return sys_msync(addr, len + (start - addr), flags);
1478 unsigned int oldval;
1479 unsigned int oldlenp;
1480 unsigned int newval;
1481 unsigned int newlen;
1482 unsigned int __unused[4];
1486 sys32_sysctl (struct sysctl32 *args)
1488 #ifdef CONFIG_SYSCTL
1489 struct sysctl32 a32;
1490 mm_segment_t old_fs = get_fs ();
1491 void *oldvalp, *newvalp;
1496 if (copy_from_user(&a32, args, sizeof(a32)))
1500 * We need to pre-validate these because we have to disable address checking
1501 * before calling do_sysctl() because of OLDLEN but we can't run the risk of the
1502 * user specifying bad addresses here. Well, since we're dealing with 32 bit
1503 * addresses, we KNOW that access_ok() will always succeed, so this is an
1504 * expensive NOP, but so what...
1506 namep = (int *) A(a32.name);
1507 oldvalp = (void *) A(a32.oldval);
1508 newvalp = (void *) A(a32.newval);
1510 if ((oldvalp && get_user(oldlen, (int *) A(a32.oldlenp)))
1511 || !access_ok(VERIFY_WRITE, namep, 0)
1512 || !access_ok(VERIFY_WRITE, oldvalp, 0)
1513 || !access_ok(VERIFY_WRITE, newvalp, 0))
1518 ret = do_sysctl(namep, a32.nlen, oldvalp, &oldlen, newvalp, (size_t) a32.newlen);
1522 if (oldvalp && put_user (oldlen, (int *) A(a32.oldlenp)))
1532 sys32_newuname (struct new_utsname *name)
1534 int ret = sys_newuname(name);
1537 if (copy_to_user(name->machine, "i686\0\0\0", 8))
1543 sys32_getresuid16 (u16 *ruid, u16 *euid, u16 *suid)
1547 mm_segment_t old_fs = get_fs();
1550 ret = sys_getresuid(&a, &b, &c);
1553 if (put_user(a, ruid) || put_user(b, euid) || put_user(c, suid))
1559 sys32_getresgid16 (u16 *rgid, u16 *egid, u16 *sgid)
1563 mm_segment_t old_fs = get_fs();
1566 ret = sys_getresgid(&a, &b, &c);
1572 return put_user(a, rgid) | put_user(b, egid) | put_user(c, sgid);
1576 sys32_lseek (unsigned int fd, int offset, unsigned int whence)
1578 /* Sign-extension of "offset" is important here... */
1579 return sys_lseek(fd, offset, whence);
1583 groups16_to_user(short *grouplist, struct group_info *group_info)
1588 for (i = 0; i < group_info->ngroups; i++) {
1589 group = (short)GROUP_AT(group_info, i);
1590 if (put_user(group, grouplist+i))
1598 groups16_from_user(struct group_info *group_info, short *grouplist)
1603 for (i = 0; i < group_info->ngroups; i++) {
1604 if (get_user(group, grouplist+i))
1606 GROUP_AT(group_info, i) = (gid_t)group;
1613 sys32_getgroups16 (int gidsetsize, short *grouplist)
1620 get_group_info(current->group_info);
1621 i = current->group_info->ngroups;
1623 if (i > gidsetsize) {
1627 if (groups16_to_user(grouplist, current->group_info)) {
1633 put_group_info(current->group_info);
1638 sys32_setgroups16 (int gidsetsize, short *grouplist)
1640 struct group_info *group_info;
1643 if (!capable(CAP_SETGID))
1645 if ((unsigned)gidsetsize > NGROUPS_MAX)
1648 group_info = groups_alloc(gidsetsize);
1651 retval = groups16_from_user(group_info, grouplist);
1653 put_group_info(group_info);
1657 retval = set_current_groups(group_info);
1658 put_group_info(group_info);
1664 sys32_truncate64 (unsigned int path, unsigned int len_lo, unsigned int len_hi)
1666 return sys_truncate((const char *) A(path), ((unsigned long) len_hi << 32) | len_lo);
1670 sys32_ftruncate64 (int fd, unsigned int len_lo, unsigned int len_hi)
1672 return sys_ftruncate(fd, ((unsigned long) len_hi << 32) | len_lo);
1676 putstat64 (struct stat64 *ubuf, struct kstat *kbuf)
1681 if (clear_user(ubuf, sizeof(*ubuf)))
1684 hdev = huge_encode_dev(kbuf->dev);
1685 err = __put_user(hdev, (u32*)&ubuf->st_dev);
1686 err |= __put_user(hdev >> 32, ((u32*)&ubuf->st_dev) + 1);
1687 err |= __put_user(kbuf->ino, &ubuf->__st_ino);
1688 err |= __put_user(kbuf->ino, &ubuf->st_ino_lo);
1689 err |= __put_user(kbuf->ino >> 32, &ubuf->st_ino_hi);
1690 err |= __put_user(kbuf->mode, &ubuf->st_mode);
1691 err |= __put_user(kbuf->nlink, &ubuf->st_nlink);
1692 err |= __put_user(kbuf->uid, &ubuf->st_uid);
1693 err |= __put_user(kbuf->gid, &ubuf->st_gid);
1694 hdev = huge_encode_dev(kbuf->rdev);
1695 err = __put_user(hdev, (u32*)&ubuf->st_rdev);
1696 err |= __put_user(hdev >> 32, ((u32*)&ubuf->st_rdev) + 1);
1697 err |= __put_user(kbuf->size, &ubuf->st_size_lo);
1698 err |= __put_user((kbuf->size >> 32), &ubuf->st_size_hi);
1699 err |= __put_user(kbuf->atime.tv_sec, &ubuf->st_atime);
1700 err |= __put_user(kbuf->atime.tv_nsec, &ubuf->st_atime_nsec);
1701 err |= __put_user(kbuf->mtime.tv_sec, &ubuf->st_mtime);
1702 err |= __put_user(kbuf->mtime.tv_nsec, &ubuf->st_mtime_nsec);
1703 err |= __put_user(kbuf->ctime.tv_sec, &ubuf->st_ctime);
1704 err |= __put_user(kbuf->ctime.tv_nsec, &ubuf->st_ctime_nsec);
1705 err |= __put_user(kbuf->blksize, &ubuf->st_blksize);
1706 err |= __put_user(kbuf->blocks, &ubuf->st_blocks);
1711 sys32_stat64 (char *filename, struct stat64 *statbuf)
1714 long ret = vfs_stat(filename, &s);
1716 ret = putstat64(statbuf, &s);
1721 sys32_lstat64 (char *filename, struct stat64 *statbuf)
1724 long ret = vfs_lstat(filename, &s);
1726 ret = putstat64(statbuf, &s);
1731 sys32_fstat64 (unsigned int fd, struct stat64 *statbuf)
1734 long ret = vfs_fstat(fd, &s);
1736 ret = putstat64(statbuf, &s);
1758 sys32_sysinfo (struct sysinfo32 *info)
1763 mm_segment_t old_fs = get_fs();
1766 ret = sys_sysinfo(&s);
1768 /* Check to see if any memory value is too large for 32-bit and
1769 * scale down if needed.
1771 if ((s.totalram >> 32) || (s.totalswap >> 32)) {
1772 while (s.mem_unit < PAGE_SIZE) {
1776 s.totalram >>= bitcount;
1777 s.freeram >>= bitcount;
1778 s.sharedram >>= bitcount;
1779 s.bufferram >>= bitcount;
1780 s.totalswap >>= bitcount;
1781 s.freeswap >>= bitcount;
1782 s.totalhigh >>= bitcount;
1783 s.freehigh >>= bitcount;
1786 if (!access_ok(VERIFY_WRITE, info, sizeof(*info)))
1789 err = __put_user(s.uptime, &info->uptime);
1790 err |= __put_user(s.loads[0], &info->loads[0]);
1791 err |= __put_user(s.loads[1], &info->loads[1]);
1792 err |= __put_user(s.loads[2], &info->loads[2]);
1793 err |= __put_user(s.totalram, &info->totalram);
1794 err |= __put_user(s.freeram, &info->freeram);
1795 err |= __put_user(s.sharedram, &info->sharedram);
1796 err |= __put_user(s.bufferram, &info->bufferram);
1797 err |= __put_user(s.totalswap, &info->totalswap);
1798 err |= __put_user(s.freeswap, &info->freeswap);
1799 err |= __put_user(s.procs, &info->procs);
1800 err |= __put_user (s.totalhigh, &info->totalhigh);
1801 err |= __put_user (s.freehigh, &info->freehigh);
1802 err |= __put_user (s.mem_unit, &info->mem_unit);
1809 sys32_sched_rr_get_interval (pid_t pid, struct compat_timespec *interval)
1811 mm_segment_t old_fs = get_fs();
1816 ret = sys_sched_rr_get_interval(pid, &t);
1818 if (put_compat_timespec(&t, interval))
1824 sys32_pread (unsigned int fd, void *buf, unsigned int count, u32 pos_lo, u32 pos_hi)
1826 return sys_pread64(fd, buf, count, ((unsigned long) pos_hi << 32) | pos_lo);
1830 sys32_pwrite (unsigned int fd, void *buf, unsigned int count, u32 pos_lo, u32 pos_hi)
1832 return sys_pwrite64(fd, buf, count, ((unsigned long) pos_hi << 32) | pos_lo);
1836 sys32_sendfile (int out_fd, int in_fd, int *offset, unsigned int count)
1838 mm_segment_t old_fs = get_fs();
1842 if (offset && get_user(of, offset))
1846 ret = sys_sendfile(out_fd, in_fd, offset ? &of : NULL, count);
1849 if (!ret && offset && put_user(of, offset))
1856 sys32_personality (unsigned int personality)
1860 if (current->personality == PER_LINUX32 && personality == PER_LINUX)
1861 personality = PER_LINUX32;
1862 ret = sys_personality(personality);
1863 if (ret == PER_LINUX32)
1868 asmlinkage unsigned long
1869 sys32_brk (unsigned int brk)
1871 unsigned long ret, obrk;
1872 struct mm_struct *mm = current->mm;
1877 clear_user((void *) ret, PAGE_ALIGN(ret) - ret);
1882 * Exactly like fs/open.c:sys_open(), except that it doesn't set the O_LARGEFILE flag.
1885 sys32_open (const char * filename, int flags, int mode)
1890 tmp = getname(filename);
1893 fd = get_unused_fd();
1895 struct file *f = filp_open(tmp, flags, mode);
1912 /* Structure for ia32 emulation on ia64 */
1913 struct epoll_event32
1920 sys32_epoll_ctl(int epfd, int op, int fd, struct epoll_event32 *event)
1922 mm_segment_t old_fs = get_fs();
1923 struct epoll_event event64;
1924 int error = -EFAULT;
1927 if ((error = verify_area(VERIFY_READ, event,
1928 sizeof(struct epoll_event32))))
1931 __get_user(event64.events, &event->events);
1932 __get_user(data_halfword, &event->data[0]);
1933 event64.data = data_halfword;
1934 __get_user(data_halfword, &event->data[1]);
1935 event64.data |= (u64)data_halfword << 32;
1938 error = sys_epoll_ctl(epfd, op, fd, &event64);
1945 sys32_epoll_wait(int epfd, struct epoll_event32 *events, int maxevents,
1948 struct epoll_event *events64 = NULL;
1949 mm_segment_t old_fs = get_fs();
1950 int error, numevents, size;
1952 int do_free_pages = 0;
1954 if (maxevents <= 0) {
1958 /* Verify that the area passed by the user is writeable */
1959 if ((error = verify_area(VERIFY_WRITE, events,
1960 maxevents * sizeof(struct epoll_event32))))
1964 * Allocate space for the intermediate copy. If the space needed
1965 * is large enough to cause kmalloc to fail, then try again with
1968 size = maxevents * sizeof(struct epoll_event);
1969 events64 = kmalloc(size, GFP_KERNEL);
1970 if (events64 == NULL) {
1971 events64 = (struct epoll_event *)
1972 __get_free_pages(GFP_KERNEL, get_order(size));
1973 if (events64 == NULL)
1978 /* Do the system call */
1979 set_fs(KERNEL_DS); /* copy_to/from_user should work on kernel mem*/
1980 numevents = sys_epoll_wait(epfd, events64, maxevents, timeout);
1983 /* Don't modify userspace memory if we're returning an error */
1984 if (numevents > 0) {
1985 /* Translate the 64-bit structures back into the 32-bit
1987 for (evt_idx = 0; evt_idx < numevents; evt_idx++) {
1988 __put_user(events64[evt_idx].events,
1989 &events[evt_idx].events);
1990 __put_user((u32)events64[evt_idx].data,
1991 &events[evt_idx].data[0]);
1992 __put_user((u32)(events64[evt_idx].data >> 32),
1993 &events[evt_idx].data[1]);
1998 free_pages((unsigned long) events64, get_order(size));
2005 * Get a yet unused TLS descriptor index.
2010 struct thread_struct *t = ¤t->thread;
2013 for (idx = 0; idx < GDT_ENTRY_TLS_ENTRIES; idx++)
2014 if (desc_empty(t->tls_array + idx))
2015 return idx + GDT_ENTRY_TLS_MIN;
2020 * Set a given TLS descriptor:
2023 sys32_set_thread_area (struct ia32_user_desc *u_info)
2025 struct thread_struct *t = ¤t->thread;
2026 struct ia32_user_desc info;
2027 struct desc_struct *desc;
2030 if (copy_from_user(&info, u_info, sizeof(info)))
2032 idx = info.entry_number;
2035 * index -1 means the kernel should try to find and allocate an empty descriptor:
2038 idx = get_free_idx();
2041 if (put_user(idx, &u_info->entry_number))
2045 if (idx < GDT_ENTRY_TLS_MIN || idx > GDT_ENTRY_TLS_MAX)
2048 desc = t->tls_array + idx - GDT_ENTRY_TLS_MIN;
2050 cpu = smp_processor_id();
2052 if (LDT_empty(&info)) {
2056 desc->a = LDT_entry_a(&info);
2057 desc->b = LDT_entry_b(&info);
2064 * Get the current Thread-Local Storage area:
2067 #define GET_BASE(desc) ( \
2068 (((desc)->a >> 16) & 0x0000ffff) | \
2069 (((desc)->b << 16) & 0x00ff0000) | \
2070 ( (desc)->b & 0xff000000) )
2072 #define GET_LIMIT(desc) ( \
2073 ((desc)->a & 0x0ffff) | \
2074 ((desc)->b & 0xf0000) )
2076 #define GET_32BIT(desc) (((desc)->b >> 22) & 1)
2077 #define GET_CONTENTS(desc) (((desc)->b >> 10) & 3)
2078 #define GET_WRITABLE(desc) (((desc)->b >> 9) & 1)
2079 #define GET_LIMIT_PAGES(desc) (((desc)->b >> 23) & 1)
2080 #define GET_PRESENT(desc) (((desc)->b >> 15) & 1)
2081 #define GET_USEABLE(desc) (((desc)->b >> 20) & 1)
2084 sys32_get_thread_area (struct ia32_user_desc *u_info)
2086 struct ia32_user_desc info;
2087 struct desc_struct *desc;
2090 if (get_user(idx, &u_info->entry_number))
2092 if (idx < GDT_ENTRY_TLS_MIN || idx > GDT_ENTRY_TLS_MAX)
2095 desc = current->thread.tls_array + idx - GDT_ENTRY_TLS_MIN;
2097 info.entry_number = idx;
2098 info.base_addr = GET_BASE(desc);
2099 info.limit = GET_LIMIT(desc);
2100 info.seg_32bit = GET_32BIT(desc);
2101 info.contents = GET_CONTENTS(desc);
2102 info.read_exec_only = !GET_WRITABLE(desc);
2103 info.limit_in_pages = GET_LIMIT_PAGES(desc);
2104 info.seg_not_present = !GET_PRESENT(desc);
2105 info.useable = GET_USEABLE(desc);
2107 if (copy_to_user(u_info, &info, sizeof(info)))
2112 extern asmlinkage long
2113 sys_timer_create(clockid_t which_clock, struct sigevent *timer_event_spec,
2114 timer_t * created_timer_id);
2117 sys32_timer_create(u32 clock, struct sigevent32 *se32, timer_t *timer_id)
2125 return sys_timer_create(clock, NULL, timer_id);
2127 memset(&se, 0, sizeof(struct sigevent));
2128 if (get_user(se.sigev_value.sival_int, &se32->sigev_value.sival_int) ||
2129 __get_user(se.sigev_signo, &se32->sigev_signo) ||
2130 __get_user(se.sigev_notify, &se32->sigev_notify) ||
2131 __copy_from_user(&se._sigev_un._pad, &se32->_sigev_un._pad,
2132 sizeof(se._sigev_un._pad)))
2135 if (!access_ok(VERIFY_WRITE,timer_id,sizeof(timer_t)))
2140 err = sys_timer_create(clock, &se, &t);
2144 err = __put_user (t, timer_id);
2149 long sys32_fadvise64_64(int fd, __u32 offset_low, __u32 offset_high,
2150 __u32 len_low, __u32 len_high, int advice)
2152 return sys_fadvise64_64(fd,
2153 (((u64)offset_high)<<32) | offset_low,
2154 (((u64)len_high)<<32) | len_low,
2158 #ifdef NOTYET /* UNTESTED FOR IA64 FROM HERE DOWN */
2160 asmlinkage long sys32_setreuid(compat_uid_t ruid, compat_uid_t euid)
2164 sruid = (ruid == (compat_uid_t)-1) ? ((uid_t)-1) : ((uid_t)ruid);
2165 seuid = (euid == (compat_uid_t)-1) ? ((uid_t)-1) : ((uid_t)euid);
2166 return sys_setreuid(sruid, seuid);
2170 sys32_setresuid(compat_uid_t ruid, compat_uid_t euid,
2173 uid_t sruid, seuid, ssuid;
2175 sruid = (ruid == (compat_uid_t)-1) ? ((uid_t)-1) : ((uid_t)ruid);
2176 seuid = (euid == (compat_uid_t)-1) ? ((uid_t)-1) : ((uid_t)euid);
2177 ssuid = (suid == (compat_uid_t)-1) ? ((uid_t)-1) : ((uid_t)suid);
2178 return sys_setresuid(sruid, seuid, ssuid);
2182 sys32_setregid(compat_gid_t rgid, compat_gid_t egid)
2186 srgid = (rgid == (compat_gid_t)-1) ? ((gid_t)-1) : ((gid_t)rgid);
2187 segid = (egid == (compat_gid_t)-1) ? ((gid_t)-1) : ((gid_t)egid);
2188 return sys_setregid(srgid, segid);
2192 sys32_setresgid(compat_gid_t rgid, compat_gid_t egid,
2195 gid_t srgid, segid, ssgid;
2197 srgid = (rgid == (compat_gid_t)-1) ? ((gid_t)-1) : ((gid_t)rgid);
2198 segid = (egid == (compat_gid_t)-1) ? ((gid_t)-1) : ((gid_t)egid);
2199 ssgid = (sgid == (compat_gid_t)-1) ? ((gid_t)-1) : ((gid_t)sgid);
2200 return sys_setresgid(srgid, segid, ssgid);
2203 /* Handle adjtimex compatibility. */
2207 s32 offset, freq, maxerror, esterror;
2208 s32 status, constant, precision, tolerance;
2209 struct compat_timeval time;
2211 s32 ppsfreq, jitter, shift, stabil;
2212 s32 jitcnt, calcnt, errcnt, stbcnt;
2213 s32 :32; s32 :32; s32 :32; s32 :32;
2214 s32 :32; s32 :32; s32 :32; s32 :32;
2215 s32 :32; s32 :32; s32 :32; s32 :32;
2218 extern int do_adjtimex(struct timex *);
2221 sys32_adjtimex(struct timex32 *utp)
2226 memset(&txc, 0, sizeof(struct timex));
2228 if(get_user(txc.modes, &utp->modes) ||
2229 __get_user(txc.offset, &utp->offset) ||
2230 __get_user(txc.freq, &utp->freq) ||
2231 __get_user(txc.maxerror, &utp->maxerror) ||
2232 __get_user(txc.esterror, &utp->esterror) ||
2233 __get_user(txc.status, &utp->status) ||
2234 __get_user(txc.constant, &utp->constant) ||
2235 __get_user(txc.precision, &utp->precision) ||
2236 __get_user(txc.tolerance, &utp->tolerance) ||
2237 __get_user(txc.time.tv_sec, &utp->time.tv_sec) ||
2238 __get_user(txc.time.tv_usec, &utp->time.tv_usec) ||
2239 __get_user(txc.tick, &utp->tick) ||
2240 __get_user(txc.ppsfreq, &utp->ppsfreq) ||
2241 __get_user(txc.jitter, &utp->jitter) ||
2242 __get_user(txc.shift, &utp->shift) ||
2243 __get_user(txc.stabil, &utp->stabil) ||
2244 __get_user(txc.jitcnt, &utp->jitcnt) ||
2245 __get_user(txc.calcnt, &utp->calcnt) ||
2246 __get_user(txc.errcnt, &utp->errcnt) ||
2247 __get_user(txc.stbcnt, &utp->stbcnt))
2250 ret = do_adjtimex(&txc);
2252 if(put_user(txc.modes, &utp->modes) ||
2253 __put_user(txc.offset, &utp->offset) ||
2254 __put_user(txc.freq, &utp->freq) ||
2255 __put_user(txc.maxerror, &utp->maxerror) ||
2256 __put_user(txc.esterror, &utp->esterror) ||
2257 __put_user(txc.status, &utp->status) ||
2258 __put_user(txc.constant, &utp->constant) ||
2259 __put_user(txc.precision, &utp->precision) ||
2260 __put_user(txc.tolerance, &utp->tolerance) ||
2261 __put_user(txc.time.tv_sec, &utp->time.tv_sec) ||
2262 __put_user(txc.time.tv_usec, &utp->time.tv_usec) ||
2263 __put_user(txc.tick, &utp->tick) ||
2264 __put_user(txc.ppsfreq, &utp->ppsfreq) ||
2265 __put_user(txc.jitter, &utp->jitter) ||
2266 __put_user(txc.shift, &utp->shift) ||
2267 __put_user(txc.stabil, &utp->stabil) ||
2268 __put_user(txc.jitcnt, &utp->jitcnt) ||
2269 __put_user(txc.calcnt, &utp->calcnt) ||
2270 __put_user(txc.errcnt, &utp->errcnt) ||
2271 __put_user(txc.stbcnt, &utp->stbcnt))