- Kai Germaschewski: ISDN update (including Makefiles)
[davej-history.git] / arch / sparc64 / kernel / sys_sparc.c
blob391979c87720e437e4d4570b267f4f91f43f51e5
1 /* $Id: sys_sparc.c,v 1.47 2000/11/29 05:56:12 anton Exp $
2 * linux/arch/sparc64/kernel/sys_sparc.c
4 * This file contains various random system calls that
5 * have a non-standard calling sequence on the Linux/sparc
6 * platform.
7 */
9 #include <linux/config.h>
10 #include <linux/errno.h>
11 #include <linux/types.h>
12 #include <linux/sched.h>
13 #include <linux/fs.h>
14 #include <linux/file.h>
15 #include <linux/mm.h>
16 #include <linux/sem.h>
17 #include <linux/msg.h>
18 #include <linux/shm.h>
19 #include <linux/stat.h>
20 #include <linux/mman.h>
21 #include <linux/utsname.h>
22 #include <linux/smp.h>
23 #include <linux/smp_lock.h>
24 #include <linux/malloc.h>
25 #include <linux/ipc.h>
26 #include <linux/personality.h>
28 #include <asm/uaccess.h>
29 #include <asm/ipc.h>
30 #include <asm/utrap.h>
31 #include <asm/perfctr.h>
33 /* #define DEBUG_UNIMP_SYSCALL */
35 /* XXX Make this per-binary type, this way we can detect the type of
36 * XXX a binary. Every Sparc executable calls this very early on.
38 asmlinkage unsigned long sys_getpagesize(void)
40 return PAGE_SIZE;
43 #define COLOUR_ALIGN(addr) (((addr)+SHMLBA-1)&~(SHMLBA-1))
45 unsigned long get_unmapped_area(unsigned long addr, unsigned long len)
47 struct vm_area_struct * vmm;
48 unsigned long task_size = TASK_SIZE;
50 if (current->thread.flags & SPARC_FLAG_32BIT)
51 task_size = 0xf0000000UL;
52 if (len > task_size || len > -PAGE_OFFSET)
53 return 0;
54 if (!addr)
55 addr = TASK_UNMAPPED_BASE;
57 if (current->thread.flags & SPARC_FLAG_MMAPSHARED)
58 addr = COLOUR_ALIGN(addr);
59 else
60 addr = PAGE_ALIGN(addr);
62 task_size -= len;
64 for (vmm = find_vma(current->mm, addr); ; vmm = vmm->vm_next) {
65 /* At this point: (!vmm || addr < vmm->vm_end). */
66 if (addr < PAGE_OFFSET && -PAGE_OFFSET - len < addr) {
67 addr = PAGE_OFFSET;
68 vmm = find_vma(current->mm, PAGE_OFFSET);
70 if (task_size < addr)
71 return 0;
72 if (!vmm || addr + len <= vmm->vm_start)
73 return addr;
74 addr = vmm->vm_end;
75 if (current->thread.flags & SPARC_FLAG_MMAPSHARED)
76 addr = COLOUR_ALIGN(addr);
80 extern asmlinkage unsigned long sys_brk(unsigned long brk);
82 asmlinkage unsigned long sparc_brk(unsigned long brk)
84 /* People could try to be nasty and use ta 0x6d in 32bit programs */
85 if ((current->thread.flags & SPARC_FLAG_32BIT) &&
86 brk >= 0xf0000000UL)
87 return current->mm->brk;
89 if ((current->mm->brk & PAGE_OFFSET) != (brk & PAGE_OFFSET))
90 return current->mm->brk;
91 return sys_brk(brk);
95 * sys_pipe() is the normal C calling standard for creating
96 * a pipe. It's not the way unix traditionally does this, though.
98 asmlinkage int sparc_pipe(struct pt_regs *regs)
100 int fd[2];
101 int error;
103 error = do_pipe(fd);
104 if (error)
105 goto out;
106 regs->u_regs[UREG_I1] = fd[1];
107 error = fd[0];
108 out:
109 return error;
113 * sys_ipc() is the de-multiplexer for the SysV IPC calls..
115 * This is really horribly ugly.
118 asmlinkage int sys_ipc (unsigned call, int first, int second, unsigned long third, void *ptr, long fifth)
120 int err;
122 /* No need for backward compatibility. We can start fresh... */
124 if (call <= SEMCTL)
125 switch (call) {
126 case SEMOP:
127 err = sys_semop (first, (struct sembuf *)ptr, second);
128 goto out;
129 case SEMGET:
130 err = sys_semget (first, second, (int)third);
131 goto out;
132 case SEMCTL: {
133 union semun fourth;
134 err = -EINVAL;
135 if (!ptr)
136 goto out;
137 err = -EFAULT;
138 if(get_user(fourth.__pad, (void **)ptr))
139 goto out;
140 err = sys_semctl (first, second | IPC_64, (int)third, fourth);
141 goto out;
143 default:
144 err = -EINVAL;
145 goto out;
147 if (call <= MSGCTL)
148 switch (call) {
149 case MSGSND:
150 err = sys_msgsnd (first, (struct msgbuf *) ptr,
151 second, (int)third);
152 goto out;
153 case MSGRCV:
154 err = sys_msgrcv (first, (struct msgbuf *) ptr, second, fifth, (int)third);
155 goto out;
156 case MSGGET:
157 err = sys_msgget ((key_t) first, second);
158 goto out;
159 case MSGCTL:
160 err = sys_msgctl (first, second | IPC_64, (struct msqid_ds *) ptr);
161 goto out;
162 default:
163 err = -EINVAL;
164 goto out;
166 if (call <= SHMCTL)
167 switch (call) {
168 case SHMAT:
169 err = sys_shmat (first, (char *) ptr, second, (ulong *) third);
170 goto out;
171 case SHMDT:
172 err = sys_shmdt ((char *)ptr);
173 goto out;
174 case SHMGET:
175 err = sys_shmget (first, second, (int)third);
176 goto out;
177 case SHMCTL:
178 err = sys_shmctl (first, second | IPC_64, (struct shmid_ds *) ptr);
179 goto out;
180 default:
181 err = -EINVAL;
182 goto out;
184 else
185 err = -EINVAL;
186 out:
187 return err;
190 extern asmlinkage int sys_newuname(struct new_utsname * name);
192 asmlinkage int sparc64_newuname(struct new_utsname * name)
194 int ret = sys_newuname(name);
196 if (current->personality == PER_LINUX32 && !ret) {
197 ret = copy_to_user(name->machine, "sparc\0\0", 8);
199 return ret;
202 extern asmlinkage long sys_personality(unsigned long);
204 asmlinkage int sparc64_personality(unsigned long personality)
206 int ret;
207 if (current->personality == PER_LINUX32 && personality == PER_LINUX)
208 personality = PER_LINUX32;
209 ret = sys_personality(personality);
210 if (ret == PER_LINUX32)
211 ret = PER_LINUX;
212 return ret;
215 /* Linux version of mmap */
216 asmlinkage unsigned long sys_mmap(unsigned long addr, unsigned long len,
217 unsigned long prot, unsigned long flags, unsigned long fd,
218 unsigned long off)
220 struct file * file = NULL;
221 unsigned long retval = -EBADF;
223 if (!(flags & MAP_ANONYMOUS)) {
224 file = fget(fd);
225 if (!file)
226 goto out;
228 flags &= ~(MAP_EXECUTABLE | MAP_DENYWRITE);
229 len = PAGE_ALIGN(len);
230 retval = -EINVAL;
232 if (current->thread.flags & SPARC_FLAG_32BIT) {
233 if (len > 0xf0000000UL ||
234 ((flags & MAP_FIXED) && addr > 0xf0000000UL - len))
235 goto out_putf;
236 } else {
237 if (len > -PAGE_OFFSET ||
238 ((flags & MAP_FIXED) &&
239 addr < PAGE_OFFSET && addr + len > -PAGE_OFFSET))
240 goto out_putf;
243 if (flags & MAP_SHARED)
244 current->thread.flags |= SPARC_FLAG_MMAPSHARED;
246 down(&current->mm->mmap_sem);
247 retval = do_mmap(file, addr, len, prot, flags, off);
248 up(&current->mm->mmap_sem);
250 current->thread.flags &= ~(SPARC_FLAG_MMAPSHARED);
252 out_putf:
253 if (file)
254 fput(file);
255 out:
256 return retval;
259 asmlinkage long sys64_munmap(unsigned long addr, size_t len)
261 long ret;
263 if (len > -PAGE_OFFSET ||
264 (addr < PAGE_OFFSET && addr + len > -PAGE_OFFSET))
265 return -EINVAL;
266 down(&current->mm->mmap_sem);
267 ret = do_munmap(current->mm, addr, len);
268 up(&current->mm->mmap_sem);
269 return ret;
272 extern unsigned long do_mremap(unsigned long addr,
273 unsigned long old_len, unsigned long new_len,
274 unsigned long flags, unsigned long new_addr);
276 asmlinkage unsigned long sys64_mremap(unsigned long addr,
277 unsigned long old_len, unsigned long new_len,
278 unsigned long flags, unsigned long new_addr)
280 struct vm_area_struct *vma;
281 unsigned long ret = -EINVAL;
282 if (current->thread.flags & SPARC_FLAG_32BIT)
283 goto out;
284 if (old_len > -PAGE_OFFSET || new_len > -PAGE_OFFSET)
285 goto out;
286 if (addr < PAGE_OFFSET && addr + old_len > -PAGE_OFFSET)
287 goto out;
288 down(&current->mm->mmap_sem);
289 vma = find_vma(current->mm, addr);
290 if (vma && (vma->vm_flags & VM_SHARED))
291 current->thread.flags |= SPARC_FLAG_MMAPSHARED;
292 if (flags & MREMAP_FIXED) {
293 if (new_addr < PAGE_OFFSET &&
294 new_addr + new_len > -PAGE_OFFSET)
295 goto out_sem;
296 } else if (addr < PAGE_OFFSET && addr + new_len > -PAGE_OFFSET) {
297 ret = -ENOMEM;
298 if (!(flags & MREMAP_MAYMOVE))
299 goto out_sem;
300 new_addr = get_unmapped_area(addr, new_len);
301 if (!new_addr)
302 goto out_sem;
303 flags |= MREMAP_FIXED;
305 ret = do_mremap(addr, old_len, new_len, flags, new_addr);
306 out_sem:
307 current->thread.flags &= ~(SPARC_FLAG_MMAPSHARED);
308 up(&current->mm->mmap_sem);
309 out:
310 return ret;
313 /* we come to here via sys_nis_syscall so it can setup the regs argument */
314 asmlinkage unsigned long
315 c_sys_nis_syscall (struct pt_regs *regs)
317 static int count=0;
319 /* Don't make the system unusable, if someone goes stuck */
320 if (count++ > 5)
321 return -ENOSYS;
323 printk ("Unimplemented SPARC system call %ld\n",regs->u_regs[1]);
324 #ifdef DEBUG_UNIMP_SYSCALL
325 show_regs (regs);
326 #endif
328 return -ENOSYS;
331 /* #define DEBUG_SPARC_BREAKPOINT */
333 asmlinkage void
334 sparc_breakpoint (struct pt_regs *regs)
336 siginfo_t info;
338 #ifdef DEBUG_SPARC_BREAKPOINT
339 printk ("TRAP: Entering kernel PC=%lx, nPC=%lx\n", regs->tpc, regs->tnpc);
340 #endif
341 info.si_signo = SIGTRAP;
342 info.si_errno = 0;
343 info.si_code = TRAP_BRKPT;
344 info.si_addr = (void *)regs->tpc;
345 info.si_trapno = 0;
346 force_sig_info(SIGTRAP, &info, current);
347 #ifdef DEBUG_SPARC_BREAKPOINT
348 printk ("TRAP: Returning to space: PC=%lx nPC=%lx\n", regs->tpc, regs->tnpc);
349 #endif
352 extern void check_pending(int signum);
354 asmlinkage int sys_getdomainname(char *name, int len)
356 int nlen;
357 int err = -EFAULT;
359 down_read(&uts_sem);
361 nlen = strlen(system_utsname.domainname) + 1;
363 if (nlen < len)
364 len = nlen;
365 if(len > __NEW_UTS_LEN)
366 goto done;
367 if(copy_to_user(name, system_utsname.domainname, len))
368 goto done;
369 err = 0;
370 done:
371 up_read(&uts_sem);
372 return err;
375 /* only AP+ systems have sys_aplib */
376 asmlinkage int sys_aplib(void)
378 return -ENOSYS;
381 asmlinkage int solaris_syscall(struct pt_regs *regs)
383 static int count = 0;
385 regs->tpc = regs->tnpc;
386 regs->tnpc += 4;
387 if(++count <= 5) {
388 printk ("For Solaris binary emulation you need solaris module loaded\n");
389 show_regs (regs);
391 send_sig(SIGSEGV, current, 1);
393 return -ENOSYS;
396 #ifndef CONFIG_SUNOS_EMUL
397 asmlinkage int sunos_syscall(struct pt_regs *regs)
399 static int count = 0;
401 regs->tpc = regs->tnpc;
402 regs->tnpc += 4;
403 if(++count <= 20)
404 printk ("SunOS binary emulation not compiled in\n");
405 force_sig(SIGSEGV, current);
407 return -ENOSYS;
409 #endif
411 asmlinkage int sys_utrap_install(utrap_entry_t type, utrap_handler_t new_p,
412 utrap_handler_t new_d,
413 utrap_handler_t *old_p, utrap_handler_t *old_d)
415 if (type < UT_INSTRUCTION_EXCEPTION || type > UT_TRAP_INSTRUCTION_31)
416 return -EINVAL;
417 if (new_p == (utrap_handler_t)(long)UTH_NOCHANGE) {
418 if (old_p) {
419 if (!current->thread.utraps) {
420 if (put_user(NULL, old_p))
421 return -EFAULT;
422 } else {
423 if (put_user((utrap_handler_t)(current->thread.utraps[type]), old_p))
424 return -EFAULT;
427 if (old_d) {
428 if (put_user(NULL, old_d))
429 return -EFAULT;
431 return 0;
433 if (!current->thread.utraps) {
434 current->thread.utraps =
435 kmalloc((UT_TRAP_INSTRUCTION_31+1)*sizeof(long), GFP_KERNEL);
436 if (!current->thread.utraps) return -ENOMEM;
437 current->thread.utraps[0] = 1;
438 memset(current->thread.utraps+1, 0, UT_TRAP_INSTRUCTION_31*sizeof(long));
439 } else {
440 if ((utrap_handler_t)current->thread.utraps[type] != new_p &&
441 current->thread.utraps[0] > 1) {
442 long *p = current->thread.utraps;
444 current->thread.utraps =
445 kmalloc((UT_TRAP_INSTRUCTION_31+1)*sizeof(long),
446 GFP_KERNEL);
447 if (!current->thread.utraps) {
448 current->thread.utraps = p;
449 return -ENOMEM;
451 p[0]--;
452 current->thread.utraps[0] = 1;
453 memcpy(current->thread.utraps+1, p+1,
454 UT_TRAP_INSTRUCTION_31*sizeof(long));
457 if (old_p) {
458 if (put_user((utrap_handler_t)(current->thread.utraps[type]), old_p))
459 return -EFAULT;
461 if (old_d) {
462 if (put_user(NULL, old_d))
463 return -EFAULT;
465 current->thread.utraps[type] = (long)new_p;
467 return 0;
470 long sparc_memory_ordering(unsigned long model, struct pt_regs *regs)
472 if (model >= 3)
473 return -EINVAL;
474 regs->tstate = (regs->tstate & ~TSTATE_MM) | (model << 14);
475 return 0;
478 asmlinkage int
479 sys_rt_sigaction(int sig, const struct sigaction *act, struct sigaction *oact,
480 void *restorer, size_t sigsetsize)
482 struct k_sigaction new_ka, old_ka;
483 int ret;
485 /* XXX: Don't preclude handling different sized sigset_t's. */
486 if (sigsetsize != sizeof(sigset_t))
487 return -EINVAL;
489 if (act) {
490 new_ka.ka_restorer = restorer;
491 if (copy_from_user(&new_ka.sa, act, sizeof(*act)))
492 return -EFAULT;
495 ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
497 if (!ret && oact) {
498 if (copy_to_user(oact, &old_ka.sa, sizeof(*oact)))
499 return -EFAULT;
502 return ret;
505 /* Invoked by rtrap code to update performance counters in
506 * user space.
508 asmlinkage void
509 update_perfctrs(void)
511 unsigned long pic, tmp;
513 read_pic(pic);
514 tmp = (current->thread.kernel_cntd0 += (unsigned int)pic);
515 __put_user(tmp, current->thread.user_cntd0);
516 tmp = (current->thread.kernel_cntd1 += (pic >> 32));
517 __put_user(tmp, current->thread.user_cntd1);
518 reset_pic();
521 asmlinkage int
522 sys_perfctr(int opcode, unsigned long arg0, unsigned long arg1, unsigned long arg2)
524 int err = 0;
526 switch(opcode) {
527 case PERFCTR_ON:
528 current->thread.pcr_reg = arg2;
529 current->thread.user_cntd0 = (u64 *) arg0;
530 current->thread.user_cntd1 = (u64 *) arg1;
531 current->thread.kernel_cntd0 =
532 current->thread.kernel_cntd1 = 0;
533 write_pcr(arg2);
534 reset_pic();
535 current->thread.flags |= SPARC_FLAG_PERFCTR;
536 break;
538 case PERFCTR_OFF:
539 err = -EINVAL;
540 if ((current->thread.flags & SPARC_FLAG_PERFCTR) != 0) {
541 current->thread.user_cntd0 =
542 current->thread.user_cntd1 = NULL;
543 current->thread.pcr_reg = 0;
544 write_pcr(0);
545 current->thread.flags &= ~(SPARC_FLAG_PERFCTR);
546 err = 0;
548 break;
550 case PERFCTR_READ: {
551 unsigned long pic, tmp;
553 if (!(current->thread.flags & SPARC_FLAG_PERFCTR)) {
554 err = -EINVAL;
555 break;
557 read_pic(pic);
558 tmp = (current->thread.kernel_cntd0 += (unsigned int)pic);
559 err |= __put_user(tmp, current->thread.user_cntd0);
560 tmp = (current->thread.kernel_cntd1 += (pic >> 32));
561 err |= __put_user(tmp, current->thread.user_cntd1);
562 reset_pic();
563 break;
566 case PERFCTR_CLRPIC:
567 if (!(current->thread.flags & SPARC_FLAG_PERFCTR)) {
568 err = -EINVAL;
569 break;
571 current->thread.kernel_cntd0 =
572 current->thread.kernel_cntd1 = 0;
573 reset_pic();
574 break;
576 case PERFCTR_SETPCR: {
577 u64 *user_pcr = (u64 *)arg0;
578 if (!(current->thread.flags & SPARC_FLAG_PERFCTR)) {
579 err = -EINVAL;
580 break;
582 err |= __get_user(current->thread.pcr_reg, user_pcr);
583 write_pcr(current->thread.pcr_reg);
584 current->thread.kernel_cntd0 =
585 current->thread.kernel_cntd1 = 0;
586 reset_pic();
587 break;
590 case PERFCTR_GETPCR: {
591 u64 *user_pcr = (u64 *)arg0;
592 if (!(current->thread.flags & SPARC_FLAG_PERFCTR)) {
593 err = -EINVAL;
594 break;
596 err |= __put_user(current->thread.pcr_reg, user_pcr);
597 break;
600 default:
601 err = -EINVAL;
602 break;
604 return err;