1 // SPDX-License-Identifier: GPL-2.0-only
3 * arch/arm/kernel/sys_oabi-compat.c
5 * Compatibility wrappers for syscalls that are used from
6 * old ABI user space binaries with an EABI kernel.
8 * Author: Nicolas Pitre
10 * Copyright: MontaVista Software, Inc.
13 #include <asm/syscalls.h>
16 * The legacy ABI and the new ARM EABI have different rules making some
17 * syscalls incompatible especially with structure arguments.
18 * Most notably, Eabi says 64-bit members should be 64-bit aligned instead of
19 * simply word aligned. EABI also pads structures to the size of the largest
20 * member it contains instead of the invariant 32-bit.
22 * The following syscalls are affected:
29 * struct stat64 has different sizes and some members are shifted
30 * Compatibility wrappers are needed for them and provided below.
34 * struct flock64 has different sizes and some members are shifted
35 * A compatibility wrapper is needed and provided below.
40 * struct statfs64 has extra padding with EABI growing its size from
41 * 84 to 88. This struct is now __attribute__((packed,aligned(4)))
42 * with a small assembly wrapper to force the sz argument to 84 if it is 88
43 * to avoid copying the extra padding over user space unexpecting it.
47 * struct new_utsname has no padding with EABI. No problem there.
52 * struct epoll_event has its second member shifted also affecting the
53 * structure size. Compatibility wrappers are needed and provided below.
59 * struct sembuf loses its padding with EABI. Since arrays of them are
60 * used they have to be copyed to remove the padding. Compatibility wrappers
69 * struct sockaddr_un loses its padding with EABI. Since the size of the
70 * structure is used as a validation test in unix_mkname(), we need to
71 * change the length argument to 110 whenever it is 112. Compatibility
72 * wrappers provided below.
75 #include <linux/syscalls.h>
76 #include <linux/errno.h>
78 #include <linux/filelock.h>
79 #include <linux/cred.h>
80 #include <linux/fcntl.h>
81 #include <linux/eventpoll.h>
82 #include <linux/sem.h>
83 #include <linux/socket.h>
84 #include <linux/net.h>
85 #include <linux/ipc.h>
86 #include <linux/ipc_namespace.h>
87 #include <linux/uaccess.h>
88 #include <linux/slab.h>
90 #include <asm/syscall.h>
92 struct oldabi_stat64
{
93 unsigned long long st_dev
;
95 unsigned long __st_ino
;
97 unsigned int st_nlink
;
100 unsigned long st_gid
;
102 unsigned long long st_rdev
;
106 unsigned long st_blksize
;
107 unsigned long long st_blocks
;
109 unsigned long st_atime
;
110 unsigned long st_atime_nsec
;
112 unsigned long st_mtime
;
113 unsigned long st_mtime_nsec
;
115 unsigned long st_ctime
;
116 unsigned long st_ctime_nsec
;
118 unsigned long long st_ino
;
119 } __attribute__ ((packed
,aligned(4)));
121 static long cp_oldabi_stat64(struct kstat
*stat
,
122 struct oldabi_stat64 __user
*statbuf
)
124 struct oldabi_stat64 tmp
;
126 tmp
.st_dev
= huge_encode_dev(stat
->dev
);
128 tmp
.__st_ino
= stat
->ino
;
129 tmp
.st_mode
= stat
->mode
;
130 tmp
.st_nlink
= stat
->nlink
;
131 tmp
.st_uid
= from_kuid_munged(current_user_ns(), stat
->uid
);
132 tmp
.st_gid
= from_kgid_munged(current_user_ns(), stat
->gid
);
133 tmp
.st_rdev
= huge_encode_dev(stat
->rdev
);
134 tmp
.st_size
= stat
->size
;
135 tmp
.st_blocks
= stat
->blocks
;
137 tmp
.st_blksize
= stat
->blksize
;
138 tmp
.st_atime
= stat
->atime
.tv_sec
;
139 tmp
.st_atime_nsec
= stat
->atime
.tv_nsec
;
140 tmp
.st_mtime
= stat
->mtime
.tv_sec
;
141 tmp
.st_mtime_nsec
= stat
->mtime
.tv_nsec
;
142 tmp
.st_ctime
= stat
->ctime
.tv_sec
;
143 tmp
.st_ctime_nsec
= stat
->ctime
.tv_nsec
;
144 tmp
.st_ino
= stat
->ino
;
145 return copy_to_user(statbuf
,&tmp
,sizeof(tmp
)) ? -EFAULT
: 0;
148 asmlinkage
long sys_oabi_stat64(const char __user
* filename
,
149 struct oldabi_stat64 __user
* statbuf
)
152 int error
= vfs_stat(filename
, &stat
);
154 error
= cp_oldabi_stat64(&stat
, statbuf
);
158 asmlinkage
long sys_oabi_lstat64(const char __user
* filename
,
159 struct oldabi_stat64 __user
* statbuf
)
162 int error
= vfs_lstat(filename
, &stat
);
164 error
= cp_oldabi_stat64(&stat
, statbuf
);
168 asmlinkage
long sys_oabi_fstat64(unsigned long fd
,
169 struct oldabi_stat64 __user
* statbuf
)
172 int error
= vfs_fstat(fd
, &stat
);
174 error
= cp_oldabi_stat64(&stat
, statbuf
);
178 asmlinkage
long sys_oabi_fstatat64(int dfd
,
179 const char __user
*filename
,
180 struct oldabi_stat64 __user
*statbuf
,
186 error
= vfs_fstatat(dfd
, filename
, &stat
, flag
);
189 return cp_oldabi_stat64(&stat
, statbuf
);
192 struct oabi_flock64
{
198 } __attribute__ ((packed
,aligned(4)));
200 static int get_oabi_flock(struct flock64
*kernel
, struct oabi_flock64 __user
*arg
)
202 struct oabi_flock64 user
;
204 if (copy_from_user(&user
, (struct oabi_flock64 __user
*)arg
,
208 kernel
->l_type
= user
.l_type
;
209 kernel
->l_whence
= user
.l_whence
;
210 kernel
->l_start
= user
.l_start
;
211 kernel
->l_len
= user
.l_len
;
212 kernel
->l_pid
= user
.l_pid
;
217 static int put_oabi_flock(struct flock64
*kernel
, struct oabi_flock64 __user
*arg
)
219 struct oabi_flock64 user
;
221 user
.l_type
= kernel
->l_type
;
222 user
.l_whence
= kernel
->l_whence
;
223 user
.l_start
= kernel
->l_start
;
224 user
.l_len
= kernel
->l_len
;
225 user
.l_pid
= kernel
->l_pid
;
227 if (copy_to_user((struct oabi_flock64 __user
*)arg
,
228 &user
, sizeof(user
)))
234 asmlinkage
long sys_oabi_fcntl64(unsigned int fd
, unsigned int cmd
,
237 void __user
*argp
= (void __user
*)arg
;
238 CLASS(fd_raw
, f
)(fd
);
239 struct flock64 flock
;
248 err
= security_file_fcntl(fd_file(f
), cmd
, arg
);
251 err
= get_oabi_flock(&flock
, argp
);
254 err
= fcntl_getlk64(fd_file(f
), cmd
, &flock
);
256 err
= put_oabi_flock(&flock
, argp
);
262 err
= security_file_fcntl(fd_file(f
), cmd
, arg
);
265 err
= get_oabi_flock(&flock
, argp
);
268 err
= fcntl_setlk64(fd
, fd_file(f
), cmd
, &flock
);
271 err
= sys_fcntl64(fd
, cmd
, arg
);
277 struct oabi_epoll_event
{
280 } __attribute__ ((packed
,aligned(4)));
283 asmlinkage
long sys_oabi_epoll_ctl(int epfd
, int op
, int fd
,
284 struct oabi_epoll_event __user
*event
)
286 struct oabi_epoll_event user
;
287 struct epoll_event kernel
;
289 if (ep_op_has_event(op
) &&
290 copy_from_user(&user
, event
, sizeof(user
)))
293 kernel
.events
= user
.events
;
294 kernel
.data
= user
.data
;
296 return do_epoll_ctl(epfd
, op
, fd
, &kernel
, false);
299 asmlinkage
long sys_oabi_epoll_ctl(int epfd
, int op
, int fd
,
300 struct oabi_epoll_event __user
*event
)
306 struct epoll_event __user
*
307 epoll_put_uevent(__poll_t revents
, __u64 data
,
308 struct epoll_event __user
*uevent
)
310 if (in_oabi_syscall()) {
311 struct oabi_epoll_event __user
*oevent
= (void __user
*)uevent
;
313 if (__put_user(revents
, &oevent
->events
) ||
314 __put_user(data
, &oevent
->data
))
317 return (void __user
*)(oevent
+1);
320 if (__put_user(revents
, &uevent
->events
) ||
321 __put_user(data
, &uevent
->data
))
328 unsigned short sem_num
;
331 unsigned short __pad
;
334 #define sc_semopm sem_ctls[2]
336 #ifdef CONFIG_SYSVIPC
337 asmlinkage
long sys_oabi_semtimedop(int semid
,
338 struct oabi_sembuf __user
*tsops
,
340 const struct old_timespec32 __user
*timeout
)
342 struct ipc_namespace
*ns
;
347 ns
= current
->nsproxy
->ipc_ns
;
348 if (nsops
> ns
->sc_semopm
)
350 if (nsops
< 1 || nsops
> SEMOPM
)
352 sops
= kvmalloc_array(nsops
, sizeof(*sops
), GFP_KERNEL
);
356 for (i
= 0; i
< nsops
; i
++) {
357 struct oabi_sembuf osb
;
358 err
|= copy_from_user(&osb
, tsops
, sizeof(osb
));
359 sops
[i
].sem_num
= osb
.sem_num
;
360 sops
[i
].sem_op
= osb
.sem_op
;
361 sops
[i
].sem_flg
= osb
.sem_flg
;
370 struct timespec64 ts
;
371 err
= get_old_timespec32(&ts
, timeout
);
374 err
= __do_semtimedop(semid
, sops
, nsops
, &ts
, ns
);
377 err
= __do_semtimedop(semid
, sops
, nsops
, NULL
, ns
);
383 asmlinkage
long sys_oabi_semop(int semid
, struct oabi_sembuf __user
*tsops
,
386 return sys_oabi_semtimedop(semid
, tsops
, nsops
, NULL
);
389 asmlinkage
int sys_oabi_ipc(uint call
, int first
, int second
, int third
,
390 void __user
*ptr
, long fifth
)
392 switch (call
& 0xffff) {
394 return sys_oabi_semtimedop(first
,
395 (struct oabi_sembuf __user
*)ptr
,
398 return sys_oabi_semtimedop(first
,
399 (struct oabi_sembuf __user
*)ptr
,
401 (const struct old_timespec32 __user
*)fifth
);
403 return sys_ipc(call
, first
, second
, third
, ptr
, fifth
);
407 asmlinkage
long sys_oabi_semtimedop(int semid
,
408 struct oabi_sembuf __user
*tsops
,
410 const struct old_timespec32 __user
*timeout
)
415 asmlinkage
long sys_oabi_semop(int semid
, struct oabi_sembuf __user
*tsops
,
421 asmlinkage
int sys_oabi_ipc(uint call
, int first
, int second
, int third
,
422 void __user
*ptr
, long fifth
)
428 asmlinkage
long sys_oabi_bind(int fd
, struct sockaddr __user
*addr
, int addrlen
)
430 sa_family_t sa_family
;
431 if (addrlen
== 112 &&
432 get_user(sa_family
, &addr
->sa_family
) == 0 &&
433 sa_family
== AF_UNIX
)
435 return sys_bind(fd
, addr
, addrlen
);
438 asmlinkage
long sys_oabi_connect(int fd
, struct sockaddr __user
*addr
, int addrlen
)
440 sa_family_t sa_family
;
441 if (addrlen
== 112 &&
442 get_user(sa_family
, &addr
->sa_family
) == 0 &&
443 sa_family
== AF_UNIX
)
445 return sys_connect(fd
, addr
, addrlen
);
448 asmlinkage
long sys_oabi_sendto(int fd
, void __user
*buff
,
449 size_t len
, unsigned flags
,
450 struct sockaddr __user
*addr
,
453 sa_family_t sa_family
;
454 if (addrlen
== 112 &&
455 get_user(sa_family
, &addr
->sa_family
) == 0 &&
456 sa_family
== AF_UNIX
)
458 return sys_sendto(fd
, buff
, len
, flags
, addr
, addrlen
);
461 asmlinkage
long sys_oabi_sendmsg(int fd
, struct user_msghdr __user
*msg
, unsigned flags
)
463 struct sockaddr __user
*addr
;
465 sa_family_t sa_family
;
467 get_user(msg_namelen
, &msg
->msg_namelen
) == 0 &&
468 msg_namelen
== 112 &&
469 get_user(addr
, &msg
->msg_name
) == 0 &&
470 get_user(sa_family
, &addr
->sa_family
) == 0 &&
471 sa_family
== AF_UNIX
)
474 * HACK ALERT: there is a limit to how much backward bending
475 * we should do for what is actually a transitional
476 * compatibility layer. This already has known flaws with
477 * a few ioctls that we don't intend to fix. Therefore
478 * consider this blatent hack as another one... and take care
479 * to run for cover. In most cases it will "just work fine".
480 * If it doesn't, well, tough.
482 put_user(110, &msg
->msg_namelen
);
484 return sys_sendmsg(fd
, msg
, flags
);
487 asmlinkage
long sys_oabi_socketcall(int call
, unsigned long __user
*args
)
489 unsigned long r
= -EFAULT
, a
[6];
493 if (copy_from_user(a
, args
, 3 * sizeof(long)) == 0)
494 r
= sys_oabi_bind(a
[0], (struct sockaddr __user
*)a
[1], a
[2]);
497 if (copy_from_user(a
, args
, 3 * sizeof(long)) == 0)
498 r
= sys_oabi_connect(a
[0], (struct sockaddr __user
*)a
[1], a
[2]);
501 if (copy_from_user(a
, args
, 6 * sizeof(long)) == 0)
502 r
= sys_oabi_sendto(a
[0], (void __user
*)a
[1], a
[2], a
[3],
503 (struct sockaddr __user
*)a
[4], a
[5]);
506 if (copy_from_user(a
, args
, 3 * sizeof(long)) == 0)
507 r
= sys_oabi_sendmsg(a
[0], (struct user_msghdr __user
*)a
[1], a
[2]);
510 r
= sys_socketcall(call
, args
);