4 * Kernel compatibililty routines for e.g. 32 bit syscall support
7 * Copyright (C) 2002 Stephen Rothwell, IBM Corporation
8 * Copyright (C) 1997-2000 Jakub Jelinek (jakub@redhat.com)
9 * Copyright (C) 1998 Eddie C. Dost (ecd@skynet.be)
10 * Copyright (C) 2001,2002 Andi Kleen, SuSE Labs
11 * Copyright (C) 2003 Pavel Machek (pavel@suse.cz)
13 * This program is free software; you can redistribute it and/or modify
14 * it under the terms of the GNU General Public License version 2 as
15 * published by the Free Software Foundation.
18 #include <linux/kernel.h>
19 #include <linux/linkage.h>
20 #include <linux/compat.h>
21 #include <linux/errno.h>
22 #include <linux/time.h>
24 #include <linux/fcntl.h>
25 #include <linux/namei.h>
26 #include <linux/file.h>
27 #include <linux/vfs.h>
28 #include <linux/ioctl.h>
29 #include <linux/init.h>
30 #include <linux/smb.h>
31 #include <linux/smb_mount.h>
32 #include <linux/ncp_mount.h>
33 #include <linux/nfs4_mount.h>
34 #include <linux/smp_lock.h>
35 #include <linux/syscalls.h>
36 #include <linux/ctype.h>
37 #include <linux/module.h>
38 #include <linux/dirent.h>
39 #include <linux/fsnotify.h>
40 #include <linux/highuid.h>
41 #include <linux/sunrpc/svc.h>
42 #include <linux/nfsd/nfsd.h>
43 #include <linux/nfsd/syscall.h>
44 #include <linux/personality.h>
45 #include <linux/rwsem.h>
46 #include <linux/tsacct_kern.h>
47 #include <linux/security.h>
48 #include <linux/highmem.h>
49 #include <linux/signal.h>
50 #include <linux/poll.h>
52 #include <linux/eventpoll.h>
54 #include <asm/uaccess.h>
55 #include <asm/mmu_context.h>
56 #include <asm/ioctls.h>
61 int compat_printk(const char *fmt
, ...)
68 ret
= vprintk(fmt
, ap
);
73 #include "read_write.h"
76 * Not all architectures have sys_utime, so implement this in terms
79 asmlinkage
long compat_sys_utime(char __user
*filename
, struct compat_utimbuf __user
*t
)
81 struct timespec tv
[2];
84 if (get_user(tv
[0].tv_sec
, &t
->actime
) ||
85 get_user(tv
[1].tv_sec
, &t
->modtime
))
90 return do_utimes(AT_FDCWD
, filename
, t
? tv
: NULL
, 0);
93 asmlinkage
long compat_sys_utimensat(unsigned int dfd
, char __user
*filename
, struct compat_timespec __user
*t
, int flags
)
95 struct timespec tv
[2];
98 if (get_compat_timespec(&tv
[0], &t
[0]) ||
99 get_compat_timespec(&tv
[1], &t
[1]))
102 if ((tv
[0].tv_nsec
== UTIME_OMIT
|| tv
[0].tv_nsec
== UTIME_NOW
)
103 && tv
[0].tv_sec
!= 0)
105 if ((tv
[1].tv_nsec
== UTIME_OMIT
|| tv
[1].tv_nsec
== UTIME_NOW
)
106 && tv
[1].tv_sec
!= 0)
109 if (tv
[0].tv_nsec
== UTIME_OMIT
&& tv
[1].tv_nsec
== UTIME_OMIT
)
112 return do_utimes(dfd
, filename
, t
? tv
: NULL
, flags
);
115 asmlinkage
long compat_sys_futimesat(unsigned int dfd
, char __user
*filename
, struct compat_timeval __user
*t
)
117 struct timespec tv
[2];
120 if (get_user(tv
[0].tv_sec
, &t
[0].tv_sec
) ||
121 get_user(tv
[0].tv_nsec
, &t
[0].tv_usec
) ||
122 get_user(tv
[1].tv_sec
, &t
[1].tv_sec
) ||
123 get_user(tv
[1].tv_nsec
, &t
[1].tv_usec
))
125 if (tv
[0].tv_nsec
>= 1000000 || tv
[0].tv_nsec
< 0 ||
126 tv
[1].tv_nsec
>= 1000000 || tv
[1].tv_nsec
< 0)
128 tv
[0].tv_nsec
*= 1000;
129 tv
[1].tv_nsec
*= 1000;
131 return do_utimes(dfd
, filename
, t
? tv
: NULL
, 0);
134 asmlinkage
long compat_sys_utimes(char __user
*filename
, struct compat_timeval __user
*t
)
136 return compat_sys_futimesat(AT_FDCWD
, filename
, t
);
139 asmlinkage
long compat_sys_newstat(char __user
* filename
,
140 struct compat_stat __user
*statbuf
)
143 int error
= vfs_stat_fd(AT_FDCWD
, filename
, &stat
);
146 error
= cp_compat_stat(&stat
, statbuf
);
150 asmlinkage
long compat_sys_newlstat(char __user
* filename
,
151 struct compat_stat __user
*statbuf
)
154 int error
= vfs_lstat_fd(AT_FDCWD
, filename
, &stat
);
157 error
= cp_compat_stat(&stat
, statbuf
);
161 #ifndef __ARCH_WANT_STAT64
162 asmlinkage
long compat_sys_newfstatat(unsigned int dfd
, char __user
*filename
,
163 struct compat_stat __user
*statbuf
, int flag
)
168 if ((flag
& ~AT_SYMLINK_NOFOLLOW
) != 0)
171 if (flag
& AT_SYMLINK_NOFOLLOW
)
172 error
= vfs_lstat_fd(dfd
, filename
, &stat
);
174 error
= vfs_stat_fd(dfd
, filename
, &stat
);
177 error
= cp_compat_stat(&stat
, statbuf
);
184 asmlinkage
long compat_sys_newfstat(unsigned int fd
,
185 struct compat_stat __user
* statbuf
)
188 int error
= vfs_fstat(fd
, &stat
);
191 error
= cp_compat_stat(&stat
, statbuf
);
195 static int put_compat_statfs(struct compat_statfs __user
*ubuf
, struct kstatfs
*kbuf
)
198 if (sizeof ubuf
->f_blocks
== 4) {
199 if ((kbuf
->f_blocks
| kbuf
->f_bfree
| kbuf
->f_bavail
) &
200 0xffffffff00000000ULL
)
202 /* f_files and f_ffree may be -1; it's okay
203 * to stuff that into 32 bits */
204 if (kbuf
->f_files
!= 0xffffffffffffffffULL
205 && (kbuf
->f_files
& 0xffffffff00000000ULL
))
207 if (kbuf
->f_ffree
!= 0xffffffffffffffffULL
208 && (kbuf
->f_ffree
& 0xffffffff00000000ULL
))
211 if (!access_ok(VERIFY_WRITE
, ubuf
, sizeof(*ubuf
)) ||
212 __put_user(kbuf
->f_type
, &ubuf
->f_type
) ||
213 __put_user(kbuf
->f_bsize
, &ubuf
->f_bsize
) ||
214 __put_user(kbuf
->f_blocks
, &ubuf
->f_blocks
) ||
215 __put_user(kbuf
->f_bfree
, &ubuf
->f_bfree
) ||
216 __put_user(kbuf
->f_bavail
, &ubuf
->f_bavail
) ||
217 __put_user(kbuf
->f_files
, &ubuf
->f_files
) ||
218 __put_user(kbuf
->f_ffree
, &ubuf
->f_ffree
) ||
219 __put_user(kbuf
->f_namelen
, &ubuf
->f_namelen
) ||
220 __put_user(kbuf
->f_fsid
.val
[0], &ubuf
->f_fsid
.val
[0]) ||
221 __put_user(kbuf
->f_fsid
.val
[1], &ubuf
->f_fsid
.val
[1]) ||
222 __put_user(kbuf
->f_frsize
, &ubuf
->f_frsize
) ||
223 __put_user(0, &ubuf
->f_spare
[0]) ||
224 __put_user(0, &ubuf
->f_spare
[1]) ||
225 __put_user(0, &ubuf
->f_spare
[2]) ||
226 __put_user(0, &ubuf
->f_spare
[3]) ||
227 __put_user(0, &ubuf
->f_spare
[4]))
233 * The following statfs calls are copies of code from fs/open.c and
234 * should be checked against those from time to time
236 asmlinkage
long compat_sys_statfs(const char __user
*path
, struct compat_statfs __user
*buf
)
241 error
= user_path_walk(path
, &nd
);
244 error
= vfs_statfs(nd
.path
.dentry
, &tmp
);
246 error
= put_compat_statfs(buf
, &tmp
);
252 asmlinkage
long compat_sys_fstatfs(unsigned int fd
, struct compat_statfs __user
*buf
)
262 error
= vfs_statfs(file
->f_path
.dentry
, &tmp
);
264 error
= put_compat_statfs(buf
, &tmp
);
270 static int put_compat_statfs64(struct compat_statfs64 __user
*ubuf
, struct kstatfs
*kbuf
)
272 if (sizeof ubuf
->f_blocks
== 4) {
273 if ((kbuf
->f_blocks
| kbuf
->f_bfree
| kbuf
->f_bavail
) &
274 0xffffffff00000000ULL
)
276 /* f_files and f_ffree may be -1; it's okay
277 * to stuff that into 32 bits */
278 if (kbuf
->f_files
!= 0xffffffffffffffffULL
279 && (kbuf
->f_files
& 0xffffffff00000000ULL
))
281 if (kbuf
->f_ffree
!= 0xffffffffffffffffULL
282 && (kbuf
->f_ffree
& 0xffffffff00000000ULL
))
285 if (!access_ok(VERIFY_WRITE
, ubuf
, sizeof(*ubuf
)) ||
286 __put_user(kbuf
->f_type
, &ubuf
->f_type
) ||
287 __put_user(kbuf
->f_bsize
, &ubuf
->f_bsize
) ||
288 __put_user(kbuf
->f_blocks
, &ubuf
->f_blocks
) ||
289 __put_user(kbuf
->f_bfree
, &ubuf
->f_bfree
) ||
290 __put_user(kbuf
->f_bavail
, &ubuf
->f_bavail
) ||
291 __put_user(kbuf
->f_files
, &ubuf
->f_files
) ||
292 __put_user(kbuf
->f_ffree
, &ubuf
->f_ffree
) ||
293 __put_user(kbuf
->f_namelen
, &ubuf
->f_namelen
) ||
294 __put_user(kbuf
->f_fsid
.val
[0], &ubuf
->f_fsid
.val
[0]) ||
295 __put_user(kbuf
->f_fsid
.val
[1], &ubuf
->f_fsid
.val
[1]) ||
296 __put_user(kbuf
->f_frsize
, &ubuf
->f_frsize
))
301 asmlinkage
long compat_sys_statfs64(const char __user
*path
, compat_size_t sz
, struct compat_statfs64 __user
*buf
)
306 if (sz
!= sizeof(*buf
))
309 error
= user_path_walk(path
, &nd
);
312 error
= vfs_statfs(nd
.path
.dentry
, &tmp
);
314 error
= put_compat_statfs64(buf
, &tmp
);
320 asmlinkage
long compat_sys_fstatfs64(unsigned int fd
, compat_size_t sz
, struct compat_statfs64 __user
*buf
)
326 if (sz
!= sizeof(*buf
))
333 error
= vfs_statfs(file
->f_path
.dentry
, &tmp
);
335 error
= put_compat_statfs64(buf
, &tmp
);
341 static int get_compat_flock(struct flock
*kfl
, struct compat_flock __user
*ufl
)
343 if (!access_ok(VERIFY_READ
, ufl
, sizeof(*ufl
)) ||
344 __get_user(kfl
->l_type
, &ufl
->l_type
) ||
345 __get_user(kfl
->l_whence
, &ufl
->l_whence
) ||
346 __get_user(kfl
->l_start
, &ufl
->l_start
) ||
347 __get_user(kfl
->l_len
, &ufl
->l_len
) ||
348 __get_user(kfl
->l_pid
, &ufl
->l_pid
))
353 static int put_compat_flock(struct flock
*kfl
, struct compat_flock __user
*ufl
)
355 if (!access_ok(VERIFY_WRITE
, ufl
, sizeof(*ufl
)) ||
356 __put_user(kfl
->l_type
, &ufl
->l_type
) ||
357 __put_user(kfl
->l_whence
, &ufl
->l_whence
) ||
358 __put_user(kfl
->l_start
, &ufl
->l_start
) ||
359 __put_user(kfl
->l_len
, &ufl
->l_len
) ||
360 __put_user(kfl
->l_pid
, &ufl
->l_pid
))
365 #ifndef HAVE_ARCH_GET_COMPAT_FLOCK64
366 static int get_compat_flock64(struct flock
*kfl
, struct compat_flock64 __user
*ufl
)
368 if (!access_ok(VERIFY_READ
, ufl
, sizeof(*ufl
)) ||
369 __get_user(kfl
->l_type
, &ufl
->l_type
) ||
370 __get_user(kfl
->l_whence
, &ufl
->l_whence
) ||
371 __get_user(kfl
->l_start
, &ufl
->l_start
) ||
372 __get_user(kfl
->l_len
, &ufl
->l_len
) ||
373 __get_user(kfl
->l_pid
, &ufl
->l_pid
))
379 #ifndef HAVE_ARCH_PUT_COMPAT_FLOCK64
380 static int put_compat_flock64(struct flock
*kfl
, struct compat_flock64 __user
*ufl
)
382 if (!access_ok(VERIFY_WRITE
, ufl
, sizeof(*ufl
)) ||
383 __put_user(kfl
->l_type
, &ufl
->l_type
) ||
384 __put_user(kfl
->l_whence
, &ufl
->l_whence
) ||
385 __put_user(kfl
->l_start
, &ufl
->l_start
) ||
386 __put_user(kfl
->l_len
, &ufl
->l_len
) ||
387 __put_user(kfl
->l_pid
, &ufl
->l_pid
))
393 asmlinkage
long compat_sys_fcntl64(unsigned int fd
, unsigned int cmd
,
404 ret
= get_compat_flock(&f
, compat_ptr(arg
));
409 ret
= sys_fcntl(fd
, cmd
, (unsigned long)&f
);
411 if (cmd
== F_GETLK
&& ret
== 0) {
412 /* GETLK was successfule and we need to return the data...
413 * but it needs to fit in the compat structure.
414 * l_start shouldn't be too big, unless the original
415 * start + end is greater than COMPAT_OFF_T_MAX, in which
416 * case the app was asking for trouble, so we return
417 * -EOVERFLOW in that case.
418 * l_len could be too big, in which case we just truncate it,
419 * and only allow the app to see that part of the conflicting
420 * lock that might make sense to it anyway
423 if (f
.l_start
> COMPAT_OFF_T_MAX
)
425 if (f
.l_len
> COMPAT_OFF_T_MAX
)
426 f
.l_len
= COMPAT_OFF_T_MAX
;
428 ret
= put_compat_flock(&f
, compat_ptr(arg
));
435 ret
= get_compat_flock64(&f
, compat_ptr(arg
));
440 ret
= sys_fcntl(fd
, (cmd
== F_GETLK64
) ? F_GETLK
:
441 ((cmd
== F_SETLK64
) ? F_SETLK
: F_SETLKW
),
444 if (cmd
== F_GETLK64
&& ret
== 0) {
445 /* need to return lock information - see above for commentary */
446 if (f
.l_start
> COMPAT_LOFF_T_MAX
)
448 if (f
.l_len
> COMPAT_LOFF_T_MAX
)
449 f
.l_len
= COMPAT_LOFF_T_MAX
;
451 ret
= put_compat_flock64(&f
, compat_ptr(arg
));
456 ret
= sys_fcntl(fd
, cmd
, arg
);
462 asmlinkage
long compat_sys_fcntl(unsigned int fd
, unsigned int cmd
,
465 if ((cmd
== F_GETLK64
) || (cmd
== F_SETLK64
) || (cmd
== F_SETLKW64
))
467 return compat_sys_fcntl64(fd
, cmd
, arg
);
471 compat_sys_io_setup(unsigned nr_reqs
, u32 __user
*ctx32p
)
476 mm_segment_t oldfs
= get_fs();
477 if (unlikely(get_user(ctx64
, ctx32p
)))
481 /* The __user pointer cast is valid because of the set_fs() */
482 ret
= sys_io_setup(nr_reqs
, (aio_context_t __user
*) &ctx64
);
484 /* truncating is ok because it's a user address */
486 ret
= put_user((u32
) ctx64
, ctx32p
);
491 compat_sys_io_getevents(aio_context_t ctx_id
,
492 unsigned long min_nr
,
494 struct io_event __user
*events
,
495 struct compat_timespec __user
*timeout
)
499 struct timespec __user
*ut
= NULL
;
502 if (unlikely(!access_ok(VERIFY_WRITE
, events
,
503 nr
* sizeof(struct io_event
))))
506 if (get_compat_timespec(&t
, timeout
))
509 ut
= compat_alloc_user_space(sizeof(*ut
));
510 if (copy_to_user(ut
, &t
, sizeof(t
)) )
513 ret
= sys_io_getevents(ctx_id
, min_nr
, nr
, events
, ut
);
519 copy_iocb(long nr
, u32 __user
*ptr32
, struct iocb __user
* __user
*ptr64
)
524 for (i
= 0; i
< nr
; ++i
) {
525 if (get_user(uptr
, ptr32
+ i
))
527 if (put_user(compat_ptr(uptr
), ptr64
+ i
))
533 #define MAX_AIO_SUBMITS (PAGE_SIZE/sizeof(struct iocb *))
536 compat_sys_io_submit(aio_context_t ctx_id
, int nr
, u32 __user
*iocb
)
538 struct iocb __user
* __user
*iocb64
;
541 if (unlikely(nr
< 0))
544 if (nr
> MAX_AIO_SUBMITS
)
545 nr
= MAX_AIO_SUBMITS
;
547 iocb64
= compat_alloc_user_space(nr
* sizeof(*iocb64
));
548 ret
= copy_iocb(nr
, iocb
, iocb64
);
550 ret
= sys_io_submit(ctx_id
, nr
, iocb64
);
554 struct compat_ncp_mount_data
{
555 compat_int_t version
;
556 compat_uint_t ncp_fd
;
557 __compat_uid_t mounted_uid
;
558 compat_pid_t wdog_pid
;
559 unsigned char mounted_vol
[NCP_VOLNAME_LEN
+ 1];
560 compat_uint_t time_out
;
561 compat_uint_t retry_count
;
565 compat_mode_t file_mode
;
566 compat_mode_t dir_mode
;
569 struct compat_ncp_mount_data_v4
{
570 compat_int_t version
;
571 compat_ulong_t flags
;
572 compat_ulong_t mounted_uid
;
573 compat_long_t wdog_pid
;
574 compat_uint_t ncp_fd
;
575 compat_uint_t time_out
;
576 compat_uint_t retry_count
;
579 compat_ulong_t file_mode
;
580 compat_ulong_t dir_mode
;
583 static void *do_ncp_super_data_conv(void *raw_data
)
585 int version
= *(unsigned int *)raw_data
;
588 struct compat_ncp_mount_data
*c_n
= raw_data
;
589 struct ncp_mount_data
*n
= raw_data
;
591 n
->dir_mode
= c_n
->dir_mode
;
592 n
->file_mode
= c_n
->file_mode
;
595 memmove (n
->mounted_vol
, c_n
->mounted_vol
, (sizeof (c_n
->mounted_vol
) + 3 * sizeof (unsigned int)));
596 n
->wdog_pid
= c_n
->wdog_pid
;
597 n
->mounted_uid
= c_n
->mounted_uid
;
598 } else if (version
== 4) {
599 struct compat_ncp_mount_data_v4
*c_n
= raw_data
;
600 struct ncp_mount_data_v4
*n
= raw_data
;
602 n
->dir_mode
= c_n
->dir_mode
;
603 n
->file_mode
= c_n
->file_mode
;
606 n
->retry_count
= c_n
->retry_count
;
607 n
->time_out
= c_n
->time_out
;
608 n
->ncp_fd
= c_n
->ncp_fd
;
609 n
->wdog_pid
= c_n
->wdog_pid
;
610 n
->mounted_uid
= c_n
->mounted_uid
;
611 n
->flags
= c_n
->flags
;
612 } else if (version
!= 5) {
619 struct compat_smb_mount_data
{
620 compat_int_t version
;
621 __compat_uid_t mounted_uid
;
624 compat_mode_t file_mode
;
625 compat_mode_t dir_mode
;
628 static void *do_smb_super_data_conv(void *raw_data
)
630 struct smb_mount_data
*s
= raw_data
;
631 struct compat_smb_mount_data
*c_s
= raw_data
;
633 if (c_s
->version
!= SMB_MOUNT_OLDVERSION
)
635 s
->dir_mode
= c_s
->dir_mode
;
636 s
->file_mode
= c_s
->file_mode
;
639 s
->mounted_uid
= c_s
->mounted_uid
;
644 struct compat_nfs_string
{
649 static inline void compat_nfs_string(struct nfs_string
*dst
,
650 struct compat_nfs_string
*src
)
652 dst
->data
= compat_ptr(src
->data
);
656 struct compat_nfs4_mount_data_v1
{
657 compat_int_t version
;
662 compat_int_t retrans
;
663 compat_int_t acregmin
;
664 compat_int_t acregmax
;
665 compat_int_t acdirmin
;
666 compat_int_t acdirmax
;
667 struct compat_nfs_string client_addr
;
668 struct compat_nfs_string mnt_path
;
669 struct compat_nfs_string hostname
;
670 compat_uint_t host_addrlen
;
671 compat_uptr_t host_addr
;
673 compat_int_t auth_flavourlen
;
674 compat_uptr_t auth_flavours
;
677 static int do_nfs4_super_data_conv(void *raw_data
)
679 int version
= *(compat_uint_t
*) raw_data
;
682 struct compat_nfs4_mount_data_v1
*raw
= raw_data
;
683 struct nfs4_mount_data
*real
= raw_data
;
685 /* copy the fields backwards */
686 real
->auth_flavours
= compat_ptr(raw
->auth_flavours
);
687 real
->auth_flavourlen
= raw
->auth_flavourlen
;
688 real
->proto
= raw
->proto
;
689 real
->host_addr
= compat_ptr(raw
->host_addr
);
690 real
->host_addrlen
= raw
->host_addrlen
;
691 compat_nfs_string(&real
->hostname
, &raw
->hostname
);
692 compat_nfs_string(&real
->mnt_path
, &raw
->mnt_path
);
693 compat_nfs_string(&real
->client_addr
, &raw
->client_addr
);
694 real
->acdirmax
= raw
->acdirmax
;
695 real
->acdirmin
= raw
->acdirmin
;
696 real
->acregmax
= raw
->acregmax
;
697 real
->acregmin
= raw
->acregmin
;
698 real
->retrans
= raw
->retrans
;
699 real
->timeo
= raw
->timeo
;
700 real
->wsize
= raw
->wsize
;
701 real
->rsize
= raw
->rsize
;
702 real
->flags
= raw
->flags
;
703 real
->version
= raw
->version
;
712 #define SMBFS_NAME "smbfs"
713 #define NCPFS_NAME "ncpfs"
714 #define NFS4_NAME "nfs4"
716 asmlinkage
long compat_sys_mount(char __user
* dev_name
, char __user
* dir_name
,
717 char __user
* type
, unsigned long flags
,
720 unsigned long type_page
;
721 unsigned long data_page
;
722 unsigned long dev_page
;
726 retval
= copy_mount_options (type
, &type_page
);
730 dir_page
= getname(dir_name
);
731 retval
= PTR_ERR(dir_page
);
732 if (IS_ERR(dir_page
))
735 retval
= copy_mount_options (dev_name
, &dev_page
);
739 retval
= copy_mount_options (data
, &data_page
);
745 if (type_page
&& data_page
) {
746 if (!strcmp((char *)type_page
, SMBFS_NAME
)) {
747 do_smb_super_data_conv((void *)data_page
);
748 } else if (!strcmp((char *)type_page
, NCPFS_NAME
)) {
749 do_ncp_super_data_conv((void *)data_page
);
750 } else if (!strcmp((char *)type_page
, NFS4_NAME
)) {
751 if (do_nfs4_super_data_conv((void *) data_page
))
757 retval
= do_mount((char*)dev_page
, dir_page
, (char*)type_page
,
758 flags
, (void*)data_page
);
762 free_page(data_page
);
768 free_page(type_page
);
773 #define NAME_OFFSET(de) ((int) ((de)->d_name - (char __user *) (de)))
775 struct compat_old_linux_dirent
{
776 compat_ulong_t d_ino
;
777 compat_ulong_t d_offset
;
778 unsigned short d_namlen
;
782 struct compat_readdir_callback
{
783 struct compat_old_linux_dirent __user
*dirent
;
787 static int compat_fillonedir(void *__buf
, const char *name
, int namlen
,
788 loff_t offset
, u64 ino
, unsigned int d_type
)
790 struct compat_readdir_callback
*buf
= __buf
;
791 struct compat_old_linux_dirent __user
*dirent
;
792 compat_ulong_t d_ino
;
797 if (sizeof(d_ino
) < sizeof(ino
) && d_ino
!= ino
)
800 dirent
= buf
->dirent
;
801 if (!access_ok(VERIFY_WRITE
, dirent
,
802 (unsigned long)(dirent
->d_name
+ namlen
+ 1) -
803 (unsigned long)dirent
))
805 if ( __put_user(d_ino
, &dirent
->d_ino
) ||
806 __put_user(offset
, &dirent
->d_offset
) ||
807 __put_user(namlen
, &dirent
->d_namlen
) ||
808 __copy_to_user(dirent
->d_name
, name
, namlen
) ||
809 __put_user(0, dirent
->d_name
+ namlen
))
813 buf
->result
= -EFAULT
;
817 asmlinkage
long compat_sys_old_readdir(unsigned int fd
,
818 struct compat_old_linux_dirent __user
*dirent
, unsigned int count
)
822 struct compat_readdir_callback buf
;
832 error
= vfs_readdir(file
, compat_fillonedir
, &buf
);
841 struct compat_linux_dirent
{
842 compat_ulong_t d_ino
;
843 compat_ulong_t d_off
;
844 unsigned short d_reclen
;
848 struct compat_getdents_callback
{
849 struct compat_linux_dirent __user
*current_dir
;
850 struct compat_linux_dirent __user
*previous
;
855 static int compat_filldir(void *__buf
, const char *name
, int namlen
,
856 loff_t offset
, u64 ino
, unsigned int d_type
)
858 struct compat_linux_dirent __user
* dirent
;
859 struct compat_getdents_callback
*buf
= __buf
;
860 compat_ulong_t d_ino
;
861 int reclen
= ALIGN(NAME_OFFSET(dirent
) + namlen
+ 2, sizeof(compat_long_t
));
863 buf
->error
= -EINVAL
; /* only used if we fail.. */
864 if (reclen
> buf
->count
)
867 if (sizeof(d_ino
) < sizeof(ino
) && d_ino
!= ino
)
869 dirent
= buf
->previous
;
871 if (__put_user(offset
, &dirent
->d_off
))
874 dirent
= buf
->current_dir
;
875 if (__put_user(d_ino
, &dirent
->d_ino
))
877 if (__put_user(reclen
, &dirent
->d_reclen
))
879 if (copy_to_user(dirent
->d_name
, name
, namlen
))
881 if (__put_user(0, dirent
->d_name
+ namlen
))
883 if (__put_user(d_type
, (char __user
*) dirent
+ reclen
- 1))
885 buf
->previous
= dirent
;
886 dirent
= (void __user
*)dirent
+ reclen
;
887 buf
->current_dir
= dirent
;
888 buf
->count
-= reclen
;
891 buf
->error
= -EFAULT
;
895 asmlinkage
long compat_sys_getdents(unsigned int fd
,
896 struct compat_linux_dirent __user
*dirent
, unsigned int count
)
899 struct compat_linux_dirent __user
* lastdirent
;
900 struct compat_getdents_callback buf
;
904 if (!access_ok(VERIFY_WRITE
, dirent
, count
))
912 buf
.current_dir
= dirent
;
917 error
= vfs_readdir(file
, compat_filldir
, &buf
);
921 lastdirent
= buf
.previous
;
923 if (put_user(file
->f_pos
, &lastdirent
->d_off
))
926 error
= count
- buf
.count
;
935 #ifndef __ARCH_OMIT_COMPAT_SYS_GETDENTS64
937 struct compat_getdents_callback64
{
938 struct linux_dirent64 __user
*current_dir
;
939 struct linux_dirent64 __user
*previous
;
944 static int compat_filldir64(void * __buf
, const char * name
, int namlen
, loff_t offset
,
945 u64 ino
, unsigned int d_type
)
947 struct linux_dirent64 __user
*dirent
;
948 struct compat_getdents_callback64
*buf
= __buf
;
949 int jj
= NAME_OFFSET(dirent
);
950 int reclen
= ALIGN(jj
+ namlen
+ 1, sizeof(u64
));
953 buf
->error
= -EINVAL
; /* only used if we fail.. */
954 if (reclen
> buf
->count
)
956 dirent
= buf
->previous
;
959 if (__put_user_unaligned(offset
, &dirent
->d_off
))
962 dirent
= buf
->current_dir
;
963 if (__put_user_unaligned(ino
, &dirent
->d_ino
))
966 if (__put_user_unaligned(off
, &dirent
->d_off
))
968 if (__put_user(reclen
, &dirent
->d_reclen
))
970 if (__put_user(d_type
, &dirent
->d_type
))
972 if (copy_to_user(dirent
->d_name
, name
, namlen
))
974 if (__put_user(0, dirent
->d_name
+ namlen
))
976 buf
->previous
= dirent
;
977 dirent
= (void __user
*)dirent
+ reclen
;
978 buf
->current_dir
= dirent
;
979 buf
->count
-= reclen
;
982 buf
->error
= -EFAULT
;
986 asmlinkage
long compat_sys_getdents64(unsigned int fd
,
987 struct linux_dirent64 __user
* dirent
, unsigned int count
)
990 struct linux_dirent64 __user
* lastdirent
;
991 struct compat_getdents_callback64 buf
;
995 if (!access_ok(VERIFY_WRITE
, dirent
, count
))
1003 buf
.current_dir
= dirent
;
1004 buf
.previous
= NULL
;
1008 error
= vfs_readdir(file
, compat_filldir64
, &buf
);
1012 lastdirent
= buf
.previous
;
1014 typeof(lastdirent
->d_off
) d_off
= file
->f_pos
;
1016 if (__put_user_unaligned(d_off
, &lastdirent
->d_off
))
1018 error
= count
- buf
.count
;
1026 #endif /* ! __ARCH_OMIT_COMPAT_SYS_GETDENTS64 */
1028 static ssize_t
compat_do_readv_writev(int type
, struct file
*file
,
1029 const struct compat_iovec __user
*uvector
,
1030 unsigned long nr_segs
, loff_t
*pos
)
1032 compat_ssize_t tot_len
;
1033 struct iovec iovstack
[UIO_FASTIOV
];
1034 struct iovec
*iov
=iovstack
, *vector
;
1041 * SuS says "The readv() function *may* fail if the iovcnt argument
1042 * was less than or equal to 0, or greater than {IOV_MAX}. Linux has
1043 * traditionally returned zero for zero segments, so...
1050 * First get the "struct iovec" from user memory and
1051 * verify all the pointers
1054 if ((nr_segs
> UIO_MAXIOV
) || (nr_segs
<= 0))
1058 if (nr_segs
> UIO_FASTIOV
) {
1060 iov
= kmalloc(nr_segs
*sizeof(struct iovec
), GFP_KERNEL
);
1065 if (!access_ok(VERIFY_READ
, uvector
, nr_segs
*sizeof(*uvector
)))
1069 * Single unix specification:
1070 * We should -EINVAL if an element length is not >= 0 and fitting an
1071 * ssize_t. The total length is fitting an ssize_t
1073 * Be careful here because iov_len is a size_t not an ssize_t
1078 for (seg
= 0 ; seg
< nr_segs
; seg
++) {
1079 compat_ssize_t tmp
= tot_len
;
1083 if (__get_user(len
, &uvector
->iov_len
) ||
1084 __get_user(buf
, &uvector
->iov_base
)) {
1088 if (len
< 0) /* size_t not fitting an compat_ssize_t .. */
1091 if (tot_len
< tmp
) /* maths overflow on the compat_ssize_t */
1093 vector
->iov_base
= compat_ptr(buf
);
1094 vector
->iov_len
= (compat_size_t
) len
;
1103 ret
= rw_verify_area(type
, file
, pos
, tot_len
);
1107 ret
= security_file_permission(file
, type
== READ
? MAY_READ
:MAY_WRITE
);
1113 fn
= file
->f_op
->read
;
1114 fnv
= file
->f_op
->aio_read
;
1116 fn
= (io_fn_t
)file
->f_op
->write
;
1117 fnv
= file
->f_op
->aio_write
;
1121 ret
= do_sync_readv_writev(file
, iov
, nr_segs
, tot_len
,
1124 ret
= do_loop_readv_writev(file
, iov
, nr_segs
, pos
, fn
);
1127 if (iov
!= iovstack
)
1129 if ((ret
+ (type
== READ
)) > 0) {
1130 struct dentry
*dentry
= file
->f_path
.dentry
;
1132 fsnotify_access(dentry
);
1134 fsnotify_modify(dentry
);
1140 compat_sys_readv(unsigned long fd
, const struct compat_iovec __user
*vec
, unsigned long vlen
)
1143 ssize_t ret
= -EBADF
;
1149 if (!(file
->f_mode
& FMODE_READ
))
1153 if (!file
->f_op
|| (!file
->f_op
->aio_read
&& !file
->f_op
->read
))
1156 ret
= compat_do_readv_writev(READ
, file
, vec
, vlen
, &file
->f_pos
);
1164 compat_sys_writev(unsigned long fd
, const struct compat_iovec __user
*vec
, unsigned long vlen
)
1167 ssize_t ret
= -EBADF
;
1172 if (!(file
->f_mode
& FMODE_WRITE
))
1176 if (!file
->f_op
|| (!file
->f_op
->aio_write
&& !file
->f_op
->write
))
1179 ret
= compat_do_readv_writev(WRITE
, file
, vec
, vlen
, &file
->f_pos
);
1187 compat_sys_vmsplice(int fd
, const struct compat_iovec __user
*iov32
,
1188 unsigned int nr_segs
, unsigned int flags
)
1191 struct iovec __user
*iov
;
1192 if (nr_segs
> UIO_MAXIOV
)
1194 iov
= compat_alloc_user_space(nr_segs
* sizeof(struct iovec
));
1195 for (i
= 0; i
< nr_segs
; i
++) {
1196 struct compat_iovec v
;
1197 if (get_user(v
.iov_base
, &iov32
[i
].iov_base
) ||
1198 get_user(v
.iov_len
, &iov32
[i
].iov_len
) ||
1199 put_user(compat_ptr(v
.iov_base
), &iov
[i
].iov_base
) ||
1200 put_user(v
.iov_len
, &iov
[i
].iov_len
))
1203 return sys_vmsplice(fd
, iov
, nr_segs
, flags
);
1207 * Exactly like fs/open.c:sys_open(), except that it doesn't set the
1211 compat_sys_open(const char __user
*filename
, int flags
, int mode
)
1213 return do_sys_open(AT_FDCWD
, filename
, flags
, mode
);
1217 * Exactly like fs/open.c:sys_openat(), except that it doesn't set the
1221 compat_sys_openat(unsigned int dfd
, const char __user
*filename
, int flags
, int mode
)
1223 return do_sys_open(dfd
, filename
, flags
, mode
);
1227 * compat_count() counts the number of arguments/envelopes. It is basically
1228 * a copy of count() from fs/exec.c, except that it works with 32 bit argv
1229 * and envp pointers.
1231 static int compat_count(compat_uptr_t __user
*argv
, int max
)
1239 if (get_user(p
, argv
))
1252 * compat_copy_strings() is basically a copy of copy_strings() from fs/exec.c
1253 * except that it works with 32 bit argv and envp pointers.
1255 static int compat_copy_strings(int argc
, compat_uptr_t __user
*argv
,
1256 struct linux_binprm
*bprm
)
1258 struct page
*kmapped_page
= NULL
;
1260 unsigned long kpos
= 0;
1263 while (argc
-- > 0) {
1268 if (get_user(str
, argv
+argc
) ||
1269 !(len
= strnlen_user(compat_ptr(str
), MAX_ARG_STRLEN
))) {
1274 if (len
> MAX_ARG_STRLEN
) {
1279 /* We're going to work our way backwords. */
1285 int offset
, bytes_to_copy
;
1287 offset
= pos
% PAGE_SIZE
;
1291 bytes_to_copy
= offset
;
1292 if (bytes_to_copy
> len
)
1293 bytes_to_copy
= len
;
1295 offset
-= bytes_to_copy
;
1296 pos
-= bytes_to_copy
;
1297 str
-= bytes_to_copy
;
1298 len
-= bytes_to_copy
;
1300 if (!kmapped_page
|| kpos
!= (pos
& PAGE_MASK
)) {
1303 #ifdef CONFIG_STACK_GROWSUP
1304 ret
= expand_stack_downwards(bprm
->vma
, pos
);
1306 /* We've exceed the stack rlimit. */
1311 ret
= get_user_pages(current
, bprm
->mm
, pos
,
1312 1, 1, 1, &page
, NULL
);
1314 /* We've exceed the stack rlimit. */
1320 flush_kernel_dcache_page(kmapped_page
);
1321 kunmap(kmapped_page
);
1322 put_page(kmapped_page
);
1324 kmapped_page
= page
;
1325 kaddr
= kmap(kmapped_page
);
1326 kpos
= pos
& PAGE_MASK
;
1327 flush_cache_page(bprm
->vma
, kpos
,
1328 page_to_pfn(kmapped_page
));
1330 if (copy_from_user(kaddr
+offset
, compat_ptr(str
),
1340 flush_kernel_dcache_page(kmapped_page
);
1341 kunmap(kmapped_page
);
1342 put_page(kmapped_page
);
1348 * compat_do_execve() is mostly a copy of do_execve(), with the exception
1349 * that it processes 32 bit argv and envp pointers.
1351 int compat_do_execve(char * filename
,
1352 compat_uptr_t __user
*argv
,
1353 compat_uptr_t __user
*envp
,
1354 struct pt_regs
* regs
)
1356 struct linux_binprm
*bprm
;
1361 bprm
= kzalloc(sizeof(*bprm
), GFP_KERNEL
);
1365 file
= open_exec(filename
);
1366 retval
= PTR_ERR(file
);
1373 bprm
->filename
= filename
;
1374 bprm
->interp
= filename
;
1376 retval
= bprm_mm_init(bprm
);
1380 bprm
->argc
= compat_count(argv
, MAX_ARG_STRINGS
);
1381 if ((retval
= bprm
->argc
) < 0)
1384 bprm
->envc
= compat_count(envp
, MAX_ARG_STRINGS
);
1385 if ((retval
= bprm
->envc
) < 0)
1388 retval
= security_bprm_alloc(bprm
);
1392 retval
= prepare_binprm(bprm
);
1396 retval
= copy_strings_kernel(1, &bprm
->filename
, bprm
);
1400 bprm
->exec
= bprm
->p
;
1401 retval
= compat_copy_strings(bprm
->envc
, envp
, bprm
);
1405 retval
= compat_copy_strings(bprm
->argc
, argv
, bprm
);
1409 retval
= search_binary_handler(bprm
, regs
);
1411 /* execve success */
1412 security_bprm_free(bprm
);
1413 acct_update_integrals(current
);
1420 security_bprm_free(bprm
);
1428 allow_write_access(bprm
->file
);
1439 #define __COMPAT_NFDBITS (8 * sizeof(compat_ulong_t))
1442 * Ooo, nasty. We need here to frob 32-bit unsigned longs to
1443 * 64-bit unsigned longs.
1446 int compat_get_fd_set(unsigned long nr
, compat_ulong_t __user
*ufdset
,
1447 unsigned long *fdset
)
1449 nr
= DIV_ROUND_UP(nr
, __COMPAT_NFDBITS
);
1453 if (!access_ok(VERIFY_WRITE
, ufdset
, nr
*sizeof(compat_ulong_t
)))
1460 if (__get_user(l
, ufdset
) || __get_user(h
, ufdset
+1))
1463 *fdset
++ = h
<< 32 | l
;
1466 if (odd
&& __get_user(*fdset
, ufdset
))
1469 /* Tricky, must clear full unsigned long in the
1470 * kernel fdset at the end, this makes sure that
1473 memset(fdset
, 0, ((nr
+ 1) & ~1)*sizeof(compat_ulong_t
));
1479 int compat_set_fd_set(unsigned long nr
, compat_ulong_t __user
*ufdset
,
1480 unsigned long *fdset
)
1483 nr
= DIV_ROUND_UP(nr
, __COMPAT_NFDBITS
);
1494 if (__put_user(l
, ufdset
) || __put_user(h
, ufdset
+1))
1499 if (odd
&& __put_user(*fdset
, ufdset
))
1506 * This is a virtual copy of sys_select from fs/select.c and probably
1507 * should be compared to it from time to time
1511 * We can actually return ERESTARTSYS instead of EINTR, but I'd
1512 * like to be certain this leads to no problems. So I return
1513 * EINTR just for safety.
1515 * Update: ERESTARTSYS breaks at least the xview clock binary, so
1516 * I'm trying ERESTARTNOHAND which restart only when you want to.
1518 #define MAX_SELECT_SECONDS \
1519 ((unsigned long) (MAX_SCHEDULE_TIMEOUT / HZ)-1)
1521 int compat_core_sys_select(int n
, compat_ulong_t __user
*inp
,
1522 compat_ulong_t __user
*outp
, compat_ulong_t __user
*exp
, s64
*timeout
)
1526 int size
, max_fds
, ret
= -EINVAL
;
1527 struct fdtable
*fdt
;
1528 long stack_fds
[SELECT_STACK_ALLOC
/sizeof(long)];
1533 /* max_fds can increase, so grab it once to avoid race */
1535 fdt
= files_fdtable(current
->files
);
1536 max_fds
= fdt
->max_fds
;
1542 * We need 6 bitmaps (in/out/ex for both incoming and outgoing),
1543 * since we used fdset we need to allocate memory in units of
1546 size
= FDS_BYTES(n
);
1548 if (size
> sizeof(stack_fds
) / 6) {
1549 bits
= kmalloc(6 * size
, GFP_KERNEL
);
1554 fds
.in
= (unsigned long *) bits
;
1555 fds
.out
= (unsigned long *) (bits
+ size
);
1556 fds
.ex
= (unsigned long *) (bits
+ 2*size
);
1557 fds
.res_in
= (unsigned long *) (bits
+ 3*size
);
1558 fds
.res_out
= (unsigned long *) (bits
+ 4*size
);
1559 fds
.res_ex
= (unsigned long *) (bits
+ 5*size
);
1561 if ((ret
= compat_get_fd_set(n
, inp
, fds
.in
)) ||
1562 (ret
= compat_get_fd_set(n
, outp
, fds
.out
)) ||
1563 (ret
= compat_get_fd_set(n
, exp
, fds
.ex
)))
1565 zero_fd_set(n
, fds
.res_in
);
1566 zero_fd_set(n
, fds
.res_out
);
1567 zero_fd_set(n
, fds
.res_ex
);
1569 ret
= do_select(n
, &fds
, timeout
);
1574 ret
= -ERESTARTNOHAND
;
1575 if (signal_pending(current
))
1580 if (compat_set_fd_set(n
, inp
, fds
.res_in
) ||
1581 compat_set_fd_set(n
, outp
, fds
.res_out
) ||
1582 compat_set_fd_set(n
, exp
, fds
.res_ex
))
1585 if (bits
!= stack_fds
)
1591 asmlinkage
long compat_sys_select(int n
, compat_ulong_t __user
*inp
,
1592 compat_ulong_t __user
*outp
, compat_ulong_t __user
*exp
,
1593 struct compat_timeval __user
*tvp
)
1596 struct compat_timeval tv
;
1600 if (copy_from_user(&tv
, tvp
, sizeof(tv
)))
1603 if (tv
.tv_sec
< 0 || tv
.tv_usec
< 0)
1606 /* Cast to u64 to make GCC stop complaining */
1607 if ((u64
)tv
.tv_sec
>= (u64
)MAX_INT64_SECONDS
)
1608 timeout
= -1; /* infinite */
1610 timeout
= DIV_ROUND_UP(tv
.tv_usec
, 1000000/HZ
);
1611 timeout
+= tv
.tv_sec
* HZ
;
1615 ret
= compat_core_sys_select(n
, inp
, outp
, exp
, &timeout
);
1618 struct compat_timeval rtv
;
1620 if (current
->personality
& STICKY_TIMEOUTS
)
1622 rtv
.tv_usec
= jiffies_to_usecs(do_div((*(u64
*)&timeout
), HZ
));
1623 rtv
.tv_sec
= timeout
;
1624 if (compat_timeval_compare(&rtv
, &tv
) >= 0)
1626 if (copy_to_user(tvp
, &rtv
, sizeof(rtv
))) {
1629 * If an application puts its timeval in read-only
1630 * memory, we don't want the Linux-specific update to
1631 * the timeval to cause a fault after the select has
1632 * completed successfully. However, because we're not
1633 * updating the timeval, we can't restart the system
1636 if (ret
== -ERESTARTNOHAND
)
1644 #ifdef TIF_RESTORE_SIGMASK
1645 asmlinkage
long compat_sys_pselect7(int n
, compat_ulong_t __user
*inp
,
1646 compat_ulong_t __user
*outp
, compat_ulong_t __user
*exp
,
1647 struct compat_timespec __user
*tsp
, compat_sigset_t __user
*sigmask
,
1648 compat_size_t sigsetsize
)
1650 compat_sigset_t ss32
;
1651 sigset_t ksigmask
, sigsaved
;
1652 s64 timeout
= MAX_SCHEDULE_TIMEOUT
;
1653 struct compat_timespec ts
;
1657 if (copy_from_user(&ts
, tsp
, sizeof(ts
)))
1660 if (ts
.tv_sec
< 0 || ts
.tv_nsec
< 0)
1665 if (sigsetsize
!= sizeof(compat_sigset_t
))
1667 if (copy_from_user(&ss32
, sigmask
, sizeof(ss32
)))
1669 sigset_from_compat(&ksigmask
, &ss32
);
1671 sigdelsetmask(&ksigmask
, sigmask(SIGKILL
)|sigmask(SIGSTOP
));
1672 sigprocmask(SIG_SETMASK
, &ksigmask
, &sigsaved
);
1677 if ((unsigned long)ts
.tv_sec
< MAX_SELECT_SECONDS
) {
1678 timeout
= DIV_ROUND_UP(ts
.tv_nsec
, 1000000000/HZ
);
1679 timeout
+= ts
.tv_sec
* (unsigned long)HZ
;
1683 ts
.tv_sec
-= MAX_SELECT_SECONDS
;
1684 timeout
= MAX_SELECT_SECONDS
* HZ
;
1688 ret
= compat_core_sys_select(n
, inp
, outp
, exp
, &timeout
);
1690 } while (!ret
&& !timeout
&& tsp
&& (ts
.tv_sec
|| ts
.tv_nsec
));
1693 struct compat_timespec rts
;
1695 if (current
->personality
& STICKY_TIMEOUTS
)
1698 rts
.tv_sec
= timeout
/ HZ
;
1699 rts
.tv_nsec
= (timeout
% HZ
) * (NSEC_PER_SEC
/HZ
);
1700 if (rts
.tv_nsec
>= NSEC_PER_SEC
) {
1702 rts
.tv_nsec
-= NSEC_PER_SEC
;
1704 if (compat_timespec_compare(&rts
, &ts
) >= 0)
1706 if (copy_to_user(tsp
, &rts
, sizeof(rts
))) {
1709 * If an application puts its timeval in read-only
1710 * memory, we don't want the Linux-specific update to
1711 * the timeval to cause a fault after the select has
1712 * completed successfully. However, because we're not
1713 * updating the timeval, we can't restart the system
1716 if (ret
== -ERESTARTNOHAND
)
1721 if (ret
== -ERESTARTNOHAND
) {
1723 * Don't restore the signal mask yet. Let do_signal() deliver
1724 * the signal on the way back to userspace, before the signal
1728 memcpy(¤t
->saved_sigmask
, &sigsaved
,
1730 set_thread_flag(TIF_RESTORE_SIGMASK
);
1733 sigprocmask(SIG_SETMASK
, &sigsaved
, NULL
);
1738 asmlinkage
long compat_sys_pselect6(int n
, compat_ulong_t __user
*inp
,
1739 compat_ulong_t __user
*outp
, compat_ulong_t __user
*exp
,
1740 struct compat_timespec __user
*tsp
, void __user
*sig
)
1742 compat_size_t sigsetsize
= 0;
1743 compat_uptr_t up
= 0;
1746 if (!access_ok(VERIFY_READ
, sig
,
1747 sizeof(compat_uptr_t
)+sizeof(compat_size_t
)) ||
1748 __get_user(up
, (compat_uptr_t __user
*)sig
) ||
1749 __get_user(sigsetsize
,
1750 (compat_size_t __user
*)(sig
+sizeof(up
))))
1753 return compat_sys_pselect7(n
, inp
, outp
, exp
, tsp
, compat_ptr(up
),
1757 asmlinkage
long compat_sys_ppoll(struct pollfd __user
*ufds
,
1758 unsigned int nfds
, struct compat_timespec __user
*tsp
,
1759 const compat_sigset_t __user
*sigmask
, compat_size_t sigsetsize
)
1761 compat_sigset_t ss32
;
1762 sigset_t ksigmask
, sigsaved
;
1763 struct compat_timespec ts
;
1768 if (copy_from_user(&ts
, tsp
, sizeof(ts
)))
1771 /* We assume that ts.tv_sec is always lower than
1772 the number of seconds that can be expressed in
1773 an s64. Otherwise the compiler bitches at us */
1774 timeout
= DIV_ROUND_UP(ts
.tv_nsec
, 1000000000/HZ
);
1775 timeout
+= ts
.tv_sec
* HZ
;
1779 if (sigsetsize
!= sizeof(compat_sigset_t
))
1781 if (copy_from_user(&ss32
, sigmask
, sizeof(ss32
)))
1783 sigset_from_compat(&ksigmask
, &ss32
);
1785 sigdelsetmask(&ksigmask
, sigmask(SIGKILL
)|sigmask(SIGSTOP
));
1786 sigprocmask(SIG_SETMASK
, &ksigmask
, &sigsaved
);
1789 ret
= do_sys_poll(ufds
, nfds
, &timeout
);
1791 /* We can restart this syscall, usually */
1792 if (ret
== -EINTR
) {
1794 * Don't restore the signal mask yet. Let do_signal() deliver
1795 * the signal on the way back to userspace, before the signal
1799 memcpy(¤t
->saved_sigmask
, &sigsaved
,
1801 set_thread_flag(TIF_RESTORE_SIGMASK
);
1803 ret
= -ERESTARTNOHAND
;
1805 sigprocmask(SIG_SETMASK
, &sigsaved
, NULL
);
1807 if (tsp
&& timeout
>= 0) {
1808 struct compat_timespec rts
;
1810 if (current
->personality
& STICKY_TIMEOUTS
)
1812 /* Yes, we know it's actually an s64, but it's also positive. */
1813 rts
.tv_nsec
= jiffies_to_usecs(do_div((*(u64
*)&timeout
), HZ
)) *
1815 rts
.tv_sec
= timeout
;
1816 if (compat_timespec_compare(&rts
, &ts
) >= 0)
1818 if (copy_to_user(tsp
, &rts
, sizeof(rts
))) {
1821 * If an application puts its timeval in read-only
1822 * memory, we don't want the Linux-specific update to
1823 * the timeval to cause a fault after the select has
1824 * completed successfully. However, because we're not
1825 * updating the timeval, we can't restart the system
1828 if (ret
== -ERESTARTNOHAND
&& timeout
>= 0)
1835 #endif /* TIF_RESTORE_SIGMASK */
1837 #if defined(CONFIG_NFSD) || defined(CONFIG_NFSD_MODULE)
1838 /* Stuff for NFS server syscalls... */
1839 struct compat_nfsctl_svc
{
1844 struct compat_nfsctl_client
{
1845 s8 cl32_ident
[NFSCLNT_IDMAX
+1];
1847 struct in_addr cl32_addrlist
[NFSCLNT_ADDRMAX
];
1850 u8 cl32_fhkey
[NFSCLNT_KEYMAX
];
1853 struct compat_nfsctl_export
{
1854 char ex32_client
[NFSCLNT_IDMAX
+1];
1855 char ex32_path
[NFS_MAXPATHLEN
+1];
1856 compat_dev_t ex32_dev
;
1857 compat_ino_t ex32_ino
;
1858 compat_int_t ex32_flags
;
1859 __compat_uid_t ex32_anon_uid
;
1860 __compat_gid_t ex32_anon_gid
;
1863 struct compat_nfsctl_fdparm
{
1864 struct sockaddr gd32_addr
;
1865 s8 gd32_path
[NFS_MAXPATHLEN
+1];
1866 compat_int_t gd32_version
;
1869 struct compat_nfsctl_fsparm
{
1870 struct sockaddr gd32_addr
;
1871 s8 gd32_path
[NFS_MAXPATHLEN
+1];
1872 compat_int_t gd32_maxlen
;
1875 struct compat_nfsctl_arg
{
1876 compat_int_t ca32_version
; /* safeguard */
1878 struct compat_nfsctl_svc u32_svc
;
1879 struct compat_nfsctl_client u32_client
;
1880 struct compat_nfsctl_export u32_export
;
1881 struct compat_nfsctl_fdparm u32_getfd
;
1882 struct compat_nfsctl_fsparm u32_getfs
;
1884 #define ca32_svc u.u32_svc
1885 #define ca32_client u.u32_client
1886 #define ca32_export u.u32_export
1887 #define ca32_getfd u.u32_getfd
1888 #define ca32_getfs u.u32_getfs
1891 union compat_nfsctl_res
{
1892 __u8 cr32_getfh
[NFS_FHSIZE
];
1893 struct knfsd_fh cr32_getfs
;
1896 static int compat_nfs_svc_trans(struct nfsctl_arg
*karg
,
1897 struct compat_nfsctl_arg __user
*arg
)
1899 if (!access_ok(VERIFY_READ
, &arg
->ca32_svc
, sizeof(arg
->ca32_svc
)) ||
1900 get_user(karg
->ca_version
, &arg
->ca32_version
) ||
1901 __get_user(karg
->ca_svc
.svc_port
, &arg
->ca32_svc
.svc32_port
) ||
1902 __get_user(karg
->ca_svc
.svc_nthreads
,
1903 &arg
->ca32_svc
.svc32_nthreads
))
1908 static int compat_nfs_clnt_trans(struct nfsctl_arg
*karg
,
1909 struct compat_nfsctl_arg __user
*arg
)
1911 if (!access_ok(VERIFY_READ
, &arg
->ca32_client
,
1912 sizeof(arg
->ca32_client
)) ||
1913 get_user(karg
->ca_version
, &arg
->ca32_version
) ||
1914 __copy_from_user(&karg
->ca_client
.cl_ident
[0],
1915 &arg
->ca32_client
.cl32_ident
[0],
1917 __get_user(karg
->ca_client
.cl_naddr
,
1918 &arg
->ca32_client
.cl32_naddr
) ||
1919 __copy_from_user(&karg
->ca_client
.cl_addrlist
[0],
1920 &arg
->ca32_client
.cl32_addrlist
[0],
1921 (sizeof(struct in_addr
) * NFSCLNT_ADDRMAX
)) ||
1922 __get_user(karg
->ca_client
.cl_fhkeytype
,
1923 &arg
->ca32_client
.cl32_fhkeytype
) ||
1924 __get_user(karg
->ca_client
.cl_fhkeylen
,
1925 &arg
->ca32_client
.cl32_fhkeylen
) ||
1926 __copy_from_user(&karg
->ca_client
.cl_fhkey
[0],
1927 &arg
->ca32_client
.cl32_fhkey
[0],
1934 static int compat_nfs_exp_trans(struct nfsctl_arg
*karg
,
1935 struct compat_nfsctl_arg __user
*arg
)
1937 if (!access_ok(VERIFY_READ
, &arg
->ca32_export
,
1938 sizeof(arg
->ca32_export
)) ||
1939 get_user(karg
->ca_version
, &arg
->ca32_version
) ||
1940 __copy_from_user(&karg
->ca_export
.ex_client
[0],
1941 &arg
->ca32_export
.ex32_client
[0],
1943 __copy_from_user(&karg
->ca_export
.ex_path
[0],
1944 &arg
->ca32_export
.ex32_path
[0],
1946 __get_user(karg
->ca_export
.ex_dev
,
1947 &arg
->ca32_export
.ex32_dev
) ||
1948 __get_user(karg
->ca_export
.ex_ino
,
1949 &arg
->ca32_export
.ex32_ino
) ||
1950 __get_user(karg
->ca_export
.ex_flags
,
1951 &arg
->ca32_export
.ex32_flags
) ||
1952 __get_user(karg
->ca_export
.ex_anon_uid
,
1953 &arg
->ca32_export
.ex32_anon_uid
) ||
1954 __get_user(karg
->ca_export
.ex_anon_gid
,
1955 &arg
->ca32_export
.ex32_anon_gid
))
1957 SET_UID(karg
->ca_export
.ex_anon_uid
, karg
->ca_export
.ex_anon_uid
);
1958 SET_GID(karg
->ca_export
.ex_anon_gid
, karg
->ca_export
.ex_anon_gid
);
1963 static int compat_nfs_getfd_trans(struct nfsctl_arg
*karg
,
1964 struct compat_nfsctl_arg __user
*arg
)
1966 if (!access_ok(VERIFY_READ
, &arg
->ca32_getfd
,
1967 sizeof(arg
->ca32_getfd
)) ||
1968 get_user(karg
->ca_version
, &arg
->ca32_version
) ||
1969 __copy_from_user(&karg
->ca_getfd
.gd_addr
,
1970 &arg
->ca32_getfd
.gd32_addr
,
1971 (sizeof(struct sockaddr
))) ||
1972 __copy_from_user(&karg
->ca_getfd
.gd_path
,
1973 &arg
->ca32_getfd
.gd32_path
,
1974 (NFS_MAXPATHLEN
+1)) ||
1975 __get_user(karg
->ca_getfd
.gd_version
,
1976 &arg
->ca32_getfd
.gd32_version
))
1982 static int compat_nfs_getfs_trans(struct nfsctl_arg
*karg
,
1983 struct compat_nfsctl_arg __user
*arg
)
1985 if (!access_ok(VERIFY_READ
,&arg
->ca32_getfs
,sizeof(arg
->ca32_getfs
)) ||
1986 get_user(karg
->ca_version
, &arg
->ca32_version
) ||
1987 __copy_from_user(&karg
->ca_getfs
.gd_addr
,
1988 &arg
->ca32_getfs
.gd32_addr
,
1989 (sizeof(struct sockaddr
))) ||
1990 __copy_from_user(&karg
->ca_getfs
.gd_path
,
1991 &arg
->ca32_getfs
.gd32_path
,
1992 (NFS_MAXPATHLEN
+1)) ||
1993 __get_user(karg
->ca_getfs
.gd_maxlen
,
1994 &arg
->ca32_getfs
.gd32_maxlen
))
2000 /* This really doesn't need translations, we are only passing
2001 * back a union which contains opaque nfs file handle data.
2003 static int compat_nfs_getfh_res_trans(union nfsctl_res
*kres
,
2004 union compat_nfsctl_res __user
*res
)
2008 err
= copy_to_user(res
, kres
, sizeof(*res
));
2010 return (err
) ? -EFAULT
: 0;
2013 asmlinkage
long compat_sys_nfsservctl(int cmd
,
2014 struct compat_nfsctl_arg __user
*arg
,
2015 union compat_nfsctl_res __user
*res
)
2017 struct nfsctl_arg
*karg
;
2018 union nfsctl_res
*kres
;
2022 karg
= kmalloc(sizeof(*karg
), GFP_USER
);
2023 kres
= kmalloc(sizeof(*kres
), GFP_USER
);
2024 if(!karg
|| !kres
) {
2031 err
= compat_nfs_svc_trans(karg
, arg
);
2034 case NFSCTL_ADDCLIENT
:
2035 err
= compat_nfs_clnt_trans(karg
, arg
);
2038 case NFSCTL_DELCLIENT
:
2039 err
= compat_nfs_clnt_trans(karg
, arg
);
2043 case NFSCTL_UNEXPORT
:
2044 err
= compat_nfs_exp_trans(karg
, arg
);
2048 err
= compat_nfs_getfd_trans(karg
, arg
);
2052 err
= compat_nfs_getfs_trans(karg
, arg
);
2065 /* The __user pointer casts are valid because of the set_fs() */
2066 err
= sys_nfsservctl(cmd
, (void __user
*) karg
, (void __user
*) kres
);
2072 if((cmd
== NFSCTL_GETFD
) ||
2073 (cmd
== NFSCTL_GETFS
))
2074 err
= compat_nfs_getfh_res_trans(kres
, res
);
2082 long asmlinkage
compat_sys_nfsservctl(int cmd
, void *notused
, void *notused2
)
2084 return sys_ni_syscall();
2090 #ifdef CONFIG_HAS_COMPAT_EPOLL_EVENT
2091 asmlinkage
long compat_sys_epoll_ctl(int epfd
, int op
, int fd
,
2092 struct compat_epoll_event __user
*event
)
2095 struct compat_epoll_event user
;
2096 struct epoll_event __user
*kernel
= NULL
;
2099 if (copy_from_user(&user
, event
, sizeof(user
)))
2101 kernel
= compat_alloc_user_space(sizeof(struct epoll_event
));
2102 err
|= __put_user(user
.events
, &kernel
->events
);
2103 err
|= __put_user(user
.data
, &kernel
->data
);
2106 return err
? err
: sys_epoll_ctl(epfd
, op
, fd
, kernel
);
2110 asmlinkage
long compat_sys_epoll_wait(int epfd
,
2111 struct compat_epoll_event __user
*events
,
2112 int maxevents
, int timeout
)
2114 long i
, ret
, err
= 0;
2115 struct epoll_event __user
*kbuf
;
2116 struct epoll_event ev
;
2118 if ((maxevents
<= 0) ||
2119 (maxevents
> (INT_MAX
/ sizeof(struct epoll_event
))))
2121 kbuf
= compat_alloc_user_space(sizeof(struct epoll_event
) * maxevents
);
2122 ret
= sys_epoll_wait(epfd
, kbuf
, maxevents
, timeout
);
2123 for (i
= 0; i
< ret
; i
++) {
2124 err
|= __get_user(ev
.events
, &kbuf
[i
].events
);
2125 err
|= __get_user(ev
.data
, &kbuf
[i
].data
);
2126 err
|= __put_user(ev
.events
, &events
->events
);
2127 err
|= __put_user_unaligned(ev
.data
, &events
->data
);
2131 return err
? -EFAULT
: ret
;
2133 #endif /* CONFIG_HAS_COMPAT_EPOLL_EVENT */
2135 #ifdef TIF_RESTORE_SIGMASK
2136 asmlinkage
long compat_sys_epoll_pwait(int epfd
,
2137 struct compat_epoll_event __user
*events
,
2138 int maxevents
, int timeout
,
2139 const compat_sigset_t __user
*sigmask
,
2140 compat_size_t sigsetsize
)
2143 compat_sigset_t csigmask
;
2144 sigset_t ksigmask
, sigsaved
;
2147 * If the caller wants a certain signal mask to be set during the wait,
2151 if (sigsetsize
!= sizeof(compat_sigset_t
))
2153 if (copy_from_user(&csigmask
, sigmask
, sizeof(csigmask
)))
2155 sigset_from_compat(&ksigmask
, &csigmask
);
2156 sigdelsetmask(&ksigmask
, sigmask(SIGKILL
) | sigmask(SIGSTOP
));
2157 sigprocmask(SIG_SETMASK
, &ksigmask
, &sigsaved
);
2160 #ifdef CONFIG_HAS_COMPAT_EPOLL_EVENT
2161 err
= compat_sys_epoll_wait(epfd
, events
, maxevents
, timeout
);
2163 err
= sys_epoll_wait(epfd
, events
, maxevents
, timeout
);
2167 * If we changed the signal mask, we need to restore the original one.
2168 * In case we've got a signal while waiting, we do not restore the
2169 * signal mask yet, and we allow do_signal() to deliver the signal on
2170 * the way back to userspace, before the signal mask is restored.
2173 if (err
== -EINTR
) {
2174 memcpy(¤t
->saved_sigmask
, &sigsaved
,
2176 set_thread_flag(TIF_RESTORE_SIGMASK
);
2178 sigprocmask(SIG_SETMASK
, &sigsaved
, NULL
);
2183 #endif /* TIF_RESTORE_SIGMASK */
2185 #endif /* CONFIG_EPOLL */
2187 #ifdef CONFIG_SIGNALFD
2189 asmlinkage
long compat_sys_signalfd(int ufd
,
2190 const compat_sigset_t __user
*sigmask
,
2191 compat_size_t sigsetsize
)
2193 compat_sigset_t ss32
;
2195 sigset_t __user
*ksigmask
;
2197 if (sigsetsize
!= sizeof(compat_sigset_t
))
2199 if (copy_from_user(&ss32
, sigmask
, sizeof(ss32
)))
2201 sigset_from_compat(&tmp
, &ss32
);
2202 ksigmask
= compat_alloc_user_space(sizeof(sigset_t
));
2203 if (copy_to_user(ksigmask
, &tmp
, sizeof(sigset_t
)))
2206 return sys_signalfd(ufd
, ksigmask
, sizeof(sigset_t
));
2209 #endif /* CONFIG_SIGNALFD */
2211 #ifdef CONFIG_TIMERFD
2213 asmlinkage
long compat_sys_timerfd(int ufd
, int clockid
, int flags
,
2214 const struct compat_itimerspec __user
*utmr
)
2216 struct itimerspec t
;
2217 struct itimerspec __user
*ut
;
2219 if (get_compat_itimerspec(&t
, utmr
))
2221 ut
= compat_alloc_user_space(sizeof(*ut
));
2222 if (copy_to_user(ut
, &t
, sizeof(t
)))
2225 return sys_timerfd(ufd
, clockid
, flags
, ut
);
2228 #endif /* CONFIG_TIMERFD */