4 * Kernel compatibililty routines for e.g. 32 bit syscall support
7 * Copyright (C) 2002 Stephen Rothwell, IBM Corporation
8 * Copyright (C) 1997-2000 Jakub Jelinek (jakub@redhat.com)
9 * Copyright (C) 1998 Eddie C. Dost (ecd@skynet.be)
10 * Copyright (C) 2001,2002 Andi Kleen, SuSE Labs
11 * Copyright (C) 2003 Pavel Machek (pavel@suse.cz)
13 * This program is free software; you can redistribute it and/or modify
14 * it under the terms of the GNU General Public License version 2 as
15 * published by the Free Software Foundation.
18 #include <linux/linkage.h>
19 #include <linux/compat.h>
20 #include <linux/errno.h>
21 #include <linux/time.h>
23 #include <linux/fcntl.h>
24 #include <linux/namei.h>
25 #include <linux/file.h>
26 #include <linux/vfs.h>
27 #include <linux/ioctl32.h>
28 #include <linux/ioctl.h>
29 #include <linux/init.h>
30 #include <linux/sockios.h> /* for SIOCDEVPRIVATE */
31 #include <linux/smb.h>
32 #include <linux/smb_mount.h>
33 #include <linux/ncp_mount.h>
34 #include <linux/nfs4_mount.h>
35 #include <linux/smp_lock.h>
36 #include <linux/syscalls.h>
37 #include <linux/ctype.h>
38 #include <linux/module.h>
39 #include <linux/dirent.h>
40 #include <linux/fsnotify.h>
41 #include <linux/highuid.h>
42 #include <linux/sunrpc/svc.h>
43 #include <linux/nfsd/nfsd.h>
44 #include <linux/nfsd/syscall.h>
45 #include <linux/personality.h>
46 #include <linux/rwsem.h>
47 #include <linux/tsacct_kern.h>
48 #include <linux/highmem.h>
49 #include <linux/poll.h>
52 #include <net/sock.h> /* siocdevprivate_ioctl */
54 #include <asm/uaccess.h>
55 #include <asm/mmu_context.h>
56 #include <asm/ioctls.h>
61 int compat_printk(const char *fmt
, ...)
68 ret
= vprintk(fmt
, ap
);
73 #include "read_write.h"
76 * Not all architectures have sys_utime, so implement this in terms
79 asmlinkage
long compat_sys_utime(char __user
*filename
, struct compat_utimbuf __user
*t
)
84 if (get_user(tv
[0].tv_sec
, &t
->actime
) ||
85 get_user(tv
[1].tv_sec
, &t
->modtime
))
90 return do_utimes(AT_FDCWD
, filename
, t
? tv
: NULL
);
93 asmlinkage
long compat_sys_futimesat(unsigned int dfd
, char __user
*filename
, struct compat_timeval __user
*t
)
98 if (get_user(tv
[0].tv_sec
, &t
[0].tv_sec
) ||
99 get_user(tv
[0].tv_usec
, &t
[0].tv_usec
) ||
100 get_user(tv
[1].tv_sec
, &t
[1].tv_sec
) ||
101 get_user(tv
[1].tv_usec
, &t
[1].tv_usec
))
104 return do_utimes(dfd
, filename
, t
? tv
: NULL
);
107 asmlinkage
long compat_sys_utimes(char __user
*filename
, struct compat_timeval __user
*t
)
109 return compat_sys_futimesat(AT_FDCWD
, filename
, t
);
112 asmlinkage
long compat_sys_newstat(char __user
* filename
,
113 struct compat_stat __user
*statbuf
)
116 int error
= vfs_stat_fd(AT_FDCWD
, filename
, &stat
);
119 error
= cp_compat_stat(&stat
, statbuf
);
123 asmlinkage
long compat_sys_newlstat(char __user
* filename
,
124 struct compat_stat __user
*statbuf
)
127 int error
= vfs_lstat_fd(AT_FDCWD
, filename
, &stat
);
130 error
= cp_compat_stat(&stat
, statbuf
);
134 #ifndef __ARCH_WANT_STAT64
135 asmlinkage
long compat_sys_newfstatat(unsigned int dfd
, char __user
*filename
,
136 struct compat_stat __user
*statbuf
, int flag
)
141 if ((flag
& ~AT_SYMLINK_NOFOLLOW
) != 0)
144 if (flag
& AT_SYMLINK_NOFOLLOW
)
145 error
= vfs_lstat_fd(dfd
, filename
, &stat
);
147 error
= vfs_stat_fd(dfd
, filename
, &stat
);
150 error
= cp_compat_stat(&stat
, statbuf
);
157 asmlinkage
long compat_sys_newfstat(unsigned int fd
,
158 struct compat_stat __user
* statbuf
)
161 int error
= vfs_fstat(fd
, &stat
);
164 error
= cp_compat_stat(&stat
, statbuf
);
168 static int put_compat_statfs(struct compat_statfs __user
*ubuf
, struct kstatfs
*kbuf
)
171 if (sizeof ubuf
->f_blocks
== 4) {
172 if ((kbuf
->f_blocks
| kbuf
->f_bfree
| kbuf
->f_bavail
) &
173 0xffffffff00000000ULL
)
175 /* f_files and f_ffree may be -1; it's okay
176 * to stuff that into 32 bits */
177 if (kbuf
->f_files
!= 0xffffffffffffffffULL
178 && (kbuf
->f_files
& 0xffffffff00000000ULL
))
180 if (kbuf
->f_ffree
!= 0xffffffffffffffffULL
181 && (kbuf
->f_ffree
& 0xffffffff00000000ULL
))
184 if (!access_ok(VERIFY_WRITE
, ubuf
, sizeof(*ubuf
)) ||
185 __put_user(kbuf
->f_type
, &ubuf
->f_type
) ||
186 __put_user(kbuf
->f_bsize
, &ubuf
->f_bsize
) ||
187 __put_user(kbuf
->f_blocks
, &ubuf
->f_blocks
) ||
188 __put_user(kbuf
->f_bfree
, &ubuf
->f_bfree
) ||
189 __put_user(kbuf
->f_bavail
, &ubuf
->f_bavail
) ||
190 __put_user(kbuf
->f_files
, &ubuf
->f_files
) ||
191 __put_user(kbuf
->f_ffree
, &ubuf
->f_ffree
) ||
192 __put_user(kbuf
->f_namelen
, &ubuf
->f_namelen
) ||
193 __put_user(kbuf
->f_fsid
.val
[0], &ubuf
->f_fsid
.val
[0]) ||
194 __put_user(kbuf
->f_fsid
.val
[1], &ubuf
->f_fsid
.val
[1]) ||
195 __put_user(kbuf
->f_frsize
, &ubuf
->f_frsize
) ||
196 __put_user(0, &ubuf
->f_spare
[0]) ||
197 __put_user(0, &ubuf
->f_spare
[1]) ||
198 __put_user(0, &ubuf
->f_spare
[2]) ||
199 __put_user(0, &ubuf
->f_spare
[3]) ||
200 __put_user(0, &ubuf
->f_spare
[4]))
206 * The following statfs calls are copies of code from fs/open.c and
207 * should be checked against those from time to time
209 asmlinkage
long compat_sys_statfs(const char __user
*path
, struct compat_statfs __user
*buf
)
214 error
= user_path_walk(path
, &nd
);
217 error
= vfs_statfs(nd
.dentry
, &tmp
);
219 error
= put_compat_statfs(buf
, &tmp
);
225 asmlinkage
long compat_sys_fstatfs(unsigned int fd
, struct compat_statfs __user
*buf
)
235 error
= vfs_statfs(file
->f_path
.dentry
, &tmp
);
237 error
= put_compat_statfs(buf
, &tmp
);
243 static int put_compat_statfs64(struct compat_statfs64 __user
*ubuf
, struct kstatfs
*kbuf
)
245 if (sizeof ubuf
->f_blocks
== 4) {
246 if ((kbuf
->f_blocks
| kbuf
->f_bfree
| kbuf
->f_bavail
) &
247 0xffffffff00000000ULL
)
249 /* f_files and f_ffree may be -1; it's okay
250 * to stuff that into 32 bits */
251 if (kbuf
->f_files
!= 0xffffffffffffffffULL
252 && (kbuf
->f_files
& 0xffffffff00000000ULL
))
254 if (kbuf
->f_ffree
!= 0xffffffffffffffffULL
255 && (kbuf
->f_ffree
& 0xffffffff00000000ULL
))
258 if (!access_ok(VERIFY_WRITE
, ubuf
, sizeof(*ubuf
)) ||
259 __put_user(kbuf
->f_type
, &ubuf
->f_type
) ||
260 __put_user(kbuf
->f_bsize
, &ubuf
->f_bsize
) ||
261 __put_user(kbuf
->f_blocks
, &ubuf
->f_blocks
) ||
262 __put_user(kbuf
->f_bfree
, &ubuf
->f_bfree
) ||
263 __put_user(kbuf
->f_bavail
, &ubuf
->f_bavail
) ||
264 __put_user(kbuf
->f_files
, &ubuf
->f_files
) ||
265 __put_user(kbuf
->f_ffree
, &ubuf
->f_ffree
) ||
266 __put_user(kbuf
->f_namelen
, &ubuf
->f_namelen
) ||
267 __put_user(kbuf
->f_fsid
.val
[0], &ubuf
->f_fsid
.val
[0]) ||
268 __put_user(kbuf
->f_fsid
.val
[1], &ubuf
->f_fsid
.val
[1]) ||
269 __put_user(kbuf
->f_frsize
, &ubuf
->f_frsize
))
274 asmlinkage
long compat_sys_statfs64(const char __user
*path
, compat_size_t sz
, struct compat_statfs64 __user
*buf
)
279 if (sz
!= sizeof(*buf
))
282 error
= user_path_walk(path
, &nd
);
285 error
= vfs_statfs(nd
.dentry
, &tmp
);
287 error
= put_compat_statfs64(buf
, &tmp
);
293 asmlinkage
long compat_sys_fstatfs64(unsigned int fd
, compat_size_t sz
, struct compat_statfs64 __user
*buf
)
299 if (sz
!= sizeof(*buf
))
306 error
= vfs_statfs(file
->f_path
.dentry
, &tmp
);
308 error
= put_compat_statfs64(buf
, &tmp
);
314 /* ioctl32 stuff, used by sparc64, parisc, s390x, ppc64, x86_64, MIPS */
316 #define IOCTL_HASHSIZE 256
317 static struct ioctl_trans
*ioctl32_hash_table
[IOCTL_HASHSIZE
];
319 static inline unsigned long ioctl32_hash(unsigned long cmd
)
321 return (((cmd
>> 6) ^ (cmd
>> 4) ^ cmd
)) % IOCTL_HASHSIZE
;
324 static void ioctl32_insert_translation(struct ioctl_trans
*trans
)
327 struct ioctl_trans
*t
;
329 hash
= ioctl32_hash (trans
->cmd
);
330 if (!ioctl32_hash_table
[hash
])
331 ioctl32_hash_table
[hash
] = trans
;
333 t
= ioctl32_hash_table
[hash
];
341 static int __init
init_sys32_ioctl(void)
345 for (i
= 0; i
< ioctl_table_size
; i
++) {
346 if (ioctl_start
[i
].next
!= 0) {
347 printk("ioctl translation %d bad\n",i
);
351 ioctl32_insert_translation(&ioctl_start
[i
]);
356 __initcall(init_sys32_ioctl
);
358 static void compat_ioctl_error(struct file
*filp
, unsigned int fd
,
359 unsigned int cmd
, unsigned long arg
)
365 /* find the name of the device. */
366 path
= (char *)__get_free_page(GFP_KERNEL
);
368 fn
= d_path(filp
->f_path
.dentry
, filp
->f_path
.mnt
, path
, PAGE_SIZE
);
373 sprintf(buf
,"'%c'", (cmd
>>24) & 0x3f);
374 if (!isprint(buf
[1]))
375 sprintf(buf
, "%02x", buf
[1]);
376 compat_printk("ioctl32(%s:%d): Unknown cmd fd(%d) "
377 "cmd(%08x){%s} arg(%08x) on %s\n",
378 current
->comm
, current
->pid
,
379 (int)fd
, (unsigned int)cmd
, buf
,
380 (unsigned int)arg
, fn
);
383 free_page((unsigned long)path
);
386 asmlinkage
long compat_sys_ioctl(unsigned int fd
, unsigned int cmd
,
391 struct ioctl_trans
*t
;
394 filp
= fget_light(fd
, &fput_needed
);
398 /* RED-PEN how should LSM module know it's handling 32bit? */
399 error
= security_file_ioctl(filp
, cmd
, arg
);
404 * To allow the compat_ioctl handlers to be self contained
405 * we need to check the common ioctls here first.
406 * Just handle them with the standard handlers below.
419 if (S_ISREG(filp
->f_path
.dentry
->d_inode
->i_mode
))
424 if (filp
->f_op
&& filp
->f_op
->compat_ioctl
) {
425 error
= filp
->f_op
->compat_ioctl(filp
, cmd
, arg
);
426 if (error
!= -ENOIOCTLCMD
)
431 (!filp
->f_op
->ioctl
&& !filp
->f_op
->unlocked_ioctl
))
436 for (t
= ioctl32_hash_table
[ioctl32_hash(cmd
)]; t
; t
= t
->next
) {
441 if (S_ISSOCK(filp
->f_path
.dentry
->d_inode
->i_mode
) &&
442 cmd
>= SIOCDEVPRIVATE
&& cmd
<= (SIOCDEVPRIVATE
+ 15)) {
443 error
= siocdevprivate_ioctl(fd
, cmd
, arg
);
448 compat_ioctl_error(filp
, fd
, cmd
, arg
);
457 error
= t
->handler(fd
, cmd
, arg
, filp
);
463 error
= vfs_ioctl(filp
, fd
, cmd
, arg
);
465 fput_light(filp
, fput_needed
);
470 static int get_compat_flock(struct flock
*kfl
, struct compat_flock __user
*ufl
)
472 if (!access_ok(VERIFY_READ
, ufl
, sizeof(*ufl
)) ||
473 __get_user(kfl
->l_type
, &ufl
->l_type
) ||
474 __get_user(kfl
->l_whence
, &ufl
->l_whence
) ||
475 __get_user(kfl
->l_start
, &ufl
->l_start
) ||
476 __get_user(kfl
->l_len
, &ufl
->l_len
) ||
477 __get_user(kfl
->l_pid
, &ufl
->l_pid
))
482 static int put_compat_flock(struct flock
*kfl
, struct compat_flock __user
*ufl
)
484 if (!access_ok(VERIFY_WRITE
, ufl
, sizeof(*ufl
)) ||
485 __put_user(kfl
->l_type
, &ufl
->l_type
) ||
486 __put_user(kfl
->l_whence
, &ufl
->l_whence
) ||
487 __put_user(kfl
->l_start
, &ufl
->l_start
) ||
488 __put_user(kfl
->l_len
, &ufl
->l_len
) ||
489 __put_user(kfl
->l_pid
, &ufl
->l_pid
))
494 #ifndef HAVE_ARCH_GET_COMPAT_FLOCK64
495 static int get_compat_flock64(struct flock
*kfl
, struct compat_flock64 __user
*ufl
)
497 if (!access_ok(VERIFY_READ
, ufl
, sizeof(*ufl
)) ||
498 __get_user(kfl
->l_type
, &ufl
->l_type
) ||
499 __get_user(kfl
->l_whence
, &ufl
->l_whence
) ||
500 __get_user(kfl
->l_start
, &ufl
->l_start
) ||
501 __get_user(kfl
->l_len
, &ufl
->l_len
) ||
502 __get_user(kfl
->l_pid
, &ufl
->l_pid
))
508 #ifndef HAVE_ARCH_PUT_COMPAT_FLOCK64
509 static int put_compat_flock64(struct flock
*kfl
, struct compat_flock64 __user
*ufl
)
511 if (!access_ok(VERIFY_WRITE
, ufl
, sizeof(*ufl
)) ||
512 __put_user(kfl
->l_type
, &ufl
->l_type
) ||
513 __put_user(kfl
->l_whence
, &ufl
->l_whence
) ||
514 __put_user(kfl
->l_start
, &ufl
->l_start
) ||
515 __put_user(kfl
->l_len
, &ufl
->l_len
) ||
516 __put_user(kfl
->l_pid
, &ufl
->l_pid
))
522 asmlinkage
long compat_sys_fcntl64(unsigned int fd
, unsigned int cmd
,
533 ret
= get_compat_flock(&f
, compat_ptr(arg
));
538 ret
= sys_fcntl(fd
, cmd
, (unsigned long)&f
);
540 if (cmd
== F_GETLK
&& ret
== 0) {
541 /* GETLK was successfule and we need to return the data...
542 * but it needs to fit in the compat structure.
543 * l_start shouldn't be too big, unless the original
544 * start + end is greater than COMPAT_OFF_T_MAX, in which
545 * case the app was asking for trouble, so we return
546 * -EOVERFLOW in that case.
547 * l_len could be too big, in which case we just truncate it,
548 * and only allow the app to see that part of the conflicting
549 * lock that might make sense to it anyway
552 if (f
.l_start
> COMPAT_OFF_T_MAX
)
554 if (f
.l_len
> COMPAT_OFF_T_MAX
)
555 f
.l_len
= COMPAT_OFF_T_MAX
;
557 ret
= put_compat_flock(&f
, compat_ptr(arg
));
564 ret
= get_compat_flock64(&f
, compat_ptr(arg
));
569 ret
= sys_fcntl(fd
, (cmd
== F_GETLK64
) ? F_GETLK
:
570 ((cmd
== F_SETLK64
) ? F_SETLK
: F_SETLKW
),
573 if (cmd
== F_GETLK64
&& ret
== 0) {
574 /* need to return lock information - see above for commentary */
575 if (f
.l_start
> COMPAT_LOFF_T_MAX
)
577 if (f
.l_len
> COMPAT_LOFF_T_MAX
)
578 f
.l_len
= COMPAT_LOFF_T_MAX
;
580 ret
= put_compat_flock64(&f
, compat_ptr(arg
));
585 ret
= sys_fcntl(fd
, cmd
, arg
);
591 asmlinkage
long compat_sys_fcntl(unsigned int fd
, unsigned int cmd
,
594 if ((cmd
== F_GETLK64
) || (cmd
== F_SETLK64
) || (cmd
== F_SETLKW64
))
596 return compat_sys_fcntl64(fd
, cmd
, arg
);
600 compat_sys_io_setup(unsigned nr_reqs
, u32 __user
*ctx32p
)
605 mm_segment_t oldfs
= get_fs();
606 if (unlikely(get_user(ctx64
, ctx32p
)))
610 /* The __user pointer cast is valid because of the set_fs() */
611 ret
= sys_io_setup(nr_reqs
, (aio_context_t __user
*) &ctx64
);
613 /* truncating is ok because it's a user address */
615 ret
= put_user((u32
) ctx64
, ctx32p
);
620 compat_sys_io_getevents(aio_context_t ctx_id
,
621 unsigned long min_nr
,
623 struct io_event __user
*events
,
624 struct compat_timespec __user
*timeout
)
628 struct timespec __user
*ut
= NULL
;
631 if (unlikely(!access_ok(VERIFY_WRITE
, events
,
632 nr
* sizeof(struct io_event
))))
635 if (get_compat_timespec(&t
, timeout
))
638 ut
= compat_alloc_user_space(sizeof(*ut
));
639 if (copy_to_user(ut
, &t
, sizeof(t
)) )
642 ret
= sys_io_getevents(ctx_id
, min_nr
, nr
, events
, ut
);
648 copy_iocb(long nr
, u32 __user
*ptr32
, struct iocb __user
* __user
*ptr64
)
653 for (i
= 0; i
< nr
; ++i
) {
654 if (get_user(uptr
, ptr32
+ i
))
656 if (put_user(compat_ptr(uptr
), ptr64
+ i
))
662 #define MAX_AIO_SUBMITS (PAGE_SIZE/sizeof(struct iocb *))
665 compat_sys_io_submit(aio_context_t ctx_id
, int nr
, u32 __user
*iocb
)
667 struct iocb __user
* __user
*iocb64
;
670 if (unlikely(nr
< 0))
673 if (nr
> MAX_AIO_SUBMITS
)
674 nr
= MAX_AIO_SUBMITS
;
676 iocb64
= compat_alloc_user_space(nr
* sizeof(*iocb64
));
677 ret
= copy_iocb(nr
, iocb
, iocb64
);
679 ret
= sys_io_submit(ctx_id
, nr
, iocb64
);
683 struct compat_ncp_mount_data
{
684 compat_int_t version
;
685 compat_uint_t ncp_fd
;
686 __compat_uid_t mounted_uid
;
687 compat_pid_t wdog_pid
;
688 unsigned char mounted_vol
[NCP_VOLNAME_LEN
+ 1];
689 compat_uint_t time_out
;
690 compat_uint_t retry_count
;
694 compat_mode_t file_mode
;
695 compat_mode_t dir_mode
;
698 struct compat_ncp_mount_data_v4
{
699 compat_int_t version
;
700 compat_ulong_t flags
;
701 compat_ulong_t mounted_uid
;
702 compat_long_t wdog_pid
;
703 compat_uint_t ncp_fd
;
704 compat_uint_t time_out
;
705 compat_uint_t retry_count
;
708 compat_ulong_t file_mode
;
709 compat_ulong_t dir_mode
;
712 static void *do_ncp_super_data_conv(void *raw_data
)
714 int version
= *(unsigned int *)raw_data
;
717 struct compat_ncp_mount_data
*c_n
= raw_data
;
718 struct ncp_mount_data
*n
= raw_data
;
720 n
->dir_mode
= c_n
->dir_mode
;
721 n
->file_mode
= c_n
->file_mode
;
724 memmove (n
->mounted_vol
, c_n
->mounted_vol
, (sizeof (c_n
->mounted_vol
) + 3 * sizeof (unsigned int)));
725 n
->wdog_pid
= c_n
->wdog_pid
;
726 n
->mounted_uid
= c_n
->mounted_uid
;
727 } else if (version
== 4) {
728 struct compat_ncp_mount_data_v4
*c_n
= raw_data
;
729 struct ncp_mount_data_v4
*n
= raw_data
;
731 n
->dir_mode
= c_n
->dir_mode
;
732 n
->file_mode
= c_n
->file_mode
;
735 n
->retry_count
= c_n
->retry_count
;
736 n
->time_out
= c_n
->time_out
;
737 n
->ncp_fd
= c_n
->ncp_fd
;
738 n
->wdog_pid
= c_n
->wdog_pid
;
739 n
->mounted_uid
= c_n
->mounted_uid
;
740 n
->flags
= c_n
->flags
;
741 } else if (version
!= 5) {
748 struct compat_smb_mount_data
{
749 compat_int_t version
;
750 __compat_uid_t mounted_uid
;
753 compat_mode_t file_mode
;
754 compat_mode_t dir_mode
;
757 static void *do_smb_super_data_conv(void *raw_data
)
759 struct smb_mount_data
*s
= raw_data
;
760 struct compat_smb_mount_data
*c_s
= raw_data
;
762 if (c_s
->version
!= SMB_MOUNT_OLDVERSION
)
764 s
->dir_mode
= c_s
->dir_mode
;
765 s
->file_mode
= c_s
->file_mode
;
768 s
->mounted_uid
= c_s
->mounted_uid
;
773 struct compat_nfs_string
{
778 static inline void compat_nfs_string(struct nfs_string
*dst
,
779 struct compat_nfs_string
*src
)
781 dst
->data
= compat_ptr(src
->data
);
785 struct compat_nfs4_mount_data_v1
{
786 compat_int_t version
;
791 compat_int_t retrans
;
792 compat_int_t acregmin
;
793 compat_int_t acregmax
;
794 compat_int_t acdirmin
;
795 compat_int_t acdirmax
;
796 struct compat_nfs_string client_addr
;
797 struct compat_nfs_string mnt_path
;
798 struct compat_nfs_string hostname
;
799 compat_uint_t host_addrlen
;
800 compat_uptr_t host_addr
;
802 compat_int_t auth_flavourlen
;
803 compat_uptr_t auth_flavours
;
806 static int do_nfs4_super_data_conv(void *raw_data
)
808 int version
= *(compat_uint_t
*) raw_data
;
811 struct compat_nfs4_mount_data_v1
*raw
= raw_data
;
812 struct nfs4_mount_data
*real
= raw_data
;
814 /* copy the fields backwards */
815 real
->auth_flavours
= compat_ptr(raw
->auth_flavours
);
816 real
->auth_flavourlen
= raw
->auth_flavourlen
;
817 real
->proto
= raw
->proto
;
818 real
->host_addr
= compat_ptr(raw
->host_addr
);
819 real
->host_addrlen
= raw
->host_addrlen
;
820 compat_nfs_string(&real
->hostname
, &raw
->hostname
);
821 compat_nfs_string(&real
->mnt_path
, &raw
->mnt_path
);
822 compat_nfs_string(&real
->client_addr
, &raw
->client_addr
);
823 real
->acdirmax
= raw
->acdirmax
;
824 real
->acdirmin
= raw
->acdirmin
;
825 real
->acregmax
= raw
->acregmax
;
826 real
->acregmin
= raw
->acregmin
;
827 real
->retrans
= raw
->retrans
;
828 real
->timeo
= raw
->timeo
;
829 real
->wsize
= raw
->wsize
;
830 real
->rsize
= raw
->rsize
;
831 real
->flags
= raw
->flags
;
832 real
->version
= raw
->version
;
841 #define SMBFS_NAME "smbfs"
842 #define NCPFS_NAME "ncpfs"
843 #define NFS4_NAME "nfs4"
845 asmlinkage
long compat_sys_mount(char __user
* dev_name
, char __user
* dir_name
,
846 char __user
* type
, unsigned long flags
,
849 unsigned long type_page
;
850 unsigned long data_page
;
851 unsigned long dev_page
;
855 retval
= copy_mount_options (type
, &type_page
);
859 dir_page
= getname(dir_name
);
860 retval
= PTR_ERR(dir_page
);
861 if (IS_ERR(dir_page
))
864 retval
= copy_mount_options (dev_name
, &dev_page
);
868 retval
= copy_mount_options (data
, &data_page
);
874 if (type_page
&& data_page
) {
875 if (!strcmp((char *)type_page
, SMBFS_NAME
)) {
876 do_smb_super_data_conv((void *)data_page
);
877 } else if (!strcmp((char *)type_page
, NCPFS_NAME
)) {
878 do_ncp_super_data_conv((void *)data_page
);
879 } else if (!strcmp((char *)type_page
, NFS4_NAME
)) {
880 if (do_nfs4_super_data_conv((void *) data_page
))
886 retval
= do_mount((char*)dev_page
, dir_page
, (char*)type_page
,
887 flags
, (void*)data_page
);
891 free_page(data_page
);
897 free_page(type_page
);
902 #define NAME_OFFSET(de) ((int) ((de)->d_name - (char __user *) (de)))
903 #define COMPAT_ROUND_UP(x) (((x)+sizeof(compat_long_t)-1) & \
904 ~(sizeof(compat_long_t)-1))
906 struct compat_old_linux_dirent
{
907 compat_ulong_t d_ino
;
908 compat_ulong_t d_offset
;
909 unsigned short d_namlen
;
913 struct compat_readdir_callback
{
914 struct compat_old_linux_dirent __user
*dirent
;
918 static int compat_fillonedir(void *__buf
, const char *name
, int namlen
,
919 loff_t offset
, u64 ino
, unsigned int d_type
)
921 struct compat_readdir_callback
*buf
= __buf
;
922 struct compat_old_linux_dirent __user
*dirent
;
923 compat_ulong_t d_ino
;
928 if (sizeof(d_ino
) < sizeof(ino
) && d_ino
!= ino
)
931 dirent
= buf
->dirent
;
932 if (!access_ok(VERIFY_WRITE
, dirent
,
933 (unsigned long)(dirent
->d_name
+ namlen
+ 1) -
934 (unsigned long)dirent
))
936 if ( __put_user(d_ino
, &dirent
->d_ino
) ||
937 __put_user(offset
, &dirent
->d_offset
) ||
938 __put_user(namlen
, &dirent
->d_namlen
) ||
939 __copy_to_user(dirent
->d_name
, name
, namlen
) ||
940 __put_user(0, dirent
->d_name
+ namlen
))
944 buf
->result
= -EFAULT
;
948 asmlinkage
long compat_sys_old_readdir(unsigned int fd
,
949 struct compat_old_linux_dirent __user
*dirent
, unsigned int count
)
953 struct compat_readdir_callback buf
;
963 error
= vfs_readdir(file
, compat_fillonedir
, &buf
);
972 struct compat_linux_dirent
{
973 compat_ulong_t d_ino
;
974 compat_ulong_t d_off
;
975 unsigned short d_reclen
;
979 struct compat_getdents_callback
{
980 struct compat_linux_dirent __user
*current_dir
;
981 struct compat_linux_dirent __user
*previous
;
986 static int compat_filldir(void *__buf
, const char *name
, int namlen
,
987 loff_t offset
, u64 ino
, unsigned int d_type
)
989 struct compat_linux_dirent __user
* dirent
;
990 struct compat_getdents_callback
*buf
= __buf
;
991 compat_ulong_t d_ino
;
992 int reclen
= COMPAT_ROUND_UP(NAME_OFFSET(dirent
) + namlen
+ 2);
994 buf
->error
= -EINVAL
; /* only used if we fail.. */
995 if (reclen
> buf
->count
)
998 if (sizeof(d_ino
) < sizeof(ino
) && d_ino
!= ino
)
1000 dirent
= buf
->previous
;
1002 if (__put_user(offset
, &dirent
->d_off
))
1005 dirent
= buf
->current_dir
;
1006 if (__put_user(d_ino
, &dirent
->d_ino
))
1008 if (__put_user(reclen
, &dirent
->d_reclen
))
1010 if (copy_to_user(dirent
->d_name
, name
, namlen
))
1012 if (__put_user(0, dirent
->d_name
+ namlen
))
1014 if (__put_user(d_type
, (char __user
*) dirent
+ reclen
- 1))
1016 buf
->previous
= dirent
;
1017 dirent
= (void __user
*)dirent
+ reclen
;
1018 buf
->current_dir
= dirent
;
1019 buf
->count
-= reclen
;
1022 buf
->error
= -EFAULT
;
1026 asmlinkage
long compat_sys_getdents(unsigned int fd
,
1027 struct compat_linux_dirent __user
*dirent
, unsigned int count
)
1030 struct compat_linux_dirent __user
* lastdirent
;
1031 struct compat_getdents_callback buf
;
1035 if (!access_ok(VERIFY_WRITE
, dirent
, count
))
1043 buf
.current_dir
= dirent
;
1044 buf
.previous
= NULL
;
1048 error
= vfs_readdir(file
, compat_filldir
, &buf
);
1052 lastdirent
= buf
.previous
;
1054 if (put_user(file
->f_pos
, &lastdirent
->d_off
))
1057 error
= count
- buf
.count
;
1066 #ifndef __ARCH_OMIT_COMPAT_SYS_GETDENTS64
1067 #define COMPAT_ROUND_UP64(x) (((x)+sizeof(u64)-1) & ~(sizeof(u64)-1))
1069 struct compat_getdents_callback64
{
1070 struct linux_dirent64 __user
*current_dir
;
1071 struct linux_dirent64 __user
*previous
;
1076 static int compat_filldir64(void * __buf
, const char * name
, int namlen
, loff_t offset
,
1077 u64 ino
, unsigned int d_type
)
1079 struct linux_dirent64 __user
*dirent
;
1080 struct compat_getdents_callback64
*buf
= __buf
;
1081 int jj
= NAME_OFFSET(dirent
);
1082 int reclen
= COMPAT_ROUND_UP64(jj
+ namlen
+ 1);
1085 buf
->error
= -EINVAL
; /* only used if we fail.. */
1086 if (reclen
> buf
->count
)
1088 dirent
= buf
->previous
;
1091 if (__put_user_unaligned(offset
, &dirent
->d_off
))
1094 dirent
= buf
->current_dir
;
1095 if (__put_user_unaligned(ino
, &dirent
->d_ino
))
1098 if (__put_user_unaligned(off
, &dirent
->d_off
))
1100 if (__put_user(reclen
, &dirent
->d_reclen
))
1102 if (__put_user(d_type
, &dirent
->d_type
))
1104 if (copy_to_user(dirent
->d_name
, name
, namlen
))
1106 if (__put_user(0, dirent
->d_name
+ namlen
))
1108 buf
->previous
= dirent
;
1109 dirent
= (void __user
*)dirent
+ reclen
;
1110 buf
->current_dir
= dirent
;
1111 buf
->count
-= reclen
;
1114 buf
->error
= -EFAULT
;
1118 asmlinkage
long compat_sys_getdents64(unsigned int fd
,
1119 struct linux_dirent64 __user
* dirent
, unsigned int count
)
1122 struct linux_dirent64 __user
* lastdirent
;
1123 struct compat_getdents_callback64 buf
;
1127 if (!access_ok(VERIFY_WRITE
, dirent
, count
))
1135 buf
.current_dir
= dirent
;
1136 buf
.previous
= NULL
;
1140 error
= vfs_readdir(file
, compat_filldir64
, &buf
);
1144 lastdirent
= buf
.previous
;
1146 typeof(lastdirent
->d_off
) d_off
= file
->f_pos
;
1148 if (__put_user_unaligned(d_off
, &lastdirent
->d_off
))
1150 error
= count
- buf
.count
;
1158 #endif /* ! __ARCH_OMIT_COMPAT_SYS_GETDENTS64 */
1160 static ssize_t
compat_do_readv_writev(int type
, struct file
*file
,
1161 const struct compat_iovec __user
*uvector
,
1162 unsigned long nr_segs
, loff_t
*pos
)
1164 compat_ssize_t tot_len
;
1165 struct iovec iovstack
[UIO_FASTIOV
];
1166 struct iovec
*iov
=iovstack
, *vector
;
1173 * SuS says "The readv() function *may* fail if the iovcnt argument
1174 * was less than or equal to 0, or greater than {IOV_MAX}. Linux has
1175 * traditionally returned zero for zero segments, so...
1182 * First get the "struct iovec" from user memory and
1183 * verify all the pointers
1186 if ((nr_segs
> UIO_MAXIOV
) || (nr_segs
<= 0))
1190 if (nr_segs
> UIO_FASTIOV
) {
1192 iov
= kmalloc(nr_segs
*sizeof(struct iovec
), GFP_KERNEL
);
1197 if (!access_ok(VERIFY_READ
, uvector
, nr_segs
*sizeof(*uvector
)))
1201 * Single unix specification:
1202 * We should -EINVAL if an element length is not >= 0 and fitting an
1203 * ssize_t. The total length is fitting an ssize_t
1205 * Be careful here because iov_len is a size_t not an ssize_t
1210 for (seg
= 0 ; seg
< nr_segs
; seg
++) {
1211 compat_ssize_t tmp
= tot_len
;
1215 if (__get_user(len
, &uvector
->iov_len
) ||
1216 __get_user(buf
, &uvector
->iov_base
)) {
1220 if (len
< 0) /* size_t not fitting an compat_ssize_t .. */
1223 if (tot_len
< tmp
) /* maths overflow on the compat_ssize_t */
1225 vector
->iov_base
= compat_ptr(buf
);
1226 vector
->iov_len
= (compat_size_t
) len
;
1235 ret
= rw_verify_area(type
, file
, pos
, tot_len
);
1239 ret
= security_file_permission(file
, type
== READ
? MAY_READ
:MAY_WRITE
);
1245 fn
= file
->f_op
->read
;
1246 fnv
= file
->f_op
->aio_read
;
1248 fn
= (io_fn_t
)file
->f_op
->write
;
1249 fnv
= file
->f_op
->aio_write
;
1253 ret
= do_sync_readv_writev(file
, iov
, nr_segs
, tot_len
,
1256 ret
= do_loop_readv_writev(file
, iov
, nr_segs
, pos
, fn
);
1259 if (iov
!= iovstack
)
1261 if ((ret
+ (type
== READ
)) > 0) {
1262 struct dentry
*dentry
= file
->f_path
.dentry
;
1264 fsnotify_access(dentry
);
1266 fsnotify_modify(dentry
);
1272 compat_sys_readv(unsigned long fd
, const struct compat_iovec __user
*vec
, unsigned long vlen
)
1275 ssize_t ret
= -EBADF
;
1281 if (!(file
->f_mode
& FMODE_READ
))
1285 if (!file
->f_op
|| (!file
->f_op
->aio_read
&& !file
->f_op
->read
))
1288 ret
= compat_do_readv_writev(READ
, file
, vec
, vlen
, &file
->f_pos
);
1296 compat_sys_writev(unsigned long fd
, const struct compat_iovec __user
*vec
, unsigned long vlen
)
1299 ssize_t ret
= -EBADF
;
1304 if (!(file
->f_mode
& FMODE_WRITE
))
1308 if (!file
->f_op
|| (!file
->f_op
->aio_write
&& !file
->f_op
->write
))
1311 ret
= compat_do_readv_writev(WRITE
, file
, vec
, vlen
, &file
->f_pos
);
1319 compat_sys_vmsplice(int fd
, const struct compat_iovec __user
*iov32
,
1320 unsigned int nr_segs
, unsigned int flags
)
1323 struct iovec __user
*iov
;
1324 if (nr_segs
> UIO_MAXIOV
)
1326 iov
= compat_alloc_user_space(nr_segs
* sizeof(struct iovec
));
1327 for (i
= 0; i
< nr_segs
; i
++) {
1328 struct compat_iovec v
;
1329 if (get_user(v
.iov_base
, &iov32
[i
].iov_base
) ||
1330 get_user(v
.iov_len
, &iov32
[i
].iov_len
) ||
1331 put_user(compat_ptr(v
.iov_base
), &iov
[i
].iov_base
) ||
1332 put_user(v
.iov_len
, &iov
[i
].iov_len
))
1335 return sys_vmsplice(fd
, iov
, nr_segs
, flags
);
1339 * Exactly like fs/open.c:sys_open(), except that it doesn't set the
1343 compat_sys_open(const char __user
*filename
, int flags
, int mode
)
1345 return do_sys_open(AT_FDCWD
, filename
, flags
, mode
);
1349 * Exactly like fs/open.c:sys_openat(), except that it doesn't set the
1353 compat_sys_openat(unsigned int dfd
, const char __user
*filename
, int flags
, int mode
)
1355 return do_sys_open(dfd
, filename
, flags
, mode
);
1359 * compat_count() counts the number of arguments/envelopes. It is basically
1360 * a copy of count() from fs/exec.c, except that it works with 32 bit argv
1361 * and envp pointers.
1363 static int compat_count(compat_uptr_t __user
*argv
, int max
)
1371 if (get_user(p
, argv
))
1384 * compat_copy_strings() is basically a copy of copy_strings() from fs/exec.c
1385 * except that it works with 32 bit argv and envp pointers.
1387 static int compat_copy_strings(int argc
, compat_uptr_t __user
*argv
,
1388 struct linux_binprm
*bprm
)
1390 struct page
*kmapped_page
= NULL
;
1394 while (argc
-- > 0) {
1399 if (get_user(str
, argv
+argc
) ||
1400 !(len
= strnlen_user(compat_ptr(str
), bprm
->p
))) {
1405 if (bprm
->p
< len
) {
1411 /* XXX: add architecture specific overflow check here. */
1416 int offset
, bytes_to_copy
;
1419 offset
= pos
% PAGE_SIZE
;
1421 page
= bprm
->page
[i
];
1424 page
= alloc_page(GFP_HIGHUSER
);
1425 bprm
->page
[i
] = page
;
1433 if (page
!= kmapped_page
) {
1435 kunmap(kmapped_page
);
1436 kmapped_page
= page
;
1437 kaddr
= kmap(kmapped_page
);
1440 memset(kaddr
, 0, offset
);
1441 bytes_to_copy
= PAGE_SIZE
- offset
;
1442 if (bytes_to_copy
> len
) {
1443 bytes_to_copy
= len
;
1445 memset(kaddr
+offset
+len
, 0,
1446 PAGE_SIZE
-offset
-len
);
1448 err
= copy_from_user(kaddr
+offset
, compat_ptr(str
),
1455 pos
+= bytes_to_copy
;
1456 str
+= bytes_to_copy
;
1457 len
-= bytes_to_copy
;
1463 kunmap(kmapped_page
);
1469 #define free_arg_pages(bprm) do { } while (0)
1473 static inline void free_arg_pages(struct linux_binprm
*bprm
)
1477 for (i
= 0; i
< MAX_ARG_PAGES
; i
++) {
1479 __free_page(bprm
->page
[i
]);
1480 bprm
->page
[i
] = NULL
;
1484 #endif /* CONFIG_MMU */
1487 * compat_do_execve() is mostly a copy of do_execve(), with the exception
1488 * that it processes 32 bit argv and envp pointers.
1490 int compat_do_execve(char * filename
,
1491 compat_uptr_t __user
*argv
,
1492 compat_uptr_t __user
*envp
,
1493 struct pt_regs
* regs
)
1495 struct linux_binprm
*bprm
;
1501 bprm
= kzalloc(sizeof(*bprm
), GFP_KERNEL
);
1505 file
= open_exec(filename
);
1506 retval
= PTR_ERR(file
);
1512 bprm
->p
= PAGE_SIZE
*MAX_ARG_PAGES
-sizeof(void *);
1514 bprm
->filename
= filename
;
1515 bprm
->interp
= filename
;
1516 bprm
->mm
= mm_alloc();
1521 retval
= init_new_context(current
, bprm
->mm
);
1525 bprm
->argc
= compat_count(argv
, bprm
->p
/ sizeof(compat_uptr_t
));
1526 if ((retval
= bprm
->argc
) < 0)
1529 bprm
->envc
= compat_count(envp
, bprm
->p
/ sizeof(compat_uptr_t
));
1530 if ((retval
= bprm
->envc
) < 0)
1533 retval
= security_bprm_alloc(bprm
);
1537 retval
= prepare_binprm(bprm
);
1541 retval
= copy_strings_kernel(1, &bprm
->filename
, bprm
);
1545 bprm
->exec
= bprm
->p
;
1546 retval
= compat_copy_strings(bprm
->envc
, envp
, bprm
);
1550 retval
= compat_copy_strings(bprm
->argc
, argv
, bprm
);
1554 retval
= search_binary_handler(bprm
, regs
);
1556 free_arg_pages(bprm
);
1558 /* execve success */
1559 security_bprm_free(bprm
);
1560 acct_update_integrals(current
);
1566 /* Something went wrong, return the inode and free the argument pages*/
1567 for (i
= 0 ; i
< MAX_ARG_PAGES
; i
++) {
1568 struct page
* page
= bprm
->page
[i
];
1574 security_bprm_free(bprm
);
1582 allow_write_access(bprm
->file
);
1593 #define __COMPAT_NFDBITS (8 * sizeof(compat_ulong_t))
1595 #define ROUND_UP(x,y) (((x)+(y)-1)/(y))
1598 * Ooo, nasty. We need here to frob 32-bit unsigned longs to
1599 * 64-bit unsigned longs.
1602 int compat_get_fd_set(unsigned long nr
, compat_ulong_t __user
*ufdset
,
1603 unsigned long *fdset
)
1605 nr
= ROUND_UP(nr
, __COMPAT_NFDBITS
);
1609 if (!access_ok(VERIFY_WRITE
, ufdset
, nr
*sizeof(compat_ulong_t
)))
1616 if (__get_user(l
, ufdset
) || __get_user(h
, ufdset
+1))
1619 *fdset
++ = h
<< 32 | l
;
1622 if (odd
&& __get_user(*fdset
, ufdset
))
1625 /* Tricky, must clear full unsigned long in the
1626 * kernel fdset at the end, this makes sure that
1629 memset(fdset
, 0, ((nr
+ 1) & ~1)*sizeof(compat_ulong_t
));
1635 int compat_set_fd_set(unsigned long nr
, compat_ulong_t __user
*ufdset
,
1636 unsigned long *fdset
)
1639 nr
= ROUND_UP(nr
, __COMPAT_NFDBITS
);
1650 if (__put_user(l
, ufdset
) || __put_user(h
, ufdset
+1))
1655 if (odd
&& __put_user(*fdset
, ufdset
))
1662 * This is a virtual copy of sys_select from fs/select.c and probably
1663 * should be compared to it from time to time
1667 * We can actually return ERESTARTSYS instead of EINTR, but I'd
1668 * like to be certain this leads to no problems. So I return
1669 * EINTR just for safety.
1671 * Update: ERESTARTSYS breaks at least the xview clock binary, so
1672 * I'm trying ERESTARTNOHAND which restart only when you want to.
1674 #define MAX_SELECT_SECONDS \
1675 ((unsigned long) (MAX_SCHEDULE_TIMEOUT / HZ)-1)
1677 int compat_core_sys_select(int n
, compat_ulong_t __user
*inp
,
1678 compat_ulong_t __user
*outp
, compat_ulong_t __user
*exp
, s64
*timeout
)
1682 int size
, max_fdset
, ret
= -EINVAL
;
1683 struct fdtable
*fdt
;
1688 /* max_fdset can increase, so grab it once to avoid race */
1690 fdt
= files_fdtable(current
->files
);
1691 max_fdset
= fdt
->max_fdset
;
1697 * We need 6 bitmaps (in/out/ex for both incoming and outgoing),
1698 * since we used fdset we need to allocate memory in units of
1702 size
= FDS_BYTES(n
);
1703 bits
= kmalloc(6 * size
, GFP_KERNEL
);
1706 fds
.in
= (unsigned long *) bits
;
1707 fds
.out
= (unsigned long *) (bits
+ size
);
1708 fds
.ex
= (unsigned long *) (bits
+ 2*size
);
1709 fds
.res_in
= (unsigned long *) (bits
+ 3*size
);
1710 fds
.res_out
= (unsigned long *) (bits
+ 4*size
);
1711 fds
.res_ex
= (unsigned long *) (bits
+ 5*size
);
1713 if ((ret
= compat_get_fd_set(n
, inp
, fds
.in
)) ||
1714 (ret
= compat_get_fd_set(n
, outp
, fds
.out
)) ||
1715 (ret
= compat_get_fd_set(n
, exp
, fds
.ex
)))
1717 zero_fd_set(n
, fds
.res_in
);
1718 zero_fd_set(n
, fds
.res_out
);
1719 zero_fd_set(n
, fds
.res_ex
);
1721 ret
= do_select(n
, &fds
, timeout
);
1726 ret
= -ERESTARTNOHAND
;
1727 if (signal_pending(current
))
1732 if (compat_set_fd_set(n
, inp
, fds
.res_in
) ||
1733 compat_set_fd_set(n
, outp
, fds
.res_out
) ||
1734 compat_set_fd_set(n
, exp
, fds
.res_ex
))
1742 asmlinkage
long compat_sys_select(int n
, compat_ulong_t __user
*inp
,
1743 compat_ulong_t __user
*outp
, compat_ulong_t __user
*exp
,
1744 struct compat_timeval __user
*tvp
)
1747 struct compat_timeval tv
;
1751 if (copy_from_user(&tv
, tvp
, sizeof(tv
)))
1754 if (tv
.tv_sec
< 0 || tv
.tv_usec
< 0)
1757 /* Cast to u64 to make GCC stop complaining */
1758 if ((u64
)tv
.tv_sec
>= (u64
)MAX_INT64_SECONDS
)
1759 timeout
= -1; /* infinite */
1761 timeout
= ROUND_UP(tv
.tv_usec
, 1000000/HZ
);
1762 timeout
+= tv
.tv_sec
* HZ
;
1766 ret
= compat_core_sys_select(n
, inp
, outp
, exp
, &timeout
);
1769 struct compat_timeval rtv
;
1771 if (current
->personality
& STICKY_TIMEOUTS
)
1773 rtv
.tv_usec
= jiffies_to_usecs(do_div((*(u64
*)&timeout
), HZ
));
1774 rtv
.tv_sec
= timeout
;
1775 if (compat_timeval_compare(&rtv
, &tv
) >= 0)
1777 if (copy_to_user(tvp
, &rtv
, sizeof(rtv
))) {
1780 * If an application puts its timeval in read-only
1781 * memory, we don't want the Linux-specific update to
1782 * the timeval to cause a fault after the select has
1783 * completed successfully. However, because we're not
1784 * updating the timeval, we can't restart the system
1787 if (ret
== -ERESTARTNOHAND
)
1795 #ifdef TIF_RESTORE_SIGMASK
1796 asmlinkage
long compat_sys_pselect7(int n
, compat_ulong_t __user
*inp
,
1797 compat_ulong_t __user
*outp
, compat_ulong_t __user
*exp
,
1798 struct compat_timespec __user
*tsp
, compat_sigset_t __user
*sigmask
,
1799 compat_size_t sigsetsize
)
1801 compat_sigset_t ss32
;
1802 sigset_t ksigmask
, sigsaved
;
1803 s64 timeout
= MAX_SCHEDULE_TIMEOUT
;
1804 struct compat_timespec ts
;
1808 if (copy_from_user(&ts
, tsp
, sizeof(ts
)))
1811 if (ts
.tv_sec
< 0 || ts
.tv_nsec
< 0)
1816 if (sigsetsize
!= sizeof(compat_sigset_t
))
1818 if (copy_from_user(&ss32
, sigmask
, sizeof(ss32
)))
1820 sigset_from_compat(&ksigmask
, &ss32
);
1822 sigdelsetmask(&ksigmask
, sigmask(SIGKILL
)|sigmask(SIGSTOP
));
1823 sigprocmask(SIG_SETMASK
, &ksigmask
, &sigsaved
);
1828 if ((unsigned long)ts
.tv_sec
< MAX_SELECT_SECONDS
) {
1829 timeout
= ROUND_UP(ts
.tv_nsec
, 1000000000/HZ
);
1830 timeout
+= ts
.tv_sec
* (unsigned long)HZ
;
1834 ts
.tv_sec
-= MAX_SELECT_SECONDS
;
1835 timeout
= MAX_SELECT_SECONDS
* HZ
;
1839 ret
= compat_core_sys_select(n
, inp
, outp
, exp
, &timeout
);
1841 } while (!ret
&& !timeout
&& tsp
&& (ts
.tv_sec
|| ts
.tv_nsec
));
1844 struct compat_timespec rts
;
1846 if (current
->personality
& STICKY_TIMEOUTS
)
1849 rts
.tv_sec
= timeout
/ HZ
;
1850 rts
.tv_nsec
= (timeout
% HZ
) * (NSEC_PER_SEC
/HZ
);
1851 if (rts
.tv_nsec
>= NSEC_PER_SEC
) {
1853 rts
.tv_nsec
-= NSEC_PER_SEC
;
1855 if (compat_timespec_compare(&rts
, &ts
) >= 0)
1857 if (copy_to_user(tsp
, &rts
, sizeof(rts
))) {
1860 * If an application puts its timeval in read-only
1861 * memory, we don't want the Linux-specific update to
1862 * the timeval to cause a fault after the select has
1863 * completed successfully. However, because we're not
1864 * updating the timeval, we can't restart the system
1867 if (ret
== -ERESTARTNOHAND
)
1872 if (ret
== -ERESTARTNOHAND
) {
1874 * Don't restore the signal mask yet. Let do_signal() deliver
1875 * the signal on the way back to userspace, before the signal
1879 memcpy(¤t
->saved_sigmask
, &sigsaved
,
1881 set_thread_flag(TIF_RESTORE_SIGMASK
);
1884 sigprocmask(SIG_SETMASK
, &sigsaved
, NULL
);
1889 asmlinkage
long compat_sys_pselect6(int n
, compat_ulong_t __user
*inp
,
1890 compat_ulong_t __user
*outp
, compat_ulong_t __user
*exp
,
1891 struct compat_timespec __user
*tsp
, void __user
*sig
)
1893 compat_size_t sigsetsize
= 0;
1894 compat_uptr_t up
= 0;
1897 if (!access_ok(VERIFY_READ
, sig
,
1898 sizeof(compat_uptr_t
)+sizeof(compat_size_t
)) ||
1899 __get_user(up
, (compat_uptr_t __user
*)sig
) ||
1900 __get_user(sigsetsize
,
1901 (compat_size_t __user
*)(sig
+sizeof(up
))))
1904 return compat_sys_pselect7(n
, inp
, outp
, exp
, tsp
, compat_ptr(up
),
1908 asmlinkage
long compat_sys_ppoll(struct pollfd __user
*ufds
,
1909 unsigned int nfds
, struct compat_timespec __user
*tsp
,
1910 const compat_sigset_t __user
*sigmask
, compat_size_t sigsetsize
)
1912 compat_sigset_t ss32
;
1913 sigset_t ksigmask
, sigsaved
;
1914 struct compat_timespec ts
;
1919 if (copy_from_user(&ts
, tsp
, sizeof(ts
)))
1922 /* We assume that ts.tv_sec is always lower than
1923 the number of seconds that can be expressed in
1924 an s64. Otherwise the compiler bitches at us */
1925 timeout
= ROUND_UP(ts
.tv_nsec
, 1000000000/HZ
);
1926 timeout
+= ts
.tv_sec
* HZ
;
1930 if (sigsetsize
!= sizeof(compat_sigset_t
))
1932 if (copy_from_user(&ss32
, sigmask
, sizeof(ss32
)))
1934 sigset_from_compat(&ksigmask
, &ss32
);
1936 sigdelsetmask(&ksigmask
, sigmask(SIGKILL
)|sigmask(SIGSTOP
));
1937 sigprocmask(SIG_SETMASK
, &ksigmask
, &sigsaved
);
1940 ret
= do_sys_poll(ufds
, nfds
, &timeout
);
1942 /* We can restart this syscall, usually */
1943 if (ret
== -EINTR
) {
1945 * Don't restore the signal mask yet. Let do_signal() deliver
1946 * the signal on the way back to userspace, before the signal
1950 memcpy(¤t
->saved_sigmask
, &sigsaved
,
1952 set_thread_flag(TIF_RESTORE_SIGMASK
);
1954 ret
= -ERESTARTNOHAND
;
1956 sigprocmask(SIG_SETMASK
, &sigsaved
, NULL
);
1958 if (tsp
&& timeout
>= 0) {
1959 struct compat_timespec rts
;
1961 if (current
->personality
& STICKY_TIMEOUTS
)
1963 /* Yes, we know it's actually an s64, but it's also positive. */
1964 rts
.tv_nsec
= jiffies_to_usecs(do_div((*(u64
*)&timeout
), HZ
)) *
1966 rts
.tv_sec
= timeout
;
1967 if (compat_timespec_compare(&rts
, &ts
) >= 0)
1969 if (copy_to_user(tsp
, &rts
, sizeof(rts
))) {
1972 * If an application puts its timeval in read-only
1973 * memory, we don't want the Linux-specific update to
1974 * the timeval to cause a fault after the select has
1975 * completed successfully. However, because we're not
1976 * updating the timeval, we can't restart the system
1979 if (ret
== -ERESTARTNOHAND
&& timeout
>= 0)
1986 #endif /* TIF_RESTORE_SIGMASK */
1988 #if defined(CONFIG_NFSD) || defined(CONFIG_NFSD_MODULE)
1989 /* Stuff for NFS server syscalls... */
1990 struct compat_nfsctl_svc
{
1995 struct compat_nfsctl_client
{
1996 s8 cl32_ident
[NFSCLNT_IDMAX
+1];
1998 struct in_addr cl32_addrlist
[NFSCLNT_ADDRMAX
];
2001 u8 cl32_fhkey
[NFSCLNT_KEYMAX
];
2004 struct compat_nfsctl_export
{
2005 char ex32_client
[NFSCLNT_IDMAX
+1];
2006 char ex32_path
[NFS_MAXPATHLEN
+1];
2007 compat_dev_t ex32_dev
;
2008 compat_ino_t ex32_ino
;
2009 compat_int_t ex32_flags
;
2010 __compat_uid_t ex32_anon_uid
;
2011 __compat_gid_t ex32_anon_gid
;
2014 struct compat_nfsctl_fdparm
{
2015 struct sockaddr gd32_addr
;
2016 s8 gd32_path
[NFS_MAXPATHLEN
+1];
2017 compat_int_t gd32_version
;
2020 struct compat_nfsctl_fsparm
{
2021 struct sockaddr gd32_addr
;
2022 s8 gd32_path
[NFS_MAXPATHLEN
+1];
2023 compat_int_t gd32_maxlen
;
2026 struct compat_nfsctl_arg
{
2027 compat_int_t ca32_version
; /* safeguard */
2029 struct compat_nfsctl_svc u32_svc
;
2030 struct compat_nfsctl_client u32_client
;
2031 struct compat_nfsctl_export u32_export
;
2032 struct compat_nfsctl_fdparm u32_getfd
;
2033 struct compat_nfsctl_fsparm u32_getfs
;
2035 #define ca32_svc u.u32_svc
2036 #define ca32_client u.u32_client
2037 #define ca32_export u.u32_export
2038 #define ca32_getfd u.u32_getfd
2039 #define ca32_getfs u.u32_getfs
2042 union compat_nfsctl_res
{
2043 __u8 cr32_getfh
[NFS_FHSIZE
];
2044 struct knfsd_fh cr32_getfs
;
2047 static int compat_nfs_svc_trans(struct nfsctl_arg
*karg
,
2048 struct compat_nfsctl_arg __user
*arg
)
2050 if (!access_ok(VERIFY_READ
, &arg
->ca32_svc
, sizeof(arg
->ca32_svc
)) ||
2051 get_user(karg
->ca_version
, &arg
->ca32_version
) ||
2052 __get_user(karg
->ca_svc
.svc_port
, &arg
->ca32_svc
.svc32_port
) ||
2053 __get_user(karg
->ca_svc
.svc_nthreads
,
2054 &arg
->ca32_svc
.svc32_nthreads
))
2059 static int compat_nfs_clnt_trans(struct nfsctl_arg
*karg
,
2060 struct compat_nfsctl_arg __user
*arg
)
2062 if (!access_ok(VERIFY_READ
, &arg
->ca32_client
,
2063 sizeof(arg
->ca32_client
)) ||
2064 get_user(karg
->ca_version
, &arg
->ca32_version
) ||
2065 __copy_from_user(&karg
->ca_client
.cl_ident
[0],
2066 &arg
->ca32_client
.cl32_ident
[0],
2068 __get_user(karg
->ca_client
.cl_naddr
,
2069 &arg
->ca32_client
.cl32_naddr
) ||
2070 __copy_from_user(&karg
->ca_client
.cl_addrlist
[0],
2071 &arg
->ca32_client
.cl32_addrlist
[0],
2072 (sizeof(struct in_addr
) * NFSCLNT_ADDRMAX
)) ||
2073 __get_user(karg
->ca_client
.cl_fhkeytype
,
2074 &arg
->ca32_client
.cl32_fhkeytype
) ||
2075 __get_user(karg
->ca_client
.cl_fhkeylen
,
2076 &arg
->ca32_client
.cl32_fhkeylen
) ||
2077 __copy_from_user(&karg
->ca_client
.cl_fhkey
[0],
2078 &arg
->ca32_client
.cl32_fhkey
[0],
2085 static int compat_nfs_exp_trans(struct nfsctl_arg
*karg
,
2086 struct compat_nfsctl_arg __user
*arg
)
2088 if (!access_ok(VERIFY_READ
, &arg
->ca32_export
,
2089 sizeof(arg
->ca32_export
)) ||
2090 get_user(karg
->ca_version
, &arg
->ca32_version
) ||
2091 __copy_from_user(&karg
->ca_export
.ex_client
[0],
2092 &arg
->ca32_export
.ex32_client
[0],
2094 __copy_from_user(&karg
->ca_export
.ex_path
[0],
2095 &arg
->ca32_export
.ex32_path
[0],
2097 __get_user(karg
->ca_export
.ex_dev
,
2098 &arg
->ca32_export
.ex32_dev
) ||
2099 __get_user(karg
->ca_export
.ex_ino
,
2100 &arg
->ca32_export
.ex32_ino
) ||
2101 __get_user(karg
->ca_export
.ex_flags
,
2102 &arg
->ca32_export
.ex32_flags
) ||
2103 __get_user(karg
->ca_export
.ex_anon_uid
,
2104 &arg
->ca32_export
.ex32_anon_uid
) ||
2105 __get_user(karg
->ca_export
.ex_anon_gid
,
2106 &arg
->ca32_export
.ex32_anon_gid
))
2108 SET_UID(karg
->ca_export
.ex_anon_uid
, karg
->ca_export
.ex_anon_uid
);
2109 SET_GID(karg
->ca_export
.ex_anon_gid
, karg
->ca_export
.ex_anon_gid
);
2114 static int compat_nfs_getfd_trans(struct nfsctl_arg
*karg
,
2115 struct compat_nfsctl_arg __user
*arg
)
2117 if (!access_ok(VERIFY_READ
, &arg
->ca32_getfd
,
2118 sizeof(arg
->ca32_getfd
)) ||
2119 get_user(karg
->ca_version
, &arg
->ca32_version
) ||
2120 __copy_from_user(&karg
->ca_getfd
.gd_addr
,
2121 &arg
->ca32_getfd
.gd32_addr
,
2122 (sizeof(struct sockaddr
))) ||
2123 __copy_from_user(&karg
->ca_getfd
.gd_path
,
2124 &arg
->ca32_getfd
.gd32_path
,
2125 (NFS_MAXPATHLEN
+1)) ||
2126 __get_user(karg
->ca_getfd
.gd_version
,
2127 &arg
->ca32_getfd
.gd32_version
))
2133 static int compat_nfs_getfs_trans(struct nfsctl_arg
*karg
,
2134 struct compat_nfsctl_arg __user
*arg
)
2136 if (!access_ok(VERIFY_READ
,&arg
->ca32_getfs
,sizeof(arg
->ca32_getfs
)) ||
2137 get_user(karg
->ca_version
, &arg
->ca32_version
) ||
2138 __copy_from_user(&karg
->ca_getfs
.gd_addr
,
2139 &arg
->ca32_getfs
.gd32_addr
,
2140 (sizeof(struct sockaddr
))) ||
2141 __copy_from_user(&karg
->ca_getfs
.gd_path
,
2142 &arg
->ca32_getfs
.gd32_path
,
2143 (NFS_MAXPATHLEN
+1)) ||
2144 __get_user(karg
->ca_getfs
.gd_maxlen
,
2145 &arg
->ca32_getfs
.gd32_maxlen
))
2151 /* This really doesn't need translations, we are only passing
2152 * back a union which contains opaque nfs file handle data.
2154 static int compat_nfs_getfh_res_trans(union nfsctl_res
*kres
,
2155 union compat_nfsctl_res __user
*res
)
2159 err
= copy_to_user(res
, kres
, sizeof(*res
));
2161 return (err
) ? -EFAULT
: 0;
2164 asmlinkage
long compat_sys_nfsservctl(int cmd
,
2165 struct compat_nfsctl_arg __user
*arg
,
2166 union compat_nfsctl_res __user
*res
)
2168 struct nfsctl_arg
*karg
;
2169 union nfsctl_res
*kres
;
2173 karg
= kmalloc(sizeof(*karg
), GFP_USER
);
2174 kres
= kmalloc(sizeof(*kres
), GFP_USER
);
2175 if(!karg
|| !kres
) {
2182 err
= compat_nfs_svc_trans(karg
, arg
);
2185 case NFSCTL_ADDCLIENT
:
2186 err
= compat_nfs_clnt_trans(karg
, arg
);
2189 case NFSCTL_DELCLIENT
:
2190 err
= compat_nfs_clnt_trans(karg
, arg
);
2194 case NFSCTL_UNEXPORT
:
2195 err
= compat_nfs_exp_trans(karg
, arg
);
2199 err
= compat_nfs_getfd_trans(karg
, arg
);
2203 err
= compat_nfs_getfs_trans(karg
, arg
);
2216 /* The __user pointer casts are valid because of the set_fs() */
2217 err
= sys_nfsservctl(cmd
, (void __user
*) karg
, (void __user
*) kres
);
2223 if((cmd
== NFSCTL_GETFD
) ||
2224 (cmd
== NFSCTL_GETFS
))
2225 err
= compat_nfs_getfh_res_trans(kres
, res
);
2233 long asmlinkage
compat_sys_nfsservctl(int cmd
, void *notused
, void *notused2
)
2235 return sys_ni_syscall();