2 * arch/arm/kernel/sys_oabi-compat.c
4 * Compatibility wrappers for syscalls that are used from
5 * old ABI user space binaries with an EABI kernel.
7 * Author: Nicolas Pitre
9 * Copyright: MontaVista Software, Inc.
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License version 2 as
13 * published by the Free Software Foundation.
17 * The legacy ABI and the new ARM EABI have different rules making some
18 * syscalls incompatible especially with structure arguments.
19 * Most notably, Eabi says 64-bit members should be 64-bit aligned instead of
20 * simply word aligned. EABI also pads structures to the size of the largest
21 * member it contains instead of the invariant 32-bit.
23 * The following syscalls are affected:
30 * struct stat64 has different sizes and some members are shifted
31 * Compatibility wrappers are needed for them and provided below.
35 * struct flock64 has different sizes and some members are shifted
36 * A compatibility wrapper is needed and provided below.
41 * struct statfs64 has extra padding with EABI growing its size from
42 * 84 to 88. This struct is now __attribute__((packed,aligned(4)))
43 * with a small assembly wrapper to force the sz argument to 84 if it is 88
44 * to avoid copying the extra padding over user space unexpecting it.
48 * struct new_utsname has no padding with EABI. No problem there.
53 * struct epoll_event has its second member shifted also affecting the
54 * structure size. Compatibility wrappers are needed and provided below.
60 * struct sembuf loses its padding with EABI. Since arrays of them are
61 * used they have to be copyed to remove the padding. Compatibility wrappers
70 * struct sockaddr_un loses its padding with EABI. Since the size of the
71 * structure is used as a validation test in unix_mkname(), we need to
72 * change the length argument to 110 whenever it is 112. Compatibility
73 * wrappers provided below.
76 #include <linux/syscalls.h>
77 #include <linux/errno.h>
79 #include <linux/fcntl.h>
80 #include <linux/eventpoll.h>
81 #include <linux/sem.h>
82 #include <linux/socket.h>
83 #include <linux/net.h>
84 #include <linux/ipc.h>
85 #include <asm/uaccess.h>
87 struct oldabi_stat64
{
88 unsigned long long st_dev
;
90 unsigned long __st_ino
;
92 unsigned int st_nlink
;
97 unsigned long long st_rdev
;
101 unsigned long st_blksize
;
102 unsigned long long st_blocks
;
104 unsigned long st_atime
;
105 unsigned long st_atime_nsec
;
107 unsigned long st_mtime
;
108 unsigned long st_mtime_nsec
;
110 unsigned long st_ctime
;
111 unsigned long st_ctime_nsec
;
113 unsigned long long st_ino
;
114 } __attribute__ ((packed
,aligned(4)));
116 static long cp_oldabi_stat64(struct kstat
*stat
,
117 struct oldabi_stat64 __user
*statbuf
)
119 struct oldabi_stat64 tmp
;
121 tmp
.st_dev
= huge_encode_dev(stat
->dev
);
123 tmp
.__st_ino
= stat
->ino
;
124 tmp
.st_mode
= stat
->mode
;
125 tmp
.st_nlink
= stat
->nlink
;
126 tmp
.st_uid
= stat
->uid
;
127 tmp
.st_gid
= stat
->gid
;
128 tmp
.st_rdev
= huge_encode_dev(stat
->rdev
);
129 tmp
.st_size
= stat
->size
;
130 tmp
.st_blocks
= stat
->blocks
;
132 tmp
.st_blksize
= stat
->blksize
;
133 tmp
.st_atime
= stat
->atime
.tv_sec
;
134 tmp
.st_atime_nsec
= stat
->atime
.tv_nsec
;
135 tmp
.st_mtime
= stat
->mtime
.tv_sec
;
136 tmp
.st_mtime_nsec
= stat
->mtime
.tv_nsec
;
137 tmp
.st_ctime
= stat
->ctime
.tv_sec
;
138 tmp
.st_ctime_nsec
= stat
->ctime
.tv_nsec
;
139 tmp
.st_ino
= stat
->ino
;
140 return copy_to_user(statbuf
,&tmp
,sizeof(tmp
)) ? -EFAULT
: 0;
143 asmlinkage
long sys_oabi_stat64(char __user
* filename
,
144 struct oldabi_stat64 __user
* statbuf
)
147 int error
= vfs_stat(filename
, &stat
);
149 error
= cp_oldabi_stat64(&stat
, statbuf
);
153 asmlinkage
long sys_oabi_lstat64(char __user
* filename
,
154 struct oldabi_stat64 __user
* statbuf
)
157 int error
= vfs_lstat(filename
, &stat
);
159 error
= cp_oldabi_stat64(&stat
, statbuf
);
163 asmlinkage
long sys_oabi_fstat64(unsigned long fd
,
164 struct oldabi_stat64 __user
* statbuf
)
167 int error
= vfs_fstat(fd
, &stat
);
169 error
= cp_oldabi_stat64(&stat
, statbuf
);
173 asmlinkage
long sys_oabi_fstatat64(int dfd
,
174 char __user
*filename
,
175 struct oldabi_stat64 __user
*statbuf
,
181 if ((flag
& ~AT_SYMLINK_NOFOLLOW
) != 0)
184 if (flag
& AT_SYMLINK_NOFOLLOW
)
185 error
= vfs_lstat_fd(dfd
, filename
, &stat
);
187 error
= vfs_stat_fd(dfd
, filename
, &stat
);
190 error
= cp_oldabi_stat64(&stat
, statbuf
);
196 struct oabi_flock64
{
202 } __attribute__ ((packed
,aligned(4)));
204 asmlinkage
long sys_oabi_fcntl64(unsigned int fd
, unsigned int cmd
,
207 struct oabi_flock64 user
;
208 struct flock64 kernel
;
209 mm_segment_t fs
= USER_DS
; /* initialized to kill a warning */
210 unsigned long local_arg
= arg
;
217 if (copy_from_user(&user
, (struct oabi_flock64 __user
*)arg
,
220 kernel
.l_type
= user
.l_type
;
221 kernel
.l_whence
= user
.l_whence
;
222 kernel
.l_start
= user
.l_start
;
223 kernel
.l_len
= user
.l_len
;
224 kernel
.l_pid
= user
.l_pid
;
225 local_arg
= (unsigned long)&kernel
;
230 ret
= sys_fcntl64(fd
, cmd
, local_arg
);
235 user
.l_type
= kernel
.l_type
;
236 user
.l_whence
= kernel
.l_whence
;
237 user
.l_start
= kernel
.l_start
;
238 user
.l_len
= kernel
.l_len
;
239 user
.l_pid
= kernel
.l_pid
;
240 if (copy_to_user((struct oabi_flock64 __user
*)arg
,
241 &user
, sizeof(user
)))
252 struct oabi_epoll_event
{
255 } __attribute__ ((packed
,aligned(4)));
257 asmlinkage
long sys_oabi_epoll_ctl(int epfd
, int op
, int fd
,
258 struct oabi_epoll_event __user
*event
)
260 struct oabi_epoll_event user
;
261 struct epoll_event kernel
;
265 if (op
== EPOLL_CTL_DEL
)
266 return sys_epoll_ctl(epfd
, op
, fd
, NULL
);
267 if (copy_from_user(&user
, event
, sizeof(user
)))
269 kernel
.events
= user
.events
;
270 kernel
.data
= user
.data
;
273 ret
= sys_epoll_ctl(epfd
, op
, fd
, &kernel
);
278 asmlinkage
long sys_oabi_epoll_wait(int epfd
,
279 struct oabi_epoll_event __user
*events
,
280 int maxevents
, int timeout
)
282 struct epoll_event
*kbuf
;
286 if (maxevents
<= 0 || maxevents
> (INT_MAX
/sizeof(struct epoll_event
)))
288 kbuf
= kmalloc(sizeof(*kbuf
) * maxevents
, GFP_KERNEL
);
293 ret
= sys_epoll_wait(epfd
, kbuf
, maxevents
, timeout
);
296 for (i
= 0; i
< ret
; i
++) {
297 __put_user_error(kbuf
[i
].events
, &events
->events
, err
);
298 __put_user_error(kbuf
[i
].data
, &events
->data
, err
);
302 return err
? -EFAULT
: ret
;
306 unsigned short sem_num
;
309 unsigned short __pad
;
312 asmlinkage
long sys_oabi_semtimedop(int semid
,
313 struct oabi_sembuf __user
*tsops
,
315 const struct timespec __user
*timeout
)
318 struct timespec local_timeout
;
324 sops
= kmalloc(sizeof(*sops
) * nsops
, GFP_KERNEL
);
328 for (i
= 0; i
< nsops
; i
++) {
329 __get_user_error(sops
[i
].sem_num
, &tsops
->sem_num
, err
);
330 __get_user_error(sops
[i
].sem_op
, &tsops
->sem_op
, err
);
331 __get_user_error(sops
[i
].sem_flg
, &tsops
->sem_flg
, err
);
335 /* copy this as well before changing domain protection */
336 err
|= copy_from_user(&local_timeout
, timeout
, sizeof(*timeout
));
337 timeout
= &local_timeout
;
342 mm_segment_t fs
= get_fs();
344 err
= sys_semtimedop(semid
, sops
, nsops
, timeout
);
351 asmlinkage
long sys_oabi_semop(int semid
, struct oabi_sembuf __user
*tsops
,
354 return sys_oabi_semtimedop(semid
, tsops
, nsops
, NULL
);
357 extern asmlinkage
int sys_ipc(uint call
, int first
, int second
, int third
,
358 void __user
*ptr
, long fifth
);
360 asmlinkage
int sys_oabi_ipc(uint call
, int first
, int second
, int third
,
361 void __user
*ptr
, long fifth
)
363 switch (call
& 0xffff) {
365 return sys_oabi_semtimedop(first
,
366 (struct oabi_sembuf __user
*)ptr
,
369 return sys_oabi_semtimedop(first
,
370 (struct oabi_sembuf __user
*)ptr
,
372 (const struct timespec __user
*)fifth
);
374 return sys_ipc(call
, first
, second
, third
, ptr
, fifth
);
378 asmlinkage
long sys_oabi_bind(int fd
, struct sockaddr __user
*addr
, int addrlen
)
380 sa_family_t sa_family
;
381 if (addrlen
== 112 &&
382 get_user(sa_family
, &addr
->sa_family
) == 0 &&
383 sa_family
== AF_UNIX
)
385 return sys_bind(fd
, addr
, addrlen
);
388 asmlinkage
long sys_oabi_connect(int fd
, struct sockaddr __user
*addr
, int addrlen
)
390 sa_family_t sa_family
;
391 if (addrlen
== 112 &&
392 get_user(sa_family
, &addr
->sa_family
) == 0 &&
393 sa_family
== AF_UNIX
)
395 return sys_connect(fd
, addr
, addrlen
);
398 asmlinkage
long sys_oabi_sendto(int fd
, void __user
*buff
,
399 size_t len
, unsigned flags
,
400 struct sockaddr __user
*addr
,
403 sa_family_t sa_family
;
404 if (addrlen
== 112 &&
405 get_user(sa_family
, &addr
->sa_family
) == 0 &&
406 sa_family
== AF_UNIX
)
408 return sys_sendto(fd
, buff
, len
, flags
, addr
, addrlen
);
411 asmlinkage
long sys_oabi_sendmsg(int fd
, struct msghdr __user
*msg
, unsigned flags
)
413 struct sockaddr __user
*addr
;
415 sa_family_t sa_family
;
417 get_user(msg_namelen
, &msg
->msg_namelen
) == 0 &&
418 msg_namelen
== 112 &&
419 get_user(addr
, &msg
->msg_name
) == 0 &&
420 get_user(sa_family
, &addr
->sa_family
) == 0 &&
421 sa_family
== AF_UNIX
)
424 * HACK ALERT: there is a limit to how much backward bending
425 * we should do for what is actually a transitional
426 * compatibility layer. This already has known flaws with
427 * a few ioctls that we don't intend to fix. Therefore
428 * consider this blatent hack as another one... and take care
429 * to run for cover. In most cases it will "just work fine".
430 * If it doesn't, well, tough.
432 put_user(110, &msg
->msg_namelen
);
434 return sys_sendmsg(fd
, msg
, flags
);
437 asmlinkage
long sys_oabi_socketcall(int call
, unsigned long __user
*args
)
439 unsigned long r
= -EFAULT
, a
[6];
443 if (copy_from_user(a
, args
, 3 * sizeof(long)) == 0)
444 r
= sys_oabi_bind(a
[0], (struct sockaddr __user
*)a
[1], a
[2]);
447 if (copy_from_user(a
, args
, 3 * sizeof(long)) == 0)
448 r
= sys_oabi_connect(a
[0], (struct sockaddr __user
*)a
[1], a
[2]);
451 if (copy_from_user(a
, args
, 6 * sizeof(long)) == 0)
452 r
= sys_oabi_sendto(a
[0], (void __user
*)a
[1], a
[2], a
[3],
453 (struct sockaddr __user
*)a
[4], a
[5]);
456 if (copy_from_user(a
, args
, 3 * sizeof(long)) == 0)
457 r
= sys_oabi_sendmsg(a
[0], (struct msghdr __user
*)a
[1], a
[2]);
460 r
= sys_socketcall(call
, args
);