]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blob - fs/compat.c
ocfs2: remove unused variable uuid_net_key in ocfs2_initialize_super
[mirror_ubuntu-jammy-kernel.git] / fs / compat.c
1 /*
2 * linux/fs/compat.c
3 *
4 * Kernel compatibililty routines for e.g. 32 bit syscall support
5 * on 64 bit kernels.
6 *
7 * Copyright (C) 2002 Stephen Rothwell, IBM Corporation
8 * Copyright (C) 1997-2000 Jakub Jelinek (jakub@redhat.com)
9 * Copyright (C) 1998 Eddie C. Dost (ecd@skynet.be)
10 * Copyright (C) 2001,2002 Andi Kleen, SuSE Labs
11 * Copyright (C) 2003 Pavel Machek (pavel@ucw.cz)
12 *
13 * This program is free software; you can redistribute it and/or modify
14 * it under the terms of the GNU General Public License version 2 as
15 * published by the Free Software Foundation.
16 */
17
18 #include <linux/stddef.h>
19 #include <linux/kernel.h>
20 #include <linux/linkage.h>
21 #include <linux/compat.h>
22 #include <linux/errno.h>
23 #include <linux/time.h>
24 #include <linux/fs.h>
25 #include <linux/fcntl.h>
26 #include <linux/namei.h>
27 #include <linux/file.h>
28 #include <linux/fdtable.h>
29 #include <linux/vfs.h>
30 #include <linux/ioctl.h>
31 #include <linux/init.h>
32 #include <linux/ncp_mount.h>
33 #include <linux/nfs4_mount.h>
34 #include <linux/syscalls.h>
35 #include <linux/ctype.h>
36 #include <linux/dirent.h>
37 #include <linux/fsnotify.h>
38 #include <linux/highuid.h>
39 #include <linux/personality.h>
40 #include <linux/rwsem.h>
41 #include <linux/tsacct_kern.h>
42 #include <linux/security.h>
43 #include <linux/highmem.h>
44 #include <linux/signal.h>
45 #include <linux/poll.h>
46 #include <linux/mm.h>
47 #include <linux/fs_struct.h>
48 #include <linux/slab.h>
49 #include <linux/pagemap.h>
50 #include <linux/aio.h>
51
52 #include <asm/uaccess.h>
53 #include <asm/mmu_context.h>
54 #include <asm/ioctls.h>
55 #include "internal.h"
56
57 int compat_log = 1;
58
59 int compat_printk(const char *fmt, ...)
60 {
61 va_list ap;
62 int ret;
63 if (!compat_log)
64 return 0;
65 va_start(ap, fmt);
66 ret = vprintk(fmt, ap);
67 va_end(ap);
68 return ret;
69 }
70
71 /*
72 * Not all architectures have sys_utime, so implement this in terms
73 * of sys_utimes.
74 */
75 COMPAT_SYSCALL_DEFINE2(utime, const char __user *, filename,
76 struct compat_utimbuf __user *, t)
77 {
78 struct timespec tv[2];
79
80 if (t) {
81 if (get_user(tv[0].tv_sec, &t->actime) ||
82 get_user(tv[1].tv_sec, &t->modtime))
83 return -EFAULT;
84 tv[0].tv_nsec = 0;
85 tv[1].tv_nsec = 0;
86 }
87 return do_utimes(AT_FDCWD, filename, t ? tv : NULL, 0);
88 }
89
90 COMPAT_SYSCALL_DEFINE4(utimensat, unsigned int, dfd, const char __user *, filename, struct compat_timespec __user *, t, int, flags)
91 {
92 struct timespec tv[2];
93
94 if (t) {
95 if (compat_get_timespec(&tv[0], &t[0]) ||
96 compat_get_timespec(&tv[1], &t[1]))
97 return -EFAULT;
98
99 if (tv[0].tv_nsec == UTIME_OMIT && tv[1].tv_nsec == UTIME_OMIT)
100 return 0;
101 }
102 return do_utimes(dfd, filename, t ? tv : NULL, flags);
103 }
104
105 COMPAT_SYSCALL_DEFINE3(futimesat, unsigned int, dfd, const char __user *, filename, struct compat_timeval __user *, t)
106 {
107 struct timespec tv[2];
108
109 if (t) {
110 if (get_user(tv[0].tv_sec, &t[0].tv_sec) ||
111 get_user(tv[0].tv_nsec, &t[0].tv_usec) ||
112 get_user(tv[1].tv_sec, &t[1].tv_sec) ||
113 get_user(tv[1].tv_nsec, &t[1].tv_usec))
114 return -EFAULT;
115 if (tv[0].tv_nsec >= 1000000 || tv[0].tv_nsec < 0 ||
116 tv[1].tv_nsec >= 1000000 || tv[1].tv_nsec < 0)
117 return -EINVAL;
118 tv[0].tv_nsec *= 1000;
119 tv[1].tv_nsec *= 1000;
120 }
121 return do_utimes(dfd, filename, t ? tv : NULL, 0);
122 }
123
124 COMPAT_SYSCALL_DEFINE2(utimes, const char __user *, filename, struct compat_timeval __user *, t)
125 {
126 return compat_sys_futimesat(AT_FDCWD, filename, t);
127 }
128
129 static int cp_compat_stat(struct kstat *stat, struct compat_stat __user *ubuf)
130 {
131 struct compat_stat tmp;
132
133 if (!old_valid_dev(stat->dev) || !old_valid_dev(stat->rdev))
134 return -EOVERFLOW;
135
136 memset(&tmp, 0, sizeof(tmp));
137 tmp.st_dev = old_encode_dev(stat->dev);
138 tmp.st_ino = stat->ino;
139 if (sizeof(tmp.st_ino) < sizeof(stat->ino) && tmp.st_ino != stat->ino)
140 return -EOVERFLOW;
141 tmp.st_mode = stat->mode;
142 tmp.st_nlink = stat->nlink;
143 if (tmp.st_nlink != stat->nlink)
144 return -EOVERFLOW;
145 SET_UID(tmp.st_uid, from_kuid_munged(current_user_ns(), stat->uid));
146 SET_GID(tmp.st_gid, from_kgid_munged(current_user_ns(), stat->gid));
147 tmp.st_rdev = old_encode_dev(stat->rdev);
148 if ((u64) stat->size > MAX_NON_LFS)
149 return -EOVERFLOW;
150 tmp.st_size = stat->size;
151 tmp.st_atime = stat->atime.tv_sec;
152 tmp.st_atime_nsec = stat->atime.tv_nsec;
153 tmp.st_mtime = stat->mtime.tv_sec;
154 tmp.st_mtime_nsec = stat->mtime.tv_nsec;
155 tmp.st_ctime = stat->ctime.tv_sec;
156 tmp.st_ctime_nsec = stat->ctime.tv_nsec;
157 tmp.st_blocks = stat->blocks;
158 tmp.st_blksize = stat->blksize;
159 return copy_to_user(ubuf, &tmp, sizeof(tmp)) ? -EFAULT : 0;
160 }
161
162 COMPAT_SYSCALL_DEFINE2(newstat, const char __user *, filename,
163 struct compat_stat __user *, statbuf)
164 {
165 struct kstat stat;
166 int error;
167
168 error = vfs_stat(filename, &stat);
169 if (error)
170 return error;
171 return cp_compat_stat(&stat, statbuf);
172 }
173
174 COMPAT_SYSCALL_DEFINE2(newlstat, const char __user *, filename,
175 struct compat_stat __user *, statbuf)
176 {
177 struct kstat stat;
178 int error;
179
180 error = vfs_lstat(filename, &stat);
181 if (error)
182 return error;
183 return cp_compat_stat(&stat, statbuf);
184 }
185
186 #ifndef __ARCH_WANT_STAT64
187 COMPAT_SYSCALL_DEFINE4(newfstatat, unsigned int, dfd,
188 const char __user *, filename,
189 struct compat_stat __user *, statbuf, int, flag)
190 {
191 struct kstat stat;
192 int error;
193
194 error = vfs_fstatat(dfd, filename, &stat, flag);
195 if (error)
196 return error;
197 return cp_compat_stat(&stat, statbuf);
198 }
199 #endif
200
201 COMPAT_SYSCALL_DEFINE2(newfstat, unsigned int, fd,
202 struct compat_stat __user *, statbuf)
203 {
204 struct kstat stat;
205 int error = vfs_fstat(fd, &stat);
206
207 if (!error)
208 error = cp_compat_stat(&stat, statbuf);
209 return error;
210 }
211
212 static int put_compat_statfs(struct compat_statfs __user *ubuf, struct kstatfs *kbuf)
213 {
214
215 if (sizeof ubuf->f_blocks == 4) {
216 if ((kbuf->f_blocks | kbuf->f_bfree | kbuf->f_bavail |
217 kbuf->f_bsize | kbuf->f_frsize) & 0xffffffff00000000ULL)
218 return -EOVERFLOW;
219 /* f_files and f_ffree may be -1; it's okay
220 * to stuff that into 32 bits */
221 if (kbuf->f_files != 0xffffffffffffffffULL
222 && (kbuf->f_files & 0xffffffff00000000ULL))
223 return -EOVERFLOW;
224 if (kbuf->f_ffree != 0xffffffffffffffffULL
225 && (kbuf->f_ffree & 0xffffffff00000000ULL))
226 return -EOVERFLOW;
227 }
228 if (!access_ok(VERIFY_WRITE, ubuf, sizeof(*ubuf)) ||
229 __put_user(kbuf->f_type, &ubuf->f_type) ||
230 __put_user(kbuf->f_bsize, &ubuf->f_bsize) ||
231 __put_user(kbuf->f_blocks, &ubuf->f_blocks) ||
232 __put_user(kbuf->f_bfree, &ubuf->f_bfree) ||
233 __put_user(kbuf->f_bavail, &ubuf->f_bavail) ||
234 __put_user(kbuf->f_files, &ubuf->f_files) ||
235 __put_user(kbuf->f_ffree, &ubuf->f_ffree) ||
236 __put_user(kbuf->f_namelen, &ubuf->f_namelen) ||
237 __put_user(kbuf->f_fsid.val[0], &ubuf->f_fsid.val[0]) ||
238 __put_user(kbuf->f_fsid.val[1], &ubuf->f_fsid.val[1]) ||
239 __put_user(kbuf->f_frsize, &ubuf->f_frsize) ||
240 __put_user(kbuf->f_flags, &ubuf->f_flags) ||
241 __clear_user(ubuf->f_spare, sizeof(ubuf->f_spare)))
242 return -EFAULT;
243 return 0;
244 }
245
246 /*
247 * The following statfs calls are copies of code from fs/statfs.c and
248 * should be checked against those from time to time
249 */
250 COMPAT_SYSCALL_DEFINE2(statfs, const char __user *, pathname, struct compat_statfs __user *, buf)
251 {
252 struct kstatfs tmp;
253 int error = user_statfs(pathname, &tmp);
254 if (!error)
255 error = put_compat_statfs(buf, &tmp);
256 return error;
257 }
258
259 COMPAT_SYSCALL_DEFINE2(fstatfs, unsigned int, fd, struct compat_statfs __user *, buf)
260 {
261 struct kstatfs tmp;
262 int error = fd_statfs(fd, &tmp);
263 if (!error)
264 error = put_compat_statfs(buf, &tmp);
265 return error;
266 }
267
268 static int put_compat_statfs64(struct compat_statfs64 __user *ubuf, struct kstatfs *kbuf)
269 {
270 if (sizeof ubuf->f_blocks == 4) {
271 if ((kbuf->f_blocks | kbuf->f_bfree | kbuf->f_bavail |
272 kbuf->f_bsize | kbuf->f_frsize) & 0xffffffff00000000ULL)
273 return -EOVERFLOW;
274 /* f_files and f_ffree may be -1; it's okay
275 * to stuff that into 32 bits */
276 if (kbuf->f_files != 0xffffffffffffffffULL
277 && (kbuf->f_files & 0xffffffff00000000ULL))
278 return -EOVERFLOW;
279 if (kbuf->f_ffree != 0xffffffffffffffffULL
280 && (kbuf->f_ffree & 0xffffffff00000000ULL))
281 return -EOVERFLOW;
282 }
283 if (!access_ok(VERIFY_WRITE, ubuf, sizeof(*ubuf)) ||
284 __put_user(kbuf->f_type, &ubuf->f_type) ||
285 __put_user(kbuf->f_bsize, &ubuf->f_bsize) ||
286 __put_user(kbuf->f_blocks, &ubuf->f_blocks) ||
287 __put_user(kbuf->f_bfree, &ubuf->f_bfree) ||
288 __put_user(kbuf->f_bavail, &ubuf->f_bavail) ||
289 __put_user(kbuf->f_files, &ubuf->f_files) ||
290 __put_user(kbuf->f_ffree, &ubuf->f_ffree) ||
291 __put_user(kbuf->f_namelen, &ubuf->f_namelen) ||
292 __put_user(kbuf->f_fsid.val[0], &ubuf->f_fsid.val[0]) ||
293 __put_user(kbuf->f_fsid.val[1], &ubuf->f_fsid.val[1]) ||
294 __put_user(kbuf->f_frsize, &ubuf->f_frsize) ||
295 __put_user(kbuf->f_flags, &ubuf->f_flags) ||
296 __clear_user(ubuf->f_spare, sizeof(ubuf->f_spare)))
297 return -EFAULT;
298 return 0;
299 }
300
301 COMPAT_SYSCALL_DEFINE3(statfs64, const char __user *, pathname, compat_size_t, sz, struct compat_statfs64 __user *, buf)
302 {
303 struct kstatfs tmp;
304 int error;
305
306 if (sz != sizeof(*buf))
307 return -EINVAL;
308
309 error = user_statfs(pathname, &tmp);
310 if (!error)
311 error = put_compat_statfs64(buf, &tmp);
312 return error;
313 }
314
315 COMPAT_SYSCALL_DEFINE3(fstatfs64, unsigned int, fd, compat_size_t, sz, struct compat_statfs64 __user *, buf)
316 {
317 struct kstatfs tmp;
318 int error;
319
320 if (sz != sizeof(*buf))
321 return -EINVAL;
322
323 error = fd_statfs(fd, &tmp);
324 if (!error)
325 error = put_compat_statfs64(buf, &tmp);
326 return error;
327 }
328
329 /*
330 * This is a copy of sys_ustat, just dealing with a structure layout.
331 * Given how simple this syscall is that apporach is more maintainable
332 * than the various conversion hacks.
333 */
334 COMPAT_SYSCALL_DEFINE2(ustat, unsigned, dev, struct compat_ustat __user *, u)
335 {
336 struct compat_ustat tmp;
337 struct kstatfs sbuf;
338 int err = vfs_ustat(new_decode_dev(dev), &sbuf);
339 if (err)
340 return err;
341
342 memset(&tmp, 0, sizeof(struct compat_ustat));
343 tmp.f_tfree = sbuf.f_bfree;
344 tmp.f_tinode = sbuf.f_ffree;
345 if (copy_to_user(u, &tmp, sizeof(struct compat_ustat)))
346 return -EFAULT;
347 return 0;
348 }
349
350 static int get_compat_flock(struct flock *kfl, struct compat_flock __user *ufl)
351 {
352 if (!access_ok(VERIFY_READ, ufl, sizeof(*ufl)) ||
353 __get_user(kfl->l_type, &ufl->l_type) ||
354 __get_user(kfl->l_whence, &ufl->l_whence) ||
355 __get_user(kfl->l_start, &ufl->l_start) ||
356 __get_user(kfl->l_len, &ufl->l_len) ||
357 __get_user(kfl->l_pid, &ufl->l_pid))
358 return -EFAULT;
359 return 0;
360 }
361
362 static int put_compat_flock(struct flock *kfl, struct compat_flock __user *ufl)
363 {
364 if (!access_ok(VERIFY_WRITE, ufl, sizeof(*ufl)) ||
365 __put_user(kfl->l_type, &ufl->l_type) ||
366 __put_user(kfl->l_whence, &ufl->l_whence) ||
367 __put_user(kfl->l_start, &ufl->l_start) ||
368 __put_user(kfl->l_len, &ufl->l_len) ||
369 __put_user(kfl->l_pid, &ufl->l_pid))
370 return -EFAULT;
371 return 0;
372 }
373
374 #ifndef HAVE_ARCH_GET_COMPAT_FLOCK64
375 static int get_compat_flock64(struct flock *kfl, struct compat_flock64 __user *ufl)
376 {
377 if (!access_ok(VERIFY_READ, ufl, sizeof(*ufl)) ||
378 __get_user(kfl->l_type, &ufl->l_type) ||
379 __get_user(kfl->l_whence, &ufl->l_whence) ||
380 __get_user(kfl->l_start, &ufl->l_start) ||
381 __get_user(kfl->l_len, &ufl->l_len) ||
382 __get_user(kfl->l_pid, &ufl->l_pid))
383 return -EFAULT;
384 return 0;
385 }
386 #endif
387
388 #ifndef HAVE_ARCH_PUT_COMPAT_FLOCK64
389 static int put_compat_flock64(struct flock *kfl, struct compat_flock64 __user *ufl)
390 {
391 if (!access_ok(VERIFY_WRITE, ufl, sizeof(*ufl)) ||
392 __put_user(kfl->l_type, &ufl->l_type) ||
393 __put_user(kfl->l_whence, &ufl->l_whence) ||
394 __put_user(kfl->l_start, &ufl->l_start) ||
395 __put_user(kfl->l_len, &ufl->l_len) ||
396 __put_user(kfl->l_pid, &ufl->l_pid))
397 return -EFAULT;
398 return 0;
399 }
400 #endif
401
402 COMPAT_SYSCALL_DEFINE3(fcntl64, unsigned int, fd, unsigned int, cmd,
403 compat_ulong_t, arg)
404 {
405 mm_segment_t old_fs;
406 struct flock f;
407 long ret;
408
409 switch (cmd) {
410 case F_GETLK:
411 case F_SETLK:
412 case F_SETLKW:
413 ret = get_compat_flock(&f, compat_ptr(arg));
414 if (ret != 0)
415 break;
416 old_fs = get_fs();
417 set_fs(KERNEL_DS);
418 ret = sys_fcntl(fd, cmd, (unsigned long)&f);
419 set_fs(old_fs);
420 if (cmd == F_GETLK && ret == 0) {
421 /* GETLK was successful and we need to return the data...
422 * but it needs to fit in the compat structure.
423 * l_start shouldn't be too big, unless the original
424 * start + end is greater than COMPAT_OFF_T_MAX, in which
425 * case the app was asking for trouble, so we return
426 * -EOVERFLOW in that case.
427 * l_len could be too big, in which case we just truncate it,
428 * and only allow the app to see that part of the conflicting
429 * lock that might make sense to it anyway
430 */
431
432 if (f.l_start > COMPAT_OFF_T_MAX)
433 ret = -EOVERFLOW;
434 if (f.l_len > COMPAT_OFF_T_MAX)
435 f.l_len = COMPAT_OFF_T_MAX;
436 if (ret == 0)
437 ret = put_compat_flock(&f, compat_ptr(arg));
438 }
439 break;
440
441 case F_GETLK64:
442 case F_SETLK64:
443 case F_SETLKW64:
444 ret = get_compat_flock64(&f, compat_ptr(arg));
445 if (ret != 0)
446 break;
447 old_fs = get_fs();
448 set_fs(KERNEL_DS);
449 ret = sys_fcntl(fd, (cmd == F_GETLK64) ? F_GETLK :
450 ((cmd == F_SETLK64) ? F_SETLK : F_SETLKW),
451 (unsigned long)&f);
452 set_fs(old_fs);
453 if (cmd == F_GETLK64 && ret == 0) {
454 /* need to return lock information - see above for commentary */
455 if (f.l_start > COMPAT_LOFF_T_MAX)
456 ret = -EOVERFLOW;
457 if (f.l_len > COMPAT_LOFF_T_MAX)
458 f.l_len = COMPAT_LOFF_T_MAX;
459 if (ret == 0)
460 ret = put_compat_flock64(&f, compat_ptr(arg));
461 }
462 break;
463
464 default:
465 ret = sys_fcntl(fd, cmd, arg);
466 break;
467 }
468 return ret;
469 }
470
471 COMPAT_SYSCALL_DEFINE3(fcntl, unsigned int, fd, unsigned int, cmd,
472 compat_ulong_t, arg)
473 {
474 if ((cmd == F_GETLK64) || (cmd == F_SETLK64) || (cmd == F_SETLKW64))
475 return -EINVAL;
476 return compat_sys_fcntl64(fd, cmd, arg);
477 }
478
479 COMPAT_SYSCALL_DEFINE2(io_setup, unsigned, nr_reqs, u32 __user *, ctx32p)
480 {
481 long ret;
482 aio_context_t ctx64;
483
484 mm_segment_t oldfs = get_fs();
485 if (unlikely(get_user(ctx64, ctx32p)))
486 return -EFAULT;
487
488 set_fs(KERNEL_DS);
489 /* The __user pointer cast is valid because of the set_fs() */
490 ret = sys_io_setup(nr_reqs, (aio_context_t __user *) &ctx64);
491 set_fs(oldfs);
492 /* truncating is ok because it's a user address */
493 if (!ret)
494 ret = put_user((u32) ctx64, ctx32p);
495 return ret;
496 }
497
498 COMPAT_SYSCALL_DEFINE5(io_getevents, compat_aio_context_t, ctx_id,
499 compat_long_t, min_nr,
500 compat_long_t, nr,
501 struct io_event __user *, events,
502 struct compat_timespec __user *, timeout)
503 {
504 struct timespec t;
505 struct timespec __user *ut = NULL;
506
507 if (timeout) {
508 if (compat_get_timespec(&t, timeout))
509 return -EFAULT;
510
511 ut = compat_alloc_user_space(sizeof(*ut));
512 if (copy_to_user(ut, &t, sizeof(t)) )
513 return -EFAULT;
514 }
515 return sys_io_getevents(ctx_id, min_nr, nr, events, ut);
516 }
517
518 /* A write operation does a read from user space and vice versa */
519 #define vrfy_dir(type) ((type) == READ ? VERIFY_WRITE : VERIFY_READ)
520
521 ssize_t compat_rw_copy_check_uvector(int type,
522 const struct compat_iovec __user *uvector, unsigned long nr_segs,
523 unsigned long fast_segs, struct iovec *fast_pointer,
524 struct iovec **ret_pointer)
525 {
526 compat_ssize_t tot_len;
527 struct iovec *iov = *ret_pointer = fast_pointer;
528 ssize_t ret = 0;
529 int seg;
530
531 /*
532 * SuS says "The readv() function *may* fail if the iovcnt argument
533 * was less than or equal to 0, or greater than {IOV_MAX}. Linux has
534 * traditionally returned zero for zero segments, so...
535 */
536 if (nr_segs == 0)
537 goto out;
538
539 ret = -EINVAL;
540 if (nr_segs > UIO_MAXIOV || nr_segs < 0)
541 goto out;
542 if (nr_segs > fast_segs) {
543 ret = -ENOMEM;
544 iov = kmalloc(nr_segs*sizeof(struct iovec), GFP_KERNEL);
545 if (iov == NULL)
546 goto out;
547 }
548 *ret_pointer = iov;
549
550 ret = -EFAULT;
551 if (!access_ok(VERIFY_READ, uvector, nr_segs*sizeof(*uvector)))
552 goto out;
553
554 /*
555 * Single unix specification:
556 * We should -EINVAL if an element length is not >= 0 and fitting an
557 * ssize_t.
558 *
559 * In Linux, the total length is limited to MAX_RW_COUNT, there is
560 * no overflow possibility.
561 */
562 tot_len = 0;
563 ret = -EINVAL;
564 for (seg = 0; seg < nr_segs; seg++) {
565 compat_uptr_t buf;
566 compat_ssize_t len;
567
568 if (__get_user(len, &uvector->iov_len) ||
569 __get_user(buf, &uvector->iov_base)) {
570 ret = -EFAULT;
571 goto out;
572 }
573 if (len < 0) /* size_t not fitting in compat_ssize_t .. */
574 goto out;
575 if (type >= 0 &&
576 !access_ok(vrfy_dir(type), compat_ptr(buf), len)) {
577 ret = -EFAULT;
578 goto out;
579 }
580 if (len > MAX_RW_COUNT - tot_len)
581 len = MAX_RW_COUNT - tot_len;
582 tot_len += len;
583 iov->iov_base = compat_ptr(buf);
584 iov->iov_len = (compat_size_t) len;
585 uvector++;
586 iov++;
587 }
588 ret = tot_len;
589
590 out:
591 return ret;
592 }
593
594 static inline long
595 copy_iocb(long nr, u32 __user *ptr32, struct iocb __user * __user *ptr64)
596 {
597 compat_uptr_t uptr;
598 int i;
599
600 for (i = 0; i < nr; ++i) {
601 if (get_user(uptr, ptr32 + i))
602 return -EFAULT;
603 if (put_user(compat_ptr(uptr), ptr64 + i))
604 return -EFAULT;
605 }
606 return 0;
607 }
608
609 #define MAX_AIO_SUBMITS (PAGE_SIZE/sizeof(struct iocb *))
610
611 COMPAT_SYSCALL_DEFINE3(io_submit, compat_aio_context_t, ctx_id,
612 int, nr, u32 __user *, iocb)
613 {
614 struct iocb __user * __user *iocb64;
615 long ret;
616
617 if (unlikely(nr < 0))
618 return -EINVAL;
619
620 if (nr > MAX_AIO_SUBMITS)
621 nr = MAX_AIO_SUBMITS;
622
623 iocb64 = compat_alloc_user_space(nr * sizeof(*iocb64));
624 ret = copy_iocb(nr, iocb, iocb64);
625 if (!ret)
626 ret = do_io_submit(ctx_id, nr, iocb64, 1);
627 return ret;
628 }
629
630 struct compat_ncp_mount_data {
631 compat_int_t version;
632 compat_uint_t ncp_fd;
633 __compat_uid_t mounted_uid;
634 compat_pid_t wdog_pid;
635 unsigned char mounted_vol[NCP_VOLNAME_LEN + 1];
636 compat_uint_t time_out;
637 compat_uint_t retry_count;
638 compat_uint_t flags;
639 __compat_uid_t uid;
640 __compat_gid_t gid;
641 compat_mode_t file_mode;
642 compat_mode_t dir_mode;
643 };
644
645 struct compat_ncp_mount_data_v4 {
646 compat_int_t version;
647 compat_ulong_t flags;
648 compat_ulong_t mounted_uid;
649 compat_long_t wdog_pid;
650 compat_uint_t ncp_fd;
651 compat_uint_t time_out;
652 compat_uint_t retry_count;
653 compat_ulong_t uid;
654 compat_ulong_t gid;
655 compat_ulong_t file_mode;
656 compat_ulong_t dir_mode;
657 };
658
659 static void *do_ncp_super_data_conv(void *raw_data)
660 {
661 int version = *(unsigned int *)raw_data;
662
663 if (version == 3) {
664 struct compat_ncp_mount_data *c_n = raw_data;
665 struct ncp_mount_data *n = raw_data;
666
667 n->dir_mode = c_n->dir_mode;
668 n->file_mode = c_n->file_mode;
669 n->gid = c_n->gid;
670 n->uid = c_n->uid;
671 memmove (n->mounted_vol, c_n->mounted_vol, (sizeof (c_n->mounted_vol) + 3 * sizeof (unsigned int)));
672 n->wdog_pid = c_n->wdog_pid;
673 n->mounted_uid = c_n->mounted_uid;
674 } else if (version == 4) {
675 struct compat_ncp_mount_data_v4 *c_n = raw_data;
676 struct ncp_mount_data_v4 *n = raw_data;
677
678 n->dir_mode = c_n->dir_mode;
679 n->file_mode = c_n->file_mode;
680 n->gid = c_n->gid;
681 n->uid = c_n->uid;
682 n->retry_count = c_n->retry_count;
683 n->time_out = c_n->time_out;
684 n->ncp_fd = c_n->ncp_fd;
685 n->wdog_pid = c_n->wdog_pid;
686 n->mounted_uid = c_n->mounted_uid;
687 n->flags = c_n->flags;
688 } else if (version != 5) {
689 return NULL;
690 }
691
692 return raw_data;
693 }
694
695
696 struct compat_nfs_string {
697 compat_uint_t len;
698 compat_uptr_t data;
699 };
700
701 static inline void compat_nfs_string(struct nfs_string *dst,
702 struct compat_nfs_string *src)
703 {
704 dst->data = compat_ptr(src->data);
705 dst->len = src->len;
706 }
707
708 struct compat_nfs4_mount_data_v1 {
709 compat_int_t version;
710 compat_int_t flags;
711 compat_int_t rsize;
712 compat_int_t wsize;
713 compat_int_t timeo;
714 compat_int_t retrans;
715 compat_int_t acregmin;
716 compat_int_t acregmax;
717 compat_int_t acdirmin;
718 compat_int_t acdirmax;
719 struct compat_nfs_string client_addr;
720 struct compat_nfs_string mnt_path;
721 struct compat_nfs_string hostname;
722 compat_uint_t host_addrlen;
723 compat_uptr_t host_addr;
724 compat_int_t proto;
725 compat_int_t auth_flavourlen;
726 compat_uptr_t auth_flavours;
727 };
728
729 static int do_nfs4_super_data_conv(void *raw_data)
730 {
731 int version = *(compat_uint_t *) raw_data;
732
733 if (version == 1) {
734 struct compat_nfs4_mount_data_v1 *raw = raw_data;
735 struct nfs4_mount_data *real = raw_data;
736
737 /* copy the fields backwards */
738 real->auth_flavours = compat_ptr(raw->auth_flavours);
739 real->auth_flavourlen = raw->auth_flavourlen;
740 real->proto = raw->proto;
741 real->host_addr = compat_ptr(raw->host_addr);
742 real->host_addrlen = raw->host_addrlen;
743 compat_nfs_string(&real->hostname, &raw->hostname);
744 compat_nfs_string(&real->mnt_path, &raw->mnt_path);
745 compat_nfs_string(&real->client_addr, &raw->client_addr);
746 real->acdirmax = raw->acdirmax;
747 real->acdirmin = raw->acdirmin;
748 real->acregmax = raw->acregmax;
749 real->acregmin = raw->acregmin;
750 real->retrans = raw->retrans;
751 real->timeo = raw->timeo;
752 real->wsize = raw->wsize;
753 real->rsize = raw->rsize;
754 real->flags = raw->flags;
755 real->version = raw->version;
756 }
757
758 return 0;
759 }
760
761 #define NCPFS_NAME "ncpfs"
762 #define NFS4_NAME "nfs4"
763
764 COMPAT_SYSCALL_DEFINE5(mount, const char __user *, dev_name,
765 const char __user *, dir_name,
766 const char __user *, type, compat_ulong_t, flags,
767 const void __user *, data)
768 {
769 char *kernel_type;
770 unsigned long data_page;
771 char *kernel_dev;
772 struct filename *dir;
773 int retval;
774
775 retval = copy_mount_string(type, &kernel_type);
776 if (retval < 0)
777 goto out;
778
779 dir = getname(dir_name);
780 retval = PTR_ERR(dir);
781 if (IS_ERR(dir))
782 goto out1;
783
784 retval = copy_mount_string(dev_name, &kernel_dev);
785 if (retval < 0)
786 goto out2;
787
788 retval = copy_mount_options(data, &data_page);
789 if (retval < 0)
790 goto out3;
791
792 retval = -EINVAL;
793
794 if (kernel_type && data_page) {
795 if (!strcmp(kernel_type, NCPFS_NAME)) {
796 do_ncp_super_data_conv((void *)data_page);
797 } else if (!strcmp(kernel_type, NFS4_NAME)) {
798 if (do_nfs4_super_data_conv((void *) data_page))
799 goto out4;
800 }
801 }
802
803 retval = do_mount(kernel_dev, dir->name, kernel_type,
804 flags, (void*)data_page);
805
806 out4:
807 free_page(data_page);
808 out3:
809 kfree(kernel_dev);
810 out2:
811 putname(dir);
812 out1:
813 kfree(kernel_type);
814 out:
815 return retval;
816 }
817
818 struct compat_old_linux_dirent {
819 compat_ulong_t d_ino;
820 compat_ulong_t d_offset;
821 unsigned short d_namlen;
822 char d_name[1];
823 };
824
825 struct compat_readdir_callback {
826 struct dir_context ctx;
827 struct compat_old_linux_dirent __user *dirent;
828 int result;
829 };
830
831 static int compat_fillonedir(void *__buf, const char *name, int namlen,
832 loff_t offset, u64 ino, unsigned int d_type)
833 {
834 struct compat_readdir_callback *buf = __buf;
835 struct compat_old_linux_dirent __user *dirent;
836 compat_ulong_t d_ino;
837
838 if (buf->result)
839 return -EINVAL;
840 d_ino = ino;
841 if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) {
842 buf->result = -EOVERFLOW;
843 return -EOVERFLOW;
844 }
845 buf->result++;
846 dirent = buf->dirent;
847 if (!access_ok(VERIFY_WRITE, dirent,
848 (unsigned long)(dirent->d_name + namlen + 1) -
849 (unsigned long)dirent))
850 goto efault;
851 if ( __put_user(d_ino, &dirent->d_ino) ||
852 __put_user(offset, &dirent->d_offset) ||
853 __put_user(namlen, &dirent->d_namlen) ||
854 __copy_to_user(dirent->d_name, name, namlen) ||
855 __put_user(0, dirent->d_name + namlen))
856 goto efault;
857 return 0;
858 efault:
859 buf->result = -EFAULT;
860 return -EFAULT;
861 }
862
863 COMPAT_SYSCALL_DEFINE3(old_readdir, unsigned int, fd,
864 struct compat_old_linux_dirent __user *, dirent, unsigned int, count)
865 {
866 int error;
867 struct fd f = fdget(fd);
868 struct compat_readdir_callback buf = {
869 .ctx.actor = compat_fillonedir,
870 .dirent = dirent
871 };
872
873 if (!f.file)
874 return -EBADF;
875
876 error = iterate_dir(f.file, &buf.ctx);
877 if (buf.result)
878 error = buf.result;
879
880 fdput(f);
881 return error;
882 }
883
884 struct compat_linux_dirent {
885 compat_ulong_t d_ino;
886 compat_ulong_t d_off;
887 unsigned short d_reclen;
888 char d_name[1];
889 };
890
891 struct compat_getdents_callback {
892 struct dir_context ctx;
893 struct compat_linux_dirent __user *current_dir;
894 struct compat_linux_dirent __user *previous;
895 int count;
896 int error;
897 };
898
899 static int compat_filldir(void *__buf, const char *name, int namlen,
900 loff_t offset, u64 ino, unsigned int d_type)
901 {
902 struct compat_linux_dirent __user * dirent;
903 struct compat_getdents_callback *buf = __buf;
904 compat_ulong_t d_ino;
905 int reclen = ALIGN(offsetof(struct compat_linux_dirent, d_name) +
906 namlen + 2, sizeof(compat_long_t));
907
908 buf->error = -EINVAL; /* only used if we fail.. */
909 if (reclen > buf->count)
910 return -EINVAL;
911 d_ino = ino;
912 if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) {
913 buf->error = -EOVERFLOW;
914 return -EOVERFLOW;
915 }
916 dirent = buf->previous;
917 if (dirent) {
918 if (__put_user(offset, &dirent->d_off))
919 goto efault;
920 }
921 dirent = buf->current_dir;
922 if (__put_user(d_ino, &dirent->d_ino))
923 goto efault;
924 if (__put_user(reclen, &dirent->d_reclen))
925 goto efault;
926 if (copy_to_user(dirent->d_name, name, namlen))
927 goto efault;
928 if (__put_user(0, dirent->d_name + namlen))
929 goto efault;
930 if (__put_user(d_type, (char __user *) dirent + reclen - 1))
931 goto efault;
932 buf->previous = dirent;
933 dirent = (void __user *)dirent + reclen;
934 buf->current_dir = dirent;
935 buf->count -= reclen;
936 return 0;
937 efault:
938 buf->error = -EFAULT;
939 return -EFAULT;
940 }
941
942 COMPAT_SYSCALL_DEFINE3(getdents, unsigned int, fd,
943 struct compat_linux_dirent __user *, dirent, unsigned int, count)
944 {
945 struct fd f;
946 struct compat_linux_dirent __user * lastdirent;
947 struct compat_getdents_callback buf = {
948 .ctx.actor = compat_filldir,
949 .current_dir = dirent,
950 .count = count
951 };
952 int error;
953
954 if (!access_ok(VERIFY_WRITE, dirent, count))
955 return -EFAULT;
956
957 f = fdget(fd);
958 if (!f.file)
959 return -EBADF;
960
961 error = iterate_dir(f.file, &buf.ctx);
962 if (error >= 0)
963 error = buf.error;
964 lastdirent = buf.previous;
965 if (lastdirent) {
966 if (put_user(buf.ctx.pos, &lastdirent->d_off))
967 error = -EFAULT;
968 else
969 error = count - buf.count;
970 }
971 fdput(f);
972 return error;
973 }
974
975 #ifdef __ARCH_WANT_COMPAT_SYS_GETDENTS64
976
977 struct compat_getdents_callback64 {
978 struct dir_context ctx;
979 struct linux_dirent64 __user *current_dir;
980 struct linux_dirent64 __user *previous;
981 int count;
982 int error;
983 };
984
985 static int compat_filldir64(void * __buf, const char * name, int namlen, loff_t offset,
986 u64 ino, unsigned int d_type)
987 {
988 struct linux_dirent64 __user *dirent;
989 struct compat_getdents_callback64 *buf = __buf;
990 int reclen = ALIGN(offsetof(struct linux_dirent64, d_name) + namlen + 1,
991 sizeof(u64));
992 u64 off;
993
994 buf->error = -EINVAL; /* only used if we fail.. */
995 if (reclen > buf->count)
996 return -EINVAL;
997 dirent = buf->previous;
998
999 if (dirent) {
1000 if (__put_user_unaligned(offset, &dirent->d_off))
1001 goto efault;
1002 }
1003 dirent = buf->current_dir;
1004 if (__put_user_unaligned(ino, &dirent->d_ino))
1005 goto efault;
1006 off = 0;
1007 if (__put_user_unaligned(off, &dirent->d_off))
1008 goto efault;
1009 if (__put_user(reclen, &dirent->d_reclen))
1010 goto efault;
1011 if (__put_user(d_type, &dirent->d_type))
1012 goto efault;
1013 if (copy_to_user(dirent->d_name, name, namlen))
1014 goto efault;
1015 if (__put_user(0, dirent->d_name + namlen))
1016 goto efault;
1017 buf->previous = dirent;
1018 dirent = (void __user *)dirent + reclen;
1019 buf->current_dir = dirent;
1020 buf->count -= reclen;
1021 return 0;
1022 efault:
1023 buf->error = -EFAULT;
1024 return -EFAULT;
1025 }
1026
1027 COMPAT_SYSCALL_DEFINE3(getdents64, unsigned int, fd,
1028 struct linux_dirent64 __user *, dirent, unsigned int, count)
1029 {
1030 struct fd f;
1031 struct linux_dirent64 __user * lastdirent;
1032 struct compat_getdents_callback64 buf = {
1033 .ctx.actor = compat_filldir64,
1034 .current_dir = dirent,
1035 .count = count
1036 };
1037 int error;
1038
1039 if (!access_ok(VERIFY_WRITE, dirent, count))
1040 return -EFAULT;
1041
1042 f = fdget(fd);
1043 if (!f.file)
1044 return -EBADF;
1045
1046 error = iterate_dir(f.file, &buf.ctx);
1047 if (error >= 0)
1048 error = buf.error;
1049 lastdirent = buf.previous;
1050 if (lastdirent) {
1051 typeof(lastdirent->d_off) d_off = buf.ctx.pos;
1052 if (__put_user_unaligned(d_off, &lastdirent->d_off))
1053 error = -EFAULT;
1054 else
1055 error = count - buf.count;
1056 }
1057 fdput(f);
1058 return error;
1059 }
1060 #endif /* __ARCH_WANT_COMPAT_SYS_GETDENTS64 */
1061
1062 /*
1063 * Exactly like fs/open.c:sys_open(), except that it doesn't set the
1064 * O_LARGEFILE flag.
1065 */
1066 COMPAT_SYSCALL_DEFINE3(open, const char __user *, filename, int, flags, umode_t, mode)
1067 {
1068 return do_sys_open(AT_FDCWD, filename, flags, mode);
1069 }
1070
1071 /*
1072 * Exactly like fs/open.c:sys_openat(), except that it doesn't set the
1073 * O_LARGEFILE flag.
1074 */
1075 COMPAT_SYSCALL_DEFINE4(openat, int, dfd, const char __user *, filename, int, flags, umode_t, mode)
1076 {
1077 return do_sys_open(dfd, filename, flags, mode);
1078 }
1079
1080 #define __COMPAT_NFDBITS (8 * sizeof(compat_ulong_t))
1081
1082 static int poll_select_copy_remaining(struct timespec *end_time, void __user *p,
1083 int timeval, int ret)
1084 {
1085 struct timespec ts;
1086
1087 if (!p)
1088 return ret;
1089
1090 if (current->personality & STICKY_TIMEOUTS)
1091 goto sticky;
1092
1093 /* No update for zero timeout */
1094 if (!end_time->tv_sec && !end_time->tv_nsec)
1095 return ret;
1096
1097 ktime_get_ts(&ts);
1098 ts = timespec_sub(*end_time, ts);
1099 if (ts.tv_sec < 0)
1100 ts.tv_sec = ts.tv_nsec = 0;
1101
1102 if (timeval) {
1103 struct compat_timeval rtv;
1104
1105 rtv.tv_sec = ts.tv_sec;
1106 rtv.tv_usec = ts.tv_nsec / NSEC_PER_USEC;
1107
1108 if (!copy_to_user(p, &rtv, sizeof(rtv)))
1109 return ret;
1110 } else {
1111 struct compat_timespec rts;
1112
1113 rts.tv_sec = ts.tv_sec;
1114 rts.tv_nsec = ts.tv_nsec;
1115
1116 if (!copy_to_user(p, &rts, sizeof(rts)))
1117 return ret;
1118 }
1119 /*
1120 * If an application puts its timeval in read-only memory, we
1121 * don't want the Linux-specific update to the timeval to
1122 * cause a fault after the select has completed
1123 * successfully. However, because we're not updating the
1124 * timeval, we can't restart the system call.
1125 */
1126
1127 sticky:
1128 if (ret == -ERESTARTNOHAND)
1129 ret = -EINTR;
1130 return ret;
1131 }
1132
1133 /*
1134 * Ooo, nasty. We need here to frob 32-bit unsigned longs to
1135 * 64-bit unsigned longs.
1136 */
1137 static
1138 int compat_get_fd_set(unsigned long nr, compat_ulong_t __user *ufdset,
1139 unsigned long *fdset)
1140 {
1141 nr = DIV_ROUND_UP(nr, __COMPAT_NFDBITS);
1142 if (ufdset) {
1143 unsigned long odd;
1144
1145 if (!access_ok(VERIFY_WRITE, ufdset, nr*sizeof(compat_ulong_t)))
1146 return -EFAULT;
1147
1148 odd = nr & 1UL;
1149 nr &= ~1UL;
1150 while (nr) {
1151 unsigned long h, l;
1152 if (__get_user(l, ufdset) || __get_user(h, ufdset+1))
1153 return -EFAULT;
1154 ufdset += 2;
1155 *fdset++ = h << 32 | l;
1156 nr -= 2;
1157 }
1158 if (odd && __get_user(*fdset, ufdset))
1159 return -EFAULT;
1160 } else {
1161 /* Tricky, must clear full unsigned long in the
1162 * kernel fdset at the end, this makes sure that
1163 * actually happens.
1164 */
1165 memset(fdset, 0, ((nr + 1) & ~1)*sizeof(compat_ulong_t));
1166 }
1167 return 0;
1168 }
1169
1170 static
1171 int compat_set_fd_set(unsigned long nr, compat_ulong_t __user *ufdset,
1172 unsigned long *fdset)
1173 {
1174 unsigned long odd;
1175 nr = DIV_ROUND_UP(nr, __COMPAT_NFDBITS);
1176
1177 if (!ufdset)
1178 return 0;
1179
1180 odd = nr & 1UL;
1181 nr &= ~1UL;
1182 while (nr) {
1183 unsigned long h, l;
1184 l = *fdset++;
1185 h = l >> 32;
1186 if (__put_user(l, ufdset) || __put_user(h, ufdset+1))
1187 return -EFAULT;
1188 ufdset += 2;
1189 nr -= 2;
1190 }
1191 if (odd && __put_user(*fdset, ufdset))
1192 return -EFAULT;
1193 return 0;
1194 }
1195
1196
1197 /*
1198 * This is a virtual copy of sys_select from fs/select.c and probably
1199 * should be compared to it from time to time
1200 */
1201
1202 /*
1203 * We can actually return ERESTARTSYS instead of EINTR, but I'd
1204 * like to be certain this leads to no problems. So I return
1205 * EINTR just for safety.
1206 *
1207 * Update: ERESTARTSYS breaks at least the xview clock binary, so
1208 * I'm trying ERESTARTNOHAND which restart only when you want to.
1209 */
1210 int compat_core_sys_select(int n, compat_ulong_t __user *inp,
1211 compat_ulong_t __user *outp, compat_ulong_t __user *exp,
1212 struct timespec *end_time)
1213 {
1214 fd_set_bits fds;
1215 void *bits;
1216 int size, max_fds, ret = -EINVAL;
1217 struct fdtable *fdt;
1218 long stack_fds[SELECT_STACK_ALLOC/sizeof(long)];
1219
1220 if (n < 0)
1221 goto out_nofds;
1222
1223 /* max_fds can increase, so grab it once to avoid race */
1224 rcu_read_lock();
1225 fdt = files_fdtable(current->files);
1226 max_fds = fdt->max_fds;
1227 rcu_read_unlock();
1228 if (n > max_fds)
1229 n = max_fds;
1230
1231 /*
1232 * We need 6 bitmaps (in/out/ex for both incoming and outgoing),
1233 * since we used fdset we need to allocate memory in units of
1234 * long-words.
1235 */
1236 size = FDS_BYTES(n);
1237 bits = stack_fds;
1238 if (size > sizeof(stack_fds) / 6) {
1239 bits = kmalloc(6 * size, GFP_KERNEL);
1240 ret = -ENOMEM;
1241 if (!bits)
1242 goto out_nofds;
1243 }
1244 fds.in = (unsigned long *) bits;
1245 fds.out = (unsigned long *) (bits + size);
1246 fds.ex = (unsigned long *) (bits + 2*size);
1247 fds.res_in = (unsigned long *) (bits + 3*size);
1248 fds.res_out = (unsigned long *) (bits + 4*size);
1249 fds.res_ex = (unsigned long *) (bits + 5*size);
1250
1251 if ((ret = compat_get_fd_set(n, inp, fds.in)) ||
1252 (ret = compat_get_fd_set(n, outp, fds.out)) ||
1253 (ret = compat_get_fd_set(n, exp, fds.ex)))
1254 goto out;
1255 zero_fd_set(n, fds.res_in);
1256 zero_fd_set(n, fds.res_out);
1257 zero_fd_set(n, fds.res_ex);
1258
1259 ret = do_select(n, &fds, end_time);
1260
1261 if (ret < 0)
1262 goto out;
1263 if (!ret) {
1264 ret = -ERESTARTNOHAND;
1265 if (signal_pending(current))
1266 goto out;
1267 ret = 0;
1268 }
1269
1270 if (compat_set_fd_set(n, inp, fds.res_in) ||
1271 compat_set_fd_set(n, outp, fds.res_out) ||
1272 compat_set_fd_set(n, exp, fds.res_ex))
1273 ret = -EFAULT;
1274 out:
1275 if (bits != stack_fds)
1276 kfree(bits);
1277 out_nofds:
1278 return ret;
1279 }
1280
1281 COMPAT_SYSCALL_DEFINE5(select, int, n, compat_ulong_t __user *, inp,
1282 compat_ulong_t __user *, outp, compat_ulong_t __user *, exp,
1283 struct compat_timeval __user *, tvp)
1284 {
1285 struct timespec end_time, *to = NULL;
1286 struct compat_timeval tv;
1287 int ret;
1288
1289 if (tvp) {
1290 if (copy_from_user(&tv, tvp, sizeof(tv)))
1291 return -EFAULT;
1292
1293 to = &end_time;
1294 if (poll_select_set_timeout(to,
1295 tv.tv_sec + (tv.tv_usec / USEC_PER_SEC),
1296 (tv.tv_usec % USEC_PER_SEC) * NSEC_PER_USEC))
1297 return -EINVAL;
1298 }
1299
1300 ret = compat_core_sys_select(n, inp, outp, exp, to);
1301 ret = poll_select_copy_remaining(&end_time, tvp, 1, ret);
1302
1303 return ret;
1304 }
1305
1306 struct compat_sel_arg_struct {
1307 compat_ulong_t n;
1308 compat_uptr_t inp;
1309 compat_uptr_t outp;
1310 compat_uptr_t exp;
1311 compat_uptr_t tvp;
1312 };
1313
1314 COMPAT_SYSCALL_DEFINE1(old_select, struct compat_sel_arg_struct __user *, arg)
1315 {
1316 struct compat_sel_arg_struct a;
1317
1318 if (copy_from_user(&a, arg, sizeof(a)))
1319 return -EFAULT;
1320 return compat_sys_select(a.n, compat_ptr(a.inp), compat_ptr(a.outp),
1321 compat_ptr(a.exp), compat_ptr(a.tvp));
1322 }
1323
1324 static long do_compat_pselect(int n, compat_ulong_t __user *inp,
1325 compat_ulong_t __user *outp, compat_ulong_t __user *exp,
1326 struct compat_timespec __user *tsp, compat_sigset_t __user *sigmask,
1327 compat_size_t sigsetsize)
1328 {
1329 compat_sigset_t ss32;
1330 sigset_t ksigmask, sigsaved;
1331 struct compat_timespec ts;
1332 struct timespec end_time, *to = NULL;
1333 int ret;
1334
1335 if (tsp) {
1336 if (copy_from_user(&ts, tsp, sizeof(ts)))
1337 return -EFAULT;
1338
1339 to = &end_time;
1340 if (poll_select_set_timeout(to, ts.tv_sec, ts.tv_nsec))
1341 return -EINVAL;
1342 }
1343
1344 if (sigmask) {
1345 if (sigsetsize != sizeof(compat_sigset_t))
1346 return -EINVAL;
1347 if (copy_from_user(&ss32, sigmask, sizeof(ss32)))
1348 return -EFAULT;
1349 sigset_from_compat(&ksigmask, &ss32);
1350
1351 sigdelsetmask(&ksigmask, sigmask(SIGKILL)|sigmask(SIGSTOP));
1352 sigprocmask(SIG_SETMASK, &ksigmask, &sigsaved);
1353 }
1354
1355 ret = compat_core_sys_select(n, inp, outp, exp, to);
1356 ret = poll_select_copy_remaining(&end_time, tsp, 0, ret);
1357
1358 if (ret == -ERESTARTNOHAND) {
1359 /*
1360 * Don't restore the signal mask yet. Let do_signal() deliver
1361 * the signal on the way back to userspace, before the signal
1362 * mask is restored.
1363 */
1364 if (sigmask) {
1365 memcpy(&current->saved_sigmask, &sigsaved,
1366 sizeof(sigsaved));
1367 set_restore_sigmask();
1368 }
1369 } else if (sigmask)
1370 sigprocmask(SIG_SETMASK, &sigsaved, NULL);
1371
1372 return ret;
1373 }
1374
1375 COMPAT_SYSCALL_DEFINE6(pselect6, int, n, compat_ulong_t __user *, inp,
1376 compat_ulong_t __user *, outp, compat_ulong_t __user *, exp,
1377 struct compat_timespec __user *, tsp, void __user *, sig)
1378 {
1379 compat_size_t sigsetsize = 0;
1380 compat_uptr_t up = 0;
1381
1382 if (sig) {
1383 if (!access_ok(VERIFY_READ, sig,
1384 sizeof(compat_uptr_t)+sizeof(compat_size_t)) ||
1385 __get_user(up, (compat_uptr_t __user *)sig) ||
1386 __get_user(sigsetsize,
1387 (compat_size_t __user *)(sig+sizeof(up))))
1388 return -EFAULT;
1389 }
1390 return do_compat_pselect(n, inp, outp, exp, tsp, compat_ptr(up),
1391 sigsetsize);
1392 }
1393
1394 COMPAT_SYSCALL_DEFINE5(ppoll, struct pollfd __user *, ufds,
1395 unsigned int, nfds, struct compat_timespec __user *, tsp,
1396 const compat_sigset_t __user *, sigmask, compat_size_t, sigsetsize)
1397 {
1398 compat_sigset_t ss32;
1399 sigset_t ksigmask, sigsaved;
1400 struct compat_timespec ts;
1401 struct timespec end_time, *to = NULL;
1402 int ret;
1403
1404 if (tsp) {
1405 if (copy_from_user(&ts, tsp, sizeof(ts)))
1406 return -EFAULT;
1407
1408 to = &end_time;
1409 if (poll_select_set_timeout(to, ts.tv_sec, ts.tv_nsec))
1410 return -EINVAL;
1411 }
1412
1413 if (sigmask) {
1414 if (sigsetsize != sizeof(compat_sigset_t))
1415 return -EINVAL;
1416 if (copy_from_user(&ss32, sigmask, sizeof(ss32)))
1417 return -EFAULT;
1418 sigset_from_compat(&ksigmask, &ss32);
1419
1420 sigdelsetmask(&ksigmask, sigmask(SIGKILL)|sigmask(SIGSTOP));
1421 sigprocmask(SIG_SETMASK, &ksigmask, &sigsaved);
1422 }
1423
1424 ret = do_sys_poll(ufds, nfds, to);
1425
1426 /* We can restart this syscall, usually */
1427 if (ret == -EINTR) {
1428 /*
1429 * Don't restore the signal mask yet. Let do_signal() deliver
1430 * the signal on the way back to userspace, before the signal
1431 * mask is restored.
1432 */
1433 if (sigmask) {
1434 memcpy(&current->saved_sigmask, &sigsaved,
1435 sizeof(sigsaved));
1436 set_restore_sigmask();
1437 }
1438 ret = -ERESTARTNOHAND;
1439 } else if (sigmask)
1440 sigprocmask(SIG_SETMASK, &sigsaved, NULL);
1441
1442 ret = poll_select_copy_remaining(&end_time, tsp, 0, ret);
1443
1444 return ret;
1445 }
1446
1447 #ifdef CONFIG_FHANDLE
1448 /*
1449 * Exactly like fs/open.c:sys_open_by_handle_at(), except that it
1450 * doesn't set the O_LARGEFILE flag.
1451 */
1452 COMPAT_SYSCALL_DEFINE3(open_by_handle_at, int, mountdirfd,
1453 struct file_handle __user *, handle, int, flags)
1454 {
1455 return do_handle_open(mountdirfd, handle, flags);
1456 }
1457 #endif