]> bbs.cooldavid.org Git - net-next-2.6.git/blame - fs/compat.c
select: add a poll specific struct to the restart_block union
[net-next-2.6.git] / fs / compat.c
CommitLineData
1da177e4
LT
1/*
2 * linux/fs/compat.c
3 *
4 * Kernel compatibililty routines for e.g. 32 bit syscall support
5 * on 64 bit kernels.
6 *
7 * Copyright (C) 2002 Stephen Rothwell, IBM Corporation
8 * Copyright (C) 1997-2000 Jakub Jelinek (jakub@redhat.com)
9 * Copyright (C) 1998 Eddie C. Dost (ecd@skynet.be)
10 * Copyright (C) 2001,2002 Andi Kleen, SuSE Labs
11 * Copyright (C) 2003 Pavel Machek (pavel@suse.cz)
12 *
13 * This program is free software; you can redistribute it and/or modify
14 * it under the terms of the GNU General Public License version 2 as
15 * published by the Free Software Foundation.
16 */
17
022a1692 18#include <linux/kernel.h>
1da177e4
LT
19#include <linux/linkage.h>
20#include <linux/compat.h>
21#include <linux/errno.h>
22#include <linux/time.h>
23#include <linux/fs.h>
24#include <linux/fcntl.h>
25#include <linux/namei.h>
26#include <linux/file.h>
9f3acc31 27#include <linux/fdtable.h>
1da177e4 28#include <linux/vfs.h>
1da177e4
LT
29#include <linux/ioctl.h>
30#include <linux/init.h>
1da177e4
LT
31#include <linux/smb.h>
32#include <linux/smb_mount.h>
33#include <linux/ncp_mount.h>
9a9947bf 34#include <linux/nfs4_mount.h>
1da177e4
LT
35#include <linux/smp_lock.h>
36#include <linux/syscalls.h>
37#include <linux/ctype.h>
38#include <linux/module.h>
39#include <linux/dirent.h>
0eeca283 40#include <linux/fsnotify.h>
1da177e4
LT
41#include <linux/highuid.h>
42#include <linux/sunrpc/svc.h>
43#include <linux/nfsd/nfsd.h>
44#include <linux/nfsd/syscall.h>
45#include <linux/personality.h>
46#include <linux/rwsem.h>
8f0ab514 47#include <linux/tsacct_kern.h>
6272e266 48#include <linux/security.h>
a1f8e7f7 49#include <linux/highmem.h>
6d18c922 50#include <linux/signal.h>
bd01f843 51#include <linux/poll.h>
4a805e86 52#include <linux/mm.h>
f6dfb4fd 53#include <linux/eventpoll.h>
1da177e4 54
1da177e4
LT
55#include <asm/uaccess.h>
56#include <asm/mmu_context.h>
57#include <asm/ioctls.h>
07f3f05c 58#include "internal.h"
9f72949f 59
bebfa101
AK
60int compat_log = 1;
61
62int compat_printk(const char *fmt, ...)
63{
64 va_list ap;
65 int ret;
66 if (!compat_log)
67 return 0;
68 va_start(ap, fmt);
69 ret = vprintk(fmt, ap);
70 va_end(ap);
71 return ret;
72}
73
ee0b3e67
BP
74#include "read_write.h"
75
1da177e4
LT
76/*
77 * Not all architectures have sys_utime, so implement this in terms
78 * of sys_utimes.
79 */
80asmlinkage long compat_sys_utime(char __user *filename, struct compat_utimbuf __user *t)
81{
1c710c89 82 struct timespec tv[2];
1da177e4
LT
83
84 if (t) {
85 if (get_user(tv[0].tv_sec, &t->actime) ||
86 get_user(tv[1].tv_sec, &t->modtime))
87 return -EFAULT;
1c710c89
UD
88 tv[0].tv_nsec = 0;
89 tv[1].tv_nsec = 0;
1da177e4 90 }
1c710c89
UD
91 return do_utimes(AT_FDCWD, filename, t ? tv : NULL, 0);
92}
93
94asmlinkage long compat_sys_utimensat(unsigned int dfd, char __user *filename, struct compat_timespec __user *t, int flags)
95{
96 struct timespec tv[2];
97
98 if (t) {
99 if (get_compat_timespec(&tv[0], &t[0]) ||
100 get_compat_timespec(&tv[1], &t[1]))
101 return -EFAULT;
102
103 if ((tv[0].tv_nsec == UTIME_OMIT || tv[0].tv_nsec == UTIME_NOW)
104 && tv[0].tv_sec != 0)
105 return -EINVAL;
106 if ((tv[1].tv_nsec == UTIME_OMIT || tv[1].tv_nsec == UTIME_NOW)
107 && tv[1].tv_sec != 0)
108 return -EINVAL;
109
110 if (tv[0].tv_nsec == UTIME_OMIT && tv[1].tv_nsec == UTIME_OMIT)
111 return 0;
112 }
113 return do_utimes(dfd, filename, t ? tv : NULL, flags);
1da177e4
LT
114}
115
9ad11ab4 116asmlinkage long compat_sys_futimesat(unsigned int dfd, char __user *filename, struct compat_timeval __user *t)
1da177e4 117{
1c710c89 118 struct timespec tv[2];
1da177e4 119
9ad11ab4 120 if (t) {
1da177e4 121 if (get_user(tv[0].tv_sec, &t[0].tv_sec) ||
1c710c89 122 get_user(tv[0].tv_nsec, &t[0].tv_usec) ||
1da177e4 123 get_user(tv[1].tv_sec, &t[1].tv_sec) ||
1c710c89 124 get_user(tv[1].tv_nsec, &t[1].tv_usec))
9ad11ab4 125 return -EFAULT;
1c710c89
UD
126 if (tv[0].tv_nsec >= 1000000 || tv[0].tv_nsec < 0 ||
127 tv[1].tv_nsec >= 1000000 || tv[1].tv_nsec < 0)
128 return -EINVAL;
129 tv[0].tv_nsec *= 1000;
130 tv[1].tv_nsec *= 1000;
9ad11ab4 131 }
1c710c89 132 return do_utimes(dfd, filename, t ? tv : NULL, 0);
5590ff0d
UD
133}
134
135asmlinkage long compat_sys_utimes(char __user *filename, struct compat_timeval __user *t)
136{
137 return compat_sys_futimesat(AT_FDCWD, filename, t);
1da177e4
LT
138}
139
140asmlinkage long compat_sys_newstat(char __user * filename,
141 struct compat_stat __user *statbuf)
142{
143 struct kstat stat;
5590ff0d 144 int error = vfs_stat_fd(AT_FDCWD, filename, &stat);
1da177e4
LT
145
146 if (!error)
147 error = cp_compat_stat(&stat, statbuf);
148 return error;
149}
150
151asmlinkage long compat_sys_newlstat(char __user * filename,
152 struct compat_stat __user *statbuf)
153{
154 struct kstat stat;
5590ff0d 155 int error = vfs_lstat_fd(AT_FDCWD, filename, &stat);
1da177e4
LT
156
157 if (!error)
158 error = cp_compat_stat(&stat, statbuf);
159 return error;
160}
161
82d821dd 162#ifndef __ARCH_WANT_STAT64
9ad11ab4 163asmlinkage long compat_sys_newfstatat(unsigned int dfd, char __user *filename,
5590ff0d
UD
164 struct compat_stat __user *statbuf, int flag)
165{
166 struct kstat stat;
167 int error = -EINVAL;
168
169 if ((flag & ~AT_SYMLINK_NOFOLLOW) != 0)
170 goto out;
171
172 if (flag & AT_SYMLINK_NOFOLLOW)
173 error = vfs_lstat_fd(dfd, filename, &stat);
174 else
175 error = vfs_stat_fd(dfd, filename, &stat);
176
177 if (!error)
178 error = cp_compat_stat(&stat, statbuf);
179
180out:
181 return error;
182}
82d821dd 183#endif
5590ff0d 184
1da177e4
LT
185asmlinkage long compat_sys_newfstat(unsigned int fd,
186 struct compat_stat __user * statbuf)
187{
188 struct kstat stat;
189 int error = vfs_fstat(fd, &stat);
190
191 if (!error)
192 error = cp_compat_stat(&stat, statbuf);
193 return error;
194}
195
196static int put_compat_statfs(struct compat_statfs __user *ubuf, struct kstatfs *kbuf)
197{
198
199 if (sizeof ubuf->f_blocks == 4) {
f4a67cce
JT
200 if ((kbuf->f_blocks | kbuf->f_bfree | kbuf->f_bavail |
201 kbuf->f_bsize | kbuf->f_frsize) & 0xffffffff00000000ULL)
1da177e4
LT
202 return -EOVERFLOW;
203 /* f_files and f_ffree may be -1; it's okay
204 * to stuff that into 32 bits */
205 if (kbuf->f_files != 0xffffffffffffffffULL
206 && (kbuf->f_files & 0xffffffff00000000ULL))
207 return -EOVERFLOW;
208 if (kbuf->f_ffree != 0xffffffffffffffffULL
209 && (kbuf->f_ffree & 0xffffffff00000000ULL))
210 return -EOVERFLOW;
211 }
212 if (!access_ok(VERIFY_WRITE, ubuf, sizeof(*ubuf)) ||
213 __put_user(kbuf->f_type, &ubuf->f_type) ||
214 __put_user(kbuf->f_bsize, &ubuf->f_bsize) ||
215 __put_user(kbuf->f_blocks, &ubuf->f_blocks) ||
216 __put_user(kbuf->f_bfree, &ubuf->f_bfree) ||
217 __put_user(kbuf->f_bavail, &ubuf->f_bavail) ||
218 __put_user(kbuf->f_files, &ubuf->f_files) ||
219 __put_user(kbuf->f_ffree, &ubuf->f_ffree) ||
220 __put_user(kbuf->f_namelen, &ubuf->f_namelen) ||
221 __put_user(kbuf->f_fsid.val[0], &ubuf->f_fsid.val[0]) ||
222 __put_user(kbuf->f_fsid.val[1], &ubuf->f_fsid.val[1]) ||
223 __put_user(kbuf->f_frsize, &ubuf->f_frsize) ||
224 __put_user(0, &ubuf->f_spare[0]) ||
225 __put_user(0, &ubuf->f_spare[1]) ||
226 __put_user(0, &ubuf->f_spare[2]) ||
227 __put_user(0, &ubuf->f_spare[3]) ||
228 __put_user(0, &ubuf->f_spare[4]))
229 return -EFAULT;
230 return 0;
231}
232
233/*
234 * The following statfs calls are copies of code from fs/open.c and
235 * should be checked against those from time to time
236 */
2d8f3038 237asmlinkage long compat_sys_statfs(const char __user *pathname, struct compat_statfs __user *buf)
1da177e4 238{
2d8f3038 239 struct path path;
1da177e4
LT
240 int error;
241
2d8f3038 242 error = user_path(pathname, &path);
1da177e4
LT
243 if (!error) {
244 struct kstatfs tmp;
2d8f3038 245 error = vfs_statfs(path.dentry, &tmp);
86e07ce7
DG
246 if (!error)
247 error = put_compat_statfs(buf, &tmp);
2d8f3038 248 path_put(&path);
1da177e4
LT
249 }
250 return error;
251}
252
253asmlinkage long compat_sys_fstatfs(unsigned int fd, struct compat_statfs __user *buf)
254{
255 struct file * file;
256 struct kstatfs tmp;
257 int error;
258
259 error = -EBADF;
260 file = fget(fd);
261 if (!file)
262 goto out;
0f7fc9e4 263 error = vfs_statfs(file->f_path.dentry, &tmp);
86e07ce7
DG
264 if (!error)
265 error = put_compat_statfs(buf, &tmp);
1da177e4
LT
266 fput(file);
267out:
268 return error;
269}
270
271static int put_compat_statfs64(struct compat_statfs64 __user *ubuf, struct kstatfs *kbuf)
272{
273 if (sizeof ubuf->f_blocks == 4) {
f4a67cce
JT
274 if ((kbuf->f_blocks | kbuf->f_bfree | kbuf->f_bavail |
275 kbuf->f_bsize | kbuf->f_frsize) & 0xffffffff00000000ULL)
1da177e4
LT
276 return -EOVERFLOW;
277 /* f_files and f_ffree may be -1; it's okay
278 * to stuff that into 32 bits */
279 if (kbuf->f_files != 0xffffffffffffffffULL
280 && (kbuf->f_files & 0xffffffff00000000ULL))
281 return -EOVERFLOW;
282 if (kbuf->f_ffree != 0xffffffffffffffffULL
283 && (kbuf->f_ffree & 0xffffffff00000000ULL))
284 return -EOVERFLOW;
285 }
286 if (!access_ok(VERIFY_WRITE, ubuf, sizeof(*ubuf)) ||
287 __put_user(kbuf->f_type, &ubuf->f_type) ||
288 __put_user(kbuf->f_bsize, &ubuf->f_bsize) ||
289 __put_user(kbuf->f_blocks, &ubuf->f_blocks) ||
290 __put_user(kbuf->f_bfree, &ubuf->f_bfree) ||
291 __put_user(kbuf->f_bavail, &ubuf->f_bavail) ||
292 __put_user(kbuf->f_files, &ubuf->f_files) ||
293 __put_user(kbuf->f_ffree, &ubuf->f_ffree) ||
294 __put_user(kbuf->f_namelen, &ubuf->f_namelen) ||
295 __put_user(kbuf->f_fsid.val[0], &ubuf->f_fsid.val[0]) ||
296 __put_user(kbuf->f_fsid.val[1], &ubuf->f_fsid.val[1]) ||
297 __put_user(kbuf->f_frsize, &ubuf->f_frsize))
298 return -EFAULT;
299 return 0;
300}
301
2d8f3038 302asmlinkage long compat_sys_statfs64(const char __user *pathname, compat_size_t sz, struct compat_statfs64 __user *buf)
1da177e4 303{
2d8f3038 304 struct path path;
1da177e4
LT
305 int error;
306
307 if (sz != sizeof(*buf))
308 return -EINVAL;
309
2d8f3038 310 error = user_path(pathname, &path);
1da177e4
LT
311 if (!error) {
312 struct kstatfs tmp;
2d8f3038 313 error = vfs_statfs(path.dentry, &tmp);
86e07ce7
DG
314 if (!error)
315 error = put_compat_statfs64(buf, &tmp);
2d8f3038 316 path_put(&path);
1da177e4
LT
317 }
318 return error;
319}
320
321asmlinkage long compat_sys_fstatfs64(unsigned int fd, compat_size_t sz, struct compat_statfs64 __user *buf)
322{
323 struct file * file;
324 struct kstatfs tmp;
325 int error;
326
327 if (sz != sizeof(*buf))
328 return -EINVAL;
329
330 error = -EBADF;
331 file = fget(fd);
332 if (!file)
333 goto out;
0f7fc9e4 334 error = vfs_statfs(file->f_path.dentry, &tmp);
86e07ce7
DG
335 if (!error)
336 error = put_compat_statfs64(buf, &tmp);
1da177e4
LT
337 fput(file);
338out:
339 return error;
340}
341
1da177e4
LT
342static int get_compat_flock(struct flock *kfl, struct compat_flock __user *ufl)
343{
344 if (!access_ok(VERIFY_READ, ufl, sizeof(*ufl)) ||
345 __get_user(kfl->l_type, &ufl->l_type) ||
346 __get_user(kfl->l_whence, &ufl->l_whence) ||
347 __get_user(kfl->l_start, &ufl->l_start) ||
348 __get_user(kfl->l_len, &ufl->l_len) ||
349 __get_user(kfl->l_pid, &ufl->l_pid))
350 return -EFAULT;
351 return 0;
352}
353
354static int put_compat_flock(struct flock *kfl, struct compat_flock __user *ufl)
355{
356 if (!access_ok(VERIFY_WRITE, ufl, sizeof(*ufl)) ||
357 __put_user(kfl->l_type, &ufl->l_type) ||
358 __put_user(kfl->l_whence, &ufl->l_whence) ||
359 __put_user(kfl->l_start, &ufl->l_start) ||
360 __put_user(kfl->l_len, &ufl->l_len) ||
361 __put_user(kfl->l_pid, &ufl->l_pid))
362 return -EFAULT;
363 return 0;
364}
365
366#ifndef HAVE_ARCH_GET_COMPAT_FLOCK64
367static int get_compat_flock64(struct flock *kfl, struct compat_flock64 __user *ufl)
368{
369 if (!access_ok(VERIFY_READ, ufl, sizeof(*ufl)) ||
370 __get_user(kfl->l_type, &ufl->l_type) ||
371 __get_user(kfl->l_whence, &ufl->l_whence) ||
372 __get_user(kfl->l_start, &ufl->l_start) ||
373 __get_user(kfl->l_len, &ufl->l_len) ||
374 __get_user(kfl->l_pid, &ufl->l_pid))
375 return -EFAULT;
376 return 0;
377}
378#endif
379
380#ifndef HAVE_ARCH_PUT_COMPAT_FLOCK64
381static int put_compat_flock64(struct flock *kfl, struct compat_flock64 __user *ufl)
382{
383 if (!access_ok(VERIFY_WRITE, ufl, sizeof(*ufl)) ||
384 __put_user(kfl->l_type, &ufl->l_type) ||
385 __put_user(kfl->l_whence, &ufl->l_whence) ||
386 __put_user(kfl->l_start, &ufl->l_start) ||
387 __put_user(kfl->l_len, &ufl->l_len) ||
388 __put_user(kfl->l_pid, &ufl->l_pid))
389 return -EFAULT;
390 return 0;
391}
392#endif
393
394asmlinkage long compat_sys_fcntl64(unsigned int fd, unsigned int cmd,
395 unsigned long arg)
396{
397 mm_segment_t old_fs;
398 struct flock f;
399 long ret;
400
401 switch (cmd) {
402 case F_GETLK:
403 case F_SETLK:
404 case F_SETLKW:
405 ret = get_compat_flock(&f, compat_ptr(arg));
406 if (ret != 0)
407 break;
408 old_fs = get_fs();
409 set_fs(KERNEL_DS);
410 ret = sys_fcntl(fd, cmd, (unsigned long)&f);
411 set_fs(old_fs);
412 if (cmd == F_GETLK && ret == 0) {
2520f14c
N
413 /* GETLK was successfule and we need to return the data...
414 * but it needs to fit in the compat structure.
415 * l_start shouldn't be too big, unless the original
416 * start + end is greater than COMPAT_OFF_T_MAX, in which
417 * case the app was asking for trouble, so we return
418 * -EOVERFLOW in that case.
419 * l_len could be too big, in which case we just truncate it,
420 * and only allow the app to see that part of the conflicting
421 * lock that might make sense to it anyway
422 */
423
424 if (f.l_start > COMPAT_OFF_T_MAX)
1da177e4 425 ret = -EOVERFLOW;
2520f14c
N
426 if (f.l_len > COMPAT_OFF_T_MAX)
427 f.l_len = COMPAT_OFF_T_MAX;
1da177e4
LT
428 if (ret == 0)
429 ret = put_compat_flock(&f, compat_ptr(arg));
430 }
431 break;
432
433 case F_GETLK64:
434 case F_SETLK64:
435 case F_SETLKW64:
436 ret = get_compat_flock64(&f, compat_ptr(arg));
437 if (ret != 0)
438 break;
439 old_fs = get_fs();
440 set_fs(KERNEL_DS);
441 ret = sys_fcntl(fd, (cmd == F_GETLK64) ? F_GETLK :
442 ((cmd == F_SETLK64) ? F_SETLK : F_SETLKW),
443 (unsigned long)&f);
444 set_fs(old_fs);
445 if (cmd == F_GETLK64 && ret == 0) {
2520f14c
N
446 /* need to return lock information - see above for commentary */
447 if (f.l_start > COMPAT_LOFF_T_MAX)
1da177e4 448 ret = -EOVERFLOW;
2520f14c
N
449 if (f.l_len > COMPAT_LOFF_T_MAX)
450 f.l_len = COMPAT_LOFF_T_MAX;
1da177e4
LT
451 if (ret == 0)
452 ret = put_compat_flock64(&f, compat_ptr(arg));
453 }
454 break;
455
456 default:
457 ret = sys_fcntl(fd, cmd, arg);
458 break;
459 }
460 return ret;
461}
462
463asmlinkage long compat_sys_fcntl(unsigned int fd, unsigned int cmd,
464 unsigned long arg)
465{
466 if ((cmd == F_GETLK64) || (cmd == F_SETLK64) || (cmd == F_SETLKW64))
467 return -EINVAL;
468 return compat_sys_fcntl64(fd, cmd, arg);
469}
470
471asmlinkage long
472compat_sys_io_setup(unsigned nr_reqs, u32 __user *ctx32p)
473{
474 long ret;
475 aio_context_t ctx64;
476
477 mm_segment_t oldfs = get_fs();
478 if (unlikely(get_user(ctx64, ctx32p)))
479 return -EFAULT;
480
481 set_fs(KERNEL_DS);
482 /* The __user pointer cast is valid because of the set_fs() */
483 ret = sys_io_setup(nr_reqs, (aio_context_t __user *) &ctx64);
484 set_fs(oldfs);
485 /* truncating is ok because it's a user address */
486 if (!ret)
487 ret = put_user((u32) ctx64, ctx32p);
488 return ret;
489}
490
491asmlinkage long
492compat_sys_io_getevents(aio_context_t ctx_id,
493 unsigned long min_nr,
494 unsigned long nr,
495 struct io_event __user *events,
496 struct compat_timespec __user *timeout)
497{
498 long ret;
499 struct timespec t;
500 struct timespec __user *ut = NULL;
501
502 ret = -EFAULT;
503 if (unlikely(!access_ok(VERIFY_WRITE, events,
504 nr * sizeof(struct io_event))))
505 goto out;
506 if (timeout) {
507 if (get_compat_timespec(&t, timeout))
508 goto out;
509
510 ut = compat_alloc_user_space(sizeof(*ut));
511 if (copy_to_user(ut, &t, sizeof(t)) )
512 goto out;
513 }
514 ret = sys_io_getevents(ctx_id, min_nr, nr, events, ut);
515out:
516 return ret;
517}
518
519static inline long
520copy_iocb(long nr, u32 __user *ptr32, struct iocb __user * __user *ptr64)
521{
522 compat_uptr_t uptr;
523 int i;
524
525 for (i = 0; i < nr; ++i) {
526 if (get_user(uptr, ptr32 + i))
527 return -EFAULT;
528 if (put_user(compat_ptr(uptr), ptr64 + i))
529 return -EFAULT;
530 }
531 return 0;
532}
533
534#define MAX_AIO_SUBMITS (PAGE_SIZE/sizeof(struct iocb *))
535
536asmlinkage long
537compat_sys_io_submit(aio_context_t ctx_id, int nr, u32 __user *iocb)
538{
539 struct iocb __user * __user *iocb64;
540 long ret;
541
542 if (unlikely(nr < 0))
543 return -EINVAL;
544
545 if (nr > MAX_AIO_SUBMITS)
546 nr = MAX_AIO_SUBMITS;
547
548 iocb64 = compat_alloc_user_space(nr * sizeof(*iocb64));
549 ret = copy_iocb(nr, iocb, iocb64);
550 if (!ret)
551 ret = sys_io_submit(ctx_id, nr, iocb64);
552 return ret;
553}
554
555struct compat_ncp_mount_data {
556 compat_int_t version;
557 compat_uint_t ncp_fd;
202e5979 558 __compat_uid_t mounted_uid;
1da177e4
LT
559 compat_pid_t wdog_pid;
560 unsigned char mounted_vol[NCP_VOLNAME_LEN + 1];
561 compat_uint_t time_out;
562 compat_uint_t retry_count;
563 compat_uint_t flags;
202e5979
SR
564 __compat_uid_t uid;
565 __compat_gid_t gid;
1da177e4
LT
566 compat_mode_t file_mode;
567 compat_mode_t dir_mode;
568};
569
570struct compat_ncp_mount_data_v4 {
571 compat_int_t version;
572 compat_ulong_t flags;
573 compat_ulong_t mounted_uid;
574 compat_long_t wdog_pid;
575 compat_uint_t ncp_fd;
576 compat_uint_t time_out;
577 compat_uint_t retry_count;
578 compat_ulong_t uid;
579 compat_ulong_t gid;
580 compat_ulong_t file_mode;
581 compat_ulong_t dir_mode;
582};
583
584static void *do_ncp_super_data_conv(void *raw_data)
585{
586 int version = *(unsigned int *)raw_data;
587
588 if (version == 3) {
589 struct compat_ncp_mount_data *c_n = raw_data;
590 struct ncp_mount_data *n = raw_data;
591
592 n->dir_mode = c_n->dir_mode;
593 n->file_mode = c_n->file_mode;
594 n->gid = c_n->gid;
595 n->uid = c_n->uid;
596 memmove (n->mounted_vol, c_n->mounted_vol, (sizeof (c_n->mounted_vol) + 3 * sizeof (unsigned int)));
597 n->wdog_pid = c_n->wdog_pid;
598 n->mounted_uid = c_n->mounted_uid;
599 } else if (version == 4) {
600 struct compat_ncp_mount_data_v4 *c_n = raw_data;
601 struct ncp_mount_data_v4 *n = raw_data;
602
603 n->dir_mode = c_n->dir_mode;
604 n->file_mode = c_n->file_mode;
605 n->gid = c_n->gid;
606 n->uid = c_n->uid;
607 n->retry_count = c_n->retry_count;
608 n->time_out = c_n->time_out;
609 n->ncp_fd = c_n->ncp_fd;
610 n->wdog_pid = c_n->wdog_pid;
611 n->mounted_uid = c_n->mounted_uid;
612 n->flags = c_n->flags;
613 } else if (version != 5) {
614 return NULL;
615 }
616
617 return raw_data;
618}
619
620struct compat_smb_mount_data {
621 compat_int_t version;
202e5979
SR
622 __compat_uid_t mounted_uid;
623 __compat_uid_t uid;
624 __compat_gid_t gid;
1da177e4
LT
625 compat_mode_t file_mode;
626 compat_mode_t dir_mode;
627};
628
629static void *do_smb_super_data_conv(void *raw_data)
630{
631 struct smb_mount_data *s = raw_data;
632 struct compat_smb_mount_data *c_s = raw_data;
633
634 if (c_s->version != SMB_MOUNT_OLDVERSION)
635 goto out;
636 s->dir_mode = c_s->dir_mode;
637 s->file_mode = c_s->file_mode;
638 s->gid = c_s->gid;
639 s->uid = c_s->uid;
640 s->mounted_uid = c_s->mounted_uid;
641 out:
642 return raw_data;
643}
644
9a9947bf
DH
645struct compat_nfs_string {
646 compat_uint_t len;
5fc3e624 647 compat_uptr_t data;
9a9947bf
DH
648};
649
650static inline void compat_nfs_string(struct nfs_string *dst,
651 struct compat_nfs_string *src)
652{
653 dst->data = compat_ptr(src->data);
654 dst->len = src->len;
655}
656
657struct compat_nfs4_mount_data_v1 {
658 compat_int_t version;
659 compat_int_t flags;
660 compat_int_t rsize;
661 compat_int_t wsize;
662 compat_int_t timeo;
663 compat_int_t retrans;
664 compat_int_t acregmin;
665 compat_int_t acregmax;
666 compat_int_t acdirmin;
667 compat_int_t acdirmax;
668 struct compat_nfs_string client_addr;
669 struct compat_nfs_string mnt_path;
670 struct compat_nfs_string hostname;
671 compat_uint_t host_addrlen;
5fc3e624 672 compat_uptr_t host_addr;
9a9947bf
DH
673 compat_int_t proto;
674 compat_int_t auth_flavourlen;
5fc3e624 675 compat_uptr_t auth_flavours;
9a9947bf
DH
676};
677
678static int do_nfs4_super_data_conv(void *raw_data)
679{
680 int version = *(compat_uint_t *) raw_data;
681
682 if (version == 1) {
683 struct compat_nfs4_mount_data_v1 *raw = raw_data;
684 struct nfs4_mount_data *real = raw_data;
685
686 /* copy the fields backwards */
687 real->auth_flavours = compat_ptr(raw->auth_flavours);
688 real->auth_flavourlen = raw->auth_flavourlen;
689 real->proto = raw->proto;
690 real->host_addr = compat_ptr(raw->host_addr);
691 real->host_addrlen = raw->host_addrlen;
692 compat_nfs_string(&real->hostname, &raw->hostname);
693 compat_nfs_string(&real->mnt_path, &raw->mnt_path);
694 compat_nfs_string(&real->client_addr, &raw->client_addr);
695 real->acdirmax = raw->acdirmax;
696 real->acdirmin = raw->acdirmin;
697 real->acregmax = raw->acregmax;
698 real->acregmin = raw->acregmin;
699 real->retrans = raw->retrans;
700 real->timeo = raw->timeo;
701 real->wsize = raw->wsize;
702 real->rsize = raw->rsize;
703 real->flags = raw->flags;
704 real->version = raw->version;
705 }
9a9947bf
DH
706
707 return 0;
708}
709
1da177e4
LT
710#define SMBFS_NAME "smbfs"
711#define NCPFS_NAME "ncpfs"
9a9947bf 712#define NFS4_NAME "nfs4"
1da177e4
LT
713
714asmlinkage long compat_sys_mount(char __user * dev_name, char __user * dir_name,
715 char __user * type, unsigned long flags,
716 void __user * data)
717{
718 unsigned long type_page;
719 unsigned long data_page;
720 unsigned long dev_page;
721 char *dir_page;
722 int retval;
723
724 retval = copy_mount_options (type, &type_page);
725 if (retval < 0)
726 goto out;
727
728 dir_page = getname(dir_name);
729 retval = PTR_ERR(dir_page);
730 if (IS_ERR(dir_page))
731 goto out1;
732
733 retval = copy_mount_options (dev_name, &dev_page);
734 if (retval < 0)
735 goto out2;
736
737 retval = copy_mount_options (data, &data_page);
738 if (retval < 0)
739 goto out3;
740
741 retval = -EINVAL;
742
822191a2 743 if (type_page && data_page) {
1da177e4
LT
744 if (!strcmp((char *)type_page, SMBFS_NAME)) {
745 do_smb_super_data_conv((void *)data_page);
746 } else if (!strcmp((char *)type_page, NCPFS_NAME)) {
747 do_ncp_super_data_conv((void *)data_page);
9a9947bf
DH
748 } else if (!strcmp((char *)type_page, NFS4_NAME)) {
749 if (do_nfs4_super_data_conv((void *) data_page))
750 goto out4;
1da177e4
LT
751 }
752 }
753
754 lock_kernel();
755 retval = do_mount((char*)dev_page, dir_page, (char*)type_page,
756 flags, (void*)data_page);
757 unlock_kernel();
758
9a9947bf 759 out4:
1da177e4
LT
760 free_page(data_page);
761 out3:
762 free_page(dev_page);
763 out2:
764 putname(dir_page);
765 out1:
766 free_page(type_page);
767 out:
768 return retval;
769}
770
771#define NAME_OFFSET(de) ((int) ((de)->d_name - (char __user *) (de)))
1da177e4
LT
772
773struct compat_old_linux_dirent {
774 compat_ulong_t d_ino;
775 compat_ulong_t d_offset;
776 unsigned short d_namlen;
777 char d_name[1];
778};
779
780struct compat_readdir_callback {
781 struct compat_old_linux_dirent __user *dirent;
782 int result;
783};
784
785static int compat_fillonedir(void *__buf, const char *name, int namlen,
afefdbb2 786 loff_t offset, u64 ino, unsigned int d_type)
1da177e4
LT
787{
788 struct compat_readdir_callback *buf = __buf;
789 struct compat_old_linux_dirent __user *dirent;
afefdbb2 790 compat_ulong_t d_ino;
1da177e4
LT
791
792 if (buf->result)
793 return -EINVAL;
afefdbb2 794 d_ino = ino;
8f3f655d
AV
795 if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) {
796 buf->result = -EOVERFLOW;
afefdbb2 797 return -EOVERFLOW;
8f3f655d 798 }
1da177e4
LT
799 buf->result++;
800 dirent = buf->dirent;
801 if (!access_ok(VERIFY_WRITE, dirent,
802 (unsigned long)(dirent->d_name + namlen + 1) -
803 (unsigned long)dirent))
804 goto efault;
afefdbb2 805 if ( __put_user(d_ino, &dirent->d_ino) ||
1da177e4
LT
806 __put_user(offset, &dirent->d_offset) ||
807 __put_user(namlen, &dirent->d_namlen) ||
808 __copy_to_user(dirent->d_name, name, namlen) ||
809 __put_user(0, dirent->d_name + namlen))
810 goto efault;
811 return 0;
812efault:
813 buf->result = -EFAULT;
814 return -EFAULT;
815}
816
817asmlinkage long compat_sys_old_readdir(unsigned int fd,
818 struct compat_old_linux_dirent __user *dirent, unsigned int count)
819{
820 int error;
821 struct file *file;
822 struct compat_readdir_callback buf;
823
824 error = -EBADF;
825 file = fget(fd);
826 if (!file)
827 goto out;
828
829 buf.result = 0;
830 buf.dirent = dirent;
831
832 error = vfs_readdir(file, compat_fillonedir, &buf);
833 if (error >= 0)
834 error = buf.result;
835
836 fput(file);
837out:
838 return error;
839}
840
841struct compat_linux_dirent {
842 compat_ulong_t d_ino;
843 compat_ulong_t d_off;
844 unsigned short d_reclen;
845 char d_name[1];
846};
847
848struct compat_getdents_callback {
849 struct compat_linux_dirent __user *current_dir;
850 struct compat_linux_dirent __user *previous;
851 int count;
852 int error;
853};
854
855static int compat_filldir(void *__buf, const char *name, int namlen,
afefdbb2 856 loff_t offset, u64 ino, unsigned int d_type)
1da177e4
LT
857{
858 struct compat_linux_dirent __user * dirent;
859 struct compat_getdents_callback *buf = __buf;
afefdbb2 860 compat_ulong_t d_ino;
022a1692 861 int reclen = ALIGN(NAME_OFFSET(dirent) + namlen + 2, sizeof(compat_long_t));
1da177e4
LT
862
863 buf->error = -EINVAL; /* only used if we fail.. */
864 if (reclen > buf->count)
865 return -EINVAL;
afefdbb2 866 d_ino = ino;
8f3f655d
AV
867 if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) {
868 buf->error = -EOVERFLOW;
afefdbb2 869 return -EOVERFLOW;
8f3f655d 870 }
1da177e4
LT
871 dirent = buf->previous;
872 if (dirent) {
873 if (__put_user(offset, &dirent->d_off))
874 goto efault;
875 }
876 dirent = buf->current_dir;
afefdbb2 877 if (__put_user(d_ino, &dirent->d_ino))
1da177e4
LT
878 goto efault;
879 if (__put_user(reclen, &dirent->d_reclen))
880 goto efault;
881 if (copy_to_user(dirent->d_name, name, namlen))
882 goto efault;
883 if (__put_user(0, dirent->d_name + namlen))
884 goto efault;
885 if (__put_user(d_type, (char __user *) dirent + reclen - 1))
886 goto efault;
887 buf->previous = dirent;
888 dirent = (void __user *)dirent + reclen;
889 buf->current_dir = dirent;
890 buf->count -= reclen;
891 return 0;
892efault:
893 buf->error = -EFAULT;
894 return -EFAULT;
895}
896
897asmlinkage long compat_sys_getdents(unsigned int fd,
898 struct compat_linux_dirent __user *dirent, unsigned int count)
899{
900 struct file * file;
901 struct compat_linux_dirent __user * lastdirent;
902 struct compat_getdents_callback buf;
903 int error;
904
905 error = -EFAULT;
906 if (!access_ok(VERIFY_WRITE, dirent, count))
907 goto out;
908
909 error = -EBADF;
910 file = fget(fd);
911 if (!file)
912 goto out;
913
914 buf.current_dir = dirent;
915 buf.previous = NULL;
916 buf.count = count;
917 buf.error = 0;
918
919 error = vfs_readdir(file, compat_filldir, &buf);
920 if (error < 0)
921 goto out_putf;
922 error = buf.error;
923 lastdirent = buf.previous;
924 if (lastdirent) {
925 if (put_user(file->f_pos, &lastdirent->d_off))
926 error = -EFAULT;
927 else
928 error = count - buf.count;
929 }
930
931out_putf:
932 fput(file);
933out:
934 return error;
935}
936
937#ifndef __ARCH_OMIT_COMPAT_SYS_GETDENTS64
1da177e4
LT
938
939struct compat_getdents_callback64 {
940 struct linux_dirent64 __user *current_dir;
941 struct linux_dirent64 __user *previous;
942 int count;
943 int error;
944};
945
946static int compat_filldir64(void * __buf, const char * name, int namlen, loff_t offset,
afefdbb2 947 u64 ino, unsigned int d_type)
1da177e4
LT
948{
949 struct linux_dirent64 __user *dirent;
950 struct compat_getdents_callback64 *buf = __buf;
951 int jj = NAME_OFFSET(dirent);
022a1692 952 int reclen = ALIGN(jj + namlen + 1, sizeof(u64));
1da177e4
LT
953 u64 off;
954
955 buf->error = -EINVAL; /* only used if we fail.. */
956 if (reclen > buf->count)
957 return -EINVAL;
958 dirent = buf->previous;
959
960 if (dirent) {
961 if (__put_user_unaligned(offset, &dirent->d_off))
962 goto efault;
963 }
964 dirent = buf->current_dir;
965 if (__put_user_unaligned(ino, &dirent->d_ino))
966 goto efault;
967 off = 0;
968 if (__put_user_unaligned(off, &dirent->d_off))
969 goto efault;
970 if (__put_user(reclen, &dirent->d_reclen))
971 goto efault;
972 if (__put_user(d_type, &dirent->d_type))
973 goto efault;
974 if (copy_to_user(dirent->d_name, name, namlen))
975 goto efault;
976 if (__put_user(0, dirent->d_name + namlen))
977 goto efault;
978 buf->previous = dirent;
979 dirent = (void __user *)dirent + reclen;
980 buf->current_dir = dirent;
981 buf->count -= reclen;
982 return 0;
983efault:
984 buf->error = -EFAULT;
985 return -EFAULT;
986}
987
988asmlinkage long compat_sys_getdents64(unsigned int fd,
989 struct linux_dirent64 __user * dirent, unsigned int count)
990{
991 struct file * file;
992 struct linux_dirent64 __user * lastdirent;
993 struct compat_getdents_callback64 buf;
994 int error;
995
996 error = -EFAULT;
997 if (!access_ok(VERIFY_WRITE, dirent, count))
998 goto out;
999
1000 error = -EBADF;
1001 file = fget(fd);
1002 if (!file)
1003 goto out;
1004
1005 buf.current_dir = dirent;
1006 buf.previous = NULL;
1007 buf.count = count;
1008 buf.error = 0;
1009
1010 error = vfs_readdir(file, compat_filldir64, &buf);
1011 if (error < 0)
1012 goto out_putf;
1013 error = buf.error;
1014 lastdirent = buf.previous;
1015 if (lastdirent) {
1016 typeof(lastdirent->d_off) d_off = file->f_pos;
7116e994
HC
1017 error = -EFAULT;
1018 if (__put_user_unaligned(d_off, &lastdirent->d_off))
1019 goto out_putf;
1da177e4
LT
1020 error = count - buf.count;
1021 }
1022
1023out_putf:
1024 fput(file);
1025out:
1026 return error;
1027}
1028#endif /* ! __ARCH_OMIT_COMPAT_SYS_GETDENTS64 */
1029
1030static ssize_t compat_do_readv_writev(int type, struct file *file,
1031 const struct compat_iovec __user *uvector,
1032 unsigned long nr_segs, loff_t *pos)
1033{
1da177e4
LT
1034 compat_ssize_t tot_len;
1035 struct iovec iovstack[UIO_FASTIOV];
1036 struct iovec *iov=iovstack, *vector;
1037 ssize_t ret;
1038 int seg;
1039 io_fn_t fn;
1040 iov_fn_t fnv;
1041
1042 /*
1043 * SuS says "The readv() function *may* fail if the iovcnt argument
1044 * was less than or equal to 0, or greater than {IOV_MAX}. Linux has
1045 * traditionally returned zero for zero segments, so...
1046 */
1047 ret = 0;
1048 if (nr_segs == 0)
1049 goto out;
1050
1051 /*
1052 * First get the "struct iovec" from user memory and
1053 * verify all the pointers
1054 */
1055 ret = -EINVAL;
1056 if ((nr_segs > UIO_MAXIOV) || (nr_segs <= 0))
1057 goto out;
1058 if (!file->f_op)
1059 goto out;
1060 if (nr_segs > UIO_FASTIOV) {
1061 ret = -ENOMEM;
1062 iov = kmalloc(nr_segs*sizeof(struct iovec), GFP_KERNEL);
1063 if (!iov)
1064 goto out;
1065 }
1066 ret = -EFAULT;
1067 if (!access_ok(VERIFY_READ, uvector, nr_segs*sizeof(*uvector)))
1068 goto out;
1069
1070 /*
1071 * Single unix specification:
1072 * We should -EINVAL if an element length is not >= 0 and fitting an
1073 * ssize_t. The total length is fitting an ssize_t
1074 *
1075 * Be careful here because iov_len is a size_t not an ssize_t
1076 */
1077 tot_len = 0;
1078 vector = iov;
1079 ret = -EINVAL;
1080 for (seg = 0 ; seg < nr_segs; seg++) {
1081 compat_ssize_t tmp = tot_len;
1082 compat_ssize_t len;
1083 compat_uptr_t buf;
1084
1085 if (__get_user(len, &uvector->iov_len) ||
1086 __get_user(buf, &uvector->iov_base)) {
1087 ret = -EFAULT;
1088 goto out;
1089 }
1090 if (len < 0) /* size_t not fitting an compat_ssize_t .. */
1091 goto out;
1092 tot_len += len;
1093 if (tot_len < tmp) /* maths overflow on the compat_ssize_t */
1094 goto out;
1095 vector->iov_base = compat_ptr(buf);
1096 vector->iov_len = (compat_size_t) len;
1097 uvector++;
1098 vector++;
1099 }
1100 if (tot_len == 0) {
1101 ret = 0;
1102 goto out;
1103 }
1104
1105 ret = rw_verify_area(type, file, pos, tot_len);
e28cc715 1106 if (ret < 0)
1da177e4
LT
1107 goto out;
1108
1109 fnv = NULL;
1110 if (type == READ) {
1111 fn = file->f_op->read;
ee0b3e67 1112 fnv = file->f_op->aio_read;
1da177e4
LT
1113 } else {
1114 fn = (io_fn_t)file->f_op->write;
ee0b3e67 1115 fnv = file->f_op->aio_write;
1da177e4
LT
1116 }
1117
ee0b3e67
BP
1118 if (fnv)
1119 ret = do_sync_readv_writev(file, iov, nr_segs, tot_len,
1120 pos, fnv);
1121 else
1122 ret = do_loop_readv_writev(file, iov, nr_segs, pos, fn);
1da177e4 1123
1da177e4
LT
1124out:
1125 if (iov != iovstack)
1126 kfree(iov);
0eeca283 1127 if ((ret + (type == READ)) > 0) {
0f7fc9e4 1128 struct dentry *dentry = file->f_path.dentry;
0eeca283
RL
1129 if (type == READ)
1130 fsnotify_access(dentry);
1131 else
1132 fsnotify_modify(dentry);
1133 }
1da177e4
LT
1134 return ret;
1135}
1136
1137asmlinkage ssize_t
1138compat_sys_readv(unsigned long fd, const struct compat_iovec __user *vec, unsigned long vlen)
1139{
1140 struct file *file;
1141 ssize_t ret = -EBADF;
1142
1143 file = fget(fd);
1144 if (!file)
1145 return -EBADF;
1146
1147 if (!(file->f_mode & FMODE_READ))
1148 goto out;
1149
1150 ret = -EINVAL;
ee0b3e67 1151 if (!file->f_op || (!file->f_op->aio_read && !file->f_op->read))
1da177e4
LT
1152 goto out;
1153
1154 ret = compat_do_readv_writev(READ, file, vec, vlen, &file->f_pos);
1155
1156out:
1157 fput(file);
1158 return ret;
1159}
1160
1161asmlinkage ssize_t
1162compat_sys_writev(unsigned long fd, const struct compat_iovec __user *vec, unsigned long vlen)
1163{
1164 struct file *file;
1165 ssize_t ret = -EBADF;
1166
1167 file = fget(fd);
1168 if (!file)
1169 return -EBADF;
1170 if (!(file->f_mode & FMODE_WRITE))
1171 goto out;
1172
1173 ret = -EINVAL;
ee0b3e67 1174 if (!file->f_op || (!file->f_op->aio_write && !file->f_op->write))
1da177e4
LT
1175 goto out;
1176
1177 ret = compat_do_readv_writev(WRITE, file, vec, vlen, &file->f_pos);
1178
1179out:
1180 fput(file);
1181 return ret;
1182}
1183
d2610202
AK
1184asmlinkage long
1185compat_sys_vmsplice(int fd, const struct compat_iovec __user *iov32,
1186 unsigned int nr_segs, unsigned int flags)
1187{
1188 unsigned i;
90cbad65 1189 struct iovec __user *iov;
98232d50 1190 if (nr_segs > UIO_MAXIOV)
d2610202
AK
1191 return -EINVAL;
1192 iov = compat_alloc_user_space(nr_segs * sizeof(struct iovec));
1193 for (i = 0; i < nr_segs; i++) {
1194 struct compat_iovec v;
1195 if (get_user(v.iov_base, &iov32[i].iov_base) ||
1196 get_user(v.iov_len, &iov32[i].iov_len) ||
1197 put_user(compat_ptr(v.iov_base), &iov[i].iov_base) ||
1198 put_user(v.iov_len, &iov[i].iov_len))
1199 return -EFAULT;
1200 }
1201 return sys_vmsplice(fd, iov, nr_segs, flags);
1202}
1203
e922efc3
MS
1204/*
1205 * Exactly like fs/open.c:sys_open(), except that it doesn't set the
1206 * O_LARGEFILE flag.
1207 */
1208asmlinkage long
1209compat_sys_open(const char __user *filename, int flags, int mode)
1210{
5590ff0d
UD
1211 return do_sys_open(AT_FDCWD, filename, flags, mode);
1212}
1213
1214/*
1215 * Exactly like fs/open.c:sys_openat(), except that it doesn't set the
1216 * O_LARGEFILE flag.
1217 */
1218asmlinkage long
9ad11ab4 1219compat_sys_openat(unsigned int dfd, const char __user *filename, int flags, int mode)
5590ff0d
UD
1220{
1221 return do_sys_open(dfd, filename, flags, mode);
e922efc3
MS
1222}
1223
1da177e4
LT
1224/*
1225 * compat_count() counts the number of arguments/envelopes. It is basically
1226 * a copy of count() from fs/exec.c, except that it works with 32 bit argv
1227 * and envp pointers.
1228 */
1229static int compat_count(compat_uptr_t __user *argv, int max)
1230{
1231 int i = 0;
1232
1233 if (argv != NULL) {
1234 for (;;) {
1235 compat_uptr_t p;
1236
1237 if (get_user(p, argv))
1238 return -EFAULT;
1239 if (!p)
1240 break;
1241 argv++;
1242 if(++i > max)
1243 return -E2BIG;
1244 }
1245 }
1246 return i;
1247}
1248
1249/*
1250 * compat_copy_strings() is basically a copy of copy_strings() from fs/exec.c
1251 * except that it works with 32 bit argv and envp pointers.
1252 */
1253static int compat_copy_strings(int argc, compat_uptr_t __user *argv,
1254 struct linux_binprm *bprm)
1255{
1256 struct page *kmapped_page = NULL;
1257 char *kaddr = NULL;
b6a2fea3 1258 unsigned long kpos = 0;
1da177e4
LT
1259 int ret;
1260
1261 while (argc-- > 0) {
1262 compat_uptr_t str;
1263 int len;
1264 unsigned long pos;
1265
1266 if (get_user(str, argv+argc) ||
b6a2fea3 1267 !(len = strnlen_user(compat_ptr(str), MAX_ARG_STRLEN))) {
1da177e4
LT
1268 ret = -EFAULT;
1269 goto out;
1270 }
1271
b6a2fea3 1272 if (len > MAX_ARG_STRLEN) {
1da177e4
LT
1273 ret = -E2BIG;
1274 goto out;
1275 }
1276
b6a2fea3 1277 /* We're going to work our way backwords. */
1da177e4 1278 pos = bprm->p;
b6a2fea3
OW
1279 str += len;
1280 bprm->p -= len;
1da177e4
LT
1281
1282 while (len > 0) {
1da177e4 1283 int offset, bytes_to_copy;
1da177e4
LT
1284
1285 offset = pos % PAGE_SIZE;
b6a2fea3
OW
1286 if (offset == 0)
1287 offset = PAGE_SIZE;
1288
1289 bytes_to_copy = offset;
1290 if (bytes_to_copy > len)
1291 bytes_to_copy = len;
1292
1293 offset -= bytes_to_copy;
1294 pos -= bytes_to_copy;
1295 str -= bytes_to_copy;
1296 len -= bytes_to_copy;
1297
1298 if (!kmapped_page || kpos != (pos & PAGE_MASK)) {
1299 struct page *page;
1300
1301#ifdef CONFIG_STACK_GROWSUP
1302 ret = expand_stack_downwards(bprm->vma, pos);
1303 if (ret < 0) {
1304 /* We've exceed the stack rlimit. */
1305 ret = -E2BIG;
1306 goto out;
1307 }
1308#endif
1309 ret = get_user_pages(current, bprm->mm, pos,
1310 1, 1, 1, &page, NULL);
1311 if (ret <= 0) {
1312 /* We've exceed the stack rlimit. */
1313 ret = -E2BIG;
1da177e4
LT
1314 goto out;
1315 }
1da177e4 1316
b6a2fea3
OW
1317 if (kmapped_page) {
1318 flush_kernel_dcache_page(kmapped_page);
1da177e4 1319 kunmap(kmapped_page);
b6a2fea3
OW
1320 put_page(kmapped_page);
1321 }
1da177e4
LT
1322 kmapped_page = page;
1323 kaddr = kmap(kmapped_page);
b6a2fea3
OW
1324 kpos = pos & PAGE_MASK;
1325 flush_cache_page(bprm->vma, kpos,
1326 page_to_pfn(kmapped_page));
1da177e4 1327 }
b6a2fea3
OW
1328 if (copy_from_user(kaddr+offset, compat_ptr(str),
1329 bytes_to_copy)) {
1da177e4
LT
1330 ret = -EFAULT;
1331 goto out;
1332 }
1da177e4
LT
1333 }
1334 }
1335 ret = 0;
1336out:
b6a2fea3
OW
1337 if (kmapped_page) {
1338 flush_kernel_dcache_page(kmapped_page);
1da177e4 1339 kunmap(kmapped_page);
b6a2fea3 1340 put_page(kmapped_page);
1da177e4 1341 }
b6a2fea3 1342 return ret;
1da177e4
LT
1343}
1344
1da177e4
LT
1345/*
1346 * compat_do_execve() is mostly a copy of do_execve(), with the exception
1347 * that it processes 32 bit argv and envp pointers.
1348 */
1349int compat_do_execve(char * filename,
1350 compat_uptr_t __user *argv,
1351 compat_uptr_t __user *envp,
1352 struct pt_regs * regs)
1353{
1354 struct linux_binprm *bprm;
1355 struct file *file;
1356 int retval;
1da177e4
LT
1357
1358 retval = -ENOMEM;
11b0b5ab 1359 bprm = kzalloc(sizeof(*bprm), GFP_KERNEL);
1da177e4
LT
1360 if (!bprm)
1361 goto out_ret;
1da177e4
LT
1362
1363 file = open_exec(filename);
1364 retval = PTR_ERR(file);
1365 if (IS_ERR(file))
1366 goto out_kfree;
1367
1368 sched_exec();
1369
1da177e4
LT
1370 bprm->file = file;
1371 bprm->filename = filename;
1372 bprm->interp = filename;
1da177e4 1373
b6a2fea3
OW
1374 retval = bprm_mm_init(bprm);
1375 if (retval)
1376 goto out_file;
1da177e4 1377
b6a2fea3 1378 bprm->argc = compat_count(argv, MAX_ARG_STRINGS);
1da177e4
LT
1379 if ((retval = bprm->argc) < 0)
1380 goto out_mm;
1381
b6a2fea3 1382 bprm->envc = compat_count(envp, MAX_ARG_STRINGS);
1da177e4
LT
1383 if ((retval = bprm->envc) < 0)
1384 goto out_mm;
1385
1386 retval = security_bprm_alloc(bprm);
1387 if (retval)
1388 goto out;
1389
1390 retval = prepare_binprm(bprm);
1391 if (retval < 0)
1392 goto out;
1393
1394 retval = copy_strings_kernel(1, &bprm->filename, bprm);
1395 if (retval < 0)
1396 goto out;
1397
1398 bprm->exec = bprm->p;
1399 retval = compat_copy_strings(bprm->envc, envp, bprm);
1400 if (retval < 0)
1401 goto out;
1402
1403 retval = compat_copy_strings(bprm->argc, argv, bprm);
1404 if (retval < 0)
1405 goto out;
1406
1407 retval = search_binary_handler(bprm, regs);
1408 if (retval >= 0) {
1da177e4
LT
1409 /* execve success */
1410 security_bprm_free(bprm);
4a805e86 1411 acct_update_integrals(current);
08a6fac1 1412 free_bprm(bprm);
1da177e4
LT
1413 return retval;
1414 }
1415
1416out:
1da177e4
LT
1417 if (bprm->security)
1418 security_bprm_free(bprm);
1419
1420out_mm:
1421 if (bprm->mm)
b6a2fea3 1422 mmput(bprm->mm);
1da177e4
LT
1423
1424out_file:
1425 if (bprm->file) {
1426 allow_write_access(bprm->file);
1427 fput(bprm->file);
1428 }
1429
1430out_kfree:
08a6fac1 1431 free_bprm(bprm);
1da177e4
LT
1432
1433out_ret:
1434 return retval;
1435}
1436
1437#define __COMPAT_NFDBITS (8 * sizeof(compat_ulong_t))
1438
b773ad40
TG
1439static int poll_select_copy_remaining(struct timespec *end_time, void __user *p,
1440 int timeval, int ret)
1441{
1442 struct timespec ts;
1443
1444 if (!p)
1445 return ret;
1446
1447 if (current->personality & STICKY_TIMEOUTS)
1448 goto sticky;
1449
1450 /* No update for zero timeout */
1451 if (!end_time->tv_sec && !end_time->tv_nsec)
1452 return ret;
1453
1454 ktime_get_ts(&ts);
1455 ts = timespec_sub(*end_time, ts);
1456 if (ts.tv_sec < 0)
1457 ts.tv_sec = ts.tv_nsec = 0;
1458
1459 if (timeval) {
1460 struct compat_timeval rtv;
1461
1462 rtv.tv_sec = ts.tv_sec;
1463 rtv.tv_usec = ts.tv_nsec / NSEC_PER_USEC;
1464
1465 if (!copy_to_user(p, &rtv, sizeof(rtv)))
1466 return ret;
1467 } else {
1468 struct compat_timespec rts;
1469
1470 rts.tv_sec = ts.tv_sec;
1471 rts.tv_nsec = ts.tv_nsec;
1472
1473 if (!copy_to_user(p, &rts, sizeof(rts)))
1474 return ret;
1475 }
1476 /*
1477 * If an application puts its timeval in read-only memory, we
1478 * don't want the Linux-specific update to the timeval to
1479 * cause a fault after the select has completed
1480 * successfully. However, because we're not updating the
1481 * timeval, we can't restart the system call.
1482 */
1483
1484sticky:
1485 if (ret == -ERESTARTNOHAND)
1486 ret = -EINTR;
1487 return ret;
1488}
1489
1da177e4
LT
1490/*
1491 * Ooo, nasty. We need here to frob 32-bit unsigned longs to
1492 * 64-bit unsigned longs.
1493 */
858119e1 1494static
1da177e4
LT
1495int compat_get_fd_set(unsigned long nr, compat_ulong_t __user *ufdset,
1496 unsigned long *fdset)
1497{
022a1692 1498 nr = DIV_ROUND_UP(nr, __COMPAT_NFDBITS);
1da177e4
LT
1499 if (ufdset) {
1500 unsigned long odd;
1501
1502 if (!access_ok(VERIFY_WRITE, ufdset, nr*sizeof(compat_ulong_t)))
1503 return -EFAULT;
1504
1505 odd = nr & 1UL;
1506 nr &= ~1UL;
1507 while (nr) {
1508 unsigned long h, l;
7116e994
HC
1509 if (__get_user(l, ufdset) || __get_user(h, ufdset+1))
1510 return -EFAULT;
1da177e4
LT
1511 ufdset += 2;
1512 *fdset++ = h << 32 | l;
1513 nr -= 2;
1514 }
7116e994
HC
1515 if (odd && __get_user(*fdset, ufdset))
1516 return -EFAULT;
1da177e4
LT
1517 } else {
1518 /* Tricky, must clear full unsigned long in the
1519 * kernel fdset at the end, this makes sure that
1520 * actually happens.
1521 */
1522 memset(fdset, 0, ((nr + 1) & ~1)*sizeof(compat_ulong_t));
1523 }
1524 return 0;
1525}
1526
858119e1 1527static
7116e994
HC
1528int compat_set_fd_set(unsigned long nr, compat_ulong_t __user *ufdset,
1529 unsigned long *fdset)
1da177e4
LT
1530{
1531 unsigned long odd;
022a1692 1532 nr = DIV_ROUND_UP(nr, __COMPAT_NFDBITS);
1da177e4
LT
1533
1534 if (!ufdset)
7116e994 1535 return 0;
1da177e4
LT
1536
1537 odd = nr & 1UL;
1538 nr &= ~1UL;
1539 while (nr) {
1540 unsigned long h, l;
1541 l = *fdset++;
1542 h = l >> 32;
7116e994
HC
1543 if (__put_user(l, ufdset) || __put_user(h, ufdset+1))
1544 return -EFAULT;
1da177e4
LT
1545 ufdset += 2;
1546 nr -= 2;
1547 }
7116e994
HC
1548 if (odd && __put_user(*fdset, ufdset))
1549 return -EFAULT;
1550 return 0;
1da177e4
LT
1551}
1552
1553
1554/*
1555 * This is a virtual copy of sys_select from fs/select.c and probably
1556 * should be compared to it from time to time
1557 */
1da177e4
LT
1558
1559/*
1560 * We can actually return ERESTARTSYS instead of EINTR, but I'd
1561 * like to be certain this leads to no problems. So I return
1562 * EINTR just for safety.
1563 *
1564 * Update: ERESTARTSYS breaks at least the xview clock binary, so
1565 * I'm trying ERESTARTNOHAND which restart only when you want to.
1566 */
1567#define MAX_SELECT_SECONDS \
1568 ((unsigned long) (MAX_SCHEDULE_TIMEOUT / HZ)-1)
1569
9f72949f
DW
1570int compat_core_sys_select(int n, compat_ulong_t __user *inp,
1571 compat_ulong_t __user *outp, compat_ulong_t __user *exp, s64 *timeout)
1da177e4
LT
1572{
1573 fd_set_bits fds;
6087b2da 1574 void *bits;
bbea9f69 1575 int size, max_fds, ret = -EINVAL;
a4531edd 1576 struct fdtable *fdt;
6087b2da 1577 long stack_fds[SELECT_STACK_ALLOC/sizeof(long)];
1da177e4 1578
1da177e4
LT
1579 if (n < 0)
1580 goto out_nofds;
1581
bbea9f69 1582 /* max_fds can increase, so grab it once to avoid race */
ac5b8b6f 1583 rcu_read_lock();
a4531edd 1584 fdt = files_fdtable(current->files);
bbea9f69 1585 max_fds = fdt->max_fds;
ac5b8b6f 1586 rcu_read_unlock();
bbea9f69
VL
1587 if (n > max_fds)
1588 n = max_fds;
1da177e4
LT
1589
1590 /*
1591 * We need 6 bitmaps (in/out/ex for both incoming and outgoing),
1592 * since we used fdset we need to allocate memory in units of
1593 * long-words.
1594 */
1da177e4 1595 size = FDS_BYTES(n);
6087b2da
BP
1596 bits = stack_fds;
1597 if (size > sizeof(stack_fds) / 6) {
1598 bits = kmalloc(6 * size, GFP_KERNEL);
1599 ret = -ENOMEM;
1600 if (!bits)
1601 goto out_nofds;
1602 }
1da177e4
LT
1603 fds.in = (unsigned long *) bits;
1604 fds.out = (unsigned long *) (bits + size);
1605 fds.ex = (unsigned long *) (bits + 2*size);
1606 fds.res_in = (unsigned long *) (bits + 3*size);
1607 fds.res_out = (unsigned long *) (bits + 4*size);
1608 fds.res_ex = (unsigned long *) (bits + 5*size);
1609
1610 if ((ret = compat_get_fd_set(n, inp, fds.in)) ||
1611 (ret = compat_get_fd_set(n, outp, fds.out)) ||
1612 (ret = compat_get_fd_set(n, exp, fds.ex)))
1613 goto out;
1614 zero_fd_set(n, fds.res_in);
1615 zero_fd_set(n, fds.res_out);
1616 zero_fd_set(n, fds.res_ex);
1617
9f72949f 1618 ret = do_select(n, &fds, timeout);
1da177e4
LT
1619
1620 if (ret < 0)
1621 goto out;
1622 if (!ret) {
1623 ret = -ERESTARTNOHAND;
1624 if (signal_pending(current))
1625 goto out;
1626 ret = 0;
1627 }
1628
7116e994
HC
1629 if (compat_set_fd_set(n, inp, fds.res_in) ||
1630 compat_set_fd_set(n, outp, fds.res_out) ||
1631 compat_set_fd_set(n, exp, fds.res_ex))
1632 ret = -EFAULT;
1da177e4 1633out:
6087b2da
BP
1634 if (bits != stack_fds)
1635 kfree(bits);
1da177e4
LT
1636out_nofds:
1637 return ret;
1638}
1639
9f72949f
DW
1640asmlinkage long compat_sys_select(int n, compat_ulong_t __user *inp,
1641 compat_ulong_t __user *outp, compat_ulong_t __user *exp,
1642 struct compat_timeval __user *tvp)
1643{
1644 s64 timeout = -1;
1645 struct compat_timeval tv;
1646 int ret;
1647
1648 if (tvp) {
1649 if (copy_from_user(&tv, tvp, sizeof(tv)))
1650 return -EFAULT;
1651
1652 if (tv.tv_sec < 0 || tv.tv_usec < 0)
1653 return -EINVAL;
1654
1655 /* Cast to u64 to make GCC stop complaining */
1656 if ((u64)tv.tv_sec >= (u64)MAX_INT64_SECONDS)
1657 timeout = -1; /* infinite */
1658 else {
022a1692 1659 timeout = DIV_ROUND_UP(tv.tv_usec, 1000000/HZ);
9f72949f
DW
1660 timeout += tv.tv_sec * HZ;
1661 }
1662 }
1663
1664 ret = compat_core_sys_select(n, inp, outp, exp, &timeout);
1665
1666 if (tvp) {
643a6545
AM
1667 struct compat_timeval rtv;
1668
9f72949f
DW
1669 if (current->personality & STICKY_TIMEOUTS)
1670 goto sticky;
643a6545
AM
1671 rtv.tv_usec = jiffies_to_usecs(do_div((*(u64*)&timeout), HZ));
1672 rtv.tv_sec = timeout;
74910e6c 1673 if (compat_timeval_compare(&rtv, &tv) >= 0)
643a6545
AM
1674 rtv = tv;
1675 if (copy_to_user(tvp, &rtv, sizeof(rtv))) {
9f72949f
DW
1676sticky:
1677 /*
1678 * If an application puts its timeval in read-only
1679 * memory, we don't want the Linux-specific update to
1680 * the timeval to cause a fault after the select has
1681 * completed successfully. However, because we're not
1682 * updating the timeval, we can't restart the system
1683 * call.
1684 */
1685 if (ret == -ERESTARTNOHAND)
1686 ret = -EINTR;
1687 }
1688 }
1689
1690 return ret;
1691}
1692
f3de272b 1693#ifdef HAVE_SET_RESTORE_SIGMASK
9f72949f
DW
1694asmlinkage long compat_sys_pselect7(int n, compat_ulong_t __user *inp,
1695 compat_ulong_t __user *outp, compat_ulong_t __user *exp,
1696 struct compat_timespec __user *tsp, compat_sigset_t __user *sigmask,
1697 compat_size_t sigsetsize)
1698{
1699 compat_sigset_t ss32;
1700 sigset_t ksigmask, sigsaved;
cb82a6cd 1701 s64 timeout = MAX_SCHEDULE_TIMEOUT;
9f72949f
DW
1702 struct compat_timespec ts;
1703 int ret;
1704
1705 if (tsp) {
1706 if (copy_from_user(&ts, tsp, sizeof(ts)))
1707 return -EFAULT;
1708
1709 if (ts.tv_sec < 0 || ts.tv_nsec < 0)
1710 return -EINVAL;
1711 }
1712
1713 if (sigmask) {
1714 if (sigsetsize != sizeof(compat_sigset_t))
1715 return -EINVAL;
1716 if (copy_from_user(&ss32, sigmask, sizeof(ss32)))
1717 return -EFAULT;
1718 sigset_from_compat(&ksigmask, &ss32);
1719
1720 sigdelsetmask(&ksigmask, sigmask(SIGKILL)|sigmask(SIGSTOP));
1721 sigprocmask(SIG_SETMASK, &ksigmask, &sigsaved);
1722 }
1723
1724 do {
1725 if (tsp) {
1726 if ((unsigned long)ts.tv_sec < MAX_SELECT_SECONDS) {
022a1692 1727 timeout = DIV_ROUND_UP(ts.tv_nsec, 1000000000/HZ);
9f72949f
DW
1728 timeout += ts.tv_sec * (unsigned long)HZ;
1729 ts.tv_sec = 0;
1730 ts.tv_nsec = 0;
1731 } else {
1732 ts.tv_sec -= MAX_SELECT_SECONDS;
1733 timeout = MAX_SELECT_SECONDS * HZ;
1734 }
1735 }
1736
1737 ret = compat_core_sys_select(n, inp, outp, exp, &timeout);
1738
1739 } while (!ret && !timeout && tsp && (ts.tv_sec || ts.tv_nsec));
1740
87c2b7c0 1741 if (tsp) {
643a6545
AM
1742 struct compat_timespec rts;
1743
87c2b7c0
HC
1744 if (current->personality & STICKY_TIMEOUTS)
1745 goto sticky;
1746
643a6545
AM
1747 rts.tv_sec = timeout / HZ;
1748 rts.tv_nsec = (timeout % HZ) * (NSEC_PER_SEC/HZ);
1749 if (rts.tv_nsec >= NSEC_PER_SEC) {
1750 rts.tv_sec++;
1751 rts.tv_nsec -= NSEC_PER_SEC;
9f72949f 1752 }
74910e6c 1753 if (compat_timespec_compare(&rts, &ts) >= 0)
643a6545 1754 rts = ts;
87c2b7c0
HC
1755 if (copy_to_user(tsp, &rts, sizeof(rts))) {
1756sticky:
1757 /*
1758 * If an application puts its timeval in read-only
1759 * memory, we don't want the Linux-specific update to
1760 * the timeval to cause a fault after the select has
1761 * completed successfully. However, because we're not
1762 * updating the timeval, we can't restart the system
1763 * call.
1764 */
1765 if (ret == -ERESTARTNOHAND)
1766 ret = -EINTR;
1767 }
9f72949f
DW
1768 }
1769
1770 if (ret == -ERESTARTNOHAND) {
1771 /*
1772 * Don't restore the signal mask yet. Let do_signal() deliver
1773 * the signal on the way back to userspace, before the signal
1774 * mask is restored.
1775 */
1776 if (sigmask) {
1777 memcpy(&current->saved_sigmask, &sigsaved,
1778 sizeof(sigsaved));
4e4c22c7 1779 set_restore_sigmask();
9f72949f
DW
1780 }
1781 } else if (sigmask)
1782 sigprocmask(SIG_SETMASK, &sigsaved, NULL);
1783
1784 return ret;
1785}
1786
1787asmlinkage long compat_sys_pselect6(int n, compat_ulong_t __user *inp,
1788 compat_ulong_t __user *outp, compat_ulong_t __user *exp,
1789 struct compat_timespec __user *tsp, void __user *sig)
1790{
1791 compat_size_t sigsetsize = 0;
1792 compat_uptr_t up = 0;
1793
1794 if (sig) {
1795 if (!access_ok(VERIFY_READ, sig,
1796 sizeof(compat_uptr_t)+sizeof(compat_size_t)) ||
1797 __get_user(up, (compat_uptr_t __user *)sig) ||
1798 __get_user(sigsetsize,
1799 (compat_size_t __user *)(sig+sizeof(up))))
1800 return -EFAULT;
1801 }
1802 return compat_sys_pselect7(n, inp, outp, exp, tsp, compat_ptr(up),
1803 sigsetsize);
1804}
1805
1806asmlinkage long compat_sys_ppoll(struct pollfd __user *ufds,
1807 unsigned int nfds, struct compat_timespec __user *tsp,
1808 const compat_sigset_t __user *sigmask, compat_size_t sigsetsize)
1809{
1810 compat_sigset_t ss32;
1811 sigset_t ksigmask, sigsaved;
1812 struct compat_timespec ts;
1813 s64 timeout = -1;
1814 int ret;
1815
1816 if (tsp) {
1817 if (copy_from_user(&ts, tsp, sizeof(ts)))
1818 return -EFAULT;
1819
1820 /* We assume that ts.tv_sec is always lower than
1821 the number of seconds that can be expressed in
1822 an s64. Otherwise the compiler bitches at us */
022a1692 1823 timeout = DIV_ROUND_UP(ts.tv_nsec, 1000000000/HZ);
9f72949f
DW
1824 timeout += ts.tv_sec * HZ;
1825 }
1826
1827 if (sigmask) {
3835a9bd 1828 if (sigsetsize != sizeof(compat_sigset_t))
9f72949f
DW
1829 return -EINVAL;
1830 if (copy_from_user(&ss32, sigmask, sizeof(ss32)))
1831 return -EFAULT;
1832 sigset_from_compat(&ksigmask, &ss32);
1833
1834 sigdelsetmask(&ksigmask, sigmask(SIGKILL)|sigmask(SIGSTOP));
1835 sigprocmask(SIG_SETMASK, &ksigmask, &sigsaved);
1836 }
1837
1838 ret = do_sys_poll(ufds, nfds, &timeout);
1839
1840 /* We can restart this syscall, usually */
1841 if (ret == -EINTR) {
1842 /*
1843 * Don't restore the signal mask yet. Let do_signal() deliver
1844 * the signal on the way back to userspace, before the signal
1845 * mask is restored.
1846 */
1847 if (sigmask) {
1848 memcpy(&current->saved_sigmask, &sigsaved,
1849 sizeof(sigsaved));
4e4c22c7 1850 set_restore_sigmask();
9f72949f
DW
1851 }
1852 ret = -ERESTARTNOHAND;
1853 } else if (sigmask)
1854 sigprocmask(SIG_SETMASK, &sigsaved, NULL);
1855
1856 if (tsp && timeout >= 0) {
643a6545
AM
1857 struct compat_timespec rts;
1858
9f72949f
DW
1859 if (current->personality & STICKY_TIMEOUTS)
1860 goto sticky;
1861 /* Yes, we know it's actually an s64, but it's also positive. */
643a6545
AM
1862 rts.tv_nsec = jiffies_to_usecs(do_div((*(u64*)&timeout), HZ)) *
1863 1000;
1864 rts.tv_sec = timeout;
74910e6c 1865 if (compat_timespec_compare(&rts, &ts) >= 0)
643a6545
AM
1866 rts = ts;
1867 if (copy_to_user(tsp, &rts, sizeof(rts))) {
9f72949f
DW
1868sticky:
1869 /*
1870 * If an application puts its timeval in read-only
1871 * memory, we don't want the Linux-specific update to
1872 * the timeval to cause a fault after the select has
1873 * completed successfully. However, because we're not
1874 * updating the timeval, we can't restart the system
1875 * call.
1876 */
1877 if (ret == -ERESTARTNOHAND && timeout >= 0)
1878 ret = -EINTR;
1879 }
1880 }
1881
1882 return ret;
1883}
f3de272b 1884#endif /* HAVE_SET_RESTORE_SIGMASK */
9f72949f 1885
1da177e4
LT
1886#if defined(CONFIG_NFSD) || defined(CONFIG_NFSD_MODULE)
1887/* Stuff for NFS server syscalls... */
1888struct compat_nfsctl_svc {
1889 u16 svc32_port;
1890 s32 svc32_nthreads;
1891};
1892
1893struct compat_nfsctl_client {
1894 s8 cl32_ident[NFSCLNT_IDMAX+1];
1895 s32 cl32_naddr;
1896 struct in_addr cl32_addrlist[NFSCLNT_ADDRMAX];
1897 s32 cl32_fhkeytype;
1898 s32 cl32_fhkeylen;
1899 u8 cl32_fhkey[NFSCLNT_KEYMAX];
1900};
1901
1902struct compat_nfsctl_export {
1903 char ex32_client[NFSCLNT_IDMAX+1];
1904 char ex32_path[NFS_MAXPATHLEN+1];
1905 compat_dev_t ex32_dev;
1906 compat_ino_t ex32_ino;
1907 compat_int_t ex32_flags;
202e5979
SR
1908 __compat_uid_t ex32_anon_uid;
1909 __compat_gid_t ex32_anon_gid;
1da177e4
LT
1910};
1911
1912struct compat_nfsctl_fdparm {
1913 struct sockaddr gd32_addr;
1914 s8 gd32_path[NFS_MAXPATHLEN+1];
1915 compat_int_t gd32_version;
1916};
1917
1918struct compat_nfsctl_fsparm {
1919 struct sockaddr gd32_addr;
1920 s8 gd32_path[NFS_MAXPATHLEN+1];
1921 compat_int_t gd32_maxlen;
1922};
1923
1924struct compat_nfsctl_arg {
1925 compat_int_t ca32_version; /* safeguard */
1926 union {
1927 struct compat_nfsctl_svc u32_svc;
1928 struct compat_nfsctl_client u32_client;
1929 struct compat_nfsctl_export u32_export;
1930 struct compat_nfsctl_fdparm u32_getfd;
1931 struct compat_nfsctl_fsparm u32_getfs;
1932 } u;
1933#define ca32_svc u.u32_svc
1934#define ca32_client u.u32_client
1935#define ca32_export u.u32_export
1936#define ca32_getfd u.u32_getfd
1937#define ca32_getfs u.u32_getfs
1938};
1939
1940union compat_nfsctl_res {
1941 __u8 cr32_getfh[NFS_FHSIZE];
1942 struct knfsd_fh cr32_getfs;
1943};
1944
d64b1c87
LFS
1945static int compat_nfs_svc_trans(struct nfsctl_arg *karg,
1946 struct compat_nfsctl_arg __user *arg)
1da177e4 1947{
d64b1c87
LFS
1948 if (!access_ok(VERIFY_READ, &arg->ca32_svc, sizeof(arg->ca32_svc)) ||
1949 get_user(karg->ca_version, &arg->ca32_version) ||
1950 __get_user(karg->ca_svc.svc_port, &arg->ca32_svc.svc32_port) ||
1951 __get_user(karg->ca_svc.svc_nthreads,
1952 &arg->ca32_svc.svc32_nthreads))
1953 return -EFAULT;
1954 return 0;
1da177e4
LT
1955}
1956
d64b1c87
LFS
1957static int compat_nfs_clnt_trans(struct nfsctl_arg *karg,
1958 struct compat_nfsctl_arg __user *arg)
1da177e4 1959{
d64b1c87
LFS
1960 if (!access_ok(VERIFY_READ, &arg->ca32_client,
1961 sizeof(arg->ca32_client)) ||
1962 get_user(karg->ca_version, &arg->ca32_version) ||
1963 __copy_from_user(&karg->ca_client.cl_ident[0],
1964 &arg->ca32_client.cl32_ident[0],
1965 NFSCLNT_IDMAX) ||
1966 __get_user(karg->ca_client.cl_naddr,
1967 &arg->ca32_client.cl32_naddr) ||
1968 __copy_from_user(&karg->ca_client.cl_addrlist[0],
1969 &arg->ca32_client.cl32_addrlist[0],
1970 (sizeof(struct in_addr) * NFSCLNT_ADDRMAX)) ||
1971 __get_user(karg->ca_client.cl_fhkeytype,
1972 &arg->ca32_client.cl32_fhkeytype) ||
1973 __get_user(karg->ca_client.cl_fhkeylen,
1974 &arg->ca32_client.cl32_fhkeylen) ||
1975 __copy_from_user(&karg->ca_client.cl_fhkey[0],
1976 &arg->ca32_client.cl32_fhkey[0],
1977 NFSCLNT_KEYMAX))
1978 return -EFAULT;
1da177e4 1979
d64b1c87 1980 return 0;
1da177e4
LT
1981}
1982
d64b1c87
LFS
1983static int compat_nfs_exp_trans(struct nfsctl_arg *karg,
1984 struct compat_nfsctl_arg __user *arg)
1da177e4 1985{
d64b1c87
LFS
1986 if (!access_ok(VERIFY_READ, &arg->ca32_export,
1987 sizeof(arg->ca32_export)) ||
1988 get_user(karg->ca_version, &arg->ca32_version) ||
1989 __copy_from_user(&karg->ca_export.ex_client[0],
1990 &arg->ca32_export.ex32_client[0],
1991 NFSCLNT_IDMAX) ||
1992 __copy_from_user(&karg->ca_export.ex_path[0],
1993 &arg->ca32_export.ex32_path[0],
1994 NFS_MAXPATHLEN) ||
1995 __get_user(karg->ca_export.ex_dev,
1996 &arg->ca32_export.ex32_dev) ||
1997 __get_user(karg->ca_export.ex_ino,
1998 &arg->ca32_export.ex32_ino) ||
1999 __get_user(karg->ca_export.ex_flags,
2000 &arg->ca32_export.ex32_flags) ||
2001 __get_user(karg->ca_export.ex_anon_uid,
2002 &arg->ca32_export.ex32_anon_uid) ||
2003 __get_user(karg->ca_export.ex_anon_gid,
2004 &arg->ca32_export.ex32_anon_gid))
2005 return -EFAULT;
1da177e4
LT
2006 SET_UID(karg->ca_export.ex_anon_uid, karg->ca_export.ex_anon_uid);
2007 SET_GID(karg->ca_export.ex_anon_gid, karg->ca_export.ex_anon_gid);
2008
d64b1c87 2009 return 0;
1da177e4
LT
2010}
2011
d64b1c87
LFS
2012static int compat_nfs_getfd_trans(struct nfsctl_arg *karg,
2013 struct compat_nfsctl_arg __user *arg)
1da177e4 2014{
d64b1c87
LFS
2015 if (!access_ok(VERIFY_READ, &arg->ca32_getfd,
2016 sizeof(arg->ca32_getfd)) ||
2017 get_user(karg->ca_version, &arg->ca32_version) ||
2018 __copy_from_user(&karg->ca_getfd.gd_addr,
2019 &arg->ca32_getfd.gd32_addr,
2020 (sizeof(struct sockaddr))) ||
2021 __copy_from_user(&karg->ca_getfd.gd_path,
2022 &arg->ca32_getfd.gd32_path,
2023 (NFS_MAXPATHLEN+1)) ||
2024 __get_user(karg->ca_getfd.gd_version,
2025 &arg->ca32_getfd.gd32_version))
2026 return -EFAULT;
1da177e4 2027
d64b1c87 2028 return 0;
1da177e4
LT
2029}
2030
d64b1c87
LFS
2031static int compat_nfs_getfs_trans(struct nfsctl_arg *karg,
2032 struct compat_nfsctl_arg __user *arg)
1da177e4 2033{
d64b1c87
LFS
2034 if (!access_ok(VERIFY_READ,&arg->ca32_getfs,sizeof(arg->ca32_getfs)) ||
2035 get_user(karg->ca_version, &arg->ca32_version) ||
2036 __copy_from_user(&karg->ca_getfs.gd_addr,
2037 &arg->ca32_getfs.gd32_addr,
2038 (sizeof(struct sockaddr))) ||
2039 __copy_from_user(&karg->ca_getfs.gd_path,
2040 &arg->ca32_getfs.gd32_path,
2041 (NFS_MAXPATHLEN+1)) ||
2042 __get_user(karg->ca_getfs.gd_maxlen,
2043 &arg->ca32_getfs.gd32_maxlen))
2044 return -EFAULT;
1da177e4 2045
d64b1c87 2046 return 0;
1da177e4
LT
2047}
2048
2049/* This really doesn't need translations, we are only passing
2050 * back a union which contains opaque nfs file handle data.
2051 */
d64b1c87
LFS
2052static int compat_nfs_getfh_res_trans(union nfsctl_res *kres,
2053 union compat_nfsctl_res __user *res)
1da177e4
LT
2054{
2055 int err;
2056
2057 err = copy_to_user(res, kres, sizeof(*res));
2058
2059 return (err) ? -EFAULT : 0;
2060}
2061
d64b1c87
LFS
2062asmlinkage long compat_sys_nfsservctl(int cmd,
2063 struct compat_nfsctl_arg __user *arg,
2064 union compat_nfsctl_res __user *res)
1da177e4
LT
2065{
2066 struct nfsctl_arg *karg;
2067 union nfsctl_res *kres;
2068 mm_segment_t oldfs;
2069 int err;
2070
2071 karg = kmalloc(sizeof(*karg), GFP_USER);
2072 kres = kmalloc(sizeof(*kres), GFP_USER);
2073 if(!karg || !kres) {
2074 err = -ENOMEM;
2075 goto done;
2076 }
2077
2078 switch(cmd) {
2079 case NFSCTL_SVC:
2080 err = compat_nfs_svc_trans(karg, arg);
2081 break;
2082
2083 case NFSCTL_ADDCLIENT:
2084 err = compat_nfs_clnt_trans(karg, arg);
2085 break;
2086
2087 case NFSCTL_DELCLIENT:
2088 err = compat_nfs_clnt_trans(karg, arg);
2089 break;
2090
2091 case NFSCTL_EXPORT:
2092 case NFSCTL_UNEXPORT:
2093 err = compat_nfs_exp_trans(karg, arg);
2094 break;
2095
2096 case NFSCTL_GETFD:
2097 err = compat_nfs_getfd_trans(karg, arg);
2098 break;
2099
2100 case NFSCTL_GETFS:
2101 err = compat_nfs_getfs_trans(karg, arg);
2102 break;
2103
2104 default:
2105 err = -EINVAL;
57070d01 2106 break;
1da177e4
LT
2107 }
2108
57070d01
PS
2109 if (err)
2110 goto done;
2111
1da177e4
LT
2112 oldfs = get_fs();
2113 set_fs(KERNEL_DS);
2114 /* The __user pointer casts are valid because of the set_fs() */
2115 err = sys_nfsservctl(cmd, (void __user *) karg, (void __user *) kres);
2116 set_fs(oldfs);
2117
2118 if (err)
2119 goto done;
2120
2121 if((cmd == NFSCTL_GETFD) ||
2122 (cmd == NFSCTL_GETFS))
2123 err = compat_nfs_getfh_res_trans(kres, res);
2124
2125done:
2126 kfree(karg);
2127 kfree(kres);
2128 return err;
2129}
2130#else /* !NFSD */
2131long asmlinkage compat_sys_nfsservctl(int cmd, void *notused, void *notused2)
2132{
2133 return sys_ni_syscall();
2134}
2135#endif
f6dfb4fd
DL
2136
2137#ifdef CONFIG_EPOLL
2138
f3de272b 2139#ifdef HAVE_SET_RESTORE_SIGMASK
f6dfb4fd
DL
2140asmlinkage long compat_sys_epoll_pwait(int epfd,
2141 struct compat_epoll_event __user *events,
2142 int maxevents, int timeout,
2143 const compat_sigset_t __user *sigmask,
2144 compat_size_t sigsetsize)
2145{
2146 long err;
2147 compat_sigset_t csigmask;
2148 sigset_t ksigmask, sigsaved;
2149
2150 /*
2151 * If the caller wants a certain signal mask to be set during the wait,
2152 * we apply it here.
2153 */
2154 if (sigmask) {
2155 if (sigsetsize != sizeof(compat_sigset_t))
2156 return -EINVAL;
2157 if (copy_from_user(&csigmask, sigmask, sizeof(csigmask)))
2158 return -EFAULT;
2159 sigset_from_compat(&ksigmask, &csigmask);
2160 sigdelsetmask(&ksigmask, sigmask(SIGKILL) | sigmask(SIGSTOP));
2161 sigprocmask(SIG_SETMASK, &ksigmask, &sigsaved);
2162 }
2163
f6dfb4fd 2164 err = sys_epoll_wait(epfd, events, maxevents, timeout);
f6dfb4fd
DL
2165
2166 /*
2167 * If we changed the signal mask, we need to restore the original one.
2168 * In case we've got a signal while waiting, we do not restore the
2169 * signal mask yet, and we allow do_signal() to deliver the signal on
2170 * the way back to userspace, before the signal mask is restored.
2171 */
2172 if (sigmask) {
2173 if (err == -EINTR) {
2174 memcpy(&current->saved_sigmask, &sigsaved,
2175 sizeof(sigsaved));
4e4c22c7 2176 set_restore_sigmask();
f6dfb4fd
DL
2177 } else
2178 sigprocmask(SIG_SETMASK, &sigsaved, NULL);
2179 }
2180
2181 return err;
2182}
f3de272b 2183#endif /* HAVE_SET_RESTORE_SIGMASK */
f6dfb4fd
DL
2184
2185#endif /* CONFIG_EPOLL */
6d18c922
DL
2186
2187#ifdef CONFIG_SIGNALFD
2188
9deb27ba
UD
2189asmlinkage long compat_sys_signalfd4(int ufd,
2190 const compat_sigset_t __user *sigmask,
2191 compat_size_t sigsetsize, int flags)
6d18c922
DL
2192{
2193 compat_sigset_t ss32;
2194 sigset_t tmp;
2195 sigset_t __user *ksigmask;
2196
2197 if (sigsetsize != sizeof(compat_sigset_t))
2198 return -EINVAL;
2199 if (copy_from_user(&ss32, sigmask, sizeof(ss32)))
2200 return -EFAULT;
2201 sigset_from_compat(&tmp, &ss32);
2202 ksigmask = compat_alloc_user_space(sizeof(sigset_t));
2203 if (copy_to_user(ksigmask, &tmp, sizeof(sigset_t)))
2204 return -EFAULT;
2205
9deb27ba 2206 return sys_signalfd4(ufd, ksigmask, sizeof(sigset_t), flags);
6d18c922
DL
2207}
2208
9deb27ba
UD
2209asmlinkage long compat_sys_signalfd(int ufd,
2210 const compat_sigset_t __user *sigmask,
2211 compat_size_t sigsetsize)
2212{
2213 return compat_sys_signalfd4(ufd, sigmask, sigsetsize, 0);
2214}
6d18c922
DL
2215#endif /* CONFIG_SIGNALFD */
2216
83f5d126
DL
2217#ifdef CONFIG_TIMERFD
2218
4d672e7a
DL
2219asmlinkage long compat_sys_timerfd_settime(int ufd, int flags,
2220 const struct compat_itimerspec __user *utmr,
2221 struct compat_itimerspec __user *otmr)
83f5d126 2222{
4d672e7a 2223 int error;
83f5d126
DL
2224 struct itimerspec t;
2225 struct itimerspec __user *ut;
2226
83f5d126 2227 if (get_compat_itimerspec(&t, utmr))
8317f14b 2228 return -EFAULT;
4d672e7a
DL
2229 ut = compat_alloc_user_space(2 * sizeof(struct itimerspec));
2230 if (copy_to_user(&ut[0], &t, sizeof(t)))
8317f14b 2231 return -EFAULT;
4d672e7a
DL
2232 error = sys_timerfd_settime(ufd, flags, &ut[0], &ut[1]);
2233 if (!error && otmr)
2234 error = (copy_from_user(&t, &ut[1], sizeof(struct itimerspec)) ||
2235 put_compat_itimerspec(otmr, &t)) ? -EFAULT: 0;
2236
2237 return error;
2238}
2239
2240asmlinkage long compat_sys_timerfd_gettime(int ufd,
2241 struct compat_itimerspec __user *otmr)
2242{
2243 int error;
2244 struct itimerspec t;
2245 struct itimerspec __user *ut;
83f5d126 2246
4d672e7a
DL
2247 ut = compat_alloc_user_space(sizeof(struct itimerspec));
2248 error = sys_timerfd_gettime(ufd, ut);
2249 if (!error)
2250 error = (copy_from_user(&t, ut, sizeof(struct itimerspec)) ||
2251 put_compat_itimerspec(otmr, &t)) ? -EFAULT: 0;
2252
2253 return error;
83f5d126
DL
2254}
2255
2256#endif /* CONFIG_TIMERFD */