]> bbs.cooldavid.org Git - net-next-2.6.git/blame_incremental - fs/compat.c
xps: Transmit Packet Steering
[net-next-2.6.git] / fs / compat.c
... / ...
CommitLineData
1/*
2 * linux/fs/compat.c
3 *
4 * Kernel compatibililty routines for e.g. 32 bit syscall support
5 * on 64 bit kernels.
6 *
7 * Copyright (C) 2002 Stephen Rothwell, IBM Corporation
8 * Copyright (C) 1997-2000 Jakub Jelinek (jakub@redhat.com)
9 * Copyright (C) 1998 Eddie C. Dost (ecd@skynet.be)
10 * Copyright (C) 2001,2002 Andi Kleen, SuSE Labs
11 * Copyright (C) 2003 Pavel Machek (pavel@ucw.cz)
12 *
13 * This program is free software; you can redistribute it and/or modify
14 * it under the terms of the GNU General Public License version 2 as
15 * published by the Free Software Foundation.
16 */
17
18#include <linux/stddef.h>
19#include <linux/kernel.h>
20#include <linux/linkage.h>
21#include <linux/compat.h>
22#include <linux/errno.h>
23#include <linux/time.h>
24#include <linux/fs.h>
25#include <linux/fcntl.h>
26#include <linux/namei.h>
27#include <linux/file.h>
28#include <linux/fdtable.h>
29#include <linux/vfs.h>
30#include <linux/ioctl.h>
31#include <linux/init.h>
32#include <linux/ncp_mount.h>
33#include <linux/nfs4_mount.h>
34#include <linux/syscalls.h>
35#include <linux/ctype.h>
36#include <linux/module.h>
37#include <linux/dirent.h>
38#include <linux/fsnotify.h>
39#include <linux/highuid.h>
40#include <linux/nfsd/syscall.h>
41#include <linux/personality.h>
42#include <linux/rwsem.h>
43#include <linux/tsacct_kern.h>
44#include <linux/security.h>
45#include <linux/highmem.h>
46#include <linux/signal.h>
47#include <linux/poll.h>
48#include <linux/mm.h>
49#include <linux/eventpoll.h>
50#include <linux/fs_struct.h>
51#include <linux/slab.h>
52#include <linux/pagemap.h>
53
54#include <asm/uaccess.h>
55#include <asm/mmu_context.h>
56#include <asm/ioctls.h>
57#include "internal.h"
58
59int compat_log = 1;
60
61int compat_printk(const char *fmt, ...)
62{
63 va_list ap;
64 int ret;
65 if (!compat_log)
66 return 0;
67 va_start(ap, fmt);
68 ret = vprintk(fmt, ap);
69 va_end(ap);
70 return ret;
71}
72
73#include "read_write.h"
74
75/*
76 * Not all architectures have sys_utime, so implement this in terms
77 * of sys_utimes.
78 */
79asmlinkage long compat_sys_utime(const char __user *filename,
80 struct compat_utimbuf __user *t)
81{
82 struct timespec tv[2];
83
84 if (t) {
85 if (get_user(tv[0].tv_sec, &t->actime) ||
86 get_user(tv[1].tv_sec, &t->modtime))
87 return -EFAULT;
88 tv[0].tv_nsec = 0;
89 tv[1].tv_nsec = 0;
90 }
91 return do_utimes(AT_FDCWD, filename, t ? tv : NULL, 0);
92}
93
94asmlinkage long compat_sys_utimensat(unsigned int dfd, const char __user *filename, struct compat_timespec __user *t, int flags)
95{
96 struct timespec tv[2];
97
98 if (t) {
99 if (get_compat_timespec(&tv[0], &t[0]) ||
100 get_compat_timespec(&tv[1], &t[1]))
101 return -EFAULT;
102
103 if (tv[0].tv_nsec == UTIME_OMIT && tv[1].tv_nsec == UTIME_OMIT)
104 return 0;
105 }
106 return do_utimes(dfd, filename, t ? tv : NULL, flags);
107}
108
109asmlinkage long compat_sys_futimesat(unsigned int dfd, const char __user *filename, struct compat_timeval __user *t)
110{
111 struct timespec tv[2];
112
113 if (t) {
114 if (get_user(tv[0].tv_sec, &t[0].tv_sec) ||
115 get_user(tv[0].tv_nsec, &t[0].tv_usec) ||
116 get_user(tv[1].tv_sec, &t[1].tv_sec) ||
117 get_user(tv[1].tv_nsec, &t[1].tv_usec))
118 return -EFAULT;
119 if (tv[0].tv_nsec >= 1000000 || tv[0].tv_nsec < 0 ||
120 tv[1].tv_nsec >= 1000000 || tv[1].tv_nsec < 0)
121 return -EINVAL;
122 tv[0].tv_nsec *= 1000;
123 tv[1].tv_nsec *= 1000;
124 }
125 return do_utimes(dfd, filename, t ? tv : NULL, 0);
126}
127
128asmlinkage long compat_sys_utimes(const char __user *filename, struct compat_timeval __user *t)
129{
130 return compat_sys_futimesat(AT_FDCWD, filename, t);
131}
132
133static int cp_compat_stat(struct kstat *stat, struct compat_stat __user *ubuf)
134{
135 compat_ino_t ino = stat->ino;
136 typeof(ubuf->st_uid) uid = 0;
137 typeof(ubuf->st_gid) gid = 0;
138 int err;
139
140 SET_UID(uid, stat->uid);
141 SET_GID(gid, stat->gid);
142
143 if ((u64) stat->size > MAX_NON_LFS ||
144 !old_valid_dev(stat->dev) ||
145 !old_valid_dev(stat->rdev))
146 return -EOVERFLOW;
147 if (sizeof(ino) < sizeof(stat->ino) && ino != stat->ino)
148 return -EOVERFLOW;
149
150 if (clear_user(ubuf, sizeof(*ubuf)))
151 return -EFAULT;
152
153 err = __put_user(old_encode_dev(stat->dev), &ubuf->st_dev);
154 err |= __put_user(ino, &ubuf->st_ino);
155 err |= __put_user(stat->mode, &ubuf->st_mode);
156 err |= __put_user(stat->nlink, &ubuf->st_nlink);
157 err |= __put_user(uid, &ubuf->st_uid);
158 err |= __put_user(gid, &ubuf->st_gid);
159 err |= __put_user(old_encode_dev(stat->rdev), &ubuf->st_rdev);
160 err |= __put_user(stat->size, &ubuf->st_size);
161 err |= __put_user(stat->atime.tv_sec, &ubuf->st_atime);
162 err |= __put_user(stat->atime.tv_nsec, &ubuf->st_atime_nsec);
163 err |= __put_user(stat->mtime.tv_sec, &ubuf->st_mtime);
164 err |= __put_user(stat->mtime.tv_nsec, &ubuf->st_mtime_nsec);
165 err |= __put_user(stat->ctime.tv_sec, &ubuf->st_ctime);
166 err |= __put_user(stat->ctime.tv_nsec, &ubuf->st_ctime_nsec);
167 err |= __put_user(stat->blksize, &ubuf->st_blksize);
168 err |= __put_user(stat->blocks, &ubuf->st_blocks);
169 return err;
170}
171
172asmlinkage long compat_sys_newstat(const char __user * filename,
173 struct compat_stat __user *statbuf)
174{
175 struct kstat stat;
176 int error;
177
178 error = vfs_stat(filename, &stat);
179 if (error)
180 return error;
181 return cp_compat_stat(&stat, statbuf);
182}
183
184asmlinkage long compat_sys_newlstat(const char __user * filename,
185 struct compat_stat __user *statbuf)
186{
187 struct kstat stat;
188 int error;
189
190 error = vfs_lstat(filename, &stat);
191 if (error)
192 return error;
193 return cp_compat_stat(&stat, statbuf);
194}
195
196#ifndef __ARCH_WANT_STAT64
197asmlinkage long compat_sys_newfstatat(unsigned int dfd,
198 const char __user *filename,
199 struct compat_stat __user *statbuf, int flag)
200{
201 struct kstat stat;
202 int error;
203
204 error = vfs_fstatat(dfd, filename, &stat, flag);
205 if (error)
206 return error;
207 return cp_compat_stat(&stat, statbuf);
208}
209#endif
210
211asmlinkage long compat_sys_newfstat(unsigned int fd,
212 struct compat_stat __user * statbuf)
213{
214 struct kstat stat;
215 int error = vfs_fstat(fd, &stat);
216
217 if (!error)
218 error = cp_compat_stat(&stat, statbuf);
219 return error;
220}
221
222static int put_compat_statfs(struct compat_statfs __user *ubuf, struct kstatfs *kbuf)
223{
224
225 if (sizeof ubuf->f_blocks == 4) {
226 if ((kbuf->f_blocks | kbuf->f_bfree | kbuf->f_bavail |
227 kbuf->f_bsize | kbuf->f_frsize) & 0xffffffff00000000ULL)
228 return -EOVERFLOW;
229 /* f_files and f_ffree may be -1; it's okay
230 * to stuff that into 32 bits */
231 if (kbuf->f_files != 0xffffffffffffffffULL
232 && (kbuf->f_files & 0xffffffff00000000ULL))
233 return -EOVERFLOW;
234 if (kbuf->f_ffree != 0xffffffffffffffffULL
235 && (kbuf->f_ffree & 0xffffffff00000000ULL))
236 return -EOVERFLOW;
237 }
238 if (!access_ok(VERIFY_WRITE, ubuf, sizeof(*ubuf)) ||
239 __put_user(kbuf->f_type, &ubuf->f_type) ||
240 __put_user(kbuf->f_bsize, &ubuf->f_bsize) ||
241 __put_user(kbuf->f_blocks, &ubuf->f_blocks) ||
242 __put_user(kbuf->f_bfree, &ubuf->f_bfree) ||
243 __put_user(kbuf->f_bavail, &ubuf->f_bavail) ||
244 __put_user(kbuf->f_files, &ubuf->f_files) ||
245 __put_user(kbuf->f_ffree, &ubuf->f_ffree) ||
246 __put_user(kbuf->f_namelen, &ubuf->f_namelen) ||
247 __put_user(kbuf->f_fsid.val[0], &ubuf->f_fsid.val[0]) ||
248 __put_user(kbuf->f_fsid.val[1], &ubuf->f_fsid.val[1]) ||
249 __put_user(kbuf->f_frsize, &ubuf->f_frsize) ||
250 __put_user(0, &ubuf->f_spare[0]) ||
251 __put_user(0, &ubuf->f_spare[1]) ||
252 __put_user(0, &ubuf->f_spare[2]) ||
253 __put_user(0, &ubuf->f_spare[3]) ||
254 __put_user(0, &ubuf->f_spare[4]))
255 return -EFAULT;
256 return 0;
257}
258
259/*
260 * The following statfs calls are copies of code from fs/open.c and
261 * should be checked against those from time to time
262 */
263asmlinkage long compat_sys_statfs(const char __user *pathname, struct compat_statfs __user *buf)
264{
265 struct path path;
266 int error;
267
268 error = user_path(pathname, &path);
269 if (!error) {
270 struct kstatfs tmp;
271 error = vfs_statfs(&path, &tmp);
272 if (!error)
273 error = put_compat_statfs(buf, &tmp);
274 path_put(&path);
275 }
276 return error;
277}
278
279asmlinkage long compat_sys_fstatfs(unsigned int fd, struct compat_statfs __user *buf)
280{
281 struct file * file;
282 struct kstatfs tmp;
283 int error;
284
285 error = -EBADF;
286 file = fget(fd);
287 if (!file)
288 goto out;
289 error = vfs_statfs(&file->f_path, &tmp);
290 if (!error)
291 error = put_compat_statfs(buf, &tmp);
292 fput(file);
293out:
294 return error;
295}
296
297static int put_compat_statfs64(struct compat_statfs64 __user *ubuf, struct kstatfs *kbuf)
298{
299 if (sizeof ubuf->f_blocks == 4) {
300 if ((kbuf->f_blocks | kbuf->f_bfree | kbuf->f_bavail |
301 kbuf->f_bsize | kbuf->f_frsize) & 0xffffffff00000000ULL)
302 return -EOVERFLOW;
303 /* f_files and f_ffree may be -1; it's okay
304 * to stuff that into 32 bits */
305 if (kbuf->f_files != 0xffffffffffffffffULL
306 && (kbuf->f_files & 0xffffffff00000000ULL))
307 return -EOVERFLOW;
308 if (kbuf->f_ffree != 0xffffffffffffffffULL
309 && (kbuf->f_ffree & 0xffffffff00000000ULL))
310 return -EOVERFLOW;
311 }
312 if (!access_ok(VERIFY_WRITE, ubuf, sizeof(*ubuf)) ||
313 __put_user(kbuf->f_type, &ubuf->f_type) ||
314 __put_user(kbuf->f_bsize, &ubuf->f_bsize) ||
315 __put_user(kbuf->f_blocks, &ubuf->f_blocks) ||
316 __put_user(kbuf->f_bfree, &ubuf->f_bfree) ||
317 __put_user(kbuf->f_bavail, &ubuf->f_bavail) ||
318 __put_user(kbuf->f_files, &ubuf->f_files) ||
319 __put_user(kbuf->f_ffree, &ubuf->f_ffree) ||
320 __put_user(kbuf->f_namelen, &ubuf->f_namelen) ||
321 __put_user(kbuf->f_fsid.val[0], &ubuf->f_fsid.val[0]) ||
322 __put_user(kbuf->f_fsid.val[1], &ubuf->f_fsid.val[1]) ||
323 __put_user(kbuf->f_frsize, &ubuf->f_frsize))
324 return -EFAULT;
325 return 0;
326}
327
328asmlinkage long compat_sys_statfs64(const char __user *pathname, compat_size_t sz, struct compat_statfs64 __user *buf)
329{
330 struct path path;
331 int error;
332
333 if (sz != sizeof(*buf))
334 return -EINVAL;
335
336 error = user_path(pathname, &path);
337 if (!error) {
338 struct kstatfs tmp;
339 error = vfs_statfs(&path, &tmp);
340 if (!error)
341 error = put_compat_statfs64(buf, &tmp);
342 path_put(&path);
343 }
344 return error;
345}
346
347asmlinkage long compat_sys_fstatfs64(unsigned int fd, compat_size_t sz, struct compat_statfs64 __user *buf)
348{
349 struct file * file;
350 struct kstatfs tmp;
351 int error;
352
353 if (sz != sizeof(*buf))
354 return -EINVAL;
355
356 error = -EBADF;
357 file = fget(fd);
358 if (!file)
359 goto out;
360 error = vfs_statfs(&file->f_path, &tmp);
361 if (!error)
362 error = put_compat_statfs64(buf, &tmp);
363 fput(file);
364out:
365 return error;
366}
367
368/*
369 * This is a copy of sys_ustat, just dealing with a structure layout.
370 * Given how simple this syscall is that apporach is more maintainable
371 * than the various conversion hacks.
372 */
373asmlinkage long compat_sys_ustat(unsigned dev, struct compat_ustat __user *u)
374{
375 struct super_block *sb;
376 struct compat_ustat tmp;
377 struct kstatfs sbuf;
378 int err;
379
380 sb = user_get_super(new_decode_dev(dev));
381 if (!sb)
382 return -EINVAL;
383 err = statfs_by_dentry(sb->s_root, &sbuf);
384 drop_super(sb);
385 if (err)
386 return err;
387
388 memset(&tmp, 0, sizeof(struct compat_ustat));
389 tmp.f_tfree = sbuf.f_bfree;
390 tmp.f_tinode = sbuf.f_ffree;
391 if (copy_to_user(u, &tmp, sizeof(struct compat_ustat)))
392 return -EFAULT;
393 return 0;
394}
395
396static int get_compat_flock(struct flock *kfl, struct compat_flock __user *ufl)
397{
398 if (!access_ok(VERIFY_READ, ufl, sizeof(*ufl)) ||
399 __get_user(kfl->l_type, &ufl->l_type) ||
400 __get_user(kfl->l_whence, &ufl->l_whence) ||
401 __get_user(kfl->l_start, &ufl->l_start) ||
402 __get_user(kfl->l_len, &ufl->l_len) ||
403 __get_user(kfl->l_pid, &ufl->l_pid))
404 return -EFAULT;
405 return 0;
406}
407
408static int put_compat_flock(struct flock *kfl, struct compat_flock __user *ufl)
409{
410 if (!access_ok(VERIFY_WRITE, ufl, sizeof(*ufl)) ||
411 __put_user(kfl->l_type, &ufl->l_type) ||
412 __put_user(kfl->l_whence, &ufl->l_whence) ||
413 __put_user(kfl->l_start, &ufl->l_start) ||
414 __put_user(kfl->l_len, &ufl->l_len) ||
415 __put_user(kfl->l_pid, &ufl->l_pid))
416 return -EFAULT;
417 return 0;
418}
419
420#ifndef HAVE_ARCH_GET_COMPAT_FLOCK64
421static int get_compat_flock64(struct flock *kfl, struct compat_flock64 __user *ufl)
422{
423 if (!access_ok(VERIFY_READ, ufl, sizeof(*ufl)) ||
424 __get_user(kfl->l_type, &ufl->l_type) ||
425 __get_user(kfl->l_whence, &ufl->l_whence) ||
426 __get_user(kfl->l_start, &ufl->l_start) ||
427 __get_user(kfl->l_len, &ufl->l_len) ||
428 __get_user(kfl->l_pid, &ufl->l_pid))
429 return -EFAULT;
430 return 0;
431}
432#endif
433
434#ifndef HAVE_ARCH_PUT_COMPAT_FLOCK64
435static int put_compat_flock64(struct flock *kfl, struct compat_flock64 __user *ufl)
436{
437 if (!access_ok(VERIFY_WRITE, ufl, sizeof(*ufl)) ||
438 __put_user(kfl->l_type, &ufl->l_type) ||
439 __put_user(kfl->l_whence, &ufl->l_whence) ||
440 __put_user(kfl->l_start, &ufl->l_start) ||
441 __put_user(kfl->l_len, &ufl->l_len) ||
442 __put_user(kfl->l_pid, &ufl->l_pid))
443 return -EFAULT;
444 return 0;
445}
446#endif
447
448asmlinkage long compat_sys_fcntl64(unsigned int fd, unsigned int cmd,
449 unsigned long arg)
450{
451 mm_segment_t old_fs;
452 struct flock f;
453 long ret;
454
455 switch (cmd) {
456 case F_GETLK:
457 case F_SETLK:
458 case F_SETLKW:
459 ret = get_compat_flock(&f, compat_ptr(arg));
460 if (ret != 0)
461 break;
462 old_fs = get_fs();
463 set_fs(KERNEL_DS);
464 ret = sys_fcntl(fd, cmd, (unsigned long)&f);
465 set_fs(old_fs);
466 if (cmd == F_GETLK && ret == 0) {
467 /* GETLK was successful and we need to return the data...
468 * but it needs to fit in the compat structure.
469 * l_start shouldn't be too big, unless the original
470 * start + end is greater than COMPAT_OFF_T_MAX, in which
471 * case the app was asking for trouble, so we return
472 * -EOVERFLOW in that case.
473 * l_len could be too big, in which case we just truncate it,
474 * and only allow the app to see that part of the conflicting
475 * lock that might make sense to it anyway
476 */
477
478 if (f.l_start > COMPAT_OFF_T_MAX)
479 ret = -EOVERFLOW;
480 if (f.l_len > COMPAT_OFF_T_MAX)
481 f.l_len = COMPAT_OFF_T_MAX;
482 if (ret == 0)
483 ret = put_compat_flock(&f, compat_ptr(arg));
484 }
485 break;
486
487 case F_GETLK64:
488 case F_SETLK64:
489 case F_SETLKW64:
490 ret = get_compat_flock64(&f, compat_ptr(arg));
491 if (ret != 0)
492 break;
493 old_fs = get_fs();
494 set_fs(KERNEL_DS);
495 ret = sys_fcntl(fd, (cmd == F_GETLK64) ? F_GETLK :
496 ((cmd == F_SETLK64) ? F_SETLK : F_SETLKW),
497 (unsigned long)&f);
498 set_fs(old_fs);
499 if (cmd == F_GETLK64 && ret == 0) {
500 /* need to return lock information - see above for commentary */
501 if (f.l_start > COMPAT_LOFF_T_MAX)
502 ret = -EOVERFLOW;
503 if (f.l_len > COMPAT_LOFF_T_MAX)
504 f.l_len = COMPAT_LOFF_T_MAX;
505 if (ret == 0)
506 ret = put_compat_flock64(&f, compat_ptr(arg));
507 }
508 break;
509
510 default:
511 ret = sys_fcntl(fd, cmd, arg);
512 break;
513 }
514 return ret;
515}
516
517asmlinkage long compat_sys_fcntl(unsigned int fd, unsigned int cmd,
518 unsigned long arg)
519{
520 if ((cmd == F_GETLK64) || (cmd == F_SETLK64) || (cmd == F_SETLKW64))
521 return -EINVAL;
522 return compat_sys_fcntl64(fd, cmd, arg);
523}
524
525asmlinkage long
526compat_sys_io_setup(unsigned nr_reqs, u32 __user *ctx32p)
527{
528 long ret;
529 aio_context_t ctx64;
530
531 mm_segment_t oldfs = get_fs();
532 if (unlikely(get_user(ctx64, ctx32p)))
533 return -EFAULT;
534
535 set_fs(KERNEL_DS);
536 /* The __user pointer cast is valid because of the set_fs() */
537 ret = sys_io_setup(nr_reqs, (aio_context_t __user *) &ctx64);
538 set_fs(oldfs);
539 /* truncating is ok because it's a user address */
540 if (!ret)
541 ret = put_user((u32) ctx64, ctx32p);
542 return ret;
543}
544
545asmlinkage long
546compat_sys_io_getevents(aio_context_t ctx_id,
547 unsigned long min_nr,
548 unsigned long nr,
549 struct io_event __user *events,
550 struct compat_timespec __user *timeout)
551{
552 long ret;
553 struct timespec t;
554 struct timespec __user *ut = NULL;
555
556 ret = -EFAULT;
557 if (unlikely(!access_ok(VERIFY_WRITE, events,
558 nr * sizeof(struct io_event))))
559 goto out;
560 if (timeout) {
561 if (get_compat_timespec(&t, timeout))
562 goto out;
563
564 ut = compat_alloc_user_space(sizeof(*ut));
565 if (copy_to_user(ut, &t, sizeof(t)) )
566 goto out;
567 }
568 ret = sys_io_getevents(ctx_id, min_nr, nr, events, ut);
569out:
570 return ret;
571}
572
573/* A write operation does a read from user space and vice versa */
574#define vrfy_dir(type) ((type) == READ ? VERIFY_WRITE : VERIFY_READ)
575
576ssize_t compat_rw_copy_check_uvector(int type,
577 const struct compat_iovec __user *uvector, unsigned long nr_segs,
578 unsigned long fast_segs, struct iovec *fast_pointer,
579 struct iovec **ret_pointer)
580{
581 compat_ssize_t tot_len;
582 struct iovec *iov = *ret_pointer = fast_pointer;
583 ssize_t ret = 0;
584 int seg;
585
586 /*
587 * SuS says "The readv() function *may* fail if the iovcnt argument
588 * was less than or equal to 0, or greater than {IOV_MAX}. Linux has
589 * traditionally returned zero for zero segments, so...
590 */
591 if (nr_segs == 0)
592 goto out;
593
594 ret = -EINVAL;
595 if (nr_segs > UIO_MAXIOV || nr_segs < 0)
596 goto out;
597 if (nr_segs > fast_segs) {
598 ret = -ENOMEM;
599 iov = kmalloc(nr_segs*sizeof(struct iovec), GFP_KERNEL);
600 if (iov == NULL) {
601 *ret_pointer = fast_pointer;
602 goto out;
603 }
604 }
605 *ret_pointer = iov;
606
607 /*
608 * Single unix specification:
609 * We should -EINVAL if an element length is not >= 0 and fitting an
610 * ssize_t.
611 *
612 * In Linux, the total length is limited to MAX_RW_COUNT, there is
613 * no overflow possibility.
614 */
615 tot_len = 0;
616 ret = -EINVAL;
617 for (seg = 0; seg < nr_segs; seg++) {
618 compat_uptr_t buf;
619 compat_ssize_t len;
620
621 if (__get_user(len, &uvector->iov_len) ||
622 __get_user(buf, &uvector->iov_base)) {
623 ret = -EFAULT;
624 goto out;
625 }
626 if (len < 0) /* size_t not fitting in compat_ssize_t .. */
627 goto out;
628 if (!access_ok(vrfy_dir(type), compat_ptr(buf), len)) {
629 ret = -EFAULT;
630 goto out;
631 }
632 if (len > MAX_RW_COUNT - tot_len)
633 len = MAX_RW_COUNT - tot_len;
634 tot_len += len;
635 iov->iov_base = compat_ptr(buf);
636 iov->iov_len = (compat_size_t) len;
637 uvector++;
638 iov++;
639 }
640 ret = tot_len;
641
642out:
643 return ret;
644}
645
646static inline long
647copy_iocb(long nr, u32 __user *ptr32, struct iocb __user * __user *ptr64)
648{
649 compat_uptr_t uptr;
650 int i;
651
652 for (i = 0; i < nr; ++i) {
653 if (get_user(uptr, ptr32 + i))
654 return -EFAULT;
655 if (put_user(compat_ptr(uptr), ptr64 + i))
656 return -EFAULT;
657 }
658 return 0;
659}
660
661#define MAX_AIO_SUBMITS (PAGE_SIZE/sizeof(struct iocb *))
662
663asmlinkage long
664compat_sys_io_submit(aio_context_t ctx_id, int nr, u32 __user *iocb)
665{
666 struct iocb __user * __user *iocb64;
667 long ret;
668
669 if (unlikely(nr < 0))
670 return -EINVAL;
671
672 if (nr > MAX_AIO_SUBMITS)
673 nr = MAX_AIO_SUBMITS;
674
675 iocb64 = compat_alloc_user_space(nr * sizeof(*iocb64));
676 ret = copy_iocb(nr, iocb, iocb64);
677 if (!ret)
678 ret = do_io_submit(ctx_id, nr, iocb64, 1);
679 return ret;
680}
681
682struct compat_ncp_mount_data {
683 compat_int_t version;
684 compat_uint_t ncp_fd;
685 __compat_uid_t mounted_uid;
686 compat_pid_t wdog_pid;
687 unsigned char mounted_vol[NCP_VOLNAME_LEN + 1];
688 compat_uint_t time_out;
689 compat_uint_t retry_count;
690 compat_uint_t flags;
691 __compat_uid_t uid;
692 __compat_gid_t gid;
693 compat_mode_t file_mode;
694 compat_mode_t dir_mode;
695};
696
697struct compat_ncp_mount_data_v4 {
698 compat_int_t version;
699 compat_ulong_t flags;
700 compat_ulong_t mounted_uid;
701 compat_long_t wdog_pid;
702 compat_uint_t ncp_fd;
703 compat_uint_t time_out;
704 compat_uint_t retry_count;
705 compat_ulong_t uid;
706 compat_ulong_t gid;
707 compat_ulong_t file_mode;
708 compat_ulong_t dir_mode;
709};
710
711static void *do_ncp_super_data_conv(void *raw_data)
712{
713 int version = *(unsigned int *)raw_data;
714
715 if (version == 3) {
716 struct compat_ncp_mount_data *c_n = raw_data;
717 struct ncp_mount_data *n = raw_data;
718
719 n->dir_mode = c_n->dir_mode;
720 n->file_mode = c_n->file_mode;
721 n->gid = c_n->gid;
722 n->uid = c_n->uid;
723 memmove (n->mounted_vol, c_n->mounted_vol, (sizeof (c_n->mounted_vol) + 3 * sizeof (unsigned int)));
724 n->wdog_pid = c_n->wdog_pid;
725 n->mounted_uid = c_n->mounted_uid;
726 } else if (version == 4) {
727 struct compat_ncp_mount_data_v4 *c_n = raw_data;
728 struct ncp_mount_data_v4 *n = raw_data;
729
730 n->dir_mode = c_n->dir_mode;
731 n->file_mode = c_n->file_mode;
732 n->gid = c_n->gid;
733 n->uid = c_n->uid;
734 n->retry_count = c_n->retry_count;
735 n->time_out = c_n->time_out;
736 n->ncp_fd = c_n->ncp_fd;
737 n->wdog_pid = c_n->wdog_pid;
738 n->mounted_uid = c_n->mounted_uid;
739 n->flags = c_n->flags;
740 } else if (version != 5) {
741 return NULL;
742 }
743
744 return raw_data;
745}
746
747
748struct compat_nfs_string {
749 compat_uint_t len;
750 compat_uptr_t data;
751};
752
753static inline void compat_nfs_string(struct nfs_string *dst,
754 struct compat_nfs_string *src)
755{
756 dst->data = compat_ptr(src->data);
757 dst->len = src->len;
758}
759
760struct compat_nfs4_mount_data_v1 {
761 compat_int_t version;
762 compat_int_t flags;
763 compat_int_t rsize;
764 compat_int_t wsize;
765 compat_int_t timeo;
766 compat_int_t retrans;
767 compat_int_t acregmin;
768 compat_int_t acregmax;
769 compat_int_t acdirmin;
770 compat_int_t acdirmax;
771 struct compat_nfs_string client_addr;
772 struct compat_nfs_string mnt_path;
773 struct compat_nfs_string hostname;
774 compat_uint_t host_addrlen;
775 compat_uptr_t host_addr;
776 compat_int_t proto;
777 compat_int_t auth_flavourlen;
778 compat_uptr_t auth_flavours;
779};
780
781static int do_nfs4_super_data_conv(void *raw_data)
782{
783 int version = *(compat_uint_t *) raw_data;
784
785 if (version == 1) {
786 struct compat_nfs4_mount_data_v1 *raw = raw_data;
787 struct nfs4_mount_data *real = raw_data;
788
789 /* copy the fields backwards */
790 real->auth_flavours = compat_ptr(raw->auth_flavours);
791 real->auth_flavourlen = raw->auth_flavourlen;
792 real->proto = raw->proto;
793 real->host_addr = compat_ptr(raw->host_addr);
794 real->host_addrlen = raw->host_addrlen;
795 compat_nfs_string(&real->hostname, &raw->hostname);
796 compat_nfs_string(&real->mnt_path, &raw->mnt_path);
797 compat_nfs_string(&real->client_addr, &raw->client_addr);
798 real->acdirmax = raw->acdirmax;
799 real->acdirmin = raw->acdirmin;
800 real->acregmax = raw->acregmax;
801 real->acregmin = raw->acregmin;
802 real->retrans = raw->retrans;
803 real->timeo = raw->timeo;
804 real->wsize = raw->wsize;
805 real->rsize = raw->rsize;
806 real->flags = raw->flags;
807 real->version = raw->version;
808 }
809
810 return 0;
811}
812
813#define NCPFS_NAME "ncpfs"
814#define NFS4_NAME "nfs4"
815
816asmlinkage long compat_sys_mount(const char __user * dev_name,
817 const char __user * dir_name,
818 const char __user * type, unsigned long flags,
819 const void __user * data)
820{
821 char *kernel_type;
822 unsigned long data_page;
823 char *kernel_dev;
824 char *dir_page;
825 int retval;
826
827 retval = copy_mount_string(type, &kernel_type);
828 if (retval < 0)
829 goto out;
830
831 dir_page = getname(dir_name);
832 retval = PTR_ERR(dir_page);
833 if (IS_ERR(dir_page))
834 goto out1;
835
836 retval = copy_mount_string(dev_name, &kernel_dev);
837 if (retval < 0)
838 goto out2;
839
840 retval = copy_mount_options(data, &data_page);
841 if (retval < 0)
842 goto out3;
843
844 retval = -EINVAL;
845
846 if (kernel_type && data_page) {
847 if (!strcmp(kernel_type, NCPFS_NAME)) {
848 do_ncp_super_data_conv((void *)data_page);
849 } else if (!strcmp(kernel_type, NFS4_NAME)) {
850 if (do_nfs4_super_data_conv((void *) data_page))
851 goto out4;
852 }
853 }
854
855 retval = do_mount(kernel_dev, dir_page, kernel_type,
856 flags, (void*)data_page);
857
858 out4:
859 free_page(data_page);
860 out3:
861 kfree(kernel_dev);
862 out2:
863 putname(dir_page);
864 out1:
865 kfree(kernel_type);
866 out:
867 return retval;
868}
869
870struct compat_old_linux_dirent {
871 compat_ulong_t d_ino;
872 compat_ulong_t d_offset;
873 unsigned short d_namlen;
874 char d_name[1];
875};
876
877struct compat_readdir_callback {
878 struct compat_old_linux_dirent __user *dirent;
879 int result;
880};
881
882static int compat_fillonedir(void *__buf, const char *name, int namlen,
883 loff_t offset, u64 ino, unsigned int d_type)
884{
885 struct compat_readdir_callback *buf = __buf;
886 struct compat_old_linux_dirent __user *dirent;
887 compat_ulong_t d_ino;
888
889 if (buf->result)
890 return -EINVAL;
891 d_ino = ino;
892 if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) {
893 buf->result = -EOVERFLOW;
894 return -EOVERFLOW;
895 }
896 buf->result++;
897 dirent = buf->dirent;
898 if (!access_ok(VERIFY_WRITE, dirent,
899 (unsigned long)(dirent->d_name + namlen + 1) -
900 (unsigned long)dirent))
901 goto efault;
902 if ( __put_user(d_ino, &dirent->d_ino) ||
903 __put_user(offset, &dirent->d_offset) ||
904 __put_user(namlen, &dirent->d_namlen) ||
905 __copy_to_user(dirent->d_name, name, namlen) ||
906 __put_user(0, dirent->d_name + namlen))
907 goto efault;
908 return 0;
909efault:
910 buf->result = -EFAULT;
911 return -EFAULT;
912}
913
914asmlinkage long compat_sys_old_readdir(unsigned int fd,
915 struct compat_old_linux_dirent __user *dirent, unsigned int count)
916{
917 int error;
918 struct file *file;
919 struct compat_readdir_callback buf;
920
921 error = -EBADF;
922 file = fget(fd);
923 if (!file)
924 goto out;
925
926 buf.result = 0;
927 buf.dirent = dirent;
928
929 error = vfs_readdir(file, compat_fillonedir, &buf);
930 if (buf.result)
931 error = buf.result;
932
933 fput(file);
934out:
935 return error;
936}
937
938struct compat_linux_dirent {
939 compat_ulong_t d_ino;
940 compat_ulong_t d_off;
941 unsigned short d_reclen;
942 char d_name[1];
943};
944
945struct compat_getdents_callback {
946 struct compat_linux_dirent __user *current_dir;
947 struct compat_linux_dirent __user *previous;
948 int count;
949 int error;
950};
951
952static int compat_filldir(void *__buf, const char *name, int namlen,
953 loff_t offset, u64 ino, unsigned int d_type)
954{
955 struct compat_linux_dirent __user * dirent;
956 struct compat_getdents_callback *buf = __buf;
957 compat_ulong_t d_ino;
958 int reclen = ALIGN(offsetof(struct compat_linux_dirent, d_name) +
959 namlen + 2, sizeof(compat_long_t));
960
961 buf->error = -EINVAL; /* only used if we fail.. */
962 if (reclen > buf->count)
963 return -EINVAL;
964 d_ino = ino;
965 if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) {
966 buf->error = -EOVERFLOW;
967 return -EOVERFLOW;
968 }
969 dirent = buf->previous;
970 if (dirent) {
971 if (__put_user(offset, &dirent->d_off))
972 goto efault;
973 }
974 dirent = buf->current_dir;
975 if (__put_user(d_ino, &dirent->d_ino))
976 goto efault;
977 if (__put_user(reclen, &dirent->d_reclen))
978 goto efault;
979 if (copy_to_user(dirent->d_name, name, namlen))
980 goto efault;
981 if (__put_user(0, dirent->d_name + namlen))
982 goto efault;
983 if (__put_user(d_type, (char __user *) dirent + reclen - 1))
984 goto efault;
985 buf->previous = dirent;
986 dirent = (void __user *)dirent + reclen;
987 buf->current_dir = dirent;
988 buf->count -= reclen;
989 return 0;
990efault:
991 buf->error = -EFAULT;
992 return -EFAULT;
993}
994
995asmlinkage long compat_sys_getdents(unsigned int fd,
996 struct compat_linux_dirent __user *dirent, unsigned int count)
997{
998 struct file * file;
999 struct compat_linux_dirent __user * lastdirent;
1000 struct compat_getdents_callback buf;
1001 int error;
1002
1003 error = -EFAULT;
1004 if (!access_ok(VERIFY_WRITE, dirent, count))
1005 goto out;
1006
1007 error = -EBADF;
1008 file = fget(fd);
1009 if (!file)
1010 goto out;
1011
1012 buf.current_dir = dirent;
1013 buf.previous = NULL;
1014 buf.count = count;
1015 buf.error = 0;
1016
1017 error = vfs_readdir(file, compat_filldir, &buf);
1018 if (error >= 0)
1019 error = buf.error;
1020 lastdirent = buf.previous;
1021 if (lastdirent) {
1022 if (put_user(file->f_pos, &lastdirent->d_off))
1023 error = -EFAULT;
1024 else
1025 error = count - buf.count;
1026 }
1027 fput(file);
1028out:
1029 return error;
1030}
1031
1032#ifndef __ARCH_OMIT_COMPAT_SYS_GETDENTS64
1033
1034struct compat_getdents_callback64 {
1035 struct linux_dirent64 __user *current_dir;
1036 struct linux_dirent64 __user *previous;
1037 int count;
1038 int error;
1039};
1040
1041static int compat_filldir64(void * __buf, const char * name, int namlen, loff_t offset,
1042 u64 ino, unsigned int d_type)
1043{
1044 struct linux_dirent64 __user *dirent;
1045 struct compat_getdents_callback64 *buf = __buf;
1046 int reclen = ALIGN(offsetof(struct linux_dirent64, d_name) + namlen + 1,
1047 sizeof(u64));
1048 u64 off;
1049
1050 buf->error = -EINVAL; /* only used if we fail.. */
1051 if (reclen > buf->count)
1052 return -EINVAL;
1053 dirent = buf->previous;
1054
1055 if (dirent) {
1056 if (__put_user_unaligned(offset, &dirent->d_off))
1057 goto efault;
1058 }
1059 dirent = buf->current_dir;
1060 if (__put_user_unaligned(ino, &dirent->d_ino))
1061 goto efault;
1062 off = 0;
1063 if (__put_user_unaligned(off, &dirent->d_off))
1064 goto efault;
1065 if (__put_user(reclen, &dirent->d_reclen))
1066 goto efault;
1067 if (__put_user(d_type, &dirent->d_type))
1068 goto efault;
1069 if (copy_to_user(dirent->d_name, name, namlen))
1070 goto efault;
1071 if (__put_user(0, dirent->d_name + namlen))
1072 goto efault;
1073 buf->previous = dirent;
1074 dirent = (void __user *)dirent + reclen;
1075 buf->current_dir = dirent;
1076 buf->count -= reclen;
1077 return 0;
1078efault:
1079 buf->error = -EFAULT;
1080 return -EFAULT;
1081}
1082
1083asmlinkage long compat_sys_getdents64(unsigned int fd,
1084 struct linux_dirent64 __user * dirent, unsigned int count)
1085{
1086 struct file * file;
1087 struct linux_dirent64 __user * lastdirent;
1088 struct compat_getdents_callback64 buf;
1089 int error;
1090
1091 error = -EFAULT;
1092 if (!access_ok(VERIFY_WRITE, dirent, count))
1093 goto out;
1094
1095 error = -EBADF;
1096 file = fget(fd);
1097 if (!file)
1098 goto out;
1099
1100 buf.current_dir = dirent;
1101 buf.previous = NULL;
1102 buf.count = count;
1103 buf.error = 0;
1104
1105 error = vfs_readdir(file, compat_filldir64, &buf);
1106 if (error >= 0)
1107 error = buf.error;
1108 lastdirent = buf.previous;
1109 if (lastdirent) {
1110 typeof(lastdirent->d_off) d_off = file->f_pos;
1111 if (__put_user_unaligned(d_off, &lastdirent->d_off))
1112 error = -EFAULT;
1113 else
1114 error = count - buf.count;
1115 }
1116 fput(file);
1117out:
1118 return error;
1119}
1120#endif /* ! __ARCH_OMIT_COMPAT_SYS_GETDENTS64 */
1121
1122static ssize_t compat_do_readv_writev(int type, struct file *file,
1123 const struct compat_iovec __user *uvector,
1124 unsigned long nr_segs, loff_t *pos)
1125{
1126 compat_ssize_t tot_len;
1127 struct iovec iovstack[UIO_FASTIOV];
1128 struct iovec *iov = iovstack;
1129 ssize_t ret;
1130 io_fn_t fn;
1131 iov_fn_t fnv;
1132
1133 ret = -EINVAL;
1134 if (!file->f_op)
1135 goto out;
1136
1137 ret = -EFAULT;
1138 if (!access_ok(VERIFY_READ, uvector, nr_segs*sizeof(*uvector)))
1139 goto out;
1140
1141 tot_len = compat_rw_copy_check_uvector(type, uvector, nr_segs,
1142 UIO_FASTIOV, iovstack, &iov);
1143 if (tot_len == 0) {
1144 ret = 0;
1145 goto out;
1146 }
1147
1148 ret = rw_verify_area(type, file, pos, tot_len);
1149 if (ret < 0)
1150 goto out;
1151
1152 fnv = NULL;
1153 if (type == READ) {
1154 fn = file->f_op->read;
1155 fnv = file->f_op->aio_read;
1156 } else {
1157 fn = (io_fn_t)file->f_op->write;
1158 fnv = file->f_op->aio_write;
1159 }
1160
1161 if (fnv)
1162 ret = do_sync_readv_writev(file, iov, nr_segs, tot_len,
1163 pos, fnv);
1164 else
1165 ret = do_loop_readv_writev(file, iov, nr_segs, pos, fn);
1166
1167out:
1168 if (iov != iovstack)
1169 kfree(iov);
1170 if ((ret + (type == READ)) > 0) {
1171 if (type == READ)
1172 fsnotify_access(file);
1173 else
1174 fsnotify_modify(file);
1175 }
1176 return ret;
1177}
1178
1179static size_t compat_readv(struct file *file,
1180 const struct compat_iovec __user *vec,
1181 unsigned long vlen, loff_t *pos)
1182{
1183 ssize_t ret = -EBADF;
1184
1185 if (!(file->f_mode & FMODE_READ))
1186 goto out;
1187
1188 ret = -EINVAL;
1189 if (!file->f_op || (!file->f_op->aio_read && !file->f_op->read))
1190 goto out;
1191
1192 ret = compat_do_readv_writev(READ, file, vec, vlen, pos);
1193
1194out:
1195 if (ret > 0)
1196 add_rchar(current, ret);
1197 inc_syscr(current);
1198 return ret;
1199}
1200
1201asmlinkage ssize_t
1202compat_sys_readv(unsigned long fd, const struct compat_iovec __user *vec,
1203 unsigned long vlen)
1204{
1205 struct file *file;
1206 int fput_needed;
1207 ssize_t ret;
1208
1209 file = fget_light(fd, &fput_needed);
1210 if (!file)
1211 return -EBADF;
1212 ret = compat_readv(file, vec, vlen, &file->f_pos);
1213 fput_light(file, fput_needed);
1214 return ret;
1215}
1216
1217asmlinkage ssize_t
1218compat_sys_preadv(unsigned long fd, const struct compat_iovec __user *vec,
1219 unsigned long vlen, u32 pos_low, u32 pos_high)
1220{
1221 loff_t pos = ((loff_t)pos_high << 32) | pos_low;
1222 struct file *file;
1223 int fput_needed;
1224 ssize_t ret;
1225
1226 if (pos < 0)
1227 return -EINVAL;
1228 file = fget_light(fd, &fput_needed);
1229 if (!file)
1230 return -EBADF;
1231 ret = compat_readv(file, vec, vlen, &pos);
1232 fput_light(file, fput_needed);
1233 return ret;
1234}
1235
1236static size_t compat_writev(struct file *file,
1237 const struct compat_iovec __user *vec,
1238 unsigned long vlen, loff_t *pos)
1239{
1240 ssize_t ret = -EBADF;
1241
1242 if (!(file->f_mode & FMODE_WRITE))
1243 goto out;
1244
1245 ret = -EINVAL;
1246 if (!file->f_op || (!file->f_op->aio_write && !file->f_op->write))
1247 goto out;
1248
1249 ret = compat_do_readv_writev(WRITE, file, vec, vlen, pos);
1250
1251out:
1252 if (ret > 0)
1253 add_wchar(current, ret);
1254 inc_syscw(current);
1255 return ret;
1256}
1257
1258asmlinkage ssize_t
1259compat_sys_writev(unsigned long fd, const struct compat_iovec __user *vec,
1260 unsigned long vlen)
1261{
1262 struct file *file;
1263 int fput_needed;
1264 ssize_t ret;
1265
1266 file = fget_light(fd, &fput_needed);
1267 if (!file)
1268 return -EBADF;
1269 ret = compat_writev(file, vec, vlen, &file->f_pos);
1270 fput_light(file, fput_needed);
1271 return ret;
1272}
1273
1274asmlinkage ssize_t
1275compat_sys_pwritev(unsigned long fd, const struct compat_iovec __user *vec,
1276 unsigned long vlen, u32 pos_low, u32 pos_high)
1277{
1278 loff_t pos = ((loff_t)pos_high << 32) | pos_low;
1279 struct file *file;
1280 int fput_needed;
1281 ssize_t ret;
1282
1283 if (pos < 0)
1284 return -EINVAL;
1285 file = fget_light(fd, &fput_needed);
1286 if (!file)
1287 return -EBADF;
1288 ret = compat_writev(file, vec, vlen, &pos);
1289 fput_light(file, fput_needed);
1290 return ret;
1291}
1292
1293asmlinkage long
1294compat_sys_vmsplice(int fd, const struct compat_iovec __user *iov32,
1295 unsigned int nr_segs, unsigned int flags)
1296{
1297 unsigned i;
1298 struct iovec __user *iov;
1299 if (nr_segs > UIO_MAXIOV)
1300 return -EINVAL;
1301 iov = compat_alloc_user_space(nr_segs * sizeof(struct iovec));
1302 for (i = 0; i < nr_segs; i++) {
1303 struct compat_iovec v;
1304 if (get_user(v.iov_base, &iov32[i].iov_base) ||
1305 get_user(v.iov_len, &iov32[i].iov_len) ||
1306 put_user(compat_ptr(v.iov_base), &iov[i].iov_base) ||
1307 put_user(v.iov_len, &iov[i].iov_len))
1308 return -EFAULT;
1309 }
1310 return sys_vmsplice(fd, iov, nr_segs, flags);
1311}
1312
1313/*
1314 * Exactly like fs/open.c:sys_open(), except that it doesn't set the
1315 * O_LARGEFILE flag.
1316 */
1317asmlinkage long
1318compat_sys_open(const char __user *filename, int flags, int mode)
1319{
1320 return do_sys_open(AT_FDCWD, filename, flags, mode);
1321}
1322
1323/*
1324 * Exactly like fs/open.c:sys_openat(), except that it doesn't set the
1325 * O_LARGEFILE flag.
1326 */
1327asmlinkage long
1328compat_sys_openat(unsigned int dfd, const char __user *filename, int flags, int mode)
1329{
1330 return do_sys_open(dfd, filename, flags, mode);
1331}
1332
1333/*
1334 * compat_count() counts the number of arguments/envelopes. It is basically
1335 * a copy of count() from fs/exec.c, except that it works with 32 bit argv
1336 * and envp pointers.
1337 */
1338static int compat_count(compat_uptr_t __user *argv, int max)
1339{
1340 int i = 0;
1341
1342 if (argv != NULL) {
1343 for (;;) {
1344 compat_uptr_t p;
1345
1346 if (get_user(p, argv))
1347 return -EFAULT;
1348 if (!p)
1349 break;
1350 argv++;
1351 if (i++ >= max)
1352 return -E2BIG;
1353 }
1354 }
1355 return i;
1356}
1357
1358/*
1359 * compat_copy_strings() is basically a copy of copy_strings() from fs/exec.c
1360 * except that it works with 32 bit argv and envp pointers.
1361 */
1362static int compat_copy_strings(int argc, compat_uptr_t __user *argv,
1363 struct linux_binprm *bprm)
1364{
1365 struct page *kmapped_page = NULL;
1366 char *kaddr = NULL;
1367 unsigned long kpos = 0;
1368 int ret;
1369
1370 while (argc-- > 0) {
1371 compat_uptr_t str;
1372 int len;
1373 unsigned long pos;
1374
1375 if (get_user(str, argv+argc) ||
1376 !(len = strnlen_user(compat_ptr(str), MAX_ARG_STRLEN))) {
1377 ret = -EFAULT;
1378 goto out;
1379 }
1380
1381 if (len > MAX_ARG_STRLEN) {
1382 ret = -E2BIG;
1383 goto out;
1384 }
1385
1386 /* We're going to work our way backwords. */
1387 pos = bprm->p;
1388 str += len;
1389 bprm->p -= len;
1390
1391 while (len > 0) {
1392 int offset, bytes_to_copy;
1393
1394 offset = pos % PAGE_SIZE;
1395 if (offset == 0)
1396 offset = PAGE_SIZE;
1397
1398 bytes_to_copy = offset;
1399 if (bytes_to_copy > len)
1400 bytes_to_copy = len;
1401
1402 offset -= bytes_to_copy;
1403 pos -= bytes_to_copy;
1404 str -= bytes_to_copy;
1405 len -= bytes_to_copy;
1406
1407 if (!kmapped_page || kpos != (pos & PAGE_MASK)) {
1408 struct page *page;
1409
1410#ifdef CONFIG_STACK_GROWSUP
1411 ret = expand_stack_downwards(bprm->vma, pos);
1412 if (ret < 0) {
1413 /* We've exceed the stack rlimit. */
1414 ret = -E2BIG;
1415 goto out;
1416 }
1417#endif
1418 ret = get_user_pages(current, bprm->mm, pos,
1419 1, 1, 1, &page, NULL);
1420 if (ret <= 0) {
1421 /* We've exceed the stack rlimit. */
1422 ret = -E2BIG;
1423 goto out;
1424 }
1425
1426 if (kmapped_page) {
1427 flush_kernel_dcache_page(kmapped_page);
1428 kunmap(kmapped_page);
1429 put_page(kmapped_page);
1430 }
1431 kmapped_page = page;
1432 kaddr = kmap(kmapped_page);
1433 kpos = pos & PAGE_MASK;
1434 flush_cache_page(bprm->vma, kpos,
1435 page_to_pfn(kmapped_page));
1436 }
1437 if (copy_from_user(kaddr+offset, compat_ptr(str),
1438 bytes_to_copy)) {
1439 ret = -EFAULT;
1440 goto out;
1441 }
1442 }
1443 }
1444 ret = 0;
1445out:
1446 if (kmapped_page) {
1447 flush_kernel_dcache_page(kmapped_page);
1448 kunmap(kmapped_page);
1449 put_page(kmapped_page);
1450 }
1451 return ret;
1452}
1453
1454/*
1455 * compat_do_execve() is mostly a copy of do_execve(), with the exception
1456 * that it processes 32 bit argv and envp pointers.
1457 */
1458int compat_do_execve(char * filename,
1459 compat_uptr_t __user *argv,
1460 compat_uptr_t __user *envp,
1461 struct pt_regs * regs)
1462{
1463 struct linux_binprm *bprm;
1464 struct file *file;
1465 struct files_struct *displaced;
1466 bool clear_in_exec;
1467 int retval;
1468
1469 retval = unshare_files(&displaced);
1470 if (retval)
1471 goto out_ret;
1472
1473 retval = -ENOMEM;
1474 bprm = kzalloc(sizeof(*bprm), GFP_KERNEL);
1475 if (!bprm)
1476 goto out_files;
1477
1478 retval = prepare_bprm_creds(bprm);
1479 if (retval)
1480 goto out_free;
1481
1482 retval = check_unsafe_exec(bprm);
1483 if (retval < 0)
1484 goto out_free;
1485 clear_in_exec = retval;
1486 current->in_execve = 1;
1487
1488 file = open_exec(filename);
1489 retval = PTR_ERR(file);
1490 if (IS_ERR(file))
1491 goto out_unmark;
1492
1493 sched_exec();
1494
1495 bprm->file = file;
1496 bprm->filename = filename;
1497 bprm->interp = filename;
1498
1499 retval = bprm_mm_init(bprm);
1500 if (retval)
1501 goto out_file;
1502
1503 bprm->argc = compat_count(argv, MAX_ARG_STRINGS);
1504 if ((retval = bprm->argc) < 0)
1505 goto out;
1506
1507 bprm->envc = compat_count(envp, MAX_ARG_STRINGS);
1508 if ((retval = bprm->envc) < 0)
1509 goto out;
1510
1511 retval = prepare_binprm(bprm);
1512 if (retval < 0)
1513 goto out;
1514
1515 retval = copy_strings_kernel(1, &bprm->filename, bprm);
1516 if (retval < 0)
1517 goto out;
1518
1519 bprm->exec = bprm->p;
1520 retval = compat_copy_strings(bprm->envc, envp, bprm);
1521 if (retval < 0)
1522 goto out;
1523
1524 retval = compat_copy_strings(bprm->argc, argv, bprm);
1525 if (retval < 0)
1526 goto out;
1527
1528 retval = search_binary_handler(bprm, regs);
1529 if (retval < 0)
1530 goto out;
1531
1532 /* execve succeeded */
1533 current->fs->in_exec = 0;
1534 current->in_execve = 0;
1535 acct_update_integrals(current);
1536 free_bprm(bprm);
1537 if (displaced)
1538 put_files_struct(displaced);
1539 return retval;
1540
1541out:
1542 if (bprm->mm)
1543 mmput(bprm->mm);
1544
1545out_file:
1546 if (bprm->file) {
1547 allow_write_access(bprm->file);
1548 fput(bprm->file);
1549 }
1550
1551out_unmark:
1552 if (clear_in_exec)
1553 current->fs->in_exec = 0;
1554 current->in_execve = 0;
1555
1556out_free:
1557 free_bprm(bprm);
1558
1559out_files:
1560 if (displaced)
1561 reset_files_struct(displaced);
1562out_ret:
1563 return retval;
1564}
1565
1566#define __COMPAT_NFDBITS (8 * sizeof(compat_ulong_t))
1567
1568static int poll_select_copy_remaining(struct timespec *end_time, void __user *p,
1569 int timeval, int ret)
1570{
1571 struct timespec ts;
1572
1573 if (!p)
1574 return ret;
1575
1576 if (current->personality & STICKY_TIMEOUTS)
1577 goto sticky;
1578
1579 /* No update for zero timeout */
1580 if (!end_time->tv_sec && !end_time->tv_nsec)
1581 return ret;
1582
1583 ktime_get_ts(&ts);
1584 ts = timespec_sub(*end_time, ts);
1585 if (ts.tv_sec < 0)
1586 ts.tv_sec = ts.tv_nsec = 0;
1587
1588 if (timeval) {
1589 struct compat_timeval rtv;
1590
1591 rtv.tv_sec = ts.tv_sec;
1592 rtv.tv_usec = ts.tv_nsec / NSEC_PER_USEC;
1593
1594 if (!copy_to_user(p, &rtv, sizeof(rtv)))
1595 return ret;
1596 } else {
1597 struct compat_timespec rts;
1598
1599 rts.tv_sec = ts.tv_sec;
1600 rts.tv_nsec = ts.tv_nsec;
1601
1602 if (!copy_to_user(p, &rts, sizeof(rts)))
1603 return ret;
1604 }
1605 /*
1606 * If an application puts its timeval in read-only memory, we
1607 * don't want the Linux-specific update to the timeval to
1608 * cause a fault after the select has completed
1609 * successfully. However, because we're not updating the
1610 * timeval, we can't restart the system call.
1611 */
1612
1613sticky:
1614 if (ret == -ERESTARTNOHAND)
1615 ret = -EINTR;
1616 return ret;
1617}
1618
1619/*
1620 * Ooo, nasty. We need here to frob 32-bit unsigned longs to
1621 * 64-bit unsigned longs.
1622 */
1623static
1624int compat_get_fd_set(unsigned long nr, compat_ulong_t __user *ufdset,
1625 unsigned long *fdset)
1626{
1627 nr = DIV_ROUND_UP(nr, __COMPAT_NFDBITS);
1628 if (ufdset) {
1629 unsigned long odd;
1630
1631 if (!access_ok(VERIFY_WRITE, ufdset, nr*sizeof(compat_ulong_t)))
1632 return -EFAULT;
1633
1634 odd = nr & 1UL;
1635 nr &= ~1UL;
1636 while (nr) {
1637 unsigned long h, l;
1638 if (__get_user(l, ufdset) || __get_user(h, ufdset+1))
1639 return -EFAULT;
1640 ufdset += 2;
1641 *fdset++ = h << 32 | l;
1642 nr -= 2;
1643 }
1644 if (odd && __get_user(*fdset, ufdset))
1645 return -EFAULT;
1646 } else {
1647 /* Tricky, must clear full unsigned long in the
1648 * kernel fdset at the end, this makes sure that
1649 * actually happens.
1650 */
1651 memset(fdset, 0, ((nr + 1) & ~1)*sizeof(compat_ulong_t));
1652 }
1653 return 0;
1654}
1655
1656static
1657int compat_set_fd_set(unsigned long nr, compat_ulong_t __user *ufdset,
1658 unsigned long *fdset)
1659{
1660 unsigned long odd;
1661 nr = DIV_ROUND_UP(nr, __COMPAT_NFDBITS);
1662
1663 if (!ufdset)
1664 return 0;
1665
1666 odd = nr & 1UL;
1667 nr &= ~1UL;
1668 while (nr) {
1669 unsigned long h, l;
1670 l = *fdset++;
1671 h = l >> 32;
1672 if (__put_user(l, ufdset) || __put_user(h, ufdset+1))
1673 return -EFAULT;
1674 ufdset += 2;
1675 nr -= 2;
1676 }
1677 if (odd && __put_user(*fdset, ufdset))
1678 return -EFAULT;
1679 return 0;
1680}
1681
1682
1683/*
1684 * This is a virtual copy of sys_select from fs/select.c and probably
1685 * should be compared to it from time to time
1686 */
1687
1688/*
1689 * We can actually return ERESTARTSYS instead of EINTR, but I'd
1690 * like to be certain this leads to no problems. So I return
1691 * EINTR just for safety.
1692 *
1693 * Update: ERESTARTSYS breaks at least the xview clock binary, so
1694 * I'm trying ERESTARTNOHAND which restart only when you want to.
1695 */
1696#define MAX_SELECT_SECONDS \
1697 ((unsigned long) (MAX_SCHEDULE_TIMEOUT / HZ)-1)
1698
1699int compat_core_sys_select(int n, compat_ulong_t __user *inp,
1700 compat_ulong_t __user *outp, compat_ulong_t __user *exp,
1701 struct timespec *end_time)
1702{
1703 fd_set_bits fds;
1704 void *bits;
1705 int size, max_fds, ret = -EINVAL;
1706 struct fdtable *fdt;
1707 long stack_fds[SELECT_STACK_ALLOC/sizeof(long)];
1708
1709 if (n < 0)
1710 goto out_nofds;
1711
1712 /* max_fds can increase, so grab it once to avoid race */
1713 rcu_read_lock();
1714 fdt = files_fdtable(current->files);
1715 max_fds = fdt->max_fds;
1716 rcu_read_unlock();
1717 if (n > max_fds)
1718 n = max_fds;
1719
1720 /*
1721 * We need 6 bitmaps (in/out/ex for both incoming and outgoing),
1722 * since we used fdset we need to allocate memory in units of
1723 * long-words.
1724 */
1725 size = FDS_BYTES(n);
1726 bits = stack_fds;
1727 if (size > sizeof(stack_fds) / 6) {
1728 bits = kmalloc(6 * size, GFP_KERNEL);
1729 ret = -ENOMEM;
1730 if (!bits)
1731 goto out_nofds;
1732 }
1733 fds.in = (unsigned long *) bits;
1734 fds.out = (unsigned long *) (bits + size);
1735 fds.ex = (unsigned long *) (bits + 2*size);
1736 fds.res_in = (unsigned long *) (bits + 3*size);
1737 fds.res_out = (unsigned long *) (bits + 4*size);
1738 fds.res_ex = (unsigned long *) (bits + 5*size);
1739
1740 if ((ret = compat_get_fd_set(n, inp, fds.in)) ||
1741 (ret = compat_get_fd_set(n, outp, fds.out)) ||
1742 (ret = compat_get_fd_set(n, exp, fds.ex)))
1743 goto out;
1744 zero_fd_set(n, fds.res_in);
1745 zero_fd_set(n, fds.res_out);
1746 zero_fd_set(n, fds.res_ex);
1747
1748 ret = do_select(n, &fds, end_time);
1749
1750 if (ret < 0)
1751 goto out;
1752 if (!ret) {
1753 ret = -ERESTARTNOHAND;
1754 if (signal_pending(current))
1755 goto out;
1756 ret = 0;
1757 }
1758
1759 if (compat_set_fd_set(n, inp, fds.res_in) ||
1760 compat_set_fd_set(n, outp, fds.res_out) ||
1761 compat_set_fd_set(n, exp, fds.res_ex))
1762 ret = -EFAULT;
1763out:
1764 if (bits != stack_fds)
1765 kfree(bits);
1766out_nofds:
1767 return ret;
1768}
1769
1770asmlinkage long compat_sys_select(int n, compat_ulong_t __user *inp,
1771 compat_ulong_t __user *outp, compat_ulong_t __user *exp,
1772 struct compat_timeval __user *tvp)
1773{
1774 struct timespec end_time, *to = NULL;
1775 struct compat_timeval tv;
1776 int ret;
1777
1778 if (tvp) {
1779 if (copy_from_user(&tv, tvp, sizeof(tv)))
1780 return -EFAULT;
1781
1782 to = &end_time;
1783 if (poll_select_set_timeout(to,
1784 tv.tv_sec + (tv.tv_usec / USEC_PER_SEC),
1785 (tv.tv_usec % USEC_PER_SEC) * NSEC_PER_USEC))
1786 return -EINVAL;
1787 }
1788
1789 ret = compat_core_sys_select(n, inp, outp, exp, to);
1790 ret = poll_select_copy_remaining(&end_time, tvp, 1, ret);
1791
1792 return ret;
1793}
1794
1795struct compat_sel_arg_struct {
1796 compat_ulong_t n;
1797 compat_uptr_t inp;
1798 compat_uptr_t outp;
1799 compat_uptr_t exp;
1800 compat_uptr_t tvp;
1801};
1802
1803asmlinkage long compat_sys_old_select(struct compat_sel_arg_struct __user *arg)
1804{
1805 struct compat_sel_arg_struct a;
1806
1807 if (copy_from_user(&a, arg, sizeof(a)))
1808 return -EFAULT;
1809 return compat_sys_select(a.n, compat_ptr(a.inp), compat_ptr(a.outp),
1810 compat_ptr(a.exp), compat_ptr(a.tvp));
1811}
1812
1813#ifdef HAVE_SET_RESTORE_SIGMASK
1814static long do_compat_pselect(int n, compat_ulong_t __user *inp,
1815 compat_ulong_t __user *outp, compat_ulong_t __user *exp,
1816 struct compat_timespec __user *tsp, compat_sigset_t __user *sigmask,
1817 compat_size_t sigsetsize)
1818{
1819 compat_sigset_t ss32;
1820 sigset_t ksigmask, sigsaved;
1821 struct compat_timespec ts;
1822 struct timespec end_time, *to = NULL;
1823 int ret;
1824
1825 if (tsp) {
1826 if (copy_from_user(&ts, tsp, sizeof(ts)))
1827 return -EFAULT;
1828
1829 to = &end_time;
1830 if (poll_select_set_timeout(to, ts.tv_sec, ts.tv_nsec))
1831 return -EINVAL;
1832 }
1833
1834 if (sigmask) {
1835 if (sigsetsize != sizeof(compat_sigset_t))
1836 return -EINVAL;
1837 if (copy_from_user(&ss32, sigmask, sizeof(ss32)))
1838 return -EFAULT;
1839 sigset_from_compat(&ksigmask, &ss32);
1840
1841 sigdelsetmask(&ksigmask, sigmask(SIGKILL)|sigmask(SIGSTOP));
1842 sigprocmask(SIG_SETMASK, &ksigmask, &sigsaved);
1843 }
1844
1845 ret = compat_core_sys_select(n, inp, outp, exp, to);
1846 ret = poll_select_copy_remaining(&end_time, tsp, 0, ret);
1847
1848 if (ret == -ERESTARTNOHAND) {
1849 /*
1850 * Don't restore the signal mask yet. Let do_signal() deliver
1851 * the signal on the way back to userspace, before the signal
1852 * mask is restored.
1853 */
1854 if (sigmask) {
1855 memcpy(&current->saved_sigmask, &sigsaved,
1856 sizeof(sigsaved));
1857 set_restore_sigmask();
1858 }
1859 } else if (sigmask)
1860 sigprocmask(SIG_SETMASK, &sigsaved, NULL);
1861
1862 return ret;
1863}
1864
1865asmlinkage long compat_sys_pselect6(int n, compat_ulong_t __user *inp,
1866 compat_ulong_t __user *outp, compat_ulong_t __user *exp,
1867 struct compat_timespec __user *tsp, void __user *sig)
1868{
1869 compat_size_t sigsetsize = 0;
1870 compat_uptr_t up = 0;
1871
1872 if (sig) {
1873 if (!access_ok(VERIFY_READ, sig,
1874 sizeof(compat_uptr_t)+sizeof(compat_size_t)) ||
1875 __get_user(up, (compat_uptr_t __user *)sig) ||
1876 __get_user(sigsetsize,
1877 (compat_size_t __user *)(sig+sizeof(up))))
1878 return -EFAULT;
1879 }
1880 return do_compat_pselect(n, inp, outp, exp, tsp, compat_ptr(up),
1881 sigsetsize);
1882}
1883
1884asmlinkage long compat_sys_ppoll(struct pollfd __user *ufds,
1885 unsigned int nfds, struct compat_timespec __user *tsp,
1886 const compat_sigset_t __user *sigmask, compat_size_t sigsetsize)
1887{
1888 compat_sigset_t ss32;
1889 sigset_t ksigmask, sigsaved;
1890 struct compat_timespec ts;
1891 struct timespec end_time, *to = NULL;
1892 int ret;
1893
1894 if (tsp) {
1895 if (copy_from_user(&ts, tsp, sizeof(ts)))
1896 return -EFAULT;
1897
1898 to = &end_time;
1899 if (poll_select_set_timeout(to, ts.tv_sec, ts.tv_nsec))
1900 return -EINVAL;
1901 }
1902
1903 if (sigmask) {
1904 if (sigsetsize != sizeof(compat_sigset_t))
1905 return -EINVAL;
1906 if (copy_from_user(&ss32, sigmask, sizeof(ss32)))
1907 return -EFAULT;
1908 sigset_from_compat(&ksigmask, &ss32);
1909
1910 sigdelsetmask(&ksigmask, sigmask(SIGKILL)|sigmask(SIGSTOP));
1911 sigprocmask(SIG_SETMASK, &ksigmask, &sigsaved);
1912 }
1913
1914 ret = do_sys_poll(ufds, nfds, to);
1915
1916 /* We can restart this syscall, usually */
1917 if (ret == -EINTR) {
1918 /*
1919 * Don't restore the signal mask yet. Let do_signal() deliver
1920 * the signal on the way back to userspace, before the signal
1921 * mask is restored.
1922 */
1923 if (sigmask) {
1924 memcpy(&current->saved_sigmask, &sigsaved,
1925 sizeof(sigsaved));
1926 set_restore_sigmask();
1927 }
1928 ret = -ERESTARTNOHAND;
1929 } else if (sigmask)
1930 sigprocmask(SIG_SETMASK, &sigsaved, NULL);
1931
1932 ret = poll_select_copy_remaining(&end_time, tsp, 0, ret);
1933
1934 return ret;
1935}
1936#endif /* HAVE_SET_RESTORE_SIGMASK */
1937
1938#if (defined(CONFIG_NFSD) || defined(CONFIG_NFSD_MODULE)) && !defined(CONFIG_NFSD_DEPRECATED)
1939/* Stuff for NFS server syscalls... */
1940struct compat_nfsctl_svc {
1941 u16 svc32_port;
1942 s32 svc32_nthreads;
1943};
1944
1945struct compat_nfsctl_client {
1946 s8 cl32_ident[NFSCLNT_IDMAX+1];
1947 s32 cl32_naddr;
1948 struct in_addr cl32_addrlist[NFSCLNT_ADDRMAX];
1949 s32 cl32_fhkeytype;
1950 s32 cl32_fhkeylen;
1951 u8 cl32_fhkey[NFSCLNT_KEYMAX];
1952};
1953
1954struct compat_nfsctl_export {
1955 char ex32_client[NFSCLNT_IDMAX+1];
1956 char ex32_path[NFS_MAXPATHLEN+1];
1957 compat_dev_t ex32_dev;
1958 compat_ino_t ex32_ino;
1959 compat_int_t ex32_flags;
1960 __compat_uid_t ex32_anon_uid;
1961 __compat_gid_t ex32_anon_gid;
1962};
1963
1964struct compat_nfsctl_fdparm {
1965 struct sockaddr gd32_addr;
1966 s8 gd32_path[NFS_MAXPATHLEN+1];
1967 compat_int_t gd32_version;
1968};
1969
1970struct compat_nfsctl_fsparm {
1971 struct sockaddr gd32_addr;
1972 s8 gd32_path[NFS_MAXPATHLEN+1];
1973 compat_int_t gd32_maxlen;
1974};
1975
1976struct compat_nfsctl_arg {
1977 compat_int_t ca32_version; /* safeguard */
1978 union {
1979 struct compat_nfsctl_svc u32_svc;
1980 struct compat_nfsctl_client u32_client;
1981 struct compat_nfsctl_export u32_export;
1982 struct compat_nfsctl_fdparm u32_getfd;
1983 struct compat_nfsctl_fsparm u32_getfs;
1984 } u;
1985#define ca32_svc u.u32_svc
1986#define ca32_client u.u32_client
1987#define ca32_export u.u32_export
1988#define ca32_getfd u.u32_getfd
1989#define ca32_getfs u.u32_getfs
1990};
1991
1992union compat_nfsctl_res {
1993 __u8 cr32_getfh[NFS_FHSIZE];
1994 struct knfsd_fh cr32_getfs;
1995};
1996
1997static int compat_nfs_svc_trans(struct nfsctl_arg *karg,
1998 struct compat_nfsctl_arg __user *arg)
1999{
2000 if (!access_ok(VERIFY_READ, &arg->ca32_svc, sizeof(arg->ca32_svc)) ||
2001 get_user(karg->ca_version, &arg->ca32_version) ||
2002 __get_user(karg->ca_svc.svc_port, &arg->ca32_svc.svc32_port) ||
2003 __get_user(karg->ca_svc.svc_nthreads,
2004 &arg->ca32_svc.svc32_nthreads))
2005 return -EFAULT;
2006 return 0;
2007}
2008
2009static int compat_nfs_clnt_trans(struct nfsctl_arg *karg,
2010 struct compat_nfsctl_arg __user *arg)
2011{
2012 if (!access_ok(VERIFY_READ, &arg->ca32_client,
2013 sizeof(arg->ca32_client)) ||
2014 get_user(karg->ca_version, &arg->ca32_version) ||
2015 __copy_from_user(&karg->ca_client.cl_ident[0],
2016 &arg->ca32_client.cl32_ident[0],
2017 NFSCLNT_IDMAX) ||
2018 __get_user(karg->ca_client.cl_naddr,
2019 &arg->ca32_client.cl32_naddr) ||
2020 __copy_from_user(&karg->ca_client.cl_addrlist[0],
2021 &arg->ca32_client.cl32_addrlist[0],
2022 (sizeof(struct in_addr) * NFSCLNT_ADDRMAX)) ||
2023 __get_user(karg->ca_client.cl_fhkeytype,
2024 &arg->ca32_client.cl32_fhkeytype) ||
2025 __get_user(karg->ca_client.cl_fhkeylen,
2026 &arg->ca32_client.cl32_fhkeylen) ||
2027 __copy_from_user(&karg->ca_client.cl_fhkey[0],
2028 &arg->ca32_client.cl32_fhkey[0],
2029 NFSCLNT_KEYMAX))
2030 return -EFAULT;
2031
2032 return 0;
2033}
2034
2035static int compat_nfs_exp_trans(struct nfsctl_arg *karg,
2036 struct compat_nfsctl_arg __user *arg)
2037{
2038 if (!access_ok(VERIFY_READ, &arg->ca32_export,
2039 sizeof(arg->ca32_export)) ||
2040 get_user(karg->ca_version, &arg->ca32_version) ||
2041 __copy_from_user(&karg->ca_export.ex_client[0],
2042 &arg->ca32_export.ex32_client[0],
2043 NFSCLNT_IDMAX) ||
2044 __copy_from_user(&karg->ca_export.ex_path[0],
2045 &arg->ca32_export.ex32_path[0],
2046 NFS_MAXPATHLEN) ||
2047 __get_user(karg->ca_export.ex_dev,
2048 &arg->ca32_export.ex32_dev) ||
2049 __get_user(karg->ca_export.ex_ino,
2050 &arg->ca32_export.ex32_ino) ||
2051 __get_user(karg->ca_export.ex_flags,
2052 &arg->ca32_export.ex32_flags) ||
2053 __get_user(karg->ca_export.ex_anon_uid,
2054 &arg->ca32_export.ex32_anon_uid) ||
2055 __get_user(karg->ca_export.ex_anon_gid,
2056 &arg->ca32_export.ex32_anon_gid))
2057 return -EFAULT;
2058 SET_UID(karg->ca_export.ex_anon_uid, karg->ca_export.ex_anon_uid);
2059 SET_GID(karg->ca_export.ex_anon_gid, karg->ca_export.ex_anon_gid);
2060
2061 return 0;
2062}
2063
2064static int compat_nfs_getfd_trans(struct nfsctl_arg *karg,
2065 struct compat_nfsctl_arg __user *arg)
2066{
2067 if (!access_ok(VERIFY_READ, &arg->ca32_getfd,
2068 sizeof(arg->ca32_getfd)) ||
2069 get_user(karg->ca_version, &arg->ca32_version) ||
2070 __copy_from_user(&karg->ca_getfd.gd_addr,
2071 &arg->ca32_getfd.gd32_addr,
2072 (sizeof(struct sockaddr))) ||
2073 __copy_from_user(&karg->ca_getfd.gd_path,
2074 &arg->ca32_getfd.gd32_path,
2075 (NFS_MAXPATHLEN+1)) ||
2076 __get_user(karg->ca_getfd.gd_version,
2077 &arg->ca32_getfd.gd32_version))
2078 return -EFAULT;
2079
2080 return 0;
2081}
2082
2083static int compat_nfs_getfs_trans(struct nfsctl_arg *karg,
2084 struct compat_nfsctl_arg __user *arg)
2085{
2086 if (!access_ok(VERIFY_READ,&arg->ca32_getfs,sizeof(arg->ca32_getfs)) ||
2087 get_user(karg->ca_version, &arg->ca32_version) ||
2088 __copy_from_user(&karg->ca_getfs.gd_addr,
2089 &arg->ca32_getfs.gd32_addr,
2090 (sizeof(struct sockaddr))) ||
2091 __copy_from_user(&karg->ca_getfs.gd_path,
2092 &arg->ca32_getfs.gd32_path,
2093 (NFS_MAXPATHLEN+1)) ||
2094 __get_user(karg->ca_getfs.gd_maxlen,
2095 &arg->ca32_getfs.gd32_maxlen))
2096 return -EFAULT;
2097
2098 return 0;
2099}
2100
2101/* This really doesn't need translations, we are only passing
2102 * back a union which contains opaque nfs file handle data.
2103 */
2104static int compat_nfs_getfh_res_trans(union nfsctl_res *kres,
2105 union compat_nfsctl_res __user *res)
2106{
2107 int err;
2108
2109 err = copy_to_user(res, kres, sizeof(*res));
2110
2111 return (err) ? -EFAULT : 0;
2112}
2113
2114asmlinkage long compat_sys_nfsservctl(int cmd,
2115 struct compat_nfsctl_arg __user *arg,
2116 union compat_nfsctl_res __user *res)
2117{
2118 struct nfsctl_arg *karg;
2119 union nfsctl_res *kres;
2120 mm_segment_t oldfs;
2121 int err;
2122
2123 karg = kmalloc(sizeof(*karg), GFP_USER);
2124 kres = kmalloc(sizeof(*kres), GFP_USER);
2125 if(!karg || !kres) {
2126 err = -ENOMEM;
2127 goto done;
2128 }
2129
2130 switch(cmd) {
2131 case NFSCTL_SVC:
2132 err = compat_nfs_svc_trans(karg, arg);
2133 break;
2134
2135 case NFSCTL_ADDCLIENT:
2136 err = compat_nfs_clnt_trans(karg, arg);
2137 break;
2138
2139 case NFSCTL_DELCLIENT:
2140 err = compat_nfs_clnt_trans(karg, arg);
2141 break;
2142
2143 case NFSCTL_EXPORT:
2144 case NFSCTL_UNEXPORT:
2145 err = compat_nfs_exp_trans(karg, arg);
2146 break;
2147
2148 case NFSCTL_GETFD:
2149 err = compat_nfs_getfd_trans(karg, arg);
2150 break;
2151
2152 case NFSCTL_GETFS:
2153 err = compat_nfs_getfs_trans(karg, arg);
2154 break;
2155
2156 default:
2157 err = -EINVAL;
2158 break;
2159 }
2160
2161 if (err)
2162 goto done;
2163
2164 oldfs = get_fs();
2165 set_fs(KERNEL_DS);
2166 /* The __user pointer casts are valid because of the set_fs() */
2167 err = sys_nfsservctl(cmd, (void __user *) karg, (void __user *) kres);
2168 set_fs(oldfs);
2169
2170 if (err)
2171 goto done;
2172
2173 if((cmd == NFSCTL_GETFD) ||
2174 (cmd == NFSCTL_GETFS))
2175 err = compat_nfs_getfh_res_trans(kres, res);
2176
2177done:
2178 kfree(karg);
2179 kfree(kres);
2180 return err;
2181}
2182#else /* !NFSD */
2183long asmlinkage compat_sys_nfsservctl(int cmd, void *notused, void *notused2)
2184{
2185 return sys_ni_syscall();
2186}
2187#endif
2188
2189#ifdef CONFIG_EPOLL
2190
2191#ifdef HAVE_SET_RESTORE_SIGMASK
2192asmlinkage long compat_sys_epoll_pwait(int epfd,
2193 struct compat_epoll_event __user *events,
2194 int maxevents, int timeout,
2195 const compat_sigset_t __user *sigmask,
2196 compat_size_t sigsetsize)
2197{
2198 long err;
2199 compat_sigset_t csigmask;
2200 sigset_t ksigmask, sigsaved;
2201
2202 /*
2203 * If the caller wants a certain signal mask to be set during the wait,
2204 * we apply it here.
2205 */
2206 if (sigmask) {
2207 if (sigsetsize != sizeof(compat_sigset_t))
2208 return -EINVAL;
2209 if (copy_from_user(&csigmask, sigmask, sizeof(csigmask)))
2210 return -EFAULT;
2211 sigset_from_compat(&ksigmask, &csigmask);
2212 sigdelsetmask(&ksigmask, sigmask(SIGKILL) | sigmask(SIGSTOP));
2213 sigprocmask(SIG_SETMASK, &ksigmask, &sigsaved);
2214 }
2215
2216 err = sys_epoll_wait(epfd, events, maxevents, timeout);
2217
2218 /*
2219 * If we changed the signal mask, we need to restore the original one.
2220 * In case we've got a signal while waiting, we do not restore the
2221 * signal mask yet, and we allow do_signal() to deliver the signal on
2222 * the way back to userspace, before the signal mask is restored.
2223 */
2224 if (sigmask) {
2225 if (err == -EINTR) {
2226 memcpy(&current->saved_sigmask, &sigsaved,
2227 sizeof(sigsaved));
2228 set_restore_sigmask();
2229 } else
2230 sigprocmask(SIG_SETMASK, &sigsaved, NULL);
2231 }
2232
2233 return err;
2234}
2235#endif /* HAVE_SET_RESTORE_SIGMASK */
2236
2237#endif /* CONFIG_EPOLL */
2238
2239#ifdef CONFIG_SIGNALFD
2240
2241asmlinkage long compat_sys_signalfd4(int ufd,
2242 const compat_sigset_t __user *sigmask,
2243 compat_size_t sigsetsize, int flags)
2244{
2245 compat_sigset_t ss32;
2246 sigset_t tmp;
2247 sigset_t __user *ksigmask;
2248
2249 if (sigsetsize != sizeof(compat_sigset_t))
2250 return -EINVAL;
2251 if (copy_from_user(&ss32, sigmask, sizeof(ss32)))
2252 return -EFAULT;
2253 sigset_from_compat(&tmp, &ss32);
2254 ksigmask = compat_alloc_user_space(sizeof(sigset_t));
2255 if (copy_to_user(ksigmask, &tmp, sizeof(sigset_t)))
2256 return -EFAULT;
2257
2258 return sys_signalfd4(ufd, ksigmask, sizeof(sigset_t), flags);
2259}
2260
2261asmlinkage long compat_sys_signalfd(int ufd,
2262 const compat_sigset_t __user *sigmask,
2263 compat_size_t sigsetsize)
2264{
2265 return compat_sys_signalfd4(ufd, sigmask, sigsetsize, 0);
2266}
2267#endif /* CONFIG_SIGNALFD */
2268
2269#ifdef CONFIG_TIMERFD
2270
2271asmlinkage long compat_sys_timerfd_settime(int ufd, int flags,
2272 const struct compat_itimerspec __user *utmr,
2273 struct compat_itimerspec __user *otmr)
2274{
2275 int error;
2276 struct itimerspec t;
2277 struct itimerspec __user *ut;
2278
2279 if (get_compat_itimerspec(&t, utmr))
2280 return -EFAULT;
2281 ut = compat_alloc_user_space(2 * sizeof(struct itimerspec));
2282 if (copy_to_user(&ut[0], &t, sizeof(t)))
2283 return -EFAULT;
2284 error = sys_timerfd_settime(ufd, flags, &ut[0], &ut[1]);
2285 if (!error && otmr)
2286 error = (copy_from_user(&t, &ut[1], sizeof(struct itimerspec)) ||
2287 put_compat_itimerspec(otmr, &t)) ? -EFAULT: 0;
2288
2289 return error;
2290}
2291
2292asmlinkage long compat_sys_timerfd_gettime(int ufd,
2293 struct compat_itimerspec __user *otmr)
2294{
2295 int error;
2296 struct itimerspec t;
2297 struct itimerspec __user *ut;
2298
2299 ut = compat_alloc_user_space(sizeof(struct itimerspec));
2300 error = sys_timerfd_gettime(ufd, ut);
2301 if (!error)
2302 error = (copy_from_user(&t, ut, sizeof(struct itimerspec)) ||
2303 put_compat_itimerspec(otmr, &t)) ? -EFAULT: 0;
2304
2305 return error;
2306}
2307
2308#endif /* CONFIG_TIMERFD */