4 * Kernel compatibililty routines for e.g. 32 bit syscall support
7 * Copyright (C) 2002 Stephen Rothwell, IBM Corporation
8 * Copyright (C) 1997-2000 Jakub Jelinek (jakub@redhat.com)
9 * Copyright (C) 1998 Eddie C. Dost (ecd@skynet.be)
10 * Copyright (C) 2001,2002 Andi Kleen, SuSE Labs
11 * Copyright (C) 2003 Pavel Machek (pavel@ucw.cz)
13 * This program is free software; you can redistribute it and/or modify
14 * it under the terms of the GNU General Public License version 2 as
15 * published by the Free Software Foundation.
18 #include <linux/stddef.h>
19 #include <linux/kernel.h>
20 #include <linux/linkage.h>
21 #include <linux/compat.h>
22 #include <linux/errno.h>
23 #include <linux/time.h>
25 #include <linux/fcntl.h>
26 #include <linux/namei.h>
27 #include <linux/file.h>
28 #include <linux/fdtable.h>
29 #include <linux/vfs.h>
30 #include <linux/ioctl.h>
31 #include <linux/init.h>
32 #include <linux/ncp_mount.h>
33 #include <linux/nfs4_mount.h>
34 #include <linux/syscalls.h>
35 #include <linux/ctype.h>
36 #include <linux/dirent.h>
37 #include <linux/fsnotify.h>
38 #include <linux/highuid.h>
39 #include <linux/personality.h>
40 #include <linux/rwsem.h>
41 #include <linux/tsacct_kern.h>
42 #include <linux/security.h>
43 #include <linux/highmem.h>
44 #include <linux/signal.h>
45 #include <linux/poll.h>
47 #include <linux/fs_struct.h>
48 #include <linux/slab.h>
49 #include <linux/pagemap.h>
50 #include <linux/aio.h>
52 #include <asm/uaccess.h>
53 #include <asm/mmu_context.h>
54 #include <asm/ioctls.h>
59 int compat_printk(const char *fmt, ...)
66 ret = vprintk(fmt, ap);
72 * Not all architectures have sys_utime, so implement this in terms
75 COMPAT_SYSCALL_DEFINE2(utime, const char __user *, filename,
76 struct compat_utimbuf __user *, t)
78 struct timespec tv[2];
81 if (get_user(tv[0].tv_sec, &t->actime) ||
82 get_user(tv[1].tv_sec, &t->modtime))
87 return do_utimes(AT_FDCWD, filename, t ? tv : NULL, 0);
90 COMPAT_SYSCALL_DEFINE4(utimensat, unsigned int, dfd, const char __user *, filename, struct compat_timespec __user *, t, int, flags)
92 struct timespec tv[2];
95 if (compat_get_timespec(&tv[0], &t[0]) ||
96 compat_get_timespec(&tv[1], &t[1]))
99 if (tv[0].tv_nsec == UTIME_OMIT && tv[1].tv_nsec == UTIME_OMIT)
102 return do_utimes(dfd, filename, t ? tv : NULL, flags);
105 COMPAT_SYSCALL_DEFINE3(futimesat, unsigned int, dfd, const char __user *, filename, struct compat_timeval __user *, t)
107 struct timespec tv[2];
110 if (get_user(tv[0].tv_sec, &t[0].tv_sec) ||
111 get_user(tv[0].tv_nsec, &t[0].tv_usec) ||
112 get_user(tv[1].tv_sec, &t[1].tv_sec) ||
113 get_user(tv[1].tv_nsec, &t[1].tv_usec))
115 if (tv[0].tv_nsec >= 1000000 || tv[0].tv_nsec < 0 ||
116 tv[1].tv_nsec >= 1000000 || tv[1].tv_nsec < 0)
118 tv[0].tv_nsec *= 1000;
119 tv[1].tv_nsec *= 1000;
121 return do_utimes(dfd, filename, t ? tv : NULL, 0);
124 COMPAT_SYSCALL_DEFINE2(utimes, const char __user *, filename, struct compat_timeval __user *, t)
126 return compat_sys_futimesat(AT_FDCWD, filename, t);
129 static int cp_compat_stat(struct kstat *stat, struct compat_stat __user *ubuf)
131 struct compat_stat tmp;
133 if (!old_valid_dev(stat->dev) || !old_valid_dev(stat->rdev))
136 memset(&tmp, 0, sizeof(tmp));
137 tmp.st_dev = old_encode_dev(stat->dev);
138 tmp.st_ino = stat->ino;
139 if (sizeof(tmp.st_ino) < sizeof(stat->ino) && tmp.st_ino != stat->ino)
141 tmp.st_mode = stat->mode;
142 tmp.st_nlink = stat->nlink;
143 if (tmp.st_nlink != stat->nlink)
145 SET_UID(tmp.st_uid, from_kuid_munged(current_user_ns(), stat->uid));
146 SET_GID(tmp.st_gid, from_kgid_munged(current_user_ns(), stat->gid));
147 tmp.st_rdev = old_encode_dev(stat->rdev);
148 if ((u64) stat->size > MAX_NON_LFS)
150 tmp.st_size = stat->size;
151 tmp.st_atime = stat->atime.tv_sec;
152 tmp.st_atime_nsec = stat->atime.tv_nsec;
153 tmp.st_mtime = stat->mtime.tv_sec;
154 tmp.st_mtime_nsec = stat->mtime.tv_nsec;
155 tmp.st_ctime = stat->ctime.tv_sec;
156 tmp.st_ctime_nsec = stat->ctime.tv_nsec;
157 tmp.st_blocks = stat->blocks;
158 tmp.st_blksize = stat->blksize;
159 return copy_to_user(ubuf, &tmp, sizeof(tmp)) ? -EFAULT : 0;
162 COMPAT_SYSCALL_DEFINE2(newstat, const char __user *, filename,
163 struct compat_stat __user *, statbuf)
168 error = vfs_stat(filename, &stat);
171 return cp_compat_stat(&stat, statbuf);
174 COMPAT_SYSCALL_DEFINE2(newlstat, const char __user *, filename,
175 struct compat_stat __user *, statbuf)
180 error = vfs_lstat(filename, &stat);
183 return cp_compat_stat(&stat, statbuf);
186 #ifndef __ARCH_WANT_STAT64
187 COMPAT_SYSCALL_DEFINE4(newfstatat, unsigned int, dfd,
188 const char __user *, filename,
189 struct compat_stat __user *, statbuf, int, flag)
194 error = vfs_fstatat(dfd, filename, &stat, flag);
197 return cp_compat_stat(&stat, statbuf);
201 COMPAT_SYSCALL_DEFINE2(newfstat, unsigned int, fd,
202 struct compat_stat __user *, statbuf)
205 int error = vfs_fstat(fd, &stat);
208 error = cp_compat_stat(&stat, statbuf);
212 static int put_compat_statfs(struct compat_statfs __user *ubuf, struct kstatfs *kbuf)
215 if (sizeof ubuf->f_blocks == 4) {
216 if ((kbuf->f_blocks | kbuf->f_bfree | kbuf->f_bavail |
217 kbuf->f_bsize | kbuf->f_frsize) & 0xffffffff00000000ULL)
219 /* f_files and f_ffree may be -1; it's okay
220 * to stuff that into 32 bits */
221 if (kbuf->f_files != 0xffffffffffffffffULL
222 && (kbuf->f_files & 0xffffffff00000000ULL))
224 if (kbuf->f_ffree != 0xffffffffffffffffULL
225 && (kbuf->f_ffree & 0xffffffff00000000ULL))
228 if (!access_ok(VERIFY_WRITE, ubuf, sizeof(*ubuf)) ||
229 __put_user(kbuf->f_type, &ubuf->f_type) ||
230 __put_user(kbuf->f_bsize, &ubuf->f_bsize) ||
231 __put_user(kbuf->f_blocks, &ubuf->f_blocks) ||
232 __put_user(kbuf->f_bfree, &ubuf->f_bfree) ||
233 __put_user(kbuf->f_bavail, &ubuf->f_bavail) ||
234 __put_user(kbuf->f_files, &ubuf->f_files) ||
235 __put_user(kbuf->f_ffree, &ubuf->f_ffree) ||
236 __put_user(kbuf->f_namelen, &ubuf->f_namelen) ||
237 __put_user(kbuf->f_fsid.val[0], &ubuf->f_fsid.val[0]) ||
238 __put_user(kbuf->f_fsid.val[1], &ubuf->f_fsid.val[1]) ||
239 __put_user(kbuf->f_frsize, &ubuf->f_frsize) ||
240 __put_user(kbuf->f_flags, &ubuf->f_flags) ||
241 __clear_user(ubuf->f_spare, sizeof(ubuf->f_spare)))
247 * The following statfs calls are copies of code from fs/statfs.c and
248 * should be checked against those from time to time
250 COMPAT_SYSCALL_DEFINE2(statfs, const char __user *, pathname, struct compat_statfs __user *, buf)
253 int error = user_statfs(pathname, &tmp);
255 error = put_compat_statfs(buf, &tmp);
259 COMPAT_SYSCALL_DEFINE2(fstatfs, unsigned int, fd, struct compat_statfs __user *, buf)
262 int error = fd_statfs(fd, &tmp);
264 error = put_compat_statfs(buf, &tmp);
268 static int put_compat_statfs64(struct compat_statfs64 __user *ubuf, struct kstatfs *kbuf)
270 if (sizeof ubuf->f_blocks == 4) {
271 if ((kbuf->f_blocks | kbuf->f_bfree | kbuf->f_bavail |
272 kbuf->f_bsize | kbuf->f_frsize) & 0xffffffff00000000ULL)
274 /* f_files and f_ffree may be -1; it's okay
275 * to stuff that into 32 bits */
276 if (kbuf->f_files != 0xffffffffffffffffULL
277 && (kbuf->f_files & 0xffffffff00000000ULL))
279 if (kbuf->f_ffree != 0xffffffffffffffffULL
280 && (kbuf->f_ffree & 0xffffffff00000000ULL))
283 if (!access_ok(VERIFY_WRITE, ubuf, sizeof(*ubuf)) ||
284 __put_user(kbuf->f_type, &ubuf->f_type) ||
285 __put_user(kbuf->f_bsize, &ubuf->f_bsize) ||
286 __put_user(kbuf->f_blocks, &ubuf->f_blocks) ||
287 __put_user(kbuf->f_bfree, &ubuf->f_bfree) ||
288 __put_user(kbuf->f_bavail, &ubuf->f_bavail) ||
289 __put_user(kbuf->f_files, &ubuf->f_files) ||
290 __put_user(kbuf->f_ffree, &ubuf->f_ffree) ||
291 __put_user(kbuf->f_namelen, &ubuf->f_namelen) ||
292 __put_user(kbuf->f_fsid.val[0], &ubuf->f_fsid.val[0]) ||
293 __put_user(kbuf->f_fsid.val[1], &ubuf->f_fsid.val[1]) ||
294 __put_user(kbuf->f_frsize, &ubuf->f_frsize) ||
295 __put_user(kbuf->f_flags, &ubuf->f_flags) ||
296 __clear_user(ubuf->f_spare, sizeof(ubuf->f_spare)))
301 COMPAT_SYSCALL_DEFINE3(statfs64, const char __user *, pathname, compat_size_t, sz, struct compat_statfs64 __user *, buf)
306 if (sz != sizeof(*buf))
309 error = user_statfs(pathname, &tmp);
311 error = put_compat_statfs64(buf, &tmp);
315 COMPAT_SYSCALL_DEFINE3(fstatfs64, unsigned int, fd, compat_size_t, sz, struct compat_statfs64 __user *, buf)
320 if (sz != sizeof(*buf))
323 error = fd_statfs(fd, &tmp);
325 error = put_compat_statfs64(buf, &tmp);
330 * This is a copy of sys_ustat, just dealing with a structure layout.
331 * Given how simple this syscall is that apporach is more maintainable
332 * than the various conversion hacks.
334 COMPAT_SYSCALL_DEFINE2(ustat, unsigned, dev, struct compat_ustat __user *, u)
336 struct compat_ustat tmp;
338 int err = vfs_ustat(new_decode_dev(dev), &sbuf);
342 memset(&tmp, 0, sizeof(struct compat_ustat));
343 tmp.f_tfree = sbuf.f_bfree;
344 tmp.f_tinode = sbuf.f_ffree;
345 if (copy_to_user(u, &tmp, sizeof(struct compat_ustat)))
350 static int get_compat_flock(struct flock *kfl, struct compat_flock __user *ufl)
352 if (!access_ok(VERIFY_READ, ufl, sizeof(*ufl)) ||
353 __get_user(kfl->l_type, &ufl->l_type) ||
354 __get_user(kfl->l_whence, &ufl->l_whence) ||
355 __get_user(kfl->l_start, &ufl->l_start) ||
356 __get_user(kfl->l_len, &ufl->l_len) ||
357 __get_user(kfl->l_pid, &ufl->l_pid))
362 static int put_compat_flock(struct flock *kfl, struct compat_flock __user *ufl)
364 if (!access_ok(VERIFY_WRITE, ufl, sizeof(*ufl)) ||
365 __put_user(kfl->l_type, &ufl->l_type) ||
366 __put_user(kfl->l_whence, &ufl->l_whence) ||
367 __put_user(kfl->l_start, &ufl->l_start) ||
368 __put_user(kfl->l_len, &ufl->l_len) ||
369 __put_user(kfl->l_pid, &ufl->l_pid))
374 #ifndef HAVE_ARCH_GET_COMPAT_FLOCK64
375 static int get_compat_flock64(struct flock *kfl, struct compat_flock64 __user *ufl)
377 if (!access_ok(VERIFY_READ, ufl, sizeof(*ufl)) ||
378 __get_user(kfl->l_type, &ufl->l_type) ||
379 __get_user(kfl->l_whence, &ufl->l_whence) ||
380 __get_user(kfl->l_start, &ufl->l_start) ||
381 __get_user(kfl->l_len, &ufl->l_len) ||
382 __get_user(kfl->l_pid, &ufl->l_pid))
388 #ifndef HAVE_ARCH_PUT_COMPAT_FLOCK64
389 static int put_compat_flock64(struct flock *kfl, struct compat_flock64 __user *ufl)
391 if (!access_ok(VERIFY_WRITE, ufl, sizeof(*ufl)) ||
392 __put_user(kfl->l_type, &ufl->l_type) ||
393 __put_user(kfl->l_whence, &ufl->l_whence) ||
394 __put_user(kfl->l_start, &ufl->l_start) ||
395 __put_user(kfl->l_len, &ufl->l_len) ||
396 __put_user(kfl->l_pid, &ufl->l_pid))
403 convert_fcntl_cmd(unsigned int cmd)
417 COMPAT_SYSCALL_DEFINE3(fcntl64, unsigned int, fd, unsigned int, cmd,
423 unsigned int conv_cmd;
429 ret = get_compat_flock(&f, compat_ptr(arg));
434 ret = sys_fcntl(fd, cmd, (unsigned long)&f);
436 if (cmd == F_GETLK && ret == 0) {
437 /* GETLK was successful and we need to return the data...
438 * but it needs to fit in the compat structure.
439 * l_start shouldn't be too big, unless the original
440 * start + end is greater than COMPAT_OFF_T_MAX, in which
441 * case the app was asking for trouble, so we return
442 * -EOVERFLOW in that case.
443 * l_len could be too big, in which case we just truncate it,
444 * and only allow the app to see that part of the conflicting
445 * lock that might make sense to it anyway
448 if (f.l_start > COMPAT_OFF_T_MAX)
450 if (f.l_len > COMPAT_OFF_T_MAX)
451 f.l_len = COMPAT_OFF_T_MAX;
453 ret = put_compat_flock(&f, compat_ptr(arg));
463 ret = get_compat_flock64(&f, compat_ptr(arg));
468 conv_cmd = convert_fcntl_cmd(cmd);
469 ret = sys_fcntl(fd, conv_cmd, (unsigned long)&f);
471 if ((conv_cmd == F_GETLK || conv_cmd == F_OFD_GETLK) && ret == 0) {
472 /* need to return lock information - see above for commentary */
473 if (f.l_start > COMPAT_LOFF_T_MAX)
475 if (f.l_len > COMPAT_LOFF_T_MAX)
476 f.l_len = COMPAT_LOFF_T_MAX;
478 ret = put_compat_flock64(&f, compat_ptr(arg));
483 ret = sys_fcntl(fd, cmd, arg);
489 COMPAT_SYSCALL_DEFINE3(fcntl, unsigned int, fd, unsigned int, cmd,
501 return compat_sys_fcntl64(fd, cmd, arg);
504 COMPAT_SYSCALL_DEFINE2(io_setup, unsigned, nr_reqs, u32 __user *, ctx32p)
509 mm_segment_t oldfs = get_fs();
510 if (unlikely(get_user(ctx64, ctx32p)))
514 /* The __user pointer cast is valid because of the set_fs() */
515 ret = sys_io_setup(nr_reqs, (aio_context_t __user *) &ctx64);
517 /* truncating is ok because it's a user address */
519 ret = put_user((u32) ctx64, ctx32p);
523 COMPAT_SYSCALL_DEFINE5(io_getevents, compat_aio_context_t, ctx_id,
524 compat_long_t, min_nr,
526 struct io_event __user *, events,
527 struct compat_timespec __user *, timeout)
530 struct timespec __user *ut = NULL;
533 if (compat_get_timespec(&t, timeout))
536 ut = compat_alloc_user_space(sizeof(*ut));
537 if (copy_to_user(ut, &t, sizeof(t)) )
540 return sys_io_getevents(ctx_id, min_nr, nr, events, ut);
543 /* A write operation does a read from user space and vice versa */
544 #define vrfy_dir(type) ((type) == READ ? VERIFY_WRITE : VERIFY_READ)
546 ssize_t compat_rw_copy_check_uvector(int type,
547 const struct compat_iovec __user *uvector, unsigned long nr_segs,
548 unsigned long fast_segs, struct iovec *fast_pointer,
549 struct iovec **ret_pointer)
551 compat_ssize_t tot_len;
552 struct iovec *iov = *ret_pointer = fast_pointer;
557 * SuS says "The readv() function *may* fail if the iovcnt argument
558 * was less than or equal to 0, or greater than {IOV_MAX}. Linux has
559 * traditionally returned zero for zero segments, so...
565 if (nr_segs > UIO_MAXIOV || nr_segs < 0)
567 if (nr_segs > fast_segs) {
569 iov = kmalloc(nr_segs*sizeof(struct iovec), GFP_KERNEL);
576 if (!access_ok(VERIFY_READ, uvector, nr_segs*sizeof(*uvector)))
580 * Single unix specification:
581 * We should -EINVAL if an element length is not >= 0 and fitting an
584 * In Linux, the total length is limited to MAX_RW_COUNT, there is
585 * no overflow possibility.
589 for (seg = 0; seg < nr_segs; seg++) {
593 if (__get_user(len, &uvector->iov_len) ||
594 __get_user(buf, &uvector->iov_base)) {
598 if (len < 0) /* size_t not fitting in compat_ssize_t .. */
601 !access_ok(vrfy_dir(type), compat_ptr(buf), len)) {
605 if (len > MAX_RW_COUNT - tot_len)
606 len = MAX_RW_COUNT - tot_len;
608 iov->iov_base = compat_ptr(buf);
609 iov->iov_len = (compat_size_t) len;
620 copy_iocb(long nr, u32 __user *ptr32, struct iocb __user * __user *ptr64)
625 for (i = 0; i < nr; ++i) {
626 if (get_user(uptr, ptr32 + i))
628 if (put_user(compat_ptr(uptr), ptr64 + i))
634 #define MAX_AIO_SUBMITS (PAGE_SIZE/sizeof(struct iocb *))
636 COMPAT_SYSCALL_DEFINE3(io_submit, compat_aio_context_t, ctx_id,
637 int, nr, u32 __user *, iocb)
639 struct iocb __user * __user *iocb64;
642 if (unlikely(nr < 0))
645 if (nr > MAX_AIO_SUBMITS)
646 nr = MAX_AIO_SUBMITS;
648 iocb64 = compat_alloc_user_space(nr * sizeof(*iocb64));
649 ret = copy_iocb(nr, iocb, iocb64);
651 ret = do_io_submit(ctx_id, nr, iocb64, 1);
655 struct compat_ncp_mount_data {
656 compat_int_t version;
657 compat_uint_t ncp_fd;
658 __compat_uid_t mounted_uid;
659 compat_pid_t wdog_pid;
660 unsigned char mounted_vol[NCP_VOLNAME_LEN + 1];
661 compat_uint_t time_out;
662 compat_uint_t retry_count;
666 compat_mode_t file_mode;
667 compat_mode_t dir_mode;
670 struct compat_ncp_mount_data_v4 {
671 compat_int_t version;
672 compat_ulong_t flags;
673 compat_ulong_t mounted_uid;
674 compat_long_t wdog_pid;
675 compat_uint_t ncp_fd;
676 compat_uint_t time_out;
677 compat_uint_t retry_count;
680 compat_ulong_t file_mode;
681 compat_ulong_t dir_mode;
684 static void *do_ncp_super_data_conv(void *raw_data)
686 int version = *(unsigned int *)raw_data;
689 struct compat_ncp_mount_data *c_n = raw_data;
690 struct ncp_mount_data *n = raw_data;
692 n->dir_mode = c_n->dir_mode;
693 n->file_mode = c_n->file_mode;
696 memmove (n->mounted_vol, c_n->mounted_vol, (sizeof (c_n->mounted_vol) + 3 * sizeof (unsigned int)));
697 n->wdog_pid = c_n->wdog_pid;
698 n->mounted_uid = c_n->mounted_uid;
699 } else if (version == 4) {
700 struct compat_ncp_mount_data_v4 *c_n = raw_data;
701 struct ncp_mount_data_v4 *n = raw_data;
703 n->dir_mode = c_n->dir_mode;
704 n->file_mode = c_n->file_mode;
707 n->retry_count = c_n->retry_count;
708 n->time_out = c_n->time_out;
709 n->ncp_fd = c_n->ncp_fd;
710 n->wdog_pid = c_n->wdog_pid;
711 n->mounted_uid = c_n->mounted_uid;
712 n->flags = c_n->flags;
713 } else if (version != 5) {
721 struct compat_nfs_string {
726 static inline void compat_nfs_string(struct nfs_string *dst,
727 struct compat_nfs_string *src)
729 dst->data = compat_ptr(src->data);
733 struct compat_nfs4_mount_data_v1 {
734 compat_int_t version;
739 compat_int_t retrans;
740 compat_int_t acregmin;
741 compat_int_t acregmax;
742 compat_int_t acdirmin;
743 compat_int_t acdirmax;
744 struct compat_nfs_string client_addr;
745 struct compat_nfs_string mnt_path;
746 struct compat_nfs_string hostname;
747 compat_uint_t host_addrlen;
748 compat_uptr_t host_addr;
750 compat_int_t auth_flavourlen;
751 compat_uptr_t auth_flavours;
754 static int do_nfs4_super_data_conv(void *raw_data)
756 int version = *(compat_uint_t *) raw_data;
759 struct compat_nfs4_mount_data_v1 *raw = raw_data;
760 struct nfs4_mount_data *real = raw_data;
762 /* copy the fields backwards */
763 real->auth_flavours = compat_ptr(raw->auth_flavours);
764 real->auth_flavourlen = raw->auth_flavourlen;
765 real->proto = raw->proto;
766 real->host_addr = compat_ptr(raw->host_addr);
767 real->host_addrlen = raw->host_addrlen;
768 compat_nfs_string(&real->hostname, &raw->hostname);
769 compat_nfs_string(&real->mnt_path, &raw->mnt_path);
770 compat_nfs_string(&real->client_addr, &raw->client_addr);
771 real->acdirmax = raw->acdirmax;
772 real->acdirmin = raw->acdirmin;
773 real->acregmax = raw->acregmax;
774 real->acregmin = raw->acregmin;
775 real->retrans = raw->retrans;
776 real->timeo = raw->timeo;
777 real->wsize = raw->wsize;
778 real->rsize = raw->rsize;
779 real->flags = raw->flags;
780 real->version = raw->version;
786 #define NCPFS_NAME "ncpfs"
787 #define NFS4_NAME "nfs4"
789 COMPAT_SYSCALL_DEFINE5(mount, const char __user *, dev_name,
790 const char __user *, dir_name,
791 const char __user *, type, compat_ulong_t, flags,
792 const void __user *, data)
795 unsigned long data_page;
799 kernel_type = copy_mount_string(type);
800 retval = PTR_ERR(kernel_type);
801 if (IS_ERR(kernel_type))
804 kernel_dev = copy_mount_string(dev_name);
805 retval = PTR_ERR(kernel_dev);
806 if (IS_ERR(kernel_dev))
809 retval = copy_mount_options(data, &data_page);
815 if (kernel_type && data_page) {
816 if (!strcmp(kernel_type, NCPFS_NAME)) {
817 do_ncp_super_data_conv((void *)data_page);
818 } else if (!strcmp(kernel_type, NFS4_NAME)) {
819 if (do_nfs4_super_data_conv((void *) data_page))
824 retval = do_mount(kernel_dev, dir_name, kernel_type,
825 flags, (void*)data_page);
828 free_page(data_page);
837 struct compat_old_linux_dirent {
838 compat_ulong_t d_ino;
839 compat_ulong_t d_offset;
840 unsigned short d_namlen;
844 struct compat_readdir_callback {
845 struct dir_context ctx;
846 struct compat_old_linux_dirent __user *dirent;
850 static int compat_fillonedir(struct dir_context *ctx, const char *name,
851 int namlen, loff_t offset, u64 ino,
854 struct compat_readdir_callback *buf =
855 container_of(ctx, struct compat_readdir_callback, ctx);
856 struct compat_old_linux_dirent __user *dirent;
857 compat_ulong_t d_ino;
862 if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) {
863 buf->result = -EOVERFLOW;
867 dirent = buf->dirent;
868 if (!access_ok(VERIFY_WRITE, dirent,
869 (unsigned long)(dirent->d_name + namlen + 1) -
870 (unsigned long)dirent))
872 if ( __put_user(d_ino, &dirent->d_ino) ||
873 __put_user(offset, &dirent->d_offset) ||
874 __put_user(namlen, &dirent->d_namlen) ||
875 __copy_to_user(dirent->d_name, name, namlen) ||
876 __put_user(0, dirent->d_name + namlen))
880 buf->result = -EFAULT;
884 COMPAT_SYSCALL_DEFINE3(old_readdir, unsigned int, fd,
885 struct compat_old_linux_dirent __user *, dirent, unsigned int, count)
888 struct fd f = fdget(fd);
889 struct compat_readdir_callback buf = {
890 .ctx.actor = compat_fillonedir,
897 error = iterate_dir(f.file, &buf.ctx);
905 struct compat_linux_dirent {
906 compat_ulong_t d_ino;
907 compat_ulong_t d_off;
908 unsigned short d_reclen;
912 struct compat_getdents_callback {
913 struct dir_context ctx;
914 struct compat_linux_dirent __user *current_dir;
915 struct compat_linux_dirent __user *previous;
920 static int compat_filldir(struct dir_context *ctx, const char *name, int namlen,
921 loff_t offset, u64 ino, unsigned int d_type)
923 struct compat_linux_dirent __user * dirent;
924 struct compat_getdents_callback *buf =
925 container_of(ctx, struct compat_getdents_callback, ctx);
926 compat_ulong_t d_ino;
927 int reclen = ALIGN(offsetof(struct compat_linux_dirent, d_name) +
928 namlen + 2, sizeof(compat_long_t));
930 buf->error = -EINVAL; /* only used if we fail.. */
931 if (reclen > buf->count)
934 if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) {
935 buf->error = -EOVERFLOW;
938 dirent = buf->previous;
940 if (__put_user(offset, &dirent->d_off))
943 dirent = buf->current_dir;
944 if (__put_user(d_ino, &dirent->d_ino))
946 if (__put_user(reclen, &dirent->d_reclen))
948 if (copy_to_user(dirent->d_name, name, namlen))
950 if (__put_user(0, dirent->d_name + namlen))
952 if (__put_user(d_type, (char __user *) dirent + reclen - 1))
954 buf->previous = dirent;
955 dirent = (void __user *)dirent + reclen;
956 buf->current_dir = dirent;
957 buf->count -= reclen;
960 buf->error = -EFAULT;
964 COMPAT_SYSCALL_DEFINE3(getdents, unsigned int, fd,
965 struct compat_linux_dirent __user *, dirent, unsigned int, count)
968 struct compat_linux_dirent __user * lastdirent;
969 struct compat_getdents_callback buf = {
970 .ctx.actor = compat_filldir,
971 .current_dir = dirent,
976 if (!access_ok(VERIFY_WRITE, dirent, count))
983 error = iterate_dir(f.file, &buf.ctx);
986 lastdirent = buf.previous;
988 if (put_user(buf.ctx.pos, &lastdirent->d_off))
991 error = count - buf.count;
997 #ifdef __ARCH_WANT_COMPAT_SYS_GETDENTS64
999 struct compat_getdents_callback64 {
1000 struct dir_context ctx;
1001 struct linux_dirent64 __user *current_dir;
1002 struct linux_dirent64 __user *previous;
1007 static int compat_filldir64(struct dir_context *ctx, const char *name,
1008 int namlen, loff_t offset, u64 ino,
1009 unsigned int d_type)
1011 struct linux_dirent64 __user *dirent;
1012 struct compat_getdents_callback64 *buf =
1013 container_of(ctx, struct compat_getdents_callback64, ctx);
1014 int reclen = ALIGN(offsetof(struct linux_dirent64, d_name) + namlen + 1,
1018 buf->error = -EINVAL; /* only used if we fail.. */
1019 if (reclen > buf->count)
1021 dirent = buf->previous;
1024 if (__put_user_unaligned(offset, &dirent->d_off))
1027 dirent = buf->current_dir;
1028 if (__put_user_unaligned(ino, &dirent->d_ino))
1031 if (__put_user_unaligned(off, &dirent->d_off))
1033 if (__put_user(reclen, &dirent->d_reclen))
1035 if (__put_user(d_type, &dirent->d_type))
1037 if (copy_to_user(dirent->d_name, name, namlen))
1039 if (__put_user(0, dirent->d_name + namlen))
1041 buf->previous = dirent;
1042 dirent = (void __user *)dirent + reclen;
1043 buf->current_dir = dirent;
1044 buf->count -= reclen;
1047 buf->error = -EFAULT;
1051 COMPAT_SYSCALL_DEFINE3(getdents64, unsigned int, fd,
1052 struct linux_dirent64 __user *, dirent, unsigned int, count)
1055 struct linux_dirent64 __user * lastdirent;
1056 struct compat_getdents_callback64 buf = {
1057 .ctx.actor = compat_filldir64,
1058 .current_dir = dirent,
1063 if (!access_ok(VERIFY_WRITE, dirent, count))
1070 error = iterate_dir(f.file, &buf.ctx);
1073 lastdirent = buf.previous;
1075 typeof(lastdirent->d_off) d_off = buf.ctx.pos;
1076 if (__put_user_unaligned(d_off, &lastdirent->d_off))
1079 error = count - buf.count;
1084 #endif /* __ARCH_WANT_COMPAT_SYS_GETDENTS64 */
1087 * Exactly like fs/open.c:sys_open(), except that it doesn't set the
1090 COMPAT_SYSCALL_DEFINE3(open, const char __user *, filename, int, flags, umode_t, mode)
1092 return do_sys_open(AT_FDCWD, filename, flags, mode);
1096 * Exactly like fs/open.c:sys_openat(), except that it doesn't set the
1099 COMPAT_SYSCALL_DEFINE4(openat, int, dfd, const char __user *, filename, int, flags, umode_t, mode)
1101 return do_sys_open(dfd, filename, flags, mode);
1104 #define __COMPAT_NFDBITS (8 * sizeof(compat_ulong_t))
1106 static int poll_select_copy_remaining(struct timespec *end_time, void __user *p,
1107 int timeval, int ret)
1114 if (current->personality & STICKY_TIMEOUTS)
1117 /* No update for zero timeout */
1118 if (!end_time->tv_sec && !end_time->tv_nsec)
1122 ts = timespec_sub(*end_time, ts);
1124 ts.tv_sec = ts.tv_nsec = 0;
1127 struct compat_timeval rtv;
1129 rtv.tv_sec = ts.tv_sec;
1130 rtv.tv_usec = ts.tv_nsec / NSEC_PER_USEC;
1132 if (!copy_to_user(p, &rtv, sizeof(rtv)))
1135 struct compat_timespec rts;
1137 rts.tv_sec = ts.tv_sec;
1138 rts.tv_nsec = ts.tv_nsec;
1140 if (!copy_to_user(p, &rts, sizeof(rts)))
1144 * If an application puts its timeval in read-only memory, we
1145 * don't want the Linux-specific update to the timeval to
1146 * cause a fault after the select has completed
1147 * successfully. However, because we're not updating the
1148 * timeval, we can't restart the system call.
1152 if (ret == -ERESTARTNOHAND)
1158 * Ooo, nasty. We need here to frob 32-bit unsigned longs to
1159 * 64-bit unsigned longs.
1162 int compat_get_fd_set(unsigned long nr, compat_ulong_t __user *ufdset,
1163 unsigned long *fdset)
1165 nr = DIV_ROUND_UP(nr, __COMPAT_NFDBITS);
1169 if (!access_ok(VERIFY_WRITE, ufdset, nr*sizeof(compat_ulong_t)))
1176 if (__get_user(l, ufdset) || __get_user(h, ufdset+1))
1179 *fdset++ = h << 32 | l;
1182 if (odd && __get_user(*fdset, ufdset))
1185 /* Tricky, must clear full unsigned long in the
1186 * kernel fdset at the end, this makes sure that
1189 memset(fdset, 0, ((nr + 1) & ~1)*sizeof(compat_ulong_t));
1195 int compat_set_fd_set(unsigned long nr, compat_ulong_t __user *ufdset,
1196 unsigned long *fdset)
1199 nr = DIV_ROUND_UP(nr, __COMPAT_NFDBITS);
1210 if (__put_user(l, ufdset) || __put_user(h, ufdset+1))
1215 if (odd && __put_user(*fdset, ufdset))
1222 * This is a virtual copy of sys_select from fs/select.c and probably
1223 * should be compared to it from time to time
1227 * We can actually return ERESTARTSYS instead of EINTR, but I'd
1228 * like to be certain this leads to no problems. So I return
1229 * EINTR just for safety.
1231 * Update: ERESTARTSYS breaks at least the xview clock binary, so
1232 * I'm trying ERESTARTNOHAND which restart only when you want to.
1234 int compat_core_sys_select(int n, compat_ulong_t __user *inp,
1235 compat_ulong_t __user *outp, compat_ulong_t __user *exp,
1236 struct timespec *end_time)
1240 int size, max_fds, ret = -EINVAL;
1241 struct fdtable *fdt;
1242 long stack_fds[SELECT_STACK_ALLOC/sizeof(long)];
1247 /* max_fds can increase, so grab it once to avoid race */
1249 fdt = files_fdtable(current->files);
1250 max_fds = fdt->max_fds;
1256 * We need 6 bitmaps (in/out/ex for both incoming and outgoing),
1257 * since we used fdset we need to allocate memory in units of
1260 size = FDS_BYTES(n);
1262 if (size > sizeof(stack_fds) / 6) {
1263 bits = kmalloc(6 * size, GFP_KERNEL);
1268 fds.in = (unsigned long *) bits;
1269 fds.out = (unsigned long *) (bits + size);
1270 fds.ex = (unsigned long *) (bits + 2*size);
1271 fds.res_in = (unsigned long *) (bits + 3*size);
1272 fds.res_out = (unsigned long *) (bits + 4*size);
1273 fds.res_ex = (unsigned long *) (bits + 5*size);
1275 if ((ret = compat_get_fd_set(n, inp, fds.in)) ||
1276 (ret = compat_get_fd_set(n, outp, fds.out)) ||
1277 (ret = compat_get_fd_set(n, exp, fds.ex)))
1279 zero_fd_set(n, fds.res_in);
1280 zero_fd_set(n, fds.res_out);
1281 zero_fd_set(n, fds.res_ex);
1283 ret = do_select(n, &fds, end_time);
1288 ret = -ERESTARTNOHAND;
1289 if (signal_pending(current))
1294 if (compat_set_fd_set(n, inp, fds.res_in) ||
1295 compat_set_fd_set(n, outp, fds.res_out) ||
1296 compat_set_fd_set(n, exp, fds.res_ex))
1299 if (bits != stack_fds)
1305 COMPAT_SYSCALL_DEFINE5(select, int, n, compat_ulong_t __user *, inp,
1306 compat_ulong_t __user *, outp, compat_ulong_t __user *, exp,
1307 struct compat_timeval __user *, tvp)
1309 struct timespec end_time, *to = NULL;
1310 struct compat_timeval tv;
1314 if (copy_from_user(&tv, tvp, sizeof(tv)))
1318 if (poll_select_set_timeout(to,
1319 tv.tv_sec + (tv.tv_usec / USEC_PER_SEC),
1320 (tv.tv_usec % USEC_PER_SEC) * NSEC_PER_USEC))
1324 ret = compat_core_sys_select(n, inp, outp, exp, to);
1325 ret = poll_select_copy_remaining(&end_time, tvp, 1, ret);
1330 struct compat_sel_arg_struct {
1338 COMPAT_SYSCALL_DEFINE1(old_select, struct compat_sel_arg_struct __user *, arg)
1340 struct compat_sel_arg_struct a;
1342 if (copy_from_user(&a, arg, sizeof(a)))
1344 return compat_sys_select(a.n, compat_ptr(a.inp), compat_ptr(a.outp),
1345 compat_ptr(a.exp), compat_ptr(a.tvp));
1348 static long do_compat_pselect(int n, compat_ulong_t __user *inp,
1349 compat_ulong_t __user *outp, compat_ulong_t __user *exp,
1350 struct compat_timespec __user *tsp, compat_sigset_t __user *sigmask,
1351 compat_size_t sigsetsize)
1353 compat_sigset_t ss32;
1354 sigset_t ksigmask, sigsaved;
1355 struct compat_timespec ts;
1356 struct timespec end_time, *to = NULL;
1360 if (copy_from_user(&ts, tsp, sizeof(ts)))
1364 if (poll_select_set_timeout(to, ts.tv_sec, ts.tv_nsec))
1369 if (sigsetsize != sizeof(compat_sigset_t))
1371 if (copy_from_user(&ss32, sigmask, sizeof(ss32)))
1373 sigset_from_compat(&ksigmask, &ss32);
1375 sigdelsetmask(&ksigmask, sigmask(SIGKILL)|sigmask(SIGSTOP));
1376 sigprocmask(SIG_SETMASK, &ksigmask, &sigsaved);
1379 ret = compat_core_sys_select(n, inp, outp, exp, to);
1380 ret = poll_select_copy_remaining(&end_time, tsp, 0, ret);
1382 if (ret == -ERESTARTNOHAND) {
1384 * Don't restore the signal mask yet. Let do_signal() deliver
1385 * the signal on the way back to userspace, before the signal
1389 memcpy(¤t->saved_sigmask, &sigsaved,
1391 set_restore_sigmask();
1394 sigprocmask(SIG_SETMASK, &sigsaved, NULL);
1399 COMPAT_SYSCALL_DEFINE6(pselect6, int, n, compat_ulong_t __user *, inp,
1400 compat_ulong_t __user *, outp, compat_ulong_t __user *, exp,
1401 struct compat_timespec __user *, tsp, void __user *, sig)
1403 compat_size_t sigsetsize = 0;
1404 compat_uptr_t up = 0;
1407 if (!access_ok(VERIFY_READ, sig,
1408 sizeof(compat_uptr_t)+sizeof(compat_size_t)) ||
1409 __get_user(up, (compat_uptr_t __user *)sig) ||
1410 __get_user(sigsetsize,
1411 (compat_size_t __user *)(sig+sizeof(up))))
1414 return do_compat_pselect(n, inp, outp, exp, tsp, compat_ptr(up),
1418 COMPAT_SYSCALL_DEFINE5(ppoll, struct pollfd __user *, ufds,
1419 unsigned int, nfds, struct compat_timespec __user *, tsp,
1420 const compat_sigset_t __user *, sigmask, compat_size_t, sigsetsize)
1422 compat_sigset_t ss32;
1423 sigset_t ksigmask, sigsaved;
1424 struct compat_timespec ts;
1425 struct timespec end_time, *to = NULL;
1429 if (copy_from_user(&ts, tsp, sizeof(ts)))
1433 if (poll_select_set_timeout(to, ts.tv_sec, ts.tv_nsec))
1438 if (sigsetsize != sizeof(compat_sigset_t))
1440 if (copy_from_user(&ss32, sigmask, sizeof(ss32)))
1442 sigset_from_compat(&ksigmask, &ss32);
1444 sigdelsetmask(&ksigmask, sigmask(SIGKILL)|sigmask(SIGSTOP));
1445 sigprocmask(SIG_SETMASK, &ksigmask, &sigsaved);
1448 ret = do_sys_poll(ufds, nfds, to);
1450 /* We can restart this syscall, usually */
1451 if (ret == -EINTR) {
1453 * Don't restore the signal mask yet. Let do_signal() deliver
1454 * the signal on the way back to userspace, before the signal
1458 memcpy(¤t->saved_sigmask, &sigsaved,
1460 set_restore_sigmask();
1462 ret = -ERESTARTNOHAND;
1464 sigprocmask(SIG_SETMASK, &sigsaved, NULL);
1466 ret = poll_select_copy_remaining(&end_time, tsp, 0, ret);
1471 #ifdef CONFIG_FHANDLE
1473 * Exactly like fs/open.c:sys_open_by_handle_at(), except that it
1474 * doesn't set the O_LARGEFILE flag.
1476 COMPAT_SYSCALL_DEFINE3(open_by_handle_at, int, mountdirfd,
1477 struct file_handle __user *, handle, int, flags)
1479 return do_handle_open(mountdirfd, handle, flags);