linux/fs/compat.c
<<
>>
Prefs
   1/*
   2 *  linux/fs/compat.c
   3 *
   4 *  Kernel compatibililty routines for e.g. 32 bit syscall support
   5 *  on 64 bit kernels.
   6 *
   7 *  Copyright (C) 2002       Stephen Rothwell, IBM Corporation
   8 *  Copyright (C) 1997-2000  Jakub Jelinek  (jakub@redhat.com)
   9 *  Copyright (C) 1998       Eddie C. Dost  (ecd@skynet.be)
  10 *  Copyright (C) 2001,2002  Andi Kleen, SuSE Labs 
  11 *  Copyright (C) 2003       Pavel Machek (pavel@ucw.cz)
  12 *
  13 *  This program is free software; you can redistribute it and/or modify
  14 *  it under the terms of the GNU General Public License version 2 as
  15 *  published by the Free Software Foundation.
  16 */
  17
  18#include <linux/stddef.h>
  19#include <linux/kernel.h>
  20#include <linux/linkage.h>
  21#include <linux/compat.h>
  22#include <linux/errno.h>
  23#include <linux/time.h>
  24#include <linux/fs.h>
  25#include <linux/fcntl.h>
  26#include <linux/namei.h>
  27#include <linux/file.h>
  28#include <linux/fdtable.h>
  29#include <linux/vfs.h>
  30#include <linux/ioctl.h>
  31#include <linux/init.h>
  32#include <linux/ncp_mount.h>
  33#include <linux/nfs4_mount.h>
  34#include <linux/syscalls.h>
  35#include <linux/ctype.h>
  36#include <linux/dirent.h>
  37#include <linux/fsnotify.h>
  38#include <linux/highuid.h>
  39#include <linux/personality.h>
  40#include <linux/rwsem.h>
  41#include <linux/tsacct_kern.h>
  42#include <linux/security.h>
  43#include <linux/highmem.h>
  44#include <linux/signal.h>
  45#include <linux/poll.h>
  46#include <linux/mm.h>
  47#include <linux/fs_struct.h>
  48#include <linux/slab.h>
  49#include <linux/pagemap.h>
  50#include <linux/aio.h>
  51
  52#include <asm/uaccess.h>
  53#include <asm/mmu_context.h>
  54#include <asm/ioctls.h>
  55#include "internal.h"
  56
  57int compat_log = 1;
  58
  59int compat_printk(const char *fmt, ...)
  60{
  61        va_list ap;
  62        int ret;
  63        if (!compat_log)
  64                return 0;
  65        va_start(ap, fmt);
  66        ret = vprintk(fmt, ap);
  67        va_end(ap);
  68        return ret;
  69}
  70
  71/*
  72 * Not all architectures have sys_utime, so implement this in terms
  73 * of sys_utimes.
  74 */
  75COMPAT_SYSCALL_DEFINE2(utime, const char __user *, filename,
  76                       struct compat_utimbuf __user *, t)
  77{
  78        struct timespec tv[2];
  79
  80        if (t) {
  81                if (get_user(tv[0].tv_sec, &t->actime) ||
  82                    get_user(tv[1].tv_sec, &t->modtime))
  83                        return -EFAULT;
  84                tv[0].tv_nsec = 0;
  85                tv[1].tv_nsec = 0;
  86        }
  87        return do_utimes(AT_FDCWD, filename, t ? tv : NULL, 0);
  88}
  89
  90COMPAT_SYSCALL_DEFINE4(utimensat, unsigned int, dfd, const char __user *, filename, struct compat_timespec __user *, t, int, flags)
  91{
  92        struct timespec tv[2];
  93
  94        if  (t) {
  95                if (compat_get_timespec(&tv[0], &t[0]) ||
  96                    compat_get_timespec(&tv[1], &t[1]))
  97                        return -EFAULT;
  98
  99                if (tv[0].tv_nsec == UTIME_OMIT && tv[1].tv_nsec == UTIME_OMIT)
 100                        return 0;
 101        }
 102        return do_utimes(dfd, filename, t ? tv : NULL, flags);
 103}
 104
 105COMPAT_SYSCALL_DEFINE3(futimesat, unsigned int, dfd, const char __user *, filename, struct compat_timeval __user *, t)
 106{
 107        struct timespec tv[2];
 108
 109        if (t) {
 110                if (get_user(tv[0].tv_sec, &t[0].tv_sec) ||
 111                    get_user(tv[0].tv_nsec, &t[0].tv_usec) ||
 112                    get_user(tv[1].tv_sec, &t[1].tv_sec) ||
 113                    get_user(tv[1].tv_nsec, &t[1].tv_usec))
 114                        return -EFAULT;
 115                if (tv[0].tv_nsec >= 1000000 || tv[0].tv_nsec < 0 ||
 116                    tv[1].tv_nsec >= 1000000 || tv[1].tv_nsec < 0)
 117                        return -EINVAL;
 118                tv[0].tv_nsec *= 1000;
 119                tv[1].tv_nsec *= 1000;
 120        }
 121        return do_utimes(dfd, filename, t ? tv : NULL, 0);
 122}
 123
 124COMPAT_SYSCALL_DEFINE2(utimes, const char __user *, filename, struct compat_timeval __user *, t)
 125{
 126        return compat_sys_futimesat(AT_FDCWD, filename, t);
 127}
 128
 129static int cp_compat_stat(struct kstat *stat, struct compat_stat __user *ubuf)
 130{
 131        struct compat_stat tmp;
 132
 133        if (!old_valid_dev(stat->dev) || !old_valid_dev(stat->rdev))
 134                return -EOVERFLOW;
 135
 136        memset(&tmp, 0, sizeof(tmp));
 137        tmp.st_dev = old_encode_dev(stat->dev);
 138        tmp.st_ino = stat->ino;
 139        if (sizeof(tmp.st_ino) < sizeof(stat->ino) && tmp.st_ino != stat->ino)
 140                return -EOVERFLOW;
 141        tmp.st_mode = stat->mode;
 142        tmp.st_nlink = stat->nlink;
 143        if (tmp.st_nlink != stat->nlink)
 144                return -EOVERFLOW;
 145        SET_UID(tmp.st_uid, from_kuid_munged(current_user_ns(), stat->uid));
 146        SET_GID(tmp.st_gid, from_kgid_munged(current_user_ns(), stat->gid));
 147        tmp.st_rdev = old_encode_dev(stat->rdev);
 148        if ((u64) stat->size > MAX_NON_LFS)
 149                return -EOVERFLOW;
 150        tmp.st_size = stat->size;
 151        tmp.st_atime = stat->atime.tv_sec;
 152        tmp.st_atime_nsec = stat->atime.tv_nsec;
 153        tmp.st_mtime = stat->mtime.tv_sec;
 154        tmp.st_mtime_nsec = stat->mtime.tv_nsec;
 155        tmp.st_ctime = stat->ctime.tv_sec;
 156        tmp.st_ctime_nsec = stat->ctime.tv_nsec;
 157        tmp.st_blocks = stat->blocks;
 158        tmp.st_blksize = stat->blksize;
 159        return copy_to_user(ubuf, &tmp, sizeof(tmp)) ? -EFAULT : 0;
 160}
 161
 162COMPAT_SYSCALL_DEFINE2(newstat, const char __user *, filename,
 163                       struct compat_stat __user *, statbuf)
 164{
 165        struct kstat stat;
 166        int error;
 167
 168        error = vfs_stat(filename, &stat);
 169        if (error)
 170                return error;
 171        return cp_compat_stat(&stat, statbuf);
 172}
 173
 174COMPAT_SYSCALL_DEFINE2(newlstat, const char __user *, filename,
 175                       struct compat_stat __user *, statbuf)
 176{
 177        struct kstat stat;
 178        int error;
 179
 180        error = vfs_lstat(filename, &stat);
 181        if (error)
 182                return error;
 183        return cp_compat_stat(&stat, statbuf);
 184}
 185
 186#ifndef __ARCH_WANT_STAT64
 187COMPAT_SYSCALL_DEFINE4(newfstatat, unsigned int, dfd,
 188                       const char __user *, filename,
 189                       struct compat_stat __user *, statbuf, int, flag)
 190{
 191        struct kstat stat;
 192        int error;
 193
 194        error = vfs_fstatat(dfd, filename, &stat, flag);
 195        if (error)
 196                return error;
 197        return cp_compat_stat(&stat, statbuf);
 198}
 199#endif
 200
 201COMPAT_SYSCALL_DEFINE2(newfstat, unsigned int, fd,
 202                       struct compat_stat __user *, statbuf)
 203{
 204        struct kstat stat;
 205        int error = vfs_fstat(fd, &stat);
 206
 207        if (!error)
 208                error = cp_compat_stat(&stat, statbuf);
 209        return error;
 210}
 211
 212static int put_compat_statfs(struct compat_statfs __user *ubuf, struct kstatfs *kbuf)
 213{
 214        
 215        if (sizeof ubuf->f_blocks == 4) {
 216                if ((kbuf->f_blocks | kbuf->f_bfree | kbuf->f_bavail |
 217                     kbuf->f_bsize | kbuf->f_frsize) & 0xffffffff00000000ULL)
 218                        return -EOVERFLOW;
 219                /* f_files and f_ffree may be -1; it's okay
 220                 * to stuff that into 32 bits */
 221                if (kbuf->f_files != 0xffffffffffffffffULL
 222                 && (kbuf->f_files & 0xffffffff00000000ULL))
 223                        return -EOVERFLOW;
 224                if (kbuf->f_ffree != 0xffffffffffffffffULL
 225                 && (kbuf->f_ffree & 0xffffffff00000000ULL))
 226                        return -EOVERFLOW;
 227        }
 228        if (!access_ok(VERIFY_WRITE, ubuf, sizeof(*ubuf)) ||
 229            __put_user(kbuf->f_type, &ubuf->f_type) ||
 230            __put_user(kbuf->f_bsize, &ubuf->f_bsize) ||
 231            __put_user(kbuf->f_blocks, &ubuf->f_blocks) ||
 232            __put_user(kbuf->f_bfree, &ubuf->f_bfree) ||
 233            __put_user(kbuf->f_bavail, &ubuf->f_bavail) ||
 234            __put_user(kbuf->f_files, &ubuf->f_files) ||
 235            __put_user(kbuf->f_ffree, &ubuf->f_ffree) ||
 236            __put_user(kbuf->f_namelen, &ubuf->f_namelen) ||
 237            __put_user(kbuf->f_fsid.val[0], &ubuf->f_fsid.val[0]) ||
 238            __put_user(kbuf->f_fsid.val[1], &ubuf->f_fsid.val[1]) ||
 239            __put_user(kbuf->f_frsize, &ubuf->f_frsize) ||
 240            __put_user(kbuf->f_flags, &ubuf->f_flags) ||
 241            __clear_user(ubuf->f_spare, sizeof(ubuf->f_spare)))
 242                return -EFAULT;
 243        return 0;
 244}
 245
 246/*
 247 * The following statfs calls are copies of code from fs/statfs.c and
 248 * should be checked against those from time to time
 249 */
 250COMPAT_SYSCALL_DEFINE2(statfs, const char __user *, pathname, struct compat_statfs __user *, buf)
 251{
 252        struct kstatfs tmp;
 253        int error = user_statfs(pathname, &tmp);
 254        if (!error)
 255                error = put_compat_statfs(buf, &tmp);
 256        return error;
 257}
 258
 259COMPAT_SYSCALL_DEFINE2(fstatfs, unsigned int, fd, struct compat_statfs __user *, buf)
 260{
 261        struct kstatfs tmp;
 262        int error = fd_statfs(fd, &tmp);
 263        if (!error)
 264                error = put_compat_statfs(buf, &tmp);
 265        return error;
 266}
 267
 268static int put_compat_statfs64(struct compat_statfs64 __user *ubuf, struct kstatfs *kbuf)
 269{
 270        if (sizeof ubuf->f_blocks == 4) {
 271                if ((kbuf->f_blocks | kbuf->f_bfree | kbuf->f_bavail |
 272                     kbuf->f_bsize | kbuf->f_frsize) & 0xffffffff00000000ULL)
 273                        return -EOVERFLOW;
 274                /* f_files and f_ffree may be -1; it's okay
 275                 * to stuff that into 32 bits */
 276                if (kbuf->f_files != 0xffffffffffffffffULL
 277                 && (kbuf->f_files & 0xffffffff00000000ULL))
 278                        return -EOVERFLOW;
 279                if (kbuf->f_ffree != 0xffffffffffffffffULL
 280                 && (kbuf->f_ffree & 0xffffffff00000000ULL))
 281                        return -EOVERFLOW;
 282        }
 283        if (!access_ok(VERIFY_WRITE, ubuf, sizeof(*ubuf)) ||
 284            __put_user(kbuf->f_type, &ubuf->f_type) ||
 285            __put_user(kbuf->f_bsize, &ubuf->f_bsize) ||
 286            __put_user(kbuf->f_blocks, &ubuf->f_blocks) ||
 287            __put_user(kbuf->f_bfree, &ubuf->f_bfree) ||
 288            __put_user(kbuf->f_bavail, &ubuf->f_bavail) ||
 289            __put_user(kbuf->f_files, &ubuf->f_files) ||
 290            __put_user(kbuf->f_ffree, &ubuf->f_ffree) ||
 291            __put_user(kbuf->f_namelen, &ubuf->f_namelen) ||
 292            __put_user(kbuf->f_fsid.val[0], &ubuf->f_fsid.val[0]) ||
 293            __put_user(kbuf->f_fsid.val[1], &ubuf->f_fsid.val[1]) ||
 294            __put_user(kbuf->f_frsize, &ubuf->f_frsize) ||
 295            __put_user(kbuf->f_flags, &ubuf->f_flags) ||
 296            __clear_user(ubuf->f_spare, sizeof(ubuf->f_spare)))
 297                return -EFAULT;
 298        return 0;
 299}
 300
 301COMPAT_SYSCALL_DEFINE3(statfs64, const char __user *, pathname, compat_size_t, sz, struct compat_statfs64 __user *, buf)
 302{
 303        struct kstatfs tmp;
 304        int error;
 305
 306        if (sz != sizeof(*buf))
 307                return -EINVAL;
 308
 309        error = user_statfs(pathname, &tmp);
 310        if (!error)
 311                error = put_compat_statfs64(buf, &tmp);
 312        return error;
 313}
 314
 315COMPAT_SYSCALL_DEFINE3(fstatfs64, unsigned int, fd, compat_size_t, sz, struct compat_statfs64 __user *, buf)
 316{
 317        struct kstatfs tmp;
 318        int error;
 319
 320        if (sz != sizeof(*buf))
 321                return -EINVAL;
 322
 323        error = fd_statfs(fd, &tmp);
 324        if (!error)
 325                error = put_compat_statfs64(buf, &tmp);
 326        return error;
 327}
 328
 329/*
 330 * This is a copy of sys_ustat, just dealing with a structure layout.
 331 * Given how simple this syscall is that apporach is more maintainable
 332 * than the various conversion hacks.
 333 */
 334COMPAT_SYSCALL_DEFINE2(ustat, unsigned, dev, struct compat_ustat __user *, u)
 335{
 336        struct compat_ustat tmp;
 337        struct kstatfs sbuf;
 338        int err = vfs_ustat(new_decode_dev(dev), &sbuf);
 339        if (err)
 340                return err;
 341
 342        memset(&tmp, 0, sizeof(struct compat_ustat));
 343        tmp.f_tfree = sbuf.f_bfree;
 344        tmp.f_tinode = sbuf.f_ffree;
 345        if (copy_to_user(u, &tmp, sizeof(struct compat_ustat)))
 346                return -EFAULT;
 347        return 0;
 348}
 349
 350static int get_compat_flock(struct flock *kfl, struct compat_flock __user *ufl)
 351{
 352        if (!access_ok(VERIFY_READ, ufl, sizeof(*ufl)) ||
 353            __get_user(kfl->l_type, &ufl->l_type) ||
 354            __get_user(kfl->l_whence, &ufl->l_whence) ||
 355            __get_user(kfl->l_start, &ufl->l_start) ||
 356            __get_user(kfl->l_len, &ufl->l_len) ||
 357            __get_user(kfl->l_pid, &ufl->l_pid))
 358                return -EFAULT;
 359        return 0;
 360}
 361
 362static int put_compat_flock(struct flock *kfl, struct compat_flock __user *ufl)
 363{
 364        if (!access_ok(VERIFY_WRITE, ufl, sizeof(*ufl)) ||
 365            __put_user(kfl->l_type, &ufl->l_type) ||
 366            __put_user(kfl->l_whence, &ufl->l_whence) ||
 367            __put_user(kfl->l_start, &ufl->l_start) ||
 368            __put_user(kfl->l_len, &ufl->l_len) ||
 369            __put_user(kfl->l_pid, &ufl->l_pid))
 370                return -EFAULT;
 371        return 0;
 372}
 373
 374#ifndef HAVE_ARCH_GET_COMPAT_FLOCK64
 375static int get_compat_flock64(struct flock *kfl, struct compat_flock64 __user *ufl)
 376{
 377        if (!access_ok(VERIFY_READ, ufl, sizeof(*ufl)) ||
 378            __get_user(kfl->l_type, &ufl->l_type) ||
 379            __get_user(kfl->l_whence, &ufl->l_whence) ||
 380            __get_user(kfl->l_start, &ufl->l_start) ||
 381            __get_user(kfl->l_len, &ufl->l_len) ||
 382            __get_user(kfl->l_pid, &ufl->l_pid))
 383                return -EFAULT;
 384        return 0;
 385}
 386#endif
 387
 388#ifndef HAVE_ARCH_PUT_COMPAT_FLOCK64
 389static int put_compat_flock64(struct flock *kfl, struct compat_flock64 __user *ufl)
 390{
 391        if (!access_ok(VERIFY_WRITE, ufl, sizeof(*ufl)) ||
 392            __put_user(kfl->l_type, &ufl->l_type) ||
 393            __put_user(kfl->l_whence, &ufl->l_whence) ||
 394            __put_user(kfl->l_start, &ufl->l_start) ||
 395            __put_user(kfl->l_len, &ufl->l_len) ||
 396            __put_user(kfl->l_pid, &ufl->l_pid))
 397                return -EFAULT;
 398        return 0;
 399}
 400#endif
 401
 402static unsigned int
 403convert_fcntl_cmd(unsigned int cmd)
 404{
 405        switch (cmd) {
 406        case F_GETLK64:
 407                return F_GETLK;
 408        case F_SETLK64:
 409                return F_SETLK;
 410        case F_SETLKW64:
 411                return F_SETLKW;
 412        }
 413
 414        return cmd;
 415}
 416
 417COMPAT_SYSCALL_DEFINE3(fcntl64, unsigned int, fd, unsigned int, cmd,
 418                       compat_ulong_t, arg)
 419{
 420        mm_segment_t old_fs;
 421        struct flock f;
 422        long ret;
 423        unsigned int conv_cmd;
 424
 425        switch (cmd) {
 426        case F_GETLK:
 427        case F_SETLK:
 428        case F_SETLKW:
 429                ret = get_compat_flock(&f, compat_ptr(arg));
 430                if (ret != 0)
 431                        break;
 432                old_fs = get_fs();
 433                set_fs(KERNEL_DS);
 434                ret = sys_fcntl(fd, cmd, (unsigned long)&f);
 435                set_fs(old_fs);
 436                if (cmd == F_GETLK && ret == 0) {
 437                        /* GETLK was successful and we need to return the data...
 438                         * but it needs to fit in the compat structure.
 439                         * l_start shouldn't be too big, unless the original
 440                         * start + end is greater than COMPAT_OFF_T_MAX, in which
 441                         * case the app was asking for trouble, so we return
 442                         * -EOVERFLOW in that case.
 443                         * l_len could be too big, in which case we just truncate it,
 444                         * and only allow the app to see that part of the conflicting
 445                         * lock that might make sense to it anyway
 446                         */
 447
 448                        if (f.l_start > COMPAT_OFF_T_MAX)
 449                                ret = -EOVERFLOW;
 450                        if (f.l_len > COMPAT_OFF_T_MAX)
 451                                f.l_len = COMPAT_OFF_T_MAX;
 452                        if (ret == 0)
 453                                ret = put_compat_flock(&f, compat_ptr(arg));
 454                }
 455                break;
 456
 457        case F_GETLK64:
 458        case F_SETLK64:
 459        case F_SETLKW64:
 460        case F_OFD_GETLK:
 461        case F_OFD_SETLK:
 462        case F_OFD_SETLKW:
 463                ret = get_compat_flock64(&f, compat_ptr(arg));
 464                if (ret != 0)
 465                        break;
 466                old_fs = get_fs();
 467                set_fs(KERNEL_DS);
 468                conv_cmd = convert_fcntl_cmd(cmd);
 469                ret = sys_fcntl(fd, conv_cmd, (unsigned long)&f);
 470                set_fs(old_fs);
 471                if ((conv_cmd == F_GETLK || conv_cmd == F_OFD_GETLK) && ret == 0) {
 472                        /* need to return lock information - see above for commentary */
 473                        if (f.l_start > COMPAT_LOFF_T_MAX)
 474                                ret = -EOVERFLOW;
 475                        if (f.l_len > COMPAT_LOFF_T_MAX)
 476                                f.l_len = COMPAT_LOFF_T_MAX;
 477                        if (ret == 0)
 478                                ret = put_compat_flock64(&f, compat_ptr(arg));
 479                }
 480                break;
 481
 482        default:
 483                ret = sys_fcntl(fd, cmd, arg);
 484                break;
 485        }
 486        return ret;
 487}
 488
 489COMPAT_SYSCALL_DEFINE3(fcntl, unsigned int, fd, unsigned int, cmd,
 490                       compat_ulong_t, arg)
 491{
 492        switch (cmd) {
 493        case F_GETLK64:
 494        case F_SETLK64:
 495        case F_SETLKW64:
 496        case F_OFD_GETLK:
 497        case F_OFD_SETLK:
 498        case F_OFD_SETLKW:
 499                return -EINVAL;
 500        }
 501        return compat_sys_fcntl64(fd, cmd, arg);
 502}
 503
 504COMPAT_SYSCALL_DEFINE2(io_setup, unsigned, nr_reqs, u32 __user *, ctx32p)
 505{
 506        long ret;
 507        aio_context_t ctx64;
 508
 509        mm_segment_t oldfs = get_fs();
 510        if (unlikely(get_user(ctx64, ctx32p)))
 511                return -EFAULT;
 512
 513        set_fs(KERNEL_DS);
 514        /* The __user pointer cast is valid because of the set_fs() */
 515        ret = sys_io_setup(nr_reqs, (aio_context_t __user *) &ctx64);
 516        set_fs(oldfs);
 517        /* truncating is ok because it's a user address */
 518        if (!ret)
 519                ret = put_user((u32) ctx64, ctx32p);
 520        return ret;
 521}
 522
 523COMPAT_SYSCALL_DEFINE5(io_getevents, compat_aio_context_t, ctx_id,
 524                       compat_long_t, min_nr,
 525                       compat_long_t, nr,
 526                       struct io_event __user *, events,
 527                       struct compat_timespec __user *, timeout)
 528{
 529        struct timespec t;
 530        struct timespec __user *ut = NULL;
 531
 532        if (timeout) {
 533                if (compat_get_timespec(&t, timeout))
 534                        return -EFAULT;
 535
 536                ut = compat_alloc_user_space(sizeof(*ut));
 537                if (copy_to_user(ut, &t, sizeof(t)) )
 538                        return -EFAULT;
 539        } 
 540        return sys_io_getevents(ctx_id, min_nr, nr, events, ut);
 541}
 542
 543/* A write operation does a read from user space and vice versa */
 544#define vrfy_dir(type) ((type) == READ ? VERIFY_WRITE : VERIFY_READ)
 545
 546ssize_t compat_rw_copy_check_uvector(int type,
 547                const struct compat_iovec __user *uvector, unsigned long nr_segs,
 548                unsigned long fast_segs, struct iovec *fast_pointer,
 549                struct iovec **ret_pointer)
 550{
 551        compat_ssize_t tot_len;
 552        struct iovec *iov = *ret_pointer = fast_pointer;
 553        ssize_t ret = 0;
 554        int seg;
 555
 556        /*
 557         * SuS says "The readv() function *may* fail if the iovcnt argument
 558         * was less than or equal to 0, or greater than {IOV_MAX}.  Linux has
 559         * traditionally returned zero for zero segments, so...
 560         */
 561        if (nr_segs == 0)
 562                goto out;
 563
 564        ret = -EINVAL;
 565        if (nr_segs > UIO_MAXIOV || nr_segs < 0)
 566                goto out;
 567        if (nr_segs > fast_segs) {
 568                ret = -ENOMEM;
 569                iov = kmalloc(nr_segs*sizeof(struct iovec), GFP_KERNEL);
 570                if (iov == NULL)
 571                        goto out;
 572        }
 573        *ret_pointer = iov;
 574
 575        ret = -EFAULT;
 576        if (!access_ok(VERIFY_READ, uvector, nr_segs*sizeof(*uvector)))
 577                goto out;
 578
 579        /*
 580         * Single unix specification:
 581         * We should -EINVAL if an element length is not >= 0 and fitting an
 582         * ssize_t.
 583         *
 584         * In Linux, the total length is limited to MAX_RW_COUNT, there is
 585         * no overflow possibility.
 586         */
 587        tot_len = 0;
 588        ret = -EINVAL;
 589        for (seg = 0; seg < nr_segs; seg++) {
 590                compat_uptr_t buf;
 591                compat_ssize_t len;
 592
 593                if (__get_user(len, &uvector->iov_len) ||
 594                   __get_user(buf, &uvector->iov_base)) {
 595                        ret = -EFAULT;
 596                        goto out;
 597                }
 598                if (len < 0)    /* size_t not fitting in compat_ssize_t .. */
 599                        goto out;
 600                if (type >= 0 &&
 601                    !access_ok(vrfy_dir(type), compat_ptr(buf), len)) {
 602                        ret = -EFAULT;
 603                        goto out;
 604                }
 605                if (len > MAX_RW_COUNT - tot_len)
 606                        len = MAX_RW_COUNT - tot_len;
 607                tot_len += len;
 608                iov->iov_base = compat_ptr(buf);
 609                iov->iov_len = (compat_size_t) len;
 610                uvector++;
 611                iov++;
 612        }
 613        ret = tot_len;
 614
 615out:
 616        return ret;
 617}
 618
 619static inline long
 620copy_iocb(long nr, u32 __user *ptr32, struct iocb __user * __user *ptr64)
 621{
 622        compat_uptr_t uptr;
 623        int i;
 624
 625        for (i = 0; i < nr; ++i) {
 626                if (get_user(uptr, ptr32 + i))
 627                        return -EFAULT;
 628                if (put_user(compat_ptr(uptr), ptr64 + i))
 629                        return -EFAULT;
 630        }
 631        return 0;
 632}
 633
 634#define MAX_AIO_SUBMITS         (PAGE_SIZE/sizeof(struct iocb *))
 635
 636COMPAT_SYSCALL_DEFINE3(io_submit, compat_aio_context_t, ctx_id,
 637                       int, nr, u32 __user *, iocb)
 638{
 639        struct iocb __user * __user *iocb64; 
 640        long ret;
 641
 642        if (unlikely(nr < 0))
 643                return -EINVAL;
 644
 645        if (nr > MAX_AIO_SUBMITS)
 646                nr = MAX_AIO_SUBMITS;
 647        
 648        iocb64 = compat_alloc_user_space(nr * sizeof(*iocb64));
 649        ret = copy_iocb(nr, iocb, iocb64);
 650        if (!ret)
 651                ret = do_io_submit(ctx_id, nr, iocb64, 1);
 652        return ret;
 653}
 654
 655struct compat_ncp_mount_data {
 656        compat_int_t version;
 657        compat_uint_t ncp_fd;
 658        __compat_uid_t mounted_uid;
 659        compat_pid_t wdog_pid;
 660        unsigned char mounted_vol[NCP_VOLNAME_LEN + 1];
 661        compat_uint_t time_out;
 662        compat_uint_t retry_count;
 663        compat_uint_t flags;
 664        __compat_uid_t uid;
 665        __compat_gid_t gid;
 666        compat_mode_t file_mode;
 667        compat_mode_t dir_mode;
 668};
 669
 670struct compat_ncp_mount_data_v4 {
 671        compat_int_t version;
 672        compat_ulong_t flags;
 673        compat_ulong_t mounted_uid;
 674        compat_long_t wdog_pid;
 675        compat_uint_t ncp_fd;
 676        compat_uint_t time_out;
 677        compat_uint_t retry_count;
 678        compat_ulong_t uid;
 679        compat_ulong_t gid;
 680        compat_ulong_t file_mode;
 681        compat_ulong_t dir_mode;
 682};
 683
 684static void *do_ncp_super_data_conv(void *raw_data)
 685{
 686        int version = *(unsigned int *)raw_data;
 687
 688        if (version == 3) {
 689                struct compat_ncp_mount_data *c_n = raw_data;
 690                struct ncp_mount_data *n = raw_data;
 691
 692                n->dir_mode = c_n->dir_mode;
 693                n->file_mode = c_n->file_mode;
 694                n->gid = c_n->gid;
 695                n->uid = c_n->uid;
 696                memmove (n->mounted_vol, c_n->mounted_vol, (sizeof (c_n->mounted_vol) + 3 * sizeof (unsigned int)));
 697                n->wdog_pid = c_n->wdog_pid;
 698                n->mounted_uid = c_n->mounted_uid;
 699        } else if (version == 4) {
 700                struct compat_ncp_mount_data_v4 *c_n = raw_data;
 701                struct ncp_mount_data_v4 *n = raw_data;
 702
 703                n->dir_mode = c_n->dir_mode;
 704                n->file_mode = c_n->file_mode;
 705                n->gid = c_n->gid;
 706                n->uid = c_n->uid;
 707                n->retry_count = c_n->retry_count;
 708                n->time_out = c_n->time_out;
 709                n->ncp_fd = c_n->ncp_fd;
 710                n->wdog_pid = c_n->wdog_pid;
 711                n->mounted_uid = c_n->mounted_uid;
 712                n->flags = c_n->flags;
 713        } else if (version != 5) {
 714                return NULL;
 715        }
 716
 717        return raw_data;
 718}
 719
 720
 721struct compat_nfs_string {
 722        compat_uint_t len;
 723        compat_uptr_t data;
 724};
 725
 726static inline void compat_nfs_string(struct nfs_string *dst,
 727                                     struct compat_nfs_string *src)
 728{
 729        dst->data = compat_ptr(src->data);
 730        dst->len = src->len;
 731}
 732
 733struct compat_nfs4_mount_data_v1 {
 734        compat_int_t version;
 735        compat_int_t flags;
 736        compat_int_t rsize;
 737        compat_int_t wsize;
 738        compat_int_t timeo;
 739        compat_int_t retrans;
 740        compat_int_t acregmin;
 741        compat_int_t acregmax;
 742        compat_int_t acdirmin;
 743        compat_int_t acdirmax;
 744        struct compat_nfs_string client_addr;
 745        struct compat_nfs_string mnt_path;
 746        struct compat_nfs_string hostname;
 747        compat_uint_t host_addrlen;
 748        compat_uptr_t host_addr;
 749        compat_int_t proto;
 750        compat_int_t auth_flavourlen;
 751        compat_uptr_t auth_flavours;
 752};
 753
 754static int do_nfs4_super_data_conv(void *raw_data)
 755{
 756        int version = *(compat_uint_t *) raw_data;
 757
 758        if (version == 1) {
 759                struct compat_nfs4_mount_data_v1 *raw = raw_data;
 760                struct nfs4_mount_data *real = raw_data;
 761
 762                /* copy the fields backwards */
 763                real->auth_flavours = compat_ptr(raw->auth_flavours);
 764                real->auth_flavourlen = raw->auth_flavourlen;
 765                real->proto = raw->proto;
 766                real->host_addr = compat_ptr(raw->host_addr);
 767                real->host_addrlen = raw->host_addrlen;
 768                compat_nfs_string(&real->hostname, &raw->hostname);
 769                compat_nfs_string(&real->mnt_path, &raw->mnt_path);
 770                compat_nfs_string(&real->client_addr, &raw->client_addr);
 771                real->acdirmax = raw->acdirmax;
 772                real->acdirmin = raw->acdirmin;
 773                real->acregmax = raw->acregmax;
 774                real->acregmin = raw->acregmin;
 775                real->retrans = raw->retrans;
 776                real->timeo = raw->timeo;
 777                real->wsize = raw->wsize;
 778                real->rsize = raw->rsize;
 779                real->flags = raw->flags;
 780                real->version = raw->version;
 781        }
 782
 783        return 0;
 784}
 785
 786#define NCPFS_NAME      "ncpfs"
 787#define NFS4_NAME       "nfs4"
 788
 789COMPAT_SYSCALL_DEFINE5(mount, const char __user *, dev_name,
 790                       const char __user *, dir_name,
 791                       const char __user *, type, compat_ulong_t, flags,
 792                       const void __user *, data)
 793{
 794        char *kernel_type;
 795        unsigned long data_page;
 796        char *kernel_dev;
 797        struct filename *dir;
 798        int retval;
 799
 800        retval = copy_mount_string(type, &kernel_type);
 801        if (retval < 0)
 802                goto out;
 803
 804        dir = getname(dir_name);
 805        retval = PTR_ERR(dir);
 806        if (IS_ERR(dir))
 807                goto out1;
 808
 809        retval = copy_mount_string(dev_name, &kernel_dev);
 810        if (retval < 0)
 811                goto out2;
 812
 813        retval = copy_mount_options(data, &data_page);
 814        if (retval < 0)
 815                goto out3;
 816
 817        retval = -EINVAL;
 818
 819        if (kernel_type && data_page) {
 820                if (!strcmp(kernel_type, NCPFS_NAME)) {
 821                        do_ncp_super_data_conv((void *)data_page);
 822                } else if (!strcmp(kernel_type, NFS4_NAME)) {
 823                        if (do_nfs4_super_data_conv((void *) data_page))
 824                                goto out4;
 825                }
 826        }
 827
 828        retval = do_mount(kernel_dev, dir->name, kernel_type,
 829                        flags, (void*)data_page);
 830
 831 out4:
 832        free_page(data_page);
 833 out3:
 834        kfree(kernel_dev);
 835 out2:
 836        putname(dir);
 837 out1:
 838        kfree(kernel_type);
 839 out:
 840        return retval;
 841}
 842
 843struct compat_old_linux_dirent {
 844        compat_ulong_t  d_ino;
 845        compat_ulong_t  d_offset;
 846        unsigned short  d_namlen;
 847        char            d_name[1];
 848};
 849
 850struct compat_readdir_callback {
 851        struct dir_context ctx;
 852        struct compat_old_linux_dirent __user *dirent;
 853        int result;
 854};
 855
 856static int compat_fillonedir(void *__buf, const char *name, int namlen,
 857                        loff_t offset, u64 ino, unsigned int d_type)
 858{
 859        struct compat_readdir_callback *buf = __buf;
 860        struct compat_old_linux_dirent __user *dirent;
 861        compat_ulong_t d_ino;
 862
 863        if (buf->result)
 864                return -EINVAL;
 865        d_ino = ino;
 866        if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) {
 867                buf->result = -EOVERFLOW;
 868                return -EOVERFLOW;
 869        }
 870        buf->result++;
 871        dirent = buf->dirent;
 872        if (!access_ok(VERIFY_WRITE, dirent,
 873                        (unsigned long)(dirent->d_name + namlen + 1) -
 874                                (unsigned long)dirent))
 875                goto efault;
 876        if (    __put_user(d_ino, &dirent->d_ino) ||
 877                __put_user(offset, &dirent->d_offset) ||
 878                __put_user(namlen, &dirent->d_namlen) ||
 879                __copy_to_user(dirent->d_name, name, namlen) ||
 880                __put_user(0, dirent->d_name + namlen))
 881                goto efault;
 882        return 0;
 883efault:
 884        buf->result = -EFAULT;
 885        return -EFAULT;
 886}
 887
 888COMPAT_SYSCALL_DEFINE3(old_readdir, unsigned int, fd,
 889                struct compat_old_linux_dirent __user *, dirent, unsigned int, count)
 890{
 891        int error;
 892        struct fd f = fdget(fd);
 893        struct compat_readdir_callback buf = {
 894                .ctx.actor = compat_fillonedir,
 895                .dirent = dirent
 896        };
 897
 898        if (!f.file)
 899                return -EBADF;
 900
 901        error = iterate_dir(f.file, &buf.ctx);
 902        if (buf.result)
 903                error = buf.result;
 904
 905        fdput(f);
 906        return error;
 907}
 908
 909struct compat_linux_dirent {
 910        compat_ulong_t  d_ino;
 911        compat_ulong_t  d_off;
 912        unsigned short  d_reclen;
 913        char            d_name[1];
 914};
 915
 916struct compat_getdents_callback {
 917        struct dir_context ctx;
 918        struct compat_linux_dirent __user *current_dir;
 919        struct compat_linux_dirent __user *previous;
 920        int count;
 921        int error;
 922};
 923
 924static int compat_filldir(void *__buf, const char *name, int namlen,
 925                loff_t offset, u64 ino, unsigned int d_type)
 926{
 927        struct compat_linux_dirent __user * dirent;
 928        struct compat_getdents_callback *buf = __buf;
 929        compat_ulong_t d_ino;
 930        int reclen = ALIGN(offsetof(struct compat_linux_dirent, d_name) +
 931                namlen + 2, sizeof(compat_long_t));
 932
 933        buf->error = -EINVAL;   /* only used if we fail.. */
 934        if (reclen > buf->count)
 935                return -EINVAL;
 936        d_ino = ino;
 937        if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) {
 938                buf->error = -EOVERFLOW;
 939                return -EOVERFLOW;
 940        }
 941        dirent = buf->previous;
 942        if (dirent) {
 943                if (__put_user(offset, &dirent->d_off))
 944                        goto efault;
 945        }
 946        dirent = buf->current_dir;
 947        if (__put_user(d_ino, &dirent->d_ino))
 948                goto efault;
 949        if (__put_user(reclen, &dirent->d_reclen))
 950                goto efault;
 951        if (copy_to_user(dirent->d_name, name, namlen))
 952                goto efault;
 953        if (__put_user(0, dirent->d_name + namlen))
 954                goto efault;
 955        if (__put_user(d_type, (char  __user *) dirent + reclen - 1))
 956                goto efault;
 957        buf->previous = dirent;
 958        dirent = (void __user *)dirent + reclen;
 959        buf->current_dir = dirent;
 960        buf->count -= reclen;
 961        return 0;
 962efault:
 963        buf->error = -EFAULT;
 964        return -EFAULT;
 965}
 966
 967COMPAT_SYSCALL_DEFINE3(getdents, unsigned int, fd,
 968                struct compat_linux_dirent __user *, dirent, unsigned int, count)
 969{
 970        struct fd f;
 971        struct compat_linux_dirent __user * lastdirent;
 972        struct compat_getdents_callback buf = {
 973                .ctx.actor = compat_filldir,
 974                .current_dir = dirent,
 975                .count = count
 976        };
 977        int error;
 978
 979        if (!access_ok(VERIFY_WRITE, dirent, count))
 980                return -EFAULT;
 981
 982        f = fdget(fd);
 983        if (!f.file)
 984                return -EBADF;
 985
 986        error = iterate_dir(f.file, &buf.ctx);
 987        if (error >= 0)
 988                error = buf.error;
 989        lastdirent = buf.previous;
 990        if (lastdirent) {
 991                if (put_user(buf.ctx.pos, &lastdirent->d_off))
 992                        error = -EFAULT;
 993                else
 994                        error = count - buf.count;
 995        }
 996        fdput(f);
 997        return error;
 998}
 999
1000#ifdef __ARCH_WANT_COMPAT_SYS_GETDENTS64
1001
1002struct compat_getdents_callback64 {
1003        struct dir_context ctx;
1004        struct linux_dirent64 __user *current_dir;
1005        struct linux_dirent64 __user *previous;
1006        int count;
1007        int error;
1008};
1009
1010static int compat_filldir64(void * __buf, const char * name, int namlen, loff_t offset,
1011                     u64 ino, unsigned int d_type)
1012{
1013        struct linux_dirent64 __user *dirent;
1014        struct compat_getdents_callback64 *buf = __buf;
1015        int reclen = ALIGN(offsetof(struct linux_dirent64, d_name) + namlen + 1,
1016                sizeof(u64));
1017        u64 off;
1018
1019        buf->error = -EINVAL;   /* only used if we fail.. */
1020        if (reclen > buf->count)
1021                return -EINVAL;
1022        dirent = buf->previous;
1023
1024        if (dirent) {
1025                if (__put_user_unaligned(offset, &dirent->d_off))
1026                        goto efault;
1027        }
1028        dirent = buf->current_dir;
1029        if (__put_user_unaligned(ino, &dirent->d_ino))
1030                goto efault;
1031        off = 0;
1032        if (__put_user_unaligned(off, &dirent->d_off))
1033                goto efault;
1034        if (__put_user(reclen, &dirent->d_reclen))
1035                goto efault;
1036        if (__put_user(d_type, &dirent->d_type))
1037                goto efault;
1038        if (copy_to_user(dirent->d_name, name, namlen))
1039                goto efault;
1040        if (__put_user(0, dirent->d_name + namlen))
1041                goto efault;
1042        buf->previous = dirent;
1043        dirent = (void __user *)dirent + reclen;
1044        buf->current_dir = dirent;
1045        buf->count -= reclen;
1046        return 0;
1047efault:
1048        buf->error = -EFAULT;
1049        return -EFAULT;
1050}
1051
1052COMPAT_SYSCALL_DEFINE3(getdents64, unsigned int, fd,
1053                struct linux_dirent64 __user *, dirent, unsigned int, count)
1054{
1055        struct fd f;
1056        struct linux_dirent64 __user * lastdirent;
1057        struct compat_getdents_callback64 buf = {
1058                .ctx.actor = compat_filldir64,
1059                .current_dir = dirent,
1060                .count = count
1061        };
1062        int error;
1063
1064        if (!access_ok(VERIFY_WRITE, dirent, count))
1065                return -EFAULT;
1066
1067        f = fdget(fd);
1068        if (!f.file)
1069                return -EBADF;
1070
1071        error = iterate_dir(f.file, &buf.ctx);
1072        if (error >= 0)
1073                error = buf.error;
1074        lastdirent = buf.previous;
1075        if (lastdirent) {
1076                typeof(lastdirent->d_off) d_off = buf.ctx.pos;
1077                if (__put_user_unaligned(d_off, &lastdirent->d_off))
1078                        error = -EFAULT;
1079                else
1080                        error = count - buf.count;
1081        }
1082        fdput(f);
1083        return error;
1084}
1085#endif /* __ARCH_WANT_COMPAT_SYS_GETDENTS64 */
1086
1087/*
1088 * Exactly like fs/open.c:sys_open(), except that it doesn't set the
1089 * O_LARGEFILE flag.
1090 */
1091COMPAT_SYSCALL_DEFINE3(open, const char __user *, filename, int, flags, umode_t, mode)
1092{
1093        return do_sys_open(AT_FDCWD, filename, flags, mode);
1094}
1095
1096/*
1097 * Exactly like fs/open.c:sys_openat(), except that it doesn't set the
1098 * O_LARGEFILE flag.
1099 */
1100COMPAT_SYSCALL_DEFINE4(openat, int, dfd, const char __user *, filename, int, flags, umode_t, mode)
1101{
1102        return do_sys_open(dfd, filename, flags, mode);
1103}
1104
1105#define __COMPAT_NFDBITS       (8 * sizeof(compat_ulong_t))
1106
1107static int poll_select_copy_remaining(struct timespec *end_time, void __user *p,
1108                                      int timeval, int ret)
1109{
1110        struct timespec ts;
1111
1112        if (!p)
1113                return ret;
1114
1115        if (current->personality & STICKY_TIMEOUTS)
1116                goto sticky;
1117
1118        /* No update for zero timeout */
1119        if (!end_time->tv_sec && !end_time->tv_nsec)
1120                return ret;
1121
1122        ktime_get_ts(&ts);
1123        ts = timespec_sub(*end_time, ts);
1124        if (ts.tv_sec < 0)
1125                ts.tv_sec = ts.tv_nsec = 0;
1126
1127        if (timeval) {
1128                struct compat_timeval rtv;
1129
1130                rtv.tv_sec = ts.tv_sec;
1131                rtv.tv_usec = ts.tv_nsec / NSEC_PER_USEC;
1132
1133                if (!copy_to_user(p, &rtv, sizeof(rtv)))
1134                        return ret;
1135        } else {
1136                struct compat_timespec rts;
1137
1138                rts.tv_sec = ts.tv_sec;
1139                rts.tv_nsec = ts.tv_nsec;
1140
1141                if (!copy_to_user(p, &rts, sizeof(rts)))
1142                        return ret;
1143        }
1144        /*
1145         * If an application puts its timeval in read-only memory, we
1146         * don't want the Linux-specific update to the timeval to
1147         * cause a fault after the select has completed
1148         * successfully. However, because we're not updating the
1149         * timeval, we can't restart the system call.
1150         */
1151
1152sticky:
1153        if (ret == -ERESTARTNOHAND)
1154                ret = -EINTR;
1155        return ret;
1156}
1157
1158/*
1159 * Ooo, nasty.  We need here to frob 32-bit unsigned longs to
1160 * 64-bit unsigned longs.
1161 */
1162static
1163int compat_get_fd_set(unsigned long nr, compat_ulong_t __user *ufdset,
1164                        unsigned long *fdset)
1165{
1166        nr = DIV_ROUND_UP(nr, __COMPAT_NFDBITS);
1167        if (ufdset) {
1168                unsigned long odd;
1169
1170                if (!access_ok(VERIFY_WRITE, ufdset, nr*sizeof(compat_ulong_t)))
1171                        return -EFAULT;
1172
1173                odd = nr & 1UL;
1174                nr &= ~1UL;
1175                while (nr) {
1176                        unsigned long h, l;
1177                        if (__get_user(l, ufdset) || __get_user(h, ufdset+1))
1178                                return -EFAULT;
1179                        ufdset += 2;
1180                        *fdset++ = h << 32 | l;
1181                        nr -= 2;
1182                }
1183                if (odd && __get_user(*fdset, ufdset))
1184                        return -EFAULT;
1185        } else {
1186                /* Tricky, must clear full unsigned long in the
1187                 * kernel fdset at the end, this makes sure that
1188                 * actually happens.
1189                 */
1190                memset(fdset, 0, ((nr + 1) & ~1)*sizeof(compat_ulong_t));
1191        }
1192        return 0;
1193}
1194
1195static
1196int compat_set_fd_set(unsigned long nr, compat_ulong_t __user *ufdset,
1197                      unsigned long *fdset)
1198{
1199        unsigned long odd;
1200        nr = DIV_ROUND_UP(nr, __COMPAT_NFDBITS);
1201
1202        if (!ufdset)
1203                return 0;
1204
1205        odd = nr & 1UL;
1206        nr &= ~1UL;
1207        while (nr) {
1208                unsigned long h, l;
1209                l = *fdset++;
1210                h = l >> 32;
1211                if (__put_user(l, ufdset) || __put_user(h, ufdset+1))
1212                        return -EFAULT;
1213                ufdset += 2;
1214                nr -= 2;
1215        }
1216        if (odd && __put_user(*fdset, ufdset))
1217                return -EFAULT;
1218        return 0;
1219}
1220
1221
1222/*
1223 * This is a virtual copy of sys_select from fs/select.c and probably
1224 * should be compared to it from time to time
1225 */
1226
1227/*
1228 * We can actually return ERESTARTSYS instead of EINTR, but I'd
1229 * like to be certain this leads to no problems. So I return
1230 * EINTR just for safety.
1231 *
1232 * Update: ERESTARTSYS breaks at least the xview clock binary, so
1233 * I'm trying ERESTARTNOHAND which restart only when you want to.
1234 */
1235int compat_core_sys_select(int n, compat_ulong_t __user *inp,
1236        compat_ulong_t __user *outp, compat_ulong_t __user *exp,
1237        struct timespec *end_time)
1238{
1239        fd_set_bits fds;
1240        void *bits;
1241        int size, max_fds, ret = -EINVAL;
1242        struct fdtable *fdt;
1243        long stack_fds[SELECT_STACK_ALLOC/sizeof(long)];
1244
1245        if (n < 0)
1246                goto out_nofds;
1247
1248        /* max_fds can increase, so grab it once to avoid race */
1249        rcu_read_lock();
1250        fdt = files_fdtable(current->files);
1251        max_fds = fdt->max_fds;
1252        rcu_read_unlock();
1253        if (n > max_fds)
1254                n = max_fds;
1255
1256        /*
1257         * We need 6 bitmaps (in/out/ex for both incoming and outgoing),
1258         * since we used fdset we need to allocate memory in units of
1259         * long-words.
1260         */
1261        size = FDS_BYTES(n);
1262        bits = stack_fds;
1263        if (size > sizeof(stack_fds) / 6) {
1264                bits = kmalloc(6 * size, GFP_KERNEL);
1265                ret = -ENOMEM;
1266                if (!bits)
1267                        goto out_nofds;
1268        }
1269        fds.in      = (unsigned long *)  bits;
1270        fds.out     = (unsigned long *) (bits +   size);
1271        fds.ex      = (unsigned long *) (bits + 2*size);
1272        fds.res_in  = (unsigned long *) (bits + 3*size);
1273        fds.res_out = (unsigned long *) (bits + 4*size);
1274        fds.res_ex  = (unsigned long *) (bits + 5*size);
1275
1276        if ((ret = compat_get_fd_set(n, inp, fds.in)) ||
1277            (ret = compat_get_fd_set(n, outp, fds.out)) ||
1278            (ret = compat_get_fd_set(n, exp, fds.ex)))
1279                goto out;
1280        zero_fd_set(n, fds.res_in);
1281        zero_fd_set(n, fds.res_out);
1282        zero_fd_set(n, fds.res_ex);
1283
1284        ret = do_select(n, &fds, end_time);
1285
1286        if (ret < 0)
1287                goto out;
1288        if (!ret) {
1289                ret = -ERESTARTNOHAND;
1290                if (signal_pending(current))
1291                        goto out;
1292                ret = 0;
1293        }
1294
1295        if (compat_set_fd_set(n, inp, fds.res_in) ||
1296            compat_set_fd_set(n, outp, fds.res_out) ||
1297            compat_set_fd_set(n, exp, fds.res_ex))
1298                ret = -EFAULT;
1299out:
1300        if (bits != stack_fds)
1301                kfree(bits);
1302out_nofds:
1303        return ret;
1304}
1305
1306COMPAT_SYSCALL_DEFINE5(select, int, n, compat_ulong_t __user *, inp,
1307        compat_ulong_t __user *, outp, compat_ulong_t __user *, exp,
1308        struct compat_timeval __user *, tvp)
1309{
1310        struct timespec end_time, *to = NULL;
1311        struct compat_timeval tv;
1312        int ret;
1313
1314        if (tvp) {
1315                if (copy_from_user(&tv, tvp, sizeof(tv)))
1316                        return -EFAULT;
1317
1318                to = &end_time;
1319                if (poll_select_set_timeout(to,
1320                                tv.tv_sec + (tv.tv_usec / USEC_PER_SEC),
1321                                (tv.tv_usec % USEC_PER_SEC) * NSEC_PER_USEC))
1322                        return -EINVAL;
1323        }
1324
1325        ret = compat_core_sys_select(n, inp, outp, exp, to);
1326        ret = poll_select_copy_remaining(&end_time, tvp, 1, ret);
1327
1328        return ret;
1329}
1330
1331struct compat_sel_arg_struct {
1332        compat_ulong_t n;
1333        compat_uptr_t inp;
1334        compat_uptr_t outp;
1335        compat_uptr_t exp;
1336        compat_uptr_t tvp;
1337};
1338
1339COMPAT_SYSCALL_DEFINE1(old_select, struct compat_sel_arg_struct __user *, arg)
1340{
1341        struct compat_sel_arg_struct a;
1342
1343        if (copy_from_user(&a, arg, sizeof(a)))
1344                return -EFAULT;
1345        return compat_sys_select(a.n, compat_ptr(a.inp), compat_ptr(a.outp),
1346                                 compat_ptr(a.exp), compat_ptr(a.tvp));
1347}
1348
1349static long do_compat_pselect(int n, compat_ulong_t __user *inp,
1350        compat_ulong_t __user *outp, compat_ulong_t __user *exp,
1351        struct compat_timespec __user *tsp, compat_sigset_t __user *sigmask,
1352        compat_size_t sigsetsize)
1353{
1354        compat_sigset_t ss32;
1355        sigset_t ksigmask, sigsaved;
1356        struct compat_timespec ts;
1357        struct timespec end_time, *to = NULL;
1358        int ret;
1359
1360        if (tsp) {
1361                if (copy_from_user(&ts, tsp, sizeof(ts)))
1362                        return -EFAULT;
1363
1364                to = &end_time;
1365                if (poll_select_set_timeout(to, ts.tv_sec, ts.tv_nsec))
1366                        return -EINVAL;
1367        }
1368
1369        if (sigmask) {
1370                if (sigsetsize != sizeof(compat_sigset_t))
1371                        return -EINVAL;
1372                if (copy_from_user(&ss32, sigmask, sizeof(ss32)))
1373                        return -EFAULT;
1374                sigset_from_compat(&ksigmask, &ss32);
1375
1376                sigdelsetmask(&ksigmask, sigmask(SIGKILL)|sigmask(SIGSTOP));
1377                sigprocmask(SIG_SETMASK, &ksigmask, &sigsaved);
1378        }
1379
1380        ret = compat_core_sys_select(n, inp, outp, exp, to);
1381        ret = poll_select_copy_remaining(&end_time, tsp, 0, ret);
1382
1383        if (ret == -ERESTARTNOHAND) {
1384                /*
1385                 * Don't restore the signal mask yet. Let do_signal() deliver
1386                 * the signal on the way back to userspace, before the signal
1387                 * mask is restored.
1388                 */
1389                if (sigmask) {
1390                        memcpy(&current->saved_sigmask, &sigsaved,
1391                                        sizeof(sigsaved));
1392                        set_restore_sigmask();
1393                }
1394        } else if (sigmask)
1395                sigprocmask(SIG_SETMASK, &sigsaved, NULL);
1396
1397        return ret;
1398}
1399
1400COMPAT_SYSCALL_DEFINE6(pselect6, int, n, compat_ulong_t __user *, inp,
1401        compat_ulong_t __user *, outp, compat_ulong_t __user *, exp,
1402        struct compat_timespec __user *, tsp, void __user *, sig)
1403{
1404        compat_size_t sigsetsize = 0;
1405        compat_uptr_t up = 0;
1406
1407        if (sig) {
1408                if (!access_ok(VERIFY_READ, sig,
1409                                sizeof(compat_uptr_t)+sizeof(compat_size_t)) ||
1410                        __get_user(up, (compat_uptr_t __user *)sig) ||
1411                        __get_user(sigsetsize,
1412                                (compat_size_t __user *)(sig+sizeof(up))))
1413                        return -EFAULT;
1414        }
1415        return do_compat_pselect(n, inp, outp, exp, tsp, compat_ptr(up),
1416                                 sigsetsize);
1417}
1418
1419COMPAT_SYSCALL_DEFINE5(ppoll, struct pollfd __user *, ufds,
1420        unsigned int,  nfds, struct compat_timespec __user *, tsp,
1421        const compat_sigset_t __user *, sigmask, compat_size_t, sigsetsize)
1422{
1423        compat_sigset_t ss32;
1424        sigset_t ksigmask, sigsaved;
1425        struct compat_timespec ts;
1426        struct timespec end_time, *to = NULL;
1427        int ret;
1428
1429        if (tsp) {
1430                if (copy_from_user(&ts, tsp, sizeof(ts)))
1431                        return -EFAULT;
1432
1433                to = &end_time;
1434                if (poll_select_set_timeout(to, ts.tv_sec, ts.tv_nsec))
1435                        return -EINVAL;
1436        }
1437
1438        if (sigmask) {
1439                if (sigsetsize != sizeof(compat_sigset_t))
1440                        return -EINVAL;
1441                if (copy_from_user(&ss32, sigmask, sizeof(ss32)))
1442                        return -EFAULT;
1443                sigset_from_compat(&ksigmask, &ss32);
1444
1445                sigdelsetmask(&ksigmask, sigmask(SIGKILL)|sigmask(SIGSTOP));
1446                sigprocmask(SIG_SETMASK, &ksigmask, &sigsaved);
1447        }
1448
1449        ret = do_sys_poll(ufds, nfds, to);
1450
1451        /* We can restart this syscall, usually */
1452        if (ret == -EINTR) {
1453                /*
1454                 * Don't restore the signal mask yet. Let do_signal() deliver
1455                 * the signal on the way back to userspace, before the signal
1456                 * mask is restored.
1457                 */
1458                if (sigmask) {
1459                        memcpy(&current->saved_sigmask, &sigsaved,
1460                                sizeof(sigsaved));
1461                        set_restore_sigmask();
1462                }
1463                ret = -ERESTARTNOHAND;
1464        } else if (sigmask)
1465                sigprocmask(SIG_SETMASK, &sigsaved, NULL);
1466
1467        ret = poll_select_copy_remaining(&end_time, tsp, 0, ret);
1468
1469        return ret;
1470}
1471
1472#ifdef CONFIG_FHANDLE
1473/*
1474 * Exactly like fs/open.c:sys_open_by_handle_at(), except that it
1475 * doesn't set the O_LARGEFILE flag.
1476 */
1477COMPAT_SYSCALL_DEFINE3(open_by_handle_at, int, mountdirfd,
1478                             struct file_handle __user *, handle, int, flags)
1479{
1480        return do_handle_open(mountdirfd, handle, flags);
1481}
1482#endif
1483