linux/fs/compat.c
<<
>>
Prefs
   1/*
   2 *  linux/fs/compat.c
   3 *
   4 *  Kernel compatibililty routines for e.g. 32 bit syscall support
   5 *  on 64 bit kernels.
   6 *
   7 *  Copyright (C) 2002       Stephen Rothwell, IBM Corporation
   8 *  Copyright (C) 1997-2000  Jakub Jelinek  (jakub@redhat.com)
   9 *  Copyright (C) 1998       Eddie C. Dost  (ecd@skynet.be)
  10 *  Copyright (C) 2001,2002  Andi Kleen, SuSE Labs 
  11 *  Copyright (C) 2003       Pavel Machek (pavel@ucw.cz)
  12 *
  13 *  This program is free software; you can redistribute it and/or modify
  14 *  it under the terms of the GNU General Public License version 2 as
  15 *  published by the Free Software Foundation.
  16 */
  17
  18#include <linux/stddef.h>
  19#include <linux/kernel.h>
  20#include <linux/linkage.h>
  21#include <linux/compat.h>
  22#include <linux/errno.h>
  23#include <linux/time.h>
  24#include <linux/fs.h>
  25#include <linux/fcntl.h>
  26#include <linux/namei.h>
  27#include <linux/file.h>
  28#include <linux/fdtable.h>
  29#include <linux/vfs.h>
  30#include <linux/ioctl.h>
  31#include <linux/init.h>
  32#include <linux/ncp_mount.h>
  33#include <linux/nfs4_mount.h>
  34#include <linux/syscalls.h>
  35#include <linux/ctype.h>
  36#include <linux/dirent.h>
  37#include <linux/fsnotify.h>
  38#include <linux/highuid.h>
  39#include <linux/personality.h>
  40#include <linux/rwsem.h>
  41#include <linux/tsacct_kern.h>
  42#include <linux/security.h>
  43#include <linux/highmem.h>
  44#include <linux/signal.h>
  45#include <linux/poll.h>
  46#include <linux/mm.h>
  47#include <linux/fs_struct.h>
  48#include <linux/slab.h>
  49#include <linux/pagemap.h>
  50#include <linux/aio.h>
  51
  52#include <asm/uaccess.h>
  53#include <asm/mmu_context.h>
  54#include <asm/ioctls.h>
  55#include "internal.h"
  56
  57int compat_log = 1;
  58
  59int compat_printk(const char *fmt, ...)
  60{
  61        va_list ap;
  62        int ret;
  63        if (!compat_log)
  64                return 0;
  65        va_start(ap, fmt);
  66        ret = vprintk(fmt, ap);
  67        va_end(ap);
  68        return ret;
  69}
  70
  71/*
  72 * Not all architectures have sys_utime, so implement this in terms
  73 * of sys_utimes.
  74 */
  75COMPAT_SYSCALL_DEFINE2(utime, const char __user *, filename,
  76                       struct compat_utimbuf __user *, t)
  77{
  78        struct timespec tv[2];
  79
  80        if (t) {
  81                if (get_user(tv[0].tv_sec, &t->actime) ||
  82                    get_user(tv[1].tv_sec, &t->modtime))
  83                        return -EFAULT;
  84                tv[0].tv_nsec = 0;
  85                tv[1].tv_nsec = 0;
  86        }
  87        return do_utimes(AT_FDCWD, filename, t ? tv : NULL, 0);
  88}
  89
  90COMPAT_SYSCALL_DEFINE4(utimensat, unsigned int, dfd, const char __user *, filename, struct compat_timespec __user *, t, int, flags)
  91{
  92        struct timespec tv[2];
  93
  94        if  (t) {
  95                if (compat_get_timespec(&tv[0], &t[0]) ||
  96                    compat_get_timespec(&tv[1], &t[1]))
  97                        return -EFAULT;
  98
  99                if (tv[0].tv_nsec == UTIME_OMIT && tv[1].tv_nsec == UTIME_OMIT)
 100                        return 0;
 101        }
 102        return do_utimes(dfd, filename, t ? tv : NULL, flags);
 103}
 104
 105COMPAT_SYSCALL_DEFINE3(futimesat, unsigned int, dfd, const char __user *, filename, struct compat_timeval __user *, t)
 106{
 107        struct timespec tv[2];
 108
 109        if (t) {
 110                if (get_user(tv[0].tv_sec, &t[0].tv_sec) ||
 111                    get_user(tv[0].tv_nsec, &t[0].tv_usec) ||
 112                    get_user(tv[1].tv_sec, &t[1].tv_sec) ||
 113                    get_user(tv[1].tv_nsec, &t[1].tv_usec))
 114                        return -EFAULT;
 115                if (tv[0].tv_nsec >= 1000000 || tv[0].tv_nsec < 0 ||
 116                    tv[1].tv_nsec >= 1000000 || tv[1].tv_nsec < 0)
 117                        return -EINVAL;
 118                tv[0].tv_nsec *= 1000;
 119                tv[1].tv_nsec *= 1000;
 120        }
 121        return do_utimes(dfd, filename, t ? tv : NULL, 0);
 122}
 123
 124COMPAT_SYSCALL_DEFINE2(utimes, const char __user *, filename, struct compat_timeval __user *, t)
 125{
 126        return compat_sys_futimesat(AT_FDCWD, filename, t);
 127}
 128
 129static int cp_compat_stat(struct kstat *stat, struct compat_stat __user *ubuf)
 130{
 131        struct compat_stat tmp;
 132
 133        if (!old_valid_dev(stat->dev) || !old_valid_dev(stat->rdev))
 134                return -EOVERFLOW;
 135
 136        memset(&tmp, 0, sizeof(tmp));
 137        tmp.st_dev = old_encode_dev(stat->dev);
 138        tmp.st_ino = stat->ino;
 139        if (sizeof(tmp.st_ino) < sizeof(stat->ino) && tmp.st_ino != stat->ino)
 140                return -EOVERFLOW;
 141        tmp.st_mode = stat->mode;
 142        tmp.st_nlink = stat->nlink;
 143        if (tmp.st_nlink != stat->nlink)
 144                return -EOVERFLOW;
 145        SET_UID(tmp.st_uid, from_kuid_munged(current_user_ns(), stat->uid));
 146        SET_GID(tmp.st_gid, from_kgid_munged(current_user_ns(), stat->gid));
 147        tmp.st_rdev = old_encode_dev(stat->rdev);
 148        if ((u64) stat->size > MAX_NON_LFS)
 149                return -EOVERFLOW;
 150        tmp.st_size = stat->size;
 151        tmp.st_atime = stat->atime.tv_sec;
 152        tmp.st_atime_nsec = stat->atime.tv_nsec;
 153        tmp.st_mtime = stat->mtime.tv_sec;
 154        tmp.st_mtime_nsec = stat->mtime.tv_nsec;
 155        tmp.st_ctime = stat->ctime.tv_sec;
 156        tmp.st_ctime_nsec = stat->ctime.tv_nsec;
 157        tmp.st_blocks = stat->blocks;
 158        tmp.st_blksize = stat->blksize;
 159        return copy_to_user(ubuf, &tmp, sizeof(tmp)) ? -EFAULT : 0;
 160}
 161
 162COMPAT_SYSCALL_DEFINE2(newstat, const char __user *, filename,
 163                       struct compat_stat __user *, statbuf)
 164{
 165        struct kstat stat;
 166        int error;
 167
 168        error = vfs_stat(filename, &stat);
 169        if (error)
 170                return error;
 171        return cp_compat_stat(&stat, statbuf);
 172}
 173
 174COMPAT_SYSCALL_DEFINE2(newlstat, const char __user *, filename,
 175                       struct compat_stat __user *, statbuf)
 176{
 177        struct kstat stat;
 178        int error;
 179
 180        error = vfs_lstat(filename, &stat);
 181        if (error)
 182                return error;
 183        return cp_compat_stat(&stat, statbuf);
 184}
 185
 186#ifndef __ARCH_WANT_STAT64
 187COMPAT_SYSCALL_DEFINE4(newfstatat, unsigned int, dfd,
 188                       const char __user *, filename,
 189                       struct compat_stat __user *, statbuf, int, flag)
 190{
 191        struct kstat stat;
 192        int error;
 193
 194        error = vfs_fstatat(dfd, filename, &stat, flag);
 195        if (error)
 196                return error;
 197        return cp_compat_stat(&stat, statbuf);
 198}
 199#endif
 200
 201COMPAT_SYSCALL_DEFINE2(newfstat, unsigned int, fd,
 202                       struct compat_stat __user *, statbuf)
 203{
 204        struct kstat stat;
 205        int error = vfs_fstat(fd, &stat);
 206
 207        if (!error)
 208                error = cp_compat_stat(&stat, statbuf);
 209        return error;
 210}
 211
 212static int put_compat_statfs(struct compat_statfs __user *ubuf, struct kstatfs *kbuf)
 213{
 214        
 215        if (sizeof ubuf->f_blocks == 4) {
 216                if ((kbuf->f_blocks | kbuf->f_bfree | kbuf->f_bavail |
 217                     kbuf->f_bsize | kbuf->f_frsize) & 0xffffffff00000000ULL)
 218                        return -EOVERFLOW;
 219                /* f_files and f_ffree may be -1; it's okay
 220                 * to stuff that into 32 bits */
 221                if (kbuf->f_files != 0xffffffffffffffffULL
 222                 && (kbuf->f_files & 0xffffffff00000000ULL))
 223                        return -EOVERFLOW;
 224                if (kbuf->f_ffree != 0xffffffffffffffffULL
 225                 && (kbuf->f_ffree & 0xffffffff00000000ULL))
 226                        return -EOVERFLOW;
 227        }
 228        if (!access_ok(VERIFY_WRITE, ubuf, sizeof(*ubuf)) ||
 229            __put_user(kbuf->f_type, &ubuf->f_type) ||
 230            __put_user(kbuf->f_bsize, &ubuf->f_bsize) ||
 231            __put_user(kbuf->f_blocks, &ubuf->f_blocks) ||
 232            __put_user(kbuf->f_bfree, &ubuf->f_bfree) ||
 233            __put_user(kbuf->f_bavail, &ubuf->f_bavail) ||
 234            __put_user(kbuf->f_files, &ubuf->f_files) ||
 235            __put_user(kbuf->f_ffree, &ubuf->f_ffree) ||
 236            __put_user(kbuf->f_namelen, &ubuf->f_namelen) ||
 237            __put_user(kbuf->f_fsid.val[0], &ubuf->f_fsid.val[0]) ||
 238            __put_user(kbuf->f_fsid.val[1], &ubuf->f_fsid.val[1]) ||
 239            __put_user(kbuf->f_frsize, &ubuf->f_frsize) ||
 240            __put_user(kbuf->f_flags, &ubuf->f_flags) ||
 241            __clear_user(ubuf->f_spare, sizeof(ubuf->f_spare)))
 242                return -EFAULT;
 243        return 0;
 244}
 245
 246/*
 247 * The following statfs calls are copies of code from fs/statfs.c and
 248 * should be checked against those from time to time
 249 */
 250COMPAT_SYSCALL_DEFINE2(statfs, const char __user *, pathname, struct compat_statfs __user *, buf)
 251{
 252        struct kstatfs tmp;
 253        int error = user_statfs(pathname, &tmp);
 254        if (!error)
 255                error = put_compat_statfs(buf, &tmp);
 256        return error;
 257}
 258
 259COMPAT_SYSCALL_DEFINE2(fstatfs, unsigned int, fd, struct compat_statfs __user *, buf)
 260{
 261        struct kstatfs tmp;
 262        int error = fd_statfs(fd, &tmp);
 263        if (!error)
 264                error = put_compat_statfs(buf, &tmp);
 265        return error;
 266}
 267
 268static int put_compat_statfs64(struct compat_statfs64 __user *ubuf, struct kstatfs *kbuf)
 269{
 270        if (sizeof ubuf->f_blocks == 4) {
 271                if ((kbuf->f_blocks | kbuf->f_bfree | kbuf->f_bavail |
 272                     kbuf->f_bsize | kbuf->f_frsize) & 0xffffffff00000000ULL)
 273                        return -EOVERFLOW;
 274                /* f_files and f_ffree may be -1; it's okay
 275                 * to stuff that into 32 bits */
 276                if (kbuf->f_files != 0xffffffffffffffffULL
 277                 && (kbuf->f_files & 0xffffffff00000000ULL))
 278                        return -EOVERFLOW;
 279                if (kbuf->f_ffree != 0xffffffffffffffffULL
 280                 && (kbuf->f_ffree & 0xffffffff00000000ULL))
 281                        return -EOVERFLOW;
 282        }
 283        if (!access_ok(VERIFY_WRITE, ubuf, sizeof(*ubuf)) ||
 284            __put_user(kbuf->f_type, &ubuf->f_type) ||
 285            __put_user(kbuf->f_bsize, &ubuf->f_bsize) ||
 286            __put_user(kbuf->f_blocks, &ubuf->f_blocks) ||
 287            __put_user(kbuf->f_bfree, &ubuf->f_bfree) ||
 288            __put_user(kbuf->f_bavail, &ubuf->f_bavail) ||
 289            __put_user(kbuf->f_files, &ubuf->f_files) ||
 290            __put_user(kbuf->f_ffree, &ubuf->f_ffree) ||
 291            __put_user(kbuf->f_namelen, &ubuf->f_namelen) ||
 292            __put_user(kbuf->f_fsid.val[0], &ubuf->f_fsid.val[0]) ||
 293            __put_user(kbuf->f_fsid.val[1], &ubuf->f_fsid.val[1]) ||
 294            __put_user(kbuf->f_frsize, &ubuf->f_frsize) ||
 295            __put_user(kbuf->f_flags, &ubuf->f_flags) ||
 296            __clear_user(ubuf->f_spare, sizeof(ubuf->f_spare)))
 297                return -EFAULT;
 298        return 0;
 299}
 300
 301COMPAT_SYSCALL_DEFINE3(statfs64, const char __user *, pathname, compat_size_t, sz, struct compat_statfs64 __user *, buf)
 302{
 303        struct kstatfs tmp;
 304        int error;
 305
 306        if (sz != sizeof(*buf))
 307                return -EINVAL;
 308
 309        error = user_statfs(pathname, &tmp);
 310        if (!error)
 311                error = put_compat_statfs64(buf, &tmp);
 312        return error;
 313}
 314
 315COMPAT_SYSCALL_DEFINE3(fstatfs64, unsigned int, fd, compat_size_t, sz, struct compat_statfs64 __user *, buf)
 316{
 317        struct kstatfs tmp;
 318        int error;
 319
 320        if (sz != sizeof(*buf))
 321                return -EINVAL;
 322
 323        error = fd_statfs(fd, &tmp);
 324        if (!error)
 325                error = put_compat_statfs64(buf, &tmp);
 326        return error;
 327}
 328
 329/*
 330 * This is a copy of sys_ustat, just dealing with a structure layout.
 331 * Given how simple this syscall is that apporach is more maintainable
 332 * than the various conversion hacks.
 333 */
 334COMPAT_SYSCALL_DEFINE2(ustat, unsigned, dev, struct compat_ustat __user *, u)
 335{
 336        struct compat_ustat tmp;
 337        struct kstatfs sbuf;
 338        int err = vfs_ustat(new_decode_dev(dev), &sbuf);
 339        if (err)
 340                return err;
 341
 342        memset(&tmp, 0, sizeof(struct compat_ustat));
 343        tmp.f_tfree = sbuf.f_bfree;
 344        tmp.f_tinode = sbuf.f_ffree;
 345        if (copy_to_user(u, &tmp, sizeof(struct compat_ustat)))
 346                return -EFAULT;
 347        return 0;
 348}
 349
 350static int get_compat_flock(struct flock *kfl, struct compat_flock __user *ufl)
 351{
 352        if (!access_ok(VERIFY_READ, ufl, sizeof(*ufl)) ||
 353            __get_user(kfl->l_type, &ufl->l_type) ||
 354            __get_user(kfl->l_whence, &ufl->l_whence) ||
 355            __get_user(kfl->l_start, &ufl->l_start) ||
 356            __get_user(kfl->l_len, &ufl->l_len) ||
 357            __get_user(kfl->l_pid, &ufl->l_pid))
 358                return -EFAULT;
 359        return 0;
 360}
 361
 362static int put_compat_flock(struct flock *kfl, struct compat_flock __user *ufl)
 363{
 364        if (!access_ok(VERIFY_WRITE, ufl, sizeof(*ufl)) ||
 365            __put_user(kfl->l_type, &ufl->l_type) ||
 366            __put_user(kfl->l_whence, &ufl->l_whence) ||
 367            __put_user(kfl->l_start, &ufl->l_start) ||
 368            __put_user(kfl->l_len, &ufl->l_len) ||
 369            __put_user(kfl->l_pid, &ufl->l_pid))
 370                return -EFAULT;
 371        return 0;
 372}
 373
 374#ifndef HAVE_ARCH_GET_COMPAT_FLOCK64
 375static int get_compat_flock64(struct flock *kfl, struct compat_flock64 __user *ufl)
 376{
 377        if (!access_ok(VERIFY_READ, ufl, sizeof(*ufl)) ||
 378            __get_user(kfl->l_type, &ufl->l_type) ||
 379            __get_user(kfl->l_whence, &ufl->l_whence) ||
 380            __get_user(kfl->l_start, &ufl->l_start) ||
 381            __get_user(kfl->l_len, &ufl->l_len) ||
 382            __get_user(kfl->l_pid, &ufl->l_pid))
 383                return -EFAULT;
 384        return 0;
 385}
 386#endif
 387
 388#ifndef HAVE_ARCH_PUT_COMPAT_FLOCK64
 389static int put_compat_flock64(struct flock *kfl, struct compat_flock64 __user *ufl)
 390{
 391        if (!access_ok(VERIFY_WRITE, ufl, sizeof(*ufl)) ||
 392            __put_user(kfl->l_type, &ufl->l_type) ||
 393            __put_user(kfl->l_whence, &ufl->l_whence) ||
 394            __put_user(kfl->l_start, &ufl->l_start) ||
 395            __put_user(kfl->l_len, &ufl->l_len) ||
 396            __put_user(kfl->l_pid, &ufl->l_pid))
 397                return -EFAULT;
 398        return 0;
 399}
 400#endif
 401
 402static unsigned int
 403convert_fcntl_cmd(unsigned int cmd)
 404{
 405        switch (cmd) {
 406        case F_GETLK64:
 407                return F_GETLK;
 408        case F_SETLK64:
 409                return F_SETLK;
 410        case F_SETLKW64:
 411                return F_SETLKW;
 412        }
 413
 414        return cmd;
 415}
 416
 417COMPAT_SYSCALL_DEFINE3(fcntl64, unsigned int, fd, unsigned int, cmd,
 418                       compat_ulong_t, arg)
 419{
 420        mm_segment_t old_fs;
 421        struct flock f;
 422        long ret;
 423        unsigned int conv_cmd;
 424
 425        switch (cmd) {
 426        case F_GETLK:
 427        case F_SETLK:
 428        case F_SETLKW:
 429                ret = get_compat_flock(&f, compat_ptr(arg));
 430                if (ret != 0)
 431                        break;
 432                old_fs = get_fs();
 433                set_fs(KERNEL_DS);
 434                ret = sys_fcntl(fd, cmd, (unsigned long)&f);
 435                set_fs(old_fs);
 436                if (cmd == F_GETLK && ret == 0) {
 437                        /* GETLK was successful and we need to return the data...
 438                         * but it needs to fit in the compat structure.
 439                         * l_start shouldn't be too big, unless the original
 440                         * start + end is greater than COMPAT_OFF_T_MAX, in which
 441                         * case the app was asking for trouble, so we return
 442                         * -EOVERFLOW in that case.
 443                         * l_len could be too big, in which case we just truncate it,
 444                         * and only allow the app to see that part of the conflicting
 445                         * lock that might make sense to it anyway
 446                         */
 447
 448                        if (f.l_start > COMPAT_OFF_T_MAX)
 449                                ret = -EOVERFLOW;
 450                        if (f.l_len > COMPAT_OFF_T_MAX)
 451                                f.l_len = COMPAT_OFF_T_MAX;
 452                        if (ret == 0)
 453                                ret = put_compat_flock(&f, compat_ptr(arg));
 454                }
 455                break;
 456
 457        case F_GETLK64:
 458        case F_SETLK64:
 459        case F_SETLKW64:
 460        case F_OFD_GETLK:
 461        case F_OFD_SETLK:
 462        case F_OFD_SETLKW:
 463                ret = get_compat_flock64(&f, compat_ptr(arg));
 464                if (ret != 0)
 465                        break;
 466                old_fs = get_fs();
 467                set_fs(KERNEL_DS);
 468                conv_cmd = convert_fcntl_cmd(cmd);
 469                ret = sys_fcntl(fd, conv_cmd, (unsigned long)&f);
 470                set_fs(old_fs);
 471                if ((conv_cmd == F_GETLK || conv_cmd == F_OFD_GETLK) && ret == 0) {
 472                        /* need to return lock information - see above for commentary */
 473                        if (f.l_start > COMPAT_LOFF_T_MAX)
 474                                ret = -EOVERFLOW;
 475                        if (f.l_len > COMPAT_LOFF_T_MAX)
 476                                f.l_len = COMPAT_LOFF_T_MAX;
 477                        if (ret == 0)
 478                                ret = put_compat_flock64(&f, compat_ptr(arg));
 479                }
 480                break;
 481
 482        default:
 483                ret = sys_fcntl(fd, cmd, arg);
 484                break;
 485        }
 486        return ret;
 487}
 488
 489COMPAT_SYSCALL_DEFINE3(fcntl, unsigned int, fd, unsigned int, cmd,
 490                       compat_ulong_t, arg)
 491{
 492        switch (cmd) {
 493        case F_GETLK64:
 494        case F_SETLK64:
 495        case F_SETLKW64:
 496        case F_OFD_GETLK:
 497        case F_OFD_SETLK:
 498        case F_OFD_SETLKW:
 499                return -EINVAL;
 500        }
 501        return compat_sys_fcntl64(fd, cmd, arg);
 502}
 503
 504COMPAT_SYSCALL_DEFINE2(io_setup, unsigned, nr_reqs, u32 __user *, ctx32p)
 505{
 506        long ret;
 507        aio_context_t ctx64;
 508
 509        mm_segment_t oldfs = get_fs();
 510        if (unlikely(get_user(ctx64, ctx32p)))
 511                return -EFAULT;
 512
 513        set_fs(KERNEL_DS);
 514        /* The __user pointer cast is valid because of the set_fs() */
 515        ret = sys_io_setup(nr_reqs, (aio_context_t __user *) &ctx64);
 516        set_fs(oldfs);
 517        /* truncating is ok because it's a user address */
 518        if (!ret)
 519                ret = put_user((u32) ctx64, ctx32p);
 520        return ret;
 521}
 522
 523COMPAT_SYSCALL_DEFINE5(io_getevents, compat_aio_context_t, ctx_id,
 524                       compat_long_t, min_nr,
 525                       compat_long_t, nr,
 526                       struct io_event __user *, events,
 527                       struct compat_timespec __user *, timeout)
 528{
 529        struct timespec t;
 530        struct timespec __user *ut = NULL;
 531
 532        if (timeout) {
 533                if (compat_get_timespec(&t, timeout))
 534                        return -EFAULT;
 535
 536                ut = compat_alloc_user_space(sizeof(*ut));
 537                if (copy_to_user(ut, &t, sizeof(t)) )
 538                        return -EFAULT;
 539        } 
 540        return sys_io_getevents(ctx_id, min_nr, nr, events, ut);
 541}
 542
 543/* A write operation does a read from user space and vice versa */
 544#define vrfy_dir(type) ((type) == READ ? VERIFY_WRITE : VERIFY_READ)
 545
 546ssize_t compat_rw_copy_check_uvector(int type,
 547                const struct compat_iovec __user *uvector, unsigned long nr_segs,
 548                unsigned long fast_segs, struct iovec *fast_pointer,
 549                struct iovec **ret_pointer)
 550{
 551        compat_ssize_t tot_len;
 552        struct iovec *iov = *ret_pointer = fast_pointer;
 553        ssize_t ret = 0;
 554        int seg;
 555
 556        /*
 557         * SuS says "The readv() function *may* fail if the iovcnt argument
 558         * was less than or equal to 0, or greater than {IOV_MAX}.  Linux has
 559         * traditionally returned zero for zero segments, so...
 560         */
 561        if (nr_segs == 0)
 562                goto out;
 563
 564        ret = -EINVAL;
 565        if (nr_segs > UIO_MAXIOV || nr_segs < 0)
 566                goto out;
 567        if (nr_segs > fast_segs) {
 568                ret = -ENOMEM;
 569                iov = kmalloc(nr_segs*sizeof(struct iovec), GFP_KERNEL);
 570                if (iov == NULL)
 571                        goto out;
 572        }
 573        *ret_pointer = iov;
 574
 575        ret = -EFAULT;
 576        if (!access_ok(VERIFY_READ, uvector, nr_segs*sizeof(*uvector)))
 577                goto out;
 578
 579        /*
 580         * Single unix specification:
 581         * We should -EINVAL if an element length is not >= 0 and fitting an
 582         * ssize_t.
 583         *
 584         * In Linux, the total length is limited to MAX_RW_COUNT, there is
 585         * no overflow possibility.
 586         */
 587        tot_len = 0;
 588        ret = -EINVAL;
 589        for (seg = 0; seg < nr_segs; seg++) {
 590                compat_uptr_t buf;
 591                compat_ssize_t len;
 592
 593                if (__get_user(len, &uvector->iov_len) ||
 594                   __get_user(buf, &uvector->iov_base)) {
 595                        ret = -EFAULT;
 596                        goto out;
 597                }
 598                if (len < 0)    /* size_t not fitting in compat_ssize_t .. */
 599                        goto out;
 600                if (type >= 0 &&
 601                    !access_ok(vrfy_dir(type), compat_ptr(buf), len)) {
 602                        ret = -EFAULT;
 603                        goto out;
 604                }
 605                if (len > MAX_RW_COUNT - tot_len)
 606                        len = MAX_RW_COUNT - tot_len;
 607                tot_len += len;
 608                iov->iov_base = compat_ptr(buf);
 609                iov->iov_len = (compat_size_t) len;
 610                uvector++;
 611                iov++;
 612        }
 613        ret = tot_len;
 614
 615out:
 616        return ret;
 617}
 618
 619static inline long
 620copy_iocb(long nr, u32 __user *ptr32, struct iocb __user * __user *ptr64)
 621{
 622        compat_uptr_t uptr;
 623        int i;
 624
 625        for (i = 0; i < nr; ++i) {
 626                if (get_user(uptr, ptr32 + i))
 627                        return -EFAULT;
 628                if (put_user(compat_ptr(uptr), ptr64 + i))
 629                        return -EFAULT;
 630        }
 631        return 0;
 632}
 633
 634#define MAX_AIO_SUBMITS         (PAGE_SIZE/sizeof(struct iocb *))
 635
 636COMPAT_SYSCALL_DEFINE3(io_submit, compat_aio_context_t, ctx_id,
 637                       int, nr, u32 __user *, iocb)
 638{
 639        struct iocb __user * __user *iocb64; 
 640        long ret;
 641
 642        if (unlikely(nr < 0))
 643                return -EINVAL;
 644
 645        if (nr > MAX_AIO_SUBMITS)
 646                nr = MAX_AIO_SUBMITS;
 647        
 648        iocb64 = compat_alloc_user_space(nr * sizeof(*iocb64));
 649        ret = copy_iocb(nr, iocb, iocb64);
 650        if (!ret)
 651                ret = do_io_submit(ctx_id, nr, iocb64, 1);
 652        return ret;
 653}
 654
 655struct compat_ncp_mount_data {
 656        compat_int_t version;
 657        compat_uint_t ncp_fd;
 658        __compat_uid_t mounted_uid;
 659        compat_pid_t wdog_pid;
 660        unsigned char mounted_vol[NCP_VOLNAME_LEN + 1];
 661        compat_uint_t time_out;
 662        compat_uint_t retry_count;
 663        compat_uint_t flags;
 664        __compat_uid_t uid;
 665        __compat_gid_t gid;
 666        compat_mode_t file_mode;
 667        compat_mode_t dir_mode;
 668};
 669
 670struct compat_ncp_mount_data_v4 {
 671        compat_int_t version;
 672        compat_ulong_t flags;
 673        compat_ulong_t mounted_uid;
 674        compat_long_t wdog_pid;
 675        compat_uint_t ncp_fd;
 676        compat_uint_t time_out;
 677        compat_uint_t retry_count;
 678        compat_ulong_t uid;
 679        compat_ulong_t gid;
 680        compat_ulong_t file_mode;
 681        compat_ulong_t dir_mode;
 682};
 683
 684static void *do_ncp_super_data_conv(void *raw_data)
 685{
 686        int version = *(unsigned int *)raw_data;
 687
 688        if (version == 3) {
 689                struct compat_ncp_mount_data *c_n = raw_data;
 690                struct ncp_mount_data *n = raw_data;
 691
 692                n->dir_mode = c_n->dir_mode;
 693                n->file_mode = c_n->file_mode;
 694                n->gid = c_n->gid;
 695                n->uid = c_n->uid;
 696                memmove (n->mounted_vol, c_n->mounted_vol, (sizeof (c_n->mounted_vol) + 3 * sizeof (unsigned int)));
 697                n->wdog_pid = c_n->wdog_pid;
 698                n->mounted_uid = c_n->mounted_uid;
 699        } else if (version == 4) {
 700                struct compat_ncp_mount_data_v4 *c_n = raw_data;
 701                struct ncp_mount_data_v4 *n = raw_data;
 702
 703                n->dir_mode = c_n->dir_mode;
 704                n->file_mode = c_n->file_mode;
 705                n->gid = c_n->gid;
 706                n->uid = c_n->uid;
 707                n->retry_count = c_n->retry_count;
 708                n->time_out = c_n->time_out;
 709                n->ncp_fd = c_n->ncp_fd;
 710                n->wdog_pid = c_n->wdog_pid;
 711                n->mounted_uid = c_n->mounted_uid;
 712                n->flags = c_n->flags;
 713        } else if (version != 5) {
 714                return NULL;
 715        }
 716
 717        return raw_data;
 718}
 719
 720
 721struct compat_nfs_string {
 722        compat_uint_t len;
 723        compat_uptr_t data;
 724};
 725
 726static inline void compat_nfs_string(struct nfs_string *dst,
 727                                     struct compat_nfs_string *src)
 728{
 729        dst->data = compat_ptr(src->data);
 730        dst->len = src->len;
 731}
 732
 733struct compat_nfs4_mount_data_v1 {
 734        compat_int_t version;
 735        compat_int_t flags;
 736        compat_int_t rsize;
 737        compat_int_t wsize;
 738        compat_int_t timeo;
 739        compat_int_t retrans;
 740        compat_int_t acregmin;
 741        compat_int_t acregmax;
 742        compat_int_t acdirmin;
 743        compat_int_t acdirmax;
 744        struct compat_nfs_string client_addr;
 745        struct compat_nfs_string mnt_path;
 746        struct compat_nfs_string hostname;
 747        compat_uint_t host_addrlen;
 748        compat_uptr_t host_addr;
 749        compat_int_t proto;
 750        compat_int_t auth_flavourlen;
 751        compat_uptr_t auth_flavours;
 752};
 753
 754static int do_nfs4_super_data_conv(void *raw_data)
 755{
 756        int version = *(compat_uint_t *) raw_data;
 757
 758        if (version == 1) {
 759                struct compat_nfs4_mount_data_v1 *raw = raw_data;
 760                struct nfs4_mount_data *real = raw_data;
 761
 762                /* copy the fields backwards */
 763                real->auth_flavours = compat_ptr(raw->auth_flavours);
 764                real->auth_flavourlen = raw->auth_flavourlen;
 765                real->proto = raw->proto;
 766                real->host_addr = compat_ptr(raw->host_addr);
 767                real->host_addrlen = raw->host_addrlen;
 768                compat_nfs_string(&real->hostname, &raw->hostname);
 769                compat_nfs_string(&real->mnt_path, &raw->mnt_path);
 770                compat_nfs_string(&real->client_addr, &raw->client_addr);
 771                real->acdirmax = raw->acdirmax;
 772                real->acdirmin = raw->acdirmin;
 773                real->acregmax = raw->acregmax;
 774                real->acregmin = raw->acregmin;
 775                real->retrans = raw->retrans;
 776                real->timeo = raw->timeo;
 777                real->wsize = raw->wsize;
 778                real->rsize = raw->rsize;
 779                real->flags = raw->flags;
 780                real->version = raw->version;
 781        }
 782
 783        return 0;
 784}
 785
 786#define NCPFS_NAME      "ncpfs"
 787#define NFS4_NAME       "nfs4"
 788
 789COMPAT_SYSCALL_DEFINE5(mount, const char __user *, dev_name,
 790                       const char __user *, dir_name,
 791                       const char __user *, type, compat_ulong_t, flags,
 792                       const void __user *, data)
 793{
 794        char *kernel_type;
 795        void *options;
 796        char *kernel_dev;
 797        int retval;
 798
 799        kernel_type = copy_mount_string(type);
 800        retval = PTR_ERR(kernel_type);
 801        if (IS_ERR(kernel_type))
 802                goto out;
 803
 804        kernel_dev = copy_mount_string(dev_name);
 805        retval = PTR_ERR(kernel_dev);
 806        if (IS_ERR(kernel_dev))
 807                goto out1;
 808
 809        options = copy_mount_options(data);
 810        retval = PTR_ERR(options);
 811        if (IS_ERR(options))
 812                goto out2;
 813
 814        if (kernel_type && options) {
 815                if (!strcmp(kernel_type, NCPFS_NAME)) {
 816                        do_ncp_super_data_conv(options);
 817                } else if (!strcmp(kernel_type, NFS4_NAME)) {
 818                        retval = -EINVAL;
 819                        if (do_nfs4_super_data_conv(options))
 820                                goto out3;
 821                }
 822        }
 823
 824        retval = do_mount(kernel_dev, dir_name, kernel_type, flags, options);
 825
 826 out3:
 827        kfree(options);
 828 out2:
 829        kfree(kernel_dev);
 830 out1:
 831        kfree(kernel_type);
 832 out:
 833        return retval;
 834}
 835
 836struct compat_old_linux_dirent {
 837        compat_ulong_t  d_ino;
 838        compat_ulong_t  d_offset;
 839        unsigned short  d_namlen;
 840        char            d_name[1];
 841};
 842
 843struct compat_readdir_callback {
 844        struct dir_context ctx;
 845        struct compat_old_linux_dirent __user *dirent;
 846        int result;
 847};
 848
 849static int compat_fillonedir(struct dir_context *ctx, const char *name,
 850                             int namlen, loff_t offset, u64 ino,
 851                             unsigned int d_type)
 852{
 853        struct compat_readdir_callback *buf =
 854                container_of(ctx, struct compat_readdir_callback, ctx);
 855        struct compat_old_linux_dirent __user *dirent;
 856        compat_ulong_t d_ino;
 857
 858        if (buf->result)
 859                return -EINVAL;
 860        d_ino = ino;
 861        if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) {
 862                buf->result = -EOVERFLOW;
 863                return -EOVERFLOW;
 864        }
 865        buf->result++;
 866        dirent = buf->dirent;
 867        if (!access_ok(VERIFY_WRITE, dirent,
 868                        (unsigned long)(dirent->d_name + namlen + 1) -
 869                                (unsigned long)dirent))
 870                goto efault;
 871        if (    __put_user(d_ino, &dirent->d_ino) ||
 872                __put_user(offset, &dirent->d_offset) ||
 873                __put_user(namlen, &dirent->d_namlen) ||
 874                __copy_to_user(dirent->d_name, name, namlen) ||
 875                __put_user(0, dirent->d_name + namlen))
 876                goto efault;
 877        return 0;
 878efault:
 879        buf->result = -EFAULT;
 880        return -EFAULT;
 881}
 882
 883COMPAT_SYSCALL_DEFINE3(old_readdir, unsigned int, fd,
 884                struct compat_old_linux_dirent __user *, dirent, unsigned int, count)
 885{
 886        int error;
 887        struct fd f = fdget(fd);
 888        struct compat_readdir_callback buf = {
 889                .ctx.actor = compat_fillonedir,
 890                .dirent = dirent
 891        };
 892
 893        if (!f.file)
 894                return -EBADF;
 895
 896        error = iterate_dir(f.file, &buf.ctx);
 897        if (buf.result)
 898                error = buf.result;
 899
 900        fdput(f);
 901        return error;
 902}
 903
 904struct compat_linux_dirent {
 905        compat_ulong_t  d_ino;
 906        compat_ulong_t  d_off;
 907        unsigned short  d_reclen;
 908        char            d_name[1];
 909};
 910
 911struct compat_getdents_callback {
 912        struct dir_context ctx;
 913        struct compat_linux_dirent __user *current_dir;
 914        struct compat_linux_dirent __user *previous;
 915        int count;
 916        int error;
 917};
 918
 919static int compat_filldir(struct dir_context *ctx, const char *name, int namlen,
 920                loff_t offset, u64 ino, unsigned int d_type)
 921{
 922        struct compat_linux_dirent __user * dirent;
 923        struct compat_getdents_callback *buf =
 924                container_of(ctx, struct compat_getdents_callback, ctx);
 925        compat_ulong_t d_ino;
 926        int reclen = ALIGN(offsetof(struct compat_linux_dirent, d_name) +
 927                namlen + 2, sizeof(compat_long_t));
 928
 929        buf->error = -EINVAL;   /* only used if we fail.. */
 930        if (reclen > buf->count)
 931                return -EINVAL;
 932        d_ino = ino;
 933        if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) {
 934                buf->error = -EOVERFLOW;
 935                return -EOVERFLOW;
 936        }
 937        dirent = buf->previous;
 938        if (dirent) {
 939                if (__put_user(offset, &dirent->d_off))
 940                        goto efault;
 941        }
 942        dirent = buf->current_dir;
 943        if (__put_user(d_ino, &dirent->d_ino))
 944                goto efault;
 945        if (__put_user(reclen, &dirent->d_reclen))
 946                goto efault;
 947        if (copy_to_user(dirent->d_name, name, namlen))
 948                goto efault;
 949        if (__put_user(0, dirent->d_name + namlen))
 950                goto efault;
 951        if (__put_user(d_type, (char  __user *) dirent + reclen - 1))
 952                goto efault;
 953        buf->previous = dirent;
 954        dirent = (void __user *)dirent + reclen;
 955        buf->current_dir = dirent;
 956        buf->count -= reclen;
 957        return 0;
 958efault:
 959        buf->error = -EFAULT;
 960        return -EFAULT;
 961}
 962
 963COMPAT_SYSCALL_DEFINE3(getdents, unsigned int, fd,
 964                struct compat_linux_dirent __user *, dirent, unsigned int, count)
 965{
 966        struct fd f;
 967        struct compat_linux_dirent __user * lastdirent;
 968        struct compat_getdents_callback buf = {
 969                .ctx.actor = compat_filldir,
 970                .current_dir = dirent,
 971                .count = count
 972        };
 973        int error;
 974
 975        if (!access_ok(VERIFY_WRITE, dirent, count))
 976                return -EFAULT;
 977
 978        f = fdget(fd);
 979        if (!f.file)
 980                return -EBADF;
 981
 982        error = iterate_dir(f.file, &buf.ctx);
 983        if (error >= 0)
 984                error = buf.error;
 985        lastdirent = buf.previous;
 986        if (lastdirent) {
 987                if (put_user(buf.ctx.pos, &lastdirent->d_off))
 988                        error = -EFAULT;
 989                else
 990                        error = count - buf.count;
 991        }
 992        fdput(f);
 993        return error;
 994}
 995
 996#ifdef __ARCH_WANT_COMPAT_SYS_GETDENTS64
 997
 998struct compat_getdents_callback64 {
 999        struct dir_context ctx;
1000        struct linux_dirent64 __user *current_dir;
1001        struct linux_dirent64 __user *previous;
1002        int count;
1003        int error;
1004};
1005
1006static int compat_filldir64(struct dir_context *ctx, const char *name,
1007                            int namlen, loff_t offset, u64 ino,
1008                            unsigned int d_type)
1009{
1010        struct linux_dirent64 __user *dirent;
1011        struct compat_getdents_callback64 *buf =
1012                container_of(ctx, struct compat_getdents_callback64, ctx);
1013        int reclen = ALIGN(offsetof(struct linux_dirent64, d_name) + namlen + 1,
1014                sizeof(u64));
1015        u64 off;
1016
1017        buf->error = -EINVAL;   /* only used if we fail.. */
1018        if (reclen > buf->count)
1019                return -EINVAL;
1020        dirent = buf->previous;
1021
1022        if (dirent) {
1023                if (__put_user_unaligned(offset, &dirent->d_off))
1024                        goto efault;
1025        }
1026        dirent = buf->current_dir;
1027        if (__put_user_unaligned(ino, &dirent->d_ino))
1028                goto efault;
1029        off = 0;
1030        if (__put_user_unaligned(off, &dirent->d_off))
1031                goto efault;
1032        if (__put_user(reclen, &dirent->d_reclen))
1033                goto efault;
1034        if (__put_user(d_type, &dirent->d_type))
1035                goto efault;
1036        if (copy_to_user(dirent->d_name, name, namlen))
1037                goto efault;
1038        if (__put_user(0, dirent->d_name + namlen))
1039                goto efault;
1040        buf->previous = dirent;
1041        dirent = (void __user *)dirent + reclen;
1042        buf->current_dir = dirent;
1043        buf->count -= reclen;
1044        return 0;
1045efault:
1046        buf->error = -EFAULT;
1047        return -EFAULT;
1048}
1049
1050COMPAT_SYSCALL_DEFINE3(getdents64, unsigned int, fd,
1051                struct linux_dirent64 __user *, dirent, unsigned int, count)
1052{
1053        struct fd f;
1054        struct linux_dirent64 __user * lastdirent;
1055        struct compat_getdents_callback64 buf = {
1056                .ctx.actor = compat_filldir64,
1057                .current_dir = dirent,
1058                .count = count
1059        };
1060        int error;
1061
1062        if (!access_ok(VERIFY_WRITE, dirent, count))
1063                return -EFAULT;
1064
1065        f = fdget(fd);
1066        if (!f.file)
1067                return -EBADF;
1068
1069        error = iterate_dir(f.file, &buf.ctx);
1070        if (error >= 0)
1071                error = buf.error;
1072        lastdirent = buf.previous;
1073        if (lastdirent) {
1074                typeof(lastdirent->d_off) d_off = buf.ctx.pos;
1075                if (__put_user_unaligned(d_off, &lastdirent->d_off))
1076                        error = -EFAULT;
1077                else
1078                        error = count - buf.count;
1079        }
1080        fdput(f);
1081        return error;
1082}
1083#endif /* __ARCH_WANT_COMPAT_SYS_GETDENTS64 */
1084
1085/*
1086 * Exactly like fs/open.c:sys_open(), except that it doesn't set the
1087 * O_LARGEFILE flag.
1088 */
1089COMPAT_SYSCALL_DEFINE3(open, const char __user *, filename, int, flags, umode_t, mode)
1090{
1091        return do_sys_open(AT_FDCWD, filename, flags, mode);
1092}
1093
1094/*
1095 * Exactly like fs/open.c:sys_openat(), except that it doesn't set the
1096 * O_LARGEFILE flag.
1097 */
1098COMPAT_SYSCALL_DEFINE4(openat, int, dfd, const char __user *, filename, int, flags, umode_t, mode)
1099{
1100        return do_sys_open(dfd, filename, flags, mode);
1101}
1102
1103#define __COMPAT_NFDBITS       (8 * sizeof(compat_ulong_t))
1104
1105static int poll_select_copy_remaining(struct timespec *end_time, void __user *p,
1106                                      int timeval, int ret)
1107{
1108        struct timespec ts;
1109
1110        if (!p)
1111                return ret;
1112
1113        if (current->personality & STICKY_TIMEOUTS)
1114                goto sticky;
1115
1116        /* No update for zero timeout */
1117        if (!end_time->tv_sec && !end_time->tv_nsec)
1118                return ret;
1119
1120        ktime_get_ts(&ts);
1121        ts = timespec_sub(*end_time, ts);
1122        if (ts.tv_sec < 0)
1123                ts.tv_sec = ts.tv_nsec = 0;
1124
1125        if (timeval) {
1126                struct compat_timeval rtv;
1127
1128                rtv.tv_sec = ts.tv_sec;
1129                rtv.tv_usec = ts.tv_nsec / NSEC_PER_USEC;
1130
1131                if (!copy_to_user(p, &rtv, sizeof(rtv)))
1132                        return ret;
1133        } else {
1134                struct compat_timespec rts;
1135
1136                rts.tv_sec = ts.tv_sec;
1137                rts.tv_nsec = ts.tv_nsec;
1138
1139                if (!copy_to_user(p, &rts, sizeof(rts)))
1140                        return ret;
1141        }
1142        /*
1143         * If an application puts its timeval in read-only memory, we
1144         * don't want the Linux-specific update to the timeval to
1145         * cause a fault after the select has completed
1146         * successfully. However, because we're not updating the
1147         * timeval, we can't restart the system call.
1148         */
1149
1150sticky:
1151        if (ret == -ERESTARTNOHAND)
1152                ret = -EINTR;
1153        return ret;
1154}
1155
1156/*
1157 * Ooo, nasty.  We need here to frob 32-bit unsigned longs to
1158 * 64-bit unsigned longs.
1159 */
1160static
1161int compat_get_fd_set(unsigned long nr, compat_ulong_t __user *ufdset,
1162                        unsigned long *fdset)
1163{
1164        nr = DIV_ROUND_UP(nr, __COMPAT_NFDBITS);
1165        if (ufdset) {
1166                unsigned long odd;
1167
1168                if (!access_ok(VERIFY_WRITE, ufdset, nr*sizeof(compat_ulong_t)))
1169                        return -EFAULT;
1170
1171                odd = nr & 1UL;
1172                nr &= ~1UL;
1173                while (nr) {
1174                        unsigned long h, l;
1175                        if (__get_user(l, ufdset) || __get_user(h, ufdset+1))
1176                                return -EFAULT;
1177                        ufdset += 2;
1178                        *fdset++ = h << 32 | l;
1179                        nr -= 2;
1180                }
1181                if (odd && __get_user(*fdset, ufdset))
1182                        return -EFAULT;
1183        } else {
1184                /* Tricky, must clear full unsigned long in the
1185                 * kernel fdset at the end, this makes sure that
1186                 * actually happens.
1187                 */
1188                memset(fdset, 0, ((nr + 1) & ~1)*sizeof(compat_ulong_t));
1189        }
1190        return 0;
1191}
1192
1193static
1194int compat_set_fd_set(unsigned long nr, compat_ulong_t __user *ufdset,
1195                      unsigned long *fdset)
1196{
1197        unsigned long odd;
1198        nr = DIV_ROUND_UP(nr, __COMPAT_NFDBITS);
1199
1200        if (!ufdset)
1201                return 0;
1202
1203        odd = nr & 1UL;
1204        nr &= ~1UL;
1205        while (nr) {
1206                unsigned long h, l;
1207                l = *fdset++;
1208                h = l >> 32;
1209                if (__put_user(l, ufdset) || __put_user(h, ufdset+1))
1210                        return -EFAULT;
1211                ufdset += 2;
1212                nr -= 2;
1213        }
1214        if (odd && __put_user(*fdset, ufdset))
1215                return -EFAULT;
1216        return 0;
1217}
1218
1219
1220/*
1221 * This is a virtual copy of sys_select from fs/select.c and probably
1222 * should be compared to it from time to time
1223 */
1224
1225/*
1226 * We can actually return ERESTARTSYS instead of EINTR, but I'd
1227 * like to be certain this leads to no problems. So I return
1228 * EINTR just for safety.
1229 *
1230 * Update: ERESTARTSYS breaks at least the xview clock binary, so
1231 * I'm trying ERESTARTNOHAND which restart only when you want to.
1232 */
1233int compat_core_sys_select(int n, compat_ulong_t __user *inp,
1234        compat_ulong_t __user *outp, compat_ulong_t __user *exp,
1235        struct timespec *end_time)
1236{
1237        fd_set_bits fds;
1238        void *bits;
1239        int size, max_fds, ret = -EINVAL;
1240        struct fdtable *fdt;
1241        long stack_fds[SELECT_STACK_ALLOC/sizeof(long)];
1242
1243        if (n < 0)
1244                goto out_nofds;
1245
1246        /* max_fds can increase, so grab it once to avoid race */
1247        rcu_read_lock();
1248        fdt = files_fdtable(current->files);
1249        max_fds = fdt->max_fds;
1250        rcu_read_unlock();
1251        if (n > max_fds)
1252                n = max_fds;
1253
1254        /*
1255         * We need 6 bitmaps (in/out/ex for both incoming and outgoing),
1256         * since we used fdset we need to allocate memory in units of
1257         * long-words.
1258         */
1259        size = FDS_BYTES(n);
1260        bits = stack_fds;
1261        if (size > sizeof(stack_fds) / 6) {
1262                bits = kmalloc(6 * size, GFP_KERNEL);
1263                ret = -ENOMEM;
1264                if (!bits)
1265                        goto out_nofds;
1266        }
1267        fds.in      = (unsigned long *)  bits;
1268        fds.out     = (unsigned long *) (bits +   size);
1269        fds.ex      = (unsigned long *) (bits + 2*size);
1270        fds.res_in  = (unsigned long *) (bits + 3*size);
1271        fds.res_out = (unsigned long *) (bits + 4*size);
1272        fds.res_ex  = (unsigned long *) (bits + 5*size);
1273
1274        if ((ret = compat_get_fd_set(n, inp, fds.in)) ||
1275            (ret = compat_get_fd_set(n, outp, fds.out)) ||
1276            (ret = compat_get_fd_set(n, exp, fds.ex)))
1277                goto out;
1278        zero_fd_set(n, fds.res_in);
1279        zero_fd_set(n, fds.res_out);
1280        zero_fd_set(n, fds.res_ex);
1281
1282        ret = do_select(n, &fds, end_time);
1283
1284        if (ret < 0)
1285                goto out;
1286        if (!ret) {
1287                ret = -ERESTARTNOHAND;
1288                if (signal_pending(current))
1289                        goto out;
1290                ret = 0;
1291        }
1292
1293        if (compat_set_fd_set(n, inp, fds.res_in) ||
1294            compat_set_fd_set(n, outp, fds.res_out) ||
1295            compat_set_fd_set(n, exp, fds.res_ex))
1296                ret = -EFAULT;
1297out:
1298        if (bits != stack_fds)
1299                kfree(bits);
1300out_nofds:
1301        return ret;
1302}
1303
1304COMPAT_SYSCALL_DEFINE5(select, int, n, compat_ulong_t __user *, inp,
1305        compat_ulong_t __user *, outp, compat_ulong_t __user *, exp,
1306        struct compat_timeval __user *, tvp)
1307{
1308        struct timespec end_time, *to = NULL;
1309        struct compat_timeval tv;
1310        int ret;
1311
1312        if (tvp) {
1313                if (copy_from_user(&tv, tvp, sizeof(tv)))
1314                        return -EFAULT;
1315
1316                to = &end_time;
1317                if (poll_select_set_timeout(to,
1318                                tv.tv_sec + (tv.tv_usec / USEC_PER_SEC),
1319                                (tv.tv_usec % USEC_PER_SEC) * NSEC_PER_USEC))
1320                        return -EINVAL;
1321        }
1322
1323        ret = compat_core_sys_select(n, inp, outp, exp, to);
1324        ret = poll_select_copy_remaining(&end_time, tvp, 1, ret);
1325
1326        return ret;
1327}
1328
1329struct compat_sel_arg_struct {
1330        compat_ulong_t n;
1331        compat_uptr_t inp;
1332        compat_uptr_t outp;
1333        compat_uptr_t exp;
1334        compat_uptr_t tvp;
1335};
1336
1337COMPAT_SYSCALL_DEFINE1(old_select, struct compat_sel_arg_struct __user *, arg)
1338{
1339        struct compat_sel_arg_struct a;
1340
1341        if (copy_from_user(&a, arg, sizeof(a)))
1342                return -EFAULT;
1343        return compat_sys_select(a.n, compat_ptr(a.inp), compat_ptr(a.outp),
1344                                 compat_ptr(a.exp), compat_ptr(a.tvp));
1345}
1346
1347static long do_compat_pselect(int n, compat_ulong_t __user *inp,
1348        compat_ulong_t __user *outp, compat_ulong_t __user *exp,
1349        struct compat_timespec __user *tsp, compat_sigset_t __user *sigmask,
1350        compat_size_t sigsetsize)
1351{
1352        compat_sigset_t ss32;
1353        sigset_t ksigmask, sigsaved;
1354        struct compat_timespec ts;
1355        struct timespec end_time, *to = NULL;
1356        int ret;
1357
1358        if (tsp) {
1359                if (copy_from_user(&ts, tsp, sizeof(ts)))
1360                        return -EFAULT;
1361
1362                to = &end_time;
1363                if (poll_select_set_timeout(to, ts.tv_sec, ts.tv_nsec))
1364                        return -EINVAL;
1365        }
1366
1367        if (sigmask) {
1368                if (sigsetsize != sizeof(compat_sigset_t))
1369                        return -EINVAL;
1370                if (copy_from_user(&ss32, sigmask, sizeof(ss32)))
1371                        return -EFAULT;
1372                sigset_from_compat(&ksigmask, &ss32);
1373
1374                sigdelsetmask(&ksigmask, sigmask(SIGKILL)|sigmask(SIGSTOP));
1375                sigprocmask(SIG_SETMASK, &ksigmask, &sigsaved);
1376        }
1377
1378        ret = compat_core_sys_select(n, inp, outp, exp, to);
1379        ret = poll_select_copy_remaining(&end_time, tsp, 0, ret);
1380
1381        if (ret == -ERESTARTNOHAND) {
1382                /*
1383                 * Don't restore the signal mask yet. Let do_signal() deliver
1384                 * the signal on the way back to userspace, before the signal
1385                 * mask is restored.
1386                 */
1387                if (sigmask) {
1388                        memcpy(&current->saved_sigmask, &sigsaved,
1389                                        sizeof(sigsaved));
1390                        set_restore_sigmask();
1391                }
1392        } else if (sigmask)
1393                sigprocmask(SIG_SETMASK, &sigsaved, NULL);
1394
1395        return ret;
1396}
1397
1398COMPAT_SYSCALL_DEFINE6(pselect6, int, n, compat_ulong_t __user *, inp,
1399        compat_ulong_t __user *, outp, compat_ulong_t __user *, exp,
1400        struct compat_timespec __user *, tsp, void __user *, sig)
1401{
1402        compat_size_t sigsetsize = 0;
1403        compat_uptr_t up = 0;
1404
1405        if (sig) {
1406                if (!access_ok(VERIFY_READ, sig,
1407                                sizeof(compat_uptr_t)+sizeof(compat_size_t)) ||
1408                        __get_user(up, (compat_uptr_t __user *)sig) ||
1409                        __get_user(sigsetsize,
1410                                (compat_size_t __user *)(sig+sizeof(up))))
1411                        return -EFAULT;
1412        }
1413        return do_compat_pselect(n, inp, outp, exp, tsp, compat_ptr(up),
1414                                 sigsetsize);
1415}
1416
1417COMPAT_SYSCALL_DEFINE5(ppoll, struct pollfd __user *, ufds,
1418        unsigned int,  nfds, struct compat_timespec __user *, tsp,
1419        const compat_sigset_t __user *, sigmask, compat_size_t, sigsetsize)
1420{
1421        compat_sigset_t ss32;
1422        sigset_t ksigmask, sigsaved;
1423        struct compat_timespec ts;
1424        struct timespec end_time, *to = NULL;
1425        int ret;
1426
1427        if (tsp) {
1428                if (copy_from_user(&ts, tsp, sizeof(ts)))
1429                        return -EFAULT;
1430
1431                to = &end_time;
1432                if (poll_select_set_timeout(to, ts.tv_sec, ts.tv_nsec))
1433                        return -EINVAL;
1434        }
1435
1436        if (sigmask) {
1437                if (sigsetsize != sizeof(compat_sigset_t))
1438                        return -EINVAL;
1439                if (copy_from_user(&ss32, sigmask, sizeof(ss32)))
1440                        return -EFAULT;
1441                sigset_from_compat(&ksigmask, &ss32);
1442
1443                sigdelsetmask(&ksigmask, sigmask(SIGKILL)|sigmask(SIGSTOP));
1444                sigprocmask(SIG_SETMASK, &ksigmask, &sigsaved);
1445        }
1446
1447        ret = do_sys_poll(ufds, nfds, to);
1448
1449        /* We can restart this syscall, usually */
1450        if (ret == -EINTR) {
1451                /*
1452                 * Don't restore the signal mask yet. Let do_signal() deliver
1453                 * the signal on the way back to userspace, before the signal
1454                 * mask is restored.
1455                 */
1456                if (sigmask) {
1457                        memcpy(&current->saved_sigmask, &sigsaved,
1458                                sizeof(sigsaved));
1459                        set_restore_sigmask();
1460                }
1461                ret = -ERESTARTNOHAND;
1462        } else if (sigmask)
1463                sigprocmask(SIG_SETMASK, &sigsaved, NULL);
1464
1465        ret = poll_select_copy_remaining(&end_time, tsp, 0, ret);
1466
1467        return ret;
1468}
1469
1470#ifdef CONFIG_FHANDLE
1471/*
1472 * Exactly like fs/open.c:sys_open_by_handle_at(), except that it
1473 * doesn't set the O_LARGEFILE flag.
1474 */
1475COMPAT_SYSCALL_DEFINE3(open_by_handle_at, int, mountdirfd,
1476                             struct file_handle __user *, handle, int, flags)
1477{
1478        return do_handle_open(mountdirfd, handle, flags);
1479}
1480#endif
1481