blob: e50a2114f4740859667ba20e230adb2ee6ce7f2b [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * linux/fs/compat.c
3 *
4 * Kernel compatibililty routines for e.g. 32 bit syscall support
5 * on 64 bit kernels.
6 *
7 * Copyright (C) 2002 Stephen Rothwell, IBM Corporation
8 * Copyright (C) 1997-2000 Jakub Jelinek (jakub@redhat.com)
9 * Copyright (C) 1998 Eddie C. Dost (ecd@skynet.be)
10 * Copyright (C) 2001,2002 Andi Kleen, SuSE Labs
Pavel Macheka2531292010-07-18 14:27:13 +020011 * Copyright (C) 2003 Pavel Machek (pavel@ucw.cz)
Linus Torvalds1da177e2005-04-16 15:20:36 -070012 *
13 * This program is free software; you can redistribute it and/or modify
14 * it under the terms of the GNU General Public License version 2 as
15 * published by the Free Software Foundation.
16 */
17
Kevin Winchester85c9fe82010-08-09 17:20:22 -070018#include <linux/stddef.h>
Milind Arun Choudhary022a1692007-05-08 00:29:02 -070019#include <linux/kernel.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070020#include <linux/linkage.h>
21#include <linux/compat.h>
22#include <linux/errno.h>
23#include <linux/time.h>
24#include <linux/fs.h>
25#include <linux/fcntl.h>
26#include <linux/namei.h>
27#include <linux/file.h>
Al Viro9f3acc32008-04-24 07:44:08 -040028#include <linux/fdtable.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070029#include <linux/vfs.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070030#include <linux/ioctl.h>
31#include <linux/init.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070032#include <linux/ncp_mount.h>
David Howells9a9947b2005-04-18 10:54:51 -070033#include <linux/nfs4_mount.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070034#include <linux/syscalls.h>
35#include <linux/ctype.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070036#include <linux/dirent.h>
Robert Love0eeca282005-07-12 17:06:03 -040037#include <linux/fsnotify.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070038#include <linux/highuid.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070039#include <linux/personality.h>
40#include <linux/rwsem.h>
Jay Lan8f0ab512006-09-30 23:28:59 -070041#include <linux/tsacct_kern.h>
Christoph Hellwig6272e262007-05-08 00:29:21 -070042#include <linux/security.h>
Al Viroa1f8e7f72006-10-19 16:08:53 -040043#include <linux/highmem.h>
Davide Libenzi6d18c922007-05-10 22:23:15 -070044#include <linux/signal.h>
Al Virobd01f842006-10-19 17:23:57 -040045#include <linux/poll.h>
David S. Miller4a805e82005-09-14 21:40:00 -070046#include <linux/mm.h>
Al Viro498052b2009-03-30 07:20:30 -040047#include <linux/fs_struct.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090048#include <linux/slab.h>
wu zhangjin504b7012010-10-30 08:19:35 -070049#include <linux/pagemap.h>
Kent Overstreeta27bb332013-05-07 16:19:08 -070050#include <linux/aio.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070051
Linus Torvalds7c0f6ba2016-12-24 11:46:01 -080052#include <linux/uaccess.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070053#include <asm/mmu_context.h>
54#include <asm/ioctls.h>
David Howells07f3f05c2006-09-30 20:52:18 +020055#include "internal.h"
David Woodhouse9f729492006-01-18 17:44:05 -080056
Linus Torvalds1da177e2005-04-16 15:20:36 -070057/*
58 * Not all architectures have sys_utime, so implement this in terms
59 * of sys_utimes.
60 */
Heiko Carstens625b1d72014-03-04 10:53:50 +010061COMPAT_SYSCALL_DEFINE2(utime, const char __user *, filename,
62 struct compat_utimbuf __user *, t)
Linus Torvalds1da177e2005-04-16 15:20:36 -070063{
Ulrich Drepper1c710c82007-05-08 00:33:25 -070064 struct timespec tv[2];
Linus Torvalds1da177e2005-04-16 15:20:36 -070065
66 if (t) {
67 if (get_user(tv[0].tv_sec, &t->actime) ||
68 get_user(tv[1].tv_sec, &t->modtime))
69 return -EFAULT;
Ulrich Drepper1c710c82007-05-08 00:33:25 -070070 tv[0].tv_nsec = 0;
71 tv[1].tv_nsec = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -070072 }
Ulrich Drepper1c710c82007-05-08 00:33:25 -070073 return do_utimes(AT_FDCWD, filename, t ? tv : NULL, 0);
74}
75
Heiko Carstens625b1d72014-03-04 10:53:50 +010076COMPAT_SYSCALL_DEFINE4(utimensat, unsigned int, dfd, const char __user *, filename, struct compat_timespec __user *, t, int, flags)
Ulrich Drepper1c710c82007-05-08 00:33:25 -070077{
78 struct timespec tv[2];
79
80 if (t) {
H. Peter Anvin81993e82014-02-01 18:54:11 -080081 if (compat_get_timespec(&tv[0], &t[0]) ||
82 compat_get_timespec(&tv[1], &t[1]))
Ulrich Drepper1c710c82007-05-08 00:33:25 -070083 return -EFAULT;
84
Ulrich Drepper1c710c82007-05-08 00:33:25 -070085 if (tv[0].tv_nsec == UTIME_OMIT && tv[1].tv_nsec == UTIME_OMIT)
86 return 0;
87 }
88 return do_utimes(dfd, filename, t ? tv : NULL, flags);
Linus Torvalds1da177e2005-04-16 15:20:36 -070089}
90
Heiko Carstens625b1d72014-03-04 10:53:50 +010091COMPAT_SYSCALL_DEFINE3(futimesat, unsigned int, dfd, const char __user *, filename, struct compat_timeval __user *, t)
Linus Torvalds1da177e2005-04-16 15:20:36 -070092{
Ulrich Drepper1c710c82007-05-08 00:33:25 -070093 struct timespec tv[2];
Linus Torvalds1da177e2005-04-16 15:20:36 -070094
Stephen Rothwell9ad11ab2006-02-02 16:11:51 +110095 if (t) {
Linus Torvalds1da177e2005-04-16 15:20:36 -070096 if (get_user(tv[0].tv_sec, &t[0].tv_sec) ||
Ulrich Drepper1c710c82007-05-08 00:33:25 -070097 get_user(tv[0].tv_nsec, &t[0].tv_usec) ||
Linus Torvalds1da177e2005-04-16 15:20:36 -070098 get_user(tv[1].tv_sec, &t[1].tv_sec) ||
Ulrich Drepper1c710c82007-05-08 00:33:25 -070099 get_user(tv[1].tv_nsec, &t[1].tv_usec))
Stephen Rothwell9ad11ab2006-02-02 16:11:51 +1100100 return -EFAULT;
Ulrich Drepper1c710c82007-05-08 00:33:25 -0700101 if (tv[0].tv_nsec >= 1000000 || tv[0].tv_nsec < 0 ||
102 tv[1].tv_nsec >= 1000000 || tv[1].tv_nsec < 0)
103 return -EINVAL;
104 tv[0].tv_nsec *= 1000;
105 tv[1].tv_nsec *= 1000;
Stephen Rothwell9ad11ab2006-02-02 16:11:51 +1100106 }
Ulrich Drepper1c710c82007-05-08 00:33:25 -0700107 return do_utimes(dfd, filename, t ? tv : NULL, 0);
Ulrich Drepper5590ff02006-01-18 17:43:53 -0800108}
109
Heiko Carstens625b1d72014-03-04 10:53:50 +0100110COMPAT_SYSCALL_DEFINE2(utimes, const char __user *, filename, struct compat_timeval __user *, t)
Ulrich Drepper5590ff02006-01-18 17:43:53 -0800111{
112 return compat_sys_futimesat(AT_FDCWD, filename, t);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700113}
114
Christoph Hellwigf7a50002008-10-15 22:02:05 -0700115static int cp_compat_stat(struct kstat *stat, struct compat_stat __user *ubuf)
116{
Al Virofcf83062012-02-12 20:56:29 -0500117 struct compat_stat tmp;
Christoph Hellwigf7a50002008-10-15 22:02:05 -0700118
Al Virofcf83062012-02-12 20:56:29 -0500119 if (!old_valid_dev(stat->dev) || !old_valid_dev(stat->rdev))
Christoph Hellwigf7a50002008-10-15 22:02:05 -0700120 return -EOVERFLOW;
121
Al Virofcf83062012-02-12 20:56:29 -0500122 memset(&tmp, 0, sizeof(tmp));
123 tmp.st_dev = old_encode_dev(stat->dev);
124 tmp.st_ino = stat->ino;
125 if (sizeof(tmp.st_ino) < sizeof(stat->ino) && tmp.st_ino != stat->ino)
126 return -EOVERFLOW;
127 tmp.st_mode = stat->mode;
128 tmp.st_nlink = stat->nlink;
129 if (tmp.st_nlink != stat->nlink)
130 return -EOVERFLOW;
Eric W. Biedermana7c19382012-02-09 09:10:30 -0800131 SET_UID(tmp.st_uid, from_kuid_munged(current_user_ns(), stat->uid));
132 SET_GID(tmp.st_gid, from_kgid_munged(current_user_ns(), stat->gid));
Al Virofcf83062012-02-12 20:56:29 -0500133 tmp.st_rdev = old_encode_dev(stat->rdev);
134 if ((u64) stat->size > MAX_NON_LFS)
135 return -EOVERFLOW;
136 tmp.st_size = stat->size;
137 tmp.st_atime = stat->atime.tv_sec;
138 tmp.st_atime_nsec = stat->atime.tv_nsec;
139 tmp.st_mtime = stat->mtime.tv_sec;
140 tmp.st_mtime_nsec = stat->mtime.tv_nsec;
141 tmp.st_ctime = stat->ctime.tv_sec;
142 tmp.st_ctime_nsec = stat->ctime.tv_nsec;
143 tmp.st_blocks = stat->blocks;
144 tmp.st_blksize = stat->blksize;
145 return copy_to_user(ubuf, &tmp, sizeof(tmp)) ? -EFAULT : 0;
Christoph Hellwigf7a50002008-10-15 22:02:05 -0700146}
147
Heiko Carstens625b1d72014-03-04 10:53:50 +0100148COMPAT_SYSCALL_DEFINE2(newstat, const char __user *, filename,
149 struct compat_stat __user *, statbuf)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700150{
151 struct kstat stat;
Christoph Hellwig2eae7a12009-04-08 16:34:03 -0400152 int error;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700153
Christoph Hellwig2eae7a12009-04-08 16:34:03 -0400154 error = vfs_stat(filename, &stat);
155 if (error)
156 return error;
157 return cp_compat_stat(&stat, statbuf);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700158}
159
Heiko Carstens625b1d72014-03-04 10:53:50 +0100160COMPAT_SYSCALL_DEFINE2(newlstat, const char __user *, filename,
161 struct compat_stat __user *, statbuf)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700162{
163 struct kstat stat;
Christoph Hellwig2eae7a12009-04-08 16:34:03 -0400164 int error;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700165
Christoph Hellwig2eae7a12009-04-08 16:34:03 -0400166 error = vfs_lstat(filename, &stat);
167 if (error)
168 return error;
169 return cp_compat_stat(&stat, statbuf);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700170}
171
Kyle McMartin82d821d2006-03-24 03:18:20 -0800172#ifndef __ARCH_WANT_STAT64
Heiko Carstens625b1d72014-03-04 10:53:50 +0100173COMPAT_SYSCALL_DEFINE4(newfstatat, unsigned int, dfd,
174 const char __user *, filename,
175 struct compat_stat __user *, statbuf, int, flag)
Ulrich Drepper5590ff02006-01-18 17:43:53 -0800176{
177 struct kstat stat;
Oleg Drokin0112fc22009-04-08 20:05:42 +0400178 int error;
Ulrich Drepper5590ff02006-01-18 17:43:53 -0800179
Oleg Drokin0112fc22009-04-08 20:05:42 +0400180 error = vfs_fstatat(dfd, filename, &stat, flag);
181 if (error)
182 return error;
183 return cp_compat_stat(&stat, statbuf);
Ulrich Drepper5590ff02006-01-18 17:43:53 -0800184}
Kyle McMartin82d821d2006-03-24 03:18:20 -0800185#endif
Ulrich Drepper5590ff02006-01-18 17:43:53 -0800186
Heiko Carstens625b1d72014-03-04 10:53:50 +0100187COMPAT_SYSCALL_DEFINE2(newfstat, unsigned int, fd,
188 struct compat_stat __user *, statbuf)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700189{
190 struct kstat stat;
191 int error = vfs_fstat(fd, &stat);
192
193 if (!error)
194 error = cp_compat_stat(&stat, statbuf);
195 return error;
196}
197
198static int put_compat_statfs(struct compat_statfs __user *ubuf, struct kstatfs *kbuf)
199{
200
201 if (sizeof ubuf->f_blocks == 4) {
Jon Tollefsonf4a67cc2008-07-23 21:27:55 -0700202 if ((kbuf->f_blocks | kbuf->f_bfree | kbuf->f_bavail |
203 kbuf->f_bsize | kbuf->f_frsize) & 0xffffffff00000000ULL)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700204 return -EOVERFLOW;
205 /* f_files and f_ffree may be -1; it's okay
206 * to stuff that into 32 bits */
207 if (kbuf->f_files != 0xffffffffffffffffULL
208 && (kbuf->f_files & 0xffffffff00000000ULL))
209 return -EOVERFLOW;
210 if (kbuf->f_ffree != 0xffffffffffffffffULL
211 && (kbuf->f_ffree & 0xffffffff00000000ULL))
212 return -EOVERFLOW;
213 }
214 if (!access_ok(VERIFY_WRITE, ubuf, sizeof(*ubuf)) ||
215 __put_user(kbuf->f_type, &ubuf->f_type) ||
216 __put_user(kbuf->f_bsize, &ubuf->f_bsize) ||
217 __put_user(kbuf->f_blocks, &ubuf->f_blocks) ||
218 __put_user(kbuf->f_bfree, &ubuf->f_bfree) ||
219 __put_user(kbuf->f_bavail, &ubuf->f_bavail) ||
220 __put_user(kbuf->f_files, &ubuf->f_files) ||
221 __put_user(kbuf->f_ffree, &ubuf->f_ffree) ||
222 __put_user(kbuf->f_namelen, &ubuf->f_namelen) ||
223 __put_user(kbuf->f_fsid.val[0], &ubuf->f_fsid.val[0]) ||
224 __put_user(kbuf->f_fsid.val[1], &ubuf->f_fsid.val[1]) ||
225 __put_user(kbuf->f_frsize, &ubuf->f_frsize) ||
Eric W. Biederman1448c722011-10-17 13:40:02 -0700226 __put_user(kbuf->f_flags, &ubuf->f_flags) ||
227 __clear_user(ubuf->f_spare, sizeof(ubuf->f_spare)))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700228 return -EFAULT;
229 return 0;
230}
231
232/*
Namhyung Kim974d8792010-12-27 01:41:53 +0900233 * The following statfs calls are copies of code from fs/statfs.c and
Linus Torvalds1da177e2005-04-16 15:20:36 -0700234 * should be checked against those from time to time
235 */
Heiko Carstens625b1d72014-03-04 10:53:50 +0100236COMPAT_SYSCALL_DEFINE2(statfs, const char __user *, pathname, struct compat_statfs __user *, buf)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700237{
Al Viroc8b91ac2011-03-12 10:41:39 -0500238 struct kstatfs tmp;
239 int error = user_statfs(pathname, &tmp);
240 if (!error)
241 error = put_compat_statfs(buf, &tmp);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700242 return error;
243}
244
Heiko Carstens625b1d72014-03-04 10:53:50 +0100245COMPAT_SYSCALL_DEFINE2(fstatfs, unsigned int, fd, struct compat_statfs __user *, buf)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700246{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700247 struct kstatfs tmp;
Al Viroc8b91ac2011-03-12 10:41:39 -0500248 int error = fd_statfs(fd, &tmp);
David Gibson86e07ce2005-11-21 21:32:23 -0800249 if (!error)
250 error = put_compat_statfs(buf, &tmp);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700251 return error;
252}
253
254static int put_compat_statfs64(struct compat_statfs64 __user *ubuf, struct kstatfs *kbuf)
255{
Li Wang64d2ab32016-11-15 17:19:01 +0800256 if (sizeof(ubuf->f_bsize) == 4) {
257 if ((kbuf->f_type | kbuf->f_bsize | kbuf->f_namelen |
258 kbuf->f_frsize | kbuf->f_flags) & 0xffffffff00000000ULL)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700259 return -EOVERFLOW;
260 /* f_files and f_ffree may be -1; it's okay
261 * to stuff that into 32 bits */
262 if (kbuf->f_files != 0xffffffffffffffffULL
263 && (kbuf->f_files & 0xffffffff00000000ULL))
264 return -EOVERFLOW;
265 if (kbuf->f_ffree != 0xffffffffffffffffULL
266 && (kbuf->f_ffree & 0xffffffff00000000ULL))
267 return -EOVERFLOW;
268 }
269 if (!access_ok(VERIFY_WRITE, ubuf, sizeof(*ubuf)) ||
270 __put_user(kbuf->f_type, &ubuf->f_type) ||
271 __put_user(kbuf->f_bsize, &ubuf->f_bsize) ||
272 __put_user(kbuf->f_blocks, &ubuf->f_blocks) ||
273 __put_user(kbuf->f_bfree, &ubuf->f_bfree) ||
274 __put_user(kbuf->f_bavail, &ubuf->f_bavail) ||
275 __put_user(kbuf->f_files, &ubuf->f_files) ||
276 __put_user(kbuf->f_ffree, &ubuf->f_ffree) ||
277 __put_user(kbuf->f_namelen, &ubuf->f_namelen) ||
278 __put_user(kbuf->f_fsid.val[0], &ubuf->f_fsid.val[0]) ||
279 __put_user(kbuf->f_fsid.val[1], &ubuf->f_fsid.val[1]) ||
Namhyung Kime0bb6bd2010-12-27 01:41:54 +0900280 __put_user(kbuf->f_frsize, &ubuf->f_frsize) ||
281 __put_user(kbuf->f_flags, &ubuf->f_flags) ||
282 __clear_user(ubuf->f_spare, sizeof(ubuf->f_spare)))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700283 return -EFAULT;
284 return 0;
285}
286
Heiko Carstens625b1d72014-03-04 10:53:50 +0100287COMPAT_SYSCALL_DEFINE3(statfs64, const char __user *, pathname, compat_size_t, sz, struct compat_statfs64 __user *, buf)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700288{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700289 struct kstatfs tmp;
290 int error;
291
292 if (sz != sizeof(*buf))
293 return -EINVAL;
294
Al Viroc8b91ac2011-03-12 10:41:39 -0500295 error = user_statfs(pathname, &tmp);
David Gibson86e07ce2005-11-21 21:32:23 -0800296 if (!error)
297 error = put_compat_statfs64(buf, &tmp);
Al Viroc8b91ac2011-03-12 10:41:39 -0500298 return error;
299}
300
Heiko Carstens625b1d72014-03-04 10:53:50 +0100301COMPAT_SYSCALL_DEFINE3(fstatfs64, unsigned int, fd, compat_size_t, sz, struct compat_statfs64 __user *, buf)
Al Viroc8b91ac2011-03-12 10:41:39 -0500302{
303 struct kstatfs tmp;
304 int error;
305
306 if (sz != sizeof(*buf))
307 return -EINVAL;
308
309 error = fd_statfs(fd, &tmp);
310 if (!error)
311 error = put_compat_statfs64(buf, &tmp);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700312 return error;
313}
314
Christoph Hellwig2b1c6bd2008-11-28 10:09:09 +0100315/*
316 * This is a copy of sys_ustat, just dealing with a structure layout.
317 * Given how simple this syscall is that apporach is more maintainable
318 * than the various conversion hacks.
319 */
Heiko Carstens625b1d72014-03-04 10:53:50 +0100320COMPAT_SYSCALL_DEFINE2(ustat, unsigned, dev, struct compat_ustat __user *, u)
Christoph Hellwig2b1c6bd2008-11-28 10:09:09 +0100321{
Christoph Hellwig2b1c6bd2008-11-28 10:09:09 +0100322 struct compat_ustat tmp;
323 struct kstatfs sbuf;
Al Virocf31e702012-01-02 22:28:36 -0500324 int err = vfs_ustat(new_decode_dev(dev), &sbuf);
Christoph Hellwig2b1c6bd2008-11-28 10:09:09 +0100325 if (err)
326 return err;
327
328 memset(&tmp, 0, sizeof(struct compat_ustat));
329 tmp.f_tfree = sbuf.f_bfree;
330 tmp.f_tinode = sbuf.f_ffree;
331 if (copy_to_user(u, &tmp, sizeof(struct compat_ustat)))
332 return -EFAULT;
333 return 0;
334}
335
Linus Torvalds1da177e2005-04-16 15:20:36 -0700336static int get_compat_flock(struct flock *kfl, struct compat_flock __user *ufl)
337{
338 if (!access_ok(VERIFY_READ, ufl, sizeof(*ufl)) ||
339 __get_user(kfl->l_type, &ufl->l_type) ||
340 __get_user(kfl->l_whence, &ufl->l_whence) ||
341 __get_user(kfl->l_start, &ufl->l_start) ||
342 __get_user(kfl->l_len, &ufl->l_len) ||
343 __get_user(kfl->l_pid, &ufl->l_pid))
344 return -EFAULT;
345 return 0;
346}
347
348static int put_compat_flock(struct flock *kfl, struct compat_flock __user *ufl)
349{
350 if (!access_ok(VERIFY_WRITE, ufl, sizeof(*ufl)) ||
351 __put_user(kfl->l_type, &ufl->l_type) ||
352 __put_user(kfl->l_whence, &ufl->l_whence) ||
353 __put_user(kfl->l_start, &ufl->l_start) ||
354 __put_user(kfl->l_len, &ufl->l_len) ||
355 __put_user(kfl->l_pid, &ufl->l_pid))
356 return -EFAULT;
357 return 0;
358}
359
360#ifndef HAVE_ARCH_GET_COMPAT_FLOCK64
361static int get_compat_flock64(struct flock *kfl, struct compat_flock64 __user *ufl)
362{
363 if (!access_ok(VERIFY_READ, ufl, sizeof(*ufl)) ||
364 __get_user(kfl->l_type, &ufl->l_type) ||
365 __get_user(kfl->l_whence, &ufl->l_whence) ||
366 __get_user(kfl->l_start, &ufl->l_start) ||
367 __get_user(kfl->l_len, &ufl->l_len) ||
368 __get_user(kfl->l_pid, &ufl->l_pid))
369 return -EFAULT;
370 return 0;
371}
372#endif
373
374#ifndef HAVE_ARCH_PUT_COMPAT_FLOCK64
375static int put_compat_flock64(struct flock *kfl, struct compat_flock64 __user *ufl)
376{
377 if (!access_ok(VERIFY_WRITE, ufl, sizeof(*ufl)) ||
378 __put_user(kfl->l_type, &ufl->l_type) ||
379 __put_user(kfl->l_whence, &ufl->l_whence) ||
380 __put_user(kfl->l_start, &ufl->l_start) ||
381 __put_user(kfl->l_len, &ufl->l_len) ||
382 __put_user(kfl->l_pid, &ufl->l_pid))
383 return -EFAULT;
384 return 0;
385}
386#endif
387
Jeff Layton5d50ffd2014-02-03 12:13:10 -0500388static unsigned int
389convert_fcntl_cmd(unsigned int cmd)
390{
391 switch (cmd) {
392 case F_GETLK64:
393 return F_GETLK;
394 case F_SETLK64:
395 return F_SETLK;
396 case F_SETLKW64:
397 return F_SETLKW;
398 }
399
400 return cmd;
401}
402
Heiko Carstens932602e2014-03-04 16:07:52 +0100403COMPAT_SYSCALL_DEFINE3(fcntl64, unsigned int, fd, unsigned int, cmd,
404 compat_ulong_t, arg)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700405{
406 mm_segment_t old_fs;
407 struct flock f;
408 long ret;
Jeff Layton5d50ffd2014-02-03 12:13:10 -0500409 unsigned int conv_cmd;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700410
411 switch (cmd) {
412 case F_GETLK:
413 case F_SETLK:
414 case F_SETLKW:
415 ret = get_compat_flock(&f, compat_ptr(arg));
416 if (ret != 0)
417 break;
418 old_fs = get_fs();
419 set_fs(KERNEL_DS);
420 ret = sys_fcntl(fd, cmd, (unsigned long)&f);
421 set_fs(old_fs);
422 if (cmd == F_GETLK && ret == 0) {
Nikanth Karthikesanff677f82009-04-01 14:40:51 +0530423 /* GETLK was successful and we need to return the data...
NeilBrown2520f142006-01-08 01:02:40 -0800424 * but it needs to fit in the compat structure.
425 * l_start shouldn't be too big, unless the original
426 * start + end is greater than COMPAT_OFF_T_MAX, in which
427 * case the app was asking for trouble, so we return
428 * -EOVERFLOW in that case.
429 * l_len could be too big, in which case we just truncate it,
430 * and only allow the app to see that part of the conflicting
431 * lock that might make sense to it anyway
432 */
433
434 if (f.l_start > COMPAT_OFF_T_MAX)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700435 ret = -EOVERFLOW;
NeilBrown2520f142006-01-08 01:02:40 -0800436 if (f.l_len > COMPAT_OFF_T_MAX)
437 f.l_len = COMPAT_OFF_T_MAX;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700438 if (ret == 0)
439 ret = put_compat_flock(&f, compat_ptr(arg));
440 }
441 break;
442
443 case F_GETLK64:
444 case F_SETLK64:
445 case F_SETLKW64:
Jeff Layton0d3f7a22014-04-22 08:23:58 -0400446 case F_OFD_GETLK:
447 case F_OFD_SETLK:
448 case F_OFD_SETLKW:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700449 ret = get_compat_flock64(&f, compat_ptr(arg));
450 if (ret != 0)
451 break;
452 old_fs = get_fs();
453 set_fs(KERNEL_DS);
Jeff Layton5d50ffd2014-02-03 12:13:10 -0500454 conv_cmd = convert_fcntl_cmd(cmd);
455 ret = sys_fcntl(fd, conv_cmd, (unsigned long)&f);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700456 set_fs(old_fs);
Jeff Layton0d3f7a22014-04-22 08:23:58 -0400457 if ((conv_cmd == F_GETLK || conv_cmd == F_OFD_GETLK) && ret == 0) {
NeilBrown2520f142006-01-08 01:02:40 -0800458 /* need to return lock information - see above for commentary */
459 if (f.l_start > COMPAT_LOFF_T_MAX)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700460 ret = -EOVERFLOW;
NeilBrown2520f142006-01-08 01:02:40 -0800461 if (f.l_len > COMPAT_LOFF_T_MAX)
462 f.l_len = COMPAT_LOFF_T_MAX;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700463 if (ret == 0)
464 ret = put_compat_flock64(&f, compat_ptr(arg));
465 }
466 break;
467
468 default:
469 ret = sys_fcntl(fd, cmd, arg);
470 break;
471 }
472 return ret;
473}
474
Heiko Carstens932602e2014-03-04 16:07:52 +0100475COMPAT_SYSCALL_DEFINE3(fcntl, unsigned int, fd, unsigned int, cmd,
476 compat_ulong_t, arg)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700477{
Jeff Layton5d50ffd2014-02-03 12:13:10 -0500478 switch (cmd) {
479 case F_GETLK64:
480 case F_SETLK64:
481 case F_SETLKW64:
Jeff Layton0d3f7a22014-04-22 08:23:58 -0400482 case F_OFD_GETLK:
483 case F_OFD_SETLK:
484 case F_OFD_SETLKW:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700485 return -EINVAL;
Jeff Layton5d50ffd2014-02-03 12:13:10 -0500486 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700487 return compat_sys_fcntl64(fd, cmd, arg);
488}
489
Jeff Moyerb8373362010-05-26 14:44:25 -0700490/* A write operation does a read from user space and vice versa */
491#define vrfy_dir(type) ((type) == READ ? VERIFY_WRITE : VERIFY_READ)
492
493ssize_t compat_rw_copy_check_uvector(int type,
494 const struct compat_iovec __user *uvector, unsigned long nr_segs,
495 unsigned long fast_segs, struct iovec *fast_pointer,
Christopher Yeohac34ebb2012-05-31 16:26:42 -0700496 struct iovec **ret_pointer)
Jeff Moyerb8373362010-05-26 14:44:25 -0700497{
498 compat_ssize_t tot_len;
499 struct iovec *iov = *ret_pointer = fast_pointer;
500 ssize_t ret = 0;
501 int seg;
502
503 /*
504 * SuS says "The readv() function *may* fail if the iovcnt argument
505 * was less than or equal to 0, or greater than {IOV_MAX}. Linux has
506 * traditionally returned zero for zero segments, so...
507 */
508 if (nr_segs == 0)
509 goto out;
510
511 ret = -EINVAL;
Shawn Lin85e73402016-08-22 15:45:59 +0800512 if (nr_segs > UIO_MAXIOV)
Jeff Moyerb8373362010-05-26 14:44:25 -0700513 goto out;
514 if (nr_segs > fast_segs) {
515 ret = -ENOMEM;
516 iov = kmalloc(nr_segs*sizeof(struct iovec), GFP_KERNEL);
Namhyung Kim6a5640f2010-12-27 01:41:52 +0900517 if (iov == NULL)
Jeff Moyerb8373362010-05-26 14:44:25 -0700518 goto out;
Jeff Moyerb8373362010-05-26 14:44:25 -0700519 }
520 *ret_pointer = iov;
521
Mathieu Desnoyers8aec0f52013-02-25 10:20:36 -0500522 ret = -EFAULT;
523 if (!access_ok(VERIFY_READ, uvector, nr_segs*sizeof(*uvector)))
524 goto out;
525
Jeff Moyerb8373362010-05-26 14:44:25 -0700526 /*
527 * Single unix specification:
528 * We should -EINVAL if an element length is not >= 0 and fitting an
Linus Torvalds435f49a2010-10-29 10:36:49 -0700529 * ssize_t.
Jeff Moyerb8373362010-05-26 14:44:25 -0700530 *
Linus Torvalds435f49a2010-10-29 10:36:49 -0700531 * In Linux, the total length is limited to MAX_RW_COUNT, there is
532 * no overflow possibility.
Jeff Moyerb8373362010-05-26 14:44:25 -0700533 */
534 tot_len = 0;
535 ret = -EINVAL;
536 for (seg = 0; seg < nr_segs; seg++) {
Jeff Moyerb8373362010-05-26 14:44:25 -0700537 compat_uptr_t buf;
538 compat_ssize_t len;
539
540 if (__get_user(len, &uvector->iov_len) ||
541 __get_user(buf, &uvector->iov_base)) {
542 ret = -EFAULT;
543 goto out;
544 }
545 if (len < 0) /* size_t not fitting in compat_ssize_t .. */
546 goto out;
Christopher Yeohac34ebb2012-05-31 16:26:42 -0700547 if (type >= 0 &&
Christopher Yeohfcf63402011-10-31 17:06:39 -0700548 !access_ok(vrfy_dir(type), compat_ptr(buf), len)) {
Jeff Moyerb8373362010-05-26 14:44:25 -0700549 ret = -EFAULT;
550 goto out;
551 }
Linus Torvalds435f49a2010-10-29 10:36:49 -0700552 if (len > MAX_RW_COUNT - tot_len)
553 len = MAX_RW_COUNT - tot_len;
554 tot_len += len;
Jeff Moyerb8373362010-05-26 14:44:25 -0700555 iov->iov_base = compat_ptr(buf);
556 iov->iov_len = (compat_size_t) len;
557 uvector++;
558 iov++;
559 }
560 ret = tot_len;
561
562out:
563 return ret;
564}
565
Linus Torvalds1da177e2005-04-16 15:20:36 -0700566struct compat_ncp_mount_data {
567 compat_int_t version;
568 compat_uint_t ncp_fd;
Stephen Rothwell202e5972005-09-06 15:16:40 -0700569 __compat_uid_t mounted_uid;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700570 compat_pid_t wdog_pid;
571 unsigned char mounted_vol[NCP_VOLNAME_LEN + 1];
572 compat_uint_t time_out;
573 compat_uint_t retry_count;
574 compat_uint_t flags;
Stephen Rothwell202e5972005-09-06 15:16:40 -0700575 __compat_uid_t uid;
576 __compat_gid_t gid;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700577 compat_mode_t file_mode;
578 compat_mode_t dir_mode;
579};
580
581struct compat_ncp_mount_data_v4 {
582 compat_int_t version;
583 compat_ulong_t flags;
584 compat_ulong_t mounted_uid;
585 compat_long_t wdog_pid;
586 compat_uint_t ncp_fd;
587 compat_uint_t time_out;
588 compat_uint_t retry_count;
589 compat_ulong_t uid;
590 compat_ulong_t gid;
591 compat_ulong_t file_mode;
592 compat_ulong_t dir_mode;
593};
594
595static void *do_ncp_super_data_conv(void *raw_data)
596{
597 int version = *(unsigned int *)raw_data;
598
599 if (version == 3) {
600 struct compat_ncp_mount_data *c_n = raw_data;
601 struct ncp_mount_data *n = raw_data;
602
603 n->dir_mode = c_n->dir_mode;
604 n->file_mode = c_n->file_mode;
605 n->gid = c_n->gid;
606 n->uid = c_n->uid;
607 memmove (n->mounted_vol, c_n->mounted_vol, (sizeof (c_n->mounted_vol) + 3 * sizeof (unsigned int)));
608 n->wdog_pid = c_n->wdog_pid;
609 n->mounted_uid = c_n->mounted_uid;
610 } else if (version == 4) {
611 struct compat_ncp_mount_data_v4 *c_n = raw_data;
612 struct ncp_mount_data_v4 *n = raw_data;
613
614 n->dir_mode = c_n->dir_mode;
615 n->file_mode = c_n->file_mode;
616 n->gid = c_n->gid;
617 n->uid = c_n->uid;
618 n->retry_count = c_n->retry_count;
619 n->time_out = c_n->time_out;
620 n->ncp_fd = c_n->ncp_fd;
621 n->wdog_pid = c_n->wdog_pid;
622 n->mounted_uid = c_n->mounted_uid;
623 n->flags = c_n->flags;
624 } else if (version != 5) {
625 return NULL;
626 }
627
628 return raw_data;
629}
630
Linus Torvalds1da177e2005-04-16 15:20:36 -0700631
David Howells9a9947b2005-04-18 10:54:51 -0700632struct compat_nfs_string {
633 compat_uint_t len;
David Howells5fc3e622005-04-27 15:39:03 -0700634 compat_uptr_t data;
David Howells9a9947b2005-04-18 10:54:51 -0700635};
636
637static inline void compat_nfs_string(struct nfs_string *dst,
638 struct compat_nfs_string *src)
639{
640 dst->data = compat_ptr(src->data);
641 dst->len = src->len;
642}
643
644struct compat_nfs4_mount_data_v1 {
645 compat_int_t version;
646 compat_int_t flags;
647 compat_int_t rsize;
648 compat_int_t wsize;
649 compat_int_t timeo;
650 compat_int_t retrans;
651 compat_int_t acregmin;
652 compat_int_t acregmax;
653 compat_int_t acdirmin;
654 compat_int_t acdirmax;
655 struct compat_nfs_string client_addr;
656 struct compat_nfs_string mnt_path;
657 struct compat_nfs_string hostname;
658 compat_uint_t host_addrlen;
David Howells5fc3e622005-04-27 15:39:03 -0700659 compat_uptr_t host_addr;
David Howells9a9947b2005-04-18 10:54:51 -0700660 compat_int_t proto;
661 compat_int_t auth_flavourlen;
David Howells5fc3e622005-04-27 15:39:03 -0700662 compat_uptr_t auth_flavours;
David Howells9a9947b2005-04-18 10:54:51 -0700663};
664
665static int do_nfs4_super_data_conv(void *raw_data)
666{
667 int version = *(compat_uint_t *) raw_data;
668
669 if (version == 1) {
670 struct compat_nfs4_mount_data_v1 *raw = raw_data;
671 struct nfs4_mount_data *real = raw_data;
672
673 /* copy the fields backwards */
674 real->auth_flavours = compat_ptr(raw->auth_flavours);
675 real->auth_flavourlen = raw->auth_flavourlen;
676 real->proto = raw->proto;
677 real->host_addr = compat_ptr(raw->host_addr);
678 real->host_addrlen = raw->host_addrlen;
679 compat_nfs_string(&real->hostname, &raw->hostname);
680 compat_nfs_string(&real->mnt_path, &raw->mnt_path);
681 compat_nfs_string(&real->client_addr, &raw->client_addr);
682 real->acdirmax = raw->acdirmax;
683 real->acdirmin = raw->acdirmin;
684 real->acregmax = raw->acregmax;
685 real->acregmin = raw->acregmin;
686 real->retrans = raw->retrans;
687 real->timeo = raw->timeo;
688 real->wsize = raw->wsize;
689 real->rsize = raw->rsize;
690 real->flags = raw->flags;
691 real->version = raw->version;
692 }
David Howells9a9947b2005-04-18 10:54:51 -0700693
694 return 0;
695}
696
Linus Torvalds1da177e2005-04-16 15:20:36 -0700697#define NCPFS_NAME "ncpfs"
David Howells9a9947b2005-04-18 10:54:51 -0700698#define NFS4_NAME "nfs4"
Linus Torvalds1da177e2005-04-16 15:20:36 -0700699
Heiko Carstens932602e2014-03-04 16:07:52 +0100700COMPAT_SYSCALL_DEFINE5(mount, const char __user *, dev_name,
701 const char __user *, dir_name,
702 const char __user *, type, compat_ulong_t, flags,
703 const void __user *, data)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700704{
Vegard Nossumeca6f532009-09-18 13:05:45 -0700705 char *kernel_type;
Al Virob40ef862015-12-14 18:44:44 -0500706 void *options;
Vegard Nossumeca6f532009-09-18 13:05:45 -0700707 char *kernel_dev;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700708 int retval;
709
Tim Gardnerb8850d12014-08-28 11:26:03 -0600710 kernel_type = copy_mount_string(type);
711 retval = PTR_ERR(kernel_type);
712 if (IS_ERR(kernel_type))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700713 goto out;
714
Tim Gardnerb8850d12014-08-28 11:26:03 -0600715 kernel_dev = copy_mount_string(dev_name);
716 retval = PTR_ERR(kernel_dev);
717 if (IS_ERR(kernel_dev))
Seunghun Lee5e6123f2014-09-14 22:15:10 +0900718 goto out1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700719
Al Virob40ef862015-12-14 18:44:44 -0500720 options = copy_mount_options(data);
721 retval = PTR_ERR(options);
722 if (IS_ERR(options))
Seunghun Lee5e6123f2014-09-14 22:15:10 +0900723 goto out2;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700724
Al Virob40ef862015-12-14 18:44:44 -0500725 if (kernel_type && options) {
Arnd Bergmann2116b7a2010-10-04 22:55:57 +0200726 if (!strcmp(kernel_type, NCPFS_NAME)) {
Al Virob40ef862015-12-14 18:44:44 -0500727 do_ncp_super_data_conv(options);
Vegard Nossumeca6f532009-09-18 13:05:45 -0700728 } else if (!strcmp(kernel_type, NFS4_NAME)) {
Al Virob40ef862015-12-14 18:44:44 -0500729 retval = -EINVAL;
730 if (do_nfs4_super_data_conv(options))
Seunghun Lee5e6123f2014-09-14 22:15:10 +0900731 goto out3;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700732 }
733 }
734
Al Virob40ef862015-12-14 18:44:44 -0500735 retval = do_mount(kernel_dev, dir_name, kernel_type, flags, options);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700736
Linus Torvalds1da177e2005-04-16 15:20:36 -0700737 out3:
Al Virob40ef862015-12-14 18:44:44 -0500738 kfree(options);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700739 out2:
Seunghun Lee5e6123f2014-09-14 22:15:10 +0900740 kfree(kernel_dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700741 out1:
Vegard Nossumeca6f532009-09-18 13:05:45 -0700742 kfree(kernel_type);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700743 out:
744 return retval;
745}
746
Linus Torvalds1da177e2005-04-16 15:20:36 -0700747struct compat_old_linux_dirent {
748 compat_ulong_t d_ino;
749 compat_ulong_t d_offset;
750 unsigned short d_namlen;
751 char d_name[1];
752};
753
754struct compat_readdir_callback {
Al Viro5c0ba4e2013-05-15 13:52:59 -0400755 struct dir_context ctx;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700756 struct compat_old_linux_dirent __user *dirent;
757 int result;
758};
759
Miklos Szerediac7576f2014-10-30 17:37:34 +0100760static int compat_fillonedir(struct dir_context *ctx, const char *name,
761 int namlen, loff_t offset, u64 ino,
762 unsigned int d_type)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700763{
Miklos Szerediac7576f2014-10-30 17:37:34 +0100764 struct compat_readdir_callback *buf =
765 container_of(ctx, struct compat_readdir_callback, ctx);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700766 struct compat_old_linux_dirent __user *dirent;
David Howellsafefdbb2006-10-03 01:13:46 -0700767 compat_ulong_t d_ino;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700768
769 if (buf->result)
770 return -EINVAL;
David Howellsafefdbb2006-10-03 01:13:46 -0700771 d_ino = ino;
Al Viro8f3f6552008-08-12 00:28:24 -0400772 if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) {
773 buf->result = -EOVERFLOW;
David Howellsafefdbb2006-10-03 01:13:46 -0700774 return -EOVERFLOW;
Al Viro8f3f6552008-08-12 00:28:24 -0400775 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700776 buf->result++;
777 dirent = buf->dirent;
778 if (!access_ok(VERIFY_WRITE, dirent,
779 (unsigned long)(dirent->d_name + namlen + 1) -
780 (unsigned long)dirent))
781 goto efault;
David Howellsafefdbb2006-10-03 01:13:46 -0700782 if ( __put_user(d_ino, &dirent->d_ino) ||
Linus Torvalds1da177e2005-04-16 15:20:36 -0700783 __put_user(offset, &dirent->d_offset) ||
784 __put_user(namlen, &dirent->d_namlen) ||
785 __copy_to_user(dirent->d_name, name, namlen) ||
786 __put_user(0, dirent->d_name + namlen))
787 goto efault;
788 return 0;
789efault:
790 buf->result = -EFAULT;
791 return -EFAULT;
792}
793
Heiko Carstens625b1d72014-03-04 10:53:50 +0100794COMPAT_SYSCALL_DEFINE3(old_readdir, unsigned int, fd,
795 struct compat_old_linux_dirent __user *, dirent, unsigned int, count)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700796{
797 int error;
Al Viro63b6df12016-04-20 17:08:21 -0400798 struct fd f = fdget_pos(fd);
Al Viroac6614b2013-05-22 22:22:04 -0400799 struct compat_readdir_callback buf = {
800 .ctx.actor = compat_fillonedir,
801 .dirent = dirent
802 };
Linus Torvalds1da177e2005-04-16 15:20:36 -0700803
Al Viro2903ff02012-08-28 12:52:22 -0400804 if (!f.file)
Al Viro863ced72012-04-21 18:40:32 -0400805 return -EBADF;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700806
Al Viro5c0ba4e2013-05-15 13:52:59 -0400807 error = iterate_dir(f.file, &buf.ctx);
Al Viro53c9c5c2008-08-24 07:29:52 -0400808 if (buf.result)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700809 error = buf.result;
810
Al Viro63b6df12016-04-20 17:08:21 -0400811 fdput_pos(f);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700812 return error;
813}
814
815struct compat_linux_dirent {
816 compat_ulong_t d_ino;
817 compat_ulong_t d_off;
818 unsigned short d_reclen;
819 char d_name[1];
820};
821
822struct compat_getdents_callback {
Al Viro5c0ba4e2013-05-15 13:52:59 -0400823 struct dir_context ctx;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700824 struct compat_linux_dirent __user *current_dir;
825 struct compat_linux_dirent __user *previous;
826 int count;
827 int error;
828};
829
Miklos Szerediac7576f2014-10-30 17:37:34 +0100830static int compat_filldir(struct dir_context *ctx, const char *name, int namlen,
David Howellsafefdbb2006-10-03 01:13:46 -0700831 loff_t offset, u64 ino, unsigned int d_type)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700832{
833 struct compat_linux_dirent __user * dirent;
Miklos Szerediac7576f2014-10-30 17:37:34 +0100834 struct compat_getdents_callback *buf =
835 container_of(ctx, struct compat_getdents_callback, ctx);
David Howellsafefdbb2006-10-03 01:13:46 -0700836 compat_ulong_t d_ino;
Kevin Winchester85c9fe82010-08-09 17:20:22 -0700837 int reclen = ALIGN(offsetof(struct compat_linux_dirent, d_name) +
838 namlen + 2, sizeof(compat_long_t));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700839
840 buf->error = -EINVAL; /* only used if we fail.. */
841 if (reclen > buf->count)
842 return -EINVAL;
David Howellsafefdbb2006-10-03 01:13:46 -0700843 d_ino = ino;
Al Viro8f3f6552008-08-12 00:28:24 -0400844 if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) {
845 buf->error = -EOVERFLOW;
David Howellsafefdbb2006-10-03 01:13:46 -0700846 return -EOVERFLOW;
Al Viro8f3f6552008-08-12 00:28:24 -0400847 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700848 dirent = buf->previous;
849 if (dirent) {
Theodore Ts'o1f60fbe2016-04-23 22:50:07 -0400850 if (signal_pending(current))
851 return -EINTR;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700852 if (__put_user(offset, &dirent->d_off))
853 goto efault;
854 }
855 dirent = buf->current_dir;
David Howellsafefdbb2006-10-03 01:13:46 -0700856 if (__put_user(d_ino, &dirent->d_ino))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700857 goto efault;
858 if (__put_user(reclen, &dirent->d_reclen))
859 goto efault;
860 if (copy_to_user(dirent->d_name, name, namlen))
861 goto efault;
862 if (__put_user(0, dirent->d_name + namlen))
863 goto efault;
864 if (__put_user(d_type, (char __user *) dirent + reclen - 1))
865 goto efault;
866 buf->previous = dirent;
867 dirent = (void __user *)dirent + reclen;
868 buf->current_dir = dirent;
869 buf->count -= reclen;
870 return 0;
871efault:
872 buf->error = -EFAULT;
873 return -EFAULT;
874}
875
Heiko Carstens625b1d72014-03-04 10:53:50 +0100876COMPAT_SYSCALL_DEFINE3(getdents, unsigned int, fd,
877 struct compat_linux_dirent __user *, dirent, unsigned int, count)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700878{
Al Viro2903ff02012-08-28 12:52:22 -0400879 struct fd f;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700880 struct compat_linux_dirent __user * lastdirent;
Al Viroac6614b2013-05-22 22:22:04 -0400881 struct compat_getdents_callback buf = {
882 .ctx.actor = compat_filldir,
883 .current_dir = dirent,
884 .count = count
885 };
Linus Torvalds1da177e2005-04-16 15:20:36 -0700886 int error;
887
Linus Torvalds1da177e2005-04-16 15:20:36 -0700888 if (!access_ok(VERIFY_WRITE, dirent, count))
Al Viro863ced72012-04-21 18:40:32 -0400889 return -EFAULT;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700890
Al Viro63b6df12016-04-20 17:08:21 -0400891 f = fdget_pos(fd);
Al Viro2903ff02012-08-28 12:52:22 -0400892 if (!f.file)
Al Viro863ced72012-04-21 18:40:32 -0400893 return -EBADF;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700894
Al Viro5c0ba4e2013-05-15 13:52:59 -0400895 error = iterate_dir(f.file, &buf.ctx);
Al Viro53c9c5c2008-08-24 07:29:52 -0400896 if (error >= 0)
897 error = buf.error;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700898 lastdirent = buf.previous;
899 if (lastdirent) {
Al Virobb6f6192013-05-15 18:49:12 -0400900 if (put_user(buf.ctx.pos, &lastdirent->d_off))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700901 error = -EFAULT;
902 else
903 error = count - buf.count;
904 }
Al Viro63b6df12016-04-20 17:08:21 -0400905 fdput_pos(f);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700906 return error;
907}
908
Heiko Carstens0473c9b2014-03-03 10:44:03 +0100909#ifdef __ARCH_WANT_COMPAT_SYS_GETDENTS64
Linus Torvalds1da177e2005-04-16 15:20:36 -0700910
911struct compat_getdents_callback64 {
Al Viro5c0ba4e2013-05-15 13:52:59 -0400912 struct dir_context ctx;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700913 struct linux_dirent64 __user *current_dir;
914 struct linux_dirent64 __user *previous;
915 int count;
916 int error;
917};
918
Miklos Szerediac7576f2014-10-30 17:37:34 +0100919static int compat_filldir64(struct dir_context *ctx, const char *name,
920 int namlen, loff_t offset, u64 ino,
921 unsigned int d_type)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700922{
923 struct linux_dirent64 __user *dirent;
Miklos Szerediac7576f2014-10-30 17:37:34 +0100924 struct compat_getdents_callback64 *buf =
925 container_of(ctx, struct compat_getdents_callback64, ctx);
Kevin Winchester85c9fe82010-08-09 17:20:22 -0700926 int reclen = ALIGN(offsetof(struct linux_dirent64, d_name) + namlen + 1,
927 sizeof(u64));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700928 u64 off;
929
930 buf->error = -EINVAL; /* only used if we fail.. */
931 if (reclen > buf->count)
932 return -EINVAL;
933 dirent = buf->previous;
934
935 if (dirent) {
Theodore Ts'o1f60fbe2016-04-23 22:50:07 -0400936 if (signal_pending(current))
937 return -EINTR;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700938 if (__put_user_unaligned(offset, &dirent->d_off))
939 goto efault;
940 }
941 dirent = buf->current_dir;
942 if (__put_user_unaligned(ino, &dirent->d_ino))
943 goto efault;
944 off = 0;
945 if (__put_user_unaligned(off, &dirent->d_off))
946 goto efault;
947 if (__put_user(reclen, &dirent->d_reclen))
948 goto efault;
949 if (__put_user(d_type, &dirent->d_type))
950 goto efault;
951 if (copy_to_user(dirent->d_name, name, namlen))
952 goto efault;
953 if (__put_user(0, dirent->d_name + namlen))
954 goto efault;
955 buf->previous = dirent;
956 dirent = (void __user *)dirent + reclen;
957 buf->current_dir = dirent;
958 buf->count -= reclen;
959 return 0;
960efault:
961 buf->error = -EFAULT;
962 return -EFAULT;
963}
964
Heiko Carstens625b1d72014-03-04 10:53:50 +0100965COMPAT_SYSCALL_DEFINE3(getdents64, unsigned int, fd,
966 struct linux_dirent64 __user *, dirent, unsigned int, count)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700967{
Al Viro2903ff02012-08-28 12:52:22 -0400968 struct fd f;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700969 struct linux_dirent64 __user * lastdirent;
Al Viroac6614b2013-05-22 22:22:04 -0400970 struct compat_getdents_callback64 buf = {
971 .ctx.actor = compat_filldir64,
972 .current_dir = dirent,
973 .count = count
974 };
Linus Torvalds1da177e2005-04-16 15:20:36 -0700975 int error;
976
Linus Torvalds1da177e2005-04-16 15:20:36 -0700977 if (!access_ok(VERIFY_WRITE, dirent, count))
Al Viro863ced72012-04-21 18:40:32 -0400978 return -EFAULT;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700979
Al Viro63b6df12016-04-20 17:08:21 -0400980 f = fdget_pos(fd);
Al Viro2903ff02012-08-28 12:52:22 -0400981 if (!f.file)
Al Viro863ced72012-04-21 18:40:32 -0400982 return -EBADF;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700983
Al Viro5c0ba4e2013-05-15 13:52:59 -0400984 error = iterate_dir(f.file, &buf.ctx);
Al Viro53c9c5c2008-08-24 07:29:52 -0400985 if (error >= 0)
986 error = buf.error;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700987 lastdirent = buf.previous;
988 if (lastdirent) {
Al Virobb6f6192013-05-15 18:49:12 -0400989 typeof(lastdirent->d_off) d_off = buf.ctx.pos;
Heiko Carstens7116e992006-12-06 20:36:36 -0800990 if (__put_user_unaligned(d_off, &lastdirent->d_off))
Al Viro53c9c5c2008-08-24 07:29:52 -0400991 error = -EFAULT;
992 else
993 error = count - buf.count;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700994 }
Al Viro63b6df12016-04-20 17:08:21 -0400995 fdput_pos(f);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700996 return error;
997}
Heiko Carstens0473c9b2014-03-03 10:44:03 +0100998#endif /* __ARCH_WANT_COMPAT_SYS_GETDENTS64 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700999
Linus Torvalds1da177e2005-04-16 15:20:36 -07001000/*
Miklos Szeredie922efc2005-09-06 15:18:25 -07001001 * Exactly like fs/open.c:sys_open(), except that it doesn't set the
1002 * O_LARGEFILE flag.
1003 */
Al Virof482e1b2012-12-25 20:24:38 -05001004COMPAT_SYSCALL_DEFINE3(open, const char __user *, filename, int, flags, umode_t, mode)
Miklos Szeredie922efc2005-09-06 15:18:25 -07001005{
Ulrich Drepper5590ff02006-01-18 17:43:53 -08001006 return do_sys_open(AT_FDCWD, filename, flags, mode);
1007}
1008
1009/*
1010 * Exactly like fs/open.c:sys_openat(), except that it doesn't set the
1011 * O_LARGEFILE flag.
1012 */
Al Virof482e1b2012-12-25 20:24:38 -05001013COMPAT_SYSCALL_DEFINE4(openat, int, dfd, const char __user *, filename, int, flags, umode_t, mode)
Ulrich Drepper5590ff02006-01-18 17:43:53 -08001014{
1015 return do_sys_open(dfd, filename, flags, mode);
Miklos Szeredie922efc2005-09-06 15:18:25 -07001016}
1017
Linus Torvalds1da177e2005-04-16 15:20:36 -07001018#define __COMPAT_NFDBITS (8 * sizeof(compat_ulong_t))
1019
Thomas Gleixnerb773ad42008-08-31 08:16:57 -07001020static int poll_select_copy_remaining(struct timespec *end_time, void __user *p,
1021 int timeval, int ret)
1022{
1023 struct timespec ts;
1024
1025 if (!p)
1026 return ret;
1027
1028 if (current->personality & STICKY_TIMEOUTS)
1029 goto sticky;
1030
1031 /* No update for zero timeout */
1032 if (!end_time->tv_sec && !end_time->tv_nsec)
1033 return ret;
1034
1035 ktime_get_ts(&ts);
1036 ts = timespec_sub(*end_time, ts);
1037 if (ts.tv_sec < 0)
1038 ts.tv_sec = ts.tv_nsec = 0;
1039
1040 if (timeval) {
1041 struct compat_timeval rtv;
1042
1043 rtv.tv_sec = ts.tv_sec;
1044 rtv.tv_usec = ts.tv_nsec / NSEC_PER_USEC;
1045
1046 if (!copy_to_user(p, &rtv, sizeof(rtv)))
1047 return ret;
1048 } else {
1049 struct compat_timespec rts;
1050
1051 rts.tv_sec = ts.tv_sec;
1052 rts.tv_nsec = ts.tv_nsec;
1053
1054 if (!copy_to_user(p, &rts, sizeof(rts)))
1055 return ret;
1056 }
1057 /*
1058 * If an application puts its timeval in read-only memory, we
1059 * don't want the Linux-specific update to the timeval to
1060 * cause a fault after the select has completed
1061 * successfully. However, because we're not updating the
1062 * timeval, we can't restart the system call.
1063 */
1064
1065sticky:
1066 if (ret == -ERESTARTNOHAND)
1067 ret = -EINTR;
1068 return ret;
1069}
1070
Linus Torvalds1da177e2005-04-16 15:20:36 -07001071/*
1072 * Ooo, nasty. We need here to frob 32-bit unsigned longs to
1073 * 64-bit unsigned longs.
1074 */
Arjan van de Ven858119e2006-01-14 13:20:43 -08001075static
Linus Torvalds1da177e2005-04-16 15:20:36 -07001076int compat_get_fd_set(unsigned long nr, compat_ulong_t __user *ufdset,
1077 unsigned long *fdset)
1078{
Milind Arun Choudhary022a1692007-05-08 00:29:02 -07001079 nr = DIV_ROUND_UP(nr, __COMPAT_NFDBITS);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001080 if (ufdset) {
1081 unsigned long odd;
1082
1083 if (!access_ok(VERIFY_WRITE, ufdset, nr*sizeof(compat_ulong_t)))
1084 return -EFAULT;
1085
1086 odd = nr & 1UL;
1087 nr &= ~1UL;
1088 while (nr) {
1089 unsigned long h, l;
Heiko Carstens7116e992006-12-06 20:36:36 -08001090 if (__get_user(l, ufdset) || __get_user(h, ufdset+1))
1091 return -EFAULT;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001092 ufdset += 2;
1093 *fdset++ = h << 32 | l;
1094 nr -= 2;
1095 }
Heiko Carstens7116e992006-12-06 20:36:36 -08001096 if (odd && __get_user(*fdset, ufdset))
1097 return -EFAULT;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001098 } else {
1099 /* Tricky, must clear full unsigned long in the
1100 * kernel fdset at the end, this makes sure that
1101 * actually happens.
1102 */
1103 memset(fdset, 0, ((nr + 1) & ~1)*sizeof(compat_ulong_t));
1104 }
1105 return 0;
1106}
1107
Arjan van de Ven858119e2006-01-14 13:20:43 -08001108static
Heiko Carstens7116e992006-12-06 20:36:36 -08001109int compat_set_fd_set(unsigned long nr, compat_ulong_t __user *ufdset,
1110 unsigned long *fdset)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001111{
1112 unsigned long odd;
Milind Arun Choudhary022a1692007-05-08 00:29:02 -07001113 nr = DIV_ROUND_UP(nr, __COMPAT_NFDBITS);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001114
1115 if (!ufdset)
Heiko Carstens7116e992006-12-06 20:36:36 -08001116 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001117
1118 odd = nr & 1UL;
1119 nr &= ~1UL;
1120 while (nr) {
1121 unsigned long h, l;
1122 l = *fdset++;
1123 h = l >> 32;
Heiko Carstens7116e992006-12-06 20:36:36 -08001124 if (__put_user(l, ufdset) || __put_user(h, ufdset+1))
1125 return -EFAULT;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001126 ufdset += 2;
1127 nr -= 2;
1128 }
Heiko Carstens7116e992006-12-06 20:36:36 -08001129 if (odd && __put_user(*fdset, ufdset))
1130 return -EFAULT;
1131 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001132}
1133
1134
1135/*
1136 * This is a virtual copy of sys_select from fs/select.c and probably
1137 * should be compared to it from time to time
1138 */
Linus Torvalds1da177e2005-04-16 15:20:36 -07001139
1140/*
1141 * We can actually return ERESTARTSYS instead of EINTR, but I'd
1142 * like to be certain this leads to no problems. So I return
1143 * EINTR just for safety.
1144 *
1145 * Update: ERESTARTSYS breaks at least the xview clock binary, so
1146 * I'm trying ERESTARTNOHAND which restart only when you want to.
1147 */
David Woodhouse9f729492006-01-18 17:44:05 -08001148int compat_core_sys_select(int n, compat_ulong_t __user *inp,
Arjan van de Ven8ff3e8e2008-08-31 08:26:40 -07001149 compat_ulong_t __user *outp, compat_ulong_t __user *exp,
1150 struct timespec *end_time)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001151{
1152 fd_set_bits fds;
Badari Pulavarty6087b2d2007-05-23 13:57:45 -07001153 void *bits;
Vadim Lobanovbbea9f62006-12-10 02:21:12 -08001154 int size, max_fds, ret = -EINVAL;
Linus Torvaldsa4531ed2005-09-09 15:10:52 -07001155 struct fdtable *fdt;
Badari Pulavarty6087b2d2007-05-23 13:57:45 -07001156 long stack_fds[SELECT_STACK_ALLOC/sizeof(long)];
Linus Torvalds1da177e2005-04-16 15:20:36 -07001157
Linus Torvalds1da177e2005-04-16 15:20:36 -07001158 if (n < 0)
1159 goto out_nofds;
1160
Vadim Lobanovbbea9f62006-12-10 02:21:12 -08001161 /* max_fds can increase, so grab it once to avoid race */
Linus Torvaldsac5b8b62005-09-09 15:42:34 -07001162 rcu_read_lock();
Linus Torvaldsa4531ed2005-09-09 15:10:52 -07001163 fdt = files_fdtable(current->files);
Vadim Lobanovbbea9f62006-12-10 02:21:12 -08001164 max_fds = fdt->max_fds;
Linus Torvaldsac5b8b62005-09-09 15:42:34 -07001165 rcu_read_unlock();
Vadim Lobanovbbea9f62006-12-10 02:21:12 -08001166 if (n > max_fds)
1167 n = max_fds;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001168
1169 /*
1170 * We need 6 bitmaps (in/out/ex for both incoming and outgoing),
1171 * since we used fdset we need to allocate memory in units of
1172 * long-words.
1173 */
Linus Torvalds1da177e2005-04-16 15:20:36 -07001174 size = FDS_BYTES(n);
Badari Pulavarty6087b2d2007-05-23 13:57:45 -07001175 bits = stack_fds;
1176 if (size > sizeof(stack_fds) / 6) {
1177 bits = kmalloc(6 * size, GFP_KERNEL);
1178 ret = -ENOMEM;
1179 if (!bits)
1180 goto out_nofds;
1181 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001182 fds.in = (unsigned long *) bits;
1183 fds.out = (unsigned long *) (bits + size);
1184 fds.ex = (unsigned long *) (bits + 2*size);
1185 fds.res_in = (unsigned long *) (bits + 3*size);
1186 fds.res_out = (unsigned long *) (bits + 4*size);
1187 fds.res_ex = (unsigned long *) (bits + 5*size);
1188
1189 if ((ret = compat_get_fd_set(n, inp, fds.in)) ||
1190 (ret = compat_get_fd_set(n, outp, fds.out)) ||
1191 (ret = compat_get_fd_set(n, exp, fds.ex)))
1192 goto out;
1193 zero_fd_set(n, fds.res_in);
1194 zero_fd_set(n, fds.res_out);
1195 zero_fd_set(n, fds.res_ex);
1196
Arjan van de Ven8ff3e8e2008-08-31 08:26:40 -07001197 ret = do_select(n, &fds, end_time);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001198
1199 if (ret < 0)
1200 goto out;
1201 if (!ret) {
1202 ret = -ERESTARTNOHAND;
1203 if (signal_pending(current))
1204 goto out;
1205 ret = 0;
1206 }
1207
Heiko Carstens7116e992006-12-06 20:36:36 -08001208 if (compat_set_fd_set(n, inp, fds.res_in) ||
1209 compat_set_fd_set(n, outp, fds.res_out) ||
1210 compat_set_fd_set(n, exp, fds.res_ex))
1211 ret = -EFAULT;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001212out:
Badari Pulavarty6087b2d2007-05-23 13:57:45 -07001213 if (bits != stack_fds)
1214 kfree(bits);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001215out_nofds:
1216 return ret;
1217}
1218
Heiko Carstens625b1d72014-03-04 10:53:50 +01001219COMPAT_SYSCALL_DEFINE5(select, int, n, compat_ulong_t __user *, inp,
1220 compat_ulong_t __user *, outp, compat_ulong_t __user *, exp,
1221 struct compat_timeval __user *, tvp)
David Woodhouse9f729492006-01-18 17:44:05 -08001222{
Arjan van de Ven8ff3e8e2008-08-31 08:26:40 -07001223 struct timespec end_time, *to = NULL;
David Woodhouse9f729492006-01-18 17:44:05 -08001224 struct compat_timeval tv;
1225 int ret;
1226
1227 if (tvp) {
1228 if (copy_from_user(&tv, tvp, sizeof(tv)))
1229 return -EFAULT;
1230
Arjan van de Ven8ff3e8e2008-08-31 08:26:40 -07001231 to = &end_time;
Arjan van de Ven4d36a9e2008-10-25 12:41:41 -07001232 if (poll_select_set_timeout(to,
1233 tv.tv_sec + (tv.tv_usec / USEC_PER_SEC),
1234 (tv.tv_usec % USEC_PER_SEC) * NSEC_PER_USEC))
David Woodhouse9f729492006-01-18 17:44:05 -08001235 return -EINVAL;
David Woodhouse9f729492006-01-18 17:44:05 -08001236 }
1237
Arjan van de Ven8ff3e8e2008-08-31 08:26:40 -07001238 ret = compat_core_sys_select(n, inp, outp, exp, to);
1239 ret = poll_select_copy_remaining(&end_time, tvp, 1, ret);
David Woodhouse9f729492006-01-18 17:44:05 -08001240
1241 return ret;
1242}
1243
Christoph Hellwig5d0e5282010-03-10 15:21:13 -08001244struct compat_sel_arg_struct {
1245 compat_ulong_t n;
1246 compat_uptr_t inp;
1247 compat_uptr_t outp;
1248 compat_uptr_t exp;
1249 compat_uptr_t tvp;
1250};
1251
Heiko Carstens625b1d72014-03-04 10:53:50 +01001252COMPAT_SYSCALL_DEFINE1(old_select, struct compat_sel_arg_struct __user *, arg)
Christoph Hellwig5d0e5282010-03-10 15:21:13 -08001253{
1254 struct compat_sel_arg_struct a;
1255
1256 if (copy_from_user(&a, arg, sizeof(a)))
1257 return -EFAULT;
1258 return compat_sys_select(a.n, compat_ptr(a.inp), compat_ptr(a.outp),
1259 compat_ptr(a.exp), compat_ptr(a.tvp));
1260}
1261
Heiko Carstensc9da9f22009-01-14 14:13:57 +01001262static long do_compat_pselect(int n, compat_ulong_t __user *inp,
David Woodhouse9f729492006-01-18 17:44:05 -08001263 compat_ulong_t __user *outp, compat_ulong_t __user *exp,
1264 struct compat_timespec __user *tsp, compat_sigset_t __user *sigmask,
1265 compat_size_t sigsetsize)
1266{
1267 compat_sigset_t ss32;
1268 sigset_t ksigmask, sigsaved;
David Woodhouse9f729492006-01-18 17:44:05 -08001269 struct compat_timespec ts;
Arjan van de Ven8ff3e8e2008-08-31 08:26:40 -07001270 struct timespec end_time, *to = NULL;
David Woodhouse9f729492006-01-18 17:44:05 -08001271 int ret;
1272
1273 if (tsp) {
1274 if (copy_from_user(&ts, tsp, sizeof(ts)))
1275 return -EFAULT;
1276
Arjan van de Ven8ff3e8e2008-08-31 08:26:40 -07001277 to = &end_time;
1278 if (poll_select_set_timeout(to, ts.tv_sec, ts.tv_nsec))
David Woodhouse9f729492006-01-18 17:44:05 -08001279 return -EINVAL;
1280 }
1281
1282 if (sigmask) {
1283 if (sigsetsize != sizeof(compat_sigset_t))
1284 return -EINVAL;
1285 if (copy_from_user(&ss32, sigmask, sizeof(ss32)))
1286 return -EFAULT;
1287 sigset_from_compat(&ksigmask, &ss32);
1288
1289 sigdelsetmask(&ksigmask, sigmask(SIGKILL)|sigmask(SIGSTOP));
1290 sigprocmask(SIG_SETMASK, &ksigmask, &sigsaved);
1291 }
1292
Arjan van de Ven8ff3e8e2008-08-31 08:26:40 -07001293 ret = compat_core_sys_select(n, inp, outp, exp, to);
1294 ret = poll_select_copy_remaining(&end_time, tsp, 0, ret);
David Woodhouse9f729492006-01-18 17:44:05 -08001295
1296 if (ret == -ERESTARTNOHAND) {
1297 /*
1298 * Don't restore the signal mask yet. Let do_signal() deliver
1299 * the signal on the way back to userspace, before the signal
1300 * mask is restored.
1301 */
1302 if (sigmask) {
1303 memcpy(&current->saved_sigmask, &sigsaved,
1304 sizeof(sigsaved));
Roland McGrath4e4c22c2008-04-30 00:53:06 -07001305 set_restore_sigmask();
David Woodhouse9f729492006-01-18 17:44:05 -08001306 }
1307 } else if (sigmask)
1308 sigprocmask(SIG_SETMASK, &sigsaved, NULL);
1309
1310 return ret;
1311}
1312
Heiko Carstens625b1d72014-03-04 10:53:50 +01001313COMPAT_SYSCALL_DEFINE6(pselect6, int, n, compat_ulong_t __user *, inp,
1314 compat_ulong_t __user *, outp, compat_ulong_t __user *, exp,
1315 struct compat_timespec __user *, tsp, void __user *, sig)
David Woodhouse9f729492006-01-18 17:44:05 -08001316{
1317 compat_size_t sigsetsize = 0;
1318 compat_uptr_t up = 0;
1319
1320 if (sig) {
1321 if (!access_ok(VERIFY_READ, sig,
1322 sizeof(compat_uptr_t)+sizeof(compat_size_t)) ||
1323 __get_user(up, (compat_uptr_t __user *)sig) ||
1324 __get_user(sigsetsize,
1325 (compat_size_t __user *)(sig+sizeof(up))))
1326 return -EFAULT;
1327 }
Heiko Carstensc9da9f22009-01-14 14:13:57 +01001328 return do_compat_pselect(n, inp, outp, exp, tsp, compat_ptr(up),
1329 sigsetsize);
David Woodhouse9f729492006-01-18 17:44:05 -08001330}
1331
Heiko Carstens625b1d72014-03-04 10:53:50 +01001332COMPAT_SYSCALL_DEFINE5(ppoll, struct pollfd __user *, ufds,
1333 unsigned int, nfds, struct compat_timespec __user *, tsp,
1334 const compat_sigset_t __user *, sigmask, compat_size_t, sigsetsize)
David Woodhouse9f729492006-01-18 17:44:05 -08001335{
1336 compat_sigset_t ss32;
1337 sigset_t ksigmask, sigsaved;
1338 struct compat_timespec ts;
Arjan van de Ven8ff3e8e2008-08-31 08:26:40 -07001339 struct timespec end_time, *to = NULL;
David Woodhouse9f729492006-01-18 17:44:05 -08001340 int ret;
1341
1342 if (tsp) {
1343 if (copy_from_user(&ts, tsp, sizeof(ts)))
1344 return -EFAULT;
1345
Arjan van de Ven8ff3e8e2008-08-31 08:26:40 -07001346 to = &end_time;
1347 if (poll_select_set_timeout(to, ts.tv_sec, ts.tv_nsec))
1348 return -EINVAL;
David Woodhouse9f729492006-01-18 17:44:05 -08001349 }
1350
1351 if (sigmask) {
Alexey Dobriyan3835a9b2006-05-15 09:44:27 -07001352 if (sigsetsize != sizeof(compat_sigset_t))
David Woodhouse9f729492006-01-18 17:44:05 -08001353 return -EINVAL;
1354 if (copy_from_user(&ss32, sigmask, sizeof(ss32)))
1355 return -EFAULT;
1356 sigset_from_compat(&ksigmask, &ss32);
1357
1358 sigdelsetmask(&ksigmask, sigmask(SIGKILL)|sigmask(SIGSTOP));
1359 sigprocmask(SIG_SETMASK, &ksigmask, &sigsaved);
1360 }
1361
Arjan van de Ven8ff3e8e2008-08-31 08:26:40 -07001362 ret = do_sys_poll(ufds, nfds, to);
David Woodhouse9f729492006-01-18 17:44:05 -08001363
1364 /* We can restart this syscall, usually */
1365 if (ret == -EINTR) {
1366 /*
1367 * Don't restore the signal mask yet. Let do_signal() deliver
1368 * the signal on the way back to userspace, before the signal
1369 * mask is restored.
1370 */
1371 if (sigmask) {
1372 memcpy(&current->saved_sigmask, &sigsaved,
1373 sizeof(sigsaved));
Roland McGrath4e4c22c2008-04-30 00:53:06 -07001374 set_restore_sigmask();
David Woodhouse9f729492006-01-18 17:44:05 -08001375 }
1376 ret = -ERESTARTNOHAND;
1377 } else if (sigmask)
1378 sigprocmask(SIG_SETMASK, &sigsaved, NULL);
1379
Arjan van de Ven8ff3e8e2008-08-31 08:26:40 -07001380 ret = poll_select_copy_remaining(&end_time, tsp, 0, ret);
David Woodhouse9f729492006-01-18 17:44:05 -08001381
1382 return ret;
1383}
David Woodhouse9f729492006-01-18 17:44:05 -08001384
Aneesh Kumar K.Vbecfd1f2011-01-29 18:43:26 +05301385#ifdef CONFIG_FHANDLE
1386/*
1387 * Exactly like fs/open.c:sys_open_by_handle_at(), except that it
1388 * doesn't set the O_LARGEFILE flag.
1389 */
Al Virof482e1b2012-12-25 20:24:38 -05001390COMPAT_SYSCALL_DEFINE3(open_by_handle_at, int, mountdirfd,
1391 struct file_handle __user *, handle, int, flags)
Aneesh Kumar K.Vbecfd1f2011-01-29 18:43:26 +05301392{
1393 return do_handle_open(mountdirfd, handle, flags);
1394}
1395#endif