blob: be6e48b0a46c269d55b4befcdedaf1750e1e233f [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * linux/fs/compat.c
3 *
4 * Kernel compatibililty routines for e.g. 32 bit syscall support
5 * on 64 bit kernels.
6 *
7 * Copyright (C) 2002 Stephen Rothwell, IBM Corporation
8 * Copyright (C) 1997-2000 Jakub Jelinek (jakub@redhat.com)
9 * Copyright (C) 1998 Eddie C. Dost (ecd@skynet.be)
10 * Copyright (C) 2001,2002 Andi Kleen, SuSE Labs
Pavel Macheka2531292010-07-18 14:27:13 +020011 * Copyright (C) 2003 Pavel Machek (pavel@ucw.cz)
Linus Torvalds1da177e2005-04-16 15:20:36 -070012 *
13 * This program is free software; you can redistribute it and/or modify
14 * it under the terms of the GNU General Public License version 2 as
15 * published by the Free Software Foundation.
16 */
17
Kevin Winchester85c9fe82010-08-09 17:20:22 -070018#include <linux/stddef.h>
Milind Arun Choudhary022a1692007-05-08 00:29:02 -070019#include <linux/kernel.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070020#include <linux/linkage.h>
21#include <linux/compat.h>
22#include <linux/errno.h>
23#include <linux/time.h>
24#include <linux/fs.h>
25#include <linux/fcntl.h>
26#include <linux/namei.h>
27#include <linux/file.h>
Al Viro9f3acc32008-04-24 07:44:08 -040028#include <linux/fdtable.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070029#include <linux/vfs.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070030#include <linux/ioctl.h>
31#include <linux/init.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070032#include <linux/ncp_mount.h>
David Howells9a9947b2005-04-18 10:54:51 -070033#include <linux/nfs4_mount.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070034#include <linux/syscalls.h>
35#include <linux/ctype.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070036#include <linux/dirent.h>
Robert Love0eeca282005-07-12 17:06:03 -040037#include <linux/fsnotify.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070038#include <linux/highuid.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070039#include <linux/personality.h>
40#include <linux/rwsem.h>
Jay Lan8f0ab512006-09-30 23:28:59 -070041#include <linux/tsacct_kern.h>
Christoph Hellwig6272e262007-05-08 00:29:21 -070042#include <linux/security.h>
Al Viroa1f8e7f72006-10-19 16:08:53 -040043#include <linux/highmem.h>
Davide Libenzi6d18c922007-05-10 22:23:15 -070044#include <linux/signal.h>
Al Virobd01f842006-10-19 17:23:57 -040045#include <linux/poll.h>
David S. Miller4a805e82005-09-14 21:40:00 -070046#include <linux/mm.h>
Al Viro498052b2009-03-30 07:20:30 -040047#include <linux/fs_struct.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090048#include <linux/slab.h>
wu zhangjin504b7012010-10-30 08:19:35 -070049#include <linux/pagemap.h>
Kent Overstreeta27bb332013-05-07 16:19:08 -070050#include <linux/aio.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070051
Linus Torvalds1da177e2005-04-16 15:20:36 -070052#include <asm/uaccess.h>
53#include <asm/mmu_context.h>
54#include <asm/ioctls.h>
David Howells07f3f05c2006-09-30 20:52:18 +020055#include "internal.h"
David Woodhouse9f729492006-01-18 17:44:05 -080056
Andi Kleenbebfa102006-06-26 13:56:52 +020057int compat_log = 1;
58
59int compat_printk(const char *fmt, ...)
60{
61 va_list ap;
62 int ret;
63 if (!compat_log)
64 return 0;
65 va_start(ap, fmt);
66 ret = vprintk(fmt, ap);
67 va_end(ap);
68 return ret;
69}
70
Linus Torvalds1da177e2005-04-16 15:20:36 -070071/*
72 * Not all architectures have sys_utime, so implement this in terms
73 * of sys_utimes.
74 */
Heiko Carstens625b1d72014-03-04 10:53:50 +010075COMPAT_SYSCALL_DEFINE2(utime, const char __user *, filename,
76 struct compat_utimbuf __user *, t)
Linus Torvalds1da177e2005-04-16 15:20:36 -070077{
Ulrich Drepper1c710c82007-05-08 00:33:25 -070078 struct timespec tv[2];
Linus Torvalds1da177e2005-04-16 15:20:36 -070079
80 if (t) {
81 if (get_user(tv[0].tv_sec, &t->actime) ||
82 get_user(tv[1].tv_sec, &t->modtime))
83 return -EFAULT;
Ulrich Drepper1c710c82007-05-08 00:33:25 -070084 tv[0].tv_nsec = 0;
85 tv[1].tv_nsec = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -070086 }
Ulrich Drepper1c710c82007-05-08 00:33:25 -070087 return do_utimes(AT_FDCWD, filename, t ? tv : NULL, 0);
88}
89
Heiko Carstens625b1d72014-03-04 10:53:50 +010090COMPAT_SYSCALL_DEFINE4(utimensat, unsigned int, dfd, const char __user *, filename, struct compat_timespec __user *, t, int, flags)
Ulrich Drepper1c710c82007-05-08 00:33:25 -070091{
92 struct timespec tv[2];
93
94 if (t) {
H. Peter Anvin81993e82014-02-01 18:54:11 -080095 if (compat_get_timespec(&tv[0], &t[0]) ||
96 compat_get_timespec(&tv[1], &t[1]))
Ulrich Drepper1c710c82007-05-08 00:33:25 -070097 return -EFAULT;
98
Ulrich Drepper1c710c82007-05-08 00:33:25 -070099 if (tv[0].tv_nsec == UTIME_OMIT && tv[1].tv_nsec == UTIME_OMIT)
100 return 0;
101 }
102 return do_utimes(dfd, filename, t ? tv : NULL, flags);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700103}
104
Heiko Carstens625b1d72014-03-04 10:53:50 +0100105COMPAT_SYSCALL_DEFINE3(futimesat, unsigned int, dfd, const char __user *, filename, struct compat_timeval __user *, t)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700106{
Ulrich Drepper1c710c82007-05-08 00:33:25 -0700107 struct timespec tv[2];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700108
Stephen Rothwell9ad11ab2006-02-02 16:11:51 +1100109 if (t) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700110 if (get_user(tv[0].tv_sec, &t[0].tv_sec) ||
Ulrich Drepper1c710c82007-05-08 00:33:25 -0700111 get_user(tv[0].tv_nsec, &t[0].tv_usec) ||
Linus Torvalds1da177e2005-04-16 15:20:36 -0700112 get_user(tv[1].tv_sec, &t[1].tv_sec) ||
Ulrich Drepper1c710c82007-05-08 00:33:25 -0700113 get_user(tv[1].tv_nsec, &t[1].tv_usec))
Stephen Rothwell9ad11ab2006-02-02 16:11:51 +1100114 return -EFAULT;
Ulrich Drepper1c710c82007-05-08 00:33:25 -0700115 if (tv[0].tv_nsec >= 1000000 || tv[0].tv_nsec < 0 ||
116 tv[1].tv_nsec >= 1000000 || tv[1].tv_nsec < 0)
117 return -EINVAL;
118 tv[0].tv_nsec *= 1000;
119 tv[1].tv_nsec *= 1000;
Stephen Rothwell9ad11ab2006-02-02 16:11:51 +1100120 }
Ulrich Drepper1c710c82007-05-08 00:33:25 -0700121 return do_utimes(dfd, filename, t ? tv : NULL, 0);
Ulrich Drepper5590ff02006-01-18 17:43:53 -0800122}
123
Heiko Carstens625b1d72014-03-04 10:53:50 +0100124COMPAT_SYSCALL_DEFINE2(utimes, const char __user *, filename, struct compat_timeval __user *, t)
Ulrich Drepper5590ff02006-01-18 17:43:53 -0800125{
126 return compat_sys_futimesat(AT_FDCWD, filename, t);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700127}
128
Christoph Hellwigf7a50002008-10-15 22:02:05 -0700129static int cp_compat_stat(struct kstat *stat, struct compat_stat __user *ubuf)
130{
Al Virofcf83062012-02-12 20:56:29 -0500131 struct compat_stat tmp;
Christoph Hellwigf7a50002008-10-15 22:02:05 -0700132
Al Virofcf83062012-02-12 20:56:29 -0500133 if (!old_valid_dev(stat->dev) || !old_valid_dev(stat->rdev))
Christoph Hellwigf7a50002008-10-15 22:02:05 -0700134 return -EOVERFLOW;
135
Al Virofcf83062012-02-12 20:56:29 -0500136 memset(&tmp, 0, sizeof(tmp));
137 tmp.st_dev = old_encode_dev(stat->dev);
138 tmp.st_ino = stat->ino;
139 if (sizeof(tmp.st_ino) < sizeof(stat->ino) && tmp.st_ino != stat->ino)
140 return -EOVERFLOW;
141 tmp.st_mode = stat->mode;
142 tmp.st_nlink = stat->nlink;
143 if (tmp.st_nlink != stat->nlink)
144 return -EOVERFLOW;
Eric W. Biedermana7c19382012-02-09 09:10:30 -0800145 SET_UID(tmp.st_uid, from_kuid_munged(current_user_ns(), stat->uid));
146 SET_GID(tmp.st_gid, from_kgid_munged(current_user_ns(), stat->gid));
Al Virofcf83062012-02-12 20:56:29 -0500147 tmp.st_rdev = old_encode_dev(stat->rdev);
148 if ((u64) stat->size > MAX_NON_LFS)
149 return -EOVERFLOW;
150 tmp.st_size = stat->size;
151 tmp.st_atime = stat->atime.tv_sec;
152 tmp.st_atime_nsec = stat->atime.tv_nsec;
153 tmp.st_mtime = stat->mtime.tv_sec;
154 tmp.st_mtime_nsec = stat->mtime.tv_nsec;
155 tmp.st_ctime = stat->ctime.tv_sec;
156 tmp.st_ctime_nsec = stat->ctime.tv_nsec;
157 tmp.st_blocks = stat->blocks;
158 tmp.st_blksize = stat->blksize;
159 return copy_to_user(ubuf, &tmp, sizeof(tmp)) ? -EFAULT : 0;
Christoph Hellwigf7a50002008-10-15 22:02:05 -0700160}
161
Heiko Carstens625b1d72014-03-04 10:53:50 +0100162COMPAT_SYSCALL_DEFINE2(newstat, const char __user *, filename,
163 struct compat_stat __user *, statbuf)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700164{
165 struct kstat stat;
Christoph Hellwig2eae7a12009-04-08 16:34:03 -0400166 int error;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700167
Christoph Hellwig2eae7a12009-04-08 16:34:03 -0400168 error = vfs_stat(filename, &stat);
169 if (error)
170 return error;
171 return cp_compat_stat(&stat, statbuf);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700172}
173
Heiko Carstens625b1d72014-03-04 10:53:50 +0100174COMPAT_SYSCALL_DEFINE2(newlstat, const char __user *, filename,
175 struct compat_stat __user *, statbuf)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700176{
177 struct kstat stat;
Christoph Hellwig2eae7a12009-04-08 16:34:03 -0400178 int error;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700179
Christoph Hellwig2eae7a12009-04-08 16:34:03 -0400180 error = vfs_lstat(filename, &stat);
181 if (error)
182 return error;
183 return cp_compat_stat(&stat, statbuf);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700184}
185
Kyle McMartin82d821d2006-03-24 03:18:20 -0800186#ifndef __ARCH_WANT_STAT64
Heiko Carstens625b1d72014-03-04 10:53:50 +0100187COMPAT_SYSCALL_DEFINE4(newfstatat, unsigned int, dfd,
188 const char __user *, filename,
189 struct compat_stat __user *, statbuf, int, flag)
Ulrich Drepper5590ff02006-01-18 17:43:53 -0800190{
191 struct kstat stat;
Oleg Drokin0112fc22009-04-08 20:05:42 +0400192 int error;
Ulrich Drepper5590ff02006-01-18 17:43:53 -0800193
Oleg Drokin0112fc22009-04-08 20:05:42 +0400194 error = vfs_fstatat(dfd, filename, &stat, flag);
195 if (error)
196 return error;
197 return cp_compat_stat(&stat, statbuf);
Ulrich Drepper5590ff02006-01-18 17:43:53 -0800198}
Kyle McMartin82d821d2006-03-24 03:18:20 -0800199#endif
Ulrich Drepper5590ff02006-01-18 17:43:53 -0800200
Heiko Carstens625b1d72014-03-04 10:53:50 +0100201COMPAT_SYSCALL_DEFINE2(newfstat, unsigned int, fd,
202 struct compat_stat __user *, statbuf)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700203{
204 struct kstat stat;
205 int error = vfs_fstat(fd, &stat);
206
207 if (!error)
208 error = cp_compat_stat(&stat, statbuf);
209 return error;
210}
211
212static int put_compat_statfs(struct compat_statfs __user *ubuf, struct kstatfs *kbuf)
213{
214
215 if (sizeof ubuf->f_blocks == 4) {
Jon Tollefsonf4a67cc2008-07-23 21:27:55 -0700216 if ((kbuf->f_blocks | kbuf->f_bfree | kbuf->f_bavail |
217 kbuf->f_bsize | kbuf->f_frsize) & 0xffffffff00000000ULL)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700218 return -EOVERFLOW;
219 /* f_files and f_ffree may be -1; it's okay
220 * to stuff that into 32 bits */
221 if (kbuf->f_files != 0xffffffffffffffffULL
222 && (kbuf->f_files & 0xffffffff00000000ULL))
223 return -EOVERFLOW;
224 if (kbuf->f_ffree != 0xffffffffffffffffULL
225 && (kbuf->f_ffree & 0xffffffff00000000ULL))
226 return -EOVERFLOW;
227 }
228 if (!access_ok(VERIFY_WRITE, ubuf, sizeof(*ubuf)) ||
229 __put_user(kbuf->f_type, &ubuf->f_type) ||
230 __put_user(kbuf->f_bsize, &ubuf->f_bsize) ||
231 __put_user(kbuf->f_blocks, &ubuf->f_blocks) ||
232 __put_user(kbuf->f_bfree, &ubuf->f_bfree) ||
233 __put_user(kbuf->f_bavail, &ubuf->f_bavail) ||
234 __put_user(kbuf->f_files, &ubuf->f_files) ||
235 __put_user(kbuf->f_ffree, &ubuf->f_ffree) ||
236 __put_user(kbuf->f_namelen, &ubuf->f_namelen) ||
237 __put_user(kbuf->f_fsid.val[0], &ubuf->f_fsid.val[0]) ||
238 __put_user(kbuf->f_fsid.val[1], &ubuf->f_fsid.val[1]) ||
239 __put_user(kbuf->f_frsize, &ubuf->f_frsize) ||
Eric W. Biederman1448c722011-10-17 13:40:02 -0700240 __put_user(kbuf->f_flags, &ubuf->f_flags) ||
241 __clear_user(ubuf->f_spare, sizeof(ubuf->f_spare)))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700242 return -EFAULT;
243 return 0;
244}
245
246/*
Namhyung Kim974d8792010-12-27 01:41:53 +0900247 * The following statfs calls are copies of code from fs/statfs.c and
Linus Torvalds1da177e2005-04-16 15:20:36 -0700248 * should be checked against those from time to time
249 */
Heiko Carstens625b1d72014-03-04 10:53:50 +0100250COMPAT_SYSCALL_DEFINE2(statfs, const char __user *, pathname, struct compat_statfs __user *, buf)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700251{
Al Viroc8b91ac2011-03-12 10:41:39 -0500252 struct kstatfs tmp;
253 int error = user_statfs(pathname, &tmp);
254 if (!error)
255 error = put_compat_statfs(buf, &tmp);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700256 return error;
257}
258
Heiko Carstens625b1d72014-03-04 10:53:50 +0100259COMPAT_SYSCALL_DEFINE2(fstatfs, unsigned int, fd, struct compat_statfs __user *, buf)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700260{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700261 struct kstatfs tmp;
Al Viroc8b91ac2011-03-12 10:41:39 -0500262 int error = fd_statfs(fd, &tmp);
David Gibson86e07ce2005-11-21 21:32:23 -0800263 if (!error)
264 error = put_compat_statfs(buf, &tmp);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700265 return error;
266}
267
268static int put_compat_statfs64(struct compat_statfs64 __user *ubuf, struct kstatfs *kbuf)
269{
270 if (sizeof ubuf->f_blocks == 4) {
Jon Tollefsonf4a67cc2008-07-23 21:27:55 -0700271 if ((kbuf->f_blocks | kbuf->f_bfree | kbuf->f_bavail |
272 kbuf->f_bsize | kbuf->f_frsize) & 0xffffffff00000000ULL)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700273 return -EOVERFLOW;
274 /* f_files and f_ffree may be -1; it's okay
275 * to stuff that into 32 bits */
276 if (kbuf->f_files != 0xffffffffffffffffULL
277 && (kbuf->f_files & 0xffffffff00000000ULL))
278 return -EOVERFLOW;
279 if (kbuf->f_ffree != 0xffffffffffffffffULL
280 && (kbuf->f_ffree & 0xffffffff00000000ULL))
281 return -EOVERFLOW;
282 }
283 if (!access_ok(VERIFY_WRITE, ubuf, sizeof(*ubuf)) ||
284 __put_user(kbuf->f_type, &ubuf->f_type) ||
285 __put_user(kbuf->f_bsize, &ubuf->f_bsize) ||
286 __put_user(kbuf->f_blocks, &ubuf->f_blocks) ||
287 __put_user(kbuf->f_bfree, &ubuf->f_bfree) ||
288 __put_user(kbuf->f_bavail, &ubuf->f_bavail) ||
289 __put_user(kbuf->f_files, &ubuf->f_files) ||
290 __put_user(kbuf->f_ffree, &ubuf->f_ffree) ||
291 __put_user(kbuf->f_namelen, &ubuf->f_namelen) ||
292 __put_user(kbuf->f_fsid.val[0], &ubuf->f_fsid.val[0]) ||
293 __put_user(kbuf->f_fsid.val[1], &ubuf->f_fsid.val[1]) ||
Namhyung Kime0bb6bd2010-12-27 01:41:54 +0900294 __put_user(kbuf->f_frsize, &ubuf->f_frsize) ||
295 __put_user(kbuf->f_flags, &ubuf->f_flags) ||
296 __clear_user(ubuf->f_spare, sizeof(ubuf->f_spare)))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700297 return -EFAULT;
298 return 0;
299}
300
Heiko Carstens625b1d72014-03-04 10:53:50 +0100301COMPAT_SYSCALL_DEFINE3(statfs64, const char __user *, pathname, compat_size_t, sz, struct compat_statfs64 __user *, buf)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700302{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700303 struct kstatfs tmp;
304 int error;
305
306 if (sz != sizeof(*buf))
307 return -EINVAL;
308
Al Viroc8b91ac2011-03-12 10:41:39 -0500309 error = user_statfs(pathname, &tmp);
David Gibson86e07ce2005-11-21 21:32:23 -0800310 if (!error)
311 error = put_compat_statfs64(buf, &tmp);
Al Viroc8b91ac2011-03-12 10:41:39 -0500312 return error;
313}
314
Heiko Carstens625b1d72014-03-04 10:53:50 +0100315COMPAT_SYSCALL_DEFINE3(fstatfs64, unsigned int, fd, compat_size_t, sz, struct compat_statfs64 __user *, buf)
Al Viroc8b91ac2011-03-12 10:41:39 -0500316{
317 struct kstatfs tmp;
318 int error;
319
320 if (sz != sizeof(*buf))
321 return -EINVAL;
322
323 error = fd_statfs(fd, &tmp);
324 if (!error)
325 error = put_compat_statfs64(buf, &tmp);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700326 return error;
327}
328
Christoph Hellwig2b1c6bd2008-11-28 10:09:09 +0100329/*
330 * This is a copy of sys_ustat, just dealing with a structure layout.
331 * Given how simple this syscall is that apporach is more maintainable
332 * than the various conversion hacks.
333 */
Heiko Carstens625b1d72014-03-04 10:53:50 +0100334COMPAT_SYSCALL_DEFINE2(ustat, unsigned, dev, struct compat_ustat __user *, u)
Christoph Hellwig2b1c6bd2008-11-28 10:09:09 +0100335{
Christoph Hellwig2b1c6bd2008-11-28 10:09:09 +0100336 struct compat_ustat tmp;
337 struct kstatfs sbuf;
Al Virocf31e702012-01-02 22:28:36 -0500338 int err = vfs_ustat(new_decode_dev(dev), &sbuf);
Christoph Hellwig2b1c6bd2008-11-28 10:09:09 +0100339 if (err)
340 return err;
341
342 memset(&tmp, 0, sizeof(struct compat_ustat));
343 tmp.f_tfree = sbuf.f_bfree;
344 tmp.f_tinode = sbuf.f_ffree;
345 if (copy_to_user(u, &tmp, sizeof(struct compat_ustat)))
346 return -EFAULT;
347 return 0;
348}
349
Linus Torvalds1da177e2005-04-16 15:20:36 -0700350static int get_compat_flock(struct flock *kfl, struct compat_flock __user *ufl)
351{
352 if (!access_ok(VERIFY_READ, ufl, sizeof(*ufl)) ||
353 __get_user(kfl->l_type, &ufl->l_type) ||
354 __get_user(kfl->l_whence, &ufl->l_whence) ||
355 __get_user(kfl->l_start, &ufl->l_start) ||
356 __get_user(kfl->l_len, &ufl->l_len) ||
357 __get_user(kfl->l_pid, &ufl->l_pid))
358 return -EFAULT;
359 return 0;
360}
361
362static int put_compat_flock(struct flock *kfl, struct compat_flock __user *ufl)
363{
364 if (!access_ok(VERIFY_WRITE, ufl, sizeof(*ufl)) ||
365 __put_user(kfl->l_type, &ufl->l_type) ||
366 __put_user(kfl->l_whence, &ufl->l_whence) ||
367 __put_user(kfl->l_start, &ufl->l_start) ||
368 __put_user(kfl->l_len, &ufl->l_len) ||
369 __put_user(kfl->l_pid, &ufl->l_pid))
370 return -EFAULT;
371 return 0;
372}
373
374#ifndef HAVE_ARCH_GET_COMPAT_FLOCK64
375static int get_compat_flock64(struct flock *kfl, struct compat_flock64 __user *ufl)
376{
377 if (!access_ok(VERIFY_READ, ufl, sizeof(*ufl)) ||
378 __get_user(kfl->l_type, &ufl->l_type) ||
379 __get_user(kfl->l_whence, &ufl->l_whence) ||
380 __get_user(kfl->l_start, &ufl->l_start) ||
381 __get_user(kfl->l_len, &ufl->l_len) ||
382 __get_user(kfl->l_pid, &ufl->l_pid))
383 return -EFAULT;
384 return 0;
385}
386#endif
387
388#ifndef HAVE_ARCH_PUT_COMPAT_FLOCK64
389static int put_compat_flock64(struct flock *kfl, struct compat_flock64 __user *ufl)
390{
391 if (!access_ok(VERIFY_WRITE, ufl, sizeof(*ufl)) ||
392 __put_user(kfl->l_type, &ufl->l_type) ||
393 __put_user(kfl->l_whence, &ufl->l_whence) ||
394 __put_user(kfl->l_start, &ufl->l_start) ||
395 __put_user(kfl->l_len, &ufl->l_len) ||
396 __put_user(kfl->l_pid, &ufl->l_pid))
397 return -EFAULT;
398 return 0;
399}
400#endif
401
Jeff Layton5d50ffd2014-02-03 12:13:10 -0500402static unsigned int
403convert_fcntl_cmd(unsigned int cmd)
404{
405 switch (cmd) {
406 case F_GETLK64:
407 return F_GETLK;
408 case F_SETLK64:
409 return F_SETLK;
410 case F_SETLKW64:
411 return F_SETLKW;
412 }
413
414 return cmd;
415}
416
Heiko Carstens932602e2014-03-04 16:07:52 +0100417COMPAT_SYSCALL_DEFINE3(fcntl64, unsigned int, fd, unsigned int, cmd,
418 compat_ulong_t, arg)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700419{
420 mm_segment_t old_fs;
421 struct flock f;
422 long ret;
Jeff Layton5d50ffd2014-02-03 12:13:10 -0500423 unsigned int conv_cmd;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700424
425 switch (cmd) {
426 case F_GETLK:
427 case F_SETLK:
428 case F_SETLKW:
429 ret = get_compat_flock(&f, compat_ptr(arg));
430 if (ret != 0)
431 break;
432 old_fs = get_fs();
433 set_fs(KERNEL_DS);
434 ret = sys_fcntl(fd, cmd, (unsigned long)&f);
435 set_fs(old_fs);
436 if (cmd == F_GETLK && ret == 0) {
Nikanth Karthikesanff677f82009-04-01 14:40:51 +0530437 /* GETLK was successful and we need to return the data...
NeilBrown2520f142006-01-08 01:02:40 -0800438 * but it needs to fit in the compat structure.
439 * l_start shouldn't be too big, unless the original
440 * start + end is greater than COMPAT_OFF_T_MAX, in which
441 * case the app was asking for trouble, so we return
442 * -EOVERFLOW in that case.
443 * l_len could be too big, in which case we just truncate it,
444 * and only allow the app to see that part of the conflicting
445 * lock that might make sense to it anyway
446 */
447
448 if (f.l_start > COMPAT_OFF_T_MAX)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700449 ret = -EOVERFLOW;
NeilBrown2520f142006-01-08 01:02:40 -0800450 if (f.l_len > COMPAT_OFF_T_MAX)
451 f.l_len = COMPAT_OFF_T_MAX;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700452 if (ret == 0)
453 ret = put_compat_flock(&f, compat_ptr(arg));
454 }
455 break;
456
457 case F_GETLK64:
458 case F_SETLK64:
459 case F_SETLKW64:
Jeff Layton0d3f7a22014-04-22 08:23:58 -0400460 case F_OFD_GETLK:
461 case F_OFD_SETLK:
462 case F_OFD_SETLKW:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700463 ret = get_compat_flock64(&f, compat_ptr(arg));
464 if (ret != 0)
465 break;
466 old_fs = get_fs();
467 set_fs(KERNEL_DS);
Jeff Layton5d50ffd2014-02-03 12:13:10 -0500468 conv_cmd = convert_fcntl_cmd(cmd);
469 ret = sys_fcntl(fd, conv_cmd, (unsigned long)&f);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700470 set_fs(old_fs);
Jeff Layton0d3f7a22014-04-22 08:23:58 -0400471 if ((conv_cmd == F_GETLK || conv_cmd == F_OFD_GETLK) && ret == 0) {
NeilBrown2520f142006-01-08 01:02:40 -0800472 /* need to return lock information - see above for commentary */
473 if (f.l_start > COMPAT_LOFF_T_MAX)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700474 ret = -EOVERFLOW;
NeilBrown2520f142006-01-08 01:02:40 -0800475 if (f.l_len > COMPAT_LOFF_T_MAX)
476 f.l_len = COMPAT_LOFF_T_MAX;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700477 if (ret == 0)
478 ret = put_compat_flock64(&f, compat_ptr(arg));
479 }
480 break;
481
482 default:
483 ret = sys_fcntl(fd, cmd, arg);
484 break;
485 }
486 return ret;
487}
488
Heiko Carstens932602e2014-03-04 16:07:52 +0100489COMPAT_SYSCALL_DEFINE3(fcntl, unsigned int, fd, unsigned int, cmd,
490 compat_ulong_t, arg)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700491{
Jeff Layton5d50ffd2014-02-03 12:13:10 -0500492 switch (cmd) {
493 case F_GETLK64:
494 case F_SETLK64:
495 case F_SETLKW64:
Jeff Layton0d3f7a22014-04-22 08:23:58 -0400496 case F_OFD_GETLK:
497 case F_OFD_SETLK:
498 case F_OFD_SETLKW:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700499 return -EINVAL;
Jeff Layton5d50ffd2014-02-03 12:13:10 -0500500 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700501 return compat_sys_fcntl64(fd, cmd, arg);
502}
503
Heiko Carstens625b1d72014-03-04 10:53:50 +0100504COMPAT_SYSCALL_DEFINE2(io_setup, unsigned, nr_reqs, u32 __user *, ctx32p)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700505{
506 long ret;
507 aio_context_t ctx64;
508
509 mm_segment_t oldfs = get_fs();
510 if (unlikely(get_user(ctx64, ctx32p)))
511 return -EFAULT;
512
513 set_fs(KERNEL_DS);
514 /* The __user pointer cast is valid because of the set_fs() */
515 ret = sys_io_setup(nr_reqs, (aio_context_t __user *) &ctx64);
516 set_fs(oldfs);
517 /* truncating is ok because it's a user address */
518 if (!ret)
519 ret = put_user((u32) ctx64, ctx32p);
520 return ret;
521}
522
Heiko Carstens932602e2014-03-04 16:07:52 +0100523COMPAT_SYSCALL_DEFINE5(io_getevents, compat_aio_context_t, ctx_id,
524 compat_long_t, min_nr,
525 compat_long_t, nr,
526 struct io_event __user *, events,
527 struct compat_timespec __user *, timeout)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700528{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700529 struct timespec t;
530 struct timespec __user *ut = NULL;
531
Linus Torvalds1da177e2005-04-16 15:20:36 -0700532 if (timeout) {
H. Peter Anvin81993e82014-02-01 18:54:11 -0800533 if (compat_get_timespec(&t, timeout))
Heiko Carstens932602e2014-03-04 16:07:52 +0100534 return -EFAULT;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700535
536 ut = compat_alloc_user_space(sizeof(*ut));
537 if (copy_to_user(ut, &t, sizeof(t)) )
Heiko Carstens932602e2014-03-04 16:07:52 +0100538 return -EFAULT;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700539 }
Heiko Carstens932602e2014-03-04 16:07:52 +0100540 return sys_io_getevents(ctx_id, min_nr, nr, events, ut);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700541}
542
Jeff Moyerb8373362010-05-26 14:44:25 -0700543/* A write operation does a read from user space and vice versa */
544#define vrfy_dir(type) ((type) == READ ? VERIFY_WRITE : VERIFY_READ)
545
546ssize_t compat_rw_copy_check_uvector(int type,
547 const struct compat_iovec __user *uvector, unsigned long nr_segs,
548 unsigned long fast_segs, struct iovec *fast_pointer,
Christopher Yeohac34ebb2012-05-31 16:26:42 -0700549 struct iovec **ret_pointer)
Jeff Moyerb8373362010-05-26 14:44:25 -0700550{
551 compat_ssize_t tot_len;
552 struct iovec *iov = *ret_pointer = fast_pointer;
553 ssize_t ret = 0;
554 int seg;
555
556 /*
557 * SuS says "The readv() function *may* fail if the iovcnt argument
558 * was less than or equal to 0, or greater than {IOV_MAX}. Linux has
559 * traditionally returned zero for zero segments, so...
560 */
561 if (nr_segs == 0)
562 goto out;
563
564 ret = -EINVAL;
565 if (nr_segs > UIO_MAXIOV || nr_segs < 0)
566 goto out;
567 if (nr_segs > fast_segs) {
568 ret = -ENOMEM;
569 iov = kmalloc(nr_segs*sizeof(struct iovec), GFP_KERNEL);
Namhyung Kim6a5640f2010-12-27 01:41:52 +0900570 if (iov == NULL)
Jeff Moyerb8373362010-05-26 14:44:25 -0700571 goto out;
Jeff Moyerb8373362010-05-26 14:44:25 -0700572 }
573 *ret_pointer = iov;
574
Mathieu Desnoyers8aec0f52013-02-25 10:20:36 -0500575 ret = -EFAULT;
576 if (!access_ok(VERIFY_READ, uvector, nr_segs*sizeof(*uvector)))
577 goto out;
578
Jeff Moyerb8373362010-05-26 14:44:25 -0700579 /*
580 * Single unix specification:
581 * We should -EINVAL if an element length is not >= 0 and fitting an
Linus Torvalds435f49a2010-10-29 10:36:49 -0700582 * ssize_t.
Jeff Moyerb8373362010-05-26 14:44:25 -0700583 *
Linus Torvalds435f49a2010-10-29 10:36:49 -0700584 * In Linux, the total length is limited to MAX_RW_COUNT, there is
585 * no overflow possibility.
Jeff Moyerb8373362010-05-26 14:44:25 -0700586 */
587 tot_len = 0;
588 ret = -EINVAL;
589 for (seg = 0; seg < nr_segs; seg++) {
Jeff Moyerb8373362010-05-26 14:44:25 -0700590 compat_uptr_t buf;
591 compat_ssize_t len;
592
593 if (__get_user(len, &uvector->iov_len) ||
594 __get_user(buf, &uvector->iov_base)) {
595 ret = -EFAULT;
596 goto out;
597 }
598 if (len < 0) /* size_t not fitting in compat_ssize_t .. */
599 goto out;
Christopher Yeohac34ebb2012-05-31 16:26:42 -0700600 if (type >= 0 &&
Christopher Yeohfcf63402011-10-31 17:06:39 -0700601 !access_ok(vrfy_dir(type), compat_ptr(buf), len)) {
Jeff Moyerb8373362010-05-26 14:44:25 -0700602 ret = -EFAULT;
603 goto out;
604 }
Linus Torvalds435f49a2010-10-29 10:36:49 -0700605 if (len > MAX_RW_COUNT - tot_len)
606 len = MAX_RW_COUNT - tot_len;
607 tot_len += len;
Jeff Moyerb8373362010-05-26 14:44:25 -0700608 iov->iov_base = compat_ptr(buf);
609 iov->iov_len = (compat_size_t) len;
610 uvector++;
611 iov++;
612 }
613 ret = tot_len;
614
615out:
616 return ret;
617}
618
Linus Torvalds1da177e2005-04-16 15:20:36 -0700619static inline long
620copy_iocb(long nr, u32 __user *ptr32, struct iocb __user * __user *ptr64)
621{
622 compat_uptr_t uptr;
623 int i;
624
625 for (i = 0; i < nr; ++i) {
626 if (get_user(uptr, ptr32 + i))
627 return -EFAULT;
628 if (put_user(compat_ptr(uptr), ptr64 + i))
629 return -EFAULT;
630 }
631 return 0;
632}
633
634#define MAX_AIO_SUBMITS (PAGE_SIZE/sizeof(struct iocb *))
635
Heiko Carstens932602e2014-03-04 16:07:52 +0100636COMPAT_SYSCALL_DEFINE3(io_submit, compat_aio_context_t, ctx_id,
637 int, nr, u32 __user *, iocb)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700638{
639 struct iocb __user * __user *iocb64;
640 long ret;
641
642 if (unlikely(nr < 0))
643 return -EINVAL;
644
645 if (nr > MAX_AIO_SUBMITS)
646 nr = MAX_AIO_SUBMITS;
647
648 iocb64 = compat_alloc_user_space(nr * sizeof(*iocb64));
649 ret = copy_iocb(nr, iocb, iocb64);
650 if (!ret)
Jeff Moyer9d85cba2010-05-26 14:44:26 -0700651 ret = do_io_submit(ctx_id, nr, iocb64, 1);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700652 return ret;
653}
654
655struct compat_ncp_mount_data {
656 compat_int_t version;
657 compat_uint_t ncp_fd;
Stephen Rothwell202e5972005-09-06 15:16:40 -0700658 __compat_uid_t mounted_uid;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700659 compat_pid_t wdog_pid;
660 unsigned char mounted_vol[NCP_VOLNAME_LEN + 1];
661 compat_uint_t time_out;
662 compat_uint_t retry_count;
663 compat_uint_t flags;
Stephen Rothwell202e5972005-09-06 15:16:40 -0700664 __compat_uid_t uid;
665 __compat_gid_t gid;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700666 compat_mode_t file_mode;
667 compat_mode_t dir_mode;
668};
669
670struct compat_ncp_mount_data_v4 {
671 compat_int_t version;
672 compat_ulong_t flags;
673 compat_ulong_t mounted_uid;
674 compat_long_t wdog_pid;
675 compat_uint_t ncp_fd;
676 compat_uint_t time_out;
677 compat_uint_t retry_count;
678 compat_ulong_t uid;
679 compat_ulong_t gid;
680 compat_ulong_t file_mode;
681 compat_ulong_t dir_mode;
682};
683
684static void *do_ncp_super_data_conv(void *raw_data)
685{
686 int version = *(unsigned int *)raw_data;
687
688 if (version == 3) {
689 struct compat_ncp_mount_data *c_n = raw_data;
690 struct ncp_mount_data *n = raw_data;
691
692 n->dir_mode = c_n->dir_mode;
693 n->file_mode = c_n->file_mode;
694 n->gid = c_n->gid;
695 n->uid = c_n->uid;
696 memmove (n->mounted_vol, c_n->mounted_vol, (sizeof (c_n->mounted_vol) + 3 * sizeof (unsigned int)));
697 n->wdog_pid = c_n->wdog_pid;
698 n->mounted_uid = c_n->mounted_uid;
699 } else if (version == 4) {
700 struct compat_ncp_mount_data_v4 *c_n = raw_data;
701 struct ncp_mount_data_v4 *n = raw_data;
702
703 n->dir_mode = c_n->dir_mode;
704 n->file_mode = c_n->file_mode;
705 n->gid = c_n->gid;
706 n->uid = c_n->uid;
707 n->retry_count = c_n->retry_count;
708 n->time_out = c_n->time_out;
709 n->ncp_fd = c_n->ncp_fd;
710 n->wdog_pid = c_n->wdog_pid;
711 n->mounted_uid = c_n->mounted_uid;
712 n->flags = c_n->flags;
713 } else if (version != 5) {
714 return NULL;
715 }
716
717 return raw_data;
718}
719
Linus Torvalds1da177e2005-04-16 15:20:36 -0700720
David Howells9a9947b2005-04-18 10:54:51 -0700721struct compat_nfs_string {
722 compat_uint_t len;
David Howells5fc3e622005-04-27 15:39:03 -0700723 compat_uptr_t data;
David Howells9a9947b2005-04-18 10:54:51 -0700724};
725
726static inline void compat_nfs_string(struct nfs_string *dst,
727 struct compat_nfs_string *src)
728{
729 dst->data = compat_ptr(src->data);
730 dst->len = src->len;
731}
732
733struct compat_nfs4_mount_data_v1 {
734 compat_int_t version;
735 compat_int_t flags;
736 compat_int_t rsize;
737 compat_int_t wsize;
738 compat_int_t timeo;
739 compat_int_t retrans;
740 compat_int_t acregmin;
741 compat_int_t acregmax;
742 compat_int_t acdirmin;
743 compat_int_t acdirmax;
744 struct compat_nfs_string client_addr;
745 struct compat_nfs_string mnt_path;
746 struct compat_nfs_string hostname;
747 compat_uint_t host_addrlen;
David Howells5fc3e622005-04-27 15:39:03 -0700748 compat_uptr_t host_addr;
David Howells9a9947b2005-04-18 10:54:51 -0700749 compat_int_t proto;
750 compat_int_t auth_flavourlen;
David Howells5fc3e622005-04-27 15:39:03 -0700751 compat_uptr_t auth_flavours;
David Howells9a9947b2005-04-18 10:54:51 -0700752};
753
754static int do_nfs4_super_data_conv(void *raw_data)
755{
756 int version = *(compat_uint_t *) raw_data;
757
758 if (version == 1) {
759 struct compat_nfs4_mount_data_v1 *raw = raw_data;
760 struct nfs4_mount_data *real = raw_data;
761
762 /* copy the fields backwards */
763 real->auth_flavours = compat_ptr(raw->auth_flavours);
764 real->auth_flavourlen = raw->auth_flavourlen;
765 real->proto = raw->proto;
766 real->host_addr = compat_ptr(raw->host_addr);
767 real->host_addrlen = raw->host_addrlen;
768 compat_nfs_string(&real->hostname, &raw->hostname);
769 compat_nfs_string(&real->mnt_path, &raw->mnt_path);
770 compat_nfs_string(&real->client_addr, &raw->client_addr);
771 real->acdirmax = raw->acdirmax;
772 real->acdirmin = raw->acdirmin;
773 real->acregmax = raw->acregmax;
774 real->acregmin = raw->acregmin;
775 real->retrans = raw->retrans;
776 real->timeo = raw->timeo;
777 real->wsize = raw->wsize;
778 real->rsize = raw->rsize;
779 real->flags = raw->flags;
780 real->version = raw->version;
781 }
David Howells9a9947b2005-04-18 10:54:51 -0700782
783 return 0;
784}
785
Linus Torvalds1da177e2005-04-16 15:20:36 -0700786#define NCPFS_NAME "ncpfs"
David Howells9a9947b2005-04-18 10:54:51 -0700787#define NFS4_NAME "nfs4"
Linus Torvalds1da177e2005-04-16 15:20:36 -0700788
Heiko Carstens932602e2014-03-04 16:07:52 +0100789COMPAT_SYSCALL_DEFINE5(mount, const char __user *, dev_name,
790 const char __user *, dir_name,
791 const char __user *, type, compat_ulong_t, flags,
792 const void __user *, data)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700793{
Vegard Nossumeca6f532009-09-18 13:05:45 -0700794 char *kernel_type;
Al Virob40ef862015-12-14 18:44:44 -0500795 void *options;
Vegard Nossumeca6f532009-09-18 13:05:45 -0700796 char *kernel_dev;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700797 int retval;
798
Tim Gardnerb8850d12014-08-28 11:26:03 -0600799 kernel_type = copy_mount_string(type);
800 retval = PTR_ERR(kernel_type);
801 if (IS_ERR(kernel_type))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700802 goto out;
803
Tim Gardnerb8850d12014-08-28 11:26:03 -0600804 kernel_dev = copy_mount_string(dev_name);
805 retval = PTR_ERR(kernel_dev);
806 if (IS_ERR(kernel_dev))
Seunghun Lee5e6123f2014-09-14 22:15:10 +0900807 goto out1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700808
Al Virob40ef862015-12-14 18:44:44 -0500809 options = copy_mount_options(data);
810 retval = PTR_ERR(options);
811 if (IS_ERR(options))
Seunghun Lee5e6123f2014-09-14 22:15:10 +0900812 goto out2;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700813
Al Virob40ef862015-12-14 18:44:44 -0500814 if (kernel_type && options) {
Arnd Bergmann2116b7a2010-10-04 22:55:57 +0200815 if (!strcmp(kernel_type, NCPFS_NAME)) {
Al Virob40ef862015-12-14 18:44:44 -0500816 do_ncp_super_data_conv(options);
Vegard Nossumeca6f532009-09-18 13:05:45 -0700817 } else if (!strcmp(kernel_type, NFS4_NAME)) {
Al Virob40ef862015-12-14 18:44:44 -0500818 retval = -EINVAL;
819 if (do_nfs4_super_data_conv(options))
Seunghun Lee5e6123f2014-09-14 22:15:10 +0900820 goto out3;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700821 }
822 }
823
Al Virob40ef862015-12-14 18:44:44 -0500824 retval = do_mount(kernel_dev, dir_name, kernel_type, flags, options);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700825
Linus Torvalds1da177e2005-04-16 15:20:36 -0700826 out3:
Al Virob40ef862015-12-14 18:44:44 -0500827 kfree(options);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700828 out2:
Seunghun Lee5e6123f2014-09-14 22:15:10 +0900829 kfree(kernel_dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700830 out1:
Vegard Nossumeca6f532009-09-18 13:05:45 -0700831 kfree(kernel_type);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700832 out:
833 return retval;
834}
835
Linus Torvalds1da177e2005-04-16 15:20:36 -0700836struct compat_old_linux_dirent {
837 compat_ulong_t d_ino;
838 compat_ulong_t d_offset;
839 unsigned short d_namlen;
840 char d_name[1];
841};
842
843struct compat_readdir_callback {
Al Viro5c0ba4e2013-05-15 13:52:59 -0400844 struct dir_context ctx;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700845 struct compat_old_linux_dirent __user *dirent;
846 int result;
847};
848
Miklos Szerediac7576f2014-10-30 17:37:34 +0100849static int compat_fillonedir(struct dir_context *ctx, const char *name,
850 int namlen, loff_t offset, u64 ino,
851 unsigned int d_type)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700852{
Miklos Szerediac7576f2014-10-30 17:37:34 +0100853 struct compat_readdir_callback *buf =
854 container_of(ctx, struct compat_readdir_callback, ctx);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700855 struct compat_old_linux_dirent __user *dirent;
David Howellsafefdbb2006-10-03 01:13:46 -0700856 compat_ulong_t d_ino;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700857
858 if (buf->result)
859 return -EINVAL;
David Howellsafefdbb2006-10-03 01:13:46 -0700860 d_ino = ino;
Al Viro8f3f6552008-08-12 00:28:24 -0400861 if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) {
862 buf->result = -EOVERFLOW;
David Howellsafefdbb2006-10-03 01:13:46 -0700863 return -EOVERFLOW;
Al Viro8f3f6552008-08-12 00:28:24 -0400864 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700865 buf->result++;
866 dirent = buf->dirent;
867 if (!access_ok(VERIFY_WRITE, dirent,
868 (unsigned long)(dirent->d_name + namlen + 1) -
869 (unsigned long)dirent))
870 goto efault;
David Howellsafefdbb2006-10-03 01:13:46 -0700871 if ( __put_user(d_ino, &dirent->d_ino) ||
Linus Torvalds1da177e2005-04-16 15:20:36 -0700872 __put_user(offset, &dirent->d_offset) ||
873 __put_user(namlen, &dirent->d_namlen) ||
874 __copy_to_user(dirent->d_name, name, namlen) ||
875 __put_user(0, dirent->d_name + namlen))
876 goto efault;
877 return 0;
878efault:
879 buf->result = -EFAULT;
880 return -EFAULT;
881}
882
Heiko Carstens625b1d72014-03-04 10:53:50 +0100883COMPAT_SYSCALL_DEFINE3(old_readdir, unsigned int, fd,
884 struct compat_old_linux_dirent __user *, dirent, unsigned int, count)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700885{
886 int error;
Al Viro63b6df12016-04-20 17:08:21 -0400887 struct fd f = fdget_pos(fd);
Al Viroac6614b2013-05-22 22:22:04 -0400888 struct compat_readdir_callback buf = {
889 .ctx.actor = compat_fillonedir,
890 .dirent = dirent
891 };
Linus Torvalds1da177e2005-04-16 15:20:36 -0700892
Al Viro2903ff02012-08-28 12:52:22 -0400893 if (!f.file)
Al Viro863ced72012-04-21 18:40:32 -0400894 return -EBADF;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700895
Al Viro5c0ba4e2013-05-15 13:52:59 -0400896 error = iterate_dir(f.file, &buf.ctx);
Al Viro53c9c5c2008-08-24 07:29:52 -0400897 if (buf.result)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700898 error = buf.result;
899
Al Viro63b6df12016-04-20 17:08:21 -0400900 fdput_pos(f);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700901 return error;
902}
903
904struct compat_linux_dirent {
905 compat_ulong_t d_ino;
906 compat_ulong_t d_off;
907 unsigned short d_reclen;
908 char d_name[1];
909};
910
911struct compat_getdents_callback {
Al Viro5c0ba4e2013-05-15 13:52:59 -0400912 struct dir_context ctx;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700913 struct compat_linux_dirent __user *current_dir;
914 struct compat_linux_dirent __user *previous;
915 int count;
916 int error;
917};
918
Miklos Szerediac7576f2014-10-30 17:37:34 +0100919static int compat_filldir(struct dir_context *ctx, const char *name, int namlen,
David Howellsafefdbb2006-10-03 01:13:46 -0700920 loff_t offset, u64 ino, unsigned int d_type)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700921{
922 struct compat_linux_dirent __user * dirent;
Miklos Szerediac7576f2014-10-30 17:37:34 +0100923 struct compat_getdents_callback *buf =
924 container_of(ctx, struct compat_getdents_callback, ctx);
David Howellsafefdbb2006-10-03 01:13:46 -0700925 compat_ulong_t d_ino;
Kevin Winchester85c9fe82010-08-09 17:20:22 -0700926 int reclen = ALIGN(offsetof(struct compat_linux_dirent, d_name) +
927 namlen + 2, sizeof(compat_long_t));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700928
929 buf->error = -EINVAL; /* only used if we fail.. */
930 if (reclen > buf->count)
931 return -EINVAL;
David Howellsafefdbb2006-10-03 01:13:46 -0700932 d_ino = ino;
Al Viro8f3f6552008-08-12 00:28:24 -0400933 if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) {
934 buf->error = -EOVERFLOW;
David Howellsafefdbb2006-10-03 01:13:46 -0700935 return -EOVERFLOW;
Al Viro8f3f6552008-08-12 00:28:24 -0400936 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700937 dirent = buf->previous;
938 if (dirent) {
Theodore Ts'o1f60fbe2016-04-23 22:50:07 -0400939 if (signal_pending(current))
940 return -EINTR;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700941 if (__put_user(offset, &dirent->d_off))
942 goto efault;
943 }
944 dirent = buf->current_dir;
David Howellsafefdbb2006-10-03 01:13:46 -0700945 if (__put_user(d_ino, &dirent->d_ino))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700946 goto efault;
947 if (__put_user(reclen, &dirent->d_reclen))
948 goto efault;
949 if (copy_to_user(dirent->d_name, name, namlen))
950 goto efault;
951 if (__put_user(0, dirent->d_name + namlen))
952 goto efault;
953 if (__put_user(d_type, (char __user *) dirent + reclen - 1))
954 goto efault;
955 buf->previous = dirent;
956 dirent = (void __user *)dirent + reclen;
957 buf->current_dir = dirent;
958 buf->count -= reclen;
959 return 0;
960efault:
961 buf->error = -EFAULT;
962 return -EFAULT;
963}
964
Heiko Carstens625b1d72014-03-04 10:53:50 +0100965COMPAT_SYSCALL_DEFINE3(getdents, unsigned int, fd,
966 struct compat_linux_dirent __user *, dirent, unsigned int, count)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700967{
Al Viro2903ff02012-08-28 12:52:22 -0400968 struct fd f;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700969 struct compat_linux_dirent __user * lastdirent;
Al Viroac6614b2013-05-22 22:22:04 -0400970 struct compat_getdents_callback buf = {
971 .ctx.actor = compat_filldir,
972 .current_dir = dirent,
973 .count = count
974 };
Linus Torvalds1da177e2005-04-16 15:20:36 -0700975 int error;
976
Linus Torvalds1da177e2005-04-16 15:20:36 -0700977 if (!access_ok(VERIFY_WRITE, dirent, count))
Al Viro863ced72012-04-21 18:40:32 -0400978 return -EFAULT;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700979
Al Viro63b6df12016-04-20 17:08:21 -0400980 f = fdget_pos(fd);
Al Viro2903ff02012-08-28 12:52:22 -0400981 if (!f.file)
Al Viro863ced72012-04-21 18:40:32 -0400982 return -EBADF;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700983
Al Viro5c0ba4e2013-05-15 13:52:59 -0400984 error = iterate_dir(f.file, &buf.ctx);
Al Viro53c9c5c2008-08-24 07:29:52 -0400985 if (error >= 0)
986 error = buf.error;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700987 lastdirent = buf.previous;
988 if (lastdirent) {
Al Virobb6f6192013-05-15 18:49:12 -0400989 if (put_user(buf.ctx.pos, &lastdirent->d_off))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700990 error = -EFAULT;
991 else
992 error = count - buf.count;
993 }
Al Viro63b6df12016-04-20 17:08:21 -0400994 fdput_pos(f);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700995 return error;
996}
997
Heiko Carstens0473c9b2014-03-03 10:44:03 +0100998#ifdef __ARCH_WANT_COMPAT_SYS_GETDENTS64
Linus Torvalds1da177e2005-04-16 15:20:36 -0700999
1000struct compat_getdents_callback64 {
Al Viro5c0ba4e2013-05-15 13:52:59 -04001001 struct dir_context ctx;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001002 struct linux_dirent64 __user *current_dir;
1003 struct linux_dirent64 __user *previous;
1004 int count;
1005 int error;
1006};
1007
Miklos Szerediac7576f2014-10-30 17:37:34 +01001008static int compat_filldir64(struct dir_context *ctx, const char *name,
1009 int namlen, loff_t offset, u64 ino,
1010 unsigned int d_type)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001011{
1012 struct linux_dirent64 __user *dirent;
Miklos Szerediac7576f2014-10-30 17:37:34 +01001013 struct compat_getdents_callback64 *buf =
1014 container_of(ctx, struct compat_getdents_callback64, ctx);
Kevin Winchester85c9fe82010-08-09 17:20:22 -07001015 int reclen = ALIGN(offsetof(struct linux_dirent64, d_name) + namlen + 1,
1016 sizeof(u64));
Linus Torvalds1da177e2005-04-16 15:20:36 -07001017 u64 off;
1018
1019 buf->error = -EINVAL; /* only used if we fail.. */
1020 if (reclen > buf->count)
1021 return -EINVAL;
1022 dirent = buf->previous;
1023
1024 if (dirent) {
Theodore Ts'o1f60fbe2016-04-23 22:50:07 -04001025 if (signal_pending(current))
1026 return -EINTR;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001027 if (__put_user_unaligned(offset, &dirent->d_off))
1028 goto efault;
1029 }
1030 dirent = buf->current_dir;
1031 if (__put_user_unaligned(ino, &dirent->d_ino))
1032 goto efault;
1033 off = 0;
1034 if (__put_user_unaligned(off, &dirent->d_off))
1035 goto efault;
1036 if (__put_user(reclen, &dirent->d_reclen))
1037 goto efault;
1038 if (__put_user(d_type, &dirent->d_type))
1039 goto efault;
1040 if (copy_to_user(dirent->d_name, name, namlen))
1041 goto efault;
1042 if (__put_user(0, dirent->d_name + namlen))
1043 goto efault;
1044 buf->previous = dirent;
1045 dirent = (void __user *)dirent + reclen;
1046 buf->current_dir = dirent;
1047 buf->count -= reclen;
1048 return 0;
1049efault:
1050 buf->error = -EFAULT;
1051 return -EFAULT;
1052}
1053
Heiko Carstens625b1d72014-03-04 10:53:50 +01001054COMPAT_SYSCALL_DEFINE3(getdents64, unsigned int, fd,
1055 struct linux_dirent64 __user *, dirent, unsigned int, count)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001056{
Al Viro2903ff02012-08-28 12:52:22 -04001057 struct fd f;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001058 struct linux_dirent64 __user * lastdirent;
Al Viroac6614b2013-05-22 22:22:04 -04001059 struct compat_getdents_callback64 buf = {
1060 .ctx.actor = compat_filldir64,
1061 .current_dir = dirent,
1062 .count = count
1063 };
Linus Torvalds1da177e2005-04-16 15:20:36 -07001064 int error;
1065
Linus Torvalds1da177e2005-04-16 15:20:36 -07001066 if (!access_ok(VERIFY_WRITE, dirent, count))
Al Viro863ced72012-04-21 18:40:32 -04001067 return -EFAULT;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001068
Al Viro63b6df12016-04-20 17:08:21 -04001069 f = fdget_pos(fd);
Al Viro2903ff02012-08-28 12:52:22 -04001070 if (!f.file)
Al Viro863ced72012-04-21 18:40:32 -04001071 return -EBADF;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001072
Al Viro5c0ba4e2013-05-15 13:52:59 -04001073 error = iterate_dir(f.file, &buf.ctx);
Al Viro53c9c5c2008-08-24 07:29:52 -04001074 if (error >= 0)
1075 error = buf.error;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001076 lastdirent = buf.previous;
1077 if (lastdirent) {
Al Virobb6f6192013-05-15 18:49:12 -04001078 typeof(lastdirent->d_off) d_off = buf.ctx.pos;
Heiko Carstens7116e992006-12-06 20:36:36 -08001079 if (__put_user_unaligned(d_off, &lastdirent->d_off))
Al Viro53c9c5c2008-08-24 07:29:52 -04001080 error = -EFAULT;
1081 else
1082 error = count - buf.count;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001083 }
Al Viro63b6df12016-04-20 17:08:21 -04001084 fdput_pos(f);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001085 return error;
1086}
Heiko Carstens0473c9b2014-03-03 10:44:03 +01001087#endif /* __ARCH_WANT_COMPAT_SYS_GETDENTS64 */
Linus Torvalds1da177e2005-04-16 15:20:36 -07001088
Linus Torvalds1da177e2005-04-16 15:20:36 -07001089/*
Miklos Szeredie922efc2005-09-06 15:18:25 -07001090 * Exactly like fs/open.c:sys_open(), except that it doesn't set the
1091 * O_LARGEFILE flag.
1092 */
Al Virof482e1b2012-12-25 20:24:38 -05001093COMPAT_SYSCALL_DEFINE3(open, const char __user *, filename, int, flags, umode_t, mode)
Miklos Szeredie922efc2005-09-06 15:18:25 -07001094{
Ulrich Drepper5590ff02006-01-18 17:43:53 -08001095 return do_sys_open(AT_FDCWD, filename, flags, mode);
1096}
1097
1098/*
1099 * Exactly like fs/open.c:sys_openat(), except that it doesn't set the
1100 * O_LARGEFILE flag.
1101 */
Al Virof482e1b2012-12-25 20:24:38 -05001102COMPAT_SYSCALL_DEFINE4(openat, int, dfd, const char __user *, filename, int, flags, umode_t, mode)
Ulrich Drepper5590ff02006-01-18 17:43:53 -08001103{
1104 return do_sys_open(dfd, filename, flags, mode);
Miklos Szeredie922efc2005-09-06 15:18:25 -07001105}
1106
Linus Torvalds1da177e2005-04-16 15:20:36 -07001107#define __COMPAT_NFDBITS (8 * sizeof(compat_ulong_t))
1108
Thomas Gleixnerb773ad42008-08-31 08:16:57 -07001109static int poll_select_copy_remaining(struct timespec *end_time, void __user *p,
1110 int timeval, int ret)
1111{
1112 struct timespec ts;
1113
1114 if (!p)
1115 return ret;
1116
1117 if (current->personality & STICKY_TIMEOUTS)
1118 goto sticky;
1119
1120 /* No update for zero timeout */
1121 if (!end_time->tv_sec && !end_time->tv_nsec)
1122 return ret;
1123
1124 ktime_get_ts(&ts);
1125 ts = timespec_sub(*end_time, ts);
1126 if (ts.tv_sec < 0)
1127 ts.tv_sec = ts.tv_nsec = 0;
1128
1129 if (timeval) {
1130 struct compat_timeval rtv;
1131
1132 rtv.tv_sec = ts.tv_sec;
1133 rtv.tv_usec = ts.tv_nsec / NSEC_PER_USEC;
1134
1135 if (!copy_to_user(p, &rtv, sizeof(rtv)))
1136 return ret;
1137 } else {
1138 struct compat_timespec rts;
1139
1140 rts.tv_sec = ts.tv_sec;
1141 rts.tv_nsec = ts.tv_nsec;
1142
1143 if (!copy_to_user(p, &rts, sizeof(rts)))
1144 return ret;
1145 }
1146 /*
1147 * If an application puts its timeval in read-only memory, we
1148 * don't want the Linux-specific update to the timeval to
1149 * cause a fault after the select has completed
1150 * successfully. However, because we're not updating the
1151 * timeval, we can't restart the system call.
1152 */
1153
1154sticky:
1155 if (ret == -ERESTARTNOHAND)
1156 ret = -EINTR;
1157 return ret;
1158}
1159
Linus Torvalds1da177e2005-04-16 15:20:36 -07001160/*
1161 * Ooo, nasty. We need here to frob 32-bit unsigned longs to
1162 * 64-bit unsigned longs.
1163 */
Arjan van de Ven858119e2006-01-14 13:20:43 -08001164static
Linus Torvalds1da177e2005-04-16 15:20:36 -07001165int compat_get_fd_set(unsigned long nr, compat_ulong_t __user *ufdset,
1166 unsigned long *fdset)
1167{
Milind Arun Choudhary022a1692007-05-08 00:29:02 -07001168 nr = DIV_ROUND_UP(nr, __COMPAT_NFDBITS);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001169 if (ufdset) {
1170 unsigned long odd;
1171
1172 if (!access_ok(VERIFY_WRITE, ufdset, nr*sizeof(compat_ulong_t)))
1173 return -EFAULT;
1174
1175 odd = nr & 1UL;
1176 nr &= ~1UL;
1177 while (nr) {
1178 unsigned long h, l;
Heiko Carstens7116e992006-12-06 20:36:36 -08001179 if (__get_user(l, ufdset) || __get_user(h, ufdset+1))
1180 return -EFAULT;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001181 ufdset += 2;
1182 *fdset++ = h << 32 | l;
1183 nr -= 2;
1184 }
Heiko Carstens7116e992006-12-06 20:36:36 -08001185 if (odd && __get_user(*fdset, ufdset))
1186 return -EFAULT;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001187 } else {
1188 /* Tricky, must clear full unsigned long in the
1189 * kernel fdset at the end, this makes sure that
1190 * actually happens.
1191 */
1192 memset(fdset, 0, ((nr + 1) & ~1)*sizeof(compat_ulong_t));
1193 }
1194 return 0;
1195}
1196
Arjan van de Ven858119e2006-01-14 13:20:43 -08001197static
Heiko Carstens7116e992006-12-06 20:36:36 -08001198int compat_set_fd_set(unsigned long nr, compat_ulong_t __user *ufdset,
1199 unsigned long *fdset)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001200{
1201 unsigned long odd;
Milind Arun Choudhary022a1692007-05-08 00:29:02 -07001202 nr = DIV_ROUND_UP(nr, __COMPAT_NFDBITS);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001203
1204 if (!ufdset)
Heiko Carstens7116e992006-12-06 20:36:36 -08001205 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001206
1207 odd = nr & 1UL;
1208 nr &= ~1UL;
1209 while (nr) {
1210 unsigned long h, l;
1211 l = *fdset++;
1212 h = l >> 32;
Heiko Carstens7116e992006-12-06 20:36:36 -08001213 if (__put_user(l, ufdset) || __put_user(h, ufdset+1))
1214 return -EFAULT;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001215 ufdset += 2;
1216 nr -= 2;
1217 }
Heiko Carstens7116e992006-12-06 20:36:36 -08001218 if (odd && __put_user(*fdset, ufdset))
1219 return -EFAULT;
1220 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001221}
1222
1223
1224/*
1225 * This is a virtual copy of sys_select from fs/select.c and probably
1226 * should be compared to it from time to time
1227 */
Linus Torvalds1da177e2005-04-16 15:20:36 -07001228
1229/*
1230 * We can actually return ERESTARTSYS instead of EINTR, but I'd
1231 * like to be certain this leads to no problems. So I return
1232 * EINTR just for safety.
1233 *
1234 * Update: ERESTARTSYS breaks at least the xview clock binary, so
1235 * I'm trying ERESTARTNOHAND which restart only when you want to.
1236 */
David Woodhouse9f729492006-01-18 17:44:05 -08001237int compat_core_sys_select(int n, compat_ulong_t __user *inp,
Arjan van de Ven8ff3e8e2008-08-31 08:26:40 -07001238 compat_ulong_t __user *outp, compat_ulong_t __user *exp,
1239 struct timespec *end_time)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001240{
1241 fd_set_bits fds;
Badari Pulavarty6087b2d2007-05-23 13:57:45 -07001242 void *bits;
Vadim Lobanovbbea9f62006-12-10 02:21:12 -08001243 int size, max_fds, ret = -EINVAL;
Linus Torvaldsa4531ed2005-09-09 15:10:52 -07001244 struct fdtable *fdt;
Badari Pulavarty6087b2d2007-05-23 13:57:45 -07001245 long stack_fds[SELECT_STACK_ALLOC/sizeof(long)];
Linus Torvalds1da177e2005-04-16 15:20:36 -07001246
Linus Torvalds1da177e2005-04-16 15:20:36 -07001247 if (n < 0)
1248 goto out_nofds;
1249
Vadim Lobanovbbea9f62006-12-10 02:21:12 -08001250 /* max_fds can increase, so grab it once to avoid race */
Linus Torvaldsac5b8b62005-09-09 15:42:34 -07001251 rcu_read_lock();
Linus Torvaldsa4531ed2005-09-09 15:10:52 -07001252 fdt = files_fdtable(current->files);
Vadim Lobanovbbea9f62006-12-10 02:21:12 -08001253 max_fds = fdt->max_fds;
Linus Torvaldsac5b8b62005-09-09 15:42:34 -07001254 rcu_read_unlock();
Vadim Lobanovbbea9f62006-12-10 02:21:12 -08001255 if (n > max_fds)
1256 n = max_fds;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001257
1258 /*
1259 * We need 6 bitmaps (in/out/ex for both incoming and outgoing),
1260 * since we used fdset we need to allocate memory in units of
1261 * long-words.
1262 */
Linus Torvalds1da177e2005-04-16 15:20:36 -07001263 size = FDS_BYTES(n);
Badari Pulavarty6087b2d2007-05-23 13:57:45 -07001264 bits = stack_fds;
1265 if (size > sizeof(stack_fds) / 6) {
1266 bits = kmalloc(6 * size, GFP_KERNEL);
1267 ret = -ENOMEM;
1268 if (!bits)
1269 goto out_nofds;
1270 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001271 fds.in = (unsigned long *) bits;
1272 fds.out = (unsigned long *) (bits + size);
1273 fds.ex = (unsigned long *) (bits + 2*size);
1274 fds.res_in = (unsigned long *) (bits + 3*size);
1275 fds.res_out = (unsigned long *) (bits + 4*size);
1276 fds.res_ex = (unsigned long *) (bits + 5*size);
1277
1278 if ((ret = compat_get_fd_set(n, inp, fds.in)) ||
1279 (ret = compat_get_fd_set(n, outp, fds.out)) ||
1280 (ret = compat_get_fd_set(n, exp, fds.ex)))
1281 goto out;
1282 zero_fd_set(n, fds.res_in);
1283 zero_fd_set(n, fds.res_out);
1284 zero_fd_set(n, fds.res_ex);
1285
Arjan van de Ven8ff3e8e2008-08-31 08:26:40 -07001286 ret = do_select(n, &fds, end_time);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001287
1288 if (ret < 0)
1289 goto out;
1290 if (!ret) {
1291 ret = -ERESTARTNOHAND;
1292 if (signal_pending(current))
1293 goto out;
1294 ret = 0;
1295 }
1296
Heiko Carstens7116e992006-12-06 20:36:36 -08001297 if (compat_set_fd_set(n, inp, fds.res_in) ||
1298 compat_set_fd_set(n, outp, fds.res_out) ||
1299 compat_set_fd_set(n, exp, fds.res_ex))
1300 ret = -EFAULT;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001301out:
Badari Pulavarty6087b2d2007-05-23 13:57:45 -07001302 if (bits != stack_fds)
1303 kfree(bits);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001304out_nofds:
1305 return ret;
1306}
1307
Heiko Carstens625b1d72014-03-04 10:53:50 +01001308COMPAT_SYSCALL_DEFINE5(select, int, n, compat_ulong_t __user *, inp,
1309 compat_ulong_t __user *, outp, compat_ulong_t __user *, exp,
1310 struct compat_timeval __user *, tvp)
David Woodhouse9f729492006-01-18 17:44:05 -08001311{
Arjan van de Ven8ff3e8e2008-08-31 08:26:40 -07001312 struct timespec end_time, *to = NULL;
David Woodhouse9f729492006-01-18 17:44:05 -08001313 struct compat_timeval tv;
1314 int ret;
1315
1316 if (tvp) {
1317 if (copy_from_user(&tv, tvp, sizeof(tv)))
1318 return -EFAULT;
1319
Arjan van de Ven8ff3e8e2008-08-31 08:26:40 -07001320 to = &end_time;
Arjan van de Ven4d36a9e2008-10-25 12:41:41 -07001321 if (poll_select_set_timeout(to,
1322 tv.tv_sec + (tv.tv_usec / USEC_PER_SEC),
1323 (tv.tv_usec % USEC_PER_SEC) * NSEC_PER_USEC))
David Woodhouse9f729492006-01-18 17:44:05 -08001324 return -EINVAL;
David Woodhouse9f729492006-01-18 17:44:05 -08001325 }
1326
Arjan van de Ven8ff3e8e2008-08-31 08:26:40 -07001327 ret = compat_core_sys_select(n, inp, outp, exp, to);
1328 ret = poll_select_copy_remaining(&end_time, tvp, 1, ret);
David Woodhouse9f729492006-01-18 17:44:05 -08001329
1330 return ret;
1331}
1332
Christoph Hellwig5d0e5282010-03-10 15:21:13 -08001333struct compat_sel_arg_struct {
1334 compat_ulong_t n;
1335 compat_uptr_t inp;
1336 compat_uptr_t outp;
1337 compat_uptr_t exp;
1338 compat_uptr_t tvp;
1339};
1340
Heiko Carstens625b1d72014-03-04 10:53:50 +01001341COMPAT_SYSCALL_DEFINE1(old_select, struct compat_sel_arg_struct __user *, arg)
Christoph Hellwig5d0e5282010-03-10 15:21:13 -08001342{
1343 struct compat_sel_arg_struct a;
1344
1345 if (copy_from_user(&a, arg, sizeof(a)))
1346 return -EFAULT;
1347 return compat_sys_select(a.n, compat_ptr(a.inp), compat_ptr(a.outp),
1348 compat_ptr(a.exp), compat_ptr(a.tvp));
1349}
1350
Heiko Carstensc9da9f22009-01-14 14:13:57 +01001351static long do_compat_pselect(int n, compat_ulong_t __user *inp,
David Woodhouse9f729492006-01-18 17:44:05 -08001352 compat_ulong_t __user *outp, compat_ulong_t __user *exp,
1353 struct compat_timespec __user *tsp, compat_sigset_t __user *sigmask,
1354 compat_size_t sigsetsize)
1355{
1356 compat_sigset_t ss32;
1357 sigset_t ksigmask, sigsaved;
David Woodhouse9f729492006-01-18 17:44:05 -08001358 struct compat_timespec ts;
Arjan van de Ven8ff3e8e2008-08-31 08:26:40 -07001359 struct timespec end_time, *to = NULL;
David Woodhouse9f729492006-01-18 17:44:05 -08001360 int ret;
1361
1362 if (tsp) {
1363 if (copy_from_user(&ts, tsp, sizeof(ts)))
1364 return -EFAULT;
1365
Arjan van de Ven8ff3e8e2008-08-31 08:26:40 -07001366 to = &end_time;
1367 if (poll_select_set_timeout(to, ts.tv_sec, ts.tv_nsec))
David Woodhouse9f729492006-01-18 17:44:05 -08001368 return -EINVAL;
1369 }
1370
1371 if (sigmask) {
1372 if (sigsetsize != sizeof(compat_sigset_t))
1373 return -EINVAL;
1374 if (copy_from_user(&ss32, sigmask, sizeof(ss32)))
1375 return -EFAULT;
1376 sigset_from_compat(&ksigmask, &ss32);
1377
1378 sigdelsetmask(&ksigmask, sigmask(SIGKILL)|sigmask(SIGSTOP));
1379 sigprocmask(SIG_SETMASK, &ksigmask, &sigsaved);
1380 }
1381
Arjan van de Ven8ff3e8e2008-08-31 08:26:40 -07001382 ret = compat_core_sys_select(n, inp, outp, exp, to);
1383 ret = poll_select_copy_remaining(&end_time, tsp, 0, ret);
David Woodhouse9f729492006-01-18 17:44:05 -08001384
1385 if (ret == -ERESTARTNOHAND) {
1386 /*
1387 * Don't restore the signal mask yet. Let do_signal() deliver
1388 * the signal on the way back to userspace, before the signal
1389 * mask is restored.
1390 */
1391 if (sigmask) {
1392 memcpy(&current->saved_sigmask, &sigsaved,
1393 sizeof(sigsaved));
Roland McGrath4e4c22c2008-04-30 00:53:06 -07001394 set_restore_sigmask();
David Woodhouse9f729492006-01-18 17:44:05 -08001395 }
1396 } else if (sigmask)
1397 sigprocmask(SIG_SETMASK, &sigsaved, NULL);
1398
1399 return ret;
1400}
1401
Heiko Carstens625b1d72014-03-04 10:53:50 +01001402COMPAT_SYSCALL_DEFINE6(pselect6, int, n, compat_ulong_t __user *, inp,
1403 compat_ulong_t __user *, outp, compat_ulong_t __user *, exp,
1404 struct compat_timespec __user *, tsp, void __user *, sig)
David Woodhouse9f729492006-01-18 17:44:05 -08001405{
1406 compat_size_t sigsetsize = 0;
1407 compat_uptr_t up = 0;
1408
1409 if (sig) {
1410 if (!access_ok(VERIFY_READ, sig,
1411 sizeof(compat_uptr_t)+sizeof(compat_size_t)) ||
1412 __get_user(up, (compat_uptr_t __user *)sig) ||
1413 __get_user(sigsetsize,
1414 (compat_size_t __user *)(sig+sizeof(up))))
1415 return -EFAULT;
1416 }
Heiko Carstensc9da9f22009-01-14 14:13:57 +01001417 return do_compat_pselect(n, inp, outp, exp, tsp, compat_ptr(up),
1418 sigsetsize);
David Woodhouse9f729492006-01-18 17:44:05 -08001419}
1420
Heiko Carstens625b1d72014-03-04 10:53:50 +01001421COMPAT_SYSCALL_DEFINE5(ppoll, struct pollfd __user *, ufds,
1422 unsigned int, nfds, struct compat_timespec __user *, tsp,
1423 const compat_sigset_t __user *, sigmask, compat_size_t, sigsetsize)
David Woodhouse9f729492006-01-18 17:44:05 -08001424{
1425 compat_sigset_t ss32;
1426 sigset_t ksigmask, sigsaved;
1427 struct compat_timespec ts;
Arjan van de Ven8ff3e8e2008-08-31 08:26:40 -07001428 struct timespec end_time, *to = NULL;
David Woodhouse9f729492006-01-18 17:44:05 -08001429 int ret;
1430
1431 if (tsp) {
1432 if (copy_from_user(&ts, tsp, sizeof(ts)))
1433 return -EFAULT;
1434
Arjan van de Ven8ff3e8e2008-08-31 08:26:40 -07001435 to = &end_time;
1436 if (poll_select_set_timeout(to, ts.tv_sec, ts.tv_nsec))
1437 return -EINVAL;
David Woodhouse9f729492006-01-18 17:44:05 -08001438 }
1439
1440 if (sigmask) {
Alexey Dobriyan3835a9b2006-05-15 09:44:27 -07001441 if (sigsetsize != sizeof(compat_sigset_t))
David Woodhouse9f729492006-01-18 17:44:05 -08001442 return -EINVAL;
1443 if (copy_from_user(&ss32, sigmask, sizeof(ss32)))
1444 return -EFAULT;
1445 sigset_from_compat(&ksigmask, &ss32);
1446
1447 sigdelsetmask(&ksigmask, sigmask(SIGKILL)|sigmask(SIGSTOP));
1448 sigprocmask(SIG_SETMASK, &ksigmask, &sigsaved);
1449 }
1450
Arjan van de Ven8ff3e8e2008-08-31 08:26:40 -07001451 ret = do_sys_poll(ufds, nfds, to);
David Woodhouse9f729492006-01-18 17:44:05 -08001452
1453 /* We can restart this syscall, usually */
1454 if (ret == -EINTR) {
1455 /*
1456 * Don't restore the signal mask yet. Let do_signal() deliver
1457 * the signal on the way back to userspace, before the signal
1458 * mask is restored.
1459 */
1460 if (sigmask) {
1461 memcpy(&current->saved_sigmask, &sigsaved,
1462 sizeof(sigsaved));
Roland McGrath4e4c22c2008-04-30 00:53:06 -07001463 set_restore_sigmask();
David Woodhouse9f729492006-01-18 17:44:05 -08001464 }
1465 ret = -ERESTARTNOHAND;
1466 } else if (sigmask)
1467 sigprocmask(SIG_SETMASK, &sigsaved, NULL);
1468
Arjan van de Ven8ff3e8e2008-08-31 08:26:40 -07001469 ret = poll_select_copy_remaining(&end_time, tsp, 0, ret);
David Woodhouse9f729492006-01-18 17:44:05 -08001470
1471 return ret;
1472}
David Woodhouse9f729492006-01-18 17:44:05 -08001473
Aneesh Kumar K.Vbecfd1f2011-01-29 18:43:26 +05301474#ifdef CONFIG_FHANDLE
1475/*
1476 * Exactly like fs/open.c:sys_open_by_handle_at(), except that it
1477 * doesn't set the O_LARGEFILE flag.
1478 */
Al Virof482e1b2012-12-25 20:24:38 -05001479COMPAT_SYSCALL_DEFINE3(open_by_handle_at, int, mountdirfd,
1480 struct file_handle __user *, handle, int, flags)
Aneesh Kumar K.Vbecfd1f2011-01-29 18:43:26 +05301481{
1482 return do_handle_open(mountdirfd, handle, flags);
1483}
1484#endif