fujitsu-laptop: Use RFKILL support bitmask from firmware
[linux-2.6/verdex.git] / fs / compat.c
blobd0145ca27572890b958765c72795a2b291628c20
1 /*
2 * linux/fs/compat.c
4 * Kernel compatibililty routines for e.g. 32 bit syscall support
5 * on 64 bit kernels.
7 * Copyright (C) 2002 Stephen Rothwell, IBM Corporation
8 * Copyright (C) 1997-2000 Jakub Jelinek (jakub@redhat.com)
9 * Copyright (C) 1998 Eddie C. Dost (ecd@skynet.be)
10 * Copyright (C) 2001,2002 Andi Kleen, SuSE Labs
11 * Copyright (C) 2003 Pavel Machek (pavel@suse.cz)
13 * This program is free software; you can redistribute it and/or modify
14 * it under the terms of the GNU General Public License version 2 as
15 * published by the Free Software Foundation.
18 #include <linux/kernel.h>
19 #include <linux/linkage.h>
20 #include <linux/compat.h>
21 #include <linux/errno.h>
22 #include <linux/time.h>
23 #include <linux/fs.h>
24 #include <linux/fcntl.h>
25 #include <linux/namei.h>
26 #include <linux/file.h>
27 #include <linux/fdtable.h>
28 #include <linux/vfs.h>
29 #include <linux/ioctl.h>
30 #include <linux/init.h>
31 #include <linux/smb.h>
32 #include <linux/smb_mount.h>
33 #include <linux/ncp_mount.h>
34 #include <linux/nfs4_mount.h>
35 #include <linux/smp_lock.h>
36 #include <linux/syscalls.h>
37 #include <linux/ctype.h>
38 #include <linux/module.h>
39 #include <linux/dirent.h>
40 #include <linux/fsnotify.h>
41 #include <linux/highuid.h>
42 #include <linux/sunrpc/svc.h>
43 #include <linux/nfsd/nfsd.h>
44 #include <linux/nfsd/syscall.h>
45 #include <linux/personality.h>
46 #include <linux/rwsem.h>
47 #include <linux/tsacct_kern.h>
48 #include <linux/security.h>
49 #include <linux/highmem.h>
50 #include <linux/signal.h>
51 #include <linux/poll.h>
52 #include <linux/mm.h>
53 #include <linux/eventpoll.h>
55 #include <asm/uaccess.h>
56 #include <asm/mmu_context.h>
57 #include <asm/ioctls.h>
58 #include "internal.h"
60 int compat_log = 1;
62 int compat_printk(const char *fmt, ...)
64 va_list ap;
65 int ret;
66 if (!compat_log)
67 return 0;
68 va_start(ap, fmt);
69 ret = vprintk(fmt, ap);
70 va_end(ap);
71 return ret;
74 #include "read_write.h"
77 * Not all architectures have sys_utime, so implement this in terms
78 * of sys_utimes.
80 asmlinkage long compat_sys_utime(char __user *filename, struct compat_utimbuf __user *t)
82 struct timespec tv[2];
84 if (t) {
85 if (get_user(tv[0].tv_sec, &t->actime) ||
86 get_user(tv[1].tv_sec, &t->modtime))
87 return -EFAULT;
88 tv[0].tv_nsec = 0;
89 tv[1].tv_nsec = 0;
91 return do_utimes(AT_FDCWD, filename, t ? tv : NULL, 0);
94 asmlinkage long compat_sys_utimensat(unsigned int dfd, char __user *filename, struct compat_timespec __user *t, int flags)
96 struct timespec tv[2];
98 if (t) {
99 if (get_compat_timespec(&tv[0], &t[0]) ||
100 get_compat_timespec(&tv[1], &t[1]))
101 return -EFAULT;
103 if ((tv[0].tv_nsec == UTIME_OMIT || tv[0].tv_nsec == UTIME_NOW)
104 && tv[0].tv_sec != 0)
105 return -EINVAL;
106 if ((tv[1].tv_nsec == UTIME_OMIT || tv[1].tv_nsec == UTIME_NOW)
107 && tv[1].tv_sec != 0)
108 return -EINVAL;
110 if (tv[0].tv_nsec == UTIME_OMIT && tv[1].tv_nsec == UTIME_OMIT)
111 return 0;
113 return do_utimes(dfd, filename, t ? tv : NULL, flags);
116 asmlinkage long compat_sys_futimesat(unsigned int dfd, char __user *filename, struct compat_timeval __user *t)
118 struct timespec tv[2];
120 if (t) {
121 if (get_user(tv[0].tv_sec, &t[0].tv_sec) ||
122 get_user(tv[0].tv_nsec, &t[0].tv_usec) ||
123 get_user(tv[1].tv_sec, &t[1].tv_sec) ||
124 get_user(tv[1].tv_nsec, &t[1].tv_usec))
125 return -EFAULT;
126 if (tv[0].tv_nsec >= 1000000 || tv[0].tv_nsec < 0 ||
127 tv[1].tv_nsec >= 1000000 || tv[1].tv_nsec < 0)
128 return -EINVAL;
129 tv[0].tv_nsec *= 1000;
130 tv[1].tv_nsec *= 1000;
132 return do_utimes(dfd, filename, t ? tv : NULL, 0);
135 asmlinkage long compat_sys_utimes(char __user *filename, struct compat_timeval __user *t)
137 return compat_sys_futimesat(AT_FDCWD, filename, t);
140 static int cp_compat_stat(struct kstat *stat, struct compat_stat __user *ubuf)
142 compat_ino_t ino = stat->ino;
143 typeof(ubuf->st_uid) uid = 0;
144 typeof(ubuf->st_gid) gid = 0;
145 int err;
147 SET_UID(uid, stat->uid);
148 SET_GID(gid, stat->gid);
150 if ((u64) stat->size > MAX_NON_LFS ||
151 !old_valid_dev(stat->dev) ||
152 !old_valid_dev(stat->rdev))
153 return -EOVERFLOW;
154 if (sizeof(ino) < sizeof(stat->ino) && ino != stat->ino)
155 return -EOVERFLOW;
157 if (clear_user(ubuf, sizeof(*ubuf)))
158 return -EFAULT;
160 err = __put_user(old_encode_dev(stat->dev), &ubuf->st_dev);
161 err |= __put_user(ino, &ubuf->st_ino);
162 err |= __put_user(stat->mode, &ubuf->st_mode);
163 err |= __put_user(stat->nlink, &ubuf->st_nlink);
164 err |= __put_user(uid, &ubuf->st_uid);
165 err |= __put_user(gid, &ubuf->st_gid);
166 err |= __put_user(old_encode_dev(stat->rdev), &ubuf->st_rdev);
167 err |= __put_user(stat->size, &ubuf->st_size);
168 err |= __put_user(stat->atime.tv_sec, &ubuf->st_atime);
169 err |= __put_user(stat->atime.tv_nsec, &ubuf->st_atime_nsec);
170 err |= __put_user(stat->mtime.tv_sec, &ubuf->st_mtime);
171 err |= __put_user(stat->mtime.tv_nsec, &ubuf->st_mtime_nsec);
172 err |= __put_user(stat->ctime.tv_sec, &ubuf->st_ctime);
173 err |= __put_user(stat->ctime.tv_nsec, &ubuf->st_ctime_nsec);
174 err |= __put_user(stat->blksize, &ubuf->st_blksize);
175 err |= __put_user(stat->blocks, &ubuf->st_blocks);
176 return err;
179 asmlinkage long compat_sys_newstat(char __user * filename,
180 struct compat_stat __user *statbuf)
182 struct kstat stat;
183 int error = vfs_stat_fd(AT_FDCWD, filename, &stat);
185 if (!error)
186 error = cp_compat_stat(&stat, statbuf);
187 return error;
190 asmlinkage long compat_sys_newlstat(char __user * filename,
191 struct compat_stat __user *statbuf)
193 struct kstat stat;
194 int error = vfs_lstat_fd(AT_FDCWD, filename, &stat);
196 if (!error)
197 error = cp_compat_stat(&stat, statbuf);
198 return error;
201 #ifndef __ARCH_WANT_STAT64
202 asmlinkage long compat_sys_newfstatat(unsigned int dfd, char __user *filename,
203 struct compat_stat __user *statbuf, int flag)
205 struct kstat stat;
206 int error = -EINVAL;
208 if ((flag & ~AT_SYMLINK_NOFOLLOW) != 0)
209 goto out;
211 if (flag & AT_SYMLINK_NOFOLLOW)
212 error = vfs_lstat_fd(dfd, filename, &stat);
213 else
214 error = vfs_stat_fd(dfd, filename, &stat);
216 if (!error)
217 error = cp_compat_stat(&stat, statbuf);
219 out:
220 return error;
222 #endif
224 asmlinkage long compat_sys_newfstat(unsigned int fd,
225 struct compat_stat __user * statbuf)
227 struct kstat stat;
228 int error = vfs_fstat(fd, &stat);
230 if (!error)
231 error = cp_compat_stat(&stat, statbuf);
232 return error;
235 static int put_compat_statfs(struct compat_statfs __user *ubuf, struct kstatfs *kbuf)
238 if (sizeof ubuf->f_blocks == 4) {
239 if ((kbuf->f_blocks | kbuf->f_bfree | kbuf->f_bavail |
240 kbuf->f_bsize | kbuf->f_frsize) & 0xffffffff00000000ULL)
241 return -EOVERFLOW;
242 /* f_files and f_ffree may be -1; it's okay
243 * to stuff that into 32 bits */
244 if (kbuf->f_files != 0xffffffffffffffffULL
245 && (kbuf->f_files & 0xffffffff00000000ULL))
246 return -EOVERFLOW;
247 if (kbuf->f_ffree != 0xffffffffffffffffULL
248 && (kbuf->f_ffree & 0xffffffff00000000ULL))
249 return -EOVERFLOW;
251 if (!access_ok(VERIFY_WRITE, ubuf, sizeof(*ubuf)) ||
252 __put_user(kbuf->f_type, &ubuf->f_type) ||
253 __put_user(kbuf->f_bsize, &ubuf->f_bsize) ||
254 __put_user(kbuf->f_blocks, &ubuf->f_blocks) ||
255 __put_user(kbuf->f_bfree, &ubuf->f_bfree) ||
256 __put_user(kbuf->f_bavail, &ubuf->f_bavail) ||
257 __put_user(kbuf->f_files, &ubuf->f_files) ||
258 __put_user(kbuf->f_ffree, &ubuf->f_ffree) ||
259 __put_user(kbuf->f_namelen, &ubuf->f_namelen) ||
260 __put_user(kbuf->f_fsid.val[0], &ubuf->f_fsid.val[0]) ||
261 __put_user(kbuf->f_fsid.val[1], &ubuf->f_fsid.val[1]) ||
262 __put_user(kbuf->f_frsize, &ubuf->f_frsize) ||
263 __put_user(0, &ubuf->f_spare[0]) ||
264 __put_user(0, &ubuf->f_spare[1]) ||
265 __put_user(0, &ubuf->f_spare[2]) ||
266 __put_user(0, &ubuf->f_spare[3]) ||
267 __put_user(0, &ubuf->f_spare[4]))
268 return -EFAULT;
269 return 0;
273 * The following statfs calls are copies of code from fs/open.c and
274 * should be checked against those from time to time
276 asmlinkage long compat_sys_statfs(const char __user *pathname, struct compat_statfs __user *buf)
278 struct path path;
279 int error;
281 error = user_path(pathname, &path);
282 if (!error) {
283 struct kstatfs tmp;
284 error = vfs_statfs(path.dentry, &tmp);
285 if (!error)
286 error = put_compat_statfs(buf, &tmp);
287 path_put(&path);
289 return error;
292 asmlinkage long compat_sys_fstatfs(unsigned int fd, struct compat_statfs __user *buf)
294 struct file * file;
295 struct kstatfs tmp;
296 int error;
298 error = -EBADF;
299 file = fget(fd);
300 if (!file)
301 goto out;
302 error = vfs_statfs(file->f_path.dentry, &tmp);
303 if (!error)
304 error = put_compat_statfs(buf, &tmp);
305 fput(file);
306 out:
307 return error;
310 static int put_compat_statfs64(struct compat_statfs64 __user *ubuf, struct kstatfs *kbuf)
312 if (sizeof ubuf->f_blocks == 4) {
313 if ((kbuf->f_blocks | kbuf->f_bfree | kbuf->f_bavail |
314 kbuf->f_bsize | kbuf->f_frsize) & 0xffffffff00000000ULL)
315 return -EOVERFLOW;
316 /* f_files and f_ffree may be -1; it's okay
317 * to stuff that into 32 bits */
318 if (kbuf->f_files != 0xffffffffffffffffULL
319 && (kbuf->f_files & 0xffffffff00000000ULL))
320 return -EOVERFLOW;
321 if (kbuf->f_ffree != 0xffffffffffffffffULL
322 && (kbuf->f_ffree & 0xffffffff00000000ULL))
323 return -EOVERFLOW;
325 if (!access_ok(VERIFY_WRITE, ubuf, sizeof(*ubuf)) ||
326 __put_user(kbuf->f_type, &ubuf->f_type) ||
327 __put_user(kbuf->f_bsize, &ubuf->f_bsize) ||
328 __put_user(kbuf->f_blocks, &ubuf->f_blocks) ||
329 __put_user(kbuf->f_bfree, &ubuf->f_bfree) ||
330 __put_user(kbuf->f_bavail, &ubuf->f_bavail) ||
331 __put_user(kbuf->f_files, &ubuf->f_files) ||
332 __put_user(kbuf->f_ffree, &ubuf->f_ffree) ||
333 __put_user(kbuf->f_namelen, &ubuf->f_namelen) ||
334 __put_user(kbuf->f_fsid.val[0], &ubuf->f_fsid.val[0]) ||
335 __put_user(kbuf->f_fsid.val[1], &ubuf->f_fsid.val[1]) ||
336 __put_user(kbuf->f_frsize, &ubuf->f_frsize))
337 return -EFAULT;
338 return 0;
341 asmlinkage long compat_sys_statfs64(const char __user *pathname, compat_size_t sz, struct compat_statfs64 __user *buf)
343 struct path path;
344 int error;
346 if (sz != sizeof(*buf))
347 return -EINVAL;
349 error = user_path(pathname, &path);
350 if (!error) {
351 struct kstatfs tmp;
352 error = vfs_statfs(path.dentry, &tmp);
353 if (!error)
354 error = put_compat_statfs64(buf, &tmp);
355 path_put(&path);
357 return error;
360 asmlinkage long compat_sys_fstatfs64(unsigned int fd, compat_size_t sz, struct compat_statfs64 __user *buf)
362 struct file * file;
363 struct kstatfs tmp;
364 int error;
366 if (sz != sizeof(*buf))
367 return -EINVAL;
369 error = -EBADF;
370 file = fget(fd);
371 if (!file)
372 goto out;
373 error = vfs_statfs(file->f_path.dentry, &tmp);
374 if (!error)
375 error = put_compat_statfs64(buf, &tmp);
376 fput(file);
377 out:
378 return error;
381 static int get_compat_flock(struct flock *kfl, struct compat_flock __user *ufl)
383 if (!access_ok(VERIFY_READ, ufl, sizeof(*ufl)) ||
384 __get_user(kfl->l_type, &ufl->l_type) ||
385 __get_user(kfl->l_whence, &ufl->l_whence) ||
386 __get_user(kfl->l_start, &ufl->l_start) ||
387 __get_user(kfl->l_len, &ufl->l_len) ||
388 __get_user(kfl->l_pid, &ufl->l_pid))
389 return -EFAULT;
390 return 0;
393 static int put_compat_flock(struct flock *kfl, struct compat_flock __user *ufl)
395 if (!access_ok(VERIFY_WRITE, ufl, sizeof(*ufl)) ||
396 __put_user(kfl->l_type, &ufl->l_type) ||
397 __put_user(kfl->l_whence, &ufl->l_whence) ||
398 __put_user(kfl->l_start, &ufl->l_start) ||
399 __put_user(kfl->l_len, &ufl->l_len) ||
400 __put_user(kfl->l_pid, &ufl->l_pid))
401 return -EFAULT;
402 return 0;
405 #ifndef HAVE_ARCH_GET_COMPAT_FLOCK64
406 static int get_compat_flock64(struct flock *kfl, struct compat_flock64 __user *ufl)
408 if (!access_ok(VERIFY_READ, ufl, sizeof(*ufl)) ||
409 __get_user(kfl->l_type, &ufl->l_type) ||
410 __get_user(kfl->l_whence, &ufl->l_whence) ||
411 __get_user(kfl->l_start, &ufl->l_start) ||
412 __get_user(kfl->l_len, &ufl->l_len) ||
413 __get_user(kfl->l_pid, &ufl->l_pid))
414 return -EFAULT;
415 return 0;
417 #endif
419 #ifndef HAVE_ARCH_PUT_COMPAT_FLOCK64
420 static int put_compat_flock64(struct flock *kfl, struct compat_flock64 __user *ufl)
422 if (!access_ok(VERIFY_WRITE, ufl, sizeof(*ufl)) ||
423 __put_user(kfl->l_type, &ufl->l_type) ||
424 __put_user(kfl->l_whence, &ufl->l_whence) ||
425 __put_user(kfl->l_start, &ufl->l_start) ||
426 __put_user(kfl->l_len, &ufl->l_len) ||
427 __put_user(kfl->l_pid, &ufl->l_pid))
428 return -EFAULT;
429 return 0;
431 #endif
433 asmlinkage long compat_sys_fcntl64(unsigned int fd, unsigned int cmd,
434 unsigned long arg)
436 mm_segment_t old_fs;
437 struct flock f;
438 long ret;
440 switch (cmd) {
441 case F_GETLK:
442 case F_SETLK:
443 case F_SETLKW:
444 ret = get_compat_flock(&f, compat_ptr(arg));
445 if (ret != 0)
446 break;
447 old_fs = get_fs();
448 set_fs(KERNEL_DS);
449 ret = sys_fcntl(fd, cmd, (unsigned long)&f);
450 set_fs(old_fs);
451 if (cmd == F_GETLK && ret == 0) {
452 /* GETLK was successfule and we need to return the data...
453 * but it needs to fit in the compat structure.
454 * l_start shouldn't be too big, unless the original
455 * start + end is greater than COMPAT_OFF_T_MAX, in which
456 * case the app was asking for trouble, so we return
457 * -EOVERFLOW in that case.
458 * l_len could be too big, in which case we just truncate it,
459 * and only allow the app to see that part of the conflicting
460 * lock that might make sense to it anyway
463 if (f.l_start > COMPAT_OFF_T_MAX)
464 ret = -EOVERFLOW;
465 if (f.l_len > COMPAT_OFF_T_MAX)
466 f.l_len = COMPAT_OFF_T_MAX;
467 if (ret == 0)
468 ret = put_compat_flock(&f, compat_ptr(arg));
470 break;
472 case F_GETLK64:
473 case F_SETLK64:
474 case F_SETLKW64:
475 ret = get_compat_flock64(&f, compat_ptr(arg));
476 if (ret != 0)
477 break;
478 old_fs = get_fs();
479 set_fs(KERNEL_DS);
480 ret = sys_fcntl(fd, (cmd == F_GETLK64) ? F_GETLK :
481 ((cmd == F_SETLK64) ? F_SETLK : F_SETLKW),
482 (unsigned long)&f);
483 set_fs(old_fs);
484 if (cmd == F_GETLK64 && ret == 0) {
485 /* need to return lock information - see above for commentary */
486 if (f.l_start > COMPAT_LOFF_T_MAX)
487 ret = -EOVERFLOW;
488 if (f.l_len > COMPAT_LOFF_T_MAX)
489 f.l_len = COMPAT_LOFF_T_MAX;
490 if (ret == 0)
491 ret = put_compat_flock64(&f, compat_ptr(arg));
493 break;
495 default:
496 ret = sys_fcntl(fd, cmd, arg);
497 break;
499 return ret;
502 asmlinkage long compat_sys_fcntl(unsigned int fd, unsigned int cmd,
503 unsigned long arg)
505 if ((cmd == F_GETLK64) || (cmd == F_SETLK64) || (cmd == F_SETLKW64))
506 return -EINVAL;
507 return compat_sys_fcntl64(fd, cmd, arg);
510 asmlinkage long
511 compat_sys_io_setup(unsigned nr_reqs, u32 __user *ctx32p)
513 long ret;
514 aio_context_t ctx64;
516 mm_segment_t oldfs = get_fs();
517 if (unlikely(get_user(ctx64, ctx32p)))
518 return -EFAULT;
520 set_fs(KERNEL_DS);
521 /* The __user pointer cast is valid because of the set_fs() */
522 ret = sys_io_setup(nr_reqs, (aio_context_t __user *) &ctx64);
523 set_fs(oldfs);
524 /* truncating is ok because it's a user address */
525 if (!ret)
526 ret = put_user((u32) ctx64, ctx32p);
527 return ret;
530 asmlinkage long
531 compat_sys_io_getevents(aio_context_t ctx_id,
532 unsigned long min_nr,
533 unsigned long nr,
534 struct io_event __user *events,
535 struct compat_timespec __user *timeout)
537 long ret;
538 struct timespec t;
539 struct timespec __user *ut = NULL;
541 ret = -EFAULT;
542 if (unlikely(!access_ok(VERIFY_WRITE, events,
543 nr * sizeof(struct io_event))))
544 goto out;
545 if (timeout) {
546 if (get_compat_timespec(&t, timeout))
547 goto out;
549 ut = compat_alloc_user_space(sizeof(*ut));
550 if (copy_to_user(ut, &t, sizeof(t)) )
551 goto out;
553 ret = sys_io_getevents(ctx_id, min_nr, nr, events, ut);
554 out:
555 return ret;
558 static inline long
559 copy_iocb(long nr, u32 __user *ptr32, struct iocb __user * __user *ptr64)
561 compat_uptr_t uptr;
562 int i;
564 for (i = 0; i < nr; ++i) {
565 if (get_user(uptr, ptr32 + i))
566 return -EFAULT;
567 if (put_user(compat_ptr(uptr), ptr64 + i))
568 return -EFAULT;
570 return 0;
573 #define MAX_AIO_SUBMITS (PAGE_SIZE/sizeof(struct iocb *))
575 asmlinkage long
576 compat_sys_io_submit(aio_context_t ctx_id, int nr, u32 __user *iocb)
578 struct iocb __user * __user *iocb64;
579 long ret;
581 if (unlikely(nr < 0))
582 return -EINVAL;
584 if (nr > MAX_AIO_SUBMITS)
585 nr = MAX_AIO_SUBMITS;
587 iocb64 = compat_alloc_user_space(nr * sizeof(*iocb64));
588 ret = copy_iocb(nr, iocb, iocb64);
589 if (!ret)
590 ret = sys_io_submit(ctx_id, nr, iocb64);
591 return ret;
594 struct compat_ncp_mount_data {
595 compat_int_t version;
596 compat_uint_t ncp_fd;
597 __compat_uid_t mounted_uid;
598 compat_pid_t wdog_pid;
599 unsigned char mounted_vol[NCP_VOLNAME_LEN + 1];
600 compat_uint_t time_out;
601 compat_uint_t retry_count;
602 compat_uint_t flags;
603 __compat_uid_t uid;
604 __compat_gid_t gid;
605 compat_mode_t file_mode;
606 compat_mode_t dir_mode;
609 struct compat_ncp_mount_data_v4 {
610 compat_int_t version;
611 compat_ulong_t flags;
612 compat_ulong_t mounted_uid;
613 compat_long_t wdog_pid;
614 compat_uint_t ncp_fd;
615 compat_uint_t time_out;
616 compat_uint_t retry_count;
617 compat_ulong_t uid;
618 compat_ulong_t gid;
619 compat_ulong_t file_mode;
620 compat_ulong_t dir_mode;
623 static void *do_ncp_super_data_conv(void *raw_data)
625 int version = *(unsigned int *)raw_data;
627 if (version == 3) {
628 struct compat_ncp_mount_data *c_n = raw_data;
629 struct ncp_mount_data *n = raw_data;
631 n->dir_mode = c_n->dir_mode;
632 n->file_mode = c_n->file_mode;
633 n->gid = c_n->gid;
634 n->uid = c_n->uid;
635 memmove (n->mounted_vol, c_n->mounted_vol, (sizeof (c_n->mounted_vol) + 3 * sizeof (unsigned int)));
636 n->wdog_pid = c_n->wdog_pid;
637 n->mounted_uid = c_n->mounted_uid;
638 } else if (version == 4) {
639 struct compat_ncp_mount_data_v4 *c_n = raw_data;
640 struct ncp_mount_data_v4 *n = raw_data;
642 n->dir_mode = c_n->dir_mode;
643 n->file_mode = c_n->file_mode;
644 n->gid = c_n->gid;
645 n->uid = c_n->uid;
646 n->retry_count = c_n->retry_count;
647 n->time_out = c_n->time_out;
648 n->ncp_fd = c_n->ncp_fd;
649 n->wdog_pid = c_n->wdog_pid;
650 n->mounted_uid = c_n->mounted_uid;
651 n->flags = c_n->flags;
652 } else if (version != 5) {
653 return NULL;
656 return raw_data;
659 struct compat_smb_mount_data {
660 compat_int_t version;
661 __compat_uid_t mounted_uid;
662 __compat_uid_t uid;
663 __compat_gid_t gid;
664 compat_mode_t file_mode;
665 compat_mode_t dir_mode;
668 static void *do_smb_super_data_conv(void *raw_data)
670 struct smb_mount_data *s = raw_data;
671 struct compat_smb_mount_data *c_s = raw_data;
673 if (c_s->version != SMB_MOUNT_OLDVERSION)
674 goto out;
675 s->dir_mode = c_s->dir_mode;
676 s->file_mode = c_s->file_mode;
677 s->gid = c_s->gid;
678 s->uid = c_s->uid;
679 s->mounted_uid = c_s->mounted_uid;
680 out:
681 return raw_data;
684 struct compat_nfs_string {
685 compat_uint_t len;
686 compat_uptr_t data;
689 static inline void compat_nfs_string(struct nfs_string *dst,
690 struct compat_nfs_string *src)
692 dst->data = compat_ptr(src->data);
693 dst->len = src->len;
696 struct compat_nfs4_mount_data_v1 {
697 compat_int_t version;
698 compat_int_t flags;
699 compat_int_t rsize;
700 compat_int_t wsize;
701 compat_int_t timeo;
702 compat_int_t retrans;
703 compat_int_t acregmin;
704 compat_int_t acregmax;
705 compat_int_t acdirmin;
706 compat_int_t acdirmax;
707 struct compat_nfs_string client_addr;
708 struct compat_nfs_string mnt_path;
709 struct compat_nfs_string hostname;
710 compat_uint_t host_addrlen;
711 compat_uptr_t host_addr;
712 compat_int_t proto;
713 compat_int_t auth_flavourlen;
714 compat_uptr_t auth_flavours;
717 static int do_nfs4_super_data_conv(void *raw_data)
719 int version = *(compat_uint_t *) raw_data;
721 if (version == 1) {
722 struct compat_nfs4_mount_data_v1 *raw = raw_data;
723 struct nfs4_mount_data *real = raw_data;
725 /* copy the fields backwards */
726 real->auth_flavours = compat_ptr(raw->auth_flavours);
727 real->auth_flavourlen = raw->auth_flavourlen;
728 real->proto = raw->proto;
729 real->host_addr = compat_ptr(raw->host_addr);
730 real->host_addrlen = raw->host_addrlen;
731 compat_nfs_string(&real->hostname, &raw->hostname);
732 compat_nfs_string(&real->mnt_path, &raw->mnt_path);
733 compat_nfs_string(&real->client_addr, &raw->client_addr);
734 real->acdirmax = raw->acdirmax;
735 real->acdirmin = raw->acdirmin;
736 real->acregmax = raw->acregmax;
737 real->acregmin = raw->acregmin;
738 real->retrans = raw->retrans;
739 real->timeo = raw->timeo;
740 real->wsize = raw->wsize;
741 real->rsize = raw->rsize;
742 real->flags = raw->flags;
743 real->version = raw->version;
746 return 0;
749 #define SMBFS_NAME "smbfs"
750 #define NCPFS_NAME "ncpfs"
751 #define NFS4_NAME "nfs4"
753 asmlinkage long compat_sys_mount(char __user * dev_name, char __user * dir_name,
754 char __user * type, unsigned long flags,
755 void __user * data)
757 unsigned long type_page;
758 unsigned long data_page;
759 unsigned long dev_page;
760 char *dir_page;
761 int retval;
763 retval = copy_mount_options (type, &type_page);
764 if (retval < 0)
765 goto out;
767 dir_page = getname(dir_name);
768 retval = PTR_ERR(dir_page);
769 if (IS_ERR(dir_page))
770 goto out1;
772 retval = copy_mount_options (dev_name, &dev_page);
773 if (retval < 0)
774 goto out2;
776 retval = copy_mount_options (data, &data_page);
777 if (retval < 0)
778 goto out3;
780 retval = -EINVAL;
782 if (type_page && data_page) {
783 if (!strcmp((char *)type_page, SMBFS_NAME)) {
784 do_smb_super_data_conv((void *)data_page);
785 } else if (!strcmp((char *)type_page, NCPFS_NAME)) {
786 do_ncp_super_data_conv((void *)data_page);
787 } else if (!strcmp((char *)type_page, NFS4_NAME)) {
788 if (do_nfs4_super_data_conv((void *) data_page))
789 goto out4;
793 lock_kernel();
794 retval = do_mount((char*)dev_page, dir_page, (char*)type_page,
795 flags, (void*)data_page);
796 unlock_kernel();
798 out4:
799 free_page(data_page);
800 out3:
801 free_page(dev_page);
802 out2:
803 putname(dir_page);
804 out1:
805 free_page(type_page);
806 out:
807 return retval;
810 #define NAME_OFFSET(de) ((int) ((de)->d_name - (char __user *) (de)))
812 struct compat_old_linux_dirent {
813 compat_ulong_t d_ino;
814 compat_ulong_t d_offset;
815 unsigned short d_namlen;
816 char d_name[1];
819 struct compat_readdir_callback {
820 struct compat_old_linux_dirent __user *dirent;
821 int result;
824 static int compat_fillonedir(void *__buf, const char *name, int namlen,
825 loff_t offset, u64 ino, unsigned int d_type)
827 struct compat_readdir_callback *buf = __buf;
828 struct compat_old_linux_dirent __user *dirent;
829 compat_ulong_t d_ino;
831 if (buf->result)
832 return -EINVAL;
833 d_ino = ino;
834 if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) {
835 buf->result = -EOVERFLOW;
836 return -EOVERFLOW;
838 buf->result++;
839 dirent = buf->dirent;
840 if (!access_ok(VERIFY_WRITE, dirent,
841 (unsigned long)(dirent->d_name + namlen + 1) -
842 (unsigned long)dirent))
843 goto efault;
844 if ( __put_user(d_ino, &dirent->d_ino) ||
845 __put_user(offset, &dirent->d_offset) ||
846 __put_user(namlen, &dirent->d_namlen) ||
847 __copy_to_user(dirent->d_name, name, namlen) ||
848 __put_user(0, dirent->d_name + namlen))
849 goto efault;
850 return 0;
851 efault:
852 buf->result = -EFAULT;
853 return -EFAULT;
856 asmlinkage long compat_sys_old_readdir(unsigned int fd,
857 struct compat_old_linux_dirent __user *dirent, unsigned int count)
859 int error;
860 struct file *file;
861 struct compat_readdir_callback buf;
863 error = -EBADF;
864 file = fget(fd);
865 if (!file)
866 goto out;
868 buf.result = 0;
869 buf.dirent = dirent;
871 error = vfs_readdir(file, compat_fillonedir, &buf);
872 if (buf.result)
873 error = buf.result;
875 fput(file);
876 out:
877 return error;
880 struct compat_linux_dirent {
881 compat_ulong_t d_ino;
882 compat_ulong_t d_off;
883 unsigned short d_reclen;
884 char d_name[1];
887 struct compat_getdents_callback {
888 struct compat_linux_dirent __user *current_dir;
889 struct compat_linux_dirent __user *previous;
890 int count;
891 int error;
894 static int compat_filldir(void *__buf, const char *name, int namlen,
895 loff_t offset, u64 ino, unsigned int d_type)
897 struct compat_linux_dirent __user * dirent;
898 struct compat_getdents_callback *buf = __buf;
899 compat_ulong_t d_ino;
900 int reclen = ALIGN(NAME_OFFSET(dirent) + namlen + 2, sizeof(compat_long_t));
902 buf->error = -EINVAL; /* only used if we fail.. */
903 if (reclen > buf->count)
904 return -EINVAL;
905 d_ino = ino;
906 if (sizeof(d_ino) < sizeof(ino) && d_ino != ino) {
907 buf->error = -EOVERFLOW;
908 return -EOVERFLOW;
910 dirent = buf->previous;
911 if (dirent) {
912 if (__put_user(offset, &dirent->d_off))
913 goto efault;
915 dirent = buf->current_dir;
916 if (__put_user(d_ino, &dirent->d_ino))
917 goto efault;
918 if (__put_user(reclen, &dirent->d_reclen))
919 goto efault;
920 if (copy_to_user(dirent->d_name, name, namlen))
921 goto efault;
922 if (__put_user(0, dirent->d_name + namlen))
923 goto efault;
924 if (__put_user(d_type, (char __user *) dirent + reclen - 1))
925 goto efault;
926 buf->previous = dirent;
927 dirent = (void __user *)dirent + reclen;
928 buf->current_dir = dirent;
929 buf->count -= reclen;
930 return 0;
931 efault:
932 buf->error = -EFAULT;
933 return -EFAULT;
936 asmlinkage long compat_sys_getdents(unsigned int fd,
937 struct compat_linux_dirent __user *dirent, unsigned int count)
939 struct file * file;
940 struct compat_linux_dirent __user * lastdirent;
941 struct compat_getdents_callback buf;
942 int error;
944 error = -EFAULT;
945 if (!access_ok(VERIFY_WRITE, dirent, count))
946 goto out;
948 error = -EBADF;
949 file = fget(fd);
950 if (!file)
951 goto out;
953 buf.current_dir = dirent;
954 buf.previous = NULL;
955 buf.count = count;
956 buf.error = 0;
958 error = vfs_readdir(file, compat_filldir, &buf);
959 if (error >= 0)
960 error = buf.error;
961 lastdirent = buf.previous;
962 if (lastdirent) {
963 if (put_user(file->f_pos, &lastdirent->d_off))
964 error = -EFAULT;
965 else
966 error = count - buf.count;
968 fput(file);
969 out:
970 return error;
973 #ifndef __ARCH_OMIT_COMPAT_SYS_GETDENTS64
975 struct compat_getdents_callback64 {
976 struct linux_dirent64 __user *current_dir;
977 struct linux_dirent64 __user *previous;
978 int count;
979 int error;
982 static int compat_filldir64(void * __buf, const char * name, int namlen, loff_t offset,
983 u64 ino, unsigned int d_type)
985 struct linux_dirent64 __user *dirent;
986 struct compat_getdents_callback64 *buf = __buf;
987 int jj = NAME_OFFSET(dirent);
988 int reclen = ALIGN(jj + namlen + 1, sizeof(u64));
989 u64 off;
991 buf->error = -EINVAL; /* only used if we fail.. */
992 if (reclen > buf->count)
993 return -EINVAL;
994 dirent = buf->previous;
996 if (dirent) {
997 if (__put_user_unaligned(offset, &dirent->d_off))
998 goto efault;
1000 dirent = buf->current_dir;
1001 if (__put_user_unaligned(ino, &dirent->d_ino))
1002 goto efault;
1003 off = 0;
1004 if (__put_user_unaligned(off, &dirent->d_off))
1005 goto efault;
1006 if (__put_user(reclen, &dirent->d_reclen))
1007 goto efault;
1008 if (__put_user(d_type, &dirent->d_type))
1009 goto efault;
1010 if (copy_to_user(dirent->d_name, name, namlen))
1011 goto efault;
1012 if (__put_user(0, dirent->d_name + namlen))
1013 goto efault;
1014 buf->previous = dirent;
1015 dirent = (void __user *)dirent + reclen;
1016 buf->current_dir = dirent;
1017 buf->count -= reclen;
1018 return 0;
1019 efault:
1020 buf->error = -EFAULT;
1021 return -EFAULT;
1024 asmlinkage long compat_sys_getdents64(unsigned int fd,
1025 struct linux_dirent64 __user * dirent, unsigned int count)
1027 struct file * file;
1028 struct linux_dirent64 __user * lastdirent;
1029 struct compat_getdents_callback64 buf;
1030 int error;
1032 error = -EFAULT;
1033 if (!access_ok(VERIFY_WRITE, dirent, count))
1034 goto out;
1036 error = -EBADF;
1037 file = fget(fd);
1038 if (!file)
1039 goto out;
1041 buf.current_dir = dirent;
1042 buf.previous = NULL;
1043 buf.count = count;
1044 buf.error = 0;
1046 error = vfs_readdir(file, compat_filldir64, &buf);
1047 if (error >= 0)
1048 error = buf.error;
1049 lastdirent = buf.previous;
1050 if (lastdirent) {
1051 typeof(lastdirent->d_off) d_off = file->f_pos;
1052 if (__put_user_unaligned(d_off, &lastdirent->d_off))
1053 error = -EFAULT;
1054 else
1055 error = count - buf.count;
1057 fput(file);
1058 out:
1059 return error;
1061 #endif /* ! __ARCH_OMIT_COMPAT_SYS_GETDENTS64 */
1063 static ssize_t compat_do_readv_writev(int type, struct file *file,
1064 const struct compat_iovec __user *uvector,
1065 unsigned long nr_segs, loff_t *pos)
1067 compat_ssize_t tot_len;
1068 struct iovec iovstack[UIO_FASTIOV];
1069 struct iovec *iov=iovstack, *vector;
1070 ssize_t ret;
1071 int seg;
1072 io_fn_t fn;
1073 iov_fn_t fnv;
1076 * SuS says "The readv() function *may* fail if the iovcnt argument
1077 * was less than or equal to 0, or greater than {IOV_MAX}. Linux has
1078 * traditionally returned zero for zero segments, so...
1080 ret = 0;
1081 if (nr_segs == 0)
1082 goto out;
1085 * First get the "struct iovec" from user memory and
1086 * verify all the pointers
1088 ret = -EINVAL;
1089 if ((nr_segs > UIO_MAXIOV) || (nr_segs <= 0))
1090 goto out;
1091 if (!file->f_op)
1092 goto out;
1093 if (nr_segs > UIO_FASTIOV) {
1094 ret = -ENOMEM;
1095 iov = kmalloc(nr_segs*sizeof(struct iovec), GFP_KERNEL);
1096 if (!iov)
1097 goto out;
1099 ret = -EFAULT;
1100 if (!access_ok(VERIFY_READ, uvector, nr_segs*sizeof(*uvector)))
1101 goto out;
1104 * Single unix specification:
1105 * We should -EINVAL if an element length is not >= 0 and fitting an
1106 * ssize_t. The total length is fitting an ssize_t
1108 * Be careful here because iov_len is a size_t not an ssize_t
1110 tot_len = 0;
1111 vector = iov;
1112 ret = -EINVAL;
1113 for (seg = 0 ; seg < nr_segs; seg++) {
1114 compat_ssize_t tmp = tot_len;
1115 compat_ssize_t len;
1116 compat_uptr_t buf;
1118 if (__get_user(len, &uvector->iov_len) ||
1119 __get_user(buf, &uvector->iov_base)) {
1120 ret = -EFAULT;
1121 goto out;
1123 if (len < 0) /* size_t not fitting an compat_ssize_t .. */
1124 goto out;
1125 tot_len += len;
1126 if (tot_len < tmp) /* maths overflow on the compat_ssize_t */
1127 goto out;
1128 vector->iov_base = compat_ptr(buf);
1129 vector->iov_len = (compat_size_t) len;
1130 uvector++;
1131 vector++;
1133 if (tot_len == 0) {
1134 ret = 0;
1135 goto out;
1138 ret = rw_verify_area(type, file, pos, tot_len);
1139 if (ret < 0)
1140 goto out;
1142 fnv = NULL;
1143 if (type == READ) {
1144 fn = file->f_op->read;
1145 fnv = file->f_op->aio_read;
1146 } else {
1147 fn = (io_fn_t)file->f_op->write;
1148 fnv = file->f_op->aio_write;
1151 if (fnv)
1152 ret = do_sync_readv_writev(file, iov, nr_segs, tot_len,
1153 pos, fnv);
1154 else
1155 ret = do_loop_readv_writev(file, iov, nr_segs, pos, fn);
1157 out:
1158 if (iov != iovstack)
1159 kfree(iov);
1160 if ((ret + (type == READ)) > 0) {
1161 struct dentry *dentry = file->f_path.dentry;
1162 if (type == READ)
1163 fsnotify_access(dentry);
1164 else
1165 fsnotify_modify(dentry);
1167 return ret;
1170 asmlinkage ssize_t
1171 compat_sys_readv(unsigned long fd, const struct compat_iovec __user *vec, unsigned long vlen)
1173 struct file *file;
1174 ssize_t ret = -EBADF;
1176 file = fget(fd);
1177 if (!file)
1178 return -EBADF;
1180 if (!(file->f_mode & FMODE_READ))
1181 goto out;
1183 ret = -EINVAL;
1184 if (!file->f_op || (!file->f_op->aio_read && !file->f_op->read))
1185 goto out;
1187 ret = compat_do_readv_writev(READ, file, vec, vlen, &file->f_pos);
1189 out:
1190 if (ret > 0)
1191 add_rchar(current, ret);
1192 inc_syscr(current);
1193 fput(file);
1194 return ret;
1197 asmlinkage ssize_t
1198 compat_sys_writev(unsigned long fd, const struct compat_iovec __user *vec, unsigned long vlen)
1200 struct file *file;
1201 ssize_t ret = -EBADF;
1203 file = fget(fd);
1204 if (!file)
1205 return -EBADF;
1206 if (!(file->f_mode & FMODE_WRITE))
1207 goto out;
1209 ret = -EINVAL;
1210 if (!file->f_op || (!file->f_op->aio_write && !file->f_op->write))
1211 goto out;
1213 ret = compat_do_readv_writev(WRITE, file, vec, vlen, &file->f_pos);
1215 out:
1216 if (ret > 0)
1217 add_wchar(current, ret);
1218 inc_syscw(current);
1219 fput(file);
1220 return ret;
1223 asmlinkage long
1224 compat_sys_vmsplice(int fd, const struct compat_iovec __user *iov32,
1225 unsigned int nr_segs, unsigned int flags)
1227 unsigned i;
1228 struct iovec __user *iov;
1229 if (nr_segs > UIO_MAXIOV)
1230 return -EINVAL;
1231 iov = compat_alloc_user_space(nr_segs * sizeof(struct iovec));
1232 for (i = 0; i < nr_segs; i++) {
1233 struct compat_iovec v;
1234 if (get_user(v.iov_base, &iov32[i].iov_base) ||
1235 get_user(v.iov_len, &iov32[i].iov_len) ||
1236 put_user(compat_ptr(v.iov_base), &iov[i].iov_base) ||
1237 put_user(v.iov_len, &iov[i].iov_len))
1238 return -EFAULT;
1240 return sys_vmsplice(fd, iov, nr_segs, flags);
1244 * Exactly like fs/open.c:sys_open(), except that it doesn't set the
1245 * O_LARGEFILE flag.
1247 asmlinkage long
1248 compat_sys_open(const char __user *filename, int flags, int mode)
1250 return do_sys_open(AT_FDCWD, filename, flags, mode);
1254 * Exactly like fs/open.c:sys_openat(), except that it doesn't set the
1255 * O_LARGEFILE flag.
1257 asmlinkage long
1258 compat_sys_openat(unsigned int dfd, const char __user *filename, int flags, int mode)
1260 return do_sys_open(dfd, filename, flags, mode);
1264 * compat_count() counts the number of arguments/envelopes. It is basically
1265 * a copy of count() from fs/exec.c, except that it works with 32 bit argv
1266 * and envp pointers.
1268 static int compat_count(compat_uptr_t __user *argv, int max)
1270 int i = 0;
1272 if (argv != NULL) {
1273 for (;;) {
1274 compat_uptr_t p;
1276 if (get_user(p, argv))
1277 return -EFAULT;
1278 if (!p)
1279 break;
1280 argv++;
1281 if (i++ >= max)
1282 return -E2BIG;
1285 return i;
1289 * compat_copy_strings() is basically a copy of copy_strings() from fs/exec.c
1290 * except that it works with 32 bit argv and envp pointers.
1292 static int compat_copy_strings(int argc, compat_uptr_t __user *argv,
1293 struct linux_binprm *bprm)
1295 struct page *kmapped_page = NULL;
1296 char *kaddr = NULL;
1297 unsigned long kpos = 0;
1298 int ret;
1300 while (argc-- > 0) {
1301 compat_uptr_t str;
1302 int len;
1303 unsigned long pos;
1305 if (get_user(str, argv+argc) ||
1306 !(len = strnlen_user(compat_ptr(str), MAX_ARG_STRLEN))) {
1307 ret = -EFAULT;
1308 goto out;
1311 if (len > MAX_ARG_STRLEN) {
1312 ret = -E2BIG;
1313 goto out;
1316 /* We're going to work our way backwords. */
1317 pos = bprm->p;
1318 str += len;
1319 bprm->p -= len;
1321 while (len > 0) {
1322 int offset, bytes_to_copy;
1324 offset = pos % PAGE_SIZE;
1325 if (offset == 0)
1326 offset = PAGE_SIZE;
1328 bytes_to_copy = offset;
1329 if (bytes_to_copy > len)
1330 bytes_to_copy = len;
1332 offset -= bytes_to_copy;
1333 pos -= bytes_to_copy;
1334 str -= bytes_to_copy;
1335 len -= bytes_to_copy;
1337 if (!kmapped_page || kpos != (pos & PAGE_MASK)) {
1338 struct page *page;
1340 #ifdef CONFIG_STACK_GROWSUP
1341 ret = expand_stack_downwards(bprm->vma, pos);
1342 if (ret < 0) {
1343 /* We've exceed the stack rlimit. */
1344 ret = -E2BIG;
1345 goto out;
1347 #endif
1348 ret = get_user_pages(current, bprm->mm, pos,
1349 1, 1, 1, &page, NULL);
1350 if (ret <= 0) {
1351 /* We've exceed the stack rlimit. */
1352 ret = -E2BIG;
1353 goto out;
1356 if (kmapped_page) {
1357 flush_kernel_dcache_page(kmapped_page);
1358 kunmap(kmapped_page);
1359 put_page(kmapped_page);
1361 kmapped_page = page;
1362 kaddr = kmap(kmapped_page);
1363 kpos = pos & PAGE_MASK;
1364 flush_cache_page(bprm->vma, kpos,
1365 page_to_pfn(kmapped_page));
1367 if (copy_from_user(kaddr+offset, compat_ptr(str),
1368 bytes_to_copy)) {
1369 ret = -EFAULT;
1370 goto out;
1374 ret = 0;
1375 out:
1376 if (kmapped_page) {
1377 flush_kernel_dcache_page(kmapped_page);
1378 kunmap(kmapped_page);
1379 put_page(kmapped_page);
1381 return ret;
1385 * compat_do_execve() is mostly a copy of do_execve(), with the exception
1386 * that it processes 32 bit argv and envp pointers.
1388 int compat_do_execve(char * filename,
1389 compat_uptr_t __user *argv,
1390 compat_uptr_t __user *envp,
1391 struct pt_regs * regs)
1393 struct linux_binprm *bprm;
1394 struct file *file;
1395 int retval;
1397 retval = -ENOMEM;
1398 bprm = kzalloc(sizeof(*bprm), GFP_KERNEL);
1399 if (!bprm)
1400 goto out_ret;
1402 retval = mutex_lock_interruptible(&current->cred_exec_mutex);
1403 if (retval < 0)
1404 goto out_free;
1406 retval = -ENOMEM;
1407 bprm->cred = prepare_exec_creds();
1408 if (!bprm->cred)
1409 goto out_unlock;
1410 check_unsafe_exec(bprm, current->files);
1412 file = open_exec(filename);
1413 retval = PTR_ERR(file);
1414 if (IS_ERR(file))
1415 goto out_unlock;
1417 sched_exec();
1419 bprm->file = file;
1420 bprm->filename = filename;
1421 bprm->interp = filename;
1423 retval = bprm_mm_init(bprm);
1424 if (retval)
1425 goto out_file;
1427 bprm->argc = compat_count(argv, MAX_ARG_STRINGS);
1428 if ((retval = bprm->argc) < 0)
1429 goto out;
1431 bprm->envc = compat_count(envp, MAX_ARG_STRINGS);
1432 if ((retval = bprm->envc) < 0)
1433 goto out;
1435 retval = prepare_binprm(bprm);
1436 if (retval < 0)
1437 goto out;
1439 retval = copy_strings_kernel(1, &bprm->filename, bprm);
1440 if (retval < 0)
1441 goto out;
1443 bprm->exec = bprm->p;
1444 retval = compat_copy_strings(bprm->envc, envp, bprm);
1445 if (retval < 0)
1446 goto out;
1448 retval = compat_copy_strings(bprm->argc, argv, bprm);
1449 if (retval < 0)
1450 goto out;
1452 retval = search_binary_handler(bprm, regs);
1453 if (retval < 0)
1454 goto out;
1456 /* execve succeeded */
1457 mutex_unlock(&current->cred_exec_mutex);
1458 acct_update_integrals(current);
1459 free_bprm(bprm);
1460 return retval;
1462 out:
1463 if (bprm->mm)
1464 mmput(bprm->mm);
1466 out_file:
1467 if (bprm->file) {
1468 allow_write_access(bprm->file);
1469 fput(bprm->file);
1472 out_unlock:
1473 mutex_unlock(&current->cred_exec_mutex);
1475 out_free:
1476 free_bprm(bprm);
1478 out_ret:
1479 return retval;
1482 #define __COMPAT_NFDBITS (8 * sizeof(compat_ulong_t))
1484 static int poll_select_copy_remaining(struct timespec *end_time, void __user *p,
1485 int timeval, int ret)
1487 struct timespec ts;
1489 if (!p)
1490 return ret;
1492 if (current->personality & STICKY_TIMEOUTS)
1493 goto sticky;
1495 /* No update for zero timeout */
1496 if (!end_time->tv_sec && !end_time->tv_nsec)
1497 return ret;
1499 ktime_get_ts(&ts);
1500 ts = timespec_sub(*end_time, ts);
1501 if (ts.tv_sec < 0)
1502 ts.tv_sec = ts.tv_nsec = 0;
1504 if (timeval) {
1505 struct compat_timeval rtv;
1507 rtv.tv_sec = ts.tv_sec;
1508 rtv.tv_usec = ts.tv_nsec / NSEC_PER_USEC;
1510 if (!copy_to_user(p, &rtv, sizeof(rtv)))
1511 return ret;
1512 } else {
1513 struct compat_timespec rts;
1515 rts.tv_sec = ts.tv_sec;
1516 rts.tv_nsec = ts.tv_nsec;
1518 if (!copy_to_user(p, &rts, sizeof(rts)))
1519 return ret;
1522 * If an application puts its timeval in read-only memory, we
1523 * don't want the Linux-specific update to the timeval to
1524 * cause a fault after the select has completed
1525 * successfully. However, because we're not updating the
1526 * timeval, we can't restart the system call.
1529 sticky:
1530 if (ret == -ERESTARTNOHAND)
1531 ret = -EINTR;
1532 return ret;
1536 * Ooo, nasty. We need here to frob 32-bit unsigned longs to
1537 * 64-bit unsigned longs.
1539 static
1540 int compat_get_fd_set(unsigned long nr, compat_ulong_t __user *ufdset,
1541 unsigned long *fdset)
1543 nr = DIV_ROUND_UP(nr, __COMPAT_NFDBITS);
1544 if (ufdset) {
1545 unsigned long odd;
1547 if (!access_ok(VERIFY_WRITE, ufdset, nr*sizeof(compat_ulong_t)))
1548 return -EFAULT;
1550 odd = nr & 1UL;
1551 nr &= ~1UL;
1552 while (nr) {
1553 unsigned long h, l;
1554 if (__get_user(l, ufdset) || __get_user(h, ufdset+1))
1555 return -EFAULT;
1556 ufdset += 2;
1557 *fdset++ = h << 32 | l;
1558 nr -= 2;
1560 if (odd && __get_user(*fdset, ufdset))
1561 return -EFAULT;
1562 } else {
1563 /* Tricky, must clear full unsigned long in the
1564 * kernel fdset at the end, this makes sure that
1565 * actually happens.
1567 memset(fdset, 0, ((nr + 1) & ~1)*sizeof(compat_ulong_t));
1569 return 0;
1572 static
1573 int compat_set_fd_set(unsigned long nr, compat_ulong_t __user *ufdset,
1574 unsigned long *fdset)
1576 unsigned long odd;
1577 nr = DIV_ROUND_UP(nr, __COMPAT_NFDBITS);
1579 if (!ufdset)
1580 return 0;
1582 odd = nr & 1UL;
1583 nr &= ~1UL;
1584 while (nr) {
1585 unsigned long h, l;
1586 l = *fdset++;
1587 h = l >> 32;
1588 if (__put_user(l, ufdset) || __put_user(h, ufdset+1))
1589 return -EFAULT;
1590 ufdset += 2;
1591 nr -= 2;
1593 if (odd && __put_user(*fdset, ufdset))
1594 return -EFAULT;
1595 return 0;
1600 * This is a virtual copy of sys_select from fs/select.c and probably
1601 * should be compared to it from time to time
1605 * We can actually return ERESTARTSYS instead of EINTR, but I'd
1606 * like to be certain this leads to no problems. So I return
1607 * EINTR just for safety.
1609 * Update: ERESTARTSYS breaks at least the xview clock binary, so
1610 * I'm trying ERESTARTNOHAND which restart only when you want to.
1612 #define MAX_SELECT_SECONDS \
1613 ((unsigned long) (MAX_SCHEDULE_TIMEOUT / HZ)-1)
1615 int compat_core_sys_select(int n, compat_ulong_t __user *inp,
1616 compat_ulong_t __user *outp, compat_ulong_t __user *exp,
1617 struct timespec *end_time)
1619 fd_set_bits fds;
1620 void *bits;
1621 int size, max_fds, ret = -EINVAL;
1622 struct fdtable *fdt;
1623 long stack_fds[SELECT_STACK_ALLOC/sizeof(long)];
1625 if (n < 0)
1626 goto out_nofds;
1628 /* max_fds can increase, so grab it once to avoid race */
1629 rcu_read_lock();
1630 fdt = files_fdtable(current->files);
1631 max_fds = fdt->max_fds;
1632 rcu_read_unlock();
1633 if (n > max_fds)
1634 n = max_fds;
1637 * We need 6 bitmaps (in/out/ex for both incoming and outgoing),
1638 * since we used fdset we need to allocate memory in units of
1639 * long-words.
1641 size = FDS_BYTES(n);
1642 bits = stack_fds;
1643 if (size > sizeof(stack_fds) / 6) {
1644 bits = kmalloc(6 * size, GFP_KERNEL);
1645 ret = -ENOMEM;
1646 if (!bits)
1647 goto out_nofds;
1649 fds.in = (unsigned long *) bits;
1650 fds.out = (unsigned long *) (bits + size);
1651 fds.ex = (unsigned long *) (bits + 2*size);
1652 fds.res_in = (unsigned long *) (bits + 3*size);
1653 fds.res_out = (unsigned long *) (bits + 4*size);
1654 fds.res_ex = (unsigned long *) (bits + 5*size);
1656 if ((ret = compat_get_fd_set(n, inp, fds.in)) ||
1657 (ret = compat_get_fd_set(n, outp, fds.out)) ||
1658 (ret = compat_get_fd_set(n, exp, fds.ex)))
1659 goto out;
1660 zero_fd_set(n, fds.res_in);
1661 zero_fd_set(n, fds.res_out);
1662 zero_fd_set(n, fds.res_ex);
1664 ret = do_select(n, &fds, end_time);
1666 if (ret < 0)
1667 goto out;
1668 if (!ret) {
1669 ret = -ERESTARTNOHAND;
1670 if (signal_pending(current))
1671 goto out;
1672 ret = 0;
1675 if (compat_set_fd_set(n, inp, fds.res_in) ||
1676 compat_set_fd_set(n, outp, fds.res_out) ||
1677 compat_set_fd_set(n, exp, fds.res_ex))
1678 ret = -EFAULT;
1679 out:
1680 if (bits != stack_fds)
1681 kfree(bits);
1682 out_nofds:
1683 return ret;
1686 asmlinkage long compat_sys_select(int n, compat_ulong_t __user *inp,
1687 compat_ulong_t __user *outp, compat_ulong_t __user *exp,
1688 struct compat_timeval __user *tvp)
1690 struct timespec end_time, *to = NULL;
1691 struct compat_timeval tv;
1692 int ret;
1694 if (tvp) {
1695 if (copy_from_user(&tv, tvp, sizeof(tv)))
1696 return -EFAULT;
1698 to = &end_time;
1699 if (poll_select_set_timeout(to,
1700 tv.tv_sec + (tv.tv_usec / USEC_PER_SEC),
1701 (tv.tv_usec % USEC_PER_SEC) * NSEC_PER_USEC))
1702 return -EINVAL;
1705 ret = compat_core_sys_select(n, inp, outp, exp, to);
1706 ret = poll_select_copy_remaining(&end_time, tvp, 1, ret);
1708 return ret;
1711 #ifdef HAVE_SET_RESTORE_SIGMASK
1712 static long do_compat_pselect(int n, compat_ulong_t __user *inp,
1713 compat_ulong_t __user *outp, compat_ulong_t __user *exp,
1714 struct compat_timespec __user *tsp, compat_sigset_t __user *sigmask,
1715 compat_size_t sigsetsize)
1717 compat_sigset_t ss32;
1718 sigset_t ksigmask, sigsaved;
1719 struct compat_timespec ts;
1720 struct timespec end_time, *to = NULL;
1721 int ret;
1723 if (tsp) {
1724 if (copy_from_user(&ts, tsp, sizeof(ts)))
1725 return -EFAULT;
1727 to = &end_time;
1728 if (poll_select_set_timeout(to, ts.tv_sec, ts.tv_nsec))
1729 return -EINVAL;
1732 if (sigmask) {
1733 if (sigsetsize != sizeof(compat_sigset_t))
1734 return -EINVAL;
1735 if (copy_from_user(&ss32, sigmask, sizeof(ss32)))
1736 return -EFAULT;
1737 sigset_from_compat(&ksigmask, &ss32);
1739 sigdelsetmask(&ksigmask, sigmask(SIGKILL)|sigmask(SIGSTOP));
1740 sigprocmask(SIG_SETMASK, &ksigmask, &sigsaved);
1743 ret = compat_core_sys_select(n, inp, outp, exp, to);
1744 ret = poll_select_copy_remaining(&end_time, tsp, 0, ret);
1746 if (ret == -ERESTARTNOHAND) {
1748 * Don't restore the signal mask yet. Let do_signal() deliver
1749 * the signal on the way back to userspace, before the signal
1750 * mask is restored.
1752 if (sigmask) {
1753 memcpy(&current->saved_sigmask, &sigsaved,
1754 sizeof(sigsaved));
1755 set_restore_sigmask();
1757 } else if (sigmask)
1758 sigprocmask(SIG_SETMASK, &sigsaved, NULL);
1760 return ret;
1763 asmlinkage long compat_sys_pselect6(int n, compat_ulong_t __user *inp,
1764 compat_ulong_t __user *outp, compat_ulong_t __user *exp,
1765 struct compat_timespec __user *tsp, void __user *sig)
1767 compat_size_t sigsetsize = 0;
1768 compat_uptr_t up = 0;
1770 if (sig) {
1771 if (!access_ok(VERIFY_READ, sig,
1772 sizeof(compat_uptr_t)+sizeof(compat_size_t)) ||
1773 __get_user(up, (compat_uptr_t __user *)sig) ||
1774 __get_user(sigsetsize,
1775 (compat_size_t __user *)(sig+sizeof(up))))
1776 return -EFAULT;
1778 return do_compat_pselect(n, inp, outp, exp, tsp, compat_ptr(up),
1779 sigsetsize);
1782 asmlinkage long compat_sys_ppoll(struct pollfd __user *ufds,
1783 unsigned int nfds, struct compat_timespec __user *tsp,
1784 const compat_sigset_t __user *sigmask, compat_size_t sigsetsize)
1786 compat_sigset_t ss32;
1787 sigset_t ksigmask, sigsaved;
1788 struct compat_timespec ts;
1789 struct timespec end_time, *to = NULL;
1790 int ret;
1792 if (tsp) {
1793 if (copy_from_user(&ts, tsp, sizeof(ts)))
1794 return -EFAULT;
1796 to = &end_time;
1797 if (poll_select_set_timeout(to, ts.tv_sec, ts.tv_nsec))
1798 return -EINVAL;
1801 if (sigmask) {
1802 if (sigsetsize != sizeof(compat_sigset_t))
1803 return -EINVAL;
1804 if (copy_from_user(&ss32, sigmask, sizeof(ss32)))
1805 return -EFAULT;
1806 sigset_from_compat(&ksigmask, &ss32);
1808 sigdelsetmask(&ksigmask, sigmask(SIGKILL)|sigmask(SIGSTOP));
1809 sigprocmask(SIG_SETMASK, &ksigmask, &sigsaved);
1812 ret = do_sys_poll(ufds, nfds, to);
1814 /* We can restart this syscall, usually */
1815 if (ret == -EINTR) {
1817 * Don't restore the signal mask yet. Let do_signal() deliver
1818 * the signal on the way back to userspace, before the signal
1819 * mask is restored.
1821 if (sigmask) {
1822 memcpy(&current->saved_sigmask, &sigsaved,
1823 sizeof(sigsaved));
1824 set_restore_sigmask();
1826 ret = -ERESTARTNOHAND;
1827 } else if (sigmask)
1828 sigprocmask(SIG_SETMASK, &sigsaved, NULL);
1830 ret = poll_select_copy_remaining(&end_time, tsp, 0, ret);
1832 return ret;
1834 #endif /* HAVE_SET_RESTORE_SIGMASK */
1836 #if defined(CONFIG_NFSD) || defined(CONFIG_NFSD_MODULE)
1837 /* Stuff for NFS server syscalls... */
1838 struct compat_nfsctl_svc {
1839 u16 svc32_port;
1840 s32 svc32_nthreads;
1843 struct compat_nfsctl_client {
1844 s8 cl32_ident[NFSCLNT_IDMAX+1];
1845 s32 cl32_naddr;
1846 struct in_addr cl32_addrlist[NFSCLNT_ADDRMAX];
1847 s32 cl32_fhkeytype;
1848 s32 cl32_fhkeylen;
1849 u8 cl32_fhkey[NFSCLNT_KEYMAX];
1852 struct compat_nfsctl_export {
1853 char ex32_client[NFSCLNT_IDMAX+1];
1854 char ex32_path[NFS_MAXPATHLEN+1];
1855 compat_dev_t ex32_dev;
1856 compat_ino_t ex32_ino;
1857 compat_int_t ex32_flags;
1858 __compat_uid_t ex32_anon_uid;
1859 __compat_gid_t ex32_anon_gid;
1862 struct compat_nfsctl_fdparm {
1863 struct sockaddr gd32_addr;
1864 s8 gd32_path[NFS_MAXPATHLEN+1];
1865 compat_int_t gd32_version;
1868 struct compat_nfsctl_fsparm {
1869 struct sockaddr gd32_addr;
1870 s8 gd32_path[NFS_MAXPATHLEN+1];
1871 compat_int_t gd32_maxlen;
1874 struct compat_nfsctl_arg {
1875 compat_int_t ca32_version; /* safeguard */
1876 union {
1877 struct compat_nfsctl_svc u32_svc;
1878 struct compat_nfsctl_client u32_client;
1879 struct compat_nfsctl_export u32_export;
1880 struct compat_nfsctl_fdparm u32_getfd;
1881 struct compat_nfsctl_fsparm u32_getfs;
1882 } u;
1883 #define ca32_svc u.u32_svc
1884 #define ca32_client u.u32_client
1885 #define ca32_export u.u32_export
1886 #define ca32_getfd u.u32_getfd
1887 #define ca32_getfs u.u32_getfs
1890 union compat_nfsctl_res {
1891 __u8 cr32_getfh[NFS_FHSIZE];
1892 struct knfsd_fh cr32_getfs;
1895 static int compat_nfs_svc_trans(struct nfsctl_arg *karg,
1896 struct compat_nfsctl_arg __user *arg)
1898 if (!access_ok(VERIFY_READ, &arg->ca32_svc, sizeof(arg->ca32_svc)) ||
1899 get_user(karg->ca_version, &arg->ca32_version) ||
1900 __get_user(karg->ca_svc.svc_port, &arg->ca32_svc.svc32_port) ||
1901 __get_user(karg->ca_svc.svc_nthreads,
1902 &arg->ca32_svc.svc32_nthreads))
1903 return -EFAULT;
1904 return 0;
1907 static int compat_nfs_clnt_trans(struct nfsctl_arg *karg,
1908 struct compat_nfsctl_arg __user *arg)
1910 if (!access_ok(VERIFY_READ, &arg->ca32_client,
1911 sizeof(arg->ca32_client)) ||
1912 get_user(karg->ca_version, &arg->ca32_version) ||
1913 __copy_from_user(&karg->ca_client.cl_ident[0],
1914 &arg->ca32_client.cl32_ident[0],
1915 NFSCLNT_IDMAX) ||
1916 __get_user(karg->ca_client.cl_naddr,
1917 &arg->ca32_client.cl32_naddr) ||
1918 __copy_from_user(&karg->ca_client.cl_addrlist[0],
1919 &arg->ca32_client.cl32_addrlist[0],
1920 (sizeof(struct in_addr) * NFSCLNT_ADDRMAX)) ||
1921 __get_user(karg->ca_client.cl_fhkeytype,
1922 &arg->ca32_client.cl32_fhkeytype) ||
1923 __get_user(karg->ca_client.cl_fhkeylen,
1924 &arg->ca32_client.cl32_fhkeylen) ||
1925 __copy_from_user(&karg->ca_client.cl_fhkey[0],
1926 &arg->ca32_client.cl32_fhkey[0],
1927 NFSCLNT_KEYMAX))
1928 return -EFAULT;
1930 return 0;
1933 static int compat_nfs_exp_trans(struct nfsctl_arg *karg,
1934 struct compat_nfsctl_arg __user *arg)
1936 if (!access_ok(VERIFY_READ, &arg->ca32_export,
1937 sizeof(arg->ca32_export)) ||
1938 get_user(karg->ca_version, &arg->ca32_version) ||
1939 __copy_from_user(&karg->ca_export.ex_client[0],
1940 &arg->ca32_export.ex32_client[0],
1941 NFSCLNT_IDMAX) ||
1942 __copy_from_user(&karg->ca_export.ex_path[0],
1943 &arg->ca32_export.ex32_path[0],
1944 NFS_MAXPATHLEN) ||
1945 __get_user(karg->ca_export.ex_dev,
1946 &arg->ca32_export.ex32_dev) ||
1947 __get_user(karg->ca_export.ex_ino,
1948 &arg->ca32_export.ex32_ino) ||
1949 __get_user(karg->ca_export.ex_flags,
1950 &arg->ca32_export.ex32_flags) ||
1951 __get_user(karg->ca_export.ex_anon_uid,
1952 &arg->ca32_export.ex32_anon_uid) ||
1953 __get_user(karg->ca_export.ex_anon_gid,
1954 &arg->ca32_export.ex32_anon_gid))
1955 return -EFAULT;
1956 SET_UID(karg->ca_export.ex_anon_uid, karg->ca_export.ex_anon_uid);
1957 SET_GID(karg->ca_export.ex_anon_gid, karg->ca_export.ex_anon_gid);
1959 return 0;
1962 static int compat_nfs_getfd_trans(struct nfsctl_arg *karg,
1963 struct compat_nfsctl_arg __user *arg)
1965 if (!access_ok(VERIFY_READ, &arg->ca32_getfd,
1966 sizeof(arg->ca32_getfd)) ||
1967 get_user(karg->ca_version, &arg->ca32_version) ||
1968 __copy_from_user(&karg->ca_getfd.gd_addr,
1969 &arg->ca32_getfd.gd32_addr,
1970 (sizeof(struct sockaddr))) ||
1971 __copy_from_user(&karg->ca_getfd.gd_path,
1972 &arg->ca32_getfd.gd32_path,
1973 (NFS_MAXPATHLEN+1)) ||
1974 __get_user(karg->ca_getfd.gd_version,
1975 &arg->ca32_getfd.gd32_version))
1976 return -EFAULT;
1978 return 0;
1981 static int compat_nfs_getfs_trans(struct nfsctl_arg *karg,
1982 struct compat_nfsctl_arg __user *arg)
1984 if (!access_ok(VERIFY_READ,&arg->ca32_getfs,sizeof(arg->ca32_getfs)) ||
1985 get_user(karg->ca_version, &arg->ca32_version) ||
1986 __copy_from_user(&karg->ca_getfs.gd_addr,
1987 &arg->ca32_getfs.gd32_addr,
1988 (sizeof(struct sockaddr))) ||
1989 __copy_from_user(&karg->ca_getfs.gd_path,
1990 &arg->ca32_getfs.gd32_path,
1991 (NFS_MAXPATHLEN+1)) ||
1992 __get_user(karg->ca_getfs.gd_maxlen,
1993 &arg->ca32_getfs.gd32_maxlen))
1994 return -EFAULT;
1996 return 0;
1999 /* This really doesn't need translations, we are only passing
2000 * back a union which contains opaque nfs file handle data.
2002 static int compat_nfs_getfh_res_trans(union nfsctl_res *kres,
2003 union compat_nfsctl_res __user *res)
2005 int err;
2007 err = copy_to_user(res, kres, sizeof(*res));
2009 return (err) ? -EFAULT : 0;
2012 asmlinkage long compat_sys_nfsservctl(int cmd,
2013 struct compat_nfsctl_arg __user *arg,
2014 union compat_nfsctl_res __user *res)
2016 struct nfsctl_arg *karg;
2017 union nfsctl_res *kres;
2018 mm_segment_t oldfs;
2019 int err;
2021 karg = kmalloc(sizeof(*karg), GFP_USER);
2022 kres = kmalloc(sizeof(*kres), GFP_USER);
2023 if(!karg || !kres) {
2024 err = -ENOMEM;
2025 goto done;
2028 switch(cmd) {
2029 case NFSCTL_SVC:
2030 err = compat_nfs_svc_trans(karg, arg);
2031 break;
2033 case NFSCTL_ADDCLIENT:
2034 err = compat_nfs_clnt_trans(karg, arg);
2035 break;
2037 case NFSCTL_DELCLIENT:
2038 err = compat_nfs_clnt_trans(karg, arg);
2039 break;
2041 case NFSCTL_EXPORT:
2042 case NFSCTL_UNEXPORT:
2043 err = compat_nfs_exp_trans(karg, arg);
2044 break;
2046 case NFSCTL_GETFD:
2047 err = compat_nfs_getfd_trans(karg, arg);
2048 break;
2050 case NFSCTL_GETFS:
2051 err = compat_nfs_getfs_trans(karg, arg);
2052 break;
2054 default:
2055 err = -EINVAL;
2056 break;
2059 if (err)
2060 goto done;
2062 oldfs = get_fs();
2063 set_fs(KERNEL_DS);
2064 /* The __user pointer casts are valid because of the set_fs() */
2065 err = sys_nfsservctl(cmd, (void __user *) karg, (void __user *) kres);
2066 set_fs(oldfs);
2068 if (err)
2069 goto done;
2071 if((cmd == NFSCTL_GETFD) ||
2072 (cmd == NFSCTL_GETFS))
2073 err = compat_nfs_getfh_res_trans(kres, res);
2075 done:
2076 kfree(karg);
2077 kfree(kres);
2078 return err;
2080 #else /* !NFSD */
2081 long asmlinkage compat_sys_nfsservctl(int cmd, void *notused, void *notused2)
2083 return sys_ni_syscall();
2085 #endif
2087 #ifdef CONFIG_EPOLL
2089 #ifdef HAVE_SET_RESTORE_SIGMASK
2090 asmlinkage long compat_sys_epoll_pwait(int epfd,
2091 struct compat_epoll_event __user *events,
2092 int maxevents, int timeout,
2093 const compat_sigset_t __user *sigmask,
2094 compat_size_t sigsetsize)
2096 long err;
2097 compat_sigset_t csigmask;
2098 sigset_t ksigmask, sigsaved;
2101 * If the caller wants a certain signal mask to be set during the wait,
2102 * we apply it here.
2104 if (sigmask) {
2105 if (sigsetsize != sizeof(compat_sigset_t))
2106 return -EINVAL;
2107 if (copy_from_user(&csigmask, sigmask, sizeof(csigmask)))
2108 return -EFAULT;
2109 sigset_from_compat(&ksigmask, &csigmask);
2110 sigdelsetmask(&ksigmask, sigmask(SIGKILL) | sigmask(SIGSTOP));
2111 sigprocmask(SIG_SETMASK, &ksigmask, &sigsaved);
2114 err = sys_epoll_wait(epfd, events, maxevents, timeout);
2117 * If we changed the signal mask, we need to restore the original one.
2118 * In case we've got a signal while waiting, we do not restore the
2119 * signal mask yet, and we allow do_signal() to deliver the signal on
2120 * the way back to userspace, before the signal mask is restored.
2122 if (sigmask) {
2123 if (err == -EINTR) {
2124 memcpy(&current->saved_sigmask, &sigsaved,
2125 sizeof(sigsaved));
2126 set_restore_sigmask();
2127 } else
2128 sigprocmask(SIG_SETMASK, &sigsaved, NULL);
2131 return err;
2133 #endif /* HAVE_SET_RESTORE_SIGMASK */
2135 #endif /* CONFIG_EPOLL */
2137 #ifdef CONFIG_SIGNALFD
2139 asmlinkage long compat_sys_signalfd4(int ufd,
2140 const compat_sigset_t __user *sigmask,
2141 compat_size_t sigsetsize, int flags)
2143 compat_sigset_t ss32;
2144 sigset_t tmp;
2145 sigset_t __user *ksigmask;
2147 if (sigsetsize != sizeof(compat_sigset_t))
2148 return -EINVAL;
2149 if (copy_from_user(&ss32, sigmask, sizeof(ss32)))
2150 return -EFAULT;
2151 sigset_from_compat(&tmp, &ss32);
2152 ksigmask = compat_alloc_user_space(sizeof(sigset_t));
2153 if (copy_to_user(ksigmask, &tmp, sizeof(sigset_t)))
2154 return -EFAULT;
2156 return sys_signalfd4(ufd, ksigmask, sizeof(sigset_t), flags);
2159 asmlinkage long compat_sys_signalfd(int ufd,
2160 const compat_sigset_t __user *sigmask,
2161 compat_size_t sigsetsize)
2163 return compat_sys_signalfd4(ufd, sigmask, sigsetsize, 0);
2165 #endif /* CONFIG_SIGNALFD */
2167 #ifdef CONFIG_TIMERFD
2169 asmlinkage long compat_sys_timerfd_settime(int ufd, int flags,
2170 const struct compat_itimerspec __user *utmr,
2171 struct compat_itimerspec __user *otmr)
2173 int error;
2174 struct itimerspec t;
2175 struct itimerspec __user *ut;
2177 if (get_compat_itimerspec(&t, utmr))
2178 return -EFAULT;
2179 ut = compat_alloc_user_space(2 * sizeof(struct itimerspec));
2180 if (copy_to_user(&ut[0], &t, sizeof(t)))
2181 return -EFAULT;
2182 error = sys_timerfd_settime(ufd, flags, &ut[0], &ut[1]);
2183 if (!error && otmr)
2184 error = (copy_from_user(&t, &ut[1], sizeof(struct itimerspec)) ||
2185 put_compat_itimerspec(otmr, &t)) ? -EFAULT: 0;
2187 return error;
2190 asmlinkage long compat_sys_timerfd_gettime(int ufd,
2191 struct compat_itimerspec __user *otmr)
2193 int error;
2194 struct itimerspec t;
2195 struct itimerspec __user *ut;
2197 ut = compat_alloc_user_space(sizeof(struct itimerspec));
2198 error = sys_timerfd_gettime(ufd, ut);
2199 if (!error)
2200 error = (copy_from_user(&t, ut, sizeof(struct itimerspec)) ||
2201 put_compat_itimerspec(otmr, &t)) ? -EFAULT: 0;
2203 return error;
2206 #endif /* CONFIG_TIMERFD */