sys_ia32.c 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557
  1. /*
  2. * sys_ia32.c: Conversion between 32bit and 64bit native syscalls. Based on
  3. * sys_sparc32
  4. *
  5. * Copyright (C) 2000 VA Linux Co
  6. * Copyright (C) 2000 Don Dugger <n0ano@valinux.com>
  7. * Copyright (C) 1999 Arun Sharma <arun.sharma@intel.com>
  8. * Copyright (C) 1997,1998 Jakub Jelinek (jj@sunsite.mff.cuni.cz)
  9. * Copyright (C) 1997 David S. Miller (davem@caip.rutgers.edu)
  10. * Copyright (C) 2000 Hewlett-Packard Co.
  11. * Copyright (C) 2000 David Mosberger-Tang <davidm@hpl.hp.com>
  12. * Copyright (C) 2000,2001,2002 Andi Kleen, SuSE Labs (x86-64 port)
  13. *
  14. * These routines maintain argument size conversion between 32bit and 64bit
  15. * environment. In 2.5 most of this should be moved to a generic directory.
  16. *
  17. * This file assumes that there is a hole at the end of user address space.
  18. *
  19. * Some of the functions are LE specific currently. These are
  20. * hopefully all marked. This should be fixed.
  21. */
  22. #include <linux/kernel.h>
  23. #include <linux/sched.h>
  24. #include <linux/fs.h>
  25. #include <linux/file.h>
  26. #include <linux/signal.h>
  27. #include <linux/syscalls.h>
  28. #include <linux/times.h>
  29. #include <linux/utsname.h>
  30. #include <linux/smp_lock.h>
  31. #include <linux/mm.h>
  32. #include <linux/uio.h>
  33. #include <linux/poll.h>
  34. #include <linux/personality.h>
  35. #include <linux/stat.h>
  36. #include <linux/rwsem.h>
  37. #include <linux/compat.h>
  38. #include <linux/vfs.h>
  39. #include <linux/ptrace.h>
  40. #include <linux/highuid.h>
  41. #include <linux/sysctl.h>
  42. #include <linux/slab.h>
  43. #include <asm/mman.h>
  44. #include <asm/types.h>
  45. #include <asm/uaccess.h>
  46. #include <asm/atomic.h>
  47. #include <asm/vgtod.h>
  48. #include <asm/sys_ia32.h>
  49. #define AA(__x) ((unsigned long)(__x))
  50. asmlinkage long sys32_truncate64(const char __user *filename,
  51. unsigned long offset_low,
  52. unsigned long offset_high)
  53. {
  54. return sys_truncate(filename, ((loff_t) offset_high << 32) | offset_low);
  55. }
  56. asmlinkage long sys32_ftruncate64(unsigned int fd, unsigned long offset_low,
  57. unsigned long offset_high)
  58. {
  59. return sys_ftruncate(fd, ((loff_t) offset_high << 32) | offset_low);
  60. }
  61. /*
  62. * Another set for IA32/LFS -- x86_64 struct stat is different due to
  63. * support for 64bit inode numbers.
  64. */
  65. static int cp_stat64(struct stat64 __user *ubuf, struct kstat *stat)
  66. {
  67. typeof(ubuf->st_uid) uid = 0;
  68. typeof(ubuf->st_gid) gid = 0;
  69. SET_UID(uid, stat->uid);
  70. SET_GID(gid, stat->gid);
  71. if (!access_ok(VERIFY_WRITE, ubuf, sizeof(struct stat64)) ||
  72. __put_user(huge_encode_dev(stat->dev), &ubuf->st_dev) ||
  73. __put_user(stat->ino, &ubuf->__st_ino) ||
  74. __put_user(stat->ino, &ubuf->st_ino) ||
  75. __put_user(stat->mode, &ubuf->st_mode) ||
  76. __put_user(stat->nlink, &ubuf->st_nlink) ||
  77. __put_user(uid, &ubuf->st_uid) ||
  78. __put_user(gid, &ubuf->st_gid) ||
  79. __put_user(huge_encode_dev(stat->rdev), &ubuf->st_rdev) ||
  80. __put_user(stat->size, &ubuf->st_size) ||
  81. __put_user(stat->atime.tv_sec, &ubuf->st_atime) ||
  82. __put_user(stat->atime.tv_nsec, &ubuf->st_atime_nsec) ||
  83. __put_user(stat->mtime.tv_sec, &ubuf->st_mtime) ||
  84. __put_user(stat->mtime.tv_nsec, &ubuf->st_mtime_nsec) ||
  85. __put_user(stat->ctime.tv_sec, &ubuf->st_ctime) ||
  86. __put_user(stat->ctime.tv_nsec, &ubuf->st_ctime_nsec) ||
  87. __put_user(stat->blksize, &ubuf->st_blksize) ||
  88. __put_user(stat->blocks, &ubuf->st_blocks))
  89. return -EFAULT;
  90. return 0;
  91. }
  92. asmlinkage long sys32_stat64(const char __user *filename,
  93. struct stat64 __user *statbuf)
  94. {
  95. struct kstat stat;
  96. int ret = vfs_stat(filename, &stat);
  97. if (!ret)
  98. ret = cp_stat64(statbuf, &stat);
  99. return ret;
  100. }
  101. asmlinkage long sys32_lstat64(const char __user *filename,
  102. struct stat64 __user *statbuf)
  103. {
  104. struct kstat stat;
  105. int ret = vfs_lstat(filename, &stat);
  106. if (!ret)
  107. ret = cp_stat64(statbuf, &stat);
  108. return ret;
  109. }
  110. asmlinkage long sys32_fstat64(unsigned int fd, struct stat64 __user *statbuf)
  111. {
  112. struct kstat stat;
  113. int ret = vfs_fstat(fd, &stat);
  114. if (!ret)
  115. ret = cp_stat64(statbuf, &stat);
  116. return ret;
  117. }
  118. asmlinkage long sys32_fstatat(unsigned int dfd, const char __user *filename,
  119. struct stat64 __user *statbuf, int flag)
  120. {
  121. struct kstat stat;
  122. int error;
  123. error = vfs_fstatat(dfd, filename, &stat, flag);
  124. if (error)
  125. return error;
  126. return cp_stat64(statbuf, &stat);
  127. }
  128. /*
  129. * Linux/i386 didn't use to be able to handle more than
  130. * 4 system call parameters, so these system calls used a memory
  131. * block for parameter passing..
  132. */
  133. struct mmap_arg_struct32 {
  134. unsigned int addr;
  135. unsigned int len;
  136. unsigned int prot;
  137. unsigned int flags;
  138. unsigned int fd;
  139. unsigned int offset;
  140. };
  141. asmlinkage long sys32_mmap(struct mmap_arg_struct32 __user *arg)
  142. {
  143. struct mmap_arg_struct32 a;
  144. if (copy_from_user(&a, arg, sizeof(a)))
  145. return -EFAULT;
  146. if (a.offset & ~PAGE_MASK)
  147. return -EINVAL;
  148. return sys_mmap_pgoff(a.addr, a.len, a.prot, a.flags, a.fd,
  149. a.offset>>PAGE_SHIFT);
  150. }
  151. asmlinkage long sys32_mprotect(unsigned long start, size_t len,
  152. unsigned long prot)
  153. {
  154. return sys_mprotect(start, len, prot);
  155. }
  156. asmlinkage long sys32_rt_sigaction(int sig, struct sigaction32 __user *act,
  157. struct sigaction32 __user *oact,
  158. unsigned int sigsetsize)
  159. {
  160. struct k_sigaction new_ka, old_ka;
  161. int ret;
  162. compat_sigset_t set32;
  163. /* XXX: Don't preclude handling different sized sigset_t's. */
  164. if (sigsetsize != sizeof(compat_sigset_t))
  165. return -EINVAL;
  166. if (act) {
  167. compat_uptr_t handler, restorer;
  168. if (!access_ok(VERIFY_READ, act, sizeof(*act)) ||
  169. __get_user(handler, &act->sa_handler) ||
  170. __get_user(new_ka.sa.sa_flags, &act->sa_flags) ||
  171. __get_user(restorer, &act->sa_restorer) ||
  172. __copy_from_user(&set32, &act->sa_mask,
  173. sizeof(compat_sigset_t)))
  174. return -EFAULT;
  175. new_ka.sa.sa_handler = compat_ptr(handler);
  176. new_ka.sa.sa_restorer = compat_ptr(restorer);
  177. /*
  178. * FIXME: here we rely on _COMPAT_NSIG_WORS to be >=
  179. * than _NSIG_WORDS << 1
  180. */
  181. switch (_NSIG_WORDS) {
  182. case 4: new_ka.sa.sa_mask.sig[3] = set32.sig[6]
  183. | (((long)set32.sig[7]) << 32);
  184. case 3: new_ka.sa.sa_mask.sig[2] = set32.sig[4]
  185. | (((long)set32.sig[5]) << 32);
  186. case 2: new_ka.sa.sa_mask.sig[1] = set32.sig[2]
  187. | (((long)set32.sig[3]) << 32);
  188. case 1: new_ka.sa.sa_mask.sig[0] = set32.sig[0]
  189. | (((long)set32.sig[1]) << 32);
  190. }
  191. }
  192. ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
  193. if (!ret && oact) {
  194. /*
  195. * FIXME: here we rely on _COMPAT_NSIG_WORS to be >=
  196. * than _NSIG_WORDS << 1
  197. */
  198. switch (_NSIG_WORDS) {
  199. case 4:
  200. set32.sig[7] = (old_ka.sa.sa_mask.sig[3] >> 32);
  201. set32.sig[6] = old_ka.sa.sa_mask.sig[3];
  202. case 3:
  203. set32.sig[5] = (old_ka.sa.sa_mask.sig[2] >> 32);
  204. set32.sig[4] = old_ka.sa.sa_mask.sig[2];
  205. case 2:
  206. set32.sig[3] = (old_ka.sa.sa_mask.sig[1] >> 32);
  207. set32.sig[2] = old_ka.sa.sa_mask.sig[1];
  208. case 1:
  209. set32.sig[1] = (old_ka.sa.sa_mask.sig[0] >> 32);
  210. set32.sig[0] = old_ka.sa.sa_mask.sig[0];
  211. }
  212. if (!access_ok(VERIFY_WRITE, oact, sizeof(*oact)) ||
  213. __put_user(ptr_to_compat(old_ka.sa.sa_handler),
  214. &oact->sa_handler) ||
  215. __put_user(ptr_to_compat(old_ka.sa.sa_restorer),
  216. &oact->sa_restorer) ||
  217. __put_user(old_ka.sa.sa_flags, &oact->sa_flags) ||
  218. __copy_to_user(&oact->sa_mask, &set32,
  219. sizeof(compat_sigset_t)))
  220. return -EFAULT;
  221. }
  222. return ret;
  223. }
  224. asmlinkage long sys32_sigaction(int sig, struct old_sigaction32 __user *act,
  225. struct old_sigaction32 __user *oact)
  226. {
  227. struct k_sigaction new_ka, old_ka;
  228. int ret;
  229. if (act) {
  230. compat_old_sigset_t mask;
  231. compat_uptr_t handler, restorer;
  232. if (!access_ok(VERIFY_READ, act, sizeof(*act)) ||
  233. __get_user(handler, &act->sa_handler) ||
  234. __get_user(new_ka.sa.sa_flags, &act->sa_flags) ||
  235. __get_user(restorer, &act->sa_restorer) ||
  236. __get_user(mask, &act->sa_mask))
  237. return -EFAULT;
  238. new_ka.sa.sa_handler = compat_ptr(handler);
  239. new_ka.sa.sa_restorer = compat_ptr(restorer);
  240. siginitset(&new_ka.sa.sa_mask, mask);
  241. }
  242. ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL);
  243. if (!ret && oact) {
  244. if (!access_ok(VERIFY_WRITE, oact, sizeof(*oact)) ||
  245. __put_user(ptr_to_compat(old_ka.sa.sa_handler),
  246. &oact->sa_handler) ||
  247. __put_user(ptr_to_compat(old_ka.sa.sa_restorer),
  248. &oact->sa_restorer) ||
  249. __put_user(old_ka.sa.sa_flags, &oact->sa_flags) ||
  250. __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask))
  251. return -EFAULT;
  252. }
  253. return ret;
  254. }
  255. asmlinkage long sys32_rt_sigprocmask(int how, compat_sigset_t __user *set,
  256. compat_sigset_t __user *oset,
  257. unsigned int sigsetsize)
  258. {
  259. sigset_t s;
  260. compat_sigset_t s32;
  261. int ret;
  262. mm_segment_t old_fs = get_fs();
  263. if (set) {
  264. if (copy_from_user(&s32, set, sizeof(compat_sigset_t)))
  265. return -EFAULT;
  266. switch (_NSIG_WORDS) {
  267. case 4: s.sig[3] = s32.sig[6] | (((long)s32.sig[7]) << 32);
  268. case 3: s.sig[2] = s32.sig[4] | (((long)s32.sig[5]) << 32);
  269. case 2: s.sig[1] = s32.sig[2] | (((long)s32.sig[3]) << 32);
  270. case 1: s.sig[0] = s32.sig[0] | (((long)s32.sig[1]) << 32);
  271. }
  272. }
  273. set_fs(KERNEL_DS);
  274. ret = sys_rt_sigprocmask(how,
  275. set ? (sigset_t __user *)&s : NULL,
  276. oset ? (sigset_t __user *)&s : NULL,
  277. sigsetsize);
  278. set_fs(old_fs);
  279. if (ret)
  280. return ret;
  281. if (oset) {
  282. switch (_NSIG_WORDS) {
  283. case 4: s32.sig[7] = (s.sig[3] >> 32); s32.sig[6] = s.sig[3];
  284. case 3: s32.sig[5] = (s.sig[2] >> 32); s32.sig[4] = s.sig[2];
  285. case 2: s32.sig[3] = (s.sig[1] >> 32); s32.sig[2] = s.sig[1];
  286. case 1: s32.sig[1] = (s.sig[0] >> 32); s32.sig[0] = s.sig[0];
  287. }
  288. if (copy_to_user(oset, &s32, sizeof(compat_sigset_t)))
  289. return -EFAULT;
  290. }
  291. return 0;
  292. }
  293. asmlinkage long sys32_alarm(unsigned int seconds)
  294. {
  295. return alarm_setitimer(seconds);
  296. }
  297. asmlinkage long sys32_waitpid(compat_pid_t pid, unsigned int *stat_addr,
  298. int options)
  299. {
  300. return compat_sys_wait4(pid, stat_addr, options, NULL);
  301. }
  302. /* 32-bit timeval and related flotsam. */
  303. asmlinkage long sys32_sysfs(int option, u32 arg1, u32 arg2)
  304. {
  305. return sys_sysfs(option, arg1, arg2);
  306. }
  307. asmlinkage long sys32_sched_rr_get_interval(compat_pid_t pid,
  308. struct compat_timespec __user *interval)
  309. {
  310. struct timespec t;
  311. int ret;
  312. mm_segment_t old_fs = get_fs();
  313. set_fs(KERNEL_DS);
  314. ret = sys_sched_rr_get_interval(pid, (struct timespec __user *)&t);
  315. set_fs(old_fs);
  316. if (put_compat_timespec(&t, interval))
  317. return -EFAULT;
  318. return ret;
  319. }
  320. asmlinkage long sys32_rt_sigpending(compat_sigset_t __user *set,
  321. compat_size_t sigsetsize)
  322. {
  323. sigset_t s;
  324. compat_sigset_t s32;
  325. int ret;
  326. mm_segment_t old_fs = get_fs();
  327. set_fs(KERNEL_DS);
  328. ret = sys_rt_sigpending((sigset_t __user *)&s, sigsetsize);
  329. set_fs(old_fs);
  330. if (!ret) {
  331. switch (_NSIG_WORDS) {
  332. case 4: s32.sig[7] = (s.sig[3] >> 32); s32.sig[6] = s.sig[3];
  333. case 3: s32.sig[5] = (s.sig[2] >> 32); s32.sig[4] = s.sig[2];
  334. case 2: s32.sig[3] = (s.sig[1] >> 32); s32.sig[2] = s.sig[1];
  335. case 1: s32.sig[1] = (s.sig[0] >> 32); s32.sig[0] = s.sig[0];
  336. }
  337. if (copy_to_user(set, &s32, sizeof(compat_sigset_t)))
  338. return -EFAULT;
  339. }
  340. return ret;
  341. }
  342. asmlinkage long sys32_rt_sigqueueinfo(int pid, int sig,
  343. compat_siginfo_t __user *uinfo)
  344. {
  345. siginfo_t info;
  346. int ret;
  347. mm_segment_t old_fs = get_fs();
  348. if (copy_siginfo_from_user32(&info, uinfo))
  349. return -EFAULT;
  350. set_fs(KERNEL_DS);
  351. ret = sys_rt_sigqueueinfo(pid, sig, (siginfo_t __user *)&info);
  352. set_fs(old_fs);
  353. return ret;
  354. }
  355. /* warning: next two assume little endian */
  356. asmlinkage long sys32_pread(unsigned int fd, char __user *ubuf, u32 count,
  357. u32 poslo, u32 poshi)
  358. {
  359. return sys_pread64(fd, ubuf, count,
  360. ((loff_t)AA(poshi) << 32) | AA(poslo));
  361. }
  362. asmlinkage long sys32_pwrite(unsigned int fd, const char __user *ubuf,
  363. u32 count, u32 poslo, u32 poshi)
  364. {
  365. return sys_pwrite64(fd, ubuf, count,
  366. ((loff_t)AA(poshi) << 32) | AA(poslo));
  367. }
  368. asmlinkage long sys32_personality(unsigned long personality)
  369. {
  370. int ret;
  371. if (personality(current->personality) == PER_LINUX32 &&
  372. personality == PER_LINUX)
  373. personality = PER_LINUX32;
  374. ret = sys_personality(personality);
  375. if (ret == PER_LINUX32)
  376. ret = PER_LINUX;
  377. return ret;
  378. }
  379. asmlinkage long sys32_sendfile(int out_fd, int in_fd,
  380. compat_off_t __user *offset, s32 count)
  381. {
  382. mm_segment_t old_fs = get_fs();
  383. int ret;
  384. off_t of;
  385. if (offset && get_user(of, offset))
  386. return -EFAULT;
  387. set_fs(KERNEL_DS);
  388. ret = sys_sendfile(out_fd, in_fd, offset ? (off_t __user *)&of : NULL,
  389. count);
  390. set_fs(old_fs);
  391. if (offset && put_user(of, offset))
  392. return -EFAULT;
  393. return ret;
  394. }
  395. asmlinkage long sys32_execve(const char __user *name, compat_uptr_t __user *argv,
  396. compat_uptr_t __user *envp, struct pt_regs *regs)
  397. {
  398. long error;
  399. char *filename;
  400. filename = getname(name);
  401. error = PTR_ERR(filename);
  402. if (IS_ERR(filename))
  403. return error;
  404. error = compat_do_execve(filename, argv, envp, regs);
  405. putname(filename);
  406. return error;
  407. }
  408. asmlinkage long sys32_clone(unsigned int clone_flags, unsigned int newsp,
  409. struct pt_regs *regs)
  410. {
  411. void __user *parent_tid = (void __user *)regs->dx;
  412. void __user *child_tid = (void __user *)regs->di;
  413. if (!newsp)
  414. newsp = regs->sp;
  415. return do_fork(clone_flags, newsp, regs, 0, parent_tid, child_tid);
  416. }
  417. /*
  418. * Some system calls that need sign extended arguments. This could be
  419. * done by a generic wrapper.
  420. */
  421. long sys32_lseek(unsigned int fd, int offset, unsigned int whence)
  422. {
  423. return sys_lseek(fd, offset, whence);
  424. }
  425. long sys32_kill(int pid, int sig)
  426. {
  427. return sys_kill(pid, sig);
  428. }
  429. long sys32_fadvise64_64(int fd, __u32 offset_low, __u32 offset_high,
  430. __u32 len_low, __u32 len_high, int advice)
  431. {
  432. return sys_fadvise64_64(fd,
  433. (((u64)offset_high)<<32) | offset_low,
  434. (((u64)len_high)<<32) | len_low,
  435. advice);
  436. }
  437. long sys32_vm86_warning(void)
  438. {
  439. struct task_struct *me = current;
  440. static char lastcomm[sizeof(me->comm)];
  441. if (strncmp(lastcomm, me->comm, sizeof(lastcomm))) {
  442. compat_printk(KERN_INFO
  443. "%s: vm86 mode not supported on 64 bit kernel\n",
  444. me->comm);
  445. strncpy(lastcomm, me->comm, sizeof(lastcomm));
  446. }
  447. return -ENOSYS;
  448. }
  449. long sys32_lookup_dcookie(u32 addr_low, u32 addr_high,
  450. char __user *buf, size_t len)
  451. {
  452. return sys_lookup_dcookie(((u64)addr_high << 32) | addr_low, buf, len);
  453. }
  454. asmlinkage ssize_t sys32_readahead(int fd, unsigned off_lo, unsigned off_hi,
  455. size_t count)
  456. {
  457. return sys_readahead(fd, ((u64)off_hi << 32) | off_lo, count);
  458. }
  459. asmlinkage long sys32_sync_file_range(int fd, unsigned off_low, unsigned off_hi,
  460. unsigned n_low, unsigned n_hi, int flags)
  461. {
  462. return sys_sync_file_range(fd,
  463. ((u64)off_hi << 32) | off_low,
  464. ((u64)n_hi << 32) | n_low, flags);
  465. }
  466. asmlinkage long sys32_fadvise64(int fd, unsigned offset_lo, unsigned offset_hi,
  467. size_t len, int advice)
  468. {
  469. return sys_fadvise64_64(fd, ((u64)offset_hi << 32) | offset_lo,
  470. len, advice);
  471. }
  472. asmlinkage long sys32_fallocate(int fd, int mode, unsigned offset_lo,
  473. unsigned offset_hi, unsigned len_lo,
  474. unsigned len_hi)
  475. {
  476. return sys_fallocate(fd, mode, ((u64)offset_hi << 32) | offset_lo,
  477. ((u64)len_hi << 32) | len_lo);
  478. }
  479. asmlinkage long sys32_fanotify_mark(int fanotify_fd, unsigned int flags,
  480. u32 mask_lo, u32 mask_hi,
  481. int fd, const char __user *pathname)
  482. {
  483. return sys_fanotify_mark(fanotify_fd, flags,
  484. ((u64)mask_hi << 32) | mask_lo,
  485. fd, pathname);
  486. }