linux32.c 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785
  1. /*
  2. * Conversion between 32-bit and 64-bit native system calls.
  3. *
  4. * Copyright (C) 2000 Silicon Graphics, Inc.
  5. * Written by Ulf Carlsson (ulfc@engr.sgi.com)
  6. * sys32_execve from ia64/ia32 code, Feb 2000, Kanoj Sarcar (kanoj@sgi.com)
  7. */
  8. #include <linux/compiler.h>
  9. #include <linux/mm.h>
  10. #include <linux/errno.h>
  11. #include <linux/file.h>
  12. #include <linux/smp_lock.h>
  13. #include <linux/highuid.h>
  14. #include <linux/dirent.h>
  15. #include <linux/resource.h>
  16. #include <linux/highmem.h>
  17. #include <linux/time.h>
  18. #include <linux/times.h>
  19. #include <linux/poll.h>
  20. #include <linux/slab.h>
  21. #include <linux/skbuff.h>
  22. #include <linux/filter.h>
  23. #include <linux/shm.h>
  24. #include <linux/sem.h>
  25. #include <linux/msg.h>
  26. #include <linux/icmpv6.h>
  27. #include <linux/syscalls.h>
  28. #include <linux/sysctl.h>
  29. #include <linux/utime.h>
  30. #include <linux/utsname.h>
  31. #include <linux/personality.h>
  32. #include <linux/dnotify.h>
  33. #include <linux/module.h>
  34. #include <linux/binfmts.h>
  35. #include <linux/security.h>
  36. #include <linux/compat.h>
  37. #include <linux/vfs.h>
  38. #include <net/sock.h>
  39. #include <net/scm.h>
  40. #include <asm/compat-signal.h>
  41. #include <asm/ipc.h>
  42. #include <asm/sim.h>
  43. #include <asm/uaccess.h>
  44. #include <asm/mmu_context.h>
  45. #include <asm/mman.h>
  46. /* Use this to get at 32-bit user passed pointers. */
  47. /* A() macro should be used for places where you e.g.
  48. have some internal variable u32 and just want to get
  49. rid of a compiler warning. AA() has to be used in
  50. places where you want to convert a function argument
  51. to 32bit pointer or when you e.g. access pt_regs
  52. structure and want to consider 32bit registers only.
  53. */
  54. #define A(__x) ((unsigned long)(__x))
  55. #define AA(__x) ((unsigned long)((int)__x))
  56. #ifdef __MIPSEB__
  57. #define merge_64(r1,r2) ((((r1) & 0xffffffffUL) << 32) + ((r2) & 0xffffffffUL))
  58. #endif
  59. #ifdef __MIPSEL__
  60. #define merge_64(r1,r2) ((((r2) & 0xffffffffUL) << 32) + ((r1) & 0xffffffffUL))
  61. #endif
  62. /*
  63. * Revalidate the inode. This is required for proper NFS attribute caching.
  64. */
  65. int cp_compat_stat(struct kstat *stat, struct compat_stat __user *statbuf)
  66. {
  67. struct compat_stat tmp;
  68. if (!new_valid_dev(stat->dev) || !new_valid_dev(stat->rdev))
  69. return -EOVERFLOW;
  70. memset(&tmp, 0, sizeof(tmp));
  71. tmp.st_dev = new_encode_dev(stat->dev);
  72. tmp.st_ino = stat->ino;
  73. if (sizeof(tmp.st_ino) < sizeof(stat->ino) && tmp.st_ino != stat->ino)
  74. return -EOVERFLOW;
  75. tmp.st_mode = stat->mode;
  76. tmp.st_nlink = stat->nlink;
  77. SET_UID(tmp.st_uid, stat->uid);
  78. SET_GID(tmp.st_gid, stat->gid);
  79. tmp.st_rdev = new_encode_dev(stat->rdev);
  80. tmp.st_size = stat->size;
  81. tmp.st_atime = stat->atime.tv_sec;
  82. tmp.st_mtime = stat->mtime.tv_sec;
  83. tmp.st_ctime = stat->ctime.tv_sec;
  84. #ifdef STAT_HAVE_NSEC
  85. tmp.st_atime_nsec = stat->atime.tv_nsec;
  86. tmp.st_mtime_nsec = stat->mtime.tv_nsec;
  87. tmp.st_ctime_nsec = stat->ctime.tv_nsec;
  88. #endif
  89. tmp.st_blocks = stat->blocks;
  90. tmp.st_blksize = stat->blksize;
  91. return copy_to_user(statbuf,&tmp,sizeof(tmp)) ? -EFAULT : 0;
  92. }
  93. asmlinkage unsigned long
  94. sys32_mmap2(unsigned long addr, unsigned long len, unsigned long prot,
  95. unsigned long flags, unsigned long fd, unsigned long pgoff)
  96. {
  97. struct file * file = NULL;
  98. unsigned long error;
  99. error = -EINVAL;
  100. if (pgoff & (~PAGE_MASK >> 12))
  101. goto out;
  102. pgoff >>= PAGE_SHIFT-12;
  103. if (!(flags & MAP_ANONYMOUS)) {
  104. error = -EBADF;
  105. file = fget(fd);
  106. if (!file)
  107. goto out;
  108. }
  109. flags &= ~(MAP_EXECUTABLE | MAP_DENYWRITE);
  110. down_write(&current->mm->mmap_sem);
  111. error = do_mmap_pgoff(file, addr, len, prot, flags, pgoff);
  112. up_write(&current->mm->mmap_sem);
  113. if (file)
  114. fput(file);
  115. out:
  116. return error;
  117. }
  118. asmlinkage int sys_truncate64(const char __user *path, unsigned int high,
  119. unsigned int low)
  120. {
  121. if ((int)high < 0)
  122. return -EINVAL;
  123. return sys_truncate(path, ((long) high << 32) | low);
  124. }
  125. asmlinkage int sys_ftruncate64(unsigned int fd, unsigned int high,
  126. unsigned int low)
  127. {
  128. if ((int)high < 0)
  129. return -EINVAL;
  130. return sys_ftruncate(fd, ((long) high << 32) | low);
  131. }
  132. /*
  133. * sys_execve() executes a new program.
  134. */
  135. asmlinkage int sys32_execve(nabi_no_regargs struct pt_regs regs)
  136. {
  137. int error;
  138. char * filename;
  139. filename = getname(compat_ptr(regs.regs[4]));
  140. error = PTR_ERR(filename);
  141. if (IS_ERR(filename))
  142. goto out;
  143. error = compat_do_execve(filename, compat_ptr(regs.regs[5]),
  144. compat_ptr(regs.regs[6]), &regs);
  145. putname(filename);
  146. out:
  147. return error;
  148. }
  149. asmlinkage long
  150. sysn32_waitid(int which, compat_pid_t pid,
  151. siginfo_t __user *uinfo, int options,
  152. struct compat_rusage __user *uru)
  153. {
  154. struct rusage ru;
  155. long ret;
  156. mm_segment_t old_fs = get_fs();
  157. int si_signo;
  158. if (!access_ok(VERIFY_WRITE, uinfo, sizeof(*uinfo)))
  159. return -EFAULT;
  160. set_fs (KERNEL_DS);
  161. ret = sys_waitid(which, pid, uinfo, options,
  162. uru ? (struct rusage __user *) &ru : NULL);
  163. set_fs (old_fs);
  164. if (__get_user(si_signo, &uinfo->si_signo))
  165. return -EFAULT;
  166. if (ret < 0 || si_signo == 0)
  167. return ret;
  168. if (uru)
  169. ret = put_compat_rusage(&ru, uru);
  170. return ret;
  171. }
  172. #define RLIM_INFINITY32 0x7fffffff
  173. #define RESOURCE32(x) ((x > RLIM_INFINITY32) ? RLIM_INFINITY32 : x)
  174. struct rlimit32 {
  175. int rlim_cur;
  176. int rlim_max;
  177. };
  178. #ifdef __MIPSEB__
  179. asmlinkage long sys32_truncate64(const char __user * path, unsigned long __dummy,
  180. int length_hi, int length_lo)
  181. #endif
  182. #ifdef __MIPSEL__
  183. asmlinkage long sys32_truncate64(const char __user * path, unsigned long __dummy,
  184. int length_lo, int length_hi)
  185. #endif
  186. {
  187. loff_t length;
  188. length = ((unsigned long) length_hi << 32) | (unsigned int) length_lo;
  189. return sys_truncate(path, length);
  190. }
  191. #ifdef __MIPSEB__
  192. asmlinkage long sys32_ftruncate64(unsigned int fd, unsigned long __dummy,
  193. int length_hi, int length_lo)
  194. #endif
  195. #ifdef __MIPSEL__
  196. asmlinkage long sys32_ftruncate64(unsigned int fd, unsigned long __dummy,
  197. int length_lo, int length_hi)
  198. #endif
  199. {
  200. loff_t length;
  201. length = ((unsigned long) length_hi << 32) | (unsigned int) length_lo;
  202. return sys_ftruncate(fd, length);
  203. }
  204. static inline long
  205. get_tv32(struct timeval *o, struct compat_timeval __user *i)
  206. {
  207. return (!access_ok(VERIFY_READ, i, sizeof(*i)) ||
  208. (__get_user(o->tv_sec, &i->tv_sec) |
  209. __get_user(o->tv_usec, &i->tv_usec)));
  210. }
  211. static inline long
  212. put_tv32(struct compat_timeval __user *o, struct timeval *i)
  213. {
  214. return (!access_ok(VERIFY_WRITE, o, sizeof(*o)) ||
  215. (__put_user(i->tv_sec, &o->tv_sec) |
  216. __put_user(i->tv_usec, &o->tv_usec)));
  217. }
  218. extern struct timezone sys_tz;
  219. asmlinkage int
  220. sys32_gettimeofday(struct compat_timeval __user *tv, struct timezone __user *tz)
  221. {
  222. if (tv) {
  223. struct timeval ktv;
  224. do_gettimeofday(&ktv);
  225. if (put_tv32(tv, &ktv))
  226. return -EFAULT;
  227. }
  228. if (tz) {
  229. if (copy_to_user(tz, &sys_tz, sizeof(sys_tz)))
  230. return -EFAULT;
  231. }
  232. return 0;
  233. }
  234. static inline long get_ts32(struct timespec *o, struct compat_timeval __user *i)
  235. {
  236. long usec;
  237. if (!access_ok(VERIFY_READ, i, sizeof(*i)))
  238. return -EFAULT;
  239. if (__get_user(o->tv_sec, &i->tv_sec))
  240. return -EFAULT;
  241. if (__get_user(usec, &i->tv_usec))
  242. return -EFAULT;
  243. o->tv_nsec = usec * 1000;
  244. return 0;
  245. }
  246. asmlinkage int
  247. sys32_settimeofday(struct compat_timeval __user *tv, struct timezone __user *tz)
  248. {
  249. struct timespec kts;
  250. struct timezone ktz;
  251. if (tv) {
  252. if (get_ts32(&kts, tv))
  253. return -EFAULT;
  254. }
  255. if (tz) {
  256. if (copy_from_user(&ktz, tz, sizeof(ktz)))
  257. return -EFAULT;
  258. }
  259. return do_sys_settimeofday(tv ? &kts : NULL, tz ? &ktz : NULL);
  260. }
  261. asmlinkage int sys32_llseek(unsigned int fd, unsigned int offset_high,
  262. unsigned int offset_low, loff_t __user * result,
  263. unsigned int origin)
  264. {
  265. return sys_llseek(fd, offset_high, offset_low, result, origin);
  266. }
  267. /* From the Single Unix Spec: pread & pwrite act like lseek to pos + op +
  268. lseek back to original location. They fail just like lseek does on
  269. non-seekable files. */
  270. asmlinkage ssize_t sys32_pread(unsigned int fd, char __user * buf,
  271. size_t count, u32 unused, u64 a4, u64 a5)
  272. {
  273. return sys_pread64(fd, buf, count, merge_64(a4, a5));
  274. }
  275. asmlinkage ssize_t sys32_pwrite(unsigned int fd, const char __user * buf,
  276. size_t count, u32 unused, u64 a4, u64 a5)
  277. {
  278. return sys_pwrite64(fd, buf, count, merge_64(a4, a5));
  279. }
  280. asmlinkage int sys32_sched_rr_get_interval(compat_pid_t pid,
  281. struct compat_timespec __user *interval)
  282. {
  283. struct timespec t;
  284. int ret;
  285. mm_segment_t old_fs = get_fs ();
  286. set_fs (KERNEL_DS);
  287. ret = sys_sched_rr_get_interval(pid, (struct timespec __user *)&t);
  288. set_fs (old_fs);
  289. if (put_user (t.tv_sec, &interval->tv_sec) ||
  290. __put_user (t.tv_nsec, &interval->tv_nsec))
  291. return -EFAULT;
  292. return ret;
  293. }
  294. asmlinkage long
  295. sys32_ipc (u32 call, int first, int second, int third, u32 ptr, u32 fifth)
  296. {
  297. int version, err;
  298. version = call >> 16; /* hack for backward compatibility */
  299. call &= 0xffff;
  300. switch (call) {
  301. case SEMOP:
  302. /* struct sembuf is the same on 32 and 64bit :)) */
  303. err = sys_semtimedop(first, compat_ptr(ptr), second, NULL);
  304. break;
  305. case SEMTIMEDOP:
  306. err = compat_sys_semtimedop(first, compat_ptr(ptr), second,
  307. compat_ptr(fifth));
  308. break;
  309. case SEMGET:
  310. err = sys_semget(first, second, third);
  311. break;
  312. case SEMCTL:
  313. err = compat_sys_semctl(first, second, third, compat_ptr(ptr));
  314. break;
  315. case MSGSND:
  316. err = compat_sys_msgsnd(first, second, third, compat_ptr(ptr));
  317. break;
  318. case MSGRCV:
  319. err = compat_sys_msgrcv(first, second, fifth, third,
  320. version, compat_ptr(ptr));
  321. break;
  322. case MSGGET:
  323. err = sys_msgget((key_t) first, second);
  324. break;
  325. case MSGCTL:
  326. err = compat_sys_msgctl(first, second, compat_ptr(ptr));
  327. break;
  328. case SHMAT:
  329. err = compat_sys_shmat(first, second, third, version,
  330. compat_ptr(ptr));
  331. break;
  332. case SHMDT:
  333. err = sys_shmdt(compat_ptr(ptr));
  334. break;
  335. case SHMGET:
  336. err = sys_shmget(first, (unsigned)second, third);
  337. break;
  338. case SHMCTL:
  339. err = compat_sys_shmctl(first, second, compat_ptr(ptr));
  340. break;
  341. default:
  342. err = -EINVAL;
  343. break;
  344. }
  345. return err;
  346. }
  347. #ifdef CONFIG_MIPS32_N32
  348. asmlinkage long sysn32_semctl(int semid, int semnum, int cmd, u32 arg)
  349. {
  350. /* compat_sys_semctl expects a pointer to union semun */
  351. u32 __user *uptr = compat_alloc_user_space(sizeof(u32));
  352. if (put_user(arg, uptr))
  353. return -EFAULT;
  354. return compat_sys_semctl(semid, semnum, cmd, uptr);
  355. }
  356. asmlinkage long sysn32_msgsnd(int msqid, u32 msgp, unsigned msgsz, int msgflg)
  357. {
  358. return compat_sys_msgsnd(msqid, msgsz, msgflg, compat_ptr(msgp));
  359. }
  360. asmlinkage long sysn32_msgrcv(int msqid, u32 msgp, size_t msgsz, int msgtyp,
  361. int msgflg)
  362. {
  363. return compat_sys_msgrcv(msqid, msgsz, msgtyp, msgflg, IPC_64,
  364. compat_ptr(msgp));
  365. }
  366. #endif
  367. struct sysctl_args32
  368. {
  369. compat_caddr_t name;
  370. int nlen;
  371. compat_caddr_t oldval;
  372. compat_caddr_t oldlenp;
  373. compat_caddr_t newval;
  374. compat_size_t newlen;
  375. unsigned int __unused[4];
  376. };
  377. #ifdef CONFIG_SYSCTL_SYSCALL
  378. asmlinkage long sys32_sysctl(struct sysctl_args32 __user *args)
  379. {
  380. struct sysctl_args32 tmp;
  381. int error;
  382. size_t oldlen;
  383. size_t __user *oldlenp = NULL;
  384. unsigned long addr = (((unsigned long)&args->__unused[0]) + 7) & ~7;
  385. if (copy_from_user(&tmp, args, sizeof(tmp)))
  386. return -EFAULT;
  387. if (tmp.oldval && tmp.oldlenp) {
  388. /* Duh, this is ugly and might not work if sysctl_args
  389. is in read-only memory, but do_sysctl does indirectly
  390. a lot of uaccess in both directions and we'd have to
  391. basically copy the whole sysctl.c here, and
  392. glibc's __sysctl uses rw memory for the structure
  393. anyway. */
  394. if (get_user(oldlen, (u32 __user *)A(tmp.oldlenp)) ||
  395. put_user(oldlen, (size_t __user *)addr))
  396. return -EFAULT;
  397. oldlenp = (size_t __user *)addr;
  398. }
  399. lock_kernel();
  400. error = do_sysctl((int __user *)A(tmp.name), tmp.nlen, (void __user *)A(tmp.oldval),
  401. oldlenp, (void __user *)A(tmp.newval), tmp.newlen);
  402. unlock_kernel();
  403. if (oldlenp) {
  404. if (!error) {
  405. if (get_user(oldlen, (size_t __user *)addr) ||
  406. put_user(oldlen, (u32 __user *)A(tmp.oldlenp)))
  407. error = -EFAULT;
  408. }
  409. copy_to_user(args->__unused, tmp.__unused, sizeof(tmp.__unused));
  410. }
  411. return error;
  412. }
  413. #endif /* CONFIG_SYSCTL_SYSCALL */
  414. asmlinkage long sys32_newuname(struct new_utsname __user * name)
  415. {
  416. int ret = 0;
  417. down_read(&uts_sem);
  418. if (copy_to_user(name, utsname(), sizeof *name))
  419. ret = -EFAULT;
  420. up_read(&uts_sem);
  421. if (current->personality == PER_LINUX32 && !ret)
  422. if (copy_to_user(name->machine, "mips\0\0\0", 8))
  423. ret = -EFAULT;
  424. return ret;
  425. }
  426. asmlinkage int sys32_personality(unsigned long personality)
  427. {
  428. int ret;
  429. personality &= 0xffffffff;
  430. if (personality(current->personality) == PER_LINUX32 &&
  431. personality == PER_LINUX)
  432. personality = PER_LINUX32;
  433. ret = sys_personality(personality);
  434. if (ret == PER_LINUX32)
  435. ret = PER_LINUX;
  436. return ret;
  437. }
  438. /* ustat compatibility */
  439. struct ustat32 {
  440. compat_daddr_t f_tfree;
  441. compat_ino_t f_tinode;
  442. char f_fname[6];
  443. char f_fpack[6];
  444. };
  445. extern asmlinkage long sys_ustat(dev_t dev, struct ustat __user * ubuf);
  446. asmlinkage int sys32_ustat(dev_t dev, struct ustat32 __user * ubuf32)
  447. {
  448. int err;
  449. struct ustat tmp;
  450. struct ustat32 tmp32;
  451. mm_segment_t old_fs = get_fs();
  452. set_fs(KERNEL_DS);
  453. err = sys_ustat(dev, (struct ustat __user *)&tmp);
  454. set_fs (old_fs);
  455. if (err)
  456. goto out;
  457. memset(&tmp32,0,sizeof(struct ustat32));
  458. tmp32.f_tfree = tmp.f_tfree;
  459. tmp32.f_tinode = tmp.f_tinode;
  460. err = copy_to_user(ubuf32,&tmp32,sizeof(struct ustat32)) ? -EFAULT : 0;
  461. out:
  462. return err;
  463. }
  464. asmlinkage int sys32_sendfile(int out_fd, int in_fd, compat_off_t __user *offset,
  465. s32 count)
  466. {
  467. mm_segment_t old_fs = get_fs();
  468. int ret;
  469. off_t of;
  470. if (offset && get_user(of, offset))
  471. return -EFAULT;
  472. set_fs(KERNEL_DS);
  473. ret = sys_sendfile(out_fd, in_fd, offset ? (off_t __user *)&of : NULL, count);
  474. set_fs(old_fs);
  475. if (offset && put_user(of, offset))
  476. return -EFAULT;
  477. return ret;
  478. }
  479. asmlinkage ssize_t sys32_readahead(int fd, u32 pad0, u64 a2, u64 a3,
  480. size_t count)
  481. {
  482. return sys_readahead(fd, merge_64(a2, a3), count);
  483. }
  484. asmlinkage long sys32_sync_file_range(int fd, int __pad,
  485. unsigned long a2, unsigned long a3,
  486. unsigned long a4, unsigned long a5,
  487. int flags)
  488. {
  489. return sys_sync_file_range(fd,
  490. merge_64(a2, a3), merge_64(a4, a5),
  491. flags);
  492. }
  493. /* Argument list sizes for sys_socketcall */
  494. #define AL(x) ((x) * sizeof(unsigned int))
  495. static unsigned char socketcall_nargs[18]={AL(0),AL(3),AL(3),AL(3),AL(2),AL(3),
  496. AL(3),AL(3),AL(4),AL(4),AL(4),AL(6),
  497. AL(6),AL(2),AL(5),AL(5),AL(3),AL(3)};
  498. #undef AL
  499. /*
  500. * System call vectors.
  501. *
  502. * Argument checking cleaned up. Saved 20% in size.
  503. * This function doesn't need to set the kernel lock because
  504. * it is set by the callees.
  505. */
  506. asmlinkage long sys32_socketcall(int call, unsigned int __user *args32)
  507. {
  508. unsigned int a[6];
  509. unsigned int a0,a1;
  510. int err;
  511. extern asmlinkage long sys_socket(int family, int type, int protocol);
  512. extern asmlinkage long sys_bind(int fd, struct sockaddr __user *umyaddr, int addrlen);
  513. extern asmlinkage long sys_connect(int fd, struct sockaddr __user *uservaddr, int addrlen);
  514. extern asmlinkage long sys_listen(int fd, int backlog);
  515. extern asmlinkage long sys_accept(int fd, struct sockaddr __user *upeer_sockaddr, int __user *upeer_addrlen);
  516. extern asmlinkage long sys_getsockname(int fd, struct sockaddr __user *usockaddr, int __user *usockaddr_len);
  517. extern asmlinkage long sys_getpeername(int fd, struct sockaddr __user *usockaddr, int __user *usockaddr_len);
  518. extern asmlinkage long sys_socketpair(int family, int type, int protocol, int __user *usockvec);
  519. extern asmlinkage long sys_send(int fd, void __user * buff, size_t len, unsigned flags);
  520. extern asmlinkage long sys_sendto(int fd, void __user * buff, size_t len, unsigned flags,
  521. struct sockaddr __user *addr, int addr_len);
  522. extern asmlinkage long sys_recv(int fd, void __user * ubuf, size_t size, unsigned flags);
  523. extern asmlinkage long sys_recvfrom(int fd, void __user * ubuf, size_t size, unsigned flags,
  524. struct sockaddr __user *addr, int __user *addr_len);
  525. extern asmlinkage long sys_shutdown(int fd, int how);
  526. extern asmlinkage long sys_setsockopt(int fd, int level, int optname, char __user *optval, int optlen);
  527. extern asmlinkage long sys_getsockopt(int fd, int level, int optname, char __user *optval, int __user *optlen);
  528. extern asmlinkage long sys_sendmsg(int fd, struct msghdr __user *msg, unsigned flags);
  529. extern asmlinkage long sys_recvmsg(int fd, struct msghdr __user *msg, unsigned int flags);
  530. if(call<1||call>SYS_RECVMSG)
  531. return -EINVAL;
  532. /* copy_from_user should be SMP safe. */
  533. if (copy_from_user(a, args32, socketcall_nargs[call]))
  534. return -EFAULT;
  535. a0=a[0];
  536. a1=a[1];
  537. switch(call)
  538. {
  539. case SYS_SOCKET:
  540. err = sys_socket(a0,a1,a[2]);
  541. break;
  542. case SYS_BIND:
  543. err = sys_bind(a0,(struct sockaddr __user *)A(a1), a[2]);
  544. break;
  545. case SYS_CONNECT:
  546. err = sys_connect(a0, (struct sockaddr __user *)A(a1), a[2]);
  547. break;
  548. case SYS_LISTEN:
  549. err = sys_listen(a0,a1);
  550. break;
  551. case SYS_ACCEPT:
  552. err = sys_accept(a0,(struct sockaddr __user *)A(a1), (int __user *)A(a[2]));
  553. break;
  554. case SYS_GETSOCKNAME:
  555. err = sys_getsockname(a0,(struct sockaddr __user *)A(a1), (int __user *)A(a[2]));
  556. break;
  557. case SYS_GETPEERNAME:
  558. err = sys_getpeername(a0, (struct sockaddr __user *)A(a1), (int __user *)A(a[2]));
  559. break;
  560. case SYS_SOCKETPAIR:
  561. err = sys_socketpair(a0,a1, a[2], (int __user *)A(a[3]));
  562. break;
  563. case SYS_SEND:
  564. err = sys_send(a0, (void __user *)A(a1), a[2], a[3]);
  565. break;
  566. case SYS_SENDTO:
  567. err = sys_sendto(a0,(void __user *)A(a1), a[2], a[3],
  568. (struct sockaddr __user *)A(a[4]), a[5]);
  569. break;
  570. case SYS_RECV:
  571. err = sys_recv(a0, (void __user *)A(a1), a[2], a[3]);
  572. break;
  573. case SYS_RECVFROM:
  574. err = sys_recvfrom(a0, (void __user *)A(a1), a[2], a[3],
  575. (struct sockaddr __user *)A(a[4]), (int __user *)A(a[5]));
  576. break;
  577. case SYS_SHUTDOWN:
  578. err = sys_shutdown(a0,a1);
  579. break;
  580. case SYS_SETSOCKOPT:
  581. err = sys_setsockopt(a0, a1, a[2], (char __user *)A(a[3]), a[4]);
  582. break;
  583. case SYS_GETSOCKOPT:
  584. err = sys_getsockopt(a0, a1, a[2], (char __user *)A(a[3]), (int __user *)A(a[4]));
  585. break;
  586. case SYS_SENDMSG:
  587. err = sys_sendmsg(a0, (struct msghdr __user *) A(a1), a[2]);
  588. break;
  589. case SYS_RECVMSG:
  590. err = sys_recvmsg(a0, (struct msghdr __user *) A(a1), a[2]);
  591. break;
  592. default:
  593. err = -EINVAL;
  594. break;
  595. }
  596. return err;
  597. }
  598. struct sigevent32 {
  599. u32 sigev_value;
  600. u32 sigev_signo;
  601. u32 sigev_notify;
  602. u32 payload[(64 / 4) - 3];
  603. };
  604. extern asmlinkage long
  605. sys_timer_create(clockid_t which_clock,
  606. struct sigevent __user *timer_event_spec,
  607. timer_t __user * created_timer_id);
  608. long
  609. sys32_timer_create(u32 clock, struct sigevent32 __user *se32, timer_t __user *timer_id)
  610. {
  611. struct sigevent __user *p = NULL;
  612. if (se32) {
  613. struct sigevent se;
  614. p = compat_alloc_user_space(sizeof(struct sigevent));
  615. memset(&se, 0, sizeof(struct sigevent));
  616. if (get_user(se.sigev_value.sival_int, &se32->sigev_value) ||
  617. __get_user(se.sigev_signo, &se32->sigev_signo) ||
  618. __get_user(se.sigev_notify, &se32->sigev_notify) ||
  619. __copy_from_user(&se._sigev_un._pad, &se32->payload,
  620. sizeof(se32->payload)) ||
  621. copy_to_user(p, &se, sizeof(se)))
  622. return -EFAULT;
  623. }
  624. return sys_timer_create(clock, p, timer_id);
  625. }
  626. save_static_function(sys32_clone);
  627. __attribute_used__ noinline static int
  628. _sys32_clone(nabi_no_regargs struct pt_regs regs)
  629. {
  630. unsigned long clone_flags;
  631. unsigned long newsp;
  632. int __user *parent_tidptr, *child_tidptr;
  633. clone_flags = regs.regs[4];
  634. newsp = regs.regs[5];
  635. if (!newsp)
  636. newsp = regs.regs[29];
  637. parent_tidptr = (int __user *) regs.regs[6];
  638. /* Use __dummy4 instead of getting it off the stack, so that
  639. syscall() works. */
  640. child_tidptr = (int __user *) __dummy4;
  641. return do_fork(clone_flags, newsp, &regs, 0,
  642. parent_tidptr, child_tidptr);
  643. }
  644. /*
  645. * Implement the event wait interface for the eventpoll file. It is the kernel
  646. * part of the user space epoll_pwait(2).
  647. */
  648. asmlinkage long compat_sys_epoll_pwait(int epfd,
  649. struct epoll_event __user *events, int maxevents, int timeout,
  650. const compat_sigset_t __user *sigmask, size_t sigsetsize)
  651. {
  652. int error;
  653. sigset_t ksigmask, sigsaved;
  654. /*
  655. * If the caller wants a certain signal mask to be set during the wait,
  656. * we apply it here.
  657. */
  658. if (sigmask) {
  659. if (sigsetsize != sizeof(sigset_t))
  660. return -EINVAL;
  661. if (!access_ok(VERIFY_READ, sigmask, sizeof(ksigmask)))
  662. return -EFAULT;
  663. if (__copy_conv_sigset_from_user(&ksigmask, sigmask))
  664. return -EFAULT;
  665. sigdelsetmask(&ksigmask, sigmask(SIGKILL) | sigmask(SIGSTOP));
  666. sigprocmask(SIG_SETMASK, &ksigmask, &sigsaved);
  667. }
  668. error = sys_epoll_wait(epfd, events, maxevents, timeout);
  669. /*
  670. * If we changed the signal mask, we need to restore the original one.
  671. * In case we've got a signal while waiting, we do not restore the
  672. * signal mask yet, and we allow do_signal() to deliver the signal on
  673. * the way back to userspace, before the signal mask is restored.
  674. */
  675. if (sigmask) {
  676. if (error == -EINTR) {
  677. memcpy(&current->saved_sigmask, &sigsaved,
  678. sizeof(sigsaved));
  679. set_thread_flag(TIF_RESTORE_SIGMASK);
  680. } else
  681. sigprocmask(SIG_SETMASK, &sigsaved, NULL);
  682. }
  683. return error;
  684. }