OpenCores
URL https://opencores.org/ocsvn/or1k/or1k/trunk

Subversion Repositories or1k

[/] [or1k/] [trunk/] [linux/] [linux-2.4/] [arch/] [x86_64/] [ia32/] [socket32.c] - Blame information for rev 1765

Details | Compare with Previous | View Log

Line No. Rev Author Line
1 1275 phoenix
/*
2
 * 32bit Socket syscall emulation. Based on arch/sparc64/kernel/sys_sparc32.c.
3
 *
4
 * Copyright (C) 2000           VA Linux Co
5
 * Copyright (C) 2000           Don Dugger <n0ano@valinux.com>
6
 * Copyright (C) 1999           Arun Sharma <arun.sharma@intel.com>
7
 * Copyright (C) 1997,1998      Jakub Jelinek (jj@sunsite.mff.cuni.cz)
8
 * Copyright (C) 1997           David S. Miller (davem@caip.rutgers.edu)
9
 * Copyright (C) 2000           Hewlett-Packard Co.
10
 * Copyright (C) 2000           David Mosberger-Tang <davidm@hpl.hp.com>
11
 * Copyright (C) 2000,2001      Andi Kleen, SuSE Labs
12
 */
13
 
14
#include <linux/kernel.h>
15
#include <linux/fs.h>
16
#include <linux/sched.h>
17
#include <linux/types.h>
18
#include <linux/file.h>
19
#include <linux/icmpv6.h>
20
#include <linux/socket.h>
21
#include <linux/filter.h>
22
 
23
#include <net/scm.h>
24
#include <net/sock.h>
25
#include <asm/ia32.h>
26
#include <asm/uaccess.h>
27
#include <asm/socket32.h>
28
 
29
#define A(__x)          ((unsigned long)(__x))
30
#define AA(__x)         ((unsigned long)(__x))
31
 
32
 
33
static inline int iov_from_user32_to_kern(struct iovec *kiov,
34
                                          struct iovec32 *uiov32,
35
                                          int niov)
36
{
37
        int tot_len = 0;
38
 
39
        while(niov > 0) {
40
                u32 len, buf;
41
 
42
                if(get_user(len, &uiov32->iov_len) ||
43
                   get_user(buf, &uiov32->iov_base)) {
44
                        tot_len = -EFAULT;
45
                        break;
46
                }
47
                tot_len += len;
48
                kiov->iov_base = (void *)A(buf);
49
                kiov->iov_len = (__kernel_size_t) len;
50
                uiov32++;
51
                kiov++;
52
                niov--;
53
        }
54
        return tot_len;
55
}
56
 
57
static inline int msghdr_from_user32_to_kern(struct msghdr *kmsg,
58
                                             struct msghdr32 *umsg)
59
{
60
        u32 tmp1, tmp2, tmp3;
61
        int err;
62
 
63
        err = get_user(tmp1, &umsg->msg_name);
64
        err |= __get_user(tmp2, &umsg->msg_iov);
65
        err |= __get_user(tmp3, &umsg->msg_control);
66
        if (err)
67
                return -EFAULT;
68
 
69
        kmsg->msg_name = (void *)A(tmp1);
70
        kmsg->msg_iov = (struct iovec *)A(tmp2);
71
        kmsg->msg_control = (void *)A(tmp3);
72
 
73
        err = get_user(kmsg->msg_namelen, &umsg->msg_namelen);
74
        err |= get_user(kmsg->msg_iovlen, &umsg->msg_iovlen);
75
        err |= get_user(kmsg->msg_controllen, &umsg->msg_controllen);
76
        err |= get_user(kmsg->msg_flags, &umsg->msg_flags);
77
 
78
        return err;
79
}
80
 
81
/* I've named the args so it is easy to tell whose space the pointers are in. */
82
static int verify_iovec32(struct msghdr *kern_msg, struct iovec *kern_iov,
83
                          char *kern_address, int mode)
84
{
85
        int tot_len;
86
 
87
        if(kern_msg->msg_namelen) {
88
                if(mode==VERIFY_READ) {
89
                        int err = move_addr_to_kernel(kern_msg->msg_name,
90
                                                      kern_msg->msg_namelen,
91
                                                      kern_address);
92
                        if(err < 0)
93
                                return err;
94
                }
95
                kern_msg->msg_name = kern_address;
96
        } else
97
                kern_msg->msg_name = NULL;
98
 
99
        if(kern_msg->msg_iovlen > UIO_FASTIOV) {
100
                if (kern_msg->msg_iovlen > (2*PAGE_SIZE)/ sizeof(struct iovec))
101
                        return -EINVAL;
102
                kern_iov = kmalloc(kern_msg->msg_iovlen * sizeof(struct iovec),
103
                                   GFP_KERNEL);
104
                if(!kern_iov)
105
                        return -ENOMEM;
106
        }
107
 
108
        tot_len = iov_from_user32_to_kern(kern_iov,
109
                                          (struct iovec32 *)kern_msg->msg_iov,
110
                                          kern_msg->msg_iovlen);
111
        if(tot_len >= 0)
112
                kern_msg->msg_iov = kern_iov;
113
        else if(kern_msg->msg_iovlen > UIO_FASTIOV)
114
                kfree(kern_iov);
115
 
116
        return tot_len;
117
}
118
 
119
/* There is a lot of hair here because the alignment rules (and
120
 * thus placement) of cmsg headers and length are different for
121
 * 32-bit apps.  -DaveM
122
 */
123
static int cmsghdr_from_user32_to_kern(struct msghdr *kmsg,
124
                                       unsigned char *stackbuf, int stackbuf_size)
125
{
126
        struct cmsghdr32 *ucmsg;
127
        struct cmsghdr *kcmsg, *kcmsg_base;
128
        __kernel_size_t32 ucmlen;
129
        __kernel_size_t kcmlen, tmp;
130
 
131
        kcmlen = 0;
132
        kcmsg_base = kcmsg = (struct cmsghdr *)stackbuf;
133
        ucmsg = CMSG32_FIRSTHDR(kmsg);
134
        while(ucmsg != NULL) {
135
                if(get_user(ucmlen, &ucmsg->cmsg_len))
136
                        return -EFAULT;
137
 
138
                /* Catch bogons. */
139
                if(CMSG32_ALIGN(ucmlen) <
140
                   CMSG32_ALIGN(sizeof(struct cmsghdr32)))
141
                        return -EINVAL;
142
                if((unsigned long)(((char *)ucmsg - (char *)kmsg->msg_control)
143
                                   + ucmlen) > kmsg->msg_controllen)
144
                        return -EINVAL;
145
                if (kmsg->msg_controllen > 65536)
146
                        return -EINVAL;
147
 
148
                tmp = ((ucmlen - CMSG32_ALIGN(sizeof(*ucmsg))) +
149
                       CMSG_ALIGN(sizeof(struct cmsghdr)));
150
                kcmlen += tmp;
151
                ucmsg = CMSG32_NXTHDR(kmsg, ucmsg, ucmlen);
152
        }
153
        if(kcmlen == 0)
154
                return -EINVAL;
155
 
156
        /* The kcmlen holds the 64-bit version of the control length.
157
         * It may not be modified as we do not stick it into the kmsg
158
         * until we have successfully copied over all of the data
159
         * from the user.
160
         */
161
        if(kcmlen > stackbuf_size)
162
                kcmsg_base = kcmsg = kmalloc(kcmlen, GFP_KERNEL);
163
        if(kcmsg == NULL)
164
                return -ENOBUFS;
165
 
166
        /* Now copy them over neatly. */
167
        memset(kcmsg, 0, kcmlen);
168
        ucmsg = CMSG32_FIRSTHDR(kmsg);
169
        while(ucmsg != NULL) {
170
                __get_user(ucmlen, &ucmsg->cmsg_len);
171
                tmp = ((ucmlen - CMSG32_ALIGN(sizeof(*ucmsg))) +
172
                       CMSG_ALIGN(sizeof(struct cmsghdr)));
173
                kcmsg->cmsg_len = tmp;
174
                __get_user(kcmsg->cmsg_level, &ucmsg->cmsg_level);
175
                __get_user(kcmsg->cmsg_type, &ucmsg->cmsg_type);
176
 
177
                /* Copy over the data. */
178
                if(copy_from_user(CMSG_DATA(kcmsg),
179
                                  CMSG32_DATA(ucmsg),
180
                                  (ucmlen - CMSG32_ALIGN(sizeof(*ucmsg)))))
181
                        goto out_free_efault;
182
 
183
                /* Advance. */
184
                kcmsg = (struct cmsghdr *)((char *)kcmsg + CMSG_ALIGN(tmp));
185
                ucmsg = CMSG32_NXTHDR(kmsg, ucmsg, ucmlen);
186
        }
187
 
188
        /* Ok, looks like we made it.  Hook it up and return success. */
189
        kmsg->msg_control = kcmsg_base;
190
        kmsg->msg_controllen = kcmlen;
191
        return 0;
192
 
193
out_free_efault:
194
        if(kcmsg_base != (struct cmsghdr *)stackbuf)
195
                kfree(kcmsg_base);
196
        return -EFAULT;
197
}
198
 
199
static void put_cmsg32(struct msghdr *kmsg, int level, int type,
200
                       int len, void *data)
201
{
202
        struct cmsghdr32 *cm = (struct cmsghdr32 *) kmsg->msg_control;
203
        struct cmsghdr32 cmhdr;
204
        int cmlen = CMSG32_LEN(len);
205
 
206
        if(cm == NULL || kmsg->msg_controllen < sizeof(*cm)) {
207
                kmsg->msg_flags |= MSG_CTRUNC;
208
                return;
209
        }
210
 
211
        if(kmsg->msg_controllen < cmlen) {
212
                kmsg->msg_flags |= MSG_CTRUNC;
213
                cmlen = kmsg->msg_controllen;
214
        }
215
        cmhdr.cmsg_level = level;
216
        cmhdr.cmsg_type = type;
217
        cmhdr.cmsg_len = cmlen;
218
 
219
        if(copy_to_user(cm, &cmhdr, sizeof cmhdr))
220
                return;
221
        if(copy_to_user(CMSG32_DATA(cm), data, cmlen - sizeof(struct cmsghdr32)))
222
                return;
223
        cmlen = CMSG32_SPACE(len);
224
        kmsg->msg_control += cmlen;
225
        kmsg->msg_controllen -= cmlen;
226
}
227
 
228
static void scm_detach_fds32(struct msghdr *kmsg, struct scm_cookie *scm)
229
{
230
        struct cmsghdr32 *cm = (struct cmsghdr32 *) kmsg->msg_control;
231
        int fdmax = (kmsg->msg_controllen - sizeof(struct cmsghdr32)) / sizeof(int);
232
        int fdnum = scm->fp->count;
233
        struct file **fp = scm->fp->fp;
234
        int *cmfptr;
235
        int err = 0, i;
236
 
237
        if (fdnum < fdmax)
238
                fdmax = fdnum;
239
 
240
        for (i = 0, cmfptr = (int *) CMSG32_DATA(cm); i < fdmax; i++, cmfptr++) {
241
                int new_fd;
242
                err = get_unused_fd();
243
                if (err < 0)
244
                        break;
245
                new_fd = err;
246
                err = put_user(new_fd, cmfptr);
247
                if (err) {
248
                        put_unused_fd(new_fd);
249
                        break;
250
                }
251
                /* Bump the usage count and install the file. */
252
                get_file(fp[i]);
253
                fd_install(new_fd, fp[i]);
254
        }
255
 
256
        if (i > 0) {
257
                int cmlen = CMSG32_LEN(i * sizeof(int));
258
                if (!err)
259
                        err = put_user(SOL_SOCKET, &cm->cmsg_level);
260
                if (!err)
261
                        err = put_user(SCM_RIGHTS, &cm->cmsg_type);
262
                if (!err)
263
                        err = put_user(cmlen, &cm->cmsg_len);
264
                if (!err) {
265
                        cmlen = CMSG32_SPACE(i * sizeof(int));
266
                        kmsg->msg_control += cmlen;
267
                        kmsg->msg_controllen -= cmlen;
268
                }
269
        }
270
        if (i < fdnum)
271
                kmsg->msg_flags |= MSG_CTRUNC;
272
 
273
        /*
274
         * All of the files that fit in the message have had their
275
         * usage counts incremented, so we just free the list.
276
         */
277
        __scm_destroy(scm);
278
}
279
 
280
/* In these cases we (currently) can just copy to data over verbatim
281
 * because all CMSGs created by the kernel have well defined types which
282
 * have the same layout in both the 32-bit and 64-bit API.  One must add
283
 * some special cased conversions here if we start sending control messages
284
 * with incompatible types.
285
 *
286
 * SCM_RIGHTS and SCM_CREDENTIALS are done by hand in recvmsg32 right after
287
 * we do our work.  The remaining cases are:
288
 *
289
 * SOL_IP       IP_PKTINFO      struct in_pktinfo       32-bit clean
290
 *              IP_TTL          int                     32-bit clean
291
 *              IP_TOS          __u8                    32-bit clean
292
 *              IP_RECVOPTS     variable length         32-bit clean
293
 *              IP_RETOPTS      variable length         32-bit clean
294
 *              (these last two are clean because the types are defined
295
 *               by the IPv4 protocol)
296
 *              IP_RECVERR      struct sock_extended_err +
297
 *                              struct sockaddr_in      32-bit clean
298
 * SOL_IPV6     IPV6_RECVERR    struct sock_extended_err +
299
 *                              struct sockaddr_in6     32-bit clean
300
 *              IPV6_PKTINFO    struct in6_pktinfo      32-bit clean
301
 *              IPV6_HOPLIMIT   int                     32-bit clean
302
 *              IPV6_FLOWINFO   u32                     32-bit clean
303
 *              IPV6_HOPOPTS    ipv6 hop exthdr         32-bit clean
304
 *              IPV6_DSTOPTS    ipv6 dst exthdr(s)      32-bit clean
305
 *              IPV6_RTHDR      ipv6 routing exthdr     32-bit clean
306
 *              IPV6_AUTHHDR    ipv6 auth exthdr        32-bit clean
307
 */
308
static void cmsg32_recvmsg_fixup(struct msghdr *kmsg, unsigned long orig_cmsg_uptr)
309
{
310
        unsigned char *workbuf, *wp;
311
        unsigned long bufsz, space_avail;
312
        struct cmsghdr *ucmsg;
313
 
314
        bufsz = ((unsigned long)kmsg->msg_control) - orig_cmsg_uptr;
315
        space_avail = kmsg->msg_controllen + bufsz;
316
        wp = workbuf = kmalloc(bufsz, GFP_KERNEL);
317
        if(workbuf == NULL)
318
                goto fail;
319
 
320
        /* To make this more sane we assume the kernel sends back properly
321
         * formatted control messages.  Because of how the kernel will truncate
322
         * the cmsg_len for MSG_TRUNC cases, we need not check that case either.
323
         */
324
        ucmsg = (struct cmsghdr *) orig_cmsg_uptr;
325
        while(((unsigned long)ucmsg) <=
326
              (((unsigned long)kmsg->msg_control) - sizeof(struct cmsghdr))) {
327
                struct cmsghdr32 *kcmsg32 = (struct cmsghdr32 *) wp;
328
                int clen64, clen32;
329
 
330
                /* UCMSG is the 64-bit format CMSG entry in user-space.
331
                 * KCMSG32 is within the kernel space temporary buffer
332
                 * we use to convert into a 32-bit style CMSG.
333
                 */
334
                __get_user(kcmsg32->cmsg_len, &ucmsg->cmsg_len);
335
                __get_user(kcmsg32->cmsg_level, &ucmsg->cmsg_level);
336
                __get_user(kcmsg32->cmsg_type, &ucmsg->cmsg_type);
337
 
338
                clen64 = kcmsg32->cmsg_len;
339
                copy_from_user(CMSG32_DATA(kcmsg32), CMSG_DATA(ucmsg),
340
                               clen64 - CMSG_ALIGN(sizeof(*ucmsg)));
341
                clen32 = ((clen64 - CMSG_ALIGN(sizeof(*ucmsg))) +
342
                          CMSG32_ALIGN(sizeof(struct cmsghdr32)));
343
                kcmsg32->cmsg_len = clen32;
344
 
345
                ucmsg = (struct cmsghdr *) (((char *)ucmsg) + CMSG_ALIGN(clen64));
346
                wp = (((char *)kcmsg32) + CMSG32_ALIGN(clen32));
347
        }
348
 
349
        /* Copy back fixed up data, and adjust pointers. */
350
        bufsz = (wp - workbuf);
351
        copy_to_user((void *)orig_cmsg_uptr, workbuf, bufsz);
352
 
353
        kmsg->msg_control = (struct cmsghdr *)
354
                (((char *)orig_cmsg_uptr) + bufsz);
355
        kmsg->msg_controllen = space_avail - bufsz;
356
 
357
        kfree(workbuf);
358
        return;
359
 
360
fail:
361
        /* If we leave the 64-bit format CMSG chunks in there,
362
         * the application could get confused and crash.  So to
363
         * ensure greater recovery, we report no CMSGs.
364
         */
365
        kmsg->msg_controllen += bufsz;
366
        kmsg->msg_control = (void *) orig_cmsg_uptr;
367
}
368
 
369
asmlinkage long sys32_sendmsg(int fd, struct msghdr32 *user_msg, unsigned user_flags)
370
{
371
        struct socket *sock;
372
        char address[MAX_SOCK_ADDR];
373
        struct iovec iov[UIO_FASTIOV];
374
        unsigned char ctl[sizeof(struct cmsghdr) + 20];
375
        unsigned char *ctl_buf = ctl;
376
        struct msghdr kern_msg;
377
        int err, total_len;
378
 
379
        if(msghdr_from_user32_to_kern(&kern_msg, user_msg))
380
                return -EFAULT;
381
        if(kern_msg.msg_iovlen > UIO_MAXIOV)
382
                return -EINVAL;
383
        err = verify_iovec32(&kern_msg, iov, address, VERIFY_READ);
384
        if (err < 0)
385
                goto out;
386
        total_len = err;
387
 
388
        if(kern_msg.msg_controllen) {
389
                err = cmsghdr_from_user32_to_kern(&kern_msg, ctl, sizeof(ctl));
390
                if(err)
391
                        goto out_freeiov;
392
                ctl_buf = kern_msg.msg_control;
393
        }
394
        kern_msg.msg_flags = user_flags;
395
 
396
        sock = sockfd_lookup(fd, &err);
397
        if (sock != NULL) {
398
                if (sock->file->f_flags & O_NONBLOCK)
399
                        kern_msg.msg_flags |= MSG_DONTWAIT;
400
                err = sock_sendmsg(sock, &kern_msg, total_len);
401
                sockfd_put(sock);
402
        }
403
 
404
        /* N.B. Use kfree here, as kern_msg.msg_controllen might change? */
405
        if(ctl_buf != ctl)
406
                kfree(ctl_buf);
407
out_freeiov:
408
        if(kern_msg.msg_iov != iov)
409
                kfree(kern_msg.msg_iov);
410
out:
411
        return err;
412
}
413
 
414
asmlinkage long sys32_recvmsg(int fd, struct msghdr32 *user_msg, unsigned int user_flags)
415
{
416
        struct iovec iovstack[UIO_FASTIOV];
417
        struct msghdr kern_msg;
418
        char addr[MAX_SOCK_ADDR];
419
        struct socket *sock;
420
        struct iovec *iov = iovstack;
421
        struct sockaddr *uaddr;
422
        int *uaddr_len;
423
        unsigned long cmsg_ptr;
424
        int err, total_len, len = 0;
425
 
426
        if(msghdr_from_user32_to_kern(&kern_msg, user_msg))
427
                return -EFAULT;
428
        if(kern_msg.msg_iovlen > UIO_MAXIOV)
429
                return -EINVAL;
430
 
431
        uaddr = kern_msg.msg_name;
432
        uaddr_len = &user_msg->msg_namelen;
433
        err = verify_iovec32(&kern_msg, iov, addr, VERIFY_WRITE);
434
        if (err < 0)
435
                goto out;
436
        total_len = err;
437
 
438
        cmsg_ptr = (unsigned long) kern_msg.msg_control;
439
        kern_msg.msg_flags = 0;
440
 
441
        sock = sockfd_lookup(fd, &err);
442
        if (sock != NULL) {
443
                struct scm_cookie scm;
444
 
445
                if (sock->file->f_flags & O_NONBLOCK)
446
                        user_flags |= MSG_DONTWAIT;
447
                memset(&scm, 0, sizeof(scm));
448
                err = sock->ops->recvmsg(sock, &kern_msg, total_len,
449
                                         user_flags, &scm);
450
                if(err >= 0) {
451
                        len = err;
452
                        if(!kern_msg.msg_control) {
453
                                if(sock->passcred || scm.fp)
454
                                        kern_msg.msg_flags |= MSG_CTRUNC;
455
                                if(scm.fp)
456
                                        __scm_destroy(&scm);
457
                        } else {
458
                                /* If recvmsg processing itself placed some
459
                                 * control messages into user space, it's is
460
                                 * using 64-bit CMSG processing, so we need
461
                                 * to fix it up before we tack on more stuff.
462
                                 */
463
                                if((unsigned long) kern_msg.msg_control != cmsg_ptr)
464
                                        cmsg32_recvmsg_fixup(&kern_msg, cmsg_ptr);
465
 
466
                                /* Wheee... */
467
                                if(sock->passcred)
468
                                        put_cmsg32(&kern_msg,
469
                                                   SOL_SOCKET, SCM_CREDENTIALS,
470
                                                   sizeof(scm.creds), &scm.creds);
471
                                if(scm.fp != NULL)
472
                                        scm_detach_fds32(&kern_msg, &scm);
473
                        }
474
                }
475
                sockfd_put(sock);
476
        }
477
 
478
        if(uaddr != NULL && err >= 0)
479
                err = move_addr_to_user(addr, kern_msg.msg_namelen, uaddr, uaddr_len);
480
        if(cmsg_ptr != 0 && err >= 0) {
481
                unsigned long ucmsg_ptr = ((unsigned long)kern_msg.msg_control);
482
                __kernel_size_t32 uclen = (__kernel_size_t32) (ucmsg_ptr - cmsg_ptr);
483
                err |= __put_user(uclen, &user_msg->msg_controllen);
484
        }
485
        if(err >= 0)
486
                err = __put_user(kern_msg.msg_flags, &user_msg->msg_flags);
487
        if(kern_msg.msg_iov != iov)
488
                kfree(kern_msg.msg_iov);
489
out:
490
        if(err < 0)
491
                return err;
492
        return len;
493
}
494
 
495
extern asmlinkage int sys_setsockopt(int fd, int level, int optname,
496
                                     char *optval, int optlen);
497
 
498
static int do_set_attach_filter(int fd, int level, int optname,
499
                                char *optval, int optlen)
500
{
501
        struct sock_fprog32 {
502
                __u16 len;
503
                __u32 filter;
504
        } *fprog32 = (struct sock_fprog32 *)optval;
505
        struct sock_fprog kfprog;
506
        mm_segment_t old_fs;
507
        __u32 uptr;
508
        int ret;
509
 
510
        if (get_user(kfprog.len, &fprog32->len) ||
511
            __get_user(uptr, &fprog32->filter))
512
                return -EFAULT;
513
 
514
        kfprog.filter = (struct sock_filter *)A(uptr);
515
 
516
        if (verify_area(VERIFY_WRITE, kfprog.filter, kfprog.len*sizeof(struct sock_filter)))
517
                return -EFAULT;
518
 
519
        old_fs = get_fs();
520
        set_fs(KERNEL_DS);
521
        ret = sys_setsockopt(fd, level, optname,
522
                             (char *)&kfprog, sizeof(kfprog));
523
        set_fs(old_fs);
524
 
525
        return ret;
526
}
527
 
528
static int do_set_icmpv6_filter(int fd, int level, int optname,
529
                                char *optval, int optlen)
530
{
531
        struct icmp6_filter kfilter;
532
        mm_segment_t old_fs;
533
        int ret, i;
534
 
535
        if (copy_from_user(&kfilter, optval, sizeof(kfilter)))
536
                return -EFAULT;
537
 
538
 
539
        for (i = 0; i < 8; i += 2) {
540
                u32 tmp = kfilter.data[i];
541
 
542
                kfilter.data[i] = kfilter.data[i + 1];
543
                kfilter.data[i + 1] = tmp;
544
        }
545
 
546
        old_fs = get_fs();
547
        set_fs(KERNEL_DS);
548
        ret = sys_setsockopt(fd, level, optname,
549
                             (char *) &kfilter, sizeof(kfilter));
550
        set_fs(old_fs);
551
 
552
        return ret;
553
}
554
 
555
asmlinkage long sys32_setsockopt(int fd, int level, int optname,
556
                                char *optval, int optlen)
557
{
558
        if (optname == SO_ATTACH_FILTER)
559
                return do_set_attach_filter(fd, level, optname,
560
                                            optval, optlen);
561
        if (level == SOL_ICMPV6 && optname == ICMPV6_FILTER)
562
                return do_set_icmpv6_filter(fd, level, optname,
563
                                            optval, optlen);
564
 
565
        return sys_setsockopt(fd, level, optname, optval, optlen);
566
}
567
 
568
 
569
/* Argument list sizes for sys_socketcall */
570
#define AL(x) ((x) * sizeof(u32))
571
static unsigned char nas[18]={AL(0),AL(3),AL(3),AL(3),AL(2),AL(3),
572
                                AL(3),AL(3),AL(4),AL(4),AL(4),AL(6),
573
                                AL(6),AL(2),AL(5),AL(5),AL(3),AL(3)};
574
#undef AL
575
 
576
extern asmlinkage long sys_bind(int fd, struct sockaddr *umyaddr, int addrlen);
577
extern asmlinkage long sys_connect(int fd, struct sockaddr *uservaddr,
578
                                  int addrlen);
579
extern asmlinkage long sys_accept(int fd, struct sockaddr *upeer_sockaddr,
580
                                 int *upeer_addrlen);
581
extern asmlinkage long sys_getsockname(int fd, struct sockaddr *usockaddr,
582
                                      int *usockaddr_len);
583
extern asmlinkage long sys_getpeername(int fd, struct sockaddr *usockaddr,
584
                                      int *usockaddr_len);
585
extern asmlinkage long sys_send(int fd, void *buff, size_t len, unsigned flags);
586
extern asmlinkage long sys_sendto(int fd, u32 buff, __kernel_size_t32 len,
587
                                   unsigned flags, u32 addr, int addr_len);
588
extern asmlinkage long sys_recv(int fd, void *ubuf, size_t size, unsigned flags);
589
extern asmlinkage long sys_recvfrom(int fd, u32 ubuf, __kernel_size_t32 size,
590
                                     unsigned flags, u32 addr, u32 addr_len);
591
extern asmlinkage long sys_getsockopt(int fd, int level, int optname,
592
                                       u32 optval, u32 optlen);
593
 
594
extern asmlinkage long sys_socket(int family, int type, int protocol);
595
extern asmlinkage long sys_socketpair(int family, int type, int protocol,
596
                                     int usockvec[2]);
597
extern asmlinkage long sys_shutdown(int fd, int how);
598
extern asmlinkage long sys_listen(int fd, int backlog);
599
 
600
asmlinkage long sys32_socketcall(int call, u32 *args)
601
{
602
        int ret;
603
        u32 a[6];
604
        u32 a0,a1;
605
 
606
        if (call<SYS_SOCKET||call>SYS_RECVMSG)
607
                return -EINVAL;
608
        if (copy_from_user(a, args, nas[call]))
609
                return -EFAULT;
610
        a0=a[0];
611
        a1=a[1];
612
 
613
        switch(call)
614
        {
615
                case SYS_SOCKET:
616
                        ret = sys_socket(a0, a1, a[2]);
617
                        break;
618
                case SYS_BIND:
619
                        ret = sys_bind(a0, (struct sockaddr *)A(a1), a[2]);
620
                        break;
621
                case SYS_CONNECT:
622
                        ret = sys_connect(a0, (struct sockaddr *)A(a1), a[2]);
623
                        break;
624
                case SYS_LISTEN:
625
                        ret = sys_listen(a0, a1);
626
                        break;
627
                case SYS_ACCEPT:
628
                        ret = sys_accept(a0, (struct sockaddr *)A(a1),
629
                                          (int *)A(a[2]));
630
                        break;
631
                case SYS_GETSOCKNAME:
632
                        ret = sys_getsockname(a0, (struct sockaddr *)A(a1),
633
                                               (int *)A(a[2]));
634
                        break;
635
                case SYS_GETPEERNAME:
636
                        ret = sys_getpeername(a0, (struct sockaddr *)A(a1),
637
                                               (int *)A(a[2]));
638
                        break;
639
                case SYS_SOCKETPAIR:
640
                        ret = sys_socketpair(a0, a1, a[2], (int *)A(a[3]));
641
                        break;
642
                case SYS_SEND:
643
                        ret = sys_send(a0, (void *)A(a1), a[2], a[3]);
644
                        break;
645
                case SYS_SENDTO:
646
                        ret = sys_sendto(a0, a1, a[2], a[3], a[4], a[5]);
647
                        break;
648
                case SYS_RECV:
649
                        ret = sys_recv(a0, (void *)A(a1), a[2], a[3]);
650
                        break;
651
                case SYS_RECVFROM:
652
                        ret = sys_recvfrom(a0, a1, a[2], a[3], a[4], a[5]);
653
                        break;
654
                case SYS_SHUTDOWN:
655
                        ret = sys_shutdown(a0,a1);
656
                        break;
657
                case SYS_SETSOCKOPT:
658
                        ret = sys32_setsockopt(a0, a1, a[2], (char *)A(a[3]),
659
                                              a[4]);
660
                        break;
661
                case SYS_GETSOCKOPT:
662
                        ret = sys_getsockopt(a0, a1, a[2], a[3], a[4]);
663
                        break;
664
                case SYS_SENDMSG:
665
                        ret = sys32_sendmsg(a0, (struct msghdr32 *)A(a1),
666
                                             a[2]);
667
                        break;
668
                case SYS_RECVMSG:
669
                        ret = sys32_recvmsg(a0, (struct msghdr32 *)A(a1),
670
                                             a[2]);
671
                        break;
672
                default:
673
                        ret = -EINVAL;
674
                        break;
675
        }
676
        return ret;
677
}

powered by: WebSVN 2.1.0

© copyright 1999-2024 OpenCores.org, equivalent to Oliscience, all rights reserved. OpenCores®, registered trademark.