1 |
1275 |
phoenix |
/*
|
2 |
|
|
* 32bit Socket syscall emulation. Based on arch/sparc64/kernel/sys_sparc32.c.
|
3 |
|
|
*
|
4 |
|
|
* Copyright (C) 2000 VA Linux Co
|
5 |
|
|
* Copyright (C) 2000 Don Dugger <n0ano@valinux.com>
|
6 |
|
|
* Copyright (C) 1999 Arun Sharma <arun.sharma@intel.com>
|
7 |
|
|
* Copyright (C) 1997,1998 Jakub Jelinek (jj@sunsite.mff.cuni.cz)
|
8 |
|
|
* Copyright (C) 1997 David S. Miller (davem@caip.rutgers.edu)
|
9 |
|
|
* Copyright (C) 2000 Hewlett-Packard Co.
|
10 |
|
|
* Copyright (C) 2000 David Mosberger-Tang <davidm@hpl.hp.com>
|
11 |
|
|
* Copyright (C) 2000,2001 Andi Kleen, SuSE Labs
|
12 |
|
|
*/
|
13 |
|
|
|
14 |
|
|
#include <linux/kernel.h>
|
15 |
|
|
#include <linux/fs.h>
|
16 |
|
|
#include <linux/sched.h>
|
17 |
|
|
#include <linux/types.h>
|
18 |
|
|
#include <linux/file.h>
|
19 |
|
|
#include <linux/icmpv6.h>
|
20 |
|
|
#include <linux/socket.h>
|
21 |
|
|
#include <linux/filter.h>
|
22 |
|
|
|
23 |
|
|
#include <net/scm.h>
|
24 |
|
|
#include <net/sock.h>
|
25 |
|
|
#include <asm/ia32.h>
|
26 |
|
|
#include <asm/uaccess.h>
|
27 |
|
|
#include <asm/socket32.h>
|
28 |
|
|
|
29 |
|
|
#define A(__x) ((unsigned long)(__x))
|
30 |
|
|
#define AA(__x) ((unsigned long)(__x))
|
31 |
|
|
|
32 |
|
|
|
33 |
|
|
static inline int iov_from_user32_to_kern(struct iovec *kiov,
|
34 |
|
|
struct iovec32 *uiov32,
|
35 |
|
|
int niov)
|
36 |
|
|
{
|
37 |
|
|
int tot_len = 0;
|
38 |
|
|
|
39 |
|
|
while(niov > 0) {
|
40 |
|
|
u32 len, buf;
|
41 |
|
|
|
42 |
|
|
if(get_user(len, &uiov32->iov_len) ||
|
43 |
|
|
get_user(buf, &uiov32->iov_base)) {
|
44 |
|
|
tot_len = -EFAULT;
|
45 |
|
|
break;
|
46 |
|
|
}
|
47 |
|
|
tot_len += len;
|
48 |
|
|
kiov->iov_base = (void *)A(buf);
|
49 |
|
|
kiov->iov_len = (__kernel_size_t) len;
|
50 |
|
|
uiov32++;
|
51 |
|
|
kiov++;
|
52 |
|
|
niov--;
|
53 |
|
|
}
|
54 |
|
|
return tot_len;
|
55 |
|
|
}
|
56 |
|
|
|
57 |
|
|
static inline int msghdr_from_user32_to_kern(struct msghdr *kmsg,
|
58 |
|
|
struct msghdr32 *umsg)
|
59 |
|
|
{
|
60 |
|
|
u32 tmp1, tmp2, tmp3;
|
61 |
|
|
int err;
|
62 |
|
|
|
63 |
|
|
err = get_user(tmp1, &umsg->msg_name);
|
64 |
|
|
err |= __get_user(tmp2, &umsg->msg_iov);
|
65 |
|
|
err |= __get_user(tmp3, &umsg->msg_control);
|
66 |
|
|
if (err)
|
67 |
|
|
return -EFAULT;
|
68 |
|
|
|
69 |
|
|
kmsg->msg_name = (void *)A(tmp1);
|
70 |
|
|
kmsg->msg_iov = (struct iovec *)A(tmp2);
|
71 |
|
|
kmsg->msg_control = (void *)A(tmp3);
|
72 |
|
|
|
73 |
|
|
err = get_user(kmsg->msg_namelen, &umsg->msg_namelen);
|
74 |
|
|
err |= get_user(kmsg->msg_iovlen, &umsg->msg_iovlen);
|
75 |
|
|
err |= get_user(kmsg->msg_controllen, &umsg->msg_controllen);
|
76 |
|
|
err |= get_user(kmsg->msg_flags, &umsg->msg_flags);
|
77 |
|
|
|
78 |
|
|
return err;
|
79 |
|
|
}
|
80 |
|
|
|
81 |
|
|
/* I've named the args so it is easy to tell whose space the pointers are in. */
|
82 |
|
|
static int verify_iovec32(struct msghdr *kern_msg, struct iovec *kern_iov,
|
83 |
|
|
char *kern_address, int mode)
|
84 |
|
|
{
|
85 |
|
|
int tot_len;
|
86 |
|
|
|
87 |
|
|
if(kern_msg->msg_namelen) {
|
88 |
|
|
if(mode==VERIFY_READ) {
|
89 |
|
|
int err = move_addr_to_kernel(kern_msg->msg_name,
|
90 |
|
|
kern_msg->msg_namelen,
|
91 |
|
|
kern_address);
|
92 |
|
|
if(err < 0)
|
93 |
|
|
return err;
|
94 |
|
|
}
|
95 |
|
|
kern_msg->msg_name = kern_address;
|
96 |
|
|
} else
|
97 |
|
|
kern_msg->msg_name = NULL;
|
98 |
|
|
|
99 |
|
|
if(kern_msg->msg_iovlen > UIO_FASTIOV) {
|
100 |
|
|
if (kern_msg->msg_iovlen > (2*PAGE_SIZE)/ sizeof(struct iovec))
|
101 |
|
|
return -EINVAL;
|
102 |
|
|
kern_iov = kmalloc(kern_msg->msg_iovlen * sizeof(struct iovec),
|
103 |
|
|
GFP_KERNEL);
|
104 |
|
|
if(!kern_iov)
|
105 |
|
|
return -ENOMEM;
|
106 |
|
|
}
|
107 |
|
|
|
108 |
|
|
tot_len = iov_from_user32_to_kern(kern_iov,
|
109 |
|
|
(struct iovec32 *)kern_msg->msg_iov,
|
110 |
|
|
kern_msg->msg_iovlen);
|
111 |
|
|
if(tot_len >= 0)
|
112 |
|
|
kern_msg->msg_iov = kern_iov;
|
113 |
|
|
else if(kern_msg->msg_iovlen > UIO_FASTIOV)
|
114 |
|
|
kfree(kern_iov);
|
115 |
|
|
|
116 |
|
|
return tot_len;
|
117 |
|
|
}
|
118 |
|
|
|
119 |
|
|
/* There is a lot of hair here because the alignment rules (and
|
120 |
|
|
* thus placement) of cmsg headers and length are different for
|
121 |
|
|
* 32-bit apps. -DaveM
|
122 |
|
|
*/
|
123 |
|
|
static int cmsghdr_from_user32_to_kern(struct msghdr *kmsg,
|
124 |
|
|
unsigned char *stackbuf, int stackbuf_size)
|
125 |
|
|
{
|
126 |
|
|
struct cmsghdr32 *ucmsg;
|
127 |
|
|
struct cmsghdr *kcmsg, *kcmsg_base;
|
128 |
|
|
__kernel_size_t32 ucmlen;
|
129 |
|
|
__kernel_size_t kcmlen, tmp;
|
130 |
|
|
|
131 |
|
|
kcmlen = 0;
|
132 |
|
|
kcmsg_base = kcmsg = (struct cmsghdr *)stackbuf;
|
133 |
|
|
ucmsg = CMSG32_FIRSTHDR(kmsg);
|
134 |
|
|
while(ucmsg != NULL) {
|
135 |
|
|
if(get_user(ucmlen, &ucmsg->cmsg_len))
|
136 |
|
|
return -EFAULT;
|
137 |
|
|
|
138 |
|
|
/* Catch bogons. */
|
139 |
|
|
if(CMSG32_ALIGN(ucmlen) <
|
140 |
|
|
CMSG32_ALIGN(sizeof(struct cmsghdr32)))
|
141 |
|
|
return -EINVAL;
|
142 |
|
|
if((unsigned long)(((char *)ucmsg - (char *)kmsg->msg_control)
|
143 |
|
|
+ ucmlen) > kmsg->msg_controllen)
|
144 |
|
|
return -EINVAL;
|
145 |
|
|
if (kmsg->msg_controllen > 65536)
|
146 |
|
|
return -EINVAL;
|
147 |
|
|
|
148 |
|
|
tmp = ((ucmlen - CMSG32_ALIGN(sizeof(*ucmsg))) +
|
149 |
|
|
CMSG_ALIGN(sizeof(struct cmsghdr)));
|
150 |
|
|
kcmlen += tmp;
|
151 |
|
|
ucmsg = CMSG32_NXTHDR(kmsg, ucmsg, ucmlen);
|
152 |
|
|
}
|
153 |
|
|
if(kcmlen == 0)
|
154 |
|
|
return -EINVAL;
|
155 |
|
|
|
156 |
|
|
/* The kcmlen holds the 64-bit version of the control length.
|
157 |
|
|
* It may not be modified as we do not stick it into the kmsg
|
158 |
|
|
* until we have successfully copied over all of the data
|
159 |
|
|
* from the user.
|
160 |
|
|
*/
|
161 |
|
|
if(kcmlen > stackbuf_size)
|
162 |
|
|
kcmsg_base = kcmsg = kmalloc(kcmlen, GFP_KERNEL);
|
163 |
|
|
if(kcmsg == NULL)
|
164 |
|
|
return -ENOBUFS;
|
165 |
|
|
|
166 |
|
|
/* Now copy them over neatly. */
|
167 |
|
|
memset(kcmsg, 0, kcmlen);
|
168 |
|
|
ucmsg = CMSG32_FIRSTHDR(kmsg);
|
169 |
|
|
while(ucmsg != NULL) {
|
170 |
|
|
__get_user(ucmlen, &ucmsg->cmsg_len);
|
171 |
|
|
tmp = ((ucmlen - CMSG32_ALIGN(sizeof(*ucmsg))) +
|
172 |
|
|
CMSG_ALIGN(sizeof(struct cmsghdr)));
|
173 |
|
|
kcmsg->cmsg_len = tmp;
|
174 |
|
|
__get_user(kcmsg->cmsg_level, &ucmsg->cmsg_level);
|
175 |
|
|
__get_user(kcmsg->cmsg_type, &ucmsg->cmsg_type);
|
176 |
|
|
|
177 |
|
|
/* Copy over the data. */
|
178 |
|
|
if(copy_from_user(CMSG_DATA(kcmsg),
|
179 |
|
|
CMSG32_DATA(ucmsg),
|
180 |
|
|
(ucmlen - CMSG32_ALIGN(sizeof(*ucmsg)))))
|
181 |
|
|
goto out_free_efault;
|
182 |
|
|
|
183 |
|
|
/* Advance. */
|
184 |
|
|
kcmsg = (struct cmsghdr *)((char *)kcmsg + CMSG_ALIGN(tmp));
|
185 |
|
|
ucmsg = CMSG32_NXTHDR(kmsg, ucmsg, ucmlen);
|
186 |
|
|
}
|
187 |
|
|
|
188 |
|
|
/* Ok, looks like we made it. Hook it up and return success. */
|
189 |
|
|
kmsg->msg_control = kcmsg_base;
|
190 |
|
|
kmsg->msg_controllen = kcmlen;
|
191 |
|
|
return 0;
|
192 |
|
|
|
193 |
|
|
out_free_efault:
|
194 |
|
|
if(kcmsg_base != (struct cmsghdr *)stackbuf)
|
195 |
|
|
kfree(kcmsg_base);
|
196 |
|
|
return -EFAULT;
|
197 |
|
|
}
|
198 |
|
|
|
199 |
|
|
static void put_cmsg32(struct msghdr *kmsg, int level, int type,
|
200 |
|
|
int len, void *data)
|
201 |
|
|
{
|
202 |
|
|
struct cmsghdr32 *cm = (struct cmsghdr32 *) kmsg->msg_control;
|
203 |
|
|
struct cmsghdr32 cmhdr;
|
204 |
|
|
int cmlen = CMSG32_LEN(len);
|
205 |
|
|
|
206 |
|
|
if(cm == NULL || kmsg->msg_controllen < sizeof(*cm)) {
|
207 |
|
|
kmsg->msg_flags |= MSG_CTRUNC;
|
208 |
|
|
return;
|
209 |
|
|
}
|
210 |
|
|
|
211 |
|
|
if(kmsg->msg_controllen < cmlen) {
|
212 |
|
|
kmsg->msg_flags |= MSG_CTRUNC;
|
213 |
|
|
cmlen = kmsg->msg_controllen;
|
214 |
|
|
}
|
215 |
|
|
cmhdr.cmsg_level = level;
|
216 |
|
|
cmhdr.cmsg_type = type;
|
217 |
|
|
cmhdr.cmsg_len = cmlen;
|
218 |
|
|
|
219 |
|
|
if(copy_to_user(cm, &cmhdr, sizeof cmhdr))
|
220 |
|
|
return;
|
221 |
|
|
if(copy_to_user(CMSG32_DATA(cm), data, cmlen - sizeof(struct cmsghdr32)))
|
222 |
|
|
return;
|
223 |
|
|
cmlen = CMSG32_SPACE(len);
|
224 |
|
|
kmsg->msg_control += cmlen;
|
225 |
|
|
kmsg->msg_controllen -= cmlen;
|
226 |
|
|
}
|
227 |
|
|
|
228 |
|
|
static void scm_detach_fds32(struct msghdr *kmsg, struct scm_cookie *scm)
|
229 |
|
|
{
|
230 |
|
|
struct cmsghdr32 *cm = (struct cmsghdr32 *) kmsg->msg_control;
|
231 |
|
|
int fdmax = (kmsg->msg_controllen - sizeof(struct cmsghdr32)) / sizeof(int);
|
232 |
|
|
int fdnum = scm->fp->count;
|
233 |
|
|
struct file **fp = scm->fp->fp;
|
234 |
|
|
int *cmfptr;
|
235 |
|
|
int err = 0, i;
|
236 |
|
|
|
237 |
|
|
if (fdnum < fdmax)
|
238 |
|
|
fdmax = fdnum;
|
239 |
|
|
|
240 |
|
|
for (i = 0, cmfptr = (int *) CMSG32_DATA(cm); i < fdmax; i++, cmfptr++) {
|
241 |
|
|
int new_fd;
|
242 |
|
|
err = get_unused_fd();
|
243 |
|
|
if (err < 0)
|
244 |
|
|
break;
|
245 |
|
|
new_fd = err;
|
246 |
|
|
err = put_user(new_fd, cmfptr);
|
247 |
|
|
if (err) {
|
248 |
|
|
put_unused_fd(new_fd);
|
249 |
|
|
break;
|
250 |
|
|
}
|
251 |
|
|
/* Bump the usage count and install the file. */
|
252 |
|
|
get_file(fp[i]);
|
253 |
|
|
fd_install(new_fd, fp[i]);
|
254 |
|
|
}
|
255 |
|
|
|
256 |
|
|
if (i > 0) {
|
257 |
|
|
int cmlen = CMSG32_LEN(i * sizeof(int));
|
258 |
|
|
if (!err)
|
259 |
|
|
err = put_user(SOL_SOCKET, &cm->cmsg_level);
|
260 |
|
|
if (!err)
|
261 |
|
|
err = put_user(SCM_RIGHTS, &cm->cmsg_type);
|
262 |
|
|
if (!err)
|
263 |
|
|
err = put_user(cmlen, &cm->cmsg_len);
|
264 |
|
|
if (!err) {
|
265 |
|
|
cmlen = CMSG32_SPACE(i * sizeof(int));
|
266 |
|
|
kmsg->msg_control += cmlen;
|
267 |
|
|
kmsg->msg_controllen -= cmlen;
|
268 |
|
|
}
|
269 |
|
|
}
|
270 |
|
|
if (i < fdnum)
|
271 |
|
|
kmsg->msg_flags |= MSG_CTRUNC;
|
272 |
|
|
|
273 |
|
|
/*
|
274 |
|
|
* All of the files that fit in the message have had their
|
275 |
|
|
* usage counts incremented, so we just free the list.
|
276 |
|
|
*/
|
277 |
|
|
__scm_destroy(scm);
|
278 |
|
|
}
|
279 |
|
|
|
280 |
|
|
/* In these cases we (currently) can just copy to data over verbatim
|
281 |
|
|
* because all CMSGs created by the kernel have well defined types which
|
282 |
|
|
* have the same layout in both the 32-bit and 64-bit API. One must add
|
283 |
|
|
* some special cased conversions here if we start sending control messages
|
284 |
|
|
* with incompatible types.
|
285 |
|
|
*
|
286 |
|
|
* SCM_RIGHTS and SCM_CREDENTIALS are done by hand in recvmsg32 right after
|
287 |
|
|
* we do our work. The remaining cases are:
|
288 |
|
|
*
|
289 |
|
|
* SOL_IP IP_PKTINFO struct in_pktinfo 32-bit clean
|
290 |
|
|
* IP_TTL int 32-bit clean
|
291 |
|
|
* IP_TOS __u8 32-bit clean
|
292 |
|
|
* IP_RECVOPTS variable length 32-bit clean
|
293 |
|
|
* IP_RETOPTS variable length 32-bit clean
|
294 |
|
|
* (these last two are clean because the types are defined
|
295 |
|
|
* by the IPv4 protocol)
|
296 |
|
|
* IP_RECVERR struct sock_extended_err +
|
297 |
|
|
* struct sockaddr_in 32-bit clean
|
298 |
|
|
* SOL_IPV6 IPV6_RECVERR struct sock_extended_err +
|
299 |
|
|
* struct sockaddr_in6 32-bit clean
|
300 |
|
|
* IPV6_PKTINFO struct in6_pktinfo 32-bit clean
|
301 |
|
|
* IPV6_HOPLIMIT int 32-bit clean
|
302 |
|
|
* IPV6_FLOWINFO u32 32-bit clean
|
303 |
|
|
* IPV6_HOPOPTS ipv6 hop exthdr 32-bit clean
|
304 |
|
|
* IPV6_DSTOPTS ipv6 dst exthdr(s) 32-bit clean
|
305 |
|
|
* IPV6_RTHDR ipv6 routing exthdr 32-bit clean
|
306 |
|
|
* IPV6_AUTHHDR ipv6 auth exthdr 32-bit clean
|
307 |
|
|
*/
|
308 |
|
|
static void cmsg32_recvmsg_fixup(struct msghdr *kmsg, unsigned long orig_cmsg_uptr)
|
309 |
|
|
{
|
310 |
|
|
unsigned char *workbuf, *wp;
|
311 |
|
|
unsigned long bufsz, space_avail;
|
312 |
|
|
struct cmsghdr *ucmsg;
|
313 |
|
|
|
314 |
|
|
bufsz = ((unsigned long)kmsg->msg_control) - orig_cmsg_uptr;
|
315 |
|
|
space_avail = kmsg->msg_controllen + bufsz;
|
316 |
|
|
wp = workbuf = kmalloc(bufsz, GFP_KERNEL);
|
317 |
|
|
if(workbuf == NULL)
|
318 |
|
|
goto fail;
|
319 |
|
|
|
320 |
|
|
/* To make this more sane we assume the kernel sends back properly
|
321 |
|
|
* formatted control messages. Because of how the kernel will truncate
|
322 |
|
|
* the cmsg_len for MSG_TRUNC cases, we need not check that case either.
|
323 |
|
|
*/
|
324 |
|
|
ucmsg = (struct cmsghdr *) orig_cmsg_uptr;
|
325 |
|
|
while(((unsigned long)ucmsg) <=
|
326 |
|
|
(((unsigned long)kmsg->msg_control) - sizeof(struct cmsghdr))) {
|
327 |
|
|
struct cmsghdr32 *kcmsg32 = (struct cmsghdr32 *) wp;
|
328 |
|
|
int clen64, clen32;
|
329 |
|
|
|
330 |
|
|
/* UCMSG is the 64-bit format CMSG entry in user-space.
|
331 |
|
|
* KCMSG32 is within the kernel space temporary buffer
|
332 |
|
|
* we use to convert into a 32-bit style CMSG.
|
333 |
|
|
*/
|
334 |
|
|
__get_user(kcmsg32->cmsg_len, &ucmsg->cmsg_len);
|
335 |
|
|
__get_user(kcmsg32->cmsg_level, &ucmsg->cmsg_level);
|
336 |
|
|
__get_user(kcmsg32->cmsg_type, &ucmsg->cmsg_type);
|
337 |
|
|
|
338 |
|
|
clen64 = kcmsg32->cmsg_len;
|
339 |
|
|
copy_from_user(CMSG32_DATA(kcmsg32), CMSG_DATA(ucmsg),
|
340 |
|
|
clen64 - CMSG_ALIGN(sizeof(*ucmsg)));
|
341 |
|
|
clen32 = ((clen64 - CMSG_ALIGN(sizeof(*ucmsg))) +
|
342 |
|
|
CMSG32_ALIGN(sizeof(struct cmsghdr32)));
|
343 |
|
|
kcmsg32->cmsg_len = clen32;
|
344 |
|
|
|
345 |
|
|
ucmsg = (struct cmsghdr *) (((char *)ucmsg) + CMSG_ALIGN(clen64));
|
346 |
|
|
wp = (((char *)kcmsg32) + CMSG32_ALIGN(clen32));
|
347 |
|
|
}
|
348 |
|
|
|
349 |
|
|
/* Copy back fixed up data, and adjust pointers. */
|
350 |
|
|
bufsz = (wp - workbuf);
|
351 |
|
|
copy_to_user((void *)orig_cmsg_uptr, workbuf, bufsz);
|
352 |
|
|
|
353 |
|
|
kmsg->msg_control = (struct cmsghdr *)
|
354 |
|
|
(((char *)orig_cmsg_uptr) + bufsz);
|
355 |
|
|
kmsg->msg_controllen = space_avail - bufsz;
|
356 |
|
|
|
357 |
|
|
kfree(workbuf);
|
358 |
|
|
return;
|
359 |
|
|
|
360 |
|
|
fail:
|
361 |
|
|
/* If we leave the 64-bit format CMSG chunks in there,
|
362 |
|
|
* the application could get confused and crash. So to
|
363 |
|
|
* ensure greater recovery, we report no CMSGs.
|
364 |
|
|
*/
|
365 |
|
|
kmsg->msg_controllen += bufsz;
|
366 |
|
|
kmsg->msg_control = (void *) orig_cmsg_uptr;
|
367 |
|
|
}
|
368 |
|
|
|
369 |
|
|
asmlinkage long sys32_sendmsg(int fd, struct msghdr32 *user_msg, unsigned user_flags)
|
370 |
|
|
{
|
371 |
|
|
struct socket *sock;
|
372 |
|
|
char address[MAX_SOCK_ADDR];
|
373 |
|
|
struct iovec iov[UIO_FASTIOV];
|
374 |
|
|
unsigned char ctl[sizeof(struct cmsghdr) + 20];
|
375 |
|
|
unsigned char *ctl_buf = ctl;
|
376 |
|
|
struct msghdr kern_msg;
|
377 |
|
|
int err, total_len;
|
378 |
|
|
|
379 |
|
|
if(msghdr_from_user32_to_kern(&kern_msg, user_msg))
|
380 |
|
|
return -EFAULT;
|
381 |
|
|
if(kern_msg.msg_iovlen > UIO_MAXIOV)
|
382 |
|
|
return -EINVAL;
|
383 |
|
|
err = verify_iovec32(&kern_msg, iov, address, VERIFY_READ);
|
384 |
|
|
if (err < 0)
|
385 |
|
|
goto out;
|
386 |
|
|
total_len = err;
|
387 |
|
|
|
388 |
|
|
if(kern_msg.msg_controllen) {
|
389 |
|
|
err = cmsghdr_from_user32_to_kern(&kern_msg, ctl, sizeof(ctl));
|
390 |
|
|
if(err)
|
391 |
|
|
goto out_freeiov;
|
392 |
|
|
ctl_buf = kern_msg.msg_control;
|
393 |
|
|
}
|
394 |
|
|
kern_msg.msg_flags = user_flags;
|
395 |
|
|
|
396 |
|
|
sock = sockfd_lookup(fd, &err);
|
397 |
|
|
if (sock != NULL) {
|
398 |
|
|
if (sock->file->f_flags & O_NONBLOCK)
|
399 |
|
|
kern_msg.msg_flags |= MSG_DONTWAIT;
|
400 |
|
|
err = sock_sendmsg(sock, &kern_msg, total_len);
|
401 |
|
|
sockfd_put(sock);
|
402 |
|
|
}
|
403 |
|
|
|
404 |
|
|
/* N.B. Use kfree here, as kern_msg.msg_controllen might change? */
|
405 |
|
|
if(ctl_buf != ctl)
|
406 |
|
|
kfree(ctl_buf);
|
407 |
|
|
out_freeiov:
|
408 |
|
|
if(kern_msg.msg_iov != iov)
|
409 |
|
|
kfree(kern_msg.msg_iov);
|
410 |
|
|
out:
|
411 |
|
|
return err;
|
412 |
|
|
}
|
413 |
|
|
|
414 |
|
|
asmlinkage long sys32_recvmsg(int fd, struct msghdr32 *user_msg, unsigned int user_flags)
|
415 |
|
|
{
|
416 |
|
|
struct iovec iovstack[UIO_FASTIOV];
|
417 |
|
|
struct msghdr kern_msg;
|
418 |
|
|
char addr[MAX_SOCK_ADDR];
|
419 |
|
|
struct socket *sock;
|
420 |
|
|
struct iovec *iov = iovstack;
|
421 |
|
|
struct sockaddr *uaddr;
|
422 |
|
|
int *uaddr_len;
|
423 |
|
|
unsigned long cmsg_ptr;
|
424 |
|
|
int err, total_len, len = 0;
|
425 |
|
|
|
426 |
|
|
if(msghdr_from_user32_to_kern(&kern_msg, user_msg))
|
427 |
|
|
return -EFAULT;
|
428 |
|
|
if(kern_msg.msg_iovlen > UIO_MAXIOV)
|
429 |
|
|
return -EINVAL;
|
430 |
|
|
|
431 |
|
|
uaddr = kern_msg.msg_name;
|
432 |
|
|
uaddr_len = &user_msg->msg_namelen;
|
433 |
|
|
err = verify_iovec32(&kern_msg, iov, addr, VERIFY_WRITE);
|
434 |
|
|
if (err < 0)
|
435 |
|
|
goto out;
|
436 |
|
|
total_len = err;
|
437 |
|
|
|
438 |
|
|
cmsg_ptr = (unsigned long) kern_msg.msg_control;
|
439 |
|
|
kern_msg.msg_flags = 0;
|
440 |
|
|
|
441 |
|
|
sock = sockfd_lookup(fd, &err);
|
442 |
|
|
if (sock != NULL) {
|
443 |
|
|
struct scm_cookie scm;
|
444 |
|
|
|
445 |
|
|
if (sock->file->f_flags & O_NONBLOCK)
|
446 |
|
|
user_flags |= MSG_DONTWAIT;
|
447 |
|
|
memset(&scm, 0, sizeof(scm));
|
448 |
|
|
err = sock->ops->recvmsg(sock, &kern_msg, total_len,
|
449 |
|
|
user_flags, &scm);
|
450 |
|
|
if(err >= 0) {
|
451 |
|
|
len = err;
|
452 |
|
|
if(!kern_msg.msg_control) {
|
453 |
|
|
if(sock->passcred || scm.fp)
|
454 |
|
|
kern_msg.msg_flags |= MSG_CTRUNC;
|
455 |
|
|
if(scm.fp)
|
456 |
|
|
__scm_destroy(&scm);
|
457 |
|
|
} else {
|
458 |
|
|
/* If recvmsg processing itself placed some
|
459 |
|
|
* control messages into user space, it's is
|
460 |
|
|
* using 64-bit CMSG processing, so we need
|
461 |
|
|
* to fix it up before we tack on more stuff.
|
462 |
|
|
*/
|
463 |
|
|
if((unsigned long) kern_msg.msg_control != cmsg_ptr)
|
464 |
|
|
cmsg32_recvmsg_fixup(&kern_msg, cmsg_ptr);
|
465 |
|
|
|
466 |
|
|
/* Wheee... */
|
467 |
|
|
if(sock->passcred)
|
468 |
|
|
put_cmsg32(&kern_msg,
|
469 |
|
|
SOL_SOCKET, SCM_CREDENTIALS,
|
470 |
|
|
sizeof(scm.creds), &scm.creds);
|
471 |
|
|
if(scm.fp != NULL)
|
472 |
|
|
scm_detach_fds32(&kern_msg, &scm);
|
473 |
|
|
}
|
474 |
|
|
}
|
475 |
|
|
sockfd_put(sock);
|
476 |
|
|
}
|
477 |
|
|
|
478 |
|
|
if(uaddr != NULL && err >= 0)
|
479 |
|
|
err = move_addr_to_user(addr, kern_msg.msg_namelen, uaddr, uaddr_len);
|
480 |
|
|
if(cmsg_ptr != 0 && err >= 0) {
|
481 |
|
|
unsigned long ucmsg_ptr = ((unsigned long)kern_msg.msg_control);
|
482 |
|
|
__kernel_size_t32 uclen = (__kernel_size_t32) (ucmsg_ptr - cmsg_ptr);
|
483 |
|
|
err |= __put_user(uclen, &user_msg->msg_controllen);
|
484 |
|
|
}
|
485 |
|
|
if(err >= 0)
|
486 |
|
|
err = __put_user(kern_msg.msg_flags, &user_msg->msg_flags);
|
487 |
|
|
if(kern_msg.msg_iov != iov)
|
488 |
|
|
kfree(kern_msg.msg_iov);
|
489 |
|
|
out:
|
490 |
|
|
if(err < 0)
|
491 |
|
|
return err;
|
492 |
|
|
return len;
|
493 |
|
|
}
|
494 |
|
|
|
495 |
|
|
extern asmlinkage int sys_setsockopt(int fd, int level, int optname,
|
496 |
|
|
char *optval, int optlen);
|
497 |
|
|
|
498 |
|
|
static int do_set_attach_filter(int fd, int level, int optname,
|
499 |
|
|
char *optval, int optlen)
|
500 |
|
|
{
|
501 |
|
|
struct sock_fprog32 {
|
502 |
|
|
__u16 len;
|
503 |
|
|
__u32 filter;
|
504 |
|
|
} *fprog32 = (struct sock_fprog32 *)optval;
|
505 |
|
|
struct sock_fprog kfprog;
|
506 |
|
|
mm_segment_t old_fs;
|
507 |
|
|
__u32 uptr;
|
508 |
|
|
int ret;
|
509 |
|
|
|
510 |
|
|
if (get_user(kfprog.len, &fprog32->len) ||
|
511 |
|
|
__get_user(uptr, &fprog32->filter))
|
512 |
|
|
return -EFAULT;
|
513 |
|
|
|
514 |
|
|
kfprog.filter = (struct sock_filter *)A(uptr);
|
515 |
|
|
|
516 |
|
|
if (verify_area(VERIFY_WRITE, kfprog.filter, kfprog.len*sizeof(struct sock_filter)))
|
517 |
|
|
return -EFAULT;
|
518 |
|
|
|
519 |
|
|
old_fs = get_fs();
|
520 |
|
|
set_fs(KERNEL_DS);
|
521 |
|
|
ret = sys_setsockopt(fd, level, optname,
|
522 |
|
|
(char *)&kfprog, sizeof(kfprog));
|
523 |
|
|
set_fs(old_fs);
|
524 |
|
|
|
525 |
|
|
return ret;
|
526 |
|
|
}
|
527 |
|
|
|
528 |
|
|
static int do_set_icmpv6_filter(int fd, int level, int optname,
|
529 |
|
|
char *optval, int optlen)
|
530 |
|
|
{
|
531 |
|
|
struct icmp6_filter kfilter;
|
532 |
|
|
mm_segment_t old_fs;
|
533 |
|
|
int ret, i;
|
534 |
|
|
|
535 |
|
|
if (copy_from_user(&kfilter, optval, sizeof(kfilter)))
|
536 |
|
|
return -EFAULT;
|
537 |
|
|
|
538 |
|
|
|
539 |
|
|
for (i = 0; i < 8; i += 2) {
|
540 |
|
|
u32 tmp = kfilter.data[i];
|
541 |
|
|
|
542 |
|
|
kfilter.data[i] = kfilter.data[i + 1];
|
543 |
|
|
kfilter.data[i + 1] = tmp;
|
544 |
|
|
}
|
545 |
|
|
|
546 |
|
|
old_fs = get_fs();
|
547 |
|
|
set_fs(KERNEL_DS);
|
548 |
|
|
ret = sys_setsockopt(fd, level, optname,
|
549 |
|
|
(char *) &kfilter, sizeof(kfilter));
|
550 |
|
|
set_fs(old_fs);
|
551 |
|
|
|
552 |
|
|
return ret;
|
553 |
|
|
}
|
554 |
|
|
|
555 |
|
|
asmlinkage long sys32_setsockopt(int fd, int level, int optname,
|
556 |
|
|
char *optval, int optlen)
|
557 |
|
|
{
|
558 |
|
|
if (optname == SO_ATTACH_FILTER)
|
559 |
|
|
return do_set_attach_filter(fd, level, optname,
|
560 |
|
|
optval, optlen);
|
561 |
|
|
if (level == SOL_ICMPV6 && optname == ICMPV6_FILTER)
|
562 |
|
|
return do_set_icmpv6_filter(fd, level, optname,
|
563 |
|
|
optval, optlen);
|
564 |
|
|
|
565 |
|
|
return sys_setsockopt(fd, level, optname, optval, optlen);
|
566 |
|
|
}
|
567 |
|
|
|
568 |
|
|
|
569 |
|
|
/* Argument list sizes for sys_socketcall */
|
570 |
|
|
#define AL(x) ((x) * sizeof(u32))
|
571 |
|
|
static unsigned char nas[18]={AL(0),AL(3),AL(3),AL(3),AL(2),AL(3),
|
572 |
|
|
AL(3),AL(3),AL(4),AL(4),AL(4),AL(6),
|
573 |
|
|
AL(6),AL(2),AL(5),AL(5),AL(3),AL(3)};
|
574 |
|
|
#undef AL
|
575 |
|
|
|
576 |
|
|
extern asmlinkage long sys_bind(int fd, struct sockaddr *umyaddr, int addrlen);
|
577 |
|
|
extern asmlinkage long sys_connect(int fd, struct sockaddr *uservaddr,
|
578 |
|
|
int addrlen);
|
579 |
|
|
extern asmlinkage long sys_accept(int fd, struct sockaddr *upeer_sockaddr,
|
580 |
|
|
int *upeer_addrlen);
|
581 |
|
|
extern asmlinkage long sys_getsockname(int fd, struct sockaddr *usockaddr,
|
582 |
|
|
int *usockaddr_len);
|
583 |
|
|
extern asmlinkage long sys_getpeername(int fd, struct sockaddr *usockaddr,
|
584 |
|
|
int *usockaddr_len);
|
585 |
|
|
extern asmlinkage long sys_send(int fd, void *buff, size_t len, unsigned flags);
|
586 |
|
|
extern asmlinkage long sys_sendto(int fd, u32 buff, __kernel_size_t32 len,
|
587 |
|
|
unsigned flags, u32 addr, int addr_len);
|
588 |
|
|
extern asmlinkage long sys_recv(int fd, void *ubuf, size_t size, unsigned flags);
|
589 |
|
|
extern asmlinkage long sys_recvfrom(int fd, u32 ubuf, __kernel_size_t32 size,
|
590 |
|
|
unsigned flags, u32 addr, u32 addr_len);
|
591 |
|
|
extern asmlinkage long sys_getsockopt(int fd, int level, int optname,
|
592 |
|
|
u32 optval, u32 optlen);
|
593 |
|
|
|
594 |
|
|
extern asmlinkage long sys_socket(int family, int type, int protocol);
|
595 |
|
|
extern asmlinkage long sys_socketpair(int family, int type, int protocol,
|
596 |
|
|
int usockvec[2]);
|
597 |
|
|
extern asmlinkage long sys_shutdown(int fd, int how);
|
598 |
|
|
extern asmlinkage long sys_listen(int fd, int backlog);
|
599 |
|
|
|
600 |
|
|
asmlinkage long sys32_socketcall(int call, u32 *args)
|
601 |
|
|
{
|
602 |
|
|
int ret;
|
603 |
|
|
u32 a[6];
|
604 |
|
|
u32 a0,a1;
|
605 |
|
|
|
606 |
|
|
if (call<SYS_SOCKET||call>SYS_RECVMSG)
|
607 |
|
|
return -EINVAL;
|
608 |
|
|
if (copy_from_user(a, args, nas[call]))
|
609 |
|
|
return -EFAULT;
|
610 |
|
|
a0=a[0];
|
611 |
|
|
a1=a[1];
|
612 |
|
|
|
613 |
|
|
switch(call)
|
614 |
|
|
{
|
615 |
|
|
case SYS_SOCKET:
|
616 |
|
|
ret = sys_socket(a0, a1, a[2]);
|
617 |
|
|
break;
|
618 |
|
|
case SYS_BIND:
|
619 |
|
|
ret = sys_bind(a0, (struct sockaddr *)A(a1), a[2]);
|
620 |
|
|
break;
|
621 |
|
|
case SYS_CONNECT:
|
622 |
|
|
ret = sys_connect(a0, (struct sockaddr *)A(a1), a[2]);
|
623 |
|
|
break;
|
624 |
|
|
case SYS_LISTEN:
|
625 |
|
|
ret = sys_listen(a0, a1);
|
626 |
|
|
break;
|
627 |
|
|
case SYS_ACCEPT:
|
628 |
|
|
ret = sys_accept(a0, (struct sockaddr *)A(a1),
|
629 |
|
|
(int *)A(a[2]));
|
630 |
|
|
break;
|
631 |
|
|
case SYS_GETSOCKNAME:
|
632 |
|
|
ret = sys_getsockname(a0, (struct sockaddr *)A(a1),
|
633 |
|
|
(int *)A(a[2]));
|
634 |
|
|
break;
|
635 |
|
|
case SYS_GETPEERNAME:
|
636 |
|
|
ret = sys_getpeername(a0, (struct sockaddr *)A(a1),
|
637 |
|
|
(int *)A(a[2]));
|
638 |
|
|
break;
|
639 |
|
|
case SYS_SOCKETPAIR:
|
640 |
|
|
ret = sys_socketpair(a0, a1, a[2], (int *)A(a[3]));
|
641 |
|
|
break;
|
642 |
|
|
case SYS_SEND:
|
643 |
|
|
ret = sys_send(a0, (void *)A(a1), a[2], a[3]);
|
644 |
|
|
break;
|
645 |
|
|
case SYS_SENDTO:
|
646 |
|
|
ret = sys_sendto(a0, a1, a[2], a[3], a[4], a[5]);
|
647 |
|
|
break;
|
648 |
|
|
case SYS_RECV:
|
649 |
|
|
ret = sys_recv(a0, (void *)A(a1), a[2], a[3]);
|
650 |
|
|
break;
|
651 |
|
|
case SYS_RECVFROM:
|
652 |
|
|
ret = sys_recvfrom(a0, a1, a[2], a[3], a[4], a[5]);
|
653 |
|
|
break;
|
654 |
|
|
case SYS_SHUTDOWN:
|
655 |
|
|
ret = sys_shutdown(a0,a1);
|
656 |
|
|
break;
|
657 |
|
|
case SYS_SETSOCKOPT:
|
658 |
|
|
ret = sys32_setsockopt(a0, a1, a[2], (char *)A(a[3]),
|
659 |
|
|
a[4]);
|
660 |
|
|
break;
|
661 |
|
|
case SYS_GETSOCKOPT:
|
662 |
|
|
ret = sys_getsockopt(a0, a1, a[2], a[3], a[4]);
|
663 |
|
|
break;
|
664 |
|
|
case SYS_SENDMSG:
|
665 |
|
|
ret = sys32_sendmsg(a0, (struct msghdr32 *)A(a1),
|
666 |
|
|
a[2]);
|
667 |
|
|
break;
|
668 |
|
|
case SYS_RECVMSG:
|
669 |
|
|
ret = sys32_recvmsg(a0, (struct msghdr32 *)A(a1),
|
670 |
|
|
a[2]);
|
671 |
|
|
break;
|
672 |
|
|
default:
|
673 |
|
|
ret = -EINVAL;
|
674 |
|
|
break;
|
675 |
|
|
}
|
676 |
|
|
return ret;
|
677 |
|
|
}
|