2005-04-16 22:20:36 +00:00
|
|
|
/*
|
|
|
|
* NET4: Implementation of BSD Unix domain sockets.
|
|
|
|
*
|
2008-10-14 02:01:08 +00:00
|
|
|
* Authors: Alan Cox, <alan@lxorguk.ukuu.org.uk>
|
2005-04-16 22:20:36 +00:00
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU General Public License
|
|
|
|
* as published by the Free Software Foundation; either version
|
|
|
|
* 2 of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* Fixes:
|
|
|
|
* Linus Torvalds : Assorted bug cures.
|
|
|
|
* Niibe Yutaka : async I/O support.
|
|
|
|
* Carsten Paeth : PF_UNIX check, address fixes.
|
|
|
|
* Alan Cox : Limit size of allocated blocks.
|
|
|
|
* Alan Cox : Fixed the stupid socketpair bug.
|
|
|
|
* Alan Cox : BSD compatibility fine tuning.
|
|
|
|
* Alan Cox : Fixed a bug in connect when interrupted.
|
|
|
|
* Alan Cox : Sorted out a proper draft version of
|
|
|
|
* file descriptor passing hacked up from
|
|
|
|
* Mike Shaver's work.
|
|
|
|
* Marty Leisner : Fixes to fd passing
|
|
|
|
* Nick Nevin : recvmsg bugfix.
|
|
|
|
* Alan Cox : Started proper garbage collector
|
|
|
|
* Heiko EiBfeldt : Missing verify_area check
|
|
|
|
* Alan Cox : Started POSIXisms
|
|
|
|
* Andreas Schwab : Replace inode by dentry for proper
|
|
|
|
* reference counting
|
|
|
|
* Kirk Petersen : Made this a module
|
|
|
|
* Christoph Rohland : Elegant non-blocking accept/connect algorithm.
|
|
|
|
* Lots of bug fixes.
|
|
|
|
* Alexey Kuznetosv : Repaired (I hope) bugs introduces
|
|
|
|
* by above two patches.
|
|
|
|
* Andrea Arcangeli : If possible we block in connect(2)
|
|
|
|
* if the max backlog of the listen socket
|
|
|
|
* is been reached. This won't break
|
|
|
|
* old apps and it will avoid huge amount
|
|
|
|
* of socks hashed (this for unix_gc()
|
|
|
|
* performances reasons).
|
|
|
|
* Security fix that limits the max
|
|
|
|
* number of socks to 2*max_files and
|
|
|
|
* the number of skb queueable in the
|
|
|
|
* dgram receiver.
|
|
|
|
* Artur Skawina : Hash function optimizations
|
|
|
|
* Alexey Kuznetsov : Full scale SMP. Lot of bugs are introduced 8)
|
|
|
|
* Malcolm Beattie : Set peercred for socketpair
|
|
|
|
* Michal Ostrowski : Module initialization cleanup.
|
|
|
|
* Arnaldo C. Melo : Remove MOD_{INC,DEC}_USE_COUNT,
|
|
|
|
* the core infrastructure is doing that
|
|
|
|
* for all net proto families now (2.5.69+)
|
|
|
|
*
|
|
|
|
*
|
|
|
|
* Known differences from reference BSD that was tested:
|
|
|
|
*
|
|
|
|
* [TO FIX]
|
|
|
|
* ECONNREFUSED is not returned from one end of a connected() socket to the
|
|
|
|
* other the moment one end closes.
|
|
|
|
* fstat() doesn't return st_dev=0, and give the blksize as high water mark
|
|
|
|
* and a fake inode identifier (nor the BSD first socket fstat twice bug).
|
|
|
|
* [NOT TO FIX]
|
|
|
|
* accept() returns a path name even if the connecting socket has closed
|
|
|
|
* in the meantime (BSD loses the path and gives up).
|
|
|
|
* accept() returns 0 length path for an unbound connector. BSD returns 16
|
|
|
|
* and a null first byte in the path (but not for gethost/peername - BSD bug ??)
|
|
|
|
* socketpair(...SOCK_RAW..) doesn't panic the kernel.
|
|
|
|
* BSD af_unix apparently has connect forgetting to block properly.
|
|
|
|
* (need to check this with the POSIX spec in detail)
|
|
|
|
*
|
|
|
|
* Differences from 2.0.0-11-... (ANK)
|
|
|
|
* Bug fixes and improvements.
|
|
|
|
* - client shutdown killed server socket.
|
|
|
|
* - removed all useless cli/sti pairs.
|
|
|
|
*
|
|
|
|
* Semantic changes/extensions.
|
|
|
|
* - generic control message passing.
|
|
|
|
* - SCM_CREDENTIALS control message.
|
|
|
|
* - "Abstract" (not FS based) socket bindings.
|
|
|
|
* Abstract names are sequences of bytes (not zero terminated)
|
|
|
|
* started by 0, so that this name space does not intersect
|
|
|
|
* with BSD names.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/kernel.h>
|
|
|
|
#include <linux/signal.h>
|
|
|
|
#include <linux/sched.h>
|
|
|
|
#include <linux/errno.h>
|
|
|
|
#include <linux/string.h>
|
|
|
|
#include <linux/stat.h>
|
|
|
|
#include <linux/dcache.h>
|
|
|
|
#include <linux/namei.h>
|
|
|
|
#include <linux/socket.h>
|
|
|
|
#include <linux/un.h>
|
|
|
|
#include <linux/fcntl.h>
|
|
|
|
#include <linux/termios.h>
|
|
|
|
#include <linux/sockios.h>
|
|
|
|
#include <linux/net.h>
|
|
|
|
#include <linux/in.h>
|
|
|
|
#include <linux/fs.h>
|
|
|
|
#include <linux/slab.h>
|
|
|
|
#include <asm/uaccess.h>
|
|
|
|
#include <linux/skbuff.h>
|
|
|
|
#include <linux/netdevice.h>
|
2007-09-12 10:01:34 +00:00
|
|
|
#include <net/net_namespace.h>
|
2005-04-16 22:20:36 +00:00
|
|
|
#include <net/sock.h>
|
2005-08-10 03:08:28 +00:00
|
|
|
#include <net/tcp_states.h>
|
2005-04-16 22:20:36 +00:00
|
|
|
#include <net/af_unix.h>
|
|
|
|
#include <linux/proc_fs.h>
|
|
|
|
#include <linux/seq_file.h>
|
|
|
|
#include <net/scm.h>
|
|
|
|
#include <linux/init.h>
|
|
|
|
#include <linux/poll.h>
|
|
|
|
#include <linux/rtnetlink.h>
|
|
|
|
#include <linux/mount.h>
|
|
|
|
#include <net/checksum.h>
|
|
|
|
#include <linux/security.h>
|
|
|
|
|
2007-07-31 01:05:45 +00:00
|
|
|
static struct hlist_head unix_socket_table[UNIX_HASH_SIZE + 1];
|
|
|
|
static DEFINE_SPINLOCK(unix_table_lock);
|
2005-04-16 22:20:36 +00:00
|
|
|
static atomic_t unix_nr_socks = ATOMIC_INIT(0);
|
|
|
|
|
|
|
|
#define unix_sockets_unbound (&unix_socket_table[UNIX_HASH_SIZE])
|
|
|
|
|
|
|
|
#define UNIX_ABSTRACT(sk) (unix_sk(sk)->addr->hash != UNIX_HASH_SIZE)
|
|
|
|
|
[AF_UNIX]: Datagram getpeersec
This patch implements an API whereby an application can determine the
label of its peer's Unix datagram sockets via the auxiliary data mechanism of
recvmsg.
Patch purpose:
This patch enables a security-aware application to retrieve the
security context of the peer of a Unix datagram socket. The application
can then use this security context to determine the security context for
processing on behalf of the peer who sent the packet.
Patch design and implementation:
The design and implementation is very similar to the UDP case for INET
sockets. Basically we build upon the existing Unix domain socket API for
retrieving user credentials. Linux offers the API for obtaining user
credentials via ancillary messages (i.e., out of band/control messages
that are bundled together with a normal message). To retrieve the security
context, the application first indicates to the kernel such desire by
setting the SO_PASSSEC option via getsockopt. Then the application
retrieves the security context using the auxiliary data mechanism.
An example server application for Unix datagram socket should look like this:
toggle = 1;
toggle_len = sizeof(toggle);
setsockopt(sockfd, SOL_SOCKET, SO_PASSSEC, &toggle, &toggle_len);
recvmsg(sockfd, &msg_hdr, 0);
if (msg_hdr.msg_controllen > sizeof(struct cmsghdr)) {
cmsg_hdr = CMSG_FIRSTHDR(&msg_hdr);
if (cmsg_hdr->cmsg_len <= CMSG_LEN(sizeof(scontext)) &&
cmsg_hdr->cmsg_level == SOL_SOCKET &&
cmsg_hdr->cmsg_type == SCM_SECURITY) {
memcpy(&scontext, CMSG_DATA(cmsg_hdr), sizeof(scontext));
}
}
sock_setsockopt is enhanced with a new socket option SOCK_PASSSEC to allow
a server socket to receive security context of the peer.
Testing:
We have tested the patch by setting up Unix datagram client and server
applications. We verified that the server can retrieve the security context
using the auxiliary data mechanism of recvmsg.
Signed-off-by: Catherine Zhang <cxzhang@watson.ibm.com>
Acked-by: Acked-by: James Morris <jmorris@namei.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2006-06-29 19:27:47 +00:00
|
|
|
#ifdef CONFIG_SECURITY_NETWORK
|
2006-08-02 21:12:06 +00:00
|
|
|
static void unix_get_secdata(struct scm_cookie *scm, struct sk_buff *skb)
|
[AF_UNIX]: Datagram getpeersec
This patch implements an API whereby an application can determine the
label of its peer's Unix datagram sockets via the auxiliary data mechanism of
recvmsg.
Patch purpose:
This patch enables a security-aware application to retrieve the
security context of the peer of a Unix datagram socket. The application
can then use this security context to determine the security context for
processing on behalf of the peer who sent the packet.
Patch design and implementation:
The design and implementation is very similar to the UDP case for INET
sockets. Basically we build upon the existing Unix domain socket API for
retrieving user credentials. Linux offers the API for obtaining user
credentials via ancillary messages (i.e., out of band/control messages
that are bundled together with a normal message). To retrieve the security
context, the application first indicates to the kernel such desire by
setting the SO_PASSSEC option via getsockopt. Then the application
retrieves the security context using the auxiliary data mechanism.
An example server application for Unix datagram socket should look like this:
toggle = 1;
toggle_len = sizeof(toggle);
setsockopt(sockfd, SOL_SOCKET, SO_PASSSEC, &toggle, &toggle_len);
recvmsg(sockfd, &msg_hdr, 0);
if (msg_hdr.msg_controllen > sizeof(struct cmsghdr)) {
cmsg_hdr = CMSG_FIRSTHDR(&msg_hdr);
if (cmsg_hdr->cmsg_len <= CMSG_LEN(sizeof(scontext)) &&
cmsg_hdr->cmsg_level == SOL_SOCKET &&
cmsg_hdr->cmsg_type == SCM_SECURITY) {
memcpy(&scontext, CMSG_DATA(cmsg_hdr), sizeof(scontext));
}
}
sock_setsockopt is enhanced with a new socket option SOCK_PASSSEC to allow
a server socket to receive security context of the peer.
Testing:
We have tested the patch by setting up Unix datagram client and server
applications. We verified that the server can retrieve the security context
using the auxiliary data mechanism of recvmsg.
Signed-off-by: Catherine Zhang <cxzhang@watson.ibm.com>
Acked-by: Acked-by: James Morris <jmorris@namei.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2006-06-29 19:27:47 +00:00
|
|
|
{
|
2006-08-02 21:12:06 +00:00
|
|
|
memcpy(UNIXSID(skb), &scm->secid, sizeof(u32));
|
[AF_UNIX]: Datagram getpeersec
This patch implements an API whereby an application can determine the
label of its peer's Unix datagram sockets via the auxiliary data mechanism of
recvmsg.
Patch purpose:
This patch enables a security-aware application to retrieve the
security context of the peer of a Unix datagram socket. The application
can then use this security context to determine the security context for
processing on behalf of the peer who sent the packet.
Patch design and implementation:
The design and implementation is very similar to the UDP case for INET
sockets. Basically we build upon the existing Unix domain socket API for
retrieving user credentials. Linux offers the API for obtaining user
credentials via ancillary messages (i.e., out of band/control messages
that are bundled together with a normal message). To retrieve the security
context, the application first indicates to the kernel such desire by
setting the SO_PASSSEC option via getsockopt. Then the application
retrieves the security context using the auxiliary data mechanism.
An example server application for Unix datagram socket should look like this:
toggle = 1;
toggle_len = sizeof(toggle);
setsockopt(sockfd, SOL_SOCKET, SO_PASSSEC, &toggle, &toggle_len);
recvmsg(sockfd, &msg_hdr, 0);
if (msg_hdr.msg_controllen > sizeof(struct cmsghdr)) {
cmsg_hdr = CMSG_FIRSTHDR(&msg_hdr);
if (cmsg_hdr->cmsg_len <= CMSG_LEN(sizeof(scontext)) &&
cmsg_hdr->cmsg_level == SOL_SOCKET &&
cmsg_hdr->cmsg_type == SCM_SECURITY) {
memcpy(&scontext, CMSG_DATA(cmsg_hdr), sizeof(scontext));
}
}
sock_setsockopt is enhanced with a new socket option SOCK_PASSSEC to allow
a server socket to receive security context of the peer.
Testing:
We have tested the patch by setting up Unix datagram client and server
applications. We verified that the server can retrieve the security context
using the auxiliary data mechanism of recvmsg.
Signed-off-by: Catherine Zhang <cxzhang@watson.ibm.com>
Acked-by: Acked-by: James Morris <jmorris@namei.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2006-06-29 19:27:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline void unix_set_secdata(struct scm_cookie *scm, struct sk_buff *skb)
|
|
|
|
{
|
2006-08-02 21:12:06 +00:00
|
|
|
scm->secid = *UNIXSID(skb);
|
[AF_UNIX]: Datagram getpeersec
This patch implements an API whereby an application can determine the
label of its peer's Unix datagram sockets via the auxiliary data mechanism of
recvmsg.
Patch purpose:
This patch enables a security-aware application to retrieve the
security context of the peer of a Unix datagram socket. The application
can then use this security context to determine the security context for
processing on behalf of the peer who sent the packet.
Patch design and implementation:
The design and implementation is very similar to the UDP case for INET
sockets. Basically we build upon the existing Unix domain socket API for
retrieving user credentials. Linux offers the API for obtaining user
credentials via ancillary messages (i.e., out of band/control messages
that are bundled together with a normal message). To retrieve the security
context, the application first indicates to the kernel such desire by
setting the SO_PASSSEC option via getsockopt. Then the application
retrieves the security context using the auxiliary data mechanism.
An example server application for Unix datagram socket should look like this:
toggle = 1;
toggle_len = sizeof(toggle);
setsockopt(sockfd, SOL_SOCKET, SO_PASSSEC, &toggle, &toggle_len);
recvmsg(sockfd, &msg_hdr, 0);
if (msg_hdr.msg_controllen > sizeof(struct cmsghdr)) {
cmsg_hdr = CMSG_FIRSTHDR(&msg_hdr);
if (cmsg_hdr->cmsg_len <= CMSG_LEN(sizeof(scontext)) &&
cmsg_hdr->cmsg_level == SOL_SOCKET &&
cmsg_hdr->cmsg_type == SCM_SECURITY) {
memcpy(&scontext, CMSG_DATA(cmsg_hdr), sizeof(scontext));
}
}
sock_setsockopt is enhanced with a new socket option SOCK_PASSSEC to allow
a server socket to receive security context of the peer.
Testing:
We have tested the patch by setting up Unix datagram client and server
applications. We verified that the server can retrieve the security context
using the auxiliary data mechanism of recvmsg.
Signed-off-by: Catherine Zhang <cxzhang@watson.ibm.com>
Acked-by: Acked-by: James Morris <jmorris@namei.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2006-06-29 19:27:47 +00:00
|
|
|
}
|
|
|
|
#else
|
2006-08-02 21:12:06 +00:00
|
|
|
static inline void unix_get_secdata(struct scm_cookie *scm, struct sk_buff *skb)
|
[AF_UNIX]: Datagram getpeersec
This patch implements an API whereby an application can determine the
label of its peer's Unix datagram sockets via the auxiliary data mechanism of
recvmsg.
Patch purpose:
This patch enables a security-aware application to retrieve the
security context of the peer of a Unix datagram socket. The application
can then use this security context to determine the security context for
processing on behalf of the peer who sent the packet.
Patch design and implementation:
The design and implementation is very similar to the UDP case for INET
sockets. Basically we build upon the existing Unix domain socket API for
retrieving user credentials. Linux offers the API for obtaining user
credentials via ancillary messages (i.e., out of band/control messages
that are bundled together with a normal message). To retrieve the security
context, the application first indicates to the kernel such desire by
setting the SO_PASSSEC option via getsockopt. Then the application
retrieves the security context using the auxiliary data mechanism.
An example server application for Unix datagram socket should look like this:
toggle = 1;
toggle_len = sizeof(toggle);
setsockopt(sockfd, SOL_SOCKET, SO_PASSSEC, &toggle, &toggle_len);
recvmsg(sockfd, &msg_hdr, 0);
if (msg_hdr.msg_controllen > sizeof(struct cmsghdr)) {
cmsg_hdr = CMSG_FIRSTHDR(&msg_hdr);
if (cmsg_hdr->cmsg_len <= CMSG_LEN(sizeof(scontext)) &&
cmsg_hdr->cmsg_level == SOL_SOCKET &&
cmsg_hdr->cmsg_type == SCM_SECURITY) {
memcpy(&scontext, CMSG_DATA(cmsg_hdr), sizeof(scontext));
}
}
sock_setsockopt is enhanced with a new socket option SOCK_PASSSEC to allow
a server socket to receive security context of the peer.
Testing:
We have tested the patch by setting up Unix datagram client and server
applications. We verified that the server can retrieve the security context
using the auxiliary data mechanism of recvmsg.
Signed-off-by: Catherine Zhang <cxzhang@watson.ibm.com>
Acked-by: Acked-by: James Morris <jmorris@namei.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2006-06-29 19:27:47 +00:00
|
|
|
{ }
|
|
|
|
|
|
|
|
static inline void unix_set_secdata(struct scm_cookie *scm, struct sk_buff *skb)
|
|
|
|
{ }
|
|
|
|
#endif /* CONFIG_SECURITY_NETWORK */
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
/*
|
|
|
|
* SMP locking strategy:
|
2005-12-14 07:26:29 +00:00
|
|
|
* hash table is protected with spinlock unix_table_lock
|
2010-02-18 22:12:06 +00:00
|
|
|
* each socket state is protected by separate spin lock.
|
2005-04-16 22:20:36 +00:00
|
|
|
*/
|
|
|
|
|
2006-11-15 05:36:14 +00:00
|
|
|
static inline unsigned unix_hash_fold(__wsum n)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
2006-11-15 05:36:14 +00:00
|
|
|
unsigned hash = (__force unsigned)n;
|
2005-04-16 22:20:36 +00:00
|
|
|
hash ^= hash>>16;
|
|
|
|
hash ^= hash>>8;
|
|
|
|
return hash&(UNIX_HASH_SIZE-1);
|
|
|
|
}
|
|
|
|
|
|
|
|
#define unix_peer(sk) (unix_sk(sk)->peer)
|
|
|
|
|
|
|
|
static inline int unix_our_peer(struct sock *sk, struct sock *osk)
|
|
|
|
{
|
|
|
|
return unix_peer(osk) == sk;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int unix_may_send(struct sock *sk, struct sock *osk)
|
|
|
|
{
|
2008-11-17 06:58:44 +00:00
|
|
|
return unix_peer(osk) == NULL || unix_our_peer(sk, osk);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
2008-06-18 05:28:05 +00:00
|
|
|
static inline int unix_recvq_full(struct sock const *sk)
|
|
|
|
{
|
|
|
|
return skb_queue_len(&sk->sk_receive_queue) > sk->sk_max_ack_backlog;
|
|
|
|
}
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
static struct sock *unix_peer_get(struct sock *s)
|
|
|
|
{
|
|
|
|
struct sock *peer;
|
|
|
|
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_lock(s);
|
2005-04-16 22:20:36 +00:00
|
|
|
peer = unix_peer(s);
|
|
|
|
if (peer)
|
|
|
|
sock_hold(peer);
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_unlock(s);
|
2005-04-16 22:20:36 +00:00
|
|
|
return peer;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void unix_release_addr(struct unix_address *addr)
|
|
|
|
{
|
|
|
|
if (atomic_dec_and_test(&addr->refcnt))
|
|
|
|
kfree(addr);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Check unix socket name:
|
|
|
|
* - should be not zero length.
|
|
|
|
* - if started by not zero, should be NULL terminated (FS object)
|
|
|
|
* - if started by zero, it is abstract name.
|
|
|
|
*/
|
2007-02-09 14:25:23 +00:00
|
|
|
|
2008-11-17 06:58:44 +00:00
|
|
|
static int unix_mkname(struct sockaddr_un *sunaddr, int len, unsigned *hashp)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
|
|
|
if (len <= sizeof(short) || len > sizeof(*sunaddr))
|
|
|
|
return -EINVAL;
|
|
|
|
if (!sunaddr || sunaddr->sun_family != AF_UNIX)
|
|
|
|
return -EINVAL;
|
|
|
|
if (sunaddr->sun_path[0]) {
|
|
|
|
/*
|
|
|
|
* This may look like an off by one error but it is a bit more
|
|
|
|
* subtle. 108 is the longest valid AF_UNIX path for a binding.
|
|
|
|
* sun_path[108] doesnt as such exist. However in kernel space
|
|
|
|
* we are guaranteed that it is a valid memory location in our
|
|
|
|
* kernel address buffer.
|
|
|
|
*/
|
2008-11-02 04:38:31 +00:00
|
|
|
((char *)sunaddr)[len] = 0;
|
2005-04-16 22:20:36 +00:00
|
|
|
len = strlen(sunaddr->sun_path)+1+sizeof(short);
|
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
2008-11-19 23:44:53 +00:00
|
|
|
*hashp = unix_hash_fold(csum_partial(sunaddr, len, 0));
|
2005-04-16 22:20:36 +00:00
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void __unix_remove_socket(struct sock *sk)
|
|
|
|
{
|
|
|
|
sk_del_node_init(sk);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void __unix_insert_socket(struct hlist_head *list, struct sock *sk)
|
|
|
|
{
|
2008-07-26 04:43:18 +00:00
|
|
|
WARN_ON(!sk_unhashed(sk));
|
2005-04-16 22:20:36 +00:00
|
|
|
sk_add_node(sk, list);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void unix_remove_socket(struct sock *sk)
|
|
|
|
{
|
2005-12-14 07:26:29 +00:00
|
|
|
spin_lock(&unix_table_lock);
|
2005-04-16 22:20:36 +00:00
|
|
|
__unix_remove_socket(sk);
|
2005-12-14 07:26:29 +00:00
|
|
|
spin_unlock(&unix_table_lock);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline void unix_insert_socket(struct hlist_head *list, struct sock *sk)
|
|
|
|
{
|
2005-12-14 07:26:29 +00:00
|
|
|
spin_lock(&unix_table_lock);
|
2005-04-16 22:20:36 +00:00
|
|
|
__unix_insert_socket(list, sk);
|
2005-12-14 07:26:29 +00:00
|
|
|
spin_unlock(&unix_table_lock);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
2007-11-20 06:29:30 +00:00
|
|
|
static struct sock *__unix_find_socket_byname(struct net *net,
|
|
|
|
struct sockaddr_un *sunname,
|
2005-04-16 22:20:36 +00:00
|
|
|
int len, int type, unsigned hash)
|
|
|
|
{
|
|
|
|
struct sock *s;
|
|
|
|
struct hlist_node *node;
|
|
|
|
|
|
|
|
sk_for_each(s, node, &unix_socket_table[hash ^ type]) {
|
|
|
|
struct unix_sock *u = unix_sk(s);
|
|
|
|
|
2008-03-25 18:57:35 +00:00
|
|
|
if (!net_eq(sock_net(s), net))
|
2007-11-20 06:29:30 +00:00
|
|
|
continue;
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
if (u->addr->len == len &&
|
|
|
|
!memcmp(u->addr->name, sunname, len))
|
|
|
|
goto found;
|
|
|
|
}
|
|
|
|
s = NULL;
|
|
|
|
found:
|
|
|
|
return s;
|
|
|
|
}
|
|
|
|
|
2007-11-20 06:29:30 +00:00
|
|
|
static inline struct sock *unix_find_socket_byname(struct net *net,
|
|
|
|
struct sockaddr_un *sunname,
|
2005-04-16 22:20:36 +00:00
|
|
|
int len, int type,
|
|
|
|
unsigned hash)
|
|
|
|
{
|
|
|
|
struct sock *s;
|
|
|
|
|
2005-12-14 07:26:29 +00:00
|
|
|
spin_lock(&unix_table_lock);
|
2007-11-20 06:29:30 +00:00
|
|
|
s = __unix_find_socket_byname(net, sunname, len, type, hash);
|
2005-04-16 22:20:36 +00:00
|
|
|
if (s)
|
|
|
|
sock_hold(s);
|
2005-12-14 07:26:29 +00:00
|
|
|
spin_unlock(&unix_table_lock);
|
2005-04-16 22:20:36 +00:00
|
|
|
return s;
|
|
|
|
}
|
|
|
|
|
2010-06-13 03:35:48 +00:00
|
|
|
static struct sock *unix_find_socket_byinode(struct inode *i)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
|
|
|
struct sock *s;
|
|
|
|
struct hlist_node *node;
|
|
|
|
|
2005-12-14 07:26:29 +00:00
|
|
|
spin_lock(&unix_table_lock);
|
2005-04-16 22:20:36 +00:00
|
|
|
sk_for_each(s, node,
|
|
|
|
&unix_socket_table[i->i_ino & (UNIX_HASH_SIZE - 1)]) {
|
|
|
|
struct dentry *dentry = unix_sk(s)->dentry;
|
|
|
|
|
2008-11-17 06:58:44 +00:00
|
|
|
if (dentry && dentry->d_inode == i) {
|
2005-04-16 22:20:36 +00:00
|
|
|
sock_hold(s);
|
|
|
|
goto found;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
s = NULL;
|
|
|
|
found:
|
2005-12-14 07:26:29 +00:00
|
|
|
spin_unlock(&unix_table_lock);
|
2005-04-16 22:20:36 +00:00
|
|
|
return s;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int unix_writable(struct sock *sk)
|
|
|
|
{
|
|
|
|
return (atomic_read(&sk->sk_wmem_alloc) << 2) <= sk->sk_sndbuf;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void unix_write_space(struct sock *sk)
|
|
|
|
{
|
2010-04-29 11:01:49 +00:00
|
|
|
struct socket_wq *wq;
|
|
|
|
|
|
|
|
rcu_read_lock();
|
2005-04-16 22:20:36 +00:00
|
|
|
if (unix_writable(sk)) {
|
2010-04-29 11:01:49 +00:00
|
|
|
wq = rcu_dereference(sk->sk_wq);
|
|
|
|
if (wq_has_sleeper(wq))
|
|
|
|
wake_up_interruptible_sync(&wq->wait);
|
2007-11-26 12:10:50 +00:00
|
|
|
sk_wake_async(sk, SOCK_WAKE_SPACE, POLL_OUT);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
2010-04-29 11:01:49 +00:00
|
|
|
rcu_read_unlock();
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* When dgram socket disconnects (or changes its peer), we clear its receive
|
|
|
|
* queue of packets arrived from previous peer. First, it allows to do
|
|
|
|
* flow control based only on wmem_alloc; second, sk connected to peer
|
|
|
|
* may receive messages only from that peer. */
|
|
|
|
static void unix_dgram_disconnected(struct sock *sk, struct sock *other)
|
|
|
|
{
|
2005-07-08 21:57:23 +00:00
|
|
|
if (!skb_queue_empty(&sk->sk_receive_queue)) {
|
2005-04-16 22:20:36 +00:00
|
|
|
skb_queue_purge(&sk->sk_receive_queue);
|
|
|
|
wake_up_interruptible_all(&unix_sk(sk)->peer_wait);
|
|
|
|
|
|
|
|
/* If one link of bidirectional dgram pipe is disconnected,
|
|
|
|
* we signal error. Messages are lost. Do not make this,
|
|
|
|
* when peer was not connected to us.
|
|
|
|
*/
|
|
|
|
if (!sock_flag(other, SOCK_DEAD) && unix_peer(other) == sk) {
|
|
|
|
other->sk_err = ECONNRESET;
|
|
|
|
other->sk_error_report(other);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void unix_sock_destructor(struct sock *sk)
|
|
|
|
{
|
|
|
|
struct unix_sock *u = unix_sk(sk);
|
|
|
|
|
|
|
|
skb_queue_purge(&sk->sk_receive_queue);
|
|
|
|
|
2008-07-26 04:43:18 +00:00
|
|
|
WARN_ON(atomic_read(&sk->sk_wmem_alloc));
|
|
|
|
WARN_ON(!sk_unhashed(sk));
|
|
|
|
WARN_ON(sk->sk_socket);
|
2005-04-16 22:20:36 +00:00
|
|
|
if (!sock_flag(sk, SOCK_DEAD)) {
|
2008-11-19 23:48:09 +00:00
|
|
|
printk(KERN_INFO "Attempt to release alive unix socket: %p\n", sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (u->addr)
|
|
|
|
unix_release_addr(u->addr);
|
|
|
|
|
|
|
|
atomic_dec(&unix_nr_socks);
|
2008-11-24 01:34:03 +00:00
|
|
|
local_bh_disable();
|
2008-11-17 10:38:49 +00:00
|
|
|
sock_prot_inuse_add(sock_net(sk), sk->sk_prot, -1);
|
2008-11-24 01:34:03 +00:00
|
|
|
local_bh_enable();
|
2005-04-16 22:20:36 +00:00
|
|
|
#ifdef UNIX_REFCNT_DEBUG
|
2008-11-17 06:58:44 +00:00
|
|
|
printk(KERN_DEBUG "UNIX %p is destroyed, %d are still alive.\n", sk,
|
|
|
|
atomic_read(&unix_nr_socks));
|
2005-04-16 22:20:36 +00:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2008-11-17 06:58:44 +00:00
|
|
|
static int unix_release_sock(struct sock *sk, int embrion)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
|
|
|
struct unix_sock *u = unix_sk(sk);
|
|
|
|
struct dentry *dentry;
|
|
|
|
struct vfsmount *mnt;
|
|
|
|
struct sock *skpair;
|
|
|
|
struct sk_buff *skb;
|
|
|
|
int state;
|
|
|
|
|
|
|
|
unix_remove_socket(sk);
|
|
|
|
|
|
|
|
/* Clear state */
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_lock(sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
sock_orphan(sk);
|
|
|
|
sk->sk_shutdown = SHUTDOWN_MASK;
|
|
|
|
dentry = u->dentry;
|
|
|
|
u->dentry = NULL;
|
|
|
|
mnt = u->mnt;
|
|
|
|
u->mnt = NULL;
|
|
|
|
state = sk->sk_state;
|
|
|
|
sk->sk_state = TCP_CLOSE;
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_unlock(sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
wake_up_interruptible_all(&u->peer_wait);
|
|
|
|
|
2008-11-02 04:38:31 +00:00
|
|
|
skpair = unix_peer(sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2008-11-02 04:38:31 +00:00
|
|
|
if (skpair != NULL) {
|
2005-04-16 22:20:36 +00:00
|
|
|
if (sk->sk_type == SOCK_STREAM || sk->sk_type == SOCK_SEQPACKET) {
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_lock(skpair);
|
2005-04-16 22:20:36 +00:00
|
|
|
/* No more writes */
|
|
|
|
skpair->sk_shutdown = SHUTDOWN_MASK;
|
|
|
|
if (!skb_queue_empty(&sk->sk_receive_queue) || embrion)
|
|
|
|
skpair->sk_err = ECONNRESET;
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_unlock(skpair);
|
2005-04-16 22:20:36 +00:00
|
|
|
skpair->sk_state_change(skpair);
|
2007-11-26 12:10:50 +00:00
|
|
|
sk_wake_async(skpair, SOCK_WAKE_WAITD, POLL_HUP);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
sock_put(skpair); /* It may now die */
|
|
|
|
unix_peer(sk) = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Try to flush out this socket. Throw out buffers at least */
|
|
|
|
|
|
|
|
while ((skb = skb_dequeue(&sk->sk_receive_queue)) != NULL) {
|
2008-11-02 04:38:31 +00:00
|
|
|
if (state == TCP_LISTEN)
|
2005-04-16 22:20:36 +00:00
|
|
|
unix_release_sock(skb->sk, 1);
|
|
|
|
/* passed fds are erased in the kfree_skb hook */
|
|
|
|
kfree_skb(skb);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (dentry) {
|
|
|
|
dput(dentry);
|
|
|
|
mntput(mnt);
|
|
|
|
}
|
|
|
|
|
|
|
|
sock_put(sk);
|
|
|
|
|
|
|
|
/* ---- Socket is dead now and most probably destroyed ---- */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Fixme: BSD difference: In BSD all sockets connected to use get
|
|
|
|
* ECONNRESET and we die on the spot. In Linux we behave
|
|
|
|
* like files and pipes do and wait for the last
|
|
|
|
* dereference.
|
|
|
|
*
|
|
|
|
* Can't we simply set sock->err?
|
|
|
|
*
|
|
|
|
* What the above comment does talk about? --ANK(980817)
|
|
|
|
*/
|
|
|
|
|
2007-11-11 06:06:01 +00:00
|
|
|
if (unix_tot_inflight)
|
2007-02-09 14:25:23 +00:00
|
|
|
unix_gc(); /* Garbage collect fds */
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2010-06-13 03:30:14 +00:00
|
|
|
static void init_peercred(struct sock *sk)
|
|
|
|
{
|
|
|
|
put_pid(sk->sk_peer_pid);
|
|
|
|
if (sk->sk_peer_cred)
|
|
|
|
put_cred(sk->sk_peer_cred);
|
|
|
|
sk->sk_peer_pid = get_pid(task_tgid(current));
|
|
|
|
sk->sk_peer_cred = get_current_cred();
|
|
|
|
}
|
|
|
|
|
|
|
|
static void copy_peercred(struct sock *sk, struct sock *peersk)
|
|
|
|
{
|
|
|
|
put_pid(sk->sk_peer_pid);
|
|
|
|
if (sk->sk_peer_cred)
|
|
|
|
put_cred(sk->sk_peer_cred);
|
|
|
|
sk->sk_peer_pid = get_pid(peersk->sk_peer_pid);
|
|
|
|
sk->sk_peer_cred = get_cred(peersk->sk_peer_cred);
|
|
|
|
}
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
static int unix_listen(struct socket *sock, int backlog)
|
|
|
|
{
|
|
|
|
int err;
|
|
|
|
struct sock *sk = sock->sk;
|
|
|
|
struct unix_sock *u = unix_sk(sk);
|
2010-06-13 03:30:14 +00:00
|
|
|
struct pid *old_pid = NULL;
|
|
|
|
const struct cred *old_cred = NULL;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
err = -EOPNOTSUPP;
|
2008-11-17 06:58:44 +00:00
|
|
|
if (sock->type != SOCK_STREAM && sock->type != SOCK_SEQPACKET)
|
|
|
|
goto out; /* Only stream/seqpacket sockets accept */
|
2005-04-16 22:20:36 +00:00
|
|
|
err = -EINVAL;
|
|
|
|
if (!u->addr)
|
2008-11-17 06:58:44 +00:00
|
|
|
goto out; /* No listens on an unbound socket */
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_lock(sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
if (sk->sk_state != TCP_CLOSE && sk->sk_state != TCP_LISTEN)
|
|
|
|
goto out_unlock;
|
|
|
|
if (backlog > sk->sk_max_ack_backlog)
|
|
|
|
wake_up_interruptible_all(&u->peer_wait);
|
|
|
|
sk->sk_max_ack_backlog = backlog;
|
|
|
|
sk->sk_state = TCP_LISTEN;
|
|
|
|
/* set credentials so connect can copy them */
|
2010-06-13 03:30:14 +00:00
|
|
|
init_peercred(sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
err = 0;
|
|
|
|
|
|
|
|
out_unlock:
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_unlock(sk);
|
2010-06-13 03:30:14 +00:00
|
|
|
put_pid(old_pid);
|
|
|
|
if (old_cred)
|
|
|
|
put_cred(old_cred);
|
2005-04-16 22:20:36 +00:00
|
|
|
out:
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int unix_release(struct socket *);
|
|
|
|
static int unix_bind(struct socket *, struct sockaddr *, int);
|
|
|
|
static int unix_stream_connect(struct socket *, struct sockaddr *,
|
|
|
|
int addr_len, int flags);
|
|
|
|
static int unix_socketpair(struct socket *, struct socket *);
|
|
|
|
static int unix_accept(struct socket *, struct socket *, int);
|
|
|
|
static int unix_getname(struct socket *, struct sockaddr *, int *, int);
|
|
|
|
static unsigned int unix_poll(struct file *, struct socket *, poll_table *);
|
af_unix: fix 'poll for write'/connected DGRAM sockets
For n:1 'datagram connections' (eg /dev/log), the unix_dgram_sendmsg
routine implements a form of receiver-imposed flow control by
comparing the length of the receive queue of the 'peer socket' with
the max_ack_backlog value stored in the corresponding sock structure,
either blocking the thread which caused the send-routine to be called
or returning EAGAIN. This routine is used by both SOCK_DGRAM and
SOCK_SEQPACKET sockets. The poll-implementation for these socket types
is datagram_poll from core/datagram.c. A socket is deemed to be
writeable by this routine when the memory presently consumed by
datagrams owned by it is less than the configured socket send buffer
size. This is always wrong for PF_UNIX non-stream sockets connected to
server sockets dealing with (potentially) multiple clients if the
abovementioned receive queue is currently considered to be full.
'poll' will then return, indicating that the socket is writeable, but
a subsequent write result in EAGAIN, effectively causing an (usual)
application to 'poll for writeability by repeated send request with
O_NONBLOCK set' until it has consumed its time quantum.
The change below uses a suitably modified variant of the datagram_poll
routines for both type of PF_UNIX sockets, which tests if the
recv-queue of the peer a socket is connected to is presently
considered to be 'full' as part of the 'is this socket
writeable'-checking code. The socket being polled is additionally
put onto the peer_wait wait queue associated with its peer, because the
unix_dgram_recvmsg routine does a wake up on this queue after a
datagram was received and the 'other wakeup call' is done implicitly
as part of skb destruction, meaning, a process blocked in poll
because of a full peer receive queue could otherwise sleep forever
if no datagram owned by its socket was already sitting on this queue.
Among this change is a small (inline) helper routine named
'unix_recvq_full', which consolidates the actual testing code (in three
different places) into a single location.
Signed-off-by: Rainer Weikusat <rweikusat@mssgmbh.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2008-06-28 02:34:18 +00:00
|
|
|
static unsigned int unix_dgram_poll(struct file *, struct socket *,
|
|
|
|
poll_table *);
|
2005-04-16 22:20:36 +00:00
|
|
|
static int unix_ioctl(struct socket *, unsigned int, unsigned long);
|
|
|
|
static int unix_shutdown(struct socket *, int);
|
|
|
|
static int unix_stream_sendmsg(struct kiocb *, struct socket *,
|
|
|
|
struct msghdr *, size_t);
|
|
|
|
static int unix_stream_recvmsg(struct kiocb *, struct socket *,
|
|
|
|
struct msghdr *, size_t, int);
|
|
|
|
static int unix_dgram_sendmsg(struct kiocb *, struct socket *,
|
|
|
|
struct msghdr *, size_t);
|
|
|
|
static int unix_dgram_recvmsg(struct kiocb *, struct socket *,
|
|
|
|
struct msghdr *, size_t, int);
|
|
|
|
static int unix_dgram_connect(struct socket *, struct sockaddr *,
|
|
|
|
int, int);
|
|
|
|
static int unix_seqpacket_sendmsg(struct kiocb *, struct socket *,
|
|
|
|
struct msghdr *, size_t);
|
|
|
|
|
2005-12-22 20:49:22 +00:00
|
|
|
static const struct proto_ops unix_stream_ops = {
|
2005-04-16 22:20:36 +00:00
|
|
|
.family = PF_UNIX,
|
|
|
|
.owner = THIS_MODULE,
|
|
|
|
.release = unix_release,
|
|
|
|
.bind = unix_bind,
|
|
|
|
.connect = unix_stream_connect,
|
|
|
|
.socketpair = unix_socketpair,
|
|
|
|
.accept = unix_accept,
|
|
|
|
.getname = unix_getname,
|
|
|
|
.poll = unix_poll,
|
|
|
|
.ioctl = unix_ioctl,
|
|
|
|
.listen = unix_listen,
|
|
|
|
.shutdown = unix_shutdown,
|
|
|
|
.setsockopt = sock_no_setsockopt,
|
|
|
|
.getsockopt = sock_no_getsockopt,
|
|
|
|
.sendmsg = unix_stream_sendmsg,
|
|
|
|
.recvmsg = unix_stream_recvmsg,
|
|
|
|
.mmap = sock_no_mmap,
|
|
|
|
.sendpage = sock_no_sendpage,
|
|
|
|
};
|
|
|
|
|
2005-12-22 20:49:22 +00:00
|
|
|
static const struct proto_ops unix_dgram_ops = {
|
2005-04-16 22:20:36 +00:00
|
|
|
.family = PF_UNIX,
|
|
|
|
.owner = THIS_MODULE,
|
|
|
|
.release = unix_release,
|
|
|
|
.bind = unix_bind,
|
|
|
|
.connect = unix_dgram_connect,
|
|
|
|
.socketpair = unix_socketpair,
|
|
|
|
.accept = sock_no_accept,
|
|
|
|
.getname = unix_getname,
|
af_unix: fix 'poll for write'/connected DGRAM sockets
For n:1 'datagram connections' (eg /dev/log), the unix_dgram_sendmsg
routine implements a form of receiver-imposed flow control by
comparing the length of the receive queue of the 'peer socket' with
the max_ack_backlog value stored in the corresponding sock structure,
either blocking the thread which caused the send-routine to be called
or returning EAGAIN. This routine is used by both SOCK_DGRAM and
SOCK_SEQPACKET sockets. The poll-implementation for these socket types
is datagram_poll from core/datagram.c. A socket is deemed to be
writeable by this routine when the memory presently consumed by
datagrams owned by it is less than the configured socket send buffer
size. This is always wrong for PF_UNIX non-stream sockets connected to
server sockets dealing with (potentially) multiple clients if the
abovementioned receive queue is currently considered to be full.
'poll' will then return, indicating that the socket is writeable, but
a subsequent write result in EAGAIN, effectively causing an (usual)
application to 'poll for writeability by repeated send request with
O_NONBLOCK set' until it has consumed its time quantum.
The change below uses a suitably modified variant of the datagram_poll
routines for both type of PF_UNIX sockets, which tests if the
recv-queue of the peer a socket is connected to is presently
considered to be 'full' as part of the 'is this socket
writeable'-checking code. The socket being polled is additionally
put onto the peer_wait wait queue associated with its peer, because the
unix_dgram_recvmsg routine does a wake up on this queue after a
datagram was received and the 'other wakeup call' is done implicitly
as part of skb destruction, meaning, a process blocked in poll
because of a full peer receive queue could otherwise sleep forever
if no datagram owned by its socket was already sitting on this queue.
Among this change is a small (inline) helper routine named
'unix_recvq_full', which consolidates the actual testing code (in three
different places) into a single location.
Signed-off-by: Rainer Weikusat <rweikusat@mssgmbh.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2008-06-28 02:34:18 +00:00
|
|
|
.poll = unix_dgram_poll,
|
2005-04-16 22:20:36 +00:00
|
|
|
.ioctl = unix_ioctl,
|
|
|
|
.listen = sock_no_listen,
|
|
|
|
.shutdown = unix_shutdown,
|
|
|
|
.setsockopt = sock_no_setsockopt,
|
|
|
|
.getsockopt = sock_no_getsockopt,
|
|
|
|
.sendmsg = unix_dgram_sendmsg,
|
|
|
|
.recvmsg = unix_dgram_recvmsg,
|
|
|
|
.mmap = sock_no_mmap,
|
|
|
|
.sendpage = sock_no_sendpage,
|
|
|
|
};
|
|
|
|
|
2005-12-22 20:49:22 +00:00
|
|
|
static const struct proto_ops unix_seqpacket_ops = {
|
2005-04-16 22:20:36 +00:00
|
|
|
.family = PF_UNIX,
|
|
|
|
.owner = THIS_MODULE,
|
|
|
|
.release = unix_release,
|
|
|
|
.bind = unix_bind,
|
|
|
|
.connect = unix_stream_connect,
|
|
|
|
.socketpair = unix_socketpair,
|
|
|
|
.accept = unix_accept,
|
|
|
|
.getname = unix_getname,
|
af_unix: fix 'poll for write'/connected DGRAM sockets
For n:1 'datagram connections' (eg /dev/log), the unix_dgram_sendmsg
routine implements a form of receiver-imposed flow control by
comparing the length of the receive queue of the 'peer socket' with
the max_ack_backlog value stored in the corresponding sock structure,
either blocking the thread which caused the send-routine to be called
or returning EAGAIN. This routine is used by both SOCK_DGRAM and
SOCK_SEQPACKET sockets. The poll-implementation for these socket types
is datagram_poll from core/datagram.c. A socket is deemed to be
writeable by this routine when the memory presently consumed by
datagrams owned by it is less than the configured socket send buffer
size. This is always wrong for PF_UNIX non-stream sockets connected to
server sockets dealing with (potentially) multiple clients if the
abovementioned receive queue is currently considered to be full.
'poll' will then return, indicating that the socket is writeable, but
a subsequent write result in EAGAIN, effectively causing an (usual)
application to 'poll for writeability by repeated send request with
O_NONBLOCK set' until it has consumed its time quantum.
The change below uses a suitably modified variant of the datagram_poll
routines for both type of PF_UNIX sockets, which tests if the
recv-queue of the peer a socket is connected to is presently
considered to be 'full' as part of the 'is this socket
writeable'-checking code. The socket being polled is additionally
put onto the peer_wait wait queue associated with its peer, because the
unix_dgram_recvmsg routine does a wake up on this queue after a
datagram was received and the 'other wakeup call' is done implicitly
as part of skb destruction, meaning, a process blocked in poll
because of a full peer receive queue could otherwise sleep forever
if no datagram owned by its socket was already sitting on this queue.
Among this change is a small (inline) helper routine named
'unix_recvq_full', which consolidates the actual testing code (in three
different places) into a single location.
Signed-off-by: Rainer Weikusat <rweikusat@mssgmbh.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2008-06-28 02:34:18 +00:00
|
|
|
.poll = unix_dgram_poll,
|
2005-04-16 22:20:36 +00:00
|
|
|
.ioctl = unix_ioctl,
|
|
|
|
.listen = unix_listen,
|
|
|
|
.shutdown = unix_shutdown,
|
|
|
|
.setsockopt = sock_no_setsockopt,
|
|
|
|
.getsockopt = sock_no_getsockopt,
|
|
|
|
.sendmsg = unix_seqpacket_sendmsg,
|
|
|
|
.recvmsg = unix_dgram_recvmsg,
|
|
|
|
.mmap = sock_no_mmap,
|
|
|
|
.sendpage = sock_no_sendpage,
|
|
|
|
};
|
|
|
|
|
|
|
|
static struct proto unix_proto = {
|
2008-11-17 08:00:30 +00:00
|
|
|
.name = "UNIX",
|
|
|
|
.owner = THIS_MODULE,
|
|
|
|
.obj_size = sizeof(struct unix_sock),
|
2005-04-16 22:20:36 +00:00
|
|
|
};
|
|
|
|
|
2006-07-03 07:25:12 +00:00
|
|
|
/*
|
|
|
|
* AF_UNIX sockets do not interact with hardware, hence they
|
|
|
|
* dont trigger interrupts - so it's safe for them to have
|
|
|
|
* bh-unsafe locking for their sk_receive_queue.lock. Split off
|
|
|
|
* this special lock-class by reinitializing the spinlock key:
|
|
|
|
*/
|
|
|
|
static struct lock_class_key af_unix_sk_receive_queue_lock_key;
|
|
|
|
|
2008-11-17 06:58:44 +00:00
|
|
|
static struct sock *unix_create1(struct net *net, struct socket *sock)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
|
|
|
struct sock *sk = NULL;
|
|
|
|
struct unix_sock *u;
|
|
|
|
|
2007-11-11 06:08:30 +00:00
|
|
|
atomic_inc(&unix_nr_socks);
|
|
|
|
if (atomic_read(&unix_nr_socks) > 2 * get_max_files())
|
2005-04-16 22:20:36 +00:00
|
|
|
goto out;
|
|
|
|
|
2007-11-01 07:39:31 +00:00
|
|
|
sk = sk_alloc(net, PF_UNIX, GFP_KERNEL, &unix_proto);
|
2005-04-16 22:20:36 +00:00
|
|
|
if (!sk)
|
|
|
|
goto out;
|
|
|
|
|
2008-11-17 06:58:44 +00:00
|
|
|
sock_init_data(sock, sk);
|
2006-07-03 07:25:12 +00:00
|
|
|
lockdep_set_class(&sk->sk_receive_queue.lock,
|
|
|
|
&af_unix_sk_receive_queue_lock_key);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
sk->sk_write_space = unix_write_space;
|
2007-12-11 12:19:17 +00:00
|
|
|
sk->sk_max_ack_backlog = net->unx.sysctl_max_dgram_qlen;
|
2005-04-16 22:20:36 +00:00
|
|
|
sk->sk_destruct = unix_sock_destructor;
|
|
|
|
u = unix_sk(sk);
|
|
|
|
u->dentry = NULL;
|
|
|
|
u->mnt = NULL;
|
2006-01-03 22:10:46 +00:00
|
|
|
spin_lock_init(&u->lock);
|
2008-07-26 04:39:17 +00:00
|
|
|
atomic_long_set(&u->inflight, 0);
|
2007-07-11 21:22:39 +00:00
|
|
|
INIT_LIST_HEAD(&u->link);
|
2006-03-21 06:35:41 +00:00
|
|
|
mutex_init(&u->readlock); /* single task reading lock */
|
2005-04-16 22:20:36 +00:00
|
|
|
init_waitqueue_head(&u->peer_wait);
|
|
|
|
unix_insert_socket(unix_sockets_unbound, sk);
|
|
|
|
out:
|
2007-11-11 06:08:30 +00:00
|
|
|
if (sk == NULL)
|
|
|
|
atomic_dec(&unix_nr_socks);
|
2008-11-24 08:09:29 +00:00
|
|
|
else {
|
|
|
|
local_bh_disable();
|
2008-11-17 10:38:49 +00:00
|
|
|
sock_prot_inuse_add(sock_net(sk), sk->sk_prot, 1);
|
2008-11-24 08:09:29 +00:00
|
|
|
local_bh_enable();
|
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
return sk;
|
|
|
|
}
|
|
|
|
|
2009-11-06 06:18:14 +00:00
|
|
|
static int unix_create(struct net *net, struct socket *sock, int protocol,
|
|
|
|
int kern)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
|
|
|
if (protocol && protocol != PF_UNIX)
|
|
|
|
return -EPROTONOSUPPORT;
|
|
|
|
|
|
|
|
sock->state = SS_UNCONNECTED;
|
|
|
|
|
|
|
|
switch (sock->type) {
|
|
|
|
case SOCK_STREAM:
|
|
|
|
sock->ops = &unix_stream_ops;
|
|
|
|
break;
|
|
|
|
/*
|
|
|
|
* Believe it or not BSD has AF_UNIX, SOCK_RAW though
|
|
|
|
* nothing uses it.
|
|
|
|
*/
|
|
|
|
case SOCK_RAW:
|
2008-11-02 04:38:31 +00:00
|
|
|
sock->type = SOCK_DGRAM;
|
2005-04-16 22:20:36 +00:00
|
|
|
case SOCK_DGRAM:
|
|
|
|
sock->ops = &unix_dgram_ops;
|
|
|
|
break;
|
|
|
|
case SOCK_SEQPACKET:
|
|
|
|
sock->ops = &unix_seqpacket_ops;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return -ESOCKTNOSUPPORT;
|
|
|
|
}
|
|
|
|
|
2007-10-09 06:24:22 +00:00
|
|
|
return unix_create1(net, sock) ? 0 : -ENOMEM;
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int unix_release(struct socket *sock)
|
|
|
|
{
|
|
|
|
struct sock *sk = sock->sk;
|
|
|
|
|
|
|
|
if (!sk)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
sock->sk = NULL;
|
|
|
|
|
2008-11-17 06:58:44 +00:00
|
|
|
return unix_release_sock(sk, 0);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int unix_autobind(struct socket *sock)
|
|
|
|
{
|
|
|
|
struct sock *sk = sock->sk;
|
2008-03-25 17:26:21 +00:00
|
|
|
struct net *net = sock_net(sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
struct unix_sock *u = unix_sk(sk);
|
|
|
|
static u32 ordernum = 1;
|
2008-11-17 06:58:44 +00:00
|
|
|
struct unix_address *addr;
|
2005-04-16 22:20:36 +00:00
|
|
|
int err;
|
|
|
|
|
2006-03-21 06:35:41 +00:00
|
|
|
mutex_lock(&u->readlock);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
err = 0;
|
|
|
|
if (u->addr)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
err = -ENOMEM;
|
2006-07-21 21:51:30 +00:00
|
|
|
addr = kzalloc(sizeof(*addr) + sizeof(short) + 16, GFP_KERNEL);
|
2005-04-16 22:20:36 +00:00
|
|
|
if (!addr)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
addr->name->sun_family = AF_UNIX;
|
|
|
|
atomic_set(&addr->refcnt, 1);
|
|
|
|
|
|
|
|
retry:
|
|
|
|
addr->len = sprintf(addr->name->sun_path+1, "%05x", ordernum) + 1 + sizeof(short);
|
2008-11-19 23:44:53 +00:00
|
|
|
addr->hash = unix_hash_fold(csum_partial(addr->name, addr->len, 0));
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2005-12-14 07:26:29 +00:00
|
|
|
spin_lock(&unix_table_lock);
|
2005-04-16 22:20:36 +00:00
|
|
|
ordernum = (ordernum+1)&0xFFFFF;
|
|
|
|
|
2007-11-20 06:29:30 +00:00
|
|
|
if (__unix_find_socket_byname(net, addr->name, addr->len, sock->type,
|
2005-04-16 22:20:36 +00:00
|
|
|
addr->hash)) {
|
2005-12-14 07:26:29 +00:00
|
|
|
spin_unlock(&unix_table_lock);
|
2005-04-16 22:20:36 +00:00
|
|
|
/* Sanity yield. It is unusual case, but yet... */
|
|
|
|
if (!(ordernum&0xFF))
|
|
|
|
yield();
|
|
|
|
goto retry;
|
|
|
|
}
|
|
|
|
addr->hash ^= sk->sk_type;
|
|
|
|
|
|
|
|
__unix_remove_socket(sk);
|
|
|
|
u->addr = addr;
|
|
|
|
__unix_insert_socket(&unix_socket_table[addr->hash], sk);
|
2005-12-14 07:26:29 +00:00
|
|
|
spin_unlock(&unix_table_lock);
|
2005-04-16 22:20:36 +00:00
|
|
|
err = 0;
|
|
|
|
|
2006-03-21 06:35:41 +00:00
|
|
|
out: mutex_unlock(&u->readlock);
|
2005-04-16 22:20:36 +00:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2007-11-20 06:29:30 +00:00
|
|
|
static struct sock *unix_find_other(struct net *net,
|
|
|
|
struct sockaddr_un *sunname, int len,
|
2005-04-16 22:20:36 +00:00
|
|
|
int type, unsigned hash, int *error)
|
|
|
|
{
|
|
|
|
struct sock *u;
|
2008-08-02 05:04:36 +00:00
|
|
|
struct path path;
|
2005-04-16 22:20:36 +00:00
|
|
|
int err = 0;
|
2007-02-09 14:25:23 +00:00
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
if (sunname->sun_path[0]) {
|
2008-08-02 05:04:36 +00:00
|
|
|
struct inode *inode;
|
|
|
|
err = kern_path(sunname->sun_path, LOOKUP_FOLLOW, &path);
|
2005-04-16 22:20:36 +00:00
|
|
|
if (err)
|
|
|
|
goto fail;
|
2008-08-02 05:04:36 +00:00
|
|
|
inode = path.dentry->d_inode;
|
|
|
|
err = inode_permission(inode, MAY_WRITE);
|
2005-04-16 22:20:36 +00:00
|
|
|
if (err)
|
|
|
|
goto put_fail;
|
|
|
|
|
|
|
|
err = -ECONNREFUSED;
|
2008-08-02 05:04:36 +00:00
|
|
|
if (!S_ISSOCK(inode->i_mode))
|
2005-04-16 22:20:36 +00:00
|
|
|
goto put_fail;
|
2010-06-13 03:35:48 +00:00
|
|
|
u = unix_find_socket_byinode(inode);
|
2005-04-16 22:20:36 +00:00
|
|
|
if (!u)
|
|
|
|
goto put_fail;
|
|
|
|
|
|
|
|
if (u->sk_type == type)
|
2008-08-02 05:04:36 +00:00
|
|
|
touch_atime(path.mnt, path.dentry);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2008-08-02 05:04:36 +00:00
|
|
|
path_put(&path);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2008-11-02 04:38:31 +00:00
|
|
|
err = -EPROTOTYPE;
|
2005-04-16 22:20:36 +00:00
|
|
|
if (u->sk_type != type) {
|
|
|
|
sock_put(u);
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
err = -ECONNREFUSED;
|
2008-11-02 04:38:31 +00:00
|
|
|
u = unix_find_socket_byname(net, sunname, len, type, hash);
|
2005-04-16 22:20:36 +00:00
|
|
|
if (u) {
|
|
|
|
struct dentry *dentry;
|
|
|
|
dentry = unix_sk(u)->dentry;
|
|
|
|
if (dentry)
|
|
|
|
touch_atime(unix_sk(u)->mnt, dentry);
|
|
|
|
} else
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
return u;
|
|
|
|
|
|
|
|
put_fail:
|
2008-08-02 05:04:36 +00:00
|
|
|
path_put(&path);
|
2005-04-16 22:20:36 +00:00
|
|
|
fail:
|
2008-11-02 04:38:31 +00:00
|
|
|
*error = err;
|
2005-04-16 22:20:36 +00:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int unix_bind(struct socket *sock, struct sockaddr *uaddr, int addr_len)
|
|
|
|
{
|
|
|
|
struct sock *sk = sock->sk;
|
2008-03-25 17:26:21 +00:00
|
|
|
struct net *net = sock_net(sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
struct unix_sock *u = unix_sk(sk);
|
2008-11-02 04:38:31 +00:00
|
|
|
struct sockaddr_un *sunaddr = (struct sockaddr_un *)uaddr;
|
2008-11-17 06:58:44 +00:00
|
|
|
struct dentry *dentry = NULL;
|
2005-04-16 22:20:36 +00:00
|
|
|
struct nameidata nd;
|
|
|
|
int err;
|
|
|
|
unsigned hash;
|
|
|
|
struct unix_address *addr;
|
|
|
|
struct hlist_head *list;
|
|
|
|
|
|
|
|
err = -EINVAL;
|
|
|
|
if (sunaddr->sun_family != AF_UNIX)
|
|
|
|
goto out;
|
|
|
|
|
2008-11-02 04:38:31 +00:00
|
|
|
if (addr_len == sizeof(short)) {
|
2005-04-16 22:20:36 +00:00
|
|
|
err = unix_autobind(sock);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
err = unix_mkname(sunaddr, addr_len, &hash);
|
|
|
|
if (err < 0)
|
|
|
|
goto out;
|
|
|
|
addr_len = err;
|
|
|
|
|
2006-03-21 06:35:41 +00:00
|
|
|
mutex_lock(&u->readlock);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
err = -EINVAL;
|
|
|
|
if (u->addr)
|
|
|
|
goto out_up;
|
|
|
|
|
|
|
|
err = -ENOMEM;
|
|
|
|
addr = kmalloc(sizeof(*addr)+addr_len, GFP_KERNEL);
|
|
|
|
if (!addr)
|
|
|
|
goto out_up;
|
|
|
|
|
|
|
|
memcpy(addr->name, sunaddr, addr_len);
|
|
|
|
addr->len = addr_len;
|
|
|
|
addr->hash = hash ^ sk->sk_type;
|
|
|
|
atomic_set(&addr->refcnt, 1);
|
|
|
|
|
|
|
|
if (sunaddr->sun_path[0]) {
|
|
|
|
unsigned int mode;
|
|
|
|
err = 0;
|
|
|
|
/*
|
|
|
|
* Get the parent directory, calculate the hash for last
|
|
|
|
* component.
|
|
|
|
*/
|
|
|
|
err = path_lookup(sunaddr->sun_path, LOOKUP_PARENT, &nd);
|
|
|
|
if (err)
|
|
|
|
goto out_mknod_parent;
|
2005-05-19 19:26:43 +00:00
|
|
|
|
|
|
|
dentry = lookup_create(&nd, 0);
|
2005-04-16 22:20:36 +00:00
|
|
|
err = PTR_ERR(dentry);
|
|
|
|
if (IS_ERR(dentry))
|
|
|
|
goto out_mknod_unlock;
|
2005-05-19 19:26:43 +00:00
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
/*
|
|
|
|
* All right, let's create it.
|
|
|
|
*/
|
|
|
|
mode = S_IFSOCK |
|
2009-03-29 23:08:22 +00:00
|
|
|
(SOCK_INODE(sock)->i_mode & ~current_umask());
|
2008-02-15 22:37:57 +00:00
|
|
|
err = mnt_want_write(nd.path.mnt);
|
|
|
|
if (err)
|
|
|
|
goto out_mknod_dput;
|
2008-12-17 04:24:15 +00:00
|
|
|
err = security_path_mknod(&nd.path, dentry, mode, 0);
|
|
|
|
if (err)
|
|
|
|
goto out_mknod_drop_write;
|
2008-02-15 03:34:32 +00:00
|
|
|
err = vfs_mknod(nd.path.dentry->d_inode, dentry, mode, 0);
|
2008-12-17 04:24:15 +00:00
|
|
|
out_mknod_drop_write:
|
2008-02-15 22:37:57 +00:00
|
|
|
mnt_drop_write(nd.path.mnt);
|
2005-04-16 22:20:36 +00:00
|
|
|
if (err)
|
|
|
|
goto out_mknod_dput;
|
2008-02-15 03:34:32 +00:00
|
|
|
mutex_unlock(&nd.path.dentry->d_inode->i_mutex);
|
|
|
|
dput(nd.path.dentry);
|
|
|
|
nd.path.dentry = dentry;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
addr->hash = UNIX_HASH_SIZE;
|
|
|
|
}
|
|
|
|
|
2005-12-14 07:26:29 +00:00
|
|
|
spin_lock(&unix_table_lock);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
if (!sunaddr->sun_path[0]) {
|
|
|
|
err = -EADDRINUSE;
|
2007-11-20 06:29:30 +00:00
|
|
|
if (__unix_find_socket_byname(net, sunaddr, addr_len,
|
2005-04-16 22:20:36 +00:00
|
|
|
sk->sk_type, hash)) {
|
|
|
|
unix_release_addr(addr);
|
|
|
|
goto out_unlock;
|
|
|
|
}
|
|
|
|
|
|
|
|
list = &unix_socket_table[addr->hash];
|
|
|
|
} else {
|
|
|
|
list = &unix_socket_table[dentry->d_inode->i_ino & (UNIX_HASH_SIZE-1)];
|
2008-02-15 03:34:32 +00:00
|
|
|
u->dentry = nd.path.dentry;
|
|
|
|
u->mnt = nd.path.mnt;
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
err = 0;
|
|
|
|
__unix_remove_socket(sk);
|
|
|
|
u->addr = addr;
|
|
|
|
__unix_insert_socket(list, sk);
|
|
|
|
|
|
|
|
out_unlock:
|
2005-12-14 07:26:29 +00:00
|
|
|
spin_unlock(&unix_table_lock);
|
2005-04-16 22:20:36 +00:00
|
|
|
out_up:
|
2006-03-21 06:35:41 +00:00
|
|
|
mutex_unlock(&u->readlock);
|
2005-04-16 22:20:36 +00:00
|
|
|
out:
|
|
|
|
return err;
|
|
|
|
|
|
|
|
out_mknod_dput:
|
|
|
|
dput(dentry);
|
|
|
|
out_mknod_unlock:
|
2008-02-15 03:34:32 +00:00
|
|
|
mutex_unlock(&nd.path.dentry->d_inode->i_mutex);
|
2008-02-15 03:34:35 +00:00
|
|
|
path_put(&nd.path);
|
2005-04-16 22:20:36 +00:00
|
|
|
out_mknod_parent:
|
2008-11-02 04:38:31 +00:00
|
|
|
if (err == -EEXIST)
|
|
|
|
err = -EADDRINUSE;
|
2005-04-16 22:20:36 +00:00
|
|
|
unix_release_addr(addr);
|
|
|
|
goto out_up;
|
|
|
|
}
|
|
|
|
|
2007-05-31 22:19:20 +00:00
|
|
|
static void unix_state_double_lock(struct sock *sk1, struct sock *sk2)
|
|
|
|
{
|
|
|
|
if (unlikely(sk1 == sk2) || !sk2) {
|
|
|
|
unix_state_lock(sk1);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (sk1 < sk2) {
|
|
|
|
unix_state_lock(sk1);
|
|
|
|
unix_state_lock_nested(sk2);
|
|
|
|
} else {
|
|
|
|
unix_state_lock(sk2);
|
|
|
|
unix_state_lock_nested(sk1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void unix_state_double_unlock(struct sock *sk1, struct sock *sk2)
|
|
|
|
{
|
|
|
|
if (unlikely(sk1 == sk2) || !sk2) {
|
|
|
|
unix_state_unlock(sk1);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
unix_state_unlock(sk1);
|
|
|
|
unix_state_unlock(sk2);
|
|
|
|
}
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
static int unix_dgram_connect(struct socket *sock, struct sockaddr *addr,
|
|
|
|
int alen, int flags)
|
|
|
|
{
|
|
|
|
struct sock *sk = sock->sk;
|
2008-03-25 17:26:21 +00:00
|
|
|
struct net *net = sock_net(sk);
|
2008-11-02 04:38:31 +00:00
|
|
|
struct sockaddr_un *sunaddr = (struct sockaddr_un *)addr;
|
2005-04-16 22:20:36 +00:00
|
|
|
struct sock *other;
|
|
|
|
unsigned hash;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
if (addr->sa_family != AF_UNSPEC) {
|
|
|
|
err = unix_mkname(sunaddr, alen, &hash);
|
|
|
|
if (err < 0)
|
|
|
|
goto out;
|
|
|
|
alen = err;
|
|
|
|
|
|
|
|
if (test_bit(SOCK_PASSCRED, &sock->flags) &&
|
|
|
|
!unix_sk(sk)->addr && (err = unix_autobind(sock)) != 0)
|
|
|
|
goto out;
|
|
|
|
|
2007-05-31 22:19:20 +00:00
|
|
|
restart:
|
2008-11-02 04:38:31 +00:00
|
|
|
other = unix_find_other(net, sunaddr, alen, sock->type, hash, &err);
|
2005-04-16 22:20:36 +00:00
|
|
|
if (!other)
|
|
|
|
goto out;
|
|
|
|
|
2007-05-31 22:19:20 +00:00
|
|
|
unix_state_double_lock(sk, other);
|
|
|
|
|
|
|
|
/* Apparently VFS overslept socket death. Retry. */
|
|
|
|
if (sock_flag(other, SOCK_DEAD)) {
|
|
|
|
unix_state_double_unlock(sk, other);
|
|
|
|
sock_put(other);
|
|
|
|
goto restart;
|
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
err = -EPERM;
|
|
|
|
if (!unix_may_send(sk, other))
|
|
|
|
goto out_unlock;
|
|
|
|
|
|
|
|
err = security_unix_may_send(sk->sk_socket, other->sk_socket);
|
|
|
|
if (err)
|
|
|
|
goto out_unlock;
|
|
|
|
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* 1003.1g breaking connected state with AF_UNSPEC
|
|
|
|
*/
|
|
|
|
other = NULL;
|
2007-05-31 22:19:20 +00:00
|
|
|
unix_state_double_lock(sk, other);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If it was connected, reconnect.
|
|
|
|
*/
|
|
|
|
if (unix_peer(sk)) {
|
|
|
|
struct sock *old_peer = unix_peer(sk);
|
2008-11-02 04:38:31 +00:00
|
|
|
unix_peer(sk) = other;
|
2007-05-31 22:19:20 +00:00
|
|
|
unix_state_double_unlock(sk, other);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
if (other != old_peer)
|
|
|
|
unix_dgram_disconnected(sk, old_peer);
|
|
|
|
sock_put(old_peer);
|
|
|
|
} else {
|
2008-11-02 04:38:31 +00:00
|
|
|
unix_peer(sk) = other;
|
2007-05-31 22:19:20 +00:00
|
|
|
unix_state_double_unlock(sk, other);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
2007-02-09 14:25:23 +00:00
|
|
|
return 0;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
out_unlock:
|
2007-05-31 22:19:20 +00:00
|
|
|
unix_state_double_unlock(sk, other);
|
2005-04-16 22:20:36 +00:00
|
|
|
sock_put(other);
|
|
|
|
out:
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static long unix_wait_for_peer(struct sock *other, long timeo)
|
|
|
|
{
|
|
|
|
struct unix_sock *u = unix_sk(other);
|
|
|
|
int sched;
|
|
|
|
DEFINE_WAIT(wait);
|
|
|
|
|
|
|
|
prepare_to_wait_exclusive(&u->peer_wait, &wait, TASK_INTERRUPTIBLE);
|
|
|
|
|
|
|
|
sched = !sock_flag(other, SOCK_DEAD) &&
|
|
|
|
!(other->sk_shutdown & RCV_SHUTDOWN) &&
|
2008-06-18 05:28:05 +00:00
|
|
|
unix_recvq_full(other);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_unlock(other);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
if (sched)
|
|
|
|
timeo = schedule_timeout(timeo);
|
|
|
|
|
|
|
|
finish_wait(&u->peer_wait, &wait);
|
|
|
|
return timeo;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int unix_stream_connect(struct socket *sock, struct sockaddr *uaddr,
|
|
|
|
int addr_len, int flags)
|
|
|
|
{
|
2008-11-02 04:38:31 +00:00
|
|
|
struct sockaddr_un *sunaddr = (struct sockaddr_un *)uaddr;
|
2005-04-16 22:20:36 +00:00
|
|
|
struct sock *sk = sock->sk;
|
2008-03-25 17:26:21 +00:00
|
|
|
struct net *net = sock_net(sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
struct unix_sock *u = unix_sk(sk), *newu, *otheru;
|
|
|
|
struct sock *newsk = NULL;
|
|
|
|
struct sock *other = NULL;
|
|
|
|
struct sk_buff *skb = NULL;
|
|
|
|
unsigned hash;
|
|
|
|
int st;
|
|
|
|
int err;
|
|
|
|
long timeo;
|
|
|
|
|
|
|
|
err = unix_mkname(sunaddr, addr_len, &hash);
|
|
|
|
if (err < 0)
|
|
|
|
goto out;
|
|
|
|
addr_len = err;
|
|
|
|
|
2009-11-30 00:55:45 +00:00
|
|
|
if (test_bit(SOCK_PASSCRED, &sock->flags) && !u->addr &&
|
|
|
|
(err = unix_autobind(sock)) != 0)
|
2005-04-16 22:20:36 +00:00
|
|
|
goto out;
|
|
|
|
|
|
|
|
timeo = sock_sndtimeo(sk, flags & O_NONBLOCK);
|
|
|
|
|
|
|
|
/* First of all allocate resources.
|
|
|
|
If we will make it after state is locked,
|
|
|
|
we will have to recheck all again in any case.
|
|
|
|
*/
|
|
|
|
|
|
|
|
err = -ENOMEM;
|
|
|
|
|
|
|
|
/* create new sock for complete connection */
|
2008-03-25 17:26:21 +00:00
|
|
|
newsk = unix_create1(sock_net(sk), NULL);
|
2005-04-16 22:20:36 +00:00
|
|
|
if (newsk == NULL)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
/* Allocate skb for sending to listening sock */
|
|
|
|
skb = sock_wmalloc(newsk, 1, 0, GFP_KERNEL);
|
|
|
|
if (skb == NULL)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
restart:
|
|
|
|
/* Find listening sock. */
|
2007-11-20 06:29:30 +00:00
|
|
|
other = unix_find_other(net, sunaddr, addr_len, sk->sk_type, hash, &err);
|
2005-04-16 22:20:36 +00:00
|
|
|
if (!other)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
/* Latch state of peer */
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_lock(other);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
/* Apparently VFS overslept socket death. Retry. */
|
|
|
|
if (sock_flag(other, SOCK_DEAD)) {
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_unlock(other);
|
2005-04-16 22:20:36 +00:00
|
|
|
sock_put(other);
|
|
|
|
goto restart;
|
|
|
|
}
|
|
|
|
|
|
|
|
err = -ECONNREFUSED;
|
|
|
|
if (other->sk_state != TCP_LISTEN)
|
|
|
|
goto out_unlock;
|
AF_UNIX: Fix deadlock on connecting to shutdown socket
I found a deadlock bug in UNIX domain socket, which makes able to DoS
attack against the local machine by non-root users.
How to reproduce:
1. Make a listening AF_UNIX/SOCK_STREAM socket with an abstruct
namespace(*), and shutdown(2) it.
2. Repeat connect(2)ing to the listening socket from the other sockets
until the connection backlog is full-filled.
3. connect(2) takes the CPU forever. If every core is taken, the
system hangs.
PoC code: (Run as many times as cores on SMP machines.)
int main(void)
{
int ret;
int csd;
int lsd;
struct sockaddr_un sun;
/* make an abstruct name address (*) */
memset(&sun, 0, sizeof(sun));
sun.sun_family = PF_UNIX;
sprintf(&sun.sun_path[1], "%d", getpid());
/* create the listening socket and shutdown */
lsd = socket(AF_UNIX, SOCK_STREAM, 0);
bind(lsd, (struct sockaddr *)&sun, sizeof(sun));
listen(lsd, 1);
shutdown(lsd, SHUT_RDWR);
/* connect loop */
alarm(15); /* forcely exit the loop after 15 sec */
for (;;) {
csd = socket(AF_UNIX, SOCK_STREAM, 0);
ret = connect(csd, (struct sockaddr *)&sun, sizeof(sun));
if (-1 == ret) {
perror("connect()");
break;
}
puts("Connection OK");
}
return 0;
}
(*) Make sun_path[0] = 0 to use the abstruct namespace.
If a file-based socket is used, the system doesn't deadlock because
of context switches in the file system layer.
Why this happens:
Error checks between unix_socket_connect() and unix_wait_for_peer() are
inconsistent. The former calls the latter to wait until the backlog is
processed. Despite the latter returns without doing anything when the
socket is shutdown, the former doesn't check the shutdown state and
just retries calling the latter forever.
Patch:
The patch below adds shutdown check into unix_socket_connect(), so
connect(2) to the shutdown socket will return -ECONREFUSED.
Signed-off-by: Tomoki Sekiyama <tomoki.sekiyama.qu@hitachi.com>
Signed-off-by: Masanori Yoshida <masanori.yoshida.tv@hitachi.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2009-10-19 06:17:37 +00:00
|
|
|
if (other->sk_shutdown & RCV_SHUTDOWN)
|
|
|
|
goto out_unlock;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2008-06-18 05:28:05 +00:00
|
|
|
if (unix_recvq_full(other)) {
|
2005-04-16 22:20:36 +00:00
|
|
|
err = -EAGAIN;
|
|
|
|
if (!timeo)
|
|
|
|
goto out_unlock;
|
|
|
|
|
|
|
|
timeo = unix_wait_for_peer(other, timeo);
|
|
|
|
|
|
|
|
err = sock_intr_errno(timeo);
|
|
|
|
if (signal_pending(current))
|
|
|
|
goto out;
|
|
|
|
sock_put(other);
|
|
|
|
goto restart;
|
2007-02-09 14:25:23 +00:00
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
/* Latch our state.
|
|
|
|
|
|
|
|
It is tricky place. We need to grab write lock and cannot
|
|
|
|
drop lock on peer. It is dangerous because deadlock is
|
|
|
|
possible. Connect to self case and simultaneous
|
|
|
|
attempt to connect are eliminated by checking socket
|
|
|
|
state. other is TCP_LISTEN, if sk is TCP_LISTEN we
|
|
|
|
check this before attempt to grab lock.
|
|
|
|
|
|
|
|
Well, and we have to recheck the state after socket locked.
|
|
|
|
*/
|
|
|
|
st = sk->sk_state;
|
|
|
|
|
|
|
|
switch (st) {
|
|
|
|
case TCP_CLOSE:
|
|
|
|
/* This is ok... continue with connect */
|
|
|
|
break;
|
|
|
|
case TCP_ESTABLISHED:
|
|
|
|
/* Socket is already connected */
|
|
|
|
err = -EISCONN;
|
|
|
|
goto out_unlock;
|
|
|
|
default:
|
|
|
|
err = -EINVAL;
|
|
|
|
goto out_unlock;
|
|
|
|
}
|
|
|
|
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_lock_nested(sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
if (sk->sk_state != st) {
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_unlock(sk);
|
|
|
|
unix_state_unlock(other);
|
2005-04-16 22:20:36 +00:00
|
|
|
sock_put(other);
|
|
|
|
goto restart;
|
|
|
|
}
|
|
|
|
|
|
|
|
err = security_unix_stream_connect(sock, other->sk_socket, newsk);
|
|
|
|
if (err) {
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_unlock(sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
goto out_unlock;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* The way is open! Fastly set all the necessary fields... */
|
|
|
|
|
|
|
|
sock_hold(sk);
|
|
|
|
unix_peer(newsk) = sk;
|
|
|
|
newsk->sk_state = TCP_ESTABLISHED;
|
|
|
|
newsk->sk_type = sk->sk_type;
|
2010-06-13 03:30:14 +00:00
|
|
|
init_peercred(newsk);
|
2005-04-16 22:20:36 +00:00
|
|
|
newu = unix_sk(newsk);
|
2010-04-29 11:01:49 +00:00
|
|
|
newsk->sk_wq = &newu->peer_wq;
|
2005-04-16 22:20:36 +00:00
|
|
|
otheru = unix_sk(other);
|
|
|
|
|
|
|
|
/* copy address information from listening to new sock*/
|
|
|
|
if (otheru->addr) {
|
|
|
|
atomic_inc(&otheru->addr->refcnt);
|
|
|
|
newu->addr = otheru->addr;
|
|
|
|
}
|
|
|
|
if (otheru->dentry) {
|
|
|
|
newu->dentry = dget(otheru->dentry);
|
|
|
|
newu->mnt = mntget(otheru->mnt);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Set credentials */
|
2010-06-13 03:30:14 +00:00
|
|
|
copy_peercred(sk, other);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
sock->state = SS_CONNECTED;
|
|
|
|
sk->sk_state = TCP_ESTABLISHED;
|
2005-12-14 07:22:32 +00:00
|
|
|
sock_hold(newsk);
|
|
|
|
|
|
|
|
smp_mb__after_atomic_inc(); /* sock_hold() does an atomic_inc() */
|
|
|
|
unix_peer(sk) = newsk;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_unlock(sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
/* take ten and and send info to listening sock */
|
|
|
|
spin_lock(&other->sk_receive_queue.lock);
|
|
|
|
__skb_queue_tail(&other->sk_receive_queue, skb);
|
|
|
|
spin_unlock(&other->sk_receive_queue.lock);
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_unlock(other);
|
2005-04-16 22:20:36 +00:00
|
|
|
other->sk_data_ready(other, 0);
|
|
|
|
sock_put(other);
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
out_unlock:
|
|
|
|
if (other)
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_unlock(other);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
out:
|
2009-02-25 00:32:45 +00:00
|
|
|
kfree_skb(skb);
|
2005-04-16 22:20:36 +00:00
|
|
|
if (newsk)
|
|
|
|
unix_release_sock(newsk, 0);
|
|
|
|
if (other)
|
|
|
|
sock_put(other);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int unix_socketpair(struct socket *socka, struct socket *sockb)
|
|
|
|
{
|
2008-11-02 04:38:31 +00:00
|
|
|
struct sock *ska = socka->sk, *skb = sockb->sk;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
/* Join our sockets back to back */
|
|
|
|
sock_hold(ska);
|
|
|
|
sock_hold(skb);
|
2008-11-02 04:38:31 +00:00
|
|
|
unix_peer(ska) = skb;
|
|
|
|
unix_peer(skb) = ska;
|
2010-06-13 03:30:14 +00:00
|
|
|
init_peercred(ska);
|
|
|
|
init_peercred(skb);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
if (ska->sk_type != SOCK_DGRAM) {
|
|
|
|
ska->sk_state = TCP_ESTABLISHED;
|
|
|
|
skb->sk_state = TCP_ESTABLISHED;
|
|
|
|
socka->state = SS_CONNECTED;
|
|
|
|
sockb->state = SS_CONNECTED;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int unix_accept(struct socket *sock, struct socket *newsock, int flags)
|
|
|
|
{
|
|
|
|
struct sock *sk = sock->sk;
|
|
|
|
struct sock *tsk;
|
|
|
|
struct sk_buff *skb;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
err = -EOPNOTSUPP;
|
2008-11-17 06:58:44 +00:00
|
|
|
if (sock->type != SOCK_STREAM && sock->type != SOCK_SEQPACKET)
|
2005-04-16 22:20:36 +00:00
|
|
|
goto out;
|
|
|
|
|
|
|
|
err = -EINVAL;
|
|
|
|
if (sk->sk_state != TCP_LISTEN)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
/* If socket state is TCP_LISTEN it cannot change (for now...),
|
|
|
|
* so that no locks are necessary.
|
|
|
|
*/
|
|
|
|
|
|
|
|
skb = skb_recv_datagram(sk, 0, flags&O_NONBLOCK, &err);
|
|
|
|
if (!skb) {
|
|
|
|
/* This means receive shutdown. */
|
|
|
|
if (err == 0)
|
|
|
|
err = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
tsk = skb->sk;
|
|
|
|
skb_free_datagram(sk, skb);
|
|
|
|
wake_up_interruptible(&unix_sk(sk)->peer_wait);
|
|
|
|
|
|
|
|
/* attach accepted sock to socket */
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_lock(tsk);
|
2005-04-16 22:20:36 +00:00
|
|
|
newsock->state = SS_CONNECTED;
|
|
|
|
sock_graft(tsk, newsock);
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_unlock(tsk);
|
2005-04-16 22:20:36 +00:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
out:
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int unix_getname(struct socket *sock, struct sockaddr *uaddr, int *uaddr_len, int peer)
|
|
|
|
{
|
|
|
|
struct sock *sk = sock->sk;
|
|
|
|
struct unix_sock *u;
|
2009-11-08 05:51:19 +00:00
|
|
|
DECLARE_SOCKADDR(struct sockaddr_un *, sunaddr, uaddr);
|
2005-04-16 22:20:36 +00:00
|
|
|
int err = 0;
|
|
|
|
|
|
|
|
if (peer) {
|
|
|
|
sk = unix_peer_get(sk);
|
|
|
|
|
|
|
|
err = -ENOTCONN;
|
|
|
|
if (!sk)
|
|
|
|
goto out;
|
|
|
|
err = 0;
|
|
|
|
} else {
|
|
|
|
sock_hold(sk);
|
|
|
|
}
|
|
|
|
|
|
|
|
u = unix_sk(sk);
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_lock(sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
if (!u->addr) {
|
|
|
|
sunaddr->sun_family = AF_UNIX;
|
|
|
|
sunaddr->sun_path[0] = 0;
|
|
|
|
*uaddr_len = sizeof(short);
|
|
|
|
} else {
|
|
|
|
struct unix_address *addr = u->addr;
|
|
|
|
|
|
|
|
*uaddr_len = addr->len;
|
|
|
|
memcpy(sunaddr, addr->name, *uaddr_len);
|
|
|
|
}
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_unlock(sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
sock_put(sk);
|
|
|
|
out:
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void unix_detach_fds(struct scm_cookie *scm, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
scm->fp = UNIXCB(skb).fp;
|
|
|
|
UNIXCB(skb).fp = NULL;
|
|
|
|
|
2008-11-17 06:58:44 +00:00
|
|
|
for (i = scm->fp->count-1; i >= 0; i--)
|
2005-04-16 22:20:36 +00:00
|
|
|
unix_notinflight(scm->fp->fp[i]);
|
|
|
|
}
|
|
|
|
|
2010-06-13 03:34:33 +00:00
|
|
|
static void unix_destruct_scm(struct sk_buff *skb)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
|
|
|
struct scm_cookie scm;
|
|
|
|
memset(&scm, 0, sizeof(scm));
|
2010-06-13 03:34:33 +00:00
|
|
|
scm.pid = UNIXCB(skb).pid;
|
|
|
|
scm.cred = UNIXCB(skb).cred;
|
|
|
|
if (UNIXCB(skb).fp)
|
|
|
|
unix_detach_fds(&scm, skb);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
/* Alas, it calls VFS */
|
|
|
|
/* So fscking what? fput() had been SMP-safe since the last Summer */
|
|
|
|
scm_destroy(&scm);
|
|
|
|
sock_wfree(skb);
|
|
|
|
}
|
|
|
|
|
2008-11-09 14:23:57 +00:00
|
|
|
static int unix_attach_fds(struct scm_cookie *scm, struct sk_buff *skb)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
|
|
|
int i;
|
2008-11-09 14:23:57 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Need to duplicate file references for the sake of garbage
|
|
|
|
* collection. Otherwise a socket in the fps might become a
|
|
|
|
* candidate for GC while the skb is not yet queued.
|
|
|
|
*/
|
|
|
|
UNIXCB(skb).fp = scm_fp_dup(scm->fp);
|
|
|
|
if (!UNIXCB(skb).fp)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2008-11-17 06:58:44 +00:00
|
|
|
for (i = scm->fp->count-1; i >= 0; i--)
|
2005-04-16 22:20:36 +00:00
|
|
|
unix_inflight(scm->fp->fp[i]);
|
2008-11-09 14:23:57 +00:00
|
|
|
return 0;
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
2010-06-13 03:34:33 +00:00
|
|
|
static int unix_scm_to_skb(struct scm_cookie *scm, struct sk_buff *skb, bool send_fds)
|
|
|
|
{
|
|
|
|
int err = 0;
|
|
|
|
UNIXCB(skb).pid = get_pid(scm->pid);
|
|
|
|
UNIXCB(skb).cred = get_cred(scm->cred);
|
|
|
|
UNIXCB(skb).fp = NULL;
|
|
|
|
if (scm->fp && send_fds)
|
|
|
|
err = unix_attach_fds(scm, skb);
|
|
|
|
|
|
|
|
skb->destructor = unix_destruct_scm;
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
/*
|
|
|
|
* Send AF_UNIX data.
|
|
|
|
*/
|
|
|
|
|
|
|
|
static int unix_dgram_sendmsg(struct kiocb *kiocb, struct socket *sock,
|
|
|
|
struct msghdr *msg, size_t len)
|
|
|
|
{
|
|
|
|
struct sock_iocb *siocb = kiocb_to_siocb(kiocb);
|
|
|
|
struct sock *sk = sock->sk;
|
2008-03-25 17:26:21 +00:00
|
|
|
struct net *net = sock_net(sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
struct unix_sock *u = unix_sk(sk);
|
2008-11-02 04:38:31 +00:00
|
|
|
struct sockaddr_un *sunaddr = msg->msg_name;
|
2005-04-16 22:20:36 +00:00
|
|
|
struct sock *other = NULL;
|
|
|
|
int namelen = 0; /* fake GCC */
|
|
|
|
int err;
|
|
|
|
unsigned hash;
|
|
|
|
struct sk_buff *skb;
|
|
|
|
long timeo;
|
|
|
|
struct scm_cookie tmp_scm;
|
|
|
|
|
|
|
|
if (NULL == siocb->scm)
|
|
|
|
siocb->scm = &tmp_scm;
|
2008-11-26 23:32:27 +00:00
|
|
|
wait_for_unix_gc();
|
2005-04-16 22:20:36 +00:00
|
|
|
err = scm_send(sock, msg, siocb->scm);
|
|
|
|
if (err < 0)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
err = -EOPNOTSUPP;
|
|
|
|
if (msg->msg_flags&MSG_OOB)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
if (msg->msg_namelen) {
|
|
|
|
err = unix_mkname(sunaddr, msg->msg_namelen, &hash);
|
|
|
|
if (err < 0)
|
|
|
|
goto out;
|
|
|
|
namelen = err;
|
|
|
|
} else {
|
|
|
|
sunaddr = NULL;
|
|
|
|
err = -ENOTCONN;
|
|
|
|
other = unix_peer_get(sk);
|
|
|
|
if (!other)
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2009-11-30 00:55:45 +00:00
|
|
|
if (test_bit(SOCK_PASSCRED, &sock->flags) && !u->addr
|
|
|
|
&& (err = unix_autobind(sock)) != 0)
|
2005-04-16 22:20:36 +00:00
|
|
|
goto out;
|
|
|
|
|
|
|
|
err = -EMSGSIZE;
|
|
|
|
if (len > sk->sk_sndbuf - 32)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
skb = sock_alloc_send_skb(sk, len, msg->msg_flags&MSG_DONTWAIT, &err);
|
2008-11-02 04:38:31 +00:00
|
|
|
if (skb == NULL)
|
2005-04-16 22:20:36 +00:00
|
|
|
goto out;
|
|
|
|
|
2010-06-13 03:34:33 +00:00
|
|
|
err = unix_scm_to_skb(siocb->scm, skb, true);
|
|
|
|
if (err)
|
|
|
|
goto out_free;
|
2006-08-02 21:12:06 +00:00
|
|
|
unix_get_secdata(siocb->scm, skb);
|
[AF_UNIX]: Datagram getpeersec
This patch implements an API whereby an application can determine the
label of its peer's Unix datagram sockets via the auxiliary data mechanism of
recvmsg.
Patch purpose:
This patch enables a security-aware application to retrieve the
security context of the peer of a Unix datagram socket. The application
can then use this security context to determine the security context for
processing on behalf of the peer who sent the packet.
Patch design and implementation:
The design and implementation is very similar to the UDP case for INET
sockets. Basically we build upon the existing Unix domain socket API for
retrieving user credentials. Linux offers the API for obtaining user
credentials via ancillary messages (i.e., out of band/control messages
that are bundled together with a normal message). To retrieve the security
context, the application first indicates to the kernel such desire by
setting the SO_PASSSEC option via getsockopt. Then the application
retrieves the security context using the auxiliary data mechanism.
An example server application for Unix datagram socket should look like this:
toggle = 1;
toggle_len = sizeof(toggle);
setsockopt(sockfd, SOL_SOCKET, SO_PASSSEC, &toggle, &toggle_len);
recvmsg(sockfd, &msg_hdr, 0);
if (msg_hdr.msg_controllen > sizeof(struct cmsghdr)) {
cmsg_hdr = CMSG_FIRSTHDR(&msg_hdr);
if (cmsg_hdr->cmsg_len <= CMSG_LEN(sizeof(scontext)) &&
cmsg_hdr->cmsg_level == SOL_SOCKET &&
cmsg_hdr->cmsg_type == SCM_SECURITY) {
memcpy(&scontext, CMSG_DATA(cmsg_hdr), sizeof(scontext));
}
}
sock_setsockopt is enhanced with a new socket option SOCK_PASSSEC to allow
a server socket to receive security context of the peer.
Testing:
We have tested the patch by setting up Unix datagram client and server
applications. We verified that the server can retrieve the security context
using the auxiliary data mechanism of recvmsg.
Signed-off-by: Catherine Zhang <cxzhang@watson.ibm.com>
Acked-by: Acked-by: James Morris <jmorris@namei.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2006-06-29 19:27:47 +00:00
|
|
|
|
2007-03-13 16:06:52 +00:00
|
|
|
skb_reset_transport_header(skb);
|
2008-11-17 06:58:44 +00:00
|
|
|
err = memcpy_fromiovec(skb_put(skb, len), msg->msg_iov, len);
|
2005-04-16 22:20:36 +00:00
|
|
|
if (err)
|
|
|
|
goto out_free;
|
|
|
|
|
|
|
|
timeo = sock_sndtimeo(sk, msg->msg_flags & MSG_DONTWAIT);
|
|
|
|
|
|
|
|
restart:
|
|
|
|
if (!other) {
|
|
|
|
err = -ECONNRESET;
|
|
|
|
if (sunaddr == NULL)
|
|
|
|
goto out_free;
|
|
|
|
|
2007-11-20 06:29:30 +00:00
|
|
|
other = unix_find_other(net, sunaddr, namelen, sk->sk_type,
|
2005-04-16 22:20:36 +00:00
|
|
|
hash, &err);
|
2008-11-02 04:38:31 +00:00
|
|
|
if (other == NULL)
|
2005-04-16 22:20:36 +00:00
|
|
|
goto out_free;
|
|
|
|
}
|
|
|
|
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_lock(other);
|
2005-04-16 22:20:36 +00:00
|
|
|
err = -EPERM;
|
|
|
|
if (!unix_may_send(sk, other))
|
|
|
|
goto out_unlock;
|
|
|
|
|
|
|
|
if (sock_flag(other, SOCK_DEAD)) {
|
|
|
|
/*
|
|
|
|
* Check with 1003.1g - what should
|
|
|
|
* datagram error
|
|
|
|
*/
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_unlock(other);
|
2005-04-16 22:20:36 +00:00
|
|
|
sock_put(other);
|
|
|
|
|
|
|
|
err = 0;
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_lock(sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
if (unix_peer(sk) == other) {
|
2008-11-02 04:38:31 +00:00
|
|
|
unix_peer(sk) = NULL;
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_unlock(sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
unix_dgram_disconnected(sk, other);
|
|
|
|
sock_put(other);
|
|
|
|
err = -ECONNREFUSED;
|
|
|
|
} else {
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_unlock(sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
other = NULL;
|
|
|
|
if (err)
|
|
|
|
goto out_free;
|
|
|
|
goto restart;
|
|
|
|
}
|
|
|
|
|
|
|
|
err = -EPIPE;
|
|
|
|
if (other->sk_shutdown & RCV_SHUTDOWN)
|
|
|
|
goto out_unlock;
|
|
|
|
|
|
|
|
if (sk->sk_type != SOCK_SEQPACKET) {
|
|
|
|
err = security_unix_may_send(sk->sk_socket, other->sk_socket);
|
|
|
|
if (err)
|
|
|
|
goto out_unlock;
|
|
|
|
}
|
|
|
|
|
2008-06-18 05:28:05 +00:00
|
|
|
if (unix_peer(other) != sk && unix_recvq_full(other)) {
|
2005-04-16 22:20:36 +00:00
|
|
|
if (!timeo) {
|
|
|
|
err = -EAGAIN;
|
|
|
|
goto out_unlock;
|
|
|
|
}
|
|
|
|
|
|
|
|
timeo = unix_wait_for_peer(other, timeo);
|
|
|
|
|
|
|
|
err = sock_intr_errno(timeo);
|
|
|
|
if (signal_pending(current))
|
|
|
|
goto out_free;
|
|
|
|
|
|
|
|
goto restart;
|
|
|
|
}
|
|
|
|
|
|
|
|
skb_queue_tail(&other->sk_receive_queue, skb);
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_unlock(other);
|
2005-04-16 22:20:36 +00:00
|
|
|
other->sk_data_ready(other, len);
|
|
|
|
sock_put(other);
|
|
|
|
scm_destroy(siocb->scm);
|
|
|
|
return len;
|
|
|
|
|
|
|
|
out_unlock:
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_unlock(other);
|
2005-04-16 22:20:36 +00:00
|
|
|
out_free:
|
|
|
|
kfree_skb(skb);
|
|
|
|
out:
|
|
|
|
if (other)
|
|
|
|
sock_put(other);
|
|
|
|
scm_destroy(siocb->scm);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2007-02-09 14:25:23 +00:00
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
static int unix_stream_sendmsg(struct kiocb *kiocb, struct socket *sock,
|
|
|
|
struct msghdr *msg, size_t len)
|
|
|
|
{
|
|
|
|
struct sock_iocb *siocb = kiocb_to_siocb(kiocb);
|
|
|
|
struct sock *sk = sock->sk;
|
|
|
|
struct sock *other = NULL;
|
2008-11-02 04:38:31 +00:00
|
|
|
struct sockaddr_un *sunaddr = msg->msg_name;
|
2008-11-17 06:58:44 +00:00
|
|
|
int err, size;
|
2005-04-16 22:20:36 +00:00
|
|
|
struct sk_buff *skb;
|
2008-11-02 04:38:31 +00:00
|
|
|
int sent = 0;
|
2005-04-16 22:20:36 +00:00
|
|
|
struct scm_cookie tmp_scm;
|
net: unix: fix sending fds in multiple buffers
Kalle Olavi Niemitalo reported that:
"..., when one process calls sendmsg once to send 43804 bytes of
data and one file descriptor, and another process then calls recvmsg
three times to receive the 16032+16032+11740 bytes, each of those
recvmsg calls returns the file descriptor in the ancillary data. I
confirmed this with strace. The behaviour differs from Linux
2.6.26, where reportedly only one of those recvmsg calls (I think
the first one) returned the file descriptor."
This bug was introduced by a patch from me titled "net: unix: fix inflight
counting bug in garbage collector", commit 6209344f5.
And the reason is, quoting Kalle:
"Before your patch, unix_attach_fds() would set scm->fp = NULL, so
that if the loop in unix_stream_sendmsg() ran multiple iterations,
it could not call unix_attach_fds() again. But now,
unix_attach_fds() leaves scm->fp unchanged, and I think this causes
it to be called multiple times and duplicate the same file
descriptors to each struct sk_buff."
Fix this by introducing a flag that is cleared at the start and set
when the fds attached to the first buffer. The resulting code should
work equivalently to the one on 2.6.26.
Reported-by: Kalle Olavi Niemitalo <kon@iki.fi>
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
Signed-off-by: David S. Miller <davem@davemloft.net>
2009-09-11 18:31:45 +00:00
|
|
|
bool fds_sent = false;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
if (NULL == siocb->scm)
|
|
|
|
siocb->scm = &tmp_scm;
|
2008-11-26 23:32:27 +00:00
|
|
|
wait_for_unix_gc();
|
2005-04-16 22:20:36 +00:00
|
|
|
err = scm_send(sock, msg, siocb->scm);
|
|
|
|
if (err < 0)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
err = -EOPNOTSUPP;
|
|
|
|
if (msg->msg_flags&MSG_OOB)
|
|
|
|
goto out_err;
|
|
|
|
|
|
|
|
if (msg->msg_namelen) {
|
|
|
|
err = sk->sk_state == TCP_ESTABLISHED ? -EISCONN : -EOPNOTSUPP;
|
|
|
|
goto out_err;
|
|
|
|
} else {
|
|
|
|
sunaddr = NULL;
|
|
|
|
err = -ENOTCONN;
|
2005-12-14 07:22:32 +00:00
|
|
|
other = unix_peer(sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
if (!other)
|
|
|
|
goto out_err;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sk->sk_shutdown & SEND_SHUTDOWN)
|
|
|
|
goto pipe_err;
|
|
|
|
|
2008-11-17 06:58:44 +00:00
|
|
|
while (sent < len) {
|
2005-04-16 22:20:36 +00:00
|
|
|
/*
|
2006-03-21 05:29:05 +00:00
|
|
|
* Optimisation for the fact that under 0.01% of X
|
|
|
|
* messages typically need breaking up.
|
2005-04-16 22:20:36 +00:00
|
|
|
*/
|
|
|
|
|
2006-03-21 05:29:05 +00:00
|
|
|
size = len-sent;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
/* Keep two messages in the pipe so it schedules better */
|
2006-03-21 05:29:05 +00:00
|
|
|
if (size > ((sk->sk_sndbuf >> 1) - 64))
|
|
|
|
size = (sk->sk_sndbuf >> 1) - 64;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
if (size > SKB_MAX_ALLOC)
|
|
|
|
size = SKB_MAX_ALLOC;
|
2007-02-09 14:25:23 +00:00
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
/*
|
|
|
|
* Grab a buffer
|
|
|
|
*/
|
2007-02-09 14:25:23 +00:00
|
|
|
|
2008-11-17 06:58:44 +00:00
|
|
|
skb = sock_alloc_send_skb(sk, size, msg->msg_flags&MSG_DONTWAIT,
|
|
|
|
&err);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2008-11-02 04:38:31 +00:00
|
|
|
if (skb == NULL)
|
2005-04-16 22:20:36 +00:00
|
|
|
goto out_err;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If you pass two values to the sock_alloc_send_skb
|
|
|
|
* it tries to grab the large buffer with GFP_NOFS
|
|
|
|
* (which can fail easily), and if it fails grab the
|
|
|
|
* fallback size buffer which is under a page and will
|
|
|
|
* succeed. [Alan]
|
|
|
|
*/
|
|
|
|
size = min_t(int, size, skb_tailroom(skb));
|
|
|
|
|
2010-06-13 03:34:33 +00:00
|
|
|
|
net: unix: fix sending fds in multiple buffers
Kalle Olavi Niemitalo reported that:
"..., when one process calls sendmsg once to send 43804 bytes of
data and one file descriptor, and another process then calls recvmsg
three times to receive the 16032+16032+11740 bytes, each of those
recvmsg calls returns the file descriptor in the ancillary data. I
confirmed this with strace. The behaviour differs from Linux
2.6.26, where reportedly only one of those recvmsg calls (I think
the first one) returned the file descriptor."
This bug was introduced by a patch from me titled "net: unix: fix inflight
counting bug in garbage collector", commit 6209344f5.
And the reason is, quoting Kalle:
"Before your patch, unix_attach_fds() would set scm->fp = NULL, so
that if the loop in unix_stream_sendmsg() ran multiple iterations,
it could not call unix_attach_fds() again. But now,
unix_attach_fds() leaves scm->fp unchanged, and I think this causes
it to be called multiple times and duplicate the same file
descriptors to each struct sk_buff."
Fix this by introducing a flag that is cleared at the start and set
when the fds attached to the first buffer. The resulting code should
work equivalently to the one on 2.6.26.
Reported-by: Kalle Olavi Niemitalo <kon@iki.fi>
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
Signed-off-by: David S. Miller <davem@davemloft.net>
2009-09-11 18:31:45 +00:00
|
|
|
/* Only send the fds in the first buffer */
|
2010-06-13 03:34:33 +00:00
|
|
|
err = unix_scm_to_skb(siocb->scm, skb, !fds_sent);
|
|
|
|
if (err) {
|
|
|
|
kfree_skb(skb);
|
|
|
|
goto out_err;
|
2008-11-09 14:23:57 +00:00
|
|
|
}
|
2010-06-13 03:34:33 +00:00
|
|
|
fds_sent = true;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2008-11-17 06:58:44 +00:00
|
|
|
err = memcpy_fromiovec(skb_put(skb, size), msg->msg_iov, size);
|
|
|
|
if (err) {
|
2005-04-16 22:20:36 +00:00
|
|
|
kfree_skb(skb);
|
|
|
|
goto out_err;
|
|
|
|
}
|
|
|
|
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_lock(other);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
if (sock_flag(other, SOCK_DEAD) ||
|
|
|
|
(other->sk_shutdown & RCV_SHUTDOWN))
|
|
|
|
goto pipe_err_free;
|
|
|
|
|
|
|
|
skb_queue_tail(&other->sk_receive_queue, skb);
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_unlock(other);
|
2005-04-16 22:20:36 +00:00
|
|
|
other->sk_data_ready(other, size);
|
2008-11-02 04:38:31 +00:00
|
|
|
sent += size;
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
scm_destroy(siocb->scm);
|
|
|
|
siocb->scm = NULL;
|
|
|
|
|
|
|
|
return sent;
|
|
|
|
|
|
|
|
pipe_err_free:
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_unlock(other);
|
2005-04-16 22:20:36 +00:00
|
|
|
kfree_skb(skb);
|
|
|
|
pipe_err:
|
2008-11-17 06:58:44 +00:00
|
|
|
if (sent == 0 && !(msg->msg_flags&MSG_NOSIGNAL))
|
|
|
|
send_sig(SIGPIPE, current, 0);
|
2005-04-16 22:20:36 +00:00
|
|
|
err = -EPIPE;
|
|
|
|
out_err:
|
|
|
|
scm_destroy(siocb->scm);
|
|
|
|
siocb->scm = NULL;
|
|
|
|
return sent ? : err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int unix_seqpacket_sendmsg(struct kiocb *kiocb, struct socket *sock,
|
|
|
|
struct msghdr *msg, size_t len)
|
|
|
|
{
|
|
|
|
int err;
|
|
|
|
struct sock *sk = sock->sk;
|
2007-02-09 14:25:23 +00:00
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
err = sock_error(sk);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
if (sk->sk_state != TCP_ESTABLISHED)
|
|
|
|
return -ENOTCONN;
|
|
|
|
|
|
|
|
if (msg->msg_namelen)
|
|
|
|
msg->msg_namelen = 0;
|
|
|
|
|
|
|
|
return unix_dgram_sendmsg(kiocb, sock, msg, len);
|
|
|
|
}
|
2007-02-09 14:25:23 +00:00
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
static void unix_copy_addr(struct msghdr *msg, struct sock *sk)
|
|
|
|
{
|
|
|
|
struct unix_sock *u = unix_sk(sk);
|
|
|
|
|
|
|
|
msg->msg_namelen = 0;
|
|
|
|
if (u->addr) {
|
|
|
|
msg->msg_namelen = u->addr->len;
|
|
|
|
memcpy(msg->msg_name, u->addr->name, u->addr->len);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int unix_dgram_recvmsg(struct kiocb *iocb, struct socket *sock,
|
|
|
|
struct msghdr *msg, size_t size,
|
|
|
|
int flags)
|
|
|
|
{
|
|
|
|
struct sock_iocb *siocb = kiocb_to_siocb(iocb);
|
|
|
|
struct scm_cookie tmp_scm;
|
|
|
|
struct sock *sk = sock->sk;
|
|
|
|
struct unix_sock *u = unix_sk(sk);
|
|
|
|
int noblock = flags & MSG_DONTWAIT;
|
|
|
|
struct sk_buff *skb;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
err = -EOPNOTSUPP;
|
|
|
|
if (flags&MSG_OOB)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
msg->msg_namelen = 0;
|
|
|
|
|
2006-03-21 06:35:41 +00:00
|
|
|
mutex_lock(&u->readlock);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
skb = skb_recv_datagram(sk, flags, noblock, &err);
|
[UNIX]: EOF on non-blocking SOCK_SEQPACKET
I am not absolutely sure whether this actually is a bug (as in: I've got
no clue what the standards say or what other implementations do), but at
least I was pretty surprised when I noticed that a recv() on a
non-blocking unix domain socket of type SOCK_SEQPACKET (which is connection
oriented, after all) where the remote end has closed the connection
returned -1 (EAGAIN) rather than 0 to indicate end of file.
This is a test case:
| #include <sys/types.h>
| #include <unistd.h>
| #include <sys/socket.h>
| #include <sys/un.h>
| #include <fcntl.h>
| #include <string.h>
| #include <stdlib.h>
|
| int main(){
| int sock;
| struct sockaddr_un addr;
| char buf[4096];
| int pfds[2];
|
| pipe(pfds);
| sock=socket(PF_UNIX,SOCK_SEQPACKET,0);
| addr.sun_family=AF_UNIX;
| strcpy(addr.sun_path,"/tmp/foobar_testsock");
| bind(sock,(struct sockaddr *)&addr,sizeof(addr));
| listen(sock,1);
| if(fork()){
| close(sock);
| sock=socket(PF_UNIX,SOCK_SEQPACKET,0);
| connect(sock,(struct sockaddr *)&addr,sizeof(addr));
| fcntl(sock,F_SETFL,fcntl(sock,F_GETFL)|O_NONBLOCK);
| close(pfds[1]);
| read(pfds[0],buf,sizeof(buf));
| recv(sock,buf,sizeof(buf),0); // <-- this one
| }else accept(sock,NULL,NULL);
| exit(0);
| }
If you try it, make sure /tmp/foobar_testsock doesn't exist.
The marked recv() returns -1 (EAGAIN) on 2.6.23.9. Below you find a
patch that fixes that.
Signed-off-by: Florian Zumbiehl <florz@florz.de>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2007-11-29 12:19:23 +00:00
|
|
|
if (!skb) {
|
|
|
|
unix_state_lock(sk);
|
|
|
|
/* Signal EOF on disconnected non-blocking SEQPACKET socket. */
|
|
|
|
if (sk->sk_type == SOCK_SEQPACKET && err == -EAGAIN &&
|
|
|
|
(sk->sk_shutdown & RCV_SHUTDOWN))
|
|
|
|
err = 0;
|
|
|
|
unix_state_unlock(sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
goto out_unlock;
|
[UNIX]: EOF on non-blocking SOCK_SEQPACKET
I am not absolutely sure whether this actually is a bug (as in: I've got
no clue what the standards say or what other implementations do), but at
least I was pretty surprised when I noticed that a recv() on a
non-blocking unix domain socket of type SOCK_SEQPACKET (which is connection
oriented, after all) where the remote end has closed the connection
returned -1 (EAGAIN) rather than 0 to indicate end of file.
This is a test case:
| #include <sys/types.h>
| #include <unistd.h>
| #include <sys/socket.h>
| #include <sys/un.h>
| #include <fcntl.h>
| #include <string.h>
| #include <stdlib.h>
|
| int main(){
| int sock;
| struct sockaddr_un addr;
| char buf[4096];
| int pfds[2];
|
| pipe(pfds);
| sock=socket(PF_UNIX,SOCK_SEQPACKET,0);
| addr.sun_family=AF_UNIX;
| strcpy(addr.sun_path,"/tmp/foobar_testsock");
| bind(sock,(struct sockaddr *)&addr,sizeof(addr));
| listen(sock,1);
| if(fork()){
| close(sock);
| sock=socket(PF_UNIX,SOCK_SEQPACKET,0);
| connect(sock,(struct sockaddr *)&addr,sizeof(addr));
| fcntl(sock,F_SETFL,fcntl(sock,F_GETFL)|O_NONBLOCK);
| close(pfds[1]);
| read(pfds[0],buf,sizeof(buf));
| recv(sock,buf,sizeof(buf),0); // <-- this one
| }else accept(sock,NULL,NULL);
| exit(0);
| }
If you try it, make sure /tmp/foobar_testsock doesn't exist.
The marked recv() returns -1 (EAGAIN) on 2.6.23.9. Below you find a
patch that fixes that.
Signed-off-by: Florian Zumbiehl <florz@florz.de>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2007-11-29 12:19:23 +00:00
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2007-10-15 15:00:19 +00:00
|
|
|
wake_up_interruptible_sync(&u->peer_wait);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
if (msg->msg_name)
|
|
|
|
unix_copy_addr(msg, skb->sk);
|
|
|
|
|
|
|
|
if (size > skb->len)
|
|
|
|
size = skb->len;
|
|
|
|
else if (size < skb->len)
|
|
|
|
msg->msg_flags |= MSG_TRUNC;
|
|
|
|
|
|
|
|
err = skb_copy_datagram_iovec(skb, 0, msg->msg_iov, size);
|
|
|
|
if (err)
|
|
|
|
goto out_free;
|
|
|
|
|
|
|
|
if (!siocb->scm) {
|
|
|
|
siocb->scm = &tmp_scm;
|
|
|
|
memset(&tmp_scm, 0, sizeof(tmp_scm));
|
|
|
|
}
|
2010-06-13 03:34:33 +00:00
|
|
|
scm_set_cred(siocb->scm, UNIXCB(skb).pid, UNIXCB(skb).cred);
|
[AF_UNIX]: Datagram getpeersec
This patch implements an API whereby an application can determine the
label of its peer's Unix datagram sockets via the auxiliary data mechanism of
recvmsg.
Patch purpose:
This patch enables a security-aware application to retrieve the
security context of the peer of a Unix datagram socket. The application
can then use this security context to determine the security context for
processing on behalf of the peer who sent the packet.
Patch design and implementation:
The design and implementation is very similar to the UDP case for INET
sockets. Basically we build upon the existing Unix domain socket API for
retrieving user credentials. Linux offers the API for obtaining user
credentials via ancillary messages (i.e., out of band/control messages
that are bundled together with a normal message). To retrieve the security
context, the application first indicates to the kernel such desire by
setting the SO_PASSSEC option via getsockopt. Then the application
retrieves the security context using the auxiliary data mechanism.
An example server application for Unix datagram socket should look like this:
toggle = 1;
toggle_len = sizeof(toggle);
setsockopt(sockfd, SOL_SOCKET, SO_PASSSEC, &toggle, &toggle_len);
recvmsg(sockfd, &msg_hdr, 0);
if (msg_hdr.msg_controllen > sizeof(struct cmsghdr)) {
cmsg_hdr = CMSG_FIRSTHDR(&msg_hdr);
if (cmsg_hdr->cmsg_len <= CMSG_LEN(sizeof(scontext)) &&
cmsg_hdr->cmsg_level == SOL_SOCKET &&
cmsg_hdr->cmsg_type == SCM_SECURITY) {
memcpy(&scontext, CMSG_DATA(cmsg_hdr), sizeof(scontext));
}
}
sock_setsockopt is enhanced with a new socket option SOCK_PASSSEC to allow
a server socket to receive security context of the peer.
Testing:
We have tested the patch by setting up Unix datagram client and server
applications. We verified that the server can retrieve the security context
using the auxiliary data mechanism of recvmsg.
Signed-off-by: Catherine Zhang <cxzhang@watson.ibm.com>
Acked-by: Acked-by: James Morris <jmorris@namei.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2006-06-29 19:27:47 +00:00
|
|
|
unix_set_secdata(siocb->scm, skb);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2008-11-17 06:58:44 +00:00
|
|
|
if (!(flags & MSG_PEEK)) {
|
2005-04-16 22:20:36 +00:00
|
|
|
if (UNIXCB(skb).fp)
|
|
|
|
unix_detach_fds(siocb->scm, skb);
|
2008-11-17 06:58:44 +00:00
|
|
|
} else {
|
2005-04-16 22:20:36 +00:00
|
|
|
/* It is questionable: on PEEK we could:
|
|
|
|
- do not return fds - good, but too simple 8)
|
|
|
|
- return fds, and do not return them on read (old strategy,
|
|
|
|
apparently wrong)
|
|
|
|
- clone fds (I chose it for now, it is the most universal
|
|
|
|
solution)
|
2007-02-09 14:25:23 +00:00
|
|
|
|
|
|
|
POSIX 1003.1g does not actually define this clearly
|
|
|
|
at all. POSIX 1003.1g doesn't define a lot of things
|
|
|
|
clearly however!
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
*/
|
|
|
|
if (UNIXCB(skb).fp)
|
|
|
|
siocb->scm->fp = scm_fp_dup(UNIXCB(skb).fp);
|
|
|
|
}
|
|
|
|
err = size;
|
|
|
|
|
|
|
|
scm_recv(sock, msg, siocb->scm, flags);
|
|
|
|
|
|
|
|
out_free:
|
2008-11-17 06:58:44 +00:00
|
|
|
skb_free_datagram(sk, skb);
|
2005-04-16 22:20:36 +00:00
|
|
|
out_unlock:
|
2006-03-21 06:35:41 +00:00
|
|
|
mutex_unlock(&u->readlock);
|
2005-04-16 22:20:36 +00:00
|
|
|
out:
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Sleep until data has arrive. But check for races..
|
|
|
|
*/
|
2007-02-09 14:25:23 +00:00
|
|
|
|
2008-11-17 06:58:44 +00:00
|
|
|
static long unix_stream_data_wait(struct sock *sk, long timeo)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
|
|
|
DEFINE_WAIT(wait);
|
|
|
|
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_lock(sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
for (;;) {
|
2010-04-20 13:03:51 +00:00
|
|
|
prepare_to_wait(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2005-07-08 21:57:23 +00:00
|
|
|
if (!skb_queue_empty(&sk->sk_receive_queue) ||
|
2005-04-16 22:20:36 +00:00
|
|
|
sk->sk_err ||
|
|
|
|
(sk->sk_shutdown & RCV_SHUTDOWN) ||
|
|
|
|
signal_pending(current) ||
|
|
|
|
!timeo)
|
|
|
|
break;
|
|
|
|
|
|
|
|
set_bit(SOCK_ASYNC_WAITDATA, &sk->sk_socket->flags);
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_unlock(sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
timeo = schedule_timeout(timeo);
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_lock(sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
clear_bit(SOCK_ASYNC_WAITDATA, &sk->sk_socket->flags);
|
|
|
|
}
|
|
|
|
|
2010-04-20 13:03:51 +00:00
|
|
|
finish_wait(sk_sleep(sk), &wait);
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_unlock(sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
return timeo;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
static int unix_stream_recvmsg(struct kiocb *iocb, struct socket *sock,
|
|
|
|
struct msghdr *msg, size_t size,
|
|
|
|
int flags)
|
|
|
|
{
|
|
|
|
struct sock_iocb *siocb = kiocb_to_siocb(iocb);
|
|
|
|
struct scm_cookie tmp_scm;
|
|
|
|
struct sock *sk = sock->sk;
|
|
|
|
struct unix_sock *u = unix_sk(sk);
|
2008-11-02 04:38:31 +00:00
|
|
|
struct sockaddr_un *sunaddr = msg->msg_name;
|
2005-04-16 22:20:36 +00:00
|
|
|
int copied = 0;
|
|
|
|
int check_creds = 0;
|
|
|
|
int target;
|
|
|
|
int err = 0;
|
|
|
|
long timeo;
|
|
|
|
|
|
|
|
err = -EINVAL;
|
|
|
|
if (sk->sk_state != TCP_ESTABLISHED)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
err = -EOPNOTSUPP;
|
|
|
|
if (flags&MSG_OOB)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
target = sock_rcvlowat(sk, flags&MSG_WAITALL, size);
|
|
|
|
timeo = sock_rcvtimeo(sk, flags&MSG_DONTWAIT);
|
|
|
|
|
|
|
|
msg->msg_namelen = 0;
|
|
|
|
|
|
|
|
/* Lock the socket to prevent queue disordering
|
|
|
|
* while sleeps in memcpy_tomsg
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (!siocb->scm) {
|
|
|
|
siocb->scm = &tmp_scm;
|
|
|
|
memset(&tmp_scm, 0, sizeof(tmp_scm));
|
|
|
|
}
|
|
|
|
|
2006-03-21 06:35:41 +00:00
|
|
|
mutex_lock(&u->readlock);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
2008-11-17 06:58:44 +00:00
|
|
|
do {
|
2005-04-16 22:20:36 +00:00
|
|
|
int chunk;
|
|
|
|
struct sk_buff *skb;
|
|
|
|
|
2007-06-05 20:10:29 +00:00
|
|
|
unix_state_lock(sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
skb = skb_dequeue(&sk->sk_receive_queue);
|
2008-11-17 06:58:44 +00:00
|
|
|
if (skb == NULL) {
|
2005-04-16 22:20:36 +00:00
|
|
|
if (copied >= target)
|
2007-06-05 20:10:29 +00:00
|
|
|
goto unlock;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* POSIX 1003.1g mandates this order.
|
|
|
|
*/
|
2007-02-09 14:25:23 +00:00
|
|
|
|
2008-11-17 06:58:44 +00:00
|
|
|
err = sock_error(sk);
|
|
|
|
if (err)
|
2007-06-05 20:10:29 +00:00
|
|
|
goto unlock;
|
2005-04-16 22:20:36 +00:00
|
|
|
if (sk->sk_shutdown & RCV_SHUTDOWN)
|
2007-06-05 20:10:29 +00:00
|
|
|
goto unlock;
|
|
|
|
|
|
|
|
unix_state_unlock(sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
err = -EAGAIN;
|
|
|
|
if (!timeo)
|
|
|
|
break;
|
2006-03-21 06:35:41 +00:00
|
|
|
mutex_unlock(&u->readlock);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
timeo = unix_stream_data_wait(sk, timeo);
|
|
|
|
|
|
|
|
if (signal_pending(current)) {
|
|
|
|
err = sock_intr_errno(timeo);
|
|
|
|
goto out;
|
|
|
|
}
|
2006-03-21 06:35:41 +00:00
|
|
|
mutex_lock(&u->readlock);
|
2005-04-16 22:20:36 +00:00
|
|
|
continue;
|
2007-06-05 20:10:29 +00:00
|
|
|
unlock:
|
|
|
|
unix_state_unlock(sk);
|
|
|
|
break;
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
2007-06-05 20:10:29 +00:00
|
|
|
unix_state_unlock(sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
if (check_creds) {
|
|
|
|
/* Never glue messages from different writers */
|
2010-06-13 03:34:33 +00:00
|
|
|
if ((UNIXCB(skb).pid != siocb->scm->pid) ||
|
|
|
|
(UNIXCB(skb).cred != siocb->scm->cred)) {
|
2005-04-16 22:20:36 +00:00
|
|
|
skb_queue_head(&sk->sk_receive_queue, skb);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/* Copy credentials */
|
2010-06-13 03:34:33 +00:00
|
|
|
scm_set_cred(siocb->scm, UNIXCB(skb).pid, UNIXCB(skb).cred);
|
2005-04-16 22:20:36 +00:00
|
|
|
check_creds = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Copy address just once */
|
2008-11-17 06:58:44 +00:00
|
|
|
if (sunaddr) {
|
2005-04-16 22:20:36 +00:00
|
|
|
unix_copy_addr(msg, skb->sk);
|
|
|
|
sunaddr = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
chunk = min_t(unsigned int, skb->len, size);
|
|
|
|
if (memcpy_toiovec(msg->msg_iov, skb->data, chunk)) {
|
|
|
|
skb_queue_head(&sk->sk_receive_queue, skb);
|
|
|
|
if (copied == 0)
|
|
|
|
copied = -EFAULT;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
copied += chunk;
|
|
|
|
size -= chunk;
|
|
|
|
|
|
|
|
/* Mark read part of skb as used */
|
2008-11-17 06:58:44 +00:00
|
|
|
if (!(flags & MSG_PEEK)) {
|
2005-04-16 22:20:36 +00:00
|
|
|
skb_pull(skb, chunk);
|
|
|
|
|
|
|
|
if (UNIXCB(skb).fp)
|
|
|
|
unix_detach_fds(siocb->scm, skb);
|
|
|
|
|
|
|
|
/* put the skb back if we didn't use it up.. */
|
2008-11-17 06:58:44 +00:00
|
|
|
if (skb->len) {
|
2005-04-16 22:20:36 +00:00
|
|
|
skb_queue_head(&sk->sk_receive_queue, skb);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2010-07-20 06:45:56 +00:00
|
|
|
consume_skb(skb);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
if (siocb->scm->fp)
|
|
|
|
break;
|
2008-11-17 06:58:44 +00:00
|
|
|
} else {
|
2005-04-16 22:20:36 +00:00
|
|
|
/* It is questionable, see note in unix_dgram_recvmsg.
|
|
|
|
*/
|
|
|
|
if (UNIXCB(skb).fp)
|
|
|
|
siocb->scm->fp = scm_fp_dup(UNIXCB(skb).fp);
|
|
|
|
|
|
|
|
/* put message back and return */
|
|
|
|
skb_queue_head(&sk->sk_receive_queue, skb);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} while (size);
|
|
|
|
|
2006-03-21 06:35:41 +00:00
|
|
|
mutex_unlock(&u->readlock);
|
2005-04-16 22:20:36 +00:00
|
|
|
scm_recv(sock, msg, siocb->scm, flags);
|
|
|
|
out:
|
|
|
|
return copied ? : err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int unix_shutdown(struct socket *sock, int mode)
|
|
|
|
{
|
|
|
|
struct sock *sk = sock->sk;
|
|
|
|
struct sock *other;
|
|
|
|
|
|
|
|
mode = (mode+1)&(RCV_SHUTDOWN|SEND_SHUTDOWN);
|
|
|
|
|
|
|
|
if (mode) {
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_lock(sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
sk->sk_shutdown |= mode;
|
2008-11-02 04:38:31 +00:00
|
|
|
other = unix_peer(sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
if (other)
|
|
|
|
sock_hold(other);
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_unlock(sk);
|
2005-04-16 22:20:36 +00:00
|
|
|
sk->sk_state_change(sk);
|
|
|
|
|
|
|
|
if (other &&
|
|
|
|
(sk->sk_type == SOCK_STREAM || sk->sk_type == SOCK_SEQPACKET)) {
|
|
|
|
|
|
|
|
int peer_mode = 0;
|
|
|
|
|
|
|
|
if (mode&RCV_SHUTDOWN)
|
|
|
|
peer_mode |= SEND_SHUTDOWN;
|
|
|
|
if (mode&SEND_SHUTDOWN)
|
|
|
|
peer_mode |= RCV_SHUTDOWN;
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_lock(other);
|
2005-04-16 22:20:36 +00:00
|
|
|
other->sk_shutdown |= peer_mode;
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_unlock(other);
|
2005-04-16 22:20:36 +00:00
|
|
|
other->sk_state_change(other);
|
|
|
|
if (peer_mode == SHUTDOWN_MASK)
|
2007-11-26 12:10:50 +00:00
|
|
|
sk_wake_async(other, SOCK_WAKE_WAITD, POLL_HUP);
|
2005-04-16 22:20:36 +00:00
|
|
|
else if (peer_mode & RCV_SHUTDOWN)
|
2007-11-26 12:10:50 +00:00
|
|
|
sk_wake_async(other, SOCK_WAKE_WAITD, POLL_IN);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
if (other)
|
|
|
|
sock_put(other);
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int unix_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg)
|
|
|
|
{
|
|
|
|
struct sock *sk = sock->sk;
|
2008-11-02 04:38:31 +00:00
|
|
|
long amount = 0;
|
2005-04-16 22:20:36 +00:00
|
|
|
int err;
|
|
|
|
|
2008-11-17 06:58:44 +00:00
|
|
|
switch (cmd) {
|
|
|
|
case SIOCOUTQ:
|
2009-06-18 02:05:41 +00:00
|
|
|
amount = sk_wmem_alloc_get(sk);
|
2008-11-17 06:58:44 +00:00
|
|
|
err = put_user(amount, (int __user *)arg);
|
|
|
|
break;
|
|
|
|
case SIOCINQ:
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
|
|
|
struct sk_buff *skb;
|
|
|
|
|
|
|
|
if (sk->sk_state == TCP_LISTEN) {
|
|
|
|
err = -EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
spin_lock(&sk->sk_receive_queue.lock);
|
|
|
|
if (sk->sk_type == SOCK_STREAM ||
|
|
|
|
sk->sk_type == SOCK_SEQPACKET) {
|
|
|
|
skb_queue_walk(&sk->sk_receive_queue, skb)
|
|
|
|
amount += skb->len;
|
|
|
|
} else {
|
|
|
|
skb = skb_peek(&sk->sk_receive_queue);
|
|
|
|
if (skb)
|
2008-11-02 04:38:31 +00:00
|
|
|
amount = skb->len;
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
spin_unlock(&sk->sk_receive_queue.lock);
|
|
|
|
err = put_user(amount, (int __user *)arg);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2008-11-17 06:58:44 +00:00
|
|
|
default:
|
|
|
|
err = -ENOIOCTLCMD;
|
|
|
|
break;
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2008-11-17 06:58:44 +00:00
|
|
|
static unsigned int unix_poll(struct file *file, struct socket *sock, poll_table *wait)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
|
|
|
struct sock *sk = sock->sk;
|
|
|
|
unsigned int mask;
|
|
|
|
|
2010-04-20 13:03:51 +00:00
|
|
|
sock_poll_wait(file, sk_sleep(sk), wait);
|
2005-04-16 22:20:36 +00:00
|
|
|
mask = 0;
|
|
|
|
|
|
|
|
/* exceptional events? */
|
|
|
|
if (sk->sk_err)
|
|
|
|
mask |= POLLERR;
|
|
|
|
if (sk->sk_shutdown == SHUTDOWN_MASK)
|
|
|
|
mask |= POLLHUP;
|
2006-03-25 11:07:39 +00:00
|
|
|
if (sk->sk_shutdown & RCV_SHUTDOWN)
|
|
|
|
mask |= POLLRDHUP;
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
/* readable? */
|
|
|
|
if (!skb_queue_empty(&sk->sk_receive_queue) ||
|
|
|
|
(sk->sk_shutdown & RCV_SHUTDOWN))
|
|
|
|
mask |= POLLIN | POLLRDNORM;
|
|
|
|
|
|
|
|
/* Connection-based need to check for termination and startup */
|
2008-11-17 06:58:44 +00:00
|
|
|
if ((sk->sk_type == SOCK_STREAM || sk->sk_type == SOCK_SEQPACKET) &&
|
|
|
|
sk->sk_state == TCP_CLOSE)
|
2005-04-16 22:20:36 +00:00
|
|
|
mask |= POLLHUP;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* we set writable also when the other side has shut down the
|
|
|
|
* connection. This prevents stuck sockets.
|
|
|
|
*/
|
|
|
|
if (unix_writable(sk))
|
|
|
|
mask |= POLLOUT | POLLWRNORM | POLLWRBAND;
|
|
|
|
|
|
|
|
return mask;
|
|
|
|
}
|
|
|
|
|
af_unix: fix 'poll for write'/connected DGRAM sockets
For n:1 'datagram connections' (eg /dev/log), the unix_dgram_sendmsg
routine implements a form of receiver-imposed flow control by
comparing the length of the receive queue of the 'peer socket' with
the max_ack_backlog value stored in the corresponding sock structure,
either blocking the thread which caused the send-routine to be called
or returning EAGAIN. This routine is used by both SOCK_DGRAM and
SOCK_SEQPACKET sockets. The poll-implementation for these socket types
is datagram_poll from core/datagram.c. A socket is deemed to be
writeable by this routine when the memory presently consumed by
datagrams owned by it is less than the configured socket send buffer
size. This is always wrong for PF_UNIX non-stream sockets connected to
server sockets dealing with (potentially) multiple clients if the
abovementioned receive queue is currently considered to be full.
'poll' will then return, indicating that the socket is writeable, but
a subsequent write result in EAGAIN, effectively causing an (usual)
application to 'poll for writeability by repeated send request with
O_NONBLOCK set' until it has consumed its time quantum.
The change below uses a suitably modified variant of the datagram_poll
routines for both type of PF_UNIX sockets, which tests if the
recv-queue of the peer a socket is connected to is presently
considered to be 'full' as part of the 'is this socket
writeable'-checking code. The socket being polled is additionally
put onto the peer_wait wait queue associated with its peer, because the
unix_dgram_recvmsg routine does a wake up on this queue after a
datagram was received and the 'other wakeup call' is done implicitly
as part of skb destruction, meaning, a process blocked in poll
because of a full peer receive queue could otherwise sleep forever
if no datagram owned by its socket was already sitting on this queue.
Among this change is a small (inline) helper routine named
'unix_recvq_full', which consolidates the actual testing code (in three
different places) into a single location.
Signed-off-by: Rainer Weikusat <rweikusat@mssgmbh.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2008-06-28 02:34:18 +00:00
|
|
|
static unsigned int unix_dgram_poll(struct file *file, struct socket *sock,
|
|
|
|
poll_table *wait)
|
2008-06-18 05:28:05 +00:00
|
|
|
{
|
af_unix: fix 'poll for write'/connected DGRAM sockets
For n:1 'datagram connections' (eg /dev/log), the unix_dgram_sendmsg
routine implements a form of receiver-imposed flow control by
comparing the length of the receive queue of the 'peer socket' with
the max_ack_backlog value stored in the corresponding sock structure,
either blocking the thread which caused the send-routine to be called
or returning EAGAIN. This routine is used by both SOCK_DGRAM and
SOCK_SEQPACKET sockets. The poll-implementation for these socket types
is datagram_poll from core/datagram.c. A socket is deemed to be
writeable by this routine when the memory presently consumed by
datagrams owned by it is less than the configured socket send buffer
size. This is always wrong for PF_UNIX non-stream sockets connected to
server sockets dealing with (potentially) multiple clients if the
abovementioned receive queue is currently considered to be full.
'poll' will then return, indicating that the socket is writeable, but
a subsequent write result in EAGAIN, effectively causing an (usual)
application to 'poll for writeability by repeated send request with
O_NONBLOCK set' until it has consumed its time quantum.
The change below uses a suitably modified variant of the datagram_poll
routines for both type of PF_UNIX sockets, which tests if the
recv-queue of the peer a socket is connected to is presently
considered to be 'full' as part of the 'is this socket
writeable'-checking code. The socket being polled is additionally
put onto the peer_wait wait queue associated with its peer, because the
unix_dgram_recvmsg routine does a wake up on this queue after a
datagram was received and the 'other wakeup call' is done implicitly
as part of skb destruction, meaning, a process blocked in poll
because of a full peer receive queue could otherwise sleep forever
if no datagram owned by its socket was already sitting on this queue.
Among this change is a small (inline) helper routine named
'unix_recvq_full', which consolidates the actual testing code (in three
different places) into a single location.
Signed-off-by: Rainer Weikusat <rweikusat@mssgmbh.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2008-06-28 02:34:18 +00:00
|
|
|
struct sock *sk = sock->sk, *other;
|
|
|
|
unsigned int mask, writable;
|
2008-06-18 05:28:05 +00:00
|
|
|
|
2010-04-20 13:03:51 +00:00
|
|
|
sock_poll_wait(file, sk_sleep(sk), wait);
|
2008-06-18 05:28:05 +00:00
|
|
|
mask = 0;
|
|
|
|
|
|
|
|
/* exceptional events? */
|
|
|
|
if (sk->sk_err || !skb_queue_empty(&sk->sk_error_queue))
|
|
|
|
mask |= POLLERR;
|
|
|
|
if (sk->sk_shutdown & RCV_SHUTDOWN)
|
|
|
|
mask |= POLLRDHUP;
|
|
|
|
if (sk->sk_shutdown == SHUTDOWN_MASK)
|
|
|
|
mask |= POLLHUP;
|
|
|
|
|
|
|
|
/* readable? */
|
|
|
|
if (!skb_queue_empty(&sk->sk_receive_queue) ||
|
|
|
|
(sk->sk_shutdown & RCV_SHUTDOWN))
|
|
|
|
mask |= POLLIN | POLLRDNORM;
|
|
|
|
|
|
|
|
/* Connection-based need to check for termination and startup */
|
|
|
|
if (sk->sk_type == SOCK_SEQPACKET) {
|
|
|
|
if (sk->sk_state == TCP_CLOSE)
|
|
|
|
mask |= POLLHUP;
|
|
|
|
/* connection hasn't started yet? */
|
|
|
|
if (sk->sk_state == TCP_SYN_SENT)
|
|
|
|
return mask;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* writable? */
|
af_unix: fix 'poll for write'/connected DGRAM sockets
For n:1 'datagram connections' (eg /dev/log), the unix_dgram_sendmsg
routine implements a form of receiver-imposed flow control by
comparing the length of the receive queue of the 'peer socket' with
the max_ack_backlog value stored in the corresponding sock structure,
either blocking the thread which caused the send-routine to be called
or returning EAGAIN. This routine is used by both SOCK_DGRAM and
SOCK_SEQPACKET sockets. The poll-implementation for these socket types
is datagram_poll from core/datagram.c. A socket is deemed to be
writeable by this routine when the memory presently consumed by
datagrams owned by it is less than the configured socket send buffer
size. This is always wrong for PF_UNIX non-stream sockets connected to
server sockets dealing with (potentially) multiple clients if the
abovementioned receive queue is currently considered to be full.
'poll' will then return, indicating that the socket is writeable, but
a subsequent write result in EAGAIN, effectively causing an (usual)
application to 'poll for writeability by repeated send request with
O_NONBLOCK set' until it has consumed its time quantum.
The change below uses a suitably modified variant of the datagram_poll
routines for both type of PF_UNIX sockets, which tests if the
recv-queue of the peer a socket is connected to is presently
considered to be 'full' as part of the 'is this socket
writeable'-checking code. The socket being polled is additionally
put onto the peer_wait wait queue associated with its peer, because the
unix_dgram_recvmsg routine does a wake up on this queue after a
datagram was received and the 'other wakeup call' is done implicitly
as part of skb destruction, meaning, a process blocked in poll
because of a full peer receive queue could otherwise sleep forever
if no datagram owned by its socket was already sitting on this queue.
Among this change is a small (inline) helper routine named
'unix_recvq_full', which consolidates the actual testing code (in three
different places) into a single location.
Signed-off-by: Rainer Weikusat <rweikusat@mssgmbh.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2008-06-28 02:34:18 +00:00
|
|
|
writable = unix_writable(sk);
|
|
|
|
if (writable) {
|
|
|
|
other = unix_peer_get(sk);
|
|
|
|
if (other) {
|
|
|
|
if (unix_peer(other) != sk) {
|
2009-07-08 12:09:13 +00:00
|
|
|
sock_poll_wait(file, &unix_sk(other)->peer_wait,
|
af_unix: fix 'poll for write'/connected DGRAM sockets
For n:1 'datagram connections' (eg /dev/log), the unix_dgram_sendmsg
routine implements a form of receiver-imposed flow control by
comparing the length of the receive queue of the 'peer socket' with
the max_ack_backlog value stored in the corresponding sock structure,
either blocking the thread which caused the send-routine to be called
or returning EAGAIN. This routine is used by both SOCK_DGRAM and
SOCK_SEQPACKET sockets. The poll-implementation for these socket types
is datagram_poll from core/datagram.c. A socket is deemed to be
writeable by this routine when the memory presently consumed by
datagrams owned by it is less than the configured socket send buffer
size. This is always wrong for PF_UNIX non-stream sockets connected to
server sockets dealing with (potentially) multiple clients if the
abovementioned receive queue is currently considered to be full.
'poll' will then return, indicating that the socket is writeable, but
a subsequent write result in EAGAIN, effectively causing an (usual)
application to 'poll for writeability by repeated send request with
O_NONBLOCK set' until it has consumed its time quantum.
The change below uses a suitably modified variant of the datagram_poll
routines for both type of PF_UNIX sockets, which tests if the
recv-queue of the peer a socket is connected to is presently
considered to be 'full' as part of the 'is this socket
writeable'-checking code. The socket being polled is additionally
put onto the peer_wait wait queue associated with its peer, because the
unix_dgram_recvmsg routine does a wake up on this queue after a
datagram was received and the 'other wakeup call' is done implicitly
as part of skb destruction, meaning, a process blocked in poll
because of a full peer receive queue could otherwise sleep forever
if no datagram owned by its socket was already sitting on this queue.
Among this change is a small (inline) helper routine named
'unix_recvq_full', which consolidates the actual testing code (in three
different places) into a single location.
Signed-off-by: Rainer Weikusat <rweikusat@mssgmbh.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2008-06-28 02:34:18 +00:00
|
|
|
wait);
|
|
|
|
if (unix_recvq_full(other))
|
|
|
|
writable = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
sock_put(other);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (writable)
|
2008-06-18 05:28:05 +00:00
|
|
|
mask |= POLLOUT | POLLWRNORM | POLLWRBAND;
|
|
|
|
else
|
|
|
|
set_bit(SOCK_ASYNC_NOSPACE, &sk->sk_socket->flags);
|
|
|
|
|
|
|
|
return mask;
|
|
|
|
}
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
#ifdef CONFIG_PROC_FS
|
2007-11-23 12:30:01 +00:00
|
|
|
static struct sock *first_unix_socket(int *i)
|
|
|
|
{
|
|
|
|
for (*i = 0; *i <= UNIX_HASH_SIZE; (*i)++) {
|
|
|
|
if (!hlist_empty(&unix_socket_table[*i]))
|
|
|
|
return __sk_head(&unix_socket_table[*i]);
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct sock *next_unix_socket(int *i, struct sock *s)
|
|
|
|
{
|
|
|
|
struct sock *next = sk_next(s);
|
|
|
|
/* More in this chain? */
|
|
|
|
if (next)
|
|
|
|
return next;
|
|
|
|
/* Look for next non-empty chain. */
|
|
|
|
for ((*i)++; *i <= UNIX_HASH_SIZE; (*i)++) {
|
|
|
|
if (!hlist_empty(&unix_socket_table[*i]))
|
|
|
|
return __sk_head(&unix_socket_table[*i]);
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2007-11-20 06:29:30 +00:00
|
|
|
struct unix_iter_state {
|
2007-11-20 06:31:54 +00:00
|
|
|
struct seq_net_private p;
|
2007-11-20 06:29:30 +00:00
|
|
|
int i;
|
|
|
|
};
|
2008-11-02 04:38:31 +00:00
|
|
|
|
2008-03-25 17:36:06 +00:00
|
|
|
static struct sock *unix_seq_idx(struct seq_file *seq, loff_t pos)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
2008-03-25 17:36:06 +00:00
|
|
|
struct unix_iter_state *iter = seq->private;
|
2005-04-16 22:20:36 +00:00
|
|
|
loff_t off = 0;
|
|
|
|
struct sock *s;
|
|
|
|
|
2007-11-20 06:29:30 +00:00
|
|
|
for (s = first_unix_socket(&iter->i); s; s = next_unix_socket(&iter->i, s)) {
|
2008-03-25 17:36:06 +00:00
|
|
|
if (sock_net(s) != seq_file_net(seq))
|
2007-11-20 06:29:30 +00:00
|
|
|
continue;
|
2007-02-09 14:25:23 +00:00
|
|
|
if (off == pos)
|
2005-04-16 22:20:36 +00:00
|
|
|
return s;
|
|
|
|
++off;
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void *unix_seq_start(struct seq_file *seq, loff_t *pos)
|
2008-01-02 05:58:02 +00:00
|
|
|
__acquires(unix_table_lock)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
2005-12-14 07:26:29 +00:00
|
|
|
spin_lock(&unix_table_lock);
|
2008-04-13 02:04:38 +00:00
|
|
|
return *pos ? unix_seq_idx(seq, *pos - 1) : SEQ_START_TOKEN;
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void *unix_seq_next(struct seq_file *seq, void *v, loff_t *pos)
|
|
|
|
{
|
2007-11-20 06:29:30 +00:00
|
|
|
struct unix_iter_state *iter = seq->private;
|
|
|
|
struct sock *sk = v;
|
2005-04-16 22:20:36 +00:00
|
|
|
++*pos;
|
|
|
|
|
2008-04-13 02:04:38 +00:00
|
|
|
if (v == SEQ_START_TOKEN)
|
2007-11-20 06:29:30 +00:00
|
|
|
sk = first_unix_socket(&iter->i);
|
|
|
|
else
|
|
|
|
sk = next_unix_socket(&iter->i, sk);
|
2008-03-25 17:36:06 +00:00
|
|
|
while (sk && (sock_net(sk) != seq_file_net(seq)))
|
2007-11-20 06:29:30 +00:00
|
|
|
sk = next_unix_socket(&iter->i, sk);
|
|
|
|
return sk;
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void unix_seq_stop(struct seq_file *seq, void *v)
|
2008-01-02 05:58:02 +00:00
|
|
|
__releases(unix_table_lock)
|
2005-04-16 22:20:36 +00:00
|
|
|
{
|
2005-12-14 07:26:29 +00:00
|
|
|
spin_unlock(&unix_table_lock);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int unix_seq_show(struct seq_file *seq, void *v)
|
|
|
|
{
|
2007-02-09 14:25:23 +00:00
|
|
|
|
2008-04-13 02:04:38 +00:00
|
|
|
if (v == SEQ_START_TOKEN)
|
2005-04-16 22:20:36 +00:00
|
|
|
seq_puts(seq, "Num RefCount Protocol Flags Type St "
|
|
|
|
"Inode Path\n");
|
|
|
|
else {
|
|
|
|
struct sock *s = v;
|
|
|
|
struct unix_sock *u = unix_sk(s);
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_lock(s);
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
seq_printf(seq, "%p: %08X %08X %08X %04X %02X %5lu",
|
|
|
|
s,
|
|
|
|
atomic_read(&s->sk_refcnt),
|
|
|
|
0,
|
|
|
|
s->sk_state == TCP_LISTEN ? __SO_ACCEPTCON : 0,
|
|
|
|
s->sk_type,
|
|
|
|
s->sk_socket ?
|
|
|
|
(s->sk_state == TCP_ESTABLISHED ? SS_CONNECTED : SS_UNCONNECTED) :
|
|
|
|
(s->sk_state == TCP_ESTABLISHED ? SS_CONNECTING : SS_DISCONNECTING),
|
|
|
|
sock_i_ino(s));
|
|
|
|
|
|
|
|
if (u->addr) {
|
|
|
|
int i, len;
|
|
|
|
seq_putc(seq, ' ');
|
|
|
|
|
|
|
|
i = 0;
|
|
|
|
len = u->addr->len - sizeof(short);
|
|
|
|
if (!UNIX_ABSTRACT(s))
|
|
|
|
len--;
|
|
|
|
else {
|
|
|
|
seq_putc(seq, '@');
|
|
|
|
i++;
|
|
|
|
}
|
|
|
|
for ( ; i < len; i++)
|
|
|
|
seq_putc(seq, u->addr->name->sun_path[i]);
|
|
|
|
}
|
2007-05-31 20:24:26 +00:00
|
|
|
unix_state_unlock(s);
|
2005-04-16 22:20:36 +00:00
|
|
|
seq_putc(seq, '\n');
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2007-07-11 06:07:31 +00:00
|
|
|
static const struct seq_operations unix_seq_ops = {
|
2005-04-16 22:20:36 +00:00
|
|
|
.start = unix_seq_start,
|
|
|
|
.next = unix_seq_next,
|
|
|
|
.stop = unix_seq_stop,
|
|
|
|
.show = unix_seq_show,
|
|
|
|
};
|
|
|
|
|
|
|
|
static int unix_seq_open(struct inode *inode, struct file *file)
|
|
|
|
{
|
2007-11-20 06:31:54 +00:00
|
|
|
return seq_open_net(inode, file, &unix_seq_ops,
|
|
|
|
sizeof(struct unix_iter_state));
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
2007-02-12 08:55:36 +00:00
|
|
|
static const struct file_operations unix_seq_fops = {
|
2005-04-16 22:20:36 +00:00
|
|
|
.owner = THIS_MODULE,
|
|
|
|
.open = unix_seq_open,
|
|
|
|
.read = seq_read,
|
|
|
|
.llseek = seq_lseek,
|
2007-11-20 06:31:54 +00:00
|
|
|
.release = seq_release_net,
|
2005-04-16 22:20:36 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
2009-10-05 05:58:39 +00:00
|
|
|
static const struct net_proto_family unix_family_ops = {
|
2005-04-16 22:20:36 +00:00
|
|
|
.family = PF_UNIX,
|
|
|
|
.create = unix_create,
|
|
|
|
.owner = THIS_MODULE,
|
|
|
|
};
|
|
|
|
|
2007-11-20 06:29:30 +00:00
|
|
|
|
2010-01-17 03:35:32 +00:00
|
|
|
static int __net_init unix_net_init(struct net *net)
|
2007-11-20 06:29:30 +00:00
|
|
|
{
|
|
|
|
int error = -ENOMEM;
|
|
|
|
|
2007-12-11 12:19:17 +00:00
|
|
|
net->unx.sysctl_max_dgram_qlen = 10;
|
2007-12-01 12:51:01 +00:00
|
|
|
if (unix_sysctl_register(net))
|
|
|
|
goto out;
|
2007-12-01 12:44:15 +00:00
|
|
|
|
2007-11-20 06:29:30 +00:00
|
|
|
#ifdef CONFIG_PROC_FS
|
2007-12-01 12:51:01 +00:00
|
|
|
if (!proc_net_fops_create(net, "unix", 0, &unix_seq_fops)) {
|
|
|
|
unix_sysctl_unregister(net);
|
2007-11-20 06:29:30 +00:00
|
|
|
goto out;
|
2007-12-01 12:51:01 +00:00
|
|
|
}
|
2007-11-20 06:29:30 +00:00
|
|
|
#endif
|
|
|
|
error = 0;
|
|
|
|
out:
|
2008-11-02 04:37:27 +00:00
|
|
|
return error;
|
2007-11-20 06:29:30 +00:00
|
|
|
}
|
|
|
|
|
2010-01-17 03:35:32 +00:00
|
|
|
static void __net_exit unix_net_exit(struct net *net)
|
2007-11-20 06:29:30 +00:00
|
|
|
{
|
2007-12-01 12:51:01 +00:00
|
|
|
unix_sysctl_unregister(net);
|
2007-11-20 06:29:30 +00:00
|
|
|
proc_net_remove(net, "unix");
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct pernet_operations unix_net_ops = {
|
|
|
|
.init = unix_net_init,
|
|
|
|
.exit = unix_net_exit,
|
|
|
|
};
|
|
|
|
|
2005-04-16 22:20:36 +00:00
|
|
|
static int __init af_unix_init(void)
|
|
|
|
{
|
|
|
|
int rc = -1;
|
|
|
|
struct sk_buff *dummy_skb;
|
|
|
|
|
2006-09-01 07:29:06 +00:00
|
|
|
BUILD_BUG_ON(sizeof(struct unix_skb_parms) > sizeof(dummy_skb->cb));
|
2005-04-16 22:20:36 +00:00
|
|
|
|
|
|
|
rc = proto_register(&unix_proto, 1);
|
2007-02-09 14:25:23 +00:00
|
|
|
if (rc != 0) {
|
|
|
|
printk(KERN_CRIT "%s: Cannot create unix_sock SLAB cache!\n",
|
2008-03-06 04:47:47 +00:00
|
|
|
__func__);
|
2005-04-16 22:20:36 +00:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
sock_register(&unix_family_ops);
|
2007-11-20 06:29:30 +00:00
|
|
|
register_pernet_subsys(&unix_net_ops);
|
2005-04-16 22:20:36 +00:00
|
|
|
out:
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void __exit af_unix_exit(void)
|
|
|
|
{
|
|
|
|
sock_unregister(PF_UNIX);
|
|
|
|
proto_unregister(&unix_proto);
|
2007-11-20 06:29:30 +00:00
|
|
|
unregister_pernet_subsys(&unix_net_ops);
|
2005-04-16 22:20:36 +00:00
|
|
|
}
|
|
|
|
|
2008-04-24 07:59:25 +00:00
|
|
|
/* Earlier than device_initcall() so that other drivers invoking
|
|
|
|
request_module() don't end up in a loop when modprobe tries
|
|
|
|
to use a UNIX socket. But later than subsys_initcall() because
|
|
|
|
we depend on stuff initialised there */
|
|
|
|
fs_initcall(af_unix_init);
|
2005-04-16 22:20:36 +00:00
|
|
|
module_exit(af_unix_exit);
|
|
|
|
|
|
|
|
MODULE_LICENSE("GPL");
|
|
|
|
MODULE_ALIAS_NETPROTO(PF_UNIX);
|