* [Qemu-devel] [PATCH] linux-user: support target-to-host SCM_CREDENTIALS
@ 2014-12-21 11:02 Alex Suykov
2014-12-23 1:59 ` Fam Zheng
0 siblings, 1 reply; 3+ messages in thread
From: Alex Suykov @ 2014-12-21 11:02 UTC (permalink / raw)
To: qemu-devel; +Cc: Riku Voipio
When passing ancillary data through a unix socket, handle
credentials properly instead of doing a simple copy and
issuing a warning.
Signed-off-by: Alex Suykov <alex.suykov@gmail.com>
---
linux-user/syscall.c | 15 +++++++++++----
1 file changed, 11 insertions(+), 4 deletions(-)
diff --git a/linux-user/syscall.c b/linux-user/syscall.c
index aaac6a2..b067c5c 100644
--- a/linux-user/syscall.c
+++ b/linux-user/syscall.c
@@ -1214,16 +1214,23 @@ static inline abi_long target_to_host_cmsg(struct msghdr *msgh,
cmsg->cmsg_type = tswap32(target_cmsg->cmsg_type);
cmsg->cmsg_len = CMSG_LEN(len);
- if (cmsg->cmsg_level != SOL_SOCKET || cmsg->cmsg_type != SCM_RIGHTS) {
- gemu_log("Unsupported ancillary data: %d/%d\n", cmsg->cmsg_level, cmsg->cmsg_type);
- memcpy(data, target_data, len);
- } else {
+ if (cmsg->cmsg_level == SOL_SOCKET && cmsg->cmsg_type == SCM_RIGHTS) {
int *fd = (int *)data;
int *target_fd = (int *)target_data;
int i, numfds = len / sizeof(int);
for (i = 0; i < numfds; i++)
fd[i] = tswap32(target_fd[i]);
+ } else if (cmsg->cmsg_level == SOL_SOCKET && cmsg->cmsg_type == SCM_CREDENTIALS) {
+ struct ucred *cred = (struct ucred *)data;
+ struct target_ucred *target_cred = (struct target_ucred *)target_data;
+
+ __put_user(target_cred->pid, &cred->pid);
+ __put_user(target_cred->uid, &cred->uid);
+ __put_user(target_cred->gid, &cred->gid);
+ } else {
+ gemu_log("Unsupported ancillary data: %d/%d\n", cmsg->cmsg_level, cmsg->cmsg_type);
+ memcpy(data, target_data, len);
}
cmsg = CMSG_NXTHDR(msgh, cmsg);
--
2.0.3
^ permalink raw reply related [flat|nested] 3+ messages in thread
* Re: [Qemu-devel] [PATCH] linux-user: support target-to-host SCM_CREDENTIALS
2014-12-21 11:02 [Qemu-devel] [PATCH] linux-user: support target-to-host SCM_CREDENTIALS Alex Suykov
@ 2014-12-23 1:59 ` Fam Zheng
2014-12-23 5:52 ` Alex Suykov
0 siblings, 1 reply; 3+ messages in thread
From: Fam Zheng @ 2014-12-23 1:59 UTC (permalink / raw)
To: Alex Suykov; +Cc: Riku Voipio, qemu-devel
On Sun, 12/21 13:02, Alex Suykov wrote:
> When passing ancillary data through a unix socket, handle
> credentials properly instead of doing a simple copy and
> issuing a warning.
>
> Signed-off-by: Alex Suykov <alex.suykov@gmail.com>
> ---
> linux-user/syscall.c | 15 +++++++++++----
> 1 file changed, 11 insertions(+), 4 deletions(-)
>
> diff --git a/linux-user/syscall.c b/linux-user/syscall.c
> index aaac6a2..b067c5c 100644
> --- a/linux-user/syscall.c
> +++ b/linux-user/syscall.c
> @@ -1214,16 +1214,23 @@ static inline abi_long target_to_host_cmsg(struct msghdr *msgh,
> cmsg->cmsg_type = tswap32(target_cmsg->cmsg_type);
> cmsg->cmsg_len = CMSG_LEN(len);
>
> - if (cmsg->cmsg_level != SOL_SOCKET || cmsg->cmsg_type != SCM_RIGHTS) {
> - gemu_log("Unsupported ancillary data: %d/%d\n", cmsg->cmsg_level, cmsg->cmsg_type);
> - memcpy(data, target_data, len);
> - } else {
> + if (cmsg->cmsg_level == SOL_SOCKET && cmsg->cmsg_type == SCM_RIGHTS) {
> int *fd = (int *)data;
> int *target_fd = (int *)target_data;
> int i, numfds = len / sizeof(int);
>
> for (i = 0; i < numfds; i++)
> fd[i] = tswap32(target_fd[i]);
> + } else if (cmsg->cmsg_level == SOL_SOCKET && cmsg->cmsg_type == SCM_CREDENTIALS) {
> + struct ucred *cred = (struct ucred *)data;
> + struct target_ucred *target_cred = (struct target_ucred *)target_data;
> +
> + __put_user(target_cred->pid, &cred->pid);
> + __put_user(target_cred->uid, &cred->uid);
> + __put_user(target_cred->gid, &cred->gid);
> + } else {
> + gemu_log("Unsupported ancillary data: %d/%d\n", cmsg->cmsg_level, cmsg->cmsg_type);
> + memcpy(data, target_data, len);
> }
>
> cmsg = CMSG_NXTHDR(msgh, cmsg);
> --
> 2.0.3
>
>
I didn't review the code but checkpatch.pl complains about a few lines over 80
characters.
Fam
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [Qemu-devel] [PATCH] linux-user: support target-to-host SCM_CREDENTIALS
2014-12-23 1:59 ` Fam Zheng
@ 2014-12-23 5:52 ` Alex Suykov
0 siblings, 0 replies; 3+ messages in thread
From: Alex Suykov @ 2014-12-23 5:52 UTC (permalink / raw)
To: Fam Zheng; +Cc: Riku Voipio, qemu-devel
Tue, Dec 23, 2014 at 09:59:57AM +0800, Fam Zheng wrote:
> On Sun, 12/21 13:02, Alex Suykov wrote:
> > When passing ancillary data through a unix socket, handle
> > credentials properly instead of doing a simple copy and
> > issuing a warning.
> >
> > Signed-off-by: Alex Suykov <alex.suykov@gmail.com>
> > ---
...
> > - gemu_log("Unsupported ancillary data: %d/%d\n", cmsg->cmsg_level, cmsg->cmsg_type);
...
> > + gemu_log("Unsupported ancillary data: %d/%d\n", cmsg->cmsg_level, cmsg->cmsg_type);
...
>
> I didn't review the code but checkpatch.pl complains about a few lines over 80
> characters.
The patch does not change the length of the longest line in that function,
just moves it around. So my guess was that mixing semantic changes
and reformatting is not a good idea.
Sending checkpatch-compliant v2.
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2014-12-23 5:55 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-12-21 11:02 [Qemu-devel] [PATCH] linux-user: support target-to-host SCM_CREDENTIALS Alex Suykov
2014-12-23 1:59 ` Fam Zheng
2014-12-23 5:52 ` Alex Suykov
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).