On Mon, 9 Jul 2007, Stuart Anderson wrote:

Attached is a diff ...

Here's the diff.


                                Stuart

Stuart R. Anderson                               [EMAIL PROTECTED]
Network & Software Engineering                   http://www.netsweng.com/
1024D/37A79149:                                  0791 D3B8 9A4C 2CDC A31F
                                                 BD03 0A62 E534 37A7 9149
*** linux-user/syscall.c	2007-07-09 07:33:46.000000000 -0400
--- linux-user/syscall.c.stu	2007-07-09 07:01:12.000000000 -0400
***************
*** 522,550 ****
      return ret;
  }
  
! static inline long copy_from_user_sockaddr(struct sockaddr *addr,
                                             target_ulong target_addr,
!                                            socklen_t len)
  {
      long ret = 0;
!     struct target_sockaddr *target_saddr = (struct target_sockaddr *)target_addr;
  
!     if( (ret=access_ok(VERIFY_READ,target_saddr,len)) != 0 ) return ret;
      memcpy(addr, target_saddr, len);
      addr->sa_family = tswap16(target_saddr->sa_family);
      return ret;
  }
  
! static inline long copy_to_user_sockaddr(target_ulong target_addr,
                                             struct sockaddr *addr,
!                                            socklen_t len)
  {
      long ret = 0;
!     struct target_sockaddr *target_saddr = (struct target_sockaddr *)target_addr;
  
!     if( (ret=access_ok(VERIFY_WRITE,target_saddr,len)) != 0 ) return ret;
      memcpy(target_saddr, addr, len);
      target_saddr->sa_family = tswap16(addr->sa_family);
      return ret;
  }
  
--- 522,554 ----
      return ret;
  }
  
! static inline long target_to_host_sockaddr(struct sockaddr *addr,
                                             target_ulong target_addr,
!                                            socklen_t len,
!                                            int pg_access)
  {
      long ret = 0;
!     struct target_sockaddr *target_saddr;
  
!     if( (ret=lock_and_check_user_struct(&target_saddr,target_addr,len,1,pg_access)) != 0 ) return ret;
      memcpy(addr, target_saddr, len);
      addr->sa_family = tswap16(target_saddr->sa_family);
+     unlock_user(target_saddr, target_addr, 0);
      return ret;
  }
  
! static inline long host_to_target_sockaddr(target_ulong target_addr,
                                             struct sockaddr *addr,
!                                            socklen_t len,
!                                            int pg_access)
  {
      long ret = 0;
!     struct target_sockaddr *target_saddr;
  
!     if( (ret=lock_and_check_user_struct(&target_saddr,target_addr,len,1,pg_access)) != 0 ) return ret;
      memcpy(target_saddr, addr, len);
      target_saddr->sa_family = tswap16(addr->sa_family);
+     unlock_user(target_saddr, target_addr, len);
      return ret;
  }
  
***************
*** 909,915 ****
      long ret = 0;
      void *addr = alloca(addrlen);
      
!     if( (ret=copy_from_user_sockaddr(addr, target_addr, addrlen)) != 0 ) return ret;
      return get_errno(bind(sockfd, addr, addrlen));
  }
  
--- 913,919 ----
      long ret = 0;
      void *addr = alloca(addrlen);
      
!     if( (ret=target_to_host_sockaddr(addr, target_addr, addrlen,PAGE_READ)) != 0 ) return ret;
      return get_errno(bind(sockfd, addr, addrlen));
  }
  
***************
*** 919,925 ****
      long ret = 0;
      void *addr = alloca(addrlen);
      
!     if( (ret=copy_from_user_sockaddr(addr, target_addr, addrlen)) != 0 ) return ret;
      return get_errno(connect(sockfd, addr, addrlen));
  }
  
--- 923,929 ----
      long ret = 0;
      void *addr = alloca(addrlen);
      
!     if( (ret=target_to_host_sockaddr(addr, target_addr, addrlen,PAGE_READ)) != 0 ) return ret;
      return get_errno(connect(sockfd, addr, addrlen));
  }
  
***************
*** 944,956 ****
          msg.msg_namelen = tswap32(msgp->msg_namelen);
          msg.msg_name = alloca(msg.msg_namelen);
          if( send ) {
!           if( (ret=copy_from_user_sockaddr(msg.msg_name, tswapl(msgp->msg_name),
!                                 msg.msg_namelen)) != 0 ) return ret;
          } else {
! 	  /* FIXME
!           if( (ret=copy_from_user_sockaddr(msg.msg_name, tswapl(msgp->msg_name),
                                  msg.msg_namelen,PAGE_WRITE)) != 0 ) return ret;
- 				*/
  	}
      } else {
          msg.msg_name = NULL;
--- 948,958 ----
          msg.msg_namelen = tswap32(msgp->msg_namelen);
          msg.msg_name = alloca(msg.msg_namelen);
          if( send ) {
!           if( (ret=target_to_host_sockaddr(msg.msg_name, tswapl(msgp->msg_name),
!                                 msg.msg_namelen,PAGE_READ)) != 0 ) return ret;
          } else {
!           if( (ret=target_to_host_sockaddr(msg.msg_name, tswapl(msgp->msg_name),
                                  msg.msg_namelen,PAGE_WRITE)) != 0 ) return ret;
  	}
      } else {
          msg.msg_name = NULL;
***************
*** 991,997 ****
  
      ret = get_errno(accept(fd, addr, &addrlen));
      if (!is_error(ret)) {
!         if( (ret2=copy_to_user_sockaddr(target_addr, addr, addrlen)) != 0 ) return ret2;
          tput32(target_addrlen, addrlen);
      }
      return ret;
--- 993,999 ----
  
      ret = get_errno(accept(fd, addr, &addrlen));
      if (!is_error(ret)) {
!         if( (ret2=host_to_target_sockaddr(target_addr, addr, addrlen, PAGE_WRITE)) != 0 ) return ret2;
          tput32(target_addrlen, addrlen);
      }
      return ret;
***************
*** 1010,1016 ****
  
      ret = get_errno(getpeername(fd, addr, &addrlen));
      if (!is_error(ret)) {
!         if( (ret2=copy_to_user_sockaddr(target_addr, addr, addrlen)) != 0 ) return ret2;
          if( (ret2=page_check_range(target_addrlen,sizeof(socklen_t),PAGE_WRITE)) != 0 ) return ret2;
          tput32(target_addrlen, addrlen);
      }
--- 1012,1018 ----
  
      ret = get_errno(getpeername(fd, addr, &addrlen));
      if (!is_error(ret)) {
!         if( (ret2=host_to_target_sockaddr(target_addr, addr, addrlen, PAGE_WRITE)) != 0 ) return ret2;
          if( (ret2=page_check_range(target_addrlen,sizeof(socklen_t),PAGE_WRITE)) != 0 ) return ret2;
          tput32(target_addrlen, addrlen);
      }
***************
*** 1030,1036 ****
  
      ret = get_errno(getsockname(fd, addr, &addrlen));
      if (!is_error(ret)) {
!         if( (ret2=copy_to_user_sockaddr(target_addr, addr, addrlen)) ) return ret2;
          tput32(target_addrlen, addrlen);
      }
      return ret;
--- 1032,1038 ----
  
      ret = get_errno(getsockname(fd, addr, &addrlen));
      if (!is_error(ret)) {
!         if( (ret2=host_to_target_sockaddr(target_addr, addr, addrlen, PAGE_WRITE)) ) return ret2;
          tput32(target_addrlen, addrlen);
      }
      return ret;
***************
*** 1060,1066 ****
      if( (ret=lock_and_check_user_struct(&host_msg,msg,len,1,PAGE_READ)) != 0 ) return ret;
      if (target_addr) {
          addr = alloca(addrlen);
!         if( (ret=copy_from_user_sockaddr(addr, target_addr, addrlen)) != 0 ) return ret;
          ret = get_errno(sendto(fd, host_msg, len, flags, addr, addrlen));
      } else {
          ret = get_errno(send(fd, host_msg, len, flags));
--- 1062,1068 ----
      if( (ret=lock_and_check_user_struct(&host_msg,msg,len,1,PAGE_READ)) != 0 ) return ret;
      if (target_addr) {
          addr = alloca(addrlen);
!         if( (ret=target_to_host_sockaddr(addr, target_addr, addrlen, PAGE_READ)) != 0 ) return ret;
          ret = get_errno(sendto(fd, host_msg, len, flags, addr, addrlen));
      } else {
          ret = get_errno(send(fd, host_msg, len, flags));
***************
*** 1088,1094 ****
      }
      if (!is_error(ret)) {
          if (target_addr) {
!             if( (ret2=copy_to_user_sockaddr(target_addr, addr, addrlen)) != 0 ) return ret2;
              tput32(target_addrlen, addrlen);
          }
          unlock_user(host_msg, msg, len);
--- 1090,1096 ----
      }
      if (!is_error(ret)) {
          if (target_addr) {
!             if( (ret2=host_to_target_sockaddr(target_addr, addr, addrlen, PAGE_WRITE)) != 0 ) return ret2;
              tput32(target_addrlen, addrlen);
          }
          unlock_user(host_msg, msg, len);

Reply via email to