diff options
Diffstat (limited to 'net/unix/af_unix.c')
-rw-r--r-- | net/unix/af_unix.c | 187 |
1 files changed, 115 insertions, 72 deletions
diff --git a/net/unix/af_unix.c b/net/unix/af_unix.c index fc3ebb90691..3c95304a081 100644 --- a/net/unix/af_unix.c +++ b/net/unix/af_unix.c | |||
@@ -117,7 +117,7 @@ | |||
117 | 117 | ||
118 | static struct hlist_head unix_socket_table[UNIX_HASH_SIZE + 1]; | 118 | static struct hlist_head unix_socket_table[UNIX_HASH_SIZE + 1]; |
119 | static DEFINE_SPINLOCK(unix_table_lock); | 119 | static DEFINE_SPINLOCK(unix_table_lock); |
120 | static atomic_t unix_nr_socks = ATOMIC_INIT(0); | 120 | static atomic_long_t unix_nr_socks; |
121 | 121 | ||
122 | #define unix_sockets_unbound (&unix_socket_table[UNIX_HASH_SIZE]) | 122 | #define unix_sockets_unbound (&unix_socket_table[UNIX_HASH_SIZE]) |
123 | 123 | ||
@@ -144,7 +144,7 @@ static inline void unix_set_secdata(struct scm_cookie *scm, struct sk_buff *skb) | |||
144 | /* | 144 | /* |
145 | * SMP locking strategy: | 145 | * SMP locking strategy: |
146 | * hash table is protected with spinlock unix_table_lock | 146 | * hash table is protected with spinlock unix_table_lock |
147 | * each socket state is protected by separate rwlock. | 147 | * each socket state is protected by separate spin lock. |
148 | */ | 148 | */ |
149 | 149 | ||
150 | static inline unsigned unix_hash_fold(__wsum n) | 150 | static inline unsigned unix_hash_fold(__wsum n) |
@@ -282,7 +282,7 @@ static inline struct sock *unix_find_socket_byname(struct net *net, | |||
282 | return s; | 282 | return s; |
283 | } | 283 | } |
284 | 284 | ||
285 | static struct sock *unix_find_socket_byinode(struct net *net, struct inode *i) | 285 | static struct sock *unix_find_socket_byinode(struct inode *i) |
286 | { | 286 | { |
287 | struct sock *s; | 287 | struct sock *s; |
288 | struct hlist_node *node; | 288 | struct hlist_node *node; |
@@ -292,9 +292,6 @@ static struct sock *unix_find_socket_byinode(struct net *net, struct inode *i) | |||
292 | &unix_socket_table[i->i_ino & (UNIX_HASH_SIZE - 1)]) { | 292 | &unix_socket_table[i->i_ino & (UNIX_HASH_SIZE - 1)]) { |
293 | struct dentry *dentry = unix_sk(s)->dentry; | 293 | struct dentry *dentry = unix_sk(s)->dentry; |
294 | 294 | ||
295 | if (!net_eq(sock_net(s), net)) | ||
296 | continue; | ||
297 | |||
298 | if (dentry && dentry->d_inode == i) { | 295 | if (dentry && dentry->d_inode == i) { |
299 | sock_hold(s); | 296 | sock_hold(s); |
300 | goto found; | 297 | goto found; |
@@ -313,13 +310,16 @@ static inline int unix_writable(struct sock *sk) | |||
313 | 310 | ||
314 | static void unix_write_space(struct sock *sk) | 311 | static void unix_write_space(struct sock *sk) |
315 | { | 312 | { |
316 | read_lock(&sk->sk_callback_lock); | 313 | struct socket_wq *wq; |
314 | |||
315 | rcu_read_lock(); | ||
317 | if (unix_writable(sk)) { | 316 | if (unix_writable(sk)) { |
318 | if (sk_has_sleeper(sk)) | 317 | wq = rcu_dereference(sk->sk_wq); |
319 | wake_up_interruptible_sync(sk->sk_sleep); | 318 | if (wq_has_sleeper(wq)) |
319 | wake_up_interruptible_sync(&wq->wait); | ||
320 | sk_wake_async(sk, SOCK_WAKE_SPACE, POLL_OUT); | 320 | sk_wake_async(sk, SOCK_WAKE_SPACE, POLL_OUT); |
321 | } | 321 | } |
322 | read_unlock(&sk->sk_callback_lock); | 322 | rcu_read_unlock(); |
323 | } | 323 | } |
324 | 324 | ||
325 | /* When dgram socket disconnects (or changes its peer), we clear its receive | 325 | /* When dgram socket disconnects (or changes its peer), we clear its receive |
@@ -360,13 +360,13 @@ static void unix_sock_destructor(struct sock *sk) | |||
360 | if (u->addr) | 360 | if (u->addr) |
361 | unix_release_addr(u->addr); | 361 | unix_release_addr(u->addr); |
362 | 362 | ||
363 | atomic_dec(&unix_nr_socks); | 363 | atomic_long_dec(&unix_nr_socks); |
364 | local_bh_disable(); | 364 | local_bh_disable(); |
365 | sock_prot_inuse_add(sock_net(sk), sk->sk_prot, -1); | 365 | sock_prot_inuse_add(sock_net(sk), sk->sk_prot, -1); |
366 | local_bh_enable(); | 366 | local_bh_enable(); |
367 | #ifdef UNIX_REFCNT_DEBUG | 367 | #ifdef UNIX_REFCNT_DEBUG |
368 | printk(KERN_DEBUG "UNIX %p is destroyed, %d are still alive.\n", sk, | 368 | printk(KERN_DEBUG "UNIX %p is destroyed, %ld are still alive.\n", sk, |
369 | atomic_read(&unix_nr_socks)); | 369 | atomic_long_read(&unix_nr_socks)); |
370 | #endif | 370 | #endif |
371 | } | 371 | } |
372 | 372 | ||
@@ -406,9 +406,7 @@ static int unix_release_sock(struct sock *sk, int embrion) | |||
406 | skpair->sk_err = ECONNRESET; | 406 | skpair->sk_err = ECONNRESET; |
407 | unix_state_unlock(skpair); | 407 | unix_state_unlock(skpair); |
408 | skpair->sk_state_change(skpair); | 408 | skpair->sk_state_change(skpair); |
409 | read_lock(&skpair->sk_callback_lock); | ||
410 | sk_wake_async(skpair, SOCK_WAKE_WAITD, POLL_HUP); | 409 | sk_wake_async(skpair, SOCK_WAKE_WAITD, POLL_HUP); |
411 | read_unlock(&skpair->sk_callback_lock); | ||
412 | } | 410 | } |
413 | sock_put(skpair); /* It may now die */ | 411 | sock_put(skpair); /* It may now die */ |
414 | unix_peer(sk) = NULL; | 412 | unix_peer(sk) = NULL; |
@@ -449,11 +447,31 @@ static int unix_release_sock(struct sock *sk, int embrion) | |||
449 | return 0; | 447 | return 0; |
450 | } | 448 | } |
451 | 449 | ||
450 | static void init_peercred(struct sock *sk) | ||
451 | { | ||
452 | put_pid(sk->sk_peer_pid); | ||
453 | if (sk->sk_peer_cred) | ||
454 | put_cred(sk->sk_peer_cred); | ||
455 | sk->sk_peer_pid = get_pid(task_tgid(current)); | ||
456 | sk->sk_peer_cred = get_current_cred(); | ||
457 | } | ||
458 | |||
459 | static void copy_peercred(struct sock *sk, struct sock *peersk) | ||
460 | { | ||
461 | put_pid(sk->sk_peer_pid); | ||
462 | if (sk->sk_peer_cred) | ||
463 | put_cred(sk->sk_peer_cred); | ||
464 | sk->sk_peer_pid = get_pid(peersk->sk_peer_pid); | ||
465 | sk->sk_peer_cred = get_cred(peersk->sk_peer_cred); | ||
466 | } | ||
467 | |||
452 | static int unix_listen(struct socket *sock, int backlog) | 468 | static int unix_listen(struct socket *sock, int backlog) |
453 | { | 469 | { |
454 | int err; | 470 | int err; |
455 | struct sock *sk = sock->sk; | 471 | struct sock *sk = sock->sk; |
456 | struct unix_sock *u = unix_sk(sk); | 472 | struct unix_sock *u = unix_sk(sk); |
473 | struct pid *old_pid = NULL; | ||
474 | const struct cred *old_cred = NULL; | ||
457 | 475 | ||
458 | err = -EOPNOTSUPP; | 476 | err = -EOPNOTSUPP; |
459 | if (sock->type != SOCK_STREAM && sock->type != SOCK_SEQPACKET) | 477 | if (sock->type != SOCK_STREAM && sock->type != SOCK_SEQPACKET) |
@@ -469,12 +487,14 @@ static int unix_listen(struct socket *sock, int backlog) | |||
469 | sk->sk_max_ack_backlog = backlog; | 487 | sk->sk_max_ack_backlog = backlog; |
470 | sk->sk_state = TCP_LISTEN; | 488 | sk->sk_state = TCP_LISTEN; |
471 | /* set credentials so connect can copy them */ | 489 | /* set credentials so connect can copy them */ |
472 | sk->sk_peercred.pid = task_tgid_vnr(current); | 490 | init_peercred(sk); |
473 | current_euid_egid(&sk->sk_peercred.uid, &sk->sk_peercred.gid); | ||
474 | err = 0; | 491 | err = 0; |
475 | 492 | ||
476 | out_unlock: | 493 | out_unlock: |
477 | unix_state_unlock(sk); | 494 | unix_state_unlock(sk); |
495 | put_pid(old_pid); | ||
496 | if (old_cred) | ||
497 | put_cred(old_cred); | ||
478 | out: | 498 | out: |
479 | return err; | 499 | return err; |
480 | } | 500 | } |
@@ -586,8 +606,8 @@ static struct sock *unix_create1(struct net *net, struct socket *sock) | |||
586 | struct sock *sk = NULL; | 606 | struct sock *sk = NULL; |
587 | struct unix_sock *u; | 607 | struct unix_sock *u; |
588 | 608 | ||
589 | atomic_inc(&unix_nr_socks); | 609 | atomic_long_inc(&unix_nr_socks); |
590 | if (atomic_read(&unix_nr_socks) > 2 * get_max_files()) | 610 | if (atomic_long_read(&unix_nr_socks) > 2 * get_max_files()) |
591 | goto out; | 611 | goto out; |
592 | 612 | ||
593 | sk = sk_alloc(net, PF_UNIX, GFP_KERNEL, &unix_proto); | 613 | sk = sk_alloc(net, PF_UNIX, GFP_KERNEL, &unix_proto); |
@@ -612,7 +632,7 @@ static struct sock *unix_create1(struct net *net, struct socket *sock) | |||
612 | unix_insert_socket(unix_sockets_unbound, sk); | 632 | unix_insert_socket(unix_sockets_unbound, sk); |
613 | out: | 633 | out: |
614 | if (sk == NULL) | 634 | if (sk == NULL) |
615 | atomic_dec(&unix_nr_socks); | 635 | atomic_long_dec(&unix_nr_socks); |
616 | else { | 636 | else { |
617 | local_bh_disable(); | 637 | local_bh_disable(); |
618 | sock_prot_inuse_add(sock_net(sk), sk->sk_prot, 1); | 638 | sock_prot_inuse_add(sock_net(sk), sk->sk_prot, 1); |
@@ -621,7 +641,8 @@ out: | |||
621 | return sk; | 641 | return sk; |
622 | } | 642 | } |
623 | 643 | ||
624 | static int unix_create(struct net *net, struct socket *sock, int protocol) | 644 | static int unix_create(struct net *net, struct socket *sock, int protocol, |
645 | int kern) | ||
625 | { | 646 | { |
626 | if (protocol && protocol != PF_UNIX) | 647 | if (protocol && protocol != PF_UNIX) |
627 | return -EPROTONOSUPPORT; | 648 | return -EPROTONOSUPPORT; |
@@ -671,6 +692,7 @@ static int unix_autobind(struct socket *sock) | |||
671 | static u32 ordernum = 1; | 692 | static u32 ordernum = 1; |
672 | struct unix_address *addr; | 693 | struct unix_address *addr; |
673 | int err; | 694 | int err; |
695 | unsigned int retries = 0; | ||
674 | 696 | ||
675 | mutex_lock(&u->readlock); | 697 | mutex_lock(&u->readlock); |
676 | 698 | ||
@@ -696,9 +718,17 @@ retry: | |||
696 | if (__unix_find_socket_byname(net, addr->name, addr->len, sock->type, | 718 | if (__unix_find_socket_byname(net, addr->name, addr->len, sock->type, |
697 | addr->hash)) { | 719 | addr->hash)) { |
698 | spin_unlock(&unix_table_lock); | 720 | spin_unlock(&unix_table_lock); |
699 | /* Sanity yield. It is unusual case, but yet... */ | 721 | /* |
700 | if (!(ordernum&0xFF)) | 722 | * __unix_find_socket_byname() may take long time if many names |
701 | yield(); | 723 | * are already in use. |
724 | */ | ||
725 | cond_resched(); | ||
726 | /* Give up if all names seems to be in use. */ | ||
727 | if (retries++ == 0xFFFFF) { | ||
728 | err = -ENOSPC; | ||
729 | kfree(addr); | ||
730 | goto out; | ||
731 | } | ||
702 | goto retry; | 732 | goto retry; |
703 | } | 733 | } |
704 | addr->hash ^= sk->sk_type; | 734 | addr->hash ^= sk->sk_type; |
@@ -734,7 +764,7 @@ static struct sock *unix_find_other(struct net *net, | |||
734 | err = -ECONNREFUSED; | 764 | err = -ECONNREFUSED; |
735 | if (!S_ISSOCK(inode->i_mode)) | 765 | if (!S_ISSOCK(inode->i_mode)) |
736 | goto put_fail; | 766 | goto put_fail; |
737 | u = unix_find_socket_byinode(net, inode); | 767 | u = unix_find_socket_byinode(inode); |
738 | if (!u) | 768 | if (!u) |
739 | goto put_fail; | 769 | goto put_fail; |
740 | 770 | ||
@@ -1032,8 +1062,8 @@ static int unix_stream_connect(struct socket *sock, struct sockaddr *uaddr, | |||
1032 | goto out; | 1062 | goto out; |
1033 | addr_len = err; | 1063 | addr_len = err; |
1034 | 1064 | ||
1035 | if (test_bit(SOCK_PASSCRED, &sock->flags) | 1065 | if (test_bit(SOCK_PASSCRED, &sock->flags) && !u->addr && |
1036 | && !u->addr && (err = unix_autobind(sock)) != 0) | 1066 | (err = unix_autobind(sock)) != 0) |
1037 | goto out; | 1067 | goto out; |
1038 | 1068 | ||
1039 | timeo = sock_sndtimeo(sk, flags & O_NONBLOCK); | 1069 | timeo = sock_sndtimeo(sk, flags & O_NONBLOCK); |
@@ -1074,6 +1104,8 @@ restart: | |||
1074 | err = -ECONNREFUSED; | 1104 | err = -ECONNREFUSED; |
1075 | if (other->sk_state != TCP_LISTEN) | 1105 | if (other->sk_state != TCP_LISTEN) |
1076 | goto out_unlock; | 1106 | goto out_unlock; |
1107 | if (other->sk_shutdown & RCV_SHUTDOWN) | ||
1108 | goto out_unlock; | ||
1077 | 1109 | ||
1078 | if (unix_recvq_full(other)) { | 1110 | if (unix_recvq_full(other)) { |
1079 | err = -EAGAIN; | 1111 | err = -EAGAIN; |
@@ -1136,10 +1168,9 @@ restart: | |||
1136 | unix_peer(newsk) = sk; | 1168 | unix_peer(newsk) = sk; |
1137 | newsk->sk_state = TCP_ESTABLISHED; | 1169 | newsk->sk_state = TCP_ESTABLISHED; |
1138 | newsk->sk_type = sk->sk_type; | 1170 | newsk->sk_type = sk->sk_type; |
1139 | newsk->sk_peercred.pid = task_tgid_vnr(current); | 1171 | init_peercred(newsk); |
1140 | current_euid_egid(&newsk->sk_peercred.uid, &newsk->sk_peercred.gid); | ||
1141 | newu = unix_sk(newsk); | 1172 | newu = unix_sk(newsk); |
1142 | newsk->sk_sleep = &newu->peer_wait; | 1173 | newsk->sk_wq = &newu->peer_wq; |
1143 | otheru = unix_sk(other); | 1174 | otheru = unix_sk(other); |
1144 | 1175 | ||
1145 | /* copy address information from listening to new sock*/ | 1176 | /* copy address information from listening to new sock*/ |
@@ -1153,7 +1184,7 @@ restart: | |||
1153 | } | 1184 | } |
1154 | 1185 | ||
1155 | /* Set credentials */ | 1186 | /* Set credentials */ |
1156 | sk->sk_peercred = other->sk_peercred; | 1187 | copy_peercred(sk, other); |
1157 | 1188 | ||
1158 | sock->state = SS_CONNECTED; | 1189 | sock->state = SS_CONNECTED; |
1159 | sk->sk_state = TCP_ESTABLISHED; | 1190 | sk->sk_state = TCP_ESTABLISHED; |
@@ -1195,10 +1226,8 @@ static int unix_socketpair(struct socket *socka, struct socket *sockb) | |||
1195 | sock_hold(skb); | 1226 | sock_hold(skb); |
1196 | unix_peer(ska) = skb; | 1227 | unix_peer(ska) = skb; |
1197 | unix_peer(skb) = ska; | 1228 | unix_peer(skb) = ska; |
1198 | ska->sk_peercred.pid = skb->sk_peercred.pid = task_tgid_vnr(current); | 1229 | init_peercred(ska); |
1199 | current_euid_egid(&skb->sk_peercred.uid, &skb->sk_peercred.gid); | 1230 | init_peercred(skb); |
1200 | ska->sk_peercred.uid = skb->sk_peercred.uid; | ||
1201 | ska->sk_peercred.gid = skb->sk_peercred.gid; | ||
1202 | 1231 | ||
1203 | if (ska->sk_type != SOCK_DGRAM) { | 1232 | if (ska->sk_type != SOCK_DGRAM) { |
1204 | ska->sk_state = TCP_ESTABLISHED; | 1233 | ska->sk_state = TCP_ESTABLISHED; |
@@ -1256,7 +1285,7 @@ static int unix_getname(struct socket *sock, struct sockaddr *uaddr, int *uaddr_ | |||
1256 | { | 1285 | { |
1257 | struct sock *sk = sock->sk; | 1286 | struct sock *sk = sock->sk; |
1258 | struct unix_sock *u; | 1287 | struct unix_sock *u; |
1259 | struct sockaddr_un *sunaddr = (struct sockaddr_un *)uaddr; | 1288 | DECLARE_SOCKADDR(struct sockaddr_un *, sunaddr, uaddr); |
1260 | int err = 0; | 1289 | int err = 0; |
1261 | 1290 | ||
1262 | if (peer) { | 1291 | if (peer) { |
@@ -1293,18 +1322,20 @@ static void unix_detach_fds(struct scm_cookie *scm, struct sk_buff *skb) | |||
1293 | int i; | 1322 | int i; |
1294 | 1323 | ||
1295 | scm->fp = UNIXCB(skb).fp; | 1324 | scm->fp = UNIXCB(skb).fp; |
1296 | skb->destructor = sock_wfree; | ||
1297 | UNIXCB(skb).fp = NULL; | 1325 | UNIXCB(skb).fp = NULL; |
1298 | 1326 | ||
1299 | for (i = scm->fp->count-1; i >= 0; i--) | 1327 | for (i = scm->fp->count-1; i >= 0; i--) |
1300 | unix_notinflight(scm->fp->fp[i]); | 1328 | unix_notinflight(scm->fp->fp[i]); |
1301 | } | 1329 | } |
1302 | 1330 | ||
1303 | static void unix_destruct_fds(struct sk_buff *skb) | 1331 | static void unix_destruct_scm(struct sk_buff *skb) |
1304 | { | 1332 | { |
1305 | struct scm_cookie scm; | 1333 | struct scm_cookie scm; |
1306 | memset(&scm, 0, sizeof(scm)); | 1334 | memset(&scm, 0, sizeof(scm)); |
1307 | unix_detach_fds(&scm, skb); | 1335 | scm.pid = UNIXCB(skb).pid; |
1336 | scm.cred = UNIXCB(skb).cred; | ||
1337 | if (UNIXCB(skb).fp) | ||
1338 | unix_detach_fds(&scm, skb); | ||
1308 | 1339 | ||
1309 | /* Alas, it calls VFS */ | 1340 | /* Alas, it calls VFS */ |
1310 | /* So fscking what? fput() had been SMP-safe since the last Summer */ | 1341 | /* So fscking what? fput() had been SMP-safe since the last Summer */ |
@@ -1327,10 +1358,22 @@ static int unix_attach_fds(struct scm_cookie *scm, struct sk_buff *skb) | |||
1327 | 1358 | ||
1328 | for (i = scm->fp->count-1; i >= 0; i--) | 1359 | for (i = scm->fp->count-1; i >= 0; i--) |
1329 | unix_inflight(scm->fp->fp[i]); | 1360 | unix_inflight(scm->fp->fp[i]); |
1330 | skb->destructor = unix_destruct_fds; | ||
1331 | return 0; | 1361 | return 0; |
1332 | } | 1362 | } |
1333 | 1363 | ||
1364 | static int unix_scm_to_skb(struct scm_cookie *scm, struct sk_buff *skb, bool send_fds) | ||
1365 | { | ||
1366 | int err = 0; | ||
1367 | UNIXCB(skb).pid = get_pid(scm->pid); | ||
1368 | UNIXCB(skb).cred = get_cred(scm->cred); | ||
1369 | UNIXCB(skb).fp = NULL; | ||
1370 | if (scm->fp && send_fds) | ||
1371 | err = unix_attach_fds(scm, skb); | ||
1372 | |||
1373 | skb->destructor = unix_destruct_scm; | ||
1374 | return err; | ||
1375 | } | ||
1376 | |||
1334 | /* | 1377 | /* |
1335 | * Send AF_UNIX data. | 1378 | * Send AF_UNIX data. |
1336 | */ | 1379 | */ |
@@ -1375,8 +1418,8 @@ static int unix_dgram_sendmsg(struct kiocb *kiocb, struct socket *sock, | |||
1375 | goto out; | 1418 | goto out; |
1376 | } | 1419 | } |
1377 | 1420 | ||
1378 | if (test_bit(SOCK_PASSCRED, &sock->flags) | 1421 | if (test_bit(SOCK_PASSCRED, &sock->flags) && !u->addr |
1379 | && !u->addr && (err = unix_autobind(sock)) != 0) | 1422 | && (err = unix_autobind(sock)) != 0) |
1380 | goto out; | 1423 | goto out; |
1381 | 1424 | ||
1382 | err = -EMSGSIZE; | 1425 | err = -EMSGSIZE; |
@@ -1387,12 +1430,9 @@ static int unix_dgram_sendmsg(struct kiocb *kiocb, struct socket *sock, | |||
1387 | if (skb == NULL) | 1430 | if (skb == NULL) |
1388 | goto out; | 1431 | goto out; |
1389 | 1432 | ||
1390 | memcpy(UNIXCREDS(skb), &siocb->scm->creds, sizeof(struct ucred)); | 1433 | err = unix_scm_to_skb(siocb->scm, skb, true); |
1391 | if (siocb->scm->fp) { | 1434 | if (err) |
1392 | err = unix_attach_fds(siocb->scm, skb); | 1435 | goto out_free; |
1393 | if (err) | ||
1394 | goto out_free; | ||
1395 | } | ||
1396 | unix_get_secdata(siocb->scm, skb); | 1436 | unix_get_secdata(siocb->scm, skb); |
1397 | 1437 | ||
1398 | skb_reset_transport_header(skb); | 1438 | skb_reset_transport_header(skb); |
@@ -1471,6 +1511,8 @@ restart: | |||
1471 | goto restart; | 1511 | goto restart; |
1472 | } | 1512 | } |
1473 | 1513 | ||
1514 | if (sock_flag(other, SOCK_RCVTSTAMP)) | ||
1515 | __net_timestamp(skb); | ||
1474 | skb_queue_tail(&other->sk_receive_queue, skb); | 1516 | skb_queue_tail(&other->sk_receive_queue, skb); |
1475 | unix_state_unlock(other); | 1517 | unix_state_unlock(other); |
1476 | other->sk_data_ready(other, len); | 1518 | other->sk_data_ready(other, len); |
@@ -1501,6 +1543,7 @@ static int unix_stream_sendmsg(struct kiocb *kiocb, struct socket *sock, | |||
1501 | struct sk_buff *skb; | 1543 | struct sk_buff *skb; |
1502 | int sent = 0; | 1544 | int sent = 0; |
1503 | struct scm_cookie tmp_scm; | 1545 | struct scm_cookie tmp_scm; |
1546 | bool fds_sent = false; | ||
1504 | 1547 | ||
1505 | if (NULL == siocb->scm) | 1548 | if (NULL == siocb->scm) |
1506 | siocb->scm = &tmp_scm; | 1549 | siocb->scm = &tmp_scm; |
@@ -1561,14 +1604,14 @@ static int unix_stream_sendmsg(struct kiocb *kiocb, struct socket *sock, | |||
1561 | */ | 1604 | */ |
1562 | size = min_t(int, size, skb_tailroom(skb)); | 1605 | size = min_t(int, size, skb_tailroom(skb)); |
1563 | 1606 | ||
1564 | memcpy(UNIXCREDS(skb), &siocb->scm->creds, sizeof(struct ucred)); | 1607 | |
1565 | if (siocb->scm->fp) { | 1608 | /* Only send the fds in the first buffer */ |
1566 | err = unix_attach_fds(siocb->scm, skb); | 1609 | err = unix_scm_to_skb(siocb->scm, skb, !fds_sent); |
1567 | if (err) { | 1610 | if (err) { |
1568 | kfree_skb(skb); | 1611 | kfree_skb(skb); |
1569 | goto out_err; | 1612 | goto out_err; |
1570 | } | ||
1571 | } | 1613 | } |
1614 | fds_sent = true; | ||
1572 | 1615 | ||
1573 | err = memcpy_fromiovec(skb_put(skb, size), msg->msg_iov, size); | 1616 | err = memcpy_fromiovec(skb_put(skb, size), msg->msg_iov, size); |
1574 | if (err) { | 1617 | if (err) { |
@@ -1681,11 +1724,14 @@ static int unix_dgram_recvmsg(struct kiocb *iocb, struct socket *sock, | |||
1681 | if (err) | 1724 | if (err) |
1682 | goto out_free; | 1725 | goto out_free; |
1683 | 1726 | ||
1727 | if (sock_flag(sk, SOCK_RCVTSTAMP)) | ||
1728 | __sock_recv_timestamp(msg, sk, skb); | ||
1729 | |||
1684 | if (!siocb->scm) { | 1730 | if (!siocb->scm) { |
1685 | siocb->scm = &tmp_scm; | 1731 | siocb->scm = &tmp_scm; |
1686 | memset(&tmp_scm, 0, sizeof(tmp_scm)); | 1732 | memset(&tmp_scm, 0, sizeof(tmp_scm)); |
1687 | } | 1733 | } |
1688 | siocb->scm->creds = *UNIXCREDS(skb); | 1734 | scm_set_cred(siocb->scm, UNIXCB(skb).pid, UNIXCB(skb).cred); |
1689 | unix_set_secdata(siocb->scm, skb); | 1735 | unix_set_secdata(siocb->scm, skb); |
1690 | 1736 | ||
1691 | if (!(flags & MSG_PEEK)) { | 1737 | if (!(flags & MSG_PEEK)) { |
@@ -1730,7 +1776,7 @@ static long unix_stream_data_wait(struct sock *sk, long timeo) | |||
1730 | unix_state_lock(sk); | 1776 | unix_state_lock(sk); |
1731 | 1777 | ||
1732 | for (;;) { | 1778 | for (;;) { |
1733 | prepare_to_wait(sk->sk_sleep, &wait, TASK_INTERRUPTIBLE); | 1779 | prepare_to_wait(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE); |
1734 | 1780 | ||
1735 | if (!skb_queue_empty(&sk->sk_receive_queue) || | 1781 | if (!skb_queue_empty(&sk->sk_receive_queue) || |
1736 | sk->sk_err || | 1782 | sk->sk_err || |
@@ -1746,7 +1792,7 @@ static long unix_stream_data_wait(struct sock *sk, long timeo) | |||
1746 | clear_bit(SOCK_ASYNC_WAITDATA, &sk->sk_socket->flags); | 1792 | clear_bit(SOCK_ASYNC_WAITDATA, &sk->sk_socket->flags); |
1747 | } | 1793 | } |
1748 | 1794 | ||
1749 | finish_wait(sk->sk_sleep, &wait); | 1795 | finish_wait(sk_sleep(sk), &wait); |
1750 | unix_state_unlock(sk); | 1796 | unix_state_unlock(sk); |
1751 | return timeo; | 1797 | return timeo; |
1752 | } | 1798 | } |
@@ -1834,14 +1880,14 @@ static int unix_stream_recvmsg(struct kiocb *iocb, struct socket *sock, | |||
1834 | 1880 | ||
1835 | if (check_creds) { | 1881 | if (check_creds) { |
1836 | /* Never glue messages from different writers */ | 1882 | /* Never glue messages from different writers */ |
1837 | if (memcmp(UNIXCREDS(skb), &siocb->scm->creds, | 1883 | if ((UNIXCB(skb).pid != siocb->scm->pid) || |
1838 | sizeof(siocb->scm->creds)) != 0) { | 1884 | (UNIXCB(skb).cred != siocb->scm->cred)) { |
1839 | skb_queue_head(&sk->sk_receive_queue, skb); | 1885 | skb_queue_head(&sk->sk_receive_queue, skb); |
1840 | break; | 1886 | break; |
1841 | } | 1887 | } |
1842 | } else { | 1888 | } else { |
1843 | /* Copy credentials */ | 1889 | /* Copy credentials */ |
1844 | siocb->scm->creds = *UNIXCREDS(skb); | 1890 | scm_set_cred(siocb->scm, UNIXCB(skb).pid, UNIXCB(skb).cred); |
1845 | check_creds = 1; | 1891 | check_creds = 1; |
1846 | } | 1892 | } |
1847 | 1893 | ||
@@ -1874,7 +1920,7 @@ static int unix_stream_recvmsg(struct kiocb *iocb, struct socket *sock, | |||
1874 | break; | 1920 | break; |
1875 | } | 1921 | } |
1876 | 1922 | ||
1877 | kfree_skb(skb); | 1923 | consume_skb(skb); |
1878 | 1924 | ||
1879 | if (siocb->scm->fp) | 1925 | if (siocb->scm->fp) |
1880 | break; | 1926 | break; |
@@ -1925,12 +1971,10 @@ static int unix_shutdown(struct socket *sock, int mode) | |||
1925 | other->sk_shutdown |= peer_mode; | 1971 | other->sk_shutdown |= peer_mode; |
1926 | unix_state_unlock(other); | 1972 | unix_state_unlock(other); |
1927 | other->sk_state_change(other); | 1973 | other->sk_state_change(other); |
1928 | read_lock(&other->sk_callback_lock); | ||
1929 | if (peer_mode == SHUTDOWN_MASK) | 1974 | if (peer_mode == SHUTDOWN_MASK) |
1930 | sk_wake_async(other, SOCK_WAKE_WAITD, POLL_HUP); | 1975 | sk_wake_async(other, SOCK_WAKE_WAITD, POLL_HUP); |
1931 | else if (peer_mode & RCV_SHUTDOWN) | 1976 | else if (peer_mode & RCV_SHUTDOWN) |
1932 | sk_wake_async(other, SOCK_WAKE_WAITD, POLL_IN); | 1977 | sk_wake_async(other, SOCK_WAKE_WAITD, POLL_IN); |
1933 | read_unlock(&other->sk_callback_lock); | ||
1934 | } | 1978 | } |
1935 | if (other) | 1979 | if (other) |
1936 | sock_put(other); | 1980 | sock_put(other); |
@@ -1985,7 +2029,7 @@ static unsigned int unix_poll(struct file *file, struct socket *sock, poll_table | |||
1985 | struct sock *sk = sock->sk; | 2029 | struct sock *sk = sock->sk; |
1986 | unsigned int mask; | 2030 | unsigned int mask; |
1987 | 2031 | ||
1988 | sock_poll_wait(file, sk->sk_sleep, wait); | 2032 | sock_poll_wait(file, sk_sleep(sk), wait); |
1989 | mask = 0; | 2033 | mask = 0; |
1990 | 2034 | ||
1991 | /* exceptional events? */ | 2035 | /* exceptional events? */ |
@@ -1994,11 +2038,10 @@ static unsigned int unix_poll(struct file *file, struct socket *sock, poll_table | |||
1994 | if (sk->sk_shutdown == SHUTDOWN_MASK) | 2038 | if (sk->sk_shutdown == SHUTDOWN_MASK) |
1995 | mask |= POLLHUP; | 2039 | mask |= POLLHUP; |
1996 | if (sk->sk_shutdown & RCV_SHUTDOWN) | 2040 | if (sk->sk_shutdown & RCV_SHUTDOWN) |
1997 | mask |= POLLRDHUP; | 2041 | mask |= POLLRDHUP | POLLIN | POLLRDNORM; |
1998 | 2042 | ||
1999 | /* readable? */ | 2043 | /* readable? */ |
2000 | if (!skb_queue_empty(&sk->sk_receive_queue) || | 2044 | if (!skb_queue_empty(&sk->sk_receive_queue)) |
2001 | (sk->sk_shutdown & RCV_SHUTDOWN)) | ||
2002 | mask |= POLLIN | POLLRDNORM; | 2045 | mask |= POLLIN | POLLRDNORM; |
2003 | 2046 | ||
2004 | /* Connection-based need to check for termination and startup */ | 2047 | /* Connection-based need to check for termination and startup */ |
@@ -2022,7 +2065,7 @@ static unsigned int unix_dgram_poll(struct file *file, struct socket *sock, | |||
2022 | struct sock *sk = sock->sk, *other; | 2065 | struct sock *sk = sock->sk, *other; |
2023 | unsigned int mask, writable; | 2066 | unsigned int mask, writable; |
2024 | 2067 | ||
2025 | sock_poll_wait(file, sk->sk_sleep, wait); | 2068 | sock_poll_wait(file, sk_sleep(sk), wait); |
2026 | mask = 0; | 2069 | mask = 0; |
2027 | 2070 | ||
2028 | /* exceptional events? */ | 2071 | /* exceptional events? */ |
@@ -2211,14 +2254,14 @@ static const struct file_operations unix_seq_fops = { | |||
2211 | 2254 | ||
2212 | #endif | 2255 | #endif |
2213 | 2256 | ||
2214 | static struct net_proto_family unix_family_ops = { | 2257 | static const struct net_proto_family unix_family_ops = { |
2215 | .family = PF_UNIX, | 2258 | .family = PF_UNIX, |
2216 | .create = unix_create, | 2259 | .create = unix_create, |
2217 | .owner = THIS_MODULE, | 2260 | .owner = THIS_MODULE, |
2218 | }; | 2261 | }; |
2219 | 2262 | ||
2220 | 2263 | ||
2221 | static int unix_net_init(struct net *net) | 2264 | static int __net_init unix_net_init(struct net *net) |
2222 | { | 2265 | { |
2223 | int error = -ENOMEM; | 2266 | int error = -ENOMEM; |
2224 | 2267 | ||
@@ -2237,7 +2280,7 @@ out: | |||
2237 | return error; | 2280 | return error; |
2238 | } | 2281 | } |
2239 | 2282 | ||
2240 | static void unix_net_exit(struct net *net) | 2283 | static void __net_exit unix_net_exit(struct net *net) |
2241 | { | 2284 | { |
2242 | unix_sysctl_unregister(net); | 2285 | unix_sysctl_unregister(net); |
2243 | proc_net_remove(net, "unix"); | 2286 | proc_net_remove(net, "unix"); |