Commit 607175e0fb53f5f207fb9a1e8340566e616735aa
1 parent
7d8cec95
linux-user: unix sockets - fix running dbus
dbus sends too short (according to man 7 unix) addrlen for it's unix socket. I've been told that happens with other applications as well. Linux kernel doesn't appear to mind, so I guess we whould be tolerant as well. Expand sockaddr with +1 to fit the \0 of the pathname passed. (scratchbox1 qemu had a very different workaround for the same issue). Signed-off-by: Riku Voipio <riku.voipio@iki.fi> Signed-off-by: Aurelien Jarno <aurelien@aurel32.net> git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@7116 c046a42c-6fe2-441c-8c8c-71466251a162
Showing
1 changed file
with
27 additions
and
2 deletions
linux-user/syscall.c
@@ -44,6 +44,7 @@ | @@ -44,6 +44,7 @@ | ||
44 | #include <signal.h> | 44 | #include <signal.h> |
45 | #include <sched.h> | 45 | #include <sched.h> |
46 | #include <sys/socket.h> | 46 | #include <sys/socket.h> |
47 | +#include <sys/un.h> | ||
47 | #include <sys/uio.h> | 48 | #include <sys/uio.h> |
48 | #include <sys/poll.h> | 49 | #include <sys/poll.h> |
49 | #include <sys/times.h> | 50 | #include <sys/times.h> |
@@ -735,13 +736,37 @@ static inline abi_long target_to_host_sockaddr(struct sockaddr *addr, | @@ -735,13 +736,37 @@ static inline abi_long target_to_host_sockaddr(struct sockaddr *addr, | ||
735 | abi_ulong target_addr, | 736 | abi_ulong target_addr, |
736 | socklen_t len) | 737 | socklen_t len) |
737 | { | 738 | { |
739 | + const socklen_t unix_maxlen = sizeof (struct sockaddr_un); | ||
740 | + sa_family_t sa_family; | ||
738 | struct target_sockaddr *target_saddr; | 741 | struct target_sockaddr *target_saddr; |
739 | 742 | ||
740 | target_saddr = lock_user(VERIFY_READ, target_addr, len, 1); | 743 | target_saddr = lock_user(VERIFY_READ, target_addr, len, 1); |
741 | if (!target_saddr) | 744 | if (!target_saddr) |
742 | return -TARGET_EFAULT; | 745 | return -TARGET_EFAULT; |
746 | + | ||
747 | + sa_family = tswap16(target_saddr->sa_family); | ||
748 | + | ||
749 | + /* Oops. The caller might send a incomplete sun_path; sun_path | ||
750 | + * must be terminated by \0 (see the manual page), but | ||
751 | + * unfortunately it is quite common to specify sockaddr_un | ||
752 | + * length as "strlen(x->sun_path)" while it should be | ||
753 | + * "strlen(...) + 1". We'll fix that here if needed. | ||
754 | + * Linux kernel has a similar feature. | ||
755 | + */ | ||
756 | + | ||
757 | + if (sa_family == AF_UNIX) { | ||
758 | + if (len < unix_maxlen && len > 0) { | ||
759 | + char *cp = (char*)target_saddr; | ||
760 | + | ||
761 | + if ( cp[len-1] && !cp[len] ) | ||
762 | + len++; | ||
763 | + } | ||
764 | + if (len > unix_maxlen) | ||
765 | + len = unix_maxlen; | ||
766 | + } | ||
767 | + | ||
743 | memcpy(addr, target_saddr, len); | 768 | memcpy(addr, target_saddr, len); |
744 | - addr->sa_family = tswap16(target_saddr->sa_family); | 769 | + addr->sa_family = sa_family; |
745 | unlock_user(target_saddr, target_addr, 0); | 770 | unlock_user(target_saddr, target_addr, 0); |
746 | 771 | ||
747 | return 0; | 772 | return 0; |
@@ -1195,7 +1220,7 @@ static abi_long do_bind(int sockfd, abi_ulong target_addr, | @@ -1195,7 +1220,7 @@ static abi_long do_bind(int sockfd, abi_ulong target_addr, | ||
1195 | if (addrlen < 0 || addrlen > MAX_SOCK_ADDR) | 1220 | if (addrlen < 0 || addrlen > MAX_SOCK_ADDR) |
1196 | return -TARGET_EINVAL; | 1221 | return -TARGET_EINVAL; |
1197 | 1222 | ||
1198 | - addr = alloca(addrlen); | 1223 | + addr = alloca(addrlen+1); |
1199 | 1224 | ||
1200 | target_to_host_sockaddr(addr, target_addr, addrlen); | 1225 | target_to_host_sockaddr(addr, target_addr, addrlen); |
1201 | return get_errno(bind(sockfd, addr, addrlen)); | 1226 | return get_errno(bind(sockfd, addr, addrlen)); |