From nobody Fri May 17 18:17:14 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=fail; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=nongnu.org ARC-Seal: i=1; a=rsa-sha256; t=1601312990; cv=none; d=zohomail.com; s=zohoarc; b=ADkzZwHVy1iNEFgIt/TASI7KwVWtXIwJ/WkwbNy1t0ua1YH0lL6MtrfYyRc3RzUDniIgFykHsgrDuw6IFdu+zdb/RbSQZ68aXJToOI3InXUAqeiPMxPf6t8IrAaftDkzWUhnxKKZx5HHlVbhDWy+YJ2Ozf3IpAlGL+Ko8Iw5tCo= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1601312990; h=Content-Type:Cc:Date:From:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:Sender:Subject:To; bh=r2z/0S/+EexBGPMj4qZ6jn8YkQTeXvVhIN9ixM5IVho=; b=jXSqd5n6O8gh/QRo2/KYvr4Dr6qrFFsIszsY+uhxC0T2npTMYSxboFfHV0QlMbsfihCdj9TjLyU/Vpc2Yvz0tWCSjlM7PM0fIuAfvWhaJnrveevTjPIt0wapquI3Ct1bzMDu0lxQbNiK4ioa4Z1DQxFwNTQ7TqVTuyQbmt7KsQI= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=fail; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1601312990482503.70708714629825; Mon, 28 Sep 2020 10:09:50 -0700 (PDT) Received: from localhost ([::1]:41312 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1kMwer-0000i6-5o for importer@patchew.org; Mon, 28 Sep 2020 13:09:49 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:43564) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from <33xdyXwMKCtgM6QAIIAF8.6IGK8GO-78P8FHIHAHO.ILA@flex--scw.bounces.google.com>) id 1kMwar-0005nk-Gh for qemu-devel@nongnu.org; Mon, 28 Sep 2020 13:05:43 -0400 Received: from mail-yb1-xb49.google.com ([2607:f8b0:4864:20::b49]:54353) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from <33xdyXwMKCtgM6QAIIAF8.6IGK8GO-78P8FHIHAHO.ILA@flex--scw.bounces.google.com>) id 1kMwan-0004nS-JW for qemu-devel@nongnu.org; Mon, 28 Sep 2020 13:05:41 -0400 Received: by mail-yb1-xb49.google.com with SMTP id s128so1695171ybc.21 for ; Mon, 28 Sep 2020 10:05:35 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=sender:date:message-id:mime-version:subject:from:to:cc; bh=r2z/0S/+EexBGPMj4qZ6jn8YkQTeXvVhIN9ixM5IVho=; b=S6Ty7CqIEi+Tsw6h5pUz7GgAOlQwMhKonm2lRI70wmb/TZtIWDdOAJncHN0DkE2wYq dpn7r3gMOZ0cjQy51+ba3U2eb7DE1ZZk+Gj0sYA4KsFnRLuHy7zKFFTCeLDwmnoWGq80 IK/P1iNMqcgIRdRDBzmFd/iPRpSqBMtcg6Hqbi9Tvm2N4GGeQVRiiLv9HFeJtgkj5IiS FtUxj88EG1qtFO/xGX7BCRsu3yG4bMgdCnoTvRAjTnm9Z1PcmALl4bN1vCMlzhzkCDxZ 4dCN7oj/35WhskR+d7JfS000aR2ypLSDcS3H5Kyt7Qp48JHuL1LMZIhT+cSWmGcUnpQh XhDA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:message-id:mime-version:subject:from :to:cc; bh=r2z/0S/+EexBGPMj4qZ6jn8YkQTeXvVhIN9ixM5IVho=; b=R3k1EsQ8gSi+m4rYdSHt36KRm5kpTTZybelt8PF/CM0ika4sFbLuEQcRMciu0/vFJH CUYgojrUwsTJ5b+OgsxIg6Gz6whVonS5X2l3h1OOq7Furji23iRSrBKaXi1GqypGusUe o3srJi3VlX97reWRCS4qLRHdwwUrjwHUqJP87mGVNm55zzqTmJYdJX3VGsT93NuXTAV2 HKhmdiRjUOvJ59g1ldwjfqn6BUkWv/hPX1RDCFCK1qkOaeaudHNq5c8a10iZal7KgqrR XjiGMhWuL05R9oZdC+cyWxKzEKm6/yYhcygM0Q8J0zU2jjCXldOoGH2y8RA9QeeE5mf+ 43Aw== X-Gm-Message-State: AOAM531CKhgl5Vpthyp1kkTzlePP1Fu4D3//kxzuYKZ0PCNKGdtt0W/2 s4IywE/1o5m5MeWZfKcMfWLrcmkLy4CMInJY43ZiR8d+7sAfVallhAQHH00VkCe87qhLH0MsSh/ 18LwdsLi8n99dL8f30DqgSMB0u37mZQ1MfSE/RZ/+3zs1OWFQR0Sq X-Google-Smtp-Source: ABdhPJzv469nB/Rw+bo7+FP4837qK+FazVRJsi7Nx1gSl+GGRSRKbs+YzAt9W/65kijRDHMH+NMzxU4= X-Received: from scw-glinux.svl.corp.google.com ([2620:15c:2ce:200:f693:9fff:fef4:29b5]) (user=scw job=sendgmr) by 2002:a25:ad43:: with SMTP id l3mr668983ybe.157.1601312735038; Mon, 28 Sep 2020 10:05:35 -0700 (PDT) Date: Mon, 28 Sep 2020 10:05:27 -0700 Message-Id: <20200928170527.554080-1-scw@google.com> Mime-Version: 1.0 X-Mailer: git-send-email 2.28.0.709.gb0816b6eb0-goog Subject: [PATCH v3] linux-user: Add most IFTUN ioctls To: qemu-devel@nongnu.org, laurent@vivier.eu Cc: Shu-Chun Weng , riku.voipio@iki.fi, Josh Kunz Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=2607:f8b0:4864:20::b49; envelope-from=33xdyXwMKCtgM6QAIIAF8.6IGK8GO-78P8FHIHAHO.ILA@flex--scw.bounces.google.com; helo=mail-yb1-xb49.google.com X-detected-operating-system: by eggs.gnu.org: No matching host in p0f cache. That's all we know. X-Spam_score_int: -100 X-Spam_score: -10.1 X-Spam_bar: ---------- X-Spam_report: (-10.1 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_MED=-0.468, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" Reply-to: Shu-Chun Weng From: Shu-Chun Weng via X-ZohoMail-DKIM: fail (Header signature does not verify) Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The three options handling `struct sock_fprog` (TUNATTACHFILTER, TUNDETACHFILTER, and TUNGETFILTER) are not implemented. Linux kernel keeps a user space pointer in them which we cannot correctly handle. Signed-off-by: Josh Kunz Signed-off-by: Shu-Chun Weng --- v3: IOCTL_SPECIAL(TUNSETTXFILTER) type changed to MK_PTR(TYPE_PTRVOID) for st= race to display the raw pointer. Updated do_ioctl_TUNSETTXFILTER for correct usages of unlock_user() and offsetof(). linux-user/ioctls.h | 46 +++++++++++++++++++++++++++++++++++++++ linux-user/syscall.c | 38 ++++++++++++++++++++++++++++++++ linux-user/syscall_defs.h | 32 +++++++++++++++++++++++++++ 3 files changed, 116 insertions(+) diff --git a/linux-user/ioctls.h b/linux-user/ioctls.h index 0713ae1311..218ae21659 100644 --- a/linux-user/ioctls.h +++ b/linux-user/ioctls.h @@ -593,3 +593,49 @@ IOCTL(KCOV_DISABLE, 0, TYPE_NULL) IOCTL(KCOV_INIT_TRACE, IOC_R, TYPE_ULONG) #endif + + IOCTL(TUNSETDEBUG, IOC_W, TYPE_INT) + IOCTL(TUNSETIFF, IOC_RW, MK_PTR(MK_STRUCT(STRUCT_short_ifreq))) + IOCTL(TUNSETPERSIST, IOC_W, TYPE_INT) + IOCTL(TUNSETOWNER, IOC_W, TYPE_INT) + IOCTL(TUNSETLINK, IOC_W, TYPE_INT) + IOCTL(TUNSETGROUP, IOC_W, TYPE_INT) + IOCTL(TUNGETFEATURES, IOC_R, MK_PTR(TYPE_INT)) + IOCTL(TUNSETOFFLOAD, IOC_W, TYPE_LONG) + IOCTL_SPECIAL(TUNSETTXFILTER, IOC_W, do_ioctl_TUNSETTXFILTER, + /* + * We can't represent `struct tun_filter` in thunk so leav= ing + * it uninterpreted. do_ioctl_TUNSETTXFILTER will do the + * conversion. + */ + MK_PTR(TYPE_PTRVOID)) + IOCTL(TUNGETIFF, IOC_R, MK_PTR(MK_STRUCT(STRUCT_short_ifreq))) + IOCTL(TUNGETSNDBUF, IOC_R, MK_PTR(TYPE_INT)) + IOCTL(TUNSETSNDBUF, IOC_W, MK_PTR(TYPE_INT)) + /* + * TUNATTACHFILTER and TUNDETACHFILTER are not supported. Linux kernel k= eeps a + * user pointer in TUNATTACHFILTER, which we are not able to correctly h= andle. + */ + IOCTL(TUNGETVNETHDRSZ, IOC_R, MK_PTR(TYPE_INT)) + IOCTL(TUNSETVNETHDRSZ, IOC_W, MK_PTR(TYPE_INT)) + IOCTL(TUNSETQUEUE, IOC_W, MK_PTR(MK_STRUCT(STRUCT_short_ifreq))) + IOCTL(TUNSETIFINDEX , IOC_W, MK_PTR(TYPE_INT)) + /* TUNGETFILTER is not supported: see TUNATTACHFILTER. */ + IOCTL(TUNSETVNETLE, IOC_W, MK_PTR(TYPE_INT)) + IOCTL(TUNGETVNETLE, IOC_R, MK_PTR(TYPE_INT)) +#ifdef TUNSETVNETBE + IOCTL(TUNSETVNETBE, IOC_W, MK_PTR(TYPE_INT)) + IOCTL(TUNGETVNETBE, IOC_R, MK_PTR(TYPE_INT)) +#endif +#ifdef TUNSETSTEERINGEBPF + IOCTL(TUNSETSTEERINGEBPF, IOC_W, MK_PTR(TYPE_INT)) +#endif +#ifdef TUNSETFILTEREBPF + IOCTL(TUNSETFILTEREBPF, IOC_W, MK_PTR(TYPE_INT)) +#endif +#ifdef TUNSETCARRIER + IOCTL(TUNSETCARRIER, IOC_W, MK_PTR(TYPE_INT)) +#endif +#ifdef TUNGETDEVNETNS + IOCTL(TUNGETDEVNETNS, IOC_R, TYPE_NULL) +#endif diff --git a/linux-user/syscall.c b/linux-user/syscall.c index 945fc25279..1c955bc675 100644 --- a/linux-user/syscall.c +++ b/linux-user/syscall.c @@ -56,6 +56,7 @@ #include #include #include +#include #include #include #ifdef CONFIG_TIMERFD @@ -5415,6 +5416,43 @@ static abi_long do_ioctl_drm(const IOCTLEntry *ie, u= int8_t *buf_temp, =20 #endif =20 +static abi_long do_ioctl_TUNSETTXFILTER(const IOCTLEntry *ie, uint8_t *buf= _temp, + int fd, int cmd, abi_long arg) +{ + struct tun_filter *filter =3D (struct tun_filter *)buf_temp; + struct tun_filter *target_filter; + char *target_addr; + + assert(ie->access =3D=3D IOC_W); + + target_filter =3D lock_user(VERIFY_READ, arg, sizeof(*target_filter), = 1); + if (!target_filter) { + return -TARGET_EFAULT; + } + filter->flags =3D tswap16(target_filter->flags); + filter->count =3D tswap16(target_filter->count); + unlock_user(target_filter, arg, 0); + + if (filter->count) { + if (offsetof(struct tun_filter, addr) + filter->count * ETH_ALEN > + MAX_STRUCT_SIZE) { + return -TARGET_EFAULT; + } + + target_addr =3D lock_user(VERIFY_READ, + arg + offsetof(struct tun_filter, addr), + filter->count * ETH_ALEN, 1); + if (!target_addr) { + return -TARGET_EFAULT; + } + memcpy(filter->addr, target_addr, filter->count * ETH_ALEN); + unlock_user(target_addr, arg + offsetof(struct tun_filter, addr), + filter->count * ETH_ALEN); + } + + return get_errno(safe_ioctl(fd, ie->host_cmd, filter)); +} + IOCTLEntry ioctl_entries[] =3D { #define IOCTL(cmd, access, ...) \ { TARGET_ ## cmd, cmd, #cmd, access, 0, { __VA_ARGS__ } }, diff --git a/linux-user/syscall_defs.h b/linux-user/syscall_defs.h index 3c261cff0e..7ef0ff0328 100644 --- a/linux-user/syscall_defs.h +++ b/linux-user/syscall_defs.h @@ -891,6 +891,38 @@ struct target_rtc_pll_info { =20 #define TARGET_SIOCGIWNAME 0x8B01 /* get name =3D=3D wireless= protocol */ =20 +/* From */ + +#define TARGET_TUNSETDEBUG TARGET_IOW('T', 201, int) +#define TARGET_TUNSETIFF TARGET_IOW('T', 202, int) +#define TARGET_TUNSETPERSIST TARGET_IOW('T', 203, int) +#define TARGET_TUNSETOWNER TARGET_IOW('T', 204, int) +#define TARGET_TUNSETLINK TARGET_IOW('T', 205, int) +#define TARGET_TUNSETGROUP TARGET_IOW('T', 206, int) +#define TARGET_TUNGETFEATURES TARGET_IOR('T', 207, unsigned int) +#define TARGET_TUNSETOFFLOAD TARGET_IOW('T', 208, unsigned int) +#define TARGET_TUNSETTXFILTER TARGET_IOW('T', 209, unsigned int) +#define TARGET_TUNGETIFF TARGET_IOR('T', 210, unsigned int) +#define TARGET_TUNGETSNDBUF TARGET_IOR('T', 211, int) +#define TARGET_TUNSETSNDBUF TARGET_IOW('T', 212, int) +/* + * TUNATTACHFILTER and TUNDETACHFILTER are not supported. Linux kernel kee= ps a + * user pointer in TUNATTACHFILTER, which we are not able to correctly han= dle. + */ +#define TARGET_TUNGETVNETHDRSZ TARGET_IOR('T', 215, int) +#define TARGET_TUNSETVNETHDRSZ TARGET_IOW('T', 216, int) +#define TARGET_TUNSETQUEUE TARGET_IOW('T', 217, int) +#define TARGET_TUNSETIFINDEX TARGET_IOW('T', 218, unsigned int) +/* TUNGETFILTER is not supported: see TUNATTACHFILTER. */ +#define TARGET_TUNSETVNETLE TARGET_IOW('T', 220, int) +#define TARGET_TUNGETVNETLE TARGET_IOR('T', 221, int) +#define TARGET_TUNSETVNETBE TARGET_IOW('T', 222, int) +#define TARGET_TUNGETVNETBE TARGET_IOR('T', 223, int) +#define TARGET_TUNSETSTEERINGEBPF TARGET_IOR('T', 224, int) +#define TARGET_TUNSETFILTEREBPF TARGET_IOR('T', 225, int) +#define TARGET_TUNSETCARRIER TARGET_IOW('T', 226, int) +#define TARGET_TUNGETDEVNETNS TARGET_IO('T', 227) + /* From */ =20 #define TARGET_RNDGETENTCNT TARGET_IOR('R', 0x00, int) --=20 2.28.0.709.gb0816b6eb0-goog