Skip to content

Commit

Permalink
netfilter: switch nf_setsockopt to sockptr_t
Browse files Browse the repository at this point in the history
Pass a sockptr_t to prepare for set_fs-less handling of the kernel
pointer from bpf-cgroup.

Signed-off-by: Christoph Hellwig <[email protected]>
Signed-off-by: David S. Miller <[email protected]>
  • Loading branch information
Christoph Hellwig authored and davem330 committed Jul 24, 2020
1 parent ab214d1 commit c2f1263
Show file tree
Hide file tree
Showing 10 changed files with 68 additions and 66 deletions.
6 changes: 4 additions & 2 deletions include/linux/netfilter.h
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,7 @@
#include <linux/static_key.h>
#include <linux/netfilter_defs.h>
#include <linux/netdevice.h>
#include <linux/sockptr.h>
#include <net/net_namespace.h>

static inline int NF_DROP_GETERR(int verdict)
Expand Down Expand Up @@ -163,7 +164,8 @@ struct nf_sockopt_ops {
/* Non-inclusive ranges: use 0/0/NULL to never get called. */
int set_optmin;
int set_optmax;
int (*set)(struct sock *sk, int optval, void __user *user, unsigned int len);
int (*set)(struct sock *sk, int optval, sockptr_t arg,
unsigned int len);
int get_optmin;
int get_optmax;
int (*get)(struct sock *sk, int optval, void __user *user, int *len);
Expand Down Expand Up @@ -338,7 +340,7 @@ NF_HOOK_LIST(uint8_t pf, unsigned int hook, struct net *net, struct sock *sk,
}

/* Call setsockopt() */
int nf_setsockopt(struct sock *sk, u_int8_t pf, int optval, char __user *opt,
int nf_setsockopt(struct sock *sk, u_int8_t pf, int optval, sockptr_t opt,
unsigned int len);
int nf_getsockopt(struct sock *sk, u_int8_t pf, int optval, char __user *opt,
int *len);
Expand Down
37 changes: 17 additions & 20 deletions net/bridge/netfilter/ebtables.c
Original file line number Diff line number Diff line change
Expand Up @@ -1063,14 +1063,13 @@ static int do_replace_finish(struct net *net, struct ebt_replace *repl,
}

/* replace the table */
static int do_replace(struct net *net, const void __user *user,
unsigned int len)
static int do_replace(struct net *net, sockptr_t arg, unsigned int len)
{
int ret, countersize;
struct ebt_table_info *newinfo;
struct ebt_replace tmp;

if (copy_from_user(&tmp, user, sizeof(tmp)) != 0)
if (copy_from_sockptr(&tmp, arg, sizeof(tmp)) != 0)
return -EFAULT;

if (len != sizeof(tmp) + tmp.entries_size)
Expand Down Expand Up @@ -1286,12 +1285,11 @@ static int do_update_counters(struct net *net, const char *name,
return ret;
}

static int update_counters(struct net *net, const void __user *user,
unsigned int len)
static int update_counters(struct net *net, sockptr_t arg, unsigned int len)
{
struct ebt_replace hlp;

if (copy_from_user(&hlp, user, sizeof(hlp)))
if (copy_from_sockptr(&hlp, arg, sizeof(hlp)))
return -EFAULT;

if (len != sizeof(hlp) + hlp.num_counters * sizeof(struct ebt_counter))
Expand Down Expand Up @@ -2079,15 +2077,15 @@ static int compat_copy_entries(unsigned char *data, unsigned int size_user,


static int compat_copy_ebt_replace_from_user(struct ebt_replace *repl,
void __user *user, unsigned int len)
sockptr_t arg, unsigned int len)
{
struct compat_ebt_replace tmp;
int i;

if (len < sizeof(tmp))
return -EINVAL;

if (copy_from_user(&tmp, user, sizeof(tmp)))
if (copy_from_sockptr(&tmp, arg, sizeof(tmp)))
return -EFAULT;

if (len != sizeof(tmp) + tmp.entries_size)
Expand All @@ -2114,19 +2112,18 @@ static int compat_copy_ebt_replace_from_user(struct ebt_replace *repl,
return 0;
}

static int compat_do_replace(struct net *net, void __user *user,
unsigned int len)
static int compat_do_replace(struct net *net, sockptr_t arg, unsigned int len)
{
int ret, i, countersize, size64;
struct ebt_table_info *newinfo;
struct ebt_replace tmp;
struct ebt_entries_buf_state state;
void *entries_tmp;

ret = compat_copy_ebt_replace_from_user(&tmp, user, len);
ret = compat_copy_ebt_replace_from_user(&tmp, arg, len);
if (ret) {
/* try real handler in case userland supplied needed padding */
if (ret == -EINVAL && do_replace(net, user, len) == 0)
if (ret == -EINVAL && do_replace(net, arg, len) == 0)
ret = 0;
return ret;
}
Expand Down Expand Up @@ -2217,17 +2214,17 @@ static int compat_do_replace(struct net *net, void __user *user,
goto free_entries;
}

static int compat_update_counters(struct net *net, void __user *user,
static int compat_update_counters(struct net *net, sockptr_t arg,
unsigned int len)
{
struct compat_ebt_replace hlp;

if (copy_from_user(&hlp, user, sizeof(hlp)))
if (copy_from_sockptr(&hlp, arg, sizeof(hlp)))
return -EFAULT;

/* try real handler in case userland supplied needed padding */
if (len != sizeof(hlp) + hlp.num_counters * sizeof(struct ebt_counter))
return update_counters(net, user, len);
return update_counters(net, arg, len);

return do_update_counters(net, hlp.name, compat_ptr(hlp.counters),
hlp.num_counters, len);
Expand Down Expand Up @@ -2368,7 +2365,7 @@ static int do_ebt_get_ctl(struct sock *sk, int cmd, void __user *user, int *len)
return ret;
}

static int do_ebt_set_ctl(struct sock *sk, int cmd, void __user *user,
static int do_ebt_set_ctl(struct sock *sk, int cmd, sockptr_t arg,
unsigned int len)
{
struct net *net = sock_net(sk);
Expand All @@ -2381,18 +2378,18 @@ static int do_ebt_set_ctl(struct sock *sk, int cmd, void __user *user,
case EBT_SO_SET_ENTRIES:
#ifdef CONFIG_COMPAT
if (in_compat_syscall())
ret = compat_do_replace(net, user, len);
ret = compat_do_replace(net, arg, len);
else
#endif
ret = do_replace(net, user, len);
ret = do_replace(net, arg, len);
break;
case EBT_SO_SET_COUNTERS:
#ifdef CONFIG_COMPAT
if (in_compat_syscall())
ret = compat_update_counters(net, user, len);
ret = compat_update_counters(net, arg, len);
else
#endif
ret = update_counters(net, user, len);
ret = update_counters(net, arg, len);
break;
default:
ret = -EINVAL;
Expand Down
3 changes: 2 additions & 1 deletion net/decnet/af_decnet.c
Original file line number Diff line number Diff line change
Expand Up @@ -1332,7 +1332,8 @@ static int dn_setsockopt(struct socket *sock, int level, int optname, char __use
/* we need to exclude all possible ENOPROTOOPTs except default case */
if (err == -ENOPROTOOPT && optname != DSO_LINKINFO &&
optname != DSO_STREAM && optname != DSO_SEQPACKET)
err = nf_setsockopt(sk, PF_DECnet, optname, optval, optlen);
err = nf_setsockopt(sk, PF_DECnet, optname,
USER_SOCKPTR(optval), optlen);
#endif

return err;
Expand Down
3 changes: 2 additions & 1 deletion net/ipv4/ip_sockglue.c
Original file line number Diff line number Diff line change
Expand Up @@ -1422,7 +1422,8 @@ int ip_setsockopt(struct sock *sk, int level,
optname != IP_IPSEC_POLICY &&
optname != IP_XFRM_POLICY &&
!ip_mroute_opt(optname))
err = nf_setsockopt(sk, PF_INET, optname, optval, optlen);
err = nf_setsockopt(sk, PF_INET, optname, USER_SOCKPTR(optval),
optlen);
#endif
return err;
}
Expand Down
28 changes: 14 additions & 14 deletions net/ipv4/netfilter/arp_tables.c
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
// SPDX-License-Identifier: GPL-2.0-only

/*
* Packet matching code for ARP packets.
*
Expand Down Expand Up @@ -947,16 +947,15 @@ static int __do_replace(struct net *net, const char *name,
return ret;
}

static int do_replace(struct net *net, const void __user *user,
unsigned int len)
static int do_replace(struct net *net, sockptr_t arg, unsigned int len)
{
int ret;
struct arpt_replace tmp;
struct xt_table_info *newinfo;
void *loc_cpu_entry;
struct arpt_entry *iter;

if (copy_from_user(&tmp, user, sizeof(tmp)) != 0)
if (copy_from_sockptr(&tmp, arg, sizeof(tmp)) != 0)
return -EFAULT;

/* overflow check */
Expand All @@ -972,8 +971,8 @@ static int do_replace(struct net *net, const void __user *user,
return -ENOMEM;

loc_cpu_entry = newinfo->entries;
if (copy_from_user(loc_cpu_entry, user + sizeof(tmp),
tmp.size) != 0) {
sockptr_advance(arg, sizeof(tmp));
if (copy_from_sockptr(loc_cpu_entry, arg, tmp.size) != 0) {
ret = -EFAULT;
goto free_newinfo;
}
Expand Down Expand Up @@ -1244,16 +1243,15 @@ static int translate_compat_table(struct net *net,
return ret;
}

static int compat_do_replace(struct net *net, void __user *user,
unsigned int len)
static int compat_do_replace(struct net *net, sockptr_t arg, unsigned int len)
{
int ret;
struct compat_arpt_replace tmp;
struct xt_table_info *newinfo;
void *loc_cpu_entry;
struct arpt_entry *iter;

if (copy_from_user(&tmp, user, sizeof(tmp)) != 0)
if (copy_from_sockptr(&tmp, arg, sizeof(tmp)) != 0)
return -EFAULT;

/* overflow check */
Expand All @@ -1269,7 +1267,8 @@ static int compat_do_replace(struct net *net, void __user *user,
return -ENOMEM;

loc_cpu_entry = newinfo->entries;
if (copy_from_user(loc_cpu_entry, user + sizeof(tmp), tmp.size) != 0) {
sockptr_advance(arg, sizeof(tmp));
if (copy_from_sockptr(loc_cpu_entry, arg, tmp.size) != 0) {
ret = -EFAULT;
goto free_newinfo;
}
Expand Down Expand Up @@ -1401,7 +1400,8 @@ static int compat_get_entries(struct net *net,
}
#endif

static int do_arpt_set_ctl(struct sock *sk, int cmd, void __user *user, unsigned int len)
static int do_arpt_set_ctl(struct sock *sk, int cmd, sockptr_t arg,
unsigned int len)
{
int ret;

Expand All @@ -1412,14 +1412,14 @@ static int do_arpt_set_ctl(struct sock *sk, int cmd, void __user *user, unsigned
case ARPT_SO_SET_REPLACE:
#ifdef CONFIG_COMPAT
if (in_compat_syscall())
ret = compat_do_replace(sock_net(sk), user, len);
ret = compat_do_replace(sock_net(sk), arg, len);
else
#endif
ret = do_replace(sock_net(sk), user, len);
ret = do_replace(sock_net(sk), arg, len);
break;

case ARPT_SO_SET_ADD_COUNTERS:
ret = do_add_counters(sock_net(sk), USER_SOCKPTR(user), len);
ret = do_add_counters(sock_net(sk), arg, len);
break;

default:
Expand Down
24 changes: 12 additions & 12 deletions net/ipv4/netfilter/ip_tables.c
Original file line number Diff line number Diff line change
Expand Up @@ -1102,15 +1102,15 @@ __do_replace(struct net *net, const char *name, unsigned int valid_hooks,
}

static int
do_replace(struct net *net, const void __user *user, unsigned int len)
do_replace(struct net *net, sockptr_t arg, unsigned int len)
{
int ret;
struct ipt_replace tmp;
struct xt_table_info *newinfo;
void *loc_cpu_entry;
struct ipt_entry *iter;

if (copy_from_user(&tmp, user, sizeof(tmp)) != 0)
if (copy_from_sockptr(&tmp, arg, sizeof(tmp)) != 0)
return -EFAULT;

/* overflow check */
Expand All @@ -1126,8 +1126,8 @@ do_replace(struct net *net, const void __user *user, unsigned int len)
return -ENOMEM;

loc_cpu_entry = newinfo->entries;
if (copy_from_user(loc_cpu_entry, user + sizeof(tmp),
tmp.size) != 0) {
sockptr_advance(arg, sizeof(tmp));
if (copy_from_sockptr(loc_cpu_entry, arg, tmp.size) != 0) {
ret = -EFAULT;
goto free_newinfo;
}
Expand Down Expand Up @@ -1484,15 +1484,15 @@ translate_compat_table(struct net *net,
}

static int
compat_do_replace(struct net *net, void __user *user, unsigned int len)
compat_do_replace(struct net *net, sockptr_t arg, unsigned int len)
{
int ret;
struct compat_ipt_replace tmp;
struct xt_table_info *newinfo;
void *loc_cpu_entry;
struct ipt_entry *iter;

if (copy_from_user(&tmp, user, sizeof(tmp)) != 0)
if (copy_from_sockptr(&tmp, arg, sizeof(tmp)) != 0)
return -EFAULT;

/* overflow check */
Expand All @@ -1508,8 +1508,8 @@ compat_do_replace(struct net *net, void __user *user, unsigned int len)
return -ENOMEM;

loc_cpu_entry = newinfo->entries;
if (copy_from_user(loc_cpu_entry, user + sizeof(tmp),
tmp.size) != 0) {
sockptr_advance(arg, sizeof(tmp));
if (copy_from_sockptr(loc_cpu_entry, arg, tmp.size) != 0) {
ret = -EFAULT;
goto free_newinfo;
}
Expand Down Expand Up @@ -1610,7 +1610,7 @@ compat_get_entries(struct net *net, struct compat_ipt_get_entries __user *uptr,
#endif

static int
do_ipt_set_ctl(struct sock *sk, int cmd, void __user *user, unsigned int len)
do_ipt_set_ctl(struct sock *sk, int cmd, sockptr_t arg, unsigned int len)
{
int ret;

Expand All @@ -1621,14 +1621,14 @@ do_ipt_set_ctl(struct sock *sk, int cmd, void __user *user, unsigned int len)
case IPT_SO_SET_REPLACE:
#ifdef CONFIG_COMPAT
if (in_compat_syscall())
ret = compat_do_replace(sock_net(sk), user, len);
ret = compat_do_replace(sock_net(sk), arg, len);
else
#endif
ret = do_replace(sock_net(sk), user, len);
ret = do_replace(sock_net(sk), arg, len);
break;

case IPT_SO_SET_ADD_COUNTERS:
ret = do_add_counters(sock_net(sk), USER_SOCKPTR(user), len);
ret = do_add_counters(sock_net(sk), arg, len);
break;

default:
Expand Down
3 changes: 2 additions & 1 deletion net/ipv6/ipv6_sockglue.c
Original file line number Diff line number Diff line change
Expand Up @@ -996,7 +996,8 @@ int ipv6_setsockopt(struct sock *sk, int level, int optname,
/* we need to exclude all possible ENOPROTOOPTs except default case */
if (err == -ENOPROTOOPT && optname != IPV6_IPSEC_POLICY &&
optname != IPV6_XFRM_POLICY)
err = nf_setsockopt(sk, PF_INET6, optname, optval, optlen);
err = nf_setsockopt(sk, PF_INET6, optname, USER_SOCKPTR(optval),
optlen);
#endif
return err;
}
Expand Down
Loading

0 comments on commit c2f1263

Please sign in to comment.