socket.c 91.7 KB
Newer Older
L
Linus Torvalds 已提交
1 2 3 4 5 6
/*
 * NET		An implementation of the SOCKET network access protocol.
 *
 * Version:	@(#)socket.c	1.1.93	18/02/95
 *
 * Authors:	Orest Zborowski, <obz@Kodak.COM>
7
 *		Ross Biro
L
Linus Torvalds 已提交
8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44
 *		Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
 *
 * Fixes:
 *		Anonymous	:	NOTSOCK/BADF cleanup. Error fix in
 *					shutdown()
 *		Alan Cox	:	verify_area() fixes
 *		Alan Cox	:	Removed DDI
 *		Jonathan Kamens	:	SOCK_DGRAM reconnect bug
 *		Alan Cox	:	Moved a load of checks to the very
 *					top level.
 *		Alan Cox	:	Move address structures to/from user
 *					mode above the protocol layers.
 *		Rob Janssen	:	Allow 0 length sends.
 *		Alan Cox	:	Asynchronous I/O support (cribbed from the
 *					tty drivers).
 *		Niibe Yutaka	:	Asynchronous I/O for writes (4.4BSD style)
 *		Jeff Uphoff	:	Made max number of sockets command-line
 *					configurable.
 *		Matti Aarnio	:	Made the number of sockets dynamic,
 *					to be allocated when needed, and mr.
 *					Uphoff's max is used as max to be
 *					allowed to allocate.
 *		Linus		:	Argh. removed all the socket allocation
 *					altogether: it's in the inode now.
 *		Alan Cox	:	Made sock_alloc()/sock_release() public
 *					for NetROM and future kernel nfsd type
 *					stuff.
 *		Alan Cox	:	sendmsg/recvmsg basics.
 *		Tom Dyas	:	Export net symbols.
 *		Marcin Dalecki	:	Fixed problems with CONFIG_NET="n".
 *		Alan Cox	:	Added thread locking to sys_* calls
 *					for sockets. May have errors at the
 *					moment.
 *		Kevin Buhr	:	Fixed the dumb errors in the above.
 *		Andi Kleen	:	Some small cleanups, optimizations,
 *					and fixed a copy_from_user() bug.
 *		Tigran Aivazian	:	sys_send(args) calls sys_sendto(args, NULL, 0)
45
 *		Tigran Aivazian	:	Made listen(2) backlog sanity checks
L
Linus Torvalds 已提交
46 47 48 49 50 51 52 53 54 55
 *					protocol-independent
 *
 *
 *		This program is free software; you can redistribute it and/or
 *		modify it under the terms of the GNU General Public License
 *		as published by the Free Software Foundation; either version
 *		2 of the License, or (at your option) any later version.
 *
 *
 *	This module is effectively the top level interface to the BSD socket
56
 *	paradigm.
L
Linus Torvalds 已提交
57 58 59 60 61 62 63 64 65
 *
 *	Based upon Swansea University Computer Society NET3.039
 */

#include <linux/mm.h>
#include <linux/socket.h>
#include <linux/file.h>
#include <linux/net.h>
#include <linux/interrupt.h>
U
Ulrich Drepper 已提交
66
#include <linux/thread_info.h>
67
#include <linux/rcupdate.h>
L
Linus Torvalds 已提交
68 69 70
#include <linux/netdevice.h>
#include <linux/proc_fs.h>
#include <linux/seq_file.h>
A
Arjan van de Ven 已提交
71
#include <linux/mutex.h>
L
Linus Torvalds 已提交
72
#include <linux/if_bridge.h>
73 74
#include <linux/if_frad.h>
#include <linux/if_vlan.h>
75
#include <linux/ptp_classify.h>
L
Linus Torvalds 已提交
76 77 78 79 80 81 82 83 84 85
#include <linux/init.h>
#include <linux/poll.h>
#include <linux/cache.h>
#include <linux/module.h>
#include <linux/highmem.h>
#include <linux/mount.h>
#include <linux/security.h>
#include <linux/syscalls.h>
#include <linux/compat.h>
#include <linux/kmod.h>
86
#include <linux/audit.h>
87
#include <linux/wireless.h>
88
#include <linux/nsproxy.h>
N
Nick Black 已提交
89
#include <linux/magic.h>
90
#include <linux/slab.h>
91
#include <linux/xattr.h>
92
#include <linux/nospec.h>
L
Linus Torvalds 已提交
93

94
#include <linux/uaccess.h>
L
Linus Torvalds 已提交
95 96 97
#include <asm/unistd.h>

#include <net/compat.h>
98
#include <net/wext.h>
99
#include <net/cls_cgroup.h>
L
Linus Torvalds 已提交
100 101 102 103

#include <net/sock.h>
#include <linux/netfilter.h>

104 105 106 107
#include <linux/if_tun.h>
#include <linux/ipv6_route.h>
#include <linux/route.h>
#include <linux/sockios.h>
108
#include <net/busy_poll.h>
109
#include <linux/errqueue.h>
E
Eliezer Tamir 已提交
110

111
#ifdef CONFIG_NET_RX_BUSY_POLL
112 113
unsigned int sysctl_net_busy_read __read_mostly;
unsigned int sysctl_net_busy_poll __read_mostly;
E
Eliezer Tamir 已提交
114
#endif
115

116 117
static ssize_t sock_read_iter(struct kiocb *iocb, struct iov_iter *to);
static ssize_t sock_write_iter(struct kiocb *iocb, struct iov_iter *from);
118
static int sock_mmap(struct file *file, struct vm_area_struct *vma);
L
Linus Torvalds 已提交
119 120

static int sock_close(struct inode *inode, struct file *file);
121 122
static __poll_t sock_poll(struct file *file,
			      struct poll_table_struct *wait);
123
static long sock_ioctl(struct file *file, unsigned int cmd, unsigned long arg);
124 125
#ifdef CONFIG_COMPAT
static long compat_sock_ioctl(struct file *file,
126
			      unsigned int cmd, unsigned long arg);
127
#endif
L
Linus Torvalds 已提交
128 129 130
static int sock_fasync(int fd, struct file *filp, int on);
static ssize_t sock_sendpage(struct file *file, struct page *page,
			     int offset, size_t size, loff_t *ppos, int more);
J
Jens Axboe 已提交
131
static ssize_t sock_splice_read(struct file *file, loff_t *ppos,
132
				struct pipe_inode_info *pipe, size_t len,
J
Jens Axboe 已提交
133
				unsigned int flags);
L
Linus Torvalds 已提交
134 135 136 137 138 139

/*
 *	Socket files have a set of 'special' operations as well as the generic file ones. These don't appear
 *	in the operation structures but are done directly via the socketcall() multiplexor.
 */

140
static const struct file_operations socket_file_ops = {
L
Linus Torvalds 已提交
141 142
	.owner =	THIS_MODULE,
	.llseek =	no_llseek,
143 144
	.read_iter =	sock_read_iter,
	.write_iter =	sock_write_iter,
L
Linus Torvalds 已提交
145 146
	.poll =		sock_poll,
	.unlocked_ioctl = sock_ioctl,
147 148 149
#ifdef CONFIG_COMPAT
	.compat_ioctl = compat_sock_ioctl,
#endif
L
Linus Torvalds 已提交
150 151 152
	.mmap =		sock_mmap,
	.release =	sock_close,
	.fasync =	sock_fasync,
153 154
	.sendpage =	sock_sendpage,
	.splice_write = generic_splice_sendpage,
J
Jens Axboe 已提交
155
	.splice_read =	sock_splice_read,
L
Linus Torvalds 已提交
156 157 158 159 160 161 162
};

/*
 *	The protocol list. Each protocol is registered in here.
 */

static DEFINE_SPINLOCK(net_family_lock);
E
Eric Dumazet 已提交
163
static const struct net_proto_family __rcu *net_families[NPROTO] __read_mostly;
L
Linus Torvalds 已提交
164 165

/*
166 167 168
 * Support routines.
 * Move socket addresses back and forth across the kernel/user
 * divide and look after the messy bits.
L
Linus Torvalds 已提交
169 170 171 172 173 174 175 176 177 178 179 180 181
 */

/**
 *	move_addr_to_kernel	-	copy a socket address into kernel space
 *	@uaddr: Address in user space
 *	@kaddr: Address in kernel space
 *	@ulen: Length in user space
 *
 *	The address is copied into kernel space. If the provided address is
 *	too long an error code of -EINVAL is returned. If the copy gives
 *	invalid addresses -EFAULT is returned. On a success 0 is returned.
 */

182
int move_addr_to_kernel(void __user *uaddr, int ulen, struct sockaddr_storage *kaddr)
L
Linus Torvalds 已提交
183
{
184
	if (ulen < 0 || ulen > sizeof(struct sockaddr_storage))
L
Linus Torvalds 已提交
185
		return -EINVAL;
186
	if (ulen == 0)
L
Linus Torvalds 已提交
187
		return 0;
188
	if (copy_from_user(kaddr, uaddr, ulen))
L
Linus Torvalds 已提交
189
		return -EFAULT;
190
	return audit_sockaddr(ulen, kaddr);
L
Linus Torvalds 已提交
191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208
}

/**
 *	move_addr_to_user	-	copy an address to user space
 *	@kaddr: kernel space address
 *	@klen: length of address in kernel
 *	@uaddr: user space address
 *	@ulen: pointer to user length field
 *
 *	The value pointed to by ulen on entry is the buffer length available.
 *	This is overwritten with the buffer space used. -EINVAL is returned
 *	if an overlong buffer is specified or a negative buffer size. -EFAULT
 *	is returned if either the buffer or the length field are not
 *	accessible.
 *	After copying the data up to the limit the user specifies, the true
 *	length of the data is written over the length limit the user
 *	specified. Zero is returned for a success.
 */
209

210
static int move_addr_to_user(struct sockaddr_storage *kaddr, int klen,
S
stephen hemminger 已提交
211
			     void __user *uaddr, int __user *ulen)
L
Linus Torvalds 已提交
212 213 214 215
{
	int err;
	int len;

216
	BUG_ON(klen > sizeof(struct sockaddr_storage));
217 218
	err = get_user(len, ulen);
	if (err)
L
Linus Torvalds 已提交
219
		return err;
220 221
	if (len > klen)
		len = klen;
222
	if (len < 0)
L
Linus Torvalds 已提交
223
		return -EINVAL;
224
	if (len) {
S
Steve Grubb 已提交
225 226
		if (audit_sockaddr(klen, kaddr))
			return -ENOMEM;
227
		if (copy_to_user(uaddr, kaddr, len))
L
Linus Torvalds 已提交
228 229 230
			return -EFAULT;
	}
	/*
231 232
	 *      "fromlen shall refer to the value before truncation.."
	 *                      1003.1g
L
Linus Torvalds 已提交
233 234 235 236
	 */
	return __put_user(klen, ulen);
}

237
static struct kmem_cache *sock_inode_cachep __ro_after_init;
L
Linus Torvalds 已提交
238 239 240 241

static struct inode *sock_alloc_inode(struct super_block *sb)
{
	struct socket_alloc *ei;
242
	struct socket_wq *wq;
243

244
	ei = kmem_cache_alloc(sock_inode_cachep, GFP_KERNEL);
L
Linus Torvalds 已提交
245 246
	if (!ei)
		return NULL;
247 248
	wq = kmalloc(sizeof(*wq), GFP_KERNEL);
	if (!wq) {
249 250 251
		kmem_cache_free(sock_inode_cachep, ei);
		return NULL;
	}
252 253
	init_waitqueue_head(&wq->wait);
	wq->fasync_list = NULL;
254
	wq->flags = 0;
255
	ei->socket.wq = wq;
256

L
Linus Torvalds 已提交
257 258 259 260 261 262 263 264 265 266 267
	ei->socket.state = SS_UNCONNECTED;
	ei->socket.flags = 0;
	ei->socket.ops = NULL;
	ei->socket.sk = NULL;
	ei->socket.file = NULL;

	return &ei->vfs_inode;
}

static void sock_destroy_inode(struct inode *inode)
{
268 269 270
	struct socket_alloc *ei;

	ei = container_of(inode, struct socket_alloc, vfs_inode);
271
	kfree_rcu(ei->socket.wq, rcu);
272
	kmem_cache_free(sock_inode_cachep, ei);
L
Linus Torvalds 已提交
273 274
}

275
static void init_once(void *foo)
L
Linus Torvalds 已提交
276
{
277
	struct socket_alloc *ei = (struct socket_alloc *)foo;
L
Linus Torvalds 已提交
278

C
Christoph Lameter 已提交
279
	inode_init_once(&ei->vfs_inode);
L
Linus Torvalds 已提交
280
}
281

282
static void init_inodecache(void)
L
Linus Torvalds 已提交
283 284
{
	sock_inode_cachep = kmem_cache_create("sock_inode_cache",
285 286 287 288
					      sizeof(struct socket_alloc),
					      0,
					      (SLAB_HWCACHE_ALIGN |
					       SLAB_RECLAIM_ACCOUNT |
289
					       SLAB_MEM_SPREAD | SLAB_ACCOUNT),
290
					      init_once);
291
	BUG_ON(sock_inode_cachep == NULL);
L
Linus Torvalds 已提交
292 293
}

294
static const struct super_operations sockfs_ops = {
295 296 297
	.alloc_inode	= sock_alloc_inode,
	.destroy_inode	= sock_destroy_inode,
	.statfs		= simple_statfs,
L
Linus Torvalds 已提交
298 299
};

300 301 302 303 304 305
/*
 * sockfs_dname() is called from d_path().
 */
static char *sockfs_dname(struct dentry *dentry, char *buffer, int buflen)
{
	return dynamic_dname(dentry, buffer, buflen, "socket:[%lu]",
D
David Howells 已提交
306
				d_inode(dentry)->i_ino);
307 308
}

A
Al Viro 已提交
309
static const struct dentry_operations sockfs_dentry_operations = {
310
	.d_dname  = sockfs_dname,
L
Linus Torvalds 已提交
311 312
};

313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333
static int sockfs_xattr_get(const struct xattr_handler *handler,
			    struct dentry *dentry, struct inode *inode,
			    const char *suffix, void *value, size_t size)
{
	if (value) {
		if (dentry->d_name.len + 1 > size)
			return -ERANGE;
		memcpy(value, dentry->d_name.name, dentry->d_name.len + 1);
	}
	return dentry->d_name.len + 1;
}

#define XATTR_SOCKPROTONAME_SUFFIX "sockprotoname"
#define XATTR_NAME_SOCKPROTONAME (XATTR_SYSTEM_PREFIX XATTR_SOCKPROTONAME_SUFFIX)
#define XATTR_NAME_SOCKPROTONAME_LEN (sizeof(XATTR_NAME_SOCKPROTONAME)-1)

static const struct xattr_handler sockfs_xattr_handler = {
	.name = XATTR_NAME_SOCKPROTONAME,
	.get = sockfs_xattr_get,
};

334 335 336 337 338 339 340 341 342 343 344 345 346 347
static int sockfs_security_xattr_set(const struct xattr_handler *handler,
				     struct dentry *dentry, struct inode *inode,
				     const char *suffix, const void *value,
				     size_t size, int flags)
{
	/* Handled by LSM. */
	return -EAGAIN;
}

static const struct xattr_handler sockfs_security_xattr_handler = {
	.prefix = XATTR_SECURITY_PREFIX,
	.set = sockfs_security_xattr_set,
};

348 349
static const struct xattr_handler *sockfs_xattr_handlers[] = {
	&sockfs_xattr_handler,
350
	&sockfs_security_xattr_handler,
351 352 353
	NULL
};

354 355 356
static struct dentry *sockfs_mount(struct file_system_type *fs_type,
			 int flags, const char *dev_name, void *data)
{
357 358 359
	return mount_pseudo_xattr(fs_type, "socket:", &sockfs_ops,
				  sockfs_xattr_handlers,
				  &sockfs_dentry_operations, SOCKFS_MAGIC);
360 361 362 363 364 365 366 367 368 369
}

static struct vfsmount *sock_mnt __read_mostly;

static struct file_system_type sock_fs_type = {
	.name =		"sockfs",
	.mount =	sockfs_mount,
	.kill_sb =	kill_anon_super,
};

L
Linus Torvalds 已提交
370 371 372
/*
 *	Obtains the first available file descriptor and sets it up for use.
 *
373 374
 *	These functions create file structures and maps them to fd space
 *	of the current process. On success it returns file descriptor
L
Linus Torvalds 已提交
375 376 377 378 379 380 381 382 383 384 385 386
 *	and file struct implicitly stored in sock->file.
 *	Note that another thread may close file descriptor before we return
 *	from this function. We use the fact that now we do not refer
 *	to socket after mapping. If one day we will need it, this
 *	function will increment ref. count on file by 1.
 *
 *	In any case returned fd MAY BE not valid!
 *	This race condition is unavoidable
 *	with shared fd spaces, we cannot solve it inside kernel,
 *	but we take care of internal coherence yet.
 */

387 388 389 390 391 392 393 394 395 396 397 398
/**
 *	sock_alloc_file - Bind a &socket to a &file
 *	@sock: socket
 *	@flags: file status flags
 *	@dname: protocol name
 *
 *	Returns the &file bound with @sock, implicitly storing it
 *	in sock->file. If dname is %NULL, sets to "".
 *	On failure the return is a ERR pointer (see linux/err.h).
 *	This function uses GFP_KERNEL internally.
 */

399
struct file *sock_alloc_file(struct socket *sock, int flags, const char *dname)
L
Linus Torvalds 已提交
400
{
401
	struct file *file;
L
Linus Torvalds 已提交
402

A
Al Viro 已提交
403 404
	if (!dname)
		dname = sock->sk ? sock->sk->sk_prot_creator->name : "";
405

A
Al Viro 已提交
406 407 408
	file = alloc_file_pseudo(SOCK_INODE(sock), sock_mnt, dname,
				O_RDWR | (flags & O_NONBLOCK),
				&socket_file_ops);
409
	if (IS_ERR(file)) {
410
		sock_release(sock);
411
		return file;
A
Al Viro 已提交
412 413 414
	}

	sock->file = file;
415
	file->private_data = sock;
416
	return file;
417
}
418
EXPORT_SYMBOL(sock_alloc_file);
419

420
static int sock_map_fd(struct socket *sock, int flags)
421 422
{
	struct file *newfile;
423
	int fd = get_unused_fd_flags(flags);
424 425
	if (unlikely(fd < 0)) {
		sock_release(sock);
426
		return fd;
427
	}
428

429
	newfile = sock_alloc_file(sock, flags, NULL);
430
	if (likely(!IS_ERR(newfile))) {
431
		fd_install(fd, newfile);
432 433
		return fd;
	}
434

435 436
	put_unused_fd(fd);
	return PTR_ERR(newfile);
L
Linus Torvalds 已提交
437 438
}

439 440 441 442 443 444 445 446
/**
 *	sock_from_file - Return the &socket bounded to @file.
 *	@file: file
 *	@err: pointer to an error code return
 *
 *	On failure returns %NULL and assigns -ENOTSOCK to @err.
 */

447
struct socket *sock_from_file(struct file *file, int *err)
448 449 450 451
{
	if (file->f_op == &socket_file_ops)
		return file->private_data;	/* set in sock_map_fd */

E
Eric Dumazet 已提交
452 453
	*err = -ENOTSOCK;
	return NULL;
454
}
455
EXPORT_SYMBOL(sock_from_file);
456

L
Linus Torvalds 已提交
457
/**
458
 *	sockfd_lookup - Go from a file number to its socket slot
L
Linus Torvalds 已提交
459 460 461 462
 *	@fd: file handle
 *	@err: pointer to an error code return
 *
 *	The file handle passed in is locked and the socket it is bound
463
 *	to is returned. If an error occurs the err pointer is overwritten
L
Linus Torvalds 已提交
464 465 466 467 468 469 470 471 472 473 474
 *	with a negative errno code and NULL is returned. The function checks
 *	for both invalid handles and passing a handle which is not a socket.
 *
 *	On a success the socket object pointer is returned.
 */

struct socket *sockfd_lookup(int fd, int *err)
{
	struct file *file;
	struct socket *sock;

475 476
	file = fget(fd);
	if (!file) {
L
Linus Torvalds 已提交
477 478 479
		*err = -EBADF;
		return NULL;
	}
480

481 482
	sock = sock_from_file(file, err);
	if (!sock)
L
Linus Torvalds 已提交
483
		fput(file);
484 485
	return sock;
}
486
EXPORT_SYMBOL(sockfd_lookup);
L
Linus Torvalds 已提交
487

488 489
static struct socket *sockfd_lookup_light(int fd, int *err, int *fput_needed)
{
490
	struct fd f = fdget(fd);
491 492
	struct socket *sock;

493
	*err = -EBADF;
494 495 496 497
	if (f.file) {
		sock = sock_from_file(f.file, err);
		if (likely(sock)) {
			*fput_needed = f.flags;
498
			return sock;
499 500
		}
		fdput(f);
L
Linus Torvalds 已提交
501
	}
502
	return NULL;
L
Linus Torvalds 已提交
503 504
}

505 506 507 508 509 510
static ssize_t sockfs_listxattr(struct dentry *dentry, char *buffer,
				size_t size)
{
	ssize_t len;
	ssize_t used = 0;

D
David Howells 已提交
511
	len = security_inode_listsecurity(d_inode(dentry), buffer, size);
512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532
	if (len < 0)
		return len;
	used += len;
	if (buffer) {
		if (size < used)
			return -ERANGE;
		buffer += len;
	}

	len = (XATTR_NAME_SOCKPROTONAME_LEN + 1);
	used += len;
	if (buffer) {
		if (size < used)
			return -ERANGE;
		memcpy(buffer, XATTR_NAME_SOCKPROTONAME, len);
		buffer += len;
	}

	return used;
}

533
static int sockfs_setattr(struct dentry *dentry, struct iattr *iattr)
534 535 536
{
	int err = simple_setattr(dentry, iattr);

537
	if (!err && (iattr->ia_valid & ATTR_UID)) {
538 539
		struct socket *sock = SOCKET_I(d_inode(dentry));

540 541 542 543
		if (sock->sk)
			sock->sk->sk_uid = iattr->ia_uid;
		else
			err = -ENOENT;
544 545 546 547 548
	}

	return err;
}

549 550
static const struct inode_operations sockfs_inode_ops = {
	.listxattr = sockfs_listxattr,
551
	.setattr = sockfs_setattr,
552 553
};

L
Linus Torvalds 已提交
554
/**
555
 *	sock_alloc - allocate a socket
556
 *
L
Linus Torvalds 已提交
557 558
 *	Allocate a new inode and socket object. The two are bound together
 *	and initialised. The socket is then returned. If we are out of inodes
559
 *	NULL is returned. This functions uses GFP_KERNEL internally.
L
Linus Torvalds 已提交
560 561
 */

T
Tom Herbert 已提交
562
struct socket *sock_alloc(void)
L
Linus Torvalds 已提交
563
{
564 565
	struct inode *inode;
	struct socket *sock;
L
Linus Torvalds 已提交
566

567
	inode = new_inode_pseudo(sock_mnt->mnt_sb);
L
Linus Torvalds 已提交
568 569 570 571 572
	if (!inode)
		return NULL;

	sock = SOCKET_I(inode);

573
	inode->i_ino = get_next_ino();
574
	inode->i_mode = S_IFSOCK | S_IRWXUGO;
575 576
	inode->i_uid = current_fsuid();
	inode->i_gid = current_fsgid();
577
	inode->i_op = &sockfs_inode_ops;
L
Linus Torvalds 已提交
578 579 580

	return sock;
}
T
Tom Herbert 已提交
581
EXPORT_SYMBOL(sock_alloc);
L
Linus Torvalds 已提交
582 583

/**
584
 *	sock_release - close a socket
L
Linus Torvalds 已提交
585 586 587 588
 *	@sock: socket to close
 *
 *	The socket is released from the protocol stack if it has a release
 *	callback, and the inode is then released if the socket is bound to
589
 *	an inode not a file.
L
Linus Torvalds 已提交
590
 */
591

592
static void __sock_release(struct socket *sock, struct inode *inode)
L
Linus Torvalds 已提交
593 594 595 596
{
	if (sock->ops) {
		struct module *owner = sock->ops->owner;

597 598
		if (inode)
			inode_lock(inode);
L
Linus Torvalds 已提交
599
		sock->ops->release(sock);
600
		sock->sk = NULL;
601 602
		if (inode)
			inode_unlock(inode);
L
Linus Torvalds 已提交
603 604 605 606
		sock->ops = NULL;
		module_put(owner);
	}

607
	if (sock->wq->fasync_list)
608
		pr_err("%s: fasync list not empty!\n", __func__);
L
Linus Torvalds 已提交
609 610 611 612 613

	if (!sock->file) {
		iput(SOCK_INODE(sock));
		return;
	}
614
	sock->file = NULL;
L
Linus Torvalds 已提交
615
}
616 617 618 619 620

void sock_release(struct socket *sock)
{
	__sock_release(sock, NULL);
}
621
EXPORT_SYMBOL(sock_release);
L
Linus Torvalds 已提交
622

623
void __sock_tx_timestamp(__u16 tsflags, __u8 *tx_flags)
624
{
625 626
	u8 flags = *tx_flags;

627
	if (tsflags & SOF_TIMESTAMPING_TX_HARDWARE)
628 629
		flags |= SKBTX_HW_TSTAMP;

630
	if (tsflags & SOF_TIMESTAMPING_TX_SOFTWARE)
631 632
		flags |= SKBTX_SW_TSTAMP;

633
	if (tsflags & SOF_TIMESTAMPING_TX_SCHED)
634 635 636
		flags |= SKBTX_SCHED_TSTAMP;

	*tx_flags = flags;
637
}
638
EXPORT_SYMBOL(__sock_tx_timestamp);
639

640 641 642 643 644 645 646 647 648
/**
 *	sock_sendmsg - send a message through @sock
 *	@sock: socket
 *	@msg: message to send
 *
 *	Sends @msg through @sock, passing through LSM.
 *	Returns the number of bytes sent, or an error code.
 */

649
static inline int sock_sendmsg_nosec(struct socket *sock, struct msghdr *msg)
L
Linus Torvalds 已提交
650
{
A
Al Viro 已提交
651
	int ret = sock->ops->sendmsg(sock, msg, msg_data_left(msg));
652 653
	BUG_ON(ret == -EIOCBQUEUED);
	return ret;
L
Linus Torvalds 已提交
654 655
}

656
int sock_sendmsg(struct socket *sock, struct msghdr *msg)
657
{
658
	int err = security_socket_sendmsg(sock, msg,
A
Al Viro 已提交
659
					  msg_data_left(msg));
660

661
	return err ?: sock_sendmsg_nosec(sock, msg);
662
}
663
EXPORT_SYMBOL(sock_sendmsg);
L
Linus Torvalds 已提交
664

665 666 667 668 669 670 671 672 673 674 675 676
/**
 *	kernel_sendmsg - send a message through @sock (kernel-space)
 *	@sock: socket
 *	@msg: message header
 *	@vec: kernel vec
 *	@num: vec array length
 *	@size: total message data size
 *
 *	Builds the message data with @vec and sends it through @sock.
 *	Returns the number of bytes sent, or an error code.
 */

L
Linus Torvalds 已提交
677 678 679
int kernel_sendmsg(struct socket *sock, struct msghdr *msg,
		   struct kvec *vec, size_t num, size_t size)
{
680
	iov_iter_kvec(&msg->msg_iter, WRITE, vec, num, size);
681
	return sock_sendmsg(sock, msg);
L
Linus Torvalds 已提交
682
}
683
EXPORT_SYMBOL(kernel_sendmsg);
L
Linus Torvalds 已提交
684

685 686 687 688 689 690 691 692 693 694 695 696 697
/**
 *	kernel_sendmsg_locked - send a message through @sock (kernel-space)
 *	@sk: sock
 *	@msg: message header
 *	@vec: output s/g array
 *	@num: output s/g array length
 *	@size: total message data size
 *
 *	Builds the message data with @vec and sends it through @sock.
 *	Returns the number of bytes sent, or an error code.
 *	Caller must hold @sk.
 */

698 699 700 701 702 703
int kernel_sendmsg_locked(struct sock *sk, struct msghdr *msg,
			  struct kvec *vec, size_t num, size_t size)
{
	struct socket *sock = sk->sk_socket;

	if (!sock->ops->sendmsg_locked)
J
John Fastabend 已提交
704
		return sock_no_sendmsg_locked(sk, msg, size);
705

706
	iov_iter_kvec(&msg->msg_iter, WRITE, vec, num, size);
707 708 709 710 711

	return sock->ops->sendmsg_locked(sk, msg, msg_data_left(msg));
}
EXPORT_SYMBOL(kernel_sendmsg_locked);

712 713 714 715 716 717 718 719 720 721
static bool skb_is_err_queue(const struct sk_buff *skb)
{
	/* pkt_type of skbs enqueued on the error queue are set to
	 * PACKET_OUTGOING in skb_set_err_queue(). This is only safe to do
	 * in recvmsg, since skbs received on a local socket will never
	 * have a pkt_type of PACKET_OUTGOING.
	 */
	return skb->pkt_type == PACKET_OUTGOING;
}

722 723 724 725 726
/* On transmit, software and hardware timestamps are returned independently.
 * As the two skb clones share the hardware timestamp, which may be updated
 * before the software timestamp is received, a hardware TX timestamp may be
 * returned only if there is no software TX timestamp. Ignore false software
 * timestamps, which may be made in the __sock_recv_timestamp() call when the
727
 * option SO_TIMESTAMP_OLD(NS) is enabled on the socket, even when the skb has a
728 729 730 731 732 733 734
 * hardware timestamp.
 */
static bool skb_is_swtx_tstamp(const struct sk_buff *skb, int false_tstamp)
{
	return skb->tstamp && !false_tstamp && skb_is_err_queue(skb);
}

735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755
static void put_ts_pktinfo(struct msghdr *msg, struct sk_buff *skb)
{
	struct scm_ts_pktinfo ts_pktinfo;
	struct net_device *orig_dev;

	if (!skb_mac_header_was_set(skb))
		return;

	memset(&ts_pktinfo, 0, sizeof(ts_pktinfo));

	rcu_read_lock();
	orig_dev = dev_get_by_napi_id(skb_napi_id(skb));
	if (orig_dev)
		ts_pktinfo.if_index = orig_dev->ifindex;
	rcu_read_unlock();

	ts_pktinfo.pkt_length = skb->len - skb_mac_offset(skb);
	put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMPING_PKTINFO,
		 sizeof(ts_pktinfo), &ts_pktinfo);
}

756 757 758 759 760 761
/*
 * called from sock_recv_timestamp() if sock_flag(sk, SOCK_RCVTSTAMP)
 */
void __sock_recv_timestamp(struct msghdr *msg, struct sock *sk,
	struct sk_buff *skb)
{
762
	int need_software_tstamp = sock_flag(sk, SOCK_RCVTSTAMP);
763
	int new_tstamp = sock_flag(sk, SOCK_TSTAMP_NEW);
D
Deepa Dinamani 已提交
764 765
	struct scm_timestamping_internal tss;

766
	int empty = 1, false_tstamp = 0;
767 768 769 770 771
	struct skb_shared_hwtstamps *shhwtstamps =
		skb_hwtstamps(skb);

	/* Race occurred between timestamp enabling and packet
	   receiving.  Fill in the current time for now. */
772
	if (need_software_tstamp && skb->tstamp == 0) {
773
		__net_timestamp(skb);
774 775
		false_tstamp = 1;
	}
776 777 778

	if (need_software_tstamp) {
		if (!sock_flag(sk, SOCK_RCVTSTAMPNS)) {
779 780 781 782 783 784 785 786 787 788 789 790 791
			if (new_tstamp) {
				struct __kernel_sock_timeval tv;

				skb_get_new_timestamp(skb, &tv);
				put_cmsg(msg, SOL_SOCKET, SO_TIMESTAMP_NEW,
					 sizeof(tv), &tv);
			} else {
				struct __kernel_old_timeval tv;

				skb_get_timestamp(skb, &tv);
				put_cmsg(msg, SOL_SOCKET, SO_TIMESTAMP_OLD,
					 sizeof(tv), &tv);
			}
792
		} else {
793 794 795 796 797 798 799 800 801 802 803 804 805
			if (new_tstamp) {
				struct __kernel_timespec ts;

				skb_get_new_timestampns(skb, &ts);
				put_cmsg(msg, SOL_SOCKET, SO_TIMESTAMPNS_NEW,
					 sizeof(ts), &ts);
			} else {
				struct timespec ts;

				skb_get_timestampns(skb, &ts);
				put_cmsg(msg, SOL_SOCKET, SO_TIMESTAMPNS_OLD,
					 sizeof(ts), &ts);
			}
806 807 808
		}
	}

809
	memset(&tss, 0, sizeof(tss));
810
	if ((sk->sk_tsflags & SOF_TIMESTAMPING_SOFTWARE) &&
D
Deepa Dinamani 已提交
811
	    ktime_to_timespec64_cond(skb->tstamp, tss.ts + 0))
812
		empty = 0;
813
	if (shhwtstamps &&
814
	    (sk->sk_tsflags & SOF_TIMESTAMPING_RAW_HARDWARE) &&
815
	    !skb_is_swtx_tstamp(skb, false_tstamp) &&
D
Deepa Dinamani 已提交
816
	    ktime_to_timespec64_cond(shhwtstamps->hwtstamp, tss.ts + 2)) {
817
		empty = 0;
818 819 820 821
		if ((sk->sk_tsflags & SOF_TIMESTAMPING_OPT_PKTINFO) &&
		    !skb_is_err_queue(skb))
			put_ts_pktinfo(msg, skb);
	}
822
	if (!empty) {
D
Deepa Dinamani 已提交
823 824 825 826
		if (sock_flag(sk, SOCK_TSTAMP_NEW))
			put_cmsg_scm_timestamping64(msg, &tss);
		else
			put_cmsg_scm_timestamping(msg, &tss);
827

828
		if (skb_is_err_queue(skb) && skb->len &&
829
		    SKB_EXT_ERR(skb)->opt_stats)
830 831 832
			put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMPING_OPT_STATS,
				 skb->len, skb->data);
	}
833
}
834 835
EXPORT_SYMBOL_GPL(__sock_recv_timestamp);

836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851
void __sock_recv_wifi_status(struct msghdr *msg, struct sock *sk,
	struct sk_buff *skb)
{
	int ack;

	if (!sock_flag(sk, SOCK_WIFI_STATUS))
		return;
	if (!skb->wifi_acked_valid)
		return;

	ack = skb->wifi_acked;

	put_cmsg(msg, SOL_SOCKET, SCM_WIFI_STATUS, sizeof(ack), &ack);
}
EXPORT_SYMBOL_GPL(__sock_recv_wifi_status);

S
stephen hemminger 已提交
852 853
static inline void sock_recv_drops(struct msghdr *msg, struct sock *sk,
				   struct sk_buff *skb)
854
{
855
	if (sock_flag(sk, SOCK_RXQ_OVFL) && skb && SOCK_SKB_CB(skb)->dropcount)
856
		put_cmsg(msg, SOL_SOCKET, SO_RXQ_OVFL,
857
			sizeof(__u32), &SOCK_SKB_CB(skb)->dropcount);
858 859
}

860
void __sock_recv_ts_and_drops(struct msghdr *msg, struct sock *sk,
861 862 863 864 865
	struct sk_buff *skb)
{
	sock_recv_timestamp(msg, sk, skb);
	sock_recv_drops(msg, sk, skb);
}
866
EXPORT_SYMBOL_GPL(__sock_recv_ts_and_drops);
867

868 869 870 871 872 873 874 875 876 877
/**
 *	sock_recvmsg - receive a message from @sock
 *	@sock: socket
 *	@msg: message to receive
 *	@flags: message flags
 *
 *	Receives @msg from @sock, passing through LSM. Returns the total number
 *	of bytes received, or an error.
 */

878
static inline int sock_recvmsg_nosec(struct socket *sock, struct msghdr *msg,
879
				     int flags)
L
Linus Torvalds 已提交
880
{
881
	return sock->ops->recvmsg(sock, msg, msg_data_left(msg), flags);
L
Linus Torvalds 已提交
882 883
}

884
int sock_recvmsg(struct socket *sock, struct msghdr *msg, int flags)
885
{
886
	int err = security_socket_recvmsg(sock, msg, msg_data_left(msg), flags);
887

888
	return err ?: sock_recvmsg_nosec(sock, msg, flags);
L
Linus Torvalds 已提交
889
}
890
EXPORT_SYMBOL(sock_recvmsg);
L
Linus Torvalds 已提交
891

892
/**
893 894 895 896 897 898 899
 *	kernel_recvmsg - Receive a message from a socket (kernel space)
 *	@sock: The socket to receive the message from
 *	@msg: Received message
 *	@vec: Input s/g array for message data
 *	@num: Size of input s/g array
 *	@size: Number of bytes to read
 *	@flags: Message flags (MSG_DONTWAIT, etc...)
900
 *
901 902 903
 *	On return the msg structure contains the scatter/gather array passed in the
 *	vec argument. The array is modified so that it consists of the unfilled
 *	portion of the original array.
904
 *
905
 *	The returned value is the total number of bytes received, or an error.
906
 */
907

908 909
int kernel_recvmsg(struct socket *sock, struct msghdr *msg,
		   struct kvec *vec, size_t num, size_t size, int flags)
L
Linus Torvalds 已提交
910 911 912 913
{
	mm_segment_t oldfs = get_fs();
	int result;

914
	iov_iter_kvec(&msg->msg_iter, READ, vec, num, size);
L
Linus Torvalds 已提交
915
	set_fs(KERNEL_DS);
916
	result = sock_recvmsg(sock, msg, flags);
L
Linus Torvalds 已提交
917 918 919
	set_fs(oldfs);
	return result;
}
920
EXPORT_SYMBOL(kernel_recvmsg);
L
Linus Torvalds 已提交
921

922 923
static ssize_t sock_sendpage(struct file *file, struct page *page,
			     int offset, size_t size, loff_t *ppos, int more)
L
Linus Torvalds 已提交
924 925 926 927
{
	struct socket *sock;
	int flags;

928 929
	sock = file->private_data;

930 931 932
	flags = (file->f_flags & O_NONBLOCK) ? MSG_DONTWAIT : 0;
	/* more is a combination of MSG_MORE and MSG_SENDPAGE_NOTLAST */
	flags |= more;
933

934
	return kernel_sendpage(sock, page, offset, size, flags);
935
}
L
Linus Torvalds 已提交
936

J
Jens Axboe 已提交
937
static ssize_t sock_splice_read(struct file *file, loff_t *ppos,
938
				struct pipe_inode_info *pipe, size_t len,
J
Jens Axboe 已提交
939 940 941 942
				unsigned int flags)
{
	struct socket *sock = file->private_data;

943
	if (unlikely(!sock->ops->splice_read))
944
		return generic_file_splice_read(file, ppos, pipe, len, flags);
945

J
Jens Axboe 已提交
946 947 948
	return sock->ops->splice_read(sock, ppos, pipe, len, flags);
}

949
static ssize_t sock_read_iter(struct kiocb *iocb, struct iov_iter *to)
950
{
951 952
	struct file *file = iocb->ki_filp;
	struct socket *sock = file->private_data;
953 954
	struct msghdr msg = {.msg_iter = *to,
			     .msg_iocb = iocb};
955
	ssize_t res;
956

957 958 959 960
	if (file->f_flags & O_NONBLOCK)
		msg.msg_flags = MSG_DONTWAIT;

	if (iocb->ki_pos != 0)
L
Linus Torvalds 已提交
961
		return -ESPIPE;
962

C
Christoph Hellwig 已提交
963
	if (!iov_iter_count(to))	/* Match SYS5 behaviour */
L
Linus Torvalds 已提交
964 965
		return 0;

966
	res = sock_recvmsg(sock, &msg, msg.msg_flags);
967 968
	*to = msg.msg_iter;
	return res;
L
Linus Torvalds 已提交
969 970
}

971
static ssize_t sock_write_iter(struct kiocb *iocb, struct iov_iter *from)
972
{
973 974
	struct file *file = iocb->ki_filp;
	struct socket *sock = file->private_data;
975 976
	struct msghdr msg = {.msg_iter = *from,
			     .msg_iocb = iocb};
977
	ssize_t res;
L
Linus Torvalds 已提交
978

979
	if (iocb->ki_pos != 0)
980
		return -ESPIPE;
981

982 983 984
	if (file->f_flags & O_NONBLOCK)
		msg.msg_flags = MSG_DONTWAIT;

985 986 987
	if (sock->type == SOCK_SEQPACKET)
		msg.msg_flags |= MSG_EOR;

988
	res = sock_sendmsg(sock, &msg);
989 990
	*from = msg.msg_iter;
	return res;
L
Linus Torvalds 已提交
991 992 993 994 995 996 997
}

/*
 * Atomic setting of ioctl hooks to avoid race
 * with module unload.
 */

A
Arjan van de Ven 已提交
998
static DEFINE_MUTEX(br_ioctl_mutex);
999
static int (*br_ioctl_hook) (struct net *, unsigned int cmd, void __user *arg);
L
Linus Torvalds 已提交
1000

1001
void brioctl_set(int (*hook) (struct net *, unsigned int, void __user *))
L
Linus Torvalds 已提交
1002
{
A
Arjan van de Ven 已提交
1003
	mutex_lock(&br_ioctl_mutex);
L
Linus Torvalds 已提交
1004
	br_ioctl_hook = hook;
A
Arjan van de Ven 已提交
1005
	mutex_unlock(&br_ioctl_mutex);
L
Linus Torvalds 已提交
1006 1007 1008
}
EXPORT_SYMBOL(brioctl_set);

A
Arjan van de Ven 已提交
1009
static DEFINE_MUTEX(vlan_ioctl_mutex);
1010
static int (*vlan_ioctl_hook) (struct net *, void __user *arg);
L
Linus Torvalds 已提交
1011

1012
void vlan_ioctl_set(int (*hook) (struct net *, void __user *))
L
Linus Torvalds 已提交
1013
{
A
Arjan van de Ven 已提交
1014
	mutex_lock(&vlan_ioctl_mutex);
L
Linus Torvalds 已提交
1015
	vlan_ioctl_hook = hook;
A
Arjan van de Ven 已提交
1016
	mutex_unlock(&vlan_ioctl_mutex);
L
Linus Torvalds 已提交
1017 1018 1019
}
EXPORT_SYMBOL(vlan_ioctl_set);

A
Arjan van de Ven 已提交
1020
static DEFINE_MUTEX(dlci_ioctl_mutex);
1021
static int (*dlci_ioctl_hook) (unsigned int, void __user *);
L
Linus Torvalds 已提交
1022

1023
void dlci_ioctl_set(int (*hook) (unsigned int, void __user *))
L
Linus Torvalds 已提交
1024
{
A
Arjan van de Ven 已提交
1025
	mutex_lock(&dlci_ioctl_mutex);
L
Linus Torvalds 已提交
1026
	dlci_ioctl_hook = hook;
A
Arjan van de Ven 已提交
1027
	mutex_unlock(&dlci_ioctl_mutex);
L
Linus Torvalds 已提交
1028 1029 1030
}
EXPORT_SYMBOL(dlci_ioctl_set);

1031
static long sock_do_ioctl(struct net *net, struct socket *sock,
1032
			  unsigned int cmd, unsigned long arg)
1033 1034 1035 1036 1037 1038 1039 1040 1041 1042
{
	int err;
	void __user *argp = (void __user *)arg;

	err = sock->ops->ioctl(sock, cmd, arg);

	/*
	 * If this ioctl is unknown try to hand it down
	 * to the NIC driver.
	 */
1043 1044
	if (err != -ENOIOCTLCMD)
		return err;
1045

1046 1047 1048 1049 1050 1051 1052 1053 1054
	if (cmd == SIOCGIFCONF) {
		struct ifconf ifc;
		if (copy_from_user(&ifc, argp, sizeof(struct ifconf)))
			return -EFAULT;
		rtnl_lock();
		err = dev_ifconf(net, &ifc, sizeof(struct ifreq));
		rtnl_unlock();
		if (!err && copy_to_user(argp, &ifc, sizeof(struct ifconf)))
			err = -EFAULT;
1055 1056 1057
	} else {
		struct ifreq ifr;
		bool need_copyout;
1058
		if (copy_from_user(&ifr, argp, sizeof(struct ifreq)))
1059 1060 1061
			return -EFAULT;
		err = dev_ioctl(net, cmd, &ifr, &need_copyout);
		if (!err && need_copyout)
1062
			if (copy_to_user(argp, &ifr, sizeof(struct ifreq)))
1063
				return -EFAULT;
1064
	}
1065 1066 1067
	return err;
}

L
Linus Torvalds 已提交
1068 1069 1070 1071 1072
/*
 *	With an ioctl, arg may well be a user mode pointer, but we don't know
 *	what to do with it - that's up to the protocol still.
 */

1073 1074 1075 1076 1077 1078 1079
/**
 *	get_net_ns - increment the refcount of the network namespace
 *	@ns: common namespace (net)
 *
 *	Returns the net's common namespace.
 */

1080
struct ns_common *get_net_ns(struct ns_common *ns)
1081 1082 1083
{
	return &get_net(container_of(ns, struct net, ns))->ns;
}
1084
EXPORT_SYMBOL_GPL(get_net_ns);
1085

L
Linus Torvalds 已提交
1086 1087 1088
static long sock_ioctl(struct file *file, unsigned cmd, unsigned long arg)
{
	struct socket *sock;
1089
	struct sock *sk;
L
Linus Torvalds 已提交
1090 1091
	void __user *argp = (void __user *)arg;
	int pid, err;
1092
	struct net *net;
L
Linus Torvalds 已提交
1093

1094
	sock = file->private_data;
1095
	sk = sock->sk;
1096
	net = sock_net(sk);
1097 1098 1099 1100 1101 1102 1103 1104 1105
	if (unlikely(cmd >= SIOCDEVPRIVATE && cmd <= (SIOCDEVPRIVATE + 15))) {
		struct ifreq ifr;
		bool need_copyout;
		if (copy_from_user(&ifr, argp, sizeof(struct ifreq)))
			return -EFAULT;
		err = dev_ioctl(net, cmd, &ifr, &need_copyout);
		if (!err && need_copyout)
			if (copy_to_user(argp, &ifr, sizeof(struct ifreq)))
				return -EFAULT;
L
Linus Torvalds 已提交
1106
	} else
J
Johannes Berg 已提交
1107
#ifdef CONFIG_WEXT_CORE
L
Linus Torvalds 已提交
1108
	if (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST) {
1109
		err = wext_handle_ioctl(net, cmd, argp);
L
Linus Torvalds 已提交
1110
	} else
J
Johannes Berg 已提交
1111
#endif
1112
		switch (cmd) {
L
Linus Torvalds 已提交
1113 1114 1115 1116 1117
		case FIOSETOWN:
		case SIOCSPGRP:
			err = -EFAULT;
			if (get_user(pid, (int __user *)argp))
				break;
1118
			err = f_setown(sock->file, pid, 1);
L
Linus Torvalds 已提交
1119 1120 1121
			break;
		case FIOGETOWN:
		case SIOCGPGRP:
1122
			err = put_user(f_getown(sock->file),
1123
				       (int __user *)argp);
L
Linus Torvalds 已提交
1124 1125 1126 1127 1128 1129 1130 1131 1132
			break;
		case SIOCGIFBR:
		case SIOCSIFBR:
		case SIOCBRADDBR:
		case SIOCBRDELBR:
			err = -ENOPKG;
			if (!br_ioctl_hook)
				request_module("bridge");

A
Arjan van de Ven 已提交
1133
			mutex_lock(&br_ioctl_mutex);
1134
			if (br_ioctl_hook)
1135
				err = br_ioctl_hook(net, cmd, argp);
A
Arjan van de Ven 已提交
1136
			mutex_unlock(&br_ioctl_mutex);
L
Linus Torvalds 已提交
1137 1138 1139 1140 1141 1142 1143
			break;
		case SIOCGIFVLAN:
		case SIOCSIFVLAN:
			err = -ENOPKG;
			if (!vlan_ioctl_hook)
				request_module("8021q");

A
Arjan van de Ven 已提交
1144
			mutex_lock(&vlan_ioctl_mutex);
L
Linus Torvalds 已提交
1145
			if (vlan_ioctl_hook)
1146
				err = vlan_ioctl_hook(net, argp);
A
Arjan van de Ven 已提交
1147
			mutex_unlock(&vlan_ioctl_mutex);
L
Linus Torvalds 已提交
1148 1149 1150 1151 1152 1153 1154
			break;
		case SIOCADDDLCI:
		case SIOCDELDLCI:
			err = -ENOPKG;
			if (!dlci_ioctl_hook)
				request_module("dlci");

1155 1156
			mutex_lock(&dlci_ioctl_mutex);
			if (dlci_ioctl_hook)
L
Linus Torvalds 已提交
1157
				err = dlci_ioctl_hook(cmd, argp);
1158
			mutex_unlock(&dlci_ioctl_mutex);
L
Linus Torvalds 已提交
1159
			break;
1160 1161 1162 1163 1164 1165 1166
		case SIOCGSKNS:
			err = -EPERM;
			if (!ns_capable(net->user_ns, CAP_NET_ADMIN))
				break;

			err = open_related_ns(&net->ns, get_net_ns);
			break;
1167 1168
		case SIOCGSTAMP_OLD:
		case SIOCGSTAMPNS_OLD:
1169 1170 1171 1172 1173
			if (!sock->ops->gettstamp) {
				err = -ENOIOCTLCMD;
				break;
			}
			err = sock->ops->gettstamp(sock, argp,
1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184
						   cmd == SIOCGSTAMP_OLD,
						   !IS_ENABLED(CONFIG_64BIT));
		case SIOCGSTAMP_NEW:
		case SIOCGSTAMPNS_NEW:
			if (!sock->ops->gettstamp) {
				err = -ENOIOCTLCMD;
				break;
			}
			err = sock->ops->gettstamp(sock, argp,
						   cmd == SIOCGSTAMP_NEW,
						   false);
1185
			break;
L
Linus Torvalds 已提交
1186
		default:
1187
			err = sock_do_ioctl(net, sock, cmd, arg);
L
Linus Torvalds 已提交
1188
			break;
1189
		}
L
Linus Torvalds 已提交
1190 1191 1192
	return err;
}

1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205
/**
 *	sock_create_lite - creates a socket
 *	@family: protocol family (AF_INET, ...)
 *	@type: communication type (SOCK_STREAM, ...)
 *	@protocol: protocol (0, ...)
 *	@res: new socket
 *
 *	Creates a new socket and assigns it to @res, passing through LSM.
 *	The new socket initialization is not complete, see kernel_accept().
 *	Returns 0 or an error. On failure @res is set to %NULL.
 *	This function internally uses GFP_KERNEL.
 */

L
Linus Torvalds 已提交
1206 1207 1208 1209
int sock_create_lite(int family, int type, int protocol, struct socket **res)
{
	int err;
	struct socket *sock = NULL;
1210

L
Linus Torvalds 已提交
1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221
	err = security_socket_create(family, type, protocol, 1);
	if (err)
		goto out;

	sock = sock_alloc();
	if (!sock) {
		err = -ENOMEM;
		goto out;
	}

	sock->type = type;
V
Venkat Yekkirala 已提交
1222 1223 1224 1225
	err = security_socket_post_create(sock, family, type, protocol, 1);
	if (err)
		goto out_release;

L
Linus Torvalds 已提交
1226 1227 1228
out:
	*res = sock;
	return err;
V
Venkat Yekkirala 已提交
1229 1230 1231 1232
out_release:
	sock_release(sock);
	sock = NULL;
	goto out;
L
Linus Torvalds 已提交
1233
}
1234
EXPORT_SYMBOL(sock_create_lite);
L
Linus Torvalds 已提交
1235 1236

/* No kernel lock held - perfect */
A
Al Viro 已提交
1237
static __poll_t sock_poll(struct file *file, poll_table *wait)
L
Linus Torvalds 已提交
1238
{
C
Christoph Hellwig 已提交
1239
	struct socket *sock = file->private_data;
1240
	__poll_t events = poll_requested_events(wait), flag = 0;
1241

1242 1243
	if (!sock->ops->poll)
		return 0;
1244

1245 1246 1247 1248 1249 1250 1251 1252 1253 1254
	if (sk_can_busy_loop(sock->sk)) {
		/* poll once if requested by the syscall */
		if (events & POLL_BUSY_LOOP)
			sk_busy_loop(sock->sk, 1);

		/* if this socket can poll_ll, tell the system call */
		flag = POLL_BUSY_LOOP;
	}

	return sock->ops->poll(file, sock, wait) | flag;
L
Linus Torvalds 已提交
1255 1256
}

1257
static int sock_mmap(struct file *file, struct vm_area_struct *vma)
L
Linus Torvalds 已提交
1258
{
1259
	struct socket *sock = file->private_data;
L
Linus Torvalds 已提交
1260 1261 1262 1263

	return sock->ops->mmap(file, sock, vma);
}

1264
static int sock_close(struct inode *inode, struct file *filp)
L
Linus Torvalds 已提交
1265
{
1266
	__sock_release(SOCKET_I(inode), inode);
L
Linus Torvalds 已提交
1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277
	return 0;
}

/*
 *	Update the socket async list
 *
 *	Fasync_list locking strategy.
 *
 *	1. fasync_list is modified only under process context socket lock
 *	   i.e. under semaphore.
 *	2. fasync_list is used under read_lock(&sk->sk_callback_lock)
1278
 *	   or under socket lock
L
Linus Torvalds 已提交
1279 1280 1281 1282
 */

static int sock_fasync(int fd, struct file *filp, int on)
{
1283 1284
	struct socket *sock = filp->private_data;
	struct sock *sk = sock->sk;
1285
	struct socket_wq *wq;
L
Linus Torvalds 已提交
1286

1287
	if (sk == NULL)
L
Linus Torvalds 已提交
1288 1289 1290
		return -EINVAL;

	lock_sock(sk);
1291
	wq = sock->wq;
1292
	fasync_helper(fd, filp, on, &wq->fasync_list);
L
Linus Torvalds 已提交
1293

1294
	if (!wq->fasync_list)
1295 1296
		sock_reset_flag(sk, SOCK_FASYNC);
	else
E
Eric Dumazet 已提交
1297
		sock_set_flag(sk, SOCK_FASYNC);
L
Linus Torvalds 已提交
1298

1299
	release_sock(sk);
L
Linus Torvalds 已提交
1300 1301 1302
	return 0;
}

1303
/* This function may be called only under rcu_lock */
L
Linus Torvalds 已提交
1304

1305
int sock_wake_async(struct socket_wq *wq, int how, int band)
L
Linus Torvalds 已提交
1306
{
1307
	if (!wq || !wq->fasync_list)
L
Linus Torvalds 已提交
1308
		return -1;
1309

1310
	switch (how) {
1311
	case SOCK_WAKE_WAITD:
1312
		if (test_bit(SOCKWQ_ASYNC_WAITDATA, &wq->flags))
L
Linus Torvalds 已提交
1313 1314
			break;
		goto call_kill;
1315
	case SOCK_WAKE_SPACE:
1316
		if (!test_and_clear_bit(SOCKWQ_ASYNC_NOSPACE, &wq->flags))
L
Linus Torvalds 已提交
1317 1318
			break;
		/* fall through */
1319
	case SOCK_WAKE_IO:
1320
call_kill:
1321
		kill_fasync(&wq->fasync_list, SIGIO, band);
L
Linus Torvalds 已提交
1322
		break;
1323
	case SOCK_WAKE_URG:
1324
		kill_fasync(&wq->fasync_list, SIGURG, band);
L
Linus Torvalds 已提交
1325
	}
1326

L
Linus Torvalds 已提交
1327 1328
	return 0;
}
1329
EXPORT_SYMBOL(sock_wake_async);
L
Linus Torvalds 已提交
1330

1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345
/**
 *	__sock_create - creates a socket
 *	@net: net namespace
 *	@family: protocol family (AF_INET, ...)
 *	@type: communication type (SOCK_STREAM, ...)
 *	@protocol: protocol (0, ...)
 *	@res: new socket
 *	@kern: boolean for kernel space sockets
 *
 *	Creates a new socket and assigns it to @res, passing through LSM.
 *	Returns 0 or an error. On failure @res is set to %NULL. @kern must
 *	be set to true if the socket resides in kernel space.
 *	This function internally uses GFP_KERNEL.
 */

P
Pavel Emelyanov 已提交
1346
int __sock_create(struct net *net, int family, int type, int protocol,
1347
			 struct socket **res, int kern)
L
Linus Torvalds 已提交
1348 1349 1350
{
	int err;
	struct socket *sock;
1351
	const struct net_proto_family *pf;
L
Linus Torvalds 已提交
1352 1353

	/*
1354
	 *      Check protocol is in range
L
Linus Torvalds 已提交
1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366
	 */
	if (family < 0 || family >= NPROTO)
		return -EAFNOSUPPORT;
	if (type < 0 || type >= SOCK_MAX)
		return -EINVAL;

	/* Compatibility.

	   This uglymoron is moved from INET layer to here to avoid
	   deadlock in module load.
	 */
	if (family == PF_INET && type == SOCK_PACKET) {
1367 1368
		pr_info_once("%s uses obsolete (PF_INET,SOCK_PACKET)\n",
			     current->comm);
L
Linus Torvalds 已提交
1369 1370 1371 1372 1373 1374
		family = PF_PACKET;
	}

	err = security_socket_create(family, type, protocol, kern);
	if (err)
		return err;
1375

1376 1377 1378 1379 1380 1381 1382
	/*
	 *	Allocate the socket and allow the family to set things up. if
	 *	the protocol is 0, the family is instructed to select an appropriate
	 *	default.
	 */
	sock = sock_alloc();
	if (!sock) {
1383
		net_warn_ratelimited("socket: no more sockets\n");
1384 1385 1386 1387 1388 1389
		return -ENFILE;	/* Not exactly a match, but its the
				   closest posix thing */
	}

	sock->type = type;

1390
#ifdef CONFIG_MODULES
1391 1392 1393
	/* Attempt to load a protocol module if the find failed.
	 *
	 * 12/09/1996 Marcin: But! this makes REALLY only sense, if the user
L
Linus Torvalds 已提交
1394 1395 1396
	 * requested real, full-featured networking support upon configuration.
	 * Otherwise module support will break!
	 */
E
Eric Dumazet 已提交
1397
	if (rcu_access_pointer(net_families[family]) == NULL)
1398
		request_module("net-pf-%d", family);
L
Linus Torvalds 已提交
1399 1400
#endif

1401 1402 1403 1404 1405
	rcu_read_lock();
	pf = rcu_dereference(net_families[family]);
	err = -EAFNOSUPPORT;
	if (!pf)
		goto out_release;
L
Linus Torvalds 已提交
1406 1407 1408 1409 1410

	/*
	 * We will call the ->create function, that possibly is in a loadable
	 * module, so we have to bump that loadable module refcnt first.
	 */
1411
	if (!try_module_get(pf->owner))
L
Linus Torvalds 已提交
1412 1413
		goto out_release;

1414 1415 1416
	/* Now protected by module ref count */
	rcu_read_unlock();

1417
	err = pf->create(net, sock, protocol, kern);
1418
	if (err < 0)
L
Linus Torvalds 已提交
1419
		goto out_module_put;
1420

L
Linus Torvalds 已提交
1421 1422 1423 1424
	/*
	 * Now to bump the refcnt of the [loadable] module that owns this
	 * socket at sock_release time we decrement its refcnt.
	 */
1425 1426 1427
	if (!try_module_get(sock->ops->owner))
		goto out_module_busy;

L
Linus Torvalds 已提交
1428 1429 1430 1431
	/*
	 * Now that we're done with the ->create function, the [loadable]
	 * module can have its refcnt decremented
	 */
1432
	module_put(pf->owner);
V
Venkat Yekkirala 已提交
1433 1434
	err = security_socket_post_create(sock, family, type, protocol, kern);
	if (err)
1435
		goto out_sock_release;
1436
	*res = sock;
L
Linus Torvalds 已提交
1437

1438 1439 1440 1441
	return 0;

out_module_busy:
	err = -EAFNOSUPPORT;
L
Linus Torvalds 已提交
1442
out_module_put:
1443 1444 1445
	sock->ops = NULL;
	module_put(pf->owner);
out_sock_release:
L
Linus Torvalds 已提交
1446
	sock_release(sock);
1447 1448 1449 1450 1451
	return err;

out_release:
	rcu_read_unlock();
	goto out_sock_release;
L
Linus Torvalds 已提交
1452
}
P
Pavel Emelyanov 已提交
1453
EXPORT_SYMBOL(__sock_create);
L
Linus Torvalds 已提交
1454

1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465
/**
 *	sock_create - creates a socket
 *	@family: protocol family (AF_INET, ...)
 *	@type: communication type (SOCK_STREAM, ...)
 *	@protocol: protocol (0, ...)
 *	@res: new socket
 *
 *	A wrapper around __sock_create().
 *	Returns 0 or an error. This function internally uses GFP_KERNEL.
 */

L
Linus Torvalds 已提交
1466 1467
int sock_create(int family, int type, int protocol, struct socket **res)
{
1468
	return __sock_create(current->nsproxy->net_ns, family, type, protocol, res, 0);
L
Linus Torvalds 已提交
1469
}
1470
EXPORT_SYMBOL(sock_create);
L
Linus Torvalds 已提交
1471

1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483
/**
 *	sock_create_kern - creates a socket (kernel space)
 *	@net: net namespace
 *	@family: protocol family (AF_INET, ...)
 *	@type: communication type (SOCK_STREAM, ...)
 *	@protocol: protocol (0, ...)
 *	@res: new socket
 *
 *	A wrapper around __sock_create().
 *	Returns 0 or an error. This function internally uses GFP_KERNEL.
 */

1484
int sock_create_kern(struct net *net, int family, int type, int protocol, struct socket **res)
L
Linus Torvalds 已提交
1485
{
1486
	return __sock_create(net, family, type, protocol, res, 1);
L
Linus Torvalds 已提交
1487
}
1488
EXPORT_SYMBOL(sock_create_kern);
L
Linus Torvalds 已提交
1489

1490
int __sys_socket(int family, int type, int protocol)
L
Linus Torvalds 已提交
1491 1492 1493
{
	int retval;
	struct socket *sock;
1494 1495
	int flags;

1496 1497 1498 1499 1500 1501
	/* Check the SOCK_* constants for consistency.  */
	BUILD_BUG_ON(SOCK_CLOEXEC != O_CLOEXEC);
	BUILD_BUG_ON((SOCK_MAX | SOCK_TYPE_MASK) != SOCK_TYPE_MASK);
	BUILD_BUG_ON(SOCK_CLOEXEC & SOCK_TYPE_MASK);
	BUILD_BUG_ON(SOCK_NONBLOCK & SOCK_TYPE_MASK);

1502
	flags = type & ~SOCK_TYPE_MASK;
1503
	if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
1504 1505
		return -EINVAL;
	type &= SOCK_TYPE_MASK;
L
Linus Torvalds 已提交
1506

U
Ulrich Drepper 已提交
1507 1508 1509
	if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
		flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;

L
Linus Torvalds 已提交
1510 1511
	retval = sock_create(family, type, protocol, &sock);
	if (retval < 0)
1512
		return retval;
L
Linus Torvalds 已提交
1513

1514
	return sock_map_fd(sock, flags & (O_CLOEXEC | O_NONBLOCK));
L
Linus Torvalds 已提交
1515 1516
}

1517 1518 1519 1520 1521
SYSCALL_DEFINE3(socket, int, family, int, type, int, protocol)
{
	return __sys_socket(family, type, protocol);
}

L
Linus Torvalds 已提交
1522 1523 1524 1525
/*
 *	Create a pair of connected sockets.
 */

1526
int __sys_socketpair(int family, int type, int protocol, int __user *usockvec)
L
Linus Torvalds 已提交
1527 1528 1529
{
	struct socket *sock1, *sock2;
	int fd1, fd2, err;
A
Al Viro 已提交
1530
	struct file *newfile1, *newfile2;
1531 1532 1533
	int flags;

	flags = type & ~SOCK_TYPE_MASK;
1534
	if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
1535 1536
		return -EINVAL;
	type &= SOCK_TYPE_MASK;
L
Linus Torvalds 已提交
1537

U
Ulrich Drepper 已提交
1538 1539 1540
	if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
		flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;

A
Al Viro 已提交
1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 1557 1558 1559 1560 1561 1562
	/*
	 * reserve descriptors and make sure we won't fail
	 * to return them to userland.
	 */
	fd1 = get_unused_fd_flags(flags);
	if (unlikely(fd1 < 0))
		return fd1;

	fd2 = get_unused_fd_flags(flags);
	if (unlikely(fd2 < 0)) {
		put_unused_fd(fd1);
		return fd2;
	}

	err = put_user(fd1, &usockvec[0]);
	if (err)
		goto out;

	err = put_user(fd2, &usockvec[1]);
	if (err)
		goto out;

L
Linus Torvalds 已提交
1563 1564 1565 1566 1567 1568
	/*
	 * Obtain the first socket and check if the underlying protocol
	 * supports the socketpair call.
	 */

	err = sock_create(family, type, protocol, &sock1);
A
Al Viro 已提交
1569
	if (unlikely(err < 0))
L
Linus Torvalds 已提交
1570 1571 1572
		goto out;

	err = sock_create(family, type, protocol, &sock2);
A
Al Viro 已提交
1573 1574 1575
	if (unlikely(err < 0)) {
		sock_release(sock1);
		goto out;
1576
	}
1577

D
David Herrmann 已提交
1578 1579 1580 1581 1582 1583 1584
	err = security_socket_socketpair(sock1, sock2);
	if (unlikely(err)) {
		sock_release(sock2);
		sock_release(sock1);
		goto out;
	}

A
Al Viro 已提交
1585 1586 1587 1588 1589
	err = sock1->ops->socketpair(sock1, sock2);
	if (unlikely(err < 0)) {
		sock_release(sock2);
		sock_release(sock1);
		goto out;
1590 1591
	}

1592
	newfile1 = sock_alloc_file(sock1, flags, NULL);
1593
	if (IS_ERR(newfile1)) {
1594
		err = PTR_ERR(newfile1);
A
Al Viro 已提交
1595 1596
		sock_release(sock2);
		goto out;
1597 1598
	}

1599
	newfile2 = sock_alloc_file(sock2, flags, NULL);
1600 1601
	if (IS_ERR(newfile2)) {
		err = PTR_ERR(newfile2);
A
Al Viro 已提交
1602 1603
		fput(newfile1);
		goto out;
A
Al Viro 已提交
1604 1605
	}

A
Al Viro 已提交
1606
	audit_fd_pair(fd1, fd2);
1607

A
Al Viro 已提交
1608 1609
	fd_install(fd1, newfile1);
	fd_install(fd2, newfile2);
1610
	return 0;
L
Linus Torvalds 已提交
1611

A
Al Viro 已提交
1612
out:
1613 1614
	put_unused_fd(fd2);
	put_unused_fd(fd1);
L
Linus Torvalds 已提交
1615 1616 1617
	return err;
}

1618 1619 1620 1621 1622 1623
SYSCALL_DEFINE4(socketpair, int, family, int, type, int, protocol,
		int __user *, usockvec)
{
	return __sys_socketpair(family, type, protocol, usockvec);
}

L
Linus Torvalds 已提交
1624 1625 1626 1627 1628 1629 1630 1631
/*
 *	Bind a name to a socket. Nothing much to do here since it's
 *	the protocol's responsibility to handle the local address.
 *
 *	We move the socket address to kernel space before we call
 *	the protocol layer (having also checked the address is ok).
 */

1632
int __sys_bind(int fd, struct sockaddr __user *umyaddr, int addrlen)
L
Linus Torvalds 已提交
1633 1634
{
	struct socket *sock;
1635
	struct sockaddr_storage address;
1636
	int err, fput_needed;
L
Linus Torvalds 已提交
1637

1638
	sock = sockfd_lookup_light(fd, &err, &fput_needed);
1639
	if (sock) {
1640
		err = move_addr_to_kernel(umyaddr, addrlen, &address);
1641
		if (!err) {
1642
			err = security_socket_bind(sock,
1643
						   (struct sockaddr *)&address,
1644
						   addrlen);
1645 1646
			if (!err)
				err = sock->ops->bind(sock,
1647
						      (struct sockaddr *)
1648
						      &address, addrlen);
L
Linus Torvalds 已提交
1649
		}
1650
		fput_light(sock->file, fput_needed);
1651
	}
L
Linus Torvalds 已提交
1652 1653 1654
	return err;
}

1655 1656 1657 1658 1659
SYSCALL_DEFINE3(bind, int, fd, struct sockaddr __user *, umyaddr, int, addrlen)
{
	return __sys_bind(fd, umyaddr, addrlen);
}

L
Linus Torvalds 已提交
1660 1661 1662 1663 1664 1665
/*
 *	Perform a listen. Basically, we allow the protocol to do anything
 *	necessary for a listen, and if that works, we mark the socket as
 *	ready for listening.
 */

1666
int __sys_listen(int fd, int backlog)
L
Linus Torvalds 已提交
1667 1668
{
	struct socket *sock;
1669
	int err, fput_needed;
1670
	int somaxconn;
1671 1672 1673

	sock = sockfd_lookup_light(fd, &err, &fput_needed);
	if (sock) {
1674
		somaxconn = sock_net(sock->sk)->core.sysctl_somaxconn;
1675
		if ((unsigned int)backlog > somaxconn)
1676
			backlog = somaxconn;
L
Linus Torvalds 已提交
1677 1678

		err = security_socket_listen(sock, backlog);
1679 1680
		if (!err)
			err = sock->ops->listen(sock, backlog);
L
Linus Torvalds 已提交
1681

1682
		fput_light(sock->file, fput_needed);
L
Linus Torvalds 已提交
1683 1684 1685 1686
	}
	return err;
}

1687 1688 1689 1690 1691
SYSCALL_DEFINE2(listen, int, fd, int, backlog)
{
	return __sys_listen(fd, backlog);
}

L
Linus Torvalds 已提交
1692 1693 1694 1695 1696 1697 1698 1699 1700
/*
 *	For accept, we attempt to create a new socket, set up the link
 *	with the client, wake up the client, then return the new
 *	connected fd. We collect the address of the connector in kernel
 *	space and move it to user at the very end. This is unclean because
 *	we open the socket then return an error.
 *
 *	1003.1g adds the ability to recvmsg() to query connection pending
 *	status to recvmsg. We need to add that support in a way thats
1701
 *	clean when we restructure accept also.
L
Linus Torvalds 已提交
1702 1703
 */

1704 1705
int __sys_accept4(int fd, struct sockaddr __user *upeer_sockaddr,
		  int __user *upeer_addrlen, int flags)
L
Linus Torvalds 已提交
1706 1707
{
	struct socket *sock, *newsock;
1708
	struct file *newfile;
1709
	int err, len, newfd, fput_needed;
1710
	struct sockaddr_storage address;
L
Linus Torvalds 已提交
1711

1712
	if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
U
Ulrich Drepper 已提交
1713 1714 1715 1716 1717
		return -EINVAL;

	if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
		flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;

1718
	sock = sockfd_lookup_light(fd, &err, &fput_needed);
L
Linus Torvalds 已提交
1719 1720 1721 1722
	if (!sock)
		goto out;

	err = -ENFILE;
1723 1724
	newsock = sock_alloc();
	if (!newsock)
L
Linus Torvalds 已提交
1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735
		goto out_put;

	newsock->type = sock->type;
	newsock->ops = sock->ops;

	/*
	 * We don't need try_module_get here, as the listening socket (sock)
	 * has the protocol module (sock->ops->owner) held.
	 */
	__module_get(newsock->ops->owner);

1736
	newfd = get_unused_fd_flags(flags);
1737 1738
	if (unlikely(newfd < 0)) {
		err = newfd;
1739 1740
		sock_release(newsock);
		goto out_put;
1741
	}
1742
	newfile = sock_alloc_file(newsock, flags, sock->sk->sk_prot_creator->name);
1743
	if (IS_ERR(newfile)) {
1744 1745 1746 1747
		err = PTR_ERR(newfile);
		put_unused_fd(newfd);
		goto out_put;
	}
1748

1749 1750
	err = security_socket_accept(sock, newsock);
	if (err)
1751
		goto out_fd;
1752

1753
	err = sock->ops->accept(sock, newsock, sock->file->f_flags, false);
L
Linus Torvalds 已提交
1754
	if (err < 0)
1755
		goto out_fd;
L
Linus Torvalds 已提交
1756 1757

	if (upeer_sockaddr) {
1758 1759 1760
		len = newsock->ops->getname(newsock,
					(struct sockaddr *)&address, 2);
		if (len < 0) {
L
Linus Torvalds 已提交
1761
			err = -ECONNABORTED;
1762
			goto out_fd;
L
Linus Torvalds 已提交
1763
		}
1764
		err = move_addr_to_user(&address,
1765
					len, upeer_sockaddr, upeer_addrlen);
L
Linus Torvalds 已提交
1766
		if (err < 0)
1767
			goto out_fd;
L
Linus Torvalds 已提交
1768 1769 1770 1771
	}

	/* File flags are not inherited via accept() unlike another OSes. */

1772 1773
	fd_install(newfd, newfile);
	err = newfd;
L
Linus Torvalds 已提交
1774 1775

out_put:
1776
	fput_light(sock->file, fput_needed);
L
Linus Torvalds 已提交
1777 1778
out:
	return err;
1779
out_fd:
1780
	fput(newfile);
1781
	put_unused_fd(newfd);
L
Linus Torvalds 已提交
1782 1783 1784
	goto out_put;
}

1785 1786 1787 1788 1789 1790
SYSCALL_DEFINE4(accept4, int, fd, struct sockaddr __user *, upeer_sockaddr,
		int __user *, upeer_addrlen, int, flags)
{
	return __sys_accept4(fd, upeer_sockaddr, upeer_addrlen, flags);
}

1791 1792
SYSCALL_DEFINE3(accept, int, fd, struct sockaddr __user *, upeer_sockaddr,
		int __user *, upeer_addrlen)
U
Ulrich Drepper 已提交
1793
{
1794
	return __sys_accept4(fd, upeer_sockaddr, upeer_addrlen, 0);
U
Ulrich Drepper 已提交
1795 1796
}

L
Linus Torvalds 已提交
1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808
/*
 *	Attempt to connect to a socket with the server address.  The address
 *	is in user space so we verify it is OK and move it to kernel space.
 *
 *	For 1003.1g we need to add clean support for a bind to AF_UNSPEC to
 *	break bindings
 *
 *	NOTE: 1003.1g draft 6.3 is broken with respect to AX.25/NetROM and
 *	other SEQPACKET protocols that take time to connect() as it doesn't
 *	include the -EINPROGRESS status for such sockets.
 */

1809
int __sys_connect(int fd, struct sockaddr __user *uservaddr, int addrlen)
L
Linus Torvalds 已提交
1810 1811
{
	struct socket *sock;
1812
	struct sockaddr_storage address;
1813
	int err, fput_needed;
L
Linus Torvalds 已提交
1814

1815
	sock = sockfd_lookup_light(fd, &err, &fput_needed);
L
Linus Torvalds 已提交
1816 1817
	if (!sock)
		goto out;
1818
	err = move_addr_to_kernel(uservaddr, addrlen, &address);
L
Linus Torvalds 已提交
1819 1820 1821
	if (err < 0)
		goto out_put;

1822
	err =
1823
	    security_socket_connect(sock, (struct sockaddr *)&address, addrlen);
L
Linus Torvalds 已提交
1824 1825 1826
	if (err)
		goto out_put;

1827
	err = sock->ops->connect(sock, (struct sockaddr *)&address, addrlen,
L
Linus Torvalds 已提交
1828 1829
				 sock->file->f_flags);
out_put:
1830
	fput_light(sock->file, fput_needed);
L
Linus Torvalds 已提交
1831 1832 1833 1834
out:
	return err;
}

1835 1836 1837 1838 1839 1840
SYSCALL_DEFINE3(connect, int, fd, struct sockaddr __user *, uservaddr,
		int, addrlen)
{
	return __sys_connect(fd, uservaddr, addrlen);
}

L
Linus Torvalds 已提交
1841 1842 1843 1844 1845
/*
 *	Get the local address ('name') of a socket object. Move the obtained
 *	name to user space.
 */

1846 1847
int __sys_getsockname(int fd, struct sockaddr __user *usockaddr,
		      int __user *usockaddr_len)
L
Linus Torvalds 已提交
1848 1849
{
	struct socket *sock;
1850
	struct sockaddr_storage address;
1851
	int err, fput_needed;
1852

1853
	sock = sockfd_lookup_light(fd, &err, &fput_needed);
L
Linus Torvalds 已提交
1854 1855 1856 1857 1858 1859 1860
	if (!sock)
		goto out;

	err = security_socket_getsockname(sock);
	if (err)
		goto out_put;

1861 1862
	err = sock->ops->getname(sock, (struct sockaddr *)&address, 0);
	if (err < 0)
L
Linus Torvalds 已提交
1863
		goto out_put;
1864 1865
        /* "err" is actually length in this case */
	err = move_addr_to_user(&address, err, usockaddr, usockaddr_len);
L
Linus Torvalds 已提交
1866 1867

out_put:
1868
	fput_light(sock->file, fput_needed);
L
Linus Torvalds 已提交
1869 1870 1871 1872
out:
	return err;
}

1873 1874 1875 1876 1877 1878
SYSCALL_DEFINE3(getsockname, int, fd, struct sockaddr __user *, usockaddr,
		int __user *, usockaddr_len)
{
	return __sys_getsockname(fd, usockaddr, usockaddr_len);
}

L
Linus Torvalds 已提交
1879 1880 1881 1882 1883
/*
 *	Get the remote address ('name') of a socket object. Move the obtained
 *	name to user space.
 */

1884 1885
int __sys_getpeername(int fd, struct sockaddr __user *usockaddr,
		      int __user *usockaddr_len)
L
Linus Torvalds 已提交
1886 1887
{
	struct socket *sock;
1888
	struct sockaddr_storage address;
1889
	int err, fput_needed;
L
Linus Torvalds 已提交
1890

1891 1892
	sock = sockfd_lookup_light(fd, &err, &fput_needed);
	if (sock != NULL) {
L
Linus Torvalds 已提交
1893 1894
		err = security_socket_getpeername(sock);
		if (err) {
1895
			fput_light(sock->file, fput_needed);
L
Linus Torvalds 已提交
1896 1897 1898
			return err;
		}

1899 1900 1901 1902
		err = sock->ops->getname(sock, (struct sockaddr *)&address, 1);
		if (err >= 0)
			/* "err" is actually length in this case */
			err = move_addr_to_user(&address, err, usockaddr,
1903
						usockaddr_len);
1904
		fput_light(sock->file, fput_needed);
L
Linus Torvalds 已提交
1905 1906 1907 1908
	}
	return err;
}

1909 1910 1911 1912 1913 1914
SYSCALL_DEFINE3(getpeername, int, fd, struct sockaddr __user *, usockaddr,
		int __user *, usockaddr_len)
{
	return __sys_getpeername(fd, usockaddr, usockaddr_len);
}

L
Linus Torvalds 已提交
1915 1916 1917 1918 1919
/*
 *	Send a datagram to a given address. We move the address into kernel
 *	space and check the user space data area is readable before invoking
 *	the protocol.
 */
1920 1921
int __sys_sendto(int fd, void __user *buff, size_t len, unsigned int flags,
		 struct sockaddr __user *addr,  int addr_len)
L
Linus Torvalds 已提交
1922 1923
{
	struct socket *sock;
1924
	struct sockaddr_storage address;
L
Linus Torvalds 已提交
1925 1926 1927
	int err;
	struct msghdr msg;
	struct iovec iov;
1928 1929
	int fput_needed;

1930 1931 1932
	err = import_single_range(WRITE, buff, len, &iov, &msg.msg_iter);
	if (unlikely(err))
		return err;
1933 1934
	sock = sockfd_lookup_light(fd, &err, &fput_needed);
	if (!sock)
1935
		goto out;
1936

1937 1938 1939 1940
	msg.msg_name = NULL;
	msg.msg_control = NULL;
	msg.msg_controllen = 0;
	msg.msg_namelen = 0;
1941
	if (addr) {
1942
		err = move_addr_to_kernel(addr, addr_len, &address);
L
Linus Torvalds 已提交
1943 1944
		if (err < 0)
			goto out_put;
1945
		msg.msg_name = (struct sockaddr *)&address;
1946
		msg.msg_namelen = addr_len;
L
Linus Torvalds 已提交
1947 1948 1949 1950
	}
	if (sock->file->f_flags & O_NONBLOCK)
		flags |= MSG_DONTWAIT;
	msg.msg_flags = flags;
1951
	err = sock_sendmsg(sock, &msg);
L
Linus Torvalds 已提交
1952

1953
out_put:
1954
	fput_light(sock->file, fput_needed);
1955
out:
L
Linus Torvalds 已提交
1956 1957 1958
	return err;
}

1959 1960 1961 1962 1963 1964 1965
SYSCALL_DEFINE6(sendto, int, fd, void __user *, buff, size_t, len,
		unsigned int, flags, struct sockaddr __user *, addr,
		int, addr_len)
{
	return __sys_sendto(fd, buff, len, flags, addr, addr_len);
}

L
Linus Torvalds 已提交
1966
/*
1967
 *	Send a datagram down a socket.
L
Linus Torvalds 已提交
1968 1969
 */

1970
SYSCALL_DEFINE4(send, int, fd, void __user *, buff, size_t, len,
1971
		unsigned int, flags)
L
Linus Torvalds 已提交
1972
{
1973
	return __sys_sendto(fd, buff, len, flags, NULL, 0);
L
Linus Torvalds 已提交
1974 1975 1976
}

/*
1977
 *	Receive a frame from the socket and optionally record the address of the
L
Linus Torvalds 已提交
1978 1979 1980
 *	sender. We verify the buffers are writable and if needed move the
 *	sender address from kernel to user space.
 */
1981 1982
int __sys_recvfrom(int fd, void __user *ubuf, size_t size, unsigned int flags,
		   struct sockaddr __user *addr, int __user *addr_len)
L
Linus Torvalds 已提交
1983 1984 1985 1986
{
	struct socket *sock;
	struct iovec iov;
	struct msghdr msg;
1987
	struct sockaddr_storage address;
1988
	int err, err2;
1989 1990
	int fput_needed;

1991 1992 1993
	err = import_single_range(READ, ubuf, size, &iov, &msg.msg_iter);
	if (unlikely(err))
		return err;
1994
	sock = sockfd_lookup_light(fd, &err, &fput_needed);
L
Linus Torvalds 已提交
1995
	if (!sock)
1996
		goto out;
L
Linus Torvalds 已提交
1997

1998 1999
	msg.msg_control = NULL;
	msg.msg_controllen = 0;
2000 2001 2002 2003
	/* Save some cycles and don't copy the address if not needed */
	msg.msg_name = addr ? (struct sockaddr *)&address : NULL;
	/* We assume all kernel code knows the size of sockaddr_storage */
	msg.msg_namelen = 0;
2004
	msg.msg_iocb = NULL;
2005
	msg.msg_flags = 0;
L
Linus Torvalds 已提交
2006 2007
	if (sock->file->f_flags & O_NONBLOCK)
		flags |= MSG_DONTWAIT;
2008
	err = sock_recvmsg(sock, &msg, flags);
L
Linus Torvalds 已提交
2009

2010
	if (err >= 0 && addr != NULL) {
2011
		err2 = move_addr_to_user(&address,
2012
					 msg.msg_namelen, addr, addr_len);
2013 2014
		if (err2 < 0)
			err = err2;
L
Linus Torvalds 已提交
2015
	}
2016 2017

	fput_light(sock->file, fput_needed);
2018
out:
L
Linus Torvalds 已提交
2019 2020 2021
	return err;
}

2022 2023 2024 2025 2026 2027 2028
SYSCALL_DEFINE6(recvfrom, int, fd, void __user *, ubuf, size_t, size,
		unsigned int, flags, struct sockaddr __user *, addr,
		int __user *, addr_len)
{
	return __sys_recvfrom(fd, ubuf, size, flags, addr, addr_len);
}

L
Linus Torvalds 已提交
2029
/*
2030
 *	Receive a datagram from a socket.
L
Linus Torvalds 已提交
2031 2032
 */

2033 2034
SYSCALL_DEFINE4(recv, int, fd, void __user *, ubuf, size_t, size,
		unsigned int, flags)
L
Linus Torvalds 已提交
2035
{
2036
	return __sys_recvfrom(fd, ubuf, size, flags, NULL, NULL);
L
Linus Torvalds 已提交
2037 2038 2039 2040 2041 2042 2043
}

/*
 *	Set a socket option. Because we don't know the option lengths we have
 *	to pass the user mode parameter for the protocols to sort out.
 */

2044 2045
static int __sys_setsockopt(int fd, int level, int optname,
			    char __user *optval, int optlen)
L
Linus Torvalds 已提交
2046
{
2047
	int err, fput_needed;
L
Linus Torvalds 已提交
2048 2049 2050 2051
	struct socket *sock;

	if (optlen < 0)
		return -EINVAL;
2052 2053 2054 2055

	sock = sockfd_lookup_light(fd, &err, &fput_needed);
	if (sock != NULL) {
		err = security_socket_setsockopt(sock, level, optname);
2056 2057
		if (err)
			goto out_put;
L
Linus Torvalds 已提交
2058 2059

		if (level == SOL_SOCKET)
2060 2061 2062
			err =
			    sock_setsockopt(sock, level, optname, optval,
					    optlen);
L
Linus Torvalds 已提交
2063
		else
2064 2065 2066
			err =
			    sock->ops->setsockopt(sock, level, optname, optval,
						  optlen);
2067 2068
out_put:
		fput_light(sock->file, fput_needed);
L
Linus Torvalds 已提交
2069 2070 2071 2072
	}
	return err;
}

2073 2074 2075 2076 2077 2078
SYSCALL_DEFINE5(setsockopt, int, fd, int, level, int, optname,
		char __user *, optval, int, optlen)
{
	return __sys_setsockopt(fd, level, optname, optval, optlen);
}

L
Linus Torvalds 已提交
2079 2080 2081 2082 2083
/*
 *	Get a socket option. Because we don't know the option lengths we have
 *	to pass a user mode parameter for the protocols to sort out.
 */

2084 2085
static int __sys_getsockopt(int fd, int level, int optname,
			    char __user *optval, int __user *optlen)
L
Linus Torvalds 已提交
2086
{
2087
	int err, fput_needed;
L
Linus Torvalds 已提交
2088 2089
	struct socket *sock;

2090 2091
	sock = sockfd_lookup_light(fd, &err, &fput_needed);
	if (sock != NULL) {
2092 2093 2094
		err = security_socket_getsockopt(sock, level, optname);
		if (err)
			goto out_put;
L
Linus Torvalds 已提交
2095 2096

		if (level == SOL_SOCKET)
2097 2098 2099
			err =
			    sock_getsockopt(sock, level, optname, optval,
					    optlen);
L
Linus Torvalds 已提交
2100
		else
2101 2102 2103
			err =
			    sock->ops->getsockopt(sock, level, optname, optval,
						  optlen);
2104 2105
out_put:
		fput_light(sock->file, fput_needed);
L
Linus Torvalds 已提交
2106 2107 2108 2109
	}
	return err;
}

2110 2111 2112 2113 2114 2115
SYSCALL_DEFINE5(getsockopt, int, fd, int, level, int, optname,
		char __user *, optval, int __user *, optlen)
{
	return __sys_getsockopt(fd, level, optname, optval, optlen);
}

L
Linus Torvalds 已提交
2116 2117 2118 2119
/*
 *	Shutdown a socket.
 */

2120
int __sys_shutdown(int fd, int how)
L
Linus Torvalds 已提交
2121
{
2122
	int err, fput_needed;
L
Linus Torvalds 已提交
2123 2124
	struct socket *sock;

2125 2126
	sock = sockfd_lookup_light(fd, &err, &fput_needed);
	if (sock != NULL) {
L
Linus Torvalds 已提交
2127
		err = security_socket_shutdown(sock, how);
2128 2129 2130
		if (!err)
			err = sock->ops->shutdown(sock, how);
		fput_light(sock->file, fput_needed);
L
Linus Torvalds 已提交
2131 2132 2133 2134
	}
	return err;
}

2135 2136 2137 2138 2139
SYSCALL_DEFINE2(shutdown, int, fd, int, how)
{
	return __sys_shutdown(fd, how);
}

2140
/* A couple of helpful macros for getting the address of the 32/64 bit
L
Linus Torvalds 已提交
2141 2142 2143 2144 2145 2146
 * fields which are the same type (int / unsigned) on our platforms.
 */
#define COMPAT_MSG(msg, member)	((MSG_CMSG_COMPAT & flags) ? &msg##_compat->member : &msg->member)
#define COMPAT_NAMELEN(msg)	COMPAT_MSG(msg, msg_namelen)
#define COMPAT_FLAGS(msg)	COMPAT_MSG(msg, msg_flags)

2147 2148 2149 2150 2151
struct used_address {
	struct sockaddr_storage name;
	unsigned int name_len;
};

2152 2153 2154 2155
static int copy_msghdr_from_user(struct msghdr *kmsg,
				 struct user_msghdr __user *umsg,
				 struct sockaddr __user **save_addr,
				 struct iovec **iov)
2156
{
2157
	struct user_msghdr msg;
2158 2159
	ssize_t err;

2160
	if (copy_from_user(&msg, umsg, sizeof(*umsg)))
2161
		return -EFAULT;
2162

2163
	kmsg->msg_control = (void __force *)msg.msg_control;
2164 2165 2166 2167 2168
	kmsg->msg_controllen = msg.msg_controllen;
	kmsg->msg_flags = msg.msg_flags;

	kmsg->msg_namelen = msg.msg_namelen;
	if (!msg.msg_name)
2169 2170
		kmsg->msg_namelen = 0;

2171 2172 2173
	if (kmsg->msg_namelen < 0)
		return -EINVAL;

2174
	if (kmsg->msg_namelen > sizeof(struct sockaddr_storage))
2175
		kmsg->msg_namelen = sizeof(struct sockaddr_storage);
2176 2177

	if (save_addr)
2178
		*save_addr = msg.msg_name;
2179

2180
	if (msg.msg_name && kmsg->msg_namelen) {
2181
		if (!save_addr) {
2182 2183
			err = move_addr_to_kernel(msg.msg_name,
						  kmsg->msg_namelen,
2184 2185 2186 2187 2188 2189 2190 2191 2192
						  kmsg->msg_name);
			if (err < 0)
				return err;
		}
	} else {
		kmsg->msg_name = NULL;
		kmsg->msg_namelen = 0;
	}

2193
	if (msg.msg_iovlen > UIO_MAXIOV)
2194 2195
		return -EMSGSIZE;

2196 2197
	kmsg->msg_iocb = NULL;

2198 2199
	return import_iovec(save_addr ? READ : WRITE,
			    msg.msg_iov, msg.msg_iovlen,
2200
			    UIO_FASTIOV, iov, &kmsg->msg_iter);
2201 2202
}

2203
static int ___sys_sendmsg(struct socket *sock, struct user_msghdr __user *msg,
2204
			 struct msghdr *msg_sys, unsigned int flags,
2205 2206
			 struct used_address *used_address,
			 unsigned int allowed_msghdr_flags)
L
Linus Torvalds 已提交
2207
{
2208 2209
	struct compat_msghdr __user *msg_compat =
	    (struct compat_msghdr __user *)msg;
2210
	struct sockaddr_storage address;
L
Linus Torvalds 已提交
2211
	struct iovec iovstack[UIO_FASTIOV], *iov = iovstack;
2212
	unsigned char ctl[sizeof(struct cmsghdr) + 20]
2213
				__aligned(sizeof(__kernel_size_t));
2214
	/* 20 is size of ipv6_pktinfo */
L
Linus Torvalds 已提交
2215
	unsigned char *ctl_buf = ctl;
2216
	int ctl_len;
2217
	ssize_t err;
2218

2219
	msg_sys->msg_name = &address;
L
Linus Torvalds 已提交
2220

2221
	if (MSG_CMSG_COMPAT & flags)
2222
		err = get_compat_msghdr(msg_sys, msg_compat, NULL, &iov);
2223
	else
2224
		err = copy_msghdr_from_user(msg_sys, msg, NULL, &iov);
2225
	if (err < 0)
2226
		return err;
L
Linus Torvalds 已提交
2227 2228 2229

	err = -ENOBUFS;

2230
	if (msg_sys->msg_controllen > INT_MAX)
L
Linus Torvalds 已提交
2231
		goto out_freeiov;
2232
	flags |= (msg_sys->msg_flags & allowed_msghdr_flags);
2233
	ctl_len = msg_sys->msg_controllen;
L
Linus Torvalds 已提交
2234
	if ((MSG_CMSG_COMPAT & flags) && ctl_len) {
2235
		err =
2236
		    cmsghdr_from_user_compat_to_kern(msg_sys, sock->sk, ctl,
2237
						     sizeof(ctl));
L
Linus Torvalds 已提交
2238 2239
		if (err)
			goto out_freeiov;
2240 2241
		ctl_buf = msg_sys->msg_control;
		ctl_len = msg_sys->msg_controllen;
L
Linus Torvalds 已提交
2242
	} else if (ctl_len) {
2243 2244
		BUILD_BUG_ON(sizeof(struct cmsghdr) !=
			     CMSG_ALIGN(sizeof(struct cmsghdr)));
2245
		if (ctl_len > sizeof(ctl)) {
L
Linus Torvalds 已提交
2246
			ctl_buf = sock_kmalloc(sock->sk, ctl_len, GFP_KERNEL);
2247
			if (ctl_buf == NULL)
L
Linus Torvalds 已提交
2248 2249 2250 2251
				goto out_freeiov;
		}
		err = -EFAULT;
		/*
2252
		 * Careful! Before this, msg_sys->msg_control contains a user pointer.
L
Linus Torvalds 已提交
2253 2254 2255
		 * Afterwards, it will be a kernel pointer. Thus the compiler-assisted
		 * checking falls down on this.
		 */
2256
		if (copy_from_user(ctl_buf,
2257
				   (void __user __force *)msg_sys->msg_control,
2258
				   ctl_len))
L
Linus Torvalds 已提交
2259
			goto out_freectl;
2260
		msg_sys->msg_control = ctl_buf;
L
Linus Torvalds 已提交
2261
	}
2262
	msg_sys->msg_flags = flags;
L
Linus Torvalds 已提交
2263 2264

	if (sock->file->f_flags & O_NONBLOCK)
2265
		msg_sys->msg_flags |= MSG_DONTWAIT;
2266 2267 2268 2269 2270 2271
	/*
	 * If this is sendmmsg() and current destination address is same as
	 * previously succeeded address, omit asking LSM's decision.
	 * used_address->name_len is initialized to UINT_MAX so that the first
	 * destination address never matches.
	 */
2272 2273 2274
	if (used_address && msg_sys->msg_name &&
	    used_address->name_len == msg_sys->msg_namelen &&
	    !memcmp(&used_address->name, msg_sys->msg_name,
2275
		    used_address->name_len)) {
2276
		err = sock_sendmsg_nosec(sock, msg_sys);
2277 2278
		goto out_freectl;
	}
2279
	err = sock_sendmsg(sock, msg_sys);
2280 2281 2282 2283 2284 2285
	/*
	 * If this is sendmmsg() and sending to current destination address was
	 * successful, remember it.
	 */
	if (used_address && err >= 0) {
		used_address->name_len = msg_sys->msg_namelen;
2286 2287 2288
		if (msg_sys->msg_name)
			memcpy(&used_address->name, msg_sys->msg_name,
			       used_address->name_len);
2289
	}
L
Linus Torvalds 已提交
2290 2291

out_freectl:
2292
	if (ctl_buf != ctl)
L
Linus Torvalds 已提交
2293 2294
		sock_kfree_s(sock->sk, ctl_buf, ctl_len);
out_freeiov:
2295
	kfree(iov);
2296 2297 2298 2299 2300 2301 2302
	return err;
}

/*
 *	BSD sendmsg interface
 */

2303 2304
long __sys_sendmsg(int fd, struct user_msghdr __user *msg, unsigned int flags,
		   bool forbid_cmsg_compat)
2305 2306 2307
{
	int fput_needed, err;
	struct msghdr msg_sys;
2308 2309
	struct socket *sock;

2310 2311 2312
	if (forbid_cmsg_compat && (flags & MSG_CMSG_COMPAT))
		return -EINVAL;

2313
	sock = sockfd_lookup_light(fd, &err, &fput_needed);
2314 2315 2316
	if (!sock)
		goto out;

2317
	err = ___sys_sendmsg(sock, msg, &msg_sys, flags, NULL, 0);
2318

2319
	fput_light(sock->file, fput_needed);
2320
out:
L
Linus Torvalds 已提交
2321 2322 2323
	return err;
}

2324
SYSCALL_DEFINE3(sendmsg, int, fd, struct user_msghdr __user *, msg, unsigned int, flags)
2325
{
2326
	return __sys_sendmsg(fd, msg, flags, true);
2327 2328
}

2329 2330 2331 2332 2333
/*
 *	Linux sendmmsg interface
 */

int __sys_sendmmsg(int fd, struct mmsghdr __user *mmsg, unsigned int vlen,
2334
		   unsigned int flags, bool forbid_cmsg_compat)
2335 2336 2337 2338 2339 2340
{
	int fput_needed, err, datagrams;
	struct socket *sock;
	struct mmsghdr __user *entry;
	struct compat_mmsghdr __user *compat_entry;
	struct msghdr msg_sys;
2341
	struct used_address used_address;
T
Tom Herbert 已提交
2342
	unsigned int oflags = flags;
2343

2344 2345 2346
	if (forbid_cmsg_compat && (flags & MSG_CMSG_COMPAT))
		return -EINVAL;

2347 2348
	if (vlen > UIO_MAXIOV)
		vlen = UIO_MAXIOV;
2349 2350 2351 2352 2353 2354 2355

	datagrams = 0;

	sock = sockfd_lookup_light(fd, &err, &fput_needed);
	if (!sock)
		return err;

2356
	used_address.name_len = UINT_MAX;
2357 2358
	entry = mmsg;
	compat_entry = (struct compat_mmsghdr __user *)mmsg;
2359
	err = 0;
T
Tom Herbert 已提交
2360
	flags |= MSG_BATCH;
2361 2362

	while (datagrams < vlen) {
T
Tom Herbert 已提交
2363 2364 2365
		if (datagrams == vlen - 1)
			flags = oflags;

2366
		if (MSG_CMSG_COMPAT & flags) {
2367
			err = ___sys_sendmsg(sock, (struct user_msghdr __user *)compat_entry,
2368
					     &msg_sys, flags, &used_address, MSG_EOR);
2369 2370 2371 2372 2373
			if (err < 0)
				break;
			err = __put_user(err, &compat_entry->msg_len);
			++compat_entry;
		} else {
2374
			err = ___sys_sendmsg(sock,
2375
					     (struct user_msghdr __user *)entry,
2376
					     &msg_sys, flags, &used_address, MSG_EOR);
2377 2378 2379 2380 2381 2382 2383 2384 2385
			if (err < 0)
				break;
			err = put_user(err, &entry->msg_len);
			++entry;
		}

		if (err)
			break;
		++datagrams;
2386 2387
		if (msg_data_left(&msg_sys))
			break;
2388
		cond_resched();
2389 2390 2391 2392
	}

	fput_light(sock->file, fput_needed);

2393 2394
	/* We only return an error if no datagrams were able to be sent */
	if (datagrams != 0)
2395 2396 2397 2398 2399 2400 2401 2402
		return datagrams;

	return err;
}

SYSCALL_DEFINE4(sendmmsg, int, fd, struct mmsghdr __user *, mmsg,
		unsigned int, vlen, unsigned int, flags)
{
2403
	return __sys_sendmmsg(fd, mmsg, vlen, flags, true);
2404 2405
}

2406
static int ___sys_recvmsg(struct socket *sock, struct user_msghdr __user *msg,
2407
			 struct msghdr *msg_sys, unsigned int flags, int nosec)
L
Linus Torvalds 已提交
2408
{
2409 2410
	struct compat_msghdr __user *msg_compat =
	    (struct compat_msghdr __user *)msg;
L
Linus Torvalds 已提交
2411
	struct iovec iovstack[UIO_FASTIOV];
2412
	struct iovec *iov = iovstack;
L
Linus Torvalds 已提交
2413
	unsigned long cmsg_ptr;
2414
	int len;
2415
	ssize_t err;
L
Linus Torvalds 已提交
2416 2417

	/* kernel mode address */
2418
	struct sockaddr_storage addr;
L
Linus Torvalds 已提交
2419 2420 2421

	/* user mode address pointers */
	struct sockaddr __user *uaddr;
2422
	int __user *uaddr_len = COMPAT_NAMELEN(msg);
2423

2424
	msg_sys->msg_name = &addr;
L
Linus Torvalds 已提交
2425

2426
	if (MSG_CMSG_COMPAT & flags)
2427
		err = get_compat_msghdr(msg_sys, msg_compat, &uaddr, &iov);
2428
	else
2429
		err = copy_msghdr_from_user(msg_sys, msg, &uaddr, &iov);
L
Linus Torvalds 已提交
2430
	if (err < 0)
2431
		return err;
L
Linus Torvalds 已提交
2432

2433 2434
	cmsg_ptr = (unsigned long)msg_sys->msg_control;
	msg_sys->msg_flags = flags & (MSG_CMSG_CLOEXEC|MSG_CMSG_COMPAT);
2435

2436 2437 2438
	/* We assume all kernel code knows the size of sockaddr_storage */
	msg_sys->msg_namelen = 0;

L
Linus Torvalds 已提交
2439 2440
	if (sock->file->f_flags & O_NONBLOCK)
		flags |= MSG_DONTWAIT;
2441
	err = (nosec ? sock_recvmsg_nosec : sock_recvmsg)(sock, msg_sys, flags);
L
Linus Torvalds 已提交
2442 2443 2444 2445 2446
	if (err < 0)
		goto out_freeiov;
	len = err;

	if (uaddr != NULL) {
2447
		err = move_addr_to_user(&addr,
2448
					msg_sys->msg_namelen, uaddr,
2449
					uaddr_len);
L
Linus Torvalds 已提交
2450 2451 2452
		if (err < 0)
			goto out_freeiov;
	}
2453
	err = __put_user((msg_sys->msg_flags & ~MSG_CMSG_COMPAT),
2454
			 COMPAT_FLAGS(msg));
L
Linus Torvalds 已提交
2455 2456 2457
	if (err)
		goto out_freeiov;
	if (MSG_CMSG_COMPAT & flags)
2458
		err = __put_user((unsigned long)msg_sys->msg_control - cmsg_ptr,
L
Linus Torvalds 已提交
2459 2460
				 &msg_compat->msg_controllen);
	else
2461
		err = __put_user((unsigned long)msg_sys->msg_control - cmsg_ptr,
L
Linus Torvalds 已提交
2462 2463 2464 2465 2466 2467
				 &msg->msg_controllen);
	if (err)
		goto out_freeiov;
	err = len;

out_freeiov:
2468
	kfree(iov);
2469 2470 2471 2472 2473 2474 2475
	return err;
}

/*
 *	BSD recvmsg interface
 */

2476 2477
long __sys_recvmsg(int fd, struct user_msghdr __user *msg, unsigned int flags,
		   bool forbid_cmsg_compat)
2478 2479 2480
{
	int fput_needed, err;
	struct msghdr msg_sys;
2481 2482
	struct socket *sock;

2483 2484 2485
	if (forbid_cmsg_compat && (flags & MSG_CMSG_COMPAT))
		return -EINVAL;

2486
	sock = sockfd_lookup_light(fd, &err, &fput_needed);
2487 2488 2489
	if (!sock)
		goto out;

2490
	err = ___sys_recvmsg(sock, msg, &msg_sys, flags, 0);
2491

2492
	fput_light(sock->file, fput_needed);
L
Linus Torvalds 已提交
2493 2494 2495 2496
out:
	return err;
}

2497
SYSCALL_DEFINE3(recvmsg, int, fd, struct user_msghdr __user *, msg,
2498 2499
		unsigned int, flags)
{
2500
	return __sys_recvmsg(fd, msg, flags, true);
2501 2502
}

2503 2504 2505 2506
/*
 *     Linux recvmmsg interface
 */

2507 2508 2509
static int do_recvmmsg(int fd, struct mmsghdr __user *mmsg,
			  unsigned int vlen, unsigned int flags,
			  struct timespec64 *timeout)
2510 2511 2512 2513
{
	int fput_needed, err, datagrams;
	struct socket *sock;
	struct mmsghdr __user *entry;
2514
	struct compat_mmsghdr __user *compat_entry;
2515
	struct msghdr msg_sys;
2516 2517
	struct timespec64 end_time;
	struct timespec64 timeout64;
2518 2519 2520 2521 2522 2523 2524 2525 2526 2527 2528 2529

	if (timeout &&
	    poll_select_set_timeout(&end_time, timeout->tv_sec,
				    timeout->tv_nsec))
		return -EINVAL;

	datagrams = 0;

	sock = sockfd_lookup_light(fd, &err, &fput_needed);
	if (!sock)
		return err;

2530 2531 2532 2533 2534 2535
	if (likely(!(flags & MSG_ERRQUEUE))) {
		err = sock_error(sock->sk);
		if (err) {
			datagrams = err;
			goto out_put;
		}
2536
	}
2537 2538

	entry = mmsg;
2539
	compat_entry = (struct compat_mmsghdr __user *)mmsg;
2540 2541 2542 2543 2544

	while (datagrams < vlen) {
		/*
		 * No need to ask LSM for more than the first datagram.
		 */
2545
		if (MSG_CMSG_COMPAT & flags) {
2546
			err = ___sys_recvmsg(sock, (struct user_msghdr __user *)compat_entry,
2547 2548
					     &msg_sys, flags & ~MSG_WAITFORONE,
					     datagrams);
2549 2550 2551 2552 2553
			if (err < 0)
				break;
			err = __put_user(err, &compat_entry->msg_len);
			++compat_entry;
		} else {
2554
			err = ___sys_recvmsg(sock,
2555
					     (struct user_msghdr __user *)entry,
2556 2557
					     &msg_sys, flags & ~MSG_WAITFORONE,
					     datagrams);
2558 2559 2560 2561 2562 2563
			if (err < 0)
				break;
			err = put_user(err, &entry->msg_len);
			++entry;
		}

2564 2565 2566 2567
		if (err)
			break;
		++datagrams;

2568 2569 2570 2571
		/* MSG_WAITFORONE turns on MSG_DONTWAIT after one packet */
		if (flags & MSG_WAITFORONE)
			flags |= MSG_DONTWAIT;

2572
		if (timeout) {
2573
			ktime_get_ts64(&timeout64);
2574
			*timeout = timespec64_sub(end_time, timeout64);
2575 2576 2577 2578 2579 2580 2581 2582 2583 2584 2585 2586 2587
			if (timeout->tv_sec < 0) {
				timeout->tv_sec = timeout->tv_nsec = 0;
				break;
			}

			/* Timeout, return less than vlen datagrams */
			if (timeout->tv_nsec == 0 && timeout->tv_sec == 0)
				break;
		}

		/* Out of band data, return right away */
		if (msg_sys.msg_flags & MSG_OOB)
			break;
2588
		cond_resched();
2589 2590 2591
	}

	if (err == 0)
2592 2593 2594 2595 2596 2597
		goto out_put;

	if (datagrams == 0) {
		datagrams = err;
		goto out_put;
	}
2598

2599 2600 2601 2602 2603
	/*
	 * We may return less entries than requested (vlen) if the
	 * sock is non block and there aren't enough datagrams...
	 */
	if (err != -EAGAIN) {
2604
		/*
2605 2606 2607 2608
		 * ... or  if recvmsg returns an error after we
		 * received some datagrams, where we record the
		 * error to return on the next call or if the
		 * app asks about it using getsockopt(SO_ERROR).
2609
		 */
2610
		sock->sk->sk_err = -err;
2611
	}
2612 2613
out_put:
	fput_light(sock->file, fput_needed);
2614

2615
	return datagrams;
2616 2617
}

2618 2619 2620 2621
int __sys_recvmmsg(int fd, struct mmsghdr __user *mmsg,
		   unsigned int vlen, unsigned int flags,
		   struct __kernel_timespec __user *timeout,
		   struct old_timespec32 __user *timeout32)
2622 2623
{
	int datagrams;
2624
	struct timespec64 timeout_sys;
2625

2626 2627
	if (timeout && get_timespec64(&timeout_sys, timeout))
		return -EFAULT;
2628

2629
	if (timeout32 && get_old_timespec32(&timeout_sys, timeout32))
2630 2631
		return -EFAULT;

2632 2633 2634 2635
	if (!timeout && !timeout32)
		return do_recvmmsg(fd, mmsg, vlen, flags, NULL);

	datagrams = do_recvmmsg(fd, mmsg, vlen, flags, &timeout_sys);
2636

2637 2638 2639 2640 2641 2642 2643
	if (datagrams <= 0)
		return datagrams;

	if (timeout && put_timespec64(&timeout_sys, timeout))
		datagrams = -EFAULT;

	if (timeout32 && put_old_timespec32(&timeout_sys, timeout32))
2644 2645 2646 2647 2648
		datagrams = -EFAULT;

	return datagrams;
}

2649 2650
SYSCALL_DEFINE5(recvmmsg, int, fd, struct mmsghdr __user *, mmsg,
		unsigned int, vlen, unsigned int, flags,
2651
		struct __kernel_timespec __user *, timeout)
2652
{
2653 2654 2655 2656 2657 2658 2659 2660 2661 2662 2663 2664 2665 2666 2667
	if (flags & MSG_CMSG_COMPAT)
		return -EINVAL;

	return __sys_recvmmsg(fd, mmsg, vlen, flags, timeout, NULL);
}

#ifdef CONFIG_COMPAT_32BIT_TIME
SYSCALL_DEFINE5(recvmmsg_time32, int, fd, struct mmsghdr __user *, mmsg,
		unsigned int, vlen, unsigned int, flags,
		struct old_timespec32 __user *, timeout)
{
	if (flags & MSG_CMSG_COMPAT)
		return -EINVAL;

	return __sys_recvmmsg(fd, mmsg, vlen, flags, NULL, timeout);
2668
}
2669
#endif
2670

2671
#ifdef __ARCH_WANT_SYS_SOCKETCALL
L
Linus Torvalds 已提交
2672 2673
/* Argument list sizes for sys_socketcall */
#define AL(x) ((x) * sizeof(unsigned long))
2674
static const unsigned char nargs[21] = {
2675 2676 2677
	AL(0), AL(3), AL(3), AL(3), AL(2), AL(3),
	AL(3), AL(3), AL(4), AL(4), AL(4), AL(6),
	AL(6), AL(2), AL(5), AL(5), AL(3), AL(3),
2678
	AL(4), AL(5), AL(4)
2679 2680
};

L
Linus Torvalds 已提交
2681 2682 2683
#undef AL

/*
2684
 *	System call vectors.
L
Linus Torvalds 已提交
2685 2686 2687
 *
 *	Argument checking cleaned up. Saved 20% in size.
 *  This function doesn't need to set the kernel lock because
2688
 *  it is set by the callees.
L
Linus Torvalds 已提交
2689 2690
 */

2691
SYSCALL_DEFINE2(socketcall, int, call, unsigned long __user *, args)
L
Linus Torvalds 已提交
2692
{
2693
	unsigned long a[AUDITSC_ARGS];
2694
	unsigned long a0, a1;
L
Linus Torvalds 已提交
2695
	int err;
2696
	unsigned int len;
L
Linus Torvalds 已提交
2697

2698
	if (call < 1 || call > SYS_SENDMMSG)
L
Linus Torvalds 已提交
2699
		return -EINVAL;
2700
	call = array_index_nospec(call, SYS_SENDMMSG + 1);
L
Linus Torvalds 已提交
2701

2702 2703 2704 2705
	len = nargs[call];
	if (len > sizeof(a))
		return -EINVAL;

L
Linus Torvalds 已提交
2706
	/* copy_from_user should be SMP safe. */
2707
	if (copy_from_user(a, args, len))
L
Linus Torvalds 已提交
2708
		return -EFAULT;
2709

2710 2711 2712
	err = audit_socketcall(nargs[call] / sizeof(unsigned long), a);
	if (err)
		return err;
2713

2714 2715 2716 2717 2718
	a0 = a[0];
	a1 = a[1];

	switch (call) {
	case SYS_SOCKET:
2719
		err = __sys_socket(a0, a1, a[2]);
2720 2721
		break;
	case SYS_BIND:
2722
		err = __sys_bind(a0, (struct sockaddr __user *)a1, a[2]);
2723 2724
		break;
	case SYS_CONNECT:
2725
		err = __sys_connect(a0, (struct sockaddr __user *)a1, a[2]);
2726 2727
		break;
	case SYS_LISTEN:
2728
		err = __sys_listen(a0, a1);
2729 2730
		break;
	case SYS_ACCEPT:
2731 2732
		err = __sys_accept4(a0, (struct sockaddr __user *)a1,
				    (int __user *)a[2], 0);
2733 2734 2735
		break;
	case SYS_GETSOCKNAME:
		err =
2736 2737
		    __sys_getsockname(a0, (struct sockaddr __user *)a1,
				      (int __user *)a[2]);
2738 2739 2740
		break;
	case SYS_GETPEERNAME:
		err =
2741 2742
		    __sys_getpeername(a0, (struct sockaddr __user *)a1,
				      (int __user *)a[2]);
2743 2744
		break;
	case SYS_SOCKETPAIR:
2745
		err = __sys_socketpair(a0, a1, a[2], (int __user *)a[3]);
2746 2747
		break;
	case SYS_SEND:
2748 2749
		err = __sys_sendto(a0, (void __user *)a1, a[2], a[3],
				   NULL, 0);
2750 2751
		break;
	case SYS_SENDTO:
2752 2753
		err = __sys_sendto(a0, (void __user *)a1, a[2], a[3],
				   (struct sockaddr __user *)a[4], a[5]);
2754 2755
		break;
	case SYS_RECV:
2756 2757
		err = __sys_recvfrom(a0, (void __user *)a1, a[2], a[3],
				     NULL, NULL);
2758 2759
		break;
	case SYS_RECVFROM:
2760 2761 2762
		err = __sys_recvfrom(a0, (void __user *)a1, a[2], a[3],
				     (struct sockaddr __user *)a[4],
				     (int __user *)a[5]);
2763 2764
		break;
	case SYS_SHUTDOWN:
2765
		err = __sys_shutdown(a0, a1);
2766 2767
		break;
	case SYS_SETSOCKOPT:
2768 2769
		err = __sys_setsockopt(a0, a1, a[2], (char __user *)a[3],
				       a[4]);
2770 2771 2772
		break;
	case SYS_GETSOCKOPT:
		err =
2773 2774
		    __sys_getsockopt(a0, a1, a[2], (char __user *)a[3],
				     (int __user *)a[4]);
2775 2776
		break;
	case SYS_SENDMSG:
2777 2778
		err = __sys_sendmsg(a0, (struct user_msghdr __user *)a1,
				    a[2], true);
2779
		break;
2780
	case SYS_SENDMMSG:
2781 2782
		err = __sys_sendmmsg(a0, (struct mmsghdr __user *)a1, a[2],
				     a[3], true);
2783
		break;
2784
	case SYS_RECVMSG:
2785 2786
		err = __sys_recvmsg(a0, (struct user_msghdr __user *)a1,
				    a[2], true);
2787
		break;
2788
	case SYS_RECVMMSG:
2789 2790 2791 2792 2793 2794 2795 2796 2797
		if (IS_ENABLED(CONFIG_64BIT) || !IS_ENABLED(CONFIG_64BIT_TIME))
			err = __sys_recvmmsg(a0, (struct mmsghdr __user *)a1,
					     a[2], a[3],
					     (struct __kernel_timespec __user *)a[4],
					     NULL);
		else
			err = __sys_recvmmsg(a0, (struct mmsghdr __user *)a1,
					     a[2], a[3], NULL,
					     (struct old_timespec32 __user *)a[4]);
2798
		break;
U
Ulrich Drepper 已提交
2799
	case SYS_ACCEPT4:
2800 2801
		err = __sys_accept4(a0, (struct sockaddr __user *)a1,
				    (int __user *)a[2], a[3]);
U
Ulrich Drepper 已提交
2802
		break;
2803 2804 2805
	default:
		err = -EINVAL;
		break;
L
Linus Torvalds 已提交
2806 2807 2808 2809
	}
	return err;
}

2810
#endif				/* __ARCH_WANT_SYS_SOCKETCALL */
L
Linus Torvalds 已提交
2811

2812 2813 2814 2815
/**
 *	sock_register - add a socket protocol handler
 *	@ops: description of protocol
 *
L
Linus Torvalds 已提交
2816 2817
 *	This function is called by a protocol handler that wants to
 *	advertise its address family, and have it linked into the
2818
 *	socket interface. The value ops->family corresponds to the
2819
 *	socket system call protocol family.
L
Linus Torvalds 已提交
2820
 */
2821
int sock_register(const struct net_proto_family *ops)
L
Linus Torvalds 已提交
2822 2823 2824 2825
{
	int err;

	if (ops->family >= NPROTO) {
2826
		pr_crit("protocol %d >= NPROTO(%d)\n", ops->family, NPROTO);
L
Linus Torvalds 已提交
2827 2828
		return -ENOBUFS;
	}
2829 2830

	spin_lock(&net_family_lock);
E
Eric Dumazet 已提交
2831 2832
	if (rcu_dereference_protected(net_families[ops->family],
				      lockdep_is_held(&net_family_lock)))
2833 2834
		err = -EEXIST;
	else {
2835
		rcu_assign_pointer(net_families[ops->family], ops);
L
Linus Torvalds 已提交
2836 2837
		err = 0;
	}
2838 2839
	spin_unlock(&net_family_lock);

2840
	pr_info("NET: Registered protocol family %d\n", ops->family);
L
Linus Torvalds 已提交
2841 2842
	return err;
}
2843
EXPORT_SYMBOL(sock_register);
L
Linus Torvalds 已提交
2844

2845 2846 2847 2848
/**
 *	sock_unregister - remove a protocol handler
 *	@family: protocol family to remove
 *
L
Linus Torvalds 已提交
2849 2850
 *	This function is called by a protocol handler that wants to
 *	remove its address family, and have it unlinked from the
2851 2852 2853 2854 2855 2856
 *	new socket creation.
 *
 *	If protocol handler is a module, then it can use module reference
 *	counts to protect against new references. If protocol handler is not
 *	a module then it needs to provide its own protection in
 *	the ops->create routine.
L
Linus Torvalds 已提交
2857
 */
2858
void sock_unregister(int family)
L
Linus Torvalds 已提交
2859
{
2860
	BUG_ON(family < 0 || family >= NPROTO);
L
Linus Torvalds 已提交
2861

2862
	spin_lock(&net_family_lock);
2863
	RCU_INIT_POINTER(net_families[family], NULL);
2864 2865 2866 2867
	spin_unlock(&net_family_lock);

	synchronize_rcu();

2868
	pr_info("NET: Unregistered protocol family %d\n", family);
L
Linus Torvalds 已提交
2869
}
2870
EXPORT_SYMBOL(sock_unregister);
L
Linus Torvalds 已提交
2871

2872 2873
bool sock_is_registered(int family)
{
2874
	return family < NPROTO && rcu_access_pointer(net_families[family]);
2875 2876
}

2877
static int __init sock_init(void)
L
Linus Torvalds 已提交
2878
{
N
Nick Piggin 已提交
2879
	int err;
2880 2881 2882 2883 2884 2885
	/*
	 *      Initialize the network sysctl infrastructure.
	 */
	err = net_sysctl_init();
	if (err)
		goto out;
N
Nick Piggin 已提交
2886

L
Linus Torvalds 已提交
2887
	/*
2888
	 *      Initialize skbuff SLAB cache
L
Linus Torvalds 已提交
2889 2890 2891 2892
	 */
	skb_init();

	/*
2893
	 *      Initialize the protocols module.
L
Linus Torvalds 已提交
2894 2895 2896
	 */

	init_inodecache();
N
Nick Piggin 已提交
2897 2898 2899 2900

	err = register_filesystem(&sock_fs_type);
	if (err)
		goto out_fs;
L
Linus Torvalds 已提交
2901
	sock_mnt = kern_mount(&sock_fs_type);
N
Nick Piggin 已提交
2902 2903 2904 2905
	if (IS_ERR(sock_mnt)) {
		err = PTR_ERR(sock_mnt);
		goto out_mount;
	}
2906 2907

	/* The real protocol initialization is performed in later initcalls.
L
Linus Torvalds 已提交
2908 2909 2910
	 */

#ifdef CONFIG_NETFILTER
2911 2912 2913
	err = netfilter_init();
	if (err)
		goto out;
L
Linus Torvalds 已提交
2914
#endif
2915

2916
	ptp_classifier_init();
2917

N
Nick Piggin 已提交
2918 2919 2920 2921 2922 2923 2924
out:
	return err;

out_mount:
	unregister_filesystem(&sock_fs_type);
out_fs:
	goto out;
L
Linus Torvalds 已提交
2925 2926
}

2927 2928
core_initcall(sock_init);	/* early initcall */

L
Linus Torvalds 已提交
2929 2930 2931
#ifdef CONFIG_PROC_FS
void socket_seq_show(struct seq_file *seq)
{
2932 2933
	seq_printf(seq, "sockets: used %d\n",
		   sock_inuse_get(seq->private));
L
Linus Torvalds 已提交
2934
}
2935
#endif				/* CONFIG_PROC_FS */
L
Linus Torvalds 已提交
2936

2937
#ifdef CONFIG_COMPAT
2938
static int compat_dev_ifconf(struct net *net, struct compat_ifconf __user *uifc32)
2939
{
2940
	struct compat_ifconf ifc32;
2941 2942 2943
	struct ifconf ifc;
	int err;

2944
	if (copy_from_user(&ifc32, uifc32, sizeof(struct compat_ifconf)))
2945 2946
		return -EFAULT;

2947 2948
	ifc.ifc_len = ifc32.ifc_len;
	ifc.ifc_req = compat_ptr(ifc32.ifcbuf);
2949

2950 2951 2952
	rtnl_lock();
	err = dev_ifconf(net, &ifc, sizeof(struct compat_ifreq));
	rtnl_unlock();
2953 2954 2955
	if (err)
		return err;

2956
	ifc32.ifc_len = ifc.ifc_len;
2957
	if (copy_to_user(uifc32, &ifc32, sizeof(struct compat_ifconf)))
2958 2959 2960 2961 2962
		return -EFAULT;

	return 0;
}

2963
static int ethtool_ioctl(struct net *net, struct compat_ifreq __user *ifr32)
2964
{
2965 2966
	struct compat_ethtool_rxnfc __user *compat_rxnfc;
	bool convert_in = false, convert_out = false;
2967 2968 2969
	size_t buf_size = 0;
	struct ethtool_rxnfc __user *rxnfc = NULL;
	struct ifreq ifr;
2970 2971
	u32 rule_cnt = 0, actual_rule_cnt;
	u32 ethcmd;
2972
	u32 data;
2973
	int ret;
2974

2975 2976
	if (get_user(data, &ifr32->ifr_ifru.ifru_data))
		return -EFAULT;
2977

2978 2979 2980
	compat_rxnfc = compat_ptr(data);

	if (get_user(ethcmd, &compat_rxnfc->cmd))
2981 2982
		return -EFAULT;

2983 2984 2985 2986 2987 2988 2989 2990 2991 2992 2993 2994 2995 2996 2997 2998 2999
	/* Most ethtool structures are defined without padding.
	 * Unfortunately struct ethtool_rxnfc is an exception.
	 */
	switch (ethcmd) {
	default:
		break;
	case ETHTOOL_GRXCLSRLALL:
		/* Buffer size is variable */
		if (get_user(rule_cnt, &compat_rxnfc->rule_cnt))
			return -EFAULT;
		if (rule_cnt > KMALLOC_MAX_SIZE / sizeof(u32))
			return -ENOMEM;
		buf_size += rule_cnt * sizeof(u32);
		/* fall through */
	case ETHTOOL_GRXRINGS:
	case ETHTOOL_GRXCLSRLCNT:
	case ETHTOOL_GRXCLSRULE:
3000
	case ETHTOOL_SRXCLSRLINS:
3001 3002 3003 3004 3005
		convert_out = true;
		/* fall through */
	case ETHTOOL_SRXCLSRLDEL:
		buf_size += sizeof(struct ethtool_rxnfc);
		convert_in = true;
3006
		rxnfc = compat_alloc_user_space(buf_size);
3007 3008 3009
		break;
	}

3010
	if (copy_from_user(&ifr.ifr_name, &ifr32->ifr_name, IFNAMSIZ))
3011 3012
		return -EFAULT;

3013
	ifr.ifr_data = convert_in ? rxnfc : (void __user *)compat_rxnfc;
3014

3015
	if (convert_in) {
3016
		/* We expect there to be holes between fs.m_ext and
3017 3018
		 * fs.ring_cookie and at the end of fs, but nowhere else.
		 */
3019 3020 3021 3022
		BUILD_BUG_ON(offsetof(struct compat_ethtool_rxnfc, fs.m_ext) +
			     sizeof(compat_rxnfc->fs.m_ext) !=
			     offsetof(struct ethtool_rxnfc, fs.m_ext) +
			     sizeof(rxnfc->fs.m_ext));
3023 3024 3025 3026 3027 3028 3029
		BUILD_BUG_ON(
			offsetof(struct compat_ethtool_rxnfc, fs.location) -
			offsetof(struct compat_ethtool_rxnfc, fs.ring_cookie) !=
			offsetof(struct ethtool_rxnfc, fs.location) -
			offsetof(struct ethtool_rxnfc, fs.ring_cookie));

		if (copy_in_user(rxnfc, compat_rxnfc,
S
Stephen Hemminger 已提交
3030 3031
				 (void __user *)(&rxnfc->fs.m_ext + 1) -
				 (void __user *)rxnfc) ||
3032 3033
		    copy_in_user(&rxnfc->fs.ring_cookie,
				 &compat_rxnfc->fs.ring_cookie,
S
Stephen Hemminger 已提交
3034
				 (void __user *)(&rxnfc->fs.location + 1) -
W
Wenwen Wang 已提交
3035 3036 3037 3038 3039 3040 3041 3042
				 (void __user *)&rxnfc->fs.ring_cookie))
			return -EFAULT;
		if (ethcmd == ETHTOOL_GRXCLSRLALL) {
			if (put_user(rule_cnt, &rxnfc->rule_cnt))
				return -EFAULT;
		} else if (copy_in_user(&rxnfc->rule_cnt,
					&compat_rxnfc->rule_cnt,
					sizeof(rxnfc->rule_cnt)))
3043 3044 3045
			return -EFAULT;
	}

3046
	ret = dev_ioctl(net, SIOCETHTOOL, &ifr, NULL);
3047 3048 3049 3050 3051
	if (ret)
		return ret;

	if (convert_out) {
		if (copy_in_user(compat_rxnfc, rxnfc,
S
Stephen Hemminger 已提交
3052 3053
				 (const void __user *)(&rxnfc->fs.m_ext + 1) -
				 (const void __user *)rxnfc) ||
3054 3055
		    copy_in_user(&compat_rxnfc->fs.ring_cookie,
				 &rxnfc->fs.ring_cookie,
S
Stephen Hemminger 已提交
3056 3057
				 (const void __user *)(&rxnfc->fs.location + 1) -
				 (const void __user *)&rxnfc->fs.ring_cookie) ||
3058 3059 3060 3061 3062 3063 3064 3065 3066 3067 3068 3069 3070 3071 3072 3073 3074 3075 3076 3077 3078 3079 3080 3081 3082
		    copy_in_user(&compat_rxnfc->rule_cnt, &rxnfc->rule_cnt,
				 sizeof(rxnfc->rule_cnt)))
			return -EFAULT;

		if (ethcmd == ETHTOOL_GRXCLSRLALL) {
			/* As an optimisation, we only copy the actual
			 * number of rules that the underlying
			 * function returned.  Since Mallory might
			 * change the rule count in user memory, we
			 * check that it is less than the rule count
			 * originally given (as the user buffer size),
			 * which has been range-checked.
			 */
			if (get_user(actual_rule_cnt, &rxnfc->rule_cnt))
				return -EFAULT;
			if (actual_rule_cnt < rule_cnt)
				rule_cnt = actual_rule_cnt;
			if (copy_in_user(&compat_rxnfc->rule_locs[0],
					 &rxnfc->rule_locs[0],
					 rule_cnt * sizeof(u32)))
				return -EFAULT;
		}
	}

	return 0;
3083 3084
}

3085 3086 3087
static int compat_siocwandev(struct net *net, struct compat_ifreq __user *uifr32)
{
	compat_uptr_t uptr32;
3088 3089 3090
	struct ifreq ifr;
	void __user *saved;
	int err;
3091

3092
	if (copy_from_user(&ifr, uifr32, sizeof(struct compat_ifreq)))
3093 3094 3095 3096 3097
		return -EFAULT;

	if (get_user(uptr32, &uifr32->ifr_settings.ifs_ifsu))
		return -EFAULT;

3098 3099
	saved = ifr.ifr_settings.ifs_ifsu.raw_hdlc;
	ifr.ifr_settings.ifs_ifsu.raw_hdlc = compat_ptr(uptr32);
3100

3101 3102 3103 3104 3105
	err = dev_ioctl(net, SIOCWANDEV, &ifr, NULL);
	if (!err) {
		ifr.ifr_settings.ifs_ifsu.raw_hdlc = saved;
		if (copy_to_user(uifr32, &ifr, sizeof(struct compat_ifreq)))
			err = -EFAULT;
3106
	}
3107
	return err;
3108 3109
}

3110 3111
/* Handle ioctls that use ifreq::ifr_data and just need struct ifreq converted */
static int compat_ifr_data_ioctl(struct net *net, unsigned int cmd,
3112
				 struct compat_ifreq __user *u_ifreq32)
3113
{
3114
	struct ifreq ifreq;
3115 3116
	u32 data32;

3117
	if (copy_from_user(ifreq.ifr_name, u_ifreq32->ifr_name, IFNAMSIZ))
3118
		return -EFAULT;
3119
	if (get_user(data32, &u_ifreq32->ifr_data))
3120
		return -EFAULT;
3121
	ifreq.ifr_data = compat_ptr(data32);
3122

3123
	return dev_ioctl(net, cmd, &ifreq, NULL);
3124 3125
}

J
Johannes Berg 已提交
3126 3127 3128 3129 3130 3131 3132 3133 3134 3135 3136 3137 3138 3139 3140 3141 3142 3143 3144 3145 3146 3147 3148 3149 3150 3151 3152 3153 3154 3155 3156 3157 3158 3159 3160 3161 3162 3163 3164
static int compat_ifreq_ioctl(struct net *net, struct socket *sock,
			      unsigned int cmd,
			      struct compat_ifreq __user *uifr32)
{
	struct ifreq __user *uifr;
	int err;

	/* Handle the fact that while struct ifreq has the same *layout* on
	 * 32/64 for everything but ifreq::ifru_ifmap and ifreq::ifru_data,
	 * which are handled elsewhere, it still has different *size* due to
	 * ifreq::ifru_ifmap (which is 16 bytes on 32 bit, 24 bytes on 64-bit,
	 * resulting in struct ifreq being 32 and 40 bytes respectively).
	 * As a result, if the struct happens to be at the end of a page and
	 * the next page isn't readable/writable, we get a fault. To prevent
	 * that, copy back and forth to the full size.
	 */

	uifr = compat_alloc_user_space(sizeof(*uifr));
	if (copy_in_user(uifr, uifr32, sizeof(*uifr32)))
		return -EFAULT;

	err = sock_do_ioctl(net, sock, cmd, (unsigned long)uifr);

	if (!err) {
		switch (cmd) {
		case SIOCGIFFLAGS:
		case SIOCGIFMETRIC:
		case SIOCGIFMTU:
		case SIOCGIFMEM:
		case SIOCGIFHWADDR:
		case SIOCGIFINDEX:
		case SIOCGIFADDR:
		case SIOCGIFBRDADDR:
		case SIOCGIFDSTADDR:
		case SIOCGIFNETMASK:
		case SIOCGIFPFLAGS:
		case SIOCGIFTXQLEN:
		case SIOCGMIIPHY:
		case SIOCGMIIREG:
3165
		case SIOCGIFNAME:
J
Johannes Berg 已提交
3166 3167 3168 3169 3170 3171 3172 3173
			if (copy_in_user(uifr32, uifr, sizeof(*uifr32)))
				err = -EFAULT;
			break;
		}
	}
	return err;
}

3174 3175 3176 3177 3178 3179 3180 3181 3182
static int compat_sioc_ifmap(struct net *net, unsigned int cmd,
			struct compat_ifreq __user *uifr32)
{
	struct ifreq ifr;
	struct compat_ifmap __user *uifmap32;
	int err;

	uifmap32 = &uifr32->ifr_ifru.ifru_map;
	err = copy_from_user(&ifr, uifr32, sizeof(ifr.ifr_name));
3183 3184 3185 3186 3187 3188
	err |= get_user(ifr.ifr_map.mem_start, &uifmap32->mem_start);
	err |= get_user(ifr.ifr_map.mem_end, &uifmap32->mem_end);
	err |= get_user(ifr.ifr_map.base_addr, &uifmap32->base_addr);
	err |= get_user(ifr.ifr_map.irq, &uifmap32->irq);
	err |= get_user(ifr.ifr_map.dma, &uifmap32->dma);
	err |= get_user(ifr.ifr_map.port, &uifmap32->port);
3189 3190 3191
	if (err)
		return -EFAULT;

3192
	err = dev_ioctl(net, cmd, &ifr, NULL);
3193 3194 3195

	if (cmd == SIOCGIFMAP && !err) {
		err = copy_to_user(uifr32, &ifr, sizeof(ifr.ifr_name));
3196 3197 3198 3199 3200 3201
		err |= put_user(ifr.ifr_map.mem_start, &uifmap32->mem_start);
		err |= put_user(ifr.ifr_map.mem_end, &uifmap32->mem_end);
		err |= put_user(ifr.ifr_map.base_addr, &uifmap32->base_addr);
		err |= put_user(ifr.ifr_map.irq, &uifmap32->irq);
		err |= put_user(ifr.ifr_map.dma, &uifmap32->dma);
		err |= put_user(ifr.ifr_map.port, &uifmap32->port);
3202 3203 3204 3205 3206 3207
		if (err)
			err = -EFAULT;
	}
	return err;
}

3208
struct rtentry32 {
3209
	u32		rt_pad1;
3210 3211 3212
	struct sockaddr rt_dst;         /* target address               */
	struct sockaddr rt_gateway;     /* gateway addr (RTF_GATEWAY)   */
	struct sockaddr rt_genmask;     /* target network mask (IP)     */
3213 3214 3215 3216 3217 3218 3219
	unsigned short	rt_flags;
	short		rt_pad2;
	u32		rt_pad3;
	unsigned char	rt_tos;
	unsigned char	rt_class;
	short		rt_pad4;
	short		rt_metric;      /* +1 for binary compatibility! */
3220
	/* char * */ u32 rt_dev;        /* forcing the device at add    */
3221 3222
	u32		rt_mtu;         /* per route MTU/Window         */
	u32		rt_window;      /* Window clamping              */
3223 3224 3225 3226 3227 3228 3229 3230 3231 3232 3233 3234 3235 3236 3237 3238
	unsigned short  rt_irtt;        /* Initial RTT                  */
};

struct in6_rtmsg32 {
	struct in6_addr		rtmsg_dst;
	struct in6_addr		rtmsg_src;
	struct in6_addr		rtmsg_gateway;
	u32			rtmsg_type;
	u16			rtmsg_dst_len;
	u16			rtmsg_src_len;
	u32			rtmsg_metric;
	u32			rtmsg_info;
	u32			rtmsg_flags;
	s32			rtmsg_ifindex;
};

3239 3240
static int routing_ioctl(struct net *net, struct socket *sock,
			 unsigned int cmd, void __user *argp)
3241 3242 3243 3244 3245 3246 3247 3248 3249
{
	int ret;
	void *r = NULL;
	struct in6_rtmsg r6;
	struct rtentry r4;
	char devname[16];
	u32 rtdev;
	mm_segment_t old_fs = get_fs();

3250 3251
	if (sock && sock->sk && sock->sk->sk_family == AF_INET6) { /* ipv6 */
		struct in6_rtmsg32 __user *ur6 = argp;
3252
		ret = copy_from_user(&r6.rtmsg_dst, &(ur6->rtmsg_dst),
3253
			3 * sizeof(struct in6_addr));
3254 3255 3256 3257 3258 3259 3260
		ret |= get_user(r6.rtmsg_type, &(ur6->rtmsg_type));
		ret |= get_user(r6.rtmsg_dst_len, &(ur6->rtmsg_dst_len));
		ret |= get_user(r6.rtmsg_src_len, &(ur6->rtmsg_src_len));
		ret |= get_user(r6.rtmsg_metric, &(ur6->rtmsg_metric));
		ret |= get_user(r6.rtmsg_info, &(ur6->rtmsg_info));
		ret |= get_user(r6.rtmsg_flags, &(ur6->rtmsg_flags));
		ret |= get_user(r6.rtmsg_ifindex, &(ur6->rtmsg_ifindex));
3261 3262 3263

		r = (void *) &r6;
	} else { /* ipv4 */
3264
		struct rtentry32 __user *ur4 = argp;
3265
		ret = copy_from_user(&r4.rt_dst, &(ur4->rt_dst),
3266
					3 * sizeof(struct sockaddr));
3267 3268 3269 3270 3271 3272
		ret |= get_user(r4.rt_flags, &(ur4->rt_flags));
		ret |= get_user(r4.rt_metric, &(ur4->rt_metric));
		ret |= get_user(r4.rt_mtu, &(ur4->rt_mtu));
		ret |= get_user(r4.rt_window, &(ur4->rt_window));
		ret |= get_user(r4.rt_irtt, &(ur4->rt_irtt));
		ret |= get_user(rtdev, &(ur4->rt_dev));
3273
		if (rtdev) {
3274
			ret |= copy_from_user(devname, compat_ptr(rtdev), 15);
3275 3276
			r4.rt_dev = (char __user __force *)devname;
			devname[15] = 0;
3277 3278 3279 3280 3281 3282 3283 3284 3285 3286 3287
		} else
			r4.rt_dev = NULL;

		r = (void *) &r4;
	}

	if (ret) {
		ret = -EFAULT;
		goto out;
	}

3288
	set_fs(KERNEL_DS);
3289
	ret = sock_do_ioctl(net, sock, cmd, (unsigned long) r);
3290
	set_fs(old_fs);
3291 3292 3293 3294 3295 3296 3297

out:
	return ret;
}

/* Since old style bridge ioctl's endup using SIOCDEVPRIVATE
 * for some operations; this forces use of the newer bridge-utils that
L
Lucas De Marchi 已提交
3298
 * use compatible ioctls
3299
 */
3300
static int old_bridge_ioctl(compat_ulong_t __user *argp)
3301
{
3302
	compat_ulong_t tmp;
3303

3304
	if (get_user(tmp, argp))
3305 3306 3307 3308 3309 3310
		return -EFAULT;
	if (tmp == BRCTL_GET_VERSION)
		return BRCTL_VERSION + 1;
	return -EINVAL;
}

3311 3312 3313 3314 3315 3316
static int compat_sock_ioctl_trans(struct file *file, struct socket *sock,
			 unsigned int cmd, unsigned long arg)
{
	void __user *argp = compat_ptr(arg);
	struct sock *sk = sock->sk;
	struct net *net = sock_net(sk);
3317

3318
	if (cmd >= SIOCDEVPRIVATE && cmd <= (SIOCDEVPRIVATE + 15))
3319
		return compat_ifr_data_ioctl(net, cmd, argp);
3320 3321 3322 3323 3324 3325

	switch (cmd) {
	case SIOCSIFBR:
	case SIOCGIFBR:
		return old_bridge_ioctl(argp);
	case SIOCGIFCONF:
3326
		return compat_dev_ifconf(net, argp);
3327 3328
	case SIOCETHTOOL:
		return ethtool_ioctl(net, argp);
3329 3330
	case SIOCWANDEV:
		return compat_siocwandev(net, argp);
3331 3332 3333
	case SIOCGIFMAP:
	case SIOCSIFMAP:
		return compat_sioc_ifmap(net, cmd, argp);
3334 3335 3336
	case SIOCADDRT:
	case SIOCDELRT:
		return routing_ioctl(net, sock, cmd, argp);
3337 3338
	case SIOCGSTAMP_OLD:
	case SIOCGSTAMPNS_OLD:
3339 3340
		if (!sock->ops->gettstamp)
			return -ENOIOCTLCMD;
3341
		return sock->ops->gettstamp(sock, argp, cmd == SIOCGSTAMP_OLD,
3342 3343
					    !COMPAT_USE_64BIT_TIME);

3344 3345
	case SIOCBONDSLAVEINFOQUERY:
	case SIOCBONDINFOQUERY:
3346
	case SIOCSHWTSTAMP:
3347
	case SIOCGHWTSTAMP:
3348
		return compat_ifr_data_ioctl(net, cmd, argp);
3349 3350 3351 3352 3353 3354 3355 3356 3357 3358 3359

	case FIOSETOWN:
	case SIOCSPGRP:
	case FIOGETOWN:
	case SIOCGPGRP:
	case SIOCBRADDBR:
	case SIOCBRDELBR:
	case SIOCGIFVLAN:
	case SIOCSIFVLAN:
	case SIOCADDDLCI:
	case SIOCDELDLCI:
3360
	case SIOCGSKNS:
3361 3362
	case SIOCGSTAMP_NEW:
	case SIOCGSTAMPNS_NEW:
3363 3364 3365 3366 3367 3368 3369 3370 3371 3372 3373 3374 3375 3376 3377 3378 3379 3380 3381 3382 3383 3384 3385 3386 3387 3388 3389 3390 3391 3392 3393
		return sock_ioctl(file, cmd, arg);

	case SIOCGIFFLAGS:
	case SIOCSIFFLAGS:
	case SIOCGIFMETRIC:
	case SIOCSIFMETRIC:
	case SIOCGIFMTU:
	case SIOCSIFMTU:
	case SIOCGIFMEM:
	case SIOCSIFMEM:
	case SIOCGIFHWADDR:
	case SIOCSIFHWADDR:
	case SIOCADDMULTI:
	case SIOCDELMULTI:
	case SIOCGIFINDEX:
	case SIOCGIFADDR:
	case SIOCSIFADDR:
	case SIOCSIFHWBROADCAST:
	case SIOCDIFADDR:
	case SIOCGIFBRDADDR:
	case SIOCSIFBRDADDR:
	case SIOCGIFDSTADDR:
	case SIOCSIFDSTADDR:
	case SIOCGIFNETMASK:
	case SIOCSIFNETMASK:
	case SIOCSIFPFLAGS:
	case SIOCGIFPFLAGS:
	case SIOCGIFTXQLEN:
	case SIOCSIFTXQLEN:
	case SIOCBRADDIF:
	case SIOCBRDELIF:
3394
	case SIOCGIFNAME:
3395 3396 3397 3398
	case SIOCSIFNAME:
	case SIOCGMIIPHY:
	case SIOCGMIIREG:
	case SIOCSMIIREG:
A
Al Viro 已提交
3399 3400 3401 3402
	case SIOCBONDENSLAVE:
	case SIOCBONDRELEASE:
	case SIOCBONDSETHWADDR:
	case SIOCBONDCHANGEACTIVE:
J
Johannes Berg 已提交
3403 3404
		return compat_ifreq_ioctl(net, sock, cmd, argp);

3405 3406 3407 3408
	case SIOCSARP:
	case SIOCGARP:
	case SIOCDARP:
	case SIOCATMARK:
3409
		return sock_do_ioctl(net, sock, cmd, arg);
3410 3411
	}

3412 3413
	return -ENOIOCTLCMD;
}
3414

3415
static long compat_sock_ioctl(struct file *file, unsigned int cmd,
3416
			      unsigned long arg)
3417 3418 3419
{
	struct socket *sock = file->private_data;
	int ret = -ENOIOCTLCMD;
3420 3421 3422 3423 3424
	struct sock *sk;
	struct net *net;

	sk = sock->sk;
	net = sock_net(sk);
3425 3426 3427 3428

	if (sock->ops->compat_ioctl)
		ret = sock->ops->compat_ioctl(sock, cmd, arg);

3429 3430 3431 3432
	if (ret == -ENOIOCTLCMD &&
	    (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST))
		ret = compat_wext_handle_ioctl(net, cmd, arg);

3433 3434 3435
	if (ret == -ENOIOCTLCMD)
		ret = compat_sock_ioctl_trans(file, sock, cmd, arg);

3436 3437 3438 3439
	return ret;
}
#endif

3440 3441 3442 3443 3444 3445 3446 3447 3448
/**
 *	kernel_bind - bind an address to a socket (kernel space)
 *	@sock: socket
 *	@addr: address
 *	@addrlen: length of address
 *
 *	Returns 0 or an error.
 */

3449 3450 3451 3452
int kernel_bind(struct socket *sock, struct sockaddr *addr, int addrlen)
{
	return sock->ops->bind(sock, addr, addrlen);
}
3453
EXPORT_SYMBOL(kernel_bind);
3454

3455 3456 3457 3458 3459 3460 3461 3462
/**
 *	kernel_listen - move socket to listening state (kernel space)
 *	@sock: socket
 *	@backlog: pending connections queue size
 *
 *	Returns 0 or an error.
 */

3463 3464 3465 3466
int kernel_listen(struct socket *sock, int backlog)
{
	return sock->ops->listen(sock, backlog);
}
3467
EXPORT_SYMBOL(kernel_listen);
3468

3469 3470 3471 3472 3473 3474 3475 3476 3477 3478 3479
/**
 *	kernel_accept - accept a connection (kernel space)
 *	@sock: listening socket
 *	@newsock: new connected socket
 *	@flags: flags
 *
 *	@flags must be SOCK_CLOEXEC, SOCK_NONBLOCK or 0.
 *	If it fails, @newsock is guaranteed to be %NULL.
 *	Returns 0 or an error.
 */

3480 3481 3482 3483 3484 3485 3486 3487 3488 3489
int kernel_accept(struct socket *sock, struct socket **newsock, int flags)
{
	struct sock *sk = sock->sk;
	int err;

	err = sock_create_lite(sk->sk_family, sk->sk_type, sk->sk_protocol,
			       newsock);
	if (err < 0)
		goto done;

3490
	err = sock->ops->accept(sock, *newsock, flags, true);
3491 3492
	if (err < 0) {
		sock_release(*newsock);
3493
		*newsock = NULL;
3494 3495 3496 3497
		goto done;
	}

	(*newsock)->ops = sock->ops;
3498
	__module_get((*newsock)->ops->owner);
3499 3500 3501 3502

done:
	return err;
}
3503
EXPORT_SYMBOL(kernel_accept);
3504

3505 3506 3507 3508 3509 3510 3511 3512 3513 3514 3515 3516 3517
/**
 *	kernel_connect - connect a socket (kernel space)
 *	@sock: socket
 *	@addr: address
 *	@addrlen: address length
 *	@flags: flags (O_NONBLOCK, ...)
 *
 *	For datagram sockets, @addr is the addres to which datagrams are sent
 *	by default, and the only address from which datagrams are received.
 *	For stream sockets, attempts to connect to @addr.
 *	Returns 0 or an error code.
 */

3518
int kernel_connect(struct socket *sock, struct sockaddr *addr, int addrlen,
3519
		   int flags)
3520 3521 3522
{
	return sock->ops->connect(sock, addr, addrlen, flags);
}
3523
EXPORT_SYMBOL(kernel_connect);
3524

3525 3526 3527 3528 3529 3530 3531 3532 3533
/**
 *	kernel_getsockname - get the address which the socket is bound (kernel space)
 *	@sock: socket
 *	@addr: address holder
 *
 * 	Fills the @addr pointer with the address which the socket is bound.
 *	Returns 0 or an error code.
 */

3534
int kernel_getsockname(struct socket *sock, struct sockaddr *addr)
3535
{
3536
	return sock->ops->getname(sock, addr, 0);
3537
}
3538
EXPORT_SYMBOL(kernel_getsockname);
3539

3540 3541 3542 3543 3544 3545 3546 3547 3548
/**
 *	kernel_peername - get the address which the socket is connected (kernel space)
 *	@sock: socket
 *	@addr: address holder
 *
 * 	Fills the @addr pointer with the address which the socket is connected.
 *	Returns 0 or an error code.
 */

3549
int kernel_getpeername(struct socket *sock, struct sockaddr *addr)
3550
{
3551
	return sock->ops->getname(sock, addr, 1);
3552
}
3553
EXPORT_SYMBOL(kernel_getpeername);
3554

3555 3556 3557 3558 3559 3560 3561 3562 3563 3564 3565 3566
/**
 *	kernel_getsockopt - get a socket option (kernel space)
 *	@sock: socket
 *	@level: API level (SOL_SOCKET, ...)
 *	@optname: option tag
 *	@optval: option value
 *	@optlen: option length
 *
 *	Assigns the option length to @optlen.
 *	Returns 0 or an error.
 */

3567 3568 3569 3570
int kernel_getsockopt(struct socket *sock, int level, int optname,
			char *optval, int *optlen)
{
	mm_segment_t oldfs = get_fs();
3571 3572
	char __user *uoptval;
	int __user *uoptlen;
3573 3574
	int err;

3575 3576 3577
	uoptval = (char __user __force *) optval;
	uoptlen = (int __user __force *) optlen;

3578 3579
	set_fs(KERNEL_DS);
	if (level == SOL_SOCKET)
3580
		err = sock_getsockopt(sock, level, optname, uoptval, uoptlen);
3581
	else
3582 3583
		err = sock->ops->getsockopt(sock, level, optname, uoptval,
					    uoptlen);
3584 3585 3586
	set_fs(oldfs);
	return err;
}
3587
EXPORT_SYMBOL(kernel_getsockopt);
3588

3589 3590 3591 3592 3593 3594 3595 3596 3597 3598 3599
/**
 *	kernel_setsockopt - set a socket option (kernel space)
 *	@sock: socket
 *	@level: API level (SOL_SOCKET, ...)
 *	@optname: option tag
 *	@optval: option value
 *	@optlen: option length
 *
 *	Returns 0 or an error.
 */

3600
int kernel_setsockopt(struct socket *sock, int level, int optname,
3601
			char *optval, unsigned int optlen)
3602 3603
{
	mm_segment_t oldfs = get_fs();
3604
	char __user *uoptval;
3605 3606
	int err;

3607 3608
	uoptval = (char __user __force *) optval;

3609 3610
	set_fs(KERNEL_DS);
	if (level == SOL_SOCKET)
3611
		err = sock_setsockopt(sock, level, optname, uoptval, optlen);
3612
	else
3613
		err = sock->ops->setsockopt(sock, level, optname, uoptval,
3614 3615 3616 3617
					    optlen);
	set_fs(oldfs);
	return err;
}
3618
EXPORT_SYMBOL(kernel_setsockopt);
3619

3620 3621 3622 3623 3624 3625 3626 3627 3628 3629 3630
/**
 *	kernel_sendpage - send a &page through a socket (kernel space)
 *	@sock: socket
 *	@page: page
 *	@offset: page offset
 *	@size: total size in bytes
 *	@flags: flags (MSG_DONTWAIT, ...)
 *
 *	Returns the total amount sent in bytes or an error.
 */

3631 3632 3633 3634 3635 3636 3637 3638
int kernel_sendpage(struct socket *sock, struct page *page, int offset,
		    size_t size, int flags)
{
	if (sock->ops->sendpage)
		return sock->ops->sendpage(sock, page, offset, size, flags);

	return sock_no_sendpage(sock, page, offset, size, flags);
}
3639
EXPORT_SYMBOL(kernel_sendpage);
3640

3641 3642 3643 3644 3645 3646 3647 3648 3649 3650 3651 3652
/**
 *	kernel_sendpage_locked - send a &page through the locked sock (kernel space)
 *	@sk: sock
 *	@page: page
 *	@offset: page offset
 *	@size: total size in bytes
 *	@flags: flags (MSG_DONTWAIT, ...)
 *
 *	Returns the total amount sent in bytes or an error.
 *	Caller must hold @sk.
 */

3653 3654 3655 3656 3657 3658 3659 3660 3661 3662 3663 3664 3665
int kernel_sendpage_locked(struct sock *sk, struct page *page, int offset,
			   size_t size, int flags)
{
	struct socket *sock = sk->sk_socket;

	if (sock->ops->sendpage_locked)
		return sock->ops->sendpage_locked(sk, page, offset, size,
						  flags);

	return sock_no_sendpage_locked(sk, page, offset, size, flags);
}
EXPORT_SYMBOL(kernel_sendpage_locked);

3666 3667 3668 3669 3670 3671 3672 3673
/**
 *	kernel_shutdown - shut down part of a full-duplex connection (kernel space)
 *	@sock: socket
 *	@how: connection part
 *
 *	Returns 0 or an error.
 */

3674 3675 3676 3677 3678
int kernel_sock_shutdown(struct socket *sock, enum sock_shutdown_cmd how)
{
	return sock->ops->shutdown(sock, how);
}
EXPORT_SYMBOL(kernel_sock_shutdown);
3679

3680 3681 3682 3683 3684 3685 3686 3687
/**
 *	kernel_sock_ip_overhead - returns the IP overhead imposed by a socket
 *	@sk: socket
 *
 *	This routine returns the IP overhead imposed by a socket i.e.
 *	the length of the underlying IP header, depending on whether
 *	this is an IPv4 or IPv6 socket and the length from IP options turned
 *	on at the socket. Assumes that the caller has a lock on the socket.
3688
 */
3689

3690 3691 3692 3693 3694 3695 3696 3697 3698 3699 3700 3701 3702 3703 3704 3705 3706 3707
u32 kernel_sock_ip_overhead(struct sock *sk)
{
	struct inet_sock *inet;
	struct ip_options_rcu *opt;
	u32 overhead = 0;
#if IS_ENABLED(CONFIG_IPV6)
	struct ipv6_pinfo *np;
	struct ipv6_txoptions *optv6 = NULL;
#endif /* IS_ENABLED(CONFIG_IPV6) */

	if (!sk)
		return overhead;

	switch (sk->sk_family) {
	case AF_INET:
		inet = inet_sk(sk);
		overhead += sizeof(struct iphdr);
		opt = rcu_dereference_protected(inet->inet_opt,
3708
						sock_owned_by_user(sk));
3709 3710 3711 3712 3713 3714 3715 3716 3717
		if (opt)
			overhead += opt->opt.optlen;
		return overhead;
#if IS_ENABLED(CONFIG_IPV6)
	case AF_INET6:
		np = inet6_sk(sk);
		overhead += sizeof(struct ipv6hdr);
		if (np)
			optv6 = rcu_dereference_protected(np->opt,
3718
							  sock_owned_by_user(sk));
3719 3720 3721 3722 3723 3724 3725 3726 3727
		if (optv6)
			overhead += (optv6->opt_flen + optv6->opt_nflen);
		return overhead;
#endif /* IS_ENABLED(CONFIG_IPV6) */
	default: /* Returns 0 overhead if the socket is not ipv4 or ipv6 */
		return overhead;
	}
}
EXPORT_SYMBOL(kernel_sock_ip_overhead);