socket.c 93.0 KB
Newer Older
1
// SPDX-License-Identifier: GPL-2.0-or-later
L
Linus Torvalds 已提交
2 3 4 5 6 7
/*
 * NET		An implementation of the SOCKET network access protocol.
 *
 * Version:	@(#)socket.c	1.1.93	18/02/95
 *
 * Authors:	Orest Zborowski, <obz@Kodak.COM>
8
 *		Ross Biro
L
Linus Torvalds 已提交
9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45
 *		Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
 *
 * Fixes:
 *		Anonymous	:	NOTSOCK/BADF cleanup. Error fix in
 *					shutdown()
 *		Alan Cox	:	verify_area() fixes
 *		Alan Cox	:	Removed DDI
 *		Jonathan Kamens	:	SOCK_DGRAM reconnect bug
 *		Alan Cox	:	Moved a load of checks to the very
 *					top level.
 *		Alan Cox	:	Move address structures to/from user
 *					mode above the protocol layers.
 *		Rob Janssen	:	Allow 0 length sends.
 *		Alan Cox	:	Asynchronous I/O support (cribbed from the
 *					tty drivers).
 *		Niibe Yutaka	:	Asynchronous I/O for writes (4.4BSD style)
 *		Jeff Uphoff	:	Made max number of sockets command-line
 *					configurable.
 *		Matti Aarnio	:	Made the number of sockets dynamic,
 *					to be allocated when needed, and mr.
 *					Uphoff's max is used as max to be
 *					allowed to allocate.
 *		Linus		:	Argh. removed all the socket allocation
 *					altogether: it's in the inode now.
 *		Alan Cox	:	Made sock_alloc()/sock_release() public
 *					for NetROM and future kernel nfsd type
 *					stuff.
 *		Alan Cox	:	sendmsg/recvmsg basics.
 *		Tom Dyas	:	Export net symbols.
 *		Marcin Dalecki	:	Fixed problems with CONFIG_NET="n".
 *		Alan Cox	:	Added thread locking to sys_* calls
 *					for sockets. May have errors at the
 *					moment.
 *		Kevin Buhr	:	Fixed the dumb errors in the above.
 *		Andi Kleen	:	Some small cleanups, optimizations,
 *					and fixed a copy_from_user() bug.
 *		Tigran Aivazian	:	sys_send(args) calls sys_sendto(args, NULL, 0)
46
 *		Tigran Aivazian	:	Made listen(2) backlog sanity checks
L
Linus Torvalds 已提交
47 48 49
 *					protocol-independent
 *
 *	This module is effectively the top level interface to the BSD socket
50
 *	paradigm.
L
Linus Torvalds 已提交
51 52 53 54 55 56 57 58 59
 *
 *	Based upon Swansea University Computer Society NET3.039
 */

#include <linux/mm.h>
#include <linux/socket.h>
#include <linux/file.h>
#include <linux/net.h>
#include <linux/interrupt.h>
U
Ulrich Drepper 已提交
60
#include <linux/thread_info.h>
61
#include <linux/rcupdate.h>
L
Linus Torvalds 已提交
62 63 64
#include <linux/netdevice.h>
#include <linux/proc_fs.h>
#include <linux/seq_file.h>
A
Arjan van de Ven 已提交
65
#include <linux/mutex.h>
L
Linus Torvalds 已提交
66
#include <linux/if_bridge.h>
67 68
#include <linux/if_frad.h>
#include <linux/if_vlan.h>
69
#include <linux/ptp_classify.h>
L
Linus Torvalds 已提交
70 71 72 73 74 75
#include <linux/init.h>
#include <linux/poll.h>
#include <linux/cache.h>
#include <linux/module.h>
#include <linux/highmem.h>
#include <linux/mount.h>
76
#include <linux/pseudo_fs.h>
L
Linus Torvalds 已提交
77 78 79 80
#include <linux/security.h>
#include <linux/syscalls.h>
#include <linux/compat.h>
#include <linux/kmod.h>
81
#include <linux/audit.h>
82
#include <linux/wireless.h>
83
#include <linux/nsproxy.h>
N
Nick Black 已提交
84
#include <linux/magic.h>
85
#include <linux/slab.h>
86
#include <linux/xattr.h>
87
#include <linux/nospec.h>
88
#include <linux/indirect_call_wrapper.h>
L
Linus Torvalds 已提交
89

90
#include <linux/uaccess.h>
L
Linus Torvalds 已提交
91 92 93
#include <asm/unistd.h>

#include <net/compat.h>
94
#include <net/wext.h>
95
#include <net/cls_cgroup.h>
L
Linus Torvalds 已提交
96 97 98 99

#include <net/sock.h>
#include <linux/netfilter.h>

100 101 102 103
#include <linux/if_tun.h>
#include <linux/ipv6_route.h>
#include <linux/route.h>
#include <linux/sockios.h>
104
#include <net/busy_poll.h>
105
#include <linux/errqueue.h>
E
Eliezer Tamir 已提交
106

107
#ifdef CONFIG_NET_RX_BUSY_POLL
108 109
unsigned int sysctl_net_busy_read __read_mostly;
unsigned int sysctl_net_busy_poll __read_mostly;
E
Eliezer Tamir 已提交
110
#endif
111

112 113
static ssize_t sock_read_iter(struct kiocb *iocb, struct iov_iter *to);
static ssize_t sock_write_iter(struct kiocb *iocb, struct iov_iter *from);
114
static int sock_mmap(struct file *file, struct vm_area_struct *vma);
L
Linus Torvalds 已提交
115 116

static int sock_close(struct inode *inode, struct file *file);
117 118
static __poll_t sock_poll(struct file *file,
			      struct poll_table_struct *wait);
119
static long sock_ioctl(struct file *file, unsigned int cmd, unsigned long arg);
120 121
#ifdef CONFIG_COMPAT
static long compat_sock_ioctl(struct file *file,
122
			      unsigned int cmd, unsigned long arg);
123
#endif
L
Linus Torvalds 已提交
124 125 126
static int sock_fasync(int fd, struct file *filp, int on);
static ssize_t sock_sendpage(struct file *file, struct page *page,
			     int offset, size_t size, loff_t *ppos, int more);
J
Jens Axboe 已提交
127
static ssize_t sock_splice_read(struct file *file, loff_t *ppos,
128
				struct pipe_inode_info *pipe, size_t len,
J
Jens Axboe 已提交
129
				unsigned int flags);
L
Linus Torvalds 已提交
130 131 132 133 134 135

/*
 *	Socket files have a set of 'special' operations as well as the generic file ones. These don't appear
 *	in the operation structures but are done directly via the socketcall() multiplexor.
 */

136
static const struct file_operations socket_file_ops = {
L
Linus Torvalds 已提交
137 138
	.owner =	THIS_MODULE,
	.llseek =	no_llseek,
139 140
	.read_iter =	sock_read_iter,
	.write_iter =	sock_write_iter,
L
Linus Torvalds 已提交
141 142
	.poll =		sock_poll,
	.unlocked_ioctl = sock_ioctl,
143 144 145
#ifdef CONFIG_COMPAT
	.compat_ioctl = compat_sock_ioctl,
#endif
L
Linus Torvalds 已提交
146 147 148
	.mmap =		sock_mmap,
	.release =	sock_close,
	.fasync =	sock_fasync,
149 150
	.sendpage =	sock_sendpage,
	.splice_write = generic_splice_sendpage,
J
Jens Axboe 已提交
151
	.splice_read =	sock_splice_read,
L
Linus Torvalds 已提交
152 153 154 155 156 157 158
};

/*
 *	The protocol list. Each protocol is registered in here.
 */

static DEFINE_SPINLOCK(net_family_lock);
E
Eric Dumazet 已提交
159
static const struct net_proto_family __rcu *net_families[NPROTO] __read_mostly;
L
Linus Torvalds 已提交
160 161

/*
162 163 164
 * Support routines.
 * Move socket addresses back and forth across the kernel/user
 * divide and look after the messy bits.
L
Linus Torvalds 已提交
165 166 167 168 169 170 171 172 173 174 175 176 177
 */

/**
 *	move_addr_to_kernel	-	copy a socket address into kernel space
 *	@uaddr: Address in user space
 *	@kaddr: Address in kernel space
 *	@ulen: Length in user space
 *
 *	The address is copied into kernel space. If the provided address is
 *	too long an error code of -EINVAL is returned. If the copy gives
 *	invalid addresses -EFAULT is returned. On a success 0 is returned.
 */

178
int move_addr_to_kernel(void __user *uaddr, int ulen, struct sockaddr_storage *kaddr)
L
Linus Torvalds 已提交
179
{
180
	if (ulen < 0 || ulen > sizeof(struct sockaddr_storage))
L
Linus Torvalds 已提交
181
		return -EINVAL;
182
	if (ulen == 0)
L
Linus Torvalds 已提交
183
		return 0;
184
	if (copy_from_user(kaddr, uaddr, ulen))
L
Linus Torvalds 已提交
185
		return -EFAULT;
186
	return audit_sockaddr(ulen, kaddr);
L
Linus Torvalds 已提交
187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204
}

/**
 *	move_addr_to_user	-	copy an address to user space
 *	@kaddr: kernel space address
 *	@klen: length of address in kernel
 *	@uaddr: user space address
 *	@ulen: pointer to user length field
 *
 *	The value pointed to by ulen on entry is the buffer length available.
 *	This is overwritten with the buffer space used. -EINVAL is returned
 *	if an overlong buffer is specified or a negative buffer size. -EFAULT
 *	is returned if either the buffer or the length field are not
 *	accessible.
 *	After copying the data up to the limit the user specifies, the true
 *	length of the data is written over the length limit the user
 *	specified. Zero is returned for a success.
 */
205

206
static int move_addr_to_user(struct sockaddr_storage *kaddr, int klen,
S
stephen hemminger 已提交
207
			     void __user *uaddr, int __user *ulen)
L
Linus Torvalds 已提交
208 209 210 211
{
	int err;
	int len;

212
	BUG_ON(klen > sizeof(struct sockaddr_storage));
213 214
	err = get_user(len, ulen);
	if (err)
L
Linus Torvalds 已提交
215
		return err;
216 217
	if (len > klen)
		len = klen;
218
	if (len < 0)
L
Linus Torvalds 已提交
219
		return -EINVAL;
220
	if (len) {
S
Steve Grubb 已提交
221 222
		if (audit_sockaddr(klen, kaddr))
			return -ENOMEM;
223
		if (copy_to_user(uaddr, kaddr, len))
L
Linus Torvalds 已提交
224 225 226
			return -EFAULT;
	}
	/*
227 228
	 *      "fromlen shall refer to the value before truncation.."
	 *                      1003.1g
L
Linus Torvalds 已提交
229 230 231 232
	 */
	return __put_user(klen, ulen);
}

233
static struct kmem_cache *sock_inode_cachep __ro_after_init;
L
Linus Torvalds 已提交
234 235 236 237

static struct inode *sock_alloc_inode(struct super_block *sb)
{
	struct socket_alloc *ei;
238

239
	ei = kmem_cache_alloc(sock_inode_cachep, GFP_KERNEL);
L
Linus Torvalds 已提交
240 241
	if (!ei)
		return NULL;
242 243 244
	init_waitqueue_head(&ei->socket.wq.wait);
	ei->socket.wq.fasync_list = NULL;
	ei->socket.wq.flags = 0;
245

L
Linus Torvalds 已提交
246 247 248 249 250 251 252 253 254
	ei->socket.state = SS_UNCONNECTED;
	ei->socket.flags = 0;
	ei->socket.ops = NULL;
	ei->socket.sk = NULL;
	ei->socket.file = NULL;

	return &ei->vfs_inode;
}

A
Al Viro 已提交
255
static void sock_free_inode(struct inode *inode)
L
Linus Torvalds 已提交
256
{
257 258 259 260
	struct socket_alloc *ei;

	ei = container_of(inode, struct socket_alloc, vfs_inode);
	kmem_cache_free(sock_inode_cachep, ei);
L
Linus Torvalds 已提交
261 262
}

263
static void init_once(void *foo)
L
Linus Torvalds 已提交
264
{
265
	struct socket_alloc *ei = (struct socket_alloc *)foo;
L
Linus Torvalds 已提交
266

C
Christoph Lameter 已提交
267
	inode_init_once(&ei->vfs_inode);
L
Linus Torvalds 已提交
268
}
269

270
static void init_inodecache(void)
L
Linus Torvalds 已提交
271 272
{
	sock_inode_cachep = kmem_cache_create("sock_inode_cache",
273 274 275 276
					      sizeof(struct socket_alloc),
					      0,
					      (SLAB_HWCACHE_ALIGN |
					       SLAB_RECLAIM_ACCOUNT |
277
					       SLAB_MEM_SPREAD | SLAB_ACCOUNT),
278
					      init_once);
279
	BUG_ON(sock_inode_cachep == NULL);
L
Linus Torvalds 已提交
280 281
}

282
static const struct super_operations sockfs_ops = {
283
	.alloc_inode	= sock_alloc_inode,
A
Al Viro 已提交
284
	.free_inode	= sock_free_inode,
285
	.statfs		= simple_statfs,
L
Linus Torvalds 已提交
286 287
};

288 289 290 291 292 293
/*
 * sockfs_dname() is called from d_path().
 */
static char *sockfs_dname(struct dentry *dentry, char *buffer, int buflen)
{
	return dynamic_dname(dentry, buffer, buflen, "socket:[%lu]",
D
David Howells 已提交
294
				d_inode(dentry)->i_ino);
295 296
}

A
Al Viro 已提交
297
static const struct dentry_operations sockfs_dentry_operations = {
298
	.d_dname  = sockfs_dname,
L
Linus Torvalds 已提交
299 300
};

301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321
static int sockfs_xattr_get(const struct xattr_handler *handler,
			    struct dentry *dentry, struct inode *inode,
			    const char *suffix, void *value, size_t size)
{
	if (value) {
		if (dentry->d_name.len + 1 > size)
			return -ERANGE;
		memcpy(value, dentry->d_name.name, dentry->d_name.len + 1);
	}
	return dentry->d_name.len + 1;
}

#define XATTR_SOCKPROTONAME_SUFFIX "sockprotoname"
#define XATTR_NAME_SOCKPROTONAME (XATTR_SYSTEM_PREFIX XATTR_SOCKPROTONAME_SUFFIX)
#define XATTR_NAME_SOCKPROTONAME_LEN (sizeof(XATTR_NAME_SOCKPROTONAME)-1)

static const struct xattr_handler sockfs_xattr_handler = {
	.name = XATTR_NAME_SOCKPROTONAME,
	.get = sockfs_xattr_get,
};

322 323 324 325 326 327 328 329 330 331 332 333 334 335
static int sockfs_security_xattr_set(const struct xattr_handler *handler,
				     struct dentry *dentry, struct inode *inode,
				     const char *suffix, const void *value,
				     size_t size, int flags)
{
	/* Handled by LSM. */
	return -EAGAIN;
}

static const struct xattr_handler sockfs_security_xattr_handler = {
	.prefix = XATTR_SECURITY_PREFIX,
	.set = sockfs_security_xattr_set,
};

336 337
static const struct xattr_handler *sockfs_xattr_handlers[] = {
	&sockfs_xattr_handler,
338
	&sockfs_security_xattr_handler,
339 340 341
	NULL
};

342
static int sockfs_init_fs_context(struct fs_context *fc)
343
{
344 345 346 347 348 349 350
	struct pseudo_fs_context *ctx = init_pseudo(fc, SOCKFS_MAGIC);
	if (!ctx)
		return -ENOMEM;
	ctx->ops = &sockfs_ops;
	ctx->dops = &sockfs_dentry_operations;
	ctx->xattr = sockfs_xattr_handlers;
	return 0;
351 352 353 354 355 356
}

static struct vfsmount *sock_mnt __read_mostly;

static struct file_system_type sock_fs_type = {
	.name =		"sockfs",
357
	.init_fs_context = sockfs_init_fs_context,
358 359 360
	.kill_sb =	kill_anon_super,
};

L
Linus Torvalds 已提交
361 362 363
/*
 *	Obtains the first available file descriptor and sets it up for use.
 *
364 365
 *	These functions create file structures and maps them to fd space
 *	of the current process. On success it returns file descriptor
L
Linus Torvalds 已提交
366 367 368 369 370 371 372 373 374 375 376 377
 *	and file struct implicitly stored in sock->file.
 *	Note that another thread may close file descriptor before we return
 *	from this function. We use the fact that now we do not refer
 *	to socket after mapping. If one day we will need it, this
 *	function will increment ref. count on file by 1.
 *
 *	In any case returned fd MAY BE not valid!
 *	This race condition is unavoidable
 *	with shared fd spaces, we cannot solve it inside kernel,
 *	but we take care of internal coherence yet.
 */

378 379 380 381 382 383 384 385 386 387 388 389
/**
 *	sock_alloc_file - Bind a &socket to a &file
 *	@sock: socket
 *	@flags: file status flags
 *	@dname: protocol name
 *
 *	Returns the &file bound with @sock, implicitly storing it
 *	in sock->file. If dname is %NULL, sets to "".
 *	On failure the return is a ERR pointer (see linux/err.h).
 *	This function uses GFP_KERNEL internally.
 */

390
struct file *sock_alloc_file(struct socket *sock, int flags, const char *dname)
L
Linus Torvalds 已提交
391
{
392
	struct file *file;
L
Linus Torvalds 已提交
393

A
Al Viro 已提交
394 395
	if (!dname)
		dname = sock->sk ? sock->sk->sk_prot_creator->name : "";
396

A
Al Viro 已提交
397 398 399
	file = alloc_file_pseudo(SOCK_INODE(sock), sock_mnt, dname,
				O_RDWR | (flags & O_NONBLOCK),
				&socket_file_ops);
400
	if (IS_ERR(file)) {
401
		sock_release(sock);
402
		return file;
A
Al Viro 已提交
403 404 405
	}

	sock->file = file;
406
	file->private_data = sock;
407
	return file;
408
}
409
EXPORT_SYMBOL(sock_alloc_file);
410

411
static int sock_map_fd(struct socket *sock, int flags)
412 413
{
	struct file *newfile;
414
	int fd = get_unused_fd_flags(flags);
415 416
	if (unlikely(fd < 0)) {
		sock_release(sock);
417
		return fd;
418
	}
419

420
	newfile = sock_alloc_file(sock, flags, NULL);
421
	if (!IS_ERR(newfile)) {
422
		fd_install(fd, newfile);
423 424
		return fd;
	}
425

426 427
	put_unused_fd(fd);
	return PTR_ERR(newfile);
L
Linus Torvalds 已提交
428 429
}

430 431 432 433 434 435 436 437
/**
 *	sock_from_file - Return the &socket bounded to @file.
 *	@file: file
 *	@err: pointer to an error code return
 *
 *	On failure returns %NULL and assigns -ENOTSOCK to @err.
 */

438
struct socket *sock_from_file(struct file *file, int *err)
439 440 441 442
{
	if (file->f_op == &socket_file_ops)
		return file->private_data;	/* set in sock_map_fd */

E
Eric Dumazet 已提交
443 444
	*err = -ENOTSOCK;
	return NULL;
445
}
446
EXPORT_SYMBOL(sock_from_file);
447

L
Linus Torvalds 已提交
448
/**
449
 *	sockfd_lookup - Go from a file number to its socket slot
L
Linus Torvalds 已提交
450 451 452 453
 *	@fd: file handle
 *	@err: pointer to an error code return
 *
 *	The file handle passed in is locked and the socket it is bound
454
 *	to is returned. If an error occurs the err pointer is overwritten
L
Linus Torvalds 已提交
455 456 457 458 459 460 461 462 463 464 465
 *	with a negative errno code and NULL is returned. The function checks
 *	for both invalid handles and passing a handle which is not a socket.
 *
 *	On a success the socket object pointer is returned.
 */

struct socket *sockfd_lookup(int fd, int *err)
{
	struct file *file;
	struct socket *sock;

466 467
	file = fget(fd);
	if (!file) {
L
Linus Torvalds 已提交
468 469 470
		*err = -EBADF;
		return NULL;
	}
471

472 473
	sock = sock_from_file(file, err);
	if (!sock)
L
Linus Torvalds 已提交
474
		fput(file);
475 476
	return sock;
}
477
EXPORT_SYMBOL(sockfd_lookup);
L
Linus Torvalds 已提交
478

479 480
static struct socket *sockfd_lookup_light(int fd, int *err, int *fput_needed)
{
481
	struct fd f = fdget(fd);
482 483
	struct socket *sock;

484
	*err = -EBADF;
485 486 487 488
	if (f.file) {
		sock = sock_from_file(f.file, err);
		if (likely(sock)) {
			*fput_needed = f.flags;
489
			return sock;
490 491
		}
		fdput(f);
L
Linus Torvalds 已提交
492
	}
493
	return NULL;
L
Linus Torvalds 已提交
494 495
}

496 497 498 499 500 501
static ssize_t sockfs_listxattr(struct dentry *dentry, char *buffer,
				size_t size)
{
	ssize_t len;
	ssize_t used = 0;

D
David Howells 已提交
502
	len = security_inode_listsecurity(d_inode(dentry), buffer, size);
503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523
	if (len < 0)
		return len;
	used += len;
	if (buffer) {
		if (size < used)
			return -ERANGE;
		buffer += len;
	}

	len = (XATTR_NAME_SOCKPROTONAME_LEN + 1);
	used += len;
	if (buffer) {
		if (size < used)
			return -ERANGE;
		memcpy(buffer, XATTR_NAME_SOCKPROTONAME, len);
		buffer += len;
	}

	return used;
}

524
static int sockfs_setattr(struct dentry *dentry, struct iattr *iattr)
525 526 527
{
	int err = simple_setattr(dentry, iattr);

528
	if (!err && (iattr->ia_valid & ATTR_UID)) {
529 530
		struct socket *sock = SOCKET_I(d_inode(dentry));

531 532 533 534
		if (sock->sk)
			sock->sk->sk_uid = iattr->ia_uid;
		else
			err = -ENOENT;
535 536 537 538 539
	}

	return err;
}

540 541
static const struct inode_operations sockfs_inode_ops = {
	.listxattr = sockfs_listxattr,
542
	.setattr = sockfs_setattr,
543 544
};

L
Linus Torvalds 已提交
545
/**
546
 *	sock_alloc - allocate a socket
547
 *
L
Linus Torvalds 已提交
548 549
 *	Allocate a new inode and socket object. The two are bound together
 *	and initialised. The socket is then returned. If we are out of inodes
550
 *	NULL is returned. This functions uses GFP_KERNEL internally.
L
Linus Torvalds 已提交
551 552
 */

T
Tom Herbert 已提交
553
struct socket *sock_alloc(void)
L
Linus Torvalds 已提交
554
{
555 556
	struct inode *inode;
	struct socket *sock;
L
Linus Torvalds 已提交
557

558
	inode = new_inode_pseudo(sock_mnt->mnt_sb);
L
Linus Torvalds 已提交
559 560 561 562 563
	if (!inode)
		return NULL;

	sock = SOCKET_I(inode);

564
	inode->i_ino = get_next_ino();
565
	inode->i_mode = S_IFSOCK | S_IRWXUGO;
566 567
	inode->i_uid = current_fsuid();
	inode->i_gid = current_fsgid();
568
	inode->i_op = &sockfs_inode_ops;
L
Linus Torvalds 已提交
569 570 571

	return sock;
}
T
Tom Herbert 已提交
572
EXPORT_SYMBOL(sock_alloc);
L
Linus Torvalds 已提交
573 574

/**
575
 *	sock_release - close a socket
L
Linus Torvalds 已提交
576 577 578 579
 *	@sock: socket to close
 *
 *	The socket is released from the protocol stack if it has a release
 *	callback, and the inode is then released if the socket is bound to
580
 *	an inode not a file.
L
Linus Torvalds 已提交
581
 */
582

583
static void __sock_release(struct socket *sock, struct inode *inode)
L
Linus Torvalds 已提交
584 585 586 587
{
	if (sock->ops) {
		struct module *owner = sock->ops->owner;

588 589
		if (inode)
			inode_lock(inode);
L
Linus Torvalds 已提交
590
		sock->ops->release(sock);
591
		sock->sk = NULL;
592 593
		if (inode)
			inode_unlock(inode);
L
Linus Torvalds 已提交
594 595 596 597
		sock->ops = NULL;
		module_put(owner);
	}

598
	if (sock->wq.fasync_list)
599
		pr_err("%s: fasync list not empty!\n", __func__);
L
Linus Torvalds 已提交
600 601 602 603 604

	if (!sock->file) {
		iput(SOCK_INODE(sock));
		return;
	}
605
	sock->file = NULL;
L
Linus Torvalds 已提交
606
}
607 608 609 610 611

void sock_release(struct socket *sock)
{
	__sock_release(sock, NULL);
}
612
EXPORT_SYMBOL(sock_release);
L
Linus Torvalds 已提交
613

614
void __sock_tx_timestamp(__u16 tsflags, __u8 *tx_flags)
615
{
616 617
	u8 flags = *tx_flags;

618
	if (tsflags & SOF_TIMESTAMPING_TX_HARDWARE)
619 620
		flags |= SKBTX_HW_TSTAMP;

621
	if (tsflags & SOF_TIMESTAMPING_TX_SOFTWARE)
622 623
		flags |= SKBTX_SW_TSTAMP;

624
	if (tsflags & SOF_TIMESTAMPING_TX_SCHED)
625 626 627
		flags |= SKBTX_SCHED_TSTAMP;

	*tx_flags = flags;
628
}
629
EXPORT_SYMBOL(__sock_tx_timestamp);
630

631 632
INDIRECT_CALLABLE_DECLARE(int inet_sendmsg(struct socket *, struct msghdr *,
					   size_t));
633 634
INDIRECT_CALLABLE_DECLARE(int inet6_sendmsg(struct socket *, struct msghdr *,
					    size_t));
635
static inline int sock_sendmsg_nosec(struct socket *sock, struct msghdr *msg)
L
Linus Torvalds 已提交
636
{
637 638 639
	int ret = INDIRECT_CALL_INET(sock->ops->sendmsg, inet6_sendmsg,
				     inet_sendmsg, sock, msg,
				     msg_data_left(msg));
640 641
	BUG_ON(ret == -EIOCBQUEUED);
	return ret;
L
Linus Torvalds 已提交
642 643
}

644 645 646 647 648 649 650 651
/**
 *	sock_sendmsg - send a message through @sock
 *	@sock: socket
 *	@msg: message to send
 *
 *	Sends @msg through @sock, passing through LSM.
 *	Returns the number of bytes sent, or an error code.
 */
652
int sock_sendmsg(struct socket *sock, struct msghdr *msg)
653
{
654
	int err = security_socket_sendmsg(sock, msg,
A
Al Viro 已提交
655
					  msg_data_left(msg));
656

657
	return err ?: sock_sendmsg_nosec(sock, msg);
658
}
659
EXPORT_SYMBOL(sock_sendmsg);
L
Linus Torvalds 已提交
660

661 662 663 664 665 666 667 668 669 670 671 672
/**
 *	kernel_sendmsg - send a message through @sock (kernel-space)
 *	@sock: socket
 *	@msg: message header
 *	@vec: kernel vec
 *	@num: vec array length
 *	@size: total message data size
 *
 *	Builds the message data with @vec and sends it through @sock.
 *	Returns the number of bytes sent, or an error code.
 */

L
Linus Torvalds 已提交
673 674 675
int kernel_sendmsg(struct socket *sock, struct msghdr *msg,
		   struct kvec *vec, size_t num, size_t size)
{
676
	iov_iter_kvec(&msg->msg_iter, WRITE, vec, num, size);
677
	return sock_sendmsg(sock, msg);
L
Linus Torvalds 已提交
678
}
679
EXPORT_SYMBOL(kernel_sendmsg);
L
Linus Torvalds 已提交
680

681 682 683 684 685 686 687 688 689 690 691 692 693
/**
 *	kernel_sendmsg_locked - send a message through @sock (kernel-space)
 *	@sk: sock
 *	@msg: message header
 *	@vec: output s/g array
 *	@num: output s/g array length
 *	@size: total message data size
 *
 *	Builds the message data with @vec and sends it through @sock.
 *	Returns the number of bytes sent, or an error code.
 *	Caller must hold @sk.
 */

694 695 696 697 698 699
int kernel_sendmsg_locked(struct sock *sk, struct msghdr *msg,
			  struct kvec *vec, size_t num, size_t size)
{
	struct socket *sock = sk->sk_socket;

	if (!sock->ops->sendmsg_locked)
J
John Fastabend 已提交
700
		return sock_no_sendmsg_locked(sk, msg, size);
701

702
	iov_iter_kvec(&msg->msg_iter, WRITE, vec, num, size);
703 704 705 706 707

	return sock->ops->sendmsg_locked(sk, msg, msg_data_left(msg));
}
EXPORT_SYMBOL(kernel_sendmsg_locked);

708 709 710 711 712 713 714 715 716 717
static bool skb_is_err_queue(const struct sk_buff *skb)
{
	/* pkt_type of skbs enqueued on the error queue are set to
	 * PACKET_OUTGOING in skb_set_err_queue(). This is only safe to do
	 * in recvmsg, since skbs received on a local socket will never
	 * have a pkt_type of PACKET_OUTGOING.
	 */
	return skb->pkt_type == PACKET_OUTGOING;
}

718 719 720 721 722
/* On transmit, software and hardware timestamps are returned independently.
 * As the two skb clones share the hardware timestamp, which may be updated
 * before the software timestamp is received, a hardware TX timestamp may be
 * returned only if there is no software TX timestamp. Ignore false software
 * timestamps, which may be made in the __sock_recv_timestamp() call when the
723
 * option SO_TIMESTAMP_OLD(NS) is enabled on the socket, even when the skb has a
724 725 726 727 728 729 730
 * hardware timestamp.
 */
static bool skb_is_swtx_tstamp(const struct sk_buff *skb, int false_tstamp)
{
	return skb->tstamp && !false_tstamp && skb_is_err_queue(skb);
}

731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751
static void put_ts_pktinfo(struct msghdr *msg, struct sk_buff *skb)
{
	struct scm_ts_pktinfo ts_pktinfo;
	struct net_device *orig_dev;

	if (!skb_mac_header_was_set(skb))
		return;

	memset(&ts_pktinfo, 0, sizeof(ts_pktinfo));

	rcu_read_lock();
	orig_dev = dev_get_by_napi_id(skb_napi_id(skb));
	if (orig_dev)
		ts_pktinfo.if_index = orig_dev->ifindex;
	rcu_read_unlock();

	ts_pktinfo.pkt_length = skb->len - skb_mac_offset(skb);
	put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMPING_PKTINFO,
		 sizeof(ts_pktinfo), &ts_pktinfo);
}

752 753 754 755 756 757
/*
 * called from sock_recv_timestamp() if sock_flag(sk, SOCK_RCVTSTAMP)
 */
void __sock_recv_timestamp(struct msghdr *msg, struct sock *sk,
	struct sk_buff *skb)
{
758
	int need_software_tstamp = sock_flag(sk, SOCK_RCVTSTAMP);
759
	int new_tstamp = sock_flag(sk, SOCK_TSTAMP_NEW);
D
Deepa Dinamani 已提交
760 761
	struct scm_timestamping_internal tss;

762
	int empty = 1, false_tstamp = 0;
763 764 765 766 767
	struct skb_shared_hwtstamps *shhwtstamps =
		skb_hwtstamps(skb);

	/* Race occurred between timestamp enabling and packet
	   receiving.  Fill in the current time for now. */
768
	if (need_software_tstamp && skb->tstamp == 0) {
769
		__net_timestamp(skb);
770 771
		false_tstamp = 1;
	}
772 773 774

	if (need_software_tstamp) {
		if (!sock_flag(sk, SOCK_RCVTSTAMPNS)) {
775 776 777 778 779 780 781 782 783 784 785 786 787
			if (new_tstamp) {
				struct __kernel_sock_timeval tv;

				skb_get_new_timestamp(skb, &tv);
				put_cmsg(msg, SOL_SOCKET, SO_TIMESTAMP_NEW,
					 sizeof(tv), &tv);
			} else {
				struct __kernel_old_timeval tv;

				skb_get_timestamp(skb, &tv);
				put_cmsg(msg, SOL_SOCKET, SO_TIMESTAMP_OLD,
					 sizeof(tv), &tv);
			}
788
		} else {
789 790 791 792 793 794 795 796 797 798 799 800 801
			if (new_tstamp) {
				struct __kernel_timespec ts;

				skb_get_new_timestampns(skb, &ts);
				put_cmsg(msg, SOL_SOCKET, SO_TIMESTAMPNS_NEW,
					 sizeof(ts), &ts);
			} else {
				struct timespec ts;

				skb_get_timestampns(skb, &ts);
				put_cmsg(msg, SOL_SOCKET, SO_TIMESTAMPNS_OLD,
					 sizeof(ts), &ts);
			}
802 803 804
		}
	}

805
	memset(&tss, 0, sizeof(tss));
806
	if ((sk->sk_tsflags & SOF_TIMESTAMPING_SOFTWARE) &&
D
Deepa Dinamani 已提交
807
	    ktime_to_timespec64_cond(skb->tstamp, tss.ts + 0))
808
		empty = 0;
809
	if (shhwtstamps &&
810
	    (sk->sk_tsflags & SOF_TIMESTAMPING_RAW_HARDWARE) &&
811
	    !skb_is_swtx_tstamp(skb, false_tstamp) &&
D
Deepa Dinamani 已提交
812
	    ktime_to_timespec64_cond(shhwtstamps->hwtstamp, tss.ts + 2)) {
813
		empty = 0;
814 815 816 817
		if ((sk->sk_tsflags & SOF_TIMESTAMPING_OPT_PKTINFO) &&
		    !skb_is_err_queue(skb))
			put_ts_pktinfo(msg, skb);
	}
818
	if (!empty) {
D
Deepa Dinamani 已提交
819 820 821 822
		if (sock_flag(sk, SOCK_TSTAMP_NEW))
			put_cmsg_scm_timestamping64(msg, &tss);
		else
			put_cmsg_scm_timestamping(msg, &tss);
823

824
		if (skb_is_err_queue(skb) && skb->len &&
825
		    SKB_EXT_ERR(skb)->opt_stats)
826 827 828
			put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMPING_OPT_STATS,
				 skb->len, skb->data);
	}
829
}
830 831
EXPORT_SYMBOL_GPL(__sock_recv_timestamp);

832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847
void __sock_recv_wifi_status(struct msghdr *msg, struct sock *sk,
	struct sk_buff *skb)
{
	int ack;

	if (!sock_flag(sk, SOCK_WIFI_STATUS))
		return;
	if (!skb->wifi_acked_valid)
		return;

	ack = skb->wifi_acked;

	put_cmsg(msg, SOL_SOCKET, SCM_WIFI_STATUS, sizeof(ack), &ack);
}
EXPORT_SYMBOL_GPL(__sock_recv_wifi_status);

S
stephen hemminger 已提交
848 849
static inline void sock_recv_drops(struct msghdr *msg, struct sock *sk,
				   struct sk_buff *skb)
850
{
851
	if (sock_flag(sk, SOCK_RXQ_OVFL) && skb && SOCK_SKB_CB(skb)->dropcount)
852
		put_cmsg(msg, SOL_SOCKET, SO_RXQ_OVFL,
853
			sizeof(__u32), &SOCK_SKB_CB(skb)->dropcount);
854 855
}

856
void __sock_recv_ts_and_drops(struct msghdr *msg, struct sock *sk,
857 858 859 860 861
	struct sk_buff *skb)
{
	sock_recv_timestamp(msg, sk, skb);
	sock_recv_drops(msg, sk, skb);
}
862
EXPORT_SYMBOL_GPL(__sock_recv_ts_and_drops);
863

864
INDIRECT_CALLABLE_DECLARE(int inet_recvmsg(struct socket *, struct msghdr *,
865 866 867
					   size_t, int));
INDIRECT_CALLABLE_DECLARE(int inet6_recvmsg(struct socket *, struct msghdr *,
					    size_t, int));
868
static inline int sock_recvmsg_nosec(struct socket *sock, struct msghdr *msg,
869
				     int flags)
L
Linus Torvalds 已提交
870
{
871 872 873
	return INDIRECT_CALL_INET(sock->ops->recvmsg, inet6_recvmsg,
				  inet_recvmsg, sock, msg, msg_data_left(msg),
				  flags);
L
Linus Torvalds 已提交
874 875
}

876 877 878 879 880 881 882 883 884
/**
 *	sock_recvmsg - receive a message from @sock
 *	@sock: socket
 *	@msg: message to receive
 *	@flags: message flags
 *
 *	Receives @msg from @sock, passing through LSM. Returns the total number
 *	of bytes received, or an error.
 */
885
int sock_recvmsg(struct socket *sock, struct msghdr *msg, int flags)
886
{
887
	int err = security_socket_recvmsg(sock, msg, msg_data_left(msg), flags);
888

889
	return err ?: sock_recvmsg_nosec(sock, msg, flags);
L
Linus Torvalds 已提交
890
}
891
EXPORT_SYMBOL(sock_recvmsg);
L
Linus Torvalds 已提交
892

893
/**
894 895 896 897 898 899 900
 *	kernel_recvmsg - Receive a message from a socket (kernel space)
 *	@sock: The socket to receive the message from
 *	@msg: Received message
 *	@vec: Input s/g array for message data
 *	@num: Size of input s/g array
 *	@size: Number of bytes to read
 *	@flags: Message flags (MSG_DONTWAIT, etc...)
901
 *
902 903 904
 *	On return the msg structure contains the scatter/gather array passed in the
 *	vec argument. The array is modified so that it consists of the unfilled
 *	portion of the original array.
905
 *
906
 *	The returned value is the total number of bytes received, or an error.
907
 */
908

909 910
int kernel_recvmsg(struct socket *sock, struct msghdr *msg,
		   struct kvec *vec, size_t num, size_t size, int flags)
L
Linus Torvalds 已提交
911 912 913 914
{
	mm_segment_t oldfs = get_fs();
	int result;

915
	iov_iter_kvec(&msg->msg_iter, READ, vec, num, size);
L
Linus Torvalds 已提交
916
	set_fs(KERNEL_DS);
917
	result = sock_recvmsg(sock, msg, flags);
L
Linus Torvalds 已提交
918 919 920
	set_fs(oldfs);
	return result;
}
921
EXPORT_SYMBOL(kernel_recvmsg);
L
Linus Torvalds 已提交
922

923 924
static ssize_t sock_sendpage(struct file *file, struct page *page,
			     int offset, size_t size, loff_t *ppos, int more)
L
Linus Torvalds 已提交
925 926 927 928
{
	struct socket *sock;
	int flags;

929 930
	sock = file->private_data;

931 932 933
	flags = (file->f_flags & O_NONBLOCK) ? MSG_DONTWAIT : 0;
	/* more is a combination of MSG_MORE and MSG_SENDPAGE_NOTLAST */
	flags |= more;
934

935
	return kernel_sendpage(sock, page, offset, size, flags);
936
}
L
Linus Torvalds 已提交
937

J
Jens Axboe 已提交
938
static ssize_t sock_splice_read(struct file *file, loff_t *ppos,
939
				struct pipe_inode_info *pipe, size_t len,
J
Jens Axboe 已提交
940 941 942 943
				unsigned int flags)
{
	struct socket *sock = file->private_data;

944
	if (unlikely(!sock->ops->splice_read))
945
		return generic_file_splice_read(file, ppos, pipe, len, flags);
946

J
Jens Axboe 已提交
947 948 949
	return sock->ops->splice_read(sock, ppos, pipe, len, flags);
}

950
static ssize_t sock_read_iter(struct kiocb *iocb, struct iov_iter *to)
951
{
952 953
	struct file *file = iocb->ki_filp;
	struct socket *sock = file->private_data;
954 955
	struct msghdr msg = {.msg_iter = *to,
			     .msg_iocb = iocb};
956
	ssize_t res;
957

958 959 960 961
	if (file->f_flags & O_NONBLOCK)
		msg.msg_flags = MSG_DONTWAIT;

	if (iocb->ki_pos != 0)
L
Linus Torvalds 已提交
962
		return -ESPIPE;
963

C
Christoph Hellwig 已提交
964
	if (!iov_iter_count(to))	/* Match SYS5 behaviour */
L
Linus Torvalds 已提交
965 966
		return 0;

967
	res = sock_recvmsg(sock, &msg, msg.msg_flags);
968 969
	*to = msg.msg_iter;
	return res;
L
Linus Torvalds 已提交
970 971
}

972
static ssize_t sock_write_iter(struct kiocb *iocb, struct iov_iter *from)
973
{
974 975
	struct file *file = iocb->ki_filp;
	struct socket *sock = file->private_data;
976 977
	struct msghdr msg = {.msg_iter = *from,
			     .msg_iocb = iocb};
978
	ssize_t res;
L
Linus Torvalds 已提交
979

980
	if (iocb->ki_pos != 0)
981
		return -ESPIPE;
982

983 984 985
	if (file->f_flags & O_NONBLOCK)
		msg.msg_flags = MSG_DONTWAIT;

986 987 988
	if (sock->type == SOCK_SEQPACKET)
		msg.msg_flags |= MSG_EOR;

989
	res = sock_sendmsg(sock, &msg);
990 991
	*from = msg.msg_iter;
	return res;
L
Linus Torvalds 已提交
992 993 994 995 996 997 998
}

/*
 * Atomic setting of ioctl hooks to avoid race
 * with module unload.
 */

A
Arjan van de Ven 已提交
999
static DEFINE_MUTEX(br_ioctl_mutex);
1000
static int (*br_ioctl_hook) (struct net *, unsigned int cmd, void __user *arg);
L
Linus Torvalds 已提交
1001

1002
void brioctl_set(int (*hook) (struct net *, unsigned int, void __user *))
L
Linus Torvalds 已提交
1003
{
A
Arjan van de Ven 已提交
1004
	mutex_lock(&br_ioctl_mutex);
L
Linus Torvalds 已提交
1005
	br_ioctl_hook = hook;
A
Arjan van de Ven 已提交
1006
	mutex_unlock(&br_ioctl_mutex);
L
Linus Torvalds 已提交
1007 1008 1009
}
EXPORT_SYMBOL(brioctl_set);

A
Arjan van de Ven 已提交
1010
static DEFINE_MUTEX(vlan_ioctl_mutex);
1011
static int (*vlan_ioctl_hook) (struct net *, void __user *arg);
L
Linus Torvalds 已提交
1012

1013
void vlan_ioctl_set(int (*hook) (struct net *, void __user *))
L
Linus Torvalds 已提交
1014
{
A
Arjan van de Ven 已提交
1015
	mutex_lock(&vlan_ioctl_mutex);
L
Linus Torvalds 已提交
1016
	vlan_ioctl_hook = hook;
A
Arjan van de Ven 已提交
1017
	mutex_unlock(&vlan_ioctl_mutex);
L
Linus Torvalds 已提交
1018 1019 1020
}
EXPORT_SYMBOL(vlan_ioctl_set);

A
Arjan van de Ven 已提交
1021
static DEFINE_MUTEX(dlci_ioctl_mutex);
1022
static int (*dlci_ioctl_hook) (unsigned int, void __user *);
L
Linus Torvalds 已提交
1023

1024
void dlci_ioctl_set(int (*hook) (unsigned int, void __user *))
L
Linus Torvalds 已提交
1025
{
A
Arjan van de Ven 已提交
1026
	mutex_lock(&dlci_ioctl_mutex);
L
Linus Torvalds 已提交
1027
	dlci_ioctl_hook = hook;
A
Arjan van de Ven 已提交
1028
	mutex_unlock(&dlci_ioctl_mutex);
L
Linus Torvalds 已提交
1029 1030 1031
}
EXPORT_SYMBOL(dlci_ioctl_set);

1032
static long sock_do_ioctl(struct net *net, struct socket *sock,
1033
			  unsigned int cmd, unsigned long arg)
1034 1035 1036 1037 1038 1039 1040 1041 1042 1043
{
	int err;
	void __user *argp = (void __user *)arg;

	err = sock->ops->ioctl(sock, cmd, arg);

	/*
	 * If this ioctl is unknown try to hand it down
	 * to the NIC driver.
	 */
1044 1045
	if (err != -ENOIOCTLCMD)
		return err;
1046

1047 1048 1049 1050 1051 1052 1053 1054 1055
	if (cmd == SIOCGIFCONF) {
		struct ifconf ifc;
		if (copy_from_user(&ifc, argp, sizeof(struct ifconf)))
			return -EFAULT;
		rtnl_lock();
		err = dev_ifconf(net, &ifc, sizeof(struct ifreq));
		rtnl_unlock();
		if (!err && copy_to_user(argp, &ifc, sizeof(struct ifconf)))
			err = -EFAULT;
1056 1057 1058
	} else {
		struct ifreq ifr;
		bool need_copyout;
1059
		if (copy_from_user(&ifr, argp, sizeof(struct ifreq)))
1060 1061 1062
			return -EFAULT;
		err = dev_ioctl(net, cmd, &ifr, &need_copyout);
		if (!err && need_copyout)
1063
			if (copy_to_user(argp, &ifr, sizeof(struct ifreq)))
1064
				return -EFAULT;
1065
	}
1066 1067 1068
	return err;
}

L
Linus Torvalds 已提交
1069 1070 1071 1072 1073
/*
 *	With an ioctl, arg may well be a user mode pointer, but we don't know
 *	what to do with it - that's up to the protocol still.
 */

1074 1075 1076 1077 1078 1079 1080
/**
 *	get_net_ns - increment the refcount of the network namespace
 *	@ns: common namespace (net)
 *
 *	Returns the net's common namespace.
 */

1081
struct ns_common *get_net_ns(struct ns_common *ns)
1082 1083 1084
{
	return &get_net(container_of(ns, struct net, ns))->ns;
}
1085
EXPORT_SYMBOL_GPL(get_net_ns);
1086

L
Linus Torvalds 已提交
1087 1088 1089
static long sock_ioctl(struct file *file, unsigned cmd, unsigned long arg)
{
	struct socket *sock;
1090
	struct sock *sk;
L
Linus Torvalds 已提交
1091 1092
	void __user *argp = (void __user *)arg;
	int pid, err;
1093
	struct net *net;
L
Linus Torvalds 已提交
1094

1095
	sock = file->private_data;
1096
	sk = sock->sk;
1097
	net = sock_net(sk);
1098 1099 1100 1101 1102 1103 1104 1105 1106
	if (unlikely(cmd >= SIOCDEVPRIVATE && cmd <= (SIOCDEVPRIVATE + 15))) {
		struct ifreq ifr;
		bool need_copyout;
		if (copy_from_user(&ifr, argp, sizeof(struct ifreq)))
			return -EFAULT;
		err = dev_ioctl(net, cmd, &ifr, &need_copyout);
		if (!err && need_copyout)
			if (copy_to_user(argp, &ifr, sizeof(struct ifreq)))
				return -EFAULT;
L
Linus Torvalds 已提交
1107
	} else
J
Johannes Berg 已提交
1108
#ifdef CONFIG_WEXT_CORE
L
Linus Torvalds 已提交
1109
	if (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST) {
1110
		err = wext_handle_ioctl(net, cmd, argp);
L
Linus Torvalds 已提交
1111
	} else
J
Johannes Berg 已提交
1112
#endif
1113
		switch (cmd) {
L
Linus Torvalds 已提交
1114 1115 1116 1117 1118
		case FIOSETOWN:
		case SIOCSPGRP:
			err = -EFAULT;
			if (get_user(pid, (int __user *)argp))
				break;
1119
			err = f_setown(sock->file, pid, 1);
L
Linus Torvalds 已提交
1120 1121 1122
			break;
		case FIOGETOWN:
		case SIOCGPGRP:
1123
			err = put_user(f_getown(sock->file),
1124
				       (int __user *)argp);
L
Linus Torvalds 已提交
1125 1126 1127 1128 1129 1130 1131 1132 1133
			break;
		case SIOCGIFBR:
		case SIOCSIFBR:
		case SIOCBRADDBR:
		case SIOCBRDELBR:
			err = -ENOPKG;
			if (!br_ioctl_hook)
				request_module("bridge");

A
Arjan van de Ven 已提交
1134
			mutex_lock(&br_ioctl_mutex);
1135
			if (br_ioctl_hook)
1136
				err = br_ioctl_hook(net, cmd, argp);
A
Arjan van de Ven 已提交
1137
			mutex_unlock(&br_ioctl_mutex);
L
Linus Torvalds 已提交
1138 1139 1140 1141 1142 1143 1144
			break;
		case SIOCGIFVLAN:
		case SIOCSIFVLAN:
			err = -ENOPKG;
			if (!vlan_ioctl_hook)
				request_module("8021q");

A
Arjan van de Ven 已提交
1145
			mutex_lock(&vlan_ioctl_mutex);
L
Linus Torvalds 已提交
1146
			if (vlan_ioctl_hook)
1147
				err = vlan_ioctl_hook(net, argp);
A
Arjan van de Ven 已提交
1148
			mutex_unlock(&vlan_ioctl_mutex);
L
Linus Torvalds 已提交
1149 1150 1151 1152 1153 1154 1155
			break;
		case SIOCADDDLCI:
		case SIOCDELDLCI:
			err = -ENOPKG;
			if (!dlci_ioctl_hook)
				request_module("dlci");

1156 1157
			mutex_lock(&dlci_ioctl_mutex);
			if (dlci_ioctl_hook)
L
Linus Torvalds 已提交
1158
				err = dlci_ioctl_hook(cmd, argp);
1159
			mutex_unlock(&dlci_ioctl_mutex);
L
Linus Torvalds 已提交
1160
			break;
1161 1162 1163 1164 1165 1166 1167
		case SIOCGSKNS:
			err = -EPERM;
			if (!ns_capable(net->user_ns, CAP_NET_ADMIN))
				break;

			err = open_related_ns(&net->ns, get_net_ns);
			break;
1168 1169
		case SIOCGSTAMP_OLD:
		case SIOCGSTAMPNS_OLD:
1170 1171 1172 1173 1174
			if (!sock->ops->gettstamp) {
				err = -ENOIOCTLCMD;
				break;
			}
			err = sock->ops->gettstamp(sock, argp,
1175 1176
						   cmd == SIOCGSTAMP_OLD,
						   !IS_ENABLED(CONFIG_64BIT));
1177
			break;
1178 1179 1180 1181 1182 1183 1184 1185 1186
		case SIOCGSTAMP_NEW:
		case SIOCGSTAMPNS_NEW:
			if (!sock->ops->gettstamp) {
				err = -ENOIOCTLCMD;
				break;
			}
			err = sock->ops->gettstamp(sock, argp,
						   cmd == SIOCGSTAMP_NEW,
						   false);
1187
			break;
L
Linus Torvalds 已提交
1188
		default:
1189
			err = sock_do_ioctl(net, sock, cmd, arg);
L
Linus Torvalds 已提交
1190
			break;
1191
		}
L
Linus Torvalds 已提交
1192 1193 1194
	return err;
}

1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207
/**
 *	sock_create_lite - creates a socket
 *	@family: protocol family (AF_INET, ...)
 *	@type: communication type (SOCK_STREAM, ...)
 *	@protocol: protocol (0, ...)
 *	@res: new socket
 *
 *	Creates a new socket and assigns it to @res, passing through LSM.
 *	The new socket initialization is not complete, see kernel_accept().
 *	Returns 0 or an error. On failure @res is set to %NULL.
 *	This function internally uses GFP_KERNEL.
 */

L
Linus Torvalds 已提交
1208 1209 1210 1211
int sock_create_lite(int family, int type, int protocol, struct socket **res)
{
	int err;
	struct socket *sock = NULL;
1212

L
Linus Torvalds 已提交
1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223
	err = security_socket_create(family, type, protocol, 1);
	if (err)
		goto out;

	sock = sock_alloc();
	if (!sock) {
		err = -ENOMEM;
		goto out;
	}

	sock->type = type;
V
Venkat Yekkirala 已提交
1224 1225 1226 1227
	err = security_socket_post_create(sock, family, type, protocol, 1);
	if (err)
		goto out_release;

L
Linus Torvalds 已提交
1228 1229 1230
out:
	*res = sock;
	return err;
V
Venkat Yekkirala 已提交
1231 1232 1233 1234
out_release:
	sock_release(sock);
	sock = NULL;
	goto out;
L
Linus Torvalds 已提交
1235
}
1236
EXPORT_SYMBOL(sock_create_lite);
L
Linus Torvalds 已提交
1237 1238

/* No kernel lock held - perfect */
A
Al Viro 已提交
1239
static __poll_t sock_poll(struct file *file, poll_table *wait)
L
Linus Torvalds 已提交
1240
{
C
Christoph Hellwig 已提交
1241
	struct socket *sock = file->private_data;
1242
	__poll_t events = poll_requested_events(wait), flag = 0;
1243

1244 1245
	if (!sock->ops->poll)
		return 0;
1246

1247 1248 1249 1250 1251 1252 1253 1254 1255 1256
	if (sk_can_busy_loop(sock->sk)) {
		/* poll once if requested by the syscall */
		if (events & POLL_BUSY_LOOP)
			sk_busy_loop(sock->sk, 1);

		/* if this socket can poll_ll, tell the system call */
		flag = POLL_BUSY_LOOP;
	}

	return sock->ops->poll(file, sock, wait) | flag;
L
Linus Torvalds 已提交
1257 1258
}

1259
static int sock_mmap(struct file *file, struct vm_area_struct *vma)
L
Linus Torvalds 已提交
1260
{
1261
	struct socket *sock = file->private_data;
L
Linus Torvalds 已提交
1262 1263 1264 1265

	return sock->ops->mmap(file, sock, vma);
}

1266
static int sock_close(struct inode *inode, struct file *filp)
L
Linus Torvalds 已提交
1267
{
1268
	__sock_release(SOCKET_I(inode), inode);
L
Linus Torvalds 已提交
1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279
	return 0;
}

/*
 *	Update the socket async list
 *
 *	Fasync_list locking strategy.
 *
 *	1. fasync_list is modified only under process context socket lock
 *	   i.e. under semaphore.
 *	2. fasync_list is used under read_lock(&sk->sk_callback_lock)
1280
 *	   or under socket lock
L
Linus Torvalds 已提交
1281 1282 1283 1284
 */

static int sock_fasync(int fd, struct file *filp, int on)
{
1285 1286
	struct socket *sock = filp->private_data;
	struct sock *sk = sock->sk;
1287
	struct socket_wq *wq = &sock->wq;
L
Linus Torvalds 已提交
1288

1289
	if (sk == NULL)
L
Linus Torvalds 已提交
1290 1291 1292
		return -EINVAL;

	lock_sock(sk);
1293
	fasync_helper(fd, filp, on, &wq->fasync_list);
L
Linus Torvalds 已提交
1294

1295
	if (!wq->fasync_list)
1296 1297
		sock_reset_flag(sk, SOCK_FASYNC);
	else
E
Eric Dumazet 已提交
1298
		sock_set_flag(sk, SOCK_FASYNC);
L
Linus Torvalds 已提交
1299

1300
	release_sock(sk);
L
Linus Torvalds 已提交
1301 1302 1303
	return 0;
}

1304
/* This function may be called only under rcu_lock */
L
Linus Torvalds 已提交
1305

1306
int sock_wake_async(struct socket_wq *wq, int how, int band)
L
Linus Torvalds 已提交
1307
{
1308
	if (!wq || !wq->fasync_list)
L
Linus Torvalds 已提交
1309
		return -1;
1310

1311
	switch (how) {
1312
	case SOCK_WAKE_WAITD:
1313
		if (test_bit(SOCKWQ_ASYNC_WAITDATA, &wq->flags))
L
Linus Torvalds 已提交
1314 1315
			break;
		goto call_kill;
1316
	case SOCK_WAKE_SPACE:
1317
		if (!test_and_clear_bit(SOCKWQ_ASYNC_NOSPACE, &wq->flags))
L
Linus Torvalds 已提交
1318 1319
			break;
		/* fall through */
1320
	case SOCK_WAKE_IO:
1321
call_kill:
1322
		kill_fasync(&wq->fasync_list, SIGIO, band);
L
Linus Torvalds 已提交
1323
		break;
1324
	case SOCK_WAKE_URG:
1325
		kill_fasync(&wq->fasync_list, SIGURG, band);
L
Linus Torvalds 已提交
1326
	}
1327

L
Linus Torvalds 已提交
1328 1329
	return 0;
}
1330
EXPORT_SYMBOL(sock_wake_async);
L
Linus Torvalds 已提交
1331

1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346
/**
 *	__sock_create - creates a socket
 *	@net: net namespace
 *	@family: protocol family (AF_INET, ...)
 *	@type: communication type (SOCK_STREAM, ...)
 *	@protocol: protocol (0, ...)
 *	@res: new socket
 *	@kern: boolean for kernel space sockets
 *
 *	Creates a new socket and assigns it to @res, passing through LSM.
 *	Returns 0 or an error. On failure @res is set to %NULL. @kern must
 *	be set to true if the socket resides in kernel space.
 *	This function internally uses GFP_KERNEL.
 */

P
Pavel Emelyanov 已提交
1347
int __sock_create(struct net *net, int family, int type, int protocol,
1348
			 struct socket **res, int kern)
L
Linus Torvalds 已提交
1349 1350 1351
{
	int err;
	struct socket *sock;
1352
	const struct net_proto_family *pf;
L
Linus Torvalds 已提交
1353 1354

	/*
1355
	 *      Check protocol is in range
L
Linus Torvalds 已提交
1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367
	 */
	if (family < 0 || family >= NPROTO)
		return -EAFNOSUPPORT;
	if (type < 0 || type >= SOCK_MAX)
		return -EINVAL;

	/* Compatibility.

	   This uglymoron is moved from INET layer to here to avoid
	   deadlock in module load.
	 */
	if (family == PF_INET && type == SOCK_PACKET) {
1368 1369
		pr_info_once("%s uses obsolete (PF_INET,SOCK_PACKET)\n",
			     current->comm);
L
Linus Torvalds 已提交
1370 1371 1372 1373 1374 1375
		family = PF_PACKET;
	}

	err = security_socket_create(family, type, protocol, kern);
	if (err)
		return err;
1376

1377 1378 1379 1380 1381 1382 1383
	/*
	 *	Allocate the socket and allow the family to set things up. if
	 *	the protocol is 0, the family is instructed to select an appropriate
	 *	default.
	 */
	sock = sock_alloc();
	if (!sock) {
1384
		net_warn_ratelimited("socket: no more sockets\n");
1385 1386 1387 1388 1389 1390
		return -ENFILE;	/* Not exactly a match, but its the
				   closest posix thing */
	}

	sock->type = type;

1391
#ifdef CONFIG_MODULES
1392 1393 1394
	/* Attempt to load a protocol module if the find failed.
	 *
	 * 12/09/1996 Marcin: But! this makes REALLY only sense, if the user
L
Linus Torvalds 已提交
1395 1396 1397
	 * requested real, full-featured networking support upon configuration.
	 * Otherwise module support will break!
	 */
E
Eric Dumazet 已提交
1398
	if (rcu_access_pointer(net_families[family]) == NULL)
1399
		request_module("net-pf-%d", family);
L
Linus Torvalds 已提交
1400 1401
#endif

1402 1403 1404 1405 1406
	rcu_read_lock();
	pf = rcu_dereference(net_families[family]);
	err = -EAFNOSUPPORT;
	if (!pf)
		goto out_release;
L
Linus Torvalds 已提交
1407 1408 1409 1410 1411

	/*
	 * We will call the ->create function, that possibly is in a loadable
	 * module, so we have to bump that loadable module refcnt first.
	 */
1412
	if (!try_module_get(pf->owner))
L
Linus Torvalds 已提交
1413 1414
		goto out_release;

1415 1416 1417
	/* Now protected by module ref count */
	rcu_read_unlock();

1418
	err = pf->create(net, sock, protocol, kern);
1419
	if (err < 0)
L
Linus Torvalds 已提交
1420
		goto out_module_put;
1421

L
Linus Torvalds 已提交
1422 1423 1424 1425
	/*
	 * Now to bump the refcnt of the [loadable] module that owns this
	 * socket at sock_release time we decrement its refcnt.
	 */
1426 1427 1428
	if (!try_module_get(sock->ops->owner))
		goto out_module_busy;

L
Linus Torvalds 已提交
1429 1430 1431 1432
	/*
	 * Now that we're done with the ->create function, the [loadable]
	 * module can have its refcnt decremented
	 */
1433
	module_put(pf->owner);
V
Venkat Yekkirala 已提交
1434 1435
	err = security_socket_post_create(sock, family, type, protocol, kern);
	if (err)
1436
		goto out_sock_release;
1437
	*res = sock;
L
Linus Torvalds 已提交
1438

1439 1440 1441 1442
	return 0;

out_module_busy:
	err = -EAFNOSUPPORT;
L
Linus Torvalds 已提交
1443
out_module_put:
1444 1445 1446
	sock->ops = NULL;
	module_put(pf->owner);
out_sock_release:
L
Linus Torvalds 已提交
1447
	sock_release(sock);
1448 1449 1450 1451 1452
	return err;

out_release:
	rcu_read_unlock();
	goto out_sock_release;
L
Linus Torvalds 已提交
1453
}
P
Pavel Emelyanov 已提交
1454
EXPORT_SYMBOL(__sock_create);
L
Linus Torvalds 已提交
1455

1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466
/**
 *	sock_create - creates a socket
 *	@family: protocol family (AF_INET, ...)
 *	@type: communication type (SOCK_STREAM, ...)
 *	@protocol: protocol (0, ...)
 *	@res: new socket
 *
 *	A wrapper around __sock_create().
 *	Returns 0 or an error. This function internally uses GFP_KERNEL.
 */

L
Linus Torvalds 已提交
1467 1468
int sock_create(int family, int type, int protocol, struct socket **res)
{
1469
	return __sock_create(current->nsproxy->net_ns, family, type, protocol, res, 0);
L
Linus Torvalds 已提交
1470
}
1471
EXPORT_SYMBOL(sock_create);
L
Linus Torvalds 已提交
1472

1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 1484
/**
 *	sock_create_kern - creates a socket (kernel space)
 *	@net: net namespace
 *	@family: protocol family (AF_INET, ...)
 *	@type: communication type (SOCK_STREAM, ...)
 *	@protocol: protocol (0, ...)
 *	@res: new socket
 *
 *	A wrapper around __sock_create().
 *	Returns 0 or an error. This function internally uses GFP_KERNEL.
 */

1485
int sock_create_kern(struct net *net, int family, int type, int protocol, struct socket **res)
L
Linus Torvalds 已提交
1486
{
1487
	return __sock_create(net, family, type, protocol, res, 1);
L
Linus Torvalds 已提交
1488
}
1489
EXPORT_SYMBOL(sock_create_kern);
L
Linus Torvalds 已提交
1490

1491
int __sys_socket(int family, int type, int protocol)
L
Linus Torvalds 已提交
1492 1493 1494
{
	int retval;
	struct socket *sock;
1495 1496
	int flags;

1497 1498 1499 1500 1501 1502
	/* Check the SOCK_* constants for consistency.  */
	BUILD_BUG_ON(SOCK_CLOEXEC != O_CLOEXEC);
	BUILD_BUG_ON((SOCK_MAX | SOCK_TYPE_MASK) != SOCK_TYPE_MASK);
	BUILD_BUG_ON(SOCK_CLOEXEC & SOCK_TYPE_MASK);
	BUILD_BUG_ON(SOCK_NONBLOCK & SOCK_TYPE_MASK);

1503
	flags = type & ~SOCK_TYPE_MASK;
1504
	if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
1505 1506
		return -EINVAL;
	type &= SOCK_TYPE_MASK;
L
Linus Torvalds 已提交
1507

U
Ulrich Drepper 已提交
1508 1509 1510
	if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
		flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;

L
Linus Torvalds 已提交
1511 1512
	retval = sock_create(family, type, protocol, &sock);
	if (retval < 0)
1513
		return retval;
L
Linus Torvalds 已提交
1514

1515
	return sock_map_fd(sock, flags & (O_CLOEXEC | O_NONBLOCK));
L
Linus Torvalds 已提交
1516 1517
}

1518 1519 1520 1521 1522
SYSCALL_DEFINE3(socket, int, family, int, type, int, protocol)
{
	return __sys_socket(family, type, protocol);
}

L
Linus Torvalds 已提交
1523 1524 1525 1526
/*
 *	Create a pair of connected sockets.
 */

1527
int __sys_socketpair(int family, int type, int protocol, int __user *usockvec)
L
Linus Torvalds 已提交
1528 1529 1530
{
	struct socket *sock1, *sock2;
	int fd1, fd2, err;
A
Al Viro 已提交
1531
	struct file *newfile1, *newfile2;
1532 1533 1534
	int flags;

	flags = type & ~SOCK_TYPE_MASK;
1535
	if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
1536 1537
		return -EINVAL;
	type &= SOCK_TYPE_MASK;
L
Linus Torvalds 已提交
1538

U
Ulrich Drepper 已提交
1539 1540 1541
	if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
		flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;

A
Al Viro 已提交
1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 1557 1558 1559 1560 1561 1562 1563
	/*
	 * reserve descriptors and make sure we won't fail
	 * to return them to userland.
	 */
	fd1 = get_unused_fd_flags(flags);
	if (unlikely(fd1 < 0))
		return fd1;

	fd2 = get_unused_fd_flags(flags);
	if (unlikely(fd2 < 0)) {
		put_unused_fd(fd1);
		return fd2;
	}

	err = put_user(fd1, &usockvec[0]);
	if (err)
		goto out;

	err = put_user(fd2, &usockvec[1]);
	if (err)
		goto out;

L
Linus Torvalds 已提交
1564 1565 1566 1567 1568 1569
	/*
	 * Obtain the first socket and check if the underlying protocol
	 * supports the socketpair call.
	 */

	err = sock_create(family, type, protocol, &sock1);
A
Al Viro 已提交
1570
	if (unlikely(err < 0))
L
Linus Torvalds 已提交
1571 1572 1573
		goto out;

	err = sock_create(family, type, protocol, &sock2);
A
Al Viro 已提交
1574 1575 1576
	if (unlikely(err < 0)) {
		sock_release(sock1);
		goto out;
1577
	}
1578

D
David Herrmann 已提交
1579 1580 1581 1582 1583 1584 1585
	err = security_socket_socketpair(sock1, sock2);
	if (unlikely(err)) {
		sock_release(sock2);
		sock_release(sock1);
		goto out;
	}

A
Al Viro 已提交
1586 1587 1588 1589 1590
	err = sock1->ops->socketpair(sock1, sock2);
	if (unlikely(err < 0)) {
		sock_release(sock2);
		sock_release(sock1);
		goto out;
1591 1592
	}

1593
	newfile1 = sock_alloc_file(sock1, flags, NULL);
1594
	if (IS_ERR(newfile1)) {
1595
		err = PTR_ERR(newfile1);
A
Al Viro 已提交
1596 1597
		sock_release(sock2);
		goto out;
1598 1599
	}

1600
	newfile2 = sock_alloc_file(sock2, flags, NULL);
1601 1602
	if (IS_ERR(newfile2)) {
		err = PTR_ERR(newfile2);
A
Al Viro 已提交
1603 1604
		fput(newfile1);
		goto out;
A
Al Viro 已提交
1605 1606
	}

A
Al Viro 已提交
1607
	audit_fd_pair(fd1, fd2);
1608

A
Al Viro 已提交
1609 1610
	fd_install(fd1, newfile1);
	fd_install(fd2, newfile2);
1611
	return 0;
L
Linus Torvalds 已提交
1612

A
Al Viro 已提交
1613
out:
1614 1615
	put_unused_fd(fd2);
	put_unused_fd(fd1);
L
Linus Torvalds 已提交
1616 1617 1618
	return err;
}

1619 1620 1621 1622 1623 1624
SYSCALL_DEFINE4(socketpair, int, family, int, type, int, protocol,
		int __user *, usockvec)
{
	return __sys_socketpair(family, type, protocol, usockvec);
}

L
Linus Torvalds 已提交
1625 1626 1627 1628 1629 1630 1631 1632
/*
 *	Bind a name to a socket. Nothing much to do here since it's
 *	the protocol's responsibility to handle the local address.
 *
 *	We move the socket address to kernel space before we call
 *	the protocol layer (having also checked the address is ok).
 */

1633
int __sys_bind(int fd, struct sockaddr __user *umyaddr, int addrlen)
L
Linus Torvalds 已提交
1634 1635
{
	struct socket *sock;
1636
	struct sockaddr_storage address;
1637
	int err, fput_needed;
L
Linus Torvalds 已提交
1638

1639
	sock = sockfd_lookup_light(fd, &err, &fput_needed);
1640
	if (sock) {
1641
		err = move_addr_to_kernel(umyaddr, addrlen, &address);
1642
		if (!err) {
1643
			err = security_socket_bind(sock,
1644
						   (struct sockaddr *)&address,
1645
						   addrlen);
1646 1647
			if (!err)
				err = sock->ops->bind(sock,
1648
						      (struct sockaddr *)
1649
						      &address, addrlen);
L
Linus Torvalds 已提交
1650
		}
1651
		fput_light(sock->file, fput_needed);
1652
	}
L
Linus Torvalds 已提交
1653 1654 1655
	return err;
}

1656 1657 1658 1659 1660
SYSCALL_DEFINE3(bind, int, fd, struct sockaddr __user *, umyaddr, int, addrlen)
{
	return __sys_bind(fd, umyaddr, addrlen);
}

L
Linus Torvalds 已提交
1661 1662 1663 1664 1665 1666
/*
 *	Perform a listen. Basically, we allow the protocol to do anything
 *	necessary for a listen, and if that works, we mark the socket as
 *	ready for listening.
 */

1667
int __sys_listen(int fd, int backlog)
L
Linus Torvalds 已提交
1668 1669
{
	struct socket *sock;
1670
	int err, fput_needed;
1671
	int somaxconn;
1672 1673 1674

	sock = sockfd_lookup_light(fd, &err, &fput_needed);
	if (sock) {
1675
		somaxconn = sock_net(sock->sk)->core.sysctl_somaxconn;
1676
		if ((unsigned int)backlog > somaxconn)
1677
			backlog = somaxconn;
L
Linus Torvalds 已提交
1678 1679

		err = security_socket_listen(sock, backlog);
1680 1681
		if (!err)
			err = sock->ops->listen(sock, backlog);
L
Linus Torvalds 已提交
1682

1683
		fput_light(sock->file, fput_needed);
L
Linus Torvalds 已提交
1684 1685 1686 1687
	}
	return err;
}

1688 1689 1690 1691 1692
SYSCALL_DEFINE2(listen, int, fd, int, backlog)
{
	return __sys_listen(fd, backlog);
}

L
Linus Torvalds 已提交
1693 1694 1695 1696 1697 1698 1699 1700 1701
/*
 *	For accept, we attempt to create a new socket, set up the link
 *	with the client, wake up the client, then return the new
 *	connected fd. We collect the address of the connector in kernel
 *	space and move it to user at the very end. This is unclean because
 *	we open the socket then return an error.
 *
 *	1003.1g adds the ability to recvmsg() to query connection pending
 *	status to recvmsg. We need to add that support in a way thats
1702
 *	clean when we restructure accept also.
L
Linus Torvalds 已提交
1703 1704
 */

1705 1706
int __sys_accept4(int fd, struct sockaddr __user *upeer_sockaddr,
		  int __user *upeer_addrlen, int flags)
L
Linus Torvalds 已提交
1707 1708
{
	struct socket *sock, *newsock;
1709
	struct file *newfile;
1710
	int err, len, newfd, fput_needed;
1711
	struct sockaddr_storage address;
L
Linus Torvalds 已提交
1712

1713
	if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
U
Ulrich Drepper 已提交
1714 1715 1716 1717 1718
		return -EINVAL;

	if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
		flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;

1719
	sock = sockfd_lookup_light(fd, &err, &fput_needed);
L
Linus Torvalds 已提交
1720 1721 1722 1723
	if (!sock)
		goto out;

	err = -ENFILE;
1724 1725
	newsock = sock_alloc();
	if (!newsock)
L
Linus Torvalds 已提交
1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736
		goto out_put;

	newsock->type = sock->type;
	newsock->ops = sock->ops;

	/*
	 * We don't need try_module_get here, as the listening socket (sock)
	 * has the protocol module (sock->ops->owner) held.
	 */
	__module_get(newsock->ops->owner);

1737
	newfd = get_unused_fd_flags(flags);
1738 1739
	if (unlikely(newfd < 0)) {
		err = newfd;
1740 1741
		sock_release(newsock);
		goto out_put;
1742
	}
1743
	newfile = sock_alloc_file(newsock, flags, sock->sk->sk_prot_creator->name);
1744
	if (IS_ERR(newfile)) {
1745 1746 1747 1748
		err = PTR_ERR(newfile);
		put_unused_fd(newfd);
		goto out_put;
	}
1749

1750 1751
	err = security_socket_accept(sock, newsock);
	if (err)
1752
		goto out_fd;
1753

1754
	err = sock->ops->accept(sock, newsock, sock->file->f_flags, false);
L
Linus Torvalds 已提交
1755
	if (err < 0)
1756
		goto out_fd;
L
Linus Torvalds 已提交
1757 1758

	if (upeer_sockaddr) {
1759 1760 1761
		len = newsock->ops->getname(newsock,
					(struct sockaddr *)&address, 2);
		if (len < 0) {
L
Linus Torvalds 已提交
1762
			err = -ECONNABORTED;
1763
			goto out_fd;
L
Linus Torvalds 已提交
1764
		}
1765
		err = move_addr_to_user(&address,
1766
					len, upeer_sockaddr, upeer_addrlen);
L
Linus Torvalds 已提交
1767
		if (err < 0)
1768
			goto out_fd;
L
Linus Torvalds 已提交
1769 1770 1771 1772
	}

	/* File flags are not inherited via accept() unlike another OSes. */

1773 1774
	fd_install(newfd, newfile);
	err = newfd;
L
Linus Torvalds 已提交
1775 1776

out_put:
1777
	fput_light(sock->file, fput_needed);
L
Linus Torvalds 已提交
1778 1779
out:
	return err;
1780
out_fd:
1781
	fput(newfile);
1782
	put_unused_fd(newfd);
L
Linus Torvalds 已提交
1783 1784 1785
	goto out_put;
}

1786 1787 1788 1789 1790 1791
SYSCALL_DEFINE4(accept4, int, fd, struct sockaddr __user *, upeer_sockaddr,
		int __user *, upeer_addrlen, int, flags)
{
	return __sys_accept4(fd, upeer_sockaddr, upeer_addrlen, flags);
}

1792 1793
SYSCALL_DEFINE3(accept, int, fd, struct sockaddr __user *, upeer_sockaddr,
		int __user *, upeer_addrlen)
U
Ulrich Drepper 已提交
1794
{
1795
	return __sys_accept4(fd, upeer_sockaddr, upeer_addrlen, 0);
U
Ulrich Drepper 已提交
1796 1797
}

L
Linus Torvalds 已提交
1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808 1809
/*
 *	Attempt to connect to a socket with the server address.  The address
 *	is in user space so we verify it is OK and move it to kernel space.
 *
 *	For 1003.1g we need to add clean support for a bind to AF_UNSPEC to
 *	break bindings
 *
 *	NOTE: 1003.1g draft 6.3 is broken with respect to AX.25/NetROM and
 *	other SEQPACKET protocols that take time to connect() as it doesn't
 *	include the -EINPROGRESS status for such sockets.
 */

1810
int __sys_connect(int fd, struct sockaddr __user *uservaddr, int addrlen)
L
Linus Torvalds 已提交
1811 1812
{
	struct socket *sock;
1813
	struct sockaddr_storage address;
1814
	int err, fput_needed;
L
Linus Torvalds 已提交
1815

1816
	sock = sockfd_lookup_light(fd, &err, &fput_needed);
L
Linus Torvalds 已提交
1817 1818
	if (!sock)
		goto out;
1819
	err = move_addr_to_kernel(uservaddr, addrlen, &address);
L
Linus Torvalds 已提交
1820 1821 1822
	if (err < 0)
		goto out_put;

1823
	err =
1824
	    security_socket_connect(sock, (struct sockaddr *)&address, addrlen);
L
Linus Torvalds 已提交
1825 1826 1827
	if (err)
		goto out_put;

1828
	err = sock->ops->connect(sock, (struct sockaddr *)&address, addrlen,
L
Linus Torvalds 已提交
1829 1830
				 sock->file->f_flags);
out_put:
1831
	fput_light(sock->file, fput_needed);
L
Linus Torvalds 已提交
1832 1833 1834 1835
out:
	return err;
}

1836 1837 1838 1839 1840 1841
SYSCALL_DEFINE3(connect, int, fd, struct sockaddr __user *, uservaddr,
		int, addrlen)
{
	return __sys_connect(fd, uservaddr, addrlen);
}

L
Linus Torvalds 已提交
1842 1843 1844 1845 1846
/*
 *	Get the local address ('name') of a socket object. Move the obtained
 *	name to user space.
 */

1847 1848
int __sys_getsockname(int fd, struct sockaddr __user *usockaddr,
		      int __user *usockaddr_len)
L
Linus Torvalds 已提交
1849 1850
{
	struct socket *sock;
1851
	struct sockaddr_storage address;
1852
	int err, fput_needed;
1853

1854
	sock = sockfd_lookup_light(fd, &err, &fput_needed);
L
Linus Torvalds 已提交
1855 1856 1857 1858 1859 1860 1861
	if (!sock)
		goto out;

	err = security_socket_getsockname(sock);
	if (err)
		goto out_put;

1862 1863
	err = sock->ops->getname(sock, (struct sockaddr *)&address, 0);
	if (err < 0)
L
Linus Torvalds 已提交
1864
		goto out_put;
1865 1866
        /* "err" is actually length in this case */
	err = move_addr_to_user(&address, err, usockaddr, usockaddr_len);
L
Linus Torvalds 已提交
1867 1868

out_put:
1869
	fput_light(sock->file, fput_needed);
L
Linus Torvalds 已提交
1870 1871 1872 1873
out:
	return err;
}

1874 1875 1876 1877 1878 1879
SYSCALL_DEFINE3(getsockname, int, fd, struct sockaddr __user *, usockaddr,
		int __user *, usockaddr_len)
{
	return __sys_getsockname(fd, usockaddr, usockaddr_len);
}

L
Linus Torvalds 已提交
1880 1881 1882 1883 1884
/*
 *	Get the remote address ('name') of a socket object. Move the obtained
 *	name to user space.
 */

1885 1886
int __sys_getpeername(int fd, struct sockaddr __user *usockaddr,
		      int __user *usockaddr_len)
L
Linus Torvalds 已提交
1887 1888
{
	struct socket *sock;
1889
	struct sockaddr_storage address;
1890
	int err, fput_needed;
L
Linus Torvalds 已提交
1891

1892 1893
	sock = sockfd_lookup_light(fd, &err, &fput_needed);
	if (sock != NULL) {
L
Linus Torvalds 已提交
1894 1895
		err = security_socket_getpeername(sock);
		if (err) {
1896
			fput_light(sock->file, fput_needed);
L
Linus Torvalds 已提交
1897 1898 1899
			return err;
		}

1900 1901 1902 1903
		err = sock->ops->getname(sock, (struct sockaddr *)&address, 1);
		if (err >= 0)
			/* "err" is actually length in this case */
			err = move_addr_to_user(&address, err, usockaddr,
1904
						usockaddr_len);
1905
		fput_light(sock->file, fput_needed);
L
Linus Torvalds 已提交
1906 1907 1908 1909
	}
	return err;
}

1910 1911 1912 1913 1914 1915
SYSCALL_DEFINE3(getpeername, int, fd, struct sockaddr __user *, usockaddr,
		int __user *, usockaddr_len)
{
	return __sys_getpeername(fd, usockaddr, usockaddr_len);
}

L
Linus Torvalds 已提交
1916 1917 1918 1919 1920
/*
 *	Send a datagram to a given address. We move the address into kernel
 *	space and check the user space data area is readable before invoking
 *	the protocol.
 */
1921 1922
int __sys_sendto(int fd, void __user *buff, size_t len, unsigned int flags,
		 struct sockaddr __user *addr,  int addr_len)
L
Linus Torvalds 已提交
1923 1924
{
	struct socket *sock;
1925
	struct sockaddr_storage address;
L
Linus Torvalds 已提交
1926 1927 1928
	int err;
	struct msghdr msg;
	struct iovec iov;
1929 1930
	int fput_needed;

1931 1932 1933
	err = import_single_range(WRITE, buff, len, &iov, &msg.msg_iter);
	if (unlikely(err))
		return err;
1934 1935
	sock = sockfd_lookup_light(fd, &err, &fput_needed);
	if (!sock)
1936
		goto out;
1937

1938 1939 1940 1941
	msg.msg_name = NULL;
	msg.msg_control = NULL;
	msg.msg_controllen = 0;
	msg.msg_namelen = 0;
1942
	if (addr) {
1943
		err = move_addr_to_kernel(addr, addr_len, &address);
L
Linus Torvalds 已提交
1944 1945
		if (err < 0)
			goto out_put;
1946
		msg.msg_name = (struct sockaddr *)&address;
1947
		msg.msg_namelen = addr_len;
L
Linus Torvalds 已提交
1948 1949 1950 1951
	}
	if (sock->file->f_flags & O_NONBLOCK)
		flags |= MSG_DONTWAIT;
	msg.msg_flags = flags;
1952
	err = sock_sendmsg(sock, &msg);
L
Linus Torvalds 已提交
1953

1954
out_put:
1955
	fput_light(sock->file, fput_needed);
1956
out:
L
Linus Torvalds 已提交
1957 1958 1959
	return err;
}

1960 1961 1962 1963 1964 1965 1966
SYSCALL_DEFINE6(sendto, int, fd, void __user *, buff, size_t, len,
		unsigned int, flags, struct sockaddr __user *, addr,
		int, addr_len)
{
	return __sys_sendto(fd, buff, len, flags, addr, addr_len);
}

L
Linus Torvalds 已提交
1967
/*
1968
 *	Send a datagram down a socket.
L
Linus Torvalds 已提交
1969 1970
 */

1971
SYSCALL_DEFINE4(send, int, fd, void __user *, buff, size_t, len,
1972
		unsigned int, flags)
L
Linus Torvalds 已提交
1973
{
1974
	return __sys_sendto(fd, buff, len, flags, NULL, 0);
L
Linus Torvalds 已提交
1975 1976 1977
}

/*
1978
 *	Receive a frame from the socket and optionally record the address of the
L
Linus Torvalds 已提交
1979 1980 1981
 *	sender. We verify the buffers are writable and if needed move the
 *	sender address from kernel to user space.
 */
1982 1983
int __sys_recvfrom(int fd, void __user *ubuf, size_t size, unsigned int flags,
		   struct sockaddr __user *addr, int __user *addr_len)
L
Linus Torvalds 已提交
1984 1985 1986 1987
{
	struct socket *sock;
	struct iovec iov;
	struct msghdr msg;
1988
	struct sockaddr_storage address;
1989
	int err, err2;
1990 1991
	int fput_needed;

1992 1993 1994
	err = import_single_range(READ, ubuf, size, &iov, &msg.msg_iter);
	if (unlikely(err))
		return err;
1995
	sock = sockfd_lookup_light(fd, &err, &fput_needed);
L
Linus Torvalds 已提交
1996
	if (!sock)
1997
		goto out;
L
Linus Torvalds 已提交
1998

1999 2000
	msg.msg_control = NULL;
	msg.msg_controllen = 0;
2001 2002 2003 2004
	/* Save some cycles and don't copy the address if not needed */
	msg.msg_name = addr ? (struct sockaddr *)&address : NULL;
	/* We assume all kernel code knows the size of sockaddr_storage */
	msg.msg_namelen = 0;
2005
	msg.msg_iocb = NULL;
2006
	msg.msg_flags = 0;
L
Linus Torvalds 已提交
2007 2008
	if (sock->file->f_flags & O_NONBLOCK)
		flags |= MSG_DONTWAIT;
2009
	err = sock_recvmsg(sock, &msg, flags);
L
Linus Torvalds 已提交
2010

2011
	if (err >= 0 && addr != NULL) {
2012
		err2 = move_addr_to_user(&address,
2013
					 msg.msg_namelen, addr, addr_len);
2014 2015
		if (err2 < 0)
			err = err2;
L
Linus Torvalds 已提交
2016
	}
2017 2018

	fput_light(sock->file, fput_needed);
2019
out:
L
Linus Torvalds 已提交
2020 2021 2022
	return err;
}

2023 2024 2025 2026 2027 2028 2029
SYSCALL_DEFINE6(recvfrom, int, fd, void __user *, ubuf, size_t, size,
		unsigned int, flags, struct sockaddr __user *, addr,
		int __user *, addr_len)
{
	return __sys_recvfrom(fd, ubuf, size, flags, addr, addr_len);
}

L
Linus Torvalds 已提交
2030
/*
2031
 *	Receive a datagram from a socket.
L
Linus Torvalds 已提交
2032 2033
 */

2034 2035
SYSCALL_DEFINE4(recv, int, fd, void __user *, ubuf, size_t, size,
		unsigned int, flags)
L
Linus Torvalds 已提交
2036
{
2037
	return __sys_recvfrom(fd, ubuf, size, flags, NULL, NULL);
L
Linus Torvalds 已提交
2038 2039 2040 2041 2042 2043 2044
}

/*
 *	Set a socket option. Because we don't know the option lengths we have
 *	to pass the user mode parameter for the protocols to sort out.
 */

2045 2046
static int __sys_setsockopt(int fd, int level, int optname,
			    char __user *optval, int optlen)
L
Linus Torvalds 已提交
2047
{
2048 2049
	mm_segment_t oldfs = get_fs();
	char *kernel_optval = NULL;
2050
	int err, fput_needed;
L
Linus Torvalds 已提交
2051 2052 2053 2054
	struct socket *sock;

	if (optlen < 0)
		return -EINVAL;
2055 2056 2057 2058

	sock = sockfd_lookup_light(fd, &err, &fput_needed);
	if (sock != NULL) {
		err = security_socket_setsockopt(sock, level, optname);
2059 2060
		if (err)
			goto out_put;
L
Linus Torvalds 已提交
2061

2062 2063 2064 2065 2066 2067 2068 2069 2070 2071 2072 2073 2074 2075 2076 2077
		err = BPF_CGROUP_RUN_PROG_SETSOCKOPT(sock->sk, &level,
						     &optname, optval, &optlen,
						     &kernel_optval);

		if (err < 0) {
			goto out_put;
		} else if (err > 0) {
			err = 0;
			goto out_put;
		}

		if (kernel_optval) {
			set_fs(KERNEL_DS);
			optval = (char __user __force *)kernel_optval;
		}

L
Linus Torvalds 已提交
2078
		if (level == SOL_SOCKET)
2079 2080 2081
			err =
			    sock_setsockopt(sock, level, optname, optval,
					    optlen);
L
Linus Torvalds 已提交
2082
		else
2083 2084 2085
			err =
			    sock->ops->setsockopt(sock, level, optname, optval,
						  optlen);
2086 2087 2088 2089 2090

		if (kernel_optval) {
			set_fs(oldfs);
			kfree(kernel_optval);
		}
2091 2092
out_put:
		fput_light(sock->file, fput_needed);
L
Linus Torvalds 已提交
2093 2094 2095 2096
	}
	return err;
}

2097 2098 2099 2100 2101 2102
SYSCALL_DEFINE5(setsockopt, int, fd, int, level, int, optname,
		char __user *, optval, int, optlen)
{
	return __sys_setsockopt(fd, level, optname, optval, optlen);
}

L
Linus Torvalds 已提交
2103 2104 2105 2106 2107
/*
 *	Get a socket option. Because we don't know the option lengths we have
 *	to pass a user mode parameter for the protocols to sort out.
 */

2108 2109
static int __sys_getsockopt(int fd, int level, int optname,
			    char __user *optval, int __user *optlen)
L
Linus Torvalds 已提交
2110
{
2111
	int err, fput_needed;
L
Linus Torvalds 已提交
2112
	struct socket *sock;
2113
	int max_optlen;
L
Linus Torvalds 已提交
2114

2115 2116
	sock = sockfd_lookup_light(fd, &err, &fput_needed);
	if (sock != NULL) {
2117 2118 2119
		err = security_socket_getsockopt(sock, level, optname);
		if (err)
			goto out_put;
L
Linus Torvalds 已提交
2120

2121 2122
		max_optlen = BPF_CGROUP_GETSOCKOPT_MAX_OPTLEN(optlen);

L
Linus Torvalds 已提交
2123
		if (level == SOL_SOCKET)
2124 2125 2126
			err =
			    sock_getsockopt(sock, level, optname, optval,
					    optlen);
L
Linus Torvalds 已提交
2127
		else
2128 2129 2130
			err =
			    sock->ops->getsockopt(sock, level, optname, optval,
						  optlen);
2131 2132 2133 2134

		err = BPF_CGROUP_RUN_PROG_GETSOCKOPT(sock->sk, level, optname,
						     optval, optlen,
						     max_optlen, err);
2135 2136
out_put:
		fput_light(sock->file, fput_needed);
L
Linus Torvalds 已提交
2137 2138 2139 2140
	}
	return err;
}

2141 2142 2143 2144 2145 2146
SYSCALL_DEFINE5(getsockopt, int, fd, int, level, int, optname,
		char __user *, optval, int __user *, optlen)
{
	return __sys_getsockopt(fd, level, optname, optval, optlen);
}

L
Linus Torvalds 已提交
2147 2148 2149 2150
/*
 *	Shutdown a socket.
 */

2151
int __sys_shutdown(int fd, int how)
L
Linus Torvalds 已提交
2152
{
2153
	int err, fput_needed;
L
Linus Torvalds 已提交
2154 2155
	struct socket *sock;

2156 2157
	sock = sockfd_lookup_light(fd, &err, &fput_needed);
	if (sock != NULL) {
L
Linus Torvalds 已提交
2158
		err = security_socket_shutdown(sock, how);
2159 2160 2161
		if (!err)
			err = sock->ops->shutdown(sock, how);
		fput_light(sock->file, fput_needed);
L
Linus Torvalds 已提交
2162 2163 2164 2165
	}
	return err;
}

2166 2167 2168 2169 2170
SYSCALL_DEFINE2(shutdown, int, fd, int, how)
{
	return __sys_shutdown(fd, how);
}

2171
/* A couple of helpful macros for getting the address of the 32/64 bit
L
Linus Torvalds 已提交
2172 2173 2174 2175 2176 2177
 * fields which are the same type (int / unsigned) on our platforms.
 */
#define COMPAT_MSG(msg, member)	((MSG_CMSG_COMPAT & flags) ? &msg##_compat->member : &msg->member)
#define COMPAT_NAMELEN(msg)	COMPAT_MSG(msg, msg_namelen)
#define COMPAT_FLAGS(msg)	COMPAT_MSG(msg, msg_flags)

2178 2179 2180 2181 2182
struct used_address {
	struct sockaddr_storage name;
	unsigned int name_len;
};

2183 2184 2185 2186
static int copy_msghdr_from_user(struct msghdr *kmsg,
				 struct user_msghdr __user *umsg,
				 struct sockaddr __user **save_addr,
				 struct iovec **iov)
2187
{
2188
	struct user_msghdr msg;
2189 2190
	ssize_t err;

2191
	if (copy_from_user(&msg, umsg, sizeof(*umsg)))
2192
		return -EFAULT;
2193

2194
	kmsg->msg_control = (void __force *)msg.msg_control;
2195 2196 2197 2198 2199
	kmsg->msg_controllen = msg.msg_controllen;
	kmsg->msg_flags = msg.msg_flags;

	kmsg->msg_namelen = msg.msg_namelen;
	if (!msg.msg_name)
2200 2201
		kmsg->msg_namelen = 0;

2202 2203 2204
	if (kmsg->msg_namelen < 0)
		return -EINVAL;

2205
	if (kmsg->msg_namelen > sizeof(struct sockaddr_storage))
2206
		kmsg->msg_namelen = sizeof(struct sockaddr_storage);
2207 2208

	if (save_addr)
2209
		*save_addr = msg.msg_name;
2210

2211
	if (msg.msg_name && kmsg->msg_namelen) {
2212
		if (!save_addr) {
2213 2214
			err = move_addr_to_kernel(msg.msg_name,
						  kmsg->msg_namelen,
2215 2216 2217 2218 2219 2220 2221 2222 2223
						  kmsg->msg_name);
			if (err < 0)
				return err;
		}
	} else {
		kmsg->msg_name = NULL;
		kmsg->msg_namelen = 0;
	}

2224
	if (msg.msg_iovlen > UIO_MAXIOV)
2225 2226
		return -EMSGSIZE;

2227 2228
	kmsg->msg_iocb = NULL;

2229
	err = import_iovec(save_addr ? READ : WRITE,
2230
			    msg.msg_iov, msg.msg_iovlen,
2231
			    UIO_FASTIOV, iov, &kmsg->msg_iter);
2232
	return err < 0 ? err : 0;
2233 2234
}

2235
static int ___sys_sendmsg(struct socket *sock, struct user_msghdr __user *msg,
2236
			 struct msghdr *msg_sys, unsigned int flags,
2237 2238
			 struct used_address *used_address,
			 unsigned int allowed_msghdr_flags)
L
Linus Torvalds 已提交
2239
{
2240 2241
	struct compat_msghdr __user *msg_compat =
	    (struct compat_msghdr __user *)msg;
2242
	struct sockaddr_storage address;
L
Linus Torvalds 已提交
2243
	struct iovec iovstack[UIO_FASTIOV], *iov = iovstack;
2244
	unsigned char ctl[sizeof(struct cmsghdr) + 20]
2245
				__aligned(sizeof(__kernel_size_t));
2246
	/* 20 is size of ipv6_pktinfo */
L
Linus Torvalds 已提交
2247
	unsigned char *ctl_buf = ctl;
2248
	int ctl_len;
2249
	ssize_t err;
2250

2251
	msg_sys->msg_name = &address;
L
Linus Torvalds 已提交
2252

2253
	if (MSG_CMSG_COMPAT & flags)
2254
		err = get_compat_msghdr(msg_sys, msg_compat, NULL, &iov);
2255
	else
2256
		err = copy_msghdr_from_user(msg_sys, msg, NULL, &iov);
2257
	if (err < 0)
2258
		return err;
L
Linus Torvalds 已提交
2259 2260 2261

	err = -ENOBUFS;

2262
	if (msg_sys->msg_controllen > INT_MAX)
L
Linus Torvalds 已提交
2263
		goto out_freeiov;
2264
	flags |= (msg_sys->msg_flags & allowed_msghdr_flags);
2265
	ctl_len = msg_sys->msg_controllen;
L
Linus Torvalds 已提交
2266
	if ((MSG_CMSG_COMPAT & flags) && ctl_len) {
2267
		err =
2268
		    cmsghdr_from_user_compat_to_kern(msg_sys, sock->sk, ctl,
2269
						     sizeof(ctl));
L
Linus Torvalds 已提交
2270 2271
		if (err)
			goto out_freeiov;
2272 2273
		ctl_buf = msg_sys->msg_control;
		ctl_len = msg_sys->msg_controllen;
L
Linus Torvalds 已提交
2274
	} else if (ctl_len) {
2275 2276
		BUILD_BUG_ON(sizeof(struct cmsghdr) !=
			     CMSG_ALIGN(sizeof(struct cmsghdr)));
2277
		if (ctl_len > sizeof(ctl)) {
L
Linus Torvalds 已提交
2278
			ctl_buf = sock_kmalloc(sock->sk, ctl_len, GFP_KERNEL);
2279
			if (ctl_buf == NULL)
L
Linus Torvalds 已提交
2280 2281 2282 2283
				goto out_freeiov;
		}
		err = -EFAULT;
		/*
2284
		 * Careful! Before this, msg_sys->msg_control contains a user pointer.
L
Linus Torvalds 已提交
2285 2286 2287
		 * Afterwards, it will be a kernel pointer. Thus the compiler-assisted
		 * checking falls down on this.
		 */
2288
		if (copy_from_user(ctl_buf,
2289
				   (void __user __force *)msg_sys->msg_control,
2290
				   ctl_len))
L
Linus Torvalds 已提交
2291
			goto out_freectl;
2292
		msg_sys->msg_control = ctl_buf;
L
Linus Torvalds 已提交
2293
	}
2294
	msg_sys->msg_flags = flags;
L
Linus Torvalds 已提交
2295 2296

	if (sock->file->f_flags & O_NONBLOCK)
2297
		msg_sys->msg_flags |= MSG_DONTWAIT;
2298 2299 2300 2301 2302 2303
	/*
	 * If this is sendmmsg() and current destination address is same as
	 * previously succeeded address, omit asking LSM's decision.
	 * used_address->name_len is initialized to UINT_MAX so that the first
	 * destination address never matches.
	 */
2304 2305 2306
	if (used_address && msg_sys->msg_name &&
	    used_address->name_len == msg_sys->msg_namelen &&
	    !memcmp(&used_address->name, msg_sys->msg_name,
2307
		    used_address->name_len)) {
2308
		err = sock_sendmsg_nosec(sock, msg_sys);
2309 2310
		goto out_freectl;
	}
2311
	err = sock_sendmsg(sock, msg_sys);
2312 2313 2314 2315 2316 2317
	/*
	 * If this is sendmmsg() and sending to current destination address was
	 * successful, remember it.
	 */
	if (used_address && err >= 0) {
		used_address->name_len = msg_sys->msg_namelen;
2318 2319 2320
		if (msg_sys->msg_name)
			memcpy(&used_address->name, msg_sys->msg_name,
			       used_address->name_len);
2321
	}
L
Linus Torvalds 已提交
2322 2323

out_freectl:
2324
	if (ctl_buf != ctl)
L
Linus Torvalds 已提交
2325 2326
		sock_kfree_s(sock->sk, ctl_buf, ctl_len);
out_freeiov:
2327
	kfree(iov);
2328 2329 2330 2331 2332 2333
	return err;
}

/*
 *	BSD sendmsg interface
 */
J
Jens Axboe 已提交
2334 2335 2336 2337 2338 2339 2340
long __sys_sendmsg_sock(struct socket *sock, struct user_msghdr __user *msg,
			unsigned int flags)
{
	struct msghdr msg_sys;

	return ___sys_sendmsg(sock, msg, &msg_sys, flags, NULL, 0);
}
2341

2342 2343
long __sys_sendmsg(int fd, struct user_msghdr __user *msg, unsigned int flags,
		   bool forbid_cmsg_compat)
2344 2345 2346
{
	int fput_needed, err;
	struct msghdr msg_sys;
2347 2348
	struct socket *sock;

2349 2350 2351
	if (forbid_cmsg_compat && (flags & MSG_CMSG_COMPAT))
		return -EINVAL;

2352
	sock = sockfd_lookup_light(fd, &err, &fput_needed);
2353 2354 2355
	if (!sock)
		goto out;

2356
	err = ___sys_sendmsg(sock, msg, &msg_sys, flags, NULL, 0);
2357

2358
	fput_light(sock->file, fput_needed);
2359
out:
L
Linus Torvalds 已提交
2360 2361 2362
	return err;
}

2363
SYSCALL_DEFINE3(sendmsg, int, fd, struct user_msghdr __user *, msg, unsigned int, flags)
2364
{
2365
	return __sys_sendmsg(fd, msg, flags, true);
2366 2367
}

2368 2369 2370 2371 2372
/*
 *	Linux sendmmsg interface
 */

int __sys_sendmmsg(int fd, struct mmsghdr __user *mmsg, unsigned int vlen,
2373
		   unsigned int flags, bool forbid_cmsg_compat)
2374 2375 2376 2377 2378 2379
{
	int fput_needed, err, datagrams;
	struct socket *sock;
	struct mmsghdr __user *entry;
	struct compat_mmsghdr __user *compat_entry;
	struct msghdr msg_sys;
2380
	struct used_address used_address;
T
Tom Herbert 已提交
2381
	unsigned int oflags = flags;
2382

2383 2384 2385
	if (forbid_cmsg_compat && (flags & MSG_CMSG_COMPAT))
		return -EINVAL;

2386 2387
	if (vlen > UIO_MAXIOV)
		vlen = UIO_MAXIOV;
2388 2389 2390 2391 2392 2393 2394

	datagrams = 0;

	sock = sockfd_lookup_light(fd, &err, &fput_needed);
	if (!sock)
		return err;

2395
	used_address.name_len = UINT_MAX;
2396 2397
	entry = mmsg;
	compat_entry = (struct compat_mmsghdr __user *)mmsg;
2398
	err = 0;
T
Tom Herbert 已提交
2399
	flags |= MSG_BATCH;
2400 2401

	while (datagrams < vlen) {
T
Tom Herbert 已提交
2402 2403 2404
		if (datagrams == vlen - 1)
			flags = oflags;

2405
		if (MSG_CMSG_COMPAT & flags) {
2406
			err = ___sys_sendmsg(sock, (struct user_msghdr __user *)compat_entry,
2407
					     &msg_sys, flags, &used_address, MSG_EOR);
2408 2409 2410 2411 2412
			if (err < 0)
				break;
			err = __put_user(err, &compat_entry->msg_len);
			++compat_entry;
		} else {
2413
			err = ___sys_sendmsg(sock,
2414
					     (struct user_msghdr __user *)entry,
2415
					     &msg_sys, flags, &used_address, MSG_EOR);
2416 2417 2418 2419 2420 2421 2422 2423 2424
			if (err < 0)
				break;
			err = put_user(err, &entry->msg_len);
			++entry;
		}

		if (err)
			break;
		++datagrams;
2425 2426
		if (msg_data_left(&msg_sys))
			break;
2427
		cond_resched();
2428 2429 2430 2431
	}

	fput_light(sock->file, fput_needed);

2432 2433
	/* We only return an error if no datagrams were able to be sent */
	if (datagrams != 0)
2434 2435 2436 2437 2438 2439 2440 2441
		return datagrams;

	return err;
}

SYSCALL_DEFINE4(sendmmsg, int, fd, struct mmsghdr __user *, mmsg,
		unsigned int, vlen, unsigned int, flags)
{
2442
	return __sys_sendmmsg(fd, mmsg, vlen, flags, true);
2443 2444
}

2445
static int ___sys_recvmsg(struct socket *sock, struct user_msghdr __user *msg,
2446
			 struct msghdr *msg_sys, unsigned int flags, int nosec)
L
Linus Torvalds 已提交
2447
{
2448 2449
	struct compat_msghdr __user *msg_compat =
	    (struct compat_msghdr __user *)msg;
L
Linus Torvalds 已提交
2450
	struct iovec iovstack[UIO_FASTIOV];
2451
	struct iovec *iov = iovstack;
L
Linus Torvalds 已提交
2452
	unsigned long cmsg_ptr;
2453
	int len;
2454
	ssize_t err;
L
Linus Torvalds 已提交
2455 2456

	/* kernel mode address */
2457
	struct sockaddr_storage addr;
L
Linus Torvalds 已提交
2458 2459 2460

	/* user mode address pointers */
	struct sockaddr __user *uaddr;
2461
	int __user *uaddr_len = COMPAT_NAMELEN(msg);
2462

2463
	msg_sys->msg_name = &addr;
L
Linus Torvalds 已提交
2464

2465
	if (MSG_CMSG_COMPAT & flags)
2466
		err = get_compat_msghdr(msg_sys, msg_compat, &uaddr, &iov);
2467
	else
2468
		err = copy_msghdr_from_user(msg_sys, msg, &uaddr, &iov);
L
Linus Torvalds 已提交
2469
	if (err < 0)
2470
		return err;
L
Linus Torvalds 已提交
2471

2472 2473
	cmsg_ptr = (unsigned long)msg_sys->msg_control;
	msg_sys->msg_flags = flags & (MSG_CMSG_CLOEXEC|MSG_CMSG_COMPAT);
2474

2475 2476 2477
	/* We assume all kernel code knows the size of sockaddr_storage */
	msg_sys->msg_namelen = 0;

L
Linus Torvalds 已提交
2478 2479
	if (sock->file->f_flags & O_NONBLOCK)
		flags |= MSG_DONTWAIT;
2480
	err = (nosec ? sock_recvmsg_nosec : sock_recvmsg)(sock, msg_sys, flags);
L
Linus Torvalds 已提交
2481 2482 2483 2484 2485
	if (err < 0)
		goto out_freeiov;
	len = err;

	if (uaddr != NULL) {
2486
		err = move_addr_to_user(&addr,
2487
					msg_sys->msg_namelen, uaddr,
2488
					uaddr_len);
L
Linus Torvalds 已提交
2489 2490 2491
		if (err < 0)
			goto out_freeiov;
	}
2492
	err = __put_user((msg_sys->msg_flags & ~MSG_CMSG_COMPAT),
2493
			 COMPAT_FLAGS(msg));
L
Linus Torvalds 已提交
2494 2495 2496
	if (err)
		goto out_freeiov;
	if (MSG_CMSG_COMPAT & flags)
2497
		err = __put_user((unsigned long)msg_sys->msg_control - cmsg_ptr,
L
Linus Torvalds 已提交
2498 2499
				 &msg_compat->msg_controllen);
	else
2500
		err = __put_user((unsigned long)msg_sys->msg_control - cmsg_ptr,
L
Linus Torvalds 已提交
2501 2502 2503 2504 2505 2506
				 &msg->msg_controllen);
	if (err)
		goto out_freeiov;
	err = len;

out_freeiov:
2507
	kfree(iov);
2508 2509 2510 2511 2512 2513 2514
	return err;
}

/*
 *	BSD recvmsg interface
 */

J
Jens Axboe 已提交
2515 2516 2517 2518 2519 2520 2521 2522
long __sys_recvmsg_sock(struct socket *sock, struct user_msghdr __user *msg,
			unsigned int flags)
{
	struct msghdr msg_sys;

	return ___sys_recvmsg(sock, msg, &msg_sys, flags, 0);
}

2523 2524
long __sys_recvmsg(int fd, struct user_msghdr __user *msg, unsigned int flags,
		   bool forbid_cmsg_compat)
2525 2526 2527
{
	int fput_needed, err;
	struct msghdr msg_sys;
2528 2529
	struct socket *sock;

2530 2531 2532
	if (forbid_cmsg_compat && (flags & MSG_CMSG_COMPAT))
		return -EINVAL;

2533
	sock = sockfd_lookup_light(fd, &err, &fput_needed);
2534 2535 2536
	if (!sock)
		goto out;

2537
	err = ___sys_recvmsg(sock, msg, &msg_sys, flags, 0);
2538

2539
	fput_light(sock->file, fput_needed);
L
Linus Torvalds 已提交
2540 2541 2542 2543
out:
	return err;
}

2544
SYSCALL_DEFINE3(recvmsg, int, fd, struct user_msghdr __user *, msg,
2545 2546
		unsigned int, flags)
{
2547
	return __sys_recvmsg(fd, msg, flags, true);
2548 2549
}

2550 2551 2552 2553
/*
 *     Linux recvmmsg interface
 */

2554 2555 2556
static int do_recvmmsg(int fd, struct mmsghdr __user *mmsg,
			  unsigned int vlen, unsigned int flags,
			  struct timespec64 *timeout)
2557 2558 2559 2560
{
	int fput_needed, err, datagrams;
	struct socket *sock;
	struct mmsghdr __user *entry;
2561
	struct compat_mmsghdr __user *compat_entry;
2562
	struct msghdr msg_sys;
2563 2564
	struct timespec64 end_time;
	struct timespec64 timeout64;
2565 2566 2567 2568 2569 2570 2571 2572 2573 2574 2575 2576

	if (timeout &&
	    poll_select_set_timeout(&end_time, timeout->tv_sec,
				    timeout->tv_nsec))
		return -EINVAL;

	datagrams = 0;

	sock = sockfd_lookup_light(fd, &err, &fput_needed);
	if (!sock)
		return err;

2577 2578 2579 2580 2581 2582
	if (likely(!(flags & MSG_ERRQUEUE))) {
		err = sock_error(sock->sk);
		if (err) {
			datagrams = err;
			goto out_put;
		}
2583
	}
2584 2585

	entry = mmsg;
2586
	compat_entry = (struct compat_mmsghdr __user *)mmsg;
2587 2588 2589 2590 2591

	while (datagrams < vlen) {
		/*
		 * No need to ask LSM for more than the first datagram.
		 */
2592
		if (MSG_CMSG_COMPAT & flags) {
2593
			err = ___sys_recvmsg(sock, (struct user_msghdr __user *)compat_entry,
2594 2595
					     &msg_sys, flags & ~MSG_WAITFORONE,
					     datagrams);
2596 2597 2598 2599 2600
			if (err < 0)
				break;
			err = __put_user(err, &compat_entry->msg_len);
			++compat_entry;
		} else {
2601
			err = ___sys_recvmsg(sock,
2602
					     (struct user_msghdr __user *)entry,
2603 2604
					     &msg_sys, flags & ~MSG_WAITFORONE,
					     datagrams);
2605 2606 2607 2608 2609 2610
			if (err < 0)
				break;
			err = put_user(err, &entry->msg_len);
			++entry;
		}

2611 2612 2613 2614
		if (err)
			break;
		++datagrams;

2615 2616 2617 2618
		/* MSG_WAITFORONE turns on MSG_DONTWAIT after one packet */
		if (flags & MSG_WAITFORONE)
			flags |= MSG_DONTWAIT;

2619
		if (timeout) {
2620
			ktime_get_ts64(&timeout64);
2621
			*timeout = timespec64_sub(end_time, timeout64);
2622 2623 2624 2625 2626 2627 2628 2629 2630 2631 2632 2633 2634
			if (timeout->tv_sec < 0) {
				timeout->tv_sec = timeout->tv_nsec = 0;
				break;
			}

			/* Timeout, return less than vlen datagrams */
			if (timeout->tv_nsec == 0 && timeout->tv_sec == 0)
				break;
		}

		/* Out of band data, return right away */
		if (msg_sys.msg_flags & MSG_OOB)
			break;
2635
		cond_resched();
2636 2637 2638
	}

	if (err == 0)
2639 2640 2641 2642 2643 2644
		goto out_put;

	if (datagrams == 0) {
		datagrams = err;
		goto out_put;
	}
2645

2646 2647 2648 2649 2650
	/*
	 * We may return less entries than requested (vlen) if the
	 * sock is non block and there aren't enough datagrams...
	 */
	if (err != -EAGAIN) {
2651
		/*
2652 2653 2654 2655
		 * ... or  if recvmsg returns an error after we
		 * received some datagrams, where we record the
		 * error to return on the next call or if the
		 * app asks about it using getsockopt(SO_ERROR).
2656
		 */
2657
		sock->sk->sk_err = -err;
2658
	}
2659 2660
out_put:
	fput_light(sock->file, fput_needed);
2661

2662
	return datagrams;
2663 2664
}

2665 2666 2667 2668
int __sys_recvmmsg(int fd, struct mmsghdr __user *mmsg,
		   unsigned int vlen, unsigned int flags,
		   struct __kernel_timespec __user *timeout,
		   struct old_timespec32 __user *timeout32)
2669 2670
{
	int datagrams;
2671
	struct timespec64 timeout_sys;
2672

2673 2674
	if (timeout && get_timespec64(&timeout_sys, timeout))
		return -EFAULT;
2675

2676
	if (timeout32 && get_old_timespec32(&timeout_sys, timeout32))
2677 2678
		return -EFAULT;

2679 2680 2681 2682
	if (!timeout && !timeout32)
		return do_recvmmsg(fd, mmsg, vlen, flags, NULL);

	datagrams = do_recvmmsg(fd, mmsg, vlen, flags, &timeout_sys);
2683

2684 2685 2686 2687 2688 2689 2690
	if (datagrams <= 0)
		return datagrams;

	if (timeout && put_timespec64(&timeout_sys, timeout))
		datagrams = -EFAULT;

	if (timeout32 && put_old_timespec32(&timeout_sys, timeout32))
2691 2692 2693 2694 2695
		datagrams = -EFAULT;

	return datagrams;
}

2696 2697
SYSCALL_DEFINE5(recvmmsg, int, fd, struct mmsghdr __user *, mmsg,
		unsigned int, vlen, unsigned int, flags,
2698
		struct __kernel_timespec __user *, timeout)
2699
{
2700 2701 2702 2703 2704 2705 2706 2707 2708 2709 2710 2711 2712 2713 2714
	if (flags & MSG_CMSG_COMPAT)
		return -EINVAL;

	return __sys_recvmmsg(fd, mmsg, vlen, flags, timeout, NULL);
}

#ifdef CONFIG_COMPAT_32BIT_TIME
SYSCALL_DEFINE5(recvmmsg_time32, int, fd, struct mmsghdr __user *, mmsg,
		unsigned int, vlen, unsigned int, flags,
		struct old_timespec32 __user *, timeout)
{
	if (flags & MSG_CMSG_COMPAT)
		return -EINVAL;

	return __sys_recvmmsg(fd, mmsg, vlen, flags, NULL, timeout);
2715
}
2716
#endif
2717

2718
#ifdef __ARCH_WANT_SYS_SOCKETCALL
L
Linus Torvalds 已提交
2719 2720
/* Argument list sizes for sys_socketcall */
#define AL(x) ((x) * sizeof(unsigned long))
2721
static const unsigned char nargs[21] = {
2722 2723 2724
	AL(0), AL(3), AL(3), AL(3), AL(2), AL(3),
	AL(3), AL(3), AL(4), AL(4), AL(4), AL(6),
	AL(6), AL(2), AL(5), AL(5), AL(3), AL(3),
2725
	AL(4), AL(5), AL(4)
2726 2727
};

L
Linus Torvalds 已提交
2728 2729 2730
#undef AL

/*
2731
 *	System call vectors.
L
Linus Torvalds 已提交
2732 2733 2734
 *
 *	Argument checking cleaned up. Saved 20% in size.
 *  This function doesn't need to set the kernel lock because
2735
 *  it is set by the callees.
L
Linus Torvalds 已提交
2736 2737
 */

2738
SYSCALL_DEFINE2(socketcall, int, call, unsigned long __user *, args)
L
Linus Torvalds 已提交
2739
{
2740
	unsigned long a[AUDITSC_ARGS];
2741
	unsigned long a0, a1;
L
Linus Torvalds 已提交
2742
	int err;
2743
	unsigned int len;
L
Linus Torvalds 已提交
2744

2745
	if (call < 1 || call > SYS_SENDMMSG)
L
Linus Torvalds 已提交
2746
		return -EINVAL;
2747
	call = array_index_nospec(call, SYS_SENDMMSG + 1);
L
Linus Torvalds 已提交
2748

2749 2750 2751 2752
	len = nargs[call];
	if (len > sizeof(a))
		return -EINVAL;

L
Linus Torvalds 已提交
2753
	/* copy_from_user should be SMP safe. */
2754
	if (copy_from_user(a, args, len))
L
Linus Torvalds 已提交
2755
		return -EFAULT;
2756

2757 2758 2759
	err = audit_socketcall(nargs[call] / sizeof(unsigned long), a);
	if (err)
		return err;
2760

2761 2762 2763 2764 2765
	a0 = a[0];
	a1 = a[1];

	switch (call) {
	case SYS_SOCKET:
2766
		err = __sys_socket(a0, a1, a[2]);
2767 2768
		break;
	case SYS_BIND:
2769
		err = __sys_bind(a0, (struct sockaddr __user *)a1, a[2]);
2770 2771
		break;
	case SYS_CONNECT:
2772
		err = __sys_connect(a0, (struct sockaddr __user *)a1, a[2]);
2773 2774
		break;
	case SYS_LISTEN:
2775
		err = __sys_listen(a0, a1);
2776 2777
		break;
	case SYS_ACCEPT:
2778 2779
		err = __sys_accept4(a0, (struct sockaddr __user *)a1,
				    (int __user *)a[2], 0);
2780 2781 2782
		break;
	case SYS_GETSOCKNAME:
		err =
2783 2784
		    __sys_getsockname(a0, (struct sockaddr __user *)a1,
				      (int __user *)a[2]);
2785 2786 2787
		break;
	case SYS_GETPEERNAME:
		err =
2788 2789
		    __sys_getpeername(a0, (struct sockaddr __user *)a1,
				      (int __user *)a[2]);
2790 2791
		break;
	case SYS_SOCKETPAIR:
2792
		err = __sys_socketpair(a0, a1, a[2], (int __user *)a[3]);
2793 2794
		break;
	case SYS_SEND:
2795 2796
		err = __sys_sendto(a0, (void __user *)a1, a[2], a[3],
				   NULL, 0);
2797 2798
		break;
	case SYS_SENDTO:
2799 2800
		err = __sys_sendto(a0, (void __user *)a1, a[2], a[3],
				   (struct sockaddr __user *)a[4], a[5]);
2801 2802
		break;
	case SYS_RECV:
2803 2804
		err = __sys_recvfrom(a0, (void __user *)a1, a[2], a[3],
				     NULL, NULL);
2805 2806
		break;
	case SYS_RECVFROM:
2807 2808 2809
		err = __sys_recvfrom(a0, (void __user *)a1, a[2], a[3],
				     (struct sockaddr __user *)a[4],
				     (int __user *)a[5]);
2810 2811
		break;
	case SYS_SHUTDOWN:
2812
		err = __sys_shutdown(a0, a1);
2813 2814
		break;
	case SYS_SETSOCKOPT:
2815 2816
		err = __sys_setsockopt(a0, a1, a[2], (char __user *)a[3],
				       a[4]);
2817 2818 2819
		break;
	case SYS_GETSOCKOPT:
		err =
2820 2821
		    __sys_getsockopt(a0, a1, a[2], (char __user *)a[3],
				     (int __user *)a[4]);
2822 2823
		break;
	case SYS_SENDMSG:
2824 2825
		err = __sys_sendmsg(a0, (struct user_msghdr __user *)a1,
				    a[2], true);
2826
		break;
2827
	case SYS_SENDMMSG:
2828 2829
		err = __sys_sendmmsg(a0, (struct mmsghdr __user *)a1, a[2],
				     a[3], true);
2830
		break;
2831
	case SYS_RECVMSG:
2832 2833
		err = __sys_recvmsg(a0, (struct user_msghdr __user *)a1,
				    a[2], true);
2834
		break;
2835
	case SYS_RECVMMSG:
2836 2837 2838 2839 2840 2841 2842 2843 2844
		if (IS_ENABLED(CONFIG_64BIT) || !IS_ENABLED(CONFIG_64BIT_TIME))
			err = __sys_recvmmsg(a0, (struct mmsghdr __user *)a1,
					     a[2], a[3],
					     (struct __kernel_timespec __user *)a[4],
					     NULL);
		else
			err = __sys_recvmmsg(a0, (struct mmsghdr __user *)a1,
					     a[2], a[3], NULL,
					     (struct old_timespec32 __user *)a[4]);
2845
		break;
U
Ulrich Drepper 已提交
2846
	case SYS_ACCEPT4:
2847 2848
		err = __sys_accept4(a0, (struct sockaddr __user *)a1,
				    (int __user *)a[2], a[3]);
U
Ulrich Drepper 已提交
2849
		break;
2850 2851 2852
	default:
		err = -EINVAL;
		break;
L
Linus Torvalds 已提交
2853 2854 2855 2856
	}
	return err;
}

2857
#endif				/* __ARCH_WANT_SYS_SOCKETCALL */
L
Linus Torvalds 已提交
2858

2859 2860 2861 2862
/**
 *	sock_register - add a socket protocol handler
 *	@ops: description of protocol
 *
L
Linus Torvalds 已提交
2863 2864
 *	This function is called by a protocol handler that wants to
 *	advertise its address family, and have it linked into the
2865
 *	socket interface. The value ops->family corresponds to the
2866
 *	socket system call protocol family.
L
Linus Torvalds 已提交
2867
 */
2868
int sock_register(const struct net_proto_family *ops)
L
Linus Torvalds 已提交
2869 2870 2871 2872
{
	int err;

	if (ops->family >= NPROTO) {
2873
		pr_crit("protocol %d >= NPROTO(%d)\n", ops->family, NPROTO);
L
Linus Torvalds 已提交
2874 2875
		return -ENOBUFS;
	}
2876 2877

	spin_lock(&net_family_lock);
E
Eric Dumazet 已提交
2878 2879
	if (rcu_dereference_protected(net_families[ops->family],
				      lockdep_is_held(&net_family_lock)))
2880 2881
		err = -EEXIST;
	else {
2882
		rcu_assign_pointer(net_families[ops->family], ops);
L
Linus Torvalds 已提交
2883 2884
		err = 0;
	}
2885 2886
	spin_unlock(&net_family_lock);

2887
	pr_info("NET: Registered protocol family %d\n", ops->family);
L
Linus Torvalds 已提交
2888 2889
	return err;
}
2890
EXPORT_SYMBOL(sock_register);
L
Linus Torvalds 已提交
2891

2892 2893 2894 2895
/**
 *	sock_unregister - remove a protocol handler
 *	@family: protocol family to remove
 *
L
Linus Torvalds 已提交
2896 2897
 *	This function is called by a protocol handler that wants to
 *	remove its address family, and have it unlinked from the
2898 2899 2900 2901 2902 2903
 *	new socket creation.
 *
 *	If protocol handler is a module, then it can use module reference
 *	counts to protect against new references. If protocol handler is not
 *	a module then it needs to provide its own protection in
 *	the ops->create routine.
L
Linus Torvalds 已提交
2904
 */
2905
void sock_unregister(int family)
L
Linus Torvalds 已提交
2906
{
2907
	BUG_ON(family < 0 || family >= NPROTO);
L
Linus Torvalds 已提交
2908

2909
	spin_lock(&net_family_lock);
2910
	RCU_INIT_POINTER(net_families[family], NULL);
2911 2912 2913 2914
	spin_unlock(&net_family_lock);

	synchronize_rcu();

2915
	pr_info("NET: Unregistered protocol family %d\n", family);
L
Linus Torvalds 已提交
2916
}
2917
EXPORT_SYMBOL(sock_unregister);
L
Linus Torvalds 已提交
2918

2919 2920
bool sock_is_registered(int family)
{
2921
	return family < NPROTO && rcu_access_pointer(net_families[family]);
2922 2923
}

2924
static int __init sock_init(void)
L
Linus Torvalds 已提交
2925
{
N
Nick Piggin 已提交
2926
	int err;
2927 2928 2929 2930 2931 2932
	/*
	 *      Initialize the network sysctl infrastructure.
	 */
	err = net_sysctl_init();
	if (err)
		goto out;
N
Nick Piggin 已提交
2933

L
Linus Torvalds 已提交
2934
	/*
2935
	 *      Initialize skbuff SLAB cache
L
Linus Torvalds 已提交
2936 2937 2938 2939
	 */
	skb_init();

	/*
2940
	 *      Initialize the protocols module.
L
Linus Torvalds 已提交
2941 2942 2943
	 */

	init_inodecache();
N
Nick Piggin 已提交
2944 2945 2946 2947

	err = register_filesystem(&sock_fs_type);
	if (err)
		goto out_fs;
L
Linus Torvalds 已提交
2948
	sock_mnt = kern_mount(&sock_fs_type);
N
Nick Piggin 已提交
2949 2950 2951 2952
	if (IS_ERR(sock_mnt)) {
		err = PTR_ERR(sock_mnt);
		goto out_mount;
	}
2953 2954

	/* The real protocol initialization is performed in later initcalls.
L
Linus Torvalds 已提交
2955 2956 2957
	 */

#ifdef CONFIG_NETFILTER
2958 2959 2960
	err = netfilter_init();
	if (err)
		goto out;
L
Linus Torvalds 已提交
2961
#endif
2962

2963
	ptp_classifier_init();
2964

N
Nick Piggin 已提交
2965 2966 2967 2968 2969 2970 2971
out:
	return err;

out_mount:
	unregister_filesystem(&sock_fs_type);
out_fs:
	goto out;
L
Linus Torvalds 已提交
2972 2973
}

2974 2975
core_initcall(sock_init);	/* early initcall */

L
Linus Torvalds 已提交
2976 2977 2978
#ifdef CONFIG_PROC_FS
void socket_seq_show(struct seq_file *seq)
{
2979 2980
	seq_printf(seq, "sockets: used %d\n",
		   sock_inuse_get(seq->private));
L
Linus Torvalds 已提交
2981
}
2982
#endif				/* CONFIG_PROC_FS */
L
Linus Torvalds 已提交
2983

2984
#ifdef CONFIG_COMPAT
2985
static int compat_dev_ifconf(struct net *net, struct compat_ifconf __user *uifc32)
2986
{
2987
	struct compat_ifconf ifc32;
2988 2989 2990
	struct ifconf ifc;
	int err;

2991
	if (copy_from_user(&ifc32, uifc32, sizeof(struct compat_ifconf)))
2992 2993
		return -EFAULT;

2994 2995
	ifc.ifc_len = ifc32.ifc_len;
	ifc.ifc_req = compat_ptr(ifc32.ifcbuf);
2996

2997 2998 2999
	rtnl_lock();
	err = dev_ifconf(net, &ifc, sizeof(struct compat_ifreq));
	rtnl_unlock();
3000 3001 3002
	if (err)
		return err;

3003
	ifc32.ifc_len = ifc.ifc_len;
3004
	if (copy_to_user(uifc32, &ifc32, sizeof(struct compat_ifconf)))
3005 3006 3007 3008 3009
		return -EFAULT;

	return 0;
}

3010
static int ethtool_ioctl(struct net *net, struct compat_ifreq __user *ifr32)
3011
{
3012 3013
	struct compat_ethtool_rxnfc __user *compat_rxnfc;
	bool convert_in = false, convert_out = false;
3014 3015 3016
	size_t buf_size = 0;
	struct ethtool_rxnfc __user *rxnfc = NULL;
	struct ifreq ifr;
3017 3018
	u32 rule_cnt = 0, actual_rule_cnt;
	u32 ethcmd;
3019
	u32 data;
3020
	int ret;
3021

3022 3023
	if (get_user(data, &ifr32->ifr_ifru.ifru_data))
		return -EFAULT;
3024

3025 3026 3027
	compat_rxnfc = compat_ptr(data);

	if (get_user(ethcmd, &compat_rxnfc->cmd))
3028 3029
		return -EFAULT;

3030 3031 3032 3033 3034 3035 3036 3037 3038 3039 3040 3041 3042 3043 3044 3045 3046
	/* Most ethtool structures are defined without padding.
	 * Unfortunately struct ethtool_rxnfc is an exception.
	 */
	switch (ethcmd) {
	default:
		break;
	case ETHTOOL_GRXCLSRLALL:
		/* Buffer size is variable */
		if (get_user(rule_cnt, &compat_rxnfc->rule_cnt))
			return -EFAULT;
		if (rule_cnt > KMALLOC_MAX_SIZE / sizeof(u32))
			return -ENOMEM;
		buf_size += rule_cnt * sizeof(u32);
		/* fall through */
	case ETHTOOL_GRXRINGS:
	case ETHTOOL_GRXCLSRLCNT:
	case ETHTOOL_GRXCLSRULE:
3047
	case ETHTOOL_SRXCLSRLINS:
3048 3049 3050 3051 3052
		convert_out = true;
		/* fall through */
	case ETHTOOL_SRXCLSRLDEL:
		buf_size += sizeof(struct ethtool_rxnfc);
		convert_in = true;
3053
		rxnfc = compat_alloc_user_space(buf_size);
3054 3055 3056
		break;
	}

3057
	if (copy_from_user(&ifr.ifr_name, &ifr32->ifr_name, IFNAMSIZ))
3058 3059
		return -EFAULT;

3060
	ifr.ifr_data = convert_in ? rxnfc : (void __user *)compat_rxnfc;
3061

3062
	if (convert_in) {
3063
		/* We expect there to be holes between fs.m_ext and
3064 3065
		 * fs.ring_cookie and at the end of fs, but nowhere else.
		 */
3066 3067 3068 3069
		BUILD_BUG_ON(offsetof(struct compat_ethtool_rxnfc, fs.m_ext) +
			     sizeof(compat_rxnfc->fs.m_ext) !=
			     offsetof(struct ethtool_rxnfc, fs.m_ext) +
			     sizeof(rxnfc->fs.m_ext));
3070 3071 3072 3073 3074 3075 3076
		BUILD_BUG_ON(
			offsetof(struct compat_ethtool_rxnfc, fs.location) -
			offsetof(struct compat_ethtool_rxnfc, fs.ring_cookie) !=
			offsetof(struct ethtool_rxnfc, fs.location) -
			offsetof(struct ethtool_rxnfc, fs.ring_cookie));

		if (copy_in_user(rxnfc, compat_rxnfc,
S
Stephen Hemminger 已提交
3077 3078
				 (void __user *)(&rxnfc->fs.m_ext + 1) -
				 (void __user *)rxnfc) ||
3079 3080
		    copy_in_user(&rxnfc->fs.ring_cookie,
				 &compat_rxnfc->fs.ring_cookie,
S
Stephen Hemminger 已提交
3081
				 (void __user *)(&rxnfc->fs.location + 1) -
W
Wenwen Wang 已提交
3082 3083 3084 3085 3086 3087 3088 3089
				 (void __user *)&rxnfc->fs.ring_cookie))
			return -EFAULT;
		if (ethcmd == ETHTOOL_GRXCLSRLALL) {
			if (put_user(rule_cnt, &rxnfc->rule_cnt))
				return -EFAULT;
		} else if (copy_in_user(&rxnfc->rule_cnt,
					&compat_rxnfc->rule_cnt,
					sizeof(rxnfc->rule_cnt)))
3090 3091 3092
			return -EFAULT;
	}

3093
	ret = dev_ioctl(net, SIOCETHTOOL, &ifr, NULL);
3094 3095 3096 3097 3098
	if (ret)
		return ret;

	if (convert_out) {
		if (copy_in_user(compat_rxnfc, rxnfc,
S
Stephen Hemminger 已提交
3099 3100
				 (const void __user *)(&rxnfc->fs.m_ext + 1) -
				 (const void __user *)rxnfc) ||
3101 3102
		    copy_in_user(&compat_rxnfc->fs.ring_cookie,
				 &rxnfc->fs.ring_cookie,
S
Stephen Hemminger 已提交
3103 3104
				 (const void __user *)(&rxnfc->fs.location + 1) -
				 (const void __user *)&rxnfc->fs.ring_cookie) ||
3105 3106 3107 3108 3109 3110 3111 3112 3113 3114 3115 3116 3117 3118 3119 3120 3121 3122 3123 3124 3125 3126 3127 3128 3129
		    copy_in_user(&compat_rxnfc->rule_cnt, &rxnfc->rule_cnt,
				 sizeof(rxnfc->rule_cnt)))
			return -EFAULT;

		if (ethcmd == ETHTOOL_GRXCLSRLALL) {
			/* As an optimisation, we only copy the actual
			 * number of rules that the underlying
			 * function returned.  Since Mallory might
			 * change the rule count in user memory, we
			 * check that it is less than the rule count
			 * originally given (as the user buffer size),
			 * which has been range-checked.
			 */
			if (get_user(actual_rule_cnt, &rxnfc->rule_cnt))
				return -EFAULT;
			if (actual_rule_cnt < rule_cnt)
				rule_cnt = actual_rule_cnt;
			if (copy_in_user(&compat_rxnfc->rule_locs[0],
					 &rxnfc->rule_locs[0],
					 rule_cnt * sizeof(u32)))
				return -EFAULT;
		}
	}

	return 0;
3130 3131
}

3132 3133 3134
static int compat_siocwandev(struct net *net, struct compat_ifreq __user *uifr32)
{
	compat_uptr_t uptr32;
3135 3136 3137
	struct ifreq ifr;
	void __user *saved;
	int err;
3138

3139
	if (copy_from_user(&ifr, uifr32, sizeof(struct compat_ifreq)))
3140 3141 3142 3143 3144
		return -EFAULT;

	if (get_user(uptr32, &uifr32->ifr_settings.ifs_ifsu))
		return -EFAULT;

3145 3146
	saved = ifr.ifr_settings.ifs_ifsu.raw_hdlc;
	ifr.ifr_settings.ifs_ifsu.raw_hdlc = compat_ptr(uptr32);
3147

3148 3149 3150 3151 3152
	err = dev_ioctl(net, SIOCWANDEV, &ifr, NULL);
	if (!err) {
		ifr.ifr_settings.ifs_ifsu.raw_hdlc = saved;
		if (copy_to_user(uifr32, &ifr, sizeof(struct compat_ifreq)))
			err = -EFAULT;
3153
	}
3154
	return err;
3155 3156
}

3157 3158
/* Handle ioctls that use ifreq::ifr_data and just need struct ifreq converted */
static int compat_ifr_data_ioctl(struct net *net, unsigned int cmd,
3159
				 struct compat_ifreq __user *u_ifreq32)
3160
{
3161
	struct ifreq ifreq;
3162 3163
	u32 data32;

3164
	if (copy_from_user(ifreq.ifr_name, u_ifreq32->ifr_name, IFNAMSIZ))
3165
		return -EFAULT;
3166
	if (get_user(data32, &u_ifreq32->ifr_data))
3167
		return -EFAULT;
3168
	ifreq.ifr_data = compat_ptr(data32);
3169

3170
	return dev_ioctl(net, cmd, &ifreq, NULL);
3171 3172
}

J
Johannes Berg 已提交
3173 3174 3175 3176 3177 3178 3179 3180 3181 3182 3183 3184 3185 3186 3187 3188 3189 3190 3191 3192 3193 3194 3195 3196 3197 3198 3199 3200 3201 3202 3203 3204 3205 3206 3207 3208 3209 3210 3211
static int compat_ifreq_ioctl(struct net *net, struct socket *sock,
			      unsigned int cmd,
			      struct compat_ifreq __user *uifr32)
{
	struct ifreq __user *uifr;
	int err;

	/* Handle the fact that while struct ifreq has the same *layout* on
	 * 32/64 for everything but ifreq::ifru_ifmap and ifreq::ifru_data,
	 * which are handled elsewhere, it still has different *size* due to
	 * ifreq::ifru_ifmap (which is 16 bytes on 32 bit, 24 bytes on 64-bit,
	 * resulting in struct ifreq being 32 and 40 bytes respectively).
	 * As a result, if the struct happens to be at the end of a page and
	 * the next page isn't readable/writable, we get a fault. To prevent
	 * that, copy back and forth to the full size.
	 */

	uifr = compat_alloc_user_space(sizeof(*uifr));
	if (copy_in_user(uifr, uifr32, sizeof(*uifr32)))
		return -EFAULT;

	err = sock_do_ioctl(net, sock, cmd, (unsigned long)uifr);

	if (!err) {
		switch (cmd) {
		case SIOCGIFFLAGS:
		case SIOCGIFMETRIC:
		case SIOCGIFMTU:
		case SIOCGIFMEM:
		case SIOCGIFHWADDR:
		case SIOCGIFINDEX:
		case SIOCGIFADDR:
		case SIOCGIFBRDADDR:
		case SIOCGIFDSTADDR:
		case SIOCGIFNETMASK:
		case SIOCGIFPFLAGS:
		case SIOCGIFTXQLEN:
		case SIOCGMIIPHY:
		case SIOCGMIIREG:
3212
		case SIOCGIFNAME:
J
Johannes Berg 已提交
3213 3214 3215 3216 3217 3218 3219 3220
			if (copy_in_user(uifr32, uifr, sizeof(*uifr32)))
				err = -EFAULT;
			break;
		}
	}
	return err;
}

3221 3222 3223 3224 3225 3226 3227 3228 3229
static int compat_sioc_ifmap(struct net *net, unsigned int cmd,
			struct compat_ifreq __user *uifr32)
{
	struct ifreq ifr;
	struct compat_ifmap __user *uifmap32;
	int err;

	uifmap32 = &uifr32->ifr_ifru.ifru_map;
	err = copy_from_user(&ifr, uifr32, sizeof(ifr.ifr_name));
3230 3231 3232 3233 3234 3235
	err |= get_user(ifr.ifr_map.mem_start, &uifmap32->mem_start);
	err |= get_user(ifr.ifr_map.mem_end, &uifmap32->mem_end);
	err |= get_user(ifr.ifr_map.base_addr, &uifmap32->base_addr);
	err |= get_user(ifr.ifr_map.irq, &uifmap32->irq);
	err |= get_user(ifr.ifr_map.dma, &uifmap32->dma);
	err |= get_user(ifr.ifr_map.port, &uifmap32->port);
3236 3237 3238
	if (err)
		return -EFAULT;

3239
	err = dev_ioctl(net, cmd, &ifr, NULL);
3240 3241 3242

	if (cmd == SIOCGIFMAP && !err) {
		err = copy_to_user(uifr32, &ifr, sizeof(ifr.ifr_name));
3243 3244 3245 3246 3247 3248
		err |= put_user(ifr.ifr_map.mem_start, &uifmap32->mem_start);
		err |= put_user(ifr.ifr_map.mem_end, &uifmap32->mem_end);
		err |= put_user(ifr.ifr_map.base_addr, &uifmap32->base_addr);
		err |= put_user(ifr.ifr_map.irq, &uifmap32->irq);
		err |= put_user(ifr.ifr_map.dma, &uifmap32->dma);
		err |= put_user(ifr.ifr_map.port, &uifmap32->port);
3249 3250 3251 3252 3253 3254
		if (err)
			err = -EFAULT;
	}
	return err;
}

3255
struct rtentry32 {
3256
	u32		rt_pad1;
3257 3258 3259
	struct sockaddr rt_dst;         /* target address               */
	struct sockaddr rt_gateway;     /* gateway addr (RTF_GATEWAY)   */
	struct sockaddr rt_genmask;     /* target network mask (IP)     */
3260 3261 3262 3263 3264 3265 3266
	unsigned short	rt_flags;
	short		rt_pad2;
	u32		rt_pad3;
	unsigned char	rt_tos;
	unsigned char	rt_class;
	short		rt_pad4;
	short		rt_metric;      /* +1 for binary compatibility! */
3267
	/* char * */ u32 rt_dev;        /* forcing the device at add    */
3268 3269
	u32		rt_mtu;         /* per route MTU/Window         */
	u32		rt_window;      /* Window clamping              */
3270 3271 3272 3273 3274 3275 3276 3277 3278 3279 3280 3281 3282 3283 3284 3285
	unsigned short  rt_irtt;        /* Initial RTT                  */
};

struct in6_rtmsg32 {
	struct in6_addr		rtmsg_dst;
	struct in6_addr		rtmsg_src;
	struct in6_addr		rtmsg_gateway;
	u32			rtmsg_type;
	u16			rtmsg_dst_len;
	u16			rtmsg_src_len;
	u32			rtmsg_metric;
	u32			rtmsg_info;
	u32			rtmsg_flags;
	s32			rtmsg_ifindex;
};

3286 3287
static int routing_ioctl(struct net *net, struct socket *sock,
			 unsigned int cmd, void __user *argp)
3288 3289 3290 3291 3292 3293 3294 3295 3296
{
	int ret;
	void *r = NULL;
	struct in6_rtmsg r6;
	struct rtentry r4;
	char devname[16];
	u32 rtdev;
	mm_segment_t old_fs = get_fs();

3297 3298
	if (sock && sock->sk && sock->sk->sk_family == AF_INET6) { /* ipv6 */
		struct in6_rtmsg32 __user *ur6 = argp;
3299
		ret = copy_from_user(&r6.rtmsg_dst, &(ur6->rtmsg_dst),
3300
			3 * sizeof(struct in6_addr));
3301 3302 3303 3304 3305 3306 3307
		ret |= get_user(r6.rtmsg_type, &(ur6->rtmsg_type));
		ret |= get_user(r6.rtmsg_dst_len, &(ur6->rtmsg_dst_len));
		ret |= get_user(r6.rtmsg_src_len, &(ur6->rtmsg_src_len));
		ret |= get_user(r6.rtmsg_metric, &(ur6->rtmsg_metric));
		ret |= get_user(r6.rtmsg_info, &(ur6->rtmsg_info));
		ret |= get_user(r6.rtmsg_flags, &(ur6->rtmsg_flags));
		ret |= get_user(r6.rtmsg_ifindex, &(ur6->rtmsg_ifindex));
3308 3309 3310

		r = (void *) &r6;
	} else { /* ipv4 */
3311
		struct rtentry32 __user *ur4 = argp;
3312
		ret = copy_from_user(&r4.rt_dst, &(ur4->rt_dst),
3313
					3 * sizeof(struct sockaddr));
3314 3315 3316 3317 3318 3319
		ret |= get_user(r4.rt_flags, &(ur4->rt_flags));
		ret |= get_user(r4.rt_metric, &(ur4->rt_metric));
		ret |= get_user(r4.rt_mtu, &(ur4->rt_mtu));
		ret |= get_user(r4.rt_window, &(ur4->rt_window));
		ret |= get_user(r4.rt_irtt, &(ur4->rt_irtt));
		ret |= get_user(rtdev, &(ur4->rt_dev));
3320
		if (rtdev) {
3321
			ret |= copy_from_user(devname, compat_ptr(rtdev), 15);
3322 3323
			r4.rt_dev = (char __user __force *)devname;
			devname[15] = 0;
3324 3325 3326 3327 3328 3329 3330 3331 3332 3333 3334
		} else
			r4.rt_dev = NULL;

		r = (void *) &r4;
	}

	if (ret) {
		ret = -EFAULT;
		goto out;
	}

3335
	set_fs(KERNEL_DS);
3336
	ret = sock_do_ioctl(net, sock, cmd, (unsigned long) r);
3337
	set_fs(old_fs);
3338 3339 3340 3341 3342 3343 3344

out:
	return ret;
}

/* Since old style bridge ioctl's endup using SIOCDEVPRIVATE
 * for some operations; this forces use of the newer bridge-utils that
L
Lucas De Marchi 已提交
3345
 * use compatible ioctls
3346
 */
3347
static int old_bridge_ioctl(compat_ulong_t __user *argp)
3348
{
3349
	compat_ulong_t tmp;
3350

3351
	if (get_user(tmp, argp))
3352 3353 3354 3355 3356 3357
		return -EFAULT;
	if (tmp == BRCTL_GET_VERSION)
		return BRCTL_VERSION + 1;
	return -EINVAL;
}

3358 3359 3360 3361 3362 3363
static int compat_sock_ioctl_trans(struct file *file, struct socket *sock,
			 unsigned int cmd, unsigned long arg)
{
	void __user *argp = compat_ptr(arg);
	struct sock *sk = sock->sk;
	struct net *net = sock_net(sk);
3364

3365
	if (cmd >= SIOCDEVPRIVATE && cmd <= (SIOCDEVPRIVATE + 15))
3366
		return compat_ifr_data_ioctl(net, cmd, argp);
3367 3368 3369 3370 3371 3372

	switch (cmd) {
	case SIOCSIFBR:
	case SIOCGIFBR:
		return old_bridge_ioctl(argp);
	case SIOCGIFCONF:
3373
		return compat_dev_ifconf(net, argp);
3374 3375
	case SIOCETHTOOL:
		return ethtool_ioctl(net, argp);
3376 3377
	case SIOCWANDEV:
		return compat_siocwandev(net, argp);
3378 3379 3380
	case SIOCGIFMAP:
	case SIOCSIFMAP:
		return compat_sioc_ifmap(net, cmd, argp);
3381 3382 3383
	case SIOCADDRT:
	case SIOCDELRT:
		return routing_ioctl(net, sock, cmd, argp);
3384 3385
	case SIOCGSTAMP_OLD:
	case SIOCGSTAMPNS_OLD:
3386 3387
		if (!sock->ops->gettstamp)
			return -ENOIOCTLCMD;
3388
		return sock->ops->gettstamp(sock, argp, cmd == SIOCGSTAMP_OLD,
3389 3390
					    !COMPAT_USE_64BIT_TIME);

3391 3392
	case SIOCBONDSLAVEINFOQUERY:
	case SIOCBONDINFOQUERY:
3393
	case SIOCSHWTSTAMP:
3394
	case SIOCGHWTSTAMP:
3395
		return compat_ifr_data_ioctl(net, cmd, argp);
3396 3397 3398 3399 3400 3401 3402 3403 3404 3405 3406

	case FIOSETOWN:
	case SIOCSPGRP:
	case FIOGETOWN:
	case SIOCGPGRP:
	case SIOCBRADDBR:
	case SIOCBRDELBR:
	case SIOCGIFVLAN:
	case SIOCSIFVLAN:
	case SIOCADDDLCI:
	case SIOCDELDLCI:
3407
	case SIOCGSKNS:
3408 3409
	case SIOCGSTAMP_NEW:
	case SIOCGSTAMPNS_NEW:
3410 3411 3412 3413 3414 3415 3416 3417 3418 3419 3420 3421 3422 3423 3424 3425 3426 3427 3428 3429 3430 3431 3432 3433 3434 3435 3436 3437 3438 3439 3440
		return sock_ioctl(file, cmd, arg);

	case SIOCGIFFLAGS:
	case SIOCSIFFLAGS:
	case SIOCGIFMETRIC:
	case SIOCSIFMETRIC:
	case SIOCGIFMTU:
	case SIOCSIFMTU:
	case SIOCGIFMEM:
	case SIOCSIFMEM:
	case SIOCGIFHWADDR:
	case SIOCSIFHWADDR:
	case SIOCADDMULTI:
	case SIOCDELMULTI:
	case SIOCGIFINDEX:
	case SIOCGIFADDR:
	case SIOCSIFADDR:
	case SIOCSIFHWBROADCAST:
	case SIOCDIFADDR:
	case SIOCGIFBRDADDR:
	case SIOCSIFBRDADDR:
	case SIOCGIFDSTADDR:
	case SIOCSIFDSTADDR:
	case SIOCGIFNETMASK:
	case SIOCSIFNETMASK:
	case SIOCSIFPFLAGS:
	case SIOCGIFPFLAGS:
	case SIOCGIFTXQLEN:
	case SIOCSIFTXQLEN:
	case SIOCBRADDIF:
	case SIOCBRDELIF:
3441
	case SIOCGIFNAME:
3442 3443 3444 3445
	case SIOCSIFNAME:
	case SIOCGMIIPHY:
	case SIOCGMIIREG:
	case SIOCSMIIREG:
A
Al Viro 已提交
3446 3447 3448 3449
	case SIOCBONDENSLAVE:
	case SIOCBONDRELEASE:
	case SIOCBONDSETHWADDR:
	case SIOCBONDCHANGEACTIVE:
J
Johannes Berg 已提交
3450 3451
		return compat_ifreq_ioctl(net, sock, cmd, argp);

3452 3453 3454 3455
	case SIOCSARP:
	case SIOCGARP:
	case SIOCDARP:
	case SIOCATMARK:
3456
		return sock_do_ioctl(net, sock, cmd, arg);
3457 3458
	}

3459 3460
	return -ENOIOCTLCMD;
}
3461

3462
static long compat_sock_ioctl(struct file *file, unsigned int cmd,
3463
			      unsigned long arg)
3464 3465 3466
{
	struct socket *sock = file->private_data;
	int ret = -ENOIOCTLCMD;
3467 3468 3469 3470 3471
	struct sock *sk;
	struct net *net;

	sk = sock->sk;
	net = sock_net(sk);
3472 3473 3474 3475

	if (sock->ops->compat_ioctl)
		ret = sock->ops->compat_ioctl(sock, cmd, arg);

3476 3477 3478 3479
	if (ret == -ENOIOCTLCMD &&
	    (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST))
		ret = compat_wext_handle_ioctl(net, cmd, arg);

3480 3481 3482
	if (ret == -ENOIOCTLCMD)
		ret = compat_sock_ioctl_trans(file, sock, cmd, arg);

3483 3484 3485 3486
	return ret;
}
#endif

3487 3488 3489 3490 3491 3492 3493 3494 3495
/**
 *	kernel_bind - bind an address to a socket (kernel space)
 *	@sock: socket
 *	@addr: address
 *	@addrlen: length of address
 *
 *	Returns 0 or an error.
 */

3496 3497 3498 3499
int kernel_bind(struct socket *sock, struct sockaddr *addr, int addrlen)
{
	return sock->ops->bind(sock, addr, addrlen);
}
3500
EXPORT_SYMBOL(kernel_bind);
3501

3502 3503 3504 3505 3506 3507 3508 3509
/**
 *	kernel_listen - move socket to listening state (kernel space)
 *	@sock: socket
 *	@backlog: pending connections queue size
 *
 *	Returns 0 or an error.
 */

3510 3511 3512 3513
int kernel_listen(struct socket *sock, int backlog)
{
	return sock->ops->listen(sock, backlog);
}
3514
EXPORT_SYMBOL(kernel_listen);
3515

3516 3517 3518 3519 3520 3521 3522 3523 3524 3525 3526
/**
 *	kernel_accept - accept a connection (kernel space)
 *	@sock: listening socket
 *	@newsock: new connected socket
 *	@flags: flags
 *
 *	@flags must be SOCK_CLOEXEC, SOCK_NONBLOCK or 0.
 *	If it fails, @newsock is guaranteed to be %NULL.
 *	Returns 0 or an error.
 */

3527 3528 3529 3530 3531 3532 3533 3534 3535 3536
int kernel_accept(struct socket *sock, struct socket **newsock, int flags)
{
	struct sock *sk = sock->sk;
	int err;

	err = sock_create_lite(sk->sk_family, sk->sk_type, sk->sk_protocol,
			       newsock);
	if (err < 0)
		goto done;

3537
	err = sock->ops->accept(sock, *newsock, flags, true);
3538 3539
	if (err < 0) {
		sock_release(*newsock);
3540
		*newsock = NULL;
3541 3542 3543 3544
		goto done;
	}

	(*newsock)->ops = sock->ops;
3545
	__module_get((*newsock)->ops->owner);
3546 3547 3548 3549

done:
	return err;
}
3550
EXPORT_SYMBOL(kernel_accept);
3551

3552 3553 3554 3555 3556 3557 3558 3559 3560 3561 3562 3563 3564
/**
 *	kernel_connect - connect a socket (kernel space)
 *	@sock: socket
 *	@addr: address
 *	@addrlen: address length
 *	@flags: flags (O_NONBLOCK, ...)
 *
 *	For datagram sockets, @addr is the addres to which datagrams are sent
 *	by default, and the only address from which datagrams are received.
 *	For stream sockets, attempts to connect to @addr.
 *	Returns 0 or an error code.
 */

3565
int kernel_connect(struct socket *sock, struct sockaddr *addr, int addrlen,
3566
		   int flags)
3567 3568 3569
{
	return sock->ops->connect(sock, addr, addrlen, flags);
}
3570
EXPORT_SYMBOL(kernel_connect);
3571

3572 3573 3574 3575 3576 3577 3578 3579 3580
/**
 *	kernel_getsockname - get the address which the socket is bound (kernel space)
 *	@sock: socket
 *	@addr: address holder
 *
 * 	Fills the @addr pointer with the address which the socket is bound.
 *	Returns 0 or an error code.
 */

3581
int kernel_getsockname(struct socket *sock, struct sockaddr *addr)
3582
{
3583
	return sock->ops->getname(sock, addr, 0);
3584
}
3585
EXPORT_SYMBOL(kernel_getsockname);
3586

3587 3588 3589 3590 3591 3592 3593 3594 3595
/**
 *	kernel_peername - get the address which the socket is connected (kernel space)
 *	@sock: socket
 *	@addr: address holder
 *
 * 	Fills the @addr pointer with the address which the socket is connected.
 *	Returns 0 or an error code.
 */

3596
int kernel_getpeername(struct socket *sock, struct sockaddr *addr)
3597
{
3598
	return sock->ops->getname(sock, addr, 1);
3599
}
3600
EXPORT_SYMBOL(kernel_getpeername);
3601

3602 3603 3604 3605 3606 3607 3608 3609 3610 3611 3612 3613
/**
 *	kernel_getsockopt - get a socket option (kernel space)
 *	@sock: socket
 *	@level: API level (SOL_SOCKET, ...)
 *	@optname: option tag
 *	@optval: option value
 *	@optlen: option length
 *
 *	Assigns the option length to @optlen.
 *	Returns 0 or an error.
 */

3614 3615 3616 3617
int kernel_getsockopt(struct socket *sock, int level, int optname,
			char *optval, int *optlen)
{
	mm_segment_t oldfs = get_fs();
3618 3619
	char __user *uoptval;
	int __user *uoptlen;
3620 3621
	int err;

3622 3623 3624
	uoptval = (char __user __force *) optval;
	uoptlen = (int __user __force *) optlen;

3625 3626
	set_fs(KERNEL_DS);
	if (level == SOL_SOCKET)
3627
		err = sock_getsockopt(sock, level, optname, uoptval, uoptlen);
3628
	else
3629 3630
		err = sock->ops->getsockopt(sock, level, optname, uoptval,
					    uoptlen);
3631 3632 3633
	set_fs(oldfs);
	return err;
}
3634
EXPORT_SYMBOL(kernel_getsockopt);
3635

3636 3637 3638 3639 3640 3641 3642 3643 3644 3645 3646
/**
 *	kernel_setsockopt - set a socket option (kernel space)
 *	@sock: socket
 *	@level: API level (SOL_SOCKET, ...)
 *	@optname: option tag
 *	@optval: option value
 *	@optlen: option length
 *
 *	Returns 0 or an error.
 */

3647
int kernel_setsockopt(struct socket *sock, int level, int optname,
3648
			char *optval, unsigned int optlen)
3649 3650
{
	mm_segment_t oldfs = get_fs();
3651
	char __user *uoptval;
3652 3653
	int err;

3654 3655
	uoptval = (char __user __force *) optval;

3656 3657
	set_fs(KERNEL_DS);
	if (level == SOL_SOCKET)
3658
		err = sock_setsockopt(sock, level, optname, uoptval, optlen);
3659
	else
3660
		err = sock->ops->setsockopt(sock, level, optname, uoptval,
3661 3662 3663 3664
					    optlen);
	set_fs(oldfs);
	return err;
}
3665
EXPORT_SYMBOL(kernel_setsockopt);
3666

3667 3668 3669 3670 3671 3672 3673 3674 3675 3676 3677
/**
 *	kernel_sendpage - send a &page through a socket (kernel space)
 *	@sock: socket
 *	@page: page
 *	@offset: page offset
 *	@size: total size in bytes
 *	@flags: flags (MSG_DONTWAIT, ...)
 *
 *	Returns the total amount sent in bytes or an error.
 */

3678 3679 3680 3681 3682 3683 3684 3685
int kernel_sendpage(struct socket *sock, struct page *page, int offset,
		    size_t size, int flags)
{
	if (sock->ops->sendpage)
		return sock->ops->sendpage(sock, page, offset, size, flags);

	return sock_no_sendpage(sock, page, offset, size, flags);
}
3686
EXPORT_SYMBOL(kernel_sendpage);
3687

3688 3689 3690 3691 3692 3693 3694 3695 3696 3697 3698 3699
/**
 *	kernel_sendpage_locked - send a &page through the locked sock (kernel space)
 *	@sk: sock
 *	@page: page
 *	@offset: page offset
 *	@size: total size in bytes
 *	@flags: flags (MSG_DONTWAIT, ...)
 *
 *	Returns the total amount sent in bytes or an error.
 *	Caller must hold @sk.
 */

3700 3701 3702 3703 3704 3705 3706 3707 3708 3709 3710 3711 3712
int kernel_sendpage_locked(struct sock *sk, struct page *page, int offset,
			   size_t size, int flags)
{
	struct socket *sock = sk->sk_socket;

	if (sock->ops->sendpage_locked)
		return sock->ops->sendpage_locked(sk, page, offset, size,
						  flags);

	return sock_no_sendpage_locked(sk, page, offset, size, flags);
}
EXPORT_SYMBOL(kernel_sendpage_locked);

3713 3714 3715 3716 3717 3718 3719 3720
/**
 *	kernel_shutdown - shut down part of a full-duplex connection (kernel space)
 *	@sock: socket
 *	@how: connection part
 *
 *	Returns 0 or an error.
 */

3721 3722 3723 3724 3725
int kernel_sock_shutdown(struct socket *sock, enum sock_shutdown_cmd how)
{
	return sock->ops->shutdown(sock, how);
}
EXPORT_SYMBOL(kernel_sock_shutdown);
3726

3727 3728 3729 3730 3731 3732 3733 3734
/**
 *	kernel_sock_ip_overhead - returns the IP overhead imposed by a socket
 *	@sk: socket
 *
 *	This routine returns the IP overhead imposed by a socket i.e.
 *	the length of the underlying IP header, depending on whether
 *	this is an IPv4 or IPv6 socket and the length from IP options turned
 *	on at the socket. Assumes that the caller has a lock on the socket.
3735
 */
3736

3737 3738 3739 3740 3741 3742 3743 3744 3745 3746 3747 3748 3749 3750 3751 3752 3753 3754
u32 kernel_sock_ip_overhead(struct sock *sk)
{
	struct inet_sock *inet;
	struct ip_options_rcu *opt;
	u32 overhead = 0;
#if IS_ENABLED(CONFIG_IPV6)
	struct ipv6_pinfo *np;
	struct ipv6_txoptions *optv6 = NULL;
#endif /* IS_ENABLED(CONFIG_IPV6) */

	if (!sk)
		return overhead;

	switch (sk->sk_family) {
	case AF_INET:
		inet = inet_sk(sk);
		overhead += sizeof(struct iphdr);
		opt = rcu_dereference_protected(inet->inet_opt,
3755
						sock_owned_by_user(sk));
3756 3757 3758 3759 3760 3761 3762 3763 3764
		if (opt)
			overhead += opt->opt.optlen;
		return overhead;
#if IS_ENABLED(CONFIG_IPV6)
	case AF_INET6:
		np = inet6_sk(sk);
		overhead += sizeof(struct ipv6hdr);
		if (np)
			optv6 = rcu_dereference_protected(np->opt,
3765
							  sock_owned_by_user(sk));
3766 3767 3768 3769 3770 3771 3772 3773 3774
		if (optv6)
			overhead += (optv6->opt_flen + optv6->opt_nflen);
		return overhead;
#endif /* IS_ENABLED(CONFIG_IPV6) */
	default: /* Returns 0 overhead if the socket is not ipv4 or ipv6 */
		return overhead;
	}
}
EXPORT_SYMBOL(kernel_sock_ip_overhead);