pkt_sched: fq: avoid hang when quantum 0
[deliverable/linux.git] / net / socket.c
CommitLineData
1da177e4
LT
1/*
2 * NET An implementation of the SOCKET network access protocol.
3 *
4 * Version: @(#)socket.c 1.1.93 18/02/95
5 *
6 * Authors: Orest Zborowski, <obz@Kodak.COM>
02c30a84 7 * Ross Biro
1da177e4
LT
8 * Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
9 *
10 * Fixes:
11 * Anonymous : NOTSOCK/BADF cleanup. Error fix in
12 * shutdown()
13 * Alan Cox : verify_area() fixes
14 * Alan Cox : Removed DDI
15 * Jonathan Kamens : SOCK_DGRAM reconnect bug
16 * Alan Cox : Moved a load of checks to the very
17 * top level.
18 * Alan Cox : Move address structures to/from user
19 * mode above the protocol layers.
20 * Rob Janssen : Allow 0 length sends.
21 * Alan Cox : Asynchronous I/O support (cribbed from the
22 * tty drivers).
23 * Niibe Yutaka : Asynchronous I/O for writes (4.4BSD style)
24 * Jeff Uphoff : Made max number of sockets command-line
25 * configurable.
26 * Matti Aarnio : Made the number of sockets dynamic,
27 * to be allocated when needed, and mr.
28 * Uphoff's max is used as max to be
29 * allowed to allocate.
30 * Linus : Argh. removed all the socket allocation
31 * altogether: it's in the inode now.
32 * Alan Cox : Made sock_alloc()/sock_release() public
33 * for NetROM and future kernel nfsd type
34 * stuff.
35 * Alan Cox : sendmsg/recvmsg basics.
36 * Tom Dyas : Export net symbols.
37 * Marcin Dalecki : Fixed problems with CONFIG_NET="n".
38 * Alan Cox : Added thread locking to sys_* calls
39 * for sockets. May have errors at the
40 * moment.
41 * Kevin Buhr : Fixed the dumb errors in the above.
42 * Andi Kleen : Some small cleanups, optimizations,
43 * and fixed a copy_from_user() bug.
44 * Tigran Aivazian : sys_send(args) calls sys_sendto(args, NULL, 0)
89bddce5 45 * Tigran Aivazian : Made listen(2) backlog sanity checks
1da177e4
LT
46 * protocol-independent
47 *
48 *
49 * This program is free software; you can redistribute it and/or
50 * modify it under the terms of the GNU General Public License
51 * as published by the Free Software Foundation; either version
52 * 2 of the License, or (at your option) any later version.
53 *
54 *
55 * This module is effectively the top level interface to the BSD socket
89bddce5 56 * paradigm.
1da177e4
LT
57 *
58 * Based upon Swansea University Computer Society NET3.039
59 */
60
1da177e4 61#include <linux/mm.h>
1da177e4
LT
62#include <linux/socket.h>
63#include <linux/file.h>
64#include <linux/net.h>
65#include <linux/interrupt.h>
aaca0bdc 66#include <linux/thread_info.h>
55737fda 67#include <linux/rcupdate.h>
1da177e4
LT
68#include <linux/netdevice.h>
69#include <linux/proc_fs.h>
70#include <linux/seq_file.h>
4a3e2f71 71#include <linux/mutex.h>
1da177e4 72#include <linux/if_bridge.h>
20380731
ACM
73#include <linux/if_frad.h>
74#include <linux/if_vlan.h>
408eccce 75#include <linux/ptp_classify.h>
1da177e4
LT
76#include <linux/init.h>
77#include <linux/poll.h>
78#include <linux/cache.h>
79#include <linux/module.h>
80#include <linux/highmem.h>
1da177e4
LT
81#include <linux/mount.h>
82#include <linux/security.h>
83#include <linux/syscalls.h>
84#include <linux/compat.h>
85#include <linux/kmod.h>
3ec3b2fb 86#include <linux/audit.h>
d86b5e0e 87#include <linux/wireless.h>
1b8d7ae4 88#include <linux/nsproxy.h>
1fd7317d 89#include <linux/magic.h>
5a0e3ad6 90#include <linux/slab.h>
600e1779 91#include <linux/xattr.h>
1da177e4
LT
92
93#include <asm/uaccess.h>
94#include <asm/unistd.h>
95
96#include <net/compat.h>
87de87d5 97#include <net/wext.h>
f8451725 98#include <net/cls_cgroup.h>
1da177e4
LT
99
100#include <net/sock.h>
101#include <linux/netfilter.h>
102
6b96018b
AB
103#include <linux/if_tun.h>
104#include <linux/ipv6_route.h>
105#include <linux/route.h>
6b96018b
AB
106#include <linux/sockios.h>
107#include <linux/atalk.h>
076bb0c8 108#include <net/busy_poll.h>
f24b9be5 109#include <linux/errqueue.h>
06021292 110
e0d1095a 111#ifdef CONFIG_NET_RX_BUSY_POLL
64b0dc51
ET
112unsigned int sysctl_net_busy_read __read_mostly;
113unsigned int sysctl_net_busy_poll __read_mostly;
06021292 114#endif
6b96018b 115
027445c3
BP
116static ssize_t sock_aio_read(struct kiocb *iocb, const struct iovec *iov,
117 unsigned long nr_segs, loff_t pos);
118static ssize_t sock_aio_write(struct kiocb *iocb, const struct iovec *iov,
119 unsigned long nr_segs, loff_t pos);
89bddce5 120static int sock_mmap(struct file *file, struct vm_area_struct *vma);
1da177e4
LT
121
122static int sock_close(struct inode *inode, struct file *file);
123static unsigned int sock_poll(struct file *file,
124 struct poll_table_struct *wait);
89bddce5 125static long sock_ioctl(struct file *file, unsigned int cmd, unsigned long arg);
89bbfc95
SP
126#ifdef CONFIG_COMPAT
127static long compat_sock_ioctl(struct file *file,
89bddce5 128 unsigned int cmd, unsigned long arg);
89bbfc95 129#endif
1da177e4 130static int sock_fasync(int fd, struct file *filp, int on);
1da177e4
LT
131static ssize_t sock_sendpage(struct file *file, struct page *page,
132 int offset, size_t size, loff_t *ppos, int more);
9c55e01c 133static ssize_t sock_splice_read(struct file *file, loff_t *ppos,
c6d409cf 134 struct pipe_inode_info *pipe, size_t len,
9c55e01c 135 unsigned int flags);
1da177e4 136
1da177e4
LT
137/*
138 * Socket files have a set of 'special' operations as well as the generic file ones. These don't appear
139 * in the operation structures but are done directly via the socketcall() multiplexor.
140 */
141
da7071d7 142static const struct file_operations socket_file_ops = {
1da177e4
LT
143 .owner = THIS_MODULE,
144 .llseek = no_llseek,
145 .aio_read = sock_aio_read,
146 .aio_write = sock_aio_write,
147 .poll = sock_poll,
148 .unlocked_ioctl = sock_ioctl,
89bbfc95
SP
149#ifdef CONFIG_COMPAT
150 .compat_ioctl = compat_sock_ioctl,
151#endif
1da177e4 152 .mmap = sock_mmap,
1da177e4
LT
153 .release = sock_close,
154 .fasync = sock_fasync,
5274f052
JA
155 .sendpage = sock_sendpage,
156 .splice_write = generic_splice_sendpage,
9c55e01c 157 .splice_read = sock_splice_read,
1da177e4
LT
158};
159
160/*
161 * The protocol list. Each protocol is registered in here.
162 */
163
1da177e4 164static DEFINE_SPINLOCK(net_family_lock);
190683a9 165static const struct net_proto_family __rcu *net_families[NPROTO] __read_mostly;
1da177e4 166
1da177e4
LT
167/*
168 * Statistics counters of the socket lists
169 */
170
c6d409cf 171static DEFINE_PER_CPU(int, sockets_in_use);
1da177e4
LT
172
173/*
89bddce5
SH
174 * Support routines.
175 * Move socket addresses back and forth across the kernel/user
176 * divide and look after the messy bits.
1da177e4
LT
177 */
178
1da177e4
LT
179/**
180 * move_addr_to_kernel - copy a socket address into kernel space
181 * @uaddr: Address in user space
182 * @kaddr: Address in kernel space
183 * @ulen: Length in user space
184 *
185 * The address is copied into kernel space. If the provided address is
186 * too long an error code of -EINVAL is returned. If the copy gives
187 * invalid addresses -EFAULT is returned. On a success 0 is returned.
188 */
189
43db362d 190int move_addr_to_kernel(void __user *uaddr, int ulen, struct sockaddr_storage *kaddr)
1da177e4 191{
230b1839 192 if (ulen < 0 || ulen > sizeof(struct sockaddr_storage))
1da177e4 193 return -EINVAL;
89bddce5 194 if (ulen == 0)
1da177e4 195 return 0;
89bddce5 196 if (copy_from_user(kaddr, uaddr, ulen))
1da177e4 197 return -EFAULT;
3ec3b2fb 198 return audit_sockaddr(ulen, kaddr);
1da177e4
LT
199}
200
201/**
202 * move_addr_to_user - copy an address to user space
203 * @kaddr: kernel space address
204 * @klen: length of address in kernel
205 * @uaddr: user space address
206 * @ulen: pointer to user length field
207 *
208 * The value pointed to by ulen on entry is the buffer length available.
209 * This is overwritten with the buffer space used. -EINVAL is returned
210 * if an overlong buffer is specified or a negative buffer size. -EFAULT
211 * is returned if either the buffer or the length field are not
212 * accessible.
213 * After copying the data up to the limit the user specifies, the true
214 * length of the data is written over the length limit the user
215 * specified. Zero is returned for a success.
216 */
89bddce5 217
43db362d 218static int move_addr_to_user(struct sockaddr_storage *kaddr, int klen,
11165f14 219 void __user *uaddr, int __user *ulen)
1da177e4
LT
220{
221 int err;
222 int len;
223
68c6beb3 224 BUG_ON(klen > sizeof(struct sockaddr_storage));
89bddce5
SH
225 err = get_user(len, ulen);
226 if (err)
1da177e4 227 return err;
89bddce5
SH
228 if (len > klen)
229 len = klen;
68c6beb3 230 if (len < 0)
1da177e4 231 return -EINVAL;
89bddce5 232 if (len) {
d6fe3945
SG
233 if (audit_sockaddr(klen, kaddr))
234 return -ENOMEM;
89bddce5 235 if (copy_to_user(uaddr, kaddr, len))
1da177e4
LT
236 return -EFAULT;
237 }
238 /*
89bddce5
SH
239 * "fromlen shall refer to the value before truncation.."
240 * 1003.1g
1da177e4
LT
241 */
242 return __put_user(klen, ulen);
243}
244
e18b890b 245static struct kmem_cache *sock_inode_cachep __read_mostly;
1da177e4
LT
246
247static struct inode *sock_alloc_inode(struct super_block *sb)
248{
249 struct socket_alloc *ei;
eaefd110 250 struct socket_wq *wq;
89bddce5 251
e94b1766 252 ei = kmem_cache_alloc(sock_inode_cachep, GFP_KERNEL);
1da177e4
LT
253 if (!ei)
254 return NULL;
eaefd110
ED
255 wq = kmalloc(sizeof(*wq), GFP_KERNEL);
256 if (!wq) {
43815482
ED
257 kmem_cache_free(sock_inode_cachep, ei);
258 return NULL;
259 }
eaefd110
ED
260 init_waitqueue_head(&wq->wait);
261 wq->fasync_list = NULL;
262 RCU_INIT_POINTER(ei->socket.wq, wq);
89bddce5 263
1da177e4
LT
264 ei->socket.state = SS_UNCONNECTED;
265 ei->socket.flags = 0;
266 ei->socket.ops = NULL;
267 ei->socket.sk = NULL;
268 ei->socket.file = NULL;
1da177e4
LT
269
270 return &ei->vfs_inode;
271}
272
273static void sock_destroy_inode(struct inode *inode)
274{
43815482 275 struct socket_alloc *ei;
eaefd110 276 struct socket_wq *wq;
43815482
ED
277
278 ei = container_of(inode, struct socket_alloc, vfs_inode);
eaefd110 279 wq = rcu_dereference_protected(ei->socket.wq, 1);
61845220 280 kfree_rcu(wq, rcu);
43815482 281 kmem_cache_free(sock_inode_cachep, ei);
1da177e4
LT
282}
283
51cc5068 284static void init_once(void *foo)
1da177e4 285{
89bddce5 286 struct socket_alloc *ei = (struct socket_alloc *)foo;
1da177e4 287
a35afb83 288 inode_init_once(&ei->vfs_inode);
1da177e4 289}
89bddce5 290
1da177e4
LT
291static int init_inodecache(void)
292{
293 sock_inode_cachep = kmem_cache_create("sock_inode_cache",
89bddce5
SH
294 sizeof(struct socket_alloc),
295 0,
296 (SLAB_HWCACHE_ALIGN |
297 SLAB_RECLAIM_ACCOUNT |
298 SLAB_MEM_SPREAD),
20c2df83 299 init_once);
1da177e4
LT
300 if (sock_inode_cachep == NULL)
301 return -ENOMEM;
302 return 0;
303}
304
b87221de 305static const struct super_operations sockfs_ops = {
c6d409cf
ED
306 .alloc_inode = sock_alloc_inode,
307 .destroy_inode = sock_destroy_inode,
308 .statfs = simple_statfs,
1da177e4
LT
309};
310
c23fbb6b
ED
311/*
312 * sockfs_dname() is called from d_path().
313 */
314static char *sockfs_dname(struct dentry *dentry, char *buffer, int buflen)
315{
316 return dynamic_dname(dentry, buffer, buflen, "socket:[%lu]",
317 dentry->d_inode->i_ino);
318}
319
3ba13d17 320static const struct dentry_operations sockfs_dentry_operations = {
c23fbb6b 321 .d_dname = sockfs_dname,
1da177e4
LT
322};
323
c74a1cbb
AV
324static struct dentry *sockfs_mount(struct file_system_type *fs_type,
325 int flags, const char *dev_name, void *data)
326{
327 return mount_pseudo(fs_type, "socket:", &sockfs_ops,
328 &sockfs_dentry_operations, SOCKFS_MAGIC);
329}
330
331static struct vfsmount *sock_mnt __read_mostly;
332
333static struct file_system_type sock_fs_type = {
334 .name = "sockfs",
335 .mount = sockfs_mount,
336 .kill_sb = kill_anon_super,
337};
338
1da177e4
LT
339/*
340 * Obtains the first available file descriptor and sets it up for use.
341 *
39d8c1b6
DM
342 * These functions create file structures and maps them to fd space
343 * of the current process. On success it returns file descriptor
1da177e4
LT
344 * and file struct implicitly stored in sock->file.
345 * Note that another thread may close file descriptor before we return
346 * from this function. We use the fact that now we do not refer
347 * to socket after mapping. If one day we will need it, this
348 * function will increment ref. count on file by 1.
349 *
350 * In any case returned fd MAY BE not valid!
351 * This race condition is unavoidable
352 * with shared fd spaces, we cannot solve it inside kernel,
353 * but we take care of internal coherence yet.
354 */
355
aab174f0 356struct file *sock_alloc_file(struct socket *sock, int flags, const char *dname)
1da177e4 357{
7cbe66b6 358 struct qstr name = { .name = "" };
2c48b9c4 359 struct path path;
7cbe66b6 360 struct file *file;
1da177e4 361
600e1779
MY
362 if (dname) {
363 name.name = dname;
364 name.len = strlen(name.name);
365 } else if (sock->sk) {
366 name.name = sock->sk->sk_prot_creator->name;
367 name.len = strlen(name.name);
368 }
4b936885 369 path.dentry = d_alloc_pseudo(sock_mnt->mnt_sb, &name);
28407630
AV
370 if (unlikely(!path.dentry))
371 return ERR_PTR(-ENOMEM);
2c48b9c4 372 path.mnt = mntget(sock_mnt);
39d8c1b6 373
2c48b9c4 374 d_instantiate(path.dentry, SOCK_INODE(sock));
39d8c1b6 375
2c48b9c4 376 file = alloc_file(&path, FMODE_READ | FMODE_WRITE,
ce8d2cdf 377 &socket_file_ops);
39b65252 378 if (unlikely(IS_ERR(file))) {
cc3808f8 379 /* drop dentry, keep inode */
7de9c6ee 380 ihold(path.dentry->d_inode);
2c48b9c4 381 path_put(&path);
39b65252 382 return file;
cc3808f8
AV
383 }
384
385 sock->file = file;
77d27200 386 file->f_flags = O_RDWR | (flags & O_NONBLOCK);
39d8c1b6 387 file->private_data = sock;
28407630 388 return file;
39d8c1b6 389}
56b31d1c 390EXPORT_SYMBOL(sock_alloc_file);
39d8c1b6 391
56b31d1c 392static int sock_map_fd(struct socket *sock, int flags)
39d8c1b6
DM
393{
394 struct file *newfile;
28407630
AV
395 int fd = get_unused_fd_flags(flags);
396 if (unlikely(fd < 0))
397 return fd;
39d8c1b6 398
aab174f0 399 newfile = sock_alloc_file(sock, flags, NULL);
28407630 400 if (likely(!IS_ERR(newfile))) {
39d8c1b6 401 fd_install(fd, newfile);
28407630
AV
402 return fd;
403 }
7cbe66b6 404
28407630
AV
405 put_unused_fd(fd);
406 return PTR_ERR(newfile);
1da177e4
LT
407}
408
406a3c63 409struct socket *sock_from_file(struct file *file, int *err)
6cb153ca 410{
6cb153ca
BL
411 if (file->f_op == &socket_file_ops)
412 return file->private_data; /* set in sock_map_fd */
413
23bb80d2
ED
414 *err = -ENOTSOCK;
415 return NULL;
6cb153ca 416}
406a3c63 417EXPORT_SYMBOL(sock_from_file);
6cb153ca 418
1da177e4 419/**
c6d409cf 420 * sockfd_lookup - Go from a file number to its socket slot
1da177e4
LT
421 * @fd: file handle
422 * @err: pointer to an error code return
423 *
424 * The file handle passed in is locked and the socket it is bound
425 * too is returned. If an error occurs the err pointer is overwritten
426 * with a negative errno code and NULL is returned. The function checks
427 * for both invalid handles and passing a handle which is not a socket.
428 *
429 * On a success the socket object pointer is returned.
430 */
431
432struct socket *sockfd_lookup(int fd, int *err)
433{
434 struct file *file;
1da177e4
LT
435 struct socket *sock;
436
89bddce5
SH
437 file = fget(fd);
438 if (!file) {
1da177e4
LT
439 *err = -EBADF;
440 return NULL;
441 }
89bddce5 442
6cb153ca
BL
443 sock = sock_from_file(file, err);
444 if (!sock)
1da177e4 445 fput(file);
6cb153ca
BL
446 return sock;
447}
c6d409cf 448EXPORT_SYMBOL(sockfd_lookup);
1da177e4 449
6cb153ca
BL
450static struct socket *sockfd_lookup_light(int fd, int *err, int *fput_needed)
451{
00e188ef 452 struct fd f = fdget(fd);
6cb153ca
BL
453 struct socket *sock;
454
3672558c 455 *err = -EBADF;
00e188ef
AV
456 if (f.file) {
457 sock = sock_from_file(f.file, err);
458 if (likely(sock)) {
459 *fput_needed = f.flags;
6cb153ca 460 return sock;
00e188ef
AV
461 }
462 fdput(f);
1da177e4 463 }
6cb153ca 464 return NULL;
1da177e4
LT
465}
466
600e1779
MY
467#define XATTR_SOCKPROTONAME_SUFFIX "sockprotoname"
468#define XATTR_NAME_SOCKPROTONAME (XATTR_SYSTEM_PREFIX XATTR_SOCKPROTONAME_SUFFIX)
469#define XATTR_NAME_SOCKPROTONAME_LEN (sizeof(XATTR_NAME_SOCKPROTONAME)-1)
470static ssize_t sockfs_getxattr(struct dentry *dentry,
471 const char *name, void *value, size_t size)
472{
473 const char *proto_name;
474 size_t proto_size;
475 int error;
476
477 error = -ENODATA;
478 if (!strncmp(name, XATTR_NAME_SOCKPROTONAME, XATTR_NAME_SOCKPROTONAME_LEN)) {
479 proto_name = dentry->d_name.name;
480 proto_size = strlen(proto_name);
481
482 if (value) {
483 error = -ERANGE;
484 if (proto_size + 1 > size)
485 goto out;
486
487 strncpy(value, proto_name, proto_size + 1);
488 }
489 error = proto_size + 1;
490 }
491
492out:
493 return error;
494}
495
496static ssize_t sockfs_listxattr(struct dentry *dentry, char *buffer,
497 size_t size)
498{
499 ssize_t len;
500 ssize_t used = 0;
501
502 len = security_inode_listsecurity(dentry->d_inode, buffer, size);
503 if (len < 0)
504 return len;
505 used += len;
506 if (buffer) {
507 if (size < used)
508 return -ERANGE;
509 buffer += len;
510 }
511
512 len = (XATTR_NAME_SOCKPROTONAME_LEN + 1);
513 used += len;
514 if (buffer) {
515 if (size < used)
516 return -ERANGE;
517 memcpy(buffer, XATTR_NAME_SOCKPROTONAME, len);
518 buffer += len;
519 }
520
521 return used;
522}
523
524static const struct inode_operations sockfs_inode_ops = {
525 .getxattr = sockfs_getxattr,
526 .listxattr = sockfs_listxattr,
527};
528
1da177e4
LT
529/**
530 * sock_alloc - allocate a socket
89bddce5 531 *
1da177e4
LT
532 * Allocate a new inode and socket object. The two are bound together
533 * and initialised. The socket is then returned. If we are out of inodes
534 * NULL is returned.
535 */
536
537static struct socket *sock_alloc(void)
538{
89bddce5
SH
539 struct inode *inode;
540 struct socket *sock;
1da177e4 541
a209dfc7 542 inode = new_inode_pseudo(sock_mnt->mnt_sb);
1da177e4
LT
543 if (!inode)
544 return NULL;
545
546 sock = SOCKET_I(inode);
547
29a020d3 548 kmemcheck_annotate_bitfield(sock, type);
85fe4025 549 inode->i_ino = get_next_ino();
89bddce5 550 inode->i_mode = S_IFSOCK | S_IRWXUGO;
8192b0c4
DH
551 inode->i_uid = current_fsuid();
552 inode->i_gid = current_fsgid();
600e1779 553 inode->i_op = &sockfs_inode_ops;
1da177e4 554
19e8d69c 555 this_cpu_add(sockets_in_use, 1);
1da177e4
LT
556 return sock;
557}
558
1da177e4
LT
559/**
560 * sock_release - close a socket
561 * @sock: socket to close
562 *
563 * The socket is released from the protocol stack if it has a release
564 * callback, and the inode is then released if the socket is bound to
89bddce5 565 * an inode not a file.
1da177e4 566 */
89bddce5 567
1da177e4
LT
568void sock_release(struct socket *sock)
569{
570 if (sock->ops) {
571 struct module *owner = sock->ops->owner;
572
573 sock->ops->release(sock);
574 sock->ops = NULL;
575 module_put(owner);
576 }
577
eaefd110 578 if (rcu_dereference_protected(sock->wq, 1)->fasync_list)
3410f22e 579 pr_err("%s: fasync list not empty!\n", __func__);
1da177e4 580
b09e786b
MP
581 if (test_bit(SOCK_EXTERNALLY_ALLOCATED, &sock->flags))
582 return;
583
19e8d69c 584 this_cpu_sub(sockets_in_use, 1);
1da177e4
LT
585 if (!sock->file) {
586 iput(SOCK_INODE(sock));
587 return;
588 }
89bddce5 589 sock->file = NULL;
1da177e4 590}
c6d409cf 591EXPORT_SYMBOL(sock_release);
1da177e4 592
67cc0d40 593void __sock_tx_timestamp(const struct sock *sk, __u8 *tx_flags)
20d49473 594{
140c55d4
ED
595 u8 flags = *tx_flags;
596
b9f40e21 597 if (sk->sk_tsflags & SOF_TIMESTAMPING_TX_HARDWARE)
140c55d4
ED
598 flags |= SKBTX_HW_TSTAMP;
599
b9f40e21 600 if (sk->sk_tsflags & SOF_TIMESTAMPING_TX_SOFTWARE)
140c55d4
ED
601 flags |= SKBTX_SW_TSTAMP;
602
e7fd2885 603 if (sk->sk_tsflags & SOF_TIMESTAMPING_TX_SCHED)
140c55d4
ED
604 flags |= SKBTX_SCHED_TSTAMP;
605
e1c8a607 606 if (sk->sk_tsflags & SOF_TIMESTAMPING_TX_ACK)
140c55d4 607 flags |= SKBTX_ACK_TSTAMP;
e7fd2885 608
140c55d4 609 *tx_flags = flags;
20d49473 610}
67cc0d40 611EXPORT_SYMBOL(__sock_tx_timestamp);
20d49473 612
228e548e
AB
613static inline int __sock_sendmsg_nosec(struct kiocb *iocb, struct socket *sock,
614 struct msghdr *msg, size_t size)
1da177e4
LT
615{
616 struct sock_iocb *si = kiocb_to_siocb(iocb);
1da177e4
LT
617
618 si->sock = sock;
619 si->scm = NULL;
620 si->msg = msg;
621 si->size = size;
622
1da177e4
LT
623 return sock->ops->sendmsg(iocb, sock, msg, size);
624}
625
228e548e
AB
626static inline int __sock_sendmsg(struct kiocb *iocb, struct socket *sock,
627 struct msghdr *msg, size_t size)
628{
629 int err = security_socket_sendmsg(sock, msg, size);
630
631 return err ?: __sock_sendmsg_nosec(iocb, sock, msg, size);
632}
633
0cf00c6f
GZ
634static int do_sock_sendmsg(struct socket *sock, struct msghdr *msg,
635 size_t size, bool nosec)
1da177e4
LT
636{
637 struct kiocb iocb;
638 struct sock_iocb siocb;
639 int ret;
640
641 init_sync_kiocb(&iocb, NULL);
642 iocb.private = &siocb;
0cf00c6f
GZ
643 ret = nosec ? __sock_sendmsg_nosec(&iocb, sock, msg, size) :
644 __sock_sendmsg(&iocb, sock, msg, size);
1da177e4
LT
645 if (-EIOCBQUEUED == ret)
646 ret = wait_on_sync_kiocb(&iocb);
647 return ret;
648}
0cf00c6f
GZ
649
650int sock_sendmsg(struct socket *sock, struct msghdr *msg, size_t size)
651{
652 return do_sock_sendmsg(sock, msg, size, false);
653}
c6d409cf 654EXPORT_SYMBOL(sock_sendmsg);
1da177e4 655
894dc24c 656static int sock_sendmsg_nosec(struct socket *sock, struct msghdr *msg, size_t size)
228e548e 657{
0cf00c6f 658 return do_sock_sendmsg(sock, msg, size, true);
228e548e
AB
659}
660
1da177e4
LT
661int kernel_sendmsg(struct socket *sock, struct msghdr *msg,
662 struct kvec *vec, size_t num, size_t size)
663{
664 mm_segment_t oldfs = get_fs();
665 int result;
666
667 set_fs(KERNEL_DS);
668 /*
669 * the following is safe, since for compiler definitions of kvec and
670 * iovec are identical, yielding the same in-core layout and alignment
671 */
c0371da6 672 iov_iter_init(&msg->msg_iter, WRITE, (struct iovec *)vec, num, size);
1da177e4
LT
673 result = sock_sendmsg(sock, msg, size);
674 set_fs(oldfs);
675 return result;
676}
c6d409cf 677EXPORT_SYMBOL(kernel_sendmsg);
1da177e4 678
92f37fd2
ED
679/*
680 * called from sock_recv_timestamp() if sock_flag(sk, SOCK_RCVTSTAMP)
681 */
682void __sock_recv_timestamp(struct msghdr *msg, struct sock *sk,
683 struct sk_buff *skb)
684{
20d49473 685 int need_software_tstamp = sock_flag(sk, SOCK_RCVTSTAMP);
f24b9be5 686 struct scm_timestamping tss;
20d49473
PO
687 int empty = 1;
688 struct skb_shared_hwtstamps *shhwtstamps =
689 skb_hwtstamps(skb);
690
691 /* Race occurred between timestamp enabling and packet
692 receiving. Fill in the current time for now. */
693 if (need_software_tstamp && skb->tstamp.tv64 == 0)
694 __net_timestamp(skb);
695
696 if (need_software_tstamp) {
697 if (!sock_flag(sk, SOCK_RCVTSTAMPNS)) {
698 struct timeval tv;
699 skb_get_timestamp(skb, &tv);
700 put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMP,
701 sizeof(tv), &tv);
702 } else {
f24b9be5
WB
703 struct timespec ts;
704 skb_get_timestampns(skb, &ts);
20d49473 705 put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMPNS,
f24b9be5 706 sizeof(ts), &ts);
20d49473
PO
707 }
708 }
709
f24b9be5 710 memset(&tss, 0, sizeof(tss));
c199105d 711 if ((sk->sk_tsflags & SOF_TIMESTAMPING_SOFTWARE) &&
f24b9be5 712 ktime_to_timespec_cond(skb->tstamp, tss.ts + 0))
20d49473 713 empty = 0;
4d276eb6 714 if (shhwtstamps &&
b9f40e21 715 (sk->sk_tsflags & SOF_TIMESTAMPING_RAW_HARDWARE) &&
f24b9be5 716 ktime_to_timespec_cond(shhwtstamps->hwtstamp, tss.ts + 2))
4d276eb6 717 empty = 0;
20d49473
PO
718 if (!empty)
719 put_cmsg(msg, SOL_SOCKET,
f24b9be5 720 SCM_TIMESTAMPING, sizeof(tss), &tss);
92f37fd2 721}
7c81fd8b
ACM
722EXPORT_SYMBOL_GPL(__sock_recv_timestamp);
723
6e3e939f
JB
724void __sock_recv_wifi_status(struct msghdr *msg, struct sock *sk,
725 struct sk_buff *skb)
726{
727 int ack;
728
729 if (!sock_flag(sk, SOCK_WIFI_STATUS))
730 return;
731 if (!skb->wifi_acked_valid)
732 return;
733
734 ack = skb->wifi_acked;
735
736 put_cmsg(msg, SOL_SOCKET, SCM_WIFI_STATUS, sizeof(ack), &ack);
737}
738EXPORT_SYMBOL_GPL(__sock_recv_wifi_status);
739
11165f14 740static inline void sock_recv_drops(struct msghdr *msg, struct sock *sk,
741 struct sk_buff *skb)
3b885787
NH
742{
743 if (sock_flag(sk, SOCK_RXQ_OVFL) && skb && skb->dropcount)
744 put_cmsg(msg, SOL_SOCKET, SO_RXQ_OVFL,
745 sizeof(__u32), &skb->dropcount);
746}
747
767dd033 748void __sock_recv_ts_and_drops(struct msghdr *msg, struct sock *sk,
3b885787
NH
749 struct sk_buff *skb)
750{
751 sock_recv_timestamp(msg, sk, skb);
752 sock_recv_drops(msg, sk, skb);
753}
767dd033 754EXPORT_SYMBOL_GPL(__sock_recv_ts_and_drops);
3b885787 755
a2e27255
ACM
756static inline int __sock_recvmsg_nosec(struct kiocb *iocb, struct socket *sock,
757 struct msghdr *msg, size_t size, int flags)
1da177e4 758{
1da177e4
LT
759 struct sock_iocb *si = kiocb_to_siocb(iocb);
760
761 si->sock = sock;
762 si->scm = NULL;
763 si->msg = msg;
764 si->size = size;
765 si->flags = flags;
766
1da177e4
LT
767 return sock->ops->recvmsg(iocb, sock, msg, size, flags);
768}
769
a2e27255
ACM
770static inline int __sock_recvmsg(struct kiocb *iocb, struct socket *sock,
771 struct msghdr *msg, size_t size, int flags)
772{
773 int err = security_socket_recvmsg(sock, msg, size, flags);
774
775 return err ?: __sock_recvmsg_nosec(iocb, sock, msg, size, flags);
776}
777
89bddce5 778int sock_recvmsg(struct socket *sock, struct msghdr *msg,
1da177e4
LT
779 size_t size, int flags)
780{
781 struct kiocb iocb;
782 struct sock_iocb siocb;
783 int ret;
784
89bddce5 785 init_sync_kiocb(&iocb, NULL);
1da177e4
LT
786 iocb.private = &siocb;
787 ret = __sock_recvmsg(&iocb, sock, msg, size, flags);
788 if (-EIOCBQUEUED == ret)
789 ret = wait_on_sync_kiocb(&iocb);
790 return ret;
791}
c6d409cf 792EXPORT_SYMBOL(sock_recvmsg);
1da177e4 793
a2e27255
ACM
794static int sock_recvmsg_nosec(struct socket *sock, struct msghdr *msg,
795 size_t size, int flags)
796{
797 struct kiocb iocb;
798 struct sock_iocb siocb;
799 int ret;
800
801 init_sync_kiocb(&iocb, NULL);
802 iocb.private = &siocb;
803 ret = __sock_recvmsg_nosec(&iocb, sock, msg, size, flags);
804 if (-EIOCBQUEUED == ret)
805 ret = wait_on_sync_kiocb(&iocb);
806 return ret;
807}
808
c1249c0a
ML
809/**
810 * kernel_recvmsg - Receive a message from a socket (kernel space)
811 * @sock: The socket to receive the message from
812 * @msg: Received message
813 * @vec: Input s/g array for message data
814 * @num: Size of input s/g array
815 * @size: Number of bytes to read
816 * @flags: Message flags (MSG_DONTWAIT, etc...)
817 *
818 * On return the msg structure contains the scatter/gather array passed in the
819 * vec argument. The array is modified so that it consists of the unfilled
820 * portion of the original array.
821 *
822 * The returned value is the total number of bytes received, or an error.
823 */
89bddce5
SH
824int kernel_recvmsg(struct socket *sock, struct msghdr *msg,
825 struct kvec *vec, size_t num, size_t size, int flags)
1da177e4
LT
826{
827 mm_segment_t oldfs = get_fs();
828 int result;
829
830 set_fs(KERNEL_DS);
831 /*
832 * the following is safe, since for compiler definitions of kvec and
833 * iovec are identical, yielding the same in-core layout and alignment
834 */
c0371da6 835 iov_iter_init(&msg->msg_iter, READ, (struct iovec *)vec, num, size);
1da177e4
LT
836 result = sock_recvmsg(sock, msg, size, flags);
837 set_fs(oldfs);
838 return result;
839}
c6d409cf 840EXPORT_SYMBOL(kernel_recvmsg);
1da177e4 841
ce1d4d3e
CH
842static ssize_t sock_sendpage(struct file *file, struct page *page,
843 int offset, size_t size, loff_t *ppos, int more)
1da177e4 844{
1da177e4
LT
845 struct socket *sock;
846 int flags;
847
ce1d4d3e
CH
848 sock = file->private_data;
849
35f9c09f
ED
850 flags = (file->f_flags & O_NONBLOCK) ? MSG_DONTWAIT : 0;
851 /* more is a combination of MSG_MORE and MSG_SENDPAGE_NOTLAST */
852 flags |= more;
ce1d4d3e 853
e6949583 854 return kernel_sendpage(sock, page, offset, size, flags);
ce1d4d3e 855}
1da177e4 856
9c55e01c 857static ssize_t sock_splice_read(struct file *file, loff_t *ppos,
c6d409cf 858 struct pipe_inode_info *pipe, size_t len,
9c55e01c
JA
859 unsigned int flags)
860{
861 struct socket *sock = file->private_data;
862
997b37da
RDC
863 if (unlikely(!sock->ops->splice_read))
864 return -EINVAL;
865
9c55e01c
JA
866 return sock->ops->splice_read(sock, ppos, pipe, len, flags);
867}
868
ce1d4d3e 869static struct sock_iocb *alloc_sock_iocb(struct kiocb *iocb,
89bddce5 870 struct sock_iocb *siocb)
ce1d4d3e 871{
ce1d4d3e 872 siocb->kiocb = iocb;
ce1d4d3e
CH
873 iocb->private = siocb;
874 return siocb;
1da177e4
LT
875}
876
ce1d4d3e 877static ssize_t do_sock_read(struct msghdr *msg, struct kiocb *iocb,
027445c3
BP
878 struct file *file, const struct iovec *iov,
879 unsigned long nr_segs)
ce1d4d3e
CH
880{
881 struct socket *sock = file->private_data;
882 size_t size = 0;
883 int i;
1da177e4 884
89bddce5
SH
885 for (i = 0; i < nr_segs; i++)
886 size += iov[i].iov_len;
1da177e4 887
ce1d4d3e
CH
888 msg->msg_name = NULL;
889 msg->msg_namelen = 0;
890 msg->msg_control = NULL;
891 msg->msg_controllen = 0;
c0371da6 892 iov_iter_init(&msg->msg_iter, READ, iov, nr_segs, size);
ce1d4d3e
CH
893 msg->msg_flags = (file->f_flags & O_NONBLOCK) ? MSG_DONTWAIT : 0;
894
895 return __sock_recvmsg(iocb, sock, msg, size, msg->msg_flags);
896}
897
027445c3
BP
898static ssize_t sock_aio_read(struct kiocb *iocb, const struct iovec *iov,
899 unsigned long nr_segs, loff_t pos)
ce1d4d3e
CH
900{
901 struct sock_iocb siocb, *x;
902
1da177e4
LT
903 if (pos != 0)
904 return -ESPIPE;
027445c3 905
73a7075e 906 if (iocb->ki_nbytes == 0) /* Match SYS5 behaviour */
1da177e4
LT
907 return 0;
908
027445c3
BP
909
910 x = alloc_sock_iocb(iocb, &siocb);
ce1d4d3e
CH
911 if (!x)
912 return -ENOMEM;
027445c3 913 return do_sock_read(&x->async_msg, iocb, iocb->ki_filp, iov, nr_segs);
1da177e4
LT
914}
915
ce1d4d3e 916static ssize_t do_sock_write(struct msghdr *msg, struct kiocb *iocb,
027445c3
BP
917 struct file *file, const struct iovec *iov,
918 unsigned long nr_segs)
1da177e4 919{
ce1d4d3e
CH
920 struct socket *sock = file->private_data;
921 size_t size = 0;
922 int i;
1da177e4 923
89bddce5
SH
924 for (i = 0; i < nr_segs; i++)
925 size += iov[i].iov_len;
1da177e4 926
ce1d4d3e
CH
927 msg->msg_name = NULL;
928 msg->msg_namelen = 0;
929 msg->msg_control = NULL;
930 msg->msg_controllen = 0;
c0371da6 931 iov_iter_init(&msg->msg_iter, WRITE, iov, nr_segs, size);
ce1d4d3e
CH
932 msg->msg_flags = (file->f_flags & O_NONBLOCK) ? MSG_DONTWAIT : 0;
933 if (sock->type == SOCK_SEQPACKET)
934 msg->msg_flags |= MSG_EOR;
1da177e4 935
ce1d4d3e 936 return __sock_sendmsg(iocb, sock, msg, size);
1da177e4
LT
937}
938
027445c3
BP
939static ssize_t sock_aio_write(struct kiocb *iocb, const struct iovec *iov,
940 unsigned long nr_segs, loff_t pos)
ce1d4d3e
CH
941{
942 struct sock_iocb siocb, *x;
1da177e4 943
ce1d4d3e
CH
944 if (pos != 0)
945 return -ESPIPE;
027445c3 946
027445c3 947 x = alloc_sock_iocb(iocb, &siocb);
ce1d4d3e
CH
948 if (!x)
949 return -ENOMEM;
1da177e4 950
027445c3 951 return do_sock_write(&x->async_msg, iocb, iocb->ki_filp, iov, nr_segs);
1da177e4
LT
952}
953
1da177e4
LT
954/*
955 * Atomic setting of ioctl hooks to avoid race
956 * with module unload.
957 */
958
4a3e2f71 959static DEFINE_MUTEX(br_ioctl_mutex);
c6d409cf 960static int (*br_ioctl_hook) (struct net *, unsigned int cmd, void __user *arg);
1da177e4 961
881d966b 962void brioctl_set(int (*hook) (struct net *, unsigned int, void __user *))
1da177e4 963{
4a3e2f71 964 mutex_lock(&br_ioctl_mutex);
1da177e4 965 br_ioctl_hook = hook;
4a3e2f71 966 mutex_unlock(&br_ioctl_mutex);
1da177e4
LT
967}
968EXPORT_SYMBOL(brioctl_set);
969
4a3e2f71 970static DEFINE_MUTEX(vlan_ioctl_mutex);
881d966b 971static int (*vlan_ioctl_hook) (struct net *, void __user *arg);
1da177e4 972
881d966b 973void vlan_ioctl_set(int (*hook) (struct net *, void __user *))
1da177e4 974{
4a3e2f71 975 mutex_lock(&vlan_ioctl_mutex);
1da177e4 976 vlan_ioctl_hook = hook;
4a3e2f71 977 mutex_unlock(&vlan_ioctl_mutex);
1da177e4
LT
978}
979EXPORT_SYMBOL(vlan_ioctl_set);
980
4a3e2f71 981static DEFINE_MUTEX(dlci_ioctl_mutex);
89bddce5 982static int (*dlci_ioctl_hook) (unsigned int, void __user *);
1da177e4 983
89bddce5 984void dlci_ioctl_set(int (*hook) (unsigned int, void __user *))
1da177e4 985{
4a3e2f71 986 mutex_lock(&dlci_ioctl_mutex);
1da177e4 987 dlci_ioctl_hook = hook;
4a3e2f71 988 mutex_unlock(&dlci_ioctl_mutex);
1da177e4
LT
989}
990EXPORT_SYMBOL(dlci_ioctl_set);
991
6b96018b
AB
992static long sock_do_ioctl(struct net *net, struct socket *sock,
993 unsigned int cmd, unsigned long arg)
994{
995 int err;
996 void __user *argp = (void __user *)arg;
997
998 err = sock->ops->ioctl(sock, cmd, arg);
999
1000 /*
1001 * If this ioctl is unknown try to hand it down
1002 * to the NIC driver.
1003 */
1004 if (err == -ENOIOCTLCMD)
1005 err = dev_ioctl(net, cmd, argp);
1006
1007 return err;
1008}
1009
1da177e4
LT
1010/*
1011 * With an ioctl, arg may well be a user mode pointer, but we don't know
1012 * what to do with it - that's up to the protocol still.
1013 */
1014
1015static long sock_ioctl(struct file *file, unsigned cmd, unsigned long arg)
1016{
1017 struct socket *sock;
881d966b 1018 struct sock *sk;
1da177e4
LT
1019 void __user *argp = (void __user *)arg;
1020 int pid, err;
881d966b 1021 struct net *net;
1da177e4 1022
b69aee04 1023 sock = file->private_data;
881d966b 1024 sk = sock->sk;
3b1e0a65 1025 net = sock_net(sk);
1da177e4 1026 if (cmd >= SIOCDEVPRIVATE && cmd <= (SIOCDEVPRIVATE + 15)) {
881d966b 1027 err = dev_ioctl(net, cmd, argp);
1da177e4 1028 } else
3d23e349 1029#ifdef CONFIG_WEXT_CORE
1da177e4 1030 if (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST) {
881d966b 1031 err = dev_ioctl(net, cmd, argp);
1da177e4 1032 } else
3d23e349 1033#endif
89bddce5 1034 switch (cmd) {
1da177e4
LT
1035 case FIOSETOWN:
1036 case SIOCSPGRP:
1037 err = -EFAULT;
1038 if (get_user(pid, (int __user *)argp))
1039 break;
e0b93edd
JL
1040 f_setown(sock->file, pid, 1);
1041 err = 0;
1da177e4
LT
1042 break;
1043 case FIOGETOWN:
1044 case SIOCGPGRP:
609d7fa9 1045 err = put_user(f_getown(sock->file),
89bddce5 1046 (int __user *)argp);
1da177e4
LT
1047 break;
1048 case SIOCGIFBR:
1049 case SIOCSIFBR:
1050 case SIOCBRADDBR:
1051 case SIOCBRDELBR:
1052 err = -ENOPKG;
1053 if (!br_ioctl_hook)
1054 request_module("bridge");
1055
4a3e2f71 1056 mutex_lock(&br_ioctl_mutex);
89bddce5 1057 if (br_ioctl_hook)
881d966b 1058 err = br_ioctl_hook(net, cmd, argp);
4a3e2f71 1059 mutex_unlock(&br_ioctl_mutex);
1da177e4
LT
1060 break;
1061 case SIOCGIFVLAN:
1062 case SIOCSIFVLAN:
1063 err = -ENOPKG;
1064 if (!vlan_ioctl_hook)
1065 request_module("8021q");
1066
4a3e2f71 1067 mutex_lock(&vlan_ioctl_mutex);
1da177e4 1068 if (vlan_ioctl_hook)
881d966b 1069 err = vlan_ioctl_hook(net, argp);
4a3e2f71 1070 mutex_unlock(&vlan_ioctl_mutex);
1da177e4 1071 break;
1da177e4
LT
1072 case SIOCADDDLCI:
1073 case SIOCDELDLCI:
1074 err = -ENOPKG;
1075 if (!dlci_ioctl_hook)
1076 request_module("dlci");
1077
7512cbf6
PE
1078 mutex_lock(&dlci_ioctl_mutex);
1079 if (dlci_ioctl_hook)
1da177e4 1080 err = dlci_ioctl_hook(cmd, argp);
7512cbf6 1081 mutex_unlock(&dlci_ioctl_mutex);
1da177e4
LT
1082 break;
1083 default:
6b96018b 1084 err = sock_do_ioctl(net, sock, cmd, arg);
1da177e4 1085 break;
89bddce5 1086 }
1da177e4
LT
1087 return err;
1088}
1089
1090int sock_create_lite(int family, int type, int protocol, struct socket **res)
1091{
1092 int err;
1093 struct socket *sock = NULL;
89bddce5 1094
1da177e4
LT
1095 err = security_socket_create(family, type, protocol, 1);
1096 if (err)
1097 goto out;
1098
1099 sock = sock_alloc();
1100 if (!sock) {
1101 err = -ENOMEM;
1102 goto out;
1103 }
1104
1da177e4 1105 sock->type = type;
7420ed23
VY
1106 err = security_socket_post_create(sock, family, type, protocol, 1);
1107 if (err)
1108 goto out_release;
1109
1da177e4
LT
1110out:
1111 *res = sock;
1112 return err;
7420ed23
VY
1113out_release:
1114 sock_release(sock);
1115 sock = NULL;
1116 goto out;
1da177e4 1117}
c6d409cf 1118EXPORT_SYMBOL(sock_create_lite);
1da177e4
LT
1119
1120/* No kernel lock held - perfect */
89bddce5 1121static unsigned int sock_poll(struct file *file, poll_table *wait)
1da177e4 1122{
cbf55001 1123 unsigned int busy_flag = 0;
1da177e4
LT
1124 struct socket *sock;
1125
1126 /*
89bddce5 1127 * We can't return errors to poll, so it's either yes or no.
1da177e4 1128 */
b69aee04 1129 sock = file->private_data;
2d48d67f 1130
cbf55001 1131 if (sk_can_busy_loop(sock->sk)) {
2d48d67f 1132 /* this socket can poll_ll so tell the system call */
cbf55001 1133 busy_flag = POLL_BUSY_LOOP;
2d48d67f
ET
1134
1135 /* once, only if requested by syscall */
cbf55001
ET
1136 if (wait && (wait->_key & POLL_BUSY_LOOP))
1137 sk_busy_loop(sock->sk, 1);
2d48d67f
ET
1138 }
1139
cbf55001 1140 return busy_flag | sock->ops->poll(file, sock, wait);
1da177e4
LT
1141}
1142
89bddce5 1143static int sock_mmap(struct file *file, struct vm_area_struct *vma)
1da177e4 1144{
b69aee04 1145 struct socket *sock = file->private_data;
1da177e4
LT
1146
1147 return sock->ops->mmap(file, sock, vma);
1148}
1149
20380731 1150static int sock_close(struct inode *inode, struct file *filp)
1da177e4 1151{
1da177e4
LT
1152 sock_release(SOCKET_I(inode));
1153 return 0;
1154}
1155
1156/*
1157 * Update the socket async list
1158 *
1159 * Fasync_list locking strategy.
1160 *
1161 * 1. fasync_list is modified only under process context socket lock
1162 * i.e. under semaphore.
1163 * 2. fasync_list is used under read_lock(&sk->sk_callback_lock)
989a2979 1164 * or under socket lock
1da177e4
LT
1165 */
1166
1167static int sock_fasync(int fd, struct file *filp, int on)
1168{
989a2979
ED
1169 struct socket *sock = filp->private_data;
1170 struct sock *sk = sock->sk;
eaefd110 1171 struct socket_wq *wq;
1da177e4 1172
989a2979 1173 if (sk == NULL)
1da177e4 1174 return -EINVAL;
1da177e4
LT
1175
1176 lock_sock(sk);
eaefd110
ED
1177 wq = rcu_dereference_protected(sock->wq, sock_owned_by_user(sk));
1178 fasync_helper(fd, filp, on, &wq->fasync_list);
1da177e4 1179
eaefd110 1180 if (!wq->fasync_list)
989a2979
ED
1181 sock_reset_flag(sk, SOCK_FASYNC);
1182 else
bcdce719 1183 sock_set_flag(sk, SOCK_FASYNC);
1da177e4 1184
989a2979 1185 release_sock(sk);
1da177e4
LT
1186 return 0;
1187}
1188
43815482 1189/* This function may be called only under socket lock or callback_lock or rcu_lock */
1da177e4
LT
1190
1191int sock_wake_async(struct socket *sock, int how, int band)
1192{
43815482
ED
1193 struct socket_wq *wq;
1194
1195 if (!sock)
1196 return -1;
1197 rcu_read_lock();
1198 wq = rcu_dereference(sock->wq);
1199 if (!wq || !wq->fasync_list) {
1200 rcu_read_unlock();
1da177e4 1201 return -1;
43815482 1202 }
89bddce5 1203 switch (how) {
8d8ad9d7 1204 case SOCK_WAKE_WAITD:
1da177e4
LT
1205 if (test_bit(SOCK_ASYNC_WAITDATA, &sock->flags))
1206 break;
1207 goto call_kill;
8d8ad9d7 1208 case SOCK_WAKE_SPACE:
1da177e4
LT
1209 if (!test_and_clear_bit(SOCK_ASYNC_NOSPACE, &sock->flags))
1210 break;
1211 /* fall through */
8d8ad9d7 1212 case SOCK_WAKE_IO:
89bddce5 1213call_kill:
43815482 1214 kill_fasync(&wq->fasync_list, SIGIO, band);
1da177e4 1215 break;
8d8ad9d7 1216 case SOCK_WAKE_URG:
43815482 1217 kill_fasync(&wq->fasync_list, SIGURG, band);
1da177e4 1218 }
43815482 1219 rcu_read_unlock();
1da177e4
LT
1220 return 0;
1221}
c6d409cf 1222EXPORT_SYMBOL(sock_wake_async);
1da177e4 1223
721db93a 1224int __sock_create(struct net *net, int family, int type, int protocol,
89bddce5 1225 struct socket **res, int kern)
1da177e4
LT
1226{
1227 int err;
1228 struct socket *sock;
55737fda 1229 const struct net_proto_family *pf;
1da177e4
LT
1230
1231 /*
89bddce5 1232 * Check protocol is in range
1da177e4
LT
1233 */
1234 if (family < 0 || family >= NPROTO)
1235 return -EAFNOSUPPORT;
1236 if (type < 0 || type >= SOCK_MAX)
1237 return -EINVAL;
1238
1239 /* Compatibility.
1240
1241 This uglymoron is moved from INET layer to here to avoid
1242 deadlock in module load.
1243 */
1244 if (family == PF_INET && type == SOCK_PACKET) {
89bddce5 1245 static int warned;
1da177e4
LT
1246 if (!warned) {
1247 warned = 1;
3410f22e
YY
1248 pr_info("%s uses obsolete (PF_INET,SOCK_PACKET)\n",
1249 current->comm);
1da177e4
LT
1250 }
1251 family = PF_PACKET;
1252 }
1253
1254 err = security_socket_create(family, type, protocol, kern);
1255 if (err)
1256 return err;
89bddce5 1257
55737fda
SH
1258 /*
1259 * Allocate the socket and allow the family to set things up. if
1260 * the protocol is 0, the family is instructed to select an appropriate
1261 * default.
1262 */
1263 sock = sock_alloc();
1264 if (!sock) {
e87cc472 1265 net_warn_ratelimited("socket: no more sockets\n");
55737fda
SH
1266 return -ENFILE; /* Not exactly a match, but its the
1267 closest posix thing */
1268 }
1269
1270 sock->type = type;
1271
95a5afca 1272#ifdef CONFIG_MODULES
89bddce5
SH
1273 /* Attempt to load a protocol module if the find failed.
1274 *
1275 * 12/09/1996 Marcin: But! this makes REALLY only sense, if the user
1da177e4
LT
1276 * requested real, full-featured networking support upon configuration.
1277 * Otherwise module support will break!
1278 */
190683a9 1279 if (rcu_access_pointer(net_families[family]) == NULL)
89bddce5 1280 request_module("net-pf-%d", family);
1da177e4
LT
1281#endif
1282
55737fda
SH
1283 rcu_read_lock();
1284 pf = rcu_dereference(net_families[family]);
1285 err = -EAFNOSUPPORT;
1286 if (!pf)
1287 goto out_release;
1da177e4
LT
1288
1289 /*
1290 * We will call the ->create function, that possibly is in a loadable
1291 * module, so we have to bump that loadable module refcnt first.
1292 */
55737fda 1293 if (!try_module_get(pf->owner))
1da177e4
LT
1294 goto out_release;
1295
55737fda
SH
1296 /* Now protected by module ref count */
1297 rcu_read_unlock();
1298
3f378b68 1299 err = pf->create(net, sock, protocol, kern);
55737fda 1300 if (err < 0)
1da177e4 1301 goto out_module_put;
a79af59e 1302
1da177e4
LT
1303 /*
1304 * Now to bump the refcnt of the [loadable] module that owns this
1305 * socket at sock_release time we decrement its refcnt.
1306 */
55737fda
SH
1307 if (!try_module_get(sock->ops->owner))
1308 goto out_module_busy;
1309
1da177e4
LT
1310 /*
1311 * Now that we're done with the ->create function, the [loadable]
1312 * module can have its refcnt decremented
1313 */
55737fda 1314 module_put(pf->owner);
7420ed23
VY
1315 err = security_socket_post_create(sock, family, type, protocol, kern);
1316 if (err)
3b185525 1317 goto out_sock_release;
55737fda 1318 *res = sock;
1da177e4 1319
55737fda
SH
1320 return 0;
1321
1322out_module_busy:
1323 err = -EAFNOSUPPORT;
1da177e4 1324out_module_put:
55737fda
SH
1325 sock->ops = NULL;
1326 module_put(pf->owner);
1327out_sock_release:
1da177e4 1328 sock_release(sock);
55737fda
SH
1329 return err;
1330
1331out_release:
1332 rcu_read_unlock();
1333 goto out_sock_release;
1da177e4 1334}
721db93a 1335EXPORT_SYMBOL(__sock_create);
1da177e4
LT
1336
1337int sock_create(int family, int type, int protocol, struct socket **res)
1338{
1b8d7ae4 1339 return __sock_create(current->nsproxy->net_ns, family, type, protocol, res, 0);
1da177e4 1340}
c6d409cf 1341EXPORT_SYMBOL(sock_create);
1da177e4
LT
1342
1343int sock_create_kern(int family, int type, int protocol, struct socket **res)
1344{
1b8d7ae4 1345 return __sock_create(&init_net, family, type, protocol, res, 1);
1da177e4 1346}
c6d409cf 1347EXPORT_SYMBOL(sock_create_kern);
1da177e4 1348
3e0fa65f 1349SYSCALL_DEFINE3(socket, int, family, int, type, int, protocol)
1da177e4
LT
1350{
1351 int retval;
1352 struct socket *sock;
a677a039
UD
1353 int flags;
1354
e38b36f3
UD
1355 /* Check the SOCK_* constants for consistency. */
1356 BUILD_BUG_ON(SOCK_CLOEXEC != O_CLOEXEC);
1357 BUILD_BUG_ON((SOCK_MAX | SOCK_TYPE_MASK) != SOCK_TYPE_MASK);
1358 BUILD_BUG_ON(SOCK_CLOEXEC & SOCK_TYPE_MASK);
1359 BUILD_BUG_ON(SOCK_NONBLOCK & SOCK_TYPE_MASK);
1360
a677a039 1361 flags = type & ~SOCK_TYPE_MASK;
77d27200 1362 if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
a677a039
UD
1363 return -EINVAL;
1364 type &= SOCK_TYPE_MASK;
1da177e4 1365
aaca0bdc
UD
1366 if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
1367 flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
1368
1da177e4
LT
1369 retval = sock_create(family, type, protocol, &sock);
1370 if (retval < 0)
1371 goto out;
1372
77d27200 1373 retval = sock_map_fd(sock, flags & (O_CLOEXEC | O_NONBLOCK));
1da177e4
LT
1374 if (retval < 0)
1375 goto out_release;
1376
1377out:
1378 /* It may be already another descriptor 8) Not kernel problem. */
1379 return retval;
1380
1381out_release:
1382 sock_release(sock);
1383 return retval;
1384}
1385
1386/*
1387 * Create a pair of connected sockets.
1388 */
1389
3e0fa65f
HC
1390SYSCALL_DEFINE4(socketpair, int, family, int, type, int, protocol,
1391 int __user *, usockvec)
1da177e4
LT
1392{
1393 struct socket *sock1, *sock2;
1394 int fd1, fd2, err;
db349509 1395 struct file *newfile1, *newfile2;
a677a039
UD
1396 int flags;
1397
1398 flags = type & ~SOCK_TYPE_MASK;
77d27200 1399 if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
a677a039
UD
1400 return -EINVAL;
1401 type &= SOCK_TYPE_MASK;
1da177e4 1402
aaca0bdc
UD
1403 if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
1404 flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
1405
1da177e4
LT
1406 /*
1407 * Obtain the first socket and check if the underlying protocol
1408 * supports the socketpair call.
1409 */
1410
1411 err = sock_create(family, type, protocol, &sock1);
1412 if (err < 0)
1413 goto out;
1414
1415 err = sock_create(family, type, protocol, &sock2);
1416 if (err < 0)
1417 goto out_release_1;
1418
1419 err = sock1->ops->socketpair(sock1, sock2);
89bddce5 1420 if (err < 0)
1da177e4
LT
1421 goto out_release_both;
1422
28407630 1423 fd1 = get_unused_fd_flags(flags);
bf3c23d1
DM
1424 if (unlikely(fd1 < 0)) {
1425 err = fd1;
db349509 1426 goto out_release_both;
bf3c23d1 1427 }
d73aa286 1428
28407630 1429 fd2 = get_unused_fd_flags(flags);
198de4d7
AV
1430 if (unlikely(fd2 < 0)) {
1431 err = fd2;
d73aa286 1432 goto out_put_unused_1;
28407630
AV
1433 }
1434
aab174f0 1435 newfile1 = sock_alloc_file(sock1, flags, NULL);
28407630
AV
1436 if (unlikely(IS_ERR(newfile1))) {
1437 err = PTR_ERR(newfile1);
d73aa286 1438 goto out_put_unused_both;
28407630
AV
1439 }
1440
aab174f0 1441 newfile2 = sock_alloc_file(sock2, flags, NULL);
28407630
AV
1442 if (IS_ERR(newfile2)) {
1443 err = PTR_ERR(newfile2);
d73aa286 1444 goto out_fput_1;
db349509
AV
1445 }
1446
d73aa286
YD
1447 err = put_user(fd1, &usockvec[0]);
1448 if (err)
1449 goto out_fput_both;
1450
1451 err = put_user(fd2, &usockvec[1]);
1452 if (err)
1453 goto out_fput_both;
1454
157cf649 1455 audit_fd_pair(fd1, fd2);
d73aa286 1456
db349509
AV
1457 fd_install(fd1, newfile1);
1458 fd_install(fd2, newfile2);
1da177e4
LT
1459 /* fd1 and fd2 may be already another descriptors.
1460 * Not kernel problem.
1461 */
1462
d73aa286 1463 return 0;
1da177e4 1464
d73aa286
YD
1465out_fput_both:
1466 fput(newfile2);
1467 fput(newfile1);
1468 put_unused_fd(fd2);
1469 put_unused_fd(fd1);
1470 goto out;
1471
1472out_fput_1:
1473 fput(newfile1);
1474 put_unused_fd(fd2);
1475 put_unused_fd(fd1);
1476 sock_release(sock2);
1477 goto out;
1da177e4 1478
d73aa286
YD
1479out_put_unused_both:
1480 put_unused_fd(fd2);
1481out_put_unused_1:
1482 put_unused_fd(fd1);
1da177e4 1483out_release_both:
89bddce5 1484 sock_release(sock2);
1da177e4 1485out_release_1:
89bddce5 1486 sock_release(sock1);
1da177e4
LT
1487out:
1488 return err;
1489}
1490
1da177e4
LT
1491/*
1492 * Bind a name to a socket. Nothing much to do here since it's
1493 * the protocol's responsibility to handle the local address.
1494 *
1495 * We move the socket address to kernel space before we call
1496 * the protocol layer (having also checked the address is ok).
1497 */
1498
20f37034 1499SYSCALL_DEFINE3(bind, int, fd, struct sockaddr __user *, umyaddr, int, addrlen)
1da177e4
LT
1500{
1501 struct socket *sock;
230b1839 1502 struct sockaddr_storage address;
6cb153ca 1503 int err, fput_needed;
1da177e4 1504
89bddce5 1505 sock = sockfd_lookup_light(fd, &err, &fput_needed);
e71a4783 1506 if (sock) {
43db362d 1507 err = move_addr_to_kernel(umyaddr, addrlen, &address);
89bddce5
SH
1508 if (err >= 0) {
1509 err = security_socket_bind(sock,
230b1839 1510 (struct sockaddr *)&address,
89bddce5 1511 addrlen);
6cb153ca
BL
1512 if (!err)
1513 err = sock->ops->bind(sock,
89bddce5 1514 (struct sockaddr *)
230b1839 1515 &address, addrlen);
1da177e4 1516 }
6cb153ca 1517 fput_light(sock->file, fput_needed);
89bddce5 1518 }
1da177e4
LT
1519 return err;
1520}
1521
1da177e4
LT
1522/*
1523 * Perform a listen. Basically, we allow the protocol to do anything
1524 * necessary for a listen, and if that works, we mark the socket as
1525 * ready for listening.
1526 */
1527
3e0fa65f 1528SYSCALL_DEFINE2(listen, int, fd, int, backlog)
1da177e4
LT
1529{
1530 struct socket *sock;
6cb153ca 1531 int err, fput_needed;
b8e1f9b5 1532 int somaxconn;
89bddce5
SH
1533
1534 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1535 if (sock) {
8efa6e93 1536 somaxconn = sock_net(sock->sk)->core.sysctl_somaxconn;
95c96174 1537 if ((unsigned int)backlog > somaxconn)
b8e1f9b5 1538 backlog = somaxconn;
1da177e4
LT
1539
1540 err = security_socket_listen(sock, backlog);
6cb153ca
BL
1541 if (!err)
1542 err = sock->ops->listen(sock, backlog);
1da177e4 1543
6cb153ca 1544 fput_light(sock->file, fput_needed);
1da177e4
LT
1545 }
1546 return err;
1547}
1548
1da177e4
LT
1549/*
1550 * For accept, we attempt to create a new socket, set up the link
1551 * with the client, wake up the client, then return the new
1552 * connected fd. We collect the address of the connector in kernel
1553 * space and move it to user at the very end. This is unclean because
1554 * we open the socket then return an error.
1555 *
1556 * 1003.1g adds the ability to recvmsg() to query connection pending
1557 * status to recvmsg. We need to add that support in a way thats
1558 * clean when we restucture accept also.
1559 */
1560
20f37034
HC
1561SYSCALL_DEFINE4(accept4, int, fd, struct sockaddr __user *, upeer_sockaddr,
1562 int __user *, upeer_addrlen, int, flags)
1da177e4
LT
1563{
1564 struct socket *sock, *newsock;
39d8c1b6 1565 struct file *newfile;
6cb153ca 1566 int err, len, newfd, fput_needed;
230b1839 1567 struct sockaddr_storage address;
1da177e4 1568
77d27200 1569 if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
aaca0bdc
UD
1570 return -EINVAL;
1571
1572 if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
1573 flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
1574
6cb153ca 1575 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4
LT
1576 if (!sock)
1577 goto out;
1578
1579 err = -ENFILE;
c6d409cf
ED
1580 newsock = sock_alloc();
1581 if (!newsock)
1da177e4
LT
1582 goto out_put;
1583
1584 newsock->type = sock->type;
1585 newsock->ops = sock->ops;
1586
1da177e4
LT
1587 /*
1588 * We don't need try_module_get here, as the listening socket (sock)
1589 * has the protocol module (sock->ops->owner) held.
1590 */
1591 __module_get(newsock->ops->owner);
1592
28407630 1593 newfd = get_unused_fd_flags(flags);
39d8c1b6
DM
1594 if (unlikely(newfd < 0)) {
1595 err = newfd;
9a1875e6
DM
1596 sock_release(newsock);
1597 goto out_put;
39d8c1b6 1598 }
aab174f0 1599 newfile = sock_alloc_file(newsock, flags, sock->sk->sk_prot_creator->name);
28407630
AV
1600 if (unlikely(IS_ERR(newfile))) {
1601 err = PTR_ERR(newfile);
1602 put_unused_fd(newfd);
1603 sock_release(newsock);
1604 goto out_put;
1605 }
39d8c1b6 1606
a79af59e
FF
1607 err = security_socket_accept(sock, newsock);
1608 if (err)
39d8c1b6 1609 goto out_fd;
a79af59e 1610
1da177e4
LT
1611 err = sock->ops->accept(sock, newsock, sock->file->f_flags);
1612 if (err < 0)
39d8c1b6 1613 goto out_fd;
1da177e4
LT
1614
1615 if (upeer_sockaddr) {
230b1839 1616 if (newsock->ops->getname(newsock, (struct sockaddr *)&address,
89bddce5 1617 &len, 2) < 0) {
1da177e4 1618 err = -ECONNABORTED;
39d8c1b6 1619 goto out_fd;
1da177e4 1620 }
43db362d 1621 err = move_addr_to_user(&address,
230b1839 1622 len, upeer_sockaddr, upeer_addrlen);
1da177e4 1623 if (err < 0)
39d8c1b6 1624 goto out_fd;
1da177e4
LT
1625 }
1626
1627 /* File flags are not inherited via accept() unlike another OSes. */
1628
39d8c1b6
DM
1629 fd_install(newfd, newfile);
1630 err = newfd;
1da177e4 1631
1da177e4 1632out_put:
6cb153ca 1633 fput_light(sock->file, fput_needed);
1da177e4
LT
1634out:
1635 return err;
39d8c1b6 1636out_fd:
9606a216 1637 fput(newfile);
39d8c1b6 1638 put_unused_fd(newfd);
1da177e4
LT
1639 goto out_put;
1640}
1641
20f37034
HC
1642SYSCALL_DEFINE3(accept, int, fd, struct sockaddr __user *, upeer_sockaddr,
1643 int __user *, upeer_addrlen)
aaca0bdc 1644{
de11defe 1645 return sys_accept4(fd, upeer_sockaddr, upeer_addrlen, 0);
aaca0bdc
UD
1646}
1647
1da177e4
LT
1648/*
1649 * Attempt to connect to a socket with the server address. The address
1650 * is in user space so we verify it is OK and move it to kernel space.
1651 *
1652 * For 1003.1g we need to add clean support for a bind to AF_UNSPEC to
1653 * break bindings
1654 *
1655 * NOTE: 1003.1g draft 6.3 is broken with respect to AX.25/NetROM and
1656 * other SEQPACKET protocols that take time to connect() as it doesn't
1657 * include the -EINPROGRESS status for such sockets.
1658 */
1659
20f37034
HC
1660SYSCALL_DEFINE3(connect, int, fd, struct sockaddr __user *, uservaddr,
1661 int, addrlen)
1da177e4
LT
1662{
1663 struct socket *sock;
230b1839 1664 struct sockaddr_storage address;
6cb153ca 1665 int err, fput_needed;
1da177e4 1666
6cb153ca 1667 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4
LT
1668 if (!sock)
1669 goto out;
43db362d 1670 err = move_addr_to_kernel(uservaddr, addrlen, &address);
1da177e4
LT
1671 if (err < 0)
1672 goto out_put;
1673
89bddce5 1674 err =
230b1839 1675 security_socket_connect(sock, (struct sockaddr *)&address, addrlen);
1da177e4
LT
1676 if (err)
1677 goto out_put;
1678
230b1839 1679 err = sock->ops->connect(sock, (struct sockaddr *)&address, addrlen,
1da177e4
LT
1680 sock->file->f_flags);
1681out_put:
6cb153ca 1682 fput_light(sock->file, fput_needed);
1da177e4
LT
1683out:
1684 return err;
1685}
1686
1687/*
1688 * Get the local address ('name') of a socket object. Move the obtained
1689 * name to user space.
1690 */
1691
20f37034
HC
1692SYSCALL_DEFINE3(getsockname, int, fd, struct sockaddr __user *, usockaddr,
1693 int __user *, usockaddr_len)
1da177e4
LT
1694{
1695 struct socket *sock;
230b1839 1696 struct sockaddr_storage address;
6cb153ca 1697 int len, err, fput_needed;
89bddce5 1698
6cb153ca 1699 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4
LT
1700 if (!sock)
1701 goto out;
1702
1703 err = security_socket_getsockname(sock);
1704 if (err)
1705 goto out_put;
1706
230b1839 1707 err = sock->ops->getname(sock, (struct sockaddr *)&address, &len, 0);
1da177e4
LT
1708 if (err)
1709 goto out_put;
43db362d 1710 err = move_addr_to_user(&address, len, usockaddr, usockaddr_len);
1da177e4
LT
1711
1712out_put:
6cb153ca 1713 fput_light(sock->file, fput_needed);
1da177e4
LT
1714out:
1715 return err;
1716}
1717
1718/*
1719 * Get the remote address ('name') of a socket object. Move the obtained
1720 * name to user space.
1721 */
1722
20f37034
HC
1723SYSCALL_DEFINE3(getpeername, int, fd, struct sockaddr __user *, usockaddr,
1724 int __user *, usockaddr_len)
1da177e4
LT
1725{
1726 struct socket *sock;
230b1839 1727 struct sockaddr_storage address;
6cb153ca 1728 int len, err, fput_needed;
1da177e4 1729
89bddce5
SH
1730 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1731 if (sock != NULL) {
1da177e4
LT
1732 err = security_socket_getpeername(sock);
1733 if (err) {
6cb153ca 1734 fput_light(sock->file, fput_needed);
1da177e4
LT
1735 return err;
1736 }
1737
89bddce5 1738 err =
230b1839 1739 sock->ops->getname(sock, (struct sockaddr *)&address, &len,
89bddce5 1740 1);
1da177e4 1741 if (!err)
43db362d 1742 err = move_addr_to_user(&address, len, usockaddr,
89bddce5 1743 usockaddr_len);
6cb153ca 1744 fput_light(sock->file, fput_needed);
1da177e4
LT
1745 }
1746 return err;
1747}
1748
1749/*
1750 * Send a datagram to a given address. We move the address into kernel
1751 * space and check the user space data area is readable before invoking
1752 * the protocol.
1753 */
1754
3e0fa65f 1755SYSCALL_DEFINE6(sendto, int, fd, void __user *, buff, size_t, len,
95c96174 1756 unsigned int, flags, struct sockaddr __user *, addr,
3e0fa65f 1757 int, addr_len)
1da177e4
LT
1758{
1759 struct socket *sock;
230b1839 1760 struct sockaddr_storage address;
1da177e4
LT
1761 int err;
1762 struct msghdr msg;
1763 struct iovec iov;
6cb153ca 1764 int fput_needed;
6cb153ca 1765
253eacc0
LT
1766 if (len > INT_MAX)
1767 len = INT_MAX;
de0fa95c
PE
1768 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1769 if (!sock)
4387ff75 1770 goto out;
6cb153ca 1771
89bddce5
SH
1772 iov.iov_base = buff;
1773 iov.iov_len = len;
1774 msg.msg_name = NULL;
c0371da6 1775 iov_iter_init(&msg.msg_iter, WRITE, &iov, 1, len);
89bddce5
SH
1776 msg.msg_control = NULL;
1777 msg.msg_controllen = 0;
1778 msg.msg_namelen = 0;
6cb153ca 1779 if (addr) {
43db362d 1780 err = move_addr_to_kernel(addr, addr_len, &address);
1da177e4
LT
1781 if (err < 0)
1782 goto out_put;
230b1839 1783 msg.msg_name = (struct sockaddr *)&address;
89bddce5 1784 msg.msg_namelen = addr_len;
1da177e4
LT
1785 }
1786 if (sock->file->f_flags & O_NONBLOCK)
1787 flags |= MSG_DONTWAIT;
1788 msg.msg_flags = flags;
1789 err = sock_sendmsg(sock, &msg, len);
1790
89bddce5 1791out_put:
de0fa95c 1792 fput_light(sock->file, fput_needed);
4387ff75 1793out:
1da177e4
LT
1794 return err;
1795}
1796
1797/*
89bddce5 1798 * Send a datagram down a socket.
1da177e4
LT
1799 */
1800
3e0fa65f 1801SYSCALL_DEFINE4(send, int, fd, void __user *, buff, size_t, len,
95c96174 1802 unsigned int, flags)
1da177e4
LT
1803{
1804 return sys_sendto(fd, buff, len, flags, NULL, 0);
1805}
1806
1807/*
89bddce5 1808 * Receive a frame from the socket and optionally record the address of the
1da177e4
LT
1809 * sender. We verify the buffers are writable and if needed move the
1810 * sender address from kernel to user space.
1811 */
1812
3e0fa65f 1813SYSCALL_DEFINE6(recvfrom, int, fd, void __user *, ubuf, size_t, size,
95c96174 1814 unsigned int, flags, struct sockaddr __user *, addr,
3e0fa65f 1815 int __user *, addr_len)
1da177e4
LT
1816{
1817 struct socket *sock;
1818 struct iovec iov;
1819 struct msghdr msg;
230b1839 1820 struct sockaddr_storage address;
89bddce5 1821 int err, err2;
6cb153ca
BL
1822 int fput_needed;
1823
253eacc0
LT
1824 if (size > INT_MAX)
1825 size = INT_MAX;
de0fa95c 1826 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4 1827 if (!sock)
de0fa95c 1828 goto out;
1da177e4 1829
89bddce5
SH
1830 msg.msg_control = NULL;
1831 msg.msg_controllen = 0;
89bddce5
SH
1832 iov.iov_len = size;
1833 iov.iov_base = ubuf;
c0371da6 1834 iov_iter_init(&msg.msg_iter, READ, &iov, 1, size);
f3d33426
HFS
1835 /* Save some cycles and don't copy the address if not needed */
1836 msg.msg_name = addr ? (struct sockaddr *)&address : NULL;
1837 /* We assume all kernel code knows the size of sockaddr_storage */
1838 msg.msg_namelen = 0;
1da177e4
LT
1839 if (sock->file->f_flags & O_NONBLOCK)
1840 flags |= MSG_DONTWAIT;
89bddce5 1841 err = sock_recvmsg(sock, &msg, size, flags);
1da177e4 1842
89bddce5 1843 if (err >= 0 && addr != NULL) {
43db362d 1844 err2 = move_addr_to_user(&address,
230b1839 1845 msg.msg_namelen, addr, addr_len);
89bddce5
SH
1846 if (err2 < 0)
1847 err = err2;
1da177e4 1848 }
de0fa95c
PE
1849
1850 fput_light(sock->file, fput_needed);
4387ff75 1851out:
1da177e4
LT
1852 return err;
1853}
1854
1855/*
89bddce5 1856 * Receive a datagram from a socket.
1da177e4
LT
1857 */
1858
b7c0ddf5
JG
1859SYSCALL_DEFINE4(recv, int, fd, void __user *, ubuf, size_t, size,
1860 unsigned int, flags)
1da177e4
LT
1861{
1862 return sys_recvfrom(fd, ubuf, size, flags, NULL, NULL);
1863}
1864
1865/*
1866 * Set a socket option. Because we don't know the option lengths we have
1867 * to pass the user mode parameter for the protocols to sort out.
1868 */
1869
20f37034
HC
1870SYSCALL_DEFINE5(setsockopt, int, fd, int, level, int, optname,
1871 char __user *, optval, int, optlen)
1da177e4 1872{
6cb153ca 1873 int err, fput_needed;
1da177e4
LT
1874 struct socket *sock;
1875
1876 if (optlen < 0)
1877 return -EINVAL;
89bddce5
SH
1878
1879 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1880 if (sock != NULL) {
1881 err = security_socket_setsockopt(sock, level, optname);
6cb153ca
BL
1882 if (err)
1883 goto out_put;
1da177e4
LT
1884
1885 if (level == SOL_SOCKET)
89bddce5
SH
1886 err =
1887 sock_setsockopt(sock, level, optname, optval,
1888 optlen);
1da177e4 1889 else
89bddce5
SH
1890 err =
1891 sock->ops->setsockopt(sock, level, optname, optval,
1892 optlen);
6cb153ca
BL
1893out_put:
1894 fput_light(sock->file, fput_needed);
1da177e4
LT
1895 }
1896 return err;
1897}
1898
1899/*
1900 * Get a socket option. Because we don't know the option lengths we have
1901 * to pass a user mode parameter for the protocols to sort out.
1902 */
1903
20f37034
HC
1904SYSCALL_DEFINE5(getsockopt, int, fd, int, level, int, optname,
1905 char __user *, optval, int __user *, optlen)
1da177e4 1906{
6cb153ca 1907 int err, fput_needed;
1da177e4
LT
1908 struct socket *sock;
1909
89bddce5
SH
1910 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1911 if (sock != NULL) {
6cb153ca
BL
1912 err = security_socket_getsockopt(sock, level, optname);
1913 if (err)
1914 goto out_put;
1da177e4
LT
1915
1916 if (level == SOL_SOCKET)
89bddce5
SH
1917 err =
1918 sock_getsockopt(sock, level, optname, optval,
1919 optlen);
1da177e4 1920 else
89bddce5
SH
1921 err =
1922 sock->ops->getsockopt(sock, level, optname, optval,
1923 optlen);
6cb153ca
BL
1924out_put:
1925 fput_light(sock->file, fput_needed);
1da177e4
LT
1926 }
1927 return err;
1928}
1929
1da177e4
LT
1930/*
1931 * Shutdown a socket.
1932 */
1933
754fe8d2 1934SYSCALL_DEFINE2(shutdown, int, fd, int, how)
1da177e4 1935{
6cb153ca 1936 int err, fput_needed;
1da177e4
LT
1937 struct socket *sock;
1938
89bddce5
SH
1939 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1940 if (sock != NULL) {
1da177e4 1941 err = security_socket_shutdown(sock, how);
6cb153ca
BL
1942 if (!err)
1943 err = sock->ops->shutdown(sock, how);
1944 fput_light(sock->file, fput_needed);
1da177e4
LT
1945 }
1946 return err;
1947}
1948
89bddce5 1949/* A couple of helpful macros for getting the address of the 32/64 bit
1da177e4
LT
1950 * fields which are the same type (int / unsigned) on our platforms.
1951 */
1952#define COMPAT_MSG(msg, member) ((MSG_CMSG_COMPAT & flags) ? &msg##_compat->member : &msg->member)
1953#define COMPAT_NAMELEN(msg) COMPAT_MSG(msg, msg_namelen)
1954#define COMPAT_FLAGS(msg) COMPAT_MSG(msg, msg_flags)
1955
c71d8ebe
TH
1956struct used_address {
1957 struct sockaddr_storage name;
1958 unsigned int name_len;
1959};
1960
08adb7da
AV
1961static ssize_t copy_msghdr_from_user(struct msghdr *kmsg,
1962 struct user_msghdr __user *umsg,
1963 struct sockaddr __user **save_addr,
1964 struct iovec **iov)
1661bf36 1965{
08adb7da
AV
1966 struct sockaddr __user *uaddr;
1967 struct iovec __user *uiov;
c0371da6 1968 size_t nr_segs;
08adb7da
AV
1969 ssize_t err;
1970
1971 if (!access_ok(VERIFY_READ, umsg, sizeof(*umsg)) ||
1972 __get_user(uaddr, &umsg->msg_name) ||
1973 __get_user(kmsg->msg_namelen, &umsg->msg_namelen) ||
1974 __get_user(uiov, &umsg->msg_iov) ||
c0371da6 1975 __get_user(nr_segs, &umsg->msg_iovlen) ||
08adb7da
AV
1976 __get_user(kmsg->msg_control, &umsg->msg_control) ||
1977 __get_user(kmsg->msg_controllen, &umsg->msg_controllen) ||
1978 __get_user(kmsg->msg_flags, &umsg->msg_flags))
1661bf36 1979 return -EFAULT;
dbb490b9 1980
08adb7da 1981 if (!uaddr)
6a2a2b3a
AS
1982 kmsg->msg_namelen = 0;
1983
dbb490b9
ML
1984 if (kmsg->msg_namelen < 0)
1985 return -EINVAL;
1986
1661bf36 1987 if (kmsg->msg_namelen > sizeof(struct sockaddr_storage))
db31c55a 1988 kmsg->msg_namelen = sizeof(struct sockaddr_storage);
08adb7da
AV
1989
1990 if (save_addr)
1991 *save_addr = uaddr;
1992
1993 if (uaddr && kmsg->msg_namelen) {
1994 if (!save_addr) {
1995 err = move_addr_to_kernel(uaddr, kmsg->msg_namelen,
1996 kmsg->msg_name);
1997 if (err < 0)
1998 return err;
1999 }
2000 } else {
2001 kmsg->msg_name = NULL;
2002 kmsg->msg_namelen = 0;
2003 }
2004
c0371da6 2005 if (nr_segs > UIO_MAXIOV)
08adb7da
AV
2006 return -EMSGSIZE;
2007
2008 err = rw_copy_check_uvector(save_addr ? READ : WRITE,
c0371da6 2009 uiov, nr_segs,
08adb7da
AV
2010 UIO_FASTIOV, *iov, iov);
2011 if (err >= 0)
c0371da6
AV
2012 iov_iter_init(&kmsg->msg_iter, save_addr ? READ : WRITE,
2013 *iov, nr_segs, err);
08adb7da 2014 return err;
1661bf36
DC
2015}
2016
666547ff 2017static int ___sys_sendmsg(struct socket *sock, struct user_msghdr __user *msg,
95c96174 2018 struct msghdr *msg_sys, unsigned int flags,
c71d8ebe 2019 struct used_address *used_address)
1da177e4 2020{
89bddce5
SH
2021 struct compat_msghdr __user *msg_compat =
2022 (struct compat_msghdr __user *)msg;
230b1839 2023 struct sockaddr_storage address;
1da177e4 2024 struct iovec iovstack[UIO_FASTIOV], *iov = iovstack;
b9d717a7 2025 unsigned char ctl[sizeof(struct cmsghdr) + 20]
89bddce5
SH
2026 __attribute__ ((aligned(sizeof(__kernel_size_t))));
2027 /* 20 is size of ipv6_pktinfo */
1da177e4 2028 unsigned char *ctl_buf = ctl;
08adb7da
AV
2029 int ctl_len, total_len;
2030 ssize_t err;
89bddce5 2031
08adb7da 2032 msg_sys->msg_name = &address;
1da177e4 2033
08449320 2034 if (MSG_CMSG_COMPAT & flags)
08adb7da 2035 err = get_compat_msghdr(msg_sys, msg_compat, NULL, &iov);
08449320 2036 else
08adb7da 2037 err = copy_msghdr_from_user(msg_sys, msg, NULL, &iov);
89bddce5 2038 if (err < 0)
1da177e4
LT
2039 goto out_freeiov;
2040 total_len = err;
2041
2042 err = -ENOBUFS;
2043
228e548e 2044 if (msg_sys->msg_controllen > INT_MAX)
1da177e4 2045 goto out_freeiov;
228e548e 2046 ctl_len = msg_sys->msg_controllen;
1da177e4 2047 if ((MSG_CMSG_COMPAT & flags) && ctl_len) {
89bddce5 2048 err =
228e548e 2049 cmsghdr_from_user_compat_to_kern(msg_sys, sock->sk, ctl,
89bddce5 2050 sizeof(ctl));
1da177e4
LT
2051 if (err)
2052 goto out_freeiov;
228e548e
AB
2053 ctl_buf = msg_sys->msg_control;
2054 ctl_len = msg_sys->msg_controllen;
1da177e4 2055 } else if (ctl_len) {
89bddce5 2056 if (ctl_len > sizeof(ctl)) {
1da177e4 2057 ctl_buf = sock_kmalloc(sock->sk, ctl_len, GFP_KERNEL);
89bddce5 2058 if (ctl_buf == NULL)
1da177e4
LT
2059 goto out_freeiov;
2060 }
2061 err = -EFAULT;
2062 /*
228e548e 2063 * Careful! Before this, msg_sys->msg_control contains a user pointer.
1da177e4
LT
2064 * Afterwards, it will be a kernel pointer. Thus the compiler-assisted
2065 * checking falls down on this.
2066 */
fb8621bb 2067 if (copy_from_user(ctl_buf,
228e548e 2068 (void __user __force *)msg_sys->msg_control,
89bddce5 2069 ctl_len))
1da177e4 2070 goto out_freectl;
228e548e 2071 msg_sys->msg_control = ctl_buf;
1da177e4 2072 }
228e548e 2073 msg_sys->msg_flags = flags;
1da177e4
LT
2074
2075 if (sock->file->f_flags & O_NONBLOCK)
228e548e 2076 msg_sys->msg_flags |= MSG_DONTWAIT;
c71d8ebe
TH
2077 /*
2078 * If this is sendmmsg() and current destination address is same as
2079 * previously succeeded address, omit asking LSM's decision.
2080 * used_address->name_len is initialized to UINT_MAX so that the first
2081 * destination address never matches.
2082 */
bc909d9d
MD
2083 if (used_address && msg_sys->msg_name &&
2084 used_address->name_len == msg_sys->msg_namelen &&
2085 !memcmp(&used_address->name, msg_sys->msg_name,
c71d8ebe
TH
2086 used_address->name_len)) {
2087 err = sock_sendmsg_nosec(sock, msg_sys, total_len);
2088 goto out_freectl;
2089 }
2090 err = sock_sendmsg(sock, msg_sys, total_len);
2091 /*
2092 * If this is sendmmsg() and sending to current destination address was
2093 * successful, remember it.
2094 */
2095 if (used_address && err >= 0) {
2096 used_address->name_len = msg_sys->msg_namelen;
bc909d9d
MD
2097 if (msg_sys->msg_name)
2098 memcpy(&used_address->name, msg_sys->msg_name,
2099 used_address->name_len);
c71d8ebe 2100 }
1da177e4
LT
2101
2102out_freectl:
89bddce5 2103 if (ctl_buf != ctl)
1da177e4
LT
2104 sock_kfree_s(sock->sk, ctl_buf, ctl_len);
2105out_freeiov:
2106 if (iov != iovstack)
a74e9106 2107 kfree(iov);
228e548e
AB
2108 return err;
2109}
2110
2111/*
2112 * BSD sendmsg interface
2113 */
2114
666547ff 2115long __sys_sendmsg(int fd, struct user_msghdr __user *msg, unsigned flags)
228e548e
AB
2116{
2117 int fput_needed, err;
2118 struct msghdr msg_sys;
1be374a0
AL
2119 struct socket *sock;
2120
1be374a0 2121 sock = sockfd_lookup_light(fd, &err, &fput_needed);
228e548e
AB
2122 if (!sock)
2123 goto out;
2124
a7526eb5 2125 err = ___sys_sendmsg(sock, msg, &msg_sys, flags, NULL);
228e548e 2126
6cb153ca 2127 fput_light(sock->file, fput_needed);
89bddce5 2128out:
1da177e4
LT
2129 return err;
2130}
2131
666547ff 2132SYSCALL_DEFINE3(sendmsg, int, fd, struct user_msghdr __user *, msg, unsigned int, flags)
a7526eb5
AL
2133{
2134 if (flags & MSG_CMSG_COMPAT)
2135 return -EINVAL;
2136 return __sys_sendmsg(fd, msg, flags);
2137}
2138
228e548e
AB
2139/*
2140 * Linux sendmmsg interface
2141 */
2142
2143int __sys_sendmmsg(int fd, struct mmsghdr __user *mmsg, unsigned int vlen,
2144 unsigned int flags)
2145{
2146 int fput_needed, err, datagrams;
2147 struct socket *sock;
2148 struct mmsghdr __user *entry;
2149 struct compat_mmsghdr __user *compat_entry;
2150 struct msghdr msg_sys;
c71d8ebe 2151 struct used_address used_address;
228e548e 2152
98382f41
AB
2153 if (vlen > UIO_MAXIOV)
2154 vlen = UIO_MAXIOV;
228e548e
AB
2155
2156 datagrams = 0;
2157
2158 sock = sockfd_lookup_light(fd, &err, &fput_needed);
2159 if (!sock)
2160 return err;
2161
c71d8ebe 2162 used_address.name_len = UINT_MAX;
228e548e
AB
2163 entry = mmsg;
2164 compat_entry = (struct compat_mmsghdr __user *)mmsg;
728ffb86 2165 err = 0;
228e548e
AB
2166
2167 while (datagrams < vlen) {
228e548e 2168 if (MSG_CMSG_COMPAT & flags) {
666547ff 2169 err = ___sys_sendmsg(sock, (struct user_msghdr __user *)compat_entry,
a7526eb5 2170 &msg_sys, flags, &used_address);
228e548e
AB
2171 if (err < 0)
2172 break;
2173 err = __put_user(err, &compat_entry->msg_len);
2174 ++compat_entry;
2175 } else {
a7526eb5 2176 err = ___sys_sendmsg(sock,
666547ff 2177 (struct user_msghdr __user *)entry,
a7526eb5 2178 &msg_sys, flags, &used_address);
228e548e
AB
2179 if (err < 0)
2180 break;
2181 err = put_user(err, &entry->msg_len);
2182 ++entry;
2183 }
2184
2185 if (err)
2186 break;
2187 ++datagrams;
2188 }
2189
228e548e
AB
2190 fput_light(sock->file, fput_needed);
2191
728ffb86
AB
2192 /* We only return an error if no datagrams were able to be sent */
2193 if (datagrams != 0)
228e548e
AB
2194 return datagrams;
2195
228e548e
AB
2196 return err;
2197}
2198
2199SYSCALL_DEFINE4(sendmmsg, int, fd, struct mmsghdr __user *, mmsg,
2200 unsigned int, vlen, unsigned int, flags)
2201{
1be374a0
AL
2202 if (flags & MSG_CMSG_COMPAT)
2203 return -EINVAL;
228e548e
AB
2204 return __sys_sendmmsg(fd, mmsg, vlen, flags);
2205}
2206
666547ff 2207static int ___sys_recvmsg(struct socket *sock, struct user_msghdr __user *msg,
95c96174 2208 struct msghdr *msg_sys, unsigned int flags, int nosec)
1da177e4 2209{
89bddce5
SH
2210 struct compat_msghdr __user *msg_compat =
2211 (struct compat_msghdr __user *)msg;
1da177e4 2212 struct iovec iovstack[UIO_FASTIOV];
89bddce5 2213 struct iovec *iov = iovstack;
1da177e4 2214 unsigned long cmsg_ptr;
08adb7da
AV
2215 int total_len, len;
2216 ssize_t err;
1da177e4
LT
2217
2218 /* kernel mode address */
230b1839 2219 struct sockaddr_storage addr;
1da177e4
LT
2220
2221 /* user mode address pointers */
2222 struct sockaddr __user *uaddr;
08adb7da 2223 int __user *uaddr_len = COMPAT_NAMELEN(msg);
89bddce5 2224
08adb7da 2225 msg_sys->msg_name = &addr;
1da177e4 2226
f3d33426 2227 if (MSG_CMSG_COMPAT & flags)
08adb7da 2228 err = get_compat_msghdr(msg_sys, msg_compat, &uaddr, &iov);
f3d33426 2229 else
08adb7da 2230 err = copy_msghdr_from_user(msg_sys, msg, &uaddr, &iov);
1da177e4
LT
2231 if (err < 0)
2232 goto out_freeiov;
89bddce5 2233 total_len = err;
1da177e4 2234
a2e27255
ACM
2235 cmsg_ptr = (unsigned long)msg_sys->msg_control;
2236 msg_sys->msg_flags = flags & (MSG_CMSG_CLOEXEC|MSG_CMSG_COMPAT);
89bddce5 2237
f3d33426
HFS
2238 /* We assume all kernel code knows the size of sockaddr_storage */
2239 msg_sys->msg_namelen = 0;
2240
1da177e4
LT
2241 if (sock->file->f_flags & O_NONBLOCK)
2242 flags |= MSG_DONTWAIT;
a2e27255
ACM
2243 err = (nosec ? sock_recvmsg_nosec : sock_recvmsg)(sock, msg_sys,
2244 total_len, flags);
1da177e4
LT
2245 if (err < 0)
2246 goto out_freeiov;
2247 len = err;
2248
2249 if (uaddr != NULL) {
43db362d 2250 err = move_addr_to_user(&addr,
a2e27255 2251 msg_sys->msg_namelen, uaddr,
89bddce5 2252 uaddr_len);
1da177e4
LT
2253 if (err < 0)
2254 goto out_freeiov;
2255 }
a2e27255 2256 err = __put_user((msg_sys->msg_flags & ~MSG_CMSG_COMPAT),
37f7f421 2257 COMPAT_FLAGS(msg));
1da177e4
LT
2258 if (err)
2259 goto out_freeiov;
2260 if (MSG_CMSG_COMPAT & flags)
a2e27255 2261 err = __put_user((unsigned long)msg_sys->msg_control - cmsg_ptr,
1da177e4
LT
2262 &msg_compat->msg_controllen);
2263 else
a2e27255 2264 err = __put_user((unsigned long)msg_sys->msg_control - cmsg_ptr,
1da177e4
LT
2265 &msg->msg_controllen);
2266 if (err)
2267 goto out_freeiov;
2268 err = len;
2269
2270out_freeiov:
2271 if (iov != iovstack)
a74e9106 2272 kfree(iov);
a2e27255
ACM
2273 return err;
2274}
2275
2276/*
2277 * BSD recvmsg interface
2278 */
2279
666547ff 2280long __sys_recvmsg(int fd, struct user_msghdr __user *msg, unsigned flags)
a2e27255
ACM
2281{
2282 int fput_needed, err;
2283 struct msghdr msg_sys;
1be374a0
AL
2284 struct socket *sock;
2285
1be374a0 2286 sock = sockfd_lookup_light(fd, &err, &fput_needed);
a2e27255
ACM
2287 if (!sock)
2288 goto out;
2289
a7526eb5 2290 err = ___sys_recvmsg(sock, msg, &msg_sys, flags, 0);
a2e27255 2291
6cb153ca 2292 fput_light(sock->file, fput_needed);
1da177e4
LT
2293out:
2294 return err;
2295}
2296
666547ff 2297SYSCALL_DEFINE3(recvmsg, int, fd, struct user_msghdr __user *, msg,
a7526eb5
AL
2298 unsigned int, flags)
2299{
2300 if (flags & MSG_CMSG_COMPAT)
2301 return -EINVAL;
2302 return __sys_recvmsg(fd, msg, flags);
2303}
2304
a2e27255
ACM
2305/*
2306 * Linux recvmmsg interface
2307 */
2308
2309int __sys_recvmmsg(int fd, struct mmsghdr __user *mmsg, unsigned int vlen,
2310 unsigned int flags, struct timespec *timeout)
2311{
2312 int fput_needed, err, datagrams;
2313 struct socket *sock;
2314 struct mmsghdr __user *entry;
d7256d0e 2315 struct compat_mmsghdr __user *compat_entry;
a2e27255
ACM
2316 struct msghdr msg_sys;
2317 struct timespec end_time;
2318
2319 if (timeout &&
2320 poll_select_set_timeout(&end_time, timeout->tv_sec,
2321 timeout->tv_nsec))
2322 return -EINVAL;
2323
2324 datagrams = 0;
2325
2326 sock = sockfd_lookup_light(fd, &err, &fput_needed);
2327 if (!sock)
2328 return err;
2329
2330 err = sock_error(sock->sk);
2331 if (err)
2332 goto out_put;
2333
2334 entry = mmsg;
d7256d0e 2335 compat_entry = (struct compat_mmsghdr __user *)mmsg;
a2e27255
ACM
2336
2337 while (datagrams < vlen) {
2338 /*
2339 * No need to ask LSM for more than the first datagram.
2340 */
d7256d0e 2341 if (MSG_CMSG_COMPAT & flags) {
666547ff 2342 err = ___sys_recvmsg(sock, (struct user_msghdr __user *)compat_entry,
a7526eb5
AL
2343 &msg_sys, flags & ~MSG_WAITFORONE,
2344 datagrams);
d7256d0e
JMG
2345 if (err < 0)
2346 break;
2347 err = __put_user(err, &compat_entry->msg_len);
2348 ++compat_entry;
2349 } else {
a7526eb5 2350 err = ___sys_recvmsg(sock,
666547ff 2351 (struct user_msghdr __user *)entry,
a7526eb5
AL
2352 &msg_sys, flags & ~MSG_WAITFORONE,
2353 datagrams);
d7256d0e
JMG
2354 if (err < 0)
2355 break;
2356 err = put_user(err, &entry->msg_len);
2357 ++entry;
2358 }
2359
a2e27255
ACM
2360 if (err)
2361 break;
a2e27255
ACM
2362 ++datagrams;
2363
71c5c159
BB
2364 /* MSG_WAITFORONE turns on MSG_DONTWAIT after one packet */
2365 if (flags & MSG_WAITFORONE)
2366 flags |= MSG_DONTWAIT;
2367
a2e27255
ACM
2368 if (timeout) {
2369 ktime_get_ts(timeout);
2370 *timeout = timespec_sub(end_time, *timeout);
2371 if (timeout->tv_sec < 0) {
2372 timeout->tv_sec = timeout->tv_nsec = 0;
2373 break;
2374 }
2375
2376 /* Timeout, return less than vlen datagrams */
2377 if (timeout->tv_nsec == 0 && timeout->tv_sec == 0)
2378 break;
2379 }
2380
2381 /* Out of band data, return right away */
2382 if (msg_sys.msg_flags & MSG_OOB)
2383 break;
2384 }
2385
2386out_put:
2387 fput_light(sock->file, fput_needed);
1da177e4 2388
a2e27255
ACM
2389 if (err == 0)
2390 return datagrams;
2391
2392 if (datagrams != 0) {
2393 /*
2394 * We may return less entries than requested (vlen) if the
2395 * sock is non block and there aren't enough datagrams...
2396 */
2397 if (err != -EAGAIN) {
2398 /*
2399 * ... or if recvmsg returns an error after we
2400 * received some datagrams, where we record the
2401 * error to return on the next call or if the
2402 * app asks about it using getsockopt(SO_ERROR).
2403 */
2404 sock->sk->sk_err = -err;
2405 }
2406
2407 return datagrams;
2408 }
2409
2410 return err;
2411}
2412
2413SYSCALL_DEFINE5(recvmmsg, int, fd, struct mmsghdr __user *, mmsg,
2414 unsigned int, vlen, unsigned int, flags,
2415 struct timespec __user *, timeout)
2416{
2417 int datagrams;
2418 struct timespec timeout_sys;
2419
1be374a0
AL
2420 if (flags & MSG_CMSG_COMPAT)
2421 return -EINVAL;
2422
a2e27255
ACM
2423 if (!timeout)
2424 return __sys_recvmmsg(fd, mmsg, vlen, flags, NULL);
2425
2426 if (copy_from_user(&timeout_sys, timeout, sizeof(timeout_sys)))
2427 return -EFAULT;
2428
2429 datagrams = __sys_recvmmsg(fd, mmsg, vlen, flags, &timeout_sys);
2430
2431 if (datagrams > 0 &&
2432 copy_to_user(timeout, &timeout_sys, sizeof(timeout_sys)))
2433 datagrams = -EFAULT;
2434
2435 return datagrams;
2436}
2437
2438#ifdef __ARCH_WANT_SYS_SOCKETCALL
1da177e4
LT
2439/* Argument list sizes for sys_socketcall */
2440#define AL(x) ((x) * sizeof(unsigned long))
228e548e 2441static const unsigned char nargs[21] = {
c6d409cf
ED
2442 AL(0), AL(3), AL(3), AL(3), AL(2), AL(3),
2443 AL(3), AL(3), AL(4), AL(4), AL(4), AL(6),
2444 AL(6), AL(2), AL(5), AL(5), AL(3), AL(3),
228e548e 2445 AL(4), AL(5), AL(4)
89bddce5
SH
2446};
2447
1da177e4
LT
2448#undef AL
2449
2450/*
89bddce5 2451 * System call vectors.
1da177e4
LT
2452 *
2453 * Argument checking cleaned up. Saved 20% in size.
2454 * This function doesn't need to set the kernel lock because
89bddce5 2455 * it is set by the callees.
1da177e4
LT
2456 */
2457
3e0fa65f 2458SYSCALL_DEFINE2(socketcall, int, call, unsigned long __user *, args)
1da177e4 2459{
2950fa9d 2460 unsigned long a[AUDITSC_ARGS];
89bddce5 2461 unsigned long a0, a1;
1da177e4 2462 int err;
47379052 2463 unsigned int len;
1da177e4 2464
228e548e 2465 if (call < 1 || call > SYS_SENDMMSG)
1da177e4
LT
2466 return -EINVAL;
2467
47379052
AV
2468 len = nargs[call];
2469 if (len > sizeof(a))
2470 return -EINVAL;
2471
1da177e4 2472 /* copy_from_user should be SMP safe. */
47379052 2473 if (copy_from_user(a, args, len))
1da177e4 2474 return -EFAULT;
3ec3b2fb 2475
2950fa9d
CG
2476 err = audit_socketcall(nargs[call] / sizeof(unsigned long), a);
2477 if (err)
2478 return err;
3ec3b2fb 2479
89bddce5
SH
2480 a0 = a[0];
2481 a1 = a[1];
2482
2483 switch (call) {
2484 case SYS_SOCKET:
2485 err = sys_socket(a0, a1, a[2]);
2486 break;
2487 case SYS_BIND:
2488 err = sys_bind(a0, (struct sockaddr __user *)a1, a[2]);
2489 break;
2490 case SYS_CONNECT:
2491 err = sys_connect(a0, (struct sockaddr __user *)a1, a[2]);
2492 break;
2493 case SYS_LISTEN:
2494 err = sys_listen(a0, a1);
2495 break;
2496 case SYS_ACCEPT:
de11defe
UD
2497 err = sys_accept4(a0, (struct sockaddr __user *)a1,
2498 (int __user *)a[2], 0);
89bddce5
SH
2499 break;
2500 case SYS_GETSOCKNAME:
2501 err =
2502 sys_getsockname(a0, (struct sockaddr __user *)a1,
2503 (int __user *)a[2]);
2504 break;
2505 case SYS_GETPEERNAME:
2506 err =
2507 sys_getpeername(a0, (struct sockaddr __user *)a1,
2508 (int __user *)a[2]);
2509 break;
2510 case SYS_SOCKETPAIR:
2511 err = sys_socketpair(a0, a1, a[2], (int __user *)a[3]);
2512 break;
2513 case SYS_SEND:
2514 err = sys_send(a0, (void __user *)a1, a[2], a[3]);
2515 break;
2516 case SYS_SENDTO:
2517 err = sys_sendto(a0, (void __user *)a1, a[2], a[3],
2518 (struct sockaddr __user *)a[4], a[5]);
2519 break;
2520 case SYS_RECV:
2521 err = sys_recv(a0, (void __user *)a1, a[2], a[3]);
2522 break;
2523 case SYS_RECVFROM:
2524 err = sys_recvfrom(a0, (void __user *)a1, a[2], a[3],
2525 (struct sockaddr __user *)a[4],
2526 (int __user *)a[5]);
2527 break;
2528 case SYS_SHUTDOWN:
2529 err = sys_shutdown(a0, a1);
2530 break;
2531 case SYS_SETSOCKOPT:
2532 err = sys_setsockopt(a0, a1, a[2], (char __user *)a[3], a[4]);
2533 break;
2534 case SYS_GETSOCKOPT:
2535 err =
2536 sys_getsockopt(a0, a1, a[2], (char __user *)a[3],
2537 (int __user *)a[4]);
2538 break;
2539 case SYS_SENDMSG:
666547ff 2540 err = sys_sendmsg(a0, (struct user_msghdr __user *)a1, a[2]);
89bddce5 2541 break;
228e548e
AB
2542 case SYS_SENDMMSG:
2543 err = sys_sendmmsg(a0, (struct mmsghdr __user *)a1, a[2], a[3]);
2544 break;
89bddce5 2545 case SYS_RECVMSG:
666547ff 2546 err = sys_recvmsg(a0, (struct user_msghdr __user *)a1, a[2]);
89bddce5 2547 break;
a2e27255
ACM
2548 case SYS_RECVMMSG:
2549 err = sys_recvmmsg(a0, (struct mmsghdr __user *)a1, a[2], a[3],
2550 (struct timespec __user *)a[4]);
2551 break;
de11defe
UD
2552 case SYS_ACCEPT4:
2553 err = sys_accept4(a0, (struct sockaddr __user *)a1,
2554 (int __user *)a[2], a[3]);
aaca0bdc 2555 break;
89bddce5
SH
2556 default:
2557 err = -EINVAL;
2558 break;
1da177e4
LT
2559 }
2560 return err;
2561}
2562
89bddce5 2563#endif /* __ARCH_WANT_SYS_SOCKETCALL */
1da177e4 2564
55737fda
SH
2565/**
2566 * sock_register - add a socket protocol handler
2567 * @ops: description of protocol
2568 *
1da177e4
LT
2569 * This function is called by a protocol handler that wants to
2570 * advertise its address family, and have it linked into the
e793c0f7 2571 * socket interface. The value ops->family corresponds to the
55737fda 2572 * socket system call protocol family.
1da177e4 2573 */
f0fd27d4 2574int sock_register(const struct net_proto_family *ops)
1da177e4
LT
2575{
2576 int err;
2577
2578 if (ops->family >= NPROTO) {
3410f22e 2579 pr_crit("protocol %d >= NPROTO(%d)\n", ops->family, NPROTO);
1da177e4
LT
2580 return -ENOBUFS;
2581 }
55737fda
SH
2582
2583 spin_lock(&net_family_lock);
190683a9
ED
2584 if (rcu_dereference_protected(net_families[ops->family],
2585 lockdep_is_held(&net_family_lock)))
55737fda
SH
2586 err = -EEXIST;
2587 else {
cf778b00 2588 rcu_assign_pointer(net_families[ops->family], ops);
1da177e4
LT
2589 err = 0;
2590 }
55737fda
SH
2591 spin_unlock(&net_family_lock);
2592
3410f22e 2593 pr_info("NET: Registered protocol family %d\n", ops->family);
1da177e4
LT
2594 return err;
2595}
c6d409cf 2596EXPORT_SYMBOL(sock_register);
1da177e4 2597
55737fda
SH
2598/**
2599 * sock_unregister - remove a protocol handler
2600 * @family: protocol family to remove
2601 *
1da177e4
LT
2602 * This function is called by a protocol handler that wants to
2603 * remove its address family, and have it unlinked from the
55737fda
SH
2604 * new socket creation.
2605 *
2606 * If protocol handler is a module, then it can use module reference
2607 * counts to protect against new references. If protocol handler is not
2608 * a module then it needs to provide its own protection in
2609 * the ops->create routine.
1da177e4 2610 */
f0fd27d4 2611void sock_unregister(int family)
1da177e4 2612{
f0fd27d4 2613 BUG_ON(family < 0 || family >= NPROTO);
1da177e4 2614
55737fda 2615 spin_lock(&net_family_lock);
a9b3cd7f 2616 RCU_INIT_POINTER(net_families[family], NULL);
55737fda
SH
2617 spin_unlock(&net_family_lock);
2618
2619 synchronize_rcu();
2620
3410f22e 2621 pr_info("NET: Unregistered protocol family %d\n", family);
1da177e4 2622}
c6d409cf 2623EXPORT_SYMBOL(sock_unregister);
1da177e4 2624
77d76ea3 2625static int __init sock_init(void)
1da177e4 2626{
b3e19d92 2627 int err;
2ca794e5
EB
2628 /*
2629 * Initialize the network sysctl infrastructure.
2630 */
2631 err = net_sysctl_init();
2632 if (err)
2633 goto out;
b3e19d92 2634
1da177e4 2635 /*
89bddce5 2636 * Initialize skbuff SLAB cache
1da177e4
LT
2637 */
2638 skb_init();
1da177e4
LT
2639
2640 /*
89bddce5 2641 * Initialize the protocols module.
1da177e4
LT
2642 */
2643
2644 init_inodecache();
b3e19d92
NP
2645
2646 err = register_filesystem(&sock_fs_type);
2647 if (err)
2648 goto out_fs;
1da177e4 2649 sock_mnt = kern_mount(&sock_fs_type);
b3e19d92
NP
2650 if (IS_ERR(sock_mnt)) {
2651 err = PTR_ERR(sock_mnt);
2652 goto out_mount;
2653 }
77d76ea3
AK
2654
2655 /* The real protocol initialization is performed in later initcalls.
1da177e4
LT
2656 */
2657
2658#ifdef CONFIG_NETFILTER
6d11cfdb
PNA
2659 err = netfilter_init();
2660 if (err)
2661 goto out;
1da177e4 2662#endif
cbeb321a 2663
408eccce 2664 ptp_classifier_init();
c1f19b51 2665
b3e19d92
NP
2666out:
2667 return err;
2668
2669out_mount:
2670 unregister_filesystem(&sock_fs_type);
2671out_fs:
2672 goto out;
1da177e4
LT
2673}
2674
77d76ea3
AK
2675core_initcall(sock_init); /* early initcall */
2676
1da177e4
LT
2677#ifdef CONFIG_PROC_FS
2678void socket_seq_show(struct seq_file *seq)
2679{
2680 int cpu;
2681 int counter = 0;
2682
6f912042 2683 for_each_possible_cpu(cpu)
89bddce5 2684 counter += per_cpu(sockets_in_use, cpu);
1da177e4
LT
2685
2686 /* It can be negative, by the way. 8) */
2687 if (counter < 0)
2688 counter = 0;
2689
2690 seq_printf(seq, "sockets: used %d\n", counter);
2691}
89bddce5 2692#endif /* CONFIG_PROC_FS */
1da177e4 2693
89bbfc95 2694#ifdef CONFIG_COMPAT
6b96018b 2695static int do_siocgstamp(struct net *net, struct socket *sock,
644595f8 2696 unsigned int cmd, void __user *up)
7a229387 2697{
7a229387
AB
2698 mm_segment_t old_fs = get_fs();
2699 struct timeval ktv;
2700 int err;
2701
2702 set_fs(KERNEL_DS);
6b96018b 2703 err = sock_do_ioctl(net, sock, cmd, (unsigned long)&ktv);
7a229387 2704 set_fs(old_fs);
644595f8 2705 if (!err)
ed6fe9d6 2706 err = compat_put_timeval(&ktv, up);
644595f8 2707
7a229387
AB
2708 return err;
2709}
2710
6b96018b 2711static int do_siocgstampns(struct net *net, struct socket *sock,
644595f8 2712 unsigned int cmd, void __user *up)
7a229387 2713{
7a229387
AB
2714 mm_segment_t old_fs = get_fs();
2715 struct timespec kts;
2716 int err;
2717
2718 set_fs(KERNEL_DS);
6b96018b 2719 err = sock_do_ioctl(net, sock, cmd, (unsigned long)&kts);
7a229387 2720 set_fs(old_fs);
644595f8 2721 if (!err)
ed6fe9d6 2722 err = compat_put_timespec(&kts, up);
644595f8 2723
7a229387
AB
2724 return err;
2725}
2726
6b96018b 2727static int dev_ifname32(struct net *net, struct compat_ifreq __user *uifr32)
7a229387
AB
2728{
2729 struct ifreq __user *uifr;
2730 int err;
2731
2732 uifr = compat_alloc_user_space(sizeof(struct ifreq));
6b96018b 2733 if (copy_in_user(uifr, uifr32, sizeof(struct compat_ifreq)))
7a229387
AB
2734 return -EFAULT;
2735
6b96018b 2736 err = dev_ioctl(net, SIOCGIFNAME, uifr);
7a229387
AB
2737 if (err)
2738 return err;
2739
6b96018b 2740 if (copy_in_user(uifr32, uifr, sizeof(struct compat_ifreq)))
7a229387
AB
2741 return -EFAULT;
2742
2743 return 0;
2744}
2745
6b96018b 2746static int dev_ifconf(struct net *net, struct compat_ifconf __user *uifc32)
7a229387 2747{
6b96018b 2748 struct compat_ifconf ifc32;
7a229387
AB
2749 struct ifconf ifc;
2750 struct ifconf __user *uifc;
6b96018b 2751 struct compat_ifreq __user *ifr32;
7a229387
AB
2752 struct ifreq __user *ifr;
2753 unsigned int i, j;
2754 int err;
2755
6b96018b 2756 if (copy_from_user(&ifc32, uifc32, sizeof(struct compat_ifconf)))
7a229387
AB
2757 return -EFAULT;
2758
43da5f2e 2759 memset(&ifc, 0, sizeof(ifc));
7a229387
AB
2760 if (ifc32.ifcbuf == 0) {
2761 ifc32.ifc_len = 0;
2762 ifc.ifc_len = 0;
2763 ifc.ifc_req = NULL;
2764 uifc = compat_alloc_user_space(sizeof(struct ifconf));
2765 } else {
c6d409cf
ED
2766 size_t len = ((ifc32.ifc_len / sizeof(struct compat_ifreq)) + 1) *
2767 sizeof(struct ifreq);
7a229387
AB
2768 uifc = compat_alloc_user_space(sizeof(struct ifconf) + len);
2769 ifc.ifc_len = len;
2770 ifr = ifc.ifc_req = (void __user *)(uifc + 1);
2771 ifr32 = compat_ptr(ifc32.ifcbuf);
c6d409cf 2772 for (i = 0; i < ifc32.ifc_len; i += sizeof(struct compat_ifreq)) {
6b96018b 2773 if (copy_in_user(ifr, ifr32, sizeof(struct compat_ifreq)))
7a229387
AB
2774 return -EFAULT;
2775 ifr++;
2776 ifr32++;
2777 }
2778 }
2779 if (copy_to_user(uifc, &ifc, sizeof(struct ifconf)))
2780 return -EFAULT;
2781
6b96018b 2782 err = dev_ioctl(net, SIOCGIFCONF, uifc);
7a229387
AB
2783 if (err)
2784 return err;
2785
2786 if (copy_from_user(&ifc, uifc, sizeof(struct ifconf)))
2787 return -EFAULT;
2788
2789 ifr = ifc.ifc_req;
2790 ifr32 = compat_ptr(ifc32.ifcbuf);
2791 for (i = 0, j = 0;
c6d409cf
ED
2792 i + sizeof(struct compat_ifreq) <= ifc32.ifc_len && j < ifc.ifc_len;
2793 i += sizeof(struct compat_ifreq), j += sizeof(struct ifreq)) {
2794 if (copy_in_user(ifr32, ifr, sizeof(struct compat_ifreq)))
7a229387
AB
2795 return -EFAULT;
2796 ifr32++;
2797 ifr++;
2798 }
2799
2800 if (ifc32.ifcbuf == 0) {
2801 /* Translate from 64-bit structure multiple to
2802 * a 32-bit one.
2803 */
2804 i = ifc.ifc_len;
6b96018b 2805 i = ((i / sizeof(struct ifreq)) * sizeof(struct compat_ifreq));
7a229387
AB
2806 ifc32.ifc_len = i;
2807 } else {
2808 ifc32.ifc_len = i;
2809 }
6b96018b 2810 if (copy_to_user(uifc32, &ifc32, sizeof(struct compat_ifconf)))
7a229387
AB
2811 return -EFAULT;
2812
2813 return 0;
2814}
2815
6b96018b 2816static int ethtool_ioctl(struct net *net, struct compat_ifreq __user *ifr32)
7a229387 2817{
3a7da39d
BH
2818 struct compat_ethtool_rxnfc __user *compat_rxnfc;
2819 bool convert_in = false, convert_out = false;
2820 size_t buf_size = ALIGN(sizeof(struct ifreq), 8);
2821 struct ethtool_rxnfc __user *rxnfc;
7a229387 2822 struct ifreq __user *ifr;
3a7da39d
BH
2823 u32 rule_cnt = 0, actual_rule_cnt;
2824 u32 ethcmd;
7a229387 2825 u32 data;
3a7da39d 2826 int ret;
7a229387 2827
3a7da39d
BH
2828 if (get_user(data, &ifr32->ifr_ifru.ifru_data))
2829 return -EFAULT;
7a229387 2830
3a7da39d
BH
2831 compat_rxnfc = compat_ptr(data);
2832
2833 if (get_user(ethcmd, &compat_rxnfc->cmd))
7a229387
AB
2834 return -EFAULT;
2835
3a7da39d
BH
2836 /* Most ethtool structures are defined without padding.
2837 * Unfortunately struct ethtool_rxnfc is an exception.
2838 */
2839 switch (ethcmd) {
2840 default:
2841 break;
2842 case ETHTOOL_GRXCLSRLALL:
2843 /* Buffer size is variable */
2844 if (get_user(rule_cnt, &compat_rxnfc->rule_cnt))
2845 return -EFAULT;
2846 if (rule_cnt > KMALLOC_MAX_SIZE / sizeof(u32))
2847 return -ENOMEM;
2848 buf_size += rule_cnt * sizeof(u32);
2849 /* fall through */
2850 case ETHTOOL_GRXRINGS:
2851 case ETHTOOL_GRXCLSRLCNT:
2852 case ETHTOOL_GRXCLSRULE:
55664f32 2853 case ETHTOOL_SRXCLSRLINS:
3a7da39d
BH
2854 convert_out = true;
2855 /* fall through */
2856 case ETHTOOL_SRXCLSRLDEL:
3a7da39d
BH
2857 buf_size += sizeof(struct ethtool_rxnfc);
2858 convert_in = true;
2859 break;
2860 }
2861
2862 ifr = compat_alloc_user_space(buf_size);
954b1244 2863 rxnfc = (void __user *)ifr + ALIGN(sizeof(struct ifreq), 8);
3a7da39d
BH
2864
2865 if (copy_in_user(&ifr->ifr_name, &ifr32->ifr_name, IFNAMSIZ))
7a229387
AB
2866 return -EFAULT;
2867
3a7da39d
BH
2868 if (put_user(convert_in ? rxnfc : compat_ptr(data),
2869 &ifr->ifr_ifru.ifru_data))
7a229387
AB
2870 return -EFAULT;
2871
3a7da39d 2872 if (convert_in) {
127fe533 2873 /* We expect there to be holes between fs.m_ext and
3a7da39d
BH
2874 * fs.ring_cookie and at the end of fs, but nowhere else.
2875 */
127fe533
AD
2876 BUILD_BUG_ON(offsetof(struct compat_ethtool_rxnfc, fs.m_ext) +
2877 sizeof(compat_rxnfc->fs.m_ext) !=
2878 offsetof(struct ethtool_rxnfc, fs.m_ext) +
2879 sizeof(rxnfc->fs.m_ext));
3a7da39d
BH
2880 BUILD_BUG_ON(
2881 offsetof(struct compat_ethtool_rxnfc, fs.location) -
2882 offsetof(struct compat_ethtool_rxnfc, fs.ring_cookie) !=
2883 offsetof(struct ethtool_rxnfc, fs.location) -
2884 offsetof(struct ethtool_rxnfc, fs.ring_cookie));
2885
2886 if (copy_in_user(rxnfc, compat_rxnfc,
954b1244
SH
2887 (void __user *)(&rxnfc->fs.m_ext + 1) -
2888 (void __user *)rxnfc) ||
3a7da39d
BH
2889 copy_in_user(&rxnfc->fs.ring_cookie,
2890 &compat_rxnfc->fs.ring_cookie,
954b1244
SH
2891 (void __user *)(&rxnfc->fs.location + 1) -
2892 (void __user *)&rxnfc->fs.ring_cookie) ||
3a7da39d
BH
2893 copy_in_user(&rxnfc->rule_cnt, &compat_rxnfc->rule_cnt,
2894 sizeof(rxnfc->rule_cnt)))
2895 return -EFAULT;
2896 }
2897
2898 ret = dev_ioctl(net, SIOCETHTOOL, ifr);
2899 if (ret)
2900 return ret;
2901
2902 if (convert_out) {
2903 if (copy_in_user(compat_rxnfc, rxnfc,
954b1244
SH
2904 (const void __user *)(&rxnfc->fs.m_ext + 1) -
2905 (const void __user *)rxnfc) ||
3a7da39d
BH
2906 copy_in_user(&compat_rxnfc->fs.ring_cookie,
2907 &rxnfc->fs.ring_cookie,
954b1244
SH
2908 (const void __user *)(&rxnfc->fs.location + 1) -
2909 (const void __user *)&rxnfc->fs.ring_cookie) ||
3a7da39d
BH
2910 copy_in_user(&compat_rxnfc->rule_cnt, &rxnfc->rule_cnt,
2911 sizeof(rxnfc->rule_cnt)))
2912 return -EFAULT;
2913
2914 if (ethcmd == ETHTOOL_GRXCLSRLALL) {
2915 /* As an optimisation, we only copy the actual
2916 * number of rules that the underlying
2917 * function returned. Since Mallory might
2918 * change the rule count in user memory, we
2919 * check that it is less than the rule count
2920 * originally given (as the user buffer size),
2921 * which has been range-checked.
2922 */
2923 if (get_user(actual_rule_cnt, &rxnfc->rule_cnt))
2924 return -EFAULT;
2925 if (actual_rule_cnt < rule_cnt)
2926 rule_cnt = actual_rule_cnt;
2927 if (copy_in_user(&compat_rxnfc->rule_locs[0],
2928 &rxnfc->rule_locs[0],
2929 rule_cnt * sizeof(u32)))
2930 return -EFAULT;
2931 }
2932 }
2933
2934 return 0;
7a229387
AB
2935}
2936
7a50a240
AB
2937static int compat_siocwandev(struct net *net, struct compat_ifreq __user *uifr32)
2938{
2939 void __user *uptr;
2940 compat_uptr_t uptr32;
2941 struct ifreq __user *uifr;
2942
c6d409cf 2943 uifr = compat_alloc_user_space(sizeof(*uifr));
7a50a240
AB
2944 if (copy_in_user(uifr, uifr32, sizeof(struct compat_ifreq)))
2945 return -EFAULT;
2946
2947 if (get_user(uptr32, &uifr32->ifr_settings.ifs_ifsu))
2948 return -EFAULT;
2949
2950 uptr = compat_ptr(uptr32);
2951
2952 if (put_user(uptr, &uifr->ifr_settings.ifs_ifsu.raw_hdlc))
2953 return -EFAULT;
2954
2955 return dev_ioctl(net, SIOCWANDEV, uifr);
2956}
2957
6b96018b
AB
2958static int bond_ioctl(struct net *net, unsigned int cmd,
2959 struct compat_ifreq __user *ifr32)
7a229387
AB
2960{
2961 struct ifreq kifr;
7a229387
AB
2962 mm_segment_t old_fs;
2963 int err;
7a229387
AB
2964
2965 switch (cmd) {
2966 case SIOCBONDENSLAVE:
2967 case SIOCBONDRELEASE:
2968 case SIOCBONDSETHWADDR:
2969 case SIOCBONDCHANGEACTIVE:
6b96018b 2970 if (copy_from_user(&kifr, ifr32, sizeof(struct compat_ifreq)))
7a229387
AB
2971 return -EFAULT;
2972
2973 old_fs = get_fs();
c6d409cf 2974 set_fs(KERNEL_DS);
c3f52ae6 2975 err = dev_ioctl(net, cmd,
2976 (struct ifreq __user __force *) &kifr);
c6d409cf 2977 set_fs(old_fs);
7a229387
AB
2978
2979 return err;
7a229387 2980 default:
07d106d0 2981 return -ENOIOCTLCMD;
ccbd6a5a 2982 }
7a229387
AB
2983}
2984
590d4693
BH
2985/* Handle ioctls that use ifreq::ifr_data and just need struct ifreq converted */
2986static int compat_ifr_data_ioctl(struct net *net, unsigned int cmd,
6b96018b 2987 struct compat_ifreq __user *u_ifreq32)
7a229387
AB
2988{
2989 struct ifreq __user *u_ifreq64;
7a229387
AB
2990 char tmp_buf[IFNAMSIZ];
2991 void __user *data64;
2992 u32 data32;
2993
2994 if (copy_from_user(&tmp_buf[0], &(u_ifreq32->ifr_ifrn.ifrn_name[0]),
2995 IFNAMSIZ))
2996 return -EFAULT;
417c3522 2997 if (get_user(data32, &u_ifreq32->ifr_ifru.ifru_data))
7a229387
AB
2998 return -EFAULT;
2999 data64 = compat_ptr(data32);
3000
3001 u_ifreq64 = compat_alloc_user_space(sizeof(*u_ifreq64));
3002
7a229387
AB
3003 if (copy_to_user(&u_ifreq64->ifr_ifrn.ifrn_name[0], &tmp_buf[0],
3004 IFNAMSIZ))
3005 return -EFAULT;
417c3522 3006 if (put_user(data64, &u_ifreq64->ifr_ifru.ifru_data))
7a229387
AB
3007 return -EFAULT;
3008
6b96018b 3009 return dev_ioctl(net, cmd, u_ifreq64);
7a229387
AB
3010}
3011
6b96018b
AB
3012static int dev_ifsioc(struct net *net, struct socket *sock,
3013 unsigned int cmd, struct compat_ifreq __user *uifr32)
7a229387 3014{
a2116ed2 3015 struct ifreq __user *uifr;
7a229387
AB
3016 int err;
3017
a2116ed2
AB
3018 uifr = compat_alloc_user_space(sizeof(*uifr));
3019 if (copy_in_user(uifr, uifr32, sizeof(*uifr32)))
3020 return -EFAULT;
3021
3022 err = sock_do_ioctl(net, sock, cmd, (unsigned long)uifr);
3023
7a229387
AB
3024 if (!err) {
3025 switch (cmd) {
3026 case SIOCGIFFLAGS:
3027 case SIOCGIFMETRIC:
3028 case SIOCGIFMTU:
3029 case SIOCGIFMEM:
3030 case SIOCGIFHWADDR:
3031 case SIOCGIFINDEX:
3032 case SIOCGIFADDR:
3033 case SIOCGIFBRDADDR:
3034 case SIOCGIFDSTADDR:
3035 case SIOCGIFNETMASK:
fab2532b 3036 case SIOCGIFPFLAGS:
7a229387 3037 case SIOCGIFTXQLEN:
fab2532b
AB
3038 case SIOCGMIIPHY:
3039 case SIOCGMIIREG:
a2116ed2 3040 if (copy_in_user(uifr32, uifr, sizeof(*uifr32)))
7a229387
AB
3041 err = -EFAULT;
3042 break;
3043 }
3044 }
3045 return err;
3046}
3047
a2116ed2
AB
3048static int compat_sioc_ifmap(struct net *net, unsigned int cmd,
3049 struct compat_ifreq __user *uifr32)
3050{
3051 struct ifreq ifr;
3052 struct compat_ifmap __user *uifmap32;
3053 mm_segment_t old_fs;
3054 int err;
3055
3056 uifmap32 = &uifr32->ifr_ifru.ifru_map;
3057 err = copy_from_user(&ifr, uifr32, sizeof(ifr.ifr_name));
3ddc5b46
MD
3058 err |= get_user(ifr.ifr_map.mem_start, &uifmap32->mem_start);
3059 err |= get_user(ifr.ifr_map.mem_end, &uifmap32->mem_end);
3060 err |= get_user(ifr.ifr_map.base_addr, &uifmap32->base_addr);
3061 err |= get_user(ifr.ifr_map.irq, &uifmap32->irq);
3062 err |= get_user(ifr.ifr_map.dma, &uifmap32->dma);
3063 err |= get_user(ifr.ifr_map.port, &uifmap32->port);
a2116ed2
AB
3064 if (err)
3065 return -EFAULT;
3066
3067 old_fs = get_fs();
c6d409cf 3068 set_fs(KERNEL_DS);
c3f52ae6 3069 err = dev_ioctl(net, cmd, (void __user __force *)&ifr);
c6d409cf 3070 set_fs(old_fs);
a2116ed2
AB
3071
3072 if (cmd == SIOCGIFMAP && !err) {
3073 err = copy_to_user(uifr32, &ifr, sizeof(ifr.ifr_name));
3ddc5b46
MD
3074 err |= put_user(ifr.ifr_map.mem_start, &uifmap32->mem_start);
3075 err |= put_user(ifr.ifr_map.mem_end, &uifmap32->mem_end);
3076 err |= put_user(ifr.ifr_map.base_addr, &uifmap32->base_addr);
3077 err |= put_user(ifr.ifr_map.irq, &uifmap32->irq);
3078 err |= put_user(ifr.ifr_map.dma, &uifmap32->dma);
3079 err |= put_user(ifr.ifr_map.port, &uifmap32->port);
a2116ed2
AB
3080 if (err)
3081 err = -EFAULT;
3082 }
3083 return err;
3084}
3085
7a229387 3086struct rtentry32 {
c6d409cf 3087 u32 rt_pad1;
7a229387
AB
3088 struct sockaddr rt_dst; /* target address */
3089 struct sockaddr rt_gateway; /* gateway addr (RTF_GATEWAY) */
3090 struct sockaddr rt_genmask; /* target network mask (IP) */
c6d409cf
ED
3091 unsigned short rt_flags;
3092 short rt_pad2;
3093 u32 rt_pad3;
3094 unsigned char rt_tos;
3095 unsigned char rt_class;
3096 short rt_pad4;
3097 short rt_metric; /* +1 for binary compatibility! */
7a229387 3098 /* char * */ u32 rt_dev; /* forcing the device at add */
c6d409cf
ED
3099 u32 rt_mtu; /* per route MTU/Window */
3100 u32 rt_window; /* Window clamping */
7a229387
AB
3101 unsigned short rt_irtt; /* Initial RTT */
3102};
3103
3104struct in6_rtmsg32 {
3105 struct in6_addr rtmsg_dst;
3106 struct in6_addr rtmsg_src;
3107 struct in6_addr rtmsg_gateway;
3108 u32 rtmsg_type;
3109 u16 rtmsg_dst_len;
3110 u16 rtmsg_src_len;
3111 u32 rtmsg_metric;
3112 u32 rtmsg_info;
3113 u32 rtmsg_flags;
3114 s32 rtmsg_ifindex;
3115};
3116
6b96018b
AB
3117static int routing_ioctl(struct net *net, struct socket *sock,
3118 unsigned int cmd, void __user *argp)
7a229387
AB
3119{
3120 int ret;
3121 void *r = NULL;
3122 struct in6_rtmsg r6;
3123 struct rtentry r4;
3124 char devname[16];
3125 u32 rtdev;
3126 mm_segment_t old_fs = get_fs();
3127
6b96018b
AB
3128 if (sock && sock->sk && sock->sk->sk_family == AF_INET6) { /* ipv6 */
3129 struct in6_rtmsg32 __user *ur6 = argp;
c6d409cf 3130 ret = copy_from_user(&r6.rtmsg_dst, &(ur6->rtmsg_dst),
7a229387 3131 3 * sizeof(struct in6_addr));
3ddc5b46
MD
3132 ret |= get_user(r6.rtmsg_type, &(ur6->rtmsg_type));
3133 ret |= get_user(r6.rtmsg_dst_len, &(ur6->rtmsg_dst_len));
3134 ret |= get_user(r6.rtmsg_src_len, &(ur6->rtmsg_src_len));
3135 ret |= get_user(r6.rtmsg_metric, &(ur6->rtmsg_metric));
3136 ret |= get_user(r6.rtmsg_info, &(ur6->rtmsg_info));
3137 ret |= get_user(r6.rtmsg_flags, &(ur6->rtmsg_flags));
3138 ret |= get_user(r6.rtmsg_ifindex, &(ur6->rtmsg_ifindex));
7a229387
AB
3139
3140 r = (void *) &r6;
3141 } else { /* ipv4 */
6b96018b 3142 struct rtentry32 __user *ur4 = argp;
c6d409cf 3143 ret = copy_from_user(&r4.rt_dst, &(ur4->rt_dst),
7a229387 3144 3 * sizeof(struct sockaddr));
3ddc5b46
MD
3145 ret |= get_user(r4.rt_flags, &(ur4->rt_flags));
3146 ret |= get_user(r4.rt_metric, &(ur4->rt_metric));
3147 ret |= get_user(r4.rt_mtu, &(ur4->rt_mtu));
3148 ret |= get_user(r4.rt_window, &(ur4->rt_window));
3149 ret |= get_user(r4.rt_irtt, &(ur4->rt_irtt));
3150 ret |= get_user(rtdev, &(ur4->rt_dev));
7a229387 3151 if (rtdev) {
c6d409cf 3152 ret |= copy_from_user(devname, compat_ptr(rtdev), 15);
c3f52ae6 3153 r4.rt_dev = (char __user __force *)devname;
3154 devname[15] = 0;
7a229387
AB
3155 } else
3156 r4.rt_dev = NULL;
3157
3158 r = (void *) &r4;
3159 }
3160
3161 if (ret) {
3162 ret = -EFAULT;
3163 goto out;
3164 }
3165
c6d409cf 3166 set_fs(KERNEL_DS);
6b96018b 3167 ret = sock_do_ioctl(net, sock, cmd, (unsigned long) r);
c6d409cf 3168 set_fs(old_fs);
7a229387
AB
3169
3170out:
7a229387
AB
3171 return ret;
3172}
3173
3174/* Since old style bridge ioctl's endup using SIOCDEVPRIVATE
3175 * for some operations; this forces use of the newer bridge-utils that
25985edc 3176 * use compatible ioctls
7a229387 3177 */
6b96018b 3178static int old_bridge_ioctl(compat_ulong_t __user *argp)
7a229387 3179{
6b96018b 3180 compat_ulong_t tmp;
7a229387 3181
6b96018b 3182 if (get_user(tmp, argp))
7a229387
AB
3183 return -EFAULT;
3184 if (tmp == BRCTL_GET_VERSION)
3185 return BRCTL_VERSION + 1;
3186 return -EINVAL;
3187}
3188
6b96018b
AB
3189static int compat_sock_ioctl_trans(struct file *file, struct socket *sock,
3190 unsigned int cmd, unsigned long arg)
3191{
3192 void __user *argp = compat_ptr(arg);
3193 struct sock *sk = sock->sk;
3194 struct net *net = sock_net(sk);
7a229387 3195
6b96018b 3196 if (cmd >= SIOCDEVPRIVATE && cmd <= (SIOCDEVPRIVATE + 15))
590d4693 3197 return compat_ifr_data_ioctl(net, cmd, argp);
6b96018b
AB
3198
3199 switch (cmd) {
3200 case SIOCSIFBR:
3201 case SIOCGIFBR:
3202 return old_bridge_ioctl(argp);
3203 case SIOCGIFNAME:
3204 return dev_ifname32(net, argp);
3205 case SIOCGIFCONF:
3206 return dev_ifconf(net, argp);
3207 case SIOCETHTOOL:
3208 return ethtool_ioctl(net, argp);
7a50a240
AB
3209 case SIOCWANDEV:
3210 return compat_siocwandev(net, argp);
a2116ed2
AB
3211 case SIOCGIFMAP:
3212 case SIOCSIFMAP:
3213 return compat_sioc_ifmap(net, cmd, argp);
6b96018b
AB
3214 case SIOCBONDENSLAVE:
3215 case SIOCBONDRELEASE:
3216 case SIOCBONDSETHWADDR:
6b96018b
AB
3217 case SIOCBONDCHANGEACTIVE:
3218 return bond_ioctl(net, cmd, argp);
3219 case SIOCADDRT:
3220 case SIOCDELRT:
3221 return routing_ioctl(net, sock, cmd, argp);
3222 case SIOCGSTAMP:
3223 return do_siocgstamp(net, sock, cmd, argp);
3224 case SIOCGSTAMPNS:
3225 return do_siocgstampns(net, sock, cmd, argp);
590d4693
BH
3226 case SIOCBONDSLAVEINFOQUERY:
3227 case SIOCBONDINFOQUERY:
a2116ed2 3228 case SIOCSHWTSTAMP:
fd468c74 3229 case SIOCGHWTSTAMP:
590d4693 3230 return compat_ifr_data_ioctl(net, cmd, argp);
6b96018b
AB
3231
3232 case FIOSETOWN:
3233 case SIOCSPGRP:
3234 case FIOGETOWN:
3235 case SIOCGPGRP:
3236 case SIOCBRADDBR:
3237 case SIOCBRDELBR:
3238 case SIOCGIFVLAN:
3239 case SIOCSIFVLAN:
3240 case SIOCADDDLCI:
3241 case SIOCDELDLCI:
3242 return sock_ioctl(file, cmd, arg);
3243
3244 case SIOCGIFFLAGS:
3245 case SIOCSIFFLAGS:
3246 case SIOCGIFMETRIC:
3247 case SIOCSIFMETRIC:
3248 case SIOCGIFMTU:
3249 case SIOCSIFMTU:
3250 case SIOCGIFMEM:
3251 case SIOCSIFMEM:
3252 case SIOCGIFHWADDR:
3253 case SIOCSIFHWADDR:
3254 case SIOCADDMULTI:
3255 case SIOCDELMULTI:
3256 case SIOCGIFINDEX:
6b96018b
AB
3257 case SIOCGIFADDR:
3258 case SIOCSIFADDR:
3259 case SIOCSIFHWBROADCAST:
6b96018b 3260 case SIOCDIFADDR:
6b96018b
AB
3261 case SIOCGIFBRDADDR:
3262 case SIOCSIFBRDADDR:
3263 case SIOCGIFDSTADDR:
3264 case SIOCSIFDSTADDR:
3265 case SIOCGIFNETMASK:
3266 case SIOCSIFNETMASK:
3267 case SIOCSIFPFLAGS:
3268 case SIOCGIFPFLAGS:
3269 case SIOCGIFTXQLEN:
3270 case SIOCSIFTXQLEN:
3271 case SIOCBRADDIF:
3272 case SIOCBRDELIF:
9177efd3
AB
3273 case SIOCSIFNAME:
3274 case SIOCGMIIPHY:
3275 case SIOCGMIIREG:
3276 case SIOCSMIIREG:
6b96018b 3277 return dev_ifsioc(net, sock, cmd, argp);
9177efd3 3278
6b96018b
AB
3279 case SIOCSARP:
3280 case SIOCGARP:
3281 case SIOCDARP:
6b96018b 3282 case SIOCATMARK:
9177efd3
AB
3283 return sock_do_ioctl(net, sock, cmd, arg);
3284 }
3285
6b96018b
AB
3286 return -ENOIOCTLCMD;
3287}
7a229387 3288
95c96174 3289static long compat_sock_ioctl(struct file *file, unsigned int cmd,
89bddce5 3290 unsigned long arg)
89bbfc95
SP
3291{
3292 struct socket *sock = file->private_data;
3293 int ret = -ENOIOCTLCMD;
87de87d5
DM
3294 struct sock *sk;
3295 struct net *net;
3296
3297 sk = sock->sk;
3298 net = sock_net(sk);
89bbfc95
SP
3299
3300 if (sock->ops->compat_ioctl)
3301 ret = sock->ops->compat_ioctl(sock, cmd, arg);
3302
87de87d5
DM
3303 if (ret == -ENOIOCTLCMD &&
3304 (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST))
3305 ret = compat_wext_handle_ioctl(net, cmd, arg);
3306
6b96018b
AB
3307 if (ret == -ENOIOCTLCMD)
3308 ret = compat_sock_ioctl_trans(file, sock, cmd, arg);
3309
89bbfc95
SP
3310 return ret;
3311}
3312#endif
3313
ac5a488e
SS
3314int kernel_bind(struct socket *sock, struct sockaddr *addr, int addrlen)
3315{
3316 return sock->ops->bind(sock, addr, addrlen);
3317}
c6d409cf 3318EXPORT_SYMBOL(kernel_bind);
ac5a488e
SS
3319
3320int kernel_listen(struct socket *sock, int backlog)
3321{
3322 return sock->ops->listen(sock, backlog);
3323}
c6d409cf 3324EXPORT_SYMBOL(kernel_listen);
ac5a488e
SS
3325
3326int kernel_accept(struct socket *sock, struct socket **newsock, int flags)
3327{
3328 struct sock *sk = sock->sk;
3329 int err;
3330
3331 err = sock_create_lite(sk->sk_family, sk->sk_type, sk->sk_protocol,
3332 newsock);
3333 if (err < 0)
3334 goto done;
3335
3336 err = sock->ops->accept(sock, *newsock, flags);
3337 if (err < 0) {
3338 sock_release(*newsock);
fa8705b0 3339 *newsock = NULL;
ac5a488e
SS
3340 goto done;
3341 }
3342
3343 (*newsock)->ops = sock->ops;
1b08534e 3344 __module_get((*newsock)->ops->owner);
ac5a488e
SS
3345
3346done:
3347 return err;
3348}
c6d409cf 3349EXPORT_SYMBOL(kernel_accept);
ac5a488e
SS
3350
3351int kernel_connect(struct socket *sock, struct sockaddr *addr, int addrlen,
4768fbcb 3352 int flags)
ac5a488e
SS
3353{
3354 return sock->ops->connect(sock, addr, addrlen, flags);
3355}
c6d409cf 3356EXPORT_SYMBOL(kernel_connect);
ac5a488e
SS
3357
3358int kernel_getsockname(struct socket *sock, struct sockaddr *addr,
3359 int *addrlen)
3360{
3361 return sock->ops->getname(sock, addr, addrlen, 0);
3362}
c6d409cf 3363EXPORT_SYMBOL(kernel_getsockname);
ac5a488e
SS
3364
3365int kernel_getpeername(struct socket *sock, struct sockaddr *addr,
3366 int *addrlen)
3367{
3368 return sock->ops->getname(sock, addr, addrlen, 1);
3369}
c6d409cf 3370EXPORT_SYMBOL(kernel_getpeername);
ac5a488e
SS
3371
3372int kernel_getsockopt(struct socket *sock, int level, int optname,
3373 char *optval, int *optlen)
3374{
3375 mm_segment_t oldfs = get_fs();
fb8621bb
NK
3376 char __user *uoptval;
3377 int __user *uoptlen;
ac5a488e
SS
3378 int err;
3379
fb8621bb
NK
3380 uoptval = (char __user __force *) optval;
3381 uoptlen = (int __user __force *) optlen;
3382
ac5a488e
SS
3383 set_fs(KERNEL_DS);
3384 if (level == SOL_SOCKET)
fb8621bb 3385 err = sock_getsockopt(sock, level, optname, uoptval, uoptlen);
ac5a488e 3386 else
fb8621bb
NK
3387 err = sock->ops->getsockopt(sock, level, optname, uoptval,
3388 uoptlen);
ac5a488e
SS
3389 set_fs(oldfs);
3390 return err;
3391}
c6d409cf 3392EXPORT_SYMBOL(kernel_getsockopt);
ac5a488e
SS
3393
3394int kernel_setsockopt(struct socket *sock, int level, int optname,
b7058842 3395 char *optval, unsigned int optlen)
ac5a488e
SS
3396{
3397 mm_segment_t oldfs = get_fs();
fb8621bb 3398 char __user *uoptval;
ac5a488e
SS
3399 int err;
3400
fb8621bb
NK
3401 uoptval = (char __user __force *) optval;
3402
ac5a488e
SS
3403 set_fs(KERNEL_DS);
3404 if (level == SOL_SOCKET)
fb8621bb 3405 err = sock_setsockopt(sock, level, optname, uoptval, optlen);
ac5a488e 3406 else
fb8621bb 3407 err = sock->ops->setsockopt(sock, level, optname, uoptval,
ac5a488e
SS
3408 optlen);
3409 set_fs(oldfs);
3410 return err;
3411}
c6d409cf 3412EXPORT_SYMBOL(kernel_setsockopt);
ac5a488e
SS
3413
3414int kernel_sendpage(struct socket *sock, struct page *page, int offset,
3415 size_t size, int flags)
3416{
3417 if (sock->ops->sendpage)
3418 return sock->ops->sendpage(sock, page, offset, size, flags);
3419
3420 return sock_no_sendpage(sock, page, offset, size, flags);
3421}
c6d409cf 3422EXPORT_SYMBOL(kernel_sendpage);
ac5a488e
SS
3423
3424int kernel_sock_ioctl(struct socket *sock, int cmd, unsigned long arg)
3425{
3426 mm_segment_t oldfs = get_fs();
3427 int err;
3428
3429 set_fs(KERNEL_DS);
3430 err = sock->ops->ioctl(sock, cmd, arg);
3431 set_fs(oldfs);
3432
3433 return err;
3434}
c6d409cf 3435EXPORT_SYMBOL(kernel_sock_ioctl);
ac5a488e 3436
91cf45f0
TM
3437int kernel_sock_shutdown(struct socket *sock, enum sock_shutdown_cmd how)
3438{
3439 return sock->ops->shutdown(sock, how);
3440}
91cf45f0 3441EXPORT_SYMBOL(kernel_sock_shutdown);
This page took 1.215691 seconds and 5 git commands to generate.