]> git.ipfire.org Git - people/arne_f/kernel.git/blame - net/socket.c
fs/ocfs2: fix race in ocfs2_dentry_attach_lock()
[people/arne_f/kernel.git] / net / socket.c
CommitLineData
1da177e4
LT
1/*
2 * NET An implementation of the SOCKET network access protocol.
3 *
4 * Version: @(#)socket.c 1.1.93 18/02/95
5 *
6 * Authors: Orest Zborowski, <obz@Kodak.COM>
02c30a84 7 * Ross Biro
1da177e4
LT
8 * Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
9 *
10 * Fixes:
11 * Anonymous : NOTSOCK/BADF cleanup. Error fix in
12 * shutdown()
13 * Alan Cox : verify_area() fixes
14 * Alan Cox : Removed DDI
15 * Jonathan Kamens : SOCK_DGRAM reconnect bug
16 * Alan Cox : Moved a load of checks to the very
17 * top level.
18 * Alan Cox : Move address structures to/from user
19 * mode above the protocol layers.
20 * Rob Janssen : Allow 0 length sends.
21 * Alan Cox : Asynchronous I/O support (cribbed from the
22 * tty drivers).
23 * Niibe Yutaka : Asynchronous I/O for writes (4.4BSD style)
24 * Jeff Uphoff : Made max number of sockets command-line
25 * configurable.
26 * Matti Aarnio : Made the number of sockets dynamic,
27 * to be allocated when needed, and mr.
28 * Uphoff's max is used as max to be
29 * allowed to allocate.
30 * Linus : Argh. removed all the socket allocation
31 * altogether: it's in the inode now.
32 * Alan Cox : Made sock_alloc()/sock_release() public
33 * for NetROM and future kernel nfsd type
34 * stuff.
35 * Alan Cox : sendmsg/recvmsg basics.
36 * Tom Dyas : Export net symbols.
37 * Marcin Dalecki : Fixed problems with CONFIG_NET="n".
38 * Alan Cox : Added thread locking to sys_* calls
39 * for sockets. May have errors at the
40 * moment.
41 * Kevin Buhr : Fixed the dumb errors in the above.
42 * Andi Kleen : Some small cleanups, optimizations,
43 * and fixed a copy_from_user() bug.
44 * Tigran Aivazian : sys_send(args) calls sys_sendto(args, NULL, 0)
89bddce5 45 * Tigran Aivazian : Made listen(2) backlog sanity checks
1da177e4
LT
46 * protocol-independent
47 *
48 *
49 * This program is free software; you can redistribute it and/or
50 * modify it under the terms of the GNU General Public License
51 * as published by the Free Software Foundation; either version
52 * 2 of the License, or (at your option) any later version.
53 *
54 *
55 * This module is effectively the top level interface to the BSD socket
89bddce5 56 * paradigm.
1da177e4
LT
57 *
58 * Based upon Swansea University Computer Society NET3.039
59 */
60
1da177e4 61#include <linux/mm.h>
1da177e4
LT
62#include <linux/socket.h>
63#include <linux/file.h>
64#include <linux/net.h>
65#include <linux/interrupt.h>
aaca0bdc 66#include <linux/thread_info.h>
55737fda 67#include <linux/rcupdate.h>
1da177e4
LT
68#include <linux/netdevice.h>
69#include <linux/proc_fs.h>
70#include <linux/seq_file.h>
4a3e2f71 71#include <linux/mutex.h>
1da177e4 72#include <linux/if_bridge.h>
20380731
ACM
73#include <linux/if_frad.h>
74#include <linux/if_vlan.h>
408eccce 75#include <linux/ptp_classify.h>
1da177e4
LT
76#include <linux/init.h>
77#include <linux/poll.h>
78#include <linux/cache.h>
79#include <linux/module.h>
80#include <linux/highmem.h>
1da177e4
LT
81#include <linux/mount.h>
82#include <linux/security.h>
83#include <linux/syscalls.h>
84#include <linux/compat.h>
85#include <linux/kmod.h>
3ec3b2fb 86#include <linux/audit.h>
d86b5e0e 87#include <linux/wireless.h>
1b8d7ae4 88#include <linux/nsproxy.h>
1fd7317d 89#include <linux/magic.h>
5a0e3ad6 90#include <linux/slab.h>
600e1779 91#include <linux/xattr.h>
c8e8cd57 92#include <linux/nospec.h>
1da177e4 93
7c0f6ba6 94#include <linux/uaccess.h>
1da177e4
LT
95#include <asm/unistd.h>
96
97#include <net/compat.h>
87de87d5 98#include <net/wext.h>
f8451725 99#include <net/cls_cgroup.h>
1da177e4
LT
100
101#include <net/sock.h>
102#include <linux/netfilter.h>
103
6b96018b
AB
104#include <linux/if_tun.h>
105#include <linux/ipv6_route.h>
106#include <linux/route.h>
6b96018b 107#include <linux/sockios.h>
076bb0c8 108#include <net/busy_poll.h>
f24b9be5 109#include <linux/errqueue.h>
06021292 110
e0d1095a 111#ifdef CONFIG_NET_RX_BUSY_POLL
64b0dc51
ET
112unsigned int sysctl_net_busy_read __read_mostly;
113unsigned int sysctl_net_busy_poll __read_mostly;
06021292 114#endif
6b96018b 115
8ae5e030
AV
116static ssize_t sock_read_iter(struct kiocb *iocb, struct iov_iter *to);
117static ssize_t sock_write_iter(struct kiocb *iocb, struct iov_iter *from);
89bddce5 118static int sock_mmap(struct file *file, struct vm_area_struct *vma);
1da177e4
LT
119
120static int sock_close(struct inode *inode, struct file *file);
a11e1d43
LT
121static __poll_t sock_poll(struct file *file,
122 struct poll_table_struct *wait);
89bddce5 123static long sock_ioctl(struct file *file, unsigned int cmd, unsigned long arg);
89bbfc95
SP
124#ifdef CONFIG_COMPAT
125static long compat_sock_ioctl(struct file *file,
89bddce5 126 unsigned int cmd, unsigned long arg);
89bbfc95 127#endif
1da177e4 128static int sock_fasync(int fd, struct file *filp, int on);
1da177e4
LT
129static ssize_t sock_sendpage(struct file *file, struct page *page,
130 int offset, size_t size, loff_t *ppos, int more);
9c55e01c 131static ssize_t sock_splice_read(struct file *file, loff_t *ppos,
c6d409cf 132 struct pipe_inode_info *pipe, size_t len,
9c55e01c 133 unsigned int flags);
1da177e4 134
1da177e4
LT
135/*
136 * Socket files have a set of 'special' operations as well as the generic file ones. These don't appear
137 * in the operation structures but are done directly via the socketcall() multiplexor.
138 */
139
da7071d7 140static const struct file_operations socket_file_ops = {
1da177e4
LT
141 .owner = THIS_MODULE,
142 .llseek = no_llseek,
8ae5e030
AV
143 .read_iter = sock_read_iter,
144 .write_iter = sock_write_iter,
1da177e4
LT
145 .poll = sock_poll,
146 .unlocked_ioctl = sock_ioctl,
89bbfc95
SP
147#ifdef CONFIG_COMPAT
148 .compat_ioctl = compat_sock_ioctl,
149#endif
1da177e4 150 .mmap = sock_mmap,
1da177e4
LT
151 .release = sock_close,
152 .fasync = sock_fasync,
5274f052
JA
153 .sendpage = sock_sendpage,
154 .splice_write = generic_splice_sendpage,
9c55e01c 155 .splice_read = sock_splice_read,
1da177e4
LT
156};
157
158/*
159 * The protocol list. Each protocol is registered in here.
160 */
161
1da177e4 162static DEFINE_SPINLOCK(net_family_lock);
190683a9 163static const struct net_proto_family __rcu *net_families[NPROTO] __read_mostly;
1da177e4 164
1da177e4 165/*
89bddce5
SH
166 * Support routines.
167 * Move socket addresses back and forth across the kernel/user
168 * divide and look after the messy bits.
1da177e4
LT
169 */
170
1da177e4
LT
171/**
172 * move_addr_to_kernel - copy a socket address into kernel space
173 * @uaddr: Address in user space
174 * @kaddr: Address in kernel space
175 * @ulen: Length in user space
176 *
177 * The address is copied into kernel space. If the provided address is
178 * too long an error code of -EINVAL is returned. If the copy gives
179 * invalid addresses -EFAULT is returned. On a success 0 is returned.
180 */
181
43db362d 182int move_addr_to_kernel(void __user *uaddr, int ulen, struct sockaddr_storage *kaddr)
1da177e4 183{
230b1839 184 if (ulen < 0 || ulen > sizeof(struct sockaddr_storage))
1da177e4 185 return -EINVAL;
89bddce5 186 if (ulen == 0)
1da177e4 187 return 0;
89bddce5 188 if (copy_from_user(kaddr, uaddr, ulen))
1da177e4 189 return -EFAULT;
3ec3b2fb 190 return audit_sockaddr(ulen, kaddr);
1da177e4
LT
191}
192
193/**
194 * move_addr_to_user - copy an address to user space
195 * @kaddr: kernel space address
196 * @klen: length of address in kernel
197 * @uaddr: user space address
198 * @ulen: pointer to user length field
199 *
200 * The value pointed to by ulen on entry is the buffer length available.
201 * This is overwritten with the buffer space used. -EINVAL is returned
202 * if an overlong buffer is specified or a negative buffer size. -EFAULT
203 * is returned if either the buffer or the length field are not
204 * accessible.
205 * After copying the data up to the limit the user specifies, the true
206 * length of the data is written over the length limit the user
207 * specified. Zero is returned for a success.
208 */
89bddce5 209
43db362d 210static int move_addr_to_user(struct sockaddr_storage *kaddr, int klen,
11165f14 211 void __user *uaddr, int __user *ulen)
1da177e4
LT
212{
213 int err;
214 int len;
215
68c6beb3 216 BUG_ON(klen > sizeof(struct sockaddr_storage));
89bddce5
SH
217 err = get_user(len, ulen);
218 if (err)
1da177e4 219 return err;
89bddce5
SH
220 if (len > klen)
221 len = klen;
68c6beb3 222 if (len < 0)
1da177e4 223 return -EINVAL;
89bddce5 224 if (len) {
d6fe3945
SG
225 if (audit_sockaddr(klen, kaddr))
226 return -ENOMEM;
89bddce5 227 if (copy_to_user(uaddr, kaddr, len))
1da177e4
LT
228 return -EFAULT;
229 }
230 /*
89bddce5
SH
231 * "fromlen shall refer to the value before truncation.."
232 * 1003.1g
1da177e4
LT
233 */
234 return __put_user(klen, ulen);
235}
236
08009a76 237static struct kmem_cache *sock_inode_cachep __ro_after_init;
1da177e4
LT
238
239static struct inode *sock_alloc_inode(struct super_block *sb)
240{
241 struct socket_alloc *ei;
eaefd110 242 struct socket_wq *wq;
89bddce5 243
e94b1766 244 ei = kmem_cache_alloc(sock_inode_cachep, GFP_KERNEL);
1da177e4
LT
245 if (!ei)
246 return NULL;
eaefd110
ED
247 wq = kmalloc(sizeof(*wq), GFP_KERNEL);
248 if (!wq) {
43815482
ED
249 kmem_cache_free(sock_inode_cachep, ei);
250 return NULL;
251 }
eaefd110
ED
252 init_waitqueue_head(&wq->wait);
253 wq->fasync_list = NULL;
574aab1e 254 wq->flags = 0;
e6476c21 255 ei->socket.wq = wq;
89bddce5 256
1da177e4
LT
257 ei->socket.state = SS_UNCONNECTED;
258 ei->socket.flags = 0;
259 ei->socket.ops = NULL;
260 ei->socket.sk = NULL;
261 ei->socket.file = NULL;
1da177e4
LT
262
263 return &ei->vfs_inode;
264}
265
266static void sock_destroy_inode(struct inode *inode)
267{
43815482
ED
268 struct socket_alloc *ei;
269
270 ei = container_of(inode, struct socket_alloc, vfs_inode);
e6476c21 271 kfree_rcu(ei->socket.wq, rcu);
43815482 272 kmem_cache_free(sock_inode_cachep, ei);
1da177e4
LT
273}
274
51cc5068 275static void init_once(void *foo)
1da177e4 276{
89bddce5 277 struct socket_alloc *ei = (struct socket_alloc *)foo;
1da177e4 278
a35afb83 279 inode_init_once(&ei->vfs_inode);
1da177e4 280}
89bddce5 281
1e911632 282static void init_inodecache(void)
1da177e4
LT
283{
284 sock_inode_cachep = kmem_cache_create("sock_inode_cache",
89bddce5
SH
285 sizeof(struct socket_alloc),
286 0,
287 (SLAB_HWCACHE_ALIGN |
288 SLAB_RECLAIM_ACCOUNT |
5d097056 289 SLAB_MEM_SPREAD | SLAB_ACCOUNT),
20c2df83 290 init_once);
1e911632 291 BUG_ON(sock_inode_cachep == NULL);
1da177e4
LT
292}
293
b87221de 294static const struct super_operations sockfs_ops = {
c6d409cf
ED
295 .alloc_inode = sock_alloc_inode,
296 .destroy_inode = sock_destroy_inode,
297 .statfs = simple_statfs,
1da177e4
LT
298};
299
c23fbb6b
ED
300/*
301 * sockfs_dname() is called from d_path().
302 */
303static char *sockfs_dname(struct dentry *dentry, char *buffer, int buflen)
304{
305 return dynamic_dname(dentry, buffer, buflen, "socket:[%lu]",
c5ef6035 306 d_inode(dentry)->i_ino);
c23fbb6b
ED
307}
308
3ba13d17 309static const struct dentry_operations sockfs_dentry_operations = {
c23fbb6b 310 .d_dname = sockfs_dname,
1da177e4
LT
311};
312
bba0bd31
AG
313static int sockfs_xattr_get(const struct xattr_handler *handler,
314 struct dentry *dentry, struct inode *inode,
315 const char *suffix, void *value, size_t size)
316{
317 if (value) {
318 if (dentry->d_name.len + 1 > size)
319 return -ERANGE;
320 memcpy(value, dentry->d_name.name, dentry->d_name.len + 1);
321 }
322 return dentry->d_name.len + 1;
323}
324
325#define XATTR_SOCKPROTONAME_SUFFIX "sockprotoname"
326#define XATTR_NAME_SOCKPROTONAME (XATTR_SYSTEM_PREFIX XATTR_SOCKPROTONAME_SUFFIX)
327#define XATTR_NAME_SOCKPROTONAME_LEN (sizeof(XATTR_NAME_SOCKPROTONAME)-1)
328
329static const struct xattr_handler sockfs_xattr_handler = {
330 .name = XATTR_NAME_SOCKPROTONAME,
331 .get = sockfs_xattr_get,
332};
333
4a590153
AG
334static int sockfs_security_xattr_set(const struct xattr_handler *handler,
335 struct dentry *dentry, struct inode *inode,
336 const char *suffix, const void *value,
337 size_t size, int flags)
338{
339 /* Handled by LSM. */
340 return -EAGAIN;
341}
342
343static const struct xattr_handler sockfs_security_xattr_handler = {
344 .prefix = XATTR_SECURITY_PREFIX,
345 .set = sockfs_security_xattr_set,
346};
347
bba0bd31
AG
348static const struct xattr_handler *sockfs_xattr_handlers[] = {
349 &sockfs_xattr_handler,
4a590153 350 &sockfs_security_xattr_handler,
bba0bd31
AG
351 NULL
352};
353
c74a1cbb
AV
354static struct dentry *sockfs_mount(struct file_system_type *fs_type,
355 int flags, const char *dev_name, void *data)
356{
bba0bd31
AG
357 return mount_pseudo_xattr(fs_type, "socket:", &sockfs_ops,
358 sockfs_xattr_handlers,
359 &sockfs_dentry_operations, SOCKFS_MAGIC);
c74a1cbb
AV
360}
361
362static struct vfsmount *sock_mnt __read_mostly;
363
364static struct file_system_type sock_fs_type = {
365 .name = "sockfs",
366 .mount = sockfs_mount,
367 .kill_sb = kill_anon_super,
368};
369
1da177e4
LT
370/*
371 * Obtains the first available file descriptor and sets it up for use.
372 *
39d8c1b6
DM
373 * These functions create file structures and maps them to fd space
374 * of the current process. On success it returns file descriptor
1da177e4
LT
375 * and file struct implicitly stored in sock->file.
376 * Note that another thread may close file descriptor before we return
377 * from this function. We use the fact that now we do not refer
378 * to socket after mapping. If one day we will need it, this
379 * function will increment ref. count on file by 1.
380 *
381 * In any case returned fd MAY BE not valid!
382 * This race condition is unavoidable
383 * with shared fd spaces, we cannot solve it inside kernel,
384 * but we take care of internal coherence yet.
385 */
386
aab174f0 387struct file *sock_alloc_file(struct socket *sock, int flags, const char *dname)
1da177e4 388{
7cbe66b6 389 struct file *file;
1da177e4 390
d93aa9d8
AV
391 if (!dname)
392 dname = sock->sk ? sock->sk->sk_prot_creator->name : "";
39d8c1b6 393
d93aa9d8
AV
394 file = alloc_file_pseudo(SOCK_INODE(sock), sock_mnt, dname,
395 O_RDWR | (flags & O_NONBLOCK),
396 &socket_file_ops);
b5ffe634 397 if (IS_ERR(file)) {
8e1611e2 398 sock_release(sock);
39b65252 399 return file;
cc3808f8
AV
400 }
401
402 sock->file = file;
39d8c1b6 403 file->private_data = sock;
28407630 404 return file;
39d8c1b6 405}
56b31d1c 406EXPORT_SYMBOL(sock_alloc_file);
39d8c1b6 407
56b31d1c 408static int sock_map_fd(struct socket *sock, int flags)
39d8c1b6
DM
409{
410 struct file *newfile;
28407630 411 int fd = get_unused_fd_flags(flags);
ce4bb04c
AV
412 if (unlikely(fd < 0)) {
413 sock_release(sock);
28407630 414 return fd;
ce4bb04c 415 }
39d8c1b6 416
aab174f0 417 newfile = sock_alloc_file(sock, flags, NULL);
28407630 418 if (likely(!IS_ERR(newfile))) {
39d8c1b6 419 fd_install(fd, newfile);
28407630
AV
420 return fd;
421 }
7cbe66b6 422
28407630
AV
423 put_unused_fd(fd);
424 return PTR_ERR(newfile);
1da177e4
LT
425}
426
406a3c63 427struct socket *sock_from_file(struct file *file, int *err)
6cb153ca 428{
6cb153ca
BL
429 if (file->f_op == &socket_file_ops)
430 return file->private_data; /* set in sock_map_fd */
431
23bb80d2
ED
432 *err = -ENOTSOCK;
433 return NULL;
6cb153ca 434}
406a3c63 435EXPORT_SYMBOL(sock_from_file);
6cb153ca 436
1da177e4 437/**
c6d409cf 438 * sockfd_lookup - Go from a file number to its socket slot
1da177e4
LT
439 * @fd: file handle
440 * @err: pointer to an error code return
441 *
442 * The file handle passed in is locked and the socket it is bound
241c4667 443 * to is returned. If an error occurs the err pointer is overwritten
1da177e4
LT
444 * with a negative errno code and NULL is returned. The function checks
445 * for both invalid handles and passing a handle which is not a socket.
446 *
447 * On a success the socket object pointer is returned.
448 */
449
450struct socket *sockfd_lookup(int fd, int *err)
451{
452 struct file *file;
1da177e4
LT
453 struct socket *sock;
454
89bddce5
SH
455 file = fget(fd);
456 if (!file) {
1da177e4
LT
457 *err = -EBADF;
458 return NULL;
459 }
89bddce5 460
6cb153ca
BL
461 sock = sock_from_file(file, err);
462 if (!sock)
1da177e4 463 fput(file);
6cb153ca
BL
464 return sock;
465}
c6d409cf 466EXPORT_SYMBOL(sockfd_lookup);
1da177e4 467
6cb153ca
BL
468static struct socket *sockfd_lookup_light(int fd, int *err, int *fput_needed)
469{
00e188ef 470 struct fd f = fdget(fd);
6cb153ca
BL
471 struct socket *sock;
472
3672558c 473 *err = -EBADF;
00e188ef
AV
474 if (f.file) {
475 sock = sock_from_file(f.file, err);
476 if (likely(sock)) {
477 *fput_needed = f.flags;
6cb153ca 478 return sock;
00e188ef
AV
479 }
480 fdput(f);
1da177e4 481 }
6cb153ca 482 return NULL;
1da177e4
LT
483}
484
600e1779
MY
485static ssize_t sockfs_listxattr(struct dentry *dentry, char *buffer,
486 size_t size)
487{
488 ssize_t len;
489 ssize_t used = 0;
490
c5ef6035 491 len = security_inode_listsecurity(d_inode(dentry), buffer, size);
600e1779
MY
492 if (len < 0)
493 return len;
494 used += len;
495 if (buffer) {
496 if (size < used)
497 return -ERANGE;
498 buffer += len;
499 }
500
501 len = (XATTR_NAME_SOCKPROTONAME_LEN + 1);
502 used += len;
503 if (buffer) {
504 if (size < used)
505 return -ERANGE;
506 memcpy(buffer, XATTR_NAME_SOCKPROTONAME, len);
507 buffer += len;
508 }
509
510 return used;
511}
512
dc647ec8 513static int sockfs_setattr(struct dentry *dentry, struct iattr *iattr)
86741ec2
LC
514{
515 int err = simple_setattr(dentry, iattr);
516
e1a3a60a 517 if (!err && (iattr->ia_valid & ATTR_UID)) {
86741ec2
LC
518 struct socket *sock = SOCKET_I(d_inode(dentry));
519
6d8c50dc
CW
520 if (sock->sk)
521 sock->sk->sk_uid = iattr->ia_uid;
522 else
523 err = -ENOENT;
86741ec2
LC
524 }
525
526 return err;
527}
528
600e1779 529static const struct inode_operations sockfs_inode_ops = {
600e1779 530 .listxattr = sockfs_listxattr,
86741ec2 531 .setattr = sockfs_setattr,
600e1779
MY
532};
533
1da177e4
LT
534/**
535 * sock_alloc - allocate a socket
89bddce5 536 *
1da177e4
LT
537 * Allocate a new inode and socket object. The two are bound together
538 * and initialised. The socket is then returned. If we are out of inodes
539 * NULL is returned.
540 */
541
f4a00aac 542struct socket *sock_alloc(void)
1da177e4 543{
89bddce5
SH
544 struct inode *inode;
545 struct socket *sock;
1da177e4 546
a209dfc7 547 inode = new_inode_pseudo(sock_mnt->mnt_sb);
1da177e4
LT
548 if (!inode)
549 return NULL;
550
551 sock = SOCKET_I(inode);
552
85fe4025 553 inode->i_ino = get_next_ino();
89bddce5 554 inode->i_mode = S_IFSOCK | S_IRWXUGO;
8192b0c4
DH
555 inode->i_uid = current_fsuid();
556 inode->i_gid = current_fsgid();
600e1779 557 inode->i_op = &sockfs_inode_ops;
1da177e4 558
1da177e4
LT
559 return sock;
560}
f4a00aac 561EXPORT_SYMBOL(sock_alloc);
1da177e4 562
1da177e4
LT
563/**
564 * sock_release - close a socket
565 * @sock: socket to close
566 *
567 * The socket is released from the protocol stack if it has a release
568 * callback, and the inode is then released if the socket is bound to
89bddce5 569 * an inode not a file.
1da177e4 570 */
89bddce5 571
6d8c50dc 572static void __sock_release(struct socket *sock, struct inode *inode)
1da177e4
LT
573{
574 if (sock->ops) {
575 struct module *owner = sock->ops->owner;
576
6d8c50dc
CW
577 if (inode)
578 inode_lock(inode);
1da177e4 579 sock->ops->release(sock);
5fdb551f 580 sock->sk = NULL;
6d8c50dc
CW
581 if (inode)
582 inode_unlock(inode);
1da177e4
LT
583 sock->ops = NULL;
584 module_put(owner);
585 }
586
e6476c21 587 if (sock->wq->fasync_list)
3410f22e 588 pr_err("%s: fasync list not empty!\n", __func__);
1da177e4 589
1da177e4
LT
590 if (!sock->file) {
591 iput(SOCK_INODE(sock));
592 return;
593 }
89bddce5 594 sock->file = NULL;
1da177e4 595}
6d8c50dc
CW
596
597void sock_release(struct socket *sock)
598{
599 __sock_release(sock, NULL);
600}
c6d409cf 601EXPORT_SYMBOL(sock_release);
1da177e4 602
c14ac945 603void __sock_tx_timestamp(__u16 tsflags, __u8 *tx_flags)
20d49473 604{
140c55d4
ED
605 u8 flags = *tx_flags;
606
c14ac945 607 if (tsflags & SOF_TIMESTAMPING_TX_HARDWARE)
140c55d4
ED
608 flags |= SKBTX_HW_TSTAMP;
609
c14ac945 610 if (tsflags & SOF_TIMESTAMPING_TX_SOFTWARE)
140c55d4
ED
611 flags |= SKBTX_SW_TSTAMP;
612
c14ac945 613 if (tsflags & SOF_TIMESTAMPING_TX_SCHED)
140c55d4
ED
614 flags |= SKBTX_SCHED_TSTAMP;
615
140c55d4 616 *tx_flags = flags;
20d49473 617}
67cc0d40 618EXPORT_SYMBOL(__sock_tx_timestamp);
20d49473 619
d8725c86 620static inline int sock_sendmsg_nosec(struct socket *sock, struct msghdr *msg)
1da177e4 621{
01e97e65 622 int ret = sock->ops->sendmsg(sock, msg, msg_data_left(msg));
d8725c86
AV
623 BUG_ON(ret == -EIOCBQUEUED);
624 return ret;
1da177e4
LT
625}
626
d8725c86 627int sock_sendmsg(struct socket *sock, struct msghdr *msg)
228e548e 628{
d8725c86 629 int err = security_socket_sendmsg(sock, msg,
01e97e65 630 msg_data_left(msg));
228e548e 631
d8725c86 632 return err ?: sock_sendmsg_nosec(sock, msg);
0cf00c6f 633}
c6d409cf 634EXPORT_SYMBOL(sock_sendmsg);
1da177e4
LT
635
636int kernel_sendmsg(struct socket *sock, struct msghdr *msg,
637 struct kvec *vec, size_t num, size_t size)
638{
6aa24814 639 iov_iter_kvec(&msg->msg_iter, WRITE | ITER_KVEC, vec, num, size);
d8725c86 640 return sock_sendmsg(sock, msg);
1da177e4 641}
c6d409cf 642EXPORT_SYMBOL(kernel_sendmsg);
1da177e4 643
306b13eb
TH
644int kernel_sendmsg_locked(struct sock *sk, struct msghdr *msg,
645 struct kvec *vec, size_t num, size_t size)
646{
647 struct socket *sock = sk->sk_socket;
648
649 if (!sock->ops->sendmsg_locked)
db5980d8 650 return sock_no_sendmsg_locked(sk, msg, size);
306b13eb
TH
651
652 iov_iter_kvec(&msg->msg_iter, WRITE | ITER_KVEC, vec, num, size);
653
654 return sock->ops->sendmsg_locked(sk, msg, msg_data_left(msg));
655}
656EXPORT_SYMBOL(kernel_sendmsg_locked);
657
8605330a
SHY
658static bool skb_is_err_queue(const struct sk_buff *skb)
659{
660 /* pkt_type of skbs enqueued on the error queue are set to
661 * PACKET_OUTGOING in skb_set_err_queue(). This is only safe to do
662 * in recvmsg, since skbs received on a local socket will never
663 * have a pkt_type of PACKET_OUTGOING.
664 */
665 return skb->pkt_type == PACKET_OUTGOING;
666}
667
b50a5c70
ML
668/* On transmit, software and hardware timestamps are returned independently.
669 * As the two skb clones share the hardware timestamp, which may be updated
670 * before the software timestamp is received, a hardware TX timestamp may be
671 * returned only if there is no software TX timestamp. Ignore false software
672 * timestamps, which may be made in the __sock_recv_timestamp() call when the
673 * option SO_TIMESTAMP(NS) is enabled on the socket, even when the skb has a
674 * hardware timestamp.
675 */
676static bool skb_is_swtx_tstamp(const struct sk_buff *skb, int false_tstamp)
677{
678 return skb->tstamp && !false_tstamp && skb_is_err_queue(skb);
679}
680
aad9c8c4
ML
681static void put_ts_pktinfo(struct msghdr *msg, struct sk_buff *skb)
682{
683 struct scm_ts_pktinfo ts_pktinfo;
684 struct net_device *orig_dev;
685
686 if (!skb_mac_header_was_set(skb))
687 return;
688
689 memset(&ts_pktinfo, 0, sizeof(ts_pktinfo));
690
691 rcu_read_lock();
692 orig_dev = dev_get_by_napi_id(skb_napi_id(skb));
693 if (orig_dev)
694 ts_pktinfo.if_index = orig_dev->ifindex;
695 rcu_read_unlock();
696
697 ts_pktinfo.pkt_length = skb->len - skb_mac_offset(skb);
698 put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMPING_PKTINFO,
699 sizeof(ts_pktinfo), &ts_pktinfo);
700}
701
92f37fd2
ED
702/*
703 * called from sock_recv_timestamp() if sock_flag(sk, SOCK_RCVTSTAMP)
704 */
705void __sock_recv_timestamp(struct msghdr *msg, struct sock *sk,
706 struct sk_buff *skb)
707{
20d49473 708 int need_software_tstamp = sock_flag(sk, SOCK_RCVTSTAMP);
f24b9be5 709 struct scm_timestamping tss;
b50a5c70 710 int empty = 1, false_tstamp = 0;
20d49473
PO
711 struct skb_shared_hwtstamps *shhwtstamps =
712 skb_hwtstamps(skb);
713
714 /* Race occurred between timestamp enabling and packet
715 receiving. Fill in the current time for now. */
b50a5c70 716 if (need_software_tstamp && skb->tstamp == 0) {
20d49473 717 __net_timestamp(skb);
b50a5c70
ML
718 false_tstamp = 1;
719 }
20d49473
PO
720
721 if (need_software_tstamp) {
722 if (!sock_flag(sk, SOCK_RCVTSTAMPNS)) {
723 struct timeval tv;
724 skb_get_timestamp(skb, &tv);
725 put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMP,
726 sizeof(tv), &tv);
727 } else {
f24b9be5
WB
728 struct timespec ts;
729 skb_get_timestampns(skb, &ts);
20d49473 730 put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMPNS,
f24b9be5 731 sizeof(ts), &ts);
20d49473
PO
732 }
733 }
734
f24b9be5 735 memset(&tss, 0, sizeof(tss));
c199105d 736 if ((sk->sk_tsflags & SOF_TIMESTAMPING_SOFTWARE) &&
f24b9be5 737 ktime_to_timespec_cond(skb->tstamp, tss.ts + 0))
20d49473 738 empty = 0;
4d276eb6 739 if (shhwtstamps &&
b9f40e21 740 (sk->sk_tsflags & SOF_TIMESTAMPING_RAW_HARDWARE) &&
b50a5c70 741 !skb_is_swtx_tstamp(skb, false_tstamp) &&
aad9c8c4 742 ktime_to_timespec_cond(shhwtstamps->hwtstamp, tss.ts + 2)) {
4d276eb6 743 empty = 0;
aad9c8c4
ML
744 if ((sk->sk_tsflags & SOF_TIMESTAMPING_OPT_PKTINFO) &&
745 !skb_is_err_queue(skb))
746 put_ts_pktinfo(msg, skb);
747 }
1c885808 748 if (!empty) {
20d49473 749 put_cmsg(msg, SOL_SOCKET,
f24b9be5 750 SCM_TIMESTAMPING, sizeof(tss), &tss);
1c885808 751
8605330a 752 if (skb_is_err_queue(skb) && skb->len &&
4ef1b286 753 SKB_EXT_ERR(skb)->opt_stats)
1c885808
FY
754 put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMPING_OPT_STATS,
755 skb->len, skb->data);
756 }
92f37fd2 757}
7c81fd8b
ACM
758EXPORT_SYMBOL_GPL(__sock_recv_timestamp);
759
6e3e939f
JB
760void __sock_recv_wifi_status(struct msghdr *msg, struct sock *sk,
761 struct sk_buff *skb)
762{
763 int ack;
764
765 if (!sock_flag(sk, SOCK_WIFI_STATUS))
766 return;
767 if (!skb->wifi_acked_valid)
768 return;
769
770 ack = skb->wifi_acked;
771
772 put_cmsg(msg, SOL_SOCKET, SCM_WIFI_STATUS, sizeof(ack), &ack);
773}
774EXPORT_SYMBOL_GPL(__sock_recv_wifi_status);
775
11165f14 776static inline void sock_recv_drops(struct msghdr *msg, struct sock *sk,
777 struct sk_buff *skb)
3b885787 778{
744d5a3e 779 if (sock_flag(sk, SOCK_RXQ_OVFL) && skb && SOCK_SKB_CB(skb)->dropcount)
3b885787 780 put_cmsg(msg, SOL_SOCKET, SO_RXQ_OVFL,
744d5a3e 781 sizeof(__u32), &SOCK_SKB_CB(skb)->dropcount);
3b885787
NH
782}
783
767dd033 784void __sock_recv_ts_and_drops(struct msghdr *msg, struct sock *sk,
3b885787
NH
785 struct sk_buff *skb)
786{
787 sock_recv_timestamp(msg, sk, skb);
788 sock_recv_drops(msg, sk, skb);
789}
767dd033 790EXPORT_SYMBOL_GPL(__sock_recv_ts_and_drops);
3b885787 791
1b784140 792static inline int sock_recvmsg_nosec(struct socket *sock, struct msghdr *msg,
2da62906 793 int flags)
1da177e4 794{
2da62906 795 return sock->ops->recvmsg(sock, msg, msg_data_left(msg), flags);
1da177e4
LT
796}
797
2da62906 798int sock_recvmsg(struct socket *sock, struct msghdr *msg, int flags)
a2e27255 799{
2da62906 800 int err = security_socket_recvmsg(sock, msg, msg_data_left(msg), flags);
a2e27255 801
2da62906 802 return err ?: sock_recvmsg_nosec(sock, msg, flags);
1da177e4 803}
c6d409cf 804EXPORT_SYMBOL(sock_recvmsg);
1da177e4 805
c1249c0a
ML
806/**
807 * kernel_recvmsg - Receive a message from a socket (kernel space)
808 * @sock: The socket to receive the message from
809 * @msg: Received message
810 * @vec: Input s/g array for message data
811 * @num: Size of input s/g array
812 * @size: Number of bytes to read
813 * @flags: Message flags (MSG_DONTWAIT, etc...)
814 *
815 * On return the msg structure contains the scatter/gather array passed in the
816 * vec argument. The array is modified so that it consists of the unfilled
817 * portion of the original array.
818 *
819 * The returned value is the total number of bytes received, or an error.
820 */
89bddce5
SH
821int kernel_recvmsg(struct socket *sock, struct msghdr *msg,
822 struct kvec *vec, size_t num, size_t size, int flags)
1da177e4
LT
823{
824 mm_segment_t oldfs = get_fs();
825 int result;
826
6aa24814 827 iov_iter_kvec(&msg->msg_iter, READ | ITER_KVEC, vec, num, size);
1da177e4 828 set_fs(KERNEL_DS);
2da62906 829 result = sock_recvmsg(sock, msg, flags);
1da177e4
LT
830 set_fs(oldfs);
831 return result;
832}
c6d409cf 833EXPORT_SYMBOL(kernel_recvmsg);
1da177e4 834
ce1d4d3e
CH
835static ssize_t sock_sendpage(struct file *file, struct page *page,
836 int offset, size_t size, loff_t *ppos, int more)
1da177e4 837{
1da177e4
LT
838 struct socket *sock;
839 int flags;
840
ce1d4d3e
CH
841 sock = file->private_data;
842
35f9c09f
ED
843 flags = (file->f_flags & O_NONBLOCK) ? MSG_DONTWAIT : 0;
844 /* more is a combination of MSG_MORE and MSG_SENDPAGE_NOTLAST */
845 flags |= more;
ce1d4d3e 846
e6949583 847 return kernel_sendpage(sock, page, offset, size, flags);
ce1d4d3e 848}
1da177e4 849
9c55e01c 850static ssize_t sock_splice_read(struct file *file, loff_t *ppos,
c6d409cf 851 struct pipe_inode_info *pipe, size_t len,
9c55e01c
JA
852 unsigned int flags)
853{
854 struct socket *sock = file->private_data;
855
997b37da
RDC
856 if (unlikely(!sock->ops->splice_read))
857 return -EINVAL;
858
9c55e01c
JA
859 return sock->ops->splice_read(sock, ppos, pipe, len, flags);
860}
861
8ae5e030 862static ssize_t sock_read_iter(struct kiocb *iocb, struct iov_iter *to)
ce1d4d3e 863{
6d652330
AV
864 struct file *file = iocb->ki_filp;
865 struct socket *sock = file->private_data;
0345f931 866 struct msghdr msg = {.msg_iter = *to,
867 .msg_iocb = iocb};
8ae5e030 868 ssize_t res;
ce1d4d3e 869
8ae5e030
AV
870 if (file->f_flags & O_NONBLOCK)
871 msg.msg_flags = MSG_DONTWAIT;
872
873 if (iocb->ki_pos != 0)
1da177e4 874 return -ESPIPE;
027445c3 875
66ee59af 876 if (!iov_iter_count(to)) /* Match SYS5 behaviour */
1da177e4
LT
877 return 0;
878
2da62906 879 res = sock_recvmsg(sock, &msg, msg.msg_flags);
8ae5e030
AV
880 *to = msg.msg_iter;
881 return res;
1da177e4
LT
882}
883
8ae5e030 884static ssize_t sock_write_iter(struct kiocb *iocb, struct iov_iter *from)
ce1d4d3e 885{
6d652330
AV
886 struct file *file = iocb->ki_filp;
887 struct socket *sock = file->private_data;
0345f931 888 struct msghdr msg = {.msg_iter = *from,
889 .msg_iocb = iocb};
8ae5e030 890 ssize_t res;
1da177e4 891
8ae5e030 892 if (iocb->ki_pos != 0)
ce1d4d3e 893 return -ESPIPE;
027445c3 894
8ae5e030
AV
895 if (file->f_flags & O_NONBLOCK)
896 msg.msg_flags = MSG_DONTWAIT;
897
6d652330
AV
898 if (sock->type == SOCK_SEQPACKET)
899 msg.msg_flags |= MSG_EOR;
900
d8725c86 901 res = sock_sendmsg(sock, &msg);
8ae5e030
AV
902 *from = msg.msg_iter;
903 return res;
1da177e4
LT
904}
905
1da177e4
LT
906/*
907 * Atomic setting of ioctl hooks to avoid race
908 * with module unload.
909 */
910
4a3e2f71 911static DEFINE_MUTEX(br_ioctl_mutex);
c6d409cf 912static int (*br_ioctl_hook) (struct net *, unsigned int cmd, void __user *arg);
1da177e4 913
881d966b 914void brioctl_set(int (*hook) (struct net *, unsigned int, void __user *))
1da177e4 915{
4a3e2f71 916 mutex_lock(&br_ioctl_mutex);
1da177e4 917 br_ioctl_hook = hook;
4a3e2f71 918 mutex_unlock(&br_ioctl_mutex);
1da177e4
LT
919}
920EXPORT_SYMBOL(brioctl_set);
921
4a3e2f71 922static DEFINE_MUTEX(vlan_ioctl_mutex);
881d966b 923static int (*vlan_ioctl_hook) (struct net *, void __user *arg);
1da177e4 924
881d966b 925void vlan_ioctl_set(int (*hook) (struct net *, void __user *))
1da177e4 926{
4a3e2f71 927 mutex_lock(&vlan_ioctl_mutex);
1da177e4 928 vlan_ioctl_hook = hook;
4a3e2f71 929 mutex_unlock(&vlan_ioctl_mutex);
1da177e4
LT
930}
931EXPORT_SYMBOL(vlan_ioctl_set);
932
4a3e2f71 933static DEFINE_MUTEX(dlci_ioctl_mutex);
89bddce5 934static int (*dlci_ioctl_hook) (unsigned int, void __user *);
1da177e4 935
89bddce5 936void dlci_ioctl_set(int (*hook) (unsigned int, void __user *))
1da177e4 937{
4a3e2f71 938 mutex_lock(&dlci_ioctl_mutex);
1da177e4 939 dlci_ioctl_hook = hook;
4a3e2f71 940 mutex_unlock(&dlci_ioctl_mutex);
1da177e4
LT
941}
942EXPORT_SYMBOL(dlci_ioctl_set);
943
6b96018b 944static long sock_do_ioctl(struct net *net, struct socket *sock,
99f3c896 945 unsigned int cmd, unsigned long arg)
6b96018b
AB
946{
947 int err;
948 void __user *argp = (void __user *)arg;
949
950 err = sock->ops->ioctl(sock, cmd, arg);
951
952 /*
953 * If this ioctl is unknown try to hand it down
954 * to the NIC driver.
955 */
36fd633e
AV
956 if (err != -ENOIOCTLCMD)
957 return err;
6b96018b 958
36fd633e
AV
959 if (cmd == SIOCGIFCONF) {
960 struct ifconf ifc;
961 if (copy_from_user(&ifc, argp, sizeof(struct ifconf)))
962 return -EFAULT;
963 rtnl_lock();
964 err = dev_ifconf(net, &ifc, sizeof(struct ifreq));
965 rtnl_unlock();
966 if (!err && copy_to_user(argp, &ifc, sizeof(struct ifconf)))
967 err = -EFAULT;
44c02a2c
AV
968 } else {
969 struct ifreq ifr;
970 bool need_copyout;
99f3c896 971 if (copy_from_user(&ifr, argp, sizeof(struct ifreq)))
44c02a2c
AV
972 return -EFAULT;
973 err = dev_ioctl(net, cmd, &ifr, &need_copyout);
974 if (!err && need_copyout)
99f3c896 975 if (copy_to_user(argp, &ifr, sizeof(struct ifreq)))
44c02a2c 976 return -EFAULT;
36fd633e 977 }
6b96018b
AB
978 return err;
979}
980
1da177e4
LT
981/*
982 * With an ioctl, arg may well be a user mode pointer, but we don't know
983 * what to do with it - that's up to the protocol still.
984 */
985
d8d211a2 986struct ns_common *get_net_ns(struct ns_common *ns)
c62cce2c
AV
987{
988 return &get_net(container_of(ns, struct net, ns))->ns;
989}
d8d211a2 990EXPORT_SYMBOL_GPL(get_net_ns);
c62cce2c 991
1da177e4
LT
992static long sock_ioctl(struct file *file, unsigned cmd, unsigned long arg)
993{
994 struct socket *sock;
881d966b 995 struct sock *sk;
1da177e4
LT
996 void __user *argp = (void __user *)arg;
997 int pid, err;
881d966b 998 struct net *net;
1da177e4 999
b69aee04 1000 sock = file->private_data;
881d966b 1001 sk = sock->sk;
3b1e0a65 1002 net = sock_net(sk);
44c02a2c
AV
1003 if (unlikely(cmd >= SIOCDEVPRIVATE && cmd <= (SIOCDEVPRIVATE + 15))) {
1004 struct ifreq ifr;
1005 bool need_copyout;
1006 if (copy_from_user(&ifr, argp, sizeof(struct ifreq)))
1007 return -EFAULT;
1008 err = dev_ioctl(net, cmd, &ifr, &need_copyout);
1009 if (!err && need_copyout)
1010 if (copy_to_user(argp, &ifr, sizeof(struct ifreq)))
1011 return -EFAULT;
1da177e4 1012 } else
3d23e349 1013#ifdef CONFIG_WEXT_CORE
1da177e4 1014 if (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST) {
b1b0c245 1015 err = wext_handle_ioctl(net, cmd, argp);
1da177e4 1016 } else
3d23e349 1017#endif
89bddce5 1018 switch (cmd) {
1da177e4
LT
1019 case FIOSETOWN:
1020 case SIOCSPGRP:
1021 err = -EFAULT;
1022 if (get_user(pid, (int __user *)argp))
1023 break;
393cc3f5 1024 err = f_setown(sock->file, pid, 1);
1da177e4
LT
1025 break;
1026 case FIOGETOWN:
1027 case SIOCGPGRP:
609d7fa9 1028 err = put_user(f_getown(sock->file),
89bddce5 1029 (int __user *)argp);
1da177e4
LT
1030 break;
1031 case SIOCGIFBR:
1032 case SIOCSIFBR:
1033 case SIOCBRADDBR:
1034 case SIOCBRDELBR:
1035 err = -ENOPKG;
1036 if (!br_ioctl_hook)
1037 request_module("bridge");
1038
4a3e2f71 1039 mutex_lock(&br_ioctl_mutex);
89bddce5 1040 if (br_ioctl_hook)
881d966b 1041 err = br_ioctl_hook(net, cmd, argp);
4a3e2f71 1042 mutex_unlock(&br_ioctl_mutex);
1da177e4
LT
1043 break;
1044 case SIOCGIFVLAN:
1045 case SIOCSIFVLAN:
1046 err = -ENOPKG;
1047 if (!vlan_ioctl_hook)
1048 request_module("8021q");
1049
4a3e2f71 1050 mutex_lock(&vlan_ioctl_mutex);
1da177e4 1051 if (vlan_ioctl_hook)
881d966b 1052 err = vlan_ioctl_hook(net, argp);
4a3e2f71 1053 mutex_unlock(&vlan_ioctl_mutex);
1da177e4 1054 break;
1da177e4
LT
1055 case SIOCADDDLCI:
1056 case SIOCDELDLCI:
1057 err = -ENOPKG;
1058 if (!dlci_ioctl_hook)
1059 request_module("dlci");
1060
7512cbf6
PE
1061 mutex_lock(&dlci_ioctl_mutex);
1062 if (dlci_ioctl_hook)
1da177e4 1063 err = dlci_ioctl_hook(cmd, argp);
7512cbf6 1064 mutex_unlock(&dlci_ioctl_mutex);
1da177e4 1065 break;
c62cce2c
AV
1066 case SIOCGSKNS:
1067 err = -EPERM;
1068 if (!ns_capable(net->user_ns, CAP_NET_ADMIN))
1069 break;
1070
1071 err = open_related_ns(&net->ns, get_net_ns);
1072 break;
1da177e4 1073 default:
99f3c896 1074 err = sock_do_ioctl(net, sock, cmd, arg);
1da177e4 1075 break;
89bddce5 1076 }
1da177e4
LT
1077 return err;
1078}
1079
1080int sock_create_lite(int family, int type, int protocol, struct socket **res)
1081{
1082 int err;
1083 struct socket *sock = NULL;
89bddce5 1084
1da177e4
LT
1085 err = security_socket_create(family, type, protocol, 1);
1086 if (err)
1087 goto out;
1088
1089 sock = sock_alloc();
1090 if (!sock) {
1091 err = -ENOMEM;
1092 goto out;
1093 }
1094
1da177e4 1095 sock->type = type;
7420ed23
VY
1096 err = security_socket_post_create(sock, family, type, protocol, 1);
1097 if (err)
1098 goto out_release;
1099
1da177e4
LT
1100out:
1101 *res = sock;
1102 return err;
7420ed23
VY
1103out_release:
1104 sock_release(sock);
1105 sock = NULL;
1106 goto out;
1da177e4 1107}
c6d409cf 1108EXPORT_SYMBOL(sock_create_lite);
1da177e4
LT
1109
1110/* No kernel lock held - perfect */
ade994f4 1111static __poll_t sock_poll(struct file *file, poll_table *wait)
1da177e4 1112{
3cafb376 1113 struct socket *sock = file->private_data;
a331de3b 1114 __poll_t events = poll_requested_events(wait), flag = 0;
2d48d67f 1115
e88958e6
CH
1116 if (!sock->ops->poll)
1117 return 0;
f641f13b 1118
a331de3b
CH
1119 if (sk_can_busy_loop(sock->sk)) {
1120 /* poll once if requested by the syscall */
1121 if (events & POLL_BUSY_LOOP)
1122 sk_busy_loop(sock->sk, 1);
1123
1124 /* if this socket can poll_ll, tell the system call */
1125 flag = POLL_BUSY_LOOP;
1126 }
1127
1128 return sock->ops->poll(file, sock, wait) | flag;
1da177e4
LT
1129}
1130
89bddce5 1131static int sock_mmap(struct file *file, struct vm_area_struct *vma)
1da177e4 1132{
b69aee04 1133 struct socket *sock = file->private_data;
1da177e4
LT
1134
1135 return sock->ops->mmap(file, sock, vma);
1136}
1137
20380731 1138static int sock_close(struct inode *inode, struct file *filp)
1da177e4 1139{
6d8c50dc 1140 __sock_release(SOCKET_I(inode), inode);
1da177e4
LT
1141 return 0;
1142}
1143
1144/*
1145 * Update the socket async list
1146 *
1147 * Fasync_list locking strategy.
1148 *
1149 * 1. fasync_list is modified only under process context socket lock
1150 * i.e. under semaphore.
1151 * 2. fasync_list is used under read_lock(&sk->sk_callback_lock)
989a2979 1152 * or under socket lock
1da177e4
LT
1153 */
1154
1155static int sock_fasync(int fd, struct file *filp, int on)
1156{
989a2979
ED
1157 struct socket *sock = filp->private_data;
1158 struct sock *sk = sock->sk;
eaefd110 1159 struct socket_wq *wq;
1da177e4 1160
989a2979 1161 if (sk == NULL)
1da177e4 1162 return -EINVAL;
1da177e4
LT
1163
1164 lock_sock(sk);
e6476c21 1165 wq = sock->wq;
eaefd110 1166 fasync_helper(fd, filp, on, &wq->fasync_list);
1da177e4 1167
eaefd110 1168 if (!wq->fasync_list)
989a2979
ED
1169 sock_reset_flag(sk, SOCK_FASYNC);
1170 else
bcdce719 1171 sock_set_flag(sk, SOCK_FASYNC);
1da177e4 1172
989a2979 1173 release_sock(sk);
1da177e4
LT
1174 return 0;
1175}
1176
ceb5d58b 1177/* This function may be called only under rcu_lock */
1da177e4 1178
ceb5d58b 1179int sock_wake_async(struct socket_wq *wq, int how, int band)
1da177e4 1180{
ceb5d58b 1181 if (!wq || !wq->fasync_list)
1da177e4 1182 return -1;
ceb5d58b 1183
89bddce5 1184 switch (how) {
8d8ad9d7 1185 case SOCK_WAKE_WAITD:
ceb5d58b 1186 if (test_bit(SOCKWQ_ASYNC_WAITDATA, &wq->flags))
1da177e4
LT
1187 break;
1188 goto call_kill;
8d8ad9d7 1189 case SOCK_WAKE_SPACE:
ceb5d58b 1190 if (!test_and_clear_bit(SOCKWQ_ASYNC_NOSPACE, &wq->flags))
1da177e4
LT
1191 break;
1192 /* fall through */
8d8ad9d7 1193 case SOCK_WAKE_IO:
89bddce5 1194call_kill:
43815482 1195 kill_fasync(&wq->fasync_list, SIGIO, band);
1da177e4 1196 break;
8d8ad9d7 1197 case SOCK_WAKE_URG:
43815482 1198 kill_fasync(&wq->fasync_list, SIGURG, band);
1da177e4 1199 }
ceb5d58b 1200
1da177e4
LT
1201 return 0;
1202}
c6d409cf 1203EXPORT_SYMBOL(sock_wake_async);
1da177e4 1204
721db93a 1205int __sock_create(struct net *net, int family, int type, int protocol,
89bddce5 1206 struct socket **res, int kern)
1da177e4
LT
1207{
1208 int err;
1209 struct socket *sock;
55737fda 1210 const struct net_proto_family *pf;
1da177e4
LT
1211
1212 /*
89bddce5 1213 * Check protocol is in range
1da177e4
LT
1214 */
1215 if (family < 0 || family >= NPROTO)
1216 return -EAFNOSUPPORT;
1217 if (type < 0 || type >= SOCK_MAX)
1218 return -EINVAL;
1219
1220 /* Compatibility.
1221
1222 This uglymoron is moved from INET layer to here to avoid
1223 deadlock in module load.
1224 */
1225 if (family == PF_INET && type == SOCK_PACKET) {
f3c98690 1226 pr_info_once("%s uses obsolete (PF_INET,SOCK_PACKET)\n",
1227 current->comm);
1da177e4
LT
1228 family = PF_PACKET;
1229 }
1230
1231 err = security_socket_create(family, type, protocol, kern);
1232 if (err)
1233 return err;
89bddce5 1234
55737fda
SH
1235 /*
1236 * Allocate the socket and allow the family to set things up. if
1237 * the protocol is 0, the family is instructed to select an appropriate
1238 * default.
1239 */
1240 sock = sock_alloc();
1241 if (!sock) {
e87cc472 1242 net_warn_ratelimited("socket: no more sockets\n");
55737fda
SH
1243 return -ENFILE; /* Not exactly a match, but its the
1244 closest posix thing */
1245 }
1246
1247 sock->type = type;
1248
95a5afca 1249#ifdef CONFIG_MODULES
89bddce5
SH
1250 /* Attempt to load a protocol module if the find failed.
1251 *
1252 * 12/09/1996 Marcin: But! this makes REALLY only sense, if the user
1da177e4
LT
1253 * requested real, full-featured networking support upon configuration.
1254 * Otherwise module support will break!
1255 */
190683a9 1256 if (rcu_access_pointer(net_families[family]) == NULL)
89bddce5 1257 request_module("net-pf-%d", family);
1da177e4
LT
1258#endif
1259
55737fda
SH
1260 rcu_read_lock();
1261 pf = rcu_dereference(net_families[family]);
1262 err = -EAFNOSUPPORT;
1263 if (!pf)
1264 goto out_release;
1da177e4
LT
1265
1266 /*
1267 * We will call the ->create function, that possibly is in a loadable
1268 * module, so we have to bump that loadable module refcnt first.
1269 */
55737fda 1270 if (!try_module_get(pf->owner))
1da177e4
LT
1271 goto out_release;
1272
55737fda
SH
1273 /* Now protected by module ref count */
1274 rcu_read_unlock();
1275
3f378b68 1276 err = pf->create(net, sock, protocol, kern);
55737fda 1277 if (err < 0)
1da177e4 1278 goto out_module_put;
a79af59e 1279
1da177e4
LT
1280 /*
1281 * Now to bump the refcnt of the [loadable] module that owns this
1282 * socket at sock_release time we decrement its refcnt.
1283 */
55737fda
SH
1284 if (!try_module_get(sock->ops->owner))
1285 goto out_module_busy;
1286
1da177e4
LT
1287 /*
1288 * Now that we're done with the ->create function, the [loadable]
1289 * module can have its refcnt decremented
1290 */
55737fda 1291 module_put(pf->owner);
7420ed23
VY
1292 err = security_socket_post_create(sock, family, type, protocol, kern);
1293 if (err)
3b185525 1294 goto out_sock_release;
55737fda 1295 *res = sock;
1da177e4 1296
55737fda
SH
1297 return 0;
1298
1299out_module_busy:
1300 err = -EAFNOSUPPORT;
1da177e4 1301out_module_put:
55737fda
SH
1302 sock->ops = NULL;
1303 module_put(pf->owner);
1304out_sock_release:
1da177e4 1305 sock_release(sock);
55737fda
SH
1306 return err;
1307
1308out_release:
1309 rcu_read_unlock();
1310 goto out_sock_release;
1da177e4 1311}
721db93a 1312EXPORT_SYMBOL(__sock_create);
1da177e4
LT
1313
1314int sock_create(int family, int type, int protocol, struct socket **res)
1315{
1b8d7ae4 1316 return __sock_create(current->nsproxy->net_ns, family, type, protocol, res, 0);
1da177e4 1317}
c6d409cf 1318EXPORT_SYMBOL(sock_create);
1da177e4 1319
eeb1bd5c 1320int sock_create_kern(struct net *net, int family, int type, int protocol, struct socket **res)
1da177e4 1321{
eeb1bd5c 1322 return __sock_create(net, family, type, protocol, res, 1);
1da177e4 1323}
c6d409cf 1324EXPORT_SYMBOL(sock_create_kern);
1da177e4 1325
9d6a15c3 1326int __sys_socket(int family, int type, int protocol)
1da177e4
LT
1327{
1328 int retval;
1329 struct socket *sock;
a677a039
UD
1330 int flags;
1331
e38b36f3
UD
1332 /* Check the SOCK_* constants for consistency. */
1333 BUILD_BUG_ON(SOCK_CLOEXEC != O_CLOEXEC);
1334 BUILD_BUG_ON((SOCK_MAX | SOCK_TYPE_MASK) != SOCK_TYPE_MASK);
1335 BUILD_BUG_ON(SOCK_CLOEXEC & SOCK_TYPE_MASK);
1336 BUILD_BUG_ON(SOCK_NONBLOCK & SOCK_TYPE_MASK);
1337
a677a039 1338 flags = type & ~SOCK_TYPE_MASK;
77d27200 1339 if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
a677a039
UD
1340 return -EINVAL;
1341 type &= SOCK_TYPE_MASK;
1da177e4 1342
aaca0bdc
UD
1343 if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
1344 flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
1345
1da177e4
LT
1346 retval = sock_create(family, type, protocol, &sock);
1347 if (retval < 0)
8e1611e2 1348 return retval;
1da177e4 1349
8e1611e2 1350 return sock_map_fd(sock, flags & (O_CLOEXEC | O_NONBLOCK));
1da177e4
LT
1351}
1352
9d6a15c3
DB
1353SYSCALL_DEFINE3(socket, int, family, int, type, int, protocol)
1354{
1355 return __sys_socket(family, type, protocol);
1356}
1357
1da177e4
LT
1358/*
1359 * Create a pair of connected sockets.
1360 */
1361
6debc8d8 1362int __sys_socketpair(int family, int type, int protocol, int __user *usockvec)
1da177e4
LT
1363{
1364 struct socket *sock1, *sock2;
1365 int fd1, fd2, err;
db349509 1366 struct file *newfile1, *newfile2;
a677a039
UD
1367 int flags;
1368
1369 flags = type & ~SOCK_TYPE_MASK;
77d27200 1370 if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
a677a039
UD
1371 return -EINVAL;
1372 type &= SOCK_TYPE_MASK;
1da177e4 1373
aaca0bdc
UD
1374 if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
1375 flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
1376
016a266b
AV
1377 /*
1378 * reserve descriptors and make sure we won't fail
1379 * to return them to userland.
1380 */
1381 fd1 = get_unused_fd_flags(flags);
1382 if (unlikely(fd1 < 0))
1383 return fd1;
1384
1385 fd2 = get_unused_fd_flags(flags);
1386 if (unlikely(fd2 < 0)) {
1387 put_unused_fd(fd1);
1388 return fd2;
1389 }
1390
1391 err = put_user(fd1, &usockvec[0]);
1392 if (err)
1393 goto out;
1394
1395 err = put_user(fd2, &usockvec[1]);
1396 if (err)
1397 goto out;
1398
1da177e4
LT
1399 /*
1400 * Obtain the first socket and check if the underlying protocol
1401 * supports the socketpair call.
1402 */
1403
1404 err = sock_create(family, type, protocol, &sock1);
016a266b 1405 if (unlikely(err < 0))
1da177e4
LT
1406 goto out;
1407
1408 err = sock_create(family, type, protocol, &sock2);
016a266b
AV
1409 if (unlikely(err < 0)) {
1410 sock_release(sock1);
1411 goto out;
bf3c23d1 1412 }
d73aa286 1413
d47cd945
DH
1414 err = security_socket_socketpair(sock1, sock2);
1415 if (unlikely(err)) {
1416 sock_release(sock2);
1417 sock_release(sock1);
1418 goto out;
1419 }
1420
016a266b
AV
1421 err = sock1->ops->socketpair(sock1, sock2);
1422 if (unlikely(err < 0)) {
1423 sock_release(sock2);
1424 sock_release(sock1);
1425 goto out;
28407630
AV
1426 }
1427
aab174f0 1428 newfile1 = sock_alloc_file(sock1, flags, NULL);
b5ffe634 1429 if (IS_ERR(newfile1)) {
28407630 1430 err = PTR_ERR(newfile1);
016a266b
AV
1431 sock_release(sock2);
1432 goto out;
28407630
AV
1433 }
1434
aab174f0 1435 newfile2 = sock_alloc_file(sock2, flags, NULL);
28407630
AV
1436 if (IS_ERR(newfile2)) {
1437 err = PTR_ERR(newfile2);
016a266b
AV
1438 fput(newfile1);
1439 goto out;
db349509
AV
1440 }
1441
157cf649 1442 audit_fd_pair(fd1, fd2);
d73aa286 1443
db349509
AV
1444 fd_install(fd1, newfile1);
1445 fd_install(fd2, newfile2);
d73aa286 1446 return 0;
1da177e4 1447
016a266b 1448out:
d73aa286 1449 put_unused_fd(fd2);
d73aa286 1450 put_unused_fd(fd1);
1da177e4
LT
1451 return err;
1452}
1453
6debc8d8
DB
1454SYSCALL_DEFINE4(socketpair, int, family, int, type, int, protocol,
1455 int __user *, usockvec)
1456{
1457 return __sys_socketpair(family, type, protocol, usockvec);
1458}
1459
1da177e4
LT
1460/*
1461 * Bind a name to a socket. Nothing much to do here since it's
1462 * the protocol's responsibility to handle the local address.
1463 *
1464 * We move the socket address to kernel space before we call
1465 * the protocol layer (having also checked the address is ok).
1466 */
1467
a87d35d8 1468int __sys_bind(int fd, struct sockaddr __user *umyaddr, int addrlen)
1da177e4
LT
1469{
1470 struct socket *sock;
230b1839 1471 struct sockaddr_storage address;
6cb153ca 1472 int err, fput_needed;
1da177e4 1473
89bddce5 1474 sock = sockfd_lookup_light(fd, &err, &fput_needed);
e71a4783 1475 if (sock) {
43db362d 1476 err = move_addr_to_kernel(umyaddr, addrlen, &address);
89bddce5
SH
1477 if (err >= 0) {
1478 err = security_socket_bind(sock,
230b1839 1479 (struct sockaddr *)&address,
89bddce5 1480 addrlen);
6cb153ca
BL
1481 if (!err)
1482 err = sock->ops->bind(sock,
89bddce5 1483 (struct sockaddr *)
230b1839 1484 &address, addrlen);
1da177e4 1485 }
6cb153ca 1486 fput_light(sock->file, fput_needed);
89bddce5 1487 }
1da177e4
LT
1488 return err;
1489}
1490
a87d35d8
DB
1491SYSCALL_DEFINE3(bind, int, fd, struct sockaddr __user *, umyaddr, int, addrlen)
1492{
1493 return __sys_bind(fd, umyaddr, addrlen);
1494}
1495
1da177e4
LT
1496/*
1497 * Perform a listen. Basically, we allow the protocol to do anything
1498 * necessary for a listen, and if that works, we mark the socket as
1499 * ready for listening.
1500 */
1501
25e290ee 1502int __sys_listen(int fd, int backlog)
1da177e4
LT
1503{
1504 struct socket *sock;
6cb153ca 1505 int err, fput_needed;
b8e1f9b5 1506 int somaxconn;
89bddce5
SH
1507
1508 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1509 if (sock) {
8efa6e93 1510 somaxconn = sock_net(sock->sk)->core.sysctl_somaxconn;
95c96174 1511 if ((unsigned int)backlog > somaxconn)
b8e1f9b5 1512 backlog = somaxconn;
1da177e4
LT
1513
1514 err = security_socket_listen(sock, backlog);
6cb153ca
BL
1515 if (!err)
1516 err = sock->ops->listen(sock, backlog);
1da177e4 1517
6cb153ca 1518 fput_light(sock->file, fput_needed);
1da177e4
LT
1519 }
1520 return err;
1521}
1522
25e290ee
DB
1523SYSCALL_DEFINE2(listen, int, fd, int, backlog)
1524{
1525 return __sys_listen(fd, backlog);
1526}
1527
1da177e4
LT
1528/*
1529 * For accept, we attempt to create a new socket, set up the link
1530 * with the client, wake up the client, then return the new
1531 * connected fd. We collect the address of the connector in kernel
1532 * space and move it to user at the very end. This is unclean because
1533 * we open the socket then return an error.
1534 *
1535 * 1003.1g adds the ability to recvmsg() to query connection pending
1536 * status to recvmsg. We need to add that support in a way thats
b903036a 1537 * clean when we restructure accept also.
1da177e4
LT
1538 */
1539
4541e805
DB
1540int __sys_accept4(int fd, struct sockaddr __user *upeer_sockaddr,
1541 int __user *upeer_addrlen, int flags)
1da177e4
LT
1542{
1543 struct socket *sock, *newsock;
39d8c1b6 1544 struct file *newfile;
6cb153ca 1545 int err, len, newfd, fput_needed;
230b1839 1546 struct sockaddr_storage address;
1da177e4 1547
77d27200 1548 if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
aaca0bdc
UD
1549 return -EINVAL;
1550
1551 if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
1552 flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
1553
6cb153ca 1554 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4
LT
1555 if (!sock)
1556 goto out;
1557
1558 err = -ENFILE;
c6d409cf
ED
1559 newsock = sock_alloc();
1560 if (!newsock)
1da177e4
LT
1561 goto out_put;
1562
1563 newsock->type = sock->type;
1564 newsock->ops = sock->ops;
1565
1da177e4
LT
1566 /*
1567 * We don't need try_module_get here, as the listening socket (sock)
1568 * has the protocol module (sock->ops->owner) held.
1569 */
1570 __module_get(newsock->ops->owner);
1571
28407630 1572 newfd = get_unused_fd_flags(flags);
39d8c1b6
DM
1573 if (unlikely(newfd < 0)) {
1574 err = newfd;
9a1875e6
DM
1575 sock_release(newsock);
1576 goto out_put;
39d8c1b6 1577 }
aab174f0 1578 newfile = sock_alloc_file(newsock, flags, sock->sk->sk_prot_creator->name);
b5ffe634 1579 if (IS_ERR(newfile)) {
28407630
AV
1580 err = PTR_ERR(newfile);
1581 put_unused_fd(newfd);
28407630
AV
1582 goto out_put;
1583 }
39d8c1b6 1584
a79af59e
FF
1585 err = security_socket_accept(sock, newsock);
1586 if (err)
39d8c1b6 1587 goto out_fd;
a79af59e 1588
cdfbabfb 1589 err = sock->ops->accept(sock, newsock, sock->file->f_flags, false);
1da177e4 1590 if (err < 0)
39d8c1b6 1591 goto out_fd;
1da177e4
LT
1592
1593 if (upeer_sockaddr) {
9b2c45d4
DV
1594 len = newsock->ops->getname(newsock,
1595 (struct sockaddr *)&address, 2);
1596 if (len < 0) {
1da177e4 1597 err = -ECONNABORTED;
39d8c1b6 1598 goto out_fd;
1da177e4 1599 }
43db362d 1600 err = move_addr_to_user(&address,
230b1839 1601 len, upeer_sockaddr, upeer_addrlen);
1da177e4 1602 if (err < 0)
39d8c1b6 1603 goto out_fd;
1da177e4
LT
1604 }
1605
1606 /* File flags are not inherited via accept() unlike another OSes. */
1607
39d8c1b6
DM
1608 fd_install(newfd, newfile);
1609 err = newfd;
1da177e4 1610
1da177e4 1611out_put:
6cb153ca 1612 fput_light(sock->file, fput_needed);
1da177e4
LT
1613out:
1614 return err;
39d8c1b6 1615out_fd:
9606a216 1616 fput(newfile);
39d8c1b6 1617 put_unused_fd(newfd);
1da177e4
LT
1618 goto out_put;
1619}
1620
4541e805
DB
1621SYSCALL_DEFINE4(accept4, int, fd, struct sockaddr __user *, upeer_sockaddr,
1622 int __user *, upeer_addrlen, int, flags)
1623{
1624 return __sys_accept4(fd, upeer_sockaddr, upeer_addrlen, flags);
1625}
1626
20f37034
HC
1627SYSCALL_DEFINE3(accept, int, fd, struct sockaddr __user *, upeer_sockaddr,
1628 int __user *, upeer_addrlen)
aaca0bdc 1629{
4541e805 1630 return __sys_accept4(fd, upeer_sockaddr, upeer_addrlen, 0);
aaca0bdc
UD
1631}
1632
1da177e4
LT
1633/*
1634 * Attempt to connect to a socket with the server address. The address
1635 * is in user space so we verify it is OK and move it to kernel space.
1636 *
1637 * For 1003.1g we need to add clean support for a bind to AF_UNSPEC to
1638 * break bindings
1639 *
1640 * NOTE: 1003.1g draft 6.3 is broken with respect to AX.25/NetROM and
1641 * other SEQPACKET protocols that take time to connect() as it doesn't
1642 * include the -EINPROGRESS status for such sockets.
1643 */
1644
1387c2c2 1645int __sys_connect(int fd, struct sockaddr __user *uservaddr, int addrlen)
1da177e4
LT
1646{
1647 struct socket *sock;
230b1839 1648 struct sockaddr_storage address;
6cb153ca 1649 int err, fput_needed;
1da177e4 1650
6cb153ca 1651 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4
LT
1652 if (!sock)
1653 goto out;
43db362d 1654 err = move_addr_to_kernel(uservaddr, addrlen, &address);
1da177e4
LT
1655 if (err < 0)
1656 goto out_put;
1657
89bddce5 1658 err =
230b1839 1659 security_socket_connect(sock, (struct sockaddr *)&address, addrlen);
1da177e4
LT
1660 if (err)
1661 goto out_put;
1662
230b1839 1663 err = sock->ops->connect(sock, (struct sockaddr *)&address, addrlen,
1da177e4
LT
1664 sock->file->f_flags);
1665out_put:
6cb153ca 1666 fput_light(sock->file, fput_needed);
1da177e4
LT
1667out:
1668 return err;
1669}
1670
1387c2c2
DB
1671SYSCALL_DEFINE3(connect, int, fd, struct sockaddr __user *, uservaddr,
1672 int, addrlen)
1673{
1674 return __sys_connect(fd, uservaddr, addrlen);
1675}
1676
1da177e4
LT
1677/*
1678 * Get the local address ('name') of a socket object. Move the obtained
1679 * name to user space.
1680 */
1681
8882a107
DB
1682int __sys_getsockname(int fd, struct sockaddr __user *usockaddr,
1683 int __user *usockaddr_len)
1da177e4
LT
1684{
1685 struct socket *sock;
230b1839 1686 struct sockaddr_storage address;
9b2c45d4 1687 int err, fput_needed;
89bddce5 1688
6cb153ca 1689 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4
LT
1690 if (!sock)
1691 goto out;
1692
1693 err = security_socket_getsockname(sock);
1694 if (err)
1695 goto out_put;
1696
9b2c45d4
DV
1697 err = sock->ops->getname(sock, (struct sockaddr *)&address, 0);
1698 if (err < 0)
1da177e4 1699 goto out_put;
9b2c45d4
DV
1700 /* "err" is actually length in this case */
1701 err = move_addr_to_user(&address, err, usockaddr, usockaddr_len);
1da177e4
LT
1702
1703out_put:
6cb153ca 1704 fput_light(sock->file, fput_needed);
1da177e4
LT
1705out:
1706 return err;
1707}
1708
8882a107
DB
1709SYSCALL_DEFINE3(getsockname, int, fd, struct sockaddr __user *, usockaddr,
1710 int __user *, usockaddr_len)
1711{
1712 return __sys_getsockname(fd, usockaddr, usockaddr_len);
1713}
1714
1da177e4
LT
1715/*
1716 * Get the remote address ('name') of a socket object. Move the obtained
1717 * name to user space.
1718 */
1719
b21c8f83
DB
1720int __sys_getpeername(int fd, struct sockaddr __user *usockaddr,
1721 int __user *usockaddr_len)
1da177e4
LT
1722{
1723 struct socket *sock;
230b1839 1724 struct sockaddr_storage address;
9b2c45d4 1725 int err, fput_needed;
1da177e4 1726
89bddce5
SH
1727 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1728 if (sock != NULL) {
1da177e4
LT
1729 err = security_socket_getpeername(sock);
1730 if (err) {
6cb153ca 1731 fput_light(sock->file, fput_needed);
1da177e4
LT
1732 return err;
1733 }
1734
9b2c45d4
DV
1735 err = sock->ops->getname(sock, (struct sockaddr *)&address, 1);
1736 if (err >= 0)
1737 /* "err" is actually length in this case */
1738 err = move_addr_to_user(&address, err, usockaddr,
89bddce5 1739 usockaddr_len);
6cb153ca 1740 fput_light(sock->file, fput_needed);
1da177e4
LT
1741 }
1742 return err;
1743}
1744
b21c8f83
DB
1745SYSCALL_DEFINE3(getpeername, int, fd, struct sockaddr __user *, usockaddr,
1746 int __user *, usockaddr_len)
1747{
1748 return __sys_getpeername(fd, usockaddr, usockaddr_len);
1749}
1750
1da177e4
LT
1751/*
1752 * Send a datagram to a given address. We move the address into kernel
1753 * space and check the user space data area is readable before invoking
1754 * the protocol.
1755 */
211b634b
DB
1756int __sys_sendto(int fd, void __user *buff, size_t len, unsigned int flags,
1757 struct sockaddr __user *addr, int addr_len)
1da177e4
LT
1758{
1759 struct socket *sock;
230b1839 1760 struct sockaddr_storage address;
1da177e4
LT
1761 int err;
1762 struct msghdr msg;
1763 struct iovec iov;
6cb153ca 1764 int fput_needed;
6cb153ca 1765
602bd0e9
AV
1766 err = import_single_range(WRITE, buff, len, &iov, &msg.msg_iter);
1767 if (unlikely(err))
1768 return err;
de0fa95c
PE
1769 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1770 if (!sock)
4387ff75 1771 goto out;
6cb153ca 1772
89bddce5 1773 msg.msg_name = NULL;
89bddce5
SH
1774 msg.msg_control = NULL;
1775 msg.msg_controllen = 0;
1776 msg.msg_namelen = 0;
6cb153ca 1777 if (addr) {
43db362d 1778 err = move_addr_to_kernel(addr, addr_len, &address);
1da177e4
LT
1779 if (err < 0)
1780 goto out_put;
230b1839 1781 msg.msg_name = (struct sockaddr *)&address;
89bddce5 1782 msg.msg_namelen = addr_len;
1da177e4
LT
1783 }
1784 if (sock->file->f_flags & O_NONBLOCK)
1785 flags |= MSG_DONTWAIT;
1786 msg.msg_flags = flags;
d8725c86 1787 err = sock_sendmsg(sock, &msg);
1da177e4 1788
89bddce5 1789out_put:
de0fa95c 1790 fput_light(sock->file, fput_needed);
4387ff75 1791out:
1da177e4
LT
1792 return err;
1793}
1794
211b634b
DB
1795SYSCALL_DEFINE6(sendto, int, fd, void __user *, buff, size_t, len,
1796 unsigned int, flags, struct sockaddr __user *, addr,
1797 int, addr_len)
1798{
1799 return __sys_sendto(fd, buff, len, flags, addr, addr_len);
1800}
1801
1da177e4 1802/*
89bddce5 1803 * Send a datagram down a socket.
1da177e4
LT
1804 */
1805
3e0fa65f 1806SYSCALL_DEFINE4(send, int, fd, void __user *, buff, size_t, len,
95c96174 1807 unsigned int, flags)
1da177e4 1808{
211b634b 1809 return __sys_sendto(fd, buff, len, flags, NULL, 0);
1da177e4
LT
1810}
1811
1812/*
89bddce5 1813 * Receive a frame from the socket and optionally record the address of the
1da177e4
LT
1814 * sender. We verify the buffers are writable and if needed move the
1815 * sender address from kernel to user space.
1816 */
7a09e1eb
DB
1817int __sys_recvfrom(int fd, void __user *ubuf, size_t size, unsigned int flags,
1818 struct sockaddr __user *addr, int __user *addr_len)
1da177e4
LT
1819{
1820 struct socket *sock;
1821 struct iovec iov;
1822 struct msghdr msg;
230b1839 1823 struct sockaddr_storage address;
89bddce5 1824 int err, err2;
6cb153ca
BL
1825 int fput_needed;
1826
602bd0e9
AV
1827 err = import_single_range(READ, ubuf, size, &iov, &msg.msg_iter);
1828 if (unlikely(err))
1829 return err;
de0fa95c 1830 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4 1831 if (!sock)
de0fa95c 1832 goto out;
1da177e4 1833
89bddce5
SH
1834 msg.msg_control = NULL;
1835 msg.msg_controllen = 0;
f3d33426
HFS
1836 /* Save some cycles and don't copy the address if not needed */
1837 msg.msg_name = addr ? (struct sockaddr *)&address : NULL;
1838 /* We assume all kernel code knows the size of sockaddr_storage */
1839 msg.msg_namelen = 0;
130ed5d1 1840 msg.msg_iocb = NULL;
9f138fa6 1841 msg.msg_flags = 0;
1da177e4
LT
1842 if (sock->file->f_flags & O_NONBLOCK)
1843 flags |= MSG_DONTWAIT;
2da62906 1844 err = sock_recvmsg(sock, &msg, flags);
1da177e4 1845
89bddce5 1846 if (err >= 0 && addr != NULL) {
43db362d 1847 err2 = move_addr_to_user(&address,
230b1839 1848 msg.msg_namelen, addr, addr_len);
89bddce5
SH
1849 if (err2 < 0)
1850 err = err2;
1da177e4 1851 }
de0fa95c
PE
1852
1853 fput_light(sock->file, fput_needed);
4387ff75 1854out:
1da177e4
LT
1855 return err;
1856}
1857
7a09e1eb
DB
1858SYSCALL_DEFINE6(recvfrom, int, fd, void __user *, ubuf, size_t, size,
1859 unsigned int, flags, struct sockaddr __user *, addr,
1860 int __user *, addr_len)
1861{
1862 return __sys_recvfrom(fd, ubuf, size, flags, addr, addr_len);
1863}
1864
1da177e4 1865/*
89bddce5 1866 * Receive a datagram from a socket.
1da177e4
LT
1867 */
1868
b7c0ddf5
JG
1869SYSCALL_DEFINE4(recv, int, fd, void __user *, ubuf, size_t, size,
1870 unsigned int, flags)
1da177e4 1871{
7a09e1eb 1872 return __sys_recvfrom(fd, ubuf, size, flags, NULL, NULL);
1da177e4
LT
1873}
1874
1875/*
1876 * Set a socket option. Because we don't know the option lengths we have
1877 * to pass the user mode parameter for the protocols to sort out.
1878 */
1879
cc36dca0
DB
1880static int __sys_setsockopt(int fd, int level, int optname,
1881 char __user *optval, int optlen)
1da177e4 1882{
6cb153ca 1883 int err, fput_needed;
1da177e4
LT
1884 struct socket *sock;
1885
1886 if (optlen < 0)
1887 return -EINVAL;
89bddce5
SH
1888
1889 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1890 if (sock != NULL) {
1891 err = security_socket_setsockopt(sock, level, optname);
6cb153ca
BL
1892 if (err)
1893 goto out_put;
1da177e4
LT
1894
1895 if (level == SOL_SOCKET)
89bddce5
SH
1896 err =
1897 sock_setsockopt(sock, level, optname, optval,
1898 optlen);
1da177e4 1899 else
89bddce5
SH
1900 err =
1901 sock->ops->setsockopt(sock, level, optname, optval,
1902 optlen);
6cb153ca
BL
1903out_put:
1904 fput_light(sock->file, fput_needed);
1da177e4
LT
1905 }
1906 return err;
1907}
1908
cc36dca0
DB
1909SYSCALL_DEFINE5(setsockopt, int, fd, int, level, int, optname,
1910 char __user *, optval, int, optlen)
1911{
1912 return __sys_setsockopt(fd, level, optname, optval, optlen);
1913}
1914
1da177e4
LT
1915/*
1916 * Get a socket option. Because we don't know the option lengths we have
1917 * to pass a user mode parameter for the protocols to sort out.
1918 */
1919
13a2d70e
DB
1920static int __sys_getsockopt(int fd, int level, int optname,
1921 char __user *optval, int __user *optlen)
1da177e4 1922{
6cb153ca 1923 int err, fput_needed;
1da177e4
LT
1924 struct socket *sock;
1925
89bddce5
SH
1926 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1927 if (sock != NULL) {
6cb153ca
BL
1928 err = security_socket_getsockopt(sock, level, optname);
1929 if (err)
1930 goto out_put;
1da177e4
LT
1931
1932 if (level == SOL_SOCKET)
89bddce5
SH
1933 err =
1934 sock_getsockopt(sock, level, optname, optval,
1935 optlen);
1da177e4 1936 else
89bddce5
SH
1937 err =
1938 sock->ops->getsockopt(sock, level, optname, optval,
1939 optlen);
6cb153ca
BL
1940out_put:
1941 fput_light(sock->file, fput_needed);
1da177e4
LT
1942 }
1943 return err;
1944}
1945
13a2d70e
DB
1946SYSCALL_DEFINE5(getsockopt, int, fd, int, level, int, optname,
1947 char __user *, optval, int __user *, optlen)
1948{
1949 return __sys_getsockopt(fd, level, optname, optval, optlen);
1950}
1951
1da177e4
LT
1952/*
1953 * Shutdown a socket.
1954 */
1955
005a1aea 1956int __sys_shutdown(int fd, int how)
1da177e4 1957{
6cb153ca 1958 int err, fput_needed;
1da177e4
LT
1959 struct socket *sock;
1960
89bddce5
SH
1961 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1962 if (sock != NULL) {
1da177e4 1963 err = security_socket_shutdown(sock, how);
6cb153ca
BL
1964 if (!err)
1965 err = sock->ops->shutdown(sock, how);
1966 fput_light(sock->file, fput_needed);
1da177e4
LT
1967 }
1968 return err;
1969}
1970
005a1aea
DB
1971SYSCALL_DEFINE2(shutdown, int, fd, int, how)
1972{
1973 return __sys_shutdown(fd, how);
1974}
1975
89bddce5 1976/* A couple of helpful macros for getting the address of the 32/64 bit
1da177e4
LT
1977 * fields which are the same type (int / unsigned) on our platforms.
1978 */
1979#define COMPAT_MSG(msg, member) ((MSG_CMSG_COMPAT & flags) ? &msg##_compat->member : &msg->member)
1980#define COMPAT_NAMELEN(msg) COMPAT_MSG(msg, msg_namelen)
1981#define COMPAT_FLAGS(msg) COMPAT_MSG(msg, msg_flags)
1982
c71d8ebe
TH
1983struct used_address {
1984 struct sockaddr_storage name;
1985 unsigned int name_len;
1986};
1987
da184284
AV
1988static int copy_msghdr_from_user(struct msghdr *kmsg,
1989 struct user_msghdr __user *umsg,
1990 struct sockaddr __user **save_addr,
1991 struct iovec **iov)
1661bf36 1992{
ffb07550 1993 struct user_msghdr msg;
08adb7da
AV
1994 ssize_t err;
1995
ffb07550 1996 if (copy_from_user(&msg, umsg, sizeof(*umsg)))
1661bf36 1997 return -EFAULT;
dbb490b9 1998
864d9664 1999 kmsg->msg_control = (void __force *)msg.msg_control;
ffb07550
AV
2000 kmsg->msg_controllen = msg.msg_controllen;
2001 kmsg->msg_flags = msg.msg_flags;
2002
2003 kmsg->msg_namelen = msg.msg_namelen;
2004 if (!msg.msg_name)
6a2a2b3a
AS
2005 kmsg->msg_namelen = 0;
2006
dbb490b9
ML
2007 if (kmsg->msg_namelen < 0)
2008 return -EINVAL;
2009
1661bf36 2010 if (kmsg->msg_namelen > sizeof(struct sockaddr_storage))
db31c55a 2011 kmsg->msg_namelen = sizeof(struct sockaddr_storage);
08adb7da
AV
2012
2013 if (save_addr)
ffb07550 2014 *save_addr = msg.msg_name;
08adb7da 2015
ffb07550 2016 if (msg.msg_name && kmsg->msg_namelen) {
08adb7da 2017 if (!save_addr) {
864d9664
PA
2018 err = move_addr_to_kernel(msg.msg_name,
2019 kmsg->msg_namelen,
08adb7da
AV
2020 kmsg->msg_name);
2021 if (err < 0)
2022 return err;
2023 }
2024 } else {
2025 kmsg->msg_name = NULL;
2026 kmsg->msg_namelen = 0;
2027 }
2028
ffb07550 2029 if (msg.msg_iovlen > UIO_MAXIOV)
08adb7da
AV
2030 return -EMSGSIZE;
2031
0345f931 2032 kmsg->msg_iocb = NULL;
2033
ffb07550
AV
2034 return import_iovec(save_addr ? READ : WRITE,
2035 msg.msg_iov, msg.msg_iovlen,
da184284 2036 UIO_FASTIOV, iov, &kmsg->msg_iter);
1661bf36
DC
2037}
2038
666547ff 2039static int ___sys_sendmsg(struct socket *sock, struct user_msghdr __user *msg,
95c96174 2040 struct msghdr *msg_sys, unsigned int flags,
28a94d8f
TH
2041 struct used_address *used_address,
2042 unsigned int allowed_msghdr_flags)
1da177e4 2043{
89bddce5
SH
2044 struct compat_msghdr __user *msg_compat =
2045 (struct compat_msghdr __user *)msg;
230b1839 2046 struct sockaddr_storage address;
1da177e4 2047 struct iovec iovstack[UIO_FASTIOV], *iov = iovstack;
b9d717a7 2048 unsigned char ctl[sizeof(struct cmsghdr) + 20]
846cc123 2049 __aligned(sizeof(__kernel_size_t));
89bddce5 2050 /* 20 is size of ipv6_pktinfo */
1da177e4 2051 unsigned char *ctl_buf = ctl;
d8725c86 2052 int ctl_len;
08adb7da 2053 ssize_t err;
89bddce5 2054
08adb7da 2055 msg_sys->msg_name = &address;
1da177e4 2056
08449320 2057 if (MSG_CMSG_COMPAT & flags)
08adb7da 2058 err = get_compat_msghdr(msg_sys, msg_compat, NULL, &iov);
08449320 2059 else
08adb7da 2060 err = copy_msghdr_from_user(msg_sys, msg, NULL, &iov);
89bddce5 2061 if (err < 0)
da184284 2062 return err;
1da177e4
LT
2063
2064 err = -ENOBUFS;
2065
228e548e 2066 if (msg_sys->msg_controllen > INT_MAX)
1da177e4 2067 goto out_freeiov;
28a94d8f 2068 flags |= (msg_sys->msg_flags & allowed_msghdr_flags);
228e548e 2069 ctl_len = msg_sys->msg_controllen;
1da177e4 2070 if ((MSG_CMSG_COMPAT & flags) && ctl_len) {
89bddce5 2071 err =
228e548e 2072 cmsghdr_from_user_compat_to_kern(msg_sys, sock->sk, ctl,
89bddce5 2073 sizeof(ctl));
1da177e4
LT
2074 if (err)
2075 goto out_freeiov;
228e548e
AB
2076 ctl_buf = msg_sys->msg_control;
2077 ctl_len = msg_sys->msg_controllen;
1da177e4 2078 } else if (ctl_len) {
ac4340fc
DM
2079 BUILD_BUG_ON(sizeof(struct cmsghdr) !=
2080 CMSG_ALIGN(sizeof(struct cmsghdr)));
89bddce5 2081 if (ctl_len > sizeof(ctl)) {
1da177e4 2082 ctl_buf = sock_kmalloc(sock->sk, ctl_len, GFP_KERNEL);
89bddce5 2083 if (ctl_buf == NULL)
1da177e4
LT
2084 goto out_freeiov;
2085 }
2086 err = -EFAULT;
2087 /*
228e548e 2088 * Careful! Before this, msg_sys->msg_control contains a user pointer.
1da177e4
LT
2089 * Afterwards, it will be a kernel pointer. Thus the compiler-assisted
2090 * checking falls down on this.
2091 */
fb8621bb 2092 if (copy_from_user(ctl_buf,
228e548e 2093 (void __user __force *)msg_sys->msg_control,
89bddce5 2094 ctl_len))
1da177e4 2095 goto out_freectl;
228e548e 2096 msg_sys->msg_control = ctl_buf;
1da177e4 2097 }
228e548e 2098 msg_sys->msg_flags = flags;
1da177e4
LT
2099
2100 if (sock->file->f_flags & O_NONBLOCK)
228e548e 2101 msg_sys->msg_flags |= MSG_DONTWAIT;
c71d8ebe
TH
2102 /*
2103 * If this is sendmmsg() and current destination address is same as
2104 * previously succeeded address, omit asking LSM's decision.
2105 * used_address->name_len is initialized to UINT_MAX so that the first
2106 * destination address never matches.
2107 */
bc909d9d
MD
2108 if (used_address && msg_sys->msg_name &&
2109 used_address->name_len == msg_sys->msg_namelen &&
2110 !memcmp(&used_address->name, msg_sys->msg_name,
c71d8ebe 2111 used_address->name_len)) {
d8725c86 2112 err = sock_sendmsg_nosec(sock, msg_sys);
c71d8ebe
TH
2113 goto out_freectl;
2114 }
d8725c86 2115 err = sock_sendmsg(sock, msg_sys);
c71d8ebe
TH
2116 /*
2117 * If this is sendmmsg() and sending to current destination address was
2118 * successful, remember it.
2119 */
2120 if (used_address && err >= 0) {
2121 used_address->name_len = msg_sys->msg_namelen;
bc909d9d
MD
2122 if (msg_sys->msg_name)
2123 memcpy(&used_address->name, msg_sys->msg_name,
2124 used_address->name_len);
c71d8ebe 2125 }
1da177e4
LT
2126
2127out_freectl:
89bddce5 2128 if (ctl_buf != ctl)
1da177e4
LT
2129 sock_kfree_s(sock->sk, ctl_buf, ctl_len);
2130out_freeiov:
da184284 2131 kfree(iov);
228e548e
AB
2132 return err;
2133}
2134
2135/*
2136 * BSD sendmsg interface
2137 */
2138
e1834a32
DB
2139long __sys_sendmsg(int fd, struct user_msghdr __user *msg, unsigned int flags,
2140 bool forbid_cmsg_compat)
228e548e
AB
2141{
2142 int fput_needed, err;
2143 struct msghdr msg_sys;
1be374a0
AL
2144 struct socket *sock;
2145
e1834a32
DB
2146 if (forbid_cmsg_compat && (flags & MSG_CMSG_COMPAT))
2147 return -EINVAL;
2148
1be374a0 2149 sock = sockfd_lookup_light(fd, &err, &fput_needed);
228e548e
AB
2150 if (!sock)
2151 goto out;
2152
28a94d8f 2153 err = ___sys_sendmsg(sock, msg, &msg_sys, flags, NULL, 0);
228e548e 2154
6cb153ca 2155 fput_light(sock->file, fput_needed);
89bddce5 2156out:
1da177e4
LT
2157 return err;
2158}
2159
666547ff 2160SYSCALL_DEFINE3(sendmsg, int, fd, struct user_msghdr __user *, msg, unsigned int, flags)
a7526eb5 2161{
e1834a32 2162 return __sys_sendmsg(fd, msg, flags, true);
a7526eb5
AL
2163}
2164
228e548e
AB
2165/*
2166 * Linux sendmmsg interface
2167 */
2168
2169int __sys_sendmmsg(int fd, struct mmsghdr __user *mmsg, unsigned int vlen,
e1834a32 2170 unsigned int flags, bool forbid_cmsg_compat)
228e548e
AB
2171{
2172 int fput_needed, err, datagrams;
2173 struct socket *sock;
2174 struct mmsghdr __user *entry;
2175 struct compat_mmsghdr __user *compat_entry;
2176 struct msghdr msg_sys;
c71d8ebe 2177 struct used_address used_address;
f092276d 2178 unsigned int oflags = flags;
228e548e 2179
e1834a32
DB
2180 if (forbid_cmsg_compat && (flags & MSG_CMSG_COMPAT))
2181 return -EINVAL;
2182
98382f41
AB
2183 if (vlen > UIO_MAXIOV)
2184 vlen = UIO_MAXIOV;
228e548e
AB
2185
2186 datagrams = 0;
2187
2188 sock = sockfd_lookup_light(fd, &err, &fput_needed);
2189 if (!sock)
2190 return err;
2191
c71d8ebe 2192 used_address.name_len = UINT_MAX;
228e548e
AB
2193 entry = mmsg;
2194 compat_entry = (struct compat_mmsghdr __user *)mmsg;
728ffb86 2195 err = 0;
f092276d 2196 flags |= MSG_BATCH;
228e548e
AB
2197
2198 while (datagrams < vlen) {
f092276d
TH
2199 if (datagrams == vlen - 1)
2200 flags = oflags;
2201
228e548e 2202 if (MSG_CMSG_COMPAT & flags) {
666547ff 2203 err = ___sys_sendmsg(sock, (struct user_msghdr __user *)compat_entry,
28a94d8f 2204 &msg_sys, flags, &used_address, MSG_EOR);
228e548e
AB
2205 if (err < 0)
2206 break;
2207 err = __put_user(err, &compat_entry->msg_len);
2208 ++compat_entry;
2209 } else {
a7526eb5 2210 err = ___sys_sendmsg(sock,
666547ff 2211 (struct user_msghdr __user *)entry,
28a94d8f 2212 &msg_sys, flags, &used_address, MSG_EOR);
228e548e
AB
2213 if (err < 0)
2214 break;
2215 err = put_user(err, &entry->msg_len);
2216 ++entry;
2217 }
2218
2219 if (err)
2220 break;
2221 ++datagrams;
3023898b
SHY
2222 if (msg_data_left(&msg_sys))
2223 break;
a78cb84c 2224 cond_resched();
228e548e
AB
2225 }
2226
228e548e
AB
2227 fput_light(sock->file, fput_needed);
2228
728ffb86
AB
2229 /* We only return an error if no datagrams were able to be sent */
2230 if (datagrams != 0)
228e548e
AB
2231 return datagrams;
2232
228e548e
AB
2233 return err;
2234}
2235
2236SYSCALL_DEFINE4(sendmmsg, int, fd, struct mmsghdr __user *, mmsg,
2237 unsigned int, vlen, unsigned int, flags)
2238{
e1834a32 2239 return __sys_sendmmsg(fd, mmsg, vlen, flags, true);
228e548e
AB
2240}
2241
666547ff 2242static int ___sys_recvmsg(struct socket *sock, struct user_msghdr __user *msg,
95c96174 2243 struct msghdr *msg_sys, unsigned int flags, int nosec)
1da177e4 2244{
89bddce5
SH
2245 struct compat_msghdr __user *msg_compat =
2246 (struct compat_msghdr __user *)msg;
1da177e4 2247 struct iovec iovstack[UIO_FASTIOV];
89bddce5 2248 struct iovec *iov = iovstack;
1da177e4 2249 unsigned long cmsg_ptr;
2da62906 2250 int len;
08adb7da 2251 ssize_t err;
1da177e4
LT
2252
2253 /* kernel mode address */
230b1839 2254 struct sockaddr_storage addr;
1da177e4
LT
2255
2256 /* user mode address pointers */
2257 struct sockaddr __user *uaddr;
08adb7da 2258 int __user *uaddr_len = COMPAT_NAMELEN(msg);
89bddce5 2259
08adb7da 2260 msg_sys->msg_name = &addr;
1da177e4 2261
f3d33426 2262 if (MSG_CMSG_COMPAT & flags)
08adb7da 2263 err = get_compat_msghdr(msg_sys, msg_compat, &uaddr, &iov);
f3d33426 2264 else
08adb7da 2265 err = copy_msghdr_from_user(msg_sys, msg, &uaddr, &iov);
1da177e4 2266 if (err < 0)
da184284 2267 return err;
1da177e4 2268
a2e27255
ACM
2269 cmsg_ptr = (unsigned long)msg_sys->msg_control;
2270 msg_sys->msg_flags = flags & (MSG_CMSG_CLOEXEC|MSG_CMSG_COMPAT);
89bddce5 2271
f3d33426
HFS
2272 /* We assume all kernel code knows the size of sockaddr_storage */
2273 msg_sys->msg_namelen = 0;
2274
1da177e4
LT
2275 if (sock->file->f_flags & O_NONBLOCK)
2276 flags |= MSG_DONTWAIT;
2da62906 2277 err = (nosec ? sock_recvmsg_nosec : sock_recvmsg)(sock, msg_sys, flags);
1da177e4
LT
2278 if (err < 0)
2279 goto out_freeiov;
2280 len = err;
2281
2282 if (uaddr != NULL) {
43db362d 2283 err = move_addr_to_user(&addr,
a2e27255 2284 msg_sys->msg_namelen, uaddr,
89bddce5 2285 uaddr_len);
1da177e4
LT
2286 if (err < 0)
2287 goto out_freeiov;
2288 }
a2e27255 2289 err = __put_user((msg_sys->msg_flags & ~MSG_CMSG_COMPAT),
37f7f421 2290 COMPAT_FLAGS(msg));
1da177e4
LT
2291 if (err)
2292 goto out_freeiov;
2293 if (MSG_CMSG_COMPAT & flags)
a2e27255 2294 err = __put_user((unsigned long)msg_sys->msg_control - cmsg_ptr,
1da177e4
LT
2295 &msg_compat->msg_controllen);
2296 else
a2e27255 2297 err = __put_user((unsigned long)msg_sys->msg_control - cmsg_ptr,
1da177e4
LT
2298 &msg->msg_controllen);
2299 if (err)
2300 goto out_freeiov;
2301 err = len;
2302
2303out_freeiov:
da184284 2304 kfree(iov);
a2e27255
ACM
2305 return err;
2306}
2307
2308/*
2309 * BSD recvmsg interface
2310 */
2311
e1834a32
DB
2312long __sys_recvmsg(int fd, struct user_msghdr __user *msg, unsigned int flags,
2313 bool forbid_cmsg_compat)
a2e27255
ACM
2314{
2315 int fput_needed, err;
2316 struct msghdr msg_sys;
1be374a0
AL
2317 struct socket *sock;
2318
e1834a32
DB
2319 if (forbid_cmsg_compat && (flags & MSG_CMSG_COMPAT))
2320 return -EINVAL;
2321
1be374a0 2322 sock = sockfd_lookup_light(fd, &err, &fput_needed);
a2e27255
ACM
2323 if (!sock)
2324 goto out;
2325
a7526eb5 2326 err = ___sys_recvmsg(sock, msg, &msg_sys, flags, 0);
a2e27255 2327
6cb153ca 2328 fput_light(sock->file, fput_needed);
1da177e4
LT
2329out:
2330 return err;
2331}
2332
666547ff 2333SYSCALL_DEFINE3(recvmsg, int, fd, struct user_msghdr __user *, msg,
a7526eb5
AL
2334 unsigned int, flags)
2335{
e1834a32 2336 return __sys_recvmsg(fd, msg, flags, true);
a7526eb5
AL
2337}
2338
a2e27255
ACM
2339/*
2340 * Linux recvmmsg interface
2341 */
2342
2343int __sys_recvmmsg(int fd, struct mmsghdr __user *mmsg, unsigned int vlen,
2344 unsigned int flags, struct timespec *timeout)
2345{
2346 int fput_needed, err, datagrams;
2347 struct socket *sock;
2348 struct mmsghdr __user *entry;
d7256d0e 2349 struct compat_mmsghdr __user *compat_entry;
a2e27255 2350 struct msghdr msg_sys;
766b9f92
DD
2351 struct timespec64 end_time;
2352 struct timespec64 timeout64;
a2e27255
ACM
2353
2354 if (timeout &&
2355 poll_select_set_timeout(&end_time, timeout->tv_sec,
2356 timeout->tv_nsec))
2357 return -EINVAL;
2358
2359 datagrams = 0;
2360
2361 sock = sockfd_lookup_light(fd, &err, &fput_needed);
2362 if (!sock)
2363 return err;
2364
7797dc41
SHY
2365 if (likely(!(flags & MSG_ERRQUEUE))) {
2366 err = sock_error(sock->sk);
2367 if (err) {
2368 datagrams = err;
2369 goto out_put;
2370 }
e623a9e9 2371 }
a2e27255
ACM
2372
2373 entry = mmsg;
d7256d0e 2374 compat_entry = (struct compat_mmsghdr __user *)mmsg;
a2e27255
ACM
2375
2376 while (datagrams < vlen) {
2377 /*
2378 * No need to ask LSM for more than the first datagram.
2379 */
d7256d0e 2380 if (MSG_CMSG_COMPAT & flags) {
666547ff 2381 err = ___sys_recvmsg(sock, (struct user_msghdr __user *)compat_entry,
a7526eb5
AL
2382 &msg_sys, flags & ~MSG_WAITFORONE,
2383 datagrams);
d7256d0e
JMG
2384 if (err < 0)
2385 break;
2386 err = __put_user(err, &compat_entry->msg_len);
2387 ++compat_entry;
2388 } else {
a7526eb5 2389 err = ___sys_recvmsg(sock,
666547ff 2390 (struct user_msghdr __user *)entry,
a7526eb5
AL
2391 &msg_sys, flags & ~MSG_WAITFORONE,
2392 datagrams);
d7256d0e
JMG
2393 if (err < 0)
2394 break;
2395 err = put_user(err, &entry->msg_len);
2396 ++entry;
2397 }
2398
a2e27255
ACM
2399 if (err)
2400 break;
a2e27255
ACM
2401 ++datagrams;
2402
71c5c159
BB
2403 /* MSG_WAITFORONE turns on MSG_DONTWAIT after one packet */
2404 if (flags & MSG_WAITFORONE)
2405 flags |= MSG_DONTWAIT;
2406
a2e27255 2407 if (timeout) {
766b9f92
DD
2408 ktime_get_ts64(&timeout64);
2409 *timeout = timespec64_to_timespec(
2410 timespec64_sub(end_time, timeout64));
a2e27255
ACM
2411 if (timeout->tv_sec < 0) {
2412 timeout->tv_sec = timeout->tv_nsec = 0;
2413 break;
2414 }
2415
2416 /* Timeout, return less than vlen datagrams */
2417 if (timeout->tv_nsec == 0 && timeout->tv_sec == 0)
2418 break;
2419 }
2420
2421 /* Out of band data, return right away */
2422 if (msg_sys.msg_flags & MSG_OOB)
2423 break;
a78cb84c 2424 cond_resched();
a2e27255
ACM
2425 }
2426
a2e27255 2427 if (err == 0)
34b88a68
ACM
2428 goto out_put;
2429
2430 if (datagrams == 0) {
2431 datagrams = err;
2432 goto out_put;
2433 }
a2e27255 2434
34b88a68
ACM
2435 /*
2436 * We may return less entries than requested (vlen) if the
2437 * sock is non block and there aren't enough datagrams...
2438 */
2439 if (err != -EAGAIN) {
a2e27255 2440 /*
34b88a68
ACM
2441 * ... or if recvmsg returns an error after we
2442 * received some datagrams, where we record the
2443 * error to return on the next call or if the
2444 * app asks about it using getsockopt(SO_ERROR).
a2e27255 2445 */
34b88a68 2446 sock->sk->sk_err = -err;
a2e27255 2447 }
34b88a68
ACM
2448out_put:
2449 fput_light(sock->file, fput_needed);
a2e27255 2450
34b88a68 2451 return datagrams;
a2e27255
ACM
2452}
2453
1255e269
DB
2454static int do_sys_recvmmsg(int fd, struct mmsghdr __user *mmsg,
2455 unsigned int vlen, unsigned int flags,
2456 struct timespec __user *timeout)
a2e27255
ACM
2457{
2458 int datagrams;
2459 struct timespec timeout_sys;
2460
1be374a0
AL
2461 if (flags & MSG_CMSG_COMPAT)
2462 return -EINVAL;
2463
a2e27255
ACM
2464 if (!timeout)
2465 return __sys_recvmmsg(fd, mmsg, vlen, flags, NULL);
2466
2467 if (copy_from_user(&timeout_sys, timeout, sizeof(timeout_sys)))
2468 return -EFAULT;
2469
2470 datagrams = __sys_recvmmsg(fd, mmsg, vlen, flags, &timeout_sys);
2471
2472 if (datagrams > 0 &&
2473 copy_to_user(timeout, &timeout_sys, sizeof(timeout_sys)))
2474 datagrams = -EFAULT;
2475
2476 return datagrams;
2477}
2478
1255e269
DB
2479SYSCALL_DEFINE5(recvmmsg, int, fd, struct mmsghdr __user *, mmsg,
2480 unsigned int, vlen, unsigned int, flags,
2481 struct timespec __user *, timeout)
2482{
2483 return do_sys_recvmmsg(fd, mmsg, vlen, flags, timeout);
2484}
2485
a2e27255 2486#ifdef __ARCH_WANT_SYS_SOCKETCALL
1da177e4
LT
2487/* Argument list sizes for sys_socketcall */
2488#define AL(x) ((x) * sizeof(unsigned long))
228e548e 2489static const unsigned char nargs[21] = {
c6d409cf
ED
2490 AL(0), AL(3), AL(3), AL(3), AL(2), AL(3),
2491 AL(3), AL(3), AL(4), AL(4), AL(4), AL(6),
2492 AL(6), AL(2), AL(5), AL(5), AL(3), AL(3),
228e548e 2493 AL(4), AL(5), AL(4)
89bddce5
SH
2494};
2495
1da177e4
LT
2496#undef AL
2497
2498/*
89bddce5 2499 * System call vectors.
1da177e4
LT
2500 *
2501 * Argument checking cleaned up. Saved 20% in size.
2502 * This function doesn't need to set the kernel lock because
89bddce5 2503 * it is set by the callees.
1da177e4
LT
2504 */
2505
3e0fa65f 2506SYSCALL_DEFINE2(socketcall, int, call, unsigned long __user *, args)
1da177e4 2507{
2950fa9d 2508 unsigned long a[AUDITSC_ARGS];
89bddce5 2509 unsigned long a0, a1;
1da177e4 2510 int err;
47379052 2511 unsigned int len;
1da177e4 2512
228e548e 2513 if (call < 1 || call > SYS_SENDMMSG)
1da177e4 2514 return -EINVAL;
c8e8cd57 2515 call = array_index_nospec(call, SYS_SENDMMSG + 1);
1da177e4 2516
47379052
AV
2517 len = nargs[call];
2518 if (len > sizeof(a))
2519 return -EINVAL;
2520
1da177e4 2521 /* copy_from_user should be SMP safe. */
47379052 2522 if (copy_from_user(a, args, len))
1da177e4 2523 return -EFAULT;
3ec3b2fb 2524
2950fa9d
CG
2525 err = audit_socketcall(nargs[call] / sizeof(unsigned long), a);
2526 if (err)
2527 return err;
3ec3b2fb 2528
89bddce5
SH
2529 a0 = a[0];
2530 a1 = a[1];
2531
2532 switch (call) {
2533 case SYS_SOCKET:
9d6a15c3 2534 err = __sys_socket(a0, a1, a[2]);
89bddce5
SH
2535 break;
2536 case SYS_BIND:
a87d35d8 2537 err = __sys_bind(a0, (struct sockaddr __user *)a1, a[2]);
89bddce5
SH
2538 break;
2539 case SYS_CONNECT:
1387c2c2 2540 err = __sys_connect(a0, (struct sockaddr __user *)a1, a[2]);
89bddce5
SH
2541 break;
2542 case SYS_LISTEN:
25e290ee 2543 err = __sys_listen(a0, a1);
89bddce5
SH
2544 break;
2545 case SYS_ACCEPT:
4541e805
DB
2546 err = __sys_accept4(a0, (struct sockaddr __user *)a1,
2547 (int __user *)a[2], 0);
89bddce5
SH
2548 break;
2549 case SYS_GETSOCKNAME:
2550 err =
8882a107
DB
2551 __sys_getsockname(a0, (struct sockaddr __user *)a1,
2552 (int __user *)a[2]);
89bddce5
SH
2553 break;
2554 case SYS_GETPEERNAME:
2555 err =
b21c8f83
DB
2556 __sys_getpeername(a0, (struct sockaddr __user *)a1,
2557 (int __user *)a[2]);
89bddce5
SH
2558 break;
2559 case SYS_SOCKETPAIR:
6debc8d8 2560 err = __sys_socketpair(a0, a1, a[2], (int __user *)a[3]);
89bddce5
SH
2561 break;
2562 case SYS_SEND:
f3bf896b
DB
2563 err = __sys_sendto(a0, (void __user *)a1, a[2], a[3],
2564 NULL, 0);
89bddce5
SH
2565 break;
2566 case SYS_SENDTO:
211b634b
DB
2567 err = __sys_sendto(a0, (void __user *)a1, a[2], a[3],
2568 (struct sockaddr __user *)a[4], a[5]);
89bddce5
SH
2569 break;
2570 case SYS_RECV:
d27e9afc
DB
2571 err = __sys_recvfrom(a0, (void __user *)a1, a[2], a[3],
2572 NULL, NULL);
89bddce5
SH
2573 break;
2574 case SYS_RECVFROM:
7a09e1eb
DB
2575 err = __sys_recvfrom(a0, (void __user *)a1, a[2], a[3],
2576 (struct sockaddr __user *)a[4],
2577 (int __user *)a[5]);
89bddce5
SH
2578 break;
2579 case SYS_SHUTDOWN:
005a1aea 2580 err = __sys_shutdown(a0, a1);
89bddce5
SH
2581 break;
2582 case SYS_SETSOCKOPT:
cc36dca0
DB
2583 err = __sys_setsockopt(a0, a1, a[2], (char __user *)a[3],
2584 a[4]);
89bddce5
SH
2585 break;
2586 case SYS_GETSOCKOPT:
2587 err =
13a2d70e
DB
2588 __sys_getsockopt(a0, a1, a[2], (char __user *)a[3],
2589 (int __user *)a[4]);
89bddce5
SH
2590 break;
2591 case SYS_SENDMSG:
e1834a32
DB
2592 err = __sys_sendmsg(a0, (struct user_msghdr __user *)a1,
2593 a[2], true);
89bddce5 2594 break;
228e548e 2595 case SYS_SENDMMSG:
e1834a32
DB
2596 err = __sys_sendmmsg(a0, (struct mmsghdr __user *)a1, a[2],
2597 a[3], true);
228e548e 2598 break;
89bddce5 2599 case SYS_RECVMSG:
e1834a32
DB
2600 err = __sys_recvmsg(a0, (struct user_msghdr __user *)a1,
2601 a[2], true);
89bddce5 2602 break;
a2e27255 2603 case SYS_RECVMMSG:
1255e269
DB
2604 err = do_sys_recvmmsg(a0, (struct mmsghdr __user *)a1, a[2],
2605 a[3], (struct timespec __user *)a[4]);
a2e27255 2606 break;
de11defe 2607 case SYS_ACCEPT4:
4541e805
DB
2608 err = __sys_accept4(a0, (struct sockaddr __user *)a1,
2609 (int __user *)a[2], a[3]);
aaca0bdc 2610 break;
89bddce5
SH
2611 default:
2612 err = -EINVAL;
2613 break;
1da177e4
LT
2614 }
2615 return err;
2616}
2617
89bddce5 2618#endif /* __ARCH_WANT_SYS_SOCKETCALL */
1da177e4 2619
55737fda
SH
2620/**
2621 * sock_register - add a socket protocol handler
2622 * @ops: description of protocol
2623 *
1da177e4
LT
2624 * This function is called by a protocol handler that wants to
2625 * advertise its address family, and have it linked into the
e793c0f7 2626 * socket interface. The value ops->family corresponds to the
55737fda 2627 * socket system call protocol family.
1da177e4 2628 */
f0fd27d4 2629int sock_register(const struct net_proto_family *ops)
1da177e4
LT
2630{
2631 int err;
2632
2633 if (ops->family >= NPROTO) {
3410f22e 2634 pr_crit("protocol %d >= NPROTO(%d)\n", ops->family, NPROTO);
1da177e4
LT
2635 return -ENOBUFS;
2636 }
55737fda
SH
2637
2638 spin_lock(&net_family_lock);
190683a9
ED
2639 if (rcu_dereference_protected(net_families[ops->family],
2640 lockdep_is_held(&net_family_lock)))
55737fda
SH
2641 err = -EEXIST;
2642 else {
cf778b00 2643 rcu_assign_pointer(net_families[ops->family], ops);
1da177e4
LT
2644 err = 0;
2645 }
55737fda
SH
2646 spin_unlock(&net_family_lock);
2647
3410f22e 2648 pr_info("NET: Registered protocol family %d\n", ops->family);
1da177e4
LT
2649 return err;
2650}
c6d409cf 2651EXPORT_SYMBOL(sock_register);
1da177e4 2652
55737fda
SH
2653/**
2654 * sock_unregister - remove a protocol handler
2655 * @family: protocol family to remove
2656 *
1da177e4
LT
2657 * This function is called by a protocol handler that wants to
2658 * remove its address family, and have it unlinked from the
55737fda
SH
2659 * new socket creation.
2660 *
2661 * If protocol handler is a module, then it can use module reference
2662 * counts to protect against new references. If protocol handler is not
2663 * a module then it needs to provide its own protection in
2664 * the ops->create routine.
1da177e4 2665 */
f0fd27d4 2666void sock_unregister(int family)
1da177e4 2667{
f0fd27d4 2668 BUG_ON(family < 0 || family >= NPROTO);
1da177e4 2669
55737fda 2670 spin_lock(&net_family_lock);
a9b3cd7f 2671 RCU_INIT_POINTER(net_families[family], NULL);
55737fda
SH
2672 spin_unlock(&net_family_lock);
2673
2674 synchronize_rcu();
2675
3410f22e 2676 pr_info("NET: Unregistered protocol family %d\n", family);
1da177e4 2677}
c6d409cf 2678EXPORT_SYMBOL(sock_unregister);
1da177e4 2679
bf2ae2e4
XL
2680bool sock_is_registered(int family)
2681{
66b51b0a 2682 return family < NPROTO && rcu_access_pointer(net_families[family]);
bf2ae2e4
XL
2683}
2684
77d76ea3 2685static int __init sock_init(void)
1da177e4 2686{
b3e19d92 2687 int err;
2ca794e5
EB
2688 /*
2689 * Initialize the network sysctl infrastructure.
2690 */
2691 err = net_sysctl_init();
2692 if (err)
2693 goto out;
b3e19d92 2694
1da177e4 2695 /*
89bddce5 2696 * Initialize skbuff SLAB cache
1da177e4
LT
2697 */
2698 skb_init();
1da177e4
LT
2699
2700 /*
89bddce5 2701 * Initialize the protocols module.
1da177e4
LT
2702 */
2703
2704 init_inodecache();
b3e19d92
NP
2705
2706 err = register_filesystem(&sock_fs_type);
2707 if (err)
2708 goto out_fs;
1da177e4 2709 sock_mnt = kern_mount(&sock_fs_type);
b3e19d92
NP
2710 if (IS_ERR(sock_mnt)) {
2711 err = PTR_ERR(sock_mnt);
2712 goto out_mount;
2713 }
77d76ea3
AK
2714
2715 /* The real protocol initialization is performed in later initcalls.
1da177e4
LT
2716 */
2717
2718#ifdef CONFIG_NETFILTER
6d11cfdb
PNA
2719 err = netfilter_init();
2720 if (err)
2721 goto out;
1da177e4 2722#endif
cbeb321a 2723
408eccce 2724 ptp_classifier_init();
c1f19b51 2725
b3e19d92
NP
2726out:
2727 return err;
2728
2729out_mount:
2730 unregister_filesystem(&sock_fs_type);
2731out_fs:
2732 goto out;
1da177e4
LT
2733}
2734
77d76ea3
AK
2735core_initcall(sock_init); /* early initcall */
2736
1da177e4
LT
2737#ifdef CONFIG_PROC_FS
2738void socket_seq_show(struct seq_file *seq)
2739{
648845ab
TZ
2740 seq_printf(seq, "sockets: used %d\n",
2741 sock_inuse_get(seq->private));
1da177e4 2742}
89bddce5 2743#endif /* CONFIG_PROC_FS */
1da177e4 2744
89bbfc95 2745#ifdef CONFIG_COMPAT
6b96018b 2746static int do_siocgstamp(struct net *net, struct socket *sock,
644595f8 2747 unsigned int cmd, void __user *up)
7a229387 2748{
7a229387
AB
2749 mm_segment_t old_fs = get_fs();
2750 struct timeval ktv;
2751 int err;
2752
2753 set_fs(KERNEL_DS);
99f3c896 2754 err = sock_do_ioctl(net, sock, cmd, (unsigned long)&ktv);
7a229387 2755 set_fs(old_fs);
644595f8 2756 if (!err)
ed6fe9d6 2757 err = compat_put_timeval(&ktv, up);
644595f8 2758
7a229387
AB
2759 return err;
2760}
2761
6b96018b 2762static int do_siocgstampns(struct net *net, struct socket *sock,
644595f8 2763 unsigned int cmd, void __user *up)
7a229387 2764{
7a229387
AB
2765 mm_segment_t old_fs = get_fs();
2766 struct timespec kts;
2767 int err;
2768
2769 set_fs(KERNEL_DS);
99f3c896 2770 err = sock_do_ioctl(net, sock, cmd, (unsigned long)&kts);
7a229387 2771 set_fs(old_fs);
644595f8 2772 if (!err)
ed6fe9d6 2773 err = compat_put_timespec(&kts, up);
644595f8 2774
7a229387
AB
2775 return err;
2776}
2777
36fd633e 2778static int compat_dev_ifconf(struct net *net, struct compat_ifconf __user *uifc32)
7a229387 2779{
6b96018b 2780 struct compat_ifconf ifc32;
7a229387 2781 struct ifconf ifc;
7a229387
AB
2782 int err;
2783
6b96018b 2784 if (copy_from_user(&ifc32, uifc32, sizeof(struct compat_ifconf)))
7a229387
AB
2785 return -EFAULT;
2786
36fd633e
AV
2787 ifc.ifc_len = ifc32.ifc_len;
2788 ifc.ifc_req = compat_ptr(ifc32.ifcbuf);
7a229387 2789
36fd633e
AV
2790 rtnl_lock();
2791 err = dev_ifconf(net, &ifc, sizeof(struct compat_ifreq));
2792 rtnl_unlock();
7a229387
AB
2793 if (err)
2794 return err;
2795
36fd633e 2796 ifc32.ifc_len = ifc.ifc_len;
6b96018b 2797 if (copy_to_user(uifc32, &ifc32, sizeof(struct compat_ifconf)))
7a229387
AB
2798 return -EFAULT;
2799
2800 return 0;
2801}
2802
6b96018b 2803static int ethtool_ioctl(struct net *net, struct compat_ifreq __user *ifr32)
7a229387 2804{
3a7da39d
BH
2805 struct compat_ethtool_rxnfc __user *compat_rxnfc;
2806 bool convert_in = false, convert_out = false;
44c02a2c
AV
2807 size_t buf_size = 0;
2808 struct ethtool_rxnfc __user *rxnfc = NULL;
2809 struct ifreq ifr;
3a7da39d
BH
2810 u32 rule_cnt = 0, actual_rule_cnt;
2811 u32 ethcmd;
7a229387 2812 u32 data;
3a7da39d 2813 int ret;
7a229387 2814
3a7da39d
BH
2815 if (get_user(data, &ifr32->ifr_ifru.ifru_data))
2816 return -EFAULT;
7a229387 2817
3a7da39d
BH
2818 compat_rxnfc = compat_ptr(data);
2819
2820 if (get_user(ethcmd, &compat_rxnfc->cmd))
7a229387
AB
2821 return -EFAULT;
2822
3a7da39d
BH
2823 /* Most ethtool structures are defined without padding.
2824 * Unfortunately struct ethtool_rxnfc is an exception.
2825 */
2826 switch (ethcmd) {
2827 default:
2828 break;
2829 case ETHTOOL_GRXCLSRLALL:
2830 /* Buffer size is variable */
2831 if (get_user(rule_cnt, &compat_rxnfc->rule_cnt))
2832 return -EFAULT;
2833 if (rule_cnt > KMALLOC_MAX_SIZE / sizeof(u32))
2834 return -ENOMEM;
2835 buf_size += rule_cnt * sizeof(u32);
2836 /* fall through */
2837 case ETHTOOL_GRXRINGS:
2838 case ETHTOOL_GRXCLSRLCNT:
2839 case ETHTOOL_GRXCLSRULE:
55664f32 2840 case ETHTOOL_SRXCLSRLINS:
3a7da39d
BH
2841 convert_out = true;
2842 /* fall through */
2843 case ETHTOOL_SRXCLSRLDEL:
3a7da39d
BH
2844 buf_size += sizeof(struct ethtool_rxnfc);
2845 convert_in = true;
44c02a2c 2846 rxnfc = compat_alloc_user_space(buf_size);
3a7da39d
BH
2847 break;
2848 }
2849
44c02a2c 2850 if (copy_from_user(&ifr.ifr_name, &ifr32->ifr_name, IFNAMSIZ))
7a229387
AB
2851 return -EFAULT;
2852
44c02a2c 2853 ifr.ifr_data = convert_in ? rxnfc : (void __user *)compat_rxnfc;
7a229387 2854
3a7da39d 2855 if (convert_in) {
127fe533 2856 /* We expect there to be holes between fs.m_ext and
3a7da39d
BH
2857 * fs.ring_cookie and at the end of fs, but nowhere else.
2858 */
127fe533
AD
2859 BUILD_BUG_ON(offsetof(struct compat_ethtool_rxnfc, fs.m_ext) +
2860 sizeof(compat_rxnfc->fs.m_ext) !=
2861 offsetof(struct ethtool_rxnfc, fs.m_ext) +
2862 sizeof(rxnfc->fs.m_ext));
3a7da39d
BH
2863 BUILD_BUG_ON(
2864 offsetof(struct compat_ethtool_rxnfc, fs.location) -
2865 offsetof(struct compat_ethtool_rxnfc, fs.ring_cookie) !=
2866 offsetof(struct ethtool_rxnfc, fs.location) -
2867 offsetof(struct ethtool_rxnfc, fs.ring_cookie));
2868
2869 if (copy_in_user(rxnfc, compat_rxnfc,
954b1244
SH
2870 (void __user *)(&rxnfc->fs.m_ext + 1) -
2871 (void __user *)rxnfc) ||
3a7da39d
BH
2872 copy_in_user(&rxnfc->fs.ring_cookie,
2873 &compat_rxnfc->fs.ring_cookie,
954b1244 2874 (void __user *)(&rxnfc->fs.location + 1) -
b6168562
WW
2875 (void __user *)&rxnfc->fs.ring_cookie))
2876 return -EFAULT;
2877 if (ethcmd == ETHTOOL_GRXCLSRLALL) {
2878 if (put_user(rule_cnt, &rxnfc->rule_cnt))
2879 return -EFAULT;
2880 } else if (copy_in_user(&rxnfc->rule_cnt,
2881 &compat_rxnfc->rule_cnt,
2882 sizeof(rxnfc->rule_cnt)))
3a7da39d
BH
2883 return -EFAULT;
2884 }
2885
44c02a2c 2886 ret = dev_ioctl(net, SIOCETHTOOL, &ifr, NULL);
3a7da39d
BH
2887 if (ret)
2888 return ret;
2889
2890 if (convert_out) {
2891 if (copy_in_user(compat_rxnfc, rxnfc,
954b1244
SH
2892 (const void __user *)(&rxnfc->fs.m_ext + 1) -
2893 (const void __user *)rxnfc) ||
3a7da39d
BH
2894 copy_in_user(&compat_rxnfc->fs.ring_cookie,
2895 &rxnfc->fs.ring_cookie,
954b1244
SH
2896 (const void __user *)(&rxnfc->fs.location + 1) -
2897 (const void __user *)&rxnfc->fs.ring_cookie) ||
3a7da39d
BH
2898 copy_in_user(&compat_rxnfc->rule_cnt, &rxnfc->rule_cnt,
2899 sizeof(rxnfc->rule_cnt)))
2900 return -EFAULT;
2901
2902 if (ethcmd == ETHTOOL_GRXCLSRLALL) {
2903 /* As an optimisation, we only copy the actual
2904 * number of rules that the underlying
2905 * function returned. Since Mallory might
2906 * change the rule count in user memory, we
2907 * check that it is less than the rule count
2908 * originally given (as the user buffer size),
2909 * which has been range-checked.
2910 */
2911 if (get_user(actual_rule_cnt, &rxnfc->rule_cnt))
2912 return -EFAULT;
2913 if (actual_rule_cnt < rule_cnt)
2914 rule_cnt = actual_rule_cnt;
2915 if (copy_in_user(&compat_rxnfc->rule_locs[0],
2916 &rxnfc->rule_locs[0],
2917 rule_cnt * sizeof(u32)))
2918 return -EFAULT;
2919 }
2920 }
2921
2922 return 0;
7a229387
AB
2923}
2924
7a50a240
AB
2925static int compat_siocwandev(struct net *net, struct compat_ifreq __user *uifr32)
2926{
7a50a240 2927 compat_uptr_t uptr32;
44c02a2c
AV
2928 struct ifreq ifr;
2929 void __user *saved;
2930 int err;
7a50a240 2931
44c02a2c 2932 if (copy_from_user(&ifr, uifr32, sizeof(struct compat_ifreq)))
7a50a240
AB
2933 return -EFAULT;
2934
2935 if (get_user(uptr32, &uifr32->ifr_settings.ifs_ifsu))
2936 return -EFAULT;
2937
44c02a2c
AV
2938 saved = ifr.ifr_settings.ifs_ifsu.raw_hdlc;
2939 ifr.ifr_settings.ifs_ifsu.raw_hdlc = compat_ptr(uptr32);
7a229387 2940
44c02a2c
AV
2941 err = dev_ioctl(net, SIOCWANDEV, &ifr, NULL);
2942 if (!err) {
2943 ifr.ifr_settings.ifs_ifsu.raw_hdlc = saved;
2944 if (copy_to_user(uifr32, &ifr, sizeof(struct compat_ifreq)))
2945 err = -EFAULT;
ccbd6a5a 2946 }
44c02a2c 2947 return err;
7a229387
AB
2948}
2949
590d4693
BH
2950/* Handle ioctls that use ifreq::ifr_data and just need struct ifreq converted */
2951static int compat_ifr_data_ioctl(struct net *net, unsigned int cmd,
6b96018b 2952 struct compat_ifreq __user *u_ifreq32)
7a229387 2953{
44c02a2c 2954 struct ifreq ifreq;
7a229387
AB
2955 u32 data32;
2956
44c02a2c 2957 if (copy_from_user(ifreq.ifr_name, u_ifreq32->ifr_name, IFNAMSIZ))
7a229387 2958 return -EFAULT;
44c02a2c 2959 if (get_user(data32, &u_ifreq32->ifr_data))
7a229387 2960 return -EFAULT;
44c02a2c 2961 ifreq.ifr_data = compat_ptr(data32);
7a229387 2962
44c02a2c 2963 return dev_ioctl(net, cmd, &ifreq, NULL);
7a229387
AB
2964}
2965
50021ba9
JB
2966static int compat_ifreq_ioctl(struct net *net, struct socket *sock,
2967 unsigned int cmd,
2968 struct compat_ifreq __user *uifr32)
2969{
2970 struct ifreq __user *uifr;
2971 int err;
2972
2973 /* Handle the fact that while struct ifreq has the same *layout* on
2974 * 32/64 for everything but ifreq::ifru_ifmap and ifreq::ifru_data,
2975 * which are handled elsewhere, it still has different *size* due to
2976 * ifreq::ifru_ifmap (which is 16 bytes on 32 bit, 24 bytes on 64-bit,
2977 * resulting in struct ifreq being 32 and 40 bytes respectively).
2978 * As a result, if the struct happens to be at the end of a page and
2979 * the next page isn't readable/writable, we get a fault. To prevent
2980 * that, copy back and forth to the full size.
2981 */
2982
2983 uifr = compat_alloc_user_space(sizeof(*uifr));
2984 if (copy_in_user(uifr, uifr32, sizeof(*uifr32)))
2985 return -EFAULT;
2986
2987 err = sock_do_ioctl(net, sock, cmd, (unsigned long)uifr);
2988
2989 if (!err) {
2990 switch (cmd) {
2991 case SIOCGIFFLAGS:
2992 case SIOCGIFMETRIC:
2993 case SIOCGIFMTU:
2994 case SIOCGIFMEM:
2995 case SIOCGIFHWADDR:
2996 case SIOCGIFINDEX:
2997 case SIOCGIFADDR:
2998 case SIOCGIFBRDADDR:
2999 case SIOCGIFDSTADDR:
3000 case SIOCGIFNETMASK:
3001 case SIOCGIFPFLAGS:
3002 case SIOCGIFTXQLEN:
3003 case SIOCGMIIPHY:
3004 case SIOCGMIIREG:
e37c96c1 3005 case SIOCGIFNAME:
50021ba9
JB
3006 if (copy_in_user(uifr32, uifr, sizeof(*uifr32)))
3007 err = -EFAULT;
3008 break;
3009 }
3010 }
3011 return err;
3012}
3013
a2116ed2
AB
3014static int compat_sioc_ifmap(struct net *net, unsigned int cmd,
3015 struct compat_ifreq __user *uifr32)
3016{
3017 struct ifreq ifr;
3018 struct compat_ifmap __user *uifmap32;
a2116ed2
AB
3019 int err;
3020
3021 uifmap32 = &uifr32->ifr_ifru.ifru_map;
3022 err = copy_from_user(&ifr, uifr32, sizeof(ifr.ifr_name));
3ddc5b46
MD
3023 err |= get_user(ifr.ifr_map.mem_start, &uifmap32->mem_start);
3024 err |= get_user(ifr.ifr_map.mem_end, &uifmap32->mem_end);
3025 err |= get_user(ifr.ifr_map.base_addr, &uifmap32->base_addr);
3026 err |= get_user(ifr.ifr_map.irq, &uifmap32->irq);
3027 err |= get_user(ifr.ifr_map.dma, &uifmap32->dma);
3028 err |= get_user(ifr.ifr_map.port, &uifmap32->port);
a2116ed2
AB
3029 if (err)
3030 return -EFAULT;
3031
44c02a2c 3032 err = dev_ioctl(net, cmd, &ifr, NULL);
a2116ed2
AB
3033
3034 if (cmd == SIOCGIFMAP && !err) {
3035 err = copy_to_user(uifr32, &ifr, sizeof(ifr.ifr_name));
3ddc5b46
MD
3036 err |= put_user(ifr.ifr_map.mem_start, &uifmap32->mem_start);
3037 err |= put_user(ifr.ifr_map.mem_end, &uifmap32->mem_end);
3038 err |= put_user(ifr.ifr_map.base_addr, &uifmap32->base_addr);
3039 err |= put_user(ifr.ifr_map.irq, &uifmap32->irq);
3040 err |= put_user(ifr.ifr_map.dma, &uifmap32->dma);
3041 err |= put_user(ifr.ifr_map.port, &uifmap32->port);
a2116ed2
AB
3042 if (err)
3043 err = -EFAULT;
3044 }
3045 return err;
3046}
3047
7a229387 3048struct rtentry32 {
c6d409cf 3049 u32 rt_pad1;
7a229387
AB
3050 struct sockaddr rt_dst; /* target address */
3051 struct sockaddr rt_gateway; /* gateway addr (RTF_GATEWAY) */
3052 struct sockaddr rt_genmask; /* target network mask (IP) */
c6d409cf
ED
3053 unsigned short rt_flags;
3054 short rt_pad2;
3055 u32 rt_pad3;
3056 unsigned char rt_tos;
3057 unsigned char rt_class;
3058 short rt_pad4;
3059 short rt_metric; /* +1 for binary compatibility! */
7a229387 3060 /* char * */ u32 rt_dev; /* forcing the device at add */
c6d409cf
ED
3061 u32 rt_mtu; /* per route MTU/Window */
3062 u32 rt_window; /* Window clamping */
7a229387
AB
3063 unsigned short rt_irtt; /* Initial RTT */
3064};
3065
3066struct in6_rtmsg32 {
3067 struct in6_addr rtmsg_dst;
3068 struct in6_addr rtmsg_src;
3069 struct in6_addr rtmsg_gateway;
3070 u32 rtmsg_type;
3071 u16 rtmsg_dst_len;
3072 u16 rtmsg_src_len;
3073 u32 rtmsg_metric;
3074 u32 rtmsg_info;
3075 u32 rtmsg_flags;
3076 s32 rtmsg_ifindex;
3077};
3078
6b96018b
AB
3079static int routing_ioctl(struct net *net, struct socket *sock,
3080 unsigned int cmd, void __user *argp)
7a229387
AB
3081{
3082 int ret;
3083 void *r = NULL;
3084 struct in6_rtmsg r6;
3085 struct rtentry r4;
3086 char devname[16];
3087 u32 rtdev;
3088 mm_segment_t old_fs = get_fs();
3089
6b96018b
AB
3090 if (sock && sock->sk && sock->sk->sk_family == AF_INET6) { /* ipv6 */
3091 struct in6_rtmsg32 __user *ur6 = argp;
c6d409cf 3092 ret = copy_from_user(&r6.rtmsg_dst, &(ur6->rtmsg_dst),
7a229387 3093 3 * sizeof(struct in6_addr));
3ddc5b46
MD
3094 ret |= get_user(r6.rtmsg_type, &(ur6->rtmsg_type));
3095 ret |= get_user(r6.rtmsg_dst_len, &(ur6->rtmsg_dst_len));
3096 ret |= get_user(r6.rtmsg_src_len, &(ur6->rtmsg_src_len));
3097 ret |= get_user(r6.rtmsg_metric, &(ur6->rtmsg_metric));
3098 ret |= get_user(r6.rtmsg_info, &(ur6->rtmsg_info));
3099 ret |= get_user(r6.rtmsg_flags, &(ur6->rtmsg_flags));
3100 ret |= get_user(r6.rtmsg_ifindex, &(ur6->rtmsg_ifindex));
7a229387
AB
3101
3102 r = (void *) &r6;
3103 } else { /* ipv4 */
6b96018b 3104 struct rtentry32 __user *ur4 = argp;
c6d409cf 3105 ret = copy_from_user(&r4.rt_dst, &(ur4->rt_dst),
7a229387 3106 3 * sizeof(struct sockaddr));
3ddc5b46
MD
3107 ret |= get_user(r4.rt_flags, &(ur4->rt_flags));
3108 ret |= get_user(r4.rt_metric, &(ur4->rt_metric));
3109 ret |= get_user(r4.rt_mtu, &(ur4->rt_mtu));
3110 ret |= get_user(r4.rt_window, &(ur4->rt_window));
3111 ret |= get_user(r4.rt_irtt, &(ur4->rt_irtt));
3112 ret |= get_user(rtdev, &(ur4->rt_dev));
7a229387 3113 if (rtdev) {
c6d409cf 3114 ret |= copy_from_user(devname, compat_ptr(rtdev), 15);
c3f52ae6 3115 r4.rt_dev = (char __user __force *)devname;
3116 devname[15] = 0;
7a229387
AB
3117 } else
3118 r4.rt_dev = NULL;
3119
3120 r = (void *) &r4;
3121 }
3122
3123 if (ret) {
3124 ret = -EFAULT;
3125 goto out;
3126 }
3127
c6d409cf 3128 set_fs(KERNEL_DS);
99f3c896 3129 ret = sock_do_ioctl(net, sock, cmd, (unsigned long) r);
c6d409cf 3130 set_fs(old_fs);
7a229387
AB
3131
3132out:
7a229387
AB
3133 return ret;
3134}
3135
3136/* Since old style bridge ioctl's endup using SIOCDEVPRIVATE
3137 * for some operations; this forces use of the newer bridge-utils that
25985edc 3138 * use compatible ioctls
7a229387 3139 */
6b96018b 3140static int old_bridge_ioctl(compat_ulong_t __user *argp)
7a229387 3141{
6b96018b 3142 compat_ulong_t tmp;
7a229387 3143
6b96018b 3144 if (get_user(tmp, argp))
7a229387
AB
3145 return -EFAULT;
3146 if (tmp == BRCTL_GET_VERSION)
3147 return BRCTL_VERSION + 1;
3148 return -EINVAL;
3149}
3150
6b96018b
AB
3151static int compat_sock_ioctl_trans(struct file *file, struct socket *sock,
3152 unsigned int cmd, unsigned long arg)
3153{
3154 void __user *argp = compat_ptr(arg);
3155 struct sock *sk = sock->sk;
3156 struct net *net = sock_net(sk);
7a229387 3157
6b96018b 3158 if (cmd >= SIOCDEVPRIVATE && cmd <= (SIOCDEVPRIVATE + 15))
590d4693 3159 return compat_ifr_data_ioctl(net, cmd, argp);
6b96018b
AB
3160
3161 switch (cmd) {
3162 case SIOCSIFBR:
3163 case SIOCGIFBR:
3164 return old_bridge_ioctl(argp);
6b96018b 3165 case SIOCGIFCONF:
36fd633e 3166 return compat_dev_ifconf(net, argp);
6b96018b
AB
3167 case SIOCETHTOOL:
3168 return ethtool_ioctl(net, argp);
7a50a240
AB
3169 case SIOCWANDEV:
3170 return compat_siocwandev(net, argp);
a2116ed2
AB
3171 case SIOCGIFMAP:
3172 case SIOCSIFMAP:
3173 return compat_sioc_ifmap(net, cmd, argp);
6b96018b
AB
3174 case SIOCADDRT:
3175 case SIOCDELRT:
3176 return routing_ioctl(net, sock, cmd, argp);
3177 case SIOCGSTAMP:
3178 return do_siocgstamp(net, sock, cmd, argp);
3179 case SIOCGSTAMPNS:
3180 return do_siocgstampns(net, sock, cmd, argp);
590d4693
BH
3181 case SIOCBONDSLAVEINFOQUERY:
3182 case SIOCBONDINFOQUERY:
a2116ed2 3183 case SIOCSHWTSTAMP:
fd468c74 3184 case SIOCGHWTSTAMP:
590d4693 3185 return compat_ifr_data_ioctl(net, cmd, argp);
6b96018b
AB
3186
3187 case FIOSETOWN:
3188 case SIOCSPGRP:
3189 case FIOGETOWN:
3190 case SIOCGPGRP:
3191 case SIOCBRADDBR:
3192 case SIOCBRDELBR:
3193 case SIOCGIFVLAN:
3194 case SIOCSIFVLAN:
3195 case SIOCADDDLCI:
3196 case SIOCDELDLCI:
c62cce2c 3197 case SIOCGSKNS:
6b96018b
AB
3198 return sock_ioctl(file, cmd, arg);
3199
3200 case SIOCGIFFLAGS:
3201 case SIOCSIFFLAGS:
3202 case SIOCGIFMETRIC:
3203 case SIOCSIFMETRIC:
3204 case SIOCGIFMTU:
3205 case SIOCSIFMTU:
3206 case SIOCGIFMEM:
3207 case SIOCSIFMEM:
3208 case SIOCGIFHWADDR:
3209 case SIOCSIFHWADDR:
3210 case SIOCADDMULTI:
3211 case SIOCDELMULTI:
3212 case SIOCGIFINDEX:
6b96018b
AB
3213 case SIOCGIFADDR:
3214 case SIOCSIFADDR:
3215 case SIOCSIFHWBROADCAST:
6b96018b 3216 case SIOCDIFADDR:
6b96018b
AB
3217 case SIOCGIFBRDADDR:
3218 case SIOCSIFBRDADDR:
3219 case SIOCGIFDSTADDR:
3220 case SIOCSIFDSTADDR:
3221 case SIOCGIFNETMASK:
3222 case SIOCSIFNETMASK:
3223 case SIOCSIFPFLAGS:
3224 case SIOCGIFPFLAGS:
3225 case SIOCGIFTXQLEN:
3226 case SIOCSIFTXQLEN:
3227 case SIOCBRADDIF:
3228 case SIOCBRDELIF:
e37c96c1 3229 case SIOCGIFNAME:
9177efd3
AB
3230 case SIOCSIFNAME:
3231 case SIOCGMIIPHY:
3232 case SIOCGMIIREG:
3233 case SIOCSMIIREG:
7aab1e6d
JB
3234 case SIOCBONDENSLAVE:
3235 case SIOCBONDRELEASE:
3236 case SIOCBONDSETHWADDR:
3237 case SIOCBONDCHANGEACTIVE:
50021ba9
JB
3238 return compat_ifreq_ioctl(net, sock, cmd, argp);
3239
6b96018b
AB
3240 case SIOCSARP:
3241 case SIOCGARP:
3242 case SIOCDARP:
6b96018b 3243 case SIOCATMARK:
99f3c896 3244 return sock_do_ioctl(net, sock, cmd, arg);
9177efd3
AB
3245 }
3246
6b96018b
AB
3247 return -ENOIOCTLCMD;
3248}
7a229387 3249
95c96174 3250static long compat_sock_ioctl(struct file *file, unsigned int cmd,
89bddce5 3251 unsigned long arg)
89bbfc95
SP
3252{
3253 struct socket *sock = file->private_data;
3254 int ret = -ENOIOCTLCMD;
87de87d5
DM
3255 struct sock *sk;
3256 struct net *net;
3257
3258 sk = sock->sk;
3259 net = sock_net(sk);
89bbfc95
SP
3260
3261 if (sock->ops->compat_ioctl)
3262 ret = sock->ops->compat_ioctl(sock, cmd, arg);
3263
87de87d5
DM
3264 if (ret == -ENOIOCTLCMD &&
3265 (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST))
3266 ret = compat_wext_handle_ioctl(net, cmd, arg);
3267
6b96018b
AB
3268 if (ret == -ENOIOCTLCMD)
3269 ret = compat_sock_ioctl_trans(file, sock, cmd, arg);
3270
89bbfc95
SP
3271 return ret;
3272}
3273#endif
3274
ac5a488e
SS
3275int kernel_bind(struct socket *sock, struct sockaddr *addr, int addrlen)
3276{
3277 return sock->ops->bind(sock, addr, addrlen);
3278}
c6d409cf 3279EXPORT_SYMBOL(kernel_bind);
ac5a488e
SS
3280
3281int kernel_listen(struct socket *sock, int backlog)
3282{
3283 return sock->ops->listen(sock, backlog);
3284}
c6d409cf 3285EXPORT_SYMBOL(kernel_listen);
ac5a488e
SS
3286
3287int kernel_accept(struct socket *sock, struct socket **newsock, int flags)
3288{
3289 struct sock *sk = sock->sk;
3290 int err;
3291
3292 err = sock_create_lite(sk->sk_family, sk->sk_type, sk->sk_protocol,
3293 newsock);
3294 if (err < 0)
3295 goto done;
3296
cdfbabfb 3297 err = sock->ops->accept(sock, *newsock, flags, true);
ac5a488e
SS
3298 if (err < 0) {
3299 sock_release(*newsock);
fa8705b0 3300 *newsock = NULL;
ac5a488e
SS
3301 goto done;
3302 }
3303
3304 (*newsock)->ops = sock->ops;
1b08534e 3305 __module_get((*newsock)->ops->owner);
ac5a488e
SS
3306
3307done:
3308 return err;
3309}
c6d409cf 3310EXPORT_SYMBOL(kernel_accept);
ac5a488e
SS
3311
3312int kernel_connect(struct socket *sock, struct sockaddr *addr, int addrlen,
4768fbcb 3313 int flags)
ac5a488e
SS
3314{
3315 return sock->ops->connect(sock, addr, addrlen, flags);
3316}
c6d409cf 3317EXPORT_SYMBOL(kernel_connect);
ac5a488e 3318
9b2c45d4 3319int kernel_getsockname(struct socket *sock, struct sockaddr *addr)
ac5a488e 3320{
9b2c45d4 3321 return sock->ops->getname(sock, addr, 0);
ac5a488e 3322}
c6d409cf 3323EXPORT_SYMBOL(kernel_getsockname);
ac5a488e 3324
9b2c45d4 3325int kernel_getpeername(struct socket *sock, struct sockaddr *addr)
ac5a488e 3326{
9b2c45d4 3327 return sock->ops->getname(sock, addr, 1);
ac5a488e 3328}
c6d409cf 3329EXPORT_SYMBOL(kernel_getpeername);
ac5a488e
SS
3330
3331int kernel_getsockopt(struct socket *sock, int level, int optname,
3332 char *optval, int *optlen)
3333{
3334 mm_segment_t oldfs = get_fs();
fb8621bb
NK
3335 char __user *uoptval;
3336 int __user *uoptlen;
ac5a488e
SS
3337 int err;
3338
fb8621bb
NK
3339 uoptval = (char __user __force *) optval;
3340 uoptlen = (int __user __force *) optlen;
3341
ac5a488e
SS
3342 set_fs(KERNEL_DS);
3343 if (level == SOL_SOCKET)
fb8621bb 3344 err = sock_getsockopt(sock, level, optname, uoptval, uoptlen);
ac5a488e 3345 else
fb8621bb
NK
3346 err = sock->ops->getsockopt(sock, level, optname, uoptval,
3347 uoptlen);
ac5a488e
SS
3348 set_fs(oldfs);
3349 return err;
3350}
c6d409cf 3351EXPORT_SYMBOL(kernel_getsockopt);
ac5a488e
SS
3352
3353int kernel_setsockopt(struct socket *sock, int level, int optname,
b7058842 3354 char *optval, unsigned int optlen)
ac5a488e
SS
3355{
3356 mm_segment_t oldfs = get_fs();
fb8621bb 3357 char __user *uoptval;
ac5a488e
SS
3358 int err;
3359
fb8621bb
NK
3360 uoptval = (char __user __force *) optval;
3361
ac5a488e
SS
3362 set_fs(KERNEL_DS);
3363 if (level == SOL_SOCKET)
fb8621bb 3364 err = sock_setsockopt(sock, level, optname, uoptval, optlen);
ac5a488e 3365 else
fb8621bb 3366 err = sock->ops->setsockopt(sock, level, optname, uoptval,
ac5a488e
SS
3367 optlen);
3368 set_fs(oldfs);
3369 return err;
3370}
c6d409cf 3371EXPORT_SYMBOL(kernel_setsockopt);
ac5a488e
SS
3372
3373int kernel_sendpage(struct socket *sock, struct page *page, int offset,
3374 size_t size, int flags)
3375{
3376 if (sock->ops->sendpage)
3377 return sock->ops->sendpage(sock, page, offset, size, flags);
3378
3379 return sock_no_sendpage(sock, page, offset, size, flags);
3380}
c6d409cf 3381EXPORT_SYMBOL(kernel_sendpage);
ac5a488e 3382
306b13eb
TH
3383int kernel_sendpage_locked(struct sock *sk, struct page *page, int offset,
3384 size_t size, int flags)
3385{
3386 struct socket *sock = sk->sk_socket;
3387
3388 if (sock->ops->sendpage_locked)
3389 return sock->ops->sendpage_locked(sk, page, offset, size,
3390 flags);
3391
3392 return sock_no_sendpage_locked(sk, page, offset, size, flags);
3393}
3394EXPORT_SYMBOL(kernel_sendpage_locked);
3395
91cf45f0
TM
3396int kernel_sock_shutdown(struct socket *sock, enum sock_shutdown_cmd how)
3397{
3398 return sock->ops->shutdown(sock, how);
3399}
91cf45f0 3400EXPORT_SYMBOL(kernel_sock_shutdown);
113c3075
P
3401
3402/* This routine returns the IP overhead imposed by a socket i.e.
3403 * the length of the underlying IP header, depending on whether
3404 * this is an IPv4 or IPv6 socket and the length from IP options turned
57240d00 3405 * on at the socket. Assumes that the caller has a lock on the socket.
113c3075
P
3406 */
3407u32 kernel_sock_ip_overhead(struct sock *sk)
3408{
3409 struct inet_sock *inet;
3410 struct ip_options_rcu *opt;
3411 u32 overhead = 0;
113c3075
P
3412#if IS_ENABLED(CONFIG_IPV6)
3413 struct ipv6_pinfo *np;
3414 struct ipv6_txoptions *optv6 = NULL;
3415#endif /* IS_ENABLED(CONFIG_IPV6) */
3416
3417 if (!sk)
3418 return overhead;
3419
113c3075
P
3420 switch (sk->sk_family) {
3421 case AF_INET:
3422 inet = inet_sk(sk);
3423 overhead += sizeof(struct iphdr);
3424 opt = rcu_dereference_protected(inet->inet_opt,
614d79c0 3425 sock_owned_by_user(sk));
113c3075
P
3426 if (opt)
3427 overhead += opt->opt.optlen;
3428 return overhead;
3429#if IS_ENABLED(CONFIG_IPV6)
3430 case AF_INET6:
3431 np = inet6_sk(sk);
3432 overhead += sizeof(struct ipv6hdr);
3433 if (np)
3434 optv6 = rcu_dereference_protected(np->opt,
614d79c0 3435 sock_owned_by_user(sk));
113c3075
P
3436 if (optv6)
3437 overhead += (optv6->opt_flen + optv6->opt_nflen);
3438 return overhead;
3439#endif /* IS_ENABLED(CONFIG_IPV6) */
3440 default: /* Returns 0 overhead if the socket is not ipv4 or ipv6 */
3441 return overhead;
3442 }
3443}
3444EXPORT_SYMBOL(kernel_sock_ip_overhead);