Merge tag 'parisc-for-6.6-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git/delle...
[linux-2.6-block.git] / net / socket.c
CommitLineData
2874c5fd 1// SPDX-License-Identifier: GPL-2.0-or-later
1da177e4
LT
2/*
3 * NET An implementation of the SOCKET network access protocol.
4 *
5 * Version: @(#)socket.c 1.1.93 18/02/95
6 *
7 * Authors: Orest Zborowski, <obz@Kodak.COM>
02c30a84 8 * Ross Biro
1da177e4
LT
9 * Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
10 *
11 * Fixes:
12 * Anonymous : NOTSOCK/BADF cleanup. Error fix in
13 * shutdown()
14 * Alan Cox : verify_area() fixes
15 * Alan Cox : Removed DDI
16 * Jonathan Kamens : SOCK_DGRAM reconnect bug
17 * Alan Cox : Moved a load of checks to the very
18 * top level.
19 * Alan Cox : Move address structures to/from user
20 * mode above the protocol layers.
21 * Rob Janssen : Allow 0 length sends.
22 * Alan Cox : Asynchronous I/O support (cribbed from the
23 * tty drivers).
24 * Niibe Yutaka : Asynchronous I/O for writes (4.4BSD style)
25 * Jeff Uphoff : Made max number of sockets command-line
26 * configurable.
27 * Matti Aarnio : Made the number of sockets dynamic,
28 * to be allocated when needed, and mr.
29 * Uphoff's max is used as max to be
30 * allowed to allocate.
31 * Linus : Argh. removed all the socket allocation
32 * altogether: it's in the inode now.
33 * Alan Cox : Made sock_alloc()/sock_release() public
34 * for NetROM and future kernel nfsd type
35 * stuff.
36 * Alan Cox : sendmsg/recvmsg basics.
37 * Tom Dyas : Export net symbols.
38 * Marcin Dalecki : Fixed problems with CONFIG_NET="n".
39 * Alan Cox : Added thread locking to sys_* calls
40 * for sockets. May have errors at the
41 * moment.
42 * Kevin Buhr : Fixed the dumb errors in the above.
43 * Andi Kleen : Some small cleanups, optimizations,
44 * and fixed a copy_from_user() bug.
45 * Tigran Aivazian : sys_send(args) calls sys_sendto(args, NULL, 0)
89bddce5 46 * Tigran Aivazian : Made listen(2) backlog sanity checks
1da177e4
LT
47 * protocol-independent
48 *
1da177e4 49 * This module is effectively the top level interface to the BSD socket
89bddce5 50 * paradigm.
1da177e4
LT
51 *
52 * Based upon Swansea University Computer Society NET3.039
53 */
54
aef2feda 55#include <linux/bpf-cgroup.h>
cc69837f 56#include <linux/ethtool.h>
1da177e4 57#include <linux/mm.h>
1da177e4
LT
58#include <linux/socket.h>
59#include <linux/file.h>
2dc334f1 60#include <linux/splice.h>
1da177e4
LT
61#include <linux/net.h>
62#include <linux/interrupt.h>
aaca0bdc 63#include <linux/thread_info.h>
55737fda 64#include <linux/rcupdate.h>
1da177e4
LT
65#include <linux/netdevice.h>
66#include <linux/proc_fs.h>
67#include <linux/seq_file.h>
4a3e2f71 68#include <linux/mutex.h>
1da177e4 69#include <linux/if_bridge.h>
20380731 70#include <linux/if_vlan.h>
408eccce 71#include <linux/ptp_classify.h>
1da177e4
LT
72#include <linux/init.h>
73#include <linux/poll.h>
74#include <linux/cache.h>
75#include <linux/module.h>
76#include <linux/highmem.h>
1da177e4 77#include <linux/mount.h>
fba9be49 78#include <linux/pseudo_fs.h>
1da177e4
LT
79#include <linux/security.h>
80#include <linux/syscalls.h>
81#include <linux/compat.h>
82#include <linux/kmod.h>
3ec3b2fb 83#include <linux/audit.h>
d86b5e0e 84#include <linux/wireless.h>
1b8d7ae4 85#include <linux/nsproxy.h>
1fd7317d 86#include <linux/magic.h>
5a0e3ad6 87#include <linux/slab.h>
600e1779 88#include <linux/xattr.h>
c8e8cd57 89#include <linux/nospec.h>
8c3c447b 90#include <linux/indirect_call_wrapper.h>
8e9fad0e 91#include <linux/io_uring.h>
1da177e4 92
7c0f6ba6 93#include <linux/uaccess.h>
1da177e4
LT
94#include <asm/unistd.h>
95
96#include <net/compat.h>
87de87d5 97#include <net/wext.h>
f8451725 98#include <net/cls_cgroup.h>
1da177e4
LT
99
100#include <net/sock.h>
101#include <linux/netfilter.h>
102
6b96018b
AB
103#include <linux/if_tun.h>
104#include <linux/ipv6_route.h>
105#include <linux/route.h>
c7dc504e 106#include <linux/termios.h>
6b96018b 107#include <linux/sockios.h>
076bb0c8 108#include <net/busy_poll.h>
f24b9be5 109#include <linux/errqueue.h>
d7c08826 110#include <linux/ptp_clock_kernel.h>
6e6eda44 111#include <trace/events/sock.h>
06021292 112
e0d1095a 113#ifdef CONFIG_NET_RX_BUSY_POLL
64b0dc51
ET
114unsigned int sysctl_net_busy_read __read_mostly;
115unsigned int sysctl_net_busy_poll __read_mostly;
06021292 116#endif
6b96018b 117
8ae5e030
AV
118static ssize_t sock_read_iter(struct kiocb *iocb, struct iov_iter *to);
119static ssize_t sock_write_iter(struct kiocb *iocb, struct iov_iter *from);
89bddce5 120static int sock_mmap(struct file *file, struct vm_area_struct *vma);
1da177e4
LT
121
122static int sock_close(struct inode *inode, struct file *file);
a11e1d43
LT
123static __poll_t sock_poll(struct file *file,
124 struct poll_table_struct *wait);
89bddce5 125static long sock_ioctl(struct file *file, unsigned int cmd, unsigned long arg);
89bbfc95
SP
126#ifdef CONFIG_COMPAT
127static long compat_sock_ioctl(struct file *file,
89bddce5 128 unsigned int cmd, unsigned long arg);
89bbfc95 129#endif
1da177e4 130static int sock_fasync(int fd, struct file *filp, int on);
9c55e01c 131static ssize_t sock_splice_read(struct file *file, loff_t *ppos,
c6d409cf 132 struct pipe_inode_info *pipe, size_t len,
9c55e01c 133 unsigned int flags);
2bfc6685 134static void sock_splice_eof(struct file *file);
542d3065
AB
135
136#ifdef CONFIG_PROC_FS
137static void sock_show_fdinfo(struct seq_file *m, struct file *f)
138{
139 struct socket *sock = f->private_data;
1ded5e5a 140 const struct proto_ops *ops = READ_ONCE(sock->ops);
542d3065 141
1ded5e5a
ED
142 if (ops->show_fdinfo)
143 ops->show_fdinfo(m, sock);
542d3065
AB
144}
145#else
146#define sock_show_fdinfo NULL
147#endif
1da177e4 148
1da177e4
LT
149/*
150 * Socket files have a set of 'special' operations as well as the generic file ones. These don't appear
151 * in the operation structures but are done directly via the socketcall() multiplexor.
152 */
153
da7071d7 154static const struct file_operations socket_file_ops = {
1da177e4
LT
155 .owner = THIS_MODULE,
156 .llseek = no_llseek,
8ae5e030
AV
157 .read_iter = sock_read_iter,
158 .write_iter = sock_write_iter,
1da177e4
LT
159 .poll = sock_poll,
160 .unlocked_ioctl = sock_ioctl,
89bbfc95
SP
161#ifdef CONFIG_COMPAT
162 .compat_ioctl = compat_sock_ioctl,
163#endif
8e9fad0e 164 .uring_cmd = io_uring_cmd_sock,
1da177e4 165 .mmap = sock_mmap,
1da177e4
LT
166 .release = sock_close,
167 .fasync = sock_fasync,
2dc334f1 168 .splice_write = splice_to_socket,
9c55e01c 169 .splice_read = sock_splice_read,
2bfc6685 170 .splice_eof = sock_splice_eof,
b4653342 171 .show_fdinfo = sock_show_fdinfo,
1da177e4
LT
172};
173
fe0bdbde
YD
174static const char * const pf_family_names[] = {
175 [PF_UNSPEC] = "PF_UNSPEC",
176 [PF_UNIX] = "PF_UNIX/PF_LOCAL",
177 [PF_INET] = "PF_INET",
178 [PF_AX25] = "PF_AX25",
179 [PF_IPX] = "PF_IPX",
180 [PF_APPLETALK] = "PF_APPLETALK",
181 [PF_NETROM] = "PF_NETROM",
182 [PF_BRIDGE] = "PF_BRIDGE",
183 [PF_ATMPVC] = "PF_ATMPVC",
184 [PF_X25] = "PF_X25",
185 [PF_INET6] = "PF_INET6",
186 [PF_ROSE] = "PF_ROSE",
187 [PF_DECnet] = "PF_DECnet",
188 [PF_NETBEUI] = "PF_NETBEUI",
189 [PF_SECURITY] = "PF_SECURITY",
190 [PF_KEY] = "PF_KEY",
191 [PF_NETLINK] = "PF_NETLINK/PF_ROUTE",
192 [PF_PACKET] = "PF_PACKET",
193 [PF_ASH] = "PF_ASH",
194 [PF_ECONET] = "PF_ECONET",
195 [PF_ATMSVC] = "PF_ATMSVC",
196 [PF_RDS] = "PF_RDS",
197 [PF_SNA] = "PF_SNA",
198 [PF_IRDA] = "PF_IRDA",
199 [PF_PPPOX] = "PF_PPPOX",
200 [PF_WANPIPE] = "PF_WANPIPE",
201 [PF_LLC] = "PF_LLC",
202 [PF_IB] = "PF_IB",
203 [PF_MPLS] = "PF_MPLS",
204 [PF_CAN] = "PF_CAN",
205 [PF_TIPC] = "PF_TIPC",
206 [PF_BLUETOOTH] = "PF_BLUETOOTH",
207 [PF_IUCV] = "PF_IUCV",
208 [PF_RXRPC] = "PF_RXRPC",
209 [PF_ISDN] = "PF_ISDN",
210 [PF_PHONET] = "PF_PHONET",
211 [PF_IEEE802154] = "PF_IEEE802154",
212 [PF_CAIF] = "PF_CAIF",
213 [PF_ALG] = "PF_ALG",
214 [PF_NFC] = "PF_NFC",
215 [PF_VSOCK] = "PF_VSOCK",
216 [PF_KCM] = "PF_KCM",
217 [PF_QIPCRTR] = "PF_QIPCRTR",
218 [PF_SMC] = "PF_SMC",
219 [PF_XDP] = "PF_XDP",
bc49d816 220 [PF_MCTP] = "PF_MCTP",
fe0bdbde
YD
221};
222
1da177e4
LT
223/*
224 * The protocol list. Each protocol is registered in here.
225 */
226
1da177e4 227static DEFINE_SPINLOCK(net_family_lock);
190683a9 228static const struct net_proto_family __rcu *net_families[NPROTO] __read_mostly;
1da177e4 229
1da177e4 230/*
89bddce5
SH
231 * Support routines.
232 * Move socket addresses back and forth across the kernel/user
233 * divide and look after the messy bits.
1da177e4
LT
234 */
235
1da177e4
LT
236/**
237 * move_addr_to_kernel - copy a socket address into kernel space
238 * @uaddr: Address in user space
239 * @kaddr: Address in kernel space
240 * @ulen: Length in user space
241 *
242 * The address is copied into kernel space. If the provided address is
243 * too long an error code of -EINVAL is returned. If the copy gives
244 * invalid addresses -EFAULT is returned. On a success 0 is returned.
245 */
246
43db362d 247int move_addr_to_kernel(void __user *uaddr, int ulen, struct sockaddr_storage *kaddr)
1da177e4 248{
230b1839 249 if (ulen < 0 || ulen > sizeof(struct sockaddr_storage))
1da177e4 250 return -EINVAL;
89bddce5 251 if (ulen == 0)
1da177e4 252 return 0;
89bddce5 253 if (copy_from_user(kaddr, uaddr, ulen))
1da177e4 254 return -EFAULT;
3ec3b2fb 255 return audit_sockaddr(ulen, kaddr);
1da177e4
LT
256}
257
258/**
259 * move_addr_to_user - copy an address to user space
260 * @kaddr: kernel space address
261 * @klen: length of address in kernel
262 * @uaddr: user space address
263 * @ulen: pointer to user length field
264 *
265 * The value pointed to by ulen on entry is the buffer length available.
266 * This is overwritten with the buffer space used. -EINVAL is returned
267 * if an overlong buffer is specified or a negative buffer size. -EFAULT
268 * is returned if either the buffer or the length field are not
269 * accessible.
270 * After copying the data up to the limit the user specifies, the true
271 * length of the data is written over the length limit the user
272 * specified. Zero is returned for a success.
273 */
89bddce5 274
43db362d 275static int move_addr_to_user(struct sockaddr_storage *kaddr, int klen,
11165f14 276 void __user *uaddr, int __user *ulen)
1da177e4
LT
277{
278 int err;
279 int len;
280
68c6beb3 281 BUG_ON(klen > sizeof(struct sockaddr_storage));
89bddce5
SH
282 err = get_user(len, ulen);
283 if (err)
1da177e4 284 return err;
89bddce5
SH
285 if (len > klen)
286 len = klen;
68c6beb3 287 if (len < 0)
1da177e4 288 return -EINVAL;
89bddce5 289 if (len) {
d6fe3945
SG
290 if (audit_sockaddr(klen, kaddr))
291 return -ENOMEM;
89bddce5 292 if (copy_to_user(uaddr, kaddr, len))
1da177e4
LT
293 return -EFAULT;
294 }
295 /*
89bddce5
SH
296 * "fromlen shall refer to the value before truncation.."
297 * 1003.1g
1da177e4
LT
298 */
299 return __put_user(klen, ulen);
300}
301
08009a76 302static struct kmem_cache *sock_inode_cachep __ro_after_init;
1da177e4
LT
303
304static struct inode *sock_alloc_inode(struct super_block *sb)
305{
306 struct socket_alloc *ei;
89bddce5 307
fd60b288 308 ei = alloc_inode_sb(sb, sock_inode_cachep, GFP_KERNEL);
1da177e4
LT
309 if (!ei)
310 return NULL;
333f7909
AV
311 init_waitqueue_head(&ei->socket.wq.wait);
312 ei->socket.wq.fasync_list = NULL;
313 ei->socket.wq.flags = 0;
89bddce5 314
1da177e4
LT
315 ei->socket.state = SS_UNCONNECTED;
316 ei->socket.flags = 0;
317 ei->socket.ops = NULL;
318 ei->socket.sk = NULL;
319 ei->socket.file = NULL;
1da177e4
LT
320
321 return &ei->vfs_inode;
322}
323
6d7855c5 324static void sock_free_inode(struct inode *inode)
1da177e4 325{
43815482
ED
326 struct socket_alloc *ei;
327
328 ei = container_of(inode, struct socket_alloc, vfs_inode);
43815482 329 kmem_cache_free(sock_inode_cachep, ei);
1da177e4
LT
330}
331
51cc5068 332static void init_once(void *foo)
1da177e4 333{
89bddce5 334 struct socket_alloc *ei = (struct socket_alloc *)foo;
1da177e4 335
a35afb83 336 inode_init_once(&ei->vfs_inode);
1da177e4 337}
89bddce5 338
1e911632 339static void init_inodecache(void)
1da177e4
LT
340{
341 sock_inode_cachep = kmem_cache_create("sock_inode_cache",
89bddce5
SH
342 sizeof(struct socket_alloc),
343 0,
344 (SLAB_HWCACHE_ALIGN |
345 SLAB_RECLAIM_ACCOUNT |
5d097056 346 SLAB_MEM_SPREAD | SLAB_ACCOUNT),
20c2df83 347 init_once);
1e911632 348 BUG_ON(sock_inode_cachep == NULL);
1da177e4
LT
349}
350
b87221de 351static const struct super_operations sockfs_ops = {
c6d409cf 352 .alloc_inode = sock_alloc_inode,
6d7855c5 353 .free_inode = sock_free_inode,
c6d409cf 354 .statfs = simple_statfs,
1da177e4
LT
355};
356
c23fbb6b
ED
357/*
358 * sockfs_dname() is called from d_path().
359 */
360static char *sockfs_dname(struct dentry *dentry, char *buffer, int buflen)
361{
0f60d288 362 return dynamic_dname(buffer, buflen, "socket:[%lu]",
c5ef6035 363 d_inode(dentry)->i_ino);
c23fbb6b
ED
364}
365
3ba13d17 366static const struct dentry_operations sockfs_dentry_operations = {
c23fbb6b 367 .d_dname = sockfs_dname,
1da177e4
LT
368};
369
bba0bd31
AG
370static int sockfs_xattr_get(const struct xattr_handler *handler,
371 struct dentry *dentry, struct inode *inode,
372 const char *suffix, void *value, size_t size)
373{
374 if (value) {
375 if (dentry->d_name.len + 1 > size)
376 return -ERANGE;
377 memcpy(value, dentry->d_name.name, dentry->d_name.len + 1);
378 }
379 return dentry->d_name.len + 1;
380}
381
382#define XATTR_SOCKPROTONAME_SUFFIX "sockprotoname"
383#define XATTR_NAME_SOCKPROTONAME (XATTR_SYSTEM_PREFIX XATTR_SOCKPROTONAME_SUFFIX)
384#define XATTR_NAME_SOCKPROTONAME_LEN (sizeof(XATTR_NAME_SOCKPROTONAME)-1)
385
386static const struct xattr_handler sockfs_xattr_handler = {
387 .name = XATTR_NAME_SOCKPROTONAME,
388 .get = sockfs_xattr_get,
389};
390
4a590153 391static int sockfs_security_xattr_set(const struct xattr_handler *handler,
39f60c1c 392 struct mnt_idmap *idmap,
4a590153
AG
393 struct dentry *dentry, struct inode *inode,
394 const char *suffix, const void *value,
395 size_t size, int flags)
396{
397 /* Handled by LSM. */
398 return -EAGAIN;
399}
400
401static const struct xattr_handler sockfs_security_xattr_handler = {
402 .prefix = XATTR_SECURITY_PREFIX,
403 .set = sockfs_security_xattr_set,
404};
405
bba0bd31
AG
406static const struct xattr_handler *sockfs_xattr_handlers[] = {
407 &sockfs_xattr_handler,
4a590153 408 &sockfs_security_xattr_handler,
bba0bd31
AG
409 NULL
410};
411
fba9be49 412static int sockfs_init_fs_context(struct fs_context *fc)
c74a1cbb 413{
fba9be49
DH
414 struct pseudo_fs_context *ctx = init_pseudo(fc, SOCKFS_MAGIC);
415 if (!ctx)
416 return -ENOMEM;
417 ctx->ops = &sockfs_ops;
418 ctx->dops = &sockfs_dentry_operations;
419 ctx->xattr = sockfs_xattr_handlers;
420 return 0;
c74a1cbb
AV
421}
422
423static struct vfsmount *sock_mnt __read_mostly;
424
425static struct file_system_type sock_fs_type = {
426 .name = "sockfs",
fba9be49 427 .init_fs_context = sockfs_init_fs_context,
c74a1cbb
AV
428 .kill_sb = kill_anon_super,
429};
430
1da177e4
LT
431/*
432 * Obtains the first available file descriptor and sets it up for use.
433 *
39d8c1b6
DM
434 * These functions create file structures and maps them to fd space
435 * of the current process. On success it returns file descriptor
1da177e4
LT
436 * and file struct implicitly stored in sock->file.
437 * Note that another thread may close file descriptor before we return
438 * from this function. We use the fact that now we do not refer
439 * to socket after mapping. If one day we will need it, this
440 * function will increment ref. count on file by 1.
441 *
442 * In any case returned fd MAY BE not valid!
443 * This race condition is unavoidable
444 * with shared fd spaces, we cannot solve it inside kernel,
445 * but we take care of internal coherence yet.
446 */
447
8a3c245c
PT
448/**
449 * sock_alloc_file - Bind a &socket to a &file
450 * @sock: socket
451 * @flags: file status flags
452 * @dname: protocol name
453 *
454 * Returns the &file bound with @sock, implicitly storing it
455 * in sock->file. If dname is %NULL, sets to "".
649c15c7
TLSC
456 *
457 * On failure @sock is released, and an ERR pointer is returned.
458 *
8a3c245c
PT
459 * This function uses GFP_KERNEL internally.
460 */
461
aab174f0 462struct file *sock_alloc_file(struct socket *sock, int flags, const char *dname)
1da177e4 463{
7cbe66b6 464 struct file *file;
1da177e4 465
d93aa9d8
AV
466 if (!dname)
467 dname = sock->sk ? sock->sk->sk_prot_creator->name : "";
39d8c1b6 468
d93aa9d8
AV
469 file = alloc_file_pseudo(SOCK_INODE(sock), sock_mnt, dname,
470 O_RDWR | (flags & O_NONBLOCK),
471 &socket_file_ops);
b5ffe634 472 if (IS_ERR(file)) {
8e1611e2 473 sock_release(sock);
39b65252 474 return file;
cc3808f8
AV
475 }
476
fe34db06 477 file->f_mode |= FMODE_NOWAIT;
cc3808f8 478 sock->file = file;
39d8c1b6 479 file->private_data = sock;
d8e464ec 480 stream_open(SOCK_INODE(sock), file);
28407630 481 return file;
39d8c1b6 482}
56b31d1c 483EXPORT_SYMBOL(sock_alloc_file);
39d8c1b6 484
56b31d1c 485static int sock_map_fd(struct socket *sock, int flags)
39d8c1b6
DM
486{
487 struct file *newfile;
28407630 488 int fd = get_unused_fd_flags(flags);
ce4bb04c
AV
489 if (unlikely(fd < 0)) {
490 sock_release(sock);
28407630 491 return fd;
ce4bb04c 492 }
39d8c1b6 493
aab174f0 494 newfile = sock_alloc_file(sock, flags, NULL);
4546e44c 495 if (!IS_ERR(newfile)) {
39d8c1b6 496 fd_install(fd, newfile);
28407630
AV
497 return fd;
498 }
7cbe66b6 499
28407630
AV
500 put_unused_fd(fd);
501 return PTR_ERR(newfile);
1da177e4
LT
502}
503
8a3c245c
PT
504/**
505 * sock_from_file - Return the &socket bounded to @file.
506 * @file: file
8a3c245c 507 *
dba4a925 508 * On failure returns %NULL.
8a3c245c
PT
509 */
510
dba4a925 511struct socket *sock_from_file(struct file *file)
6cb153ca 512{
6cb153ca 513 if (file->f_op == &socket_file_ops)
da214a47 514 return file->private_data; /* set in sock_alloc_file */
6cb153ca 515
23bb80d2 516 return NULL;
6cb153ca 517}
406a3c63 518EXPORT_SYMBOL(sock_from_file);
6cb153ca 519
1da177e4 520/**
c6d409cf 521 * sockfd_lookup - Go from a file number to its socket slot
1da177e4
LT
522 * @fd: file handle
523 * @err: pointer to an error code return
524 *
525 * The file handle passed in is locked and the socket it is bound
241c4667 526 * to is returned. If an error occurs the err pointer is overwritten
1da177e4
LT
527 * with a negative errno code and NULL is returned. The function checks
528 * for both invalid handles and passing a handle which is not a socket.
529 *
530 * On a success the socket object pointer is returned.
531 */
532
533struct socket *sockfd_lookup(int fd, int *err)
534{
535 struct file *file;
1da177e4
LT
536 struct socket *sock;
537
89bddce5
SH
538 file = fget(fd);
539 if (!file) {
1da177e4
LT
540 *err = -EBADF;
541 return NULL;
542 }
89bddce5 543
dba4a925
FR
544 sock = sock_from_file(file);
545 if (!sock) {
546 *err = -ENOTSOCK;
1da177e4 547 fput(file);
dba4a925 548 }
6cb153ca
BL
549 return sock;
550}
c6d409cf 551EXPORT_SYMBOL(sockfd_lookup);
1da177e4 552
6cb153ca
BL
553static struct socket *sockfd_lookup_light(int fd, int *err, int *fput_needed)
554{
00e188ef 555 struct fd f = fdget(fd);
6cb153ca
BL
556 struct socket *sock;
557
3672558c 558 *err = -EBADF;
00e188ef 559 if (f.file) {
dba4a925 560 sock = sock_from_file(f.file);
00e188ef 561 if (likely(sock)) {
ce787a5a 562 *fput_needed = f.flags & FDPUT_FPUT;
6cb153ca 563 return sock;
00e188ef 564 }
dba4a925 565 *err = -ENOTSOCK;
00e188ef 566 fdput(f);
1da177e4 567 }
6cb153ca 568 return NULL;
1da177e4
LT
569}
570
600e1779
MY
571static ssize_t sockfs_listxattr(struct dentry *dentry, char *buffer,
572 size_t size)
573{
574 ssize_t len;
575 ssize_t used = 0;
576
c5ef6035 577 len = security_inode_listsecurity(d_inode(dentry), buffer, size);
600e1779
MY
578 if (len < 0)
579 return len;
580 used += len;
581 if (buffer) {
582 if (size < used)
583 return -ERANGE;
584 buffer += len;
585 }
586
587 len = (XATTR_NAME_SOCKPROTONAME_LEN + 1);
588 used += len;
589 if (buffer) {
590 if (size < used)
591 return -ERANGE;
592 memcpy(buffer, XATTR_NAME_SOCKPROTONAME, len);
593 buffer += len;
594 }
595
596 return used;
597}
598
c1632a0f 599static int sockfs_setattr(struct mnt_idmap *idmap,
549c7297 600 struct dentry *dentry, struct iattr *iattr)
86741ec2 601{
c1632a0f 602 int err = simple_setattr(&nop_mnt_idmap, dentry, iattr);
86741ec2 603
e1a3a60a 604 if (!err && (iattr->ia_valid & ATTR_UID)) {
86741ec2
LC
605 struct socket *sock = SOCKET_I(d_inode(dentry));
606
6d8c50dc
CW
607 if (sock->sk)
608 sock->sk->sk_uid = iattr->ia_uid;
609 else
610 err = -ENOENT;
86741ec2
LC
611 }
612
613 return err;
614}
615
600e1779 616static const struct inode_operations sockfs_inode_ops = {
600e1779 617 .listxattr = sockfs_listxattr,
86741ec2 618 .setattr = sockfs_setattr,
600e1779
MY
619};
620
1da177e4 621/**
8a3c245c 622 * sock_alloc - allocate a socket
89bddce5 623 *
1da177e4
LT
624 * Allocate a new inode and socket object. The two are bound together
625 * and initialised. The socket is then returned. If we are out of inodes
8a3c245c 626 * NULL is returned. This functions uses GFP_KERNEL internally.
1da177e4
LT
627 */
628
f4a00aac 629struct socket *sock_alloc(void)
1da177e4 630{
89bddce5
SH
631 struct inode *inode;
632 struct socket *sock;
1da177e4 633
a209dfc7 634 inode = new_inode_pseudo(sock_mnt->mnt_sb);
1da177e4
LT
635 if (!inode)
636 return NULL;
637
638 sock = SOCKET_I(inode);
639
85fe4025 640 inode->i_ino = get_next_ino();
89bddce5 641 inode->i_mode = S_IFSOCK | S_IRWXUGO;
8192b0c4
DH
642 inode->i_uid = current_fsuid();
643 inode->i_gid = current_fsgid();
600e1779 644 inode->i_op = &sockfs_inode_ops;
1da177e4 645
1da177e4
LT
646 return sock;
647}
f4a00aac 648EXPORT_SYMBOL(sock_alloc);
1da177e4 649
6d8c50dc 650static void __sock_release(struct socket *sock, struct inode *inode)
1da177e4 651{
1ded5e5a
ED
652 const struct proto_ops *ops = READ_ONCE(sock->ops);
653
654 if (ops) {
655 struct module *owner = ops->owner;
1da177e4 656
6d8c50dc
CW
657 if (inode)
658 inode_lock(inode);
1ded5e5a 659 ops->release(sock);
ff7b11aa 660 sock->sk = NULL;
6d8c50dc
CW
661 if (inode)
662 inode_unlock(inode);
1da177e4
LT
663 sock->ops = NULL;
664 module_put(owner);
665 }
666
333f7909 667 if (sock->wq.fasync_list)
3410f22e 668 pr_err("%s: fasync list not empty!\n", __func__);
1da177e4 669
1da177e4
LT
670 if (!sock->file) {
671 iput(SOCK_INODE(sock));
672 return;
673 }
89bddce5 674 sock->file = NULL;
1da177e4 675}
6d8c50dc 676
9a8ad9ac
AL
677/**
678 * sock_release - close a socket
679 * @sock: socket to close
680 *
681 * The socket is released from the protocol stack if it has a release
682 * callback, and the inode is then released if the socket is bound to
683 * an inode not a file.
684 */
6d8c50dc
CW
685void sock_release(struct socket *sock)
686{
687 __sock_release(sock, NULL);
688}
c6d409cf 689EXPORT_SYMBOL(sock_release);
1da177e4 690
c14ac945 691void __sock_tx_timestamp(__u16 tsflags, __u8 *tx_flags)
20d49473 692{
140c55d4
ED
693 u8 flags = *tx_flags;
694
51eb7492 695 if (tsflags & SOF_TIMESTAMPING_TX_HARDWARE) {
140c55d4
ED
696 flags |= SKBTX_HW_TSTAMP;
697
51eb7492
GE
698 /* PTP hardware clocks can provide a free running cycle counter
699 * as a time base for virtual clocks. Tell driver to use the
700 * free running cycle counter for timestamp if socket is bound
701 * to virtual clock.
702 */
703 if (tsflags & SOF_TIMESTAMPING_BIND_PHC)
704 flags |= SKBTX_HW_TSTAMP_USE_CYCLES;
705 }
706
c14ac945 707 if (tsflags & SOF_TIMESTAMPING_TX_SOFTWARE)
140c55d4
ED
708 flags |= SKBTX_SW_TSTAMP;
709
c14ac945 710 if (tsflags & SOF_TIMESTAMPING_TX_SCHED)
140c55d4
ED
711 flags |= SKBTX_SCHED_TSTAMP;
712
140c55d4 713 *tx_flags = flags;
20d49473 714}
67cc0d40 715EXPORT_SYMBOL(__sock_tx_timestamp);
20d49473 716
8c3c447b
PA
717INDIRECT_CALLABLE_DECLARE(int inet_sendmsg(struct socket *, struct msghdr *,
718 size_t));
a648a592
PA
719INDIRECT_CALLABLE_DECLARE(int inet6_sendmsg(struct socket *, struct msghdr *,
720 size_t));
6e6eda44
YC
721
722static noinline void call_trace_sock_send_length(struct sock *sk, int ret,
723 int flags)
724{
725 trace_sock_send_length(sk, ret, 0);
726}
727
d8725c86 728static inline int sock_sendmsg_nosec(struct socket *sock, struct msghdr *msg)
1da177e4 729{
1ded5e5a 730 int ret = INDIRECT_CALL_INET(READ_ONCE(sock->ops)->sendmsg, inet6_sendmsg,
a648a592
PA
731 inet_sendmsg, sock, msg,
732 msg_data_left(msg));
d8725c86 733 BUG_ON(ret == -EIOCBQUEUED);
6e6eda44
YC
734
735 if (trace_sock_send_length_enabled())
736 call_trace_sock_send_length(sock->sk, ret, 0);
d8725c86 737 return ret;
1da177e4
LT
738}
739
85806af0
RD
740/**
741 * sock_sendmsg - send a message through @sock
742 * @sock: socket
743 * @msg: message to send
744 *
745 * Sends @msg through @sock, passing through LSM.
746 * Returns the number of bytes sent, or an error code.
747 */
d8725c86 748int sock_sendmsg(struct socket *sock, struct msghdr *msg)
228e548e 749{
d8725c86 750 int err = security_socket_sendmsg(sock, msg,
01e97e65 751 msg_data_left(msg));
228e548e 752
d8725c86 753 return err ?: sock_sendmsg_nosec(sock, msg);
0cf00c6f 754}
c6d409cf 755EXPORT_SYMBOL(sock_sendmsg);
1da177e4 756
8a3c245c
PT
757/**
758 * kernel_sendmsg - send a message through @sock (kernel-space)
759 * @sock: socket
760 * @msg: message header
761 * @vec: kernel vec
762 * @num: vec array length
763 * @size: total message data size
764 *
765 * Builds the message data with @vec and sends it through @sock.
766 * Returns the number of bytes sent, or an error code.
767 */
768
1da177e4
LT
769int kernel_sendmsg(struct socket *sock, struct msghdr *msg,
770 struct kvec *vec, size_t num, size_t size)
771{
de4eda9d 772 iov_iter_kvec(&msg->msg_iter, ITER_SOURCE, vec, num, size);
d8725c86 773 return sock_sendmsg(sock, msg);
1da177e4 774}
c6d409cf 775EXPORT_SYMBOL(kernel_sendmsg);
1da177e4 776
8a3c245c
PT
777/**
778 * kernel_sendmsg_locked - send a message through @sock (kernel-space)
779 * @sk: sock
780 * @msg: message header
781 * @vec: output s/g array
782 * @num: output s/g array length
783 * @size: total message data size
784 *
785 * Builds the message data with @vec and sends it through @sock.
786 * Returns the number of bytes sent, or an error code.
787 * Caller must hold @sk.
788 */
789
306b13eb
TH
790int kernel_sendmsg_locked(struct sock *sk, struct msghdr *msg,
791 struct kvec *vec, size_t num, size_t size)
792{
793 struct socket *sock = sk->sk_socket;
1ded5e5a 794 const struct proto_ops *ops = READ_ONCE(sock->ops);
306b13eb 795
1ded5e5a 796 if (!ops->sendmsg_locked)
db5980d8 797 return sock_no_sendmsg_locked(sk, msg, size);
306b13eb 798
de4eda9d 799 iov_iter_kvec(&msg->msg_iter, ITER_SOURCE, vec, num, size);
306b13eb 800
1ded5e5a 801 return ops->sendmsg_locked(sk, msg, msg_data_left(msg));
306b13eb
TH
802}
803EXPORT_SYMBOL(kernel_sendmsg_locked);
804
8605330a
SHY
805static bool skb_is_err_queue(const struct sk_buff *skb)
806{
807 /* pkt_type of skbs enqueued on the error queue are set to
808 * PACKET_OUTGOING in skb_set_err_queue(). This is only safe to do
809 * in recvmsg, since skbs received on a local socket will never
810 * have a pkt_type of PACKET_OUTGOING.
811 */
812 return skb->pkt_type == PACKET_OUTGOING;
813}
814
b50a5c70
ML
815/* On transmit, software and hardware timestamps are returned independently.
816 * As the two skb clones share the hardware timestamp, which may be updated
817 * before the software timestamp is received, a hardware TX timestamp may be
818 * returned only if there is no software TX timestamp. Ignore false software
819 * timestamps, which may be made in the __sock_recv_timestamp() call when the
7f1bc6e9 820 * option SO_TIMESTAMP_OLD(NS) is enabled on the socket, even when the skb has a
b50a5c70
ML
821 * hardware timestamp.
822 */
823static bool skb_is_swtx_tstamp(const struct sk_buff *skb, int false_tstamp)
824{
825 return skb->tstamp && !false_tstamp && skb_is_err_queue(skb);
826}
827
97dc7cd9
GE
828static ktime_t get_timestamp(struct sock *sk, struct sk_buff *skb, int *if_index)
829{
e3390b30 830 bool cycles = READ_ONCE(sk->sk_tsflags) & SOF_TIMESTAMPING_BIND_PHC;
97dc7cd9
GE
831 struct skb_shared_hwtstamps *shhwtstamps = skb_hwtstamps(skb);
832 struct net_device *orig_dev;
833 ktime_t hwtstamp;
834
835 rcu_read_lock();
836 orig_dev = dev_get_by_napi_id(skb_napi_id(skb));
837 if (orig_dev) {
838 *if_index = orig_dev->ifindex;
839 hwtstamp = netdev_get_tstamp(orig_dev, shhwtstamps, cycles);
840 } else {
841 hwtstamp = shhwtstamps->hwtstamp;
842 }
843 rcu_read_unlock();
844
845 return hwtstamp;
846}
847
848static void put_ts_pktinfo(struct msghdr *msg, struct sk_buff *skb,
849 int if_index)
aad9c8c4
ML
850{
851 struct scm_ts_pktinfo ts_pktinfo;
852 struct net_device *orig_dev;
853
854 if (!skb_mac_header_was_set(skb))
855 return;
856
857 memset(&ts_pktinfo, 0, sizeof(ts_pktinfo));
858
97dc7cd9
GE
859 if (!if_index) {
860 rcu_read_lock();
861 orig_dev = dev_get_by_napi_id(skb_napi_id(skb));
862 if (orig_dev)
863 if_index = orig_dev->ifindex;
864 rcu_read_unlock();
865 }
866 ts_pktinfo.if_index = if_index;
aad9c8c4
ML
867
868 ts_pktinfo.pkt_length = skb->len - skb_mac_offset(skb);
869 put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMPING_PKTINFO,
870 sizeof(ts_pktinfo), &ts_pktinfo);
871}
872
92f37fd2
ED
873/*
874 * called from sock_recv_timestamp() if sock_flag(sk, SOCK_RCVTSTAMP)
875 */
876void __sock_recv_timestamp(struct msghdr *msg, struct sock *sk,
877 struct sk_buff *skb)
878{
20d49473 879 int need_software_tstamp = sock_flag(sk, SOCK_RCVTSTAMP);
887feae3 880 int new_tstamp = sock_flag(sk, SOCK_TSTAMP_NEW);
9718475e 881 struct scm_timestamping_internal tss;
b50a5c70 882 int empty = 1, false_tstamp = 0;
20d49473
PO
883 struct skb_shared_hwtstamps *shhwtstamps =
884 skb_hwtstamps(skb);
97dc7cd9 885 int if_index;
007747a9 886 ktime_t hwtstamp;
e3390b30 887 u32 tsflags;
20d49473
PO
888
889 /* Race occurred between timestamp enabling and packet
890 receiving. Fill in the current time for now. */
b50a5c70 891 if (need_software_tstamp && skb->tstamp == 0) {
20d49473 892 __net_timestamp(skb);
b50a5c70
ML
893 false_tstamp = 1;
894 }
20d49473
PO
895
896 if (need_software_tstamp) {
897 if (!sock_flag(sk, SOCK_RCVTSTAMPNS)) {
887feae3
DD
898 if (new_tstamp) {
899 struct __kernel_sock_timeval tv;
900
901 skb_get_new_timestamp(skb, &tv);
902 put_cmsg(msg, SOL_SOCKET, SO_TIMESTAMP_NEW,
903 sizeof(tv), &tv);
904 } else {
905 struct __kernel_old_timeval tv;
906
907 skb_get_timestamp(skb, &tv);
908 put_cmsg(msg, SOL_SOCKET, SO_TIMESTAMP_OLD,
909 sizeof(tv), &tv);
910 }
20d49473 911 } else {
887feae3
DD
912 if (new_tstamp) {
913 struct __kernel_timespec ts;
914
915 skb_get_new_timestampns(skb, &ts);
916 put_cmsg(msg, SOL_SOCKET, SO_TIMESTAMPNS_NEW,
917 sizeof(ts), &ts);
918 } else {
df1b4ba9 919 struct __kernel_old_timespec ts;
887feae3
DD
920
921 skb_get_timestampns(skb, &ts);
922 put_cmsg(msg, SOL_SOCKET, SO_TIMESTAMPNS_OLD,
923 sizeof(ts), &ts);
924 }
20d49473
PO
925 }
926 }
927
f24b9be5 928 memset(&tss, 0, sizeof(tss));
e3390b30
ED
929 tsflags = READ_ONCE(sk->sk_tsflags);
930 if ((tsflags & SOF_TIMESTAMPING_SOFTWARE) &&
9718475e 931 ktime_to_timespec64_cond(skb->tstamp, tss.ts + 0))
20d49473 932 empty = 0;
4d276eb6 933 if (shhwtstamps &&
e3390b30 934 (tsflags & SOF_TIMESTAMPING_RAW_HARDWARE) &&
d7c08826 935 !skb_is_swtx_tstamp(skb, false_tstamp)) {
97dc7cd9
GE
936 if_index = 0;
937 if (skb_shinfo(skb)->tx_flags & SKBTX_HW_TSTAMP_NETDEV)
938 hwtstamp = get_timestamp(sk, skb, &if_index);
007747a9
ML
939 else
940 hwtstamp = shhwtstamps->hwtstamp;
d7c08826 941
e3390b30 942 if (tsflags & SOF_TIMESTAMPING_BIND_PHC)
97dc7cd9 943 hwtstamp = ptp_convert_timestamp(&hwtstamp,
251cd405 944 READ_ONCE(sk->sk_bind_phc));
97dc7cd9 945
007747a9 946 if (ktime_to_timespec64_cond(hwtstamp, tss.ts + 2)) {
d7c08826
YL
947 empty = 0;
948
e3390b30 949 if ((tsflags & SOF_TIMESTAMPING_OPT_PKTINFO) &&
d7c08826 950 !skb_is_err_queue(skb))
97dc7cd9 951 put_ts_pktinfo(msg, skb, if_index);
d7c08826 952 }
aad9c8c4 953 }
1c885808 954 if (!empty) {
9718475e
DD
955 if (sock_flag(sk, SOCK_TSTAMP_NEW))
956 put_cmsg_scm_timestamping64(msg, &tss);
957 else
958 put_cmsg_scm_timestamping(msg, &tss);
1c885808 959
8605330a 960 if (skb_is_err_queue(skb) && skb->len &&
4ef1b286 961 SKB_EXT_ERR(skb)->opt_stats)
1c885808
FY
962 put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMPING_OPT_STATS,
963 skb->len, skb->data);
964 }
92f37fd2 965}
7c81fd8b
ACM
966EXPORT_SYMBOL_GPL(__sock_recv_timestamp);
967
eb6fba75 968#ifdef CONFIG_WIRELESS
6e3e939f
JB
969void __sock_recv_wifi_status(struct msghdr *msg, struct sock *sk,
970 struct sk_buff *skb)
971{
972 int ack;
973
974 if (!sock_flag(sk, SOCK_WIFI_STATUS))
975 return;
976 if (!skb->wifi_acked_valid)
977 return;
978
979 ack = skb->wifi_acked;
980
981 put_cmsg(msg, SOL_SOCKET, SCM_WIFI_STATUS, sizeof(ack), &ack);
982}
983EXPORT_SYMBOL_GPL(__sock_recv_wifi_status);
eb6fba75 984#endif
6e3e939f 985
11165f14 986static inline void sock_recv_drops(struct msghdr *msg, struct sock *sk,
987 struct sk_buff *skb)
3b885787 988{
744d5a3e 989 if (sock_flag(sk, SOCK_RXQ_OVFL) && skb && SOCK_SKB_CB(skb)->dropcount)
3b885787 990 put_cmsg(msg, SOL_SOCKET, SO_RXQ_OVFL,
744d5a3e 991 sizeof(__u32), &SOCK_SKB_CB(skb)->dropcount);
3b885787
NH
992}
993
6fd1d51c
EM
994static void sock_recv_mark(struct msghdr *msg, struct sock *sk,
995 struct sk_buff *skb)
996{
2558b803
ED
997 if (sock_flag(sk, SOCK_RCVMARK) && skb) {
998 /* We must use a bounce buffer for CONFIG_HARDENED_USERCOPY=y */
999 __u32 mark = skb->mark;
1000
1001 put_cmsg(msg, SOL_SOCKET, SO_MARK, sizeof(__u32), &mark);
1002 }
6fd1d51c
EM
1003}
1004
1005void __sock_recv_cmsgs(struct msghdr *msg, struct sock *sk,
1006 struct sk_buff *skb)
3b885787
NH
1007{
1008 sock_recv_timestamp(msg, sk, skb);
1009 sock_recv_drops(msg, sk, skb);
6fd1d51c 1010 sock_recv_mark(msg, sk, skb);
3b885787 1011}
6fd1d51c 1012EXPORT_SYMBOL_GPL(__sock_recv_cmsgs);
3b885787 1013
8c3c447b 1014INDIRECT_CALLABLE_DECLARE(int inet_recvmsg(struct socket *, struct msghdr *,
a648a592
PA
1015 size_t, int));
1016INDIRECT_CALLABLE_DECLARE(int inet6_recvmsg(struct socket *, struct msghdr *,
1017 size_t, int));
6e6eda44
YC
1018
1019static noinline void call_trace_sock_recv_length(struct sock *sk, int ret, int flags)
1020{
1021 trace_sock_recv_length(sk, ret, flags);
1022}
1023
1b784140 1024static inline int sock_recvmsg_nosec(struct socket *sock, struct msghdr *msg,
2da62906 1025 int flags)
1da177e4 1026{
1ded5e5a
ED
1027 int ret = INDIRECT_CALL_INET(READ_ONCE(sock->ops)->recvmsg,
1028 inet6_recvmsg,
6e6eda44
YC
1029 inet_recvmsg, sock, msg,
1030 msg_data_left(msg), flags);
1031 if (trace_sock_recv_length_enabled())
1032 call_trace_sock_recv_length(sock->sk, ret, flags);
1033 return ret;
1da177e4
LT
1034}
1035
85806af0
RD
1036/**
1037 * sock_recvmsg - receive a message from @sock
1038 * @sock: socket
1039 * @msg: message to receive
1040 * @flags: message flags
1041 *
1042 * Receives @msg from @sock, passing through LSM. Returns the total number
1043 * of bytes received, or an error.
1044 */
2da62906 1045int sock_recvmsg(struct socket *sock, struct msghdr *msg, int flags)
a2e27255 1046{
2da62906 1047 int err = security_socket_recvmsg(sock, msg, msg_data_left(msg), flags);
a2e27255 1048
2da62906 1049 return err ?: sock_recvmsg_nosec(sock, msg, flags);
1da177e4 1050}
c6d409cf 1051EXPORT_SYMBOL(sock_recvmsg);
1da177e4 1052
c1249c0a 1053/**
8a3c245c
PT
1054 * kernel_recvmsg - Receive a message from a socket (kernel space)
1055 * @sock: The socket to receive the message from
1056 * @msg: Received message
1057 * @vec: Input s/g array for message data
1058 * @num: Size of input s/g array
1059 * @size: Number of bytes to read
1060 * @flags: Message flags (MSG_DONTWAIT, etc...)
c1249c0a 1061 *
8a3c245c
PT
1062 * On return the msg structure contains the scatter/gather array passed in the
1063 * vec argument. The array is modified so that it consists of the unfilled
1064 * portion of the original array.
c1249c0a 1065 *
8a3c245c 1066 * The returned value is the total number of bytes received, or an error.
c1249c0a 1067 */
8a3c245c 1068
89bddce5
SH
1069int kernel_recvmsg(struct socket *sock, struct msghdr *msg,
1070 struct kvec *vec, size_t num, size_t size, int flags)
1da177e4 1071{
1f466e1f 1072 msg->msg_control_is_user = false;
de4eda9d 1073 iov_iter_kvec(&msg->msg_iter, ITER_DEST, vec, num, size);
1f466e1f 1074 return sock_recvmsg(sock, msg, flags);
1da177e4 1075}
c6d409cf 1076EXPORT_SYMBOL(kernel_recvmsg);
1da177e4 1077
9c55e01c 1078static ssize_t sock_splice_read(struct file *file, loff_t *ppos,
c6d409cf 1079 struct pipe_inode_info *pipe, size_t len,
9c55e01c
JA
1080 unsigned int flags)
1081{
1082 struct socket *sock = file->private_data;
1ded5e5a 1083 const struct proto_ops *ops;
9c55e01c 1084
1ded5e5a
ED
1085 ops = READ_ONCE(sock->ops);
1086 if (unlikely(!ops->splice_read))
67178fd0 1087 return copy_splice_read(file, ppos, pipe, len, flags);
997b37da 1088
1ded5e5a 1089 return ops->splice_read(sock, ppos, pipe, len, flags);
9c55e01c
JA
1090}
1091
2bfc6685
DH
1092static void sock_splice_eof(struct file *file)
1093{
1094 struct socket *sock = file->private_data;
1ded5e5a 1095 const struct proto_ops *ops;
2bfc6685 1096
1ded5e5a
ED
1097 ops = READ_ONCE(sock->ops);
1098 if (ops->splice_eof)
1099 ops->splice_eof(sock);
2bfc6685
DH
1100}
1101
8ae5e030 1102static ssize_t sock_read_iter(struct kiocb *iocb, struct iov_iter *to)
ce1d4d3e 1103{
6d652330
AV
1104 struct file *file = iocb->ki_filp;
1105 struct socket *sock = file->private_data;
0345f931 1106 struct msghdr msg = {.msg_iter = *to,
1107 .msg_iocb = iocb};
8ae5e030 1108 ssize_t res;
ce1d4d3e 1109
ebfcd895 1110 if (file->f_flags & O_NONBLOCK || (iocb->ki_flags & IOCB_NOWAIT))
8ae5e030
AV
1111 msg.msg_flags = MSG_DONTWAIT;
1112
1113 if (iocb->ki_pos != 0)
1da177e4 1114 return -ESPIPE;
027445c3 1115
66ee59af 1116 if (!iov_iter_count(to)) /* Match SYS5 behaviour */
1da177e4
LT
1117 return 0;
1118
2da62906 1119 res = sock_recvmsg(sock, &msg, msg.msg_flags);
8ae5e030
AV
1120 *to = msg.msg_iter;
1121 return res;
1da177e4
LT
1122}
1123
8ae5e030 1124static ssize_t sock_write_iter(struct kiocb *iocb, struct iov_iter *from)
ce1d4d3e 1125{
6d652330
AV
1126 struct file *file = iocb->ki_filp;
1127 struct socket *sock = file->private_data;
0345f931 1128 struct msghdr msg = {.msg_iter = *from,
1129 .msg_iocb = iocb};
8ae5e030 1130 ssize_t res;
1da177e4 1131
8ae5e030 1132 if (iocb->ki_pos != 0)
ce1d4d3e 1133 return -ESPIPE;
027445c3 1134
ebfcd895 1135 if (file->f_flags & O_NONBLOCK || (iocb->ki_flags & IOCB_NOWAIT))
8ae5e030
AV
1136 msg.msg_flags = MSG_DONTWAIT;
1137
6d652330
AV
1138 if (sock->type == SOCK_SEQPACKET)
1139 msg.msg_flags |= MSG_EOR;
1140
d8725c86 1141 res = sock_sendmsg(sock, &msg);
8ae5e030
AV
1142 *from = msg.msg_iter;
1143 return res;
1da177e4
LT
1144}
1145
1da177e4
LT
1146/*
1147 * Atomic setting of ioctl hooks to avoid race
1148 * with module unload.
1149 */
1150
4a3e2f71 1151static DEFINE_MUTEX(br_ioctl_mutex);
ad2f99ae
AB
1152static int (*br_ioctl_hook)(struct net *net, struct net_bridge *br,
1153 unsigned int cmd, struct ifreq *ifr,
1154 void __user *uarg);
1da177e4 1155
ad2f99ae
AB
1156void brioctl_set(int (*hook)(struct net *net, struct net_bridge *br,
1157 unsigned int cmd, struct ifreq *ifr,
1158 void __user *uarg))
1da177e4 1159{
4a3e2f71 1160 mutex_lock(&br_ioctl_mutex);
1da177e4 1161 br_ioctl_hook = hook;
4a3e2f71 1162 mutex_unlock(&br_ioctl_mutex);
1da177e4
LT
1163}
1164EXPORT_SYMBOL(brioctl_set);
1165
ad2f99ae
AB
1166int br_ioctl_call(struct net *net, struct net_bridge *br, unsigned int cmd,
1167 struct ifreq *ifr, void __user *uarg)
1168{
1169 int err = -ENOPKG;
1170
1171 if (!br_ioctl_hook)
1172 request_module("bridge");
1173
1174 mutex_lock(&br_ioctl_mutex);
1175 if (br_ioctl_hook)
1176 err = br_ioctl_hook(net, br, cmd, ifr, uarg);
1177 mutex_unlock(&br_ioctl_mutex);
1178
1179 return err;
1180}
1181
4a3e2f71 1182static DEFINE_MUTEX(vlan_ioctl_mutex);
881d966b 1183static int (*vlan_ioctl_hook) (struct net *, void __user *arg);
1da177e4 1184
881d966b 1185void vlan_ioctl_set(int (*hook) (struct net *, void __user *))
1da177e4 1186{
4a3e2f71 1187 mutex_lock(&vlan_ioctl_mutex);
1da177e4 1188 vlan_ioctl_hook = hook;
4a3e2f71 1189 mutex_unlock(&vlan_ioctl_mutex);
1da177e4
LT
1190}
1191EXPORT_SYMBOL(vlan_ioctl_set);
1192
6b96018b 1193static long sock_do_ioctl(struct net *net, struct socket *sock,
63ff03ab 1194 unsigned int cmd, unsigned long arg)
6b96018b 1195{
1ded5e5a 1196 const struct proto_ops *ops = READ_ONCE(sock->ops);
876f0bf9
AB
1197 struct ifreq ifr;
1198 bool need_copyout;
6b96018b
AB
1199 int err;
1200 void __user *argp = (void __user *)arg;
a554bf96 1201 void __user *data;
6b96018b 1202
1ded5e5a 1203 err = ops->ioctl(sock, cmd, arg);
6b96018b
AB
1204
1205 /*
1206 * If this ioctl is unknown try to hand it down
1207 * to the NIC driver.
1208 */
36fd633e
AV
1209 if (err != -ENOIOCTLCMD)
1210 return err;
6b96018b 1211
29ce8f97
JK
1212 if (!is_socket_ioctl_cmd(cmd))
1213 return -ENOTTY;
1214
a554bf96 1215 if (get_user_ifreq(&ifr, &data, argp))
876f0bf9 1216 return -EFAULT;
a554bf96 1217 err = dev_ioctl(net, cmd, &ifr, data, &need_copyout);
876f0bf9 1218 if (!err && need_copyout)
a554bf96 1219 if (put_user_ifreq(&ifr, argp))
44c02a2c 1220 return -EFAULT;
876f0bf9 1221
6b96018b
AB
1222 return err;
1223}
1224
1da177e4
LT
1225/*
1226 * With an ioctl, arg may well be a user mode pointer, but we don't know
1227 * what to do with it - that's up to the protocol still.
1228 */
1229
1230static long sock_ioctl(struct file *file, unsigned cmd, unsigned long arg)
1231{
1ded5e5a 1232 const struct proto_ops *ops;
1da177e4 1233 struct socket *sock;
881d966b 1234 struct sock *sk;
1da177e4
LT
1235 void __user *argp = (void __user *)arg;
1236 int pid, err;
881d966b 1237 struct net *net;
1da177e4 1238
b69aee04 1239 sock = file->private_data;
1ded5e5a 1240 ops = READ_ONCE(sock->ops);
881d966b 1241 sk = sock->sk;
3b1e0a65 1242 net = sock_net(sk);
44c02a2c
AV
1243 if (unlikely(cmd >= SIOCDEVPRIVATE && cmd <= (SIOCDEVPRIVATE + 15))) {
1244 struct ifreq ifr;
a554bf96 1245 void __user *data;
44c02a2c 1246 bool need_copyout;
a554bf96 1247 if (get_user_ifreq(&ifr, &data, argp))
44c02a2c 1248 return -EFAULT;
a554bf96 1249 err = dev_ioctl(net, cmd, &ifr, data, &need_copyout);
44c02a2c 1250 if (!err && need_copyout)
a554bf96 1251 if (put_user_ifreq(&ifr, argp))
44c02a2c 1252 return -EFAULT;
1da177e4 1253 } else
3d23e349 1254#ifdef CONFIG_WEXT_CORE
1da177e4 1255 if (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST) {
b1b0c245 1256 err = wext_handle_ioctl(net, cmd, argp);
1da177e4 1257 } else
3d23e349 1258#endif
89bddce5 1259 switch (cmd) {
1da177e4
LT
1260 case FIOSETOWN:
1261 case SIOCSPGRP:
1262 err = -EFAULT;
1263 if (get_user(pid, (int __user *)argp))
1264 break;
393cc3f5 1265 err = f_setown(sock->file, pid, 1);
1da177e4
LT
1266 break;
1267 case FIOGETOWN:
1268 case SIOCGPGRP:
609d7fa9 1269 err = put_user(f_getown(sock->file),
89bddce5 1270 (int __user *)argp);
1da177e4
LT
1271 break;
1272 case SIOCGIFBR:
1273 case SIOCSIFBR:
1274 case SIOCBRADDBR:
1275 case SIOCBRDELBR:
ad2f99ae 1276 err = br_ioctl_call(net, NULL, cmd, NULL, argp);
1da177e4
LT
1277 break;
1278 case SIOCGIFVLAN:
1279 case SIOCSIFVLAN:
1280 err = -ENOPKG;
1281 if (!vlan_ioctl_hook)
1282 request_module("8021q");
1283
4a3e2f71 1284 mutex_lock(&vlan_ioctl_mutex);
1da177e4 1285 if (vlan_ioctl_hook)
881d966b 1286 err = vlan_ioctl_hook(net, argp);
4a3e2f71 1287 mutex_unlock(&vlan_ioctl_mutex);
1da177e4 1288 break;
c62cce2c
AV
1289 case SIOCGSKNS:
1290 err = -EPERM;
1291 if (!ns_capable(net->user_ns, CAP_NET_ADMIN))
1292 break;
1293
1294 err = open_related_ns(&net->ns, get_net_ns);
1295 break;
0768e170
AB
1296 case SIOCGSTAMP_OLD:
1297 case SIOCGSTAMPNS_OLD:
1ded5e5a 1298 if (!ops->gettstamp) {
c7cbdbf2
AB
1299 err = -ENOIOCTLCMD;
1300 break;
1301 }
1ded5e5a
ED
1302 err = ops->gettstamp(sock, argp,
1303 cmd == SIOCGSTAMP_OLD,
1304 !IS_ENABLED(CONFIG_64BIT));
60747828 1305 break;
0768e170
AB
1306 case SIOCGSTAMP_NEW:
1307 case SIOCGSTAMPNS_NEW:
1ded5e5a 1308 if (!ops->gettstamp) {
0768e170
AB
1309 err = -ENOIOCTLCMD;
1310 break;
1311 }
1ded5e5a
ED
1312 err = ops->gettstamp(sock, argp,
1313 cmd == SIOCGSTAMP_NEW,
1314 false);
c7cbdbf2 1315 break;
876f0bf9
AB
1316
1317 case SIOCGIFCONF:
1318 err = dev_ifconf(net, argp);
1319 break;
1320
1da177e4 1321 default:
63ff03ab 1322 err = sock_do_ioctl(net, sock, cmd, arg);
1da177e4 1323 break;
89bddce5 1324 }
1da177e4
LT
1325 return err;
1326}
1327
8a3c245c
PT
1328/**
1329 * sock_create_lite - creates a socket
1330 * @family: protocol family (AF_INET, ...)
1331 * @type: communication type (SOCK_STREAM, ...)
1332 * @protocol: protocol (0, ...)
1333 * @res: new socket
1334 *
1335 * Creates a new socket and assigns it to @res, passing through LSM.
1336 * The new socket initialization is not complete, see kernel_accept().
1337 * Returns 0 or an error. On failure @res is set to %NULL.
1338 * This function internally uses GFP_KERNEL.
1339 */
1340
1da177e4
LT
1341int sock_create_lite(int family, int type, int protocol, struct socket **res)
1342{
1343 int err;
1344 struct socket *sock = NULL;
89bddce5 1345
1da177e4
LT
1346 err = security_socket_create(family, type, protocol, 1);
1347 if (err)
1348 goto out;
1349
1350 sock = sock_alloc();
1351 if (!sock) {
1352 err = -ENOMEM;
1353 goto out;
1354 }
1355
1da177e4 1356 sock->type = type;
7420ed23
VY
1357 err = security_socket_post_create(sock, family, type, protocol, 1);
1358 if (err)
1359 goto out_release;
1360
1da177e4
LT
1361out:
1362 *res = sock;
1363 return err;
7420ed23
VY
1364out_release:
1365 sock_release(sock);
1366 sock = NULL;
1367 goto out;
1da177e4 1368}
c6d409cf 1369EXPORT_SYMBOL(sock_create_lite);
1da177e4
LT
1370
1371/* No kernel lock held - perfect */
ade994f4 1372static __poll_t sock_poll(struct file *file, poll_table *wait)
1da177e4 1373{
3cafb376 1374 struct socket *sock = file->private_data;
1ded5e5a 1375 const struct proto_ops *ops = READ_ONCE(sock->ops);
a331de3b 1376 __poll_t events = poll_requested_events(wait), flag = 0;
2d48d67f 1377
1ded5e5a 1378 if (!ops->poll)
e88958e6 1379 return 0;
f641f13b 1380
a331de3b
CH
1381 if (sk_can_busy_loop(sock->sk)) {
1382 /* poll once if requested by the syscall */
1383 if (events & POLL_BUSY_LOOP)
1384 sk_busy_loop(sock->sk, 1);
1385
1386 /* if this socket can poll_ll, tell the system call */
1387 flag = POLL_BUSY_LOOP;
1388 }
1389
1ded5e5a 1390 return ops->poll(file, sock, wait) | flag;
1da177e4
LT
1391}
1392
89bddce5 1393static int sock_mmap(struct file *file, struct vm_area_struct *vma)
1da177e4 1394{
b69aee04 1395 struct socket *sock = file->private_data;
1da177e4 1396
1ded5e5a 1397 return READ_ONCE(sock->ops)->mmap(file, sock, vma);
1da177e4
LT
1398}
1399
20380731 1400static int sock_close(struct inode *inode, struct file *filp)
1da177e4 1401{
6d8c50dc 1402 __sock_release(SOCKET_I(inode), inode);
1da177e4
LT
1403 return 0;
1404}
1405
1406/*
1407 * Update the socket async list
1408 *
1409 * Fasync_list locking strategy.
1410 *
1411 * 1. fasync_list is modified only under process context socket lock
1412 * i.e. under semaphore.
1413 * 2. fasync_list is used under read_lock(&sk->sk_callback_lock)
989a2979 1414 * or under socket lock
1da177e4
LT
1415 */
1416
1417static int sock_fasync(int fd, struct file *filp, int on)
1418{
989a2979
ED
1419 struct socket *sock = filp->private_data;
1420 struct sock *sk = sock->sk;
333f7909 1421 struct socket_wq *wq = &sock->wq;
1da177e4 1422
989a2979 1423 if (sk == NULL)
1da177e4 1424 return -EINVAL;
1da177e4
LT
1425
1426 lock_sock(sk);
eaefd110 1427 fasync_helper(fd, filp, on, &wq->fasync_list);
1da177e4 1428
eaefd110 1429 if (!wq->fasync_list)
989a2979
ED
1430 sock_reset_flag(sk, SOCK_FASYNC);
1431 else
bcdce719 1432 sock_set_flag(sk, SOCK_FASYNC);
1da177e4 1433
989a2979 1434 release_sock(sk);
1da177e4
LT
1435 return 0;
1436}
1437
ceb5d58b 1438/* This function may be called only under rcu_lock */
1da177e4 1439
ceb5d58b 1440int sock_wake_async(struct socket_wq *wq, int how, int band)
1da177e4 1441{
ceb5d58b 1442 if (!wq || !wq->fasync_list)
1da177e4 1443 return -1;
ceb5d58b 1444
89bddce5 1445 switch (how) {
8d8ad9d7 1446 case SOCK_WAKE_WAITD:
ceb5d58b 1447 if (test_bit(SOCKWQ_ASYNC_WAITDATA, &wq->flags))
1da177e4
LT
1448 break;
1449 goto call_kill;
8d8ad9d7 1450 case SOCK_WAKE_SPACE:
ceb5d58b 1451 if (!test_and_clear_bit(SOCKWQ_ASYNC_NOSPACE, &wq->flags))
1da177e4 1452 break;
7c7ab580 1453 fallthrough;
8d8ad9d7 1454 case SOCK_WAKE_IO:
89bddce5 1455call_kill:
43815482 1456 kill_fasync(&wq->fasync_list, SIGIO, band);
1da177e4 1457 break;
8d8ad9d7 1458 case SOCK_WAKE_URG:
43815482 1459 kill_fasync(&wq->fasync_list, SIGURG, band);
1da177e4 1460 }
ceb5d58b 1461
1da177e4
LT
1462 return 0;
1463}
c6d409cf 1464EXPORT_SYMBOL(sock_wake_async);
1da177e4 1465
8a3c245c
PT
1466/**
1467 * __sock_create - creates a socket
1468 * @net: net namespace
1469 * @family: protocol family (AF_INET, ...)
1470 * @type: communication type (SOCK_STREAM, ...)
1471 * @protocol: protocol (0, ...)
1472 * @res: new socket
1473 * @kern: boolean for kernel space sockets
1474 *
1475 * Creates a new socket and assigns it to @res, passing through LSM.
1476 * Returns 0 or an error. On failure @res is set to %NULL. @kern must
1477 * be set to true if the socket resides in kernel space.
1478 * This function internally uses GFP_KERNEL.
1479 */
1480
721db93a 1481int __sock_create(struct net *net, int family, int type, int protocol,
89bddce5 1482 struct socket **res, int kern)
1da177e4
LT
1483{
1484 int err;
1485 struct socket *sock;
55737fda 1486 const struct net_proto_family *pf;
1da177e4
LT
1487
1488 /*
89bddce5 1489 * Check protocol is in range
1da177e4
LT
1490 */
1491 if (family < 0 || family >= NPROTO)
1492 return -EAFNOSUPPORT;
1493 if (type < 0 || type >= SOCK_MAX)
1494 return -EINVAL;
1495
1496 /* Compatibility.
1497
1498 This uglymoron is moved from INET layer to here to avoid
1499 deadlock in module load.
1500 */
1501 if (family == PF_INET && type == SOCK_PACKET) {
f3c98690 1502 pr_info_once("%s uses obsolete (PF_INET,SOCK_PACKET)\n",
1503 current->comm);
1da177e4
LT
1504 family = PF_PACKET;
1505 }
1506
1507 err = security_socket_create(family, type, protocol, kern);
1508 if (err)
1509 return err;
89bddce5 1510
55737fda
SH
1511 /*
1512 * Allocate the socket and allow the family to set things up. if
1513 * the protocol is 0, the family is instructed to select an appropriate
1514 * default.
1515 */
1516 sock = sock_alloc();
1517 if (!sock) {
e87cc472 1518 net_warn_ratelimited("socket: no more sockets\n");
55737fda
SH
1519 return -ENFILE; /* Not exactly a match, but its the
1520 closest posix thing */
1521 }
1522
1523 sock->type = type;
1524
95a5afca 1525#ifdef CONFIG_MODULES
89bddce5
SH
1526 /* Attempt to load a protocol module if the find failed.
1527 *
1528 * 12/09/1996 Marcin: But! this makes REALLY only sense, if the user
1da177e4
LT
1529 * requested real, full-featured networking support upon configuration.
1530 * Otherwise module support will break!
1531 */
190683a9 1532 if (rcu_access_pointer(net_families[family]) == NULL)
89bddce5 1533 request_module("net-pf-%d", family);
1da177e4
LT
1534#endif
1535
55737fda
SH
1536 rcu_read_lock();
1537 pf = rcu_dereference(net_families[family]);
1538 err = -EAFNOSUPPORT;
1539 if (!pf)
1540 goto out_release;
1da177e4
LT
1541
1542 /*
1543 * We will call the ->create function, that possibly is in a loadable
1544 * module, so we have to bump that loadable module refcnt first.
1545 */
55737fda 1546 if (!try_module_get(pf->owner))
1da177e4
LT
1547 goto out_release;
1548
55737fda
SH
1549 /* Now protected by module ref count */
1550 rcu_read_unlock();
1551
3f378b68 1552 err = pf->create(net, sock, protocol, kern);
55737fda 1553 if (err < 0)
1da177e4 1554 goto out_module_put;
a79af59e 1555
1da177e4
LT
1556 /*
1557 * Now to bump the refcnt of the [loadable] module that owns this
1558 * socket at sock_release time we decrement its refcnt.
1559 */
55737fda
SH
1560 if (!try_module_get(sock->ops->owner))
1561 goto out_module_busy;
1562
1da177e4
LT
1563 /*
1564 * Now that we're done with the ->create function, the [loadable]
1565 * module can have its refcnt decremented
1566 */
55737fda 1567 module_put(pf->owner);
7420ed23
VY
1568 err = security_socket_post_create(sock, family, type, protocol, kern);
1569 if (err)
3b185525 1570 goto out_sock_release;
55737fda 1571 *res = sock;
1da177e4 1572
55737fda
SH
1573 return 0;
1574
1575out_module_busy:
1576 err = -EAFNOSUPPORT;
1da177e4 1577out_module_put:
55737fda
SH
1578 sock->ops = NULL;
1579 module_put(pf->owner);
1580out_sock_release:
1da177e4 1581 sock_release(sock);
55737fda
SH
1582 return err;
1583
1584out_release:
1585 rcu_read_unlock();
1586 goto out_sock_release;
1da177e4 1587}
721db93a 1588EXPORT_SYMBOL(__sock_create);
1da177e4 1589
8a3c245c
PT
1590/**
1591 * sock_create - creates a socket
1592 * @family: protocol family (AF_INET, ...)
1593 * @type: communication type (SOCK_STREAM, ...)
1594 * @protocol: protocol (0, ...)
1595 * @res: new socket
1596 *
1597 * A wrapper around __sock_create().
1598 * Returns 0 or an error. This function internally uses GFP_KERNEL.
1599 */
1600
1da177e4
LT
1601int sock_create(int family, int type, int protocol, struct socket **res)
1602{
1b8d7ae4 1603 return __sock_create(current->nsproxy->net_ns, family, type, protocol, res, 0);
1da177e4 1604}
c6d409cf 1605EXPORT_SYMBOL(sock_create);
1da177e4 1606
8a3c245c
PT
1607/**
1608 * sock_create_kern - creates a socket (kernel space)
1609 * @net: net namespace
1610 * @family: protocol family (AF_INET, ...)
1611 * @type: communication type (SOCK_STREAM, ...)
1612 * @protocol: protocol (0, ...)
1613 * @res: new socket
1614 *
1615 * A wrapper around __sock_create().
1616 * Returns 0 or an error. This function internally uses GFP_KERNEL.
1617 */
1618
eeb1bd5c 1619int sock_create_kern(struct net *net, int family, int type, int protocol, struct socket **res)
1da177e4 1620{
eeb1bd5c 1621 return __sock_create(net, family, type, protocol, res, 1);
1da177e4 1622}
c6d409cf 1623EXPORT_SYMBOL(sock_create_kern);
1da177e4 1624
da214a47 1625static struct socket *__sys_socket_create(int family, int type, int protocol)
1da177e4 1626{
1da177e4 1627 struct socket *sock;
da214a47 1628 int retval;
a677a039 1629
e38b36f3
UD
1630 /* Check the SOCK_* constants for consistency. */
1631 BUILD_BUG_ON(SOCK_CLOEXEC != O_CLOEXEC);
1632 BUILD_BUG_ON((SOCK_MAX | SOCK_TYPE_MASK) != SOCK_TYPE_MASK);
1633 BUILD_BUG_ON(SOCK_CLOEXEC & SOCK_TYPE_MASK);
1634 BUILD_BUG_ON(SOCK_NONBLOCK & SOCK_TYPE_MASK);
1635
da214a47
JA
1636 if ((type & ~SOCK_TYPE_MASK) & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
1637 return ERR_PTR(-EINVAL);
a677a039 1638 type &= SOCK_TYPE_MASK;
1da177e4 1639
da214a47
JA
1640 retval = sock_create(family, type, protocol, &sock);
1641 if (retval < 0)
1642 return ERR_PTR(retval);
1643
1644 return sock;
1645}
1646
1647struct file *__sys_socket_file(int family, int type, int protocol)
1648{
1649 struct socket *sock;
da214a47
JA
1650 int flags;
1651
1652 sock = __sys_socket_create(family, type, protocol);
1653 if (IS_ERR(sock))
1654 return ERR_CAST(sock);
1655
1656 flags = type & ~SOCK_TYPE_MASK;
aaca0bdc
UD
1657 if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
1658 flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
1659
649c15c7 1660 return sock_alloc_file(sock, flags, NULL);
da214a47
JA
1661}
1662
0dd061a6
GT
1663/* A hook for bpf progs to attach to and update socket protocol.
1664 *
1665 * A static noinline declaration here could cause the compiler to
1666 * optimize away the function. A global noinline declaration will
1667 * keep the definition, but may optimize away the callsite.
1668 * Therefore, __weak is needed to ensure that the call is still
1669 * emitted, by telling the compiler that we don't know what the
1670 * function might eventually be.
1671 *
1672 * __diag_* below are needed to dismiss the missing prototype warning.
1673 */
1674
1675__diag_push();
1676__diag_ignore_all("-Wmissing-prototypes",
1677 "A fmod_ret entry point for BPF programs");
1678
1679__weak noinline int update_socket_protocol(int family, int type, int protocol)
1680{
1681 return protocol;
1682}
1683
1684__diag_pop();
1685
da214a47
JA
1686int __sys_socket(int family, int type, int protocol)
1687{
1688 struct socket *sock;
1689 int flags;
1690
0dd061a6
GT
1691 sock = __sys_socket_create(family, type,
1692 update_socket_protocol(family, type, protocol));
da214a47
JA
1693 if (IS_ERR(sock))
1694 return PTR_ERR(sock);
1695
1696 flags = type & ~SOCK_TYPE_MASK;
1697 if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
1698 flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
1da177e4 1699
8e1611e2 1700 return sock_map_fd(sock, flags & (O_CLOEXEC | O_NONBLOCK));
1da177e4
LT
1701}
1702
9d6a15c3
DB
1703SYSCALL_DEFINE3(socket, int, family, int, type, int, protocol)
1704{
1705 return __sys_socket(family, type, protocol);
1706}
1707
1da177e4
LT
1708/*
1709 * Create a pair of connected sockets.
1710 */
1711
6debc8d8 1712int __sys_socketpair(int family, int type, int protocol, int __user *usockvec)
1da177e4
LT
1713{
1714 struct socket *sock1, *sock2;
1715 int fd1, fd2, err;
db349509 1716 struct file *newfile1, *newfile2;
a677a039
UD
1717 int flags;
1718
1719 flags = type & ~SOCK_TYPE_MASK;
77d27200 1720 if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
a677a039
UD
1721 return -EINVAL;
1722 type &= SOCK_TYPE_MASK;
1da177e4 1723
aaca0bdc
UD
1724 if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
1725 flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
1726
016a266b
AV
1727 /*
1728 * reserve descriptors and make sure we won't fail
1729 * to return them to userland.
1730 */
1731 fd1 = get_unused_fd_flags(flags);
1732 if (unlikely(fd1 < 0))
1733 return fd1;
1734
1735 fd2 = get_unused_fd_flags(flags);
1736 if (unlikely(fd2 < 0)) {
1737 put_unused_fd(fd1);
1738 return fd2;
1739 }
1740
1741 err = put_user(fd1, &usockvec[0]);
1742 if (err)
1743 goto out;
1744
1745 err = put_user(fd2, &usockvec[1]);
1746 if (err)
1747 goto out;
1748
1da177e4
LT
1749 /*
1750 * Obtain the first socket and check if the underlying protocol
1751 * supports the socketpair call.
1752 */
1753
1754 err = sock_create(family, type, protocol, &sock1);
016a266b 1755 if (unlikely(err < 0))
1da177e4
LT
1756 goto out;
1757
1758 err = sock_create(family, type, protocol, &sock2);
016a266b
AV
1759 if (unlikely(err < 0)) {
1760 sock_release(sock1);
1761 goto out;
bf3c23d1 1762 }
d73aa286 1763
d47cd945
DH
1764 err = security_socket_socketpair(sock1, sock2);
1765 if (unlikely(err)) {
1766 sock_release(sock2);
1767 sock_release(sock1);
1768 goto out;
1769 }
1770
1ded5e5a 1771 err = READ_ONCE(sock1->ops)->socketpair(sock1, sock2);
016a266b
AV
1772 if (unlikely(err < 0)) {
1773 sock_release(sock2);
1774 sock_release(sock1);
1775 goto out;
28407630
AV
1776 }
1777
aab174f0 1778 newfile1 = sock_alloc_file(sock1, flags, NULL);
b5ffe634 1779 if (IS_ERR(newfile1)) {
28407630 1780 err = PTR_ERR(newfile1);
016a266b
AV
1781 sock_release(sock2);
1782 goto out;
28407630
AV
1783 }
1784
aab174f0 1785 newfile2 = sock_alloc_file(sock2, flags, NULL);
28407630
AV
1786 if (IS_ERR(newfile2)) {
1787 err = PTR_ERR(newfile2);
016a266b
AV
1788 fput(newfile1);
1789 goto out;
db349509
AV
1790 }
1791
157cf649 1792 audit_fd_pair(fd1, fd2);
d73aa286 1793
db349509
AV
1794 fd_install(fd1, newfile1);
1795 fd_install(fd2, newfile2);
d73aa286 1796 return 0;
1da177e4 1797
016a266b 1798out:
d73aa286 1799 put_unused_fd(fd2);
d73aa286 1800 put_unused_fd(fd1);
1da177e4
LT
1801 return err;
1802}
1803
6debc8d8
DB
1804SYSCALL_DEFINE4(socketpair, int, family, int, type, int, protocol,
1805 int __user *, usockvec)
1806{
1807 return __sys_socketpair(family, type, protocol, usockvec);
1808}
1809
1da177e4
LT
1810/*
1811 * Bind a name to a socket. Nothing much to do here since it's
1812 * the protocol's responsibility to handle the local address.
1813 *
1814 * We move the socket address to kernel space before we call
1815 * the protocol layer (having also checked the address is ok).
1816 */
1817
a87d35d8 1818int __sys_bind(int fd, struct sockaddr __user *umyaddr, int addrlen)
1da177e4
LT
1819{
1820 struct socket *sock;
230b1839 1821 struct sockaddr_storage address;
6cb153ca 1822 int err, fput_needed;
1da177e4 1823
89bddce5 1824 sock = sockfd_lookup_light(fd, &err, &fput_needed);
e71a4783 1825 if (sock) {
43db362d 1826 err = move_addr_to_kernel(umyaddr, addrlen, &address);
068b88cc 1827 if (!err) {
89bddce5 1828 err = security_socket_bind(sock,
230b1839 1829 (struct sockaddr *)&address,
89bddce5 1830 addrlen);
6cb153ca 1831 if (!err)
1ded5e5a 1832 err = READ_ONCE(sock->ops)->bind(sock,
89bddce5 1833 (struct sockaddr *)
230b1839 1834 &address, addrlen);
1da177e4 1835 }
6cb153ca 1836 fput_light(sock->file, fput_needed);
89bddce5 1837 }
1da177e4
LT
1838 return err;
1839}
1840
a87d35d8
DB
1841SYSCALL_DEFINE3(bind, int, fd, struct sockaddr __user *, umyaddr, int, addrlen)
1842{
1843 return __sys_bind(fd, umyaddr, addrlen);
1844}
1845
1da177e4
LT
1846/*
1847 * Perform a listen. Basically, we allow the protocol to do anything
1848 * necessary for a listen, and if that works, we mark the socket as
1849 * ready for listening.
1850 */
1851
25e290ee 1852int __sys_listen(int fd, int backlog)
1da177e4
LT
1853{
1854 struct socket *sock;
6cb153ca 1855 int err, fput_needed;
b8e1f9b5 1856 int somaxconn;
89bddce5
SH
1857
1858 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1859 if (sock) {
3c9ba81d 1860 somaxconn = READ_ONCE(sock_net(sock->sk)->core.sysctl_somaxconn);
95c96174 1861 if ((unsigned int)backlog > somaxconn)
b8e1f9b5 1862 backlog = somaxconn;
1da177e4
LT
1863
1864 err = security_socket_listen(sock, backlog);
6cb153ca 1865 if (!err)
1ded5e5a 1866 err = READ_ONCE(sock->ops)->listen(sock, backlog);
1da177e4 1867
6cb153ca 1868 fput_light(sock->file, fput_needed);
1da177e4
LT
1869 }
1870 return err;
1871}
1872
25e290ee
DB
1873SYSCALL_DEFINE2(listen, int, fd, int, backlog)
1874{
1875 return __sys_listen(fd, backlog);
1876}
1877
d32f89da 1878struct file *do_accept(struct file *file, unsigned file_flags,
de2ea4b6 1879 struct sockaddr __user *upeer_sockaddr,
d32f89da 1880 int __user *upeer_addrlen, int flags)
1da177e4
LT
1881{
1882 struct socket *sock, *newsock;
39d8c1b6 1883 struct file *newfile;
d32f89da 1884 int err, len;
230b1839 1885 struct sockaddr_storage address;
1ded5e5a 1886 const struct proto_ops *ops;
1da177e4 1887
dba4a925 1888 sock = sock_from_file(file);
d32f89da
PB
1889 if (!sock)
1890 return ERR_PTR(-ENOTSOCK);
1da177e4 1891
c6d409cf
ED
1892 newsock = sock_alloc();
1893 if (!newsock)
d32f89da 1894 return ERR_PTR(-ENFILE);
1ded5e5a 1895 ops = READ_ONCE(sock->ops);
1da177e4
LT
1896
1897 newsock->type = sock->type;
1ded5e5a 1898 newsock->ops = ops;
1da177e4 1899
1da177e4
LT
1900 /*
1901 * We don't need try_module_get here, as the listening socket (sock)
1902 * has the protocol module (sock->ops->owner) held.
1903 */
1ded5e5a 1904 __module_get(ops->owner);
1da177e4 1905
aab174f0 1906 newfile = sock_alloc_file(newsock, flags, sock->sk->sk_prot_creator->name);
d32f89da
PB
1907 if (IS_ERR(newfile))
1908 return newfile;
39d8c1b6 1909
a79af59e
FF
1910 err = security_socket_accept(sock, newsock);
1911 if (err)
39d8c1b6 1912 goto out_fd;
a79af59e 1913
1ded5e5a 1914 err = ops->accept(sock, newsock, sock->file->f_flags | file_flags,
de2ea4b6 1915 false);
1da177e4 1916 if (err < 0)
39d8c1b6 1917 goto out_fd;
1da177e4
LT
1918
1919 if (upeer_sockaddr) {
1ded5e5a 1920 len = ops->getname(newsock, (struct sockaddr *)&address, 2);
9b2c45d4 1921 if (len < 0) {
1da177e4 1922 err = -ECONNABORTED;
39d8c1b6 1923 goto out_fd;
1da177e4 1924 }
43db362d 1925 err = move_addr_to_user(&address,
230b1839 1926 len, upeer_sockaddr, upeer_addrlen);
1da177e4 1927 if (err < 0)
39d8c1b6 1928 goto out_fd;
1da177e4
LT
1929 }
1930
1931 /* File flags are not inherited via accept() unlike another OSes. */
d32f89da 1932 return newfile;
39d8c1b6 1933out_fd:
9606a216 1934 fput(newfile);
d32f89da
PB
1935 return ERR_PTR(err);
1936}
1937
c0424532
YD
1938static int __sys_accept4_file(struct file *file, struct sockaddr __user *upeer_sockaddr,
1939 int __user *upeer_addrlen, int flags)
d32f89da
PB
1940{
1941 struct file *newfile;
1942 int newfd;
1943
1944 if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
1945 return -EINVAL;
1946
1947 if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
1948 flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
de2ea4b6 1949
c0424532 1950 newfd = get_unused_fd_flags(flags);
d32f89da
PB
1951 if (unlikely(newfd < 0))
1952 return newfd;
1953
c0424532 1954 newfile = do_accept(file, 0, upeer_sockaddr, upeer_addrlen,
d32f89da
PB
1955 flags);
1956 if (IS_ERR(newfile)) {
1957 put_unused_fd(newfd);
1958 return PTR_ERR(newfile);
1959 }
1960 fd_install(newfd, newfile);
1961 return newfd;
de2ea4b6
JA
1962}
1963
1964/*
1965 * For accept, we attempt to create a new socket, set up the link
1966 * with the client, wake up the client, then return the new
1967 * connected fd. We collect the address of the connector in kernel
1968 * space and move it to user at the very end. This is unclean because
1969 * we open the socket then return an error.
1970 *
1971 * 1003.1g adds the ability to recvmsg() to query connection pending
1972 * status to recvmsg. We need to add that support in a way thats
1973 * clean when we restructure accept also.
1974 */
1975
1976int __sys_accept4(int fd, struct sockaddr __user *upeer_sockaddr,
1977 int __user *upeer_addrlen, int flags)
1978{
1979 int ret = -EBADF;
1980 struct fd f;
1981
1982 f = fdget(fd);
1983 if (f.file) {
c0424532
YD
1984 ret = __sys_accept4_file(f.file, upeer_sockaddr,
1985 upeer_addrlen, flags);
6b07edeb 1986 fdput(f);
de2ea4b6
JA
1987 }
1988
1989 return ret;
1da177e4
LT
1990}
1991
4541e805
DB
1992SYSCALL_DEFINE4(accept4, int, fd, struct sockaddr __user *, upeer_sockaddr,
1993 int __user *, upeer_addrlen, int, flags)
1994{
1995 return __sys_accept4(fd, upeer_sockaddr, upeer_addrlen, flags);
1996}
1997
20f37034
HC
1998SYSCALL_DEFINE3(accept, int, fd, struct sockaddr __user *, upeer_sockaddr,
1999 int __user *, upeer_addrlen)
aaca0bdc 2000{
4541e805 2001 return __sys_accept4(fd, upeer_sockaddr, upeer_addrlen, 0);
aaca0bdc
UD
2002}
2003
1da177e4
LT
2004/*
2005 * Attempt to connect to a socket with the server address. The address
2006 * is in user space so we verify it is OK and move it to kernel space.
2007 *
2008 * For 1003.1g we need to add clean support for a bind to AF_UNSPEC to
2009 * break bindings
2010 *
2011 * NOTE: 1003.1g draft 6.3 is broken with respect to AX.25/NetROM and
2012 * other SEQPACKET protocols that take time to connect() as it doesn't
2013 * include the -EINPROGRESS status for such sockets.
2014 */
2015
f499a021 2016int __sys_connect_file(struct file *file, struct sockaddr_storage *address,
bd3ded31 2017 int addrlen, int file_flags)
1da177e4
LT
2018{
2019 struct socket *sock;
bd3ded31 2020 int err;
1da177e4 2021
dba4a925
FR
2022 sock = sock_from_file(file);
2023 if (!sock) {
2024 err = -ENOTSOCK;
1da177e4 2025 goto out;
dba4a925 2026 }
1da177e4 2027
89bddce5 2028 err =
f499a021 2029 security_socket_connect(sock, (struct sockaddr *)address, addrlen);
1da177e4 2030 if (err)
bd3ded31 2031 goto out;
1da177e4 2032
1ded5e5a
ED
2033 err = READ_ONCE(sock->ops)->connect(sock, (struct sockaddr *)address,
2034 addrlen, sock->file->f_flags | file_flags);
1da177e4
LT
2035out:
2036 return err;
2037}
2038
bd3ded31
JA
2039int __sys_connect(int fd, struct sockaddr __user *uservaddr, int addrlen)
2040{
2041 int ret = -EBADF;
2042 struct fd f;
2043
2044 f = fdget(fd);
2045 if (f.file) {
f499a021
JA
2046 struct sockaddr_storage address;
2047
2048 ret = move_addr_to_kernel(uservaddr, addrlen, &address);
2049 if (!ret)
2050 ret = __sys_connect_file(f.file, &address, addrlen, 0);
6b07edeb 2051 fdput(f);
bd3ded31
JA
2052 }
2053
2054 return ret;
2055}
2056
1387c2c2
DB
2057SYSCALL_DEFINE3(connect, int, fd, struct sockaddr __user *, uservaddr,
2058 int, addrlen)
2059{
2060 return __sys_connect(fd, uservaddr, addrlen);
2061}
2062
1da177e4
LT
2063/*
2064 * Get the local address ('name') of a socket object. Move the obtained
2065 * name to user space.
2066 */
2067
8882a107
DB
2068int __sys_getsockname(int fd, struct sockaddr __user *usockaddr,
2069 int __user *usockaddr_len)
1da177e4
LT
2070{
2071 struct socket *sock;
230b1839 2072 struct sockaddr_storage address;
9b2c45d4 2073 int err, fput_needed;
89bddce5 2074
6cb153ca 2075 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4
LT
2076 if (!sock)
2077 goto out;
2078
2079 err = security_socket_getsockname(sock);
2080 if (err)
2081 goto out_put;
2082
1ded5e5a 2083 err = READ_ONCE(sock->ops)->getname(sock, (struct sockaddr *)&address, 0);
9b2c45d4 2084 if (err < 0)
1da177e4 2085 goto out_put;
e44ef1d4 2086 /* "err" is actually length in this case */
9b2c45d4 2087 err = move_addr_to_user(&address, err, usockaddr, usockaddr_len);
1da177e4
LT
2088
2089out_put:
6cb153ca 2090 fput_light(sock->file, fput_needed);
1da177e4
LT
2091out:
2092 return err;
2093}
2094
8882a107
DB
2095SYSCALL_DEFINE3(getsockname, int, fd, struct sockaddr __user *, usockaddr,
2096 int __user *, usockaddr_len)
2097{
2098 return __sys_getsockname(fd, usockaddr, usockaddr_len);
2099}
2100
1da177e4
LT
2101/*
2102 * Get the remote address ('name') of a socket object. Move the obtained
2103 * name to user space.
2104 */
2105
b21c8f83
DB
2106int __sys_getpeername(int fd, struct sockaddr __user *usockaddr,
2107 int __user *usockaddr_len)
1da177e4
LT
2108{
2109 struct socket *sock;
230b1839 2110 struct sockaddr_storage address;
9b2c45d4 2111 int err, fput_needed;
1da177e4 2112
89bddce5
SH
2113 sock = sockfd_lookup_light(fd, &err, &fput_needed);
2114 if (sock != NULL) {
1ded5e5a
ED
2115 const struct proto_ops *ops = READ_ONCE(sock->ops);
2116
1da177e4
LT
2117 err = security_socket_getpeername(sock);
2118 if (err) {
6cb153ca 2119 fput_light(sock->file, fput_needed);
1da177e4
LT
2120 return err;
2121 }
2122
1ded5e5a 2123 err = ops->getname(sock, (struct sockaddr *)&address, 1);
9b2c45d4
DV
2124 if (err >= 0)
2125 /* "err" is actually length in this case */
2126 err = move_addr_to_user(&address, err, usockaddr,
89bddce5 2127 usockaddr_len);
6cb153ca 2128 fput_light(sock->file, fput_needed);
1da177e4
LT
2129 }
2130 return err;
2131}
2132
b21c8f83
DB
2133SYSCALL_DEFINE3(getpeername, int, fd, struct sockaddr __user *, usockaddr,
2134 int __user *, usockaddr_len)
2135{
2136 return __sys_getpeername(fd, usockaddr, usockaddr_len);
2137}
2138
1da177e4
LT
2139/*
2140 * Send a datagram to a given address. We move the address into kernel
2141 * space and check the user space data area is readable before invoking
2142 * the protocol.
2143 */
211b634b
DB
2144int __sys_sendto(int fd, void __user *buff, size_t len, unsigned int flags,
2145 struct sockaddr __user *addr, int addr_len)
1da177e4
LT
2146{
2147 struct socket *sock;
230b1839 2148 struct sockaddr_storage address;
1da177e4
LT
2149 int err;
2150 struct msghdr msg;
2151 struct iovec iov;
6cb153ca 2152 int fput_needed;
6cb153ca 2153
de4eda9d 2154 err = import_single_range(ITER_SOURCE, buff, len, &iov, &msg.msg_iter);
602bd0e9
AV
2155 if (unlikely(err))
2156 return err;
de0fa95c
PE
2157 sock = sockfd_lookup_light(fd, &err, &fput_needed);
2158 if (!sock)
4387ff75 2159 goto out;
6cb153ca 2160
89bddce5 2161 msg.msg_name = NULL;
89bddce5
SH
2162 msg.msg_control = NULL;
2163 msg.msg_controllen = 0;
2164 msg.msg_namelen = 0;
7c701d92 2165 msg.msg_ubuf = NULL;
6cb153ca 2166 if (addr) {
43db362d 2167 err = move_addr_to_kernel(addr, addr_len, &address);
1da177e4
LT
2168 if (err < 0)
2169 goto out_put;
230b1839 2170 msg.msg_name = (struct sockaddr *)&address;
89bddce5 2171 msg.msg_namelen = addr_len;
1da177e4 2172 }
b841b901 2173 flags &= ~MSG_INTERNAL_SENDMSG_FLAGS;
1da177e4
LT
2174 if (sock->file->f_flags & O_NONBLOCK)
2175 flags |= MSG_DONTWAIT;
2176 msg.msg_flags = flags;
d8725c86 2177 err = sock_sendmsg(sock, &msg);
1da177e4 2178
89bddce5 2179out_put:
de0fa95c 2180 fput_light(sock->file, fput_needed);
4387ff75 2181out:
1da177e4
LT
2182 return err;
2183}
2184
211b634b
DB
2185SYSCALL_DEFINE6(sendto, int, fd, void __user *, buff, size_t, len,
2186 unsigned int, flags, struct sockaddr __user *, addr,
2187 int, addr_len)
2188{
2189 return __sys_sendto(fd, buff, len, flags, addr, addr_len);
2190}
2191
1da177e4 2192/*
89bddce5 2193 * Send a datagram down a socket.
1da177e4
LT
2194 */
2195
3e0fa65f 2196SYSCALL_DEFINE4(send, int, fd, void __user *, buff, size_t, len,
95c96174 2197 unsigned int, flags)
1da177e4 2198{
211b634b 2199 return __sys_sendto(fd, buff, len, flags, NULL, 0);
1da177e4
LT
2200}
2201
2202/*
89bddce5 2203 * Receive a frame from the socket and optionally record the address of the
1da177e4
LT
2204 * sender. We verify the buffers are writable and if needed move the
2205 * sender address from kernel to user space.
2206 */
7a09e1eb
DB
2207int __sys_recvfrom(int fd, void __user *ubuf, size_t size, unsigned int flags,
2208 struct sockaddr __user *addr, int __user *addr_len)
1da177e4 2209{
1228b34c
ED
2210 struct sockaddr_storage address;
2211 struct msghdr msg = {
2212 /* Save some cycles and don't copy the address if not needed */
2213 .msg_name = addr ? (struct sockaddr *)&address : NULL,
2214 };
1da177e4
LT
2215 struct socket *sock;
2216 struct iovec iov;
89bddce5 2217 int err, err2;
6cb153ca
BL
2218 int fput_needed;
2219
de4eda9d 2220 err = import_single_range(ITER_DEST, ubuf, size, &iov, &msg.msg_iter);
602bd0e9
AV
2221 if (unlikely(err))
2222 return err;
de0fa95c 2223 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4 2224 if (!sock)
de0fa95c 2225 goto out;
1da177e4 2226
1da177e4
LT
2227 if (sock->file->f_flags & O_NONBLOCK)
2228 flags |= MSG_DONTWAIT;
2da62906 2229 err = sock_recvmsg(sock, &msg, flags);
1da177e4 2230
89bddce5 2231 if (err >= 0 && addr != NULL) {
43db362d 2232 err2 = move_addr_to_user(&address,
230b1839 2233 msg.msg_namelen, addr, addr_len);
89bddce5
SH
2234 if (err2 < 0)
2235 err = err2;
1da177e4 2236 }
de0fa95c
PE
2237
2238 fput_light(sock->file, fput_needed);
4387ff75 2239out:
1da177e4
LT
2240 return err;
2241}
2242
7a09e1eb
DB
2243SYSCALL_DEFINE6(recvfrom, int, fd, void __user *, ubuf, size_t, size,
2244 unsigned int, flags, struct sockaddr __user *, addr,
2245 int __user *, addr_len)
2246{
2247 return __sys_recvfrom(fd, ubuf, size, flags, addr, addr_len);
2248}
2249
1da177e4 2250/*
89bddce5 2251 * Receive a datagram from a socket.
1da177e4
LT
2252 */
2253
b7c0ddf5
JG
2254SYSCALL_DEFINE4(recv, int, fd, void __user *, ubuf, size_t, size,
2255 unsigned int, flags)
1da177e4 2256{
7a09e1eb 2257 return __sys_recvfrom(fd, ubuf, size, flags, NULL, NULL);
1da177e4
LT
2258}
2259
83f0c10b
FW
2260static bool sock_use_custom_sol_socket(const struct socket *sock)
2261{
a5ef058d 2262 return test_bit(SOCK_CUSTOM_SOCKOPT, &sock->flags);
83f0c10b
FW
2263}
2264
1da177e4
LT
2265/*
2266 * Set a socket option. Because we don't know the option lengths we have
2267 * to pass the user mode parameter for the protocols to sort out.
2268 */
a7b75c5a 2269int __sys_setsockopt(int fd, int level, int optname, char __user *user_optval,
55db9c0e 2270 int optlen)
1da177e4 2271{
519a8a6c 2272 sockptr_t optval = USER_SOCKPTR(user_optval);
1ded5e5a 2273 const struct proto_ops *ops;
0d01da6a 2274 char *kernel_optval = NULL;
6cb153ca 2275 int err, fput_needed;
1da177e4
LT
2276 struct socket *sock;
2277
2278 if (optlen < 0)
2279 return -EINVAL;
89bddce5
SH
2280
2281 sock = sockfd_lookup_light(fd, &err, &fput_needed);
4a367299
CH
2282 if (!sock)
2283 return err;
1da177e4 2284
4a367299
CH
2285 err = security_socket_setsockopt(sock, level, optname);
2286 if (err)
2287 goto out_put;
0d01da6a 2288
55db9c0e
CH
2289 if (!in_compat_syscall())
2290 err = BPF_CGROUP_RUN_PROG_SETSOCKOPT(sock->sk, &level, &optname,
a7b75c5a 2291 user_optval, &optlen,
55db9c0e 2292 &kernel_optval);
4a367299
CH
2293 if (err < 0)
2294 goto out_put;
2295 if (err > 0) {
2296 err = 0;
2297 goto out_put;
2298 }
0d01da6a 2299
a7b75c5a
CH
2300 if (kernel_optval)
2301 optval = KERNEL_SOCKPTR(kernel_optval);
1ded5e5a 2302 ops = READ_ONCE(sock->ops);
4a367299 2303 if (level == SOL_SOCKET && !sock_use_custom_sol_socket(sock))
a7b75c5a 2304 err = sock_setsockopt(sock, level, optname, optval, optlen);
1ded5e5a 2305 else if (unlikely(!ops->setsockopt))
a44d9e72 2306 err = -EOPNOTSUPP;
4a367299 2307 else
1ded5e5a 2308 err = ops->setsockopt(sock, level, optname, optval,
89bddce5 2309 optlen);
a7b75c5a 2310 kfree(kernel_optval);
4a367299
CH
2311out_put:
2312 fput_light(sock->file, fput_needed);
1da177e4
LT
2313 return err;
2314}
2315
cc36dca0
DB
2316SYSCALL_DEFINE5(setsockopt, int, fd, int, level, int, optname,
2317 char __user *, optval, int, optlen)
2318{
2319 return __sys_setsockopt(fd, level, optname, optval, optlen);
2320}
2321
9cacf81f
SF
2322INDIRECT_CALLABLE_DECLARE(bool tcp_bpf_bypass_getsockopt(int level,
2323 int optname));
2324
1da177e4
LT
2325/*
2326 * Get a socket option. Because we don't know the option lengths we have
2327 * to pass a user mode parameter for the protocols to sort out.
2328 */
55db9c0e
CH
2329int __sys_getsockopt(int fd, int level, int optname, char __user *optval,
2330 int __user *optlen)
1da177e4 2331{
ad4bf5f2 2332 int max_optlen __maybe_unused;
1ded5e5a 2333 const struct proto_ops *ops;
6cb153ca 2334 int err, fput_needed;
1da177e4
LT
2335 struct socket *sock;
2336
89bddce5 2337 sock = sockfd_lookup_light(fd, &err, &fput_needed);
d8a9b38f
CH
2338 if (!sock)
2339 return err;
2340
2341 err = security_socket_getsockopt(sock, level, optname);
2342 if (err)
2343 goto out_put;
1da177e4 2344
55db9c0e
CH
2345 if (!in_compat_syscall())
2346 max_optlen = BPF_CGROUP_GETSOCKOPT_MAX_OPTLEN(optlen);
0d01da6a 2347
1ded5e5a 2348 ops = READ_ONCE(sock->ops);
d8a9b38f
CH
2349 if (level == SOL_SOCKET)
2350 err = sock_getsockopt(sock, level, optname, optval, optlen);
1ded5e5a 2351 else if (unlikely(!ops->getsockopt))
a44d9e72 2352 err = -EOPNOTSUPP;
d8a9b38f 2353 else
1ded5e5a 2354 err = ops->getsockopt(sock, level, optname, optval,
89bddce5 2355 optlen);
0d01da6a 2356
55db9c0e
CH
2357 if (!in_compat_syscall())
2358 err = BPF_CGROUP_RUN_PROG_GETSOCKOPT(sock->sk, level, optname,
2359 optval, optlen, max_optlen,
2360 err);
6cb153ca 2361out_put:
d8a9b38f 2362 fput_light(sock->file, fput_needed);
1da177e4
LT
2363 return err;
2364}
2365
13a2d70e
DB
2366SYSCALL_DEFINE5(getsockopt, int, fd, int, level, int, optname,
2367 char __user *, optval, int __user *, optlen)
2368{
2369 return __sys_getsockopt(fd, level, optname, optval, optlen);
2370}
2371
1da177e4
LT
2372/*
2373 * Shutdown a socket.
2374 */
2375
b713c195
JA
2376int __sys_shutdown_sock(struct socket *sock, int how)
2377{
2378 int err;
2379
2380 err = security_socket_shutdown(sock, how);
2381 if (!err)
1ded5e5a 2382 err = READ_ONCE(sock->ops)->shutdown(sock, how);
b713c195
JA
2383
2384 return err;
2385}
2386
005a1aea 2387int __sys_shutdown(int fd, int how)
1da177e4 2388{
6cb153ca 2389 int err, fput_needed;
1da177e4
LT
2390 struct socket *sock;
2391
89bddce5
SH
2392 sock = sockfd_lookup_light(fd, &err, &fput_needed);
2393 if (sock != NULL) {
b713c195 2394 err = __sys_shutdown_sock(sock, how);
6cb153ca 2395 fput_light(sock->file, fput_needed);
1da177e4
LT
2396 }
2397 return err;
2398}
2399
005a1aea
DB
2400SYSCALL_DEFINE2(shutdown, int, fd, int, how)
2401{
2402 return __sys_shutdown(fd, how);
2403}
2404
89bddce5 2405/* A couple of helpful macros for getting the address of the 32/64 bit
1da177e4
LT
2406 * fields which are the same type (int / unsigned) on our platforms.
2407 */
2408#define COMPAT_MSG(msg, member) ((MSG_CMSG_COMPAT & flags) ? &msg##_compat->member : &msg->member)
2409#define COMPAT_NAMELEN(msg) COMPAT_MSG(msg, msg_namelen)
2410#define COMPAT_FLAGS(msg) COMPAT_MSG(msg, msg_flags)
2411
c71d8ebe
TH
2412struct used_address {
2413 struct sockaddr_storage name;
2414 unsigned int name_len;
2415};
2416
7fa875b8
DY
2417int __copy_msghdr(struct msghdr *kmsg,
2418 struct user_msghdr *msg,
2419 struct sockaddr __user **save_addr)
1661bf36 2420{
08adb7da
AV
2421 ssize_t err;
2422
1f466e1f 2423 kmsg->msg_control_is_user = true;
1228b34c 2424 kmsg->msg_get_inq = 0;
7fa875b8
DY
2425 kmsg->msg_control_user = msg->msg_control;
2426 kmsg->msg_controllen = msg->msg_controllen;
2427 kmsg->msg_flags = msg->msg_flags;
ffb07550 2428
7fa875b8
DY
2429 kmsg->msg_namelen = msg->msg_namelen;
2430 if (!msg->msg_name)
6a2a2b3a
AS
2431 kmsg->msg_namelen = 0;
2432
dbb490b9
ML
2433 if (kmsg->msg_namelen < 0)
2434 return -EINVAL;
2435
1661bf36 2436 if (kmsg->msg_namelen > sizeof(struct sockaddr_storage))
db31c55a 2437 kmsg->msg_namelen = sizeof(struct sockaddr_storage);
08adb7da
AV
2438
2439 if (save_addr)
7fa875b8 2440 *save_addr = msg->msg_name;
08adb7da 2441
7fa875b8 2442 if (msg->msg_name && kmsg->msg_namelen) {
08adb7da 2443 if (!save_addr) {
7fa875b8 2444 err = move_addr_to_kernel(msg->msg_name,
864d9664 2445 kmsg->msg_namelen,
08adb7da
AV
2446 kmsg->msg_name);
2447 if (err < 0)
2448 return err;
2449 }
2450 } else {
2451 kmsg->msg_name = NULL;
2452 kmsg->msg_namelen = 0;
2453 }
2454
7fa875b8 2455 if (msg->msg_iovlen > UIO_MAXIOV)
08adb7da
AV
2456 return -EMSGSIZE;
2457
0345f931 2458 kmsg->msg_iocb = NULL;
7c701d92 2459 kmsg->msg_ubuf = NULL;
0a384abf
JA
2460 return 0;
2461}
2462
2463static int copy_msghdr_from_user(struct msghdr *kmsg,
2464 struct user_msghdr __user *umsg,
2465 struct sockaddr __user **save_addr,
2466 struct iovec **iov)
2467{
2468 struct user_msghdr msg;
2469 ssize_t err;
2470
7fa875b8
DY
2471 if (copy_from_user(&msg, umsg, sizeof(*umsg)))
2472 return -EFAULT;
2473
2474 err = __copy_msghdr(kmsg, &msg, save_addr);
0a384abf
JA
2475 if (err)
2476 return err;
0345f931 2477
de4eda9d 2478 err = import_iovec(save_addr ? ITER_DEST : ITER_SOURCE,
ffb07550 2479 msg.msg_iov, msg.msg_iovlen,
da184284 2480 UIO_FASTIOV, iov, &kmsg->msg_iter);
87e5e6da 2481 return err < 0 ? err : 0;
1661bf36
DC
2482}
2483
4257c8ca
JA
2484static int ____sys_sendmsg(struct socket *sock, struct msghdr *msg_sys,
2485 unsigned int flags, struct used_address *used_address,
2486 unsigned int allowed_msghdr_flags)
1da177e4 2487{
b9d717a7 2488 unsigned char ctl[sizeof(struct cmsghdr) + 20]
846cc123 2489 __aligned(sizeof(__kernel_size_t));
89bddce5 2490 /* 20 is size of ipv6_pktinfo */
1da177e4 2491 unsigned char *ctl_buf = ctl;
d8725c86 2492 int ctl_len;
08adb7da 2493 ssize_t err;
89bddce5 2494
1da177e4
LT
2495 err = -ENOBUFS;
2496
228e548e 2497 if (msg_sys->msg_controllen > INT_MAX)
4257c8ca 2498 goto out;
28a94d8f 2499 flags |= (msg_sys->msg_flags & allowed_msghdr_flags);
228e548e 2500 ctl_len = msg_sys->msg_controllen;
1da177e4 2501 if ((MSG_CMSG_COMPAT & flags) && ctl_len) {
89bddce5 2502 err =
228e548e 2503 cmsghdr_from_user_compat_to_kern(msg_sys, sock->sk, ctl,
89bddce5 2504 sizeof(ctl));
1da177e4 2505 if (err)
4257c8ca 2506 goto out;
228e548e
AB
2507 ctl_buf = msg_sys->msg_control;
2508 ctl_len = msg_sys->msg_controllen;
1da177e4 2509 } else if (ctl_len) {
ac4340fc
DM
2510 BUILD_BUG_ON(sizeof(struct cmsghdr) !=
2511 CMSG_ALIGN(sizeof(struct cmsghdr)));
89bddce5 2512 if (ctl_len > sizeof(ctl)) {
1da177e4 2513 ctl_buf = sock_kmalloc(sock->sk, ctl_len, GFP_KERNEL);
89bddce5 2514 if (ctl_buf == NULL)
4257c8ca 2515 goto out;
1da177e4
LT
2516 }
2517 err = -EFAULT;
1f466e1f 2518 if (copy_from_user(ctl_buf, msg_sys->msg_control_user, ctl_len))
1da177e4 2519 goto out_freectl;
228e548e 2520 msg_sys->msg_control = ctl_buf;
1f466e1f 2521 msg_sys->msg_control_is_user = false;
1da177e4 2522 }
b841b901 2523 flags &= ~MSG_INTERNAL_SENDMSG_FLAGS;
228e548e 2524 msg_sys->msg_flags = flags;
1da177e4
LT
2525
2526 if (sock->file->f_flags & O_NONBLOCK)
228e548e 2527 msg_sys->msg_flags |= MSG_DONTWAIT;
c71d8ebe
TH
2528 /*
2529 * If this is sendmmsg() and current destination address is same as
2530 * previously succeeded address, omit asking LSM's decision.
2531 * used_address->name_len is initialized to UINT_MAX so that the first
2532 * destination address never matches.
2533 */
bc909d9d
MD
2534 if (used_address && msg_sys->msg_name &&
2535 used_address->name_len == msg_sys->msg_namelen &&
2536 !memcmp(&used_address->name, msg_sys->msg_name,
c71d8ebe 2537 used_address->name_len)) {
d8725c86 2538 err = sock_sendmsg_nosec(sock, msg_sys);
c71d8ebe
TH
2539 goto out_freectl;
2540 }
d8725c86 2541 err = sock_sendmsg(sock, msg_sys);
c71d8ebe
TH
2542 /*
2543 * If this is sendmmsg() and sending to current destination address was
2544 * successful, remember it.
2545 */
2546 if (used_address && err >= 0) {
2547 used_address->name_len = msg_sys->msg_namelen;
bc909d9d
MD
2548 if (msg_sys->msg_name)
2549 memcpy(&used_address->name, msg_sys->msg_name,
2550 used_address->name_len);
c71d8ebe 2551 }
1da177e4
LT
2552
2553out_freectl:
89bddce5 2554 if (ctl_buf != ctl)
1da177e4 2555 sock_kfree_s(sock->sk, ctl_buf, ctl_len);
4257c8ca
JA
2556out:
2557 return err;
2558}
2559
03b1230c
JA
2560int sendmsg_copy_msghdr(struct msghdr *msg,
2561 struct user_msghdr __user *umsg, unsigned flags,
2562 struct iovec **iov)
4257c8ca
JA
2563{
2564 int err;
2565
2566 if (flags & MSG_CMSG_COMPAT) {
2567 struct compat_msghdr __user *msg_compat;
2568
2569 msg_compat = (struct compat_msghdr __user *) umsg;
2570 err = get_compat_msghdr(msg, msg_compat, NULL, iov);
2571 } else {
2572 err = copy_msghdr_from_user(msg, umsg, NULL, iov);
2573 }
2574 if (err < 0)
2575 return err;
2576
2577 return 0;
2578}
2579
2580static int ___sys_sendmsg(struct socket *sock, struct user_msghdr __user *msg,
2581 struct msghdr *msg_sys, unsigned int flags,
2582 struct used_address *used_address,
2583 unsigned int allowed_msghdr_flags)
2584{
2585 struct sockaddr_storage address;
2586 struct iovec iovstack[UIO_FASTIOV], *iov = iovstack;
2587 ssize_t err;
2588
2589 msg_sys->msg_name = &address;
2590
2591 err = sendmsg_copy_msghdr(msg_sys, msg, flags, &iov);
2592 if (err < 0)
2593 return err;
2594
2595 err = ____sys_sendmsg(sock, msg_sys, flags, used_address,
2596 allowed_msghdr_flags);
da184284 2597 kfree(iov);
228e548e
AB
2598 return err;
2599}
2600
2601/*
2602 * BSD sendmsg interface
2603 */
03b1230c 2604long __sys_sendmsg_sock(struct socket *sock, struct msghdr *msg,
0fa03c62
JA
2605 unsigned int flags)
2606{
03b1230c 2607 return ____sys_sendmsg(sock, msg, flags, NULL, 0);
0fa03c62 2608}
228e548e 2609
e1834a32
DB
2610long __sys_sendmsg(int fd, struct user_msghdr __user *msg, unsigned int flags,
2611 bool forbid_cmsg_compat)
228e548e
AB
2612{
2613 int fput_needed, err;
2614 struct msghdr msg_sys;
1be374a0
AL
2615 struct socket *sock;
2616
e1834a32
DB
2617 if (forbid_cmsg_compat && (flags & MSG_CMSG_COMPAT))
2618 return -EINVAL;
2619
1be374a0 2620 sock = sockfd_lookup_light(fd, &err, &fput_needed);
228e548e
AB
2621 if (!sock)
2622 goto out;
2623
28a94d8f 2624 err = ___sys_sendmsg(sock, msg, &msg_sys, flags, NULL, 0);
228e548e 2625
6cb153ca 2626 fput_light(sock->file, fput_needed);
89bddce5 2627out:
1da177e4
LT
2628 return err;
2629}
2630
666547ff 2631SYSCALL_DEFINE3(sendmsg, int, fd, struct user_msghdr __user *, msg, unsigned int, flags)
a7526eb5 2632{
e1834a32 2633 return __sys_sendmsg(fd, msg, flags, true);
a7526eb5
AL
2634}
2635
228e548e
AB
2636/*
2637 * Linux sendmmsg interface
2638 */
2639
2640int __sys_sendmmsg(int fd, struct mmsghdr __user *mmsg, unsigned int vlen,
e1834a32 2641 unsigned int flags, bool forbid_cmsg_compat)
228e548e
AB
2642{
2643 int fput_needed, err, datagrams;
2644 struct socket *sock;
2645 struct mmsghdr __user *entry;
2646 struct compat_mmsghdr __user *compat_entry;
2647 struct msghdr msg_sys;
c71d8ebe 2648 struct used_address used_address;
f092276d 2649 unsigned int oflags = flags;
228e548e 2650
e1834a32
DB
2651 if (forbid_cmsg_compat && (flags & MSG_CMSG_COMPAT))
2652 return -EINVAL;
2653
98382f41
AB
2654 if (vlen > UIO_MAXIOV)
2655 vlen = UIO_MAXIOV;
228e548e
AB
2656
2657 datagrams = 0;
2658
2659 sock = sockfd_lookup_light(fd, &err, &fput_needed);
2660 if (!sock)
2661 return err;
2662
c71d8ebe 2663 used_address.name_len = UINT_MAX;
228e548e
AB
2664 entry = mmsg;
2665 compat_entry = (struct compat_mmsghdr __user *)mmsg;
728ffb86 2666 err = 0;
f092276d 2667 flags |= MSG_BATCH;
228e548e
AB
2668
2669 while (datagrams < vlen) {
f092276d
TH
2670 if (datagrams == vlen - 1)
2671 flags = oflags;
2672
228e548e 2673 if (MSG_CMSG_COMPAT & flags) {
666547ff 2674 err = ___sys_sendmsg(sock, (struct user_msghdr __user *)compat_entry,
28a94d8f 2675 &msg_sys, flags, &used_address, MSG_EOR);
228e548e
AB
2676 if (err < 0)
2677 break;
2678 err = __put_user(err, &compat_entry->msg_len);
2679 ++compat_entry;
2680 } else {
a7526eb5 2681 err = ___sys_sendmsg(sock,
666547ff 2682 (struct user_msghdr __user *)entry,
28a94d8f 2683 &msg_sys, flags, &used_address, MSG_EOR);
228e548e
AB
2684 if (err < 0)
2685 break;
2686 err = put_user(err, &entry->msg_len);
2687 ++entry;
2688 }
2689
2690 if (err)
2691 break;
2692 ++datagrams;
3023898b
SHY
2693 if (msg_data_left(&msg_sys))
2694 break;
a78cb84c 2695 cond_resched();
228e548e
AB
2696 }
2697
228e548e
AB
2698 fput_light(sock->file, fput_needed);
2699
728ffb86
AB
2700 /* We only return an error if no datagrams were able to be sent */
2701 if (datagrams != 0)
228e548e
AB
2702 return datagrams;
2703
228e548e
AB
2704 return err;
2705}
2706
2707SYSCALL_DEFINE4(sendmmsg, int, fd, struct mmsghdr __user *, mmsg,
2708 unsigned int, vlen, unsigned int, flags)
2709{
e1834a32 2710 return __sys_sendmmsg(fd, mmsg, vlen, flags, true);
228e548e
AB
2711}
2712
03b1230c
JA
2713int recvmsg_copy_msghdr(struct msghdr *msg,
2714 struct user_msghdr __user *umsg, unsigned flags,
2715 struct sockaddr __user **uaddr,
2716 struct iovec **iov)
1da177e4 2717{
08adb7da 2718 ssize_t err;
1da177e4 2719
4257c8ca
JA
2720 if (MSG_CMSG_COMPAT & flags) {
2721 struct compat_msghdr __user *msg_compat;
1da177e4 2722
4257c8ca
JA
2723 msg_compat = (struct compat_msghdr __user *) umsg;
2724 err = get_compat_msghdr(msg, msg_compat, uaddr, iov);
2725 } else {
2726 err = copy_msghdr_from_user(msg, umsg, uaddr, iov);
2727 }
1da177e4 2728 if (err < 0)
da184284 2729 return err;
1da177e4 2730
4257c8ca
JA
2731 return 0;
2732}
2733
2734static int ____sys_recvmsg(struct socket *sock, struct msghdr *msg_sys,
2735 struct user_msghdr __user *msg,
2736 struct sockaddr __user *uaddr,
2737 unsigned int flags, int nosec)
2738{
2739 struct compat_msghdr __user *msg_compat =
2740 (struct compat_msghdr __user *) msg;
2741 int __user *uaddr_len = COMPAT_NAMELEN(msg);
2742 struct sockaddr_storage addr;
2743 unsigned long cmsg_ptr;
2744 int len;
2745 ssize_t err;
2746
2747 msg_sys->msg_name = &addr;
a2e27255
ACM
2748 cmsg_ptr = (unsigned long)msg_sys->msg_control;
2749 msg_sys->msg_flags = flags & (MSG_CMSG_CLOEXEC|MSG_CMSG_COMPAT);
89bddce5 2750
f3d33426
HFS
2751 /* We assume all kernel code knows the size of sockaddr_storage */
2752 msg_sys->msg_namelen = 0;
2753
1da177e4
LT
2754 if (sock->file->f_flags & O_NONBLOCK)
2755 flags |= MSG_DONTWAIT;
1af66221
ED
2756
2757 if (unlikely(nosec))
2758 err = sock_recvmsg_nosec(sock, msg_sys, flags);
2759 else
2760 err = sock_recvmsg(sock, msg_sys, flags);
2761
1da177e4 2762 if (err < 0)
4257c8ca 2763 goto out;
1da177e4
LT
2764 len = err;
2765
2766 if (uaddr != NULL) {
43db362d 2767 err = move_addr_to_user(&addr,
a2e27255 2768 msg_sys->msg_namelen, uaddr,
89bddce5 2769 uaddr_len);
1da177e4 2770 if (err < 0)
4257c8ca 2771 goto out;
1da177e4 2772 }
a2e27255 2773 err = __put_user((msg_sys->msg_flags & ~MSG_CMSG_COMPAT),
37f7f421 2774 COMPAT_FLAGS(msg));
1da177e4 2775 if (err)
4257c8ca 2776 goto out;
1da177e4 2777 if (MSG_CMSG_COMPAT & flags)
a2e27255 2778 err = __put_user((unsigned long)msg_sys->msg_control - cmsg_ptr,
1da177e4
LT
2779 &msg_compat->msg_controllen);
2780 else
a2e27255 2781 err = __put_user((unsigned long)msg_sys->msg_control - cmsg_ptr,
1da177e4
LT
2782 &msg->msg_controllen);
2783 if (err)
4257c8ca 2784 goto out;
1da177e4 2785 err = len;
4257c8ca
JA
2786out:
2787 return err;
2788}
2789
2790static int ___sys_recvmsg(struct socket *sock, struct user_msghdr __user *msg,
2791 struct msghdr *msg_sys, unsigned int flags, int nosec)
2792{
2793 struct iovec iovstack[UIO_FASTIOV], *iov = iovstack;
2794 /* user mode address pointers */
2795 struct sockaddr __user *uaddr;
2796 ssize_t err;
2797
2798 err = recvmsg_copy_msghdr(msg_sys, msg, flags, &uaddr, &iov);
2799 if (err < 0)
2800 return err;
1da177e4 2801
4257c8ca 2802 err = ____sys_recvmsg(sock, msg_sys, msg, uaddr, flags, nosec);
da184284 2803 kfree(iov);
a2e27255
ACM
2804 return err;
2805}
2806
2807/*
2808 * BSD recvmsg interface
2809 */
2810
03b1230c
JA
2811long __sys_recvmsg_sock(struct socket *sock, struct msghdr *msg,
2812 struct user_msghdr __user *umsg,
2813 struct sockaddr __user *uaddr, unsigned int flags)
aa1fa28f 2814{
03b1230c 2815 return ____sys_recvmsg(sock, msg, umsg, uaddr, flags, 0);
aa1fa28f
JA
2816}
2817
e1834a32
DB
2818long __sys_recvmsg(int fd, struct user_msghdr __user *msg, unsigned int flags,
2819 bool forbid_cmsg_compat)
a2e27255
ACM
2820{
2821 int fput_needed, err;
2822 struct msghdr msg_sys;
1be374a0
AL
2823 struct socket *sock;
2824
e1834a32
DB
2825 if (forbid_cmsg_compat && (flags & MSG_CMSG_COMPAT))
2826 return -EINVAL;
2827
1be374a0 2828 sock = sockfd_lookup_light(fd, &err, &fput_needed);
a2e27255
ACM
2829 if (!sock)
2830 goto out;
2831
a7526eb5 2832 err = ___sys_recvmsg(sock, msg, &msg_sys, flags, 0);
a2e27255 2833
6cb153ca 2834 fput_light(sock->file, fput_needed);
1da177e4
LT
2835out:
2836 return err;
2837}
2838
666547ff 2839SYSCALL_DEFINE3(recvmsg, int, fd, struct user_msghdr __user *, msg,
a7526eb5
AL
2840 unsigned int, flags)
2841{
e1834a32 2842 return __sys_recvmsg(fd, msg, flags, true);
a7526eb5
AL
2843}
2844
a2e27255
ACM
2845/*
2846 * Linux recvmmsg interface
2847 */
2848
e11d4284
AB
2849static int do_recvmmsg(int fd, struct mmsghdr __user *mmsg,
2850 unsigned int vlen, unsigned int flags,
2851 struct timespec64 *timeout)
a2e27255
ACM
2852{
2853 int fput_needed, err, datagrams;
2854 struct socket *sock;
2855 struct mmsghdr __user *entry;
d7256d0e 2856 struct compat_mmsghdr __user *compat_entry;
a2e27255 2857 struct msghdr msg_sys;
766b9f92
DD
2858 struct timespec64 end_time;
2859 struct timespec64 timeout64;
a2e27255
ACM
2860
2861 if (timeout &&
2862 poll_select_set_timeout(&end_time, timeout->tv_sec,
2863 timeout->tv_nsec))
2864 return -EINVAL;
2865
2866 datagrams = 0;
2867
2868 sock = sockfd_lookup_light(fd, &err, &fput_needed);
2869 if (!sock)
2870 return err;
2871
7797dc41
SHY
2872 if (likely(!(flags & MSG_ERRQUEUE))) {
2873 err = sock_error(sock->sk);
2874 if (err) {
2875 datagrams = err;
2876 goto out_put;
2877 }
e623a9e9 2878 }
a2e27255
ACM
2879
2880 entry = mmsg;
d7256d0e 2881 compat_entry = (struct compat_mmsghdr __user *)mmsg;
a2e27255
ACM
2882
2883 while (datagrams < vlen) {
2884 /*
2885 * No need to ask LSM for more than the first datagram.
2886 */
d7256d0e 2887 if (MSG_CMSG_COMPAT & flags) {
666547ff 2888 err = ___sys_recvmsg(sock, (struct user_msghdr __user *)compat_entry,
a7526eb5
AL
2889 &msg_sys, flags & ~MSG_WAITFORONE,
2890 datagrams);
d7256d0e
JMG
2891 if (err < 0)
2892 break;
2893 err = __put_user(err, &compat_entry->msg_len);
2894 ++compat_entry;
2895 } else {
a7526eb5 2896 err = ___sys_recvmsg(sock,
666547ff 2897 (struct user_msghdr __user *)entry,
a7526eb5
AL
2898 &msg_sys, flags & ~MSG_WAITFORONE,
2899 datagrams);
d7256d0e
JMG
2900 if (err < 0)
2901 break;
2902 err = put_user(err, &entry->msg_len);
2903 ++entry;
2904 }
2905
a2e27255
ACM
2906 if (err)
2907 break;
a2e27255
ACM
2908 ++datagrams;
2909
71c5c159
BB
2910 /* MSG_WAITFORONE turns on MSG_DONTWAIT after one packet */
2911 if (flags & MSG_WAITFORONE)
2912 flags |= MSG_DONTWAIT;
2913
a2e27255 2914 if (timeout) {
766b9f92 2915 ktime_get_ts64(&timeout64);
c2e6c856 2916 *timeout = timespec64_sub(end_time, timeout64);
a2e27255
ACM
2917 if (timeout->tv_sec < 0) {
2918 timeout->tv_sec = timeout->tv_nsec = 0;
2919 break;
2920 }
2921
2922 /* Timeout, return less than vlen datagrams */
2923 if (timeout->tv_nsec == 0 && timeout->tv_sec == 0)
2924 break;
2925 }
2926
2927 /* Out of band data, return right away */
2928 if (msg_sys.msg_flags & MSG_OOB)
2929 break;
a78cb84c 2930 cond_resched();
a2e27255
ACM
2931 }
2932
a2e27255 2933 if (err == 0)
34b88a68
ACM
2934 goto out_put;
2935
2936 if (datagrams == 0) {
2937 datagrams = err;
2938 goto out_put;
2939 }
a2e27255 2940
34b88a68
ACM
2941 /*
2942 * We may return less entries than requested (vlen) if the
2943 * sock is non block and there aren't enough datagrams...
2944 */
2945 if (err != -EAGAIN) {
a2e27255 2946 /*
34b88a68
ACM
2947 * ... or if recvmsg returns an error after we
2948 * received some datagrams, where we record the
2949 * error to return on the next call or if the
2950 * app asks about it using getsockopt(SO_ERROR).
a2e27255 2951 */
e05a5f51 2952 WRITE_ONCE(sock->sk->sk_err, -err);
a2e27255 2953 }
34b88a68
ACM
2954out_put:
2955 fput_light(sock->file, fput_needed);
a2e27255 2956
34b88a68 2957 return datagrams;
a2e27255
ACM
2958}
2959
e11d4284
AB
2960int __sys_recvmmsg(int fd, struct mmsghdr __user *mmsg,
2961 unsigned int vlen, unsigned int flags,
2962 struct __kernel_timespec __user *timeout,
2963 struct old_timespec32 __user *timeout32)
a2e27255
ACM
2964{
2965 int datagrams;
c2e6c856 2966 struct timespec64 timeout_sys;
a2e27255 2967
e11d4284
AB
2968 if (timeout && get_timespec64(&timeout_sys, timeout))
2969 return -EFAULT;
a2e27255 2970
e11d4284 2971 if (timeout32 && get_old_timespec32(&timeout_sys, timeout32))
a2e27255
ACM
2972 return -EFAULT;
2973
e11d4284
AB
2974 if (!timeout && !timeout32)
2975 return do_recvmmsg(fd, mmsg, vlen, flags, NULL);
2976
2977 datagrams = do_recvmmsg(fd, mmsg, vlen, flags, &timeout_sys);
a2e27255 2978
e11d4284
AB
2979 if (datagrams <= 0)
2980 return datagrams;
2981
2982 if (timeout && put_timespec64(&timeout_sys, timeout))
2983 datagrams = -EFAULT;
2984
2985 if (timeout32 && put_old_timespec32(&timeout_sys, timeout32))
a2e27255
ACM
2986 datagrams = -EFAULT;
2987
2988 return datagrams;
2989}
2990
1255e269
DB
2991SYSCALL_DEFINE5(recvmmsg, int, fd, struct mmsghdr __user *, mmsg,
2992 unsigned int, vlen, unsigned int, flags,
c2e6c856 2993 struct __kernel_timespec __user *, timeout)
1255e269 2994{
e11d4284
AB
2995 if (flags & MSG_CMSG_COMPAT)
2996 return -EINVAL;
2997
2998 return __sys_recvmmsg(fd, mmsg, vlen, flags, timeout, NULL);
2999}
3000
3001#ifdef CONFIG_COMPAT_32BIT_TIME
3002SYSCALL_DEFINE5(recvmmsg_time32, int, fd, struct mmsghdr __user *, mmsg,
3003 unsigned int, vlen, unsigned int, flags,
3004 struct old_timespec32 __user *, timeout)
3005{
3006 if (flags & MSG_CMSG_COMPAT)
3007 return -EINVAL;
3008
3009 return __sys_recvmmsg(fd, mmsg, vlen, flags, NULL, timeout);
1255e269 3010}
e11d4284 3011#endif
1255e269 3012
a2e27255 3013#ifdef __ARCH_WANT_SYS_SOCKETCALL
1da177e4
LT
3014/* Argument list sizes for sys_socketcall */
3015#define AL(x) ((x) * sizeof(unsigned long))
228e548e 3016static const unsigned char nargs[21] = {
c6d409cf
ED
3017 AL(0), AL(3), AL(3), AL(3), AL(2), AL(3),
3018 AL(3), AL(3), AL(4), AL(4), AL(4), AL(6),
3019 AL(6), AL(2), AL(5), AL(5), AL(3), AL(3),
228e548e 3020 AL(4), AL(5), AL(4)
89bddce5
SH
3021};
3022
1da177e4
LT
3023#undef AL
3024
3025/*
89bddce5 3026 * System call vectors.
1da177e4
LT
3027 *
3028 * Argument checking cleaned up. Saved 20% in size.
3029 * This function doesn't need to set the kernel lock because
89bddce5 3030 * it is set by the callees.
1da177e4
LT
3031 */
3032
3e0fa65f 3033SYSCALL_DEFINE2(socketcall, int, call, unsigned long __user *, args)
1da177e4 3034{
2950fa9d 3035 unsigned long a[AUDITSC_ARGS];
89bddce5 3036 unsigned long a0, a1;
1da177e4 3037 int err;
47379052 3038 unsigned int len;
1da177e4 3039
228e548e 3040 if (call < 1 || call > SYS_SENDMMSG)
1da177e4 3041 return -EINVAL;
c8e8cd57 3042 call = array_index_nospec(call, SYS_SENDMMSG + 1);
1da177e4 3043
47379052
AV
3044 len = nargs[call];
3045 if (len > sizeof(a))
3046 return -EINVAL;
3047
1da177e4 3048 /* copy_from_user should be SMP safe. */
47379052 3049 if (copy_from_user(a, args, len))
1da177e4 3050 return -EFAULT;
3ec3b2fb 3051
2950fa9d
CG
3052 err = audit_socketcall(nargs[call] / sizeof(unsigned long), a);
3053 if (err)
3054 return err;
3ec3b2fb 3055
89bddce5
SH
3056 a0 = a[0];
3057 a1 = a[1];
3058
3059 switch (call) {
3060 case SYS_SOCKET:
9d6a15c3 3061 err = __sys_socket(a0, a1, a[2]);
89bddce5
SH
3062 break;
3063 case SYS_BIND:
a87d35d8 3064 err = __sys_bind(a0, (struct sockaddr __user *)a1, a[2]);
89bddce5
SH
3065 break;
3066 case SYS_CONNECT:
1387c2c2 3067 err = __sys_connect(a0, (struct sockaddr __user *)a1, a[2]);
89bddce5
SH
3068 break;
3069 case SYS_LISTEN:
25e290ee 3070 err = __sys_listen(a0, a1);
89bddce5
SH
3071 break;
3072 case SYS_ACCEPT:
4541e805
DB
3073 err = __sys_accept4(a0, (struct sockaddr __user *)a1,
3074 (int __user *)a[2], 0);
89bddce5
SH
3075 break;
3076 case SYS_GETSOCKNAME:
3077 err =
8882a107
DB
3078 __sys_getsockname(a0, (struct sockaddr __user *)a1,
3079 (int __user *)a[2]);
89bddce5
SH
3080 break;
3081 case SYS_GETPEERNAME:
3082 err =
b21c8f83
DB
3083 __sys_getpeername(a0, (struct sockaddr __user *)a1,
3084 (int __user *)a[2]);
89bddce5
SH
3085 break;
3086 case SYS_SOCKETPAIR:
6debc8d8 3087 err = __sys_socketpair(a0, a1, a[2], (int __user *)a[3]);
89bddce5
SH
3088 break;
3089 case SYS_SEND:
f3bf896b
DB
3090 err = __sys_sendto(a0, (void __user *)a1, a[2], a[3],
3091 NULL, 0);
89bddce5
SH
3092 break;
3093 case SYS_SENDTO:
211b634b
DB
3094 err = __sys_sendto(a0, (void __user *)a1, a[2], a[3],
3095 (struct sockaddr __user *)a[4], a[5]);
89bddce5
SH
3096 break;
3097 case SYS_RECV:
d27e9afc
DB
3098 err = __sys_recvfrom(a0, (void __user *)a1, a[2], a[3],
3099 NULL, NULL);
89bddce5
SH
3100 break;
3101 case SYS_RECVFROM:
7a09e1eb
DB
3102 err = __sys_recvfrom(a0, (void __user *)a1, a[2], a[3],
3103 (struct sockaddr __user *)a[4],
3104 (int __user *)a[5]);
89bddce5
SH
3105 break;
3106 case SYS_SHUTDOWN:
005a1aea 3107 err = __sys_shutdown(a0, a1);
89bddce5
SH
3108 break;
3109 case SYS_SETSOCKOPT:
cc36dca0
DB
3110 err = __sys_setsockopt(a0, a1, a[2], (char __user *)a[3],
3111 a[4]);
89bddce5
SH
3112 break;
3113 case SYS_GETSOCKOPT:
3114 err =
13a2d70e
DB
3115 __sys_getsockopt(a0, a1, a[2], (char __user *)a[3],
3116 (int __user *)a[4]);
89bddce5
SH
3117 break;
3118 case SYS_SENDMSG:
e1834a32
DB
3119 err = __sys_sendmsg(a0, (struct user_msghdr __user *)a1,
3120 a[2], true);
89bddce5 3121 break;
228e548e 3122 case SYS_SENDMMSG:
e1834a32
DB
3123 err = __sys_sendmmsg(a0, (struct mmsghdr __user *)a1, a[2],
3124 a[3], true);
228e548e 3125 break;
89bddce5 3126 case SYS_RECVMSG:
e1834a32
DB
3127 err = __sys_recvmsg(a0, (struct user_msghdr __user *)a1,
3128 a[2], true);
89bddce5 3129 break;
a2e27255 3130 case SYS_RECVMMSG:
3ca47e95 3131 if (IS_ENABLED(CONFIG_64BIT))
e11d4284
AB
3132 err = __sys_recvmmsg(a0, (struct mmsghdr __user *)a1,
3133 a[2], a[3],
3134 (struct __kernel_timespec __user *)a[4],
3135 NULL);
3136 else
3137 err = __sys_recvmmsg(a0, (struct mmsghdr __user *)a1,
3138 a[2], a[3], NULL,
3139 (struct old_timespec32 __user *)a[4]);
a2e27255 3140 break;
de11defe 3141 case SYS_ACCEPT4:
4541e805
DB
3142 err = __sys_accept4(a0, (struct sockaddr __user *)a1,
3143 (int __user *)a[2], a[3]);
aaca0bdc 3144 break;
89bddce5
SH
3145 default:
3146 err = -EINVAL;
3147 break;
1da177e4
LT
3148 }
3149 return err;
3150}
3151
89bddce5 3152#endif /* __ARCH_WANT_SYS_SOCKETCALL */
1da177e4 3153
55737fda
SH
3154/**
3155 * sock_register - add a socket protocol handler
3156 * @ops: description of protocol
3157 *
1da177e4
LT
3158 * This function is called by a protocol handler that wants to
3159 * advertise its address family, and have it linked into the
e793c0f7 3160 * socket interface. The value ops->family corresponds to the
55737fda 3161 * socket system call protocol family.
1da177e4 3162 */
f0fd27d4 3163int sock_register(const struct net_proto_family *ops)
1da177e4
LT
3164{
3165 int err;
3166
3167 if (ops->family >= NPROTO) {
3410f22e 3168 pr_crit("protocol %d >= NPROTO(%d)\n", ops->family, NPROTO);
1da177e4
LT
3169 return -ENOBUFS;
3170 }
55737fda
SH
3171
3172 spin_lock(&net_family_lock);
190683a9
ED
3173 if (rcu_dereference_protected(net_families[ops->family],
3174 lockdep_is_held(&net_family_lock)))
55737fda
SH
3175 err = -EEXIST;
3176 else {
cf778b00 3177 rcu_assign_pointer(net_families[ops->family], ops);
1da177e4
LT
3178 err = 0;
3179 }
55737fda
SH
3180 spin_unlock(&net_family_lock);
3181
fe0bdbde 3182 pr_info("NET: Registered %s protocol family\n", pf_family_names[ops->family]);
1da177e4
LT
3183 return err;
3184}
c6d409cf 3185EXPORT_SYMBOL(sock_register);
1da177e4 3186
55737fda
SH
3187/**
3188 * sock_unregister - remove a protocol handler
3189 * @family: protocol family to remove
3190 *
1da177e4
LT
3191 * This function is called by a protocol handler that wants to
3192 * remove its address family, and have it unlinked from the
55737fda
SH
3193 * new socket creation.
3194 *
3195 * If protocol handler is a module, then it can use module reference
3196 * counts to protect against new references. If protocol handler is not
3197 * a module then it needs to provide its own protection in
3198 * the ops->create routine.
1da177e4 3199 */
f0fd27d4 3200void sock_unregister(int family)
1da177e4 3201{
f0fd27d4 3202 BUG_ON(family < 0 || family >= NPROTO);
1da177e4 3203
55737fda 3204 spin_lock(&net_family_lock);
a9b3cd7f 3205 RCU_INIT_POINTER(net_families[family], NULL);
55737fda
SH
3206 spin_unlock(&net_family_lock);
3207
3208 synchronize_rcu();
3209
fe0bdbde 3210 pr_info("NET: Unregistered %s protocol family\n", pf_family_names[family]);
1da177e4 3211}
c6d409cf 3212EXPORT_SYMBOL(sock_unregister);
1da177e4 3213
bf2ae2e4
XL
3214bool sock_is_registered(int family)
3215{
66b51b0a 3216 return family < NPROTO && rcu_access_pointer(net_families[family]);
bf2ae2e4
XL
3217}
3218
77d76ea3 3219static int __init sock_init(void)
1da177e4 3220{
b3e19d92 3221 int err;
2ca794e5
EB
3222 /*
3223 * Initialize the network sysctl infrastructure.
3224 */
3225 err = net_sysctl_init();
3226 if (err)
3227 goto out;
b3e19d92 3228
1da177e4 3229 /*
89bddce5 3230 * Initialize skbuff SLAB cache
1da177e4
LT
3231 */
3232 skb_init();
1da177e4
LT
3233
3234 /*
89bddce5 3235 * Initialize the protocols module.
1da177e4
LT
3236 */
3237
3238 init_inodecache();
b3e19d92
NP
3239
3240 err = register_filesystem(&sock_fs_type);
3241 if (err)
47260ba9 3242 goto out;
1da177e4 3243 sock_mnt = kern_mount(&sock_fs_type);
b3e19d92
NP
3244 if (IS_ERR(sock_mnt)) {
3245 err = PTR_ERR(sock_mnt);
3246 goto out_mount;
3247 }
77d76ea3
AK
3248
3249 /* The real protocol initialization is performed in later initcalls.
1da177e4
LT
3250 */
3251
3252#ifdef CONFIG_NETFILTER
6d11cfdb
PNA
3253 err = netfilter_init();
3254 if (err)
3255 goto out;
1da177e4 3256#endif
cbeb321a 3257
408eccce 3258 ptp_classifier_init();
c1f19b51 3259
b3e19d92
NP
3260out:
3261 return err;
3262
3263out_mount:
3264 unregister_filesystem(&sock_fs_type);
b3e19d92 3265 goto out;
1da177e4
LT
3266}
3267
77d76ea3
AK
3268core_initcall(sock_init); /* early initcall */
3269
1da177e4
LT
3270#ifdef CONFIG_PROC_FS
3271void socket_seq_show(struct seq_file *seq)
3272{
648845ab
TZ
3273 seq_printf(seq, "sockets: used %d\n",
3274 sock_inuse_get(seq->private));
1da177e4 3275}
89bddce5 3276#endif /* CONFIG_PROC_FS */
1da177e4 3277
29c49648
AB
3278/* Handle the fact that while struct ifreq has the same *layout* on
3279 * 32/64 for everything but ifreq::ifru_ifmap and ifreq::ifru_data,
3280 * which are handled elsewhere, it still has different *size* due to
3281 * ifreq::ifru_ifmap (which is 16 bytes on 32 bit, 24 bytes on 64-bit,
3282 * resulting in struct ifreq being 32 and 40 bytes respectively).
3283 * As a result, if the struct happens to be at the end of a page and
3284 * the next page isn't readable/writable, we get a fault. To prevent
3285 * that, copy back and forth to the full size.
3286 */
3287int get_user_ifreq(struct ifreq *ifr, void __user **ifrdata, void __user *arg)
7a229387 3288{
29c49648
AB
3289 if (in_compat_syscall()) {
3290 struct compat_ifreq *ifr32 = (struct compat_ifreq *)ifr;
7a229387 3291
29c49648
AB
3292 memset(ifr, 0, sizeof(*ifr));
3293 if (copy_from_user(ifr32, arg, sizeof(*ifr32)))
3294 return -EFAULT;
7a229387 3295
29c49648
AB
3296 if (ifrdata)
3297 *ifrdata = compat_ptr(ifr32->ifr_data);
7a229387 3298
29c49648
AB
3299 return 0;
3300 }
7a229387 3301
29c49648 3302 if (copy_from_user(ifr, arg, sizeof(*ifr)))
7a229387
AB
3303 return -EFAULT;
3304
29c49648
AB
3305 if (ifrdata)
3306 *ifrdata = ifr->ifr_data;
3307
7a229387
AB
3308 return 0;
3309}
29c49648 3310EXPORT_SYMBOL(get_user_ifreq);
7a229387 3311
29c49648 3312int put_user_ifreq(struct ifreq *ifr, void __user *arg)
7a229387 3313{
29c49648 3314 size_t size = sizeof(*ifr);
7a229387 3315
29c49648
AB
3316 if (in_compat_syscall())
3317 size = sizeof(struct compat_ifreq);
7a229387 3318
29c49648 3319 if (copy_to_user(arg, ifr, size))
7a229387
AB
3320 return -EFAULT;
3321
3a7da39d 3322 return 0;
7a229387 3323}
29c49648 3324EXPORT_SYMBOL(put_user_ifreq);
7a229387 3325
89bbfc95 3326#ifdef CONFIG_COMPAT
7a50a240
AB
3327static int compat_siocwandev(struct net *net, struct compat_ifreq __user *uifr32)
3328{
7a50a240 3329 compat_uptr_t uptr32;
44c02a2c
AV
3330 struct ifreq ifr;
3331 void __user *saved;
3332 int err;
7a50a240 3333
29c49648 3334 if (get_user_ifreq(&ifr, NULL, uifr32))
7a50a240
AB
3335 return -EFAULT;
3336
3337 if (get_user(uptr32, &uifr32->ifr_settings.ifs_ifsu))
3338 return -EFAULT;
3339
44c02a2c
AV
3340 saved = ifr.ifr_settings.ifs_ifsu.raw_hdlc;
3341 ifr.ifr_settings.ifs_ifsu.raw_hdlc = compat_ptr(uptr32);
7a229387 3342
a554bf96 3343 err = dev_ioctl(net, SIOCWANDEV, &ifr, NULL, NULL);
44c02a2c
AV
3344 if (!err) {
3345 ifr.ifr_settings.ifs_ifsu.raw_hdlc = saved;
29c49648 3346 if (put_user_ifreq(&ifr, uifr32))
44c02a2c 3347 err = -EFAULT;
ccbd6a5a 3348 }
44c02a2c 3349 return err;
7a229387
AB
3350}
3351
590d4693
BH
3352/* Handle ioctls that use ifreq::ifr_data and just need struct ifreq converted */
3353static int compat_ifr_data_ioctl(struct net *net, unsigned int cmd,
6b96018b 3354 struct compat_ifreq __user *u_ifreq32)
7a229387 3355{
44c02a2c 3356 struct ifreq ifreq;
a554bf96 3357 void __user *data;
7a229387 3358
d0efb162
PC
3359 if (!is_socket_ioctl_cmd(cmd))
3360 return -ENOTTY;
a554bf96 3361 if (get_user_ifreq(&ifreq, &data, u_ifreq32))
7a229387 3362 return -EFAULT;
a554bf96 3363 ifreq.ifr_data = data;
7a229387 3364
a554bf96 3365 return dev_ioctl(net, cmd, &ifreq, data, NULL);
a2116ed2
AB
3366}
3367
6b96018b
AB
3368static int compat_sock_ioctl_trans(struct file *file, struct socket *sock,
3369 unsigned int cmd, unsigned long arg)
3370{
3371 void __user *argp = compat_ptr(arg);
3372 struct sock *sk = sock->sk;
3373 struct net *net = sock_net(sk);
1ded5e5a 3374 const struct proto_ops *ops;
7a229387 3375
6b96018b 3376 if (cmd >= SIOCDEVPRIVATE && cmd <= (SIOCDEVPRIVATE + 15))
88fc023f 3377 return sock_ioctl(file, cmd, (unsigned long)argp);
6b96018b
AB
3378
3379 switch (cmd) {
7a50a240
AB
3380 case SIOCWANDEV:
3381 return compat_siocwandev(net, argp);
0768e170
AB
3382 case SIOCGSTAMP_OLD:
3383 case SIOCGSTAMPNS_OLD:
1ded5e5a
ED
3384 ops = READ_ONCE(sock->ops);
3385 if (!ops->gettstamp)
c7cbdbf2 3386 return -ENOIOCTLCMD;
1ded5e5a
ED
3387 return ops->gettstamp(sock, argp, cmd == SIOCGSTAMP_OLD,
3388 !COMPAT_USE_64BIT_TIME);
c7cbdbf2 3389
dd98d289 3390 case SIOCETHTOOL:
590d4693
BH
3391 case SIOCBONDSLAVEINFOQUERY:
3392 case SIOCBONDINFOQUERY:
a2116ed2 3393 case SIOCSHWTSTAMP:
fd468c74 3394 case SIOCGHWTSTAMP:
590d4693 3395 return compat_ifr_data_ioctl(net, cmd, argp);
6b96018b
AB
3396
3397 case FIOSETOWN:
3398 case SIOCSPGRP:
3399 case FIOGETOWN:
3400 case SIOCGPGRP:
3401 case SIOCBRADDBR:
3402 case SIOCBRDELBR:
3403 case SIOCGIFVLAN:
3404 case SIOCSIFVLAN:
c62cce2c 3405 case SIOCGSKNS:
0768e170
AB
3406 case SIOCGSTAMP_NEW:
3407 case SIOCGSTAMPNS_NEW:
876f0bf9 3408 case SIOCGIFCONF:
fd3a4590
RP
3409 case SIOCSIFBR:
3410 case SIOCGIFBR:
6b96018b
AB
3411 return sock_ioctl(file, cmd, arg);
3412
3413 case SIOCGIFFLAGS:
3414 case SIOCSIFFLAGS:
709566d7
AB
3415 case SIOCGIFMAP:
3416 case SIOCSIFMAP:
6b96018b
AB
3417 case SIOCGIFMETRIC:
3418 case SIOCSIFMETRIC:
3419 case SIOCGIFMTU:
3420 case SIOCSIFMTU:
3421 case SIOCGIFMEM:
3422 case SIOCSIFMEM:
3423 case SIOCGIFHWADDR:
3424 case SIOCSIFHWADDR:
3425 case SIOCADDMULTI:
3426 case SIOCDELMULTI:
3427 case SIOCGIFINDEX:
6b96018b
AB
3428 case SIOCGIFADDR:
3429 case SIOCSIFADDR:
3430 case SIOCSIFHWBROADCAST:
6b96018b 3431 case SIOCDIFADDR:
6b96018b
AB
3432 case SIOCGIFBRDADDR:
3433 case SIOCSIFBRDADDR:
3434 case SIOCGIFDSTADDR:
3435 case SIOCSIFDSTADDR:
3436 case SIOCGIFNETMASK:
3437 case SIOCSIFNETMASK:
3438 case SIOCSIFPFLAGS:
3439 case SIOCGIFPFLAGS:
3440 case SIOCGIFTXQLEN:
3441 case SIOCSIFTXQLEN:
3442 case SIOCBRADDIF:
3443 case SIOCBRDELIF:
c6c9fee3 3444 case SIOCGIFNAME:
9177efd3
AB
3445 case SIOCSIFNAME:
3446 case SIOCGMIIPHY:
3447 case SIOCGMIIREG:
3448 case SIOCSMIIREG:
f92d4fc9
AV
3449 case SIOCBONDENSLAVE:
3450 case SIOCBONDRELEASE:
3451 case SIOCBONDSETHWADDR:
3452 case SIOCBONDCHANGEACTIVE:
6b96018b
AB
3453 case SIOCSARP:
3454 case SIOCGARP:
3455 case SIOCDARP:
c7dc504e 3456 case SIOCOUTQ:
9d7bf41f 3457 case SIOCOUTQNSD:
6b96018b 3458 case SIOCATMARK:
63ff03ab 3459 return sock_do_ioctl(net, sock, cmd, arg);
9177efd3
AB
3460 }
3461
6b96018b
AB
3462 return -ENOIOCTLCMD;
3463}
7a229387 3464
95c96174 3465static long compat_sock_ioctl(struct file *file, unsigned int cmd,
89bddce5 3466 unsigned long arg)
89bbfc95
SP
3467{
3468 struct socket *sock = file->private_data;
1ded5e5a 3469 const struct proto_ops *ops = READ_ONCE(sock->ops);
89bbfc95 3470 int ret = -ENOIOCTLCMD;
87de87d5
DM
3471 struct sock *sk;
3472 struct net *net;
3473
3474 sk = sock->sk;
3475 net = sock_net(sk);
89bbfc95 3476
1ded5e5a
ED
3477 if (ops->compat_ioctl)
3478 ret = ops->compat_ioctl(sock, cmd, arg);
89bbfc95 3479
87de87d5
DM
3480 if (ret == -ENOIOCTLCMD &&
3481 (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST))
3482 ret = compat_wext_handle_ioctl(net, cmd, arg);
3483
6b96018b
AB
3484 if (ret == -ENOIOCTLCMD)
3485 ret = compat_sock_ioctl_trans(file, sock, cmd, arg);
3486
89bbfc95
SP
3487 return ret;
3488}
3489#endif
3490
8a3c245c
PT
3491/**
3492 * kernel_bind - bind an address to a socket (kernel space)
3493 * @sock: socket
3494 * @addr: address
3495 * @addrlen: length of address
3496 *
3497 * Returns 0 or an error.
3498 */
3499
ac5a488e
SS
3500int kernel_bind(struct socket *sock, struct sockaddr *addr, int addrlen)
3501{
1ded5e5a 3502 return READ_ONCE(sock->ops)->bind(sock, addr, addrlen);
ac5a488e 3503}
c6d409cf 3504EXPORT_SYMBOL(kernel_bind);
ac5a488e 3505
8a3c245c
PT
3506/**
3507 * kernel_listen - move socket to listening state (kernel space)
3508 * @sock: socket
3509 * @backlog: pending connections queue size
3510 *
3511 * Returns 0 or an error.
3512 */
3513
ac5a488e
SS
3514int kernel_listen(struct socket *sock, int backlog)
3515{
1ded5e5a 3516 return READ_ONCE(sock->ops)->listen(sock, backlog);
ac5a488e 3517}
c6d409cf 3518EXPORT_SYMBOL(kernel_listen);
ac5a488e 3519
8a3c245c
PT
3520/**
3521 * kernel_accept - accept a connection (kernel space)
3522 * @sock: listening socket
3523 * @newsock: new connected socket
3524 * @flags: flags
3525 *
3526 * @flags must be SOCK_CLOEXEC, SOCK_NONBLOCK or 0.
3527 * If it fails, @newsock is guaranteed to be %NULL.
3528 * Returns 0 or an error.
3529 */
3530
ac5a488e
SS
3531int kernel_accept(struct socket *sock, struct socket **newsock, int flags)
3532{
3533 struct sock *sk = sock->sk;
1ded5e5a 3534 const struct proto_ops *ops = READ_ONCE(sock->ops);
ac5a488e
SS
3535 int err;
3536
3537 err = sock_create_lite(sk->sk_family, sk->sk_type, sk->sk_protocol,
3538 newsock);
3539 if (err < 0)
3540 goto done;
3541
1ded5e5a 3542 err = ops->accept(sock, *newsock, flags, true);
ac5a488e
SS
3543 if (err < 0) {
3544 sock_release(*newsock);
fa8705b0 3545 *newsock = NULL;
ac5a488e
SS
3546 goto done;
3547 }
3548
1ded5e5a
ED
3549 (*newsock)->ops = ops;
3550 __module_get(ops->owner);
ac5a488e
SS
3551
3552done:
3553 return err;
3554}
c6d409cf 3555EXPORT_SYMBOL(kernel_accept);
ac5a488e 3556
8a3c245c
PT
3557/**
3558 * kernel_connect - connect a socket (kernel space)
3559 * @sock: socket
3560 * @addr: address
3561 * @addrlen: address length
3562 * @flags: flags (O_NONBLOCK, ...)
3563 *
f1dcffcc 3564 * For datagram sockets, @addr is the address to which datagrams are sent
8a3c245c
PT
3565 * by default, and the only address from which datagrams are received.
3566 * For stream sockets, attempts to connect to @addr.
3567 * Returns 0 or an error code.
3568 */
3569
ac5a488e 3570int kernel_connect(struct socket *sock, struct sockaddr *addr, int addrlen,
4768fbcb 3571 int flags)
ac5a488e 3572{
0bdf3993
JR
3573 struct sockaddr_storage address;
3574
3575 memcpy(&address, addr, addrlen);
3576
3577 return READ_ONCE(sock->ops)->connect(sock, (struct sockaddr *)&address,
3578 addrlen, flags);
ac5a488e 3579}
c6d409cf 3580EXPORT_SYMBOL(kernel_connect);
ac5a488e 3581
8a3c245c
PT
3582/**
3583 * kernel_getsockname - get the address which the socket is bound (kernel space)
3584 * @sock: socket
3585 * @addr: address holder
3586 *
3587 * Fills the @addr pointer with the address which the socket is bound.
0fc95dec 3588 * Returns the length of the address in bytes or an error code.
8a3c245c
PT
3589 */
3590
9b2c45d4 3591int kernel_getsockname(struct socket *sock, struct sockaddr *addr)
ac5a488e 3592{
1ded5e5a 3593 return READ_ONCE(sock->ops)->getname(sock, addr, 0);
ac5a488e 3594}
c6d409cf 3595EXPORT_SYMBOL(kernel_getsockname);
ac5a488e 3596
8a3c245c 3597/**
645f0897 3598 * kernel_getpeername - get the address which the socket is connected (kernel space)
8a3c245c
PT
3599 * @sock: socket
3600 * @addr: address holder
3601 *
3602 * Fills the @addr pointer with the address which the socket is connected.
0fc95dec 3603 * Returns the length of the address in bytes or an error code.
8a3c245c
PT
3604 */
3605
9b2c45d4 3606int kernel_getpeername(struct socket *sock, struct sockaddr *addr)
ac5a488e 3607{
1ded5e5a 3608 return READ_ONCE(sock->ops)->getname(sock, addr, 1);
ac5a488e 3609}
c6d409cf 3610EXPORT_SYMBOL(kernel_getpeername);
ac5a488e 3611
8a3c245c 3612/**
645f0897 3613 * kernel_sock_shutdown - shut down part of a full-duplex connection (kernel space)
8a3c245c
PT
3614 * @sock: socket
3615 * @how: connection part
3616 *
3617 * Returns 0 or an error.
3618 */
3619
91cf45f0
TM
3620int kernel_sock_shutdown(struct socket *sock, enum sock_shutdown_cmd how)
3621{
1ded5e5a 3622 return READ_ONCE(sock->ops)->shutdown(sock, how);
91cf45f0 3623}
91cf45f0 3624EXPORT_SYMBOL(kernel_sock_shutdown);
113c3075 3625
8a3c245c
PT
3626/**
3627 * kernel_sock_ip_overhead - returns the IP overhead imposed by a socket
3628 * @sk: socket
3629 *
3630 * This routine returns the IP overhead imposed by a socket i.e.
3631 * the length of the underlying IP header, depending on whether
3632 * this is an IPv4 or IPv6 socket and the length from IP options turned
3633 * on at the socket. Assumes that the caller has a lock on the socket.
113c3075 3634 */
8a3c245c 3635
113c3075
P
3636u32 kernel_sock_ip_overhead(struct sock *sk)
3637{
3638 struct inet_sock *inet;
3639 struct ip_options_rcu *opt;
3640 u32 overhead = 0;
113c3075
P
3641#if IS_ENABLED(CONFIG_IPV6)
3642 struct ipv6_pinfo *np;
3643 struct ipv6_txoptions *optv6 = NULL;
3644#endif /* IS_ENABLED(CONFIG_IPV6) */
3645
3646 if (!sk)
3647 return overhead;
3648
113c3075
P
3649 switch (sk->sk_family) {
3650 case AF_INET:
3651 inet = inet_sk(sk);
3652 overhead += sizeof(struct iphdr);
3653 opt = rcu_dereference_protected(inet->inet_opt,
614d79c0 3654 sock_owned_by_user(sk));
113c3075
P
3655 if (opt)
3656 overhead += opt->opt.optlen;
3657 return overhead;
3658#if IS_ENABLED(CONFIG_IPV6)
3659 case AF_INET6:
3660 np = inet6_sk(sk);
3661 overhead += sizeof(struct ipv6hdr);
3662 if (np)
3663 optv6 = rcu_dereference_protected(np->opt,
614d79c0 3664 sock_owned_by_user(sk));
113c3075
P
3665 if (optv6)
3666 overhead += (optv6->opt_flen + optv6->opt_nflen);
3667 return overhead;
3668#endif /* IS_ENABLED(CONFIG_IPV6) */
3669 default: /* Returns 0 overhead if the socket is not ipv4 or ipv6 */
3670 return overhead;
3671 }
3672}
3673EXPORT_SYMBOL(kernel_sock_ip_overhead);