Merge branch '100GbE' of git://git.kernel.org/pub/scm/linux/kernel/git/jkirsher/next...
[linux-2.6-block.git] / net / socket.c
CommitLineData
1da177e4
LT
1/*
2 * NET An implementation of the SOCKET network access protocol.
3 *
4 * Version: @(#)socket.c 1.1.93 18/02/95
5 *
6 * Authors: Orest Zborowski, <obz@Kodak.COM>
02c30a84 7 * Ross Biro
1da177e4
LT
8 * Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
9 *
10 * Fixes:
11 * Anonymous : NOTSOCK/BADF cleanup. Error fix in
12 * shutdown()
13 * Alan Cox : verify_area() fixes
14 * Alan Cox : Removed DDI
15 * Jonathan Kamens : SOCK_DGRAM reconnect bug
16 * Alan Cox : Moved a load of checks to the very
17 * top level.
18 * Alan Cox : Move address structures to/from user
19 * mode above the protocol layers.
20 * Rob Janssen : Allow 0 length sends.
21 * Alan Cox : Asynchronous I/O support (cribbed from the
22 * tty drivers).
23 * Niibe Yutaka : Asynchronous I/O for writes (4.4BSD style)
24 * Jeff Uphoff : Made max number of sockets command-line
25 * configurable.
26 * Matti Aarnio : Made the number of sockets dynamic,
27 * to be allocated when needed, and mr.
28 * Uphoff's max is used as max to be
29 * allowed to allocate.
30 * Linus : Argh. removed all the socket allocation
31 * altogether: it's in the inode now.
32 * Alan Cox : Made sock_alloc()/sock_release() public
33 * for NetROM and future kernel nfsd type
34 * stuff.
35 * Alan Cox : sendmsg/recvmsg basics.
36 * Tom Dyas : Export net symbols.
37 * Marcin Dalecki : Fixed problems with CONFIG_NET="n".
38 * Alan Cox : Added thread locking to sys_* calls
39 * for sockets. May have errors at the
40 * moment.
41 * Kevin Buhr : Fixed the dumb errors in the above.
42 * Andi Kleen : Some small cleanups, optimizations,
43 * and fixed a copy_from_user() bug.
44 * Tigran Aivazian : sys_send(args) calls sys_sendto(args, NULL, 0)
89bddce5 45 * Tigran Aivazian : Made listen(2) backlog sanity checks
1da177e4
LT
46 * protocol-independent
47 *
48 *
49 * This program is free software; you can redistribute it and/or
50 * modify it under the terms of the GNU General Public License
51 * as published by the Free Software Foundation; either version
52 * 2 of the License, or (at your option) any later version.
53 *
54 *
55 * This module is effectively the top level interface to the BSD socket
89bddce5 56 * paradigm.
1da177e4
LT
57 *
58 * Based upon Swansea University Computer Society NET3.039
59 */
60
1da177e4 61#include <linux/mm.h>
1da177e4
LT
62#include <linux/socket.h>
63#include <linux/file.h>
64#include <linux/net.h>
65#include <linux/interrupt.h>
aaca0bdc 66#include <linux/thread_info.h>
55737fda 67#include <linux/rcupdate.h>
1da177e4
LT
68#include <linux/netdevice.h>
69#include <linux/proc_fs.h>
70#include <linux/seq_file.h>
4a3e2f71 71#include <linux/mutex.h>
1da177e4 72#include <linux/if_bridge.h>
20380731
ACM
73#include <linux/if_frad.h>
74#include <linux/if_vlan.h>
408eccce 75#include <linux/ptp_classify.h>
1da177e4
LT
76#include <linux/init.h>
77#include <linux/poll.h>
78#include <linux/cache.h>
79#include <linux/module.h>
80#include <linux/highmem.h>
1da177e4
LT
81#include <linux/mount.h>
82#include <linux/security.h>
83#include <linux/syscalls.h>
84#include <linux/compat.h>
85#include <linux/kmod.h>
3ec3b2fb 86#include <linux/audit.h>
d86b5e0e 87#include <linux/wireless.h>
1b8d7ae4 88#include <linux/nsproxy.h>
1fd7317d 89#include <linux/magic.h>
5a0e3ad6 90#include <linux/slab.h>
600e1779 91#include <linux/xattr.h>
1da177e4 92
7c0f6ba6 93#include <linux/uaccess.h>
1da177e4
LT
94#include <asm/unistd.h>
95
96#include <net/compat.h>
87de87d5 97#include <net/wext.h>
f8451725 98#include <net/cls_cgroup.h>
1da177e4
LT
99
100#include <net/sock.h>
101#include <linux/netfilter.h>
102
6b96018b
AB
103#include <linux/if_tun.h>
104#include <linux/ipv6_route.h>
105#include <linux/route.h>
6b96018b
AB
106#include <linux/sockios.h>
107#include <linux/atalk.h>
076bb0c8 108#include <net/busy_poll.h>
f24b9be5 109#include <linux/errqueue.h>
06021292 110
e0d1095a 111#ifdef CONFIG_NET_RX_BUSY_POLL
64b0dc51
ET
112unsigned int sysctl_net_busy_read __read_mostly;
113unsigned int sysctl_net_busy_poll __read_mostly;
06021292 114#endif
6b96018b 115
8ae5e030
AV
116static ssize_t sock_read_iter(struct kiocb *iocb, struct iov_iter *to);
117static ssize_t sock_write_iter(struct kiocb *iocb, struct iov_iter *from);
89bddce5 118static int sock_mmap(struct file *file, struct vm_area_struct *vma);
1da177e4
LT
119
120static int sock_close(struct inode *inode, struct file *file);
121static unsigned int sock_poll(struct file *file,
122 struct poll_table_struct *wait);
89bddce5 123static long sock_ioctl(struct file *file, unsigned int cmd, unsigned long arg);
89bbfc95
SP
124#ifdef CONFIG_COMPAT
125static long compat_sock_ioctl(struct file *file,
89bddce5 126 unsigned int cmd, unsigned long arg);
89bbfc95 127#endif
1da177e4 128static int sock_fasync(int fd, struct file *filp, int on);
1da177e4
LT
129static ssize_t sock_sendpage(struct file *file, struct page *page,
130 int offset, size_t size, loff_t *ppos, int more);
9c55e01c 131static ssize_t sock_splice_read(struct file *file, loff_t *ppos,
c6d409cf 132 struct pipe_inode_info *pipe, size_t len,
9c55e01c 133 unsigned int flags);
1da177e4 134
1da177e4
LT
135/*
136 * Socket files have a set of 'special' operations as well as the generic file ones. These don't appear
137 * in the operation structures but are done directly via the socketcall() multiplexor.
138 */
139
da7071d7 140static const struct file_operations socket_file_ops = {
1da177e4
LT
141 .owner = THIS_MODULE,
142 .llseek = no_llseek,
8ae5e030
AV
143 .read_iter = sock_read_iter,
144 .write_iter = sock_write_iter,
1da177e4
LT
145 .poll = sock_poll,
146 .unlocked_ioctl = sock_ioctl,
89bbfc95
SP
147#ifdef CONFIG_COMPAT
148 .compat_ioctl = compat_sock_ioctl,
149#endif
1da177e4 150 .mmap = sock_mmap,
1da177e4
LT
151 .release = sock_close,
152 .fasync = sock_fasync,
5274f052
JA
153 .sendpage = sock_sendpage,
154 .splice_write = generic_splice_sendpage,
9c55e01c 155 .splice_read = sock_splice_read,
1da177e4
LT
156};
157
158/*
159 * The protocol list. Each protocol is registered in here.
160 */
161
1da177e4 162static DEFINE_SPINLOCK(net_family_lock);
190683a9 163static const struct net_proto_family __rcu *net_families[NPROTO] __read_mostly;
1da177e4 164
1da177e4 165/*
89bddce5
SH
166 * Support routines.
167 * Move socket addresses back and forth across the kernel/user
168 * divide and look after the messy bits.
1da177e4
LT
169 */
170
1da177e4
LT
171/**
172 * move_addr_to_kernel - copy a socket address into kernel space
173 * @uaddr: Address in user space
174 * @kaddr: Address in kernel space
175 * @ulen: Length in user space
176 *
177 * The address is copied into kernel space. If the provided address is
178 * too long an error code of -EINVAL is returned. If the copy gives
179 * invalid addresses -EFAULT is returned. On a success 0 is returned.
180 */
181
43db362d 182int move_addr_to_kernel(void __user *uaddr, int ulen, struct sockaddr_storage *kaddr)
1da177e4 183{
230b1839 184 if (ulen < 0 || ulen > sizeof(struct sockaddr_storage))
1da177e4 185 return -EINVAL;
89bddce5 186 if (ulen == 0)
1da177e4 187 return 0;
89bddce5 188 if (copy_from_user(kaddr, uaddr, ulen))
1da177e4 189 return -EFAULT;
3ec3b2fb 190 return audit_sockaddr(ulen, kaddr);
1da177e4
LT
191}
192
193/**
194 * move_addr_to_user - copy an address to user space
195 * @kaddr: kernel space address
196 * @klen: length of address in kernel
197 * @uaddr: user space address
198 * @ulen: pointer to user length field
199 *
200 * The value pointed to by ulen on entry is the buffer length available.
201 * This is overwritten with the buffer space used. -EINVAL is returned
202 * if an overlong buffer is specified or a negative buffer size. -EFAULT
203 * is returned if either the buffer or the length field are not
204 * accessible.
205 * After copying the data up to the limit the user specifies, the true
206 * length of the data is written over the length limit the user
207 * specified. Zero is returned for a success.
208 */
89bddce5 209
43db362d 210static int move_addr_to_user(struct sockaddr_storage *kaddr, int klen,
11165f14 211 void __user *uaddr, int __user *ulen)
1da177e4
LT
212{
213 int err;
214 int len;
215
68c6beb3 216 BUG_ON(klen > sizeof(struct sockaddr_storage));
89bddce5
SH
217 err = get_user(len, ulen);
218 if (err)
1da177e4 219 return err;
89bddce5
SH
220 if (len > klen)
221 len = klen;
68c6beb3 222 if (len < 0)
1da177e4 223 return -EINVAL;
89bddce5 224 if (len) {
d6fe3945
SG
225 if (audit_sockaddr(klen, kaddr))
226 return -ENOMEM;
89bddce5 227 if (copy_to_user(uaddr, kaddr, len))
1da177e4
LT
228 return -EFAULT;
229 }
230 /*
89bddce5
SH
231 * "fromlen shall refer to the value before truncation.."
232 * 1003.1g
1da177e4
LT
233 */
234 return __put_user(klen, ulen);
235}
236
e18b890b 237static struct kmem_cache *sock_inode_cachep __read_mostly;
1da177e4
LT
238
239static struct inode *sock_alloc_inode(struct super_block *sb)
240{
241 struct socket_alloc *ei;
eaefd110 242 struct socket_wq *wq;
89bddce5 243
e94b1766 244 ei = kmem_cache_alloc(sock_inode_cachep, GFP_KERNEL);
1da177e4
LT
245 if (!ei)
246 return NULL;
eaefd110
ED
247 wq = kmalloc(sizeof(*wq), GFP_KERNEL);
248 if (!wq) {
43815482
ED
249 kmem_cache_free(sock_inode_cachep, ei);
250 return NULL;
251 }
eaefd110
ED
252 init_waitqueue_head(&wq->wait);
253 wq->fasync_list = NULL;
574aab1e 254 wq->flags = 0;
eaefd110 255 RCU_INIT_POINTER(ei->socket.wq, wq);
89bddce5 256
1da177e4
LT
257 ei->socket.state = SS_UNCONNECTED;
258 ei->socket.flags = 0;
259 ei->socket.ops = NULL;
260 ei->socket.sk = NULL;
261 ei->socket.file = NULL;
1da177e4
LT
262
263 return &ei->vfs_inode;
264}
265
266static void sock_destroy_inode(struct inode *inode)
267{
43815482 268 struct socket_alloc *ei;
eaefd110 269 struct socket_wq *wq;
43815482
ED
270
271 ei = container_of(inode, struct socket_alloc, vfs_inode);
eaefd110 272 wq = rcu_dereference_protected(ei->socket.wq, 1);
61845220 273 kfree_rcu(wq, rcu);
43815482 274 kmem_cache_free(sock_inode_cachep, ei);
1da177e4
LT
275}
276
51cc5068 277static void init_once(void *foo)
1da177e4 278{
89bddce5 279 struct socket_alloc *ei = (struct socket_alloc *)foo;
1da177e4 280
a35afb83 281 inode_init_once(&ei->vfs_inode);
1da177e4 282}
89bddce5 283
1e911632 284static void init_inodecache(void)
1da177e4
LT
285{
286 sock_inode_cachep = kmem_cache_create("sock_inode_cache",
89bddce5
SH
287 sizeof(struct socket_alloc),
288 0,
289 (SLAB_HWCACHE_ALIGN |
290 SLAB_RECLAIM_ACCOUNT |
5d097056 291 SLAB_MEM_SPREAD | SLAB_ACCOUNT),
20c2df83 292 init_once);
1e911632 293 BUG_ON(sock_inode_cachep == NULL);
1da177e4
LT
294}
295
b87221de 296static const struct super_operations sockfs_ops = {
c6d409cf
ED
297 .alloc_inode = sock_alloc_inode,
298 .destroy_inode = sock_destroy_inode,
299 .statfs = simple_statfs,
1da177e4
LT
300};
301
c23fbb6b
ED
302/*
303 * sockfs_dname() is called from d_path().
304 */
305static char *sockfs_dname(struct dentry *dentry, char *buffer, int buflen)
306{
307 return dynamic_dname(dentry, buffer, buflen, "socket:[%lu]",
c5ef6035 308 d_inode(dentry)->i_ino);
c23fbb6b
ED
309}
310
3ba13d17 311static const struct dentry_operations sockfs_dentry_operations = {
c23fbb6b 312 .d_dname = sockfs_dname,
1da177e4
LT
313};
314
bba0bd31
AG
315static int sockfs_xattr_get(const struct xattr_handler *handler,
316 struct dentry *dentry, struct inode *inode,
317 const char *suffix, void *value, size_t size)
318{
319 if (value) {
320 if (dentry->d_name.len + 1 > size)
321 return -ERANGE;
322 memcpy(value, dentry->d_name.name, dentry->d_name.len + 1);
323 }
324 return dentry->d_name.len + 1;
325}
326
327#define XATTR_SOCKPROTONAME_SUFFIX "sockprotoname"
328#define XATTR_NAME_SOCKPROTONAME (XATTR_SYSTEM_PREFIX XATTR_SOCKPROTONAME_SUFFIX)
329#define XATTR_NAME_SOCKPROTONAME_LEN (sizeof(XATTR_NAME_SOCKPROTONAME)-1)
330
331static const struct xattr_handler sockfs_xattr_handler = {
332 .name = XATTR_NAME_SOCKPROTONAME,
333 .get = sockfs_xattr_get,
334};
335
4a590153
AG
336static int sockfs_security_xattr_set(const struct xattr_handler *handler,
337 struct dentry *dentry, struct inode *inode,
338 const char *suffix, const void *value,
339 size_t size, int flags)
340{
341 /* Handled by LSM. */
342 return -EAGAIN;
343}
344
345static const struct xattr_handler sockfs_security_xattr_handler = {
346 .prefix = XATTR_SECURITY_PREFIX,
347 .set = sockfs_security_xattr_set,
348};
349
bba0bd31
AG
350static const struct xattr_handler *sockfs_xattr_handlers[] = {
351 &sockfs_xattr_handler,
4a590153 352 &sockfs_security_xattr_handler,
bba0bd31
AG
353 NULL
354};
355
c74a1cbb
AV
356static struct dentry *sockfs_mount(struct file_system_type *fs_type,
357 int flags, const char *dev_name, void *data)
358{
bba0bd31
AG
359 return mount_pseudo_xattr(fs_type, "socket:", &sockfs_ops,
360 sockfs_xattr_handlers,
361 &sockfs_dentry_operations, SOCKFS_MAGIC);
c74a1cbb
AV
362}
363
364static struct vfsmount *sock_mnt __read_mostly;
365
366static struct file_system_type sock_fs_type = {
367 .name = "sockfs",
368 .mount = sockfs_mount,
369 .kill_sb = kill_anon_super,
370};
371
1da177e4
LT
372/*
373 * Obtains the first available file descriptor and sets it up for use.
374 *
39d8c1b6
DM
375 * These functions create file structures and maps them to fd space
376 * of the current process. On success it returns file descriptor
1da177e4
LT
377 * and file struct implicitly stored in sock->file.
378 * Note that another thread may close file descriptor before we return
379 * from this function. We use the fact that now we do not refer
380 * to socket after mapping. If one day we will need it, this
381 * function will increment ref. count on file by 1.
382 *
383 * In any case returned fd MAY BE not valid!
384 * This race condition is unavoidable
385 * with shared fd spaces, we cannot solve it inside kernel,
386 * but we take care of internal coherence yet.
387 */
388
aab174f0 389struct file *sock_alloc_file(struct socket *sock, int flags, const char *dname)
1da177e4 390{
7cbe66b6 391 struct qstr name = { .name = "" };
2c48b9c4 392 struct path path;
7cbe66b6 393 struct file *file;
1da177e4 394
600e1779
MY
395 if (dname) {
396 name.name = dname;
397 name.len = strlen(name.name);
398 } else if (sock->sk) {
399 name.name = sock->sk->sk_prot_creator->name;
400 name.len = strlen(name.name);
401 }
4b936885 402 path.dentry = d_alloc_pseudo(sock_mnt->mnt_sb, &name);
8e1611e2
AV
403 if (unlikely(!path.dentry)) {
404 sock_release(sock);
28407630 405 return ERR_PTR(-ENOMEM);
8e1611e2 406 }
2c48b9c4 407 path.mnt = mntget(sock_mnt);
39d8c1b6 408
2c48b9c4 409 d_instantiate(path.dentry, SOCK_INODE(sock));
39d8c1b6 410
2c48b9c4 411 file = alloc_file(&path, FMODE_READ | FMODE_WRITE,
ce8d2cdf 412 &socket_file_ops);
b5ffe634 413 if (IS_ERR(file)) {
8e1611e2 414 /* drop dentry, keep inode for a bit */
c5ef6035 415 ihold(d_inode(path.dentry));
2c48b9c4 416 path_put(&path);
8e1611e2
AV
417 /* ... and now kill it properly */
418 sock_release(sock);
39b65252 419 return file;
cc3808f8
AV
420 }
421
422 sock->file = file;
77d27200 423 file->f_flags = O_RDWR | (flags & O_NONBLOCK);
39d8c1b6 424 file->private_data = sock;
28407630 425 return file;
39d8c1b6 426}
56b31d1c 427EXPORT_SYMBOL(sock_alloc_file);
39d8c1b6 428
56b31d1c 429static int sock_map_fd(struct socket *sock, int flags)
39d8c1b6
DM
430{
431 struct file *newfile;
28407630 432 int fd = get_unused_fd_flags(flags);
ce4bb04c
AV
433 if (unlikely(fd < 0)) {
434 sock_release(sock);
28407630 435 return fd;
ce4bb04c 436 }
39d8c1b6 437
aab174f0 438 newfile = sock_alloc_file(sock, flags, NULL);
28407630 439 if (likely(!IS_ERR(newfile))) {
39d8c1b6 440 fd_install(fd, newfile);
28407630
AV
441 return fd;
442 }
7cbe66b6 443
28407630
AV
444 put_unused_fd(fd);
445 return PTR_ERR(newfile);
1da177e4
LT
446}
447
406a3c63 448struct socket *sock_from_file(struct file *file, int *err)
6cb153ca 449{
6cb153ca
BL
450 if (file->f_op == &socket_file_ops)
451 return file->private_data; /* set in sock_map_fd */
452
23bb80d2
ED
453 *err = -ENOTSOCK;
454 return NULL;
6cb153ca 455}
406a3c63 456EXPORT_SYMBOL(sock_from_file);
6cb153ca 457
1da177e4 458/**
c6d409cf 459 * sockfd_lookup - Go from a file number to its socket slot
1da177e4
LT
460 * @fd: file handle
461 * @err: pointer to an error code return
462 *
463 * The file handle passed in is locked and the socket it is bound
241c4667 464 * to is returned. If an error occurs the err pointer is overwritten
1da177e4
LT
465 * with a negative errno code and NULL is returned. The function checks
466 * for both invalid handles and passing a handle which is not a socket.
467 *
468 * On a success the socket object pointer is returned.
469 */
470
471struct socket *sockfd_lookup(int fd, int *err)
472{
473 struct file *file;
1da177e4
LT
474 struct socket *sock;
475
89bddce5
SH
476 file = fget(fd);
477 if (!file) {
1da177e4
LT
478 *err = -EBADF;
479 return NULL;
480 }
89bddce5 481
6cb153ca
BL
482 sock = sock_from_file(file, err);
483 if (!sock)
1da177e4 484 fput(file);
6cb153ca
BL
485 return sock;
486}
c6d409cf 487EXPORT_SYMBOL(sockfd_lookup);
1da177e4 488
6cb153ca
BL
489static struct socket *sockfd_lookup_light(int fd, int *err, int *fput_needed)
490{
00e188ef 491 struct fd f = fdget(fd);
6cb153ca
BL
492 struct socket *sock;
493
3672558c 494 *err = -EBADF;
00e188ef
AV
495 if (f.file) {
496 sock = sock_from_file(f.file, err);
497 if (likely(sock)) {
498 *fput_needed = f.flags;
6cb153ca 499 return sock;
00e188ef
AV
500 }
501 fdput(f);
1da177e4 502 }
6cb153ca 503 return NULL;
1da177e4
LT
504}
505
600e1779
MY
506static ssize_t sockfs_listxattr(struct dentry *dentry, char *buffer,
507 size_t size)
508{
509 ssize_t len;
510 ssize_t used = 0;
511
c5ef6035 512 len = security_inode_listsecurity(d_inode(dentry), buffer, size);
600e1779
MY
513 if (len < 0)
514 return len;
515 used += len;
516 if (buffer) {
517 if (size < used)
518 return -ERANGE;
519 buffer += len;
520 }
521
522 len = (XATTR_NAME_SOCKPROTONAME_LEN + 1);
523 used += len;
524 if (buffer) {
525 if (size < used)
526 return -ERANGE;
527 memcpy(buffer, XATTR_NAME_SOCKPROTONAME, len);
528 buffer += len;
529 }
530
531 return used;
532}
533
dc647ec8 534static int sockfs_setattr(struct dentry *dentry, struct iattr *iattr)
86741ec2
LC
535{
536 int err = simple_setattr(dentry, iattr);
537
e1a3a60a 538 if (!err && (iattr->ia_valid & ATTR_UID)) {
86741ec2
LC
539 struct socket *sock = SOCKET_I(d_inode(dentry));
540
541 sock->sk->sk_uid = iattr->ia_uid;
542 }
543
544 return err;
545}
546
600e1779 547static const struct inode_operations sockfs_inode_ops = {
600e1779 548 .listxattr = sockfs_listxattr,
86741ec2 549 .setattr = sockfs_setattr,
600e1779
MY
550};
551
1da177e4
LT
552/**
553 * sock_alloc - allocate a socket
89bddce5 554 *
1da177e4
LT
555 * Allocate a new inode and socket object. The two are bound together
556 * and initialised. The socket is then returned. If we are out of inodes
557 * NULL is returned.
558 */
559
f4a00aac 560struct socket *sock_alloc(void)
1da177e4 561{
89bddce5
SH
562 struct inode *inode;
563 struct socket *sock;
1da177e4 564
a209dfc7 565 inode = new_inode_pseudo(sock_mnt->mnt_sb);
1da177e4
LT
566 if (!inode)
567 return NULL;
568
569 sock = SOCKET_I(inode);
570
85fe4025 571 inode->i_ino = get_next_ino();
89bddce5 572 inode->i_mode = S_IFSOCK | S_IRWXUGO;
8192b0c4
DH
573 inode->i_uid = current_fsuid();
574 inode->i_gid = current_fsgid();
600e1779 575 inode->i_op = &sockfs_inode_ops;
1da177e4 576
1da177e4
LT
577 return sock;
578}
f4a00aac 579EXPORT_SYMBOL(sock_alloc);
1da177e4 580
1da177e4
LT
581/**
582 * sock_release - close a socket
583 * @sock: socket to close
584 *
585 * The socket is released from the protocol stack if it has a release
586 * callback, and the inode is then released if the socket is bound to
89bddce5 587 * an inode not a file.
1da177e4 588 */
89bddce5 589
1da177e4
LT
590void sock_release(struct socket *sock)
591{
592 if (sock->ops) {
593 struct module *owner = sock->ops->owner;
594
595 sock->ops->release(sock);
596 sock->ops = NULL;
597 module_put(owner);
598 }
599
eaefd110 600 if (rcu_dereference_protected(sock->wq, 1)->fasync_list)
3410f22e 601 pr_err("%s: fasync list not empty!\n", __func__);
1da177e4 602
1da177e4
LT
603 if (!sock->file) {
604 iput(SOCK_INODE(sock));
605 return;
606 }
89bddce5 607 sock->file = NULL;
1da177e4 608}
c6d409cf 609EXPORT_SYMBOL(sock_release);
1da177e4 610
c14ac945 611void __sock_tx_timestamp(__u16 tsflags, __u8 *tx_flags)
20d49473 612{
140c55d4
ED
613 u8 flags = *tx_flags;
614
c14ac945 615 if (tsflags & SOF_TIMESTAMPING_TX_HARDWARE)
140c55d4
ED
616 flags |= SKBTX_HW_TSTAMP;
617
c14ac945 618 if (tsflags & SOF_TIMESTAMPING_TX_SOFTWARE)
140c55d4
ED
619 flags |= SKBTX_SW_TSTAMP;
620
c14ac945 621 if (tsflags & SOF_TIMESTAMPING_TX_SCHED)
140c55d4
ED
622 flags |= SKBTX_SCHED_TSTAMP;
623
140c55d4 624 *tx_flags = flags;
20d49473 625}
67cc0d40 626EXPORT_SYMBOL(__sock_tx_timestamp);
20d49473 627
d8725c86 628static inline int sock_sendmsg_nosec(struct socket *sock, struct msghdr *msg)
1da177e4 629{
01e97e65 630 int ret = sock->ops->sendmsg(sock, msg, msg_data_left(msg));
d8725c86
AV
631 BUG_ON(ret == -EIOCBQUEUED);
632 return ret;
1da177e4
LT
633}
634
d8725c86 635int sock_sendmsg(struct socket *sock, struct msghdr *msg)
228e548e 636{
d8725c86 637 int err = security_socket_sendmsg(sock, msg,
01e97e65 638 msg_data_left(msg));
228e548e 639
d8725c86 640 return err ?: sock_sendmsg_nosec(sock, msg);
0cf00c6f 641}
c6d409cf 642EXPORT_SYMBOL(sock_sendmsg);
1da177e4
LT
643
644int kernel_sendmsg(struct socket *sock, struct msghdr *msg,
645 struct kvec *vec, size_t num, size_t size)
646{
6aa24814 647 iov_iter_kvec(&msg->msg_iter, WRITE | ITER_KVEC, vec, num, size);
d8725c86 648 return sock_sendmsg(sock, msg);
1da177e4 649}
c6d409cf 650EXPORT_SYMBOL(kernel_sendmsg);
1da177e4 651
306b13eb
TH
652int kernel_sendmsg_locked(struct sock *sk, struct msghdr *msg,
653 struct kvec *vec, size_t num, size_t size)
654{
655 struct socket *sock = sk->sk_socket;
656
657 if (!sock->ops->sendmsg_locked)
db5980d8 658 return sock_no_sendmsg_locked(sk, msg, size);
306b13eb
TH
659
660 iov_iter_kvec(&msg->msg_iter, WRITE | ITER_KVEC, vec, num, size);
661
662 return sock->ops->sendmsg_locked(sk, msg, msg_data_left(msg));
663}
664EXPORT_SYMBOL(kernel_sendmsg_locked);
665
8605330a
SHY
666static bool skb_is_err_queue(const struct sk_buff *skb)
667{
668 /* pkt_type of skbs enqueued on the error queue are set to
669 * PACKET_OUTGOING in skb_set_err_queue(). This is only safe to do
670 * in recvmsg, since skbs received on a local socket will never
671 * have a pkt_type of PACKET_OUTGOING.
672 */
673 return skb->pkt_type == PACKET_OUTGOING;
674}
675
b50a5c70
ML
676/* On transmit, software and hardware timestamps are returned independently.
677 * As the two skb clones share the hardware timestamp, which may be updated
678 * before the software timestamp is received, a hardware TX timestamp may be
679 * returned only if there is no software TX timestamp. Ignore false software
680 * timestamps, which may be made in the __sock_recv_timestamp() call when the
681 * option SO_TIMESTAMP(NS) is enabled on the socket, even when the skb has a
682 * hardware timestamp.
683 */
684static bool skb_is_swtx_tstamp(const struct sk_buff *skb, int false_tstamp)
685{
686 return skb->tstamp && !false_tstamp && skb_is_err_queue(skb);
687}
688
aad9c8c4
ML
689static void put_ts_pktinfo(struct msghdr *msg, struct sk_buff *skb)
690{
691 struct scm_ts_pktinfo ts_pktinfo;
692 struct net_device *orig_dev;
693
694 if (!skb_mac_header_was_set(skb))
695 return;
696
697 memset(&ts_pktinfo, 0, sizeof(ts_pktinfo));
698
699 rcu_read_lock();
700 orig_dev = dev_get_by_napi_id(skb_napi_id(skb));
701 if (orig_dev)
702 ts_pktinfo.if_index = orig_dev->ifindex;
703 rcu_read_unlock();
704
705 ts_pktinfo.pkt_length = skb->len - skb_mac_offset(skb);
706 put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMPING_PKTINFO,
707 sizeof(ts_pktinfo), &ts_pktinfo);
708}
709
92f37fd2
ED
710/*
711 * called from sock_recv_timestamp() if sock_flag(sk, SOCK_RCVTSTAMP)
712 */
713void __sock_recv_timestamp(struct msghdr *msg, struct sock *sk,
714 struct sk_buff *skb)
715{
20d49473 716 int need_software_tstamp = sock_flag(sk, SOCK_RCVTSTAMP);
f24b9be5 717 struct scm_timestamping tss;
b50a5c70 718 int empty = 1, false_tstamp = 0;
20d49473
PO
719 struct skb_shared_hwtstamps *shhwtstamps =
720 skb_hwtstamps(skb);
721
722 /* Race occurred between timestamp enabling and packet
723 receiving. Fill in the current time for now. */
b50a5c70 724 if (need_software_tstamp && skb->tstamp == 0) {
20d49473 725 __net_timestamp(skb);
b50a5c70
ML
726 false_tstamp = 1;
727 }
20d49473
PO
728
729 if (need_software_tstamp) {
730 if (!sock_flag(sk, SOCK_RCVTSTAMPNS)) {
731 struct timeval tv;
732 skb_get_timestamp(skb, &tv);
733 put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMP,
734 sizeof(tv), &tv);
735 } else {
f24b9be5
WB
736 struct timespec ts;
737 skb_get_timestampns(skb, &ts);
20d49473 738 put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMPNS,
f24b9be5 739 sizeof(ts), &ts);
20d49473
PO
740 }
741 }
742
f24b9be5 743 memset(&tss, 0, sizeof(tss));
c199105d 744 if ((sk->sk_tsflags & SOF_TIMESTAMPING_SOFTWARE) &&
f24b9be5 745 ktime_to_timespec_cond(skb->tstamp, tss.ts + 0))
20d49473 746 empty = 0;
4d276eb6 747 if (shhwtstamps &&
b9f40e21 748 (sk->sk_tsflags & SOF_TIMESTAMPING_RAW_HARDWARE) &&
b50a5c70 749 !skb_is_swtx_tstamp(skb, false_tstamp) &&
aad9c8c4 750 ktime_to_timespec_cond(shhwtstamps->hwtstamp, tss.ts + 2)) {
4d276eb6 751 empty = 0;
aad9c8c4
ML
752 if ((sk->sk_tsflags & SOF_TIMESTAMPING_OPT_PKTINFO) &&
753 !skb_is_err_queue(skb))
754 put_ts_pktinfo(msg, skb);
755 }
1c885808 756 if (!empty) {
20d49473 757 put_cmsg(msg, SOL_SOCKET,
f24b9be5 758 SCM_TIMESTAMPING, sizeof(tss), &tss);
1c885808 759
8605330a 760 if (skb_is_err_queue(skb) && skb->len &&
4ef1b286 761 SKB_EXT_ERR(skb)->opt_stats)
1c885808
FY
762 put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMPING_OPT_STATS,
763 skb->len, skb->data);
764 }
92f37fd2 765}
7c81fd8b
ACM
766EXPORT_SYMBOL_GPL(__sock_recv_timestamp);
767
6e3e939f
JB
768void __sock_recv_wifi_status(struct msghdr *msg, struct sock *sk,
769 struct sk_buff *skb)
770{
771 int ack;
772
773 if (!sock_flag(sk, SOCK_WIFI_STATUS))
774 return;
775 if (!skb->wifi_acked_valid)
776 return;
777
778 ack = skb->wifi_acked;
779
780 put_cmsg(msg, SOL_SOCKET, SCM_WIFI_STATUS, sizeof(ack), &ack);
781}
782EXPORT_SYMBOL_GPL(__sock_recv_wifi_status);
783
11165f14 784static inline void sock_recv_drops(struct msghdr *msg, struct sock *sk,
785 struct sk_buff *skb)
3b885787 786{
744d5a3e 787 if (sock_flag(sk, SOCK_RXQ_OVFL) && skb && SOCK_SKB_CB(skb)->dropcount)
3b885787 788 put_cmsg(msg, SOL_SOCKET, SO_RXQ_OVFL,
744d5a3e 789 sizeof(__u32), &SOCK_SKB_CB(skb)->dropcount);
3b885787
NH
790}
791
767dd033 792void __sock_recv_ts_and_drops(struct msghdr *msg, struct sock *sk,
3b885787
NH
793 struct sk_buff *skb)
794{
795 sock_recv_timestamp(msg, sk, skb);
796 sock_recv_drops(msg, sk, skb);
797}
767dd033 798EXPORT_SYMBOL_GPL(__sock_recv_ts_and_drops);
3b885787 799
1b784140 800static inline int sock_recvmsg_nosec(struct socket *sock, struct msghdr *msg,
2da62906 801 int flags)
1da177e4 802{
2da62906 803 return sock->ops->recvmsg(sock, msg, msg_data_left(msg), flags);
1da177e4
LT
804}
805
2da62906 806int sock_recvmsg(struct socket *sock, struct msghdr *msg, int flags)
a2e27255 807{
2da62906 808 int err = security_socket_recvmsg(sock, msg, msg_data_left(msg), flags);
a2e27255 809
2da62906 810 return err ?: sock_recvmsg_nosec(sock, msg, flags);
1da177e4 811}
c6d409cf 812EXPORT_SYMBOL(sock_recvmsg);
1da177e4 813
c1249c0a
ML
814/**
815 * kernel_recvmsg - Receive a message from a socket (kernel space)
816 * @sock: The socket to receive the message from
817 * @msg: Received message
818 * @vec: Input s/g array for message data
819 * @num: Size of input s/g array
820 * @size: Number of bytes to read
821 * @flags: Message flags (MSG_DONTWAIT, etc...)
822 *
823 * On return the msg structure contains the scatter/gather array passed in the
824 * vec argument. The array is modified so that it consists of the unfilled
825 * portion of the original array.
826 *
827 * The returned value is the total number of bytes received, or an error.
828 */
89bddce5
SH
829int kernel_recvmsg(struct socket *sock, struct msghdr *msg,
830 struct kvec *vec, size_t num, size_t size, int flags)
1da177e4
LT
831{
832 mm_segment_t oldfs = get_fs();
833 int result;
834
6aa24814 835 iov_iter_kvec(&msg->msg_iter, READ | ITER_KVEC, vec, num, size);
1da177e4 836 set_fs(KERNEL_DS);
2da62906 837 result = sock_recvmsg(sock, msg, flags);
1da177e4
LT
838 set_fs(oldfs);
839 return result;
840}
c6d409cf 841EXPORT_SYMBOL(kernel_recvmsg);
1da177e4 842
ce1d4d3e
CH
843static ssize_t sock_sendpage(struct file *file, struct page *page,
844 int offset, size_t size, loff_t *ppos, int more)
1da177e4 845{
1da177e4
LT
846 struct socket *sock;
847 int flags;
848
ce1d4d3e
CH
849 sock = file->private_data;
850
35f9c09f
ED
851 flags = (file->f_flags & O_NONBLOCK) ? MSG_DONTWAIT : 0;
852 /* more is a combination of MSG_MORE and MSG_SENDPAGE_NOTLAST */
853 flags |= more;
ce1d4d3e 854
e6949583 855 return kernel_sendpage(sock, page, offset, size, flags);
ce1d4d3e 856}
1da177e4 857
9c55e01c 858static ssize_t sock_splice_read(struct file *file, loff_t *ppos,
c6d409cf 859 struct pipe_inode_info *pipe, size_t len,
9c55e01c
JA
860 unsigned int flags)
861{
862 struct socket *sock = file->private_data;
863
997b37da
RDC
864 if (unlikely(!sock->ops->splice_read))
865 return -EINVAL;
866
9c55e01c
JA
867 return sock->ops->splice_read(sock, ppos, pipe, len, flags);
868}
869
8ae5e030 870static ssize_t sock_read_iter(struct kiocb *iocb, struct iov_iter *to)
ce1d4d3e 871{
6d652330
AV
872 struct file *file = iocb->ki_filp;
873 struct socket *sock = file->private_data;
0345f931 874 struct msghdr msg = {.msg_iter = *to,
875 .msg_iocb = iocb};
8ae5e030 876 ssize_t res;
ce1d4d3e 877
8ae5e030
AV
878 if (file->f_flags & O_NONBLOCK)
879 msg.msg_flags = MSG_DONTWAIT;
880
881 if (iocb->ki_pos != 0)
1da177e4 882 return -ESPIPE;
027445c3 883
66ee59af 884 if (!iov_iter_count(to)) /* Match SYS5 behaviour */
1da177e4
LT
885 return 0;
886
2da62906 887 res = sock_recvmsg(sock, &msg, msg.msg_flags);
8ae5e030
AV
888 *to = msg.msg_iter;
889 return res;
1da177e4
LT
890}
891
8ae5e030 892static ssize_t sock_write_iter(struct kiocb *iocb, struct iov_iter *from)
ce1d4d3e 893{
6d652330
AV
894 struct file *file = iocb->ki_filp;
895 struct socket *sock = file->private_data;
0345f931 896 struct msghdr msg = {.msg_iter = *from,
897 .msg_iocb = iocb};
8ae5e030 898 ssize_t res;
1da177e4 899
8ae5e030 900 if (iocb->ki_pos != 0)
ce1d4d3e 901 return -ESPIPE;
027445c3 902
8ae5e030
AV
903 if (file->f_flags & O_NONBLOCK)
904 msg.msg_flags = MSG_DONTWAIT;
905
6d652330
AV
906 if (sock->type == SOCK_SEQPACKET)
907 msg.msg_flags |= MSG_EOR;
908
d8725c86 909 res = sock_sendmsg(sock, &msg);
8ae5e030
AV
910 *from = msg.msg_iter;
911 return res;
1da177e4
LT
912}
913
1da177e4
LT
914/*
915 * Atomic setting of ioctl hooks to avoid race
916 * with module unload.
917 */
918
4a3e2f71 919static DEFINE_MUTEX(br_ioctl_mutex);
c6d409cf 920static int (*br_ioctl_hook) (struct net *, unsigned int cmd, void __user *arg);
1da177e4 921
881d966b 922void brioctl_set(int (*hook) (struct net *, unsigned int, void __user *))
1da177e4 923{
4a3e2f71 924 mutex_lock(&br_ioctl_mutex);
1da177e4 925 br_ioctl_hook = hook;
4a3e2f71 926 mutex_unlock(&br_ioctl_mutex);
1da177e4
LT
927}
928EXPORT_SYMBOL(brioctl_set);
929
4a3e2f71 930static DEFINE_MUTEX(vlan_ioctl_mutex);
881d966b 931static int (*vlan_ioctl_hook) (struct net *, void __user *arg);
1da177e4 932
881d966b 933void vlan_ioctl_set(int (*hook) (struct net *, void __user *))
1da177e4 934{
4a3e2f71 935 mutex_lock(&vlan_ioctl_mutex);
1da177e4 936 vlan_ioctl_hook = hook;
4a3e2f71 937 mutex_unlock(&vlan_ioctl_mutex);
1da177e4
LT
938}
939EXPORT_SYMBOL(vlan_ioctl_set);
940
4a3e2f71 941static DEFINE_MUTEX(dlci_ioctl_mutex);
89bddce5 942static int (*dlci_ioctl_hook) (unsigned int, void __user *);
1da177e4 943
89bddce5 944void dlci_ioctl_set(int (*hook) (unsigned int, void __user *))
1da177e4 945{
4a3e2f71 946 mutex_lock(&dlci_ioctl_mutex);
1da177e4 947 dlci_ioctl_hook = hook;
4a3e2f71 948 mutex_unlock(&dlci_ioctl_mutex);
1da177e4
LT
949}
950EXPORT_SYMBOL(dlci_ioctl_set);
951
6b96018b
AB
952static long sock_do_ioctl(struct net *net, struct socket *sock,
953 unsigned int cmd, unsigned long arg)
954{
955 int err;
956 void __user *argp = (void __user *)arg;
957
958 err = sock->ops->ioctl(sock, cmd, arg);
959
960 /*
961 * If this ioctl is unknown try to hand it down
962 * to the NIC driver.
963 */
964 if (err == -ENOIOCTLCMD)
965 err = dev_ioctl(net, cmd, argp);
966
967 return err;
968}
969
1da177e4
LT
970/*
971 * With an ioctl, arg may well be a user mode pointer, but we don't know
972 * what to do with it - that's up to the protocol still.
973 */
974
c62cce2c
AV
975static struct ns_common *get_net_ns(struct ns_common *ns)
976{
977 return &get_net(container_of(ns, struct net, ns))->ns;
978}
979
1da177e4
LT
980static long sock_ioctl(struct file *file, unsigned cmd, unsigned long arg)
981{
982 struct socket *sock;
881d966b 983 struct sock *sk;
1da177e4
LT
984 void __user *argp = (void __user *)arg;
985 int pid, err;
881d966b 986 struct net *net;
1da177e4 987
b69aee04 988 sock = file->private_data;
881d966b 989 sk = sock->sk;
3b1e0a65 990 net = sock_net(sk);
1da177e4 991 if (cmd >= SIOCDEVPRIVATE && cmd <= (SIOCDEVPRIVATE + 15)) {
881d966b 992 err = dev_ioctl(net, cmd, argp);
1da177e4 993 } else
3d23e349 994#ifdef CONFIG_WEXT_CORE
1da177e4 995 if (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST) {
881d966b 996 err = dev_ioctl(net, cmd, argp);
1da177e4 997 } else
3d23e349 998#endif
89bddce5 999 switch (cmd) {
1da177e4
LT
1000 case FIOSETOWN:
1001 case SIOCSPGRP:
1002 err = -EFAULT;
1003 if (get_user(pid, (int __user *)argp))
1004 break;
393cc3f5 1005 err = f_setown(sock->file, pid, 1);
1da177e4
LT
1006 break;
1007 case FIOGETOWN:
1008 case SIOCGPGRP:
609d7fa9 1009 err = put_user(f_getown(sock->file),
89bddce5 1010 (int __user *)argp);
1da177e4
LT
1011 break;
1012 case SIOCGIFBR:
1013 case SIOCSIFBR:
1014 case SIOCBRADDBR:
1015 case SIOCBRDELBR:
1016 err = -ENOPKG;
1017 if (!br_ioctl_hook)
1018 request_module("bridge");
1019
4a3e2f71 1020 mutex_lock(&br_ioctl_mutex);
89bddce5 1021 if (br_ioctl_hook)
881d966b 1022 err = br_ioctl_hook(net, cmd, argp);
4a3e2f71 1023 mutex_unlock(&br_ioctl_mutex);
1da177e4
LT
1024 break;
1025 case SIOCGIFVLAN:
1026 case SIOCSIFVLAN:
1027 err = -ENOPKG;
1028 if (!vlan_ioctl_hook)
1029 request_module("8021q");
1030
4a3e2f71 1031 mutex_lock(&vlan_ioctl_mutex);
1da177e4 1032 if (vlan_ioctl_hook)
881d966b 1033 err = vlan_ioctl_hook(net, argp);
4a3e2f71 1034 mutex_unlock(&vlan_ioctl_mutex);
1da177e4 1035 break;
1da177e4
LT
1036 case SIOCADDDLCI:
1037 case SIOCDELDLCI:
1038 err = -ENOPKG;
1039 if (!dlci_ioctl_hook)
1040 request_module("dlci");
1041
7512cbf6
PE
1042 mutex_lock(&dlci_ioctl_mutex);
1043 if (dlci_ioctl_hook)
1da177e4 1044 err = dlci_ioctl_hook(cmd, argp);
7512cbf6 1045 mutex_unlock(&dlci_ioctl_mutex);
1da177e4 1046 break;
c62cce2c
AV
1047 case SIOCGSKNS:
1048 err = -EPERM;
1049 if (!ns_capable(net->user_ns, CAP_NET_ADMIN))
1050 break;
1051
1052 err = open_related_ns(&net->ns, get_net_ns);
1053 break;
1da177e4 1054 default:
6b96018b 1055 err = sock_do_ioctl(net, sock, cmd, arg);
1da177e4 1056 break;
89bddce5 1057 }
1da177e4
LT
1058 return err;
1059}
1060
1061int sock_create_lite(int family, int type, int protocol, struct socket **res)
1062{
1063 int err;
1064 struct socket *sock = NULL;
89bddce5 1065
1da177e4
LT
1066 err = security_socket_create(family, type, protocol, 1);
1067 if (err)
1068 goto out;
1069
1070 sock = sock_alloc();
1071 if (!sock) {
1072 err = -ENOMEM;
1073 goto out;
1074 }
1075
1da177e4 1076 sock->type = type;
7420ed23
VY
1077 err = security_socket_post_create(sock, family, type, protocol, 1);
1078 if (err)
1079 goto out_release;
1080
1da177e4
LT
1081out:
1082 *res = sock;
1083 return err;
7420ed23
VY
1084out_release:
1085 sock_release(sock);
1086 sock = NULL;
1087 goto out;
1da177e4 1088}
c6d409cf 1089EXPORT_SYMBOL(sock_create_lite);
1da177e4
LT
1090
1091/* No kernel lock held - perfect */
89bddce5 1092static unsigned int sock_poll(struct file *file, poll_table *wait)
1da177e4 1093{
cbf55001 1094 unsigned int busy_flag = 0;
1da177e4
LT
1095 struct socket *sock;
1096
1097 /*
89bddce5 1098 * We can't return errors to poll, so it's either yes or no.
1da177e4 1099 */
b69aee04 1100 sock = file->private_data;
2d48d67f 1101
cbf55001 1102 if (sk_can_busy_loop(sock->sk)) {
2d48d67f 1103 /* this socket can poll_ll so tell the system call */
cbf55001 1104 busy_flag = POLL_BUSY_LOOP;
2d48d67f
ET
1105
1106 /* once, only if requested by syscall */
cbf55001
ET
1107 if (wait && (wait->_key & POLL_BUSY_LOOP))
1108 sk_busy_loop(sock->sk, 1);
2d48d67f
ET
1109 }
1110
cbf55001 1111 return busy_flag | sock->ops->poll(file, sock, wait);
1da177e4
LT
1112}
1113
89bddce5 1114static int sock_mmap(struct file *file, struct vm_area_struct *vma)
1da177e4 1115{
b69aee04 1116 struct socket *sock = file->private_data;
1da177e4
LT
1117
1118 return sock->ops->mmap(file, sock, vma);
1119}
1120
20380731 1121static int sock_close(struct inode *inode, struct file *filp)
1da177e4 1122{
1da177e4
LT
1123 sock_release(SOCKET_I(inode));
1124 return 0;
1125}
1126
1127/*
1128 * Update the socket async list
1129 *
1130 * Fasync_list locking strategy.
1131 *
1132 * 1. fasync_list is modified only under process context socket lock
1133 * i.e. under semaphore.
1134 * 2. fasync_list is used under read_lock(&sk->sk_callback_lock)
989a2979 1135 * or under socket lock
1da177e4
LT
1136 */
1137
1138static int sock_fasync(int fd, struct file *filp, int on)
1139{
989a2979
ED
1140 struct socket *sock = filp->private_data;
1141 struct sock *sk = sock->sk;
eaefd110 1142 struct socket_wq *wq;
1da177e4 1143
989a2979 1144 if (sk == NULL)
1da177e4 1145 return -EINVAL;
1da177e4
LT
1146
1147 lock_sock(sk);
1e1d04e6 1148 wq = rcu_dereference_protected(sock->wq, lockdep_sock_is_held(sk));
eaefd110 1149 fasync_helper(fd, filp, on, &wq->fasync_list);
1da177e4 1150
eaefd110 1151 if (!wq->fasync_list)
989a2979
ED
1152 sock_reset_flag(sk, SOCK_FASYNC);
1153 else
bcdce719 1154 sock_set_flag(sk, SOCK_FASYNC);
1da177e4 1155
989a2979 1156 release_sock(sk);
1da177e4
LT
1157 return 0;
1158}
1159
ceb5d58b 1160/* This function may be called only under rcu_lock */
1da177e4 1161
ceb5d58b 1162int sock_wake_async(struct socket_wq *wq, int how, int band)
1da177e4 1163{
ceb5d58b 1164 if (!wq || !wq->fasync_list)
1da177e4 1165 return -1;
ceb5d58b 1166
89bddce5 1167 switch (how) {
8d8ad9d7 1168 case SOCK_WAKE_WAITD:
ceb5d58b 1169 if (test_bit(SOCKWQ_ASYNC_WAITDATA, &wq->flags))
1da177e4
LT
1170 break;
1171 goto call_kill;
8d8ad9d7 1172 case SOCK_WAKE_SPACE:
ceb5d58b 1173 if (!test_and_clear_bit(SOCKWQ_ASYNC_NOSPACE, &wq->flags))
1da177e4
LT
1174 break;
1175 /* fall through */
8d8ad9d7 1176 case SOCK_WAKE_IO:
89bddce5 1177call_kill:
43815482 1178 kill_fasync(&wq->fasync_list, SIGIO, band);
1da177e4 1179 break;
8d8ad9d7 1180 case SOCK_WAKE_URG:
43815482 1181 kill_fasync(&wq->fasync_list, SIGURG, band);
1da177e4 1182 }
ceb5d58b 1183
1da177e4
LT
1184 return 0;
1185}
c6d409cf 1186EXPORT_SYMBOL(sock_wake_async);
1da177e4 1187
721db93a 1188int __sock_create(struct net *net, int family, int type, int protocol,
89bddce5 1189 struct socket **res, int kern)
1da177e4
LT
1190{
1191 int err;
1192 struct socket *sock;
55737fda 1193 const struct net_proto_family *pf;
1da177e4
LT
1194
1195 /*
89bddce5 1196 * Check protocol is in range
1da177e4
LT
1197 */
1198 if (family < 0 || family >= NPROTO)
1199 return -EAFNOSUPPORT;
1200 if (type < 0 || type >= SOCK_MAX)
1201 return -EINVAL;
1202
1203 /* Compatibility.
1204
1205 This uglymoron is moved from INET layer to here to avoid
1206 deadlock in module load.
1207 */
1208 if (family == PF_INET && type == SOCK_PACKET) {
f3c98690 1209 pr_info_once("%s uses obsolete (PF_INET,SOCK_PACKET)\n",
1210 current->comm);
1da177e4
LT
1211 family = PF_PACKET;
1212 }
1213
1214 err = security_socket_create(family, type, protocol, kern);
1215 if (err)
1216 return err;
89bddce5 1217
55737fda
SH
1218 /*
1219 * Allocate the socket and allow the family to set things up. if
1220 * the protocol is 0, the family is instructed to select an appropriate
1221 * default.
1222 */
1223 sock = sock_alloc();
1224 if (!sock) {
e87cc472 1225 net_warn_ratelimited("socket: no more sockets\n");
55737fda
SH
1226 return -ENFILE; /* Not exactly a match, but its the
1227 closest posix thing */
1228 }
1229
1230 sock->type = type;
1231
95a5afca 1232#ifdef CONFIG_MODULES
89bddce5
SH
1233 /* Attempt to load a protocol module if the find failed.
1234 *
1235 * 12/09/1996 Marcin: But! this makes REALLY only sense, if the user
1da177e4
LT
1236 * requested real, full-featured networking support upon configuration.
1237 * Otherwise module support will break!
1238 */
190683a9 1239 if (rcu_access_pointer(net_families[family]) == NULL)
89bddce5 1240 request_module("net-pf-%d", family);
1da177e4
LT
1241#endif
1242
55737fda
SH
1243 rcu_read_lock();
1244 pf = rcu_dereference(net_families[family]);
1245 err = -EAFNOSUPPORT;
1246 if (!pf)
1247 goto out_release;
1da177e4
LT
1248
1249 /*
1250 * We will call the ->create function, that possibly is in a loadable
1251 * module, so we have to bump that loadable module refcnt first.
1252 */
55737fda 1253 if (!try_module_get(pf->owner))
1da177e4
LT
1254 goto out_release;
1255
55737fda
SH
1256 /* Now protected by module ref count */
1257 rcu_read_unlock();
1258
3f378b68 1259 err = pf->create(net, sock, protocol, kern);
55737fda 1260 if (err < 0)
1da177e4 1261 goto out_module_put;
a79af59e 1262
1da177e4
LT
1263 /*
1264 * Now to bump the refcnt of the [loadable] module that owns this
1265 * socket at sock_release time we decrement its refcnt.
1266 */
55737fda
SH
1267 if (!try_module_get(sock->ops->owner))
1268 goto out_module_busy;
1269
1da177e4
LT
1270 /*
1271 * Now that we're done with the ->create function, the [loadable]
1272 * module can have its refcnt decremented
1273 */
55737fda 1274 module_put(pf->owner);
7420ed23
VY
1275 err = security_socket_post_create(sock, family, type, protocol, kern);
1276 if (err)
3b185525 1277 goto out_sock_release;
55737fda 1278 *res = sock;
1da177e4 1279
55737fda
SH
1280 return 0;
1281
1282out_module_busy:
1283 err = -EAFNOSUPPORT;
1da177e4 1284out_module_put:
55737fda
SH
1285 sock->ops = NULL;
1286 module_put(pf->owner);
1287out_sock_release:
1da177e4 1288 sock_release(sock);
55737fda
SH
1289 return err;
1290
1291out_release:
1292 rcu_read_unlock();
1293 goto out_sock_release;
1da177e4 1294}
721db93a 1295EXPORT_SYMBOL(__sock_create);
1da177e4
LT
1296
1297int sock_create(int family, int type, int protocol, struct socket **res)
1298{
1b8d7ae4 1299 return __sock_create(current->nsproxy->net_ns, family, type, protocol, res, 0);
1da177e4 1300}
c6d409cf 1301EXPORT_SYMBOL(sock_create);
1da177e4 1302
eeb1bd5c 1303int sock_create_kern(struct net *net, int family, int type, int protocol, struct socket **res)
1da177e4 1304{
eeb1bd5c 1305 return __sock_create(net, family, type, protocol, res, 1);
1da177e4 1306}
c6d409cf 1307EXPORT_SYMBOL(sock_create_kern);
1da177e4 1308
3e0fa65f 1309SYSCALL_DEFINE3(socket, int, family, int, type, int, protocol)
1da177e4
LT
1310{
1311 int retval;
1312 struct socket *sock;
a677a039
UD
1313 int flags;
1314
e38b36f3
UD
1315 /* Check the SOCK_* constants for consistency. */
1316 BUILD_BUG_ON(SOCK_CLOEXEC != O_CLOEXEC);
1317 BUILD_BUG_ON((SOCK_MAX | SOCK_TYPE_MASK) != SOCK_TYPE_MASK);
1318 BUILD_BUG_ON(SOCK_CLOEXEC & SOCK_TYPE_MASK);
1319 BUILD_BUG_ON(SOCK_NONBLOCK & SOCK_TYPE_MASK);
1320
a677a039 1321 flags = type & ~SOCK_TYPE_MASK;
77d27200 1322 if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
a677a039
UD
1323 return -EINVAL;
1324 type &= SOCK_TYPE_MASK;
1da177e4 1325
aaca0bdc
UD
1326 if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
1327 flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
1328
1da177e4
LT
1329 retval = sock_create(family, type, protocol, &sock);
1330 if (retval < 0)
8e1611e2 1331 return retval;
1da177e4 1332
8e1611e2 1333 return sock_map_fd(sock, flags & (O_CLOEXEC | O_NONBLOCK));
1da177e4
LT
1334}
1335
1336/*
1337 * Create a pair of connected sockets.
1338 */
1339
3e0fa65f
HC
1340SYSCALL_DEFINE4(socketpair, int, family, int, type, int, protocol,
1341 int __user *, usockvec)
1da177e4
LT
1342{
1343 struct socket *sock1, *sock2;
1344 int fd1, fd2, err;
db349509 1345 struct file *newfile1, *newfile2;
a677a039
UD
1346 int flags;
1347
1348 flags = type & ~SOCK_TYPE_MASK;
77d27200 1349 if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
a677a039
UD
1350 return -EINVAL;
1351 type &= SOCK_TYPE_MASK;
1da177e4 1352
aaca0bdc
UD
1353 if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
1354 flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
1355
016a266b
AV
1356 /*
1357 * reserve descriptors and make sure we won't fail
1358 * to return them to userland.
1359 */
1360 fd1 = get_unused_fd_flags(flags);
1361 if (unlikely(fd1 < 0))
1362 return fd1;
1363
1364 fd2 = get_unused_fd_flags(flags);
1365 if (unlikely(fd2 < 0)) {
1366 put_unused_fd(fd1);
1367 return fd2;
1368 }
1369
1370 err = put_user(fd1, &usockvec[0]);
1371 if (err)
1372 goto out;
1373
1374 err = put_user(fd2, &usockvec[1]);
1375 if (err)
1376 goto out;
1377
1da177e4
LT
1378 /*
1379 * Obtain the first socket and check if the underlying protocol
1380 * supports the socketpair call.
1381 */
1382
1383 err = sock_create(family, type, protocol, &sock1);
016a266b 1384 if (unlikely(err < 0))
1da177e4
LT
1385 goto out;
1386
1387 err = sock_create(family, type, protocol, &sock2);
016a266b
AV
1388 if (unlikely(err < 0)) {
1389 sock_release(sock1);
1390 goto out;
bf3c23d1 1391 }
d73aa286 1392
016a266b
AV
1393 err = sock1->ops->socketpair(sock1, sock2);
1394 if (unlikely(err < 0)) {
1395 sock_release(sock2);
1396 sock_release(sock1);
1397 goto out;
28407630
AV
1398 }
1399
aab174f0 1400 newfile1 = sock_alloc_file(sock1, flags, NULL);
b5ffe634 1401 if (IS_ERR(newfile1)) {
28407630 1402 err = PTR_ERR(newfile1);
016a266b
AV
1403 sock_release(sock2);
1404 goto out;
28407630
AV
1405 }
1406
aab174f0 1407 newfile2 = sock_alloc_file(sock2, flags, NULL);
28407630
AV
1408 if (IS_ERR(newfile2)) {
1409 err = PTR_ERR(newfile2);
016a266b
AV
1410 fput(newfile1);
1411 goto out;
db349509
AV
1412 }
1413
157cf649 1414 audit_fd_pair(fd1, fd2);
d73aa286 1415
db349509
AV
1416 fd_install(fd1, newfile1);
1417 fd_install(fd2, newfile2);
d73aa286 1418 return 0;
1da177e4 1419
016a266b 1420out:
d73aa286 1421 put_unused_fd(fd2);
d73aa286 1422 put_unused_fd(fd1);
1da177e4
LT
1423 return err;
1424}
1425
1da177e4
LT
1426/*
1427 * Bind a name to a socket. Nothing much to do here since it's
1428 * the protocol's responsibility to handle the local address.
1429 *
1430 * We move the socket address to kernel space before we call
1431 * the protocol layer (having also checked the address is ok).
1432 */
1433
20f37034 1434SYSCALL_DEFINE3(bind, int, fd, struct sockaddr __user *, umyaddr, int, addrlen)
1da177e4
LT
1435{
1436 struct socket *sock;
230b1839 1437 struct sockaddr_storage address;
6cb153ca 1438 int err, fput_needed;
1da177e4 1439
89bddce5 1440 sock = sockfd_lookup_light(fd, &err, &fput_needed);
e71a4783 1441 if (sock) {
43db362d 1442 err = move_addr_to_kernel(umyaddr, addrlen, &address);
89bddce5
SH
1443 if (err >= 0) {
1444 err = security_socket_bind(sock,
230b1839 1445 (struct sockaddr *)&address,
89bddce5 1446 addrlen);
6cb153ca
BL
1447 if (!err)
1448 err = sock->ops->bind(sock,
89bddce5 1449 (struct sockaddr *)
230b1839 1450 &address, addrlen);
1da177e4 1451 }
6cb153ca 1452 fput_light(sock->file, fput_needed);
89bddce5 1453 }
1da177e4
LT
1454 return err;
1455}
1456
1da177e4
LT
1457/*
1458 * Perform a listen. Basically, we allow the protocol to do anything
1459 * necessary for a listen, and if that works, we mark the socket as
1460 * ready for listening.
1461 */
1462
3e0fa65f 1463SYSCALL_DEFINE2(listen, int, fd, int, backlog)
1da177e4
LT
1464{
1465 struct socket *sock;
6cb153ca 1466 int err, fput_needed;
b8e1f9b5 1467 int somaxconn;
89bddce5
SH
1468
1469 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1470 if (sock) {
8efa6e93 1471 somaxconn = sock_net(sock->sk)->core.sysctl_somaxconn;
95c96174 1472 if ((unsigned int)backlog > somaxconn)
b8e1f9b5 1473 backlog = somaxconn;
1da177e4
LT
1474
1475 err = security_socket_listen(sock, backlog);
6cb153ca
BL
1476 if (!err)
1477 err = sock->ops->listen(sock, backlog);
1da177e4 1478
6cb153ca 1479 fput_light(sock->file, fput_needed);
1da177e4
LT
1480 }
1481 return err;
1482}
1483
1da177e4
LT
1484/*
1485 * For accept, we attempt to create a new socket, set up the link
1486 * with the client, wake up the client, then return the new
1487 * connected fd. We collect the address of the connector in kernel
1488 * space and move it to user at the very end. This is unclean because
1489 * we open the socket then return an error.
1490 *
1491 * 1003.1g adds the ability to recvmsg() to query connection pending
1492 * status to recvmsg. We need to add that support in a way thats
1493 * clean when we restucture accept also.
1494 */
1495
20f37034
HC
1496SYSCALL_DEFINE4(accept4, int, fd, struct sockaddr __user *, upeer_sockaddr,
1497 int __user *, upeer_addrlen, int, flags)
1da177e4
LT
1498{
1499 struct socket *sock, *newsock;
39d8c1b6 1500 struct file *newfile;
6cb153ca 1501 int err, len, newfd, fput_needed;
230b1839 1502 struct sockaddr_storage address;
1da177e4 1503
77d27200 1504 if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
aaca0bdc
UD
1505 return -EINVAL;
1506
1507 if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
1508 flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
1509
6cb153ca 1510 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4
LT
1511 if (!sock)
1512 goto out;
1513
1514 err = -ENFILE;
c6d409cf
ED
1515 newsock = sock_alloc();
1516 if (!newsock)
1da177e4
LT
1517 goto out_put;
1518
1519 newsock->type = sock->type;
1520 newsock->ops = sock->ops;
1521
1da177e4
LT
1522 /*
1523 * We don't need try_module_get here, as the listening socket (sock)
1524 * has the protocol module (sock->ops->owner) held.
1525 */
1526 __module_get(newsock->ops->owner);
1527
28407630 1528 newfd = get_unused_fd_flags(flags);
39d8c1b6
DM
1529 if (unlikely(newfd < 0)) {
1530 err = newfd;
9a1875e6
DM
1531 sock_release(newsock);
1532 goto out_put;
39d8c1b6 1533 }
aab174f0 1534 newfile = sock_alloc_file(newsock, flags, sock->sk->sk_prot_creator->name);
b5ffe634 1535 if (IS_ERR(newfile)) {
28407630
AV
1536 err = PTR_ERR(newfile);
1537 put_unused_fd(newfd);
28407630
AV
1538 goto out_put;
1539 }
39d8c1b6 1540
a79af59e
FF
1541 err = security_socket_accept(sock, newsock);
1542 if (err)
39d8c1b6 1543 goto out_fd;
a79af59e 1544
cdfbabfb 1545 err = sock->ops->accept(sock, newsock, sock->file->f_flags, false);
1da177e4 1546 if (err < 0)
39d8c1b6 1547 goto out_fd;
1da177e4
LT
1548
1549 if (upeer_sockaddr) {
230b1839 1550 if (newsock->ops->getname(newsock, (struct sockaddr *)&address,
89bddce5 1551 &len, 2) < 0) {
1da177e4 1552 err = -ECONNABORTED;
39d8c1b6 1553 goto out_fd;
1da177e4 1554 }
43db362d 1555 err = move_addr_to_user(&address,
230b1839 1556 len, upeer_sockaddr, upeer_addrlen);
1da177e4 1557 if (err < 0)
39d8c1b6 1558 goto out_fd;
1da177e4
LT
1559 }
1560
1561 /* File flags are not inherited via accept() unlike another OSes. */
1562
39d8c1b6
DM
1563 fd_install(newfd, newfile);
1564 err = newfd;
1da177e4 1565
1da177e4 1566out_put:
6cb153ca 1567 fput_light(sock->file, fput_needed);
1da177e4
LT
1568out:
1569 return err;
39d8c1b6 1570out_fd:
9606a216 1571 fput(newfile);
39d8c1b6 1572 put_unused_fd(newfd);
1da177e4
LT
1573 goto out_put;
1574}
1575
20f37034
HC
1576SYSCALL_DEFINE3(accept, int, fd, struct sockaddr __user *, upeer_sockaddr,
1577 int __user *, upeer_addrlen)
aaca0bdc 1578{
de11defe 1579 return sys_accept4(fd, upeer_sockaddr, upeer_addrlen, 0);
aaca0bdc
UD
1580}
1581
1da177e4
LT
1582/*
1583 * Attempt to connect to a socket with the server address. The address
1584 * is in user space so we verify it is OK and move it to kernel space.
1585 *
1586 * For 1003.1g we need to add clean support for a bind to AF_UNSPEC to
1587 * break bindings
1588 *
1589 * NOTE: 1003.1g draft 6.3 is broken with respect to AX.25/NetROM and
1590 * other SEQPACKET protocols that take time to connect() as it doesn't
1591 * include the -EINPROGRESS status for such sockets.
1592 */
1593
20f37034
HC
1594SYSCALL_DEFINE3(connect, int, fd, struct sockaddr __user *, uservaddr,
1595 int, addrlen)
1da177e4
LT
1596{
1597 struct socket *sock;
230b1839 1598 struct sockaddr_storage address;
6cb153ca 1599 int err, fput_needed;
1da177e4 1600
6cb153ca 1601 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4
LT
1602 if (!sock)
1603 goto out;
43db362d 1604 err = move_addr_to_kernel(uservaddr, addrlen, &address);
1da177e4
LT
1605 if (err < 0)
1606 goto out_put;
1607
89bddce5 1608 err =
230b1839 1609 security_socket_connect(sock, (struct sockaddr *)&address, addrlen);
1da177e4
LT
1610 if (err)
1611 goto out_put;
1612
230b1839 1613 err = sock->ops->connect(sock, (struct sockaddr *)&address, addrlen,
1da177e4
LT
1614 sock->file->f_flags);
1615out_put:
6cb153ca 1616 fput_light(sock->file, fput_needed);
1da177e4
LT
1617out:
1618 return err;
1619}
1620
1621/*
1622 * Get the local address ('name') of a socket object. Move the obtained
1623 * name to user space.
1624 */
1625
20f37034
HC
1626SYSCALL_DEFINE3(getsockname, int, fd, struct sockaddr __user *, usockaddr,
1627 int __user *, usockaddr_len)
1da177e4
LT
1628{
1629 struct socket *sock;
230b1839 1630 struct sockaddr_storage address;
6cb153ca 1631 int len, err, fput_needed;
89bddce5 1632
6cb153ca 1633 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4
LT
1634 if (!sock)
1635 goto out;
1636
1637 err = security_socket_getsockname(sock);
1638 if (err)
1639 goto out_put;
1640
230b1839 1641 err = sock->ops->getname(sock, (struct sockaddr *)&address, &len, 0);
1da177e4
LT
1642 if (err)
1643 goto out_put;
43db362d 1644 err = move_addr_to_user(&address, len, usockaddr, usockaddr_len);
1da177e4
LT
1645
1646out_put:
6cb153ca 1647 fput_light(sock->file, fput_needed);
1da177e4
LT
1648out:
1649 return err;
1650}
1651
1652/*
1653 * Get the remote address ('name') of a socket object. Move the obtained
1654 * name to user space.
1655 */
1656
20f37034
HC
1657SYSCALL_DEFINE3(getpeername, int, fd, struct sockaddr __user *, usockaddr,
1658 int __user *, usockaddr_len)
1da177e4
LT
1659{
1660 struct socket *sock;
230b1839 1661 struct sockaddr_storage address;
6cb153ca 1662 int len, err, fput_needed;
1da177e4 1663
89bddce5
SH
1664 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1665 if (sock != NULL) {
1da177e4
LT
1666 err = security_socket_getpeername(sock);
1667 if (err) {
6cb153ca 1668 fput_light(sock->file, fput_needed);
1da177e4
LT
1669 return err;
1670 }
1671
89bddce5 1672 err =
230b1839 1673 sock->ops->getname(sock, (struct sockaddr *)&address, &len,
89bddce5 1674 1);
1da177e4 1675 if (!err)
43db362d 1676 err = move_addr_to_user(&address, len, usockaddr,
89bddce5 1677 usockaddr_len);
6cb153ca 1678 fput_light(sock->file, fput_needed);
1da177e4
LT
1679 }
1680 return err;
1681}
1682
1683/*
1684 * Send a datagram to a given address. We move the address into kernel
1685 * space and check the user space data area is readable before invoking
1686 * the protocol.
1687 */
1688
3e0fa65f 1689SYSCALL_DEFINE6(sendto, int, fd, void __user *, buff, size_t, len,
95c96174 1690 unsigned int, flags, struct sockaddr __user *, addr,
3e0fa65f 1691 int, addr_len)
1da177e4
LT
1692{
1693 struct socket *sock;
230b1839 1694 struct sockaddr_storage address;
1da177e4
LT
1695 int err;
1696 struct msghdr msg;
1697 struct iovec iov;
6cb153ca 1698 int fput_needed;
6cb153ca 1699
602bd0e9
AV
1700 err = import_single_range(WRITE, buff, len, &iov, &msg.msg_iter);
1701 if (unlikely(err))
1702 return err;
de0fa95c
PE
1703 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1704 if (!sock)
4387ff75 1705 goto out;
6cb153ca 1706
89bddce5 1707 msg.msg_name = NULL;
89bddce5
SH
1708 msg.msg_control = NULL;
1709 msg.msg_controllen = 0;
1710 msg.msg_namelen = 0;
6cb153ca 1711 if (addr) {
43db362d 1712 err = move_addr_to_kernel(addr, addr_len, &address);
1da177e4
LT
1713 if (err < 0)
1714 goto out_put;
230b1839 1715 msg.msg_name = (struct sockaddr *)&address;
89bddce5 1716 msg.msg_namelen = addr_len;
1da177e4
LT
1717 }
1718 if (sock->file->f_flags & O_NONBLOCK)
1719 flags |= MSG_DONTWAIT;
1720 msg.msg_flags = flags;
d8725c86 1721 err = sock_sendmsg(sock, &msg);
1da177e4 1722
89bddce5 1723out_put:
de0fa95c 1724 fput_light(sock->file, fput_needed);
4387ff75 1725out:
1da177e4
LT
1726 return err;
1727}
1728
1729/*
89bddce5 1730 * Send a datagram down a socket.
1da177e4
LT
1731 */
1732
3e0fa65f 1733SYSCALL_DEFINE4(send, int, fd, void __user *, buff, size_t, len,
95c96174 1734 unsigned int, flags)
1da177e4
LT
1735{
1736 return sys_sendto(fd, buff, len, flags, NULL, 0);
1737}
1738
1739/*
89bddce5 1740 * Receive a frame from the socket and optionally record the address of the
1da177e4
LT
1741 * sender. We verify the buffers are writable and if needed move the
1742 * sender address from kernel to user space.
1743 */
1744
3e0fa65f 1745SYSCALL_DEFINE6(recvfrom, int, fd, void __user *, ubuf, size_t, size,
95c96174 1746 unsigned int, flags, struct sockaddr __user *, addr,
3e0fa65f 1747 int __user *, addr_len)
1da177e4
LT
1748{
1749 struct socket *sock;
1750 struct iovec iov;
1751 struct msghdr msg;
230b1839 1752 struct sockaddr_storage address;
89bddce5 1753 int err, err2;
6cb153ca
BL
1754 int fput_needed;
1755
602bd0e9
AV
1756 err = import_single_range(READ, ubuf, size, &iov, &msg.msg_iter);
1757 if (unlikely(err))
1758 return err;
de0fa95c 1759 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4 1760 if (!sock)
de0fa95c 1761 goto out;
1da177e4 1762
89bddce5
SH
1763 msg.msg_control = NULL;
1764 msg.msg_controllen = 0;
f3d33426
HFS
1765 /* Save some cycles and don't copy the address if not needed */
1766 msg.msg_name = addr ? (struct sockaddr *)&address : NULL;
1767 /* We assume all kernel code knows the size of sockaddr_storage */
1768 msg.msg_namelen = 0;
130ed5d1 1769 msg.msg_iocb = NULL;
9f138fa6 1770 msg.msg_flags = 0;
1da177e4
LT
1771 if (sock->file->f_flags & O_NONBLOCK)
1772 flags |= MSG_DONTWAIT;
2da62906 1773 err = sock_recvmsg(sock, &msg, flags);
1da177e4 1774
89bddce5 1775 if (err >= 0 && addr != NULL) {
43db362d 1776 err2 = move_addr_to_user(&address,
230b1839 1777 msg.msg_namelen, addr, addr_len);
89bddce5
SH
1778 if (err2 < 0)
1779 err = err2;
1da177e4 1780 }
de0fa95c
PE
1781
1782 fput_light(sock->file, fput_needed);
4387ff75 1783out:
1da177e4
LT
1784 return err;
1785}
1786
1787/*
89bddce5 1788 * Receive a datagram from a socket.
1da177e4
LT
1789 */
1790
b7c0ddf5
JG
1791SYSCALL_DEFINE4(recv, int, fd, void __user *, ubuf, size_t, size,
1792 unsigned int, flags)
1da177e4
LT
1793{
1794 return sys_recvfrom(fd, ubuf, size, flags, NULL, NULL);
1795}
1796
1797/*
1798 * Set a socket option. Because we don't know the option lengths we have
1799 * to pass the user mode parameter for the protocols to sort out.
1800 */
1801
20f37034
HC
1802SYSCALL_DEFINE5(setsockopt, int, fd, int, level, int, optname,
1803 char __user *, optval, int, optlen)
1da177e4 1804{
6cb153ca 1805 int err, fput_needed;
1da177e4
LT
1806 struct socket *sock;
1807
1808 if (optlen < 0)
1809 return -EINVAL;
89bddce5
SH
1810
1811 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1812 if (sock != NULL) {
1813 err = security_socket_setsockopt(sock, level, optname);
6cb153ca
BL
1814 if (err)
1815 goto out_put;
1da177e4
LT
1816
1817 if (level == SOL_SOCKET)
89bddce5
SH
1818 err =
1819 sock_setsockopt(sock, level, optname, optval,
1820 optlen);
1da177e4 1821 else
89bddce5
SH
1822 err =
1823 sock->ops->setsockopt(sock, level, optname, optval,
1824 optlen);
6cb153ca
BL
1825out_put:
1826 fput_light(sock->file, fput_needed);
1da177e4
LT
1827 }
1828 return err;
1829}
1830
1831/*
1832 * Get a socket option. Because we don't know the option lengths we have
1833 * to pass a user mode parameter for the protocols to sort out.
1834 */
1835
20f37034
HC
1836SYSCALL_DEFINE5(getsockopt, int, fd, int, level, int, optname,
1837 char __user *, optval, int __user *, optlen)
1da177e4 1838{
6cb153ca 1839 int err, fput_needed;
1da177e4
LT
1840 struct socket *sock;
1841
89bddce5
SH
1842 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1843 if (sock != NULL) {
6cb153ca
BL
1844 err = security_socket_getsockopt(sock, level, optname);
1845 if (err)
1846 goto out_put;
1da177e4
LT
1847
1848 if (level == SOL_SOCKET)
89bddce5
SH
1849 err =
1850 sock_getsockopt(sock, level, optname, optval,
1851 optlen);
1da177e4 1852 else
89bddce5
SH
1853 err =
1854 sock->ops->getsockopt(sock, level, optname, optval,
1855 optlen);
6cb153ca
BL
1856out_put:
1857 fput_light(sock->file, fput_needed);
1da177e4
LT
1858 }
1859 return err;
1860}
1861
1da177e4
LT
1862/*
1863 * Shutdown a socket.
1864 */
1865
754fe8d2 1866SYSCALL_DEFINE2(shutdown, int, fd, int, how)
1da177e4 1867{
6cb153ca 1868 int err, fput_needed;
1da177e4
LT
1869 struct socket *sock;
1870
89bddce5
SH
1871 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1872 if (sock != NULL) {
1da177e4 1873 err = security_socket_shutdown(sock, how);
6cb153ca
BL
1874 if (!err)
1875 err = sock->ops->shutdown(sock, how);
1876 fput_light(sock->file, fput_needed);
1da177e4
LT
1877 }
1878 return err;
1879}
1880
89bddce5 1881/* A couple of helpful macros for getting the address of the 32/64 bit
1da177e4
LT
1882 * fields which are the same type (int / unsigned) on our platforms.
1883 */
1884#define COMPAT_MSG(msg, member) ((MSG_CMSG_COMPAT & flags) ? &msg##_compat->member : &msg->member)
1885#define COMPAT_NAMELEN(msg) COMPAT_MSG(msg, msg_namelen)
1886#define COMPAT_FLAGS(msg) COMPAT_MSG(msg, msg_flags)
1887
c71d8ebe
TH
1888struct used_address {
1889 struct sockaddr_storage name;
1890 unsigned int name_len;
1891};
1892
da184284
AV
1893static int copy_msghdr_from_user(struct msghdr *kmsg,
1894 struct user_msghdr __user *umsg,
1895 struct sockaddr __user **save_addr,
1896 struct iovec **iov)
1661bf36 1897{
ffb07550 1898 struct user_msghdr msg;
08adb7da
AV
1899 ssize_t err;
1900
ffb07550 1901 if (copy_from_user(&msg, umsg, sizeof(*umsg)))
1661bf36 1902 return -EFAULT;
dbb490b9 1903
864d9664 1904 kmsg->msg_control = (void __force *)msg.msg_control;
ffb07550
AV
1905 kmsg->msg_controllen = msg.msg_controllen;
1906 kmsg->msg_flags = msg.msg_flags;
1907
1908 kmsg->msg_namelen = msg.msg_namelen;
1909 if (!msg.msg_name)
6a2a2b3a
AS
1910 kmsg->msg_namelen = 0;
1911
dbb490b9
ML
1912 if (kmsg->msg_namelen < 0)
1913 return -EINVAL;
1914
1661bf36 1915 if (kmsg->msg_namelen > sizeof(struct sockaddr_storage))
db31c55a 1916 kmsg->msg_namelen = sizeof(struct sockaddr_storage);
08adb7da
AV
1917
1918 if (save_addr)
ffb07550 1919 *save_addr = msg.msg_name;
08adb7da 1920
ffb07550 1921 if (msg.msg_name && kmsg->msg_namelen) {
08adb7da 1922 if (!save_addr) {
864d9664
PA
1923 err = move_addr_to_kernel(msg.msg_name,
1924 kmsg->msg_namelen,
08adb7da
AV
1925 kmsg->msg_name);
1926 if (err < 0)
1927 return err;
1928 }
1929 } else {
1930 kmsg->msg_name = NULL;
1931 kmsg->msg_namelen = 0;
1932 }
1933
ffb07550 1934 if (msg.msg_iovlen > UIO_MAXIOV)
08adb7da
AV
1935 return -EMSGSIZE;
1936
0345f931 1937 kmsg->msg_iocb = NULL;
1938
ffb07550
AV
1939 return import_iovec(save_addr ? READ : WRITE,
1940 msg.msg_iov, msg.msg_iovlen,
da184284 1941 UIO_FASTIOV, iov, &kmsg->msg_iter);
1661bf36
DC
1942}
1943
666547ff 1944static int ___sys_sendmsg(struct socket *sock, struct user_msghdr __user *msg,
95c96174 1945 struct msghdr *msg_sys, unsigned int flags,
28a94d8f
TH
1946 struct used_address *used_address,
1947 unsigned int allowed_msghdr_flags)
1da177e4 1948{
89bddce5
SH
1949 struct compat_msghdr __user *msg_compat =
1950 (struct compat_msghdr __user *)msg;
230b1839 1951 struct sockaddr_storage address;
1da177e4 1952 struct iovec iovstack[UIO_FASTIOV], *iov = iovstack;
b9d717a7 1953 unsigned char ctl[sizeof(struct cmsghdr) + 20]
846cc123 1954 __aligned(sizeof(__kernel_size_t));
89bddce5 1955 /* 20 is size of ipv6_pktinfo */
1da177e4 1956 unsigned char *ctl_buf = ctl;
d8725c86 1957 int ctl_len;
08adb7da 1958 ssize_t err;
89bddce5 1959
08adb7da 1960 msg_sys->msg_name = &address;
1da177e4 1961
08449320 1962 if (MSG_CMSG_COMPAT & flags)
08adb7da 1963 err = get_compat_msghdr(msg_sys, msg_compat, NULL, &iov);
08449320 1964 else
08adb7da 1965 err = copy_msghdr_from_user(msg_sys, msg, NULL, &iov);
89bddce5 1966 if (err < 0)
da184284 1967 return err;
1da177e4
LT
1968
1969 err = -ENOBUFS;
1970
228e548e 1971 if (msg_sys->msg_controllen > INT_MAX)
1da177e4 1972 goto out_freeiov;
28a94d8f 1973 flags |= (msg_sys->msg_flags & allowed_msghdr_flags);
228e548e 1974 ctl_len = msg_sys->msg_controllen;
1da177e4 1975 if ((MSG_CMSG_COMPAT & flags) && ctl_len) {
89bddce5 1976 err =
228e548e 1977 cmsghdr_from_user_compat_to_kern(msg_sys, sock->sk, ctl,
89bddce5 1978 sizeof(ctl));
1da177e4
LT
1979 if (err)
1980 goto out_freeiov;
228e548e
AB
1981 ctl_buf = msg_sys->msg_control;
1982 ctl_len = msg_sys->msg_controllen;
1da177e4 1983 } else if (ctl_len) {
ac4340fc
DM
1984 BUILD_BUG_ON(sizeof(struct cmsghdr) !=
1985 CMSG_ALIGN(sizeof(struct cmsghdr)));
89bddce5 1986 if (ctl_len > sizeof(ctl)) {
1da177e4 1987 ctl_buf = sock_kmalloc(sock->sk, ctl_len, GFP_KERNEL);
89bddce5 1988 if (ctl_buf == NULL)
1da177e4
LT
1989 goto out_freeiov;
1990 }
1991 err = -EFAULT;
1992 /*
228e548e 1993 * Careful! Before this, msg_sys->msg_control contains a user pointer.
1da177e4
LT
1994 * Afterwards, it will be a kernel pointer. Thus the compiler-assisted
1995 * checking falls down on this.
1996 */
fb8621bb 1997 if (copy_from_user(ctl_buf,
228e548e 1998 (void __user __force *)msg_sys->msg_control,
89bddce5 1999 ctl_len))
1da177e4 2000 goto out_freectl;
228e548e 2001 msg_sys->msg_control = ctl_buf;
1da177e4 2002 }
228e548e 2003 msg_sys->msg_flags = flags;
1da177e4
LT
2004
2005 if (sock->file->f_flags & O_NONBLOCK)
228e548e 2006 msg_sys->msg_flags |= MSG_DONTWAIT;
c71d8ebe
TH
2007 /*
2008 * If this is sendmmsg() and current destination address is same as
2009 * previously succeeded address, omit asking LSM's decision.
2010 * used_address->name_len is initialized to UINT_MAX so that the first
2011 * destination address never matches.
2012 */
bc909d9d
MD
2013 if (used_address && msg_sys->msg_name &&
2014 used_address->name_len == msg_sys->msg_namelen &&
2015 !memcmp(&used_address->name, msg_sys->msg_name,
c71d8ebe 2016 used_address->name_len)) {
d8725c86 2017 err = sock_sendmsg_nosec(sock, msg_sys);
c71d8ebe
TH
2018 goto out_freectl;
2019 }
d8725c86 2020 err = sock_sendmsg(sock, msg_sys);
c71d8ebe
TH
2021 /*
2022 * If this is sendmmsg() and sending to current destination address was
2023 * successful, remember it.
2024 */
2025 if (used_address && err >= 0) {
2026 used_address->name_len = msg_sys->msg_namelen;
bc909d9d
MD
2027 if (msg_sys->msg_name)
2028 memcpy(&used_address->name, msg_sys->msg_name,
2029 used_address->name_len);
c71d8ebe 2030 }
1da177e4
LT
2031
2032out_freectl:
89bddce5 2033 if (ctl_buf != ctl)
1da177e4
LT
2034 sock_kfree_s(sock->sk, ctl_buf, ctl_len);
2035out_freeiov:
da184284 2036 kfree(iov);
228e548e
AB
2037 return err;
2038}
2039
2040/*
2041 * BSD sendmsg interface
2042 */
2043
666547ff 2044long __sys_sendmsg(int fd, struct user_msghdr __user *msg, unsigned flags)
228e548e
AB
2045{
2046 int fput_needed, err;
2047 struct msghdr msg_sys;
1be374a0
AL
2048 struct socket *sock;
2049
1be374a0 2050 sock = sockfd_lookup_light(fd, &err, &fput_needed);
228e548e
AB
2051 if (!sock)
2052 goto out;
2053
28a94d8f 2054 err = ___sys_sendmsg(sock, msg, &msg_sys, flags, NULL, 0);
228e548e 2055
6cb153ca 2056 fput_light(sock->file, fput_needed);
89bddce5 2057out:
1da177e4
LT
2058 return err;
2059}
2060
666547ff 2061SYSCALL_DEFINE3(sendmsg, int, fd, struct user_msghdr __user *, msg, unsigned int, flags)
a7526eb5
AL
2062{
2063 if (flags & MSG_CMSG_COMPAT)
2064 return -EINVAL;
2065 return __sys_sendmsg(fd, msg, flags);
2066}
2067
228e548e
AB
2068/*
2069 * Linux sendmmsg interface
2070 */
2071
2072int __sys_sendmmsg(int fd, struct mmsghdr __user *mmsg, unsigned int vlen,
2073 unsigned int flags)
2074{
2075 int fput_needed, err, datagrams;
2076 struct socket *sock;
2077 struct mmsghdr __user *entry;
2078 struct compat_mmsghdr __user *compat_entry;
2079 struct msghdr msg_sys;
c71d8ebe 2080 struct used_address used_address;
f092276d 2081 unsigned int oflags = flags;
228e548e 2082
98382f41
AB
2083 if (vlen > UIO_MAXIOV)
2084 vlen = UIO_MAXIOV;
228e548e
AB
2085
2086 datagrams = 0;
2087
2088 sock = sockfd_lookup_light(fd, &err, &fput_needed);
2089 if (!sock)
2090 return err;
2091
c71d8ebe 2092 used_address.name_len = UINT_MAX;
228e548e
AB
2093 entry = mmsg;
2094 compat_entry = (struct compat_mmsghdr __user *)mmsg;
728ffb86 2095 err = 0;
f092276d 2096 flags |= MSG_BATCH;
228e548e
AB
2097
2098 while (datagrams < vlen) {
f092276d
TH
2099 if (datagrams == vlen - 1)
2100 flags = oflags;
2101
228e548e 2102 if (MSG_CMSG_COMPAT & flags) {
666547ff 2103 err = ___sys_sendmsg(sock, (struct user_msghdr __user *)compat_entry,
28a94d8f 2104 &msg_sys, flags, &used_address, MSG_EOR);
228e548e
AB
2105 if (err < 0)
2106 break;
2107 err = __put_user(err, &compat_entry->msg_len);
2108 ++compat_entry;
2109 } else {
a7526eb5 2110 err = ___sys_sendmsg(sock,
666547ff 2111 (struct user_msghdr __user *)entry,
28a94d8f 2112 &msg_sys, flags, &used_address, MSG_EOR);
228e548e
AB
2113 if (err < 0)
2114 break;
2115 err = put_user(err, &entry->msg_len);
2116 ++entry;
2117 }
2118
2119 if (err)
2120 break;
2121 ++datagrams;
3023898b
SHY
2122 if (msg_data_left(&msg_sys))
2123 break;
a78cb84c 2124 cond_resched();
228e548e
AB
2125 }
2126
228e548e
AB
2127 fput_light(sock->file, fput_needed);
2128
728ffb86
AB
2129 /* We only return an error if no datagrams were able to be sent */
2130 if (datagrams != 0)
228e548e
AB
2131 return datagrams;
2132
228e548e
AB
2133 return err;
2134}
2135
2136SYSCALL_DEFINE4(sendmmsg, int, fd, struct mmsghdr __user *, mmsg,
2137 unsigned int, vlen, unsigned int, flags)
2138{
1be374a0
AL
2139 if (flags & MSG_CMSG_COMPAT)
2140 return -EINVAL;
228e548e
AB
2141 return __sys_sendmmsg(fd, mmsg, vlen, flags);
2142}
2143
666547ff 2144static int ___sys_recvmsg(struct socket *sock, struct user_msghdr __user *msg,
95c96174 2145 struct msghdr *msg_sys, unsigned int flags, int nosec)
1da177e4 2146{
89bddce5
SH
2147 struct compat_msghdr __user *msg_compat =
2148 (struct compat_msghdr __user *)msg;
1da177e4 2149 struct iovec iovstack[UIO_FASTIOV];
89bddce5 2150 struct iovec *iov = iovstack;
1da177e4 2151 unsigned long cmsg_ptr;
2da62906 2152 int len;
08adb7da 2153 ssize_t err;
1da177e4
LT
2154
2155 /* kernel mode address */
230b1839 2156 struct sockaddr_storage addr;
1da177e4
LT
2157
2158 /* user mode address pointers */
2159 struct sockaddr __user *uaddr;
08adb7da 2160 int __user *uaddr_len = COMPAT_NAMELEN(msg);
89bddce5 2161
08adb7da 2162 msg_sys->msg_name = &addr;
1da177e4 2163
f3d33426 2164 if (MSG_CMSG_COMPAT & flags)
08adb7da 2165 err = get_compat_msghdr(msg_sys, msg_compat, &uaddr, &iov);
f3d33426 2166 else
08adb7da 2167 err = copy_msghdr_from_user(msg_sys, msg, &uaddr, &iov);
1da177e4 2168 if (err < 0)
da184284 2169 return err;
1da177e4 2170
a2e27255
ACM
2171 cmsg_ptr = (unsigned long)msg_sys->msg_control;
2172 msg_sys->msg_flags = flags & (MSG_CMSG_CLOEXEC|MSG_CMSG_COMPAT);
89bddce5 2173
f3d33426
HFS
2174 /* We assume all kernel code knows the size of sockaddr_storage */
2175 msg_sys->msg_namelen = 0;
2176
1da177e4
LT
2177 if (sock->file->f_flags & O_NONBLOCK)
2178 flags |= MSG_DONTWAIT;
2da62906 2179 err = (nosec ? sock_recvmsg_nosec : sock_recvmsg)(sock, msg_sys, flags);
1da177e4
LT
2180 if (err < 0)
2181 goto out_freeiov;
2182 len = err;
2183
2184 if (uaddr != NULL) {
43db362d 2185 err = move_addr_to_user(&addr,
a2e27255 2186 msg_sys->msg_namelen, uaddr,
89bddce5 2187 uaddr_len);
1da177e4
LT
2188 if (err < 0)
2189 goto out_freeiov;
2190 }
a2e27255 2191 err = __put_user((msg_sys->msg_flags & ~MSG_CMSG_COMPAT),
37f7f421 2192 COMPAT_FLAGS(msg));
1da177e4
LT
2193 if (err)
2194 goto out_freeiov;
2195 if (MSG_CMSG_COMPAT & flags)
a2e27255 2196 err = __put_user((unsigned long)msg_sys->msg_control - cmsg_ptr,
1da177e4
LT
2197 &msg_compat->msg_controllen);
2198 else
a2e27255 2199 err = __put_user((unsigned long)msg_sys->msg_control - cmsg_ptr,
1da177e4
LT
2200 &msg->msg_controllen);
2201 if (err)
2202 goto out_freeiov;
2203 err = len;
2204
2205out_freeiov:
da184284 2206 kfree(iov);
a2e27255
ACM
2207 return err;
2208}
2209
2210/*
2211 * BSD recvmsg interface
2212 */
2213
666547ff 2214long __sys_recvmsg(int fd, struct user_msghdr __user *msg, unsigned flags)
a2e27255
ACM
2215{
2216 int fput_needed, err;
2217 struct msghdr msg_sys;
1be374a0
AL
2218 struct socket *sock;
2219
1be374a0 2220 sock = sockfd_lookup_light(fd, &err, &fput_needed);
a2e27255
ACM
2221 if (!sock)
2222 goto out;
2223
a7526eb5 2224 err = ___sys_recvmsg(sock, msg, &msg_sys, flags, 0);
a2e27255 2225
6cb153ca 2226 fput_light(sock->file, fput_needed);
1da177e4
LT
2227out:
2228 return err;
2229}
2230
666547ff 2231SYSCALL_DEFINE3(recvmsg, int, fd, struct user_msghdr __user *, msg,
a7526eb5
AL
2232 unsigned int, flags)
2233{
2234 if (flags & MSG_CMSG_COMPAT)
2235 return -EINVAL;
2236 return __sys_recvmsg(fd, msg, flags);
2237}
2238
a2e27255
ACM
2239/*
2240 * Linux recvmmsg interface
2241 */
2242
2243int __sys_recvmmsg(int fd, struct mmsghdr __user *mmsg, unsigned int vlen,
2244 unsigned int flags, struct timespec *timeout)
2245{
2246 int fput_needed, err, datagrams;
2247 struct socket *sock;
2248 struct mmsghdr __user *entry;
d7256d0e 2249 struct compat_mmsghdr __user *compat_entry;
a2e27255 2250 struct msghdr msg_sys;
766b9f92
DD
2251 struct timespec64 end_time;
2252 struct timespec64 timeout64;
a2e27255
ACM
2253
2254 if (timeout &&
2255 poll_select_set_timeout(&end_time, timeout->tv_sec,
2256 timeout->tv_nsec))
2257 return -EINVAL;
2258
2259 datagrams = 0;
2260
2261 sock = sockfd_lookup_light(fd, &err, &fput_needed);
2262 if (!sock)
2263 return err;
2264
2265 err = sock_error(sock->sk);
e623a9e9
MJ
2266 if (err) {
2267 datagrams = err;
a2e27255 2268 goto out_put;
e623a9e9 2269 }
a2e27255
ACM
2270
2271 entry = mmsg;
d7256d0e 2272 compat_entry = (struct compat_mmsghdr __user *)mmsg;
a2e27255
ACM
2273
2274 while (datagrams < vlen) {
2275 /*
2276 * No need to ask LSM for more than the first datagram.
2277 */
d7256d0e 2278 if (MSG_CMSG_COMPAT & flags) {
666547ff 2279 err = ___sys_recvmsg(sock, (struct user_msghdr __user *)compat_entry,
a7526eb5
AL
2280 &msg_sys, flags & ~MSG_WAITFORONE,
2281 datagrams);
d7256d0e
JMG
2282 if (err < 0)
2283 break;
2284 err = __put_user(err, &compat_entry->msg_len);
2285 ++compat_entry;
2286 } else {
a7526eb5 2287 err = ___sys_recvmsg(sock,
666547ff 2288 (struct user_msghdr __user *)entry,
a7526eb5
AL
2289 &msg_sys, flags & ~MSG_WAITFORONE,
2290 datagrams);
d7256d0e
JMG
2291 if (err < 0)
2292 break;
2293 err = put_user(err, &entry->msg_len);
2294 ++entry;
2295 }
2296
a2e27255
ACM
2297 if (err)
2298 break;
a2e27255
ACM
2299 ++datagrams;
2300
71c5c159
BB
2301 /* MSG_WAITFORONE turns on MSG_DONTWAIT after one packet */
2302 if (flags & MSG_WAITFORONE)
2303 flags |= MSG_DONTWAIT;
2304
a2e27255 2305 if (timeout) {
766b9f92
DD
2306 ktime_get_ts64(&timeout64);
2307 *timeout = timespec64_to_timespec(
2308 timespec64_sub(end_time, timeout64));
a2e27255
ACM
2309 if (timeout->tv_sec < 0) {
2310 timeout->tv_sec = timeout->tv_nsec = 0;
2311 break;
2312 }
2313
2314 /* Timeout, return less than vlen datagrams */
2315 if (timeout->tv_nsec == 0 && timeout->tv_sec == 0)
2316 break;
2317 }
2318
2319 /* Out of band data, return right away */
2320 if (msg_sys.msg_flags & MSG_OOB)
2321 break;
a78cb84c 2322 cond_resched();
a2e27255
ACM
2323 }
2324
a2e27255 2325 if (err == 0)
34b88a68
ACM
2326 goto out_put;
2327
2328 if (datagrams == 0) {
2329 datagrams = err;
2330 goto out_put;
2331 }
a2e27255 2332
34b88a68
ACM
2333 /*
2334 * We may return less entries than requested (vlen) if the
2335 * sock is non block and there aren't enough datagrams...
2336 */
2337 if (err != -EAGAIN) {
a2e27255 2338 /*
34b88a68
ACM
2339 * ... or if recvmsg returns an error after we
2340 * received some datagrams, where we record the
2341 * error to return on the next call or if the
2342 * app asks about it using getsockopt(SO_ERROR).
a2e27255 2343 */
34b88a68 2344 sock->sk->sk_err = -err;
a2e27255 2345 }
34b88a68
ACM
2346out_put:
2347 fput_light(sock->file, fput_needed);
a2e27255 2348
34b88a68 2349 return datagrams;
a2e27255
ACM
2350}
2351
2352SYSCALL_DEFINE5(recvmmsg, int, fd, struct mmsghdr __user *, mmsg,
2353 unsigned int, vlen, unsigned int, flags,
2354 struct timespec __user *, timeout)
2355{
2356 int datagrams;
2357 struct timespec timeout_sys;
2358
1be374a0
AL
2359 if (flags & MSG_CMSG_COMPAT)
2360 return -EINVAL;
2361
a2e27255
ACM
2362 if (!timeout)
2363 return __sys_recvmmsg(fd, mmsg, vlen, flags, NULL);
2364
2365 if (copy_from_user(&timeout_sys, timeout, sizeof(timeout_sys)))
2366 return -EFAULT;
2367
2368 datagrams = __sys_recvmmsg(fd, mmsg, vlen, flags, &timeout_sys);
2369
2370 if (datagrams > 0 &&
2371 copy_to_user(timeout, &timeout_sys, sizeof(timeout_sys)))
2372 datagrams = -EFAULT;
2373
2374 return datagrams;
2375}
2376
2377#ifdef __ARCH_WANT_SYS_SOCKETCALL
1da177e4
LT
2378/* Argument list sizes for sys_socketcall */
2379#define AL(x) ((x) * sizeof(unsigned long))
228e548e 2380static const unsigned char nargs[21] = {
c6d409cf
ED
2381 AL(0), AL(3), AL(3), AL(3), AL(2), AL(3),
2382 AL(3), AL(3), AL(4), AL(4), AL(4), AL(6),
2383 AL(6), AL(2), AL(5), AL(5), AL(3), AL(3),
228e548e 2384 AL(4), AL(5), AL(4)
89bddce5
SH
2385};
2386
1da177e4
LT
2387#undef AL
2388
2389/*
89bddce5 2390 * System call vectors.
1da177e4
LT
2391 *
2392 * Argument checking cleaned up. Saved 20% in size.
2393 * This function doesn't need to set the kernel lock because
89bddce5 2394 * it is set by the callees.
1da177e4
LT
2395 */
2396
3e0fa65f 2397SYSCALL_DEFINE2(socketcall, int, call, unsigned long __user *, args)
1da177e4 2398{
2950fa9d 2399 unsigned long a[AUDITSC_ARGS];
89bddce5 2400 unsigned long a0, a1;
1da177e4 2401 int err;
47379052 2402 unsigned int len;
1da177e4 2403
228e548e 2404 if (call < 1 || call > SYS_SENDMMSG)
1da177e4
LT
2405 return -EINVAL;
2406
47379052
AV
2407 len = nargs[call];
2408 if (len > sizeof(a))
2409 return -EINVAL;
2410
1da177e4 2411 /* copy_from_user should be SMP safe. */
47379052 2412 if (copy_from_user(a, args, len))
1da177e4 2413 return -EFAULT;
3ec3b2fb 2414
2950fa9d
CG
2415 err = audit_socketcall(nargs[call] / sizeof(unsigned long), a);
2416 if (err)
2417 return err;
3ec3b2fb 2418
89bddce5
SH
2419 a0 = a[0];
2420 a1 = a[1];
2421
2422 switch (call) {
2423 case SYS_SOCKET:
2424 err = sys_socket(a0, a1, a[2]);
2425 break;
2426 case SYS_BIND:
2427 err = sys_bind(a0, (struct sockaddr __user *)a1, a[2]);
2428 break;
2429 case SYS_CONNECT:
2430 err = sys_connect(a0, (struct sockaddr __user *)a1, a[2]);
2431 break;
2432 case SYS_LISTEN:
2433 err = sys_listen(a0, a1);
2434 break;
2435 case SYS_ACCEPT:
de11defe
UD
2436 err = sys_accept4(a0, (struct sockaddr __user *)a1,
2437 (int __user *)a[2], 0);
89bddce5
SH
2438 break;
2439 case SYS_GETSOCKNAME:
2440 err =
2441 sys_getsockname(a0, (struct sockaddr __user *)a1,
2442 (int __user *)a[2]);
2443 break;
2444 case SYS_GETPEERNAME:
2445 err =
2446 sys_getpeername(a0, (struct sockaddr __user *)a1,
2447 (int __user *)a[2]);
2448 break;
2449 case SYS_SOCKETPAIR:
2450 err = sys_socketpair(a0, a1, a[2], (int __user *)a[3]);
2451 break;
2452 case SYS_SEND:
2453 err = sys_send(a0, (void __user *)a1, a[2], a[3]);
2454 break;
2455 case SYS_SENDTO:
2456 err = sys_sendto(a0, (void __user *)a1, a[2], a[3],
2457 (struct sockaddr __user *)a[4], a[5]);
2458 break;
2459 case SYS_RECV:
2460 err = sys_recv(a0, (void __user *)a1, a[2], a[3]);
2461 break;
2462 case SYS_RECVFROM:
2463 err = sys_recvfrom(a0, (void __user *)a1, a[2], a[3],
2464 (struct sockaddr __user *)a[4],
2465 (int __user *)a[5]);
2466 break;
2467 case SYS_SHUTDOWN:
2468 err = sys_shutdown(a0, a1);
2469 break;
2470 case SYS_SETSOCKOPT:
2471 err = sys_setsockopt(a0, a1, a[2], (char __user *)a[3], a[4]);
2472 break;
2473 case SYS_GETSOCKOPT:
2474 err =
2475 sys_getsockopt(a0, a1, a[2], (char __user *)a[3],
2476 (int __user *)a[4]);
2477 break;
2478 case SYS_SENDMSG:
666547ff 2479 err = sys_sendmsg(a0, (struct user_msghdr __user *)a1, a[2]);
89bddce5 2480 break;
228e548e
AB
2481 case SYS_SENDMMSG:
2482 err = sys_sendmmsg(a0, (struct mmsghdr __user *)a1, a[2], a[3]);
2483 break;
89bddce5 2484 case SYS_RECVMSG:
666547ff 2485 err = sys_recvmsg(a0, (struct user_msghdr __user *)a1, a[2]);
89bddce5 2486 break;
a2e27255
ACM
2487 case SYS_RECVMMSG:
2488 err = sys_recvmmsg(a0, (struct mmsghdr __user *)a1, a[2], a[3],
2489 (struct timespec __user *)a[4]);
2490 break;
de11defe
UD
2491 case SYS_ACCEPT4:
2492 err = sys_accept4(a0, (struct sockaddr __user *)a1,
2493 (int __user *)a[2], a[3]);
aaca0bdc 2494 break;
89bddce5
SH
2495 default:
2496 err = -EINVAL;
2497 break;
1da177e4
LT
2498 }
2499 return err;
2500}
2501
89bddce5 2502#endif /* __ARCH_WANT_SYS_SOCKETCALL */
1da177e4 2503
55737fda
SH
2504/**
2505 * sock_register - add a socket protocol handler
2506 * @ops: description of protocol
2507 *
1da177e4
LT
2508 * This function is called by a protocol handler that wants to
2509 * advertise its address family, and have it linked into the
e793c0f7 2510 * socket interface. The value ops->family corresponds to the
55737fda 2511 * socket system call protocol family.
1da177e4 2512 */
f0fd27d4 2513int sock_register(const struct net_proto_family *ops)
1da177e4
LT
2514{
2515 int err;
2516
2517 if (ops->family >= NPROTO) {
3410f22e 2518 pr_crit("protocol %d >= NPROTO(%d)\n", ops->family, NPROTO);
1da177e4
LT
2519 return -ENOBUFS;
2520 }
55737fda
SH
2521
2522 spin_lock(&net_family_lock);
190683a9
ED
2523 if (rcu_dereference_protected(net_families[ops->family],
2524 lockdep_is_held(&net_family_lock)))
55737fda
SH
2525 err = -EEXIST;
2526 else {
cf778b00 2527 rcu_assign_pointer(net_families[ops->family], ops);
1da177e4
LT
2528 err = 0;
2529 }
55737fda
SH
2530 spin_unlock(&net_family_lock);
2531
3410f22e 2532 pr_info("NET: Registered protocol family %d\n", ops->family);
1da177e4
LT
2533 return err;
2534}
c6d409cf 2535EXPORT_SYMBOL(sock_register);
1da177e4 2536
55737fda
SH
2537/**
2538 * sock_unregister - remove a protocol handler
2539 * @family: protocol family to remove
2540 *
1da177e4
LT
2541 * This function is called by a protocol handler that wants to
2542 * remove its address family, and have it unlinked from the
55737fda
SH
2543 * new socket creation.
2544 *
2545 * If protocol handler is a module, then it can use module reference
2546 * counts to protect against new references. If protocol handler is not
2547 * a module then it needs to provide its own protection in
2548 * the ops->create routine.
1da177e4 2549 */
f0fd27d4 2550void sock_unregister(int family)
1da177e4 2551{
f0fd27d4 2552 BUG_ON(family < 0 || family >= NPROTO);
1da177e4 2553
55737fda 2554 spin_lock(&net_family_lock);
a9b3cd7f 2555 RCU_INIT_POINTER(net_families[family], NULL);
55737fda
SH
2556 spin_unlock(&net_family_lock);
2557
2558 synchronize_rcu();
2559
3410f22e 2560 pr_info("NET: Unregistered protocol family %d\n", family);
1da177e4 2561}
c6d409cf 2562EXPORT_SYMBOL(sock_unregister);
1da177e4 2563
77d76ea3 2564static int __init sock_init(void)
1da177e4 2565{
b3e19d92 2566 int err;
2ca794e5
EB
2567 /*
2568 * Initialize the network sysctl infrastructure.
2569 */
2570 err = net_sysctl_init();
2571 if (err)
2572 goto out;
b3e19d92 2573
1da177e4 2574 /*
89bddce5 2575 * Initialize skbuff SLAB cache
1da177e4
LT
2576 */
2577 skb_init();
1da177e4
LT
2578
2579 /*
89bddce5 2580 * Initialize the protocols module.
1da177e4
LT
2581 */
2582
2583 init_inodecache();
b3e19d92
NP
2584
2585 err = register_filesystem(&sock_fs_type);
2586 if (err)
2587 goto out_fs;
1da177e4 2588 sock_mnt = kern_mount(&sock_fs_type);
b3e19d92
NP
2589 if (IS_ERR(sock_mnt)) {
2590 err = PTR_ERR(sock_mnt);
2591 goto out_mount;
2592 }
77d76ea3
AK
2593
2594 /* The real protocol initialization is performed in later initcalls.
1da177e4
LT
2595 */
2596
2597#ifdef CONFIG_NETFILTER
6d11cfdb
PNA
2598 err = netfilter_init();
2599 if (err)
2600 goto out;
1da177e4 2601#endif
cbeb321a 2602
408eccce 2603 ptp_classifier_init();
c1f19b51 2604
b3e19d92
NP
2605out:
2606 return err;
2607
2608out_mount:
2609 unregister_filesystem(&sock_fs_type);
2610out_fs:
2611 goto out;
1da177e4
LT
2612}
2613
77d76ea3
AK
2614core_initcall(sock_init); /* early initcall */
2615
1da177e4
LT
2616#ifdef CONFIG_PROC_FS
2617void socket_seq_show(struct seq_file *seq)
2618{
648845ab
TZ
2619 seq_printf(seq, "sockets: used %d\n",
2620 sock_inuse_get(seq->private));
1da177e4 2621}
89bddce5 2622#endif /* CONFIG_PROC_FS */
1da177e4 2623
89bbfc95 2624#ifdef CONFIG_COMPAT
6b96018b 2625static int do_siocgstamp(struct net *net, struct socket *sock,
644595f8 2626 unsigned int cmd, void __user *up)
7a229387 2627{
7a229387
AB
2628 mm_segment_t old_fs = get_fs();
2629 struct timeval ktv;
2630 int err;
2631
2632 set_fs(KERNEL_DS);
6b96018b 2633 err = sock_do_ioctl(net, sock, cmd, (unsigned long)&ktv);
7a229387 2634 set_fs(old_fs);
644595f8 2635 if (!err)
ed6fe9d6 2636 err = compat_put_timeval(&ktv, up);
644595f8 2637
7a229387
AB
2638 return err;
2639}
2640
6b96018b 2641static int do_siocgstampns(struct net *net, struct socket *sock,
644595f8 2642 unsigned int cmd, void __user *up)
7a229387 2643{
7a229387
AB
2644 mm_segment_t old_fs = get_fs();
2645 struct timespec kts;
2646 int err;
2647
2648 set_fs(KERNEL_DS);
6b96018b 2649 err = sock_do_ioctl(net, sock, cmd, (unsigned long)&kts);
7a229387 2650 set_fs(old_fs);
644595f8 2651 if (!err)
ed6fe9d6 2652 err = compat_put_timespec(&kts, up);
644595f8 2653
7a229387
AB
2654 return err;
2655}
2656
6b96018b 2657static int dev_ifname32(struct net *net, struct compat_ifreq __user *uifr32)
7a229387
AB
2658{
2659 struct ifreq __user *uifr;
2660 int err;
2661
2662 uifr = compat_alloc_user_space(sizeof(struct ifreq));
6b96018b 2663 if (copy_in_user(uifr, uifr32, sizeof(struct compat_ifreq)))
7a229387
AB
2664 return -EFAULT;
2665
6b96018b 2666 err = dev_ioctl(net, SIOCGIFNAME, uifr);
7a229387
AB
2667 if (err)
2668 return err;
2669
6b96018b 2670 if (copy_in_user(uifr32, uifr, sizeof(struct compat_ifreq)))
7a229387
AB
2671 return -EFAULT;
2672
2673 return 0;
2674}
2675
6b96018b 2676static int dev_ifconf(struct net *net, struct compat_ifconf __user *uifc32)
7a229387 2677{
6b96018b 2678 struct compat_ifconf ifc32;
7a229387
AB
2679 struct ifconf ifc;
2680 struct ifconf __user *uifc;
6b96018b 2681 struct compat_ifreq __user *ifr32;
7a229387
AB
2682 struct ifreq __user *ifr;
2683 unsigned int i, j;
2684 int err;
2685
6b96018b 2686 if (copy_from_user(&ifc32, uifc32, sizeof(struct compat_ifconf)))
7a229387
AB
2687 return -EFAULT;
2688
43da5f2e 2689 memset(&ifc, 0, sizeof(ifc));
7a229387
AB
2690 if (ifc32.ifcbuf == 0) {
2691 ifc32.ifc_len = 0;
2692 ifc.ifc_len = 0;
2693 ifc.ifc_req = NULL;
2694 uifc = compat_alloc_user_space(sizeof(struct ifconf));
2695 } else {
c6d409cf
ED
2696 size_t len = ((ifc32.ifc_len / sizeof(struct compat_ifreq)) + 1) *
2697 sizeof(struct ifreq);
7a229387
AB
2698 uifc = compat_alloc_user_space(sizeof(struct ifconf) + len);
2699 ifc.ifc_len = len;
2700 ifr = ifc.ifc_req = (void __user *)(uifc + 1);
2701 ifr32 = compat_ptr(ifc32.ifcbuf);
c6d409cf 2702 for (i = 0; i < ifc32.ifc_len; i += sizeof(struct compat_ifreq)) {
6b96018b 2703 if (copy_in_user(ifr, ifr32, sizeof(struct compat_ifreq)))
7a229387
AB
2704 return -EFAULT;
2705 ifr++;
2706 ifr32++;
2707 }
2708 }
2709 if (copy_to_user(uifc, &ifc, sizeof(struct ifconf)))
2710 return -EFAULT;
2711
6b96018b 2712 err = dev_ioctl(net, SIOCGIFCONF, uifc);
7a229387
AB
2713 if (err)
2714 return err;
2715
2716 if (copy_from_user(&ifc, uifc, sizeof(struct ifconf)))
2717 return -EFAULT;
2718
2719 ifr = ifc.ifc_req;
2720 ifr32 = compat_ptr(ifc32.ifcbuf);
2721 for (i = 0, j = 0;
c6d409cf
ED
2722 i + sizeof(struct compat_ifreq) <= ifc32.ifc_len && j < ifc.ifc_len;
2723 i += sizeof(struct compat_ifreq), j += sizeof(struct ifreq)) {
2724 if (copy_in_user(ifr32, ifr, sizeof(struct compat_ifreq)))
7a229387
AB
2725 return -EFAULT;
2726 ifr32++;
2727 ifr++;
2728 }
2729
2730 if (ifc32.ifcbuf == 0) {
2731 /* Translate from 64-bit structure multiple to
2732 * a 32-bit one.
2733 */
2734 i = ifc.ifc_len;
6b96018b 2735 i = ((i / sizeof(struct ifreq)) * sizeof(struct compat_ifreq));
7a229387
AB
2736 ifc32.ifc_len = i;
2737 } else {
2738 ifc32.ifc_len = i;
2739 }
6b96018b 2740 if (copy_to_user(uifc32, &ifc32, sizeof(struct compat_ifconf)))
7a229387
AB
2741 return -EFAULT;
2742
2743 return 0;
2744}
2745
6b96018b 2746static int ethtool_ioctl(struct net *net, struct compat_ifreq __user *ifr32)
7a229387 2747{
3a7da39d
BH
2748 struct compat_ethtool_rxnfc __user *compat_rxnfc;
2749 bool convert_in = false, convert_out = false;
2750 size_t buf_size = ALIGN(sizeof(struct ifreq), 8);
2751 struct ethtool_rxnfc __user *rxnfc;
7a229387 2752 struct ifreq __user *ifr;
3a7da39d
BH
2753 u32 rule_cnt = 0, actual_rule_cnt;
2754 u32 ethcmd;
7a229387 2755 u32 data;
3a7da39d 2756 int ret;
7a229387 2757
3a7da39d
BH
2758 if (get_user(data, &ifr32->ifr_ifru.ifru_data))
2759 return -EFAULT;
7a229387 2760
3a7da39d
BH
2761 compat_rxnfc = compat_ptr(data);
2762
2763 if (get_user(ethcmd, &compat_rxnfc->cmd))
7a229387
AB
2764 return -EFAULT;
2765
3a7da39d
BH
2766 /* Most ethtool structures are defined without padding.
2767 * Unfortunately struct ethtool_rxnfc is an exception.
2768 */
2769 switch (ethcmd) {
2770 default:
2771 break;
2772 case ETHTOOL_GRXCLSRLALL:
2773 /* Buffer size is variable */
2774 if (get_user(rule_cnt, &compat_rxnfc->rule_cnt))
2775 return -EFAULT;
2776 if (rule_cnt > KMALLOC_MAX_SIZE / sizeof(u32))
2777 return -ENOMEM;
2778 buf_size += rule_cnt * sizeof(u32);
2779 /* fall through */
2780 case ETHTOOL_GRXRINGS:
2781 case ETHTOOL_GRXCLSRLCNT:
2782 case ETHTOOL_GRXCLSRULE:
55664f32 2783 case ETHTOOL_SRXCLSRLINS:
3a7da39d
BH
2784 convert_out = true;
2785 /* fall through */
2786 case ETHTOOL_SRXCLSRLDEL:
3a7da39d
BH
2787 buf_size += sizeof(struct ethtool_rxnfc);
2788 convert_in = true;
2789 break;
2790 }
2791
2792 ifr = compat_alloc_user_space(buf_size);
954b1244 2793 rxnfc = (void __user *)ifr + ALIGN(sizeof(struct ifreq), 8);
3a7da39d
BH
2794
2795 if (copy_in_user(&ifr->ifr_name, &ifr32->ifr_name, IFNAMSIZ))
7a229387
AB
2796 return -EFAULT;
2797
3a7da39d
BH
2798 if (put_user(convert_in ? rxnfc : compat_ptr(data),
2799 &ifr->ifr_ifru.ifru_data))
7a229387
AB
2800 return -EFAULT;
2801
3a7da39d 2802 if (convert_in) {
127fe533 2803 /* We expect there to be holes between fs.m_ext and
3a7da39d
BH
2804 * fs.ring_cookie and at the end of fs, but nowhere else.
2805 */
127fe533
AD
2806 BUILD_BUG_ON(offsetof(struct compat_ethtool_rxnfc, fs.m_ext) +
2807 sizeof(compat_rxnfc->fs.m_ext) !=
2808 offsetof(struct ethtool_rxnfc, fs.m_ext) +
2809 sizeof(rxnfc->fs.m_ext));
3a7da39d
BH
2810 BUILD_BUG_ON(
2811 offsetof(struct compat_ethtool_rxnfc, fs.location) -
2812 offsetof(struct compat_ethtool_rxnfc, fs.ring_cookie) !=
2813 offsetof(struct ethtool_rxnfc, fs.location) -
2814 offsetof(struct ethtool_rxnfc, fs.ring_cookie));
2815
2816 if (copy_in_user(rxnfc, compat_rxnfc,
954b1244
SH
2817 (void __user *)(&rxnfc->fs.m_ext + 1) -
2818 (void __user *)rxnfc) ||
3a7da39d
BH
2819 copy_in_user(&rxnfc->fs.ring_cookie,
2820 &compat_rxnfc->fs.ring_cookie,
954b1244
SH
2821 (void __user *)(&rxnfc->fs.location + 1) -
2822 (void __user *)&rxnfc->fs.ring_cookie) ||
3a7da39d
BH
2823 copy_in_user(&rxnfc->rule_cnt, &compat_rxnfc->rule_cnt,
2824 sizeof(rxnfc->rule_cnt)))
2825 return -EFAULT;
2826 }
2827
2828 ret = dev_ioctl(net, SIOCETHTOOL, ifr);
2829 if (ret)
2830 return ret;
2831
2832 if (convert_out) {
2833 if (copy_in_user(compat_rxnfc, rxnfc,
954b1244
SH
2834 (const void __user *)(&rxnfc->fs.m_ext + 1) -
2835 (const void __user *)rxnfc) ||
3a7da39d
BH
2836 copy_in_user(&compat_rxnfc->fs.ring_cookie,
2837 &rxnfc->fs.ring_cookie,
954b1244
SH
2838 (const void __user *)(&rxnfc->fs.location + 1) -
2839 (const void __user *)&rxnfc->fs.ring_cookie) ||
3a7da39d
BH
2840 copy_in_user(&compat_rxnfc->rule_cnt, &rxnfc->rule_cnt,
2841 sizeof(rxnfc->rule_cnt)))
2842 return -EFAULT;
2843
2844 if (ethcmd == ETHTOOL_GRXCLSRLALL) {
2845 /* As an optimisation, we only copy the actual
2846 * number of rules that the underlying
2847 * function returned. Since Mallory might
2848 * change the rule count in user memory, we
2849 * check that it is less than the rule count
2850 * originally given (as the user buffer size),
2851 * which has been range-checked.
2852 */
2853 if (get_user(actual_rule_cnt, &rxnfc->rule_cnt))
2854 return -EFAULT;
2855 if (actual_rule_cnt < rule_cnt)
2856 rule_cnt = actual_rule_cnt;
2857 if (copy_in_user(&compat_rxnfc->rule_locs[0],
2858 &rxnfc->rule_locs[0],
2859 rule_cnt * sizeof(u32)))
2860 return -EFAULT;
2861 }
2862 }
2863
2864 return 0;
7a229387
AB
2865}
2866
7a50a240
AB
2867static int compat_siocwandev(struct net *net, struct compat_ifreq __user *uifr32)
2868{
2869 void __user *uptr;
2870 compat_uptr_t uptr32;
2871 struct ifreq __user *uifr;
2872
c6d409cf 2873 uifr = compat_alloc_user_space(sizeof(*uifr));
7a50a240
AB
2874 if (copy_in_user(uifr, uifr32, sizeof(struct compat_ifreq)))
2875 return -EFAULT;
2876
2877 if (get_user(uptr32, &uifr32->ifr_settings.ifs_ifsu))
2878 return -EFAULT;
2879
2880 uptr = compat_ptr(uptr32);
2881
2882 if (put_user(uptr, &uifr->ifr_settings.ifs_ifsu.raw_hdlc))
2883 return -EFAULT;
2884
2885 return dev_ioctl(net, SIOCWANDEV, uifr);
2886}
2887
6b96018b
AB
2888static int bond_ioctl(struct net *net, unsigned int cmd,
2889 struct compat_ifreq __user *ifr32)
7a229387
AB
2890{
2891 struct ifreq kifr;
7a229387
AB
2892 mm_segment_t old_fs;
2893 int err;
7a229387
AB
2894
2895 switch (cmd) {
2896 case SIOCBONDENSLAVE:
2897 case SIOCBONDRELEASE:
2898 case SIOCBONDSETHWADDR:
2899 case SIOCBONDCHANGEACTIVE:
6b96018b 2900 if (copy_from_user(&kifr, ifr32, sizeof(struct compat_ifreq)))
7a229387
AB
2901 return -EFAULT;
2902
2903 old_fs = get_fs();
c6d409cf 2904 set_fs(KERNEL_DS);
c3f52ae6 2905 err = dev_ioctl(net, cmd,
2906 (struct ifreq __user __force *) &kifr);
c6d409cf 2907 set_fs(old_fs);
7a229387
AB
2908
2909 return err;
7a229387 2910 default:
07d106d0 2911 return -ENOIOCTLCMD;
ccbd6a5a 2912 }
7a229387
AB
2913}
2914
590d4693
BH
2915/* Handle ioctls that use ifreq::ifr_data and just need struct ifreq converted */
2916static int compat_ifr_data_ioctl(struct net *net, unsigned int cmd,
6b96018b 2917 struct compat_ifreq __user *u_ifreq32)
7a229387
AB
2918{
2919 struct ifreq __user *u_ifreq64;
7a229387
AB
2920 char tmp_buf[IFNAMSIZ];
2921 void __user *data64;
2922 u32 data32;
2923
2924 if (copy_from_user(&tmp_buf[0], &(u_ifreq32->ifr_ifrn.ifrn_name[0]),
2925 IFNAMSIZ))
2926 return -EFAULT;
417c3522 2927 if (get_user(data32, &u_ifreq32->ifr_ifru.ifru_data))
7a229387
AB
2928 return -EFAULT;
2929 data64 = compat_ptr(data32);
2930
2931 u_ifreq64 = compat_alloc_user_space(sizeof(*u_ifreq64));
2932
7a229387
AB
2933 if (copy_to_user(&u_ifreq64->ifr_ifrn.ifrn_name[0], &tmp_buf[0],
2934 IFNAMSIZ))
2935 return -EFAULT;
417c3522 2936 if (put_user(data64, &u_ifreq64->ifr_ifru.ifru_data))
7a229387
AB
2937 return -EFAULT;
2938
6b96018b 2939 return dev_ioctl(net, cmd, u_ifreq64);
7a229387
AB
2940}
2941
6b96018b
AB
2942static int dev_ifsioc(struct net *net, struct socket *sock,
2943 unsigned int cmd, struct compat_ifreq __user *uifr32)
7a229387 2944{
a2116ed2 2945 struct ifreq __user *uifr;
7a229387
AB
2946 int err;
2947
a2116ed2
AB
2948 uifr = compat_alloc_user_space(sizeof(*uifr));
2949 if (copy_in_user(uifr, uifr32, sizeof(*uifr32)))
2950 return -EFAULT;
2951
2952 err = sock_do_ioctl(net, sock, cmd, (unsigned long)uifr);
2953
7a229387
AB
2954 if (!err) {
2955 switch (cmd) {
2956 case SIOCGIFFLAGS:
2957 case SIOCGIFMETRIC:
2958 case SIOCGIFMTU:
2959 case SIOCGIFMEM:
2960 case SIOCGIFHWADDR:
2961 case SIOCGIFINDEX:
2962 case SIOCGIFADDR:
2963 case SIOCGIFBRDADDR:
2964 case SIOCGIFDSTADDR:
2965 case SIOCGIFNETMASK:
fab2532b 2966 case SIOCGIFPFLAGS:
7a229387 2967 case SIOCGIFTXQLEN:
fab2532b
AB
2968 case SIOCGMIIPHY:
2969 case SIOCGMIIREG:
a2116ed2 2970 if (copy_in_user(uifr32, uifr, sizeof(*uifr32)))
7a229387
AB
2971 err = -EFAULT;
2972 break;
2973 }
2974 }
2975 return err;
2976}
2977
a2116ed2
AB
2978static int compat_sioc_ifmap(struct net *net, unsigned int cmd,
2979 struct compat_ifreq __user *uifr32)
2980{
2981 struct ifreq ifr;
2982 struct compat_ifmap __user *uifmap32;
2983 mm_segment_t old_fs;
2984 int err;
2985
2986 uifmap32 = &uifr32->ifr_ifru.ifru_map;
2987 err = copy_from_user(&ifr, uifr32, sizeof(ifr.ifr_name));
3ddc5b46
MD
2988 err |= get_user(ifr.ifr_map.mem_start, &uifmap32->mem_start);
2989 err |= get_user(ifr.ifr_map.mem_end, &uifmap32->mem_end);
2990 err |= get_user(ifr.ifr_map.base_addr, &uifmap32->base_addr);
2991 err |= get_user(ifr.ifr_map.irq, &uifmap32->irq);
2992 err |= get_user(ifr.ifr_map.dma, &uifmap32->dma);
2993 err |= get_user(ifr.ifr_map.port, &uifmap32->port);
a2116ed2
AB
2994 if (err)
2995 return -EFAULT;
2996
2997 old_fs = get_fs();
c6d409cf 2998 set_fs(KERNEL_DS);
c3f52ae6 2999 err = dev_ioctl(net, cmd, (void __user __force *)&ifr);
c6d409cf 3000 set_fs(old_fs);
a2116ed2
AB
3001
3002 if (cmd == SIOCGIFMAP && !err) {
3003 err = copy_to_user(uifr32, &ifr, sizeof(ifr.ifr_name));
3ddc5b46
MD
3004 err |= put_user(ifr.ifr_map.mem_start, &uifmap32->mem_start);
3005 err |= put_user(ifr.ifr_map.mem_end, &uifmap32->mem_end);
3006 err |= put_user(ifr.ifr_map.base_addr, &uifmap32->base_addr);
3007 err |= put_user(ifr.ifr_map.irq, &uifmap32->irq);
3008 err |= put_user(ifr.ifr_map.dma, &uifmap32->dma);
3009 err |= put_user(ifr.ifr_map.port, &uifmap32->port);
a2116ed2
AB
3010 if (err)
3011 err = -EFAULT;
3012 }
3013 return err;
3014}
3015
7a229387 3016struct rtentry32 {
c6d409cf 3017 u32 rt_pad1;
7a229387
AB
3018 struct sockaddr rt_dst; /* target address */
3019 struct sockaddr rt_gateway; /* gateway addr (RTF_GATEWAY) */
3020 struct sockaddr rt_genmask; /* target network mask (IP) */
c6d409cf
ED
3021 unsigned short rt_flags;
3022 short rt_pad2;
3023 u32 rt_pad3;
3024 unsigned char rt_tos;
3025 unsigned char rt_class;
3026 short rt_pad4;
3027 short rt_metric; /* +1 for binary compatibility! */
7a229387 3028 /* char * */ u32 rt_dev; /* forcing the device at add */
c6d409cf
ED
3029 u32 rt_mtu; /* per route MTU/Window */
3030 u32 rt_window; /* Window clamping */
7a229387
AB
3031 unsigned short rt_irtt; /* Initial RTT */
3032};
3033
3034struct in6_rtmsg32 {
3035 struct in6_addr rtmsg_dst;
3036 struct in6_addr rtmsg_src;
3037 struct in6_addr rtmsg_gateway;
3038 u32 rtmsg_type;
3039 u16 rtmsg_dst_len;
3040 u16 rtmsg_src_len;
3041 u32 rtmsg_metric;
3042 u32 rtmsg_info;
3043 u32 rtmsg_flags;
3044 s32 rtmsg_ifindex;
3045};
3046
6b96018b
AB
3047static int routing_ioctl(struct net *net, struct socket *sock,
3048 unsigned int cmd, void __user *argp)
7a229387
AB
3049{
3050 int ret;
3051 void *r = NULL;
3052 struct in6_rtmsg r6;
3053 struct rtentry r4;
3054 char devname[16];
3055 u32 rtdev;
3056 mm_segment_t old_fs = get_fs();
3057
6b96018b
AB
3058 if (sock && sock->sk && sock->sk->sk_family == AF_INET6) { /* ipv6 */
3059 struct in6_rtmsg32 __user *ur6 = argp;
c6d409cf 3060 ret = copy_from_user(&r6.rtmsg_dst, &(ur6->rtmsg_dst),
7a229387 3061 3 * sizeof(struct in6_addr));
3ddc5b46
MD
3062 ret |= get_user(r6.rtmsg_type, &(ur6->rtmsg_type));
3063 ret |= get_user(r6.rtmsg_dst_len, &(ur6->rtmsg_dst_len));
3064 ret |= get_user(r6.rtmsg_src_len, &(ur6->rtmsg_src_len));
3065 ret |= get_user(r6.rtmsg_metric, &(ur6->rtmsg_metric));
3066 ret |= get_user(r6.rtmsg_info, &(ur6->rtmsg_info));
3067 ret |= get_user(r6.rtmsg_flags, &(ur6->rtmsg_flags));
3068 ret |= get_user(r6.rtmsg_ifindex, &(ur6->rtmsg_ifindex));
7a229387
AB
3069
3070 r = (void *) &r6;
3071 } else { /* ipv4 */
6b96018b 3072 struct rtentry32 __user *ur4 = argp;
c6d409cf 3073 ret = copy_from_user(&r4.rt_dst, &(ur4->rt_dst),
7a229387 3074 3 * sizeof(struct sockaddr));
3ddc5b46
MD
3075 ret |= get_user(r4.rt_flags, &(ur4->rt_flags));
3076 ret |= get_user(r4.rt_metric, &(ur4->rt_metric));
3077 ret |= get_user(r4.rt_mtu, &(ur4->rt_mtu));
3078 ret |= get_user(r4.rt_window, &(ur4->rt_window));
3079 ret |= get_user(r4.rt_irtt, &(ur4->rt_irtt));
3080 ret |= get_user(rtdev, &(ur4->rt_dev));
7a229387 3081 if (rtdev) {
c6d409cf 3082 ret |= copy_from_user(devname, compat_ptr(rtdev), 15);
c3f52ae6 3083 r4.rt_dev = (char __user __force *)devname;
3084 devname[15] = 0;
7a229387
AB
3085 } else
3086 r4.rt_dev = NULL;
3087
3088 r = (void *) &r4;
3089 }
3090
3091 if (ret) {
3092 ret = -EFAULT;
3093 goto out;
3094 }
3095
c6d409cf 3096 set_fs(KERNEL_DS);
6b96018b 3097 ret = sock_do_ioctl(net, sock, cmd, (unsigned long) r);
c6d409cf 3098 set_fs(old_fs);
7a229387
AB
3099
3100out:
7a229387
AB
3101 return ret;
3102}
3103
3104/* Since old style bridge ioctl's endup using SIOCDEVPRIVATE
3105 * for some operations; this forces use of the newer bridge-utils that
25985edc 3106 * use compatible ioctls
7a229387 3107 */
6b96018b 3108static int old_bridge_ioctl(compat_ulong_t __user *argp)
7a229387 3109{
6b96018b 3110 compat_ulong_t tmp;
7a229387 3111
6b96018b 3112 if (get_user(tmp, argp))
7a229387
AB
3113 return -EFAULT;
3114 if (tmp == BRCTL_GET_VERSION)
3115 return BRCTL_VERSION + 1;
3116 return -EINVAL;
3117}
3118
6b96018b
AB
3119static int compat_sock_ioctl_trans(struct file *file, struct socket *sock,
3120 unsigned int cmd, unsigned long arg)
3121{
3122 void __user *argp = compat_ptr(arg);
3123 struct sock *sk = sock->sk;
3124 struct net *net = sock_net(sk);
7a229387 3125
6b96018b 3126 if (cmd >= SIOCDEVPRIVATE && cmd <= (SIOCDEVPRIVATE + 15))
590d4693 3127 return compat_ifr_data_ioctl(net, cmd, argp);
6b96018b
AB
3128
3129 switch (cmd) {
3130 case SIOCSIFBR:
3131 case SIOCGIFBR:
3132 return old_bridge_ioctl(argp);
3133 case SIOCGIFNAME:
3134 return dev_ifname32(net, argp);
3135 case SIOCGIFCONF:
3136 return dev_ifconf(net, argp);
3137 case SIOCETHTOOL:
3138 return ethtool_ioctl(net, argp);
7a50a240
AB
3139 case SIOCWANDEV:
3140 return compat_siocwandev(net, argp);
a2116ed2
AB
3141 case SIOCGIFMAP:
3142 case SIOCSIFMAP:
3143 return compat_sioc_ifmap(net, cmd, argp);
6b96018b
AB
3144 case SIOCBONDENSLAVE:
3145 case SIOCBONDRELEASE:
3146 case SIOCBONDSETHWADDR:
6b96018b
AB
3147 case SIOCBONDCHANGEACTIVE:
3148 return bond_ioctl(net, cmd, argp);
3149 case SIOCADDRT:
3150 case SIOCDELRT:
3151 return routing_ioctl(net, sock, cmd, argp);
3152 case SIOCGSTAMP:
3153 return do_siocgstamp(net, sock, cmd, argp);
3154 case SIOCGSTAMPNS:
3155 return do_siocgstampns(net, sock, cmd, argp);
590d4693
BH
3156 case SIOCBONDSLAVEINFOQUERY:
3157 case SIOCBONDINFOQUERY:
a2116ed2 3158 case SIOCSHWTSTAMP:
fd468c74 3159 case SIOCGHWTSTAMP:
590d4693 3160 return compat_ifr_data_ioctl(net, cmd, argp);
6b96018b
AB
3161
3162 case FIOSETOWN:
3163 case SIOCSPGRP:
3164 case FIOGETOWN:
3165 case SIOCGPGRP:
3166 case SIOCBRADDBR:
3167 case SIOCBRDELBR:
3168 case SIOCGIFVLAN:
3169 case SIOCSIFVLAN:
3170 case SIOCADDDLCI:
3171 case SIOCDELDLCI:
c62cce2c 3172 case SIOCGSKNS:
6b96018b
AB
3173 return sock_ioctl(file, cmd, arg);
3174
3175 case SIOCGIFFLAGS:
3176 case SIOCSIFFLAGS:
3177 case SIOCGIFMETRIC:
3178 case SIOCSIFMETRIC:
3179 case SIOCGIFMTU:
3180 case SIOCSIFMTU:
3181 case SIOCGIFMEM:
3182 case SIOCSIFMEM:
3183 case SIOCGIFHWADDR:
3184 case SIOCSIFHWADDR:
3185 case SIOCADDMULTI:
3186 case SIOCDELMULTI:
3187 case SIOCGIFINDEX:
6b96018b
AB
3188 case SIOCGIFADDR:
3189 case SIOCSIFADDR:
3190 case SIOCSIFHWBROADCAST:
6b96018b 3191 case SIOCDIFADDR:
6b96018b
AB
3192 case SIOCGIFBRDADDR:
3193 case SIOCSIFBRDADDR:
3194 case SIOCGIFDSTADDR:
3195 case SIOCSIFDSTADDR:
3196 case SIOCGIFNETMASK:
3197 case SIOCSIFNETMASK:
3198 case SIOCSIFPFLAGS:
3199 case SIOCGIFPFLAGS:
3200 case SIOCGIFTXQLEN:
3201 case SIOCSIFTXQLEN:
3202 case SIOCBRADDIF:
3203 case SIOCBRDELIF:
9177efd3
AB
3204 case SIOCSIFNAME:
3205 case SIOCGMIIPHY:
3206 case SIOCGMIIREG:
3207 case SIOCSMIIREG:
6b96018b 3208 return dev_ifsioc(net, sock, cmd, argp);
9177efd3 3209
6b96018b
AB
3210 case SIOCSARP:
3211 case SIOCGARP:
3212 case SIOCDARP:
6b96018b 3213 case SIOCATMARK:
9177efd3
AB
3214 return sock_do_ioctl(net, sock, cmd, arg);
3215 }
3216
6b96018b
AB
3217 return -ENOIOCTLCMD;
3218}
7a229387 3219
95c96174 3220static long compat_sock_ioctl(struct file *file, unsigned int cmd,
89bddce5 3221 unsigned long arg)
89bbfc95
SP
3222{
3223 struct socket *sock = file->private_data;
3224 int ret = -ENOIOCTLCMD;
87de87d5
DM
3225 struct sock *sk;
3226 struct net *net;
3227
3228 sk = sock->sk;
3229 net = sock_net(sk);
89bbfc95
SP
3230
3231 if (sock->ops->compat_ioctl)
3232 ret = sock->ops->compat_ioctl(sock, cmd, arg);
3233
87de87d5
DM
3234 if (ret == -ENOIOCTLCMD &&
3235 (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST))
3236 ret = compat_wext_handle_ioctl(net, cmd, arg);
3237
6b96018b
AB
3238 if (ret == -ENOIOCTLCMD)
3239 ret = compat_sock_ioctl_trans(file, sock, cmd, arg);
3240
89bbfc95
SP
3241 return ret;
3242}
3243#endif
3244
ac5a488e
SS
3245int kernel_bind(struct socket *sock, struct sockaddr *addr, int addrlen)
3246{
3247 return sock->ops->bind(sock, addr, addrlen);
3248}
c6d409cf 3249EXPORT_SYMBOL(kernel_bind);
ac5a488e
SS
3250
3251int kernel_listen(struct socket *sock, int backlog)
3252{
3253 return sock->ops->listen(sock, backlog);
3254}
c6d409cf 3255EXPORT_SYMBOL(kernel_listen);
ac5a488e
SS
3256
3257int kernel_accept(struct socket *sock, struct socket **newsock, int flags)
3258{
3259 struct sock *sk = sock->sk;
3260 int err;
3261
3262 err = sock_create_lite(sk->sk_family, sk->sk_type, sk->sk_protocol,
3263 newsock);
3264 if (err < 0)
3265 goto done;
3266
cdfbabfb 3267 err = sock->ops->accept(sock, *newsock, flags, true);
ac5a488e
SS
3268 if (err < 0) {
3269 sock_release(*newsock);
fa8705b0 3270 *newsock = NULL;
ac5a488e
SS
3271 goto done;
3272 }
3273
3274 (*newsock)->ops = sock->ops;
1b08534e 3275 __module_get((*newsock)->ops->owner);
ac5a488e
SS
3276
3277done:
3278 return err;
3279}
c6d409cf 3280EXPORT_SYMBOL(kernel_accept);
ac5a488e
SS
3281
3282int kernel_connect(struct socket *sock, struct sockaddr *addr, int addrlen,
4768fbcb 3283 int flags)
ac5a488e
SS
3284{
3285 return sock->ops->connect(sock, addr, addrlen, flags);
3286}
c6d409cf 3287EXPORT_SYMBOL(kernel_connect);
ac5a488e
SS
3288
3289int kernel_getsockname(struct socket *sock, struct sockaddr *addr,
3290 int *addrlen)
3291{
3292 return sock->ops->getname(sock, addr, addrlen, 0);
3293}
c6d409cf 3294EXPORT_SYMBOL(kernel_getsockname);
ac5a488e
SS
3295
3296int kernel_getpeername(struct socket *sock, struct sockaddr *addr,
3297 int *addrlen)
3298{
3299 return sock->ops->getname(sock, addr, addrlen, 1);
3300}
c6d409cf 3301EXPORT_SYMBOL(kernel_getpeername);
ac5a488e
SS
3302
3303int kernel_getsockopt(struct socket *sock, int level, int optname,
3304 char *optval, int *optlen)
3305{
3306 mm_segment_t oldfs = get_fs();
fb8621bb
NK
3307 char __user *uoptval;
3308 int __user *uoptlen;
ac5a488e
SS
3309 int err;
3310
fb8621bb
NK
3311 uoptval = (char __user __force *) optval;
3312 uoptlen = (int __user __force *) optlen;
3313
ac5a488e
SS
3314 set_fs(KERNEL_DS);
3315 if (level == SOL_SOCKET)
fb8621bb 3316 err = sock_getsockopt(sock, level, optname, uoptval, uoptlen);
ac5a488e 3317 else
fb8621bb
NK
3318 err = sock->ops->getsockopt(sock, level, optname, uoptval,
3319 uoptlen);
ac5a488e
SS
3320 set_fs(oldfs);
3321 return err;
3322}
c6d409cf 3323EXPORT_SYMBOL(kernel_getsockopt);
ac5a488e
SS
3324
3325int kernel_setsockopt(struct socket *sock, int level, int optname,
b7058842 3326 char *optval, unsigned int optlen)
ac5a488e
SS
3327{
3328 mm_segment_t oldfs = get_fs();
fb8621bb 3329 char __user *uoptval;
ac5a488e
SS
3330 int err;
3331
fb8621bb
NK
3332 uoptval = (char __user __force *) optval;
3333
ac5a488e
SS
3334 set_fs(KERNEL_DS);
3335 if (level == SOL_SOCKET)
fb8621bb 3336 err = sock_setsockopt(sock, level, optname, uoptval, optlen);
ac5a488e 3337 else
fb8621bb 3338 err = sock->ops->setsockopt(sock, level, optname, uoptval,
ac5a488e
SS
3339 optlen);
3340 set_fs(oldfs);
3341 return err;
3342}
c6d409cf 3343EXPORT_SYMBOL(kernel_setsockopt);
ac5a488e
SS
3344
3345int kernel_sendpage(struct socket *sock, struct page *page, int offset,
3346 size_t size, int flags)
3347{
3348 if (sock->ops->sendpage)
3349 return sock->ops->sendpage(sock, page, offset, size, flags);
3350
3351 return sock_no_sendpage(sock, page, offset, size, flags);
3352}
c6d409cf 3353EXPORT_SYMBOL(kernel_sendpage);
ac5a488e 3354
306b13eb
TH
3355int kernel_sendpage_locked(struct sock *sk, struct page *page, int offset,
3356 size_t size, int flags)
3357{
3358 struct socket *sock = sk->sk_socket;
3359
3360 if (sock->ops->sendpage_locked)
3361 return sock->ops->sendpage_locked(sk, page, offset, size,
3362 flags);
3363
3364 return sock_no_sendpage_locked(sk, page, offset, size, flags);
3365}
3366EXPORT_SYMBOL(kernel_sendpage_locked);
3367
ac5a488e
SS
3368int kernel_sock_ioctl(struct socket *sock, int cmd, unsigned long arg)
3369{
3370 mm_segment_t oldfs = get_fs();
3371 int err;
3372
3373 set_fs(KERNEL_DS);
3374 err = sock->ops->ioctl(sock, cmd, arg);
3375 set_fs(oldfs);
3376
3377 return err;
3378}
c6d409cf 3379EXPORT_SYMBOL(kernel_sock_ioctl);
ac5a488e 3380
91cf45f0
TM
3381int kernel_sock_shutdown(struct socket *sock, enum sock_shutdown_cmd how)
3382{
3383 return sock->ops->shutdown(sock, how);
3384}
91cf45f0 3385EXPORT_SYMBOL(kernel_sock_shutdown);
113c3075
P
3386
3387/* This routine returns the IP overhead imposed by a socket i.e.
3388 * the length of the underlying IP header, depending on whether
3389 * this is an IPv4 or IPv6 socket and the length from IP options turned
57240d00 3390 * on at the socket. Assumes that the caller has a lock on the socket.
113c3075
P
3391 */
3392u32 kernel_sock_ip_overhead(struct sock *sk)
3393{
3394 struct inet_sock *inet;
3395 struct ip_options_rcu *opt;
3396 u32 overhead = 0;
113c3075
P
3397#if IS_ENABLED(CONFIG_IPV6)
3398 struct ipv6_pinfo *np;
3399 struct ipv6_txoptions *optv6 = NULL;
3400#endif /* IS_ENABLED(CONFIG_IPV6) */
3401
3402 if (!sk)
3403 return overhead;
3404
113c3075
P
3405 switch (sk->sk_family) {
3406 case AF_INET:
3407 inet = inet_sk(sk);
3408 overhead += sizeof(struct iphdr);
3409 opt = rcu_dereference_protected(inet->inet_opt,
614d79c0 3410 sock_owned_by_user(sk));
113c3075
P
3411 if (opt)
3412 overhead += opt->opt.optlen;
3413 return overhead;
3414#if IS_ENABLED(CONFIG_IPV6)
3415 case AF_INET6:
3416 np = inet6_sk(sk);
3417 overhead += sizeof(struct ipv6hdr);
3418 if (np)
3419 optv6 = rcu_dereference_protected(np->opt,
614d79c0 3420 sock_owned_by_user(sk));
113c3075
P
3421 if (optv6)
3422 overhead += (optv6->opt_flen + optv6->opt_nflen);
3423 return overhead;
3424#endif /* IS_ENABLED(CONFIG_IPV6) */
3425 default: /* Returns 0 overhead if the socket is not ipv4 or ipv6 */
3426 return overhead;
3427 }
3428}
3429EXPORT_SYMBOL(kernel_sock_ip_overhead);