kill dev_ifsioc()
[linux-2.6-block.git] / net / socket.c
CommitLineData
1da177e4
LT
1/*
2 * NET An implementation of the SOCKET network access protocol.
3 *
4 * Version: @(#)socket.c 1.1.93 18/02/95
5 *
6 * Authors: Orest Zborowski, <obz@Kodak.COM>
02c30a84 7 * Ross Biro
1da177e4
LT
8 * Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
9 *
10 * Fixes:
11 * Anonymous : NOTSOCK/BADF cleanup. Error fix in
12 * shutdown()
13 * Alan Cox : verify_area() fixes
14 * Alan Cox : Removed DDI
15 * Jonathan Kamens : SOCK_DGRAM reconnect bug
16 * Alan Cox : Moved a load of checks to the very
17 * top level.
18 * Alan Cox : Move address structures to/from user
19 * mode above the protocol layers.
20 * Rob Janssen : Allow 0 length sends.
21 * Alan Cox : Asynchronous I/O support (cribbed from the
22 * tty drivers).
23 * Niibe Yutaka : Asynchronous I/O for writes (4.4BSD style)
24 * Jeff Uphoff : Made max number of sockets command-line
25 * configurable.
26 * Matti Aarnio : Made the number of sockets dynamic,
27 * to be allocated when needed, and mr.
28 * Uphoff's max is used as max to be
29 * allowed to allocate.
30 * Linus : Argh. removed all the socket allocation
31 * altogether: it's in the inode now.
32 * Alan Cox : Made sock_alloc()/sock_release() public
33 * for NetROM and future kernel nfsd type
34 * stuff.
35 * Alan Cox : sendmsg/recvmsg basics.
36 * Tom Dyas : Export net symbols.
37 * Marcin Dalecki : Fixed problems with CONFIG_NET="n".
38 * Alan Cox : Added thread locking to sys_* calls
39 * for sockets. May have errors at the
40 * moment.
41 * Kevin Buhr : Fixed the dumb errors in the above.
42 * Andi Kleen : Some small cleanups, optimizations,
43 * and fixed a copy_from_user() bug.
44 * Tigran Aivazian : sys_send(args) calls sys_sendto(args, NULL, 0)
89bddce5 45 * Tigran Aivazian : Made listen(2) backlog sanity checks
1da177e4
LT
46 * protocol-independent
47 *
48 *
49 * This program is free software; you can redistribute it and/or
50 * modify it under the terms of the GNU General Public License
51 * as published by the Free Software Foundation; either version
52 * 2 of the License, or (at your option) any later version.
53 *
54 *
55 * This module is effectively the top level interface to the BSD socket
89bddce5 56 * paradigm.
1da177e4
LT
57 *
58 * Based upon Swansea University Computer Society NET3.039
59 */
60
1da177e4 61#include <linux/mm.h>
1da177e4
LT
62#include <linux/socket.h>
63#include <linux/file.h>
64#include <linux/net.h>
65#include <linux/interrupt.h>
aaca0bdc 66#include <linux/thread_info.h>
55737fda 67#include <linux/rcupdate.h>
1da177e4
LT
68#include <linux/netdevice.h>
69#include <linux/proc_fs.h>
70#include <linux/seq_file.h>
4a3e2f71 71#include <linux/mutex.h>
1da177e4 72#include <linux/if_bridge.h>
20380731
ACM
73#include <linux/if_frad.h>
74#include <linux/if_vlan.h>
408eccce 75#include <linux/ptp_classify.h>
1da177e4
LT
76#include <linux/init.h>
77#include <linux/poll.h>
78#include <linux/cache.h>
79#include <linux/module.h>
80#include <linux/highmem.h>
1da177e4
LT
81#include <linux/mount.h>
82#include <linux/security.h>
83#include <linux/syscalls.h>
84#include <linux/compat.h>
85#include <linux/kmod.h>
3ec3b2fb 86#include <linux/audit.h>
d86b5e0e 87#include <linux/wireless.h>
1b8d7ae4 88#include <linux/nsproxy.h>
1fd7317d 89#include <linux/magic.h>
5a0e3ad6 90#include <linux/slab.h>
600e1779 91#include <linux/xattr.h>
1da177e4 92
7c0f6ba6 93#include <linux/uaccess.h>
1da177e4
LT
94#include <asm/unistd.h>
95
96#include <net/compat.h>
87de87d5 97#include <net/wext.h>
f8451725 98#include <net/cls_cgroup.h>
1da177e4
LT
99
100#include <net/sock.h>
101#include <linux/netfilter.h>
102
6b96018b
AB
103#include <linux/if_tun.h>
104#include <linux/ipv6_route.h>
105#include <linux/route.h>
6b96018b
AB
106#include <linux/sockios.h>
107#include <linux/atalk.h>
076bb0c8 108#include <net/busy_poll.h>
f24b9be5 109#include <linux/errqueue.h>
06021292 110
e0d1095a 111#ifdef CONFIG_NET_RX_BUSY_POLL
64b0dc51
ET
112unsigned int sysctl_net_busy_read __read_mostly;
113unsigned int sysctl_net_busy_poll __read_mostly;
06021292 114#endif
6b96018b 115
8ae5e030
AV
116static ssize_t sock_read_iter(struct kiocb *iocb, struct iov_iter *to);
117static ssize_t sock_write_iter(struct kiocb *iocb, struct iov_iter *from);
89bddce5 118static int sock_mmap(struct file *file, struct vm_area_struct *vma);
1da177e4
LT
119
120static int sock_close(struct inode *inode, struct file *file);
121static unsigned int sock_poll(struct file *file,
122 struct poll_table_struct *wait);
89bddce5 123static long sock_ioctl(struct file *file, unsigned int cmd, unsigned long arg);
89bbfc95
SP
124#ifdef CONFIG_COMPAT
125static long compat_sock_ioctl(struct file *file,
89bddce5 126 unsigned int cmd, unsigned long arg);
89bbfc95 127#endif
1da177e4 128static int sock_fasync(int fd, struct file *filp, int on);
1da177e4
LT
129static ssize_t sock_sendpage(struct file *file, struct page *page,
130 int offset, size_t size, loff_t *ppos, int more);
9c55e01c 131static ssize_t sock_splice_read(struct file *file, loff_t *ppos,
c6d409cf 132 struct pipe_inode_info *pipe, size_t len,
9c55e01c 133 unsigned int flags);
1da177e4 134
1da177e4
LT
135/*
136 * Socket files have a set of 'special' operations as well as the generic file ones. These don't appear
137 * in the operation structures but are done directly via the socketcall() multiplexor.
138 */
139
da7071d7 140static const struct file_operations socket_file_ops = {
1da177e4
LT
141 .owner = THIS_MODULE,
142 .llseek = no_llseek,
8ae5e030
AV
143 .read_iter = sock_read_iter,
144 .write_iter = sock_write_iter,
1da177e4
LT
145 .poll = sock_poll,
146 .unlocked_ioctl = sock_ioctl,
89bbfc95
SP
147#ifdef CONFIG_COMPAT
148 .compat_ioctl = compat_sock_ioctl,
149#endif
1da177e4 150 .mmap = sock_mmap,
1da177e4
LT
151 .release = sock_close,
152 .fasync = sock_fasync,
5274f052
JA
153 .sendpage = sock_sendpage,
154 .splice_write = generic_splice_sendpage,
9c55e01c 155 .splice_read = sock_splice_read,
1da177e4
LT
156};
157
158/*
159 * The protocol list. Each protocol is registered in here.
160 */
161
1da177e4 162static DEFINE_SPINLOCK(net_family_lock);
190683a9 163static const struct net_proto_family __rcu *net_families[NPROTO] __read_mostly;
1da177e4 164
1da177e4 165/*
89bddce5
SH
166 * Support routines.
167 * Move socket addresses back and forth across the kernel/user
168 * divide and look after the messy bits.
1da177e4
LT
169 */
170
1da177e4
LT
171/**
172 * move_addr_to_kernel - copy a socket address into kernel space
173 * @uaddr: Address in user space
174 * @kaddr: Address in kernel space
175 * @ulen: Length in user space
176 *
177 * The address is copied into kernel space. If the provided address is
178 * too long an error code of -EINVAL is returned. If the copy gives
179 * invalid addresses -EFAULT is returned. On a success 0 is returned.
180 */
181
43db362d 182int move_addr_to_kernel(void __user *uaddr, int ulen, struct sockaddr_storage *kaddr)
1da177e4 183{
230b1839 184 if (ulen < 0 || ulen > sizeof(struct sockaddr_storage))
1da177e4 185 return -EINVAL;
89bddce5 186 if (ulen == 0)
1da177e4 187 return 0;
89bddce5 188 if (copy_from_user(kaddr, uaddr, ulen))
1da177e4 189 return -EFAULT;
3ec3b2fb 190 return audit_sockaddr(ulen, kaddr);
1da177e4
LT
191}
192
193/**
194 * move_addr_to_user - copy an address to user space
195 * @kaddr: kernel space address
196 * @klen: length of address in kernel
197 * @uaddr: user space address
198 * @ulen: pointer to user length field
199 *
200 * The value pointed to by ulen on entry is the buffer length available.
201 * This is overwritten with the buffer space used. -EINVAL is returned
202 * if an overlong buffer is specified or a negative buffer size. -EFAULT
203 * is returned if either the buffer or the length field are not
204 * accessible.
205 * After copying the data up to the limit the user specifies, the true
206 * length of the data is written over the length limit the user
207 * specified. Zero is returned for a success.
208 */
89bddce5 209
43db362d 210static int move_addr_to_user(struct sockaddr_storage *kaddr, int klen,
11165f14 211 void __user *uaddr, int __user *ulen)
1da177e4
LT
212{
213 int err;
214 int len;
215
68c6beb3 216 BUG_ON(klen > sizeof(struct sockaddr_storage));
89bddce5
SH
217 err = get_user(len, ulen);
218 if (err)
1da177e4 219 return err;
89bddce5
SH
220 if (len > klen)
221 len = klen;
68c6beb3 222 if (len < 0)
1da177e4 223 return -EINVAL;
89bddce5 224 if (len) {
d6fe3945
SG
225 if (audit_sockaddr(klen, kaddr))
226 return -ENOMEM;
89bddce5 227 if (copy_to_user(uaddr, kaddr, len))
1da177e4
LT
228 return -EFAULT;
229 }
230 /*
89bddce5
SH
231 * "fromlen shall refer to the value before truncation.."
232 * 1003.1g
1da177e4
LT
233 */
234 return __put_user(klen, ulen);
235}
236
e18b890b 237static struct kmem_cache *sock_inode_cachep __read_mostly;
1da177e4
LT
238
239static struct inode *sock_alloc_inode(struct super_block *sb)
240{
241 struct socket_alloc *ei;
eaefd110 242 struct socket_wq *wq;
89bddce5 243
e94b1766 244 ei = kmem_cache_alloc(sock_inode_cachep, GFP_KERNEL);
1da177e4
LT
245 if (!ei)
246 return NULL;
eaefd110
ED
247 wq = kmalloc(sizeof(*wq), GFP_KERNEL);
248 if (!wq) {
43815482
ED
249 kmem_cache_free(sock_inode_cachep, ei);
250 return NULL;
251 }
eaefd110
ED
252 init_waitqueue_head(&wq->wait);
253 wq->fasync_list = NULL;
574aab1e 254 wq->flags = 0;
eaefd110 255 RCU_INIT_POINTER(ei->socket.wq, wq);
89bddce5 256
1da177e4
LT
257 ei->socket.state = SS_UNCONNECTED;
258 ei->socket.flags = 0;
259 ei->socket.ops = NULL;
260 ei->socket.sk = NULL;
261 ei->socket.file = NULL;
1da177e4
LT
262
263 return &ei->vfs_inode;
264}
265
266static void sock_destroy_inode(struct inode *inode)
267{
43815482 268 struct socket_alloc *ei;
eaefd110 269 struct socket_wq *wq;
43815482
ED
270
271 ei = container_of(inode, struct socket_alloc, vfs_inode);
eaefd110 272 wq = rcu_dereference_protected(ei->socket.wq, 1);
61845220 273 kfree_rcu(wq, rcu);
43815482 274 kmem_cache_free(sock_inode_cachep, ei);
1da177e4
LT
275}
276
51cc5068 277static void init_once(void *foo)
1da177e4 278{
89bddce5 279 struct socket_alloc *ei = (struct socket_alloc *)foo;
1da177e4 280
a35afb83 281 inode_init_once(&ei->vfs_inode);
1da177e4 282}
89bddce5 283
1e911632 284static void init_inodecache(void)
1da177e4
LT
285{
286 sock_inode_cachep = kmem_cache_create("sock_inode_cache",
89bddce5
SH
287 sizeof(struct socket_alloc),
288 0,
289 (SLAB_HWCACHE_ALIGN |
290 SLAB_RECLAIM_ACCOUNT |
5d097056 291 SLAB_MEM_SPREAD | SLAB_ACCOUNT),
20c2df83 292 init_once);
1e911632 293 BUG_ON(sock_inode_cachep == NULL);
1da177e4
LT
294}
295
b87221de 296static const struct super_operations sockfs_ops = {
c6d409cf
ED
297 .alloc_inode = sock_alloc_inode,
298 .destroy_inode = sock_destroy_inode,
299 .statfs = simple_statfs,
1da177e4
LT
300};
301
c23fbb6b
ED
302/*
303 * sockfs_dname() is called from d_path().
304 */
305static char *sockfs_dname(struct dentry *dentry, char *buffer, int buflen)
306{
307 return dynamic_dname(dentry, buffer, buflen, "socket:[%lu]",
c5ef6035 308 d_inode(dentry)->i_ino);
c23fbb6b
ED
309}
310
3ba13d17 311static const struct dentry_operations sockfs_dentry_operations = {
c23fbb6b 312 .d_dname = sockfs_dname,
1da177e4
LT
313};
314
bba0bd31
AG
315static int sockfs_xattr_get(const struct xattr_handler *handler,
316 struct dentry *dentry, struct inode *inode,
317 const char *suffix, void *value, size_t size)
318{
319 if (value) {
320 if (dentry->d_name.len + 1 > size)
321 return -ERANGE;
322 memcpy(value, dentry->d_name.name, dentry->d_name.len + 1);
323 }
324 return dentry->d_name.len + 1;
325}
326
327#define XATTR_SOCKPROTONAME_SUFFIX "sockprotoname"
328#define XATTR_NAME_SOCKPROTONAME (XATTR_SYSTEM_PREFIX XATTR_SOCKPROTONAME_SUFFIX)
329#define XATTR_NAME_SOCKPROTONAME_LEN (sizeof(XATTR_NAME_SOCKPROTONAME)-1)
330
331static const struct xattr_handler sockfs_xattr_handler = {
332 .name = XATTR_NAME_SOCKPROTONAME,
333 .get = sockfs_xattr_get,
334};
335
4a590153
AG
336static int sockfs_security_xattr_set(const struct xattr_handler *handler,
337 struct dentry *dentry, struct inode *inode,
338 const char *suffix, const void *value,
339 size_t size, int flags)
340{
341 /* Handled by LSM. */
342 return -EAGAIN;
343}
344
345static const struct xattr_handler sockfs_security_xattr_handler = {
346 .prefix = XATTR_SECURITY_PREFIX,
347 .set = sockfs_security_xattr_set,
348};
349
bba0bd31
AG
350static const struct xattr_handler *sockfs_xattr_handlers[] = {
351 &sockfs_xattr_handler,
4a590153 352 &sockfs_security_xattr_handler,
bba0bd31
AG
353 NULL
354};
355
c74a1cbb
AV
356static struct dentry *sockfs_mount(struct file_system_type *fs_type,
357 int flags, const char *dev_name, void *data)
358{
bba0bd31
AG
359 return mount_pseudo_xattr(fs_type, "socket:", &sockfs_ops,
360 sockfs_xattr_handlers,
361 &sockfs_dentry_operations, SOCKFS_MAGIC);
c74a1cbb
AV
362}
363
364static struct vfsmount *sock_mnt __read_mostly;
365
366static struct file_system_type sock_fs_type = {
367 .name = "sockfs",
368 .mount = sockfs_mount,
369 .kill_sb = kill_anon_super,
370};
371
1da177e4
LT
372/*
373 * Obtains the first available file descriptor and sets it up for use.
374 *
39d8c1b6
DM
375 * These functions create file structures and maps them to fd space
376 * of the current process. On success it returns file descriptor
1da177e4
LT
377 * and file struct implicitly stored in sock->file.
378 * Note that another thread may close file descriptor before we return
379 * from this function. We use the fact that now we do not refer
380 * to socket after mapping. If one day we will need it, this
381 * function will increment ref. count on file by 1.
382 *
383 * In any case returned fd MAY BE not valid!
384 * This race condition is unavoidable
385 * with shared fd spaces, we cannot solve it inside kernel,
386 * but we take care of internal coherence yet.
387 */
388
aab174f0 389struct file *sock_alloc_file(struct socket *sock, int flags, const char *dname)
1da177e4 390{
7cbe66b6 391 struct qstr name = { .name = "" };
2c48b9c4 392 struct path path;
7cbe66b6 393 struct file *file;
1da177e4 394
600e1779
MY
395 if (dname) {
396 name.name = dname;
397 name.len = strlen(name.name);
398 } else if (sock->sk) {
399 name.name = sock->sk->sk_prot_creator->name;
400 name.len = strlen(name.name);
401 }
4b936885 402 path.dentry = d_alloc_pseudo(sock_mnt->mnt_sb, &name);
8e1611e2
AV
403 if (unlikely(!path.dentry)) {
404 sock_release(sock);
28407630 405 return ERR_PTR(-ENOMEM);
8e1611e2 406 }
2c48b9c4 407 path.mnt = mntget(sock_mnt);
39d8c1b6 408
2c48b9c4 409 d_instantiate(path.dentry, SOCK_INODE(sock));
39d8c1b6 410
2c48b9c4 411 file = alloc_file(&path, FMODE_READ | FMODE_WRITE,
ce8d2cdf 412 &socket_file_ops);
b5ffe634 413 if (IS_ERR(file)) {
8e1611e2 414 /* drop dentry, keep inode for a bit */
c5ef6035 415 ihold(d_inode(path.dentry));
2c48b9c4 416 path_put(&path);
8e1611e2
AV
417 /* ... and now kill it properly */
418 sock_release(sock);
39b65252 419 return file;
cc3808f8
AV
420 }
421
422 sock->file = file;
77d27200 423 file->f_flags = O_RDWR | (flags & O_NONBLOCK);
39d8c1b6 424 file->private_data = sock;
28407630 425 return file;
39d8c1b6 426}
56b31d1c 427EXPORT_SYMBOL(sock_alloc_file);
39d8c1b6 428
56b31d1c 429static int sock_map_fd(struct socket *sock, int flags)
39d8c1b6
DM
430{
431 struct file *newfile;
28407630 432 int fd = get_unused_fd_flags(flags);
ce4bb04c
AV
433 if (unlikely(fd < 0)) {
434 sock_release(sock);
28407630 435 return fd;
ce4bb04c 436 }
39d8c1b6 437
aab174f0 438 newfile = sock_alloc_file(sock, flags, NULL);
28407630 439 if (likely(!IS_ERR(newfile))) {
39d8c1b6 440 fd_install(fd, newfile);
28407630
AV
441 return fd;
442 }
7cbe66b6 443
28407630
AV
444 put_unused_fd(fd);
445 return PTR_ERR(newfile);
1da177e4
LT
446}
447
406a3c63 448struct socket *sock_from_file(struct file *file, int *err)
6cb153ca 449{
6cb153ca
BL
450 if (file->f_op == &socket_file_ops)
451 return file->private_data; /* set in sock_map_fd */
452
23bb80d2
ED
453 *err = -ENOTSOCK;
454 return NULL;
6cb153ca 455}
406a3c63 456EXPORT_SYMBOL(sock_from_file);
6cb153ca 457
1da177e4 458/**
c6d409cf 459 * sockfd_lookup - Go from a file number to its socket slot
1da177e4
LT
460 * @fd: file handle
461 * @err: pointer to an error code return
462 *
463 * The file handle passed in is locked and the socket it is bound
241c4667 464 * to is returned. If an error occurs the err pointer is overwritten
1da177e4
LT
465 * with a negative errno code and NULL is returned. The function checks
466 * for both invalid handles and passing a handle which is not a socket.
467 *
468 * On a success the socket object pointer is returned.
469 */
470
471struct socket *sockfd_lookup(int fd, int *err)
472{
473 struct file *file;
1da177e4
LT
474 struct socket *sock;
475
89bddce5
SH
476 file = fget(fd);
477 if (!file) {
1da177e4
LT
478 *err = -EBADF;
479 return NULL;
480 }
89bddce5 481
6cb153ca
BL
482 sock = sock_from_file(file, err);
483 if (!sock)
1da177e4 484 fput(file);
6cb153ca
BL
485 return sock;
486}
c6d409cf 487EXPORT_SYMBOL(sockfd_lookup);
1da177e4 488
6cb153ca
BL
489static struct socket *sockfd_lookup_light(int fd, int *err, int *fput_needed)
490{
00e188ef 491 struct fd f = fdget(fd);
6cb153ca
BL
492 struct socket *sock;
493
3672558c 494 *err = -EBADF;
00e188ef
AV
495 if (f.file) {
496 sock = sock_from_file(f.file, err);
497 if (likely(sock)) {
498 *fput_needed = f.flags;
6cb153ca 499 return sock;
00e188ef
AV
500 }
501 fdput(f);
1da177e4 502 }
6cb153ca 503 return NULL;
1da177e4
LT
504}
505
600e1779
MY
506static ssize_t sockfs_listxattr(struct dentry *dentry, char *buffer,
507 size_t size)
508{
509 ssize_t len;
510 ssize_t used = 0;
511
c5ef6035 512 len = security_inode_listsecurity(d_inode(dentry), buffer, size);
600e1779
MY
513 if (len < 0)
514 return len;
515 used += len;
516 if (buffer) {
517 if (size < used)
518 return -ERANGE;
519 buffer += len;
520 }
521
522 len = (XATTR_NAME_SOCKPROTONAME_LEN + 1);
523 used += len;
524 if (buffer) {
525 if (size < used)
526 return -ERANGE;
527 memcpy(buffer, XATTR_NAME_SOCKPROTONAME, len);
528 buffer += len;
529 }
530
531 return used;
532}
533
dc647ec8 534static int sockfs_setattr(struct dentry *dentry, struct iattr *iattr)
86741ec2
LC
535{
536 int err = simple_setattr(dentry, iattr);
537
e1a3a60a 538 if (!err && (iattr->ia_valid & ATTR_UID)) {
86741ec2
LC
539 struct socket *sock = SOCKET_I(d_inode(dentry));
540
541 sock->sk->sk_uid = iattr->ia_uid;
542 }
543
544 return err;
545}
546
600e1779 547static const struct inode_operations sockfs_inode_ops = {
600e1779 548 .listxattr = sockfs_listxattr,
86741ec2 549 .setattr = sockfs_setattr,
600e1779
MY
550};
551
1da177e4
LT
552/**
553 * sock_alloc - allocate a socket
89bddce5 554 *
1da177e4
LT
555 * Allocate a new inode and socket object. The two are bound together
556 * and initialised. The socket is then returned. If we are out of inodes
557 * NULL is returned.
558 */
559
f4a00aac 560struct socket *sock_alloc(void)
1da177e4 561{
89bddce5
SH
562 struct inode *inode;
563 struct socket *sock;
1da177e4 564
a209dfc7 565 inode = new_inode_pseudo(sock_mnt->mnt_sb);
1da177e4
LT
566 if (!inode)
567 return NULL;
568
569 sock = SOCKET_I(inode);
570
85fe4025 571 inode->i_ino = get_next_ino();
89bddce5 572 inode->i_mode = S_IFSOCK | S_IRWXUGO;
8192b0c4
DH
573 inode->i_uid = current_fsuid();
574 inode->i_gid = current_fsgid();
600e1779 575 inode->i_op = &sockfs_inode_ops;
1da177e4 576
1da177e4
LT
577 return sock;
578}
f4a00aac 579EXPORT_SYMBOL(sock_alloc);
1da177e4 580
1da177e4
LT
581/**
582 * sock_release - close a socket
583 * @sock: socket to close
584 *
585 * The socket is released from the protocol stack if it has a release
586 * callback, and the inode is then released if the socket is bound to
89bddce5 587 * an inode not a file.
1da177e4 588 */
89bddce5 589
1da177e4
LT
590void sock_release(struct socket *sock)
591{
592 if (sock->ops) {
593 struct module *owner = sock->ops->owner;
594
595 sock->ops->release(sock);
596 sock->ops = NULL;
597 module_put(owner);
598 }
599
eaefd110 600 if (rcu_dereference_protected(sock->wq, 1)->fasync_list)
3410f22e 601 pr_err("%s: fasync list not empty!\n", __func__);
1da177e4 602
1da177e4
LT
603 if (!sock->file) {
604 iput(SOCK_INODE(sock));
605 return;
606 }
89bddce5 607 sock->file = NULL;
1da177e4 608}
c6d409cf 609EXPORT_SYMBOL(sock_release);
1da177e4 610
c14ac945 611void __sock_tx_timestamp(__u16 tsflags, __u8 *tx_flags)
20d49473 612{
140c55d4
ED
613 u8 flags = *tx_flags;
614
c14ac945 615 if (tsflags & SOF_TIMESTAMPING_TX_HARDWARE)
140c55d4
ED
616 flags |= SKBTX_HW_TSTAMP;
617
c14ac945 618 if (tsflags & SOF_TIMESTAMPING_TX_SOFTWARE)
140c55d4
ED
619 flags |= SKBTX_SW_TSTAMP;
620
c14ac945 621 if (tsflags & SOF_TIMESTAMPING_TX_SCHED)
140c55d4
ED
622 flags |= SKBTX_SCHED_TSTAMP;
623
140c55d4 624 *tx_flags = flags;
20d49473 625}
67cc0d40 626EXPORT_SYMBOL(__sock_tx_timestamp);
20d49473 627
d8725c86 628static inline int sock_sendmsg_nosec(struct socket *sock, struct msghdr *msg)
1da177e4 629{
01e97e65 630 int ret = sock->ops->sendmsg(sock, msg, msg_data_left(msg));
d8725c86
AV
631 BUG_ON(ret == -EIOCBQUEUED);
632 return ret;
1da177e4
LT
633}
634
d8725c86 635int sock_sendmsg(struct socket *sock, struct msghdr *msg)
228e548e 636{
d8725c86 637 int err = security_socket_sendmsg(sock, msg,
01e97e65 638 msg_data_left(msg));
228e548e 639
d8725c86 640 return err ?: sock_sendmsg_nosec(sock, msg);
0cf00c6f 641}
c6d409cf 642EXPORT_SYMBOL(sock_sendmsg);
1da177e4
LT
643
644int kernel_sendmsg(struct socket *sock, struct msghdr *msg,
645 struct kvec *vec, size_t num, size_t size)
646{
6aa24814 647 iov_iter_kvec(&msg->msg_iter, WRITE | ITER_KVEC, vec, num, size);
d8725c86 648 return sock_sendmsg(sock, msg);
1da177e4 649}
c6d409cf 650EXPORT_SYMBOL(kernel_sendmsg);
1da177e4 651
306b13eb
TH
652int kernel_sendmsg_locked(struct sock *sk, struct msghdr *msg,
653 struct kvec *vec, size_t num, size_t size)
654{
655 struct socket *sock = sk->sk_socket;
656
657 if (!sock->ops->sendmsg_locked)
db5980d8 658 return sock_no_sendmsg_locked(sk, msg, size);
306b13eb
TH
659
660 iov_iter_kvec(&msg->msg_iter, WRITE | ITER_KVEC, vec, num, size);
661
662 return sock->ops->sendmsg_locked(sk, msg, msg_data_left(msg));
663}
664EXPORT_SYMBOL(kernel_sendmsg_locked);
665
8605330a
SHY
666static bool skb_is_err_queue(const struct sk_buff *skb)
667{
668 /* pkt_type of skbs enqueued on the error queue are set to
669 * PACKET_OUTGOING in skb_set_err_queue(). This is only safe to do
670 * in recvmsg, since skbs received on a local socket will never
671 * have a pkt_type of PACKET_OUTGOING.
672 */
673 return skb->pkt_type == PACKET_OUTGOING;
674}
675
b50a5c70
ML
676/* On transmit, software and hardware timestamps are returned independently.
677 * As the two skb clones share the hardware timestamp, which may be updated
678 * before the software timestamp is received, a hardware TX timestamp may be
679 * returned only if there is no software TX timestamp. Ignore false software
680 * timestamps, which may be made in the __sock_recv_timestamp() call when the
681 * option SO_TIMESTAMP(NS) is enabled on the socket, even when the skb has a
682 * hardware timestamp.
683 */
684static bool skb_is_swtx_tstamp(const struct sk_buff *skb, int false_tstamp)
685{
686 return skb->tstamp && !false_tstamp && skb_is_err_queue(skb);
687}
688
aad9c8c4
ML
689static void put_ts_pktinfo(struct msghdr *msg, struct sk_buff *skb)
690{
691 struct scm_ts_pktinfo ts_pktinfo;
692 struct net_device *orig_dev;
693
694 if (!skb_mac_header_was_set(skb))
695 return;
696
697 memset(&ts_pktinfo, 0, sizeof(ts_pktinfo));
698
699 rcu_read_lock();
700 orig_dev = dev_get_by_napi_id(skb_napi_id(skb));
701 if (orig_dev)
702 ts_pktinfo.if_index = orig_dev->ifindex;
703 rcu_read_unlock();
704
705 ts_pktinfo.pkt_length = skb->len - skb_mac_offset(skb);
706 put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMPING_PKTINFO,
707 sizeof(ts_pktinfo), &ts_pktinfo);
708}
709
92f37fd2
ED
710/*
711 * called from sock_recv_timestamp() if sock_flag(sk, SOCK_RCVTSTAMP)
712 */
713void __sock_recv_timestamp(struct msghdr *msg, struct sock *sk,
714 struct sk_buff *skb)
715{
20d49473 716 int need_software_tstamp = sock_flag(sk, SOCK_RCVTSTAMP);
f24b9be5 717 struct scm_timestamping tss;
b50a5c70 718 int empty = 1, false_tstamp = 0;
20d49473
PO
719 struct skb_shared_hwtstamps *shhwtstamps =
720 skb_hwtstamps(skb);
721
722 /* Race occurred between timestamp enabling and packet
723 receiving. Fill in the current time for now. */
b50a5c70 724 if (need_software_tstamp && skb->tstamp == 0) {
20d49473 725 __net_timestamp(skb);
b50a5c70
ML
726 false_tstamp = 1;
727 }
20d49473
PO
728
729 if (need_software_tstamp) {
730 if (!sock_flag(sk, SOCK_RCVTSTAMPNS)) {
731 struct timeval tv;
732 skb_get_timestamp(skb, &tv);
733 put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMP,
734 sizeof(tv), &tv);
735 } else {
f24b9be5
WB
736 struct timespec ts;
737 skb_get_timestampns(skb, &ts);
20d49473 738 put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMPNS,
f24b9be5 739 sizeof(ts), &ts);
20d49473
PO
740 }
741 }
742
f24b9be5 743 memset(&tss, 0, sizeof(tss));
c199105d 744 if ((sk->sk_tsflags & SOF_TIMESTAMPING_SOFTWARE) &&
f24b9be5 745 ktime_to_timespec_cond(skb->tstamp, tss.ts + 0))
20d49473 746 empty = 0;
4d276eb6 747 if (shhwtstamps &&
b9f40e21 748 (sk->sk_tsflags & SOF_TIMESTAMPING_RAW_HARDWARE) &&
b50a5c70 749 !skb_is_swtx_tstamp(skb, false_tstamp) &&
aad9c8c4 750 ktime_to_timespec_cond(shhwtstamps->hwtstamp, tss.ts + 2)) {
4d276eb6 751 empty = 0;
aad9c8c4
ML
752 if ((sk->sk_tsflags & SOF_TIMESTAMPING_OPT_PKTINFO) &&
753 !skb_is_err_queue(skb))
754 put_ts_pktinfo(msg, skb);
755 }
1c885808 756 if (!empty) {
20d49473 757 put_cmsg(msg, SOL_SOCKET,
f24b9be5 758 SCM_TIMESTAMPING, sizeof(tss), &tss);
1c885808 759
8605330a 760 if (skb_is_err_queue(skb) && skb->len &&
4ef1b286 761 SKB_EXT_ERR(skb)->opt_stats)
1c885808
FY
762 put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMPING_OPT_STATS,
763 skb->len, skb->data);
764 }
92f37fd2 765}
7c81fd8b
ACM
766EXPORT_SYMBOL_GPL(__sock_recv_timestamp);
767
6e3e939f
JB
768void __sock_recv_wifi_status(struct msghdr *msg, struct sock *sk,
769 struct sk_buff *skb)
770{
771 int ack;
772
773 if (!sock_flag(sk, SOCK_WIFI_STATUS))
774 return;
775 if (!skb->wifi_acked_valid)
776 return;
777
778 ack = skb->wifi_acked;
779
780 put_cmsg(msg, SOL_SOCKET, SCM_WIFI_STATUS, sizeof(ack), &ack);
781}
782EXPORT_SYMBOL_GPL(__sock_recv_wifi_status);
783
11165f14 784static inline void sock_recv_drops(struct msghdr *msg, struct sock *sk,
785 struct sk_buff *skb)
3b885787 786{
744d5a3e 787 if (sock_flag(sk, SOCK_RXQ_OVFL) && skb && SOCK_SKB_CB(skb)->dropcount)
3b885787 788 put_cmsg(msg, SOL_SOCKET, SO_RXQ_OVFL,
744d5a3e 789 sizeof(__u32), &SOCK_SKB_CB(skb)->dropcount);
3b885787
NH
790}
791
767dd033 792void __sock_recv_ts_and_drops(struct msghdr *msg, struct sock *sk,
3b885787
NH
793 struct sk_buff *skb)
794{
795 sock_recv_timestamp(msg, sk, skb);
796 sock_recv_drops(msg, sk, skb);
797}
767dd033 798EXPORT_SYMBOL_GPL(__sock_recv_ts_and_drops);
3b885787 799
1b784140 800static inline int sock_recvmsg_nosec(struct socket *sock, struct msghdr *msg,
2da62906 801 int flags)
1da177e4 802{
2da62906 803 return sock->ops->recvmsg(sock, msg, msg_data_left(msg), flags);
1da177e4
LT
804}
805
2da62906 806int sock_recvmsg(struct socket *sock, struct msghdr *msg, int flags)
a2e27255 807{
2da62906 808 int err = security_socket_recvmsg(sock, msg, msg_data_left(msg), flags);
a2e27255 809
2da62906 810 return err ?: sock_recvmsg_nosec(sock, msg, flags);
1da177e4 811}
c6d409cf 812EXPORT_SYMBOL(sock_recvmsg);
1da177e4 813
c1249c0a
ML
814/**
815 * kernel_recvmsg - Receive a message from a socket (kernel space)
816 * @sock: The socket to receive the message from
817 * @msg: Received message
818 * @vec: Input s/g array for message data
819 * @num: Size of input s/g array
820 * @size: Number of bytes to read
821 * @flags: Message flags (MSG_DONTWAIT, etc...)
822 *
823 * On return the msg structure contains the scatter/gather array passed in the
824 * vec argument. The array is modified so that it consists of the unfilled
825 * portion of the original array.
826 *
827 * The returned value is the total number of bytes received, or an error.
828 */
89bddce5
SH
829int kernel_recvmsg(struct socket *sock, struct msghdr *msg,
830 struct kvec *vec, size_t num, size_t size, int flags)
1da177e4
LT
831{
832 mm_segment_t oldfs = get_fs();
833 int result;
834
6aa24814 835 iov_iter_kvec(&msg->msg_iter, READ | ITER_KVEC, vec, num, size);
1da177e4 836 set_fs(KERNEL_DS);
2da62906 837 result = sock_recvmsg(sock, msg, flags);
1da177e4
LT
838 set_fs(oldfs);
839 return result;
840}
c6d409cf 841EXPORT_SYMBOL(kernel_recvmsg);
1da177e4 842
ce1d4d3e
CH
843static ssize_t sock_sendpage(struct file *file, struct page *page,
844 int offset, size_t size, loff_t *ppos, int more)
1da177e4 845{
1da177e4
LT
846 struct socket *sock;
847 int flags;
848
ce1d4d3e
CH
849 sock = file->private_data;
850
35f9c09f
ED
851 flags = (file->f_flags & O_NONBLOCK) ? MSG_DONTWAIT : 0;
852 /* more is a combination of MSG_MORE and MSG_SENDPAGE_NOTLAST */
853 flags |= more;
ce1d4d3e 854
e6949583 855 return kernel_sendpage(sock, page, offset, size, flags);
ce1d4d3e 856}
1da177e4 857
9c55e01c 858static ssize_t sock_splice_read(struct file *file, loff_t *ppos,
c6d409cf 859 struct pipe_inode_info *pipe, size_t len,
9c55e01c
JA
860 unsigned int flags)
861{
862 struct socket *sock = file->private_data;
863
997b37da
RDC
864 if (unlikely(!sock->ops->splice_read))
865 return -EINVAL;
866
9c55e01c
JA
867 return sock->ops->splice_read(sock, ppos, pipe, len, flags);
868}
869
8ae5e030 870static ssize_t sock_read_iter(struct kiocb *iocb, struct iov_iter *to)
ce1d4d3e 871{
6d652330
AV
872 struct file *file = iocb->ki_filp;
873 struct socket *sock = file->private_data;
0345f931 874 struct msghdr msg = {.msg_iter = *to,
875 .msg_iocb = iocb};
8ae5e030 876 ssize_t res;
ce1d4d3e 877
8ae5e030
AV
878 if (file->f_flags & O_NONBLOCK)
879 msg.msg_flags = MSG_DONTWAIT;
880
881 if (iocb->ki_pos != 0)
1da177e4 882 return -ESPIPE;
027445c3 883
66ee59af 884 if (!iov_iter_count(to)) /* Match SYS5 behaviour */
1da177e4
LT
885 return 0;
886
2da62906 887 res = sock_recvmsg(sock, &msg, msg.msg_flags);
8ae5e030
AV
888 *to = msg.msg_iter;
889 return res;
1da177e4
LT
890}
891
8ae5e030 892static ssize_t sock_write_iter(struct kiocb *iocb, struct iov_iter *from)
ce1d4d3e 893{
6d652330
AV
894 struct file *file = iocb->ki_filp;
895 struct socket *sock = file->private_data;
0345f931 896 struct msghdr msg = {.msg_iter = *from,
897 .msg_iocb = iocb};
8ae5e030 898 ssize_t res;
1da177e4 899
8ae5e030 900 if (iocb->ki_pos != 0)
ce1d4d3e 901 return -ESPIPE;
027445c3 902
8ae5e030
AV
903 if (file->f_flags & O_NONBLOCK)
904 msg.msg_flags = MSG_DONTWAIT;
905
6d652330
AV
906 if (sock->type == SOCK_SEQPACKET)
907 msg.msg_flags |= MSG_EOR;
908
d8725c86 909 res = sock_sendmsg(sock, &msg);
8ae5e030
AV
910 *from = msg.msg_iter;
911 return res;
1da177e4
LT
912}
913
1da177e4
LT
914/*
915 * Atomic setting of ioctl hooks to avoid race
916 * with module unload.
917 */
918
4a3e2f71 919static DEFINE_MUTEX(br_ioctl_mutex);
c6d409cf 920static int (*br_ioctl_hook) (struct net *, unsigned int cmd, void __user *arg);
1da177e4 921
881d966b 922void brioctl_set(int (*hook) (struct net *, unsigned int, void __user *))
1da177e4 923{
4a3e2f71 924 mutex_lock(&br_ioctl_mutex);
1da177e4 925 br_ioctl_hook = hook;
4a3e2f71 926 mutex_unlock(&br_ioctl_mutex);
1da177e4
LT
927}
928EXPORT_SYMBOL(brioctl_set);
929
4a3e2f71 930static DEFINE_MUTEX(vlan_ioctl_mutex);
881d966b 931static int (*vlan_ioctl_hook) (struct net *, void __user *arg);
1da177e4 932
881d966b 933void vlan_ioctl_set(int (*hook) (struct net *, void __user *))
1da177e4 934{
4a3e2f71 935 mutex_lock(&vlan_ioctl_mutex);
1da177e4 936 vlan_ioctl_hook = hook;
4a3e2f71 937 mutex_unlock(&vlan_ioctl_mutex);
1da177e4
LT
938}
939EXPORT_SYMBOL(vlan_ioctl_set);
940
4a3e2f71 941static DEFINE_MUTEX(dlci_ioctl_mutex);
89bddce5 942static int (*dlci_ioctl_hook) (unsigned int, void __user *);
1da177e4 943
89bddce5 944void dlci_ioctl_set(int (*hook) (unsigned int, void __user *))
1da177e4 945{
4a3e2f71 946 mutex_lock(&dlci_ioctl_mutex);
1da177e4 947 dlci_ioctl_hook = hook;
4a3e2f71 948 mutex_unlock(&dlci_ioctl_mutex);
1da177e4
LT
949}
950EXPORT_SYMBOL(dlci_ioctl_set);
951
6b96018b
AB
952static long sock_do_ioctl(struct net *net, struct socket *sock,
953 unsigned int cmd, unsigned long arg)
954{
955 int err;
956 void __user *argp = (void __user *)arg;
957
958 err = sock->ops->ioctl(sock, cmd, arg);
959
960 /*
961 * If this ioctl is unknown try to hand it down
962 * to the NIC driver.
963 */
36fd633e
AV
964 if (err != -ENOIOCTLCMD)
965 return err;
6b96018b 966
36fd633e
AV
967 if (cmd == SIOCGIFCONF) {
968 struct ifconf ifc;
969 if (copy_from_user(&ifc, argp, sizeof(struct ifconf)))
970 return -EFAULT;
971 rtnl_lock();
972 err = dev_ifconf(net, &ifc, sizeof(struct ifreq));
973 rtnl_unlock();
974 if (!err && copy_to_user(argp, &ifc, sizeof(struct ifconf)))
975 err = -EFAULT;
976 return err;
977 }
978
979 return dev_ioctl(net, cmd, argp);
6b96018b
AB
980}
981
1da177e4
LT
982/*
983 * With an ioctl, arg may well be a user mode pointer, but we don't know
984 * what to do with it - that's up to the protocol still.
985 */
986
c62cce2c
AV
987static struct ns_common *get_net_ns(struct ns_common *ns)
988{
989 return &get_net(container_of(ns, struct net, ns))->ns;
990}
991
1da177e4
LT
992static long sock_ioctl(struct file *file, unsigned cmd, unsigned long arg)
993{
994 struct socket *sock;
881d966b 995 struct sock *sk;
1da177e4
LT
996 void __user *argp = (void __user *)arg;
997 int pid, err;
881d966b 998 struct net *net;
1da177e4 999
b69aee04 1000 sock = file->private_data;
881d966b 1001 sk = sock->sk;
3b1e0a65 1002 net = sock_net(sk);
1da177e4 1003 if (cmd >= SIOCDEVPRIVATE && cmd <= (SIOCDEVPRIVATE + 15)) {
881d966b 1004 err = dev_ioctl(net, cmd, argp);
1da177e4 1005 } else
3d23e349 1006#ifdef CONFIG_WEXT_CORE
1da177e4 1007 if (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST) {
881d966b 1008 err = dev_ioctl(net, cmd, argp);
1da177e4 1009 } else
3d23e349 1010#endif
89bddce5 1011 switch (cmd) {
1da177e4
LT
1012 case FIOSETOWN:
1013 case SIOCSPGRP:
1014 err = -EFAULT;
1015 if (get_user(pid, (int __user *)argp))
1016 break;
393cc3f5 1017 err = f_setown(sock->file, pid, 1);
1da177e4
LT
1018 break;
1019 case FIOGETOWN:
1020 case SIOCGPGRP:
609d7fa9 1021 err = put_user(f_getown(sock->file),
89bddce5 1022 (int __user *)argp);
1da177e4
LT
1023 break;
1024 case SIOCGIFBR:
1025 case SIOCSIFBR:
1026 case SIOCBRADDBR:
1027 case SIOCBRDELBR:
1028 err = -ENOPKG;
1029 if (!br_ioctl_hook)
1030 request_module("bridge");
1031
4a3e2f71 1032 mutex_lock(&br_ioctl_mutex);
89bddce5 1033 if (br_ioctl_hook)
881d966b 1034 err = br_ioctl_hook(net, cmd, argp);
4a3e2f71 1035 mutex_unlock(&br_ioctl_mutex);
1da177e4
LT
1036 break;
1037 case SIOCGIFVLAN:
1038 case SIOCSIFVLAN:
1039 err = -ENOPKG;
1040 if (!vlan_ioctl_hook)
1041 request_module("8021q");
1042
4a3e2f71 1043 mutex_lock(&vlan_ioctl_mutex);
1da177e4 1044 if (vlan_ioctl_hook)
881d966b 1045 err = vlan_ioctl_hook(net, argp);
4a3e2f71 1046 mutex_unlock(&vlan_ioctl_mutex);
1da177e4 1047 break;
1da177e4
LT
1048 case SIOCADDDLCI:
1049 case SIOCDELDLCI:
1050 err = -ENOPKG;
1051 if (!dlci_ioctl_hook)
1052 request_module("dlci");
1053
7512cbf6
PE
1054 mutex_lock(&dlci_ioctl_mutex);
1055 if (dlci_ioctl_hook)
1da177e4 1056 err = dlci_ioctl_hook(cmd, argp);
7512cbf6 1057 mutex_unlock(&dlci_ioctl_mutex);
1da177e4 1058 break;
c62cce2c
AV
1059 case SIOCGSKNS:
1060 err = -EPERM;
1061 if (!ns_capable(net->user_ns, CAP_NET_ADMIN))
1062 break;
1063
1064 err = open_related_ns(&net->ns, get_net_ns);
1065 break;
1da177e4 1066 default:
6b96018b 1067 err = sock_do_ioctl(net, sock, cmd, arg);
1da177e4 1068 break;
89bddce5 1069 }
1da177e4
LT
1070 return err;
1071}
1072
1073int sock_create_lite(int family, int type, int protocol, struct socket **res)
1074{
1075 int err;
1076 struct socket *sock = NULL;
89bddce5 1077
1da177e4
LT
1078 err = security_socket_create(family, type, protocol, 1);
1079 if (err)
1080 goto out;
1081
1082 sock = sock_alloc();
1083 if (!sock) {
1084 err = -ENOMEM;
1085 goto out;
1086 }
1087
1da177e4 1088 sock->type = type;
7420ed23
VY
1089 err = security_socket_post_create(sock, family, type, protocol, 1);
1090 if (err)
1091 goto out_release;
1092
1da177e4
LT
1093out:
1094 *res = sock;
1095 return err;
7420ed23
VY
1096out_release:
1097 sock_release(sock);
1098 sock = NULL;
1099 goto out;
1da177e4 1100}
c6d409cf 1101EXPORT_SYMBOL(sock_create_lite);
1da177e4
LT
1102
1103/* No kernel lock held - perfect */
89bddce5 1104static unsigned int sock_poll(struct file *file, poll_table *wait)
1da177e4 1105{
cbf55001 1106 unsigned int busy_flag = 0;
1da177e4
LT
1107 struct socket *sock;
1108
1109 /*
89bddce5 1110 * We can't return errors to poll, so it's either yes or no.
1da177e4 1111 */
b69aee04 1112 sock = file->private_data;
2d48d67f 1113
cbf55001 1114 if (sk_can_busy_loop(sock->sk)) {
2d48d67f 1115 /* this socket can poll_ll so tell the system call */
cbf55001 1116 busy_flag = POLL_BUSY_LOOP;
2d48d67f
ET
1117
1118 /* once, only if requested by syscall */
cbf55001
ET
1119 if (wait && (wait->_key & POLL_BUSY_LOOP))
1120 sk_busy_loop(sock->sk, 1);
2d48d67f
ET
1121 }
1122
cbf55001 1123 return busy_flag | sock->ops->poll(file, sock, wait);
1da177e4
LT
1124}
1125
89bddce5 1126static int sock_mmap(struct file *file, struct vm_area_struct *vma)
1da177e4 1127{
b69aee04 1128 struct socket *sock = file->private_data;
1da177e4
LT
1129
1130 return sock->ops->mmap(file, sock, vma);
1131}
1132
20380731 1133static int sock_close(struct inode *inode, struct file *filp)
1da177e4 1134{
1da177e4
LT
1135 sock_release(SOCKET_I(inode));
1136 return 0;
1137}
1138
1139/*
1140 * Update the socket async list
1141 *
1142 * Fasync_list locking strategy.
1143 *
1144 * 1. fasync_list is modified only under process context socket lock
1145 * i.e. under semaphore.
1146 * 2. fasync_list is used under read_lock(&sk->sk_callback_lock)
989a2979 1147 * or under socket lock
1da177e4
LT
1148 */
1149
1150static int sock_fasync(int fd, struct file *filp, int on)
1151{
989a2979
ED
1152 struct socket *sock = filp->private_data;
1153 struct sock *sk = sock->sk;
eaefd110 1154 struct socket_wq *wq;
1da177e4 1155
989a2979 1156 if (sk == NULL)
1da177e4 1157 return -EINVAL;
1da177e4
LT
1158
1159 lock_sock(sk);
1e1d04e6 1160 wq = rcu_dereference_protected(sock->wq, lockdep_sock_is_held(sk));
eaefd110 1161 fasync_helper(fd, filp, on, &wq->fasync_list);
1da177e4 1162
eaefd110 1163 if (!wq->fasync_list)
989a2979
ED
1164 sock_reset_flag(sk, SOCK_FASYNC);
1165 else
bcdce719 1166 sock_set_flag(sk, SOCK_FASYNC);
1da177e4 1167
989a2979 1168 release_sock(sk);
1da177e4
LT
1169 return 0;
1170}
1171
ceb5d58b 1172/* This function may be called only under rcu_lock */
1da177e4 1173
ceb5d58b 1174int sock_wake_async(struct socket_wq *wq, int how, int band)
1da177e4 1175{
ceb5d58b 1176 if (!wq || !wq->fasync_list)
1da177e4 1177 return -1;
ceb5d58b 1178
89bddce5 1179 switch (how) {
8d8ad9d7 1180 case SOCK_WAKE_WAITD:
ceb5d58b 1181 if (test_bit(SOCKWQ_ASYNC_WAITDATA, &wq->flags))
1da177e4
LT
1182 break;
1183 goto call_kill;
8d8ad9d7 1184 case SOCK_WAKE_SPACE:
ceb5d58b 1185 if (!test_and_clear_bit(SOCKWQ_ASYNC_NOSPACE, &wq->flags))
1da177e4
LT
1186 break;
1187 /* fall through */
8d8ad9d7 1188 case SOCK_WAKE_IO:
89bddce5 1189call_kill:
43815482 1190 kill_fasync(&wq->fasync_list, SIGIO, band);
1da177e4 1191 break;
8d8ad9d7 1192 case SOCK_WAKE_URG:
43815482 1193 kill_fasync(&wq->fasync_list, SIGURG, band);
1da177e4 1194 }
ceb5d58b 1195
1da177e4
LT
1196 return 0;
1197}
c6d409cf 1198EXPORT_SYMBOL(sock_wake_async);
1da177e4 1199
721db93a 1200int __sock_create(struct net *net, int family, int type, int protocol,
89bddce5 1201 struct socket **res, int kern)
1da177e4
LT
1202{
1203 int err;
1204 struct socket *sock;
55737fda 1205 const struct net_proto_family *pf;
1da177e4
LT
1206
1207 /*
89bddce5 1208 * Check protocol is in range
1da177e4
LT
1209 */
1210 if (family < 0 || family >= NPROTO)
1211 return -EAFNOSUPPORT;
1212 if (type < 0 || type >= SOCK_MAX)
1213 return -EINVAL;
1214
1215 /* Compatibility.
1216
1217 This uglymoron is moved from INET layer to here to avoid
1218 deadlock in module load.
1219 */
1220 if (family == PF_INET && type == SOCK_PACKET) {
f3c98690 1221 pr_info_once("%s uses obsolete (PF_INET,SOCK_PACKET)\n",
1222 current->comm);
1da177e4
LT
1223 family = PF_PACKET;
1224 }
1225
1226 err = security_socket_create(family, type, protocol, kern);
1227 if (err)
1228 return err;
89bddce5 1229
55737fda
SH
1230 /*
1231 * Allocate the socket and allow the family to set things up. if
1232 * the protocol is 0, the family is instructed to select an appropriate
1233 * default.
1234 */
1235 sock = sock_alloc();
1236 if (!sock) {
e87cc472 1237 net_warn_ratelimited("socket: no more sockets\n");
55737fda
SH
1238 return -ENFILE; /* Not exactly a match, but its the
1239 closest posix thing */
1240 }
1241
1242 sock->type = type;
1243
95a5afca 1244#ifdef CONFIG_MODULES
89bddce5
SH
1245 /* Attempt to load a protocol module if the find failed.
1246 *
1247 * 12/09/1996 Marcin: But! this makes REALLY only sense, if the user
1da177e4
LT
1248 * requested real, full-featured networking support upon configuration.
1249 * Otherwise module support will break!
1250 */
190683a9 1251 if (rcu_access_pointer(net_families[family]) == NULL)
89bddce5 1252 request_module("net-pf-%d", family);
1da177e4
LT
1253#endif
1254
55737fda
SH
1255 rcu_read_lock();
1256 pf = rcu_dereference(net_families[family]);
1257 err = -EAFNOSUPPORT;
1258 if (!pf)
1259 goto out_release;
1da177e4
LT
1260
1261 /*
1262 * We will call the ->create function, that possibly is in a loadable
1263 * module, so we have to bump that loadable module refcnt first.
1264 */
55737fda 1265 if (!try_module_get(pf->owner))
1da177e4
LT
1266 goto out_release;
1267
55737fda
SH
1268 /* Now protected by module ref count */
1269 rcu_read_unlock();
1270
3f378b68 1271 err = pf->create(net, sock, protocol, kern);
55737fda 1272 if (err < 0)
1da177e4 1273 goto out_module_put;
a79af59e 1274
1da177e4
LT
1275 /*
1276 * Now to bump the refcnt of the [loadable] module that owns this
1277 * socket at sock_release time we decrement its refcnt.
1278 */
55737fda
SH
1279 if (!try_module_get(sock->ops->owner))
1280 goto out_module_busy;
1281
1da177e4
LT
1282 /*
1283 * Now that we're done with the ->create function, the [loadable]
1284 * module can have its refcnt decremented
1285 */
55737fda 1286 module_put(pf->owner);
7420ed23
VY
1287 err = security_socket_post_create(sock, family, type, protocol, kern);
1288 if (err)
3b185525 1289 goto out_sock_release;
55737fda 1290 *res = sock;
1da177e4 1291
55737fda
SH
1292 return 0;
1293
1294out_module_busy:
1295 err = -EAFNOSUPPORT;
1da177e4 1296out_module_put:
55737fda
SH
1297 sock->ops = NULL;
1298 module_put(pf->owner);
1299out_sock_release:
1da177e4 1300 sock_release(sock);
55737fda
SH
1301 return err;
1302
1303out_release:
1304 rcu_read_unlock();
1305 goto out_sock_release;
1da177e4 1306}
721db93a 1307EXPORT_SYMBOL(__sock_create);
1da177e4
LT
1308
1309int sock_create(int family, int type, int protocol, struct socket **res)
1310{
1b8d7ae4 1311 return __sock_create(current->nsproxy->net_ns, family, type, protocol, res, 0);
1da177e4 1312}
c6d409cf 1313EXPORT_SYMBOL(sock_create);
1da177e4 1314
eeb1bd5c 1315int sock_create_kern(struct net *net, int family, int type, int protocol, struct socket **res)
1da177e4 1316{
eeb1bd5c 1317 return __sock_create(net, family, type, protocol, res, 1);
1da177e4 1318}
c6d409cf 1319EXPORT_SYMBOL(sock_create_kern);
1da177e4 1320
3e0fa65f 1321SYSCALL_DEFINE3(socket, int, family, int, type, int, protocol)
1da177e4
LT
1322{
1323 int retval;
1324 struct socket *sock;
a677a039
UD
1325 int flags;
1326
e38b36f3
UD
1327 /* Check the SOCK_* constants for consistency. */
1328 BUILD_BUG_ON(SOCK_CLOEXEC != O_CLOEXEC);
1329 BUILD_BUG_ON((SOCK_MAX | SOCK_TYPE_MASK) != SOCK_TYPE_MASK);
1330 BUILD_BUG_ON(SOCK_CLOEXEC & SOCK_TYPE_MASK);
1331 BUILD_BUG_ON(SOCK_NONBLOCK & SOCK_TYPE_MASK);
1332
a677a039 1333 flags = type & ~SOCK_TYPE_MASK;
77d27200 1334 if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
a677a039
UD
1335 return -EINVAL;
1336 type &= SOCK_TYPE_MASK;
1da177e4 1337
aaca0bdc
UD
1338 if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
1339 flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
1340
1da177e4
LT
1341 retval = sock_create(family, type, protocol, &sock);
1342 if (retval < 0)
8e1611e2 1343 return retval;
1da177e4 1344
8e1611e2 1345 return sock_map_fd(sock, flags & (O_CLOEXEC | O_NONBLOCK));
1da177e4
LT
1346}
1347
1348/*
1349 * Create a pair of connected sockets.
1350 */
1351
3e0fa65f
HC
1352SYSCALL_DEFINE4(socketpair, int, family, int, type, int, protocol,
1353 int __user *, usockvec)
1da177e4
LT
1354{
1355 struct socket *sock1, *sock2;
1356 int fd1, fd2, err;
db349509 1357 struct file *newfile1, *newfile2;
a677a039
UD
1358 int flags;
1359
1360 flags = type & ~SOCK_TYPE_MASK;
77d27200 1361 if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
a677a039
UD
1362 return -EINVAL;
1363 type &= SOCK_TYPE_MASK;
1da177e4 1364
aaca0bdc
UD
1365 if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
1366 flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
1367
016a266b
AV
1368 /*
1369 * reserve descriptors and make sure we won't fail
1370 * to return them to userland.
1371 */
1372 fd1 = get_unused_fd_flags(flags);
1373 if (unlikely(fd1 < 0))
1374 return fd1;
1375
1376 fd2 = get_unused_fd_flags(flags);
1377 if (unlikely(fd2 < 0)) {
1378 put_unused_fd(fd1);
1379 return fd2;
1380 }
1381
1382 err = put_user(fd1, &usockvec[0]);
1383 if (err)
1384 goto out;
1385
1386 err = put_user(fd2, &usockvec[1]);
1387 if (err)
1388 goto out;
1389
1da177e4
LT
1390 /*
1391 * Obtain the first socket and check if the underlying protocol
1392 * supports the socketpair call.
1393 */
1394
1395 err = sock_create(family, type, protocol, &sock1);
016a266b 1396 if (unlikely(err < 0))
1da177e4
LT
1397 goto out;
1398
1399 err = sock_create(family, type, protocol, &sock2);
016a266b
AV
1400 if (unlikely(err < 0)) {
1401 sock_release(sock1);
1402 goto out;
bf3c23d1 1403 }
d73aa286 1404
016a266b
AV
1405 err = sock1->ops->socketpair(sock1, sock2);
1406 if (unlikely(err < 0)) {
1407 sock_release(sock2);
1408 sock_release(sock1);
1409 goto out;
28407630
AV
1410 }
1411
aab174f0 1412 newfile1 = sock_alloc_file(sock1, flags, NULL);
b5ffe634 1413 if (IS_ERR(newfile1)) {
28407630 1414 err = PTR_ERR(newfile1);
016a266b
AV
1415 sock_release(sock2);
1416 goto out;
28407630
AV
1417 }
1418
aab174f0 1419 newfile2 = sock_alloc_file(sock2, flags, NULL);
28407630
AV
1420 if (IS_ERR(newfile2)) {
1421 err = PTR_ERR(newfile2);
016a266b
AV
1422 fput(newfile1);
1423 goto out;
db349509
AV
1424 }
1425
157cf649 1426 audit_fd_pair(fd1, fd2);
d73aa286 1427
db349509
AV
1428 fd_install(fd1, newfile1);
1429 fd_install(fd2, newfile2);
d73aa286 1430 return 0;
1da177e4 1431
016a266b 1432out:
d73aa286 1433 put_unused_fd(fd2);
d73aa286 1434 put_unused_fd(fd1);
1da177e4
LT
1435 return err;
1436}
1437
1da177e4
LT
1438/*
1439 * Bind a name to a socket. Nothing much to do here since it's
1440 * the protocol's responsibility to handle the local address.
1441 *
1442 * We move the socket address to kernel space before we call
1443 * the protocol layer (having also checked the address is ok).
1444 */
1445
20f37034 1446SYSCALL_DEFINE3(bind, int, fd, struct sockaddr __user *, umyaddr, int, addrlen)
1da177e4
LT
1447{
1448 struct socket *sock;
230b1839 1449 struct sockaddr_storage address;
6cb153ca 1450 int err, fput_needed;
1da177e4 1451
89bddce5 1452 sock = sockfd_lookup_light(fd, &err, &fput_needed);
e71a4783 1453 if (sock) {
43db362d 1454 err = move_addr_to_kernel(umyaddr, addrlen, &address);
89bddce5
SH
1455 if (err >= 0) {
1456 err = security_socket_bind(sock,
230b1839 1457 (struct sockaddr *)&address,
89bddce5 1458 addrlen);
6cb153ca
BL
1459 if (!err)
1460 err = sock->ops->bind(sock,
89bddce5 1461 (struct sockaddr *)
230b1839 1462 &address, addrlen);
1da177e4 1463 }
6cb153ca 1464 fput_light(sock->file, fput_needed);
89bddce5 1465 }
1da177e4
LT
1466 return err;
1467}
1468
1da177e4
LT
1469/*
1470 * Perform a listen. Basically, we allow the protocol to do anything
1471 * necessary for a listen, and if that works, we mark the socket as
1472 * ready for listening.
1473 */
1474
3e0fa65f 1475SYSCALL_DEFINE2(listen, int, fd, int, backlog)
1da177e4
LT
1476{
1477 struct socket *sock;
6cb153ca 1478 int err, fput_needed;
b8e1f9b5 1479 int somaxconn;
89bddce5
SH
1480
1481 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1482 if (sock) {
8efa6e93 1483 somaxconn = sock_net(sock->sk)->core.sysctl_somaxconn;
95c96174 1484 if ((unsigned int)backlog > somaxconn)
b8e1f9b5 1485 backlog = somaxconn;
1da177e4
LT
1486
1487 err = security_socket_listen(sock, backlog);
6cb153ca
BL
1488 if (!err)
1489 err = sock->ops->listen(sock, backlog);
1da177e4 1490
6cb153ca 1491 fput_light(sock->file, fput_needed);
1da177e4
LT
1492 }
1493 return err;
1494}
1495
1da177e4
LT
1496/*
1497 * For accept, we attempt to create a new socket, set up the link
1498 * with the client, wake up the client, then return the new
1499 * connected fd. We collect the address of the connector in kernel
1500 * space and move it to user at the very end. This is unclean because
1501 * we open the socket then return an error.
1502 *
1503 * 1003.1g adds the ability to recvmsg() to query connection pending
1504 * status to recvmsg. We need to add that support in a way thats
1505 * clean when we restucture accept also.
1506 */
1507
20f37034
HC
1508SYSCALL_DEFINE4(accept4, int, fd, struct sockaddr __user *, upeer_sockaddr,
1509 int __user *, upeer_addrlen, int, flags)
1da177e4
LT
1510{
1511 struct socket *sock, *newsock;
39d8c1b6 1512 struct file *newfile;
6cb153ca 1513 int err, len, newfd, fput_needed;
230b1839 1514 struct sockaddr_storage address;
1da177e4 1515
77d27200 1516 if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
aaca0bdc
UD
1517 return -EINVAL;
1518
1519 if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
1520 flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
1521
6cb153ca 1522 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4
LT
1523 if (!sock)
1524 goto out;
1525
1526 err = -ENFILE;
c6d409cf
ED
1527 newsock = sock_alloc();
1528 if (!newsock)
1da177e4
LT
1529 goto out_put;
1530
1531 newsock->type = sock->type;
1532 newsock->ops = sock->ops;
1533
1da177e4
LT
1534 /*
1535 * We don't need try_module_get here, as the listening socket (sock)
1536 * has the protocol module (sock->ops->owner) held.
1537 */
1538 __module_get(newsock->ops->owner);
1539
28407630 1540 newfd = get_unused_fd_flags(flags);
39d8c1b6
DM
1541 if (unlikely(newfd < 0)) {
1542 err = newfd;
9a1875e6
DM
1543 sock_release(newsock);
1544 goto out_put;
39d8c1b6 1545 }
aab174f0 1546 newfile = sock_alloc_file(newsock, flags, sock->sk->sk_prot_creator->name);
b5ffe634 1547 if (IS_ERR(newfile)) {
28407630
AV
1548 err = PTR_ERR(newfile);
1549 put_unused_fd(newfd);
28407630
AV
1550 goto out_put;
1551 }
39d8c1b6 1552
a79af59e
FF
1553 err = security_socket_accept(sock, newsock);
1554 if (err)
39d8c1b6 1555 goto out_fd;
a79af59e 1556
cdfbabfb 1557 err = sock->ops->accept(sock, newsock, sock->file->f_flags, false);
1da177e4 1558 if (err < 0)
39d8c1b6 1559 goto out_fd;
1da177e4
LT
1560
1561 if (upeer_sockaddr) {
230b1839 1562 if (newsock->ops->getname(newsock, (struct sockaddr *)&address,
89bddce5 1563 &len, 2) < 0) {
1da177e4 1564 err = -ECONNABORTED;
39d8c1b6 1565 goto out_fd;
1da177e4 1566 }
43db362d 1567 err = move_addr_to_user(&address,
230b1839 1568 len, upeer_sockaddr, upeer_addrlen);
1da177e4 1569 if (err < 0)
39d8c1b6 1570 goto out_fd;
1da177e4
LT
1571 }
1572
1573 /* File flags are not inherited via accept() unlike another OSes. */
1574
39d8c1b6
DM
1575 fd_install(newfd, newfile);
1576 err = newfd;
1da177e4 1577
1da177e4 1578out_put:
6cb153ca 1579 fput_light(sock->file, fput_needed);
1da177e4
LT
1580out:
1581 return err;
39d8c1b6 1582out_fd:
9606a216 1583 fput(newfile);
39d8c1b6 1584 put_unused_fd(newfd);
1da177e4
LT
1585 goto out_put;
1586}
1587
20f37034
HC
1588SYSCALL_DEFINE3(accept, int, fd, struct sockaddr __user *, upeer_sockaddr,
1589 int __user *, upeer_addrlen)
aaca0bdc 1590{
de11defe 1591 return sys_accept4(fd, upeer_sockaddr, upeer_addrlen, 0);
aaca0bdc
UD
1592}
1593
1da177e4
LT
1594/*
1595 * Attempt to connect to a socket with the server address. The address
1596 * is in user space so we verify it is OK and move it to kernel space.
1597 *
1598 * For 1003.1g we need to add clean support for a bind to AF_UNSPEC to
1599 * break bindings
1600 *
1601 * NOTE: 1003.1g draft 6.3 is broken with respect to AX.25/NetROM and
1602 * other SEQPACKET protocols that take time to connect() as it doesn't
1603 * include the -EINPROGRESS status for such sockets.
1604 */
1605
20f37034
HC
1606SYSCALL_DEFINE3(connect, int, fd, struct sockaddr __user *, uservaddr,
1607 int, addrlen)
1da177e4
LT
1608{
1609 struct socket *sock;
230b1839 1610 struct sockaddr_storage address;
6cb153ca 1611 int err, fput_needed;
1da177e4 1612
6cb153ca 1613 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4
LT
1614 if (!sock)
1615 goto out;
43db362d 1616 err = move_addr_to_kernel(uservaddr, addrlen, &address);
1da177e4
LT
1617 if (err < 0)
1618 goto out_put;
1619
89bddce5 1620 err =
230b1839 1621 security_socket_connect(sock, (struct sockaddr *)&address, addrlen);
1da177e4
LT
1622 if (err)
1623 goto out_put;
1624
230b1839 1625 err = sock->ops->connect(sock, (struct sockaddr *)&address, addrlen,
1da177e4
LT
1626 sock->file->f_flags);
1627out_put:
6cb153ca 1628 fput_light(sock->file, fput_needed);
1da177e4
LT
1629out:
1630 return err;
1631}
1632
1633/*
1634 * Get the local address ('name') of a socket object. Move the obtained
1635 * name to user space.
1636 */
1637
20f37034
HC
1638SYSCALL_DEFINE3(getsockname, int, fd, struct sockaddr __user *, usockaddr,
1639 int __user *, usockaddr_len)
1da177e4
LT
1640{
1641 struct socket *sock;
230b1839 1642 struct sockaddr_storage address;
6cb153ca 1643 int len, err, fput_needed;
89bddce5 1644
6cb153ca 1645 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4
LT
1646 if (!sock)
1647 goto out;
1648
1649 err = security_socket_getsockname(sock);
1650 if (err)
1651 goto out_put;
1652
230b1839 1653 err = sock->ops->getname(sock, (struct sockaddr *)&address, &len, 0);
1da177e4
LT
1654 if (err)
1655 goto out_put;
43db362d 1656 err = move_addr_to_user(&address, len, usockaddr, usockaddr_len);
1da177e4
LT
1657
1658out_put:
6cb153ca 1659 fput_light(sock->file, fput_needed);
1da177e4
LT
1660out:
1661 return err;
1662}
1663
1664/*
1665 * Get the remote address ('name') of a socket object. Move the obtained
1666 * name to user space.
1667 */
1668
20f37034
HC
1669SYSCALL_DEFINE3(getpeername, int, fd, struct sockaddr __user *, usockaddr,
1670 int __user *, usockaddr_len)
1da177e4
LT
1671{
1672 struct socket *sock;
230b1839 1673 struct sockaddr_storage address;
6cb153ca 1674 int len, err, fput_needed;
1da177e4 1675
89bddce5
SH
1676 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1677 if (sock != NULL) {
1da177e4
LT
1678 err = security_socket_getpeername(sock);
1679 if (err) {
6cb153ca 1680 fput_light(sock->file, fput_needed);
1da177e4
LT
1681 return err;
1682 }
1683
89bddce5 1684 err =
230b1839 1685 sock->ops->getname(sock, (struct sockaddr *)&address, &len,
89bddce5 1686 1);
1da177e4 1687 if (!err)
43db362d 1688 err = move_addr_to_user(&address, len, usockaddr,
89bddce5 1689 usockaddr_len);
6cb153ca 1690 fput_light(sock->file, fput_needed);
1da177e4
LT
1691 }
1692 return err;
1693}
1694
1695/*
1696 * Send a datagram to a given address. We move the address into kernel
1697 * space and check the user space data area is readable before invoking
1698 * the protocol.
1699 */
1700
3e0fa65f 1701SYSCALL_DEFINE6(sendto, int, fd, void __user *, buff, size_t, len,
95c96174 1702 unsigned int, flags, struct sockaddr __user *, addr,
3e0fa65f 1703 int, addr_len)
1da177e4
LT
1704{
1705 struct socket *sock;
230b1839 1706 struct sockaddr_storage address;
1da177e4
LT
1707 int err;
1708 struct msghdr msg;
1709 struct iovec iov;
6cb153ca 1710 int fput_needed;
6cb153ca 1711
602bd0e9
AV
1712 err = import_single_range(WRITE, buff, len, &iov, &msg.msg_iter);
1713 if (unlikely(err))
1714 return err;
de0fa95c
PE
1715 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1716 if (!sock)
4387ff75 1717 goto out;
6cb153ca 1718
89bddce5 1719 msg.msg_name = NULL;
89bddce5
SH
1720 msg.msg_control = NULL;
1721 msg.msg_controllen = 0;
1722 msg.msg_namelen = 0;
6cb153ca 1723 if (addr) {
43db362d 1724 err = move_addr_to_kernel(addr, addr_len, &address);
1da177e4
LT
1725 if (err < 0)
1726 goto out_put;
230b1839 1727 msg.msg_name = (struct sockaddr *)&address;
89bddce5 1728 msg.msg_namelen = addr_len;
1da177e4
LT
1729 }
1730 if (sock->file->f_flags & O_NONBLOCK)
1731 flags |= MSG_DONTWAIT;
1732 msg.msg_flags = flags;
d8725c86 1733 err = sock_sendmsg(sock, &msg);
1da177e4 1734
89bddce5 1735out_put:
de0fa95c 1736 fput_light(sock->file, fput_needed);
4387ff75 1737out:
1da177e4
LT
1738 return err;
1739}
1740
1741/*
89bddce5 1742 * Send a datagram down a socket.
1da177e4
LT
1743 */
1744
3e0fa65f 1745SYSCALL_DEFINE4(send, int, fd, void __user *, buff, size_t, len,
95c96174 1746 unsigned int, flags)
1da177e4
LT
1747{
1748 return sys_sendto(fd, buff, len, flags, NULL, 0);
1749}
1750
1751/*
89bddce5 1752 * Receive a frame from the socket and optionally record the address of the
1da177e4
LT
1753 * sender. We verify the buffers are writable and if needed move the
1754 * sender address from kernel to user space.
1755 */
1756
3e0fa65f 1757SYSCALL_DEFINE6(recvfrom, int, fd, void __user *, ubuf, size_t, size,
95c96174 1758 unsigned int, flags, struct sockaddr __user *, addr,
3e0fa65f 1759 int __user *, addr_len)
1da177e4
LT
1760{
1761 struct socket *sock;
1762 struct iovec iov;
1763 struct msghdr msg;
230b1839 1764 struct sockaddr_storage address;
89bddce5 1765 int err, err2;
6cb153ca
BL
1766 int fput_needed;
1767
602bd0e9
AV
1768 err = import_single_range(READ, ubuf, size, &iov, &msg.msg_iter);
1769 if (unlikely(err))
1770 return err;
de0fa95c 1771 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4 1772 if (!sock)
de0fa95c 1773 goto out;
1da177e4 1774
89bddce5
SH
1775 msg.msg_control = NULL;
1776 msg.msg_controllen = 0;
f3d33426
HFS
1777 /* Save some cycles and don't copy the address if not needed */
1778 msg.msg_name = addr ? (struct sockaddr *)&address : NULL;
1779 /* We assume all kernel code knows the size of sockaddr_storage */
1780 msg.msg_namelen = 0;
130ed5d1 1781 msg.msg_iocb = NULL;
9f138fa6 1782 msg.msg_flags = 0;
1da177e4
LT
1783 if (sock->file->f_flags & O_NONBLOCK)
1784 flags |= MSG_DONTWAIT;
2da62906 1785 err = sock_recvmsg(sock, &msg, flags);
1da177e4 1786
89bddce5 1787 if (err >= 0 && addr != NULL) {
43db362d 1788 err2 = move_addr_to_user(&address,
230b1839 1789 msg.msg_namelen, addr, addr_len);
89bddce5
SH
1790 if (err2 < 0)
1791 err = err2;
1da177e4 1792 }
de0fa95c
PE
1793
1794 fput_light(sock->file, fput_needed);
4387ff75 1795out:
1da177e4
LT
1796 return err;
1797}
1798
1799/*
89bddce5 1800 * Receive a datagram from a socket.
1da177e4
LT
1801 */
1802
b7c0ddf5
JG
1803SYSCALL_DEFINE4(recv, int, fd, void __user *, ubuf, size_t, size,
1804 unsigned int, flags)
1da177e4
LT
1805{
1806 return sys_recvfrom(fd, ubuf, size, flags, NULL, NULL);
1807}
1808
1809/*
1810 * Set a socket option. Because we don't know the option lengths we have
1811 * to pass the user mode parameter for the protocols to sort out.
1812 */
1813
20f37034
HC
1814SYSCALL_DEFINE5(setsockopt, int, fd, int, level, int, optname,
1815 char __user *, optval, int, optlen)
1da177e4 1816{
6cb153ca 1817 int err, fput_needed;
1da177e4
LT
1818 struct socket *sock;
1819
1820 if (optlen < 0)
1821 return -EINVAL;
89bddce5
SH
1822
1823 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1824 if (sock != NULL) {
1825 err = security_socket_setsockopt(sock, level, optname);
6cb153ca
BL
1826 if (err)
1827 goto out_put;
1da177e4
LT
1828
1829 if (level == SOL_SOCKET)
89bddce5
SH
1830 err =
1831 sock_setsockopt(sock, level, optname, optval,
1832 optlen);
1da177e4 1833 else
89bddce5
SH
1834 err =
1835 sock->ops->setsockopt(sock, level, optname, optval,
1836 optlen);
6cb153ca
BL
1837out_put:
1838 fput_light(sock->file, fput_needed);
1da177e4
LT
1839 }
1840 return err;
1841}
1842
1843/*
1844 * Get a socket option. Because we don't know the option lengths we have
1845 * to pass a user mode parameter for the protocols to sort out.
1846 */
1847
20f37034
HC
1848SYSCALL_DEFINE5(getsockopt, int, fd, int, level, int, optname,
1849 char __user *, optval, int __user *, optlen)
1da177e4 1850{
6cb153ca 1851 int err, fput_needed;
1da177e4
LT
1852 struct socket *sock;
1853
89bddce5
SH
1854 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1855 if (sock != NULL) {
6cb153ca
BL
1856 err = security_socket_getsockopt(sock, level, optname);
1857 if (err)
1858 goto out_put;
1da177e4
LT
1859
1860 if (level == SOL_SOCKET)
89bddce5
SH
1861 err =
1862 sock_getsockopt(sock, level, optname, optval,
1863 optlen);
1da177e4 1864 else
89bddce5
SH
1865 err =
1866 sock->ops->getsockopt(sock, level, optname, optval,
1867 optlen);
6cb153ca
BL
1868out_put:
1869 fput_light(sock->file, fput_needed);
1da177e4
LT
1870 }
1871 return err;
1872}
1873
1da177e4
LT
1874/*
1875 * Shutdown a socket.
1876 */
1877
754fe8d2 1878SYSCALL_DEFINE2(shutdown, int, fd, int, how)
1da177e4 1879{
6cb153ca 1880 int err, fput_needed;
1da177e4
LT
1881 struct socket *sock;
1882
89bddce5
SH
1883 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1884 if (sock != NULL) {
1da177e4 1885 err = security_socket_shutdown(sock, how);
6cb153ca
BL
1886 if (!err)
1887 err = sock->ops->shutdown(sock, how);
1888 fput_light(sock->file, fput_needed);
1da177e4
LT
1889 }
1890 return err;
1891}
1892
89bddce5 1893/* A couple of helpful macros for getting the address of the 32/64 bit
1da177e4
LT
1894 * fields which are the same type (int / unsigned) on our platforms.
1895 */
1896#define COMPAT_MSG(msg, member) ((MSG_CMSG_COMPAT & flags) ? &msg##_compat->member : &msg->member)
1897#define COMPAT_NAMELEN(msg) COMPAT_MSG(msg, msg_namelen)
1898#define COMPAT_FLAGS(msg) COMPAT_MSG(msg, msg_flags)
1899
c71d8ebe
TH
1900struct used_address {
1901 struct sockaddr_storage name;
1902 unsigned int name_len;
1903};
1904
da184284
AV
1905static int copy_msghdr_from_user(struct msghdr *kmsg,
1906 struct user_msghdr __user *umsg,
1907 struct sockaddr __user **save_addr,
1908 struct iovec **iov)
1661bf36 1909{
ffb07550 1910 struct user_msghdr msg;
08adb7da
AV
1911 ssize_t err;
1912
ffb07550 1913 if (copy_from_user(&msg, umsg, sizeof(*umsg)))
1661bf36 1914 return -EFAULT;
dbb490b9 1915
864d9664 1916 kmsg->msg_control = (void __force *)msg.msg_control;
ffb07550
AV
1917 kmsg->msg_controllen = msg.msg_controllen;
1918 kmsg->msg_flags = msg.msg_flags;
1919
1920 kmsg->msg_namelen = msg.msg_namelen;
1921 if (!msg.msg_name)
6a2a2b3a
AS
1922 kmsg->msg_namelen = 0;
1923
dbb490b9
ML
1924 if (kmsg->msg_namelen < 0)
1925 return -EINVAL;
1926
1661bf36 1927 if (kmsg->msg_namelen > sizeof(struct sockaddr_storage))
db31c55a 1928 kmsg->msg_namelen = sizeof(struct sockaddr_storage);
08adb7da
AV
1929
1930 if (save_addr)
ffb07550 1931 *save_addr = msg.msg_name;
08adb7da 1932
ffb07550 1933 if (msg.msg_name && kmsg->msg_namelen) {
08adb7da 1934 if (!save_addr) {
864d9664
PA
1935 err = move_addr_to_kernel(msg.msg_name,
1936 kmsg->msg_namelen,
08adb7da
AV
1937 kmsg->msg_name);
1938 if (err < 0)
1939 return err;
1940 }
1941 } else {
1942 kmsg->msg_name = NULL;
1943 kmsg->msg_namelen = 0;
1944 }
1945
ffb07550 1946 if (msg.msg_iovlen > UIO_MAXIOV)
08adb7da
AV
1947 return -EMSGSIZE;
1948
0345f931 1949 kmsg->msg_iocb = NULL;
1950
ffb07550
AV
1951 return import_iovec(save_addr ? READ : WRITE,
1952 msg.msg_iov, msg.msg_iovlen,
da184284 1953 UIO_FASTIOV, iov, &kmsg->msg_iter);
1661bf36
DC
1954}
1955
666547ff 1956static int ___sys_sendmsg(struct socket *sock, struct user_msghdr __user *msg,
95c96174 1957 struct msghdr *msg_sys, unsigned int flags,
28a94d8f
TH
1958 struct used_address *used_address,
1959 unsigned int allowed_msghdr_flags)
1da177e4 1960{
89bddce5
SH
1961 struct compat_msghdr __user *msg_compat =
1962 (struct compat_msghdr __user *)msg;
230b1839 1963 struct sockaddr_storage address;
1da177e4 1964 struct iovec iovstack[UIO_FASTIOV], *iov = iovstack;
b9d717a7 1965 unsigned char ctl[sizeof(struct cmsghdr) + 20]
846cc123 1966 __aligned(sizeof(__kernel_size_t));
89bddce5 1967 /* 20 is size of ipv6_pktinfo */
1da177e4 1968 unsigned char *ctl_buf = ctl;
d8725c86 1969 int ctl_len;
08adb7da 1970 ssize_t err;
89bddce5 1971
08adb7da 1972 msg_sys->msg_name = &address;
1da177e4 1973
08449320 1974 if (MSG_CMSG_COMPAT & flags)
08adb7da 1975 err = get_compat_msghdr(msg_sys, msg_compat, NULL, &iov);
08449320 1976 else
08adb7da 1977 err = copy_msghdr_from_user(msg_sys, msg, NULL, &iov);
89bddce5 1978 if (err < 0)
da184284 1979 return err;
1da177e4
LT
1980
1981 err = -ENOBUFS;
1982
228e548e 1983 if (msg_sys->msg_controllen > INT_MAX)
1da177e4 1984 goto out_freeiov;
28a94d8f 1985 flags |= (msg_sys->msg_flags & allowed_msghdr_flags);
228e548e 1986 ctl_len = msg_sys->msg_controllen;
1da177e4 1987 if ((MSG_CMSG_COMPAT & flags) && ctl_len) {
89bddce5 1988 err =
228e548e 1989 cmsghdr_from_user_compat_to_kern(msg_sys, sock->sk, ctl,
89bddce5 1990 sizeof(ctl));
1da177e4
LT
1991 if (err)
1992 goto out_freeiov;
228e548e
AB
1993 ctl_buf = msg_sys->msg_control;
1994 ctl_len = msg_sys->msg_controllen;
1da177e4 1995 } else if (ctl_len) {
ac4340fc
DM
1996 BUILD_BUG_ON(sizeof(struct cmsghdr) !=
1997 CMSG_ALIGN(sizeof(struct cmsghdr)));
89bddce5 1998 if (ctl_len > sizeof(ctl)) {
1da177e4 1999 ctl_buf = sock_kmalloc(sock->sk, ctl_len, GFP_KERNEL);
89bddce5 2000 if (ctl_buf == NULL)
1da177e4
LT
2001 goto out_freeiov;
2002 }
2003 err = -EFAULT;
2004 /*
228e548e 2005 * Careful! Before this, msg_sys->msg_control contains a user pointer.
1da177e4
LT
2006 * Afterwards, it will be a kernel pointer. Thus the compiler-assisted
2007 * checking falls down on this.
2008 */
fb8621bb 2009 if (copy_from_user(ctl_buf,
228e548e 2010 (void __user __force *)msg_sys->msg_control,
89bddce5 2011 ctl_len))
1da177e4 2012 goto out_freectl;
228e548e 2013 msg_sys->msg_control = ctl_buf;
1da177e4 2014 }
228e548e 2015 msg_sys->msg_flags = flags;
1da177e4
LT
2016
2017 if (sock->file->f_flags & O_NONBLOCK)
228e548e 2018 msg_sys->msg_flags |= MSG_DONTWAIT;
c71d8ebe
TH
2019 /*
2020 * If this is sendmmsg() and current destination address is same as
2021 * previously succeeded address, omit asking LSM's decision.
2022 * used_address->name_len is initialized to UINT_MAX so that the first
2023 * destination address never matches.
2024 */
bc909d9d
MD
2025 if (used_address && msg_sys->msg_name &&
2026 used_address->name_len == msg_sys->msg_namelen &&
2027 !memcmp(&used_address->name, msg_sys->msg_name,
c71d8ebe 2028 used_address->name_len)) {
d8725c86 2029 err = sock_sendmsg_nosec(sock, msg_sys);
c71d8ebe
TH
2030 goto out_freectl;
2031 }
d8725c86 2032 err = sock_sendmsg(sock, msg_sys);
c71d8ebe
TH
2033 /*
2034 * If this is sendmmsg() and sending to current destination address was
2035 * successful, remember it.
2036 */
2037 if (used_address && err >= 0) {
2038 used_address->name_len = msg_sys->msg_namelen;
bc909d9d
MD
2039 if (msg_sys->msg_name)
2040 memcpy(&used_address->name, msg_sys->msg_name,
2041 used_address->name_len);
c71d8ebe 2042 }
1da177e4
LT
2043
2044out_freectl:
89bddce5 2045 if (ctl_buf != ctl)
1da177e4
LT
2046 sock_kfree_s(sock->sk, ctl_buf, ctl_len);
2047out_freeiov:
da184284 2048 kfree(iov);
228e548e
AB
2049 return err;
2050}
2051
2052/*
2053 * BSD sendmsg interface
2054 */
2055
666547ff 2056long __sys_sendmsg(int fd, struct user_msghdr __user *msg, unsigned flags)
228e548e
AB
2057{
2058 int fput_needed, err;
2059 struct msghdr msg_sys;
1be374a0
AL
2060 struct socket *sock;
2061
1be374a0 2062 sock = sockfd_lookup_light(fd, &err, &fput_needed);
228e548e
AB
2063 if (!sock)
2064 goto out;
2065
28a94d8f 2066 err = ___sys_sendmsg(sock, msg, &msg_sys, flags, NULL, 0);
228e548e 2067
6cb153ca 2068 fput_light(sock->file, fput_needed);
89bddce5 2069out:
1da177e4
LT
2070 return err;
2071}
2072
666547ff 2073SYSCALL_DEFINE3(sendmsg, int, fd, struct user_msghdr __user *, msg, unsigned int, flags)
a7526eb5
AL
2074{
2075 if (flags & MSG_CMSG_COMPAT)
2076 return -EINVAL;
2077 return __sys_sendmsg(fd, msg, flags);
2078}
2079
228e548e
AB
2080/*
2081 * Linux sendmmsg interface
2082 */
2083
2084int __sys_sendmmsg(int fd, struct mmsghdr __user *mmsg, unsigned int vlen,
2085 unsigned int flags)
2086{
2087 int fput_needed, err, datagrams;
2088 struct socket *sock;
2089 struct mmsghdr __user *entry;
2090 struct compat_mmsghdr __user *compat_entry;
2091 struct msghdr msg_sys;
c71d8ebe 2092 struct used_address used_address;
f092276d 2093 unsigned int oflags = flags;
228e548e 2094
98382f41
AB
2095 if (vlen > UIO_MAXIOV)
2096 vlen = UIO_MAXIOV;
228e548e
AB
2097
2098 datagrams = 0;
2099
2100 sock = sockfd_lookup_light(fd, &err, &fput_needed);
2101 if (!sock)
2102 return err;
2103
c71d8ebe 2104 used_address.name_len = UINT_MAX;
228e548e
AB
2105 entry = mmsg;
2106 compat_entry = (struct compat_mmsghdr __user *)mmsg;
728ffb86 2107 err = 0;
f092276d 2108 flags |= MSG_BATCH;
228e548e
AB
2109
2110 while (datagrams < vlen) {
f092276d
TH
2111 if (datagrams == vlen - 1)
2112 flags = oflags;
2113
228e548e 2114 if (MSG_CMSG_COMPAT & flags) {
666547ff 2115 err = ___sys_sendmsg(sock, (struct user_msghdr __user *)compat_entry,
28a94d8f 2116 &msg_sys, flags, &used_address, MSG_EOR);
228e548e
AB
2117 if (err < 0)
2118 break;
2119 err = __put_user(err, &compat_entry->msg_len);
2120 ++compat_entry;
2121 } else {
a7526eb5 2122 err = ___sys_sendmsg(sock,
666547ff 2123 (struct user_msghdr __user *)entry,
28a94d8f 2124 &msg_sys, flags, &used_address, MSG_EOR);
228e548e
AB
2125 if (err < 0)
2126 break;
2127 err = put_user(err, &entry->msg_len);
2128 ++entry;
2129 }
2130
2131 if (err)
2132 break;
2133 ++datagrams;
3023898b
SHY
2134 if (msg_data_left(&msg_sys))
2135 break;
a78cb84c 2136 cond_resched();
228e548e
AB
2137 }
2138
228e548e
AB
2139 fput_light(sock->file, fput_needed);
2140
728ffb86
AB
2141 /* We only return an error if no datagrams were able to be sent */
2142 if (datagrams != 0)
228e548e
AB
2143 return datagrams;
2144
228e548e
AB
2145 return err;
2146}
2147
2148SYSCALL_DEFINE4(sendmmsg, int, fd, struct mmsghdr __user *, mmsg,
2149 unsigned int, vlen, unsigned int, flags)
2150{
1be374a0
AL
2151 if (flags & MSG_CMSG_COMPAT)
2152 return -EINVAL;
228e548e
AB
2153 return __sys_sendmmsg(fd, mmsg, vlen, flags);
2154}
2155
666547ff 2156static int ___sys_recvmsg(struct socket *sock, struct user_msghdr __user *msg,
95c96174 2157 struct msghdr *msg_sys, unsigned int flags, int nosec)
1da177e4 2158{
89bddce5
SH
2159 struct compat_msghdr __user *msg_compat =
2160 (struct compat_msghdr __user *)msg;
1da177e4 2161 struct iovec iovstack[UIO_FASTIOV];
89bddce5 2162 struct iovec *iov = iovstack;
1da177e4 2163 unsigned long cmsg_ptr;
2da62906 2164 int len;
08adb7da 2165 ssize_t err;
1da177e4
LT
2166
2167 /* kernel mode address */
230b1839 2168 struct sockaddr_storage addr;
1da177e4
LT
2169
2170 /* user mode address pointers */
2171 struct sockaddr __user *uaddr;
08adb7da 2172 int __user *uaddr_len = COMPAT_NAMELEN(msg);
89bddce5 2173
08adb7da 2174 msg_sys->msg_name = &addr;
1da177e4 2175
f3d33426 2176 if (MSG_CMSG_COMPAT & flags)
08adb7da 2177 err = get_compat_msghdr(msg_sys, msg_compat, &uaddr, &iov);
f3d33426 2178 else
08adb7da 2179 err = copy_msghdr_from_user(msg_sys, msg, &uaddr, &iov);
1da177e4 2180 if (err < 0)
da184284 2181 return err;
1da177e4 2182
a2e27255
ACM
2183 cmsg_ptr = (unsigned long)msg_sys->msg_control;
2184 msg_sys->msg_flags = flags & (MSG_CMSG_CLOEXEC|MSG_CMSG_COMPAT);
89bddce5 2185
f3d33426
HFS
2186 /* We assume all kernel code knows the size of sockaddr_storage */
2187 msg_sys->msg_namelen = 0;
2188
1da177e4
LT
2189 if (sock->file->f_flags & O_NONBLOCK)
2190 flags |= MSG_DONTWAIT;
2da62906 2191 err = (nosec ? sock_recvmsg_nosec : sock_recvmsg)(sock, msg_sys, flags);
1da177e4
LT
2192 if (err < 0)
2193 goto out_freeiov;
2194 len = err;
2195
2196 if (uaddr != NULL) {
43db362d 2197 err = move_addr_to_user(&addr,
a2e27255 2198 msg_sys->msg_namelen, uaddr,
89bddce5 2199 uaddr_len);
1da177e4
LT
2200 if (err < 0)
2201 goto out_freeiov;
2202 }
a2e27255 2203 err = __put_user((msg_sys->msg_flags & ~MSG_CMSG_COMPAT),
37f7f421 2204 COMPAT_FLAGS(msg));
1da177e4
LT
2205 if (err)
2206 goto out_freeiov;
2207 if (MSG_CMSG_COMPAT & flags)
a2e27255 2208 err = __put_user((unsigned long)msg_sys->msg_control - cmsg_ptr,
1da177e4
LT
2209 &msg_compat->msg_controllen);
2210 else
a2e27255 2211 err = __put_user((unsigned long)msg_sys->msg_control - cmsg_ptr,
1da177e4
LT
2212 &msg->msg_controllen);
2213 if (err)
2214 goto out_freeiov;
2215 err = len;
2216
2217out_freeiov:
da184284 2218 kfree(iov);
a2e27255
ACM
2219 return err;
2220}
2221
2222/*
2223 * BSD recvmsg interface
2224 */
2225
666547ff 2226long __sys_recvmsg(int fd, struct user_msghdr __user *msg, unsigned flags)
a2e27255
ACM
2227{
2228 int fput_needed, err;
2229 struct msghdr msg_sys;
1be374a0
AL
2230 struct socket *sock;
2231
1be374a0 2232 sock = sockfd_lookup_light(fd, &err, &fput_needed);
a2e27255
ACM
2233 if (!sock)
2234 goto out;
2235
a7526eb5 2236 err = ___sys_recvmsg(sock, msg, &msg_sys, flags, 0);
a2e27255 2237
6cb153ca 2238 fput_light(sock->file, fput_needed);
1da177e4
LT
2239out:
2240 return err;
2241}
2242
666547ff 2243SYSCALL_DEFINE3(recvmsg, int, fd, struct user_msghdr __user *, msg,
a7526eb5
AL
2244 unsigned int, flags)
2245{
2246 if (flags & MSG_CMSG_COMPAT)
2247 return -EINVAL;
2248 return __sys_recvmsg(fd, msg, flags);
2249}
2250
a2e27255
ACM
2251/*
2252 * Linux recvmmsg interface
2253 */
2254
2255int __sys_recvmmsg(int fd, struct mmsghdr __user *mmsg, unsigned int vlen,
2256 unsigned int flags, struct timespec *timeout)
2257{
2258 int fput_needed, err, datagrams;
2259 struct socket *sock;
2260 struct mmsghdr __user *entry;
d7256d0e 2261 struct compat_mmsghdr __user *compat_entry;
a2e27255 2262 struct msghdr msg_sys;
766b9f92
DD
2263 struct timespec64 end_time;
2264 struct timespec64 timeout64;
a2e27255
ACM
2265
2266 if (timeout &&
2267 poll_select_set_timeout(&end_time, timeout->tv_sec,
2268 timeout->tv_nsec))
2269 return -EINVAL;
2270
2271 datagrams = 0;
2272
2273 sock = sockfd_lookup_light(fd, &err, &fput_needed);
2274 if (!sock)
2275 return err;
2276
2277 err = sock_error(sock->sk);
e623a9e9
MJ
2278 if (err) {
2279 datagrams = err;
a2e27255 2280 goto out_put;
e623a9e9 2281 }
a2e27255
ACM
2282
2283 entry = mmsg;
d7256d0e 2284 compat_entry = (struct compat_mmsghdr __user *)mmsg;
a2e27255
ACM
2285
2286 while (datagrams < vlen) {
2287 /*
2288 * No need to ask LSM for more than the first datagram.
2289 */
d7256d0e 2290 if (MSG_CMSG_COMPAT & flags) {
666547ff 2291 err = ___sys_recvmsg(sock, (struct user_msghdr __user *)compat_entry,
a7526eb5
AL
2292 &msg_sys, flags & ~MSG_WAITFORONE,
2293 datagrams);
d7256d0e
JMG
2294 if (err < 0)
2295 break;
2296 err = __put_user(err, &compat_entry->msg_len);
2297 ++compat_entry;
2298 } else {
a7526eb5 2299 err = ___sys_recvmsg(sock,
666547ff 2300 (struct user_msghdr __user *)entry,
a7526eb5
AL
2301 &msg_sys, flags & ~MSG_WAITFORONE,
2302 datagrams);
d7256d0e
JMG
2303 if (err < 0)
2304 break;
2305 err = put_user(err, &entry->msg_len);
2306 ++entry;
2307 }
2308
a2e27255
ACM
2309 if (err)
2310 break;
a2e27255
ACM
2311 ++datagrams;
2312
71c5c159
BB
2313 /* MSG_WAITFORONE turns on MSG_DONTWAIT after one packet */
2314 if (flags & MSG_WAITFORONE)
2315 flags |= MSG_DONTWAIT;
2316
a2e27255 2317 if (timeout) {
766b9f92
DD
2318 ktime_get_ts64(&timeout64);
2319 *timeout = timespec64_to_timespec(
2320 timespec64_sub(end_time, timeout64));
a2e27255
ACM
2321 if (timeout->tv_sec < 0) {
2322 timeout->tv_sec = timeout->tv_nsec = 0;
2323 break;
2324 }
2325
2326 /* Timeout, return less than vlen datagrams */
2327 if (timeout->tv_nsec == 0 && timeout->tv_sec == 0)
2328 break;
2329 }
2330
2331 /* Out of band data, return right away */
2332 if (msg_sys.msg_flags & MSG_OOB)
2333 break;
a78cb84c 2334 cond_resched();
a2e27255
ACM
2335 }
2336
a2e27255 2337 if (err == 0)
34b88a68
ACM
2338 goto out_put;
2339
2340 if (datagrams == 0) {
2341 datagrams = err;
2342 goto out_put;
2343 }
a2e27255 2344
34b88a68
ACM
2345 /*
2346 * We may return less entries than requested (vlen) if the
2347 * sock is non block and there aren't enough datagrams...
2348 */
2349 if (err != -EAGAIN) {
a2e27255 2350 /*
34b88a68
ACM
2351 * ... or if recvmsg returns an error after we
2352 * received some datagrams, where we record the
2353 * error to return on the next call or if the
2354 * app asks about it using getsockopt(SO_ERROR).
a2e27255 2355 */
34b88a68 2356 sock->sk->sk_err = -err;
a2e27255 2357 }
34b88a68
ACM
2358out_put:
2359 fput_light(sock->file, fput_needed);
a2e27255 2360
34b88a68 2361 return datagrams;
a2e27255
ACM
2362}
2363
2364SYSCALL_DEFINE5(recvmmsg, int, fd, struct mmsghdr __user *, mmsg,
2365 unsigned int, vlen, unsigned int, flags,
2366 struct timespec __user *, timeout)
2367{
2368 int datagrams;
2369 struct timespec timeout_sys;
2370
1be374a0
AL
2371 if (flags & MSG_CMSG_COMPAT)
2372 return -EINVAL;
2373
a2e27255
ACM
2374 if (!timeout)
2375 return __sys_recvmmsg(fd, mmsg, vlen, flags, NULL);
2376
2377 if (copy_from_user(&timeout_sys, timeout, sizeof(timeout_sys)))
2378 return -EFAULT;
2379
2380 datagrams = __sys_recvmmsg(fd, mmsg, vlen, flags, &timeout_sys);
2381
2382 if (datagrams > 0 &&
2383 copy_to_user(timeout, &timeout_sys, sizeof(timeout_sys)))
2384 datagrams = -EFAULT;
2385
2386 return datagrams;
2387}
2388
2389#ifdef __ARCH_WANT_SYS_SOCKETCALL
1da177e4
LT
2390/* Argument list sizes for sys_socketcall */
2391#define AL(x) ((x) * sizeof(unsigned long))
228e548e 2392static const unsigned char nargs[21] = {
c6d409cf
ED
2393 AL(0), AL(3), AL(3), AL(3), AL(2), AL(3),
2394 AL(3), AL(3), AL(4), AL(4), AL(4), AL(6),
2395 AL(6), AL(2), AL(5), AL(5), AL(3), AL(3),
228e548e 2396 AL(4), AL(5), AL(4)
89bddce5
SH
2397};
2398
1da177e4
LT
2399#undef AL
2400
2401/*
89bddce5 2402 * System call vectors.
1da177e4
LT
2403 *
2404 * Argument checking cleaned up. Saved 20% in size.
2405 * This function doesn't need to set the kernel lock because
89bddce5 2406 * it is set by the callees.
1da177e4
LT
2407 */
2408
3e0fa65f 2409SYSCALL_DEFINE2(socketcall, int, call, unsigned long __user *, args)
1da177e4 2410{
2950fa9d 2411 unsigned long a[AUDITSC_ARGS];
89bddce5 2412 unsigned long a0, a1;
1da177e4 2413 int err;
47379052 2414 unsigned int len;
1da177e4 2415
228e548e 2416 if (call < 1 || call > SYS_SENDMMSG)
1da177e4
LT
2417 return -EINVAL;
2418
47379052
AV
2419 len = nargs[call];
2420 if (len > sizeof(a))
2421 return -EINVAL;
2422
1da177e4 2423 /* copy_from_user should be SMP safe. */
47379052 2424 if (copy_from_user(a, args, len))
1da177e4 2425 return -EFAULT;
3ec3b2fb 2426
2950fa9d
CG
2427 err = audit_socketcall(nargs[call] / sizeof(unsigned long), a);
2428 if (err)
2429 return err;
3ec3b2fb 2430
89bddce5
SH
2431 a0 = a[0];
2432 a1 = a[1];
2433
2434 switch (call) {
2435 case SYS_SOCKET:
2436 err = sys_socket(a0, a1, a[2]);
2437 break;
2438 case SYS_BIND:
2439 err = sys_bind(a0, (struct sockaddr __user *)a1, a[2]);
2440 break;
2441 case SYS_CONNECT:
2442 err = sys_connect(a0, (struct sockaddr __user *)a1, a[2]);
2443 break;
2444 case SYS_LISTEN:
2445 err = sys_listen(a0, a1);
2446 break;
2447 case SYS_ACCEPT:
de11defe
UD
2448 err = sys_accept4(a0, (struct sockaddr __user *)a1,
2449 (int __user *)a[2], 0);
89bddce5
SH
2450 break;
2451 case SYS_GETSOCKNAME:
2452 err =
2453 sys_getsockname(a0, (struct sockaddr __user *)a1,
2454 (int __user *)a[2]);
2455 break;
2456 case SYS_GETPEERNAME:
2457 err =
2458 sys_getpeername(a0, (struct sockaddr __user *)a1,
2459 (int __user *)a[2]);
2460 break;
2461 case SYS_SOCKETPAIR:
2462 err = sys_socketpair(a0, a1, a[2], (int __user *)a[3]);
2463 break;
2464 case SYS_SEND:
2465 err = sys_send(a0, (void __user *)a1, a[2], a[3]);
2466 break;
2467 case SYS_SENDTO:
2468 err = sys_sendto(a0, (void __user *)a1, a[2], a[3],
2469 (struct sockaddr __user *)a[4], a[5]);
2470 break;
2471 case SYS_RECV:
2472 err = sys_recv(a0, (void __user *)a1, a[2], a[3]);
2473 break;
2474 case SYS_RECVFROM:
2475 err = sys_recvfrom(a0, (void __user *)a1, a[2], a[3],
2476 (struct sockaddr __user *)a[4],
2477 (int __user *)a[5]);
2478 break;
2479 case SYS_SHUTDOWN:
2480 err = sys_shutdown(a0, a1);
2481 break;
2482 case SYS_SETSOCKOPT:
2483 err = sys_setsockopt(a0, a1, a[2], (char __user *)a[3], a[4]);
2484 break;
2485 case SYS_GETSOCKOPT:
2486 err =
2487 sys_getsockopt(a0, a1, a[2], (char __user *)a[3],
2488 (int __user *)a[4]);
2489 break;
2490 case SYS_SENDMSG:
666547ff 2491 err = sys_sendmsg(a0, (struct user_msghdr __user *)a1, a[2]);
89bddce5 2492 break;
228e548e
AB
2493 case SYS_SENDMMSG:
2494 err = sys_sendmmsg(a0, (struct mmsghdr __user *)a1, a[2], a[3]);
2495 break;
89bddce5 2496 case SYS_RECVMSG:
666547ff 2497 err = sys_recvmsg(a0, (struct user_msghdr __user *)a1, a[2]);
89bddce5 2498 break;
a2e27255
ACM
2499 case SYS_RECVMMSG:
2500 err = sys_recvmmsg(a0, (struct mmsghdr __user *)a1, a[2], a[3],
2501 (struct timespec __user *)a[4]);
2502 break;
de11defe
UD
2503 case SYS_ACCEPT4:
2504 err = sys_accept4(a0, (struct sockaddr __user *)a1,
2505 (int __user *)a[2], a[3]);
aaca0bdc 2506 break;
89bddce5
SH
2507 default:
2508 err = -EINVAL;
2509 break;
1da177e4
LT
2510 }
2511 return err;
2512}
2513
89bddce5 2514#endif /* __ARCH_WANT_SYS_SOCKETCALL */
1da177e4 2515
55737fda
SH
2516/**
2517 * sock_register - add a socket protocol handler
2518 * @ops: description of protocol
2519 *
1da177e4
LT
2520 * This function is called by a protocol handler that wants to
2521 * advertise its address family, and have it linked into the
e793c0f7 2522 * socket interface. The value ops->family corresponds to the
55737fda 2523 * socket system call protocol family.
1da177e4 2524 */
f0fd27d4 2525int sock_register(const struct net_proto_family *ops)
1da177e4
LT
2526{
2527 int err;
2528
2529 if (ops->family >= NPROTO) {
3410f22e 2530 pr_crit("protocol %d >= NPROTO(%d)\n", ops->family, NPROTO);
1da177e4
LT
2531 return -ENOBUFS;
2532 }
55737fda
SH
2533
2534 spin_lock(&net_family_lock);
190683a9
ED
2535 if (rcu_dereference_protected(net_families[ops->family],
2536 lockdep_is_held(&net_family_lock)))
55737fda
SH
2537 err = -EEXIST;
2538 else {
cf778b00 2539 rcu_assign_pointer(net_families[ops->family], ops);
1da177e4
LT
2540 err = 0;
2541 }
55737fda
SH
2542 spin_unlock(&net_family_lock);
2543
3410f22e 2544 pr_info("NET: Registered protocol family %d\n", ops->family);
1da177e4
LT
2545 return err;
2546}
c6d409cf 2547EXPORT_SYMBOL(sock_register);
1da177e4 2548
55737fda
SH
2549/**
2550 * sock_unregister - remove a protocol handler
2551 * @family: protocol family to remove
2552 *
1da177e4
LT
2553 * This function is called by a protocol handler that wants to
2554 * remove its address family, and have it unlinked from the
55737fda
SH
2555 * new socket creation.
2556 *
2557 * If protocol handler is a module, then it can use module reference
2558 * counts to protect against new references. If protocol handler is not
2559 * a module then it needs to provide its own protection in
2560 * the ops->create routine.
1da177e4 2561 */
f0fd27d4 2562void sock_unregister(int family)
1da177e4 2563{
f0fd27d4 2564 BUG_ON(family < 0 || family >= NPROTO);
1da177e4 2565
55737fda 2566 spin_lock(&net_family_lock);
a9b3cd7f 2567 RCU_INIT_POINTER(net_families[family], NULL);
55737fda
SH
2568 spin_unlock(&net_family_lock);
2569
2570 synchronize_rcu();
2571
3410f22e 2572 pr_info("NET: Unregistered protocol family %d\n", family);
1da177e4 2573}
c6d409cf 2574EXPORT_SYMBOL(sock_unregister);
1da177e4 2575
77d76ea3 2576static int __init sock_init(void)
1da177e4 2577{
b3e19d92 2578 int err;
2ca794e5
EB
2579 /*
2580 * Initialize the network sysctl infrastructure.
2581 */
2582 err = net_sysctl_init();
2583 if (err)
2584 goto out;
b3e19d92 2585
1da177e4 2586 /*
89bddce5 2587 * Initialize skbuff SLAB cache
1da177e4
LT
2588 */
2589 skb_init();
1da177e4
LT
2590
2591 /*
89bddce5 2592 * Initialize the protocols module.
1da177e4
LT
2593 */
2594
2595 init_inodecache();
b3e19d92
NP
2596
2597 err = register_filesystem(&sock_fs_type);
2598 if (err)
2599 goto out_fs;
1da177e4 2600 sock_mnt = kern_mount(&sock_fs_type);
b3e19d92
NP
2601 if (IS_ERR(sock_mnt)) {
2602 err = PTR_ERR(sock_mnt);
2603 goto out_mount;
2604 }
77d76ea3
AK
2605
2606 /* The real protocol initialization is performed in later initcalls.
1da177e4
LT
2607 */
2608
2609#ifdef CONFIG_NETFILTER
6d11cfdb
PNA
2610 err = netfilter_init();
2611 if (err)
2612 goto out;
1da177e4 2613#endif
cbeb321a 2614
408eccce 2615 ptp_classifier_init();
c1f19b51 2616
b3e19d92
NP
2617out:
2618 return err;
2619
2620out_mount:
2621 unregister_filesystem(&sock_fs_type);
2622out_fs:
2623 goto out;
1da177e4
LT
2624}
2625
77d76ea3
AK
2626core_initcall(sock_init); /* early initcall */
2627
1da177e4
LT
2628#ifdef CONFIG_PROC_FS
2629void socket_seq_show(struct seq_file *seq)
2630{
648845ab
TZ
2631 seq_printf(seq, "sockets: used %d\n",
2632 sock_inuse_get(seq->private));
1da177e4 2633}
89bddce5 2634#endif /* CONFIG_PROC_FS */
1da177e4 2635
89bbfc95 2636#ifdef CONFIG_COMPAT
6b96018b 2637static int do_siocgstamp(struct net *net, struct socket *sock,
644595f8 2638 unsigned int cmd, void __user *up)
7a229387 2639{
7a229387
AB
2640 mm_segment_t old_fs = get_fs();
2641 struct timeval ktv;
2642 int err;
2643
2644 set_fs(KERNEL_DS);
6b96018b 2645 err = sock_do_ioctl(net, sock, cmd, (unsigned long)&ktv);
7a229387 2646 set_fs(old_fs);
644595f8 2647 if (!err)
ed6fe9d6 2648 err = compat_put_timeval(&ktv, up);
644595f8 2649
7a229387
AB
2650 return err;
2651}
2652
6b96018b 2653static int do_siocgstampns(struct net *net, struct socket *sock,
644595f8 2654 unsigned int cmd, void __user *up)
7a229387 2655{
7a229387
AB
2656 mm_segment_t old_fs = get_fs();
2657 struct timespec kts;
2658 int err;
2659
2660 set_fs(KERNEL_DS);
6b96018b 2661 err = sock_do_ioctl(net, sock, cmd, (unsigned long)&kts);
7a229387 2662 set_fs(old_fs);
644595f8 2663 if (!err)
ed6fe9d6 2664 err = compat_put_timespec(&kts, up);
644595f8 2665
7a229387
AB
2666 return err;
2667}
2668
6b96018b 2669static int dev_ifname32(struct net *net, struct compat_ifreq __user *uifr32)
7a229387
AB
2670{
2671 struct ifreq __user *uifr;
2672 int err;
2673
2674 uifr = compat_alloc_user_space(sizeof(struct ifreq));
6b96018b 2675 if (copy_in_user(uifr, uifr32, sizeof(struct compat_ifreq)))
7a229387
AB
2676 return -EFAULT;
2677
6b96018b 2678 err = dev_ioctl(net, SIOCGIFNAME, uifr);
7a229387
AB
2679 if (err)
2680 return err;
2681
6b96018b 2682 if (copy_in_user(uifr32, uifr, sizeof(struct compat_ifreq)))
7a229387
AB
2683 return -EFAULT;
2684
2685 return 0;
2686}
2687
36fd633e 2688static int compat_dev_ifconf(struct net *net, struct compat_ifconf __user *uifc32)
7a229387 2689{
6b96018b 2690 struct compat_ifconf ifc32;
7a229387 2691 struct ifconf ifc;
7a229387
AB
2692 int err;
2693
6b96018b 2694 if (copy_from_user(&ifc32, uifc32, sizeof(struct compat_ifconf)))
7a229387
AB
2695 return -EFAULT;
2696
36fd633e
AV
2697 ifc.ifc_len = ifc32.ifc_len;
2698 ifc.ifc_req = compat_ptr(ifc32.ifcbuf);
7a229387 2699
36fd633e
AV
2700 rtnl_lock();
2701 err = dev_ifconf(net, &ifc, sizeof(struct compat_ifreq));
2702 rtnl_unlock();
7a229387
AB
2703 if (err)
2704 return err;
2705
36fd633e 2706 ifc32.ifc_len = ifc.ifc_len;
6b96018b 2707 if (copy_to_user(uifc32, &ifc32, sizeof(struct compat_ifconf)))
7a229387
AB
2708 return -EFAULT;
2709
2710 return 0;
2711}
2712
6b96018b 2713static int ethtool_ioctl(struct net *net, struct compat_ifreq __user *ifr32)
7a229387 2714{
3a7da39d
BH
2715 struct compat_ethtool_rxnfc __user *compat_rxnfc;
2716 bool convert_in = false, convert_out = false;
2717 size_t buf_size = ALIGN(sizeof(struct ifreq), 8);
2718 struct ethtool_rxnfc __user *rxnfc;
7a229387 2719 struct ifreq __user *ifr;
3a7da39d
BH
2720 u32 rule_cnt = 0, actual_rule_cnt;
2721 u32 ethcmd;
7a229387 2722 u32 data;
3a7da39d 2723 int ret;
7a229387 2724
3a7da39d
BH
2725 if (get_user(data, &ifr32->ifr_ifru.ifru_data))
2726 return -EFAULT;
7a229387 2727
3a7da39d
BH
2728 compat_rxnfc = compat_ptr(data);
2729
2730 if (get_user(ethcmd, &compat_rxnfc->cmd))
7a229387
AB
2731 return -EFAULT;
2732
3a7da39d
BH
2733 /* Most ethtool structures are defined without padding.
2734 * Unfortunately struct ethtool_rxnfc is an exception.
2735 */
2736 switch (ethcmd) {
2737 default:
2738 break;
2739 case ETHTOOL_GRXCLSRLALL:
2740 /* Buffer size is variable */
2741 if (get_user(rule_cnt, &compat_rxnfc->rule_cnt))
2742 return -EFAULT;
2743 if (rule_cnt > KMALLOC_MAX_SIZE / sizeof(u32))
2744 return -ENOMEM;
2745 buf_size += rule_cnt * sizeof(u32);
2746 /* fall through */
2747 case ETHTOOL_GRXRINGS:
2748 case ETHTOOL_GRXCLSRLCNT:
2749 case ETHTOOL_GRXCLSRULE:
55664f32 2750 case ETHTOOL_SRXCLSRLINS:
3a7da39d
BH
2751 convert_out = true;
2752 /* fall through */
2753 case ETHTOOL_SRXCLSRLDEL:
3a7da39d
BH
2754 buf_size += sizeof(struct ethtool_rxnfc);
2755 convert_in = true;
2756 break;
2757 }
2758
2759 ifr = compat_alloc_user_space(buf_size);
954b1244 2760 rxnfc = (void __user *)ifr + ALIGN(sizeof(struct ifreq), 8);
3a7da39d
BH
2761
2762 if (copy_in_user(&ifr->ifr_name, &ifr32->ifr_name, IFNAMSIZ))
7a229387
AB
2763 return -EFAULT;
2764
3a7da39d
BH
2765 if (put_user(convert_in ? rxnfc : compat_ptr(data),
2766 &ifr->ifr_ifru.ifru_data))
7a229387
AB
2767 return -EFAULT;
2768
3a7da39d 2769 if (convert_in) {
127fe533 2770 /* We expect there to be holes between fs.m_ext and
3a7da39d
BH
2771 * fs.ring_cookie and at the end of fs, but nowhere else.
2772 */
127fe533
AD
2773 BUILD_BUG_ON(offsetof(struct compat_ethtool_rxnfc, fs.m_ext) +
2774 sizeof(compat_rxnfc->fs.m_ext) !=
2775 offsetof(struct ethtool_rxnfc, fs.m_ext) +
2776 sizeof(rxnfc->fs.m_ext));
3a7da39d
BH
2777 BUILD_BUG_ON(
2778 offsetof(struct compat_ethtool_rxnfc, fs.location) -
2779 offsetof(struct compat_ethtool_rxnfc, fs.ring_cookie) !=
2780 offsetof(struct ethtool_rxnfc, fs.location) -
2781 offsetof(struct ethtool_rxnfc, fs.ring_cookie));
2782
2783 if (copy_in_user(rxnfc, compat_rxnfc,
954b1244
SH
2784 (void __user *)(&rxnfc->fs.m_ext + 1) -
2785 (void __user *)rxnfc) ||
3a7da39d
BH
2786 copy_in_user(&rxnfc->fs.ring_cookie,
2787 &compat_rxnfc->fs.ring_cookie,
954b1244
SH
2788 (void __user *)(&rxnfc->fs.location + 1) -
2789 (void __user *)&rxnfc->fs.ring_cookie) ||
3a7da39d
BH
2790 copy_in_user(&rxnfc->rule_cnt, &compat_rxnfc->rule_cnt,
2791 sizeof(rxnfc->rule_cnt)))
2792 return -EFAULT;
2793 }
2794
2795 ret = dev_ioctl(net, SIOCETHTOOL, ifr);
2796 if (ret)
2797 return ret;
2798
2799 if (convert_out) {
2800 if (copy_in_user(compat_rxnfc, rxnfc,
954b1244
SH
2801 (const void __user *)(&rxnfc->fs.m_ext + 1) -
2802 (const void __user *)rxnfc) ||
3a7da39d
BH
2803 copy_in_user(&compat_rxnfc->fs.ring_cookie,
2804 &rxnfc->fs.ring_cookie,
954b1244
SH
2805 (const void __user *)(&rxnfc->fs.location + 1) -
2806 (const void __user *)&rxnfc->fs.ring_cookie) ||
3a7da39d
BH
2807 copy_in_user(&compat_rxnfc->rule_cnt, &rxnfc->rule_cnt,
2808 sizeof(rxnfc->rule_cnt)))
2809 return -EFAULT;
2810
2811 if (ethcmd == ETHTOOL_GRXCLSRLALL) {
2812 /* As an optimisation, we only copy the actual
2813 * number of rules that the underlying
2814 * function returned. Since Mallory might
2815 * change the rule count in user memory, we
2816 * check that it is less than the rule count
2817 * originally given (as the user buffer size),
2818 * which has been range-checked.
2819 */
2820 if (get_user(actual_rule_cnt, &rxnfc->rule_cnt))
2821 return -EFAULT;
2822 if (actual_rule_cnt < rule_cnt)
2823 rule_cnt = actual_rule_cnt;
2824 if (copy_in_user(&compat_rxnfc->rule_locs[0],
2825 &rxnfc->rule_locs[0],
2826 rule_cnt * sizeof(u32)))
2827 return -EFAULT;
2828 }
2829 }
2830
2831 return 0;
7a229387
AB
2832}
2833
7a50a240
AB
2834static int compat_siocwandev(struct net *net, struct compat_ifreq __user *uifr32)
2835{
2836 void __user *uptr;
2837 compat_uptr_t uptr32;
2838 struct ifreq __user *uifr;
2839
c6d409cf 2840 uifr = compat_alloc_user_space(sizeof(*uifr));
7a50a240
AB
2841 if (copy_in_user(uifr, uifr32, sizeof(struct compat_ifreq)))
2842 return -EFAULT;
2843
2844 if (get_user(uptr32, &uifr32->ifr_settings.ifs_ifsu))
2845 return -EFAULT;
2846
2847 uptr = compat_ptr(uptr32);
2848
2849 if (put_user(uptr, &uifr->ifr_settings.ifs_ifsu.raw_hdlc))
2850 return -EFAULT;
2851
2852 return dev_ioctl(net, SIOCWANDEV, uifr);
2853}
2854
6b96018b
AB
2855static int bond_ioctl(struct net *net, unsigned int cmd,
2856 struct compat_ifreq __user *ifr32)
7a229387
AB
2857{
2858 struct ifreq kifr;
7a229387
AB
2859 mm_segment_t old_fs;
2860 int err;
7a229387
AB
2861
2862 switch (cmd) {
2863 case SIOCBONDENSLAVE:
2864 case SIOCBONDRELEASE:
2865 case SIOCBONDSETHWADDR:
2866 case SIOCBONDCHANGEACTIVE:
6b96018b 2867 if (copy_from_user(&kifr, ifr32, sizeof(struct compat_ifreq)))
7a229387
AB
2868 return -EFAULT;
2869
2870 old_fs = get_fs();
c6d409cf 2871 set_fs(KERNEL_DS);
c3f52ae6 2872 err = dev_ioctl(net, cmd,
2873 (struct ifreq __user __force *) &kifr);
c6d409cf 2874 set_fs(old_fs);
7a229387
AB
2875
2876 return err;
7a229387 2877 default:
07d106d0 2878 return -ENOIOCTLCMD;
ccbd6a5a 2879 }
7a229387
AB
2880}
2881
590d4693
BH
2882/* Handle ioctls that use ifreq::ifr_data and just need struct ifreq converted */
2883static int compat_ifr_data_ioctl(struct net *net, unsigned int cmd,
6b96018b 2884 struct compat_ifreq __user *u_ifreq32)
7a229387
AB
2885{
2886 struct ifreq __user *u_ifreq64;
7a229387
AB
2887 char tmp_buf[IFNAMSIZ];
2888 void __user *data64;
2889 u32 data32;
2890
2891 if (copy_from_user(&tmp_buf[0], &(u_ifreq32->ifr_ifrn.ifrn_name[0]),
2892 IFNAMSIZ))
2893 return -EFAULT;
417c3522 2894 if (get_user(data32, &u_ifreq32->ifr_ifru.ifru_data))
7a229387
AB
2895 return -EFAULT;
2896 data64 = compat_ptr(data32);
2897
2898 u_ifreq64 = compat_alloc_user_space(sizeof(*u_ifreq64));
2899
7a229387
AB
2900 if (copy_to_user(&u_ifreq64->ifr_ifrn.ifrn_name[0], &tmp_buf[0],
2901 IFNAMSIZ))
2902 return -EFAULT;
417c3522 2903 if (put_user(data64, &u_ifreq64->ifr_ifru.ifru_data))
7a229387
AB
2904 return -EFAULT;
2905
6b96018b 2906 return dev_ioctl(net, cmd, u_ifreq64);
7a229387
AB
2907}
2908
a2116ed2
AB
2909static int compat_sioc_ifmap(struct net *net, unsigned int cmd,
2910 struct compat_ifreq __user *uifr32)
2911{
2912 struct ifreq ifr;
2913 struct compat_ifmap __user *uifmap32;
2914 mm_segment_t old_fs;
2915 int err;
2916
2917 uifmap32 = &uifr32->ifr_ifru.ifru_map;
2918 err = copy_from_user(&ifr, uifr32, sizeof(ifr.ifr_name));
3ddc5b46
MD
2919 err |= get_user(ifr.ifr_map.mem_start, &uifmap32->mem_start);
2920 err |= get_user(ifr.ifr_map.mem_end, &uifmap32->mem_end);
2921 err |= get_user(ifr.ifr_map.base_addr, &uifmap32->base_addr);
2922 err |= get_user(ifr.ifr_map.irq, &uifmap32->irq);
2923 err |= get_user(ifr.ifr_map.dma, &uifmap32->dma);
2924 err |= get_user(ifr.ifr_map.port, &uifmap32->port);
a2116ed2
AB
2925 if (err)
2926 return -EFAULT;
2927
2928 old_fs = get_fs();
c6d409cf 2929 set_fs(KERNEL_DS);
c3f52ae6 2930 err = dev_ioctl(net, cmd, (void __user __force *)&ifr);
c6d409cf 2931 set_fs(old_fs);
a2116ed2
AB
2932
2933 if (cmd == SIOCGIFMAP && !err) {
2934 err = copy_to_user(uifr32, &ifr, sizeof(ifr.ifr_name));
3ddc5b46
MD
2935 err |= put_user(ifr.ifr_map.mem_start, &uifmap32->mem_start);
2936 err |= put_user(ifr.ifr_map.mem_end, &uifmap32->mem_end);
2937 err |= put_user(ifr.ifr_map.base_addr, &uifmap32->base_addr);
2938 err |= put_user(ifr.ifr_map.irq, &uifmap32->irq);
2939 err |= put_user(ifr.ifr_map.dma, &uifmap32->dma);
2940 err |= put_user(ifr.ifr_map.port, &uifmap32->port);
a2116ed2
AB
2941 if (err)
2942 err = -EFAULT;
2943 }
2944 return err;
2945}
2946
7a229387 2947struct rtentry32 {
c6d409cf 2948 u32 rt_pad1;
7a229387
AB
2949 struct sockaddr rt_dst; /* target address */
2950 struct sockaddr rt_gateway; /* gateway addr (RTF_GATEWAY) */
2951 struct sockaddr rt_genmask; /* target network mask (IP) */
c6d409cf
ED
2952 unsigned short rt_flags;
2953 short rt_pad2;
2954 u32 rt_pad3;
2955 unsigned char rt_tos;
2956 unsigned char rt_class;
2957 short rt_pad4;
2958 short rt_metric; /* +1 for binary compatibility! */
7a229387 2959 /* char * */ u32 rt_dev; /* forcing the device at add */
c6d409cf
ED
2960 u32 rt_mtu; /* per route MTU/Window */
2961 u32 rt_window; /* Window clamping */
7a229387
AB
2962 unsigned short rt_irtt; /* Initial RTT */
2963};
2964
2965struct in6_rtmsg32 {
2966 struct in6_addr rtmsg_dst;
2967 struct in6_addr rtmsg_src;
2968 struct in6_addr rtmsg_gateway;
2969 u32 rtmsg_type;
2970 u16 rtmsg_dst_len;
2971 u16 rtmsg_src_len;
2972 u32 rtmsg_metric;
2973 u32 rtmsg_info;
2974 u32 rtmsg_flags;
2975 s32 rtmsg_ifindex;
2976};
2977
6b96018b
AB
2978static int routing_ioctl(struct net *net, struct socket *sock,
2979 unsigned int cmd, void __user *argp)
7a229387
AB
2980{
2981 int ret;
2982 void *r = NULL;
2983 struct in6_rtmsg r6;
2984 struct rtentry r4;
2985 char devname[16];
2986 u32 rtdev;
2987 mm_segment_t old_fs = get_fs();
2988
6b96018b
AB
2989 if (sock && sock->sk && sock->sk->sk_family == AF_INET6) { /* ipv6 */
2990 struct in6_rtmsg32 __user *ur6 = argp;
c6d409cf 2991 ret = copy_from_user(&r6.rtmsg_dst, &(ur6->rtmsg_dst),
7a229387 2992 3 * sizeof(struct in6_addr));
3ddc5b46
MD
2993 ret |= get_user(r6.rtmsg_type, &(ur6->rtmsg_type));
2994 ret |= get_user(r6.rtmsg_dst_len, &(ur6->rtmsg_dst_len));
2995 ret |= get_user(r6.rtmsg_src_len, &(ur6->rtmsg_src_len));
2996 ret |= get_user(r6.rtmsg_metric, &(ur6->rtmsg_metric));
2997 ret |= get_user(r6.rtmsg_info, &(ur6->rtmsg_info));
2998 ret |= get_user(r6.rtmsg_flags, &(ur6->rtmsg_flags));
2999 ret |= get_user(r6.rtmsg_ifindex, &(ur6->rtmsg_ifindex));
7a229387
AB
3000
3001 r = (void *) &r6;
3002 } else { /* ipv4 */
6b96018b 3003 struct rtentry32 __user *ur4 = argp;
c6d409cf 3004 ret = copy_from_user(&r4.rt_dst, &(ur4->rt_dst),
7a229387 3005 3 * sizeof(struct sockaddr));
3ddc5b46
MD
3006 ret |= get_user(r4.rt_flags, &(ur4->rt_flags));
3007 ret |= get_user(r4.rt_metric, &(ur4->rt_metric));
3008 ret |= get_user(r4.rt_mtu, &(ur4->rt_mtu));
3009 ret |= get_user(r4.rt_window, &(ur4->rt_window));
3010 ret |= get_user(r4.rt_irtt, &(ur4->rt_irtt));
3011 ret |= get_user(rtdev, &(ur4->rt_dev));
7a229387 3012 if (rtdev) {
c6d409cf 3013 ret |= copy_from_user(devname, compat_ptr(rtdev), 15);
c3f52ae6 3014 r4.rt_dev = (char __user __force *)devname;
3015 devname[15] = 0;
7a229387
AB
3016 } else
3017 r4.rt_dev = NULL;
3018
3019 r = (void *) &r4;
3020 }
3021
3022 if (ret) {
3023 ret = -EFAULT;
3024 goto out;
3025 }
3026
c6d409cf 3027 set_fs(KERNEL_DS);
6b96018b 3028 ret = sock_do_ioctl(net, sock, cmd, (unsigned long) r);
c6d409cf 3029 set_fs(old_fs);
7a229387
AB
3030
3031out:
7a229387
AB
3032 return ret;
3033}
3034
3035/* Since old style bridge ioctl's endup using SIOCDEVPRIVATE
3036 * for some operations; this forces use of the newer bridge-utils that
25985edc 3037 * use compatible ioctls
7a229387 3038 */
6b96018b 3039static int old_bridge_ioctl(compat_ulong_t __user *argp)
7a229387 3040{
6b96018b 3041 compat_ulong_t tmp;
7a229387 3042
6b96018b 3043 if (get_user(tmp, argp))
7a229387
AB
3044 return -EFAULT;
3045 if (tmp == BRCTL_GET_VERSION)
3046 return BRCTL_VERSION + 1;
3047 return -EINVAL;
3048}
3049
6b96018b
AB
3050static int compat_sock_ioctl_trans(struct file *file, struct socket *sock,
3051 unsigned int cmd, unsigned long arg)
3052{
3053 void __user *argp = compat_ptr(arg);
3054 struct sock *sk = sock->sk;
3055 struct net *net = sock_net(sk);
7a229387 3056
6b96018b 3057 if (cmd >= SIOCDEVPRIVATE && cmd <= (SIOCDEVPRIVATE + 15))
590d4693 3058 return compat_ifr_data_ioctl(net, cmd, argp);
6b96018b
AB
3059
3060 switch (cmd) {
3061 case SIOCSIFBR:
3062 case SIOCGIFBR:
3063 return old_bridge_ioctl(argp);
3064 case SIOCGIFNAME:
3065 return dev_ifname32(net, argp);
3066 case SIOCGIFCONF:
36fd633e 3067 return compat_dev_ifconf(net, argp);
6b96018b
AB
3068 case SIOCETHTOOL:
3069 return ethtool_ioctl(net, argp);
7a50a240
AB
3070 case SIOCWANDEV:
3071 return compat_siocwandev(net, argp);
a2116ed2
AB
3072 case SIOCGIFMAP:
3073 case SIOCSIFMAP:
3074 return compat_sioc_ifmap(net, cmd, argp);
6b96018b
AB
3075 case SIOCBONDENSLAVE:
3076 case SIOCBONDRELEASE:
3077 case SIOCBONDSETHWADDR:
6b96018b
AB
3078 case SIOCBONDCHANGEACTIVE:
3079 return bond_ioctl(net, cmd, argp);
3080 case SIOCADDRT:
3081 case SIOCDELRT:
3082 return routing_ioctl(net, sock, cmd, argp);
3083 case SIOCGSTAMP:
3084 return do_siocgstamp(net, sock, cmd, argp);
3085 case SIOCGSTAMPNS:
3086 return do_siocgstampns(net, sock, cmd, argp);
590d4693
BH
3087 case SIOCBONDSLAVEINFOQUERY:
3088 case SIOCBONDINFOQUERY:
a2116ed2 3089 case SIOCSHWTSTAMP:
fd468c74 3090 case SIOCGHWTSTAMP:
590d4693 3091 return compat_ifr_data_ioctl(net, cmd, argp);
6b96018b
AB
3092
3093 case FIOSETOWN:
3094 case SIOCSPGRP:
3095 case FIOGETOWN:
3096 case SIOCGPGRP:
3097 case SIOCBRADDBR:
3098 case SIOCBRDELBR:
3099 case SIOCGIFVLAN:
3100 case SIOCSIFVLAN:
3101 case SIOCADDDLCI:
3102 case SIOCDELDLCI:
c62cce2c 3103 case SIOCGSKNS:
6b96018b
AB
3104 return sock_ioctl(file, cmd, arg);
3105
3106 case SIOCGIFFLAGS:
3107 case SIOCSIFFLAGS:
3108 case SIOCGIFMETRIC:
3109 case SIOCSIFMETRIC:
3110 case SIOCGIFMTU:
3111 case SIOCSIFMTU:
3112 case SIOCGIFMEM:
3113 case SIOCSIFMEM:
3114 case SIOCGIFHWADDR:
3115 case SIOCSIFHWADDR:
3116 case SIOCADDMULTI:
3117 case SIOCDELMULTI:
3118 case SIOCGIFINDEX:
6b96018b
AB
3119 case SIOCGIFADDR:
3120 case SIOCSIFADDR:
3121 case SIOCSIFHWBROADCAST:
6b96018b 3122 case SIOCDIFADDR:
6b96018b
AB
3123 case SIOCGIFBRDADDR:
3124 case SIOCSIFBRDADDR:
3125 case SIOCGIFDSTADDR:
3126 case SIOCSIFDSTADDR:
3127 case SIOCGIFNETMASK:
3128 case SIOCSIFNETMASK:
3129 case SIOCSIFPFLAGS:
3130 case SIOCGIFPFLAGS:
3131 case SIOCGIFTXQLEN:
3132 case SIOCSIFTXQLEN:
3133 case SIOCBRADDIF:
3134 case SIOCBRDELIF:
9177efd3
AB
3135 case SIOCSIFNAME:
3136 case SIOCGMIIPHY:
3137 case SIOCGMIIREG:
3138 case SIOCSMIIREG:
6b96018b
AB
3139 case SIOCSARP:
3140 case SIOCGARP:
3141 case SIOCDARP:
6b96018b 3142 case SIOCATMARK:
9177efd3
AB
3143 return sock_do_ioctl(net, sock, cmd, arg);
3144 }
3145
6b96018b
AB
3146 return -ENOIOCTLCMD;
3147}
7a229387 3148
95c96174 3149static long compat_sock_ioctl(struct file *file, unsigned int cmd,
89bddce5 3150 unsigned long arg)
89bbfc95
SP
3151{
3152 struct socket *sock = file->private_data;
3153 int ret = -ENOIOCTLCMD;
87de87d5
DM
3154 struct sock *sk;
3155 struct net *net;
3156
3157 sk = sock->sk;
3158 net = sock_net(sk);
89bbfc95
SP
3159
3160 if (sock->ops->compat_ioctl)
3161 ret = sock->ops->compat_ioctl(sock, cmd, arg);
3162
87de87d5
DM
3163 if (ret == -ENOIOCTLCMD &&
3164 (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST))
3165 ret = compat_wext_handle_ioctl(net, cmd, arg);
3166
6b96018b
AB
3167 if (ret == -ENOIOCTLCMD)
3168 ret = compat_sock_ioctl_trans(file, sock, cmd, arg);
3169
89bbfc95
SP
3170 return ret;
3171}
3172#endif
3173
ac5a488e
SS
3174int kernel_bind(struct socket *sock, struct sockaddr *addr, int addrlen)
3175{
3176 return sock->ops->bind(sock, addr, addrlen);
3177}
c6d409cf 3178EXPORT_SYMBOL(kernel_bind);
ac5a488e
SS
3179
3180int kernel_listen(struct socket *sock, int backlog)
3181{
3182 return sock->ops->listen(sock, backlog);
3183}
c6d409cf 3184EXPORT_SYMBOL(kernel_listen);
ac5a488e
SS
3185
3186int kernel_accept(struct socket *sock, struct socket **newsock, int flags)
3187{
3188 struct sock *sk = sock->sk;
3189 int err;
3190
3191 err = sock_create_lite(sk->sk_family, sk->sk_type, sk->sk_protocol,
3192 newsock);
3193 if (err < 0)
3194 goto done;
3195
cdfbabfb 3196 err = sock->ops->accept(sock, *newsock, flags, true);
ac5a488e
SS
3197 if (err < 0) {
3198 sock_release(*newsock);
fa8705b0 3199 *newsock = NULL;
ac5a488e
SS
3200 goto done;
3201 }
3202
3203 (*newsock)->ops = sock->ops;
1b08534e 3204 __module_get((*newsock)->ops->owner);
ac5a488e
SS
3205
3206done:
3207 return err;
3208}
c6d409cf 3209EXPORT_SYMBOL(kernel_accept);
ac5a488e
SS
3210
3211int kernel_connect(struct socket *sock, struct sockaddr *addr, int addrlen,
4768fbcb 3212 int flags)
ac5a488e
SS
3213{
3214 return sock->ops->connect(sock, addr, addrlen, flags);
3215}
c6d409cf 3216EXPORT_SYMBOL(kernel_connect);
ac5a488e
SS
3217
3218int kernel_getsockname(struct socket *sock, struct sockaddr *addr,
3219 int *addrlen)
3220{
3221 return sock->ops->getname(sock, addr, addrlen, 0);
3222}
c6d409cf 3223EXPORT_SYMBOL(kernel_getsockname);
ac5a488e
SS
3224
3225int kernel_getpeername(struct socket *sock, struct sockaddr *addr,
3226 int *addrlen)
3227{
3228 return sock->ops->getname(sock, addr, addrlen, 1);
3229}
c6d409cf 3230EXPORT_SYMBOL(kernel_getpeername);
ac5a488e
SS
3231
3232int kernel_getsockopt(struct socket *sock, int level, int optname,
3233 char *optval, int *optlen)
3234{
3235 mm_segment_t oldfs = get_fs();
fb8621bb
NK
3236 char __user *uoptval;
3237 int __user *uoptlen;
ac5a488e
SS
3238 int err;
3239
fb8621bb
NK
3240 uoptval = (char __user __force *) optval;
3241 uoptlen = (int __user __force *) optlen;
3242
ac5a488e
SS
3243 set_fs(KERNEL_DS);
3244 if (level == SOL_SOCKET)
fb8621bb 3245 err = sock_getsockopt(sock, level, optname, uoptval, uoptlen);
ac5a488e 3246 else
fb8621bb
NK
3247 err = sock->ops->getsockopt(sock, level, optname, uoptval,
3248 uoptlen);
ac5a488e
SS
3249 set_fs(oldfs);
3250 return err;
3251}
c6d409cf 3252EXPORT_SYMBOL(kernel_getsockopt);
ac5a488e
SS
3253
3254int kernel_setsockopt(struct socket *sock, int level, int optname,
b7058842 3255 char *optval, unsigned int optlen)
ac5a488e
SS
3256{
3257 mm_segment_t oldfs = get_fs();
fb8621bb 3258 char __user *uoptval;
ac5a488e
SS
3259 int err;
3260
fb8621bb
NK
3261 uoptval = (char __user __force *) optval;
3262
ac5a488e
SS
3263 set_fs(KERNEL_DS);
3264 if (level == SOL_SOCKET)
fb8621bb 3265 err = sock_setsockopt(sock, level, optname, uoptval, optlen);
ac5a488e 3266 else
fb8621bb 3267 err = sock->ops->setsockopt(sock, level, optname, uoptval,
ac5a488e
SS
3268 optlen);
3269 set_fs(oldfs);
3270 return err;
3271}
c6d409cf 3272EXPORT_SYMBOL(kernel_setsockopt);
ac5a488e
SS
3273
3274int kernel_sendpage(struct socket *sock, struct page *page, int offset,
3275 size_t size, int flags)
3276{
3277 if (sock->ops->sendpage)
3278 return sock->ops->sendpage(sock, page, offset, size, flags);
3279
3280 return sock_no_sendpage(sock, page, offset, size, flags);
3281}
c6d409cf 3282EXPORT_SYMBOL(kernel_sendpage);
ac5a488e 3283
306b13eb
TH
3284int kernel_sendpage_locked(struct sock *sk, struct page *page, int offset,
3285 size_t size, int flags)
3286{
3287 struct socket *sock = sk->sk_socket;
3288
3289 if (sock->ops->sendpage_locked)
3290 return sock->ops->sendpage_locked(sk, page, offset, size,
3291 flags);
3292
3293 return sock_no_sendpage_locked(sk, page, offset, size, flags);
3294}
3295EXPORT_SYMBOL(kernel_sendpage_locked);
3296
ac5a488e
SS
3297int kernel_sock_ioctl(struct socket *sock, int cmd, unsigned long arg)
3298{
3299 mm_segment_t oldfs = get_fs();
3300 int err;
3301
3302 set_fs(KERNEL_DS);
3303 err = sock->ops->ioctl(sock, cmd, arg);
3304 set_fs(oldfs);
3305
3306 return err;
3307}
c6d409cf 3308EXPORT_SYMBOL(kernel_sock_ioctl);
ac5a488e 3309
91cf45f0
TM
3310int kernel_sock_shutdown(struct socket *sock, enum sock_shutdown_cmd how)
3311{
3312 return sock->ops->shutdown(sock, how);
3313}
91cf45f0 3314EXPORT_SYMBOL(kernel_sock_shutdown);
113c3075
P
3315
3316/* This routine returns the IP overhead imposed by a socket i.e.
3317 * the length of the underlying IP header, depending on whether
3318 * this is an IPv4 or IPv6 socket and the length from IP options turned
57240d00 3319 * on at the socket. Assumes that the caller has a lock on the socket.
113c3075
P
3320 */
3321u32 kernel_sock_ip_overhead(struct sock *sk)
3322{
3323 struct inet_sock *inet;
3324 struct ip_options_rcu *opt;
3325 u32 overhead = 0;
113c3075
P
3326#if IS_ENABLED(CONFIG_IPV6)
3327 struct ipv6_pinfo *np;
3328 struct ipv6_txoptions *optv6 = NULL;
3329#endif /* IS_ENABLED(CONFIG_IPV6) */
3330
3331 if (!sk)
3332 return overhead;
3333
113c3075
P
3334 switch (sk->sk_family) {
3335 case AF_INET:
3336 inet = inet_sk(sk);
3337 overhead += sizeof(struct iphdr);
3338 opt = rcu_dereference_protected(inet->inet_opt,
614d79c0 3339 sock_owned_by_user(sk));
113c3075
P
3340 if (opt)
3341 overhead += opt->opt.optlen;
3342 return overhead;
3343#if IS_ENABLED(CONFIG_IPV6)
3344 case AF_INET6:
3345 np = inet6_sk(sk);
3346 overhead += sizeof(struct ipv6hdr);
3347 if (np)
3348 optv6 = rcu_dereference_protected(np->opt,
614d79c0 3349 sock_owned_by_user(sk));
113c3075
P
3350 if (optv6)
3351 overhead += (optv6->opt_flen + optv6->opt_nflen);
3352 return overhead;
3353#endif /* IS_ENABLED(CONFIG_IPV6) */
3354 default: /* Returns 0 overhead if the socket is not ipv4 or ipv6 */
3355 return overhead;
3356 }
3357}
3358EXPORT_SYMBOL(kernel_sock_ip_overhead);