xref: /openbmc/linux/net/socket.c (revision 20380731)
11da177e4SLinus Torvalds /*
21da177e4SLinus Torvalds  * NET		An implementation of the SOCKET network access protocol.
31da177e4SLinus Torvalds  *
41da177e4SLinus Torvalds  * Version:	@(#)socket.c	1.1.93	18/02/95
51da177e4SLinus Torvalds  *
61da177e4SLinus Torvalds  * Authors:	Orest Zborowski, <obz@Kodak.COM>
702c30a84SJesper Juhl  *		Ross Biro
81da177e4SLinus Torvalds  *		Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
91da177e4SLinus Torvalds  *
101da177e4SLinus Torvalds  * Fixes:
111da177e4SLinus Torvalds  *		Anonymous	:	NOTSOCK/BADF cleanup. Error fix in
121da177e4SLinus Torvalds  *					shutdown()
131da177e4SLinus Torvalds  *		Alan Cox	:	verify_area() fixes
141da177e4SLinus Torvalds  *		Alan Cox	:	Removed DDI
151da177e4SLinus Torvalds  *		Jonathan Kamens	:	SOCK_DGRAM reconnect bug
161da177e4SLinus Torvalds  *		Alan Cox	:	Moved a load of checks to the very
171da177e4SLinus Torvalds  *					top level.
181da177e4SLinus Torvalds  *		Alan Cox	:	Move address structures to/from user
191da177e4SLinus Torvalds  *					mode above the protocol layers.
201da177e4SLinus Torvalds  *		Rob Janssen	:	Allow 0 length sends.
211da177e4SLinus Torvalds  *		Alan Cox	:	Asynchronous I/O support (cribbed from the
221da177e4SLinus Torvalds  *					tty drivers).
231da177e4SLinus Torvalds  *		Niibe Yutaka	:	Asynchronous I/O for writes (4.4BSD style)
241da177e4SLinus Torvalds  *		Jeff Uphoff	:	Made max number of sockets command-line
251da177e4SLinus Torvalds  *					configurable.
261da177e4SLinus Torvalds  *		Matti Aarnio	:	Made the number of sockets dynamic,
271da177e4SLinus Torvalds  *					to be allocated when needed, and mr.
281da177e4SLinus Torvalds  *					Uphoff's max is used as max to be
291da177e4SLinus Torvalds  *					allowed to allocate.
301da177e4SLinus Torvalds  *		Linus		:	Argh. removed all the socket allocation
311da177e4SLinus Torvalds  *					altogether: it's in the inode now.
321da177e4SLinus Torvalds  *		Alan Cox	:	Made sock_alloc()/sock_release() public
331da177e4SLinus Torvalds  *					for NetROM and future kernel nfsd type
341da177e4SLinus Torvalds  *					stuff.
351da177e4SLinus Torvalds  *		Alan Cox	:	sendmsg/recvmsg basics.
361da177e4SLinus Torvalds  *		Tom Dyas	:	Export net symbols.
371da177e4SLinus Torvalds  *		Marcin Dalecki	:	Fixed problems with CONFIG_NET="n".
381da177e4SLinus Torvalds  *		Alan Cox	:	Added thread locking to sys_* calls
391da177e4SLinus Torvalds  *					for sockets. May have errors at the
401da177e4SLinus Torvalds  *					moment.
411da177e4SLinus Torvalds  *		Kevin Buhr	:	Fixed the dumb errors in the above.
421da177e4SLinus Torvalds  *		Andi Kleen	:	Some small cleanups, optimizations,
431da177e4SLinus Torvalds  *					and fixed a copy_from_user() bug.
441da177e4SLinus Torvalds  *		Tigran Aivazian	:	sys_send(args) calls sys_sendto(args, NULL, 0)
451da177e4SLinus Torvalds  *		Tigran Aivazian	:	Made listen(2) backlog sanity checks
461da177e4SLinus Torvalds  *					protocol-independent
471da177e4SLinus Torvalds  *
481da177e4SLinus Torvalds  *
491da177e4SLinus Torvalds  *		This program is free software; you can redistribute it and/or
501da177e4SLinus Torvalds  *		modify it under the terms of the GNU General Public License
511da177e4SLinus Torvalds  *		as published by the Free Software Foundation; either version
521da177e4SLinus Torvalds  *		2 of the License, or (at your option) any later version.
531da177e4SLinus Torvalds  *
541da177e4SLinus Torvalds  *
551da177e4SLinus Torvalds  *	This module is effectively the top level interface to the BSD socket
561da177e4SLinus Torvalds  *	paradigm.
571da177e4SLinus Torvalds  *
581da177e4SLinus Torvalds  *	Based upon Swansea University Computer Society NET3.039
591da177e4SLinus Torvalds  */
601da177e4SLinus Torvalds 
611da177e4SLinus Torvalds #include <linux/config.h>
621da177e4SLinus Torvalds #include <linux/mm.h>
631da177e4SLinus Torvalds #include <linux/smp_lock.h>
641da177e4SLinus Torvalds #include <linux/socket.h>
651da177e4SLinus Torvalds #include <linux/file.h>
661da177e4SLinus Torvalds #include <linux/net.h>
671da177e4SLinus Torvalds #include <linux/interrupt.h>
681da177e4SLinus Torvalds #include <linux/netdevice.h>
691da177e4SLinus Torvalds #include <linux/proc_fs.h>
701da177e4SLinus Torvalds #include <linux/seq_file.h>
711da177e4SLinus Torvalds #include <linux/wanrouter.h>
721da177e4SLinus Torvalds #include <linux/if_bridge.h>
73*20380731SArnaldo Carvalho de Melo #include <linux/if_frad.h>
74*20380731SArnaldo Carvalho de Melo #include <linux/if_vlan.h>
751da177e4SLinus Torvalds #include <linux/init.h>
761da177e4SLinus Torvalds #include <linux/poll.h>
771da177e4SLinus Torvalds #include <linux/cache.h>
781da177e4SLinus Torvalds #include <linux/module.h>
791da177e4SLinus Torvalds #include <linux/highmem.h>
801da177e4SLinus Torvalds #include <linux/divert.h>
811da177e4SLinus Torvalds #include <linux/mount.h>
821da177e4SLinus Torvalds #include <linux/security.h>
831da177e4SLinus Torvalds #include <linux/syscalls.h>
841da177e4SLinus Torvalds #include <linux/compat.h>
851da177e4SLinus Torvalds #include <linux/kmod.h>
863ec3b2fbSDavid Woodhouse #include <linux/audit.h>
871da177e4SLinus Torvalds 
881da177e4SLinus Torvalds #ifdef CONFIG_NET_RADIO
891da177e4SLinus Torvalds #include <linux/wireless.h>		/* Note : will define WIRELESS_EXT */
901da177e4SLinus Torvalds #endif	/* CONFIG_NET_RADIO */
911da177e4SLinus Torvalds 
921da177e4SLinus Torvalds #include <asm/uaccess.h>
931da177e4SLinus Torvalds #include <asm/unistd.h>
941da177e4SLinus Torvalds 
951da177e4SLinus Torvalds #include <net/compat.h>
961da177e4SLinus Torvalds 
971da177e4SLinus Torvalds #include <net/sock.h>
981da177e4SLinus Torvalds #include <linux/netfilter.h>
991da177e4SLinus Torvalds 
1001da177e4SLinus Torvalds static int sock_no_open(struct inode *irrelevant, struct file *dontcare);
1011da177e4SLinus Torvalds static ssize_t sock_aio_read(struct kiocb *iocb, char __user *buf,
1021da177e4SLinus Torvalds 			 size_t size, loff_t pos);
1031da177e4SLinus Torvalds static ssize_t sock_aio_write(struct kiocb *iocb, const char __user *buf,
1041da177e4SLinus Torvalds 			  size_t size, loff_t pos);
1051da177e4SLinus Torvalds static int sock_mmap(struct file *file, struct vm_area_struct * vma);
1061da177e4SLinus Torvalds 
1071da177e4SLinus Torvalds static int sock_close(struct inode *inode, struct file *file);
1081da177e4SLinus Torvalds static unsigned int sock_poll(struct file *file,
1091da177e4SLinus Torvalds 			      struct poll_table_struct *wait);
1101da177e4SLinus Torvalds static long sock_ioctl(struct file *file,
1111da177e4SLinus Torvalds 		      unsigned int cmd, unsigned long arg);
1121da177e4SLinus Torvalds static int sock_fasync(int fd, struct file *filp, int on);
1131da177e4SLinus Torvalds static ssize_t sock_readv(struct file *file, const struct iovec *vector,
1141da177e4SLinus Torvalds 			  unsigned long count, loff_t *ppos);
1151da177e4SLinus Torvalds static ssize_t sock_writev(struct file *file, const struct iovec *vector,
1161da177e4SLinus Torvalds 			  unsigned long count, loff_t *ppos);
1171da177e4SLinus Torvalds static ssize_t sock_sendpage(struct file *file, struct page *page,
1181da177e4SLinus Torvalds 			     int offset, size_t size, loff_t *ppos, int more);
1191da177e4SLinus Torvalds 
1201da177e4SLinus Torvalds 
1211da177e4SLinus Torvalds /*
1221da177e4SLinus Torvalds  *	Socket files have a set of 'special' operations as well as the generic file ones. These don't appear
1231da177e4SLinus Torvalds  *	in the operation structures but are done directly via the socketcall() multiplexor.
1241da177e4SLinus Torvalds  */
1251da177e4SLinus Torvalds 
1261da177e4SLinus Torvalds static struct file_operations socket_file_ops = {
1271da177e4SLinus Torvalds 	.owner =	THIS_MODULE,
1281da177e4SLinus Torvalds 	.llseek =	no_llseek,
1291da177e4SLinus Torvalds 	.aio_read =	sock_aio_read,
1301da177e4SLinus Torvalds 	.aio_write =	sock_aio_write,
1311da177e4SLinus Torvalds 	.poll =		sock_poll,
1321da177e4SLinus Torvalds 	.unlocked_ioctl = sock_ioctl,
1331da177e4SLinus Torvalds 	.mmap =		sock_mmap,
1341da177e4SLinus Torvalds 	.open =		sock_no_open,	/* special open code to disallow open via /proc */
1351da177e4SLinus Torvalds 	.release =	sock_close,
1361da177e4SLinus Torvalds 	.fasync =	sock_fasync,
1371da177e4SLinus Torvalds 	.readv =	sock_readv,
1381da177e4SLinus Torvalds 	.writev =	sock_writev,
1391da177e4SLinus Torvalds 	.sendpage =	sock_sendpage
1401da177e4SLinus Torvalds };
1411da177e4SLinus Torvalds 
1421da177e4SLinus Torvalds /*
1431da177e4SLinus Torvalds  *	The protocol list. Each protocol is registered in here.
1441da177e4SLinus Torvalds  */
1451da177e4SLinus Torvalds 
1461da177e4SLinus Torvalds static struct net_proto_family *net_families[NPROTO];
1471da177e4SLinus Torvalds 
1481da177e4SLinus Torvalds #if defined(CONFIG_SMP) || defined(CONFIG_PREEMPT)
1491da177e4SLinus Torvalds static atomic_t net_family_lockct = ATOMIC_INIT(0);
1501da177e4SLinus Torvalds static DEFINE_SPINLOCK(net_family_lock);
1511da177e4SLinus Torvalds 
1521da177e4SLinus Torvalds /* The strategy is: modifications net_family vector are short, do not
1531da177e4SLinus Torvalds    sleep and veeery rare, but read access should be free of any exclusive
1541da177e4SLinus Torvalds    locks.
1551da177e4SLinus Torvalds  */
1561da177e4SLinus Torvalds 
1571da177e4SLinus Torvalds static void net_family_write_lock(void)
1581da177e4SLinus Torvalds {
1591da177e4SLinus Torvalds 	spin_lock(&net_family_lock);
1601da177e4SLinus Torvalds 	while (atomic_read(&net_family_lockct) != 0) {
1611da177e4SLinus Torvalds 		spin_unlock(&net_family_lock);
1621da177e4SLinus Torvalds 
1631da177e4SLinus Torvalds 		yield();
1641da177e4SLinus Torvalds 
1651da177e4SLinus Torvalds 		spin_lock(&net_family_lock);
1661da177e4SLinus Torvalds 	}
1671da177e4SLinus Torvalds }
1681da177e4SLinus Torvalds 
1691da177e4SLinus Torvalds static __inline__ void net_family_write_unlock(void)
1701da177e4SLinus Torvalds {
1711da177e4SLinus Torvalds 	spin_unlock(&net_family_lock);
1721da177e4SLinus Torvalds }
1731da177e4SLinus Torvalds 
1741da177e4SLinus Torvalds static __inline__ void net_family_read_lock(void)
1751da177e4SLinus Torvalds {
1761da177e4SLinus Torvalds 	atomic_inc(&net_family_lockct);
1771da177e4SLinus Torvalds 	spin_unlock_wait(&net_family_lock);
1781da177e4SLinus Torvalds }
1791da177e4SLinus Torvalds 
1801da177e4SLinus Torvalds static __inline__ void net_family_read_unlock(void)
1811da177e4SLinus Torvalds {
1821da177e4SLinus Torvalds 	atomic_dec(&net_family_lockct);
1831da177e4SLinus Torvalds }
1841da177e4SLinus Torvalds 
1851da177e4SLinus Torvalds #else
1861da177e4SLinus Torvalds #define net_family_write_lock() do { } while(0)
1871da177e4SLinus Torvalds #define net_family_write_unlock() do { } while(0)
1881da177e4SLinus Torvalds #define net_family_read_lock() do { } while(0)
1891da177e4SLinus Torvalds #define net_family_read_unlock() do { } while(0)
1901da177e4SLinus Torvalds #endif
1911da177e4SLinus Torvalds 
1921da177e4SLinus Torvalds 
1931da177e4SLinus Torvalds /*
1941da177e4SLinus Torvalds  *	Statistics counters of the socket lists
1951da177e4SLinus Torvalds  */
1961da177e4SLinus Torvalds 
1971da177e4SLinus Torvalds static DEFINE_PER_CPU(int, sockets_in_use) = 0;
1981da177e4SLinus Torvalds 
1991da177e4SLinus Torvalds /*
2001da177e4SLinus Torvalds  *	Support routines. Move socket addresses back and forth across the kernel/user
2011da177e4SLinus Torvalds  *	divide and look after the messy bits.
2021da177e4SLinus Torvalds  */
2031da177e4SLinus Torvalds 
2041da177e4SLinus Torvalds #define MAX_SOCK_ADDR	128		/* 108 for Unix domain -
2051da177e4SLinus Torvalds 					   16 for IP, 16 for IPX,
2061da177e4SLinus Torvalds 					   24 for IPv6,
2071da177e4SLinus Torvalds 					   about 80 for AX.25
2081da177e4SLinus Torvalds 					   must be at least one bigger than
2091da177e4SLinus Torvalds 					   the AF_UNIX size (see net/unix/af_unix.c
2101da177e4SLinus Torvalds 					   :unix_mkname()).
2111da177e4SLinus Torvalds 					 */
2121da177e4SLinus Torvalds 
2131da177e4SLinus Torvalds /**
2141da177e4SLinus Torvalds  *	move_addr_to_kernel	-	copy a socket address into kernel space
2151da177e4SLinus Torvalds  *	@uaddr: Address in user space
2161da177e4SLinus Torvalds  *	@kaddr: Address in kernel space
2171da177e4SLinus Torvalds  *	@ulen: Length in user space
2181da177e4SLinus Torvalds  *
2191da177e4SLinus Torvalds  *	The address is copied into kernel space. If the provided address is
2201da177e4SLinus Torvalds  *	too long an error code of -EINVAL is returned. If the copy gives
2211da177e4SLinus Torvalds  *	invalid addresses -EFAULT is returned. On a success 0 is returned.
2221da177e4SLinus Torvalds  */
2231da177e4SLinus Torvalds 
2241da177e4SLinus Torvalds int move_addr_to_kernel(void __user *uaddr, int ulen, void *kaddr)
2251da177e4SLinus Torvalds {
2261da177e4SLinus Torvalds 	if(ulen<0||ulen>MAX_SOCK_ADDR)
2271da177e4SLinus Torvalds 		return -EINVAL;
2281da177e4SLinus Torvalds 	if(ulen==0)
2291da177e4SLinus Torvalds 		return 0;
2301da177e4SLinus Torvalds 	if(copy_from_user(kaddr,uaddr,ulen))
2311da177e4SLinus Torvalds 		return -EFAULT;
2323ec3b2fbSDavid Woodhouse 	return audit_sockaddr(ulen, kaddr);
2331da177e4SLinus Torvalds }
2341da177e4SLinus Torvalds 
2351da177e4SLinus Torvalds /**
2361da177e4SLinus Torvalds  *	move_addr_to_user	-	copy an address to user space
2371da177e4SLinus Torvalds  *	@kaddr: kernel space address
2381da177e4SLinus Torvalds  *	@klen: length of address in kernel
2391da177e4SLinus Torvalds  *	@uaddr: user space address
2401da177e4SLinus Torvalds  *	@ulen: pointer to user length field
2411da177e4SLinus Torvalds  *
2421da177e4SLinus Torvalds  *	The value pointed to by ulen on entry is the buffer length available.
2431da177e4SLinus Torvalds  *	This is overwritten with the buffer space used. -EINVAL is returned
2441da177e4SLinus Torvalds  *	if an overlong buffer is specified or a negative buffer size. -EFAULT
2451da177e4SLinus Torvalds  *	is returned if either the buffer or the length field are not
2461da177e4SLinus Torvalds  *	accessible.
2471da177e4SLinus Torvalds  *	After copying the data up to the limit the user specifies, the true
2481da177e4SLinus Torvalds  *	length of the data is written over the length limit the user
2491da177e4SLinus Torvalds  *	specified. Zero is returned for a success.
2501da177e4SLinus Torvalds  */
2511da177e4SLinus Torvalds 
2521da177e4SLinus Torvalds int move_addr_to_user(void *kaddr, int klen, void __user *uaddr, int __user *ulen)
2531da177e4SLinus Torvalds {
2541da177e4SLinus Torvalds 	int err;
2551da177e4SLinus Torvalds 	int len;
2561da177e4SLinus Torvalds 
2571da177e4SLinus Torvalds 	if((err=get_user(len, ulen)))
2581da177e4SLinus Torvalds 		return err;
2591da177e4SLinus Torvalds 	if(len>klen)
2601da177e4SLinus Torvalds 		len=klen;
2611da177e4SLinus Torvalds 	if(len<0 || len> MAX_SOCK_ADDR)
2621da177e4SLinus Torvalds 		return -EINVAL;
2631da177e4SLinus Torvalds 	if(len)
2641da177e4SLinus Torvalds 	{
2651da177e4SLinus Torvalds 		if(copy_to_user(uaddr,kaddr,len))
2661da177e4SLinus Torvalds 			return -EFAULT;
2671da177e4SLinus Torvalds 	}
2681da177e4SLinus Torvalds 	/*
2691da177e4SLinus Torvalds 	 *	"fromlen shall refer to the value before truncation.."
2701da177e4SLinus Torvalds 	 *			1003.1g
2711da177e4SLinus Torvalds 	 */
2721da177e4SLinus Torvalds 	return __put_user(klen, ulen);
2731da177e4SLinus Torvalds }
2741da177e4SLinus Torvalds 
2751da177e4SLinus Torvalds #define SOCKFS_MAGIC 0x534F434B
2761da177e4SLinus Torvalds 
2771da177e4SLinus Torvalds static kmem_cache_t * sock_inode_cachep;
2781da177e4SLinus Torvalds 
2791da177e4SLinus Torvalds static struct inode *sock_alloc_inode(struct super_block *sb)
2801da177e4SLinus Torvalds {
2811da177e4SLinus Torvalds 	struct socket_alloc *ei;
2821da177e4SLinus Torvalds 	ei = (struct socket_alloc *)kmem_cache_alloc(sock_inode_cachep, SLAB_KERNEL);
2831da177e4SLinus Torvalds 	if (!ei)
2841da177e4SLinus Torvalds 		return NULL;
2851da177e4SLinus Torvalds 	init_waitqueue_head(&ei->socket.wait);
2861da177e4SLinus Torvalds 
2871da177e4SLinus Torvalds 	ei->socket.fasync_list = NULL;
2881da177e4SLinus Torvalds 	ei->socket.state = SS_UNCONNECTED;
2891da177e4SLinus Torvalds 	ei->socket.flags = 0;
2901da177e4SLinus Torvalds 	ei->socket.ops = NULL;
2911da177e4SLinus Torvalds 	ei->socket.sk = NULL;
2921da177e4SLinus Torvalds 	ei->socket.file = NULL;
2931da177e4SLinus Torvalds 	ei->socket.flags = 0;
2941da177e4SLinus Torvalds 
2951da177e4SLinus Torvalds 	return &ei->vfs_inode;
2961da177e4SLinus Torvalds }
2971da177e4SLinus Torvalds 
2981da177e4SLinus Torvalds static void sock_destroy_inode(struct inode *inode)
2991da177e4SLinus Torvalds {
3001da177e4SLinus Torvalds 	kmem_cache_free(sock_inode_cachep,
3011da177e4SLinus Torvalds 			container_of(inode, struct socket_alloc, vfs_inode));
3021da177e4SLinus Torvalds }
3031da177e4SLinus Torvalds 
3041da177e4SLinus Torvalds static void init_once(void * foo, kmem_cache_t * cachep, unsigned long flags)
3051da177e4SLinus Torvalds {
3061da177e4SLinus Torvalds 	struct socket_alloc *ei = (struct socket_alloc *) foo;
3071da177e4SLinus Torvalds 
3081da177e4SLinus Torvalds 	if ((flags & (SLAB_CTOR_VERIFY|SLAB_CTOR_CONSTRUCTOR)) ==
3091da177e4SLinus Torvalds 	    SLAB_CTOR_CONSTRUCTOR)
3101da177e4SLinus Torvalds 		inode_init_once(&ei->vfs_inode);
3111da177e4SLinus Torvalds }
3121da177e4SLinus Torvalds 
3131da177e4SLinus Torvalds static int init_inodecache(void)
3141da177e4SLinus Torvalds {
3151da177e4SLinus Torvalds 	sock_inode_cachep = kmem_cache_create("sock_inode_cache",
3161da177e4SLinus Torvalds 				sizeof(struct socket_alloc),
3171da177e4SLinus Torvalds 				0, SLAB_HWCACHE_ALIGN|SLAB_RECLAIM_ACCOUNT,
3181da177e4SLinus Torvalds 				init_once, NULL);
3191da177e4SLinus Torvalds 	if (sock_inode_cachep == NULL)
3201da177e4SLinus Torvalds 		return -ENOMEM;
3211da177e4SLinus Torvalds 	return 0;
3221da177e4SLinus Torvalds }
3231da177e4SLinus Torvalds 
3241da177e4SLinus Torvalds static struct super_operations sockfs_ops = {
3251da177e4SLinus Torvalds 	.alloc_inode =	sock_alloc_inode,
3261da177e4SLinus Torvalds 	.destroy_inode =sock_destroy_inode,
3271da177e4SLinus Torvalds 	.statfs =	simple_statfs,
3281da177e4SLinus Torvalds };
3291da177e4SLinus Torvalds 
3301da177e4SLinus Torvalds static struct super_block *sockfs_get_sb(struct file_system_type *fs_type,
3311da177e4SLinus Torvalds 	int flags, const char *dev_name, void *data)
3321da177e4SLinus Torvalds {
3331da177e4SLinus Torvalds 	return get_sb_pseudo(fs_type, "socket:", &sockfs_ops, SOCKFS_MAGIC);
3341da177e4SLinus Torvalds }
3351da177e4SLinus Torvalds 
3361da177e4SLinus Torvalds static struct vfsmount *sock_mnt;
3371da177e4SLinus Torvalds 
3381da177e4SLinus Torvalds static struct file_system_type sock_fs_type = {
3391da177e4SLinus Torvalds 	.name =		"sockfs",
3401da177e4SLinus Torvalds 	.get_sb =	sockfs_get_sb,
3411da177e4SLinus Torvalds 	.kill_sb =	kill_anon_super,
3421da177e4SLinus Torvalds };
3431da177e4SLinus Torvalds static int sockfs_delete_dentry(struct dentry *dentry)
3441da177e4SLinus Torvalds {
3451da177e4SLinus Torvalds 	return 1;
3461da177e4SLinus Torvalds }
3471da177e4SLinus Torvalds static struct dentry_operations sockfs_dentry_operations = {
3481da177e4SLinus Torvalds 	.d_delete =	sockfs_delete_dentry,
3491da177e4SLinus Torvalds };
3501da177e4SLinus Torvalds 
3511da177e4SLinus Torvalds /*
3521da177e4SLinus Torvalds  *	Obtains the first available file descriptor and sets it up for use.
3531da177e4SLinus Torvalds  *
3541da177e4SLinus Torvalds  *	This function creates file structure and maps it to fd space
3551da177e4SLinus Torvalds  *	of current process. On success it returns file descriptor
3561da177e4SLinus Torvalds  *	and file struct implicitly stored in sock->file.
3571da177e4SLinus Torvalds  *	Note that another thread may close file descriptor before we return
3581da177e4SLinus Torvalds  *	from this function. We use the fact that now we do not refer
3591da177e4SLinus Torvalds  *	to socket after mapping. If one day we will need it, this
3601da177e4SLinus Torvalds  *	function will increment ref. count on file by 1.
3611da177e4SLinus Torvalds  *
3621da177e4SLinus Torvalds  *	In any case returned fd MAY BE not valid!
3631da177e4SLinus Torvalds  *	This race condition is unavoidable
3641da177e4SLinus Torvalds  *	with shared fd spaces, we cannot solve it inside kernel,
3651da177e4SLinus Torvalds  *	but we take care of internal coherence yet.
3661da177e4SLinus Torvalds  */
3671da177e4SLinus Torvalds 
3681da177e4SLinus Torvalds int sock_map_fd(struct socket *sock)
3691da177e4SLinus Torvalds {
3701da177e4SLinus Torvalds 	int fd;
3711da177e4SLinus Torvalds 	struct qstr this;
3721da177e4SLinus Torvalds 	char name[32];
3731da177e4SLinus Torvalds 
3741da177e4SLinus Torvalds 	/*
3751da177e4SLinus Torvalds 	 *	Find a file descriptor suitable for return to the user.
3761da177e4SLinus Torvalds 	 */
3771da177e4SLinus Torvalds 
3781da177e4SLinus Torvalds 	fd = get_unused_fd();
3791da177e4SLinus Torvalds 	if (fd >= 0) {
3801da177e4SLinus Torvalds 		struct file *file = get_empty_filp();
3811da177e4SLinus Torvalds 
3821da177e4SLinus Torvalds 		if (!file) {
3831da177e4SLinus Torvalds 			put_unused_fd(fd);
3841da177e4SLinus Torvalds 			fd = -ENFILE;
3851da177e4SLinus Torvalds 			goto out;
3861da177e4SLinus Torvalds 		}
3871da177e4SLinus Torvalds 
388f31f5f05SEric Dumazet 		this.len = sprintf(name, "[%lu]", SOCK_INODE(sock)->i_ino);
3891da177e4SLinus Torvalds 		this.name = name;
3901da177e4SLinus Torvalds 		this.hash = SOCK_INODE(sock)->i_ino;
3911da177e4SLinus Torvalds 
3921da177e4SLinus Torvalds 		file->f_dentry = d_alloc(sock_mnt->mnt_sb->s_root, &this);
3931da177e4SLinus Torvalds 		if (!file->f_dentry) {
3941da177e4SLinus Torvalds 			put_filp(file);
3951da177e4SLinus Torvalds 			put_unused_fd(fd);
3961da177e4SLinus Torvalds 			fd = -ENOMEM;
3971da177e4SLinus Torvalds 			goto out;
3981da177e4SLinus Torvalds 		}
3991da177e4SLinus Torvalds 		file->f_dentry->d_op = &sockfs_dentry_operations;
4001da177e4SLinus Torvalds 		d_add(file->f_dentry, SOCK_INODE(sock));
4011da177e4SLinus Torvalds 		file->f_vfsmnt = mntget(sock_mnt);
4021da177e4SLinus Torvalds 		file->f_mapping = file->f_dentry->d_inode->i_mapping;
4031da177e4SLinus Torvalds 
4041da177e4SLinus Torvalds 		sock->file = file;
4051da177e4SLinus Torvalds 		file->f_op = SOCK_INODE(sock)->i_fop = &socket_file_ops;
4061da177e4SLinus Torvalds 		file->f_mode = FMODE_READ | FMODE_WRITE;
4071da177e4SLinus Torvalds 		file->f_flags = O_RDWR;
4081da177e4SLinus Torvalds 		file->f_pos = 0;
40907dc3f07SBenjamin LaHaise 		file->private_data = sock;
4101da177e4SLinus Torvalds 		fd_install(fd, file);
4111da177e4SLinus Torvalds 	}
4121da177e4SLinus Torvalds 
4131da177e4SLinus Torvalds out:
4141da177e4SLinus Torvalds 	return fd;
4151da177e4SLinus Torvalds }
4161da177e4SLinus Torvalds 
4171da177e4SLinus Torvalds /**
4181da177e4SLinus Torvalds  *	sockfd_lookup	- 	Go from a file number to its socket slot
4191da177e4SLinus Torvalds  *	@fd: file handle
4201da177e4SLinus Torvalds  *	@err: pointer to an error code return
4211da177e4SLinus Torvalds  *
4221da177e4SLinus Torvalds  *	The file handle passed in is locked and the socket it is bound
4231da177e4SLinus Torvalds  *	too is returned. If an error occurs the err pointer is overwritten
4241da177e4SLinus Torvalds  *	with a negative errno code and NULL is returned. The function checks
4251da177e4SLinus Torvalds  *	for both invalid handles and passing a handle which is not a socket.
4261da177e4SLinus Torvalds  *
4271da177e4SLinus Torvalds  *	On a success the socket object pointer is returned.
4281da177e4SLinus Torvalds  */
4291da177e4SLinus Torvalds 
4301da177e4SLinus Torvalds struct socket *sockfd_lookup(int fd, int *err)
4311da177e4SLinus Torvalds {
4321da177e4SLinus Torvalds 	struct file *file;
4331da177e4SLinus Torvalds 	struct inode *inode;
4341da177e4SLinus Torvalds 	struct socket *sock;
4351da177e4SLinus Torvalds 
4361da177e4SLinus Torvalds 	if (!(file = fget(fd)))
4371da177e4SLinus Torvalds 	{
4381da177e4SLinus Torvalds 		*err = -EBADF;
4391da177e4SLinus Torvalds 		return NULL;
4401da177e4SLinus Torvalds 	}
4411da177e4SLinus Torvalds 
44207dc3f07SBenjamin LaHaise 	if (file->f_op == &socket_file_ops)
44307dc3f07SBenjamin LaHaise 		return file->private_data;	/* set in sock_map_fd */
44407dc3f07SBenjamin LaHaise 
4451da177e4SLinus Torvalds 	inode = file->f_dentry->d_inode;
4461da177e4SLinus Torvalds 	if (!S_ISSOCK(inode->i_mode)) {
4471da177e4SLinus Torvalds 		*err = -ENOTSOCK;
4481da177e4SLinus Torvalds 		fput(file);
4491da177e4SLinus Torvalds 		return NULL;
4501da177e4SLinus Torvalds 	}
4511da177e4SLinus Torvalds 
4521da177e4SLinus Torvalds 	sock = SOCKET_I(inode);
4531da177e4SLinus Torvalds 	if (sock->file != file) {
4541da177e4SLinus Torvalds 		printk(KERN_ERR "socki_lookup: socket file changed!\n");
4551da177e4SLinus Torvalds 		sock->file = file;
4561da177e4SLinus Torvalds 	}
4571da177e4SLinus Torvalds 	return sock;
4581da177e4SLinus Torvalds }
4591da177e4SLinus Torvalds 
4601da177e4SLinus Torvalds /**
4611da177e4SLinus Torvalds  *	sock_alloc	-	allocate a socket
4621da177e4SLinus Torvalds  *
4631da177e4SLinus Torvalds  *	Allocate a new inode and socket object. The two are bound together
4641da177e4SLinus Torvalds  *	and initialised. The socket is then returned. If we are out of inodes
4651da177e4SLinus Torvalds  *	NULL is returned.
4661da177e4SLinus Torvalds  */
4671da177e4SLinus Torvalds 
4681da177e4SLinus Torvalds static struct socket *sock_alloc(void)
4691da177e4SLinus Torvalds {
4701da177e4SLinus Torvalds 	struct inode * inode;
4711da177e4SLinus Torvalds 	struct socket * sock;
4721da177e4SLinus Torvalds 
4731da177e4SLinus Torvalds 	inode = new_inode(sock_mnt->mnt_sb);
4741da177e4SLinus Torvalds 	if (!inode)
4751da177e4SLinus Torvalds 		return NULL;
4761da177e4SLinus Torvalds 
4771da177e4SLinus Torvalds 	sock = SOCKET_I(inode);
4781da177e4SLinus Torvalds 
4791da177e4SLinus Torvalds 	inode->i_mode = S_IFSOCK|S_IRWXUGO;
4801da177e4SLinus Torvalds 	inode->i_uid = current->fsuid;
4811da177e4SLinus Torvalds 	inode->i_gid = current->fsgid;
4821da177e4SLinus Torvalds 
4831da177e4SLinus Torvalds 	get_cpu_var(sockets_in_use)++;
4841da177e4SLinus Torvalds 	put_cpu_var(sockets_in_use);
4851da177e4SLinus Torvalds 	return sock;
4861da177e4SLinus Torvalds }
4871da177e4SLinus Torvalds 
4881da177e4SLinus Torvalds /*
4891da177e4SLinus Torvalds  *	In theory you can't get an open on this inode, but /proc provides
4901da177e4SLinus Torvalds  *	a back door. Remember to keep it shut otherwise you'll let the
4911da177e4SLinus Torvalds  *	creepy crawlies in.
4921da177e4SLinus Torvalds  */
4931da177e4SLinus Torvalds 
4941da177e4SLinus Torvalds static int sock_no_open(struct inode *irrelevant, struct file *dontcare)
4951da177e4SLinus Torvalds {
4961da177e4SLinus Torvalds 	return -ENXIO;
4971da177e4SLinus Torvalds }
4981da177e4SLinus Torvalds 
4991da177e4SLinus Torvalds struct file_operations bad_sock_fops = {
5001da177e4SLinus Torvalds 	.owner = THIS_MODULE,
5011da177e4SLinus Torvalds 	.open = sock_no_open,
5021da177e4SLinus Torvalds };
5031da177e4SLinus Torvalds 
5041da177e4SLinus Torvalds /**
5051da177e4SLinus Torvalds  *	sock_release	-	close a socket
5061da177e4SLinus Torvalds  *	@sock: socket to close
5071da177e4SLinus Torvalds  *
5081da177e4SLinus Torvalds  *	The socket is released from the protocol stack if it has a release
5091da177e4SLinus Torvalds  *	callback, and the inode is then released if the socket is bound to
5101da177e4SLinus Torvalds  *	an inode not a file.
5111da177e4SLinus Torvalds  */
5121da177e4SLinus Torvalds 
5131da177e4SLinus Torvalds void sock_release(struct socket *sock)
5141da177e4SLinus Torvalds {
5151da177e4SLinus Torvalds 	if (sock->ops) {
5161da177e4SLinus Torvalds 		struct module *owner = sock->ops->owner;
5171da177e4SLinus Torvalds 
5181da177e4SLinus Torvalds 		sock->ops->release(sock);
5191da177e4SLinus Torvalds 		sock->ops = NULL;
5201da177e4SLinus Torvalds 		module_put(owner);
5211da177e4SLinus Torvalds 	}
5221da177e4SLinus Torvalds 
5231da177e4SLinus Torvalds 	if (sock->fasync_list)
5241da177e4SLinus Torvalds 		printk(KERN_ERR "sock_release: fasync list not empty!\n");
5251da177e4SLinus Torvalds 
5261da177e4SLinus Torvalds 	get_cpu_var(sockets_in_use)--;
5271da177e4SLinus Torvalds 	put_cpu_var(sockets_in_use);
5281da177e4SLinus Torvalds 	if (!sock->file) {
5291da177e4SLinus Torvalds 		iput(SOCK_INODE(sock));
5301da177e4SLinus Torvalds 		return;
5311da177e4SLinus Torvalds 	}
5321da177e4SLinus Torvalds 	sock->file=NULL;
5331da177e4SLinus Torvalds }
5341da177e4SLinus Torvalds 
5351da177e4SLinus Torvalds static inline int __sock_sendmsg(struct kiocb *iocb, struct socket *sock,
5361da177e4SLinus Torvalds 				 struct msghdr *msg, size_t size)
5371da177e4SLinus Torvalds {
5381da177e4SLinus Torvalds 	struct sock_iocb *si = kiocb_to_siocb(iocb);
5391da177e4SLinus Torvalds 	int err;
5401da177e4SLinus Torvalds 
5411da177e4SLinus Torvalds 	si->sock = sock;
5421da177e4SLinus Torvalds 	si->scm = NULL;
5431da177e4SLinus Torvalds 	si->msg = msg;
5441da177e4SLinus Torvalds 	si->size = size;
5451da177e4SLinus Torvalds 
5461da177e4SLinus Torvalds 	err = security_socket_sendmsg(sock, msg, size);
5471da177e4SLinus Torvalds 	if (err)
5481da177e4SLinus Torvalds 		return err;
5491da177e4SLinus Torvalds 
5501da177e4SLinus Torvalds 	return sock->ops->sendmsg(iocb, sock, msg, size);
5511da177e4SLinus Torvalds }
5521da177e4SLinus Torvalds 
5531da177e4SLinus Torvalds int sock_sendmsg(struct socket *sock, struct msghdr *msg, size_t size)
5541da177e4SLinus Torvalds {
5551da177e4SLinus Torvalds 	struct kiocb iocb;
5561da177e4SLinus Torvalds 	struct sock_iocb siocb;
5571da177e4SLinus Torvalds 	int ret;
5581da177e4SLinus Torvalds 
5591da177e4SLinus Torvalds 	init_sync_kiocb(&iocb, NULL);
5601da177e4SLinus Torvalds 	iocb.private = &siocb;
5611da177e4SLinus Torvalds 	ret = __sock_sendmsg(&iocb, sock, msg, size);
5621da177e4SLinus Torvalds 	if (-EIOCBQUEUED == ret)
5631da177e4SLinus Torvalds 		ret = wait_on_sync_kiocb(&iocb);
5641da177e4SLinus Torvalds 	return ret;
5651da177e4SLinus Torvalds }
5661da177e4SLinus Torvalds 
5671da177e4SLinus Torvalds int kernel_sendmsg(struct socket *sock, struct msghdr *msg,
5681da177e4SLinus Torvalds 		   struct kvec *vec, size_t num, size_t size)
5691da177e4SLinus Torvalds {
5701da177e4SLinus Torvalds 	mm_segment_t oldfs = get_fs();
5711da177e4SLinus Torvalds 	int result;
5721da177e4SLinus Torvalds 
5731da177e4SLinus Torvalds 	set_fs(KERNEL_DS);
5741da177e4SLinus Torvalds 	/*
5751da177e4SLinus Torvalds 	 * the following is safe, since for compiler definitions of kvec and
5761da177e4SLinus Torvalds 	 * iovec are identical, yielding the same in-core layout and alignment
5771da177e4SLinus Torvalds 	 */
5781da177e4SLinus Torvalds 	msg->msg_iov = (struct iovec *)vec,
5791da177e4SLinus Torvalds 	msg->msg_iovlen = num;
5801da177e4SLinus Torvalds 	result = sock_sendmsg(sock, msg, size);
5811da177e4SLinus Torvalds 	set_fs(oldfs);
5821da177e4SLinus Torvalds 	return result;
5831da177e4SLinus Torvalds }
5841da177e4SLinus Torvalds 
5851da177e4SLinus Torvalds static inline int __sock_recvmsg(struct kiocb *iocb, struct socket *sock,
5861da177e4SLinus Torvalds 				 struct msghdr *msg, size_t size, int flags)
5871da177e4SLinus Torvalds {
5881da177e4SLinus Torvalds 	int err;
5891da177e4SLinus Torvalds 	struct sock_iocb *si = kiocb_to_siocb(iocb);
5901da177e4SLinus Torvalds 
5911da177e4SLinus Torvalds 	si->sock = sock;
5921da177e4SLinus Torvalds 	si->scm = NULL;
5931da177e4SLinus Torvalds 	si->msg = msg;
5941da177e4SLinus Torvalds 	si->size = size;
5951da177e4SLinus Torvalds 	si->flags = flags;
5961da177e4SLinus Torvalds 
5971da177e4SLinus Torvalds 	err = security_socket_recvmsg(sock, msg, size, flags);
5981da177e4SLinus Torvalds 	if (err)
5991da177e4SLinus Torvalds 		return err;
6001da177e4SLinus Torvalds 
6011da177e4SLinus Torvalds 	return sock->ops->recvmsg(iocb, sock, msg, size, flags);
6021da177e4SLinus Torvalds }
6031da177e4SLinus Torvalds 
6041da177e4SLinus Torvalds int sock_recvmsg(struct socket *sock, struct msghdr *msg,
6051da177e4SLinus Torvalds 		 size_t size, int flags)
6061da177e4SLinus Torvalds {
6071da177e4SLinus Torvalds 	struct kiocb iocb;
6081da177e4SLinus Torvalds 	struct sock_iocb siocb;
6091da177e4SLinus Torvalds 	int ret;
6101da177e4SLinus Torvalds 
6111da177e4SLinus Torvalds         init_sync_kiocb(&iocb, NULL);
6121da177e4SLinus Torvalds 	iocb.private = &siocb;
6131da177e4SLinus Torvalds 	ret = __sock_recvmsg(&iocb, sock, msg, size, flags);
6141da177e4SLinus Torvalds 	if (-EIOCBQUEUED == ret)
6151da177e4SLinus Torvalds 		ret = wait_on_sync_kiocb(&iocb);
6161da177e4SLinus Torvalds 	return ret;
6171da177e4SLinus Torvalds }
6181da177e4SLinus Torvalds 
6191da177e4SLinus Torvalds int kernel_recvmsg(struct socket *sock, struct msghdr *msg,
6201da177e4SLinus Torvalds 		   struct kvec *vec, size_t num,
6211da177e4SLinus Torvalds 		   size_t size, int flags)
6221da177e4SLinus Torvalds {
6231da177e4SLinus Torvalds 	mm_segment_t oldfs = get_fs();
6241da177e4SLinus Torvalds 	int result;
6251da177e4SLinus Torvalds 
6261da177e4SLinus Torvalds 	set_fs(KERNEL_DS);
6271da177e4SLinus Torvalds 	/*
6281da177e4SLinus Torvalds 	 * the following is safe, since for compiler definitions of kvec and
6291da177e4SLinus Torvalds 	 * iovec are identical, yielding the same in-core layout and alignment
6301da177e4SLinus Torvalds 	 */
6311da177e4SLinus Torvalds 	msg->msg_iov = (struct iovec *)vec,
6321da177e4SLinus Torvalds 	msg->msg_iovlen = num;
6331da177e4SLinus Torvalds 	result = sock_recvmsg(sock, msg, size, flags);
6341da177e4SLinus Torvalds 	set_fs(oldfs);
6351da177e4SLinus Torvalds 	return result;
6361da177e4SLinus Torvalds }
6371da177e4SLinus Torvalds 
6381da177e4SLinus Torvalds static void sock_aio_dtor(struct kiocb *iocb)
6391da177e4SLinus Torvalds {
6401da177e4SLinus Torvalds 	kfree(iocb->private);
6411da177e4SLinus Torvalds }
6421da177e4SLinus Torvalds 
6431da177e4SLinus Torvalds /*
6441da177e4SLinus Torvalds  *	Read data from a socket. ubuf is a user mode pointer. We make sure the user
6451da177e4SLinus Torvalds  *	area ubuf...ubuf+size-1 is writable before asking the protocol.
6461da177e4SLinus Torvalds  */
6471da177e4SLinus Torvalds 
6481da177e4SLinus Torvalds static ssize_t sock_aio_read(struct kiocb *iocb, char __user *ubuf,
6491da177e4SLinus Torvalds 			 size_t size, loff_t pos)
6501da177e4SLinus Torvalds {
6511da177e4SLinus Torvalds 	struct sock_iocb *x, siocb;
6521da177e4SLinus Torvalds 	struct socket *sock;
6531da177e4SLinus Torvalds 	int flags;
6541da177e4SLinus Torvalds 
6551da177e4SLinus Torvalds 	if (pos != 0)
6561da177e4SLinus Torvalds 		return -ESPIPE;
6571da177e4SLinus Torvalds 	if (size==0)		/* Match SYS5 behaviour */
6581da177e4SLinus Torvalds 		return 0;
6591da177e4SLinus Torvalds 
6601da177e4SLinus Torvalds 	if (is_sync_kiocb(iocb))
6611da177e4SLinus Torvalds 		x = &siocb;
6621da177e4SLinus Torvalds 	else {
6631da177e4SLinus Torvalds 		x = kmalloc(sizeof(struct sock_iocb), GFP_KERNEL);
6641da177e4SLinus Torvalds 		if (!x)
6651da177e4SLinus Torvalds 			return -ENOMEM;
6661da177e4SLinus Torvalds 		iocb->ki_dtor = sock_aio_dtor;
6671da177e4SLinus Torvalds 	}
6681da177e4SLinus Torvalds 	iocb->private = x;
6691da177e4SLinus Torvalds 	x->kiocb = iocb;
6701da177e4SLinus Torvalds 	sock = SOCKET_I(iocb->ki_filp->f_dentry->d_inode);
6711da177e4SLinus Torvalds 
6721da177e4SLinus Torvalds 	x->async_msg.msg_name = NULL;
6731da177e4SLinus Torvalds 	x->async_msg.msg_namelen = 0;
6741da177e4SLinus Torvalds 	x->async_msg.msg_iov = &x->async_iov;
6751da177e4SLinus Torvalds 	x->async_msg.msg_iovlen = 1;
6761da177e4SLinus Torvalds 	x->async_msg.msg_control = NULL;
6771da177e4SLinus Torvalds 	x->async_msg.msg_controllen = 0;
6781da177e4SLinus Torvalds 	x->async_iov.iov_base = ubuf;
6791da177e4SLinus Torvalds 	x->async_iov.iov_len = size;
6801da177e4SLinus Torvalds 	flags = !(iocb->ki_filp->f_flags & O_NONBLOCK) ? 0 : MSG_DONTWAIT;
6811da177e4SLinus Torvalds 
6821da177e4SLinus Torvalds 	return __sock_recvmsg(iocb, sock, &x->async_msg, size, flags);
6831da177e4SLinus Torvalds }
6841da177e4SLinus Torvalds 
6851da177e4SLinus Torvalds 
6861da177e4SLinus Torvalds /*
6871da177e4SLinus Torvalds  *	Write data to a socket. We verify that the user area ubuf..ubuf+size-1
6881da177e4SLinus Torvalds  *	is readable by the user process.
6891da177e4SLinus Torvalds  */
6901da177e4SLinus Torvalds 
6911da177e4SLinus Torvalds static ssize_t sock_aio_write(struct kiocb *iocb, const char __user *ubuf,
6921da177e4SLinus Torvalds 			  size_t size, loff_t pos)
6931da177e4SLinus Torvalds {
6941da177e4SLinus Torvalds 	struct sock_iocb *x, siocb;
6951da177e4SLinus Torvalds 	struct socket *sock;
6961da177e4SLinus Torvalds 
6971da177e4SLinus Torvalds 	if (pos != 0)
6981da177e4SLinus Torvalds 		return -ESPIPE;
6991da177e4SLinus Torvalds 	if(size==0)		/* Match SYS5 behaviour */
7001da177e4SLinus Torvalds 		return 0;
7011da177e4SLinus Torvalds 
7021da177e4SLinus Torvalds 	if (is_sync_kiocb(iocb))
7031da177e4SLinus Torvalds 		x = &siocb;
7041da177e4SLinus Torvalds 	else {
7051da177e4SLinus Torvalds 		x = kmalloc(sizeof(struct sock_iocb), GFP_KERNEL);
7061da177e4SLinus Torvalds 		if (!x)
7071da177e4SLinus Torvalds 			return -ENOMEM;
7081da177e4SLinus Torvalds 		iocb->ki_dtor = sock_aio_dtor;
7091da177e4SLinus Torvalds 	}
7101da177e4SLinus Torvalds 	iocb->private = x;
7111da177e4SLinus Torvalds 	x->kiocb = iocb;
7121da177e4SLinus Torvalds 	sock = SOCKET_I(iocb->ki_filp->f_dentry->d_inode);
7131da177e4SLinus Torvalds 
7141da177e4SLinus Torvalds 	x->async_msg.msg_name = NULL;
7151da177e4SLinus Torvalds 	x->async_msg.msg_namelen = 0;
7161da177e4SLinus Torvalds 	x->async_msg.msg_iov = &x->async_iov;
7171da177e4SLinus Torvalds 	x->async_msg.msg_iovlen = 1;
7181da177e4SLinus Torvalds 	x->async_msg.msg_control = NULL;
7191da177e4SLinus Torvalds 	x->async_msg.msg_controllen = 0;
7201da177e4SLinus Torvalds 	x->async_msg.msg_flags = !(iocb->ki_filp->f_flags & O_NONBLOCK) ? 0 : MSG_DONTWAIT;
7211da177e4SLinus Torvalds 	if (sock->type == SOCK_SEQPACKET)
7221da177e4SLinus Torvalds 		x->async_msg.msg_flags |= MSG_EOR;
7231da177e4SLinus Torvalds 	x->async_iov.iov_base = (void __user *)ubuf;
7241da177e4SLinus Torvalds 	x->async_iov.iov_len = size;
7251da177e4SLinus Torvalds 
7261da177e4SLinus Torvalds 	return __sock_sendmsg(iocb, sock, &x->async_msg, size);
7271da177e4SLinus Torvalds }
7281da177e4SLinus Torvalds 
729*20380731SArnaldo Carvalho de Melo static ssize_t sock_sendpage(struct file *file, struct page *page,
7301da177e4SLinus Torvalds 			     int offset, size_t size, loff_t *ppos, int more)
7311da177e4SLinus Torvalds {
7321da177e4SLinus Torvalds 	struct socket *sock;
7331da177e4SLinus Torvalds 	int flags;
7341da177e4SLinus Torvalds 
7351da177e4SLinus Torvalds 	sock = SOCKET_I(file->f_dentry->d_inode);
7361da177e4SLinus Torvalds 
7371da177e4SLinus Torvalds 	flags = !(file->f_flags & O_NONBLOCK) ? 0 : MSG_DONTWAIT;
7381da177e4SLinus Torvalds 	if (more)
7391da177e4SLinus Torvalds 		flags |= MSG_MORE;
7401da177e4SLinus Torvalds 
7411da177e4SLinus Torvalds 	return sock->ops->sendpage(sock, page, offset, size, flags);
7421da177e4SLinus Torvalds }
7431da177e4SLinus Torvalds 
7441da177e4SLinus Torvalds static int sock_readv_writev(int type, struct inode * inode,
7451da177e4SLinus Torvalds 			     struct file * file, const struct iovec * iov,
7461da177e4SLinus Torvalds 			     long count, size_t size)
7471da177e4SLinus Torvalds {
7481da177e4SLinus Torvalds 	struct msghdr msg;
7491da177e4SLinus Torvalds 	struct socket *sock;
7501da177e4SLinus Torvalds 
7511da177e4SLinus Torvalds 	sock = SOCKET_I(inode);
7521da177e4SLinus Torvalds 
7531da177e4SLinus Torvalds 	msg.msg_name = NULL;
7541da177e4SLinus Torvalds 	msg.msg_namelen = 0;
7551da177e4SLinus Torvalds 	msg.msg_control = NULL;
7561da177e4SLinus Torvalds 	msg.msg_controllen = 0;
7571da177e4SLinus Torvalds 	msg.msg_iov = (struct iovec *) iov;
7581da177e4SLinus Torvalds 	msg.msg_iovlen = count;
7591da177e4SLinus Torvalds 	msg.msg_flags = (file->f_flags & O_NONBLOCK) ? MSG_DONTWAIT : 0;
7601da177e4SLinus Torvalds 
7611da177e4SLinus Torvalds 	/* read() does a VERIFY_WRITE */
7621da177e4SLinus Torvalds 	if (type == VERIFY_WRITE)
7631da177e4SLinus Torvalds 		return sock_recvmsg(sock, &msg, size, msg.msg_flags);
7641da177e4SLinus Torvalds 
7651da177e4SLinus Torvalds 	if (sock->type == SOCK_SEQPACKET)
7661da177e4SLinus Torvalds 		msg.msg_flags |= MSG_EOR;
7671da177e4SLinus Torvalds 
7681da177e4SLinus Torvalds 	return sock_sendmsg(sock, &msg, size);
7691da177e4SLinus Torvalds }
7701da177e4SLinus Torvalds 
7711da177e4SLinus Torvalds static ssize_t sock_readv(struct file *file, const struct iovec *vector,
7721da177e4SLinus Torvalds 			  unsigned long count, loff_t *ppos)
7731da177e4SLinus Torvalds {
7741da177e4SLinus Torvalds 	size_t tot_len = 0;
7751da177e4SLinus Torvalds 	int i;
7761da177e4SLinus Torvalds         for (i = 0 ; i < count ; i++)
7771da177e4SLinus Torvalds                 tot_len += vector[i].iov_len;
7781da177e4SLinus Torvalds 	return sock_readv_writev(VERIFY_WRITE, file->f_dentry->d_inode,
7791da177e4SLinus Torvalds 				 file, vector, count, tot_len);
7801da177e4SLinus Torvalds }
7811da177e4SLinus Torvalds 
7821da177e4SLinus Torvalds static ssize_t sock_writev(struct file *file, const struct iovec *vector,
7831da177e4SLinus Torvalds 			   unsigned long count, loff_t *ppos)
7841da177e4SLinus Torvalds {
7851da177e4SLinus Torvalds 	size_t tot_len = 0;
7861da177e4SLinus Torvalds 	int i;
7871da177e4SLinus Torvalds         for (i = 0 ; i < count ; i++)
7881da177e4SLinus Torvalds                 tot_len += vector[i].iov_len;
7891da177e4SLinus Torvalds 	return sock_readv_writev(VERIFY_READ, file->f_dentry->d_inode,
7901da177e4SLinus Torvalds 				 file, vector, count, tot_len);
7911da177e4SLinus Torvalds }
7921da177e4SLinus Torvalds 
7931da177e4SLinus Torvalds 
7941da177e4SLinus Torvalds /*
7951da177e4SLinus Torvalds  * Atomic setting of ioctl hooks to avoid race
7961da177e4SLinus Torvalds  * with module unload.
7971da177e4SLinus Torvalds  */
7981da177e4SLinus Torvalds 
7991da177e4SLinus Torvalds static DECLARE_MUTEX(br_ioctl_mutex);
8001da177e4SLinus Torvalds static int (*br_ioctl_hook)(unsigned int cmd, void __user *arg) = NULL;
8011da177e4SLinus Torvalds 
8021da177e4SLinus Torvalds void brioctl_set(int (*hook)(unsigned int, void __user *))
8031da177e4SLinus Torvalds {
8041da177e4SLinus Torvalds 	down(&br_ioctl_mutex);
8051da177e4SLinus Torvalds 	br_ioctl_hook = hook;
8061da177e4SLinus Torvalds 	up(&br_ioctl_mutex);
8071da177e4SLinus Torvalds }
8081da177e4SLinus Torvalds EXPORT_SYMBOL(brioctl_set);
8091da177e4SLinus Torvalds 
8101da177e4SLinus Torvalds static DECLARE_MUTEX(vlan_ioctl_mutex);
8111da177e4SLinus Torvalds static int (*vlan_ioctl_hook)(void __user *arg);
8121da177e4SLinus Torvalds 
8131da177e4SLinus Torvalds void vlan_ioctl_set(int (*hook)(void __user *))
8141da177e4SLinus Torvalds {
8151da177e4SLinus Torvalds 	down(&vlan_ioctl_mutex);
8161da177e4SLinus Torvalds 	vlan_ioctl_hook = hook;
8171da177e4SLinus Torvalds 	up(&vlan_ioctl_mutex);
8181da177e4SLinus Torvalds }
8191da177e4SLinus Torvalds EXPORT_SYMBOL(vlan_ioctl_set);
8201da177e4SLinus Torvalds 
8211da177e4SLinus Torvalds static DECLARE_MUTEX(dlci_ioctl_mutex);
8221da177e4SLinus Torvalds static int (*dlci_ioctl_hook)(unsigned int, void __user *);
8231da177e4SLinus Torvalds 
8241da177e4SLinus Torvalds void dlci_ioctl_set(int (*hook)(unsigned int, void __user *))
8251da177e4SLinus Torvalds {
8261da177e4SLinus Torvalds 	down(&dlci_ioctl_mutex);
8271da177e4SLinus Torvalds 	dlci_ioctl_hook = hook;
8281da177e4SLinus Torvalds 	up(&dlci_ioctl_mutex);
8291da177e4SLinus Torvalds }
8301da177e4SLinus Torvalds EXPORT_SYMBOL(dlci_ioctl_set);
8311da177e4SLinus Torvalds 
8321da177e4SLinus Torvalds /*
8331da177e4SLinus Torvalds  *	With an ioctl, arg may well be a user mode pointer, but we don't know
8341da177e4SLinus Torvalds  *	what to do with it - that's up to the protocol still.
8351da177e4SLinus Torvalds  */
8361da177e4SLinus Torvalds 
8371da177e4SLinus Torvalds static long sock_ioctl(struct file *file, unsigned cmd, unsigned long arg)
8381da177e4SLinus Torvalds {
8391da177e4SLinus Torvalds 	struct socket *sock;
8401da177e4SLinus Torvalds 	void __user *argp = (void __user *)arg;
8411da177e4SLinus Torvalds 	int pid, err;
8421da177e4SLinus Torvalds 
8431da177e4SLinus Torvalds 	sock = SOCKET_I(file->f_dentry->d_inode);
8441da177e4SLinus Torvalds 	if (cmd >= SIOCDEVPRIVATE && cmd <= (SIOCDEVPRIVATE + 15)) {
8451da177e4SLinus Torvalds 		err = dev_ioctl(cmd, argp);
8461da177e4SLinus Torvalds 	} else
8471da177e4SLinus Torvalds #ifdef WIRELESS_EXT
8481da177e4SLinus Torvalds 	if (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST) {
8491da177e4SLinus Torvalds 		err = dev_ioctl(cmd, argp);
8501da177e4SLinus Torvalds 	} else
8511da177e4SLinus Torvalds #endif	/* WIRELESS_EXT */
8521da177e4SLinus Torvalds 	switch (cmd) {
8531da177e4SLinus Torvalds 		case FIOSETOWN:
8541da177e4SLinus Torvalds 		case SIOCSPGRP:
8551da177e4SLinus Torvalds 			err = -EFAULT;
8561da177e4SLinus Torvalds 			if (get_user(pid, (int __user *)argp))
8571da177e4SLinus Torvalds 				break;
8581da177e4SLinus Torvalds 			err = f_setown(sock->file, pid, 1);
8591da177e4SLinus Torvalds 			break;
8601da177e4SLinus Torvalds 		case FIOGETOWN:
8611da177e4SLinus Torvalds 		case SIOCGPGRP:
8621da177e4SLinus Torvalds 			err = put_user(sock->file->f_owner.pid, (int __user *)argp);
8631da177e4SLinus Torvalds 			break;
8641da177e4SLinus Torvalds 		case SIOCGIFBR:
8651da177e4SLinus Torvalds 		case SIOCSIFBR:
8661da177e4SLinus Torvalds 		case SIOCBRADDBR:
8671da177e4SLinus Torvalds 		case SIOCBRDELBR:
8681da177e4SLinus Torvalds 			err = -ENOPKG;
8691da177e4SLinus Torvalds 			if (!br_ioctl_hook)
8701da177e4SLinus Torvalds 				request_module("bridge");
8711da177e4SLinus Torvalds 
8721da177e4SLinus Torvalds 			down(&br_ioctl_mutex);
8731da177e4SLinus Torvalds 			if (br_ioctl_hook)
8741da177e4SLinus Torvalds 				err = br_ioctl_hook(cmd, argp);
8751da177e4SLinus Torvalds 			up(&br_ioctl_mutex);
8761da177e4SLinus Torvalds 			break;
8771da177e4SLinus Torvalds 		case SIOCGIFVLAN:
8781da177e4SLinus Torvalds 		case SIOCSIFVLAN:
8791da177e4SLinus Torvalds 			err = -ENOPKG;
8801da177e4SLinus Torvalds 			if (!vlan_ioctl_hook)
8811da177e4SLinus Torvalds 				request_module("8021q");
8821da177e4SLinus Torvalds 
8831da177e4SLinus Torvalds 			down(&vlan_ioctl_mutex);
8841da177e4SLinus Torvalds 			if (vlan_ioctl_hook)
8851da177e4SLinus Torvalds 				err = vlan_ioctl_hook(argp);
8861da177e4SLinus Torvalds 			up(&vlan_ioctl_mutex);
8871da177e4SLinus Torvalds 			break;
8881da177e4SLinus Torvalds 		case SIOCGIFDIVERT:
8891da177e4SLinus Torvalds 		case SIOCSIFDIVERT:
8901da177e4SLinus Torvalds 		/* Convert this to call through a hook */
8911da177e4SLinus Torvalds 			err = divert_ioctl(cmd, argp);
8921da177e4SLinus Torvalds 			break;
8931da177e4SLinus Torvalds 		case SIOCADDDLCI:
8941da177e4SLinus Torvalds 		case SIOCDELDLCI:
8951da177e4SLinus Torvalds 			err = -ENOPKG;
8961da177e4SLinus Torvalds 			if (!dlci_ioctl_hook)
8971da177e4SLinus Torvalds 				request_module("dlci");
8981da177e4SLinus Torvalds 
8991da177e4SLinus Torvalds 			if (dlci_ioctl_hook) {
9001da177e4SLinus Torvalds 				down(&dlci_ioctl_mutex);
9011da177e4SLinus Torvalds 				err = dlci_ioctl_hook(cmd, argp);
9021da177e4SLinus Torvalds 				up(&dlci_ioctl_mutex);
9031da177e4SLinus Torvalds 			}
9041da177e4SLinus Torvalds 			break;
9051da177e4SLinus Torvalds 		default:
9061da177e4SLinus Torvalds 			err = sock->ops->ioctl(sock, cmd, arg);
9071da177e4SLinus Torvalds 			break;
9081da177e4SLinus Torvalds 	}
9091da177e4SLinus Torvalds 	return err;
9101da177e4SLinus Torvalds }
9111da177e4SLinus Torvalds 
9121da177e4SLinus Torvalds int sock_create_lite(int family, int type, int protocol, struct socket **res)
9131da177e4SLinus Torvalds {
9141da177e4SLinus Torvalds 	int err;
9151da177e4SLinus Torvalds 	struct socket *sock = NULL;
9161da177e4SLinus Torvalds 
9171da177e4SLinus Torvalds 	err = security_socket_create(family, type, protocol, 1);
9181da177e4SLinus Torvalds 	if (err)
9191da177e4SLinus Torvalds 		goto out;
9201da177e4SLinus Torvalds 
9211da177e4SLinus Torvalds 	sock = sock_alloc();
9221da177e4SLinus Torvalds 	if (!sock) {
9231da177e4SLinus Torvalds 		err = -ENOMEM;
9241da177e4SLinus Torvalds 		goto out;
9251da177e4SLinus Torvalds 	}
9261da177e4SLinus Torvalds 
9271da177e4SLinus Torvalds 	security_socket_post_create(sock, family, type, protocol, 1);
9281da177e4SLinus Torvalds 	sock->type = type;
9291da177e4SLinus Torvalds out:
9301da177e4SLinus Torvalds 	*res = sock;
9311da177e4SLinus Torvalds 	return err;
9321da177e4SLinus Torvalds }
9331da177e4SLinus Torvalds 
9341da177e4SLinus Torvalds /* No kernel lock held - perfect */
9351da177e4SLinus Torvalds static unsigned int sock_poll(struct file *file, poll_table * wait)
9361da177e4SLinus Torvalds {
9371da177e4SLinus Torvalds 	struct socket *sock;
9381da177e4SLinus Torvalds 
9391da177e4SLinus Torvalds 	/*
9401da177e4SLinus Torvalds 	 *	We can't return errors to poll, so it's either yes or no.
9411da177e4SLinus Torvalds 	 */
9421da177e4SLinus Torvalds 	sock = SOCKET_I(file->f_dentry->d_inode);
9431da177e4SLinus Torvalds 	return sock->ops->poll(file, sock, wait);
9441da177e4SLinus Torvalds }
9451da177e4SLinus Torvalds 
9461da177e4SLinus Torvalds static int sock_mmap(struct file * file, struct vm_area_struct * vma)
9471da177e4SLinus Torvalds {
9481da177e4SLinus Torvalds 	struct socket *sock = SOCKET_I(file->f_dentry->d_inode);
9491da177e4SLinus Torvalds 
9501da177e4SLinus Torvalds 	return sock->ops->mmap(file, sock, vma);
9511da177e4SLinus Torvalds }
9521da177e4SLinus Torvalds 
953*20380731SArnaldo Carvalho de Melo static int sock_close(struct inode *inode, struct file *filp)
9541da177e4SLinus Torvalds {
9551da177e4SLinus Torvalds 	/*
9561da177e4SLinus Torvalds 	 *	It was possible the inode is NULL we were
9571da177e4SLinus Torvalds 	 *	closing an unfinished socket.
9581da177e4SLinus Torvalds 	 */
9591da177e4SLinus Torvalds 
9601da177e4SLinus Torvalds 	if (!inode)
9611da177e4SLinus Torvalds 	{
9621da177e4SLinus Torvalds 		printk(KERN_DEBUG "sock_close: NULL inode\n");
9631da177e4SLinus Torvalds 		return 0;
9641da177e4SLinus Torvalds 	}
9651da177e4SLinus Torvalds 	sock_fasync(-1, filp, 0);
9661da177e4SLinus Torvalds 	sock_release(SOCKET_I(inode));
9671da177e4SLinus Torvalds 	return 0;
9681da177e4SLinus Torvalds }
9691da177e4SLinus Torvalds 
9701da177e4SLinus Torvalds /*
9711da177e4SLinus Torvalds  *	Update the socket async list
9721da177e4SLinus Torvalds  *
9731da177e4SLinus Torvalds  *	Fasync_list locking strategy.
9741da177e4SLinus Torvalds  *
9751da177e4SLinus Torvalds  *	1. fasync_list is modified only under process context socket lock
9761da177e4SLinus Torvalds  *	   i.e. under semaphore.
9771da177e4SLinus Torvalds  *	2. fasync_list is used under read_lock(&sk->sk_callback_lock)
9781da177e4SLinus Torvalds  *	   or under socket lock.
9791da177e4SLinus Torvalds  *	3. fasync_list can be used from softirq context, so that
9801da177e4SLinus Torvalds  *	   modification under socket lock have to be enhanced with
9811da177e4SLinus Torvalds  *	   write_lock_bh(&sk->sk_callback_lock).
9821da177e4SLinus Torvalds  *							--ANK (990710)
9831da177e4SLinus Torvalds  */
9841da177e4SLinus Torvalds 
9851da177e4SLinus Torvalds static int sock_fasync(int fd, struct file *filp, int on)
9861da177e4SLinus Torvalds {
9871da177e4SLinus Torvalds 	struct fasync_struct *fa, *fna=NULL, **prev;
9881da177e4SLinus Torvalds 	struct socket *sock;
9891da177e4SLinus Torvalds 	struct sock *sk;
9901da177e4SLinus Torvalds 
9911da177e4SLinus Torvalds 	if (on)
9921da177e4SLinus Torvalds 	{
9931da177e4SLinus Torvalds 		fna=(struct fasync_struct *)kmalloc(sizeof(struct fasync_struct), GFP_KERNEL);
9941da177e4SLinus Torvalds 		if(fna==NULL)
9951da177e4SLinus Torvalds 			return -ENOMEM;
9961da177e4SLinus Torvalds 	}
9971da177e4SLinus Torvalds 
9981da177e4SLinus Torvalds 	sock = SOCKET_I(filp->f_dentry->d_inode);
9991da177e4SLinus Torvalds 
10001da177e4SLinus Torvalds 	if ((sk=sock->sk) == NULL) {
10011da177e4SLinus Torvalds 		kfree(fna);
10021da177e4SLinus Torvalds 		return -EINVAL;
10031da177e4SLinus Torvalds 	}
10041da177e4SLinus Torvalds 
10051da177e4SLinus Torvalds 	lock_sock(sk);
10061da177e4SLinus Torvalds 
10071da177e4SLinus Torvalds 	prev=&(sock->fasync_list);
10081da177e4SLinus Torvalds 
10091da177e4SLinus Torvalds 	for (fa=*prev; fa!=NULL; prev=&fa->fa_next,fa=*prev)
10101da177e4SLinus Torvalds 		if (fa->fa_file==filp)
10111da177e4SLinus Torvalds 			break;
10121da177e4SLinus Torvalds 
10131da177e4SLinus Torvalds 	if(on)
10141da177e4SLinus Torvalds 	{
10151da177e4SLinus Torvalds 		if(fa!=NULL)
10161da177e4SLinus Torvalds 		{
10171da177e4SLinus Torvalds 			write_lock_bh(&sk->sk_callback_lock);
10181da177e4SLinus Torvalds 			fa->fa_fd=fd;
10191da177e4SLinus Torvalds 			write_unlock_bh(&sk->sk_callback_lock);
10201da177e4SLinus Torvalds 
10211da177e4SLinus Torvalds 			kfree(fna);
10221da177e4SLinus Torvalds 			goto out;
10231da177e4SLinus Torvalds 		}
10241da177e4SLinus Torvalds 		fna->fa_file=filp;
10251da177e4SLinus Torvalds 		fna->fa_fd=fd;
10261da177e4SLinus Torvalds 		fna->magic=FASYNC_MAGIC;
10271da177e4SLinus Torvalds 		fna->fa_next=sock->fasync_list;
10281da177e4SLinus Torvalds 		write_lock_bh(&sk->sk_callback_lock);
10291da177e4SLinus Torvalds 		sock->fasync_list=fna;
10301da177e4SLinus Torvalds 		write_unlock_bh(&sk->sk_callback_lock);
10311da177e4SLinus Torvalds 	}
10321da177e4SLinus Torvalds 	else
10331da177e4SLinus Torvalds 	{
10341da177e4SLinus Torvalds 		if (fa!=NULL)
10351da177e4SLinus Torvalds 		{
10361da177e4SLinus Torvalds 			write_lock_bh(&sk->sk_callback_lock);
10371da177e4SLinus Torvalds 			*prev=fa->fa_next;
10381da177e4SLinus Torvalds 			write_unlock_bh(&sk->sk_callback_lock);
10391da177e4SLinus Torvalds 			kfree(fa);
10401da177e4SLinus Torvalds 		}
10411da177e4SLinus Torvalds 	}
10421da177e4SLinus Torvalds 
10431da177e4SLinus Torvalds out:
10441da177e4SLinus Torvalds 	release_sock(sock->sk);
10451da177e4SLinus Torvalds 	return 0;
10461da177e4SLinus Torvalds }
10471da177e4SLinus Torvalds 
10481da177e4SLinus Torvalds /* This function may be called only under socket lock or callback_lock */
10491da177e4SLinus Torvalds 
10501da177e4SLinus Torvalds int sock_wake_async(struct socket *sock, int how, int band)
10511da177e4SLinus Torvalds {
10521da177e4SLinus Torvalds 	if (!sock || !sock->fasync_list)
10531da177e4SLinus Torvalds 		return -1;
10541da177e4SLinus Torvalds 	switch (how)
10551da177e4SLinus Torvalds 	{
10561da177e4SLinus Torvalds 	case 1:
10571da177e4SLinus Torvalds 
10581da177e4SLinus Torvalds 		if (test_bit(SOCK_ASYNC_WAITDATA, &sock->flags))
10591da177e4SLinus Torvalds 			break;
10601da177e4SLinus Torvalds 		goto call_kill;
10611da177e4SLinus Torvalds 	case 2:
10621da177e4SLinus Torvalds 		if (!test_and_clear_bit(SOCK_ASYNC_NOSPACE, &sock->flags))
10631da177e4SLinus Torvalds 			break;
10641da177e4SLinus Torvalds 		/* fall through */
10651da177e4SLinus Torvalds 	case 0:
10661da177e4SLinus Torvalds 	call_kill:
10671da177e4SLinus Torvalds 		__kill_fasync(sock->fasync_list, SIGIO, band);
10681da177e4SLinus Torvalds 		break;
10691da177e4SLinus Torvalds 	case 3:
10701da177e4SLinus Torvalds 		__kill_fasync(sock->fasync_list, SIGURG, band);
10711da177e4SLinus Torvalds 	}
10721da177e4SLinus Torvalds 	return 0;
10731da177e4SLinus Torvalds }
10741da177e4SLinus Torvalds 
10751da177e4SLinus Torvalds static int __sock_create(int family, int type, int protocol, struct socket **res, int kern)
10761da177e4SLinus Torvalds {
10771da177e4SLinus Torvalds 	int err;
10781da177e4SLinus Torvalds 	struct socket *sock;
10791da177e4SLinus Torvalds 
10801da177e4SLinus Torvalds 	/*
10811da177e4SLinus Torvalds 	 *	Check protocol is in range
10821da177e4SLinus Torvalds 	 */
10831da177e4SLinus Torvalds 	if (family < 0 || family >= NPROTO)
10841da177e4SLinus Torvalds 		return -EAFNOSUPPORT;
10851da177e4SLinus Torvalds 	if (type < 0 || type >= SOCK_MAX)
10861da177e4SLinus Torvalds 		return -EINVAL;
10871da177e4SLinus Torvalds 
10881da177e4SLinus Torvalds 	/* Compatibility.
10891da177e4SLinus Torvalds 
10901da177e4SLinus Torvalds 	   This uglymoron is moved from INET layer to here to avoid
10911da177e4SLinus Torvalds 	   deadlock in module load.
10921da177e4SLinus Torvalds 	 */
10931da177e4SLinus Torvalds 	if (family == PF_INET && type == SOCK_PACKET) {
10941da177e4SLinus Torvalds 		static int warned;
10951da177e4SLinus Torvalds 		if (!warned) {
10961da177e4SLinus Torvalds 			warned = 1;
10971da177e4SLinus Torvalds 			printk(KERN_INFO "%s uses obsolete (PF_INET,SOCK_PACKET)\n", current->comm);
10981da177e4SLinus Torvalds 		}
10991da177e4SLinus Torvalds 		family = PF_PACKET;
11001da177e4SLinus Torvalds 	}
11011da177e4SLinus Torvalds 
11021da177e4SLinus Torvalds 	err = security_socket_create(family, type, protocol, kern);
11031da177e4SLinus Torvalds 	if (err)
11041da177e4SLinus Torvalds 		return err;
11051da177e4SLinus Torvalds 
11061da177e4SLinus Torvalds #if defined(CONFIG_KMOD)
11071da177e4SLinus Torvalds 	/* Attempt to load a protocol module if the find failed.
11081da177e4SLinus Torvalds 	 *
11091da177e4SLinus Torvalds 	 * 12/09/1996 Marcin: But! this makes REALLY only sense, if the user
11101da177e4SLinus Torvalds 	 * requested real, full-featured networking support upon configuration.
11111da177e4SLinus Torvalds 	 * Otherwise module support will break!
11121da177e4SLinus Torvalds 	 */
11131da177e4SLinus Torvalds 	if (net_families[family]==NULL)
11141da177e4SLinus Torvalds 	{
11151da177e4SLinus Torvalds 		request_module("net-pf-%d",family);
11161da177e4SLinus Torvalds 	}
11171da177e4SLinus Torvalds #endif
11181da177e4SLinus Torvalds 
11191da177e4SLinus Torvalds 	net_family_read_lock();
11201da177e4SLinus Torvalds 	if (net_families[family] == NULL) {
11211da177e4SLinus Torvalds 		err = -EAFNOSUPPORT;
11221da177e4SLinus Torvalds 		goto out;
11231da177e4SLinus Torvalds 	}
11241da177e4SLinus Torvalds 
11251da177e4SLinus Torvalds /*
11261da177e4SLinus Torvalds  *	Allocate the socket and allow the family to set things up. if
11271da177e4SLinus Torvalds  *	the protocol is 0, the family is instructed to select an appropriate
11281da177e4SLinus Torvalds  *	default.
11291da177e4SLinus Torvalds  */
11301da177e4SLinus Torvalds 
11311da177e4SLinus Torvalds 	if (!(sock = sock_alloc())) {
11321da177e4SLinus Torvalds 		printk(KERN_WARNING "socket: no more sockets\n");
11331da177e4SLinus Torvalds 		err = -ENFILE;		/* Not exactly a match, but its the
11341da177e4SLinus Torvalds 					   closest posix thing */
11351da177e4SLinus Torvalds 		goto out;
11361da177e4SLinus Torvalds 	}
11371da177e4SLinus Torvalds 
11381da177e4SLinus Torvalds 	sock->type  = type;
11391da177e4SLinus Torvalds 
11401da177e4SLinus Torvalds 	/*
11411da177e4SLinus Torvalds 	 * We will call the ->create function, that possibly is in a loadable
11421da177e4SLinus Torvalds 	 * module, so we have to bump that loadable module refcnt first.
11431da177e4SLinus Torvalds 	 */
11441da177e4SLinus Torvalds 	err = -EAFNOSUPPORT;
11451da177e4SLinus Torvalds 	if (!try_module_get(net_families[family]->owner))
11461da177e4SLinus Torvalds 		goto out_release;
11471da177e4SLinus Torvalds 
11481da177e4SLinus Torvalds 	if ((err = net_families[family]->create(sock, protocol)) < 0)
11491da177e4SLinus Torvalds 		goto out_module_put;
11501da177e4SLinus Torvalds 	/*
11511da177e4SLinus Torvalds 	 * Now to bump the refcnt of the [loadable] module that owns this
11521da177e4SLinus Torvalds 	 * socket at sock_release time we decrement its refcnt.
11531da177e4SLinus Torvalds 	 */
11541da177e4SLinus Torvalds 	if (!try_module_get(sock->ops->owner)) {
11551da177e4SLinus Torvalds 		sock->ops = NULL;
11561da177e4SLinus Torvalds 		goto out_module_put;
11571da177e4SLinus Torvalds 	}
11581da177e4SLinus Torvalds 	/*
11591da177e4SLinus Torvalds 	 * Now that we're done with the ->create function, the [loadable]
11601da177e4SLinus Torvalds 	 * module can have its refcnt decremented
11611da177e4SLinus Torvalds 	 */
11621da177e4SLinus Torvalds 	module_put(net_families[family]->owner);
11631da177e4SLinus Torvalds 	*res = sock;
11641da177e4SLinus Torvalds 	security_socket_post_create(sock, family, type, protocol, kern);
11651da177e4SLinus Torvalds 
11661da177e4SLinus Torvalds out:
11671da177e4SLinus Torvalds 	net_family_read_unlock();
11681da177e4SLinus Torvalds 	return err;
11691da177e4SLinus Torvalds out_module_put:
11701da177e4SLinus Torvalds 	module_put(net_families[family]->owner);
11711da177e4SLinus Torvalds out_release:
11721da177e4SLinus Torvalds 	sock_release(sock);
11731da177e4SLinus Torvalds 	goto out;
11741da177e4SLinus Torvalds }
11751da177e4SLinus Torvalds 
11761da177e4SLinus Torvalds int sock_create(int family, int type, int protocol, struct socket **res)
11771da177e4SLinus Torvalds {
11781da177e4SLinus Torvalds 	return __sock_create(family, type, protocol, res, 0);
11791da177e4SLinus Torvalds }
11801da177e4SLinus Torvalds 
11811da177e4SLinus Torvalds int sock_create_kern(int family, int type, int protocol, struct socket **res)
11821da177e4SLinus Torvalds {
11831da177e4SLinus Torvalds 	return __sock_create(family, type, protocol, res, 1);
11841da177e4SLinus Torvalds }
11851da177e4SLinus Torvalds 
11861da177e4SLinus Torvalds asmlinkage long sys_socket(int family, int type, int protocol)
11871da177e4SLinus Torvalds {
11881da177e4SLinus Torvalds 	int retval;
11891da177e4SLinus Torvalds 	struct socket *sock;
11901da177e4SLinus Torvalds 
11911da177e4SLinus Torvalds 	retval = sock_create(family, type, protocol, &sock);
11921da177e4SLinus Torvalds 	if (retval < 0)
11931da177e4SLinus Torvalds 		goto out;
11941da177e4SLinus Torvalds 
11951da177e4SLinus Torvalds 	retval = sock_map_fd(sock);
11961da177e4SLinus Torvalds 	if (retval < 0)
11971da177e4SLinus Torvalds 		goto out_release;
11981da177e4SLinus Torvalds 
11991da177e4SLinus Torvalds out:
12001da177e4SLinus Torvalds 	/* It may be already another descriptor 8) Not kernel problem. */
12011da177e4SLinus Torvalds 	return retval;
12021da177e4SLinus Torvalds 
12031da177e4SLinus Torvalds out_release:
12041da177e4SLinus Torvalds 	sock_release(sock);
12051da177e4SLinus Torvalds 	return retval;
12061da177e4SLinus Torvalds }
12071da177e4SLinus Torvalds 
12081da177e4SLinus Torvalds /*
12091da177e4SLinus Torvalds  *	Create a pair of connected sockets.
12101da177e4SLinus Torvalds  */
12111da177e4SLinus Torvalds 
12121da177e4SLinus Torvalds asmlinkage long sys_socketpair(int family, int type, int protocol, int __user *usockvec)
12131da177e4SLinus Torvalds {
12141da177e4SLinus Torvalds 	struct socket *sock1, *sock2;
12151da177e4SLinus Torvalds 	int fd1, fd2, err;
12161da177e4SLinus Torvalds 
12171da177e4SLinus Torvalds 	/*
12181da177e4SLinus Torvalds 	 * Obtain the first socket and check if the underlying protocol
12191da177e4SLinus Torvalds 	 * supports the socketpair call.
12201da177e4SLinus Torvalds 	 */
12211da177e4SLinus Torvalds 
12221da177e4SLinus Torvalds 	err = sock_create(family, type, protocol, &sock1);
12231da177e4SLinus Torvalds 	if (err < 0)
12241da177e4SLinus Torvalds 		goto out;
12251da177e4SLinus Torvalds 
12261da177e4SLinus Torvalds 	err = sock_create(family, type, protocol, &sock2);
12271da177e4SLinus Torvalds 	if (err < 0)
12281da177e4SLinus Torvalds 		goto out_release_1;
12291da177e4SLinus Torvalds 
12301da177e4SLinus Torvalds 	err = sock1->ops->socketpair(sock1, sock2);
12311da177e4SLinus Torvalds 	if (err < 0)
12321da177e4SLinus Torvalds 		goto out_release_both;
12331da177e4SLinus Torvalds 
12341da177e4SLinus Torvalds 	fd1 = fd2 = -1;
12351da177e4SLinus Torvalds 
12361da177e4SLinus Torvalds 	err = sock_map_fd(sock1);
12371da177e4SLinus Torvalds 	if (err < 0)
12381da177e4SLinus Torvalds 		goto out_release_both;
12391da177e4SLinus Torvalds 	fd1 = err;
12401da177e4SLinus Torvalds 
12411da177e4SLinus Torvalds 	err = sock_map_fd(sock2);
12421da177e4SLinus Torvalds 	if (err < 0)
12431da177e4SLinus Torvalds 		goto out_close_1;
12441da177e4SLinus Torvalds 	fd2 = err;
12451da177e4SLinus Torvalds 
12461da177e4SLinus Torvalds 	/* fd1 and fd2 may be already another descriptors.
12471da177e4SLinus Torvalds 	 * Not kernel problem.
12481da177e4SLinus Torvalds 	 */
12491da177e4SLinus Torvalds 
12501da177e4SLinus Torvalds 	err = put_user(fd1, &usockvec[0]);
12511da177e4SLinus Torvalds 	if (!err)
12521da177e4SLinus Torvalds 		err = put_user(fd2, &usockvec[1]);
12531da177e4SLinus Torvalds 	if (!err)
12541da177e4SLinus Torvalds 		return 0;
12551da177e4SLinus Torvalds 
12561da177e4SLinus Torvalds 	sys_close(fd2);
12571da177e4SLinus Torvalds 	sys_close(fd1);
12581da177e4SLinus Torvalds 	return err;
12591da177e4SLinus Torvalds 
12601da177e4SLinus Torvalds out_close_1:
12611da177e4SLinus Torvalds         sock_release(sock2);
12621da177e4SLinus Torvalds 	sys_close(fd1);
12631da177e4SLinus Torvalds 	return err;
12641da177e4SLinus Torvalds 
12651da177e4SLinus Torvalds out_release_both:
12661da177e4SLinus Torvalds         sock_release(sock2);
12671da177e4SLinus Torvalds out_release_1:
12681da177e4SLinus Torvalds         sock_release(sock1);
12691da177e4SLinus Torvalds out:
12701da177e4SLinus Torvalds 	return err;
12711da177e4SLinus Torvalds }
12721da177e4SLinus Torvalds 
12731da177e4SLinus Torvalds 
12741da177e4SLinus Torvalds /*
12751da177e4SLinus Torvalds  *	Bind a name to a socket. Nothing much to do here since it's
12761da177e4SLinus Torvalds  *	the protocol's responsibility to handle the local address.
12771da177e4SLinus Torvalds  *
12781da177e4SLinus Torvalds  *	We move the socket address to kernel space before we call
12791da177e4SLinus Torvalds  *	the protocol layer (having also checked the address is ok).
12801da177e4SLinus Torvalds  */
12811da177e4SLinus Torvalds 
12821da177e4SLinus Torvalds asmlinkage long sys_bind(int fd, struct sockaddr __user *umyaddr, int addrlen)
12831da177e4SLinus Torvalds {
12841da177e4SLinus Torvalds 	struct socket *sock;
12851da177e4SLinus Torvalds 	char address[MAX_SOCK_ADDR];
12861da177e4SLinus Torvalds 	int err;
12871da177e4SLinus Torvalds 
12881da177e4SLinus Torvalds 	if((sock = sockfd_lookup(fd,&err))!=NULL)
12891da177e4SLinus Torvalds 	{
12901da177e4SLinus Torvalds 		if((err=move_addr_to_kernel(umyaddr,addrlen,address))>=0) {
12911da177e4SLinus Torvalds 			err = security_socket_bind(sock, (struct sockaddr *)address, addrlen);
12921da177e4SLinus Torvalds 			if (err) {
12931da177e4SLinus Torvalds 				sockfd_put(sock);
12941da177e4SLinus Torvalds 				return err;
12951da177e4SLinus Torvalds 			}
12961da177e4SLinus Torvalds 			err = sock->ops->bind(sock, (struct sockaddr *)address, addrlen);
12971da177e4SLinus Torvalds 		}
12981da177e4SLinus Torvalds 		sockfd_put(sock);
12991da177e4SLinus Torvalds 	}
13001da177e4SLinus Torvalds 	return err;
13011da177e4SLinus Torvalds }
13021da177e4SLinus Torvalds 
13031da177e4SLinus Torvalds 
13041da177e4SLinus Torvalds /*
13051da177e4SLinus Torvalds  *	Perform a listen. Basically, we allow the protocol to do anything
13061da177e4SLinus Torvalds  *	necessary for a listen, and if that works, we mark the socket as
13071da177e4SLinus Torvalds  *	ready for listening.
13081da177e4SLinus Torvalds  */
13091da177e4SLinus Torvalds 
13101da177e4SLinus Torvalds int sysctl_somaxconn = SOMAXCONN;
13111da177e4SLinus Torvalds 
13121da177e4SLinus Torvalds asmlinkage long sys_listen(int fd, int backlog)
13131da177e4SLinus Torvalds {
13141da177e4SLinus Torvalds 	struct socket *sock;
13151da177e4SLinus Torvalds 	int err;
13161da177e4SLinus Torvalds 
13171da177e4SLinus Torvalds 	if ((sock = sockfd_lookup(fd, &err)) != NULL) {
13181da177e4SLinus Torvalds 		if ((unsigned) backlog > sysctl_somaxconn)
13191da177e4SLinus Torvalds 			backlog = sysctl_somaxconn;
13201da177e4SLinus Torvalds 
13211da177e4SLinus Torvalds 		err = security_socket_listen(sock, backlog);
13221da177e4SLinus Torvalds 		if (err) {
13231da177e4SLinus Torvalds 			sockfd_put(sock);
13241da177e4SLinus Torvalds 			return err;
13251da177e4SLinus Torvalds 		}
13261da177e4SLinus Torvalds 
13271da177e4SLinus Torvalds 		err=sock->ops->listen(sock, backlog);
13281da177e4SLinus Torvalds 		sockfd_put(sock);
13291da177e4SLinus Torvalds 	}
13301da177e4SLinus Torvalds 	return err;
13311da177e4SLinus Torvalds }
13321da177e4SLinus Torvalds 
13331da177e4SLinus Torvalds 
13341da177e4SLinus Torvalds /*
13351da177e4SLinus Torvalds  *	For accept, we attempt to create a new socket, set up the link
13361da177e4SLinus Torvalds  *	with the client, wake up the client, then return the new
13371da177e4SLinus Torvalds  *	connected fd. We collect the address of the connector in kernel
13381da177e4SLinus Torvalds  *	space and move it to user at the very end. This is unclean because
13391da177e4SLinus Torvalds  *	we open the socket then return an error.
13401da177e4SLinus Torvalds  *
13411da177e4SLinus Torvalds  *	1003.1g adds the ability to recvmsg() to query connection pending
13421da177e4SLinus Torvalds  *	status to recvmsg. We need to add that support in a way thats
13431da177e4SLinus Torvalds  *	clean when we restucture accept also.
13441da177e4SLinus Torvalds  */
13451da177e4SLinus Torvalds 
13461da177e4SLinus Torvalds asmlinkage long sys_accept(int fd, struct sockaddr __user *upeer_sockaddr, int __user *upeer_addrlen)
13471da177e4SLinus Torvalds {
13481da177e4SLinus Torvalds 	struct socket *sock, *newsock;
13491da177e4SLinus Torvalds 	int err, len;
13501da177e4SLinus Torvalds 	char address[MAX_SOCK_ADDR];
13511da177e4SLinus Torvalds 
13521da177e4SLinus Torvalds 	sock = sockfd_lookup(fd, &err);
13531da177e4SLinus Torvalds 	if (!sock)
13541da177e4SLinus Torvalds 		goto out;
13551da177e4SLinus Torvalds 
13561da177e4SLinus Torvalds 	err = -ENFILE;
13571da177e4SLinus Torvalds 	if (!(newsock = sock_alloc()))
13581da177e4SLinus Torvalds 		goto out_put;
13591da177e4SLinus Torvalds 
13601da177e4SLinus Torvalds 	newsock->type = sock->type;
13611da177e4SLinus Torvalds 	newsock->ops = sock->ops;
13621da177e4SLinus Torvalds 
13631da177e4SLinus Torvalds 	err = security_socket_accept(sock, newsock);
13641da177e4SLinus Torvalds 	if (err)
13651da177e4SLinus Torvalds 		goto out_release;
13661da177e4SLinus Torvalds 
13671da177e4SLinus Torvalds 	/*
13681da177e4SLinus Torvalds 	 * We don't need try_module_get here, as the listening socket (sock)
13691da177e4SLinus Torvalds 	 * has the protocol module (sock->ops->owner) held.
13701da177e4SLinus Torvalds 	 */
13711da177e4SLinus Torvalds 	__module_get(newsock->ops->owner);
13721da177e4SLinus Torvalds 
13731da177e4SLinus Torvalds 	err = sock->ops->accept(sock, newsock, sock->file->f_flags);
13741da177e4SLinus Torvalds 	if (err < 0)
13751da177e4SLinus Torvalds 		goto out_release;
13761da177e4SLinus Torvalds 
13771da177e4SLinus Torvalds 	if (upeer_sockaddr) {
13781da177e4SLinus Torvalds 		if(newsock->ops->getname(newsock, (struct sockaddr *)address, &len, 2)<0) {
13791da177e4SLinus Torvalds 			err = -ECONNABORTED;
13801da177e4SLinus Torvalds 			goto out_release;
13811da177e4SLinus Torvalds 		}
13821da177e4SLinus Torvalds 		err = move_addr_to_user(address, len, upeer_sockaddr, upeer_addrlen);
13831da177e4SLinus Torvalds 		if (err < 0)
13841da177e4SLinus Torvalds 			goto out_release;
13851da177e4SLinus Torvalds 	}
13861da177e4SLinus Torvalds 
13871da177e4SLinus Torvalds 	/* File flags are not inherited via accept() unlike another OSes. */
13881da177e4SLinus Torvalds 
13891da177e4SLinus Torvalds 	if ((err = sock_map_fd(newsock)) < 0)
13901da177e4SLinus Torvalds 		goto out_release;
13911da177e4SLinus Torvalds 
13921da177e4SLinus Torvalds 	security_socket_post_accept(sock, newsock);
13931da177e4SLinus Torvalds 
13941da177e4SLinus Torvalds out_put:
13951da177e4SLinus Torvalds 	sockfd_put(sock);
13961da177e4SLinus Torvalds out:
13971da177e4SLinus Torvalds 	return err;
13981da177e4SLinus Torvalds out_release:
13991da177e4SLinus Torvalds 	sock_release(newsock);
14001da177e4SLinus Torvalds 	goto out_put;
14011da177e4SLinus Torvalds }
14021da177e4SLinus Torvalds 
14031da177e4SLinus Torvalds 
14041da177e4SLinus Torvalds /*
14051da177e4SLinus Torvalds  *	Attempt to connect to a socket with the server address.  The address
14061da177e4SLinus Torvalds  *	is in user space so we verify it is OK and move it to kernel space.
14071da177e4SLinus Torvalds  *
14081da177e4SLinus Torvalds  *	For 1003.1g we need to add clean support for a bind to AF_UNSPEC to
14091da177e4SLinus Torvalds  *	break bindings
14101da177e4SLinus Torvalds  *
14111da177e4SLinus Torvalds  *	NOTE: 1003.1g draft 6.3 is broken with respect to AX.25/NetROM and
14121da177e4SLinus Torvalds  *	other SEQPACKET protocols that take time to connect() as it doesn't
14131da177e4SLinus Torvalds  *	include the -EINPROGRESS status for such sockets.
14141da177e4SLinus Torvalds  */
14151da177e4SLinus Torvalds 
14161da177e4SLinus Torvalds asmlinkage long sys_connect(int fd, struct sockaddr __user *uservaddr, int addrlen)
14171da177e4SLinus Torvalds {
14181da177e4SLinus Torvalds 	struct socket *sock;
14191da177e4SLinus Torvalds 	char address[MAX_SOCK_ADDR];
14201da177e4SLinus Torvalds 	int err;
14211da177e4SLinus Torvalds 
14221da177e4SLinus Torvalds 	sock = sockfd_lookup(fd, &err);
14231da177e4SLinus Torvalds 	if (!sock)
14241da177e4SLinus Torvalds 		goto out;
14251da177e4SLinus Torvalds 	err = move_addr_to_kernel(uservaddr, addrlen, address);
14261da177e4SLinus Torvalds 	if (err < 0)
14271da177e4SLinus Torvalds 		goto out_put;
14281da177e4SLinus Torvalds 
14291da177e4SLinus Torvalds 	err = security_socket_connect(sock, (struct sockaddr *)address, addrlen);
14301da177e4SLinus Torvalds 	if (err)
14311da177e4SLinus Torvalds 		goto out_put;
14321da177e4SLinus Torvalds 
14331da177e4SLinus Torvalds 	err = sock->ops->connect(sock, (struct sockaddr *) address, addrlen,
14341da177e4SLinus Torvalds 				 sock->file->f_flags);
14351da177e4SLinus Torvalds out_put:
14361da177e4SLinus Torvalds 	sockfd_put(sock);
14371da177e4SLinus Torvalds out:
14381da177e4SLinus Torvalds 	return err;
14391da177e4SLinus Torvalds }
14401da177e4SLinus Torvalds 
14411da177e4SLinus Torvalds /*
14421da177e4SLinus Torvalds  *	Get the local address ('name') of a socket object. Move the obtained
14431da177e4SLinus Torvalds  *	name to user space.
14441da177e4SLinus Torvalds  */
14451da177e4SLinus Torvalds 
14461da177e4SLinus Torvalds asmlinkage long sys_getsockname(int fd, struct sockaddr __user *usockaddr, int __user *usockaddr_len)
14471da177e4SLinus Torvalds {
14481da177e4SLinus Torvalds 	struct socket *sock;
14491da177e4SLinus Torvalds 	char address[MAX_SOCK_ADDR];
14501da177e4SLinus Torvalds 	int len, err;
14511da177e4SLinus Torvalds 
14521da177e4SLinus Torvalds 	sock = sockfd_lookup(fd, &err);
14531da177e4SLinus Torvalds 	if (!sock)
14541da177e4SLinus Torvalds 		goto out;
14551da177e4SLinus Torvalds 
14561da177e4SLinus Torvalds 	err = security_socket_getsockname(sock);
14571da177e4SLinus Torvalds 	if (err)
14581da177e4SLinus Torvalds 		goto out_put;
14591da177e4SLinus Torvalds 
14601da177e4SLinus Torvalds 	err = sock->ops->getname(sock, (struct sockaddr *)address, &len, 0);
14611da177e4SLinus Torvalds 	if (err)
14621da177e4SLinus Torvalds 		goto out_put;
14631da177e4SLinus Torvalds 	err = move_addr_to_user(address, len, usockaddr, usockaddr_len);
14641da177e4SLinus Torvalds 
14651da177e4SLinus Torvalds out_put:
14661da177e4SLinus Torvalds 	sockfd_put(sock);
14671da177e4SLinus Torvalds out:
14681da177e4SLinus Torvalds 	return err;
14691da177e4SLinus Torvalds }
14701da177e4SLinus Torvalds 
14711da177e4SLinus Torvalds /*
14721da177e4SLinus Torvalds  *	Get the remote address ('name') of a socket object. Move the obtained
14731da177e4SLinus Torvalds  *	name to user space.
14741da177e4SLinus Torvalds  */
14751da177e4SLinus Torvalds 
14761da177e4SLinus Torvalds asmlinkage long sys_getpeername(int fd, struct sockaddr __user *usockaddr, int __user *usockaddr_len)
14771da177e4SLinus Torvalds {
14781da177e4SLinus Torvalds 	struct socket *sock;
14791da177e4SLinus Torvalds 	char address[MAX_SOCK_ADDR];
14801da177e4SLinus Torvalds 	int len, err;
14811da177e4SLinus Torvalds 
14821da177e4SLinus Torvalds 	if ((sock = sockfd_lookup(fd, &err))!=NULL)
14831da177e4SLinus Torvalds 	{
14841da177e4SLinus Torvalds 		err = security_socket_getpeername(sock);
14851da177e4SLinus Torvalds 		if (err) {
14861da177e4SLinus Torvalds 			sockfd_put(sock);
14871da177e4SLinus Torvalds 			return err;
14881da177e4SLinus Torvalds 		}
14891da177e4SLinus Torvalds 
14901da177e4SLinus Torvalds 		err = sock->ops->getname(sock, (struct sockaddr *)address, &len, 1);
14911da177e4SLinus Torvalds 		if (!err)
14921da177e4SLinus Torvalds 			err=move_addr_to_user(address,len, usockaddr, usockaddr_len);
14931da177e4SLinus Torvalds 		sockfd_put(sock);
14941da177e4SLinus Torvalds 	}
14951da177e4SLinus Torvalds 	return err;
14961da177e4SLinus Torvalds }
14971da177e4SLinus Torvalds 
14981da177e4SLinus Torvalds /*
14991da177e4SLinus Torvalds  *	Send a datagram to a given address. We move the address into kernel
15001da177e4SLinus Torvalds  *	space and check the user space data area is readable before invoking
15011da177e4SLinus Torvalds  *	the protocol.
15021da177e4SLinus Torvalds  */
15031da177e4SLinus Torvalds 
15041da177e4SLinus Torvalds asmlinkage long sys_sendto(int fd, void __user * buff, size_t len, unsigned flags,
15051da177e4SLinus Torvalds 			   struct sockaddr __user *addr, int addr_len)
15061da177e4SLinus Torvalds {
15071da177e4SLinus Torvalds 	struct socket *sock;
15081da177e4SLinus Torvalds 	char address[MAX_SOCK_ADDR];
15091da177e4SLinus Torvalds 	int err;
15101da177e4SLinus Torvalds 	struct msghdr msg;
15111da177e4SLinus Torvalds 	struct iovec iov;
15121da177e4SLinus Torvalds 
15131da177e4SLinus Torvalds 	sock = sockfd_lookup(fd, &err);
15141da177e4SLinus Torvalds 	if (!sock)
15151da177e4SLinus Torvalds 		goto out;
15161da177e4SLinus Torvalds 	iov.iov_base=buff;
15171da177e4SLinus Torvalds 	iov.iov_len=len;
15181da177e4SLinus Torvalds 	msg.msg_name=NULL;
15191da177e4SLinus Torvalds 	msg.msg_iov=&iov;
15201da177e4SLinus Torvalds 	msg.msg_iovlen=1;
15211da177e4SLinus Torvalds 	msg.msg_control=NULL;
15221da177e4SLinus Torvalds 	msg.msg_controllen=0;
15231da177e4SLinus Torvalds 	msg.msg_namelen=0;
15241da177e4SLinus Torvalds 	if(addr)
15251da177e4SLinus Torvalds 	{
15261da177e4SLinus Torvalds 		err = move_addr_to_kernel(addr, addr_len, address);
15271da177e4SLinus Torvalds 		if (err < 0)
15281da177e4SLinus Torvalds 			goto out_put;
15291da177e4SLinus Torvalds 		msg.msg_name=address;
15301da177e4SLinus Torvalds 		msg.msg_namelen=addr_len;
15311da177e4SLinus Torvalds 	}
15321da177e4SLinus Torvalds 	if (sock->file->f_flags & O_NONBLOCK)
15331da177e4SLinus Torvalds 		flags |= MSG_DONTWAIT;
15341da177e4SLinus Torvalds 	msg.msg_flags = flags;
15351da177e4SLinus Torvalds 	err = sock_sendmsg(sock, &msg, len);
15361da177e4SLinus Torvalds 
15371da177e4SLinus Torvalds out_put:
15381da177e4SLinus Torvalds 	sockfd_put(sock);
15391da177e4SLinus Torvalds out:
15401da177e4SLinus Torvalds 	return err;
15411da177e4SLinus Torvalds }
15421da177e4SLinus Torvalds 
15431da177e4SLinus Torvalds /*
15441da177e4SLinus Torvalds  *	Send a datagram down a socket.
15451da177e4SLinus Torvalds  */
15461da177e4SLinus Torvalds 
15471da177e4SLinus Torvalds asmlinkage long sys_send(int fd, void __user * buff, size_t len, unsigned flags)
15481da177e4SLinus Torvalds {
15491da177e4SLinus Torvalds 	return sys_sendto(fd, buff, len, flags, NULL, 0);
15501da177e4SLinus Torvalds }
15511da177e4SLinus Torvalds 
15521da177e4SLinus Torvalds /*
15531da177e4SLinus Torvalds  *	Receive a frame from the socket and optionally record the address of the
15541da177e4SLinus Torvalds  *	sender. We verify the buffers are writable and if needed move the
15551da177e4SLinus Torvalds  *	sender address from kernel to user space.
15561da177e4SLinus Torvalds  */
15571da177e4SLinus Torvalds 
15581da177e4SLinus Torvalds asmlinkage long sys_recvfrom(int fd, void __user * ubuf, size_t size, unsigned flags,
15591da177e4SLinus Torvalds 			     struct sockaddr __user *addr, int __user *addr_len)
15601da177e4SLinus Torvalds {
15611da177e4SLinus Torvalds 	struct socket *sock;
15621da177e4SLinus Torvalds 	struct iovec iov;
15631da177e4SLinus Torvalds 	struct msghdr msg;
15641da177e4SLinus Torvalds 	char address[MAX_SOCK_ADDR];
15651da177e4SLinus Torvalds 	int err,err2;
15661da177e4SLinus Torvalds 
15671da177e4SLinus Torvalds 	sock = sockfd_lookup(fd, &err);
15681da177e4SLinus Torvalds 	if (!sock)
15691da177e4SLinus Torvalds 		goto out;
15701da177e4SLinus Torvalds 
15711da177e4SLinus Torvalds 	msg.msg_control=NULL;
15721da177e4SLinus Torvalds 	msg.msg_controllen=0;
15731da177e4SLinus Torvalds 	msg.msg_iovlen=1;
15741da177e4SLinus Torvalds 	msg.msg_iov=&iov;
15751da177e4SLinus Torvalds 	iov.iov_len=size;
15761da177e4SLinus Torvalds 	iov.iov_base=ubuf;
15771da177e4SLinus Torvalds 	msg.msg_name=address;
15781da177e4SLinus Torvalds 	msg.msg_namelen=MAX_SOCK_ADDR;
15791da177e4SLinus Torvalds 	if (sock->file->f_flags & O_NONBLOCK)
15801da177e4SLinus Torvalds 		flags |= MSG_DONTWAIT;
15811da177e4SLinus Torvalds 	err=sock_recvmsg(sock, &msg, size, flags);
15821da177e4SLinus Torvalds 
15831da177e4SLinus Torvalds 	if(err >= 0 && addr != NULL)
15841da177e4SLinus Torvalds 	{
15851da177e4SLinus Torvalds 		err2=move_addr_to_user(address, msg.msg_namelen, addr, addr_len);
15861da177e4SLinus Torvalds 		if(err2<0)
15871da177e4SLinus Torvalds 			err=err2;
15881da177e4SLinus Torvalds 	}
15891da177e4SLinus Torvalds 	sockfd_put(sock);
15901da177e4SLinus Torvalds out:
15911da177e4SLinus Torvalds 	return err;
15921da177e4SLinus Torvalds }
15931da177e4SLinus Torvalds 
15941da177e4SLinus Torvalds /*
15951da177e4SLinus Torvalds  *	Receive a datagram from a socket.
15961da177e4SLinus Torvalds  */
15971da177e4SLinus Torvalds 
15981da177e4SLinus Torvalds asmlinkage long sys_recv(int fd, void __user * ubuf, size_t size, unsigned flags)
15991da177e4SLinus Torvalds {
16001da177e4SLinus Torvalds 	return sys_recvfrom(fd, ubuf, size, flags, NULL, NULL);
16011da177e4SLinus Torvalds }
16021da177e4SLinus Torvalds 
16031da177e4SLinus Torvalds /*
16041da177e4SLinus Torvalds  *	Set a socket option. Because we don't know the option lengths we have
16051da177e4SLinus Torvalds  *	to pass the user mode parameter for the protocols to sort out.
16061da177e4SLinus Torvalds  */
16071da177e4SLinus Torvalds 
16081da177e4SLinus Torvalds asmlinkage long sys_setsockopt(int fd, int level, int optname, char __user *optval, int optlen)
16091da177e4SLinus Torvalds {
16101da177e4SLinus Torvalds 	int err;
16111da177e4SLinus Torvalds 	struct socket *sock;
16121da177e4SLinus Torvalds 
16131da177e4SLinus Torvalds 	if (optlen < 0)
16141da177e4SLinus Torvalds 		return -EINVAL;
16151da177e4SLinus Torvalds 
16161da177e4SLinus Torvalds 	if ((sock = sockfd_lookup(fd, &err))!=NULL)
16171da177e4SLinus Torvalds 	{
16181da177e4SLinus Torvalds 		err = security_socket_setsockopt(sock,level,optname);
16191da177e4SLinus Torvalds 		if (err) {
16201da177e4SLinus Torvalds 			sockfd_put(sock);
16211da177e4SLinus Torvalds 			return err;
16221da177e4SLinus Torvalds 		}
16231da177e4SLinus Torvalds 
16241da177e4SLinus Torvalds 		if (level == SOL_SOCKET)
16251da177e4SLinus Torvalds 			err=sock_setsockopt(sock,level,optname,optval,optlen);
16261da177e4SLinus Torvalds 		else
16271da177e4SLinus Torvalds 			err=sock->ops->setsockopt(sock, level, optname, optval, optlen);
16281da177e4SLinus Torvalds 		sockfd_put(sock);
16291da177e4SLinus Torvalds 	}
16301da177e4SLinus Torvalds 	return err;
16311da177e4SLinus Torvalds }
16321da177e4SLinus Torvalds 
16331da177e4SLinus Torvalds /*
16341da177e4SLinus Torvalds  *	Get a socket option. Because we don't know the option lengths we have
16351da177e4SLinus Torvalds  *	to pass a user mode parameter for the protocols to sort out.
16361da177e4SLinus Torvalds  */
16371da177e4SLinus Torvalds 
16381da177e4SLinus Torvalds asmlinkage long sys_getsockopt(int fd, int level, int optname, char __user *optval, int __user *optlen)
16391da177e4SLinus Torvalds {
16401da177e4SLinus Torvalds 	int err;
16411da177e4SLinus Torvalds 	struct socket *sock;
16421da177e4SLinus Torvalds 
16431da177e4SLinus Torvalds 	if ((sock = sockfd_lookup(fd, &err))!=NULL)
16441da177e4SLinus Torvalds 	{
16451da177e4SLinus Torvalds 		err = security_socket_getsockopt(sock, level,
16461da177e4SLinus Torvalds 							   optname);
16471da177e4SLinus Torvalds 		if (err) {
16481da177e4SLinus Torvalds 			sockfd_put(sock);
16491da177e4SLinus Torvalds 			return err;
16501da177e4SLinus Torvalds 		}
16511da177e4SLinus Torvalds 
16521da177e4SLinus Torvalds 		if (level == SOL_SOCKET)
16531da177e4SLinus Torvalds 			err=sock_getsockopt(sock,level,optname,optval,optlen);
16541da177e4SLinus Torvalds 		else
16551da177e4SLinus Torvalds 			err=sock->ops->getsockopt(sock, level, optname, optval, optlen);
16561da177e4SLinus Torvalds 		sockfd_put(sock);
16571da177e4SLinus Torvalds 	}
16581da177e4SLinus Torvalds 	return err;
16591da177e4SLinus Torvalds }
16601da177e4SLinus Torvalds 
16611da177e4SLinus Torvalds 
16621da177e4SLinus Torvalds /*
16631da177e4SLinus Torvalds  *	Shutdown a socket.
16641da177e4SLinus Torvalds  */
16651da177e4SLinus Torvalds 
16661da177e4SLinus Torvalds asmlinkage long sys_shutdown(int fd, int how)
16671da177e4SLinus Torvalds {
16681da177e4SLinus Torvalds 	int err;
16691da177e4SLinus Torvalds 	struct socket *sock;
16701da177e4SLinus Torvalds 
16711da177e4SLinus Torvalds 	if ((sock = sockfd_lookup(fd, &err))!=NULL)
16721da177e4SLinus Torvalds 	{
16731da177e4SLinus Torvalds 		err = security_socket_shutdown(sock, how);
16741da177e4SLinus Torvalds 		if (err) {
16751da177e4SLinus Torvalds 			sockfd_put(sock);
16761da177e4SLinus Torvalds 			return err;
16771da177e4SLinus Torvalds 		}
16781da177e4SLinus Torvalds 
16791da177e4SLinus Torvalds 		err=sock->ops->shutdown(sock, how);
16801da177e4SLinus Torvalds 		sockfd_put(sock);
16811da177e4SLinus Torvalds 	}
16821da177e4SLinus Torvalds 	return err;
16831da177e4SLinus Torvalds }
16841da177e4SLinus Torvalds 
16851da177e4SLinus Torvalds /* A couple of helpful macros for getting the address of the 32/64 bit
16861da177e4SLinus Torvalds  * fields which are the same type (int / unsigned) on our platforms.
16871da177e4SLinus Torvalds  */
16881da177e4SLinus Torvalds #define COMPAT_MSG(msg, member)	((MSG_CMSG_COMPAT & flags) ? &msg##_compat->member : &msg->member)
16891da177e4SLinus Torvalds #define COMPAT_NAMELEN(msg)	COMPAT_MSG(msg, msg_namelen)
16901da177e4SLinus Torvalds #define COMPAT_FLAGS(msg)	COMPAT_MSG(msg, msg_flags)
16911da177e4SLinus Torvalds 
16921da177e4SLinus Torvalds 
16931da177e4SLinus Torvalds /*
16941da177e4SLinus Torvalds  *	BSD sendmsg interface
16951da177e4SLinus Torvalds  */
16961da177e4SLinus Torvalds 
16971da177e4SLinus Torvalds asmlinkage long sys_sendmsg(int fd, struct msghdr __user *msg, unsigned flags)
16981da177e4SLinus Torvalds {
16991da177e4SLinus Torvalds 	struct compat_msghdr __user *msg_compat = (struct compat_msghdr __user *)msg;
17001da177e4SLinus Torvalds 	struct socket *sock;
17011da177e4SLinus Torvalds 	char address[MAX_SOCK_ADDR];
17021da177e4SLinus Torvalds 	struct iovec iovstack[UIO_FASTIOV], *iov = iovstack;
17031da177e4SLinus Torvalds 	unsigned char ctl[sizeof(struct cmsghdr) + 20];	/* 20 is size of ipv6_pktinfo */
17041da177e4SLinus Torvalds 	unsigned char *ctl_buf = ctl;
17051da177e4SLinus Torvalds 	struct msghdr msg_sys;
17061da177e4SLinus Torvalds 	int err, ctl_len, iov_size, total_len;
17071da177e4SLinus Torvalds 
17081da177e4SLinus Torvalds 	err = -EFAULT;
17091da177e4SLinus Torvalds 	if (MSG_CMSG_COMPAT & flags) {
17101da177e4SLinus Torvalds 		if (get_compat_msghdr(&msg_sys, msg_compat))
17111da177e4SLinus Torvalds 			return -EFAULT;
17121da177e4SLinus Torvalds 	} else if (copy_from_user(&msg_sys, msg, sizeof(struct msghdr)))
17131da177e4SLinus Torvalds 		return -EFAULT;
17141da177e4SLinus Torvalds 
17151da177e4SLinus Torvalds 	sock = sockfd_lookup(fd, &err);
17161da177e4SLinus Torvalds 	if (!sock)
17171da177e4SLinus Torvalds 		goto out;
17181da177e4SLinus Torvalds 
17191da177e4SLinus Torvalds 	/* do not move before msg_sys is valid */
17201da177e4SLinus Torvalds 	err = -EMSGSIZE;
17211da177e4SLinus Torvalds 	if (msg_sys.msg_iovlen > UIO_MAXIOV)
17221da177e4SLinus Torvalds 		goto out_put;
17231da177e4SLinus Torvalds 
17241da177e4SLinus Torvalds 	/* Check whether to allocate the iovec area*/
17251da177e4SLinus Torvalds 	err = -ENOMEM;
17261da177e4SLinus Torvalds 	iov_size = msg_sys.msg_iovlen * sizeof(struct iovec);
17271da177e4SLinus Torvalds 	if (msg_sys.msg_iovlen > UIO_FASTIOV) {
17281da177e4SLinus Torvalds 		iov = sock_kmalloc(sock->sk, iov_size, GFP_KERNEL);
17291da177e4SLinus Torvalds 		if (!iov)
17301da177e4SLinus Torvalds 			goto out_put;
17311da177e4SLinus Torvalds 	}
17321da177e4SLinus Torvalds 
17331da177e4SLinus Torvalds 	/* This will also move the address data into kernel space */
17341da177e4SLinus Torvalds 	if (MSG_CMSG_COMPAT & flags) {
17351da177e4SLinus Torvalds 		err = verify_compat_iovec(&msg_sys, iov, address, VERIFY_READ);
17361da177e4SLinus Torvalds 	} else
17371da177e4SLinus Torvalds 		err = verify_iovec(&msg_sys, iov, address, VERIFY_READ);
17381da177e4SLinus Torvalds 	if (err < 0)
17391da177e4SLinus Torvalds 		goto out_freeiov;
17401da177e4SLinus Torvalds 	total_len = err;
17411da177e4SLinus Torvalds 
17421da177e4SLinus Torvalds 	err = -ENOBUFS;
17431da177e4SLinus Torvalds 
17441da177e4SLinus Torvalds 	if (msg_sys.msg_controllen > INT_MAX)
17451da177e4SLinus Torvalds 		goto out_freeiov;
17461da177e4SLinus Torvalds 	ctl_len = msg_sys.msg_controllen;
17471da177e4SLinus Torvalds 	if ((MSG_CMSG_COMPAT & flags) && ctl_len) {
17481da177e4SLinus Torvalds 		err = cmsghdr_from_user_compat_to_kern(&msg_sys, ctl, sizeof(ctl));
17491da177e4SLinus Torvalds 		if (err)
17501da177e4SLinus Torvalds 			goto out_freeiov;
17511da177e4SLinus Torvalds 		ctl_buf = msg_sys.msg_control;
17521da177e4SLinus Torvalds 	} else if (ctl_len) {
17531da177e4SLinus Torvalds 		if (ctl_len > sizeof(ctl))
17541da177e4SLinus Torvalds 		{
17551da177e4SLinus Torvalds 			ctl_buf = sock_kmalloc(sock->sk, ctl_len, GFP_KERNEL);
17561da177e4SLinus Torvalds 			if (ctl_buf == NULL)
17571da177e4SLinus Torvalds 				goto out_freeiov;
17581da177e4SLinus Torvalds 		}
17591da177e4SLinus Torvalds 		err = -EFAULT;
17601da177e4SLinus Torvalds 		/*
17611da177e4SLinus Torvalds 		 * Careful! Before this, msg_sys.msg_control contains a user pointer.
17621da177e4SLinus Torvalds 		 * Afterwards, it will be a kernel pointer. Thus the compiler-assisted
17631da177e4SLinus Torvalds 		 * checking falls down on this.
17641da177e4SLinus Torvalds 		 */
17651da177e4SLinus Torvalds 		if (copy_from_user(ctl_buf, (void __user *) msg_sys.msg_control, ctl_len))
17661da177e4SLinus Torvalds 			goto out_freectl;
17671da177e4SLinus Torvalds 		msg_sys.msg_control = ctl_buf;
17681da177e4SLinus Torvalds 	}
17691da177e4SLinus Torvalds 	msg_sys.msg_flags = flags;
17701da177e4SLinus Torvalds 
17711da177e4SLinus Torvalds 	if (sock->file->f_flags & O_NONBLOCK)
17721da177e4SLinus Torvalds 		msg_sys.msg_flags |= MSG_DONTWAIT;
17731da177e4SLinus Torvalds 	err = sock_sendmsg(sock, &msg_sys, total_len);
17741da177e4SLinus Torvalds 
17751da177e4SLinus Torvalds out_freectl:
17761da177e4SLinus Torvalds 	if (ctl_buf != ctl)
17771da177e4SLinus Torvalds 		sock_kfree_s(sock->sk, ctl_buf, ctl_len);
17781da177e4SLinus Torvalds out_freeiov:
17791da177e4SLinus Torvalds 	if (iov != iovstack)
17801da177e4SLinus Torvalds 		sock_kfree_s(sock->sk, iov, iov_size);
17811da177e4SLinus Torvalds out_put:
17821da177e4SLinus Torvalds 	sockfd_put(sock);
17831da177e4SLinus Torvalds out:
17841da177e4SLinus Torvalds 	return err;
17851da177e4SLinus Torvalds }
17861da177e4SLinus Torvalds 
17871da177e4SLinus Torvalds /*
17881da177e4SLinus Torvalds  *	BSD recvmsg interface
17891da177e4SLinus Torvalds  */
17901da177e4SLinus Torvalds 
17911da177e4SLinus Torvalds asmlinkage long sys_recvmsg(int fd, struct msghdr __user *msg, unsigned int flags)
17921da177e4SLinus Torvalds {
17931da177e4SLinus Torvalds 	struct compat_msghdr __user *msg_compat = (struct compat_msghdr __user *)msg;
17941da177e4SLinus Torvalds 	struct socket *sock;
17951da177e4SLinus Torvalds 	struct iovec iovstack[UIO_FASTIOV];
17961da177e4SLinus Torvalds 	struct iovec *iov=iovstack;
17971da177e4SLinus Torvalds 	struct msghdr msg_sys;
17981da177e4SLinus Torvalds 	unsigned long cmsg_ptr;
17991da177e4SLinus Torvalds 	int err, iov_size, total_len, len;
18001da177e4SLinus Torvalds 
18011da177e4SLinus Torvalds 	/* kernel mode address */
18021da177e4SLinus Torvalds 	char addr[MAX_SOCK_ADDR];
18031da177e4SLinus Torvalds 
18041da177e4SLinus Torvalds 	/* user mode address pointers */
18051da177e4SLinus Torvalds 	struct sockaddr __user *uaddr;
18061da177e4SLinus Torvalds 	int __user *uaddr_len;
18071da177e4SLinus Torvalds 
18081da177e4SLinus Torvalds 	if (MSG_CMSG_COMPAT & flags) {
18091da177e4SLinus Torvalds 		if (get_compat_msghdr(&msg_sys, msg_compat))
18101da177e4SLinus Torvalds 			return -EFAULT;
18111da177e4SLinus Torvalds 	} else
18121da177e4SLinus Torvalds 		if (copy_from_user(&msg_sys,msg,sizeof(struct msghdr)))
18131da177e4SLinus Torvalds 			return -EFAULT;
18141da177e4SLinus Torvalds 
18151da177e4SLinus Torvalds 	sock = sockfd_lookup(fd, &err);
18161da177e4SLinus Torvalds 	if (!sock)
18171da177e4SLinus Torvalds 		goto out;
18181da177e4SLinus Torvalds 
18191da177e4SLinus Torvalds 	err = -EMSGSIZE;
18201da177e4SLinus Torvalds 	if (msg_sys.msg_iovlen > UIO_MAXIOV)
18211da177e4SLinus Torvalds 		goto out_put;
18221da177e4SLinus Torvalds 
18231da177e4SLinus Torvalds 	/* Check whether to allocate the iovec area*/
18241da177e4SLinus Torvalds 	err = -ENOMEM;
18251da177e4SLinus Torvalds 	iov_size = msg_sys.msg_iovlen * sizeof(struct iovec);
18261da177e4SLinus Torvalds 	if (msg_sys.msg_iovlen > UIO_FASTIOV) {
18271da177e4SLinus Torvalds 		iov = sock_kmalloc(sock->sk, iov_size, GFP_KERNEL);
18281da177e4SLinus Torvalds 		if (!iov)
18291da177e4SLinus Torvalds 			goto out_put;
18301da177e4SLinus Torvalds 	}
18311da177e4SLinus Torvalds 
18321da177e4SLinus Torvalds 	/*
18331da177e4SLinus Torvalds 	 *	Save the user-mode address (verify_iovec will change the
18341da177e4SLinus Torvalds 	 *	kernel msghdr to use the kernel address space)
18351da177e4SLinus Torvalds 	 */
18361da177e4SLinus Torvalds 
18371da177e4SLinus Torvalds 	uaddr = (void __user *) msg_sys.msg_name;
18381da177e4SLinus Torvalds 	uaddr_len = COMPAT_NAMELEN(msg);
18391da177e4SLinus Torvalds 	if (MSG_CMSG_COMPAT & flags) {
18401da177e4SLinus Torvalds 		err = verify_compat_iovec(&msg_sys, iov, addr, VERIFY_WRITE);
18411da177e4SLinus Torvalds 	} else
18421da177e4SLinus Torvalds 		err = verify_iovec(&msg_sys, iov, addr, VERIFY_WRITE);
18431da177e4SLinus Torvalds 	if (err < 0)
18441da177e4SLinus Torvalds 		goto out_freeiov;
18451da177e4SLinus Torvalds 	total_len=err;
18461da177e4SLinus Torvalds 
18471da177e4SLinus Torvalds 	cmsg_ptr = (unsigned long)msg_sys.msg_control;
18481da177e4SLinus Torvalds 	msg_sys.msg_flags = 0;
18491da177e4SLinus Torvalds 	if (MSG_CMSG_COMPAT & flags)
18501da177e4SLinus Torvalds 		msg_sys.msg_flags = MSG_CMSG_COMPAT;
18511da177e4SLinus Torvalds 
18521da177e4SLinus Torvalds 	if (sock->file->f_flags & O_NONBLOCK)
18531da177e4SLinus Torvalds 		flags |= MSG_DONTWAIT;
18541da177e4SLinus Torvalds 	err = sock_recvmsg(sock, &msg_sys, total_len, flags);
18551da177e4SLinus Torvalds 	if (err < 0)
18561da177e4SLinus Torvalds 		goto out_freeiov;
18571da177e4SLinus Torvalds 	len = err;
18581da177e4SLinus Torvalds 
18591da177e4SLinus Torvalds 	if (uaddr != NULL) {
18601da177e4SLinus Torvalds 		err = move_addr_to_user(addr, msg_sys.msg_namelen, uaddr, uaddr_len);
18611da177e4SLinus Torvalds 		if (err < 0)
18621da177e4SLinus Torvalds 			goto out_freeiov;
18631da177e4SLinus Torvalds 	}
18641da177e4SLinus Torvalds 	err = __put_user(msg_sys.msg_flags, COMPAT_FLAGS(msg));
18651da177e4SLinus Torvalds 	if (err)
18661da177e4SLinus Torvalds 		goto out_freeiov;
18671da177e4SLinus Torvalds 	if (MSG_CMSG_COMPAT & flags)
18681da177e4SLinus Torvalds 		err = __put_user((unsigned long)msg_sys.msg_control-cmsg_ptr,
18691da177e4SLinus Torvalds 				 &msg_compat->msg_controllen);
18701da177e4SLinus Torvalds 	else
18711da177e4SLinus Torvalds 		err = __put_user((unsigned long)msg_sys.msg_control-cmsg_ptr,
18721da177e4SLinus Torvalds 				 &msg->msg_controllen);
18731da177e4SLinus Torvalds 	if (err)
18741da177e4SLinus Torvalds 		goto out_freeiov;
18751da177e4SLinus Torvalds 	err = len;
18761da177e4SLinus Torvalds 
18771da177e4SLinus Torvalds out_freeiov:
18781da177e4SLinus Torvalds 	if (iov != iovstack)
18791da177e4SLinus Torvalds 		sock_kfree_s(sock->sk, iov, iov_size);
18801da177e4SLinus Torvalds out_put:
18811da177e4SLinus Torvalds 	sockfd_put(sock);
18821da177e4SLinus Torvalds out:
18831da177e4SLinus Torvalds 	return err;
18841da177e4SLinus Torvalds }
18851da177e4SLinus Torvalds 
18861da177e4SLinus Torvalds #ifdef __ARCH_WANT_SYS_SOCKETCALL
18871da177e4SLinus Torvalds 
18881da177e4SLinus Torvalds /* Argument list sizes for sys_socketcall */
18891da177e4SLinus Torvalds #define AL(x) ((x) * sizeof(unsigned long))
18901da177e4SLinus Torvalds static unsigned char nargs[18]={AL(0),AL(3),AL(3),AL(3),AL(2),AL(3),
18911da177e4SLinus Torvalds 				AL(3),AL(3),AL(4),AL(4),AL(4),AL(6),
18921da177e4SLinus Torvalds 				AL(6),AL(2),AL(5),AL(5),AL(3),AL(3)};
18931da177e4SLinus Torvalds #undef AL
18941da177e4SLinus Torvalds 
18951da177e4SLinus Torvalds /*
18961da177e4SLinus Torvalds  *	System call vectors.
18971da177e4SLinus Torvalds  *
18981da177e4SLinus Torvalds  *	Argument checking cleaned up. Saved 20% in size.
18991da177e4SLinus Torvalds  *  This function doesn't need to set the kernel lock because
19001da177e4SLinus Torvalds  *  it is set by the callees.
19011da177e4SLinus Torvalds  */
19021da177e4SLinus Torvalds 
19031da177e4SLinus Torvalds asmlinkage long sys_socketcall(int call, unsigned long __user *args)
19041da177e4SLinus Torvalds {
19051da177e4SLinus Torvalds 	unsigned long a[6];
19061da177e4SLinus Torvalds 	unsigned long a0,a1;
19071da177e4SLinus Torvalds 	int err;
19081da177e4SLinus Torvalds 
19091da177e4SLinus Torvalds 	if(call<1||call>SYS_RECVMSG)
19101da177e4SLinus Torvalds 		return -EINVAL;
19111da177e4SLinus Torvalds 
19121da177e4SLinus Torvalds 	/* copy_from_user should be SMP safe. */
19131da177e4SLinus Torvalds 	if (copy_from_user(a, args, nargs[call]))
19141da177e4SLinus Torvalds 		return -EFAULT;
19151da177e4SLinus Torvalds 
19164bcff1b3SDavid Woodhouse 	err = audit_socketcall(nargs[call]/sizeof(unsigned long), a);
19173ec3b2fbSDavid Woodhouse 	if (err)
19183ec3b2fbSDavid Woodhouse 		return err;
19193ec3b2fbSDavid Woodhouse 
19201da177e4SLinus Torvalds 	a0=a[0];
19211da177e4SLinus Torvalds 	a1=a[1];
19221da177e4SLinus Torvalds 
19231da177e4SLinus Torvalds 	switch(call)
19241da177e4SLinus Torvalds 	{
19251da177e4SLinus Torvalds 		case SYS_SOCKET:
19261da177e4SLinus Torvalds 			err = sys_socket(a0,a1,a[2]);
19271da177e4SLinus Torvalds 			break;
19281da177e4SLinus Torvalds 		case SYS_BIND:
19291da177e4SLinus Torvalds 			err = sys_bind(a0,(struct sockaddr __user *)a1, a[2]);
19301da177e4SLinus Torvalds 			break;
19311da177e4SLinus Torvalds 		case SYS_CONNECT:
19321da177e4SLinus Torvalds 			err = sys_connect(a0, (struct sockaddr __user *)a1, a[2]);
19331da177e4SLinus Torvalds 			break;
19341da177e4SLinus Torvalds 		case SYS_LISTEN:
19351da177e4SLinus Torvalds 			err = sys_listen(a0,a1);
19361da177e4SLinus Torvalds 			break;
19371da177e4SLinus Torvalds 		case SYS_ACCEPT:
19381da177e4SLinus Torvalds 			err = sys_accept(a0,(struct sockaddr __user *)a1, (int __user *)a[2]);
19391da177e4SLinus Torvalds 			break;
19401da177e4SLinus Torvalds 		case SYS_GETSOCKNAME:
19411da177e4SLinus Torvalds 			err = sys_getsockname(a0,(struct sockaddr __user *)a1, (int __user *)a[2]);
19421da177e4SLinus Torvalds 			break;
19431da177e4SLinus Torvalds 		case SYS_GETPEERNAME:
19441da177e4SLinus Torvalds 			err = sys_getpeername(a0, (struct sockaddr __user *)a1, (int __user *)a[2]);
19451da177e4SLinus Torvalds 			break;
19461da177e4SLinus Torvalds 		case SYS_SOCKETPAIR:
19471da177e4SLinus Torvalds 			err = sys_socketpair(a0,a1, a[2], (int __user *)a[3]);
19481da177e4SLinus Torvalds 			break;
19491da177e4SLinus Torvalds 		case SYS_SEND:
19501da177e4SLinus Torvalds 			err = sys_send(a0, (void __user *)a1, a[2], a[3]);
19511da177e4SLinus Torvalds 			break;
19521da177e4SLinus Torvalds 		case SYS_SENDTO:
19531da177e4SLinus Torvalds 			err = sys_sendto(a0,(void __user *)a1, a[2], a[3],
19541da177e4SLinus Torvalds 					 (struct sockaddr __user *)a[4], a[5]);
19551da177e4SLinus Torvalds 			break;
19561da177e4SLinus Torvalds 		case SYS_RECV:
19571da177e4SLinus Torvalds 			err = sys_recv(a0, (void __user *)a1, a[2], a[3]);
19581da177e4SLinus Torvalds 			break;
19591da177e4SLinus Torvalds 		case SYS_RECVFROM:
19601da177e4SLinus Torvalds 			err = sys_recvfrom(a0, (void __user *)a1, a[2], a[3],
19611da177e4SLinus Torvalds 					   (struct sockaddr __user *)a[4], (int __user *)a[5]);
19621da177e4SLinus Torvalds 			break;
19631da177e4SLinus Torvalds 		case SYS_SHUTDOWN:
19641da177e4SLinus Torvalds 			err = sys_shutdown(a0,a1);
19651da177e4SLinus Torvalds 			break;
19661da177e4SLinus Torvalds 		case SYS_SETSOCKOPT:
19671da177e4SLinus Torvalds 			err = sys_setsockopt(a0, a1, a[2], (char __user *)a[3], a[4]);
19681da177e4SLinus Torvalds 			break;
19691da177e4SLinus Torvalds 		case SYS_GETSOCKOPT:
19701da177e4SLinus Torvalds 			err = sys_getsockopt(a0, a1, a[2], (char __user *)a[3], (int __user *)a[4]);
19711da177e4SLinus Torvalds 			break;
19721da177e4SLinus Torvalds 		case SYS_SENDMSG:
19731da177e4SLinus Torvalds 			err = sys_sendmsg(a0, (struct msghdr __user *) a1, a[2]);
19741da177e4SLinus Torvalds 			break;
19751da177e4SLinus Torvalds 		case SYS_RECVMSG:
19761da177e4SLinus Torvalds 			err = sys_recvmsg(a0, (struct msghdr __user *) a1, a[2]);
19771da177e4SLinus Torvalds 			break;
19781da177e4SLinus Torvalds 		default:
19791da177e4SLinus Torvalds 			err = -EINVAL;
19801da177e4SLinus Torvalds 			break;
19811da177e4SLinus Torvalds 	}
19821da177e4SLinus Torvalds 	return err;
19831da177e4SLinus Torvalds }
19841da177e4SLinus Torvalds 
19851da177e4SLinus Torvalds #endif /* __ARCH_WANT_SYS_SOCKETCALL */
19861da177e4SLinus Torvalds 
19871da177e4SLinus Torvalds /*
19881da177e4SLinus Torvalds  *	This function is called by a protocol handler that wants to
19891da177e4SLinus Torvalds  *	advertise its address family, and have it linked into the
19901da177e4SLinus Torvalds  *	SOCKET module.
19911da177e4SLinus Torvalds  */
19921da177e4SLinus Torvalds 
19931da177e4SLinus Torvalds int sock_register(struct net_proto_family *ops)
19941da177e4SLinus Torvalds {
19951da177e4SLinus Torvalds 	int err;
19961da177e4SLinus Torvalds 
19971da177e4SLinus Torvalds 	if (ops->family >= NPROTO) {
19981da177e4SLinus Torvalds 		printk(KERN_CRIT "protocol %d >= NPROTO(%d)\n", ops->family, NPROTO);
19991da177e4SLinus Torvalds 		return -ENOBUFS;
20001da177e4SLinus Torvalds 	}
20011da177e4SLinus Torvalds 	net_family_write_lock();
20021da177e4SLinus Torvalds 	err = -EEXIST;
20031da177e4SLinus Torvalds 	if (net_families[ops->family] == NULL) {
20041da177e4SLinus Torvalds 		net_families[ops->family]=ops;
20051da177e4SLinus Torvalds 		err = 0;
20061da177e4SLinus Torvalds 	}
20071da177e4SLinus Torvalds 	net_family_write_unlock();
20081da177e4SLinus Torvalds 	printk(KERN_INFO "NET: Registered protocol family %d\n",
20091da177e4SLinus Torvalds 	       ops->family);
20101da177e4SLinus Torvalds 	return err;
20111da177e4SLinus Torvalds }
20121da177e4SLinus Torvalds 
20131da177e4SLinus Torvalds /*
20141da177e4SLinus Torvalds  *	This function is called by a protocol handler that wants to
20151da177e4SLinus Torvalds  *	remove its address family, and have it unlinked from the
20161da177e4SLinus Torvalds  *	SOCKET module.
20171da177e4SLinus Torvalds  */
20181da177e4SLinus Torvalds 
20191da177e4SLinus Torvalds int sock_unregister(int family)
20201da177e4SLinus Torvalds {
20211da177e4SLinus Torvalds 	if (family < 0 || family >= NPROTO)
20221da177e4SLinus Torvalds 		return -1;
20231da177e4SLinus Torvalds 
20241da177e4SLinus Torvalds 	net_family_write_lock();
20251da177e4SLinus Torvalds 	net_families[family]=NULL;
20261da177e4SLinus Torvalds 	net_family_write_unlock();
20271da177e4SLinus Torvalds 	printk(KERN_INFO "NET: Unregistered protocol family %d\n",
20281da177e4SLinus Torvalds 	       family);
20291da177e4SLinus Torvalds 	return 0;
20301da177e4SLinus Torvalds }
20311da177e4SLinus Torvalds 
20321da177e4SLinus Torvalds void __init sock_init(void)
20331da177e4SLinus Torvalds {
20341da177e4SLinus Torvalds 	/*
20351da177e4SLinus Torvalds 	 *	Initialize sock SLAB cache.
20361da177e4SLinus Torvalds 	 */
20371da177e4SLinus Torvalds 
20381da177e4SLinus Torvalds 	sk_init();
20391da177e4SLinus Torvalds 
20401da177e4SLinus Torvalds #ifdef SLAB_SKB
20411da177e4SLinus Torvalds 	/*
20421da177e4SLinus Torvalds 	 *	Initialize skbuff SLAB cache
20431da177e4SLinus Torvalds 	 */
20441da177e4SLinus Torvalds 	skb_init();
20451da177e4SLinus Torvalds #endif
20461da177e4SLinus Torvalds 
20471da177e4SLinus Torvalds 	/*
20481da177e4SLinus Torvalds 	 *	Initialize the protocols module.
20491da177e4SLinus Torvalds 	 */
20501da177e4SLinus Torvalds 
20511da177e4SLinus Torvalds 	init_inodecache();
20521da177e4SLinus Torvalds 	register_filesystem(&sock_fs_type);
20531da177e4SLinus Torvalds 	sock_mnt = kern_mount(&sock_fs_type);
20541da177e4SLinus Torvalds 	/* The real protocol initialization is performed when
20551da177e4SLinus Torvalds 	 *  do_initcalls is run.
20561da177e4SLinus Torvalds 	 */
20571da177e4SLinus Torvalds 
20581da177e4SLinus Torvalds #ifdef CONFIG_NETFILTER
20591da177e4SLinus Torvalds 	netfilter_init();
20601da177e4SLinus Torvalds #endif
20611da177e4SLinus Torvalds }
20621da177e4SLinus Torvalds 
20631da177e4SLinus Torvalds #ifdef CONFIG_PROC_FS
20641da177e4SLinus Torvalds void socket_seq_show(struct seq_file *seq)
20651da177e4SLinus Torvalds {
20661da177e4SLinus Torvalds 	int cpu;
20671da177e4SLinus Torvalds 	int counter = 0;
20681da177e4SLinus Torvalds 
20691da177e4SLinus Torvalds 	for (cpu = 0; cpu < NR_CPUS; cpu++)
20701da177e4SLinus Torvalds 		counter += per_cpu(sockets_in_use, cpu);
20711da177e4SLinus Torvalds 
20721da177e4SLinus Torvalds 	/* It can be negative, by the way. 8) */
20731da177e4SLinus Torvalds 	if (counter < 0)
20741da177e4SLinus Torvalds 		counter = 0;
20751da177e4SLinus Torvalds 
20761da177e4SLinus Torvalds 	seq_printf(seq, "sockets: used %d\n", counter);
20771da177e4SLinus Torvalds }
20781da177e4SLinus Torvalds #endif /* CONFIG_PROC_FS */
20791da177e4SLinus Torvalds 
20801da177e4SLinus Torvalds /* ABI emulation layers need these two */
20811da177e4SLinus Torvalds EXPORT_SYMBOL(move_addr_to_kernel);
20821da177e4SLinus Torvalds EXPORT_SYMBOL(move_addr_to_user);
20831da177e4SLinus Torvalds EXPORT_SYMBOL(sock_create);
20841da177e4SLinus Torvalds EXPORT_SYMBOL(sock_create_kern);
20851da177e4SLinus Torvalds EXPORT_SYMBOL(sock_create_lite);
20861da177e4SLinus Torvalds EXPORT_SYMBOL(sock_map_fd);
20871da177e4SLinus Torvalds EXPORT_SYMBOL(sock_recvmsg);
20881da177e4SLinus Torvalds EXPORT_SYMBOL(sock_register);
20891da177e4SLinus Torvalds EXPORT_SYMBOL(sock_release);
20901da177e4SLinus Torvalds EXPORT_SYMBOL(sock_sendmsg);
20911da177e4SLinus Torvalds EXPORT_SYMBOL(sock_unregister);
20921da177e4SLinus Torvalds EXPORT_SYMBOL(sock_wake_async);
20931da177e4SLinus Torvalds EXPORT_SYMBOL(sockfd_lookup);
20941da177e4SLinus Torvalds EXPORT_SYMBOL(kernel_sendmsg);
20951da177e4SLinus Torvalds EXPORT_SYMBOL(kernel_recvmsg);
2096