11da177e4SLinus Torvalds /* 21da177e4SLinus Torvalds * NET An implementation of the SOCKET network access protocol. 31da177e4SLinus Torvalds * 41da177e4SLinus Torvalds * Version: @(#)socket.c 1.1.93 18/02/95 51da177e4SLinus Torvalds * 61da177e4SLinus Torvalds * Authors: Orest Zborowski, <obz@Kodak.COM> 702c30a84SJesper Juhl * Ross Biro 81da177e4SLinus Torvalds * Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG> 91da177e4SLinus Torvalds * 101da177e4SLinus Torvalds * Fixes: 111da177e4SLinus Torvalds * Anonymous : NOTSOCK/BADF cleanup. Error fix in 121da177e4SLinus Torvalds * shutdown() 131da177e4SLinus Torvalds * Alan Cox : verify_area() fixes 141da177e4SLinus Torvalds * Alan Cox : Removed DDI 151da177e4SLinus Torvalds * Jonathan Kamens : SOCK_DGRAM reconnect bug 161da177e4SLinus Torvalds * Alan Cox : Moved a load of checks to the very 171da177e4SLinus Torvalds * top level. 181da177e4SLinus Torvalds * Alan Cox : Move address structures to/from user 191da177e4SLinus Torvalds * mode above the protocol layers. 201da177e4SLinus Torvalds * Rob Janssen : Allow 0 length sends. 211da177e4SLinus Torvalds * Alan Cox : Asynchronous I/O support (cribbed from the 221da177e4SLinus Torvalds * tty drivers). 231da177e4SLinus Torvalds * Niibe Yutaka : Asynchronous I/O for writes (4.4BSD style) 241da177e4SLinus Torvalds * Jeff Uphoff : Made max number of sockets command-line 251da177e4SLinus Torvalds * configurable. 261da177e4SLinus Torvalds * Matti Aarnio : Made the number of sockets dynamic, 271da177e4SLinus Torvalds * to be allocated when needed, and mr. 281da177e4SLinus Torvalds * Uphoff's max is used as max to be 291da177e4SLinus Torvalds * allowed to allocate. 301da177e4SLinus Torvalds * Linus : Argh. removed all the socket allocation 311da177e4SLinus Torvalds * altogether: it's in the inode now. 321da177e4SLinus Torvalds * Alan Cox : Made sock_alloc()/sock_release() public 331da177e4SLinus Torvalds * for NetROM and future kernel nfsd type 341da177e4SLinus Torvalds * stuff. 351da177e4SLinus Torvalds * Alan Cox : sendmsg/recvmsg basics. 361da177e4SLinus Torvalds * Tom Dyas : Export net symbols. 371da177e4SLinus Torvalds * Marcin Dalecki : Fixed problems with CONFIG_NET="n". 381da177e4SLinus Torvalds * Alan Cox : Added thread locking to sys_* calls 391da177e4SLinus Torvalds * for sockets. May have errors at the 401da177e4SLinus Torvalds * moment. 411da177e4SLinus Torvalds * Kevin Buhr : Fixed the dumb errors in the above. 421da177e4SLinus Torvalds * Andi Kleen : Some small cleanups, optimizations, 431da177e4SLinus Torvalds * and fixed a copy_from_user() bug. 441da177e4SLinus Torvalds * Tigran Aivazian : sys_send(args) calls sys_sendto(args, NULL, 0) 451da177e4SLinus Torvalds * Tigran Aivazian : Made listen(2) backlog sanity checks 461da177e4SLinus Torvalds * protocol-independent 471da177e4SLinus Torvalds * 481da177e4SLinus Torvalds * 491da177e4SLinus Torvalds * This program is free software; you can redistribute it and/or 501da177e4SLinus Torvalds * modify it under the terms of the GNU General Public License 511da177e4SLinus Torvalds * as published by the Free Software Foundation; either version 521da177e4SLinus Torvalds * 2 of the License, or (at your option) any later version. 531da177e4SLinus Torvalds * 541da177e4SLinus Torvalds * 551da177e4SLinus Torvalds * This module is effectively the top level interface to the BSD socket 561da177e4SLinus Torvalds * paradigm. 571da177e4SLinus Torvalds * 581da177e4SLinus Torvalds * Based upon Swansea University Computer Society NET3.039 591da177e4SLinus Torvalds */ 601da177e4SLinus Torvalds 611da177e4SLinus Torvalds #include <linux/config.h> 621da177e4SLinus Torvalds #include <linux/mm.h> 631da177e4SLinus Torvalds #include <linux/smp_lock.h> 641da177e4SLinus Torvalds #include <linux/socket.h> 651da177e4SLinus Torvalds #include <linux/file.h> 661da177e4SLinus Torvalds #include <linux/net.h> 671da177e4SLinus Torvalds #include <linux/interrupt.h> 681da177e4SLinus Torvalds #include <linux/netdevice.h> 691da177e4SLinus Torvalds #include <linux/proc_fs.h> 701da177e4SLinus Torvalds #include <linux/seq_file.h> 71*4a3e2f71SArjan van de Ven #include <linux/mutex.h> 721da177e4SLinus Torvalds #include <linux/wanrouter.h> 731da177e4SLinus Torvalds #include <linux/if_bridge.h> 7420380731SArnaldo Carvalho de Melo #include <linux/if_frad.h> 7520380731SArnaldo Carvalho de Melo #include <linux/if_vlan.h> 761da177e4SLinus Torvalds #include <linux/init.h> 771da177e4SLinus Torvalds #include <linux/poll.h> 781da177e4SLinus Torvalds #include <linux/cache.h> 791da177e4SLinus Torvalds #include <linux/module.h> 801da177e4SLinus Torvalds #include <linux/highmem.h> 811da177e4SLinus Torvalds #include <linux/divert.h> 821da177e4SLinus Torvalds #include <linux/mount.h> 831da177e4SLinus Torvalds #include <linux/security.h> 841da177e4SLinus Torvalds #include <linux/syscalls.h> 851da177e4SLinus Torvalds #include <linux/compat.h> 861da177e4SLinus Torvalds #include <linux/kmod.h> 873ec3b2fbSDavid Woodhouse #include <linux/audit.h> 88d86b5e0eSAdrian Bunk #include <linux/wireless.h> 891da177e4SLinus Torvalds 901da177e4SLinus Torvalds #include <asm/uaccess.h> 911da177e4SLinus Torvalds #include <asm/unistd.h> 921da177e4SLinus Torvalds 931da177e4SLinus Torvalds #include <net/compat.h> 941da177e4SLinus Torvalds 951da177e4SLinus Torvalds #include <net/sock.h> 961da177e4SLinus Torvalds #include <linux/netfilter.h> 971da177e4SLinus Torvalds 981da177e4SLinus Torvalds static int sock_no_open(struct inode *irrelevant, struct file *dontcare); 991da177e4SLinus Torvalds static ssize_t sock_aio_read(struct kiocb *iocb, char __user *buf, 1001da177e4SLinus Torvalds size_t size, loff_t pos); 1011da177e4SLinus Torvalds static ssize_t sock_aio_write(struct kiocb *iocb, const char __user *buf, 1021da177e4SLinus Torvalds size_t size, loff_t pos); 1031da177e4SLinus Torvalds static int sock_mmap(struct file *file, struct vm_area_struct * vma); 1041da177e4SLinus Torvalds 1051da177e4SLinus Torvalds static int sock_close(struct inode *inode, struct file *file); 1061da177e4SLinus Torvalds static unsigned int sock_poll(struct file *file, 1071da177e4SLinus Torvalds struct poll_table_struct *wait); 1081da177e4SLinus Torvalds static long sock_ioctl(struct file *file, 1091da177e4SLinus Torvalds unsigned int cmd, unsigned long arg); 1101da177e4SLinus Torvalds static int sock_fasync(int fd, struct file *filp, int on); 1111da177e4SLinus Torvalds static ssize_t sock_readv(struct file *file, const struct iovec *vector, 1121da177e4SLinus Torvalds unsigned long count, loff_t *ppos); 1131da177e4SLinus Torvalds static ssize_t sock_writev(struct file *file, const struct iovec *vector, 1141da177e4SLinus Torvalds unsigned long count, loff_t *ppos); 1151da177e4SLinus Torvalds static ssize_t sock_sendpage(struct file *file, struct page *page, 1161da177e4SLinus Torvalds int offset, size_t size, loff_t *ppos, int more); 1171da177e4SLinus Torvalds 1181da177e4SLinus Torvalds 1191da177e4SLinus Torvalds /* 1201da177e4SLinus Torvalds * Socket files have a set of 'special' operations as well as the generic file ones. These don't appear 1211da177e4SLinus Torvalds * in the operation structures but are done directly via the socketcall() multiplexor. 1221da177e4SLinus Torvalds */ 1231da177e4SLinus Torvalds 1241da177e4SLinus Torvalds static struct file_operations socket_file_ops = { 1251da177e4SLinus Torvalds .owner = THIS_MODULE, 1261da177e4SLinus Torvalds .llseek = no_llseek, 1271da177e4SLinus Torvalds .aio_read = sock_aio_read, 1281da177e4SLinus Torvalds .aio_write = sock_aio_write, 1291da177e4SLinus Torvalds .poll = sock_poll, 1301da177e4SLinus Torvalds .unlocked_ioctl = sock_ioctl, 1311da177e4SLinus Torvalds .mmap = sock_mmap, 1321da177e4SLinus Torvalds .open = sock_no_open, /* special open code to disallow open via /proc */ 1331da177e4SLinus Torvalds .release = sock_close, 1341da177e4SLinus Torvalds .fasync = sock_fasync, 1351da177e4SLinus Torvalds .readv = sock_readv, 1361da177e4SLinus Torvalds .writev = sock_writev, 1371da177e4SLinus Torvalds .sendpage = sock_sendpage 1381da177e4SLinus Torvalds }; 1391da177e4SLinus Torvalds 1401da177e4SLinus Torvalds /* 1411da177e4SLinus Torvalds * The protocol list. Each protocol is registered in here. 1421da177e4SLinus Torvalds */ 1431da177e4SLinus Torvalds 1441da177e4SLinus Torvalds static struct net_proto_family *net_families[NPROTO]; 1451da177e4SLinus Torvalds 1461da177e4SLinus Torvalds #if defined(CONFIG_SMP) || defined(CONFIG_PREEMPT) 1471da177e4SLinus Torvalds static atomic_t net_family_lockct = ATOMIC_INIT(0); 1481da177e4SLinus Torvalds static DEFINE_SPINLOCK(net_family_lock); 1491da177e4SLinus Torvalds 1501da177e4SLinus Torvalds /* The strategy is: modifications net_family vector are short, do not 1511da177e4SLinus Torvalds sleep and veeery rare, but read access should be free of any exclusive 1521da177e4SLinus Torvalds locks. 1531da177e4SLinus Torvalds */ 1541da177e4SLinus Torvalds 1551da177e4SLinus Torvalds static void net_family_write_lock(void) 1561da177e4SLinus Torvalds { 1571da177e4SLinus Torvalds spin_lock(&net_family_lock); 1581da177e4SLinus Torvalds while (atomic_read(&net_family_lockct) != 0) { 1591da177e4SLinus Torvalds spin_unlock(&net_family_lock); 1601da177e4SLinus Torvalds 1611da177e4SLinus Torvalds yield(); 1621da177e4SLinus Torvalds 1631da177e4SLinus Torvalds spin_lock(&net_family_lock); 1641da177e4SLinus Torvalds } 1651da177e4SLinus Torvalds } 1661da177e4SLinus Torvalds 1671da177e4SLinus Torvalds static __inline__ void net_family_write_unlock(void) 1681da177e4SLinus Torvalds { 1691da177e4SLinus Torvalds spin_unlock(&net_family_lock); 1701da177e4SLinus Torvalds } 1711da177e4SLinus Torvalds 1721da177e4SLinus Torvalds static __inline__ void net_family_read_lock(void) 1731da177e4SLinus Torvalds { 1741da177e4SLinus Torvalds atomic_inc(&net_family_lockct); 1751da177e4SLinus Torvalds spin_unlock_wait(&net_family_lock); 1761da177e4SLinus Torvalds } 1771da177e4SLinus Torvalds 1781da177e4SLinus Torvalds static __inline__ void net_family_read_unlock(void) 1791da177e4SLinus Torvalds { 1801da177e4SLinus Torvalds atomic_dec(&net_family_lockct); 1811da177e4SLinus Torvalds } 1821da177e4SLinus Torvalds 1831da177e4SLinus Torvalds #else 1841da177e4SLinus Torvalds #define net_family_write_lock() do { } while(0) 1851da177e4SLinus Torvalds #define net_family_write_unlock() do { } while(0) 1861da177e4SLinus Torvalds #define net_family_read_lock() do { } while(0) 1871da177e4SLinus Torvalds #define net_family_read_unlock() do { } while(0) 1881da177e4SLinus Torvalds #endif 1891da177e4SLinus Torvalds 1901da177e4SLinus Torvalds 1911da177e4SLinus Torvalds /* 1921da177e4SLinus Torvalds * Statistics counters of the socket lists 1931da177e4SLinus Torvalds */ 1941da177e4SLinus Torvalds 1951da177e4SLinus Torvalds static DEFINE_PER_CPU(int, sockets_in_use) = 0; 1961da177e4SLinus Torvalds 1971da177e4SLinus Torvalds /* 1981da177e4SLinus Torvalds * Support routines. Move socket addresses back and forth across the kernel/user 1991da177e4SLinus Torvalds * divide and look after the messy bits. 2001da177e4SLinus Torvalds */ 2011da177e4SLinus Torvalds 2021da177e4SLinus Torvalds #define MAX_SOCK_ADDR 128 /* 108 for Unix domain - 2031da177e4SLinus Torvalds 16 for IP, 16 for IPX, 2041da177e4SLinus Torvalds 24 for IPv6, 2051da177e4SLinus Torvalds about 80 for AX.25 2061da177e4SLinus Torvalds must be at least one bigger than 2071da177e4SLinus Torvalds the AF_UNIX size (see net/unix/af_unix.c 2081da177e4SLinus Torvalds :unix_mkname()). 2091da177e4SLinus Torvalds */ 2101da177e4SLinus Torvalds 2111da177e4SLinus Torvalds /** 2121da177e4SLinus Torvalds * move_addr_to_kernel - copy a socket address into kernel space 2131da177e4SLinus Torvalds * @uaddr: Address in user space 2141da177e4SLinus Torvalds * @kaddr: Address in kernel space 2151da177e4SLinus Torvalds * @ulen: Length in user space 2161da177e4SLinus Torvalds * 2171da177e4SLinus Torvalds * The address is copied into kernel space. If the provided address is 2181da177e4SLinus Torvalds * too long an error code of -EINVAL is returned. If the copy gives 2191da177e4SLinus Torvalds * invalid addresses -EFAULT is returned. On a success 0 is returned. 2201da177e4SLinus Torvalds */ 2211da177e4SLinus Torvalds 2221da177e4SLinus Torvalds int move_addr_to_kernel(void __user *uaddr, int ulen, void *kaddr) 2231da177e4SLinus Torvalds { 2241da177e4SLinus Torvalds if(ulen<0||ulen>MAX_SOCK_ADDR) 2251da177e4SLinus Torvalds return -EINVAL; 2261da177e4SLinus Torvalds if(ulen==0) 2271da177e4SLinus Torvalds return 0; 2281da177e4SLinus Torvalds if(copy_from_user(kaddr,uaddr,ulen)) 2291da177e4SLinus Torvalds return -EFAULT; 2303ec3b2fbSDavid Woodhouse return audit_sockaddr(ulen, kaddr); 2311da177e4SLinus Torvalds } 2321da177e4SLinus Torvalds 2331da177e4SLinus Torvalds /** 2341da177e4SLinus Torvalds * move_addr_to_user - copy an address to user space 2351da177e4SLinus Torvalds * @kaddr: kernel space address 2361da177e4SLinus Torvalds * @klen: length of address in kernel 2371da177e4SLinus Torvalds * @uaddr: user space address 2381da177e4SLinus Torvalds * @ulen: pointer to user length field 2391da177e4SLinus Torvalds * 2401da177e4SLinus Torvalds * The value pointed to by ulen on entry is the buffer length available. 2411da177e4SLinus Torvalds * This is overwritten with the buffer space used. -EINVAL is returned 2421da177e4SLinus Torvalds * if an overlong buffer is specified or a negative buffer size. -EFAULT 2431da177e4SLinus Torvalds * is returned if either the buffer or the length field are not 2441da177e4SLinus Torvalds * accessible. 2451da177e4SLinus Torvalds * After copying the data up to the limit the user specifies, the true 2461da177e4SLinus Torvalds * length of the data is written over the length limit the user 2471da177e4SLinus Torvalds * specified. Zero is returned for a success. 2481da177e4SLinus Torvalds */ 2491da177e4SLinus Torvalds 2501da177e4SLinus Torvalds int move_addr_to_user(void *kaddr, int klen, void __user *uaddr, int __user *ulen) 2511da177e4SLinus Torvalds { 2521da177e4SLinus Torvalds int err; 2531da177e4SLinus Torvalds int len; 2541da177e4SLinus Torvalds 2551da177e4SLinus Torvalds if((err=get_user(len, ulen))) 2561da177e4SLinus Torvalds return err; 2571da177e4SLinus Torvalds if(len>klen) 2581da177e4SLinus Torvalds len=klen; 2591da177e4SLinus Torvalds if(len<0 || len> MAX_SOCK_ADDR) 2601da177e4SLinus Torvalds return -EINVAL; 2611da177e4SLinus Torvalds if(len) 2621da177e4SLinus Torvalds { 2631da177e4SLinus Torvalds if(copy_to_user(uaddr,kaddr,len)) 2641da177e4SLinus Torvalds return -EFAULT; 2651da177e4SLinus Torvalds } 2661da177e4SLinus Torvalds /* 2671da177e4SLinus Torvalds * "fromlen shall refer to the value before truncation.." 2681da177e4SLinus Torvalds * 1003.1g 2691da177e4SLinus Torvalds */ 2701da177e4SLinus Torvalds return __put_user(klen, ulen); 2711da177e4SLinus Torvalds } 2721da177e4SLinus Torvalds 2731da177e4SLinus Torvalds #define SOCKFS_MAGIC 0x534F434B 2741da177e4SLinus Torvalds 275ba89966cSEric Dumazet static kmem_cache_t * sock_inode_cachep __read_mostly; 2761da177e4SLinus Torvalds 2771da177e4SLinus Torvalds static struct inode *sock_alloc_inode(struct super_block *sb) 2781da177e4SLinus Torvalds { 2791da177e4SLinus Torvalds struct socket_alloc *ei; 2801da177e4SLinus Torvalds ei = (struct socket_alloc *)kmem_cache_alloc(sock_inode_cachep, SLAB_KERNEL); 2811da177e4SLinus Torvalds if (!ei) 2821da177e4SLinus Torvalds return NULL; 2831da177e4SLinus Torvalds init_waitqueue_head(&ei->socket.wait); 2841da177e4SLinus Torvalds 2851da177e4SLinus Torvalds ei->socket.fasync_list = NULL; 2861da177e4SLinus Torvalds ei->socket.state = SS_UNCONNECTED; 2871da177e4SLinus Torvalds ei->socket.flags = 0; 2881da177e4SLinus Torvalds ei->socket.ops = NULL; 2891da177e4SLinus Torvalds ei->socket.sk = NULL; 2901da177e4SLinus Torvalds ei->socket.file = NULL; 2911da177e4SLinus Torvalds ei->socket.flags = 0; 2921da177e4SLinus Torvalds 2931da177e4SLinus Torvalds return &ei->vfs_inode; 2941da177e4SLinus Torvalds } 2951da177e4SLinus Torvalds 2961da177e4SLinus Torvalds static void sock_destroy_inode(struct inode *inode) 2971da177e4SLinus Torvalds { 2981da177e4SLinus Torvalds kmem_cache_free(sock_inode_cachep, 2991da177e4SLinus Torvalds container_of(inode, struct socket_alloc, vfs_inode)); 3001da177e4SLinus Torvalds } 3011da177e4SLinus Torvalds 3021da177e4SLinus Torvalds static void init_once(void * foo, kmem_cache_t * cachep, unsigned long flags) 3031da177e4SLinus Torvalds { 3041da177e4SLinus Torvalds struct socket_alloc *ei = (struct socket_alloc *) foo; 3051da177e4SLinus Torvalds 3061da177e4SLinus Torvalds if ((flags & (SLAB_CTOR_VERIFY|SLAB_CTOR_CONSTRUCTOR)) == 3071da177e4SLinus Torvalds SLAB_CTOR_CONSTRUCTOR) 3081da177e4SLinus Torvalds inode_init_once(&ei->vfs_inode); 3091da177e4SLinus Torvalds } 3101da177e4SLinus Torvalds 3111da177e4SLinus Torvalds static int init_inodecache(void) 3121da177e4SLinus Torvalds { 3131da177e4SLinus Torvalds sock_inode_cachep = kmem_cache_create("sock_inode_cache", 3141da177e4SLinus Torvalds sizeof(struct socket_alloc), 3151da177e4SLinus Torvalds 0, SLAB_HWCACHE_ALIGN|SLAB_RECLAIM_ACCOUNT, 3161da177e4SLinus Torvalds init_once, NULL); 3171da177e4SLinus Torvalds if (sock_inode_cachep == NULL) 3181da177e4SLinus Torvalds return -ENOMEM; 3191da177e4SLinus Torvalds return 0; 3201da177e4SLinus Torvalds } 3211da177e4SLinus Torvalds 3221da177e4SLinus Torvalds static struct super_operations sockfs_ops = { 3231da177e4SLinus Torvalds .alloc_inode = sock_alloc_inode, 3241da177e4SLinus Torvalds .destroy_inode =sock_destroy_inode, 3251da177e4SLinus Torvalds .statfs = simple_statfs, 3261da177e4SLinus Torvalds }; 3271da177e4SLinus Torvalds 3281da177e4SLinus Torvalds static struct super_block *sockfs_get_sb(struct file_system_type *fs_type, 3291da177e4SLinus Torvalds int flags, const char *dev_name, void *data) 3301da177e4SLinus Torvalds { 3311da177e4SLinus Torvalds return get_sb_pseudo(fs_type, "socket:", &sockfs_ops, SOCKFS_MAGIC); 3321da177e4SLinus Torvalds } 3331da177e4SLinus Torvalds 334ba89966cSEric Dumazet static struct vfsmount *sock_mnt __read_mostly; 3351da177e4SLinus Torvalds 3361da177e4SLinus Torvalds static struct file_system_type sock_fs_type = { 3371da177e4SLinus Torvalds .name = "sockfs", 3381da177e4SLinus Torvalds .get_sb = sockfs_get_sb, 3391da177e4SLinus Torvalds .kill_sb = kill_anon_super, 3401da177e4SLinus Torvalds }; 3411da177e4SLinus Torvalds static int sockfs_delete_dentry(struct dentry *dentry) 3421da177e4SLinus Torvalds { 3431da177e4SLinus Torvalds return 1; 3441da177e4SLinus Torvalds } 3451da177e4SLinus Torvalds static struct dentry_operations sockfs_dentry_operations = { 3461da177e4SLinus Torvalds .d_delete = sockfs_delete_dentry, 3471da177e4SLinus Torvalds }; 3481da177e4SLinus Torvalds 3491da177e4SLinus Torvalds /* 3501da177e4SLinus Torvalds * Obtains the first available file descriptor and sets it up for use. 3511da177e4SLinus Torvalds * 35239d8c1b6SDavid S. Miller * These functions create file structures and maps them to fd space 35339d8c1b6SDavid S. Miller * of the current process. On success it returns file descriptor 3541da177e4SLinus Torvalds * and file struct implicitly stored in sock->file. 3551da177e4SLinus Torvalds * Note that another thread may close file descriptor before we return 3561da177e4SLinus Torvalds * from this function. We use the fact that now we do not refer 3571da177e4SLinus Torvalds * to socket after mapping. If one day we will need it, this 3581da177e4SLinus Torvalds * function will increment ref. count on file by 1. 3591da177e4SLinus Torvalds * 3601da177e4SLinus Torvalds * In any case returned fd MAY BE not valid! 3611da177e4SLinus Torvalds * This race condition is unavoidable 3621da177e4SLinus Torvalds * with shared fd spaces, we cannot solve it inside kernel, 3631da177e4SLinus Torvalds * but we take care of internal coherence yet. 3641da177e4SLinus Torvalds */ 3651da177e4SLinus Torvalds 36639d8c1b6SDavid S. Miller static int sock_alloc_fd(struct file **filep) 3671da177e4SLinus Torvalds { 3681da177e4SLinus Torvalds int fd; 3691da177e4SLinus Torvalds 3701da177e4SLinus Torvalds fd = get_unused_fd(); 37139d8c1b6SDavid S. Miller if (likely(fd >= 0)) { 3721da177e4SLinus Torvalds struct file *file = get_empty_filp(); 3731da177e4SLinus Torvalds 37439d8c1b6SDavid S. Miller *filep = file; 37539d8c1b6SDavid S. Miller if (unlikely(!file)) { 3761da177e4SLinus Torvalds put_unused_fd(fd); 37739d8c1b6SDavid S. Miller return -ENFILE; 3781da177e4SLinus Torvalds } 37939d8c1b6SDavid S. Miller } else 38039d8c1b6SDavid S. Miller *filep = NULL; 38139d8c1b6SDavid S. Miller return fd; 38239d8c1b6SDavid S. Miller } 38339d8c1b6SDavid S. Miller 38439d8c1b6SDavid S. Miller static int sock_attach_fd(struct socket *sock, struct file *file) 38539d8c1b6SDavid S. Miller { 38639d8c1b6SDavid S. Miller struct qstr this; 38739d8c1b6SDavid S. Miller char name[32]; 3881da177e4SLinus Torvalds 389f31f5f05SEric Dumazet this.len = sprintf(name, "[%lu]", SOCK_INODE(sock)->i_ino); 3901da177e4SLinus Torvalds this.name = name; 3911da177e4SLinus Torvalds this.hash = SOCK_INODE(sock)->i_ino; 3921da177e4SLinus Torvalds 3931da177e4SLinus Torvalds file->f_dentry = d_alloc(sock_mnt->mnt_sb->s_root, &this); 39439d8c1b6SDavid S. Miller if (unlikely(!file->f_dentry)) 39539d8c1b6SDavid S. Miller return -ENOMEM; 39639d8c1b6SDavid S. Miller 3971da177e4SLinus Torvalds file->f_dentry->d_op = &sockfs_dentry_operations; 3981da177e4SLinus Torvalds d_add(file->f_dentry, SOCK_INODE(sock)); 3991da177e4SLinus Torvalds file->f_vfsmnt = mntget(sock_mnt); 4001da177e4SLinus Torvalds file->f_mapping = file->f_dentry->d_inode->i_mapping; 4011da177e4SLinus Torvalds 4021da177e4SLinus Torvalds sock->file = file; 4031da177e4SLinus Torvalds file->f_op = SOCK_INODE(sock)->i_fop = &socket_file_ops; 4041da177e4SLinus Torvalds file->f_mode = FMODE_READ | FMODE_WRITE; 4051da177e4SLinus Torvalds file->f_flags = O_RDWR; 4061da177e4SLinus Torvalds file->f_pos = 0; 40707dc3f07SBenjamin LaHaise file->private_data = sock; 40839d8c1b6SDavid S. Miller 40939d8c1b6SDavid S. Miller return 0; 4101da177e4SLinus Torvalds } 4111da177e4SLinus Torvalds 41239d8c1b6SDavid S. Miller int sock_map_fd(struct socket *sock) 41339d8c1b6SDavid S. Miller { 41439d8c1b6SDavid S. Miller struct file *newfile; 41539d8c1b6SDavid S. Miller int fd = sock_alloc_fd(&newfile); 41639d8c1b6SDavid S. Miller 41739d8c1b6SDavid S. Miller if (likely(fd >= 0)) { 41839d8c1b6SDavid S. Miller int err = sock_attach_fd(sock, newfile); 41939d8c1b6SDavid S. Miller 42039d8c1b6SDavid S. Miller if (unlikely(err < 0)) { 42139d8c1b6SDavid S. Miller put_filp(newfile); 42239d8c1b6SDavid S. Miller put_unused_fd(fd); 42339d8c1b6SDavid S. Miller return err; 42439d8c1b6SDavid S. Miller } 42539d8c1b6SDavid S. Miller fd_install(fd, newfile); 42639d8c1b6SDavid S. Miller } 4271da177e4SLinus Torvalds return fd; 4281da177e4SLinus Torvalds } 4291da177e4SLinus Torvalds 4306cb153caSBenjamin LaHaise static struct socket *sock_from_file(struct file *file, int *err) 4316cb153caSBenjamin LaHaise { 4326cb153caSBenjamin LaHaise struct inode *inode; 4336cb153caSBenjamin LaHaise struct socket *sock; 4346cb153caSBenjamin LaHaise 4356cb153caSBenjamin LaHaise if (file->f_op == &socket_file_ops) 4366cb153caSBenjamin LaHaise return file->private_data; /* set in sock_map_fd */ 4376cb153caSBenjamin LaHaise 4386cb153caSBenjamin LaHaise inode = file->f_dentry->d_inode; 4396cb153caSBenjamin LaHaise if (!S_ISSOCK(inode->i_mode)) { 4406cb153caSBenjamin LaHaise *err = -ENOTSOCK; 4416cb153caSBenjamin LaHaise return NULL; 4426cb153caSBenjamin LaHaise } 4436cb153caSBenjamin LaHaise 4446cb153caSBenjamin LaHaise sock = SOCKET_I(inode); 4456cb153caSBenjamin LaHaise if (sock->file != file) { 4466cb153caSBenjamin LaHaise printk(KERN_ERR "socki_lookup: socket file changed!\n"); 4476cb153caSBenjamin LaHaise sock->file = file; 4486cb153caSBenjamin LaHaise } 4496cb153caSBenjamin LaHaise return sock; 4506cb153caSBenjamin LaHaise } 4516cb153caSBenjamin LaHaise 4521da177e4SLinus Torvalds /** 4531da177e4SLinus Torvalds * sockfd_lookup - Go from a file number to its socket slot 4541da177e4SLinus Torvalds * @fd: file handle 4551da177e4SLinus Torvalds * @err: pointer to an error code return 4561da177e4SLinus Torvalds * 4571da177e4SLinus Torvalds * The file handle passed in is locked and the socket it is bound 4581da177e4SLinus Torvalds * too is returned. If an error occurs the err pointer is overwritten 4591da177e4SLinus Torvalds * with a negative errno code and NULL is returned. The function checks 4601da177e4SLinus Torvalds * for both invalid handles and passing a handle which is not a socket. 4611da177e4SLinus Torvalds * 4621da177e4SLinus Torvalds * On a success the socket object pointer is returned. 4631da177e4SLinus Torvalds */ 4641da177e4SLinus Torvalds 4651da177e4SLinus Torvalds struct socket *sockfd_lookup(int fd, int *err) 4661da177e4SLinus Torvalds { 4671da177e4SLinus Torvalds struct file *file; 4681da177e4SLinus Torvalds struct socket *sock; 4691da177e4SLinus Torvalds 4706cb153caSBenjamin LaHaise if (!(file = fget(fd))) { 4711da177e4SLinus Torvalds *err = -EBADF; 4721da177e4SLinus Torvalds return NULL; 4731da177e4SLinus Torvalds } 4746cb153caSBenjamin LaHaise sock = sock_from_file(file, err); 4756cb153caSBenjamin LaHaise if (!sock) 4761da177e4SLinus Torvalds fput(file); 4776cb153caSBenjamin LaHaise return sock; 4781da177e4SLinus Torvalds } 4791da177e4SLinus Torvalds 4806cb153caSBenjamin LaHaise static struct socket *sockfd_lookup_light(int fd, int *err, int *fput_needed) 4816cb153caSBenjamin LaHaise { 4826cb153caSBenjamin LaHaise struct file *file; 4836cb153caSBenjamin LaHaise struct socket *sock; 4846cb153caSBenjamin LaHaise 4856cb153caSBenjamin LaHaise file = fget_light(fd, fput_needed); 4866cb153caSBenjamin LaHaise if (file) { 4876cb153caSBenjamin LaHaise sock = sock_from_file(file, err); 4886cb153caSBenjamin LaHaise if (sock) 4891da177e4SLinus Torvalds return sock; 4906cb153caSBenjamin LaHaise fput_light(file, *fput_needed); 4916cb153caSBenjamin LaHaise } 4926cb153caSBenjamin LaHaise return NULL; 4931da177e4SLinus Torvalds } 4941da177e4SLinus Torvalds 4951da177e4SLinus Torvalds /** 4961da177e4SLinus Torvalds * sock_alloc - allocate a socket 4971da177e4SLinus Torvalds * 4981da177e4SLinus Torvalds * Allocate a new inode and socket object. The two are bound together 4991da177e4SLinus Torvalds * and initialised. The socket is then returned. If we are out of inodes 5001da177e4SLinus Torvalds * NULL is returned. 5011da177e4SLinus Torvalds */ 5021da177e4SLinus Torvalds 5031da177e4SLinus Torvalds static struct socket *sock_alloc(void) 5041da177e4SLinus Torvalds { 5051da177e4SLinus Torvalds struct inode * inode; 5061da177e4SLinus Torvalds struct socket * sock; 5071da177e4SLinus Torvalds 5081da177e4SLinus Torvalds inode = new_inode(sock_mnt->mnt_sb); 5091da177e4SLinus Torvalds if (!inode) 5101da177e4SLinus Torvalds return NULL; 5111da177e4SLinus Torvalds 5121da177e4SLinus Torvalds sock = SOCKET_I(inode); 5131da177e4SLinus Torvalds 5141da177e4SLinus Torvalds inode->i_mode = S_IFSOCK|S_IRWXUGO; 5151da177e4SLinus Torvalds inode->i_uid = current->fsuid; 5161da177e4SLinus Torvalds inode->i_gid = current->fsgid; 5171da177e4SLinus Torvalds 5181da177e4SLinus Torvalds get_cpu_var(sockets_in_use)++; 5191da177e4SLinus Torvalds put_cpu_var(sockets_in_use); 5201da177e4SLinus Torvalds return sock; 5211da177e4SLinus Torvalds } 5221da177e4SLinus Torvalds 5231da177e4SLinus Torvalds /* 5241da177e4SLinus Torvalds * In theory you can't get an open on this inode, but /proc provides 5251da177e4SLinus Torvalds * a back door. Remember to keep it shut otherwise you'll let the 5261da177e4SLinus Torvalds * creepy crawlies in. 5271da177e4SLinus Torvalds */ 5281da177e4SLinus Torvalds 5291da177e4SLinus Torvalds static int sock_no_open(struct inode *irrelevant, struct file *dontcare) 5301da177e4SLinus Torvalds { 5311da177e4SLinus Torvalds return -ENXIO; 5321da177e4SLinus Torvalds } 5331da177e4SLinus Torvalds 5341da177e4SLinus Torvalds struct file_operations bad_sock_fops = { 5351da177e4SLinus Torvalds .owner = THIS_MODULE, 5361da177e4SLinus Torvalds .open = sock_no_open, 5371da177e4SLinus Torvalds }; 5381da177e4SLinus Torvalds 5391da177e4SLinus Torvalds /** 5401da177e4SLinus Torvalds * sock_release - close a socket 5411da177e4SLinus Torvalds * @sock: socket to close 5421da177e4SLinus Torvalds * 5431da177e4SLinus Torvalds * The socket is released from the protocol stack if it has a release 5441da177e4SLinus Torvalds * callback, and the inode is then released if the socket is bound to 5451da177e4SLinus Torvalds * an inode not a file. 5461da177e4SLinus Torvalds */ 5471da177e4SLinus Torvalds 5481da177e4SLinus Torvalds void sock_release(struct socket *sock) 5491da177e4SLinus Torvalds { 5501da177e4SLinus Torvalds if (sock->ops) { 5511da177e4SLinus Torvalds struct module *owner = sock->ops->owner; 5521da177e4SLinus Torvalds 5531da177e4SLinus Torvalds sock->ops->release(sock); 5541da177e4SLinus Torvalds sock->ops = NULL; 5551da177e4SLinus Torvalds module_put(owner); 5561da177e4SLinus Torvalds } 5571da177e4SLinus Torvalds 5581da177e4SLinus Torvalds if (sock->fasync_list) 5591da177e4SLinus Torvalds printk(KERN_ERR "sock_release: fasync list not empty!\n"); 5601da177e4SLinus Torvalds 5611da177e4SLinus Torvalds get_cpu_var(sockets_in_use)--; 5621da177e4SLinus Torvalds put_cpu_var(sockets_in_use); 5631da177e4SLinus Torvalds if (!sock->file) { 5641da177e4SLinus Torvalds iput(SOCK_INODE(sock)); 5651da177e4SLinus Torvalds return; 5661da177e4SLinus Torvalds } 5671da177e4SLinus Torvalds sock->file=NULL; 5681da177e4SLinus Torvalds } 5691da177e4SLinus Torvalds 5701da177e4SLinus Torvalds static inline int __sock_sendmsg(struct kiocb *iocb, struct socket *sock, 5711da177e4SLinus Torvalds struct msghdr *msg, size_t size) 5721da177e4SLinus Torvalds { 5731da177e4SLinus Torvalds struct sock_iocb *si = kiocb_to_siocb(iocb); 5741da177e4SLinus Torvalds int err; 5751da177e4SLinus Torvalds 5761da177e4SLinus Torvalds si->sock = sock; 5771da177e4SLinus Torvalds si->scm = NULL; 5781da177e4SLinus Torvalds si->msg = msg; 5791da177e4SLinus Torvalds si->size = size; 5801da177e4SLinus Torvalds 5811da177e4SLinus Torvalds err = security_socket_sendmsg(sock, msg, size); 5821da177e4SLinus Torvalds if (err) 5831da177e4SLinus Torvalds return err; 5841da177e4SLinus Torvalds 5851da177e4SLinus Torvalds return sock->ops->sendmsg(iocb, sock, msg, size); 5861da177e4SLinus Torvalds } 5871da177e4SLinus Torvalds 5881da177e4SLinus Torvalds int sock_sendmsg(struct socket *sock, struct msghdr *msg, size_t size) 5891da177e4SLinus Torvalds { 5901da177e4SLinus Torvalds struct kiocb iocb; 5911da177e4SLinus Torvalds struct sock_iocb siocb; 5921da177e4SLinus Torvalds int ret; 5931da177e4SLinus Torvalds 5941da177e4SLinus Torvalds init_sync_kiocb(&iocb, NULL); 5951da177e4SLinus Torvalds iocb.private = &siocb; 5961da177e4SLinus Torvalds ret = __sock_sendmsg(&iocb, sock, msg, size); 5971da177e4SLinus Torvalds if (-EIOCBQUEUED == ret) 5981da177e4SLinus Torvalds ret = wait_on_sync_kiocb(&iocb); 5991da177e4SLinus Torvalds return ret; 6001da177e4SLinus Torvalds } 6011da177e4SLinus Torvalds 6021da177e4SLinus Torvalds int kernel_sendmsg(struct socket *sock, struct msghdr *msg, 6031da177e4SLinus Torvalds struct kvec *vec, size_t num, size_t size) 6041da177e4SLinus Torvalds { 6051da177e4SLinus Torvalds mm_segment_t oldfs = get_fs(); 6061da177e4SLinus Torvalds int result; 6071da177e4SLinus Torvalds 6081da177e4SLinus Torvalds set_fs(KERNEL_DS); 6091da177e4SLinus Torvalds /* 6101da177e4SLinus Torvalds * the following is safe, since for compiler definitions of kvec and 6111da177e4SLinus Torvalds * iovec are identical, yielding the same in-core layout and alignment 6121da177e4SLinus Torvalds */ 6131da177e4SLinus Torvalds msg->msg_iov = (struct iovec *)vec, 6141da177e4SLinus Torvalds msg->msg_iovlen = num; 6151da177e4SLinus Torvalds result = sock_sendmsg(sock, msg, size); 6161da177e4SLinus Torvalds set_fs(oldfs); 6171da177e4SLinus Torvalds return result; 6181da177e4SLinus Torvalds } 6191da177e4SLinus Torvalds 6201da177e4SLinus Torvalds static inline int __sock_recvmsg(struct kiocb *iocb, struct socket *sock, 6211da177e4SLinus Torvalds struct msghdr *msg, size_t size, int flags) 6221da177e4SLinus Torvalds { 6231da177e4SLinus Torvalds int err; 6241da177e4SLinus Torvalds struct sock_iocb *si = kiocb_to_siocb(iocb); 6251da177e4SLinus Torvalds 6261da177e4SLinus Torvalds si->sock = sock; 6271da177e4SLinus Torvalds si->scm = NULL; 6281da177e4SLinus Torvalds si->msg = msg; 6291da177e4SLinus Torvalds si->size = size; 6301da177e4SLinus Torvalds si->flags = flags; 6311da177e4SLinus Torvalds 6321da177e4SLinus Torvalds err = security_socket_recvmsg(sock, msg, size, flags); 6331da177e4SLinus Torvalds if (err) 6341da177e4SLinus Torvalds return err; 6351da177e4SLinus Torvalds 6361da177e4SLinus Torvalds return sock->ops->recvmsg(iocb, sock, msg, size, flags); 6371da177e4SLinus Torvalds } 6381da177e4SLinus Torvalds 6391da177e4SLinus Torvalds int sock_recvmsg(struct socket *sock, struct msghdr *msg, 6401da177e4SLinus Torvalds size_t size, int flags) 6411da177e4SLinus Torvalds { 6421da177e4SLinus Torvalds struct kiocb iocb; 6431da177e4SLinus Torvalds struct sock_iocb siocb; 6441da177e4SLinus Torvalds int ret; 6451da177e4SLinus Torvalds 6461da177e4SLinus Torvalds init_sync_kiocb(&iocb, NULL); 6471da177e4SLinus Torvalds iocb.private = &siocb; 6481da177e4SLinus Torvalds ret = __sock_recvmsg(&iocb, sock, msg, size, flags); 6491da177e4SLinus Torvalds if (-EIOCBQUEUED == ret) 6501da177e4SLinus Torvalds ret = wait_on_sync_kiocb(&iocb); 6511da177e4SLinus Torvalds return ret; 6521da177e4SLinus Torvalds } 6531da177e4SLinus Torvalds 6541da177e4SLinus Torvalds int kernel_recvmsg(struct socket *sock, struct msghdr *msg, 6551da177e4SLinus Torvalds struct kvec *vec, size_t num, 6561da177e4SLinus Torvalds size_t size, int flags) 6571da177e4SLinus Torvalds { 6581da177e4SLinus Torvalds mm_segment_t oldfs = get_fs(); 6591da177e4SLinus Torvalds int result; 6601da177e4SLinus Torvalds 6611da177e4SLinus Torvalds set_fs(KERNEL_DS); 6621da177e4SLinus Torvalds /* 6631da177e4SLinus Torvalds * the following is safe, since for compiler definitions of kvec and 6641da177e4SLinus Torvalds * iovec are identical, yielding the same in-core layout and alignment 6651da177e4SLinus Torvalds */ 6661da177e4SLinus Torvalds msg->msg_iov = (struct iovec *)vec, 6671da177e4SLinus Torvalds msg->msg_iovlen = num; 6681da177e4SLinus Torvalds result = sock_recvmsg(sock, msg, size, flags); 6691da177e4SLinus Torvalds set_fs(oldfs); 6701da177e4SLinus Torvalds return result; 6711da177e4SLinus Torvalds } 6721da177e4SLinus Torvalds 6731da177e4SLinus Torvalds static void sock_aio_dtor(struct kiocb *iocb) 6741da177e4SLinus Torvalds { 6751da177e4SLinus Torvalds kfree(iocb->private); 6761da177e4SLinus Torvalds } 6771da177e4SLinus Torvalds 67820380731SArnaldo Carvalho de Melo static ssize_t sock_sendpage(struct file *file, struct page *page, 6791da177e4SLinus Torvalds int offset, size_t size, loff_t *ppos, int more) 6801da177e4SLinus Torvalds { 6811da177e4SLinus Torvalds struct socket *sock; 6821da177e4SLinus Torvalds int flags; 6831da177e4SLinus Torvalds 684b69aee04SEric Dumazet sock = file->private_data; 6851da177e4SLinus Torvalds 6861da177e4SLinus Torvalds flags = !(file->f_flags & O_NONBLOCK) ? 0 : MSG_DONTWAIT; 6871da177e4SLinus Torvalds if (more) 6881da177e4SLinus Torvalds flags |= MSG_MORE; 6891da177e4SLinus Torvalds 6901da177e4SLinus Torvalds return sock->ops->sendpage(sock, page, offset, size, flags); 6911da177e4SLinus Torvalds } 6921da177e4SLinus Torvalds 693ce1d4d3eSChristoph Hellwig static struct sock_iocb *alloc_sock_iocb(struct kiocb *iocb, 694ce1d4d3eSChristoph Hellwig char __user *ubuf, size_t size, struct sock_iocb *siocb) 695ce1d4d3eSChristoph Hellwig { 696ce1d4d3eSChristoph Hellwig if (!is_sync_kiocb(iocb)) { 697ce1d4d3eSChristoph Hellwig siocb = kmalloc(sizeof(*siocb), GFP_KERNEL); 698ce1d4d3eSChristoph Hellwig if (!siocb) 699ce1d4d3eSChristoph Hellwig return NULL; 700ce1d4d3eSChristoph Hellwig iocb->ki_dtor = sock_aio_dtor; 701ce1d4d3eSChristoph Hellwig } 702ce1d4d3eSChristoph Hellwig 703ce1d4d3eSChristoph Hellwig siocb->kiocb = iocb; 704ce1d4d3eSChristoph Hellwig siocb->async_iov.iov_base = ubuf; 705ce1d4d3eSChristoph Hellwig siocb->async_iov.iov_len = size; 706ce1d4d3eSChristoph Hellwig 707ce1d4d3eSChristoph Hellwig iocb->private = siocb; 708ce1d4d3eSChristoph Hellwig return siocb; 709ce1d4d3eSChristoph Hellwig } 710ce1d4d3eSChristoph Hellwig 711ce1d4d3eSChristoph Hellwig static ssize_t do_sock_read(struct msghdr *msg, struct kiocb *iocb, 712ce1d4d3eSChristoph Hellwig struct file *file, struct iovec *iov, unsigned long nr_segs) 713ce1d4d3eSChristoph Hellwig { 714ce1d4d3eSChristoph Hellwig struct socket *sock = file->private_data; 715ce1d4d3eSChristoph Hellwig size_t size = 0; 716ce1d4d3eSChristoph Hellwig int i; 717ce1d4d3eSChristoph Hellwig 718ce1d4d3eSChristoph Hellwig for (i = 0 ; i < nr_segs ; i++) 719ce1d4d3eSChristoph Hellwig size += iov[i].iov_len; 720ce1d4d3eSChristoph Hellwig 721ce1d4d3eSChristoph Hellwig msg->msg_name = NULL; 722ce1d4d3eSChristoph Hellwig msg->msg_namelen = 0; 723ce1d4d3eSChristoph Hellwig msg->msg_control = NULL; 724ce1d4d3eSChristoph Hellwig msg->msg_controllen = 0; 725ce1d4d3eSChristoph Hellwig msg->msg_iov = (struct iovec *) iov; 726ce1d4d3eSChristoph Hellwig msg->msg_iovlen = nr_segs; 727ce1d4d3eSChristoph Hellwig msg->msg_flags = (file->f_flags & O_NONBLOCK) ? MSG_DONTWAIT : 0; 728ce1d4d3eSChristoph Hellwig 729ce1d4d3eSChristoph Hellwig return __sock_recvmsg(iocb, sock, msg, size, msg->msg_flags); 730ce1d4d3eSChristoph Hellwig } 731ce1d4d3eSChristoph Hellwig 732ce1d4d3eSChristoph Hellwig static ssize_t sock_readv(struct file *file, const struct iovec *iov, 733ce1d4d3eSChristoph Hellwig unsigned long nr_segs, loff_t *ppos) 734ce1d4d3eSChristoph Hellwig { 735ce1d4d3eSChristoph Hellwig struct kiocb iocb; 736ce1d4d3eSChristoph Hellwig struct sock_iocb siocb; 737ce1d4d3eSChristoph Hellwig struct msghdr msg; 738ce1d4d3eSChristoph Hellwig int ret; 739ce1d4d3eSChristoph Hellwig 740ce1d4d3eSChristoph Hellwig init_sync_kiocb(&iocb, NULL); 741ce1d4d3eSChristoph Hellwig iocb.private = &siocb; 742ce1d4d3eSChristoph Hellwig 743ce1d4d3eSChristoph Hellwig ret = do_sock_read(&msg, &iocb, file, (struct iovec *)iov, nr_segs); 744ce1d4d3eSChristoph Hellwig if (-EIOCBQUEUED == ret) 745ce1d4d3eSChristoph Hellwig ret = wait_on_sync_kiocb(&iocb); 746ce1d4d3eSChristoph Hellwig return ret; 747ce1d4d3eSChristoph Hellwig } 748ce1d4d3eSChristoph Hellwig 749ce1d4d3eSChristoph Hellwig static ssize_t sock_aio_read(struct kiocb *iocb, char __user *ubuf, 750ce1d4d3eSChristoph Hellwig size_t count, loff_t pos) 751ce1d4d3eSChristoph Hellwig { 752ce1d4d3eSChristoph Hellwig struct sock_iocb siocb, *x; 753ce1d4d3eSChristoph Hellwig 754ce1d4d3eSChristoph Hellwig if (pos != 0) 755ce1d4d3eSChristoph Hellwig return -ESPIPE; 756ce1d4d3eSChristoph Hellwig if (count == 0) /* Match SYS5 behaviour */ 757ce1d4d3eSChristoph Hellwig return 0; 758ce1d4d3eSChristoph Hellwig 759ce1d4d3eSChristoph Hellwig x = alloc_sock_iocb(iocb, ubuf, count, &siocb); 760ce1d4d3eSChristoph Hellwig if (!x) 761ce1d4d3eSChristoph Hellwig return -ENOMEM; 762ce1d4d3eSChristoph Hellwig return do_sock_read(&x->async_msg, iocb, iocb->ki_filp, 763ce1d4d3eSChristoph Hellwig &x->async_iov, 1); 764ce1d4d3eSChristoph Hellwig } 765ce1d4d3eSChristoph Hellwig 766ce1d4d3eSChristoph Hellwig static ssize_t do_sock_write(struct msghdr *msg, struct kiocb *iocb, 767ce1d4d3eSChristoph Hellwig struct file *file, struct iovec *iov, unsigned long nr_segs) 768ce1d4d3eSChristoph Hellwig { 769ce1d4d3eSChristoph Hellwig struct socket *sock = file->private_data; 770ce1d4d3eSChristoph Hellwig size_t size = 0; 771ce1d4d3eSChristoph Hellwig int i; 772ce1d4d3eSChristoph Hellwig 773ce1d4d3eSChristoph Hellwig for (i = 0 ; i < nr_segs ; i++) 774ce1d4d3eSChristoph Hellwig size += iov[i].iov_len; 775ce1d4d3eSChristoph Hellwig 776ce1d4d3eSChristoph Hellwig msg->msg_name = NULL; 777ce1d4d3eSChristoph Hellwig msg->msg_namelen = 0; 778ce1d4d3eSChristoph Hellwig msg->msg_control = NULL; 779ce1d4d3eSChristoph Hellwig msg->msg_controllen = 0; 780ce1d4d3eSChristoph Hellwig msg->msg_iov = (struct iovec *) iov; 781ce1d4d3eSChristoph Hellwig msg->msg_iovlen = nr_segs; 782ce1d4d3eSChristoph Hellwig msg->msg_flags = (file->f_flags & O_NONBLOCK) ? MSG_DONTWAIT : 0; 783ce1d4d3eSChristoph Hellwig if (sock->type == SOCK_SEQPACKET) 784ce1d4d3eSChristoph Hellwig msg->msg_flags |= MSG_EOR; 785ce1d4d3eSChristoph Hellwig 786ce1d4d3eSChristoph Hellwig return __sock_sendmsg(iocb, sock, msg, size); 787ce1d4d3eSChristoph Hellwig } 788ce1d4d3eSChristoph Hellwig 789ce1d4d3eSChristoph Hellwig static ssize_t sock_writev(struct file *file, const struct iovec *iov, 790ce1d4d3eSChristoph Hellwig unsigned long nr_segs, loff_t *ppos) 7911da177e4SLinus Torvalds { 7921da177e4SLinus Torvalds struct msghdr msg; 793ce1d4d3eSChristoph Hellwig struct kiocb iocb; 794ce1d4d3eSChristoph Hellwig struct sock_iocb siocb; 795ce1d4d3eSChristoph Hellwig int ret; 7961da177e4SLinus Torvalds 797ce1d4d3eSChristoph Hellwig init_sync_kiocb(&iocb, NULL); 798ce1d4d3eSChristoph Hellwig iocb.private = &siocb; 7991da177e4SLinus Torvalds 800ce1d4d3eSChristoph Hellwig ret = do_sock_write(&msg, &iocb, file, (struct iovec *)iov, nr_segs); 801ce1d4d3eSChristoph Hellwig if (-EIOCBQUEUED == ret) 802ce1d4d3eSChristoph Hellwig ret = wait_on_sync_kiocb(&iocb); 803ce1d4d3eSChristoph Hellwig return ret; 8041da177e4SLinus Torvalds } 8051da177e4SLinus Torvalds 806ce1d4d3eSChristoph Hellwig static ssize_t sock_aio_write(struct kiocb *iocb, const char __user *ubuf, 807ce1d4d3eSChristoph Hellwig size_t count, loff_t pos) 8081da177e4SLinus Torvalds { 809ce1d4d3eSChristoph Hellwig struct sock_iocb siocb, *x; 8101da177e4SLinus Torvalds 811ce1d4d3eSChristoph Hellwig if (pos != 0) 812ce1d4d3eSChristoph Hellwig return -ESPIPE; 813ce1d4d3eSChristoph Hellwig if (count == 0) /* Match SYS5 behaviour */ 814ce1d4d3eSChristoph Hellwig return 0; 815ce1d4d3eSChristoph Hellwig 816ce1d4d3eSChristoph Hellwig x = alloc_sock_iocb(iocb, (void __user *)ubuf, count, &siocb); 817ce1d4d3eSChristoph Hellwig if (!x) 818ce1d4d3eSChristoph Hellwig return -ENOMEM; 819ce1d4d3eSChristoph Hellwig 820ce1d4d3eSChristoph Hellwig return do_sock_write(&x->async_msg, iocb, iocb->ki_filp, 821ce1d4d3eSChristoph Hellwig &x->async_iov, 1); 8221da177e4SLinus Torvalds } 8231da177e4SLinus Torvalds 8241da177e4SLinus Torvalds 8251da177e4SLinus Torvalds /* 8261da177e4SLinus Torvalds * Atomic setting of ioctl hooks to avoid race 8271da177e4SLinus Torvalds * with module unload. 8281da177e4SLinus Torvalds */ 8291da177e4SLinus Torvalds 830*4a3e2f71SArjan van de Ven static DEFINE_MUTEX(br_ioctl_mutex); 8311da177e4SLinus Torvalds static int (*br_ioctl_hook)(unsigned int cmd, void __user *arg) = NULL; 8321da177e4SLinus Torvalds 8331da177e4SLinus Torvalds void brioctl_set(int (*hook)(unsigned int, void __user *)) 8341da177e4SLinus Torvalds { 835*4a3e2f71SArjan van de Ven mutex_lock(&br_ioctl_mutex); 8361da177e4SLinus Torvalds br_ioctl_hook = hook; 837*4a3e2f71SArjan van de Ven mutex_unlock(&br_ioctl_mutex); 8381da177e4SLinus Torvalds } 8391da177e4SLinus Torvalds EXPORT_SYMBOL(brioctl_set); 8401da177e4SLinus Torvalds 841*4a3e2f71SArjan van de Ven static DEFINE_MUTEX(vlan_ioctl_mutex); 8421da177e4SLinus Torvalds static int (*vlan_ioctl_hook)(void __user *arg); 8431da177e4SLinus Torvalds 8441da177e4SLinus Torvalds void vlan_ioctl_set(int (*hook)(void __user *)) 8451da177e4SLinus Torvalds { 846*4a3e2f71SArjan van de Ven mutex_lock(&vlan_ioctl_mutex); 8471da177e4SLinus Torvalds vlan_ioctl_hook = hook; 848*4a3e2f71SArjan van de Ven mutex_unlock(&vlan_ioctl_mutex); 8491da177e4SLinus Torvalds } 8501da177e4SLinus Torvalds EXPORT_SYMBOL(vlan_ioctl_set); 8511da177e4SLinus Torvalds 852*4a3e2f71SArjan van de Ven static DEFINE_MUTEX(dlci_ioctl_mutex); 8531da177e4SLinus Torvalds static int (*dlci_ioctl_hook)(unsigned int, void __user *); 8541da177e4SLinus Torvalds 8551da177e4SLinus Torvalds void dlci_ioctl_set(int (*hook)(unsigned int, void __user *)) 8561da177e4SLinus Torvalds { 857*4a3e2f71SArjan van de Ven mutex_lock(&dlci_ioctl_mutex); 8581da177e4SLinus Torvalds dlci_ioctl_hook = hook; 859*4a3e2f71SArjan van de Ven mutex_unlock(&dlci_ioctl_mutex); 8601da177e4SLinus Torvalds } 8611da177e4SLinus Torvalds EXPORT_SYMBOL(dlci_ioctl_set); 8621da177e4SLinus Torvalds 8631da177e4SLinus Torvalds /* 8641da177e4SLinus Torvalds * With an ioctl, arg may well be a user mode pointer, but we don't know 8651da177e4SLinus Torvalds * what to do with it - that's up to the protocol still. 8661da177e4SLinus Torvalds */ 8671da177e4SLinus Torvalds 8681da177e4SLinus Torvalds static long sock_ioctl(struct file *file, unsigned cmd, unsigned long arg) 8691da177e4SLinus Torvalds { 8701da177e4SLinus Torvalds struct socket *sock; 8711da177e4SLinus Torvalds void __user *argp = (void __user *)arg; 8721da177e4SLinus Torvalds int pid, err; 8731da177e4SLinus Torvalds 874b69aee04SEric Dumazet sock = file->private_data; 8751da177e4SLinus Torvalds if (cmd >= SIOCDEVPRIVATE && cmd <= (SIOCDEVPRIVATE + 15)) { 8761da177e4SLinus Torvalds err = dev_ioctl(cmd, argp); 8771da177e4SLinus Torvalds } else 878d86b5e0eSAdrian Bunk #ifdef CONFIG_WIRELESS_EXT 8791da177e4SLinus Torvalds if (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST) { 8801da177e4SLinus Torvalds err = dev_ioctl(cmd, argp); 8811da177e4SLinus Torvalds } else 882d86b5e0eSAdrian Bunk #endif /* CONFIG_WIRELESS_EXT */ 8831da177e4SLinus Torvalds switch (cmd) { 8841da177e4SLinus Torvalds case FIOSETOWN: 8851da177e4SLinus Torvalds case SIOCSPGRP: 8861da177e4SLinus Torvalds err = -EFAULT; 8871da177e4SLinus Torvalds if (get_user(pid, (int __user *)argp)) 8881da177e4SLinus Torvalds break; 8891da177e4SLinus Torvalds err = f_setown(sock->file, pid, 1); 8901da177e4SLinus Torvalds break; 8911da177e4SLinus Torvalds case FIOGETOWN: 8921da177e4SLinus Torvalds case SIOCGPGRP: 8931da177e4SLinus Torvalds err = put_user(sock->file->f_owner.pid, (int __user *)argp); 8941da177e4SLinus Torvalds break; 8951da177e4SLinus Torvalds case SIOCGIFBR: 8961da177e4SLinus Torvalds case SIOCSIFBR: 8971da177e4SLinus Torvalds case SIOCBRADDBR: 8981da177e4SLinus Torvalds case SIOCBRDELBR: 8991da177e4SLinus Torvalds err = -ENOPKG; 9001da177e4SLinus Torvalds if (!br_ioctl_hook) 9011da177e4SLinus Torvalds request_module("bridge"); 9021da177e4SLinus Torvalds 903*4a3e2f71SArjan van de Ven mutex_lock(&br_ioctl_mutex); 9041da177e4SLinus Torvalds if (br_ioctl_hook) 9051da177e4SLinus Torvalds err = br_ioctl_hook(cmd, argp); 906*4a3e2f71SArjan van de Ven mutex_unlock(&br_ioctl_mutex); 9071da177e4SLinus Torvalds break; 9081da177e4SLinus Torvalds case SIOCGIFVLAN: 9091da177e4SLinus Torvalds case SIOCSIFVLAN: 9101da177e4SLinus Torvalds err = -ENOPKG; 9111da177e4SLinus Torvalds if (!vlan_ioctl_hook) 9121da177e4SLinus Torvalds request_module("8021q"); 9131da177e4SLinus Torvalds 914*4a3e2f71SArjan van de Ven mutex_lock(&vlan_ioctl_mutex); 9151da177e4SLinus Torvalds if (vlan_ioctl_hook) 9161da177e4SLinus Torvalds err = vlan_ioctl_hook(argp); 917*4a3e2f71SArjan van de Ven mutex_unlock(&vlan_ioctl_mutex); 9181da177e4SLinus Torvalds break; 9191da177e4SLinus Torvalds case SIOCGIFDIVERT: 9201da177e4SLinus Torvalds case SIOCSIFDIVERT: 9211da177e4SLinus Torvalds /* Convert this to call through a hook */ 9221da177e4SLinus Torvalds err = divert_ioctl(cmd, argp); 9231da177e4SLinus Torvalds break; 9241da177e4SLinus Torvalds case SIOCADDDLCI: 9251da177e4SLinus Torvalds case SIOCDELDLCI: 9261da177e4SLinus Torvalds err = -ENOPKG; 9271da177e4SLinus Torvalds if (!dlci_ioctl_hook) 9281da177e4SLinus Torvalds request_module("dlci"); 9291da177e4SLinus Torvalds 9301da177e4SLinus Torvalds if (dlci_ioctl_hook) { 931*4a3e2f71SArjan van de Ven mutex_lock(&dlci_ioctl_mutex); 9321da177e4SLinus Torvalds err = dlci_ioctl_hook(cmd, argp); 933*4a3e2f71SArjan van de Ven mutex_unlock(&dlci_ioctl_mutex); 9341da177e4SLinus Torvalds } 9351da177e4SLinus Torvalds break; 9361da177e4SLinus Torvalds default: 9371da177e4SLinus Torvalds err = sock->ops->ioctl(sock, cmd, arg); 938b5e5fa5eSChristoph Hellwig 939b5e5fa5eSChristoph Hellwig /* 940b5e5fa5eSChristoph Hellwig * If this ioctl is unknown try to hand it down 941b5e5fa5eSChristoph Hellwig * to the NIC driver. 942b5e5fa5eSChristoph Hellwig */ 943b5e5fa5eSChristoph Hellwig if (err == -ENOIOCTLCMD) 944b5e5fa5eSChristoph Hellwig err = dev_ioctl(cmd, argp); 9451da177e4SLinus Torvalds break; 9461da177e4SLinus Torvalds } 9471da177e4SLinus Torvalds return err; 9481da177e4SLinus Torvalds } 9491da177e4SLinus Torvalds 9501da177e4SLinus Torvalds int sock_create_lite(int family, int type, int protocol, struct socket **res) 9511da177e4SLinus Torvalds { 9521da177e4SLinus Torvalds int err; 9531da177e4SLinus Torvalds struct socket *sock = NULL; 9541da177e4SLinus Torvalds 9551da177e4SLinus Torvalds err = security_socket_create(family, type, protocol, 1); 9561da177e4SLinus Torvalds if (err) 9571da177e4SLinus Torvalds goto out; 9581da177e4SLinus Torvalds 9591da177e4SLinus Torvalds sock = sock_alloc(); 9601da177e4SLinus Torvalds if (!sock) { 9611da177e4SLinus Torvalds err = -ENOMEM; 9621da177e4SLinus Torvalds goto out; 9631da177e4SLinus Torvalds } 9641da177e4SLinus Torvalds 9651da177e4SLinus Torvalds security_socket_post_create(sock, family, type, protocol, 1); 9661da177e4SLinus Torvalds sock->type = type; 9671da177e4SLinus Torvalds out: 9681da177e4SLinus Torvalds *res = sock; 9691da177e4SLinus Torvalds return err; 9701da177e4SLinus Torvalds } 9711da177e4SLinus Torvalds 9721da177e4SLinus Torvalds /* No kernel lock held - perfect */ 9731da177e4SLinus Torvalds static unsigned int sock_poll(struct file *file, poll_table * wait) 9741da177e4SLinus Torvalds { 9751da177e4SLinus Torvalds struct socket *sock; 9761da177e4SLinus Torvalds 9771da177e4SLinus Torvalds /* 9781da177e4SLinus Torvalds * We can't return errors to poll, so it's either yes or no. 9791da177e4SLinus Torvalds */ 980b69aee04SEric Dumazet sock = file->private_data; 9811da177e4SLinus Torvalds return sock->ops->poll(file, sock, wait); 9821da177e4SLinus Torvalds } 9831da177e4SLinus Torvalds 9841da177e4SLinus Torvalds static int sock_mmap(struct file * file, struct vm_area_struct * vma) 9851da177e4SLinus Torvalds { 986b69aee04SEric Dumazet struct socket *sock = file->private_data; 9871da177e4SLinus Torvalds 9881da177e4SLinus Torvalds return sock->ops->mmap(file, sock, vma); 9891da177e4SLinus Torvalds } 9901da177e4SLinus Torvalds 99120380731SArnaldo Carvalho de Melo static int sock_close(struct inode *inode, struct file *filp) 9921da177e4SLinus Torvalds { 9931da177e4SLinus Torvalds /* 9941da177e4SLinus Torvalds * It was possible the inode is NULL we were 9951da177e4SLinus Torvalds * closing an unfinished socket. 9961da177e4SLinus Torvalds */ 9971da177e4SLinus Torvalds 9981da177e4SLinus Torvalds if (!inode) 9991da177e4SLinus Torvalds { 10001da177e4SLinus Torvalds printk(KERN_DEBUG "sock_close: NULL inode\n"); 10011da177e4SLinus Torvalds return 0; 10021da177e4SLinus Torvalds } 10031da177e4SLinus Torvalds sock_fasync(-1, filp, 0); 10041da177e4SLinus Torvalds sock_release(SOCKET_I(inode)); 10051da177e4SLinus Torvalds return 0; 10061da177e4SLinus Torvalds } 10071da177e4SLinus Torvalds 10081da177e4SLinus Torvalds /* 10091da177e4SLinus Torvalds * Update the socket async list 10101da177e4SLinus Torvalds * 10111da177e4SLinus Torvalds * Fasync_list locking strategy. 10121da177e4SLinus Torvalds * 10131da177e4SLinus Torvalds * 1. fasync_list is modified only under process context socket lock 10141da177e4SLinus Torvalds * i.e. under semaphore. 10151da177e4SLinus Torvalds * 2. fasync_list is used under read_lock(&sk->sk_callback_lock) 10161da177e4SLinus Torvalds * or under socket lock. 10171da177e4SLinus Torvalds * 3. fasync_list can be used from softirq context, so that 10181da177e4SLinus Torvalds * modification under socket lock have to be enhanced with 10191da177e4SLinus Torvalds * write_lock_bh(&sk->sk_callback_lock). 10201da177e4SLinus Torvalds * --ANK (990710) 10211da177e4SLinus Torvalds */ 10221da177e4SLinus Torvalds 10231da177e4SLinus Torvalds static int sock_fasync(int fd, struct file *filp, int on) 10241da177e4SLinus Torvalds { 10251da177e4SLinus Torvalds struct fasync_struct *fa, *fna=NULL, **prev; 10261da177e4SLinus Torvalds struct socket *sock; 10271da177e4SLinus Torvalds struct sock *sk; 10281da177e4SLinus Torvalds 10291da177e4SLinus Torvalds if (on) 10301da177e4SLinus Torvalds { 10318b3a7005SKris Katterjohn fna = kmalloc(sizeof(struct fasync_struct), GFP_KERNEL); 10321da177e4SLinus Torvalds if(fna==NULL) 10331da177e4SLinus Torvalds return -ENOMEM; 10341da177e4SLinus Torvalds } 10351da177e4SLinus Torvalds 1036b69aee04SEric Dumazet sock = filp->private_data; 10371da177e4SLinus Torvalds 10381da177e4SLinus Torvalds if ((sk=sock->sk) == NULL) { 10391da177e4SLinus Torvalds kfree(fna); 10401da177e4SLinus Torvalds return -EINVAL; 10411da177e4SLinus Torvalds } 10421da177e4SLinus Torvalds 10431da177e4SLinus Torvalds lock_sock(sk); 10441da177e4SLinus Torvalds 10451da177e4SLinus Torvalds prev=&(sock->fasync_list); 10461da177e4SLinus Torvalds 10471da177e4SLinus Torvalds for (fa=*prev; fa!=NULL; prev=&fa->fa_next,fa=*prev) 10481da177e4SLinus Torvalds if (fa->fa_file==filp) 10491da177e4SLinus Torvalds break; 10501da177e4SLinus Torvalds 10511da177e4SLinus Torvalds if(on) 10521da177e4SLinus Torvalds { 10531da177e4SLinus Torvalds if(fa!=NULL) 10541da177e4SLinus Torvalds { 10551da177e4SLinus Torvalds write_lock_bh(&sk->sk_callback_lock); 10561da177e4SLinus Torvalds fa->fa_fd=fd; 10571da177e4SLinus Torvalds write_unlock_bh(&sk->sk_callback_lock); 10581da177e4SLinus Torvalds 10591da177e4SLinus Torvalds kfree(fna); 10601da177e4SLinus Torvalds goto out; 10611da177e4SLinus Torvalds } 10621da177e4SLinus Torvalds fna->fa_file=filp; 10631da177e4SLinus Torvalds fna->fa_fd=fd; 10641da177e4SLinus Torvalds fna->magic=FASYNC_MAGIC; 10651da177e4SLinus Torvalds fna->fa_next=sock->fasync_list; 10661da177e4SLinus Torvalds write_lock_bh(&sk->sk_callback_lock); 10671da177e4SLinus Torvalds sock->fasync_list=fna; 10681da177e4SLinus Torvalds write_unlock_bh(&sk->sk_callback_lock); 10691da177e4SLinus Torvalds } 10701da177e4SLinus Torvalds else 10711da177e4SLinus Torvalds { 10721da177e4SLinus Torvalds if (fa!=NULL) 10731da177e4SLinus Torvalds { 10741da177e4SLinus Torvalds write_lock_bh(&sk->sk_callback_lock); 10751da177e4SLinus Torvalds *prev=fa->fa_next; 10761da177e4SLinus Torvalds write_unlock_bh(&sk->sk_callback_lock); 10771da177e4SLinus Torvalds kfree(fa); 10781da177e4SLinus Torvalds } 10791da177e4SLinus Torvalds } 10801da177e4SLinus Torvalds 10811da177e4SLinus Torvalds out: 10821da177e4SLinus Torvalds release_sock(sock->sk); 10831da177e4SLinus Torvalds return 0; 10841da177e4SLinus Torvalds } 10851da177e4SLinus Torvalds 10861da177e4SLinus Torvalds /* This function may be called only under socket lock or callback_lock */ 10871da177e4SLinus Torvalds 10881da177e4SLinus Torvalds int sock_wake_async(struct socket *sock, int how, int band) 10891da177e4SLinus Torvalds { 10901da177e4SLinus Torvalds if (!sock || !sock->fasync_list) 10911da177e4SLinus Torvalds return -1; 10921da177e4SLinus Torvalds switch (how) 10931da177e4SLinus Torvalds { 10941da177e4SLinus Torvalds case 1: 10951da177e4SLinus Torvalds 10961da177e4SLinus Torvalds if (test_bit(SOCK_ASYNC_WAITDATA, &sock->flags)) 10971da177e4SLinus Torvalds break; 10981da177e4SLinus Torvalds goto call_kill; 10991da177e4SLinus Torvalds case 2: 11001da177e4SLinus Torvalds if (!test_and_clear_bit(SOCK_ASYNC_NOSPACE, &sock->flags)) 11011da177e4SLinus Torvalds break; 11021da177e4SLinus Torvalds /* fall through */ 11031da177e4SLinus Torvalds case 0: 11041da177e4SLinus Torvalds call_kill: 11051da177e4SLinus Torvalds __kill_fasync(sock->fasync_list, SIGIO, band); 11061da177e4SLinus Torvalds break; 11071da177e4SLinus Torvalds case 3: 11081da177e4SLinus Torvalds __kill_fasync(sock->fasync_list, SIGURG, band); 11091da177e4SLinus Torvalds } 11101da177e4SLinus Torvalds return 0; 11111da177e4SLinus Torvalds } 11121da177e4SLinus Torvalds 11131da177e4SLinus Torvalds static int __sock_create(int family, int type, int protocol, struct socket **res, int kern) 11141da177e4SLinus Torvalds { 11151da177e4SLinus Torvalds int err; 11161da177e4SLinus Torvalds struct socket *sock; 11171da177e4SLinus Torvalds 11181da177e4SLinus Torvalds /* 11191da177e4SLinus Torvalds * Check protocol is in range 11201da177e4SLinus Torvalds */ 11211da177e4SLinus Torvalds if (family < 0 || family >= NPROTO) 11221da177e4SLinus Torvalds return -EAFNOSUPPORT; 11231da177e4SLinus Torvalds if (type < 0 || type >= SOCK_MAX) 11241da177e4SLinus Torvalds return -EINVAL; 11251da177e4SLinus Torvalds 11261da177e4SLinus Torvalds /* Compatibility. 11271da177e4SLinus Torvalds 11281da177e4SLinus Torvalds This uglymoron is moved from INET layer to here to avoid 11291da177e4SLinus Torvalds deadlock in module load. 11301da177e4SLinus Torvalds */ 11311da177e4SLinus Torvalds if (family == PF_INET && type == SOCK_PACKET) { 11321da177e4SLinus Torvalds static int warned; 11331da177e4SLinus Torvalds if (!warned) { 11341da177e4SLinus Torvalds warned = 1; 11351da177e4SLinus Torvalds printk(KERN_INFO "%s uses obsolete (PF_INET,SOCK_PACKET)\n", current->comm); 11361da177e4SLinus Torvalds } 11371da177e4SLinus Torvalds family = PF_PACKET; 11381da177e4SLinus Torvalds } 11391da177e4SLinus Torvalds 11401da177e4SLinus Torvalds err = security_socket_create(family, type, protocol, kern); 11411da177e4SLinus Torvalds if (err) 11421da177e4SLinus Torvalds return err; 11431da177e4SLinus Torvalds 11441da177e4SLinus Torvalds #if defined(CONFIG_KMOD) 11451da177e4SLinus Torvalds /* Attempt to load a protocol module if the find failed. 11461da177e4SLinus Torvalds * 11471da177e4SLinus Torvalds * 12/09/1996 Marcin: But! this makes REALLY only sense, if the user 11481da177e4SLinus Torvalds * requested real, full-featured networking support upon configuration. 11491da177e4SLinus Torvalds * Otherwise module support will break! 11501da177e4SLinus Torvalds */ 11511da177e4SLinus Torvalds if (net_families[family]==NULL) 11521da177e4SLinus Torvalds { 11531da177e4SLinus Torvalds request_module("net-pf-%d",family); 11541da177e4SLinus Torvalds } 11551da177e4SLinus Torvalds #endif 11561da177e4SLinus Torvalds 11571da177e4SLinus Torvalds net_family_read_lock(); 11581da177e4SLinus Torvalds if (net_families[family] == NULL) { 11591da177e4SLinus Torvalds err = -EAFNOSUPPORT; 11601da177e4SLinus Torvalds goto out; 11611da177e4SLinus Torvalds } 11621da177e4SLinus Torvalds 11631da177e4SLinus Torvalds /* 11641da177e4SLinus Torvalds * Allocate the socket and allow the family to set things up. if 11651da177e4SLinus Torvalds * the protocol is 0, the family is instructed to select an appropriate 11661da177e4SLinus Torvalds * default. 11671da177e4SLinus Torvalds */ 11681da177e4SLinus Torvalds 11691da177e4SLinus Torvalds if (!(sock = sock_alloc())) { 11701da177e4SLinus Torvalds printk(KERN_WARNING "socket: no more sockets\n"); 11711da177e4SLinus Torvalds err = -ENFILE; /* Not exactly a match, but its the 11721da177e4SLinus Torvalds closest posix thing */ 11731da177e4SLinus Torvalds goto out; 11741da177e4SLinus Torvalds } 11751da177e4SLinus Torvalds 11761da177e4SLinus Torvalds sock->type = type; 11771da177e4SLinus Torvalds 11781da177e4SLinus Torvalds /* 11791da177e4SLinus Torvalds * We will call the ->create function, that possibly is in a loadable 11801da177e4SLinus Torvalds * module, so we have to bump that loadable module refcnt first. 11811da177e4SLinus Torvalds */ 11821da177e4SLinus Torvalds err = -EAFNOSUPPORT; 11831da177e4SLinus Torvalds if (!try_module_get(net_families[family]->owner)) 11841da177e4SLinus Torvalds goto out_release; 11851da177e4SLinus Torvalds 1186a79af59eSFrank Filz if ((err = net_families[family]->create(sock, protocol)) < 0) { 1187a79af59eSFrank Filz sock->ops = NULL; 11881da177e4SLinus Torvalds goto out_module_put; 1189a79af59eSFrank Filz } 1190a79af59eSFrank Filz 11911da177e4SLinus Torvalds /* 11921da177e4SLinus Torvalds * Now to bump the refcnt of the [loadable] module that owns this 11931da177e4SLinus Torvalds * socket at sock_release time we decrement its refcnt. 11941da177e4SLinus Torvalds */ 11951da177e4SLinus Torvalds if (!try_module_get(sock->ops->owner)) { 11961da177e4SLinus Torvalds sock->ops = NULL; 11971da177e4SLinus Torvalds goto out_module_put; 11981da177e4SLinus Torvalds } 11991da177e4SLinus Torvalds /* 12001da177e4SLinus Torvalds * Now that we're done with the ->create function, the [loadable] 12011da177e4SLinus Torvalds * module can have its refcnt decremented 12021da177e4SLinus Torvalds */ 12031da177e4SLinus Torvalds module_put(net_families[family]->owner); 12041da177e4SLinus Torvalds *res = sock; 12051da177e4SLinus Torvalds security_socket_post_create(sock, family, type, protocol, kern); 12061da177e4SLinus Torvalds 12071da177e4SLinus Torvalds out: 12081da177e4SLinus Torvalds net_family_read_unlock(); 12091da177e4SLinus Torvalds return err; 12101da177e4SLinus Torvalds out_module_put: 12111da177e4SLinus Torvalds module_put(net_families[family]->owner); 12121da177e4SLinus Torvalds out_release: 12131da177e4SLinus Torvalds sock_release(sock); 12141da177e4SLinus Torvalds goto out; 12151da177e4SLinus Torvalds } 12161da177e4SLinus Torvalds 12171da177e4SLinus Torvalds int sock_create(int family, int type, int protocol, struct socket **res) 12181da177e4SLinus Torvalds { 12191da177e4SLinus Torvalds return __sock_create(family, type, protocol, res, 0); 12201da177e4SLinus Torvalds } 12211da177e4SLinus Torvalds 12221da177e4SLinus Torvalds int sock_create_kern(int family, int type, int protocol, struct socket **res) 12231da177e4SLinus Torvalds { 12241da177e4SLinus Torvalds return __sock_create(family, type, protocol, res, 1); 12251da177e4SLinus Torvalds } 12261da177e4SLinus Torvalds 12271da177e4SLinus Torvalds asmlinkage long sys_socket(int family, int type, int protocol) 12281da177e4SLinus Torvalds { 12291da177e4SLinus Torvalds int retval; 12301da177e4SLinus Torvalds struct socket *sock; 12311da177e4SLinus Torvalds 12321da177e4SLinus Torvalds retval = sock_create(family, type, protocol, &sock); 12331da177e4SLinus Torvalds if (retval < 0) 12341da177e4SLinus Torvalds goto out; 12351da177e4SLinus Torvalds 12361da177e4SLinus Torvalds retval = sock_map_fd(sock); 12371da177e4SLinus Torvalds if (retval < 0) 12381da177e4SLinus Torvalds goto out_release; 12391da177e4SLinus Torvalds 12401da177e4SLinus Torvalds out: 12411da177e4SLinus Torvalds /* It may be already another descriptor 8) Not kernel problem. */ 12421da177e4SLinus Torvalds return retval; 12431da177e4SLinus Torvalds 12441da177e4SLinus Torvalds out_release: 12451da177e4SLinus Torvalds sock_release(sock); 12461da177e4SLinus Torvalds return retval; 12471da177e4SLinus Torvalds } 12481da177e4SLinus Torvalds 12491da177e4SLinus Torvalds /* 12501da177e4SLinus Torvalds * Create a pair of connected sockets. 12511da177e4SLinus Torvalds */ 12521da177e4SLinus Torvalds 12531da177e4SLinus Torvalds asmlinkage long sys_socketpair(int family, int type, int protocol, int __user *usockvec) 12541da177e4SLinus Torvalds { 12551da177e4SLinus Torvalds struct socket *sock1, *sock2; 12561da177e4SLinus Torvalds int fd1, fd2, err; 12571da177e4SLinus Torvalds 12581da177e4SLinus Torvalds /* 12591da177e4SLinus Torvalds * Obtain the first socket and check if the underlying protocol 12601da177e4SLinus Torvalds * supports the socketpair call. 12611da177e4SLinus Torvalds */ 12621da177e4SLinus Torvalds 12631da177e4SLinus Torvalds err = sock_create(family, type, protocol, &sock1); 12641da177e4SLinus Torvalds if (err < 0) 12651da177e4SLinus Torvalds goto out; 12661da177e4SLinus Torvalds 12671da177e4SLinus Torvalds err = sock_create(family, type, protocol, &sock2); 12681da177e4SLinus Torvalds if (err < 0) 12691da177e4SLinus Torvalds goto out_release_1; 12701da177e4SLinus Torvalds 12711da177e4SLinus Torvalds err = sock1->ops->socketpair(sock1, sock2); 12721da177e4SLinus Torvalds if (err < 0) 12731da177e4SLinus Torvalds goto out_release_both; 12741da177e4SLinus Torvalds 12751da177e4SLinus Torvalds fd1 = fd2 = -1; 12761da177e4SLinus Torvalds 12771da177e4SLinus Torvalds err = sock_map_fd(sock1); 12781da177e4SLinus Torvalds if (err < 0) 12791da177e4SLinus Torvalds goto out_release_both; 12801da177e4SLinus Torvalds fd1 = err; 12811da177e4SLinus Torvalds 12821da177e4SLinus Torvalds err = sock_map_fd(sock2); 12831da177e4SLinus Torvalds if (err < 0) 12841da177e4SLinus Torvalds goto out_close_1; 12851da177e4SLinus Torvalds fd2 = err; 12861da177e4SLinus Torvalds 12871da177e4SLinus Torvalds /* fd1 and fd2 may be already another descriptors. 12881da177e4SLinus Torvalds * Not kernel problem. 12891da177e4SLinus Torvalds */ 12901da177e4SLinus Torvalds 12911da177e4SLinus Torvalds err = put_user(fd1, &usockvec[0]); 12921da177e4SLinus Torvalds if (!err) 12931da177e4SLinus Torvalds err = put_user(fd2, &usockvec[1]); 12941da177e4SLinus Torvalds if (!err) 12951da177e4SLinus Torvalds return 0; 12961da177e4SLinus Torvalds 12971da177e4SLinus Torvalds sys_close(fd2); 12981da177e4SLinus Torvalds sys_close(fd1); 12991da177e4SLinus Torvalds return err; 13001da177e4SLinus Torvalds 13011da177e4SLinus Torvalds out_close_1: 13021da177e4SLinus Torvalds sock_release(sock2); 13031da177e4SLinus Torvalds sys_close(fd1); 13041da177e4SLinus Torvalds return err; 13051da177e4SLinus Torvalds 13061da177e4SLinus Torvalds out_release_both: 13071da177e4SLinus Torvalds sock_release(sock2); 13081da177e4SLinus Torvalds out_release_1: 13091da177e4SLinus Torvalds sock_release(sock1); 13101da177e4SLinus Torvalds out: 13111da177e4SLinus Torvalds return err; 13121da177e4SLinus Torvalds } 13131da177e4SLinus Torvalds 13141da177e4SLinus Torvalds 13151da177e4SLinus Torvalds /* 13161da177e4SLinus Torvalds * Bind a name to a socket. Nothing much to do here since it's 13171da177e4SLinus Torvalds * the protocol's responsibility to handle the local address. 13181da177e4SLinus Torvalds * 13191da177e4SLinus Torvalds * We move the socket address to kernel space before we call 13201da177e4SLinus Torvalds * the protocol layer (having also checked the address is ok). 13211da177e4SLinus Torvalds */ 13221da177e4SLinus Torvalds 13231da177e4SLinus Torvalds asmlinkage long sys_bind(int fd, struct sockaddr __user *umyaddr, int addrlen) 13241da177e4SLinus Torvalds { 13251da177e4SLinus Torvalds struct socket *sock; 13261da177e4SLinus Torvalds char address[MAX_SOCK_ADDR]; 13276cb153caSBenjamin LaHaise int err, fput_needed; 13281da177e4SLinus Torvalds 13296cb153caSBenjamin LaHaise if((sock = sockfd_lookup_light(fd, &err, &fput_needed))!=NULL) 13301da177e4SLinus Torvalds { 13311da177e4SLinus Torvalds if((err=move_addr_to_kernel(umyaddr,addrlen,address))>=0) { 13321da177e4SLinus Torvalds err = security_socket_bind(sock, (struct sockaddr *)address, addrlen); 13336cb153caSBenjamin LaHaise if (!err) 13346cb153caSBenjamin LaHaise err = sock->ops->bind(sock, 13356cb153caSBenjamin LaHaise (struct sockaddr *)address, addrlen); 13361da177e4SLinus Torvalds } 13376cb153caSBenjamin LaHaise fput_light(sock->file, fput_needed); 13381da177e4SLinus Torvalds } 13391da177e4SLinus Torvalds return err; 13401da177e4SLinus Torvalds } 13411da177e4SLinus Torvalds 13421da177e4SLinus Torvalds 13431da177e4SLinus Torvalds /* 13441da177e4SLinus Torvalds * Perform a listen. Basically, we allow the protocol to do anything 13451da177e4SLinus Torvalds * necessary for a listen, and if that works, we mark the socket as 13461da177e4SLinus Torvalds * ready for listening. 13471da177e4SLinus Torvalds */ 13481da177e4SLinus Torvalds 13491da177e4SLinus Torvalds int sysctl_somaxconn = SOMAXCONN; 13501da177e4SLinus Torvalds 13511da177e4SLinus Torvalds asmlinkage long sys_listen(int fd, int backlog) 13521da177e4SLinus Torvalds { 13531da177e4SLinus Torvalds struct socket *sock; 13546cb153caSBenjamin LaHaise int err, fput_needed; 13551da177e4SLinus Torvalds 13566cb153caSBenjamin LaHaise if ((sock = sockfd_lookup_light(fd, &err, &fput_needed)) != NULL) { 13571da177e4SLinus Torvalds if ((unsigned) backlog > sysctl_somaxconn) 13581da177e4SLinus Torvalds backlog = sysctl_somaxconn; 13591da177e4SLinus Torvalds 13601da177e4SLinus Torvalds err = security_socket_listen(sock, backlog); 13616cb153caSBenjamin LaHaise if (!err) 13621da177e4SLinus Torvalds err = sock->ops->listen(sock, backlog); 13636cb153caSBenjamin LaHaise 13646cb153caSBenjamin LaHaise fput_light(sock->file, fput_needed); 13651da177e4SLinus Torvalds } 13661da177e4SLinus Torvalds return err; 13671da177e4SLinus Torvalds } 13681da177e4SLinus Torvalds 13691da177e4SLinus Torvalds 13701da177e4SLinus Torvalds /* 13711da177e4SLinus Torvalds * For accept, we attempt to create a new socket, set up the link 13721da177e4SLinus Torvalds * with the client, wake up the client, then return the new 13731da177e4SLinus Torvalds * connected fd. We collect the address of the connector in kernel 13741da177e4SLinus Torvalds * space and move it to user at the very end. This is unclean because 13751da177e4SLinus Torvalds * we open the socket then return an error. 13761da177e4SLinus Torvalds * 13771da177e4SLinus Torvalds * 1003.1g adds the ability to recvmsg() to query connection pending 13781da177e4SLinus Torvalds * status to recvmsg. We need to add that support in a way thats 13791da177e4SLinus Torvalds * clean when we restucture accept also. 13801da177e4SLinus Torvalds */ 13811da177e4SLinus Torvalds 13821da177e4SLinus Torvalds asmlinkage long sys_accept(int fd, struct sockaddr __user *upeer_sockaddr, int __user *upeer_addrlen) 13831da177e4SLinus Torvalds { 13841da177e4SLinus Torvalds struct socket *sock, *newsock; 138539d8c1b6SDavid S. Miller struct file *newfile; 13866cb153caSBenjamin LaHaise int err, len, newfd, fput_needed; 13871da177e4SLinus Torvalds char address[MAX_SOCK_ADDR]; 13881da177e4SLinus Torvalds 13896cb153caSBenjamin LaHaise sock = sockfd_lookup_light(fd, &err, &fput_needed); 13901da177e4SLinus Torvalds if (!sock) 13911da177e4SLinus Torvalds goto out; 13921da177e4SLinus Torvalds 13931da177e4SLinus Torvalds err = -ENFILE; 13941da177e4SLinus Torvalds if (!(newsock = sock_alloc())) 13951da177e4SLinus Torvalds goto out_put; 13961da177e4SLinus Torvalds 13971da177e4SLinus Torvalds newsock->type = sock->type; 13981da177e4SLinus Torvalds newsock->ops = sock->ops; 13991da177e4SLinus Torvalds 14001da177e4SLinus Torvalds /* 14011da177e4SLinus Torvalds * We don't need try_module_get here, as the listening socket (sock) 14021da177e4SLinus Torvalds * has the protocol module (sock->ops->owner) held. 14031da177e4SLinus Torvalds */ 14041da177e4SLinus Torvalds __module_get(newsock->ops->owner); 14051da177e4SLinus Torvalds 140639d8c1b6SDavid S. Miller newfd = sock_alloc_fd(&newfile); 140739d8c1b6SDavid S. Miller if (unlikely(newfd < 0)) { 140839d8c1b6SDavid S. Miller err = newfd; 140939d8c1b6SDavid S. Miller goto out_release; 141039d8c1b6SDavid S. Miller } 141139d8c1b6SDavid S. Miller 141239d8c1b6SDavid S. Miller err = sock_attach_fd(newsock, newfile); 141339d8c1b6SDavid S. Miller if (err < 0) 141439d8c1b6SDavid S. Miller goto out_fd; 141539d8c1b6SDavid S. Miller 1416a79af59eSFrank Filz err = security_socket_accept(sock, newsock); 1417a79af59eSFrank Filz if (err) 141839d8c1b6SDavid S. Miller goto out_fd; 1419a79af59eSFrank Filz 14201da177e4SLinus Torvalds err = sock->ops->accept(sock, newsock, sock->file->f_flags); 14211da177e4SLinus Torvalds if (err < 0) 142239d8c1b6SDavid S. Miller goto out_fd; 14231da177e4SLinus Torvalds 14241da177e4SLinus Torvalds if (upeer_sockaddr) { 14251da177e4SLinus Torvalds if(newsock->ops->getname(newsock, (struct sockaddr *)address, &len, 2)<0) { 14261da177e4SLinus Torvalds err = -ECONNABORTED; 142739d8c1b6SDavid S. Miller goto out_fd; 14281da177e4SLinus Torvalds } 14291da177e4SLinus Torvalds err = move_addr_to_user(address, len, upeer_sockaddr, upeer_addrlen); 14301da177e4SLinus Torvalds if (err < 0) 143139d8c1b6SDavid S. Miller goto out_fd; 14321da177e4SLinus Torvalds } 14331da177e4SLinus Torvalds 14341da177e4SLinus Torvalds /* File flags are not inherited via accept() unlike another OSes. */ 14351da177e4SLinus Torvalds 143639d8c1b6SDavid S. Miller fd_install(newfd, newfile); 143739d8c1b6SDavid S. Miller err = newfd; 14381da177e4SLinus Torvalds 14391da177e4SLinus Torvalds security_socket_post_accept(sock, newsock); 14401da177e4SLinus Torvalds 14411da177e4SLinus Torvalds out_put: 14426cb153caSBenjamin LaHaise fput_light(sock->file, fput_needed); 14431da177e4SLinus Torvalds out: 14441da177e4SLinus Torvalds return err; 144539d8c1b6SDavid S. Miller out_fd: 144639d8c1b6SDavid S. Miller put_filp(newfile); 144739d8c1b6SDavid S. Miller put_unused_fd(newfd); 14481da177e4SLinus Torvalds out_release: 14491da177e4SLinus Torvalds sock_release(newsock); 14501da177e4SLinus Torvalds goto out_put; 14511da177e4SLinus Torvalds } 14521da177e4SLinus Torvalds 14531da177e4SLinus Torvalds 14541da177e4SLinus Torvalds /* 14551da177e4SLinus Torvalds * Attempt to connect to a socket with the server address. The address 14561da177e4SLinus Torvalds * is in user space so we verify it is OK and move it to kernel space. 14571da177e4SLinus Torvalds * 14581da177e4SLinus Torvalds * For 1003.1g we need to add clean support for a bind to AF_UNSPEC to 14591da177e4SLinus Torvalds * break bindings 14601da177e4SLinus Torvalds * 14611da177e4SLinus Torvalds * NOTE: 1003.1g draft 6.3 is broken with respect to AX.25/NetROM and 14621da177e4SLinus Torvalds * other SEQPACKET protocols that take time to connect() as it doesn't 14631da177e4SLinus Torvalds * include the -EINPROGRESS status for such sockets. 14641da177e4SLinus Torvalds */ 14651da177e4SLinus Torvalds 14661da177e4SLinus Torvalds asmlinkage long sys_connect(int fd, struct sockaddr __user *uservaddr, int addrlen) 14671da177e4SLinus Torvalds { 14681da177e4SLinus Torvalds struct socket *sock; 14691da177e4SLinus Torvalds char address[MAX_SOCK_ADDR]; 14706cb153caSBenjamin LaHaise int err, fput_needed; 14711da177e4SLinus Torvalds 14726cb153caSBenjamin LaHaise sock = sockfd_lookup_light(fd, &err, &fput_needed); 14731da177e4SLinus Torvalds if (!sock) 14741da177e4SLinus Torvalds goto out; 14751da177e4SLinus Torvalds err = move_addr_to_kernel(uservaddr, addrlen, address); 14761da177e4SLinus Torvalds if (err < 0) 14771da177e4SLinus Torvalds goto out_put; 14781da177e4SLinus Torvalds 14791da177e4SLinus Torvalds err = security_socket_connect(sock, (struct sockaddr *)address, addrlen); 14801da177e4SLinus Torvalds if (err) 14811da177e4SLinus Torvalds goto out_put; 14821da177e4SLinus Torvalds 14831da177e4SLinus Torvalds err = sock->ops->connect(sock, (struct sockaddr *) address, addrlen, 14841da177e4SLinus Torvalds sock->file->f_flags); 14851da177e4SLinus Torvalds out_put: 14866cb153caSBenjamin LaHaise fput_light(sock->file, fput_needed); 14871da177e4SLinus Torvalds out: 14881da177e4SLinus Torvalds return err; 14891da177e4SLinus Torvalds } 14901da177e4SLinus Torvalds 14911da177e4SLinus Torvalds /* 14921da177e4SLinus Torvalds * Get the local address ('name') of a socket object. Move the obtained 14931da177e4SLinus Torvalds * name to user space. 14941da177e4SLinus Torvalds */ 14951da177e4SLinus Torvalds 14961da177e4SLinus Torvalds asmlinkage long sys_getsockname(int fd, struct sockaddr __user *usockaddr, int __user *usockaddr_len) 14971da177e4SLinus Torvalds { 14981da177e4SLinus Torvalds struct socket *sock; 14991da177e4SLinus Torvalds char address[MAX_SOCK_ADDR]; 15006cb153caSBenjamin LaHaise int len, err, fput_needed; 15011da177e4SLinus Torvalds 15026cb153caSBenjamin LaHaise sock = sockfd_lookup_light(fd, &err, &fput_needed); 15031da177e4SLinus Torvalds if (!sock) 15041da177e4SLinus Torvalds goto out; 15051da177e4SLinus Torvalds 15061da177e4SLinus Torvalds err = security_socket_getsockname(sock); 15071da177e4SLinus Torvalds if (err) 15081da177e4SLinus Torvalds goto out_put; 15091da177e4SLinus Torvalds 15101da177e4SLinus Torvalds err = sock->ops->getname(sock, (struct sockaddr *)address, &len, 0); 15111da177e4SLinus Torvalds if (err) 15121da177e4SLinus Torvalds goto out_put; 15131da177e4SLinus Torvalds err = move_addr_to_user(address, len, usockaddr, usockaddr_len); 15141da177e4SLinus Torvalds 15151da177e4SLinus Torvalds out_put: 15166cb153caSBenjamin LaHaise fput_light(sock->file, fput_needed); 15171da177e4SLinus Torvalds out: 15181da177e4SLinus Torvalds return err; 15191da177e4SLinus Torvalds } 15201da177e4SLinus Torvalds 15211da177e4SLinus Torvalds /* 15221da177e4SLinus Torvalds * Get the remote address ('name') of a socket object. Move the obtained 15231da177e4SLinus Torvalds * name to user space. 15241da177e4SLinus Torvalds */ 15251da177e4SLinus Torvalds 15261da177e4SLinus Torvalds asmlinkage long sys_getpeername(int fd, struct sockaddr __user *usockaddr, int __user *usockaddr_len) 15271da177e4SLinus Torvalds { 15281da177e4SLinus Torvalds struct socket *sock; 15291da177e4SLinus Torvalds char address[MAX_SOCK_ADDR]; 15306cb153caSBenjamin LaHaise int len, err, fput_needed; 15311da177e4SLinus Torvalds 15326cb153caSBenjamin LaHaise if ((sock = sockfd_lookup_light(fd, &err, &fput_needed)) != NULL) { 15331da177e4SLinus Torvalds err = security_socket_getpeername(sock); 15341da177e4SLinus Torvalds if (err) { 15356cb153caSBenjamin LaHaise fput_light(sock->file, fput_needed); 15361da177e4SLinus Torvalds return err; 15371da177e4SLinus Torvalds } 15381da177e4SLinus Torvalds 15391da177e4SLinus Torvalds err = sock->ops->getname(sock, (struct sockaddr *)address, &len, 1); 15401da177e4SLinus Torvalds if (!err) 15411da177e4SLinus Torvalds err=move_addr_to_user(address,len, usockaddr, usockaddr_len); 15426cb153caSBenjamin LaHaise fput_light(sock->file, fput_needed); 15431da177e4SLinus Torvalds } 15441da177e4SLinus Torvalds return err; 15451da177e4SLinus Torvalds } 15461da177e4SLinus Torvalds 15471da177e4SLinus Torvalds /* 15481da177e4SLinus Torvalds * Send a datagram to a given address. We move the address into kernel 15491da177e4SLinus Torvalds * space and check the user space data area is readable before invoking 15501da177e4SLinus Torvalds * the protocol. 15511da177e4SLinus Torvalds */ 15521da177e4SLinus Torvalds 15531da177e4SLinus Torvalds asmlinkage long sys_sendto(int fd, void __user * buff, size_t len, unsigned flags, 15541da177e4SLinus Torvalds struct sockaddr __user *addr, int addr_len) 15551da177e4SLinus Torvalds { 15561da177e4SLinus Torvalds struct socket *sock; 15571da177e4SLinus Torvalds char address[MAX_SOCK_ADDR]; 15581da177e4SLinus Torvalds int err; 15591da177e4SLinus Torvalds struct msghdr msg; 15601da177e4SLinus Torvalds struct iovec iov; 15616cb153caSBenjamin LaHaise int fput_needed; 15626cb153caSBenjamin LaHaise struct file *sock_file; 15631da177e4SLinus Torvalds 15646cb153caSBenjamin LaHaise sock_file = fget_light(fd, &fput_needed); 15656cb153caSBenjamin LaHaise if (!sock_file) 15666cb153caSBenjamin LaHaise return -EBADF; 15676cb153caSBenjamin LaHaise 15686cb153caSBenjamin LaHaise sock = sock_from_file(sock_file, &err); 15691da177e4SLinus Torvalds if (!sock) 15706cb153caSBenjamin LaHaise goto out_put; 15711da177e4SLinus Torvalds iov.iov_base=buff; 15721da177e4SLinus Torvalds iov.iov_len=len; 15731da177e4SLinus Torvalds msg.msg_name=NULL; 15741da177e4SLinus Torvalds msg.msg_iov=&iov; 15751da177e4SLinus Torvalds msg.msg_iovlen=1; 15761da177e4SLinus Torvalds msg.msg_control=NULL; 15771da177e4SLinus Torvalds msg.msg_controllen=0; 15781da177e4SLinus Torvalds msg.msg_namelen=0; 15796cb153caSBenjamin LaHaise if (addr) { 15801da177e4SLinus Torvalds err = move_addr_to_kernel(addr, addr_len, address); 15811da177e4SLinus Torvalds if (err < 0) 15821da177e4SLinus Torvalds goto out_put; 15831da177e4SLinus Torvalds msg.msg_name=address; 15841da177e4SLinus Torvalds msg.msg_namelen=addr_len; 15851da177e4SLinus Torvalds } 15861da177e4SLinus Torvalds if (sock->file->f_flags & O_NONBLOCK) 15871da177e4SLinus Torvalds flags |= MSG_DONTWAIT; 15881da177e4SLinus Torvalds msg.msg_flags = flags; 15891da177e4SLinus Torvalds err = sock_sendmsg(sock, &msg, len); 15901da177e4SLinus Torvalds 15911da177e4SLinus Torvalds out_put: 15926cb153caSBenjamin LaHaise fput_light(sock_file, fput_needed); 15931da177e4SLinus Torvalds return err; 15941da177e4SLinus Torvalds } 15951da177e4SLinus Torvalds 15961da177e4SLinus Torvalds /* 15971da177e4SLinus Torvalds * Send a datagram down a socket. 15981da177e4SLinus Torvalds */ 15991da177e4SLinus Torvalds 16001da177e4SLinus Torvalds asmlinkage long sys_send(int fd, void __user * buff, size_t len, unsigned flags) 16011da177e4SLinus Torvalds { 16021da177e4SLinus Torvalds return sys_sendto(fd, buff, len, flags, NULL, 0); 16031da177e4SLinus Torvalds } 16041da177e4SLinus Torvalds 16051da177e4SLinus Torvalds /* 16061da177e4SLinus Torvalds * Receive a frame from the socket and optionally record the address of the 16071da177e4SLinus Torvalds * sender. We verify the buffers are writable and if needed move the 16081da177e4SLinus Torvalds * sender address from kernel to user space. 16091da177e4SLinus Torvalds */ 16101da177e4SLinus Torvalds 16111da177e4SLinus Torvalds asmlinkage long sys_recvfrom(int fd, void __user * ubuf, size_t size, unsigned flags, 16121da177e4SLinus Torvalds struct sockaddr __user *addr, int __user *addr_len) 16131da177e4SLinus Torvalds { 16141da177e4SLinus Torvalds struct socket *sock; 16151da177e4SLinus Torvalds struct iovec iov; 16161da177e4SLinus Torvalds struct msghdr msg; 16171da177e4SLinus Torvalds char address[MAX_SOCK_ADDR]; 16181da177e4SLinus Torvalds int err,err2; 16196cb153caSBenjamin LaHaise struct file *sock_file; 16206cb153caSBenjamin LaHaise int fput_needed; 16211da177e4SLinus Torvalds 16226cb153caSBenjamin LaHaise sock_file = fget_light(fd, &fput_needed); 16236cb153caSBenjamin LaHaise if (!sock_file) 16246cb153caSBenjamin LaHaise return -EBADF; 16256cb153caSBenjamin LaHaise 16266cb153caSBenjamin LaHaise sock = sock_from_file(sock_file, &err); 16271da177e4SLinus Torvalds if (!sock) 16281da177e4SLinus Torvalds goto out; 16291da177e4SLinus Torvalds 16301da177e4SLinus Torvalds msg.msg_control=NULL; 16311da177e4SLinus Torvalds msg.msg_controllen=0; 16321da177e4SLinus Torvalds msg.msg_iovlen=1; 16331da177e4SLinus Torvalds msg.msg_iov=&iov; 16341da177e4SLinus Torvalds iov.iov_len=size; 16351da177e4SLinus Torvalds iov.iov_base=ubuf; 16361da177e4SLinus Torvalds msg.msg_name=address; 16371da177e4SLinus Torvalds msg.msg_namelen=MAX_SOCK_ADDR; 16381da177e4SLinus Torvalds if (sock->file->f_flags & O_NONBLOCK) 16391da177e4SLinus Torvalds flags |= MSG_DONTWAIT; 16401da177e4SLinus Torvalds err=sock_recvmsg(sock, &msg, size, flags); 16411da177e4SLinus Torvalds 16421da177e4SLinus Torvalds if(err >= 0 && addr != NULL) 16431da177e4SLinus Torvalds { 16441da177e4SLinus Torvalds err2=move_addr_to_user(address, msg.msg_namelen, addr, addr_len); 16451da177e4SLinus Torvalds if(err2<0) 16461da177e4SLinus Torvalds err=err2; 16471da177e4SLinus Torvalds } 16481da177e4SLinus Torvalds out: 16496cb153caSBenjamin LaHaise fput_light(sock_file, fput_needed); 16501da177e4SLinus Torvalds return err; 16511da177e4SLinus Torvalds } 16521da177e4SLinus Torvalds 16531da177e4SLinus Torvalds /* 16541da177e4SLinus Torvalds * Receive a datagram from a socket. 16551da177e4SLinus Torvalds */ 16561da177e4SLinus Torvalds 16571da177e4SLinus Torvalds asmlinkage long sys_recv(int fd, void __user * ubuf, size_t size, unsigned flags) 16581da177e4SLinus Torvalds { 16591da177e4SLinus Torvalds return sys_recvfrom(fd, ubuf, size, flags, NULL, NULL); 16601da177e4SLinus Torvalds } 16611da177e4SLinus Torvalds 16621da177e4SLinus Torvalds /* 16631da177e4SLinus Torvalds * Set a socket option. Because we don't know the option lengths we have 16641da177e4SLinus Torvalds * to pass the user mode parameter for the protocols to sort out. 16651da177e4SLinus Torvalds */ 16661da177e4SLinus Torvalds 16671da177e4SLinus Torvalds asmlinkage long sys_setsockopt(int fd, int level, int optname, char __user *optval, int optlen) 16681da177e4SLinus Torvalds { 16696cb153caSBenjamin LaHaise int err, fput_needed; 16701da177e4SLinus Torvalds struct socket *sock; 16711da177e4SLinus Torvalds 16721da177e4SLinus Torvalds if (optlen < 0) 16731da177e4SLinus Torvalds return -EINVAL; 16741da177e4SLinus Torvalds 16756cb153caSBenjamin LaHaise if ((sock = sockfd_lookup_light(fd, &err, &fput_needed)) != NULL) 16761da177e4SLinus Torvalds { 16771da177e4SLinus Torvalds err = security_socket_setsockopt(sock,level,optname); 16786cb153caSBenjamin LaHaise if (err) 16796cb153caSBenjamin LaHaise goto out_put; 16801da177e4SLinus Torvalds 16811da177e4SLinus Torvalds if (level == SOL_SOCKET) 16821da177e4SLinus Torvalds err=sock_setsockopt(sock,level,optname,optval,optlen); 16831da177e4SLinus Torvalds else 16841da177e4SLinus Torvalds err=sock->ops->setsockopt(sock, level, optname, optval, optlen); 16856cb153caSBenjamin LaHaise out_put: 16866cb153caSBenjamin LaHaise fput_light(sock->file, fput_needed); 16871da177e4SLinus Torvalds } 16881da177e4SLinus Torvalds return err; 16891da177e4SLinus Torvalds } 16901da177e4SLinus Torvalds 16911da177e4SLinus Torvalds /* 16921da177e4SLinus Torvalds * Get a socket option. Because we don't know the option lengths we have 16931da177e4SLinus Torvalds * to pass a user mode parameter for the protocols to sort out. 16941da177e4SLinus Torvalds */ 16951da177e4SLinus Torvalds 16961da177e4SLinus Torvalds asmlinkage long sys_getsockopt(int fd, int level, int optname, char __user *optval, int __user *optlen) 16971da177e4SLinus Torvalds { 16986cb153caSBenjamin LaHaise int err, fput_needed; 16991da177e4SLinus Torvalds struct socket *sock; 17001da177e4SLinus Torvalds 17016cb153caSBenjamin LaHaise if ((sock = sockfd_lookup_light(fd, &err, &fput_needed)) != NULL) { 17026cb153caSBenjamin LaHaise err = security_socket_getsockopt(sock, level, optname); 17036cb153caSBenjamin LaHaise if (err) 17046cb153caSBenjamin LaHaise goto out_put; 17051da177e4SLinus Torvalds 17061da177e4SLinus Torvalds if (level == SOL_SOCKET) 17071da177e4SLinus Torvalds err=sock_getsockopt(sock,level,optname,optval,optlen); 17081da177e4SLinus Torvalds else 17091da177e4SLinus Torvalds err=sock->ops->getsockopt(sock, level, optname, optval, optlen); 17106cb153caSBenjamin LaHaise out_put: 17116cb153caSBenjamin LaHaise fput_light(sock->file, fput_needed); 17121da177e4SLinus Torvalds } 17131da177e4SLinus Torvalds return err; 17141da177e4SLinus Torvalds } 17151da177e4SLinus Torvalds 17161da177e4SLinus Torvalds 17171da177e4SLinus Torvalds /* 17181da177e4SLinus Torvalds * Shutdown a socket. 17191da177e4SLinus Torvalds */ 17201da177e4SLinus Torvalds 17211da177e4SLinus Torvalds asmlinkage long sys_shutdown(int fd, int how) 17221da177e4SLinus Torvalds { 17236cb153caSBenjamin LaHaise int err, fput_needed; 17241da177e4SLinus Torvalds struct socket *sock; 17251da177e4SLinus Torvalds 17266cb153caSBenjamin LaHaise if ((sock = sockfd_lookup_light(fd, &err, &fput_needed))!=NULL) 17271da177e4SLinus Torvalds { 17281da177e4SLinus Torvalds err = security_socket_shutdown(sock, how); 17296cb153caSBenjamin LaHaise if (!err) 17301da177e4SLinus Torvalds err = sock->ops->shutdown(sock, how); 17316cb153caSBenjamin LaHaise fput_light(sock->file, fput_needed); 17321da177e4SLinus Torvalds } 17331da177e4SLinus Torvalds return err; 17341da177e4SLinus Torvalds } 17351da177e4SLinus Torvalds 17361da177e4SLinus Torvalds /* A couple of helpful macros for getting the address of the 32/64 bit 17371da177e4SLinus Torvalds * fields which are the same type (int / unsigned) on our platforms. 17381da177e4SLinus Torvalds */ 17391da177e4SLinus Torvalds #define COMPAT_MSG(msg, member) ((MSG_CMSG_COMPAT & flags) ? &msg##_compat->member : &msg->member) 17401da177e4SLinus Torvalds #define COMPAT_NAMELEN(msg) COMPAT_MSG(msg, msg_namelen) 17411da177e4SLinus Torvalds #define COMPAT_FLAGS(msg) COMPAT_MSG(msg, msg_flags) 17421da177e4SLinus Torvalds 17431da177e4SLinus Torvalds 17441da177e4SLinus Torvalds /* 17451da177e4SLinus Torvalds * BSD sendmsg interface 17461da177e4SLinus Torvalds */ 17471da177e4SLinus Torvalds 17481da177e4SLinus Torvalds asmlinkage long sys_sendmsg(int fd, struct msghdr __user *msg, unsigned flags) 17491da177e4SLinus Torvalds { 17501da177e4SLinus Torvalds struct compat_msghdr __user *msg_compat = (struct compat_msghdr __user *)msg; 17511da177e4SLinus Torvalds struct socket *sock; 17521da177e4SLinus Torvalds char address[MAX_SOCK_ADDR]; 17531da177e4SLinus Torvalds struct iovec iovstack[UIO_FASTIOV], *iov = iovstack; 1754b9d717a7SAlex Williamson unsigned char ctl[sizeof(struct cmsghdr) + 20] 1755b9d717a7SAlex Williamson __attribute__ ((aligned (sizeof(__kernel_size_t)))); 1756b9d717a7SAlex Williamson /* 20 is size of ipv6_pktinfo */ 17571da177e4SLinus Torvalds unsigned char *ctl_buf = ctl; 17581da177e4SLinus Torvalds struct msghdr msg_sys; 17591da177e4SLinus Torvalds int err, ctl_len, iov_size, total_len; 17606cb153caSBenjamin LaHaise int fput_needed; 17611da177e4SLinus Torvalds 17621da177e4SLinus Torvalds err = -EFAULT; 17631da177e4SLinus Torvalds if (MSG_CMSG_COMPAT & flags) { 17641da177e4SLinus Torvalds if (get_compat_msghdr(&msg_sys, msg_compat)) 17651da177e4SLinus Torvalds return -EFAULT; 17661da177e4SLinus Torvalds } else if (copy_from_user(&msg_sys, msg, sizeof(struct msghdr))) 17671da177e4SLinus Torvalds return -EFAULT; 17681da177e4SLinus Torvalds 17696cb153caSBenjamin LaHaise sock = sockfd_lookup_light(fd, &err, &fput_needed); 17701da177e4SLinus Torvalds if (!sock) 17711da177e4SLinus Torvalds goto out; 17721da177e4SLinus Torvalds 17731da177e4SLinus Torvalds /* do not move before msg_sys is valid */ 17741da177e4SLinus Torvalds err = -EMSGSIZE; 17751da177e4SLinus Torvalds if (msg_sys.msg_iovlen > UIO_MAXIOV) 17761da177e4SLinus Torvalds goto out_put; 17771da177e4SLinus Torvalds 17781da177e4SLinus Torvalds /* Check whether to allocate the iovec area*/ 17791da177e4SLinus Torvalds err = -ENOMEM; 17801da177e4SLinus Torvalds iov_size = msg_sys.msg_iovlen * sizeof(struct iovec); 17811da177e4SLinus Torvalds if (msg_sys.msg_iovlen > UIO_FASTIOV) { 17821da177e4SLinus Torvalds iov = sock_kmalloc(sock->sk, iov_size, GFP_KERNEL); 17831da177e4SLinus Torvalds if (!iov) 17841da177e4SLinus Torvalds goto out_put; 17851da177e4SLinus Torvalds } 17861da177e4SLinus Torvalds 17871da177e4SLinus Torvalds /* This will also move the address data into kernel space */ 17881da177e4SLinus Torvalds if (MSG_CMSG_COMPAT & flags) { 17891da177e4SLinus Torvalds err = verify_compat_iovec(&msg_sys, iov, address, VERIFY_READ); 17901da177e4SLinus Torvalds } else 17911da177e4SLinus Torvalds err = verify_iovec(&msg_sys, iov, address, VERIFY_READ); 17921da177e4SLinus Torvalds if (err < 0) 17931da177e4SLinus Torvalds goto out_freeiov; 17941da177e4SLinus Torvalds total_len = err; 17951da177e4SLinus Torvalds 17961da177e4SLinus Torvalds err = -ENOBUFS; 17971da177e4SLinus Torvalds 17981da177e4SLinus Torvalds if (msg_sys.msg_controllen > INT_MAX) 17991da177e4SLinus Torvalds goto out_freeiov; 18001da177e4SLinus Torvalds ctl_len = msg_sys.msg_controllen; 18011da177e4SLinus Torvalds if ((MSG_CMSG_COMPAT & flags) && ctl_len) { 18028920e8f9SAl Viro err = cmsghdr_from_user_compat_to_kern(&msg_sys, sock->sk, ctl, sizeof(ctl)); 18031da177e4SLinus Torvalds if (err) 18041da177e4SLinus Torvalds goto out_freeiov; 18051da177e4SLinus Torvalds ctl_buf = msg_sys.msg_control; 18068920e8f9SAl Viro ctl_len = msg_sys.msg_controllen; 18071da177e4SLinus Torvalds } else if (ctl_len) { 18081da177e4SLinus Torvalds if (ctl_len > sizeof(ctl)) 18091da177e4SLinus Torvalds { 18101da177e4SLinus Torvalds ctl_buf = sock_kmalloc(sock->sk, ctl_len, GFP_KERNEL); 18111da177e4SLinus Torvalds if (ctl_buf == NULL) 18121da177e4SLinus Torvalds goto out_freeiov; 18131da177e4SLinus Torvalds } 18141da177e4SLinus Torvalds err = -EFAULT; 18151da177e4SLinus Torvalds /* 18161da177e4SLinus Torvalds * Careful! Before this, msg_sys.msg_control contains a user pointer. 18171da177e4SLinus Torvalds * Afterwards, it will be a kernel pointer. Thus the compiler-assisted 18181da177e4SLinus Torvalds * checking falls down on this. 18191da177e4SLinus Torvalds */ 18201da177e4SLinus Torvalds if (copy_from_user(ctl_buf, (void __user *) msg_sys.msg_control, ctl_len)) 18211da177e4SLinus Torvalds goto out_freectl; 18221da177e4SLinus Torvalds msg_sys.msg_control = ctl_buf; 18231da177e4SLinus Torvalds } 18241da177e4SLinus Torvalds msg_sys.msg_flags = flags; 18251da177e4SLinus Torvalds 18261da177e4SLinus Torvalds if (sock->file->f_flags & O_NONBLOCK) 18271da177e4SLinus Torvalds msg_sys.msg_flags |= MSG_DONTWAIT; 18281da177e4SLinus Torvalds err = sock_sendmsg(sock, &msg_sys, total_len); 18291da177e4SLinus Torvalds 18301da177e4SLinus Torvalds out_freectl: 18311da177e4SLinus Torvalds if (ctl_buf != ctl) 18321da177e4SLinus Torvalds sock_kfree_s(sock->sk, ctl_buf, ctl_len); 18331da177e4SLinus Torvalds out_freeiov: 18341da177e4SLinus Torvalds if (iov != iovstack) 18351da177e4SLinus Torvalds sock_kfree_s(sock->sk, iov, iov_size); 18361da177e4SLinus Torvalds out_put: 18376cb153caSBenjamin LaHaise fput_light(sock->file, fput_needed); 18381da177e4SLinus Torvalds out: 18391da177e4SLinus Torvalds return err; 18401da177e4SLinus Torvalds } 18411da177e4SLinus Torvalds 18421da177e4SLinus Torvalds /* 18431da177e4SLinus Torvalds * BSD recvmsg interface 18441da177e4SLinus Torvalds */ 18451da177e4SLinus Torvalds 18461da177e4SLinus Torvalds asmlinkage long sys_recvmsg(int fd, struct msghdr __user *msg, unsigned int flags) 18471da177e4SLinus Torvalds { 18481da177e4SLinus Torvalds struct compat_msghdr __user *msg_compat = (struct compat_msghdr __user *)msg; 18491da177e4SLinus Torvalds struct socket *sock; 18501da177e4SLinus Torvalds struct iovec iovstack[UIO_FASTIOV]; 18511da177e4SLinus Torvalds struct iovec *iov=iovstack; 18521da177e4SLinus Torvalds struct msghdr msg_sys; 18531da177e4SLinus Torvalds unsigned long cmsg_ptr; 18541da177e4SLinus Torvalds int err, iov_size, total_len, len; 18556cb153caSBenjamin LaHaise int fput_needed; 18561da177e4SLinus Torvalds 18571da177e4SLinus Torvalds /* kernel mode address */ 18581da177e4SLinus Torvalds char addr[MAX_SOCK_ADDR]; 18591da177e4SLinus Torvalds 18601da177e4SLinus Torvalds /* user mode address pointers */ 18611da177e4SLinus Torvalds struct sockaddr __user *uaddr; 18621da177e4SLinus Torvalds int __user *uaddr_len; 18631da177e4SLinus Torvalds 18641da177e4SLinus Torvalds if (MSG_CMSG_COMPAT & flags) { 18651da177e4SLinus Torvalds if (get_compat_msghdr(&msg_sys, msg_compat)) 18661da177e4SLinus Torvalds return -EFAULT; 18671da177e4SLinus Torvalds } else 18681da177e4SLinus Torvalds if (copy_from_user(&msg_sys,msg,sizeof(struct msghdr))) 18691da177e4SLinus Torvalds return -EFAULT; 18701da177e4SLinus Torvalds 18716cb153caSBenjamin LaHaise sock = sockfd_lookup_light(fd, &err, &fput_needed); 18721da177e4SLinus Torvalds if (!sock) 18731da177e4SLinus Torvalds goto out; 18741da177e4SLinus Torvalds 18751da177e4SLinus Torvalds err = -EMSGSIZE; 18761da177e4SLinus Torvalds if (msg_sys.msg_iovlen > UIO_MAXIOV) 18771da177e4SLinus Torvalds goto out_put; 18781da177e4SLinus Torvalds 18791da177e4SLinus Torvalds /* Check whether to allocate the iovec area*/ 18801da177e4SLinus Torvalds err = -ENOMEM; 18811da177e4SLinus Torvalds iov_size = msg_sys.msg_iovlen * sizeof(struct iovec); 18821da177e4SLinus Torvalds if (msg_sys.msg_iovlen > UIO_FASTIOV) { 18831da177e4SLinus Torvalds iov = sock_kmalloc(sock->sk, iov_size, GFP_KERNEL); 18841da177e4SLinus Torvalds if (!iov) 18851da177e4SLinus Torvalds goto out_put; 18861da177e4SLinus Torvalds } 18871da177e4SLinus Torvalds 18881da177e4SLinus Torvalds /* 18891da177e4SLinus Torvalds * Save the user-mode address (verify_iovec will change the 18901da177e4SLinus Torvalds * kernel msghdr to use the kernel address space) 18911da177e4SLinus Torvalds */ 18921da177e4SLinus Torvalds 18931da177e4SLinus Torvalds uaddr = (void __user *) msg_sys.msg_name; 18941da177e4SLinus Torvalds uaddr_len = COMPAT_NAMELEN(msg); 18951da177e4SLinus Torvalds if (MSG_CMSG_COMPAT & flags) { 18961da177e4SLinus Torvalds err = verify_compat_iovec(&msg_sys, iov, addr, VERIFY_WRITE); 18971da177e4SLinus Torvalds } else 18981da177e4SLinus Torvalds err = verify_iovec(&msg_sys, iov, addr, VERIFY_WRITE); 18991da177e4SLinus Torvalds if (err < 0) 19001da177e4SLinus Torvalds goto out_freeiov; 19011da177e4SLinus Torvalds total_len=err; 19021da177e4SLinus Torvalds 19031da177e4SLinus Torvalds cmsg_ptr = (unsigned long)msg_sys.msg_control; 19041da177e4SLinus Torvalds msg_sys.msg_flags = 0; 19051da177e4SLinus Torvalds if (MSG_CMSG_COMPAT & flags) 19061da177e4SLinus Torvalds msg_sys.msg_flags = MSG_CMSG_COMPAT; 19071da177e4SLinus Torvalds 19081da177e4SLinus Torvalds if (sock->file->f_flags & O_NONBLOCK) 19091da177e4SLinus Torvalds flags |= MSG_DONTWAIT; 19101da177e4SLinus Torvalds err = sock_recvmsg(sock, &msg_sys, total_len, flags); 19111da177e4SLinus Torvalds if (err < 0) 19121da177e4SLinus Torvalds goto out_freeiov; 19131da177e4SLinus Torvalds len = err; 19141da177e4SLinus Torvalds 19151da177e4SLinus Torvalds if (uaddr != NULL) { 19161da177e4SLinus Torvalds err = move_addr_to_user(addr, msg_sys.msg_namelen, uaddr, uaddr_len); 19171da177e4SLinus Torvalds if (err < 0) 19181da177e4SLinus Torvalds goto out_freeiov; 19191da177e4SLinus Torvalds } 192037f7f421SDavid S. Miller err = __put_user((msg_sys.msg_flags & ~MSG_CMSG_COMPAT), 192137f7f421SDavid S. Miller COMPAT_FLAGS(msg)); 19221da177e4SLinus Torvalds if (err) 19231da177e4SLinus Torvalds goto out_freeiov; 19241da177e4SLinus Torvalds if (MSG_CMSG_COMPAT & flags) 19251da177e4SLinus Torvalds err = __put_user((unsigned long)msg_sys.msg_control-cmsg_ptr, 19261da177e4SLinus Torvalds &msg_compat->msg_controllen); 19271da177e4SLinus Torvalds else 19281da177e4SLinus Torvalds err = __put_user((unsigned long)msg_sys.msg_control-cmsg_ptr, 19291da177e4SLinus Torvalds &msg->msg_controllen); 19301da177e4SLinus Torvalds if (err) 19311da177e4SLinus Torvalds goto out_freeiov; 19321da177e4SLinus Torvalds err = len; 19331da177e4SLinus Torvalds 19341da177e4SLinus Torvalds out_freeiov: 19351da177e4SLinus Torvalds if (iov != iovstack) 19361da177e4SLinus Torvalds sock_kfree_s(sock->sk, iov, iov_size); 19371da177e4SLinus Torvalds out_put: 19386cb153caSBenjamin LaHaise fput_light(sock->file, fput_needed); 19391da177e4SLinus Torvalds out: 19401da177e4SLinus Torvalds return err; 19411da177e4SLinus Torvalds } 19421da177e4SLinus Torvalds 19431da177e4SLinus Torvalds #ifdef __ARCH_WANT_SYS_SOCKETCALL 19441da177e4SLinus Torvalds 19451da177e4SLinus Torvalds /* Argument list sizes for sys_socketcall */ 19461da177e4SLinus Torvalds #define AL(x) ((x) * sizeof(unsigned long)) 19471da177e4SLinus Torvalds static unsigned char nargs[18]={AL(0),AL(3),AL(3),AL(3),AL(2),AL(3), 19481da177e4SLinus Torvalds AL(3),AL(3),AL(4),AL(4),AL(4),AL(6), 19491da177e4SLinus Torvalds AL(6),AL(2),AL(5),AL(5),AL(3),AL(3)}; 19501da177e4SLinus Torvalds #undef AL 19511da177e4SLinus Torvalds 19521da177e4SLinus Torvalds /* 19531da177e4SLinus Torvalds * System call vectors. 19541da177e4SLinus Torvalds * 19551da177e4SLinus Torvalds * Argument checking cleaned up. Saved 20% in size. 19561da177e4SLinus Torvalds * This function doesn't need to set the kernel lock because 19571da177e4SLinus Torvalds * it is set by the callees. 19581da177e4SLinus Torvalds */ 19591da177e4SLinus Torvalds 19601da177e4SLinus Torvalds asmlinkage long sys_socketcall(int call, unsigned long __user *args) 19611da177e4SLinus Torvalds { 19621da177e4SLinus Torvalds unsigned long a[6]; 19631da177e4SLinus Torvalds unsigned long a0,a1; 19641da177e4SLinus Torvalds int err; 19651da177e4SLinus Torvalds 19661da177e4SLinus Torvalds if(call<1||call>SYS_RECVMSG) 19671da177e4SLinus Torvalds return -EINVAL; 19681da177e4SLinus Torvalds 19691da177e4SLinus Torvalds /* copy_from_user should be SMP safe. */ 19701da177e4SLinus Torvalds if (copy_from_user(a, args, nargs[call])) 19711da177e4SLinus Torvalds return -EFAULT; 19721da177e4SLinus Torvalds 19734bcff1b3SDavid Woodhouse err = audit_socketcall(nargs[call]/sizeof(unsigned long), a); 19743ec3b2fbSDavid Woodhouse if (err) 19753ec3b2fbSDavid Woodhouse return err; 19763ec3b2fbSDavid Woodhouse 19771da177e4SLinus Torvalds a0=a[0]; 19781da177e4SLinus Torvalds a1=a[1]; 19791da177e4SLinus Torvalds 19801da177e4SLinus Torvalds switch(call) 19811da177e4SLinus Torvalds { 19821da177e4SLinus Torvalds case SYS_SOCKET: 19831da177e4SLinus Torvalds err = sys_socket(a0,a1,a[2]); 19841da177e4SLinus Torvalds break; 19851da177e4SLinus Torvalds case SYS_BIND: 19861da177e4SLinus Torvalds err = sys_bind(a0,(struct sockaddr __user *)a1, a[2]); 19871da177e4SLinus Torvalds break; 19881da177e4SLinus Torvalds case SYS_CONNECT: 19891da177e4SLinus Torvalds err = sys_connect(a0, (struct sockaddr __user *)a1, a[2]); 19901da177e4SLinus Torvalds break; 19911da177e4SLinus Torvalds case SYS_LISTEN: 19921da177e4SLinus Torvalds err = sys_listen(a0,a1); 19931da177e4SLinus Torvalds break; 19941da177e4SLinus Torvalds case SYS_ACCEPT: 19951da177e4SLinus Torvalds err = sys_accept(a0,(struct sockaddr __user *)a1, (int __user *)a[2]); 19961da177e4SLinus Torvalds break; 19971da177e4SLinus Torvalds case SYS_GETSOCKNAME: 19981da177e4SLinus Torvalds err = sys_getsockname(a0,(struct sockaddr __user *)a1, (int __user *)a[2]); 19991da177e4SLinus Torvalds break; 20001da177e4SLinus Torvalds case SYS_GETPEERNAME: 20011da177e4SLinus Torvalds err = sys_getpeername(a0, (struct sockaddr __user *)a1, (int __user *)a[2]); 20021da177e4SLinus Torvalds break; 20031da177e4SLinus Torvalds case SYS_SOCKETPAIR: 20041da177e4SLinus Torvalds err = sys_socketpair(a0,a1, a[2], (int __user *)a[3]); 20051da177e4SLinus Torvalds break; 20061da177e4SLinus Torvalds case SYS_SEND: 20071da177e4SLinus Torvalds err = sys_send(a0, (void __user *)a1, a[2], a[3]); 20081da177e4SLinus Torvalds break; 20091da177e4SLinus Torvalds case SYS_SENDTO: 20101da177e4SLinus Torvalds err = sys_sendto(a0,(void __user *)a1, a[2], a[3], 20111da177e4SLinus Torvalds (struct sockaddr __user *)a[4], a[5]); 20121da177e4SLinus Torvalds break; 20131da177e4SLinus Torvalds case SYS_RECV: 20141da177e4SLinus Torvalds err = sys_recv(a0, (void __user *)a1, a[2], a[3]); 20151da177e4SLinus Torvalds break; 20161da177e4SLinus Torvalds case SYS_RECVFROM: 20171da177e4SLinus Torvalds err = sys_recvfrom(a0, (void __user *)a1, a[2], a[3], 20181da177e4SLinus Torvalds (struct sockaddr __user *)a[4], (int __user *)a[5]); 20191da177e4SLinus Torvalds break; 20201da177e4SLinus Torvalds case SYS_SHUTDOWN: 20211da177e4SLinus Torvalds err = sys_shutdown(a0,a1); 20221da177e4SLinus Torvalds break; 20231da177e4SLinus Torvalds case SYS_SETSOCKOPT: 20241da177e4SLinus Torvalds err = sys_setsockopt(a0, a1, a[2], (char __user *)a[3], a[4]); 20251da177e4SLinus Torvalds break; 20261da177e4SLinus Torvalds case SYS_GETSOCKOPT: 20271da177e4SLinus Torvalds err = sys_getsockopt(a0, a1, a[2], (char __user *)a[3], (int __user *)a[4]); 20281da177e4SLinus Torvalds break; 20291da177e4SLinus Torvalds case SYS_SENDMSG: 20301da177e4SLinus Torvalds err = sys_sendmsg(a0, (struct msghdr __user *) a1, a[2]); 20311da177e4SLinus Torvalds break; 20321da177e4SLinus Torvalds case SYS_RECVMSG: 20331da177e4SLinus Torvalds err = sys_recvmsg(a0, (struct msghdr __user *) a1, a[2]); 20341da177e4SLinus Torvalds break; 20351da177e4SLinus Torvalds default: 20361da177e4SLinus Torvalds err = -EINVAL; 20371da177e4SLinus Torvalds break; 20381da177e4SLinus Torvalds } 20391da177e4SLinus Torvalds return err; 20401da177e4SLinus Torvalds } 20411da177e4SLinus Torvalds 20421da177e4SLinus Torvalds #endif /* __ARCH_WANT_SYS_SOCKETCALL */ 20431da177e4SLinus Torvalds 20441da177e4SLinus Torvalds /* 20451da177e4SLinus Torvalds * This function is called by a protocol handler that wants to 20461da177e4SLinus Torvalds * advertise its address family, and have it linked into the 20471da177e4SLinus Torvalds * SOCKET module. 20481da177e4SLinus Torvalds */ 20491da177e4SLinus Torvalds 20501da177e4SLinus Torvalds int sock_register(struct net_proto_family *ops) 20511da177e4SLinus Torvalds { 20521da177e4SLinus Torvalds int err; 20531da177e4SLinus Torvalds 20541da177e4SLinus Torvalds if (ops->family >= NPROTO) { 20551da177e4SLinus Torvalds printk(KERN_CRIT "protocol %d >= NPROTO(%d)\n", ops->family, NPROTO); 20561da177e4SLinus Torvalds return -ENOBUFS; 20571da177e4SLinus Torvalds } 20581da177e4SLinus Torvalds net_family_write_lock(); 20591da177e4SLinus Torvalds err = -EEXIST; 20601da177e4SLinus Torvalds if (net_families[ops->family] == NULL) { 20611da177e4SLinus Torvalds net_families[ops->family]=ops; 20621da177e4SLinus Torvalds err = 0; 20631da177e4SLinus Torvalds } 20641da177e4SLinus Torvalds net_family_write_unlock(); 20651da177e4SLinus Torvalds printk(KERN_INFO "NET: Registered protocol family %d\n", 20661da177e4SLinus Torvalds ops->family); 20671da177e4SLinus Torvalds return err; 20681da177e4SLinus Torvalds } 20691da177e4SLinus Torvalds 20701da177e4SLinus Torvalds /* 20711da177e4SLinus Torvalds * This function is called by a protocol handler that wants to 20721da177e4SLinus Torvalds * remove its address family, and have it unlinked from the 20731da177e4SLinus Torvalds * SOCKET module. 20741da177e4SLinus Torvalds */ 20751da177e4SLinus Torvalds 20761da177e4SLinus Torvalds int sock_unregister(int family) 20771da177e4SLinus Torvalds { 20781da177e4SLinus Torvalds if (family < 0 || family >= NPROTO) 20791da177e4SLinus Torvalds return -1; 20801da177e4SLinus Torvalds 20811da177e4SLinus Torvalds net_family_write_lock(); 20821da177e4SLinus Torvalds net_families[family]=NULL; 20831da177e4SLinus Torvalds net_family_write_unlock(); 20841da177e4SLinus Torvalds printk(KERN_INFO "NET: Unregistered protocol family %d\n", 20851da177e4SLinus Torvalds family); 20861da177e4SLinus Torvalds return 0; 20871da177e4SLinus Torvalds } 20881da177e4SLinus Torvalds 208977d76ea3SAndi Kleen static int __init sock_init(void) 20901da177e4SLinus Torvalds { 20911da177e4SLinus Torvalds /* 20921da177e4SLinus Torvalds * Initialize sock SLAB cache. 20931da177e4SLinus Torvalds */ 20941da177e4SLinus Torvalds 20951da177e4SLinus Torvalds sk_init(); 20961da177e4SLinus Torvalds 20971da177e4SLinus Torvalds /* 20981da177e4SLinus Torvalds * Initialize skbuff SLAB cache 20991da177e4SLinus Torvalds */ 21001da177e4SLinus Torvalds skb_init(); 21011da177e4SLinus Torvalds 21021da177e4SLinus Torvalds /* 21031da177e4SLinus Torvalds * Initialize the protocols module. 21041da177e4SLinus Torvalds */ 21051da177e4SLinus Torvalds 21061da177e4SLinus Torvalds init_inodecache(); 21071da177e4SLinus Torvalds register_filesystem(&sock_fs_type); 21081da177e4SLinus Torvalds sock_mnt = kern_mount(&sock_fs_type); 210977d76ea3SAndi Kleen 211077d76ea3SAndi Kleen /* The real protocol initialization is performed in later initcalls. 21111da177e4SLinus Torvalds */ 21121da177e4SLinus Torvalds 21131da177e4SLinus Torvalds #ifdef CONFIG_NETFILTER 21141da177e4SLinus Torvalds netfilter_init(); 21151da177e4SLinus Torvalds #endif 2116cbeb321aSDavid S. Miller 2117cbeb321aSDavid S. Miller return 0; 21181da177e4SLinus Torvalds } 21191da177e4SLinus Torvalds 212077d76ea3SAndi Kleen core_initcall(sock_init); /* early initcall */ 212177d76ea3SAndi Kleen 21221da177e4SLinus Torvalds #ifdef CONFIG_PROC_FS 21231da177e4SLinus Torvalds void socket_seq_show(struct seq_file *seq) 21241da177e4SLinus Torvalds { 21251da177e4SLinus Torvalds int cpu; 21261da177e4SLinus Torvalds int counter = 0; 21271da177e4SLinus Torvalds 212888a2a4acSEric Dumazet for_each_cpu(cpu) 21291da177e4SLinus Torvalds counter += per_cpu(sockets_in_use, cpu); 21301da177e4SLinus Torvalds 21311da177e4SLinus Torvalds /* It can be negative, by the way. 8) */ 21321da177e4SLinus Torvalds if (counter < 0) 21331da177e4SLinus Torvalds counter = 0; 21341da177e4SLinus Torvalds 21351da177e4SLinus Torvalds seq_printf(seq, "sockets: used %d\n", counter); 21361da177e4SLinus Torvalds } 21371da177e4SLinus Torvalds #endif /* CONFIG_PROC_FS */ 21381da177e4SLinus Torvalds 21391da177e4SLinus Torvalds /* ABI emulation layers need these two */ 21401da177e4SLinus Torvalds EXPORT_SYMBOL(move_addr_to_kernel); 21411da177e4SLinus Torvalds EXPORT_SYMBOL(move_addr_to_user); 21421da177e4SLinus Torvalds EXPORT_SYMBOL(sock_create); 21431da177e4SLinus Torvalds EXPORT_SYMBOL(sock_create_kern); 21441da177e4SLinus Torvalds EXPORT_SYMBOL(sock_create_lite); 21451da177e4SLinus Torvalds EXPORT_SYMBOL(sock_map_fd); 21461da177e4SLinus Torvalds EXPORT_SYMBOL(sock_recvmsg); 21471da177e4SLinus Torvalds EXPORT_SYMBOL(sock_register); 21481da177e4SLinus Torvalds EXPORT_SYMBOL(sock_release); 21491da177e4SLinus Torvalds EXPORT_SYMBOL(sock_sendmsg); 21501da177e4SLinus Torvalds EXPORT_SYMBOL(sock_unregister); 21511da177e4SLinus Torvalds EXPORT_SYMBOL(sock_wake_async); 21521da177e4SLinus Torvalds EXPORT_SYMBOL(sockfd_lookup); 21531da177e4SLinus Torvalds EXPORT_SYMBOL(kernel_sendmsg); 21541da177e4SLinus Torvalds EXPORT_SYMBOL(kernel_recvmsg); 2155