11da177e4SLinus Torvalds /* 21da177e4SLinus Torvalds * NET An implementation of the SOCKET network access protocol. 31da177e4SLinus Torvalds * 41da177e4SLinus Torvalds * Version: @(#)socket.c 1.1.93 18/02/95 51da177e4SLinus Torvalds * 61da177e4SLinus Torvalds * Authors: Orest Zborowski, <obz@Kodak.COM> 702c30a84SJesper Juhl * Ross Biro 81da177e4SLinus Torvalds * Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG> 91da177e4SLinus Torvalds * 101da177e4SLinus Torvalds * Fixes: 111da177e4SLinus Torvalds * Anonymous : NOTSOCK/BADF cleanup. Error fix in 121da177e4SLinus Torvalds * shutdown() 131da177e4SLinus Torvalds * Alan Cox : verify_area() fixes 141da177e4SLinus Torvalds * Alan Cox : Removed DDI 151da177e4SLinus Torvalds * Jonathan Kamens : SOCK_DGRAM reconnect bug 161da177e4SLinus Torvalds * Alan Cox : Moved a load of checks to the very 171da177e4SLinus Torvalds * top level. 181da177e4SLinus Torvalds * Alan Cox : Move address structures to/from user 191da177e4SLinus Torvalds * mode above the protocol layers. 201da177e4SLinus Torvalds * Rob Janssen : Allow 0 length sends. 211da177e4SLinus Torvalds * Alan Cox : Asynchronous I/O support (cribbed from the 221da177e4SLinus Torvalds * tty drivers). 231da177e4SLinus Torvalds * Niibe Yutaka : Asynchronous I/O for writes (4.4BSD style) 241da177e4SLinus Torvalds * Jeff Uphoff : Made max number of sockets command-line 251da177e4SLinus Torvalds * configurable. 261da177e4SLinus Torvalds * Matti Aarnio : Made the number of sockets dynamic, 271da177e4SLinus Torvalds * to be allocated when needed, and mr. 281da177e4SLinus Torvalds * Uphoff's max is used as max to be 291da177e4SLinus Torvalds * allowed to allocate. 301da177e4SLinus Torvalds * Linus : Argh. removed all the socket allocation 311da177e4SLinus Torvalds * altogether: it's in the inode now. 321da177e4SLinus Torvalds * Alan Cox : Made sock_alloc()/sock_release() public 331da177e4SLinus Torvalds * for NetROM and future kernel nfsd type 341da177e4SLinus Torvalds * stuff. 351da177e4SLinus Torvalds * Alan Cox : sendmsg/recvmsg basics. 361da177e4SLinus Torvalds * Tom Dyas : Export net symbols. 371da177e4SLinus Torvalds * Marcin Dalecki : Fixed problems with CONFIG_NET="n". 381da177e4SLinus Torvalds * Alan Cox : Added thread locking to sys_* calls 391da177e4SLinus Torvalds * for sockets. May have errors at the 401da177e4SLinus Torvalds * moment. 411da177e4SLinus Torvalds * Kevin Buhr : Fixed the dumb errors in the above. 421da177e4SLinus Torvalds * Andi Kleen : Some small cleanups, optimizations, 431da177e4SLinus Torvalds * and fixed a copy_from_user() bug. 441da177e4SLinus Torvalds * Tigran Aivazian : sys_send(args) calls sys_sendto(args, NULL, 0) 451da177e4SLinus Torvalds * Tigran Aivazian : Made listen(2) backlog sanity checks 461da177e4SLinus Torvalds * protocol-independent 471da177e4SLinus Torvalds * 481da177e4SLinus Torvalds * 491da177e4SLinus Torvalds * This program is free software; you can redistribute it and/or 501da177e4SLinus Torvalds * modify it under the terms of the GNU General Public License 511da177e4SLinus Torvalds * as published by the Free Software Foundation; either version 521da177e4SLinus Torvalds * 2 of the License, or (at your option) any later version. 531da177e4SLinus Torvalds * 541da177e4SLinus Torvalds * 551da177e4SLinus Torvalds * This module is effectively the top level interface to the BSD socket 561da177e4SLinus Torvalds * paradigm. 571da177e4SLinus Torvalds * 581da177e4SLinus Torvalds * Based upon Swansea University Computer Society NET3.039 591da177e4SLinus Torvalds */ 601da177e4SLinus Torvalds 611da177e4SLinus Torvalds #include <linux/mm.h> 621da177e4SLinus Torvalds #include <linux/socket.h> 631da177e4SLinus Torvalds #include <linux/file.h> 641da177e4SLinus Torvalds #include <linux/net.h> 651da177e4SLinus Torvalds #include <linux/interrupt.h> 6655737fdaSStephen Hemminger #include <linux/rcupdate.h> 671da177e4SLinus Torvalds #include <linux/netdevice.h> 681da177e4SLinus Torvalds #include <linux/proc_fs.h> 691da177e4SLinus Torvalds #include <linux/seq_file.h> 704a3e2f71SArjan van de Ven #include <linux/mutex.h> 711da177e4SLinus Torvalds #include <linux/wanrouter.h> 721da177e4SLinus Torvalds #include <linux/if_bridge.h> 7320380731SArnaldo Carvalho de Melo #include <linux/if_frad.h> 7420380731SArnaldo Carvalho de Melo #include <linux/if_vlan.h> 751da177e4SLinus Torvalds #include <linux/init.h> 761da177e4SLinus Torvalds #include <linux/poll.h> 771da177e4SLinus Torvalds #include <linux/cache.h> 781da177e4SLinus Torvalds #include <linux/module.h> 791da177e4SLinus Torvalds #include <linux/highmem.h> 801da177e4SLinus Torvalds #include <linux/mount.h> 811da177e4SLinus Torvalds #include <linux/security.h> 821da177e4SLinus Torvalds #include <linux/syscalls.h> 831da177e4SLinus Torvalds #include <linux/compat.h> 841da177e4SLinus Torvalds #include <linux/kmod.h> 853ec3b2fbSDavid Woodhouse #include <linux/audit.h> 86d86b5e0eSAdrian Bunk #include <linux/wireless.h> 871b8d7ae4SEric W. Biederman #include <linux/nsproxy.h> 881da177e4SLinus Torvalds 891da177e4SLinus Torvalds #include <asm/uaccess.h> 901da177e4SLinus Torvalds #include <asm/unistd.h> 911da177e4SLinus Torvalds 921da177e4SLinus Torvalds #include <net/compat.h> 9387de87d5SDavid S. Miller #include <net/wext.h> 941da177e4SLinus Torvalds 951da177e4SLinus Torvalds #include <net/sock.h> 961da177e4SLinus Torvalds #include <linux/netfilter.h> 971da177e4SLinus Torvalds 981da177e4SLinus Torvalds static int sock_no_open(struct inode *irrelevant, struct file *dontcare); 99027445c3SBadari Pulavarty static ssize_t sock_aio_read(struct kiocb *iocb, const struct iovec *iov, 100027445c3SBadari Pulavarty unsigned long nr_segs, loff_t pos); 101027445c3SBadari Pulavarty static ssize_t sock_aio_write(struct kiocb *iocb, const struct iovec *iov, 102027445c3SBadari Pulavarty unsigned long nr_segs, loff_t pos); 1031da177e4SLinus Torvalds static int sock_mmap(struct file *file, struct vm_area_struct *vma); 1041da177e4SLinus Torvalds 1051da177e4SLinus Torvalds static int sock_close(struct inode *inode, struct file *file); 1061da177e4SLinus Torvalds static unsigned int sock_poll(struct file *file, 1071da177e4SLinus Torvalds struct poll_table_struct *wait); 10889bddce5SStephen Hemminger static long sock_ioctl(struct file *file, unsigned int cmd, unsigned long arg); 10989bbfc95SShaun Pereira #ifdef CONFIG_COMPAT 11089bbfc95SShaun Pereira static long compat_sock_ioctl(struct file *file, 11189bbfc95SShaun Pereira unsigned int cmd, unsigned long arg); 11289bbfc95SShaun Pereira #endif 1131da177e4SLinus Torvalds static int sock_fasync(int fd, struct file *filp, int on); 1141da177e4SLinus Torvalds static ssize_t sock_sendpage(struct file *file, struct page *page, 1151da177e4SLinus Torvalds int offset, size_t size, loff_t *ppos, int more); 1169c55e01cSJens Axboe static ssize_t sock_splice_read(struct file *file, loff_t *ppos, 1179c55e01cSJens Axboe struct pipe_inode_info *pipe, size_t len, 1189c55e01cSJens Axboe unsigned int flags); 1191da177e4SLinus Torvalds 1201da177e4SLinus Torvalds /* 1211da177e4SLinus Torvalds * Socket files have a set of 'special' operations as well as the generic file ones. These don't appear 1221da177e4SLinus Torvalds * in the operation structures but are done directly via the socketcall() multiplexor. 1231da177e4SLinus Torvalds */ 1241da177e4SLinus Torvalds 125da7071d7SArjan van de Ven static const struct file_operations socket_file_ops = { 1261da177e4SLinus Torvalds .owner = THIS_MODULE, 1271da177e4SLinus Torvalds .llseek = no_llseek, 1281da177e4SLinus Torvalds .aio_read = sock_aio_read, 1291da177e4SLinus Torvalds .aio_write = sock_aio_write, 1301da177e4SLinus Torvalds .poll = sock_poll, 1311da177e4SLinus Torvalds .unlocked_ioctl = sock_ioctl, 13289bbfc95SShaun Pereira #ifdef CONFIG_COMPAT 13389bbfc95SShaun Pereira .compat_ioctl = compat_sock_ioctl, 13489bbfc95SShaun Pereira #endif 1351da177e4SLinus Torvalds .mmap = sock_mmap, 1361da177e4SLinus Torvalds .open = sock_no_open, /* special open code to disallow open via /proc */ 1371da177e4SLinus Torvalds .release = sock_close, 1381da177e4SLinus Torvalds .fasync = sock_fasync, 1395274f052SJens Axboe .sendpage = sock_sendpage, 1405274f052SJens Axboe .splice_write = generic_splice_sendpage, 1419c55e01cSJens Axboe .splice_read = sock_splice_read, 1421da177e4SLinus Torvalds }; 1431da177e4SLinus Torvalds 1441da177e4SLinus Torvalds /* 1451da177e4SLinus Torvalds * The protocol list. Each protocol is registered in here. 1461da177e4SLinus Torvalds */ 1471da177e4SLinus Torvalds 1481da177e4SLinus Torvalds static DEFINE_SPINLOCK(net_family_lock); 149f0fd27d4SStephen Hemminger static const struct net_proto_family *net_families[NPROTO] __read_mostly; 1501da177e4SLinus Torvalds 1511da177e4SLinus Torvalds /* 1521da177e4SLinus Torvalds * Statistics counters of the socket lists 1531da177e4SLinus Torvalds */ 1541da177e4SLinus Torvalds 1551da177e4SLinus Torvalds static DEFINE_PER_CPU(int, sockets_in_use) = 0; 1561da177e4SLinus Torvalds 1571da177e4SLinus Torvalds /* 15889bddce5SStephen Hemminger * Support routines. 15989bddce5SStephen Hemminger * Move socket addresses back and forth across the kernel/user 1601da177e4SLinus Torvalds * divide and look after the messy bits. 1611da177e4SLinus Torvalds */ 1621da177e4SLinus Torvalds 1631da177e4SLinus Torvalds #define MAX_SOCK_ADDR 128 /* 108 for Unix domain - 1641da177e4SLinus Torvalds 16 for IP, 16 for IPX, 1651da177e4SLinus Torvalds 24 for IPv6, 1661da177e4SLinus Torvalds about 80 for AX.25 1671da177e4SLinus Torvalds must be at least one bigger than 1681da177e4SLinus Torvalds the AF_UNIX size (see net/unix/af_unix.c 1691da177e4SLinus Torvalds :unix_mkname()). 1701da177e4SLinus Torvalds */ 1711da177e4SLinus Torvalds 1721da177e4SLinus Torvalds /** 1731da177e4SLinus Torvalds * move_addr_to_kernel - copy a socket address into kernel space 1741da177e4SLinus Torvalds * @uaddr: Address in user space 1751da177e4SLinus Torvalds * @kaddr: Address in kernel space 1761da177e4SLinus Torvalds * @ulen: Length in user space 1771da177e4SLinus Torvalds * 1781da177e4SLinus Torvalds * The address is copied into kernel space. If the provided address is 1791da177e4SLinus Torvalds * too long an error code of -EINVAL is returned. If the copy gives 1801da177e4SLinus Torvalds * invalid addresses -EFAULT is returned. On a success 0 is returned. 1811da177e4SLinus Torvalds */ 1821da177e4SLinus Torvalds 183230b1839SYOSHIFUJI Hideaki int move_addr_to_kernel(void __user *uaddr, int ulen, struct sockaddr *kaddr) 1841da177e4SLinus Torvalds { 185230b1839SYOSHIFUJI Hideaki if (ulen < 0 || ulen > sizeof(struct sockaddr_storage)) 1861da177e4SLinus Torvalds return -EINVAL; 1871da177e4SLinus Torvalds if (ulen == 0) 1881da177e4SLinus Torvalds return 0; 1891da177e4SLinus Torvalds if (copy_from_user(kaddr, uaddr, ulen)) 1901da177e4SLinus Torvalds return -EFAULT; 1913ec3b2fbSDavid Woodhouse return audit_sockaddr(ulen, kaddr); 1921da177e4SLinus Torvalds } 1931da177e4SLinus Torvalds 1941da177e4SLinus Torvalds /** 1951da177e4SLinus Torvalds * move_addr_to_user - copy an address to user space 1961da177e4SLinus Torvalds * @kaddr: kernel space address 1971da177e4SLinus Torvalds * @klen: length of address in kernel 1981da177e4SLinus Torvalds * @uaddr: user space address 1991da177e4SLinus Torvalds * @ulen: pointer to user length field 2001da177e4SLinus Torvalds * 2011da177e4SLinus Torvalds * The value pointed to by ulen on entry is the buffer length available. 2021da177e4SLinus Torvalds * This is overwritten with the buffer space used. -EINVAL is returned 2031da177e4SLinus Torvalds * if an overlong buffer is specified or a negative buffer size. -EFAULT 2041da177e4SLinus Torvalds * is returned if either the buffer or the length field are not 2051da177e4SLinus Torvalds * accessible. 2061da177e4SLinus Torvalds * After copying the data up to the limit the user specifies, the true 2071da177e4SLinus Torvalds * length of the data is written over the length limit the user 2081da177e4SLinus Torvalds * specified. Zero is returned for a success. 2091da177e4SLinus Torvalds */ 2101da177e4SLinus Torvalds 211230b1839SYOSHIFUJI Hideaki int move_addr_to_user(struct sockaddr *kaddr, int klen, void __user *uaddr, 21289bddce5SStephen Hemminger int __user *ulen) 2131da177e4SLinus Torvalds { 2141da177e4SLinus Torvalds int err; 2151da177e4SLinus Torvalds int len; 2161da177e4SLinus Torvalds 21789bddce5SStephen Hemminger err = get_user(len, ulen); 21889bddce5SStephen Hemminger if (err) 2191da177e4SLinus Torvalds return err; 2201da177e4SLinus Torvalds if (len > klen) 2211da177e4SLinus Torvalds len = klen; 222230b1839SYOSHIFUJI Hideaki if (len < 0 || len > sizeof(struct sockaddr_storage)) 2231da177e4SLinus Torvalds return -EINVAL; 22489bddce5SStephen Hemminger if (len) { 225d6fe3945SSteve Grubb if (audit_sockaddr(klen, kaddr)) 226d6fe3945SSteve Grubb return -ENOMEM; 2271da177e4SLinus Torvalds if (copy_to_user(uaddr, kaddr, len)) 2281da177e4SLinus Torvalds return -EFAULT; 2291da177e4SLinus Torvalds } 2301da177e4SLinus Torvalds /* 2311da177e4SLinus Torvalds * "fromlen shall refer to the value before truncation.." 2321da177e4SLinus Torvalds * 1003.1g 2331da177e4SLinus Torvalds */ 2341da177e4SLinus Torvalds return __put_user(klen, ulen); 2351da177e4SLinus Torvalds } 2361da177e4SLinus Torvalds 2371da177e4SLinus Torvalds #define SOCKFS_MAGIC 0x534F434B 2381da177e4SLinus Torvalds 239e18b890bSChristoph Lameter static struct kmem_cache *sock_inode_cachep __read_mostly; 2401da177e4SLinus Torvalds 2411da177e4SLinus Torvalds static struct inode *sock_alloc_inode(struct super_block *sb) 2421da177e4SLinus Torvalds { 2431da177e4SLinus Torvalds struct socket_alloc *ei; 24489bddce5SStephen Hemminger 245e94b1766SChristoph Lameter ei = kmem_cache_alloc(sock_inode_cachep, GFP_KERNEL); 2461da177e4SLinus Torvalds if (!ei) 2471da177e4SLinus Torvalds return NULL; 2481da177e4SLinus Torvalds init_waitqueue_head(&ei->socket.wait); 2491da177e4SLinus Torvalds 2501da177e4SLinus Torvalds ei->socket.fasync_list = NULL; 2511da177e4SLinus Torvalds ei->socket.state = SS_UNCONNECTED; 2521da177e4SLinus Torvalds ei->socket.flags = 0; 2531da177e4SLinus Torvalds ei->socket.ops = NULL; 2541da177e4SLinus Torvalds ei->socket.sk = NULL; 2551da177e4SLinus Torvalds ei->socket.file = NULL; 2561da177e4SLinus Torvalds 2571da177e4SLinus Torvalds return &ei->vfs_inode; 2581da177e4SLinus Torvalds } 2591da177e4SLinus Torvalds 2601da177e4SLinus Torvalds static void sock_destroy_inode(struct inode *inode) 2611da177e4SLinus Torvalds { 2621da177e4SLinus Torvalds kmem_cache_free(sock_inode_cachep, 2631da177e4SLinus Torvalds container_of(inode, struct socket_alloc, vfs_inode)); 2641da177e4SLinus Torvalds } 2651da177e4SLinus Torvalds 2664ba9b9d0SChristoph Lameter static void init_once(struct kmem_cache *cachep, void *foo) 2671da177e4SLinus Torvalds { 2681da177e4SLinus Torvalds struct socket_alloc *ei = (struct socket_alloc *)foo; 2691da177e4SLinus Torvalds 2701da177e4SLinus Torvalds inode_init_once(&ei->vfs_inode); 2711da177e4SLinus Torvalds } 2721da177e4SLinus Torvalds 2731da177e4SLinus Torvalds static int init_inodecache(void) 2741da177e4SLinus Torvalds { 2751da177e4SLinus Torvalds sock_inode_cachep = kmem_cache_create("sock_inode_cache", 2761da177e4SLinus Torvalds sizeof(struct socket_alloc), 27789bddce5SStephen Hemminger 0, 27889bddce5SStephen Hemminger (SLAB_HWCACHE_ALIGN | 27989bddce5SStephen Hemminger SLAB_RECLAIM_ACCOUNT | 280fffb60f9SPaul Jackson SLAB_MEM_SPREAD), 28120c2df83SPaul Mundt init_once); 2821da177e4SLinus Torvalds if (sock_inode_cachep == NULL) 2831da177e4SLinus Torvalds return -ENOMEM; 2841da177e4SLinus Torvalds return 0; 2851da177e4SLinus Torvalds } 2861da177e4SLinus Torvalds 2871da177e4SLinus Torvalds static struct super_operations sockfs_ops = { 2881da177e4SLinus Torvalds .alloc_inode = sock_alloc_inode, 2891da177e4SLinus Torvalds .destroy_inode =sock_destroy_inode, 2901da177e4SLinus Torvalds .statfs = simple_statfs, 2911da177e4SLinus Torvalds }; 2921da177e4SLinus Torvalds 293454e2398SDavid Howells static int sockfs_get_sb(struct file_system_type *fs_type, 29489bddce5SStephen Hemminger int flags, const char *dev_name, void *data, 29589bddce5SStephen Hemminger struct vfsmount *mnt) 2961da177e4SLinus Torvalds { 297454e2398SDavid Howells return get_sb_pseudo(fs_type, "socket:", &sockfs_ops, SOCKFS_MAGIC, 298454e2398SDavid Howells mnt); 2991da177e4SLinus Torvalds } 3001da177e4SLinus Torvalds 301ba89966cSEric Dumazet static struct vfsmount *sock_mnt __read_mostly; 3021da177e4SLinus Torvalds 3031da177e4SLinus Torvalds static struct file_system_type sock_fs_type = { 3041da177e4SLinus Torvalds .name = "sockfs", 3051da177e4SLinus Torvalds .get_sb = sockfs_get_sb, 3061da177e4SLinus Torvalds .kill_sb = kill_anon_super, 3071da177e4SLinus Torvalds }; 30889bddce5SStephen Hemminger 3091da177e4SLinus Torvalds static int sockfs_delete_dentry(struct dentry *dentry) 3101da177e4SLinus Torvalds { 311304e61e6SEric Dumazet /* 312304e61e6SEric Dumazet * At creation time, we pretended this dentry was hashed 313304e61e6SEric Dumazet * (by clearing DCACHE_UNHASHED bit in d_flags) 314304e61e6SEric Dumazet * At delete time, we restore the truth : not hashed. 315304e61e6SEric Dumazet * (so that dput() can proceed correctly) 316304e61e6SEric Dumazet */ 317304e61e6SEric Dumazet dentry->d_flags |= DCACHE_UNHASHED; 318304e61e6SEric Dumazet return 0; 3191da177e4SLinus Torvalds } 320c23fbb6bSEric Dumazet 321c23fbb6bSEric Dumazet /* 322c23fbb6bSEric Dumazet * sockfs_dname() is called from d_path(). 323c23fbb6bSEric Dumazet */ 324c23fbb6bSEric Dumazet static char *sockfs_dname(struct dentry *dentry, char *buffer, int buflen) 325c23fbb6bSEric Dumazet { 326c23fbb6bSEric Dumazet return dynamic_dname(dentry, buffer, buflen, "socket:[%lu]", 327c23fbb6bSEric Dumazet dentry->d_inode->i_ino); 328c23fbb6bSEric Dumazet } 329c23fbb6bSEric Dumazet 3301da177e4SLinus Torvalds static struct dentry_operations sockfs_dentry_operations = { 3311da177e4SLinus Torvalds .d_delete = sockfs_delete_dentry, 332c23fbb6bSEric Dumazet .d_dname = sockfs_dname, 3331da177e4SLinus Torvalds }; 3341da177e4SLinus Torvalds 3351da177e4SLinus Torvalds /* 3361da177e4SLinus Torvalds * Obtains the first available file descriptor and sets it up for use. 3371da177e4SLinus Torvalds * 33839d8c1b6SDavid S. Miller * These functions create file structures and maps them to fd space 33939d8c1b6SDavid S. Miller * of the current process. On success it returns file descriptor 3401da177e4SLinus Torvalds * and file struct implicitly stored in sock->file. 3411da177e4SLinus Torvalds * Note that another thread may close file descriptor before we return 3421da177e4SLinus Torvalds * from this function. We use the fact that now we do not refer 3431da177e4SLinus Torvalds * to socket after mapping. If one day we will need it, this 3441da177e4SLinus Torvalds * function will increment ref. count on file by 1. 3451da177e4SLinus Torvalds * 3461da177e4SLinus Torvalds * In any case returned fd MAY BE not valid! 3471da177e4SLinus Torvalds * This race condition is unavoidable 3481da177e4SLinus Torvalds * with shared fd spaces, we cannot solve it inside kernel, 3491da177e4SLinus Torvalds * but we take care of internal coherence yet. 3501da177e4SLinus Torvalds */ 3511da177e4SLinus Torvalds 352*a677a039SUlrich Drepper static int sock_alloc_fd(struct file **filep, int flags) 3531da177e4SLinus Torvalds { 3541da177e4SLinus Torvalds int fd; 3551da177e4SLinus Torvalds 356*a677a039SUlrich Drepper fd = get_unused_fd_flags(flags); 35739d8c1b6SDavid S. Miller if (likely(fd >= 0)) { 3581da177e4SLinus Torvalds struct file *file = get_empty_filp(); 3591da177e4SLinus Torvalds 36039d8c1b6SDavid S. Miller *filep = file; 36139d8c1b6SDavid S. Miller if (unlikely(!file)) { 3621da177e4SLinus Torvalds put_unused_fd(fd); 36339d8c1b6SDavid S. Miller return -ENFILE; 3641da177e4SLinus Torvalds } 36539d8c1b6SDavid S. Miller } else 36639d8c1b6SDavid S. Miller *filep = NULL; 36739d8c1b6SDavid S. Miller return fd; 36839d8c1b6SDavid S. Miller } 36939d8c1b6SDavid S. Miller 37039d8c1b6SDavid S. Miller static int sock_attach_fd(struct socket *sock, struct file *file) 37139d8c1b6SDavid S. Miller { 372ce8d2cdfSDave Hansen struct dentry *dentry; 373c23fbb6bSEric Dumazet struct qstr name = { .name = "" }; 3741da177e4SLinus Torvalds 375ce8d2cdfSDave Hansen dentry = d_alloc(sock_mnt->mnt_sb->s_root, &name); 376ce8d2cdfSDave Hansen if (unlikely(!dentry)) 37739d8c1b6SDavid S. Miller return -ENOMEM; 37839d8c1b6SDavid S. Miller 379ce8d2cdfSDave Hansen dentry->d_op = &sockfs_dentry_operations; 380304e61e6SEric Dumazet /* 381304e61e6SEric Dumazet * We dont want to push this dentry into global dentry hash table. 382304e61e6SEric Dumazet * We pretend dentry is already hashed, by unsetting DCACHE_UNHASHED 383304e61e6SEric Dumazet * This permits a working /proc/$pid/fd/XXX on sockets 384304e61e6SEric Dumazet */ 385ce8d2cdfSDave Hansen dentry->d_flags &= ~DCACHE_UNHASHED; 386ce8d2cdfSDave Hansen d_instantiate(dentry, SOCK_INODE(sock)); 3871da177e4SLinus Torvalds 3881da177e4SLinus Torvalds sock->file = file; 389ce8d2cdfSDave Hansen init_file(file, sock_mnt, dentry, FMODE_READ | FMODE_WRITE, 390ce8d2cdfSDave Hansen &socket_file_ops); 391ce8d2cdfSDave Hansen SOCK_INODE(sock)->i_fop = &socket_file_ops; 3921da177e4SLinus Torvalds file->f_flags = O_RDWR; 3931da177e4SLinus Torvalds file->f_pos = 0; 39407dc3f07SBenjamin LaHaise file->private_data = sock; 39539d8c1b6SDavid S. Miller 39639d8c1b6SDavid S. Miller return 0; 3971da177e4SLinus Torvalds } 3981da177e4SLinus Torvalds 399*a677a039SUlrich Drepper int sock_map_fd(struct socket *sock, int flags) 40039d8c1b6SDavid S. Miller { 40139d8c1b6SDavid S. Miller struct file *newfile; 402*a677a039SUlrich Drepper int fd = sock_alloc_fd(&newfile, flags); 40339d8c1b6SDavid S. Miller 40439d8c1b6SDavid S. Miller if (likely(fd >= 0)) { 40539d8c1b6SDavid S. Miller int err = sock_attach_fd(sock, newfile); 40639d8c1b6SDavid S. Miller 40739d8c1b6SDavid S. Miller if (unlikely(err < 0)) { 40839d8c1b6SDavid S. Miller put_filp(newfile); 40939d8c1b6SDavid S. Miller put_unused_fd(fd); 41039d8c1b6SDavid S. Miller return err; 41139d8c1b6SDavid S. Miller } 41239d8c1b6SDavid S. Miller fd_install(fd, newfile); 41339d8c1b6SDavid S. Miller } 4141da177e4SLinus Torvalds return fd; 4151da177e4SLinus Torvalds } 4161da177e4SLinus Torvalds 4176cb153caSBenjamin LaHaise static struct socket *sock_from_file(struct file *file, int *err) 4186cb153caSBenjamin LaHaise { 4196cb153caSBenjamin LaHaise if (file->f_op == &socket_file_ops) 4206cb153caSBenjamin LaHaise return file->private_data; /* set in sock_map_fd */ 4216cb153caSBenjamin LaHaise 4226cb153caSBenjamin LaHaise *err = -ENOTSOCK; 4236cb153caSBenjamin LaHaise return NULL; 4246cb153caSBenjamin LaHaise } 4256cb153caSBenjamin LaHaise 4261da177e4SLinus Torvalds /** 4271da177e4SLinus Torvalds * sockfd_lookup - Go from a file number to its socket slot 4281da177e4SLinus Torvalds * @fd: file handle 4291da177e4SLinus Torvalds * @err: pointer to an error code return 4301da177e4SLinus Torvalds * 4311da177e4SLinus Torvalds * The file handle passed in is locked and the socket it is bound 4321da177e4SLinus Torvalds * too is returned. If an error occurs the err pointer is overwritten 4331da177e4SLinus Torvalds * with a negative errno code and NULL is returned. The function checks 4341da177e4SLinus Torvalds * for both invalid handles and passing a handle which is not a socket. 4351da177e4SLinus Torvalds * 4361da177e4SLinus Torvalds * On a success the socket object pointer is returned. 4371da177e4SLinus Torvalds */ 4381da177e4SLinus Torvalds 4391da177e4SLinus Torvalds struct socket *sockfd_lookup(int fd, int *err) 4401da177e4SLinus Torvalds { 4411da177e4SLinus Torvalds struct file *file; 4421da177e4SLinus Torvalds struct socket *sock; 4431da177e4SLinus Torvalds 44489bddce5SStephen Hemminger file = fget(fd); 44589bddce5SStephen Hemminger if (!file) { 4461da177e4SLinus Torvalds *err = -EBADF; 4471da177e4SLinus Torvalds return NULL; 4481da177e4SLinus Torvalds } 44989bddce5SStephen Hemminger 4506cb153caSBenjamin LaHaise sock = sock_from_file(file, err); 4516cb153caSBenjamin LaHaise if (!sock) 4521da177e4SLinus Torvalds fput(file); 4536cb153caSBenjamin LaHaise return sock; 4541da177e4SLinus Torvalds } 4551da177e4SLinus Torvalds 4566cb153caSBenjamin LaHaise static struct socket *sockfd_lookup_light(int fd, int *err, int *fput_needed) 4576cb153caSBenjamin LaHaise { 4586cb153caSBenjamin LaHaise struct file *file; 4596cb153caSBenjamin LaHaise struct socket *sock; 4606cb153caSBenjamin LaHaise 4613672558cSHua Zhong *err = -EBADF; 4626cb153caSBenjamin LaHaise file = fget_light(fd, fput_needed); 4636cb153caSBenjamin LaHaise if (file) { 4646cb153caSBenjamin LaHaise sock = sock_from_file(file, err); 4656cb153caSBenjamin LaHaise if (sock) 4661da177e4SLinus Torvalds return sock; 4676cb153caSBenjamin LaHaise fput_light(file, *fput_needed); 4686cb153caSBenjamin LaHaise } 4696cb153caSBenjamin LaHaise return NULL; 4701da177e4SLinus Torvalds } 4711da177e4SLinus Torvalds 4721da177e4SLinus Torvalds /** 4731da177e4SLinus Torvalds * sock_alloc - allocate a socket 4741da177e4SLinus Torvalds * 4751da177e4SLinus Torvalds * Allocate a new inode and socket object. The two are bound together 4761da177e4SLinus Torvalds * and initialised. The socket is then returned. If we are out of inodes 4771da177e4SLinus Torvalds * NULL is returned. 4781da177e4SLinus Torvalds */ 4791da177e4SLinus Torvalds 4801da177e4SLinus Torvalds static struct socket *sock_alloc(void) 4811da177e4SLinus Torvalds { 4821da177e4SLinus Torvalds struct inode *inode; 4831da177e4SLinus Torvalds struct socket *sock; 4841da177e4SLinus Torvalds 4851da177e4SLinus Torvalds inode = new_inode(sock_mnt->mnt_sb); 4861da177e4SLinus Torvalds if (!inode) 4871da177e4SLinus Torvalds return NULL; 4881da177e4SLinus Torvalds 4891da177e4SLinus Torvalds sock = SOCKET_I(inode); 4901da177e4SLinus Torvalds 4911da177e4SLinus Torvalds inode->i_mode = S_IFSOCK | S_IRWXUGO; 4921da177e4SLinus Torvalds inode->i_uid = current->fsuid; 4931da177e4SLinus Torvalds inode->i_gid = current->fsgid; 4941da177e4SLinus Torvalds 4951da177e4SLinus Torvalds get_cpu_var(sockets_in_use)++; 4961da177e4SLinus Torvalds put_cpu_var(sockets_in_use); 4971da177e4SLinus Torvalds return sock; 4981da177e4SLinus Torvalds } 4991da177e4SLinus Torvalds 5001da177e4SLinus Torvalds /* 5011da177e4SLinus Torvalds * In theory you can't get an open on this inode, but /proc provides 5021da177e4SLinus Torvalds * a back door. Remember to keep it shut otherwise you'll let the 5031da177e4SLinus Torvalds * creepy crawlies in. 5041da177e4SLinus Torvalds */ 5051da177e4SLinus Torvalds 5061da177e4SLinus Torvalds static int sock_no_open(struct inode *irrelevant, struct file *dontcare) 5071da177e4SLinus Torvalds { 5081da177e4SLinus Torvalds return -ENXIO; 5091da177e4SLinus Torvalds } 5101da177e4SLinus Torvalds 5114b6f5d20SArjan van de Ven const struct file_operations bad_sock_fops = { 5121da177e4SLinus Torvalds .owner = THIS_MODULE, 5131da177e4SLinus Torvalds .open = sock_no_open, 5141da177e4SLinus Torvalds }; 5151da177e4SLinus Torvalds 5161da177e4SLinus Torvalds /** 5171da177e4SLinus Torvalds * sock_release - close a socket 5181da177e4SLinus Torvalds * @sock: socket to close 5191da177e4SLinus Torvalds * 5201da177e4SLinus Torvalds * The socket is released from the protocol stack if it has a release 5211da177e4SLinus Torvalds * callback, and the inode is then released if the socket is bound to 5221da177e4SLinus Torvalds * an inode not a file. 5231da177e4SLinus Torvalds */ 5241da177e4SLinus Torvalds 5251da177e4SLinus Torvalds void sock_release(struct socket *sock) 5261da177e4SLinus Torvalds { 5271da177e4SLinus Torvalds if (sock->ops) { 5281da177e4SLinus Torvalds struct module *owner = sock->ops->owner; 5291da177e4SLinus Torvalds 5301da177e4SLinus Torvalds sock->ops->release(sock); 5311da177e4SLinus Torvalds sock->ops = NULL; 5321da177e4SLinus Torvalds module_put(owner); 5331da177e4SLinus Torvalds } 5341da177e4SLinus Torvalds 5351da177e4SLinus Torvalds if (sock->fasync_list) 5361da177e4SLinus Torvalds printk(KERN_ERR "sock_release: fasync list not empty!\n"); 5371da177e4SLinus Torvalds 5381da177e4SLinus Torvalds get_cpu_var(sockets_in_use)--; 5391da177e4SLinus Torvalds put_cpu_var(sockets_in_use); 5401da177e4SLinus Torvalds if (!sock->file) { 5411da177e4SLinus Torvalds iput(SOCK_INODE(sock)); 5421da177e4SLinus Torvalds return; 5431da177e4SLinus Torvalds } 5441da177e4SLinus Torvalds sock->file = NULL; 5451da177e4SLinus Torvalds } 5461da177e4SLinus Torvalds 5471da177e4SLinus Torvalds static inline int __sock_sendmsg(struct kiocb *iocb, struct socket *sock, 5481da177e4SLinus Torvalds struct msghdr *msg, size_t size) 5491da177e4SLinus Torvalds { 5501da177e4SLinus Torvalds struct sock_iocb *si = kiocb_to_siocb(iocb); 5511da177e4SLinus Torvalds int err; 5521da177e4SLinus Torvalds 5531da177e4SLinus Torvalds si->sock = sock; 5541da177e4SLinus Torvalds si->scm = NULL; 5551da177e4SLinus Torvalds si->msg = msg; 5561da177e4SLinus Torvalds si->size = size; 5571da177e4SLinus Torvalds 5581da177e4SLinus Torvalds err = security_socket_sendmsg(sock, msg, size); 5591da177e4SLinus Torvalds if (err) 5601da177e4SLinus Torvalds return err; 5611da177e4SLinus Torvalds 5621da177e4SLinus Torvalds return sock->ops->sendmsg(iocb, sock, msg, size); 5631da177e4SLinus Torvalds } 5641da177e4SLinus Torvalds 5651da177e4SLinus Torvalds int sock_sendmsg(struct socket *sock, struct msghdr *msg, size_t size) 5661da177e4SLinus Torvalds { 5671da177e4SLinus Torvalds struct kiocb iocb; 5681da177e4SLinus Torvalds struct sock_iocb siocb; 5691da177e4SLinus Torvalds int ret; 5701da177e4SLinus Torvalds 5711da177e4SLinus Torvalds init_sync_kiocb(&iocb, NULL); 5721da177e4SLinus Torvalds iocb.private = &siocb; 5731da177e4SLinus Torvalds ret = __sock_sendmsg(&iocb, sock, msg, size); 5741da177e4SLinus Torvalds if (-EIOCBQUEUED == ret) 5751da177e4SLinus Torvalds ret = wait_on_sync_kiocb(&iocb); 5761da177e4SLinus Torvalds return ret; 5771da177e4SLinus Torvalds } 5781da177e4SLinus Torvalds 5791da177e4SLinus Torvalds int kernel_sendmsg(struct socket *sock, struct msghdr *msg, 5801da177e4SLinus Torvalds struct kvec *vec, size_t num, size_t size) 5811da177e4SLinus Torvalds { 5821da177e4SLinus Torvalds mm_segment_t oldfs = get_fs(); 5831da177e4SLinus Torvalds int result; 5841da177e4SLinus Torvalds 5851da177e4SLinus Torvalds set_fs(KERNEL_DS); 5861da177e4SLinus Torvalds /* 5871da177e4SLinus Torvalds * the following is safe, since for compiler definitions of kvec and 5881da177e4SLinus Torvalds * iovec are identical, yielding the same in-core layout and alignment 5891da177e4SLinus Torvalds */ 59089bddce5SStephen Hemminger msg->msg_iov = (struct iovec *)vec; 5911da177e4SLinus Torvalds msg->msg_iovlen = num; 5921da177e4SLinus Torvalds result = sock_sendmsg(sock, msg, size); 5931da177e4SLinus Torvalds set_fs(oldfs); 5941da177e4SLinus Torvalds return result; 5951da177e4SLinus Torvalds } 5961da177e4SLinus Torvalds 59792f37fd2SEric Dumazet /* 59892f37fd2SEric Dumazet * called from sock_recv_timestamp() if sock_flag(sk, SOCK_RCVTSTAMP) 59992f37fd2SEric Dumazet */ 60092f37fd2SEric Dumazet void __sock_recv_timestamp(struct msghdr *msg, struct sock *sk, 60192f37fd2SEric Dumazet struct sk_buff *skb) 60292f37fd2SEric Dumazet { 60392f37fd2SEric Dumazet ktime_t kt = skb->tstamp; 60492f37fd2SEric Dumazet 60592f37fd2SEric Dumazet if (!sock_flag(sk, SOCK_RCVTSTAMPNS)) { 60692f37fd2SEric Dumazet struct timeval tv; 60792f37fd2SEric Dumazet /* Race occurred between timestamp enabling and packet 60892f37fd2SEric Dumazet receiving. Fill in the current time for now. */ 60992f37fd2SEric Dumazet if (kt.tv64 == 0) 61092f37fd2SEric Dumazet kt = ktime_get_real(); 61192f37fd2SEric Dumazet skb->tstamp = kt; 61292f37fd2SEric Dumazet tv = ktime_to_timeval(kt); 61392f37fd2SEric Dumazet put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMP, sizeof(tv), &tv); 61492f37fd2SEric Dumazet } else { 61592f37fd2SEric Dumazet struct timespec ts; 61692f37fd2SEric Dumazet /* Race occurred between timestamp enabling and packet 61792f37fd2SEric Dumazet receiving. Fill in the current time for now. */ 61892f37fd2SEric Dumazet if (kt.tv64 == 0) 61992f37fd2SEric Dumazet kt = ktime_get_real(); 62092f37fd2SEric Dumazet skb->tstamp = kt; 62192f37fd2SEric Dumazet ts = ktime_to_timespec(kt); 62292f37fd2SEric Dumazet put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMPNS, sizeof(ts), &ts); 62392f37fd2SEric Dumazet } 62492f37fd2SEric Dumazet } 62592f37fd2SEric Dumazet 6267c81fd8bSArnaldo Carvalho de Melo EXPORT_SYMBOL_GPL(__sock_recv_timestamp); 6277c81fd8bSArnaldo Carvalho de Melo 6281da177e4SLinus Torvalds static inline int __sock_recvmsg(struct kiocb *iocb, struct socket *sock, 6291da177e4SLinus Torvalds struct msghdr *msg, size_t size, int flags) 6301da177e4SLinus Torvalds { 6311da177e4SLinus Torvalds int err; 6321da177e4SLinus Torvalds struct sock_iocb *si = kiocb_to_siocb(iocb); 6331da177e4SLinus Torvalds 6341da177e4SLinus Torvalds si->sock = sock; 6351da177e4SLinus Torvalds si->scm = NULL; 6361da177e4SLinus Torvalds si->msg = msg; 6371da177e4SLinus Torvalds si->size = size; 6381da177e4SLinus Torvalds si->flags = flags; 6391da177e4SLinus Torvalds 6401da177e4SLinus Torvalds err = security_socket_recvmsg(sock, msg, size, flags); 6411da177e4SLinus Torvalds if (err) 6421da177e4SLinus Torvalds return err; 6431da177e4SLinus Torvalds 6441da177e4SLinus Torvalds return sock->ops->recvmsg(iocb, sock, msg, size, flags); 6451da177e4SLinus Torvalds } 6461da177e4SLinus Torvalds 6471da177e4SLinus Torvalds int sock_recvmsg(struct socket *sock, struct msghdr *msg, 6481da177e4SLinus Torvalds size_t size, int flags) 6491da177e4SLinus Torvalds { 6501da177e4SLinus Torvalds struct kiocb iocb; 6511da177e4SLinus Torvalds struct sock_iocb siocb; 6521da177e4SLinus Torvalds int ret; 6531da177e4SLinus Torvalds 6541da177e4SLinus Torvalds init_sync_kiocb(&iocb, NULL); 6551da177e4SLinus Torvalds iocb.private = &siocb; 6561da177e4SLinus Torvalds ret = __sock_recvmsg(&iocb, sock, msg, size, flags); 6571da177e4SLinus Torvalds if (-EIOCBQUEUED == ret) 6581da177e4SLinus Torvalds ret = wait_on_sync_kiocb(&iocb); 6591da177e4SLinus Torvalds return ret; 6601da177e4SLinus Torvalds } 6611da177e4SLinus Torvalds 6621da177e4SLinus Torvalds int kernel_recvmsg(struct socket *sock, struct msghdr *msg, 66389bddce5SStephen Hemminger struct kvec *vec, size_t num, size_t size, int flags) 6641da177e4SLinus Torvalds { 6651da177e4SLinus Torvalds mm_segment_t oldfs = get_fs(); 6661da177e4SLinus Torvalds int result; 6671da177e4SLinus Torvalds 6681da177e4SLinus Torvalds set_fs(KERNEL_DS); 6691da177e4SLinus Torvalds /* 6701da177e4SLinus Torvalds * the following is safe, since for compiler definitions of kvec and 6711da177e4SLinus Torvalds * iovec are identical, yielding the same in-core layout and alignment 6721da177e4SLinus Torvalds */ 67389bddce5SStephen Hemminger msg->msg_iov = (struct iovec *)vec, msg->msg_iovlen = num; 6741da177e4SLinus Torvalds result = sock_recvmsg(sock, msg, size, flags); 6751da177e4SLinus Torvalds set_fs(oldfs); 6761da177e4SLinus Torvalds return result; 6771da177e4SLinus Torvalds } 6781da177e4SLinus Torvalds 6791da177e4SLinus Torvalds static void sock_aio_dtor(struct kiocb *iocb) 6801da177e4SLinus Torvalds { 6811da177e4SLinus Torvalds kfree(iocb->private); 6821da177e4SLinus Torvalds } 6831da177e4SLinus Torvalds 68420380731SArnaldo Carvalho de Melo static ssize_t sock_sendpage(struct file *file, struct page *page, 6851da177e4SLinus Torvalds int offset, size_t size, loff_t *ppos, int more) 6861da177e4SLinus Torvalds { 6871da177e4SLinus Torvalds struct socket *sock; 6881da177e4SLinus Torvalds int flags; 6891da177e4SLinus Torvalds 690b69aee04SEric Dumazet sock = file->private_data; 6911da177e4SLinus Torvalds 6921da177e4SLinus Torvalds flags = !(file->f_flags & O_NONBLOCK) ? 0 : MSG_DONTWAIT; 6931da177e4SLinus Torvalds if (more) 6941da177e4SLinus Torvalds flags |= MSG_MORE; 6951da177e4SLinus Torvalds 6961da177e4SLinus Torvalds return sock->ops->sendpage(sock, page, offset, size, flags); 6971da177e4SLinus Torvalds } 6981da177e4SLinus Torvalds 6999c55e01cSJens Axboe static ssize_t sock_splice_read(struct file *file, loff_t *ppos, 7009c55e01cSJens Axboe struct pipe_inode_info *pipe, size_t len, 7019c55e01cSJens Axboe unsigned int flags) 7029c55e01cSJens Axboe { 7039c55e01cSJens Axboe struct socket *sock = file->private_data; 7049c55e01cSJens Axboe 705997b37daSRémi Denis-Courmont if (unlikely(!sock->ops->splice_read)) 706997b37daSRémi Denis-Courmont return -EINVAL; 707997b37daSRémi Denis-Courmont 7089c55e01cSJens Axboe return sock->ops->splice_read(sock, ppos, pipe, len, flags); 7099c55e01cSJens Axboe } 7109c55e01cSJens Axboe 711ce1d4d3eSChristoph Hellwig static struct sock_iocb *alloc_sock_iocb(struct kiocb *iocb, 71289bddce5SStephen Hemminger struct sock_iocb *siocb) 713ce1d4d3eSChristoph Hellwig { 714ce1d4d3eSChristoph Hellwig if (!is_sync_kiocb(iocb)) { 715ce1d4d3eSChristoph Hellwig siocb = kmalloc(sizeof(*siocb), GFP_KERNEL); 716ce1d4d3eSChristoph Hellwig if (!siocb) 717ce1d4d3eSChristoph Hellwig return NULL; 718ce1d4d3eSChristoph Hellwig iocb->ki_dtor = sock_aio_dtor; 719ce1d4d3eSChristoph Hellwig } 720ce1d4d3eSChristoph Hellwig 721ce1d4d3eSChristoph Hellwig siocb->kiocb = iocb; 722ce1d4d3eSChristoph Hellwig iocb->private = siocb; 723ce1d4d3eSChristoph Hellwig return siocb; 724ce1d4d3eSChristoph Hellwig } 725ce1d4d3eSChristoph Hellwig 726ce1d4d3eSChristoph Hellwig static ssize_t do_sock_read(struct msghdr *msg, struct kiocb *iocb, 727027445c3SBadari Pulavarty struct file *file, const struct iovec *iov, 72889bddce5SStephen Hemminger unsigned long nr_segs) 729ce1d4d3eSChristoph Hellwig { 730ce1d4d3eSChristoph Hellwig struct socket *sock = file->private_data; 731ce1d4d3eSChristoph Hellwig size_t size = 0; 732ce1d4d3eSChristoph Hellwig int i; 733ce1d4d3eSChristoph Hellwig 734ce1d4d3eSChristoph Hellwig for (i = 0; i < nr_segs; i++) 735ce1d4d3eSChristoph Hellwig size += iov[i].iov_len; 736ce1d4d3eSChristoph Hellwig 737ce1d4d3eSChristoph Hellwig msg->msg_name = NULL; 738ce1d4d3eSChristoph Hellwig msg->msg_namelen = 0; 739ce1d4d3eSChristoph Hellwig msg->msg_control = NULL; 740ce1d4d3eSChristoph Hellwig msg->msg_controllen = 0; 741ce1d4d3eSChristoph Hellwig msg->msg_iov = (struct iovec *)iov; 742ce1d4d3eSChristoph Hellwig msg->msg_iovlen = nr_segs; 743ce1d4d3eSChristoph Hellwig msg->msg_flags = (file->f_flags & O_NONBLOCK) ? MSG_DONTWAIT : 0; 744ce1d4d3eSChristoph Hellwig 745ce1d4d3eSChristoph Hellwig return __sock_recvmsg(iocb, sock, msg, size, msg->msg_flags); 746ce1d4d3eSChristoph Hellwig } 747ce1d4d3eSChristoph Hellwig 748027445c3SBadari Pulavarty static ssize_t sock_aio_read(struct kiocb *iocb, const struct iovec *iov, 749027445c3SBadari Pulavarty unsigned long nr_segs, loff_t pos) 750ce1d4d3eSChristoph Hellwig { 751ce1d4d3eSChristoph Hellwig struct sock_iocb siocb, *x; 752ce1d4d3eSChristoph Hellwig 753ce1d4d3eSChristoph Hellwig if (pos != 0) 754ce1d4d3eSChristoph Hellwig return -ESPIPE; 755027445c3SBadari Pulavarty 756027445c3SBadari Pulavarty if (iocb->ki_left == 0) /* Match SYS5 behaviour */ 757ce1d4d3eSChristoph Hellwig return 0; 758ce1d4d3eSChristoph Hellwig 759027445c3SBadari Pulavarty 760027445c3SBadari Pulavarty x = alloc_sock_iocb(iocb, &siocb); 761ce1d4d3eSChristoph Hellwig if (!x) 762ce1d4d3eSChristoph Hellwig return -ENOMEM; 763027445c3SBadari Pulavarty return do_sock_read(&x->async_msg, iocb, iocb->ki_filp, iov, nr_segs); 764ce1d4d3eSChristoph Hellwig } 765ce1d4d3eSChristoph Hellwig 766ce1d4d3eSChristoph Hellwig static ssize_t do_sock_write(struct msghdr *msg, struct kiocb *iocb, 767027445c3SBadari Pulavarty struct file *file, const struct iovec *iov, 76889bddce5SStephen Hemminger unsigned long nr_segs) 769ce1d4d3eSChristoph Hellwig { 770ce1d4d3eSChristoph Hellwig struct socket *sock = file->private_data; 771ce1d4d3eSChristoph Hellwig size_t size = 0; 772ce1d4d3eSChristoph Hellwig int i; 773ce1d4d3eSChristoph Hellwig 774ce1d4d3eSChristoph Hellwig for (i = 0; i < nr_segs; i++) 775ce1d4d3eSChristoph Hellwig size += iov[i].iov_len; 776ce1d4d3eSChristoph Hellwig 777ce1d4d3eSChristoph Hellwig msg->msg_name = NULL; 778ce1d4d3eSChristoph Hellwig msg->msg_namelen = 0; 779ce1d4d3eSChristoph Hellwig msg->msg_control = NULL; 780ce1d4d3eSChristoph Hellwig msg->msg_controllen = 0; 781ce1d4d3eSChristoph Hellwig msg->msg_iov = (struct iovec *)iov; 782ce1d4d3eSChristoph Hellwig msg->msg_iovlen = nr_segs; 783ce1d4d3eSChristoph Hellwig msg->msg_flags = (file->f_flags & O_NONBLOCK) ? MSG_DONTWAIT : 0; 784ce1d4d3eSChristoph Hellwig if (sock->type == SOCK_SEQPACKET) 785ce1d4d3eSChristoph Hellwig msg->msg_flags |= MSG_EOR; 786ce1d4d3eSChristoph Hellwig 787ce1d4d3eSChristoph Hellwig return __sock_sendmsg(iocb, sock, msg, size); 788ce1d4d3eSChristoph Hellwig } 789ce1d4d3eSChristoph Hellwig 790027445c3SBadari Pulavarty static ssize_t sock_aio_write(struct kiocb *iocb, const struct iovec *iov, 791027445c3SBadari Pulavarty unsigned long nr_segs, loff_t pos) 7921da177e4SLinus Torvalds { 793ce1d4d3eSChristoph Hellwig struct sock_iocb siocb, *x; 7941da177e4SLinus Torvalds 795ce1d4d3eSChristoph Hellwig if (pos != 0) 796ce1d4d3eSChristoph Hellwig return -ESPIPE; 797027445c3SBadari Pulavarty 798027445c3SBadari Pulavarty x = alloc_sock_iocb(iocb, &siocb); 799ce1d4d3eSChristoph Hellwig if (!x) 800ce1d4d3eSChristoph Hellwig return -ENOMEM; 801ce1d4d3eSChristoph Hellwig 802027445c3SBadari Pulavarty return do_sock_write(&x->async_msg, iocb, iocb->ki_filp, iov, nr_segs); 8031da177e4SLinus Torvalds } 8041da177e4SLinus Torvalds 8051da177e4SLinus Torvalds /* 8061da177e4SLinus Torvalds * Atomic setting of ioctl hooks to avoid race 8071da177e4SLinus Torvalds * with module unload. 8081da177e4SLinus Torvalds */ 8091da177e4SLinus Torvalds 8104a3e2f71SArjan van de Ven static DEFINE_MUTEX(br_ioctl_mutex); 811881d966bSEric W. Biederman static int (*br_ioctl_hook) (struct net *, unsigned int cmd, void __user *arg) = NULL; 8121da177e4SLinus Torvalds 813881d966bSEric W. Biederman void brioctl_set(int (*hook) (struct net *, unsigned int, void __user *)) 8141da177e4SLinus Torvalds { 8154a3e2f71SArjan van de Ven mutex_lock(&br_ioctl_mutex); 8161da177e4SLinus Torvalds br_ioctl_hook = hook; 8174a3e2f71SArjan van de Ven mutex_unlock(&br_ioctl_mutex); 8181da177e4SLinus Torvalds } 81989bddce5SStephen Hemminger 8201da177e4SLinus Torvalds EXPORT_SYMBOL(brioctl_set); 8211da177e4SLinus Torvalds 8224a3e2f71SArjan van de Ven static DEFINE_MUTEX(vlan_ioctl_mutex); 823881d966bSEric W. Biederman static int (*vlan_ioctl_hook) (struct net *, void __user *arg); 8241da177e4SLinus Torvalds 825881d966bSEric W. Biederman void vlan_ioctl_set(int (*hook) (struct net *, void __user *)) 8261da177e4SLinus Torvalds { 8274a3e2f71SArjan van de Ven mutex_lock(&vlan_ioctl_mutex); 8281da177e4SLinus Torvalds vlan_ioctl_hook = hook; 8294a3e2f71SArjan van de Ven mutex_unlock(&vlan_ioctl_mutex); 8301da177e4SLinus Torvalds } 83189bddce5SStephen Hemminger 8321da177e4SLinus Torvalds EXPORT_SYMBOL(vlan_ioctl_set); 8331da177e4SLinus Torvalds 8344a3e2f71SArjan van de Ven static DEFINE_MUTEX(dlci_ioctl_mutex); 8351da177e4SLinus Torvalds static int (*dlci_ioctl_hook) (unsigned int, void __user *); 8361da177e4SLinus Torvalds 8371da177e4SLinus Torvalds void dlci_ioctl_set(int (*hook) (unsigned int, void __user *)) 8381da177e4SLinus Torvalds { 8394a3e2f71SArjan van de Ven mutex_lock(&dlci_ioctl_mutex); 8401da177e4SLinus Torvalds dlci_ioctl_hook = hook; 8414a3e2f71SArjan van de Ven mutex_unlock(&dlci_ioctl_mutex); 8421da177e4SLinus Torvalds } 84389bddce5SStephen Hemminger 8441da177e4SLinus Torvalds EXPORT_SYMBOL(dlci_ioctl_set); 8451da177e4SLinus Torvalds 8461da177e4SLinus Torvalds /* 8471da177e4SLinus Torvalds * With an ioctl, arg may well be a user mode pointer, but we don't know 8481da177e4SLinus Torvalds * what to do with it - that's up to the protocol still. 8491da177e4SLinus Torvalds */ 8501da177e4SLinus Torvalds 8511da177e4SLinus Torvalds static long sock_ioctl(struct file *file, unsigned cmd, unsigned long arg) 8521da177e4SLinus Torvalds { 8531da177e4SLinus Torvalds struct socket *sock; 854881d966bSEric W. Biederman struct sock *sk; 8551da177e4SLinus Torvalds void __user *argp = (void __user *)arg; 8561da177e4SLinus Torvalds int pid, err; 857881d966bSEric W. Biederman struct net *net; 8581da177e4SLinus Torvalds 859b69aee04SEric Dumazet sock = file->private_data; 860881d966bSEric W. Biederman sk = sock->sk; 8613b1e0a65SYOSHIFUJI Hideaki net = sock_net(sk); 8621da177e4SLinus Torvalds if (cmd >= SIOCDEVPRIVATE && cmd <= (SIOCDEVPRIVATE + 15)) { 863881d966bSEric W. Biederman err = dev_ioctl(net, cmd, argp); 8641da177e4SLinus Torvalds } else 865d86b5e0eSAdrian Bunk #ifdef CONFIG_WIRELESS_EXT 8661da177e4SLinus Torvalds if (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST) { 867881d966bSEric W. Biederman err = dev_ioctl(net, cmd, argp); 8681da177e4SLinus Torvalds } else 869d86b5e0eSAdrian Bunk #endif /* CONFIG_WIRELESS_EXT */ 8701da177e4SLinus Torvalds switch (cmd) { 8711da177e4SLinus Torvalds case FIOSETOWN: 8721da177e4SLinus Torvalds case SIOCSPGRP: 8731da177e4SLinus Torvalds err = -EFAULT; 8741da177e4SLinus Torvalds if (get_user(pid, (int __user *)argp)) 8751da177e4SLinus Torvalds break; 8761da177e4SLinus Torvalds err = f_setown(sock->file, pid, 1); 8771da177e4SLinus Torvalds break; 8781da177e4SLinus Torvalds case FIOGETOWN: 8791da177e4SLinus Torvalds case SIOCGPGRP: 880609d7fa9SEric W. Biederman err = put_user(f_getown(sock->file), 88189bddce5SStephen Hemminger (int __user *)argp); 8821da177e4SLinus Torvalds break; 8831da177e4SLinus Torvalds case SIOCGIFBR: 8841da177e4SLinus Torvalds case SIOCSIFBR: 8851da177e4SLinus Torvalds case SIOCBRADDBR: 8861da177e4SLinus Torvalds case SIOCBRDELBR: 8871da177e4SLinus Torvalds err = -ENOPKG; 8881da177e4SLinus Torvalds if (!br_ioctl_hook) 8891da177e4SLinus Torvalds request_module("bridge"); 8901da177e4SLinus Torvalds 8914a3e2f71SArjan van de Ven mutex_lock(&br_ioctl_mutex); 8921da177e4SLinus Torvalds if (br_ioctl_hook) 893881d966bSEric W. Biederman err = br_ioctl_hook(net, cmd, argp); 8944a3e2f71SArjan van de Ven mutex_unlock(&br_ioctl_mutex); 8951da177e4SLinus Torvalds break; 8961da177e4SLinus Torvalds case SIOCGIFVLAN: 8971da177e4SLinus Torvalds case SIOCSIFVLAN: 8981da177e4SLinus Torvalds err = -ENOPKG; 8991da177e4SLinus Torvalds if (!vlan_ioctl_hook) 9001da177e4SLinus Torvalds request_module("8021q"); 9011da177e4SLinus Torvalds 9024a3e2f71SArjan van de Ven mutex_lock(&vlan_ioctl_mutex); 9031da177e4SLinus Torvalds if (vlan_ioctl_hook) 904881d966bSEric W. Biederman err = vlan_ioctl_hook(net, argp); 9054a3e2f71SArjan van de Ven mutex_unlock(&vlan_ioctl_mutex); 9061da177e4SLinus Torvalds break; 9071da177e4SLinus Torvalds case SIOCADDDLCI: 9081da177e4SLinus Torvalds case SIOCDELDLCI: 9091da177e4SLinus Torvalds err = -ENOPKG; 9101da177e4SLinus Torvalds if (!dlci_ioctl_hook) 9111da177e4SLinus Torvalds request_module("dlci"); 9121da177e4SLinus Torvalds 9134a3e2f71SArjan van de Ven mutex_lock(&dlci_ioctl_mutex); 9147512cbf6SPavel Emelyanov if (dlci_ioctl_hook) 9151da177e4SLinus Torvalds err = dlci_ioctl_hook(cmd, argp); 9164a3e2f71SArjan van de Ven mutex_unlock(&dlci_ioctl_mutex); 9171da177e4SLinus Torvalds break; 9181da177e4SLinus Torvalds default: 9191da177e4SLinus Torvalds err = sock->ops->ioctl(sock, cmd, arg); 920b5e5fa5eSChristoph Hellwig 921b5e5fa5eSChristoph Hellwig /* 922b5e5fa5eSChristoph Hellwig * If this ioctl is unknown try to hand it down 923b5e5fa5eSChristoph Hellwig * to the NIC driver. 924b5e5fa5eSChristoph Hellwig */ 925b5e5fa5eSChristoph Hellwig if (err == -ENOIOCTLCMD) 926881d966bSEric W. Biederman err = dev_ioctl(net, cmd, argp); 9271da177e4SLinus Torvalds break; 9281da177e4SLinus Torvalds } 9291da177e4SLinus Torvalds return err; 9301da177e4SLinus Torvalds } 9311da177e4SLinus Torvalds 9321da177e4SLinus Torvalds int sock_create_lite(int family, int type, int protocol, struct socket **res) 9331da177e4SLinus Torvalds { 9341da177e4SLinus Torvalds int err; 9351da177e4SLinus Torvalds struct socket *sock = NULL; 9361da177e4SLinus Torvalds 9371da177e4SLinus Torvalds err = security_socket_create(family, type, protocol, 1); 9381da177e4SLinus Torvalds if (err) 9391da177e4SLinus Torvalds goto out; 9401da177e4SLinus Torvalds 9411da177e4SLinus Torvalds sock = sock_alloc(); 9421da177e4SLinus Torvalds if (!sock) { 9431da177e4SLinus Torvalds err = -ENOMEM; 9441da177e4SLinus Torvalds goto out; 9451da177e4SLinus Torvalds } 9461da177e4SLinus Torvalds 9471da177e4SLinus Torvalds sock->type = type; 9487420ed23SVenkat Yekkirala err = security_socket_post_create(sock, family, type, protocol, 1); 9497420ed23SVenkat Yekkirala if (err) 9507420ed23SVenkat Yekkirala goto out_release; 9517420ed23SVenkat Yekkirala 9521da177e4SLinus Torvalds out: 9531da177e4SLinus Torvalds *res = sock; 9541da177e4SLinus Torvalds return err; 9557420ed23SVenkat Yekkirala out_release: 9567420ed23SVenkat Yekkirala sock_release(sock); 9577420ed23SVenkat Yekkirala sock = NULL; 9587420ed23SVenkat Yekkirala goto out; 9591da177e4SLinus Torvalds } 9601da177e4SLinus Torvalds 9611da177e4SLinus Torvalds /* No kernel lock held - perfect */ 9621da177e4SLinus Torvalds static unsigned int sock_poll(struct file *file, poll_table *wait) 9631da177e4SLinus Torvalds { 9641da177e4SLinus Torvalds struct socket *sock; 9651da177e4SLinus Torvalds 9661da177e4SLinus Torvalds /* 9671da177e4SLinus Torvalds * We can't return errors to poll, so it's either yes or no. 9681da177e4SLinus Torvalds */ 969b69aee04SEric Dumazet sock = file->private_data; 9701da177e4SLinus Torvalds return sock->ops->poll(file, sock, wait); 9711da177e4SLinus Torvalds } 9721da177e4SLinus Torvalds 9731da177e4SLinus Torvalds static int sock_mmap(struct file *file, struct vm_area_struct *vma) 9741da177e4SLinus Torvalds { 975b69aee04SEric Dumazet struct socket *sock = file->private_data; 9761da177e4SLinus Torvalds 9771da177e4SLinus Torvalds return sock->ops->mmap(file, sock, vma); 9781da177e4SLinus Torvalds } 9791da177e4SLinus Torvalds 98020380731SArnaldo Carvalho de Melo static int sock_close(struct inode *inode, struct file *filp) 9811da177e4SLinus Torvalds { 9821da177e4SLinus Torvalds /* 9831da177e4SLinus Torvalds * It was possible the inode is NULL we were 9841da177e4SLinus Torvalds * closing an unfinished socket. 9851da177e4SLinus Torvalds */ 9861da177e4SLinus Torvalds 98789bddce5SStephen Hemminger if (!inode) { 9881da177e4SLinus Torvalds printk(KERN_DEBUG "sock_close: NULL inode\n"); 9891da177e4SLinus Torvalds return 0; 9901da177e4SLinus Torvalds } 9911da177e4SLinus Torvalds sock_fasync(-1, filp, 0); 9921da177e4SLinus Torvalds sock_release(SOCKET_I(inode)); 9931da177e4SLinus Torvalds return 0; 9941da177e4SLinus Torvalds } 9951da177e4SLinus Torvalds 9961da177e4SLinus Torvalds /* 9971da177e4SLinus Torvalds * Update the socket async list 9981da177e4SLinus Torvalds * 9991da177e4SLinus Torvalds * Fasync_list locking strategy. 10001da177e4SLinus Torvalds * 10011da177e4SLinus Torvalds * 1. fasync_list is modified only under process context socket lock 10021da177e4SLinus Torvalds * i.e. under semaphore. 10031da177e4SLinus Torvalds * 2. fasync_list is used under read_lock(&sk->sk_callback_lock) 10041da177e4SLinus Torvalds * or under socket lock. 10051da177e4SLinus Torvalds * 3. fasync_list can be used from softirq context, so that 10061da177e4SLinus Torvalds * modification under socket lock have to be enhanced with 10071da177e4SLinus Torvalds * write_lock_bh(&sk->sk_callback_lock). 10081da177e4SLinus Torvalds * --ANK (990710) 10091da177e4SLinus Torvalds */ 10101da177e4SLinus Torvalds 10111da177e4SLinus Torvalds static int sock_fasync(int fd, struct file *filp, int on) 10121da177e4SLinus Torvalds { 10131da177e4SLinus Torvalds struct fasync_struct *fa, *fna = NULL, **prev; 10141da177e4SLinus Torvalds struct socket *sock; 10151da177e4SLinus Torvalds struct sock *sk; 10161da177e4SLinus Torvalds 101789bddce5SStephen Hemminger if (on) { 10188b3a7005SKris Katterjohn fna = kmalloc(sizeof(struct fasync_struct), GFP_KERNEL); 10191da177e4SLinus Torvalds if (fna == NULL) 10201da177e4SLinus Torvalds return -ENOMEM; 10211da177e4SLinus Torvalds } 10221da177e4SLinus Torvalds 1023b69aee04SEric Dumazet sock = filp->private_data; 10241da177e4SLinus Torvalds 102589bddce5SStephen Hemminger sk = sock->sk; 102689bddce5SStephen Hemminger if (sk == NULL) { 10271da177e4SLinus Torvalds kfree(fna); 10281da177e4SLinus Torvalds return -EINVAL; 10291da177e4SLinus Torvalds } 10301da177e4SLinus Torvalds 10311da177e4SLinus Torvalds lock_sock(sk); 10321da177e4SLinus Torvalds 10331da177e4SLinus Torvalds prev = &(sock->fasync_list); 10341da177e4SLinus Torvalds 10351da177e4SLinus Torvalds for (fa = *prev; fa != NULL; prev = &fa->fa_next, fa = *prev) 10361da177e4SLinus Torvalds if (fa->fa_file == filp) 10371da177e4SLinus Torvalds break; 10381da177e4SLinus Torvalds 103989bddce5SStephen Hemminger if (on) { 104089bddce5SStephen Hemminger if (fa != NULL) { 10411da177e4SLinus Torvalds write_lock_bh(&sk->sk_callback_lock); 10421da177e4SLinus Torvalds fa->fa_fd = fd; 10431da177e4SLinus Torvalds write_unlock_bh(&sk->sk_callback_lock); 10441da177e4SLinus Torvalds 10451da177e4SLinus Torvalds kfree(fna); 10461da177e4SLinus Torvalds goto out; 10471da177e4SLinus Torvalds } 10481da177e4SLinus Torvalds fna->fa_file = filp; 10491da177e4SLinus Torvalds fna->fa_fd = fd; 10501da177e4SLinus Torvalds fna->magic = FASYNC_MAGIC; 10511da177e4SLinus Torvalds fna->fa_next = sock->fasync_list; 10521da177e4SLinus Torvalds write_lock_bh(&sk->sk_callback_lock); 10531da177e4SLinus Torvalds sock->fasync_list = fna; 10541da177e4SLinus Torvalds write_unlock_bh(&sk->sk_callback_lock); 105589bddce5SStephen Hemminger } else { 105689bddce5SStephen Hemminger if (fa != NULL) { 10571da177e4SLinus Torvalds write_lock_bh(&sk->sk_callback_lock); 10581da177e4SLinus Torvalds *prev = fa->fa_next; 10591da177e4SLinus Torvalds write_unlock_bh(&sk->sk_callback_lock); 10601da177e4SLinus Torvalds kfree(fa); 10611da177e4SLinus Torvalds } 10621da177e4SLinus Torvalds } 10631da177e4SLinus Torvalds 10641da177e4SLinus Torvalds out: 10651da177e4SLinus Torvalds release_sock(sock->sk); 10661da177e4SLinus Torvalds return 0; 10671da177e4SLinus Torvalds } 10681da177e4SLinus Torvalds 10691da177e4SLinus Torvalds /* This function may be called only under socket lock or callback_lock */ 10701da177e4SLinus Torvalds 10711da177e4SLinus Torvalds int sock_wake_async(struct socket *sock, int how, int band) 10721da177e4SLinus Torvalds { 10731da177e4SLinus Torvalds if (!sock || !sock->fasync_list) 10741da177e4SLinus Torvalds return -1; 107589bddce5SStephen Hemminger switch (how) { 10768d8ad9d7SPavel Emelyanov case SOCK_WAKE_WAITD: 10771da177e4SLinus Torvalds if (test_bit(SOCK_ASYNC_WAITDATA, &sock->flags)) 10781da177e4SLinus Torvalds break; 10791da177e4SLinus Torvalds goto call_kill; 10808d8ad9d7SPavel Emelyanov case SOCK_WAKE_SPACE: 10811da177e4SLinus Torvalds if (!test_and_clear_bit(SOCK_ASYNC_NOSPACE, &sock->flags)) 10821da177e4SLinus Torvalds break; 10831da177e4SLinus Torvalds /* fall through */ 10848d8ad9d7SPavel Emelyanov case SOCK_WAKE_IO: 10851da177e4SLinus Torvalds call_kill: 10861da177e4SLinus Torvalds __kill_fasync(sock->fasync_list, SIGIO, band); 10871da177e4SLinus Torvalds break; 10888d8ad9d7SPavel Emelyanov case SOCK_WAKE_URG: 10891da177e4SLinus Torvalds __kill_fasync(sock->fasync_list, SIGURG, band); 10901da177e4SLinus Torvalds } 10911da177e4SLinus Torvalds return 0; 10921da177e4SLinus Torvalds } 10931da177e4SLinus Torvalds 10941b8d7ae4SEric W. Biederman static int __sock_create(struct net *net, int family, int type, int protocol, 109589bddce5SStephen Hemminger struct socket **res, int kern) 10961da177e4SLinus Torvalds { 10971da177e4SLinus Torvalds int err; 10981da177e4SLinus Torvalds struct socket *sock; 109955737fdaSStephen Hemminger const struct net_proto_family *pf; 11001da177e4SLinus Torvalds 11011da177e4SLinus Torvalds /* 11021da177e4SLinus Torvalds * Check protocol is in range 11031da177e4SLinus Torvalds */ 11041da177e4SLinus Torvalds if (family < 0 || family >= NPROTO) 11051da177e4SLinus Torvalds return -EAFNOSUPPORT; 11061da177e4SLinus Torvalds if (type < 0 || type >= SOCK_MAX) 11071da177e4SLinus Torvalds return -EINVAL; 11081da177e4SLinus Torvalds 11091da177e4SLinus Torvalds /* Compatibility. 11101da177e4SLinus Torvalds 11111da177e4SLinus Torvalds This uglymoron is moved from INET layer to here to avoid 11121da177e4SLinus Torvalds deadlock in module load. 11131da177e4SLinus Torvalds */ 11141da177e4SLinus Torvalds if (family == PF_INET && type == SOCK_PACKET) { 11151da177e4SLinus Torvalds static int warned; 11161da177e4SLinus Torvalds if (!warned) { 11171da177e4SLinus Torvalds warned = 1; 111889bddce5SStephen Hemminger printk(KERN_INFO "%s uses obsolete (PF_INET,SOCK_PACKET)\n", 111989bddce5SStephen Hemminger current->comm); 11201da177e4SLinus Torvalds } 11211da177e4SLinus Torvalds family = PF_PACKET; 11221da177e4SLinus Torvalds } 11231da177e4SLinus Torvalds 11241da177e4SLinus Torvalds err = security_socket_create(family, type, protocol, kern); 11251da177e4SLinus Torvalds if (err) 11261da177e4SLinus Torvalds return err; 11271da177e4SLinus Torvalds 112855737fdaSStephen Hemminger /* 112955737fdaSStephen Hemminger * Allocate the socket and allow the family to set things up. if 113055737fdaSStephen Hemminger * the protocol is 0, the family is instructed to select an appropriate 113155737fdaSStephen Hemminger * default. 113255737fdaSStephen Hemminger */ 113355737fdaSStephen Hemminger sock = sock_alloc(); 113455737fdaSStephen Hemminger if (!sock) { 113555737fdaSStephen Hemminger if (net_ratelimit()) 113655737fdaSStephen Hemminger printk(KERN_WARNING "socket: no more sockets\n"); 113755737fdaSStephen Hemminger return -ENFILE; /* Not exactly a match, but its the 113855737fdaSStephen Hemminger closest posix thing */ 113955737fdaSStephen Hemminger } 114055737fdaSStephen Hemminger 114155737fdaSStephen Hemminger sock->type = type; 114255737fdaSStephen Hemminger 11431da177e4SLinus Torvalds #if defined(CONFIG_KMOD) 11441da177e4SLinus Torvalds /* Attempt to load a protocol module if the find failed. 11451da177e4SLinus Torvalds * 11461da177e4SLinus Torvalds * 12/09/1996 Marcin: But! this makes REALLY only sense, if the user 11471da177e4SLinus Torvalds * requested real, full-featured networking support upon configuration. 11481da177e4SLinus Torvalds * Otherwise module support will break! 11491da177e4SLinus Torvalds */ 115055737fdaSStephen Hemminger if (net_families[family] == NULL) 11511da177e4SLinus Torvalds request_module("net-pf-%d", family); 11521da177e4SLinus Torvalds #endif 11531da177e4SLinus Torvalds 115455737fdaSStephen Hemminger rcu_read_lock(); 115555737fdaSStephen Hemminger pf = rcu_dereference(net_families[family]); 11561da177e4SLinus Torvalds err = -EAFNOSUPPORT; 115755737fdaSStephen Hemminger if (!pf) 115855737fdaSStephen Hemminger goto out_release; 11591da177e4SLinus Torvalds 11601da177e4SLinus Torvalds /* 11611da177e4SLinus Torvalds * We will call the ->create function, that possibly is in a loadable 11621da177e4SLinus Torvalds * module, so we have to bump that loadable module refcnt first. 11631da177e4SLinus Torvalds */ 116455737fdaSStephen Hemminger if (!try_module_get(pf->owner)) 11651da177e4SLinus Torvalds goto out_release; 11661da177e4SLinus Torvalds 116755737fdaSStephen Hemminger /* Now protected by module ref count */ 116855737fdaSStephen Hemminger rcu_read_unlock(); 116955737fdaSStephen Hemminger 11701b8d7ae4SEric W. Biederman err = pf->create(net, sock, protocol); 117155737fdaSStephen Hemminger if (err < 0) 11721da177e4SLinus Torvalds goto out_module_put; 1173a79af59eSFrank Filz 11741da177e4SLinus Torvalds /* 11751da177e4SLinus Torvalds * Now to bump the refcnt of the [loadable] module that owns this 11761da177e4SLinus Torvalds * socket at sock_release time we decrement its refcnt. 11771da177e4SLinus Torvalds */ 117855737fdaSStephen Hemminger if (!try_module_get(sock->ops->owner)) 117955737fdaSStephen Hemminger goto out_module_busy; 118055737fdaSStephen Hemminger 11811da177e4SLinus Torvalds /* 11821da177e4SLinus Torvalds * Now that we're done with the ->create function, the [loadable] 11831da177e4SLinus Torvalds * module can have its refcnt decremented 11841da177e4SLinus Torvalds */ 118555737fdaSStephen Hemminger module_put(pf->owner); 11867420ed23SVenkat Yekkirala err = security_socket_post_create(sock, family, type, protocol, kern); 11877420ed23SVenkat Yekkirala if (err) 11883b185525SHerbert Xu goto out_sock_release; 118955737fdaSStephen Hemminger *res = sock; 11901da177e4SLinus Torvalds 119155737fdaSStephen Hemminger return 0; 119255737fdaSStephen Hemminger 119355737fdaSStephen Hemminger out_module_busy: 119455737fdaSStephen Hemminger err = -EAFNOSUPPORT; 11951da177e4SLinus Torvalds out_module_put: 119655737fdaSStephen Hemminger sock->ops = NULL; 119755737fdaSStephen Hemminger module_put(pf->owner); 119855737fdaSStephen Hemminger out_sock_release: 11991da177e4SLinus Torvalds sock_release(sock); 120055737fdaSStephen Hemminger return err; 120155737fdaSStephen Hemminger 120255737fdaSStephen Hemminger out_release: 120355737fdaSStephen Hemminger rcu_read_unlock(); 120455737fdaSStephen Hemminger goto out_sock_release; 12051da177e4SLinus Torvalds } 12061da177e4SLinus Torvalds 12071da177e4SLinus Torvalds int sock_create(int family, int type, int protocol, struct socket **res) 12081da177e4SLinus Torvalds { 12091b8d7ae4SEric W. Biederman return __sock_create(current->nsproxy->net_ns, family, type, protocol, res, 0); 12101da177e4SLinus Torvalds } 12111da177e4SLinus Torvalds 12121da177e4SLinus Torvalds int sock_create_kern(int family, int type, int protocol, struct socket **res) 12131da177e4SLinus Torvalds { 12141b8d7ae4SEric W. Biederman return __sock_create(&init_net, family, type, protocol, res, 1); 12151da177e4SLinus Torvalds } 12161da177e4SLinus Torvalds 12171da177e4SLinus Torvalds asmlinkage long sys_socket(int family, int type, int protocol) 12181da177e4SLinus Torvalds { 12191da177e4SLinus Torvalds int retval; 12201da177e4SLinus Torvalds struct socket *sock; 1221*a677a039SUlrich Drepper int flags; 1222*a677a039SUlrich Drepper 1223*a677a039SUlrich Drepper flags = type & ~SOCK_TYPE_MASK; 1224*a677a039SUlrich Drepper if (flags & ~SOCK_CLOEXEC) 1225*a677a039SUlrich Drepper return -EINVAL; 1226*a677a039SUlrich Drepper type &= SOCK_TYPE_MASK; 12271da177e4SLinus Torvalds 12281da177e4SLinus Torvalds retval = sock_create(family, type, protocol, &sock); 12291da177e4SLinus Torvalds if (retval < 0) 12301da177e4SLinus Torvalds goto out; 12311da177e4SLinus Torvalds 1232*a677a039SUlrich Drepper retval = sock_map_fd(sock, flags & O_CLOEXEC); 12331da177e4SLinus Torvalds if (retval < 0) 12341da177e4SLinus Torvalds goto out_release; 12351da177e4SLinus Torvalds 12361da177e4SLinus Torvalds out: 12371da177e4SLinus Torvalds /* It may be already another descriptor 8) Not kernel problem. */ 12381da177e4SLinus Torvalds return retval; 12391da177e4SLinus Torvalds 12401da177e4SLinus Torvalds out_release: 12411da177e4SLinus Torvalds sock_release(sock); 12421da177e4SLinus Torvalds return retval; 12431da177e4SLinus Torvalds } 12441da177e4SLinus Torvalds 12451da177e4SLinus Torvalds /* 12461da177e4SLinus Torvalds * Create a pair of connected sockets. 12471da177e4SLinus Torvalds */ 12481da177e4SLinus Torvalds 124989bddce5SStephen Hemminger asmlinkage long sys_socketpair(int family, int type, int protocol, 125089bddce5SStephen Hemminger int __user *usockvec) 12511da177e4SLinus Torvalds { 12521da177e4SLinus Torvalds struct socket *sock1, *sock2; 12531da177e4SLinus Torvalds int fd1, fd2, err; 1254db349509SAl Viro struct file *newfile1, *newfile2; 1255*a677a039SUlrich Drepper int flags; 1256*a677a039SUlrich Drepper 1257*a677a039SUlrich Drepper flags = type & ~SOCK_TYPE_MASK; 1258*a677a039SUlrich Drepper if (flags & ~SOCK_CLOEXEC) 1259*a677a039SUlrich Drepper return -EINVAL; 1260*a677a039SUlrich Drepper type &= SOCK_TYPE_MASK; 12611da177e4SLinus Torvalds 12621da177e4SLinus Torvalds /* 12631da177e4SLinus Torvalds * Obtain the first socket and check if the underlying protocol 12641da177e4SLinus Torvalds * supports the socketpair call. 12651da177e4SLinus Torvalds */ 12661da177e4SLinus Torvalds 12671da177e4SLinus Torvalds err = sock_create(family, type, protocol, &sock1); 12681da177e4SLinus Torvalds if (err < 0) 12691da177e4SLinus Torvalds goto out; 12701da177e4SLinus Torvalds 12711da177e4SLinus Torvalds err = sock_create(family, type, protocol, &sock2); 12721da177e4SLinus Torvalds if (err < 0) 12731da177e4SLinus Torvalds goto out_release_1; 12741da177e4SLinus Torvalds 12751da177e4SLinus Torvalds err = sock1->ops->socketpair(sock1, sock2); 12761da177e4SLinus Torvalds if (err < 0) 12771da177e4SLinus Torvalds goto out_release_both; 12781da177e4SLinus Torvalds 1279*a677a039SUlrich Drepper fd1 = sock_alloc_fd(&newfile1, flags & O_CLOEXEC); 1280bf3c23d1SDavid S. Miller if (unlikely(fd1 < 0)) { 1281bf3c23d1SDavid S. Miller err = fd1; 12821da177e4SLinus Torvalds goto out_release_both; 1283bf3c23d1SDavid S. Miller } 12841da177e4SLinus Torvalds 1285*a677a039SUlrich Drepper fd2 = sock_alloc_fd(&newfile2, flags & O_CLOEXEC); 1286db349509SAl Viro if (unlikely(fd2 < 0)) { 1287bf3c23d1SDavid S. Miller err = fd2; 1288db349509SAl Viro put_filp(newfile1); 1289db349509SAl Viro put_unused_fd(fd1); 1290db349509SAl Viro goto out_release_both; 1291db349509SAl Viro } 12921da177e4SLinus Torvalds 1293db349509SAl Viro err = sock_attach_fd(sock1, newfile1); 1294db349509SAl Viro if (unlikely(err < 0)) { 1295db349509SAl Viro goto out_fd2; 1296db349509SAl Viro } 1297db349509SAl Viro 1298db349509SAl Viro err = sock_attach_fd(sock2, newfile2); 1299db349509SAl Viro if (unlikely(err < 0)) { 1300db349509SAl Viro fput(newfile1); 1301db349509SAl Viro goto out_fd1; 1302db349509SAl Viro } 1303db349509SAl Viro 1304db349509SAl Viro err = audit_fd_pair(fd1, fd2); 1305db349509SAl Viro if (err < 0) { 1306db349509SAl Viro fput(newfile1); 1307db349509SAl Viro fput(newfile2); 1308db349509SAl Viro goto out_fd; 1309db349509SAl Viro } 1310db349509SAl Viro 1311db349509SAl Viro fd_install(fd1, newfile1); 1312db349509SAl Viro fd_install(fd2, newfile2); 13131da177e4SLinus Torvalds /* fd1 and fd2 may be already another descriptors. 13141da177e4SLinus Torvalds * Not kernel problem. 13151da177e4SLinus Torvalds */ 13161da177e4SLinus Torvalds 13171da177e4SLinus Torvalds err = put_user(fd1, &usockvec[0]); 13181da177e4SLinus Torvalds if (!err) 13191da177e4SLinus Torvalds err = put_user(fd2, &usockvec[1]); 13201da177e4SLinus Torvalds if (!err) 13211da177e4SLinus Torvalds return 0; 13221da177e4SLinus Torvalds 13231da177e4SLinus Torvalds sys_close(fd2); 13241da177e4SLinus Torvalds sys_close(fd1); 13251da177e4SLinus Torvalds return err; 13261da177e4SLinus Torvalds 13271da177e4SLinus Torvalds out_release_both: 13281da177e4SLinus Torvalds sock_release(sock2); 13291da177e4SLinus Torvalds out_release_1: 13301da177e4SLinus Torvalds sock_release(sock1); 13311da177e4SLinus Torvalds out: 13321da177e4SLinus Torvalds return err; 1333db349509SAl Viro 1334db349509SAl Viro out_fd2: 1335db349509SAl Viro put_filp(newfile1); 1336db349509SAl Viro sock_release(sock1); 1337db349509SAl Viro out_fd1: 1338db349509SAl Viro put_filp(newfile2); 1339db349509SAl Viro sock_release(sock2); 1340db349509SAl Viro out_fd: 1341db349509SAl Viro put_unused_fd(fd1); 1342db349509SAl Viro put_unused_fd(fd2); 1343db349509SAl Viro goto out; 13441da177e4SLinus Torvalds } 13451da177e4SLinus Torvalds 13461da177e4SLinus Torvalds /* 13471da177e4SLinus Torvalds * Bind a name to a socket. Nothing much to do here since it's 13481da177e4SLinus Torvalds * the protocol's responsibility to handle the local address. 13491da177e4SLinus Torvalds * 13501da177e4SLinus Torvalds * We move the socket address to kernel space before we call 13511da177e4SLinus Torvalds * the protocol layer (having also checked the address is ok). 13521da177e4SLinus Torvalds */ 13531da177e4SLinus Torvalds 13541da177e4SLinus Torvalds asmlinkage long sys_bind(int fd, struct sockaddr __user *umyaddr, int addrlen) 13551da177e4SLinus Torvalds { 13561da177e4SLinus Torvalds struct socket *sock; 1357230b1839SYOSHIFUJI Hideaki struct sockaddr_storage address; 13586cb153caSBenjamin LaHaise int err, fput_needed; 13591da177e4SLinus Torvalds 136089bddce5SStephen Hemminger sock = sockfd_lookup_light(fd, &err, &fput_needed); 136189bddce5SStephen Hemminger if (sock) { 1362230b1839SYOSHIFUJI Hideaki err = move_addr_to_kernel(umyaddr, addrlen, (struct sockaddr *)&address); 136389bddce5SStephen Hemminger if (err >= 0) { 136489bddce5SStephen Hemminger err = security_socket_bind(sock, 1365230b1839SYOSHIFUJI Hideaki (struct sockaddr *)&address, 136689bddce5SStephen Hemminger addrlen); 13676cb153caSBenjamin LaHaise if (!err) 13686cb153caSBenjamin LaHaise err = sock->ops->bind(sock, 136989bddce5SStephen Hemminger (struct sockaddr *) 1370230b1839SYOSHIFUJI Hideaki &address, addrlen); 13711da177e4SLinus Torvalds } 13726cb153caSBenjamin LaHaise fput_light(sock->file, fput_needed); 13731da177e4SLinus Torvalds } 13741da177e4SLinus Torvalds return err; 13751da177e4SLinus Torvalds } 13761da177e4SLinus Torvalds 13771da177e4SLinus Torvalds /* 13781da177e4SLinus Torvalds * Perform a listen. Basically, we allow the protocol to do anything 13791da177e4SLinus Torvalds * necessary for a listen, and if that works, we mark the socket as 13801da177e4SLinus Torvalds * ready for listening. 13811da177e4SLinus Torvalds */ 13821da177e4SLinus Torvalds 13831da177e4SLinus Torvalds asmlinkage long sys_listen(int fd, int backlog) 13841da177e4SLinus Torvalds { 13851da177e4SLinus Torvalds struct socket *sock; 13866cb153caSBenjamin LaHaise int err, fput_needed; 1387b8e1f9b5SPavel Emelyanov int somaxconn; 13881da177e4SLinus Torvalds 138989bddce5SStephen Hemminger sock = sockfd_lookup_light(fd, &err, &fput_needed); 139089bddce5SStephen Hemminger if (sock) { 13918efa6e93SPavel Emelyanov somaxconn = sock_net(sock->sk)->core.sysctl_somaxconn; 1392b8e1f9b5SPavel Emelyanov if ((unsigned)backlog > somaxconn) 1393b8e1f9b5SPavel Emelyanov backlog = somaxconn; 13941da177e4SLinus Torvalds 13951da177e4SLinus Torvalds err = security_socket_listen(sock, backlog); 13966cb153caSBenjamin LaHaise if (!err) 13971da177e4SLinus Torvalds err = sock->ops->listen(sock, backlog); 13986cb153caSBenjamin LaHaise 13996cb153caSBenjamin LaHaise fput_light(sock->file, fput_needed); 14001da177e4SLinus Torvalds } 14011da177e4SLinus Torvalds return err; 14021da177e4SLinus Torvalds } 14031da177e4SLinus Torvalds 14041da177e4SLinus Torvalds /* 14051da177e4SLinus Torvalds * For accept, we attempt to create a new socket, set up the link 14061da177e4SLinus Torvalds * with the client, wake up the client, then return the new 14071da177e4SLinus Torvalds * connected fd. We collect the address of the connector in kernel 14081da177e4SLinus Torvalds * space and move it to user at the very end. This is unclean because 14091da177e4SLinus Torvalds * we open the socket then return an error. 14101da177e4SLinus Torvalds * 14111da177e4SLinus Torvalds * 1003.1g adds the ability to recvmsg() to query connection pending 14121da177e4SLinus Torvalds * status to recvmsg. We need to add that support in a way thats 14131da177e4SLinus Torvalds * clean when we restucture accept also. 14141da177e4SLinus Torvalds */ 14151da177e4SLinus Torvalds 141689bddce5SStephen Hemminger asmlinkage long sys_accept(int fd, struct sockaddr __user *upeer_sockaddr, 141789bddce5SStephen Hemminger int __user *upeer_addrlen) 14181da177e4SLinus Torvalds { 14191da177e4SLinus Torvalds struct socket *sock, *newsock; 142039d8c1b6SDavid S. Miller struct file *newfile; 14216cb153caSBenjamin LaHaise int err, len, newfd, fput_needed; 1422230b1839SYOSHIFUJI Hideaki struct sockaddr_storage address; 14231da177e4SLinus Torvalds 14246cb153caSBenjamin LaHaise sock = sockfd_lookup_light(fd, &err, &fput_needed); 14251da177e4SLinus Torvalds if (!sock) 14261da177e4SLinus Torvalds goto out; 14271da177e4SLinus Torvalds 14281da177e4SLinus Torvalds err = -ENFILE; 14291da177e4SLinus Torvalds if (!(newsock = sock_alloc())) 14301da177e4SLinus Torvalds goto out_put; 14311da177e4SLinus Torvalds 14321da177e4SLinus Torvalds newsock->type = sock->type; 14331da177e4SLinus Torvalds newsock->ops = sock->ops; 14341da177e4SLinus Torvalds 14351da177e4SLinus Torvalds /* 14361da177e4SLinus Torvalds * We don't need try_module_get here, as the listening socket (sock) 14371da177e4SLinus Torvalds * has the protocol module (sock->ops->owner) held. 14381da177e4SLinus Torvalds */ 14391da177e4SLinus Torvalds __module_get(newsock->ops->owner); 14401da177e4SLinus Torvalds 1441*a677a039SUlrich Drepper newfd = sock_alloc_fd(&newfile, 0); 144239d8c1b6SDavid S. Miller if (unlikely(newfd < 0)) { 144339d8c1b6SDavid S. Miller err = newfd; 14449a1875e6SDavid S. Miller sock_release(newsock); 14459a1875e6SDavid S. Miller goto out_put; 144639d8c1b6SDavid S. Miller } 144739d8c1b6SDavid S. Miller 144839d8c1b6SDavid S. Miller err = sock_attach_fd(newsock, newfile); 144939d8c1b6SDavid S. Miller if (err < 0) 145079f4f642SAlexey Dobriyan goto out_fd_simple; 145139d8c1b6SDavid S. Miller 1452a79af59eSFrank Filz err = security_socket_accept(sock, newsock); 1453a79af59eSFrank Filz if (err) 145439d8c1b6SDavid S. Miller goto out_fd; 1455a79af59eSFrank Filz 14561da177e4SLinus Torvalds err = sock->ops->accept(sock, newsock, sock->file->f_flags); 14571da177e4SLinus Torvalds if (err < 0) 145839d8c1b6SDavid S. Miller goto out_fd; 14591da177e4SLinus Torvalds 14601da177e4SLinus Torvalds if (upeer_sockaddr) { 1461230b1839SYOSHIFUJI Hideaki if (newsock->ops->getname(newsock, (struct sockaddr *)&address, 146289bddce5SStephen Hemminger &len, 2) < 0) { 14631da177e4SLinus Torvalds err = -ECONNABORTED; 146439d8c1b6SDavid S. Miller goto out_fd; 14651da177e4SLinus Torvalds } 1466230b1839SYOSHIFUJI Hideaki err = move_addr_to_user((struct sockaddr *)&address, 1467230b1839SYOSHIFUJI Hideaki len, upeer_sockaddr, upeer_addrlen); 14681da177e4SLinus Torvalds if (err < 0) 146939d8c1b6SDavid S. Miller goto out_fd; 14701da177e4SLinus Torvalds } 14711da177e4SLinus Torvalds 14721da177e4SLinus Torvalds /* File flags are not inherited via accept() unlike another OSes. */ 14731da177e4SLinus Torvalds 147439d8c1b6SDavid S. Miller fd_install(newfd, newfile); 147539d8c1b6SDavid S. Miller err = newfd; 14761da177e4SLinus Torvalds 14771da177e4SLinus Torvalds security_socket_post_accept(sock, newsock); 14781da177e4SLinus Torvalds 14791da177e4SLinus Torvalds out_put: 14806cb153caSBenjamin LaHaise fput_light(sock->file, fput_needed); 14811da177e4SLinus Torvalds out: 14821da177e4SLinus Torvalds return err; 148379f4f642SAlexey Dobriyan out_fd_simple: 148479f4f642SAlexey Dobriyan sock_release(newsock); 148579f4f642SAlexey Dobriyan put_filp(newfile); 148679f4f642SAlexey Dobriyan put_unused_fd(newfd); 148779f4f642SAlexey Dobriyan goto out_put; 148839d8c1b6SDavid S. Miller out_fd: 14899606a216SDavid S. Miller fput(newfile); 149039d8c1b6SDavid S. Miller put_unused_fd(newfd); 14911da177e4SLinus Torvalds goto out_put; 14921da177e4SLinus Torvalds } 14931da177e4SLinus Torvalds 14941da177e4SLinus Torvalds /* 14951da177e4SLinus Torvalds * Attempt to connect to a socket with the server address. The address 14961da177e4SLinus Torvalds * is in user space so we verify it is OK and move it to kernel space. 14971da177e4SLinus Torvalds * 14981da177e4SLinus Torvalds * For 1003.1g we need to add clean support for a bind to AF_UNSPEC to 14991da177e4SLinus Torvalds * break bindings 15001da177e4SLinus Torvalds * 15011da177e4SLinus Torvalds * NOTE: 1003.1g draft 6.3 is broken with respect to AX.25/NetROM and 15021da177e4SLinus Torvalds * other SEQPACKET protocols that take time to connect() as it doesn't 15031da177e4SLinus Torvalds * include the -EINPROGRESS status for such sockets. 15041da177e4SLinus Torvalds */ 15051da177e4SLinus Torvalds 150689bddce5SStephen Hemminger asmlinkage long sys_connect(int fd, struct sockaddr __user *uservaddr, 150789bddce5SStephen Hemminger int addrlen) 15081da177e4SLinus Torvalds { 15091da177e4SLinus Torvalds struct socket *sock; 1510230b1839SYOSHIFUJI Hideaki struct sockaddr_storage address; 15116cb153caSBenjamin LaHaise int err, fput_needed; 15121da177e4SLinus Torvalds 15136cb153caSBenjamin LaHaise sock = sockfd_lookup_light(fd, &err, &fput_needed); 15141da177e4SLinus Torvalds if (!sock) 15151da177e4SLinus Torvalds goto out; 1516230b1839SYOSHIFUJI Hideaki err = move_addr_to_kernel(uservaddr, addrlen, (struct sockaddr *)&address); 15171da177e4SLinus Torvalds if (err < 0) 15181da177e4SLinus Torvalds goto out_put; 15191da177e4SLinus Torvalds 152089bddce5SStephen Hemminger err = 1521230b1839SYOSHIFUJI Hideaki security_socket_connect(sock, (struct sockaddr *)&address, addrlen); 15221da177e4SLinus Torvalds if (err) 15231da177e4SLinus Torvalds goto out_put; 15241da177e4SLinus Torvalds 1525230b1839SYOSHIFUJI Hideaki err = sock->ops->connect(sock, (struct sockaddr *)&address, addrlen, 15261da177e4SLinus Torvalds sock->file->f_flags); 15271da177e4SLinus Torvalds out_put: 15286cb153caSBenjamin LaHaise fput_light(sock->file, fput_needed); 15291da177e4SLinus Torvalds out: 15301da177e4SLinus Torvalds return err; 15311da177e4SLinus Torvalds } 15321da177e4SLinus Torvalds 15331da177e4SLinus Torvalds /* 15341da177e4SLinus Torvalds * Get the local address ('name') of a socket object. Move the obtained 15351da177e4SLinus Torvalds * name to user space. 15361da177e4SLinus Torvalds */ 15371da177e4SLinus Torvalds 153889bddce5SStephen Hemminger asmlinkage long sys_getsockname(int fd, struct sockaddr __user *usockaddr, 153989bddce5SStephen Hemminger int __user *usockaddr_len) 15401da177e4SLinus Torvalds { 15411da177e4SLinus Torvalds struct socket *sock; 1542230b1839SYOSHIFUJI Hideaki struct sockaddr_storage address; 15436cb153caSBenjamin LaHaise int len, err, fput_needed; 15441da177e4SLinus Torvalds 15456cb153caSBenjamin LaHaise sock = sockfd_lookup_light(fd, &err, &fput_needed); 15461da177e4SLinus Torvalds if (!sock) 15471da177e4SLinus Torvalds goto out; 15481da177e4SLinus Torvalds 15491da177e4SLinus Torvalds err = security_socket_getsockname(sock); 15501da177e4SLinus Torvalds if (err) 15511da177e4SLinus Torvalds goto out_put; 15521da177e4SLinus Torvalds 1553230b1839SYOSHIFUJI Hideaki err = sock->ops->getname(sock, (struct sockaddr *)&address, &len, 0); 15541da177e4SLinus Torvalds if (err) 15551da177e4SLinus Torvalds goto out_put; 1556230b1839SYOSHIFUJI Hideaki err = move_addr_to_user((struct sockaddr *)&address, len, usockaddr, usockaddr_len); 15571da177e4SLinus Torvalds 15581da177e4SLinus Torvalds out_put: 15596cb153caSBenjamin LaHaise fput_light(sock->file, fput_needed); 15601da177e4SLinus Torvalds out: 15611da177e4SLinus Torvalds return err; 15621da177e4SLinus Torvalds } 15631da177e4SLinus Torvalds 15641da177e4SLinus Torvalds /* 15651da177e4SLinus Torvalds * Get the remote address ('name') of a socket object. Move the obtained 15661da177e4SLinus Torvalds * name to user space. 15671da177e4SLinus Torvalds */ 15681da177e4SLinus Torvalds 156989bddce5SStephen Hemminger asmlinkage long sys_getpeername(int fd, struct sockaddr __user *usockaddr, 157089bddce5SStephen Hemminger int __user *usockaddr_len) 15711da177e4SLinus Torvalds { 15721da177e4SLinus Torvalds struct socket *sock; 1573230b1839SYOSHIFUJI Hideaki struct sockaddr_storage address; 15746cb153caSBenjamin LaHaise int len, err, fput_needed; 15751da177e4SLinus Torvalds 157689bddce5SStephen Hemminger sock = sockfd_lookup_light(fd, &err, &fput_needed); 157789bddce5SStephen Hemminger if (sock != NULL) { 15781da177e4SLinus Torvalds err = security_socket_getpeername(sock); 15791da177e4SLinus Torvalds if (err) { 15806cb153caSBenjamin LaHaise fput_light(sock->file, fput_needed); 15811da177e4SLinus Torvalds return err; 15821da177e4SLinus Torvalds } 15831da177e4SLinus Torvalds 158489bddce5SStephen Hemminger err = 1585230b1839SYOSHIFUJI Hideaki sock->ops->getname(sock, (struct sockaddr *)&address, &len, 158689bddce5SStephen Hemminger 1); 15871da177e4SLinus Torvalds if (!err) 1588230b1839SYOSHIFUJI Hideaki err = move_addr_to_user((struct sockaddr *)&address, len, usockaddr, 158989bddce5SStephen Hemminger usockaddr_len); 15906cb153caSBenjamin LaHaise fput_light(sock->file, fput_needed); 15911da177e4SLinus Torvalds } 15921da177e4SLinus Torvalds return err; 15931da177e4SLinus Torvalds } 15941da177e4SLinus Torvalds 15951da177e4SLinus Torvalds /* 15961da177e4SLinus Torvalds * Send a datagram to a given address. We move the address into kernel 15971da177e4SLinus Torvalds * space and check the user space data area is readable before invoking 15981da177e4SLinus Torvalds * the protocol. 15991da177e4SLinus Torvalds */ 16001da177e4SLinus Torvalds 160189bddce5SStephen Hemminger asmlinkage long sys_sendto(int fd, void __user *buff, size_t len, 160289bddce5SStephen Hemminger unsigned flags, struct sockaddr __user *addr, 160389bddce5SStephen Hemminger int addr_len) 16041da177e4SLinus Torvalds { 16051da177e4SLinus Torvalds struct socket *sock; 1606230b1839SYOSHIFUJI Hideaki struct sockaddr_storage address; 16071da177e4SLinus Torvalds int err; 16081da177e4SLinus Torvalds struct msghdr msg; 16091da177e4SLinus Torvalds struct iovec iov; 16106cb153caSBenjamin LaHaise int fput_needed; 16111da177e4SLinus Torvalds 1612de0fa95cSPavel Emelyanov sock = sockfd_lookup_light(fd, &err, &fput_needed); 1613de0fa95cSPavel Emelyanov if (!sock) 16144387ff75SDavid S. Miller goto out; 16156cb153caSBenjamin LaHaise 16161da177e4SLinus Torvalds iov.iov_base = buff; 16171da177e4SLinus Torvalds iov.iov_len = len; 16181da177e4SLinus Torvalds msg.msg_name = NULL; 16191da177e4SLinus Torvalds msg.msg_iov = &iov; 16201da177e4SLinus Torvalds msg.msg_iovlen = 1; 16211da177e4SLinus Torvalds msg.msg_control = NULL; 16221da177e4SLinus Torvalds msg.msg_controllen = 0; 16231da177e4SLinus Torvalds msg.msg_namelen = 0; 16246cb153caSBenjamin LaHaise if (addr) { 1625230b1839SYOSHIFUJI Hideaki err = move_addr_to_kernel(addr, addr_len, (struct sockaddr *)&address); 16261da177e4SLinus Torvalds if (err < 0) 16271da177e4SLinus Torvalds goto out_put; 1628230b1839SYOSHIFUJI Hideaki msg.msg_name = (struct sockaddr *)&address; 16291da177e4SLinus Torvalds msg.msg_namelen = addr_len; 16301da177e4SLinus Torvalds } 16311da177e4SLinus Torvalds if (sock->file->f_flags & O_NONBLOCK) 16321da177e4SLinus Torvalds flags |= MSG_DONTWAIT; 16331da177e4SLinus Torvalds msg.msg_flags = flags; 16341da177e4SLinus Torvalds err = sock_sendmsg(sock, &msg, len); 16351da177e4SLinus Torvalds 16361da177e4SLinus Torvalds out_put: 1637de0fa95cSPavel Emelyanov fput_light(sock->file, fput_needed); 16384387ff75SDavid S. Miller out: 16391da177e4SLinus Torvalds return err; 16401da177e4SLinus Torvalds } 16411da177e4SLinus Torvalds 16421da177e4SLinus Torvalds /* 16431da177e4SLinus Torvalds * Send a datagram down a socket. 16441da177e4SLinus Torvalds */ 16451da177e4SLinus Torvalds 16461da177e4SLinus Torvalds asmlinkage long sys_send(int fd, void __user *buff, size_t len, unsigned flags) 16471da177e4SLinus Torvalds { 16481da177e4SLinus Torvalds return sys_sendto(fd, buff, len, flags, NULL, 0); 16491da177e4SLinus Torvalds } 16501da177e4SLinus Torvalds 16511da177e4SLinus Torvalds /* 16521da177e4SLinus Torvalds * Receive a frame from the socket and optionally record the address of the 16531da177e4SLinus Torvalds * sender. We verify the buffers are writable and if needed move the 16541da177e4SLinus Torvalds * sender address from kernel to user space. 16551da177e4SLinus Torvalds */ 16561da177e4SLinus Torvalds 165789bddce5SStephen Hemminger asmlinkage long sys_recvfrom(int fd, void __user *ubuf, size_t size, 165889bddce5SStephen Hemminger unsigned flags, struct sockaddr __user *addr, 165989bddce5SStephen Hemminger int __user *addr_len) 16601da177e4SLinus Torvalds { 16611da177e4SLinus Torvalds struct socket *sock; 16621da177e4SLinus Torvalds struct iovec iov; 16631da177e4SLinus Torvalds struct msghdr msg; 1664230b1839SYOSHIFUJI Hideaki struct sockaddr_storage address; 16651da177e4SLinus Torvalds int err, err2; 16666cb153caSBenjamin LaHaise int fput_needed; 16671da177e4SLinus Torvalds 1668de0fa95cSPavel Emelyanov sock = sockfd_lookup_light(fd, &err, &fput_needed); 16691da177e4SLinus Torvalds if (!sock) 1670de0fa95cSPavel Emelyanov goto out; 16711da177e4SLinus Torvalds 16721da177e4SLinus Torvalds msg.msg_control = NULL; 16731da177e4SLinus Torvalds msg.msg_controllen = 0; 16741da177e4SLinus Torvalds msg.msg_iovlen = 1; 16751da177e4SLinus Torvalds msg.msg_iov = &iov; 16761da177e4SLinus Torvalds iov.iov_len = size; 16771da177e4SLinus Torvalds iov.iov_base = ubuf; 1678230b1839SYOSHIFUJI Hideaki msg.msg_name = (struct sockaddr *)&address; 1679230b1839SYOSHIFUJI Hideaki msg.msg_namelen = sizeof(address); 16801da177e4SLinus Torvalds if (sock->file->f_flags & O_NONBLOCK) 16811da177e4SLinus Torvalds flags |= MSG_DONTWAIT; 16821da177e4SLinus Torvalds err = sock_recvmsg(sock, &msg, size, flags); 16831da177e4SLinus Torvalds 168489bddce5SStephen Hemminger if (err >= 0 && addr != NULL) { 1685230b1839SYOSHIFUJI Hideaki err2 = move_addr_to_user((struct sockaddr *)&address, 1686230b1839SYOSHIFUJI Hideaki msg.msg_namelen, addr, addr_len); 16871da177e4SLinus Torvalds if (err2 < 0) 16881da177e4SLinus Torvalds err = err2; 16891da177e4SLinus Torvalds } 1690de0fa95cSPavel Emelyanov 1691de0fa95cSPavel Emelyanov fput_light(sock->file, fput_needed); 16924387ff75SDavid S. Miller out: 16931da177e4SLinus Torvalds return err; 16941da177e4SLinus Torvalds } 16951da177e4SLinus Torvalds 16961da177e4SLinus Torvalds /* 16971da177e4SLinus Torvalds * Receive a datagram from a socket. 16981da177e4SLinus Torvalds */ 16991da177e4SLinus Torvalds 170089bddce5SStephen Hemminger asmlinkage long sys_recv(int fd, void __user *ubuf, size_t size, 170189bddce5SStephen Hemminger unsigned flags) 17021da177e4SLinus Torvalds { 17031da177e4SLinus Torvalds return sys_recvfrom(fd, ubuf, size, flags, NULL, NULL); 17041da177e4SLinus Torvalds } 17051da177e4SLinus Torvalds 17061da177e4SLinus Torvalds /* 17071da177e4SLinus Torvalds * Set a socket option. Because we don't know the option lengths we have 17081da177e4SLinus Torvalds * to pass the user mode parameter for the protocols to sort out. 17091da177e4SLinus Torvalds */ 17101da177e4SLinus Torvalds 171189bddce5SStephen Hemminger asmlinkage long sys_setsockopt(int fd, int level, int optname, 171289bddce5SStephen Hemminger char __user *optval, int optlen) 17131da177e4SLinus Torvalds { 17146cb153caSBenjamin LaHaise int err, fput_needed; 17151da177e4SLinus Torvalds struct socket *sock; 17161da177e4SLinus Torvalds 17171da177e4SLinus Torvalds if (optlen < 0) 17181da177e4SLinus Torvalds return -EINVAL; 17191da177e4SLinus Torvalds 172089bddce5SStephen Hemminger sock = sockfd_lookup_light(fd, &err, &fput_needed); 172189bddce5SStephen Hemminger if (sock != NULL) { 17221da177e4SLinus Torvalds err = security_socket_setsockopt(sock, level, optname); 17236cb153caSBenjamin LaHaise if (err) 17246cb153caSBenjamin LaHaise goto out_put; 17251da177e4SLinus Torvalds 17261da177e4SLinus Torvalds if (level == SOL_SOCKET) 172789bddce5SStephen Hemminger err = 172889bddce5SStephen Hemminger sock_setsockopt(sock, level, optname, optval, 172989bddce5SStephen Hemminger optlen); 17301da177e4SLinus Torvalds else 173189bddce5SStephen Hemminger err = 173289bddce5SStephen Hemminger sock->ops->setsockopt(sock, level, optname, optval, 173389bddce5SStephen Hemminger optlen); 17346cb153caSBenjamin LaHaise out_put: 17356cb153caSBenjamin LaHaise fput_light(sock->file, fput_needed); 17361da177e4SLinus Torvalds } 17371da177e4SLinus Torvalds return err; 17381da177e4SLinus Torvalds } 17391da177e4SLinus Torvalds 17401da177e4SLinus Torvalds /* 17411da177e4SLinus Torvalds * Get a socket option. Because we don't know the option lengths we have 17421da177e4SLinus Torvalds * to pass a user mode parameter for the protocols to sort out. 17431da177e4SLinus Torvalds */ 17441da177e4SLinus Torvalds 174589bddce5SStephen Hemminger asmlinkage long sys_getsockopt(int fd, int level, int optname, 174689bddce5SStephen Hemminger char __user *optval, int __user *optlen) 17471da177e4SLinus Torvalds { 17486cb153caSBenjamin LaHaise int err, fput_needed; 17491da177e4SLinus Torvalds struct socket *sock; 17501da177e4SLinus Torvalds 175189bddce5SStephen Hemminger sock = sockfd_lookup_light(fd, &err, &fput_needed); 175289bddce5SStephen Hemminger if (sock != NULL) { 17536cb153caSBenjamin LaHaise err = security_socket_getsockopt(sock, level, optname); 17546cb153caSBenjamin LaHaise if (err) 17556cb153caSBenjamin LaHaise goto out_put; 17561da177e4SLinus Torvalds 17571da177e4SLinus Torvalds if (level == SOL_SOCKET) 175889bddce5SStephen Hemminger err = 175989bddce5SStephen Hemminger sock_getsockopt(sock, level, optname, optval, 176089bddce5SStephen Hemminger optlen); 17611da177e4SLinus Torvalds else 176289bddce5SStephen Hemminger err = 176389bddce5SStephen Hemminger sock->ops->getsockopt(sock, level, optname, optval, 176489bddce5SStephen Hemminger optlen); 17656cb153caSBenjamin LaHaise out_put: 17666cb153caSBenjamin LaHaise fput_light(sock->file, fput_needed); 17671da177e4SLinus Torvalds } 17681da177e4SLinus Torvalds return err; 17691da177e4SLinus Torvalds } 17701da177e4SLinus Torvalds 17711da177e4SLinus Torvalds /* 17721da177e4SLinus Torvalds * Shutdown a socket. 17731da177e4SLinus Torvalds */ 17741da177e4SLinus Torvalds 17751da177e4SLinus Torvalds asmlinkage long sys_shutdown(int fd, int how) 17761da177e4SLinus Torvalds { 17776cb153caSBenjamin LaHaise int err, fput_needed; 17781da177e4SLinus Torvalds struct socket *sock; 17791da177e4SLinus Torvalds 178089bddce5SStephen Hemminger sock = sockfd_lookup_light(fd, &err, &fput_needed); 178189bddce5SStephen Hemminger if (sock != NULL) { 17821da177e4SLinus Torvalds err = security_socket_shutdown(sock, how); 17836cb153caSBenjamin LaHaise if (!err) 17841da177e4SLinus Torvalds err = sock->ops->shutdown(sock, how); 17856cb153caSBenjamin LaHaise fput_light(sock->file, fput_needed); 17861da177e4SLinus Torvalds } 17871da177e4SLinus Torvalds return err; 17881da177e4SLinus Torvalds } 17891da177e4SLinus Torvalds 17901da177e4SLinus Torvalds /* A couple of helpful macros for getting the address of the 32/64 bit 17911da177e4SLinus Torvalds * fields which are the same type (int / unsigned) on our platforms. 17921da177e4SLinus Torvalds */ 17931da177e4SLinus Torvalds #define COMPAT_MSG(msg, member) ((MSG_CMSG_COMPAT & flags) ? &msg##_compat->member : &msg->member) 17941da177e4SLinus Torvalds #define COMPAT_NAMELEN(msg) COMPAT_MSG(msg, msg_namelen) 17951da177e4SLinus Torvalds #define COMPAT_FLAGS(msg) COMPAT_MSG(msg, msg_flags) 17961da177e4SLinus Torvalds 17971da177e4SLinus Torvalds /* 17981da177e4SLinus Torvalds * BSD sendmsg interface 17991da177e4SLinus Torvalds */ 18001da177e4SLinus Torvalds 18011da177e4SLinus Torvalds asmlinkage long sys_sendmsg(int fd, struct msghdr __user *msg, unsigned flags) 18021da177e4SLinus Torvalds { 180389bddce5SStephen Hemminger struct compat_msghdr __user *msg_compat = 180489bddce5SStephen Hemminger (struct compat_msghdr __user *)msg; 18051da177e4SLinus Torvalds struct socket *sock; 1806230b1839SYOSHIFUJI Hideaki struct sockaddr_storage address; 18071da177e4SLinus Torvalds struct iovec iovstack[UIO_FASTIOV], *iov = iovstack; 1808b9d717a7SAlex Williamson unsigned char ctl[sizeof(struct cmsghdr) + 20] 1809b9d717a7SAlex Williamson __attribute__ ((aligned(sizeof(__kernel_size_t)))); 1810b9d717a7SAlex Williamson /* 20 is size of ipv6_pktinfo */ 18111da177e4SLinus Torvalds unsigned char *ctl_buf = ctl; 18121da177e4SLinus Torvalds struct msghdr msg_sys; 18131da177e4SLinus Torvalds int err, ctl_len, iov_size, total_len; 18146cb153caSBenjamin LaHaise int fput_needed; 18151da177e4SLinus Torvalds 18161da177e4SLinus Torvalds err = -EFAULT; 18171da177e4SLinus Torvalds if (MSG_CMSG_COMPAT & flags) { 18181da177e4SLinus Torvalds if (get_compat_msghdr(&msg_sys, msg_compat)) 18191da177e4SLinus Torvalds return -EFAULT; 182089bddce5SStephen Hemminger } 182189bddce5SStephen Hemminger else if (copy_from_user(&msg_sys, msg, sizeof(struct msghdr))) 18221da177e4SLinus Torvalds return -EFAULT; 18231da177e4SLinus Torvalds 18246cb153caSBenjamin LaHaise sock = sockfd_lookup_light(fd, &err, &fput_needed); 18251da177e4SLinus Torvalds if (!sock) 18261da177e4SLinus Torvalds goto out; 18271da177e4SLinus Torvalds 18281da177e4SLinus Torvalds /* do not move before msg_sys is valid */ 18291da177e4SLinus Torvalds err = -EMSGSIZE; 18301da177e4SLinus Torvalds if (msg_sys.msg_iovlen > UIO_MAXIOV) 18311da177e4SLinus Torvalds goto out_put; 18321da177e4SLinus Torvalds 18331da177e4SLinus Torvalds /* Check whether to allocate the iovec area */ 18341da177e4SLinus Torvalds err = -ENOMEM; 18351da177e4SLinus Torvalds iov_size = msg_sys.msg_iovlen * sizeof(struct iovec); 18361da177e4SLinus Torvalds if (msg_sys.msg_iovlen > UIO_FASTIOV) { 18371da177e4SLinus Torvalds iov = sock_kmalloc(sock->sk, iov_size, GFP_KERNEL); 18381da177e4SLinus Torvalds if (!iov) 18391da177e4SLinus Torvalds goto out_put; 18401da177e4SLinus Torvalds } 18411da177e4SLinus Torvalds 18421da177e4SLinus Torvalds /* This will also move the address data into kernel space */ 18431da177e4SLinus Torvalds if (MSG_CMSG_COMPAT & flags) { 1844230b1839SYOSHIFUJI Hideaki err = verify_compat_iovec(&msg_sys, iov, 1845230b1839SYOSHIFUJI Hideaki (struct sockaddr *)&address, 1846230b1839SYOSHIFUJI Hideaki VERIFY_READ); 18471da177e4SLinus Torvalds } else 1848230b1839SYOSHIFUJI Hideaki err = verify_iovec(&msg_sys, iov, 1849230b1839SYOSHIFUJI Hideaki (struct sockaddr *)&address, 1850230b1839SYOSHIFUJI Hideaki VERIFY_READ); 18511da177e4SLinus Torvalds if (err < 0) 18521da177e4SLinus Torvalds goto out_freeiov; 18531da177e4SLinus Torvalds total_len = err; 18541da177e4SLinus Torvalds 18551da177e4SLinus Torvalds err = -ENOBUFS; 18561da177e4SLinus Torvalds 18571da177e4SLinus Torvalds if (msg_sys.msg_controllen > INT_MAX) 18581da177e4SLinus Torvalds goto out_freeiov; 18591da177e4SLinus Torvalds ctl_len = msg_sys.msg_controllen; 18601da177e4SLinus Torvalds if ((MSG_CMSG_COMPAT & flags) && ctl_len) { 186189bddce5SStephen Hemminger err = 186289bddce5SStephen Hemminger cmsghdr_from_user_compat_to_kern(&msg_sys, sock->sk, ctl, 186389bddce5SStephen Hemminger sizeof(ctl)); 18641da177e4SLinus Torvalds if (err) 18651da177e4SLinus Torvalds goto out_freeiov; 18661da177e4SLinus Torvalds ctl_buf = msg_sys.msg_control; 18678920e8f9SAl Viro ctl_len = msg_sys.msg_controllen; 18681da177e4SLinus Torvalds } else if (ctl_len) { 186989bddce5SStephen Hemminger if (ctl_len > sizeof(ctl)) { 18701da177e4SLinus Torvalds ctl_buf = sock_kmalloc(sock->sk, ctl_len, GFP_KERNEL); 18711da177e4SLinus Torvalds if (ctl_buf == NULL) 18721da177e4SLinus Torvalds goto out_freeiov; 18731da177e4SLinus Torvalds } 18741da177e4SLinus Torvalds err = -EFAULT; 18751da177e4SLinus Torvalds /* 18761da177e4SLinus Torvalds * Careful! Before this, msg_sys.msg_control contains a user pointer. 18771da177e4SLinus Torvalds * Afterwards, it will be a kernel pointer. Thus the compiler-assisted 18781da177e4SLinus Torvalds * checking falls down on this. 18791da177e4SLinus Torvalds */ 188089bddce5SStephen Hemminger if (copy_from_user(ctl_buf, (void __user *)msg_sys.msg_control, 188189bddce5SStephen Hemminger ctl_len)) 18821da177e4SLinus Torvalds goto out_freectl; 18831da177e4SLinus Torvalds msg_sys.msg_control = ctl_buf; 18841da177e4SLinus Torvalds } 18851da177e4SLinus Torvalds msg_sys.msg_flags = flags; 18861da177e4SLinus Torvalds 18871da177e4SLinus Torvalds if (sock->file->f_flags & O_NONBLOCK) 18881da177e4SLinus Torvalds msg_sys.msg_flags |= MSG_DONTWAIT; 18891da177e4SLinus Torvalds err = sock_sendmsg(sock, &msg_sys, total_len); 18901da177e4SLinus Torvalds 18911da177e4SLinus Torvalds out_freectl: 18921da177e4SLinus Torvalds if (ctl_buf != ctl) 18931da177e4SLinus Torvalds sock_kfree_s(sock->sk, ctl_buf, ctl_len); 18941da177e4SLinus Torvalds out_freeiov: 18951da177e4SLinus Torvalds if (iov != iovstack) 18961da177e4SLinus Torvalds sock_kfree_s(sock->sk, iov, iov_size); 18971da177e4SLinus Torvalds out_put: 18986cb153caSBenjamin LaHaise fput_light(sock->file, fput_needed); 18991da177e4SLinus Torvalds out: 19001da177e4SLinus Torvalds return err; 19011da177e4SLinus Torvalds } 19021da177e4SLinus Torvalds 19031da177e4SLinus Torvalds /* 19041da177e4SLinus Torvalds * BSD recvmsg interface 19051da177e4SLinus Torvalds */ 19061da177e4SLinus Torvalds 190789bddce5SStephen Hemminger asmlinkage long sys_recvmsg(int fd, struct msghdr __user *msg, 190889bddce5SStephen Hemminger unsigned int flags) 19091da177e4SLinus Torvalds { 191089bddce5SStephen Hemminger struct compat_msghdr __user *msg_compat = 191189bddce5SStephen Hemminger (struct compat_msghdr __user *)msg; 19121da177e4SLinus Torvalds struct socket *sock; 19131da177e4SLinus Torvalds struct iovec iovstack[UIO_FASTIOV]; 19141da177e4SLinus Torvalds struct iovec *iov = iovstack; 19151da177e4SLinus Torvalds struct msghdr msg_sys; 19161da177e4SLinus Torvalds unsigned long cmsg_ptr; 19171da177e4SLinus Torvalds int err, iov_size, total_len, len; 19186cb153caSBenjamin LaHaise int fput_needed; 19191da177e4SLinus Torvalds 19201da177e4SLinus Torvalds /* kernel mode address */ 1921230b1839SYOSHIFUJI Hideaki struct sockaddr_storage addr; 19221da177e4SLinus Torvalds 19231da177e4SLinus Torvalds /* user mode address pointers */ 19241da177e4SLinus Torvalds struct sockaddr __user *uaddr; 19251da177e4SLinus Torvalds int __user *uaddr_len; 19261da177e4SLinus Torvalds 19271da177e4SLinus Torvalds if (MSG_CMSG_COMPAT & flags) { 19281da177e4SLinus Torvalds if (get_compat_msghdr(&msg_sys, msg_compat)) 19291da177e4SLinus Torvalds return -EFAULT; 193089bddce5SStephen Hemminger } 193189bddce5SStephen Hemminger else if (copy_from_user(&msg_sys, msg, sizeof(struct msghdr))) 19321da177e4SLinus Torvalds return -EFAULT; 19331da177e4SLinus Torvalds 19346cb153caSBenjamin LaHaise sock = sockfd_lookup_light(fd, &err, &fput_needed); 19351da177e4SLinus Torvalds if (!sock) 19361da177e4SLinus Torvalds goto out; 19371da177e4SLinus Torvalds 19381da177e4SLinus Torvalds err = -EMSGSIZE; 19391da177e4SLinus Torvalds if (msg_sys.msg_iovlen > UIO_MAXIOV) 19401da177e4SLinus Torvalds goto out_put; 19411da177e4SLinus Torvalds 19421da177e4SLinus Torvalds /* Check whether to allocate the iovec area */ 19431da177e4SLinus Torvalds err = -ENOMEM; 19441da177e4SLinus Torvalds iov_size = msg_sys.msg_iovlen * sizeof(struct iovec); 19451da177e4SLinus Torvalds if (msg_sys.msg_iovlen > UIO_FASTIOV) { 19461da177e4SLinus Torvalds iov = sock_kmalloc(sock->sk, iov_size, GFP_KERNEL); 19471da177e4SLinus Torvalds if (!iov) 19481da177e4SLinus Torvalds goto out_put; 19491da177e4SLinus Torvalds } 19501da177e4SLinus Torvalds 19511da177e4SLinus Torvalds /* 19521da177e4SLinus Torvalds * Save the user-mode address (verify_iovec will change the 19531da177e4SLinus Torvalds * kernel msghdr to use the kernel address space) 19541da177e4SLinus Torvalds */ 19551da177e4SLinus Torvalds 1956cfcabdccSStephen Hemminger uaddr = (__force void __user *)msg_sys.msg_name; 19571da177e4SLinus Torvalds uaddr_len = COMPAT_NAMELEN(msg); 19581da177e4SLinus Torvalds if (MSG_CMSG_COMPAT & flags) { 1959230b1839SYOSHIFUJI Hideaki err = verify_compat_iovec(&msg_sys, iov, 1960230b1839SYOSHIFUJI Hideaki (struct sockaddr *)&addr, 1961230b1839SYOSHIFUJI Hideaki VERIFY_WRITE); 19621da177e4SLinus Torvalds } else 1963230b1839SYOSHIFUJI Hideaki err = verify_iovec(&msg_sys, iov, 1964230b1839SYOSHIFUJI Hideaki (struct sockaddr *)&addr, 1965230b1839SYOSHIFUJI Hideaki VERIFY_WRITE); 19661da177e4SLinus Torvalds if (err < 0) 19671da177e4SLinus Torvalds goto out_freeiov; 19681da177e4SLinus Torvalds total_len = err; 19691da177e4SLinus Torvalds 19701da177e4SLinus Torvalds cmsg_ptr = (unsigned long)msg_sys.msg_control; 19714a19542eSUlrich Drepper msg_sys.msg_flags = flags & (MSG_CMSG_CLOEXEC|MSG_CMSG_COMPAT); 19721da177e4SLinus Torvalds 19731da177e4SLinus Torvalds if (sock->file->f_flags & O_NONBLOCK) 19741da177e4SLinus Torvalds flags |= MSG_DONTWAIT; 19751da177e4SLinus Torvalds err = sock_recvmsg(sock, &msg_sys, total_len, flags); 19761da177e4SLinus Torvalds if (err < 0) 19771da177e4SLinus Torvalds goto out_freeiov; 19781da177e4SLinus Torvalds len = err; 19791da177e4SLinus Torvalds 19801da177e4SLinus Torvalds if (uaddr != NULL) { 1981230b1839SYOSHIFUJI Hideaki err = move_addr_to_user((struct sockaddr *)&addr, 1982230b1839SYOSHIFUJI Hideaki msg_sys.msg_namelen, uaddr, 198389bddce5SStephen Hemminger uaddr_len); 19841da177e4SLinus Torvalds if (err < 0) 19851da177e4SLinus Torvalds goto out_freeiov; 19861da177e4SLinus Torvalds } 198737f7f421SDavid S. Miller err = __put_user((msg_sys.msg_flags & ~MSG_CMSG_COMPAT), 198837f7f421SDavid S. Miller COMPAT_FLAGS(msg)); 19891da177e4SLinus Torvalds if (err) 19901da177e4SLinus Torvalds goto out_freeiov; 19911da177e4SLinus Torvalds if (MSG_CMSG_COMPAT & flags) 19921da177e4SLinus Torvalds err = __put_user((unsigned long)msg_sys.msg_control - cmsg_ptr, 19931da177e4SLinus Torvalds &msg_compat->msg_controllen); 19941da177e4SLinus Torvalds else 19951da177e4SLinus Torvalds err = __put_user((unsigned long)msg_sys.msg_control - cmsg_ptr, 19961da177e4SLinus Torvalds &msg->msg_controllen); 19971da177e4SLinus Torvalds if (err) 19981da177e4SLinus Torvalds goto out_freeiov; 19991da177e4SLinus Torvalds err = len; 20001da177e4SLinus Torvalds 20011da177e4SLinus Torvalds out_freeiov: 20021da177e4SLinus Torvalds if (iov != iovstack) 20031da177e4SLinus Torvalds sock_kfree_s(sock->sk, iov, iov_size); 20041da177e4SLinus Torvalds out_put: 20056cb153caSBenjamin LaHaise fput_light(sock->file, fput_needed); 20061da177e4SLinus Torvalds out: 20071da177e4SLinus Torvalds return err; 20081da177e4SLinus Torvalds } 20091da177e4SLinus Torvalds 20101da177e4SLinus Torvalds #ifdef __ARCH_WANT_SYS_SOCKETCALL 20111da177e4SLinus Torvalds 20121da177e4SLinus Torvalds /* Argument list sizes for sys_socketcall */ 20131da177e4SLinus Torvalds #define AL(x) ((x) * sizeof(unsigned long)) 201489bddce5SStephen Hemminger static const unsigned char nargs[18]={ 201589bddce5SStephen Hemminger AL(0),AL(3),AL(3),AL(3),AL(2),AL(3), 20161da177e4SLinus Torvalds AL(3),AL(3),AL(4),AL(4),AL(4),AL(6), 201789bddce5SStephen Hemminger AL(6),AL(2),AL(5),AL(5),AL(3),AL(3) 201889bddce5SStephen Hemminger }; 201989bddce5SStephen Hemminger 20201da177e4SLinus Torvalds #undef AL 20211da177e4SLinus Torvalds 20221da177e4SLinus Torvalds /* 20231da177e4SLinus Torvalds * System call vectors. 20241da177e4SLinus Torvalds * 20251da177e4SLinus Torvalds * Argument checking cleaned up. Saved 20% in size. 20261da177e4SLinus Torvalds * This function doesn't need to set the kernel lock because 20271da177e4SLinus Torvalds * it is set by the callees. 20281da177e4SLinus Torvalds */ 20291da177e4SLinus Torvalds 20301da177e4SLinus Torvalds asmlinkage long sys_socketcall(int call, unsigned long __user *args) 20311da177e4SLinus Torvalds { 20321da177e4SLinus Torvalds unsigned long a[6]; 20331da177e4SLinus Torvalds unsigned long a0, a1; 20341da177e4SLinus Torvalds int err; 20351da177e4SLinus Torvalds 20361da177e4SLinus Torvalds if (call < 1 || call > SYS_RECVMSG) 20371da177e4SLinus Torvalds return -EINVAL; 20381da177e4SLinus Torvalds 20391da177e4SLinus Torvalds /* copy_from_user should be SMP safe. */ 20401da177e4SLinus Torvalds if (copy_from_user(a, args, nargs[call])) 20411da177e4SLinus Torvalds return -EFAULT; 20421da177e4SLinus Torvalds 20434bcff1b3SDavid Woodhouse err = audit_socketcall(nargs[call] / sizeof(unsigned long), a); 20443ec3b2fbSDavid Woodhouse if (err) 20453ec3b2fbSDavid Woodhouse return err; 20463ec3b2fbSDavid Woodhouse 20471da177e4SLinus Torvalds a0 = a[0]; 20481da177e4SLinus Torvalds a1 = a[1]; 20491da177e4SLinus Torvalds 205089bddce5SStephen Hemminger switch (call) { 20511da177e4SLinus Torvalds case SYS_SOCKET: 20521da177e4SLinus Torvalds err = sys_socket(a0, a1, a[2]); 20531da177e4SLinus Torvalds break; 20541da177e4SLinus Torvalds case SYS_BIND: 20551da177e4SLinus Torvalds err = sys_bind(a0, (struct sockaddr __user *)a1, a[2]); 20561da177e4SLinus Torvalds break; 20571da177e4SLinus Torvalds case SYS_CONNECT: 20581da177e4SLinus Torvalds err = sys_connect(a0, (struct sockaddr __user *)a1, a[2]); 20591da177e4SLinus Torvalds break; 20601da177e4SLinus Torvalds case SYS_LISTEN: 20611da177e4SLinus Torvalds err = sys_listen(a0, a1); 20621da177e4SLinus Torvalds break; 20631da177e4SLinus Torvalds case SYS_ACCEPT: 206489bddce5SStephen Hemminger err = 206589bddce5SStephen Hemminger sys_accept(a0, (struct sockaddr __user *)a1, 206689bddce5SStephen Hemminger (int __user *)a[2]); 20671da177e4SLinus Torvalds break; 20681da177e4SLinus Torvalds case SYS_GETSOCKNAME: 206989bddce5SStephen Hemminger err = 207089bddce5SStephen Hemminger sys_getsockname(a0, (struct sockaddr __user *)a1, 207189bddce5SStephen Hemminger (int __user *)a[2]); 20721da177e4SLinus Torvalds break; 20731da177e4SLinus Torvalds case SYS_GETPEERNAME: 207489bddce5SStephen Hemminger err = 207589bddce5SStephen Hemminger sys_getpeername(a0, (struct sockaddr __user *)a1, 207689bddce5SStephen Hemminger (int __user *)a[2]); 20771da177e4SLinus Torvalds break; 20781da177e4SLinus Torvalds case SYS_SOCKETPAIR: 20791da177e4SLinus Torvalds err = sys_socketpair(a0, a1, a[2], (int __user *)a[3]); 20801da177e4SLinus Torvalds break; 20811da177e4SLinus Torvalds case SYS_SEND: 20821da177e4SLinus Torvalds err = sys_send(a0, (void __user *)a1, a[2], a[3]); 20831da177e4SLinus Torvalds break; 20841da177e4SLinus Torvalds case SYS_SENDTO: 20851da177e4SLinus Torvalds err = sys_sendto(a0, (void __user *)a1, a[2], a[3], 20861da177e4SLinus Torvalds (struct sockaddr __user *)a[4], a[5]); 20871da177e4SLinus Torvalds break; 20881da177e4SLinus Torvalds case SYS_RECV: 20891da177e4SLinus Torvalds err = sys_recv(a0, (void __user *)a1, a[2], a[3]); 20901da177e4SLinus Torvalds break; 20911da177e4SLinus Torvalds case SYS_RECVFROM: 20921da177e4SLinus Torvalds err = sys_recvfrom(a0, (void __user *)a1, a[2], a[3], 209389bddce5SStephen Hemminger (struct sockaddr __user *)a[4], 209489bddce5SStephen Hemminger (int __user *)a[5]); 20951da177e4SLinus Torvalds break; 20961da177e4SLinus Torvalds case SYS_SHUTDOWN: 20971da177e4SLinus Torvalds err = sys_shutdown(a0, a1); 20981da177e4SLinus Torvalds break; 20991da177e4SLinus Torvalds case SYS_SETSOCKOPT: 21001da177e4SLinus Torvalds err = sys_setsockopt(a0, a1, a[2], (char __user *)a[3], a[4]); 21011da177e4SLinus Torvalds break; 21021da177e4SLinus Torvalds case SYS_GETSOCKOPT: 210389bddce5SStephen Hemminger err = 210489bddce5SStephen Hemminger sys_getsockopt(a0, a1, a[2], (char __user *)a[3], 210589bddce5SStephen Hemminger (int __user *)a[4]); 21061da177e4SLinus Torvalds break; 21071da177e4SLinus Torvalds case SYS_SENDMSG: 21081da177e4SLinus Torvalds err = sys_sendmsg(a0, (struct msghdr __user *)a1, a[2]); 21091da177e4SLinus Torvalds break; 21101da177e4SLinus Torvalds case SYS_RECVMSG: 21111da177e4SLinus Torvalds err = sys_recvmsg(a0, (struct msghdr __user *)a1, a[2]); 21121da177e4SLinus Torvalds break; 21131da177e4SLinus Torvalds default: 21141da177e4SLinus Torvalds err = -EINVAL; 21151da177e4SLinus Torvalds break; 21161da177e4SLinus Torvalds } 21171da177e4SLinus Torvalds return err; 21181da177e4SLinus Torvalds } 21191da177e4SLinus Torvalds 21201da177e4SLinus Torvalds #endif /* __ARCH_WANT_SYS_SOCKETCALL */ 21211da177e4SLinus Torvalds 212255737fdaSStephen Hemminger /** 212355737fdaSStephen Hemminger * sock_register - add a socket protocol handler 212455737fdaSStephen Hemminger * @ops: description of protocol 212555737fdaSStephen Hemminger * 21261da177e4SLinus Torvalds * This function is called by a protocol handler that wants to 21271da177e4SLinus Torvalds * advertise its address family, and have it linked into the 212855737fdaSStephen Hemminger * socket interface. The value ops->family coresponds to the 212955737fdaSStephen Hemminger * socket system call protocol family. 21301da177e4SLinus Torvalds */ 2131f0fd27d4SStephen Hemminger int sock_register(const struct net_proto_family *ops) 21321da177e4SLinus Torvalds { 21331da177e4SLinus Torvalds int err; 21341da177e4SLinus Torvalds 21351da177e4SLinus Torvalds if (ops->family >= NPROTO) { 213689bddce5SStephen Hemminger printk(KERN_CRIT "protocol %d >= NPROTO(%d)\n", ops->family, 213789bddce5SStephen Hemminger NPROTO); 21381da177e4SLinus Torvalds return -ENOBUFS; 21391da177e4SLinus Torvalds } 214055737fdaSStephen Hemminger 214155737fdaSStephen Hemminger spin_lock(&net_family_lock); 214255737fdaSStephen Hemminger if (net_families[ops->family]) 21431da177e4SLinus Torvalds err = -EEXIST; 214455737fdaSStephen Hemminger else { 21451da177e4SLinus Torvalds net_families[ops->family] = ops; 21461da177e4SLinus Torvalds err = 0; 21471da177e4SLinus Torvalds } 214855737fdaSStephen Hemminger spin_unlock(&net_family_lock); 214955737fdaSStephen Hemminger 215089bddce5SStephen Hemminger printk(KERN_INFO "NET: Registered protocol family %d\n", ops->family); 21511da177e4SLinus Torvalds return err; 21521da177e4SLinus Torvalds } 21531da177e4SLinus Torvalds 215455737fdaSStephen Hemminger /** 215555737fdaSStephen Hemminger * sock_unregister - remove a protocol handler 215655737fdaSStephen Hemminger * @family: protocol family to remove 215755737fdaSStephen Hemminger * 21581da177e4SLinus Torvalds * This function is called by a protocol handler that wants to 21591da177e4SLinus Torvalds * remove its address family, and have it unlinked from the 216055737fdaSStephen Hemminger * new socket creation. 216155737fdaSStephen Hemminger * 216255737fdaSStephen Hemminger * If protocol handler is a module, then it can use module reference 216355737fdaSStephen Hemminger * counts to protect against new references. If protocol handler is not 216455737fdaSStephen Hemminger * a module then it needs to provide its own protection in 216555737fdaSStephen Hemminger * the ops->create routine. 21661da177e4SLinus Torvalds */ 2167f0fd27d4SStephen Hemminger void sock_unregister(int family) 21681da177e4SLinus Torvalds { 2169f0fd27d4SStephen Hemminger BUG_ON(family < 0 || family >= NPROTO); 21701da177e4SLinus Torvalds 217155737fdaSStephen Hemminger spin_lock(&net_family_lock); 21721da177e4SLinus Torvalds net_families[family] = NULL; 217355737fdaSStephen Hemminger spin_unlock(&net_family_lock); 217455737fdaSStephen Hemminger 217555737fdaSStephen Hemminger synchronize_rcu(); 217655737fdaSStephen Hemminger 217789bddce5SStephen Hemminger printk(KERN_INFO "NET: Unregistered protocol family %d\n", family); 21781da177e4SLinus Torvalds } 21791da177e4SLinus Torvalds 218077d76ea3SAndi Kleen static int __init sock_init(void) 21811da177e4SLinus Torvalds { 21821da177e4SLinus Torvalds /* 21831da177e4SLinus Torvalds * Initialize sock SLAB cache. 21841da177e4SLinus Torvalds */ 21851da177e4SLinus Torvalds 21861da177e4SLinus Torvalds sk_init(); 21871da177e4SLinus Torvalds 21881da177e4SLinus Torvalds /* 21891da177e4SLinus Torvalds * Initialize skbuff SLAB cache 21901da177e4SLinus Torvalds */ 21911da177e4SLinus Torvalds skb_init(); 21921da177e4SLinus Torvalds 21931da177e4SLinus Torvalds /* 21941da177e4SLinus Torvalds * Initialize the protocols module. 21951da177e4SLinus Torvalds */ 21961da177e4SLinus Torvalds 21971da177e4SLinus Torvalds init_inodecache(); 21981da177e4SLinus Torvalds register_filesystem(&sock_fs_type); 21991da177e4SLinus Torvalds sock_mnt = kern_mount(&sock_fs_type); 220077d76ea3SAndi Kleen 220177d76ea3SAndi Kleen /* The real protocol initialization is performed in later initcalls. 22021da177e4SLinus Torvalds */ 22031da177e4SLinus Torvalds 22041da177e4SLinus Torvalds #ifdef CONFIG_NETFILTER 22051da177e4SLinus Torvalds netfilter_init(); 22061da177e4SLinus Torvalds #endif 2207cbeb321aSDavid S. Miller 2208cbeb321aSDavid S. Miller return 0; 22091da177e4SLinus Torvalds } 22101da177e4SLinus Torvalds 221177d76ea3SAndi Kleen core_initcall(sock_init); /* early initcall */ 221277d76ea3SAndi Kleen 22131da177e4SLinus Torvalds #ifdef CONFIG_PROC_FS 22141da177e4SLinus Torvalds void socket_seq_show(struct seq_file *seq) 22151da177e4SLinus Torvalds { 22161da177e4SLinus Torvalds int cpu; 22171da177e4SLinus Torvalds int counter = 0; 22181da177e4SLinus Torvalds 22196f912042SKAMEZAWA Hiroyuki for_each_possible_cpu(cpu) 22201da177e4SLinus Torvalds counter += per_cpu(sockets_in_use, cpu); 22211da177e4SLinus Torvalds 22221da177e4SLinus Torvalds /* It can be negative, by the way. 8) */ 22231da177e4SLinus Torvalds if (counter < 0) 22241da177e4SLinus Torvalds counter = 0; 22251da177e4SLinus Torvalds 22261da177e4SLinus Torvalds seq_printf(seq, "sockets: used %d\n", counter); 22271da177e4SLinus Torvalds } 22281da177e4SLinus Torvalds #endif /* CONFIG_PROC_FS */ 22291da177e4SLinus Torvalds 223089bbfc95SShaun Pereira #ifdef CONFIG_COMPAT 223189bbfc95SShaun Pereira static long compat_sock_ioctl(struct file *file, unsigned cmd, 223289bbfc95SShaun Pereira unsigned long arg) 223389bbfc95SShaun Pereira { 223489bbfc95SShaun Pereira struct socket *sock = file->private_data; 223589bbfc95SShaun Pereira int ret = -ENOIOCTLCMD; 223687de87d5SDavid S. Miller struct sock *sk; 223787de87d5SDavid S. Miller struct net *net; 223887de87d5SDavid S. Miller 223987de87d5SDavid S. Miller sk = sock->sk; 224087de87d5SDavid S. Miller net = sock_net(sk); 224189bbfc95SShaun Pereira 224289bbfc95SShaun Pereira if (sock->ops->compat_ioctl) 224389bbfc95SShaun Pereira ret = sock->ops->compat_ioctl(sock, cmd, arg); 224489bbfc95SShaun Pereira 224587de87d5SDavid S. Miller if (ret == -ENOIOCTLCMD && 224687de87d5SDavid S. Miller (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST)) 224787de87d5SDavid S. Miller ret = compat_wext_handle_ioctl(net, cmd, arg); 224887de87d5SDavid S. Miller 224989bbfc95SShaun Pereira return ret; 225089bbfc95SShaun Pereira } 225189bbfc95SShaun Pereira #endif 225289bbfc95SShaun Pereira 2253ac5a488eSSridhar Samudrala int kernel_bind(struct socket *sock, struct sockaddr *addr, int addrlen) 2254ac5a488eSSridhar Samudrala { 2255ac5a488eSSridhar Samudrala return sock->ops->bind(sock, addr, addrlen); 2256ac5a488eSSridhar Samudrala } 2257ac5a488eSSridhar Samudrala 2258ac5a488eSSridhar Samudrala int kernel_listen(struct socket *sock, int backlog) 2259ac5a488eSSridhar Samudrala { 2260ac5a488eSSridhar Samudrala return sock->ops->listen(sock, backlog); 2261ac5a488eSSridhar Samudrala } 2262ac5a488eSSridhar Samudrala 2263ac5a488eSSridhar Samudrala int kernel_accept(struct socket *sock, struct socket **newsock, int flags) 2264ac5a488eSSridhar Samudrala { 2265ac5a488eSSridhar Samudrala struct sock *sk = sock->sk; 2266ac5a488eSSridhar Samudrala int err; 2267ac5a488eSSridhar Samudrala 2268ac5a488eSSridhar Samudrala err = sock_create_lite(sk->sk_family, sk->sk_type, sk->sk_protocol, 2269ac5a488eSSridhar Samudrala newsock); 2270ac5a488eSSridhar Samudrala if (err < 0) 2271ac5a488eSSridhar Samudrala goto done; 2272ac5a488eSSridhar Samudrala 2273ac5a488eSSridhar Samudrala err = sock->ops->accept(sock, *newsock, flags); 2274ac5a488eSSridhar Samudrala if (err < 0) { 2275ac5a488eSSridhar Samudrala sock_release(*newsock); 2276fa8705b0STony Battersby *newsock = NULL; 2277ac5a488eSSridhar Samudrala goto done; 2278ac5a488eSSridhar Samudrala } 2279ac5a488eSSridhar Samudrala 2280ac5a488eSSridhar Samudrala (*newsock)->ops = sock->ops; 2281ac5a488eSSridhar Samudrala 2282ac5a488eSSridhar Samudrala done: 2283ac5a488eSSridhar Samudrala return err; 2284ac5a488eSSridhar Samudrala } 2285ac5a488eSSridhar Samudrala 2286ac5a488eSSridhar Samudrala int kernel_connect(struct socket *sock, struct sockaddr *addr, int addrlen, 2287ac5a488eSSridhar Samudrala int flags) 2288ac5a488eSSridhar Samudrala { 2289ac5a488eSSridhar Samudrala return sock->ops->connect(sock, addr, addrlen, flags); 2290ac5a488eSSridhar Samudrala } 2291ac5a488eSSridhar Samudrala 2292ac5a488eSSridhar Samudrala int kernel_getsockname(struct socket *sock, struct sockaddr *addr, 2293ac5a488eSSridhar Samudrala int *addrlen) 2294ac5a488eSSridhar Samudrala { 2295ac5a488eSSridhar Samudrala return sock->ops->getname(sock, addr, addrlen, 0); 2296ac5a488eSSridhar Samudrala } 2297ac5a488eSSridhar Samudrala 2298ac5a488eSSridhar Samudrala int kernel_getpeername(struct socket *sock, struct sockaddr *addr, 2299ac5a488eSSridhar Samudrala int *addrlen) 2300ac5a488eSSridhar Samudrala { 2301ac5a488eSSridhar Samudrala return sock->ops->getname(sock, addr, addrlen, 1); 2302ac5a488eSSridhar Samudrala } 2303ac5a488eSSridhar Samudrala 2304ac5a488eSSridhar Samudrala int kernel_getsockopt(struct socket *sock, int level, int optname, 2305ac5a488eSSridhar Samudrala char *optval, int *optlen) 2306ac5a488eSSridhar Samudrala { 2307ac5a488eSSridhar Samudrala mm_segment_t oldfs = get_fs(); 2308ac5a488eSSridhar Samudrala int err; 2309ac5a488eSSridhar Samudrala 2310ac5a488eSSridhar Samudrala set_fs(KERNEL_DS); 2311ac5a488eSSridhar Samudrala if (level == SOL_SOCKET) 2312ac5a488eSSridhar Samudrala err = sock_getsockopt(sock, level, optname, optval, optlen); 2313ac5a488eSSridhar Samudrala else 2314ac5a488eSSridhar Samudrala err = sock->ops->getsockopt(sock, level, optname, optval, 2315ac5a488eSSridhar Samudrala optlen); 2316ac5a488eSSridhar Samudrala set_fs(oldfs); 2317ac5a488eSSridhar Samudrala return err; 2318ac5a488eSSridhar Samudrala } 2319ac5a488eSSridhar Samudrala 2320ac5a488eSSridhar Samudrala int kernel_setsockopt(struct socket *sock, int level, int optname, 2321ac5a488eSSridhar Samudrala char *optval, int optlen) 2322ac5a488eSSridhar Samudrala { 2323ac5a488eSSridhar Samudrala mm_segment_t oldfs = get_fs(); 2324ac5a488eSSridhar Samudrala int err; 2325ac5a488eSSridhar Samudrala 2326ac5a488eSSridhar Samudrala set_fs(KERNEL_DS); 2327ac5a488eSSridhar Samudrala if (level == SOL_SOCKET) 2328ac5a488eSSridhar Samudrala err = sock_setsockopt(sock, level, optname, optval, optlen); 2329ac5a488eSSridhar Samudrala else 2330ac5a488eSSridhar Samudrala err = sock->ops->setsockopt(sock, level, optname, optval, 2331ac5a488eSSridhar Samudrala optlen); 2332ac5a488eSSridhar Samudrala set_fs(oldfs); 2333ac5a488eSSridhar Samudrala return err; 2334ac5a488eSSridhar Samudrala } 2335ac5a488eSSridhar Samudrala 2336ac5a488eSSridhar Samudrala int kernel_sendpage(struct socket *sock, struct page *page, int offset, 2337ac5a488eSSridhar Samudrala size_t size, int flags) 2338ac5a488eSSridhar Samudrala { 2339ac5a488eSSridhar Samudrala if (sock->ops->sendpage) 2340ac5a488eSSridhar Samudrala return sock->ops->sendpage(sock, page, offset, size, flags); 2341ac5a488eSSridhar Samudrala 2342ac5a488eSSridhar Samudrala return sock_no_sendpage(sock, page, offset, size, flags); 2343ac5a488eSSridhar Samudrala } 2344ac5a488eSSridhar Samudrala 2345ac5a488eSSridhar Samudrala int kernel_sock_ioctl(struct socket *sock, int cmd, unsigned long arg) 2346ac5a488eSSridhar Samudrala { 2347ac5a488eSSridhar Samudrala mm_segment_t oldfs = get_fs(); 2348ac5a488eSSridhar Samudrala int err; 2349ac5a488eSSridhar Samudrala 2350ac5a488eSSridhar Samudrala set_fs(KERNEL_DS); 2351ac5a488eSSridhar Samudrala err = sock->ops->ioctl(sock, cmd, arg); 2352ac5a488eSSridhar Samudrala set_fs(oldfs); 2353ac5a488eSSridhar Samudrala 2354ac5a488eSSridhar Samudrala return err; 2355ac5a488eSSridhar Samudrala } 2356ac5a488eSSridhar Samudrala 235791cf45f0STrond Myklebust int kernel_sock_shutdown(struct socket *sock, enum sock_shutdown_cmd how) 235891cf45f0STrond Myklebust { 235991cf45f0STrond Myklebust return sock->ops->shutdown(sock, how); 236091cf45f0STrond Myklebust } 236191cf45f0STrond Myklebust 23621da177e4SLinus Torvalds EXPORT_SYMBOL(sock_create); 23631da177e4SLinus Torvalds EXPORT_SYMBOL(sock_create_kern); 23641da177e4SLinus Torvalds EXPORT_SYMBOL(sock_create_lite); 23651da177e4SLinus Torvalds EXPORT_SYMBOL(sock_map_fd); 23661da177e4SLinus Torvalds EXPORT_SYMBOL(sock_recvmsg); 23671da177e4SLinus Torvalds EXPORT_SYMBOL(sock_register); 23681da177e4SLinus Torvalds EXPORT_SYMBOL(sock_release); 23691da177e4SLinus Torvalds EXPORT_SYMBOL(sock_sendmsg); 23701da177e4SLinus Torvalds EXPORT_SYMBOL(sock_unregister); 23711da177e4SLinus Torvalds EXPORT_SYMBOL(sock_wake_async); 23721da177e4SLinus Torvalds EXPORT_SYMBOL(sockfd_lookup); 23731da177e4SLinus Torvalds EXPORT_SYMBOL(kernel_sendmsg); 23741da177e4SLinus Torvalds EXPORT_SYMBOL(kernel_recvmsg); 2375ac5a488eSSridhar Samudrala EXPORT_SYMBOL(kernel_bind); 2376ac5a488eSSridhar Samudrala EXPORT_SYMBOL(kernel_listen); 2377ac5a488eSSridhar Samudrala EXPORT_SYMBOL(kernel_accept); 2378ac5a488eSSridhar Samudrala EXPORT_SYMBOL(kernel_connect); 2379ac5a488eSSridhar Samudrala EXPORT_SYMBOL(kernel_getsockname); 2380ac5a488eSSridhar Samudrala EXPORT_SYMBOL(kernel_getpeername); 2381ac5a488eSSridhar Samudrala EXPORT_SYMBOL(kernel_getsockopt); 2382ac5a488eSSridhar Samudrala EXPORT_SYMBOL(kernel_setsockopt); 2383ac5a488eSSridhar Samudrala EXPORT_SYMBOL(kernel_sendpage); 2384ac5a488eSSridhar Samudrala EXPORT_SYMBOL(kernel_sock_ioctl); 238591cf45f0STrond Myklebust EXPORT_SYMBOL(kernel_sock_shutdown); 2386