socket.c 84.5 KB
Newer Older
Linus Torvalds's avatar
Linus Torvalds committed
1 2 3 4 5 6
/*
 * NET		An implementation of the SOCKET network access protocol.
 *
 * Version:	@(#)socket.c	1.1.93	18/02/95
 *
 * Authors:	Orest Zborowski, <obz@Kodak.COM>
7
 *		Ross Biro
Linus Torvalds's avatar
Linus Torvalds committed
8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44
 *		Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
 *
 * Fixes:
 *		Anonymous	:	NOTSOCK/BADF cleanup. Error fix in
 *					shutdown()
 *		Alan Cox	:	verify_area() fixes
 *		Alan Cox	:	Removed DDI
 *		Jonathan Kamens	:	SOCK_DGRAM reconnect bug
 *		Alan Cox	:	Moved a load of checks to the very
 *					top level.
 *		Alan Cox	:	Move address structures to/from user
 *					mode above the protocol layers.
 *		Rob Janssen	:	Allow 0 length sends.
 *		Alan Cox	:	Asynchronous I/O support (cribbed from the
 *					tty drivers).
 *		Niibe Yutaka	:	Asynchronous I/O for writes (4.4BSD style)
 *		Jeff Uphoff	:	Made max number of sockets command-line
 *					configurable.
 *		Matti Aarnio	:	Made the number of sockets dynamic,
 *					to be allocated when needed, and mr.
 *					Uphoff's max is used as max to be
 *					allowed to allocate.
 *		Linus		:	Argh. removed all the socket allocation
 *					altogether: it's in the inode now.
 *		Alan Cox	:	Made sock_alloc()/sock_release() public
 *					for NetROM and future kernel nfsd type
 *					stuff.
 *		Alan Cox	:	sendmsg/recvmsg basics.
 *		Tom Dyas	:	Export net symbols.
 *		Marcin Dalecki	:	Fixed problems with CONFIG_NET="n".
 *		Alan Cox	:	Added thread locking to sys_* calls
 *					for sockets. May have errors at the
 *					moment.
 *		Kevin Buhr	:	Fixed the dumb errors in the above.
 *		Andi Kleen	:	Some small cleanups, optimizations,
 *					and fixed a copy_from_user() bug.
 *		Tigran Aivazian	:	sys_send(args) calls sys_sendto(args, NULL, 0)
45
 *		Tigran Aivazian	:	Made listen(2) backlog sanity checks
Linus Torvalds's avatar
Linus Torvalds committed
46 47 48 49 50 51 52 53 54 55
 *					protocol-independent
 *
 *
 *		This program is free software; you can redistribute it and/or
 *		modify it under the terms of the GNU General Public License
 *		as published by the Free Software Foundation; either version
 *		2 of the License, or (at your option) any later version.
 *
 *
 *	This module is effectively the top level interface to the BSD socket
56
 *	paradigm.
Linus Torvalds's avatar
Linus Torvalds committed
57 58 59 60 61 62 63 64 65
 *
 *	Based upon Swansea University Computer Society NET3.039
 */

#include <linux/mm.h>
#include <linux/socket.h>
#include <linux/file.h>
#include <linux/net.h>
#include <linux/interrupt.h>
Ulrich Drepper's avatar
Ulrich Drepper committed
66
#include <linux/thread_info.h>
67
#include <linux/rcupdate.h>
Linus Torvalds's avatar
Linus Torvalds committed
68 69 70
#include <linux/netdevice.h>
#include <linux/proc_fs.h>
#include <linux/seq_file.h>
Arjan van de Ven's avatar
Arjan van de Ven committed
71
#include <linux/mutex.h>
Linus Torvalds's avatar
Linus Torvalds committed
72
#include <linux/if_bridge.h>
73 74
#include <linux/if_frad.h>
#include <linux/if_vlan.h>
75
#include <linux/ptp_classify.h>
Linus Torvalds's avatar
Linus Torvalds committed
76 77 78 79 80 81 82 83 84 85
#include <linux/init.h>
#include <linux/poll.h>
#include <linux/cache.h>
#include <linux/module.h>
#include <linux/highmem.h>
#include <linux/mount.h>
#include <linux/security.h>
#include <linux/syscalls.h>
#include <linux/compat.h>
#include <linux/kmod.h>
86
#include <linux/audit.h>
87
#include <linux/wireless.h>
88
#include <linux/nsproxy.h>
Nick Black's avatar
Nick Black committed
89
#include <linux/magic.h>
90
#include <linux/slab.h>
91
#include <linux/xattr.h>
Linus Torvalds's avatar
Linus Torvalds committed
92

93
#include <linux/uaccess.h>
Linus Torvalds's avatar
Linus Torvalds committed
94 95 96
#include <asm/unistd.h>

#include <net/compat.h>
97
#include <net/wext.h>
98
#include <net/cls_cgroup.h>
Linus Torvalds's avatar
Linus Torvalds committed
99 100 101 102

#include <net/sock.h>
#include <linux/netfilter.h>

103 104 105 106
#include <linux/if_tun.h>
#include <linux/ipv6_route.h>
#include <linux/route.h>
#include <linux/sockios.h>
107
#include <net/busy_poll.h>
108
#include <linux/errqueue.h>
109

110
#ifdef CONFIG_NET_RX_BUSY_POLL
111 112
unsigned int sysctl_net_busy_read __read_mostly;
unsigned int sysctl_net_busy_poll __read_mostly;
113
#endif
114

115 116
static ssize_t sock_read_iter(struct kiocb *iocb, struct iov_iter *to);
static ssize_t sock_write_iter(struct kiocb *iocb, struct iov_iter *from);
117
static int sock_mmap(struct file *file, struct vm_area_struct *vma);
Linus Torvalds's avatar
Linus Torvalds committed
118 119

static int sock_close(struct inode *inode, struct file *file);
120 121 122 123
static struct wait_queue_head *sock_get_poll_head(struct file *file,
		__poll_t events);
static __poll_t sock_poll_mask(struct file *file, __poll_t);
static __poll_t sock_poll(struct file *file, struct poll_table_struct *wait);
124
static long sock_ioctl(struct file *file, unsigned int cmd, unsigned long arg);
125 126
#ifdef CONFIG_COMPAT
static long compat_sock_ioctl(struct file *file,
127
			      unsigned int cmd, unsigned long arg);
128
#endif
Linus Torvalds's avatar
Linus Torvalds committed
129 130 131
static int sock_fasync(int fd, struct file *filp, int on);
static ssize_t sock_sendpage(struct file *file, struct page *page,
			     int offset, size_t size, loff_t *ppos, int more);
Jens Axboe's avatar
Jens Axboe committed
132
static ssize_t sock_splice_read(struct file *file, loff_t *ppos,
133
				struct pipe_inode_info *pipe, size_t len,
Jens Axboe's avatar
Jens Axboe committed
134
				unsigned int flags);
Linus Torvalds's avatar
Linus Torvalds committed
135 136 137 138 139 140

/*
 *	Socket files have a set of 'special' operations as well as the generic file ones. These don't appear
 *	in the operation structures but are done directly via the socketcall() multiplexor.
 */

141
static const struct file_operations socket_file_ops = {
Linus Torvalds's avatar
Linus Torvalds committed
142 143
	.owner =	THIS_MODULE,
	.llseek =	no_llseek,
144 145
	.read_iter =	sock_read_iter,
	.write_iter =	sock_write_iter,
146 147
	.get_poll_head = sock_get_poll_head,
	.poll_mask =	sock_poll_mask,
Linus Torvalds's avatar
Linus Torvalds committed
148 149
	.poll =		sock_poll,
	.unlocked_ioctl = sock_ioctl,
150 151 152
#ifdef CONFIG_COMPAT
	.compat_ioctl = compat_sock_ioctl,
#endif
Linus Torvalds's avatar
Linus Torvalds committed
153 154 155
	.mmap =		sock_mmap,
	.release =	sock_close,
	.fasync =	sock_fasync,
156 157
	.sendpage =	sock_sendpage,
	.splice_write = generic_splice_sendpage,
Jens Axboe's avatar
Jens Axboe committed
158
	.splice_read =	sock_splice_read,
Linus Torvalds's avatar
Linus Torvalds committed
159 160 161 162 163 164 165
};

/*
 *	The protocol list. Each protocol is registered in here.
 */

static DEFINE_SPINLOCK(net_family_lock);
166
static const struct net_proto_family __rcu *net_families[NPROTO] __read_mostly;
Linus Torvalds's avatar
Linus Torvalds committed
167 168

/*
169 170 171
 * Support routines.
 * Move socket addresses back and forth across the kernel/user
 * divide and look after the messy bits.
Linus Torvalds's avatar
Linus Torvalds committed
172 173 174 175 176 177 178 179 180 181 182 183 184
 */

/**
 *	move_addr_to_kernel	-	copy a socket address into kernel space
 *	@uaddr: Address in user space
 *	@kaddr: Address in kernel space
 *	@ulen: Length in user space
 *
 *	The address is copied into kernel space. If the provided address is
 *	too long an error code of -EINVAL is returned. If the copy gives
 *	invalid addresses -EFAULT is returned. On a success 0 is returned.
 */

185
int move_addr_to_kernel(void __user *uaddr, int ulen, struct sockaddr_storage *kaddr)
Linus Torvalds's avatar
Linus Torvalds committed
186
{
187
	if (ulen < 0 || ulen > sizeof(struct sockaddr_storage))
Linus Torvalds's avatar
Linus Torvalds committed
188
		return -EINVAL;
189
	if (ulen == 0)
Linus Torvalds's avatar
Linus Torvalds committed
190
		return 0;
191
	if (copy_from_user(kaddr, uaddr, ulen))
Linus Torvalds's avatar
Linus Torvalds committed
192
		return -EFAULT;
193
	return audit_sockaddr(ulen, kaddr);
Linus Torvalds's avatar
Linus Torvalds committed
194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211
}

/**
 *	move_addr_to_user	-	copy an address to user space
 *	@kaddr: kernel space address
 *	@klen: length of address in kernel
 *	@uaddr: user space address
 *	@ulen: pointer to user length field
 *
 *	The value pointed to by ulen on entry is the buffer length available.
 *	This is overwritten with the buffer space used. -EINVAL is returned
 *	if an overlong buffer is specified or a negative buffer size. -EFAULT
 *	is returned if either the buffer or the length field are not
 *	accessible.
 *	After copying the data up to the limit the user specifies, the true
 *	length of the data is written over the length limit the user
 *	specified. Zero is returned for a success.
 */
212

213
static int move_addr_to_user(struct sockaddr_storage *kaddr, int klen,
214
			     void __user *uaddr, int __user *ulen)
Linus Torvalds's avatar
Linus Torvalds committed
215 216 217 218
{
	int err;
	int len;

219
	BUG_ON(klen > sizeof(struct sockaddr_storage));
220 221
	err = get_user(len, ulen);
	if (err)
Linus Torvalds's avatar
Linus Torvalds committed
222
		return err;
223 224
	if (len > klen)
		len = klen;
225
	if (len < 0)
Linus Torvalds's avatar
Linus Torvalds committed
226
		return -EINVAL;
227
	if (len) {
Steve Grubb's avatar
Steve Grubb committed
228 229
		if (audit_sockaddr(klen, kaddr))
			return -ENOMEM;
230
		if (copy_to_user(uaddr, kaddr, len))
Linus Torvalds's avatar
Linus Torvalds committed
231 232 233
			return -EFAULT;
	}
	/*
234 235
	 *      "fromlen shall refer to the value before truncation.."
	 *                      1003.1g
Linus Torvalds's avatar
Linus Torvalds committed
236 237 238 239
	 */
	return __put_user(klen, ulen);
}

240
static struct kmem_cache *sock_inode_cachep __ro_after_init;
Linus Torvalds's avatar
Linus Torvalds committed
241 242 243 244

static struct inode *sock_alloc_inode(struct super_block *sb)
{
	struct socket_alloc *ei;
245
	struct socket_wq *wq;
246

247
	ei = kmem_cache_alloc(sock_inode_cachep, GFP_KERNEL);
Linus Torvalds's avatar
Linus Torvalds committed
248 249
	if (!ei)
		return NULL;
250 251
	wq = kmalloc(sizeof(*wq), GFP_KERNEL);
	if (!wq) {
252 253 254
		kmem_cache_free(sock_inode_cachep, ei);
		return NULL;
	}
255 256
	init_waitqueue_head(&wq->wait);
	wq->fasync_list = NULL;
257
	wq->flags = 0;
258
	RCU_INIT_POINTER(ei->socket.wq, wq);
259

Linus Torvalds's avatar
Linus Torvalds committed
260 261 262 263 264 265 266 267 268 269 270
	ei->socket.state = SS_UNCONNECTED;
	ei->socket.flags = 0;
	ei->socket.ops = NULL;
	ei->socket.sk = NULL;
	ei->socket.file = NULL;

	return &ei->vfs_inode;
}

static void sock_destroy_inode(struct inode *inode)
{
271
	struct socket_alloc *ei;
272
	struct socket_wq *wq;
273 274

	ei = container_of(inode, struct socket_alloc, vfs_inode);
275
	wq = rcu_dereference_protected(ei->socket.wq, 1);
276
	kfree_rcu(wq, rcu);
277
	kmem_cache_free(sock_inode_cachep, ei);
Linus Torvalds's avatar
Linus Torvalds committed
278 279
}

280
static void init_once(void *foo)
Linus Torvalds's avatar
Linus Torvalds committed
281
{
282
	struct socket_alloc *ei = (struct socket_alloc *)foo;
Linus Torvalds's avatar
Linus Torvalds committed
283

284
	inode_init_once(&ei->vfs_inode);
Linus Torvalds's avatar
Linus Torvalds committed
285
}
286

287
static void init_inodecache(void)
Linus Torvalds's avatar
Linus Torvalds committed
288 289
{
	sock_inode_cachep = kmem_cache_create("sock_inode_cache",
290 291 292 293
					      sizeof(struct socket_alloc),
					      0,
					      (SLAB_HWCACHE_ALIGN |
					       SLAB_RECLAIM_ACCOUNT |
294
					       SLAB_MEM_SPREAD | SLAB_ACCOUNT),
295
					      init_once);
296
	BUG_ON(sock_inode_cachep == NULL);
Linus Torvalds's avatar
Linus Torvalds committed
297 298
}

299
static const struct super_operations sockfs_ops = {
300 301 302
	.alloc_inode	= sock_alloc_inode,
	.destroy_inode	= sock_destroy_inode,
	.statfs		= simple_statfs,
Linus Torvalds's avatar
Linus Torvalds committed
303 304
};

305 306 307 308 309 310
/*
 * sockfs_dname() is called from d_path().
 */
static char *sockfs_dname(struct dentry *dentry, char *buffer, int buflen)
{
	return dynamic_dname(dentry, buffer, buflen, "socket:[%lu]",
311
				d_inode(dentry)->i_ino);
312 313
}

Al Viro's avatar
Al Viro committed
314
static const struct dentry_operations sockfs_dentry_operations = {
315
	.d_dname  = sockfs_dname,
Linus Torvalds's avatar
Linus Torvalds committed
316 317
};

318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338
static int sockfs_xattr_get(const struct xattr_handler *handler,
			    struct dentry *dentry, struct inode *inode,
			    const char *suffix, void *value, size_t size)
{
	if (value) {
		if (dentry->d_name.len + 1 > size)
			return -ERANGE;
		memcpy(value, dentry->d_name.name, dentry->d_name.len + 1);
	}
	return dentry->d_name.len + 1;
}

#define XATTR_SOCKPROTONAME_SUFFIX "sockprotoname"
#define XATTR_NAME_SOCKPROTONAME (XATTR_SYSTEM_PREFIX XATTR_SOCKPROTONAME_SUFFIX)
#define XATTR_NAME_SOCKPROTONAME_LEN (sizeof(XATTR_NAME_SOCKPROTONAME)-1)

static const struct xattr_handler sockfs_xattr_handler = {
	.name = XATTR_NAME_SOCKPROTONAME,
	.get = sockfs_xattr_get,
};

339 340 341 342 343 344 345 346 347 348 349 350 351 352
static int sockfs_security_xattr_set(const struct xattr_handler *handler,
				     struct dentry *dentry, struct inode *inode,
				     const char *suffix, const void *value,
				     size_t size, int flags)
{
	/* Handled by LSM. */
	return -EAGAIN;
}

static const struct xattr_handler sockfs_security_xattr_handler = {
	.prefix = XATTR_SECURITY_PREFIX,
	.set = sockfs_security_xattr_set,
};

353 354
static const struct xattr_handler *sockfs_xattr_handlers[] = {
	&sockfs_xattr_handler,
355
	&sockfs_security_xattr_handler,
356 357 358
	NULL
};

359 360 361
static struct dentry *sockfs_mount(struct file_system_type *fs_type,
			 int flags, const char *dev_name, void *data)
{
362 363 364
	return mount_pseudo_xattr(fs_type, "socket:", &sockfs_ops,
				  sockfs_xattr_handlers,
				  &sockfs_dentry_operations, SOCKFS_MAGIC);
365 366 367 368 369 370 371 372 373 374
}

static struct vfsmount *sock_mnt __read_mostly;

static struct file_system_type sock_fs_type = {
	.name =		"sockfs",
	.mount =	sockfs_mount,
	.kill_sb =	kill_anon_super,
};

Linus Torvalds's avatar
Linus Torvalds committed
375 376 377
/*
 *	Obtains the first available file descriptor and sets it up for use.
 *
378 379
 *	These functions create file structures and maps them to fd space
 *	of the current process. On success it returns file descriptor
Linus Torvalds's avatar
Linus Torvalds committed
380 381 382 383 384 385 386 387 388 389 390 391
 *	and file struct implicitly stored in sock->file.
 *	Note that another thread may close file descriptor before we return
 *	from this function. We use the fact that now we do not refer
 *	to socket after mapping. If one day we will need it, this
 *	function will increment ref. count on file by 1.
 *
 *	In any case returned fd MAY BE not valid!
 *	This race condition is unavoidable
 *	with shared fd spaces, we cannot solve it inside kernel,
 *	but we take care of internal coherence yet.
 */

392
struct file *sock_alloc_file(struct socket *sock, int flags, const char *dname)
Linus Torvalds's avatar
Linus Torvalds committed
393
{
394
	struct qstr name = { .name = "" };
395
	struct path path;
396
	struct file *file;
Linus Torvalds's avatar
Linus Torvalds committed
397

398 399 400 401 402 403 404
	if (dname) {
		name.name = dname;
		name.len = strlen(name.name);
	} else if (sock->sk) {
		name.name = sock->sk->sk_prot_creator->name;
		name.len = strlen(name.name);
	}
405
	path.dentry = d_alloc_pseudo(sock_mnt->mnt_sb, &name);
406 407
	if (unlikely(!path.dentry)) {
		sock_release(sock);
408
		return ERR_PTR(-ENOMEM);
409
	}
410
	path.mnt = mntget(sock_mnt);
411

412
	d_instantiate(path.dentry, SOCK_INODE(sock));
413

414
	file = alloc_file(&path, FMODE_READ | FMODE_WRITE,
415
		  &socket_file_ops);
416
	if (IS_ERR(file)) {
417
		/* drop dentry, keep inode for a bit */
418
		ihold(d_inode(path.dentry));
419
		path_put(&path);
420 421
		/* ... and now kill it properly */
		sock_release(sock);
422
		return file;
423 424 425
	}

	sock->file = file;
426
	file->f_flags = O_RDWR | (flags & O_NONBLOCK);
427
	file->private_data = sock;
428
	return file;
429
}
430
EXPORT_SYMBOL(sock_alloc_file);
431

432
static int sock_map_fd(struct socket *sock, int flags)
433 434
{
	struct file *newfile;
435
	int fd = get_unused_fd_flags(flags);
436 437
	if (unlikely(fd < 0)) {
		sock_release(sock);
438
		return fd;
439
	}
440

441
	newfile = sock_alloc_file(sock, flags, NULL);
442
	if (likely(!IS_ERR(newfile))) {
443
		fd_install(fd, newfile);
444 445
		return fd;
	}
446

447 448
	put_unused_fd(fd);
	return PTR_ERR(newfile);
Linus Torvalds's avatar
Linus Torvalds committed
449 450
}

451
struct socket *sock_from_file(struct file *file, int *err)
452 453 454 455
{
	if (file->f_op == &socket_file_ops)
		return file->private_data;	/* set in sock_map_fd */

456 457
	*err = -ENOTSOCK;
	return NULL;
458
}
459
EXPORT_SYMBOL(sock_from_file);
460

Linus Torvalds's avatar
Linus Torvalds committed
461
/**
462
 *	sockfd_lookup - Go from a file number to its socket slot
Linus Torvalds's avatar
Linus Torvalds committed
463 464 465 466
 *	@fd: file handle
 *	@err: pointer to an error code return
 *
 *	The file handle passed in is locked and the socket it is bound
467
 *	to is returned. If an error occurs the err pointer is overwritten
Linus Torvalds's avatar
Linus Torvalds committed
468 469 470 471 472 473 474 475 476 477 478
 *	with a negative errno code and NULL is returned. The function checks
 *	for both invalid handles and passing a handle which is not a socket.
 *
 *	On a success the socket object pointer is returned.
 */

struct socket *sockfd_lookup(int fd, int *err)
{
	struct file *file;
	struct socket *sock;

479 480
	file = fget(fd);
	if (!file) {
Linus Torvalds's avatar
Linus Torvalds committed
481 482 483
		*err = -EBADF;
		return NULL;
	}
484

485 486
	sock = sock_from_file(file, err);
	if (!sock)
Linus Torvalds's avatar
Linus Torvalds committed
487
		fput(file);
488 489
	return sock;
}
490
EXPORT_SYMBOL(sockfd_lookup);
Linus Torvalds's avatar
Linus Torvalds committed
491

492 493
static struct socket *sockfd_lookup_light(int fd, int *err, int *fput_needed)
{
494
	struct fd f = fdget(fd);
495 496
	struct socket *sock;

497
	*err = -EBADF;
498 499 500 501
	if (f.file) {
		sock = sock_from_file(f.file, err);
		if (likely(sock)) {
			*fput_needed = f.flags;
502
			return sock;
503 504
		}
		fdput(f);
Linus Torvalds's avatar
Linus Torvalds committed
505
	}
506
	return NULL;
Linus Torvalds's avatar
Linus Torvalds committed
507 508
}

509 510 511 512 513 514
static ssize_t sockfs_listxattr(struct dentry *dentry, char *buffer,
				size_t size)
{
	ssize_t len;
	ssize_t used = 0;

515
	len = security_inode_listsecurity(d_inode(dentry), buffer, size);
516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536
	if (len < 0)
		return len;
	used += len;
	if (buffer) {
		if (size < used)
			return -ERANGE;
		buffer += len;
	}

	len = (XATTR_NAME_SOCKPROTONAME_LEN + 1);
	used += len;
	if (buffer) {
		if (size < used)
			return -ERANGE;
		memcpy(buffer, XATTR_NAME_SOCKPROTONAME, len);
		buffer += len;
	}

	return used;
}

537
static int sockfs_setattr(struct dentry *dentry, struct iattr *iattr)
538 539 540
{
	int err = simple_setattr(dentry, iattr);

541
	if (!err && (iattr->ia_valid & ATTR_UID)) {
542 543
		struct socket *sock = SOCKET_I(d_inode(dentry));

544 545 546 547
		if (sock->sk)
			sock->sk->sk_uid = iattr->ia_uid;
		else
			err = -ENOENT;
548 549 550 551 552
	}

	return err;
}

553 554
static const struct inode_operations sockfs_inode_ops = {
	.listxattr = sockfs_listxattr,
555
	.setattr = sockfs_setattr,
556 557
};

Linus Torvalds's avatar
Linus Torvalds committed
558 559
/**
 *	sock_alloc	-	allocate a socket
560
 *
Linus Torvalds's avatar
Linus Torvalds committed
561 562 563 564 565
 *	Allocate a new inode and socket object. The two are bound together
 *	and initialised. The socket is then returned. If we are out of inodes
 *	NULL is returned.
 */

566
struct socket *sock_alloc(void)
Linus Torvalds's avatar
Linus Torvalds committed
567
{
568 569
	struct inode *inode;
	struct socket *sock;
Linus Torvalds's avatar
Linus Torvalds committed
570

571
	inode = new_inode_pseudo(sock_mnt->mnt_sb);
Linus Torvalds's avatar
Linus Torvalds committed
572 573 574 575 576
	if (!inode)
		return NULL;

	sock = SOCKET_I(inode);

577
	inode->i_ino = get_next_ino();
578
	inode->i_mode = S_IFSOCK | S_IRWXUGO;
579 580
	inode->i_uid = current_fsuid();
	inode->i_gid = current_fsgid();
581
	inode->i_op = &sockfs_inode_ops;
Linus Torvalds's avatar
Linus Torvalds committed
582 583 584

	return sock;
}
585
EXPORT_SYMBOL(sock_alloc);
Linus Torvalds's avatar
Linus Torvalds committed
586 587 588 589 590 591 592

/**
 *	sock_release	-	close a socket
 *	@sock: socket to close
 *
 *	The socket is released from the protocol stack if it has a release
 *	callback, and the inode is then released if the socket is bound to
593
 *	an inode not a file.
Linus Torvalds's avatar
Linus Torvalds committed
594
 */
595

596
static void __sock_release(struct socket *sock, struct inode *inode)
Linus Torvalds's avatar
Linus Torvalds committed
597 598 599 600
{
	if (sock->ops) {
		struct module *owner = sock->ops->owner;

601 602
		if (inode)
			inode_lock(inode);
Linus Torvalds's avatar
Linus Torvalds committed
603
		sock->ops->release(sock);
604 605
		if (inode)
			inode_unlock(inode);
Linus Torvalds's avatar
Linus Torvalds committed
606 607 608 609
		sock->ops = NULL;
		module_put(owner);
	}

610
	if (rcu_dereference_protected(sock->wq, 1)->fasync_list)
611
		pr_err("%s: fasync list not empty!\n", __func__);
Linus Torvalds's avatar
Linus Torvalds committed
612 613 614 615 616

	if (!sock->file) {
		iput(SOCK_INODE(sock));
		return;
	}
617
	sock->file = NULL;
Linus Torvalds's avatar
Linus Torvalds committed
618
}
619 620 621 622 623

void sock_release(struct socket *sock)
{
	__sock_release(sock, NULL);
}
624
EXPORT_SYMBOL(sock_release);
Linus Torvalds's avatar
Linus Torvalds committed
625

626
void __sock_tx_timestamp(__u16 tsflags, __u8 *tx_flags)
627
{
628 629
	u8 flags = *tx_flags;

630
	if (tsflags & SOF_TIMESTAMPING_TX_HARDWARE)
631 632
		flags |= SKBTX_HW_TSTAMP;

633
	if (tsflags & SOF_TIMESTAMPING_TX_SOFTWARE)
634 635
		flags |= SKBTX_SW_TSTAMP;

636
	if (tsflags & SOF_TIMESTAMPING_TX_SCHED)
637 638 639
		flags |= SKBTX_SCHED_TSTAMP;

	*tx_flags = flags;
640
}
641
EXPORT_SYMBOL(__sock_tx_timestamp);
642

643
static inline int sock_sendmsg_nosec(struct socket *sock, struct msghdr *msg)
Linus Torvalds's avatar
Linus Torvalds committed
644
{
Al Viro's avatar
Al Viro committed
645
	int ret = sock->ops->sendmsg(sock, msg, msg_data_left(msg));
646 647
	BUG_ON(ret == -EIOCBQUEUED);
	return ret;
Linus Torvalds's avatar
Linus Torvalds committed
648 649
}

650
int sock_sendmsg(struct socket *sock, struct msghdr *msg)
651
{
652
	int err = security_socket_sendmsg(sock, msg,
Al Viro's avatar
Al Viro committed
653
					  msg_data_left(msg));
654

655
	return err ?: sock_sendmsg_nosec(sock, msg);
656
}
657
EXPORT_SYMBOL(sock_sendmsg);
Linus Torvalds's avatar
Linus Torvalds committed
658 659 660 661

int kernel_sendmsg(struct socket *sock, struct msghdr *msg,
		   struct kvec *vec, size_t num, size_t size)
{
662
	iov_iter_kvec(&msg->msg_iter, WRITE | ITER_KVEC, vec, num, size);
663
	return sock_sendmsg(sock, msg);
Linus Torvalds's avatar
Linus Torvalds committed
664
}
665
EXPORT_SYMBOL(kernel_sendmsg);
Linus Torvalds's avatar
Linus Torvalds committed
666

667 668 669 670 671 672
int kernel_sendmsg_locked(struct sock *sk, struct msghdr *msg,
			  struct kvec *vec, size_t num, size_t size)
{
	struct socket *sock = sk->sk_socket;

	if (!sock->ops->sendmsg_locked)
673
		return sock_no_sendmsg_locked(sk, msg, size);
674 675 676 677 678 679 680

	iov_iter_kvec(&msg->msg_iter, WRITE | ITER_KVEC, vec, num, size);

	return sock->ops->sendmsg_locked(sk, msg, msg_data_left(msg));
}
EXPORT_SYMBOL(kernel_sendmsg_locked);

681 682 683 684 685 686 687 688 689 690
static bool skb_is_err_queue(const struct sk_buff *skb)
{
	/* pkt_type of skbs enqueued on the error queue are set to
	 * PACKET_OUTGOING in skb_set_err_queue(). This is only safe to do
	 * in recvmsg, since skbs received on a local socket will never
	 * have a pkt_type of PACKET_OUTGOING.
	 */
	return skb->pkt_type == PACKET_OUTGOING;
}

691 692 693 694 695 696 697 698 699 700 701 702 703
/* On transmit, software and hardware timestamps are returned independently.
 * As the two skb clones share the hardware timestamp, which may be updated
 * before the software timestamp is received, a hardware TX timestamp may be
 * returned only if there is no software TX timestamp. Ignore false software
 * timestamps, which may be made in the __sock_recv_timestamp() call when the
 * option SO_TIMESTAMP(NS) is enabled on the socket, even when the skb has a
 * hardware timestamp.
 */
static bool skb_is_swtx_tstamp(const struct sk_buff *skb, int false_tstamp)
{
	return skb->tstamp && !false_tstamp && skb_is_err_queue(skb);
}

704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724
static void put_ts_pktinfo(struct msghdr *msg, struct sk_buff *skb)
{
	struct scm_ts_pktinfo ts_pktinfo;
	struct net_device *orig_dev;

	if (!skb_mac_header_was_set(skb))
		return;

	memset(&ts_pktinfo, 0, sizeof(ts_pktinfo));

	rcu_read_lock();
	orig_dev = dev_get_by_napi_id(skb_napi_id(skb));
	if (orig_dev)
		ts_pktinfo.if_index = orig_dev->ifindex;
	rcu_read_unlock();

	ts_pktinfo.pkt_length = skb->len - skb_mac_offset(skb);
	put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMPING_PKTINFO,
		 sizeof(ts_pktinfo), &ts_pktinfo);
}

725 726 727 728 729 730
/*
 * called from sock_recv_timestamp() if sock_flag(sk, SOCK_RCVTSTAMP)
 */
void __sock_recv_timestamp(struct msghdr *msg, struct sock *sk,
	struct sk_buff *skb)
{
731
	int need_software_tstamp = sock_flag(sk, SOCK_RCVTSTAMP);
732
	struct scm_timestamping tss;
733
	int empty = 1, false_tstamp = 0;
734 735 736 737 738
	struct skb_shared_hwtstamps *shhwtstamps =
		skb_hwtstamps(skb);

	/* Race occurred between timestamp enabling and packet
	   receiving.  Fill in the current time for now. */
739
	if (need_software_tstamp && skb->tstamp == 0) {
740
		__net_timestamp(skb);
741 742
		false_tstamp = 1;
	}
743 744 745 746 747 748 749 750

	if (need_software_tstamp) {
		if (!sock_flag(sk, SOCK_RCVTSTAMPNS)) {
			struct timeval tv;
			skb_get_timestamp(skb, &tv);
			put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMP,
				 sizeof(tv), &tv);
		} else {
751 752
			struct timespec ts;
			skb_get_timestampns(skb, &ts);
753
			put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMPNS,
754
				 sizeof(ts), &ts);
755 756 757
		}
	}

758
	memset(&tss, 0, sizeof(tss));
759
	if ((sk->sk_tsflags & SOF_TIMESTAMPING_SOFTWARE) &&
760
	    ktime_to_timespec_cond(skb->tstamp, tss.ts + 0))
761
		empty = 0;
762
	if (shhwtstamps &&
763
	    (sk->sk_tsflags & SOF_TIMESTAMPING_RAW_HARDWARE) &&
764
	    !skb_is_swtx_tstamp(skb, false_tstamp) &&
765
	    ktime_to_timespec_cond(shhwtstamps->hwtstamp, tss.ts + 2)) {
766
		empty = 0;
767 768 769 770
		if ((sk->sk_tsflags & SOF_TIMESTAMPING_OPT_PKTINFO) &&
		    !skb_is_err_queue(skb))
			put_ts_pktinfo(msg, skb);
	}
771
	if (!empty) {
772
		put_cmsg(msg, SOL_SOCKET,
773
			 SCM_TIMESTAMPING, sizeof(tss), &tss);
774

775
		if (skb_is_err_queue(skb) && skb->len &&
776
		    SKB_EXT_ERR(skb)->opt_stats)
777 778 779
			put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMPING_OPT_STATS,
				 skb->len, skb->data);
	}
780
}
781 782
EXPORT_SYMBOL_GPL(__sock_recv_timestamp);

783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798
void __sock_recv_wifi_status(struct msghdr *msg, struct sock *sk,
	struct sk_buff *skb)
{
	int ack;

	if (!sock_flag(sk, SOCK_WIFI_STATUS))
		return;
	if (!skb->wifi_acked_valid)
		return;

	ack = skb->wifi_acked;

	put_cmsg(msg, SOL_SOCKET, SCM_WIFI_STATUS, sizeof(ack), &ack);
}
EXPORT_SYMBOL_GPL(__sock_recv_wifi_status);

799 800
static inline void sock_recv_drops(struct msghdr *msg, struct sock *sk,
				   struct sk_buff *skb)
801
{
802
	if (sock_flag(sk, SOCK_RXQ_OVFL) && skb && SOCK_SKB_CB(skb)->dropcount)
803
		put_cmsg(msg, SOL_SOCKET, SO_RXQ_OVFL,
804
			sizeof(__u32), &SOCK_SKB_CB(skb)->dropcount);
805 806
}

807
void __sock_recv_ts_and_drops(struct msghdr *msg, struct sock *sk,
808 809 810 811 812
	struct sk_buff *skb)
{
	sock_recv_timestamp(msg, sk, skb);
	sock_recv_drops(msg, sk, skb);
}
813
EXPORT_SYMBOL_GPL(__sock_recv_ts_and_drops);
814

815
static inline int sock_recvmsg_nosec(struct socket *sock, struct msghdr *msg,
816
				     int flags)
Linus Torvalds's avatar
Linus Torvalds committed
817
{
818
	return sock->ops->recvmsg(sock, msg, msg_data_left(msg), flags);
Linus Torvalds's avatar
Linus Torvalds committed
819 820
}

821
int sock_recvmsg(struct socket *sock, struct msghdr *msg, int flags)
822
{
823
	int err = security_socket_recvmsg(sock, msg, msg_data_left(msg), flags);
824

825
	return err ?: sock_recvmsg_nosec(sock, msg, flags);
Linus Torvalds's avatar
Linus Torvalds committed
826
}
827
EXPORT_SYMBOL(sock_recvmsg);
Linus Torvalds's avatar
Linus Torvalds committed
828

829 830 831 832 833 834 835 836 837 838 839 840 841 842 843
/**
 * kernel_recvmsg - Receive a message from a socket (kernel space)
 * @sock:       The socket to receive the message from
 * @msg:        Received message
 * @vec:        Input s/g array for message data
 * @num:        Size of input s/g array
 * @size:       Number of bytes to read
 * @flags:      Message flags (MSG_DONTWAIT, etc...)
 *
 * On return the msg structure contains the scatter/gather array passed in the
 * vec argument. The array is modified so that it consists of the unfilled
 * portion of the original array.
 *
 * The returned value is the total number of bytes received, or an error.
 */
844 845
int kernel_recvmsg(struct socket *sock, struct msghdr *msg,
		   struct kvec *vec, size_t num, size_t size, int flags)
Linus Torvalds's avatar
Linus Torvalds committed
846 847 848 849
{
	mm_segment_t oldfs = get_fs();
	int result;

850
	iov_iter_kvec(&msg->msg_iter, READ | ITER_KVEC, vec, num, size);
Linus Torvalds's avatar
Linus Torvalds committed
851
	set_fs(KERNEL_DS);
852
	result = sock_recvmsg(sock, msg, flags);
Linus Torvalds's avatar
Linus Torvalds committed
853 854 855
	set_fs(oldfs);
	return result;
}
856
EXPORT_SYMBOL(kernel_recvmsg);
Linus Torvalds's avatar
Linus Torvalds committed
857

858 859
static ssize_t sock_sendpage(struct file *file, struct page *page,
			     int offset, size_t size, loff_t *ppos, int more)
Linus Torvalds's avatar
Linus Torvalds committed
860 861 862 863
{
	struct socket *sock;
	int flags;

864 865
	sock = file->private_data;

866 867 868
	flags = (file->f_flags & O_NONBLOCK) ? MSG_DONTWAIT : 0;
	/* more is a combination of MSG_MORE and MSG_SENDPAGE_NOTLAST */
	flags |= more;
869

870
	return kernel_sendpage(sock, page, offset, size, flags);
871
}
Linus Torvalds's avatar
Linus Torvalds committed
872

Jens Axboe's avatar
Jens Axboe committed
873
static ssize_t sock_splice_read(struct file *file, loff_t *ppos,
874
				struct pipe_inode_info *pipe, size_t len,
Jens Axboe's avatar
Jens Axboe committed
875 876 877 878
				unsigned int flags)
{
	struct socket *sock = file->private_data;

879 880 881
	if (unlikely(!sock->ops->splice_read))
		return -EINVAL;

Jens Axboe's avatar
Jens Axboe committed
882 883 884
	return sock->ops->splice_read(sock, ppos, pipe, len, flags);
}

885
static ssize_t sock_read_iter(struct kiocb *iocb, struct iov_iter *to)
886
{
887 888
	struct file *file = iocb->ki_filp;
	struct socket *sock = file->private_data;
889 890
	struct msghdr msg = {.msg_iter = *to,
			     .msg_iocb = iocb};
891
	ssize_t res;
892

893 894 895 896
	if (file->f_flags & O_NONBLOCK)
		msg.msg_flags = MSG_DONTWAIT;

	if (iocb->ki_pos != 0)
Linus Torvalds's avatar
Linus Torvalds committed
897
		return -ESPIPE;
898

Christoph Hellwig's avatar
Christoph Hellwig committed
899
	if (!iov_iter_count(to))	/* Match SYS5 behaviour */
Linus Torvalds's avatar
Linus Torvalds committed
900 901
		return 0;

902
	res = sock_recvmsg(sock, &msg, msg.msg_flags);
903 904
	*to = msg.msg_iter;
	return res;
Linus Torvalds's avatar
Linus Torvalds committed
905 906
}

907
static ssize_t sock_write_iter(struct kiocb *iocb, struct iov_iter *from)
908
{
909 910
	struct file *file = iocb->ki_filp;
	struct socket *sock = file->private_data;
911 912
	struct msghdr msg = {.msg_iter = *from,
			     .msg_iocb = iocb};
913
	ssize_t res;
Linus Torvalds's avatar
Linus Torvalds committed
914

915
	if (iocb->ki_pos != 0)
916
		return -ESPIPE;
917

918 919 920
	if (file->f_flags & O_NONBLOCK)
		msg.msg_flags = MSG_DONTWAIT;

921 922 923
	if (sock->type == SOCK_SEQPACKET)
		msg.msg_flags |= MSG_EOR;

924
	res = sock_sendmsg(sock, &msg);
925 926
	*from = msg.msg_iter;
	return res;
Linus Torvalds's avatar
Linus Torvalds committed
927 928 929 930 931 932 933
}

/*
 * Atomic setting of ioctl hooks to avoid race
 * with module unload.
 */

Arjan van de Ven's avatar
Arjan van de Ven committed
934
static DEFINE_MUTEX(br_ioctl_mutex);
935
static int (*br_ioctl_hook) (struct net *, unsigned int cmd, void __user *arg);
Linus Torvalds's avatar
Linus Torvalds committed
936

937
void brioctl_set(int (*hook) (struct net *, unsigned int, void __user *))
Linus Torvalds's avatar
Linus Torvalds committed
938
{
Arjan van de Ven's avatar
Arjan van de Ven committed
939
	mutex_lock(&br_ioctl_mutex);
Linus Torvalds's avatar
Linus Torvalds committed
940
	br_ioctl_hook = hook;
Arjan van de Ven's avatar
Arjan van de Ven committed
941
	mutex_unlock(&br_ioctl_mutex);
Linus Torvalds's avatar
Linus Torvalds committed
942 943 944
}
EXPORT_SYMBOL(brioctl_set);

Arjan van de Ven's avatar
Arjan van de Ven committed
945
static DEFINE_MUTEX(vlan_ioctl_mutex);
946
static int (*vlan_ioctl_hook) (struct net *, void __user *arg);
Linus Torvalds's avatar
Linus Torvalds committed
947

948
void vlan_ioctl_set(int (*hook) (struct net *, void __user *))
Linus Torvalds's avatar
Linus Torvalds committed
949
{
Arjan van de Ven's avatar
Arjan van de Ven committed
950
	mutex_lock(&vlan_ioctl_mutex);
Linus Torvalds's avatar
Linus Torvalds committed
951
	vlan_ioctl_hook = hook;
Arjan van de Ven's avatar
Arjan van de Ven committed
952
	mutex_unlock(&vlan_ioctl_mutex);
Linus Torvalds's avatar
Linus Torvalds committed
953 954 955
}
EXPORT_SYMBOL(vlan_ioctl_set);

Arjan van de Ven's avatar
Arjan van de Ven committed
956
static DEFINE_MUTEX(dlci_ioctl_mutex);
957
static int (*dlci_ioctl_hook) (unsigned int, void __user *);
Linus Torvalds's avatar
Linus Torvalds committed
958

959
void dlci_ioctl_set(int (*hook) (unsigned int, void __user *))
Linus Torvalds's avatar
Linus Torvalds committed
960
{
Arjan van de Ven's avatar
Arjan van de Ven committed
961
	mutex_lock(&dlci_ioctl_mutex);
Linus Torvalds's avatar
Linus Torvalds committed
962
	dlci_ioctl_hook = hook;
Arjan van de Ven's avatar
Arjan van de Ven committed
963
	mutex_unlock(&dlci_ioctl_mutex);
Linus Torvalds's avatar
Linus Torvalds committed
964 965 966
}
EXPORT_SYMBOL(dlci_ioctl_set);

967 968 969 970 971 972 973 974 975 976 977 978
static long sock_do_ioctl(struct net *net, struct socket *sock,
				 unsigned int cmd, unsigned long arg)
{
	int err;
	void __user *argp = (void __user *)arg;

	err = sock->ops->ioctl(sock, cmd, arg);

	/*
	 * If this ioctl is unknown try to hand it down
	 * to the NIC driver.
	 */
979 980
	if (err != -ENOIOCTLCMD)
		return err;
981

982 983 984 985 986 987 988 989 990
	if (cmd == SIOCGIFCONF) {
		struct ifconf ifc;
		if (copy_from_user(&ifc, argp, sizeof(struct ifconf)))
			return -EFAULT;
		rtnl_lock();
		err = dev_ifconf(net, &ifc, sizeof(struct ifreq));
		rtnl_unlock();
		if (!err && copy_to_user(argp, &ifc, sizeof(struct ifconf)))
			err = -EFAULT;
991 992 993 994 995 996 997 998 999
	} else {
		struct ifreq ifr;
		bool need_copyout;
		if (copy_from_user(&ifr, argp, sizeof(struct ifreq)))
			return -EFAULT;
		err = dev_ioctl(net, cmd, &ifr, &need_copyout);
		if (!err && need_copyout)
			if (copy_to_user(argp, &ifr, sizeof(struct ifreq)))
				return -EFAULT;
1000
	}
1001 1002 1003
	return err;
}

Linus Torvalds's avatar
Linus Torvalds committed
1004 1005 1006 1007 1008
/*
 *	With an ioctl, arg may well be a user mode pointer, but we don't know
 *	what to do with it - that's up to the protocol still.
 */

1009
struct ns_common *get_net_ns(struct ns_common *ns)
1010 1011 1012
{
	return &get_net(container_of(ns, struct net, ns))->ns;
}
1013
EXPORT_SYMBOL_GPL(get_net_ns);
1014

Linus Torvalds's avatar
Linus Torvalds committed
1015 1016 1017
static long sock_ioctl(struct file *file, unsigned cmd, unsigned long arg)
{
	struct socket *sock;
1018
	struct sock *sk;
Linus Torvalds's avatar
Linus Torvalds committed
1019 1020
	void __user *argp = (void __user *)arg;
	int pid, err;
1021
	struct net *net;
Linus Torvalds's avatar
Linus Torvalds committed
1022

1023
	sock = file->private_data;
1024
	sk = sock->sk;
1025
	net = sock_net(sk);
1026 1027 1028 1029 1030 1031 1032 1033 1034
	if (unlikely(cmd >= SIOCDEVPRIVATE && cmd <= (SIOCDEVPRIVATE + 15))) {
		struct ifreq ifr;
		bool need_copyout;
		if (copy_from_user(&ifr, argp, sizeof(struct ifreq)))
			return -EFAULT;
		err = dev_ioctl(net, cmd, &ifr, &need_copyout);
		if (!err && need_copyout)
			if (copy_to_user(argp, &ifr, sizeof(struct ifreq)))
				return -EFAULT;
Linus Torvalds's avatar
Linus Torvalds committed
1035
	} else
Johannes Berg's avatar
Johannes Berg committed
1036
#ifdef CONFIG_WEXT_CORE
Linus Torvalds's avatar
Linus Torvalds committed
1037
	if (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST) {
1038
		err = wext_handle_ioctl(net, cmd, argp);
Linus Torvalds's avatar
Linus Torvalds committed
1039
	} else
Johannes Berg's avatar
Johannes Berg committed
1040
#endif
1041
		switch (cmd) {
Linus Torvalds's avatar
Linus Torvalds committed
1042 1043 1044 1045 1046
		case FIOSETOWN:
		case SIOCSPGRP:
			err = -EFAULT;
			if (get_user(pid, (int __user *)argp))
				break;
1047
			err = f_setown(sock->file, pid, 1);
Linus Torvalds's avatar
Linus Torvalds committed
1048 1049 1050
			break;
		case FIOGETOWN:
		case SIOCGPGRP:
1051
			err = put_user(f_getown(sock->file),
1052
				       (int __user *)argp);
Linus Torvalds's avatar
Linus Torvalds committed
1053 1054 1055 1056 1057 1058 1059 1060 1061
			break;
		case SIOCGIFBR:
		case SIOCSIFBR:
		case SIOCBRADDBR:
		case SIOCBRDELBR:
			err = -ENOPKG;
			if (!br_ioctl_hook)
				request_module("bridge");

Arjan van de Ven's avatar
Arjan van de Ven committed
1062
			mutex_lock(&br_ioctl_mutex);
1063
			if (br_ioctl_hook)
1064
				err = br_ioctl_hook(net, cmd, argp);
Arjan van de Ven's avatar
Arjan van de Ven committed
1065
			mutex_unlock(&br_ioctl_mutex);
Linus Torvalds's avatar
Linus Torvalds committed
1066 1067 1068 1069 1070 1071 1072
			break;
		case SIOCGIFVLAN:
		case SIOCSIFVLAN:
			err = -ENOPKG;
			if (!vlan_ioctl_hook)
				request_module("8021q");

Arjan van de Ven's avatar
Arjan van de Ven committed
1073
			mutex_lock(&vlan_ioctl_mutex);
Linus Torvalds's avatar
Linus Torvalds committed
1074
			if (vlan_ioctl_hook)
1075
				err = vlan_ioctl_hook(net, argp);
Arjan van de Ven's avatar
Arjan van de Ven committed
1076
			mutex_unlock(&vlan_ioctl_mutex);
Linus Torvalds's avatar
Linus Torvalds committed
1077 1078 1079 1080 1081 1082 1083
			break;
		case SIOCADDDLCI:
		case SIOCDELDLCI:
			err = -ENOPKG;
			if (!dlci_ioctl_hook)
				request_module("dlci");

1084 1085
			mutex_lock(&dlci_ioctl_mutex);
			if (dlci_ioctl_hook)
Linus Torvalds's avatar
Linus Torvalds committed
1086
				err = dlci_ioctl_hook(cmd, argp);
1087
			mutex_unlock(&dlci_ioctl_mutex);
Linus Torvalds's avatar
Linus Torvalds committed
1088
			break;
1089 1090 1091 1092 1093 1094 1095
		case SIOCGSKNS:
			err = -EPERM;
			if (!ns_capable(net->user_ns, CAP_NET_ADMIN))
				break;

			err = open_related_ns(&net->ns, get_net_ns);
			break;
Linus Torvalds's avatar
Linus Torvalds committed
1096
		default:
1097
			err = sock_do_ioctl(net, sock, cmd, arg);
Linus Torvalds's avatar
Linus Torvalds committed
1098
			break;
1099
		}
Linus Torvalds's avatar
Linus Torvalds committed
1100 1101 1102 1103 1104 1105 1106
	return err;
}

int sock_create_lite(int family, int type, int protocol, struct socket **res)
{
	int err;
	struct socket *sock = NULL;
1107

Linus Torvalds's avatar
Linus Torvalds committed
1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118
	err = security_socket_create(family, type, protocol, 1);
	if (err)
		goto out;

	sock = sock_alloc();
	if (!sock) {
		err = -ENOMEM;
		goto out;
	}

	sock->type = type;
1119 1120 1121 1122
	err = security_socket_post_create(sock, family, type, protocol, 1);
	if (err)
		goto out_release;

Linus Torvalds's avatar
Linus Torvalds committed
1123 1124 1125
out:
	*res = sock;
	return err;
1126 1127 1128 1129
out_release:
	sock_release(sock);
	sock = NULL;
	goto out;
Linus Torvalds's avatar
Linus Torvalds committed
1130
}
1131
EXPORT_SYMBOL(sock_create_lite);
Linus Torvalds's avatar
Linus Torvalds committed
1132