xref: /kernel/linux/linux-6.6/net/socket.c (revision 62306a36)
162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later
262306a36Sopenharmony_ci/*
362306a36Sopenharmony_ci * NET		An implementation of the SOCKET network access protocol.
462306a36Sopenharmony_ci *
562306a36Sopenharmony_ci * Version:	@(#)socket.c	1.1.93	18/02/95
662306a36Sopenharmony_ci *
762306a36Sopenharmony_ci * Authors:	Orest Zborowski, <obz@Kodak.COM>
862306a36Sopenharmony_ci *		Ross Biro
962306a36Sopenharmony_ci *		Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
1062306a36Sopenharmony_ci *
1162306a36Sopenharmony_ci * Fixes:
1262306a36Sopenharmony_ci *		Anonymous	:	NOTSOCK/BADF cleanup. Error fix in
1362306a36Sopenharmony_ci *					shutdown()
1462306a36Sopenharmony_ci *		Alan Cox	:	verify_area() fixes
1562306a36Sopenharmony_ci *		Alan Cox	:	Removed DDI
1662306a36Sopenharmony_ci *		Jonathan Kamens	:	SOCK_DGRAM reconnect bug
1762306a36Sopenharmony_ci *		Alan Cox	:	Moved a load of checks to the very
1862306a36Sopenharmony_ci *					top level.
1962306a36Sopenharmony_ci *		Alan Cox	:	Move address structures to/from user
2062306a36Sopenharmony_ci *					mode above the protocol layers.
2162306a36Sopenharmony_ci *		Rob Janssen	:	Allow 0 length sends.
2262306a36Sopenharmony_ci *		Alan Cox	:	Asynchronous I/O support (cribbed from the
2362306a36Sopenharmony_ci *					tty drivers).
2462306a36Sopenharmony_ci *		Niibe Yutaka	:	Asynchronous I/O for writes (4.4BSD style)
2562306a36Sopenharmony_ci *		Jeff Uphoff	:	Made max number of sockets command-line
2662306a36Sopenharmony_ci *					configurable.
2762306a36Sopenharmony_ci *		Matti Aarnio	:	Made the number of sockets dynamic,
2862306a36Sopenharmony_ci *					to be allocated when needed, and mr.
2962306a36Sopenharmony_ci *					Uphoff's max is used as max to be
3062306a36Sopenharmony_ci *					allowed to allocate.
3162306a36Sopenharmony_ci *		Linus		:	Argh. removed all the socket allocation
3262306a36Sopenharmony_ci *					altogether: it's in the inode now.
3362306a36Sopenharmony_ci *		Alan Cox	:	Made sock_alloc()/sock_release() public
3462306a36Sopenharmony_ci *					for NetROM and future kernel nfsd type
3562306a36Sopenharmony_ci *					stuff.
3662306a36Sopenharmony_ci *		Alan Cox	:	sendmsg/recvmsg basics.
3762306a36Sopenharmony_ci *		Tom Dyas	:	Export net symbols.
3862306a36Sopenharmony_ci *		Marcin Dalecki	:	Fixed problems with CONFIG_NET="n".
3962306a36Sopenharmony_ci *		Alan Cox	:	Added thread locking to sys_* calls
4062306a36Sopenharmony_ci *					for sockets. May have errors at the
4162306a36Sopenharmony_ci *					moment.
4262306a36Sopenharmony_ci *		Kevin Buhr	:	Fixed the dumb errors in the above.
4362306a36Sopenharmony_ci *		Andi Kleen	:	Some small cleanups, optimizations,
4462306a36Sopenharmony_ci *					and fixed a copy_from_user() bug.
4562306a36Sopenharmony_ci *		Tigran Aivazian	:	sys_send(args) calls sys_sendto(args, NULL, 0)
4662306a36Sopenharmony_ci *		Tigran Aivazian	:	Made listen(2) backlog sanity checks
4762306a36Sopenharmony_ci *					protocol-independent
4862306a36Sopenharmony_ci *
4962306a36Sopenharmony_ci *	This module is effectively the top level interface to the BSD socket
5062306a36Sopenharmony_ci *	paradigm.
5162306a36Sopenharmony_ci *
5262306a36Sopenharmony_ci *	Based upon Swansea University Computer Society NET3.039
5362306a36Sopenharmony_ci */
5462306a36Sopenharmony_ci
5562306a36Sopenharmony_ci#include <linux/bpf-cgroup.h>
5662306a36Sopenharmony_ci#include <linux/ethtool.h>
5762306a36Sopenharmony_ci#include <linux/mm.h>
5862306a36Sopenharmony_ci#include <linux/socket.h>
5962306a36Sopenharmony_ci#include <linux/file.h>
6062306a36Sopenharmony_ci#include <linux/splice.h>
6162306a36Sopenharmony_ci#include <linux/net.h>
6262306a36Sopenharmony_ci#include <linux/interrupt.h>
6362306a36Sopenharmony_ci#include <linux/thread_info.h>
6462306a36Sopenharmony_ci#include <linux/rcupdate.h>
6562306a36Sopenharmony_ci#include <linux/netdevice.h>
6662306a36Sopenharmony_ci#include <linux/proc_fs.h>
6762306a36Sopenharmony_ci#include <linux/seq_file.h>
6862306a36Sopenharmony_ci#include <linux/mutex.h>
6962306a36Sopenharmony_ci#include <linux/if_bridge.h>
7062306a36Sopenharmony_ci#include <linux/if_vlan.h>
7162306a36Sopenharmony_ci#include <linux/ptp_classify.h>
7262306a36Sopenharmony_ci#include <linux/init.h>
7362306a36Sopenharmony_ci#include <linux/poll.h>
7462306a36Sopenharmony_ci#include <linux/cache.h>
7562306a36Sopenharmony_ci#include <linux/module.h>
7662306a36Sopenharmony_ci#include <linux/highmem.h>
7762306a36Sopenharmony_ci#include <linux/mount.h>
7862306a36Sopenharmony_ci#include <linux/pseudo_fs.h>
7962306a36Sopenharmony_ci#include <linux/security.h>
8062306a36Sopenharmony_ci#include <linux/syscalls.h>
8162306a36Sopenharmony_ci#include <linux/compat.h>
8262306a36Sopenharmony_ci#include <linux/kmod.h>
8362306a36Sopenharmony_ci#include <linux/audit.h>
8462306a36Sopenharmony_ci#include <linux/wireless.h>
8562306a36Sopenharmony_ci#include <linux/nsproxy.h>
8662306a36Sopenharmony_ci#include <linux/magic.h>
8762306a36Sopenharmony_ci#include <linux/slab.h>
8862306a36Sopenharmony_ci#include <linux/xattr.h>
8962306a36Sopenharmony_ci#include <linux/nospec.h>
9062306a36Sopenharmony_ci#include <linux/indirect_call_wrapper.h>
9162306a36Sopenharmony_ci#include <linux/io_uring.h>
9262306a36Sopenharmony_ci
9362306a36Sopenharmony_ci#include <linux/uaccess.h>
9462306a36Sopenharmony_ci#include <asm/unistd.h>
9562306a36Sopenharmony_ci
9662306a36Sopenharmony_ci#include <net/compat.h>
9762306a36Sopenharmony_ci#include <net/wext.h>
9862306a36Sopenharmony_ci#include <net/cls_cgroup.h>
9962306a36Sopenharmony_ci
10062306a36Sopenharmony_ci#include <net/sock.h>
10162306a36Sopenharmony_ci#include <linux/netfilter.h>
10262306a36Sopenharmony_ci
10362306a36Sopenharmony_ci#include <linux/if_tun.h>
10462306a36Sopenharmony_ci#include <linux/ipv6_route.h>
10562306a36Sopenharmony_ci#include <linux/route.h>
10662306a36Sopenharmony_ci#include <linux/termios.h>
10762306a36Sopenharmony_ci#include <linux/sockios.h>
10862306a36Sopenharmony_ci#include <net/busy_poll.h>
10962306a36Sopenharmony_ci#include <linux/errqueue.h>
11062306a36Sopenharmony_ci#include <linux/ptp_clock_kernel.h>
11162306a36Sopenharmony_ci#include <trace/events/sock.h>
11262306a36Sopenharmony_ci
11362306a36Sopenharmony_ci#ifdef CONFIG_NET_RX_BUSY_POLL
11462306a36Sopenharmony_ciunsigned int sysctl_net_busy_read __read_mostly;
11562306a36Sopenharmony_ciunsigned int sysctl_net_busy_poll __read_mostly;
11662306a36Sopenharmony_ci#endif
11762306a36Sopenharmony_ci
11862306a36Sopenharmony_cistatic ssize_t sock_read_iter(struct kiocb *iocb, struct iov_iter *to);
11962306a36Sopenharmony_cistatic ssize_t sock_write_iter(struct kiocb *iocb, struct iov_iter *from);
12062306a36Sopenharmony_cistatic int sock_mmap(struct file *file, struct vm_area_struct *vma);
12162306a36Sopenharmony_ci
12262306a36Sopenharmony_cistatic int sock_close(struct inode *inode, struct file *file);
12362306a36Sopenharmony_cistatic __poll_t sock_poll(struct file *file,
12462306a36Sopenharmony_ci			      struct poll_table_struct *wait);
12562306a36Sopenharmony_cistatic long sock_ioctl(struct file *file, unsigned int cmd, unsigned long arg);
12662306a36Sopenharmony_ci#ifdef CONFIG_COMPAT
12762306a36Sopenharmony_cistatic long compat_sock_ioctl(struct file *file,
12862306a36Sopenharmony_ci			      unsigned int cmd, unsigned long arg);
12962306a36Sopenharmony_ci#endif
13062306a36Sopenharmony_cistatic int sock_fasync(int fd, struct file *filp, int on);
13162306a36Sopenharmony_cistatic ssize_t sock_splice_read(struct file *file, loff_t *ppos,
13262306a36Sopenharmony_ci				struct pipe_inode_info *pipe, size_t len,
13362306a36Sopenharmony_ci				unsigned int flags);
13462306a36Sopenharmony_cistatic void sock_splice_eof(struct file *file);
13562306a36Sopenharmony_ci
13662306a36Sopenharmony_ci#ifdef CONFIG_PROC_FS
13762306a36Sopenharmony_cistatic void sock_show_fdinfo(struct seq_file *m, struct file *f)
13862306a36Sopenharmony_ci{
13962306a36Sopenharmony_ci	struct socket *sock = f->private_data;
14062306a36Sopenharmony_ci	const struct proto_ops *ops = READ_ONCE(sock->ops);
14162306a36Sopenharmony_ci
14262306a36Sopenharmony_ci	if (ops->show_fdinfo)
14362306a36Sopenharmony_ci		ops->show_fdinfo(m, sock);
14462306a36Sopenharmony_ci}
14562306a36Sopenharmony_ci#else
14662306a36Sopenharmony_ci#define sock_show_fdinfo NULL
14762306a36Sopenharmony_ci#endif
14862306a36Sopenharmony_ci
14962306a36Sopenharmony_ci/*
15062306a36Sopenharmony_ci *	Socket files have a set of 'special' operations as well as the generic file ones. These don't appear
15162306a36Sopenharmony_ci *	in the operation structures but are done directly via the socketcall() multiplexor.
15262306a36Sopenharmony_ci */
15362306a36Sopenharmony_ci
15462306a36Sopenharmony_cistatic const struct file_operations socket_file_ops = {
15562306a36Sopenharmony_ci	.owner =	THIS_MODULE,
15662306a36Sopenharmony_ci	.llseek =	no_llseek,
15762306a36Sopenharmony_ci	.read_iter =	sock_read_iter,
15862306a36Sopenharmony_ci	.write_iter =	sock_write_iter,
15962306a36Sopenharmony_ci	.poll =		sock_poll,
16062306a36Sopenharmony_ci	.unlocked_ioctl = sock_ioctl,
16162306a36Sopenharmony_ci#ifdef CONFIG_COMPAT
16262306a36Sopenharmony_ci	.compat_ioctl = compat_sock_ioctl,
16362306a36Sopenharmony_ci#endif
16462306a36Sopenharmony_ci	.uring_cmd =    io_uring_cmd_sock,
16562306a36Sopenharmony_ci	.mmap =		sock_mmap,
16662306a36Sopenharmony_ci	.release =	sock_close,
16762306a36Sopenharmony_ci	.fasync =	sock_fasync,
16862306a36Sopenharmony_ci	.splice_write = splice_to_socket,
16962306a36Sopenharmony_ci	.splice_read =	sock_splice_read,
17062306a36Sopenharmony_ci	.splice_eof =	sock_splice_eof,
17162306a36Sopenharmony_ci	.show_fdinfo =	sock_show_fdinfo,
17262306a36Sopenharmony_ci};
17362306a36Sopenharmony_ci
17462306a36Sopenharmony_cistatic const char * const pf_family_names[] = {
17562306a36Sopenharmony_ci	[PF_UNSPEC]	= "PF_UNSPEC",
17662306a36Sopenharmony_ci	[PF_UNIX]	= "PF_UNIX/PF_LOCAL",
17762306a36Sopenharmony_ci	[PF_INET]	= "PF_INET",
17862306a36Sopenharmony_ci	[PF_AX25]	= "PF_AX25",
17962306a36Sopenharmony_ci	[PF_IPX]	= "PF_IPX",
18062306a36Sopenharmony_ci	[PF_APPLETALK]	= "PF_APPLETALK",
18162306a36Sopenharmony_ci	[PF_NETROM]	= "PF_NETROM",
18262306a36Sopenharmony_ci	[PF_BRIDGE]	= "PF_BRIDGE",
18362306a36Sopenharmony_ci	[PF_ATMPVC]	= "PF_ATMPVC",
18462306a36Sopenharmony_ci	[PF_X25]	= "PF_X25",
18562306a36Sopenharmony_ci	[PF_INET6]	= "PF_INET6",
18662306a36Sopenharmony_ci	[PF_ROSE]	= "PF_ROSE",
18762306a36Sopenharmony_ci	[PF_DECnet]	= "PF_DECnet",
18862306a36Sopenharmony_ci	[PF_NETBEUI]	= "PF_NETBEUI",
18962306a36Sopenharmony_ci	[PF_SECURITY]	= "PF_SECURITY",
19062306a36Sopenharmony_ci	[PF_KEY]	= "PF_KEY",
19162306a36Sopenharmony_ci	[PF_NETLINK]	= "PF_NETLINK/PF_ROUTE",
19262306a36Sopenharmony_ci	[PF_PACKET]	= "PF_PACKET",
19362306a36Sopenharmony_ci	[PF_ASH]	= "PF_ASH",
19462306a36Sopenharmony_ci	[PF_ECONET]	= "PF_ECONET",
19562306a36Sopenharmony_ci	[PF_ATMSVC]	= "PF_ATMSVC",
19662306a36Sopenharmony_ci	[PF_RDS]	= "PF_RDS",
19762306a36Sopenharmony_ci	[PF_SNA]	= "PF_SNA",
19862306a36Sopenharmony_ci	[PF_IRDA]	= "PF_IRDA",
19962306a36Sopenharmony_ci	[PF_PPPOX]	= "PF_PPPOX",
20062306a36Sopenharmony_ci	[PF_WANPIPE]	= "PF_WANPIPE",
20162306a36Sopenharmony_ci	[PF_LLC]	= "PF_LLC",
20262306a36Sopenharmony_ci	[PF_IB]		= "PF_IB",
20362306a36Sopenharmony_ci	[PF_MPLS]	= "PF_MPLS",
20462306a36Sopenharmony_ci	[PF_CAN]	= "PF_CAN",
20562306a36Sopenharmony_ci	[PF_TIPC]	= "PF_TIPC",
20662306a36Sopenharmony_ci	[PF_BLUETOOTH]	= "PF_BLUETOOTH",
20762306a36Sopenharmony_ci	[PF_IUCV]	= "PF_IUCV",
20862306a36Sopenharmony_ci	[PF_RXRPC]	= "PF_RXRPC",
20962306a36Sopenharmony_ci	[PF_ISDN]	= "PF_ISDN",
21062306a36Sopenharmony_ci	[PF_PHONET]	= "PF_PHONET",
21162306a36Sopenharmony_ci	[PF_IEEE802154]	= "PF_IEEE802154",
21262306a36Sopenharmony_ci	[PF_CAIF]	= "PF_CAIF",
21362306a36Sopenharmony_ci	[PF_ALG]	= "PF_ALG",
21462306a36Sopenharmony_ci	[PF_NFC]	= "PF_NFC",
21562306a36Sopenharmony_ci	[PF_VSOCK]	= "PF_VSOCK",
21662306a36Sopenharmony_ci	[PF_KCM]	= "PF_KCM",
21762306a36Sopenharmony_ci	[PF_QIPCRTR]	= "PF_QIPCRTR",
21862306a36Sopenharmony_ci	[PF_SMC]	= "PF_SMC",
21962306a36Sopenharmony_ci	[PF_XDP]	= "PF_XDP",
22062306a36Sopenharmony_ci	[PF_MCTP]	= "PF_MCTP",
22162306a36Sopenharmony_ci};
22262306a36Sopenharmony_ci
22362306a36Sopenharmony_ci/*
22462306a36Sopenharmony_ci *	The protocol list. Each protocol is registered in here.
22562306a36Sopenharmony_ci */
22662306a36Sopenharmony_ci
22762306a36Sopenharmony_cistatic DEFINE_SPINLOCK(net_family_lock);
22862306a36Sopenharmony_cistatic const struct net_proto_family __rcu *net_families[NPROTO] __read_mostly;
22962306a36Sopenharmony_ci
23062306a36Sopenharmony_ci/*
23162306a36Sopenharmony_ci * Support routines.
23262306a36Sopenharmony_ci * Move socket addresses back and forth across the kernel/user
23362306a36Sopenharmony_ci * divide and look after the messy bits.
23462306a36Sopenharmony_ci */
23562306a36Sopenharmony_ci
23662306a36Sopenharmony_ci/**
23762306a36Sopenharmony_ci *	move_addr_to_kernel	-	copy a socket address into kernel space
23862306a36Sopenharmony_ci *	@uaddr: Address in user space
23962306a36Sopenharmony_ci *	@kaddr: Address in kernel space
24062306a36Sopenharmony_ci *	@ulen: Length in user space
24162306a36Sopenharmony_ci *
24262306a36Sopenharmony_ci *	The address is copied into kernel space. If the provided address is
24362306a36Sopenharmony_ci *	too long an error code of -EINVAL is returned. If the copy gives
24462306a36Sopenharmony_ci *	invalid addresses -EFAULT is returned. On a success 0 is returned.
24562306a36Sopenharmony_ci */
24662306a36Sopenharmony_ci
24762306a36Sopenharmony_ciint move_addr_to_kernel(void __user *uaddr, int ulen, struct sockaddr_storage *kaddr)
24862306a36Sopenharmony_ci{
24962306a36Sopenharmony_ci	if (ulen < 0 || ulen > sizeof(struct sockaddr_storage))
25062306a36Sopenharmony_ci		return -EINVAL;
25162306a36Sopenharmony_ci	if (ulen == 0)
25262306a36Sopenharmony_ci		return 0;
25362306a36Sopenharmony_ci	if (copy_from_user(kaddr, uaddr, ulen))
25462306a36Sopenharmony_ci		return -EFAULT;
25562306a36Sopenharmony_ci	return audit_sockaddr(ulen, kaddr);
25662306a36Sopenharmony_ci}
25762306a36Sopenharmony_ci
25862306a36Sopenharmony_ci/**
25962306a36Sopenharmony_ci *	move_addr_to_user	-	copy an address to user space
26062306a36Sopenharmony_ci *	@kaddr: kernel space address
26162306a36Sopenharmony_ci *	@klen: length of address in kernel
26262306a36Sopenharmony_ci *	@uaddr: user space address
26362306a36Sopenharmony_ci *	@ulen: pointer to user length field
26462306a36Sopenharmony_ci *
26562306a36Sopenharmony_ci *	The value pointed to by ulen on entry is the buffer length available.
26662306a36Sopenharmony_ci *	This is overwritten with the buffer space used. -EINVAL is returned
26762306a36Sopenharmony_ci *	if an overlong buffer is specified or a negative buffer size. -EFAULT
26862306a36Sopenharmony_ci *	is returned if either the buffer or the length field are not
26962306a36Sopenharmony_ci *	accessible.
27062306a36Sopenharmony_ci *	After copying the data up to the limit the user specifies, the true
27162306a36Sopenharmony_ci *	length of the data is written over the length limit the user
27262306a36Sopenharmony_ci *	specified. Zero is returned for a success.
27362306a36Sopenharmony_ci */
27462306a36Sopenharmony_ci
27562306a36Sopenharmony_cistatic int move_addr_to_user(struct sockaddr_storage *kaddr, int klen,
27662306a36Sopenharmony_ci			     void __user *uaddr, int __user *ulen)
27762306a36Sopenharmony_ci{
27862306a36Sopenharmony_ci	int err;
27962306a36Sopenharmony_ci	int len;
28062306a36Sopenharmony_ci
28162306a36Sopenharmony_ci	BUG_ON(klen > sizeof(struct sockaddr_storage));
28262306a36Sopenharmony_ci	err = get_user(len, ulen);
28362306a36Sopenharmony_ci	if (err)
28462306a36Sopenharmony_ci		return err;
28562306a36Sopenharmony_ci	if (len > klen)
28662306a36Sopenharmony_ci		len = klen;
28762306a36Sopenharmony_ci	if (len < 0)
28862306a36Sopenharmony_ci		return -EINVAL;
28962306a36Sopenharmony_ci	if (len) {
29062306a36Sopenharmony_ci		if (audit_sockaddr(klen, kaddr))
29162306a36Sopenharmony_ci			return -ENOMEM;
29262306a36Sopenharmony_ci		if (copy_to_user(uaddr, kaddr, len))
29362306a36Sopenharmony_ci			return -EFAULT;
29462306a36Sopenharmony_ci	}
29562306a36Sopenharmony_ci	/*
29662306a36Sopenharmony_ci	 *      "fromlen shall refer to the value before truncation.."
29762306a36Sopenharmony_ci	 *                      1003.1g
29862306a36Sopenharmony_ci	 */
29962306a36Sopenharmony_ci	return __put_user(klen, ulen);
30062306a36Sopenharmony_ci}
30162306a36Sopenharmony_ci
30262306a36Sopenharmony_cistatic struct kmem_cache *sock_inode_cachep __ro_after_init;
30362306a36Sopenharmony_ci
30462306a36Sopenharmony_cistatic struct inode *sock_alloc_inode(struct super_block *sb)
30562306a36Sopenharmony_ci{
30662306a36Sopenharmony_ci	struct socket_alloc *ei;
30762306a36Sopenharmony_ci
30862306a36Sopenharmony_ci	ei = alloc_inode_sb(sb, sock_inode_cachep, GFP_KERNEL);
30962306a36Sopenharmony_ci	if (!ei)
31062306a36Sopenharmony_ci		return NULL;
31162306a36Sopenharmony_ci	init_waitqueue_head(&ei->socket.wq.wait);
31262306a36Sopenharmony_ci	ei->socket.wq.fasync_list = NULL;
31362306a36Sopenharmony_ci	ei->socket.wq.flags = 0;
31462306a36Sopenharmony_ci
31562306a36Sopenharmony_ci	ei->socket.state = SS_UNCONNECTED;
31662306a36Sopenharmony_ci	ei->socket.flags = 0;
31762306a36Sopenharmony_ci	ei->socket.ops = NULL;
31862306a36Sopenharmony_ci	ei->socket.sk = NULL;
31962306a36Sopenharmony_ci	ei->socket.file = NULL;
32062306a36Sopenharmony_ci
32162306a36Sopenharmony_ci	return &ei->vfs_inode;
32262306a36Sopenharmony_ci}
32362306a36Sopenharmony_ci
32462306a36Sopenharmony_cistatic void sock_free_inode(struct inode *inode)
32562306a36Sopenharmony_ci{
32662306a36Sopenharmony_ci	struct socket_alloc *ei;
32762306a36Sopenharmony_ci
32862306a36Sopenharmony_ci	ei = container_of(inode, struct socket_alloc, vfs_inode);
32962306a36Sopenharmony_ci	kmem_cache_free(sock_inode_cachep, ei);
33062306a36Sopenharmony_ci}
33162306a36Sopenharmony_ci
33262306a36Sopenharmony_cistatic void init_once(void *foo)
33362306a36Sopenharmony_ci{
33462306a36Sopenharmony_ci	struct socket_alloc *ei = (struct socket_alloc *)foo;
33562306a36Sopenharmony_ci
33662306a36Sopenharmony_ci	inode_init_once(&ei->vfs_inode);
33762306a36Sopenharmony_ci}
33862306a36Sopenharmony_ci
33962306a36Sopenharmony_cistatic void init_inodecache(void)
34062306a36Sopenharmony_ci{
34162306a36Sopenharmony_ci	sock_inode_cachep = kmem_cache_create("sock_inode_cache",
34262306a36Sopenharmony_ci					      sizeof(struct socket_alloc),
34362306a36Sopenharmony_ci					      0,
34462306a36Sopenharmony_ci					      (SLAB_HWCACHE_ALIGN |
34562306a36Sopenharmony_ci					       SLAB_RECLAIM_ACCOUNT |
34662306a36Sopenharmony_ci					       SLAB_MEM_SPREAD | SLAB_ACCOUNT),
34762306a36Sopenharmony_ci					      init_once);
34862306a36Sopenharmony_ci	BUG_ON(sock_inode_cachep == NULL);
34962306a36Sopenharmony_ci}
35062306a36Sopenharmony_ci
35162306a36Sopenharmony_cistatic const struct super_operations sockfs_ops = {
35262306a36Sopenharmony_ci	.alloc_inode	= sock_alloc_inode,
35362306a36Sopenharmony_ci	.free_inode	= sock_free_inode,
35462306a36Sopenharmony_ci	.statfs		= simple_statfs,
35562306a36Sopenharmony_ci};
35662306a36Sopenharmony_ci
35762306a36Sopenharmony_ci/*
35862306a36Sopenharmony_ci * sockfs_dname() is called from d_path().
35962306a36Sopenharmony_ci */
36062306a36Sopenharmony_cistatic char *sockfs_dname(struct dentry *dentry, char *buffer, int buflen)
36162306a36Sopenharmony_ci{
36262306a36Sopenharmony_ci	return dynamic_dname(buffer, buflen, "socket:[%lu]",
36362306a36Sopenharmony_ci				d_inode(dentry)->i_ino);
36462306a36Sopenharmony_ci}
36562306a36Sopenharmony_ci
36662306a36Sopenharmony_cistatic const struct dentry_operations sockfs_dentry_operations = {
36762306a36Sopenharmony_ci	.d_dname  = sockfs_dname,
36862306a36Sopenharmony_ci};
36962306a36Sopenharmony_ci
37062306a36Sopenharmony_cistatic int sockfs_xattr_get(const struct xattr_handler *handler,
37162306a36Sopenharmony_ci			    struct dentry *dentry, struct inode *inode,
37262306a36Sopenharmony_ci			    const char *suffix, void *value, size_t size)
37362306a36Sopenharmony_ci{
37462306a36Sopenharmony_ci	if (value) {
37562306a36Sopenharmony_ci		if (dentry->d_name.len + 1 > size)
37662306a36Sopenharmony_ci			return -ERANGE;
37762306a36Sopenharmony_ci		memcpy(value, dentry->d_name.name, dentry->d_name.len + 1);
37862306a36Sopenharmony_ci	}
37962306a36Sopenharmony_ci	return dentry->d_name.len + 1;
38062306a36Sopenharmony_ci}
38162306a36Sopenharmony_ci
38262306a36Sopenharmony_ci#define XATTR_SOCKPROTONAME_SUFFIX "sockprotoname"
38362306a36Sopenharmony_ci#define XATTR_NAME_SOCKPROTONAME (XATTR_SYSTEM_PREFIX XATTR_SOCKPROTONAME_SUFFIX)
38462306a36Sopenharmony_ci#define XATTR_NAME_SOCKPROTONAME_LEN (sizeof(XATTR_NAME_SOCKPROTONAME)-1)
38562306a36Sopenharmony_ci
38662306a36Sopenharmony_cistatic const struct xattr_handler sockfs_xattr_handler = {
38762306a36Sopenharmony_ci	.name = XATTR_NAME_SOCKPROTONAME,
38862306a36Sopenharmony_ci	.get = sockfs_xattr_get,
38962306a36Sopenharmony_ci};
39062306a36Sopenharmony_ci
39162306a36Sopenharmony_cistatic int sockfs_security_xattr_set(const struct xattr_handler *handler,
39262306a36Sopenharmony_ci				     struct mnt_idmap *idmap,
39362306a36Sopenharmony_ci				     struct dentry *dentry, struct inode *inode,
39462306a36Sopenharmony_ci				     const char *suffix, const void *value,
39562306a36Sopenharmony_ci				     size_t size, int flags)
39662306a36Sopenharmony_ci{
39762306a36Sopenharmony_ci	/* Handled by LSM. */
39862306a36Sopenharmony_ci	return -EAGAIN;
39962306a36Sopenharmony_ci}
40062306a36Sopenharmony_ci
40162306a36Sopenharmony_cistatic const struct xattr_handler sockfs_security_xattr_handler = {
40262306a36Sopenharmony_ci	.prefix = XATTR_SECURITY_PREFIX,
40362306a36Sopenharmony_ci	.set = sockfs_security_xattr_set,
40462306a36Sopenharmony_ci};
40562306a36Sopenharmony_ci
40662306a36Sopenharmony_cistatic const struct xattr_handler *sockfs_xattr_handlers[] = {
40762306a36Sopenharmony_ci	&sockfs_xattr_handler,
40862306a36Sopenharmony_ci	&sockfs_security_xattr_handler,
40962306a36Sopenharmony_ci	NULL
41062306a36Sopenharmony_ci};
41162306a36Sopenharmony_ci
41262306a36Sopenharmony_cistatic int sockfs_init_fs_context(struct fs_context *fc)
41362306a36Sopenharmony_ci{
41462306a36Sopenharmony_ci	struct pseudo_fs_context *ctx = init_pseudo(fc, SOCKFS_MAGIC);
41562306a36Sopenharmony_ci	if (!ctx)
41662306a36Sopenharmony_ci		return -ENOMEM;
41762306a36Sopenharmony_ci	ctx->ops = &sockfs_ops;
41862306a36Sopenharmony_ci	ctx->dops = &sockfs_dentry_operations;
41962306a36Sopenharmony_ci	ctx->xattr = sockfs_xattr_handlers;
42062306a36Sopenharmony_ci	return 0;
42162306a36Sopenharmony_ci}
42262306a36Sopenharmony_ci
42362306a36Sopenharmony_cistatic struct vfsmount *sock_mnt __read_mostly;
42462306a36Sopenharmony_ci
42562306a36Sopenharmony_cistatic struct file_system_type sock_fs_type = {
42662306a36Sopenharmony_ci	.name =		"sockfs",
42762306a36Sopenharmony_ci	.init_fs_context = sockfs_init_fs_context,
42862306a36Sopenharmony_ci	.kill_sb =	kill_anon_super,
42962306a36Sopenharmony_ci};
43062306a36Sopenharmony_ci
43162306a36Sopenharmony_ci/*
43262306a36Sopenharmony_ci *	Obtains the first available file descriptor and sets it up for use.
43362306a36Sopenharmony_ci *
43462306a36Sopenharmony_ci *	These functions create file structures and maps them to fd space
43562306a36Sopenharmony_ci *	of the current process. On success it returns file descriptor
43662306a36Sopenharmony_ci *	and file struct implicitly stored in sock->file.
43762306a36Sopenharmony_ci *	Note that another thread may close file descriptor before we return
43862306a36Sopenharmony_ci *	from this function. We use the fact that now we do not refer
43962306a36Sopenharmony_ci *	to socket after mapping. If one day we will need it, this
44062306a36Sopenharmony_ci *	function will increment ref. count on file by 1.
44162306a36Sopenharmony_ci *
44262306a36Sopenharmony_ci *	In any case returned fd MAY BE not valid!
44362306a36Sopenharmony_ci *	This race condition is unavoidable
44462306a36Sopenharmony_ci *	with shared fd spaces, we cannot solve it inside kernel,
44562306a36Sopenharmony_ci *	but we take care of internal coherence yet.
44662306a36Sopenharmony_ci */
44762306a36Sopenharmony_ci
44862306a36Sopenharmony_ci/**
44962306a36Sopenharmony_ci *	sock_alloc_file - Bind a &socket to a &file
45062306a36Sopenharmony_ci *	@sock: socket
45162306a36Sopenharmony_ci *	@flags: file status flags
45262306a36Sopenharmony_ci *	@dname: protocol name
45362306a36Sopenharmony_ci *
45462306a36Sopenharmony_ci *	Returns the &file bound with @sock, implicitly storing it
45562306a36Sopenharmony_ci *	in sock->file. If dname is %NULL, sets to "".
45662306a36Sopenharmony_ci *
45762306a36Sopenharmony_ci *	On failure @sock is released, and an ERR pointer is returned.
45862306a36Sopenharmony_ci *
45962306a36Sopenharmony_ci *	This function uses GFP_KERNEL internally.
46062306a36Sopenharmony_ci */
46162306a36Sopenharmony_ci
46262306a36Sopenharmony_cistruct file *sock_alloc_file(struct socket *sock, int flags, const char *dname)
46362306a36Sopenharmony_ci{
46462306a36Sopenharmony_ci	struct file *file;
46562306a36Sopenharmony_ci
46662306a36Sopenharmony_ci	if (!dname)
46762306a36Sopenharmony_ci		dname = sock->sk ? sock->sk->sk_prot_creator->name : "";
46862306a36Sopenharmony_ci
46962306a36Sopenharmony_ci	file = alloc_file_pseudo(SOCK_INODE(sock), sock_mnt, dname,
47062306a36Sopenharmony_ci				O_RDWR | (flags & O_NONBLOCK),
47162306a36Sopenharmony_ci				&socket_file_ops);
47262306a36Sopenharmony_ci	if (IS_ERR(file)) {
47362306a36Sopenharmony_ci		sock_release(sock);
47462306a36Sopenharmony_ci		return file;
47562306a36Sopenharmony_ci	}
47662306a36Sopenharmony_ci
47762306a36Sopenharmony_ci	file->f_mode |= FMODE_NOWAIT;
47862306a36Sopenharmony_ci	sock->file = file;
47962306a36Sopenharmony_ci	file->private_data = sock;
48062306a36Sopenharmony_ci	stream_open(SOCK_INODE(sock), file);
48162306a36Sopenharmony_ci	return file;
48262306a36Sopenharmony_ci}
48362306a36Sopenharmony_ciEXPORT_SYMBOL(sock_alloc_file);
48462306a36Sopenharmony_ci
48562306a36Sopenharmony_cistatic int sock_map_fd(struct socket *sock, int flags)
48662306a36Sopenharmony_ci{
48762306a36Sopenharmony_ci	struct file *newfile;
48862306a36Sopenharmony_ci	int fd = get_unused_fd_flags(flags);
48962306a36Sopenharmony_ci	if (unlikely(fd < 0)) {
49062306a36Sopenharmony_ci		sock_release(sock);
49162306a36Sopenharmony_ci		return fd;
49262306a36Sopenharmony_ci	}
49362306a36Sopenharmony_ci
49462306a36Sopenharmony_ci	newfile = sock_alloc_file(sock, flags, NULL);
49562306a36Sopenharmony_ci	if (!IS_ERR(newfile)) {
49662306a36Sopenharmony_ci		fd_install(fd, newfile);
49762306a36Sopenharmony_ci		return fd;
49862306a36Sopenharmony_ci	}
49962306a36Sopenharmony_ci
50062306a36Sopenharmony_ci	put_unused_fd(fd);
50162306a36Sopenharmony_ci	return PTR_ERR(newfile);
50262306a36Sopenharmony_ci}
50362306a36Sopenharmony_ci
50462306a36Sopenharmony_ci/**
50562306a36Sopenharmony_ci *	sock_from_file - Return the &socket bounded to @file.
50662306a36Sopenharmony_ci *	@file: file
50762306a36Sopenharmony_ci *
50862306a36Sopenharmony_ci *	On failure returns %NULL.
50962306a36Sopenharmony_ci */
51062306a36Sopenharmony_ci
51162306a36Sopenharmony_cistruct socket *sock_from_file(struct file *file)
51262306a36Sopenharmony_ci{
51362306a36Sopenharmony_ci	if (file->f_op == &socket_file_ops)
51462306a36Sopenharmony_ci		return file->private_data;	/* set in sock_alloc_file */
51562306a36Sopenharmony_ci
51662306a36Sopenharmony_ci	return NULL;
51762306a36Sopenharmony_ci}
51862306a36Sopenharmony_ciEXPORT_SYMBOL(sock_from_file);
51962306a36Sopenharmony_ci
52062306a36Sopenharmony_ci/**
52162306a36Sopenharmony_ci *	sockfd_lookup - Go from a file number to its socket slot
52262306a36Sopenharmony_ci *	@fd: file handle
52362306a36Sopenharmony_ci *	@err: pointer to an error code return
52462306a36Sopenharmony_ci *
52562306a36Sopenharmony_ci *	The file handle passed in is locked and the socket it is bound
52662306a36Sopenharmony_ci *	to is returned. If an error occurs the err pointer is overwritten
52762306a36Sopenharmony_ci *	with a negative errno code and NULL is returned. The function checks
52862306a36Sopenharmony_ci *	for both invalid handles and passing a handle which is not a socket.
52962306a36Sopenharmony_ci *
53062306a36Sopenharmony_ci *	On a success the socket object pointer is returned.
53162306a36Sopenharmony_ci */
53262306a36Sopenharmony_ci
53362306a36Sopenharmony_cistruct socket *sockfd_lookup(int fd, int *err)
53462306a36Sopenharmony_ci{
53562306a36Sopenharmony_ci	struct file *file;
53662306a36Sopenharmony_ci	struct socket *sock;
53762306a36Sopenharmony_ci
53862306a36Sopenharmony_ci	file = fget(fd);
53962306a36Sopenharmony_ci	if (!file) {
54062306a36Sopenharmony_ci		*err = -EBADF;
54162306a36Sopenharmony_ci		return NULL;
54262306a36Sopenharmony_ci	}
54362306a36Sopenharmony_ci
54462306a36Sopenharmony_ci	sock = sock_from_file(file);
54562306a36Sopenharmony_ci	if (!sock) {
54662306a36Sopenharmony_ci		*err = -ENOTSOCK;
54762306a36Sopenharmony_ci		fput(file);
54862306a36Sopenharmony_ci	}
54962306a36Sopenharmony_ci	return sock;
55062306a36Sopenharmony_ci}
55162306a36Sopenharmony_ciEXPORT_SYMBOL(sockfd_lookup);
55262306a36Sopenharmony_ci
55362306a36Sopenharmony_cistatic struct socket *sockfd_lookup_light(int fd, int *err, int *fput_needed)
55462306a36Sopenharmony_ci{
55562306a36Sopenharmony_ci	struct fd f = fdget(fd);
55662306a36Sopenharmony_ci	struct socket *sock;
55762306a36Sopenharmony_ci
55862306a36Sopenharmony_ci	*err = -EBADF;
55962306a36Sopenharmony_ci	if (f.file) {
56062306a36Sopenharmony_ci		sock = sock_from_file(f.file);
56162306a36Sopenharmony_ci		if (likely(sock)) {
56262306a36Sopenharmony_ci			*fput_needed = f.flags & FDPUT_FPUT;
56362306a36Sopenharmony_ci			return sock;
56462306a36Sopenharmony_ci		}
56562306a36Sopenharmony_ci		*err = -ENOTSOCK;
56662306a36Sopenharmony_ci		fdput(f);
56762306a36Sopenharmony_ci	}
56862306a36Sopenharmony_ci	return NULL;
56962306a36Sopenharmony_ci}
57062306a36Sopenharmony_ci
57162306a36Sopenharmony_cistatic ssize_t sockfs_listxattr(struct dentry *dentry, char *buffer,
57262306a36Sopenharmony_ci				size_t size)
57362306a36Sopenharmony_ci{
57462306a36Sopenharmony_ci	ssize_t len;
57562306a36Sopenharmony_ci	ssize_t used = 0;
57662306a36Sopenharmony_ci
57762306a36Sopenharmony_ci	len = security_inode_listsecurity(d_inode(dentry), buffer, size);
57862306a36Sopenharmony_ci	if (len < 0)
57962306a36Sopenharmony_ci		return len;
58062306a36Sopenharmony_ci	used += len;
58162306a36Sopenharmony_ci	if (buffer) {
58262306a36Sopenharmony_ci		if (size < used)
58362306a36Sopenharmony_ci			return -ERANGE;
58462306a36Sopenharmony_ci		buffer += len;
58562306a36Sopenharmony_ci	}
58662306a36Sopenharmony_ci
58762306a36Sopenharmony_ci	len = (XATTR_NAME_SOCKPROTONAME_LEN + 1);
58862306a36Sopenharmony_ci	used += len;
58962306a36Sopenharmony_ci	if (buffer) {
59062306a36Sopenharmony_ci		if (size < used)
59162306a36Sopenharmony_ci			return -ERANGE;
59262306a36Sopenharmony_ci		memcpy(buffer, XATTR_NAME_SOCKPROTONAME, len);
59362306a36Sopenharmony_ci		buffer += len;
59462306a36Sopenharmony_ci	}
59562306a36Sopenharmony_ci
59662306a36Sopenharmony_ci	return used;
59762306a36Sopenharmony_ci}
59862306a36Sopenharmony_ci
59962306a36Sopenharmony_cistatic int sockfs_setattr(struct mnt_idmap *idmap,
60062306a36Sopenharmony_ci			  struct dentry *dentry, struct iattr *iattr)
60162306a36Sopenharmony_ci{
60262306a36Sopenharmony_ci	int err = simple_setattr(&nop_mnt_idmap, dentry, iattr);
60362306a36Sopenharmony_ci
60462306a36Sopenharmony_ci	if (!err && (iattr->ia_valid & ATTR_UID)) {
60562306a36Sopenharmony_ci		struct socket *sock = SOCKET_I(d_inode(dentry));
60662306a36Sopenharmony_ci
60762306a36Sopenharmony_ci		if (sock->sk)
60862306a36Sopenharmony_ci			sock->sk->sk_uid = iattr->ia_uid;
60962306a36Sopenharmony_ci		else
61062306a36Sopenharmony_ci			err = -ENOENT;
61162306a36Sopenharmony_ci	}
61262306a36Sopenharmony_ci
61362306a36Sopenharmony_ci	return err;
61462306a36Sopenharmony_ci}
61562306a36Sopenharmony_ci
61662306a36Sopenharmony_cistatic const struct inode_operations sockfs_inode_ops = {
61762306a36Sopenharmony_ci	.listxattr = sockfs_listxattr,
61862306a36Sopenharmony_ci	.setattr = sockfs_setattr,
61962306a36Sopenharmony_ci};
62062306a36Sopenharmony_ci
62162306a36Sopenharmony_ci/**
62262306a36Sopenharmony_ci *	sock_alloc - allocate a socket
62362306a36Sopenharmony_ci *
62462306a36Sopenharmony_ci *	Allocate a new inode and socket object. The two are bound together
62562306a36Sopenharmony_ci *	and initialised. The socket is then returned. If we are out of inodes
62662306a36Sopenharmony_ci *	NULL is returned. This functions uses GFP_KERNEL internally.
62762306a36Sopenharmony_ci */
62862306a36Sopenharmony_ci
62962306a36Sopenharmony_cistruct socket *sock_alloc(void)
63062306a36Sopenharmony_ci{
63162306a36Sopenharmony_ci	struct inode *inode;
63262306a36Sopenharmony_ci	struct socket *sock;
63362306a36Sopenharmony_ci
63462306a36Sopenharmony_ci	inode = new_inode_pseudo(sock_mnt->mnt_sb);
63562306a36Sopenharmony_ci	if (!inode)
63662306a36Sopenharmony_ci		return NULL;
63762306a36Sopenharmony_ci
63862306a36Sopenharmony_ci	sock = SOCKET_I(inode);
63962306a36Sopenharmony_ci
64062306a36Sopenharmony_ci	inode->i_ino = get_next_ino();
64162306a36Sopenharmony_ci	inode->i_mode = S_IFSOCK | S_IRWXUGO;
64262306a36Sopenharmony_ci	inode->i_uid = current_fsuid();
64362306a36Sopenharmony_ci	inode->i_gid = current_fsgid();
64462306a36Sopenharmony_ci	inode->i_op = &sockfs_inode_ops;
64562306a36Sopenharmony_ci
64662306a36Sopenharmony_ci	return sock;
64762306a36Sopenharmony_ci}
64862306a36Sopenharmony_ciEXPORT_SYMBOL(sock_alloc);
64962306a36Sopenharmony_ci
65062306a36Sopenharmony_cistatic void __sock_release(struct socket *sock, struct inode *inode)
65162306a36Sopenharmony_ci{
65262306a36Sopenharmony_ci	const struct proto_ops *ops = READ_ONCE(sock->ops);
65362306a36Sopenharmony_ci
65462306a36Sopenharmony_ci	if (ops) {
65562306a36Sopenharmony_ci		struct module *owner = ops->owner;
65662306a36Sopenharmony_ci
65762306a36Sopenharmony_ci		if (inode)
65862306a36Sopenharmony_ci			inode_lock(inode);
65962306a36Sopenharmony_ci		ops->release(sock);
66062306a36Sopenharmony_ci		sock->sk = NULL;
66162306a36Sopenharmony_ci		if (inode)
66262306a36Sopenharmony_ci			inode_unlock(inode);
66362306a36Sopenharmony_ci		sock->ops = NULL;
66462306a36Sopenharmony_ci		module_put(owner);
66562306a36Sopenharmony_ci	}
66662306a36Sopenharmony_ci
66762306a36Sopenharmony_ci	if (sock->wq.fasync_list)
66862306a36Sopenharmony_ci		pr_err("%s: fasync list not empty!\n", __func__);
66962306a36Sopenharmony_ci
67062306a36Sopenharmony_ci	if (!sock->file) {
67162306a36Sopenharmony_ci		iput(SOCK_INODE(sock));
67262306a36Sopenharmony_ci		return;
67362306a36Sopenharmony_ci	}
67462306a36Sopenharmony_ci	sock->file = NULL;
67562306a36Sopenharmony_ci}
67662306a36Sopenharmony_ci
67762306a36Sopenharmony_ci/**
67862306a36Sopenharmony_ci *	sock_release - close a socket
67962306a36Sopenharmony_ci *	@sock: socket to close
68062306a36Sopenharmony_ci *
68162306a36Sopenharmony_ci *	The socket is released from the protocol stack if it has a release
68262306a36Sopenharmony_ci *	callback, and the inode is then released if the socket is bound to
68362306a36Sopenharmony_ci *	an inode not a file.
68462306a36Sopenharmony_ci */
68562306a36Sopenharmony_civoid sock_release(struct socket *sock)
68662306a36Sopenharmony_ci{
68762306a36Sopenharmony_ci	__sock_release(sock, NULL);
68862306a36Sopenharmony_ci}
68962306a36Sopenharmony_ciEXPORT_SYMBOL(sock_release);
69062306a36Sopenharmony_ci
69162306a36Sopenharmony_civoid __sock_tx_timestamp(__u16 tsflags, __u8 *tx_flags)
69262306a36Sopenharmony_ci{
69362306a36Sopenharmony_ci	u8 flags = *tx_flags;
69462306a36Sopenharmony_ci
69562306a36Sopenharmony_ci	if (tsflags & SOF_TIMESTAMPING_TX_HARDWARE) {
69662306a36Sopenharmony_ci		flags |= SKBTX_HW_TSTAMP;
69762306a36Sopenharmony_ci
69862306a36Sopenharmony_ci		/* PTP hardware clocks can provide a free running cycle counter
69962306a36Sopenharmony_ci		 * as a time base for virtual clocks. Tell driver to use the
70062306a36Sopenharmony_ci		 * free running cycle counter for timestamp if socket is bound
70162306a36Sopenharmony_ci		 * to virtual clock.
70262306a36Sopenharmony_ci		 */
70362306a36Sopenharmony_ci		if (tsflags & SOF_TIMESTAMPING_BIND_PHC)
70462306a36Sopenharmony_ci			flags |= SKBTX_HW_TSTAMP_USE_CYCLES;
70562306a36Sopenharmony_ci	}
70662306a36Sopenharmony_ci
70762306a36Sopenharmony_ci	if (tsflags & SOF_TIMESTAMPING_TX_SOFTWARE)
70862306a36Sopenharmony_ci		flags |= SKBTX_SW_TSTAMP;
70962306a36Sopenharmony_ci
71062306a36Sopenharmony_ci	if (tsflags & SOF_TIMESTAMPING_TX_SCHED)
71162306a36Sopenharmony_ci		flags |= SKBTX_SCHED_TSTAMP;
71262306a36Sopenharmony_ci
71362306a36Sopenharmony_ci	*tx_flags = flags;
71462306a36Sopenharmony_ci}
71562306a36Sopenharmony_ciEXPORT_SYMBOL(__sock_tx_timestamp);
71662306a36Sopenharmony_ci
71762306a36Sopenharmony_ciINDIRECT_CALLABLE_DECLARE(int inet_sendmsg(struct socket *, struct msghdr *,
71862306a36Sopenharmony_ci					   size_t));
71962306a36Sopenharmony_ciINDIRECT_CALLABLE_DECLARE(int inet6_sendmsg(struct socket *, struct msghdr *,
72062306a36Sopenharmony_ci					    size_t));
72162306a36Sopenharmony_ci
72262306a36Sopenharmony_cistatic noinline void call_trace_sock_send_length(struct sock *sk, int ret,
72362306a36Sopenharmony_ci						 int flags)
72462306a36Sopenharmony_ci{
72562306a36Sopenharmony_ci	trace_sock_send_length(sk, ret, 0);
72662306a36Sopenharmony_ci}
72762306a36Sopenharmony_ci
72862306a36Sopenharmony_cistatic inline int sock_sendmsg_nosec(struct socket *sock, struct msghdr *msg)
72962306a36Sopenharmony_ci{
73062306a36Sopenharmony_ci	int ret = INDIRECT_CALL_INET(READ_ONCE(sock->ops)->sendmsg, inet6_sendmsg,
73162306a36Sopenharmony_ci				     inet_sendmsg, sock, msg,
73262306a36Sopenharmony_ci				     msg_data_left(msg));
73362306a36Sopenharmony_ci	BUG_ON(ret == -EIOCBQUEUED);
73462306a36Sopenharmony_ci
73562306a36Sopenharmony_ci	if (trace_sock_send_length_enabled())
73662306a36Sopenharmony_ci		call_trace_sock_send_length(sock->sk, ret, 0);
73762306a36Sopenharmony_ci	return ret;
73862306a36Sopenharmony_ci}
73962306a36Sopenharmony_ci
74062306a36Sopenharmony_cistatic int __sock_sendmsg(struct socket *sock, struct msghdr *msg)
74162306a36Sopenharmony_ci{
74262306a36Sopenharmony_ci	int err = security_socket_sendmsg(sock, msg,
74362306a36Sopenharmony_ci					  msg_data_left(msg));
74462306a36Sopenharmony_ci
74562306a36Sopenharmony_ci	return err ?: sock_sendmsg_nosec(sock, msg);
74662306a36Sopenharmony_ci}
74762306a36Sopenharmony_ci
74862306a36Sopenharmony_ci/**
74962306a36Sopenharmony_ci *	sock_sendmsg - send a message through @sock
75062306a36Sopenharmony_ci *	@sock: socket
75162306a36Sopenharmony_ci *	@msg: message to send
75262306a36Sopenharmony_ci *
75362306a36Sopenharmony_ci *	Sends @msg through @sock, passing through LSM.
75462306a36Sopenharmony_ci *	Returns the number of bytes sent, or an error code.
75562306a36Sopenharmony_ci */
75662306a36Sopenharmony_ciint sock_sendmsg(struct socket *sock, struct msghdr *msg)
75762306a36Sopenharmony_ci{
75862306a36Sopenharmony_ci	struct sockaddr_storage *save_addr = (struct sockaddr_storage *)msg->msg_name;
75962306a36Sopenharmony_ci	struct sockaddr_storage address;
76062306a36Sopenharmony_ci	int save_len = msg->msg_namelen;
76162306a36Sopenharmony_ci	int ret;
76262306a36Sopenharmony_ci
76362306a36Sopenharmony_ci	if (msg->msg_name) {
76462306a36Sopenharmony_ci		memcpy(&address, msg->msg_name, msg->msg_namelen);
76562306a36Sopenharmony_ci		msg->msg_name = &address;
76662306a36Sopenharmony_ci	}
76762306a36Sopenharmony_ci
76862306a36Sopenharmony_ci	ret = __sock_sendmsg(sock, msg);
76962306a36Sopenharmony_ci	msg->msg_name = save_addr;
77062306a36Sopenharmony_ci	msg->msg_namelen = save_len;
77162306a36Sopenharmony_ci
77262306a36Sopenharmony_ci	return ret;
77362306a36Sopenharmony_ci}
77462306a36Sopenharmony_ciEXPORT_SYMBOL(sock_sendmsg);
77562306a36Sopenharmony_ci
77662306a36Sopenharmony_ci/**
77762306a36Sopenharmony_ci *	kernel_sendmsg - send a message through @sock (kernel-space)
77862306a36Sopenharmony_ci *	@sock: socket
77962306a36Sopenharmony_ci *	@msg: message header
78062306a36Sopenharmony_ci *	@vec: kernel vec
78162306a36Sopenharmony_ci *	@num: vec array length
78262306a36Sopenharmony_ci *	@size: total message data size
78362306a36Sopenharmony_ci *
78462306a36Sopenharmony_ci *	Builds the message data with @vec and sends it through @sock.
78562306a36Sopenharmony_ci *	Returns the number of bytes sent, or an error code.
78662306a36Sopenharmony_ci */
78762306a36Sopenharmony_ci
78862306a36Sopenharmony_ciint kernel_sendmsg(struct socket *sock, struct msghdr *msg,
78962306a36Sopenharmony_ci		   struct kvec *vec, size_t num, size_t size)
79062306a36Sopenharmony_ci{
79162306a36Sopenharmony_ci	iov_iter_kvec(&msg->msg_iter, ITER_SOURCE, vec, num, size);
79262306a36Sopenharmony_ci	return sock_sendmsg(sock, msg);
79362306a36Sopenharmony_ci}
79462306a36Sopenharmony_ciEXPORT_SYMBOL(kernel_sendmsg);
79562306a36Sopenharmony_ci
79662306a36Sopenharmony_ci/**
79762306a36Sopenharmony_ci *	kernel_sendmsg_locked - send a message through @sock (kernel-space)
79862306a36Sopenharmony_ci *	@sk: sock
79962306a36Sopenharmony_ci *	@msg: message header
80062306a36Sopenharmony_ci *	@vec: output s/g array
80162306a36Sopenharmony_ci *	@num: output s/g array length
80262306a36Sopenharmony_ci *	@size: total message data size
80362306a36Sopenharmony_ci *
80462306a36Sopenharmony_ci *	Builds the message data with @vec and sends it through @sock.
80562306a36Sopenharmony_ci *	Returns the number of bytes sent, or an error code.
80662306a36Sopenharmony_ci *	Caller must hold @sk.
80762306a36Sopenharmony_ci */
80862306a36Sopenharmony_ci
80962306a36Sopenharmony_ciint kernel_sendmsg_locked(struct sock *sk, struct msghdr *msg,
81062306a36Sopenharmony_ci			  struct kvec *vec, size_t num, size_t size)
81162306a36Sopenharmony_ci{
81262306a36Sopenharmony_ci	struct socket *sock = sk->sk_socket;
81362306a36Sopenharmony_ci	const struct proto_ops *ops = READ_ONCE(sock->ops);
81462306a36Sopenharmony_ci
81562306a36Sopenharmony_ci	if (!ops->sendmsg_locked)
81662306a36Sopenharmony_ci		return sock_no_sendmsg_locked(sk, msg, size);
81762306a36Sopenharmony_ci
81862306a36Sopenharmony_ci	iov_iter_kvec(&msg->msg_iter, ITER_SOURCE, vec, num, size);
81962306a36Sopenharmony_ci
82062306a36Sopenharmony_ci	return ops->sendmsg_locked(sk, msg, msg_data_left(msg));
82162306a36Sopenharmony_ci}
82262306a36Sopenharmony_ciEXPORT_SYMBOL(kernel_sendmsg_locked);
82362306a36Sopenharmony_ci
82462306a36Sopenharmony_cistatic bool skb_is_err_queue(const struct sk_buff *skb)
82562306a36Sopenharmony_ci{
82662306a36Sopenharmony_ci	/* pkt_type of skbs enqueued on the error queue are set to
82762306a36Sopenharmony_ci	 * PACKET_OUTGOING in skb_set_err_queue(). This is only safe to do
82862306a36Sopenharmony_ci	 * in recvmsg, since skbs received on a local socket will never
82962306a36Sopenharmony_ci	 * have a pkt_type of PACKET_OUTGOING.
83062306a36Sopenharmony_ci	 */
83162306a36Sopenharmony_ci	return skb->pkt_type == PACKET_OUTGOING;
83262306a36Sopenharmony_ci}
83362306a36Sopenharmony_ci
83462306a36Sopenharmony_ci/* On transmit, software and hardware timestamps are returned independently.
83562306a36Sopenharmony_ci * As the two skb clones share the hardware timestamp, which may be updated
83662306a36Sopenharmony_ci * before the software timestamp is received, a hardware TX timestamp may be
83762306a36Sopenharmony_ci * returned only if there is no software TX timestamp. Ignore false software
83862306a36Sopenharmony_ci * timestamps, which may be made in the __sock_recv_timestamp() call when the
83962306a36Sopenharmony_ci * option SO_TIMESTAMP_OLD(NS) is enabled on the socket, even when the skb has a
84062306a36Sopenharmony_ci * hardware timestamp.
84162306a36Sopenharmony_ci */
84262306a36Sopenharmony_cistatic bool skb_is_swtx_tstamp(const struct sk_buff *skb, int false_tstamp)
84362306a36Sopenharmony_ci{
84462306a36Sopenharmony_ci	return skb->tstamp && !false_tstamp && skb_is_err_queue(skb);
84562306a36Sopenharmony_ci}
84662306a36Sopenharmony_ci
84762306a36Sopenharmony_cistatic ktime_t get_timestamp(struct sock *sk, struct sk_buff *skb, int *if_index)
84862306a36Sopenharmony_ci{
84962306a36Sopenharmony_ci	bool cycles = READ_ONCE(sk->sk_tsflags) & SOF_TIMESTAMPING_BIND_PHC;
85062306a36Sopenharmony_ci	struct skb_shared_hwtstamps *shhwtstamps = skb_hwtstamps(skb);
85162306a36Sopenharmony_ci	struct net_device *orig_dev;
85262306a36Sopenharmony_ci	ktime_t hwtstamp;
85362306a36Sopenharmony_ci
85462306a36Sopenharmony_ci	rcu_read_lock();
85562306a36Sopenharmony_ci	orig_dev = dev_get_by_napi_id(skb_napi_id(skb));
85662306a36Sopenharmony_ci	if (orig_dev) {
85762306a36Sopenharmony_ci		*if_index = orig_dev->ifindex;
85862306a36Sopenharmony_ci		hwtstamp = netdev_get_tstamp(orig_dev, shhwtstamps, cycles);
85962306a36Sopenharmony_ci	} else {
86062306a36Sopenharmony_ci		hwtstamp = shhwtstamps->hwtstamp;
86162306a36Sopenharmony_ci	}
86262306a36Sopenharmony_ci	rcu_read_unlock();
86362306a36Sopenharmony_ci
86462306a36Sopenharmony_ci	return hwtstamp;
86562306a36Sopenharmony_ci}
86662306a36Sopenharmony_ci
86762306a36Sopenharmony_cistatic void put_ts_pktinfo(struct msghdr *msg, struct sk_buff *skb,
86862306a36Sopenharmony_ci			   int if_index)
86962306a36Sopenharmony_ci{
87062306a36Sopenharmony_ci	struct scm_ts_pktinfo ts_pktinfo;
87162306a36Sopenharmony_ci	struct net_device *orig_dev;
87262306a36Sopenharmony_ci
87362306a36Sopenharmony_ci	if (!skb_mac_header_was_set(skb))
87462306a36Sopenharmony_ci		return;
87562306a36Sopenharmony_ci
87662306a36Sopenharmony_ci	memset(&ts_pktinfo, 0, sizeof(ts_pktinfo));
87762306a36Sopenharmony_ci
87862306a36Sopenharmony_ci	if (!if_index) {
87962306a36Sopenharmony_ci		rcu_read_lock();
88062306a36Sopenharmony_ci		orig_dev = dev_get_by_napi_id(skb_napi_id(skb));
88162306a36Sopenharmony_ci		if (orig_dev)
88262306a36Sopenharmony_ci			if_index = orig_dev->ifindex;
88362306a36Sopenharmony_ci		rcu_read_unlock();
88462306a36Sopenharmony_ci	}
88562306a36Sopenharmony_ci	ts_pktinfo.if_index = if_index;
88662306a36Sopenharmony_ci
88762306a36Sopenharmony_ci	ts_pktinfo.pkt_length = skb->len - skb_mac_offset(skb);
88862306a36Sopenharmony_ci	put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMPING_PKTINFO,
88962306a36Sopenharmony_ci		 sizeof(ts_pktinfo), &ts_pktinfo);
89062306a36Sopenharmony_ci}
89162306a36Sopenharmony_ci
89262306a36Sopenharmony_ci/*
89362306a36Sopenharmony_ci * called from sock_recv_timestamp() if sock_flag(sk, SOCK_RCVTSTAMP)
89462306a36Sopenharmony_ci */
89562306a36Sopenharmony_civoid __sock_recv_timestamp(struct msghdr *msg, struct sock *sk,
89662306a36Sopenharmony_ci	struct sk_buff *skb)
89762306a36Sopenharmony_ci{
89862306a36Sopenharmony_ci	int need_software_tstamp = sock_flag(sk, SOCK_RCVTSTAMP);
89962306a36Sopenharmony_ci	int new_tstamp = sock_flag(sk, SOCK_TSTAMP_NEW);
90062306a36Sopenharmony_ci	struct scm_timestamping_internal tss;
90162306a36Sopenharmony_ci	int empty = 1, false_tstamp = 0;
90262306a36Sopenharmony_ci	struct skb_shared_hwtstamps *shhwtstamps =
90362306a36Sopenharmony_ci		skb_hwtstamps(skb);
90462306a36Sopenharmony_ci	int if_index;
90562306a36Sopenharmony_ci	ktime_t hwtstamp;
90662306a36Sopenharmony_ci	u32 tsflags;
90762306a36Sopenharmony_ci
90862306a36Sopenharmony_ci	/* Race occurred between timestamp enabling and packet
90962306a36Sopenharmony_ci	   receiving.  Fill in the current time for now. */
91062306a36Sopenharmony_ci	if (need_software_tstamp && skb->tstamp == 0) {
91162306a36Sopenharmony_ci		__net_timestamp(skb);
91262306a36Sopenharmony_ci		false_tstamp = 1;
91362306a36Sopenharmony_ci	}
91462306a36Sopenharmony_ci
91562306a36Sopenharmony_ci	if (need_software_tstamp) {
91662306a36Sopenharmony_ci		if (!sock_flag(sk, SOCK_RCVTSTAMPNS)) {
91762306a36Sopenharmony_ci			if (new_tstamp) {
91862306a36Sopenharmony_ci				struct __kernel_sock_timeval tv;
91962306a36Sopenharmony_ci
92062306a36Sopenharmony_ci				skb_get_new_timestamp(skb, &tv);
92162306a36Sopenharmony_ci				put_cmsg(msg, SOL_SOCKET, SO_TIMESTAMP_NEW,
92262306a36Sopenharmony_ci					 sizeof(tv), &tv);
92362306a36Sopenharmony_ci			} else {
92462306a36Sopenharmony_ci				struct __kernel_old_timeval tv;
92562306a36Sopenharmony_ci
92662306a36Sopenharmony_ci				skb_get_timestamp(skb, &tv);
92762306a36Sopenharmony_ci				put_cmsg(msg, SOL_SOCKET, SO_TIMESTAMP_OLD,
92862306a36Sopenharmony_ci					 sizeof(tv), &tv);
92962306a36Sopenharmony_ci			}
93062306a36Sopenharmony_ci		} else {
93162306a36Sopenharmony_ci			if (new_tstamp) {
93262306a36Sopenharmony_ci				struct __kernel_timespec ts;
93362306a36Sopenharmony_ci
93462306a36Sopenharmony_ci				skb_get_new_timestampns(skb, &ts);
93562306a36Sopenharmony_ci				put_cmsg(msg, SOL_SOCKET, SO_TIMESTAMPNS_NEW,
93662306a36Sopenharmony_ci					 sizeof(ts), &ts);
93762306a36Sopenharmony_ci			} else {
93862306a36Sopenharmony_ci				struct __kernel_old_timespec ts;
93962306a36Sopenharmony_ci
94062306a36Sopenharmony_ci				skb_get_timestampns(skb, &ts);
94162306a36Sopenharmony_ci				put_cmsg(msg, SOL_SOCKET, SO_TIMESTAMPNS_OLD,
94262306a36Sopenharmony_ci					 sizeof(ts), &ts);
94362306a36Sopenharmony_ci			}
94462306a36Sopenharmony_ci		}
94562306a36Sopenharmony_ci	}
94662306a36Sopenharmony_ci
94762306a36Sopenharmony_ci	memset(&tss, 0, sizeof(tss));
94862306a36Sopenharmony_ci	tsflags = READ_ONCE(sk->sk_tsflags);
94962306a36Sopenharmony_ci	if ((tsflags & SOF_TIMESTAMPING_SOFTWARE) &&
95062306a36Sopenharmony_ci	    ktime_to_timespec64_cond(skb->tstamp, tss.ts + 0))
95162306a36Sopenharmony_ci		empty = 0;
95262306a36Sopenharmony_ci	if (shhwtstamps &&
95362306a36Sopenharmony_ci	    (tsflags & SOF_TIMESTAMPING_RAW_HARDWARE) &&
95462306a36Sopenharmony_ci	    !skb_is_swtx_tstamp(skb, false_tstamp)) {
95562306a36Sopenharmony_ci		if_index = 0;
95662306a36Sopenharmony_ci		if (skb_shinfo(skb)->tx_flags & SKBTX_HW_TSTAMP_NETDEV)
95762306a36Sopenharmony_ci			hwtstamp = get_timestamp(sk, skb, &if_index);
95862306a36Sopenharmony_ci		else
95962306a36Sopenharmony_ci			hwtstamp = shhwtstamps->hwtstamp;
96062306a36Sopenharmony_ci
96162306a36Sopenharmony_ci		if (tsflags & SOF_TIMESTAMPING_BIND_PHC)
96262306a36Sopenharmony_ci			hwtstamp = ptp_convert_timestamp(&hwtstamp,
96362306a36Sopenharmony_ci							 READ_ONCE(sk->sk_bind_phc));
96462306a36Sopenharmony_ci
96562306a36Sopenharmony_ci		if (ktime_to_timespec64_cond(hwtstamp, tss.ts + 2)) {
96662306a36Sopenharmony_ci			empty = 0;
96762306a36Sopenharmony_ci
96862306a36Sopenharmony_ci			if ((tsflags & SOF_TIMESTAMPING_OPT_PKTINFO) &&
96962306a36Sopenharmony_ci			    !skb_is_err_queue(skb))
97062306a36Sopenharmony_ci				put_ts_pktinfo(msg, skb, if_index);
97162306a36Sopenharmony_ci		}
97262306a36Sopenharmony_ci	}
97362306a36Sopenharmony_ci	if (!empty) {
97462306a36Sopenharmony_ci		if (sock_flag(sk, SOCK_TSTAMP_NEW))
97562306a36Sopenharmony_ci			put_cmsg_scm_timestamping64(msg, &tss);
97662306a36Sopenharmony_ci		else
97762306a36Sopenharmony_ci			put_cmsg_scm_timestamping(msg, &tss);
97862306a36Sopenharmony_ci
97962306a36Sopenharmony_ci		if (skb_is_err_queue(skb) && skb->len &&
98062306a36Sopenharmony_ci		    SKB_EXT_ERR(skb)->opt_stats)
98162306a36Sopenharmony_ci			put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMPING_OPT_STATS,
98262306a36Sopenharmony_ci				 skb->len, skb->data);
98362306a36Sopenharmony_ci	}
98462306a36Sopenharmony_ci}
98562306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(__sock_recv_timestamp);
98662306a36Sopenharmony_ci
98762306a36Sopenharmony_ci#ifdef CONFIG_WIRELESS
98862306a36Sopenharmony_civoid __sock_recv_wifi_status(struct msghdr *msg, struct sock *sk,
98962306a36Sopenharmony_ci	struct sk_buff *skb)
99062306a36Sopenharmony_ci{
99162306a36Sopenharmony_ci	int ack;
99262306a36Sopenharmony_ci
99362306a36Sopenharmony_ci	if (!sock_flag(sk, SOCK_WIFI_STATUS))
99462306a36Sopenharmony_ci		return;
99562306a36Sopenharmony_ci	if (!skb->wifi_acked_valid)
99662306a36Sopenharmony_ci		return;
99762306a36Sopenharmony_ci
99862306a36Sopenharmony_ci	ack = skb->wifi_acked;
99962306a36Sopenharmony_ci
100062306a36Sopenharmony_ci	put_cmsg(msg, SOL_SOCKET, SCM_WIFI_STATUS, sizeof(ack), &ack);
100162306a36Sopenharmony_ci}
100262306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(__sock_recv_wifi_status);
100362306a36Sopenharmony_ci#endif
100462306a36Sopenharmony_ci
100562306a36Sopenharmony_cistatic inline void sock_recv_drops(struct msghdr *msg, struct sock *sk,
100662306a36Sopenharmony_ci				   struct sk_buff *skb)
100762306a36Sopenharmony_ci{
100862306a36Sopenharmony_ci	if (sock_flag(sk, SOCK_RXQ_OVFL) && skb && SOCK_SKB_CB(skb)->dropcount)
100962306a36Sopenharmony_ci		put_cmsg(msg, SOL_SOCKET, SO_RXQ_OVFL,
101062306a36Sopenharmony_ci			sizeof(__u32), &SOCK_SKB_CB(skb)->dropcount);
101162306a36Sopenharmony_ci}
101262306a36Sopenharmony_ci
101362306a36Sopenharmony_cistatic void sock_recv_mark(struct msghdr *msg, struct sock *sk,
101462306a36Sopenharmony_ci			   struct sk_buff *skb)
101562306a36Sopenharmony_ci{
101662306a36Sopenharmony_ci	if (sock_flag(sk, SOCK_RCVMARK) && skb) {
101762306a36Sopenharmony_ci		/* We must use a bounce buffer for CONFIG_HARDENED_USERCOPY=y */
101862306a36Sopenharmony_ci		__u32 mark = skb->mark;
101962306a36Sopenharmony_ci
102062306a36Sopenharmony_ci		put_cmsg(msg, SOL_SOCKET, SO_MARK, sizeof(__u32), &mark);
102162306a36Sopenharmony_ci	}
102262306a36Sopenharmony_ci}
102362306a36Sopenharmony_ci
102462306a36Sopenharmony_civoid __sock_recv_cmsgs(struct msghdr *msg, struct sock *sk,
102562306a36Sopenharmony_ci		       struct sk_buff *skb)
102662306a36Sopenharmony_ci{
102762306a36Sopenharmony_ci	sock_recv_timestamp(msg, sk, skb);
102862306a36Sopenharmony_ci	sock_recv_drops(msg, sk, skb);
102962306a36Sopenharmony_ci	sock_recv_mark(msg, sk, skb);
103062306a36Sopenharmony_ci}
103162306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(__sock_recv_cmsgs);
103262306a36Sopenharmony_ci
103362306a36Sopenharmony_ciINDIRECT_CALLABLE_DECLARE(int inet_recvmsg(struct socket *, struct msghdr *,
103462306a36Sopenharmony_ci					   size_t, int));
103562306a36Sopenharmony_ciINDIRECT_CALLABLE_DECLARE(int inet6_recvmsg(struct socket *, struct msghdr *,
103662306a36Sopenharmony_ci					    size_t, int));
103762306a36Sopenharmony_ci
103862306a36Sopenharmony_cistatic noinline void call_trace_sock_recv_length(struct sock *sk, int ret, int flags)
103962306a36Sopenharmony_ci{
104062306a36Sopenharmony_ci	trace_sock_recv_length(sk, ret, flags);
104162306a36Sopenharmony_ci}
104262306a36Sopenharmony_ci
104362306a36Sopenharmony_cistatic inline int sock_recvmsg_nosec(struct socket *sock, struct msghdr *msg,
104462306a36Sopenharmony_ci				     int flags)
104562306a36Sopenharmony_ci{
104662306a36Sopenharmony_ci	int ret = INDIRECT_CALL_INET(READ_ONCE(sock->ops)->recvmsg,
104762306a36Sopenharmony_ci				     inet6_recvmsg,
104862306a36Sopenharmony_ci				     inet_recvmsg, sock, msg,
104962306a36Sopenharmony_ci				     msg_data_left(msg), flags);
105062306a36Sopenharmony_ci	if (trace_sock_recv_length_enabled())
105162306a36Sopenharmony_ci		call_trace_sock_recv_length(sock->sk, ret, flags);
105262306a36Sopenharmony_ci	return ret;
105362306a36Sopenharmony_ci}
105462306a36Sopenharmony_ci
105562306a36Sopenharmony_ci/**
105662306a36Sopenharmony_ci *	sock_recvmsg - receive a message from @sock
105762306a36Sopenharmony_ci *	@sock: socket
105862306a36Sopenharmony_ci *	@msg: message to receive
105962306a36Sopenharmony_ci *	@flags: message flags
106062306a36Sopenharmony_ci *
106162306a36Sopenharmony_ci *	Receives @msg from @sock, passing through LSM. Returns the total number
106262306a36Sopenharmony_ci *	of bytes received, or an error.
106362306a36Sopenharmony_ci */
106462306a36Sopenharmony_ciint sock_recvmsg(struct socket *sock, struct msghdr *msg, int flags)
106562306a36Sopenharmony_ci{
106662306a36Sopenharmony_ci	int err = security_socket_recvmsg(sock, msg, msg_data_left(msg), flags);
106762306a36Sopenharmony_ci
106862306a36Sopenharmony_ci	return err ?: sock_recvmsg_nosec(sock, msg, flags);
106962306a36Sopenharmony_ci}
107062306a36Sopenharmony_ciEXPORT_SYMBOL(sock_recvmsg);
107162306a36Sopenharmony_ci
107262306a36Sopenharmony_ci/**
107362306a36Sopenharmony_ci *	kernel_recvmsg - Receive a message from a socket (kernel space)
107462306a36Sopenharmony_ci *	@sock: The socket to receive the message from
107562306a36Sopenharmony_ci *	@msg: Received message
107662306a36Sopenharmony_ci *	@vec: Input s/g array for message data
107762306a36Sopenharmony_ci *	@num: Size of input s/g array
107862306a36Sopenharmony_ci *	@size: Number of bytes to read
107962306a36Sopenharmony_ci *	@flags: Message flags (MSG_DONTWAIT, etc...)
108062306a36Sopenharmony_ci *
108162306a36Sopenharmony_ci *	On return the msg structure contains the scatter/gather array passed in the
108262306a36Sopenharmony_ci *	vec argument. The array is modified so that it consists of the unfilled
108362306a36Sopenharmony_ci *	portion of the original array.
108462306a36Sopenharmony_ci *
108562306a36Sopenharmony_ci *	The returned value is the total number of bytes received, or an error.
108662306a36Sopenharmony_ci */
108762306a36Sopenharmony_ci
108862306a36Sopenharmony_ciint kernel_recvmsg(struct socket *sock, struct msghdr *msg,
108962306a36Sopenharmony_ci		   struct kvec *vec, size_t num, size_t size, int flags)
109062306a36Sopenharmony_ci{
109162306a36Sopenharmony_ci	msg->msg_control_is_user = false;
109262306a36Sopenharmony_ci	iov_iter_kvec(&msg->msg_iter, ITER_DEST, vec, num, size);
109362306a36Sopenharmony_ci	return sock_recvmsg(sock, msg, flags);
109462306a36Sopenharmony_ci}
109562306a36Sopenharmony_ciEXPORT_SYMBOL(kernel_recvmsg);
109662306a36Sopenharmony_ci
109762306a36Sopenharmony_cistatic ssize_t sock_splice_read(struct file *file, loff_t *ppos,
109862306a36Sopenharmony_ci				struct pipe_inode_info *pipe, size_t len,
109962306a36Sopenharmony_ci				unsigned int flags)
110062306a36Sopenharmony_ci{
110162306a36Sopenharmony_ci	struct socket *sock = file->private_data;
110262306a36Sopenharmony_ci	const struct proto_ops *ops;
110362306a36Sopenharmony_ci
110462306a36Sopenharmony_ci	ops = READ_ONCE(sock->ops);
110562306a36Sopenharmony_ci	if (unlikely(!ops->splice_read))
110662306a36Sopenharmony_ci		return copy_splice_read(file, ppos, pipe, len, flags);
110762306a36Sopenharmony_ci
110862306a36Sopenharmony_ci	return ops->splice_read(sock, ppos, pipe, len, flags);
110962306a36Sopenharmony_ci}
111062306a36Sopenharmony_ci
111162306a36Sopenharmony_cistatic void sock_splice_eof(struct file *file)
111262306a36Sopenharmony_ci{
111362306a36Sopenharmony_ci	struct socket *sock = file->private_data;
111462306a36Sopenharmony_ci	const struct proto_ops *ops;
111562306a36Sopenharmony_ci
111662306a36Sopenharmony_ci	ops = READ_ONCE(sock->ops);
111762306a36Sopenharmony_ci	if (ops->splice_eof)
111862306a36Sopenharmony_ci		ops->splice_eof(sock);
111962306a36Sopenharmony_ci}
112062306a36Sopenharmony_ci
112162306a36Sopenharmony_cistatic ssize_t sock_read_iter(struct kiocb *iocb, struct iov_iter *to)
112262306a36Sopenharmony_ci{
112362306a36Sopenharmony_ci	struct file *file = iocb->ki_filp;
112462306a36Sopenharmony_ci	struct socket *sock = file->private_data;
112562306a36Sopenharmony_ci	struct msghdr msg = {.msg_iter = *to,
112662306a36Sopenharmony_ci			     .msg_iocb = iocb};
112762306a36Sopenharmony_ci	ssize_t res;
112862306a36Sopenharmony_ci
112962306a36Sopenharmony_ci	if (file->f_flags & O_NONBLOCK || (iocb->ki_flags & IOCB_NOWAIT))
113062306a36Sopenharmony_ci		msg.msg_flags = MSG_DONTWAIT;
113162306a36Sopenharmony_ci
113262306a36Sopenharmony_ci	if (iocb->ki_pos != 0)
113362306a36Sopenharmony_ci		return -ESPIPE;
113462306a36Sopenharmony_ci
113562306a36Sopenharmony_ci	if (!iov_iter_count(to))	/* Match SYS5 behaviour */
113662306a36Sopenharmony_ci		return 0;
113762306a36Sopenharmony_ci
113862306a36Sopenharmony_ci	res = sock_recvmsg(sock, &msg, msg.msg_flags);
113962306a36Sopenharmony_ci	*to = msg.msg_iter;
114062306a36Sopenharmony_ci	return res;
114162306a36Sopenharmony_ci}
114262306a36Sopenharmony_ci
114362306a36Sopenharmony_cistatic ssize_t sock_write_iter(struct kiocb *iocb, struct iov_iter *from)
114462306a36Sopenharmony_ci{
114562306a36Sopenharmony_ci	struct file *file = iocb->ki_filp;
114662306a36Sopenharmony_ci	struct socket *sock = file->private_data;
114762306a36Sopenharmony_ci	struct msghdr msg = {.msg_iter = *from,
114862306a36Sopenharmony_ci			     .msg_iocb = iocb};
114962306a36Sopenharmony_ci	ssize_t res;
115062306a36Sopenharmony_ci
115162306a36Sopenharmony_ci	if (iocb->ki_pos != 0)
115262306a36Sopenharmony_ci		return -ESPIPE;
115362306a36Sopenharmony_ci
115462306a36Sopenharmony_ci	if (file->f_flags & O_NONBLOCK || (iocb->ki_flags & IOCB_NOWAIT))
115562306a36Sopenharmony_ci		msg.msg_flags = MSG_DONTWAIT;
115662306a36Sopenharmony_ci
115762306a36Sopenharmony_ci	if (sock->type == SOCK_SEQPACKET)
115862306a36Sopenharmony_ci		msg.msg_flags |= MSG_EOR;
115962306a36Sopenharmony_ci
116062306a36Sopenharmony_ci	res = __sock_sendmsg(sock, &msg);
116162306a36Sopenharmony_ci	*from = msg.msg_iter;
116262306a36Sopenharmony_ci	return res;
116362306a36Sopenharmony_ci}
116462306a36Sopenharmony_ci
116562306a36Sopenharmony_ci/*
116662306a36Sopenharmony_ci * Atomic setting of ioctl hooks to avoid race
116762306a36Sopenharmony_ci * with module unload.
116862306a36Sopenharmony_ci */
116962306a36Sopenharmony_ci
117062306a36Sopenharmony_cistatic DEFINE_MUTEX(br_ioctl_mutex);
117162306a36Sopenharmony_cistatic int (*br_ioctl_hook)(struct net *net, struct net_bridge *br,
117262306a36Sopenharmony_ci			    unsigned int cmd, struct ifreq *ifr,
117362306a36Sopenharmony_ci			    void __user *uarg);
117462306a36Sopenharmony_ci
117562306a36Sopenharmony_civoid brioctl_set(int (*hook)(struct net *net, struct net_bridge *br,
117662306a36Sopenharmony_ci			     unsigned int cmd, struct ifreq *ifr,
117762306a36Sopenharmony_ci			     void __user *uarg))
117862306a36Sopenharmony_ci{
117962306a36Sopenharmony_ci	mutex_lock(&br_ioctl_mutex);
118062306a36Sopenharmony_ci	br_ioctl_hook = hook;
118162306a36Sopenharmony_ci	mutex_unlock(&br_ioctl_mutex);
118262306a36Sopenharmony_ci}
118362306a36Sopenharmony_ciEXPORT_SYMBOL(brioctl_set);
118462306a36Sopenharmony_ci
118562306a36Sopenharmony_ciint br_ioctl_call(struct net *net, struct net_bridge *br, unsigned int cmd,
118662306a36Sopenharmony_ci		  struct ifreq *ifr, void __user *uarg)
118762306a36Sopenharmony_ci{
118862306a36Sopenharmony_ci	int err = -ENOPKG;
118962306a36Sopenharmony_ci
119062306a36Sopenharmony_ci	if (!br_ioctl_hook)
119162306a36Sopenharmony_ci		request_module("bridge");
119262306a36Sopenharmony_ci
119362306a36Sopenharmony_ci	mutex_lock(&br_ioctl_mutex);
119462306a36Sopenharmony_ci	if (br_ioctl_hook)
119562306a36Sopenharmony_ci		err = br_ioctl_hook(net, br, cmd, ifr, uarg);
119662306a36Sopenharmony_ci	mutex_unlock(&br_ioctl_mutex);
119762306a36Sopenharmony_ci
119862306a36Sopenharmony_ci	return err;
119962306a36Sopenharmony_ci}
120062306a36Sopenharmony_ci
120162306a36Sopenharmony_cistatic DEFINE_MUTEX(vlan_ioctl_mutex);
120262306a36Sopenharmony_cistatic int (*vlan_ioctl_hook) (struct net *, void __user *arg);
120362306a36Sopenharmony_ci
120462306a36Sopenharmony_civoid vlan_ioctl_set(int (*hook) (struct net *, void __user *))
120562306a36Sopenharmony_ci{
120662306a36Sopenharmony_ci	mutex_lock(&vlan_ioctl_mutex);
120762306a36Sopenharmony_ci	vlan_ioctl_hook = hook;
120862306a36Sopenharmony_ci	mutex_unlock(&vlan_ioctl_mutex);
120962306a36Sopenharmony_ci}
121062306a36Sopenharmony_ciEXPORT_SYMBOL(vlan_ioctl_set);
121162306a36Sopenharmony_ci
121262306a36Sopenharmony_cistatic long sock_do_ioctl(struct net *net, struct socket *sock,
121362306a36Sopenharmony_ci			  unsigned int cmd, unsigned long arg)
121462306a36Sopenharmony_ci{
121562306a36Sopenharmony_ci	const struct proto_ops *ops = READ_ONCE(sock->ops);
121662306a36Sopenharmony_ci	struct ifreq ifr;
121762306a36Sopenharmony_ci	bool need_copyout;
121862306a36Sopenharmony_ci	int err;
121962306a36Sopenharmony_ci	void __user *argp = (void __user *)arg;
122062306a36Sopenharmony_ci	void __user *data;
122162306a36Sopenharmony_ci
122262306a36Sopenharmony_ci	err = ops->ioctl(sock, cmd, arg);
122362306a36Sopenharmony_ci
122462306a36Sopenharmony_ci	/*
122562306a36Sopenharmony_ci	 * If this ioctl is unknown try to hand it down
122662306a36Sopenharmony_ci	 * to the NIC driver.
122762306a36Sopenharmony_ci	 */
122862306a36Sopenharmony_ci	if (err != -ENOIOCTLCMD)
122962306a36Sopenharmony_ci		return err;
123062306a36Sopenharmony_ci
123162306a36Sopenharmony_ci	if (!is_socket_ioctl_cmd(cmd))
123262306a36Sopenharmony_ci		return -ENOTTY;
123362306a36Sopenharmony_ci
123462306a36Sopenharmony_ci	if (get_user_ifreq(&ifr, &data, argp))
123562306a36Sopenharmony_ci		return -EFAULT;
123662306a36Sopenharmony_ci	err = dev_ioctl(net, cmd, &ifr, data, &need_copyout);
123762306a36Sopenharmony_ci	if (!err && need_copyout)
123862306a36Sopenharmony_ci		if (put_user_ifreq(&ifr, argp))
123962306a36Sopenharmony_ci			return -EFAULT;
124062306a36Sopenharmony_ci
124162306a36Sopenharmony_ci	return err;
124262306a36Sopenharmony_ci}
124362306a36Sopenharmony_ci
124462306a36Sopenharmony_ci/*
124562306a36Sopenharmony_ci *	With an ioctl, arg may well be a user mode pointer, but we don't know
124662306a36Sopenharmony_ci *	what to do with it - that's up to the protocol still.
124762306a36Sopenharmony_ci */
124862306a36Sopenharmony_ci
124962306a36Sopenharmony_cistatic long sock_ioctl(struct file *file, unsigned cmd, unsigned long arg)
125062306a36Sopenharmony_ci{
125162306a36Sopenharmony_ci	const struct proto_ops  *ops;
125262306a36Sopenharmony_ci	struct socket *sock;
125362306a36Sopenharmony_ci	struct sock *sk;
125462306a36Sopenharmony_ci	void __user *argp = (void __user *)arg;
125562306a36Sopenharmony_ci	int pid, err;
125662306a36Sopenharmony_ci	struct net *net;
125762306a36Sopenharmony_ci
125862306a36Sopenharmony_ci	sock = file->private_data;
125962306a36Sopenharmony_ci	ops = READ_ONCE(sock->ops);
126062306a36Sopenharmony_ci	sk = sock->sk;
126162306a36Sopenharmony_ci	net = sock_net(sk);
126262306a36Sopenharmony_ci	if (unlikely(cmd >= SIOCDEVPRIVATE && cmd <= (SIOCDEVPRIVATE + 15))) {
126362306a36Sopenharmony_ci		struct ifreq ifr;
126462306a36Sopenharmony_ci		void __user *data;
126562306a36Sopenharmony_ci		bool need_copyout;
126662306a36Sopenharmony_ci		if (get_user_ifreq(&ifr, &data, argp))
126762306a36Sopenharmony_ci			return -EFAULT;
126862306a36Sopenharmony_ci		err = dev_ioctl(net, cmd, &ifr, data, &need_copyout);
126962306a36Sopenharmony_ci		if (!err && need_copyout)
127062306a36Sopenharmony_ci			if (put_user_ifreq(&ifr, argp))
127162306a36Sopenharmony_ci				return -EFAULT;
127262306a36Sopenharmony_ci	} else
127362306a36Sopenharmony_ci#ifdef CONFIG_WEXT_CORE
127462306a36Sopenharmony_ci	if (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST) {
127562306a36Sopenharmony_ci		err = wext_handle_ioctl(net, cmd, argp);
127662306a36Sopenharmony_ci	} else
127762306a36Sopenharmony_ci#endif
127862306a36Sopenharmony_ci		switch (cmd) {
127962306a36Sopenharmony_ci		case FIOSETOWN:
128062306a36Sopenharmony_ci		case SIOCSPGRP:
128162306a36Sopenharmony_ci			err = -EFAULT;
128262306a36Sopenharmony_ci			if (get_user(pid, (int __user *)argp))
128362306a36Sopenharmony_ci				break;
128462306a36Sopenharmony_ci			err = f_setown(sock->file, pid, 1);
128562306a36Sopenharmony_ci			break;
128662306a36Sopenharmony_ci		case FIOGETOWN:
128762306a36Sopenharmony_ci		case SIOCGPGRP:
128862306a36Sopenharmony_ci			err = put_user(f_getown(sock->file),
128962306a36Sopenharmony_ci				       (int __user *)argp);
129062306a36Sopenharmony_ci			break;
129162306a36Sopenharmony_ci		case SIOCGIFBR:
129262306a36Sopenharmony_ci		case SIOCSIFBR:
129362306a36Sopenharmony_ci		case SIOCBRADDBR:
129462306a36Sopenharmony_ci		case SIOCBRDELBR:
129562306a36Sopenharmony_ci			err = br_ioctl_call(net, NULL, cmd, NULL, argp);
129662306a36Sopenharmony_ci			break;
129762306a36Sopenharmony_ci		case SIOCGIFVLAN:
129862306a36Sopenharmony_ci		case SIOCSIFVLAN:
129962306a36Sopenharmony_ci			err = -ENOPKG;
130062306a36Sopenharmony_ci			if (!vlan_ioctl_hook)
130162306a36Sopenharmony_ci				request_module("8021q");
130262306a36Sopenharmony_ci
130362306a36Sopenharmony_ci			mutex_lock(&vlan_ioctl_mutex);
130462306a36Sopenharmony_ci			if (vlan_ioctl_hook)
130562306a36Sopenharmony_ci				err = vlan_ioctl_hook(net, argp);
130662306a36Sopenharmony_ci			mutex_unlock(&vlan_ioctl_mutex);
130762306a36Sopenharmony_ci			break;
130862306a36Sopenharmony_ci		case SIOCGSKNS:
130962306a36Sopenharmony_ci			err = -EPERM;
131062306a36Sopenharmony_ci			if (!ns_capable(net->user_ns, CAP_NET_ADMIN))
131162306a36Sopenharmony_ci				break;
131262306a36Sopenharmony_ci
131362306a36Sopenharmony_ci			err = open_related_ns(&net->ns, get_net_ns);
131462306a36Sopenharmony_ci			break;
131562306a36Sopenharmony_ci		case SIOCGSTAMP_OLD:
131662306a36Sopenharmony_ci		case SIOCGSTAMPNS_OLD:
131762306a36Sopenharmony_ci			if (!ops->gettstamp) {
131862306a36Sopenharmony_ci				err = -ENOIOCTLCMD;
131962306a36Sopenharmony_ci				break;
132062306a36Sopenharmony_ci			}
132162306a36Sopenharmony_ci			err = ops->gettstamp(sock, argp,
132262306a36Sopenharmony_ci					     cmd == SIOCGSTAMP_OLD,
132362306a36Sopenharmony_ci					     !IS_ENABLED(CONFIG_64BIT));
132462306a36Sopenharmony_ci			break;
132562306a36Sopenharmony_ci		case SIOCGSTAMP_NEW:
132662306a36Sopenharmony_ci		case SIOCGSTAMPNS_NEW:
132762306a36Sopenharmony_ci			if (!ops->gettstamp) {
132862306a36Sopenharmony_ci				err = -ENOIOCTLCMD;
132962306a36Sopenharmony_ci				break;
133062306a36Sopenharmony_ci			}
133162306a36Sopenharmony_ci			err = ops->gettstamp(sock, argp,
133262306a36Sopenharmony_ci					     cmd == SIOCGSTAMP_NEW,
133362306a36Sopenharmony_ci					     false);
133462306a36Sopenharmony_ci			break;
133562306a36Sopenharmony_ci
133662306a36Sopenharmony_ci		case SIOCGIFCONF:
133762306a36Sopenharmony_ci			err = dev_ifconf(net, argp);
133862306a36Sopenharmony_ci			break;
133962306a36Sopenharmony_ci
134062306a36Sopenharmony_ci		default:
134162306a36Sopenharmony_ci			err = sock_do_ioctl(net, sock, cmd, arg);
134262306a36Sopenharmony_ci			break;
134362306a36Sopenharmony_ci		}
134462306a36Sopenharmony_ci	return err;
134562306a36Sopenharmony_ci}
134662306a36Sopenharmony_ci
134762306a36Sopenharmony_ci/**
134862306a36Sopenharmony_ci *	sock_create_lite - creates a socket
134962306a36Sopenharmony_ci *	@family: protocol family (AF_INET, ...)
135062306a36Sopenharmony_ci *	@type: communication type (SOCK_STREAM, ...)
135162306a36Sopenharmony_ci *	@protocol: protocol (0, ...)
135262306a36Sopenharmony_ci *	@res: new socket
135362306a36Sopenharmony_ci *
135462306a36Sopenharmony_ci *	Creates a new socket and assigns it to @res, passing through LSM.
135562306a36Sopenharmony_ci *	The new socket initialization is not complete, see kernel_accept().
135662306a36Sopenharmony_ci *	Returns 0 or an error. On failure @res is set to %NULL.
135762306a36Sopenharmony_ci *	This function internally uses GFP_KERNEL.
135862306a36Sopenharmony_ci */
135962306a36Sopenharmony_ci
136062306a36Sopenharmony_ciint sock_create_lite(int family, int type, int protocol, struct socket **res)
136162306a36Sopenharmony_ci{
136262306a36Sopenharmony_ci	int err;
136362306a36Sopenharmony_ci	struct socket *sock = NULL;
136462306a36Sopenharmony_ci
136562306a36Sopenharmony_ci	err = security_socket_create(family, type, protocol, 1);
136662306a36Sopenharmony_ci	if (err)
136762306a36Sopenharmony_ci		goto out;
136862306a36Sopenharmony_ci
136962306a36Sopenharmony_ci	sock = sock_alloc();
137062306a36Sopenharmony_ci	if (!sock) {
137162306a36Sopenharmony_ci		err = -ENOMEM;
137262306a36Sopenharmony_ci		goto out;
137362306a36Sopenharmony_ci	}
137462306a36Sopenharmony_ci
137562306a36Sopenharmony_ci	sock->type = type;
137662306a36Sopenharmony_ci	err = security_socket_post_create(sock, family, type, protocol, 1);
137762306a36Sopenharmony_ci	if (err)
137862306a36Sopenharmony_ci		goto out_release;
137962306a36Sopenharmony_ci
138062306a36Sopenharmony_ciout:
138162306a36Sopenharmony_ci	*res = sock;
138262306a36Sopenharmony_ci	return err;
138362306a36Sopenharmony_ciout_release:
138462306a36Sopenharmony_ci	sock_release(sock);
138562306a36Sopenharmony_ci	sock = NULL;
138662306a36Sopenharmony_ci	goto out;
138762306a36Sopenharmony_ci}
138862306a36Sopenharmony_ciEXPORT_SYMBOL(sock_create_lite);
138962306a36Sopenharmony_ci
139062306a36Sopenharmony_ci/* No kernel lock held - perfect */
139162306a36Sopenharmony_cistatic __poll_t sock_poll(struct file *file, poll_table *wait)
139262306a36Sopenharmony_ci{
139362306a36Sopenharmony_ci	struct socket *sock = file->private_data;
139462306a36Sopenharmony_ci	const struct proto_ops *ops = READ_ONCE(sock->ops);
139562306a36Sopenharmony_ci	__poll_t events = poll_requested_events(wait), flag = 0;
139662306a36Sopenharmony_ci
139762306a36Sopenharmony_ci	if (!ops->poll)
139862306a36Sopenharmony_ci		return 0;
139962306a36Sopenharmony_ci
140062306a36Sopenharmony_ci	if (sk_can_busy_loop(sock->sk)) {
140162306a36Sopenharmony_ci		/* poll once if requested by the syscall */
140262306a36Sopenharmony_ci		if (events & POLL_BUSY_LOOP)
140362306a36Sopenharmony_ci			sk_busy_loop(sock->sk, 1);
140462306a36Sopenharmony_ci
140562306a36Sopenharmony_ci		/* if this socket can poll_ll, tell the system call */
140662306a36Sopenharmony_ci		flag = POLL_BUSY_LOOP;
140762306a36Sopenharmony_ci	}
140862306a36Sopenharmony_ci
140962306a36Sopenharmony_ci	return ops->poll(file, sock, wait) | flag;
141062306a36Sopenharmony_ci}
141162306a36Sopenharmony_ci
141262306a36Sopenharmony_cistatic int sock_mmap(struct file *file, struct vm_area_struct *vma)
141362306a36Sopenharmony_ci{
141462306a36Sopenharmony_ci	struct socket *sock = file->private_data;
141562306a36Sopenharmony_ci
141662306a36Sopenharmony_ci	return READ_ONCE(sock->ops)->mmap(file, sock, vma);
141762306a36Sopenharmony_ci}
141862306a36Sopenharmony_ci
141962306a36Sopenharmony_cistatic int sock_close(struct inode *inode, struct file *filp)
142062306a36Sopenharmony_ci{
142162306a36Sopenharmony_ci	__sock_release(SOCKET_I(inode), inode);
142262306a36Sopenharmony_ci	return 0;
142362306a36Sopenharmony_ci}
142462306a36Sopenharmony_ci
142562306a36Sopenharmony_ci/*
142662306a36Sopenharmony_ci *	Update the socket async list
142762306a36Sopenharmony_ci *
142862306a36Sopenharmony_ci *	Fasync_list locking strategy.
142962306a36Sopenharmony_ci *
143062306a36Sopenharmony_ci *	1. fasync_list is modified only under process context socket lock
143162306a36Sopenharmony_ci *	   i.e. under semaphore.
143262306a36Sopenharmony_ci *	2. fasync_list is used under read_lock(&sk->sk_callback_lock)
143362306a36Sopenharmony_ci *	   or under socket lock
143462306a36Sopenharmony_ci */
143562306a36Sopenharmony_ci
143662306a36Sopenharmony_cistatic int sock_fasync(int fd, struct file *filp, int on)
143762306a36Sopenharmony_ci{
143862306a36Sopenharmony_ci	struct socket *sock = filp->private_data;
143962306a36Sopenharmony_ci	struct sock *sk = sock->sk;
144062306a36Sopenharmony_ci	struct socket_wq *wq = &sock->wq;
144162306a36Sopenharmony_ci
144262306a36Sopenharmony_ci	if (sk == NULL)
144362306a36Sopenharmony_ci		return -EINVAL;
144462306a36Sopenharmony_ci
144562306a36Sopenharmony_ci	lock_sock(sk);
144662306a36Sopenharmony_ci	fasync_helper(fd, filp, on, &wq->fasync_list);
144762306a36Sopenharmony_ci
144862306a36Sopenharmony_ci	if (!wq->fasync_list)
144962306a36Sopenharmony_ci		sock_reset_flag(sk, SOCK_FASYNC);
145062306a36Sopenharmony_ci	else
145162306a36Sopenharmony_ci		sock_set_flag(sk, SOCK_FASYNC);
145262306a36Sopenharmony_ci
145362306a36Sopenharmony_ci	release_sock(sk);
145462306a36Sopenharmony_ci	return 0;
145562306a36Sopenharmony_ci}
145662306a36Sopenharmony_ci
145762306a36Sopenharmony_ci/* This function may be called only under rcu_lock */
145862306a36Sopenharmony_ci
145962306a36Sopenharmony_ciint sock_wake_async(struct socket_wq *wq, int how, int band)
146062306a36Sopenharmony_ci{
146162306a36Sopenharmony_ci	if (!wq || !wq->fasync_list)
146262306a36Sopenharmony_ci		return -1;
146362306a36Sopenharmony_ci
146462306a36Sopenharmony_ci	switch (how) {
146562306a36Sopenharmony_ci	case SOCK_WAKE_WAITD:
146662306a36Sopenharmony_ci		if (test_bit(SOCKWQ_ASYNC_WAITDATA, &wq->flags))
146762306a36Sopenharmony_ci			break;
146862306a36Sopenharmony_ci		goto call_kill;
146962306a36Sopenharmony_ci	case SOCK_WAKE_SPACE:
147062306a36Sopenharmony_ci		if (!test_and_clear_bit(SOCKWQ_ASYNC_NOSPACE, &wq->flags))
147162306a36Sopenharmony_ci			break;
147262306a36Sopenharmony_ci		fallthrough;
147362306a36Sopenharmony_ci	case SOCK_WAKE_IO:
147462306a36Sopenharmony_cicall_kill:
147562306a36Sopenharmony_ci		kill_fasync(&wq->fasync_list, SIGIO, band);
147662306a36Sopenharmony_ci		break;
147762306a36Sopenharmony_ci	case SOCK_WAKE_URG:
147862306a36Sopenharmony_ci		kill_fasync(&wq->fasync_list, SIGURG, band);
147962306a36Sopenharmony_ci	}
148062306a36Sopenharmony_ci
148162306a36Sopenharmony_ci	return 0;
148262306a36Sopenharmony_ci}
148362306a36Sopenharmony_ciEXPORT_SYMBOL(sock_wake_async);
148462306a36Sopenharmony_ci
148562306a36Sopenharmony_ci/**
148662306a36Sopenharmony_ci *	__sock_create - creates a socket
148762306a36Sopenharmony_ci *	@net: net namespace
148862306a36Sopenharmony_ci *	@family: protocol family (AF_INET, ...)
148962306a36Sopenharmony_ci *	@type: communication type (SOCK_STREAM, ...)
149062306a36Sopenharmony_ci *	@protocol: protocol (0, ...)
149162306a36Sopenharmony_ci *	@res: new socket
149262306a36Sopenharmony_ci *	@kern: boolean for kernel space sockets
149362306a36Sopenharmony_ci *
149462306a36Sopenharmony_ci *	Creates a new socket and assigns it to @res, passing through LSM.
149562306a36Sopenharmony_ci *	Returns 0 or an error. On failure @res is set to %NULL. @kern must
149662306a36Sopenharmony_ci *	be set to true if the socket resides in kernel space.
149762306a36Sopenharmony_ci *	This function internally uses GFP_KERNEL.
149862306a36Sopenharmony_ci */
149962306a36Sopenharmony_ci
150062306a36Sopenharmony_ciint __sock_create(struct net *net, int family, int type, int protocol,
150162306a36Sopenharmony_ci			 struct socket **res, int kern)
150262306a36Sopenharmony_ci{
150362306a36Sopenharmony_ci	int err;
150462306a36Sopenharmony_ci	struct socket *sock;
150562306a36Sopenharmony_ci	const struct net_proto_family *pf;
150662306a36Sopenharmony_ci
150762306a36Sopenharmony_ci	/*
150862306a36Sopenharmony_ci	 *      Check protocol is in range
150962306a36Sopenharmony_ci	 */
151062306a36Sopenharmony_ci	if (family < 0 || family >= NPROTO)
151162306a36Sopenharmony_ci		return -EAFNOSUPPORT;
151262306a36Sopenharmony_ci	if (type < 0 || type >= SOCK_MAX)
151362306a36Sopenharmony_ci		return -EINVAL;
151462306a36Sopenharmony_ci
151562306a36Sopenharmony_ci	/* Compatibility.
151662306a36Sopenharmony_ci
151762306a36Sopenharmony_ci	   This uglymoron is moved from INET layer to here to avoid
151862306a36Sopenharmony_ci	   deadlock in module load.
151962306a36Sopenharmony_ci	 */
152062306a36Sopenharmony_ci	if (family == PF_INET && type == SOCK_PACKET) {
152162306a36Sopenharmony_ci		pr_info_once("%s uses obsolete (PF_INET,SOCK_PACKET)\n",
152262306a36Sopenharmony_ci			     current->comm);
152362306a36Sopenharmony_ci		family = PF_PACKET;
152462306a36Sopenharmony_ci	}
152562306a36Sopenharmony_ci
152662306a36Sopenharmony_ci	err = security_socket_create(family, type, protocol, kern);
152762306a36Sopenharmony_ci	if (err)
152862306a36Sopenharmony_ci		return err;
152962306a36Sopenharmony_ci
153062306a36Sopenharmony_ci	/*
153162306a36Sopenharmony_ci	 *	Allocate the socket and allow the family to set things up. if
153262306a36Sopenharmony_ci	 *	the protocol is 0, the family is instructed to select an appropriate
153362306a36Sopenharmony_ci	 *	default.
153462306a36Sopenharmony_ci	 */
153562306a36Sopenharmony_ci	sock = sock_alloc();
153662306a36Sopenharmony_ci	if (!sock) {
153762306a36Sopenharmony_ci		net_warn_ratelimited("socket: no more sockets\n");
153862306a36Sopenharmony_ci		return -ENFILE;	/* Not exactly a match, but its the
153962306a36Sopenharmony_ci				   closest posix thing */
154062306a36Sopenharmony_ci	}
154162306a36Sopenharmony_ci
154262306a36Sopenharmony_ci	sock->type = type;
154362306a36Sopenharmony_ci
154462306a36Sopenharmony_ci#ifdef CONFIG_MODULES
154562306a36Sopenharmony_ci	/* Attempt to load a protocol module if the find failed.
154662306a36Sopenharmony_ci	 *
154762306a36Sopenharmony_ci	 * 12/09/1996 Marcin: But! this makes REALLY only sense, if the user
154862306a36Sopenharmony_ci	 * requested real, full-featured networking support upon configuration.
154962306a36Sopenharmony_ci	 * Otherwise module support will break!
155062306a36Sopenharmony_ci	 */
155162306a36Sopenharmony_ci	if (rcu_access_pointer(net_families[family]) == NULL)
155262306a36Sopenharmony_ci		request_module("net-pf-%d", family);
155362306a36Sopenharmony_ci#endif
155462306a36Sopenharmony_ci
155562306a36Sopenharmony_ci	rcu_read_lock();
155662306a36Sopenharmony_ci	pf = rcu_dereference(net_families[family]);
155762306a36Sopenharmony_ci	err = -EAFNOSUPPORT;
155862306a36Sopenharmony_ci	if (!pf)
155962306a36Sopenharmony_ci		goto out_release;
156062306a36Sopenharmony_ci
156162306a36Sopenharmony_ci	/*
156262306a36Sopenharmony_ci	 * We will call the ->create function, that possibly is in a loadable
156362306a36Sopenharmony_ci	 * module, so we have to bump that loadable module refcnt first.
156462306a36Sopenharmony_ci	 */
156562306a36Sopenharmony_ci	if (!try_module_get(pf->owner))
156662306a36Sopenharmony_ci		goto out_release;
156762306a36Sopenharmony_ci
156862306a36Sopenharmony_ci	/* Now protected by module ref count */
156962306a36Sopenharmony_ci	rcu_read_unlock();
157062306a36Sopenharmony_ci
157162306a36Sopenharmony_ci	err = pf->create(net, sock, protocol, kern);
157262306a36Sopenharmony_ci	if (err < 0)
157362306a36Sopenharmony_ci		goto out_module_put;
157462306a36Sopenharmony_ci
157562306a36Sopenharmony_ci	/*
157662306a36Sopenharmony_ci	 * Now to bump the refcnt of the [loadable] module that owns this
157762306a36Sopenharmony_ci	 * socket at sock_release time we decrement its refcnt.
157862306a36Sopenharmony_ci	 */
157962306a36Sopenharmony_ci	if (!try_module_get(sock->ops->owner))
158062306a36Sopenharmony_ci		goto out_module_busy;
158162306a36Sopenharmony_ci
158262306a36Sopenharmony_ci	/*
158362306a36Sopenharmony_ci	 * Now that we're done with the ->create function, the [loadable]
158462306a36Sopenharmony_ci	 * module can have its refcnt decremented
158562306a36Sopenharmony_ci	 */
158662306a36Sopenharmony_ci	module_put(pf->owner);
158762306a36Sopenharmony_ci	err = security_socket_post_create(sock, family, type, protocol, kern);
158862306a36Sopenharmony_ci	if (err)
158962306a36Sopenharmony_ci		goto out_sock_release;
159062306a36Sopenharmony_ci	*res = sock;
159162306a36Sopenharmony_ci
159262306a36Sopenharmony_ci	return 0;
159362306a36Sopenharmony_ci
159462306a36Sopenharmony_ciout_module_busy:
159562306a36Sopenharmony_ci	err = -EAFNOSUPPORT;
159662306a36Sopenharmony_ciout_module_put:
159762306a36Sopenharmony_ci	sock->ops = NULL;
159862306a36Sopenharmony_ci	module_put(pf->owner);
159962306a36Sopenharmony_ciout_sock_release:
160062306a36Sopenharmony_ci	sock_release(sock);
160162306a36Sopenharmony_ci	return err;
160262306a36Sopenharmony_ci
160362306a36Sopenharmony_ciout_release:
160462306a36Sopenharmony_ci	rcu_read_unlock();
160562306a36Sopenharmony_ci	goto out_sock_release;
160662306a36Sopenharmony_ci}
160762306a36Sopenharmony_ciEXPORT_SYMBOL(__sock_create);
160862306a36Sopenharmony_ci
160962306a36Sopenharmony_ci/**
161062306a36Sopenharmony_ci *	sock_create - creates a socket
161162306a36Sopenharmony_ci *	@family: protocol family (AF_INET, ...)
161262306a36Sopenharmony_ci *	@type: communication type (SOCK_STREAM, ...)
161362306a36Sopenharmony_ci *	@protocol: protocol (0, ...)
161462306a36Sopenharmony_ci *	@res: new socket
161562306a36Sopenharmony_ci *
161662306a36Sopenharmony_ci *	A wrapper around __sock_create().
161762306a36Sopenharmony_ci *	Returns 0 or an error. This function internally uses GFP_KERNEL.
161862306a36Sopenharmony_ci */
161962306a36Sopenharmony_ci
162062306a36Sopenharmony_ciint sock_create(int family, int type, int protocol, struct socket **res)
162162306a36Sopenharmony_ci{
162262306a36Sopenharmony_ci	return __sock_create(current->nsproxy->net_ns, family, type, protocol, res, 0);
162362306a36Sopenharmony_ci}
162462306a36Sopenharmony_ciEXPORT_SYMBOL(sock_create);
162562306a36Sopenharmony_ci
162662306a36Sopenharmony_ci/**
162762306a36Sopenharmony_ci *	sock_create_kern - creates a socket (kernel space)
162862306a36Sopenharmony_ci *	@net: net namespace
162962306a36Sopenharmony_ci *	@family: protocol family (AF_INET, ...)
163062306a36Sopenharmony_ci *	@type: communication type (SOCK_STREAM, ...)
163162306a36Sopenharmony_ci *	@protocol: protocol (0, ...)
163262306a36Sopenharmony_ci *	@res: new socket
163362306a36Sopenharmony_ci *
163462306a36Sopenharmony_ci *	A wrapper around __sock_create().
163562306a36Sopenharmony_ci *	Returns 0 or an error. This function internally uses GFP_KERNEL.
163662306a36Sopenharmony_ci */
163762306a36Sopenharmony_ci
163862306a36Sopenharmony_ciint sock_create_kern(struct net *net, int family, int type, int protocol, struct socket **res)
163962306a36Sopenharmony_ci{
164062306a36Sopenharmony_ci	return __sock_create(net, family, type, protocol, res, 1);
164162306a36Sopenharmony_ci}
164262306a36Sopenharmony_ciEXPORT_SYMBOL(sock_create_kern);
164362306a36Sopenharmony_ci
164462306a36Sopenharmony_cistatic struct socket *__sys_socket_create(int family, int type, int protocol)
164562306a36Sopenharmony_ci{
164662306a36Sopenharmony_ci	struct socket *sock;
164762306a36Sopenharmony_ci	int retval;
164862306a36Sopenharmony_ci
164962306a36Sopenharmony_ci	/* Check the SOCK_* constants for consistency.  */
165062306a36Sopenharmony_ci	BUILD_BUG_ON(SOCK_CLOEXEC != O_CLOEXEC);
165162306a36Sopenharmony_ci	BUILD_BUG_ON((SOCK_MAX | SOCK_TYPE_MASK) != SOCK_TYPE_MASK);
165262306a36Sopenharmony_ci	BUILD_BUG_ON(SOCK_CLOEXEC & SOCK_TYPE_MASK);
165362306a36Sopenharmony_ci	BUILD_BUG_ON(SOCK_NONBLOCK & SOCK_TYPE_MASK);
165462306a36Sopenharmony_ci
165562306a36Sopenharmony_ci	if ((type & ~SOCK_TYPE_MASK) & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
165662306a36Sopenharmony_ci		return ERR_PTR(-EINVAL);
165762306a36Sopenharmony_ci	type &= SOCK_TYPE_MASK;
165862306a36Sopenharmony_ci
165962306a36Sopenharmony_ci	retval = sock_create(family, type, protocol, &sock);
166062306a36Sopenharmony_ci	if (retval < 0)
166162306a36Sopenharmony_ci		return ERR_PTR(retval);
166262306a36Sopenharmony_ci
166362306a36Sopenharmony_ci	return sock;
166462306a36Sopenharmony_ci}
166562306a36Sopenharmony_ci
166662306a36Sopenharmony_cistruct file *__sys_socket_file(int family, int type, int protocol)
166762306a36Sopenharmony_ci{
166862306a36Sopenharmony_ci	struct socket *sock;
166962306a36Sopenharmony_ci	int flags;
167062306a36Sopenharmony_ci
167162306a36Sopenharmony_ci	sock = __sys_socket_create(family, type, protocol);
167262306a36Sopenharmony_ci	if (IS_ERR(sock))
167362306a36Sopenharmony_ci		return ERR_CAST(sock);
167462306a36Sopenharmony_ci
167562306a36Sopenharmony_ci	flags = type & ~SOCK_TYPE_MASK;
167662306a36Sopenharmony_ci	if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
167762306a36Sopenharmony_ci		flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
167862306a36Sopenharmony_ci
167962306a36Sopenharmony_ci	return sock_alloc_file(sock, flags, NULL);
168062306a36Sopenharmony_ci}
168162306a36Sopenharmony_ci
168262306a36Sopenharmony_ci/*	A hook for bpf progs to attach to and update socket protocol.
168362306a36Sopenharmony_ci *
168462306a36Sopenharmony_ci *	A static noinline declaration here could cause the compiler to
168562306a36Sopenharmony_ci *	optimize away the function. A global noinline declaration will
168662306a36Sopenharmony_ci *	keep the definition, but may optimize away the callsite.
168762306a36Sopenharmony_ci *	Therefore, __weak is needed to ensure that the call is still
168862306a36Sopenharmony_ci *	emitted, by telling the compiler that we don't know what the
168962306a36Sopenharmony_ci *	function might eventually be.
169062306a36Sopenharmony_ci *
169162306a36Sopenharmony_ci *	__diag_* below are needed to dismiss the missing prototype warning.
169262306a36Sopenharmony_ci */
169362306a36Sopenharmony_ci
169462306a36Sopenharmony_ci__diag_push();
169562306a36Sopenharmony_ci__diag_ignore_all("-Wmissing-prototypes",
169662306a36Sopenharmony_ci		  "A fmod_ret entry point for BPF programs");
169762306a36Sopenharmony_ci
169862306a36Sopenharmony_ci__weak noinline int update_socket_protocol(int family, int type, int protocol)
169962306a36Sopenharmony_ci{
170062306a36Sopenharmony_ci	return protocol;
170162306a36Sopenharmony_ci}
170262306a36Sopenharmony_ci
170362306a36Sopenharmony_ci__diag_pop();
170462306a36Sopenharmony_ci
170562306a36Sopenharmony_ciint __sys_socket(int family, int type, int protocol)
170662306a36Sopenharmony_ci{
170762306a36Sopenharmony_ci	struct socket *sock;
170862306a36Sopenharmony_ci	int flags;
170962306a36Sopenharmony_ci
171062306a36Sopenharmony_ci	sock = __sys_socket_create(family, type,
171162306a36Sopenharmony_ci				   update_socket_protocol(family, type, protocol));
171262306a36Sopenharmony_ci	if (IS_ERR(sock))
171362306a36Sopenharmony_ci		return PTR_ERR(sock);
171462306a36Sopenharmony_ci
171562306a36Sopenharmony_ci	flags = type & ~SOCK_TYPE_MASK;
171662306a36Sopenharmony_ci	if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
171762306a36Sopenharmony_ci		flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
171862306a36Sopenharmony_ci
171962306a36Sopenharmony_ci	return sock_map_fd(sock, flags & (O_CLOEXEC | O_NONBLOCK));
172062306a36Sopenharmony_ci}
172162306a36Sopenharmony_ci
172262306a36Sopenharmony_ciSYSCALL_DEFINE3(socket, int, family, int, type, int, protocol)
172362306a36Sopenharmony_ci{
172462306a36Sopenharmony_ci	return __sys_socket(family, type, protocol);
172562306a36Sopenharmony_ci}
172662306a36Sopenharmony_ci
172762306a36Sopenharmony_ci/*
172862306a36Sopenharmony_ci *	Create a pair of connected sockets.
172962306a36Sopenharmony_ci */
173062306a36Sopenharmony_ci
173162306a36Sopenharmony_ciint __sys_socketpair(int family, int type, int protocol, int __user *usockvec)
173262306a36Sopenharmony_ci{
173362306a36Sopenharmony_ci	struct socket *sock1, *sock2;
173462306a36Sopenharmony_ci	int fd1, fd2, err;
173562306a36Sopenharmony_ci	struct file *newfile1, *newfile2;
173662306a36Sopenharmony_ci	int flags;
173762306a36Sopenharmony_ci
173862306a36Sopenharmony_ci	flags = type & ~SOCK_TYPE_MASK;
173962306a36Sopenharmony_ci	if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
174062306a36Sopenharmony_ci		return -EINVAL;
174162306a36Sopenharmony_ci	type &= SOCK_TYPE_MASK;
174262306a36Sopenharmony_ci
174362306a36Sopenharmony_ci	if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
174462306a36Sopenharmony_ci		flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
174562306a36Sopenharmony_ci
174662306a36Sopenharmony_ci	/*
174762306a36Sopenharmony_ci	 * reserve descriptors and make sure we won't fail
174862306a36Sopenharmony_ci	 * to return them to userland.
174962306a36Sopenharmony_ci	 */
175062306a36Sopenharmony_ci	fd1 = get_unused_fd_flags(flags);
175162306a36Sopenharmony_ci	if (unlikely(fd1 < 0))
175262306a36Sopenharmony_ci		return fd1;
175362306a36Sopenharmony_ci
175462306a36Sopenharmony_ci	fd2 = get_unused_fd_flags(flags);
175562306a36Sopenharmony_ci	if (unlikely(fd2 < 0)) {
175662306a36Sopenharmony_ci		put_unused_fd(fd1);
175762306a36Sopenharmony_ci		return fd2;
175862306a36Sopenharmony_ci	}
175962306a36Sopenharmony_ci
176062306a36Sopenharmony_ci	err = put_user(fd1, &usockvec[0]);
176162306a36Sopenharmony_ci	if (err)
176262306a36Sopenharmony_ci		goto out;
176362306a36Sopenharmony_ci
176462306a36Sopenharmony_ci	err = put_user(fd2, &usockvec[1]);
176562306a36Sopenharmony_ci	if (err)
176662306a36Sopenharmony_ci		goto out;
176762306a36Sopenharmony_ci
176862306a36Sopenharmony_ci	/*
176962306a36Sopenharmony_ci	 * Obtain the first socket and check if the underlying protocol
177062306a36Sopenharmony_ci	 * supports the socketpair call.
177162306a36Sopenharmony_ci	 */
177262306a36Sopenharmony_ci
177362306a36Sopenharmony_ci	err = sock_create(family, type, protocol, &sock1);
177462306a36Sopenharmony_ci	if (unlikely(err < 0))
177562306a36Sopenharmony_ci		goto out;
177662306a36Sopenharmony_ci
177762306a36Sopenharmony_ci	err = sock_create(family, type, protocol, &sock2);
177862306a36Sopenharmony_ci	if (unlikely(err < 0)) {
177962306a36Sopenharmony_ci		sock_release(sock1);
178062306a36Sopenharmony_ci		goto out;
178162306a36Sopenharmony_ci	}
178262306a36Sopenharmony_ci
178362306a36Sopenharmony_ci	err = security_socket_socketpair(sock1, sock2);
178462306a36Sopenharmony_ci	if (unlikely(err)) {
178562306a36Sopenharmony_ci		sock_release(sock2);
178662306a36Sopenharmony_ci		sock_release(sock1);
178762306a36Sopenharmony_ci		goto out;
178862306a36Sopenharmony_ci	}
178962306a36Sopenharmony_ci
179062306a36Sopenharmony_ci	err = READ_ONCE(sock1->ops)->socketpair(sock1, sock2);
179162306a36Sopenharmony_ci	if (unlikely(err < 0)) {
179262306a36Sopenharmony_ci		sock_release(sock2);
179362306a36Sopenharmony_ci		sock_release(sock1);
179462306a36Sopenharmony_ci		goto out;
179562306a36Sopenharmony_ci	}
179662306a36Sopenharmony_ci
179762306a36Sopenharmony_ci	newfile1 = sock_alloc_file(sock1, flags, NULL);
179862306a36Sopenharmony_ci	if (IS_ERR(newfile1)) {
179962306a36Sopenharmony_ci		err = PTR_ERR(newfile1);
180062306a36Sopenharmony_ci		sock_release(sock2);
180162306a36Sopenharmony_ci		goto out;
180262306a36Sopenharmony_ci	}
180362306a36Sopenharmony_ci
180462306a36Sopenharmony_ci	newfile2 = sock_alloc_file(sock2, flags, NULL);
180562306a36Sopenharmony_ci	if (IS_ERR(newfile2)) {
180662306a36Sopenharmony_ci		err = PTR_ERR(newfile2);
180762306a36Sopenharmony_ci		fput(newfile1);
180862306a36Sopenharmony_ci		goto out;
180962306a36Sopenharmony_ci	}
181062306a36Sopenharmony_ci
181162306a36Sopenharmony_ci	audit_fd_pair(fd1, fd2);
181262306a36Sopenharmony_ci
181362306a36Sopenharmony_ci	fd_install(fd1, newfile1);
181462306a36Sopenharmony_ci	fd_install(fd2, newfile2);
181562306a36Sopenharmony_ci	return 0;
181662306a36Sopenharmony_ci
181762306a36Sopenharmony_ciout:
181862306a36Sopenharmony_ci	put_unused_fd(fd2);
181962306a36Sopenharmony_ci	put_unused_fd(fd1);
182062306a36Sopenharmony_ci	return err;
182162306a36Sopenharmony_ci}
182262306a36Sopenharmony_ci
182362306a36Sopenharmony_ciSYSCALL_DEFINE4(socketpair, int, family, int, type, int, protocol,
182462306a36Sopenharmony_ci		int __user *, usockvec)
182562306a36Sopenharmony_ci{
182662306a36Sopenharmony_ci	return __sys_socketpair(family, type, protocol, usockvec);
182762306a36Sopenharmony_ci}
182862306a36Sopenharmony_ci
182962306a36Sopenharmony_ci/*
183062306a36Sopenharmony_ci *	Bind a name to a socket. Nothing much to do here since it's
183162306a36Sopenharmony_ci *	the protocol's responsibility to handle the local address.
183262306a36Sopenharmony_ci *
183362306a36Sopenharmony_ci *	We move the socket address to kernel space before we call
183462306a36Sopenharmony_ci *	the protocol layer (having also checked the address is ok).
183562306a36Sopenharmony_ci */
183662306a36Sopenharmony_ci
183762306a36Sopenharmony_ciint __sys_bind(int fd, struct sockaddr __user *umyaddr, int addrlen)
183862306a36Sopenharmony_ci{
183962306a36Sopenharmony_ci	struct socket *sock;
184062306a36Sopenharmony_ci	struct sockaddr_storage address;
184162306a36Sopenharmony_ci	int err, fput_needed;
184262306a36Sopenharmony_ci
184362306a36Sopenharmony_ci	sock = sockfd_lookup_light(fd, &err, &fput_needed);
184462306a36Sopenharmony_ci	if (sock) {
184562306a36Sopenharmony_ci		err = move_addr_to_kernel(umyaddr, addrlen, &address);
184662306a36Sopenharmony_ci		if (!err) {
184762306a36Sopenharmony_ci			err = security_socket_bind(sock,
184862306a36Sopenharmony_ci						   (struct sockaddr *)&address,
184962306a36Sopenharmony_ci						   addrlen);
185062306a36Sopenharmony_ci			if (!err)
185162306a36Sopenharmony_ci				err = READ_ONCE(sock->ops)->bind(sock,
185262306a36Sopenharmony_ci						      (struct sockaddr *)
185362306a36Sopenharmony_ci						      &address, addrlen);
185462306a36Sopenharmony_ci		}
185562306a36Sopenharmony_ci		fput_light(sock->file, fput_needed);
185662306a36Sopenharmony_ci	}
185762306a36Sopenharmony_ci	return err;
185862306a36Sopenharmony_ci}
185962306a36Sopenharmony_ci
186062306a36Sopenharmony_ciSYSCALL_DEFINE3(bind, int, fd, struct sockaddr __user *, umyaddr, int, addrlen)
186162306a36Sopenharmony_ci{
186262306a36Sopenharmony_ci	return __sys_bind(fd, umyaddr, addrlen);
186362306a36Sopenharmony_ci}
186462306a36Sopenharmony_ci
186562306a36Sopenharmony_ci/*
186662306a36Sopenharmony_ci *	Perform a listen. Basically, we allow the protocol to do anything
186762306a36Sopenharmony_ci *	necessary for a listen, and if that works, we mark the socket as
186862306a36Sopenharmony_ci *	ready for listening.
186962306a36Sopenharmony_ci */
187062306a36Sopenharmony_ci
187162306a36Sopenharmony_ciint __sys_listen(int fd, int backlog)
187262306a36Sopenharmony_ci{
187362306a36Sopenharmony_ci	struct socket *sock;
187462306a36Sopenharmony_ci	int err, fput_needed;
187562306a36Sopenharmony_ci	int somaxconn;
187662306a36Sopenharmony_ci
187762306a36Sopenharmony_ci	sock = sockfd_lookup_light(fd, &err, &fput_needed);
187862306a36Sopenharmony_ci	if (sock) {
187962306a36Sopenharmony_ci		somaxconn = READ_ONCE(sock_net(sock->sk)->core.sysctl_somaxconn);
188062306a36Sopenharmony_ci		if ((unsigned int)backlog > somaxconn)
188162306a36Sopenharmony_ci			backlog = somaxconn;
188262306a36Sopenharmony_ci
188362306a36Sopenharmony_ci		err = security_socket_listen(sock, backlog);
188462306a36Sopenharmony_ci		if (!err)
188562306a36Sopenharmony_ci			err = READ_ONCE(sock->ops)->listen(sock, backlog);
188662306a36Sopenharmony_ci
188762306a36Sopenharmony_ci		fput_light(sock->file, fput_needed);
188862306a36Sopenharmony_ci	}
188962306a36Sopenharmony_ci	return err;
189062306a36Sopenharmony_ci}
189162306a36Sopenharmony_ci
189262306a36Sopenharmony_ciSYSCALL_DEFINE2(listen, int, fd, int, backlog)
189362306a36Sopenharmony_ci{
189462306a36Sopenharmony_ci	return __sys_listen(fd, backlog);
189562306a36Sopenharmony_ci}
189662306a36Sopenharmony_ci
189762306a36Sopenharmony_cistruct file *do_accept(struct file *file, unsigned file_flags,
189862306a36Sopenharmony_ci		       struct sockaddr __user *upeer_sockaddr,
189962306a36Sopenharmony_ci		       int __user *upeer_addrlen, int flags)
190062306a36Sopenharmony_ci{
190162306a36Sopenharmony_ci	struct socket *sock, *newsock;
190262306a36Sopenharmony_ci	struct file *newfile;
190362306a36Sopenharmony_ci	int err, len;
190462306a36Sopenharmony_ci	struct sockaddr_storage address;
190562306a36Sopenharmony_ci	const struct proto_ops *ops;
190662306a36Sopenharmony_ci
190762306a36Sopenharmony_ci	sock = sock_from_file(file);
190862306a36Sopenharmony_ci	if (!sock)
190962306a36Sopenharmony_ci		return ERR_PTR(-ENOTSOCK);
191062306a36Sopenharmony_ci
191162306a36Sopenharmony_ci	newsock = sock_alloc();
191262306a36Sopenharmony_ci	if (!newsock)
191362306a36Sopenharmony_ci		return ERR_PTR(-ENFILE);
191462306a36Sopenharmony_ci	ops = READ_ONCE(sock->ops);
191562306a36Sopenharmony_ci
191662306a36Sopenharmony_ci	newsock->type = sock->type;
191762306a36Sopenharmony_ci	newsock->ops = ops;
191862306a36Sopenharmony_ci
191962306a36Sopenharmony_ci	/*
192062306a36Sopenharmony_ci	 * We don't need try_module_get here, as the listening socket (sock)
192162306a36Sopenharmony_ci	 * has the protocol module (sock->ops->owner) held.
192262306a36Sopenharmony_ci	 */
192362306a36Sopenharmony_ci	__module_get(ops->owner);
192462306a36Sopenharmony_ci
192562306a36Sopenharmony_ci	newfile = sock_alloc_file(newsock, flags, sock->sk->sk_prot_creator->name);
192662306a36Sopenharmony_ci	if (IS_ERR(newfile))
192762306a36Sopenharmony_ci		return newfile;
192862306a36Sopenharmony_ci
192962306a36Sopenharmony_ci	err = security_socket_accept(sock, newsock);
193062306a36Sopenharmony_ci	if (err)
193162306a36Sopenharmony_ci		goto out_fd;
193262306a36Sopenharmony_ci
193362306a36Sopenharmony_ci	err = ops->accept(sock, newsock, sock->file->f_flags | file_flags,
193462306a36Sopenharmony_ci					false);
193562306a36Sopenharmony_ci	if (err < 0)
193662306a36Sopenharmony_ci		goto out_fd;
193762306a36Sopenharmony_ci
193862306a36Sopenharmony_ci	if (upeer_sockaddr) {
193962306a36Sopenharmony_ci		len = ops->getname(newsock, (struct sockaddr *)&address, 2);
194062306a36Sopenharmony_ci		if (len < 0) {
194162306a36Sopenharmony_ci			err = -ECONNABORTED;
194262306a36Sopenharmony_ci			goto out_fd;
194362306a36Sopenharmony_ci		}
194462306a36Sopenharmony_ci		err = move_addr_to_user(&address,
194562306a36Sopenharmony_ci					len, upeer_sockaddr, upeer_addrlen);
194662306a36Sopenharmony_ci		if (err < 0)
194762306a36Sopenharmony_ci			goto out_fd;
194862306a36Sopenharmony_ci	}
194962306a36Sopenharmony_ci
195062306a36Sopenharmony_ci	/* File flags are not inherited via accept() unlike another OSes. */
195162306a36Sopenharmony_ci	return newfile;
195262306a36Sopenharmony_ciout_fd:
195362306a36Sopenharmony_ci	fput(newfile);
195462306a36Sopenharmony_ci	return ERR_PTR(err);
195562306a36Sopenharmony_ci}
195662306a36Sopenharmony_ci
195762306a36Sopenharmony_cistatic int __sys_accept4_file(struct file *file, struct sockaddr __user *upeer_sockaddr,
195862306a36Sopenharmony_ci			      int __user *upeer_addrlen, int flags)
195962306a36Sopenharmony_ci{
196062306a36Sopenharmony_ci	struct file *newfile;
196162306a36Sopenharmony_ci	int newfd;
196262306a36Sopenharmony_ci
196362306a36Sopenharmony_ci	if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
196462306a36Sopenharmony_ci		return -EINVAL;
196562306a36Sopenharmony_ci
196662306a36Sopenharmony_ci	if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
196762306a36Sopenharmony_ci		flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
196862306a36Sopenharmony_ci
196962306a36Sopenharmony_ci	newfd = get_unused_fd_flags(flags);
197062306a36Sopenharmony_ci	if (unlikely(newfd < 0))
197162306a36Sopenharmony_ci		return newfd;
197262306a36Sopenharmony_ci
197362306a36Sopenharmony_ci	newfile = do_accept(file, 0, upeer_sockaddr, upeer_addrlen,
197462306a36Sopenharmony_ci			    flags);
197562306a36Sopenharmony_ci	if (IS_ERR(newfile)) {
197662306a36Sopenharmony_ci		put_unused_fd(newfd);
197762306a36Sopenharmony_ci		return PTR_ERR(newfile);
197862306a36Sopenharmony_ci	}
197962306a36Sopenharmony_ci	fd_install(newfd, newfile);
198062306a36Sopenharmony_ci	return newfd;
198162306a36Sopenharmony_ci}
198262306a36Sopenharmony_ci
198362306a36Sopenharmony_ci/*
198462306a36Sopenharmony_ci *	For accept, we attempt to create a new socket, set up the link
198562306a36Sopenharmony_ci *	with the client, wake up the client, then return the new
198662306a36Sopenharmony_ci *	connected fd. We collect the address of the connector in kernel
198762306a36Sopenharmony_ci *	space and move it to user at the very end. This is unclean because
198862306a36Sopenharmony_ci *	we open the socket then return an error.
198962306a36Sopenharmony_ci *
199062306a36Sopenharmony_ci *	1003.1g adds the ability to recvmsg() to query connection pending
199162306a36Sopenharmony_ci *	status to recvmsg. We need to add that support in a way thats
199262306a36Sopenharmony_ci *	clean when we restructure accept also.
199362306a36Sopenharmony_ci */
199462306a36Sopenharmony_ci
199562306a36Sopenharmony_ciint __sys_accept4(int fd, struct sockaddr __user *upeer_sockaddr,
199662306a36Sopenharmony_ci		  int __user *upeer_addrlen, int flags)
199762306a36Sopenharmony_ci{
199862306a36Sopenharmony_ci	int ret = -EBADF;
199962306a36Sopenharmony_ci	struct fd f;
200062306a36Sopenharmony_ci
200162306a36Sopenharmony_ci	f = fdget(fd);
200262306a36Sopenharmony_ci	if (f.file) {
200362306a36Sopenharmony_ci		ret = __sys_accept4_file(f.file, upeer_sockaddr,
200462306a36Sopenharmony_ci					 upeer_addrlen, flags);
200562306a36Sopenharmony_ci		fdput(f);
200662306a36Sopenharmony_ci	}
200762306a36Sopenharmony_ci
200862306a36Sopenharmony_ci	return ret;
200962306a36Sopenharmony_ci}
201062306a36Sopenharmony_ci
201162306a36Sopenharmony_ciSYSCALL_DEFINE4(accept4, int, fd, struct sockaddr __user *, upeer_sockaddr,
201262306a36Sopenharmony_ci		int __user *, upeer_addrlen, int, flags)
201362306a36Sopenharmony_ci{
201462306a36Sopenharmony_ci	return __sys_accept4(fd, upeer_sockaddr, upeer_addrlen, flags);
201562306a36Sopenharmony_ci}
201662306a36Sopenharmony_ci
201762306a36Sopenharmony_ciSYSCALL_DEFINE3(accept, int, fd, struct sockaddr __user *, upeer_sockaddr,
201862306a36Sopenharmony_ci		int __user *, upeer_addrlen)
201962306a36Sopenharmony_ci{
202062306a36Sopenharmony_ci	return __sys_accept4(fd, upeer_sockaddr, upeer_addrlen, 0);
202162306a36Sopenharmony_ci}
202262306a36Sopenharmony_ci
202362306a36Sopenharmony_ci/*
202462306a36Sopenharmony_ci *	Attempt to connect to a socket with the server address.  The address
202562306a36Sopenharmony_ci *	is in user space so we verify it is OK and move it to kernel space.
202662306a36Sopenharmony_ci *
202762306a36Sopenharmony_ci *	For 1003.1g we need to add clean support for a bind to AF_UNSPEC to
202862306a36Sopenharmony_ci *	break bindings
202962306a36Sopenharmony_ci *
203062306a36Sopenharmony_ci *	NOTE: 1003.1g draft 6.3 is broken with respect to AX.25/NetROM and
203162306a36Sopenharmony_ci *	other SEQPACKET protocols that take time to connect() as it doesn't
203262306a36Sopenharmony_ci *	include the -EINPROGRESS status for such sockets.
203362306a36Sopenharmony_ci */
203462306a36Sopenharmony_ci
203562306a36Sopenharmony_ciint __sys_connect_file(struct file *file, struct sockaddr_storage *address,
203662306a36Sopenharmony_ci		       int addrlen, int file_flags)
203762306a36Sopenharmony_ci{
203862306a36Sopenharmony_ci	struct socket *sock;
203962306a36Sopenharmony_ci	int err;
204062306a36Sopenharmony_ci
204162306a36Sopenharmony_ci	sock = sock_from_file(file);
204262306a36Sopenharmony_ci	if (!sock) {
204362306a36Sopenharmony_ci		err = -ENOTSOCK;
204462306a36Sopenharmony_ci		goto out;
204562306a36Sopenharmony_ci	}
204662306a36Sopenharmony_ci
204762306a36Sopenharmony_ci	err =
204862306a36Sopenharmony_ci	    security_socket_connect(sock, (struct sockaddr *)address, addrlen);
204962306a36Sopenharmony_ci	if (err)
205062306a36Sopenharmony_ci		goto out;
205162306a36Sopenharmony_ci
205262306a36Sopenharmony_ci	err = READ_ONCE(sock->ops)->connect(sock, (struct sockaddr *)address,
205362306a36Sopenharmony_ci				addrlen, sock->file->f_flags | file_flags);
205462306a36Sopenharmony_ciout:
205562306a36Sopenharmony_ci	return err;
205662306a36Sopenharmony_ci}
205762306a36Sopenharmony_ci
205862306a36Sopenharmony_ciint __sys_connect(int fd, struct sockaddr __user *uservaddr, int addrlen)
205962306a36Sopenharmony_ci{
206062306a36Sopenharmony_ci	int ret = -EBADF;
206162306a36Sopenharmony_ci	struct fd f;
206262306a36Sopenharmony_ci
206362306a36Sopenharmony_ci	f = fdget(fd);
206462306a36Sopenharmony_ci	if (f.file) {
206562306a36Sopenharmony_ci		struct sockaddr_storage address;
206662306a36Sopenharmony_ci
206762306a36Sopenharmony_ci		ret = move_addr_to_kernel(uservaddr, addrlen, &address);
206862306a36Sopenharmony_ci		if (!ret)
206962306a36Sopenharmony_ci			ret = __sys_connect_file(f.file, &address, addrlen, 0);
207062306a36Sopenharmony_ci		fdput(f);
207162306a36Sopenharmony_ci	}
207262306a36Sopenharmony_ci
207362306a36Sopenharmony_ci	return ret;
207462306a36Sopenharmony_ci}
207562306a36Sopenharmony_ci
207662306a36Sopenharmony_ciSYSCALL_DEFINE3(connect, int, fd, struct sockaddr __user *, uservaddr,
207762306a36Sopenharmony_ci		int, addrlen)
207862306a36Sopenharmony_ci{
207962306a36Sopenharmony_ci	return __sys_connect(fd, uservaddr, addrlen);
208062306a36Sopenharmony_ci}
208162306a36Sopenharmony_ci
208262306a36Sopenharmony_ci/*
208362306a36Sopenharmony_ci *	Get the local address ('name') of a socket object. Move the obtained
208462306a36Sopenharmony_ci *	name to user space.
208562306a36Sopenharmony_ci */
208662306a36Sopenharmony_ci
208762306a36Sopenharmony_ciint __sys_getsockname(int fd, struct sockaddr __user *usockaddr,
208862306a36Sopenharmony_ci		      int __user *usockaddr_len)
208962306a36Sopenharmony_ci{
209062306a36Sopenharmony_ci	struct socket *sock;
209162306a36Sopenharmony_ci	struct sockaddr_storage address;
209262306a36Sopenharmony_ci	int err, fput_needed;
209362306a36Sopenharmony_ci
209462306a36Sopenharmony_ci	sock = sockfd_lookup_light(fd, &err, &fput_needed);
209562306a36Sopenharmony_ci	if (!sock)
209662306a36Sopenharmony_ci		goto out;
209762306a36Sopenharmony_ci
209862306a36Sopenharmony_ci	err = security_socket_getsockname(sock);
209962306a36Sopenharmony_ci	if (err)
210062306a36Sopenharmony_ci		goto out_put;
210162306a36Sopenharmony_ci
210262306a36Sopenharmony_ci	err = READ_ONCE(sock->ops)->getname(sock, (struct sockaddr *)&address, 0);
210362306a36Sopenharmony_ci	if (err < 0)
210462306a36Sopenharmony_ci		goto out_put;
210562306a36Sopenharmony_ci	/* "err" is actually length in this case */
210662306a36Sopenharmony_ci	err = move_addr_to_user(&address, err, usockaddr, usockaddr_len);
210762306a36Sopenharmony_ci
210862306a36Sopenharmony_ciout_put:
210962306a36Sopenharmony_ci	fput_light(sock->file, fput_needed);
211062306a36Sopenharmony_ciout:
211162306a36Sopenharmony_ci	return err;
211262306a36Sopenharmony_ci}
211362306a36Sopenharmony_ci
211462306a36Sopenharmony_ciSYSCALL_DEFINE3(getsockname, int, fd, struct sockaddr __user *, usockaddr,
211562306a36Sopenharmony_ci		int __user *, usockaddr_len)
211662306a36Sopenharmony_ci{
211762306a36Sopenharmony_ci	return __sys_getsockname(fd, usockaddr, usockaddr_len);
211862306a36Sopenharmony_ci}
211962306a36Sopenharmony_ci
212062306a36Sopenharmony_ci/*
212162306a36Sopenharmony_ci *	Get the remote address ('name') of a socket object. Move the obtained
212262306a36Sopenharmony_ci *	name to user space.
212362306a36Sopenharmony_ci */
212462306a36Sopenharmony_ci
212562306a36Sopenharmony_ciint __sys_getpeername(int fd, struct sockaddr __user *usockaddr,
212662306a36Sopenharmony_ci		      int __user *usockaddr_len)
212762306a36Sopenharmony_ci{
212862306a36Sopenharmony_ci	struct socket *sock;
212962306a36Sopenharmony_ci	struct sockaddr_storage address;
213062306a36Sopenharmony_ci	int err, fput_needed;
213162306a36Sopenharmony_ci
213262306a36Sopenharmony_ci	sock = sockfd_lookup_light(fd, &err, &fput_needed);
213362306a36Sopenharmony_ci	if (sock != NULL) {
213462306a36Sopenharmony_ci		const struct proto_ops *ops = READ_ONCE(sock->ops);
213562306a36Sopenharmony_ci
213662306a36Sopenharmony_ci		err = security_socket_getpeername(sock);
213762306a36Sopenharmony_ci		if (err) {
213862306a36Sopenharmony_ci			fput_light(sock->file, fput_needed);
213962306a36Sopenharmony_ci			return err;
214062306a36Sopenharmony_ci		}
214162306a36Sopenharmony_ci
214262306a36Sopenharmony_ci		err = ops->getname(sock, (struct sockaddr *)&address, 1);
214362306a36Sopenharmony_ci		if (err >= 0)
214462306a36Sopenharmony_ci			/* "err" is actually length in this case */
214562306a36Sopenharmony_ci			err = move_addr_to_user(&address, err, usockaddr,
214662306a36Sopenharmony_ci						usockaddr_len);
214762306a36Sopenharmony_ci		fput_light(sock->file, fput_needed);
214862306a36Sopenharmony_ci	}
214962306a36Sopenharmony_ci	return err;
215062306a36Sopenharmony_ci}
215162306a36Sopenharmony_ci
215262306a36Sopenharmony_ciSYSCALL_DEFINE3(getpeername, int, fd, struct sockaddr __user *, usockaddr,
215362306a36Sopenharmony_ci		int __user *, usockaddr_len)
215462306a36Sopenharmony_ci{
215562306a36Sopenharmony_ci	return __sys_getpeername(fd, usockaddr, usockaddr_len);
215662306a36Sopenharmony_ci}
215762306a36Sopenharmony_ci
215862306a36Sopenharmony_ci/*
215962306a36Sopenharmony_ci *	Send a datagram to a given address. We move the address into kernel
216062306a36Sopenharmony_ci *	space and check the user space data area is readable before invoking
216162306a36Sopenharmony_ci *	the protocol.
216262306a36Sopenharmony_ci */
216362306a36Sopenharmony_ciint __sys_sendto(int fd, void __user *buff, size_t len, unsigned int flags,
216462306a36Sopenharmony_ci		 struct sockaddr __user *addr,  int addr_len)
216562306a36Sopenharmony_ci{
216662306a36Sopenharmony_ci	struct socket *sock;
216762306a36Sopenharmony_ci	struct sockaddr_storage address;
216862306a36Sopenharmony_ci	int err;
216962306a36Sopenharmony_ci	struct msghdr msg;
217062306a36Sopenharmony_ci	struct iovec iov;
217162306a36Sopenharmony_ci	int fput_needed;
217262306a36Sopenharmony_ci
217362306a36Sopenharmony_ci	err = import_single_range(ITER_SOURCE, buff, len, &iov, &msg.msg_iter);
217462306a36Sopenharmony_ci	if (unlikely(err))
217562306a36Sopenharmony_ci		return err;
217662306a36Sopenharmony_ci	sock = sockfd_lookup_light(fd, &err, &fput_needed);
217762306a36Sopenharmony_ci	if (!sock)
217862306a36Sopenharmony_ci		goto out;
217962306a36Sopenharmony_ci
218062306a36Sopenharmony_ci	msg.msg_name = NULL;
218162306a36Sopenharmony_ci	msg.msg_control = NULL;
218262306a36Sopenharmony_ci	msg.msg_controllen = 0;
218362306a36Sopenharmony_ci	msg.msg_namelen = 0;
218462306a36Sopenharmony_ci	msg.msg_ubuf = NULL;
218562306a36Sopenharmony_ci	if (addr) {
218662306a36Sopenharmony_ci		err = move_addr_to_kernel(addr, addr_len, &address);
218762306a36Sopenharmony_ci		if (err < 0)
218862306a36Sopenharmony_ci			goto out_put;
218962306a36Sopenharmony_ci		msg.msg_name = (struct sockaddr *)&address;
219062306a36Sopenharmony_ci		msg.msg_namelen = addr_len;
219162306a36Sopenharmony_ci	}
219262306a36Sopenharmony_ci	flags &= ~MSG_INTERNAL_SENDMSG_FLAGS;
219362306a36Sopenharmony_ci	if (sock->file->f_flags & O_NONBLOCK)
219462306a36Sopenharmony_ci		flags |= MSG_DONTWAIT;
219562306a36Sopenharmony_ci	msg.msg_flags = flags;
219662306a36Sopenharmony_ci	err = __sock_sendmsg(sock, &msg);
219762306a36Sopenharmony_ci
219862306a36Sopenharmony_ciout_put:
219962306a36Sopenharmony_ci	fput_light(sock->file, fput_needed);
220062306a36Sopenharmony_ciout:
220162306a36Sopenharmony_ci	return err;
220262306a36Sopenharmony_ci}
220362306a36Sopenharmony_ci
220462306a36Sopenharmony_ciSYSCALL_DEFINE6(sendto, int, fd, void __user *, buff, size_t, len,
220562306a36Sopenharmony_ci		unsigned int, flags, struct sockaddr __user *, addr,
220662306a36Sopenharmony_ci		int, addr_len)
220762306a36Sopenharmony_ci{
220862306a36Sopenharmony_ci	return __sys_sendto(fd, buff, len, flags, addr, addr_len);
220962306a36Sopenharmony_ci}
221062306a36Sopenharmony_ci
221162306a36Sopenharmony_ci/*
221262306a36Sopenharmony_ci *	Send a datagram down a socket.
221362306a36Sopenharmony_ci */
221462306a36Sopenharmony_ci
221562306a36Sopenharmony_ciSYSCALL_DEFINE4(send, int, fd, void __user *, buff, size_t, len,
221662306a36Sopenharmony_ci		unsigned int, flags)
221762306a36Sopenharmony_ci{
221862306a36Sopenharmony_ci	return __sys_sendto(fd, buff, len, flags, NULL, 0);
221962306a36Sopenharmony_ci}
222062306a36Sopenharmony_ci
222162306a36Sopenharmony_ci/*
222262306a36Sopenharmony_ci *	Receive a frame from the socket and optionally record the address of the
222362306a36Sopenharmony_ci *	sender. We verify the buffers are writable and if needed move the
222462306a36Sopenharmony_ci *	sender address from kernel to user space.
222562306a36Sopenharmony_ci */
222662306a36Sopenharmony_ciint __sys_recvfrom(int fd, void __user *ubuf, size_t size, unsigned int flags,
222762306a36Sopenharmony_ci		   struct sockaddr __user *addr, int __user *addr_len)
222862306a36Sopenharmony_ci{
222962306a36Sopenharmony_ci	struct sockaddr_storage address;
223062306a36Sopenharmony_ci	struct msghdr msg = {
223162306a36Sopenharmony_ci		/* Save some cycles and don't copy the address if not needed */
223262306a36Sopenharmony_ci		.msg_name = addr ? (struct sockaddr *)&address : NULL,
223362306a36Sopenharmony_ci	};
223462306a36Sopenharmony_ci	struct socket *sock;
223562306a36Sopenharmony_ci	struct iovec iov;
223662306a36Sopenharmony_ci	int err, err2;
223762306a36Sopenharmony_ci	int fput_needed;
223862306a36Sopenharmony_ci
223962306a36Sopenharmony_ci	err = import_single_range(ITER_DEST, ubuf, size, &iov, &msg.msg_iter);
224062306a36Sopenharmony_ci	if (unlikely(err))
224162306a36Sopenharmony_ci		return err;
224262306a36Sopenharmony_ci	sock = sockfd_lookup_light(fd, &err, &fput_needed);
224362306a36Sopenharmony_ci	if (!sock)
224462306a36Sopenharmony_ci		goto out;
224562306a36Sopenharmony_ci
224662306a36Sopenharmony_ci	if (sock->file->f_flags & O_NONBLOCK)
224762306a36Sopenharmony_ci		flags |= MSG_DONTWAIT;
224862306a36Sopenharmony_ci	err = sock_recvmsg(sock, &msg, flags);
224962306a36Sopenharmony_ci
225062306a36Sopenharmony_ci	if (err >= 0 && addr != NULL) {
225162306a36Sopenharmony_ci		err2 = move_addr_to_user(&address,
225262306a36Sopenharmony_ci					 msg.msg_namelen, addr, addr_len);
225362306a36Sopenharmony_ci		if (err2 < 0)
225462306a36Sopenharmony_ci			err = err2;
225562306a36Sopenharmony_ci	}
225662306a36Sopenharmony_ci
225762306a36Sopenharmony_ci	fput_light(sock->file, fput_needed);
225862306a36Sopenharmony_ciout:
225962306a36Sopenharmony_ci	return err;
226062306a36Sopenharmony_ci}
226162306a36Sopenharmony_ci
226262306a36Sopenharmony_ciSYSCALL_DEFINE6(recvfrom, int, fd, void __user *, ubuf, size_t, size,
226362306a36Sopenharmony_ci		unsigned int, flags, struct sockaddr __user *, addr,
226462306a36Sopenharmony_ci		int __user *, addr_len)
226562306a36Sopenharmony_ci{
226662306a36Sopenharmony_ci	return __sys_recvfrom(fd, ubuf, size, flags, addr, addr_len);
226762306a36Sopenharmony_ci}
226862306a36Sopenharmony_ci
226962306a36Sopenharmony_ci/*
227062306a36Sopenharmony_ci *	Receive a datagram from a socket.
227162306a36Sopenharmony_ci */
227262306a36Sopenharmony_ci
227362306a36Sopenharmony_ciSYSCALL_DEFINE4(recv, int, fd, void __user *, ubuf, size_t, size,
227462306a36Sopenharmony_ci		unsigned int, flags)
227562306a36Sopenharmony_ci{
227662306a36Sopenharmony_ci	return __sys_recvfrom(fd, ubuf, size, flags, NULL, NULL);
227762306a36Sopenharmony_ci}
227862306a36Sopenharmony_ci
227962306a36Sopenharmony_cistatic bool sock_use_custom_sol_socket(const struct socket *sock)
228062306a36Sopenharmony_ci{
228162306a36Sopenharmony_ci	return test_bit(SOCK_CUSTOM_SOCKOPT, &sock->flags);
228262306a36Sopenharmony_ci}
228362306a36Sopenharmony_ci
228462306a36Sopenharmony_ci/*
228562306a36Sopenharmony_ci *	Set a socket option. Because we don't know the option lengths we have
228662306a36Sopenharmony_ci *	to pass the user mode parameter for the protocols to sort out.
228762306a36Sopenharmony_ci */
228862306a36Sopenharmony_ciint __sys_setsockopt(int fd, int level, int optname, char __user *user_optval,
228962306a36Sopenharmony_ci		int optlen)
229062306a36Sopenharmony_ci{
229162306a36Sopenharmony_ci	sockptr_t optval = USER_SOCKPTR(user_optval);
229262306a36Sopenharmony_ci	const struct proto_ops *ops;
229362306a36Sopenharmony_ci	char *kernel_optval = NULL;
229462306a36Sopenharmony_ci	int err, fput_needed;
229562306a36Sopenharmony_ci	struct socket *sock;
229662306a36Sopenharmony_ci
229762306a36Sopenharmony_ci	if (optlen < 0)
229862306a36Sopenharmony_ci		return -EINVAL;
229962306a36Sopenharmony_ci
230062306a36Sopenharmony_ci	sock = sockfd_lookup_light(fd, &err, &fput_needed);
230162306a36Sopenharmony_ci	if (!sock)
230262306a36Sopenharmony_ci		return err;
230362306a36Sopenharmony_ci
230462306a36Sopenharmony_ci	err = security_socket_setsockopt(sock, level, optname);
230562306a36Sopenharmony_ci	if (err)
230662306a36Sopenharmony_ci		goto out_put;
230762306a36Sopenharmony_ci
230862306a36Sopenharmony_ci	if (!in_compat_syscall())
230962306a36Sopenharmony_ci		err = BPF_CGROUP_RUN_PROG_SETSOCKOPT(sock->sk, &level, &optname,
231062306a36Sopenharmony_ci						     user_optval, &optlen,
231162306a36Sopenharmony_ci						     &kernel_optval);
231262306a36Sopenharmony_ci	if (err < 0)
231362306a36Sopenharmony_ci		goto out_put;
231462306a36Sopenharmony_ci	if (err > 0) {
231562306a36Sopenharmony_ci		err = 0;
231662306a36Sopenharmony_ci		goto out_put;
231762306a36Sopenharmony_ci	}
231862306a36Sopenharmony_ci
231962306a36Sopenharmony_ci	if (kernel_optval)
232062306a36Sopenharmony_ci		optval = KERNEL_SOCKPTR(kernel_optval);
232162306a36Sopenharmony_ci	ops = READ_ONCE(sock->ops);
232262306a36Sopenharmony_ci	if (level == SOL_SOCKET && !sock_use_custom_sol_socket(sock))
232362306a36Sopenharmony_ci		err = sock_setsockopt(sock, level, optname, optval, optlen);
232462306a36Sopenharmony_ci	else if (unlikely(!ops->setsockopt))
232562306a36Sopenharmony_ci		err = -EOPNOTSUPP;
232662306a36Sopenharmony_ci	else
232762306a36Sopenharmony_ci		err = ops->setsockopt(sock, level, optname, optval,
232862306a36Sopenharmony_ci					    optlen);
232962306a36Sopenharmony_ci	kfree(kernel_optval);
233062306a36Sopenharmony_ciout_put:
233162306a36Sopenharmony_ci	fput_light(sock->file, fput_needed);
233262306a36Sopenharmony_ci	return err;
233362306a36Sopenharmony_ci}
233462306a36Sopenharmony_ci
233562306a36Sopenharmony_ciSYSCALL_DEFINE5(setsockopt, int, fd, int, level, int, optname,
233662306a36Sopenharmony_ci		char __user *, optval, int, optlen)
233762306a36Sopenharmony_ci{
233862306a36Sopenharmony_ci	return __sys_setsockopt(fd, level, optname, optval, optlen);
233962306a36Sopenharmony_ci}
234062306a36Sopenharmony_ci
234162306a36Sopenharmony_ciINDIRECT_CALLABLE_DECLARE(bool tcp_bpf_bypass_getsockopt(int level,
234262306a36Sopenharmony_ci							 int optname));
234362306a36Sopenharmony_ci
234462306a36Sopenharmony_ci/*
234562306a36Sopenharmony_ci *	Get a socket option. Because we don't know the option lengths we have
234662306a36Sopenharmony_ci *	to pass a user mode parameter for the protocols to sort out.
234762306a36Sopenharmony_ci */
234862306a36Sopenharmony_ciint __sys_getsockopt(int fd, int level, int optname, char __user *optval,
234962306a36Sopenharmony_ci		int __user *optlen)
235062306a36Sopenharmony_ci{
235162306a36Sopenharmony_ci	int max_optlen __maybe_unused;
235262306a36Sopenharmony_ci	const struct proto_ops *ops;
235362306a36Sopenharmony_ci	int err, fput_needed;
235462306a36Sopenharmony_ci	struct socket *sock;
235562306a36Sopenharmony_ci
235662306a36Sopenharmony_ci	sock = sockfd_lookup_light(fd, &err, &fput_needed);
235762306a36Sopenharmony_ci	if (!sock)
235862306a36Sopenharmony_ci		return err;
235962306a36Sopenharmony_ci
236062306a36Sopenharmony_ci	err = security_socket_getsockopt(sock, level, optname);
236162306a36Sopenharmony_ci	if (err)
236262306a36Sopenharmony_ci		goto out_put;
236362306a36Sopenharmony_ci
236462306a36Sopenharmony_ci	if (!in_compat_syscall())
236562306a36Sopenharmony_ci		max_optlen = BPF_CGROUP_GETSOCKOPT_MAX_OPTLEN(optlen);
236662306a36Sopenharmony_ci
236762306a36Sopenharmony_ci	ops = READ_ONCE(sock->ops);
236862306a36Sopenharmony_ci	if (level == SOL_SOCKET)
236962306a36Sopenharmony_ci		err = sock_getsockopt(sock, level, optname, optval, optlen);
237062306a36Sopenharmony_ci	else if (unlikely(!ops->getsockopt))
237162306a36Sopenharmony_ci		err = -EOPNOTSUPP;
237262306a36Sopenharmony_ci	else
237362306a36Sopenharmony_ci		err = ops->getsockopt(sock, level, optname, optval,
237462306a36Sopenharmony_ci					    optlen);
237562306a36Sopenharmony_ci
237662306a36Sopenharmony_ci	if (!in_compat_syscall())
237762306a36Sopenharmony_ci		err = BPF_CGROUP_RUN_PROG_GETSOCKOPT(sock->sk, level, optname,
237862306a36Sopenharmony_ci						     optval, optlen, max_optlen,
237962306a36Sopenharmony_ci						     err);
238062306a36Sopenharmony_ciout_put:
238162306a36Sopenharmony_ci	fput_light(sock->file, fput_needed);
238262306a36Sopenharmony_ci	return err;
238362306a36Sopenharmony_ci}
238462306a36Sopenharmony_ci
238562306a36Sopenharmony_ciSYSCALL_DEFINE5(getsockopt, int, fd, int, level, int, optname,
238662306a36Sopenharmony_ci		char __user *, optval, int __user *, optlen)
238762306a36Sopenharmony_ci{
238862306a36Sopenharmony_ci	return __sys_getsockopt(fd, level, optname, optval, optlen);
238962306a36Sopenharmony_ci}
239062306a36Sopenharmony_ci
239162306a36Sopenharmony_ci/*
239262306a36Sopenharmony_ci *	Shutdown a socket.
239362306a36Sopenharmony_ci */
239462306a36Sopenharmony_ci
239562306a36Sopenharmony_ciint __sys_shutdown_sock(struct socket *sock, int how)
239662306a36Sopenharmony_ci{
239762306a36Sopenharmony_ci	int err;
239862306a36Sopenharmony_ci
239962306a36Sopenharmony_ci	err = security_socket_shutdown(sock, how);
240062306a36Sopenharmony_ci	if (!err)
240162306a36Sopenharmony_ci		err = READ_ONCE(sock->ops)->shutdown(sock, how);
240262306a36Sopenharmony_ci
240362306a36Sopenharmony_ci	return err;
240462306a36Sopenharmony_ci}
240562306a36Sopenharmony_ci
240662306a36Sopenharmony_ciint __sys_shutdown(int fd, int how)
240762306a36Sopenharmony_ci{
240862306a36Sopenharmony_ci	int err, fput_needed;
240962306a36Sopenharmony_ci	struct socket *sock;
241062306a36Sopenharmony_ci
241162306a36Sopenharmony_ci	sock = sockfd_lookup_light(fd, &err, &fput_needed);
241262306a36Sopenharmony_ci	if (sock != NULL) {
241362306a36Sopenharmony_ci		err = __sys_shutdown_sock(sock, how);
241462306a36Sopenharmony_ci		fput_light(sock->file, fput_needed);
241562306a36Sopenharmony_ci	}
241662306a36Sopenharmony_ci	return err;
241762306a36Sopenharmony_ci}
241862306a36Sopenharmony_ci
241962306a36Sopenharmony_ciSYSCALL_DEFINE2(shutdown, int, fd, int, how)
242062306a36Sopenharmony_ci{
242162306a36Sopenharmony_ci	return __sys_shutdown(fd, how);
242262306a36Sopenharmony_ci}
242362306a36Sopenharmony_ci
242462306a36Sopenharmony_ci/* A couple of helpful macros for getting the address of the 32/64 bit
242562306a36Sopenharmony_ci * fields which are the same type (int / unsigned) on our platforms.
242662306a36Sopenharmony_ci */
242762306a36Sopenharmony_ci#define COMPAT_MSG(msg, member)	((MSG_CMSG_COMPAT & flags) ? &msg##_compat->member : &msg->member)
242862306a36Sopenharmony_ci#define COMPAT_NAMELEN(msg)	COMPAT_MSG(msg, msg_namelen)
242962306a36Sopenharmony_ci#define COMPAT_FLAGS(msg)	COMPAT_MSG(msg, msg_flags)
243062306a36Sopenharmony_ci
243162306a36Sopenharmony_cistruct used_address {
243262306a36Sopenharmony_ci	struct sockaddr_storage name;
243362306a36Sopenharmony_ci	unsigned int name_len;
243462306a36Sopenharmony_ci};
243562306a36Sopenharmony_ci
243662306a36Sopenharmony_ciint __copy_msghdr(struct msghdr *kmsg,
243762306a36Sopenharmony_ci		  struct user_msghdr *msg,
243862306a36Sopenharmony_ci		  struct sockaddr __user **save_addr)
243962306a36Sopenharmony_ci{
244062306a36Sopenharmony_ci	ssize_t err;
244162306a36Sopenharmony_ci
244262306a36Sopenharmony_ci	kmsg->msg_control_is_user = true;
244362306a36Sopenharmony_ci	kmsg->msg_get_inq = 0;
244462306a36Sopenharmony_ci	kmsg->msg_control_user = msg->msg_control;
244562306a36Sopenharmony_ci	kmsg->msg_controllen = msg->msg_controllen;
244662306a36Sopenharmony_ci	kmsg->msg_flags = msg->msg_flags;
244762306a36Sopenharmony_ci
244862306a36Sopenharmony_ci	kmsg->msg_namelen = msg->msg_namelen;
244962306a36Sopenharmony_ci	if (!msg->msg_name)
245062306a36Sopenharmony_ci		kmsg->msg_namelen = 0;
245162306a36Sopenharmony_ci
245262306a36Sopenharmony_ci	if (kmsg->msg_namelen < 0)
245362306a36Sopenharmony_ci		return -EINVAL;
245462306a36Sopenharmony_ci
245562306a36Sopenharmony_ci	if (kmsg->msg_namelen > sizeof(struct sockaddr_storage))
245662306a36Sopenharmony_ci		kmsg->msg_namelen = sizeof(struct sockaddr_storage);
245762306a36Sopenharmony_ci
245862306a36Sopenharmony_ci	if (save_addr)
245962306a36Sopenharmony_ci		*save_addr = msg->msg_name;
246062306a36Sopenharmony_ci
246162306a36Sopenharmony_ci	if (msg->msg_name && kmsg->msg_namelen) {
246262306a36Sopenharmony_ci		if (!save_addr) {
246362306a36Sopenharmony_ci			err = move_addr_to_kernel(msg->msg_name,
246462306a36Sopenharmony_ci						  kmsg->msg_namelen,
246562306a36Sopenharmony_ci						  kmsg->msg_name);
246662306a36Sopenharmony_ci			if (err < 0)
246762306a36Sopenharmony_ci				return err;
246862306a36Sopenharmony_ci		}
246962306a36Sopenharmony_ci	} else {
247062306a36Sopenharmony_ci		kmsg->msg_name = NULL;
247162306a36Sopenharmony_ci		kmsg->msg_namelen = 0;
247262306a36Sopenharmony_ci	}
247362306a36Sopenharmony_ci
247462306a36Sopenharmony_ci	if (msg->msg_iovlen > UIO_MAXIOV)
247562306a36Sopenharmony_ci		return -EMSGSIZE;
247662306a36Sopenharmony_ci
247762306a36Sopenharmony_ci	kmsg->msg_iocb = NULL;
247862306a36Sopenharmony_ci	kmsg->msg_ubuf = NULL;
247962306a36Sopenharmony_ci	return 0;
248062306a36Sopenharmony_ci}
248162306a36Sopenharmony_ci
248262306a36Sopenharmony_cistatic int copy_msghdr_from_user(struct msghdr *kmsg,
248362306a36Sopenharmony_ci				 struct user_msghdr __user *umsg,
248462306a36Sopenharmony_ci				 struct sockaddr __user **save_addr,
248562306a36Sopenharmony_ci				 struct iovec **iov)
248662306a36Sopenharmony_ci{
248762306a36Sopenharmony_ci	struct user_msghdr msg;
248862306a36Sopenharmony_ci	ssize_t err;
248962306a36Sopenharmony_ci
249062306a36Sopenharmony_ci	if (copy_from_user(&msg, umsg, sizeof(*umsg)))
249162306a36Sopenharmony_ci		return -EFAULT;
249262306a36Sopenharmony_ci
249362306a36Sopenharmony_ci	err = __copy_msghdr(kmsg, &msg, save_addr);
249462306a36Sopenharmony_ci	if (err)
249562306a36Sopenharmony_ci		return err;
249662306a36Sopenharmony_ci
249762306a36Sopenharmony_ci	err = import_iovec(save_addr ? ITER_DEST : ITER_SOURCE,
249862306a36Sopenharmony_ci			    msg.msg_iov, msg.msg_iovlen,
249962306a36Sopenharmony_ci			    UIO_FASTIOV, iov, &kmsg->msg_iter);
250062306a36Sopenharmony_ci	return err < 0 ? err : 0;
250162306a36Sopenharmony_ci}
250262306a36Sopenharmony_ci
250362306a36Sopenharmony_cistatic int ____sys_sendmsg(struct socket *sock, struct msghdr *msg_sys,
250462306a36Sopenharmony_ci			   unsigned int flags, struct used_address *used_address,
250562306a36Sopenharmony_ci			   unsigned int allowed_msghdr_flags)
250662306a36Sopenharmony_ci{
250762306a36Sopenharmony_ci	unsigned char ctl[sizeof(struct cmsghdr) + 20]
250862306a36Sopenharmony_ci				__aligned(sizeof(__kernel_size_t));
250962306a36Sopenharmony_ci	/* 20 is size of ipv6_pktinfo */
251062306a36Sopenharmony_ci	unsigned char *ctl_buf = ctl;
251162306a36Sopenharmony_ci	int ctl_len;
251262306a36Sopenharmony_ci	ssize_t err;
251362306a36Sopenharmony_ci
251462306a36Sopenharmony_ci	err = -ENOBUFS;
251562306a36Sopenharmony_ci
251662306a36Sopenharmony_ci	if (msg_sys->msg_controllen > INT_MAX)
251762306a36Sopenharmony_ci		goto out;
251862306a36Sopenharmony_ci	flags |= (msg_sys->msg_flags & allowed_msghdr_flags);
251962306a36Sopenharmony_ci	ctl_len = msg_sys->msg_controllen;
252062306a36Sopenharmony_ci	if ((MSG_CMSG_COMPAT & flags) && ctl_len) {
252162306a36Sopenharmony_ci		err =
252262306a36Sopenharmony_ci		    cmsghdr_from_user_compat_to_kern(msg_sys, sock->sk, ctl,
252362306a36Sopenharmony_ci						     sizeof(ctl));
252462306a36Sopenharmony_ci		if (err)
252562306a36Sopenharmony_ci			goto out;
252662306a36Sopenharmony_ci		ctl_buf = msg_sys->msg_control;
252762306a36Sopenharmony_ci		ctl_len = msg_sys->msg_controllen;
252862306a36Sopenharmony_ci	} else if (ctl_len) {
252962306a36Sopenharmony_ci		BUILD_BUG_ON(sizeof(struct cmsghdr) !=
253062306a36Sopenharmony_ci			     CMSG_ALIGN(sizeof(struct cmsghdr)));
253162306a36Sopenharmony_ci		if (ctl_len > sizeof(ctl)) {
253262306a36Sopenharmony_ci			ctl_buf = sock_kmalloc(sock->sk, ctl_len, GFP_KERNEL);
253362306a36Sopenharmony_ci			if (ctl_buf == NULL)
253462306a36Sopenharmony_ci				goto out;
253562306a36Sopenharmony_ci		}
253662306a36Sopenharmony_ci		err = -EFAULT;
253762306a36Sopenharmony_ci		if (copy_from_user(ctl_buf, msg_sys->msg_control_user, ctl_len))
253862306a36Sopenharmony_ci			goto out_freectl;
253962306a36Sopenharmony_ci		msg_sys->msg_control = ctl_buf;
254062306a36Sopenharmony_ci		msg_sys->msg_control_is_user = false;
254162306a36Sopenharmony_ci	}
254262306a36Sopenharmony_ci	flags &= ~MSG_INTERNAL_SENDMSG_FLAGS;
254362306a36Sopenharmony_ci	msg_sys->msg_flags = flags;
254462306a36Sopenharmony_ci
254562306a36Sopenharmony_ci	if (sock->file->f_flags & O_NONBLOCK)
254662306a36Sopenharmony_ci		msg_sys->msg_flags |= MSG_DONTWAIT;
254762306a36Sopenharmony_ci	/*
254862306a36Sopenharmony_ci	 * If this is sendmmsg() and current destination address is same as
254962306a36Sopenharmony_ci	 * previously succeeded address, omit asking LSM's decision.
255062306a36Sopenharmony_ci	 * used_address->name_len is initialized to UINT_MAX so that the first
255162306a36Sopenharmony_ci	 * destination address never matches.
255262306a36Sopenharmony_ci	 */
255362306a36Sopenharmony_ci	if (used_address && msg_sys->msg_name &&
255462306a36Sopenharmony_ci	    used_address->name_len == msg_sys->msg_namelen &&
255562306a36Sopenharmony_ci	    !memcmp(&used_address->name, msg_sys->msg_name,
255662306a36Sopenharmony_ci		    used_address->name_len)) {
255762306a36Sopenharmony_ci		err = sock_sendmsg_nosec(sock, msg_sys);
255862306a36Sopenharmony_ci		goto out_freectl;
255962306a36Sopenharmony_ci	}
256062306a36Sopenharmony_ci	err = __sock_sendmsg(sock, msg_sys);
256162306a36Sopenharmony_ci	/*
256262306a36Sopenharmony_ci	 * If this is sendmmsg() and sending to current destination address was
256362306a36Sopenharmony_ci	 * successful, remember it.
256462306a36Sopenharmony_ci	 */
256562306a36Sopenharmony_ci	if (used_address && err >= 0) {
256662306a36Sopenharmony_ci		used_address->name_len = msg_sys->msg_namelen;
256762306a36Sopenharmony_ci		if (msg_sys->msg_name)
256862306a36Sopenharmony_ci			memcpy(&used_address->name, msg_sys->msg_name,
256962306a36Sopenharmony_ci			       used_address->name_len);
257062306a36Sopenharmony_ci	}
257162306a36Sopenharmony_ci
257262306a36Sopenharmony_ciout_freectl:
257362306a36Sopenharmony_ci	if (ctl_buf != ctl)
257462306a36Sopenharmony_ci		sock_kfree_s(sock->sk, ctl_buf, ctl_len);
257562306a36Sopenharmony_ciout:
257662306a36Sopenharmony_ci	return err;
257762306a36Sopenharmony_ci}
257862306a36Sopenharmony_ci
257962306a36Sopenharmony_ciint sendmsg_copy_msghdr(struct msghdr *msg,
258062306a36Sopenharmony_ci			struct user_msghdr __user *umsg, unsigned flags,
258162306a36Sopenharmony_ci			struct iovec **iov)
258262306a36Sopenharmony_ci{
258362306a36Sopenharmony_ci	int err;
258462306a36Sopenharmony_ci
258562306a36Sopenharmony_ci	if (flags & MSG_CMSG_COMPAT) {
258662306a36Sopenharmony_ci		struct compat_msghdr __user *msg_compat;
258762306a36Sopenharmony_ci
258862306a36Sopenharmony_ci		msg_compat = (struct compat_msghdr __user *) umsg;
258962306a36Sopenharmony_ci		err = get_compat_msghdr(msg, msg_compat, NULL, iov);
259062306a36Sopenharmony_ci	} else {
259162306a36Sopenharmony_ci		err = copy_msghdr_from_user(msg, umsg, NULL, iov);
259262306a36Sopenharmony_ci	}
259362306a36Sopenharmony_ci	if (err < 0)
259462306a36Sopenharmony_ci		return err;
259562306a36Sopenharmony_ci
259662306a36Sopenharmony_ci	return 0;
259762306a36Sopenharmony_ci}
259862306a36Sopenharmony_ci
259962306a36Sopenharmony_cistatic int ___sys_sendmsg(struct socket *sock, struct user_msghdr __user *msg,
260062306a36Sopenharmony_ci			 struct msghdr *msg_sys, unsigned int flags,
260162306a36Sopenharmony_ci			 struct used_address *used_address,
260262306a36Sopenharmony_ci			 unsigned int allowed_msghdr_flags)
260362306a36Sopenharmony_ci{
260462306a36Sopenharmony_ci	struct sockaddr_storage address;
260562306a36Sopenharmony_ci	struct iovec iovstack[UIO_FASTIOV], *iov = iovstack;
260662306a36Sopenharmony_ci	ssize_t err;
260762306a36Sopenharmony_ci
260862306a36Sopenharmony_ci	msg_sys->msg_name = &address;
260962306a36Sopenharmony_ci
261062306a36Sopenharmony_ci	err = sendmsg_copy_msghdr(msg_sys, msg, flags, &iov);
261162306a36Sopenharmony_ci	if (err < 0)
261262306a36Sopenharmony_ci		return err;
261362306a36Sopenharmony_ci
261462306a36Sopenharmony_ci	err = ____sys_sendmsg(sock, msg_sys, flags, used_address,
261562306a36Sopenharmony_ci				allowed_msghdr_flags);
261662306a36Sopenharmony_ci	kfree(iov);
261762306a36Sopenharmony_ci	return err;
261862306a36Sopenharmony_ci}
261962306a36Sopenharmony_ci
262062306a36Sopenharmony_ci/*
262162306a36Sopenharmony_ci *	BSD sendmsg interface
262262306a36Sopenharmony_ci */
262362306a36Sopenharmony_cilong __sys_sendmsg_sock(struct socket *sock, struct msghdr *msg,
262462306a36Sopenharmony_ci			unsigned int flags)
262562306a36Sopenharmony_ci{
262662306a36Sopenharmony_ci	return ____sys_sendmsg(sock, msg, flags, NULL, 0);
262762306a36Sopenharmony_ci}
262862306a36Sopenharmony_ci
262962306a36Sopenharmony_cilong __sys_sendmsg(int fd, struct user_msghdr __user *msg, unsigned int flags,
263062306a36Sopenharmony_ci		   bool forbid_cmsg_compat)
263162306a36Sopenharmony_ci{
263262306a36Sopenharmony_ci	int fput_needed, err;
263362306a36Sopenharmony_ci	struct msghdr msg_sys;
263462306a36Sopenharmony_ci	struct socket *sock;
263562306a36Sopenharmony_ci
263662306a36Sopenharmony_ci	if (forbid_cmsg_compat && (flags & MSG_CMSG_COMPAT))
263762306a36Sopenharmony_ci		return -EINVAL;
263862306a36Sopenharmony_ci
263962306a36Sopenharmony_ci	sock = sockfd_lookup_light(fd, &err, &fput_needed);
264062306a36Sopenharmony_ci	if (!sock)
264162306a36Sopenharmony_ci		goto out;
264262306a36Sopenharmony_ci
264362306a36Sopenharmony_ci	err = ___sys_sendmsg(sock, msg, &msg_sys, flags, NULL, 0);
264462306a36Sopenharmony_ci
264562306a36Sopenharmony_ci	fput_light(sock->file, fput_needed);
264662306a36Sopenharmony_ciout:
264762306a36Sopenharmony_ci	return err;
264862306a36Sopenharmony_ci}
264962306a36Sopenharmony_ci
265062306a36Sopenharmony_ciSYSCALL_DEFINE3(sendmsg, int, fd, struct user_msghdr __user *, msg, unsigned int, flags)
265162306a36Sopenharmony_ci{
265262306a36Sopenharmony_ci	return __sys_sendmsg(fd, msg, flags, true);
265362306a36Sopenharmony_ci}
265462306a36Sopenharmony_ci
265562306a36Sopenharmony_ci/*
265662306a36Sopenharmony_ci *	Linux sendmmsg interface
265762306a36Sopenharmony_ci */
265862306a36Sopenharmony_ci
265962306a36Sopenharmony_ciint __sys_sendmmsg(int fd, struct mmsghdr __user *mmsg, unsigned int vlen,
266062306a36Sopenharmony_ci		   unsigned int flags, bool forbid_cmsg_compat)
266162306a36Sopenharmony_ci{
266262306a36Sopenharmony_ci	int fput_needed, err, datagrams;
266362306a36Sopenharmony_ci	struct socket *sock;
266462306a36Sopenharmony_ci	struct mmsghdr __user *entry;
266562306a36Sopenharmony_ci	struct compat_mmsghdr __user *compat_entry;
266662306a36Sopenharmony_ci	struct msghdr msg_sys;
266762306a36Sopenharmony_ci	struct used_address used_address;
266862306a36Sopenharmony_ci	unsigned int oflags = flags;
266962306a36Sopenharmony_ci
267062306a36Sopenharmony_ci	if (forbid_cmsg_compat && (flags & MSG_CMSG_COMPAT))
267162306a36Sopenharmony_ci		return -EINVAL;
267262306a36Sopenharmony_ci
267362306a36Sopenharmony_ci	if (vlen > UIO_MAXIOV)
267462306a36Sopenharmony_ci		vlen = UIO_MAXIOV;
267562306a36Sopenharmony_ci
267662306a36Sopenharmony_ci	datagrams = 0;
267762306a36Sopenharmony_ci
267862306a36Sopenharmony_ci	sock = sockfd_lookup_light(fd, &err, &fput_needed);
267962306a36Sopenharmony_ci	if (!sock)
268062306a36Sopenharmony_ci		return err;
268162306a36Sopenharmony_ci
268262306a36Sopenharmony_ci	used_address.name_len = UINT_MAX;
268362306a36Sopenharmony_ci	entry = mmsg;
268462306a36Sopenharmony_ci	compat_entry = (struct compat_mmsghdr __user *)mmsg;
268562306a36Sopenharmony_ci	err = 0;
268662306a36Sopenharmony_ci	flags |= MSG_BATCH;
268762306a36Sopenharmony_ci
268862306a36Sopenharmony_ci	while (datagrams < vlen) {
268962306a36Sopenharmony_ci		if (datagrams == vlen - 1)
269062306a36Sopenharmony_ci			flags = oflags;
269162306a36Sopenharmony_ci
269262306a36Sopenharmony_ci		if (MSG_CMSG_COMPAT & flags) {
269362306a36Sopenharmony_ci			err = ___sys_sendmsg(sock, (struct user_msghdr __user *)compat_entry,
269462306a36Sopenharmony_ci					     &msg_sys, flags, &used_address, MSG_EOR);
269562306a36Sopenharmony_ci			if (err < 0)
269662306a36Sopenharmony_ci				break;
269762306a36Sopenharmony_ci			err = __put_user(err, &compat_entry->msg_len);
269862306a36Sopenharmony_ci			++compat_entry;
269962306a36Sopenharmony_ci		} else {
270062306a36Sopenharmony_ci			err = ___sys_sendmsg(sock,
270162306a36Sopenharmony_ci					     (struct user_msghdr __user *)entry,
270262306a36Sopenharmony_ci					     &msg_sys, flags, &used_address, MSG_EOR);
270362306a36Sopenharmony_ci			if (err < 0)
270462306a36Sopenharmony_ci				break;
270562306a36Sopenharmony_ci			err = put_user(err, &entry->msg_len);
270662306a36Sopenharmony_ci			++entry;
270762306a36Sopenharmony_ci		}
270862306a36Sopenharmony_ci
270962306a36Sopenharmony_ci		if (err)
271062306a36Sopenharmony_ci			break;
271162306a36Sopenharmony_ci		++datagrams;
271262306a36Sopenharmony_ci		if (msg_data_left(&msg_sys))
271362306a36Sopenharmony_ci			break;
271462306a36Sopenharmony_ci		cond_resched();
271562306a36Sopenharmony_ci	}
271662306a36Sopenharmony_ci
271762306a36Sopenharmony_ci	fput_light(sock->file, fput_needed);
271862306a36Sopenharmony_ci
271962306a36Sopenharmony_ci	/* We only return an error if no datagrams were able to be sent */
272062306a36Sopenharmony_ci	if (datagrams != 0)
272162306a36Sopenharmony_ci		return datagrams;
272262306a36Sopenharmony_ci
272362306a36Sopenharmony_ci	return err;
272462306a36Sopenharmony_ci}
272562306a36Sopenharmony_ci
272662306a36Sopenharmony_ciSYSCALL_DEFINE4(sendmmsg, int, fd, struct mmsghdr __user *, mmsg,
272762306a36Sopenharmony_ci		unsigned int, vlen, unsigned int, flags)
272862306a36Sopenharmony_ci{
272962306a36Sopenharmony_ci	return __sys_sendmmsg(fd, mmsg, vlen, flags, true);
273062306a36Sopenharmony_ci}
273162306a36Sopenharmony_ci
273262306a36Sopenharmony_ciint recvmsg_copy_msghdr(struct msghdr *msg,
273362306a36Sopenharmony_ci			struct user_msghdr __user *umsg, unsigned flags,
273462306a36Sopenharmony_ci			struct sockaddr __user **uaddr,
273562306a36Sopenharmony_ci			struct iovec **iov)
273662306a36Sopenharmony_ci{
273762306a36Sopenharmony_ci	ssize_t err;
273862306a36Sopenharmony_ci
273962306a36Sopenharmony_ci	if (MSG_CMSG_COMPAT & flags) {
274062306a36Sopenharmony_ci		struct compat_msghdr __user *msg_compat;
274162306a36Sopenharmony_ci
274262306a36Sopenharmony_ci		msg_compat = (struct compat_msghdr __user *) umsg;
274362306a36Sopenharmony_ci		err = get_compat_msghdr(msg, msg_compat, uaddr, iov);
274462306a36Sopenharmony_ci	} else {
274562306a36Sopenharmony_ci		err = copy_msghdr_from_user(msg, umsg, uaddr, iov);
274662306a36Sopenharmony_ci	}
274762306a36Sopenharmony_ci	if (err < 0)
274862306a36Sopenharmony_ci		return err;
274962306a36Sopenharmony_ci
275062306a36Sopenharmony_ci	return 0;
275162306a36Sopenharmony_ci}
275262306a36Sopenharmony_ci
275362306a36Sopenharmony_cistatic int ____sys_recvmsg(struct socket *sock, struct msghdr *msg_sys,
275462306a36Sopenharmony_ci			   struct user_msghdr __user *msg,
275562306a36Sopenharmony_ci			   struct sockaddr __user *uaddr,
275662306a36Sopenharmony_ci			   unsigned int flags, int nosec)
275762306a36Sopenharmony_ci{
275862306a36Sopenharmony_ci	struct compat_msghdr __user *msg_compat =
275962306a36Sopenharmony_ci					(struct compat_msghdr __user *) msg;
276062306a36Sopenharmony_ci	int __user *uaddr_len = COMPAT_NAMELEN(msg);
276162306a36Sopenharmony_ci	struct sockaddr_storage addr;
276262306a36Sopenharmony_ci	unsigned long cmsg_ptr;
276362306a36Sopenharmony_ci	int len;
276462306a36Sopenharmony_ci	ssize_t err;
276562306a36Sopenharmony_ci
276662306a36Sopenharmony_ci	msg_sys->msg_name = &addr;
276762306a36Sopenharmony_ci	cmsg_ptr = (unsigned long)msg_sys->msg_control;
276862306a36Sopenharmony_ci	msg_sys->msg_flags = flags & (MSG_CMSG_CLOEXEC|MSG_CMSG_COMPAT);
276962306a36Sopenharmony_ci
277062306a36Sopenharmony_ci	/* We assume all kernel code knows the size of sockaddr_storage */
277162306a36Sopenharmony_ci	msg_sys->msg_namelen = 0;
277262306a36Sopenharmony_ci
277362306a36Sopenharmony_ci	if (sock->file->f_flags & O_NONBLOCK)
277462306a36Sopenharmony_ci		flags |= MSG_DONTWAIT;
277562306a36Sopenharmony_ci
277662306a36Sopenharmony_ci	if (unlikely(nosec))
277762306a36Sopenharmony_ci		err = sock_recvmsg_nosec(sock, msg_sys, flags);
277862306a36Sopenharmony_ci	else
277962306a36Sopenharmony_ci		err = sock_recvmsg(sock, msg_sys, flags);
278062306a36Sopenharmony_ci
278162306a36Sopenharmony_ci	if (err < 0)
278262306a36Sopenharmony_ci		goto out;
278362306a36Sopenharmony_ci	len = err;
278462306a36Sopenharmony_ci
278562306a36Sopenharmony_ci	if (uaddr != NULL) {
278662306a36Sopenharmony_ci		err = move_addr_to_user(&addr,
278762306a36Sopenharmony_ci					msg_sys->msg_namelen, uaddr,
278862306a36Sopenharmony_ci					uaddr_len);
278962306a36Sopenharmony_ci		if (err < 0)
279062306a36Sopenharmony_ci			goto out;
279162306a36Sopenharmony_ci	}
279262306a36Sopenharmony_ci	err = __put_user((msg_sys->msg_flags & ~MSG_CMSG_COMPAT),
279362306a36Sopenharmony_ci			 COMPAT_FLAGS(msg));
279462306a36Sopenharmony_ci	if (err)
279562306a36Sopenharmony_ci		goto out;
279662306a36Sopenharmony_ci	if (MSG_CMSG_COMPAT & flags)
279762306a36Sopenharmony_ci		err = __put_user((unsigned long)msg_sys->msg_control - cmsg_ptr,
279862306a36Sopenharmony_ci				 &msg_compat->msg_controllen);
279962306a36Sopenharmony_ci	else
280062306a36Sopenharmony_ci		err = __put_user((unsigned long)msg_sys->msg_control - cmsg_ptr,
280162306a36Sopenharmony_ci				 &msg->msg_controllen);
280262306a36Sopenharmony_ci	if (err)
280362306a36Sopenharmony_ci		goto out;
280462306a36Sopenharmony_ci	err = len;
280562306a36Sopenharmony_ciout:
280662306a36Sopenharmony_ci	return err;
280762306a36Sopenharmony_ci}
280862306a36Sopenharmony_ci
280962306a36Sopenharmony_cistatic int ___sys_recvmsg(struct socket *sock, struct user_msghdr __user *msg,
281062306a36Sopenharmony_ci			 struct msghdr *msg_sys, unsigned int flags, int nosec)
281162306a36Sopenharmony_ci{
281262306a36Sopenharmony_ci	struct iovec iovstack[UIO_FASTIOV], *iov = iovstack;
281362306a36Sopenharmony_ci	/* user mode address pointers */
281462306a36Sopenharmony_ci	struct sockaddr __user *uaddr;
281562306a36Sopenharmony_ci	ssize_t err;
281662306a36Sopenharmony_ci
281762306a36Sopenharmony_ci	err = recvmsg_copy_msghdr(msg_sys, msg, flags, &uaddr, &iov);
281862306a36Sopenharmony_ci	if (err < 0)
281962306a36Sopenharmony_ci		return err;
282062306a36Sopenharmony_ci
282162306a36Sopenharmony_ci	err = ____sys_recvmsg(sock, msg_sys, msg, uaddr, flags, nosec);
282262306a36Sopenharmony_ci	kfree(iov);
282362306a36Sopenharmony_ci	return err;
282462306a36Sopenharmony_ci}
282562306a36Sopenharmony_ci
282662306a36Sopenharmony_ci/*
282762306a36Sopenharmony_ci *	BSD recvmsg interface
282862306a36Sopenharmony_ci */
282962306a36Sopenharmony_ci
283062306a36Sopenharmony_cilong __sys_recvmsg_sock(struct socket *sock, struct msghdr *msg,
283162306a36Sopenharmony_ci			struct user_msghdr __user *umsg,
283262306a36Sopenharmony_ci			struct sockaddr __user *uaddr, unsigned int flags)
283362306a36Sopenharmony_ci{
283462306a36Sopenharmony_ci	return ____sys_recvmsg(sock, msg, umsg, uaddr, flags, 0);
283562306a36Sopenharmony_ci}
283662306a36Sopenharmony_ci
283762306a36Sopenharmony_cilong __sys_recvmsg(int fd, struct user_msghdr __user *msg, unsigned int flags,
283862306a36Sopenharmony_ci		   bool forbid_cmsg_compat)
283962306a36Sopenharmony_ci{
284062306a36Sopenharmony_ci	int fput_needed, err;
284162306a36Sopenharmony_ci	struct msghdr msg_sys;
284262306a36Sopenharmony_ci	struct socket *sock;
284362306a36Sopenharmony_ci
284462306a36Sopenharmony_ci	if (forbid_cmsg_compat && (flags & MSG_CMSG_COMPAT))
284562306a36Sopenharmony_ci		return -EINVAL;
284662306a36Sopenharmony_ci
284762306a36Sopenharmony_ci	sock = sockfd_lookup_light(fd, &err, &fput_needed);
284862306a36Sopenharmony_ci	if (!sock)
284962306a36Sopenharmony_ci		goto out;
285062306a36Sopenharmony_ci
285162306a36Sopenharmony_ci	err = ___sys_recvmsg(sock, msg, &msg_sys, flags, 0);
285262306a36Sopenharmony_ci
285362306a36Sopenharmony_ci	fput_light(sock->file, fput_needed);
285462306a36Sopenharmony_ciout:
285562306a36Sopenharmony_ci	return err;
285662306a36Sopenharmony_ci}
285762306a36Sopenharmony_ci
285862306a36Sopenharmony_ciSYSCALL_DEFINE3(recvmsg, int, fd, struct user_msghdr __user *, msg,
285962306a36Sopenharmony_ci		unsigned int, flags)
286062306a36Sopenharmony_ci{
286162306a36Sopenharmony_ci	return __sys_recvmsg(fd, msg, flags, true);
286262306a36Sopenharmony_ci}
286362306a36Sopenharmony_ci
286462306a36Sopenharmony_ci/*
286562306a36Sopenharmony_ci *     Linux recvmmsg interface
286662306a36Sopenharmony_ci */
286762306a36Sopenharmony_ci
286862306a36Sopenharmony_cistatic int do_recvmmsg(int fd, struct mmsghdr __user *mmsg,
286962306a36Sopenharmony_ci			  unsigned int vlen, unsigned int flags,
287062306a36Sopenharmony_ci			  struct timespec64 *timeout)
287162306a36Sopenharmony_ci{
287262306a36Sopenharmony_ci	int fput_needed, err, datagrams;
287362306a36Sopenharmony_ci	struct socket *sock;
287462306a36Sopenharmony_ci	struct mmsghdr __user *entry;
287562306a36Sopenharmony_ci	struct compat_mmsghdr __user *compat_entry;
287662306a36Sopenharmony_ci	struct msghdr msg_sys;
287762306a36Sopenharmony_ci	struct timespec64 end_time;
287862306a36Sopenharmony_ci	struct timespec64 timeout64;
287962306a36Sopenharmony_ci
288062306a36Sopenharmony_ci	if (timeout &&
288162306a36Sopenharmony_ci	    poll_select_set_timeout(&end_time, timeout->tv_sec,
288262306a36Sopenharmony_ci				    timeout->tv_nsec))
288362306a36Sopenharmony_ci		return -EINVAL;
288462306a36Sopenharmony_ci
288562306a36Sopenharmony_ci	datagrams = 0;
288662306a36Sopenharmony_ci
288762306a36Sopenharmony_ci	sock = sockfd_lookup_light(fd, &err, &fput_needed);
288862306a36Sopenharmony_ci	if (!sock)
288962306a36Sopenharmony_ci		return err;
289062306a36Sopenharmony_ci
289162306a36Sopenharmony_ci	if (likely(!(flags & MSG_ERRQUEUE))) {
289262306a36Sopenharmony_ci		err = sock_error(sock->sk);
289362306a36Sopenharmony_ci		if (err) {
289462306a36Sopenharmony_ci			datagrams = err;
289562306a36Sopenharmony_ci			goto out_put;
289662306a36Sopenharmony_ci		}
289762306a36Sopenharmony_ci	}
289862306a36Sopenharmony_ci
289962306a36Sopenharmony_ci	entry = mmsg;
290062306a36Sopenharmony_ci	compat_entry = (struct compat_mmsghdr __user *)mmsg;
290162306a36Sopenharmony_ci
290262306a36Sopenharmony_ci	while (datagrams < vlen) {
290362306a36Sopenharmony_ci		/*
290462306a36Sopenharmony_ci		 * No need to ask LSM for more than the first datagram.
290562306a36Sopenharmony_ci		 */
290662306a36Sopenharmony_ci		if (MSG_CMSG_COMPAT & flags) {
290762306a36Sopenharmony_ci			err = ___sys_recvmsg(sock, (struct user_msghdr __user *)compat_entry,
290862306a36Sopenharmony_ci					     &msg_sys, flags & ~MSG_WAITFORONE,
290962306a36Sopenharmony_ci					     datagrams);
291062306a36Sopenharmony_ci			if (err < 0)
291162306a36Sopenharmony_ci				break;
291262306a36Sopenharmony_ci			err = __put_user(err, &compat_entry->msg_len);
291362306a36Sopenharmony_ci			++compat_entry;
291462306a36Sopenharmony_ci		} else {
291562306a36Sopenharmony_ci			err = ___sys_recvmsg(sock,
291662306a36Sopenharmony_ci					     (struct user_msghdr __user *)entry,
291762306a36Sopenharmony_ci					     &msg_sys, flags & ~MSG_WAITFORONE,
291862306a36Sopenharmony_ci					     datagrams);
291962306a36Sopenharmony_ci			if (err < 0)
292062306a36Sopenharmony_ci				break;
292162306a36Sopenharmony_ci			err = put_user(err, &entry->msg_len);
292262306a36Sopenharmony_ci			++entry;
292362306a36Sopenharmony_ci		}
292462306a36Sopenharmony_ci
292562306a36Sopenharmony_ci		if (err)
292662306a36Sopenharmony_ci			break;
292762306a36Sopenharmony_ci		++datagrams;
292862306a36Sopenharmony_ci
292962306a36Sopenharmony_ci		/* MSG_WAITFORONE turns on MSG_DONTWAIT after one packet */
293062306a36Sopenharmony_ci		if (flags & MSG_WAITFORONE)
293162306a36Sopenharmony_ci			flags |= MSG_DONTWAIT;
293262306a36Sopenharmony_ci
293362306a36Sopenharmony_ci		if (timeout) {
293462306a36Sopenharmony_ci			ktime_get_ts64(&timeout64);
293562306a36Sopenharmony_ci			*timeout = timespec64_sub(end_time, timeout64);
293662306a36Sopenharmony_ci			if (timeout->tv_sec < 0) {
293762306a36Sopenharmony_ci				timeout->tv_sec = timeout->tv_nsec = 0;
293862306a36Sopenharmony_ci				break;
293962306a36Sopenharmony_ci			}
294062306a36Sopenharmony_ci
294162306a36Sopenharmony_ci			/* Timeout, return less than vlen datagrams */
294262306a36Sopenharmony_ci			if (timeout->tv_nsec == 0 && timeout->tv_sec == 0)
294362306a36Sopenharmony_ci				break;
294462306a36Sopenharmony_ci		}
294562306a36Sopenharmony_ci
294662306a36Sopenharmony_ci		/* Out of band data, return right away */
294762306a36Sopenharmony_ci		if (msg_sys.msg_flags & MSG_OOB)
294862306a36Sopenharmony_ci			break;
294962306a36Sopenharmony_ci		cond_resched();
295062306a36Sopenharmony_ci	}
295162306a36Sopenharmony_ci
295262306a36Sopenharmony_ci	if (err == 0)
295362306a36Sopenharmony_ci		goto out_put;
295462306a36Sopenharmony_ci
295562306a36Sopenharmony_ci	if (datagrams == 0) {
295662306a36Sopenharmony_ci		datagrams = err;
295762306a36Sopenharmony_ci		goto out_put;
295862306a36Sopenharmony_ci	}
295962306a36Sopenharmony_ci
296062306a36Sopenharmony_ci	/*
296162306a36Sopenharmony_ci	 * We may return less entries than requested (vlen) if the
296262306a36Sopenharmony_ci	 * sock is non block and there aren't enough datagrams...
296362306a36Sopenharmony_ci	 */
296462306a36Sopenharmony_ci	if (err != -EAGAIN) {
296562306a36Sopenharmony_ci		/*
296662306a36Sopenharmony_ci		 * ... or  if recvmsg returns an error after we
296762306a36Sopenharmony_ci		 * received some datagrams, where we record the
296862306a36Sopenharmony_ci		 * error to return on the next call or if the
296962306a36Sopenharmony_ci		 * app asks about it using getsockopt(SO_ERROR).
297062306a36Sopenharmony_ci		 */
297162306a36Sopenharmony_ci		WRITE_ONCE(sock->sk->sk_err, -err);
297262306a36Sopenharmony_ci	}
297362306a36Sopenharmony_ciout_put:
297462306a36Sopenharmony_ci	fput_light(sock->file, fput_needed);
297562306a36Sopenharmony_ci
297662306a36Sopenharmony_ci	return datagrams;
297762306a36Sopenharmony_ci}
297862306a36Sopenharmony_ci
297962306a36Sopenharmony_ciint __sys_recvmmsg(int fd, struct mmsghdr __user *mmsg,
298062306a36Sopenharmony_ci		   unsigned int vlen, unsigned int flags,
298162306a36Sopenharmony_ci		   struct __kernel_timespec __user *timeout,
298262306a36Sopenharmony_ci		   struct old_timespec32 __user *timeout32)
298362306a36Sopenharmony_ci{
298462306a36Sopenharmony_ci	int datagrams;
298562306a36Sopenharmony_ci	struct timespec64 timeout_sys;
298662306a36Sopenharmony_ci
298762306a36Sopenharmony_ci	if (timeout && get_timespec64(&timeout_sys, timeout))
298862306a36Sopenharmony_ci		return -EFAULT;
298962306a36Sopenharmony_ci
299062306a36Sopenharmony_ci	if (timeout32 && get_old_timespec32(&timeout_sys, timeout32))
299162306a36Sopenharmony_ci		return -EFAULT;
299262306a36Sopenharmony_ci
299362306a36Sopenharmony_ci	if (!timeout && !timeout32)
299462306a36Sopenharmony_ci		return do_recvmmsg(fd, mmsg, vlen, flags, NULL);
299562306a36Sopenharmony_ci
299662306a36Sopenharmony_ci	datagrams = do_recvmmsg(fd, mmsg, vlen, flags, &timeout_sys);
299762306a36Sopenharmony_ci
299862306a36Sopenharmony_ci	if (datagrams <= 0)
299962306a36Sopenharmony_ci		return datagrams;
300062306a36Sopenharmony_ci
300162306a36Sopenharmony_ci	if (timeout && put_timespec64(&timeout_sys, timeout))
300262306a36Sopenharmony_ci		datagrams = -EFAULT;
300362306a36Sopenharmony_ci
300462306a36Sopenharmony_ci	if (timeout32 && put_old_timespec32(&timeout_sys, timeout32))
300562306a36Sopenharmony_ci		datagrams = -EFAULT;
300662306a36Sopenharmony_ci
300762306a36Sopenharmony_ci	return datagrams;
300862306a36Sopenharmony_ci}
300962306a36Sopenharmony_ci
301062306a36Sopenharmony_ciSYSCALL_DEFINE5(recvmmsg, int, fd, struct mmsghdr __user *, mmsg,
301162306a36Sopenharmony_ci		unsigned int, vlen, unsigned int, flags,
301262306a36Sopenharmony_ci		struct __kernel_timespec __user *, timeout)
301362306a36Sopenharmony_ci{
301462306a36Sopenharmony_ci	if (flags & MSG_CMSG_COMPAT)
301562306a36Sopenharmony_ci		return -EINVAL;
301662306a36Sopenharmony_ci
301762306a36Sopenharmony_ci	return __sys_recvmmsg(fd, mmsg, vlen, flags, timeout, NULL);
301862306a36Sopenharmony_ci}
301962306a36Sopenharmony_ci
302062306a36Sopenharmony_ci#ifdef CONFIG_COMPAT_32BIT_TIME
302162306a36Sopenharmony_ciSYSCALL_DEFINE5(recvmmsg_time32, int, fd, struct mmsghdr __user *, mmsg,
302262306a36Sopenharmony_ci		unsigned int, vlen, unsigned int, flags,
302362306a36Sopenharmony_ci		struct old_timespec32 __user *, timeout)
302462306a36Sopenharmony_ci{
302562306a36Sopenharmony_ci	if (flags & MSG_CMSG_COMPAT)
302662306a36Sopenharmony_ci		return -EINVAL;
302762306a36Sopenharmony_ci
302862306a36Sopenharmony_ci	return __sys_recvmmsg(fd, mmsg, vlen, flags, NULL, timeout);
302962306a36Sopenharmony_ci}
303062306a36Sopenharmony_ci#endif
303162306a36Sopenharmony_ci
303262306a36Sopenharmony_ci#ifdef __ARCH_WANT_SYS_SOCKETCALL
303362306a36Sopenharmony_ci/* Argument list sizes for sys_socketcall */
303462306a36Sopenharmony_ci#define AL(x) ((x) * sizeof(unsigned long))
303562306a36Sopenharmony_cistatic const unsigned char nargs[21] = {
303662306a36Sopenharmony_ci	AL(0), AL(3), AL(3), AL(3), AL(2), AL(3),
303762306a36Sopenharmony_ci	AL(3), AL(3), AL(4), AL(4), AL(4), AL(6),
303862306a36Sopenharmony_ci	AL(6), AL(2), AL(5), AL(5), AL(3), AL(3),
303962306a36Sopenharmony_ci	AL(4), AL(5), AL(4)
304062306a36Sopenharmony_ci};
304162306a36Sopenharmony_ci
304262306a36Sopenharmony_ci#undef AL
304362306a36Sopenharmony_ci
304462306a36Sopenharmony_ci/*
304562306a36Sopenharmony_ci *	System call vectors.
304662306a36Sopenharmony_ci *
304762306a36Sopenharmony_ci *	Argument checking cleaned up. Saved 20% in size.
304862306a36Sopenharmony_ci *  This function doesn't need to set the kernel lock because
304962306a36Sopenharmony_ci *  it is set by the callees.
305062306a36Sopenharmony_ci */
305162306a36Sopenharmony_ci
305262306a36Sopenharmony_ciSYSCALL_DEFINE2(socketcall, int, call, unsigned long __user *, args)
305362306a36Sopenharmony_ci{
305462306a36Sopenharmony_ci	unsigned long a[AUDITSC_ARGS];
305562306a36Sopenharmony_ci	unsigned long a0, a1;
305662306a36Sopenharmony_ci	int err;
305762306a36Sopenharmony_ci	unsigned int len;
305862306a36Sopenharmony_ci
305962306a36Sopenharmony_ci	if (call < 1 || call > SYS_SENDMMSG)
306062306a36Sopenharmony_ci		return -EINVAL;
306162306a36Sopenharmony_ci	call = array_index_nospec(call, SYS_SENDMMSG + 1);
306262306a36Sopenharmony_ci
306362306a36Sopenharmony_ci	len = nargs[call];
306462306a36Sopenharmony_ci	if (len > sizeof(a))
306562306a36Sopenharmony_ci		return -EINVAL;
306662306a36Sopenharmony_ci
306762306a36Sopenharmony_ci	/* copy_from_user should be SMP safe. */
306862306a36Sopenharmony_ci	if (copy_from_user(a, args, len))
306962306a36Sopenharmony_ci		return -EFAULT;
307062306a36Sopenharmony_ci
307162306a36Sopenharmony_ci	err = audit_socketcall(nargs[call] / sizeof(unsigned long), a);
307262306a36Sopenharmony_ci	if (err)
307362306a36Sopenharmony_ci		return err;
307462306a36Sopenharmony_ci
307562306a36Sopenharmony_ci	a0 = a[0];
307662306a36Sopenharmony_ci	a1 = a[1];
307762306a36Sopenharmony_ci
307862306a36Sopenharmony_ci	switch (call) {
307962306a36Sopenharmony_ci	case SYS_SOCKET:
308062306a36Sopenharmony_ci		err = __sys_socket(a0, a1, a[2]);
308162306a36Sopenharmony_ci		break;
308262306a36Sopenharmony_ci	case SYS_BIND:
308362306a36Sopenharmony_ci		err = __sys_bind(a0, (struct sockaddr __user *)a1, a[2]);
308462306a36Sopenharmony_ci		break;
308562306a36Sopenharmony_ci	case SYS_CONNECT:
308662306a36Sopenharmony_ci		err = __sys_connect(a0, (struct sockaddr __user *)a1, a[2]);
308762306a36Sopenharmony_ci		break;
308862306a36Sopenharmony_ci	case SYS_LISTEN:
308962306a36Sopenharmony_ci		err = __sys_listen(a0, a1);
309062306a36Sopenharmony_ci		break;
309162306a36Sopenharmony_ci	case SYS_ACCEPT:
309262306a36Sopenharmony_ci		err = __sys_accept4(a0, (struct sockaddr __user *)a1,
309362306a36Sopenharmony_ci				    (int __user *)a[2], 0);
309462306a36Sopenharmony_ci		break;
309562306a36Sopenharmony_ci	case SYS_GETSOCKNAME:
309662306a36Sopenharmony_ci		err =
309762306a36Sopenharmony_ci		    __sys_getsockname(a0, (struct sockaddr __user *)a1,
309862306a36Sopenharmony_ci				      (int __user *)a[2]);
309962306a36Sopenharmony_ci		break;
310062306a36Sopenharmony_ci	case SYS_GETPEERNAME:
310162306a36Sopenharmony_ci		err =
310262306a36Sopenharmony_ci		    __sys_getpeername(a0, (struct sockaddr __user *)a1,
310362306a36Sopenharmony_ci				      (int __user *)a[2]);
310462306a36Sopenharmony_ci		break;
310562306a36Sopenharmony_ci	case SYS_SOCKETPAIR:
310662306a36Sopenharmony_ci		err = __sys_socketpair(a0, a1, a[2], (int __user *)a[3]);
310762306a36Sopenharmony_ci		break;
310862306a36Sopenharmony_ci	case SYS_SEND:
310962306a36Sopenharmony_ci		err = __sys_sendto(a0, (void __user *)a1, a[2], a[3],
311062306a36Sopenharmony_ci				   NULL, 0);
311162306a36Sopenharmony_ci		break;
311262306a36Sopenharmony_ci	case SYS_SENDTO:
311362306a36Sopenharmony_ci		err = __sys_sendto(a0, (void __user *)a1, a[2], a[3],
311462306a36Sopenharmony_ci				   (struct sockaddr __user *)a[4], a[5]);
311562306a36Sopenharmony_ci		break;
311662306a36Sopenharmony_ci	case SYS_RECV:
311762306a36Sopenharmony_ci		err = __sys_recvfrom(a0, (void __user *)a1, a[2], a[3],
311862306a36Sopenharmony_ci				     NULL, NULL);
311962306a36Sopenharmony_ci		break;
312062306a36Sopenharmony_ci	case SYS_RECVFROM:
312162306a36Sopenharmony_ci		err = __sys_recvfrom(a0, (void __user *)a1, a[2], a[3],
312262306a36Sopenharmony_ci				     (struct sockaddr __user *)a[4],
312362306a36Sopenharmony_ci				     (int __user *)a[5]);
312462306a36Sopenharmony_ci		break;
312562306a36Sopenharmony_ci	case SYS_SHUTDOWN:
312662306a36Sopenharmony_ci		err = __sys_shutdown(a0, a1);
312762306a36Sopenharmony_ci		break;
312862306a36Sopenharmony_ci	case SYS_SETSOCKOPT:
312962306a36Sopenharmony_ci		err = __sys_setsockopt(a0, a1, a[2], (char __user *)a[3],
313062306a36Sopenharmony_ci				       a[4]);
313162306a36Sopenharmony_ci		break;
313262306a36Sopenharmony_ci	case SYS_GETSOCKOPT:
313362306a36Sopenharmony_ci		err =
313462306a36Sopenharmony_ci		    __sys_getsockopt(a0, a1, a[2], (char __user *)a[3],
313562306a36Sopenharmony_ci				     (int __user *)a[4]);
313662306a36Sopenharmony_ci		break;
313762306a36Sopenharmony_ci	case SYS_SENDMSG:
313862306a36Sopenharmony_ci		err = __sys_sendmsg(a0, (struct user_msghdr __user *)a1,
313962306a36Sopenharmony_ci				    a[2], true);
314062306a36Sopenharmony_ci		break;
314162306a36Sopenharmony_ci	case SYS_SENDMMSG:
314262306a36Sopenharmony_ci		err = __sys_sendmmsg(a0, (struct mmsghdr __user *)a1, a[2],
314362306a36Sopenharmony_ci				     a[3], true);
314462306a36Sopenharmony_ci		break;
314562306a36Sopenharmony_ci	case SYS_RECVMSG:
314662306a36Sopenharmony_ci		err = __sys_recvmsg(a0, (struct user_msghdr __user *)a1,
314762306a36Sopenharmony_ci				    a[2], true);
314862306a36Sopenharmony_ci		break;
314962306a36Sopenharmony_ci	case SYS_RECVMMSG:
315062306a36Sopenharmony_ci		if (IS_ENABLED(CONFIG_64BIT))
315162306a36Sopenharmony_ci			err = __sys_recvmmsg(a0, (struct mmsghdr __user *)a1,
315262306a36Sopenharmony_ci					     a[2], a[3],
315362306a36Sopenharmony_ci					     (struct __kernel_timespec __user *)a[4],
315462306a36Sopenharmony_ci					     NULL);
315562306a36Sopenharmony_ci		else
315662306a36Sopenharmony_ci			err = __sys_recvmmsg(a0, (struct mmsghdr __user *)a1,
315762306a36Sopenharmony_ci					     a[2], a[3], NULL,
315862306a36Sopenharmony_ci					     (struct old_timespec32 __user *)a[4]);
315962306a36Sopenharmony_ci		break;
316062306a36Sopenharmony_ci	case SYS_ACCEPT4:
316162306a36Sopenharmony_ci		err = __sys_accept4(a0, (struct sockaddr __user *)a1,
316262306a36Sopenharmony_ci				    (int __user *)a[2], a[3]);
316362306a36Sopenharmony_ci		break;
316462306a36Sopenharmony_ci	default:
316562306a36Sopenharmony_ci		err = -EINVAL;
316662306a36Sopenharmony_ci		break;
316762306a36Sopenharmony_ci	}
316862306a36Sopenharmony_ci	return err;
316962306a36Sopenharmony_ci}
317062306a36Sopenharmony_ci
317162306a36Sopenharmony_ci#endif				/* __ARCH_WANT_SYS_SOCKETCALL */
317262306a36Sopenharmony_ci
317362306a36Sopenharmony_ci/**
317462306a36Sopenharmony_ci *	sock_register - add a socket protocol handler
317562306a36Sopenharmony_ci *	@ops: description of protocol
317662306a36Sopenharmony_ci *
317762306a36Sopenharmony_ci *	This function is called by a protocol handler that wants to
317862306a36Sopenharmony_ci *	advertise its address family, and have it linked into the
317962306a36Sopenharmony_ci *	socket interface. The value ops->family corresponds to the
318062306a36Sopenharmony_ci *	socket system call protocol family.
318162306a36Sopenharmony_ci */
318262306a36Sopenharmony_ciint sock_register(const struct net_proto_family *ops)
318362306a36Sopenharmony_ci{
318462306a36Sopenharmony_ci	int err;
318562306a36Sopenharmony_ci
318662306a36Sopenharmony_ci	if (ops->family >= NPROTO) {
318762306a36Sopenharmony_ci		pr_crit("protocol %d >= NPROTO(%d)\n", ops->family, NPROTO);
318862306a36Sopenharmony_ci		return -ENOBUFS;
318962306a36Sopenharmony_ci	}
319062306a36Sopenharmony_ci
319162306a36Sopenharmony_ci	spin_lock(&net_family_lock);
319262306a36Sopenharmony_ci	if (rcu_dereference_protected(net_families[ops->family],
319362306a36Sopenharmony_ci				      lockdep_is_held(&net_family_lock)))
319462306a36Sopenharmony_ci		err = -EEXIST;
319562306a36Sopenharmony_ci	else {
319662306a36Sopenharmony_ci		rcu_assign_pointer(net_families[ops->family], ops);
319762306a36Sopenharmony_ci		err = 0;
319862306a36Sopenharmony_ci	}
319962306a36Sopenharmony_ci	spin_unlock(&net_family_lock);
320062306a36Sopenharmony_ci
320162306a36Sopenharmony_ci	pr_info("NET: Registered %s protocol family\n", pf_family_names[ops->family]);
320262306a36Sopenharmony_ci	return err;
320362306a36Sopenharmony_ci}
320462306a36Sopenharmony_ciEXPORT_SYMBOL(sock_register);
320562306a36Sopenharmony_ci
320662306a36Sopenharmony_ci/**
320762306a36Sopenharmony_ci *	sock_unregister - remove a protocol handler
320862306a36Sopenharmony_ci *	@family: protocol family to remove
320962306a36Sopenharmony_ci *
321062306a36Sopenharmony_ci *	This function is called by a protocol handler that wants to
321162306a36Sopenharmony_ci *	remove its address family, and have it unlinked from the
321262306a36Sopenharmony_ci *	new socket creation.
321362306a36Sopenharmony_ci *
321462306a36Sopenharmony_ci *	If protocol handler is a module, then it can use module reference
321562306a36Sopenharmony_ci *	counts to protect against new references. If protocol handler is not
321662306a36Sopenharmony_ci *	a module then it needs to provide its own protection in
321762306a36Sopenharmony_ci *	the ops->create routine.
321862306a36Sopenharmony_ci */
321962306a36Sopenharmony_civoid sock_unregister(int family)
322062306a36Sopenharmony_ci{
322162306a36Sopenharmony_ci	BUG_ON(family < 0 || family >= NPROTO);
322262306a36Sopenharmony_ci
322362306a36Sopenharmony_ci	spin_lock(&net_family_lock);
322462306a36Sopenharmony_ci	RCU_INIT_POINTER(net_families[family], NULL);
322562306a36Sopenharmony_ci	spin_unlock(&net_family_lock);
322662306a36Sopenharmony_ci
322762306a36Sopenharmony_ci	synchronize_rcu();
322862306a36Sopenharmony_ci
322962306a36Sopenharmony_ci	pr_info("NET: Unregistered %s protocol family\n", pf_family_names[family]);
323062306a36Sopenharmony_ci}
323162306a36Sopenharmony_ciEXPORT_SYMBOL(sock_unregister);
323262306a36Sopenharmony_ci
323362306a36Sopenharmony_cibool sock_is_registered(int family)
323462306a36Sopenharmony_ci{
323562306a36Sopenharmony_ci	return family < NPROTO && rcu_access_pointer(net_families[family]);
323662306a36Sopenharmony_ci}
323762306a36Sopenharmony_ci
323862306a36Sopenharmony_cistatic int __init sock_init(void)
323962306a36Sopenharmony_ci{
324062306a36Sopenharmony_ci	int err;
324162306a36Sopenharmony_ci	/*
324262306a36Sopenharmony_ci	 *      Initialize the network sysctl infrastructure.
324362306a36Sopenharmony_ci	 */
324462306a36Sopenharmony_ci	err = net_sysctl_init();
324562306a36Sopenharmony_ci	if (err)
324662306a36Sopenharmony_ci		goto out;
324762306a36Sopenharmony_ci
324862306a36Sopenharmony_ci	/*
324962306a36Sopenharmony_ci	 *      Initialize skbuff SLAB cache
325062306a36Sopenharmony_ci	 */
325162306a36Sopenharmony_ci	skb_init();
325262306a36Sopenharmony_ci
325362306a36Sopenharmony_ci	/*
325462306a36Sopenharmony_ci	 *      Initialize the protocols module.
325562306a36Sopenharmony_ci	 */
325662306a36Sopenharmony_ci
325762306a36Sopenharmony_ci	init_inodecache();
325862306a36Sopenharmony_ci
325962306a36Sopenharmony_ci	err = register_filesystem(&sock_fs_type);
326062306a36Sopenharmony_ci	if (err)
326162306a36Sopenharmony_ci		goto out;
326262306a36Sopenharmony_ci	sock_mnt = kern_mount(&sock_fs_type);
326362306a36Sopenharmony_ci	if (IS_ERR(sock_mnt)) {
326462306a36Sopenharmony_ci		err = PTR_ERR(sock_mnt);
326562306a36Sopenharmony_ci		goto out_mount;
326662306a36Sopenharmony_ci	}
326762306a36Sopenharmony_ci
326862306a36Sopenharmony_ci	/* The real protocol initialization is performed in later initcalls.
326962306a36Sopenharmony_ci	 */
327062306a36Sopenharmony_ci
327162306a36Sopenharmony_ci#ifdef CONFIG_NETFILTER
327262306a36Sopenharmony_ci	err = netfilter_init();
327362306a36Sopenharmony_ci	if (err)
327462306a36Sopenharmony_ci		goto out;
327562306a36Sopenharmony_ci#endif
327662306a36Sopenharmony_ci
327762306a36Sopenharmony_ci	ptp_classifier_init();
327862306a36Sopenharmony_ci
327962306a36Sopenharmony_ciout:
328062306a36Sopenharmony_ci	return err;
328162306a36Sopenharmony_ci
328262306a36Sopenharmony_ciout_mount:
328362306a36Sopenharmony_ci	unregister_filesystem(&sock_fs_type);
328462306a36Sopenharmony_ci	goto out;
328562306a36Sopenharmony_ci}
328662306a36Sopenharmony_ci
328762306a36Sopenharmony_cicore_initcall(sock_init);	/* early initcall */
328862306a36Sopenharmony_ci
328962306a36Sopenharmony_ci#ifdef CONFIG_PROC_FS
329062306a36Sopenharmony_civoid socket_seq_show(struct seq_file *seq)
329162306a36Sopenharmony_ci{
329262306a36Sopenharmony_ci	seq_printf(seq, "sockets: used %d\n",
329362306a36Sopenharmony_ci		   sock_inuse_get(seq->private));
329462306a36Sopenharmony_ci}
329562306a36Sopenharmony_ci#endif				/* CONFIG_PROC_FS */
329662306a36Sopenharmony_ci
329762306a36Sopenharmony_ci/* Handle the fact that while struct ifreq has the same *layout* on
329862306a36Sopenharmony_ci * 32/64 for everything but ifreq::ifru_ifmap and ifreq::ifru_data,
329962306a36Sopenharmony_ci * which are handled elsewhere, it still has different *size* due to
330062306a36Sopenharmony_ci * ifreq::ifru_ifmap (which is 16 bytes on 32 bit, 24 bytes on 64-bit,
330162306a36Sopenharmony_ci * resulting in struct ifreq being 32 and 40 bytes respectively).
330262306a36Sopenharmony_ci * As a result, if the struct happens to be at the end of a page and
330362306a36Sopenharmony_ci * the next page isn't readable/writable, we get a fault. To prevent
330462306a36Sopenharmony_ci * that, copy back and forth to the full size.
330562306a36Sopenharmony_ci */
330662306a36Sopenharmony_ciint get_user_ifreq(struct ifreq *ifr, void __user **ifrdata, void __user *arg)
330762306a36Sopenharmony_ci{
330862306a36Sopenharmony_ci	if (in_compat_syscall()) {
330962306a36Sopenharmony_ci		struct compat_ifreq *ifr32 = (struct compat_ifreq *)ifr;
331062306a36Sopenharmony_ci
331162306a36Sopenharmony_ci		memset(ifr, 0, sizeof(*ifr));
331262306a36Sopenharmony_ci		if (copy_from_user(ifr32, arg, sizeof(*ifr32)))
331362306a36Sopenharmony_ci			return -EFAULT;
331462306a36Sopenharmony_ci
331562306a36Sopenharmony_ci		if (ifrdata)
331662306a36Sopenharmony_ci			*ifrdata = compat_ptr(ifr32->ifr_data);
331762306a36Sopenharmony_ci
331862306a36Sopenharmony_ci		return 0;
331962306a36Sopenharmony_ci	}
332062306a36Sopenharmony_ci
332162306a36Sopenharmony_ci	if (copy_from_user(ifr, arg, sizeof(*ifr)))
332262306a36Sopenharmony_ci		return -EFAULT;
332362306a36Sopenharmony_ci
332462306a36Sopenharmony_ci	if (ifrdata)
332562306a36Sopenharmony_ci		*ifrdata = ifr->ifr_data;
332662306a36Sopenharmony_ci
332762306a36Sopenharmony_ci	return 0;
332862306a36Sopenharmony_ci}
332962306a36Sopenharmony_ciEXPORT_SYMBOL(get_user_ifreq);
333062306a36Sopenharmony_ci
333162306a36Sopenharmony_ciint put_user_ifreq(struct ifreq *ifr, void __user *arg)
333262306a36Sopenharmony_ci{
333362306a36Sopenharmony_ci	size_t size = sizeof(*ifr);
333462306a36Sopenharmony_ci
333562306a36Sopenharmony_ci	if (in_compat_syscall())
333662306a36Sopenharmony_ci		size = sizeof(struct compat_ifreq);
333762306a36Sopenharmony_ci
333862306a36Sopenharmony_ci	if (copy_to_user(arg, ifr, size))
333962306a36Sopenharmony_ci		return -EFAULT;
334062306a36Sopenharmony_ci
334162306a36Sopenharmony_ci	return 0;
334262306a36Sopenharmony_ci}
334362306a36Sopenharmony_ciEXPORT_SYMBOL(put_user_ifreq);
334462306a36Sopenharmony_ci
334562306a36Sopenharmony_ci#ifdef CONFIG_COMPAT
334662306a36Sopenharmony_cistatic int compat_siocwandev(struct net *net, struct compat_ifreq __user *uifr32)
334762306a36Sopenharmony_ci{
334862306a36Sopenharmony_ci	compat_uptr_t uptr32;
334962306a36Sopenharmony_ci	struct ifreq ifr;
335062306a36Sopenharmony_ci	void __user *saved;
335162306a36Sopenharmony_ci	int err;
335262306a36Sopenharmony_ci
335362306a36Sopenharmony_ci	if (get_user_ifreq(&ifr, NULL, uifr32))
335462306a36Sopenharmony_ci		return -EFAULT;
335562306a36Sopenharmony_ci
335662306a36Sopenharmony_ci	if (get_user(uptr32, &uifr32->ifr_settings.ifs_ifsu))
335762306a36Sopenharmony_ci		return -EFAULT;
335862306a36Sopenharmony_ci
335962306a36Sopenharmony_ci	saved = ifr.ifr_settings.ifs_ifsu.raw_hdlc;
336062306a36Sopenharmony_ci	ifr.ifr_settings.ifs_ifsu.raw_hdlc = compat_ptr(uptr32);
336162306a36Sopenharmony_ci
336262306a36Sopenharmony_ci	err = dev_ioctl(net, SIOCWANDEV, &ifr, NULL, NULL);
336362306a36Sopenharmony_ci	if (!err) {
336462306a36Sopenharmony_ci		ifr.ifr_settings.ifs_ifsu.raw_hdlc = saved;
336562306a36Sopenharmony_ci		if (put_user_ifreq(&ifr, uifr32))
336662306a36Sopenharmony_ci			err = -EFAULT;
336762306a36Sopenharmony_ci	}
336862306a36Sopenharmony_ci	return err;
336962306a36Sopenharmony_ci}
337062306a36Sopenharmony_ci
337162306a36Sopenharmony_ci/* Handle ioctls that use ifreq::ifr_data and just need struct ifreq converted */
337262306a36Sopenharmony_cistatic int compat_ifr_data_ioctl(struct net *net, unsigned int cmd,
337362306a36Sopenharmony_ci				 struct compat_ifreq __user *u_ifreq32)
337462306a36Sopenharmony_ci{
337562306a36Sopenharmony_ci	struct ifreq ifreq;
337662306a36Sopenharmony_ci	void __user *data;
337762306a36Sopenharmony_ci
337862306a36Sopenharmony_ci	if (!is_socket_ioctl_cmd(cmd))
337962306a36Sopenharmony_ci		return -ENOTTY;
338062306a36Sopenharmony_ci	if (get_user_ifreq(&ifreq, &data, u_ifreq32))
338162306a36Sopenharmony_ci		return -EFAULT;
338262306a36Sopenharmony_ci	ifreq.ifr_data = data;
338362306a36Sopenharmony_ci
338462306a36Sopenharmony_ci	return dev_ioctl(net, cmd, &ifreq, data, NULL);
338562306a36Sopenharmony_ci}
338662306a36Sopenharmony_ci
338762306a36Sopenharmony_cistatic int compat_sock_ioctl_trans(struct file *file, struct socket *sock,
338862306a36Sopenharmony_ci			 unsigned int cmd, unsigned long arg)
338962306a36Sopenharmony_ci{
339062306a36Sopenharmony_ci	void __user *argp = compat_ptr(arg);
339162306a36Sopenharmony_ci	struct sock *sk = sock->sk;
339262306a36Sopenharmony_ci	struct net *net = sock_net(sk);
339362306a36Sopenharmony_ci	const struct proto_ops *ops;
339462306a36Sopenharmony_ci
339562306a36Sopenharmony_ci	if (cmd >= SIOCDEVPRIVATE && cmd <= (SIOCDEVPRIVATE + 15))
339662306a36Sopenharmony_ci		return sock_ioctl(file, cmd, (unsigned long)argp);
339762306a36Sopenharmony_ci
339862306a36Sopenharmony_ci	switch (cmd) {
339962306a36Sopenharmony_ci	case SIOCWANDEV:
340062306a36Sopenharmony_ci		return compat_siocwandev(net, argp);
340162306a36Sopenharmony_ci	case SIOCGSTAMP_OLD:
340262306a36Sopenharmony_ci	case SIOCGSTAMPNS_OLD:
340362306a36Sopenharmony_ci		ops = READ_ONCE(sock->ops);
340462306a36Sopenharmony_ci		if (!ops->gettstamp)
340562306a36Sopenharmony_ci			return -ENOIOCTLCMD;
340662306a36Sopenharmony_ci		return ops->gettstamp(sock, argp, cmd == SIOCGSTAMP_OLD,
340762306a36Sopenharmony_ci				      !COMPAT_USE_64BIT_TIME);
340862306a36Sopenharmony_ci
340962306a36Sopenharmony_ci	case SIOCETHTOOL:
341062306a36Sopenharmony_ci	case SIOCBONDSLAVEINFOQUERY:
341162306a36Sopenharmony_ci	case SIOCBONDINFOQUERY:
341262306a36Sopenharmony_ci	case SIOCSHWTSTAMP:
341362306a36Sopenharmony_ci	case SIOCGHWTSTAMP:
341462306a36Sopenharmony_ci		return compat_ifr_data_ioctl(net, cmd, argp);
341562306a36Sopenharmony_ci
341662306a36Sopenharmony_ci	case FIOSETOWN:
341762306a36Sopenharmony_ci	case SIOCSPGRP:
341862306a36Sopenharmony_ci	case FIOGETOWN:
341962306a36Sopenharmony_ci	case SIOCGPGRP:
342062306a36Sopenharmony_ci	case SIOCBRADDBR:
342162306a36Sopenharmony_ci	case SIOCBRDELBR:
342262306a36Sopenharmony_ci	case SIOCGIFVLAN:
342362306a36Sopenharmony_ci	case SIOCSIFVLAN:
342462306a36Sopenharmony_ci	case SIOCGSKNS:
342562306a36Sopenharmony_ci	case SIOCGSTAMP_NEW:
342662306a36Sopenharmony_ci	case SIOCGSTAMPNS_NEW:
342762306a36Sopenharmony_ci	case SIOCGIFCONF:
342862306a36Sopenharmony_ci	case SIOCSIFBR:
342962306a36Sopenharmony_ci	case SIOCGIFBR:
343062306a36Sopenharmony_ci		return sock_ioctl(file, cmd, arg);
343162306a36Sopenharmony_ci
343262306a36Sopenharmony_ci	case SIOCGIFFLAGS:
343362306a36Sopenharmony_ci	case SIOCSIFFLAGS:
343462306a36Sopenharmony_ci	case SIOCGIFMAP:
343562306a36Sopenharmony_ci	case SIOCSIFMAP:
343662306a36Sopenharmony_ci	case SIOCGIFMETRIC:
343762306a36Sopenharmony_ci	case SIOCSIFMETRIC:
343862306a36Sopenharmony_ci	case SIOCGIFMTU:
343962306a36Sopenharmony_ci	case SIOCSIFMTU:
344062306a36Sopenharmony_ci	case SIOCGIFMEM:
344162306a36Sopenharmony_ci	case SIOCSIFMEM:
344262306a36Sopenharmony_ci	case SIOCGIFHWADDR:
344362306a36Sopenharmony_ci	case SIOCSIFHWADDR:
344462306a36Sopenharmony_ci	case SIOCADDMULTI:
344562306a36Sopenharmony_ci	case SIOCDELMULTI:
344662306a36Sopenharmony_ci	case SIOCGIFINDEX:
344762306a36Sopenharmony_ci	case SIOCGIFADDR:
344862306a36Sopenharmony_ci	case SIOCSIFADDR:
344962306a36Sopenharmony_ci	case SIOCSIFHWBROADCAST:
345062306a36Sopenharmony_ci	case SIOCDIFADDR:
345162306a36Sopenharmony_ci	case SIOCGIFBRDADDR:
345262306a36Sopenharmony_ci	case SIOCSIFBRDADDR:
345362306a36Sopenharmony_ci	case SIOCGIFDSTADDR:
345462306a36Sopenharmony_ci	case SIOCSIFDSTADDR:
345562306a36Sopenharmony_ci	case SIOCGIFNETMASK:
345662306a36Sopenharmony_ci	case SIOCSIFNETMASK:
345762306a36Sopenharmony_ci	case SIOCSIFPFLAGS:
345862306a36Sopenharmony_ci	case SIOCGIFPFLAGS:
345962306a36Sopenharmony_ci	case SIOCGIFTXQLEN:
346062306a36Sopenharmony_ci	case SIOCSIFTXQLEN:
346162306a36Sopenharmony_ci	case SIOCBRADDIF:
346262306a36Sopenharmony_ci	case SIOCBRDELIF:
346362306a36Sopenharmony_ci	case SIOCGIFNAME:
346462306a36Sopenharmony_ci	case SIOCSIFNAME:
346562306a36Sopenharmony_ci	case SIOCGMIIPHY:
346662306a36Sopenharmony_ci	case SIOCGMIIREG:
346762306a36Sopenharmony_ci	case SIOCSMIIREG:
346862306a36Sopenharmony_ci	case SIOCBONDENSLAVE:
346962306a36Sopenharmony_ci	case SIOCBONDRELEASE:
347062306a36Sopenharmony_ci	case SIOCBONDSETHWADDR:
347162306a36Sopenharmony_ci	case SIOCBONDCHANGEACTIVE:
347262306a36Sopenharmony_ci	case SIOCSARP:
347362306a36Sopenharmony_ci	case SIOCGARP:
347462306a36Sopenharmony_ci	case SIOCDARP:
347562306a36Sopenharmony_ci	case SIOCOUTQ:
347662306a36Sopenharmony_ci	case SIOCOUTQNSD:
347762306a36Sopenharmony_ci	case SIOCATMARK:
347862306a36Sopenharmony_ci		return sock_do_ioctl(net, sock, cmd, arg);
347962306a36Sopenharmony_ci	}
348062306a36Sopenharmony_ci
348162306a36Sopenharmony_ci	return -ENOIOCTLCMD;
348262306a36Sopenharmony_ci}
348362306a36Sopenharmony_ci
348462306a36Sopenharmony_cistatic long compat_sock_ioctl(struct file *file, unsigned int cmd,
348562306a36Sopenharmony_ci			      unsigned long arg)
348662306a36Sopenharmony_ci{
348762306a36Sopenharmony_ci	struct socket *sock = file->private_data;
348862306a36Sopenharmony_ci	const struct proto_ops *ops = READ_ONCE(sock->ops);
348962306a36Sopenharmony_ci	int ret = -ENOIOCTLCMD;
349062306a36Sopenharmony_ci	struct sock *sk;
349162306a36Sopenharmony_ci	struct net *net;
349262306a36Sopenharmony_ci
349362306a36Sopenharmony_ci	sk = sock->sk;
349462306a36Sopenharmony_ci	net = sock_net(sk);
349562306a36Sopenharmony_ci
349662306a36Sopenharmony_ci	if (ops->compat_ioctl)
349762306a36Sopenharmony_ci		ret = ops->compat_ioctl(sock, cmd, arg);
349862306a36Sopenharmony_ci
349962306a36Sopenharmony_ci	if (ret == -ENOIOCTLCMD &&
350062306a36Sopenharmony_ci	    (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST))
350162306a36Sopenharmony_ci		ret = compat_wext_handle_ioctl(net, cmd, arg);
350262306a36Sopenharmony_ci
350362306a36Sopenharmony_ci	if (ret == -ENOIOCTLCMD)
350462306a36Sopenharmony_ci		ret = compat_sock_ioctl_trans(file, sock, cmd, arg);
350562306a36Sopenharmony_ci
350662306a36Sopenharmony_ci	return ret;
350762306a36Sopenharmony_ci}
350862306a36Sopenharmony_ci#endif
350962306a36Sopenharmony_ci
351062306a36Sopenharmony_ci/**
351162306a36Sopenharmony_ci *	kernel_bind - bind an address to a socket (kernel space)
351262306a36Sopenharmony_ci *	@sock: socket
351362306a36Sopenharmony_ci *	@addr: address
351462306a36Sopenharmony_ci *	@addrlen: length of address
351562306a36Sopenharmony_ci *
351662306a36Sopenharmony_ci *	Returns 0 or an error.
351762306a36Sopenharmony_ci */
351862306a36Sopenharmony_ci
351962306a36Sopenharmony_ciint kernel_bind(struct socket *sock, struct sockaddr *addr, int addrlen)
352062306a36Sopenharmony_ci{
352162306a36Sopenharmony_ci	struct sockaddr_storage address;
352262306a36Sopenharmony_ci
352362306a36Sopenharmony_ci	memcpy(&address, addr, addrlen);
352462306a36Sopenharmony_ci
352562306a36Sopenharmony_ci	return READ_ONCE(sock->ops)->bind(sock, (struct sockaddr *)&address,
352662306a36Sopenharmony_ci					  addrlen);
352762306a36Sopenharmony_ci}
352862306a36Sopenharmony_ciEXPORT_SYMBOL(kernel_bind);
352962306a36Sopenharmony_ci
353062306a36Sopenharmony_ci/**
353162306a36Sopenharmony_ci *	kernel_listen - move socket to listening state (kernel space)
353262306a36Sopenharmony_ci *	@sock: socket
353362306a36Sopenharmony_ci *	@backlog: pending connections queue size
353462306a36Sopenharmony_ci *
353562306a36Sopenharmony_ci *	Returns 0 or an error.
353662306a36Sopenharmony_ci */
353762306a36Sopenharmony_ci
353862306a36Sopenharmony_ciint kernel_listen(struct socket *sock, int backlog)
353962306a36Sopenharmony_ci{
354062306a36Sopenharmony_ci	return READ_ONCE(sock->ops)->listen(sock, backlog);
354162306a36Sopenharmony_ci}
354262306a36Sopenharmony_ciEXPORT_SYMBOL(kernel_listen);
354362306a36Sopenharmony_ci
354462306a36Sopenharmony_ci/**
354562306a36Sopenharmony_ci *	kernel_accept - accept a connection (kernel space)
354662306a36Sopenharmony_ci *	@sock: listening socket
354762306a36Sopenharmony_ci *	@newsock: new connected socket
354862306a36Sopenharmony_ci *	@flags: flags
354962306a36Sopenharmony_ci *
355062306a36Sopenharmony_ci *	@flags must be SOCK_CLOEXEC, SOCK_NONBLOCK or 0.
355162306a36Sopenharmony_ci *	If it fails, @newsock is guaranteed to be %NULL.
355262306a36Sopenharmony_ci *	Returns 0 or an error.
355362306a36Sopenharmony_ci */
355462306a36Sopenharmony_ci
355562306a36Sopenharmony_ciint kernel_accept(struct socket *sock, struct socket **newsock, int flags)
355662306a36Sopenharmony_ci{
355762306a36Sopenharmony_ci	struct sock *sk = sock->sk;
355862306a36Sopenharmony_ci	const struct proto_ops *ops = READ_ONCE(sock->ops);
355962306a36Sopenharmony_ci	int err;
356062306a36Sopenharmony_ci
356162306a36Sopenharmony_ci	err = sock_create_lite(sk->sk_family, sk->sk_type, sk->sk_protocol,
356262306a36Sopenharmony_ci			       newsock);
356362306a36Sopenharmony_ci	if (err < 0)
356462306a36Sopenharmony_ci		goto done;
356562306a36Sopenharmony_ci
356662306a36Sopenharmony_ci	err = ops->accept(sock, *newsock, flags, true);
356762306a36Sopenharmony_ci	if (err < 0) {
356862306a36Sopenharmony_ci		sock_release(*newsock);
356962306a36Sopenharmony_ci		*newsock = NULL;
357062306a36Sopenharmony_ci		goto done;
357162306a36Sopenharmony_ci	}
357262306a36Sopenharmony_ci
357362306a36Sopenharmony_ci	(*newsock)->ops = ops;
357462306a36Sopenharmony_ci	__module_get(ops->owner);
357562306a36Sopenharmony_ci
357662306a36Sopenharmony_cidone:
357762306a36Sopenharmony_ci	return err;
357862306a36Sopenharmony_ci}
357962306a36Sopenharmony_ciEXPORT_SYMBOL(kernel_accept);
358062306a36Sopenharmony_ci
358162306a36Sopenharmony_ci/**
358262306a36Sopenharmony_ci *	kernel_connect - connect a socket (kernel space)
358362306a36Sopenharmony_ci *	@sock: socket
358462306a36Sopenharmony_ci *	@addr: address
358562306a36Sopenharmony_ci *	@addrlen: address length
358662306a36Sopenharmony_ci *	@flags: flags (O_NONBLOCK, ...)
358762306a36Sopenharmony_ci *
358862306a36Sopenharmony_ci *	For datagram sockets, @addr is the address to which datagrams are sent
358962306a36Sopenharmony_ci *	by default, and the only address from which datagrams are received.
359062306a36Sopenharmony_ci *	For stream sockets, attempts to connect to @addr.
359162306a36Sopenharmony_ci *	Returns 0 or an error code.
359262306a36Sopenharmony_ci */
359362306a36Sopenharmony_ci
359462306a36Sopenharmony_ciint kernel_connect(struct socket *sock, struct sockaddr *addr, int addrlen,
359562306a36Sopenharmony_ci		   int flags)
359662306a36Sopenharmony_ci{
359762306a36Sopenharmony_ci	struct sockaddr_storage address;
359862306a36Sopenharmony_ci
359962306a36Sopenharmony_ci	memcpy(&address, addr, addrlen);
360062306a36Sopenharmony_ci
360162306a36Sopenharmony_ci	return READ_ONCE(sock->ops)->connect(sock, (struct sockaddr *)&address,
360262306a36Sopenharmony_ci					     addrlen, flags);
360362306a36Sopenharmony_ci}
360462306a36Sopenharmony_ciEXPORT_SYMBOL(kernel_connect);
360562306a36Sopenharmony_ci
360662306a36Sopenharmony_ci/**
360762306a36Sopenharmony_ci *	kernel_getsockname - get the address which the socket is bound (kernel space)
360862306a36Sopenharmony_ci *	@sock: socket
360962306a36Sopenharmony_ci *	@addr: address holder
361062306a36Sopenharmony_ci *
361162306a36Sopenharmony_ci * 	Fills the @addr pointer with the address which the socket is bound.
361262306a36Sopenharmony_ci *	Returns the length of the address in bytes or an error code.
361362306a36Sopenharmony_ci */
361462306a36Sopenharmony_ci
361562306a36Sopenharmony_ciint kernel_getsockname(struct socket *sock, struct sockaddr *addr)
361662306a36Sopenharmony_ci{
361762306a36Sopenharmony_ci	return READ_ONCE(sock->ops)->getname(sock, addr, 0);
361862306a36Sopenharmony_ci}
361962306a36Sopenharmony_ciEXPORT_SYMBOL(kernel_getsockname);
362062306a36Sopenharmony_ci
362162306a36Sopenharmony_ci/**
362262306a36Sopenharmony_ci *	kernel_getpeername - get the address which the socket is connected (kernel space)
362362306a36Sopenharmony_ci *	@sock: socket
362462306a36Sopenharmony_ci *	@addr: address holder
362562306a36Sopenharmony_ci *
362662306a36Sopenharmony_ci * 	Fills the @addr pointer with the address which the socket is connected.
362762306a36Sopenharmony_ci *	Returns the length of the address in bytes or an error code.
362862306a36Sopenharmony_ci */
362962306a36Sopenharmony_ci
363062306a36Sopenharmony_ciint kernel_getpeername(struct socket *sock, struct sockaddr *addr)
363162306a36Sopenharmony_ci{
363262306a36Sopenharmony_ci	return READ_ONCE(sock->ops)->getname(sock, addr, 1);
363362306a36Sopenharmony_ci}
363462306a36Sopenharmony_ciEXPORT_SYMBOL(kernel_getpeername);
363562306a36Sopenharmony_ci
363662306a36Sopenharmony_ci/**
363762306a36Sopenharmony_ci *	kernel_sock_shutdown - shut down part of a full-duplex connection (kernel space)
363862306a36Sopenharmony_ci *	@sock: socket
363962306a36Sopenharmony_ci *	@how: connection part
364062306a36Sopenharmony_ci *
364162306a36Sopenharmony_ci *	Returns 0 or an error.
364262306a36Sopenharmony_ci */
364362306a36Sopenharmony_ci
364462306a36Sopenharmony_ciint kernel_sock_shutdown(struct socket *sock, enum sock_shutdown_cmd how)
364562306a36Sopenharmony_ci{
364662306a36Sopenharmony_ci	return READ_ONCE(sock->ops)->shutdown(sock, how);
364762306a36Sopenharmony_ci}
364862306a36Sopenharmony_ciEXPORT_SYMBOL(kernel_sock_shutdown);
364962306a36Sopenharmony_ci
365062306a36Sopenharmony_ci/**
365162306a36Sopenharmony_ci *	kernel_sock_ip_overhead - returns the IP overhead imposed by a socket
365262306a36Sopenharmony_ci *	@sk: socket
365362306a36Sopenharmony_ci *
365462306a36Sopenharmony_ci *	This routine returns the IP overhead imposed by a socket i.e.
365562306a36Sopenharmony_ci *	the length of the underlying IP header, depending on whether
365662306a36Sopenharmony_ci *	this is an IPv4 or IPv6 socket and the length from IP options turned
365762306a36Sopenharmony_ci *	on at the socket. Assumes that the caller has a lock on the socket.
365862306a36Sopenharmony_ci */
365962306a36Sopenharmony_ci
366062306a36Sopenharmony_ciu32 kernel_sock_ip_overhead(struct sock *sk)
366162306a36Sopenharmony_ci{
366262306a36Sopenharmony_ci	struct inet_sock *inet;
366362306a36Sopenharmony_ci	struct ip_options_rcu *opt;
366462306a36Sopenharmony_ci	u32 overhead = 0;
366562306a36Sopenharmony_ci#if IS_ENABLED(CONFIG_IPV6)
366662306a36Sopenharmony_ci	struct ipv6_pinfo *np;
366762306a36Sopenharmony_ci	struct ipv6_txoptions *optv6 = NULL;
366862306a36Sopenharmony_ci#endif /* IS_ENABLED(CONFIG_IPV6) */
366962306a36Sopenharmony_ci
367062306a36Sopenharmony_ci	if (!sk)
367162306a36Sopenharmony_ci		return overhead;
367262306a36Sopenharmony_ci
367362306a36Sopenharmony_ci	switch (sk->sk_family) {
367462306a36Sopenharmony_ci	case AF_INET:
367562306a36Sopenharmony_ci		inet = inet_sk(sk);
367662306a36Sopenharmony_ci		overhead += sizeof(struct iphdr);
367762306a36Sopenharmony_ci		opt = rcu_dereference_protected(inet->inet_opt,
367862306a36Sopenharmony_ci						sock_owned_by_user(sk));
367962306a36Sopenharmony_ci		if (opt)
368062306a36Sopenharmony_ci			overhead += opt->opt.optlen;
368162306a36Sopenharmony_ci		return overhead;
368262306a36Sopenharmony_ci#if IS_ENABLED(CONFIG_IPV6)
368362306a36Sopenharmony_ci	case AF_INET6:
368462306a36Sopenharmony_ci		np = inet6_sk(sk);
368562306a36Sopenharmony_ci		overhead += sizeof(struct ipv6hdr);
368662306a36Sopenharmony_ci		if (np)
368762306a36Sopenharmony_ci			optv6 = rcu_dereference_protected(np->opt,
368862306a36Sopenharmony_ci							  sock_owned_by_user(sk));
368962306a36Sopenharmony_ci		if (optv6)
369062306a36Sopenharmony_ci			overhead += (optv6->opt_flen + optv6->opt_nflen);
369162306a36Sopenharmony_ci		return overhead;
369262306a36Sopenharmony_ci#endif /* IS_ENABLED(CONFIG_IPV6) */
369362306a36Sopenharmony_ci	default: /* Returns 0 overhead if the socket is not ipv4 or ipv6 */
369462306a36Sopenharmony_ci		return overhead;
369562306a36Sopenharmony_ci	}
369662306a36Sopenharmony_ci}
369762306a36Sopenharmony_ciEXPORT_SYMBOL(kernel_sock_ip_overhead);
3698