socket.c 79.8 KB
Newer Older
Linus Torvalds's avatar
Linus Torvalds committed
1 2 3 4 5 6
/*
 * NET		An implementation of the SOCKET network access protocol.
 *
 * Version:	@(#)socket.c	1.1.93	18/02/95
 *
 * Authors:	Orest Zborowski, <obz@Kodak.COM>
7
 *		Ross Biro
Linus Torvalds's avatar
Linus Torvalds committed
8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44
 *		Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
 *
 * Fixes:
 *		Anonymous	:	NOTSOCK/BADF cleanup. Error fix in
 *					shutdown()
 *		Alan Cox	:	verify_area() fixes
 *		Alan Cox	:	Removed DDI
 *		Jonathan Kamens	:	SOCK_DGRAM reconnect bug
 *		Alan Cox	:	Moved a load of checks to the very
 *					top level.
 *		Alan Cox	:	Move address structures to/from user
 *					mode above the protocol layers.
 *		Rob Janssen	:	Allow 0 length sends.
 *		Alan Cox	:	Asynchronous I/O support (cribbed from the
 *					tty drivers).
 *		Niibe Yutaka	:	Asynchronous I/O for writes (4.4BSD style)
 *		Jeff Uphoff	:	Made max number of sockets command-line
 *					configurable.
 *		Matti Aarnio	:	Made the number of sockets dynamic,
 *					to be allocated when needed, and mr.
 *					Uphoff's max is used as max to be
 *					allowed to allocate.
 *		Linus		:	Argh. removed all the socket allocation
 *					altogether: it's in the inode now.
 *		Alan Cox	:	Made sock_alloc()/sock_release() public
 *					for NetROM and future kernel nfsd type
 *					stuff.
 *		Alan Cox	:	sendmsg/recvmsg basics.
 *		Tom Dyas	:	Export net symbols.
 *		Marcin Dalecki	:	Fixed problems with CONFIG_NET="n".
 *		Alan Cox	:	Added thread locking to sys_* calls
 *					for sockets. May have errors at the
 *					moment.
 *		Kevin Buhr	:	Fixed the dumb errors in the above.
 *		Andi Kleen	:	Some small cleanups, optimizations,
 *					and fixed a copy_from_user() bug.
 *		Tigran Aivazian	:	sys_send(args) calls sys_sendto(args, NULL, 0)
45
 *		Tigran Aivazian	:	Made listen(2) backlog sanity checks
Linus Torvalds's avatar
Linus Torvalds committed
46 47 48 49 50 51 52 53 54 55
 *					protocol-independent
 *
 *
 *		This program is free software; you can redistribute it and/or
 *		modify it under the terms of the GNU General Public License
 *		as published by the Free Software Foundation; either version
 *		2 of the License, or (at your option) any later version.
 *
 *
 *	This module is effectively the top level interface to the BSD socket
56
 *	paradigm.
Linus Torvalds's avatar
Linus Torvalds committed
57 58 59 60 61 62 63 64 65
 *
 *	Based upon Swansea University Computer Society NET3.039
 */

#include <linux/mm.h>
#include <linux/socket.h>
#include <linux/file.h>
#include <linux/net.h>
#include <linux/interrupt.h>
Ulrich Drepper's avatar
Ulrich Drepper committed
66
#include <linux/thread_info.h>
67
#include <linux/rcupdate.h>
Linus Torvalds's avatar
Linus Torvalds committed
68 69 70
#include <linux/netdevice.h>
#include <linux/proc_fs.h>
#include <linux/seq_file.h>
Arjan van de Ven's avatar
Arjan van de Ven committed
71
#include <linux/mutex.h>
Linus Torvalds's avatar
Linus Torvalds committed
72
#include <linux/if_bridge.h>
73 74
#include <linux/if_frad.h>
#include <linux/if_vlan.h>
75
#include <linux/ptp_classify.h>
Linus Torvalds's avatar
Linus Torvalds committed
76 77 78 79 80 81 82 83 84 85
#include <linux/init.h>
#include <linux/poll.h>
#include <linux/cache.h>
#include <linux/module.h>
#include <linux/highmem.h>
#include <linux/mount.h>
#include <linux/security.h>
#include <linux/syscalls.h>
#include <linux/compat.h>
#include <linux/kmod.h>
86
#include <linux/audit.h>
87
#include <linux/wireless.h>
88
#include <linux/nsproxy.h>
Nick Black's avatar
Nick Black committed
89
#include <linux/magic.h>
90
#include <linux/slab.h>
91
#include <linux/xattr.h>
Linus Torvalds's avatar
Linus Torvalds committed
92 93 94 95 96

#include <asm/uaccess.h>
#include <asm/unistd.h>

#include <net/compat.h>
97
#include <net/wext.h>
98
#include <net/cls_cgroup.h>
Linus Torvalds's avatar
Linus Torvalds committed
99 100 101 102

#include <net/sock.h>
#include <linux/netfilter.h>

103 104 105 106 107
#include <linux/if_tun.h>
#include <linux/ipv6_route.h>
#include <linux/route.h>
#include <linux/sockios.h>
#include <linux/atalk.h>
108
#include <net/busy_poll.h>
109
#include <linux/errqueue.h>
110

111
#ifdef CONFIG_NET_RX_BUSY_POLL
112 113
unsigned int sysctl_net_busy_read __read_mostly;
unsigned int sysctl_net_busy_poll __read_mostly;
114
#endif
115

116 117
static ssize_t sock_read_iter(struct kiocb *iocb, struct iov_iter *to);
static ssize_t sock_write_iter(struct kiocb *iocb, struct iov_iter *from);
118
static int sock_mmap(struct file *file, struct vm_area_struct *vma);
Linus Torvalds's avatar
Linus Torvalds committed
119 120 121 122

static int sock_close(struct inode *inode, struct file *file);
static unsigned int sock_poll(struct file *file,
			      struct poll_table_struct *wait);
123
static long sock_ioctl(struct file *file, unsigned int cmd, unsigned long arg);
124 125
#ifdef CONFIG_COMPAT
static long compat_sock_ioctl(struct file *file,
126
			      unsigned int cmd, unsigned long arg);
127
#endif
Linus Torvalds's avatar
Linus Torvalds committed
128 129 130
static int sock_fasync(int fd, struct file *filp, int on);
static ssize_t sock_sendpage(struct file *file, struct page *page,
			     int offset, size_t size, loff_t *ppos, int more);
Jens Axboe's avatar
Jens Axboe committed
131
static ssize_t sock_splice_read(struct file *file, loff_t *ppos,
132
				struct pipe_inode_info *pipe, size_t len,
Jens Axboe's avatar
Jens Axboe committed
133
				unsigned int flags);
Linus Torvalds's avatar
Linus Torvalds committed
134 135 136 137 138 139

/*
 *	Socket files have a set of 'special' operations as well as the generic file ones. These don't appear
 *	in the operation structures but are done directly via the socketcall() multiplexor.
 */

140
static const struct file_operations socket_file_ops = {
Linus Torvalds's avatar
Linus Torvalds committed
141 142
	.owner =	THIS_MODULE,
	.llseek =	no_llseek,
143 144 145 146
	.read =		new_sync_read,
	.write =	new_sync_write,
	.read_iter =	sock_read_iter,
	.write_iter =	sock_write_iter,
Linus Torvalds's avatar
Linus Torvalds committed
147 148
	.poll =		sock_poll,
	.unlocked_ioctl = sock_ioctl,
149 150 151
#ifdef CONFIG_COMPAT
	.compat_ioctl = compat_sock_ioctl,
#endif
Linus Torvalds's avatar
Linus Torvalds committed
152 153 154
	.mmap =		sock_mmap,
	.release =	sock_close,
	.fasync =	sock_fasync,
155 156
	.sendpage =	sock_sendpage,
	.splice_write = generic_splice_sendpage,
Jens Axboe's avatar
Jens Axboe committed
157
	.splice_read =	sock_splice_read,
Linus Torvalds's avatar
Linus Torvalds committed
158 159 160 161 162 163 164
};

/*
 *	The protocol list. Each protocol is registered in here.
 */

static DEFINE_SPINLOCK(net_family_lock);
165
static const struct net_proto_family __rcu *net_families[NPROTO] __read_mostly;
Linus Torvalds's avatar
Linus Torvalds committed
166 167 168 169 170

/*
 *	Statistics counters of the socket lists
 */

171
static DEFINE_PER_CPU(int, sockets_in_use);
Linus Torvalds's avatar
Linus Torvalds committed
172 173

/*
174 175 176
 * Support routines.
 * Move socket addresses back and forth across the kernel/user
 * divide and look after the messy bits.
Linus Torvalds's avatar
Linus Torvalds committed
177 178 179 180 181 182 183 184 185 186 187 188 189
 */

/**
 *	move_addr_to_kernel	-	copy a socket address into kernel space
 *	@uaddr: Address in user space
 *	@kaddr: Address in kernel space
 *	@ulen: Length in user space
 *
 *	The address is copied into kernel space. If the provided address is
 *	too long an error code of -EINVAL is returned. If the copy gives
 *	invalid addresses -EFAULT is returned. On a success 0 is returned.
 */

190
int move_addr_to_kernel(void __user *uaddr, int ulen, struct sockaddr_storage *kaddr)
Linus Torvalds's avatar
Linus Torvalds committed
191
{
192
	if (ulen < 0 || ulen > sizeof(struct sockaddr_storage))
Linus Torvalds's avatar
Linus Torvalds committed
193
		return -EINVAL;
194
	if (ulen == 0)
Linus Torvalds's avatar
Linus Torvalds committed
195
		return 0;
196
	if (copy_from_user(kaddr, uaddr, ulen))
Linus Torvalds's avatar
Linus Torvalds committed
197
		return -EFAULT;
198
	return audit_sockaddr(ulen, kaddr);
Linus Torvalds's avatar
Linus Torvalds committed
199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216
}

/**
 *	move_addr_to_user	-	copy an address to user space
 *	@kaddr: kernel space address
 *	@klen: length of address in kernel
 *	@uaddr: user space address
 *	@ulen: pointer to user length field
 *
 *	The value pointed to by ulen on entry is the buffer length available.
 *	This is overwritten with the buffer space used. -EINVAL is returned
 *	if an overlong buffer is specified or a negative buffer size. -EFAULT
 *	is returned if either the buffer or the length field are not
 *	accessible.
 *	After copying the data up to the limit the user specifies, the true
 *	length of the data is written over the length limit the user
 *	specified. Zero is returned for a success.
 */
217

218
static int move_addr_to_user(struct sockaddr_storage *kaddr, int klen,
219
			     void __user *uaddr, int __user *ulen)
Linus Torvalds's avatar
Linus Torvalds committed
220 221 222 223
{
	int err;
	int len;

224
	BUG_ON(klen > sizeof(struct sockaddr_storage));
225 226
	err = get_user(len, ulen);
	if (err)
Linus Torvalds's avatar
Linus Torvalds committed
227
		return err;
228 229
	if (len > klen)
		len = klen;
230
	if (len < 0)
Linus Torvalds's avatar
Linus Torvalds committed
231
		return -EINVAL;
232
	if (len) {
Steve Grubb's avatar
Steve Grubb committed
233 234
		if (audit_sockaddr(klen, kaddr))
			return -ENOMEM;
235
		if (copy_to_user(uaddr, kaddr, len))
Linus Torvalds's avatar
Linus Torvalds committed
236 237 238
			return -EFAULT;
	}
	/*
239 240
	 *      "fromlen shall refer to the value before truncation.."
	 *                      1003.1g
Linus Torvalds's avatar
Linus Torvalds committed
241 242 243 244
	 */
	return __put_user(klen, ulen);
}

245
static struct kmem_cache *sock_inode_cachep __read_mostly;
Linus Torvalds's avatar
Linus Torvalds committed
246 247 248 249

static struct inode *sock_alloc_inode(struct super_block *sb)
{
	struct socket_alloc *ei;
250
	struct socket_wq *wq;
251

252
	ei = kmem_cache_alloc(sock_inode_cachep, GFP_KERNEL);
Linus Torvalds's avatar
Linus Torvalds committed
253 254
	if (!ei)
		return NULL;
255 256
	wq = kmalloc(sizeof(*wq), GFP_KERNEL);
	if (!wq) {
257 258 259
		kmem_cache_free(sock_inode_cachep, ei);
		return NULL;
	}
260 261 262
	init_waitqueue_head(&wq->wait);
	wq->fasync_list = NULL;
	RCU_INIT_POINTER(ei->socket.wq, wq);
263

Linus Torvalds's avatar
Linus Torvalds committed
264 265 266 267 268 269 270 271 272 273 274
	ei->socket.state = SS_UNCONNECTED;
	ei->socket.flags = 0;
	ei->socket.ops = NULL;
	ei->socket.sk = NULL;
	ei->socket.file = NULL;

	return &ei->vfs_inode;
}

static void sock_destroy_inode(struct inode *inode)
{
275
	struct socket_alloc *ei;
276
	struct socket_wq *wq;
277 278

	ei = container_of(inode, struct socket_alloc, vfs_inode);
279
	wq = rcu_dereference_protected(ei->socket.wq, 1);
280
	kfree_rcu(wq, rcu);
281
	kmem_cache_free(sock_inode_cachep, ei);
Linus Torvalds's avatar
Linus Torvalds committed
282 283
}

284
static void init_once(void *foo)
Linus Torvalds's avatar
Linus Torvalds committed
285
{
286
	struct socket_alloc *ei = (struct socket_alloc *)foo;
Linus Torvalds's avatar
Linus Torvalds committed
287

288
	inode_init_once(&ei->vfs_inode);
Linus Torvalds's avatar
Linus Torvalds committed
289
}
290

Linus Torvalds's avatar
Linus Torvalds committed
291 292 293
static int init_inodecache(void)
{
	sock_inode_cachep = kmem_cache_create("sock_inode_cache",
294 295 296 297 298
					      sizeof(struct socket_alloc),
					      0,
					      (SLAB_HWCACHE_ALIGN |
					       SLAB_RECLAIM_ACCOUNT |
					       SLAB_MEM_SPREAD),
299
					      init_once);
Linus Torvalds's avatar
Linus Torvalds committed
300 301 302 303 304
	if (sock_inode_cachep == NULL)
		return -ENOMEM;
	return 0;
}

305
static const struct super_operations sockfs_ops = {
306 307 308
	.alloc_inode	= sock_alloc_inode,
	.destroy_inode	= sock_destroy_inode,
	.statfs		= simple_statfs,
Linus Torvalds's avatar
Linus Torvalds committed
309 310
};

311 312 313 314 315 316 317 318 319
/*
 * sockfs_dname() is called from d_path().
 */
static char *sockfs_dname(struct dentry *dentry, char *buffer, int buflen)
{
	return dynamic_dname(dentry, buffer, buflen, "socket:[%lu]",
				dentry->d_inode->i_ino);
}

Al Viro's avatar
Al Viro committed
320
static const struct dentry_operations sockfs_dentry_operations = {
321
	.d_dname  = sockfs_dname,
Linus Torvalds's avatar
Linus Torvalds committed
322 323
};

324 325 326 327 328 329 330 331 332 333 334 335 336 337 338
static struct dentry *sockfs_mount(struct file_system_type *fs_type,
			 int flags, const char *dev_name, void *data)
{
	return mount_pseudo(fs_type, "socket:", &sockfs_ops,
		&sockfs_dentry_operations, SOCKFS_MAGIC);
}

static struct vfsmount *sock_mnt __read_mostly;

static struct file_system_type sock_fs_type = {
	.name =		"sockfs",
	.mount =	sockfs_mount,
	.kill_sb =	kill_anon_super,
};

Linus Torvalds's avatar
Linus Torvalds committed
339 340 341
/*
 *	Obtains the first available file descriptor and sets it up for use.
 *
342 343
 *	These functions create file structures and maps them to fd space
 *	of the current process. On success it returns file descriptor
Linus Torvalds's avatar
Linus Torvalds committed
344 345 346 347 348 349 350 351 352 353 354 355
 *	and file struct implicitly stored in sock->file.
 *	Note that another thread may close file descriptor before we return
 *	from this function. We use the fact that now we do not refer
 *	to socket after mapping. If one day we will need it, this
 *	function will increment ref. count on file by 1.
 *
 *	In any case returned fd MAY BE not valid!
 *	This race condition is unavoidable
 *	with shared fd spaces, we cannot solve it inside kernel,
 *	but we take care of internal coherence yet.
 */

356
struct file *sock_alloc_file(struct socket *sock, int flags, const char *dname)
Linus Torvalds's avatar
Linus Torvalds committed
357
{
358
	struct qstr name = { .name = "" };
359
	struct path path;
360
	struct file *file;
Linus Torvalds's avatar
Linus Torvalds committed
361

362 363 364 365 366 367 368
	if (dname) {
		name.name = dname;
		name.len = strlen(name.name);
	} else if (sock->sk) {
		name.name = sock->sk->sk_prot_creator->name;
		name.len = strlen(name.name);
	}
369
	path.dentry = d_alloc_pseudo(sock_mnt->mnt_sb, &name);
370 371
	if (unlikely(!path.dentry))
		return ERR_PTR(-ENOMEM);
372
	path.mnt = mntget(sock_mnt);
373

374
	d_instantiate(path.dentry, SOCK_INODE(sock));
375

376
	file = alloc_file(&path, FMODE_READ | FMODE_WRITE,
377
		  &socket_file_ops);
378
	if (unlikely(IS_ERR(file))) {
379
		/* drop dentry, keep inode */
Al Viro's avatar
Al Viro committed
380
		ihold(path.dentry->d_inode);
381
		path_put(&path);
382
		return file;
383 384 385
	}

	sock->file = file;
386
	file->f_flags = O_RDWR | (flags & O_NONBLOCK);
387
	file->private_data = sock;
388
	return file;
389
}
390
EXPORT_SYMBOL(sock_alloc_file);
391

392
static int sock_map_fd(struct socket *sock, int flags)
393 394
{
	struct file *newfile;
395 396 397
	int fd = get_unused_fd_flags(flags);
	if (unlikely(fd < 0))
		return fd;
398

399
	newfile = sock_alloc_file(sock, flags, NULL);
400
	if (likely(!IS_ERR(newfile))) {
401
		fd_install(fd, newfile);
402 403
		return fd;
	}
404

405 406
	put_unused_fd(fd);
	return PTR_ERR(newfile);
Linus Torvalds's avatar
Linus Torvalds committed
407 408
}

409
struct socket *sock_from_file(struct file *file, int *err)
410 411 412 413
{
	if (file->f_op == &socket_file_ops)
		return file->private_data;	/* set in sock_map_fd */

414 415
	*err = -ENOTSOCK;
	return NULL;
416
}
417
EXPORT_SYMBOL(sock_from_file);
418

Linus Torvalds's avatar
Linus Torvalds committed
419
/**
420
 *	sockfd_lookup - Go from a file number to its socket slot
Linus Torvalds's avatar
Linus Torvalds committed
421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436
 *	@fd: file handle
 *	@err: pointer to an error code return
 *
 *	The file handle passed in is locked and the socket it is bound
 *	too is returned. If an error occurs the err pointer is overwritten
 *	with a negative errno code and NULL is returned. The function checks
 *	for both invalid handles and passing a handle which is not a socket.
 *
 *	On a success the socket object pointer is returned.
 */

struct socket *sockfd_lookup(int fd, int *err)
{
	struct file *file;
	struct socket *sock;

437 438
	file = fget(fd);
	if (!file) {
Linus Torvalds's avatar
Linus Torvalds committed
439 440 441
		*err = -EBADF;
		return NULL;
	}
442

443 444
	sock = sock_from_file(file, err);
	if (!sock)
Linus Torvalds's avatar
Linus Torvalds committed
445
		fput(file);
446 447
	return sock;
}
448
EXPORT_SYMBOL(sockfd_lookup);
Linus Torvalds's avatar
Linus Torvalds committed
449

450 451
static struct socket *sockfd_lookup_light(int fd, int *err, int *fput_needed)
{
452
	struct fd f = fdget(fd);
453 454
	struct socket *sock;

455
	*err = -EBADF;
456 457 458 459
	if (f.file) {
		sock = sock_from_file(f.file, err);
		if (likely(sock)) {
			*fput_needed = f.flags;
460
			return sock;
461 462
		}
		fdput(f);
Linus Torvalds's avatar
Linus Torvalds committed
463
	}
464
	return NULL;
Linus Torvalds's avatar
Linus Torvalds committed
465 466
}

467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528
#define XATTR_SOCKPROTONAME_SUFFIX "sockprotoname"
#define XATTR_NAME_SOCKPROTONAME (XATTR_SYSTEM_PREFIX XATTR_SOCKPROTONAME_SUFFIX)
#define XATTR_NAME_SOCKPROTONAME_LEN (sizeof(XATTR_NAME_SOCKPROTONAME)-1)
static ssize_t sockfs_getxattr(struct dentry *dentry,
			       const char *name, void *value, size_t size)
{
	const char *proto_name;
	size_t proto_size;
	int error;

	error = -ENODATA;
	if (!strncmp(name, XATTR_NAME_SOCKPROTONAME, XATTR_NAME_SOCKPROTONAME_LEN)) {
		proto_name = dentry->d_name.name;
		proto_size = strlen(proto_name);

		if (value) {
			error = -ERANGE;
			if (proto_size + 1 > size)
				goto out;

			strncpy(value, proto_name, proto_size + 1);
		}
		error = proto_size + 1;
	}

out:
	return error;
}

static ssize_t sockfs_listxattr(struct dentry *dentry, char *buffer,
				size_t size)
{
	ssize_t len;
	ssize_t used = 0;

	len = security_inode_listsecurity(dentry->d_inode, buffer, size);
	if (len < 0)
		return len;
	used += len;
	if (buffer) {
		if (size < used)
			return -ERANGE;
		buffer += len;
	}

	len = (XATTR_NAME_SOCKPROTONAME_LEN + 1);
	used += len;
	if (buffer) {
		if (size < used)
			return -ERANGE;
		memcpy(buffer, XATTR_NAME_SOCKPROTONAME, len);
		buffer += len;
	}

	return used;
}

static const struct inode_operations sockfs_inode_ops = {
	.getxattr = sockfs_getxattr,
	.listxattr = sockfs_listxattr,
};

Linus Torvalds's avatar
Linus Torvalds committed
529 530
/**
 *	sock_alloc	-	allocate a socket
531
 *
Linus Torvalds's avatar
Linus Torvalds committed
532 533 534 535 536 537 538
 *	Allocate a new inode and socket object. The two are bound together
 *	and initialised. The socket is then returned. If we are out of inodes
 *	NULL is returned.
 */

static struct socket *sock_alloc(void)
{
539 540
	struct inode *inode;
	struct socket *sock;
Linus Torvalds's avatar
Linus Torvalds committed
541

542
	inode = new_inode_pseudo(sock_mnt->mnt_sb);
Linus Torvalds's avatar
Linus Torvalds committed
543 544 545 546 547
	if (!inode)
		return NULL;

	sock = SOCKET_I(inode);

548
	kmemcheck_annotate_bitfield(sock, type);
549
	inode->i_ino = get_next_ino();
550
	inode->i_mode = S_IFSOCK | S_IRWXUGO;
551 552
	inode->i_uid = current_fsuid();
	inode->i_gid = current_fsgid();
553
	inode->i_op = &sockfs_inode_ops;
Linus Torvalds's avatar
Linus Torvalds committed
554

555
	this_cpu_add(sockets_in_use, 1);
Linus Torvalds's avatar
Linus Torvalds committed
556 557 558 559 560 561 562 563 564
	return sock;
}

/**
 *	sock_release	-	close a socket
 *	@sock: socket to close
 *
 *	The socket is released from the protocol stack if it has a release
 *	callback, and the inode is then released if the socket is bound to
565
 *	an inode not a file.
Linus Torvalds's avatar
Linus Torvalds committed
566
 */
567

Linus Torvalds's avatar
Linus Torvalds committed
568 569 570 571 572 573 574 575 576 577
void sock_release(struct socket *sock)
{
	if (sock->ops) {
		struct module *owner = sock->ops->owner;

		sock->ops->release(sock);
		sock->ops = NULL;
		module_put(owner);
	}

578
	if (rcu_dereference_protected(sock->wq, 1)->fasync_list)
579
		pr_err("%s: fasync list not empty!\n", __func__);
Linus Torvalds's avatar
Linus Torvalds committed
580

581 582 583
	if (test_bit(SOCK_EXTERNALLY_ALLOCATED, &sock->flags))
		return;

584
	this_cpu_sub(sockets_in_use, 1);
Linus Torvalds's avatar
Linus Torvalds committed
585 586 587 588
	if (!sock->file) {
		iput(SOCK_INODE(sock));
		return;
	}
589
	sock->file = NULL;
Linus Torvalds's avatar
Linus Torvalds committed
590
}
591
EXPORT_SYMBOL(sock_release);
Linus Torvalds's avatar
Linus Torvalds committed
592

593
void __sock_tx_timestamp(const struct sock *sk, __u8 *tx_flags)
594
{
595 596
	u8 flags = *tx_flags;

597
	if (sk->sk_tsflags & SOF_TIMESTAMPING_TX_HARDWARE)
598 599
		flags |= SKBTX_HW_TSTAMP;

600
	if (sk->sk_tsflags & SOF_TIMESTAMPING_TX_SOFTWARE)
601 602
		flags |= SKBTX_SW_TSTAMP;

603
	if (sk->sk_tsflags & SOF_TIMESTAMPING_TX_SCHED)
604 605
		flags |= SKBTX_SCHED_TSTAMP;

606
	if (sk->sk_tsflags & SOF_TIMESTAMPING_TX_ACK)
607
		flags |= SKBTX_ACK_TSTAMP;
608

609
	*tx_flags = flags;
610
}
611
EXPORT_SYMBOL(__sock_tx_timestamp);
612

613
static inline int sock_sendmsg_nosec(struct socket *sock, struct msghdr *msg)
Linus Torvalds's avatar
Linus Torvalds committed
614
{
Al Viro's avatar
Al Viro committed
615
	int ret = sock->ops->sendmsg(sock, msg, msg_data_left(msg));
616 617
	BUG_ON(ret == -EIOCBQUEUED);
	return ret;
Linus Torvalds's avatar
Linus Torvalds committed
618 619
}

620
int sock_sendmsg(struct socket *sock, struct msghdr *msg)
621
{
622
	int err = security_socket_sendmsg(sock, msg,
Al Viro's avatar
Al Viro committed
623
					  msg_data_left(msg));
624

625
	return err ?: sock_sendmsg_nosec(sock, msg);
626
}
627
EXPORT_SYMBOL(sock_sendmsg);
Linus Torvalds's avatar
Linus Torvalds committed
628 629 630 631

int kernel_sendmsg(struct socket *sock, struct msghdr *msg,
		   struct kvec *vec, size_t num, size_t size)
{
632
	iov_iter_kvec(&msg->msg_iter, WRITE | ITER_KVEC, vec, num, size);
633
	return sock_sendmsg(sock, msg);
Linus Torvalds's avatar
Linus Torvalds committed
634
}
635
EXPORT_SYMBOL(kernel_sendmsg);
Linus Torvalds's avatar
Linus Torvalds committed
636

637 638 639 640 641 642
/*
 * called from sock_recv_timestamp() if sock_flag(sk, SOCK_RCVTSTAMP)
 */
void __sock_recv_timestamp(struct msghdr *msg, struct sock *sk,
	struct sk_buff *skb)
{
643
	int need_software_tstamp = sock_flag(sk, SOCK_RCVTSTAMP);
644
	struct scm_timestamping tss;
645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660
	int empty = 1;
	struct skb_shared_hwtstamps *shhwtstamps =
		skb_hwtstamps(skb);

	/* Race occurred between timestamp enabling and packet
	   receiving.  Fill in the current time for now. */
	if (need_software_tstamp && skb->tstamp.tv64 == 0)
		__net_timestamp(skb);

	if (need_software_tstamp) {
		if (!sock_flag(sk, SOCK_RCVTSTAMPNS)) {
			struct timeval tv;
			skb_get_timestamp(skb, &tv);
			put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMP,
				 sizeof(tv), &tv);
		} else {
661 662
			struct timespec ts;
			skb_get_timestampns(skb, &ts);
663
			put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMPNS,
664
				 sizeof(ts), &ts);
665 666 667
		}
	}

668
	memset(&tss, 0, sizeof(tss));
669
	if ((sk->sk_tsflags & SOF_TIMESTAMPING_SOFTWARE) &&
670
	    ktime_to_timespec_cond(skb->tstamp, tss.ts + 0))
671
		empty = 0;
672
	if (shhwtstamps &&
673
	    (sk->sk_tsflags & SOF_TIMESTAMPING_RAW_HARDWARE) &&
674
	    ktime_to_timespec_cond(shhwtstamps->hwtstamp, tss.ts + 2))
675
		empty = 0;
676 677
	if (!empty)
		put_cmsg(msg, SOL_SOCKET,
678
			 SCM_TIMESTAMPING, sizeof(tss), &tss);
679
}
680 681
EXPORT_SYMBOL_GPL(__sock_recv_timestamp);

682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697
void __sock_recv_wifi_status(struct msghdr *msg, struct sock *sk,
	struct sk_buff *skb)
{
	int ack;

	if (!sock_flag(sk, SOCK_WIFI_STATUS))
		return;
	if (!skb->wifi_acked_valid)
		return;

	ack = skb->wifi_acked;

	put_cmsg(msg, SOL_SOCKET, SCM_WIFI_STATUS, sizeof(ack), &ack);
}
EXPORT_SYMBOL_GPL(__sock_recv_wifi_status);

698 699
static inline void sock_recv_drops(struct msghdr *msg, struct sock *sk,
				   struct sk_buff *skb)
700
{
701
	if (sock_flag(sk, SOCK_RXQ_OVFL) && skb && SOCK_SKB_CB(skb)->dropcount)
702
		put_cmsg(msg, SOL_SOCKET, SO_RXQ_OVFL,
703
			sizeof(__u32), &SOCK_SKB_CB(skb)->dropcount);
704 705
}

706
void __sock_recv_ts_and_drops(struct msghdr *msg, struct sock *sk,
707 708 709 710 711
	struct sk_buff *skb)
{
	sock_recv_timestamp(msg, sk, skb);
	sock_recv_drops(msg, sk, skb);
}
712
EXPORT_SYMBOL_GPL(__sock_recv_ts_and_drops);
713

714 715
static inline int sock_recvmsg_nosec(struct socket *sock, struct msghdr *msg,
				     size_t size, int flags)
Linus Torvalds's avatar
Linus Torvalds committed
716
{
717
	return sock->ops->recvmsg(sock, msg, size, flags);
Linus Torvalds's avatar
Linus Torvalds committed
718 719
}

720 721
int sock_recvmsg(struct socket *sock, struct msghdr *msg, size_t size,
		 int flags)
722 723 724
{
	int err = security_socket_recvmsg(sock, msg, size, flags);

725
	return err ?: sock_recvmsg_nosec(sock, msg, size, flags);
Linus Torvalds's avatar
Linus Torvalds committed
726
}
727
EXPORT_SYMBOL(sock_recvmsg);
Linus Torvalds's avatar
Linus Torvalds committed
728

729 730 731 732 733 734 735 736 737 738 739 740 741 742 743
/**
 * kernel_recvmsg - Receive a message from a socket (kernel space)
 * @sock:       The socket to receive the message from
 * @msg:        Received message
 * @vec:        Input s/g array for message data
 * @num:        Size of input s/g array
 * @size:       Number of bytes to read
 * @flags:      Message flags (MSG_DONTWAIT, etc...)
 *
 * On return the msg structure contains the scatter/gather array passed in the
 * vec argument. The array is modified so that it consists of the unfilled
 * portion of the original array.
 *
 * The returned value is the total number of bytes received, or an error.
 */
744 745
int kernel_recvmsg(struct socket *sock, struct msghdr *msg,
		   struct kvec *vec, size_t num, size_t size, int flags)
Linus Torvalds's avatar
Linus Torvalds committed
746 747 748 749
{
	mm_segment_t oldfs = get_fs();
	int result;

750
	iov_iter_kvec(&msg->msg_iter, READ | ITER_KVEC, vec, num, size);
Linus Torvalds's avatar
Linus Torvalds committed
751 752 753 754 755
	set_fs(KERNEL_DS);
	result = sock_recvmsg(sock, msg, size, flags);
	set_fs(oldfs);
	return result;
}
756
EXPORT_SYMBOL(kernel_recvmsg);
Linus Torvalds's avatar
Linus Torvalds committed
757

758 759
static ssize_t sock_sendpage(struct file *file, struct page *page,
			     int offset, size_t size, loff_t *ppos, int more)
Linus Torvalds's avatar
Linus Torvalds committed
760 761 762 763
{
	struct socket *sock;
	int flags;

764 765
	sock = file->private_data;

766 767 768
	flags = (file->f_flags & O_NONBLOCK) ? MSG_DONTWAIT : 0;
	/* more is a combination of MSG_MORE and MSG_SENDPAGE_NOTLAST */
	flags |= more;
769

770
	return kernel_sendpage(sock, page, offset, size, flags);
771
}
Linus Torvalds's avatar
Linus Torvalds committed
772

Jens Axboe's avatar
Jens Axboe committed
773
static ssize_t sock_splice_read(struct file *file, loff_t *ppos,
774
				struct pipe_inode_info *pipe, size_t len,
Jens Axboe's avatar
Jens Axboe committed
775 776 777 778
				unsigned int flags)
{
	struct socket *sock = file->private_data;

779 780 781
	if (unlikely(!sock->ops->splice_read))
		return -EINVAL;

Jens Axboe's avatar
Jens Axboe committed
782 783 784
	return sock->ops->splice_read(sock, ppos, pipe, len, flags);
}

785
static ssize_t sock_read_iter(struct kiocb *iocb, struct iov_iter *to)
786
{
787 788
	struct file *file = iocb->ki_filp;
	struct socket *sock = file->private_data;
789 790
	struct msghdr msg = {.msg_iter = *to,
			     .msg_iocb = iocb};
791
	ssize_t res;
792

793 794 795 796
	if (file->f_flags & O_NONBLOCK)
		msg.msg_flags = MSG_DONTWAIT;

	if (iocb->ki_pos != 0)
Linus Torvalds's avatar
Linus Torvalds committed
797
		return -ESPIPE;
798

Christoph Hellwig's avatar
Christoph Hellwig committed
799
	if (!iov_iter_count(to))	/* Match SYS5 behaviour */
Linus Torvalds's avatar
Linus Torvalds committed
800 801
		return 0;

Al Viro's avatar
Al Viro committed
802
	res = sock_recvmsg(sock, &msg, iov_iter_count(to), msg.msg_flags);
803 804
	*to = msg.msg_iter;
	return res;
Linus Torvalds's avatar
Linus Torvalds committed
805 806
}

807
static ssize_t sock_write_iter(struct kiocb *iocb, struct iov_iter *from)
808
{
809 810
	struct file *file = iocb->ki_filp;
	struct socket *sock = file->private_data;
811 812
	struct msghdr msg = {.msg_iter = *from,
			     .msg_iocb = iocb};
813
	ssize_t res;
Linus Torvalds's avatar
Linus Torvalds committed
814

815
	if (iocb->ki_pos != 0)
816
		return -ESPIPE;
817

818 819 820
	if (file->f_flags & O_NONBLOCK)
		msg.msg_flags = MSG_DONTWAIT;

821 822 823
	if (sock->type == SOCK_SEQPACKET)
		msg.msg_flags |= MSG_EOR;

824
	res = sock_sendmsg(sock, &msg);
825 826
	*from = msg.msg_iter;
	return res;
Linus Torvalds's avatar
Linus Torvalds committed
827 828 829 830 831 832 833
}

/*
 * Atomic setting of ioctl hooks to avoid race
 * with module unload.
 */

Arjan van de Ven's avatar
Arjan van de Ven committed
834
static DEFINE_MUTEX(br_ioctl_mutex);
835
static int (*br_ioctl_hook) (struct net *, unsigned int cmd, void __user *arg);
Linus Torvalds's avatar
Linus Torvalds committed
836

837
void brioctl_set(int (*hook) (struct net *, unsigned int, void __user *))
Linus Torvalds's avatar
Linus Torvalds committed
838
{
Arjan van de Ven's avatar
Arjan van de Ven committed
839
	mutex_lock(&br_ioctl_mutex);
Linus Torvalds's avatar
Linus Torvalds committed
840
	br_ioctl_hook = hook;
Arjan van de Ven's avatar
Arjan van de Ven committed
841
	mutex_unlock(&br_ioctl_mutex);
Linus Torvalds's avatar
Linus Torvalds committed
842 843 844
}
EXPORT_SYMBOL(brioctl_set);

Arjan van de Ven's avatar
Arjan van de Ven committed
845
static DEFINE_MUTEX(vlan_ioctl_mutex);
846
static int (*vlan_ioctl_hook) (struct net *, void __user *arg);
Linus Torvalds's avatar
Linus Torvalds committed
847

848
void vlan_ioctl_set(int (*hook) (struct net *, void __user *))
Linus Torvalds's avatar
Linus Torvalds committed
849
{
Arjan van de Ven's avatar
Arjan van de Ven committed
850
	mutex_lock(&vlan_ioctl_mutex);
Linus Torvalds's avatar
Linus Torvalds committed
851
	vlan_ioctl_hook = hook;
Arjan van de Ven's avatar
Arjan van de Ven committed
852
	mutex_unlock(&vlan_ioctl_mutex);
Linus Torvalds's avatar
Linus Torvalds committed
853 854 855
}
EXPORT_SYMBOL(vlan_ioctl_set);

Arjan van de Ven's avatar
Arjan van de Ven committed
856
static DEFINE_MUTEX(dlci_ioctl_mutex);
857
static int (*dlci_ioctl_hook) (unsigned int, void __user *);
Linus Torvalds's avatar
Linus Torvalds committed
858

859
void dlci_ioctl_set(int (*hook) (unsigned int, void __user *))
Linus Torvalds's avatar
Linus Torvalds committed
860
{
Arjan van de Ven's avatar
Arjan van de Ven committed
861
	mutex_lock(&dlci_ioctl_mutex);
Linus Torvalds's avatar
Linus Torvalds committed
862
	dlci_ioctl_hook = hook;
Arjan van de Ven's avatar
Arjan van de Ven committed
863
	mutex_unlock(&dlci_ioctl_mutex);
Linus Torvalds's avatar
Linus Torvalds committed
864 865 866
}
EXPORT_SYMBOL(dlci_ioctl_set);

867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884
static long sock_do_ioctl(struct net *net, struct socket *sock,
				 unsigned int cmd, unsigned long arg)
{
	int err;
	void __user *argp = (void __user *)arg;

	err = sock->ops->ioctl(sock, cmd, arg);

	/*
	 * If this ioctl is unknown try to hand it down
	 * to the NIC driver.
	 */
	if (err == -ENOIOCTLCMD)
		err = dev_ioctl(net, cmd, argp);

	return err;
}

Linus Torvalds's avatar
Linus Torvalds committed
885 886 887 888 889 890 891 892
/*
 *	With an ioctl, arg may well be a user mode pointer, but we don't know
 *	what to do with it - that's up to the protocol still.
 */

static long sock_ioctl(struct file *file, unsigned cmd, unsigned long arg)
{
	struct socket *sock;
893
	struct sock *sk;
Linus Torvalds's avatar
Linus Torvalds committed
894 895
	void __user *argp = (void __user *)arg;
	int pid, err;
896
	struct net *net;
Linus Torvalds's avatar
Linus Torvalds committed
897

898
	sock = file->private_data;
899
	sk = sock->sk;
900
	net = sock_net(sk);
Linus Torvalds's avatar
Linus Torvalds committed
901
	if (cmd >= SIOCDEVPRIVATE && cmd <= (SIOCDEVPRIVATE + 15)) {
902
		err = dev_ioctl(net, cmd, argp);
Linus Torvalds's avatar
Linus Torvalds committed
903
	} else
Johannes Berg's avatar
Johannes Berg committed
904
#ifdef CONFIG_WEXT_CORE
Linus Torvalds's avatar
Linus Torvalds committed
905
	if (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST) {
906
		err = dev_ioctl(net, cmd, argp);
Linus Torvalds's avatar
Linus Torvalds committed
907
	} else
Johannes Berg's avatar
Johannes Berg committed
908
#endif
909
		switch (cmd) {
Linus Torvalds's avatar
Linus Torvalds committed
910 911 912 913 914
		case FIOSETOWN:
		case SIOCSPGRP:
			err = -EFAULT;
			if (get_user(pid, (int __user *)argp))
				break;
915 916
			f_setown(sock->file, pid, 1);
			err = 0;
Linus Torvalds's avatar
Linus Torvalds committed
917 918 919
			break;
		case FIOGETOWN:
		case SIOCGPGRP:
920
			err = put_user(f_getown(sock->file),
921
				       (int __user *)argp);
Linus Torvalds's avatar
Linus Torvalds committed
922 923 924 925 926 927 928 929 930
			break;
		case SIOCGIFBR:
		case SIOCSIFBR:
		case SIOCBRADDBR:
		case SIOCBRDELBR:
			err = -ENOPKG;
			if (!br_ioctl_hook)
				request_module("bridge");

Arjan van de Ven's avatar
Arjan van de Ven committed
931
			mutex_lock(&br_ioctl_mutex);
932
			if (br_ioctl_hook)
933
				err = br_ioctl_hook(net, cmd, argp);
Arjan van de Ven's avatar
Arjan van de Ven committed
934
			mutex_unlock(&br_ioctl_mutex);
Linus Torvalds's avatar
Linus Torvalds committed
935 936 937 938 939 940 941
			break;
		case SIOCGIFVLAN:
		case SIOCSIFVLAN:
			err = -ENOPKG;
			if (!vlan_ioctl_hook)
				request_module("8021q");

Arjan van de Ven's avatar
Arjan van de Ven committed
942
			mutex_lock(&vlan_ioctl_mutex);
Linus Torvalds's avatar
Linus Torvalds committed
943
			if (vlan_ioctl_hook)
944
				err = vlan_ioctl_hook(net, argp);
Arjan van de Ven's avatar
Arjan van de Ven committed
945
			mutex_unlock(&vlan_ioctl_mutex);
Linus Torvalds's avatar
Linus Torvalds committed
946 947 948 949 950 951 952
			break;
		case SIOCADDDLCI:
		case SIOCDELDLCI:
			err = -ENOPKG;
			if (!dlci_ioctl_hook)
				request_module("dlci");

953 954
			mutex_lock(&dlci_ioctl_mutex);
			if (dlci_ioctl_hook)
Linus Torvalds's avatar
Linus Torvalds committed
955
				err = dlci_ioctl_hook(cmd, argp);
956
			mutex_unlock(&dlci_ioctl_mutex);
Linus Torvalds's avatar
Linus Torvalds committed
957 958
			break;
		default:
959
			err = sock_do_ioctl(net, sock, cmd, arg);
Linus Torvalds's avatar
Linus Torvalds committed
960
			break;
961
		}
Linus Torvalds's avatar
Linus Torvalds committed
962 963 964 965 966 967 968
	return err;
}

int sock_create_lite(int family, int type, int protocol, struct socket **res)
{
	int err;
	struct socket *sock = NULL;
969

Linus Torvalds's avatar
Linus Torvalds committed
970 971 972 973 974 975 976 977 978 979 980
	err = security_socket_create(family, type, protocol, 1);
	if (err)
		goto out;

	sock = sock_alloc();
	if (!sock) {
		err = -ENOMEM;
		goto out;
	}

	sock->type = type;
981 982 983 984
	err = security_socket_post_create(sock, family, type, protocol, 1);
	if (err)
		goto out_release;

Linus Torvalds's avatar
Linus Torvalds committed
985 986 987
out:
	*res = sock;
	return err;
988 989 990 991
out_release:
	sock_release(sock);
	sock = NULL;
	goto out;
Linus Torvalds's avatar
Linus Torvalds committed
992
}
993
EXPORT_SYMBOL(sock_create_lite);
Linus Torvalds's avatar
Linus Torvalds committed
994 995

/* No kernel lock held - perfect */
996
static unsigned int sock_poll(struct file *file, poll_table *wait)
Linus Torvalds's avatar
Linus Torvalds committed
997
{
998
	unsigned int busy_flag = 0;
Linus Torvalds's avatar
Linus Torvalds committed
999 1000 1001
	struct socket *sock;

	/*
1002
	 *      We can't return errors to poll, so it's either yes or no.
Linus Torvalds's avatar
Linus Torvalds committed
1003
	 */
1004
	sock = file->private_data;
1005

1006
	if (sk_can_busy_loop(sock->sk)) {
1007
		/* this socket can poll_ll so tell the system call */
1008
		busy_flag = POLL_BUSY_LOOP;
1009 1010

		/* once, only if requested by syscall */
1011 1012
		if (wait && (wait->_key & POLL_BUSY_LOOP))
			sk_busy_loop(sock->sk, 1);
1013 1014
	}

1015
	return busy_flag | sock->ops->poll(file, sock, wait);
Linus Torvalds's avatar
Linus Torvalds committed
1016 1017
}

1018
static int sock_mmap(struct file *file, struct vm_area_struct *vma)
Linus Torvalds's avatar
Linus Torvalds committed
1019
{
1020
	struct socket *sock = file->private_data;
Linus Torvalds's avatar
Linus Torvalds committed
1021 1022 1023 1024

	return sock->ops->mmap(file, sock, vma);
}

1025
static int sock_close(struct inode *inode, struct file *filp)
Linus Torvalds's avatar
Linus Torvalds committed
1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038
{
	sock_release(SOCKET_I(inode));
	return 0;
}

/*
 *	Update the socket async list
 *
 *	Fasync_list locking strategy.
 *
 *	1. fasync_list is modified only under process context socket lock
 *	   i.e. under semaphore.
 *	2. fasync_list is used under read_lock(&sk->sk_callback_lock)
1039
 *	   or under socket lock
Linus Torvalds's avatar
Linus Torvalds committed
1040 1041 1042 1043
 */

static int sock_fasync(int fd, struct file *filp, int on)
{
1044 1045
	struct socket *sock = filp->private_data;
	struct sock *sk = sock->sk;
1046
	struct socket_wq *wq;
Linus Torvalds's avatar
Linus Torvalds committed
1047

1048
	if (sk == NULL)
Linus Torvalds's avatar
Linus Torvalds committed
1049 1050 1051
		return -EINVAL;

	lock_sock(sk);
1052 1053
	wq = rcu_dereference_protected(sock->wq, sock_owned_by_user(sk));
	fasync_helper(fd, filp, on, &wq->fasync_list);
Linus Torvalds's avatar
Linus Torvalds committed
1054

1055
	if (!wq->fasync_list)
1056 1057
		sock_reset_flag(sk, SOCK_FASYNC);
	else
Eric Dumazet's avatar
Eric Dumazet committed
1058
		sock_set_flag(sk, SOCK_FASYNC);
Linus Torvalds's avatar
Linus Torvalds committed
1059

1060
	release_sock(sk);
Linus Torvalds's avatar
Linus Torvalds committed
1061 1062 1063
	return 0;
}

1064
/* This function may be called only under socket lock or callback_lock or rcu_lock */
Linus Torvalds's avatar
Linus Torvalds committed
1065 1066 1067

int sock_wake_async(struct socket *sock, int how, int band)
{
1068 1069 1070 1071 1072 1073 1074 1075
	struct socket_wq *wq;

	if (!sock)
		return -1;
	rcu_read_lock();
	wq = rcu_dereference(sock->wq);
	if (!wq || !wq->fasync_list) {
		rcu_read_unlock();
Linus Torvalds's avatar
Linus Torvalds committed
1076
		return -1;
1077
	}
1078
	switch (how) {
1079
	case SOCK_WAKE_WAITD:
Linus Torvalds's avatar
Linus Torvalds committed
1080 1081 1082
		if (test_bit(SOCK_ASYNC_WAITDATA, &sock->flags))
			break;
		goto call_kill;
1083
	case SOCK_WAKE_SPACE:
Linus Torvalds's avatar
Linus Torvalds committed
1084 1085 1086
		if (!test_and_clear_bit(SOCK_ASYNC_NOSPACE, &sock->flags))
			break;
		/* fall through */
1087
	case SOCK_WAKE_IO:
1088
call_kill:
1089
		kill_fasync(&wq->fasync_list, SIGIO, band);
Linus Torvalds's avatar
Linus Torvalds committed
1090
		break;
1091
	case SOCK_WAKE_URG:
1092
		kill_fasync(&wq->fasync_list, SIGURG, band);
Linus Torvalds's avatar
Linus Torvalds committed
1093
	}
1094
	rcu_read_unlock();
Linus Torvalds's avatar
Linus Torvalds committed
1095 1096
	return 0;
}
1097
EXPORT_SYMBOL(sock_wake_async);
Linus Torvalds's avatar
Linus Torvalds committed
1098

Pavel Emelyanov's avatar
Pavel Emelyanov committed
1099
int __sock_create(struct net *net, int family, int type, int protocol,
1100
			 struct socket **res, int kern)
Linus Torvalds's avatar
Linus Torvalds committed
1101 1102 1103
{
	int err;
	struct socket *sock;
1104
	const struct net_proto_family *pf;
Linus Torvalds's avatar
Linus Torvalds committed
1105 1106

	/*
1107
	 *      Check protocol is in range
Linus Torvalds's avatar
Linus Torvalds committed
1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119
	 */
	if (family < 0 || family >= NPROTO)
		return -EAFNOSUPPORT;
	if (type < 0 || type >= SOCK_MAX)
		return -EINVAL;

	/* Compatibility.

	   This uglymoron is moved from INET layer to here to avoid
	   deadlock in module load.
	 */
	if (family == PF_INET && type == SOCK_PACKET) {
1120
		static int warned;
Linus Torvalds's avatar
Linus Torvalds committed
1121 1122
		if (!warned) {
			warned = 1;
1123 1124
			pr_info("%s uses obsolete (PF_INET,SOCK_PACKET)\n",
				current->comm);
Linus Torvalds's avatar
Linus Torvalds committed
1125 1126 1127 1128 1129 1130 1131
		}
		family = PF_PACKET;
	}

	err = security_socket_create(family, type, protocol, kern);
	if (err)
		return err;
1132

1133 1134 1135 1136 1137 1138 1139
	/*
	 *	Allocate the socket and allow the family to set things up. if
	 *	the protocol is 0, the family is instructed to select an appropriate
	 *	default.
	 */
	sock = sock_alloc();
	if (!sock) {
1140
		net_warn_ratelimited("socket: no more sockets\n");
1141 1142