sock.c 70.7 KB
Newer Older
Linus Torvalds's avatar
Linus Torvalds committed
1 2 3 4 5 6 7 8 9
/*
 * INET		An implementation of the TCP/IP protocol suite for the LINUX
 *		operating system.  INET is implemented using the  BSD Socket
 *		interface as the means of communication with the user level.
 *
 *		Generic socket support routines. Memory allocators, socket lock/release
 *		handler for protocols to use and generic option handler.
 *
 *
10
 * Authors:	Ross Biro
Linus Torvalds's avatar
Linus Torvalds committed
11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34
 *		Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
 *		Florian La Roche, <flla@stud.uni-sb.de>
 *		Alan Cox, <A.Cox@swansea.ac.uk>
 *
 * Fixes:
 *		Alan Cox	: 	Numerous verify_area() problems
 *		Alan Cox	:	Connecting on a connecting socket
 *					now returns an error for tcp.
 *		Alan Cox	:	sock->protocol is set correctly.
 *					and is not sometimes left as 0.
 *		Alan Cox	:	connect handles icmp errors on a
 *					connect properly. Unfortunately there
 *					is a restart syscall nasty there. I
 *					can't match BSD without hacking the C
 *					library. Ideas urgently sought!
 *		Alan Cox	:	Disallow bind() to addresses that are
 *					not ours - especially broadcast ones!!
 *		Alan Cox	:	Socket 1024 _IS_ ok for users. (fencepost)
 *		Alan Cox	:	sock_wfree/sock_rfree don't destroy sockets,
 *					instead they leave that for the DESTROY timer.
 *		Alan Cox	:	Clean up error flag in accept
 *		Alan Cox	:	TCP ack handling is buggy, the DESTROY timer
 *					was buggy. Put a remove_sock() in the handler
 *					for memory when we hit 0. Also altered the timer
35
 *					code. The ACK stuff can wait and needs major
Linus Torvalds's avatar
Linus Torvalds committed
36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91
 *					TCP layer surgery.
 *		Alan Cox	:	Fixed TCP ack bug, removed remove sock
 *					and fixed timer/inet_bh race.
 *		Alan Cox	:	Added zapped flag for TCP
 *		Alan Cox	:	Move kfree_skb into skbuff.c and tidied up surplus code
 *		Alan Cox	:	for new sk_buff allocations wmalloc/rmalloc now call alloc_skb
 *		Alan Cox	:	kfree_s calls now are kfree_skbmem so we can track skb resources
 *		Alan Cox	:	Supports socket option broadcast now as does udp. Packet and raw need fixing.
 *		Alan Cox	:	Added RCVBUF,SNDBUF size setting. It suddenly occurred to me how easy it was so...
 *		Rick Sladkey	:	Relaxed UDP rules for matching packets.
 *		C.E.Hawkins	:	IFF_PROMISC/SIOCGHWADDR support
 *	Pauline Middelink	:	identd support
 *		Alan Cox	:	Fixed connect() taking signals I think.
 *		Alan Cox	:	SO_LINGER supported
 *		Alan Cox	:	Error reporting fixes
 *		Anonymous	:	inet_create tidied up (sk->reuse setting)
 *		Alan Cox	:	inet sockets don't set sk->type!
 *		Alan Cox	:	Split socket option code
 *		Alan Cox	:	Callbacks
 *		Alan Cox	:	Nagle flag for Charles & Johannes stuff
 *		Alex		:	Removed restriction on inet fioctl
 *		Alan Cox	:	Splitting INET from NET core
 *		Alan Cox	:	Fixed bogus SO_TYPE handling in getsockopt()
 *		Adam Caldwell	:	Missing return in SO_DONTROUTE/SO_DEBUG code
 *		Alan Cox	:	Split IP from generic code
 *		Alan Cox	:	New kfree_skbmem()
 *		Alan Cox	:	Make SO_DEBUG superuser only.
 *		Alan Cox	:	Allow anyone to clear SO_DEBUG
 *					(compatibility fix)
 *		Alan Cox	:	Added optimistic memory grabbing for AF_UNIX throughput.
 *		Alan Cox	:	Allocator for a socket is settable.
 *		Alan Cox	:	SO_ERROR includes soft errors.
 *		Alan Cox	:	Allow NULL arguments on some SO_ opts
 *		Alan Cox	: 	Generic socket allocation to make hooks
 *					easier (suggested by Craig Metz).
 *		Michael Pall	:	SO_ERROR returns positive errno again
 *              Steve Whitehouse:       Added default destructor to free
 *                                      protocol private data.
 *              Steve Whitehouse:       Added various other default routines
 *                                      common to several socket families.
 *              Chris Evans     :       Call suser() check last on F_SETOWN
 *		Jay Schulist	:	Added SO_ATTACH_FILTER and SO_DETACH_FILTER.
 *		Andi Kleen	:	Add sock_kmalloc()/sock_kfree_s()
 *		Andi Kleen	:	Fix write_space callback
 *		Chris Evans	:	Security fixes - signedness again
 *		Arnaldo C. Melo :       cleanups, use skb_queue_purge
 *
 * To Fix:
 *
 *
 *		This program is free software; you can redistribute it and/or
 *		modify it under the terms of the GNU General Public License
 *		as published by the Free Software Foundation; either version
 *		2 of the License, or (at your option) any later version.
 */

Joe Perches's avatar
Joe Perches committed
92 93
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt

94
#include <linux/capability.h>
Linus Torvalds's avatar
Linus Torvalds committed
95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113
#include <linux/errno.h>
#include <linux/types.h>
#include <linux/socket.h>
#include <linux/in.h>
#include <linux/kernel.h>
#include <linux/module.h>
#include <linux/proc_fs.h>
#include <linux/seq_file.h>
#include <linux/sched.h>
#include <linux/timer.h>
#include <linux/string.h>
#include <linux/sockios.h>
#include <linux/net.h>
#include <linux/mm.h>
#include <linux/slab.h>
#include <linux/interrupt.h>
#include <linux/poll.h>
#include <linux/tcp.h>
#include <linux/init.h>
114
#include <linux/highmem.h>
115
#include <linux/user_namespace.h>
116
#include <linux/static_key.h>
117
#include <linux/memcontrol.h>
118
#include <linux/prefetch.h>
Linus Torvalds's avatar
Linus Torvalds committed
119 120 121 122 123 124

#include <asm/uaccess.h>

#include <linux/netdevice.h>
#include <net/protocol.h>
#include <linux/skbuff.h>
125
#include <net/net_namespace.h>
126
#include <net/request_sock.h>
Linus Torvalds's avatar
Linus Torvalds committed
127
#include <net/sock.h>
128
#include <linux/net_tstamp.h>
Linus Torvalds's avatar
Linus Torvalds committed
129 130
#include <net/xfrm.h>
#include <linux/ipsec.h>
131
#include <net/cls_cgroup.h>
132
#include <net/netprio_cgroup.h>
Linus Torvalds's avatar
Linus Torvalds committed
133 134 135

#include <linux/filter.h>

136 137
#include <trace/events/sock.h>

Linus Torvalds's avatar
Linus Torvalds committed
138 139 140 141
#ifdef CONFIG_INET
#include <net/tcp.h>
#endif

142 143
#include <net/ll_poll.h>

144
static DEFINE_MUTEX(proto_list_mutex);
Glauber Costa's avatar
Glauber Costa committed
145 146
static LIST_HEAD(proto_list);

Andrew Morton's avatar
Andrew Morton committed
147
#ifdef CONFIG_MEMCG_KMEM
148
int mem_cgroup_sockets_init(struct mem_cgroup *memcg, struct cgroup_subsys *ss)
Glauber Costa's avatar
Glauber Costa committed
149 150 151 152
{
	struct proto *proto;
	int ret = 0;

153
	mutex_lock(&proto_list_mutex);
Glauber Costa's avatar
Glauber Costa committed
154 155
	list_for_each_entry(proto, &proto_list, node) {
		if (proto->init_cgroup) {
156
			ret = proto->init_cgroup(memcg, ss);
Glauber Costa's avatar
Glauber Costa committed
157 158 159 160 161
			if (ret)
				goto out;
		}
	}

162
	mutex_unlock(&proto_list_mutex);
Glauber Costa's avatar
Glauber Costa committed
163 164 165 166
	return ret;
out:
	list_for_each_entry_continue_reverse(proto, &proto_list, node)
		if (proto->destroy_cgroup)
167
			proto->destroy_cgroup(memcg);
168
	mutex_unlock(&proto_list_mutex);
Glauber Costa's avatar
Glauber Costa committed
169 170 171
	return ret;
}

172
void mem_cgroup_sockets_destroy(struct mem_cgroup *memcg)
Glauber Costa's avatar
Glauber Costa committed
173 174 175
{
	struct proto *proto;

176
	mutex_lock(&proto_list_mutex);
Glauber Costa's avatar
Glauber Costa committed
177 178
	list_for_each_entry_reverse(proto, &proto_list, node)
		if (proto->destroy_cgroup)
179
			proto->destroy_cgroup(memcg);
180
	mutex_unlock(&proto_list_mutex);
Glauber Costa's avatar
Glauber Costa committed
181 182 183
}
#endif

184 185 186 187
/*
 * Each address family might have different locking rules, so we have
 * one slock key per address family:
 */
188 189 190
static struct lock_class_key af_family_keys[AF_MAX];
static struct lock_class_key af_family_slock_keys[AF_MAX];

191
#if defined(CONFIG_MEMCG_KMEM)
192
struct static_key memcg_socket_limit_enabled;
Glauber Costa's avatar
Glauber Costa committed
193
EXPORT_SYMBOL(memcg_socket_limit_enabled);
194
#endif
Glauber Costa's avatar
Glauber Costa committed
195

196 197 198 199 200
/*
 * Make lock validator output more readable. (we pre-construct these
 * strings build-time, so that runtime initialization of socket
 * locks is fast):
 */
201
static const char *const af_family_key_strings[AF_MAX+1] = {
202 203 204 205 206 207 208
  "sk_lock-AF_UNSPEC", "sk_lock-AF_UNIX"     , "sk_lock-AF_INET"     ,
  "sk_lock-AF_AX25"  , "sk_lock-AF_IPX"      , "sk_lock-AF_APPLETALK",
  "sk_lock-AF_NETROM", "sk_lock-AF_BRIDGE"   , "sk_lock-AF_ATMPVC"   ,
  "sk_lock-AF_X25"   , "sk_lock-AF_INET6"    , "sk_lock-AF_ROSE"     ,
  "sk_lock-AF_DECnet", "sk_lock-AF_NETBEUI"  , "sk_lock-AF_SECURITY" ,
  "sk_lock-AF_KEY"   , "sk_lock-AF_NETLINK"  , "sk_lock-AF_PACKET"   ,
  "sk_lock-AF_ASH"   , "sk_lock-AF_ECONET"   , "sk_lock-AF_ATMSVC"   ,
Andy Grover's avatar
Andy Grover committed
209
  "sk_lock-AF_RDS"   , "sk_lock-AF_SNA"      , "sk_lock-AF_IRDA"     ,
210
  "sk_lock-AF_PPPOX" , "sk_lock-AF_WANPIPE"  , "sk_lock-AF_LLC"      ,
211
  "sk_lock-27"       , "sk_lock-28"          , "sk_lock-AF_CAN"      ,
212
  "sk_lock-AF_TIPC"  , "sk_lock-AF_BLUETOOTH", "sk_lock-IUCV"        ,
213
  "sk_lock-AF_RXRPC" , "sk_lock-AF_ISDN"     , "sk_lock-AF_PHONET"   ,
214
  "sk_lock-AF_IEEE802154", "sk_lock-AF_CAIF" , "sk_lock-AF_ALG"      ,
215
  "sk_lock-AF_NFC"   , "sk_lock-AF_VSOCK"    , "sk_lock-AF_MAX"
216
};
217
static const char *const af_family_slock_key_strings[AF_MAX+1] = {
218 219 220 221 222 223 224
  "slock-AF_UNSPEC", "slock-AF_UNIX"     , "slock-AF_INET"     ,
  "slock-AF_AX25"  , "slock-AF_IPX"      , "slock-AF_APPLETALK",
  "slock-AF_NETROM", "slock-AF_BRIDGE"   , "slock-AF_ATMPVC"   ,
  "slock-AF_X25"   , "slock-AF_INET6"    , "slock-AF_ROSE"     ,
  "slock-AF_DECnet", "slock-AF_NETBEUI"  , "slock-AF_SECURITY" ,
  "slock-AF_KEY"   , "slock-AF_NETLINK"  , "slock-AF_PACKET"   ,
  "slock-AF_ASH"   , "slock-AF_ECONET"   , "slock-AF_ATMSVC"   ,
Andy Grover's avatar
Andy Grover committed
225
  "slock-AF_RDS"   , "slock-AF_SNA"      , "slock-AF_IRDA"     ,
226
  "slock-AF_PPPOX" , "slock-AF_WANPIPE"  , "slock-AF_LLC"      ,
227
  "slock-27"       , "slock-28"          , "slock-AF_CAN"      ,
228
  "slock-AF_TIPC"  , "slock-AF_BLUETOOTH", "slock-AF_IUCV"     ,
229
  "slock-AF_RXRPC" , "slock-AF_ISDN"     , "slock-AF_PHONET"   ,
230
  "slock-AF_IEEE802154", "slock-AF_CAIF" , "slock-AF_ALG"      ,
231
  "slock-AF_NFC"   , "slock-AF_VSOCK"    ,"slock-AF_MAX"
232
};
233
static const char *const af_family_clock_key_strings[AF_MAX+1] = {
234 235 236 237 238 239 240
  "clock-AF_UNSPEC", "clock-AF_UNIX"     , "clock-AF_INET"     ,
  "clock-AF_AX25"  , "clock-AF_IPX"      , "clock-AF_APPLETALK",
  "clock-AF_NETROM", "clock-AF_BRIDGE"   , "clock-AF_ATMPVC"   ,
  "clock-AF_X25"   , "clock-AF_INET6"    , "clock-AF_ROSE"     ,
  "clock-AF_DECnet", "clock-AF_NETBEUI"  , "clock-AF_SECURITY" ,
  "clock-AF_KEY"   , "clock-AF_NETLINK"  , "clock-AF_PACKET"   ,
  "clock-AF_ASH"   , "clock-AF_ECONET"   , "clock-AF_ATMSVC"   ,
Andy Grover's avatar
Andy Grover committed
241
  "clock-AF_RDS"   , "clock-AF_SNA"      , "clock-AF_IRDA"     ,
242
  "clock-AF_PPPOX" , "clock-AF_WANPIPE"  , "clock-AF_LLC"      ,
243
  "clock-27"       , "clock-28"          , "clock-AF_CAN"      ,
244
  "clock-AF_TIPC"  , "clock-AF_BLUETOOTH", "clock-AF_IUCV"     ,
245
  "clock-AF_RXRPC" , "clock-AF_ISDN"     , "clock-AF_PHONET"   ,
246
  "clock-AF_IEEE802154", "clock-AF_CAIF" , "clock-AF_ALG"      ,
247
  "clock-AF_NFC"   , "clock-AF_VSOCK"    , "clock-AF_MAX"
248
};
249 250 251 252 253 254 255

/*
 * sk_callback_lock locking rules are per-address-family,
 * so split the lock classes by using a per-AF key:
 */
static struct lock_class_key af_callback_keys[AF_MAX];

Linus Torvalds's avatar
Linus Torvalds committed
256 257 258 259 260 261
/* Take into consideration the size of the struct sk_buff overhead in the
 * determination of these values, since that is non-constant across
 * platforms.  This makes socket queueing behavior and performance
 * not depend upon such differences.
 */
#define _SK_MEM_PACKETS		256
Eric Dumazet's avatar
Eric Dumazet committed
262
#define _SK_MEM_OVERHEAD	SKB_TRUESIZE(256)
Linus Torvalds's avatar
Linus Torvalds committed
263 264 265 266
#define SK_WMEM_MAX		(_SK_MEM_OVERHEAD * _SK_MEM_PACKETS)
#define SK_RMEM_MAX		(_SK_MEM_OVERHEAD * _SK_MEM_PACKETS)

/* Run time adjustable parameters. */
267
__u32 sysctl_wmem_max __read_mostly = SK_WMEM_MAX;
268
EXPORT_SYMBOL(sysctl_wmem_max);
269
__u32 sysctl_rmem_max __read_mostly = SK_RMEM_MAX;
270
EXPORT_SYMBOL(sysctl_rmem_max);
271 272
__u32 sysctl_wmem_default __read_mostly = SK_WMEM_MAX;
__u32 sysctl_rmem_default __read_mostly = SK_RMEM_MAX;
Linus Torvalds's avatar
Linus Torvalds committed
273

Lucas De Marchi's avatar
Lucas De Marchi committed
274
/* Maximal space eaten by iovec or ancillary data plus some space */
275
int sysctl_optmem_max __read_mostly = sizeof(unsigned long)*(2*UIO_MAXIOV+512);
Eric Dumazet's avatar
Eric Dumazet committed
276
EXPORT_SYMBOL(sysctl_optmem_max);
Linus Torvalds's avatar
Linus Torvalds committed
277

278 279 280
struct static_key memalloc_socks = STATIC_KEY_INIT_FALSE;
EXPORT_SYMBOL_GPL(memalloc_socks);

281 282 283 284 285 286 287 288 289 290 291 292
/**
 * sk_set_memalloc - sets %SOCK_MEMALLOC
 * @sk: socket to set it on
 *
 * Set %SOCK_MEMALLOC on a socket for access to emergency reserves.
 * It's the responsibility of the admin to adjust min_free_kbytes
 * to meet the requirements
 */
void sk_set_memalloc(struct sock *sk)
{
	sock_set_flag(sk, SOCK_MEMALLOC);
	sk->sk_allocation |= __GFP_MEMALLOC;
293
	static_key_slow_inc(&memalloc_socks);
294 295 296 297 298 299 300
}
EXPORT_SYMBOL_GPL(sk_set_memalloc);

void sk_clear_memalloc(struct sock *sk)
{
	sock_reset_flag(sk, SOCK_MEMALLOC);
	sk->sk_allocation &= ~__GFP_MEMALLOC;
301
	static_key_slow_dec(&memalloc_socks);
302 303 304 305 306 307 308 309 310 311 312 313

	/*
	 * SOCK_MEMALLOC is allowed to ignore rmem limits to ensure forward
	 * progress of swapping. However, if SOCK_MEMALLOC is cleared while
	 * it has rmem allocations there is a risk that the user of the
	 * socket cannot make forward progress due to exceeding the rmem
	 * limits. By rights, sk_clear_memalloc() should only be called
	 * on sockets being torn down but warn and reset the accounting if
	 * that assumption breaks.
	 */
	if (WARN_ON(sk->sk_forward_alloc))
		sk_mem_reclaim(sk);
314 315 316
}
EXPORT_SYMBOL_GPL(sk_clear_memalloc);

317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332
int __sk_backlog_rcv(struct sock *sk, struct sk_buff *skb)
{
	int ret;
	unsigned long pflags = current->flags;

	/* these should have been dropped before queueing */
	BUG_ON(!sock_flag(sk, SOCK_MEMALLOC));

	current->flags |= PF_MEMALLOC;
	ret = sk->sk_backlog_rcv(sk, skb);
	tsk_restore_flags(current, pflags, PF_MEMALLOC);

	return ret;
}
EXPORT_SYMBOL(__sk_backlog_rcv);

Linus Torvalds's avatar
Linus Torvalds committed
333 334 335 336 337 338 339 340
static int sock_set_timeout(long *timeo_p, char __user *optval, int optlen)
{
	struct timeval tv;

	if (optlen < sizeof(tv))
		return -EINVAL;
	if (copy_from_user(&tv, optval, sizeof(tv)))
		return -EFAULT;
341 342
	if (tv.tv_usec < 0 || tv.tv_usec >= USEC_PER_SEC)
		return -EDOM;
Linus Torvalds's avatar
Linus Torvalds committed
343

344
	if (tv.tv_sec < 0) {
345 346
		static int warned __read_mostly;

347
		*timeo_p = 0;
348
		if (warned < 10 && net_ratelimit()) {
349
			warned++;
Joe Perches's avatar
Joe Perches committed
350 351
			pr_info("%s: `%s' (pid %d) tries to set negative timeout\n",
				__func__, current->comm, task_pid_nr(current));
352
		}
353 354
		return 0;
	}
Linus Torvalds's avatar
Linus Torvalds committed
355 356 357 358 359 360 361 362 363 364 365 366
	*timeo_p = MAX_SCHEDULE_TIMEOUT;
	if (tv.tv_sec == 0 && tv.tv_usec == 0)
		return 0;
	if (tv.tv_sec < (MAX_SCHEDULE_TIMEOUT/HZ - 1))
		*timeo_p = tv.tv_sec*HZ + (tv.tv_usec+(1000000/HZ-1))/(1000000/HZ);
	return 0;
}

static void sock_warn_obsolete_bsdism(const char *name)
{
	static int warned;
	static char warncomm[TASK_COMM_LEN];
367 368
	if (strcmp(warncomm, current->comm) && warned < 5) {
		strcpy(warncomm,  current->comm);
Joe Perches's avatar
Joe Perches committed
369 370
		pr_warn("process `%s' is using obsolete %s SO_BSDCOMPAT\n",
			warncomm, name);
Linus Torvalds's avatar
Linus Torvalds committed
371 372 373 374
		warned++;
	}
}

375 376 377
#define SK_FLAGS_TIMESTAMP ((1UL << SOCK_TIMESTAMP) | (1UL << SOCK_TIMESTAMPING_RX_SOFTWARE))

static void sock_disable_timestamp(struct sock *sk, unsigned long flags)
378
{
379 380 381
	if (sk->sk_flags & flags) {
		sk->sk_flags &= ~flags;
		if (!(sk->sk_flags & SK_FLAGS_TIMESTAMP))
382
			net_disable_timestamp();
Linus Torvalds's avatar
Linus Torvalds committed
383 384 385 386
	}
}


387 388
int sock_queue_rcv_skb(struct sock *sk, struct sk_buff *skb)
{
Eric Dumazet's avatar
Eric Dumazet committed
389
	int err;
390
	int skb_len;
391 392
	unsigned long flags;
	struct sk_buff_head *list = &sk->sk_receive_queue;
393

Eric Dumazet's avatar
Eric Dumazet committed
394
	if (atomic_read(&sk->sk_rmem_alloc) >= sk->sk_rcvbuf) {
Eric Dumazet's avatar
Eric Dumazet committed
395
		atomic_inc(&sk->sk_drops);
396
		trace_sock_rcvqueue_full(sk, skb);
Eric Dumazet's avatar
Eric Dumazet committed
397
		return -ENOMEM;
398 399
	}

400
	err = sk_filter(sk, skb);
401
	if (err)
Eric Dumazet's avatar
Eric Dumazet committed
402
		return err;
403

404
	if (!sk_rmem_schedule(sk, skb, skb->truesize)) {
Eric Dumazet's avatar
Eric Dumazet committed
405 406
		atomic_inc(&sk->sk_drops);
		return -ENOBUFS;
407 408
	}

409 410
	skb->dev = NULL;
	skb_set_owner_r(skb, sk);
411

412 413 414 415 416 417 418
	/* Cache the SKB length before we tack it onto the receive
	 * queue.  Once it is added it no longer belongs to us and
	 * may be freed by other threads of control pulling packets
	 * from the queue.
	 */
	skb_len = skb->len;

Eric Dumazet's avatar
Eric Dumazet committed
419 420 421 422 423
	/* we escape from rcu protected region, make sure we dont leak
	 * a norefcounted dst
	 */
	skb_dst_force(skb);

424 425 426 427
	spin_lock_irqsave(&list->lock, flags);
	skb->dropcount = atomic_read(&sk->sk_drops);
	__skb_queue_tail(list, skb);
	spin_unlock_irqrestore(&list->lock, flags);
428 429 430

	if (!sock_flag(sk, SOCK_DEAD))
		sk->sk_data_ready(sk, skb_len);
Eric Dumazet's avatar
Eric Dumazet committed
431
	return 0;
432 433 434
}
EXPORT_SYMBOL(sock_queue_rcv_skb);

435
int sk_receive_skb(struct sock *sk, struct sk_buff *skb, const int nested)
436 437 438
{
	int rc = NET_RX_SUCCESS;

439
	if (sk_filter(sk, skb))
440 441 442 443
		goto discard_and_relse;

	skb->dev = NULL;

444
	if (sk_rcvqueues_full(sk, skb, sk->sk_rcvbuf)) {
445 446 447
		atomic_inc(&sk->sk_drops);
		goto discard_and_relse;
	}
448 449 450 451
	if (nested)
		bh_lock_sock_nested(sk);
	else
		bh_lock_sock(sk);
452 453 454 455 456 457
	if (!sock_owned_by_user(sk)) {
		/*
		 * trylock + unlock semantics:
		 */
		mutex_acquire(&sk->sk_lock.dep_map, 0, 1, _RET_IP_);

458
		rc = sk_backlog_rcv(sk, skb);
459 460

		mutex_release(&sk->sk_lock.dep_map, 1, _RET_IP_);
461
	} else if (sk_add_backlog(sk, skb, sk->sk_rcvbuf)) {
Zhu Yi's avatar
Zhu Yi committed
462 463 464 465 466
		bh_unlock_sock(sk);
		atomic_inc(&sk->sk_drops);
		goto discard_and_relse;
	}

467 468 469 470 471 472 473 474 475 476
	bh_unlock_sock(sk);
out:
	sock_put(sk);
	return rc;
discard_and_relse:
	kfree_skb(skb);
	goto out;
}
EXPORT_SYMBOL(sk_receive_skb);

477 478 479 480 481 482
void sk_reset_txq(struct sock *sk)
{
	sk_tx_queue_clear(sk);
}
EXPORT_SYMBOL(sk_reset_txq);

483 484
struct dst_entry *__sk_dst_check(struct sock *sk, u32 cookie)
{
Eric Dumazet's avatar
Eric Dumazet committed
485
	struct dst_entry *dst = __sk_dst_get(sk);
486 487

	if (dst && dst->obsolete && dst->ops->check(dst, cookie) == NULL) {
488
		sk_tx_queue_clear(sk);
489
		RCU_INIT_POINTER(sk->sk_dst_cache, NULL);
490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511
		dst_release(dst);
		return NULL;
	}

	return dst;
}
EXPORT_SYMBOL(__sk_dst_check);

struct dst_entry *sk_dst_check(struct sock *sk, u32 cookie)
{
	struct dst_entry *dst = sk_dst_get(sk);

	if (dst && dst->obsolete && dst->ops->check(dst, cookie) == NULL) {
		sk_dst_reset(sk);
		dst_release(dst);
		return NULL;
	}

	return dst;
}
EXPORT_SYMBOL(sk_dst_check);

512 513
static int sock_setbindtodevice(struct sock *sk, char __user *optval,
				int optlen)
514 515 516
{
	int ret = -ENOPROTOOPT;
#ifdef CONFIG_NETDEVICES
517
	struct net *net = sock_net(sk);
518 519 520 521 522
	char devname[IFNAMSIZ];
	int index;

	/* Sorry... */
	ret = -EPERM;
523
	if (!ns_capable(net->user_ns, CAP_NET_RAW))
524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542
		goto out;

	ret = -EINVAL;
	if (optlen < 0)
		goto out;

	/* Bind this socket to a particular device like "eth0",
	 * as specified in the passed interface name. If the
	 * name is "" or the option length is zero the socket
	 * is not bound.
	 */
	if (optlen > IFNAMSIZ - 1)
		optlen = IFNAMSIZ - 1;
	memset(devname, 0, sizeof(devname));

	ret = -EFAULT;
	if (copy_from_user(devname, optval, optlen))
		goto out;

543 544
	index = 0;
	if (devname[0] != '\0') {
545
		struct net_device *dev;
546

547 548 549 550 551
		rcu_read_lock();
		dev = dev_get_by_name_rcu(net, devname);
		if (dev)
			index = dev->ifindex;
		rcu_read_unlock();
552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569
		ret = -ENODEV;
		if (!dev)
			goto out;
	}

	lock_sock(sk);
	sk->sk_bound_dev_if = index;
	sk_dst_reset(sk);
	release_sock(sk);

	ret = 0;

out:
#endif

	return ret;
}

570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586
static int sock_getbindtodevice(struct sock *sk, char __user *optval,
				int __user *optlen, int len)
{
	int ret = -ENOPROTOOPT;
#ifdef CONFIG_NETDEVICES
	struct net *net = sock_net(sk);
	char devname[IFNAMSIZ];

	if (sk->sk_bound_dev_if == 0) {
		len = 0;
		goto zero;
	}

	ret = -EINVAL;
	if (len < IFNAMSIZ)
		goto out;

587 588
	ret = netdev_get_name(net, devname, sk->sk_bound_dev_if);
	if (ret)
589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609
		goto out;

	len = strlen(devname) + 1;

	ret = -EFAULT;
	if (copy_to_user(optval, devname, len))
		goto out;

zero:
	ret = -EFAULT;
	if (put_user(len, optlen))
		goto out;

	ret = 0;

out:
#endif

	return ret;
}

610 611 612 613 614 615 616 617
static inline void sock_valbool_flag(struct sock *sk, int bit, int valbool)
{
	if (valbool)
		sock_set_flag(sk, bit);
	else
		sock_reset_flag(sk, bit);
}

Linus Torvalds's avatar
Linus Torvalds committed
618 619 620 621 622 623
/*
 *	This is meant for all protocols to use and covers goings on
 *	at the socket level. Everything here is generic.
 */

int sock_setsockopt(struct socket *sock, int level, int optname,
624
		    char __user *optval, unsigned int optlen)
Linus Torvalds's avatar
Linus Torvalds committed
625
{
Eric Dumazet's avatar
Eric Dumazet committed
626
	struct sock *sk = sock->sk;
Linus Torvalds's avatar
Linus Torvalds committed
627 628 629 630
	int val;
	int valbool;
	struct linger ling;
	int ret = 0;
631

Linus Torvalds's avatar
Linus Torvalds committed
632 633 634 635
	/*
	 *	Options without arguments
	 */

636
	if (optname == SO_BINDTODEVICE)
637
		return sock_setbindtodevice(sk, optval, optlen);
638

639 640
	if (optlen < sizeof(int))
		return -EINVAL;
641

Linus Torvalds's avatar
Linus Torvalds committed
642 643
	if (get_user(val, (int __user *)optval))
		return -EFAULT;
644

Eric Dumazet's avatar
Eric Dumazet committed
645
	valbool = val ? 1 : 0;
Linus Torvalds's avatar
Linus Torvalds committed
646 647 648

	lock_sock(sk);

Eric Dumazet's avatar
Eric Dumazet committed
649
	switch (optname) {
650
	case SO_DEBUG:
Eric Dumazet's avatar
Eric Dumazet committed
651
		if (val && !capable(CAP_NET_ADMIN))
652
			ret = -EACCES;
Eric Dumazet's avatar
Eric Dumazet committed
653
		else
654
			sock_valbool_flag(sk, SOCK_DBG, valbool);
655 656
		break;
	case SO_REUSEADDR:
657
		sk->sk_reuse = (valbool ? SK_CAN_REUSE : SK_NO_REUSE);
658
		break;
Tom Herbert's avatar
Tom Herbert committed
659 660 661
	case SO_REUSEPORT:
		sk->sk_reuseport = valbool;
		break;
662
	case SO_TYPE:
663
	case SO_PROTOCOL:
664
	case SO_DOMAIN:
665 666 667 668
	case SO_ERROR:
		ret = -ENOPROTOOPT;
		break;
	case SO_DONTROUTE:
669
		sock_valbool_flag(sk, SOCK_LOCALROUTE, valbool);
670 671 672 673 674 675
		break;
	case SO_BROADCAST:
		sock_valbool_flag(sk, SOCK_BROADCAST, valbool);
		break;
	case SO_SNDBUF:
		/* Don't error on this BSD doesn't and if you think
676 677 678 679 680
		 * about it this is right. Otherwise apps have to
		 * play 'guess the biggest size' games. RCVBUF/SNDBUF
		 * are treated in BSD as hints
		 */
		val = min_t(u32, val, sysctl_wmem_max);
681
set_sndbuf:
682
		sk->sk_userlocks |= SOCK_SNDBUF_LOCK;
683 684
		sk->sk_sndbuf = max_t(u32, val * 2, SOCK_MIN_SNDBUF);
		/* Wake up sending tasks if we upped the value. */
685 686
		sk->sk_write_space(sk);
		break;
Linus Torvalds's avatar
Linus Torvalds committed
687

688 689 690 691 692 693
	case SO_SNDBUFFORCE:
		if (!capable(CAP_NET_ADMIN)) {
			ret = -EPERM;
			break;
		}
		goto set_sndbuf;
694

695 696
	case SO_RCVBUF:
		/* Don't error on this BSD doesn't and if you think
697 698 699 700 701
		 * about it this is right. Otherwise apps have to
		 * play 'guess the biggest size' games. RCVBUF/SNDBUF
		 * are treated in BSD as hints
		 */
		val = min_t(u32, val, sysctl_rmem_max);
702
set_rcvbuf:
703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718
		sk->sk_userlocks |= SOCK_RCVBUF_LOCK;
		/*
		 * We double it on the way in to account for
		 * "struct sk_buff" etc. overhead.   Applications
		 * assume that the SO_RCVBUF setting they make will
		 * allow that much actual data to be received on that
		 * socket.
		 *
		 * Applications are unaware that "struct sk_buff" and
		 * other overheads allocate from the receive buffer
		 * during socket buffer allocation.
		 *
		 * And after considering the possible alternatives,
		 * returning the value we actually used in getsockopt
		 * is the most desirable behavior.
		 */
719
		sk->sk_rcvbuf = max_t(u32, val * 2, SOCK_MIN_RCVBUF);
720 721 722 723 724
		break;

	case SO_RCVBUFFORCE:
		if (!capable(CAP_NET_ADMIN)) {
			ret = -EPERM;
Linus Torvalds's avatar
Linus Torvalds committed
725
			break;
726 727
		}
		goto set_rcvbuf;
Linus Torvalds's avatar
Linus Torvalds committed
728

729
	case SO_KEEPALIVE:
Linus Torvalds's avatar
Linus Torvalds committed
730
#ifdef CONFIG_INET
731 732
		if (sk->sk_protocol == IPPROTO_TCP &&
		    sk->sk_type == SOCK_STREAM)
733
			tcp_set_keepalive(sk, valbool);
Linus Torvalds's avatar
Linus Torvalds committed
734
#endif
735 736 737 738 739 740 741 742 743 744 745 746
		sock_valbool_flag(sk, SOCK_KEEPOPEN, valbool);
		break;

	case SO_OOBINLINE:
		sock_valbool_flag(sk, SOCK_URGINLINE, valbool);
		break;

	case SO_NO_CHECK:
		sk->sk_no_check = valbool;
		break;

	case SO_PRIORITY:
747 748
		if ((val >= 0 && val <= 6) ||
		    ns_capable(sock_net(sk)->user_ns, CAP_NET_ADMIN))
749 750 751 752 753 754 755 756
			sk->sk_priority = val;
		else
			ret = -EPERM;
		break;

	case SO_LINGER:
		if (optlen < sizeof(ling)) {
			ret = -EINVAL;	/* 1003.1g */
Linus Torvalds's avatar
Linus Torvalds committed
757
			break;
758
		}
Eric Dumazet's avatar
Eric Dumazet committed
759
		if (copy_from_user(&ling, optval, sizeof(ling))) {
760
			ret = -EFAULT;
Linus Torvalds's avatar
Linus Torvalds committed
761
			break;
762 763 764 765
		}
		if (!ling.l_onoff)
			sock_reset_flag(sk, SOCK_LINGER);
		else {
Linus Torvalds's avatar
Linus Torvalds committed
766
#if (BITS_PER_LONG == 32)
767 768
			if ((unsigned int)ling.l_linger >= MAX_SCHEDULE_TIMEOUT/HZ)
				sk->sk_lingertime = MAX_SCHEDULE_TIMEOUT;
Linus Torvalds's avatar
Linus Torvalds committed
769
			else
770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787
#endif
				sk->sk_lingertime = (unsigned int)ling.l_linger * HZ;
			sock_set_flag(sk, SOCK_LINGER);
		}
		break;

	case SO_BSDCOMPAT:
		sock_warn_obsolete_bsdism("setsockopt");
		break;

	case SO_PASSCRED:
		if (valbool)
			set_bit(SOCK_PASSCRED, &sock->flags);
		else
			clear_bit(SOCK_PASSCRED, &sock->flags);
		break;

	case SO_TIMESTAMP:
788
	case SO_TIMESTAMPNS:
789
		if (valbool)  {
790 791 792 793
			if (optname == SO_TIMESTAMP)
				sock_reset_flag(sk, SOCK_RCVTSTAMPNS);
			else
				sock_set_flag(sk, SOCK_RCVTSTAMPNS);
794
			sock_set_flag(sk, SOCK_RCVTSTAMP);
795
			sock_enable_timestamp(sk, SOCK_TIMESTAMP);
796
		} else {
797
			sock_reset_flag(sk, SOCK_RCVTSTAMP);
798 799
			sock_reset_flag(sk, SOCK_RCVTSTAMPNS);
		}
800 801
		break;

802 803
	case SO_TIMESTAMPING:
		if (val & ~SOF_TIMESTAMPING_MASK) {
804
			ret = -EINVAL;
805 806 807 808 809 810 811 812 813 814 815 816 817
			break;
		}
		sock_valbool_flag(sk, SOCK_TIMESTAMPING_TX_HARDWARE,
				  val & SOF_TIMESTAMPING_TX_HARDWARE);
		sock_valbool_flag(sk, SOCK_TIMESTAMPING_TX_SOFTWARE,
				  val & SOF_TIMESTAMPING_TX_SOFTWARE);
		sock_valbool_flag(sk, SOCK_TIMESTAMPING_RX_HARDWARE,
				  val & SOF_TIMESTAMPING_RX_HARDWARE);
		if (val & SOF_TIMESTAMPING_RX_SOFTWARE)
			sock_enable_timestamp(sk,
					      SOCK_TIMESTAMPING_RX_SOFTWARE);
		else
			sock_disable_timestamp(sk,
818
					       (1UL << SOCK_TIMESTAMPING_RX_SOFTWARE));
819 820 821 822 823 824 825 826
		sock_valbool_flag(sk, SOCK_TIMESTAMPING_SOFTWARE,
				  val & SOF_TIMESTAMPING_SOFTWARE);
		sock_valbool_flag(sk, SOCK_TIMESTAMPING_SYS_HARDWARE,
				  val & SOF_TIMESTAMPING_SYS_HARDWARE);
		sock_valbool_flag(sk, SOCK_TIMESTAMPING_RAW_HARDWARE,
				  val & SOF_TIMESTAMPING_RAW_HARDWARE);
		break;

827 828 829 830 831 832 833 834 835 836 837 838 839
	case SO_RCVLOWAT:
		if (val < 0)
			val = INT_MAX;
		sk->sk_rcvlowat = val ? : 1;
		break;

	case SO_RCVTIMEO:
		ret = sock_set_timeout(&sk->sk_rcvtimeo, optval, optlen);
		break;

	case SO_SNDTIMEO:
		ret = sock_set_timeout(&sk->sk_sndtimeo, optval, optlen);
		break;
Linus Torvalds's avatar
Linus Torvalds committed
840

841 842 843 844
	case SO_ATTACH_FILTER:
		ret = -EINVAL;
		if (optlen == sizeof(struct sock_fprog)) {
			struct sock_fprog fprog;
Linus Torvalds's avatar
Linus Torvalds committed
845

846 847
			ret = -EFAULT;
			if (copy_from_user(&fprog, optval, sizeof(fprog)))
Linus Torvalds's avatar
Linus Torvalds committed
848
				break;
849 850 851 852 853 854

			ret = sk_attach_filter(&fprog, sk);
		}
		break;

	case SO_DETACH_FILTER:
855
		ret = sk_detach_filter(sk);
856
		break;
Linus Torvalds's avatar
Linus Torvalds committed
857

858 859 860 861 862 863 864
	case SO_LOCK_FILTER:
		if (sock_flag(sk, SOCK_FILTER_LOCKED) && !valbool)
			ret = -EPERM;
		else
			sock_valbool_flag(sk, SOCK_FILTER_LOCKED, valbool);
		break;

865 866 867 868 869 870
	case SO_PASSSEC:
		if (valbool)
			set_bit(SOCK_PASSSEC, &sock->flags);
		else
			clear_bit(SOCK_PASSSEC, &sock->flags);
		break;
871
	case SO_MARK:
872
		if (!ns_capable(sock_net(sk)->user_ns, CAP_NET_ADMIN))
873
			ret = -EPERM;
Eric Dumazet's avatar
Eric Dumazet committed
874
		else
875 876
			sk->sk_mark = val;
		break;
877

Linus Torvalds's avatar
Linus Torvalds committed
878 879
		/* We implement the SO_SNDLOWAT etc to
		   not be settable (1003.1g 5.3) */
880
	case SO_RXQ_OVFL:
881
		sock_valbool_flag(sk, SOCK_RXQ_OVFL, valbool);
882
		break;
883 884 885 886 887

	case SO_WIFI_STATUS:
		sock_valbool_flag(sk, SOCK_WIFI_STATUS, valbool);
		break;

888 889 890 891 892 893
	case SO_PEEK_OFF:
		if (sock->ops->set_peek_off)
			sock->ops->set_peek_off(sk, val);
		else
			ret = -EOPNOTSUPP;
		break;
894 895 896 897 898

	case SO_NOFCS:
		sock_valbool_flag(sk, SOCK_NOFCS, valbool);
		break;

899 900 901 902
	case SO_SELECT_ERR_QUEUE:
		sock_valbool_flag(sk, SOCK_SELECT_ERR_QUEUE, valbool);
		break;

903 904 905 906 907 908 909 910 911 912 913 914 915
#ifdef CONFIG_NET_LL_RX_POLL
	case SO_LL:
		/* allow unprivileged users to decrease the value */
		if ((val > sk->sk_ll_usec) && !capable(CAP_NET_ADMIN))
			ret = -EPERM;
		else {
			if (val < 0)
				ret = -EINVAL;
			else
				sk->sk_ll_usec = val;
		}
		break;
#endif
916 917 918
	default:
		ret = -ENOPROTOOPT;
		break;
919
	}
Linus Torvalds's avatar
Linus Torvalds committed
920 921 922
	release_sock(sk);
	return ret;
}
Eric Dumazet's avatar
Eric Dumazet committed
923
EXPORT_SYMBOL(sock_setsockopt);
Linus Torvalds's avatar
Linus Torvalds committed
924 925


926 927 928 929 930 931 932 933
void cred_to_ucred(struct pid *pid, const struct cred *cred,
		   struct ucred *ucred)
{
	ucred->pid = pid_vnr(pid);
	ucred->uid = ucred->gid = -1;
	if (cred) {
		struct user_namespace *current_ns = current_user_ns();

934 935
		ucred->uid = from_kuid_munged(current_ns, cred->euid);
		ucred->gid = from_kgid_munged(current_ns, cred->egid);
936 937
	}
}
938
EXPORT_SYMBOL_GPL(cred_to_ucred);
939

Linus Torvalds's avatar
Linus Torvalds committed
940 941 942 943
int sock_getsockopt(struct socket *sock, int level, int optname,
		    char __user *optval, int __user *optlen)
{
	struct sock *sk = sock->sk;
944

945
	union {
946 947
		int val;
		struct linger ling;
Linus Torvalds's avatar
Linus Torvalds committed
948 949
		struct timeval tm;
	} v;
950

951
	int lv = sizeof(int);
Linus Torvalds's avatar
Linus Torvalds committed
952
	int len;
953

954
	if (get_user(len, optlen))
955
		return -EFAULT;
956
	if (len < 0)
Linus Torvalds's avatar
Linus Torvalds committed
957
		return -EINVAL;
958

959
	memset(&v, 0, sizeof(v));
960

Eric Dumazet's avatar
Eric Dumazet committed
961
	switch (optname) {
962 963 964 965 966 967 968 969 970
	case SO_DEBUG:
		v.val = sock_flag(sk, SOCK_DBG);
		break;

	case SO_DONTROUTE:
		v.val = sock_flag(sk, SOCK_LOCALROUTE);
		break;

	case SO_BROADCAST:
Eric Dumazet's avatar
Eric Dumazet committed
971
		v.val = sock_flag(sk, SOCK_BROADCAST);
972 973 974 975 976 977 978 979 980 981 982 983 984 985
		break;

	case SO_SNDBUF:
		v.val = sk->sk_sndbuf;
		break;

	case SO_RCVBUF:
		v.val = sk->sk_rcvbuf;
		break;

	case SO_REUSEADDR:
		v.val = sk->sk_reuse;
		break;

Tom Herbert's avatar
Tom Herbert committed
986 987 988 989
	case SO_REUSEPORT:
		v.val = sk->sk_reuseport;
		break;

990
	case SO_KEEPALIVE:
Eric Dumazet's avatar
Eric Dumazet committed
991
		v.val = sock_flag(sk, SOCK_KEEPOPEN);
992 993 994 995 996 997
		break;

	case SO_TYPE:
		v.val = sk->sk_type;
		break;

998 999 1000 1001
	case SO_PROTOCOL:
		v.val = sk->sk_protocol;
		break;

1002 1003 1004 1005
	case SO_DOMAIN:
		v.val = sk->sk_family;
		break;

1006 1007
	case SO_ERROR:
		v.val = -sock_error(sk);
Eric Dumazet's avatar
Eric Dumazet committed
1008
		if (v.val == 0)
1009 1010 1011 1012
			v.val = xchg(&sk->sk_err_soft, 0);
		break;

	case SO_OOBINLINE:
Eric Dumazet's avatar
Eric Dumazet committed
1013
		v.val = sock_flag(sk, SOCK_URGINLINE);
1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025
		break;

	case SO_NO_CHECK:
		v.val = sk->sk_no_check;
		break;

	case SO_PRIORITY:
		v.val = sk->sk_priority;
		break;

	case SO_LINGER:
		lv		= sizeof(v.ling);
Eric Dumazet's avatar
Eric Dumazet committed
1026
		v.ling.l_onoff	= sock_flag(sk, SOCK_LINGER);
1027 1028 1029 1030 1031 1032 1033 1034
		v.ling.l_linger	= sk->sk_lingertime / HZ;
		break;

	case SO_BSDCOMPAT:
		sock_warn_obsolete_bsdism("getsockopt");
		break;

	case SO_TIMESTAMP:
1035 1036 1037 1038 1039 1040
		v.val = sock_flag(sk, SOCK_RCVTSTAMP) &&
				!sock_flag(sk, SOCK_RCVTSTAMPNS);
		break;

	case SO_TIMESTAMPNS:
		v.val = sock_flag(sk, SOCK_RCVTSTAMPNS);
1041 1042
		break;

1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060
	case SO_TIMESTAMPING:
		v.val = 0;
		if (sock_flag(sk, SOCK_TIMESTAMPING_TX_HARDWARE))
			v.val |= SOF_TIMESTAMPING_TX_HARDWARE;
		if (sock_flag(sk, SOCK_TIMESTAMPING_TX_SOFTWARE))
			v.val |= SOF_TIMESTAMPING_TX_SOFTWARE;
		if (sock_flag(sk, SOCK_TIMESTAMPING_RX_HARDWARE))
			v.val |= SOF_TIMESTAMPING_RX_HARDWARE;
		if (sock_flag(sk, SOCK_TIMESTAMPING_RX_SOFTWARE))
			v.val |= SOF_TIMESTAMPING_RX_SOFTWARE;
		if (sock_flag(sk, SOCK_TIMESTAMPING_SOFTWARE))
			v.val |= SOF_TIMESTAMPING_SOFTWARE;
		if (sock_flag(sk, SOCK_TIMESTAMPING_SYS_HARDWARE))
			v.val |= SOF_TIMESTAMPING_SYS_HARDWARE;
		if (sock_flag(sk, SOCK_TIMESTAMPING_RAW_HARDWARE))
			v.val |= SOF_TIMESTAMPING_RAW_HARDWARE;
		break;

1061
	case SO_RCVTIMEO:
Eric Dumazet's avatar
Eric Dumazet committed
1062
		lv = sizeof(struct timeval);
1063 1064 1065 1066 1067 1068 1069 1070 1071 1072
		if (sk->sk_rcvtimeo == MAX_SCHEDULE_TIMEOUT) {
			v.tm.tv_sec = 0;
			v.tm.tv_usec = 0;
		} else {
			v.tm.tv_sec = sk->sk_rcvtimeo / HZ;
			v.tm.tv_usec = ((sk->sk_rcvtimeo % HZ) * 1000000) / HZ;
		}
		break;

	case SO_SNDTIMEO:
Eric Dumazet's avatar
Eric Dumazet committed
1073
		lv = sizeof(struct timeval);
1074 1075 1076 1077 1078 1079 1080 1081
		if (sk->sk_sndtimeo == MAX_SCHEDULE_TIMEOUT) {
			v.tm.tv_sec = 0;
			v.tm.tv_usec = 0;
		} else {
			v.tm.tv_sec = sk->sk_sndtimeo / HZ;
			v.tm.tv_usec = ((sk->sk_sndtimeo % HZ) * 1000000) / HZ;
		}
		break;
Linus Torvalds's avatar
Linus Torvalds committed
1082

1083 1084 1085
	case SO_RCVLOWAT:
		v.val = sk->sk_rcvlowat;
		break;
Linus Torvalds's avatar
Linus Torvalds committed
1086

1087
	case SO_SNDLOWAT:
Eric Dumazet's avatar
Eric Dumazet committed
1088
		v.val = 1;
1089
		break;
Linus Torvalds's avatar
Linus Torvalds committed
1090

1091
	case SO_PASSCRED:
1092
		v.val = !!test_bit(SOCK_PASSCRED, &sock->flags);
1093
		break;
Linus Torvalds's avatar
Linus Torvalds committed
1094

1095
	case SO_PEERCRED:
1096 1097 1098 1099 1100 1101
	{
		struct ucred peercred;
		if (len > sizeof(peercred))
			len = sizeof(peercred);
		cred_to_ucred(sk->sk_peer_pid, sk->sk_peer_cred, &peercred);
		if (copy_to_user(optval, &peercred, len))
1102 1103
			return -EFAULT;
		goto lenout;
1104
	}
Linus Torvalds's avatar
Linus Torvalds committed
1105

1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117
	case SO_PEERNAME:
	{
		char address[128];

		if (sock->ops->getname(sock, (struct sockaddr *)address, &lv, 2))
			return -ENOTCONN;
		if (lv < len)
			return -EINVAL;
		if (copy_to_user(optval, address, len))
			return -EFAULT;
		goto lenout;
	}
Linus Torvalds's avatar
Linus Torvalds committed
1118

1119 1120 1121 1122 1123 1124
	/* Dubious BSD thing... Probably nobody even uses it, but
	 * the UNIX standard wants it for whatever reason... -DaveM
	 */
	case SO_ACCEPTCONN:
		v.val = sk->sk_state == TCP_LISTEN;
		break;
Linus Torvalds's avatar
Linus Torvalds committed
1125

1126
	case SO_PASSSEC:
1127
		v.val = !!test_bit(SOCK_PASSSEC, &sock->flags);
1128
		break;
1129

1130 1131
	case SO_PEERSEC:
		return security_socket_getpeersec_stream(sock, optval, optlen, len);
Linus Torvalds's avatar
Linus Torvalds committed
1132

1133 1134 1135 1136
	case SO_MARK:
		v.val = sk->sk_mark;
		break;

1137
	case SO_RXQ_OVFL:
Eric Dumazet's avatar
Eric Dumazet committed
1138
		v.val = sock_flag(sk, SOCK_RXQ_OVFL);
1139 1140
		break;

1141
	case SO_WIFI_STATUS:
Eric Dumazet's avatar
Eric Dumazet committed
1142
		v.val = sock_flag(sk, SOCK_WIFI_STATUS);
1143 1144
		break;

1145 1146 1147 1148 1149 1150
	case SO_PEEK_OFF:
		if (!sock->ops->set_peek_off)
			return -EOPNOTSUPP;

		v.val = sk->sk_peek_off;
		break;
1151
	case SO_NOFCS:
Eric Dumazet's avatar
Eric Dumazet committed
1152
		v.val = sock_flag(sk, SOCK_NOFCS);
1153
		break;
1154

1155
	case SO_BINDTODEVICE:
1156 1157
		return sock_getbindtodevice(sk, optval, optlen, len);

1158 1159 1160 1161 1162 1163
	case SO_GET_FILTER:
		len = sk_get_filter(sk, (struct sock_filter __user *)optval, len);
		if (len < 0)
			return len;

		goto lenout;
1164

1165 1166 1167 1168
	case SO_LOCK_FILTER:
		v.val = sock_flag(sk, SOCK_FILTER_LOCKED);
		break;

1169 1170 1171 1172
	case SO_SELECT_ERR_QUEUE:
		v.val = sock_flag(sk, SOCK_SELECT_ERR_QUEUE);
		break;

1173 1174 1175 1176 1177 1178
#ifdef CONFIG_NET_LL_RX_POLL
	case SO_LL:
		v.val = sk->sk_ll_usec;
		break;
#endif

1179 1180
	default:
		return -ENOPROTOOPT;
Linus Torvalds's avatar
Linus Torvalds committed
1181
	}
1182

Linus Torvalds's avatar
Linus Torvalds committed
1183 1184 1185 1186 1187
	if (len > lv)
		len = lv;
	if (copy_to_user(optval, &v, len))
		return -EFAULT;
lenout:
1188 1189 1190
	if (put_user(len, optlen))
		return -EFAULT;
	return 0;
Linus Torvalds's avatar
Linus Torvalds committed
1191 1192
}

1193 1194 1195 1196 1197
/*
 * Initialize an sk_lock.
 *
 * (We also register the sk_lock with the lock validator.)
 */
Dave Jones's avatar
Dave Jones committed
1198
static inline void sock_lock_init(struct sock *sk)
1199
{
1200 1201 1202 1203 1204
	sock_lock_init_class_and_name(sk,
			af_family_slock_key_strings[sk->sk_family],
			af_family_slock_keys + sk->sk_family,
			af_family_key_strings[sk->sk_family],
			af_family_keys + sk->sk_family);
1205 1206
}

Eric Dumazet's avatar
Eric Dumazet committed
1207 1208 1209
/*
 * Copy all fields from osk to nsk but nsk->sk_refcnt must not change yet,
 * even temporarly, because of RCU lookups. sk_node should also be left as is.
1210
 * We must not copy fields between sk_dontcopy_begin and sk_dontcopy_end
Eric Dumazet's avatar
Eric Dumazet committed
1211
 */
1212 1213 1214 1215 1216
static void sock_copy(struct sock *nsk, const struct sock *osk)
{
#ifdef CONFIG_SECURITY_NETWORK
	void *sptr = nsk->sk_security;
#endif
1217 1218 1219 1220 1221
	memcpy(nsk, osk, offsetof(struct sock, sk_dontcopy_begin));

	memcpy(&nsk->sk_dontcopy_end, &osk->sk_dontcopy_end,
	       osk->sk_prot->obj_size - offsetof(struct sock, sk_dontcopy_end));

1222 1223 1224 1225 1226 1227
#ifdef CONFIG_SECURITY_NETWORK
	nsk->sk_security = sptr;
	security_sk_clone(osk, nsk);
#endif
}

1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245
void sk_prot_clear_portaddr_nulls(struct sock *sk, int size)
{
	unsigned long nulls1, nulls2;

	nulls1 = offsetof(struct sock, __sk_common.skc_node.next);
	nulls2 = offsetof(struct sock, __sk_common.skc_portaddr_node.next);
	if (nulls1 > nulls2)
		swap(nulls1, nulls2);

	if (nulls1 != 0)
		memset((char *)sk, 0, nulls1);
	memset((char *)sk + nulls1 + sizeof(void *), 0,
	       nulls2 - nulls1 - sizeof(void *));
	memset((char *)sk + nulls2 + sizeof(void *), 0,
	       size - nulls2 - sizeof(void *));
}
EXPORT_SYMBOL(sk_prot_clear_portaddr_nulls);

1246 1247
static struct sock *sk_prot_alloc(struct proto *prot, gfp_t priority,
		int family)
1248 1249 1250 1251 1252
{
	struct sock *sk;
	struct kmem_cache *slab;

	slab = prot->slab;
1253 1254 1255 1256 1257
	if (slab != NULL) {
		sk = kmem_cache_alloc(slab, priority & ~__GFP_ZERO);
		if (!sk)
			return sk;
		if (priority & __GFP_ZERO) {
1258 1259 1260 1261
			if (prot->clear_sk)
				prot->clear_sk(sk, prot->obj_size);
			else
				sk_prot_clear_nulls(sk, prot->obj_size);
1262
		}
1263
	} else
1264 1265
		sk = kmalloc(prot->obj_size, priority);

1266
	if (sk != NULL) {
1267 1268
		kmemcheck_annotate_bitfield(sk, flags);

1269 1270 1271 1272 1273
		if (security_sk_alloc(sk, family, priority))
			goto out_free;

		if (!try_module_get(prot->owner))
			goto out_free_sec;
1274
		sk_tx_queue_clear(sk);
1275 1276
	}

1277
	return sk;
1278 1279 1280 1281 1282 1283 1284 1285 1286

out_free_sec:
	security_sk_free(sk);
out_free:
	if (slab != NULL)
		kmem_cache_free(slab, sk);
	else
		kfree(sk);
	return NULL;
1287 1288 1289 1290 1291
}

static void sk_prot_free(struct proto *prot, struct sock *sk)
{
	struct kmem_cache *slab;
1292
	struct module *owner;
1293

1294
	owner = prot->owner;
1295
	slab = prot->slab;
1296 1297

	security_sk_free(sk);
1298 1299 1300 1301
	if (slab != NULL)
		kmem_cache_free(slab, sk);
	else
		kfree(sk);
1302
	module_put(owner);
1303 1304
}

1305
#if IS_ENABLED(CONFIG_NET_CLS_CGROUP)
1306
void sock_update_classid(struct sock *sk)
1307
{
1308
	u32 classid;
1309

1310
	classid = task_cls_classid(current);
1311
	if (classid != sk->sk_classid)
1312 1313
		sk->sk_classid = classid;
}
1314
EXPORT_SYMBOL(sock_update_classid);
1315
#endif
1316

1317
#if IS_ENABLED(CONFIG_NETPRIO_CGROUP)
1318
void sock_update_netprioidx(struct sock *sk)
1319 1320 1321
{
	if (in_interrupt())
		return;
1322

1323
	sk->sk_cgrp_prioidx = task_netprioidx(current);
1324 1325
}
EXPORT_SYMBOL_GPL(sock_update_netprioidx);
1326 1327
#endif

Linus Torvalds's avatar
Linus Torvalds committed
1328 1329
/**
 *	sk_alloc - All socket objects are allocated here
1330
 *	@net: the applicable net namespace
1331 1332 1333
 *	@family: protocol family
 *	@priority: for allocation (%GFP_KERNEL, %GFP_ATOMIC, etc)
 *	@prot: struct proto associated with this new sock instance
Linus Torvalds's avatar
Linus Torvalds committed
1334
 */
1335
struct sock *sk_alloc(struct net *net, int family, gfp_t priority,
1336
		      struct proto *prot)
Linus Torvalds's avatar
Linus Torvalds committed
1337
{
1338
	struct sock *sk;
Linus Torvalds's avatar
Linus Torvalds committed
1339

1340
	sk = sk_prot_alloc(prot, priority | __GFP_ZERO, family);
Linus Torvalds's avatar
Linus Torvalds committed
1341
	if (sk) {
1342 1343 1344 1345 1346 1347 1348
		sk->sk_family = family;
		/*
		 * See comment in struct sock definition to understand
		 * why we need sk_prot_creator -acme
		 */
		sk->sk_prot = sk->sk_prot_creator = prot;
		sock_lock_init(sk);
1349
		sock_net_set(sk, get_net(net));
1350
		atomic_set(&sk->sk_wmem_alloc, 1);
1351

1352
		sock_update_classid(sk);
1353
		sock_update_netprioidx(sk);
Linus Torvalds's avatar
Linus Torvalds committed
1354
	}
1355

1356
	return sk;
Linus Torvalds's avatar
Linus Torvalds committed
1357
}
Eric Dumazet's avatar
Eric Dumazet committed
1358
EXPORT_SYMBOL(sk_alloc);
Linus Torvalds's avatar
Linus Torvalds committed
1359

1360
static void __sk_free(struct sock *sk)
Linus Torvalds's avatar
Linus Torvalds committed
1361 1362 1363 1364 1365 1366
{
	struct sk_filter *filter;

	if (sk->sk_destruct)
		sk->sk_destruct(sk);

1367 1368
	filter = rcu_dereference_check(sk->sk_filter,
				       atomic_read(&sk->sk_wmem_alloc) == 0);
Linus Torvalds's avatar
Linus Torvalds committed
1369
	if (filter) {
1370
		sk_filter_uncharge(sk, filter);
1371
		RCU_INIT_POINTER(sk->sk_filter, NULL);
Linus Torvalds's avatar
Linus Torvalds committed
1372 1373
	}

1374
	sock_disable_timestamp(sk, SK_FLAGS_TIMESTAMP);
Linus Torvalds's avatar
Linus Torvalds committed
1375 1376

	if (atomic_read(&sk->sk_omem_alloc))
Joe Perches's avatar
Joe Perches committed
1377 1378
		pr_debug("%s: optmem leakage (%d bytes) detected\n",
			 __func__, atomic_read(&sk->sk_omem_alloc));
Linus Torvalds's avatar
Linus Torvalds committed
1379

1380 1381 1382
	if (sk->sk_peer_cred)
		put_cred(sk->sk_peer_cred);
	put_pid(sk->sk_peer_pid);
1383
	put_net(sock_net(sk));
1384
	sk_prot_free(sk->sk_prot_creator, sk);
Linus Torvalds's avatar
Linus Torvalds committed
1385
}
1386 1387 1388 1389

void sk_free(struct sock *sk)
{
	/*
Lucas De Marchi's avatar
Lucas De Marchi committed
1390
	 * We subtract one from sk_wmem_alloc and can know if
1391 1392 1393 1394 1395 1396
	 * some packets are still in some tx queue.
	 * If not null, sock_wfree() will call __sk_free(sk) later
	 */
	if (atomic_dec_and_test(&sk->sk_wmem_alloc))
		__sk_free(sk);
}
Eric Dumazet's avatar
Eric Dumazet committed
1397
EXPORT_SYMBOL(sk_free);
Linus Torvalds's avatar
Linus Torvalds committed
1398

1399
/*
Lucas De Marchi's avatar
Lucas De Marchi committed
1400 1401
 * Last sock_put should drop reference to sk->sk_net. It has already
 * been dropped in sk_change_net. Taking reference to stopping namespace
1402
 * is not an option.
Lucas De Marchi's avatar
Lucas De Marchi committed
1403
 * Take reference to a socket to remove it from hash _alive_ and after that
1404 1405 1406 1407 1408 1409 1410 1411 1412
 * destroy it in the context of init_net.
 */
void sk_release_kernel(struct sock *sk)
{
	if (sk == NULL || sk->sk_socket == NULL)
		return;

	sock_hold(sk);
	sock_release(sk->sk_socket);
1413
	release_net(sock_net(sk));
1414
	sock_net_set(sk, get_net(&init_net));
1415 1416
	sock_put(sk);
}
1417
EXPORT_SYMBOL(sk_release_kernel);
1418

1419 1420 1421 1422 1423 1424
static void sk_update_clone(const struct sock *sk, struct sock *newsk)
{
	if (mem_cgroup_sockets_enabled && sk->sk_cgrp)
		sock_update_memcg(newsk);
}

1425 1426 1427 1428 1429 1430 1431 1432
/**
 *	sk_clone_lock - clone a socket, and lock its clone
 *	@sk: the socket to clone
 *	@priority: for allocation (%GFP_KERNEL, %GFP_ATOMIC, etc)
 *
 *	Caller must unlock socket even in error path (bh_unlock_sock(newsk))
 */
struct sock *sk_clone_lock(const struct sock *sk, const gfp_t priority)
1433
{
1434
	struct sock *newsk;
1435

1436
	newsk = sk_prot_alloc(sk->sk_prot, priority, sk->sk_family);
1437 1438 1439
	if (newsk != NULL) {
		struct sk_filter *filter;

1440
		sock_copy(newsk, sk);
1441 1442

		/* SANITY */
1443
		get_net(sock_net(newsk));
1444 1445 1446
		sk_node_init(&newsk->sk_node);
		sock_lock_init(newsk);
		bh_lock_sock(newsk);
1447
		newsk->sk_backlog.head	= newsk->sk_backlog.tail = NULL;
Zhu Yi's avatar
Zhu Yi committed
1448
		newsk->sk_backlog.len = 0;
1449 1450

		atomic_set(&newsk->sk_rmem_alloc, 0);
1451 1452 1453 1454
		/*
		 * sk_wmem_alloc set to one (see sk_free() and sock_wfree())
		 */
		atomic_set(&newsk->sk_wmem_alloc, 1);
1455 1456 1457
		atomic_set(&newsk->sk_omem_alloc, 0);
		skb_queue_head_init(&newsk->sk_receive_queue);
		skb_queue_head_init(&newsk->sk_write_queue);
1458 1459 1460
#ifdef CONFIG_NET_DMA
		skb_queue_head_init(&newsk->sk_async_wait_queue);
#endif
1461

Eric Dumazet's avatar
Eric Dumazet committed
1462
		spin_lock_init(&newsk->sk_dst_lock);
1463
		rwlock_init(&newsk->sk_callback_lock);
1464 1465 1466
		lockdep_set_class_and_name(&newsk->sk_callback_lock,
				af_callback_keys + newsk->sk_family,
				af_family_clock_key_strings[newsk->sk_family]);
1467 1468 1469 1470 1471 1472 1473 1474 1475 1476

		newsk->sk_dst_cache	= NULL;
		newsk->sk_wmem_queued	= 0;
		newsk->sk_forward_alloc = 0;
		newsk->sk_send_head	= NULL;
		newsk->sk_userlocks	= sk->sk_userlocks & ~SOCK_BINDPORT_LOCK;

		sock_reset_flag(newsk, SOCK_DONE);
		skb_queue_head_init(&newsk->sk_error_queue);

1477
		filter = rcu_dereference_protected(newsk->sk_filter, 1);
1478 1479 1480 1481 1482 1483 1484
		if (filter != NULL)
			sk_filter_charge(newsk, filter);

		if (unlikely(xfrm_sk_clone_policy(newsk))) {
			/* It is still raw copy of parent, so invalidate
			 * destructor and make plain sk_free() */
			newsk->sk_destruct = NULL;
1485
			bh_unlock_sock(newsk);
1486 1487 1488 1489 1490 1491 1492
			sk_free(newsk);
			newsk = NULL;
			goto out;
		}

		newsk->sk_err	   = 0;
		newsk->sk_priority = 0;
Eric Dumazet's avatar
Eric Dumazet committed
1493 1494 1495 1496 1497
		/*
		 * Before updating sk_refcnt, we must commit prior changes to memory
		 * (Documentation/RCU/rculist_nulls.txt for details)
		 */
		smp_wmb();
1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1508 1509 1510 1511
		atomic_set(&newsk->sk_refcnt, 2);

		/*
		 * Increment the counter in the same struct proto as the master
		 * sock (sk_refcnt_debug_inc uses newsk->sk_prot->socks, that
		 * is the same as sk->sk_prot->socks, as this field was copied
		 * with memcpy).
		 *
		 * This _changes_ the previous behaviour, where
		 * tcp_create_openreq_child always was incrementing the
		 * equivalent to tcp_prot->socks (inet_sock_nr), so this have
		 * to be taken into account in all callers. -acme
		 */
		sk_refcnt_debug_inc(newsk);
1512
		sk_set_socket(newsk, NULL);
1513
		newsk->sk_wq = NULL;
1514

1515 1516
		sk_update_clone(sk, newsk);

1517
		if (newsk->sk_prot->sockets_allocated)
1518
			sk_sockets_allocated_inc(newsk);
1519

1520
		if (newsk->sk_flags & SK_FLAGS_TIMESTAMP)
1521
			net_enable_timestamp();
1522 1523 1524 1525
	}
out:
	return newsk;
}
1526
EXPORT_SYMBOL_GPL(sk_clone_lock);
1527

1528 1529 1530 1531 1532
void sk_setup_caps(struct sock *sk, struct dst_entry *dst)
{
	__sk_dst_set(sk, dst);
	sk->sk_route_caps = dst->dev->features;
	if (sk->sk_route_caps & NETIF_F_GSO)
1533
		sk->sk_route_caps |= NETIF_F_GSO_SOFTWARE;
Eric Dumazet's avatar
Eric Dumazet committed
1534
	sk->sk_route_caps &= ~sk->sk_route_nocaps;
1535
	if (sk_can_gso(sk)) {
1536
		if (dst->header_len) {
1537
			sk->sk_route_caps &= ~NETIF_F_GSO_MASK;
1538
		} else {
1539
			sk->sk_route_caps |= NETIF_F_SG | NETIF_F_HW_CSUM;
1540
			sk->sk_gso_max_size = dst->dev->gso_max_size;
1541
			sk->sk_gso_max_segs = dst->dev->gso_max_segs;
1542
		}
1543 1544 1545 1546
	}
}
EXPORT_SYMBOL_GPL(sk_setup_caps);

Linus Torvalds's avatar
Linus Torvalds committed
1547 1548 1549 1550 1551
/*
 *	Simple resource managers for sockets.
 */


1552 1553
/*
 * Write buffer destructor automatically called from kfree_skb.
Linus Torvalds's avatar
Linus Torvalds committed
1554 1555 1556 1557
 */
void sock_wfree(struct sk_buff *skb)
{
	struct sock *sk = skb->sk;
Eric Dumazet's avatar
Eric Dumazet committed
1558
	unsigned int len = skb->truesize;
Linus Torvalds's avatar
Linus Torvalds committed
1559

Eric Dumazet's avatar
Eric Dumazet committed
1560 1561 1562 1563 1564 1565
	if (!sock_flag(sk, SOCK_USE_WRITE_QUEUE)) {
		/*
		 * Keep a reference on sk_wmem_alloc, this will be released
		 * after sk_write_space() call
		 */
		atomic_sub(len - 1, &sk->sk_wmem_alloc);
Linus Torvalds's avatar
Linus Torvalds committed
1566
		sk->sk_write_space(sk);
Eric Dumazet's avatar
Eric Dumazet committed
1567 1568
		len = 1;
	}
1569
	/*
Eric Dumazet's avatar
Eric Dumazet committed
1570 1571
	 * if sk_wmem_alloc reaches 0, we must finish what sk_free()
	 * could not do because of in-flight packets
1572
	 */
Eric Dumazet's avatar
Eric Dumazet committed
1573
	if (atomic_sub_and_test(len, &sk->sk_wmem_alloc))
1574
		__sk_free(sk);
Linus Torvalds's avatar
Linus Torvalds committed
1575
}
Eric Dumazet's avatar
Eric Dumazet committed
1576
EXPORT_SYMBOL(sock_wfree);
Linus Torvalds's avatar
Linus Torvalds committed
1577

1578 1579
/*
 * Read buffer destructor automatically called from kfree_skb.
Linus Torvalds's avatar
Linus Torvalds committed
1580 1581 1582 1583
 */
void sock_rfree(struct sk_buff *skb)
{
	struct sock *sk = skb->sk;
Eric Dumazet's avatar
Eric Dumazet committed
1584
	unsigned int len = skb->truesize;
Linus Torvalds's avatar
Linus Torvalds committed
1585

Eric Dumazet's avatar
Eric Dumazet committed
1586 1587
	atomic_sub(len, &sk->sk_rmem_alloc);
	sk_mem_uncharge(sk, len);
Linus Torvalds's avatar
Linus Torvalds committed
1588
}
Eric Dumazet's avatar
Eric Dumazet committed
1589
EXPORT_SYMBOL(sock_rfree);
Linus Torvalds's avatar
Linus Torvalds committed
1590

1591 1592
void sock_edemux(struct sk_buff *skb)
{
1593 1594
	struct sock *sk = skb->sk;

1595
#ifdef CONFIG_INET
1596 1597 1598
	if (sk->sk_state == TCP_TIME_WAIT)
		inet_twsk_put(inet_twsk(sk));
	else
1599
#endif
1600
		sock_put(sk);
1601 1602
}
EXPORT_SYMBOL(sock_edemux);
Linus Torvalds's avatar
Linus Torvalds committed
1603

1604
kuid_t sock_i_uid(struct sock *sk)
Linus Torvalds's avatar
Linus Torvalds committed
1605
{
1606
	kuid_t uid;
Linus Torvalds's avatar
Linus Torvalds committed
1607

Eric Dumazet's avatar
Eric Dumazet committed
1608
	read_lock_bh(&sk->sk_callback_lock);
1609
	uid = sk->sk_socket ? SOCK_INODE(sk->sk_socket)->i_uid : GLOBAL_ROOT_UID;
Eric Dumazet's avatar
Eric Dumazet committed
1610
	read_unlock_bh(&sk->sk_callback_lock);
Linus Torvalds's avatar
Linus Torvalds committed
1611 1612
	return uid;
}
Eric Dumazet's avatar
Eric Dumazet committed
1613
EXPORT_SYMBOL(sock_i_uid);
Linus Torvalds's avatar
Linus Torvalds committed
1614 1615 1616 1617 1618

unsigned long sock_i_ino(struct sock *sk)
{
	unsigned long ino;

Eric Dumazet's avatar
Eric Dumazet committed
1619
	read_lock_bh(&sk->sk_callback_lock);
Linus Torvalds's avatar
Linus Torvalds committed
1620
	ino = sk->sk_socket ? SOCK_INODE(sk->sk_socket)->i_ino : 0;
Eric Dumazet's avatar
Eric Dumazet committed
1621
	read_unlock_bh(&sk->sk_callback_lock);
Linus Torvalds's avatar
Linus Torvalds committed
1622 1623
	return ino;
}
Eric Dumazet's avatar
Eric Dumazet committed
1624
EXPORT_SYMBOL(sock_i_ino);
Linus Torvalds's avatar
Linus Torvalds committed
1625 1626 1627 1628

/*
 * Allocate a skb from the socket's send buffer.
 */
Victor Fusco's avatar
Victor Fusco committed
1629
struct sk_buff *sock_wmalloc(struct sock *sk, unsigned long size, int force,
1630
			     gfp_t priority)
Linus Torvalds's avatar
Linus Torvalds committed
1631 1632
{
	if (force || atomic_read(&sk->sk_wmem_alloc) < sk->sk_sndbuf) {
Eric Dumazet's avatar
Eric Dumazet committed
1633
		struct sk_buff *skb = alloc_skb(size, priority);
Linus Torvalds's avatar
Linus Torvalds committed
1634 1635 1636 1637 1638 1639 1640
		if (skb) {
			skb_set_owner_w(skb, sk);
			return skb;
		}
	}
	return NULL;
}
Eric Dumazet's avatar
Eric Dumazet committed
1641
EXPORT_SYMBOL(sock_wmalloc);
Linus Torvalds's avatar
Linus Torvalds committed
1642 1643 1644

/*
 * Allocate a skb from the socket's receive buffer.
1645
 */
Victor Fusco's avatar
Victor Fusco committed
1646
struct sk_buff *sock_rmalloc(struct sock *sk, unsigned long size, int force,
1647
			     gfp_t priority)
Linus Torvalds's avatar
Linus Torvalds committed
1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658
{
	if (force || atomic_read(&sk->sk_rmem_alloc) < sk->sk_rcvbuf) {
		struct sk_buff *skb = alloc_skb(size, priority);
		if (skb) {
			skb_set_owner_r(skb, sk);
			return skb;
		}
	}
	return NULL;
}

1659
/*
Linus Torvalds's avatar
Linus Torvalds committed
1660
 * Allocate a memory block from the socket's option memory buffer.
1661
 */
1662
void *sock_kmalloc(struct sock *sk, int size, gfp_t priority)
Linus Torvalds's avatar
Linus Torvalds committed
1663
{
1664
	if ((unsigned int)size <= sysctl_optmem_max &&
Linus Torvalds's avatar
Linus Torvalds committed
1665 1666 1667
	    atomic_read(&sk->sk_omem_alloc) + size < sysctl_optmem_max) {
		void *mem;
		/* First do the add, to avoid the race if kmalloc
1668
		 * might sleep.
Linus Torvalds's avatar
Linus Torvalds committed
1669 1670 1671 1672 1673 1674 1675 1676 1677
		 */
		atomic_add(size, &sk->sk_omem_alloc);
		mem = kmalloc(size, priority);
		if (mem)
			return mem;
		atomic_sub(size, &sk->sk_omem_alloc);
	}
	return NULL;
}
Eric Dumazet's avatar
Eric Dumazet committed
1678
EXPORT_SYMBOL(sock_kmalloc);
Linus Torvalds's avatar
Linus Torvalds committed
1679 1680 1681 1682 1683 1684 1685 1686 1687

/*
 * Free an option memory block.
 */
void sock_kfree_s(struct sock *sk, void *mem, int size)
{
	kfree(mem);
	atomic_sub(size, &sk->sk_omem_alloc);
}
Eric Dumazet's avatar
Eric Dumazet committed
1688
EXPORT_SYMBOL(sock_kfree_s);
Linus Torvalds's avatar
Linus Torvalds committed
1689 1690 1691 1692

/* It is almost wait_for_tcp_memory minus release_sock/lock_sock.
   I think, these locks should be removed for datagram sockets.
 */
Eric Dumazet's avatar
Eric Dumazet committed
1693
static long sock_wait_for_wmem(struct sock *sk, long timeo)
Linus Torvalds's avatar
Linus Torvalds committed
1694 1695 1696 1697 1698 1699 1700 1701 1702 1703
{
	DEFINE_WAIT(wait);

	clear_bit(SOCK_ASYNC_NOSPACE, &sk->sk_socket->flags);
	for (;;) {
		if (!timeo)
			break;
		if (signal_pending(current))
			break;
		set_bit(SOCK_NOSPACE, &sk->sk_socket->flags);
Eric Dumazet's avatar
Eric Dumazet committed
1704
		prepare_to_wait(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE);
Linus Torvalds's avatar
Linus Torvalds committed
1705 1706 1707 1708 1709 1710 1711 1712
		if (atomic_read(&sk->sk_wmem_alloc) < sk->sk_sndbuf)
			break;
		if (sk->sk_shutdown & SEND_SHUTDOWN)
			break;
		if (sk->sk_err)
			break;
		timeo = schedule_timeout(timeo);
	}
Eric Dumazet's avatar
Eric Dumazet committed
1713
	finish_wait(sk_sleep(sk), &wait);
Linus Torvalds's avatar
Linus Torvalds committed
1714 1715 1716 1717 1718 1719 1720 1721
	return timeo;
}


/*
 *	Generic send/receive buffer handlers
 */

1722 1723 1724
struct sk_buff *sock_alloc_send_pskb(struct sock *sk, unsigned long header_len,
				     unsigned long data_len, int noblock,
				     int *errcode)
Linus Torvalds's avatar
Linus Torvalds committed
1725 1726
{
	struct sk_buff *skb;
Al Viro's avatar
Al Viro committed
1727
	gfp_t gfp_mask;
Linus Torvalds's avatar
Linus Torvalds committed
1728 1729
	long timeo;
	int err;
1730 1731 1732 1733 1734
	int npages = (data_len + (PAGE_SIZE - 1)) >> PAGE_SHIFT;

	err = -EMSGSIZE;
	if (npages > MAX_SKB_FRAGS)
		goto failure;
Linus Torvalds's avatar
Linus Torvalds committed
1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750

	gfp_mask = sk->sk_allocation;
	if (gfp_mask & __GFP_WAIT)
		gfp_mask |= __GFP_REPEAT;

	timeo = sock_sndtimeo(sk, noblock);
	while (1) {
		err = sock_error(sk);
		if (err != 0)
			goto failure;

		err = -EPIPE;
		if (sk->sk_shutdown & SEND_SHUTDOWN)
			goto failure;

		if (atomic_read(&sk->sk_wmem_alloc) < sk->sk_sndbuf) {
1751
			skb = alloc_skb(header_len, gfp_mask);
Linus Torvalds's avatar
Linus Torvalds committed
1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771
			if (skb) {
				int i;

				/* No pages, we're done... */
				if (!data_len)
					break;

				skb->truesize += data_len;
				skb_shinfo(skb)->nr_frags = npages;
				for (i = 0; i < npages; i++) {
					struct page *page;

					page = alloc_pages(sk->sk_allocation, 0);
					if (!page) {
						err = -ENOBUFS;
						skb_shinfo(skb)->nr_frags = i;
						kfree_skb(skb);
						goto failure;
					}

1772 1773 1774 1775 1776
					__skb_fill_page_desc(skb, i,
							page, 0,
							(data_len >= PAGE_SIZE ?
							 PAGE_SIZE :
							 data_len));
Linus Torvalds's avatar
Linus Torvalds committed
1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804
					data_len -= PAGE_SIZE;
				}

				/* Full success... */
				break;
			}
			err = -ENOBUFS;
			goto failure;
		}
		set_bit(SOCK_ASYNC_NOSPACE, &sk->sk_socket->flags);
		set_bit(SOCK_NOSPACE, &sk->sk_socket->flags);
		err = -EAGAIN;
		if (!timeo)
			goto failure;
		if (signal_pending(current))
			goto interrupted;
		timeo = sock_wait_for_wmem(sk, timeo);
	}

	skb_set_owner_w(skb, sk);
	return skb;

interrupted:
	err = sock_intr_errno(timeo);
failure:
	*errcode = err;
	return NULL;
}
1805
EXPORT_SYMBOL(sock_alloc_send_pskb);
Linus Torvalds's avatar
Linus Torvalds committed
1806

1807
struct sk_buff *sock_alloc_send_skb(struct sock *sk, unsigned long size,
Linus Torvalds's avatar
Linus Torvalds committed
1808 1809 1810 1811
				    int noblock, int *errcode)
{
	return sock_alloc_send_pskb(sk, size, 0, noblock, errcode);
}
Eric Dumazet's avatar
Eric Dumazet committed
1812
EXPORT_SYMBOL(sock_alloc_send_skb);
Linus Torvalds's avatar
Linus Torvalds committed
1813

1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852
/* On 32bit arches, an skb frag is limited to 2^15 */
#define SKB_FRAG_PAGE_ORDER	get_order(32768)

bool sk_page_frag_refill(struct sock *sk, struct page_frag *pfrag)
{
	int order;

	if (pfrag->page) {
		if (atomic_read(&pfrag->page->_count) == 1) {
			pfrag->offset = 0;
			return true;
		}
		if (pfrag->offset < pfrag->size)
			return true;
		put_page(pfrag->page);
	}

	/* We restrict high order allocations to users that can afford to wait */
	order = (sk->sk_allocation & __GFP_WAIT) ? SKB_FRAG_PAGE_ORDER : 0;

	do {
		gfp_t gfp = sk->sk_allocation;

		if (order)
			gfp |= __GFP_COMP | __GFP_NOWARN;
		pfrag->page = alloc_pages(gfp, order);
		if (likely(pfrag->page)) {
			pfrag->offset = 0;
			pfrag->size = PAGE_SIZE << order;
			return true;
		}
	} while (--order >= 0);

	sk_enter_memory_pressure(sk);
	sk_stream_moderate_sndbuf(sk);
	return false;
}
EXPORT_SYMBOL(sk_page_frag_refill);

Linus Torvalds's avatar
Linus Torvalds committed
1853
static void __lock_sock(struct sock *sk)
1854 1855
	__releases(&sk->sk_lock.slock)
	__acquires(&sk->sk_lock.slock)
Linus Torvalds's avatar
Linus Torvalds committed
1856 1857 1858
{
	DEFINE_WAIT(wait);

1859
	for (;;) {
Linus Torvalds's avatar
Linus Torvalds committed
1860 1861 1862 1863 1864
		prepare_to_wait_exclusive(&sk->sk_lock.wq, &wait,
					TASK_UNINTERRUPTIBLE);
		spin_unlock_bh(&sk->sk_lock.slock);
		schedule();
		spin_lock_bh(&sk->sk_lock.slock);
1865
		if (!sock_owned_by_user(sk))
Linus Torvalds's avatar
Linus Torvalds committed
1866 1867 1868 1869 1870 1871
			break;
	}
	finish_wait(&sk->sk_lock.wq, &wait);
}

static void __release_sock(struct sock *sk)
1872 1873
	__releases(&sk->sk_lock.slock)
	__acquires(&sk->sk_lock.slock)
Linus Torvalds's avatar
Linus Torvalds committed
1874 1875 1876 1877 1878 1879 1880 1881 1882 1883
{
	struct sk_buff *skb = sk->sk_backlog.head;

	do {
		sk->sk_backlog.head = sk->sk_backlog.tail = NULL;
		bh_unlock_sock(sk);

		do {
			struct sk_buff *next = skb->next;

1884
			prefetch(next);
Eric Dumazet's avatar
Eric Dumazet committed
1885
			WARN_ON_ONCE(skb_dst_is_noref(skb));
Linus Torvalds's avatar
Linus Torvalds committed
1886
			skb->next = NULL;
1887
			sk_backlog_rcv(sk, skb);
Linus Torvalds's avatar
Linus Torvalds committed
1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900

			/*
			 * We are in process context here with softirqs
			 * disabled, use cond_resched_softirq() to preempt.
			 * This is safe to do because we've taken the backlog
			 * queue private:
			 */
			cond_resched_softirq();

			skb = next;
		} while (skb != NULL);

		bh_lock_sock(sk);
1901
	} while ((skb = sk->sk_backlog.head) != NULL);
Zhu Yi's avatar
Zhu Yi committed
1902 1903 1904 1905 1906 1907

	/*
	 * Doing the zeroing here guarantee we can not loop forever
	 * while a wild producer attempts to flood us.
	 */
	sk->sk_backlog.len = 0;
Linus Torvalds's avatar
Linus Torvalds committed
1908 1909 1910 1911
}

/**
 * sk_wait_data - wait for data to arrive at sk_receive_queue
1912 1913
 * @sk:    sock to wait on
 * @timeo: for how long
Linus Torvalds's avatar
Linus Torvalds committed
1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924
 *
 * Now socket state including sk->sk_err is changed only under lock,
 * hence we may omit checks after joining wait queue.
 * We check receive queue before schedule() only as optimization;
 * it is very likely that release_sock() added new data.
 */
int sk_wait_data(struct sock *sk, long *timeo)
{
	int rc;
	DEFINE_WAIT(wait);

Eric Dumazet's avatar
Eric Dumazet committed
1925
	prepare_to_wait(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE);
Linus Torvalds's avatar
Linus Torvalds committed
1926 1927 1928
	set_bit(SOCK_ASYNC_WAITDATA, &sk->sk_socket->flags);
	rc = sk_wait_event(sk, timeo, !skb_queue_empty(&sk->sk_receive_queue));
	clear_bit(SOCK_ASYNC_WAITDATA, &sk->sk_socket->flags);
Eric Dumazet's avatar
Eric Dumazet committed
1929
	finish_wait(sk_sleep(sk), &wait);
Linus Torvalds's avatar
Linus Torvalds committed
1930 1931 1932 1933
	return rc;
}
EXPORT_SYMBOL(sk_wait_data);

1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947
/**
 *	__sk_mem_schedule - increase sk_forward_alloc and memory_allocated
 *	@sk: socket
 *	@size: memory size to allocate
 *	@kind: allocation type
 *
 *	If kind is SK_MEM_SEND, it means wmem allocation. Otherwise it means
 *	rmem allocation. This function assumes that protocols which have
 *	memory_pressure use sk_wmem_queued as write buffer accounting.
 */
int __sk_mem_schedule(struct sock *sk, int size, int kind)
{
	struct proto *prot = sk->sk_prot;
	int amt = sk_mem_pages(size);
Eric Dumazet's avatar
Eric Dumazet committed
1948
	long allocated;
Glauber Costa's avatar
Glauber Costa committed
1949
	int parent_status = UNDER_LIMIT;
1950 1951

	sk->sk_forward_alloc += amt * SK_MEM_QUANTUM;
1952

Glauber Costa's avatar
Glauber Costa committed
1953
	allocated = sk_memory_allocated_add(sk, amt, &parent_status);
1954 1955

	/* Under limit. */
Glauber Costa's avatar
Glauber Costa committed
1956 1957
	if (parent_status == UNDER_LIMIT &&
			allocated <= sk_prot_mem_limits(sk, 0)) {
1958
		sk_leave_memory_pressure(sk);
1959 1960 1961
		return 1;
	}

Glauber Costa's avatar
Glauber Costa committed
1962 1963 1964
	/* Under pressure. (we or our parents) */
	if ((parent_status > SOFT_LIMIT) ||
			allocated > sk_prot_mem_limits(sk, 1))
1965
		sk_enter_memory_pressure(sk);
1966

Glauber Costa's avatar
Glauber Costa committed
1967 1968 1969
	/* Over hard limit (we or our parents) */
	if ((parent_status == OVER_LIMIT) ||
			(allocated > sk_prot_mem_limits(sk, 2)))
1970 1971 1972 1973 1974 1975
		goto suppress_allocation;

	/* guarantee minimum buffer size under pressure */
	if (kind == SK_MEM_RECV) {
		if (atomic_read(&sk->sk_rmem_alloc) < prot->sysctl_rmem[0])
			return 1;
1976

1977 1978 1979 1980 1981 1982 1983 1984 1985
	} else { /* SK_MEM_SEND */
		if (sk->sk_type == SOCK_STREAM) {
			if (sk->sk_wmem_queued < prot->sysctl_wmem[0])
				return 1;
		} else if (atomic_read(&sk->sk_wmem_alloc) <
			   prot->sysctl_wmem[0])
				return 1;
	}

1986
	if (sk_has_memory_pressure(sk)) {
1987 1988
		int alloc;

1989
		if (!sk_under_memory_pressure(sk))
1990
			return 1;
1991 1992
		alloc = sk_sockets_allocated_read_positive(sk);
		if (sk_prot_mem_limits(sk, 2) > alloc *
1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
		    sk_mem_pages(sk->sk_wmem_queued +
				 atomic_read(&sk->sk_rmem_alloc) +
				 sk->sk_forward_alloc))
			return 1;
	}

suppress_allocation:

	if (kind == SK_MEM_SEND && sk->sk_type == SOCK_STREAM) {
		sk_stream_moderate_sndbuf(sk);

		/* Fail only if socket is _under_ its sndbuf.
		 * In this case we cannot block, so that we have to fail.
		 */
		if (sk->sk_wmem_queued + size >= sk->sk_sndbuf)
			return 1;
	}

2011 2012
	trace_sock_exceed_buf_limit(sk, prot, allocated);

2013 2014
	/* Alas. Undo changes. */
	sk->sk_forward_alloc -= amt * SK_MEM_QUANTUM;
2015

2016
	sk_memory_allocated_sub(sk, amt);
2017

2018 2019 2020 2021 2022 2023 2024 2025 2026 2027
	return 0;
}
EXPORT_SYMBOL(__sk_mem_schedule);

/**
 *	__sk_reclaim - reclaim memory_allocated
 *	@sk: socket
 */
void __sk_mem_reclaim(struct sock *sk)
{
2028
	sk_memory_allocated_sub(sk,
2029
				sk->sk_forward_alloc >> SK_MEM_QUANTUM_SHIFT);
2030 2031
	sk->sk_forward_alloc &= SK_MEM_QUANTUM - 1;

2032 2033 2034
	if (sk_under_memory_pressure(sk) &&
	    (sk_memory_allocated(sk) < sk_prot_mem_limits(sk, 0)))
		sk_leave_memory_pressure(sk);
2035 2036 2037 2038
}
EXPORT_SYMBOL(__sk_mem_reclaim);


Linus Torvalds's avatar
Linus Torvalds committed
2039 2040 2041 2042 2043 2044 2045 2046 2047 2048 2049
/*
 * Set of default routines for initialising struct proto_ops when
 * the protocol does not support a particular function. In certain
 * cases where it makes no sense for a protocol to have a "do nothing"
 * function, some default processing is provided.
 */

int sock_no_bind(struct socket *sock, struct sockaddr *saddr, int len)
{
	return -EOPNOTSUPP;
}
Eric Dumazet's avatar
Eric Dumazet committed
2050
EXPORT_SYMBOL(sock_no_bind);
Linus Torvalds's avatar
Linus Torvalds committed
2051

2052
int sock_no_connect(struct socket *sock, struct sockaddr *saddr,
Linus Torvalds's avatar
Linus Torvalds committed
2053 2054 2055 2056
		    int len, int flags)
{
	return -EOPNOTSUPP;
}
Eric Dumazet's avatar
Eric Dumazet committed
2057
EXPORT_SYMBOL(sock_no_connect);
Linus Torvalds's avatar
Linus Torvalds committed
2058 2059 2060 2061 2062

int sock_no_socketpair(struct socket *sock1, struct socket *sock2)
{
	return -EOPNOTSUPP;
}
Eric Dumazet's avatar
Eric Dumazet committed
2063
EXPORT_SYMBOL(sock_no_socketpair);
Linus Torvalds's avatar
Linus Torvalds committed
2064 2065 2066 2067 2068

int sock_no_accept(struct socket *sock, struct socket *newsock, int flags)
{
	return -EOPNOTSUPP;
}
Eric Dumazet's avatar
Eric Dumazet committed
2069
EXPORT_SYMBOL(sock_no_accept);
Linus Torvalds's avatar
Linus Torvalds committed
2070

2071
int sock_no_getname(struct socket *sock, struct sockaddr *saddr,
Linus Torvalds's avatar
Linus Torvalds committed
2072 2073 2074 2075
		    int *len, int peer)
{
	return -EOPNOTSUPP;
}
Eric Dumazet's avatar
Eric Dumazet committed
2076
EXPORT_SYMBOL(sock_no_getname);
Linus Torvalds's avatar
Linus Torvalds committed
2077

Eric Dumazet's avatar
Eric Dumazet committed
2078
unsigned int sock_no_poll(struct file *file, struct socket *sock, poll_table *pt)
Linus Torvalds's avatar
Linus Torvalds committed
2079 2080 2081
{
	return 0;
}
Eric Dumazet's avatar
Eric Dumazet committed
2082
EXPORT_SYMBOL(sock_no_poll);
Linus Torvalds's avatar
Linus Torvalds committed
2083 2084 2085 2086 2087

int sock_no_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg)
{
	return -EOPNOTSUPP;
}
Eric Dumazet's avatar
Eric Dumazet committed
2088
EXPORT_SYMBOL(sock_no_ioctl);
Linus Torvalds's avatar
Linus Torvalds committed
2089 2090 2091 2092 2093

int sock_no_listen(struct socket *sock, int backlog)
{
	return -EOPNOTSUPP;
}
Eric Dumazet's avatar
Eric Dumazet committed
2094
EXPORT_SYMBOL(sock_no_listen);
Linus Torvalds's avatar
Linus Torvalds committed
2095 2096 2097 2098 2099

int sock_no_shutdown(struct socket *sock, int how)
{
	return -EOPNOTSUPP;
}
Eric Dumazet's avatar
Eric Dumazet committed
2100
EXPORT_SYMBOL(sock_no_shutdown);
Linus Torvalds's avatar
Linus Torvalds committed
2101 2102

int sock_no_setsockopt(struct socket *sock, int level, int optname,
2103
		    char __user *optval, unsigned int optlen)
Linus Torvalds's avatar
Linus Torvalds committed
2104 2105 2106
{
	return -EOPNOTSUPP;
}
Eric Dumazet's avatar
Eric Dumazet committed
2107
EXPORT_SYMBOL(sock_no_setsockopt);
Linus Torvalds's avatar
Linus Torvalds committed
2108 2109 2110 2111 2112 2113

int sock_no_getsockopt(struct socket *sock, int level, int optname,
		    char __user *optval, int __user *optlen)
{
	return -EOPNOTSUPP;
}
Eric Dumazet's avatar
Eric Dumazet committed
2114
EXPORT_SYMBOL(sock_no_getsockopt);
Linus Torvalds's avatar
Linus Torvalds committed
2115 2116 2117 2118 2119 2120

int sock_no_sendmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *m,
		    size_t len)
{
	return -EOPNOTSUPP;
}
Eric Dumazet's avatar
Eric Dumazet committed
2121
EXPORT_SYMBOL(sock_no_sendmsg);
Linus Torvalds's avatar
Linus Torvalds committed
2122 2123 2124 2125 2126 2127

int sock_no_recvmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *m,
		    size_t len, int flags)
{
	return -EOPNOTSUPP;
}
Eric Dumazet's avatar
Eric Dumazet committed
2128
EXPORT_SYMBOL(sock_no_recvmsg);
Linus Torvalds's avatar
Linus Torvalds committed
2129 2130 2131 2132 2133 2134

int sock_no_mmap(struct file *file, struct socket *sock, struct vm_area_struct *vma)
{
	/* Mirror missing mmap method error code */
	return -ENODEV;
}
Eric Dumazet's avatar
Eric Dumazet committed
2135
EXPORT_SYMBOL(sock_no_mmap);
Linus Torvalds's avatar
Linus Torvalds committed
2136 2137 2138 2139 2140 2141 2142 2143 2144 2145 2146 2147 2148

ssize_t sock_no_sendpage(struct socket *sock, struct page *page, int offset, size_t size, int flags)
{
	ssize_t res;
	struct msghdr msg = {.msg_flags = flags};
	struct kvec iov;
	char *kaddr = kmap(page);
	iov.iov_base = kaddr + offset;
	iov.iov_len = size;
	res = kernel_sendmsg(sock, &msg, &iov, 1, size);
	kunmap(page);
	return res;
}
Eric Dumazet's avatar
Eric Dumazet committed
2149
EXPORT_SYMBOL(sock_no_sendpage);
Linus Torvalds's avatar
Linus Torvalds committed
2150 2151 2152 2153 2154 2155 2156

/*
 *	Default Socket Callbacks
 */

static void sock_def_wakeup(struct sock *sk)
{
2157 2158 2159 2160 2161 2162 2163
	struct socket_wq *wq;

	rcu_read_lock();
	wq = rcu_dereference(sk->sk_wq);
	if (wq_has_sleeper(wq))
		wake_up_interruptible_all(&wq->wait);
	rcu_read_unlock();
Linus Torvalds's avatar
Linus Torvalds committed
2164 2165 2166 2167
}

static void sock_def_error_report(struct sock *sk)
{
2168 2169 2170 2171 2172 2173
	struct socket_wq *wq;

	rcu_read_lock();
	wq = rcu_dereference(sk->sk_wq);
	if (wq_has_sleeper(wq))
		wake_up_interruptible_poll(&wq->wait, POLLERR);
2174
	sk_wake_async(sk, SOCK_WAKE_IO, POLL_ERR);
2175
	rcu_read_unlock();
Linus Torvalds's avatar
Linus Torvalds committed
2176 2177 2178 2179
}

static void sock_def_readable(struct sock *sk, int len)
{
2180 2181 2182 2183 2184
	struct socket_wq *wq;

	rcu_read_lock();
	wq = rcu_dereference(sk->sk_wq);
	if (wq_has_sleeper(wq))
2185
		wake_up_interruptible_sync_poll(&wq->wait, POLLIN | POLLPRI |
2186
						POLLRDNORM | POLLRDBAND);
2187
	sk_wake_async(sk, SOCK_WAKE_WAITD, POLL_IN);
2188
	rcu_read_unlock();
Linus Torvalds's avatar
Linus Torvalds committed
2189 2190 2191 2192
}

static void sock_def_write_space(struct sock *sk)
{
2193 2194 2195
	struct socket_wq *wq;

	rcu_read_lock();
Linus Torvalds's avatar
Linus Torvalds committed
2196 2197 2198 2199

	/* Do not wake up a writer until he can make "significant"
	 * progress.  --DaveM
	 */
2200
	if ((atomic_read(&sk->sk_wmem_alloc) << 1) <= sk->sk_sndbuf) {
2201 2202 2203
		wq = rcu_dereference(sk->sk_wq);
		if (wq_has_sleeper(wq))
			wake_up_interruptible_sync_poll(&wq->wait, POLLOUT |
2204
						POLLWRNORM | POLLWRBAND);
Linus Torvalds's avatar
Linus Torvalds committed
2205 2206 2207

		/* Should agree with poll, otherwise some programs break */
		if (sock_writeable(sk))
2208
			sk_wake_async(sk, SOCK_WAKE_SPACE, POLL_OUT);
Linus Torvalds's avatar
Linus Torvalds committed
2209 2210
	}

2211
	rcu_read_unlock();
Linus Torvalds's avatar
Linus Torvalds committed
2212 2213 2214 2215
}

static void sock_def_destruct(struct sock *sk)
{
Jesper Juhl's avatar
Jesper Juhl committed
2216
	kfree(sk->sk_protinfo);
Linus Torvalds's avatar
Linus Torvalds committed
2217 2218 2219 2220 2221 2222
}

void sk_send_sigurg(struct sock *sk)
{
	if (sk->sk_socket && sk->sk_socket->file)
		if (send_sigurg(&sk->sk_socket->file->f_owner))
2223
			sk_wake_async(sk, SOCK_WAKE_URG, POLL_PRI);
Linus Torvalds's avatar
Linus Torvalds committed
2224
}
Eric Dumazet's avatar
Eric Dumazet committed
2225
EXPORT_SYMBOL(sk_send_sigurg);
Linus Torvalds's avatar
Linus Torvalds committed
2226 2227 2228 2229 2230 2231 2232 2233 2234 2235 2236

void sk_reset_timer(struct sock *sk, struct timer_list* timer,
		    unsigned long expires)
{
	if (!mod_timer(timer, expires))
		sock_hold(sk);
}
EXPORT_SYMBOL(sk_reset_timer);

void sk_stop_timer(struct sock *sk, struct timer_list* timer)
{
2237
	if (del_timer(timer))
Linus Torvalds's avatar
Linus Torvalds committed
2238 2239 2240 2241 2242 2243 2244 2245 2246
		__sock_put(sk);
}
EXPORT_SYMBOL(sk_stop_timer);

void sock_init_data(struct socket *sock, struct sock *sk)
{
	skb_queue_head_init(&sk->sk_receive_queue);
	skb_queue_head_init(&sk->sk_write_queue);
	skb_queue_head_init(&sk->sk_error_queue);
2247 2248 2249
#ifdef CONFIG_NET_DMA
	skb_queue_head_init(&sk->sk_async_wait_queue);
#endif
Linus Torvalds's avatar
Linus Torvalds committed
2250 2251 2252 2253

	sk->sk_send_head	=	NULL;

	init_timer(&sk->sk_timer);
2254

Linus Torvalds's avatar
Linus Torvalds committed
2255 2256 2257 2258
	sk->sk_allocation	=	GFP_KERNEL;
	sk->sk_rcvbuf		=	sysctl_rmem_default;
	sk->sk_sndbuf		=	sysctl_wmem_default;
	sk->sk_state		=	TCP_CLOSE;
2259
	sk_set_socket(sk, sock);
Linus Torvalds's avatar
Linus Torvalds committed
2260 2261 2262

	sock_set_flag(sk, SOCK_ZAPPED);

2263
	if (sock) {
Linus Torvalds's avatar
Linus Torvalds committed
2264
		sk->sk_type	=	sock->type;
2265
		sk->sk_wq	=	sock->wq;
Linus Torvalds's avatar
Linus Torvalds committed
2266 2267
		sock->sk	=	sk;
	} else
2268
		sk->sk_wq	=	NULL;
Linus Torvalds's avatar
Linus Torvalds committed
2269

Eric Dumazet's avatar
Eric Dumazet committed
2270
	spin_lock_init(&sk->sk_dst_lock);
Linus Torvalds's avatar
Linus Torvalds committed
2271
	rwlock_init(&sk->sk_callback_lock);
2272 2273 2274
	lockdep_set_class_and_name(&sk->sk_callback_lock,
			af_callback_keys + sk->sk_family,
			af_family_clock_key_strings[sk->sk_family]);
Linus Torvalds's avatar
Linus Torvalds committed
2275 2276 2277 2278 2279 2280 2281

	sk->sk_state_change	=	sock_def_wakeup;
	sk->sk_data_ready	=	sock_def_readable;
	sk->sk_write_space	=	sock_def_write_space;
	sk->sk_error_report	=	sock_def_error_report;
	sk->sk_destruct		=	sock_def_destruct;

2282 2283
	sk->sk_frag.page	=	NULL;
	sk->sk_frag.offset	=	0;
2284
	sk->sk_peek_off		=	-1;
Linus Torvalds's avatar
Linus Torvalds committed
2285

2286 2287
	sk->sk_peer_pid 	=	NULL;
	sk->sk_peer_cred	=	NULL;
Linus Torvalds's avatar
Linus Torvalds committed
2288 2289 2290 2291 2292
	sk->sk_write_pending	=	0;
	sk->sk_rcvlowat		=	1;
	sk->sk_rcvtimeo		=	MAX_SCHEDULE_TIMEOUT;
	sk->sk_sndtimeo		=	MAX_SCHEDULE_TIMEOUT;

2293
	sk->sk_stamp = ktime_set(-1L, 0);
Linus Torvalds's avatar
Linus Torvalds committed
2294

2295 2296
#ifdef CONFIG_NET_LL_RX_POLL
	sk->sk_napi_id		=	0;
2297
	sk->sk_ll_usec		=	sysctl_net_ll_read;
2298 2299
#endif

Eric Dumazet's avatar
Eric Dumazet committed
2300 2301 2302 2303 2304
	/*
	 * Before updating sk_refcnt, we must commit prior changes to memory
	 * (Documentation/RCU/rculist_nulls.txt for details)
	 */
	smp_wmb();
Linus Torvalds's avatar
Linus Torvalds committed
2305
	atomic_set(&sk->sk_refcnt, 1);
Wang Chen's avatar
Wang Chen committed
2306
	atomic_set(&sk->sk_drops, 0);
Linus Torvalds's avatar
Linus Torvalds committed
2307
}
Eric Dumazet's avatar
Eric Dumazet committed
2308
EXPORT_SYMBOL(sock_init_data);
Linus Torvalds's avatar
Linus Torvalds committed
2309

Harvey Harrison's avatar
Harvey Harrison committed
2310
void lock_sock_nested(struct sock *sk, int subclass)
Linus Torvalds's avatar
Linus Torvalds committed
2311 2312
{
	might_sleep();
2313
	spin_lock_bh(&sk->sk_lock.slock);
2314
	if (sk->sk_lock.owned)
Linus Torvalds's avatar
Linus Torvalds committed
2315
		__lock_sock(sk);
2316
	sk->sk_lock.owned = 1;
2317 2318 2319 2320
	spin_unlock(&sk->sk_lock.slock);
	/*
	 * The sk_lock has mutex_lock() semantics here:
	 */
2321
	mutex_acquire(&sk->sk_lock.dep_map, subclass, 0, _RET_IP_);
2322
	local_bh_enable();
Linus Torvalds's avatar
Linus Torvalds committed
2323
}
2324
EXPORT_SYMBOL(lock_sock_nested);
Linus Torvalds's avatar
Linus Torvalds committed
2325

Harvey Harrison's avatar
Harvey Harrison committed
2326
void release_sock(struct sock *sk)
Linus Torvalds's avatar
Linus Torvalds committed
2327
{
2328 2329 2330 2331 2332 2333
	/*
	 * The sk_lock has mutex_unlock() semantics:
	 */
	mutex_release(&sk->sk_lock.dep_map, 1, _RET_IP_);

	spin_lock_bh(&sk->sk_lock.slock);
Linus Torvalds's avatar
Linus Torvalds committed
2334 2335
	if (sk->sk_backlog.tail)
		__release_sock(sk);
Eric Dumazet's avatar
Eric Dumazet committed
2336 2337 2338 2339

	if (sk->sk_prot->release_cb)
		sk->sk_prot->release_cb(sk);

2340
	sk->sk_lock.owned = 0;
2341 2342 2343
	if (waitqueue_active(&sk->sk_lock.wq))
		wake_up(&sk->sk_lock.wq);
	spin_unlock_bh(&sk->sk_lock.slock);
Linus Torvalds's avatar
Linus Torvalds committed
2344 2345 2346
}
EXPORT_SYMBOL(release_sock);

2347 2348 2349 2350 2351 2352 2353 2354 2355 2356 2357 2358 2359 2360 2361 2362 2363 2364 2365 2366 2367 2368 2369 2370 2371 2372 2373 2374 2375 2376 2377 2378 2379
/**
 * lock_sock_fast - fast version of lock_sock
 * @sk: socket
 *
 * This version should be used for very small section, where process wont block
 * return false if fast path is taken
 *   sk_lock.slock locked, owned = 0, BH disabled
 * return true if slow path is taken
 *   sk_lock.slock unlocked, owned = 1, BH enabled
 */
bool lock_sock_fast(struct sock *sk)
{
	might_sleep();
	spin_lock_bh(&sk->sk_lock.slock);

	if (!sk->sk_lock.owned)
		/*
		 * Note : We must disable BH
		 */
		return false;

	__lock_sock(sk);
	sk->sk_lock.owned = 1;
	spin_unlock(&sk->sk_lock.slock);
	/*
	 * The sk_lock has mutex_lock() semantics here:
	 */
	mutex_acquire(&sk->sk_lock.dep_map, 0, 0, _RET_IP_);
	local_bh_enable();
	return true;
}
EXPORT_SYMBOL(lock_sock_fast);

Linus Torvalds's avatar
Linus Torvalds committed
2380
int sock_get_timestamp(struct sock *sk, struct timeval __user *userstamp)
2381
{
2382
	struct timeval tv;
Linus Torvalds's avatar
Linus Torvalds committed
2383
	if (!sock_flag(sk, SOCK_TIMESTAMP))
2384
		sock_enable_timestamp(sk, SOCK_TIMESTAMP);
2385 2386
	tv = ktime_to_timeval(sk->sk_stamp);
	if (tv.tv_sec == -1)
Linus Torvalds's avatar
Linus Torvalds committed
2387
		return -ENOENT;
2388 2389 2390 2391 2392
	if (tv.tv_sec == 0) {
		sk->sk_stamp = ktime_get_real();
		tv = ktime_to_timeval(sk->sk_stamp);
	}
	return copy_to_user(userstamp, &tv, sizeof(tv)) ? -EFAULT : 0;
2393
}
Linus Torvalds's avatar
Linus Torvalds committed
2394 2395
EXPORT_SYMBOL(sock_get_timestamp);

2396 2397 2398 2399
int sock_get_timestampns(struct sock *sk, struct timespec __user *userstamp)
{
	struct timespec ts;
	if (!sock_flag(sk, SOCK_TIMESTAMP))
2400
		sock_enable_timestamp(sk, SOCK_TIMESTAMP);
2401 2402 2403 2404 2405 2406 2407 2408 2409 2410 2411
	ts = ktime_to_timespec(sk->sk_stamp);
	if (ts.tv_sec == -1)
		return -ENOENT;
	if (ts.tv_sec == 0) {
		sk->sk_stamp = ktime_get_real();
		ts = ktime_to_timespec(sk->sk_stamp);
	}
	return copy_to_user(userstamp, &ts, sizeof(ts)) ? -EFAULT : 0;
}
EXPORT_SYMBOL(sock_get_timestampns);

2412
void sock_enable_timestamp(struct sock *sk, int flag)
2413
{
2414
	if (!sock_flag(sk, flag)) {
2415 2416
		unsigned long previous_flags = sk->sk_flags;

2417 2418 2419 2420 2421 2422
		sock_set_flag(sk, flag);
		/*
		 * we just set one of the two flags which require net
		 * time stamping, but time stamping might have been on
		 * already because of the other one
		 */
2423
		if (!(previous_flags & SK_FLAGS_TIMESTAMP))
2424
			net_enable_timestamp();
Linus Torvalds's avatar
Linus Torvalds committed
2425 2426 2427 2428 2429 2430 2431 2432 2433 2434 2435 2436 2437 2438 2439 2440 2441 2442 2443
	}
}

/*
 *	Get a socket option on an socket.
 *
 *	FIX: POSIX 1003.1g is very ambiguous here. It states that
 *	asynchronous errors should be reported by getsockopt. We assume
 *	this means if you specify SO_ERROR (otherwise whats the point of it).
 */
int sock_common_getsockopt(struct socket *sock, int level, int optname,
			   char __user *optval, int __user *optlen)
{
	struct sock *sk = sock->sk;

	return sk->sk_prot->getsockopt(sk, level, optname, optval, optlen);
}
EXPORT_SYMBOL(sock_common_getsockopt);

2444
#ifdef CONFIG_COMPAT
2445 2446
int compat_sock_common_getsockopt(struct socket *sock, int level, int optname,
				  char __user *optval, int __user *optlen)
2447 2448 2449
{
	struct sock *sk = sock->sk;

2450
	if (sk->sk_prot->compat_getsockopt != NULL)
2451 2452
		return sk->sk_prot->compat_getsockopt(sk, level, optname,
						      optval, optlen);
2453 2454 2455 2456 2457
	return sk->sk_prot->getsockopt(sk, level, optname, optval, optlen);
}
EXPORT_SYMBOL(compat_sock_common_getsockopt);
#endif

Linus Torvalds's avatar
Linus Torvalds committed
2458 2459 2460 2461 2462 2463 2464 2465 2466 2467 2468 2469 2470 2471 2472 2473 2474 2475 2476
int sock_common_recvmsg(struct kiocb *iocb, struct socket *sock,
			struct msghdr *msg, size_t size, int flags)
{
	struct sock *sk = sock->sk;
	int addr_len = 0;
	int err;

	err = sk->sk_prot->recvmsg(iocb, sk, msg, size, flags & MSG_DONTWAIT,
				   flags & ~MSG_DONTWAIT, &addr_len);
	if (err >= 0)
		msg->msg_namelen = addr_len;
	return err;
}
EXPORT_SYMBOL(sock_common_recvmsg);

/*
 *	Set socket options on an inet socket.
 */
int sock_common_setsockopt(struct socket *sock, int level, int optname,
2477
			   char __user *optval, unsigned int optlen)
Linus Torvalds's avatar
Linus Torvalds committed
2478 2479 2480 2481 2482 2483 2484
{
	struct sock *sk = sock->sk;

	return sk->sk_prot->setsockopt(sk, level, optname, optval, optlen);
}
EXPORT_SYMBOL(sock_common_setsockopt);

2485
#ifdef CONFIG_COMPAT
2486
int compat_sock_common_setsockopt(struct socket *sock, int level, int optname,
2487
				  char __user *optval, unsigned int optlen)
2488 2489 2490
{
	struct sock *sk = sock->sk;

2491 2492 2493
	if (sk->sk_prot->compat_setsockopt != NULL)
		return sk->sk_prot->compat_setsockopt(sk, level, optname,
						      optval, optlen);
2494 2495 2496 2497 2498
	return sk->sk_prot->setsockopt(sk, level, optname, optval, optlen);
}
EXPORT_SYMBOL(compat_sock_common_setsockopt);
#endif

Linus Torvalds's avatar
Linus Torvalds committed
2499 2500 2501 2502 2503 2504 2505 2506 2507 2508 2509 2510 2511 2512 2513 2514 2515 2516 2517 2518 2519 2520 2521 2522 2523 2524 2525 2526 2527 2528 2529
void sk_common_release(struct sock *sk)
{
	if (sk->sk_prot->destroy)
		sk->sk_prot->destroy(sk);

	/*
	 * Observation: when sock_common_release is called, processes have
	 * no access to socket. But net still has.
	 * Step one, detach it from networking:
	 *
	 * A. Remove from hash tables.
	 */

	sk->sk_prot->unhash(sk);

	/*
	 * In this point socket cannot receive new packets, but it is possible
	 * that some packets are in flight because some CPU runs receiver and
	 * did hash table lookup before we unhashed socket. They will achieve
	 * receive queue and will be purged by socket destructor.
	 *
	 * Also we still have packets pending on receive queue and probably,
	 * our own packets waiting in device queues. sock_destroy will drain
	 * receive queue, but transmitted packets will delay socket destruction
	 * until the last reference will be released.
	 */

	sock_orphan(sk);

	xfrm_sk_free_policy(sk);

2530
	sk_refcnt_debug_release(sk);
2531 2532 2533 2534 2535 2536

	if (sk->sk_frag.page) {
		put_page(sk->sk_frag.page);
		sk->sk_frag.page = NULL;
	}

Linus Torvalds's avatar
Linus Torvalds committed
2537 2538 2539 2540
	sock_put(sk);
}
EXPORT_SYMBOL(sk_common_release);

2541 2542
#ifdef CONFIG_PROC_FS
#define PROTO_INUSE_NR	64	/* should be enough for the first time */
2543 2544 2545
struct prot_inuse {
	int val[PROTO_INUSE_NR];
};
2546 2547

static DECLARE_BITMAP(proto_inuse_idx, PROTO_INUSE_NR);
2548 2549 2550 2551

#ifdef CONFIG_NET_NS
void sock_prot_inuse_add(struct net *net, struct proto *prot, int val)
{
Eric Dumazet's avatar
Eric Dumazet committed
2552
	__this_cpu_add(net->core.inuse->val[prot->inuse_idx], val);
2553 2554 2555 2556 2557 2558 2559 2560 2561 2562 2563 2564 2565 2566 2567
}
EXPORT_SYMBOL_GPL(sock_prot_inuse_add);

int sock_prot_inuse_get(struct net *net, struct proto *prot)
{
	int cpu, idx = prot->inuse_idx;
	int res = 0;

	for_each_possible_cpu(cpu)
		res += per_cpu_ptr(net->core.inuse, cpu)->val[idx];

	return res >= 0 ? res : 0;
}
EXPORT_SYMBOL_GPL(sock_prot_inuse_get);

2568
static int __net_init sock_inuse_init_net(struct net *net)
2569 2570 2571 2572 2573
{
	net->core.inuse = alloc_percpu(struct prot_inuse);
	return net->core.inuse ? 0 : -ENOMEM;
}

2574
static void __net_exit sock_inuse_exit_net(struct net *net)
2575 2576 2577 2578 2579 2580 2581 2582 2583 2584 2585 2586 2587 2588 2589 2590 2591 2592 2593
{
	free_percpu(net->core.inuse);
}

static struct pernet_operations net_inuse_ops = {
	.init = sock_inuse_init_net,
	.exit = sock_inuse_exit_net,
};

static __init int net_inuse_init(void)
{
	if (register_pernet_subsys(&net_inuse_ops))
		panic("Cannot initialize net inuse counters");

	return 0;
}

core_initcall(net_inuse_init);
#else
2594 2595
static DEFINE_PER_CPU(struct prot_inuse, prot_inuse);

2596
void sock_prot_inuse_add(struct net *net, struct proto *prot, int val)
2597
{
Eric Dumazet's avatar
Eric Dumazet committed
2598
	__this_cpu_add(prot_inuse.val[prot->inuse_idx], val);
2599 2600 2601
}
EXPORT_SYMBOL_GPL(sock_prot_inuse_add);

2602
int sock_prot_inuse_get(struct net *net, struct proto *prot)
2603 2604 2605 2606 2607 2608 2609 2610 2611 2612
{
	int cpu, idx = prot->inuse_idx;
	int res = 0;

	for_each_possible_cpu(cpu)
		res += per_cpu(prot_inuse, cpu).val[idx];

	return res >= 0 ? res : 0;
}
EXPORT_SYMBOL_GPL(sock_prot_inuse_get);
2613
#endif
2614 2615 2616 2617 2618 2619

static void assign_proto_idx(struct proto *prot)
{
	prot->inuse_idx = find_first_zero_bit(proto_inuse_idx, PROTO_INUSE_NR);

	if (unlikely(prot->inuse_idx == PROTO_INUSE_NR - 1)) {
Joe Perches's avatar
Joe Perches committed
2620
		pr_err("PROTO_INUSE_NR exhausted\n");
2621 2622 2623 2624 2625 2626 2627 2628 2629 2630 2631 2632 2633 2634 2635 2636 2637 2638 2639 2640 2641
		return;
	}

	set_bit(prot->inuse_idx, proto_inuse_idx);
}

static void release_proto_idx(struct proto *prot)
{
	if (prot->inuse_idx != PROTO_INUSE_NR - 1)
		clear_bit(prot->inuse_idx, proto_inuse_idx);
}
#else
static inline void assign_proto_idx(struct proto *prot)
{
}

static inline void release_proto_idx(struct proto *prot)
{
}
#endif

2642 2643
int proto_register(struct proto *prot, int alloc_slab)
{
Linus Torvalds's avatar
Linus Torvalds committed
2644 2645
	if (alloc_slab) {
		prot->slab = kmem_cache_create(prot->name, prot->obj_size, 0,
2646 2647
					SLAB_HWCACHE_ALIGN | prot->slab_flags,
					NULL);
Linus Torvalds's avatar
Linus Torvalds committed
2648 2649

		if (prot->slab == NULL) {
Joe Perches's avatar
Joe Perches committed
2650 2651
			pr_crit("%s: Can't create sock SLAB cache!\n",
				prot->name);
2652
			goto out;
Linus Torvalds's avatar
Linus Torvalds committed
2653
		}
2654 2655

		if (prot->rsk_prot != NULL) {
2656
			prot->rsk_prot->slab_name = kasprintf(GFP_KERNEL, "request_sock_%s", prot->name);
2657
			if (prot->rsk_prot->slab_name == NULL)
2658 2659
				goto out_free_sock_slab;

2660
			prot->rsk_prot->slab = kmem_cache_create(prot->rsk_prot->slab_name,
2661
								 prot->rsk_prot->obj_size, 0,
2662
								 SLAB_HWCACHE_ALIGN, NULL);
2663 2664

			if (prot->rsk_prot->slab == NULL) {
Joe Perches's avatar
Joe Perches committed
2665 2666
				pr_crit("%s: Can't create request sock SLAB cache!\n",
					prot->name);
2667 2668 2669
				goto out_free_request_sock_slab_name;
			}
		}
2670

2671
		if (prot->twsk_prot != NULL) {
2672
			prot->twsk_prot->twsk_slab_name = kasprintf(GFP_KERNEL, "tw_sock_%s", prot->name);
2673

2674
			if (prot->twsk_prot->twsk_slab_name == NULL)
2675 2676
				goto out_free_request_sock_slab;

2677
			prot->twsk_prot->twsk_slab =
2678
				kmem_cache_create(prot->twsk_prot->twsk_slab_name,
2679
						  prot->twsk_prot->twsk_obj_size,
2680 2681 2682
						  0,
						  SLAB_HWCACHE_ALIGN |
							prot->slab_flags,
2683
						  NULL);
2684
			if (prot->twsk_prot->twsk_slab == NULL)
2685 2686
				goto out_free_timewait_sock_slab_name;
		}
Linus Torvalds's avatar
Linus Torvalds committed
2687 2688
	}

2689
	mutex_lock(&proto_list_mutex);
Linus Torvalds's avatar
Linus Torvalds committed
2690
	list_add(&prot->node, &proto_list);
2691
	assign_proto_idx(prot);
2692
	mutex_unlock(&proto_list_mutex);
2693 2694
	return 0;

2695
out_free_timewait_sock_slab_name:
2696
	kfree(prot->twsk_prot->twsk_slab_name);
2697 2698 2699 2700 2701
out_free_request_sock_slab:
	if (prot->rsk_prot && prot->rsk_prot->slab) {
		kmem_cache_destroy(prot->rsk_prot->slab);
		prot->rsk_prot->slab = NULL;
	}
2702
out_free_request_sock_slab_name:
2703 2704
	if (prot->rsk_prot)
		kfree(prot->rsk_prot->slab_name);
2705 2706 2707
out_free_sock_slab:
	kmem_cache_destroy(prot->slab);
	prot->slab = NULL;
2708 2709
out:
	return -ENOBUFS;
Linus Torvalds's avatar
Linus Torvalds committed
2710 2711 2712 2713 2714
}
EXPORT_SYMBOL(proto_register);

void proto_unregister(struct proto *prot)
{
2715
	mutex_lock(&proto_list_mutex);
2716
	release_proto_idx(prot);
2717
	list_del(&prot->node);
2718
	mutex_unlock(&proto_list_mutex);
Linus Torvalds's avatar
Linus Torvalds committed
2719 2720 2721 2722 2723 2724

	if (prot->slab != NULL) {
		kmem_cache_destroy(prot->slab);
		prot->slab = NULL;
	}

2725 2726
	if (prot->rsk_prot != NULL && prot->rsk_prot->slab != NULL) {
		kmem_cache_destroy(prot->rsk_prot->slab);
2727
		kfree(prot->rsk_prot->slab_name);
2728 2729 2730
		prot->rsk_prot->slab = NULL;
	}

2731 2732
	if (prot->twsk_prot != NULL && prot->twsk_prot->twsk_slab != NULL) {
		kmem_cache_destroy(prot->twsk_prot->twsk_slab);
2733
		kfree(prot->twsk_prot->twsk_slab_name);
2734
		prot->twsk_prot->twsk_slab = NULL;
2735
	}
Linus Torvalds's avatar
Linus Torvalds committed
2736 2737 2738 2739 2740
}
EXPORT_SYMBOL(proto_unregister);

#ifdef CONFIG_PROC_FS
static void *proto_seq_start(struct seq_file *seq, loff_t *pos)
2741
	__acquires(proto_list_mutex)
Linus Torvalds's avatar
Linus Torvalds committed
2742
{
2743
	mutex_lock(&proto_list_mutex);
2744
	return seq_list_start_head(&proto_list, *pos);
Linus Torvalds's avatar
Linus Torvalds committed
2745 2746 2747 2748
}

static void *proto_seq_next(struct seq_file *seq, void *v, loff_t *pos)
{
2749
	return seq_list_next(v, &proto_list, pos);
Linus Torvalds's avatar
Linus Torvalds committed
2750 2751 2752
}

static void proto_seq_stop(struct seq_file *seq, void *v)
2753
	__releases(proto_list_mutex)
Linus Torvalds's avatar
Linus Torvalds committed
2754
{
2755
	mutex_unlock(&proto_list_mutex);
Linus Torvalds's avatar
Linus Torvalds committed
2756 2757 2758 2759 2760 2761
}

static char proto_method_implemented(const void *method)
{
	return method == NULL ? 'n' : 'y';
}
2762 2763
static long sock_prot_memory_allocated(struct proto *proto)
{
2764
	return proto->memory_allocated != NULL ? proto_memory_allocated(proto) : -1L;
2765 2766 2767 2768 2769 2770 2771
}

static char *sock_prot_memory_pressure(struct proto *proto)
{
	return proto->memory_pressure != NULL ?
	proto_memory_pressure(proto) ? "yes" : "no" : "NI";
}
Linus Torvalds's avatar
Linus Torvalds committed
2772 2773 2774

static void proto_seq_printf(struct seq_file *seq, struct proto *proto)
{
2775

Eric Dumazet's avatar
Eric Dumazet committed
2776
	seq_printf(seq, "%-9s %4u %6d  %6ld   %-3s %6u   %-3s  %-10s "
Linus Torvalds's avatar
Linus Torvalds committed
2777 2778 2779
			"%2c %2c %2c %2c %2c %2c %2c %2c %2c %2c %2c %2c %2c %2c %2c %2c %2c %2c %2c\n",
		   proto->name,
		   proto->obj_size,
2780
		   sock_prot_inuse_get(seq_file_net(seq), proto),
2781 2782
		   sock_prot_memory_allocated(proto),
		   sock_prot_memory_pressure(proto),
Linus Torvalds's avatar
Linus Torvalds committed
2783 2784 2785 2786 2787 2788 2789 2790 2791 2792 2793 2794 2795 2796 2797 2798 2799 2800 2801 2802 2803 2804 2805 2806 2807 2808
		   proto->max_header,
		   proto->slab == NULL ? "no" : "yes",
		   module_name(proto->owner),
		   proto_method_implemented(proto->close),
		   proto_method_implemented(proto->connect),
		   proto_method_implemented(proto->disconnect),
		   proto_method_implemented(proto->accept),
		   proto_method_implemented(proto->ioctl),
		   proto_method_implemented(proto->init),
		   proto_method_implemented(proto->destroy),
		   proto_method_implemented(proto->shutdown),
		   proto_method_implemented(proto->setsockopt),
		   proto_method_implemented(proto->getsockopt),
		   proto_method_implemented(proto->sendmsg),
		   proto_method_implemented(proto->recvmsg),
		   proto_method_implemented(proto->sendpage),
		   proto_method_implemented(proto->bind),
		   proto_method_implemented(proto->backlog_rcv),
		   proto_method_implemented(proto->hash),
		   proto_method_implemented(proto->unhash),
		   proto_method_implemented(proto->get_port),
		   proto_method_implemented(proto->enter_memory_pressure));
}

static int proto_seq_show(struct seq_file *seq, void *v)
{
2809
	if (v == &proto_list)
Linus Torvalds's avatar
Linus Torvalds committed
2810 2811 2812 2813 2814 2815 2816 2817 2818 2819 2820
		seq_printf(seq, "%-9s %-4s %-8s %-6s %-5s %-7s %-4s %-10s %s",
			   "protocol",
			   "size",
			   "sockets",
			   "memory",
			   "press",
			   "maxhdr",
			   "slab",
			   "module",
			   "cl co di ac io in de sh ss gs se re sp bi br ha uh gp em\n");
	else
2821
		proto_seq_printf(seq, list_entry(v, struct proto, node));
Linus Torvalds's avatar
Linus Torvalds committed
2822 2823 2824
	return 0;
}

2825
static const struct seq_operations proto_seq_ops = {
Linus Torvalds's avatar
Linus Torvalds committed
2826 2827 2828 2829 2830 2831 2832 2833
	.start  = proto_seq_start,
	.next   = proto_seq_next,
	.stop   = proto_seq_stop,
	.show   = proto_seq_show,
};

static int proto_seq_open(struct inode *inode, struct file *file)
{
2834 2835
	return seq_open_net(inode, file, &proto_seq_ops,
			    sizeof(struct seq_net_private));
Linus Torvalds's avatar
Linus Torvalds committed
2836 2837
}

2838
static const struct file_operations proto_seq_fops = {
Linus Torvalds's avatar
Linus Torvalds committed
2839 2840 2841 2842
	.owner		= THIS_MODULE,
	.open		= proto_seq_open,
	.read		= seq_read,
	.llseek		= seq_lseek,
2843 2844 2845 2846 2847
	.release	= seq_release_net,
};

static __net_init int proto_init_net(struct net *net)
{
2848
	if (!proc_create("protocols", S_IRUGO, net->proc_net, &proto_seq_fops))
2849 2850 2851 2852 2853 2854 2855
		return -ENOMEM;

	return 0;
}

static __net_exit void proto_exit_net(struct net *net)
{
2856
	remove_proc_entry("protocols", net->proc_net);
2857 2858 2859 2860 2861 2862
}


static __net_initdata struct pernet_operations proto_net_ops = {
	.init = proto_init_net,
	.exit = proto_exit_net,
Linus Torvalds's avatar
Linus Torvalds committed
2863 2864 2865 2866
};

static int __init proto_init(void)
{
2867
	return register_pernet_subsys(&proto_net_ops);
Linus Torvalds's avatar
Linus Torvalds committed
2868 2869 2870 2871 2872
}

subsys_initcall(proto_init);

#endif /* PROC_FS */