Lines Matching +full:layers +full:- +full:configurable
1 // SPDX-License-Identifier: GPL-2.0-or-later
20 * mode above the protocol layers.
25 * Jeff Uphoff : Made max number of sockets command-line
26 * configurable.
47 * protocol-independent
55 #include <linux/bpf-cgroup.h>
139 struct socket *sock = f->private_data; in sock_show_fdinfo()
140 const struct proto_ops *ops = READ_ONCE(sock->ops); in sock_show_fdinfo()
142 if (ops->show_fdinfo) in sock_show_fdinfo()
143 ops->show_fdinfo(m, sock); in sock_show_fdinfo()
237 * move_addr_to_kernel - copy a socket address into kernel space
243 * too long an error code of -EINVAL is returned. If the copy gives
244 * invalid addresses -EFAULT is returned. On a success 0 is returned.
250 return -EINVAL; in move_addr_to_kernel()
254 return -EFAULT; in move_addr_to_kernel()
259 * move_addr_to_user - copy an address to user space
266 * This is overwritten with the buffer space used. -EINVAL is returned
267 * if an overlong buffer is specified or a negative buffer size. -EFAULT
288 return -EINVAL; in move_addr_to_user()
291 return -ENOMEM; in move_addr_to_user()
293 return -EFAULT; in move_addr_to_user()
311 init_waitqueue_head(&ei->socket.wq.wait); in sock_alloc_inode()
312 ei->socket.wq.fasync_list = NULL; in sock_alloc_inode()
313 ei->socket.wq.flags = 0; in sock_alloc_inode()
315 ei->socket.state = SS_UNCONNECTED; in sock_alloc_inode()
316 ei->socket.flags = 0; in sock_alloc_inode()
317 ei->socket.ops = NULL; in sock_alloc_inode()
318 ei->socket.sk = NULL; in sock_alloc_inode()
319 ei->socket.file = NULL; in sock_alloc_inode()
321 return &ei->vfs_inode; in sock_alloc_inode()
336 inode_init_once(&ei->vfs_inode); in init_once()
363 d_inode(dentry)->i_ino); in sockfs_dname()
375 if (dentry->d_name.len + 1 > size) in sockfs_xattr_get()
376 return -ERANGE; in sockfs_xattr_get()
377 memcpy(value, dentry->d_name.name, dentry->d_name.len + 1); in sockfs_xattr_get()
379 return dentry->d_name.len + 1; in sockfs_xattr_get()
384 #define XATTR_NAME_SOCKPROTONAME_LEN (sizeof(XATTR_NAME_SOCKPROTONAME)-1)
398 return -EAGAIN; in sockfs_security_xattr_set()
416 return -ENOMEM; in sockfs_init_fs_context()
417 ctx->ops = &sockfs_ops; in sockfs_init_fs_context()
418 ctx->dops = &sockfs_dentry_operations; in sockfs_init_fs_context()
419 ctx->xattr = sockfs_xattr_handlers; in sockfs_init_fs_context()
436 * and file struct implicitly stored in sock->file.
449 * sock_alloc_file - Bind a &socket to a &file
455 * in sock->file. If dname is %NULL, sets to "".
467 dname = sock->sk ? sock->sk->sk_prot_creator->name : ""; in sock_alloc_file()
477 file->f_mode |= FMODE_NOWAIT; in sock_alloc_file()
478 sock->file = file; in sock_alloc_file()
479 file->private_data = sock; in sock_alloc_file()
505 * sock_from_file - Return the &socket bounded to @file.
513 if (file->f_op == &socket_file_ops) in sock_from_file()
514 return file->private_data; /* set in sock_alloc_file */ in sock_from_file()
521 * sockfd_lookup - Go from a file number to its socket slot
540 *err = -EBADF; in sockfd_lookup()
546 *err = -ENOTSOCK; in sockfd_lookup()
558 *err = -EBADF; in sockfd_lookup_light()
565 *err = -ENOTSOCK; in sockfd_lookup_light()
583 return -ERANGE; in sockfs_listxattr()
591 return -ERANGE; in sockfs_listxattr()
604 if (!err && (iattr->ia_valid & ATTR_UID)) { in sockfs_setattr()
607 if (sock->sk) in sockfs_setattr()
608 sock->sk->sk_uid = iattr->ia_uid; in sockfs_setattr()
610 err = -ENOENT; in sockfs_setattr()
622 * sock_alloc - allocate a socket
634 inode = new_inode_pseudo(sock_mnt->mnt_sb); in sock_alloc()
640 inode->i_ino = get_next_ino(); in sock_alloc()
641 inode->i_mode = S_IFSOCK | S_IRWXUGO; in sock_alloc()
642 inode->i_uid = current_fsuid(); in sock_alloc()
643 inode->i_gid = current_fsgid(); in sock_alloc()
644 inode->i_op = &sockfs_inode_ops; in sock_alloc()
652 const struct proto_ops *ops = READ_ONCE(sock->ops); in __sock_release()
655 struct module *owner = ops->owner; in __sock_release()
659 ops->release(sock); in __sock_release()
660 sock->sk = NULL; in __sock_release()
663 sock->ops = NULL; in __sock_release()
667 if (sock->wq.fasync_list) in __sock_release()
670 if (!sock->file) { in __sock_release()
674 sock->file = NULL; in __sock_release()
678 * sock_release - close a socket
730 int ret = INDIRECT_CALL_INET(READ_ONCE(sock->ops)->sendmsg, inet6_sendmsg, in sock_sendmsg_nosec()
733 BUG_ON(ret == -EIOCBQUEUED); in sock_sendmsg_nosec()
736 call_trace_sock_send_length(sock->sk, ret, 0); in sock_sendmsg_nosec()
749 * sock_sendmsg - send a message through @sock
758 struct sockaddr_storage *save_addr = (struct sockaddr_storage *)msg->msg_name; in sock_sendmsg()
760 int save_len = msg->msg_namelen; in sock_sendmsg()
763 if (msg->msg_name) { in sock_sendmsg()
764 memcpy(&address, msg->msg_name, msg->msg_namelen); in sock_sendmsg()
765 msg->msg_name = &address; in sock_sendmsg()
769 msg->msg_name = save_addr; in sock_sendmsg()
770 msg->msg_namelen = save_len; in sock_sendmsg()
777 * kernel_sendmsg - send a message through @sock (kernel-space)
791 iov_iter_kvec(&msg->msg_iter, ITER_SOURCE, vec, num, size); in kernel_sendmsg()
797 * kernel_sendmsg_locked - send a message through @sock (kernel-space)
812 struct socket *sock = sk->sk_socket; in kernel_sendmsg_locked()
813 const struct proto_ops *ops = READ_ONCE(sock->ops); in kernel_sendmsg_locked()
815 if (!ops->sendmsg_locked) in kernel_sendmsg_locked()
818 iov_iter_kvec(&msg->msg_iter, ITER_SOURCE, vec, num, size); in kernel_sendmsg_locked()
820 return ops->sendmsg_locked(sk, msg, msg_data_left(msg)); in kernel_sendmsg_locked()
831 return skb->pkt_type == PACKET_OUTGOING; in skb_is_err_queue()
844 return skb->tstamp && !false_tstamp && skb_is_err_queue(skb); in skb_is_swtx_tstamp()
849 bool cycles = READ_ONCE(sk->sk_tsflags) & SOF_TIMESTAMPING_BIND_PHC; in get_timestamp()
857 *if_index = orig_dev->ifindex; in get_timestamp()
860 hwtstamp = shhwtstamps->hwtstamp; in get_timestamp()
882 if_index = orig_dev->ifindex; in put_ts_pktinfo()
887 ts_pktinfo.pkt_length = skb->len - skb_mac_offset(skb); in put_ts_pktinfo()
910 if (need_software_tstamp && skb->tstamp == 0) { in __sock_recv_timestamp()
948 tsflags = READ_ONCE(sk->sk_tsflags); in __sock_recv_timestamp()
950 ktime_to_timespec64_cond(skb->tstamp, tss.ts + 0)) in __sock_recv_timestamp()
956 if (skb_shinfo(skb)->tx_flags & SKBTX_HW_TSTAMP_NETDEV) in __sock_recv_timestamp()
959 hwtstamp = shhwtstamps->hwtstamp; in __sock_recv_timestamp()
963 READ_ONCE(sk->sk_bind_phc)); in __sock_recv_timestamp()
979 if (skb_is_err_queue(skb) && skb->len && in __sock_recv_timestamp()
980 SKB_EXT_ERR(skb)->opt_stats) in __sock_recv_timestamp()
982 skb->len, skb->data); in __sock_recv_timestamp()
995 if (!skb->wifi_acked_valid) in __sock_recv_wifi_status()
998 ack = skb->wifi_acked; in __sock_recv_wifi_status()
1008 if (sock_flag(sk, SOCK_RXQ_OVFL) && skb && SOCK_SKB_CB(skb)->dropcount) in sock_recv_drops()
1010 sizeof(__u32), &SOCK_SKB_CB(skb)->dropcount); in sock_recv_drops()
1018 __u32 mark = skb->mark; in sock_recv_mark()
1046 int ret = INDIRECT_CALL_INET(READ_ONCE(sock->ops)->recvmsg, in sock_recvmsg_nosec()
1051 call_trace_sock_recv_length(sock->sk, ret, flags); in sock_recvmsg_nosec()
1056 * sock_recvmsg - receive a message from @sock
1073 * kernel_recvmsg - Receive a message from a socket (kernel space)
1091 msg->msg_control_is_user = false; in kernel_recvmsg()
1092 iov_iter_kvec(&msg->msg_iter, ITER_DEST, vec, num, size); in kernel_recvmsg()
1101 struct socket *sock = file->private_data; in sock_splice_read()
1104 ops = READ_ONCE(sock->ops); in sock_splice_read()
1105 if (unlikely(!ops->splice_read)) in sock_splice_read()
1108 return ops->splice_read(sock, ppos, pipe, len, flags); in sock_splice_read()
1113 struct socket *sock = file->private_data; in sock_splice_eof()
1116 ops = READ_ONCE(sock->ops); in sock_splice_eof()
1117 if (ops->splice_eof) in sock_splice_eof()
1118 ops->splice_eof(sock); in sock_splice_eof()
1123 struct file *file = iocb->ki_filp; in sock_read_iter()
1124 struct socket *sock = file->private_data; in sock_read_iter()
1129 if (file->f_flags & O_NONBLOCK || (iocb->ki_flags & IOCB_NOWAIT)) in sock_read_iter()
1132 if (iocb->ki_pos != 0) in sock_read_iter()
1133 return -ESPIPE; in sock_read_iter()
1145 struct file *file = iocb->ki_filp; in sock_write_iter()
1146 struct socket *sock = file->private_data; in sock_write_iter()
1151 if (iocb->ki_pos != 0) in sock_write_iter()
1152 return -ESPIPE; in sock_write_iter()
1154 if (file->f_flags & O_NONBLOCK || (iocb->ki_flags & IOCB_NOWAIT)) in sock_write_iter()
1157 if (sock->type == SOCK_SEQPACKET) in sock_write_iter()
1188 int err = -ENOPKG; in br_ioctl_call()
1215 const struct proto_ops *ops = READ_ONCE(sock->ops); in sock_do_ioctl()
1222 err = ops->ioctl(sock, cmd, arg); in sock_do_ioctl()
1228 if (err != -ENOIOCTLCMD) in sock_do_ioctl()
1232 return -ENOTTY; in sock_do_ioctl()
1235 return -EFAULT; in sock_do_ioctl()
1239 return -EFAULT; in sock_do_ioctl()
1246 * what to do with it - that's up to the protocol still.
1258 sock = file->private_data; in sock_ioctl()
1259 ops = READ_ONCE(sock->ops); in sock_ioctl()
1260 sk = sock->sk; in sock_ioctl()
1267 return -EFAULT; in sock_ioctl()
1271 return -EFAULT; in sock_ioctl()
1281 err = -EFAULT; in sock_ioctl()
1284 err = f_setown(sock->file, pid, 1); in sock_ioctl()
1288 err = put_user(f_getown(sock->file), in sock_ioctl()
1299 err = -ENOPKG; in sock_ioctl()
1309 err = -EPERM; in sock_ioctl()
1310 if (!ns_capable(net->user_ns, CAP_NET_ADMIN)) in sock_ioctl()
1313 err = open_related_ns(&net->ns, get_net_ns); in sock_ioctl()
1317 if (!ops->gettstamp) { in sock_ioctl()
1318 err = -ENOIOCTLCMD; in sock_ioctl()
1321 err = ops->gettstamp(sock, argp, in sock_ioctl()
1327 if (!ops->gettstamp) { in sock_ioctl()
1328 err = -ENOIOCTLCMD; in sock_ioctl()
1331 err = ops->gettstamp(sock, argp, in sock_ioctl()
1348 * sock_create_lite - creates a socket
1371 err = -ENOMEM; in sock_create_lite()
1375 sock->type = type; in sock_create_lite()
1390 /* No kernel lock held - perfect */
1393 struct socket *sock = file->private_data; in sock_poll()
1394 const struct proto_ops *ops = READ_ONCE(sock->ops); in sock_poll()
1397 if (!ops->poll) in sock_poll()
1400 if (sk_can_busy_loop(sock->sk)) { in sock_poll()
1403 sk_busy_loop(sock->sk, 1); in sock_poll()
1409 return ops->poll(file, sock, wait) | flag; in sock_poll()
1414 struct socket *sock = file->private_data; in sock_mmap()
1416 return READ_ONCE(sock->ops)->mmap(file, sock, vma); in sock_mmap()
1432 * 2. fasync_list is used under read_lock(&sk->sk_callback_lock)
1438 struct socket *sock = filp->private_data; in sock_fasync()
1439 struct sock *sk = sock->sk; in sock_fasync()
1440 struct socket_wq *wq = &sock->wq; in sock_fasync()
1443 return -EINVAL; in sock_fasync()
1446 fasync_helper(fd, filp, on, &wq->fasync_list); in sock_fasync()
1448 if (!wq->fasync_list) in sock_fasync()
1461 if (!wq || !wq->fasync_list) in sock_wake_async()
1462 return -1; in sock_wake_async()
1466 if (test_bit(SOCKWQ_ASYNC_WAITDATA, &wq->flags)) in sock_wake_async()
1470 if (!test_and_clear_bit(SOCKWQ_ASYNC_NOSPACE, &wq->flags)) in sock_wake_async()
1475 kill_fasync(&wq->fasync_list, SIGIO, band); in sock_wake_async()
1478 kill_fasync(&wq->fasync_list, SIGURG, band); in sock_wake_async()
1486 * __sock_create - creates a socket
1511 return -EAFNOSUPPORT; in __sock_create()
1513 return -EINVAL; in __sock_create()
1522 current->comm); in __sock_create()
1538 return -ENFILE; /* Not exactly a match, but its the in __sock_create()
1542 sock->type = type; in __sock_create()
1548 * requested real, full-featured networking support upon configuration. in __sock_create()
1552 request_module("net-pf-%d", family); in __sock_create()
1557 err = -EAFNOSUPPORT; in __sock_create()
1562 * We will call the ->create function, that possibly is in a loadable in __sock_create()
1565 if (!try_module_get(pf->owner)) in __sock_create()
1571 err = pf->create(net, sock, protocol, kern); in __sock_create()
1579 if (!try_module_get(sock->ops->owner)) in __sock_create()
1583 * Now that we're done with the ->create function, the [loadable] in __sock_create()
1586 module_put(pf->owner); in __sock_create()
1595 err = -EAFNOSUPPORT; in __sock_create()
1597 sock->ops = NULL; in __sock_create()
1598 module_put(pf->owner); in __sock_create()
1610 * sock_create - creates a socket
1622 return __sock_create(current->nsproxy->net_ns, family, type, protocol, res, 0); in sock_create()
1627 * sock_create_kern - creates a socket (kernel space)
1656 return ERR_PTR(-EINVAL); in __sys_socket_create()
1736 return -EINVAL; in __sys_socketpair()
1786 err = READ_ONCE(sock1->ops)->socketpair(sock1, sock2); in __sys_socketpair()
1847 err = READ_ONCE(sock->ops)->bind(sock, in __sys_bind()
1851 fput_light(sock->file, fput_needed); in __sys_bind()
1875 somaxconn = READ_ONCE(sock_net(sock->sk)->core.sysctl_somaxconn); in __sys_listen()
1881 err = READ_ONCE(sock->ops)->listen(sock, backlog); in __sys_listen()
1883 fput_light(sock->file, fput_needed); in __sys_listen()
1905 return ERR_PTR(-ENOTSOCK); in do_accept()
1909 return ERR_PTR(-ENFILE); in do_accept()
1910 ops = READ_ONCE(sock->ops); in do_accept()
1912 newsock->type = sock->type; in do_accept()
1913 newsock->ops = ops; in do_accept()
1917 * has the protocol module (sock->ops->owner) held. in do_accept()
1919 __module_get(ops->owner); in do_accept()
1921 newfile = sock_alloc_file(newsock, flags, sock->sk->sk_prot_creator->name); in do_accept()
1929 err = ops->accept(sock, newsock, sock->file->f_flags | file_flags, in do_accept()
1935 len = ops->getname(newsock, (struct sockaddr *)&address, 2); in do_accept()
1937 err = -ECONNABORTED; in do_accept()
1960 return -EINVAL; in __sys_accept4_file()
1994 int ret = -EBADF; in __sys_accept4()
2028 * include the -EINPROGRESS status for such sockets.
2039 err = -ENOTSOCK; in __sys_connect_file()
2048 err = READ_ONCE(sock->ops)->connect(sock, (struct sockaddr *)address, in __sys_connect_file()
2049 addrlen, sock->file->f_flags | file_flags); in __sys_connect_file()
2056 int ret = -EBADF; in __sys_connect()
2098 err = READ_ONCE(sock->ops)->getname(sock, (struct sockaddr *)&address, 0); in __sys_getsockname()
2105 fput_light(sock->file, fput_needed); in __sys_getsockname()
2130 const struct proto_ops *ops = READ_ONCE(sock->ops); in __sys_getpeername()
2134 fput_light(sock->file, fput_needed); in __sys_getpeername()
2138 err = ops->getname(sock, (struct sockaddr *)&address, 1); in __sys_getpeername()
2143 fput_light(sock->file, fput_needed); in __sys_getpeername()
2188 if (sock->file->f_flags & O_NONBLOCK) in __sys_sendto()
2194 fput_light(sock->file, fput_needed); in __sys_sendto()
2240 if (sock->file->f_flags & O_NONBLOCK) in __sys_recvfrom()
2251 fput_light(sock->file, fput_needed); in __sys_recvfrom()
2275 return test_bit(SOCK_CUSTOM_SOCKOPT, &sock->flags); in sock_use_custom_sol_socket()
2286 return -EINVAL; in do_sock_setsockopt()
2293 err = BPF_CGROUP_RUN_PROG_SETSOCKOPT(sock->sk, &level, &optname, in do_sock_setsockopt()
2305 ops = READ_ONCE(sock->ops); in do_sock_setsockopt()
2308 else if (unlikely(!ops->setsockopt)) in do_sock_setsockopt()
2309 err = -EOPNOTSUPP; in do_sock_setsockopt()
2311 err = ops->setsockopt(sock, level, optname, optval, in do_sock_setsockopt()
2336 fput_light(sock->file, fput_needed); in __sys_setsockopt()
2363 ops = READ_ONCE(sock->ops); in do_sock_getsockopt()
2365 err = sk_getsockopt(sock->sk, level, optname, optval, optlen); in do_sock_getsockopt()
2366 } else if (unlikely(!ops->getsockopt)) { in do_sock_getsockopt()
2367 err = -EOPNOTSUPP; in do_sock_getsockopt()
2371 return -EOPNOTSUPP; in do_sock_getsockopt()
2373 err = ops->getsockopt(sock, level, optname, optval.user, in do_sock_getsockopt()
2378 err = BPF_CGROUP_RUN_PROG_GETSOCKOPT(sock->sk, level, optname, in do_sock_getsockopt()
2405 fput_light(sock->file, fput_needed); in __sys_getsockopt()
2425 err = READ_ONCE(sock->ops)->shutdown(sock, how); in __sys_shutdown_sock()
2438 fput_light(sock->file, fput_needed); in __sys_shutdown()
2451 #define COMPAT_MSG(msg, member) ((MSG_CMSG_COMPAT & flags) ? &msg##_compat->member : &msg->member)
2466 kmsg->msg_control_is_user = true; in __copy_msghdr()
2467 kmsg->msg_get_inq = 0; in __copy_msghdr()
2468 kmsg->msg_control_user = msg->msg_control; in __copy_msghdr()
2469 kmsg->msg_controllen = msg->msg_controllen; in __copy_msghdr()
2470 kmsg->msg_flags = msg->msg_flags; in __copy_msghdr()
2472 kmsg->msg_namelen = msg->msg_namelen; in __copy_msghdr()
2473 if (!msg->msg_name) in __copy_msghdr()
2474 kmsg->msg_namelen = 0; in __copy_msghdr()
2476 if (kmsg->msg_namelen < 0) in __copy_msghdr()
2477 return -EINVAL; in __copy_msghdr()
2479 if (kmsg->msg_namelen > sizeof(struct sockaddr_storage)) in __copy_msghdr()
2480 kmsg->msg_namelen = sizeof(struct sockaddr_storage); in __copy_msghdr()
2483 *save_addr = msg->msg_name; in __copy_msghdr()
2485 if (msg->msg_name && kmsg->msg_namelen) { in __copy_msghdr()
2487 err = move_addr_to_kernel(msg->msg_name, in __copy_msghdr()
2488 kmsg->msg_namelen, in __copy_msghdr()
2489 kmsg->msg_name); in __copy_msghdr()
2494 kmsg->msg_name = NULL; in __copy_msghdr()
2495 kmsg->msg_namelen = 0; in __copy_msghdr()
2498 if (msg->msg_iovlen > UIO_MAXIOV) in __copy_msghdr()
2499 return -EMSGSIZE; in __copy_msghdr()
2501 kmsg->msg_iocb = NULL; in __copy_msghdr()
2502 kmsg->msg_ubuf = NULL; in __copy_msghdr()
2515 return -EFAULT; in copy_msghdr_from_user()
2523 UIO_FASTIOV, iov, &kmsg->msg_iter); in copy_msghdr_from_user()
2538 err = -ENOBUFS; in ____sys_sendmsg()
2540 if (msg_sys->msg_controllen > INT_MAX) in ____sys_sendmsg()
2542 flags |= (msg_sys->msg_flags & allowed_msghdr_flags); in ____sys_sendmsg()
2543 ctl_len = msg_sys->msg_controllen; in ____sys_sendmsg()
2546 cmsghdr_from_user_compat_to_kern(msg_sys, sock->sk, ctl, in ____sys_sendmsg()
2550 ctl_buf = msg_sys->msg_control; in ____sys_sendmsg()
2551 ctl_len = msg_sys->msg_controllen; in ____sys_sendmsg()
2556 ctl_buf = sock_kmalloc(sock->sk, ctl_len, GFP_KERNEL); in ____sys_sendmsg()
2560 err = -EFAULT; in ____sys_sendmsg()
2561 if (copy_from_user(ctl_buf, msg_sys->msg_control_user, ctl_len)) in ____sys_sendmsg()
2563 msg_sys->msg_control = ctl_buf; in ____sys_sendmsg()
2564 msg_sys->msg_control_is_user = false; in ____sys_sendmsg()
2567 msg_sys->msg_flags = flags; in ____sys_sendmsg()
2569 if (sock->file->f_flags & O_NONBLOCK) in ____sys_sendmsg()
2570 msg_sys->msg_flags |= MSG_DONTWAIT; in ____sys_sendmsg()
2574 * used_address->name_len is initialized to UINT_MAX so that the first in ____sys_sendmsg()
2577 if (used_address && msg_sys->msg_name && in ____sys_sendmsg()
2578 used_address->name_len == msg_sys->msg_namelen && in ____sys_sendmsg()
2579 !memcmp(&used_address->name, msg_sys->msg_name, in ____sys_sendmsg()
2580 used_address->name_len)) { in ____sys_sendmsg()
2590 used_address->name_len = msg_sys->msg_namelen; in ____sys_sendmsg()
2591 if (msg_sys->msg_name) in ____sys_sendmsg()
2592 memcpy(&used_address->name, msg_sys->msg_name, in ____sys_sendmsg()
2593 used_address->name_len); in ____sys_sendmsg()
2598 sock_kfree_s(sock->sk, ctl_buf, ctl_len); in ____sys_sendmsg()
2632 msg_sys->msg_name = &address; in ___sys_sendmsg()
2661 return -EINVAL; in __sys_sendmsg()
2669 fput_light(sock->file, fput_needed); in __sys_sendmsg()
2695 return -EINVAL; in __sys_sendmmsg()
2713 if (datagrams == vlen - 1) in __sys_sendmmsg()
2721 err = __put_user(err, &compat_entry->msg_len); in __sys_sendmmsg()
2729 err = put_user(err, &entry->msg_len); in __sys_sendmmsg()
2741 fput_light(sock->file, fput_needed); in __sys_sendmmsg()
2790 msg_sys->msg_name = &addr; in ____sys_recvmsg()
2791 cmsg_ptr = (unsigned long)msg_sys->msg_control; in ____sys_recvmsg()
2792 msg_sys->msg_flags = flags & (MSG_CMSG_CLOEXEC|MSG_CMSG_COMPAT); in ____sys_recvmsg()
2795 msg_sys->msg_namelen = 0; in ____sys_recvmsg()
2797 if (sock->file->f_flags & O_NONBLOCK) in ____sys_recvmsg()
2811 msg_sys->msg_namelen, uaddr, in ____sys_recvmsg()
2816 err = __put_user((msg_sys->msg_flags & ~MSG_CMSG_COMPAT), in ____sys_recvmsg()
2821 err = __put_user((unsigned long)msg_sys->msg_control - cmsg_ptr, in ____sys_recvmsg()
2822 &msg_compat->msg_controllen); in ____sys_recvmsg()
2824 err = __put_user((unsigned long)msg_sys->msg_control - cmsg_ptr, in ____sys_recvmsg()
2825 &msg->msg_controllen); in ____sys_recvmsg()
2869 return -EINVAL; in __sys_recvmsg()
2877 fput_light(sock->file, fput_needed); in __sys_recvmsg()
2905 poll_select_set_timeout(&end_time, timeout->tv_sec, in do_recvmmsg()
2906 timeout->tv_nsec)) in do_recvmmsg()
2907 return -EINVAL; in do_recvmmsg()
2916 err = sock_error(sock->sk); in do_recvmmsg()
2936 err = __put_user(err, &compat_entry->msg_len); in do_recvmmsg()
2945 err = put_user(err, &entry->msg_len); in do_recvmmsg()
2960 if (timeout->tv_sec < 0) { in do_recvmmsg()
2961 timeout->tv_sec = timeout->tv_nsec = 0; in do_recvmmsg()
2966 if (timeout->tv_nsec == 0 && timeout->tv_sec == 0) in do_recvmmsg()
2988 if (err != -EAGAIN) { in do_recvmmsg()
2995 WRITE_ONCE(sock->sk->sk_err, -err); in do_recvmmsg()
2998 fput_light(sock->file, fput_needed); in do_recvmmsg()
3012 return -EFAULT; in __sys_recvmmsg()
3015 return -EFAULT; in __sys_recvmmsg()
3026 datagrams = -EFAULT; in __sys_recvmmsg()
3029 datagrams = -EFAULT; in __sys_recvmmsg()
3039 return -EINVAL; in SYSCALL_DEFINE5()
3050 return -EINVAL; in SYSCALL_DEFINE5()
3084 return -EINVAL; in SYSCALL_DEFINE2()
3089 return -EINVAL; in SYSCALL_DEFINE2()
3093 return -EFAULT; in SYSCALL_DEFINE2()
3189 err = -EINVAL; in SYSCALL_DEFINE2()
3198 * sock_register - add a socket protocol handler
3203 * socket interface. The value ops->family corresponds to the
3210 if (ops->family >= NPROTO) { in sock_register()
3211 pr_crit("protocol %d >= NPROTO(%d)\n", ops->family, NPROTO); in sock_register()
3212 return -ENOBUFS; in sock_register()
3216 if (rcu_dereference_protected(net_families[ops->family], in sock_register()
3218 err = -EEXIST; in sock_register()
3220 rcu_assign_pointer(net_families[ops->family], ops); in sock_register()
3225 pr_info("NET: Registered %s protocol family\n", pf_family_names[ops->family]); in sock_register()
3231 * sock_unregister - remove a protocol handler
3241 * the ops->create routine.
3317 sock_inuse_get(seq->private)); in socket_seq_show()
3324 * ifreq::ifru_ifmap (which is 16 bytes on 32 bit, 24 bytes on 64-bit,
3337 return -EFAULT; in get_user_ifreq()
3340 *ifrdata = compat_ptr(ifr32->ifr_data); in get_user_ifreq()
3346 return -EFAULT; in get_user_ifreq()
3349 *ifrdata = ifr->ifr_data; in get_user_ifreq()
3363 return -EFAULT; in put_user_ifreq()
3378 return -EFAULT; in compat_siocwandev()
3380 if (get_user(uptr32, &uifr32->ifr_settings.ifs_ifsu)) in compat_siocwandev()
3381 return -EFAULT; in compat_siocwandev()
3390 err = -EFAULT; in compat_siocwandev()
3403 return -ENOTTY; in compat_ifr_data_ioctl()
3405 return -EFAULT; in compat_ifr_data_ioctl()
3415 struct sock *sk = sock->sk; in compat_sock_ioctl_trans()
3427 ops = READ_ONCE(sock->ops); in compat_sock_ioctl_trans()
3428 if (!ops->gettstamp) in compat_sock_ioctl_trans()
3429 return -ENOIOCTLCMD; in compat_sock_ioctl_trans()
3430 return ops->gettstamp(sock, argp, cmd == SIOCGSTAMP_OLD, in compat_sock_ioctl_trans()
3505 return -ENOIOCTLCMD; in compat_sock_ioctl_trans()
3511 struct socket *sock = file->private_data; in compat_sock_ioctl()
3512 const struct proto_ops *ops = READ_ONCE(sock->ops); in compat_sock_ioctl()
3513 int ret = -ENOIOCTLCMD; in compat_sock_ioctl()
3517 sk = sock->sk; in compat_sock_ioctl()
3520 if (ops->compat_ioctl) in compat_sock_ioctl()
3521 ret = ops->compat_ioctl(sock, cmd, arg); in compat_sock_ioctl()
3523 if (ret == -ENOIOCTLCMD && in compat_sock_ioctl()
3527 if (ret == -ENOIOCTLCMD) in compat_sock_ioctl()
3535 * kernel_bind - bind an address to a socket (kernel space)
3549 return READ_ONCE(sock->ops)->bind(sock, (struct sockaddr *)&address, in kernel_bind()
3555 * kernel_listen - move socket to listening state (kernel space)
3564 return READ_ONCE(sock->ops)->listen(sock, backlog); in kernel_listen()
3569 * kernel_accept - accept a connection (kernel space)
3581 struct sock *sk = sock->sk; in kernel_accept()
3582 const struct proto_ops *ops = READ_ONCE(sock->ops); in kernel_accept()
3585 err = sock_create_lite(sk->sk_family, sk->sk_type, sk->sk_protocol, in kernel_accept()
3590 err = ops->accept(sock, *newsock, flags, true); in kernel_accept()
3597 (*newsock)->ops = ops; in kernel_accept()
3598 __module_get(ops->owner); in kernel_accept()
3606 * kernel_connect - connect a socket (kernel space)
3625 return READ_ONCE(sock->ops)->connect(sock, (struct sockaddr *)&address, in kernel_connect()
3631 * kernel_getsockname - get the address which the socket is bound (kernel space)
3641 return READ_ONCE(sock->ops)->getname(sock, addr, 0); in kernel_getsockname()
3646 * kernel_getpeername - get the address which the socket is connected (kernel space)
3656 return READ_ONCE(sock->ops)->getname(sock, addr, 1); in kernel_getpeername()
3661 * kernel_sock_shutdown - shut down part of a full-duplex connection (kernel space)
3670 return READ_ONCE(sock->ops)->shutdown(sock, how); in kernel_sock_shutdown()
3675 * kernel_sock_ip_overhead - returns the IP overhead imposed by a socket
3697 switch (sk->sk_family) { in kernel_sock_ip_overhead()
3701 opt = rcu_dereference_protected(inet->inet_opt, in kernel_sock_ip_overhead()
3704 overhead += opt->opt.optlen; in kernel_sock_ip_overhead()
3711 optv6 = rcu_dereference_protected(np->opt, in kernel_sock_ip_overhead()
3714 overhead += (optv6->opt_flen + optv6->opt_nflen); in kernel_sock_ip_overhead()