mv643xx_eth: set sane default receive coalescing timeout
[deliverable/linux.git] / net / socket.c
CommitLineData
1da177e4
LT
1/*
2 * NET An implementation of the SOCKET network access protocol.
3 *
4 * Version: @(#)socket.c 1.1.93 18/02/95
5 *
6 * Authors: Orest Zborowski, <obz@Kodak.COM>
02c30a84 7 * Ross Biro
1da177e4
LT
8 * Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
9 *
10 * Fixes:
11 * Anonymous : NOTSOCK/BADF cleanup. Error fix in
12 * shutdown()
13 * Alan Cox : verify_area() fixes
14 * Alan Cox : Removed DDI
15 * Jonathan Kamens : SOCK_DGRAM reconnect bug
16 * Alan Cox : Moved a load of checks to the very
17 * top level.
18 * Alan Cox : Move address structures to/from user
19 * mode above the protocol layers.
20 * Rob Janssen : Allow 0 length sends.
21 * Alan Cox : Asynchronous I/O support (cribbed from the
22 * tty drivers).
23 * Niibe Yutaka : Asynchronous I/O for writes (4.4BSD style)
24 * Jeff Uphoff : Made max number of sockets command-line
25 * configurable.
26 * Matti Aarnio : Made the number of sockets dynamic,
27 * to be allocated when needed, and mr.
28 * Uphoff's max is used as max to be
29 * allowed to allocate.
30 * Linus : Argh. removed all the socket allocation
31 * altogether: it's in the inode now.
32 * Alan Cox : Made sock_alloc()/sock_release() public
33 * for NetROM and future kernel nfsd type
34 * stuff.
35 * Alan Cox : sendmsg/recvmsg basics.
36 * Tom Dyas : Export net symbols.
37 * Marcin Dalecki : Fixed problems with CONFIG_NET="n".
38 * Alan Cox : Added thread locking to sys_* calls
39 * for sockets. May have errors at the
40 * moment.
41 * Kevin Buhr : Fixed the dumb errors in the above.
42 * Andi Kleen : Some small cleanups, optimizations,
43 * and fixed a copy_from_user() bug.
44 * Tigran Aivazian : sys_send(args) calls sys_sendto(args, NULL, 0)
89bddce5 45 * Tigran Aivazian : Made listen(2) backlog sanity checks
1da177e4
LT
46 * protocol-independent
47 *
48 *
49 * This program is free software; you can redistribute it and/or
50 * modify it under the terms of the GNU General Public License
51 * as published by the Free Software Foundation; either version
52 * 2 of the License, or (at your option) any later version.
53 *
54 *
55 * This module is effectively the top level interface to the BSD socket
89bddce5 56 * paradigm.
1da177e4
LT
57 *
58 * Based upon Swansea University Computer Society NET3.039
59 */
60
1da177e4 61#include <linux/mm.h>
1da177e4
LT
62#include <linux/socket.h>
63#include <linux/file.h>
64#include <linux/net.h>
65#include <linux/interrupt.h>
aaca0bdc 66#include <linux/thread_info.h>
55737fda 67#include <linux/rcupdate.h>
1da177e4
LT
68#include <linux/netdevice.h>
69#include <linux/proc_fs.h>
70#include <linux/seq_file.h>
4a3e2f71 71#include <linux/mutex.h>
1da177e4
LT
72#include <linux/wanrouter.h>
73#include <linux/if_bridge.h>
20380731
ACM
74#include <linux/if_frad.h>
75#include <linux/if_vlan.h>
1da177e4
LT
76#include <linux/init.h>
77#include <linux/poll.h>
78#include <linux/cache.h>
79#include <linux/module.h>
80#include <linux/highmem.h>
1da177e4
LT
81#include <linux/mount.h>
82#include <linux/security.h>
83#include <linux/syscalls.h>
84#include <linux/compat.h>
85#include <linux/kmod.h>
3ec3b2fb 86#include <linux/audit.h>
d86b5e0e 87#include <linux/wireless.h>
1b8d7ae4 88#include <linux/nsproxy.h>
1da177e4
LT
89
90#include <asm/uaccess.h>
91#include <asm/unistd.h>
92
93#include <net/compat.h>
87de87d5 94#include <net/wext.h>
1da177e4
LT
95
96#include <net/sock.h>
97#include <linux/netfilter.h>
98
99static int sock_no_open(struct inode *irrelevant, struct file *dontcare);
027445c3
BP
100static ssize_t sock_aio_read(struct kiocb *iocb, const struct iovec *iov,
101 unsigned long nr_segs, loff_t pos);
102static ssize_t sock_aio_write(struct kiocb *iocb, const struct iovec *iov,
103 unsigned long nr_segs, loff_t pos);
89bddce5 104static int sock_mmap(struct file *file, struct vm_area_struct *vma);
1da177e4
LT
105
106static int sock_close(struct inode *inode, struct file *file);
107static unsigned int sock_poll(struct file *file,
108 struct poll_table_struct *wait);
89bddce5 109static long sock_ioctl(struct file *file, unsigned int cmd, unsigned long arg);
89bbfc95
SP
110#ifdef CONFIG_COMPAT
111static long compat_sock_ioctl(struct file *file,
89bddce5 112 unsigned int cmd, unsigned long arg);
89bbfc95 113#endif
1da177e4 114static int sock_fasync(int fd, struct file *filp, int on);
1da177e4
LT
115static ssize_t sock_sendpage(struct file *file, struct page *page,
116 int offset, size_t size, loff_t *ppos, int more);
9c55e01c
JA
117static ssize_t sock_splice_read(struct file *file, loff_t *ppos,
118 struct pipe_inode_info *pipe, size_t len,
119 unsigned int flags);
1da177e4 120
1da177e4
LT
121/*
122 * Socket files have a set of 'special' operations as well as the generic file ones. These don't appear
123 * in the operation structures but are done directly via the socketcall() multiplexor.
124 */
125
da7071d7 126static const struct file_operations socket_file_ops = {
1da177e4
LT
127 .owner = THIS_MODULE,
128 .llseek = no_llseek,
129 .aio_read = sock_aio_read,
130 .aio_write = sock_aio_write,
131 .poll = sock_poll,
132 .unlocked_ioctl = sock_ioctl,
89bbfc95
SP
133#ifdef CONFIG_COMPAT
134 .compat_ioctl = compat_sock_ioctl,
135#endif
1da177e4
LT
136 .mmap = sock_mmap,
137 .open = sock_no_open, /* special open code to disallow open via /proc */
138 .release = sock_close,
139 .fasync = sock_fasync,
5274f052
JA
140 .sendpage = sock_sendpage,
141 .splice_write = generic_splice_sendpage,
9c55e01c 142 .splice_read = sock_splice_read,
1da177e4
LT
143};
144
145/*
146 * The protocol list. Each protocol is registered in here.
147 */
148
1da177e4 149static DEFINE_SPINLOCK(net_family_lock);
f0fd27d4 150static const struct net_proto_family *net_families[NPROTO] __read_mostly;
1da177e4 151
1da177e4
LT
152/*
153 * Statistics counters of the socket lists
154 */
155
156static DEFINE_PER_CPU(int, sockets_in_use) = 0;
157
158/*
89bddce5
SH
159 * Support routines.
160 * Move socket addresses back and forth across the kernel/user
161 * divide and look after the messy bits.
1da177e4
LT
162 */
163
89bddce5 164#define MAX_SOCK_ADDR 128 /* 108 for Unix domain -
1da177e4
LT
165 16 for IP, 16 for IPX,
166 24 for IPv6,
89bddce5 167 about 80 for AX.25
1da177e4
LT
168 must be at least one bigger than
169 the AF_UNIX size (see net/unix/af_unix.c
89bddce5 170 :unix_mkname()).
1da177e4 171 */
89bddce5 172
1da177e4
LT
173/**
174 * move_addr_to_kernel - copy a socket address into kernel space
175 * @uaddr: Address in user space
176 * @kaddr: Address in kernel space
177 * @ulen: Length in user space
178 *
179 * The address is copied into kernel space. If the provided address is
180 * too long an error code of -EINVAL is returned. If the copy gives
181 * invalid addresses -EFAULT is returned. On a success 0 is returned.
182 */
183
230b1839 184int move_addr_to_kernel(void __user *uaddr, int ulen, struct sockaddr *kaddr)
1da177e4 185{
230b1839 186 if (ulen < 0 || ulen > sizeof(struct sockaddr_storage))
1da177e4 187 return -EINVAL;
89bddce5 188 if (ulen == 0)
1da177e4 189 return 0;
89bddce5 190 if (copy_from_user(kaddr, uaddr, ulen))
1da177e4 191 return -EFAULT;
3ec3b2fb 192 return audit_sockaddr(ulen, kaddr);
1da177e4
LT
193}
194
195/**
196 * move_addr_to_user - copy an address to user space
197 * @kaddr: kernel space address
198 * @klen: length of address in kernel
199 * @uaddr: user space address
200 * @ulen: pointer to user length field
201 *
202 * The value pointed to by ulen on entry is the buffer length available.
203 * This is overwritten with the buffer space used. -EINVAL is returned
204 * if an overlong buffer is specified or a negative buffer size. -EFAULT
205 * is returned if either the buffer or the length field are not
206 * accessible.
207 * After copying the data up to the limit the user specifies, the true
208 * length of the data is written over the length limit the user
209 * specified. Zero is returned for a success.
210 */
89bddce5 211
230b1839 212int move_addr_to_user(struct sockaddr *kaddr, int klen, void __user *uaddr,
89bddce5 213 int __user *ulen)
1da177e4
LT
214{
215 int err;
216 int len;
217
89bddce5
SH
218 err = get_user(len, ulen);
219 if (err)
1da177e4 220 return err;
89bddce5
SH
221 if (len > klen)
222 len = klen;
230b1839 223 if (len < 0 || len > sizeof(struct sockaddr_storage))
1da177e4 224 return -EINVAL;
89bddce5 225 if (len) {
d6fe3945
SG
226 if (audit_sockaddr(klen, kaddr))
227 return -ENOMEM;
89bddce5 228 if (copy_to_user(uaddr, kaddr, len))
1da177e4
LT
229 return -EFAULT;
230 }
231 /*
89bddce5
SH
232 * "fromlen shall refer to the value before truncation.."
233 * 1003.1g
1da177e4
LT
234 */
235 return __put_user(klen, ulen);
236}
237
238#define SOCKFS_MAGIC 0x534F434B
239
e18b890b 240static struct kmem_cache *sock_inode_cachep __read_mostly;
1da177e4
LT
241
242static struct inode *sock_alloc_inode(struct super_block *sb)
243{
244 struct socket_alloc *ei;
89bddce5 245
e94b1766 246 ei = kmem_cache_alloc(sock_inode_cachep, GFP_KERNEL);
1da177e4
LT
247 if (!ei)
248 return NULL;
249 init_waitqueue_head(&ei->socket.wait);
89bddce5 250
1da177e4
LT
251 ei->socket.fasync_list = NULL;
252 ei->socket.state = SS_UNCONNECTED;
253 ei->socket.flags = 0;
254 ei->socket.ops = NULL;
255 ei->socket.sk = NULL;
256 ei->socket.file = NULL;
1da177e4
LT
257
258 return &ei->vfs_inode;
259}
260
261static void sock_destroy_inode(struct inode *inode)
262{
263 kmem_cache_free(sock_inode_cachep,
264 container_of(inode, struct socket_alloc, vfs_inode));
265}
266
51cc5068 267static void init_once(void *foo)
1da177e4 268{
89bddce5 269 struct socket_alloc *ei = (struct socket_alloc *)foo;
1da177e4 270
a35afb83 271 inode_init_once(&ei->vfs_inode);
1da177e4 272}
89bddce5 273
1da177e4
LT
274static int init_inodecache(void)
275{
276 sock_inode_cachep = kmem_cache_create("sock_inode_cache",
89bddce5
SH
277 sizeof(struct socket_alloc),
278 0,
279 (SLAB_HWCACHE_ALIGN |
280 SLAB_RECLAIM_ACCOUNT |
281 SLAB_MEM_SPREAD),
20c2df83 282 init_once);
1da177e4
LT
283 if (sock_inode_cachep == NULL)
284 return -ENOMEM;
285 return 0;
286}
287
288static struct super_operations sockfs_ops = {
289 .alloc_inode = sock_alloc_inode,
290 .destroy_inode =sock_destroy_inode,
291 .statfs = simple_statfs,
292};
293
454e2398 294static int sockfs_get_sb(struct file_system_type *fs_type,
89bddce5
SH
295 int flags, const char *dev_name, void *data,
296 struct vfsmount *mnt)
1da177e4 297{
454e2398
DH
298 return get_sb_pseudo(fs_type, "socket:", &sockfs_ops, SOCKFS_MAGIC,
299 mnt);
1da177e4
LT
300}
301
ba89966c 302static struct vfsmount *sock_mnt __read_mostly;
1da177e4
LT
303
304static struct file_system_type sock_fs_type = {
305 .name = "sockfs",
306 .get_sb = sockfs_get_sb,
307 .kill_sb = kill_anon_super,
308};
89bddce5 309
1da177e4
LT
310static int sockfs_delete_dentry(struct dentry *dentry)
311{
304e61e6
ED
312 /*
313 * At creation time, we pretended this dentry was hashed
314 * (by clearing DCACHE_UNHASHED bit in d_flags)
315 * At delete time, we restore the truth : not hashed.
316 * (so that dput() can proceed correctly)
317 */
318 dentry->d_flags |= DCACHE_UNHASHED;
319 return 0;
1da177e4 320}
c23fbb6b
ED
321
322/*
323 * sockfs_dname() is called from d_path().
324 */
325static char *sockfs_dname(struct dentry *dentry, char *buffer, int buflen)
326{
327 return dynamic_dname(dentry, buffer, buflen, "socket:[%lu]",
328 dentry->d_inode->i_ino);
329}
330
1da177e4 331static struct dentry_operations sockfs_dentry_operations = {
89bddce5 332 .d_delete = sockfs_delete_dentry,
c23fbb6b 333 .d_dname = sockfs_dname,
1da177e4
LT
334};
335
336/*
337 * Obtains the first available file descriptor and sets it up for use.
338 *
39d8c1b6
DM
339 * These functions create file structures and maps them to fd space
340 * of the current process. On success it returns file descriptor
1da177e4
LT
341 * and file struct implicitly stored in sock->file.
342 * Note that another thread may close file descriptor before we return
343 * from this function. We use the fact that now we do not refer
344 * to socket after mapping. If one day we will need it, this
345 * function will increment ref. count on file by 1.
346 *
347 * In any case returned fd MAY BE not valid!
348 * This race condition is unavoidable
349 * with shared fd spaces, we cannot solve it inside kernel,
350 * but we take care of internal coherence yet.
351 */
352
a677a039 353static int sock_alloc_fd(struct file **filep, int flags)
1da177e4
LT
354{
355 int fd;
1da177e4 356
a677a039 357 fd = get_unused_fd_flags(flags);
39d8c1b6 358 if (likely(fd >= 0)) {
1da177e4
LT
359 struct file *file = get_empty_filp();
360
39d8c1b6
DM
361 *filep = file;
362 if (unlikely(!file)) {
1da177e4 363 put_unused_fd(fd);
39d8c1b6 364 return -ENFILE;
1da177e4 365 }
39d8c1b6
DM
366 } else
367 *filep = NULL;
368 return fd;
369}
1da177e4 370
77d27200 371static int sock_attach_fd(struct socket *sock, struct file *file, int flags)
39d8c1b6 372{
ce8d2cdf 373 struct dentry *dentry;
c23fbb6b 374 struct qstr name = { .name = "" };
39d8c1b6 375
ce8d2cdf
DH
376 dentry = d_alloc(sock_mnt->mnt_sb->s_root, &name);
377 if (unlikely(!dentry))
39d8c1b6
DM
378 return -ENOMEM;
379
ce8d2cdf 380 dentry->d_op = &sockfs_dentry_operations;
304e61e6
ED
381 /*
382 * We dont want to push this dentry into global dentry hash table.
383 * We pretend dentry is already hashed, by unsetting DCACHE_UNHASHED
384 * This permits a working /proc/$pid/fd/XXX on sockets
385 */
ce8d2cdf
DH
386 dentry->d_flags &= ~DCACHE_UNHASHED;
387 d_instantiate(dentry, SOCK_INODE(sock));
39d8c1b6
DM
388
389 sock->file = file;
ce8d2cdf
DH
390 init_file(file, sock_mnt, dentry, FMODE_READ | FMODE_WRITE,
391 &socket_file_ops);
392 SOCK_INODE(sock)->i_fop = &socket_file_ops;
77d27200 393 file->f_flags = O_RDWR | (flags & O_NONBLOCK);
39d8c1b6
DM
394 file->f_pos = 0;
395 file->private_data = sock;
1da177e4 396
39d8c1b6
DM
397 return 0;
398}
399
a677a039 400int sock_map_fd(struct socket *sock, int flags)
39d8c1b6
DM
401{
402 struct file *newfile;
a677a039 403 int fd = sock_alloc_fd(&newfile, flags);
39d8c1b6
DM
404
405 if (likely(fd >= 0)) {
77d27200 406 int err = sock_attach_fd(sock, newfile, flags);
39d8c1b6
DM
407
408 if (unlikely(err < 0)) {
409 put_filp(newfile);
1da177e4 410 put_unused_fd(fd);
39d8c1b6 411 return err;
1da177e4 412 }
39d8c1b6 413 fd_install(fd, newfile);
1da177e4 414 }
1da177e4
LT
415 return fd;
416}
417
6cb153ca
BL
418static struct socket *sock_from_file(struct file *file, int *err)
419{
6cb153ca
BL
420 if (file->f_op == &socket_file_ops)
421 return file->private_data; /* set in sock_map_fd */
422
23bb80d2
ED
423 *err = -ENOTSOCK;
424 return NULL;
6cb153ca
BL
425}
426
1da177e4
LT
427/**
428 * sockfd_lookup - Go from a file number to its socket slot
429 * @fd: file handle
430 * @err: pointer to an error code return
431 *
432 * The file handle passed in is locked and the socket it is bound
433 * too is returned. If an error occurs the err pointer is overwritten
434 * with a negative errno code and NULL is returned. The function checks
435 * for both invalid handles and passing a handle which is not a socket.
436 *
437 * On a success the socket object pointer is returned.
438 */
439
440struct socket *sockfd_lookup(int fd, int *err)
441{
442 struct file *file;
1da177e4
LT
443 struct socket *sock;
444
89bddce5
SH
445 file = fget(fd);
446 if (!file) {
1da177e4
LT
447 *err = -EBADF;
448 return NULL;
449 }
89bddce5 450
6cb153ca
BL
451 sock = sock_from_file(file, err);
452 if (!sock)
1da177e4 453 fput(file);
6cb153ca
BL
454 return sock;
455}
1da177e4 456
6cb153ca
BL
457static struct socket *sockfd_lookup_light(int fd, int *err, int *fput_needed)
458{
459 struct file *file;
460 struct socket *sock;
461
3672558c 462 *err = -EBADF;
6cb153ca
BL
463 file = fget_light(fd, fput_needed);
464 if (file) {
465 sock = sock_from_file(file, err);
466 if (sock)
467 return sock;
468 fput_light(file, *fput_needed);
1da177e4 469 }
6cb153ca 470 return NULL;
1da177e4
LT
471}
472
473/**
474 * sock_alloc - allocate a socket
89bddce5 475 *
1da177e4
LT
476 * Allocate a new inode and socket object. The two are bound together
477 * and initialised. The socket is then returned. If we are out of inodes
478 * NULL is returned.
479 */
480
481static struct socket *sock_alloc(void)
482{
89bddce5
SH
483 struct inode *inode;
484 struct socket *sock;
1da177e4
LT
485
486 inode = new_inode(sock_mnt->mnt_sb);
487 if (!inode)
488 return NULL;
489
490 sock = SOCKET_I(inode);
491
89bddce5 492 inode->i_mode = S_IFSOCK | S_IRWXUGO;
8192b0c4
DH
493 inode->i_uid = current_fsuid();
494 inode->i_gid = current_fsgid();
1da177e4
LT
495
496 get_cpu_var(sockets_in_use)++;
497 put_cpu_var(sockets_in_use);
498 return sock;
499}
500
501/*
502 * In theory you can't get an open on this inode, but /proc provides
503 * a back door. Remember to keep it shut otherwise you'll let the
504 * creepy crawlies in.
505 */
89bddce5 506
1da177e4
LT
507static int sock_no_open(struct inode *irrelevant, struct file *dontcare)
508{
509 return -ENXIO;
510}
511
4b6f5d20 512const struct file_operations bad_sock_fops = {
1da177e4
LT
513 .owner = THIS_MODULE,
514 .open = sock_no_open,
515};
516
517/**
518 * sock_release - close a socket
519 * @sock: socket to close
520 *
521 * The socket is released from the protocol stack if it has a release
522 * callback, and the inode is then released if the socket is bound to
89bddce5 523 * an inode not a file.
1da177e4 524 */
89bddce5 525
1da177e4
LT
526void sock_release(struct socket *sock)
527{
528 if (sock->ops) {
529 struct module *owner = sock->ops->owner;
530
531 sock->ops->release(sock);
532 sock->ops = NULL;
533 module_put(owner);
534 }
535
536 if (sock->fasync_list)
537 printk(KERN_ERR "sock_release: fasync list not empty!\n");
538
539 get_cpu_var(sockets_in_use)--;
540 put_cpu_var(sockets_in_use);
541 if (!sock->file) {
542 iput(SOCK_INODE(sock));
543 return;
544 }
89bddce5 545 sock->file = NULL;
1da177e4
LT
546}
547
20d49473
PO
548int sock_tx_timestamp(struct msghdr *msg, struct sock *sk,
549 union skb_shared_tx *shtx)
550{
551 shtx->flags = 0;
552 if (sock_flag(sk, SOCK_TIMESTAMPING_TX_HARDWARE))
553 shtx->hardware = 1;
554 if (sock_flag(sk, SOCK_TIMESTAMPING_TX_SOFTWARE))
555 shtx->software = 1;
556 return 0;
557}
558EXPORT_SYMBOL(sock_tx_timestamp);
559
89bddce5 560static inline int __sock_sendmsg(struct kiocb *iocb, struct socket *sock,
1da177e4
LT
561 struct msghdr *msg, size_t size)
562{
563 struct sock_iocb *si = kiocb_to_siocb(iocb);
564 int err;
565
566 si->sock = sock;
567 si->scm = NULL;
568 si->msg = msg;
569 si->size = size;
570
571 err = security_socket_sendmsg(sock, msg, size);
572 if (err)
573 return err;
574
575 return sock->ops->sendmsg(iocb, sock, msg, size);
576}
577
578int sock_sendmsg(struct socket *sock, struct msghdr *msg, size_t size)
579{
580 struct kiocb iocb;
581 struct sock_iocb siocb;
582 int ret;
583
584 init_sync_kiocb(&iocb, NULL);
585 iocb.private = &siocb;
586 ret = __sock_sendmsg(&iocb, sock, msg, size);
587 if (-EIOCBQUEUED == ret)
588 ret = wait_on_sync_kiocb(&iocb);
589 return ret;
590}
591
592int kernel_sendmsg(struct socket *sock, struct msghdr *msg,
593 struct kvec *vec, size_t num, size_t size)
594{
595 mm_segment_t oldfs = get_fs();
596 int result;
597
598 set_fs(KERNEL_DS);
599 /*
600 * the following is safe, since for compiler definitions of kvec and
601 * iovec are identical, yielding the same in-core layout and alignment
602 */
89bddce5 603 msg->msg_iov = (struct iovec *)vec;
1da177e4
LT
604 msg->msg_iovlen = num;
605 result = sock_sendmsg(sock, msg, size);
606 set_fs(oldfs);
607 return result;
608}
609
20d49473
PO
610static int ktime2ts(ktime_t kt, struct timespec *ts)
611{
612 if (kt.tv64) {
613 *ts = ktime_to_timespec(kt);
614 return 1;
615 } else {
616 return 0;
617 }
618}
619
92f37fd2
ED
620/*
621 * called from sock_recv_timestamp() if sock_flag(sk, SOCK_RCVTSTAMP)
622 */
623void __sock_recv_timestamp(struct msghdr *msg, struct sock *sk,
624 struct sk_buff *skb)
625{
20d49473
PO
626 int need_software_tstamp = sock_flag(sk, SOCK_RCVTSTAMP);
627 struct timespec ts[3];
628 int empty = 1;
629 struct skb_shared_hwtstamps *shhwtstamps =
630 skb_hwtstamps(skb);
631
632 /* Race occurred between timestamp enabling and packet
633 receiving. Fill in the current time for now. */
634 if (need_software_tstamp && skb->tstamp.tv64 == 0)
635 __net_timestamp(skb);
636
637 if (need_software_tstamp) {
638 if (!sock_flag(sk, SOCK_RCVTSTAMPNS)) {
639 struct timeval tv;
640 skb_get_timestamp(skb, &tv);
641 put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMP,
642 sizeof(tv), &tv);
643 } else {
644 struct timespec ts;
645 skb_get_timestampns(skb, &ts);
646 put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMPNS,
647 sizeof(ts), &ts);
648 }
649 }
650
651
652 memset(ts, 0, sizeof(ts));
653 if (skb->tstamp.tv64 &&
654 sock_flag(sk, SOCK_TIMESTAMPING_SOFTWARE)) {
655 skb_get_timestampns(skb, ts + 0);
656 empty = 0;
657 }
658 if (shhwtstamps) {
659 if (sock_flag(sk, SOCK_TIMESTAMPING_SYS_HARDWARE) &&
660 ktime2ts(shhwtstamps->syststamp, ts + 1))
661 empty = 0;
662 if (sock_flag(sk, SOCK_TIMESTAMPING_RAW_HARDWARE) &&
663 ktime2ts(shhwtstamps->hwtstamp, ts + 2))
664 empty = 0;
92f37fd2 665 }
20d49473
PO
666 if (!empty)
667 put_cmsg(msg, SOL_SOCKET,
668 SCM_TIMESTAMPING, sizeof(ts), &ts);
92f37fd2
ED
669}
670
7c81fd8b
ACM
671EXPORT_SYMBOL_GPL(__sock_recv_timestamp);
672
89bddce5 673static inline int __sock_recvmsg(struct kiocb *iocb, struct socket *sock,
1da177e4
LT
674 struct msghdr *msg, size_t size, int flags)
675{
676 int err;
677 struct sock_iocb *si = kiocb_to_siocb(iocb);
678
679 si->sock = sock;
680 si->scm = NULL;
681 si->msg = msg;
682 si->size = size;
683 si->flags = flags;
684
685 err = security_socket_recvmsg(sock, msg, size, flags);
686 if (err)
687 return err;
688
689 return sock->ops->recvmsg(iocb, sock, msg, size, flags);
690}
691
89bddce5 692int sock_recvmsg(struct socket *sock, struct msghdr *msg,
1da177e4
LT
693 size_t size, int flags)
694{
695 struct kiocb iocb;
696 struct sock_iocb siocb;
697 int ret;
698
89bddce5 699 init_sync_kiocb(&iocb, NULL);
1da177e4
LT
700 iocb.private = &siocb;
701 ret = __sock_recvmsg(&iocb, sock, msg, size, flags);
702 if (-EIOCBQUEUED == ret)
703 ret = wait_on_sync_kiocb(&iocb);
704 return ret;
705}
706
89bddce5
SH
707int kernel_recvmsg(struct socket *sock, struct msghdr *msg,
708 struct kvec *vec, size_t num, size_t size, int flags)
1da177e4
LT
709{
710 mm_segment_t oldfs = get_fs();
711 int result;
712
713 set_fs(KERNEL_DS);
714 /*
715 * the following is safe, since for compiler definitions of kvec and
716 * iovec are identical, yielding the same in-core layout and alignment
717 */
89bddce5 718 msg->msg_iov = (struct iovec *)vec, msg->msg_iovlen = num;
1da177e4
LT
719 result = sock_recvmsg(sock, msg, size, flags);
720 set_fs(oldfs);
721 return result;
722}
723
724static void sock_aio_dtor(struct kiocb *iocb)
725{
726 kfree(iocb->private);
727}
728
ce1d4d3e
CH
729static ssize_t sock_sendpage(struct file *file, struct page *page,
730 int offset, size_t size, loff_t *ppos, int more)
1da177e4 731{
1da177e4
LT
732 struct socket *sock;
733 int flags;
734
ce1d4d3e
CH
735 sock = file->private_data;
736
737 flags = !(file->f_flags & O_NONBLOCK) ? 0 : MSG_DONTWAIT;
738 if (more)
739 flags |= MSG_MORE;
740
741 return sock->ops->sendpage(sock, page, offset, size, flags);
742}
1da177e4 743
9c55e01c
JA
744static ssize_t sock_splice_read(struct file *file, loff_t *ppos,
745 struct pipe_inode_info *pipe, size_t len,
746 unsigned int flags)
747{
748 struct socket *sock = file->private_data;
749
997b37da
RDC
750 if (unlikely(!sock->ops->splice_read))
751 return -EINVAL;
752
9c55e01c
JA
753 return sock->ops->splice_read(sock, ppos, pipe, len, flags);
754}
755
ce1d4d3e 756static struct sock_iocb *alloc_sock_iocb(struct kiocb *iocb,
89bddce5 757 struct sock_iocb *siocb)
ce1d4d3e
CH
758{
759 if (!is_sync_kiocb(iocb)) {
760 siocb = kmalloc(sizeof(*siocb), GFP_KERNEL);
761 if (!siocb)
762 return NULL;
1da177e4
LT
763 iocb->ki_dtor = sock_aio_dtor;
764 }
1da177e4 765
ce1d4d3e 766 siocb->kiocb = iocb;
ce1d4d3e
CH
767 iocb->private = siocb;
768 return siocb;
1da177e4
LT
769}
770
ce1d4d3e 771static ssize_t do_sock_read(struct msghdr *msg, struct kiocb *iocb,
027445c3
BP
772 struct file *file, const struct iovec *iov,
773 unsigned long nr_segs)
ce1d4d3e
CH
774{
775 struct socket *sock = file->private_data;
776 size_t size = 0;
777 int i;
1da177e4 778
89bddce5
SH
779 for (i = 0; i < nr_segs; i++)
780 size += iov[i].iov_len;
1da177e4 781
ce1d4d3e
CH
782 msg->msg_name = NULL;
783 msg->msg_namelen = 0;
784 msg->msg_control = NULL;
785 msg->msg_controllen = 0;
89bddce5 786 msg->msg_iov = (struct iovec *)iov;
ce1d4d3e
CH
787 msg->msg_iovlen = nr_segs;
788 msg->msg_flags = (file->f_flags & O_NONBLOCK) ? MSG_DONTWAIT : 0;
789
790 return __sock_recvmsg(iocb, sock, msg, size, msg->msg_flags);
791}
792
027445c3
BP
793static ssize_t sock_aio_read(struct kiocb *iocb, const struct iovec *iov,
794 unsigned long nr_segs, loff_t pos)
ce1d4d3e
CH
795{
796 struct sock_iocb siocb, *x;
797
1da177e4
LT
798 if (pos != 0)
799 return -ESPIPE;
027445c3
BP
800
801 if (iocb->ki_left == 0) /* Match SYS5 behaviour */
1da177e4
LT
802 return 0;
803
027445c3
BP
804
805 x = alloc_sock_iocb(iocb, &siocb);
ce1d4d3e
CH
806 if (!x)
807 return -ENOMEM;
027445c3 808 return do_sock_read(&x->async_msg, iocb, iocb->ki_filp, iov, nr_segs);
1da177e4
LT
809}
810
ce1d4d3e 811static ssize_t do_sock_write(struct msghdr *msg, struct kiocb *iocb,
027445c3
BP
812 struct file *file, const struct iovec *iov,
813 unsigned long nr_segs)
1da177e4 814{
ce1d4d3e
CH
815 struct socket *sock = file->private_data;
816 size_t size = 0;
817 int i;
1da177e4 818
89bddce5
SH
819 for (i = 0; i < nr_segs; i++)
820 size += iov[i].iov_len;
1da177e4 821
ce1d4d3e
CH
822 msg->msg_name = NULL;
823 msg->msg_namelen = 0;
824 msg->msg_control = NULL;
825 msg->msg_controllen = 0;
89bddce5 826 msg->msg_iov = (struct iovec *)iov;
ce1d4d3e
CH
827 msg->msg_iovlen = nr_segs;
828 msg->msg_flags = (file->f_flags & O_NONBLOCK) ? MSG_DONTWAIT : 0;
829 if (sock->type == SOCK_SEQPACKET)
830 msg->msg_flags |= MSG_EOR;
1da177e4 831
ce1d4d3e 832 return __sock_sendmsg(iocb, sock, msg, size);
1da177e4
LT
833}
834
027445c3
BP
835static ssize_t sock_aio_write(struct kiocb *iocb, const struct iovec *iov,
836 unsigned long nr_segs, loff_t pos)
ce1d4d3e
CH
837{
838 struct sock_iocb siocb, *x;
1da177e4 839
ce1d4d3e
CH
840 if (pos != 0)
841 return -ESPIPE;
027445c3 842
027445c3 843 x = alloc_sock_iocb(iocb, &siocb);
ce1d4d3e
CH
844 if (!x)
845 return -ENOMEM;
1da177e4 846
027445c3 847 return do_sock_write(&x->async_msg, iocb, iocb->ki_filp, iov, nr_segs);
1da177e4
LT
848}
849
1da177e4
LT
850/*
851 * Atomic setting of ioctl hooks to avoid race
852 * with module unload.
853 */
854
4a3e2f71 855static DEFINE_MUTEX(br_ioctl_mutex);
881d966b 856static int (*br_ioctl_hook) (struct net *, unsigned int cmd, void __user *arg) = NULL;
1da177e4 857
881d966b 858void brioctl_set(int (*hook) (struct net *, unsigned int, void __user *))
1da177e4 859{
4a3e2f71 860 mutex_lock(&br_ioctl_mutex);
1da177e4 861 br_ioctl_hook = hook;
4a3e2f71 862 mutex_unlock(&br_ioctl_mutex);
1da177e4 863}
89bddce5 864
1da177e4
LT
865EXPORT_SYMBOL(brioctl_set);
866
4a3e2f71 867static DEFINE_MUTEX(vlan_ioctl_mutex);
881d966b 868static int (*vlan_ioctl_hook) (struct net *, void __user *arg);
1da177e4 869
881d966b 870void vlan_ioctl_set(int (*hook) (struct net *, void __user *))
1da177e4 871{
4a3e2f71 872 mutex_lock(&vlan_ioctl_mutex);
1da177e4 873 vlan_ioctl_hook = hook;
4a3e2f71 874 mutex_unlock(&vlan_ioctl_mutex);
1da177e4 875}
89bddce5 876
1da177e4
LT
877EXPORT_SYMBOL(vlan_ioctl_set);
878
4a3e2f71 879static DEFINE_MUTEX(dlci_ioctl_mutex);
89bddce5 880static int (*dlci_ioctl_hook) (unsigned int, void __user *);
1da177e4 881
89bddce5 882void dlci_ioctl_set(int (*hook) (unsigned int, void __user *))
1da177e4 883{
4a3e2f71 884 mutex_lock(&dlci_ioctl_mutex);
1da177e4 885 dlci_ioctl_hook = hook;
4a3e2f71 886 mutex_unlock(&dlci_ioctl_mutex);
1da177e4 887}
89bddce5 888
1da177e4
LT
889EXPORT_SYMBOL(dlci_ioctl_set);
890
891/*
892 * With an ioctl, arg may well be a user mode pointer, but we don't know
893 * what to do with it - that's up to the protocol still.
894 */
895
896static long sock_ioctl(struct file *file, unsigned cmd, unsigned long arg)
897{
898 struct socket *sock;
881d966b 899 struct sock *sk;
1da177e4
LT
900 void __user *argp = (void __user *)arg;
901 int pid, err;
881d966b 902 struct net *net;
1da177e4 903
b69aee04 904 sock = file->private_data;
881d966b 905 sk = sock->sk;
3b1e0a65 906 net = sock_net(sk);
1da177e4 907 if (cmd >= SIOCDEVPRIVATE && cmd <= (SIOCDEVPRIVATE + 15)) {
881d966b 908 err = dev_ioctl(net, cmd, argp);
1da177e4 909 } else
d86b5e0e 910#ifdef CONFIG_WIRELESS_EXT
1da177e4 911 if (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST) {
881d966b 912 err = dev_ioctl(net, cmd, argp);
1da177e4 913 } else
89bddce5
SH
914#endif /* CONFIG_WIRELESS_EXT */
915 switch (cmd) {
1da177e4
LT
916 case FIOSETOWN:
917 case SIOCSPGRP:
918 err = -EFAULT;
919 if (get_user(pid, (int __user *)argp))
920 break;
921 err = f_setown(sock->file, pid, 1);
922 break;
923 case FIOGETOWN:
924 case SIOCGPGRP:
609d7fa9 925 err = put_user(f_getown(sock->file),
89bddce5 926 (int __user *)argp);
1da177e4
LT
927 break;
928 case SIOCGIFBR:
929 case SIOCSIFBR:
930 case SIOCBRADDBR:
931 case SIOCBRDELBR:
932 err = -ENOPKG;
933 if (!br_ioctl_hook)
934 request_module("bridge");
935
4a3e2f71 936 mutex_lock(&br_ioctl_mutex);
89bddce5 937 if (br_ioctl_hook)
881d966b 938 err = br_ioctl_hook(net, cmd, argp);
4a3e2f71 939 mutex_unlock(&br_ioctl_mutex);
1da177e4
LT
940 break;
941 case SIOCGIFVLAN:
942 case SIOCSIFVLAN:
943 err = -ENOPKG;
944 if (!vlan_ioctl_hook)
945 request_module("8021q");
946
4a3e2f71 947 mutex_lock(&vlan_ioctl_mutex);
1da177e4 948 if (vlan_ioctl_hook)
881d966b 949 err = vlan_ioctl_hook(net, argp);
4a3e2f71 950 mutex_unlock(&vlan_ioctl_mutex);
1da177e4 951 break;
1da177e4
LT
952 case SIOCADDDLCI:
953 case SIOCDELDLCI:
954 err = -ENOPKG;
955 if (!dlci_ioctl_hook)
956 request_module("dlci");
957
7512cbf6
PE
958 mutex_lock(&dlci_ioctl_mutex);
959 if (dlci_ioctl_hook)
1da177e4 960 err = dlci_ioctl_hook(cmd, argp);
7512cbf6 961 mutex_unlock(&dlci_ioctl_mutex);
1da177e4
LT
962 break;
963 default:
964 err = sock->ops->ioctl(sock, cmd, arg);
b5e5fa5e
CH
965
966 /*
967 * If this ioctl is unknown try to hand it down
968 * to the NIC driver.
969 */
970 if (err == -ENOIOCTLCMD)
881d966b 971 err = dev_ioctl(net, cmd, argp);
1da177e4 972 break;
89bddce5 973 }
1da177e4
LT
974 return err;
975}
976
977int sock_create_lite(int family, int type, int protocol, struct socket **res)
978{
979 int err;
980 struct socket *sock = NULL;
89bddce5 981
1da177e4
LT
982 err = security_socket_create(family, type, protocol, 1);
983 if (err)
984 goto out;
985
986 sock = sock_alloc();
987 if (!sock) {
988 err = -ENOMEM;
989 goto out;
990 }
991
1da177e4 992 sock->type = type;
7420ed23
VY
993 err = security_socket_post_create(sock, family, type, protocol, 1);
994 if (err)
995 goto out_release;
996
1da177e4
LT
997out:
998 *res = sock;
999 return err;
7420ed23
VY
1000out_release:
1001 sock_release(sock);
1002 sock = NULL;
1003 goto out;
1da177e4
LT
1004}
1005
1006/* No kernel lock held - perfect */
89bddce5 1007static unsigned int sock_poll(struct file *file, poll_table *wait)
1da177e4
LT
1008{
1009 struct socket *sock;
1010
1011 /*
89bddce5 1012 * We can't return errors to poll, so it's either yes or no.
1da177e4 1013 */
b69aee04 1014 sock = file->private_data;
1da177e4
LT
1015 return sock->ops->poll(file, sock, wait);
1016}
1017
89bddce5 1018static int sock_mmap(struct file *file, struct vm_area_struct *vma)
1da177e4 1019{
b69aee04 1020 struct socket *sock = file->private_data;
1da177e4
LT
1021
1022 return sock->ops->mmap(file, sock, vma);
1023}
1024
20380731 1025static int sock_close(struct inode *inode, struct file *filp)
1da177e4
LT
1026{
1027 /*
89bddce5
SH
1028 * It was possible the inode is NULL we were
1029 * closing an unfinished socket.
1da177e4
LT
1030 */
1031
89bddce5 1032 if (!inode) {
1da177e4
LT
1033 printk(KERN_DEBUG "sock_close: NULL inode\n");
1034 return 0;
1035 }
1da177e4
LT
1036 sock_release(SOCKET_I(inode));
1037 return 0;
1038}
1039
1040/*
1041 * Update the socket async list
1042 *
1043 * Fasync_list locking strategy.
1044 *
1045 * 1. fasync_list is modified only under process context socket lock
1046 * i.e. under semaphore.
1047 * 2. fasync_list is used under read_lock(&sk->sk_callback_lock)
1048 * or under socket lock.
1049 * 3. fasync_list can be used from softirq context, so that
1050 * modification under socket lock have to be enhanced with
1051 * write_lock_bh(&sk->sk_callback_lock).
1052 * --ANK (990710)
1053 */
1054
1055static int sock_fasync(int fd, struct file *filp, int on)
1056{
89bddce5 1057 struct fasync_struct *fa, *fna = NULL, **prev;
1da177e4
LT
1058 struct socket *sock;
1059 struct sock *sk;
1060
89bddce5 1061 if (on) {
8b3a7005 1062 fna = kmalloc(sizeof(struct fasync_struct), GFP_KERNEL);
89bddce5 1063 if (fna == NULL)
1da177e4
LT
1064 return -ENOMEM;
1065 }
1066
b69aee04 1067 sock = filp->private_data;
1da177e4 1068
89bddce5
SH
1069 sk = sock->sk;
1070 if (sk == NULL) {
1da177e4
LT
1071 kfree(fna);
1072 return -EINVAL;
1073 }
1074
1075 lock_sock(sk);
1076
89bddce5 1077 prev = &(sock->fasync_list);
1da177e4 1078
89bddce5
SH
1079 for (fa = *prev; fa != NULL; prev = &fa->fa_next, fa = *prev)
1080 if (fa->fa_file == filp)
1da177e4
LT
1081 break;
1082
89bddce5
SH
1083 if (on) {
1084 if (fa != NULL) {
1da177e4 1085 write_lock_bh(&sk->sk_callback_lock);
89bddce5 1086 fa->fa_fd = fd;
1da177e4
LT
1087 write_unlock_bh(&sk->sk_callback_lock);
1088
1089 kfree(fna);
1090 goto out;
1091 }
89bddce5
SH
1092 fna->fa_file = filp;
1093 fna->fa_fd = fd;
1094 fna->magic = FASYNC_MAGIC;
1095 fna->fa_next = sock->fasync_list;
1da177e4 1096 write_lock_bh(&sk->sk_callback_lock);
89bddce5 1097 sock->fasync_list = fna;
1da177e4 1098 write_unlock_bh(&sk->sk_callback_lock);
89bddce5
SH
1099 } else {
1100 if (fa != NULL) {
1da177e4 1101 write_lock_bh(&sk->sk_callback_lock);
89bddce5 1102 *prev = fa->fa_next;
1da177e4
LT
1103 write_unlock_bh(&sk->sk_callback_lock);
1104 kfree(fa);
1105 }
1106 }
1107
1108out:
1109 release_sock(sock->sk);
1110 return 0;
1111}
1112
1113/* This function may be called only under socket lock or callback_lock */
1114
1115int sock_wake_async(struct socket *sock, int how, int band)
1116{
1117 if (!sock || !sock->fasync_list)
1118 return -1;
89bddce5 1119 switch (how) {
8d8ad9d7 1120 case SOCK_WAKE_WAITD:
1da177e4
LT
1121 if (test_bit(SOCK_ASYNC_WAITDATA, &sock->flags))
1122 break;
1123 goto call_kill;
8d8ad9d7 1124 case SOCK_WAKE_SPACE:
1da177e4
LT
1125 if (!test_and_clear_bit(SOCK_ASYNC_NOSPACE, &sock->flags))
1126 break;
1127 /* fall through */
8d8ad9d7 1128 case SOCK_WAKE_IO:
89bddce5 1129call_kill:
1da177e4
LT
1130 __kill_fasync(sock->fasync_list, SIGIO, band);
1131 break;
8d8ad9d7 1132 case SOCK_WAKE_URG:
1da177e4
LT
1133 __kill_fasync(sock->fasync_list, SIGURG, band);
1134 }
1135 return 0;
1136}
1137
1b8d7ae4 1138static int __sock_create(struct net *net, int family, int type, int protocol,
89bddce5 1139 struct socket **res, int kern)
1da177e4
LT
1140{
1141 int err;
1142 struct socket *sock;
55737fda 1143 const struct net_proto_family *pf;
1da177e4
LT
1144
1145 /*
89bddce5 1146 * Check protocol is in range
1da177e4
LT
1147 */
1148 if (family < 0 || family >= NPROTO)
1149 return -EAFNOSUPPORT;
1150 if (type < 0 || type >= SOCK_MAX)
1151 return -EINVAL;
1152
1153 /* Compatibility.
1154
1155 This uglymoron is moved from INET layer to here to avoid
1156 deadlock in module load.
1157 */
1158 if (family == PF_INET && type == SOCK_PACKET) {
89bddce5 1159 static int warned;
1da177e4
LT
1160 if (!warned) {
1161 warned = 1;
89bddce5
SH
1162 printk(KERN_INFO "%s uses obsolete (PF_INET,SOCK_PACKET)\n",
1163 current->comm);
1da177e4
LT
1164 }
1165 family = PF_PACKET;
1166 }
1167
1168 err = security_socket_create(family, type, protocol, kern);
1169 if (err)
1170 return err;
89bddce5 1171
55737fda
SH
1172 /*
1173 * Allocate the socket and allow the family to set things up. if
1174 * the protocol is 0, the family is instructed to select an appropriate
1175 * default.
1176 */
1177 sock = sock_alloc();
1178 if (!sock) {
1179 if (net_ratelimit())
1180 printk(KERN_WARNING "socket: no more sockets\n");
1181 return -ENFILE; /* Not exactly a match, but its the
1182 closest posix thing */
1183 }
1184
1185 sock->type = type;
1186
95a5afca 1187#ifdef CONFIG_MODULES
89bddce5
SH
1188 /* Attempt to load a protocol module if the find failed.
1189 *
1190 * 12/09/1996 Marcin: But! this makes REALLY only sense, if the user
1da177e4
LT
1191 * requested real, full-featured networking support upon configuration.
1192 * Otherwise module support will break!
1193 */
55737fda 1194 if (net_families[family] == NULL)
89bddce5 1195 request_module("net-pf-%d", family);
1da177e4
LT
1196#endif
1197
55737fda
SH
1198 rcu_read_lock();
1199 pf = rcu_dereference(net_families[family]);
1200 err = -EAFNOSUPPORT;
1201 if (!pf)
1202 goto out_release;
1da177e4
LT
1203
1204 /*
1205 * We will call the ->create function, that possibly is in a loadable
1206 * module, so we have to bump that loadable module refcnt first.
1207 */
55737fda 1208 if (!try_module_get(pf->owner))
1da177e4
LT
1209 goto out_release;
1210
55737fda
SH
1211 /* Now protected by module ref count */
1212 rcu_read_unlock();
1213
1b8d7ae4 1214 err = pf->create(net, sock, protocol);
55737fda 1215 if (err < 0)
1da177e4 1216 goto out_module_put;
a79af59e 1217
1da177e4
LT
1218 /*
1219 * Now to bump the refcnt of the [loadable] module that owns this
1220 * socket at sock_release time we decrement its refcnt.
1221 */
55737fda
SH
1222 if (!try_module_get(sock->ops->owner))
1223 goto out_module_busy;
1224
1da177e4
LT
1225 /*
1226 * Now that we're done with the ->create function, the [loadable]
1227 * module can have its refcnt decremented
1228 */
55737fda 1229 module_put(pf->owner);
7420ed23
VY
1230 err = security_socket_post_create(sock, family, type, protocol, kern);
1231 if (err)
3b185525 1232 goto out_sock_release;
55737fda 1233 *res = sock;
1da177e4 1234
55737fda
SH
1235 return 0;
1236
1237out_module_busy:
1238 err = -EAFNOSUPPORT;
1da177e4 1239out_module_put:
55737fda
SH
1240 sock->ops = NULL;
1241 module_put(pf->owner);
1242out_sock_release:
1da177e4 1243 sock_release(sock);
55737fda
SH
1244 return err;
1245
1246out_release:
1247 rcu_read_unlock();
1248 goto out_sock_release;
1da177e4
LT
1249}
1250
1251int sock_create(int family, int type, int protocol, struct socket **res)
1252{
1b8d7ae4 1253 return __sock_create(current->nsproxy->net_ns, family, type, protocol, res, 0);
1da177e4
LT
1254}
1255
1256int sock_create_kern(int family, int type, int protocol, struct socket **res)
1257{
1b8d7ae4 1258 return __sock_create(&init_net, family, type, protocol, res, 1);
1da177e4
LT
1259}
1260
3e0fa65f 1261SYSCALL_DEFINE3(socket, int, family, int, type, int, protocol)
1da177e4
LT
1262{
1263 int retval;
1264 struct socket *sock;
a677a039
UD
1265 int flags;
1266
e38b36f3
UD
1267 /* Check the SOCK_* constants for consistency. */
1268 BUILD_BUG_ON(SOCK_CLOEXEC != O_CLOEXEC);
1269 BUILD_BUG_ON((SOCK_MAX | SOCK_TYPE_MASK) != SOCK_TYPE_MASK);
1270 BUILD_BUG_ON(SOCK_CLOEXEC & SOCK_TYPE_MASK);
1271 BUILD_BUG_ON(SOCK_NONBLOCK & SOCK_TYPE_MASK);
1272
a677a039 1273 flags = type & ~SOCK_TYPE_MASK;
77d27200 1274 if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
a677a039
UD
1275 return -EINVAL;
1276 type &= SOCK_TYPE_MASK;
1da177e4 1277
aaca0bdc
UD
1278 if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
1279 flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
1280
1da177e4
LT
1281 retval = sock_create(family, type, protocol, &sock);
1282 if (retval < 0)
1283 goto out;
1284
77d27200 1285 retval = sock_map_fd(sock, flags & (O_CLOEXEC | O_NONBLOCK));
1da177e4
LT
1286 if (retval < 0)
1287 goto out_release;
1288
1289out:
1290 /* It may be already another descriptor 8) Not kernel problem. */
1291 return retval;
1292
1293out_release:
1294 sock_release(sock);
1295 return retval;
1296}
1297
1298/*
1299 * Create a pair of connected sockets.
1300 */
1301
3e0fa65f
HC
1302SYSCALL_DEFINE4(socketpair, int, family, int, type, int, protocol,
1303 int __user *, usockvec)
1da177e4
LT
1304{
1305 struct socket *sock1, *sock2;
1306 int fd1, fd2, err;
db349509 1307 struct file *newfile1, *newfile2;
a677a039
UD
1308 int flags;
1309
1310 flags = type & ~SOCK_TYPE_MASK;
77d27200 1311 if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
a677a039
UD
1312 return -EINVAL;
1313 type &= SOCK_TYPE_MASK;
1da177e4 1314
aaca0bdc
UD
1315 if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
1316 flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
1317
1da177e4
LT
1318 /*
1319 * Obtain the first socket and check if the underlying protocol
1320 * supports the socketpair call.
1321 */
1322
1323 err = sock_create(family, type, protocol, &sock1);
1324 if (err < 0)
1325 goto out;
1326
1327 err = sock_create(family, type, protocol, &sock2);
1328 if (err < 0)
1329 goto out_release_1;
1330
1331 err = sock1->ops->socketpair(sock1, sock2);
89bddce5 1332 if (err < 0)
1da177e4
LT
1333 goto out_release_both;
1334
a677a039 1335 fd1 = sock_alloc_fd(&newfile1, flags & O_CLOEXEC);
bf3c23d1
DM
1336 if (unlikely(fd1 < 0)) {
1337 err = fd1;
db349509 1338 goto out_release_both;
bf3c23d1 1339 }
1da177e4 1340
a677a039 1341 fd2 = sock_alloc_fd(&newfile2, flags & O_CLOEXEC);
db349509 1342 if (unlikely(fd2 < 0)) {
bf3c23d1 1343 err = fd2;
db349509
AV
1344 put_filp(newfile1);
1345 put_unused_fd(fd1);
1da177e4 1346 goto out_release_both;
db349509 1347 }
1da177e4 1348
77d27200 1349 err = sock_attach_fd(sock1, newfile1, flags & O_NONBLOCK);
db349509
AV
1350 if (unlikely(err < 0)) {
1351 goto out_fd2;
1352 }
1353
77d27200 1354 err = sock_attach_fd(sock2, newfile2, flags & O_NONBLOCK);
db349509
AV
1355 if (unlikely(err < 0)) {
1356 fput(newfile1);
1357 goto out_fd1;
1358 }
1359
157cf649 1360 audit_fd_pair(fd1, fd2);
db349509
AV
1361 fd_install(fd1, newfile1);
1362 fd_install(fd2, newfile2);
1da177e4
LT
1363 /* fd1 and fd2 may be already another descriptors.
1364 * Not kernel problem.
1365 */
1366
89bddce5 1367 err = put_user(fd1, &usockvec[0]);
1da177e4
LT
1368 if (!err)
1369 err = put_user(fd2, &usockvec[1]);
1370 if (!err)
1371 return 0;
1372
1373 sys_close(fd2);
1374 sys_close(fd1);
1375 return err;
1376
1da177e4 1377out_release_both:
89bddce5 1378 sock_release(sock2);
1da177e4 1379out_release_1:
89bddce5 1380 sock_release(sock1);
1da177e4
LT
1381out:
1382 return err;
db349509
AV
1383
1384out_fd2:
1385 put_filp(newfile1);
1386 sock_release(sock1);
1387out_fd1:
1388 put_filp(newfile2);
1389 sock_release(sock2);
db349509
AV
1390 put_unused_fd(fd1);
1391 put_unused_fd(fd2);
1392 goto out;
1da177e4
LT
1393}
1394
1da177e4
LT
1395/*
1396 * Bind a name to a socket. Nothing much to do here since it's
1397 * the protocol's responsibility to handle the local address.
1398 *
1399 * We move the socket address to kernel space before we call
1400 * the protocol layer (having also checked the address is ok).
1401 */
1402
20f37034 1403SYSCALL_DEFINE3(bind, int, fd, struct sockaddr __user *, umyaddr, int, addrlen)
1da177e4
LT
1404{
1405 struct socket *sock;
230b1839 1406 struct sockaddr_storage address;
6cb153ca 1407 int err, fput_needed;
1da177e4 1408
89bddce5 1409 sock = sockfd_lookup_light(fd, &err, &fput_needed);
e71a4783 1410 if (sock) {
230b1839 1411 err = move_addr_to_kernel(umyaddr, addrlen, (struct sockaddr *)&address);
89bddce5
SH
1412 if (err >= 0) {
1413 err = security_socket_bind(sock,
230b1839 1414 (struct sockaddr *)&address,
89bddce5 1415 addrlen);
6cb153ca
BL
1416 if (!err)
1417 err = sock->ops->bind(sock,
89bddce5 1418 (struct sockaddr *)
230b1839 1419 &address, addrlen);
1da177e4 1420 }
6cb153ca 1421 fput_light(sock->file, fput_needed);
89bddce5 1422 }
1da177e4
LT
1423 return err;
1424}
1425
1da177e4
LT
1426/*
1427 * Perform a listen. Basically, we allow the protocol to do anything
1428 * necessary for a listen, and if that works, we mark the socket as
1429 * ready for listening.
1430 */
1431
3e0fa65f 1432SYSCALL_DEFINE2(listen, int, fd, int, backlog)
1da177e4
LT
1433{
1434 struct socket *sock;
6cb153ca 1435 int err, fput_needed;
b8e1f9b5 1436 int somaxconn;
89bddce5
SH
1437
1438 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1439 if (sock) {
8efa6e93 1440 somaxconn = sock_net(sock->sk)->core.sysctl_somaxconn;
b8e1f9b5
PE
1441 if ((unsigned)backlog > somaxconn)
1442 backlog = somaxconn;
1da177e4
LT
1443
1444 err = security_socket_listen(sock, backlog);
6cb153ca
BL
1445 if (!err)
1446 err = sock->ops->listen(sock, backlog);
1da177e4 1447
6cb153ca 1448 fput_light(sock->file, fput_needed);
1da177e4
LT
1449 }
1450 return err;
1451}
1452
1da177e4
LT
1453/*
1454 * For accept, we attempt to create a new socket, set up the link
1455 * with the client, wake up the client, then return the new
1456 * connected fd. We collect the address of the connector in kernel
1457 * space and move it to user at the very end. This is unclean because
1458 * we open the socket then return an error.
1459 *
1460 * 1003.1g adds the ability to recvmsg() to query connection pending
1461 * status to recvmsg. We need to add that support in a way thats
1462 * clean when we restucture accept also.
1463 */
1464
20f37034
HC
1465SYSCALL_DEFINE4(accept4, int, fd, struct sockaddr __user *, upeer_sockaddr,
1466 int __user *, upeer_addrlen, int, flags)
1da177e4
LT
1467{
1468 struct socket *sock, *newsock;
39d8c1b6 1469 struct file *newfile;
6cb153ca 1470 int err, len, newfd, fput_needed;
230b1839 1471 struct sockaddr_storage address;
1da177e4 1472
77d27200 1473 if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
aaca0bdc
UD
1474 return -EINVAL;
1475
1476 if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
1477 flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
1478
6cb153ca 1479 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4
LT
1480 if (!sock)
1481 goto out;
1482
1483 err = -ENFILE;
89bddce5 1484 if (!(newsock = sock_alloc()))
1da177e4
LT
1485 goto out_put;
1486
1487 newsock->type = sock->type;
1488 newsock->ops = sock->ops;
1489
1da177e4
LT
1490 /*
1491 * We don't need try_module_get here, as the listening socket (sock)
1492 * has the protocol module (sock->ops->owner) held.
1493 */
1494 __module_get(newsock->ops->owner);
1495
aaca0bdc 1496 newfd = sock_alloc_fd(&newfile, flags & O_CLOEXEC);
39d8c1b6
DM
1497 if (unlikely(newfd < 0)) {
1498 err = newfd;
9a1875e6
DM
1499 sock_release(newsock);
1500 goto out_put;
39d8c1b6
DM
1501 }
1502
77d27200 1503 err = sock_attach_fd(newsock, newfile, flags & O_NONBLOCK);
39d8c1b6 1504 if (err < 0)
79f4f642 1505 goto out_fd_simple;
39d8c1b6 1506
a79af59e
FF
1507 err = security_socket_accept(sock, newsock);
1508 if (err)
39d8c1b6 1509 goto out_fd;
a79af59e 1510
1da177e4
LT
1511 err = sock->ops->accept(sock, newsock, sock->file->f_flags);
1512 if (err < 0)
39d8c1b6 1513 goto out_fd;
1da177e4
LT
1514
1515 if (upeer_sockaddr) {
230b1839 1516 if (newsock->ops->getname(newsock, (struct sockaddr *)&address,
89bddce5 1517 &len, 2) < 0) {
1da177e4 1518 err = -ECONNABORTED;
39d8c1b6 1519 goto out_fd;
1da177e4 1520 }
230b1839
YH
1521 err = move_addr_to_user((struct sockaddr *)&address,
1522 len, upeer_sockaddr, upeer_addrlen);
1da177e4 1523 if (err < 0)
39d8c1b6 1524 goto out_fd;
1da177e4
LT
1525 }
1526
1527 /* File flags are not inherited via accept() unlike another OSes. */
1528
39d8c1b6
DM
1529 fd_install(newfd, newfile);
1530 err = newfd;
1da177e4
LT
1531
1532 security_socket_post_accept(sock, newsock);
1533
1534out_put:
6cb153ca 1535 fput_light(sock->file, fput_needed);
1da177e4
LT
1536out:
1537 return err;
79f4f642
AD
1538out_fd_simple:
1539 sock_release(newsock);
1540 put_filp(newfile);
1541 put_unused_fd(newfd);
1542 goto out_put;
39d8c1b6 1543out_fd:
9606a216 1544 fput(newfile);
39d8c1b6 1545 put_unused_fd(newfd);
1da177e4
LT
1546 goto out_put;
1547}
1548
20f37034
HC
1549SYSCALL_DEFINE3(accept, int, fd, struct sockaddr __user *, upeer_sockaddr,
1550 int __user *, upeer_addrlen)
aaca0bdc 1551{
de11defe 1552 return sys_accept4(fd, upeer_sockaddr, upeer_addrlen, 0);
aaca0bdc
UD
1553}
1554
1da177e4
LT
1555/*
1556 * Attempt to connect to a socket with the server address. The address
1557 * is in user space so we verify it is OK and move it to kernel space.
1558 *
1559 * For 1003.1g we need to add clean support for a bind to AF_UNSPEC to
1560 * break bindings
1561 *
1562 * NOTE: 1003.1g draft 6.3 is broken with respect to AX.25/NetROM and
1563 * other SEQPACKET protocols that take time to connect() as it doesn't
1564 * include the -EINPROGRESS status for such sockets.
1565 */
1566
20f37034
HC
1567SYSCALL_DEFINE3(connect, int, fd, struct sockaddr __user *, uservaddr,
1568 int, addrlen)
1da177e4
LT
1569{
1570 struct socket *sock;
230b1839 1571 struct sockaddr_storage address;
6cb153ca 1572 int err, fput_needed;
1da177e4 1573
6cb153ca 1574 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4
LT
1575 if (!sock)
1576 goto out;
230b1839 1577 err = move_addr_to_kernel(uservaddr, addrlen, (struct sockaddr *)&address);
1da177e4
LT
1578 if (err < 0)
1579 goto out_put;
1580
89bddce5 1581 err =
230b1839 1582 security_socket_connect(sock, (struct sockaddr *)&address, addrlen);
1da177e4
LT
1583 if (err)
1584 goto out_put;
1585
230b1839 1586 err = sock->ops->connect(sock, (struct sockaddr *)&address, addrlen,
1da177e4
LT
1587 sock->file->f_flags);
1588out_put:
6cb153ca 1589 fput_light(sock->file, fput_needed);
1da177e4
LT
1590out:
1591 return err;
1592}
1593
1594/*
1595 * Get the local address ('name') of a socket object. Move the obtained
1596 * name to user space.
1597 */
1598
20f37034
HC
1599SYSCALL_DEFINE3(getsockname, int, fd, struct sockaddr __user *, usockaddr,
1600 int __user *, usockaddr_len)
1da177e4
LT
1601{
1602 struct socket *sock;
230b1839 1603 struct sockaddr_storage address;
6cb153ca 1604 int len, err, fput_needed;
89bddce5 1605
6cb153ca 1606 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4
LT
1607 if (!sock)
1608 goto out;
1609
1610 err = security_socket_getsockname(sock);
1611 if (err)
1612 goto out_put;
1613
230b1839 1614 err = sock->ops->getname(sock, (struct sockaddr *)&address, &len, 0);
1da177e4
LT
1615 if (err)
1616 goto out_put;
230b1839 1617 err = move_addr_to_user((struct sockaddr *)&address, len, usockaddr, usockaddr_len);
1da177e4
LT
1618
1619out_put:
6cb153ca 1620 fput_light(sock->file, fput_needed);
1da177e4
LT
1621out:
1622 return err;
1623}
1624
1625/*
1626 * Get the remote address ('name') of a socket object. Move the obtained
1627 * name to user space.
1628 */
1629
20f37034
HC
1630SYSCALL_DEFINE3(getpeername, int, fd, struct sockaddr __user *, usockaddr,
1631 int __user *, usockaddr_len)
1da177e4
LT
1632{
1633 struct socket *sock;
230b1839 1634 struct sockaddr_storage address;
6cb153ca 1635 int len, err, fput_needed;
1da177e4 1636
89bddce5
SH
1637 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1638 if (sock != NULL) {
1da177e4
LT
1639 err = security_socket_getpeername(sock);
1640 if (err) {
6cb153ca 1641 fput_light(sock->file, fput_needed);
1da177e4
LT
1642 return err;
1643 }
1644
89bddce5 1645 err =
230b1839 1646 sock->ops->getname(sock, (struct sockaddr *)&address, &len,
89bddce5 1647 1);
1da177e4 1648 if (!err)
230b1839 1649 err = move_addr_to_user((struct sockaddr *)&address, len, usockaddr,
89bddce5 1650 usockaddr_len);
6cb153ca 1651 fput_light(sock->file, fput_needed);
1da177e4
LT
1652 }
1653 return err;
1654}
1655
1656/*
1657 * Send a datagram to a given address. We move the address into kernel
1658 * space and check the user space data area is readable before invoking
1659 * the protocol.
1660 */
1661
3e0fa65f
HC
1662SYSCALL_DEFINE6(sendto, int, fd, void __user *, buff, size_t, len,
1663 unsigned, flags, struct sockaddr __user *, addr,
1664 int, addr_len)
1da177e4
LT
1665{
1666 struct socket *sock;
230b1839 1667 struct sockaddr_storage address;
1da177e4
LT
1668 int err;
1669 struct msghdr msg;
1670 struct iovec iov;
6cb153ca 1671 int fput_needed;
6cb153ca 1672
de0fa95c
PE
1673 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1674 if (!sock)
4387ff75 1675 goto out;
6cb153ca 1676
89bddce5
SH
1677 iov.iov_base = buff;
1678 iov.iov_len = len;
1679 msg.msg_name = NULL;
1680 msg.msg_iov = &iov;
1681 msg.msg_iovlen = 1;
1682 msg.msg_control = NULL;
1683 msg.msg_controllen = 0;
1684 msg.msg_namelen = 0;
6cb153ca 1685 if (addr) {
230b1839 1686 err = move_addr_to_kernel(addr, addr_len, (struct sockaddr *)&address);
1da177e4
LT
1687 if (err < 0)
1688 goto out_put;
230b1839 1689 msg.msg_name = (struct sockaddr *)&address;
89bddce5 1690 msg.msg_namelen = addr_len;
1da177e4
LT
1691 }
1692 if (sock->file->f_flags & O_NONBLOCK)
1693 flags |= MSG_DONTWAIT;
1694 msg.msg_flags = flags;
1695 err = sock_sendmsg(sock, &msg, len);
1696
89bddce5 1697out_put:
de0fa95c 1698 fput_light(sock->file, fput_needed);
4387ff75 1699out:
1da177e4
LT
1700 return err;
1701}
1702
1703/*
89bddce5 1704 * Send a datagram down a socket.
1da177e4
LT
1705 */
1706
3e0fa65f
HC
1707SYSCALL_DEFINE4(send, int, fd, void __user *, buff, size_t, len,
1708 unsigned, flags)
1da177e4
LT
1709{
1710 return sys_sendto(fd, buff, len, flags, NULL, 0);
1711}
1712
1713/*
89bddce5 1714 * Receive a frame from the socket and optionally record the address of the
1da177e4
LT
1715 * sender. We verify the buffers are writable and if needed move the
1716 * sender address from kernel to user space.
1717 */
1718
3e0fa65f
HC
1719SYSCALL_DEFINE6(recvfrom, int, fd, void __user *, ubuf, size_t, size,
1720 unsigned, flags, struct sockaddr __user *, addr,
1721 int __user *, addr_len)
1da177e4
LT
1722{
1723 struct socket *sock;
1724 struct iovec iov;
1725 struct msghdr msg;
230b1839 1726 struct sockaddr_storage address;
89bddce5 1727 int err, err2;
6cb153ca
BL
1728 int fput_needed;
1729
de0fa95c 1730 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4 1731 if (!sock)
de0fa95c 1732 goto out;
1da177e4 1733
89bddce5
SH
1734 msg.msg_control = NULL;
1735 msg.msg_controllen = 0;
1736 msg.msg_iovlen = 1;
1737 msg.msg_iov = &iov;
1738 iov.iov_len = size;
1739 iov.iov_base = ubuf;
230b1839
YH
1740 msg.msg_name = (struct sockaddr *)&address;
1741 msg.msg_namelen = sizeof(address);
1da177e4
LT
1742 if (sock->file->f_flags & O_NONBLOCK)
1743 flags |= MSG_DONTWAIT;
89bddce5 1744 err = sock_recvmsg(sock, &msg, size, flags);
1da177e4 1745
89bddce5 1746 if (err >= 0 && addr != NULL) {
230b1839
YH
1747 err2 = move_addr_to_user((struct sockaddr *)&address,
1748 msg.msg_namelen, addr, addr_len);
89bddce5
SH
1749 if (err2 < 0)
1750 err = err2;
1da177e4 1751 }
de0fa95c
PE
1752
1753 fput_light(sock->file, fput_needed);
4387ff75 1754out:
1da177e4
LT
1755 return err;
1756}
1757
1758/*
89bddce5 1759 * Receive a datagram from a socket.
1da177e4
LT
1760 */
1761
89bddce5
SH
1762asmlinkage long sys_recv(int fd, void __user *ubuf, size_t size,
1763 unsigned flags)
1da177e4
LT
1764{
1765 return sys_recvfrom(fd, ubuf, size, flags, NULL, NULL);
1766}
1767
1768/*
1769 * Set a socket option. Because we don't know the option lengths we have
1770 * to pass the user mode parameter for the protocols to sort out.
1771 */
1772
20f37034
HC
1773SYSCALL_DEFINE5(setsockopt, int, fd, int, level, int, optname,
1774 char __user *, optval, int, optlen)
1da177e4 1775{
6cb153ca 1776 int err, fput_needed;
1da177e4
LT
1777 struct socket *sock;
1778
1779 if (optlen < 0)
1780 return -EINVAL;
89bddce5
SH
1781
1782 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1783 if (sock != NULL) {
1784 err = security_socket_setsockopt(sock, level, optname);
6cb153ca
BL
1785 if (err)
1786 goto out_put;
1da177e4
LT
1787
1788 if (level == SOL_SOCKET)
89bddce5
SH
1789 err =
1790 sock_setsockopt(sock, level, optname, optval,
1791 optlen);
1da177e4 1792 else
89bddce5
SH
1793 err =
1794 sock->ops->setsockopt(sock, level, optname, optval,
1795 optlen);
6cb153ca
BL
1796out_put:
1797 fput_light(sock->file, fput_needed);
1da177e4
LT
1798 }
1799 return err;
1800}
1801
1802/*
1803 * Get a socket option. Because we don't know the option lengths we have
1804 * to pass a user mode parameter for the protocols to sort out.
1805 */
1806
20f37034
HC
1807SYSCALL_DEFINE5(getsockopt, int, fd, int, level, int, optname,
1808 char __user *, optval, int __user *, optlen)
1da177e4 1809{
6cb153ca 1810 int err, fput_needed;
1da177e4
LT
1811 struct socket *sock;
1812
89bddce5
SH
1813 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1814 if (sock != NULL) {
6cb153ca
BL
1815 err = security_socket_getsockopt(sock, level, optname);
1816 if (err)
1817 goto out_put;
1da177e4
LT
1818
1819 if (level == SOL_SOCKET)
89bddce5
SH
1820 err =
1821 sock_getsockopt(sock, level, optname, optval,
1822 optlen);
1da177e4 1823 else
89bddce5
SH
1824 err =
1825 sock->ops->getsockopt(sock, level, optname, optval,
1826 optlen);
6cb153ca
BL
1827out_put:
1828 fput_light(sock->file, fput_needed);
1da177e4
LT
1829 }
1830 return err;
1831}
1832
1da177e4
LT
1833/*
1834 * Shutdown a socket.
1835 */
1836
754fe8d2 1837SYSCALL_DEFINE2(shutdown, int, fd, int, how)
1da177e4 1838{
6cb153ca 1839 int err, fput_needed;
1da177e4
LT
1840 struct socket *sock;
1841
89bddce5
SH
1842 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1843 if (sock != NULL) {
1da177e4 1844 err = security_socket_shutdown(sock, how);
6cb153ca
BL
1845 if (!err)
1846 err = sock->ops->shutdown(sock, how);
1847 fput_light(sock->file, fput_needed);
1da177e4
LT
1848 }
1849 return err;
1850}
1851
89bddce5 1852/* A couple of helpful macros for getting the address of the 32/64 bit
1da177e4
LT
1853 * fields which are the same type (int / unsigned) on our platforms.
1854 */
1855#define COMPAT_MSG(msg, member) ((MSG_CMSG_COMPAT & flags) ? &msg##_compat->member : &msg->member)
1856#define COMPAT_NAMELEN(msg) COMPAT_MSG(msg, msg_namelen)
1857#define COMPAT_FLAGS(msg) COMPAT_MSG(msg, msg_flags)
1858
1da177e4
LT
1859/*
1860 * BSD sendmsg interface
1861 */
1862
3e0fa65f 1863SYSCALL_DEFINE3(sendmsg, int, fd, struct msghdr __user *, msg, unsigned, flags)
1da177e4 1864{
89bddce5
SH
1865 struct compat_msghdr __user *msg_compat =
1866 (struct compat_msghdr __user *)msg;
1da177e4 1867 struct socket *sock;
230b1839 1868 struct sockaddr_storage address;
1da177e4 1869 struct iovec iovstack[UIO_FASTIOV], *iov = iovstack;
b9d717a7 1870 unsigned char ctl[sizeof(struct cmsghdr) + 20]
89bddce5
SH
1871 __attribute__ ((aligned(sizeof(__kernel_size_t))));
1872 /* 20 is size of ipv6_pktinfo */
1da177e4
LT
1873 unsigned char *ctl_buf = ctl;
1874 struct msghdr msg_sys;
1875 int err, ctl_len, iov_size, total_len;
6cb153ca 1876 int fput_needed;
89bddce5 1877
1da177e4
LT
1878 err = -EFAULT;
1879 if (MSG_CMSG_COMPAT & flags) {
1880 if (get_compat_msghdr(&msg_sys, msg_compat))
1881 return -EFAULT;
89bddce5
SH
1882 }
1883 else if (copy_from_user(&msg_sys, msg, sizeof(struct msghdr)))
1da177e4
LT
1884 return -EFAULT;
1885
6cb153ca 1886 sock = sockfd_lookup_light(fd, &err, &fput_needed);
89bddce5 1887 if (!sock)
1da177e4
LT
1888 goto out;
1889
1890 /* do not move before msg_sys is valid */
1891 err = -EMSGSIZE;
1892 if (msg_sys.msg_iovlen > UIO_MAXIOV)
1893 goto out_put;
1894
89bddce5 1895 /* Check whether to allocate the iovec area */
1da177e4
LT
1896 err = -ENOMEM;
1897 iov_size = msg_sys.msg_iovlen * sizeof(struct iovec);
1898 if (msg_sys.msg_iovlen > UIO_FASTIOV) {
1899 iov = sock_kmalloc(sock->sk, iov_size, GFP_KERNEL);
1900 if (!iov)
1901 goto out_put;
1902 }
1903
1904 /* This will also move the address data into kernel space */
1905 if (MSG_CMSG_COMPAT & flags) {
230b1839
YH
1906 err = verify_compat_iovec(&msg_sys, iov,
1907 (struct sockaddr *)&address,
1908 VERIFY_READ);
1da177e4 1909 } else
230b1839
YH
1910 err = verify_iovec(&msg_sys, iov,
1911 (struct sockaddr *)&address,
1912 VERIFY_READ);
89bddce5 1913 if (err < 0)
1da177e4
LT
1914 goto out_freeiov;
1915 total_len = err;
1916
1917 err = -ENOBUFS;
1918
1919 if (msg_sys.msg_controllen > INT_MAX)
1920 goto out_freeiov;
89bddce5 1921 ctl_len = msg_sys.msg_controllen;
1da177e4 1922 if ((MSG_CMSG_COMPAT & flags) && ctl_len) {
89bddce5
SH
1923 err =
1924 cmsghdr_from_user_compat_to_kern(&msg_sys, sock->sk, ctl,
1925 sizeof(ctl));
1da177e4
LT
1926 if (err)
1927 goto out_freeiov;
1928 ctl_buf = msg_sys.msg_control;
8920e8f9 1929 ctl_len = msg_sys.msg_controllen;
1da177e4 1930 } else if (ctl_len) {
89bddce5 1931 if (ctl_len > sizeof(ctl)) {
1da177e4 1932 ctl_buf = sock_kmalloc(sock->sk, ctl_len, GFP_KERNEL);
89bddce5 1933 if (ctl_buf == NULL)
1da177e4
LT
1934 goto out_freeiov;
1935 }
1936 err = -EFAULT;
1937 /*
1938 * Careful! Before this, msg_sys.msg_control contains a user pointer.
1939 * Afterwards, it will be a kernel pointer. Thus the compiler-assisted
1940 * checking falls down on this.
1941 */
89bddce5
SH
1942 if (copy_from_user(ctl_buf, (void __user *)msg_sys.msg_control,
1943 ctl_len))
1da177e4
LT
1944 goto out_freectl;
1945 msg_sys.msg_control = ctl_buf;
1946 }
1947 msg_sys.msg_flags = flags;
1948
1949 if (sock->file->f_flags & O_NONBLOCK)
1950 msg_sys.msg_flags |= MSG_DONTWAIT;
1951 err = sock_sendmsg(sock, &msg_sys, total_len);
1952
1953out_freectl:
89bddce5 1954 if (ctl_buf != ctl)
1da177e4
LT
1955 sock_kfree_s(sock->sk, ctl_buf, ctl_len);
1956out_freeiov:
1957 if (iov != iovstack)
1958 sock_kfree_s(sock->sk, iov, iov_size);
1959out_put:
6cb153ca 1960 fput_light(sock->file, fput_needed);
89bddce5 1961out:
1da177e4
LT
1962 return err;
1963}
1964
1965/*
1966 * BSD recvmsg interface
1967 */
1968
3e0fa65f
HC
1969SYSCALL_DEFINE3(recvmsg, int, fd, struct msghdr __user *, msg,
1970 unsigned int, flags)
1da177e4 1971{
89bddce5
SH
1972 struct compat_msghdr __user *msg_compat =
1973 (struct compat_msghdr __user *)msg;
1da177e4
LT
1974 struct socket *sock;
1975 struct iovec iovstack[UIO_FASTIOV];
89bddce5 1976 struct iovec *iov = iovstack;
1da177e4
LT
1977 struct msghdr msg_sys;
1978 unsigned long cmsg_ptr;
1979 int err, iov_size, total_len, len;
6cb153ca 1980 int fput_needed;
1da177e4
LT
1981
1982 /* kernel mode address */
230b1839 1983 struct sockaddr_storage addr;
1da177e4
LT
1984
1985 /* user mode address pointers */
1986 struct sockaddr __user *uaddr;
1987 int __user *uaddr_len;
89bddce5 1988
1da177e4
LT
1989 if (MSG_CMSG_COMPAT & flags) {
1990 if (get_compat_msghdr(&msg_sys, msg_compat))
1991 return -EFAULT;
89bddce5
SH
1992 }
1993 else if (copy_from_user(&msg_sys, msg, sizeof(struct msghdr)))
1994 return -EFAULT;
1da177e4 1995
6cb153ca 1996 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4
LT
1997 if (!sock)
1998 goto out;
1999
2000 err = -EMSGSIZE;
2001 if (msg_sys.msg_iovlen > UIO_MAXIOV)
2002 goto out_put;
89bddce5
SH
2003
2004 /* Check whether to allocate the iovec area */
1da177e4
LT
2005 err = -ENOMEM;
2006 iov_size = msg_sys.msg_iovlen * sizeof(struct iovec);
2007 if (msg_sys.msg_iovlen > UIO_FASTIOV) {
2008 iov = sock_kmalloc(sock->sk, iov_size, GFP_KERNEL);
2009 if (!iov)
2010 goto out_put;
2011 }
2012
2013 /*
89bddce5
SH
2014 * Save the user-mode address (verify_iovec will change the
2015 * kernel msghdr to use the kernel address space)
1da177e4 2016 */
89bddce5 2017
cfcabdcc 2018 uaddr = (__force void __user *)msg_sys.msg_name;
1da177e4
LT
2019 uaddr_len = COMPAT_NAMELEN(msg);
2020 if (MSG_CMSG_COMPAT & flags) {
230b1839
YH
2021 err = verify_compat_iovec(&msg_sys, iov,
2022 (struct sockaddr *)&addr,
2023 VERIFY_WRITE);
1da177e4 2024 } else
230b1839
YH
2025 err = verify_iovec(&msg_sys, iov,
2026 (struct sockaddr *)&addr,
2027 VERIFY_WRITE);
1da177e4
LT
2028 if (err < 0)
2029 goto out_freeiov;
89bddce5 2030 total_len = err;
1da177e4
LT
2031
2032 cmsg_ptr = (unsigned long)msg_sys.msg_control;
4a19542e 2033 msg_sys.msg_flags = flags & (MSG_CMSG_CLOEXEC|MSG_CMSG_COMPAT);
89bddce5 2034
1da177e4
LT
2035 if (sock->file->f_flags & O_NONBLOCK)
2036 flags |= MSG_DONTWAIT;
2037 err = sock_recvmsg(sock, &msg_sys, total_len, flags);
2038 if (err < 0)
2039 goto out_freeiov;
2040 len = err;
2041
2042 if (uaddr != NULL) {
230b1839
YH
2043 err = move_addr_to_user((struct sockaddr *)&addr,
2044 msg_sys.msg_namelen, uaddr,
89bddce5 2045 uaddr_len);
1da177e4
LT
2046 if (err < 0)
2047 goto out_freeiov;
2048 }
37f7f421
DM
2049 err = __put_user((msg_sys.msg_flags & ~MSG_CMSG_COMPAT),
2050 COMPAT_FLAGS(msg));
1da177e4
LT
2051 if (err)
2052 goto out_freeiov;
2053 if (MSG_CMSG_COMPAT & flags)
89bddce5 2054 err = __put_user((unsigned long)msg_sys.msg_control - cmsg_ptr,
1da177e4
LT
2055 &msg_compat->msg_controllen);
2056 else
89bddce5 2057 err = __put_user((unsigned long)msg_sys.msg_control - cmsg_ptr,
1da177e4
LT
2058 &msg->msg_controllen);
2059 if (err)
2060 goto out_freeiov;
2061 err = len;
2062
2063out_freeiov:
2064 if (iov != iovstack)
2065 sock_kfree_s(sock->sk, iov, iov_size);
2066out_put:
6cb153ca 2067 fput_light(sock->file, fput_needed);
1da177e4
LT
2068out:
2069 return err;
2070}
2071
2072#ifdef __ARCH_WANT_SYS_SOCKETCALL
2073
2074/* Argument list sizes for sys_socketcall */
2075#define AL(x) ((x) * sizeof(unsigned long))
aaca0bdc 2076static const unsigned char nargs[19]={
89bddce5
SH
2077 AL(0),AL(3),AL(3),AL(3),AL(2),AL(3),
2078 AL(3),AL(3),AL(4),AL(4),AL(4),AL(6),
aaca0bdc 2079 AL(6),AL(2),AL(5),AL(5),AL(3),AL(3),
de11defe 2080 AL(4)
89bddce5
SH
2081};
2082
1da177e4
LT
2083#undef AL
2084
2085/*
89bddce5 2086 * System call vectors.
1da177e4
LT
2087 *
2088 * Argument checking cleaned up. Saved 20% in size.
2089 * This function doesn't need to set the kernel lock because
89bddce5 2090 * it is set by the callees.
1da177e4
LT
2091 */
2092
3e0fa65f 2093SYSCALL_DEFINE2(socketcall, int, call, unsigned long __user *, args)
1da177e4
LT
2094{
2095 unsigned long a[6];
89bddce5 2096 unsigned long a0, a1;
1da177e4
LT
2097 int err;
2098
de11defe 2099 if (call < 1 || call > SYS_ACCEPT4)
1da177e4
LT
2100 return -EINVAL;
2101
2102 /* copy_from_user should be SMP safe. */
2103 if (copy_from_user(a, args, nargs[call]))
2104 return -EFAULT;
3ec3b2fb 2105
f3298dc4 2106 audit_socketcall(nargs[call] / sizeof(unsigned long), a);
3ec3b2fb 2107
89bddce5
SH
2108 a0 = a[0];
2109 a1 = a[1];
2110
2111 switch (call) {
2112 case SYS_SOCKET:
2113 err = sys_socket(a0, a1, a[2]);
2114 break;
2115 case SYS_BIND:
2116 err = sys_bind(a0, (struct sockaddr __user *)a1, a[2]);
2117 break;
2118 case SYS_CONNECT:
2119 err = sys_connect(a0, (struct sockaddr __user *)a1, a[2]);
2120 break;
2121 case SYS_LISTEN:
2122 err = sys_listen(a0, a1);
2123 break;
2124 case SYS_ACCEPT:
de11defe
UD
2125 err = sys_accept4(a0, (struct sockaddr __user *)a1,
2126 (int __user *)a[2], 0);
89bddce5
SH
2127 break;
2128 case SYS_GETSOCKNAME:
2129 err =
2130 sys_getsockname(a0, (struct sockaddr __user *)a1,
2131 (int __user *)a[2]);
2132 break;
2133 case SYS_GETPEERNAME:
2134 err =
2135 sys_getpeername(a0, (struct sockaddr __user *)a1,
2136 (int __user *)a[2]);
2137 break;
2138 case SYS_SOCKETPAIR:
2139 err = sys_socketpair(a0, a1, a[2], (int __user *)a[3]);
2140 break;
2141 case SYS_SEND:
2142 err = sys_send(a0, (void __user *)a1, a[2], a[3]);
2143 break;
2144 case SYS_SENDTO:
2145 err = sys_sendto(a0, (void __user *)a1, a[2], a[3],
2146 (struct sockaddr __user *)a[4], a[5]);
2147 break;
2148 case SYS_RECV:
2149 err = sys_recv(a0, (void __user *)a1, a[2], a[3]);
2150 break;
2151 case SYS_RECVFROM:
2152 err = sys_recvfrom(a0, (void __user *)a1, a[2], a[3],
2153 (struct sockaddr __user *)a[4],
2154 (int __user *)a[5]);
2155 break;
2156 case SYS_SHUTDOWN:
2157 err = sys_shutdown(a0, a1);
2158 break;
2159 case SYS_SETSOCKOPT:
2160 err = sys_setsockopt(a0, a1, a[2], (char __user *)a[3], a[4]);
2161 break;
2162 case SYS_GETSOCKOPT:
2163 err =
2164 sys_getsockopt(a0, a1, a[2], (char __user *)a[3],
2165 (int __user *)a[4]);
2166 break;
2167 case SYS_SENDMSG:
2168 err = sys_sendmsg(a0, (struct msghdr __user *)a1, a[2]);
2169 break;
2170 case SYS_RECVMSG:
2171 err = sys_recvmsg(a0, (struct msghdr __user *)a1, a[2]);
2172 break;
de11defe
UD
2173 case SYS_ACCEPT4:
2174 err = sys_accept4(a0, (struct sockaddr __user *)a1,
2175 (int __user *)a[2], a[3]);
aaca0bdc 2176 break;
89bddce5
SH
2177 default:
2178 err = -EINVAL;
2179 break;
1da177e4
LT
2180 }
2181 return err;
2182}
2183
89bddce5 2184#endif /* __ARCH_WANT_SYS_SOCKETCALL */
1da177e4 2185
55737fda
SH
2186/**
2187 * sock_register - add a socket protocol handler
2188 * @ops: description of protocol
2189 *
1da177e4
LT
2190 * This function is called by a protocol handler that wants to
2191 * advertise its address family, and have it linked into the
55737fda
SH
2192 * socket interface. The value ops->family coresponds to the
2193 * socket system call protocol family.
1da177e4 2194 */
f0fd27d4 2195int sock_register(const struct net_proto_family *ops)
1da177e4
LT
2196{
2197 int err;
2198
2199 if (ops->family >= NPROTO) {
89bddce5
SH
2200 printk(KERN_CRIT "protocol %d >= NPROTO(%d)\n", ops->family,
2201 NPROTO);
1da177e4
LT
2202 return -ENOBUFS;
2203 }
55737fda
SH
2204
2205 spin_lock(&net_family_lock);
2206 if (net_families[ops->family])
2207 err = -EEXIST;
2208 else {
89bddce5 2209 net_families[ops->family] = ops;
1da177e4
LT
2210 err = 0;
2211 }
55737fda
SH
2212 spin_unlock(&net_family_lock);
2213
89bddce5 2214 printk(KERN_INFO "NET: Registered protocol family %d\n", ops->family);
1da177e4
LT
2215 return err;
2216}
2217
55737fda
SH
2218/**
2219 * sock_unregister - remove a protocol handler
2220 * @family: protocol family to remove
2221 *
1da177e4
LT
2222 * This function is called by a protocol handler that wants to
2223 * remove its address family, and have it unlinked from the
55737fda
SH
2224 * new socket creation.
2225 *
2226 * If protocol handler is a module, then it can use module reference
2227 * counts to protect against new references. If protocol handler is not
2228 * a module then it needs to provide its own protection in
2229 * the ops->create routine.
1da177e4 2230 */
f0fd27d4 2231void sock_unregister(int family)
1da177e4 2232{
f0fd27d4 2233 BUG_ON(family < 0 || family >= NPROTO);
1da177e4 2234
55737fda 2235 spin_lock(&net_family_lock);
89bddce5 2236 net_families[family] = NULL;
55737fda
SH
2237 spin_unlock(&net_family_lock);
2238
2239 synchronize_rcu();
2240
89bddce5 2241 printk(KERN_INFO "NET: Unregistered protocol family %d\n", family);
1da177e4
LT
2242}
2243
77d76ea3 2244static int __init sock_init(void)
1da177e4
LT
2245{
2246 /*
89bddce5 2247 * Initialize sock SLAB cache.
1da177e4 2248 */
89bddce5 2249
1da177e4
LT
2250 sk_init();
2251
1da177e4 2252 /*
89bddce5 2253 * Initialize skbuff SLAB cache
1da177e4
LT
2254 */
2255 skb_init();
1da177e4
LT
2256
2257 /*
89bddce5 2258 * Initialize the protocols module.
1da177e4
LT
2259 */
2260
2261 init_inodecache();
2262 register_filesystem(&sock_fs_type);
2263 sock_mnt = kern_mount(&sock_fs_type);
77d76ea3
AK
2264
2265 /* The real protocol initialization is performed in later initcalls.
1da177e4
LT
2266 */
2267
2268#ifdef CONFIG_NETFILTER
2269 netfilter_init();
2270#endif
cbeb321a
DM
2271
2272 return 0;
1da177e4
LT
2273}
2274
77d76ea3
AK
2275core_initcall(sock_init); /* early initcall */
2276
1da177e4
LT
2277#ifdef CONFIG_PROC_FS
2278void socket_seq_show(struct seq_file *seq)
2279{
2280 int cpu;
2281 int counter = 0;
2282
6f912042 2283 for_each_possible_cpu(cpu)
89bddce5 2284 counter += per_cpu(sockets_in_use, cpu);
1da177e4
LT
2285
2286 /* It can be negative, by the way. 8) */
2287 if (counter < 0)
2288 counter = 0;
2289
2290 seq_printf(seq, "sockets: used %d\n", counter);
2291}
89bddce5 2292#endif /* CONFIG_PROC_FS */
1da177e4 2293
89bbfc95
SP
2294#ifdef CONFIG_COMPAT
2295static long compat_sock_ioctl(struct file *file, unsigned cmd,
89bddce5 2296 unsigned long arg)
89bbfc95
SP
2297{
2298 struct socket *sock = file->private_data;
2299 int ret = -ENOIOCTLCMD;
87de87d5
DM
2300 struct sock *sk;
2301 struct net *net;
2302
2303 sk = sock->sk;
2304 net = sock_net(sk);
89bbfc95
SP
2305
2306 if (sock->ops->compat_ioctl)
2307 ret = sock->ops->compat_ioctl(sock, cmd, arg);
2308
87de87d5
DM
2309 if (ret == -ENOIOCTLCMD &&
2310 (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST))
2311 ret = compat_wext_handle_ioctl(net, cmd, arg);
2312
89bbfc95
SP
2313 return ret;
2314}
2315#endif
2316
ac5a488e
SS
2317int kernel_bind(struct socket *sock, struct sockaddr *addr, int addrlen)
2318{
2319 return sock->ops->bind(sock, addr, addrlen);
2320}
2321
2322int kernel_listen(struct socket *sock, int backlog)
2323{
2324 return sock->ops->listen(sock, backlog);
2325}
2326
2327int kernel_accept(struct socket *sock, struct socket **newsock, int flags)
2328{
2329 struct sock *sk = sock->sk;
2330 int err;
2331
2332 err = sock_create_lite(sk->sk_family, sk->sk_type, sk->sk_protocol,
2333 newsock);
2334 if (err < 0)
2335 goto done;
2336
2337 err = sock->ops->accept(sock, *newsock, flags);
2338 if (err < 0) {
2339 sock_release(*newsock);
fa8705b0 2340 *newsock = NULL;
ac5a488e
SS
2341 goto done;
2342 }
2343
2344 (*newsock)->ops = sock->ops;
1b08534e 2345 __module_get((*newsock)->ops->owner);
ac5a488e
SS
2346
2347done:
2348 return err;
2349}
2350
2351int kernel_connect(struct socket *sock, struct sockaddr *addr, int addrlen,
4768fbcb 2352 int flags)
ac5a488e
SS
2353{
2354 return sock->ops->connect(sock, addr, addrlen, flags);
2355}
2356
2357int kernel_getsockname(struct socket *sock, struct sockaddr *addr,
2358 int *addrlen)
2359{
2360 return sock->ops->getname(sock, addr, addrlen, 0);
2361}
2362
2363int kernel_getpeername(struct socket *sock, struct sockaddr *addr,
2364 int *addrlen)
2365{
2366 return sock->ops->getname(sock, addr, addrlen, 1);
2367}
2368
2369int kernel_getsockopt(struct socket *sock, int level, int optname,
2370 char *optval, int *optlen)
2371{
2372 mm_segment_t oldfs = get_fs();
2373 int err;
2374
2375 set_fs(KERNEL_DS);
2376 if (level == SOL_SOCKET)
2377 err = sock_getsockopt(sock, level, optname, optval, optlen);
2378 else
2379 err = sock->ops->getsockopt(sock, level, optname, optval,
2380 optlen);
2381 set_fs(oldfs);
2382 return err;
2383}
2384
2385int kernel_setsockopt(struct socket *sock, int level, int optname,
2386 char *optval, int optlen)
2387{
2388 mm_segment_t oldfs = get_fs();
2389 int err;
2390
2391 set_fs(KERNEL_DS);
2392 if (level == SOL_SOCKET)
2393 err = sock_setsockopt(sock, level, optname, optval, optlen);
2394 else
2395 err = sock->ops->setsockopt(sock, level, optname, optval,
2396 optlen);
2397 set_fs(oldfs);
2398 return err;
2399}
2400
2401int kernel_sendpage(struct socket *sock, struct page *page, int offset,
2402 size_t size, int flags)
2403{
2404 if (sock->ops->sendpage)
2405 return sock->ops->sendpage(sock, page, offset, size, flags);
2406
2407 return sock_no_sendpage(sock, page, offset, size, flags);
2408}
2409
2410int kernel_sock_ioctl(struct socket *sock, int cmd, unsigned long arg)
2411{
2412 mm_segment_t oldfs = get_fs();
2413 int err;
2414
2415 set_fs(KERNEL_DS);
2416 err = sock->ops->ioctl(sock, cmd, arg);
2417 set_fs(oldfs);
2418
2419 return err;
2420}
2421
91cf45f0
TM
2422int kernel_sock_shutdown(struct socket *sock, enum sock_shutdown_cmd how)
2423{
2424 return sock->ops->shutdown(sock, how);
2425}
2426
1da177e4
LT
2427EXPORT_SYMBOL(sock_create);
2428EXPORT_SYMBOL(sock_create_kern);
2429EXPORT_SYMBOL(sock_create_lite);
2430EXPORT_SYMBOL(sock_map_fd);
2431EXPORT_SYMBOL(sock_recvmsg);
2432EXPORT_SYMBOL(sock_register);
2433EXPORT_SYMBOL(sock_release);
2434EXPORT_SYMBOL(sock_sendmsg);
2435EXPORT_SYMBOL(sock_unregister);
2436EXPORT_SYMBOL(sock_wake_async);
2437EXPORT_SYMBOL(sockfd_lookup);
2438EXPORT_SYMBOL(kernel_sendmsg);
2439EXPORT_SYMBOL(kernel_recvmsg);
ac5a488e
SS
2440EXPORT_SYMBOL(kernel_bind);
2441EXPORT_SYMBOL(kernel_listen);
2442EXPORT_SYMBOL(kernel_accept);
2443EXPORT_SYMBOL(kernel_connect);
2444EXPORT_SYMBOL(kernel_getsockname);
2445EXPORT_SYMBOL(kernel_getpeername);
2446EXPORT_SYMBOL(kernel_getsockopt);
2447EXPORT_SYMBOL(kernel_setsockopt);
2448EXPORT_SYMBOL(kernel_sendpage);
2449EXPORT_SYMBOL(kernel_sock_ioctl);
91cf45f0 2450EXPORT_SYMBOL(kernel_sock_shutdown);
This page took 0.663498 seconds and 5 git commands to generate.