netfilter: xt_hashlimit does a wrong SEQ_SKIP
[deliverable/linux.git] / net / socket.c
CommitLineData
1da177e4
LT
1/*
2 * NET An implementation of the SOCKET network access protocol.
3 *
4 * Version: @(#)socket.c 1.1.93 18/02/95
5 *
6 * Authors: Orest Zborowski, <obz@Kodak.COM>
02c30a84 7 * Ross Biro
1da177e4
LT
8 * Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
9 *
10 * Fixes:
11 * Anonymous : NOTSOCK/BADF cleanup. Error fix in
12 * shutdown()
13 * Alan Cox : verify_area() fixes
14 * Alan Cox : Removed DDI
15 * Jonathan Kamens : SOCK_DGRAM reconnect bug
16 * Alan Cox : Moved a load of checks to the very
17 * top level.
18 * Alan Cox : Move address structures to/from user
19 * mode above the protocol layers.
20 * Rob Janssen : Allow 0 length sends.
21 * Alan Cox : Asynchronous I/O support (cribbed from the
22 * tty drivers).
23 * Niibe Yutaka : Asynchronous I/O for writes (4.4BSD style)
24 * Jeff Uphoff : Made max number of sockets command-line
25 * configurable.
26 * Matti Aarnio : Made the number of sockets dynamic,
27 * to be allocated when needed, and mr.
28 * Uphoff's max is used as max to be
29 * allowed to allocate.
30 * Linus : Argh. removed all the socket allocation
31 * altogether: it's in the inode now.
32 * Alan Cox : Made sock_alloc()/sock_release() public
33 * for NetROM and future kernel nfsd type
34 * stuff.
35 * Alan Cox : sendmsg/recvmsg basics.
36 * Tom Dyas : Export net symbols.
37 * Marcin Dalecki : Fixed problems with CONFIG_NET="n".
38 * Alan Cox : Added thread locking to sys_* calls
39 * for sockets. May have errors at the
40 * moment.
41 * Kevin Buhr : Fixed the dumb errors in the above.
42 * Andi Kleen : Some small cleanups, optimizations,
43 * and fixed a copy_from_user() bug.
44 * Tigran Aivazian : sys_send(args) calls sys_sendto(args, NULL, 0)
89bddce5 45 * Tigran Aivazian : Made listen(2) backlog sanity checks
1da177e4
LT
46 * protocol-independent
47 *
48 *
49 * This program is free software; you can redistribute it and/or
50 * modify it under the terms of the GNU General Public License
51 * as published by the Free Software Foundation; either version
52 * 2 of the License, or (at your option) any later version.
53 *
54 *
55 * This module is effectively the top level interface to the BSD socket
89bddce5 56 * paradigm.
1da177e4
LT
57 *
58 * Based upon Swansea University Computer Society NET3.039
59 */
60
1da177e4 61#include <linux/mm.h>
1da177e4
LT
62#include <linux/socket.h>
63#include <linux/file.h>
64#include <linux/net.h>
65#include <linux/interrupt.h>
aaca0bdc 66#include <linux/thread_info.h>
55737fda 67#include <linux/rcupdate.h>
1da177e4
LT
68#include <linux/netdevice.h>
69#include <linux/proc_fs.h>
70#include <linux/seq_file.h>
4a3e2f71 71#include <linux/mutex.h>
1da177e4
LT
72#include <linux/wanrouter.h>
73#include <linux/if_bridge.h>
20380731
ACM
74#include <linux/if_frad.h>
75#include <linux/if_vlan.h>
1da177e4
LT
76#include <linux/init.h>
77#include <linux/poll.h>
78#include <linux/cache.h>
79#include <linux/module.h>
80#include <linux/highmem.h>
1da177e4
LT
81#include <linux/mount.h>
82#include <linux/security.h>
83#include <linux/syscalls.h>
84#include <linux/compat.h>
85#include <linux/kmod.h>
3ec3b2fb 86#include <linux/audit.h>
d86b5e0e 87#include <linux/wireless.h>
1b8d7ae4 88#include <linux/nsproxy.h>
1da177e4
LT
89
90#include <asm/uaccess.h>
91#include <asm/unistd.h>
92
93#include <net/compat.h>
87de87d5 94#include <net/wext.h>
1da177e4
LT
95
96#include <net/sock.h>
97#include <linux/netfilter.h>
98
99static int sock_no_open(struct inode *irrelevant, struct file *dontcare);
027445c3
BP
100static ssize_t sock_aio_read(struct kiocb *iocb, const struct iovec *iov,
101 unsigned long nr_segs, loff_t pos);
102static ssize_t sock_aio_write(struct kiocb *iocb, const struct iovec *iov,
103 unsigned long nr_segs, loff_t pos);
89bddce5 104static int sock_mmap(struct file *file, struct vm_area_struct *vma);
1da177e4
LT
105
106static int sock_close(struct inode *inode, struct file *file);
107static unsigned int sock_poll(struct file *file,
108 struct poll_table_struct *wait);
89bddce5 109static long sock_ioctl(struct file *file, unsigned int cmd, unsigned long arg);
89bbfc95
SP
110#ifdef CONFIG_COMPAT
111static long compat_sock_ioctl(struct file *file,
89bddce5 112 unsigned int cmd, unsigned long arg);
89bbfc95 113#endif
1da177e4 114static int sock_fasync(int fd, struct file *filp, int on);
1da177e4
LT
115static ssize_t sock_sendpage(struct file *file, struct page *page,
116 int offset, size_t size, loff_t *ppos, int more);
9c55e01c
JA
117static ssize_t sock_splice_read(struct file *file, loff_t *ppos,
118 struct pipe_inode_info *pipe, size_t len,
119 unsigned int flags);
1da177e4 120
1da177e4
LT
121/*
122 * Socket files have a set of 'special' operations as well as the generic file ones. These don't appear
123 * in the operation structures but are done directly via the socketcall() multiplexor.
124 */
125
da7071d7 126static const struct file_operations socket_file_ops = {
1da177e4
LT
127 .owner = THIS_MODULE,
128 .llseek = no_llseek,
129 .aio_read = sock_aio_read,
130 .aio_write = sock_aio_write,
131 .poll = sock_poll,
132 .unlocked_ioctl = sock_ioctl,
89bbfc95
SP
133#ifdef CONFIG_COMPAT
134 .compat_ioctl = compat_sock_ioctl,
135#endif
1da177e4
LT
136 .mmap = sock_mmap,
137 .open = sock_no_open, /* special open code to disallow open via /proc */
138 .release = sock_close,
139 .fasync = sock_fasync,
5274f052
JA
140 .sendpage = sock_sendpage,
141 .splice_write = generic_splice_sendpage,
9c55e01c 142 .splice_read = sock_splice_read,
1da177e4
LT
143};
144
145/*
146 * The protocol list. Each protocol is registered in here.
147 */
148
1da177e4 149static DEFINE_SPINLOCK(net_family_lock);
f0fd27d4 150static const struct net_proto_family *net_families[NPROTO] __read_mostly;
1da177e4 151
1da177e4
LT
152/*
153 * Statistics counters of the socket lists
154 */
155
156static DEFINE_PER_CPU(int, sockets_in_use) = 0;
157
158/*
89bddce5
SH
159 * Support routines.
160 * Move socket addresses back and forth across the kernel/user
161 * divide and look after the messy bits.
1da177e4
LT
162 */
163
89bddce5 164#define MAX_SOCK_ADDR 128 /* 108 for Unix domain -
1da177e4
LT
165 16 for IP, 16 for IPX,
166 24 for IPv6,
89bddce5 167 about 80 for AX.25
1da177e4
LT
168 must be at least one bigger than
169 the AF_UNIX size (see net/unix/af_unix.c
89bddce5 170 :unix_mkname()).
1da177e4 171 */
89bddce5 172
1da177e4
LT
173/**
174 * move_addr_to_kernel - copy a socket address into kernel space
175 * @uaddr: Address in user space
176 * @kaddr: Address in kernel space
177 * @ulen: Length in user space
178 *
179 * The address is copied into kernel space. If the provided address is
180 * too long an error code of -EINVAL is returned. If the copy gives
181 * invalid addresses -EFAULT is returned. On a success 0 is returned.
182 */
183
230b1839 184int move_addr_to_kernel(void __user *uaddr, int ulen, struct sockaddr *kaddr)
1da177e4 185{
230b1839 186 if (ulen < 0 || ulen > sizeof(struct sockaddr_storage))
1da177e4 187 return -EINVAL;
89bddce5 188 if (ulen == 0)
1da177e4 189 return 0;
89bddce5 190 if (copy_from_user(kaddr, uaddr, ulen))
1da177e4 191 return -EFAULT;
3ec3b2fb 192 return audit_sockaddr(ulen, kaddr);
1da177e4
LT
193}
194
195/**
196 * move_addr_to_user - copy an address to user space
197 * @kaddr: kernel space address
198 * @klen: length of address in kernel
199 * @uaddr: user space address
200 * @ulen: pointer to user length field
201 *
202 * The value pointed to by ulen on entry is the buffer length available.
203 * This is overwritten with the buffer space used. -EINVAL is returned
204 * if an overlong buffer is specified or a negative buffer size. -EFAULT
205 * is returned if either the buffer or the length field are not
206 * accessible.
207 * After copying the data up to the limit the user specifies, the true
208 * length of the data is written over the length limit the user
209 * specified. Zero is returned for a success.
210 */
89bddce5 211
230b1839 212int move_addr_to_user(struct sockaddr *kaddr, int klen, void __user *uaddr,
89bddce5 213 int __user *ulen)
1da177e4
LT
214{
215 int err;
216 int len;
217
89bddce5
SH
218 err = get_user(len, ulen);
219 if (err)
1da177e4 220 return err;
89bddce5
SH
221 if (len > klen)
222 len = klen;
230b1839 223 if (len < 0 || len > sizeof(struct sockaddr_storage))
1da177e4 224 return -EINVAL;
89bddce5 225 if (len) {
d6fe3945
SG
226 if (audit_sockaddr(klen, kaddr))
227 return -ENOMEM;
89bddce5 228 if (copy_to_user(uaddr, kaddr, len))
1da177e4
LT
229 return -EFAULT;
230 }
231 /*
89bddce5
SH
232 * "fromlen shall refer to the value before truncation.."
233 * 1003.1g
1da177e4
LT
234 */
235 return __put_user(klen, ulen);
236}
237
238#define SOCKFS_MAGIC 0x534F434B
239
e18b890b 240static struct kmem_cache *sock_inode_cachep __read_mostly;
1da177e4
LT
241
242static struct inode *sock_alloc_inode(struct super_block *sb)
243{
244 struct socket_alloc *ei;
89bddce5 245
e94b1766 246 ei = kmem_cache_alloc(sock_inode_cachep, GFP_KERNEL);
1da177e4
LT
247 if (!ei)
248 return NULL;
249 init_waitqueue_head(&ei->socket.wait);
89bddce5 250
1da177e4
LT
251 ei->socket.fasync_list = NULL;
252 ei->socket.state = SS_UNCONNECTED;
253 ei->socket.flags = 0;
254 ei->socket.ops = NULL;
255 ei->socket.sk = NULL;
256 ei->socket.file = NULL;
1da177e4
LT
257
258 return &ei->vfs_inode;
259}
260
261static void sock_destroy_inode(struct inode *inode)
262{
263 kmem_cache_free(sock_inode_cachep,
264 container_of(inode, struct socket_alloc, vfs_inode));
265}
266
51cc5068 267static void init_once(void *foo)
1da177e4 268{
89bddce5 269 struct socket_alloc *ei = (struct socket_alloc *)foo;
1da177e4 270
a35afb83 271 inode_init_once(&ei->vfs_inode);
1da177e4 272}
89bddce5 273
1da177e4
LT
274static int init_inodecache(void)
275{
276 sock_inode_cachep = kmem_cache_create("sock_inode_cache",
89bddce5
SH
277 sizeof(struct socket_alloc),
278 0,
279 (SLAB_HWCACHE_ALIGN |
280 SLAB_RECLAIM_ACCOUNT |
281 SLAB_MEM_SPREAD),
20c2df83 282 init_once);
1da177e4
LT
283 if (sock_inode_cachep == NULL)
284 return -ENOMEM;
285 return 0;
286}
287
288static struct super_operations sockfs_ops = {
289 .alloc_inode = sock_alloc_inode,
290 .destroy_inode =sock_destroy_inode,
291 .statfs = simple_statfs,
292};
293
454e2398 294static int sockfs_get_sb(struct file_system_type *fs_type,
89bddce5
SH
295 int flags, const char *dev_name, void *data,
296 struct vfsmount *mnt)
1da177e4 297{
454e2398
DH
298 return get_sb_pseudo(fs_type, "socket:", &sockfs_ops, SOCKFS_MAGIC,
299 mnt);
1da177e4
LT
300}
301
ba89966c 302static struct vfsmount *sock_mnt __read_mostly;
1da177e4
LT
303
304static struct file_system_type sock_fs_type = {
305 .name = "sockfs",
306 .get_sb = sockfs_get_sb,
307 .kill_sb = kill_anon_super,
308};
89bddce5 309
1da177e4
LT
310static int sockfs_delete_dentry(struct dentry *dentry)
311{
304e61e6
ED
312 /*
313 * At creation time, we pretended this dentry was hashed
314 * (by clearing DCACHE_UNHASHED bit in d_flags)
315 * At delete time, we restore the truth : not hashed.
316 * (so that dput() can proceed correctly)
317 */
318 dentry->d_flags |= DCACHE_UNHASHED;
319 return 0;
1da177e4 320}
c23fbb6b
ED
321
322/*
323 * sockfs_dname() is called from d_path().
324 */
325static char *sockfs_dname(struct dentry *dentry, char *buffer, int buflen)
326{
327 return dynamic_dname(dentry, buffer, buflen, "socket:[%lu]",
328 dentry->d_inode->i_ino);
329}
330
3ba13d17 331static const struct dentry_operations sockfs_dentry_operations = {
89bddce5 332 .d_delete = sockfs_delete_dentry,
c23fbb6b 333 .d_dname = sockfs_dname,
1da177e4
LT
334};
335
336/*
337 * Obtains the first available file descriptor and sets it up for use.
338 *
39d8c1b6
DM
339 * These functions create file structures and maps them to fd space
340 * of the current process. On success it returns file descriptor
1da177e4
LT
341 * and file struct implicitly stored in sock->file.
342 * Note that another thread may close file descriptor before we return
343 * from this function. We use the fact that now we do not refer
344 * to socket after mapping. If one day we will need it, this
345 * function will increment ref. count on file by 1.
346 *
347 * In any case returned fd MAY BE not valid!
348 * This race condition is unavoidable
349 * with shared fd spaces, we cannot solve it inside kernel,
350 * but we take care of internal coherence yet.
351 */
352
a677a039 353static int sock_alloc_fd(struct file **filep, int flags)
1da177e4
LT
354{
355 int fd;
1da177e4 356
a677a039 357 fd = get_unused_fd_flags(flags);
39d8c1b6 358 if (likely(fd >= 0)) {
1da177e4
LT
359 struct file *file = get_empty_filp();
360
39d8c1b6
DM
361 *filep = file;
362 if (unlikely(!file)) {
1da177e4 363 put_unused_fd(fd);
39d8c1b6 364 return -ENFILE;
1da177e4 365 }
39d8c1b6
DM
366 } else
367 *filep = NULL;
368 return fd;
369}
1da177e4 370
77d27200 371static int sock_attach_fd(struct socket *sock, struct file *file, int flags)
39d8c1b6 372{
ce8d2cdf 373 struct dentry *dentry;
c23fbb6b 374 struct qstr name = { .name = "" };
39d8c1b6 375
ce8d2cdf
DH
376 dentry = d_alloc(sock_mnt->mnt_sb->s_root, &name);
377 if (unlikely(!dentry))
39d8c1b6
DM
378 return -ENOMEM;
379
ce8d2cdf 380 dentry->d_op = &sockfs_dentry_operations;
304e61e6
ED
381 /*
382 * We dont want to push this dentry into global dentry hash table.
383 * We pretend dentry is already hashed, by unsetting DCACHE_UNHASHED
384 * This permits a working /proc/$pid/fd/XXX on sockets
385 */
ce8d2cdf
DH
386 dentry->d_flags &= ~DCACHE_UNHASHED;
387 d_instantiate(dentry, SOCK_INODE(sock));
39d8c1b6
DM
388
389 sock->file = file;
ce8d2cdf
DH
390 init_file(file, sock_mnt, dentry, FMODE_READ | FMODE_WRITE,
391 &socket_file_ops);
392 SOCK_INODE(sock)->i_fop = &socket_file_ops;
77d27200 393 file->f_flags = O_RDWR | (flags & O_NONBLOCK);
39d8c1b6
DM
394 file->f_pos = 0;
395 file->private_data = sock;
1da177e4 396
39d8c1b6
DM
397 return 0;
398}
399
a677a039 400int sock_map_fd(struct socket *sock, int flags)
39d8c1b6
DM
401{
402 struct file *newfile;
a677a039 403 int fd = sock_alloc_fd(&newfile, flags);
39d8c1b6
DM
404
405 if (likely(fd >= 0)) {
77d27200 406 int err = sock_attach_fd(sock, newfile, flags);
39d8c1b6
DM
407
408 if (unlikely(err < 0)) {
409 put_filp(newfile);
1da177e4 410 put_unused_fd(fd);
39d8c1b6 411 return err;
1da177e4 412 }
39d8c1b6 413 fd_install(fd, newfile);
1da177e4 414 }
1da177e4
LT
415 return fd;
416}
417
6cb153ca
BL
418static struct socket *sock_from_file(struct file *file, int *err)
419{
6cb153ca
BL
420 if (file->f_op == &socket_file_ops)
421 return file->private_data; /* set in sock_map_fd */
422
23bb80d2
ED
423 *err = -ENOTSOCK;
424 return NULL;
6cb153ca
BL
425}
426
1da177e4
LT
427/**
428 * sockfd_lookup - Go from a file number to its socket slot
429 * @fd: file handle
430 * @err: pointer to an error code return
431 *
432 * The file handle passed in is locked and the socket it is bound
433 * too is returned. If an error occurs the err pointer is overwritten
434 * with a negative errno code and NULL is returned. The function checks
435 * for both invalid handles and passing a handle which is not a socket.
436 *
437 * On a success the socket object pointer is returned.
438 */
439
440struct socket *sockfd_lookup(int fd, int *err)
441{
442 struct file *file;
1da177e4
LT
443 struct socket *sock;
444
89bddce5
SH
445 file = fget(fd);
446 if (!file) {
1da177e4
LT
447 *err = -EBADF;
448 return NULL;
449 }
89bddce5 450
6cb153ca
BL
451 sock = sock_from_file(file, err);
452 if (!sock)
1da177e4 453 fput(file);
6cb153ca
BL
454 return sock;
455}
1da177e4 456
6cb153ca
BL
457static struct socket *sockfd_lookup_light(int fd, int *err, int *fput_needed)
458{
459 struct file *file;
460 struct socket *sock;
461
3672558c 462 *err = -EBADF;
6cb153ca
BL
463 file = fget_light(fd, fput_needed);
464 if (file) {
465 sock = sock_from_file(file, err);
466 if (sock)
467 return sock;
468 fput_light(file, *fput_needed);
1da177e4 469 }
6cb153ca 470 return NULL;
1da177e4
LT
471}
472
473/**
474 * sock_alloc - allocate a socket
89bddce5 475 *
1da177e4
LT
476 * Allocate a new inode and socket object. The two are bound together
477 * and initialised. The socket is then returned. If we are out of inodes
478 * NULL is returned.
479 */
480
481static struct socket *sock_alloc(void)
482{
89bddce5
SH
483 struct inode *inode;
484 struct socket *sock;
1da177e4
LT
485
486 inode = new_inode(sock_mnt->mnt_sb);
487 if (!inode)
488 return NULL;
489
490 sock = SOCKET_I(inode);
491
89bddce5 492 inode->i_mode = S_IFSOCK | S_IRWXUGO;
8192b0c4
DH
493 inode->i_uid = current_fsuid();
494 inode->i_gid = current_fsgid();
1da177e4
LT
495
496 get_cpu_var(sockets_in_use)++;
497 put_cpu_var(sockets_in_use);
498 return sock;
499}
500
501/*
502 * In theory you can't get an open on this inode, but /proc provides
503 * a back door. Remember to keep it shut otherwise you'll let the
504 * creepy crawlies in.
505 */
89bddce5 506
1da177e4
LT
507static int sock_no_open(struct inode *irrelevant, struct file *dontcare)
508{
509 return -ENXIO;
510}
511
4b6f5d20 512const struct file_operations bad_sock_fops = {
1da177e4
LT
513 .owner = THIS_MODULE,
514 .open = sock_no_open,
515};
516
517/**
518 * sock_release - close a socket
519 * @sock: socket to close
520 *
521 * The socket is released from the protocol stack if it has a release
522 * callback, and the inode is then released if the socket is bound to
89bddce5 523 * an inode not a file.
1da177e4 524 */
89bddce5 525
1da177e4
LT
526void sock_release(struct socket *sock)
527{
528 if (sock->ops) {
529 struct module *owner = sock->ops->owner;
530
531 sock->ops->release(sock);
532 sock->ops = NULL;
533 module_put(owner);
534 }
535
536 if (sock->fasync_list)
537 printk(KERN_ERR "sock_release: fasync list not empty!\n");
538
539 get_cpu_var(sockets_in_use)--;
540 put_cpu_var(sockets_in_use);
541 if (!sock->file) {
542 iput(SOCK_INODE(sock));
543 return;
544 }
89bddce5 545 sock->file = NULL;
1da177e4
LT
546}
547
20d49473
PO
548int sock_tx_timestamp(struct msghdr *msg, struct sock *sk,
549 union skb_shared_tx *shtx)
550{
551 shtx->flags = 0;
552 if (sock_flag(sk, SOCK_TIMESTAMPING_TX_HARDWARE))
553 shtx->hardware = 1;
554 if (sock_flag(sk, SOCK_TIMESTAMPING_TX_SOFTWARE))
555 shtx->software = 1;
556 return 0;
557}
558EXPORT_SYMBOL(sock_tx_timestamp);
559
89bddce5 560static inline int __sock_sendmsg(struct kiocb *iocb, struct socket *sock,
1da177e4
LT
561 struct msghdr *msg, size_t size)
562{
563 struct sock_iocb *si = kiocb_to_siocb(iocb);
564 int err;
565
566 si->sock = sock;
567 si->scm = NULL;
568 si->msg = msg;
569 si->size = size;
570
571 err = security_socket_sendmsg(sock, msg, size);
572 if (err)
573 return err;
574
575 return sock->ops->sendmsg(iocb, sock, msg, size);
576}
577
578int sock_sendmsg(struct socket *sock, struct msghdr *msg, size_t size)
579{
580 struct kiocb iocb;
581 struct sock_iocb siocb;
582 int ret;
583
584 init_sync_kiocb(&iocb, NULL);
585 iocb.private = &siocb;
586 ret = __sock_sendmsg(&iocb, sock, msg, size);
587 if (-EIOCBQUEUED == ret)
588 ret = wait_on_sync_kiocb(&iocb);
589 return ret;
590}
591
592int kernel_sendmsg(struct socket *sock, struct msghdr *msg,
593 struct kvec *vec, size_t num, size_t size)
594{
595 mm_segment_t oldfs = get_fs();
596 int result;
597
598 set_fs(KERNEL_DS);
599 /*
600 * the following is safe, since for compiler definitions of kvec and
601 * iovec are identical, yielding the same in-core layout and alignment
602 */
89bddce5 603 msg->msg_iov = (struct iovec *)vec;
1da177e4
LT
604 msg->msg_iovlen = num;
605 result = sock_sendmsg(sock, msg, size);
606 set_fs(oldfs);
607 return result;
608}
609
20d49473
PO
610static int ktime2ts(ktime_t kt, struct timespec *ts)
611{
612 if (kt.tv64) {
613 *ts = ktime_to_timespec(kt);
614 return 1;
615 } else {
616 return 0;
617 }
618}
619
92f37fd2
ED
620/*
621 * called from sock_recv_timestamp() if sock_flag(sk, SOCK_RCVTSTAMP)
622 */
623void __sock_recv_timestamp(struct msghdr *msg, struct sock *sk,
624 struct sk_buff *skb)
625{
20d49473
PO
626 int need_software_tstamp = sock_flag(sk, SOCK_RCVTSTAMP);
627 struct timespec ts[3];
628 int empty = 1;
629 struct skb_shared_hwtstamps *shhwtstamps =
630 skb_hwtstamps(skb);
631
632 /* Race occurred between timestamp enabling and packet
633 receiving. Fill in the current time for now. */
634 if (need_software_tstamp && skb->tstamp.tv64 == 0)
635 __net_timestamp(skb);
636
637 if (need_software_tstamp) {
638 if (!sock_flag(sk, SOCK_RCVTSTAMPNS)) {
639 struct timeval tv;
640 skb_get_timestamp(skb, &tv);
641 put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMP,
642 sizeof(tv), &tv);
643 } else {
644 struct timespec ts;
645 skb_get_timestampns(skb, &ts);
646 put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMPNS,
647 sizeof(ts), &ts);
648 }
649 }
650
651
652 memset(ts, 0, sizeof(ts));
653 if (skb->tstamp.tv64 &&
654 sock_flag(sk, SOCK_TIMESTAMPING_SOFTWARE)) {
655 skb_get_timestampns(skb, ts + 0);
656 empty = 0;
657 }
658 if (shhwtstamps) {
659 if (sock_flag(sk, SOCK_TIMESTAMPING_SYS_HARDWARE) &&
660 ktime2ts(shhwtstamps->syststamp, ts + 1))
661 empty = 0;
662 if (sock_flag(sk, SOCK_TIMESTAMPING_RAW_HARDWARE) &&
663 ktime2ts(shhwtstamps->hwtstamp, ts + 2))
664 empty = 0;
92f37fd2 665 }
20d49473
PO
666 if (!empty)
667 put_cmsg(msg, SOL_SOCKET,
668 SCM_TIMESTAMPING, sizeof(ts), &ts);
92f37fd2
ED
669}
670
7c81fd8b
ACM
671EXPORT_SYMBOL_GPL(__sock_recv_timestamp);
672
89bddce5 673static inline int __sock_recvmsg(struct kiocb *iocb, struct socket *sock,
1da177e4
LT
674 struct msghdr *msg, size_t size, int flags)
675{
676 int err;
677 struct sock_iocb *si = kiocb_to_siocb(iocb);
678
679 si->sock = sock;
680 si->scm = NULL;
681 si->msg = msg;
682 si->size = size;
683 si->flags = flags;
684
685 err = security_socket_recvmsg(sock, msg, size, flags);
686 if (err)
687 return err;
688
689 return sock->ops->recvmsg(iocb, sock, msg, size, flags);
690}
691
89bddce5 692int sock_recvmsg(struct socket *sock, struct msghdr *msg,
1da177e4
LT
693 size_t size, int flags)
694{
695 struct kiocb iocb;
696 struct sock_iocb siocb;
697 int ret;
698
89bddce5 699 init_sync_kiocb(&iocb, NULL);
1da177e4
LT
700 iocb.private = &siocb;
701 ret = __sock_recvmsg(&iocb, sock, msg, size, flags);
702 if (-EIOCBQUEUED == ret)
703 ret = wait_on_sync_kiocb(&iocb);
704 return ret;
705}
706
89bddce5
SH
707int kernel_recvmsg(struct socket *sock, struct msghdr *msg,
708 struct kvec *vec, size_t num, size_t size, int flags)
1da177e4
LT
709{
710 mm_segment_t oldfs = get_fs();
711 int result;
712
713 set_fs(KERNEL_DS);
714 /*
715 * the following is safe, since for compiler definitions of kvec and
716 * iovec are identical, yielding the same in-core layout and alignment
717 */
89bddce5 718 msg->msg_iov = (struct iovec *)vec, msg->msg_iovlen = num;
1da177e4
LT
719 result = sock_recvmsg(sock, msg, size, flags);
720 set_fs(oldfs);
721 return result;
722}
723
724static void sock_aio_dtor(struct kiocb *iocb)
725{
726 kfree(iocb->private);
727}
728
ce1d4d3e
CH
729static ssize_t sock_sendpage(struct file *file, struct page *page,
730 int offset, size_t size, loff_t *ppos, int more)
1da177e4 731{
1da177e4
LT
732 struct socket *sock;
733 int flags;
734
ce1d4d3e
CH
735 sock = file->private_data;
736
737 flags = !(file->f_flags & O_NONBLOCK) ? 0 : MSG_DONTWAIT;
738 if (more)
739 flags |= MSG_MORE;
740
741 return sock->ops->sendpage(sock, page, offset, size, flags);
742}
1da177e4 743
9c55e01c
JA
744static ssize_t sock_splice_read(struct file *file, loff_t *ppos,
745 struct pipe_inode_info *pipe, size_t len,
746 unsigned int flags)
747{
748 struct socket *sock = file->private_data;
749
997b37da
RDC
750 if (unlikely(!sock->ops->splice_read))
751 return -EINVAL;
752
9c55e01c
JA
753 return sock->ops->splice_read(sock, ppos, pipe, len, flags);
754}
755
ce1d4d3e 756static struct sock_iocb *alloc_sock_iocb(struct kiocb *iocb,
89bddce5 757 struct sock_iocb *siocb)
ce1d4d3e
CH
758{
759 if (!is_sync_kiocb(iocb)) {
760 siocb = kmalloc(sizeof(*siocb), GFP_KERNEL);
761 if (!siocb)
762 return NULL;
1da177e4
LT
763 iocb->ki_dtor = sock_aio_dtor;
764 }
1da177e4 765
ce1d4d3e 766 siocb->kiocb = iocb;
ce1d4d3e
CH
767 iocb->private = siocb;
768 return siocb;
1da177e4
LT
769}
770
ce1d4d3e 771static ssize_t do_sock_read(struct msghdr *msg, struct kiocb *iocb,
027445c3
BP
772 struct file *file, const struct iovec *iov,
773 unsigned long nr_segs)
ce1d4d3e
CH
774{
775 struct socket *sock = file->private_data;
776 size_t size = 0;
777 int i;
1da177e4 778
89bddce5
SH
779 for (i = 0; i < nr_segs; i++)
780 size += iov[i].iov_len;
1da177e4 781
ce1d4d3e
CH
782 msg->msg_name = NULL;
783 msg->msg_namelen = 0;
784 msg->msg_control = NULL;
785 msg->msg_controllen = 0;
89bddce5 786 msg->msg_iov = (struct iovec *)iov;
ce1d4d3e
CH
787 msg->msg_iovlen = nr_segs;
788 msg->msg_flags = (file->f_flags & O_NONBLOCK) ? MSG_DONTWAIT : 0;
789
790 return __sock_recvmsg(iocb, sock, msg, size, msg->msg_flags);
791}
792
027445c3
BP
793static ssize_t sock_aio_read(struct kiocb *iocb, const struct iovec *iov,
794 unsigned long nr_segs, loff_t pos)
ce1d4d3e
CH
795{
796 struct sock_iocb siocb, *x;
797
1da177e4
LT
798 if (pos != 0)
799 return -ESPIPE;
027445c3
BP
800
801 if (iocb->ki_left == 0) /* Match SYS5 behaviour */
1da177e4
LT
802 return 0;
803
027445c3
BP
804
805 x = alloc_sock_iocb(iocb, &siocb);
ce1d4d3e
CH
806 if (!x)
807 return -ENOMEM;
027445c3 808 return do_sock_read(&x->async_msg, iocb, iocb->ki_filp, iov, nr_segs);
1da177e4
LT
809}
810
ce1d4d3e 811static ssize_t do_sock_write(struct msghdr *msg, struct kiocb *iocb,
027445c3
BP
812 struct file *file, const struct iovec *iov,
813 unsigned long nr_segs)
1da177e4 814{
ce1d4d3e
CH
815 struct socket *sock = file->private_data;
816 size_t size = 0;
817 int i;
1da177e4 818
89bddce5
SH
819 for (i = 0; i < nr_segs; i++)
820 size += iov[i].iov_len;
1da177e4 821
ce1d4d3e
CH
822 msg->msg_name = NULL;
823 msg->msg_namelen = 0;
824 msg->msg_control = NULL;
825 msg->msg_controllen = 0;
89bddce5 826 msg->msg_iov = (struct iovec *)iov;
ce1d4d3e
CH
827 msg->msg_iovlen = nr_segs;
828 msg->msg_flags = (file->f_flags & O_NONBLOCK) ? MSG_DONTWAIT : 0;
829 if (sock->type == SOCK_SEQPACKET)
830 msg->msg_flags |= MSG_EOR;
1da177e4 831
ce1d4d3e 832 return __sock_sendmsg(iocb, sock, msg, size);
1da177e4
LT
833}
834
027445c3
BP
835static ssize_t sock_aio_write(struct kiocb *iocb, const struct iovec *iov,
836 unsigned long nr_segs, loff_t pos)
ce1d4d3e
CH
837{
838 struct sock_iocb siocb, *x;
1da177e4 839
ce1d4d3e
CH
840 if (pos != 0)
841 return -ESPIPE;
027445c3 842
027445c3 843 x = alloc_sock_iocb(iocb, &siocb);
ce1d4d3e
CH
844 if (!x)
845 return -ENOMEM;
1da177e4 846
027445c3 847 return do_sock_write(&x->async_msg, iocb, iocb->ki_filp, iov, nr_segs);
1da177e4
LT
848}
849
1da177e4
LT
850/*
851 * Atomic setting of ioctl hooks to avoid race
852 * with module unload.
853 */
854
4a3e2f71 855static DEFINE_MUTEX(br_ioctl_mutex);
881d966b 856static int (*br_ioctl_hook) (struct net *, unsigned int cmd, void __user *arg) = NULL;
1da177e4 857
881d966b 858void brioctl_set(int (*hook) (struct net *, unsigned int, void __user *))
1da177e4 859{
4a3e2f71 860 mutex_lock(&br_ioctl_mutex);
1da177e4 861 br_ioctl_hook = hook;
4a3e2f71 862 mutex_unlock(&br_ioctl_mutex);
1da177e4 863}
89bddce5 864
1da177e4
LT
865EXPORT_SYMBOL(brioctl_set);
866
4a3e2f71 867static DEFINE_MUTEX(vlan_ioctl_mutex);
881d966b 868static int (*vlan_ioctl_hook) (struct net *, void __user *arg);
1da177e4 869
881d966b 870void vlan_ioctl_set(int (*hook) (struct net *, void __user *))
1da177e4 871{
4a3e2f71 872 mutex_lock(&vlan_ioctl_mutex);
1da177e4 873 vlan_ioctl_hook = hook;
4a3e2f71 874 mutex_unlock(&vlan_ioctl_mutex);
1da177e4 875}
89bddce5 876
1da177e4
LT
877EXPORT_SYMBOL(vlan_ioctl_set);
878
4a3e2f71 879static DEFINE_MUTEX(dlci_ioctl_mutex);
89bddce5 880static int (*dlci_ioctl_hook) (unsigned int, void __user *);
1da177e4 881
89bddce5 882void dlci_ioctl_set(int (*hook) (unsigned int, void __user *))
1da177e4 883{
4a3e2f71 884 mutex_lock(&dlci_ioctl_mutex);
1da177e4 885 dlci_ioctl_hook = hook;
4a3e2f71 886 mutex_unlock(&dlci_ioctl_mutex);
1da177e4 887}
89bddce5 888
1da177e4
LT
889EXPORT_SYMBOL(dlci_ioctl_set);
890
891/*
892 * With an ioctl, arg may well be a user mode pointer, but we don't know
893 * what to do with it - that's up to the protocol still.
894 */
895
896static long sock_ioctl(struct file *file, unsigned cmd, unsigned long arg)
897{
898 struct socket *sock;
881d966b 899 struct sock *sk;
1da177e4
LT
900 void __user *argp = (void __user *)arg;
901 int pid, err;
881d966b 902 struct net *net;
1da177e4 903
b69aee04 904 sock = file->private_data;
881d966b 905 sk = sock->sk;
3b1e0a65 906 net = sock_net(sk);
1da177e4 907 if (cmd >= SIOCDEVPRIVATE && cmd <= (SIOCDEVPRIVATE + 15)) {
881d966b 908 err = dev_ioctl(net, cmd, argp);
1da177e4 909 } else
d86b5e0e 910#ifdef CONFIG_WIRELESS_EXT
1da177e4 911 if (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST) {
881d966b 912 err = dev_ioctl(net, cmd, argp);
1da177e4 913 } else
89bddce5
SH
914#endif /* CONFIG_WIRELESS_EXT */
915 switch (cmd) {
1da177e4
LT
916 case FIOSETOWN:
917 case SIOCSPGRP:
918 err = -EFAULT;
919 if (get_user(pid, (int __user *)argp))
920 break;
921 err = f_setown(sock->file, pid, 1);
922 break;
923 case FIOGETOWN:
924 case SIOCGPGRP:
609d7fa9 925 err = put_user(f_getown(sock->file),
89bddce5 926 (int __user *)argp);
1da177e4
LT
927 break;
928 case SIOCGIFBR:
929 case SIOCSIFBR:
930 case SIOCBRADDBR:
931 case SIOCBRDELBR:
932 err = -ENOPKG;
933 if (!br_ioctl_hook)
934 request_module("bridge");
935
4a3e2f71 936 mutex_lock(&br_ioctl_mutex);
89bddce5 937 if (br_ioctl_hook)
881d966b 938 err = br_ioctl_hook(net, cmd, argp);
4a3e2f71 939 mutex_unlock(&br_ioctl_mutex);
1da177e4
LT
940 break;
941 case SIOCGIFVLAN:
942 case SIOCSIFVLAN:
943 err = -ENOPKG;
944 if (!vlan_ioctl_hook)
945 request_module("8021q");
946
4a3e2f71 947 mutex_lock(&vlan_ioctl_mutex);
1da177e4 948 if (vlan_ioctl_hook)
881d966b 949 err = vlan_ioctl_hook(net, argp);
4a3e2f71 950 mutex_unlock(&vlan_ioctl_mutex);
1da177e4 951 break;
1da177e4
LT
952 case SIOCADDDLCI:
953 case SIOCDELDLCI:
954 err = -ENOPKG;
955 if (!dlci_ioctl_hook)
956 request_module("dlci");
957
7512cbf6
PE
958 mutex_lock(&dlci_ioctl_mutex);
959 if (dlci_ioctl_hook)
1da177e4 960 err = dlci_ioctl_hook(cmd, argp);
7512cbf6 961 mutex_unlock(&dlci_ioctl_mutex);
1da177e4
LT
962 break;
963 default:
964 err = sock->ops->ioctl(sock, cmd, arg);
b5e5fa5e
CH
965
966 /*
967 * If this ioctl is unknown try to hand it down
968 * to the NIC driver.
969 */
970 if (err == -ENOIOCTLCMD)
881d966b 971 err = dev_ioctl(net, cmd, argp);
1da177e4 972 break;
89bddce5 973 }
1da177e4
LT
974 return err;
975}
976
977int sock_create_lite(int family, int type, int protocol, struct socket **res)
978{
979 int err;
980 struct socket *sock = NULL;
89bddce5 981
1da177e4
LT
982 err = security_socket_create(family, type, protocol, 1);
983 if (err)
984 goto out;
985
986 sock = sock_alloc();
987 if (!sock) {
988 err = -ENOMEM;
989 goto out;
990 }
991
1da177e4 992 sock->type = type;
7420ed23
VY
993 err = security_socket_post_create(sock, family, type, protocol, 1);
994 if (err)
995 goto out_release;
996
1da177e4
LT
997out:
998 *res = sock;
999 return err;
7420ed23
VY
1000out_release:
1001 sock_release(sock);
1002 sock = NULL;
1003 goto out;
1da177e4
LT
1004}
1005
1006/* No kernel lock held - perfect */
89bddce5 1007static unsigned int sock_poll(struct file *file, poll_table *wait)
1da177e4
LT
1008{
1009 struct socket *sock;
1010
1011 /*
89bddce5 1012 * We can't return errors to poll, so it's either yes or no.
1da177e4 1013 */
b69aee04 1014 sock = file->private_data;
1da177e4
LT
1015 return sock->ops->poll(file, sock, wait);
1016}
1017
89bddce5 1018static int sock_mmap(struct file *file, struct vm_area_struct *vma)
1da177e4 1019{
b69aee04 1020 struct socket *sock = file->private_data;
1da177e4
LT
1021
1022 return sock->ops->mmap(file, sock, vma);
1023}
1024
20380731 1025static int sock_close(struct inode *inode, struct file *filp)
1da177e4
LT
1026{
1027 /*
89bddce5
SH
1028 * It was possible the inode is NULL we were
1029 * closing an unfinished socket.
1da177e4
LT
1030 */
1031
89bddce5 1032 if (!inode) {
1da177e4
LT
1033 printk(KERN_DEBUG "sock_close: NULL inode\n");
1034 return 0;
1035 }
1da177e4
LT
1036 sock_release(SOCKET_I(inode));
1037 return 0;
1038}
1039
1040/*
1041 * Update the socket async list
1042 *
1043 * Fasync_list locking strategy.
1044 *
1045 * 1. fasync_list is modified only under process context socket lock
1046 * i.e. under semaphore.
1047 * 2. fasync_list is used under read_lock(&sk->sk_callback_lock)
1048 * or under socket lock.
1049 * 3. fasync_list can be used from softirq context, so that
1050 * modification under socket lock have to be enhanced with
1051 * write_lock_bh(&sk->sk_callback_lock).
1052 * --ANK (990710)
1053 */
1054
1055static int sock_fasync(int fd, struct file *filp, int on)
1056{
89bddce5 1057 struct fasync_struct *fa, *fna = NULL, **prev;
1da177e4
LT
1058 struct socket *sock;
1059 struct sock *sk;
1060
89bddce5 1061 if (on) {
8b3a7005 1062 fna = kmalloc(sizeof(struct fasync_struct), GFP_KERNEL);
89bddce5 1063 if (fna == NULL)
1da177e4
LT
1064 return -ENOMEM;
1065 }
1066
b69aee04 1067 sock = filp->private_data;
1da177e4 1068
89bddce5
SH
1069 sk = sock->sk;
1070 if (sk == NULL) {
1da177e4
LT
1071 kfree(fna);
1072 return -EINVAL;
1073 }
1074
1075 lock_sock(sk);
1076
76398425
JC
1077 spin_lock(&filp->f_lock);
1078 if (on)
1079 filp->f_flags |= FASYNC;
1080 else
1081 filp->f_flags &= ~FASYNC;
1082 spin_unlock(&filp->f_lock);
1083
89bddce5 1084 prev = &(sock->fasync_list);
1da177e4 1085
89bddce5
SH
1086 for (fa = *prev; fa != NULL; prev = &fa->fa_next, fa = *prev)
1087 if (fa->fa_file == filp)
1da177e4
LT
1088 break;
1089
89bddce5
SH
1090 if (on) {
1091 if (fa != NULL) {
1da177e4 1092 write_lock_bh(&sk->sk_callback_lock);
89bddce5 1093 fa->fa_fd = fd;
1da177e4
LT
1094 write_unlock_bh(&sk->sk_callback_lock);
1095
1096 kfree(fna);
1097 goto out;
1098 }
89bddce5
SH
1099 fna->fa_file = filp;
1100 fna->fa_fd = fd;
1101 fna->magic = FASYNC_MAGIC;
1102 fna->fa_next = sock->fasync_list;
1da177e4 1103 write_lock_bh(&sk->sk_callback_lock);
89bddce5 1104 sock->fasync_list = fna;
1da177e4 1105 write_unlock_bh(&sk->sk_callback_lock);
89bddce5
SH
1106 } else {
1107 if (fa != NULL) {
1da177e4 1108 write_lock_bh(&sk->sk_callback_lock);
89bddce5 1109 *prev = fa->fa_next;
1da177e4
LT
1110 write_unlock_bh(&sk->sk_callback_lock);
1111 kfree(fa);
1112 }
1113 }
1114
1115out:
1116 release_sock(sock->sk);
1117 return 0;
1118}
1119
1120/* This function may be called only under socket lock or callback_lock */
1121
1122int sock_wake_async(struct socket *sock, int how, int band)
1123{
1124 if (!sock || !sock->fasync_list)
1125 return -1;
89bddce5 1126 switch (how) {
8d8ad9d7 1127 case SOCK_WAKE_WAITD:
1da177e4
LT
1128 if (test_bit(SOCK_ASYNC_WAITDATA, &sock->flags))
1129 break;
1130 goto call_kill;
8d8ad9d7 1131 case SOCK_WAKE_SPACE:
1da177e4
LT
1132 if (!test_and_clear_bit(SOCK_ASYNC_NOSPACE, &sock->flags))
1133 break;
1134 /* fall through */
8d8ad9d7 1135 case SOCK_WAKE_IO:
89bddce5 1136call_kill:
1da177e4
LT
1137 __kill_fasync(sock->fasync_list, SIGIO, band);
1138 break;
8d8ad9d7 1139 case SOCK_WAKE_URG:
1da177e4
LT
1140 __kill_fasync(sock->fasync_list, SIGURG, band);
1141 }
1142 return 0;
1143}
1144
1b8d7ae4 1145static int __sock_create(struct net *net, int family, int type, int protocol,
89bddce5 1146 struct socket **res, int kern)
1da177e4
LT
1147{
1148 int err;
1149 struct socket *sock;
55737fda 1150 const struct net_proto_family *pf;
1da177e4
LT
1151
1152 /*
89bddce5 1153 * Check protocol is in range
1da177e4
LT
1154 */
1155 if (family < 0 || family >= NPROTO)
1156 return -EAFNOSUPPORT;
1157 if (type < 0 || type >= SOCK_MAX)
1158 return -EINVAL;
1159
1160 /* Compatibility.
1161
1162 This uglymoron is moved from INET layer to here to avoid
1163 deadlock in module load.
1164 */
1165 if (family == PF_INET && type == SOCK_PACKET) {
89bddce5 1166 static int warned;
1da177e4
LT
1167 if (!warned) {
1168 warned = 1;
89bddce5
SH
1169 printk(KERN_INFO "%s uses obsolete (PF_INET,SOCK_PACKET)\n",
1170 current->comm);
1da177e4
LT
1171 }
1172 family = PF_PACKET;
1173 }
1174
1175 err = security_socket_create(family, type, protocol, kern);
1176 if (err)
1177 return err;
89bddce5 1178
55737fda
SH
1179 /*
1180 * Allocate the socket and allow the family to set things up. if
1181 * the protocol is 0, the family is instructed to select an appropriate
1182 * default.
1183 */
1184 sock = sock_alloc();
1185 if (!sock) {
1186 if (net_ratelimit())
1187 printk(KERN_WARNING "socket: no more sockets\n");
1188 return -ENFILE; /* Not exactly a match, but its the
1189 closest posix thing */
1190 }
1191
1192 sock->type = type;
1193
95a5afca 1194#ifdef CONFIG_MODULES
89bddce5
SH
1195 /* Attempt to load a protocol module if the find failed.
1196 *
1197 * 12/09/1996 Marcin: But! this makes REALLY only sense, if the user
1da177e4
LT
1198 * requested real, full-featured networking support upon configuration.
1199 * Otherwise module support will break!
1200 */
55737fda 1201 if (net_families[family] == NULL)
89bddce5 1202 request_module("net-pf-%d", family);
1da177e4
LT
1203#endif
1204
55737fda
SH
1205 rcu_read_lock();
1206 pf = rcu_dereference(net_families[family]);
1207 err = -EAFNOSUPPORT;
1208 if (!pf)
1209 goto out_release;
1da177e4
LT
1210
1211 /*
1212 * We will call the ->create function, that possibly is in a loadable
1213 * module, so we have to bump that loadable module refcnt first.
1214 */
55737fda 1215 if (!try_module_get(pf->owner))
1da177e4
LT
1216 goto out_release;
1217
55737fda
SH
1218 /* Now protected by module ref count */
1219 rcu_read_unlock();
1220
1b8d7ae4 1221 err = pf->create(net, sock, protocol);
55737fda 1222 if (err < 0)
1da177e4 1223 goto out_module_put;
a79af59e 1224
1da177e4
LT
1225 /*
1226 * Now to bump the refcnt of the [loadable] module that owns this
1227 * socket at sock_release time we decrement its refcnt.
1228 */
55737fda
SH
1229 if (!try_module_get(sock->ops->owner))
1230 goto out_module_busy;
1231
1da177e4
LT
1232 /*
1233 * Now that we're done with the ->create function, the [loadable]
1234 * module can have its refcnt decremented
1235 */
55737fda 1236 module_put(pf->owner);
7420ed23
VY
1237 err = security_socket_post_create(sock, family, type, protocol, kern);
1238 if (err)
3b185525 1239 goto out_sock_release;
55737fda 1240 *res = sock;
1da177e4 1241
55737fda
SH
1242 return 0;
1243
1244out_module_busy:
1245 err = -EAFNOSUPPORT;
1da177e4 1246out_module_put:
55737fda
SH
1247 sock->ops = NULL;
1248 module_put(pf->owner);
1249out_sock_release:
1da177e4 1250 sock_release(sock);
55737fda
SH
1251 return err;
1252
1253out_release:
1254 rcu_read_unlock();
1255 goto out_sock_release;
1da177e4
LT
1256}
1257
1258int sock_create(int family, int type, int protocol, struct socket **res)
1259{
1b8d7ae4 1260 return __sock_create(current->nsproxy->net_ns, family, type, protocol, res, 0);
1da177e4
LT
1261}
1262
1263int sock_create_kern(int family, int type, int protocol, struct socket **res)
1264{
1b8d7ae4 1265 return __sock_create(&init_net, family, type, protocol, res, 1);
1da177e4
LT
1266}
1267
3e0fa65f 1268SYSCALL_DEFINE3(socket, int, family, int, type, int, protocol)
1da177e4
LT
1269{
1270 int retval;
1271 struct socket *sock;
a677a039
UD
1272 int flags;
1273
e38b36f3
UD
1274 /* Check the SOCK_* constants for consistency. */
1275 BUILD_BUG_ON(SOCK_CLOEXEC != O_CLOEXEC);
1276 BUILD_BUG_ON((SOCK_MAX | SOCK_TYPE_MASK) != SOCK_TYPE_MASK);
1277 BUILD_BUG_ON(SOCK_CLOEXEC & SOCK_TYPE_MASK);
1278 BUILD_BUG_ON(SOCK_NONBLOCK & SOCK_TYPE_MASK);
1279
a677a039 1280 flags = type & ~SOCK_TYPE_MASK;
77d27200 1281 if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
a677a039
UD
1282 return -EINVAL;
1283 type &= SOCK_TYPE_MASK;
1da177e4 1284
aaca0bdc
UD
1285 if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
1286 flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
1287
1da177e4
LT
1288 retval = sock_create(family, type, protocol, &sock);
1289 if (retval < 0)
1290 goto out;
1291
77d27200 1292 retval = sock_map_fd(sock, flags & (O_CLOEXEC | O_NONBLOCK));
1da177e4
LT
1293 if (retval < 0)
1294 goto out_release;
1295
1296out:
1297 /* It may be already another descriptor 8) Not kernel problem. */
1298 return retval;
1299
1300out_release:
1301 sock_release(sock);
1302 return retval;
1303}
1304
1305/*
1306 * Create a pair of connected sockets.
1307 */
1308
3e0fa65f
HC
1309SYSCALL_DEFINE4(socketpair, int, family, int, type, int, protocol,
1310 int __user *, usockvec)
1da177e4
LT
1311{
1312 struct socket *sock1, *sock2;
1313 int fd1, fd2, err;
db349509 1314 struct file *newfile1, *newfile2;
a677a039
UD
1315 int flags;
1316
1317 flags = type & ~SOCK_TYPE_MASK;
77d27200 1318 if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
a677a039
UD
1319 return -EINVAL;
1320 type &= SOCK_TYPE_MASK;
1da177e4 1321
aaca0bdc
UD
1322 if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
1323 flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
1324
1da177e4
LT
1325 /*
1326 * Obtain the first socket and check if the underlying protocol
1327 * supports the socketpair call.
1328 */
1329
1330 err = sock_create(family, type, protocol, &sock1);
1331 if (err < 0)
1332 goto out;
1333
1334 err = sock_create(family, type, protocol, &sock2);
1335 if (err < 0)
1336 goto out_release_1;
1337
1338 err = sock1->ops->socketpair(sock1, sock2);
89bddce5 1339 if (err < 0)
1da177e4
LT
1340 goto out_release_both;
1341
a677a039 1342 fd1 = sock_alloc_fd(&newfile1, flags & O_CLOEXEC);
bf3c23d1
DM
1343 if (unlikely(fd1 < 0)) {
1344 err = fd1;
db349509 1345 goto out_release_both;
bf3c23d1 1346 }
1da177e4 1347
a677a039 1348 fd2 = sock_alloc_fd(&newfile2, flags & O_CLOEXEC);
db349509 1349 if (unlikely(fd2 < 0)) {
bf3c23d1 1350 err = fd2;
db349509
AV
1351 put_filp(newfile1);
1352 put_unused_fd(fd1);
1da177e4 1353 goto out_release_both;
db349509 1354 }
1da177e4 1355
77d27200 1356 err = sock_attach_fd(sock1, newfile1, flags & O_NONBLOCK);
db349509
AV
1357 if (unlikely(err < 0)) {
1358 goto out_fd2;
1359 }
1360
77d27200 1361 err = sock_attach_fd(sock2, newfile2, flags & O_NONBLOCK);
db349509
AV
1362 if (unlikely(err < 0)) {
1363 fput(newfile1);
1364 goto out_fd1;
1365 }
1366
157cf649 1367 audit_fd_pair(fd1, fd2);
db349509
AV
1368 fd_install(fd1, newfile1);
1369 fd_install(fd2, newfile2);
1da177e4
LT
1370 /* fd1 and fd2 may be already another descriptors.
1371 * Not kernel problem.
1372 */
1373
89bddce5 1374 err = put_user(fd1, &usockvec[0]);
1da177e4
LT
1375 if (!err)
1376 err = put_user(fd2, &usockvec[1]);
1377 if (!err)
1378 return 0;
1379
1380 sys_close(fd2);
1381 sys_close(fd1);
1382 return err;
1383
1da177e4 1384out_release_both:
89bddce5 1385 sock_release(sock2);
1da177e4 1386out_release_1:
89bddce5 1387 sock_release(sock1);
1da177e4
LT
1388out:
1389 return err;
db349509
AV
1390
1391out_fd2:
1392 put_filp(newfile1);
1393 sock_release(sock1);
1394out_fd1:
1395 put_filp(newfile2);
1396 sock_release(sock2);
db349509
AV
1397 put_unused_fd(fd1);
1398 put_unused_fd(fd2);
1399 goto out;
1da177e4
LT
1400}
1401
1da177e4
LT
1402/*
1403 * Bind a name to a socket. Nothing much to do here since it's
1404 * the protocol's responsibility to handle the local address.
1405 *
1406 * We move the socket address to kernel space before we call
1407 * the protocol layer (having also checked the address is ok).
1408 */
1409
20f37034 1410SYSCALL_DEFINE3(bind, int, fd, struct sockaddr __user *, umyaddr, int, addrlen)
1da177e4
LT
1411{
1412 struct socket *sock;
230b1839 1413 struct sockaddr_storage address;
6cb153ca 1414 int err, fput_needed;
1da177e4 1415
89bddce5 1416 sock = sockfd_lookup_light(fd, &err, &fput_needed);
e71a4783 1417 if (sock) {
230b1839 1418 err = move_addr_to_kernel(umyaddr, addrlen, (struct sockaddr *)&address);
89bddce5
SH
1419 if (err >= 0) {
1420 err = security_socket_bind(sock,
230b1839 1421 (struct sockaddr *)&address,
89bddce5 1422 addrlen);
6cb153ca
BL
1423 if (!err)
1424 err = sock->ops->bind(sock,
89bddce5 1425 (struct sockaddr *)
230b1839 1426 &address, addrlen);
1da177e4 1427 }
6cb153ca 1428 fput_light(sock->file, fput_needed);
89bddce5 1429 }
1da177e4
LT
1430 return err;
1431}
1432
1da177e4
LT
1433/*
1434 * Perform a listen. Basically, we allow the protocol to do anything
1435 * necessary for a listen, and if that works, we mark the socket as
1436 * ready for listening.
1437 */
1438
3e0fa65f 1439SYSCALL_DEFINE2(listen, int, fd, int, backlog)
1da177e4
LT
1440{
1441 struct socket *sock;
6cb153ca 1442 int err, fput_needed;
b8e1f9b5 1443 int somaxconn;
89bddce5
SH
1444
1445 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1446 if (sock) {
8efa6e93 1447 somaxconn = sock_net(sock->sk)->core.sysctl_somaxconn;
b8e1f9b5
PE
1448 if ((unsigned)backlog > somaxconn)
1449 backlog = somaxconn;
1da177e4
LT
1450
1451 err = security_socket_listen(sock, backlog);
6cb153ca
BL
1452 if (!err)
1453 err = sock->ops->listen(sock, backlog);
1da177e4 1454
6cb153ca 1455 fput_light(sock->file, fput_needed);
1da177e4
LT
1456 }
1457 return err;
1458}
1459
1da177e4
LT
1460/*
1461 * For accept, we attempt to create a new socket, set up the link
1462 * with the client, wake up the client, then return the new
1463 * connected fd. We collect the address of the connector in kernel
1464 * space and move it to user at the very end. This is unclean because
1465 * we open the socket then return an error.
1466 *
1467 * 1003.1g adds the ability to recvmsg() to query connection pending
1468 * status to recvmsg. We need to add that support in a way thats
1469 * clean when we restucture accept also.
1470 */
1471
20f37034
HC
1472SYSCALL_DEFINE4(accept4, int, fd, struct sockaddr __user *, upeer_sockaddr,
1473 int __user *, upeer_addrlen, int, flags)
1da177e4
LT
1474{
1475 struct socket *sock, *newsock;
39d8c1b6 1476 struct file *newfile;
6cb153ca 1477 int err, len, newfd, fput_needed;
230b1839 1478 struct sockaddr_storage address;
1da177e4 1479
77d27200 1480 if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
aaca0bdc
UD
1481 return -EINVAL;
1482
1483 if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
1484 flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
1485
6cb153ca 1486 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4
LT
1487 if (!sock)
1488 goto out;
1489
1490 err = -ENFILE;
89bddce5 1491 if (!(newsock = sock_alloc()))
1da177e4
LT
1492 goto out_put;
1493
1494 newsock->type = sock->type;
1495 newsock->ops = sock->ops;
1496
1da177e4
LT
1497 /*
1498 * We don't need try_module_get here, as the listening socket (sock)
1499 * has the protocol module (sock->ops->owner) held.
1500 */
1501 __module_get(newsock->ops->owner);
1502
aaca0bdc 1503 newfd = sock_alloc_fd(&newfile, flags & O_CLOEXEC);
39d8c1b6
DM
1504 if (unlikely(newfd < 0)) {
1505 err = newfd;
9a1875e6
DM
1506 sock_release(newsock);
1507 goto out_put;
39d8c1b6
DM
1508 }
1509
77d27200 1510 err = sock_attach_fd(newsock, newfile, flags & O_NONBLOCK);
39d8c1b6 1511 if (err < 0)
79f4f642 1512 goto out_fd_simple;
39d8c1b6 1513
a79af59e
FF
1514 err = security_socket_accept(sock, newsock);
1515 if (err)
39d8c1b6 1516 goto out_fd;
a79af59e 1517
1da177e4
LT
1518 err = sock->ops->accept(sock, newsock, sock->file->f_flags);
1519 if (err < 0)
39d8c1b6 1520 goto out_fd;
1da177e4
LT
1521
1522 if (upeer_sockaddr) {
230b1839 1523 if (newsock->ops->getname(newsock, (struct sockaddr *)&address,
89bddce5 1524 &len, 2) < 0) {
1da177e4 1525 err = -ECONNABORTED;
39d8c1b6 1526 goto out_fd;
1da177e4 1527 }
230b1839
YH
1528 err = move_addr_to_user((struct sockaddr *)&address,
1529 len, upeer_sockaddr, upeer_addrlen);
1da177e4 1530 if (err < 0)
39d8c1b6 1531 goto out_fd;
1da177e4
LT
1532 }
1533
1534 /* File flags are not inherited via accept() unlike another OSes. */
1535
39d8c1b6
DM
1536 fd_install(newfd, newfile);
1537 err = newfd;
1da177e4 1538
1da177e4 1539out_put:
6cb153ca 1540 fput_light(sock->file, fput_needed);
1da177e4
LT
1541out:
1542 return err;
79f4f642
AD
1543out_fd_simple:
1544 sock_release(newsock);
1545 put_filp(newfile);
1546 put_unused_fd(newfd);
1547 goto out_put;
39d8c1b6 1548out_fd:
9606a216 1549 fput(newfile);
39d8c1b6 1550 put_unused_fd(newfd);
1da177e4
LT
1551 goto out_put;
1552}
1553
20f37034
HC
1554SYSCALL_DEFINE3(accept, int, fd, struct sockaddr __user *, upeer_sockaddr,
1555 int __user *, upeer_addrlen)
aaca0bdc 1556{
de11defe 1557 return sys_accept4(fd, upeer_sockaddr, upeer_addrlen, 0);
aaca0bdc
UD
1558}
1559
1da177e4
LT
1560/*
1561 * Attempt to connect to a socket with the server address. The address
1562 * is in user space so we verify it is OK and move it to kernel space.
1563 *
1564 * For 1003.1g we need to add clean support for a bind to AF_UNSPEC to
1565 * break bindings
1566 *
1567 * NOTE: 1003.1g draft 6.3 is broken with respect to AX.25/NetROM and
1568 * other SEQPACKET protocols that take time to connect() as it doesn't
1569 * include the -EINPROGRESS status for such sockets.
1570 */
1571
20f37034
HC
1572SYSCALL_DEFINE3(connect, int, fd, struct sockaddr __user *, uservaddr,
1573 int, addrlen)
1da177e4
LT
1574{
1575 struct socket *sock;
230b1839 1576 struct sockaddr_storage address;
6cb153ca 1577 int err, fput_needed;
1da177e4 1578
6cb153ca 1579 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4
LT
1580 if (!sock)
1581 goto out;
230b1839 1582 err = move_addr_to_kernel(uservaddr, addrlen, (struct sockaddr *)&address);
1da177e4
LT
1583 if (err < 0)
1584 goto out_put;
1585
89bddce5 1586 err =
230b1839 1587 security_socket_connect(sock, (struct sockaddr *)&address, addrlen);
1da177e4
LT
1588 if (err)
1589 goto out_put;
1590
230b1839 1591 err = sock->ops->connect(sock, (struct sockaddr *)&address, addrlen,
1da177e4
LT
1592 sock->file->f_flags);
1593out_put:
6cb153ca 1594 fput_light(sock->file, fput_needed);
1da177e4
LT
1595out:
1596 return err;
1597}
1598
1599/*
1600 * Get the local address ('name') of a socket object. Move the obtained
1601 * name to user space.
1602 */
1603
20f37034
HC
1604SYSCALL_DEFINE3(getsockname, int, fd, struct sockaddr __user *, usockaddr,
1605 int __user *, usockaddr_len)
1da177e4
LT
1606{
1607 struct socket *sock;
230b1839 1608 struct sockaddr_storage address;
6cb153ca 1609 int len, err, fput_needed;
89bddce5 1610
6cb153ca 1611 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4
LT
1612 if (!sock)
1613 goto out;
1614
1615 err = security_socket_getsockname(sock);
1616 if (err)
1617 goto out_put;
1618
230b1839 1619 err = sock->ops->getname(sock, (struct sockaddr *)&address, &len, 0);
1da177e4
LT
1620 if (err)
1621 goto out_put;
230b1839 1622 err = move_addr_to_user((struct sockaddr *)&address, len, usockaddr, usockaddr_len);
1da177e4
LT
1623
1624out_put:
6cb153ca 1625 fput_light(sock->file, fput_needed);
1da177e4
LT
1626out:
1627 return err;
1628}
1629
1630/*
1631 * Get the remote address ('name') of a socket object. Move the obtained
1632 * name to user space.
1633 */
1634
20f37034
HC
1635SYSCALL_DEFINE3(getpeername, int, fd, struct sockaddr __user *, usockaddr,
1636 int __user *, usockaddr_len)
1da177e4
LT
1637{
1638 struct socket *sock;
230b1839 1639 struct sockaddr_storage address;
6cb153ca 1640 int len, err, fput_needed;
1da177e4 1641
89bddce5
SH
1642 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1643 if (sock != NULL) {
1da177e4
LT
1644 err = security_socket_getpeername(sock);
1645 if (err) {
6cb153ca 1646 fput_light(sock->file, fput_needed);
1da177e4
LT
1647 return err;
1648 }
1649
89bddce5 1650 err =
230b1839 1651 sock->ops->getname(sock, (struct sockaddr *)&address, &len,
89bddce5 1652 1);
1da177e4 1653 if (!err)
230b1839 1654 err = move_addr_to_user((struct sockaddr *)&address, len, usockaddr,
89bddce5 1655 usockaddr_len);
6cb153ca 1656 fput_light(sock->file, fput_needed);
1da177e4
LT
1657 }
1658 return err;
1659}
1660
1661/*
1662 * Send a datagram to a given address. We move the address into kernel
1663 * space and check the user space data area is readable before invoking
1664 * the protocol.
1665 */
1666
3e0fa65f
HC
1667SYSCALL_DEFINE6(sendto, int, fd, void __user *, buff, size_t, len,
1668 unsigned, flags, struct sockaddr __user *, addr,
1669 int, addr_len)
1da177e4
LT
1670{
1671 struct socket *sock;
230b1839 1672 struct sockaddr_storage address;
1da177e4
LT
1673 int err;
1674 struct msghdr msg;
1675 struct iovec iov;
6cb153ca 1676 int fput_needed;
6cb153ca 1677
de0fa95c
PE
1678 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1679 if (!sock)
4387ff75 1680 goto out;
6cb153ca 1681
89bddce5
SH
1682 iov.iov_base = buff;
1683 iov.iov_len = len;
1684 msg.msg_name = NULL;
1685 msg.msg_iov = &iov;
1686 msg.msg_iovlen = 1;
1687 msg.msg_control = NULL;
1688 msg.msg_controllen = 0;
1689 msg.msg_namelen = 0;
6cb153ca 1690 if (addr) {
230b1839 1691 err = move_addr_to_kernel(addr, addr_len, (struct sockaddr *)&address);
1da177e4
LT
1692 if (err < 0)
1693 goto out_put;
230b1839 1694 msg.msg_name = (struct sockaddr *)&address;
89bddce5 1695 msg.msg_namelen = addr_len;
1da177e4
LT
1696 }
1697 if (sock->file->f_flags & O_NONBLOCK)
1698 flags |= MSG_DONTWAIT;
1699 msg.msg_flags = flags;
1700 err = sock_sendmsg(sock, &msg, len);
1701
89bddce5 1702out_put:
de0fa95c 1703 fput_light(sock->file, fput_needed);
4387ff75 1704out:
1da177e4
LT
1705 return err;
1706}
1707
1708/*
89bddce5 1709 * Send a datagram down a socket.
1da177e4
LT
1710 */
1711
3e0fa65f
HC
1712SYSCALL_DEFINE4(send, int, fd, void __user *, buff, size_t, len,
1713 unsigned, flags)
1da177e4
LT
1714{
1715 return sys_sendto(fd, buff, len, flags, NULL, 0);
1716}
1717
1718/*
89bddce5 1719 * Receive a frame from the socket and optionally record the address of the
1da177e4
LT
1720 * sender. We verify the buffers are writable and if needed move the
1721 * sender address from kernel to user space.
1722 */
1723
3e0fa65f
HC
1724SYSCALL_DEFINE6(recvfrom, int, fd, void __user *, ubuf, size_t, size,
1725 unsigned, flags, struct sockaddr __user *, addr,
1726 int __user *, addr_len)
1da177e4
LT
1727{
1728 struct socket *sock;
1729 struct iovec iov;
1730 struct msghdr msg;
230b1839 1731 struct sockaddr_storage address;
89bddce5 1732 int err, err2;
6cb153ca
BL
1733 int fput_needed;
1734
de0fa95c 1735 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4 1736 if (!sock)
de0fa95c 1737 goto out;
1da177e4 1738
89bddce5
SH
1739 msg.msg_control = NULL;
1740 msg.msg_controllen = 0;
1741 msg.msg_iovlen = 1;
1742 msg.msg_iov = &iov;
1743 iov.iov_len = size;
1744 iov.iov_base = ubuf;
230b1839
YH
1745 msg.msg_name = (struct sockaddr *)&address;
1746 msg.msg_namelen = sizeof(address);
1da177e4
LT
1747 if (sock->file->f_flags & O_NONBLOCK)
1748 flags |= MSG_DONTWAIT;
89bddce5 1749 err = sock_recvmsg(sock, &msg, size, flags);
1da177e4 1750
89bddce5 1751 if (err >= 0 && addr != NULL) {
230b1839
YH
1752 err2 = move_addr_to_user((struct sockaddr *)&address,
1753 msg.msg_namelen, addr, addr_len);
89bddce5
SH
1754 if (err2 < 0)
1755 err = err2;
1da177e4 1756 }
de0fa95c
PE
1757
1758 fput_light(sock->file, fput_needed);
4387ff75 1759out:
1da177e4
LT
1760 return err;
1761}
1762
1763/*
89bddce5 1764 * Receive a datagram from a socket.
1da177e4
LT
1765 */
1766
89bddce5
SH
1767asmlinkage long sys_recv(int fd, void __user *ubuf, size_t size,
1768 unsigned flags)
1da177e4
LT
1769{
1770 return sys_recvfrom(fd, ubuf, size, flags, NULL, NULL);
1771}
1772
1773/*
1774 * Set a socket option. Because we don't know the option lengths we have
1775 * to pass the user mode parameter for the protocols to sort out.
1776 */
1777
20f37034
HC
1778SYSCALL_DEFINE5(setsockopt, int, fd, int, level, int, optname,
1779 char __user *, optval, int, optlen)
1da177e4 1780{
6cb153ca 1781 int err, fput_needed;
1da177e4
LT
1782 struct socket *sock;
1783
1784 if (optlen < 0)
1785 return -EINVAL;
89bddce5
SH
1786
1787 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1788 if (sock != NULL) {
1789 err = security_socket_setsockopt(sock, level, optname);
6cb153ca
BL
1790 if (err)
1791 goto out_put;
1da177e4
LT
1792
1793 if (level == SOL_SOCKET)
89bddce5
SH
1794 err =
1795 sock_setsockopt(sock, level, optname, optval,
1796 optlen);
1da177e4 1797 else
89bddce5
SH
1798 err =
1799 sock->ops->setsockopt(sock, level, optname, optval,
1800 optlen);
6cb153ca
BL
1801out_put:
1802 fput_light(sock->file, fput_needed);
1da177e4
LT
1803 }
1804 return err;
1805}
1806
1807/*
1808 * Get a socket option. Because we don't know the option lengths we have
1809 * to pass a user mode parameter for the protocols to sort out.
1810 */
1811
20f37034
HC
1812SYSCALL_DEFINE5(getsockopt, int, fd, int, level, int, optname,
1813 char __user *, optval, int __user *, optlen)
1da177e4 1814{
6cb153ca 1815 int err, fput_needed;
1da177e4
LT
1816 struct socket *sock;
1817
89bddce5
SH
1818 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1819 if (sock != NULL) {
6cb153ca
BL
1820 err = security_socket_getsockopt(sock, level, optname);
1821 if (err)
1822 goto out_put;
1da177e4
LT
1823
1824 if (level == SOL_SOCKET)
89bddce5
SH
1825 err =
1826 sock_getsockopt(sock, level, optname, optval,
1827 optlen);
1da177e4 1828 else
89bddce5
SH
1829 err =
1830 sock->ops->getsockopt(sock, level, optname, optval,
1831 optlen);
6cb153ca
BL
1832out_put:
1833 fput_light(sock->file, fput_needed);
1da177e4
LT
1834 }
1835 return err;
1836}
1837
1da177e4
LT
1838/*
1839 * Shutdown a socket.
1840 */
1841
754fe8d2 1842SYSCALL_DEFINE2(shutdown, int, fd, int, how)
1da177e4 1843{
6cb153ca 1844 int err, fput_needed;
1da177e4
LT
1845 struct socket *sock;
1846
89bddce5
SH
1847 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1848 if (sock != NULL) {
1da177e4 1849 err = security_socket_shutdown(sock, how);
6cb153ca
BL
1850 if (!err)
1851 err = sock->ops->shutdown(sock, how);
1852 fput_light(sock->file, fput_needed);
1da177e4
LT
1853 }
1854 return err;
1855}
1856
89bddce5 1857/* A couple of helpful macros for getting the address of the 32/64 bit
1da177e4
LT
1858 * fields which are the same type (int / unsigned) on our platforms.
1859 */
1860#define COMPAT_MSG(msg, member) ((MSG_CMSG_COMPAT & flags) ? &msg##_compat->member : &msg->member)
1861#define COMPAT_NAMELEN(msg) COMPAT_MSG(msg, msg_namelen)
1862#define COMPAT_FLAGS(msg) COMPAT_MSG(msg, msg_flags)
1863
1da177e4
LT
1864/*
1865 * BSD sendmsg interface
1866 */
1867
3e0fa65f 1868SYSCALL_DEFINE3(sendmsg, int, fd, struct msghdr __user *, msg, unsigned, flags)
1da177e4 1869{
89bddce5
SH
1870 struct compat_msghdr __user *msg_compat =
1871 (struct compat_msghdr __user *)msg;
1da177e4 1872 struct socket *sock;
230b1839 1873 struct sockaddr_storage address;
1da177e4 1874 struct iovec iovstack[UIO_FASTIOV], *iov = iovstack;
b9d717a7 1875 unsigned char ctl[sizeof(struct cmsghdr) + 20]
89bddce5
SH
1876 __attribute__ ((aligned(sizeof(__kernel_size_t))));
1877 /* 20 is size of ipv6_pktinfo */
1da177e4
LT
1878 unsigned char *ctl_buf = ctl;
1879 struct msghdr msg_sys;
1880 int err, ctl_len, iov_size, total_len;
6cb153ca 1881 int fput_needed;
89bddce5 1882
1da177e4
LT
1883 err = -EFAULT;
1884 if (MSG_CMSG_COMPAT & flags) {
1885 if (get_compat_msghdr(&msg_sys, msg_compat))
1886 return -EFAULT;
89bddce5
SH
1887 }
1888 else if (copy_from_user(&msg_sys, msg, sizeof(struct msghdr)))
1da177e4
LT
1889 return -EFAULT;
1890
6cb153ca 1891 sock = sockfd_lookup_light(fd, &err, &fput_needed);
89bddce5 1892 if (!sock)
1da177e4
LT
1893 goto out;
1894
1895 /* do not move before msg_sys is valid */
1896 err = -EMSGSIZE;
1897 if (msg_sys.msg_iovlen > UIO_MAXIOV)
1898 goto out_put;
1899
89bddce5 1900 /* Check whether to allocate the iovec area */
1da177e4
LT
1901 err = -ENOMEM;
1902 iov_size = msg_sys.msg_iovlen * sizeof(struct iovec);
1903 if (msg_sys.msg_iovlen > UIO_FASTIOV) {
1904 iov = sock_kmalloc(sock->sk, iov_size, GFP_KERNEL);
1905 if (!iov)
1906 goto out_put;
1907 }
1908
1909 /* This will also move the address data into kernel space */
1910 if (MSG_CMSG_COMPAT & flags) {
230b1839
YH
1911 err = verify_compat_iovec(&msg_sys, iov,
1912 (struct sockaddr *)&address,
1913 VERIFY_READ);
1da177e4 1914 } else
230b1839
YH
1915 err = verify_iovec(&msg_sys, iov,
1916 (struct sockaddr *)&address,
1917 VERIFY_READ);
89bddce5 1918 if (err < 0)
1da177e4
LT
1919 goto out_freeiov;
1920 total_len = err;
1921
1922 err = -ENOBUFS;
1923
1924 if (msg_sys.msg_controllen > INT_MAX)
1925 goto out_freeiov;
89bddce5 1926 ctl_len = msg_sys.msg_controllen;
1da177e4 1927 if ((MSG_CMSG_COMPAT & flags) && ctl_len) {
89bddce5
SH
1928 err =
1929 cmsghdr_from_user_compat_to_kern(&msg_sys, sock->sk, ctl,
1930 sizeof(ctl));
1da177e4
LT
1931 if (err)
1932 goto out_freeiov;
1933 ctl_buf = msg_sys.msg_control;
8920e8f9 1934 ctl_len = msg_sys.msg_controllen;
1da177e4 1935 } else if (ctl_len) {
89bddce5 1936 if (ctl_len > sizeof(ctl)) {
1da177e4 1937 ctl_buf = sock_kmalloc(sock->sk, ctl_len, GFP_KERNEL);
89bddce5 1938 if (ctl_buf == NULL)
1da177e4
LT
1939 goto out_freeiov;
1940 }
1941 err = -EFAULT;
1942 /*
1943 * Careful! Before this, msg_sys.msg_control contains a user pointer.
1944 * Afterwards, it will be a kernel pointer. Thus the compiler-assisted
1945 * checking falls down on this.
1946 */
89bddce5
SH
1947 if (copy_from_user(ctl_buf, (void __user *)msg_sys.msg_control,
1948 ctl_len))
1da177e4
LT
1949 goto out_freectl;
1950 msg_sys.msg_control = ctl_buf;
1951 }
1952 msg_sys.msg_flags = flags;
1953
1954 if (sock->file->f_flags & O_NONBLOCK)
1955 msg_sys.msg_flags |= MSG_DONTWAIT;
1956 err = sock_sendmsg(sock, &msg_sys, total_len);
1957
1958out_freectl:
89bddce5 1959 if (ctl_buf != ctl)
1da177e4
LT
1960 sock_kfree_s(sock->sk, ctl_buf, ctl_len);
1961out_freeiov:
1962 if (iov != iovstack)
1963 sock_kfree_s(sock->sk, iov, iov_size);
1964out_put:
6cb153ca 1965 fput_light(sock->file, fput_needed);
89bddce5 1966out:
1da177e4
LT
1967 return err;
1968}
1969
1970/*
1971 * BSD recvmsg interface
1972 */
1973
3e0fa65f
HC
1974SYSCALL_DEFINE3(recvmsg, int, fd, struct msghdr __user *, msg,
1975 unsigned int, flags)
1da177e4 1976{
89bddce5
SH
1977 struct compat_msghdr __user *msg_compat =
1978 (struct compat_msghdr __user *)msg;
1da177e4
LT
1979 struct socket *sock;
1980 struct iovec iovstack[UIO_FASTIOV];
89bddce5 1981 struct iovec *iov = iovstack;
1da177e4
LT
1982 struct msghdr msg_sys;
1983 unsigned long cmsg_ptr;
1984 int err, iov_size, total_len, len;
6cb153ca 1985 int fput_needed;
1da177e4
LT
1986
1987 /* kernel mode address */
230b1839 1988 struct sockaddr_storage addr;
1da177e4
LT
1989
1990 /* user mode address pointers */
1991 struct sockaddr __user *uaddr;
1992 int __user *uaddr_len;
89bddce5 1993
1da177e4
LT
1994 if (MSG_CMSG_COMPAT & flags) {
1995 if (get_compat_msghdr(&msg_sys, msg_compat))
1996 return -EFAULT;
89bddce5
SH
1997 }
1998 else if (copy_from_user(&msg_sys, msg, sizeof(struct msghdr)))
1999 return -EFAULT;
1da177e4 2000
6cb153ca 2001 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4
LT
2002 if (!sock)
2003 goto out;
2004
2005 err = -EMSGSIZE;
2006 if (msg_sys.msg_iovlen > UIO_MAXIOV)
2007 goto out_put;
89bddce5
SH
2008
2009 /* Check whether to allocate the iovec area */
1da177e4
LT
2010 err = -ENOMEM;
2011 iov_size = msg_sys.msg_iovlen * sizeof(struct iovec);
2012 if (msg_sys.msg_iovlen > UIO_FASTIOV) {
2013 iov = sock_kmalloc(sock->sk, iov_size, GFP_KERNEL);
2014 if (!iov)
2015 goto out_put;
2016 }
2017
2018 /*
89bddce5
SH
2019 * Save the user-mode address (verify_iovec will change the
2020 * kernel msghdr to use the kernel address space)
1da177e4 2021 */
89bddce5 2022
cfcabdcc 2023 uaddr = (__force void __user *)msg_sys.msg_name;
1da177e4
LT
2024 uaddr_len = COMPAT_NAMELEN(msg);
2025 if (MSG_CMSG_COMPAT & flags) {
230b1839
YH
2026 err = verify_compat_iovec(&msg_sys, iov,
2027 (struct sockaddr *)&addr,
2028 VERIFY_WRITE);
1da177e4 2029 } else
230b1839
YH
2030 err = verify_iovec(&msg_sys, iov,
2031 (struct sockaddr *)&addr,
2032 VERIFY_WRITE);
1da177e4
LT
2033 if (err < 0)
2034 goto out_freeiov;
89bddce5 2035 total_len = err;
1da177e4
LT
2036
2037 cmsg_ptr = (unsigned long)msg_sys.msg_control;
4a19542e 2038 msg_sys.msg_flags = flags & (MSG_CMSG_CLOEXEC|MSG_CMSG_COMPAT);
89bddce5 2039
1da177e4
LT
2040 if (sock->file->f_flags & O_NONBLOCK)
2041 flags |= MSG_DONTWAIT;
2042 err = sock_recvmsg(sock, &msg_sys, total_len, flags);
2043 if (err < 0)
2044 goto out_freeiov;
2045 len = err;
2046
2047 if (uaddr != NULL) {
230b1839
YH
2048 err = move_addr_to_user((struct sockaddr *)&addr,
2049 msg_sys.msg_namelen, uaddr,
89bddce5 2050 uaddr_len);
1da177e4
LT
2051 if (err < 0)
2052 goto out_freeiov;
2053 }
37f7f421
DM
2054 err = __put_user((msg_sys.msg_flags & ~MSG_CMSG_COMPAT),
2055 COMPAT_FLAGS(msg));
1da177e4
LT
2056 if (err)
2057 goto out_freeiov;
2058 if (MSG_CMSG_COMPAT & flags)
89bddce5 2059 err = __put_user((unsigned long)msg_sys.msg_control - cmsg_ptr,
1da177e4
LT
2060 &msg_compat->msg_controllen);
2061 else
89bddce5 2062 err = __put_user((unsigned long)msg_sys.msg_control - cmsg_ptr,
1da177e4
LT
2063 &msg->msg_controllen);
2064 if (err)
2065 goto out_freeiov;
2066 err = len;
2067
2068out_freeiov:
2069 if (iov != iovstack)
2070 sock_kfree_s(sock->sk, iov, iov_size);
2071out_put:
6cb153ca 2072 fput_light(sock->file, fput_needed);
1da177e4
LT
2073out:
2074 return err;
2075}
2076
2077#ifdef __ARCH_WANT_SYS_SOCKETCALL
2078
2079/* Argument list sizes for sys_socketcall */
2080#define AL(x) ((x) * sizeof(unsigned long))
aaca0bdc 2081static const unsigned char nargs[19]={
89bddce5
SH
2082 AL(0),AL(3),AL(3),AL(3),AL(2),AL(3),
2083 AL(3),AL(3),AL(4),AL(4),AL(4),AL(6),
aaca0bdc 2084 AL(6),AL(2),AL(5),AL(5),AL(3),AL(3),
de11defe 2085 AL(4)
89bddce5
SH
2086};
2087
1da177e4
LT
2088#undef AL
2089
2090/*
89bddce5 2091 * System call vectors.
1da177e4
LT
2092 *
2093 * Argument checking cleaned up. Saved 20% in size.
2094 * This function doesn't need to set the kernel lock because
89bddce5 2095 * it is set by the callees.
1da177e4
LT
2096 */
2097
3e0fa65f 2098SYSCALL_DEFINE2(socketcall, int, call, unsigned long __user *, args)
1da177e4
LT
2099{
2100 unsigned long a[6];
89bddce5 2101 unsigned long a0, a1;
1da177e4
LT
2102 int err;
2103
de11defe 2104 if (call < 1 || call > SYS_ACCEPT4)
1da177e4
LT
2105 return -EINVAL;
2106
2107 /* copy_from_user should be SMP safe. */
2108 if (copy_from_user(a, args, nargs[call]))
2109 return -EFAULT;
3ec3b2fb 2110
f3298dc4 2111 audit_socketcall(nargs[call] / sizeof(unsigned long), a);
3ec3b2fb 2112
89bddce5
SH
2113 a0 = a[0];
2114 a1 = a[1];
2115
2116 switch (call) {
2117 case SYS_SOCKET:
2118 err = sys_socket(a0, a1, a[2]);
2119 break;
2120 case SYS_BIND:
2121 err = sys_bind(a0, (struct sockaddr __user *)a1, a[2]);
2122 break;
2123 case SYS_CONNECT:
2124 err = sys_connect(a0, (struct sockaddr __user *)a1, a[2]);
2125 break;
2126 case SYS_LISTEN:
2127 err = sys_listen(a0, a1);
2128 break;
2129 case SYS_ACCEPT:
de11defe
UD
2130 err = sys_accept4(a0, (struct sockaddr __user *)a1,
2131 (int __user *)a[2], 0);
89bddce5
SH
2132 break;
2133 case SYS_GETSOCKNAME:
2134 err =
2135 sys_getsockname(a0, (struct sockaddr __user *)a1,
2136 (int __user *)a[2]);
2137 break;
2138 case SYS_GETPEERNAME:
2139 err =
2140 sys_getpeername(a0, (struct sockaddr __user *)a1,
2141 (int __user *)a[2]);
2142 break;
2143 case SYS_SOCKETPAIR:
2144 err = sys_socketpair(a0, a1, a[2], (int __user *)a[3]);
2145 break;
2146 case SYS_SEND:
2147 err = sys_send(a0, (void __user *)a1, a[2], a[3]);
2148 break;
2149 case SYS_SENDTO:
2150 err = sys_sendto(a0, (void __user *)a1, a[2], a[3],
2151 (struct sockaddr __user *)a[4], a[5]);
2152 break;
2153 case SYS_RECV:
2154 err = sys_recv(a0, (void __user *)a1, a[2], a[3]);
2155 break;
2156 case SYS_RECVFROM:
2157 err = sys_recvfrom(a0, (void __user *)a1, a[2], a[3],
2158 (struct sockaddr __user *)a[4],
2159 (int __user *)a[5]);
2160 break;
2161 case SYS_SHUTDOWN:
2162 err = sys_shutdown(a0, a1);
2163 break;
2164 case SYS_SETSOCKOPT:
2165 err = sys_setsockopt(a0, a1, a[2], (char __user *)a[3], a[4]);
2166 break;
2167 case SYS_GETSOCKOPT:
2168 err =
2169 sys_getsockopt(a0, a1, a[2], (char __user *)a[3],
2170 (int __user *)a[4]);
2171 break;
2172 case SYS_SENDMSG:
2173 err = sys_sendmsg(a0, (struct msghdr __user *)a1, a[2]);
2174 break;
2175 case SYS_RECVMSG:
2176 err = sys_recvmsg(a0, (struct msghdr __user *)a1, a[2]);
2177 break;
de11defe
UD
2178 case SYS_ACCEPT4:
2179 err = sys_accept4(a0, (struct sockaddr __user *)a1,
2180 (int __user *)a[2], a[3]);
aaca0bdc 2181 break;
89bddce5
SH
2182 default:
2183 err = -EINVAL;
2184 break;
1da177e4
LT
2185 }
2186 return err;
2187}
2188
89bddce5 2189#endif /* __ARCH_WANT_SYS_SOCKETCALL */
1da177e4 2190
55737fda
SH
2191/**
2192 * sock_register - add a socket protocol handler
2193 * @ops: description of protocol
2194 *
1da177e4
LT
2195 * This function is called by a protocol handler that wants to
2196 * advertise its address family, and have it linked into the
55737fda
SH
2197 * socket interface. The value ops->family coresponds to the
2198 * socket system call protocol family.
1da177e4 2199 */
f0fd27d4 2200int sock_register(const struct net_proto_family *ops)
1da177e4
LT
2201{
2202 int err;
2203
2204 if (ops->family >= NPROTO) {
89bddce5
SH
2205 printk(KERN_CRIT "protocol %d >= NPROTO(%d)\n", ops->family,
2206 NPROTO);
1da177e4
LT
2207 return -ENOBUFS;
2208 }
55737fda
SH
2209
2210 spin_lock(&net_family_lock);
2211 if (net_families[ops->family])
2212 err = -EEXIST;
2213 else {
89bddce5 2214 net_families[ops->family] = ops;
1da177e4
LT
2215 err = 0;
2216 }
55737fda
SH
2217 spin_unlock(&net_family_lock);
2218
89bddce5 2219 printk(KERN_INFO "NET: Registered protocol family %d\n", ops->family);
1da177e4
LT
2220 return err;
2221}
2222
55737fda
SH
2223/**
2224 * sock_unregister - remove a protocol handler
2225 * @family: protocol family to remove
2226 *
1da177e4
LT
2227 * This function is called by a protocol handler that wants to
2228 * remove its address family, and have it unlinked from the
55737fda
SH
2229 * new socket creation.
2230 *
2231 * If protocol handler is a module, then it can use module reference
2232 * counts to protect against new references. If protocol handler is not
2233 * a module then it needs to provide its own protection in
2234 * the ops->create routine.
1da177e4 2235 */
f0fd27d4 2236void sock_unregister(int family)
1da177e4 2237{
f0fd27d4 2238 BUG_ON(family < 0 || family >= NPROTO);
1da177e4 2239
55737fda 2240 spin_lock(&net_family_lock);
89bddce5 2241 net_families[family] = NULL;
55737fda
SH
2242 spin_unlock(&net_family_lock);
2243
2244 synchronize_rcu();
2245
89bddce5 2246 printk(KERN_INFO "NET: Unregistered protocol family %d\n", family);
1da177e4
LT
2247}
2248
77d76ea3 2249static int __init sock_init(void)
1da177e4
LT
2250{
2251 /*
89bddce5 2252 * Initialize sock SLAB cache.
1da177e4 2253 */
89bddce5 2254
1da177e4
LT
2255 sk_init();
2256
1da177e4 2257 /*
89bddce5 2258 * Initialize skbuff SLAB cache
1da177e4
LT
2259 */
2260 skb_init();
1da177e4
LT
2261
2262 /*
89bddce5 2263 * Initialize the protocols module.
1da177e4
LT
2264 */
2265
2266 init_inodecache();
2267 register_filesystem(&sock_fs_type);
2268 sock_mnt = kern_mount(&sock_fs_type);
77d76ea3
AK
2269
2270 /* The real protocol initialization is performed in later initcalls.
1da177e4
LT
2271 */
2272
2273#ifdef CONFIG_NETFILTER
2274 netfilter_init();
2275#endif
cbeb321a
DM
2276
2277 return 0;
1da177e4
LT
2278}
2279
77d76ea3
AK
2280core_initcall(sock_init); /* early initcall */
2281
1da177e4
LT
2282#ifdef CONFIG_PROC_FS
2283void socket_seq_show(struct seq_file *seq)
2284{
2285 int cpu;
2286 int counter = 0;
2287
6f912042 2288 for_each_possible_cpu(cpu)
89bddce5 2289 counter += per_cpu(sockets_in_use, cpu);
1da177e4
LT
2290
2291 /* It can be negative, by the way. 8) */
2292 if (counter < 0)
2293 counter = 0;
2294
2295 seq_printf(seq, "sockets: used %d\n", counter);
2296}
89bddce5 2297#endif /* CONFIG_PROC_FS */
1da177e4 2298
89bbfc95
SP
2299#ifdef CONFIG_COMPAT
2300static long compat_sock_ioctl(struct file *file, unsigned cmd,
89bddce5 2301 unsigned long arg)
89bbfc95
SP
2302{
2303 struct socket *sock = file->private_data;
2304 int ret = -ENOIOCTLCMD;
87de87d5
DM
2305 struct sock *sk;
2306 struct net *net;
2307
2308 sk = sock->sk;
2309 net = sock_net(sk);
89bbfc95
SP
2310
2311 if (sock->ops->compat_ioctl)
2312 ret = sock->ops->compat_ioctl(sock, cmd, arg);
2313
87de87d5
DM
2314 if (ret == -ENOIOCTLCMD &&
2315 (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST))
2316 ret = compat_wext_handle_ioctl(net, cmd, arg);
2317
89bbfc95
SP
2318 return ret;
2319}
2320#endif
2321
ac5a488e
SS
2322int kernel_bind(struct socket *sock, struct sockaddr *addr, int addrlen)
2323{
2324 return sock->ops->bind(sock, addr, addrlen);
2325}
2326
2327int kernel_listen(struct socket *sock, int backlog)
2328{
2329 return sock->ops->listen(sock, backlog);
2330}
2331
2332int kernel_accept(struct socket *sock, struct socket **newsock, int flags)
2333{
2334 struct sock *sk = sock->sk;
2335 int err;
2336
2337 err = sock_create_lite(sk->sk_family, sk->sk_type, sk->sk_protocol,
2338 newsock);
2339 if (err < 0)
2340 goto done;
2341
2342 err = sock->ops->accept(sock, *newsock, flags);
2343 if (err < 0) {
2344 sock_release(*newsock);
fa8705b0 2345 *newsock = NULL;
ac5a488e
SS
2346 goto done;
2347 }
2348
2349 (*newsock)->ops = sock->ops;
1b08534e 2350 __module_get((*newsock)->ops->owner);
ac5a488e
SS
2351
2352done:
2353 return err;
2354}
2355
2356int kernel_connect(struct socket *sock, struct sockaddr *addr, int addrlen,
4768fbcb 2357 int flags)
ac5a488e
SS
2358{
2359 return sock->ops->connect(sock, addr, addrlen, flags);
2360}
2361
2362int kernel_getsockname(struct socket *sock, struct sockaddr *addr,
2363 int *addrlen)
2364{
2365 return sock->ops->getname(sock, addr, addrlen, 0);
2366}
2367
2368int kernel_getpeername(struct socket *sock, struct sockaddr *addr,
2369 int *addrlen)
2370{
2371 return sock->ops->getname(sock, addr, addrlen, 1);
2372}
2373
2374int kernel_getsockopt(struct socket *sock, int level, int optname,
2375 char *optval, int *optlen)
2376{
2377 mm_segment_t oldfs = get_fs();
2378 int err;
2379
2380 set_fs(KERNEL_DS);
2381 if (level == SOL_SOCKET)
2382 err = sock_getsockopt(sock, level, optname, optval, optlen);
2383 else
2384 err = sock->ops->getsockopt(sock, level, optname, optval,
2385 optlen);
2386 set_fs(oldfs);
2387 return err;
2388}
2389
2390int kernel_setsockopt(struct socket *sock, int level, int optname,
2391 char *optval, int optlen)
2392{
2393 mm_segment_t oldfs = get_fs();
2394 int err;
2395
2396 set_fs(KERNEL_DS);
2397 if (level == SOL_SOCKET)
2398 err = sock_setsockopt(sock, level, optname, optval, optlen);
2399 else
2400 err = sock->ops->setsockopt(sock, level, optname, optval,
2401 optlen);
2402 set_fs(oldfs);
2403 return err;
2404}
2405
2406int kernel_sendpage(struct socket *sock, struct page *page, int offset,
2407 size_t size, int flags)
2408{
2409 if (sock->ops->sendpage)
2410 return sock->ops->sendpage(sock, page, offset, size, flags);
2411
2412 return sock_no_sendpage(sock, page, offset, size, flags);
2413}
2414
2415int kernel_sock_ioctl(struct socket *sock, int cmd, unsigned long arg)
2416{
2417 mm_segment_t oldfs = get_fs();
2418 int err;
2419
2420 set_fs(KERNEL_DS);
2421 err = sock->ops->ioctl(sock, cmd, arg);
2422 set_fs(oldfs);
2423
2424 return err;
2425}
2426
91cf45f0
TM
2427int kernel_sock_shutdown(struct socket *sock, enum sock_shutdown_cmd how)
2428{
2429 return sock->ops->shutdown(sock, how);
2430}
2431
1da177e4
LT
2432EXPORT_SYMBOL(sock_create);
2433EXPORT_SYMBOL(sock_create_kern);
2434EXPORT_SYMBOL(sock_create_lite);
2435EXPORT_SYMBOL(sock_map_fd);
2436EXPORT_SYMBOL(sock_recvmsg);
2437EXPORT_SYMBOL(sock_register);
2438EXPORT_SYMBOL(sock_release);
2439EXPORT_SYMBOL(sock_sendmsg);
2440EXPORT_SYMBOL(sock_unregister);
2441EXPORT_SYMBOL(sock_wake_async);
2442EXPORT_SYMBOL(sockfd_lookup);
2443EXPORT_SYMBOL(kernel_sendmsg);
2444EXPORT_SYMBOL(kernel_recvmsg);
ac5a488e
SS
2445EXPORT_SYMBOL(kernel_bind);
2446EXPORT_SYMBOL(kernel_listen);
2447EXPORT_SYMBOL(kernel_accept);
2448EXPORT_SYMBOL(kernel_connect);
2449EXPORT_SYMBOL(kernel_getsockname);
2450EXPORT_SYMBOL(kernel_getpeername);
2451EXPORT_SYMBOL(kernel_getsockopt);
2452EXPORT_SYMBOL(kernel_setsockopt);
2453EXPORT_SYMBOL(kernel_sendpage);
2454EXPORT_SYMBOL(kernel_sock_ioctl);
91cf45f0 2455EXPORT_SYMBOL(kernel_sock_shutdown);
This page took 0.623008 seconds and 5 git commands to generate.