]> bbs.cooldavid.org Git - net-next-2.6.git/blame - net/socket.c
virtio_net: Set the mac config only when VIRITO_NET_F_MAC
[net-next-2.6.git] / net / socket.c
CommitLineData
1da177e4
LT
1/*
2 * NET An implementation of the SOCKET network access protocol.
3 *
4 * Version: @(#)socket.c 1.1.93 18/02/95
5 *
6 * Authors: Orest Zborowski, <obz@Kodak.COM>
02c30a84 7 * Ross Biro
1da177e4
LT
8 * Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
9 *
10 * Fixes:
11 * Anonymous : NOTSOCK/BADF cleanup. Error fix in
12 * shutdown()
13 * Alan Cox : verify_area() fixes
14 * Alan Cox : Removed DDI
15 * Jonathan Kamens : SOCK_DGRAM reconnect bug
16 * Alan Cox : Moved a load of checks to the very
17 * top level.
18 * Alan Cox : Move address structures to/from user
19 * mode above the protocol layers.
20 * Rob Janssen : Allow 0 length sends.
21 * Alan Cox : Asynchronous I/O support (cribbed from the
22 * tty drivers).
23 * Niibe Yutaka : Asynchronous I/O for writes (4.4BSD style)
24 * Jeff Uphoff : Made max number of sockets command-line
25 * configurable.
26 * Matti Aarnio : Made the number of sockets dynamic,
27 * to be allocated when needed, and mr.
28 * Uphoff's max is used as max to be
29 * allowed to allocate.
30 * Linus : Argh. removed all the socket allocation
31 * altogether: it's in the inode now.
32 * Alan Cox : Made sock_alloc()/sock_release() public
33 * for NetROM and future kernel nfsd type
34 * stuff.
35 * Alan Cox : sendmsg/recvmsg basics.
36 * Tom Dyas : Export net symbols.
37 * Marcin Dalecki : Fixed problems with CONFIG_NET="n".
38 * Alan Cox : Added thread locking to sys_* calls
39 * for sockets. May have errors at the
40 * moment.
41 * Kevin Buhr : Fixed the dumb errors in the above.
42 * Andi Kleen : Some small cleanups, optimizations,
43 * and fixed a copy_from_user() bug.
44 * Tigran Aivazian : sys_send(args) calls sys_sendto(args, NULL, 0)
89bddce5 45 * Tigran Aivazian : Made listen(2) backlog sanity checks
1da177e4
LT
46 * protocol-independent
47 *
48 *
49 * This program is free software; you can redistribute it and/or
50 * modify it under the terms of the GNU General Public License
51 * as published by the Free Software Foundation; either version
52 * 2 of the License, or (at your option) any later version.
53 *
54 *
55 * This module is effectively the top level interface to the BSD socket
89bddce5 56 * paradigm.
1da177e4
LT
57 *
58 * Based upon Swansea University Computer Society NET3.039
59 */
60
1da177e4 61#include <linux/mm.h>
1da177e4
LT
62#include <linux/socket.h>
63#include <linux/file.h>
64#include <linux/net.h>
65#include <linux/interrupt.h>
aaca0bdc 66#include <linux/thread_info.h>
55737fda 67#include <linux/rcupdate.h>
1da177e4
LT
68#include <linux/netdevice.h>
69#include <linux/proc_fs.h>
70#include <linux/seq_file.h>
4a3e2f71 71#include <linux/mutex.h>
1da177e4
LT
72#include <linux/wanrouter.h>
73#include <linux/if_bridge.h>
20380731
ACM
74#include <linux/if_frad.h>
75#include <linux/if_vlan.h>
1da177e4
LT
76#include <linux/init.h>
77#include <linux/poll.h>
78#include <linux/cache.h>
79#include <linux/module.h>
80#include <linux/highmem.h>
1da177e4
LT
81#include <linux/mount.h>
82#include <linux/security.h>
83#include <linux/syscalls.h>
84#include <linux/compat.h>
85#include <linux/kmod.h>
3ec3b2fb 86#include <linux/audit.h>
d86b5e0e 87#include <linux/wireless.h>
1b8d7ae4 88#include <linux/nsproxy.h>
1da177e4
LT
89
90#include <asm/uaccess.h>
91#include <asm/unistd.h>
92
93#include <net/compat.h>
87de87d5 94#include <net/wext.h>
1da177e4
LT
95
96#include <net/sock.h>
97#include <linux/netfilter.h>
98
99static int sock_no_open(struct inode *irrelevant, struct file *dontcare);
027445c3
BP
100static ssize_t sock_aio_read(struct kiocb *iocb, const struct iovec *iov,
101 unsigned long nr_segs, loff_t pos);
102static ssize_t sock_aio_write(struct kiocb *iocb, const struct iovec *iov,
103 unsigned long nr_segs, loff_t pos);
89bddce5 104static int sock_mmap(struct file *file, struct vm_area_struct *vma);
1da177e4
LT
105
106static int sock_close(struct inode *inode, struct file *file);
107static unsigned int sock_poll(struct file *file,
108 struct poll_table_struct *wait);
89bddce5 109static long sock_ioctl(struct file *file, unsigned int cmd, unsigned long arg);
89bbfc95
SP
110#ifdef CONFIG_COMPAT
111static long compat_sock_ioctl(struct file *file,
89bddce5 112 unsigned int cmd, unsigned long arg);
89bbfc95 113#endif
1da177e4 114static int sock_fasync(int fd, struct file *filp, int on);
1da177e4
LT
115static ssize_t sock_sendpage(struct file *file, struct page *page,
116 int offset, size_t size, loff_t *ppos, int more);
9c55e01c
JA
117static ssize_t sock_splice_read(struct file *file, loff_t *ppos,
118 struct pipe_inode_info *pipe, size_t len,
119 unsigned int flags);
1da177e4 120
1da177e4
LT
121/*
122 * Socket files have a set of 'special' operations as well as the generic file ones. These don't appear
123 * in the operation structures but are done directly via the socketcall() multiplexor.
124 */
125
da7071d7 126static const struct file_operations socket_file_ops = {
1da177e4
LT
127 .owner = THIS_MODULE,
128 .llseek = no_llseek,
129 .aio_read = sock_aio_read,
130 .aio_write = sock_aio_write,
131 .poll = sock_poll,
132 .unlocked_ioctl = sock_ioctl,
89bbfc95
SP
133#ifdef CONFIG_COMPAT
134 .compat_ioctl = compat_sock_ioctl,
135#endif
1da177e4
LT
136 .mmap = sock_mmap,
137 .open = sock_no_open, /* special open code to disallow open via /proc */
138 .release = sock_close,
139 .fasync = sock_fasync,
5274f052
JA
140 .sendpage = sock_sendpage,
141 .splice_write = generic_splice_sendpage,
9c55e01c 142 .splice_read = sock_splice_read,
1da177e4
LT
143};
144
145/*
146 * The protocol list. Each protocol is registered in here.
147 */
148
1da177e4 149static DEFINE_SPINLOCK(net_family_lock);
f0fd27d4 150static const struct net_proto_family *net_families[NPROTO] __read_mostly;
1da177e4 151
1da177e4
LT
152/*
153 * Statistics counters of the socket lists
154 */
155
156static DEFINE_PER_CPU(int, sockets_in_use) = 0;
157
158/*
89bddce5
SH
159 * Support routines.
160 * Move socket addresses back and forth across the kernel/user
161 * divide and look after the messy bits.
1da177e4
LT
162 */
163
89bddce5 164#define MAX_SOCK_ADDR 128 /* 108 for Unix domain -
1da177e4
LT
165 16 for IP, 16 for IPX,
166 24 for IPv6,
89bddce5 167 about 80 for AX.25
1da177e4
LT
168 must be at least one bigger than
169 the AF_UNIX size (see net/unix/af_unix.c
89bddce5 170 :unix_mkname()).
1da177e4 171 */
89bddce5 172
1da177e4
LT
173/**
174 * move_addr_to_kernel - copy a socket address into kernel space
175 * @uaddr: Address in user space
176 * @kaddr: Address in kernel space
177 * @ulen: Length in user space
178 *
179 * The address is copied into kernel space. If the provided address is
180 * too long an error code of -EINVAL is returned. If the copy gives
181 * invalid addresses -EFAULT is returned. On a success 0 is returned.
182 */
183
230b1839 184int move_addr_to_kernel(void __user *uaddr, int ulen, struct sockaddr *kaddr)
1da177e4 185{
230b1839 186 if (ulen < 0 || ulen > sizeof(struct sockaddr_storage))
1da177e4 187 return -EINVAL;
89bddce5 188 if (ulen == 0)
1da177e4 189 return 0;
89bddce5 190 if (copy_from_user(kaddr, uaddr, ulen))
1da177e4 191 return -EFAULT;
3ec3b2fb 192 return audit_sockaddr(ulen, kaddr);
1da177e4
LT
193}
194
195/**
196 * move_addr_to_user - copy an address to user space
197 * @kaddr: kernel space address
198 * @klen: length of address in kernel
199 * @uaddr: user space address
200 * @ulen: pointer to user length field
201 *
202 * The value pointed to by ulen on entry is the buffer length available.
203 * This is overwritten with the buffer space used. -EINVAL is returned
204 * if an overlong buffer is specified or a negative buffer size. -EFAULT
205 * is returned if either the buffer or the length field are not
206 * accessible.
207 * After copying the data up to the limit the user specifies, the true
208 * length of the data is written over the length limit the user
209 * specified. Zero is returned for a success.
210 */
89bddce5 211
230b1839 212int move_addr_to_user(struct sockaddr *kaddr, int klen, void __user *uaddr,
89bddce5 213 int __user *ulen)
1da177e4
LT
214{
215 int err;
216 int len;
217
89bddce5
SH
218 err = get_user(len, ulen);
219 if (err)
1da177e4 220 return err;
89bddce5
SH
221 if (len > klen)
222 len = klen;
230b1839 223 if (len < 0 || len > sizeof(struct sockaddr_storage))
1da177e4 224 return -EINVAL;
89bddce5 225 if (len) {
d6fe3945
SG
226 if (audit_sockaddr(klen, kaddr))
227 return -ENOMEM;
89bddce5 228 if (copy_to_user(uaddr, kaddr, len))
1da177e4
LT
229 return -EFAULT;
230 }
231 /*
89bddce5
SH
232 * "fromlen shall refer to the value before truncation.."
233 * 1003.1g
1da177e4
LT
234 */
235 return __put_user(klen, ulen);
236}
237
238#define SOCKFS_MAGIC 0x534F434B
239
e18b890b 240static struct kmem_cache *sock_inode_cachep __read_mostly;
1da177e4
LT
241
242static struct inode *sock_alloc_inode(struct super_block *sb)
243{
244 struct socket_alloc *ei;
89bddce5 245
e94b1766 246 ei = kmem_cache_alloc(sock_inode_cachep, GFP_KERNEL);
1da177e4
LT
247 if (!ei)
248 return NULL;
249 init_waitqueue_head(&ei->socket.wait);
89bddce5 250
1da177e4
LT
251 ei->socket.fasync_list = NULL;
252 ei->socket.state = SS_UNCONNECTED;
253 ei->socket.flags = 0;
254 ei->socket.ops = NULL;
255 ei->socket.sk = NULL;
256 ei->socket.file = NULL;
1da177e4
LT
257
258 return &ei->vfs_inode;
259}
260
261static void sock_destroy_inode(struct inode *inode)
262{
263 kmem_cache_free(sock_inode_cachep,
264 container_of(inode, struct socket_alloc, vfs_inode));
265}
266
51cc5068 267static void init_once(void *foo)
1da177e4 268{
89bddce5 269 struct socket_alloc *ei = (struct socket_alloc *)foo;
1da177e4 270
a35afb83 271 inode_init_once(&ei->vfs_inode);
1da177e4 272}
89bddce5 273
1da177e4
LT
274static int init_inodecache(void)
275{
276 sock_inode_cachep = kmem_cache_create("sock_inode_cache",
89bddce5
SH
277 sizeof(struct socket_alloc),
278 0,
279 (SLAB_HWCACHE_ALIGN |
280 SLAB_RECLAIM_ACCOUNT |
281 SLAB_MEM_SPREAD),
20c2df83 282 init_once);
1da177e4
LT
283 if (sock_inode_cachep == NULL)
284 return -ENOMEM;
285 return 0;
286}
287
288static struct super_operations sockfs_ops = {
289 .alloc_inode = sock_alloc_inode,
290 .destroy_inode =sock_destroy_inode,
291 .statfs = simple_statfs,
292};
293
454e2398 294static int sockfs_get_sb(struct file_system_type *fs_type,
89bddce5
SH
295 int flags, const char *dev_name, void *data,
296 struct vfsmount *mnt)
1da177e4 297{
454e2398
DH
298 return get_sb_pseudo(fs_type, "socket:", &sockfs_ops, SOCKFS_MAGIC,
299 mnt);
1da177e4
LT
300}
301
ba89966c 302static struct vfsmount *sock_mnt __read_mostly;
1da177e4
LT
303
304static struct file_system_type sock_fs_type = {
305 .name = "sockfs",
306 .get_sb = sockfs_get_sb,
307 .kill_sb = kill_anon_super,
308};
89bddce5 309
1da177e4
LT
310static int sockfs_delete_dentry(struct dentry *dentry)
311{
304e61e6
ED
312 /*
313 * At creation time, we pretended this dentry was hashed
314 * (by clearing DCACHE_UNHASHED bit in d_flags)
315 * At delete time, we restore the truth : not hashed.
316 * (so that dput() can proceed correctly)
317 */
318 dentry->d_flags |= DCACHE_UNHASHED;
319 return 0;
1da177e4 320}
c23fbb6b
ED
321
322/*
323 * sockfs_dname() is called from d_path().
324 */
325static char *sockfs_dname(struct dentry *dentry, char *buffer, int buflen)
326{
327 return dynamic_dname(dentry, buffer, buflen, "socket:[%lu]",
328 dentry->d_inode->i_ino);
329}
330
3ba13d17 331static const struct dentry_operations sockfs_dentry_operations = {
89bddce5 332 .d_delete = sockfs_delete_dentry,
c23fbb6b 333 .d_dname = sockfs_dname,
1da177e4
LT
334};
335
336/*
337 * Obtains the first available file descriptor and sets it up for use.
338 *
39d8c1b6
DM
339 * These functions create file structures and maps them to fd space
340 * of the current process. On success it returns file descriptor
1da177e4
LT
341 * and file struct implicitly stored in sock->file.
342 * Note that another thread may close file descriptor before we return
343 * from this function. We use the fact that now we do not refer
344 * to socket after mapping. If one day we will need it, this
345 * function will increment ref. count on file by 1.
346 *
347 * In any case returned fd MAY BE not valid!
348 * This race condition is unavoidable
349 * with shared fd spaces, we cannot solve it inside kernel,
350 * but we take care of internal coherence yet.
351 */
352
a677a039 353static int sock_alloc_fd(struct file **filep, int flags)
1da177e4
LT
354{
355 int fd;
1da177e4 356
a677a039 357 fd = get_unused_fd_flags(flags);
39d8c1b6 358 if (likely(fd >= 0)) {
1da177e4
LT
359 struct file *file = get_empty_filp();
360
39d8c1b6
DM
361 *filep = file;
362 if (unlikely(!file)) {
1da177e4 363 put_unused_fd(fd);
39d8c1b6 364 return -ENFILE;
1da177e4 365 }
39d8c1b6
DM
366 } else
367 *filep = NULL;
368 return fd;
369}
1da177e4 370
77d27200 371static int sock_attach_fd(struct socket *sock, struct file *file, int flags)
39d8c1b6 372{
ce8d2cdf 373 struct dentry *dentry;
c23fbb6b 374 struct qstr name = { .name = "" };
39d8c1b6 375
ce8d2cdf
DH
376 dentry = d_alloc(sock_mnt->mnt_sb->s_root, &name);
377 if (unlikely(!dentry))
39d8c1b6
DM
378 return -ENOMEM;
379
ce8d2cdf 380 dentry->d_op = &sockfs_dentry_operations;
304e61e6
ED
381 /*
382 * We dont want to push this dentry into global dentry hash table.
383 * We pretend dentry is already hashed, by unsetting DCACHE_UNHASHED
384 * This permits a working /proc/$pid/fd/XXX on sockets
385 */
ce8d2cdf
DH
386 dentry->d_flags &= ~DCACHE_UNHASHED;
387 d_instantiate(dentry, SOCK_INODE(sock));
39d8c1b6
DM
388
389 sock->file = file;
ce8d2cdf
DH
390 init_file(file, sock_mnt, dentry, FMODE_READ | FMODE_WRITE,
391 &socket_file_ops);
392 SOCK_INODE(sock)->i_fop = &socket_file_ops;
77d27200 393 file->f_flags = O_RDWR | (flags & O_NONBLOCK);
39d8c1b6
DM
394 file->f_pos = 0;
395 file->private_data = sock;
1da177e4 396
39d8c1b6
DM
397 return 0;
398}
399
a677a039 400int sock_map_fd(struct socket *sock, int flags)
39d8c1b6
DM
401{
402 struct file *newfile;
a677a039 403 int fd = sock_alloc_fd(&newfile, flags);
39d8c1b6
DM
404
405 if (likely(fd >= 0)) {
77d27200 406 int err = sock_attach_fd(sock, newfile, flags);
39d8c1b6
DM
407
408 if (unlikely(err < 0)) {
409 put_filp(newfile);
1da177e4 410 put_unused_fd(fd);
39d8c1b6 411 return err;
1da177e4 412 }
39d8c1b6 413 fd_install(fd, newfile);
1da177e4 414 }
1da177e4
LT
415 return fd;
416}
417
6cb153ca
BL
418static struct socket *sock_from_file(struct file *file, int *err)
419{
6cb153ca
BL
420 if (file->f_op == &socket_file_ops)
421 return file->private_data; /* set in sock_map_fd */
422
23bb80d2
ED
423 *err = -ENOTSOCK;
424 return NULL;
6cb153ca
BL
425}
426
1da177e4
LT
427/**
428 * sockfd_lookup - Go from a file number to its socket slot
429 * @fd: file handle
430 * @err: pointer to an error code return
431 *
432 * The file handle passed in is locked and the socket it is bound
433 * too is returned. If an error occurs the err pointer is overwritten
434 * with a negative errno code and NULL is returned. The function checks
435 * for both invalid handles and passing a handle which is not a socket.
436 *
437 * On a success the socket object pointer is returned.
438 */
439
440struct socket *sockfd_lookup(int fd, int *err)
441{
442 struct file *file;
1da177e4
LT
443 struct socket *sock;
444
89bddce5
SH
445 file = fget(fd);
446 if (!file) {
1da177e4
LT
447 *err = -EBADF;
448 return NULL;
449 }
89bddce5 450
6cb153ca
BL
451 sock = sock_from_file(file, err);
452 if (!sock)
1da177e4 453 fput(file);
6cb153ca
BL
454 return sock;
455}
1da177e4 456
6cb153ca
BL
457static struct socket *sockfd_lookup_light(int fd, int *err, int *fput_needed)
458{
459 struct file *file;
460 struct socket *sock;
461
3672558c 462 *err = -EBADF;
6cb153ca
BL
463 file = fget_light(fd, fput_needed);
464 if (file) {
465 sock = sock_from_file(file, err);
466 if (sock)
467 return sock;
468 fput_light(file, *fput_needed);
1da177e4 469 }
6cb153ca 470 return NULL;
1da177e4
LT
471}
472
473/**
474 * sock_alloc - allocate a socket
89bddce5 475 *
1da177e4
LT
476 * Allocate a new inode and socket object. The two are bound together
477 * and initialised. The socket is then returned. If we are out of inodes
478 * NULL is returned.
479 */
480
481static struct socket *sock_alloc(void)
482{
89bddce5
SH
483 struct inode *inode;
484 struct socket *sock;
1da177e4
LT
485
486 inode = new_inode(sock_mnt->mnt_sb);
487 if (!inode)
488 return NULL;
489
490 sock = SOCKET_I(inode);
491
89bddce5 492 inode->i_mode = S_IFSOCK | S_IRWXUGO;
8192b0c4
DH
493 inode->i_uid = current_fsuid();
494 inode->i_gid = current_fsgid();
1da177e4
LT
495
496 get_cpu_var(sockets_in_use)++;
497 put_cpu_var(sockets_in_use);
498 return sock;
499}
500
501/*
502 * In theory you can't get an open on this inode, but /proc provides
503 * a back door. Remember to keep it shut otherwise you'll let the
504 * creepy crawlies in.
505 */
89bddce5 506
1da177e4
LT
507static int sock_no_open(struct inode *irrelevant, struct file *dontcare)
508{
509 return -ENXIO;
510}
511
4b6f5d20 512const struct file_operations bad_sock_fops = {
1da177e4
LT
513 .owner = THIS_MODULE,
514 .open = sock_no_open,
515};
516
517/**
518 * sock_release - close a socket
519 * @sock: socket to close
520 *
521 * The socket is released from the protocol stack if it has a release
522 * callback, and the inode is then released if the socket is bound to
89bddce5 523 * an inode not a file.
1da177e4 524 */
89bddce5 525
1da177e4
LT
526void sock_release(struct socket *sock)
527{
528 if (sock->ops) {
529 struct module *owner = sock->ops->owner;
530
531 sock->ops->release(sock);
532 sock->ops = NULL;
533 module_put(owner);
534 }
535
536 if (sock->fasync_list)
537 printk(KERN_ERR "sock_release: fasync list not empty!\n");
538
539 get_cpu_var(sockets_in_use)--;
540 put_cpu_var(sockets_in_use);
541 if (!sock->file) {
542 iput(SOCK_INODE(sock));
543 return;
544 }
89bddce5 545 sock->file = NULL;
1da177e4
LT
546}
547
20d49473
PO
548int sock_tx_timestamp(struct msghdr *msg, struct sock *sk,
549 union skb_shared_tx *shtx)
550{
551 shtx->flags = 0;
552 if (sock_flag(sk, SOCK_TIMESTAMPING_TX_HARDWARE))
553 shtx->hardware = 1;
554 if (sock_flag(sk, SOCK_TIMESTAMPING_TX_SOFTWARE))
555 shtx->software = 1;
556 return 0;
557}
558EXPORT_SYMBOL(sock_tx_timestamp);
559
89bddce5 560static inline int __sock_sendmsg(struct kiocb *iocb, struct socket *sock,
1da177e4
LT
561 struct msghdr *msg, size_t size)
562{
563 struct sock_iocb *si = kiocb_to_siocb(iocb);
564 int err;
565
566 si->sock = sock;
567 si->scm = NULL;
568 si->msg = msg;
569 si->size = size;
570
571 err = security_socket_sendmsg(sock, msg, size);
572 if (err)
573 return err;
574
575 return sock->ops->sendmsg(iocb, sock, msg, size);
576}
577
578int sock_sendmsg(struct socket *sock, struct msghdr *msg, size_t size)
579{
580 struct kiocb iocb;
581 struct sock_iocb siocb;
582 int ret;
583
584 init_sync_kiocb(&iocb, NULL);
585 iocb.private = &siocb;
586 ret = __sock_sendmsg(&iocb, sock, msg, size);
587 if (-EIOCBQUEUED == ret)
588 ret = wait_on_sync_kiocb(&iocb);
589 return ret;
590}
591
592int kernel_sendmsg(struct socket *sock, struct msghdr *msg,
593 struct kvec *vec, size_t num, size_t size)
594{
595 mm_segment_t oldfs = get_fs();
596 int result;
597
598 set_fs(KERNEL_DS);
599 /*
600 * the following is safe, since for compiler definitions of kvec and
601 * iovec are identical, yielding the same in-core layout and alignment
602 */
89bddce5 603 msg->msg_iov = (struct iovec *)vec;
1da177e4
LT
604 msg->msg_iovlen = num;
605 result = sock_sendmsg(sock, msg, size);
606 set_fs(oldfs);
607 return result;
608}
609
20d49473
PO
610static int ktime2ts(ktime_t kt, struct timespec *ts)
611{
612 if (kt.tv64) {
613 *ts = ktime_to_timespec(kt);
614 return 1;
615 } else {
616 return 0;
617 }
618}
619
92f37fd2
ED
620/*
621 * called from sock_recv_timestamp() if sock_flag(sk, SOCK_RCVTSTAMP)
622 */
623void __sock_recv_timestamp(struct msghdr *msg, struct sock *sk,
624 struct sk_buff *skb)
625{
20d49473
PO
626 int need_software_tstamp = sock_flag(sk, SOCK_RCVTSTAMP);
627 struct timespec ts[3];
628 int empty = 1;
629 struct skb_shared_hwtstamps *shhwtstamps =
630 skb_hwtstamps(skb);
631
632 /* Race occurred between timestamp enabling and packet
633 receiving. Fill in the current time for now. */
634 if (need_software_tstamp && skb->tstamp.tv64 == 0)
635 __net_timestamp(skb);
636
637 if (need_software_tstamp) {
638 if (!sock_flag(sk, SOCK_RCVTSTAMPNS)) {
639 struct timeval tv;
640 skb_get_timestamp(skb, &tv);
641 put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMP,
642 sizeof(tv), &tv);
643 } else {
644 struct timespec ts;
645 skb_get_timestampns(skb, &ts);
646 put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMPNS,
647 sizeof(ts), &ts);
648 }
649 }
650
651
652 memset(ts, 0, sizeof(ts));
653 if (skb->tstamp.tv64 &&
654 sock_flag(sk, SOCK_TIMESTAMPING_SOFTWARE)) {
655 skb_get_timestampns(skb, ts + 0);
656 empty = 0;
657 }
658 if (shhwtstamps) {
659 if (sock_flag(sk, SOCK_TIMESTAMPING_SYS_HARDWARE) &&
660 ktime2ts(shhwtstamps->syststamp, ts + 1))
661 empty = 0;
662 if (sock_flag(sk, SOCK_TIMESTAMPING_RAW_HARDWARE) &&
663 ktime2ts(shhwtstamps->hwtstamp, ts + 2))
664 empty = 0;
92f37fd2 665 }
20d49473
PO
666 if (!empty)
667 put_cmsg(msg, SOL_SOCKET,
668 SCM_TIMESTAMPING, sizeof(ts), &ts);
92f37fd2
ED
669}
670
7c81fd8b
ACM
671EXPORT_SYMBOL_GPL(__sock_recv_timestamp);
672
89bddce5 673static inline int __sock_recvmsg(struct kiocb *iocb, struct socket *sock,
1da177e4
LT
674 struct msghdr *msg, size_t size, int flags)
675{
676 int err;
677 struct sock_iocb *si = kiocb_to_siocb(iocb);
678
679 si->sock = sock;
680 si->scm = NULL;
681 si->msg = msg;
682 si->size = size;
683 si->flags = flags;
684
685 err = security_socket_recvmsg(sock, msg, size, flags);
686 if (err)
687 return err;
688
689 return sock->ops->recvmsg(iocb, sock, msg, size, flags);
690}
691
89bddce5 692int sock_recvmsg(struct socket *sock, struct msghdr *msg,
1da177e4
LT
693 size_t size, int flags)
694{
695 struct kiocb iocb;
696 struct sock_iocb siocb;
697 int ret;
698
89bddce5 699 init_sync_kiocb(&iocb, NULL);
1da177e4
LT
700 iocb.private = &siocb;
701 ret = __sock_recvmsg(&iocb, sock, msg, size, flags);
702 if (-EIOCBQUEUED == ret)
703 ret = wait_on_sync_kiocb(&iocb);
704 return ret;
705}
706
89bddce5
SH
707int kernel_recvmsg(struct socket *sock, struct msghdr *msg,
708 struct kvec *vec, size_t num, size_t size, int flags)
1da177e4
LT
709{
710 mm_segment_t oldfs = get_fs();
711 int result;
712
713 set_fs(KERNEL_DS);
714 /*
715 * the following is safe, since for compiler definitions of kvec and
716 * iovec are identical, yielding the same in-core layout and alignment
717 */
89bddce5 718 msg->msg_iov = (struct iovec *)vec, msg->msg_iovlen = num;
1da177e4
LT
719 result = sock_recvmsg(sock, msg, size, flags);
720 set_fs(oldfs);
721 return result;
722}
723
724static void sock_aio_dtor(struct kiocb *iocb)
725{
726 kfree(iocb->private);
727}
728
ce1d4d3e
CH
729static ssize_t sock_sendpage(struct file *file, struct page *page,
730 int offset, size_t size, loff_t *ppos, int more)
1da177e4 731{
1da177e4
LT
732 struct socket *sock;
733 int flags;
734
ce1d4d3e
CH
735 sock = file->private_data;
736
737 flags = !(file->f_flags & O_NONBLOCK) ? 0 : MSG_DONTWAIT;
738 if (more)
739 flags |= MSG_MORE;
740
741 return sock->ops->sendpage(sock, page, offset, size, flags);
742}
1da177e4 743
9c55e01c
JA
744static ssize_t sock_splice_read(struct file *file, loff_t *ppos,
745 struct pipe_inode_info *pipe, size_t len,
746 unsigned int flags)
747{
748 struct socket *sock = file->private_data;
749
997b37da
RDC
750 if (unlikely(!sock->ops->splice_read))
751 return -EINVAL;
752
9c55e01c
JA
753 return sock->ops->splice_read(sock, ppos, pipe, len, flags);
754}
755
ce1d4d3e 756static struct sock_iocb *alloc_sock_iocb(struct kiocb *iocb,
89bddce5 757 struct sock_iocb *siocb)
ce1d4d3e
CH
758{
759 if (!is_sync_kiocb(iocb)) {
760 siocb = kmalloc(sizeof(*siocb), GFP_KERNEL);
761 if (!siocb)
762 return NULL;
1da177e4
LT
763 iocb->ki_dtor = sock_aio_dtor;
764 }
1da177e4 765
ce1d4d3e 766 siocb->kiocb = iocb;
ce1d4d3e
CH
767 iocb->private = siocb;
768 return siocb;
1da177e4
LT
769}
770
ce1d4d3e 771static ssize_t do_sock_read(struct msghdr *msg, struct kiocb *iocb,
027445c3
BP
772 struct file *file, const struct iovec *iov,
773 unsigned long nr_segs)
ce1d4d3e
CH
774{
775 struct socket *sock = file->private_data;
776 size_t size = 0;
777 int i;
1da177e4 778
89bddce5
SH
779 for (i = 0; i < nr_segs; i++)
780 size += iov[i].iov_len;
1da177e4 781
ce1d4d3e
CH
782 msg->msg_name = NULL;
783 msg->msg_namelen = 0;
784 msg->msg_control = NULL;
785 msg->msg_controllen = 0;
89bddce5 786 msg->msg_iov = (struct iovec *)iov;
ce1d4d3e
CH
787 msg->msg_iovlen = nr_segs;
788 msg->msg_flags = (file->f_flags & O_NONBLOCK) ? MSG_DONTWAIT : 0;
789
790 return __sock_recvmsg(iocb, sock, msg, size, msg->msg_flags);
791}
792
027445c3
BP
793static ssize_t sock_aio_read(struct kiocb *iocb, const struct iovec *iov,
794 unsigned long nr_segs, loff_t pos)
ce1d4d3e
CH
795{
796 struct sock_iocb siocb, *x;
797
1da177e4
LT
798 if (pos != 0)
799 return -ESPIPE;
027445c3
BP
800
801 if (iocb->ki_left == 0) /* Match SYS5 behaviour */
1da177e4
LT
802 return 0;
803
027445c3
BP
804
805 x = alloc_sock_iocb(iocb, &siocb);
ce1d4d3e
CH
806 if (!x)
807 return -ENOMEM;
027445c3 808 return do_sock_read(&x->async_msg, iocb, iocb->ki_filp, iov, nr_segs);
1da177e4
LT
809}
810
ce1d4d3e 811static ssize_t do_sock_write(struct msghdr *msg, struct kiocb *iocb,
027445c3
BP
812 struct file *file, const struct iovec *iov,
813 unsigned long nr_segs)
1da177e4 814{
ce1d4d3e
CH
815 struct socket *sock = file->private_data;
816 size_t size = 0;
817 int i;
1da177e4 818
89bddce5
SH
819 for (i = 0; i < nr_segs; i++)
820 size += iov[i].iov_len;
1da177e4 821
ce1d4d3e
CH
822 msg->msg_name = NULL;
823 msg->msg_namelen = 0;
824 msg->msg_control = NULL;
825 msg->msg_controllen = 0;
89bddce5 826 msg->msg_iov = (struct iovec *)iov;
ce1d4d3e
CH
827 msg->msg_iovlen = nr_segs;
828 msg->msg_flags = (file->f_flags & O_NONBLOCK) ? MSG_DONTWAIT : 0;
829 if (sock->type == SOCK_SEQPACKET)
830 msg->msg_flags |= MSG_EOR;
1da177e4 831
ce1d4d3e 832 return __sock_sendmsg(iocb, sock, msg, size);
1da177e4
LT
833}
834
027445c3
BP
835static ssize_t sock_aio_write(struct kiocb *iocb, const struct iovec *iov,
836 unsigned long nr_segs, loff_t pos)
ce1d4d3e
CH
837{
838 struct sock_iocb siocb, *x;
1da177e4 839
ce1d4d3e
CH
840 if (pos != 0)
841 return -ESPIPE;
027445c3 842
027445c3 843 x = alloc_sock_iocb(iocb, &siocb);
ce1d4d3e
CH
844 if (!x)
845 return -ENOMEM;
1da177e4 846
027445c3 847 return do_sock_write(&x->async_msg, iocb, iocb->ki_filp, iov, nr_segs);
1da177e4
LT
848}
849
1da177e4
LT
850/*
851 * Atomic setting of ioctl hooks to avoid race
852 * with module unload.
853 */
854
4a3e2f71 855static DEFINE_MUTEX(br_ioctl_mutex);
881d966b 856static int (*br_ioctl_hook) (struct net *, unsigned int cmd, void __user *arg) = NULL;
1da177e4 857
881d966b 858void brioctl_set(int (*hook) (struct net *, unsigned int, void __user *))
1da177e4 859{
4a3e2f71 860 mutex_lock(&br_ioctl_mutex);
1da177e4 861 br_ioctl_hook = hook;
4a3e2f71 862 mutex_unlock(&br_ioctl_mutex);
1da177e4 863}
89bddce5 864
1da177e4
LT
865EXPORT_SYMBOL(brioctl_set);
866
4a3e2f71 867static DEFINE_MUTEX(vlan_ioctl_mutex);
881d966b 868static int (*vlan_ioctl_hook) (struct net *, void __user *arg);
1da177e4 869
881d966b 870void vlan_ioctl_set(int (*hook) (struct net *, void __user *))
1da177e4 871{
4a3e2f71 872 mutex_lock(&vlan_ioctl_mutex);
1da177e4 873 vlan_ioctl_hook = hook;
4a3e2f71 874 mutex_unlock(&vlan_ioctl_mutex);
1da177e4 875}
89bddce5 876
1da177e4
LT
877EXPORT_SYMBOL(vlan_ioctl_set);
878
4a3e2f71 879static DEFINE_MUTEX(dlci_ioctl_mutex);
89bddce5 880static int (*dlci_ioctl_hook) (unsigned int, void __user *);
1da177e4 881
89bddce5 882void dlci_ioctl_set(int (*hook) (unsigned int, void __user *))
1da177e4 883{
4a3e2f71 884 mutex_lock(&dlci_ioctl_mutex);
1da177e4 885 dlci_ioctl_hook = hook;
4a3e2f71 886 mutex_unlock(&dlci_ioctl_mutex);
1da177e4 887}
89bddce5 888
1da177e4
LT
889EXPORT_SYMBOL(dlci_ioctl_set);
890
891/*
892 * With an ioctl, arg may well be a user mode pointer, but we don't know
893 * what to do with it - that's up to the protocol still.
894 */
895
896static long sock_ioctl(struct file *file, unsigned cmd, unsigned long arg)
897{
898 struct socket *sock;
881d966b 899 struct sock *sk;
1da177e4
LT
900 void __user *argp = (void __user *)arg;
901 int pid, err;
881d966b 902 struct net *net;
1da177e4 903
b69aee04 904 sock = file->private_data;
881d966b 905 sk = sock->sk;
3b1e0a65 906 net = sock_net(sk);
1da177e4 907 if (cmd >= SIOCDEVPRIVATE && cmd <= (SIOCDEVPRIVATE + 15)) {
881d966b 908 err = dev_ioctl(net, cmd, argp);
1da177e4 909 } else
d86b5e0e 910#ifdef CONFIG_WIRELESS_EXT
1da177e4 911 if (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST) {
881d966b 912 err = dev_ioctl(net, cmd, argp);
1da177e4 913 } else
89bddce5
SH
914#endif /* CONFIG_WIRELESS_EXT */
915 switch (cmd) {
1da177e4
LT
916 case FIOSETOWN:
917 case SIOCSPGRP:
918 err = -EFAULT;
919 if (get_user(pid, (int __user *)argp))
920 break;
921 err = f_setown(sock->file, pid, 1);
922 break;
923 case FIOGETOWN:
924 case SIOCGPGRP:
609d7fa9 925 err = put_user(f_getown(sock->file),
89bddce5 926 (int __user *)argp);
1da177e4
LT
927 break;
928 case SIOCGIFBR:
929 case SIOCSIFBR:
930 case SIOCBRADDBR:
931 case SIOCBRDELBR:
932 err = -ENOPKG;
933 if (!br_ioctl_hook)
934 request_module("bridge");
935
4a3e2f71 936 mutex_lock(&br_ioctl_mutex);
89bddce5 937 if (br_ioctl_hook)
881d966b 938 err = br_ioctl_hook(net, cmd, argp);
4a3e2f71 939 mutex_unlock(&br_ioctl_mutex);
1da177e4
LT
940 break;
941 case SIOCGIFVLAN:
942 case SIOCSIFVLAN:
943 err = -ENOPKG;
944 if (!vlan_ioctl_hook)
945 request_module("8021q");
946
4a3e2f71 947 mutex_lock(&vlan_ioctl_mutex);
1da177e4 948 if (vlan_ioctl_hook)
881d966b 949 err = vlan_ioctl_hook(net, argp);
4a3e2f71 950 mutex_unlock(&vlan_ioctl_mutex);
1da177e4 951 break;
1da177e4
LT
952 case SIOCADDDLCI:
953 case SIOCDELDLCI:
954 err = -ENOPKG;
955 if (!dlci_ioctl_hook)
956 request_module("dlci");
957
7512cbf6
PE
958 mutex_lock(&dlci_ioctl_mutex);
959 if (dlci_ioctl_hook)
1da177e4 960 err = dlci_ioctl_hook(cmd, argp);
7512cbf6 961 mutex_unlock(&dlci_ioctl_mutex);
1da177e4
LT
962 break;
963 default:
964 err = sock->ops->ioctl(sock, cmd, arg);
b5e5fa5e
CH
965
966 /*
967 * If this ioctl is unknown try to hand it down
968 * to the NIC driver.
969 */
970 if (err == -ENOIOCTLCMD)
881d966b 971 err = dev_ioctl(net, cmd, argp);
1da177e4 972 break;
89bddce5 973 }
1da177e4
LT
974 return err;
975}
976
977int sock_create_lite(int family, int type, int protocol, struct socket **res)
978{
979 int err;
980 struct socket *sock = NULL;
89bddce5 981
1da177e4
LT
982 err = security_socket_create(family, type, protocol, 1);
983 if (err)
984 goto out;
985
986 sock = sock_alloc();
987 if (!sock) {
988 err = -ENOMEM;
989 goto out;
990 }
991
1da177e4 992 sock->type = type;
7420ed23
VY
993 err = security_socket_post_create(sock, family, type, protocol, 1);
994 if (err)
995 goto out_release;
996
1da177e4
LT
997out:
998 *res = sock;
999 return err;
7420ed23
VY
1000out_release:
1001 sock_release(sock);
1002 sock = NULL;
1003 goto out;
1da177e4
LT
1004}
1005
1006/* No kernel lock held - perfect */
89bddce5 1007static unsigned int sock_poll(struct file *file, poll_table *wait)
1da177e4
LT
1008{
1009 struct socket *sock;
1010
1011 /*
89bddce5 1012 * We can't return errors to poll, so it's either yes or no.
1da177e4 1013 */
b69aee04 1014 sock = file->private_data;
1da177e4
LT
1015 return sock->ops->poll(file, sock, wait);
1016}
1017
89bddce5 1018static int sock_mmap(struct file *file, struct vm_area_struct *vma)
1da177e4 1019{
b69aee04 1020 struct socket *sock = file->private_data;
1da177e4
LT
1021
1022 return sock->ops->mmap(file, sock, vma);
1023}
1024
20380731 1025static int sock_close(struct inode *inode, struct file *filp)
1da177e4
LT
1026{
1027 /*
89bddce5
SH
1028 * It was possible the inode is NULL we were
1029 * closing an unfinished socket.
1da177e4
LT
1030 */
1031
89bddce5 1032 if (!inode) {
1da177e4
LT
1033 printk(KERN_DEBUG "sock_close: NULL inode\n");
1034 return 0;
1035 }
1da177e4
LT
1036 sock_release(SOCKET_I(inode));
1037 return 0;
1038}
1039
1040/*
1041 * Update the socket async list
1042 *
1043 * Fasync_list locking strategy.
1044 *
1045 * 1. fasync_list is modified only under process context socket lock
1046 * i.e. under semaphore.
1047 * 2. fasync_list is used under read_lock(&sk->sk_callback_lock)
1048 * or under socket lock.
1049 * 3. fasync_list can be used from softirq context, so that
1050 * modification under socket lock have to be enhanced with
1051 * write_lock_bh(&sk->sk_callback_lock).
1052 * --ANK (990710)
1053 */
1054
1055static int sock_fasync(int fd, struct file *filp, int on)
1056{
89bddce5 1057 struct fasync_struct *fa, *fna = NULL, **prev;
1da177e4
LT
1058 struct socket *sock;
1059 struct sock *sk;
1060
89bddce5 1061 if (on) {
8b3a7005 1062 fna = kmalloc(sizeof(struct fasync_struct), GFP_KERNEL);
89bddce5 1063 if (fna == NULL)
1da177e4
LT
1064 return -ENOMEM;
1065 }
1066
b69aee04 1067 sock = filp->private_data;
1da177e4 1068
89bddce5
SH
1069 sk = sock->sk;
1070 if (sk == NULL) {
1da177e4
LT
1071 kfree(fna);
1072 return -EINVAL;
1073 }
1074
1075 lock_sock(sk);
1076
76398425
JC
1077 spin_lock(&filp->f_lock);
1078 if (on)
1079 filp->f_flags |= FASYNC;
1080 else
1081 filp->f_flags &= ~FASYNC;
1082 spin_unlock(&filp->f_lock);
1083
89bddce5 1084 prev = &(sock->fasync_list);
1da177e4 1085
89bddce5
SH
1086 for (fa = *prev; fa != NULL; prev = &fa->fa_next, fa = *prev)
1087 if (fa->fa_file == filp)
1da177e4
LT
1088 break;
1089
89bddce5
SH
1090 if (on) {
1091 if (fa != NULL) {
1da177e4 1092 write_lock_bh(&sk->sk_callback_lock);
89bddce5 1093 fa->fa_fd = fd;
1da177e4
LT
1094 write_unlock_bh(&sk->sk_callback_lock);
1095
1096 kfree(fna);
1097 goto out;
1098 }
89bddce5
SH
1099 fna->fa_file = filp;
1100 fna->fa_fd = fd;
1101 fna->magic = FASYNC_MAGIC;
1102 fna->fa_next = sock->fasync_list;
1da177e4 1103 write_lock_bh(&sk->sk_callback_lock);
89bddce5 1104 sock->fasync_list = fna;
1da177e4 1105 write_unlock_bh(&sk->sk_callback_lock);
89bddce5
SH
1106 } else {
1107 if (fa != NULL) {
1da177e4 1108 write_lock_bh(&sk->sk_callback_lock);
89bddce5 1109 *prev = fa->fa_next;
1da177e4
LT
1110 write_unlock_bh(&sk->sk_callback_lock);
1111 kfree(fa);
1112 }
1113 }
1114
1115out:
1116 release_sock(sock->sk);
1117 return 0;
1118}
1119
1120/* This function may be called only under socket lock or callback_lock */
1121
1122int sock_wake_async(struct socket *sock, int how, int band)
1123{
1124 if (!sock || !sock->fasync_list)
1125 return -1;
89bddce5 1126 switch (how) {
8d8ad9d7 1127 case SOCK_WAKE_WAITD:
1da177e4
LT
1128 if (test_bit(SOCK_ASYNC_WAITDATA, &sock->flags))
1129 break;
1130 goto call_kill;
8d8ad9d7 1131 case SOCK_WAKE_SPACE:
1da177e4
LT
1132 if (!test_and_clear_bit(SOCK_ASYNC_NOSPACE, &sock->flags))
1133 break;
1134 /* fall through */
8d8ad9d7 1135 case SOCK_WAKE_IO:
89bddce5 1136call_kill:
1da177e4
LT
1137 __kill_fasync(sock->fasync_list, SIGIO, band);
1138 break;
8d8ad9d7 1139 case SOCK_WAKE_URG:
1da177e4
LT
1140 __kill_fasync(sock->fasync_list, SIGURG, band);
1141 }
1142 return 0;
1143}
1144
1b8d7ae4 1145static int __sock_create(struct net *net, int family, int type, int protocol,
89bddce5 1146 struct socket **res, int kern)
1da177e4
LT
1147{
1148 int err;
1149 struct socket *sock;
55737fda 1150 const struct net_proto_family *pf;
1da177e4
LT
1151
1152 /*
89bddce5 1153 * Check protocol is in range
1da177e4
LT
1154 */
1155 if (family < 0 || family >= NPROTO)
1156 return -EAFNOSUPPORT;
1157 if (type < 0 || type >= SOCK_MAX)
1158 return -EINVAL;
1159
1160 /* Compatibility.
1161
1162 This uglymoron is moved from INET layer to here to avoid
1163 deadlock in module load.
1164 */
1165 if (family == PF_INET && type == SOCK_PACKET) {
89bddce5 1166 static int warned;
1da177e4
LT
1167 if (!warned) {
1168 warned = 1;
89bddce5
SH
1169 printk(KERN_INFO "%s uses obsolete (PF_INET,SOCK_PACKET)\n",
1170 current->comm);
1da177e4
LT
1171 }
1172 family = PF_PACKET;
1173 }
1174
1175 err = security_socket_create(family, type, protocol, kern);
1176 if (err)
1177 return err;
89bddce5 1178
55737fda
SH
1179 /*
1180 * Allocate the socket and allow the family to set things up. if
1181 * the protocol is 0, the family is instructed to select an appropriate
1182 * default.
1183 */
1184 sock = sock_alloc();
1185 if (!sock) {
1186 if (net_ratelimit())
1187 printk(KERN_WARNING "socket: no more sockets\n");
1188 return -ENFILE; /* Not exactly a match, but its the
1189 closest posix thing */
1190 }
1191
1192 sock->type = type;
1193
95a5afca 1194#ifdef CONFIG_MODULES
89bddce5
SH
1195 /* Attempt to load a protocol module if the find failed.
1196 *
1197 * 12/09/1996 Marcin: But! this makes REALLY only sense, if the user
1da177e4
LT
1198 * requested real, full-featured networking support upon configuration.
1199 * Otherwise module support will break!
1200 */
55737fda 1201 if (net_families[family] == NULL)
89bddce5 1202 request_module("net-pf-%d", family);
1da177e4
LT
1203#endif
1204
55737fda
SH
1205 rcu_read_lock();
1206 pf = rcu_dereference(net_families[family]);
1207 err = -EAFNOSUPPORT;
1208 if (!pf)
1209 goto out_release;
1da177e4
LT
1210
1211 /*
1212 * We will call the ->create function, that possibly is in a loadable
1213 * module, so we have to bump that loadable module refcnt first.
1214 */
55737fda 1215 if (!try_module_get(pf->owner))
1da177e4
LT
1216 goto out_release;
1217
55737fda
SH
1218 /* Now protected by module ref count */
1219 rcu_read_unlock();
1220
1b8d7ae4 1221 err = pf->create(net, sock, protocol);
55737fda 1222 if (err < 0)
1da177e4 1223 goto out_module_put;
a79af59e 1224
1da177e4
LT
1225 /*
1226 * Now to bump the refcnt of the [loadable] module that owns this
1227 * socket at sock_release time we decrement its refcnt.
1228 */
55737fda
SH
1229 if (!try_module_get(sock->ops->owner))
1230 goto out_module_busy;
1231
1da177e4
LT
1232 /*
1233 * Now that we're done with the ->create function, the [loadable]
1234 * module can have its refcnt decremented
1235 */
55737fda 1236 module_put(pf->owner);
7420ed23
VY
1237 err = security_socket_post_create(sock, family, type, protocol, kern);
1238 if (err)
3b185525 1239 goto out_sock_release;
55737fda 1240 *res = sock;
1da177e4 1241
55737fda
SH
1242 return 0;
1243
1244out_module_busy:
1245 err = -EAFNOSUPPORT;
1da177e4 1246out_module_put:
55737fda
SH
1247 sock->ops = NULL;
1248 module_put(pf->owner);
1249out_sock_release:
1da177e4 1250 sock_release(sock);
55737fda
SH
1251 return err;
1252
1253out_release:
1254 rcu_read_unlock();
1255 goto out_sock_release;
1da177e4
LT
1256}
1257
1258int sock_create(int family, int type, int protocol, struct socket **res)
1259{
1b8d7ae4 1260 return __sock_create(current->nsproxy->net_ns, family, type, protocol, res, 0);
1da177e4
LT
1261}
1262
1263int sock_create_kern(int family, int type, int protocol, struct socket **res)
1264{
1b8d7ae4 1265 return __sock_create(&init_net, family, type, protocol, res, 1);
1da177e4
LT
1266}
1267
3e0fa65f 1268SYSCALL_DEFINE3(socket, int, family, int, type, int, protocol)
1da177e4
LT
1269{
1270 int retval;
1271 struct socket *sock;
a677a039
UD
1272 int flags;
1273
e38b36f3
UD
1274 /* Check the SOCK_* constants for consistency. */
1275 BUILD_BUG_ON(SOCK_CLOEXEC != O_CLOEXEC);
1276 BUILD_BUG_ON((SOCK_MAX | SOCK_TYPE_MASK) != SOCK_TYPE_MASK);
1277 BUILD_BUG_ON(SOCK_CLOEXEC & SOCK_TYPE_MASK);
1278 BUILD_BUG_ON(SOCK_NONBLOCK & SOCK_TYPE_MASK);
1279
a677a039 1280 flags = type & ~SOCK_TYPE_MASK;
77d27200 1281 if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
a677a039
UD
1282 return -EINVAL;
1283 type &= SOCK_TYPE_MASK;
1da177e4 1284
aaca0bdc
UD
1285 if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
1286 flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
1287
1da177e4
LT
1288 retval = sock_create(family, type, protocol, &sock);
1289 if (retval < 0)
1290 goto out;
1291
77d27200 1292 retval = sock_map_fd(sock, flags & (O_CLOEXEC | O_NONBLOCK));
1da177e4
LT
1293 if (retval < 0)
1294 goto out_release;
1295
1296out:
1297 /* It may be already another descriptor 8) Not kernel problem. */
1298 return retval;
1299
1300out_release:
1301 sock_release(sock);
1302 return retval;
1303}
1304
1305/*
1306 * Create a pair of connected sockets.
1307 */
1308
3e0fa65f
HC
1309SYSCALL_DEFINE4(socketpair, int, family, int, type, int, protocol,
1310 int __user *, usockvec)
1da177e4
LT
1311{
1312 struct socket *sock1, *sock2;
1313 int fd1, fd2, err;
db349509 1314 struct file *newfile1, *newfile2;
a677a039
UD
1315 int flags;
1316
1317 flags = type & ~SOCK_TYPE_MASK;
77d27200 1318 if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
a677a039
UD
1319 return -EINVAL;
1320 type &= SOCK_TYPE_MASK;
1da177e4 1321
aaca0bdc
UD
1322 if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
1323 flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
1324
1da177e4
LT
1325 /*
1326 * Obtain the first socket and check if the underlying protocol
1327 * supports the socketpair call.
1328 */
1329
1330 err = sock_create(family, type, protocol, &sock1);
1331 if (err < 0)
1332 goto out;
1333
1334 err = sock_create(family, type, protocol, &sock2);
1335 if (err < 0)
1336 goto out_release_1;
1337
1338 err = sock1->ops->socketpair(sock1, sock2);
89bddce5 1339 if (err < 0)
1da177e4
LT
1340 goto out_release_both;
1341
a677a039 1342 fd1 = sock_alloc_fd(&newfile1, flags & O_CLOEXEC);
bf3c23d1
DM
1343 if (unlikely(fd1 < 0)) {
1344 err = fd1;
db349509 1345 goto out_release_both;
bf3c23d1 1346 }
1da177e4 1347
a677a039 1348 fd2 = sock_alloc_fd(&newfile2, flags & O_CLOEXEC);
db349509 1349 if (unlikely(fd2 < 0)) {
bf3c23d1 1350 err = fd2;
db349509
AV
1351 put_filp(newfile1);
1352 put_unused_fd(fd1);
1da177e4 1353 goto out_release_both;
db349509 1354 }
1da177e4 1355
77d27200 1356 err = sock_attach_fd(sock1, newfile1, flags & O_NONBLOCK);
db349509
AV
1357 if (unlikely(err < 0)) {
1358 goto out_fd2;
1359 }
1360
77d27200 1361 err = sock_attach_fd(sock2, newfile2, flags & O_NONBLOCK);
db349509
AV
1362 if (unlikely(err < 0)) {
1363 fput(newfile1);
1364 goto out_fd1;
1365 }
1366
157cf649 1367 audit_fd_pair(fd1, fd2);
db349509
AV
1368 fd_install(fd1, newfile1);
1369 fd_install(fd2, newfile2);
1da177e4
LT
1370 /* fd1 and fd2 may be already another descriptors.
1371 * Not kernel problem.
1372 */
1373
89bddce5 1374 err = put_user(fd1, &usockvec[0]);
1da177e4
LT
1375 if (!err)
1376 err = put_user(fd2, &usockvec[1]);
1377 if (!err)
1378 return 0;
1379
1380 sys_close(fd2);
1381 sys_close(fd1);
1382 return err;
1383
1da177e4 1384out_release_both:
89bddce5 1385 sock_release(sock2);
1da177e4 1386out_release_1:
89bddce5 1387 sock_release(sock1);
1da177e4
LT
1388out:
1389 return err;
db349509
AV
1390
1391out_fd2:
1392 put_filp(newfile1);
1393 sock_release(sock1);
1394out_fd1:
1395 put_filp(newfile2);
1396 sock_release(sock2);
db349509
AV
1397 put_unused_fd(fd1);
1398 put_unused_fd(fd2);
1399 goto out;
1da177e4
LT
1400}
1401
1da177e4
LT
1402/*
1403 * Bind a name to a socket. Nothing much to do here since it's
1404 * the protocol's responsibility to handle the local address.
1405 *
1406 * We move the socket address to kernel space before we call
1407 * the protocol layer (having also checked the address is ok).
1408 */
1409
20f37034 1410SYSCALL_DEFINE3(bind, int, fd, struct sockaddr __user *, umyaddr, int, addrlen)
1da177e4
LT
1411{
1412 struct socket *sock;
230b1839 1413 struct sockaddr_storage address;
6cb153ca 1414 int err, fput_needed;
1da177e4 1415
89bddce5 1416 sock = sockfd_lookup_light(fd, &err, &fput_needed);
e71a4783 1417 if (sock) {
230b1839 1418 err = move_addr_to_kernel(umyaddr, addrlen, (struct sockaddr *)&address);
89bddce5
SH
1419 if (err >= 0) {
1420 err = security_socket_bind(sock,
230b1839 1421 (struct sockaddr *)&address,
89bddce5 1422 addrlen);
6cb153ca
BL
1423 if (!err)
1424 err = sock->ops->bind(sock,
89bddce5 1425 (struct sockaddr *)
230b1839 1426 &address, addrlen);
1da177e4 1427 }
6cb153ca 1428 fput_light(sock->file, fput_needed);
89bddce5 1429 }
1da177e4
LT
1430 return err;
1431}
1432
1da177e4
LT
1433/*
1434 * Perform a listen. Basically, we allow the protocol to do anything
1435 * necessary for a listen, and if that works, we mark the socket as
1436 * ready for listening.
1437 */
1438
3e0fa65f 1439SYSCALL_DEFINE2(listen, int, fd, int, backlog)
1da177e4
LT
1440{
1441 struct socket *sock;
6cb153ca 1442 int err, fput_needed;
b8e1f9b5 1443 int somaxconn;
89bddce5
SH
1444
1445 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1446 if (sock) {
8efa6e93 1447 somaxconn = sock_net(sock->sk)->core.sysctl_somaxconn;
b8e1f9b5
PE
1448 if ((unsigned)backlog > somaxconn)
1449 backlog = somaxconn;
1da177e4
LT
1450
1451 err = security_socket_listen(sock, backlog);
6cb153ca
BL
1452 if (!err)
1453 err = sock->ops->listen(sock, backlog);
1da177e4 1454
6cb153ca 1455 fput_light(sock->file, fput_needed);
1da177e4
LT
1456 }
1457 return err;
1458}
1459
1da177e4
LT
1460/*
1461 * For accept, we attempt to create a new socket, set up the link
1462 * with the client, wake up the client, then return the new
1463 * connected fd. We collect the address of the connector in kernel
1464 * space and move it to user at the very end. This is unclean because
1465 * we open the socket then return an error.
1466 *
1467 * 1003.1g adds the ability to recvmsg() to query connection pending
1468 * status to recvmsg. We need to add that support in a way thats
1469 * clean when we restucture accept also.
1470 */
1471
20f37034
HC
1472SYSCALL_DEFINE4(accept4, int, fd, struct sockaddr __user *, upeer_sockaddr,
1473 int __user *, upeer_addrlen, int, flags)
1da177e4
LT
1474{
1475 struct socket *sock, *newsock;
39d8c1b6 1476 struct file *newfile;
6cb153ca 1477 int err, len, newfd, fput_needed;
230b1839 1478 struct sockaddr_storage address;
1da177e4 1479
77d27200 1480 if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
aaca0bdc
UD
1481 return -EINVAL;
1482
1483 if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
1484 flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
1485
6cb153ca 1486 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4
LT
1487 if (!sock)
1488 goto out;
1489
1490 err = -ENFILE;
89bddce5 1491 if (!(newsock = sock_alloc()))
1da177e4
LT
1492 goto out_put;
1493
1494 newsock->type = sock->type;
1495 newsock->ops = sock->ops;
1496
1da177e4
LT
1497 /*
1498 * We don't need try_module_get here, as the listening socket (sock)
1499 * has the protocol module (sock->ops->owner) held.
1500 */
1501 __module_get(newsock->ops->owner);
1502
aaca0bdc 1503 newfd = sock_alloc_fd(&newfile, flags & O_CLOEXEC);
39d8c1b6
DM
1504 if (unlikely(newfd < 0)) {
1505 err = newfd;
9a1875e6
DM
1506 sock_release(newsock);
1507 goto out_put;
39d8c1b6
DM
1508 }
1509
77d27200 1510 err = sock_attach_fd(newsock, newfile, flags & O_NONBLOCK);
39d8c1b6 1511 if (err < 0)
79f4f642 1512 goto out_fd_simple;
39d8c1b6 1513
a79af59e
FF
1514 err = security_socket_accept(sock, newsock);
1515 if (err)
39d8c1b6 1516 goto out_fd;
a79af59e 1517
1da177e4
LT
1518 err = sock->ops->accept(sock, newsock, sock->file->f_flags);
1519 if (err < 0)
39d8c1b6 1520 goto out_fd;
1da177e4
LT
1521
1522 if (upeer_sockaddr) {
230b1839 1523 if (newsock->ops->getname(newsock, (struct sockaddr *)&address,
89bddce5 1524 &len, 2) < 0) {
1da177e4 1525 err = -ECONNABORTED;
39d8c1b6 1526 goto out_fd;
1da177e4 1527 }
230b1839
YH
1528 err = move_addr_to_user((struct sockaddr *)&address,
1529 len, upeer_sockaddr, upeer_addrlen);
1da177e4 1530 if (err < 0)
39d8c1b6 1531 goto out_fd;
1da177e4
LT
1532 }
1533
1534 /* File flags are not inherited via accept() unlike another OSes. */
1535
39d8c1b6
DM
1536 fd_install(newfd, newfile);
1537 err = newfd;
1da177e4
LT
1538
1539 security_socket_post_accept(sock, newsock);
1540
1541out_put:
6cb153ca 1542 fput_light(sock->file, fput_needed);
1da177e4
LT
1543out:
1544 return err;
79f4f642
AD
1545out_fd_simple:
1546 sock_release(newsock);
1547 put_filp(newfile);
1548 put_unused_fd(newfd);
1549 goto out_put;
39d8c1b6 1550out_fd:
9606a216 1551 fput(newfile);
39d8c1b6 1552 put_unused_fd(newfd);
1da177e4
LT
1553 goto out_put;
1554}
1555
20f37034
HC
1556SYSCALL_DEFINE3(accept, int, fd, struct sockaddr __user *, upeer_sockaddr,
1557 int __user *, upeer_addrlen)
aaca0bdc 1558{
de11defe 1559 return sys_accept4(fd, upeer_sockaddr, upeer_addrlen, 0);
aaca0bdc
UD
1560}
1561
1da177e4
LT
1562/*
1563 * Attempt to connect to a socket with the server address. The address
1564 * is in user space so we verify it is OK and move it to kernel space.
1565 *
1566 * For 1003.1g we need to add clean support for a bind to AF_UNSPEC to
1567 * break bindings
1568 *
1569 * NOTE: 1003.1g draft 6.3 is broken with respect to AX.25/NetROM and
1570 * other SEQPACKET protocols that take time to connect() as it doesn't
1571 * include the -EINPROGRESS status for such sockets.
1572 */
1573
20f37034
HC
1574SYSCALL_DEFINE3(connect, int, fd, struct sockaddr __user *, uservaddr,
1575 int, addrlen)
1da177e4
LT
1576{
1577 struct socket *sock;
230b1839 1578 struct sockaddr_storage address;
6cb153ca 1579 int err, fput_needed;
1da177e4 1580
6cb153ca 1581 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4
LT
1582 if (!sock)
1583 goto out;
230b1839 1584 err = move_addr_to_kernel(uservaddr, addrlen, (struct sockaddr *)&address);
1da177e4
LT
1585 if (err < 0)
1586 goto out_put;
1587
89bddce5 1588 err =
230b1839 1589 security_socket_connect(sock, (struct sockaddr *)&address, addrlen);
1da177e4
LT
1590 if (err)
1591 goto out_put;
1592
230b1839 1593 err = sock->ops->connect(sock, (struct sockaddr *)&address, addrlen,
1da177e4
LT
1594 sock->file->f_flags);
1595out_put:
6cb153ca 1596 fput_light(sock->file, fput_needed);
1da177e4
LT
1597out:
1598 return err;
1599}
1600
1601/*
1602 * Get the local address ('name') of a socket object. Move the obtained
1603 * name to user space.
1604 */
1605
20f37034
HC
1606SYSCALL_DEFINE3(getsockname, int, fd, struct sockaddr __user *, usockaddr,
1607 int __user *, usockaddr_len)
1da177e4
LT
1608{
1609 struct socket *sock;
230b1839 1610 struct sockaddr_storage address;
6cb153ca 1611 int len, err, fput_needed;
89bddce5 1612
6cb153ca 1613 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4
LT
1614 if (!sock)
1615 goto out;
1616
1617 err = security_socket_getsockname(sock);
1618 if (err)
1619 goto out_put;
1620
230b1839 1621 err = sock->ops->getname(sock, (struct sockaddr *)&address, &len, 0);
1da177e4
LT
1622 if (err)
1623 goto out_put;
230b1839 1624 err = move_addr_to_user((struct sockaddr *)&address, len, usockaddr, usockaddr_len);
1da177e4
LT
1625
1626out_put:
6cb153ca 1627 fput_light(sock->file, fput_needed);
1da177e4
LT
1628out:
1629 return err;
1630}
1631
1632/*
1633 * Get the remote address ('name') of a socket object. Move the obtained
1634 * name to user space.
1635 */
1636
20f37034
HC
1637SYSCALL_DEFINE3(getpeername, int, fd, struct sockaddr __user *, usockaddr,
1638 int __user *, usockaddr_len)
1da177e4
LT
1639{
1640 struct socket *sock;
230b1839 1641 struct sockaddr_storage address;
6cb153ca 1642 int len, err, fput_needed;
1da177e4 1643
89bddce5
SH
1644 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1645 if (sock != NULL) {
1da177e4
LT
1646 err = security_socket_getpeername(sock);
1647 if (err) {
6cb153ca 1648 fput_light(sock->file, fput_needed);
1da177e4
LT
1649 return err;
1650 }
1651
89bddce5 1652 err =
230b1839 1653 sock->ops->getname(sock, (struct sockaddr *)&address, &len,
89bddce5 1654 1);
1da177e4 1655 if (!err)
230b1839 1656 err = move_addr_to_user((struct sockaddr *)&address, len, usockaddr,
89bddce5 1657 usockaddr_len);
6cb153ca 1658 fput_light(sock->file, fput_needed);
1da177e4
LT
1659 }
1660 return err;
1661}
1662
1663/*
1664 * Send a datagram to a given address. We move the address into kernel
1665 * space and check the user space data area is readable before invoking
1666 * the protocol.
1667 */
1668
3e0fa65f
HC
1669SYSCALL_DEFINE6(sendto, int, fd, void __user *, buff, size_t, len,
1670 unsigned, flags, struct sockaddr __user *, addr,
1671 int, addr_len)
1da177e4
LT
1672{
1673 struct socket *sock;
230b1839 1674 struct sockaddr_storage address;
1da177e4
LT
1675 int err;
1676 struct msghdr msg;
1677 struct iovec iov;
6cb153ca 1678 int fput_needed;
6cb153ca 1679
de0fa95c
PE
1680 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1681 if (!sock)
4387ff75 1682 goto out;
6cb153ca 1683
89bddce5
SH
1684 iov.iov_base = buff;
1685 iov.iov_len = len;
1686 msg.msg_name = NULL;
1687 msg.msg_iov = &iov;
1688 msg.msg_iovlen = 1;
1689 msg.msg_control = NULL;
1690 msg.msg_controllen = 0;
1691 msg.msg_namelen = 0;
6cb153ca 1692 if (addr) {
230b1839 1693 err = move_addr_to_kernel(addr, addr_len, (struct sockaddr *)&address);
1da177e4
LT
1694 if (err < 0)
1695 goto out_put;
230b1839 1696 msg.msg_name = (struct sockaddr *)&address;
89bddce5 1697 msg.msg_namelen = addr_len;
1da177e4
LT
1698 }
1699 if (sock->file->f_flags & O_NONBLOCK)
1700 flags |= MSG_DONTWAIT;
1701 msg.msg_flags = flags;
1702 err = sock_sendmsg(sock, &msg, len);
1703
89bddce5 1704out_put:
de0fa95c 1705 fput_light(sock->file, fput_needed);
4387ff75 1706out:
1da177e4
LT
1707 return err;
1708}
1709
1710/*
89bddce5 1711 * Send a datagram down a socket.
1da177e4
LT
1712 */
1713
3e0fa65f
HC
1714SYSCALL_DEFINE4(send, int, fd, void __user *, buff, size_t, len,
1715 unsigned, flags)
1da177e4
LT
1716{
1717 return sys_sendto(fd, buff, len, flags, NULL, 0);
1718}
1719
1720/*
89bddce5 1721 * Receive a frame from the socket and optionally record the address of the
1da177e4
LT
1722 * sender. We verify the buffers are writable and if needed move the
1723 * sender address from kernel to user space.
1724 */
1725
3e0fa65f
HC
1726SYSCALL_DEFINE6(recvfrom, int, fd, void __user *, ubuf, size_t, size,
1727 unsigned, flags, struct sockaddr __user *, addr,
1728 int __user *, addr_len)
1da177e4
LT
1729{
1730 struct socket *sock;
1731 struct iovec iov;
1732 struct msghdr msg;
230b1839 1733 struct sockaddr_storage address;
89bddce5 1734 int err, err2;
6cb153ca
BL
1735 int fput_needed;
1736
de0fa95c 1737 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4 1738 if (!sock)
de0fa95c 1739 goto out;
1da177e4 1740
89bddce5
SH
1741 msg.msg_control = NULL;
1742 msg.msg_controllen = 0;
1743 msg.msg_iovlen = 1;
1744 msg.msg_iov = &iov;
1745 iov.iov_len = size;
1746 iov.iov_base = ubuf;
230b1839
YH
1747 msg.msg_name = (struct sockaddr *)&address;
1748 msg.msg_namelen = sizeof(address);
1da177e4
LT
1749 if (sock->file->f_flags & O_NONBLOCK)
1750 flags |= MSG_DONTWAIT;
89bddce5 1751 err = sock_recvmsg(sock, &msg, size, flags);
1da177e4 1752
89bddce5 1753 if (err >= 0 && addr != NULL) {
230b1839
YH
1754 err2 = move_addr_to_user((struct sockaddr *)&address,
1755 msg.msg_namelen, addr, addr_len);
89bddce5
SH
1756 if (err2 < 0)
1757 err = err2;
1da177e4 1758 }
de0fa95c
PE
1759
1760 fput_light(sock->file, fput_needed);
4387ff75 1761out:
1da177e4
LT
1762 return err;
1763}
1764
1765/*
89bddce5 1766 * Receive a datagram from a socket.
1da177e4
LT
1767 */
1768
89bddce5
SH
1769asmlinkage long sys_recv(int fd, void __user *ubuf, size_t size,
1770 unsigned flags)
1da177e4
LT
1771{
1772 return sys_recvfrom(fd, ubuf, size, flags, NULL, NULL);
1773}
1774
1775/*
1776 * Set a socket option. Because we don't know the option lengths we have
1777 * to pass the user mode parameter for the protocols to sort out.
1778 */
1779
20f37034
HC
1780SYSCALL_DEFINE5(setsockopt, int, fd, int, level, int, optname,
1781 char __user *, optval, int, optlen)
1da177e4 1782{
6cb153ca 1783 int err, fput_needed;
1da177e4
LT
1784 struct socket *sock;
1785
1786 if (optlen < 0)
1787 return -EINVAL;
89bddce5
SH
1788
1789 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1790 if (sock != NULL) {
1791 err = security_socket_setsockopt(sock, level, optname);
6cb153ca
BL
1792 if (err)
1793 goto out_put;
1da177e4
LT
1794
1795 if (level == SOL_SOCKET)
89bddce5
SH
1796 err =
1797 sock_setsockopt(sock, level, optname, optval,
1798 optlen);
1da177e4 1799 else
89bddce5
SH
1800 err =
1801 sock->ops->setsockopt(sock, level, optname, optval,
1802 optlen);
6cb153ca
BL
1803out_put:
1804 fput_light(sock->file, fput_needed);
1da177e4
LT
1805 }
1806 return err;
1807}
1808
1809/*
1810 * Get a socket option. Because we don't know the option lengths we have
1811 * to pass a user mode parameter for the protocols to sort out.
1812 */
1813
20f37034
HC
1814SYSCALL_DEFINE5(getsockopt, int, fd, int, level, int, optname,
1815 char __user *, optval, int __user *, optlen)
1da177e4 1816{
6cb153ca 1817 int err, fput_needed;
1da177e4
LT
1818 struct socket *sock;
1819
89bddce5
SH
1820 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1821 if (sock != NULL) {
6cb153ca
BL
1822 err = security_socket_getsockopt(sock, level, optname);
1823 if (err)
1824 goto out_put;
1da177e4
LT
1825
1826 if (level == SOL_SOCKET)
89bddce5
SH
1827 err =
1828 sock_getsockopt(sock, level, optname, optval,
1829 optlen);
1da177e4 1830 else
89bddce5
SH
1831 err =
1832 sock->ops->getsockopt(sock, level, optname, optval,
1833 optlen);
6cb153ca
BL
1834out_put:
1835 fput_light(sock->file, fput_needed);
1da177e4
LT
1836 }
1837 return err;
1838}
1839
1da177e4
LT
1840/*
1841 * Shutdown a socket.
1842 */
1843
754fe8d2 1844SYSCALL_DEFINE2(shutdown, int, fd, int, how)
1da177e4 1845{
6cb153ca 1846 int err, fput_needed;
1da177e4
LT
1847 struct socket *sock;
1848
89bddce5
SH
1849 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1850 if (sock != NULL) {
1da177e4 1851 err = security_socket_shutdown(sock, how);
6cb153ca
BL
1852 if (!err)
1853 err = sock->ops->shutdown(sock, how);
1854 fput_light(sock->file, fput_needed);
1da177e4
LT
1855 }
1856 return err;
1857}
1858
89bddce5 1859/* A couple of helpful macros for getting the address of the 32/64 bit
1da177e4
LT
1860 * fields which are the same type (int / unsigned) on our platforms.
1861 */
1862#define COMPAT_MSG(msg, member) ((MSG_CMSG_COMPAT & flags) ? &msg##_compat->member : &msg->member)
1863#define COMPAT_NAMELEN(msg) COMPAT_MSG(msg, msg_namelen)
1864#define COMPAT_FLAGS(msg) COMPAT_MSG(msg, msg_flags)
1865
1da177e4
LT
1866/*
1867 * BSD sendmsg interface
1868 */
1869
3e0fa65f 1870SYSCALL_DEFINE3(sendmsg, int, fd, struct msghdr __user *, msg, unsigned, flags)
1da177e4 1871{
89bddce5
SH
1872 struct compat_msghdr __user *msg_compat =
1873 (struct compat_msghdr __user *)msg;
1da177e4 1874 struct socket *sock;
230b1839 1875 struct sockaddr_storage address;
1da177e4 1876 struct iovec iovstack[UIO_FASTIOV], *iov = iovstack;
b9d717a7 1877 unsigned char ctl[sizeof(struct cmsghdr) + 20]
89bddce5
SH
1878 __attribute__ ((aligned(sizeof(__kernel_size_t))));
1879 /* 20 is size of ipv6_pktinfo */
1da177e4
LT
1880 unsigned char *ctl_buf = ctl;
1881 struct msghdr msg_sys;
1882 int err, ctl_len, iov_size, total_len;
6cb153ca 1883 int fput_needed;
89bddce5 1884
1da177e4
LT
1885 err = -EFAULT;
1886 if (MSG_CMSG_COMPAT & flags) {
1887 if (get_compat_msghdr(&msg_sys, msg_compat))
1888 return -EFAULT;
89bddce5
SH
1889 }
1890 else if (copy_from_user(&msg_sys, msg, sizeof(struct msghdr)))
1da177e4
LT
1891 return -EFAULT;
1892
6cb153ca 1893 sock = sockfd_lookup_light(fd, &err, &fput_needed);
89bddce5 1894 if (!sock)
1da177e4
LT
1895 goto out;
1896
1897 /* do not move before msg_sys is valid */
1898 err = -EMSGSIZE;
1899 if (msg_sys.msg_iovlen > UIO_MAXIOV)
1900 goto out_put;
1901
89bddce5 1902 /* Check whether to allocate the iovec area */
1da177e4
LT
1903 err = -ENOMEM;
1904 iov_size = msg_sys.msg_iovlen * sizeof(struct iovec);
1905 if (msg_sys.msg_iovlen > UIO_FASTIOV) {
1906 iov = sock_kmalloc(sock->sk, iov_size, GFP_KERNEL);
1907 if (!iov)
1908 goto out_put;
1909 }
1910
1911 /* This will also move the address data into kernel space */
1912 if (MSG_CMSG_COMPAT & flags) {
230b1839
YH
1913 err = verify_compat_iovec(&msg_sys, iov,
1914 (struct sockaddr *)&address,
1915 VERIFY_READ);
1da177e4 1916 } else
230b1839
YH
1917 err = verify_iovec(&msg_sys, iov,
1918 (struct sockaddr *)&address,
1919 VERIFY_READ);
89bddce5 1920 if (err < 0)
1da177e4
LT
1921 goto out_freeiov;
1922 total_len = err;
1923
1924 err = -ENOBUFS;
1925
1926 if (msg_sys.msg_controllen > INT_MAX)
1927 goto out_freeiov;
89bddce5 1928 ctl_len = msg_sys.msg_controllen;
1da177e4 1929 if ((MSG_CMSG_COMPAT & flags) && ctl_len) {
89bddce5
SH
1930 err =
1931 cmsghdr_from_user_compat_to_kern(&msg_sys, sock->sk, ctl,
1932 sizeof(ctl));
1da177e4
LT
1933 if (err)
1934 goto out_freeiov;
1935 ctl_buf = msg_sys.msg_control;
8920e8f9 1936 ctl_len = msg_sys.msg_controllen;
1da177e4 1937 } else if (ctl_len) {
89bddce5 1938 if (ctl_len > sizeof(ctl)) {
1da177e4 1939 ctl_buf = sock_kmalloc(sock->sk, ctl_len, GFP_KERNEL);
89bddce5 1940 if (ctl_buf == NULL)
1da177e4
LT
1941 goto out_freeiov;
1942 }
1943 err = -EFAULT;
1944 /*
1945 * Careful! Before this, msg_sys.msg_control contains a user pointer.
1946 * Afterwards, it will be a kernel pointer. Thus the compiler-assisted
1947 * checking falls down on this.
1948 */
89bddce5
SH
1949 if (copy_from_user(ctl_buf, (void __user *)msg_sys.msg_control,
1950 ctl_len))
1da177e4
LT
1951 goto out_freectl;
1952 msg_sys.msg_control = ctl_buf;
1953 }
1954 msg_sys.msg_flags = flags;
1955
1956 if (sock->file->f_flags & O_NONBLOCK)
1957 msg_sys.msg_flags |= MSG_DONTWAIT;
1958 err = sock_sendmsg(sock, &msg_sys, total_len);
1959
1960out_freectl:
89bddce5 1961 if (ctl_buf != ctl)
1da177e4
LT
1962 sock_kfree_s(sock->sk, ctl_buf, ctl_len);
1963out_freeiov:
1964 if (iov != iovstack)
1965 sock_kfree_s(sock->sk, iov, iov_size);
1966out_put:
6cb153ca 1967 fput_light(sock->file, fput_needed);
89bddce5 1968out:
1da177e4
LT
1969 return err;
1970}
1971
1972/*
1973 * BSD recvmsg interface
1974 */
1975
3e0fa65f
HC
1976SYSCALL_DEFINE3(recvmsg, int, fd, struct msghdr __user *, msg,
1977 unsigned int, flags)
1da177e4 1978{
89bddce5
SH
1979 struct compat_msghdr __user *msg_compat =
1980 (struct compat_msghdr __user *)msg;
1da177e4
LT
1981 struct socket *sock;
1982 struct iovec iovstack[UIO_FASTIOV];
89bddce5 1983 struct iovec *iov = iovstack;
1da177e4
LT
1984 struct msghdr msg_sys;
1985 unsigned long cmsg_ptr;
1986 int err, iov_size, total_len, len;
6cb153ca 1987 int fput_needed;
1da177e4
LT
1988
1989 /* kernel mode address */
230b1839 1990 struct sockaddr_storage addr;
1da177e4
LT
1991
1992 /* user mode address pointers */
1993 struct sockaddr __user *uaddr;
1994 int __user *uaddr_len;
89bddce5 1995
1da177e4
LT
1996 if (MSG_CMSG_COMPAT & flags) {
1997 if (get_compat_msghdr(&msg_sys, msg_compat))
1998 return -EFAULT;
89bddce5
SH
1999 }
2000 else if (copy_from_user(&msg_sys, msg, sizeof(struct msghdr)))
2001 return -EFAULT;
1da177e4 2002
6cb153ca 2003 sock = sockfd_lookup_light(fd, &err, &fput_needed);
1da177e4
LT
2004 if (!sock)
2005 goto out;
2006
2007 err = -EMSGSIZE;
2008 if (msg_sys.msg_iovlen > UIO_MAXIOV)
2009 goto out_put;
89bddce5
SH
2010
2011 /* Check whether to allocate the iovec area */
1da177e4
LT
2012 err = -ENOMEM;
2013 iov_size = msg_sys.msg_iovlen * sizeof(struct iovec);
2014 if (msg_sys.msg_iovlen > UIO_FASTIOV) {
2015 iov = sock_kmalloc(sock->sk, iov_size, GFP_KERNEL);
2016 if (!iov)
2017 goto out_put;
2018 }
2019
2020 /*
89bddce5
SH
2021 * Save the user-mode address (verify_iovec will change the
2022 * kernel msghdr to use the kernel address space)
1da177e4 2023 */
89bddce5 2024
cfcabdcc 2025 uaddr = (__force void __user *)msg_sys.msg_name;
1da177e4
LT
2026 uaddr_len = COMPAT_NAMELEN(msg);
2027 if (MSG_CMSG_COMPAT & flags) {
230b1839
YH
2028 err = verify_compat_iovec(&msg_sys, iov,
2029 (struct sockaddr *)&addr,
2030 VERIFY_WRITE);
1da177e4 2031 } else
230b1839
YH
2032 err = verify_iovec(&msg_sys, iov,
2033 (struct sockaddr *)&addr,
2034 VERIFY_WRITE);
1da177e4
LT
2035 if (err < 0)
2036 goto out_freeiov;
89bddce5 2037 total_len = err;
1da177e4
LT
2038
2039 cmsg_ptr = (unsigned long)msg_sys.msg_control;
4a19542e 2040 msg_sys.msg_flags = flags & (MSG_CMSG_CLOEXEC|MSG_CMSG_COMPAT);
89bddce5 2041
1da177e4
LT
2042 if (sock->file->f_flags & O_NONBLOCK)
2043 flags |= MSG_DONTWAIT;
2044 err = sock_recvmsg(sock, &msg_sys, total_len, flags);
2045 if (err < 0)
2046 goto out_freeiov;
2047 len = err;
2048
2049 if (uaddr != NULL) {
230b1839
YH
2050 err = move_addr_to_user((struct sockaddr *)&addr,
2051 msg_sys.msg_namelen, uaddr,
89bddce5 2052 uaddr_len);
1da177e4
LT
2053 if (err < 0)
2054 goto out_freeiov;
2055 }
37f7f421
DM
2056 err = __put_user((msg_sys.msg_flags & ~MSG_CMSG_COMPAT),
2057 COMPAT_FLAGS(msg));
1da177e4
LT
2058 if (err)
2059 goto out_freeiov;
2060 if (MSG_CMSG_COMPAT & flags)
89bddce5 2061 err = __put_user((unsigned long)msg_sys.msg_control - cmsg_ptr,
1da177e4
LT
2062 &msg_compat->msg_controllen);
2063 else
89bddce5 2064 err = __put_user((unsigned long)msg_sys.msg_control - cmsg_ptr,
1da177e4
LT
2065 &msg->msg_controllen);
2066 if (err)
2067 goto out_freeiov;
2068 err = len;
2069
2070out_freeiov:
2071 if (iov != iovstack)
2072 sock_kfree_s(sock->sk, iov, iov_size);
2073out_put:
6cb153ca 2074 fput_light(sock->file, fput_needed);
1da177e4
LT
2075out:
2076 return err;
2077}
2078
2079#ifdef __ARCH_WANT_SYS_SOCKETCALL
2080
2081/* Argument list sizes for sys_socketcall */
2082#define AL(x) ((x) * sizeof(unsigned long))
aaca0bdc 2083static const unsigned char nargs[19]={
89bddce5
SH
2084 AL(0),AL(3),AL(3),AL(3),AL(2),AL(3),
2085 AL(3),AL(3),AL(4),AL(4),AL(4),AL(6),
aaca0bdc 2086 AL(6),AL(2),AL(5),AL(5),AL(3),AL(3),
de11defe 2087 AL(4)
89bddce5
SH
2088};
2089
1da177e4
LT
2090#undef AL
2091
2092/*
89bddce5 2093 * System call vectors.
1da177e4
LT
2094 *
2095 * Argument checking cleaned up. Saved 20% in size.
2096 * This function doesn't need to set the kernel lock because
89bddce5 2097 * it is set by the callees.
1da177e4
LT
2098 */
2099
3e0fa65f 2100SYSCALL_DEFINE2(socketcall, int, call, unsigned long __user *, args)
1da177e4
LT
2101{
2102 unsigned long a[6];
89bddce5 2103 unsigned long a0, a1;
1da177e4
LT
2104 int err;
2105
de11defe 2106 if (call < 1 || call > SYS_ACCEPT4)
1da177e4
LT
2107 return -EINVAL;
2108
2109 /* copy_from_user should be SMP safe. */
2110 if (copy_from_user(a, args, nargs[call]))
2111 return -EFAULT;
3ec3b2fb 2112
f3298dc4 2113 audit_socketcall(nargs[call] / sizeof(unsigned long), a);
3ec3b2fb 2114
89bddce5
SH
2115 a0 = a[0];
2116 a1 = a[1];
2117
2118 switch (call) {
2119 case SYS_SOCKET:
2120 err = sys_socket(a0, a1, a[2]);
2121 break;
2122 case SYS_BIND:
2123 err = sys_bind(a0, (struct sockaddr __user *)a1, a[2]);
2124 break;
2125 case SYS_CONNECT:
2126 err = sys_connect(a0, (struct sockaddr __user *)a1, a[2]);
2127 break;
2128 case SYS_LISTEN:
2129 err = sys_listen(a0, a1);
2130 break;
2131 case SYS_ACCEPT:
de11defe
UD
2132 err = sys_accept4(a0, (struct sockaddr __user *)a1,
2133 (int __user *)a[2], 0);
89bddce5
SH
2134 break;
2135 case SYS_GETSOCKNAME:
2136 err =
2137 sys_getsockname(a0, (struct sockaddr __user *)a1,
2138 (int __user *)a[2]);
2139 break;
2140 case SYS_GETPEERNAME:
2141 err =
2142 sys_getpeername(a0, (struct sockaddr __user *)a1,
2143 (int __user *)a[2]);
2144 break;
2145 case SYS_SOCKETPAIR:
2146 err = sys_socketpair(a0, a1, a[2], (int __user *)a[3]);
2147 break;
2148 case SYS_SEND:
2149 err = sys_send(a0, (void __user *)a1, a[2], a[3]);
2150 break;
2151 case SYS_SENDTO:
2152 err = sys_sendto(a0, (void __user *)a1, a[2], a[3],
2153 (struct sockaddr __user *)a[4], a[5]);
2154 break;
2155 case SYS_RECV:
2156 err = sys_recv(a0, (void __user *)a1, a[2], a[3]);
2157 break;
2158 case SYS_RECVFROM:
2159 err = sys_recvfrom(a0, (void __user *)a1, a[2], a[3],
2160 (struct sockaddr __user *)a[4],
2161 (int __user *)a[5]);
2162 break;
2163 case SYS_SHUTDOWN:
2164 err = sys_shutdown(a0, a1);
2165 break;
2166 case SYS_SETSOCKOPT:
2167 err = sys_setsockopt(a0, a1, a[2], (char __user *)a[3], a[4]);
2168 break;
2169 case SYS_GETSOCKOPT:
2170 err =
2171 sys_getsockopt(a0, a1, a[2], (char __user *)a[3],
2172 (int __user *)a[4]);
2173 break;
2174 case SYS_SENDMSG:
2175 err = sys_sendmsg(a0, (struct msghdr __user *)a1, a[2]);
2176 break;
2177 case SYS_RECVMSG:
2178 err = sys_recvmsg(a0, (struct msghdr __user *)a1, a[2]);
2179 break;
de11defe
UD
2180 case SYS_ACCEPT4:
2181 err = sys_accept4(a0, (struct sockaddr __user *)a1,
2182 (int __user *)a[2], a[3]);
aaca0bdc 2183 break;
89bddce5
SH
2184 default:
2185 err = -EINVAL;
2186 break;
1da177e4
LT
2187 }
2188 return err;
2189}
2190
89bddce5 2191#endif /* __ARCH_WANT_SYS_SOCKETCALL */
1da177e4 2192
55737fda
SH
2193/**
2194 * sock_register - add a socket protocol handler
2195 * @ops: description of protocol
2196 *
1da177e4
LT
2197 * This function is called by a protocol handler that wants to
2198 * advertise its address family, and have it linked into the
55737fda
SH
2199 * socket interface. The value ops->family coresponds to the
2200 * socket system call protocol family.
1da177e4 2201 */
f0fd27d4 2202int sock_register(const struct net_proto_family *ops)
1da177e4
LT
2203{
2204 int err;
2205
2206 if (ops->family >= NPROTO) {
89bddce5
SH
2207 printk(KERN_CRIT "protocol %d >= NPROTO(%d)\n", ops->family,
2208 NPROTO);
1da177e4
LT
2209 return -ENOBUFS;
2210 }
55737fda
SH
2211
2212 spin_lock(&net_family_lock);
2213 if (net_families[ops->family])
2214 err = -EEXIST;
2215 else {
89bddce5 2216 net_families[ops->family] = ops;
1da177e4
LT
2217 err = 0;
2218 }
55737fda
SH
2219 spin_unlock(&net_family_lock);
2220
89bddce5 2221 printk(KERN_INFO "NET: Registered protocol family %d\n", ops->family);
1da177e4
LT
2222 return err;
2223}
2224
55737fda
SH
2225/**
2226 * sock_unregister - remove a protocol handler
2227 * @family: protocol family to remove
2228 *
1da177e4
LT
2229 * This function is called by a protocol handler that wants to
2230 * remove its address family, and have it unlinked from the
55737fda
SH
2231 * new socket creation.
2232 *
2233 * If protocol handler is a module, then it can use module reference
2234 * counts to protect against new references. If protocol handler is not
2235 * a module then it needs to provide its own protection in
2236 * the ops->create routine.
1da177e4 2237 */
f0fd27d4 2238void sock_unregister(int family)
1da177e4 2239{
f0fd27d4 2240 BUG_ON(family < 0 || family >= NPROTO);
1da177e4 2241
55737fda 2242 spin_lock(&net_family_lock);
89bddce5 2243 net_families[family] = NULL;
55737fda
SH
2244 spin_unlock(&net_family_lock);
2245
2246 synchronize_rcu();
2247
89bddce5 2248 printk(KERN_INFO "NET: Unregistered protocol family %d\n", family);
1da177e4
LT
2249}
2250
77d76ea3 2251static int __init sock_init(void)
1da177e4
LT
2252{
2253 /*
89bddce5 2254 * Initialize sock SLAB cache.
1da177e4 2255 */
89bddce5 2256
1da177e4
LT
2257 sk_init();
2258
1da177e4 2259 /*
89bddce5 2260 * Initialize skbuff SLAB cache
1da177e4
LT
2261 */
2262 skb_init();
1da177e4
LT
2263
2264 /*
89bddce5 2265 * Initialize the protocols module.
1da177e4
LT
2266 */
2267
2268 init_inodecache();
2269 register_filesystem(&sock_fs_type);
2270 sock_mnt = kern_mount(&sock_fs_type);
77d76ea3
AK
2271
2272 /* The real protocol initialization is performed in later initcalls.
1da177e4
LT
2273 */
2274
2275#ifdef CONFIG_NETFILTER
2276 netfilter_init();
2277#endif
cbeb321a
DM
2278
2279 return 0;
1da177e4
LT
2280}
2281
77d76ea3
AK
2282core_initcall(sock_init); /* early initcall */
2283
1da177e4
LT
2284#ifdef CONFIG_PROC_FS
2285void socket_seq_show(struct seq_file *seq)
2286{
2287 int cpu;
2288 int counter = 0;
2289
6f912042 2290 for_each_possible_cpu(cpu)
89bddce5 2291 counter += per_cpu(sockets_in_use, cpu);
1da177e4
LT
2292
2293 /* It can be negative, by the way. 8) */
2294 if (counter < 0)
2295 counter = 0;
2296
2297 seq_printf(seq, "sockets: used %d\n", counter);
2298}
89bddce5 2299#endif /* CONFIG_PROC_FS */
1da177e4 2300
89bbfc95
SP
2301#ifdef CONFIG_COMPAT
2302static long compat_sock_ioctl(struct file *file, unsigned cmd,
89bddce5 2303 unsigned long arg)
89bbfc95
SP
2304{
2305 struct socket *sock = file->private_data;
2306 int ret = -ENOIOCTLCMD;
87de87d5
DM
2307 struct sock *sk;
2308 struct net *net;
2309
2310 sk = sock->sk;
2311 net = sock_net(sk);
89bbfc95
SP
2312
2313 if (sock->ops->compat_ioctl)
2314 ret = sock->ops->compat_ioctl(sock, cmd, arg);
2315
87de87d5
DM
2316 if (ret == -ENOIOCTLCMD &&
2317 (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST))
2318 ret = compat_wext_handle_ioctl(net, cmd, arg);
2319
89bbfc95
SP
2320 return ret;
2321}
2322#endif
2323
ac5a488e
SS
2324int kernel_bind(struct socket *sock, struct sockaddr *addr, int addrlen)
2325{
2326 return sock->ops->bind(sock, addr, addrlen);
2327}
2328
2329int kernel_listen(struct socket *sock, int backlog)
2330{
2331 return sock->ops->listen(sock, backlog);
2332}
2333
2334int kernel_accept(struct socket *sock, struct socket **newsock, int flags)
2335{
2336 struct sock *sk = sock->sk;
2337 int err;
2338
2339 err = sock_create_lite(sk->sk_family, sk->sk_type, sk->sk_protocol,
2340 newsock);
2341 if (err < 0)
2342 goto done;
2343
2344 err = sock->ops->accept(sock, *newsock, flags);
2345 if (err < 0) {
2346 sock_release(*newsock);
fa8705b0 2347 *newsock = NULL;
ac5a488e
SS
2348 goto done;
2349 }
2350
2351 (*newsock)->ops = sock->ops;
1b08534e 2352 __module_get((*newsock)->ops->owner);
ac5a488e
SS
2353
2354done:
2355 return err;
2356}
2357
2358int kernel_connect(struct socket *sock, struct sockaddr *addr, int addrlen,
4768fbcb 2359 int flags)
ac5a488e
SS
2360{
2361 return sock->ops->connect(sock, addr, addrlen, flags);
2362}
2363
2364int kernel_getsockname(struct socket *sock, struct sockaddr *addr,
2365 int *addrlen)
2366{
2367 return sock->ops->getname(sock, addr, addrlen, 0);
2368}
2369
2370int kernel_getpeername(struct socket *sock, struct sockaddr *addr,
2371 int *addrlen)
2372{
2373 return sock->ops->getname(sock, addr, addrlen, 1);
2374}
2375
2376int kernel_getsockopt(struct socket *sock, int level, int optname,
2377 char *optval, int *optlen)
2378{
2379 mm_segment_t oldfs = get_fs();
2380 int err;
2381
2382 set_fs(KERNEL_DS);
2383 if (level == SOL_SOCKET)
2384 err = sock_getsockopt(sock, level, optname, optval, optlen);
2385 else
2386 err = sock->ops->getsockopt(sock, level, optname, optval,
2387 optlen);
2388 set_fs(oldfs);
2389 return err;
2390}
2391
2392int kernel_setsockopt(struct socket *sock, int level, int optname,
2393 char *optval, int optlen)
2394{
2395 mm_segment_t oldfs = get_fs();
2396 int err;
2397
2398 set_fs(KERNEL_DS);
2399 if (level == SOL_SOCKET)
2400 err = sock_setsockopt(sock, level, optname, optval, optlen);
2401 else
2402 err = sock->ops->setsockopt(sock, level, optname, optval,
2403 optlen);
2404 set_fs(oldfs);
2405 return err;
2406}
2407
2408int kernel_sendpage(struct socket *sock, struct page *page, int offset,
2409 size_t size, int flags)
2410{
2411 if (sock->ops->sendpage)
2412 return sock->ops->sendpage(sock, page, offset, size, flags);
2413
2414 return sock_no_sendpage(sock, page, offset, size, flags);
2415}
2416
2417int kernel_sock_ioctl(struct socket *sock, int cmd, unsigned long arg)
2418{
2419 mm_segment_t oldfs = get_fs();
2420 int err;
2421
2422 set_fs(KERNEL_DS);
2423 err = sock->ops->ioctl(sock, cmd, arg);
2424 set_fs(oldfs);
2425
2426 return err;
2427}
2428
91cf45f0
TM
2429int kernel_sock_shutdown(struct socket *sock, enum sock_shutdown_cmd how)
2430{
2431 return sock->ops->shutdown(sock, how);
2432}
2433
1da177e4
LT
2434EXPORT_SYMBOL(sock_create);
2435EXPORT_SYMBOL(sock_create_kern);
2436EXPORT_SYMBOL(sock_create_lite);
2437EXPORT_SYMBOL(sock_map_fd);
2438EXPORT_SYMBOL(sock_recvmsg);
2439EXPORT_SYMBOL(sock_register);
2440EXPORT_SYMBOL(sock_release);
2441EXPORT_SYMBOL(sock_sendmsg);
2442EXPORT_SYMBOL(sock_unregister);
2443EXPORT_SYMBOL(sock_wake_async);
2444EXPORT_SYMBOL(sockfd_lookup);
2445EXPORT_SYMBOL(kernel_sendmsg);
2446EXPORT_SYMBOL(kernel_recvmsg);
ac5a488e
SS
2447EXPORT_SYMBOL(kernel_bind);
2448EXPORT_SYMBOL(kernel_listen);
2449EXPORT_SYMBOL(kernel_accept);
2450EXPORT_SYMBOL(kernel_connect);
2451EXPORT_SYMBOL(kernel_getsockname);
2452EXPORT_SYMBOL(kernel_getpeername);
2453EXPORT_SYMBOL(kernel_getsockopt);
2454EXPORT_SYMBOL(kernel_setsockopt);
2455EXPORT_SYMBOL(kernel_sendpage);
2456EXPORT_SYMBOL(kernel_sock_ioctl);
91cf45f0 2457EXPORT_SYMBOL(kernel_sock_shutdown);