xref: /openbmc/linux/net/socket.c (revision 7cbe66b6)
11da177e4SLinus Torvalds /*
21da177e4SLinus Torvalds  * NET		An implementation of the SOCKET network access protocol.
31da177e4SLinus Torvalds  *
41da177e4SLinus Torvalds  * Version:	@(#)socket.c	1.1.93	18/02/95
51da177e4SLinus Torvalds  *
61da177e4SLinus Torvalds  * Authors:	Orest Zborowski, <obz@Kodak.COM>
702c30a84SJesper Juhl  *		Ross Biro
81da177e4SLinus Torvalds  *		Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
91da177e4SLinus Torvalds  *
101da177e4SLinus Torvalds  * Fixes:
111da177e4SLinus Torvalds  *		Anonymous	:	NOTSOCK/BADF cleanup. Error fix in
121da177e4SLinus Torvalds  *					shutdown()
131da177e4SLinus Torvalds  *		Alan Cox	:	verify_area() fixes
141da177e4SLinus Torvalds  *		Alan Cox	:	Removed DDI
151da177e4SLinus Torvalds  *		Jonathan Kamens	:	SOCK_DGRAM reconnect bug
161da177e4SLinus Torvalds  *		Alan Cox	:	Moved a load of checks to the very
171da177e4SLinus Torvalds  *					top level.
181da177e4SLinus Torvalds  *		Alan Cox	:	Move address structures to/from user
191da177e4SLinus Torvalds  *					mode above the protocol layers.
201da177e4SLinus Torvalds  *		Rob Janssen	:	Allow 0 length sends.
211da177e4SLinus Torvalds  *		Alan Cox	:	Asynchronous I/O support (cribbed from the
221da177e4SLinus Torvalds  *					tty drivers).
231da177e4SLinus Torvalds  *		Niibe Yutaka	:	Asynchronous I/O for writes (4.4BSD style)
241da177e4SLinus Torvalds  *		Jeff Uphoff	:	Made max number of sockets command-line
251da177e4SLinus Torvalds  *					configurable.
261da177e4SLinus Torvalds  *		Matti Aarnio	:	Made the number of sockets dynamic,
271da177e4SLinus Torvalds  *					to be allocated when needed, and mr.
281da177e4SLinus Torvalds  *					Uphoff's max is used as max to be
291da177e4SLinus Torvalds  *					allowed to allocate.
301da177e4SLinus Torvalds  *		Linus		:	Argh. removed all the socket allocation
311da177e4SLinus Torvalds  *					altogether: it's in the inode now.
321da177e4SLinus Torvalds  *		Alan Cox	:	Made sock_alloc()/sock_release() public
331da177e4SLinus Torvalds  *					for NetROM and future kernel nfsd type
341da177e4SLinus Torvalds  *					stuff.
351da177e4SLinus Torvalds  *		Alan Cox	:	sendmsg/recvmsg basics.
361da177e4SLinus Torvalds  *		Tom Dyas	:	Export net symbols.
371da177e4SLinus Torvalds  *		Marcin Dalecki	:	Fixed problems with CONFIG_NET="n".
381da177e4SLinus Torvalds  *		Alan Cox	:	Added thread locking to sys_* calls
391da177e4SLinus Torvalds  *					for sockets. May have errors at the
401da177e4SLinus Torvalds  *					moment.
411da177e4SLinus Torvalds  *		Kevin Buhr	:	Fixed the dumb errors in the above.
421da177e4SLinus Torvalds  *		Andi Kleen	:	Some small cleanups, optimizations,
431da177e4SLinus Torvalds  *					and fixed a copy_from_user() bug.
441da177e4SLinus Torvalds  *		Tigran Aivazian	:	sys_send(args) calls sys_sendto(args, NULL, 0)
451da177e4SLinus Torvalds  *		Tigran Aivazian	:	Made listen(2) backlog sanity checks
461da177e4SLinus Torvalds  *					protocol-independent
471da177e4SLinus Torvalds  *
481da177e4SLinus Torvalds  *
491da177e4SLinus Torvalds  *		This program is free software; you can redistribute it and/or
501da177e4SLinus Torvalds  *		modify it under the terms of the GNU General Public License
511da177e4SLinus Torvalds  *		as published by the Free Software Foundation; either version
521da177e4SLinus Torvalds  *		2 of the License, or (at your option) any later version.
531da177e4SLinus Torvalds  *
541da177e4SLinus Torvalds  *
551da177e4SLinus Torvalds  *	This module is effectively the top level interface to the BSD socket
561da177e4SLinus Torvalds  *	paradigm.
571da177e4SLinus Torvalds  *
581da177e4SLinus Torvalds  *	Based upon Swansea University Computer Society NET3.039
591da177e4SLinus Torvalds  */
601da177e4SLinus Torvalds 
611da177e4SLinus Torvalds #include <linux/mm.h>
621da177e4SLinus Torvalds #include <linux/socket.h>
631da177e4SLinus Torvalds #include <linux/file.h>
641da177e4SLinus Torvalds #include <linux/net.h>
651da177e4SLinus Torvalds #include <linux/interrupt.h>
66aaca0bdcSUlrich Drepper #include <linux/thread_info.h>
6755737fdaSStephen Hemminger #include <linux/rcupdate.h>
681da177e4SLinus Torvalds #include <linux/netdevice.h>
691da177e4SLinus Torvalds #include <linux/proc_fs.h>
701da177e4SLinus Torvalds #include <linux/seq_file.h>
714a3e2f71SArjan van de Ven #include <linux/mutex.h>
721da177e4SLinus Torvalds #include <linux/wanrouter.h>
731da177e4SLinus Torvalds #include <linux/if_bridge.h>
7420380731SArnaldo Carvalho de Melo #include <linux/if_frad.h>
7520380731SArnaldo Carvalho de Melo #include <linux/if_vlan.h>
761da177e4SLinus Torvalds #include <linux/init.h>
771da177e4SLinus Torvalds #include <linux/poll.h>
781da177e4SLinus Torvalds #include <linux/cache.h>
791da177e4SLinus Torvalds #include <linux/module.h>
801da177e4SLinus Torvalds #include <linux/highmem.h>
811da177e4SLinus Torvalds #include <linux/mount.h>
821da177e4SLinus Torvalds #include <linux/security.h>
831da177e4SLinus Torvalds #include <linux/syscalls.h>
841da177e4SLinus Torvalds #include <linux/compat.h>
851da177e4SLinus Torvalds #include <linux/kmod.h>
863ec3b2fbSDavid Woodhouse #include <linux/audit.h>
87d86b5e0eSAdrian Bunk #include <linux/wireless.h>
881b8d7ae4SEric W. Biederman #include <linux/nsproxy.h>
891fd7317dSNick Black #include <linux/magic.h>
901da177e4SLinus Torvalds 
911da177e4SLinus Torvalds #include <asm/uaccess.h>
921da177e4SLinus Torvalds #include <asm/unistd.h>
931da177e4SLinus Torvalds 
941da177e4SLinus Torvalds #include <net/compat.h>
9587de87d5SDavid S. Miller #include <net/wext.h>
961da177e4SLinus Torvalds 
971da177e4SLinus Torvalds #include <net/sock.h>
981da177e4SLinus Torvalds #include <linux/netfilter.h>
991da177e4SLinus Torvalds 
1006b96018bSArnd Bergmann #include <linux/if_tun.h>
1016b96018bSArnd Bergmann #include <linux/ipv6_route.h>
1026b96018bSArnd Bergmann #include <linux/route.h>
1036b96018bSArnd Bergmann #include <linux/sockios.h>
1046b96018bSArnd Bergmann #include <linux/atalk.h>
1056b96018bSArnd Bergmann 
1061da177e4SLinus Torvalds static int sock_no_open(struct inode *irrelevant, struct file *dontcare);
107027445c3SBadari Pulavarty static ssize_t sock_aio_read(struct kiocb *iocb, const struct iovec *iov,
108027445c3SBadari Pulavarty 			 unsigned long nr_segs, loff_t pos);
109027445c3SBadari Pulavarty static ssize_t sock_aio_write(struct kiocb *iocb, const struct iovec *iov,
110027445c3SBadari Pulavarty 			  unsigned long nr_segs, loff_t pos);
1111da177e4SLinus Torvalds static int sock_mmap(struct file *file, struct vm_area_struct *vma);
1121da177e4SLinus Torvalds 
1131da177e4SLinus Torvalds static int sock_close(struct inode *inode, struct file *file);
1141da177e4SLinus Torvalds static unsigned int sock_poll(struct file *file,
1151da177e4SLinus Torvalds 			      struct poll_table_struct *wait);
11689bddce5SStephen Hemminger static long sock_ioctl(struct file *file, unsigned int cmd, unsigned long arg);
11789bbfc95SShaun Pereira #ifdef CONFIG_COMPAT
11889bbfc95SShaun Pereira static long compat_sock_ioctl(struct file *file,
11989bbfc95SShaun Pereira 			      unsigned int cmd, unsigned long arg);
12089bbfc95SShaun Pereira #endif
1211da177e4SLinus Torvalds static int sock_fasync(int fd, struct file *filp, int on);
1221da177e4SLinus Torvalds static ssize_t sock_sendpage(struct file *file, struct page *page,
1231da177e4SLinus Torvalds 			     int offset, size_t size, loff_t *ppos, int more);
1249c55e01cSJens Axboe static ssize_t sock_splice_read(struct file *file, loff_t *ppos,
1259c55e01cSJens Axboe 			        struct pipe_inode_info *pipe, size_t len,
1269c55e01cSJens Axboe 				unsigned int flags);
1271da177e4SLinus Torvalds 
1281da177e4SLinus Torvalds /*
1291da177e4SLinus Torvalds  *	Socket files have a set of 'special' operations as well as the generic file ones. These don't appear
1301da177e4SLinus Torvalds  *	in the operation structures but are done directly via the socketcall() multiplexor.
1311da177e4SLinus Torvalds  */
1321da177e4SLinus Torvalds 
133da7071d7SArjan van de Ven static const struct file_operations socket_file_ops = {
1341da177e4SLinus Torvalds 	.owner =	THIS_MODULE,
1351da177e4SLinus Torvalds 	.llseek =	no_llseek,
1361da177e4SLinus Torvalds 	.aio_read =	sock_aio_read,
1371da177e4SLinus Torvalds 	.aio_write =	sock_aio_write,
1381da177e4SLinus Torvalds 	.poll =		sock_poll,
1391da177e4SLinus Torvalds 	.unlocked_ioctl = sock_ioctl,
14089bbfc95SShaun Pereira #ifdef CONFIG_COMPAT
14189bbfc95SShaun Pereira 	.compat_ioctl = compat_sock_ioctl,
14289bbfc95SShaun Pereira #endif
1431da177e4SLinus Torvalds 	.mmap =		sock_mmap,
1441da177e4SLinus Torvalds 	.open =		sock_no_open,	/* special open code to disallow open via /proc */
1451da177e4SLinus Torvalds 	.release =	sock_close,
1461da177e4SLinus Torvalds 	.fasync =	sock_fasync,
1475274f052SJens Axboe 	.sendpage =	sock_sendpage,
1485274f052SJens Axboe 	.splice_write = generic_splice_sendpage,
1499c55e01cSJens Axboe 	.splice_read =	sock_splice_read,
1501da177e4SLinus Torvalds };
1511da177e4SLinus Torvalds 
1521da177e4SLinus Torvalds /*
1531da177e4SLinus Torvalds  *	The protocol list. Each protocol is registered in here.
1541da177e4SLinus Torvalds  */
1551da177e4SLinus Torvalds 
1561da177e4SLinus Torvalds static DEFINE_SPINLOCK(net_family_lock);
157f0fd27d4SStephen Hemminger static const struct net_proto_family *net_families[NPROTO] __read_mostly;
1581da177e4SLinus Torvalds 
1591da177e4SLinus Torvalds /*
1601da177e4SLinus Torvalds  *	Statistics counters of the socket lists
1611da177e4SLinus Torvalds  */
1621da177e4SLinus Torvalds 
1631da177e4SLinus Torvalds static DEFINE_PER_CPU(int, sockets_in_use) = 0;
1641da177e4SLinus Torvalds 
1651da177e4SLinus Torvalds /*
16689bddce5SStephen Hemminger  * Support routines.
16789bddce5SStephen Hemminger  * Move socket addresses back and forth across the kernel/user
1681da177e4SLinus Torvalds  * divide and look after the messy bits.
1691da177e4SLinus Torvalds  */
1701da177e4SLinus Torvalds 
1711da177e4SLinus Torvalds #define MAX_SOCK_ADDR	128		/* 108 for Unix domain -
1721da177e4SLinus Torvalds 					   16 for IP, 16 for IPX,
1731da177e4SLinus Torvalds 					   24 for IPv6,
1741da177e4SLinus Torvalds 					   about 80 for AX.25
1751da177e4SLinus Torvalds 					   must be at least one bigger than
1761da177e4SLinus Torvalds 					   the AF_UNIX size (see net/unix/af_unix.c
1771da177e4SLinus Torvalds 					   :unix_mkname()).
1781da177e4SLinus Torvalds 					 */
1791da177e4SLinus Torvalds 
1801da177e4SLinus Torvalds /**
1811da177e4SLinus Torvalds  *	move_addr_to_kernel	-	copy a socket address into kernel space
1821da177e4SLinus Torvalds  *	@uaddr: Address in user space
1831da177e4SLinus Torvalds  *	@kaddr: Address in kernel space
1841da177e4SLinus Torvalds  *	@ulen: Length in user space
1851da177e4SLinus Torvalds  *
1861da177e4SLinus Torvalds  *	The address is copied into kernel space. If the provided address is
1871da177e4SLinus Torvalds  *	too long an error code of -EINVAL is returned. If the copy gives
1881da177e4SLinus Torvalds  *	invalid addresses -EFAULT is returned. On a success 0 is returned.
1891da177e4SLinus Torvalds  */
1901da177e4SLinus Torvalds 
191230b1839SYOSHIFUJI Hideaki int move_addr_to_kernel(void __user *uaddr, int ulen, struct sockaddr *kaddr)
1921da177e4SLinus Torvalds {
193230b1839SYOSHIFUJI Hideaki 	if (ulen < 0 || ulen > sizeof(struct sockaddr_storage))
1941da177e4SLinus Torvalds 		return -EINVAL;
1951da177e4SLinus Torvalds 	if (ulen == 0)
1961da177e4SLinus Torvalds 		return 0;
1971da177e4SLinus Torvalds 	if (copy_from_user(kaddr, uaddr, ulen))
1981da177e4SLinus Torvalds 		return -EFAULT;
1993ec3b2fbSDavid Woodhouse 	return audit_sockaddr(ulen, kaddr);
2001da177e4SLinus Torvalds }
2011da177e4SLinus Torvalds 
2021da177e4SLinus Torvalds /**
2031da177e4SLinus Torvalds  *	move_addr_to_user	-	copy an address to user space
2041da177e4SLinus Torvalds  *	@kaddr: kernel space address
2051da177e4SLinus Torvalds  *	@klen: length of address in kernel
2061da177e4SLinus Torvalds  *	@uaddr: user space address
2071da177e4SLinus Torvalds  *	@ulen: pointer to user length field
2081da177e4SLinus Torvalds  *
2091da177e4SLinus Torvalds  *	The value pointed to by ulen on entry is the buffer length available.
2101da177e4SLinus Torvalds  *	This is overwritten with the buffer space used. -EINVAL is returned
2111da177e4SLinus Torvalds  *	if an overlong buffer is specified or a negative buffer size. -EFAULT
2121da177e4SLinus Torvalds  *	is returned if either the buffer or the length field are not
2131da177e4SLinus Torvalds  *	accessible.
2141da177e4SLinus Torvalds  *	After copying the data up to the limit the user specifies, the true
2151da177e4SLinus Torvalds  *	length of the data is written over the length limit the user
2161da177e4SLinus Torvalds  *	specified. Zero is returned for a success.
2171da177e4SLinus Torvalds  */
2181da177e4SLinus Torvalds 
219230b1839SYOSHIFUJI Hideaki int move_addr_to_user(struct sockaddr *kaddr, int klen, void __user *uaddr,
22089bddce5SStephen Hemminger 		      int __user *ulen)
2211da177e4SLinus Torvalds {
2221da177e4SLinus Torvalds 	int err;
2231da177e4SLinus Torvalds 	int len;
2241da177e4SLinus Torvalds 
22589bddce5SStephen Hemminger 	err = get_user(len, ulen);
22689bddce5SStephen Hemminger 	if (err)
2271da177e4SLinus Torvalds 		return err;
2281da177e4SLinus Torvalds 	if (len > klen)
2291da177e4SLinus Torvalds 		len = klen;
230230b1839SYOSHIFUJI Hideaki 	if (len < 0 || len > sizeof(struct sockaddr_storage))
2311da177e4SLinus Torvalds 		return -EINVAL;
23289bddce5SStephen Hemminger 	if (len) {
233d6fe3945SSteve Grubb 		if (audit_sockaddr(klen, kaddr))
234d6fe3945SSteve Grubb 			return -ENOMEM;
2351da177e4SLinus Torvalds 		if (copy_to_user(uaddr, kaddr, len))
2361da177e4SLinus Torvalds 			return -EFAULT;
2371da177e4SLinus Torvalds 	}
2381da177e4SLinus Torvalds 	/*
2391da177e4SLinus Torvalds 	 *      "fromlen shall refer to the value before truncation.."
2401da177e4SLinus Torvalds 	 *                      1003.1g
2411da177e4SLinus Torvalds 	 */
2421da177e4SLinus Torvalds 	return __put_user(klen, ulen);
2431da177e4SLinus Torvalds }
2441da177e4SLinus Torvalds 
245e18b890bSChristoph Lameter static struct kmem_cache *sock_inode_cachep __read_mostly;
2461da177e4SLinus Torvalds 
2471da177e4SLinus Torvalds static struct inode *sock_alloc_inode(struct super_block *sb)
2481da177e4SLinus Torvalds {
2491da177e4SLinus Torvalds 	struct socket_alloc *ei;
25089bddce5SStephen Hemminger 
251e94b1766SChristoph Lameter 	ei = kmem_cache_alloc(sock_inode_cachep, GFP_KERNEL);
2521da177e4SLinus Torvalds 	if (!ei)
2531da177e4SLinus Torvalds 		return NULL;
2541da177e4SLinus Torvalds 	init_waitqueue_head(&ei->socket.wait);
2551da177e4SLinus Torvalds 
2561da177e4SLinus Torvalds 	ei->socket.fasync_list = NULL;
2571da177e4SLinus Torvalds 	ei->socket.state = SS_UNCONNECTED;
2581da177e4SLinus Torvalds 	ei->socket.flags = 0;
2591da177e4SLinus Torvalds 	ei->socket.ops = NULL;
2601da177e4SLinus Torvalds 	ei->socket.sk = NULL;
2611da177e4SLinus Torvalds 	ei->socket.file = NULL;
2621da177e4SLinus Torvalds 
2631da177e4SLinus Torvalds 	return &ei->vfs_inode;
2641da177e4SLinus Torvalds }
2651da177e4SLinus Torvalds 
2661da177e4SLinus Torvalds static void sock_destroy_inode(struct inode *inode)
2671da177e4SLinus Torvalds {
2681da177e4SLinus Torvalds 	kmem_cache_free(sock_inode_cachep,
2691da177e4SLinus Torvalds 			container_of(inode, struct socket_alloc, vfs_inode));
2701da177e4SLinus Torvalds }
2711da177e4SLinus Torvalds 
27251cc5068SAlexey Dobriyan static void init_once(void *foo)
2731da177e4SLinus Torvalds {
2741da177e4SLinus Torvalds 	struct socket_alloc *ei = (struct socket_alloc *)foo;
2751da177e4SLinus Torvalds 
2761da177e4SLinus Torvalds 	inode_init_once(&ei->vfs_inode);
2771da177e4SLinus Torvalds }
2781da177e4SLinus Torvalds 
2791da177e4SLinus Torvalds static int init_inodecache(void)
2801da177e4SLinus Torvalds {
2811da177e4SLinus Torvalds 	sock_inode_cachep = kmem_cache_create("sock_inode_cache",
2821da177e4SLinus Torvalds 					      sizeof(struct socket_alloc),
28389bddce5SStephen Hemminger 					      0,
28489bddce5SStephen Hemminger 					      (SLAB_HWCACHE_ALIGN |
28589bddce5SStephen Hemminger 					       SLAB_RECLAIM_ACCOUNT |
286fffb60f9SPaul Jackson 					       SLAB_MEM_SPREAD),
28720c2df83SPaul Mundt 					      init_once);
2881da177e4SLinus Torvalds 	if (sock_inode_cachep == NULL)
2891da177e4SLinus Torvalds 		return -ENOMEM;
2901da177e4SLinus Torvalds 	return 0;
2911da177e4SLinus Torvalds }
2921da177e4SLinus Torvalds 
293b87221deSAlexey Dobriyan static const struct super_operations sockfs_ops = {
2941da177e4SLinus Torvalds 	.alloc_inode =	sock_alloc_inode,
2951da177e4SLinus Torvalds 	.destroy_inode =sock_destroy_inode,
2961da177e4SLinus Torvalds 	.statfs =	simple_statfs,
2971da177e4SLinus Torvalds };
2981da177e4SLinus Torvalds 
299454e2398SDavid Howells static int sockfs_get_sb(struct file_system_type *fs_type,
30089bddce5SStephen Hemminger 			 int flags, const char *dev_name, void *data,
30189bddce5SStephen Hemminger 			 struct vfsmount *mnt)
3021da177e4SLinus Torvalds {
303454e2398SDavid Howells 	return get_sb_pseudo(fs_type, "socket:", &sockfs_ops, SOCKFS_MAGIC,
304454e2398SDavid Howells 			     mnt);
3051da177e4SLinus Torvalds }
3061da177e4SLinus Torvalds 
307ba89966cSEric Dumazet static struct vfsmount *sock_mnt __read_mostly;
3081da177e4SLinus Torvalds 
3091da177e4SLinus Torvalds static struct file_system_type sock_fs_type = {
3101da177e4SLinus Torvalds 	.name =		"sockfs",
3111da177e4SLinus Torvalds 	.get_sb =	sockfs_get_sb,
3121da177e4SLinus Torvalds 	.kill_sb =	kill_anon_super,
3131da177e4SLinus Torvalds };
31489bddce5SStephen Hemminger 
3151da177e4SLinus Torvalds static int sockfs_delete_dentry(struct dentry *dentry)
3161da177e4SLinus Torvalds {
317304e61e6SEric Dumazet 	/*
318304e61e6SEric Dumazet 	 * At creation time, we pretended this dentry was hashed
319304e61e6SEric Dumazet 	 * (by clearing DCACHE_UNHASHED bit in d_flags)
320304e61e6SEric Dumazet 	 * At delete time, we restore the truth : not hashed.
321304e61e6SEric Dumazet 	 * (so that dput() can proceed correctly)
322304e61e6SEric Dumazet 	 */
323304e61e6SEric Dumazet 	dentry->d_flags |= DCACHE_UNHASHED;
324304e61e6SEric Dumazet 	return 0;
3251da177e4SLinus Torvalds }
326c23fbb6bSEric Dumazet 
327c23fbb6bSEric Dumazet /*
328c23fbb6bSEric Dumazet  * sockfs_dname() is called from d_path().
329c23fbb6bSEric Dumazet  */
330c23fbb6bSEric Dumazet static char *sockfs_dname(struct dentry *dentry, char *buffer, int buflen)
331c23fbb6bSEric Dumazet {
332c23fbb6bSEric Dumazet 	return dynamic_dname(dentry, buffer, buflen, "socket:[%lu]",
333c23fbb6bSEric Dumazet 				dentry->d_inode->i_ino);
334c23fbb6bSEric Dumazet }
335c23fbb6bSEric Dumazet 
3363ba13d17SAl Viro static const struct dentry_operations sockfs_dentry_operations = {
3371da177e4SLinus Torvalds 	.d_delete = sockfs_delete_dentry,
338c23fbb6bSEric Dumazet 	.d_dname  = sockfs_dname,
3391da177e4SLinus Torvalds };
3401da177e4SLinus Torvalds 
3411da177e4SLinus Torvalds /*
3421da177e4SLinus Torvalds  *	Obtains the first available file descriptor and sets it up for use.
3431da177e4SLinus Torvalds  *
34439d8c1b6SDavid S. Miller  *	These functions create file structures and maps them to fd space
34539d8c1b6SDavid S. Miller  *	of the current process. On success it returns file descriptor
3461da177e4SLinus Torvalds  *	and file struct implicitly stored in sock->file.
3471da177e4SLinus Torvalds  *	Note that another thread may close file descriptor before we return
3481da177e4SLinus Torvalds  *	from this function. We use the fact that now we do not refer
3491da177e4SLinus Torvalds  *	to socket after mapping. If one day we will need it, this
3501da177e4SLinus Torvalds  *	function will increment ref. count on file by 1.
3511da177e4SLinus Torvalds  *
3521da177e4SLinus Torvalds  *	In any case returned fd MAY BE not valid!
3531da177e4SLinus Torvalds  *	This race condition is unavoidable
3541da177e4SLinus Torvalds  *	with shared fd spaces, we cannot solve it inside kernel,
3551da177e4SLinus Torvalds  *	but we take care of internal coherence yet.
3561da177e4SLinus Torvalds  */
3571da177e4SLinus Torvalds 
3587cbe66b6SAl Viro static int sock_alloc_file(struct socket *sock, struct file **f, int flags)
3591da177e4SLinus Torvalds {
3607cbe66b6SAl Viro 	struct qstr name = { .name = "" };
3617cbe66b6SAl Viro 	struct dentry *dentry;
3627cbe66b6SAl Viro 	struct file *file;
3631da177e4SLinus Torvalds 	int fd;
3641da177e4SLinus Torvalds 
365a677a039SUlrich Drepper 	fd = get_unused_fd_flags(flags);
3667cbe66b6SAl Viro 	if (unlikely(fd < 0))
3677cbe66b6SAl Viro 		return fd;
3681da177e4SLinus Torvalds 
3697cbe66b6SAl Viro 	file = get_empty_filp();
3707cbe66b6SAl Viro 
37139d8c1b6SDavid S. Miller 	if (unlikely(!file)) {
3721da177e4SLinus Torvalds 		put_unused_fd(fd);
37339d8c1b6SDavid S. Miller 		return -ENFILE;
3741da177e4SLinus Torvalds 	}
3751da177e4SLinus Torvalds 
376ce8d2cdfSDave Hansen 	dentry = d_alloc(sock_mnt->mnt_sb->s_root, &name);
3777cbe66b6SAl Viro 	if (unlikely(!dentry)) {
3787cbe66b6SAl Viro 		put_filp(file);
3797cbe66b6SAl Viro 		put_unused_fd(fd);
38039d8c1b6SDavid S. Miller 		return -ENOMEM;
3817cbe66b6SAl Viro 	}
38239d8c1b6SDavid S. Miller 
383ce8d2cdfSDave Hansen 	dentry->d_op = &sockfs_dentry_operations;
384304e61e6SEric Dumazet 	/*
385304e61e6SEric Dumazet 	 * We dont want to push this dentry into global dentry hash table.
386304e61e6SEric Dumazet 	 * We pretend dentry is already hashed, by unsetting DCACHE_UNHASHED
387304e61e6SEric Dumazet 	 * This permits a working /proc/$pid/fd/XXX on sockets
388304e61e6SEric Dumazet 	 */
389ce8d2cdfSDave Hansen 	dentry->d_flags &= ~DCACHE_UNHASHED;
390ce8d2cdfSDave Hansen 	d_instantiate(dentry, SOCK_INODE(sock));
3911da177e4SLinus Torvalds 
3921da177e4SLinus Torvalds 	sock->file = file;
393ce8d2cdfSDave Hansen 	init_file(file, sock_mnt, dentry, FMODE_READ | FMODE_WRITE,
394ce8d2cdfSDave Hansen 		  &socket_file_ops);
395ce8d2cdfSDave Hansen 	SOCK_INODE(sock)->i_fop = &socket_file_ops;
39677d27200SUlrich Drepper 	file->f_flags = O_RDWR | (flags & O_NONBLOCK);
3971da177e4SLinus Torvalds 	file->f_pos = 0;
39807dc3f07SBenjamin LaHaise 	file->private_data = sock;
39939d8c1b6SDavid S. Miller 
4007cbe66b6SAl Viro 	*f = file;
4017cbe66b6SAl Viro 	return fd;
4021da177e4SLinus Torvalds }
4031da177e4SLinus Torvalds 
404a677a039SUlrich Drepper int sock_map_fd(struct socket *sock, int flags)
40539d8c1b6SDavid S. Miller {
40639d8c1b6SDavid S. Miller 	struct file *newfile;
4077cbe66b6SAl Viro 	int fd = sock_alloc_file(sock, &newfile, flags);
40839d8c1b6SDavid S. Miller 
4097cbe66b6SAl Viro 	if (likely(fd >= 0))
41039d8c1b6SDavid S. Miller 		fd_install(fd, newfile);
4117cbe66b6SAl Viro 
4121da177e4SLinus Torvalds 	return fd;
4131da177e4SLinus Torvalds }
4141da177e4SLinus Torvalds 
4156cb153caSBenjamin LaHaise static struct socket *sock_from_file(struct file *file, int *err)
4166cb153caSBenjamin LaHaise {
4176cb153caSBenjamin LaHaise 	if (file->f_op == &socket_file_ops)
4186cb153caSBenjamin LaHaise 		return file->private_data;	/* set in sock_map_fd */
4196cb153caSBenjamin LaHaise 
4206cb153caSBenjamin LaHaise 	*err = -ENOTSOCK;
4216cb153caSBenjamin LaHaise 	return NULL;
4226cb153caSBenjamin LaHaise }
4236cb153caSBenjamin LaHaise 
4241da177e4SLinus Torvalds /**
4251da177e4SLinus Torvalds  *	sockfd_lookup	- 	Go from a file number to its socket slot
4261da177e4SLinus Torvalds  *	@fd: file handle
4271da177e4SLinus Torvalds  *	@err: pointer to an error code return
4281da177e4SLinus Torvalds  *
4291da177e4SLinus Torvalds  *	The file handle passed in is locked and the socket it is bound
4301da177e4SLinus Torvalds  *	too is returned. If an error occurs the err pointer is overwritten
4311da177e4SLinus Torvalds  *	with a negative errno code and NULL is returned. The function checks
4321da177e4SLinus Torvalds  *	for both invalid handles and passing a handle which is not a socket.
4331da177e4SLinus Torvalds  *
4341da177e4SLinus Torvalds  *	On a success the socket object pointer is returned.
4351da177e4SLinus Torvalds  */
4361da177e4SLinus Torvalds 
4371da177e4SLinus Torvalds struct socket *sockfd_lookup(int fd, int *err)
4381da177e4SLinus Torvalds {
4391da177e4SLinus Torvalds 	struct file *file;
4401da177e4SLinus Torvalds 	struct socket *sock;
4411da177e4SLinus Torvalds 
44289bddce5SStephen Hemminger 	file = fget(fd);
44389bddce5SStephen Hemminger 	if (!file) {
4441da177e4SLinus Torvalds 		*err = -EBADF;
4451da177e4SLinus Torvalds 		return NULL;
4461da177e4SLinus Torvalds 	}
44789bddce5SStephen Hemminger 
4486cb153caSBenjamin LaHaise 	sock = sock_from_file(file, err);
4496cb153caSBenjamin LaHaise 	if (!sock)
4501da177e4SLinus Torvalds 		fput(file);
4516cb153caSBenjamin LaHaise 	return sock;
4521da177e4SLinus Torvalds }
4531da177e4SLinus Torvalds 
4546cb153caSBenjamin LaHaise static struct socket *sockfd_lookup_light(int fd, int *err, int *fput_needed)
4556cb153caSBenjamin LaHaise {
4566cb153caSBenjamin LaHaise 	struct file *file;
4576cb153caSBenjamin LaHaise 	struct socket *sock;
4586cb153caSBenjamin LaHaise 
4593672558cSHua Zhong 	*err = -EBADF;
4606cb153caSBenjamin LaHaise 	file = fget_light(fd, fput_needed);
4616cb153caSBenjamin LaHaise 	if (file) {
4626cb153caSBenjamin LaHaise 		sock = sock_from_file(file, err);
4636cb153caSBenjamin LaHaise 		if (sock)
4641da177e4SLinus Torvalds 			return sock;
4656cb153caSBenjamin LaHaise 		fput_light(file, *fput_needed);
4666cb153caSBenjamin LaHaise 	}
4676cb153caSBenjamin LaHaise 	return NULL;
4681da177e4SLinus Torvalds }
4691da177e4SLinus Torvalds 
4701da177e4SLinus Torvalds /**
4711da177e4SLinus Torvalds  *	sock_alloc	-	allocate a socket
4721da177e4SLinus Torvalds  *
4731da177e4SLinus Torvalds  *	Allocate a new inode and socket object. The two are bound together
4741da177e4SLinus Torvalds  *	and initialised. The socket is then returned. If we are out of inodes
4751da177e4SLinus Torvalds  *	NULL is returned.
4761da177e4SLinus Torvalds  */
4771da177e4SLinus Torvalds 
4781da177e4SLinus Torvalds static struct socket *sock_alloc(void)
4791da177e4SLinus Torvalds {
4801da177e4SLinus Torvalds 	struct inode *inode;
4811da177e4SLinus Torvalds 	struct socket *sock;
4821da177e4SLinus Torvalds 
4831da177e4SLinus Torvalds 	inode = new_inode(sock_mnt->mnt_sb);
4841da177e4SLinus Torvalds 	if (!inode)
4851da177e4SLinus Torvalds 		return NULL;
4861da177e4SLinus Torvalds 
4871da177e4SLinus Torvalds 	sock = SOCKET_I(inode);
4881da177e4SLinus Torvalds 
48929a020d3SEric Dumazet 	kmemcheck_annotate_bitfield(sock, type);
4901da177e4SLinus Torvalds 	inode->i_mode = S_IFSOCK | S_IRWXUGO;
4918192b0c4SDavid Howells 	inode->i_uid = current_fsuid();
4928192b0c4SDavid Howells 	inode->i_gid = current_fsgid();
4931da177e4SLinus Torvalds 
4944e69489aSEric Dumazet 	percpu_add(sockets_in_use, 1);
4951da177e4SLinus Torvalds 	return sock;
4961da177e4SLinus Torvalds }
4971da177e4SLinus Torvalds 
4981da177e4SLinus Torvalds /*
4991da177e4SLinus Torvalds  *	In theory you can't get an open on this inode, but /proc provides
5001da177e4SLinus Torvalds  *	a back door. Remember to keep it shut otherwise you'll let the
5011da177e4SLinus Torvalds  *	creepy crawlies in.
5021da177e4SLinus Torvalds  */
5031da177e4SLinus Torvalds 
5041da177e4SLinus Torvalds static int sock_no_open(struct inode *irrelevant, struct file *dontcare)
5051da177e4SLinus Torvalds {
5061da177e4SLinus Torvalds 	return -ENXIO;
5071da177e4SLinus Torvalds }
5081da177e4SLinus Torvalds 
5094b6f5d20SArjan van de Ven const struct file_operations bad_sock_fops = {
5101da177e4SLinus Torvalds 	.owner = THIS_MODULE,
5111da177e4SLinus Torvalds 	.open = sock_no_open,
5121da177e4SLinus Torvalds };
5131da177e4SLinus Torvalds 
5141da177e4SLinus Torvalds /**
5151da177e4SLinus Torvalds  *	sock_release	-	close a socket
5161da177e4SLinus Torvalds  *	@sock: socket to close
5171da177e4SLinus Torvalds  *
5181da177e4SLinus Torvalds  *	The socket is released from the protocol stack if it has a release
5191da177e4SLinus Torvalds  *	callback, and the inode is then released if the socket is bound to
5201da177e4SLinus Torvalds  *	an inode not a file.
5211da177e4SLinus Torvalds  */
5221da177e4SLinus Torvalds 
5231da177e4SLinus Torvalds void sock_release(struct socket *sock)
5241da177e4SLinus Torvalds {
5251da177e4SLinus Torvalds 	if (sock->ops) {
5261da177e4SLinus Torvalds 		struct module *owner = sock->ops->owner;
5271da177e4SLinus Torvalds 
5281da177e4SLinus Torvalds 		sock->ops->release(sock);
5291da177e4SLinus Torvalds 		sock->ops = NULL;
5301da177e4SLinus Torvalds 		module_put(owner);
5311da177e4SLinus Torvalds 	}
5321da177e4SLinus Torvalds 
5331da177e4SLinus Torvalds 	if (sock->fasync_list)
5341da177e4SLinus Torvalds 		printk(KERN_ERR "sock_release: fasync list not empty!\n");
5351da177e4SLinus Torvalds 
5364e69489aSEric Dumazet 	percpu_sub(sockets_in_use, 1);
5371da177e4SLinus Torvalds 	if (!sock->file) {
5381da177e4SLinus Torvalds 		iput(SOCK_INODE(sock));
5391da177e4SLinus Torvalds 		return;
5401da177e4SLinus Torvalds 	}
5411da177e4SLinus Torvalds 	sock->file = NULL;
5421da177e4SLinus Torvalds }
5431da177e4SLinus Torvalds 
54420d49473SPatrick Ohly int sock_tx_timestamp(struct msghdr *msg, struct sock *sk,
54520d49473SPatrick Ohly 		      union skb_shared_tx *shtx)
54620d49473SPatrick Ohly {
54720d49473SPatrick Ohly 	shtx->flags = 0;
54820d49473SPatrick Ohly 	if (sock_flag(sk, SOCK_TIMESTAMPING_TX_HARDWARE))
54920d49473SPatrick Ohly 		shtx->hardware = 1;
55020d49473SPatrick Ohly 	if (sock_flag(sk, SOCK_TIMESTAMPING_TX_SOFTWARE))
55120d49473SPatrick Ohly 		shtx->software = 1;
55220d49473SPatrick Ohly 	return 0;
55320d49473SPatrick Ohly }
55420d49473SPatrick Ohly EXPORT_SYMBOL(sock_tx_timestamp);
55520d49473SPatrick Ohly 
5561da177e4SLinus Torvalds static inline int __sock_sendmsg(struct kiocb *iocb, struct socket *sock,
5571da177e4SLinus Torvalds 				 struct msghdr *msg, size_t size)
5581da177e4SLinus Torvalds {
5591da177e4SLinus Torvalds 	struct sock_iocb *si = kiocb_to_siocb(iocb);
5601da177e4SLinus Torvalds 	int err;
5611da177e4SLinus Torvalds 
5621da177e4SLinus Torvalds 	si->sock = sock;
5631da177e4SLinus Torvalds 	si->scm = NULL;
5641da177e4SLinus Torvalds 	si->msg = msg;
5651da177e4SLinus Torvalds 	si->size = size;
5661da177e4SLinus Torvalds 
5671da177e4SLinus Torvalds 	err = security_socket_sendmsg(sock, msg, size);
5681da177e4SLinus Torvalds 	if (err)
5691da177e4SLinus Torvalds 		return err;
5701da177e4SLinus Torvalds 
5711da177e4SLinus Torvalds 	return sock->ops->sendmsg(iocb, sock, msg, size);
5721da177e4SLinus Torvalds }
5731da177e4SLinus Torvalds 
5741da177e4SLinus Torvalds int sock_sendmsg(struct socket *sock, struct msghdr *msg, size_t size)
5751da177e4SLinus Torvalds {
5761da177e4SLinus Torvalds 	struct kiocb iocb;
5771da177e4SLinus Torvalds 	struct sock_iocb siocb;
5781da177e4SLinus Torvalds 	int ret;
5791da177e4SLinus Torvalds 
5801da177e4SLinus Torvalds 	init_sync_kiocb(&iocb, NULL);
5811da177e4SLinus Torvalds 	iocb.private = &siocb;
5821da177e4SLinus Torvalds 	ret = __sock_sendmsg(&iocb, sock, msg, size);
5831da177e4SLinus Torvalds 	if (-EIOCBQUEUED == ret)
5841da177e4SLinus Torvalds 		ret = wait_on_sync_kiocb(&iocb);
5851da177e4SLinus Torvalds 	return ret;
5861da177e4SLinus Torvalds }
5871da177e4SLinus Torvalds 
5881da177e4SLinus Torvalds int kernel_sendmsg(struct socket *sock, struct msghdr *msg,
5891da177e4SLinus Torvalds 		   struct kvec *vec, size_t num, size_t size)
5901da177e4SLinus Torvalds {
5911da177e4SLinus Torvalds 	mm_segment_t oldfs = get_fs();
5921da177e4SLinus Torvalds 	int result;
5931da177e4SLinus Torvalds 
5941da177e4SLinus Torvalds 	set_fs(KERNEL_DS);
5951da177e4SLinus Torvalds 	/*
5961da177e4SLinus Torvalds 	 * the following is safe, since for compiler definitions of kvec and
5971da177e4SLinus Torvalds 	 * iovec are identical, yielding the same in-core layout and alignment
5981da177e4SLinus Torvalds 	 */
59989bddce5SStephen Hemminger 	msg->msg_iov = (struct iovec *)vec;
6001da177e4SLinus Torvalds 	msg->msg_iovlen = num;
6011da177e4SLinus Torvalds 	result = sock_sendmsg(sock, msg, size);
6021da177e4SLinus Torvalds 	set_fs(oldfs);
6031da177e4SLinus Torvalds 	return result;
6041da177e4SLinus Torvalds }
6051da177e4SLinus Torvalds 
60620d49473SPatrick Ohly static int ktime2ts(ktime_t kt, struct timespec *ts)
60720d49473SPatrick Ohly {
60820d49473SPatrick Ohly 	if (kt.tv64) {
60920d49473SPatrick Ohly 		*ts = ktime_to_timespec(kt);
61020d49473SPatrick Ohly 		return 1;
61120d49473SPatrick Ohly 	} else {
61220d49473SPatrick Ohly 		return 0;
61320d49473SPatrick Ohly 	}
61420d49473SPatrick Ohly }
61520d49473SPatrick Ohly 
61692f37fd2SEric Dumazet /*
61792f37fd2SEric Dumazet  * called from sock_recv_timestamp() if sock_flag(sk, SOCK_RCVTSTAMP)
61892f37fd2SEric Dumazet  */
61992f37fd2SEric Dumazet void __sock_recv_timestamp(struct msghdr *msg, struct sock *sk,
62092f37fd2SEric Dumazet 	struct sk_buff *skb)
62192f37fd2SEric Dumazet {
62220d49473SPatrick Ohly 	int need_software_tstamp = sock_flag(sk, SOCK_RCVTSTAMP);
62320d49473SPatrick Ohly 	struct timespec ts[3];
62420d49473SPatrick Ohly 	int empty = 1;
62520d49473SPatrick Ohly 	struct skb_shared_hwtstamps *shhwtstamps =
62620d49473SPatrick Ohly 		skb_hwtstamps(skb);
62792f37fd2SEric Dumazet 
62820d49473SPatrick Ohly 	/* Race occurred between timestamp enabling and packet
62920d49473SPatrick Ohly 	   receiving.  Fill in the current time for now. */
63020d49473SPatrick Ohly 	if (need_software_tstamp && skb->tstamp.tv64 == 0)
63120d49473SPatrick Ohly 		__net_timestamp(skb);
63220d49473SPatrick Ohly 
63320d49473SPatrick Ohly 	if (need_software_tstamp) {
63492f37fd2SEric Dumazet 		if (!sock_flag(sk, SOCK_RCVTSTAMPNS)) {
63592f37fd2SEric Dumazet 			struct timeval tv;
63620d49473SPatrick Ohly 			skb_get_timestamp(skb, &tv);
63720d49473SPatrick Ohly 			put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMP,
63820d49473SPatrick Ohly 				 sizeof(tv), &tv);
63992f37fd2SEric Dumazet 		} else {
64092f37fd2SEric Dumazet 			struct timespec ts;
64120d49473SPatrick Ohly 			skb_get_timestampns(skb, &ts);
64220d49473SPatrick Ohly 			put_cmsg(msg, SOL_SOCKET, SCM_TIMESTAMPNS,
64320d49473SPatrick Ohly 				 sizeof(ts), &ts);
64492f37fd2SEric Dumazet 		}
64592f37fd2SEric Dumazet 	}
64692f37fd2SEric Dumazet 
64720d49473SPatrick Ohly 
64820d49473SPatrick Ohly 	memset(ts, 0, sizeof(ts));
64920d49473SPatrick Ohly 	if (skb->tstamp.tv64 &&
65020d49473SPatrick Ohly 	    sock_flag(sk, SOCK_TIMESTAMPING_SOFTWARE)) {
65120d49473SPatrick Ohly 		skb_get_timestampns(skb, ts + 0);
65220d49473SPatrick Ohly 		empty = 0;
65320d49473SPatrick Ohly 	}
65420d49473SPatrick Ohly 	if (shhwtstamps) {
65520d49473SPatrick Ohly 		if (sock_flag(sk, SOCK_TIMESTAMPING_SYS_HARDWARE) &&
65620d49473SPatrick Ohly 		    ktime2ts(shhwtstamps->syststamp, ts + 1))
65720d49473SPatrick Ohly 			empty = 0;
65820d49473SPatrick Ohly 		if (sock_flag(sk, SOCK_TIMESTAMPING_RAW_HARDWARE) &&
65920d49473SPatrick Ohly 		    ktime2ts(shhwtstamps->hwtstamp, ts + 2))
66020d49473SPatrick Ohly 			empty = 0;
66120d49473SPatrick Ohly 	}
66220d49473SPatrick Ohly 	if (!empty)
66320d49473SPatrick Ohly 		put_cmsg(msg, SOL_SOCKET,
66420d49473SPatrick Ohly 			 SCM_TIMESTAMPING, sizeof(ts), &ts);
66520d49473SPatrick Ohly }
66620d49473SPatrick Ohly 
6677c81fd8bSArnaldo Carvalho de Melo EXPORT_SYMBOL_GPL(__sock_recv_timestamp);
6687c81fd8bSArnaldo Carvalho de Melo 
6693b885787SNeil Horman inline void sock_recv_drops(struct msghdr *msg, struct sock *sk, struct sk_buff *skb)
6703b885787SNeil Horman {
6713b885787SNeil Horman 	if (sock_flag(sk, SOCK_RXQ_OVFL) && skb && skb->dropcount)
6723b885787SNeil Horman 		put_cmsg(msg, SOL_SOCKET, SO_RXQ_OVFL,
6733b885787SNeil Horman 			sizeof(__u32), &skb->dropcount);
6743b885787SNeil Horman }
6753b885787SNeil Horman 
6763b885787SNeil Horman void sock_recv_ts_and_drops(struct msghdr *msg, struct sock *sk,
6773b885787SNeil Horman 	struct sk_buff *skb)
6783b885787SNeil Horman {
6793b885787SNeil Horman 	sock_recv_timestamp(msg, sk, skb);
6803b885787SNeil Horman 	sock_recv_drops(msg, sk, skb);
6813b885787SNeil Horman }
6823b885787SNeil Horman EXPORT_SYMBOL_GPL(sock_recv_ts_and_drops);
6833b885787SNeil Horman 
684a2e27255SArnaldo Carvalho de Melo static inline int __sock_recvmsg_nosec(struct kiocb *iocb, struct socket *sock,
6851da177e4SLinus Torvalds 				       struct msghdr *msg, size_t size, int flags)
6861da177e4SLinus Torvalds {
6871da177e4SLinus Torvalds 	struct sock_iocb *si = kiocb_to_siocb(iocb);
6881da177e4SLinus Torvalds 
6891da177e4SLinus Torvalds 	si->sock = sock;
6901da177e4SLinus Torvalds 	si->scm = NULL;
6911da177e4SLinus Torvalds 	si->msg = msg;
6921da177e4SLinus Torvalds 	si->size = size;
6931da177e4SLinus Torvalds 	si->flags = flags;
6941da177e4SLinus Torvalds 
6951da177e4SLinus Torvalds 	return sock->ops->recvmsg(iocb, sock, msg, size, flags);
6961da177e4SLinus Torvalds }
6971da177e4SLinus Torvalds 
698a2e27255SArnaldo Carvalho de Melo static inline int __sock_recvmsg(struct kiocb *iocb, struct socket *sock,
699a2e27255SArnaldo Carvalho de Melo 				 struct msghdr *msg, size_t size, int flags)
700a2e27255SArnaldo Carvalho de Melo {
701a2e27255SArnaldo Carvalho de Melo 	int err = security_socket_recvmsg(sock, msg, size, flags);
702a2e27255SArnaldo Carvalho de Melo 
703a2e27255SArnaldo Carvalho de Melo 	return err ?: __sock_recvmsg_nosec(iocb, sock, msg, size, flags);
704a2e27255SArnaldo Carvalho de Melo }
705a2e27255SArnaldo Carvalho de Melo 
7061da177e4SLinus Torvalds int sock_recvmsg(struct socket *sock, struct msghdr *msg,
7071da177e4SLinus Torvalds 		 size_t size, int flags)
7081da177e4SLinus Torvalds {
7091da177e4SLinus Torvalds 	struct kiocb iocb;
7101da177e4SLinus Torvalds 	struct sock_iocb siocb;
7111da177e4SLinus Torvalds 	int ret;
7121da177e4SLinus Torvalds 
7131da177e4SLinus Torvalds 	init_sync_kiocb(&iocb, NULL);
7141da177e4SLinus Torvalds 	iocb.private = &siocb;
7151da177e4SLinus Torvalds 	ret = __sock_recvmsg(&iocb, sock, msg, size, flags);
7161da177e4SLinus Torvalds 	if (-EIOCBQUEUED == ret)
7171da177e4SLinus Torvalds 		ret = wait_on_sync_kiocb(&iocb);
7181da177e4SLinus Torvalds 	return ret;
7191da177e4SLinus Torvalds }
7201da177e4SLinus Torvalds 
721a2e27255SArnaldo Carvalho de Melo static int sock_recvmsg_nosec(struct socket *sock, struct msghdr *msg,
722a2e27255SArnaldo Carvalho de Melo 			      size_t size, int flags)
723a2e27255SArnaldo Carvalho de Melo {
724a2e27255SArnaldo Carvalho de Melo 	struct kiocb iocb;
725a2e27255SArnaldo Carvalho de Melo 	struct sock_iocb siocb;
726a2e27255SArnaldo Carvalho de Melo 	int ret;
727a2e27255SArnaldo Carvalho de Melo 
728a2e27255SArnaldo Carvalho de Melo 	init_sync_kiocb(&iocb, NULL);
729a2e27255SArnaldo Carvalho de Melo 	iocb.private = &siocb;
730a2e27255SArnaldo Carvalho de Melo 	ret = __sock_recvmsg_nosec(&iocb, sock, msg, size, flags);
731a2e27255SArnaldo Carvalho de Melo 	if (-EIOCBQUEUED == ret)
732a2e27255SArnaldo Carvalho de Melo 		ret = wait_on_sync_kiocb(&iocb);
733a2e27255SArnaldo Carvalho de Melo 	return ret;
734a2e27255SArnaldo Carvalho de Melo }
735a2e27255SArnaldo Carvalho de Melo 
7361da177e4SLinus Torvalds int kernel_recvmsg(struct socket *sock, struct msghdr *msg,
73789bddce5SStephen Hemminger 		   struct kvec *vec, size_t num, size_t size, int flags)
7381da177e4SLinus Torvalds {
7391da177e4SLinus Torvalds 	mm_segment_t oldfs = get_fs();
7401da177e4SLinus Torvalds 	int result;
7411da177e4SLinus Torvalds 
7421da177e4SLinus Torvalds 	set_fs(KERNEL_DS);
7431da177e4SLinus Torvalds 	/*
7441da177e4SLinus Torvalds 	 * the following is safe, since for compiler definitions of kvec and
7451da177e4SLinus Torvalds 	 * iovec are identical, yielding the same in-core layout and alignment
7461da177e4SLinus Torvalds 	 */
74789bddce5SStephen Hemminger 	msg->msg_iov = (struct iovec *)vec, msg->msg_iovlen = num;
7481da177e4SLinus Torvalds 	result = sock_recvmsg(sock, msg, size, flags);
7491da177e4SLinus Torvalds 	set_fs(oldfs);
7501da177e4SLinus Torvalds 	return result;
7511da177e4SLinus Torvalds }
7521da177e4SLinus Torvalds 
7531da177e4SLinus Torvalds static void sock_aio_dtor(struct kiocb *iocb)
7541da177e4SLinus Torvalds {
7551da177e4SLinus Torvalds 	kfree(iocb->private);
7561da177e4SLinus Torvalds }
7571da177e4SLinus Torvalds 
75820380731SArnaldo Carvalho de Melo static ssize_t sock_sendpage(struct file *file, struct page *page,
7591da177e4SLinus Torvalds 			     int offset, size_t size, loff_t *ppos, int more)
7601da177e4SLinus Torvalds {
7611da177e4SLinus Torvalds 	struct socket *sock;
7621da177e4SLinus Torvalds 	int flags;
7631da177e4SLinus Torvalds 
764b69aee04SEric Dumazet 	sock = file->private_data;
7651da177e4SLinus Torvalds 
7661da177e4SLinus Torvalds 	flags = !(file->f_flags & O_NONBLOCK) ? 0 : MSG_DONTWAIT;
7671da177e4SLinus Torvalds 	if (more)
7681da177e4SLinus Torvalds 		flags |= MSG_MORE;
7691da177e4SLinus Torvalds 
770e6949583SLinus Torvalds 	return kernel_sendpage(sock, page, offset, size, flags);
7711da177e4SLinus Torvalds }
7721da177e4SLinus Torvalds 
7739c55e01cSJens Axboe static ssize_t sock_splice_read(struct file *file, loff_t *ppos,
7749c55e01cSJens Axboe 			        struct pipe_inode_info *pipe, size_t len,
7759c55e01cSJens Axboe 				unsigned int flags)
7769c55e01cSJens Axboe {
7779c55e01cSJens Axboe 	struct socket *sock = file->private_data;
7789c55e01cSJens Axboe 
779997b37daSRémi Denis-Courmont 	if (unlikely(!sock->ops->splice_read))
780997b37daSRémi Denis-Courmont 		return -EINVAL;
781997b37daSRémi Denis-Courmont 
7829c55e01cSJens Axboe 	return sock->ops->splice_read(sock, ppos, pipe, len, flags);
7839c55e01cSJens Axboe }
7849c55e01cSJens Axboe 
785ce1d4d3eSChristoph Hellwig static struct sock_iocb *alloc_sock_iocb(struct kiocb *iocb,
78689bddce5SStephen Hemminger 					 struct sock_iocb *siocb)
787ce1d4d3eSChristoph Hellwig {
788ce1d4d3eSChristoph Hellwig 	if (!is_sync_kiocb(iocb)) {
789ce1d4d3eSChristoph Hellwig 		siocb = kmalloc(sizeof(*siocb), GFP_KERNEL);
790ce1d4d3eSChristoph Hellwig 		if (!siocb)
791ce1d4d3eSChristoph Hellwig 			return NULL;
792ce1d4d3eSChristoph Hellwig 		iocb->ki_dtor = sock_aio_dtor;
793ce1d4d3eSChristoph Hellwig 	}
794ce1d4d3eSChristoph Hellwig 
795ce1d4d3eSChristoph Hellwig 	siocb->kiocb = iocb;
796ce1d4d3eSChristoph Hellwig 	iocb->private = siocb;
797ce1d4d3eSChristoph Hellwig 	return siocb;
798ce1d4d3eSChristoph Hellwig }
799ce1d4d3eSChristoph Hellwig 
800ce1d4d3eSChristoph Hellwig static ssize_t do_sock_read(struct msghdr *msg, struct kiocb *iocb,
801027445c3SBadari Pulavarty 		struct file *file, const struct iovec *iov,
80289bddce5SStephen Hemminger 		unsigned long nr_segs)
803ce1d4d3eSChristoph Hellwig {
804ce1d4d3eSChristoph Hellwig 	struct socket *sock = file->private_data;
805ce1d4d3eSChristoph Hellwig 	size_t size = 0;
806ce1d4d3eSChristoph Hellwig 	int i;
807ce1d4d3eSChristoph Hellwig 
808ce1d4d3eSChristoph Hellwig 	for (i = 0; i < nr_segs; i++)
809ce1d4d3eSChristoph Hellwig 		size += iov[i].iov_len;
810ce1d4d3eSChristoph Hellwig 
811ce1d4d3eSChristoph Hellwig 	msg->msg_name = NULL;
812ce1d4d3eSChristoph Hellwig 	msg->msg_namelen = 0;
813ce1d4d3eSChristoph Hellwig 	msg->msg_control = NULL;
814ce1d4d3eSChristoph Hellwig 	msg->msg_controllen = 0;
815ce1d4d3eSChristoph Hellwig 	msg->msg_iov = (struct iovec *)iov;
816ce1d4d3eSChristoph Hellwig 	msg->msg_iovlen = nr_segs;
817ce1d4d3eSChristoph Hellwig 	msg->msg_flags = (file->f_flags & O_NONBLOCK) ? MSG_DONTWAIT : 0;
818ce1d4d3eSChristoph Hellwig 
819ce1d4d3eSChristoph Hellwig 	return __sock_recvmsg(iocb, sock, msg, size, msg->msg_flags);
820ce1d4d3eSChristoph Hellwig }
821ce1d4d3eSChristoph Hellwig 
822027445c3SBadari Pulavarty static ssize_t sock_aio_read(struct kiocb *iocb, const struct iovec *iov,
823027445c3SBadari Pulavarty 				unsigned long nr_segs, loff_t pos)
824ce1d4d3eSChristoph Hellwig {
825ce1d4d3eSChristoph Hellwig 	struct sock_iocb siocb, *x;
826ce1d4d3eSChristoph Hellwig 
827ce1d4d3eSChristoph Hellwig 	if (pos != 0)
828ce1d4d3eSChristoph Hellwig 		return -ESPIPE;
829027445c3SBadari Pulavarty 
830027445c3SBadari Pulavarty 	if (iocb->ki_left == 0)	/* Match SYS5 behaviour */
831ce1d4d3eSChristoph Hellwig 		return 0;
832ce1d4d3eSChristoph Hellwig 
833027445c3SBadari Pulavarty 
834027445c3SBadari Pulavarty 	x = alloc_sock_iocb(iocb, &siocb);
835ce1d4d3eSChristoph Hellwig 	if (!x)
836ce1d4d3eSChristoph Hellwig 		return -ENOMEM;
837027445c3SBadari Pulavarty 	return do_sock_read(&x->async_msg, iocb, iocb->ki_filp, iov, nr_segs);
838ce1d4d3eSChristoph Hellwig }
839ce1d4d3eSChristoph Hellwig 
840ce1d4d3eSChristoph Hellwig static ssize_t do_sock_write(struct msghdr *msg, struct kiocb *iocb,
841027445c3SBadari Pulavarty 			struct file *file, const struct iovec *iov,
84289bddce5SStephen Hemminger 			unsigned long nr_segs)
843ce1d4d3eSChristoph Hellwig {
844ce1d4d3eSChristoph Hellwig 	struct socket *sock = file->private_data;
845ce1d4d3eSChristoph Hellwig 	size_t size = 0;
846ce1d4d3eSChristoph Hellwig 	int i;
847ce1d4d3eSChristoph Hellwig 
848ce1d4d3eSChristoph Hellwig 	for (i = 0; i < nr_segs; i++)
849ce1d4d3eSChristoph Hellwig 		size += iov[i].iov_len;
850ce1d4d3eSChristoph Hellwig 
851ce1d4d3eSChristoph Hellwig 	msg->msg_name = NULL;
852ce1d4d3eSChristoph Hellwig 	msg->msg_namelen = 0;
853ce1d4d3eSChristoph Hellwig 	msg->msg_control = NULL;
854ce1d4d3eSChristoph Hellwig 	msg->msg_controllen = 0;
855ce1d4d3eSChristoph Hellwig 	msg->msg_iov = (struct iovec *)iov;
856ce1d4d3eSChristoph Hellwig 	msg->msg_iovlen = nr_segs;
857ce1d4d3eSChristoph Hellwig 	msg->msg_flags = (file->f_flags & O_NONBLOCK) ? MSG_DONTWAIT : 0;
858ce1d4d3eSChristoph Hellwig 	if (sock->type == SOCK_SEQPACKET)
859ce1d4d3eSChristoph Hellwig 		msg->msg_flags |= MSG_EOR;
860ce1d4d3eSChristoph Hellwig 
861ce1d4d3eSChristoph Hellwig 	return __sock_sendmsg(iocb, sock, msg, size);
862ce1d4d3eSChristoph Hellwig }
863ce1d4d3eSChristoph Hellwig 
864027445c3SBadari Pulavarty static ssize_t sock_aio_write(struct kiocb *iocb, const struct iovec *iov,
865027445c3SBadari Pulavarty 			  unsigned long nr_segs, loff_t pos)
8661da177e4SLinus Torvalds {
867ce1d4d3eSChristoph Hellwig 	struct sock_iocb siocb, *x;
8681da177e4SLinus Torvalds 
869ce1d4d3eSChristoph Hellwig 	if (pos != 0)
870ce1d4d3eSChristoph Hellwig 		return -ESPIPE;
871027445c3SBadari Pulavarty 
872027445c3SBadari Pulavarty 	x = alloc_sock_iocb(iocb, &siocb);
873ce1d4d3eSChristoph Hellwig 	if (!x)
874ce1d4d3eSChristoph Hellwig 		return -ENOMEM;
875ce1d4d3eSChristoph Hellwig 
876027445c3SBadari Pulavarty 	return do_sock_write(&x->async_msg, iocb, iocb->ki_filp, iov, nr_segs);
8771da177e4SLinus Torvalds }
8781da177e4SLinus Torvalds 
8791da177e4SLinus Torvalds /*
8801da177e4SLinus Torvalds  * Atomic setting of ioctl hooks to avoid race
8811da177e4SLinus Torvalds  * with module unload.
8821da177e4SLinus Torvalds  */
8831da177e4SLinus Torvalds 
8844a3e2f71SArjan van de Ven static DEFINE_MUTEX(br_ioctl_mutex);
885881d966bSEric W. Biederman static int (*br_ioctl_hook) (struct net *, unsigned int cmd, void __user *arg) = NULL;
8861da177e4SLinus Torvalds 
887881d966bSEric W. Biederman void brioctl_set(int (*hook) (struct net *, unsigned int, void __user *))
8881da177e4SLinus Torvalds {
8894a3e2f71SArjan van de Ven 	mutex_lock(&br_ioctl_mutex);
8901da177e4SLinus Torvalds 	br_ioctl_hook = hook;
8914a3e2f71SArjan van de Ven 	mutex_unlock(&br_ioctl_mutex);
8921da177e4SLinus Torvalds }
89389bddce5SStephen Hemminger 
8941da177e4SLinus Torvalds EXPORT_SYMBOL(brioctl_set);
8951da177e4SLinus Torvalds 
8964a3e2f71SArjan van de Ven static DEFINE_MUTEX(vlan_ioctl_mutex);
897881d966bSEric W. Biederman static int (*vlan_ioctl_hook) (struct net *, void __user *arg);
8981da177e4SLinus Torvalds 
899881d966bSEric W. Biederman void vlan_ioctl_set(int (*hook) (struct net *, void __user *))
9001da177e4SLinus Torvalds {
9014a3e2f71SArjan van de Ven 	mutex_lock(&vlan_ioctl_mutex);
9021da177e4SLinus Torvalds 	vlan_ioctl_hook = hook;
9034a3e2f71SArjan van de Ven 	mutex_unlock(&vlan_ioctl_mutex);
9041da177e4SLinus Torvalds }
90589bddce5SStephen Hemminger 
9061da177e4SLinus Torvalds EXPORT_SYMBOL(vlan_ioctl_set);
9071da177e4SLinus Torvalds 
9084a3e2f71SArjan van de Ven static DEFINE_MUTEX(dlci_ioctl_mutex);
9091da177e4SLinus Torvalds static int (*dlci_ioctl_hook) (unsigned int, void __user *);
9101da177e4SLinus Torvalds 
9111da177e4SLinus Torvalds void dlci_ioctl_set(int (*hook) (unsigned int, void __user *))
9121da177e4SLinus Torvalds {
9134a3e2f71SArjan van de Ven 	mutex_lock(&dlci_ioctl_mutex);
9141da177e4SLinus Torvalds 	dlci_ioctl_hook = hook;
9154a3e2f71SArjan van de Ven 	mutex_unlock(&dlci_ioctl_mutex);
9161da177e4SLinus Torvalds }
91789bddce5SStephen Hemminger 
9181da177e4SLinus Torvalds EXPORT_SYMBOL(dlci_ioctl_set);
9191da177e4SLinus Torvalds 
9206b96018bSArnd Bergmann static long sock_do_ioctl(struct net *net, struct socket *sock,
9216b96018bSArnd Bergmann 				 unsigned int cmd, unsigned long arg)
9226b96018bSArnd Bergmann {
9236b96018bSArnd Bergmann 	int err;
9246b96018bSArnd Bergmann 	void __user *argp = (void __user *)arg;
9256b96018bSArnd Bergmann 
9266b96018bSArnd Bergmann 	err = sock->ops->ioctl(sock, cmd, arg);
9276b96018bSArnd Bergmann 
9286b96018bSArnd Bergmann 	/*
9296b96018bSArnd Bergmann 	 * If this ioctl is unknown try to hand it down
9306b96018bSArnd Bergmann 	 * to the NIC driver.
9316b96018bSArnd Bergmann 	 */
9326b96018bSArnd Bergmann 	if (err == -ENOIOCTLCMD)
9336b96018bSArnd Bergmann 		err = dev_ioctl(net, cmd, argp);
9346b96018bSArnd Bergmann 
9356b96018bSArnd Bergmann 	return err;
9366b96018bSArnd Bergmann }
9376b96018bSArnd Bergmann 
9381da177e4SLinus Torvalds /*
9391da177e4SLinus Torvalds  *	With an ioctl, arg may well be a user mode pointer, but we don't know
9401da177e4SLinus Torvalds  *	what to do with it - that's up to the protocol still.
9411da177e4SLinus Torvalds  */
9421da177e4SLinus Torvalds 
9431da177e4SLinus Torvalds static long sock_ioctl(struct file *file, unsigned cmd, unsigned long arg)
9441da177e4SLinus Torvalds {
9451da177e4SLinus Torvalds 	struct socket *sock;
946881d966bSEric W. Biederman 	struct sock *sk;
9471da177e4SLinus Torvalds 	void __user *argp = (void __user *)arg;
9481da177e4SLinus Torvalds 	int pid, err;
949881d966bSEric W. Biederman 	struct net *net;
9501da177e4SLinus Torvalds 
951b69aee04SEric Dumazet 	sock = file->private_data;
952881d966bSEric W. Biederman 	sk = sock->sk;
9533b1e0a65SYOSHIFUJI Hideaki 	net = sock_net(sk);
9541da177e4SLinus Torvalds 	if (cmd >= SIOCDEVPRIVATE && cmd <= (SIOCDEVPRIVATE + 15)) {
955881d966bSEric W. Biederman 		err = dev_ioctl(net, cmd, argp);
9561da177e4SLinus Torvalds 	} else
9573d23e349SJohannes Berg #ifdef CONFIG_WEXT_CORE
9581da177e4SLinus Torvalds 	if (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST) {
959881d966bSEric W. Biederman 		err = dev_ioctl(net, cmd, argp);
9601da177e4SLinus Torvalds 	} else
9613d23e349SJohannes Berg #endif
9621da177e4SLinus Torvalds 		switch (cmd) {
9631da177e4SLinus Torvalds 		case FIOSETOWN:
9641da177e4SLinus Torvalds 		case SIOCSPGRP:
9651da177e4SLinus Torvalds 			err = -EFAULT;
9661da177e4SLinus Torvalds 			if (get_user(pid, (int __user *)argp))
9671da177e4SLinus Torvalds 				break;
9681da177e4SLinus Torvalds 			err = f_setown(sock->file, pid, 1);
9691da177e4SLinus Torvalds 			break;
9701da177e4SLinus Torvalds 		case FIOGETOWN:
9711da177e4SLinus Torvalds 		case SIOCGPGRP:
972609d7fa9SEric W. Biederman 			err = put_user(f_getown(sock->file),
97389bddce5SStephen Hemminger 				       (int __user *)argp);
9741da177e4SLinus Torvalds 			break;
9751da177e4SLinus Torvalds 		case SIOCGIFBR:
9761da177e4SLinus Torvalds 		case SIOCSIFBR:
9771da177e4SLinus Torvalds 		case SIOCBRADDBR:
9781da177e4SLinus Torvalds 		case SIOCBRDELBR:
9791da177e4SLinus Torvalds 			err = -ENOPKG;
9801da177e4SLinus Torvalds 			if (!br_ioctl_hook)
9811da177e4SLinus Torvalds 				request_module("bridge");
9821da177e4SLinus Torvalds 
9834a3e2f71SArjan van de Ven 			mutex_lock(&br_ioctl_mutex);
9841da177e4SLinus Torvalds 			if (br_ioctl_hook)
985881d966bSEric W. Biederman 				err = br_ioctl_hook(net, cmd, argp);
9864a3e2f71SArjan van de Ven 			mutex_unlock(&br_ioctl_mutex);
9871da177e4SLinus Torvalds 			break;
9881da177e4SLinus Torvalds 		case SIOCGIFVLAN:
9891da177e4SLinus Torvalds 		case SIOCSIFVLAN:
9901da177e4SLinus Torvalds 			err = -ENOPKG;
9911da177e4SLinus Torvalds 			if (!vlan_ioctl_hook)
9921da177e4SLinus Torvalds 				request_module("8021q");
9931da177e4SLinus Torvalds 
9944a3e2f71SArjan van de Ven 			mutex_lock(&vlan_ioctl_mutex);
9951da177e4SLinus Torvalds 			if (vlan_ioctl_hook)
996881d966bSEric W. Biederman 				err = vlan_ioctl_hook(net, argp);
9974a3e2f71SArjan van de Ven 			mutex_unlock(&vlan_ioctl_mutex);
9981da177e4SLinus Torvalds 			break;
9991da177e4SLinus Torvalds 		case SIOCADDDLCI:
10001da177e4SLinus Torvalds 		case SIOCDELDLCI:
10011da177e4SLinus Torvalds 			err = -ENOPKG;
10021da177e4SLinus Torvalds 			if (!dlci_ioctl_hook)
10031da177e4SLinus Torvalds 				request_module("dlci");
10041da177e4SLinus Torvalds 
10054a3e2f71SArjan van de Ven 			mutex_lock(&dlci_ioctl_mutex);
10067512cbf6SPavel Emelyanov 			if (dlci_ioctl_hook)
10071da177e4SLinus Torvalds 				err = dlci_ioctl_hook(cmd, argp);
10084a3e2f71SArjan van de Ven 			mutex_unlock(&dlci_ioctl_mutex);
10091da177e4SLinus Torvalds 			break;
10101da177e4SLinus Torvalds 		default:
10116b96018bSArnd Bergmann 			err = sock_do_ioctl(net, sock, cmd, arg);
10121da177e4SLinus Torvalds 			break;
10131da177e4SLinus Torvalds 		}
10141da177e4SLinus Torvalds 	return err;
10151da177e4SLinus Torvalds }
10161da177e4SLinus Torvalds 
10171da177e4SLinus Torvalds int sock_create_lite(int family, int type, int protocol, struct socket **res)
10181da177e4SLinus Torvalds {
10191da177e4SLinus Torvalds 	int err;
10201da177e4SLinus Torvalds 	struct socket *sock = NULL;
10211da177e4SLinus Torvalds 
10221da177e4SLinus Torvalds 	err = security_socket_create(family, type, protocol, 1);
10231da177e4SLinus Torvalds 	if (err)
10241da177e4SLinus Torvalds 		goto out;
10251da177e4SLinus Torvalds 
10261da177e4SLinus Torvalds 	sock = sock_alloc();
10271da177e4SLinus Torvalds 	if (!sock) {
10281da177e4SLinus Torvalds 		err = -ENOMEM;
10291da177e4SLinus Torvalds 		goto out;
10301da177e4SLinus Torvalds 	}
10311da177e4SLinus Torvalds 
10321da177e4SLinus Torvalds 	sock->type = type;
10337420ed23SVenkat Yekkirala 	err = security_socket_post_create(sock, family, type, protocol, 1);
10347420ed23SVenkat Yekkirala 	if (err)
10357420ed23SVenkat Yekkirala 		goto out_release;
10367420ed23SVenkat Yekkirala 
10371da177e4SLinus Torvalds out:
10381da177e4SLinus Torvalds 	*res = sock;
10391da177e4SLinus Torvalds 	return err;
10407420ed23SVenkat Yekkirala out_release:
10417420ed23SVenkat Yekkirala 	sock_release(sock);
10427420ed23SVenkat Yekkirala 	sock = NULL;
10437420ed23SVenkat Yekkirala 	goto out;
10441da177e4SLinus Torvalds }
10451da177e4SLinus Torvalds 
10461da177e4SLinus Torvalds /* No kernel lock held - perfect */
10471da177e4SLinus Torvalds static unsigned int sock_poll(struct file *file, poll_table *wait)
10481da177e4SLinus Torvalds {
10491da177e4SLinus Torvalds 	struct socket *sock;
10501da177e4SLinus Torvalds 
10511da177e4SLinus Torvalds 	/*
10521da177e4SLinus Torvalds 	 *      We can't return errors to poll, so it's either yes or no.
10531da177e4SLinus Torvalds 	 */
1054b69aee04SEric Dumazet 	sock = file->private_data;
10551da177e4SLinus Torvalds 	return sock->ops->poll(file, sock, wait);
10561da177e4SLinus Torvalds }
10571da177e4SLinus Torvalds 
10581da177e4SLinus Torvalds static int sock_mmap(struct file *file, struct vm_area_struct *vma)
10591da177e4SLinus Torvalds {
1060b69aee04SEric Dumazet 	struct socket *sock = file->private_data;
10611da177e4SLinus Torvalds 
10621da177e4SLinus Torvalds 	return sock->ops->mmap(file, sock, vma);
10631da177e4SLinus Torvalds }
10641da177e4SLinus Torvalds 
106520380731SArnaldo Carvalho de Melo static int sock_close(struct inode *inode, struct file *filp)
10661da177e4SLinus Torvalds {
10671da177e4SLinus Torvalds 	/*
10681da177e4SLinus Torvalds 	 *      It was possible the inode is NULL we were
10691da177e4SLinus Torvalds 	 *      closing an unfinished socket.
10701da177e4SLinus Torvalds 	 */
10711da177e4SLinus Torvalds 
107289bddce5SStephen Hemminger 	if (!inode) {
10731da177e4SLinus Torvalds 		printk(KERN_DEBUG "sock_close: NULL inode\n");
10741da177e4SLinus Torvalds 		return 0;
10751da177e4SLinus Torvalds 	}
10761da177e4SLinus Torvalds 	sock_release(SOCKET_I(inode));
10771da177e4SLinus Torvalds 	return 0;
10781da177e4SLinus Torvalds }
10791da177e4SLinus Torvalds 
10801da177e4SLinus Torvalds /*
10811da177e4SLinus Torvalds  *	Update the socket async list
10821da177e4SLinus Torvalds  *
10831da177e4SLinus Torvalds  *	Fasync_list locking strategy.
10841da177e4SLinus Torvalds  *
10851da177e4SLinus Torvalds  *	1. fasync_list is modified only under process context socket lock
10861da177e4SLinus Torvalds  *	   i.e. under semaphore.
10871da177e4SLinus Torvalds  *	2. fasync_list is used under read_lock(&sk->sk_callback_lock)
10881da177e4SLinus Torvalds  *	   or under socket lock.
10891da177e4SLinus Torvalds  *	3. fasync_list can be used from softirq context, so that
10901da177e4SLinus Torvalds  *	   modification under socket lock have to be enhanced with
10911da177e4SLinus Torvalds  *	   write_lock_bh(&sk->sk_callback_lock).
10921da177e4SLinus Torvalds  *							--ANK (990710)
10931da177e4SLinus Torvalds  */
10941da177e4SLinus Torvalds 
10951da177e4SLinus Torvalds static int sock_fasync(int fd, struct file *filp, int on)
10961da177e4SLinus Torvalds {
10971da177e4SLinus Torvalds 	struct fasync_struct *fa, *fna = NULL, **prev;
10981da177e4SLinus Torvalds 	struct socket *sock;
10991da177e4SLinus Torvalds 	struct sock *sk;
11001da177e4SLinus Torvalds 
110189bddce5SStephen Hemminger 	if (on) {
11028b3a7005SKris Katterjohn 		fna = kmalloc(sizeof(struct fasync_struct), GFP_KERNEL);
11031da177e4SLinus Torvalds 		if (fna == NULL)
11041da177e4SLinus Torvalds 			return -ENOMEM;
11051da177e4SLinus Torvalds 	}
11061da177e4SLinus Torvalds 
1107b69aee04SEric Dumazet 	sock = filp->private_data;
11081da177e4SLinus Torvalds 
110989bddce5SStephen Hemminger 	sk = sock->sk;
111089bddce5SStephen Hemminger 	if (sk == NULL) {
11111da177e4SLinus Torvalds 		kfree(fna);
11121da177e4SLinus Torvalds 		return -EINVAL;
11131da177e4SLinus Torvalds 	}
11141da177e4SLinus Torvalds 
11151da177e4SLinus Torvalds 	lock_sock(sk);
11161da177e4SLinus Torvalds 
111776398425SJonathan Corbet 	spin_lock(&filp->f_lock);
111876398425SJonathan Corbet 	if (on)
111976398425SJonathan Corbet 		filp->f_flags |= FASYNC;
112076398425SJonathan Corbet 	else
112176398425SJonathan Corbet 		filp->f_flags &= ~FASYNC;
112276398425SJonathan Corbet 	spin_unlock(&filp->f_lock);
112376398425SJonathan Corbet 
11241da177e4SLinus Torvalds 	prev = &(sock->fasync_list);
11251da177e4SLinus Torvalds 
11261da177e4SLinus Torvalds 	for (fa = *prev; fa != NULL; prev = &fa->fa_next, fa = *prev)
11271da177e4SLinus Torvalds 		if (fa->fa_file == filp)
11281da177e4SLinus Torvalds 			break;
11291da177e4SLinus Torvalds 
113089bddce5SStephen Hemminger 	if (on) {
113189bddce5SStephen Hemminger 		if (fa != NULL) {
11321da177e4SLinus Torvalds 			write_lock_bh(&sk->sk_callback_lock);
11331da177e4SLinus Torvalds 			fa->fa_fd = fd;
11341da177e4SLinus Torvalds 			write_unlock_bh(&sk->sk_callback_lock);
11351da177e4SLinus Torvalds 
11361da177e4SLinus Torvalds 			kfree(fna);
11371da177e4SLinus Torvalds 			goto out;
11381da177e4SLinus Torvalds 		}
11391da177e4SLinus Torvalds 		fna->fa_file = filp;
11401da177e4SLinus Torvalds 		fna->fa_fd = fd;
11411da177e4SLinus Torvalds 		fna->magic = FASYNC_MAGIC;
11421da177e4SLinus Torvalds 		fna->fa_next = sock->fasync_list;
11431da177e4SLinus Torvalds 		write_lock_bh(&sk->sk_callback_lock);
11441da177e4SLinus Torvalds 		sock->fasync_list = fna;
1145bcdce719SEric Dumazet 		sock_set_flag(sk, SOCK_FASYNC);
11461da177e4SLinus Torvalds 		write_unlock_bh(&sk->sk_callback_lock);
114789bddce5SStephen Hemminger 	} else {
114889bddce5SStephen Hemminger 		if (fa != NULL) {
11491da177e4SLinus Torvalds 			write_lock_bh(&sk->sk_callback_lock);
11501da177e4SLinus Torvalds 			*prev = fa->fa_next;
1151bcdce719SEric Dumazet 			if (!sock->fasync_list)
1152bcdce719SEric Dumazet 				sock_reset_flag(sk, SOCK_FASYNC);
11531da177e4SLinus Torvalds 			write_unlock_bh(&sk->sk_callback_lock);
11541da177e4SLinus Torvalds 			kfree(fa);
11551da177e4SLinus Torvalds 		}
11561da177e4SLinus Torvalds 	}
11571da177e4SLinus Torvalds 
11581da177e4SLinus Torvalds out:
11591da177e4SLinus Torvalds 	release_sock(sock->sk);
11601da177e4SLinus Torvalds 	return 0;
11611da177e4SLinus Torvalds }
11621da177e4SLinus Torvalds 
11631da177e4SLinus Torvalds /* This function may be called only under socket lock or callback_lock */
11641da177e4SLinus Torvalds 
11651da177e4SLinus Torvalds int sock_wake_async(struct socket *sock, int how, int band)
11661da177e4SLinus Torvalds {
11671da177e4SLinus Torvalds 	if (!sock || !sock->fasync_list)
11681da177e4SLinus Torvalds 		return -1;
116989bddce5SStephen Hemminger 	switch (how) {
11708d8ad9d7SPavel Emelyanov 	case SOCK_WAKE_WAITD:
11711da177e4SLinus Torvalds 		if (test_bit(SOCK_ASYNC_WAITDATA, &sock->flags))
11721da177e4SLinus Torvalds 			break;
11731da177e4SLinus Torvalds 		goto call_kill;
11748d8ad9d7SPavel Emelyanov 	case SOCK_WAKE_SPACE:
11751da177e4SLinus Torvalds 		if (!test_and_clear_bit(SOCK_ASYNC_NOSPACE, &sock->flags))
11761da177e4SLinus Torvalds 			break;
11771da177e4SLinus Torvalds 		/* fall through */
11788d8ad9d7SPavel Emelyanov 	case SOCK_WAKE_IO:
11791da177e4SLinus Torvalds call_kill:
11801da177e4SLinus Torvalds 		__kill_fasync(sock->fasync_list, SIGIO, band);
11811da177e4SLinus Torvalds 		break;
11828d8ad9d7SPavel Emelyanov 	case SOCK_WAKE_URG:
11831da177e4SLinus Torvalds 		__kill_fasync(sock->fasync_list, SIGURG, band);
11841da177e4SLinus Torvalds 	}
11851da177e4SLinus Torvalds 	return 0;
11861da177e4SLinus Torvalds }
11871da177e4SLinus Torvalds 
11881b8d7ae4SEric W. Biederman static int __sock_create(struct net *net, int family, int type, int protocol,
118989bddce5SStephen Hemminger 			 struct socket **res, int kern)
11901da177e4SLinus Torvalds {
11911da177e4SLinus Torvalds 	int err;
11921da177e4SLinus Torvalds 	struct socket *sock;
119355737fdaSStephen Hemminger 	const struct net_proto_family *pf;
11941da177e4SLinus Torvalds 
11951da177e4SLinus Torvalds 	/*
11961da177e4SLinus Torvalds 	 *      Check protocol is in range
11971da177e4SLinus Torvalds 	 */
11981da177e4SLinus Torvalds 	if (family < 0 || family >= NPROTO)
11991da177e4SLinus Torvalds 		return -EAFNOSUPPORT;
12001da177e4SLinus Torvalds 	if (type < 0 || type >= SOCK_MAX)
12011da177e4SLinus Torvalds 		return -EINVAL;
12021da177e4SLinus Torvalds 
12031da177e4SLinus Torvalds 	/* Compatibility.
12041da177e4SLinus Torvalds 
12051da177e4SLinus Torvalds 	   This uglymoron is moved from INET layer to here to avoid
12061da177e4SLinus Torvalds 	   deadlock in module load.
12071da177e4SLinus Torvalds 	 */
12081da177e4SLinus Torvalds 	if (family == PF_INET && type == SOCK_PACKET) {
12091da177e4SLinus Torvalds 		static int warned;
12101da177e4SLinus Torvalds 		if (!warned) {
12111da177e4SLinus Torvalds 			warned = 1;
121289bddce5SStephen Hemminger 			printk(KERN_INFO "%s uses obsolete (PF_INET,SOCK_PACKET)\n",
121389bddce5SStephen Hemminger 			       current->comm);
12141da177e4SLinus Torvalds 		}
12151da177e4SLinus Torvalds 		family = PF_PACKET;
12161da177e4SLinus Torvalds 	}
12171da177e4SLinus Torvalds 
12181da177e4SLinus Torvalds 	err = security_socket_create(family, type, protocol, kern);
12191da177e4SLinus Torvalds 	if (err)
12201da177e4SLinus Torvalds 		return err;
12211da177e4SLinus Torvalds 
122255737fdaSStephen Hemminger 	/*
122355737fdaSStephen Hemminger 	 *	Allocate the socket and allow the family to set things up. if
122455737fdaSStephen Hemminger 	 *	the protocol is 0, the family is instructed to select an appropriate
122555737fdaSStephen Hemminger 	 *	default.
122655737fdaSStephen Hemminger 	 */
122755737fdaSStephen Hemminger 	sock = sock_alloc();
122855737fdaSStephen Hemminger 	if (!sock) {
122955737fdaSStephen Hemminger 		if (net_ratelimit())
123055737fdaSStephen Hemminger 			printk(KERN_WARNING "socket: no more sockets\n");
123155737fdaSStephen Hemminger 		return -ENFILE;	/* Not exactly a match, but its the
123255737fdaSStephen Hemminger 				   closest posix thing */
123355737fdaSStephen Hemminger 	}
123455737fdaSStephen Hemminger 
123555737fdaSStephen Hemminger 	sock->type = type;
123655737fdaSStephen Hemminger 
123795a5afcaSJohannes Berg #ifdef CONFIG_MODULES
12381da177e4SLinus Torvalds 	/* Attempt to load a protocol module if the find failed.
12391da177e4SLinus Torvalds 	 *
12401da177e4SLinus Torvalds 	 * 12/09/1996 Marcin: But! this makes REALLY only sense, if the user
12411da177e4SLinus Torvalds 	 * requested real, full-featured networking support upon configuration.
12421da177e4SLinus Torvalds 	 * Otherwise module support will break!
12431da177e4SLinus Torvalds 	 */
124455737fdaSStephen Hemminger 	if (net_families[family] == NULL)
12451da177e4SLinus Torvalds 		request_module("net-pf-%d", family);
12461da177e4SLinus Torvalds #endif
12471da177e4SLinus Torvalds 
124855737fdaSStephen Hemminger 	rcu_read_lock();
124955737fdaSStephen Hemminger 	pf = rcu_dereference(net_families[family]);
12501da177e4SLinus Torvalds 	err = -EAFNOSUPPORT;
125155737fdaSStephen Hemminger 	if (!pf)
125255737fdaSStephen Hemminger 		goto out_release;
12531da177e4SLinus Torvalds 
12541da177e4SLinus Torvalds 	/*
12551da177e4SLinus Torvalds 	 * We will call the ->create function, that possibly is in a loadable
12561da177e4SLinus Torvalds 	 * module, so we have to bump that loadable module refcnt first.
12571da177e4SLinus Torvalds 	 */
125855737fdaSStephen Hemminger 	if (!try_module_get(pf->owner))
12591da177e4SLinus Torvalds 		goto out_release;
12601da177e4SLinus Torvalds 
126155737fdaSStephen Hemminger 	/* Now protected by module ref count */
126255737fdaSStephen Hemminger 	rcu_read_unlock();
126355737fdaSStephen Hemminger 
12643f378b68SEric Paris 	err = pf->create(net, sock, protocol, kern);
126555737fdaSStephen Hemminger 	if (err < 0)
12661da177e4SLinus Torvalds 		goto out_module_put;
1267a79af59eSFrank Filz 
12681da177e4SLinus Torvalds 	/*
12691da177e4SLinus Torvalds 	 * Now to bump the refcnt of the [loadable] module that owns this
12701da177e4SLinus Torvalds 	 * socket at sock_release time we decrement its refcnt.
12711da177e4SLinus Torvalds 	 */
127255737fdaSStephen Hemminger 	if (!try_module_get(sock->ops->owner))
127355737fdaSStephen Hemminger 		goto out_module_busy;
127455737fdaSStephen Hemminger 
12751da177e4SLinus Torvalds 	/*
12761da177e4SLinus Torvalds 	 * Now that we're done with the ->create function, the [loadable]
12771da177e4SLinus Torvalds 	 * module can have its refcnt decremented
12781da177e4SLinus Torvalds 	 */
127955737fdaSStephen Hemminger 	module_put(pf->owner);
12807420ed23SVenkat Yekkirala 	err = security_socket_post_create(sock, family, type, protocol, kern);
12817420ed23SVenkat Yekkirala 	if (err)
12823b185525SHerbert Xu 		goto out_sock_release;
128355737fdaSStephen Hemminger 	*res = sock;
12841da177e4SLinus Torvalds 
128555737fdaSStephen Hemminger 	return 0;
128655737fdaSStephen Hemminger 
128755737fdaSStephen Hemminger out_module_busy:
128855737fdaSStephen Hemminger 	err = -EAFNOSUPPORT;
12891da177e4SLinus Torvalds out_module_put:
129055737fdaSStephen Hemminger 	sock->ops = NULL;
129155737fdaSStephen Hemminger 	module_put(pf->owner);
129255737fdaSStephen Hemminger out_sock_release:
12931da177e4SLinus Torvalds 	sock_release(sock);
129455737fdaSStephen Hemminger 	return err;
129555737fdaSStephen Hemminger 
129655737fdaSStephen Hemminger out_release:
129755737fdaSStephen Hemminger 	rcu_read_unlock();
129855737fdaSStephen Hemminger 	goto out_sock_release;
12991da177e4SLinus Torvalds }
13001da177e4SLinus Torvalds 
13011da177e4SLinus Torvalds int sock_create(int family, int type, int protocol, struct socket **res)
13021da177e4SLinus Torvalds {
13031b8d7ae4SEric W. Biederman 	return __sock_create(current->nsproxy->net_ns, family, type, protocol, res, 0);
13041da177e4SLinus Torvalds }
13051da177e4SLinus Torvalds 
13061da177e4SLinus Torvalds int sock_create_kern(int family, int type, int protocol, struct socket **res)
13071da177e4SLinus Torvalds {
13081b8d7ae4SEric W. Biederman 	return __sock_create(&init_net, family, type, protocol, res, 1);
13091da177e4SLinus Torvalds }
13101da177e4SLinus Torvalds 
13113e0fa65fSHeiko Carstens SYSCALL_DEFINE3(socket, int, family, int, type, int, protocol)
13121da177e4SLinus Torvalds {
13131da177e4SLinus Torvalds 	int retval;
13141da177e4SLinus Torvalds 	struct socket *sock;
1315a677a039SUlrich Drepper 	int flags;
1316a677a039SUlrich Drepper 
1317e38b36f3SUlrich Drepper 	/* Check the SOCK_* constants for consistency.  */
1318e38b36f3SUlrich Drepper 	BUILD_BUG_ON(SOCK_CLOEXEC != O_CLOEXEC);
1319e38b36f3SUlrich Drepper 	BUILD_BUG_ON((SOCK_MAX | SOCK_TYPE_MASK) != SOCK_TYPE_MASK);
1320e38b36f3SUlrich Drepper 	BUILD_BUG_ON(SOCK_CLOEXEC & SOCK_TYPE_MASK);
1321e38b36f3SUlrich Drepper 	BUILD_BUG_ON(SOCK_NONBLOCK & SOCK_TYPE_MASK);
1322e38b36f3SUlrich Drepper 
1323a677a039SUlrich Drepper 	flags = type & ~SOCK_TYPE_MASK;
132477d27200SUlrich Drepper 	if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
1325a677a039SUlrich Drepper 		return -EINVAL;
1326a677a039SUlrich Drepper 	type &= SOCK_TYPE_MASK;
13271da177e4SLinus Torvalds 
1328aaca0bdcSUlrich Drepper 	if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
1329aaca0bdcSUlrich Drepper 		flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
1330aaca0bdcSUlrich Drepper 
13311da177e4SLinus Torvalds 	retval = sock_create(family, type, protocol, &sock);
13321da177e4SLinus Torvalds 	if (retval < 0)
13331da177e4SLinus Torvalds 		goto out;
13341da177e4SLinus Torvalds 
133577d27200SUlrich Drepper 	retval = sock_map_fd(sock, flags & (O_CLOEXEC | O_NONBLOCK));
13361da177e4SLinus Torvalds 	if (retval < 0)
13371da177e4SLinus Torvalds 		goto out_release;
13381da177e4SLinus Torvalds 
13391da177e4SLinus Torvalds out:
13401da177e4SLinus Torvalds 	/* It may be already another descriptor 8) Not kernel problem. */
13411da177e4SLinus Torvalds 	return retval;
13421da177e4SLinus Torvalds 
13431da177e4SLinus Torvalds out_release:
13441da177e4SLinus Torvalds 	sock_release(sock);
13451da177e4SLinus Torvalds 	return retval;
13461da177e4SLinus Torvalds }
13471da177e4SLinus Torvalds 
13481da177e4SLinus Torvalds /*
13491da177e4SLinus Torvalds  *	Create a pair of connected sockets.
13501da177e4SLinus Torvalds  */
13511da177e4SLinus Torvalds 
13523e0fa65fSHeiko Carstens SYSCALL_DEFINE4(socketpair, int, family, int, type, int, protocol,
13533e0fa65fSHeiko Carstens 		int __user *, usockvec)
13541da177e4SLinus Torvalds {
13551da177e4SLinus Torvalds 	struct socket *sock1, *sock2;
13561da177e4SLinus Torvalds 	int fd1, fd2, err;
1357db349509SAl Viro 	struct file *newfile1, *newfile2;
1358a677a039SUlrich Drepper 	int flags;
1359a677a039SUlrich Drepper 
1360a677a039SUlrich Drepper 	flags = type & ~SOCK_TYPE_MASK;
136177d27200SUlrich Drepper 	if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
1362a677a039SUlrich Drepper 		return -EINVAL;
1363a677a039SUlrich Drepper 	type &= SOCK_TYPE_MASK;
13641da177e4SLinus Torvalds 
1365aaca0bdcSUlrich Drepper 	if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
1366aaca0bdcSUlrich Drepper 		flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
1367aaca0bdcSUlrich Drepper 
13681da177e4SLinus Torvalds 	/*
13691da177e4SLinus Torvalds 	 * Obtain the first socket and check if the underlying protocol
13701da177e4SLinus Torvalds 	 * supports the socketpair call.
13711da177e4SLinus Torvalds 	 */
13721da177e4SLinus Torvalds 
13731da177e4SLinus Torvalds 	err = sock_create(family, type, protocol, &sock1);
13741da177e4SLinus Torvalds 	if (err < 0)
13751da177e4SLinus Torvalds 		goto out;
13761da177e4SLinus Torvalds 
13771da177e4SLinus Torvalds 	err = sock_create(family, type, protocol, &sock2);
13781da177e4SLinus Torvalds 	if (err < 0)
13791da177e4SLinus Torvalds 		goto out_release_1;
13801da177e4SLinus Torvalds 
13811da177e4SLinus Torvalds 	err = sock1->ops->socketpair(sock1, sock2);
13821da177e4SLinus Torvalds 	if (err < 0)
13831da177e4SLinus Torvalds 		goto out_release_both;
13841da177e4SLinus Torvalds 
13857cbe66b6SAl Viro 	fd1 = sock_alloc_file(sock1, &newfile1, flags);
1386bf3c23d1SDavid S. Miller 	if (unlikely(fd1 < 0)) {
1387bf3c23d1SDavid S. Miller 		err = fd1;
13881da177e4SLinus Torvalds 		goto out_release_both;
1389bf3c23d1SDavid S. Miller 	}
13901da177e4SLinus Torvalds 
13917cbe66b6SAl Viro 	fd2 = sock_alloc_file(sock2, &newfile2, flags);
1392198de4d7SAl Viro 	if (unlikely(fd2 < 0)) {
1393198de4d7SAl Viro 		err = fd2;
1394198de4d7SAl Viro 		fput(newfile1);
1395198de4d7SAl Viro 		put_unused_fd(fd1);
1396198de4d7SAl Viro 		sock_release(sock2);
1397198de4d7SAl Viro 		goto out;
1398db349509SAl Viro 	}
1399db349509SAl Viro 
1400157cf649SAl Viro 	audit_fd_pair(fd1, fd2);
1401db349509SAl Viro 	fd_install(fd1, newfile1);
1402db349509SAl Viro 	fd_install(fd2, newfile2);
14031da177e4SLinus Torvalds 	/* fd1 and fd2 may be already another descriptors.
14041da177e4SLinus Torvalds 	 * Not kernel problem.
14051da177e4SLinus Torvalds 	 */
14061da177e4SLinus Torvalds 
14071da177e4SLinus Torvalds 	err = put_user(fd1, &usockvec[0]);
14081da177e4SLinus Torvalds 	if (!err)
14091da177e4SLinus Torvalds 		err = put_user(fd2, &usockvec[1]);
14101da177e4SLinus Torvalds 	if (!err)
14111da177e4SLinus Torvalds 		return 0;
14121da177e4SLinus Torvalds 
14131da177e4SLinus Torvalds 	sys_close(fd2);
14141da177e4SLinus Torvalds 	sys_close(fd1);
14151da177e4SLinus Torvalds 	return err;
14161da177e4SLinus Torvalds 
14171da177e4SLinus Torvalds out_release_both:
14181da177e4SLinus Torvalds 	sock_release(sock2);
14191da177e4SLinus Torvalds out_release_1:
14201da177e4SLinus Torvalds 	sock_release(sock1);
14211da177e4SLinus Torvalds out:
14221da177e4SLinus Torvalds 	return err;
14231da177e4SLinus Torvalds }
14241da177e4SLinus Torvalds 
14251da177e4SLinus Torvalds /*
14261da177e4SLinus Torvalds  *	Bind a name to a socket. Nothing much to do here since it's
14271da177e4SLinus Torvalds  *	the protocol's responsibility to handle the local address.
14281da177e4SLinus Torvalds  *
14291da177e4SLinus Torvalds  *	We move the socket address to kernel space before we call
14301da177e4SLinus Torvalds  *	the protocol layer (having also checked the address is ok).
14311da177e4SLinus Torvalds  */
14321da177e4SLinus Torvalds 
143320f37034SHeiko Carstens SYSCALL_DEFINE3(bind, int, fd, struct sockaddr __user *, umyaddr, int, addrlen)
14341da177e4SLinus Torvalds {
14351da177e4SLinus Torvalds 	struct socket *sock;
1436230b1839SYOSHIFUJI Hideaki 	struct sockaddr_storage address;
14376cb153caSBenjamin LaHaise 	int err, fput_needed;
14381da177e4SLinus Torvalds 
143989bddce5SStephen Hemminger 	sock = sockfd_lookup_light(fd, &err, &fput_needed);
144089bddce5SStephen Hemminger 	if (sock) {
1441230b1839SYOSHIFUJI Hideaki 		err = move_addr_to_kernel(umyaddr, addrlen, (struct sockaddr *)&address);
144289bddce5SStephen Hemminger 		if (err >= 0) {
144389bddce5SStephen Hemminger 			err = security_socket_bind(sock,
1444230b1839SYOSHIFUJI Hideaki 						   (struct sockaddr *)&address,
144589bddce5SStephen Hemminger 						   addrlen);
14466cb153caSBenjamin LaHaise 			if (!err)
14476cb153caSBenjamin LaHaise 				err = sock->ops->bind(sock,
144889bddce5SStephen Hemminger 						      (struct sockaddr *)
1449230b1839SYOSHIFUJI Hideaki 						      &address, addrlen);
14501da177e4SLinus Torvalds 		}
14516cb153caSBenjamin LaHaise 		fput_light(sock->file, fput_needed);
14521da177e4SLinus Torvalds 	}
14531da177e4SLinus Torvalds 	return err;
14541da177e4SLinus Torvalds }
14551da177e4SLinus Torvalds 
14561da177e4SLinus Torvalds /*
14571da177e4SLinus Torvalds  *	Perform a listen. Basically, we allow the protocol to do anything
14581da177e4SLinus Torvalds  *	necessary for a listen, and if that works, we mark the socket as
14591da177e4SLinus Torvalds  *	ready for listening.
14601da177e4SLinus Torvalds  */
14611da177e4SLinus Torvalds 
14623e0fa65fSHeiko Carstens SYSCALL_DEFINE2(listen, int, fd, int, backlog)
14631da177e4SLinus Torvalds {
14641da177e4SLinus Torvalds 	struct socket *sock;
14656cb153caSBenjamin LaHaise 	int err, fput_needed;
1466b8e1f9b5SPavel Emelyanov 	int somaxconn;
14671da177e4SLinus Torvalds 
146889bddce5SStephen Hemminger 	sock = sockfd_lookup_light(fd, &err, &fput_needed);
146989bddce5SStephen Hemminger 	if (sock) {
14708efa6e93SPavel Emelyanov 		somaxconn = sock_net(sock->sk)->core.sysctl_somaxconn;
1471b8e1f9b5SPavel Emelyanov 		if ((unsigned)backlog > somaxconn)
1472b8e1f9b5SPavel Emelyanov 			backlog = somaxconn;
14731da177e4SLinus Torvalds 
14741da177e4SLinus Torvalds 		err = security_socket_listen(sock, backlog);
14756cb153caSBenjamin LaHaise 		if (!err)
14761da177e4SLinus Torvalds 			err = sock->ops->listen(sock, backlog);
14776cb153caSBenjamin LaHaise 
14786cb153caSBenjamin LaHaise 		fput_light(sock->file, fput_needed);
14791da177e4SLinus Torvalds 	}
14801da177e4SLinus Torvalds 	return err;
14811da177e4SLinus Torvalds }
14821da177e4SLinus Torvalds 
14831da177e4SLinus Torvalds /*
14841da177e4SLinus Torvalds  *	For accept, we attempt to create a new socket, set up the link
14851da177e4SLinus Torvalds  *	with the client, wake up the client, then return the new
14861da177e4SLinus Torvalds  *	connected fd. We collect the address of the connector in kernel
14871da177e4SLinus Torvalds  *	space and move it to user at the very end. This is unclean because
14881da177e4SLinus Torvalds  *	we open the socket then return an error.
14891da177e4SLinus Torvalds  *
14901da177e4SLinus Torvalds  *	1003.1g adds the ability to recvmsg() to query connection pending
14911da177e4SLinus Torvalds  *	status to recvmsg. We need to add that support in a way thats
14921da177e4SLinus Torvalds  *	clean when we restucture accept also.
14931da177e4SLinus Torvalds  */
14941da177e4SLinus Torvalds 
149520f37034SHeiko Carstens SYSCALL_DEFINE4(accept4, int, fd, struct sockaddr __user *, upeer_sockaddr,
149620f37034SHeiko Carstens 		int __user *, upeer_addrlen, int, flags)
14971da177e4SLinus Torvalds {
14981da177e4SLinus Torvalds 	struct socket *sock, *newsock;
149939d8c1b6SDavid S. Miller 	struct file *newfile;
15006cb153caSBenjamin LaHaise 	int err, len, newfd, fput_needed;
1501230b1839SYOSHIFUJI Hideaki 	struct sockaddr_storage address;
15021da177e4SLinus Torvalds 
150377d27200SUlrich Drepper 	if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK))
1504aaca0bdcSUlrich Drepper 		return -EINVAL;
1505aaca0bdcSUlrich Drepper 
1506aaca0bdcSUlrich Drepper 	if (SOCK_NONBLOCK != O_NONBLOCK && (flags & SOCK_NONBLOCK))
1507aaca0bdcSUlrich Drepper 		flags = (flags & ~SOCK_NONBLOCK) | O_NONBLOCK;
1508aaca0bdcSUlrich Drepper 
15096cb153caSBenjamin LaHaise 	sock = sockfd_lookup_light(fd, &err, &fput_needed);
15101da177e4SLinus Torvalds 	if (!sock)
15111da177e4SLinus Torvalds 		goto out;
15121da177e4SLinus Torvalds 
15131da177e4SLinus Torvalds 	err = -ENFILE;
15141da177e4SLinus Torvalds 	if (!(newsock = sock_alloc()))
15151da177e4SLinus Torvalds 		goto out_put;
15161da177e4SLinus Torvalds 
15171da177e4SLinus Torvalds 	newsock->type = sock->type;
15181da177e4SLinus Torvalds 	newsock->ops = sock->ops;
15191da177e4SLinus Torvalds 
15201da177e4SLinus Torvalds 	/*
15211da177e4SLinus Torvalds 	 * We don't need try_module_get here, as the listening socket (sock)
15221da177e4SLinus Torvalds 	 * has the protocol module (sock->ops->owner) held.
15231da177e4SLinus Torvalds 	 */
15241da177e4SLinus Torvalds 	__module_get(newsock->ops->owner);
15251da177e4SLinus Torvalds 
15267cbe66b6SAl Viro 	newfd = sock_alloc_file(newsock, &newfile, flags);
152739d8c1b6SDavid S. Miller 	if (unlikely(newfd < 0)) {
152839d8c1b6SDavid S. Miller 		err = newfd;
15299a1875e6SDavid S. Miller 		sock_release(newsock);
15309a1875e6SDavid S. Miller 		goto out_put;
153139d8c1b6SDavid S. Miller 	}
153239d8c1b6SDavid S. Miller 
1533a79af59eSFrank Filz 	err = security_socket_accept(sock, newsock);
1534a79af59eSFrank Filz 	if (err)
153539d8c1b6SDavid S. Miller 		goto out_fd;
1536a79af59eSFrank Filz 
15371da177e4SLinus Torvalds 	err = sock->ops->accept(sock, newsock, sock->file->f_flags);
15381da177e4SLinus Torvalds 	if (err < 0)
153939d8c1b6SDavid S. Miller 		goto out_fd;
15401da177e4SLinus Torvalds 
15411da177e4SLinus Torvalds 	if (upeer_sockaddr) {
1542230b1839SYOSHIFUJI Hideaki 		if (newsock->ops->getname(newsock, (struct sockaddr *)&address,
154389bddce5SStephen Hemminger 					  &len, 2) < 0) {
15441da177e4SLinus Torvalds 			err = -ECONNABORTED;
154539d8c1b6SDavid S. Miller 			goto out_fd;
15461da177e4SLinus Torvalds 		}
1547230b1839SYOSHIFUJI Hideaki 		err = move_addr_to_user((struct sockaddr *)&address,
1548230b1839SYOSHIFUJI Hideaki 					len, upeer_sockaddr, upeer_addrlen);
15491da177e4SLinus Torvalds 		if (err < 0)
155039d8c1b6SDavid S. Miller 			goto out_fd;
15511da177e4SLinus Torvalds 	}
15521da177e4SLinus Torvalds 
15531da177e4SLinus Torvalds 	/* File flags are not inherited via accept() unlike another OSes. */
15541da177e4SLinus Torvalds 
155539d8c1b6SDavid S. Miller 	fd_install(newfd, newfile);
155639d8c1b6SDavid S. Miller 	err = newfd;
15571da177e4SLinus Torvalds 
15581da177e4SLinus Torvalds out_put:
15596cb153caSBenjamin LaHaise 	fput_light(sock->file, fput_needed);
15601da177e4SLinus Torvalds out:
15611da177e4SLinus Torvalds 	return err;
156239d8c1b6SDavid S. Miller out_fd:
15639606a216SDavid S. Miller 	fput(newfile);
156439d8c1b6SDavid S. Miller 	put_unused_fd(newfd);
15651da177e4SLinus Torvalds 	goto out_put;
15661da177e4SLinus Torvalds }
15671da177e4SLinus Torvalds 
156820f37034SHeiko Carstens SYSCALL_DEFINE3(accept, int, fd, struct sockaddr __user *, upeer_sockaddr,
156920f37034SHeiko Carstens 		int __user *, upeer_addrlen)
1570aaca0bdcSUlrich Drepper {
1571de11defeSUlrich Drepper 	return sys_accept4(fd, upeer_sockaddr, upeer_addrlen, 0);
1572aaca0bdcSUlrich Drepper }
1573aaca0bdcSUlrich Drepper 
15741da177e4SLinus Torvalds /*
15751da177e4SLinus Torvalds  *	Attempt to connect to a socket with the server address.  The address
15761da177e4SLinus Torvalds  *	is in user space so we verify it is OK and move it to kernel space.
15771da177e4SLinus Torvalds  *
15781da177e4SLinus Torvalds  *	For 1003.1g we need to add clean support for a bind to AF_UNSPEC to
15791da177e4SLinus Torvalds  *	break bindings
15801da177e4SLinus Torvalds  *
15811da177e4SLinus Torvalds  *	NOTE: 1003.1g draft 6.3 is broken with respect to AX.25/NetROM and
15821da177e4SLinus Torvalds  *	other SEQPACKET protocols that take time to connect() as it doesn't
15831da177e4SLinus Torvalds  *	include the -EINPROGRESS status for such sockets.
15841da177e4SLinus Torvalds  */
15851da177e4SLinus Torvalds 
158620f37034SHeiko Carstens SYSCALL_DEFINE3(connect, int, fd, struct sockaddr __user *, uservaddr,
158720f37034SHeiko Carstens 		int, addrlen)
15881da177e4SLinus Torvalds {
15891da177e4SLinus Torvalds 	struct socket *sock;
1590230b1839SYOSHIFUJI Hideaki 	struct sockaddr_storage address;
15916cb153caSBenjamin LaHaise 	int err, fput_needed;
15921da177e4SLinus Torvalds 
15936cb153caSBenjamin LaHaise 	sock = sockfd_lookup_light(fd, &err, &fput_needed);
15941da177e4SLinus Torvalds 	if (!sock)
15951da177e4SLinus Torvalds 		goto out;
1596230b1839SYOSHIFUJI Hideaki 	err = move_addr_to_kernel(uservaddr, addrlen, (struct sockaddr *)&address);
15971da177e4SLinus Torvalds 	if (err < 0)
15981da177e4SLinus Torvalds 		goto out_put;
15991da177e4SLinus Torvalds 
160089bddce5SStephen Hemminger 	err =
1601230b1839SYOSHIFUJI Hideaki 	    security_socket_connect(sock, (struct sockaddr *)&address, addrlen);
16021da177e4SLinus Torvalds 	if (err)
16031da177e4SLinus Torvalds 		goto out_put;
16041da177e4SLinus Torvalds 
1605230b1839SYOSHIFUJI Hideaki 	err = sock->ops->connect(sock, (struct sockaddr *)&address, addrlen,
16061da177e4SLinus Torvalds 				 sock->file->f_flags);
16071da177e4SLinus Torvalds out_put:
16086cb153caSBenjamin LaHaise 	fput_light(sock->file, fput_needed);
16091da177e4SLinus Torvalds out:
16101da177e4SLinus Torvalds 	return err;
16111da177e4SLinus Torvalds }
16121da177e4SLinus Torvalds 
16131da177e4SLinus Torvalds /*
16141da177e4SLinus Torvalds  *	Get the local address ('name') of a socket object. Move the obtained
16151da177e4SLinus Torvalds  *	name to user space.
16161da177e4SLinus Torvalds  */
16171da177e4SLinus Torvalds 
161820f37034SHeiko Carstens SYSCALL_DEFINE3(getsockname, int, fd, struct sockaddr __user *, usockaddr,
161920f37034SHeiko Carstens 		int __user *, usockaddr_len)
16201da177e4SLinus Torvalds {
16211da177e4SLinus Torvalds 	struct socket *sock;
1622230b1839SYOSHIFUJI Hideaki 	struct sockaddr_storage address;
16236cb153caSBenjamin LaHaise 	int len, err, fput_needed;
16241da177e4SLinus Torvalds 
16256cb153caSBenjamin LaHaise 	sock = sockfd_lookup_light(fd, &err, &fput_needed);
16261da177e4SLinus Torvalds 	if (!sock)
16271da177e4SLinus Torvalds 		goto out;
16281da177e4SLinus Torvalds 
16291da177e4SLinus Torvalds 	err = security_socket_getsockname(sock);
16301da177e4SLinus Torvalds 	if (err)
16311da177e4SLinus Torvalds 		goto out_put;
16321da177e4SLinus Torvalds 
1633230b1839SYOSHIFUJI Hideaki 	err = sock->ops->getname(sock, (struct sockaddr *)&address, &len, 0);
16341da177e4SLinus Torvalds 	if (err)
16351da177e4SLinus Torvalds 		goto out_put;
1636230b1839SYOSHIFUJI Hideaki 	err = move_addr_to_user((struct sockaddr *)&address, len, usockaddr, usockaddr_len);
16371da177e4SLinus Torvalds 
16381da177e4SLinus Torvalds out_put:
16396cb153caSBenjamin LaHaise 	fput_light(sock->file, fput_needed);
16401da177e4SLinus Torvalds out:
16411da177e4SLinus Torvalds 	return err;
16421da177e4SLinus Torvalds }
16431da177e4SLinus Torvalds 
16441da177e4SLinus Torvalds /*
16451da177e4SLinus Torvalds  *	Get the remote address ('name') of a socket object. Move the obtained
16461da177e4SLinus Torvalds  *	name to user space.
16471da177e4SLinus Torvalds  */
16481da177e4SLinus Torvalds 
164920f37034SHeiko Carstens SYSCALL_DEFINE3(getpeername, int, fd, struct sockaddr __user *, usockaddr,
165020f37034SHeiko Carstens 		int __user *, usockaddr_len)
16511da177e4SLinus Torvalds {
16521da177e4SLinus Torvalds 	struct socket *sock;
1653230b1839SYOSHIFUJI Hideaki 	struct sockaddr_storage address;
16546cb153caSBenjamin LaHaise 	int len, err, fput_needed;
16551da177e4SLinus Torvalds 
165689bddce5SStephen Hemminger 	sock = sockfd_lookup_light(fd, &err, &fput_needed);
165789bddce5SStephen Hemminger 	if (sock != NULL) {
16581da177e4SLinus Torvalds 		err = security_socket_getpeername(sock);
16591da177e4SLinus Torvalds 		if (err) {
16606cb153caSBenjamin LaHaise 			fput_light(sock->file, fput_needed);
16611da177e4SLinus Torvalds 			return err;
16621da177e4SLinus Torvalds 		}
16631da177e4SLinus Torvalds 
166489bddce5SStephen Hemminger 		err =
1665230b1839SYOSHIFUJI Hideaki 		    sock->ops->getname(sock, (struct sockaddr *)&address, &len,
166689bddce5SStephen Hemminger 				       1);
16671da177e4SLinus Torvalds 		if (!err)
1668230b1839SYOSHIFUJI Hideaki 			err = move_addr_to_user((struct sockaddr *)&address, len, usockaddr,
166989bddce5SStephen Hemminger 						usockaddr_len);
16706cb153caSBenjamin LaHaise 		fput_light(sock->file, fput_needed);
16711da177e4SLinus Torvalds 	}
16721da177e4SLinus Torvalds 	return err;
16731da177e4SLinus Torvalds }
16741da177e4SLinus Torvalds 
16751da177e4SLinus Torvalds /*
16761da177e4SLinus Torvalds  *	Send a datagram to a given address. We move the address into kernel
16771da177e4SLinus Torvalds  *	space and check the user space data area is readable before invoking
16781da177e4SLinus Torvalds  *	the protocol.
16791da177e4SLinus Torvalds  */
16801da177e4SLinus Torvalds 
16813e0fa65fSHeiko Carstens SYSCALL_DEFINE6(sendto, int, fd, void __user *, buff, size_t, len,
16823e0fa65fSHeiko Carstens 		unsigned, flags, struct sockaddr __user *, addr,
16833e0fa65fSHeiko Carstens 		int, addr_len)
16841da177e4SLinus Torvalds {
16851da177e4SLinus Torvalds 	struct socket *sock;
1686230b1839SYOSHIFUJI Hideaki 	struct sockaddr_storage address;
16871da177e4SLinus Torvalds 	int err;
16881da177e4SLinus Torvalds 	struct msghdr msg;
16891da177e4SLinus Torvalds 	struct iovec iov;
16906cb153caSBenjamin LaHaise 	int fput_needed;
16911da177e4SLinus Torvalds 
1692de0fa95cSPavel Emelyanov 	sock = sockfd_lookup_light(fd, &err, &fput_needed);
1693de0fa95cSPavel Emelyanov 	if (!sock)
16944387ff75SDavid S. Miller 		goto out;
16956cb153caSBenjamin LaHaise 
16961da177e4SLinus Torvalds 	iov.iov_base = buff;
16971da177e4SLinus Torvalds 	iov.iov_len = len;
16981da177e4SLinus Torvalds 	msg.msg_name = NULL;
16991da177e4SLinus Torvalds 	msg.msg_iov = &iov;
17001da177e4SLinus Torvalds 	msg.msg_iovlen = 1;
17011da177e4SLinus Torvalds 	msg.msg_control = NULL;
17021da177e4SLinus Torvalds 	msg.msg_controllen = 0;
17031da177e4SLinus Torvalds 	msg.msg_namelen = 0;
17046cb153caSBenjamin LaHaise 	if (addr) {
1705230b1839SYOSHIFUJI Hideaki 		err = move_addr_to_kernel(addr, addr_len, (struct sockaddr *)&address);
17061da177e4SLinus Torvalds 		if (err < 0)
17071da177e4SLinus Torvalds 			goto out_put;
1708230b1839SYOSHIFUJI Hideaki 		msg.msg_name = (struct sockaddr *)&address;
17091da177e4SLinus Torvalds 		msg.msg_namelen = addr_len;
17101da177e4SLinus Torvalds 	}
17111da177e4SLinus Torvalds 	if (sock->file->f_flags & O_NONBLOCK)
17121da177e4SLinus Torvalds 		flags |= MSG_DONTWAIT;
17131da177e4SLinus Torvalds 	msg.msg_flags = flags;
17141da177e4SLinus Torvalds 	err = sock_sendmsg(sock, &msg, len);
17151da177e4SLinus Torvalds 
17161da177e4SLinus Torvalds out_put:
1717de0fa95cSPavel Emelyanov 	fput_light(sock->file, fput_needed);
17184387ff75SDavid S. Miller out:
17191da177e4SLinus Torvalds 	return err;
17201da177e4SLinus Torvalds }
17211da177e4SLinus Torvalds 
17221da177e4SLinus Torvalds /*
17231da177e4SLinus Torvalds  *	Send a datagram down a socket.
17241da177e4SLinus Torvalds  */
17251da177e4SLinus Torvalds 
17263e0fa65fSHeiko Carstens SYSCALL_DEFINE4(send, int, fd, void __user *, buff, size_t, len,
17273e0fa65fSHeiko Carstens 		unsigned, flags)
17281da177e4SLinus Torvalds {
17291da177e4SLinus Torvalds 	return sys_sendto(fd, buff, len, flags, NULL, 0);
17301da177e4SLinus Torvalds }
17311da177e4SLinus Torvalds 
17321da177e4SLinus Torvalds /*
17331da177e4SLinus Torvalds  *	Receive a frame from the socket and optionally record the address of the
17341da177e4SLinus Torvalds  *	sender. We verify the buffers are writable and if needed move the
17351da177e4SLinus Torvalds  *	sender address from kernel to user space.
17361da177e4SLinus Torvalds  */
17371da177e4SLinus Torvalds 
17383e0fa65fSHeiko Carstens SYSCALL_DEFINE6(recvfrom, int, fd, void __user *, ubuf, size_t, size,
17393e0fa65fSHeiko Carstens 		unsigned, flags, struct sockaddr __user *, addr,
17403e0fa65fSHeiko Carstens 		int __user *, addr_len)
17411da177e4SLinus Torvalds {
17421da177e4SLinus Torvalds 	struct socket *sock;
17431da177e4SLinus Torvalds 	struct iovec iov;
17441da177e4SLinus Torvalds 	struct msghdr msg;
1745230b1839SYOSHIFUJI Hideaki 	struct sockaddr_storage address;
17461da177e4SLinus Torvalds 	int err, err2;
17476cb153caSBenjamin LaHaise 	int fput_needed;
17481da177e4SLinus Torvalds 
1749de0fa95cSPavel Emelyanov 	sock = sockfd_lookup_light(fd, &err, &fput_needed);
17501da177e4SLinus Torvalds 	if (!sock)
1751de0fa95cSPavel Emelyanov 		goto out;
17521da177e4SLinus Torvalds 
17531da177e4SLinus Torvalds 	msg.msg_control = NULL;
17541da177e4SLinus Torvalds 	msg.msg_controllen = 0;
17551da177e4SLinus Torvalds 	msg.msg_iovlen = 1;
17561da177e4SLinus Torvalds 	msg.msg_iov = &iov;
17571da177e4SLinus Torvalds 	iov.iov_len = size;
17581da177e4SLinus Torvalds 	iov.iov_base = ubuf;
1759230b1839SYOSHIFUJI Hideaki 	msg.msg_name = (struct sockaddr *)&address;
1760230b1839SYOSHIFUJI Hideaki 	msg.msg_namelen = sizeof(address);
17611da177e4SLinus Torvalds 	if (sock->file->f_flags & O_NONBLOCK)
17621da177e4SLinus Torvalds 		flags |= MSG_DONTWAIT;
17631da177e4SLinus Torvalds 	err = sock_recvmsg(sock, &msg, size, flags);
17641da177e4SLinus Torvalds 
176589bddce5SStephen Hemminger 	if (err >= 0 && addr != NULL) {
1766230b1839SYOSHIFUJI Hideaki 		err2 = move_addr_to_user((struct sockaddr *)&address,
1767230b1839SYOSHIFUJI Hideaki 					 msg.msg_namelen, addr, addr_len);
17681da177e4SLinus Torvalds 		if (err2 < 0)
17691da177e4SLinus Torvalds 			err = err2;
17701da177e4SLinus Torvalds 	}
1771de0fa95cSPavel Emelyanov 
1772de0fa95cSPavel Emelyanov 	fput_light(sock->file, fput_needed);
17734387ff75SDavid S. Miller out:
17741da177e4SLinus Torvalds 	return err;
17751da177e4SLinus Torvalds }
17761da177e4SLinus Torvalds 
17771da177e4SLinus Torvalds /*
17781da177e4SLinus Torvalds  *	Receive a datagram from a socket.
17791da177e4SLinus Torvalds  */
17801da177e4SLinus Torvalds 
178189bddce5SStephen Hemminger asmlinkage long sys_recv(int fd, void __user *ubuf, size_t size,
178289bddce5SStephen Hemminger 			 unsigned flags)
17831da177e4SLinus Torvalds {
17841da177e4SLinus Torvalds 	return sys_recvfrom(fd, ubuf, size, flags, NULL, NULL);
17851da177e4SLinus Torvalds }
17861da177e4SLinus Torvalds 
17871da177e4SLinus Torvalds /*
17881da177e4SLinus Torvalds  *	Set a socket option. Because we don't know the option lengths we have
17891da177e4SLinus Torvalds  *	to pass the user mode parameter for the protocols to sort out.
17901da177e4SLinus Torvalds  */
17911da177e4SLinus Torvalds 
179220f37034SHeiko Carstens SYSCALL_DEFINE5(setsockopt, int, fd, int, level, int, optname,
179320f37034SHeiko Carstens 		char __user *, optval, int, optlen)
17941da177e4SLinus Torvalds {
17956cb153caSBenjamin LaHaise 	int err, fput_needed;
17961da177e4SLinus Torvalds 	struct socket *sock;
17971da177e4SLinus Torvalds 
17981da177e4SLinus Torvalds 	if (optlen < 0)
17991da177e4SLinus Torvalds 		return -EINVAL;
18001da177e4SLinus Torvalds 
180189bddce5SStephen Hemminger 	sock = sockfd_lookup_light(fd, &err, &fput_needed);
180289bddce5SStephen Hemminger 	if (sock != NULL) {
18031da177e4SLinus Torvalds 		err = security_socket_setsockopt(sock, level, optname);
18046cb153caSBenjamin LaHaise 		if (err)
18056cb153caSBenjamin LaHaise 			goto out_put;
18061da177e4SLinus Torvalds 
18071da177e4SLinus Torvalds 		if (level == SOL_SOCKET)
180889bddce5SStephen Hemminger 			err =
180989bddce5SStephen Hemminger 			    sock_setsockopt(sock, level, optname, optval,
181089bddce5SStephen Hemminger 					    optlen);
18111da177e4SLinus Torvalds 		else
181289bddce5SStephen Hemminger 			err =
181389bddce5SStephen Hemminger 			    sock->ops->setsockopt(sock, level, optname, optval,
181489bddce5SStephen Hemminger 						  optlen);
18156cb153caSBenjamin LaHaise out_put:
18166cb153caSBenjamin LaHaise 		fput_light(sock->file, fput_needed);
18171da177e4SLinus Torvalds 	}
18181da177e4SLinus Torvalds 	return err;
18191da177e4SLinus Torvalds }
18201da177e4SLinus Torvalds 
18211da177e4SLinus Torvalds /*
18221da177e4SLinus Torvalds  *	Get a socket option. Because we don't know the option lengths we have
18231da177e4SLinus Torvalds  *	to pass a user mode parameter for the protocols to sort out.
18241da177e4SLinus Torvalds  */
18251da177e4SLinus Torvalds 
182620f37034SHeiko Carstens SYSCALL_DEFINE5(getsockopt, int, fd, int, level, int, optname,
182720f37034SHeiko Carstens 		char __user *, optval, int __user *, optlen)
18281da177e4SLinus Torvalds {
18296cb153caSBenjamin LaHaise 	int err, fput_needed;
18301da177e4SLinus Torvalds 	struct socket *sock;
18311da177e4SLinus Torvalds 
183289bddce5SStephen Hemminger 	sock = sockfd_lookup_light(fd, &err, &fput_needed);
183389bddce5SStephen Hemminger 	if (sock != NULL) {
18346cb153caSBenjamin LaHaise 		err = security_socket_getsockopt(sock, level, optname);
18356cb153caSBenjamin LaHaise 		if (err)
18366cb153caSBenjamin LaHaise 			goto out_put;
18371da177e4SLinus Torvalds 
18381da177e4SLinus Torvalds 		if (level == SOL_SOCKET)
183989bddce5SStephen Hemminger 			err =
184089bddce5SStephen Hemminger 			    sock_getsockopt(sock, level, optname, optval,
184189bddce5SStephen Hemminger 					    optlen);
18421da177e4SLinus Torvalds 		else
184389bddce5SStephen Hemminger 			err =
184489bddce5SStephen Hemminger 			    sock->ops->getsockopt(sock, level, optname, optval,
184589bddce5SStephen Hemminger 						  optlen);
18466cb153caSBenjamin LaHaise out_put:
18476cb153caSBenjamin LaHaise 		fput_light(sock->file, fput_needed);
18481da177e4SLinus Torvalds 	}
18491da177e4SLinus Torvalds 	return err;
18501da177e4SLinus Torvalds }
18511da177e4SLinus Torvalds 
18521da177e4SLinus Torvalds /*
18531da177e4SLinus Torvalds  *	Shutdown a socket.
18541da177e4SLinus Torvalds  */
18551da177e4SLinus Torvalds 
1856754fe8d2SHeiko Carstens SYSCALL_DEFINE2(shutdown, int, fd, int, how)
18571da177e4SLinus Torvalds {
18586cb153caSBenjamin LaHaise 	int err, fput_needed;
18591da177e4SLinus Torvalds 	struct socket *sock;
18601da177e4SLinus Torvalds 
186189bddce5SStephen Hemminger 	sock = sockfd_lookup_light(fd, &err, &fput_needed);
186289bddce5SStephen Hemminger 	if (sock != NULL) {
18631da177e4SLinus Torvalds 		err = security_socket_shutdown(sock, how);
18646cb153caSBenjamin LaHaise 		if (!err)
18651da177e4SLinus Torvalds 			err = sock->ops->shutdown(sock, how);
18666cb153caSBenjamin LaHaise 		fput_light(sock->file, fput_needed);
18671da177e4SLinus Torvalds 	}
18681da177e4SLinus Torvalds 	return err;
18691da177e4SLinus Torvalds }
18701da177e4SLinus Torvalds 
18711da177e4SLinus Torvalds /* A couple of helpful macros for getting the address of the 32/64 bit
18721da177e4SLinus Torvalds  * fields which are the same type (int / unsigned) on our platforms.
18731da177e4SLinus Torvalds  */
18741da177e4SLinus Torvalds #define COMPAT_MSG(msg, member)	((MSG_CMSG_COMPAT & flags) ? &msg##_compat->member : &msg->member)
18751da177e4SLinus Torvalds #define COMPAT_NAMELEN(msg)	COMPAT_MSG(msg, msg_namelen)
18761da177e4SLinus Torvalds #define COMPAT_FLAGS(msg)	COMPAT_MSG(msg, msg_flags)
18771da177e4SLinus Torvalds 
18781da177e4SLinus Torvalds /*
18791da177e4SLinus Torvalds  *	BSD sendmsg interface
18801da177e4SLinus Torvalds  */
18811da177e4SLinus Torvalds 
18823e0fa65fSHeiko Carstens SYSCALL_DEFINE3(sendmsg, int, fd, struct msghdr __user *, msg, unsigned, flags)
18831da177e4SLinus Torvalds {
188489bddce5SStephen Hemminger 	struct compat_msghdr __user *msg_compat =
188589bddce5SStephen Hemminger 	    (struct compat_msghdr __user *)msg;
18861da177e4SLinus Torvalds 	struct socket *sock;
1887230b1839SYOSHIFUJI Hideaki 	struct sockaddr_storage address;
18881da177e4SLinus Torvalds 	struct iovec iovstack[UIO_FASTIOV], *iov = iovstack;
1889b9d717a7SAlex Williamson 	unsigned char ctl[sizeof(struct cmsghdr) + 20]
1890b9d717a7SAlex Williamson 	    __attribute__ ((aligned(sizeof(__kernel_size_t))));
1891b9d717a7SAlex Williamson 	/* 20 is size of ipv6_pktinfo */
18921da177e4SLinus Torvalds 	unsigned char *ctl_buf = ctl;
18931da177e4SLinus Torvalds 	struct msghdr msg_sys;
18941da177e4SLinus Torvalds 	int err, ctl_len, iov_size, total_len;
18956cb153caSBenjamin LaHaise 	int fput_needed;
18961da177e4SLinus Torvalds 
18971da177e4SLinus Torvalds 	err = -EFAULT;
18981da177e4SLinus Torvalds 	if (MSG_CMSG_COMPAT & flags) {
18991da177e4SLinus Torvalds 		if (get_compat_msghdr(&msg_sys, msg_compat))
19001da177e4SLinus Torvalds 			return -EFAULT;
190189bddce5SStephen Hemminger 	}
190289bddce5SStephen Hemminger 	else if (copy_from_user(&msg_sys, msg, sizeof(struct msghdr)))
19031da177e4SLinus Torvalds 		return -EFAULT;
19041da177e4SLinus Torvalds 
19056cb153caSBenjamin LaHaise 	sock = sockfd_lookup_light(fd, &err, &fput_needed);
19061da177e4SLinus Torvalds 	if (!sock)
19071da177e4SLinus Torvalds 		goto out;
19081da177e4SLinus Torvalds 
19091da177e4SLinus Torvalds 	/* do not move before msg_sys is valid */
19101da177e4SLinus Torvalds 	err = -EMSGSIZE;
19111da177e4SLinus Torvalds 	if (msg_sys.msg_iovlen > UIO_MAXIOV)
19121da177e4SLinus Torvalds 		goto out_put;
19131da177e4SLinus Torvalds 
19141da177e4SLinus Torvalds 	/* Check whether to allocate the iovec area */
19151da177e4SLinus Torvalds 	err = -ENOMEM;
19161da177e4SLinus Torvalds 	iov_size = msg_sys.msg_iovlen * sizeof(struct iovec);
19171da177e4SLinus Torvalds 	if (msg_sys.msg_iovlen > UIO_FASTIOV) {
19181da177e4SLinus Torvalds 		iov = sock_kmalloc(sock->sk, iov_size, GFP_KERNEL);
19191da177e4SLinus Torvalds 		if (!iov)
19201da177e4SLinus Torvalds 			goto out_put;
19211da177e4SLinus Torvalds 	}
19221da177e4SLinus Torvalds 
19231da177e4SLinus Torvalds 	/* This will also move the address data into kernel space */
19241da177e4SLinus Torvalds 	if (MSG_CMSG_COMPAT & flags) {
1925230b1839SYOSHIFUJI Hideaki 		err = verify_compat_iovec(&msg_sys, iov,
1926230b1839SYOSHIFUJI Hideaki 					  (struct sockaddr *)&address,
1927230b1839SYOSHIFUJI Hideaki 					  VERIFY_READ);
19281da177e4SLinus Torvalds 	} else
1929230b1839SYOSHIFUJI Hideaki 		err = verify_iovec(&msg_sys, iov,
1930230b1839SYOSHIFUJI Hideaki 				   (struct sockaddr *)&address,
1931230b1839SYOSHIFUJI Hideaki 				   VERIFY_READ);
19321da177e4SLinus Torvalds 	if (err < 0)
19331da177e4SLinus Torvalds 		goto out_freeiov;
19341da177e4SLinus Torvalds 	total_len = err;
19351da177e4SLinus Torvalds 
19361da177e4SLinus Torvalds 	err = -ENOBUFS;
19371da177e4SLinus Torvalds 
19381da177e4SLinus Torvalds 	if (msg_sys.msg_controllen > INT_MAX)
19391da177e4SLinus Torvalds 		goto out_freeiov;
19401da177e4SLinus Torvalds 	ctl_len = msg_sys.msg_controllen;
19411da177e4SLinus Torvalds 	if ((MSG_CMSG_COMPAT & flags) && ctl_len) {
194289bddce5SStephen Hemminger 		err =
194389bddce5SStephen Hemminger 		    cmsghdr_from_user_compat_to_kern(&msg_sys, sock->sk, ctl,
194489bddce5SStephen Hemminger 						     sizeof(ctl));
19451da177e4SLinus Torvalds 		if (err)
19461da177e4SLinus Torvalds 			goto out_freeiov;
19471da177e4SLinus Torvalds 		ctl_buf = msg_sys.msg_control;
19488920e8f9SAl Viro 		ctl_len = msg_sys.msg_controllen;
19491da177e4SLinus Torvalds 	} else if (ctl_len) {
195089bddce5SStephen Hemminger 		if (ctl_len > sizeof(ctl)) {
19511da177e4SLinus Torvalds 			ctl_buf = sock_kmalloc(sock->sk, ctl_len, GFP_KERNEL);
19521da177e4SLinus Torvalds 			if (ctl_buf == NULL)
19531da177e4SLinus Torvalds 				goto out_freeiov;
19541da177e4SLinus Torvalds 		}
19551da177e4SLinus Torvalds 		err = -EFAULT;
19561da177e4SLinus Torvalds 		/*
19571da177e4SLinus Torvalds 		 * Careful! Before this, msg_sys.msg_control contains a user pointer.
19581da177e4SLinus Torvalds 		 * Afterwards, it will be a kernel pointer. Thus the compiler-assisted
19591da177e4SLinus Torvalds 		 * checking falls down on this.
19601da177e4SLinus Torvalds 		 */
196189bddce5SStephen Hemminger 		if (copy_from_user(ctl_buf, (void __user *)msg_sys.msg_control,
196289bddce5SStephen Hemminger 				   ctl_len))
19631da177e4SLinus Torvalds 			goto out_freectl;
19641da177e4SLinus Torvalds 		msg_sys.msg_control = ctl_buf;
19651da177e4SLinus Torvalds 	}
19661da177e4SLinus Torvalds 	msg_sys.msg_flags = flags;
19671da177e4SLinus Torvalds 
19681da177e4SLinus Torvalds 	if (sock->file->f_flags & O_NONBLOCK)
19691da177e4SLinus Torvalds 		msg_sys.msg_flags |= MSG_DONTWAIT;
19701da177e4SLinus Torvalds 	err = sock_sendmsg(sock, &msg_sys, total_len);
19711da177e4SLinus Torvalds 
19721da177e4SLinus Torvalds out_freectl:
19731da177e4SLinus Torvalds 	if (ctl_buf != ctl)
19741da177e4SLinus Torvalds 		sock_kfree_s(sock->sk, ctl_buf, ctl_len);
19751da177e4SLinus Torvalds out_freeiov:
19761da177e4SLinus Torvalds 	if (iov != iovstack)
19771da177e4SLinus Torvalds 		sock_kfree_s(sock->sk, iov, iov_size);
19781da177e4SLinus Torvalds out_put:
19796cb153caSBenjamin LaHaise 	fput_light(sock->file, fput_needed);
19801da177e4SLinus Torvalds out:
19811da177e4SLinus Torvalds 	return err;
19821da177e4SLinus Torvalds }
19831da177e4SLinus Torvalds 
1984a2e27255SArnaldo Carvalho de Melo static int __sys_recvmsg(struct socket *sock, struct msghdr __user *msg,
1985a2e27255SArnaldo Carvalho de Melo 			 struct msghdr *msg_sys, unsigned flags, int nosec)
19861da177e4SLinus Torvalds {
198789bddce5SStephen Hemminger 	struct compat_msghdr __user *msg_compat =
198889bddce5SStephen Hemminger 	    (struct compat_msghdr __user *)msg;
19891da177e4SLinus Torvalds 	struct iovec iovstack[UIO_FASTIOV];
19901da177e4SLinus Torvalds 	struct iovec *iov = iovstack;
19911da177e4SLinus Torvalds 	unsigned long cmsg_ptr;
19921da177e4SLinus Torvalds 	int err, iov_size, total_len, len;
19931da177e4SLinus Torvalds 
19941da177e4SLinus Torvalds 	/* kernel mode address */
1995230b1839SYOSHIFUJI Hideaki 	struct sockaddr_storage addr;
19961da177e4SLinus Torvalds 
19971da177e4SLinus Torvalds 	/* user mode address pointers */
19981da177e4SLinus Torvalds 	struct sockaddr __user *uaddr;
19991da177e4SLinus Torvalds 	int __user *uaddr_len;
20001da177e4SLinus Torvalds 
20011da177e4SLinus Torvalds 	if (MSG_CMSG_COMPAT & flags) {
2002a2e27255SArnaldo Carvalho de Melo 		if (get_compat_msghdr(msg_sys, msg_compat))
20031da177e4SLinus Torvalds 			return -EFAULT;
200489bddce5SStephen Hemminger 	}
2005a2e27255SArnaldo Carvalho de Melo 	else if (copy_from_user(msg_sys, msg, sizeof(struct msghdr)))
20061da177e4SLinus Torvalds 		return -EFAULT;
20071da177e4SLinus Torvalds 
20081da177e4SLinus Torvalds 	err = -EMSGSIZE;
2009a2e27255SArnaldo Carvalho de Melo 	if (msg_sys->msg_iovlen > UIO_MAXIOV)
2010a2e27255SArnaldo Carvalho de Melo 		goto out;
20111da177e4SLinus Torvalds 
20121da177e4SLinus Torvalds 	/* Check whether to allocate the iovec area */
20131da177e4SLinus Torvalds 	err = -ENOMEM;
2014a2e27255SArnaldo Carvalho de Melo 	iov_size = msg_sys->msg_iovlen * sizeof(struct iovec);
2015a2e27255SArnaldo Carvalho de Melo 	if (msg_sys->msg_iovlen > UIO_FASTIOV) {
20161da177e4SLinus Torvalds 		iov = sock_kmalloc(sock->sk, iov_size, GFP_KERNEL);
20171da177e4SLinus Torvalds 		if (!iov)
2018a2e27255SArnaldo Carvalho de Melo 			goto out;
20191da177e4SLinus Torvalds 	}
20201da177e4SLinus Torvalds 
20211da177e4SLinus Torvalds 	/*
20221da177e4SLinus Torvalds 	 *      Save the user-mode address (verify_iovec will change the
20231da177e4SLinus Torvalds 	 *      kernel msghdr to use the kernel address space)
20241da177e4SLinus Torvalds 	 */
20251da177e4SLinus Torvalds 
2026a2e27255SArnaldo Carvalho de Melo 	uaddr = (__force void __user *)msg_sys->msg_name;
20271da177e4SLinus Torvalds 	uaddr_len = COMPAT_NAMELEN(msg);
20281da177e4SLinus Torvalds 	if (MSG_CMSG_COMPAT & flags) {
2029a2e27255SArnaldo Carvalho de Melo 		err = verify_compat_iovec(msg_sys, iov,
2030230b1839SYOSHIFUJI Hideaki 					  (struct sockaddr *)&addr,
2031230b1839SYOSHIFUJI Hideaki 					  VERIFY_WRITE);
20321da177e4SLinus Torvalds 	} else
2033a2e27255SArnaldo Carvalho de Melo 		err = verify_iovec(msg_sys, iov,
2034230b1839SYOSHIFUJI Hideaki 				   (struct sockaddr *)&addr,
2035230b1839SYOSHIFUJI Hideaki 				   VERIFY_WRITE);
20361da177e4SLinus Torvalds 	if (err < 0)
20371da177e4SLinus Torvalds 		goto out_freeiov;
20381da177e4SLinus Torvalds 	total_len = err;
20391da177e4SLinus Torvalds 
2040a2e27255SArnaldo Carvalho de Melo 	cmsg_ptr = (unsigned long)msg_sys->msg_control;
2041a2e27255SArnaldo Carvalho de Melo 	msg_sys->msg_flags = flags & (MSG_CMSG_CLOEXEC|MSG_CMSG_COMPAT);
20421da177e4SLinus Torvalds 
20431da177e4SLinus Torvalds 	if (sock->file->f_flags & O_NONBLOCK)
20441da177e4SLinus Torvalds 		flags |= MSG_DONTWAIT;
2045a2e27255SArnaldo Carvalho de Melo 	err = (nosec ? sock_recvmsg_nosec : sock_recvmsg)(sock, msg_sys,
2046a2e27255SArnaldo Carvalho de Melo 							  total_len, flags);
20471da177e4SLinus Torvalds 	if (err < 0)
20481da177e4SLinus Torvalds 		goto out_freeiov;
20491da177e4SLinus Torvalds 	len = err;
20501da177e4SLinus Torvalds 
20511da177e4SLinus Torvalds 	if (uaddr != NULL) {
2052230b1839SYOSHIFUJI Hideaki 		err = move_addr_to_user((struct sockaddr *)&addr,
2053a2e27255SArnaldo Carvalho de Melo 					msg_sys->msg_namelen, uaddr,
205489bddce5SStephen Hemminger 					uaddr_len);
20551da177e4SLinus Torvalds 		if (err < 0)
20561da177e4SLinus Torvalds 			goto out_freeiov;
20571da177e4SLinus Torvalds 	}
2058a2e27255SArnaldo Carvalho de Melo 	err = __put_user((msg_sys->msg_flags & ~MSG_CMSG_COMPAT),
205937f7f421SDavid S. Miller 			 COMPAT_FLAGS(msg));
20601da177e4SLinus Torvalds 	if (err)
20611da177e4SLinus Torvalds 		goto out_freeiov;
20621da177e4SLinus Torvalds 	if (MSG_CMSG_COMPAT & flags)
2063a2e27255SArnaldo Carvalho de Melo 		err = __put_user((unsigned long)msg_sys->msg_control - cmsg_ptr,
20641da177e4SLinus Torvalds 				 &msg_compat->msg_controllen);
20651da177e4SLinus Torvalds 	else
2066a2e27255SArnaldo Carvalho de Melo 		err = __put_user((unsigned long)msg_sys->msg_control - cmsg_ptr,
20671da177e4SLinus Torvalds 				 &msg->msg_controllen);
20681da177e4SLinus Torvalds 	if (err)
20691da177e4SLinus Torvalds 		goto out_freeiov;
20701da177e4SLinus Torvalds 	err = len;
20711da177e4SLinus Torvalds 
20721da177e4SLinus Torvalds out_freeiov:
20731da177e4SLinus Torvalds 	if (iov != iovstack)
20741da177e4SLinus Torvalds 		sock_kfree_s(sock->sk, iov, iov_size);
2075a2e27255SArnaldo Carvalho de Melo out:
2076a2e27255SArnaldo Carvalho de Melo 	return err;
2077a2e27255SArnaldo Carvalho de Melo }
2078a2e27255SArnaldo Carvalho de Melo 
2079a2e27255SArnaldo Carvalho de Melo /*
2080a2e27255SArnaldo Carvalho de Melo  *	BSD recvmsg interface
2081a2e27255SArnaldo Carvalho de Melo  */
2082a2e27255SArnaldo Carvalho de Melo 
2083a2e27255SArnaldo Carvalho de Melo SYSCALL_DEFINE3(recvmsg, int, fd, struct msghdr __user *, msg,
2084a2e27255SArnaldo Carvalho de Melo 		unsigned int, flags)
2085a2e27255SArnaldo Carvalho de Melo {
2086a2e27255SArnaldo Carvalho de Melo 	int fput_needed, err;
2087a2e27255SArnaldo Carvalho de Melo 	struct msghdr msg_sys;
2088a2e27255SArnaldo Carvalho de Melo 	struct socket *sock = sockfd_lookup_light(fd, &err, &fput_needed);
2089a2e27255SArnaldo Carvalho de Melo 
2090a2e27255SArnaldo Carvalho de Melo 	if (!sock)
2091a2e27255SArnaldo Carvalho de Melo 		goto out;
2092a2e27255SArnaldo Carvalho de Melo 
2093a2e27255SArnaldo Carvalho de Melo 	err = __sys_recvmsg(sock, msg, &msg_sys, flags, 0);
2094a2e27255SArnaldo Carvalho de Melo 
20956cb153caSBenjamin LaHaise 	fput_light(sock->file, fput_needed);
20961da177e4SLinus Torvalds out:
20971da177e4SLinus Torvalds 	return err;
20981da177e4SLinus Torvalds }
20991da177e4SLinus Torvalds 
2100a2e27255SArnaldo Carvalho de Melo /*
2101a2e27255SArnaldo Carvalho de Melo  *     Linux recvmmsg interface
2102a2e27255SArnaldo Carvalho de Melo  */
21031da177e4SLinus Torvalds 
2104a2e27255SArnaldo Carvalho de Melo int __sys_recvmmsg(int fd, struct mmsghdr __user *mmsg, unsigned int vlen,
2105a2e27255SArnaldo Carvalho de Melo 		   unsigned int flags, struct timespec *timeout)
2106a2e27255SArnaldo Carvalho de Melo {
2107a2e27255SArnaldo Carvalho de Melo 	int fput_needed, err, datagrams;
2108a2e27255SArnaldo Carvalho de Melo 	struct socket *sock;
2109a2e27255SArnaldo Carvalho de Melo 	struct mmsghdr __user *entry;
2110d7256d0eSJean-Mickael Guerin 	struct compat_mmsghdr __user *compat_entry;
2111a2e27255SArnaldo Carvalho de Melo 	struct msghdr msg_sys;
2112a2e27255SArnaldo Carvalho de Melo 	struct timespec end_time;
2113a2e27255SArnaldo Carvalho de Melo 
2114a2e27255SArnaldo Carvalho de Melo 	if (timeout &&
2115a2e27255SArnaldo Carvalho de Melo 	    poll_select_set_timeout(&end_time, timeout->tv_sec,
2116a2e27255SArnaldo Carvalho de Melo 				    timeout->tv_nsec))
2117a2e27255SArnaldo Carvalho de Melo 		return -EINVAL;
2118a2e27255SArnaldo Carvalho de Melo 
2119a2e27255SArnaldo Carvalho de Melo 	datagrams = 0;
2120a2e27255SArnaldo Carvalho de Melo 
2121a2e27255SArnaldo Carvalho de Melo 	sock = sockfd_lookup_light(fd, &err, &fput_needed);
2122a2e27255SArnaldo Carvalho de Melo 	if (!sock)
2123a2e27255SArnaldo Carvalho de Melo 		return err;
2124a2e27255SArnaldo Carvalho de Melo 
2125a2e27255SArnaldo Carvalho de Melo 	err = sock_error(sock->sk);
2126a2e27255SArnaldo Carvalho de Melo 	if (err)
2127a2e27255SArnaldo Carvalho de Melo 		goto out_put;
2128a2e27255SArnaldo Carvalho de Melo 
2129a2e27255SArnaldo Carvalho de Melo 	entry = mmsg;
2130d7256d0eSJean-Mickael Guerin 	compat_entry = (struct compat_mmsghdr __user *)mmsg;
2131a2e27255SArnaldo Carvalho de Melo 
2132a2e27255SArnaldo Carvalho de Melo 	while (datagrams < vlen) {
2133a2e27255SArnaldo Carvalho de Melo 		/*
2134a2e27255SArnaldo Carvalho de Melo 		 * No need to ask LSM for more than the first datagram.
2135a2e27255SArnaldo Carvalho de Melo 		 */
2136d7256d0eSJean-Mickael Guerin 		if (MSG_CMSG_COMPAT & flags) {
2137d7256d0eSJean-Mickael Guerin 			err = __sys_recvmsg(sock, (struct msghdr __user *)compat_entry,
2138d7256d0eSJean-Mickael Guerin 					    &msg_sys, flags, datagrams);
2139d7256d0eSJean-Mickael Guerin 			if (err < 0)
2140d7256d0eSJean-Mickael Guerin 				break;
2141d7256d0eSJean-Mickael Guerin 			err = __put_user(err, &compat_entry->msg_len);
2142d7256d0eSJean-Mickael Guerin 			++compat_entry;
2143d7256d0eSJean-Mickael Guerin 		} else {
2144a2e27255SArnaldo Carvalho de Melo 			err = __sys_recvmsg(sock, (struct msghdr __user *)entry,
2145a2e27255SArnaldo Carvalho de Melo 					    &msg_sys, flags, datagrams);
2146a2e27255SArnaldo Carvalho de Melo 			if (err < 0)
2147a2e27255SArnaldo Carvalho de Melo 				break;
2148a2e27255SArnaldo Carvalho de Melo 			err = put_user(err, &entry->msg_len);
2149d7256d0eSJean-Mickael Guerin 			++entry;
2150d7256d0eSJean-Mickael Guerin 		}
2151d7256d0eSJean-Mickael Guerin 
2152a2e27255SArnaldo Carvalho de Melo 		if (err)
2153a2e27255SArnaldo Carvalho de Melo 			break;
2154a2e27255SArnaldo Carvalho de Melo 		++datagrams;
2155a2e27255SArnaldo Carvalho de Melo 
2156a2e27255SArnaldo Carvalho de Melo 		if (timeout) {
2157a2e27255SArnaldo Carvalho de Melo 			ktime_get_ts(timeout);
2158a2e27255SArnaldo Carvalho de Melo 			*timeout = timespec_sub(end_time, *timeout);
2159a2e27255SArnaldo Carvalho de Melo 			if (timeout->tv_sec < 0) {
2160a2e27255SArnaldo Carvalho de Melo 				timeout->tv_sec = timeout->tv_nsec = 0;
2161a2e27255SArnaldo Carvalho de Melo 				break;
2162a2e27255SArnaldo Carvalho de Melo 			}
2163a2e27255SArnaldo Carvalho de Melo 
2164a2e27255SArnaldo Carvalho de Melo 			/* Timeout, return less than vlen datagrams */
2165a2e27255SArnaldo Carvalho de Melo 			if (timeout->tv_nsec == 0 && timeout->tv_sec == 0)
2166a2e27255SArnaldo Carvalho de Melo 				break;
2167a2e27255SArnaldo Carvalho de Melo 		}
2168a2e27255SArnaldo Carvalho de Melo 
2169a2e27255SArnaldo Carvalho de Melo 		/* Out of band data, return right away */
2170a2e27255SArnaldo Carvalho de Melo 		if (msg_sys.msg_flags & MSG_OOB)
2171a2e27255SArnaldo Carvalho de Melo 			break;
2172a2e27255SArnaldo Carvalho de Melo 	}
2173a2e27255SArnaldo Carvalho de Melo 
2174a2e27255SArnaldo Carvalho de Melo out_put:
2175a2e27255SArnaldo Carvalho de Melo 	fput_light(sock->file, fput_needed);
2176a2e27255SArnaldo Carvalho de Melo 
2177a2e27255SArnaldo Carvalho de Melo 	if (err == 0)
2178a2e27255SArnaldo Carvalho de Melo 		return datagrams;
2179a2e27255SArnaldo Carvalho de Melo 
2180a2e27255SArnaldo Carvalho de Melo 	if (datagrams != 0) {
2181a2e27255SArnaldo Carvalho de Melo 		/*
2182a2e27255SArnaldo Carvalho de Melo 		 * We may return less entries than requested (vlen) if the
2183a2e27255SArnaldo Carvalho de Melo 		 * sock is non block and there aren't enough datagrams...
2184a2e27255SArnaldo Carvalho de Melo 		 */
2185a2e27255SArnaldo Carvalho de Melo 		if (err != -EAGAIN) {
2186a2e27255SArnaldo Carvalho de Melo 			/*
2187a2e27255SArnaldo Carvalho de Melo 			 * ... or  if recvmsg returns an error after we
2188a2e27255SArnaldo Carvalho de Melo 			 * received some datagrams, where we record the
2189a2e27255SArnaldo Carvalho de Melo 			 * error to return on the next call or if the
2190a2e27255SArnaldo Carvalho de Melo 			 * app asks about it using getsockopt(SO_ERROR).
2191a2e27255SArnaldo Carvalho de Melo 			 */
2192a2e27255SArnaldo Carvalho de Melo 			sock->sk->sk_err = -err;
2193a2e27255SArnaldo Carvalho de Melo 		}
2194a2e27255SArnaldo Carvalho de Melo 
2195a2e27255SArnaldo Carvalho de Melo 		return datagrams;
2196a2e27255SArnaldo Carvalho de Melo 	}
2197a2e27255SArnaldo Carvalho de Melo 
2198a2e27255SArnaldo Carvalho de Melo 	return err;
2199a2e27255SArnaldo Carvalho de Melo }
2200a2e27255SArnaldo Carvalho de Melo 
2201a2e27255SArnaldo Carvalho de Melo SYSCALL_DEFINE5(recvmmsg, int, fd, struct mmsghdr __user *, mmsg,
2202a2e27255SArnaldo Carvalho de Melo 		unsigned int, vlen, unsigned int, flags,
2203a2e27255SArnaldo Carvalho de Melo 		struct timespec __user *, timeout)
2204a2e27255SArnaldo Carvalho de Melo {
2205a2e27255SArnaldo Carvalho de Melo 	int datagrams;
2206a2e27255SArnaldo Carvalho de Melo 	struct timespec timeout_sys;
2207a2e27255SArnaldo Carvalho de Melo 
2208a2e27255SArnaldo Carvalho de Melo 	if (!timeout)
2209a2e27255SArnaldo Carvalho de Melo 		return __sys_recvmmsg(fd, mmsg, vlen, flags, NULL);
2210a2e27255SArnaldo Carvalho de Melo 
2211a2e27255SArnaldo Carvalho de Melo 	if (copy_from_user(&timeout_sys, timeout, sizeof(timeout_sys)))
2212a2e27255SArnaldo Carvalho de Melo 		return -EFAULT;
2213a2e27255SArnaldo Carvalho de Melo 
2214a2e27255SArnaldo Carvalho de Melo 	datagrams = __sys_recvmmsg(fd, mmsg, vlen, flags, &timeout_sys);
2215a2e27255SArnaldo Carvalho de Melo 
2216a2e27255SArnaldo Carvalho de Melo 	if (datagrams > 0 &&
2217a2e27255SArnaldo Carvalho de Melo 	    copy_to_user(timeout, &timeout_sys, sizeof(timeout_sys)))
2218a2e27255SArnaldo Carvalho de Melo 		datagrams = -EFAULT;
2219a2e27255SArnaldo Carvalho de Melo 
2220a2e27255SArnaldo Carvalho de Melo 	return datagrams;
2221a2e27255SArnaldo Carvalho de Melo }
2222a2e27255SArnaldo Carvalho de Melo 
2223a2e27255SArnaldo Carvalho de Melo #ifdef __ARCH_WANT_SYS_SOCKETCALL
22241da177e4SLinus Torvalds /* Argument list sizes for sys_socketcall */
22251da177e4SLinus Torvalds #define AL(x) ((x) * sizeof(unsigned long))
2226a2e27255SArnaldo Carvalho de Melo static const unsigned char nargs[20] = {
222789bddce5SStephen Hemminger 	AL(0),AL(3),AL(3),AL(3),AL(2),AL(3),
22281da177e4SLinus Torvalds 	AL(3),AL(3),AL(4),AL(4),AL(4),AL(6),
2229aaca0bdcSUlrich Drepper 	AL(6),AL(2),AL(5),AL(5),AL(3),AL(3),
2230a2e27255SArnaldo Carvalho de Melo 	AL(4),AL(5)
223189bddce5SStephen Hemminger };
223289bddce5SStephen Hemminger 
22331da177e4SLinus Torvalds #undef AL
22341da177e4SLinus Torvalds 
22351da177e4SLinus Torvalds /*
22361da177e4SLinus Torvalds  *	System call vectors.
22371da177e4SLinus Torvalds  *
22381da177e4SLinus Torvalds  *	Argument checking cleaned up. Saved 20% in size.
22391da177e4SLinus Torvalds  *  This function doesn't need to set the kernel lock because
22401da177e4SLinus Torvalds  *  it is set by the callees.
22411da177e4SLinus Torvalds  */
22421da177e4SLinus Torvalds 
22433e0fa65fSHeiko Carstens SYSCALL_DEFINE2(socketcall, int, call, unsigned long __user *, args)
22441da177e4SLinus Torvalds {
22451da177e4SLinus Torvalds 	unsigned long a[6];
22461da177e4SLinus Torvalds 	unsigned long a0, a1;
22471da177e4SLinus Torvalds 	int err;
224847379052SArjan van de Ven 	unsigned int len;
22491da177e4SLinus Torvalds 
2250a2e27255SArnaldo Carvalho de Melo 	if (call < 1 || call > SYS_RECVMMSG)
22511da177e4SLinus Torvalds 		return -EINVAL;
22521da177e4SLinus Torvalds 
225347379052SArjan van de Ven 	len = nargs[call];
225447379052SArjan van de Ven 	if (len > sizeof(a))
225547379052SArjan van de Ven 		return -EINVAL;
225647379052SArjan van de Ven 
22571da177e4SLinus Torvalds 	/* copy_from_user should be SMP safe. */
225847379052SArjan van de Ven 	if (copy_from_user(a, args, len))
22591da177e4SLinus Torvalds 		return -EFAULT;
22601da177e4SLinus Torvalds 
2261f3298dc4SAl Viro 	audit_socketcall(nargs[call] / sizeof(unsigned long), a);
22623ec3b2fbSDavid Woodhouse 
22631da177e4SLinus Torvalds 	a0 = a[0];
22641da177e4SLinus Torvalds 	a1 = a[1];
22651da177e4SLinus Torvalds 
226689bddce5SStephen Hemminger 	switch (call) {
22671da177e4SLinus Torvalds 	case SYS_SOCKET:
22681da177e4SLinus Torvalds 		err = sys_socket(a0, a1, a[2]);
22691da177e4SLinus Torvalds 		break;
22701da177e4SLinus Torvalds 	case SYS_BIND:
22711da177e4SLinus Torvalds 		err = sys_bind(a0, (struct sockaddr __user *)a1, a[2]);
22721da177e4SLinus Torvalds 		break;
22731da177e4SLinus Torvalds 	case SYS_CONNECT:
22741da177e4SLinus Torvalds 		err = sys_connect(a0, (struct sockaddr __user *)a1, a[2]);
22751da177e4SLinus Torvalds 		break;
22761da177e4SLinus Torvalds 	case SYS_LISTEN:
22771da177e4SLinus Torvalds 		err = sys_listen(a0, a1);
22781da177e4SLinus Torvalds 		break;
22791da177e4SLinus Torvalds 	case SYS_ACCEPT:
2280de11defeSUlrich Drepper 		err = sys_accept4(a0, (struct sockaddr __user *)a1,
2281aaca0bdcSUlrich Drepper 				  (int __user *)a[2], 0);
22821da177e4SLinus Torvalds 		break;
22831da177e4SLinus Torvalds 	case SYS_GETSOCKNAME:
228489bddce5SStephen Hemminger 		err =
228589bddce5SStephen Hemminger 		    sys_getsockname(a0, (struct sockaddr __user *)a1,
228689bddce5SStephen Hemminger 				    (int __user *)a[2]);
22871da177e4SLinus Torvalds 		break;
22881da177e4SLinus Torvalds 	case SYS_GETPEERNAME:
228989bddce5SStephen Hemminger 		err =
229089bddce5SStephen Hemminger 		    sys_getpeername(a0, (struct sockaddr __user *)a1,
229189bddce5SStephen Hemminger 				    (int __user *)a[2]);
22921da177e4SLinus Torvalds 		break;
22931da177e4SLinus Torvalds 	case SYS_SOCKETPAIR:
22941da177e4SLinus Torvalds 		err = sys_socketpair(a0, a1, a[2], (int __user *)a[3]);
22951da177e4SLinus Torvalds 		break;
22961da177e4SLinus Torvalds 	case SYS_SEND:
22971da177e4SLinus Torvalds 		err = sys_send(a0, (void __user *)a1, a[2], a[3]);
22981da177e4SLinus Torvalds 		break;
22991da177e4SLinus Torvalds 	case SYS_SENDTO:
23001da177e4SLinus Torvalds 		err = sys_sendto(a0, (void __user *)a1, a[2], a[3],
23011da177e4SLinus Torvalds 				 (struct sockaddr __user *)a[4], a[5]);
23021da177e4SLinus Torvalds 		break;
23031da177e4SLinus Torvalds 	case SYS_RECV:
23041da177e4SLinus Torvalds 		err = sys_recv(a0, (void __user *)a1, a[2], a[3]);
23051da177e4SLinus Torvalds 		break;
23061da177e4SLinus Torvalds 	case SYS_RECVFROM:
23071da177e4SLinus Torvalds 		err = sys_recvfrom(a0, (void __user *)a1, a[2], a[3],
230889bddce5SStephen Hemminger 				   (struct sockaddr __user *)a[4],
230989bddce5SStephen Hemminger 				   (int __user *)a[5]);
23101da177e4SLinus Torvalds 		break;
23111da177e4SLinus Torvalds 	case SYS_SHUTDOWN:
23121da177e4SLinus Torvalds 		err = sys_shutdown(a0, a1);
23131da177e4SLinus Torvalds 		break;
23141da177e4SLinus Torvalds 	case SYS_SETSOCKOPT:
23151da177e4SLinus Torvalds 		err = sys_setsockopt(a0, a1, a[2], (char __user *)a[3], a[4]);
23161da177e4SLinus Torvalds 		break;
23171da177e4SLinus Torvalds 	case SYS_GETSOCKOPT:
231889bddce5SStephen Hemminger 		err =
231989bddce5SStephen Hemminger 		    sys_getsockopt(a0, a1, a[2], (char __user *)a[3],
232089bddce5SStephen Hemminger 				   (int __user *)a[4]);
23211da177e4SLinus Torvalds 		break;
23221da177e4SLinus Torvalds 	case SYS_SENDMSG:
23231da177e4SLinus Torvalds 		err = sys_sendmsg(a0, (struct msghdr __user *)a1, a[2]);
23241da177e4SLinus Torvalds 		break;
23251da177e4SLinus Torvalds 	case SYS_RECVMSG:
23261da177e4SLinus Torvalds 		err = sys_recvmsg(a0, (struct msghdr __user *)a1, a[2]);
23271da177e4SLinus Torvalds 		break;
2328a2e27255SArnaldo Carvalho de Melo 	case SYS_RECVMMSG:
2329a2e27255SArnaldo Carvalho de Melo 		err = sys_recvmmsg(a0, (struct mmsghdr __user *)a1, a[2], a[3],
2330a2e27255SArnaldo Carvalho de Melo 				   (struct timespec __user *)a[4]);
2331a2e27255SArnaldo Carvalho de Melo 		break;
2332de11defeSUlrich Drepper 	case SYS_ACCEPT4:
2333de11defeSUlrich Drepper 		err = sys_accept4(a0, (struct sockaddr __user *)a1,
2334de11defeSUlrich Drepper 				  (int __user *)a[2], a[3]);
2335aaca0bdcSUlrich Drepper 		break;
23361da177e4SLinus Torvalds 	default:
23371da177e4SLinus Torvalds 		err = -EINVAL;
23381da177e4SLinus Torvalds 		break;
23391da177e4SLinus Torvalds 	}
23401da177e4SLinus Torvalds 	return err;
23411da177e4SLinus Torvalds }
23421da177e4SLinus Torvalds 
23431da177e4SLinus Torvalds #endif				/* __ARCH_WANT_SYS_SOCKETCALL */
23441da177e4SLinus Torvalds 
234555737fdaSStephen Hemminger /**
234655737fdaSStephen Hemminger  *	sock_register - add a socket protocol handler
234755737fdaSStephen Hemminger  *	@ops: description of protocol
234855737fdaSStephen Hemminger  *
23491da177e4SLinus Torvalds  *	This function is called by a protocol handler that wants to
23501da177e4SLinus Torvalds  *	advertise its address family, and have it linked into the
235155737fdaSStephen Hemminger  *	socket interface. The value ops->family coresponds to the
235255737fdaSStephen Hemminger  *	socket system call protocol family.
23531da177e4SLinus Torvalds  */
2354f0fd27d4SStephen Hemminger int sock_register(const struct net_proto_family *ops)
23551da177e4SLinus Torvalds {
23561da177e4SLinus Torvalds 	int err;
23571da177e4SLinus Torvalds 
23581da177e4SLinus Torvalds 	if (ops->family >= NPROTO) {
235989bddce5SStephen Hemminger 		printk(KERN_CRIT "protocol %d >= NPROTO(%d)\n", ops->family,
236089bddce5SStephen Hemminger 		       NPROTO);
23611da177e4SLinus Torvalds 		return -ENOBUFS;
23621da177e4SLinus Torvalds 	}
236355737fdaSStephen Hemminger 
236455737fdaSStephen Hemminger 	spin_lock(&net_family_lock);
236555737fdaSStephen Hemminger 	if (net_families[ops->family])
23661da177e4SLinus Torvalds 		err = -EEXIST;
236755737fdaSStephen Hemminger 	else {
23681da177e4SLinus Torvalds 		net_families[ops->family] = ops;
23691da177e4SLinus Torvalds 		err = 0;
23701da177e4SLinus Torvalds 	}
237155737fdaSStephen Hemminger 	spin_unlock(&net_family_lock);
237255737fdaSStephen Hemminger 
237389bddce5SStephen Hemminger 	printk(KERN_INFO "NET: Registered protocol family %d\n", ops->family);
23741da177e4SLinus Torvalds 	return err;
23751da177e4SLinus Torvalds }
23761da177e4SLinus Torvalds 
237755737fdaSStephen Hemminger /**
237855737fdaSStephen Hemminger  *	sock_unregister - remove a protocol handler
237955737fdaSStephen Hemminger  *	@family: protocol family to remove
238055737fdaSStephen Hemminger  *
23811da177e4SLinus Torvalds  *	This function is called by a protocol handler that wants to
23821da177e4SLinus Torvalds  *	remove its address family, and have it unlinked from the
238355737fdaSStephen Hemminger  *	new socket creation.
238455737fdaSStephen Hemminger  *
238555737fdaSStephen Hemminger  *	If protocol handler is a module, then it can use module reference
238655737fdaSStephen Hemminger  *	counts to protect against new references. If protocol handler is not
238755737fdaSStephen Hemminger  *	a module then it needs to provide its own protection in
238855737fdaSStephen Hemminger  *	the ops->create routine.
23891da177e4SLinus Torvalds  */
2390f0fd27d4SStephen Hemminger void sock_unregister(int family)
23911da177e4SLinus Torvalds {
2392f0fd27d4SStephen Hemminger 	BUG_ON(family < 0 || family >= NPROTO);
23931da177e4SLinus Torvalds 
239455737fdaSStephen Hemminger 	spin_lock(&net_family_lock);
23951da177e4SLinus Torvalds 	net_families[family] = NULL;
239655737fdaSStephen Hemminger 	spin_unlock(&net_family_lock);
239755737fdaSStephen Hemminger 
239855737fdaSStephen Hemminger 	synchronize_rcu();
239955737fdaSStephen Hemminger 
240089bddce5SStephen Hemminger 	printk(KERN_INFO "NET: Unregistered protocol family %d\n", family);
24011da177e4SLinus Torvalds }
24021da177e4SLinus Torvalds 
240377d76ea3SAndi Kleen static int __init sock_init(void)
24041da177e4SLinus Torvalds {
24051da177e4SLinus Torvalds 	/*
24061da177e4SLinus Torvalds 	 *      Initialize sock SLAB cache.
24071da177e4SLinus Torvalds 	 */
24081da177e4SLinus Torvalds 
24091da177e4SLinus Torvalds 	sk_init();
24101da177e4SLinus Torvalds 
24111da177e4SLinus Torvalds 	/*
24121da177e4SLinus Torvalds 	 *      Initialize skbuff SLAB cache
24131da177e4SLinus Torvalds 	 */
24141da177e4SLinus Torvalds 	skb_init();
24151da177e4SLinus Torvalds 
24161da177e4SLinus Torvalds 	/*
24171da177e4SLinus Torvalds 	 *      Initialize the protocols module.
24181da177e4SLinus Torvalds 	 */
24191da177e4SLinus Torvalds 
24201da177e4SLinus Torvalds 	init_inodecache();
24211da177e4SLinus Torvalds 	register_filesystem(&sock_fs_type);
24221da177e4SLinus Torvalds 	sock_mnt = kern_mount(&sock_fs_type);
242377d76ea3SAndi Kleen 
242477d76ea3SAndi Kleen 	/* The real protocol initialization is performed in later initcalls.
24251da177e4SLinus Torvalds 	 */
24261da177e4SLinus Torvalds 
24271da177e4SLinus Torvalds #ifdef CONFIG_NETFILTER
24281da177e4SLinus Torvalds 	netfilter_init();
24291da177e4SLinus Torvalds #endif
2430cbeb321aSDavid S. Miller 
2431cbeb321aSDavid S. Miller 	return 0;
24321da177e4SLinus Torvalds }
24331da177e4SLinus Torvalds 
243477d76ea3SAndi Kleen core_initcall(sock_init);	/* early initcall */
243577d76ea3SAndi Kleen 
24361da177e4SLinus Torvalds #ifdef CONFIG_PROC_FS
24371da177e4SLinus Torvalds void socket_seq_show(struct seq_file *seq)
24381da177e4SLinus Torvalds {
24391da177e4SLinus Torvalds 	int cpu;
24401da177e4SLinus Torvalds 	int counter = 0;
24411da177e4SLinus Torvalds 
24426f912042SKAMEZAWA Hiroyuki 	for_each_possible_cpu(cpu)
24431da177e4SLinus Torvalds 	    counter += per_cpu(sockets_in_use, cpu);
24441da177e4SLinus Torvalds 
24451da177e4SLinus Torvalds 	/* It can be negative, by the way. 8) */
24461da177e4SLinus Torvalds 	if (counter < 0)
24471da177e4SLinus Torvalds 		counter = 0;
24481da177e4SLinus Torvalds 
24491da177e4SLinus Torvalds 	seq_printf(seq, "sockets: used %d\n", counter);
24501da177e4SLinus Torvalds }
24511da177e4SLinus Torvalds #endif				/* CONFIG_PROC_FS */
24521da177e4SLinus Torvalds 
245389bbfc95SShaun Pereira #ifdef CONFIG_COMPAT
24546b96018bSArnd Bergmann static int do_siocgstamp(struct net *net, struct socket *sock,
24556b96018bSArnd Bergmann 			 unsigned int cmd, struct compat_timeval __user *up)
24567a229387SArnd Bergmann {
24577a229387SArnd Bergmann 	mm_segment_t old_fs = get_fs();
24587a229387SArnd Bergmann 	struct timeval ktv;
24597a229387SArnd Bergmann 	int err;
24607a229387SArnd Bergmann 
24617a229387SArnd Bergmann 	set_fs(KERNEL_DS);
24626b96018bSArnd Bergmann 	err = sock_do_ioctl(net, sock, cmd, (unsigned long)&ktv);
24637a229387SArnd Bergmann 	set_fs(old_fs);
24647a229387SArnd Bergmann 	if (!err) {
24657a229387SArnd Bergmann 		err = put_user(ktv.tv_sec, &up->tv_sec);
24667a229387SArnd Bergmann 		err |= __put_user(ktv.tv_usec, &up->tv_usec);
24677a229387SArnd Bergmann 	}
24687a229387SArnd Bergmann 	return err;
24697a229387SArnd Bergmann }
24707a229387SArnd Bergmann 
24716b96018bSArnd Bergmann static int do_siocgstampns(struct net *net, struct socket *sock,
24726b96018bSArnd Bergmann 			 unsigned int cmd, struct compat_timespec __user *up)
24737a229387SArnd Bergmann {
24747a229387SArnd Bergmann 	mm_segment_t old_fs = get_fs();
24757a229387SArnd Bergmann 	struct timespec kts;
24767a229387SArnd Bergmann 	int err;
24777a229387SArnd Bergmann 
24787a229387SArnd Bergmann 	set_fs(KERNEL_DS);
24796b96018bSArnd Bergmann 	err = sock_do_ioctl(net, sock, cmd, (unsigned long)&kts);
24807a229387SArnd Bergmann 	set_fs(old_fs);
24817a229387SArnd Bergmann 	if (!err) {
24827a229387SArnd Bergmann 		err = put_user(kts.tv_sec, &up->tv_sec);
24837a229387SArnd Bergmann 		err |= __put_user(kts.tv_nsec, &up->tv_nsec);
24847a229387SArnd Bergmann 	}
24857a229387SArnd Bergmann 	return err;
24867a229387SArnd Bergmann }
24877a229387SArnd Bergmann 
24886b96018bSArnd Bergmann static int dev_ifname32(struct net *net, struct compat_ifreq __user *uifr32)
24897a229387SArnd Bergmann {
24907a229387SArnd Bergmann 	struct ifreq __user *uifr;
24917a229387SArnd Bergmann 	int err;
24927a229387SArnd Bergmann 
24937a229387SArnd Bergmann 	uifr = compat_alloc_user_space(sizeof(struct ifreq));
24946b96018bSArnd Bergmann 	if (copy_in_user(uifr, uifr32, sizeof(struct compat_ifreq)))
24957a229387SArnd Bergmann 		return -EFAULT;
24967a229387SArnd Bergmann 
24976b96018bSArnd Bergmann 	err = dev_ioctl(net, SIOCGIFNAME, uifr);
24987a229387SArnd Bergmann 	if (err)
24997a229387SArnd Bergmann 		return err;
25007a229387SArnd Bergmann 
25016b96018bSArnd Bergmann 	if (copy_in_user(uifr32, uifr, sizeof(struct compat_ifreq)))
25027a229387SArnd Bergmann 		return -EFAULT;
25037a229387SArnd Bergmann 
25047a229387SArnd Bergmann 	return 0;
25057a229387SArnd Bergmann }
25067a229387SArnd Bergmann 
25076b96018bSArnd Bergmann static int dev_ifconf(struct net *net, struct compat_ifconf __user *uifc32)
25087a229387SArnd Bergmann {
25096b96018bSArnd Bergmann 	struct compat_ifconf ifc32;
25107a229387SArnd Bergmann 	struct ifconf ifc;
25117a229387SArnd Bergmann 	struct ifconf __user *uifc;
25126b96018bSArnd Bergmann 	struct compat_ifreq __user *ifr32;
25137a229387SArnd Bergmann 	struct ifreq __user *ifr;
25147a229387SArnd Bergmann 	unsigned int i, j;
25157a229387SArnd Bergmann 	int err;
25167a229387SArnd Bergmann 
25176b96018bSArnd Bergmann 	if (copy_from_user(&ifc32, uifc32, sizeof(struct compat_ifconf)))
25187a229387SArnd Bergmann 		return -EFAULT;
25197a229387SArnd Bergmann 
25207a229387SArnd Bergmann 	if (ifc32.ifcbuf == 0) {
25217a229387SArnd Bergmann 		ifc32.ifc_len = 0;
25227a229387SArnd Bergmann 		ifc.ifc_len = 0;
25237a229387SArnd Bergmann 		ifc.ifc_req = NULL;
25247a229387SArnd Bergmann 		uifc = compat_alloc_user_space(sizeof(struct ifconf));
25257a229387SArnd Bergmann 	} else {
25266b96018bSArnd Bergmann 		size_t len =((ifc32.ifc_len / sizeof (struct compat_ifreq)) + 1) *
25277a229387SArnd Bergmann 			sizeof (struct ifreq);
25287a229387SArnd Bergmann 		uifc = compat_alloc_user_space(sizeof(struct ifconf) + len);
25297a229387SArnd Bergmann 		ifc.ifc_len = len;
25307a229387SArnd Bergmann 		ifr = ifc.ifc_req = (void __user *)(uifc + 1);
25317a229387SArnd Bergmann 		ifr32 = compat_ptr(ifc32.ifcbuf);
25326b96018bSArnd Bergmann 		for (i = 0; i < ifc32.ifc_len; i += sizeof (struct compat_ifreq)) {
25336b96018bSArnd Bergmann 			if (copy_in_user(ifr, ifr32, sizeof(struct compat_ifreq)))
25347a229387SArnd Bergmann 				return -EFAULT;
25357a229387SArnd Bergmann 			ifr++;
25367a229387SArnd Bergmann 			ifr32++;
25377a229387SArnd Bergmann 		}
25387a229387SArnd Bergmann 	}
25397a229387SArnd Bergmann 	if (copy_to_user(uifc, &ifc, sizeof(struct ifconf)))
25407a229387SArnd Bergmann 		return -EFAULT;
25417a229387SArnd Bergmann 
25426b96018bSArnd Bergmann 	err = dev_ioctl(net, SIOCGIFCONF, uifc);
25437a229387SArnd Bergmann 	if (err)
25447a229387SArnd Bergmann 		return err;
25457a229387SArnd Bergmann 
25467a229387SArnd Bergmann 	if (copy_from_user(&ifc, uifc, sizeof(struct ifconf)))
25477a229387SArnd Bergmann 		return -EFAULT;
25487a229387SArnd Bergmann 
25497a229387SArnd Bergmann 	ifr = ifc.ifc_req;
25507a229387SArnd Bergmann 	ifr32 = compat_ptr(ifc32.ifcbuf);
25517a229387SArnd Bergmann 	for (i = 0, j = 0;
25526b96018bSArnd Bergmann              i + sizeof (struct compat_ifreq) <= ifc32.ifc_len && j < ifc.ifc_len;
25536b96018bSArnd Bergmann 	     i += sizeof (struct compat_ifreq), j += sizeof (struct ifreq)) {
25546b96018bSArnd Bergmann 		if (copy_in_user(ifr32, ifr, sizeof (struct compat_ifreq)))
25557a229387SArnd Bergmann 			return -EFAULT;
25567a229387SArnd Bergmann 		ifr32++;
25577a229387SArnd Bergmann 		ifr++;
25587a229387SArnd Bergmann 	}
25597a229387SArnd Bergmann 
25607a229387SArnd Bergmann 	if (ifc32.ifcbuf == 0) {
25617a229387SArnd Bergmann 		/* Translate from 64-bit structure multiple to
25627a229387SArnd Bergmann 		 * a 32-bit one.
25637a229387SArnd Bergmann 		 */
25647a229387SArnd Bergmann 		i = ifc.ifc_len;
25656b96018bSArnd Bergmann 		i = ((i / sizeof(struct ifreq)) * sizeof(struct compat_ifreq));
25667a229387SArnd Bergmann 		ifc32.ifc_len = i;
25677a229387SArnd Bergmann 	} else {
25687a229387SArnd Bergmann 		ifc32.ifc_len = i;
25697a229387SArnd Bergmann 	}
25706b96018bSArnd Bergmann 	if (copy_to_user(uifc32, &ifc32, sizeof(struct compat_ifconf)))
25717a229387SArnd Bergmann 		return -EFAULT;
25727a229387SArnd Bergmann 
25737a229387SArnd Bergmann 	return 0;
25747a229387SArnd Bergmann }
25757a229387SArnd Bergmann 
25766b96018bSArnd Bergmann static int ethtool_ioctl(struct net *net, struct compat_ifreq __user *ifr32)
25777a229387SArnd Bergmann {
25787a229387SArnd Bergmann 	struct ifreq __user *ifr;
25797a229387SArnd Bergmann 	u32 data;
25807a229387SArnd Bergmann 	void __user *datap;
25817a229387SArnd Bergmann 
25827a229387SArnd Bergmann 	ifr = compat_alloc_user_space(sizeof(*ifr));
25837a229387SArnd Bergmann 
25847a229387SArnd Bergmann 	if (copy_in_user(&ifr->ifr_name, &ifr32->ifr_name, IFNAMSIZ))
25857a229387SArnd Bergmann 		return -EFAULT;
25867a229387SArnd Bergmann 
25877a229387SArnd Bergmann 	if (get_user(data, &ifr32->ifr_ifru.ifru_data))
25887a229387SArnd Bergmann 		return -EFAULT;
25897a229387SArnd Bergmann 
25907a229387SArnd Bergmann 	datap = compat_ptr(data);
25917a229387SArnd Bergmann 	if (put_user(datap, &ifr->ifr_ifru.ifru_data))
25927a229387SArnd Bergmann 		return -EFAULT;
25937a229387SArnd Bergmann 
25946b96018bSArnd Bergmann 	return dev_ioctl(net, SIOCETHTOOL, ifr);
25957a229387SArnd Bergmann }
25967a229387SArnd Bergmann 
25977a50a240SArnd Bergmann static int compat_siocwandev(struct net *net, struct compat_ifreq __user *uifr32)
25987a50a240SArnd Bergmann {
25997a50a240SArnd Bergmann 	void __user *uptr;
26007a50a240SArnd Bergmann 	compat_uptr_t uptr32;
26017a50a240SArnd Bergmann 	struct ifreq __user *uifr;
26027a50a240SArnd Bergmann 
26037a50a240SArnd Bergmann 	uifr = compat_alloc_user_space(sizeof (*uifr));
26047a50a240SArnd Bergmann 	if (copy_in_user(uifr, uifr32, sizeof(struct compat_ifreq)))
26057a50a240SArnd Bergmann 		return -EFAULT;
26067a50a240SArnd Bergmann 
26077a50a240SArnd Bergmann 	if (get_user(uptr32, &uifr32->ifr_settings.ifs_ifsu))
26087a50a240SArnd Bergmann 		return -EFAULT;
26097a50a240SArnd Bergmann 
26107a50a240SArnd Bergmann 	uptr = compat_ptr(uptr32);
26117a50a240SArnd Bergmann 
26127a50a240SArnd Bergmann 	if (put_user(uptr, &uifr->ifr_settings.ifs_ifsu.raw_hdlc))
26137a50a240SArnd Bergmann 		return -EFAULT;
26147a50a240SArnd Bergmann 
26157a50a240SArnd Bergmann 	return dev_ioctl(net, SIOCWANDEV, uifr);
26167a50a240SArnd Bergmann }
26177a50a240SArnd Bergmann 
26186b96018bSArnd Bergmann static int bond_ioctl(struct net *net, unsigned int cmd,
26196b96018bSArnd Bergmann 			 struct compat_ifreq __user *ifr32)
26207a229387SArnd Bergmann {
26217a229387SArnd Bergmann 	struct ifreq kifr;
26227a229387SArnd Bergmann 	struct ifreq __user *uifr;
26237a229387SArnd Bergmann 	mm_segment_t old_fs;
26247a229387SArnd Bergmann 	int err;
26257a229387SArnd Bergmann 	u32 data;
26267a229387SArnd Bergmann 	void __user *datap;
26277a229387SArnd Bergmann 
26287a229387SArnd Bergmann 	switch (cmd) {
26297a229387SArnd Bergmann 	case SIOCBONDENSLAVE:
26307a229387SArnd Bergmann 	case SIOCBONDRELEASE:
26317a229387SArnd Bergmann 	case SIOCBONDSETHWADDR:
26327a229387SArnd Bergmann 	case SIOCBONDCHANGEACTIVE:
26336b96018bSArnd Bergmann 		if (copy_from_user(&kifr, ifr32, sizeof(struct compat_ifreq)))
26347a229387SArnd Bergmann 			return -EFAULT;
26357a229387SArnd Bergmann 
26367a229387SArnd Bergmann 		old_fs = get_fs();
26377a229387SArnd Bergmann 		set_fs (KERNEL_DS);
26386b96018bSArnd Bergmann 		err = dev_ioctl(net, cmd, &kifr);
26397a229387SArnd Bergmann 		set_fs (old_fs);
26407a229387SArnd Bergmann 
26417a229387SArnd Bergmann 		return err;
26427a229387SArnd Bergmann 	case SIOCBONDSLAVEINFOQUERY:
26437a229387SArnd Bergmann 	case SIOCBONDINFOQUERY:
26447a229387SArnd Bergmann 		uifr = compat_alloc_user_space(sizeof(*uifr));
26457a229387SArnd Bergmann 		if (copy_in_user(&uifr->ifr_name, &ifr32->ifr_name, IFNAMSIZ))
26467a229387SArnd Bergmann 			return -EFAULT;
26477a229387SArnd Bergmann 
26487a229387SArnd Bergmann 		if (get_user(data, &ifr32->ifr_ifru.ifru_data))
26497a229387SArnd Bergmann 			return -EFAULT;
26507a229387SArnd Bergmann 
26517a229387SArnd Bergmann 		datap = compat_ptr(data);
26527a229387SArnd Bergmann 		if (put_user(datap, &uifr->ifr_ifru.ifru_data))
26537a229387SArnd Bergmann 			return -EFAULT;
26547a229387SArnd Bergmann 
26556b96018bSArnd Bergmann 		return dev_ioctl(net, cmd, uifr);
26567a229387SArnd Bergmann 	default:
26577a229387SArnd Bergmann 		return -EINVAL;
26587a229387SArnd Bergmann 	};
26597a229387SArnd Bergmann }
26607a229387SArnd Bergmann 
26616b96018bSArnd Bergmann static int siocdevprivate_ioctl(struct net *net, unsigned int cmd,
26626b96018bSArnd Bergmann 				 struct compat_ifreq __user *u_ifreq32)
26637a229387SArnd Bergmann {
26647a229387SArnd Bergmann 	struct ifreq __user *u_ifreq64;
26657a229387SArnd Bergmann 	char tmp_buf[IFNAMSIZ];
26667a229387SArnd Bergmann 	void __user *data64;
26677a229387SArnd Bergmann 	u32 data32;
26687a229387SArnd Bergmann 
26697a229387SArnd Bergmann 	if (copy_from_user(&tmp_buf[0], &(u_ifreq32->ifr_ifrn.ifrn_name[0]),
26707a229387SArnd Bergmann 			   IFNAMSIZ))
26717a229387SArnd Bergmann 		return -EFAULT;
26727a229387SArnd Bergmann 	if (__get_user(data32, &u_ifreq32->ifr_ifru.ifru_data))
26737a229387SArnd Bergmann 		return -EFAULT;
26747a229387SArnd Bergmann 	data64 = compat_ptr(data32);
26757a229387SArnd Bergmann 
26767a229387SArnd Bergmann 	u_ifreq64 = compat_alloc_user_space(sizeof(*u_ifreq64));
26777a229387SArnd Bergmann 
26787a229387SArnd Bergmann 	/* Don't check these user accesses, just let that get trapped
26797a229387SArnd Bergmann 	 * in the ioctl handler instead.
26807a229387SArnd Bergmann 	 */
26817a229387SArnd Bergmann 	if (copy_to_user(&u_ifreq64->ifr_ifrn.ifrn_name[0], &tmp_buf[0],
26827a229387SArnd Bergmann 			 IFNAMSIZ))
26837a229387SArnd Bergmann 		return -EFAULT;
26847a229387SArnd Bergmann 	if (__put_user(data64, &u_ifreq64->ifr_ifru.ifru_data))
26857a229387SArnd Bergmann 		return -EFAULT;
26867a229387SArnd Bergmann 
26876b96018bSArnd Bergmann 	return dev_ioctl(net, cmd, u_ifreq64);
26887a229387SArnd Bergmann }
26897a229387SArnd Bergmann 
26906b96018bSArnd Bergmann static int dev_ifsioc(struct net *net, struct socket *sock,
26916b96018bSArnd Bergmann 			 unsigned int cmd, struct compat_ifreq __user *uifr32)
26927a229387SArnd Bergmann {
2693a2116ed2SArnd Bergmann 	struct ifreq __user *uifr;
26947a229387SArnd Bergmann 	int err;
26957a229387SArnd Bergmann 
2696a2116ed2SArnd Bergmann 	uifr = compat_alloc_user_space(sizeof(*uifr));
2697a2116ed2SArnd Bergmann 	if (copy_in_user(uifr, uifr32, sizeof(*uifr32)))
26987a229387SArnd Bergmann 		return -EFAULT;
2699a2116ed2SArnd Bergmann 
2700a2116ed2SArnd Bergmann 	err = sock_do_ioctl(net, sock, cmd, (unsigned long)uifr);
2701a2116ed2SArnd Bergmann 
27027a229387SArnd Bergmann 	if (!err) {
27037a229387SArnd Bergmann 		switch (cmd) {
27047a229387SArnd Bergmann 		case SIOCGIFFLAGS:
27057a229387SArnd Bergmann 		case SIOCGIFMETRIC:
27067a229387SArnd Bergmann 		case SIOCGIFMTU:
27077a229387SArnd Bergmann 		case SIOCGIFMEM:
27087a229387SArnd Bergmann 		case SIOCGIFHWADDR:
27097a229387SArnd Bergmann 		case SIOCGIFINDEX:
27107a229387SArnd Bergmann 		case SIOCGIFADDR:
27117a229387SArnd Bergmann 		case SIOCGIFBRDADDR:
27127a229387SArnd Bergmann 		case SIOCGIFDSTADDR:
27137a229387SArnd Bergmann 		case SIOCGIFNETMASK:
2714fab2532bSArnd Bergmann 		case SIOCGIFPFLAGS:
27157a229387SArnd Bergmann 		case SIOCGIFTXQLEN:
2716fab2532bSArnd Bergmann 		case SIOCGMIIPHY:
2717fab2532bSArnd Bergmann 		case SIOCGMIIREG:
2718a2116ed2SArnd Bergmann 			if (copy_in_user(uifr32, uifr, sizeof(*uifr32)))
2719a2116ed2SArnd Bergmann 				err = -EFAULT;
27207a229387SArnd Bergmann 			break;
2721a2116ed2SArnd Bergmann 		}
2722a2116ed2SArnd Bergmann 	}
2723a2116ed2SArnd Bergmann 	return err;
2724a2116ed2SArnd Bergmann }
2725a2116ed2SArnd Bergmann 
2726a2116ed2SArnd Bergmann static int compat_sioc_ifmap(struct net *net, unsigned int cmd,
2727a2116ed2SArnd Bergmann 			struct compat_ifreq __user *uifr32)
2728a2116ed2SArnd Bergmann {
2729a2116ed2SArnd Bergmann 	struct ifreq ifr;
2730a2116ed2SArnd Bergmann 	struct compat_ifmap __user *uifmap32;
2731a2116ed2SArnd Bergmann 	mm_segment_t old_fs;
2732a2116ed2SArnd Bergmann 	int err;
2733a2116ed2SArnd Bergmann 
2734a2116ed2SArnd Bergmann 	uifmap32 = &uifr32->ifr_ifru.ifru_map;
2735a2116ed2SArnd Bergmann 	err = copy_from_user(&ifr, uifr32, sizeof(ifr.ifr_name));
2736a2116ed2SArnd Bergmann 	err |= __get_user(ifr.ifr_map.mem_start, &uifmap32->mem_start);
2737a2116ed2SArnd Bergmann 	err |= __get_user(ifr.ifr_map.mem_end, &uifmap32->mem_end);
2738a2116ed2SArnd Bergmann 	err |= __get_user(ifr.ifr_map.base_addr, &uifmap32->base_addr);
2739a2116ed2SArnd Bergmann 	err |= __get_user(ifr.ifr_map.irq, &uifmap32->irq);
2740a2116ed2SArnd Bergmann 	err |= __get_user(ifr.ifr_map.dma, &uifmap32->dma);
2741a2116ed2SArnd Bergmann 	err |= __get_user(ifr.ifr_map.port, &uifmap32->port);
2742a2116ed2SArnd Bergmann 	if (err)
2743a2116ed2SArnd Bergmann 		return -EFAULT;
2744a2116ed2SArnd Bergmann 
2745a2116ed2SArnd Bergmann 	old_fs = get_fs();
2746a2116ed2SArnd Bergmann 	set_fs (KERNEL_DS);
2747a2116ed2SArnd Bergmann 	err = dev_ioctl(net, cmd, (void __user *)&ifr);
2748a2116ed2SArnd Bergmann 	set_fs (old_fs);
2749a2116ed2SArnd Bergmann 
2750a2116ed2SArnd Bergmann 	if (cmd == SIOCGIFMAP && !err) {
27517a229387SArnd Bergmann 		err = copy_to_user(uifr32, &ifr, sizeof(ifr.ifr_name));
27527a229387SArnd Bergmann 		err |= __put_user(ifr.ifr_map.mem_start, &uifmap32->mem_start);
27537a229387SArnd Bergmann 		err |= __put_user(ifr.ifr_map.mem_end, &uifmap32->mem_end);
27547a229387SArnd Bergmann 		err |= __put_user(ifr.ifr_map.base_addr, &uifmap32->base_addr);
27557a229387SArnd Bergmann 		err |= __put_user(ifr.ifr_map.irq, &uifmap32->irq);
27567a229387SArnd Bergmann 		err |= __put_user(ifr.ifr_map.dma, &uifmap32->dma);
27577a229387SArnd Bergmann 		err |= __put_user(ifr.ifr_map.port, &uifmap32->port);
27587a229387SArnd Bergmann 		if (err)
27597a229387SArnd Bergmann 			err = -EFAULT;
27607a229387SArnd Bergmann 	}
27617a229387SArnd Bergmann 	return err;
27627a229387SArnd Bergmann }
27637a229387SArnd Bergmann 
2764a2116ed2SArnd Bergmann static int compat_siocshwtstamp(struct net *net, struct compat_ifreq __user *uifr32)
2765a2116ed2SArnd Bergmann {
2766a2116ed2SArnd Bergmann 	void __user *uptr;
2767a2116ed2SArnd Bergmann 	compat_uptr_t uptr32;
2768a2116ed2SArnd Bergmann 	struct ifreq __user *uifr;
2769a2116ed2SArnd Bergmann 
2770a2116ed2SArnd Bergmann 	uifr = compat_alloc_user_space(sizeof (*uifr));
2771a2116ed2SArnd Bergmann 	if (copy_in_user(uifr, uifr32, sizeof(struct compat_ifreq)))
2772a2116ed2SArnd Bergmann 		return -EFAULT;
2773a2116ed2SArnd Bergmann 
2774a2116ed2SArnd Bergmann 	if (get_user(uptr32, &uifr32->ifr_data))
2775a2116ed2SArnd Bergmann 		return -EFAULT;
2776a2116ed2SArnd Bergmann 
2777a2116ed2SArnd Bergmann 	uptr = compat_ptr(uptr32);
2778a2116ed2SArnd Bergmann 
2779a2116ed2SArnd Bergmann 	if (put_user(uptr, &uifr->ifr_data))
2780a2116ed2SArnd Bergmann 		return -EFAULT;
2781a2116ed2SArnd Bergmann 
2782a2116ed2SArnd Bergmann 	return dev_ioctl(net, SIOCSHWTSTAMP, uifr);
2783a2116ed2SArnd Bergmann }
2784a2116ed2SArnd Bergmann 
27857a229387SArnd Bergmann struct rtentry32 {
27867a229387SArnd Bergmann 	u32   		rt_pad1;
27877a229387SArnd Bergmann 	struct sockaddr rt_dst;         /* target address               */
27887a229387SArnd Bergmann 	struct sockaddr rt_gateway;     /* gateway addr (RTF_GATEWAY)   */
27897a229387SArnd Bergmann 	struct sockaddr rt_genmask;     /* target network mask (IP)     */
27907a229387SArnd Bergmann 	unsigned short  rt_flags;
27917a229387SArnd Bergmann 	short           rt_pad2;
27927a229387SArnd Bergmann 	u32   		rt_pad3;
27937a229387SArnd Bergmann 	unsigned char   rt_tos;
27947a229387SArnd Bergmann 	unsigned char   rt_class;
27957a229387SArnd Bergmann 	short           rt_pad4;
27967a229387SArnd Bergmann 	short           rt_metric;      /* +1 for binary compatibility! */
27977a229387SArnd Bergmann 	/* char * */ u32 rt_dev;        /* forcing the device at add    */
27987a229387SArnd Bergmann 	u32   		rt_mtu;         /* per route MTU/Window         */
27997a229387SArnd Bergmann 	u32   		rt_window;      /* Window clamping              */
28007a229387SArnd Bergmann 	unsigned short  rt_irtt;        /* Initial RTT                  */
28017a229387SArnd Bergmann };
28027a229387SArnd Bergmann 
28037a229387SArnd Bergmann struct in6_rtmsg32 {
28047a229387SArnd Bergmann 	struct in6_addr		rtmsg_dst;
28057a229387SArnd Bergmann 	struct in6_addr		rtmsg_src;
28067a229387SArnd Bergmann 	struct in6_addr		rtmsg_gateway;
28077a229387SArnd Bergmann 	u32			rtmsg_type;
28087a229387SArnd Bergmann 	u16			rtmsg_dst_len;
28097a229387SArnd Bergmann 	u16			rtmsg_src_len;
28107a229387SArnd Bergmann 	u32			rtmsg_metric;
28117a229387SArnd Bergmann 	u32			rtmsg_info;
28127a229387SArnd Bergmann 	u32			rtmsg_flags;
28137a229387SArnd Bergmann 	s32			rtmsg_ifindex;
28147a229387SArnd Bergmann };
28157a229387SArnd Bergmann 
28166b96018bSArnd Bergmann static int routing_ioctl(struct net *net, struct socket *sock,
28176b96018bSArnd Bergmann 			 unsigned int cmd, void __user *argp)
28187a229387SArnd Bergmann {
28197a229387SArnd Bergmann 	int ret;
28207a229387SArnd Bergmann 	void *r = NULL;
28217a229387SArnd Bergmann 	struct in6_rtmsg r6;
28227a229387SArnd Bergmann 	struct rtentry r4;
28237a229387SArnd Bergmann 	char devname[16];
28247a229387SArnd Bergmann 	u32 rtdev;
28257a229387SArnd Bergmann 	mm_segment_t old_fs = get_fs();
28267a229387SArnd Bergmann 
28276b96018bSArnd Bergmann 	if (sock && sock->sk && sock->sk->sk_family == AF_INET6) { /* ipv6 */
28286b96018bSArnd Bergmann 		struct in6_rtmsg32 __user *ur6 = argp;
28297a229387SArnd Bergmann 		ret = copy_from_user (&r6.rtmsg_dst, &(ur6->rtmsg_dst),
28307a229387SArnd Bergmann 			3 * sizeof(struct in6_addr));
28317a229387SArnd Bergmann 		ret |= __get_user (r6.rtmsg_type, &(ur6->rtmsg_type));
28327a229387SArnd Bergmann 		ret |= __get_user (r6.rtmsg_dst_len, &(ur6->rtmsg_dst_len));
28337a229387SArnd Bergmann 		ret |= __get_user (r6.rtmsg_src_len, &(ur6->rtmsg_src_len));
28347a229387SArnd Bergmann 		ret |= __get_user (r6.rtmsg_metric, &(ur6->rtmsg_metric));
28357a229387SArnd Bergmann 		ret |= __get_user (r6.rtmsg_info, &(ur6->rtmsg_info));
28367a229387SArnd Bergmann 		ret |= __get_user (r6.rtmsg_flags, &(ur6->rtmsg_flags));
28377a229387SArnd Bergmann 		ret |= __get_user (r6.rtmsg_ifindex, &(ur6->rtmsg_ifindex));
28387a229387SArnd Bergmann 
28397a229387SArnd Bergmann 		r = (void *) &r6;
28407a229387SArnd Bergmann 	} else { /* ipv4 */
28416b96018bSArnd Bergmann 		struct rtentry32 __user *ur4 = argp;
28427a229387SArnd Bergmann 		ret = copy_from_user (&r4.rt_dst, &(ur4->rt_dst),
28437a229387SArnd Bergmann 					3 * sizeof(struct sockaddr));
28447a229387SArnd Bergmann 		ret |= __get_user (r4.rt_flags, &(ur4->rt_flags));
28457a229387SArnd Bergmann 		ret |= __get_user (r4.rt_metric, &(ur4->rt_metric));
28467a229387SArnd Bergmann 		ret |= __get_user (r4.rt_mtu, &(ur4->rt_mtu));
28477a229387SArnd Bergmann 		ret |= __get_user (r4.rt_window, &(ur4->rt_window));
28487a229387SArnd Bergmann 		ret |= __get_user (r4.rt_irtt, &(ur4->rt_irtt));
28497a229387SArnd Bergmann 		ret |= __get_user (rtdev, &(ur4->rt_dev));
28507a229387SArnd Bergmann 		if (rtdev) {
28517a229387SArnd Bergmann 			ret |= copy_from_user (devname, compat_ptr(rtdev), 15);
28527a229387SArnd Bergmann 			r4.rt_dev = devname; devname[15] = 0;
28537a229387SArnd Bergmann 		} else
28547a229387SArnd Bergmann 			r4.rt_dev = NULL;
28557a229387SArnd Bergmann 
28567a229387SArnd Bergmann 		r = (void *) &r4;
28577a229387SArnd Bergmann 	}
28587a229387SArnd Bergmann 
28597a229387SArnd Bergmann 	if (ret) {
28607a229387SArnd Bergmann 		ret = -EFAULT;
28617a229387SArnd Bergmann 		goto out;
28627a229387SArnd Bergmann 	}
28637a229387SArnd Bergmann 
28647a229387SArnd Bergmann 	set_fs (KERNEL_DS);
28656b96018bSArnd Bergmann 	ret = sock_do_ioctl(net, sock, cmd, (unsigned long) r);
28667a229387SArnd Bergmann 	set_fs (old_fs);
28677a229387SArnd Bergmann 
28687a229387SArnd Bergmann out:
28697a229387SArnd Bergmann 	return ret;
28707a229387SArnd Bergmann }
28717a229387SArnd Bergmann 
28727a229387SArnd Bergmann /* Since old style bridge ioctl's endup using SIOCDEVPRIVATE
28737a229387SArnd Bergmann  * for some operations; this forces use of the newer bridge-utils that
28747a229387SArnd Bergmann  * use compatiable ioctls
28757a229387SArnd Bergmann  */
28766b96018bSArnd Bergmann static int old_bridge_ioctl(compat_ulong_t __user *argp)
28777a229387SArnd Bergmann {
28786b96018bSArnd Bergmann 	compat_ulong_t tmp;
28797a229387SArnd Bergmann 
28806b96018bSArnd Bergmann 	if (get_user(tmp, argp))
28817a229387SArnd Bergmann 		return -EFAULT;
28827a229387SArnd Bergmann 	if (tmp == BRCTL_GET_VERSION)
28837a229387SArnd Bergmann 		return BRCTL_VERSION + 1;
28847a229387SArnd Bergmann 	return -EINVAL;
28857a229387SArnd Bergmann }
28867a229387SArnd Bergmann 
28876b96018bSArnd Bergmann static int compat_sock_ioctl_trans(struct file *file, struct socket *sock,
28886b96018bSArnd Bergmann 			 unsigned int cmd, unsigned long arg)
28896b96018bSArnd Bergmann {
28906b96018bSArnd Bergmann 	void __user *argp = compat_ptr(arg);
28916b96018bSArnd Bergmann 	struct sock *sk = sock->sk;
28926b96018bSArnd Bergmann 	struct net *net = sock_net(sk);
28937a229387SArnd Bergmann 
28946b96018bSArnd Bergmann 	if (cmd >= SIOCDEVPRIVATE && cmd <= (SIOCDEVPRIVATE + 15))
28956b96018bSArnd Bergmann 		return siocdevprivate_ioctl(net, cmd, argp);
28967a229387SArnd Bergmann 
28976b96018bSArnd Bergmann 	switch (cmd) {
28986b96018bSArnd Bergmann 	case SIOCSIFBR:
28996b96018bSArnd Bergmann 	case SIOCGIFBR:
29006b96018bSArnd Bergmann 		return old_bridge_ioctl(argp);
29016b96018bSArnd Bergmann 	case SIOCGIFNAME:
29026b96018bSArnd Bergmann 		return dev_ifname32(net, argp);
29036b96018bSArnd Bergmann 	case SIOCGIFCONF:
29046b96018bSArnd Bergmann 		return dev_ifconf(net, argp);
29056b96018bSArnd Bergmann 	case SIOCETHTOOL:
29066b96018bSArnd Bergmann 		return ethtool_ioctl(net, argp);
29077a50a240SArnd Bergmann 	case SIOCWANDEV:
29087a50a240SArnd Bergmann 		return compat_siocwandev(net, argp);
2909a2116ed2SArnd Bergmann 	case SIOCGIFMAP:
2910a2116ed2SArnd Bergmann 	case SIOCSIFMAP:
2911a2116ed2SArnd Bergmann 		return compat_sioc_ifmap(net, cmd, argp);
29126b96018bSArnd Bergmann 	case SIOCBONDENSLAVE:
29136b96018bSArnd Bergmann 	case SIOCBONDRELEASE:
29146b96018bSArnd Bergmann 	case SIOCBONDSETHWADDR:
29156b96018bSArnd Bergmann 	case SIOCBONDSLAVEINFOQUERY:
29166b96018bSArnd Bergmann 	case SIOCBONDINFOQUERY:
29176b96018bSArnd Bergmann 	case SIOCBONDCHANGEACTIVE:
29186b96018bSArnd Bergmann 		return bond_ioctl(net, cmd, argp);
29196b96018bSArnd Bergmann 	case SIOCADDRT:
29206b96018bSArnd Bergmann 	case SIOCDELRT:
29216b96018bSArnd Bergmann 		return routing_ioctl(net, sock, cmd, argp);
29226b96018bSArnd Bergmann 	case SIOCGSTAMP:
29236b96018bSArnd Bergmann 		return do_siocgstamp(net, sock, cmd, argp);
29246b96018bSArnd Bergmann 	case SIOCGSTAMPNS:
29256b96018bSArnd Bergmann 		return do_siocgstampns(net, sock, cmd, argp);
2926a2116ed2SArnd Bergmann 	case SIOCSHWTSTAMP:
2927a2116ed2SArnd Bergmann 		return compat_siocshwtstamp(net, argp);
29287a229387SArnd Bergmann 
29296b96018bSArnd Bergmann 	case FIOSETOWN:
29306b96018bSArnd Bergmann 	case SIOCSPGRP:
29316b96018bSArnd Bergmann 	case FIOGETOWN:
29326b96018bSArnd Bergmann 	case SIOCGPGRP:
29336b96018bSArnd Bergmann 	case SIOCBRADDBR:
29346b96018bSArnd Bergmann 	case SIOCBRDELBR:
29356b96018bSArnd Bergmann 	case SIOCGIFVLAN:
29366b96018bSArnd Bergmann 	case SIOCSIFVLAN:
29376b96018bSArnd Bergmann 	case SIOCADDDLCI:
29386b96018bSArnd Bergmann 	case SIOCDELDLCI:
29396b96018bSArnd Bergmann 		return sock_ioctl(file, cmd, arg);
29406b96018bSArnd Bergmann 
29416b96018bSArnd Bergmann 	case SIOCGIFFLAGS:
29426b96018bSArnd Bergmann 	case SIOCSIFFLAGS:
29436b96018bSArnd Bergmann 	case SIOCGIFMETRIC:
29446b96018bSArnd Bergmann 	case SIOCSIFMETRIC:
29456b96018bSArnd Bergmann 	case SIOCGIFMTU:
29466b96018bSArnd Bergmann 	case SIOCSIFMTU:
29476b96018bSArnd Bergmann 	case SIOCGIFMEM:
29486b96018bSArnd Bergmann 	case SIOCSIFMEM:
29496b96018bSArnd Bergmann 	case SIOCGIFHWADDR:
29506b96018bSArnd Bergmann 	case SIOCSIFHWADDR:
29516b96018bSArnd Bergmann 	case SIOCADDMULTI:
29526b96018bSArnd Bergmann 	case SIOCDELMULTI:
29536b96018bSArnd Bergmann 	case SIOCGIFINDEX:
29546b96018bSArnd Bergmann 	case SIOCGIFADDR:
29556b96018bSArnd Bergmann 	case SIOCSIFADDR:
29566b96018bSArnd Bergmann 	case SIOCSIFHWBROADCAST:
29576b96018bSArnd Bergmann 	case SIOCDIFADDR:
29586b96018bSArnd Bergmann 	case SIOCGIFBRDADDR:
29596b96018bSArnd Bergmann 	case SIOCSIFBRDADDR:
29606b96018bSArnd Bergmann 	case SIOCGIFDSTADDR:
29616b96018bSArnd Bergmann 	case SIOCSIFDSTADDR:
29626b96018bSArnd Bergmann 	case SIOCGIFNETMASK:
29636b96018bSArnd Bergmann 	case SIOCSIFNETMASK:
29646b96018bSArnd Bergmann 	case SIOCSIFPFLAGS:
29656b96018bSArnd Bergmann 	case SIOCGIFPFLAGS:
29666b96018bSArnd Bergmann 	case SIOCGIFTXQLEN:
29676b96018bSArnd Bergmann 	case SIOCSIFTXQLEN:
29686b96018bSArnd Bergmann 	case SIOCBRADDIF:
29696b96018bSArnd Bergmann 	case SIOCBRDELIF:
29709177efd3SArnd Bergmann 	case SIOCSIFNAME:
29719177efd3SArnd Bergmann 	case SIOCGMIIPHY:
29729177efd3SArnd Bergmann 	case SIOCGMIIREG:
29739177efd3SArnd Bergmann 	case SIOCSMIIREG:
29746b96018bSArnd Bergmann 		return dev_ifsioc(net, sock, cmd, argp);
29759177efd3SArnd Bergmann 
29766b96018bSArnd Bergmann 	case SIOCSARP:
29776b96018bSArnd Bergmann 	case SIOCGARP:
29786b96018bSArnd Bergmann 	case SIOCDARP:
29796b96018bSArnd Bergmann 	case SIOCATMARK:
29809177efd3SArnd Bergmann 		return sock_do_ioctl(net, sock, cmd, arg);
29819177efd3SArnd Bergmann 	}
29829177efd3SArnd Bergmann 
29839177efd3SArnd Bergmann 	/* Prevent warning from compat_sys_ioctl, these always
29849177efd3SArnd Bergmann 	 * result in -EINVAL in the native case anyway. */
29859177efd3SArnd Bergmann 	switch (cmd) {
29869177efd3SArnd Bergmann 	case SIOCRTMSG:
29879177efd3SArnd Bergmann 	case SIOCGIFCOUNT:
29886b96018bSArnd Bergmann 	case SIOCSRARP:
29896b96018bSArnd Bergmann 	case SIOCGRARP:
29906b96018bSArnd Bergmann 	case SIOCDRARP:
29919177efd3SArnd Bergmann 	case SIOCSIFLINK:
29929177efd3SArnd Bergmann 	case SIOCGIFSLAVE:
29939177efd3SArnd Bergmann 	case SIOCSIFSLAVE:
29949177efd3SArnd Bergmann 		return -EINVAL;
29956b96018bSArnd Bergmann 	}
29966b96018bSArnd Bergmann 
29976b96018bSArnd Bergmann 	return -ENOIOCTLCMD;
29986b96018bSArnd Bergmann }
29997a229387SArnd Bergmann 
300089bbfc95SShaun Pereira static long compat_sock_ioctl(struct file *file, unsigned cmd,
300189bbfc95SShaun Pereira 			      unsigned long arg)
300289bbfc95SShaun Pereira {
300389bbfc95SShaun Pereira 	struct socket *sock = file->private_data;
300489bbfc95SShaun Pereira 	int ret = -ENOIOCTLCMD;
300587de87d5SDavid S. Miller 	struct sock *sk;
300687de87d5SDavid S. Miller 	struct net *net;
300787de87d5SDavid S. Miller 
300887de87d5SDavid S. Miller 	sk = sock->sk;
300987de87d5SDavid S. Miller 	net = sock_net(sk);
301089bbfc95SShaun Pereira 
301189bbfc95SShaun Pereira 	if (sock->ops->compat_ioctl)
301289bbfc95SShaun Pereira 		ret = sock->ops->compat_ioctl(sock, cmd, arg);
301389bbfc95SShaun Pereira 
301487de87d5SDavid S. Miller 	if (ret == -ENOIOCTLCMD &&
301587de87d5SDavid S. Miller 	    (cmd >= SIOCIWFIRST && cmd <= SIOCIWLAST))
301687de87d5SDavid S. Miller 		ret = compat_wext_handle_ioctl(net, cmd, arg);
301787de87d5SDavid S. Miller 
30186b96018bSArnd Bergmann 	if (ret == -ENOIOCTLCMD)
30196b96018bSArnd Bergmann 		ret = compat_sock_ioctl_trans(file, sock, cmd, arg);
30206b96018bSArnd Bergmann 
302189bbfc95SShaun Pereira 	return ret;
302289bbfc95SShaun Pereira }
302389bbfc95SShaun Pereira #endif
302489bbfc95SShaun Pereira 
3025ac5a488eSSridhar Samudrala int kernel_bind(struct socket *sock, struct sockaddr *addr, int addrlen)
3026ac5a488eSSridhar Samudrala {
3027ac5a488eSSridhar Samudrala 	return sock->ops->bind(sock, addr, addrlen);
3028ac5a488eSSridhar Samudrala }
3029ac5a488eSSridhar Samudrala 
3030ac5a488eSSridhar Samudrala int kernel_listen(struct socket *sock, int backlog)
3031ac5a488eSSridhar Samudrala {
3032ac5a488eSSridhar Samudrala 	return sock->ops->listen(sock, backlog);
3033ac5a488eSSridhar Samudrala }
3034ac5a488eSSridhar Samudrala 
3035ac5a488eSSridhar Samudrala int kernel_accept(struct socket *sock, struct socket **newsock, int flags)
3036ac5a488eSSridhar Samudrala {
3037ac5a488eSSridhar Samudrala 	struct sock *sk = sock->sk;
3038ac5a488eSSridhar Samudrala 	int err;
3039ac5a488eSSridhar Samudrala 
3040ac5a488eSSridhar Samudrala 	err = sock_create_lite(sk->sk_family, sk->sk_type, sk->sk_protocol,
3041ac5a488eSSridhar Samudrala 			       newsock);
3042ac5a488eSSridhar Samudrala 	if (err < 0)
3043ac5a488eSSridhar Samudrala 		goto done;
3044ac5a488eSSridhar Samudrala 
3045ac5a488eSSridhar Samudrala 	err = sock->ops->accept(sock, *newsock, flags);
3046ac5a488eSSridhar Samudrala 	if (err < 0) {
3047ac5a488eSSridhar Samudrala 		sock_release(*newsock);
3048fa8705b0STony Battersby 		*newsock = NULL;
3049ac5a488eSSridhar Samudrala 		goto done;
3050ac5a488eSSridhar Samudrala 	}
3051ac5a488eSSridhar Samudrala 
3052ac5a488eSSridhar Samudrala 	(*newsock)->ops = sock->ops;
30531b08534eSWei Yongjun 	__module_get((*newsock)->ops->owner);
3054ac5a488eSSridhar Samudrala 
3055ac5a488eSSridhar Samudrala done:
3056ac5a488eSSridhar Samudrala 	return err;
3057ac5a488eSSridhar Samudrala }
3058ac5a488eSSridhar Samudrala 
3059ac5a488eSSridhar Samudrala int kernel_connect(struct socket *sock, struct sockaddr *addr, int addrlen,
3060ac5a488eSSridhar Samudrala 		   int flags)
3061ac5a488eSSridhar Samudrala {
3062ac5a488eSSridhar Samudrala 	return sock->ops->connect(sock, addr, addrlen, flags);
3063ac5a488eSSridhar Samudrala }
3064ac5a488eSSridhar Samudrala 
3065ac5a488eSSridhar Samudrala int kernel_getsockname(struct socket *sock, struct sockaddr *addr,
3066ac5a488eSSridhar Samudrala 			 int *addrlen)
3067ac5a488eSSridhar Samudrala {
3068ac5a488eSSridhar Samudrala 	return sock->ops->getname(sock, addr, addrlen, 0);
3069ac5a488eSSridhar Samudrala }
3070ac5a488eSSridhar Samudrala 
3071ac5a488eSSridhar Samudrala int kernel_getpeername(struct socket *sock, struct sockaddr *addr,
3072ac5a488eSSridhar Samudrala 			 int *addrlen)
3073ac5a488eSSridhar Samudrala {
3074ac5a488eSSridhar Samudrala 	return sock->ops->getname(sock, addr, addrlen, 1);
3075ac5a488eSSridhar Samudrala }
3076ac5a488eSSridhar Samudrala 
3077ac5a488eSSridhar Samudrala int kernel_getsockopt(struct socket *sock, int level, int optname,
3078ac5a488eSSridhar Samudrala 			char *optval, int *optlen)
3079ac5a488eSSridhar Samudrala {
3080ac5a488eSSridhar Samudrala 	mm_segment_t oldfs = get_fs();
3081ac5a488eSSridhar Samudrala 	int err;
3082ac5a488eSSridhar Samudrala 
3083ac5a488eSSridhar Samudrala 	set_fs(KERNEL_DS);
3084ac5a488eSSridhar Samudrala 	if (level == SOL_SOCKET)
3085ac5a488eSSridhar Samudrala 		err = sock_getsockopt(sock, level, optname, optval, optlen);
3086ac5a488eSSridhar Samudrala 	else
3087ac5a488eSSridhar Samudrala 		err = sock->ops->getsockopt(sock, level, optname, optval,
3088ac5a488eSSridhar Samudrala 					    optlen);
3089ac5a488eSSridhar Samudrala 	set_fs(oldfs);
3090ac5a488eSSridhar Samudrala 	return err;
3091ac5a488eSSridhar Samudrala }
3092ac5a488eSSridhar Samudrala 
3093ac5a488eSSridhar Samudrala int kernel_setsockopt(struct socket *sock, int level, int optname,
3094b7058842SDavid S. Miller 			char *optval, unsigned int optlen)
3095ac5a488eSSridhar Samudrala {
3096ac5a488eSSridhar Samudrala 	mm_segment_t oldfs = get_fs();
3097ac5a488eSSridhar Samudrala 	int err;
3098ac5a488eSSridhar Samudrala 
3099ac5a488eSSridhar Samudrala 	set_fs(KERNEL_DS);
3100ac5a488eSSridhar Samudrala 	if (level == SOL_SOCKET)
3101ac5a488eSSridhar Samudrala 		err = sock_setsockopt(sock, level, optname, optval, optlen);
3102ac5a488eSSridhar Samudrala 	else
3103ac5a488eSSridhar Samudrala 		err = sock->ops->setsockopt(sock, level, optname, optval,
3104ac5a488eSSridhar Samudrala 					    optlen);
3105ac5a488eSSridhar Samudrala 	set_fs(oldfs);
3106ac5a488eSSridhar Samudrala 	return err;
3107ac5a488eSSridhar Samudrala }
3108ac5a488eSSridhar Samudrala 
3109ac5a488eSSridhar Samudrala int kernel_sendpage(struct socket *sock, struct page *page, int offset,
3110ac5a488eSSridhar Samudrala 		    size_t size, int flags)
3111ac5a488eSSridhar Samudrala {
3112ac5a488eSSridhar Samudrala 	if (sock->ops->sendpage)
3113ac5a488eSSridhar Samudrala 		return sock->ops->sendpage(sock, page, offset, size, flags);
3114ac5a488eSSridhar Samudrala 
3115ac5a488eSSridhar Samudrala 	return sock_no_sendpage(sock, page, offset, size, flags);
3116ac5a488eSSridhar Samudrala }
3117ac5a488eSSridhar Samudrala 
3118ac5a488eSSridhar Samudrala int kernel_sock_ioctl(struct socket *sock, int cmd, unsigned long arg)
3119ac5a488eSSridhar Samudrala {
3120ac5a488eSSridhar Samudrala 	mm_segment_t oldfs = get_fs();
3121ac5a488eSSridhar Samudrala 	int err;
3122ac5a488eSSridhar Samudrala 
3123ac5a488eSSridhar Samudrala 	set_fs(KERNEL_DS);
3124ac5a488eSSridhar Samudrala 	err = sock->ops->ioctl(sock, cmd, arg);
3125ac5a488eSSridhar Samudrala 	set_fs(oldfs);
3126ac5a488eSSridhar Samudrala 
3127ac5a488eSSridhar Samudrala 	return err;
3128ac5a488eSSridhar Samudrala }
3129ac5a488eSSridhar Samudrala 
313091cf45f0STrond Myklebust int kernel_sock_shutdown(struct socket *sock, enum sock_shutdown_cmd how)
313191cf45f0STrond Myklebust {
313291cf45f0STrond Myklebust 	return sock->ops->shutdown(sock, how);
313391cf45f0STrond Myklebust }
313491cf45f0STrond Myklebust 
31351da177e4SLinus Torvalds EXPORT_SYMBOL(sock_create);
31361da177e4SLinus Torvalds EXPORT_SYMBOL(sock_create_kern);
31371da177e4SLinus Torvalds EXPORT_SYMBOL(sock_create_lite);
31381da177e4SLinus Torvalds EXPORT_SYMBOL(sock_map_fd);
31391da177e4SLinus Torvalds EXPORT_SYMBOL(sock_recvmsg);
31401da177e4SLinus Torvalds EXPORT_SYMBOL(sock_register);
31411da177e4SLinus Torvalds EXPORT_SYMBOL(sock_release);
31421da177e4SLinus Torvalds EXPORT_SYMBOL(sock_sendmsg);
31431da177e4SLinus Torvalds EXPORT_SYMBOL(sock_unregister);
31441da177e4SLinus Torvalds EXPORT_SYMBOL(sock_wake_async);
31451da177e4SLinus Torvalds EXPORT_SYMBOL(sockfd_lookup);
31461da177e4SLinus Torvalds EXPORT_SYMBOL(kernel_sendmsg);
31471da177e4SLinus Torvalds EXPORT_SYMBOL(kernel_recvmsg);
3148ac5a488eSSridhar Samudrala EXPORT_SYMBOL(kernel_bind);
3149ac5a488eSSridhar Samudrala EXPORT_SYMBOL(kernel_listen);
3150ac5a488eSSridhar Samudrala EXPORT_SYMBOL(kernel_accept);
3151ac5a488eSSridhar Samudrala EXPORT_SYMBOL(kernel_connect);
3152ac5a488eSSridhar Samudrala EXPORT_SYMBOL(kernel_getsockname);
3153ac5a488eSSridhar Samudrala EXPORT_SYMBOL(kernel_getpeername);
3154ac5a488eSSridhar Samudrala EXPORT_SYMBOL(kernel_getsockopt);
3155ac5a488eSSridhar Samudrala EXPORT_SYMBOL(kernel_setsockopt);
3156ac5a488eSSridhar Samudrala EXPORT_SYMBOL(kernel_sendpage);
3157ac5a488eSSridhar Samudrala EXPORT_SYMBOL(kernel_sock_ioctl);
315891cf45f0STrond Myklebust EXPORT_SYMBOL(kernel_sock_shutdown);
3159