Loading...
1#ifndef __LINUX_NET_AFUNIX_H
2#define __LINUX_NET_AFUNIX_H
3
4#include <linux/socket.h>
5#include <linux/un.h>
6#include <linux/mutex.h>
7#include <net/sock.h>
8
9extern void unix_inflight(struct file *fp);
10extern void unix_notinflight(struct file *fp);
11extern void unix_gc(void);
12extern void wait_for_unix_gc(void);
13extern struct sock *unix_get_socket(struct file *filp);
14extern struct sock *unix_peer_get(struct sock *);
15
16#define UNIX_HASH_SIZE 256
17
18extern unsigned int unix_tot_inflight;
19extern spinlock_t unix_table_lock;
20extern struct hlist_head unix_socket_table[UNIX_HASH_SIZE + 1];
21
22struct unix_address {
23 atomic_t refcnt;
24 int len;
25 unsigned int hash;
26 struct sockaddr_un name[0];
27};
28
29struct unix_skb_parms {
30 struct pid *pid; /* Skb credentials */
31 const struct cred *cred;
32 struct scm_fp_list *fp; /* Passed files */
33#ifdef CONFIG_SECURITY_NETWORK
34 u32 secid; /* Security ID */
35#endif
36};
37
38#define UNIXCB(skb) (*(struct unix_skb_parms *)&((skb)->cb))
39#define UNIXSID(skb) (&UNIXCB((skb)).secid)
40
41#define unix_state_lock(s) spin_lock(&unix_sk(s)->lock)
42#define unix_state_unlock(s) spin_unlock(&unix_sk(s)->lock)
43#define unix_state_lock_nested(s) \
44 spin_lock_nested(&unix_sk(s)->lock, \
45 SINGLE_DEPTH_NESTING)
46
47/* The AF_UNIX socket */
48struct unix_sock {
49 /* WARNING: sk has to be the first member */
50 struct sock sk;
51 struct unix_address *addr;
52 struct path path;
53 struct mutex readlock;
54 struct sock *peer;
55 struct sock *other;
56 struct list_head link;
57 atomic_long_t inflight;
58 spinlock_t lock;
59 unsigned int gc_candidate : 1;
60 unsigned int gc_maybe_cycle : 1;
61 unsigned char recursion_level;
62 struct socket_wq peer_wq;
63};
64#define unix_sk(__sk) ((struct unix_sock *)__sk)
65
66#define peer_wait peer_wq.wait
67
68long unix_inq_len(struct sock *sk);
69long unix_outq_len(struct sock *sk);
70
71#ifdef CONFIG_SYSCTL
72extern int unix_sysctl_register(struct net *net);
73extern void unix_sysctl_unregister(struct net *net);
74#else
75static inline int unix_sysctl_register(struct net *net) { return 0; }
76static inline void unix_sysctl_unregister(struct net *net) {}
77#endif
78#endif
1/* SPDX-License-Identifier: GPL-2.0 */
2#ifndef __LINUX_NET_AFUNIX_H
3#define __LINUX_NET_AFUNIX_H
4
5#include <linux/socket.h>
6#include <linux/un.h>
7#include <linux/mutex.h>
8#include <linux/refcount.h>
9#include <net/sock.h>
10
11void unix_inflight(struct user_struct *user, struct file *fp);
12void unix_notinflight(struct user_struct *user, struct file *fp);
13void unix_destruct_scm(struct sk_buff *skb);
14void unix_gc(void);
15void wait_for_unix_gc(void);
16struct sock *unix_get_socket(struct file *filp);
17struct sock *unix_peer_get(struct sock *sk);
18
19#define UNIX_HASH_MOD (256 - 1)
20#define UNIX_HASH_SIZE (256 * 2)
21#define UNIX_HASH_BITS 8
22
23extern unsigned int unix_tot_inflight;
24
25struct unix_address {
26 refcount_t refcnt;
27 int len;
28 struct sockaddr_un name[];
29};
30
31struct unix_skb_parms {
32 struct pid *pid; /* Skb credentials */
33 kuid_t uid;
34 kgid_t gid;
35 struct scm_fp_list *fp; /* Passed files */
36#ifdef CONFIG_SECURITY_NETWORK
37 u32 secid; /* Security ID */
38#endif
39 u32 consumed;
40} __randomize_layout;
41
42struct scm_stat {
43 atomic_t nr_fds;
44};
45
46#define UNIXCB(skb) (*(struct unix_skb_parms *)&((skb)->cb))
47
48#define unix_state_lock(s) spin_lock(&unix_sk(s)->lock)
49#define unix_state_unlock(s) spin_unlock(&unix_sk(s)->lock)
50#define unix_state_lock_nested(s) \
51 spin_lock_nested(&unix_sk(s)->lock, \
52 SINGLE_DEPTH_NESTING)
53
54/* The AF_UNIX socket */
55struct unix_sock {
56 /* WARNING: sk has to be the first member */
57 struct sock sk;
58 struct unix_address *addr;
59 struct path path;
60 struct mutex iolock, bindlock;
61 struct sock *peer;
62 struct list_head link;
63 atomic_long_t inflight;
64 spinlock_t lock;
65 unsigned long gc_flags;
66#define UNIX_GC_CANDIDATE 0
67#define UNIX_GC_MAYBE_CYCLE 1
68 struct socket_wq peer_wq;
69 wait_queue_entry_t peer_wake;
70 struct scm_stat scm_stat;
71#if IS_ENABLED(CONFIG_AF_UNIX_OOB)
72 struct sk_buff *oob_skb;
73#endif
74};
75
76static inline struct unix_sock *unix_sk(const struct sock *sk)
77{
78 return (struct unix_sock *)sk;
79}
80
81#define peer_wait peer_wq.wait
82
83long unix_inq_len(struct sock *sk);
84long unix_outq_len(struct sock *sk);
85
86int __unix_dgram_recvmsg(struct sock *sk, struct msghdr *msg, size_t size,
87 int flags);
88int __unix_stream_recvmsg(struct sock *sk, struct msghdr *msg, size_t size,
89 int flags);
90#ifdef CONFIG_SYSCTL
91int unix_sysctl_register(struct net *net);
92void unix_sysctl_unregister(struct net *net);
93#else
94static inline int unix_sysctl_register(struct net *net) { return 0; }
95static inline void unix_sysctl_unregister(struct net *net) {}
96#endif
97
98#ifdef CONFIG_BPF_SYSCALL
99extern struct proto unix_dgram_proto;
100extern struct proto unix_stream_proto;
101
102int unix_dgram_bpf_update_proto(struct sock *sk, struct sk_psock *psock, bool restore);
103int unix_stream_bpf_update_proto(struct sock *sk, struct sk_psock *psock, bool restore);
104void __init unix_bpf_build_proto(void);
105#else
106static inline void __init unix_bpf_build_proto(void)
107{}
108#endif
109#endif