Loading...
1/* SPDX-License-Identifier: GPL-2.0 */
2#ifndef __LINUX_NET_AFUNIX_H
3#define __LINUX_NET_AFUNIX_H
4
5#include <linux/socket.h>
6#include <linux/un.h>
7#include <linux/mutex.h>
8#include <linux/refcount.h>
9#include <net/sock.h>
10
11void unix_inflight(struct user_struct *user, struct file *fp);
12void unix_notinflight(struct user_struct *user, struct file *fp);
13void unix_destruct_scm(struct sk_buff *skb);
14void unix_gc(void);
15void wait_for_unix_gc(void);
16struct sock *unix_get_socket(struct file *filp);
17struct sock *unix_peer_get(struct sock *sk);
18
19#define UNIX_HASH_SIZE 256
20#define UNIX_HASH_BITS 8
21
22extern unsigned int unix_tot_inflight;
23extern spinlock_t unix_table_lock;
24extern struct hlist_head unix_socket_table[2 * UNIX_HASH_SIZE];
25
26struct unix_address {
27 refcount_t refcnt;
28 int len;
29 unsigned int hash;
30 struct sockaddr_un name[0];
31};
32
33struct unix_skb_parms {
34 struct pid *pid; /* Skb credentials */
35 kuid_t uid;
36 kgid_t gid;
37 struct scm_fp_list *fp; /* Passed files */
38#ifdef CONFIG_SECURITY_NETWORK
39 u32 secid; /* Security ID */
40#endif
41 u32 consumed;
42} __randomize_layout;
43
44#define UNIXCB(skb) (*(struct unix_skb_parms *)&((skb)->cb))
45
46#define unix_state_lock(s) spin_lock(&unix_sk(s)->lock)
47#define unix_state_unlock(s) spin_unlock(&unix_sk(s)->lock)
48#define unix_state_lock_nested(s) \
49 spin_lock_nested(&unix_sk(s)->lock, \
50 SINGLE_DEPTH_NESTING)
51
52/* The AF_UNIX socket */
53struct unix_sock {
54 /* WARNING: sk has to be the first member */
55 struct sock sk;
56 struct unix_address *addr;
57 struct path path;
58 struct mutex iolock, bindlock;
59 struct sock *peer;
60 struct list_head link;
61 atomic_long_t inflight;
62 spinlock_t lock;
63 unsigned long gc_flags;
64#define UNIX_GC_CANDIDATE 0
65#define UNIX_GC_MAYBE_CYCLE 1
66 struct socket_wq peer_wq;
67 wait_queue_entry_t peer_wake;
68};
69
70static inline struct unix_sock *unix_sk(const struct sock *sk)
71{
72 return (struct unix_sock *)sk;
73}
74
75#define peer_wait peer_wq.wait
76
77long unix_inq_len(struct sock *sk);
78long unix_outq_len(struct sock *sk);
79
80#ifdef CONFIG_SYSCTL
81int unix_sysctl_register(struct net *net);
82void unix_sysctl_unregister(struct net *net);
83#else
84static inline int unix_sysctl_register(struct net *net) { return 0; }
85static inline void unix_sysctl_unregister(struct net *net) {}
86#endif
87#endif
1/* SPDX-License-Identifier: GPL-2.0 */
2#ifndef __LINUX_NET_AFUNIX_H
3#define __LINUX_NET_AFUNIX_H
4
5#include <linux/socket.h>
6#include <linux/un.h>
7#include <linux/mutex.h>
8#include <linux/refcount.h>
9#include <net/sock.h>
10
11void unix_inflight(struct user_struct *user, struct file *fp);
12void unix_notinflight(struct user_struct *user, struct file *fp);
13void unix_destruct_scm(struct sk_buff *skb);
14void io_uring_destruct_scm(struct sk_buff *skb);
15void unix_gc(void);
16void wait_for_unix_gc(void);
17struct sock *unix_get_socket(struct file *filp);
18struct sock *unix_peer_get(struct sock *sk);
19
20#define UNIX_HASH_MOD (256 - 1)
21#define UNIX_HASH_SIZE (256 * 2)
22#define UNIX_HASH_BITS 8
23
24extern unsigned int unix_tot_inflight;
25
26struct unix_address {
27 refcount_t refcnt;
28 int len;
29 struct sockaddr_un name[];
30};
31
32struct unix_skb_parms {
33 struct pid *pid; /* Skb credentials */
34 kuid_t uid;
35 kgid_t gid;
36 struct scm_fp_list *fp; /* Passed files */
37#ifdef CONFIG_SECURITY_NETWORK
38 u32 secid; /* Security ID */
39#endif
40 u32 consumed;
41} __randomize_layout;
42
43struct scm_stat {
44 atomic_t nr_fds;
45};
46
47#define UNIXCB(skb) (*(struct unix_skb_parms *)&((skb)->cb))
48
49/* The AF_UNIX socket */
50struct unix_sock {
51 /* WARNING: sk has to be the first member */
52 struct sock sk;
53 struct unix_address *addr;
54 struct path path;
55 struct mutex iolock, bindlock;
56 struct sock *peer;
57 struct list_head link;
58 atomic_long_t inflight;
59 spinlock_t lock;
60 unsigned long gc_flags;
61#define UNIX_GC_CANDIDATE 0
62#define UNIX_GC_MAYBE_CYCLE 1
63 struct socket_wq peer_wq;
64 wait_queue_entry_t peer_wake;
65 struct scm_stat scm_stat;
66#if IS_ENABLED(CONFIG_AF_UNIX_OOB)
67 struct sk_buff *oob_skb;
68#endif
69};
70
71#define unix_sk(ptr) container_of_const(ptr, struct unix_sock, sk)
72#define unix_peer(sk) (unix_sk(sk)->peer)
73
74#define unix_state_lock(s) spin_lock(&unix_sk(s)->lock)
75#define unix_state_unlock(s) spin_unlock(&unix_sk(s)->lock)
76enum unix_socket_lock_class {
77 U_LOCK_NORMAL,
78 U_LOCK_SECOND, /* for double locking, see unix_state_double_lock(). */
79 U_LOCK_DIAG, /* used while dumping icons, see sk_diag_dump_icons(). */
80};
81
82static inline void unix_state_lock_nested(struct sock *sk,
83 enum unix_socket_lock_class subclass)
84{
85 spin_lock_nested(&unix_sk(sk)->lock, subclass);
86}
87
88#define peer_wait peer_wq.wait
89
90long unix_inq_len(struct sock *sk);
91long unix_outq_len(struct sock *sk);
92
93int __unix_dgram_recvmsg(struct sock *sk, struct msghdr *msg, size_t size,
94 int flags);
95int __unix_stream_recvmsg(struct sock *sk, struct msghdr *msg, size_t size,
96 int flags);
97#ifdef CONFIG_SYSCTL
98int unix_sysctl_register(struct net *net);
99void unix_sysctl_unregister(struct net *net);
100#else
101static inline int unix_sysctl_register(struct net *net) { return 0; }
102static inline void unix_sysctl_unregister(struct net *net) {}
103#endif
104
105#ifdef CONFIG_BPF_SYSCALL
106extern struct proto unix_dgram_proto;
107extern struct proto unix_stream_proto;
108
109int unix_dgram_bpf_update_proto(struct sock *sk, struct sk_psock *psock, bool restore);
110int unix_stream_bpf_update_proto(struct sock *sk, struct sk_psock *psock, bool restore);
111void __init unix_bpf_build_proto(void);
112#else
113static inline void __init unix_bpf_build_proto(void)
114{}
115#endif
116#endif