Loading...
1/* SPDX-License-Identifier: GPL-2.0 */
2#ifndef __LINUX_NET_AFUNIX_H
3#define __LINUX_NET_AFUNIX_H
4
5#include <linux/socket.h>
6#include <linux/un.h>
7#include <linux/mutex.h>
8#include <linux/refcount.h>
9#include <net/sock.h>
10
11#if IS_ENABLED(CONFIG_UNIX)
12struct unix_sock *unix_get_socket(struct file *filp);
13#else
14static inline struct unix_sock *unix_get_socket(struct file *filp)
15{
16 return NULL;
17}
18#endif
19
20extern unsigned int unix_tot_inflight;
21void unix_add_edges(struct scm_fp_list *fpl, struct unix_sock *receiver);
22void unix_del_edges(struct scm_fp_list *fpl);
23void unix_update_edges(struct unix_sock *receiver);
24int unix_prepare_fpl(struct scm_fp_list *fpl);
25void unix_destroy_fpl(struct scm_fp_list *fpl);
26void unix_gc(void);
27void wait_for_unix_gc(struct scm_fp_list *fpl);
28
29struct unix_vertex {
30 struct list_head edges;
31 struct list_head entry;
32 struct list_head scc_entry;
33 unsigned long out_degree;
34 unsigned long index;
35 unsigned long scc_index;
36};
37
38struct unix_edge {
39 struct unix_sock *predecessor;
40 struct unix_sock *successor;
41 struct list_head vertex_entry;
42 struct list_head stack_entry;
43};
44
45struct sock *unix_peer_get(struct sock *sk);
46
47#define UNIX_HASH_MOD (256 - 1)
48#define UNIX_HASH_SIZE (256 * 2)
49#define UNIX_HASH_BITS 8
50
51struct unix_address {
52 refcount_t refcnt;
53 int len;
54 struct sockaddr_un name[];
55};
56
57struct unix_skb_parms {
58 struct pid *pid; /* Skb credentials */
59 kuid_t uid;
60 kgid_t gid;
61 struct scm_fp_list *fp; /* Passed files */
62#ifdef CONFIG_SECURITY_NETWORK
63 u32 secid; /* Security ID */
64#endif
65 u32 consumed;
66} __randomize_layout;
67
68struct scm_stat {
69 atomic_t nr_fds;
70 unsigned long nr_unix_fds;
71};
72
73#define UNIXCB(skb) (*(struct unix_skb_parms *)&((skb)->cb))
74
75/* The AF_UNIX socket */
76struct unix_sock {
77 /* WARNING: sk has to be the first member */
78 struct sock sk;
79 struct unix_address *addr;
80 struct path path;
81 struct mutex iolock, bindlock;
82 struct sock *peer;
83 struct sock *listener;
84 struct unix_vertex *vertex;
85 spinlock_t lock;
86 struct socket_wq peer_wq;
87 wait_queue_entry_t peer_wake;
88 struct scm_stat scm_stat;
89#if IS_ENABLED(CONFIG_AF_UNIX_OOB)
90 struct sk_buff *oob_skb;
91#endif
92};
93
94#define unix_sk(ptr) container_of_const(ptr, struct unix_sock, sk)
95#define unix_peer(sk) (unix_sk(sk)->peer)
96
97#define unix_state_lock(s) spin_lock(&unix_sk(s)->lock)
98#define unix_state_unlock(s) spin_unlock(&unix_sk(s)->lock)
99
100#define peer_wait peer_wq.wait
101
102long unix_inq_len(struct sock *sk);
103long unix_outq_len(struct sock *sk);
104
105int __unix_dgram_recvmsg(struct sock *sk, struct msghdr *msg, size_t size,
106 int flags);
107int __unix_stream_recvmsg(struct sock *sk, struct msghdr *msg, size_t size,
108 int flags);
109#ifdef CONFIG_SYSCTL
110int unix_sysctl_register(struct net *net);
111void unix_sysctl_unregister(struct net *net);
112#else
113static inline int unix_sysctl_register(struct net *net) { return 0; }
114static inline void unix_sysctl_unregister(struct net *net) {}
115#endif
116
117#ifdef CONFIG_BPF_SYSCALL
118extern struct proto unix_dgram_proto;
119extern struct proto unix_stream_proto;
120
121int unix_dgram_bpf_update_proto(struct sock *sk, struct sk_psock *psock, bool restore);
122int unix_stream_bpf_update_proto(struct sock *sk, struct sk_psock *psock, bool restore);
123void __init unix_bpf_build_proto(void);
124#else
125static inline void __init unix_bpf_build_proto(void)
126{}
127#endif
128#endif
1/* SPDX-License-Identifier: GPL-2.0 */
2#ifndef __LINUX_NET_AFUNIX_H
3#define __LINUX_NET_AFUNIX_H
4
5#include <linux/socket.h>
6#include <linux/un.h>
7#include <linux/mutex.h>
8#include <linux/refcount.h>
9#include <net/sock.h>
10
11void unix_inflight(struct user_struct *user, struct file *fp);
12void unix_notinflight(struct user_struct *user, struct file *fp);
13void unix_gc(void);
14void wait_for_unix_gc(void);
15struct sock *unix_get_socket(struct file *filp);
16struct sock *unix_peer_get(struct sock *);
17
18#define UNIX_HASH_SIZE 256
19#define UNIX_HASH_BITS 8
20
21extern unsigned int unix_tot_inflight;
22extern spinlock_t unix_table_lock;
23extern struct hlist_head unix_socket_table[2 * UNIX_HASH_SIZE];
24
25struct unix_address {
26 refcount_t refcnt;
27 int len;
28 unsigned int hash;
29 struct sockaddr_un name[0];
30};
31
32struct unix_skb_parms {
33 struct pid *pid; /* Skb credentials */
34 kuid_t uid;
35 kgid_t gid;
36 struct scm_fp_list *fp; /* Passed files */
37#ifdef CONFIG_SECURITY_NETWORK
38 u32 secid; /* Security ID */
39#endif
40 u32 consumed;
41} __randomize_layout;
42
43#define UNIXCB(skb) (*(struct unix_skb_parms *)&((skb)->cb))
44
45#define unix_state_lock(s) spin_lock(&unix_sk(s)->lock)
46#define unix_state_unlock(s) spin_unlock(&unix_sk(s)->lock)
47#define unix_state_lock_nested(s) \
48 spin_lock_nested(&unix_sk(s)->lock, \
49 SINGLE_DEPTH_NESTING)
50
51/* The AF_UNIX socket */
52struct unix_sock {
53 /* WARNING: sk has to be the first member */
54 struct sock sk;
55 struct unix_address *addr;
56 struct path path;
57 struct mutex iolock, bindlock;
58 struct sock *peer;
59 struct list_head link;
60 atomic_long_t inflight;
61 spinlock_t lock;
62 unsigned long gc_flags;
63#define UNIX_GC_CANDIDATE 0
64#define UNIX_GC_MAYBE_CYCLE 1
65 struct socket_wq peer_wq;
66 wait_queue_entry_t peer_wake;
67};
68
69static inline struct unix_sock *unix_sk(const struct sock *sk)
70{
71 return (struct unix_sock *)sk;
72}
73
74#define peer_wait peer_wq.wait
75
76long unix_inq_len(struct sock *sk);
77long unix_outq_len(struct sock *sk);
78
79#ifdef CONFIG_SYSCTL
80int unix_sysctl_register(struct net *net);
81void unix_sysctl_unregister(struct net *net);
82#else
83static inline int unix_sysctl_register(struct net *net) { return 0; }
84static inline void unix_sysctl_unregister(struct net *net) {}
85#endif
86#endif