Linux Audio

Check our new training course

Loading...
v6.13.7
  1/* SPDX-License-Identifier: GPL-2.0 */
  2#ifndef __LINUX_NET_AFUNIX_H
  3#define __LINUX_NET_AFUNIX_H
  4
  5#include <linux/socket.h>
  6#include <linux/un.h>
  7#include <linux/mutex.h>
  8#include <linux/refcount.h>
  9#include <net/sock.h>
 10
 11#if IS_ENABLED(CONFIG_UNIX)
 12struct unix_sock *unix_get_socket(struct file *filp);
 13#else
 14static inline struct unix_sock *unix_get_socket(struct file *filp)
 15{
 16	return NULL;
 17}
 18#endif
 19
 20extern unsigned int unix_tot_inflight;
 21void unix_add_edges(struct scm_fp_list *fpl, struct unix_sock *receiver);
 22void unix_del_edges(struct scm_fp_list *fpl);
 23void unix_update_edges(struct unix_sock *receiver);
 24int unix_prepare_fpl(struct scm_fp_list *fpl);
 25void unix_destroy_fpl(struct scm_fp_list *fpl);
 26void unix_gc(void);
 27void wait_for_unix_gc(struct scm_fp_list *fpl);
 28
 29struct unix_vertex {
 30	struct list_head edges;
 31	struct list_head entry;
 32	struct list_head scc_entry;
 33	unsigned long out_degree;
 34	unsigned long index;
 35	unsigned long scc_index;
 36};
 37
 38struct unix_edge {
 39	struct unix_sock *predecessor;
 40	struct unix_sock *successor;
 41	struct list_head vertex_entry;
 42	struct list_head stack_entry;
 43};
 44
 45struct sock *unix_peer_get(struct sock *sk);
 46
 47#define UNIX_HASH_MOD	(256 - 1)
 48#define UNIX_HASH_SIZE	(256 * 2)
 49#define UNIX_HASH_BITS	8
 50
 
 
 51struct unix_address {
 52	refcount_t	refcnt;
 53	int		len;
 54	struct sockaddr_un name[];
 55};
 56
 57struct unix_skb_parms {
 58	struct pid		*pid;		/* Skb credentials	*/
 59	kuid_t			uid;
 60	kgid_t			gid;
 61	struct scm_fp_list	*fp;		/* Passed files		*/
 62#ifdef CONFIG_SECURITY_NETWORK
 63	u32			secid;		/* Security ID		*/
 64#endif
 65	u32			consumed;
 66} __randomize_layout;
 67
 68struct scm_stat {
 69	atomic_t nr_fds;
 70	unsigned long nr_unix_fds;
 71};
 72
 73#define UNIXCB(skb)	(*(struct unix_skb_parms *)&((skb)->cb))
 74
 75/* The AF_UNIX socket */
 76struct unix_sock {
 77	/* WARNING: sk has to be the first member */
 78	struct sock		sk;
 79	struct unix_address	*addr;
 80	struct path		path;
 81	struct mutex		iolock, bindlock;
 82	struct sock		*peer;
 83	struct sock		*listener;
 84	struct unix_vertex	*vertex;
 85	spinlock_t		lock;
 
 
 
 86	struct socket_wq	peer_wq;
 87	wait_queue_entry_t	peer_wake;
 88	struct scm_stat		scm_stat;
 89#if IS_ENABLED(CONFIG_AF_UNIX_OOB)
 90	struct sk_buff		*oob_skb;
 91#endif
 92};
 93
 94#define unix_sk(ptr) container_of_const(ptr, struct unix_sock, sk)
 95#define unix_peer(sk) (unix_sk(sk)->peer)
 96
 97#define unix_state_lock(s)	spin_lock(&unix_sk(s)->lock)
 98#define unix_state_unlock(s)	spin_unlock(&unix_sk(s)->lock)
 
 
 
 
 
 
 
 
 
 
 
 99
100#define peer_wait peer_wq.wait
101
102long unix_inq_len(struct sock *sk);
103long unix_outq_len(struct sock *sk);
104
105int __unix_dgram_recvmsg(struct sock *sk, struct msghdr *msg, size_t size,
106			 int flags);
107int __unix_stream_recvmsg(struct sock *sk, struct msghdr *msg, size_t size,
108			  int flags);
109#ifdef CONFIG_SYSCTL
110int unix_sysctl_register(struct net *net);
111void unix_sysctl_unregister(struct net *net);
112#else
113static inline int unix_sysctl_register(struct net *net) { return 0; }
114static inline void unix_sysctl_unregister(struct net *net) {}
115#endif
116
117#ifdef CONFIG_BPF_SYSCALL
118extern struct proto unix_dgram_proto;
119extern struct proto unix_stream_proto;
120
121int unix_dgram_bpf_update_proto(struct sock *sk, struct sk_psock *psock, bool restore);
122int unix_stream_bpf_update_proto(struct sock *sk, struct sk_psock *psock, bool restore);
123void __init unix_bpf_build_proto(void);
124#else
125static inline void __init unix_bpf_build_proto(void)
126{}
127#endif
128#endif
v6.8
  1/* SPDX-License-Identifier: GPL-2.0 */
  2#ifndef __LINUX_NET_AFUNIX_H
  3#define __LINUX_NET_AFUNIX_H
  4
  5#include <linux/socket.h>
  6#include <linux/un.h>
  7#include <linux/mutex.h>
  8#include <linux/refcount.h>
  9#include <net/sock.h>
 10
 11void unix_inflight(struct user_struct *user, struct file *fp);
 12void unix_notinflight(struct user_struct *user, struct file *fp);
 13void unix_destruct_scm(struct sk_buff *skb);
 14void io_uring_destruct_scm(struct sk_buff *skb);
 
 
 
 
 
 
 
 
 
 
 
 15void unix_gc(void);
 16void wait_for_unix_gc(void);
 17struct sock *unix_get_socket(struct file *filp);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 18struct sock *unix_peer_get(struct sock *sk);
 19
 20#define UNIX_HASH_MOD	(256 - 1)
 21#define UNIX_HASH_SIZE	(256 * 2)
 22#define UNIX_HASH_BITS	8
 23
 24extern unsigned int unix_tot_inflight;
 25
 26struct unix_address {
 27	refcount_t	refcnt;
 28	int		len;
 29	struct sockaddr_un name[];
 30};
 31
 32struct unix_skb_parms {
 33	struct pid		*pid;		/* Skb credentials	*/
 34	kuid_t			uid;
 35	kgid_t			gid;
 36	struct scm_fp_list	*fp;		/* Passed files		*/
 37#ifdef CONFIG_SECURITY_NETWORK
 38	u32			secid;		/* Security ID		*/
 39#endif
 40	u32			consumed;
 41} __randomize_layout;
 42
 43struct scm_stat {
 44	atomic_t nr_fds;
 
 45};
 46
 47#define UNIXCB(skb)	(*(struct unix_skb_parms *)&((skb)->cb))
 48
 49/* The AF_UNIX socket */
 50struct unix_sock {
 51	/* WARNING: sk has to be the first member */
 52	struct sock		sk;
 53	struct unix_address	*addr;
 54	struct path		path;
 55	struct mutex		iolock, bindlock;
 56	struct sock		*peer;
 57	struct list_head	link;
 58	atomic_long_t		inflight;
 59	spinlock_t		lock;
 60	unsigned long		gc_flags;
 61#define UNIX_GC_CANDIDATE	0
 62#define UNIX_GC_MAYBE_CYCLE	1
 63	struct socket_wq	peer_wq;
 64	wait_queue_entry_t	peer_wake;
 65	struct scm_stat		scm_stat;
 66#if IS_ENABLED(CONFIG_AF_UNIX_OOB)
 67	struct sk_buff		*oob_skb;
 68#endif
 69};
 70
 71#define unix_sk(ptr) container_of_const(ptr, struct unix_sock, sk)
 72#define unix_peer(sk) (unix_sk(sk)->peer)
 73
 74#define unix_state_lock(s)	spin_lock(&unix_sk(s)->lock)
 75#define unix_state_unlock(s)	spin_unlock(&unix_sk(s)->lock)
 76enum unix_socket_lock_class {
 77	U_LOCK_NORMAL,
 78	U_LOCK_SECOND,	/* for double locking, see unix_state_double_lock(). */
 79	U_LOCK_DIAG, /* used while dumping icons, see sk_diag_dump_icons(). */
 80};
 81
 82static inline void unix_state_lock_nested(struct sock *sk,
 83				   enum unix_socket_lock_class subclass)
 84{
 85	spin_lock_nested(&unix_sk(sk)->lock, subclass);
 86}
 87
 88#define peer_wait peer_wq.wait
 89
 90long unix_inq_len(struct sock *sk);
 91long unix_outq_len(struct sock *sk);
 92
 93int __unix_dgram_recvmsg(struct sock *sk, struct msghdr *msg, size_t size,
 94			 int flags);
 95int __unix_stream_recvmsg(struct sock *sk, struct msghdr *msg, size_t size,
 96			  int flags);
 97#ifdef CONFIG_SYSCTL
 98int unix_sysctl_register(struct net *net);
 99void unix_sysctl_unregister(struct net *net);
100#else
101static inline int unix_sysctl_register(struct net *net) { return 0; }
102static inline void unix_sysctl_unregister(struct net *net) {}
103#endif
104
105#ifdef CONFIG_BPF_SYSCALL
106extern struct proto unix_dgram_proto;
107extern struct proto unix_stream_proto;
108
109int unix_dgram_bpf_update_proto(struct sock *sk, struct sk_psock *psock, bool restore);
110int unix_stream_bpf_update_proto(struct sock *sk, struct sk_psock *psock, bool restore);
111void __init unix_bpf_build_proto(void);
112#else
113static inline void __init unix_bpf_build_proto(void)
114{}
115#endif
116#endif