Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 1 | /* SPDX-License-Identifier: GPL-2.0 */ |
| 2 | #ifndef __LINUX_NET_AFUNIX_H |
| 3 | #define __LINUX_NET_AFUNIX_H |
| 4 | |
| 5 | #include <linux/socket.h> |
| 6 | #include <linux/un.h> |
| 7 | #include <linux/mutex.h> |
| 8 | #include <linux/refcount.h> |
| 9 | #include <net/sock.h> |
| 10 | |
| 11 | void unix_inflight(struct user_struct *user, struct file *fp); |
| 12 | void unix_notinflight(struct user_struct *user, struct file *fp); |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 13 | void unix_destruct_scm(struct sk_buff *skb); |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 14 | void unix_gc(void); |
| 15 | void wait_for_unix_gc(void); |
| 16 | struct sock *unix_get_socket(struct file *filp); |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 17 | struct sock *unix_peer_get(struct sock *sk); |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 18 | |
| 19 | #define UNIX_HASH_SIZE 256 |
| 20 | #define UNIX_HASH_BITS 8 |
| 21 | |
| 22 | extern unsigned int unix_tot_inflight; |
| 23 | extern spinlock_t unix_table_lock; |
| 24 | extern struct hlist_head unix_socket_table[2 * UNIX_HASH_SIZE]; |
| 25 | |
| 26 | struct unix_address { |
| 27 | refcount_t refcnt; |
| 28 | int len; |
| 29 | unsigned int hash; |
| 30 | struct sockaddr_un name[0]; |
| 31 | }; |
| 32 | |
| 33 | struct unix_skb_parms { |
| 34 | struct pid *pid; /* Skb credentials */ |
| 35 | kuid_t uid; |
| 36 | kgid_t gid; |
| 37 | struct scm_fp_list *fp; /* Passed files */ |
| 38 | #ifdef CONFIG_SECURITY_NETWORK |
| 39 | u32 secid; /* Security ID */ |
| 40 | #endif |
| 41 | u32 consumed; |
| 42 | } __randomize_layout; |
| 43 | |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 44 | #define UNIXCB(skb) (*(struct unix_skb_parms *)&((skb)->cb)) |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 45 | |
| 46 | #define unix_state_lock(s) spin_lock(&unix_sk(s)->lock) |
| 47 | #define unix_state_unlock(s) spin_unlock(&unix_sk(s)->lock) |
| 48 | #define unix_state_lock_nested(s) \ |
| 49 | spin_lock_nested(&unix_sk(s)->lock, \ |
| 50 | SINGLE_DEPTH_NESTING) |
| 51 | |
| 52 | /* The AF_UNIX socket */ |
| 53 | struct unix_sock { |
| 54 | /* WARNING: sk has to be the first member */ |
| 55 | struct sock sk; |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 56 | struct unix_address *addr; |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 57 | struct path path; |
| 58 | struct mutex iolock, bindlock; |
| 59 | struct sock *peer; |
| 60 | struct list_head link; |
| 61 | atomic_long_t inflight; |
| 62 | spinlock_t lock; |
| 63 | unsigned long gc_flags; |
| 64 | #define UNIX_GC_CANDIDATE 0 |
| 65 | #define UNIX_GC_MAYBE_CYCLE 1 |
| 66 | struct socket_wq peer_wq; |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 67 | wait_queue_entry_t peer_wake; |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 68 | }; |
| 69 | |
| 70 | static inline struct unix_sock *unix_sk(const struct sock *sk) |
| 71 | { |
| 72 | return (struct unix_sock *)sk; |
| 73 | } |
| 74 | |
| 75 | #define peer_wait peer_wq.wait |
| 76 | |
| 77 | long unix_inq_len(struct sock *sk); |
| 78 | long unix_outq_len(struct sock *sk); |
| 79 | |
| 80 | #ifdef CONFIG_SYSCTL |
| 81 | int unix_sysctl_register(struct net *net); |
| 82 | void unix_sysctl_unregister(struct net *net); |
| 83 | #else |
| 84 | static inline int unix_sysctl_register(struct net *net) { return 0; } |
| 85 | static inline void unix_sysctl_unregister(struct net *net) {} |
| 86 | #endif |
| 87 | #endif |