blob: f42fdddecd417dcf2660d94a79796f912f31db88 [file] [log] [blame]
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001/* SPDX-License-Identifier: GPL-2.0 */
2#ifndef __LINUX_NET_AFUNIX_H
3#define __LINUX_NET_AFUNIX_H
4
5#include <linux/socket.h>
6#include <linux/un.h>
7#include <linux/mutex.h>
8#include <linux/refcount.h>
9#include <net/sock.h>
10
11void unix_inflight(struct user_struct *user, struct file *fp);
12void unix_notinflight(struct user_struct *user, struct file *fp);
David Brazdil0f672f62019-12-10 10:32:29 +000013void unix_destruct_scm(struct sk_buff *skb);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000014void unix_gc(void);
15void wait_for_unix_gc(void);
16struct sock *unix_get_socket(struct file *filp);
David Brazdil0f672f62019-12-10 10:32:29 +000017struct sock *unix_peer_get(struct sock *sk);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000018
19#define UNIX_HASH_SIZE 256
20#define UNIX_HASH_BITS 8
21
22extern unsigned int unix_tot_inflight;
23extern spinlock_t unix_table_lock;
24extern struct hlist_head unix_socket_table[2 * UNIX_HASH_SIZE];
25
26struct unix_address {
27 refcount_t refcnt;
28 int len;
29 unsigned int hash;
Olivier Deprez157378f2022-04-04 15:47:50 +020030 struct sockaddr_un name[];
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000031};
32
33struct unix_skb_parms {
34 struct pid *pid; /* Skb credentials */
35 kuid_t uid;
36 kgid_t gid;
37 struct scm_fp_list *fp; /* Passed files */
38#ifdef CONFIG_SECURITY_NETWORK
39 u32 secid; /* Security ID */
40#endif
41 u32 consumed;
42} __randomize_layout;
43
Olivier Deprez157378f2022-04-04 15:47:50 +020044struct scm_stat {
45 atomic_t nr_fds;
46};
47
David Brazdil0f672f62019-12-10 10:32:29 +000048#define UNIXCB(skb) (*(struct unix_skb_parms *)&((skb)->cb))
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000049
50#define unix_state_lock(s) spin_lock(&unix_sk(s)->lock)
51#define unix_state_unlock(s) spin_unlock(&unix_sk(s)->lock)
52#define unix_state_lock_nested(s) \
53 spin_lock_nested(&unix_sk(s)->lock, \
54 SINGLE_DEPTH_NESTING)
55
56/* The AF_UNIX socket */
57struct unix_sock {
58 /* WARNING: sk has to be the first member */
59 struct sock sk;
David Brazdil0f672f62019-12-10 10:32:29 +000060 struct unix_address *addr;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000061 struct path path;
62 struct mutex iolock, bindlock;
63 struct sock *peer;
64 struct list_head link;
65 atomic_long_t inflight;
66 spinlock_t lock;
67 unsigned long gc_flags;
68#define UNIX_GC_CANDIDATE 0
69#define UNIX_GC_MAYBE_CYCLE 1
70 struct socket_wq peer_wq;
David Brazdil0f672f62019-12-10 10:32:29 +000071 wait_queue_entry_t peer_wake;
Olivier Deprez157378f2022-04-04 15:47:50 +020072 struct scm_stat scm_stat;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000073};
74
75static inline struct unix_sock *unix_sk(const struct sock *sk)
76{
77 return (struct unix_sock *)sk;
78}
79
80#define peer_wait peer_wq.wait
81
82long unix_inq_len(struct sock *sk);
83long unix_outq_len(struct sock *sk);
84
85#ifdef CONFIG_SYSCTL
86int unix_sysctl_register(struct net *net);
87void unix_sysctl_unregister(struct net *net);
88#else
89static inline int unix_sysctl_register(struct net *net) { return 0; }
90static inline void unix_sysctl_unregister(struct net *net) {}
91#endif
92#endif