blob: 427dac94bc7e38a3e63fb008fa6bb4b12cb04fcf [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001#ifndef __LINUX_NET_AFUNIX_H
2#define __LINUX_NET_AFUNIX_H
Arnaldo Carvalho de Melo20380732005-08-16 02:18:02 -03003
4#include <linux/config.h>
5#include <linux/socket.h>
6#include <linux/un.h>
Ingo Molnar57b47a52006-03-20 22:35:41 -08007#include <linux/mutex.h>
Arnaldo Carvalho de Melo20380732005-08-16 02:18:02 -03008#include <net/sock.h>
9
Linus Torvalds1da177e2005-04-16 15:20:36 -070010extern void unix_inflight(struct file *fp);
11extern void unix_notinflight(struct file *fp);
12extern void unix_gc(void);
13
14#define UNIX_HASH_SIZE 256
15
16extern struct hlist_head unix_socket_table[UNIX_HASH_SIZE + 1];
David S. Millerfbe9cc42005-12-13 23:26:29 -080017extern spinlock_t unix_table_lock;
Linus Torvalds1da177e2005-04-16 15:20:36 -070018
19extern atomic_t unix_tot_inflight;
20
21static inline struct sock *first_unix_socket(int *i)
22{
23 for (*i = 0; *i <= UNIX_HASH_SIZE; (*i)++) {
24 if (!hlist_empty(&unix_socket_table[*i]))
25 return __sk_head(&unix_socket_table[*i]);
26 }
27 return NULL;
28}
29
30static inline struct sock *next_unix_socket(int *i, struct sock *s)
31{
32 struct sock *next = sk_next(s);
33 /* More in this chain? */
34 if (next)
35 return next;
36 /* Look for next non-empty chain. */
37 for ((*i)++; *i <= UNIX_HASH_SIZE; (*i)++) {
38 if (!hlist_empty(&unix_socket_table[*i]))
39 return __sk_head(&unix_socket_table[*i]);
40 }
41 return NULL;
42}
43
44#define forall_unix_sockets(i, s) \
45 for (s = first_unix_socket(&(i)); s; s = next_unix_socket(&(i),(s)))
46
47struct unix_address {
48 atomic_t refcnt;
49 int len;
50 unsigned hash;
51 struct sockaddr_un name[0];
52};
53
54struct unix_skb_parms {
55 struct ucred creds; /* Skb credentials */
56 struct scm_fp_list *fp; /* Passed files */
57};
58
59#define UNIXCB(skb) (*(struct unix_skb_parms*)&((skb)->cb))
60#define UNIXCREDS(skb) (&UNIXCB((skb)).creds)
61
Benjamin LaHaisefd19f322006-01-03 14:10:46 -080062#define unix_state_rlock(s) spin_lock(&unix_sk(s)->lock)
63#define unix_state_runlock(s) spin_unlock(&unix_sk(s)->lock)
64#define unix_state_wlock(s) spin_lock(&unix_sk(s)->lock)
65#define unix_state_wunlock(s) spin_unlock(&unix_sk(s)->lock)
Linus Torvalds1da177e2005-04-16 15:20:36 -070066
67#ifdef __KERNEL__
68/* The AF_UNIX socket */
69struct unix_sock {
70 /* WARNING: sk has to be the first member */
71 struct sock sk;
72 struct unix_address *addr;
73 struct dentry *dentry;
74 struct vfsmount *mnt;
Ingo Molnar57b47a52006-03-20 22:35:41 -080075 struct mutex readlock;
Linus Torvalds1da177e2005-04-16 15:20:36 -070076 struct sock *peer;
77 struct sock *other;
78 struct sock *gc_tree;
79 atomic_t inflight;
Benjamin LaHaisefd19f322006-01-03 14:10:46 -080080 spinlock_t lock;
Linus Torvalds1da177e2005-04-16 15:20:36 -070081 wait_queue_head_t peer_wait;
82};
83#define unix_sk(__sk) ((struct unix_sock *)__sk)
Arnaldo Carvalho de Melo20380732005-08-16 02:18:02 -030084
85#ifdef CONFIG_SYSCTL
86extern int sysctl_unix_max_dgram_qlen;
87extern void unix_sysctl_register(void);
88extern void unix_sysctl_unregister(void);
89#else
90static inline void unix_sysctl_register(void) {}
91static inline void unix_sysctl_unregister(void) {}
92#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -070093#endif
94#endif