2005-04-16 16:20:36 -06:00
|
|
|
/*
|
|
|
|
* NET An implementation of the SOCKET network access protocol.
|
|
|
|
* This is the master header file for the Linux NET layer,
|
|
|
|
* or, in plain English: the networking handling part of the
|
|
|
|
* kernel.
|
|
|
|
*
|
|
|
|
* Version: @(#)net.h 1.0.3 05/25/93
|
|
|
|
*
|
|
|
|
* Authors: Orest Zborowski, <obz@Kodak.COM>
|
2005-05-05 17:16:16 -06:00
|
|
|
* Ross Biro
|
2005-04-16 16:20:36 -06:00
|
|
|
* Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU General Public License
|
|
|
|
* as published by the Free Software Foundation; either version
|
|
|
|
* 2 of the License, or (at your option) any later version.
|
|
|
|
*/
|
|
|
|
#ifndef _LINUX_NET_H
|
|
|
|
#define _LINUX_NET_H
|
|
|
|
|
|
|
|
#include <linux/wait.h>
|
|
|
|
#include <asm/socket.h>
|
|
|
|
|
|
|
|
struct poll_table_struct;
|
|
|
|
struct inode;
|
|
|
|
|
|
|
|
#define NPROTO 32 /* should be enough for now.. */
|
|
|
|
|
|
|
|
#define SYS_SOCKET 1 /* sys_socket(2) */
|
|
|
|
#define SYS_BIND 2 /* sys_bind(2) */
|
|
|
|
#define SYS_CONNECT 3 /* sys_connect(2) */
|
|
|
|
#define SYS_LISTEN 4 /* sys_listen(2) */
|
|
|
|
#define SYS_ACCEPT 5 /* sys_accept(2) */
|
|
|
|
#define SYS_GETSOCKNAME 6 /* sys_getsockname(2) */
|
|
|
|
#define SYS_GETPEERNAME 7 /* sys_getpeername(2) */
|
|
|
|
#define SYS_SOCKETPAIR 8 /* sys_socketpair(2) */
|
|
|
|
#define SYS_SEND 9 /* sys_send(2) */
|
|
|
|
#define SYS_RECV 10 /* sys_recv(2) */
|
|
|
|
#define SYS_SENDTO 11 /* sys_sendto(2) */
|
|
|
|
#define SYS_RECVFROM 12 /* sys_recvfrom(2) */
|
|
|
|
#define SYS_SHUTDOWN 13 /* sys_shutdown(2) */
|
|
|
|
#define SYS_SETSOCKOPT 14 /* sys_setsockopt(2) */
|
|
|
|
#define SYS_GETSOCKOPT 15 /* sys_getsockopt(2) */
|
|
|
|
#define SYS_SENDMSG 16 /* sys_sendmsg(2) */
|
|
|
|
#define SYS_RECVMSG 17 /* sys_recvmsg(2) */
|
|
|
|
|
|
|
|
typedef enum {
|
|
|
|
SS_FREE = 0, /* not allocated */
|
|
|
|
SS_UNCONNECTED, /* unconnected to any socket */
|
|
|
|
SS_CONNECTING, /* in process of connecting */
|
|
|
|
SS_CONNECTED, /* connected to socket */
|
|
|
|
SS_DISCONNECTING /* in process of disconnecting */
|
|
|
|
} socket_state;
|
|
|
|
|
|
|
|
#define __SO_ACCEPTCON (1 << 16) /* performed a listen */
|
|
|
|
|
|
|
|
#ifdef __KERNEL__
|
2006-04-25 07:46:09 -06:00
|
|
|
#include <linux/stringify.h>
|
2005-04-16 16:20:36 -06:00
|
|
|
|
|
|
|
#define SOCK_ASYNC_NOSPACE 0
|
|
|
|
#define SOCK_ASYNC_WAITDATA 1
|
|
|
|
#define SOCK_NOSPACE 2
|
|
|
|
#define SOCK_PASSCRED 3
|
[AF_UNIX]: Datagram getpeersec
This patch implements an API whereby an application can determine the
label of its peer's Unix datagram sockets via the auxiliary data mechanism of
recvmsg.
Patch purpose:
This patch enables a security-aware application to retrieve the
security context of the peer of a Unix datagram socket. The application
can then use this security context to determine the security context for
processing on behalf of the peer who sent the packet.
Patch design and implementation:
The design and implementation is very similar to the UDP case for INET
sockets. Basically we build upon the existing Unix domain socket API for
retrieving user credentials. Linux offers the API for obtaining user
credentials via ancillary messages (i.e., out of band/control messages
that are bundled together with a normal message). To retrieve the security
context, the application first indicates to the kernel such desire by
setting the SO_PASSSEC option via getsockopt. Then the application
retrieves the security context using the auxiliary data mechanism.
An example server application for Unix datagram socket should look like this:
toggle = 1;
toggle_len = sizeof(toggle);
setsockopt(sockfd, SOL_SOCKET, SO_PASSSEC, &toggle, &toggle_len);
recvmsg(sockfd, &msg_hdr, 0);
if (msg_hdr.msg_controllen > sizeof(struct cmsghdr)) {
cmsg_hdr = CMSG_FIRSTHDR(&msg_hdr);
if (cmsg_hdr->cmsg_len <= CMSG_LEN(sizeof(scontext)) &&
cmsg_hdr->cmsg_level == SOL_SOCKET &&
cmsg_hdr->cmsg_type == SCM_SECURITY) {
memcpy(&scontext, CMSG_DATA(cmsg_hdr), sizeof(scontext));
}
}
sock_setsockopt is enhanced with a new socket option SOCK_PASSSEC to allow
a server socket to receive security context of the peer.
Testing:
We have tested the patch by setting up Unix datagram client and server
applications. We verified that the server can retrieve the security context
using the auxiliary data mechanism of recvmsg.
Signed-off-by: Catherine Zhang <cxzhang@watson.ibm.com>
Acked-by: Acked-by: James Morris <jmorris@namei.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2006-06-29 13:27:47 -06:00
|
|
|
#define SOCK_PASSSEC 4
|
2005-04-16 16:20:36 -06:00
|
|
|
|
|
|
|
#ifndef ARCH_HAS_SOCKET_TYPES
|
2005-05-01 09:59:25 -06:00
|
|
|
/**
|
|
|
|
* enum sock_type - Socket types
|
|
|
|
* @SOCK_STREAM: stream (connection) socket
|
|
|
|
* @SOCK_DGRAM: datagram (conn.less) socket
|
|
|
|
* @SOCK_RAW: raw socket
|
|
|
|
* @SOCK_RDM: reliably-delivered message
|
|
|
|
* @SOCK_SEQPACKET: sequential packet socket
|
2005-11-07 02:01:05 -07:00
|
|
|
* @SOCK_DCCP: Datagram Congestion Control Protocol socket
|
2005-05-01 09:59:25 -06:00
|
|
|
* @SOCK_PACKET: linux specific way of getting packets at the dev level.
|
|
|
|
* For writing rarp and other similar things on the user level.
|
|
|
|
*
|
2005-04-16 16:20:36 -06:00
|
|
|
* When adding some new socket type please
|
|
|
|
* grep ARCH_HAS_SOCKET_TYPE include/asm-* /socket.h, at least MIPS
|
|
|
|
* overrides this enum for binary compat reasons.
|
|
|
|
*/
|
|
|
|
enum sock_type {
|
|
|
|
SOCK_STREAM = 1,
|
|
|
|
SOCK_DGRAM = 2,
|
|
|
|
SOCK_RAW = 3,
|
|
|
|
SOCK_RDM = 4,
|
|
|
|
SOCK_SEQPACKET = 5,
|
2005-08-09 21:14:34 -06:00
|
|
|
SOCK_DCCP = 6,
|
2005-04-16 16:20:36 -06:00
|
|
|
SOCK_PACKET = 10,
|
|
|
|
};
|
|
|
|
|
|
|
|
#define SOCK_MAX (SOCK_PACKET + 1)
|
|
|
|
|
|
|
|
#endif /* ARCH_HAS_SOCKET_TYPES */
|
|
|
|
|
|
|
|
/**
|
|
|
|
* struct socket - general BSD socket
|
2005-05-01 09:59:25 -06:00
|
|
|
* @state: socket state (%SS_CONNECTED, etc)
|
|
|
|
* @flags: socket flags (%SOCK_ASYNC_NOSPACE, etc)
|
|
|
|
* @ops: protocol specific socket operations
|
|
|
|
* @fasync_list: Asynchronous wake up list
|
|
|
|
* @file: File back pointer for gc
|
|
|
|
* @sk: internal networking protocol agnostic socket representation
|
|
|
|
* @wait: wait queue for several uses
|
|
|
|
* @type: socket type (%SOCK_STREAM, etc)
|
2005-04-16 16:20:36 -06:00
|
|
|
*/
|
|
|
|
struct socket {
|
|
|
|
socket_state state;
|
|
|
|
unsigned long flags;
|
2005-12-22 13:49:22 -07:00
|
|
|
const struct proto_ops *ops;
|
2005-04-16 16:20:36 -06:00
|
|
|
struct fasync_struct *fasync_list;
|
|
|
|
struct file *file;
|
|
|
|
struct sock *sk;
|
|
|
|
wait_queue_head_t wait;
|
|
|
|
short type;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct vm_area_struct;
|
|
|
|
struct page;
|
|
|
|
struct kiocb;
|
|
|
|
struct sockaddr;
|
|
|
|
struct msghdr;
|
|
|
|
struct module;
|
|
|
|
|
|
|
|
struct proto_ops {
|
|
|
|
int family;
|
|
|
|
struct module *owner;
|
|
|
|
int (*release) (struct socket *sock);
|
|
|
|
int (*bind) (struct socket *sock,
|
|
|
|
struct sockaddr *myaddr,
|
|
|
|
int sockaddr_len);
|
|
|
|
int (*connect) (struct socket *sock,
|
|
|
|
struct sockaddr *vaddr,
|
|
|
|
int sockaddr_len, int flags);
|
|
|
|
int (*socketpair)(struct socket *sock1,
|
|
|
|
struct socket *sock2);
|
|
|
|
int (*accept) (struct socket *sock,
|
|
|
|
struct socket *newsock, int flags);
|
|
|
|
int (*getname) (struct socket *sock,
|
|
|
|
struct sockaddr *addr,
|
|
|
|
int *sockaddr_len, int peer);
|
|
|
|
unsigned int (*poll) (struct file *file, struct socket *sock,
|
|
|
|
struct poll_table_struct *wait);
|
|
|
|
int (*ioctl) (struct socket *sock, unsigned int cmd,
|
|
|
|
unsigned long arg);
|
2006-03-22 00:58:08 -07:00
|
|
|
int (*compat_ioctl) (struct socket *sock, unsigned int cmd,
|
|
|
|
unsigned long arg);
|
2005-04-16 16:20:36 -06:00
|
|
|
int (*listen) (struct socket *sock, int len);
|
|
|
|
int (*shutdown) (struct socket *sock, int flags);
|
|
|
|
int (*setsockopt)(struct socket *sock, int level,
|
|
|
|
int optname, char __user *optval, int optlen);
|
|
|
|
int (*getsockopt)(struct socket *sock, int level,
|
|
|
|
int optname, char __user *optval, int __user *optlen);
|
2006-03-20 23:45:21 -07:00
|
|
|
int (*compat_setsockopt)(struct socket *sock, int level,
|
|
|
|
int optname, char __user *optval, int optlen);
|
|
|
|
int (*compat_getsockopt)(struct socket *sock, int level,
|
|
|
|
int optname, char __user *optval, int __user *optlen);
|
2005-04-16 16:20:36 -06:00
|
|
|
int (*sendmsg) (struct kiocb *iocb, struct socket *sock,
|
|
|
|
struct msghdr *m, size_t total_len);
|
|
|
|
int (*recvmsg) (struct kiocb *iocb, struct socket *sock,
|
|
|
|
struct msghdr *m, size_t total_len,
|
|
|
|
int flags);
|
|
|
|
int (*mmap) (struct file *file, struct socket *sock,
|
|
|
|
struct vm_area_struct * vma);
|
|
|
|
ssize_t (*sendpage) (struct socket *sock, struct page *page,
|
|
|
|
int offset, size_t size, int flags);
|
|
|
|
};
|
|
|
|
|
|
|
|
struct net_proto_family {
|
|
|
|
int family;
|
|
|
|
int (*create)(struct socket *sock, int protocol);
|
|
|
|
/* These are counters for the number of different methods of
|
|
|
|
each we support */
|
|
|
|
short authentication;
|
|
|
|
short encryption;
|
|
|
|
short encrypt_net;
|
|
|
|
struct module *owner;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct iovec;
|
|
|
|
struct kvec;
|
|
|
|
|
|
|
|
extern int sock_wake_async(struct socket *sk, int how, int band);
|
|
|
|
extern int sock_register(struct net_proto_family *fam);
|
|
|
|
extern int sock_unregister(int family);
|
|
|
|
extern int sock_create(int family, int type, int proto,
|
|
|
|
struct socket **res);
|
|
|
|
extern int sock_create_kern(int family, int type, int proto,
|
|
|
|
struct socket **res);
|
|
|
|
extern int sock_create_lite(int family, int type, int proto,
|
|
|
|
struct socket **res);
|
|
|
|
extern void sock_release(struct socket *sock);
|
|
|
|
extern int sock_sendmsg(struct socket *sock, struct msghdr *msg,
|
|
|
|
size_t len);
|
|
|
|
extern int sock_recvmsg(struct socket *sock, struct msghdr *msg,
|
|
|
|
size_t size, int flags);
|
|
|
|
extern int sock_map_fd(struct socket *sock);
|
|
|
|
extern struct socket *sockfd_lookup(int fd, int *err);
|
|
|
|
#define sockfd_put(sock) fput(sock->file)
|
|
|
|
extern int net_ratelimit(void);
|
|
|
|
extern unsigned long net_random(void);
|
|
|
|
extern void net_srandom(unsigned long);
|
|
|
|
extern void net_random_init(void);
|
|
|
|
|
|
|
|
extern int kernel_sendmsg(struct socket *sock, struct msghdr *msg,
|
|
|
|
struct kvec *vec, size_t num, size_t len);
|
|
|
|
extern int kernel_recvmsg(struct socket *sock, struct msghdr *msg,
|
|
|
|
struct kvec *vec, size_t num,
|
|
|
|
size_t len, int flags);
|
|
|
|
|
|
|
|
#ifndef CONFIG_SMP
|
|
|
|
#define SOCKOPS_WRAPPED(name) name
|
|
|
|
#define SOCKOPS_WRAP(name, fam)
|
|
|
|
#else
|
|
|
|
|
|
|
|
#define SOCKOPS_WRAPPED(name) __unlocked_##name
|
|
|
|
|
|
|
|
#define SOCKCALL_WRAP(name, call, parms, args) \
|
|
|
|
static int __lock_##name##_##call parms \
|
|
|
|
{ \
|
|
|
|
int ret; \
|
|
|
|
lock_kernel(); \
|
|
|
|
ret = __unlocked_##name##_ops.call args ;\
|
|
|
|
unlock_kernel(); \
|
|
|
|
return ret; \
|
|
|
|
}
|
|
|
|
|
|
|
|
#define SOCKCALL_UWRAP(name, call, parms, args) \
|
|
|
|
static unsigned int __lock_##name##_##call parms \
|
|
|
|
{ \
|
|
|
|
int ret; \
|
|
|
|
lock_kernel(); \
|
|
|
|
ret = __unlocked_##name##_ops.call args ;\
|
|
|
|
unlock_kernel(); \
|
|
|
|
return ret; \
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#define SOCKOPS_WRAP(name, fam) \
|
|
|
|
SOCKCALL_WRAP(name, release, (struct socket *sock), (sock)) \
|
|
|
|
SOCKCALL_WRAP(name, bind, (struct socket *sock, struct sockaddr *uaddr, int addr_len), \
|
|
|
|
(sock, uaddr, addr_len)) \
|
|
|
|
SOCKCALL_WRAP(name, connect, (struct socket *sock, struct sockaddr * uaddr, \
|
|
|
|
int addr_len, int flags), \
|
|
|
|
(sock, uaddr, addr_len, flags)) \
|
|
|
|
SOCKCALL_WRAP(name, socketpair, (struct socket *sock1, struct socket *sock2), \
|
|
|
|
(sock1, sock2)) \
|
|
|
|
SOCKCALL_WRAP(name, accept, (struct socket *sock, struct socket *newsock, \
|
|
|
|
int flags), (sock, newsock, flags)) \
|
|
|
|
SOCKCALL_WRAP(name, getname, (struct socket *sock, struct sockaddr *uaddr, \
|
|
|
|
int *addr_len, int peer), (sock, uaddr, addr_len, peer)) \
|
|
|
|
SOCKCALL_UWRAP(name, poll, (struct file *file, struct socket *sock, struct poll_table_struct *wait), \
|
|
|
|
(file, sock, wait)) \
|
|
|
|
SOCKCALL_WRAP(name, ioctl, (struct socket *sock, unsigned int cmd, \
|
|
|
|
unsigned long arg), (sock, cmd, arg)) \
|
2006-03-22 00:58:08 -07:00
|
|
|
SOCKCALL_WRAP(name, compat_ioctl, (struct socket *sock, unsigned int cmd, \
|
|
|
|
unsigned long arg), (sock, cmd, arg)) \
|
2005-04-16 16:20:36 -06:00
|
|
|
SOCKCALL_WRAP(name, listen, (struct socket *sock, int len), (sock, len)) \
|
|
|
|
SOCKCALL_WRAP(name, shutdown, (struct socket *sock, int flags), (sock, flags)) \
|
|
|
|
SOCKCALL_WRAP(name, setsockopt, (struct socket *sock, int level, int optname, \
|
|
|
|
char __user *optval, int optlen), (sock, level, optname, optval, optlen)) \
|
|
|
|
SOCKCALL_WRAP(name, getsockopt, (struct socket *sock, int level, int optname, \
|
|
|
|
char __user *optval, int __user *optlen), (sock, level, optname, optval, optlen)) \
|
|
|
|
SOCKCALL_WRAP(name, sendmsg, (struct kiocb *iocb, struct socket *sock, struct msghdr *m, size_t len), \
|
|
|
|
(iocb, sock, m, len)) \
|
|
|
|
SOCKCALL_WRAP(name, recvmsg, (struct kiocb *iocb, struct socket *sock, struct msghdr *m, size_t len, int flags), \
|
|
|
|
(iocb, sock, m, len, flags)) \
|
|
|
|
SOCKCALL_WRAP(name, mmap, (struct file *file, struct socket *sock, struct vm_area_struct *vma), \
|
|
|
|
(file, sock, vma)) \
|
|
|
|
\
|
2005-12-22 13:49:22 -07:00
|
|
|
static const struct proto_ops name##_ops = { \
|
2005-04-16 16:20:36 -06:00
|
|
|
.family = fam, \
|
|
|
|
.owner = THIS_MODULE, \
|
|
|
|
.release = __lock_##name##_release, \
|
|
|
|
.bind = __lock_##name##_bind, \
|
|
|
|
.connect = __lock_##name##_connect, \
|
|
|
|
.socketpair = __lock_##name##_socketpair, \
|
|
|
|
.accept = __lock_##name##_accept, \
|
|
|
|
.getname = __lock_##name##_getname, \
|
|
|
|
.poll = __lock_##name##_poll, \
|
|
|
|
.ioctl = __lock_##name##_ioctl, \
|
2006-03-22 00:58:08 -07:00
|
|
|
.compat_ioctl = __lock_##name##_compat_ioctl, \
|
2005-04-16 16:20:36 -06:00
|
|
|
.listen = __lock_##name##_listen, \
|
|
|
|
.shutdown = __lock_##name##_shutdown, \
|
|
|
|
.setsockopt = __lock_##name##_setsockopt, \
|
|
|
|
.getsockopt = __lock_##name##_getsockopt, \
|
|
|
|
.sendmsg = __lock_##name##_sendmsg, \
|
|
|
|
.recvmsg = __lock_##name##_recvmsg, \
|
|
|
|
.mmap = __lock_##name##_mmap, \
|
|
|
|
};
|
2006-03-22 00:58:08 -07:00
|
|
|
|
2005-04-16 16:20:36 -06:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#define MODULE_ALIAS_NETPROTO(proto) \
|
|
|
|
MODULE_ALIAS("net-pf-" __stringify(proto))
|
|
|
|
|
2005-08-09 20:40:55 -06:00
|
|
|
#define MODULE_ALIAS_NET_PF_PROTO(pf, proto) \
|
|
|
|
MODULE_ALIAS("net-pf-" __stringify(pf) "-proto-" __stringify(proto))
|
|
|
|
|
2005-08-15 23:18:02 -06:00
|
|
|
#ifdef CONFIG_SYSCTL
|
|
|
|
#include <linux/sysctl.h>
|
|
|
|
extern ctl_table net_table[];
|
|
|
|
extern int net_msg_cost;
|
|
|
|
extern int net_msg_burst;
|
|
|
|
#endif
|
|
|
|
|
2005-04-16 16:20:36 -06:00
|
|
|
#endif /* __KERNEL__ */
|
|
|
|
#endif /* _LINUX_NET_H */
|