Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 1 | /* SPDX-License-Identifier: GPL-2.0 */ |
| 2 | #ifndef _INET_COMMON_H |
| 3 | #define _INET_COMMON_H |
| 4 | |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame] | 5 | #include <linux/indirect_call_wrapper.h> |
| 6 | |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 7 | extern const struct proto_ops inet_stream_ops; |
| 8 | extern const struct proto_ops inet_dgram_ops; |
| 9 | |
| 10 | /* |
| 11 | * INET4 prototypes used by INET6 |
| 12 | */ |
| 13 | |
| 14 | struct msghdr; |
| 15 | struct sock; |
| 16 | struct sockaddr; |
| 17 | struct socket; |
| 18 | |
| 19 | int inet_release(struct socket *sock); |
| 20 | int inet_stream_connect(struct socket *sock, struct sockaddr *uaddr, |
| 21 | int addr_len, int flags); |
| 22 | int __inet_stream_connect(struct socket *sock, struct sockaddr *uaddr, |
| 23 | int addr_len, int flags, int is_sendmsg); |
| 24 | int inet_dgram_connect(struct socket *sock, struct sockaddr *uaddr, |
| 25 | int addr_len, int flags); |
| 26 | int inet_accept(struct socket *sock, struct socket *newsock, int flags, |
| 27 | bool kern); |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame] | 28 | int inet_send_prepare(struct sock *sk); |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 29 | int inet_sendmsg(struct socket *sock, struct msghdr *msg, size_t size); |
| 30 | ssize_t inet_sendpage(struct socket *sock, struct page *page, int offset, |
| 31 | size_t size, int flags); |
| 32 | int inet_recvmsg(struct socket *sock, struct msghdr *msg, size_t size, |
| 33 | int flags); |
| 34 | int inet_shutdown(struct socket *sock, int how); |
| 35 | int inet_listen(struct socket *sock, int backlog); |
| 36 | void inet_sock_destruct(struct sock *sk); |
| 37 | int inet_bind(struct socket *sock, struct sockaddr *uaddr, int addr_len); |
Olivier Deprez | 157378f | 2022-04-04 15:47:50 +0200 | [diff] [blame^] | 38 | /* Don't allocate port at this moment, defer to connect. */ |
| 39 | #define BIND_FORCE_ADDRESS_NO_PORT (1 << 0) |
| 40 | /* Grab and release socket lock. */ |
| 41 | #define BIND_WITH_LOCK (1 << 1) |
| 42 | /* Called from BPF program. */ |
| 43 | #define BIND_FROM_BPF (1 << 2) |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 44 | int __inet_bind(struct sock *sk, struct sockaddr *uaddr, int addr_len, |
Olivier Deprez | 157378f | 2022-04-04 15:47:50 +0200 | [diff] [blame^] | 45 | u32 flags); |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 46 | int inet_getname(struct socket *sock, struct sockaddr *uaddr, |
| 47 | int peer); |
| 48 | int inet_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg); |
| 49 | int inet_ctl_sock_create(struct sock **sk, unsigned short family, |
| 50 | unsigned short type, unsigned char protocol, |
| 51 | struct net *net); |
| 52 | int inet_recv_error(struct sock *sk, struct msghdr *msg, int len, |
| 53 | int *addr_len); |
| 54 | |
| 55 | struct sk_buff *inet_gro_receive(struct list_head *head, struct sk_buff *skb); |
| 56 | int inet_gro_complete(struct sk_buff *skb, int nhoff); |
| 57 | struct sk_buff *inet_gso_segment(struct sk_buff *skb, |
| 58 | netdev_features_t features); |
| 59 | |
| 60 | static inline void inet_ctl_sock_destroy(struct sock *sk) |
| 61 | { |
| 62 | if (sk) |
| 63 | sock_release(sk->sk_socket); |
| 64 | } |
| 65 | |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame] | 66 | #define indirect_call_gro_receive(f2, f1, cb, head, skb) \ |
| 67 | ({ \ |
| 68 | unlikely(gro_recursion_inc_test(skb)) ? \ |
| 69 | NAPI_GRO_CB(skb)->flush |= 1, NULL : \ |
| 70 | INDIRECT_CALL_2(cb, f2, f1, head, skb); \ |
| 71 | }) |
| 72 | |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 73 | #endif |