mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-11-11 21:38:32 +08:00
b7058842c9
This provides safety against negative optlen at the type level instead of depending upon (sometimes non-trivial) checks against this sprinkled all over the the place, in each and every implementation. Based upon work done by Arjan van de Ven and feedback from Linus Torvalds. Signed-off-by: David S. Miller <davem@davemloft.net>
35 lines
1.3 KiB
C
35 lines
1.3 KiB
C
#ifndef _UDP4_IMPL_H
|
|
#define _UDP4_IMPL_H
|
|
#include <net/udp.h>
|
|
#include <net/udplite.h>
|
|
#include <net/protocol.h>
|
|
#include <net/inet_common.h>
|
|
|
|
extern int __udp4_lib_rcv(struct sk_buff *, struct udp_table *, int );
|
|
extern void __udp4_lib_err(struct sk_buff *, u32, struct udp_table *);
|
|
|
|
extern int udp_v4_get_port(struct sock *sk, unsigned short snum);
|
|
|
|
extern int udp_setsockopt(struct sock *sk, int level, int optname,
|
|
char __user *optval, unsigned int optlen);
|
|
extern int udp_getsockopt(struct sock *sk, int level, int optname,
|
|
char __user *optval, int __user *optlen);
|
|
|
|
#ifdef CONFIG_COMPAT
|
|
extern int compat_udp_setsockopt(struct sock *sk, int level, int optname,
|
|
char __user *optval, unsigned int optlen);
|
|
extern int compat_udp_getsockopt(struct sock *sk, int level, int optname,
|
|
char __user *optval, int __user *optlen);
|
|
#endif
|
|
extern int udp_recvmsg(struct kiocb *iocb, struct sock *sk, struct msghdr *msg,
|
|
size_t len, int noblock, int flags, int *addr_len);
|
|
extern int udp_sendpage(struct sock *sk, struct page *page, int offset,
|
|
size_t size, int flags);
|
|
extern int udp_queue_rcv_skb(struct sock * sk, struct sk_buff *skb);
|
|
extern void udp_destroy_sock(struct sock *sk);
|
|
|
|
#ifdef CONFIG_PROC_FS
|
|
extern int udp4_seq_show(struct seq_file *seq, void *v);
|
|
#endif
|
|
#endif /* _UDP4_IMPL_H */
|