mirror of
https://github.com/edk2-porting/linux-next.git
synced 2024-12-27 22:53:55 +08:00
b03afaa82e
This is mostly to prepare for cleaning up the callers, as bpfilter by design can't handle kernel pointers. Signed-off-by: Christoph Hellwig <hch@lst.de> Signed-off-by: David S. Miller <davem@davemloft.net>
26 lines
791 B
C
26 lines
791 B
C
/* SPDX-License-Identifier: GPL-2.0 */
|
|
#ifndef _LINUX_BPFILTER_H
|
|
#define _LINUX_BPFILTER_H
|
|
|
|
#include <uapi/linux/bpfilter.h>
|
|
#include <linux/usermode_driver.h>
|
|
#include <linux/sockptr.h>
|
|
|
|
struct sock;
|
|
int bpfilter_ip_set_sockopt(struct sock *sk, int optname, sockptr_t optval,
|
|
unsigned int optlen);
|
|
int bpfilter_ip_get_sockopt(struct sock *sk, int optname, char __user *optval,
|
|
int __user *optlen);
|
|
void bpfilter_umh_cleanup(struct umd_info *info);
|
|
|
|
struct bpfilter_umh_ops {
|
|
struct umd_info info;
|
|
/* since ip_getsockopt() can run in parallel, serialize access to umh */
|
|
struct mutex lock;
|
|
int (*sockopt)(struct sock *sk, int optname, sockptr_t optval,
|
|
unsigned int optlen, bool is_set);
|
|
int (*start)(void);
|
|
};
|
|
extern struct bpfilter_umh_ops bpfilter_ops;
|
|
#endif
|