1 /* SPDX-License-Identifier: GPL-2.0+ WITH Linux-syscall-note */ 2 /* 3 * INET An implementation of the TCP/IP protocol suite for the LINUX 4 * operating system. INET is implemented using the BSD Socket 5 * interface as the means of communication with the user level. 6 * 7 * Definitions for the TCP protocol. 8 * 9 * Version: @(#)tcp.h 1.0.2 04/28/93 10 * 11 * Author: Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG> 12 * 13 * This program is free software; you can redistribute it and/or 14 * modify it under the terms of the GNU General Public License 15 * as published by the Free Software Foundation; either version 16 * 2 of the License, or (at your option) any later version. 17 */ 18 #ifndef _UAPI_LINUX_TCP_H 19 #define _UAPI_LINUX_TCP_H 20 21 #include <linux/types.h> 22 #include <asm/byteorder.h> 23 #include <linux/socket.h> 24 25 struct tcphdr { 26 __be16 source; 27 __be16 dest; 28 __be32 seq; 29 __be32 ack_seq; 30 #if defined(__LITTLE_ENDIAN_BITFIELD) 31 __u16 ae:1, 32 res1:3, 33 doff:4, 34 fin:1, 35 syn:1, 36 rst:1, 37 psh:1, 38 ack:1, 39 urg:1, 40 ece:1, 41 cwr:1; 42 #elif defined(__BIG_ENDIAN_BITFIELD) 43 __u16 doff:4, 44 res1:3, 45 ae:1, 46 cwr:1, 47 ece:1, 48 urg:1, 49 ack:1, 50 psh:1, 51 rst:1, 52 syn:1, 53 fin:1; 54 #else 55 #error "Adjust your <asm/byteorder.h> defines" 56 #endif 57 __be16 window; 58 __sum16 check; 59 __be16 urg_ptr; 60 }; 61 62 /* 63 * The union cast uses a gcc extension to avoid aliasing problems 64 * (union is compatible to any of its members) 65 * This means this part of the code is -fstrict-aliasing safe now. 66 */ 67 union tcp_word_hdr { 68 struct tcphdr hdr; 69 __be32 words[5]; 70 }; 71 72 #define tcp_flag_word(tp) (((union tcp_word_hdr *)(tp))->words[3]) 73 74 enum { 75 TCP_FLAG_AE = __constant_cpu_to_be32(0x01000000), 76 TCP_FLAG_CWR = __constant_cpu_to_be32(0x00800000), 77 TCP_FLAG_ECE = __constant_cpu_to_be32(0x00400000), 78 TCP_FLAG_URG = __constant_cpu_to_be32(0x00200000), 79 TCP_FLAG_ACK = __constant_cpu_to_be32(0x00100000), 80 TCP_FLAG_PSH = __constant_cpu_to_be32(0x00080000), 81 TCP_FLAG_RST = __constant_cpu_to_be32(0x00040000), 82 TCP_FLAG_SYN = __constant_cpu_to_be32(0x00020000), 83 TCP_FLAG_FIN = __constant_cpu_to_be32(0x00010000), 84 TCP_RESERVED_BITS = __constant_cpu_to_be32(0x0E000000), 85 TCP_DATA_OFFSET = __constant_cpu_to_be32(0xF0000000) 86 }; 87 88 /* 89 * TCP general constants 90 */ 91 #define TCP_MSS_DEFAULT 536U /* IPv4 (RFC1122, RFC2581) */ 92 #define TCP_MSS_DESIRED 1220U /* IPv6 (tunneled), EDNS0 (RFC3226) */ 93 94 /* TCP socket options */ 95 #define TCP_NODELAY 1 /* Turn off Nagle's algorithm. */ 96 #define TCP_MAXSEG 2 /* Limit MSS */ 97 #define TCP_CORK 3 /* Never send partially complete segments */ 98 #define TCP_KEEPIDLE 4 /* Start keeplives after this period */ 99 #define TCP_KEEPINTVL 5 /* Interval between keepalives */ 100 #define TCP_KEEPCNT 6 /* Number of keepalives before death */ 101 #define TCP_SYNCNT 7 /* Number of SYN retransmits */ 102 #define TCP_LINGER2 8 /* Life time of orphaned FIN-WAIT-2 state */ 103 #define TCP_DEFER_ACCEPT 9 /* Wake up listener only when data arrive */ 104 #define TCP_WINDOW_CLAMP 10 /* Bound advertised window */ 105 #define TCP_INFO 11 /* Information about this connection. */ 106 #define TCP_QUICKACK 12 /* Block/reenable quick acks */ 107 #define TCP_CONGESTION 13 /* Congestion control algorithm */ 108 #define TCP_MD5SIG 14 /* TCP MD5 Signature (RFC2385) */ 109 #define TCP_THIN_LINEAR_TIMEOUTS 16 /* Use linear timeouts for thin streams*/ 110 #define TCP_THIN_DUPACK 17 /* Fast retrans. after 1 dupack */ 111 #define TCP_USER_TIMEOUT 18 /* How long for loss retry before timeout */ 112 #define TCP_REPAIR 19 /* TCP sock is under repair right now */ 113 #define TCP_REPAIR_QUEUE 20 114 #define TCP_QUEUE_SEQ 21 115 #define TCP_REPAIR_OPTIONS 22 116 #define TCP_FASTOPEN 23 /* Enable FastOpen on listeners */ 117 #define TCP_TIMESTAMP 24 118 #define TCP_NOTSENT_LOWAT 25 /* limit number of unsent bytes in write queue */ 119 #define TCP_CC_INFO 26 /* Get Congestion Control (optional) info */ 120 #define TCP_SAVE_SYN 27 /* Record SYN headers for new connections */ 121 #define TCP_SAVED_SYN 28 /* Get SYN headers recorded for connection */ 122 #define TCP_REPAIR_WINDOW 29 /* Get/set window parameters */ 123 #define TCP_FASTOPEN_CONNECT 30 /* Attempt FastOpen with connect */ 124 #define TCP_ULP 31 /* Attach a ULP to a TCP connection */ 125 #define TCP_MD5SIG_EXT 32 /* TCP MD5 Signature with extensions */ 126 #define TCP_FASTOPEN_KEY 33 /* Set the key for Fast Open (cookie) */ 127 #define TCP_FASTOPEN_NO_COOKIE 34 /* Enable TFO without a TFO cookie */ 128 #define TCP_ZEROCOPY_RECEIVE 35 129 #define TCP_INQ 36 /* Notify bytes available to read as a cmsg on read */ 130 131 #define TCP_CM_INQ TCP_INQ 132 133 #define TCP_TX_DELAY 37 /* delay outgoing packets by XX usec */ 134 135 #define TCP_AO_ADD_KEY 38 /* Add/Set MKT */ 136 #define TCP_AO_DEL_KEY 39 /* Delete MKT */ 137 #define TCP_AO_INFO 40 /* Set/list TCP-AO per-socket options */ 138 #define TCP_AO_GET_KEYS 41 /* List MKT(s) */ 139 #define TCP_AO_REPAIR 42 /* Get/Set SNEs and ISNs */ 140 141 #define TCP_IS_MPTCP 43 /* Is MPTCP being used? */ 142 #define TCP_RTO_MAX_MS 44 /* max rto time in ms */ 143 #define TCP_RTO_MIN_US 45 /* min rto time in us */ 144 #define TCP_DELACK_MAX_US 46 /* max delayed ack time in us */ 145 146 #define TCP_REPAIR_ON 1 147 #define TCP_REPAIR_OFF 0 148 #define TCP_REPAIR_OFF_NO_WP -1 /* Turn off without window probes */ 149 150 struct tcp_repair_opt { 151 __u32 opt_code; 152 __u32 opt_val; 153 }; 154 155 struct tcp_repair_window { 156 __u32 snd_wl1; 157 __u32 snd_wnd; 158 __u32 max_window; 159 160 __u32 rcv_wnd; 161 __u32 rcv_wup; 162 }; 163 164 enum { 165 TCP_NO_QUEUE, 166 TCP_RECV_QUEUE, 167 TCP_SEND_QUEUE, 168 TCP_QUEUES_NR, 169 }; 170 171 /* why fastopen failed from client perspective */ 172 enum tcp_fastopen_client_fail { 173 TFO_STATUS_UNSPEC, /* catch-all */ 174 TFO_COOKIE_UNAVAILABLE, /* if not in TFO_CLIENT_NO_COOKIE mode */ 175 TFO_DATA_NOT_ACKED, /* SYN-ACK did not ack SYN data */ 176 TFO_SYN_RETRANSMITTED, /* SYN-ACK did not ack SYN data after timeout */ 177 }; 178 179 /* for TCP_INFO socket option */ 180 #define TCPI_OPT_TIMESTAMPS 1 181 #define TCPI_OPT_SACK 2 182 #define TCPI_OPT_WSCALE 4 183 #define TCPI_OPT_ECN 8 /* ECN was negociated at TCP session init */ 184 #define TCPI_OPT_ECN_SEEN 16 /* we received at least one packet with ECT */ 185 #define TCPI_OPT_SYN_DATA 32 /* SYN-ACK acked data in SYN sent or rcvd */ 186 #define TCPI_OPT_USEC_TS 64 /* usec timestamps */ 187 #define TCPI_OPT_TFO_CHILD 128 /* child from a Fast Open option on SYN */ 188 189 /* 190 * Sender's congestion state indicating normal or abnormal situations 191 * in the last round of packets sent. The state is driven by the ACK 192 * information and timer events. 193 */ 194 enum tcp_ca_state { 195 /* 196 * Nothing bad has been observed recently. 197 * No apparent reordering, packet loss, or ECN marks. 198 */ 199 TCP_CA_Open = 0, 200 #define TCPF_CA_Open (1<<TCP_CA_Open) 201 /* 202 * The sender enters disordered state when it has received DUPACKs or 203 * SACKs in the last round of packets sent. This could be due to packet 204 * loss or reordering but needs further information to confirm packets 205 * have been lost. 206 */ 207 TCP_CA_Disorder = 1, 208 #define TCPF_CA_Disorder (1<<TCP_CA_Disorder) 209 /* 210 * The sender enters Congestion Window Reduction (CWR) state when it 211 * has received ACKs with ECN-ECE marks, or has experienced congestion 212 * or packet discard on the sender host (e.g. qdisc). 213 */ 214 TCP_CA_CWR = 2, 215 #define TCPF_CA_CWR (1<<TCP_CA_CWR) 216 /* 217 * The sender is in fast recovery and retransmitting lost packets, 218 * typically triggered by ACK events. 219 */ 220 TCP_CA_Recovery = 3, 221 #define TCPF_CA_Recovery (1<<TCP_CA_Recovery) 222 /* 223 * The sender is in loss recovery triggered by retransmission timeout. 224 */ 225 TCP_CA_Loss = 4 226 #define TCPF_CA_Loss (1<<TCP_CA_Loss) 227 }; 228 229 /* Values for tcpi_ecn_mode after negotiation */ 230 #define TCPI_ECN_MODE_DISABLED 0x0 231 #define TCPI_ECN_MODE_RFC3168 0x1 232 #define TCPI_ECN_MODE_ACCECN 0x2 233 #define TCPI_ECN_MODE_PENDING 0x3 234 235 /* Values for accecn_opt_seen */ 236 #define TCP_ACCECN_OPT_NOT_SEEN 0x0 237 #define TCP_ACCECN_OPT_EMPTY_SEEN 0x1 238 #define TCP_ACCECN_OPT_COUNTER_SEEN 0x2 239 #define TCP_ACCECN_OPT_FAIL_SEEN 0x3 240 241 /* Values for accecn_fail_mode */ 242 #define TCP_ACCECN_ACE_FAIL_SEND BIT(0) 243 #define TCP_ACCECN_ACE_FAIL_RECV BIT(1) 244 #define TCP_ACCECN_OPT_FAIL_SEND BIT(2) 245 #define TCP_ACCECN_OPT_FAIL_RECV BIT(3) 246 247 struct tcp_info { 248 __u8 tcpi_state; 249 __u8 tcpi_ca_state; 250 __u8 tcpi_retransmits; 251 __u8 tcpi_probes; 252 __u8 tcpi_backoff; 253 __u8 tcpi_options; 254 __u8 tcpi_snd_wscale : 4, tcpi_rcv_wscale : 4; 255 __u8 tcpi_delivery_rate_app_limited:1, tcpi_fastopen_client_fail:2; 256 257 __u32 tcpi_rto; 258 __u32 tcpi_ato; 259 __u32 tcpi_snd_mss; 260 __u32 tcpi_rcv_mss; 261 262 __u32 tcpi_unacked; 263 __u32 tcpi_sacked; 264 __u32 tcpi_lost; 265 __u32 tcpi_retrans; 266 __u32 tcpi_fackets; 267 268 /* Times. */ 269 __u32 tcpi_last_data_sent; 270 __u32 tcpi_last_ack_sent; /* Not remembered, sorry. */ 271 __u32 tcpi_last_data_recv; 272 __u32 tcpi_last_ack_recv; 273 274 /* Metrics. */ 275 __u32 tcpi_pmtu; 276 __u32 tcpi_rcv_ssthresh; 277 __u32 tcpi_rtt; 278 __u32 tcpi_rttvar; 279 __u32 tcpi_snd_ssthresh; 280 __u32 tcpi_snd_cwnd; 281 __u32 tcpi_advmss; 282 __u32 tcpi_reordering; 283 284 __u32 tcpi_rcv_rtt; 285 __u32 tcpi_rcv_space; 286 287 __u32 tcpi_total_retrans; 288 289 __u64 tcpi_pacing_rate; 290 __u64 tcpi_max_pacing_rate; 291 __u64 tcpi_bytes_acked; /* RFC4898 tcpEStatsAppHCThruOctetsAcked */ 292 __u64 tcpi_bytes_received; /* RFC4898 tcpEStatsAppHCThruOctetsReceived */ 293 __u32 tcpi_segs_out; /* RFC4898 tcpEStatsPerfSegsOut */ 294 __u32 tcpi_segs_in; /* RFC4898 tcpEStatsPerfSegsIn */ 295 296 __u32 tcpi_notsent_bytes; 297 __u32 tcpi_min_rtt; 298 __u32 tcpi_data_segs_in; /* RFC4898 tcpEStatsDataSegsIn */ 299 __u32 tcpi_data_segs_out; /* RFC4898 tcpEStatsDataSegsOut */ 300 301 __u64 tcpi_delivery_rate; 302 303 __u64 tcpi_busy_time; /* Time (usec) busy sending data */ 304 __u64 tcpi_rwnd_limited; /* Time (usec) limited by receive window */ 305 __u64 tcpi_sndbuf_limited; /* Time (usec) limited by send buffer */ 306 307 __u32 tcpi_delivered; 308 __u32 tcpi_delivered_ce; 309 310 __u64 tcpi_bytes_sent; /* RFC4898 tcpEStatsPerfHCDataOctetsOut */ 311 __u64 tcpi_bytes_retrans; /* RFC4898 tcpEStatsPerfOctetsRetrans */ 312 __u32 tcpi_dsack_dups; /* RFC4898 tcpEStatsStackDSACKDups */ 313 __u32 tcpi_reord_seen; /* reordering events seen */ 314 315 __u32 tcpi_rcv_ooopack; /* Out-of-order packets received */ 316 317 __u32 tcpi_snd_wnd; /* peer's advertised receive window after 318 * scaling (bytes) 319 */ 320 __u32 tcpi_rcv_wnd; /* local advertised receive window after 321 * scaling (bytes) 322 */ 323 324 __u32 tcpi_rehash; /* PLB or timeout triggered rehash attempts */ 325 326 __u16 tcpi_total_rto; /* Total number of RTO timeouts, including 327 * SYN/SYN-ACK and recurring timeouts. 328 */ 329 __u16 tcpi_total_rto_recoveries; /* Total number of RTO 330 * recoveries, including any 331 * unfinished recovery. 332 */ 333 __u32 tcpi_total_rto_time; /* Total time spent in RTO recoveries 334 * in milliseconds, including any 335 * unfinished recovery. 336 */ 337 __u32 tcpi_received_ce; /* # of CE marked segments received */ 338 __u32 tcpi_delivered_e1_bytes; /* Accurate ECN byte counters */ 339 __u32 tcpi_delivered_e0_bytes; 340 __u32 tcpi_delivered_ce_bytes; 341 __u32 tcpi_received_e1_bytes; 342 __u32 tcpi_received_e0_bytes; 343 __u32 tcpi_received_ce_bytes; 344 __u32 tcpi_ecn_mode:2, 345 tcpi_accecn_opt_seen:2, 346 tcpi_accecn_fail_mode:4, 347 tcpi_options2:24; 348 }; 349 350 /* netlink attributes types for SCM_TIMESTAMPING_OPT_STATS */ 351 enum { 352 TCP_NLA_PAD, 353 TCP_NLA_BUSY, /* Time (usec) busy sending data */ 354 TCP_NLA_RWND_LIMITED, /* Time (usec) limited by receive window */ 355 TCP_NLA_SNDBUF_LIMITED, /* Time (usec) limited by send buffer */ 356 TCP_NLA_DATA_SEGS_OUT, /* Data pkts sent including retransmission */ 357 TCP_NLA_TOTAL_RETRANS, /* Data pkts retransmitted */ 358 TCP_NLA_PACING_RATE, /* Pacing rate in bytes per second */ 359 TCP_NLA_DELIVERY_RATE, /* Delivery rate in bytes per second */ 360 TCP_NLA_SND_CWND, /* Sending congestion window */ 361 TCP_NLA_REORDERING, /* Reordering metric */ 362 TCP_NLA_MIN_RTT, /* minimum RTT */ 363 TCP_NLA_RECUR_RETRANS, /* Recurring retransmits for the current pkt */ 364 TCP_NLA_DELIVERY_RATE_APP_LMT, /* delivery rate application limited ? */ 365 TCP_NLA_SNDQ_SIZE, /* Data (bytes) pending in send queue */ 366 TCP_NLA_CA_STATE, /* ca_state of socket */ 367 TCP_NLA_SND_SSTHRESH, /* Slow start size threshold */ 368 TCP_NLA_DELIVERED, /* Data pkts delivered incl. out-of-order */ 369 TCP_NLA_DELIVERED_CE, /* Like above but only ones w/ CE marks */ 370 TCP_NLA_BYTES_SENT, /* Data bytes sent including retransmission */ 371 TCP_NLA_BYTES_RETRANS, /* Data bytes retransmitted */ 372 TCP_NLA_DSACK_DUPS, /* DSACK blocks received */ 373 TCP_NLA_REORD_SEEN, /* reordering events seen */ 374 TCP_NLA_SRTT, /* smoothed RTT in usecs */ 375 TCP_NLA_TIMEOUT_REHASH, /* Timeout-triggered rehash attempts */ 376 TCP_NLA_BYTES_NOTSENT, /* Bytes in write queue not yet sent */ 377 TCP_NLA_EDT, /* Earliest departure time (CLOCK_MONOTONIC) */ 378 TCP_NLA_TTL, /* TTL or hop limit of a packet received */ 379 TCP_NLA_REHASH, /* PLB and timeout triggered rehash attempts */ 380 }; 381 382 /* for TCP_MD5SIG socket option */ 383 #define TCP_MD5SIG_MAXKEYLEN 80 384 385 /* tcp_md5sig extension flags for TCP_MD5SIG_EXT */ 386 #define TCP_MD5SIG_FLAG_PREFIX 0x1 /* address prefix length */ 387 #define TCP_MD5SIG_FLAG_IFINDEX 0x2 /* ifindex set */ 388 389 struct tcp_md5sig { 390 struct __kernel_sockaddr_storage tcpm_addr; /* address associated */ 391 __u8 tcpm_flags; /* extension flags */ 392 __u8 tcpm_prefixlen; /* address prefix */ 393 __u16 tcpm_keylen; /* key length */ 394 int tcpm_ifindex; /* device index for scope */ 395 __u8 tcpm_key[TCP_MD5SIG_MAXKEYLEN]; /* key (binary) */ 396 }; 397 398 /* INET_DIAG_MD5SIG */ 399 struct tcp_diag_md5sig { 400 __u8 tcpm_family; 401 __u8 tcpm_prefixlen; 402 __u16 tcpm_keylen; 403 __be32 tcpm_addr[4]; 404 __u8 tcpm_key[TCP_MD5SIG_MAXKEYLEN]; 405 }; 406 407 #define TCP_AO_MAXKEYLEN 80 408 409 #define TCP_AO_KEYF_IFINDEX (1 << 0) /* L3 ifindex for VRF */ 410 #define TCP_AO_KEYF_EXCLUDE_OPT (1 << 1) /* "Indicates whether TCP 411 * options other than TCP-AO 412 * are included in the MAC 413 * calculation" 414 */ 415 416 struct tcp_ao_add { /* setsockopt(TCP_AO_ADD_KEY) */ 417 struct __kernel_sockaddr_storage addr; /* peer's address for the key */ 418 char alg_name[64]; /* crypto hash algorithm to use */ 419 __s32 ifindex; /* L3 dev index for VRF */ 420 __u32 set_current :1, /* set key as Current_key at once */ 421 set_rnext :1, /* request it from peer with RNext_key */ 422 reserved :30; /* must be 0 */ 423 __u16 reserved2; /* padding, must be 0 */ 424 __u8 prefix; /* peer's address prefix */ 425 __u8 sndid; /* SendID for outgoing segments */ 426 __u8 rcvid; /* RecvID to match for incoming seg */ 427 __u8 maclen; /* length of authentication code (hash) */ 428 __u8 keyflags; /* see TCP_AO_KEYF_ */ 429 __u8 keylen; /* length of ::key */ 430 __u8 key[TCP_AO_MAXKEYLEN]; 431 } __attribute__((aligned(8))); 432 433 struct tcp_ao_del { /* setsockopt(TCP_AO_DEL_KEY) */ 434 struct __kernel_sockaddr_storage addr; /* peer's address for the key */ 435 __s32 ifindex; /* L3 dev index for VRF */ 436 __u32 set_current :1, /* corresponding ::current_key */ 437 set_rnext :1, /* corresponding ::rnext */ 438 del_async :1, /* only valid for listen sockets */ 439 reserved :29; /* must be 0 */ 440 __u16 reserved2; /* padding, must be 0 */ 441 __u8 prefix; /* peer's address prefix */ 442 __u8 sndid; /* SendID for outgoing segments */ 443 __u8 rcvid; /* RecvID to match for incoming seg */ 444 __u8 current_key; /* KeyID to set as Current_key */ 445 __u8 rnext; /* KeyID to set as Rnext_key */ 446 __u8 keyflags; /* see TCP_AO_KEYF_ */ 447 } __attribute__((aligned(8))); 448 449 struct tcp_ao_info_opt { /* setsockopt(TCP_AO_INFO), getsockopt(TCP_AO_INFO) */ 450 /* Here 'in' is for setsockopt(), 'out' is for getsockopt() */ 451 __u32 set_current :1, /* in/out: corresponding ::current_key */ 452 set_rnext :1, /* in/out: corresponding ::rnext */ 453 ao_required :1, /* in/out: don't accept non-AO connects */ 454 set_counters :1, /* in: set/clear ::pkt_* counters */ 455 accept_icmps :1, /* in/out: accept incoming ICMPs */ 456 reserved :27; /* must be 0 */ 457 __u16 reserved2; /* padding, must be 0 */ 458 __u8 current_key; /* in/out: KeyID of Current_key */ 459 __u8 rnext; /* in/out: keyid of RNext_key */ 460 __u64 pkt_good; /* in/out: verified segments */ 461 __u64 pkt_bad; /* in/out: failed verification */ 462 __u64 pkt_key_not_found; /* in/out: could not find a key to verify */ 463 __u64 pkt_ao_required; /* in/out: segments missing TCP-AO sign */ 464 __u64 pkt_dropped_icmp; /* in/out: ICMPs that were ignored */ 465 } __attribute__((aligned(8))); 466 467 struct tcp_ao_getsockopt { /* getsockopt(TCP_AO_GET_KEYS) */ 468 struct __kernel_sockaddr_storage addr; /* in/out: dump keys for peer 469 * with this address/prefix 470 */ 471 char alg_name[64]; /* out: crypto hash algorithm */ 472 __u8 key[TCP_AO_MAXKEYLEN]; 473 __u32 nkeys; /* in: size of the userspace buffer 474 * @optval, measured in @optlen - the 475 * sizeof(struct tcp_ao_getsockopt) 476 * out: number of keys that matched 477 */ 478 __u16 is_current :1, /* in: match and dump Current_key, 479 * out: the dumped key is Current_key 480 */ 481 482 is_rnext :1, /* in: match and dump RNext_key, 483 * out: the dumped key is RNext_key 484 */ 485 get_all :1, /* in: dump all keys */ 486 reserved :13; /* padding, must be 0 */ 487 __u8 sndid; /* in/out: dump keys with SendID */ 488 __u8 rcvid; /* in/out: dump keys with RecvID */ 489 __u8 prefix; /* in/out: dump keys with address/prefix */ 490 __u8 maclen; /* out: key's length of authentication 491 * code (hash) 492 */ 493 __u8 keyflags; /* in/out: see TCP_AO_KEYF_ */ 494 __u8 keylen; /* out: length of ::key */ 495 __s32 ifindex; /* in/out: L3 dev index for VRF */ 496 __u64 pkt_good; /* out: verified segments */ 497 __u64 pkt_bad; /* out: segments that failed verification */ 498 } __attribute__((aligned(8))); 499 500 struct tcp_ao_repair { /* {s,g}etsockopt(TCP_AO_REPAIR) */ 501 __be32 snt_isn; 502 __be32 rcv_isn; 503 __u32 snd_sne; 504 __u32 rcv_sne; 505 } __attribute__((aligned(8))); 506 507 /* setsockopt(fd, IPPROTO_TCP, TCP_ZEROCOPY_RECEIVE, ...) */ 508 509 #define TCP_RECEIVE_ZEROCOPY_FLAG_TLB_CLEAN_HINT 0x1 510 struct tcp_zerocopy_receive { 511 __u64 address; /* in: address of mapping */ 512 __u32 length; /* in/out: number of bytes to map/mapped */ 513 __u32 recv_skip_hint; /* out: amount of bytes to skip */ 514 __u32 inq; /* out: amount of bytes in read queue */ 515 __s32 err; /* out: socket error */ 516 __u64 copybuf_address; /* in: copybuf address (small reads) */ 517 __s32 copybuf_len; /* in/out: copybuf bytes avail/used or error */ 518 __u32 flags; /* in: flags */ 519 __u64 msg_control; /* ancillary data */ 520 __u64 msg_controllen; 521 __u32 msg_flags; 522 __u32 reserved; /* set to 0 for now */ 523 }; 524 #endif /* _UAPI_LINUX_TCP_H */ 525