/* * Copyright (c) 2014 Jiri Pirko * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. */ #ifndef __NET_TC_VLAN_H #define __NET_TC_VLAN_H #include #include #define VLAN_F_POP 0x1 #define VLAN_F_PUSH 0x2 struct tcf_vlan { struct tc_action common; int tcfv_action; u16 tcfv_push_vid; __be16 tcfv_push_proto; u8 tcfv_push_prio; }; #define to_vlan(a) ((struct tcf_vlan *)a) static inline bool is_tcf_vlan(const struct tc_action *a) { #ifdef CONFIG_NET_CLS_ACT if (a->ops && a->ops->type == TCA_ACT_VLAN) return true; #endif return false; } static inline u32 tcf_vlan_action(const struct tc_action *a) { return to_vlan(a)->tcfv_action; } static inline u16 tcf_vlan_push_vid(const struct tc_action *a) { return to_vlan(a)->tcfv_push_vid; } static inline __be16 tcf_vlan_push_proto(const struct tc_action *a) { return to_vlan(a)->tcfv_push_proto; } #endif /* __NET_TC_VLAN_H */ ate-remove net-next plumbingsTobias Klauser
summaryrefslogtreecommitdiff
panel'>diff options
AgeCommit message (Expand)AuthorFilesLines
context:
space:
mode:
authorRobert Shearman <rshearma@brocade.com>2017-01-26 18:02:24 +0000
committerDavid S. Miller <davem@davemloft.net>2017-01-30 15:00:58 -0500
commit63a6fff353d01da5a22b72670c434bf12fa0e3b8 (patch)
tree5707ae376777271ab2d77411fed89afb515f0257 /sound/soc/samsung/i2s-regs.h
parenta3a4de056ed5cfb22085173d8f0f13b0ca6b6d60 (diff)
net: Avoid receiving packets with an l3mdev on unbound UDP sockets
Packets arriving in a VRF currently are delivered to UDP sockets that aren't bound to any interface. TCP defaults to not delivering packets arriving in a VRF to unbound sockets. IP route lookup and socket transmit both assume that unbound means using the default table and UDP applications that haven't been changed to be aware of VRFs may not function correctly in this case since they may not be able to handle overlapping IP address ranges, or be able to send packets back to the original sender if required. So add a sysctl, udp_l3mdev_accept, to control this behaviour with it being analgous to the existing tcp_l3mdev_accept, namely to allow a process to have a VRF-global listen socket. Have this default to off as this is the behaviour that users will expect, given that there is no explicit mechanism to set unmodified VRF-unaware application into a default VRF. Signed-off-by: Robert Shearman <rshearma@brocade.com> Acked-by: David Ahern <dsa@cumulusnetworks.com> Tested-by: David Ahern <dsa@cumulusnetworks.com> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'sound/soc/samsung/i2s-regs.h')