#ifndef __FS_CEPH_AUTH_X_PROTOCOL #define __FS_CEPH_AUTH_X_PROTOCOL #define CEPHX_GET_AUTH_SESSION_KEY 0x0100 #define CEPHX_GET_PRINCIPAL_SESSION_KEY 0x0200 #define CEPHX_GET_ROTATING_KEY 0x0400 /* common bits */ struct ceph_x_ticket_blob { __u8 struct_v; __le64 secret_id; __le32 blob_len; char blob[]; } __attribute__ ((packed)); /* common request/reply headers */ struct ceph_x_request_header { __le16 op; } __attribute__ ((packed)); struct ceph_x_reply_header { __le16 op; __le32 result; } __attribute__ ((packed)); /* authenticate handshake */ /* initial hello (no reply header) */ struct ceph_x_server_challenge { __u8 struct_v; __le64 server_challenge; } __attribute__ ((packed)); struct ceph_x_authenticate { __u8 struct_v; __le64 client_challenge; __le64 key; /* ticket blob */ } __attribute__ ((packed)); struct ceph_x_service_ticket_request { __u8 struct_v; __le32 keys; } __attribute__ ((packed)); struct ceph_x_challenge_blob { __le64 server_challenge; __le64 client_challenge; } __attribute__ ((packed)); /* authorize handshake */ /* * The authorizer consists of two pieces: * a - service id, ticket blob * b - encrypted with session key */ struct ceph_x_authorize_a { __u8 struct_v; __le64 global_id; __le32 service_id; struct ceph_x_ticket_blob ticket_blob; } __attribute__ ((packed)); struct ceph_x_authorize_b { __u8 struct_v; __le64 nonce; } __attribute__ ((packed)); struct ceph_x_authorize_reply { __u8 struct_v; __le64 nonce_plus_one; } __attribute__ ((packed)); /* * encyption bundle */ #define CEPHX_ENC_MAGIC 0xff009cad8826aa55ull struct ceph_x_encrypt_header { __u8 struct_v; __le64 magic; } __attribute__ ((packed)); #endif e-remove&id=b4cfe3971f6eab542dd7ecc398bfa1aeec889934'>refslogtreecommitdiff
path: root/tools/perf/util/bpf-prologue.h
diff options
context:
space:
mode:
authorJack Morgenstein <jackm@dev.mellanox.co.il>2017-01-15 20:15:00 +0200
committerDoug Ledford <dledford@redhat.com>2017-01-27 14:29:04 -0500
commitb4cfe3971f6eab542dd7ecc398bfa1aeec889934 (patch)
treec7ad49d05da0535170c8e7710cd44ae1cecc271f /tools/perf/util/bpf-prologue.h
parent2d4b21e0a2913612274a69a3ba1bfee4cffc6e77 (diff)
RDMA/cma: Fix unknown symbol when CONFIG_IPV6 is not enabled
If IPV6 has not been enabled in the underlying kernel, we must avoid calling IPV6 procedures in rdma_cm.ko. This requires using "IS_ENABLED(CONFIG_IPV6)" in "if" statements surrounding any code which calls external IPV6 procedures. In the instance fixed here, procedure cma_bind_addr() called ipv6_addr_type() -- which resulted in calling external procedure __ipv6_addr_type(). Fixes: 6c26a77124ff ("RDMA/cma: fix IPv6 address resolution") Cc: <stable@vger.kernel.org> # v4.2+ Cc: Spencer Baugh <sbaugh@catern.com> Signed-off-by: Jack Morgenstein <jackm@dev.mellanox.co.il> Reviewed-by: Moni Shoua <monis@mellanox.com> Signed-off-by: Leon Romanovsky <leon@kernel.org> Signed-off-by: Doug Ledford <dledford@redhat.com>
Diffstat (limited to 'tools/perf/util/bpf-prologue.h')