/* Copyright (c) 2016 Facebook * * This program is free software; you can redistribute it and/or * modify it under the terms of version 2 of the GNU General Public * License as published by the Free Software Foundation. */ #define KBUILD_MODNAME "foo" #include #include #include #include #include #include #include #include "bpf_helpers.h" #define DEFAULT_PKTGEN_UDP_PORT 9 /* copy of 'struct ethhdr' without __packed */ struct eth_hdr { unsigned char h_dest[ETH_ALEN]; unsigned char h_source[ETH_ALEN]; unsigned short h_proto; }; SEC("simple") int handle_ingress(struct __sk_buff *skb) { void *data = (void *)(long)skb->data; struct eth_hdr *eth = data; struct iphdr *iph = data + sizeof(*eth); struct udphdr *udp = data + sizeof(*eth) + sizeof(*iph); void *data_end = (void *)(long)skb->data_end; /* single length check */ if (data + sizeof(*eth) + sizeof(*iph) + sizeof(*udp) > data_end) return 0; if (eth->h_proto != htons(ETH_P_IP)) return 0; if (iph->protocol != IPPROTO_UDP || iph->ihl != 5) return 0; if (ip_is_fragment(iph)) return 0; if (udp->dest == htons(DEFAULT_PKTGEN_UDP_PORT)) return TC_ACT_SHOT; return 0; } char _license[] SEC("license") = "GPL"; cket-rx-pump-back'>packet-rx-pump-back net-next plumbingsTobias Klauser
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorSalvatore Benedetto <salvatore.benedetto@intel.com>2017-01-13 11:54:08 +0000
committerHerbert Xu <herbert@gondor.apana.org.au>2017-01-23 22:41:32 +0800
commitd6040764adcb5cb6de1489422411d701c158bb69 (patch)
treeec8f34788bcdeaa9dc8f69c58af4c005d1e49021 /fs/xfs/xfs_sysfs.c
parent07825f0acd85dd8b7481d5ef0eb024b05364d892 (diff)
crypto: api - Clear CRYPTO_ALG_DEAD bit before registering an alg
Make sure CRYPTO_ALG_DEAD bit is cleared before proceeding with the algorithm registration. This fixes qat-dh registration when driver is restarted Cc: <stable@vger.kernel.org> Signed-off-by: Salvatore Benedetto <salvatore.benedetto@intel.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'fs/xfs/xfs_sysfs.c')
emove&id=cdaf25dfc058ee6f7a7b2e2353de00fa288c0cd4&id2=1930b60352e7e195f55b27cde15d2a8f43342a8b'>diff)
smc: some potential use after free bugs
Say we got really unlucky and these failed on the last iteration, then it could lead to a use after free bug. Fixes: cd6851f30386 ("smc: remote memory buffers (RMBs)") Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Signed-off-by: Ursula Braun <ubraun@linux.vnet.ibm.com> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'include/trace/events/host1x.h')