summaryrefslogtreecommitdiff
path: root/pkt_buff.h
blob: e044f663951b6140919ce331c3da38be64098742 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
/*
 * netsniff-ng - the packet sniffing beast
 * Copyright (C) 2012 Christoph Jaeger <christoph@netsniff-ng.org>
 * Subject to the GPL, version 2.
 */

#ifndef PKT_BUFF_H
#define PKT_BUFF_H

#include "hash.h"
#include "built_in.h"
#include "proto.h"
#include "xmalloc.h"

struct pkt_buff {
	/* invariant: head <= data <= tail */
	uint8_t      *head;
	uint8_t      *data;
	uint8_t      *tail;
	unsigned int  size;

	struct protocol *handler;
	uint32_t link_type;
	uint16_t proto;
};

static inline struct pkt_buff *pkt_alloc(uint8_t *packet, unsigned int len)
{
	struct pkt_buff *pkt = xmalloc(sizeof(*pkt));

	pkt->head = packet;
	pkt->data = packet;
	pkt->tail = packet + len;
	pkt->size = len;
	pkt->handler = NULL;

	return pkt;
}

static inline void pkt_free(struct pkt_buff *pkt)
{
	xfree(pkt);
}

static inline unsigned int pkt_len(struct pkt_buff *pkt)
{
	bug_on(!pkt || pkt->data > pkt->tail);

	return pkt->tail - pkt->data;
}

static inline uint8_t *pkt_pull(struct pkt_buff *pkt, unsigned int len)
{
	uint8_t *data = NULL;

	bug_on(!pkt || pkt->head > pkt->data || pkt->data > pkt->tail);

	if (len <= pkt_len(pkt)) {
		data = pkt->data;
		pkt->data += len;
	}

	bug_on(!pkt || pkt->head > pkt->data || pkt->data > pkt->tail);

	return data;
}

static inline uint8_t *pkt_peek(struct pkt_buff *pkt)
{
	bug_on(!pkt || pkt->head > pkt->data || pkt->data > pkt->tail);

	return pkt->data;
}

static inline unsigned int pkt_trim(struct pkt_buff *pkt, unsigned int len)
{
	unsigned int ret = 0;

	bug_on(!pkt || pkt->head > pkt->data || pkt->data > pkt->tail);

	if (len <= pkt_len(pkt))
		ret = len;

	pkt->tail -= ret;
	bug_on(!pkt || pkt->head > pkt->data || pkt->data > pkt->tail);

	return ret;
}

static inline uint8_t *pkt_pull_tail(struct pkt_buff *pkt, unsigned int len)
{
	uint8_t *tail = NULL;

	bug_on(!pkt || pkt->head > pkt->data || pkt->data > pkt->tail);

	if (len <= pkt_len(pkt)) {
		tail = pkt->tail;
		pkt->tail -= len;
	}

	return tail;
}

static inline void pkt_set_proto(struct pkt_buff *pkt, struct hash_table *table,
				 unsigned int key)
{
	bug_on(!pkt || !table);

	pkt->handler = lookup_hash(key, table);
	while (pkt->handler && key != pkt->handler->key)
		pkt->handler = pkt->handler->next;
}

#endif /* PKT_BUFF_H */
rnel log: test_firmware: loading 'nope-test-firmware.bin' misc test_firmware: Direct firmware load for nope-test-firmware.bin failed with error -2 misc test_firmware: Falling back to user helper BUG: unable to handle kernel NULL pointer dereference at 0000000000000038 IP: _request_firmware+0xa27/0xad0 PGD 0 Oops: 0000 [#1] SMP Modules linked in: test_firmware(E) ... etc ... CPU: 1 PID: 1396 Comm: fw_fallback.sh Tainted: G W E 4.10.0-rc3-next-20170111+ #30 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.10.1-0-g8891697-prebuilt.qemu-project.org 04/01/2014 task: ffff9740b27f4340 task.stack: ffffbb15c0bc8000 RIP: 0010:_request_firmware+0xa27/0xad0 RSP: 0018:ffffbb15c0bcbd10 EFLAGS: 00010246 RAX: 00000000fffffffe RBX: ffff9740afe5aa80 RCX: 0000000000000000 RDX: ffff9740b27f4340 RSI: 0000000000000283 RDI: 0000000000000000 RBP: ffffbb15c0bcbd90 R08: ffffbb15c0bcbcd8 R09: 0000000000000000 R10: 0000000894a0d4b1 R11: 000000000000008c R12: ffffffffc0312480 R13: 0000000000000005 R14: ffff9740b1c32400 R15: 00000000000003e8 FS: 00007f8604422700(0000) GS:ffff9740bfc80000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000038 CR3: 000000012164c000 CR4: 00000000000006e0 Call Trace: request_firmware+0x37/0x50 trigger_request_store+0x79/0xd0 [test_firmware] dev_attr_store+0x18/0x30 sysfs_kf_write+0x37/0x40 kernfs_fop_write+0x110/0x1a0 __vfs_write+0x37/0x160 ? _cond_resched+0x1a/0x50 vfs_write+0xb5/0x1a0 SyS_write+0x55/0xc0 ? trace_do_page_fault+0x37/0xd0 entry_SYSCALL_64_fastpath+0x1e/0xad RIP: 0033:0x7f8603f49620 RSP: 002b:00007fff6287b788 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 000055c307b110a0 RCX: 00007f8603f49620 RDX: 0000000000000016 RSI: 000055c3084d8a90 RDI: 0000000000000001 RBP: 0000000000000016 R08: 000000000000c0ff R09: 000055c3084d6336 R10: 000055c307b108b0 R11: 0000000000000246 R12: 000055c307b13c80 R13: 000055c3084d6320 R14: 0000000000000000 R15: 00007fff6287b950 Code: 9f 64 84 e8 9c 61 fe ff b8 f4 ff ff ff e9 6b f9 ff ff 48 c7 c7 40 6b 8d 84 89 45 a8 e8 43 84 18 00 49 8b be 00 03 00 00 8b 45 a8 <83> 7f 38 02 74 08 e8 6e ec ff ff 8b 45 a8 49 c7 86 00 03 00 00 RIP: _request_firmware+0xa27/0xad0 RSP: ffffbb15c0bcbd10 CR2: 0000000000000038 ---[ end trace 6d94ac339c133e6f ]--- Fixes: 5d47ec02c37e ("firmware: Correct handling of fw_state_wait() return value") Reported-and-Tested-by: Jakub Kicinski <jakub.kicinski@netronome.com> Reported-and-Tested-by: Patrick Bruenn <p.bruenn@beckhoff.com> Reported-by: Chris Wilson <chris@chris-wilson.co.uk> CC: <stable@vger.kernel.org> [3.10+] Signed-off-by: Luis R. Rodriguez <mcgrof@kernel.org> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'net/mac80211/tx.c')