[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAErYV9Hm+k9TBgWr5Ru3Q6Pab-9nx09hme2Gi1mpev=ur8Bq2w@mail.gmail.com>
Date: Thu, 1 Jun 2017 09:43:37 +0300
From: Adel Fuchs <adelfuchs@...il.com>
To: Y Song <ys114321@...il.com>
Cc: netdev@...r.kernel.org
Subject: Re: running an eBPF program
Hi,
Thanks for your reply. Where do I need to add this workaround?
Thanks,
Adel
On Mon, May 29, 2017 at 8:31 AM, Y Song <ys114321@...il.com> wrote:
> On Sun, May 28, 2017 at 12:38 AM, Adel Fuchs <adelfuchs@...il.com> wrote:
>> Hi,
>> Is there any way to run this eBPF program without that patch?
>> Alternatively, is there any other eBPF sample that does run properly? I need
>> to run a program that filters packets according to IP address or port.
>
> The following is temporary workaround you can use:
> int poff, nh_off = BPF_LL_OFF + ETH_HLEN;
> - __be16 proto = skb->protocol;
> + __be16 proto = (__be16)*(volatile __u32 *)&skb->protocol;
> __u8 ip_proto;
Powered by blists - more mailing lists