forked from Qortal/Brooklyn
* 0day explit mitigation * Memory corruption prevention * Privilege escalation prevention * Buffer over flow prevention * File System corruption defense * Thread escape prevention This may very well be the most intensive inclusion to BrooklynR. This will not be part of an x86 suite nor it will be released as tool kit. The security core toolkit will remain part of kernel base.
35 lines
810 B
C
35 lines
810 B
C
#ifndef _NET_EVENT_H
|
|
#define _NET_EVENT_H
|
|
|
|
/*
|
|
* Generic netevent notifiers
|
|
*
|
|
* Authors:
|
|
* Tom Tucker <tom@opengridcomputing.com>
|
|
* Steve Wise <swise@opengridcomputing.com>
|
|
*
|
|
* Changes:
|
|
*/
|
|
|
|
struct dst_entry;
|
|
struct neighbour;
|
|
|
|
struct netevent_redirect {
|
|
struct dst_entry *old;
|
|
struct dst_entry *new;
|
|
struct neighbour *neigh;
|
|
const void *daddr;
|
|
};
|
|
|
|
enum netevent_notif_type {
|
|
NETEVENT_NEIGH_UPDATE = 1, /* arg is struct neighbour ptr */
|
|
NETEVENT_REDIRECT, /* arg is struct netevent_redirect ptr */
|
|
NETEVENT_DELAY_PROBE_TIME_UPDATE, /* arg is struct neigh_parms ptr */
|
|
};
|
|
|
|
int register_netevent_notifier(struct notifier_block *nb);
|
|
int unregister_netevent_notifier(struct notifier_block *nb);
|
|
int call_netevent_notifiers(unsigned long val, void *v);
|
|
|
|
#endif
|