lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1284410821.13351.13.camel@localhost.localdomain> Date: Mon, 13 Sep 2010 13:47:01 -0700 From: Shirley Ma <mashirle@...ibm.com> To: Arnd Bergmann <arnd@...db.de>, mst@...hat.com, Avi Kivity <avi@...hat.com> Cc: xiaohui.xin@...el.com, netdev@...r.kernel.org, kvm@...r.kernel.org, linux-kernel@...r.kernel.org Subject: RFC PATCH 1/2] macvtap: A new sock zero copy flag /* Add a new flag to support sock zero copy from user space to kernel */ Signed-off-by: Shirley Ma <xma@...ibm.com> --- include/net/sock.h | 1 + 1 files changed, 1 insertions(+), 0 deletions(-) diff --git a/include/net/sock.h b/include/net/sock.h index adab9dc..80172de 100644 --- a/include/net/sock.h +++ b/include/net/sock.h @@ -543,6 +543,7 @@ enum sock_flags { SOCK_TIMESTAMPING_SYS_HARDWARE, /* %SOF_TIMESTAMPING_SYS_HARDWARE */ SOCK_FASYNC, /* fasync() active */ SOCK_RXQ_OVFL, + SOCK_ZEROCOPY, /* zerocopy from user space to kernel */ }; static inline void sock_copy_flags(struct sock *nsk, struct sock *osk) -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists