lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 06 Sep 2016 07:30:44 -0700 From: Eric Dumazet <eric.dumazet@...il.com> To: Jamal Hadi Salim <jhs@...atatu.com> Cc: davem@...emloft.net, netdev@...r.kernel.org, daniel@...earbox.net, xiyou.wangcong@...il.com, alexei.starovoitov@...il.com Subject: Re: [PATCH v4 net-next 1/1] net_sched: Introduce skbmod action On Tue, 2016-09-06 at 09:37 -0400, Jamal Hadi Salim wrote: > From: Jamal Hadi Salim <jhs@...atatu.com> > + > +struct tcf_skbmod_params { > + struct rcu_head rcu; > + u64 flags; /*up to 64 types of operations; extend if needed */ > + u8 eth_dst[ETH_ALEN]; > + u16 eth_type; > + u8 eth_src[ETH_ALEN]; > +}; > + > +struct tcf_skbmod { > + struct tc_action common; > + struct tcf_skbmod_params *skbmod_p; struct tcf_skbmod_params __rcu *skbmod_p; > +}; Then add CONFIG_SPARSE_RCU_POINTER=y to your .config And build/check make C=2 M=net/sched Thanks.
Powered by blists - more mailing lists