lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 14 Oct 2020 00:11:53 +0800 From: kernel test robot <lkp@...el.com> To: Reji Thomas <rejithomas@...iper.net>, kuba@...nel.org Cc: kbuild-all@...ts.01.org, david.lebrun@...ouvain.be, davem@...emloft.net, netdev@...r.kernel.org, linux-kernel@...r.kernel.org, rejithomas@...iper.net, rejithomas.d@...il.com Subject: [RFC PATCH] IPv6: sr: seg6_strict_lookup_nexthop() can be static Signed-off-by: kernel test robot <lkp@...el.com> --- seg6_local.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/net/ipv6/seg6_local.c b/net/ipv6/seg6_local.c index 1a669f12d56c9d..e949d24036c2cd 100644 --- a/net/ipv6/seg6_local.c +++ b/net/ipv6/seg6_local.c @@ -219,8 +219,8 @@ int seg6_lookup_nexthop(struct sk_buff *skb, return seg6_lookup_any_nexthop(skb, nhaddr, 0, tbl_id, false); } -int seg6_strict_lookup_nexthop(struct sk_buff *skb, - struct in6_addr *nhaddr, int oif, u32 tbl_id) +static int seg6_strict_lookup_nexthop(struct sk_buff *skb, + struct in6_addr *nhaddr, int oif, u32 tbl_id) { return seg6_lookup_any_nexthop(skb, nhaddr, oif, tbl_id, false); }
Powered by blists - more mailing lists