]> git.ipfire.org Git - thirdparty/ipset.git/commit
Correct workaround in patch "Fix calling ip_set() macro at dumping"
authorJozsef Kadlecsik <kadlec@blackhole.kfki.hu>
Tue, 30 Oct 2018 21:30:30 +0000 (22:30 +0100)
committerJozsef Kadlecsik <kadlec@blackhole.kfki.hu>
Tue, 30 Oct 2018 21:30:30 +0000 (22:30 +0100)
commit7d6e460d9373bc8614b7e33da5b720503d803cb5
tree786cef32acce632f012fe39726d55fed14345234
parentbe7bb9cd70de48c2076c20d2a03b9a8c5388bff7
Correct workaround in patch "Fix calling ip_set() macro at dumping"

As Pablo pointed out, in order to fix the bogus warnings, there's
no need for the non-useful rcu_read_lock/unlock dancing. Call
rcu_dereference_raw() instead, the ref_netlink protects the set.
kernel/net/netfilter/ipset/ip_set_core.c