From: Radu Nicolau Date: Mon, 6 Nov 2017 11:36:47 +0000 (+0000) Subject: net/ixgbe: fix build with gcc 4.5.1 X-Git-Url: http://git.droids-corp.org/?p=dpdk.git;a=commitdiff_plain;h=a8c839a675bd4f2ae6a84df633f6c99916266d2a net/ixgbe: fix build with gcc 4.5.1 On SUSE11 with gcc 4.5.1 the following build error occurred, most likely because of improper handling of annonymous unions: drivers/net/ixgbe/ixgbe_ipsec.c:579:4: error: unknown field ‘ipsec’ specified in initializer Fixes: 9a0752f498d2 ("net/ixgbe: enable inline IPsec") Signed-off-by: Radu Nicolau --- diff --git a/drivers/net/ixgbe/ixgbe_ipsec.c b/drivers/net/ixgbe/ixgbe_ipsec.c index 99c0a7314d..105da11a0e 100644 --- a/drivers/net/ixgbe/ixgbe_ipsec.c +++ b/drivers/net/ixgbe/ixgbe_ipsec.c @@ -576,48 +576,48 @@ ixgbe_crypto_capabilities_get(void *device __rte_unused) { /* IPsec Inline Crypto ESP Transport Egress */ .action = RTE_SECURITY_ACTION_TYPE_INLINE_CRYPTO, .protocol = RTE_SECURITY_PROTOCOL_IPSEC, - .ipsec = { + {.ipsec = { .proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP, .mode = RTE_SECURITY_IPSEC_SA_MODE_TRANSPORT, .direction = RTE_SECURITY_IPSEC_SA_DIR_EGRESS, .options = { 0 } - }, + } }, .crypto_capabilities = aes_gcm_gmac_crypto_capabilities, .ol_flags = RTE_SECURITY_TX_OLOAD_NEED_MDATA }, { /* IPsec Inline Crypto ESP Transport Ingress */ .action = RTE_SECURITY_ACTION_TYPE_INLINE_CRYPTO, .protocol = RTE_SECURITY_PROTOCOL_IPSEC, - .ipsec = { + {.ipsec = { .proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP, .mode = RTE_SECURITY_IPSEC_SA_MODE_TRANSPORT, .direction = RTE_SECURITY_IPSEC_SA_DIR_INGRESS, .options = { 0 } - }, + } }, .crypto_capabilities = aes_gcm_gmac_crypto_capabilities, .ol_flags = 0 }, { /* IPsec Inline Crypto ESP Tunnel Egress */ .action = RTE_SECURITY_ACTION_TYPE_INLINE_CRYPTO, .protocol = RTE_SECURITY_PROTOCOL_IPSEC, - .ipsec = { + {.ipsec = { .proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP, .mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL, .direction = RTE_SECURITY_IPSEC_SA_DIR_EGRESS, .options = { 0 } - }, + } }, .crypto_capabilities = aes_gcm_gmac_crypto_capabilities, .ol_flags = RTE_SECURITY_TX_OLOAD_NEED_MDATA }, { /* IPsec Inline Crypto ESP Tunnel Ingress */ .action = RTE_SECURITY_ACTION_TYPE_INLINE_CRYPTO, .protocol = RTE_SECURITY_PROTOCOL_IPSEC, - .ipsec = { + {.ipsec = { .proto = RTE_SECURITY_IPSEC_SA_PROTO_ESP, .mode = RTE_SECURITY_IPSEC_SA_MODE_TUNNEL, .direction = RTE_SECURITY_IPSEC_SA_DIR_INGRESS, .options = { 0 } - }, + } }, .crypto_capabilities = aes_gcm_gmac_crypto_capabilities, .ol_flags = 0 },