[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <165783301243.27796.8416117339886942240.git-patchwork-notify@kernel.org>
Date: Thu, 14 Jul 2022 21:10:12 +0000
From: patchwork-bot+netdevbpf@...nel.org
To: Ben Dooks <ben.dooks@...ive.com>
Cc: linux-kernel@...r.kernel.org, sudip.mukherjee@...ive.com,
jude.onyenegecha@...ive.com, nicolas.ferre@...rochip.com,
claudiu.beznea@...rochip.com, davem@...emloft.net,
edumazet@...gle.com, kuba@...nel.org, pabeni@...hat.com,
netdev@...r.kernel.org
Subject: Re: [PATCH] bpf: add endian modifiers to fix endian warnings
Hello:
This patch was applied to bpf/bpf-next.git (master)
by Daniel Borkmann <daniel@...earbox.net>:
On Thu, 14 Jul 2022 11:51:01 +0100 you wrote:
> A couple of the syscalls which load values (bpf_skb_load_helper_16
> and bpf_skb_load_helper_32) are using u16/u32 types which are
> triggering warnings as they are then converted from big-endian
> to cpu-endian. Fix these by making the types __be instead.
>
> Fixes the following sparse warnings:
>
> [...]
Here is the summary with links:
- bpf: add endian modifiers to fix endian warnings
https://git.kernel.org/bpf/bpf-next/c/96a233e600df
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists