lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1446420432.6254.103.camel@edumazet-glaptop2.roam.corp.google.com>
Date:	Sun, 01 Nov 2015 15:27:12 -0800
From:	Eric Dumazet <eric.dumazet@...il.com>
To:	kbuild test robot <lkp@...el.com>
Cc:	kbuild-all@...org, David Miller <davem@...emloft.net>,
	haiyangz@...rosoft.com, edumazet@...gle.com,
	netdev@...r.kernel.org, kys@...rosoft.com
Subject: Re: [PATCH net-next] net: make skb_set_owner_w() more robust

On Mon, 2015-11-02 at 07:18 +0800, kbuild test robot wrote:
> Hi Eric,
> 
> [auto build test ERROR on net-next/master -- if it's inappropriate base, please suggest rules for selecting the more suitable base]
> 
> url:    https://github.com/0day-ci/linux/commits/Eric-Dumazet/net-make-skb_set_owner_w-more-robust/20151102-070107
> config: x86_64-randconfig-x019-201544 (attached as .config)
> reproduce:
>         # save the attached .config to linux build tree
>         make ARCH=x86_64 
> 
> All errors (new ones prefixed by >>):
> 
>    net/core/sock.c: In function 'skb_set_owner_w':
> >> net/core/sock.c:1664:21: error: 'sock_edemux' undeclared (first use in this function)
>       skb->destructor = sock_edemux;
>                         ^
>    net/core/sock.c:1664:21: note: each undeclared identifier is reported only once for each function it appears in

Yes, I forgot sock_edemux() was guarded by CONFIG_INET.

Kind of silly options really...

I will send a V2.


--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ