lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20191211130032.GB23015@linux.fritz.box> Date: Wed, 11 Dec 2019 14:00:32 +0100 From: Daniel Borkmann <daniel@...earbox.net> To: Arnd Bergmann <arnd@...db.de> Cc: Alexei Starovoitov <ast@...nel.org>, Randy Dunlap <rdunlap@...radead.org>, Martin KaFai Lau <kafai@...com>, Song Liu <songliubraving@...com>, Yonghong Song <yhs@...com>, Andrii Nakryiko <andriin@...com>, Quentin Monnet <quentin.monnet@...ronome.com>, netdev@...r.kernel.org, bpf@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: [PATCH] bpf: Fix build in minimal configurations, again On Tue, Dec 10, 2019 at 09:35:46PM +0100, Arnd Bergmann wrote: > Building with -Werror showed another failure: > > kernel/bpf/btf.c: In function 'btf_get_prog_ctx_type.isra.31': > kernel/bpf/btf.c:3508:63: error: array subscript 0 is above array bounds of 'u8[0]' {aka 'unsigned char[0]'} [-Werror=array-bounds] > ctx_type = btf_type_member(conv_struct) + bpf_ctx_convert_map[prog_type] * 2; > > I don't actually understand why the array is empty, but a similar > fix has addressed a related problem, so I suppose we can do the > same thing here. > > Fixes: ce27709b8162 ("bpf: Fix build in minimal configurations") > Signed-off-by: Arnd Bergmann <arnd@...db.de> Applied, thanks!
Powered by blists - more mailing lists