lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 14 Jan 2021 03:20:08 +0000 From: patchwork-bot+netdevbpf@...nel.org To: Ian Rogers <irogers@...gle.com> Cc: ast@...nel.org, daniel@...earbox.net, kafai@...com, songliubraving@...com, yhs@...com, andriin@...com, john.fastabend@...il.com, kpsingh@...omium.org, quentin@...valent.com, jean-philippe@...aro.org, tklauser@...tanz.ch, iii@...ux.ibm.com, netdev@...r.kernel.org, bpf@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: [PATCH 1/2] bpf, libbpf: Avoid unused function warning on bpf_tail_call_static Hello: This series was applied to bpf/bpf-next.git (refs/heads/master): On Wed, 13 Jan 2021 14:36:08 -0800 you wrote: > Add inline to __always_inline making it match the linux/compiler.h. > Adding this avoids an unused function warning on bpf_tail_call_static > when compining with -Wall. > > Signed-off-by: Ian Rogers <irogers@...gle.com> > --- > tools/lib/bpf/bpf_helpers.h | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) Here is the summary with links: - [1/2] bpf, libbpf: Avoid unused function warning on bpf_tail_call_static https://git.kernel.org/bpf/bpf-next/c/ce5a518e9de5 - [2/2] tools/bpftool: Add -Wall when building BPF programs https://git.kernel.org/bpf/bpf-next/c/bade5c554f1a You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists