[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <165397201166.21793.15800268803365816812.git-patchwork-notify@kernel.org>
Date: Tue, 31 May 2022 04:40:11 +0000
From: patchwork-bot+netdevbpf@...nel.org
To: zhanggenjian <zhanggenjian123@...il.com>
Cc: pabeni@...hat.com, edumazet@...gle.com, davem@...emloft.net,
yoshfuji@...ux-ipv6.org, dsahern@...nel.org, kuba@...nel.org,
netdev@...r.kernel.org, linux-kernel@...r.kernel.org,
huhai@...inos.cn
Subject: Re: [PATCH v2] net: ipv4: Avoid bounds check warning
Hello:
This patch was applied to netdev/net.git (master)
by Jakub Kicinski <kuba@...nel.org>:
On Thu, 26 May 2022 18:12:13 +0800 you wrote:
> From: huhai <huhai@...inos.cn>
>
> Fix the following build warning when CONFIG_IPV6 is not set:
>
> In function ‘fortify_memcpy_chk’,
> inlined from ‘tcp_md5_do_add’ at net/ipv4/tcp_ipv4.c:1210:2:
> ./include/linux/fortify-string.h:328:4: error: call to ‘__write_overflow_field’ declared with attribute warning: detected write beyond size of field (1st parameter); maybe use struct_group()? [-Werror=attribute-warning]
> 328 | __write_overflow_field(p_size_field, size);
> | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>
> [...]
Here is the summary with links:
- [v2] net: ipv4: Avoid bounds check warning
https://git.kernel.org/netdev/net/c/3a2cd89bfbeb
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists