lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: 
 <170655302658.19054.2092788760353633535.git-patchwork-notify@kernel.org>
Date: Mon, 29 Jan 2024 18:30:26 +0000
From: patchwork-bot+netdevbpf@...nel.org
To: Stephen Hemminger <stephen@...workplumber.org>
Cc: netdev@...r.kernel.org
Subject: Re: [PATCH iproute2] bpf: fix warning from basename()

Hello:

This patch was applied to iproute2/iproute2.git (main)
by Stephen Hemminger <stephen@...workplumber.org>:

On Sat, 27 Jan 2024 14:00:32 -0800 you wrote:
> The function basename() expects a mutable character string,
> which now causes a warning:
> 
> bpf_legacy.c: In function ‘bpf_load_common’:
> bpf_legacy.c:975:38: warning: passing argument 1 of ‘__xpg_basename’ discards ‘const’ qualifier from pointer target type [-Wdiscarded-qualifiers]
>   975 |                          basename(cfg->object), cfg->mode == EBPF_PINNED ?
>       |                                   ~~~^~~~~~~~
> In file included from bpf_legacy.c:21:
> /usr/include/libgen.h:34:36: note: expected ‘char *’ but argument is of type ‘const char *’
>    34 | extern char *__xpg_basename (char *__path) __THROW;
> 
> [...]

Here is the summary with links:
  - [iproute2] bpf: fix warning from basename()
    https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/commit/?id=69e3b2fadcd3

You are awesome, thank you!
-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ