Re: [PATCH] bpf: add endian modifiers to fix endian warnings
Date: Thu Jul 14 2022 - 17:10:41 EST
This patch was applied to bpf/bpf-next.git (master)
by Daniel Borkmann <daniel@xxxxxxxxxxxxx>:
On Thu, 14 Jul 2022 11:51:01 +0100 you wrote:
> A couple of the syscalls which load values (bpf_skb_load_helper_16
> and bpf_skb_load_helper_32) are using u16/u32 types which are
> triggering warnings as they are then converted from big-endian
> to cpu-endian. Fix these by making the types __be instead.
> Fixes the following sparse warnings:
Here is the summary with links:
- bpf: add endian modifiers to fix endian warnings
You are awesome, thank you!
Deet-doot-dot, I am a bot.