From: Daniel Borkmann <[email protected]>
Date: Mon, 01 May 2017 22:38:58 +0200
> BPF samples:
>
> [root@apoc bpf]# make > /dev/null
> In file included from
> /root/cilium/net-next/samples/bpf/cookie_uid_helper_example.c:54:0:
> /root/cilium/net-next/samples/bpf/cookie_uid_helper_example.c: In
> function ‘prog_load’:
> /root/cilium/net-next/samples/bpf/cookie_uid_helper_example.c:119:5:
> warning: overflow in implicit constant conversion [-Woverflow]
> -32 + offsetof(struct stats, uid)),
> ^
> /root/cilium/net-next/samples/bpf/libbpf.h:135:12: note: in definition
> of macro ‘BPF_STX_MEM’
> .off = OFF, \
> ^
> /root/cilium/net-next/samples/bpf/cookie_uid_helper_example.c:121:5:
> warning: overflow in implicit constant conversion [-Woverflow]
> -32 + offsetof(struct stats, packets), 1),
> ^
> /root/cilium/net-next/samples/bpf/libbpf.h:155:12: note: in definition
> of macro ‘BPF_ST_MEM’
> .off = OFF, \
> ^
> /root/cilium/net-next/samples/bpf/cookie_uid_helper_example.c:129:5:
> warning: overflow in implicit constant conversion [-Woverflow]
> -32 + offsetof(struct stats, bytes)),
> ^
> /root/cilium/net-next/samples/bpf/libbpf.h:135:12: note: in definition
> of macro ‘BPF_STX_MEM’
> .off = OFF, \
> ^
> [root@apoc bpf]#
>
> Above warning is from 51570a5ab2b7 ("A Sample of using socket
> cookie and uid for traffic monitoring"). I can see to send a
> fix for it.
Please do, thanks.