tests/oss-fuzz/flow_extract_target.c:59:53:
     error: too few arguments to function call, expected 4, have 1
         uint16_t tcp_flags = parse_tcp_flags(&packet);
                              ~~~~~~~~~~~~~~~        ^

Fixes: e7e9973b80d3 ("dpif-netdev: Forwarding optimization for flows with a 
simple match.")
Reported-at: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=43498
Signed-off-by: Ilya Maximets <[email protected]>
---
 tests/oss-fuzz/flow_extract_target.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/tests/oss-fuzz/flow_extract_target.c 
b/tests/oss-fuzz/flow_extract_target.c
index 869d1e63e..84a6c317d 100644
--- a/tests/oss-fuzz/flow_extract_target.c
+++ b/tests/oss-fuzz/flow_extract_target.c
@@ -56,7 +56,7 @@ LLVMFuzzerTestOneInput(const uint8_t *data, size_t size)
 
     /* Parse TCP flags. */
     if (dp_packet_size(&packet) >= ETH_HEADER_LEN) {
-        uint16_t tcp_flags = parse_tcp_flags(&packet);
+        uint16_t tcp_flags = parse_tcp_flags(&packet, NULL, NULL, NULL);
         ignore(tcp_flags);
     }
 
-- 
2.31.1

_______________________________________________
dev mailing list
[email protected]
https://mail.openvswitch.org/mailman/listinfo/ovs-dev

Reply via email to