tests/oss-fuzz/flow_extract_target.c:59:53:
error: too few arguments to function call, expected 4, have 1
uint16_t tcp_flags = parse_tcp_flags(&packet);
~~~~~~~~~~~~~~~ ^
Fixes: e7e9973b80d3 ("dpif-netdev: Forwarding optimization for flows with a
simple match.")
Reported-at: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=43498
Signed-off-by: Ilya Maximets <[email protected]>
---
tests/oss-fuzz/flow_extract_target.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tests/oss-fuzz/flow_extract_target.c
b/tests/oss-fuzz/flow_extract_target.c
index 869d1e63e..84a6c317d 100644
--- a/tests/oss-fuzz/flow_extract_target.c
+++ b/tests/oss-fuzz/flow_extract_target.c
@@ -56,7 +56,7 @@ LLVMFuzzerTestOneInput(const uint8_t *data, size_t size)
/* Parse TCP flags. */
if (dp_packet_size(&packet) >= ETH_HEADER_LEN) {
- uint16_t tcp_flags = parse_tcp_flags(&packet);
+ uint16_t tcp_flags = parse_tcp_flags(&packet, NULL, NULL, NULL);
ignore(tcp_flags);
}
--
2.31.1
_______________________________________________
dev mailing list
[email protected]
https://mail.openvswitch.org/mailman/listinfo/ovs-dev