Currently we forbid 0-sized parameters and complain that the function has a malformed void argument, however now that we can handle 0-sized structs using BPF_PROG2(), carve out an exception for them. Signed-off-by: Alan Maguire <alan.maguire@xxxxxxxxxx> --- kernel/bpf/btf.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/kernel/bpf/btf.c b/kernel/bpf/btf.c index 6b21ca67070c..dc18a646b98a 100644 --- a/kernel/bpf/btf.c +++ b/kernel/bpf/btf.c @@ -7385,7 +7385,7 @@ int btf_distill_func_proto(struct bpf_verifier_log *log, tname, i, btf_type_str(t)); return -EINVAL; } - if (ret == 0) { + if (ret == 0 && !__btf_type_is_struct(t)) { bpf_log(log, "The function %s has malformed void argument.\n", tname); -- 2.39.3