lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202312200703.AoSwZY1b-lkp@intel.com>
Date: Wed, 20 Dec 2023 07:33:41 +0800
From: kernel test robot <lkp@...el.com>
To: Arnd Bergmann <arnd@...db.de>
Cc: oe-kbuild-all@...ts.linux.dev, linux-kernel@...r.kernel.org,
	Martin Schwidefsky <schwidefsky@...ibm.com>,
	Heiko Carstens <heiko.carstens@...ibm.com>
Subject: kernel/seccomp.c:1386:1: sparse: sparse: Using plain integer as NULL
 pointer

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
head:   55cb5f43689d7a9ea5bf35ef050f12334f197347
commit: aa0d6e70d3b34e710a6a57a53a3096cb2e0ea99f s390: autogenerate compat syscall wrappers
date:   4 years, 11 months ago
config: s390-randconfig-r111-20231116 (https://download.01.org/0day-ci/archive/20231220/202312200703.AoSwZY1b-lkp@intel.com/config)
compiler: s390-linux-gcc (GCC) 13.2.0
reproduce: (https://download.01.org/0day-ci/archive/20231220/202312200703.AoSwZY1b-lkp@intel.com/reproduce)

If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <lkp@...el.com>
| Closes: https://lore.kernel.org/oe-kbuild-all/202312200703.AoSwZY1b-lkp@intel.com/

sparse warnings: (new ones prefixed by >>)
>> kernel/seccomp.c:1386:1: sparse: sparse: Using plain integer as NULL pointer
>> kernel/seccomp.c:1386:1: sparse: sparse: Using plain integer as NULL pointer
--
>> ipc/syscall.c:110:1: sparse: sparse: Using plain integer as NULL pointer
>> ipc/syscall.c:110:1: sparse: sparse: Using plain integer as NULL pointer

vim +1386 kernel/seccomp.c

48dc92b9fc3926 Kees Cook      2014-06-25  1385  
48dc92b9fc3926 Kees Cook      2014-06-25 @1386  SYSCALL_DEFINE3(seccomp, unsigned int, op, unsigned int, flags,
a5662e4d81c4d4 Tycho Andersen 2018-12-09  1387  			 void __user *, uargs)
48dc92b9fc3926 Kees Cook      2014-06-25  1388  {
48dc92b9fc3926 Kees Cook      2014-06-25  1389  	return do_seccomp(op, flags, uargs);
48dc92b9fc3926 Kees Cook      2014-06-25  1390  }
48dc92b9fc3926 Kees Cook      2014-06-25  1391  

:::::: The code at line 1386 was first introduced by commit
:::::: 48dc92b9fc3926844257316e75ba11eb5c742b2c seccomp: add "seccomp" syscall

:::::: TO: Kees Cook <keescook@...omium.org>
:::::: CC: Kees Cook <keescook@...omium.org>

-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ