lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202601131854.Y2IYQIYV-lkp@intel.com>
Date: Tue, 13 Jan 2026 18:47:53 +0800
From: kernel test robot <lkp@...el.com>
To: "Gustavo A. R. Silva" <gustavoars@...nel.org>
Cc: oe-kbuild-all@...ts.linux.dev,
 "Gustavo A. R. Silva" <gustavo@...eddedor.com>,
 LKML <linux-kernel@...r.kernel.org>
Subject: [gustavoars:testing/wfamnae-next20260113 15/16]
 kernel/bpf/core.c:2628:29: warning: comparison of distinct pointer types
 lacks a cast

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/gustavoars/linux.git testing/wfamnae-next20260113
head:   52754522a0ac00706210372e66bc73f60fa759d2
commit: 3d33febc0f4b127981e2da9f1443f584b40c4d6b [15/16] treewide_some: fix multiple -Wfamnae warnings that must be audited separately
config: parisc-randconfig-002-20260113 (https://download.01.org/0day-ci/archive/20260113/202601131854.Y2IYQIYV-lkp@intel.com/config)
compiler: hppa-linux-gcc (GCC) 14.3.0
reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20260113/202601131854.Y2IYQIYV-lkp@intel.com/reproduce)

If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <lkp@...el.com>
| Closes: https://lore.kernel.org/oe-kbuild-all/202601131854.Y2IYQIYV-lkp@intel.com/

All warnings (new ones prefixed by >>):

   kernel/bpf/core.c: In function 'bpf_prog_array_free_sleepable':
>> kernel/bpf/core.c:2628:29: warning: comparison of distinct pointer types lacks a cast [-Wcompare-distinct-pointer-types]
    2628 |         if (!progs || progs == &bpf_empty_prog_array.hdr)
         |                             ^~
   kernel/bpf/core.c: In function 'bpf_prog_kallsyms_add':
   kernel/bpf/core.c:590:54: warning: '%s' directive argument is null [-Wformat-truncation=]
     590 |                 snprintf(sym, (size_t)(end - sym), "_%s", func_name);
         |                                                      ^~


vim +2628 kernel/bpf/core.c

8c7dcb84e3b744 Delyan Kratunov 2022-06-14  2625  
8c7dcb84e3b744 Delyan Kratunov 2022-06-14  2626  void bpf_prog_array_free_sleepable(struct bpf_prog_array *progs)
8c7dcb84e3b744 Delyan Kratunov 2022-06-14  2627  {
8c7dcb84e3b744 Delyan Kratunov 2022-06-14 @2628  	if (!progs || progs == &bpf_empty_prog_array.hdr)
8c7dcb84e3b744 Delyan Kratunov 2022-06-14  2629  		return;
8c7dcb84e3b744 Delyan Kratunov 2022-06-14  2630  	call_rcu_tasks_trace(&progs->rcu, __bpf_prog_array_free_sleepable_cb);
8c7dcb84e3b744 Delyan Kratunov 2022-06-14  2631  }
8c7dcb84e3b744 Delyan Kratunov 2022-06-14  2632  

:::::: The code at line 2628 was first introduced by commit
:::::: 8c7dcb84e3b744b2b70baa7a44a9b1881c33a9c9 bpf: implement sleepable uprobes by chaining gps

:::::: TO: Delyan Kratunov <delyank@...com>
:::::: CC: Alexei Starovoitov <ast@...nel.org>

-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ