lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <27188c5f-c1e4-44df-7553-1529332f41f8@iogearbox.net>
Date:   Fri, 8 Mar 2019 14:26:45 +0100
From:   Daniel Borkmann <daniel@...earbox.net>
To:     Bo YU <tsu.yubo@...il.com>, ast@...nel.org, kafai@...com,
        ongliubraving@...com, yhs@...com, davem@...emloft.net
Cc:     netdev@...r.kernel.org, bpf@...r.kernel.org,
        linux-kernel@...r.kernel.org, yuzibode@....com
Subject: Re: [PATCH V3] bpf: fix warning about using plain integer as NULL

On 03/08/2019 07:45 AM, Bo YU wrote:
> Sparse warning below:
> 
> sudo make C=2 CF=-D__CHECK_ENDIAN__ M=net/bpf/
> CHECK   net/bpf//test_run.c
> net/bpf//test_run.c:19:77: warning: Using plain integer as NULL pointer
> ./include/linux/bpf-cgroup.h:295:77: warning: Using plain integer as NULL pointer
> 
> Fixes: 8bad74f9840f ("bpf: extend cgroup bpf core to allow multiple cgroup storage types")
> Acked-by: Yonghong Song <yhs@...com>
> Signed-off-by: Bo YU <tsu.yubo@...il.com>

Applied, thanks!

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ