lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 25 Mar 2022 01:15:41 +0000 From: 白浩文 <baihaowen@...zu.com> To: Martin KaFai Lau <kafai@...com> CC: "shuah@...nel.org" <shuah@...nel.org>, "ast@...nel.org" <ast@...nel.org>, "daniel@...earbox.net" <daniel@...earbox.net>, "andrii@...nel.org" <andrii@...nel.org>, "songliubraving@...com" <songliubraving@...com>, "yhs@...com" <yhs@...com>, "john.fastabend@...il.com" <john.fastabend@...il.com>, "kpsingh@...nel.org" <kpsingh@...nel.org>, "linux-kselftest@...r.kernel.org" <linux-kselftest@...r.kernel.org>, "netdev@...r.kernel.org" <netdev@...r.kernel.org>, "bpf@...r.kernel.org" <bpf@...r.kernel.org>, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org> Subject: 答复: [PATCH] selftests/bpf: Fix warning comparing pointer to 0 hi, kafai ./scripts/coccicheck report this warning. ________________________________________ 发件人: Martin KaFai Lau <kafai@...com> 发送时间: 2022年3月25日 4:28:48 收件人: 白浩文 抄送: shuah@...nel.org; ast@...nel.org; daniel@...earbox.net; andrii@...nel.org; songliubraving@...com; yhs@...com; john.fastabend@...il.com; kpsingh@...nel.org; linux-kselftest@...r.kernel.org; netdev@...r.kernel.org; bpf@...r.kernel.org; linux-kernel@...r.kernel.org 主题: Re: [PATCH] selftests/bpf: Fix warning comparing pointer to 0 On Thu, Mar 24, 2022 at 10:08:45AM +0800, Haowen Bai wrote: > Avoid pointer type value compared with 0 to make code clear. Which compiler version that warns ? I don't see it with the latest llvm-project from github. The patch lgtm. Acked-by: Martin KaFai Lau <kafai@...com>
Powered by blists - more mailing lists