Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp1762320imm; Sun, 27 May 2018 15:37:53 -0700 (PDT) X-Google-Smtp-Source: AB8JxZpv1CNd7hU6uRSCD+qY3/pNH4UgNykePs78W2GagQxuATNMIkR73Y90QEYi/uEKcKIRPnYB X-Received: by 2002:a62:303:: with SMTP id 3-v6mr11041431pfd.255.1527460673220; Sun, 27 May 2018 15:37:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527460673; cv=none; d=google.com; s=arc-20160816; b=tf8RCjddnA9lM9eYtehT3G/Zelsm64K4RwQsHWWaUMQuWkiKFd4yxw+xW/Zgx47wZc RXrFZ9b0DkEFs2quaVH7YeoowV7Tp5JtOR2PBNCWx3io0CjXrYJoOM4f5Px4iZu6snXb bMY7q3PMkqErTAv08sl1OuYHVkb9b1xTstzSggg+nNwCvu+kO7huQ4GP+AYgiz7Ir3b/ G8QjtrCHLRfrPPdi2JiHIjywJgPyGm5osDsyF3rkeRCC1eYn/V1EBqGsoyxDj1uufiJT BvAgWJ+H4n6fGOiZO3Ulc1yuy60zt3foh7CRZQcNXLr1DxKOIkfUiAtuTcNDu7Xz08gp mF/w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=7+Yoqst8AO9o1HmKRuO3gVkrMy8C66FcwGFR1uhyRww=; b=o9to8KWTQikYSgT+hqySJNcjZfm+wmHyMSaJtnVAMpKFFJOdZP7lYca0leUc1G8U+p 63VL+RPiIpjhRPyyGF8qqj8U0gNf8UiECURbWiZsr+n8r/8QY6TA0cLg17iJOOmqwuQK xAeNWdR+iXBnu8PWjlgI5nG1etm50bEckBWPc0bhPtWx0W/hQBywYVZ7IGjDXq595X4e lTZvQRrgq5M7KgTz1JexCwR33hKshF1/a+jkFY5CQDapZWNzLaYQ5Wl5lcuhnR0u1C8D Xs/A+TwCd+q0qbqqa0ZpGt3fHgzl65DMQsZWwQujaFsJEsXCSBtdHnwE5wR4CPk/s1Oo hGAw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y11-v6si28704824plg.376.2018.05.27.15.37.38; Sun, 27 May 2018 15:37:53 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752668AbeE0WhN (ORCPT + 99 others); Sun, 27 May 2018 18:37:13 -0400 Received: from www62.your-server.de ([213.133.104.62]:49201 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751976AbeE0WhK (ORCPT ); Sun, 27 May 2018 18:37:10 -0400 Received: from [62.202.221.10] (helo=linux.home) by www62.your-server.de with esmtpsa (TLSv1.2:DHE-RSA-AES256-SHA:256) (Exim 4.85_2) (envelope-from ) id 1fN4Hg-000081-At; Mon, 28 May 2018 00:37:04 +0200 Subject: Re: [PATCH, net-next 2/2] bpf: avoid -Wmaybe-uninitialized warning To: Arnd Bergmann , Alexei Starovoitov Cc: Yonghong Song , "David S. Miller" , Song Liu , Martin KaFai Lau , Chenbo Feng , Jakub Kicinski , netdev@vger.kernel.org, linux-kernel@vger.kernel.org References: <20180525213331.2115471-1-arnd@arndb.de> <20180525213331.2115471-2-arnd@arndb.de> From: Daniel Borkmann Message-ID: <61a96e95-a256-ef40-c25d-e7dbf4c51b02@iogearbox.net> Date: Mon, 28 May 2018 00:37:03 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.3.0 MIME-Version: 1.0 In-Reply-To: <20180525213331.2115471-2-arnd@arndb.de> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.99.3/24609/Sun May 27 22:30:39 2018) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 05/25/2018 11:33 PM, Arnd Bergmann wrote: > The stack_map_get_build_id_offset() function is too long for gcc to track > whether 'work' may or may not be initialized at the end of it, leading > to a false-positive warning: > > kernel/bpf/stackmap.c: In function 'stack_map_get_build_id_offset': > kernel/bpf/stackmap.c:334:13: error: 'work' may be used uninitialized in this function [-Werror=maybe-uninitialized] > > This removes the 'in_nmi_ctx' flag and uses the state of that variable > itself to see if it got initialized. > > Fixes: bae77c5eb5b2 ("bpf: enable stackmap with build_id in nmi context") > Signed-off-by: Arnd Bergmann Applied to bpf-next, thanks Arnd!