Received: by 2002:ac0:aed5:0:0:0:0:0 with SMTP id t21csp5917450imb; Fri, 8 Mar 2019 05:27:35 -0800 (PST) X-Google-Smtp-Source: APXvYqzTP4h9vkIzjN7gTWd4rCBKk+F0rKIU4PuOrYxB7EFkrNLxFDxYc32zFhnVnX/REvfzXi4U X-Received: by 2002:a63:4346:: with SMTP id q67mr16268363pga.92.1552051654931; Fri, 08 Mar 2019 05:27:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1552051654; cv=none; d=google.com; s=arc-20160816; b=YSDR7YWuMZyv/u22T6JnZKSBlP9BaMyF6M2WPAvGS2jsFUxmNk7ESJqjdVZ3UUJshA Zmauac0gxoiaUKNHzmRc0ClGgtaHDdPDx9Jv7ynj0YbwUNpbxhaN+QwhHJjzAvOogs0W 0969PE2kIDBjuoKcaiqmIEB3ba+ziccfNrwoSC36bnHvXb7/zmvPrulaATgK7noHQZDe 8XhtJFu2y2xpUDZZ6qAdaZsCI15K7eQ3hbYsKOrV9Iu4ucuuMgejpFDnaxRxM/LcBpsn GxfCn0TfsWKskVYfh8dCoyvp0q+H59ce3uEhQWEt37L6EIIOWUBo/0xxCgMLoTlWBcZY ZAPw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=cBKrv0/6v/pG+Z7akRKDVlzXCS5OB9pwY/0lrZNV1VM=; b=G9aQKZY4iMoycrNCYzFiryVUhI7kgbMJNMI76u1KANHUH7zAZRc8E7bX3HiVbHkGsY z3Lb6qKP7gu3wQyV74dge8I1OcnuNYwV3X5byj4EhJffGyFwFAkE5BL1TKiOmi0MpYPh PwwVD7AJA21cpBwCkofRhG4HWkm3gq9ExImBkzG+GEP459UDdHovEmYyMwE/U9u0+I4+ viU1pssUhTyik9M32a4NwYYGO2qzgQ1ZyvliL+IyL1UeJ24XHI7YgCs4BF5XuwXceo45 j5oGl7zXjWEAmKCWhU3m6ZISYTuiXoDdI94OpEUcTXgZPTSzXVXSvgvUzvoMN95iGeC6 U9cg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b6si6350215pgw.475.2019.03.08.05.27.18; Fri, 08 Mar 2019 05:27:34 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726659AbfCHN0z (ORCPT + 99 others); Fri, 8 Mar 2019 08:26:55 -0500 Received: from www62.your-server.de ([213.133.104.62]:56646 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726171AbfCHN0z (ORCPT ); Fri, 8 Mar 2019 08:26:55 -0500 Received: from [88.198.220.130] (helo=sslproxy01.your-server.de) by www62.your-server.de with esmtpsa (TLSv1.2:DHE-RSA-AES256-GCM-SHA384:256) (Exim 4.89_1) (envelope-from ) id 1h2FWQ-0002ys-NN; Fri, 08 Mar 2019 14:26:46 +0100 Received: from [2a02:120b:c3fc:feb0:dda7:bd28:a848:50e2] (helo=linux.home) by sslproxy01.your-server.de with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.89) (envelope-from ) id 1h2FWQ-0006PF-Cr; Fri, 08 Mar 2019 14:26:46 +0100 Subject: Re: [PATCH V3] bpf: fix warning about using plain integer as NULL To: Bo YU , ast@kernel.org, kafai@fb.com, ongliubraving@fb.com, yhs@fb.com, davem@davemloft.net Cc: netdev@vger.kernel.org, bpf@vger.kernel.org, linux-kernel@vger.kernel.org, yuzibode@126.com References: <20190308064551.17437-1-tsu.yubo@gmail.com> From: Daniel Borkmann Message-ID: <27188c5f-c1e4-44df-7553-1529332f41f8@iogearbox.net> Date: Fri, 8 Mar 2019 14:26:45 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.3.0 MIME-Version: 1.0 In-Reply-To: <20190308064551.17437-1-tsu.yubo@gmail.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.100.2/25382/Fri Mar 8 09:55:42 2019) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 03/08/2019 07:45 AM, Bo YU wrote: > Sparse warning below: > > sudo make C=2 CF=-D__CHECK_ENDIAN__ M=net/bpf/ > CHECK net/bpf//test_run.c > net/bpf//test_run.c:19:77: warning: Using plain integer as NULL pointer > ./include/linux/bpf-cgroup.h:295:77: warning: Using plain integer as NULL pointer > > Fixes: 8bad74f9840f ("bpf: extend cgroup bpf core to allow multiple cgroup storage types") > Acked-by: Yonghong Song > Signed-off-by: Bo YU Applied, thanks!