Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp2882796ybb; Sun, 5 Apr 2020 19:47:32 -0700 (PDT) X-Google-Smtp-Source: APiQypLFvgQyOAX0qp87TWQdY72HNKitdryePQBXfWFJXyqQSo27vCH5gBX0LWpi6AYH643rIIbz X-Received: by 2002:a05:6830:239b:: with SMTP id l27mr16110799ots.278.1586141252752; Sun, 05 Apr 2020 19:47:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1586141252; cv=none; d=google.com; s=arc-20160816; b=zNdwjMTId9z4ora8pXygTI9QWvQ1U1b/FhiTpRn1XnfEBpzL2Rkv4IzFsJVMHkTFUV gBEplFcB9vKuB2wv3i/2yB7LWyMdC7prGQrrmMrWcr6k4rTZ8q0cfQriPHw40HCLk4Kt cX55LGjmqCu9tw2+hIAamTk7l9Haeb6R+gL0Uq/G/3Ldg+GSdjcfeh2NzwxLYrrGN9Ix +4a6BYucs+cnA63AaADPyI3AmMuBB40gWgTkNf9Vc6BIZcsN/QPe4QfJsM8IxhVvMt+0 Gblgy+VpOFB5V4iLKuTUQ5W28U9nCp8usA0c7dXGoeA/2tJaqM0EXxdadZOLtR5DMJ+u Ewqw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=56voqtFYeudq/VV/J/Sg075FrS52rvV+pYrlJWqB8HY=; b=eirf9oLqvZOVHxIpnPp9aU78dG9933ugQoHRxPRrJRPVFz8SQs4cWSP/NRHb5bbNKQ DtaQ7C6c04VK41UaAFRlcpx+dAhudl8RHr7Je8xclMAUBLejULh0Prni6NNaSAtL1TaT 71QX9N/xZrQlkPZ1Y3LeR9X80V4poYv4r/9dJJdYZSPmtKYr5PcPQ0d3+kjBBUW/hM3c /q3SoD4T56CPX/KCeYufv8mu3UubdOugYpyFbdHrC/thb1dCs9+rfEdazu7S14T0t8C3 9l0IWpzAC4pw4kH8nRoVfbGJJLAwzgeXOByfF8RbKUO4DxnqfCRItRhmGGwB3Rwt9QCq kraw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=WkVVGgWF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 131si6860029oid.75.2020.04.05.19.47.18; Sun, 05 Apr 2020 19:47:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=WkVVGgWF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726514AbgDFCqv (ORCPT + 99 others); Sun, 5 Apr 2020 22:46:51 -0400 Received: from mail-qk1-f194.google.com ([209.85.222.194]:45039 "EHLO mail-qk1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726408AbgDFCqu (ORCPT ); Sun, 5 Apr 2020 22:46:50 -0400 Received: by mail-qk1-f194.google.com with SMTP id j4so14739008qkc.11; Sun, 05 Apr 2020 19:46:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=56voqtFYeudq/VV/J/Sg075FrS52rvV+pYrlJWqB8HY=; b=WkVVGgWFJTYzEXNm/LIEDG1GuUzpOrz4DjCrAvs6wKize+qZNPWC8LlXA/6BG2CCeQ SJ9N1/YOs7HN1KAK8sDPTBaKUzmpGzvdiiIy7o/0MJsi7LkA+3TtqJa/tNCOztOMcBsK 3S/8r7YXulhYeSCnqYYPCPbyhbCLgBGMa1b3XMGqI3yIqkBAPfQwpnGI/WMf7WUguVf3 GCwBj4gNVCmUMijdwtz3UtUGPH55hLfUtJshRftvHkKkW5krkt3w4OK8x2dkBtDsUKj5 /QP8/9hCmdMu8DaDDqtYiFq1YJA1pxs2KacuBdZCzo9jogRc2h0gA0/MG5LxNF6/4ujg uaZA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=56voqtFYeudq/VV/J/Sg075FrS52rvV+pYrlJWqB8HY=; b=JuntiiMeWgfxxcdlFbLTMWYM2jzwOu732HEhVuQh7jpmkv08HOr1UaWMDpFl46/35i iiLeyL37Ipr9JtdmwqqWxMvlsHD3bkLsx8TTY0T71Qt3vHvxtj9b0UBoRcqO+SVhZgpA V24Tcz8NuDh82KKeOScuONyHOOQejV1Q4kSCTWduFcTd+y1R2OUBkHTTDseI1K27LDZ9 h6AUWn4iyEcFwIJJI0+Va012Qnqj1vMELxBh+mN3NngaktkRFMS/SWse3eZAE/KeNkaG OEs/fNEZ04tfBUb/x5Q/2bIdYp1APH+K61m7M+/kMO9sica1GwE8aMKIEHq815VYaKII Xxag== X-Gm-Message-State: AGi0PuaQpL2LAypLb3KQ7pp1J+TvK75eBXyVCPVPTB8KytZv1G7wzuCw aZAjA1Qkf3amfoLusEem14x/EeU3OTD9r788dIk= X-Received: by 2002:a05:620a:88e:: with SMTP id b14mr20514490qka.449.1586141209712; Sun, 05 Apr 2020 19:46:49 -0700 (PDT) MIME-Version: 1.0 References: <20200404051430.698058-1-jcline@redhat.com> In-Reply-To: <20200404051430.698058-1-jcline@redhat.com> From: Andrii Nakryiko Date: Sun, 5 Apr 2020 19:46:38 -0700 Message-ID: Subject: Re: [PATCH] libbpf: Initialize *nl_pid so gcc 10 is happy To: Jeremy Cline Cc: Alexei Starovoitov , Daniel Borkmann , Martin KaFai Lau , Song Liu , Yonghong Song , Andrii Nakryiko , John Fastabend , KP Singh , "David S . Miller" , Jakub Kicinski , Jesper Dangaard Brouer , Networking , bpf , open list Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Apr 3, 2020 at 10:15 PM Jeremy Cline wrote: > > Builds of Fedora's kernel-tools package started to fail with "may be > used uninitialized" warnings for nl_pid in bpf_set_link_xdp_fd() and > bpf_get_link_xdp_info() on the s390 architecture. > > Although libbpf_netlink_open() always returns a negative number when it > does not set *nl_pid, the compiler does not determine this and thus > believes the variable might be used uninitialized. Assuage gcc's fears > by explicitly initializing nl_pid. > > Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1807781 > Signed-off-by: Jeremy Cline > --- Yep, unfortunately compiler is not that smart. Acked-by: Andrii Nakryiko > tools/lib/bpf/netlink.c | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/tools/lib/bpf/netlink.c b/tools/lib/bpf/netlink.c > index 18b5319025e19..9a14694176de0 100644 > --- a/tools/lib/bpf/netlink.c > +++ b/tools/lib/bpf/netlink.c > @@ -142,7 +142,7 @@ static int __bpf_set_link_xdp_fd_replace(int ifindex, int fd, int old_fd, > struct ifinfomsg ifinfo; > char attrbuf[64]; > } req; > - __u32 nl_pid; > + __u32 nl_pid = 0; > > sock = libbpf_netlink_open(&nl_pid); > if (sock < 0) > @@ -288,7 +288,7 @@ int bpf_get_link_xdp_info(int ifindex, struct xdp_link_info *info, > { > struct xdp_id_md xdp_id = {}; > int sock, ret; > - __u32 nl_pid; > + __u32 nl_pid = 0; > __u32 mask; > > if (flags & ~XDP_FLAGS_MASK || !info_size) > -- > 2.26.0 >