Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp258414pxy; Thu, 22 Apr 2021 01:12:06 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzlbhliOt9BHeUh42wszgI+zpu5wRl4tskm5fSPopmHt0AvnL6/2Bw8Gmvs1AgnZE8hbbGt X-Received: by 2002:a17:906:3385:: with SMTP id v5mr2042057eja.539.1619079126667; Thu, 22 Apr 2021 01:12:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619079126; cv=none; d=google.com; s=arc-20160816; b=vG5vtwIuNzBFBzdcK7TmeGs3cOBPlE8tzSoJFirbPCHp9/BqPcew9ESb71zJKfK/8U fKOGg4WxjtMzQlpe4qG5SxB7rrtom8X8LoUE+SRWqf6NG7B4sX/HUZexw/y3oSgLL38b Rx0ZubpnfdIMml4x5ITaC4nqtNnp1fMlTvmvJHeHmP6ChO7m3MFZKBb4w5TfAz5S+8Ke rg95X733cmH82WhhHo8AWPgGpSs0h0IlInLBQGR0o93m1QhmlNIyfxIqVwgnFaj5r5C/ +ynyvFIJSxFrLJKOxoHg2VzKCtyv0rlQCsiD8AhhlQd3LjAbU9o1GjNYnzc6vLZ3b8QD kBTA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:references:cc:to :subject; bh=MAAI/A8r7v6sLF279QUT2s3HLerjMsvDgpWDzS3WC7s=; b=rgAf4L4Cntkcp6X5S79TDf51xsUUWGEJBzyPtmYSwJxLsxgHXokvZ3f5IXwBuxkF3c AtG2L0G2VXiP8bXSuG45SEFPdafiRy5DEhQ1gzmDRgT6zokuuybZHSZuM9PbJUHaNetV 658BNmJiftyFUE9zpwaUw/yscwNvtszh8LZIDxkeNq/OaSjUU2WbtWXZbjVmW5j9PcFp 7zpGefIkD6usqe9BvM38rKIIC/XGXRJtnQTp3a7E5u0ovf9CMGNTv0qPbRg4EWotA25s OoCKSyVP3wGR2EDb7mmeuhxBVL87WoxS69QcOKbYeT+soFl3eecWRFRt1wz61z5sSjYi 0OiQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v22si1550186ejr.255.2021.04.22.01.11.42; Thu, 22 Apr 2021 01:12:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235216AbhDVILK (ORCPT + 99 others); Thu, 22 Apr 2021 04:11:10 -0400 Received: from out30-45.freemail.mail.aliyun.com ([115.124.30.45]:55106 "EHLO out30-45.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230241AbhDVILJ (ORCPT ); Thu, 22 Apr 2021 04:11:09 -0400 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R171e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e04395;MF=jiapeng.chong@linux.alibaba.com;NM=1;PH=DS;RN=5;SR=0;TI=SMTPD_---0UWNfQIX_1619079031; Received: from 30.13.165.105(mailfrom:jiapeng.chong@linux.alibaba.com fp:SMTPD_---0UWNfQIX_1619079031) by smtp.aliyun-inc.com(127.0.0.1); Thu, 22 Apr 2021 16:10:32 +0800 Subject: Re: [PATCH] selftests/bpf: fix warning comparing pointer to 0 To: Daniel Borkmann Cc: linux-kselftest@vger.kernel.org, netdev@vger.kernel.org, bpf@vger.kernel.org, linux-kernel@vger.kernel.org References: <1616032552-39866-1-git-send-email-jiapeng.chong@linux.alibaba.com> <4983305a-3119-bb4b-bb51-520ed5bd28ac@iogearbox.net> From: Jiapeng Chong Message-ID: <745a3bff-6b0e-f707-ffb5-d9f24063b57d@linux.alibaba.com> Date: Thu, 22 Apr 2021 16:09:45 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.10.0 MIME-Version: 1.0 In-Reply-To: <4983305a-3119-bb4b-bb51-520ed5bd28ac@iogearbox.net> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2021/3/19 0:23, Daniel Borkmann wrote: > On 3/18/21 2:55 AM, Jiapeng Chong wrote: >> Fix the following coccicheck warning: >> >> ./tools/testing/selftests/bpf/progs/fentry_test.c:76:15-16: WARNING >> comparing pointer to 0. >> >> Reported-by: Abaci Robot >> Signed-off-by: Jiapeng Chong >> --- >>   tools/testing/selftests/bpf/progs/fentry_test.c | 4 ++-- >>   1 file changed, 2 insertions(+), 2 deletions(-) >> >> diff --git a/tools/testing/selftests/bpf/progs/fentry_test.c >> b/tools/testing/selftests/bpf/progs/fentry_test.c >> index 5f645fd..d4247d6 100644 >> --- a/tools/testing/selftests/bpf/progs/fentry_test.c >> +++ b/tools/testing/selftests/bpf/progs/fentry_test.c >> @@ -64,7 +64,7 @@ struct bpf_fentry_test_t { >>   SEC("fentry/bpf_fentry_test7") >>   int BPF_PROG(test7, struct bpf_fentry_test_t *arg) >>   { >> -    if (arg == 0) >> +    if (!arg) >>           test7_result = 1; >>       return 0; >>   } >> @@ -73,7 +73,7 @@ int BPF_PROG(test7, struct bpf_fentry_test_t *arg) >>   SEC("fentry/bpf_fentry_test8") >>   int BPF_PROG(test8, struct bpf_fentry_test_t *arg) >>   { >> -    if (arg->a == 0) >> +    if (!arg->a) >>           test8_result = 1; >>       return 0; >>   } >> > > This doesn't apply. Please rebase against bpf-next tree, and also make > sure to > squash any other such patches into a single one. OK, I'll submit it to the latest branch bpf-next tree later.