Received: by 2002:a05:6358:bb9e:b0:b9:5105:a5b4 with SMTP id df30csp1871738rwb; Sun, 4 Sep 2022 04:08:17 -0700 (PDT) X-Google-Smtp-Source: AA6agR6KOTptGbODQAagSxvAxVbwB7+X6XDToqMi33RuorjCXxDbowptLPl/0DURYRLWw1kMjdsI X-Received: by 2002:a17:906:8479:b0:73d:da77:8fbe with SMTP id hx25-20020a170906847900b0073dda778fbemr30014450ejc.373.1662289696798; Sun, 04 Sep 2022 04:08:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1662289696; cv=none; d=google.com; s=arc-20160816; b=UZMeZiYJBYhvERY9yD/JEdNiPHxmfMvoHJHcLRnkSywXurh5V7c6lNdNvQ+UuI9lH1 cxpccxnpFYJDk76oO4AI/EC27WmRGtVl+Z5+aLZeO1EMsLkSng0Ij+K1VoLdgtUMGpW4 dm2+f+Rg09loUH96yhsDqflPGzuNX5ydMjOR6nMdr1Lnp9WaTZJCH06pTQ9yGWUxyfcC KC8i2xKqra3zKlNk6QILnN13rcWRslQUvyqF0CnM9m6q1i3MiOJyjLHWZo1wvu735cXI 3I32fh2UYioE2bRzsCT6hZ2R+07vGWagW0Bv2VEno0Pi3IkutKE/7vJLDBBxDzgvNZmI vpwA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=nm3l/5tmVYSxCPHkufqRYaNkN+NHrBZPKsqsiOzgYMw=; b=yZhPMisT46Uo69S+l+cr07CIZOvGd0V6wGj2uM6yRF/mA97ORtNocPVt/I94GaFxyO Wo8brMFOKKUnwZLozahwQhaBHMppPLW+f5sHjRvWvr57fHvLMYIVdE4dzILBpb5l7eDE 9H6Px0ZoHzo8KhhXauqFYIfPEMwQ2RtAwvwFXJGTTah+co2+BqSfN0HxazERG2Kwj824 O5aFwVJQe/pabUeXHsgcQsA4KYGzBNuSCPIEacqXVu+1uKIrecia6VcJqa2pYnBdIdug 7BDGFPDlo8Wi6dlY4vVdN56/Y96b8LXAHeZlxwl94Z3IBClFHVgmGNTkgYSckhm+7vtX wfuQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=d6E95ITP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id s7-20020a056402520700b00448aec609dfsi6155754edd.20.2022.09.04.04.07.47; Sun, 04 Sep 2022 04:08:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=d6E95ITP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233904AbiIDKg5 (ORCPT + 99 others); Sun, 4 Sep 2022 06:36:57 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33656 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229446AbiIDKgw (ORCPT ); Sun, 4 Sep 2022 06:36:52 -0400 Received: from mail-wr1-x436.google.com (mail-wr1-x436.google.com [IPv6:2a00:1450:4864:20::436]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CFB2D1A075; Sun, 4 Sep 2022 03:36:50 -0700 (PDT) Received: by mail-wr1-x436.google.com with SMTP id t7so2773557wrm.10; Sun, 04 Sep 2022 03:36:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date; bh=nm3l/5tmVYSxCPHkufqRYaNkN+NHrBZPKsqsiOzgYMw=; b=d6E95ITP96aHNOZfgRwe9C8jQAY6whrpnLChU+l6AncOxrOKbrFeBz9AXkKp2GSpaz PonplmjU5dTsqLmz2BLQftVawRqyTWUYXGW6boj/pyH2HdJb0B8fxffmIXxPMEUURECx Io0PODKEPVqTYVcHEMBqe0snbv1myJt5zDPLTzgawoiH/qTHspOAG17S+TROSZ9aloDI Qaxf22gyuU+ZC3sVDEkDurJvrGy9i3QADEmGrnP1NYwqk8c73wIh4UMuRKdwTXc241GP /U4evSAojN1WtfwveoJq7O8tjXUnki1Wvku/b0BafB9cmjidMQH6fZO69JJURJ1ROAu9 U4CQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date; bh=nm3l/5tmVYSxCPHkufqRYaNkN+NHrBZPKsqsiOzgYMw=; b=zMPdgYkGpOyUSBtJxbddmiuSSIMwSGrHh+/R/rho2m1CdPEEEzlUnmP1Q9wvjoldxK Bw6OmmcVLRKkSBRd80SUD7SwsH5DvdkSydlm42Bnub8QkUVYGjDj9deJGelgP87xjFFJ aawKsQvo6BxsYXzhdDrA287cnEBBpdk3JQxB2Z18JiNNKxNDh6gib6js3tCPTUDaIfBn RaGbKHV1cNvoyUKsJFp8/HPafHh9YJPnaBxd/G170YBkl8oy7psW0blPwvNRhffftGF7 8uOtYi4WJLAvGkbORWyStLAXrxnXdLL6Ft89EsGmc3oOAyXu8i4bMUlNjK9yWdaCNK8p gWww== X-Gm-Message-State: ACgBeo28X79JDgKhjCEFZTeFWZaOXKukY8o53JDO9k7zDO9rcj23GMxM IcnfWYXztcQHKBKXpcNMZ5b/MlAErYVR X-Received: by 2002:a5d:684e:0:b0:220:63df:3760 with SMTP id o14-20020a5d684e000000b0022063df3760mr20572296wrw.508.1662287809289; Sun, 04 Sep 2022 03:36:49 -0700 (PDT) Received: from playground (host-92-29-143-165.as13285.net. [92.29.143.165]) by smtp.gmail.com with ESMTPSA id p17-20020a5d4e11000000b00225250f2d1bsm5718150wrt.94.2022.09.04.03.36.48 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 04 Sep 2022 03:36:49 -0700 (PDT) Date: Sun, 4 Sep 2022 11:36:41 +0100 From: Jules Irenge To: Kumar Kartikeya Dwivedi Cc: bpf@vger.kernel.org, linux-kernel@vger.kernel.org, john.fastabend@gmail.com, ast@kernel.org Subject: Re: [PATCH 1/2] bpf: Fix warning of Using plain integer as NULL pointer Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Sep 03, 2022 at 09:10:31PM +0200, Kumar Kartikeya Dwivedi wrote: > On Sat, 3 Sept 2022 at 20:59, Jules Irenge wrote: > > > > This patch fixes a warning generated by Sparse > > > > "Using plain integer as NULL pointer" > > > > by replacing the offending 0 by NULL. > > > > Signed-off-by: Jules Irenge > > --- > > kernel/bpf/syscall.c | 2 +- > > 1 file changed, 1 insertion(+), 1 deletion(-) > > > > diff --git a/kernel/bpf/syscall.c b/kernel/bpf/syscall.c > > index 27760627370d..427b7e3829e0 100644 > > --- a/kernel/bpf/syscall.c > > +++ b/kernel/bpf/syscall.c > > @@ -598,7 +598,7 @@ void bpf_map_free_kptrs(struct bpf_map *map, void *map_value) > > if (off_desc->type == BPF_KPTR_UNREF) { > > u64 *p = (u64 *)btf_id_ptr; > > > > - WRITE_ONCE(p, 0); > > + WRITE_ONCE(p, NULL); > > Uff, this should have been WRITE_ONCE(*p, 0) instead. Mea Culpa. > Can you make that fix? It's not a big problem since it's just that the > pointer won't be cleared on map value delete (and there is nothing to > reclaim for the unref case when map is freed), so you can target > bpf-next with a Fixes tag. > So in your patch you will need [PATCH bpf-next] in the subject and the > fixes tag would be: > Fixes: 14a324f6a67e ("bpf: Wire up freeing of referenced kptr") Thanks, already done. if there is anything I miss, please let me know. I am on a learning journey. Jules