diff options
author | Ben Dooks <ben.dooks@sifive.com> | 2022-07-14 11:03:22 +0100 |
---|---|---|
committer | Andrii Nakryiko <andrii@kernel.org> | 2022-07-15 09:55:20 -0700 |
commit | a2a5580fcbf808e7c2310e4959b62f9d2157fdb6 (patch) | |
tree | 05cbe84ca944c60cb926bfeb37fccf8975b4f048 /samples | |
parent | 9c7c48d6a1e2eb5192ad5294c1c4dbd42a88e88b (diff) | |
download | lwn-a2a5580fcbf808e7c2310e4959b62f9d2157fdb6.tar.gz lwn-a2a5580fcbf808e7c2310e4959b62f9d2157fdb6.zip |
bpf: Fix check against plain integer v 'NULL'
When checking with sparse, btf_show_type_value() is causing a
warning about checking integer vs NULL when the macro is passed
a pointer, due to the 'value != 0' check. Stop sparse complaining
about any type-casting by adding a cast to the typeof(value).
This fixes the following sparse warnings:
kernel/bpf/btf.c:2579:17: warning: Using plain integer as NULL pointer
kernel/bpf/btf.c:2581:17: warning: Using plain integer as NULL pointer
kernel/bpf/btf.c:3407:17: warning: Using plain integer as NULL pointer
kernel/bpf/btf.c:3758:9: warning: Using plain integer as NULL pointer
Signed-off-by: Ben Dooks <ben.dooks@sifive.com>
Signed-off-by: Andrii Nakryiko <andrii@kernel.org>
Acked-by: Yonghong Song <yhs@fb.com>
Link: https://lore.kernel.org/bpf/20220714100322.260467-1-ben.dooks@sifive.com
Diffstat (limited to 'samples')
0 files changed, 0 insertions, 0 deletions