Hi Mickaël,

[auto build test WARNING on net-next/master]

url:    
https://github.com/0day-ci/linux/commits/Micka-l-Sala-n/Landlock-LSM-Toward-unprivileged-sandboxing/20170329-211258
config: i386-randconfig-x002-201713 (attached as .config)
compiler: gcc-6 (Debian 6.2.0-3) 6.2.0 20160901
reproduce:
        # save the attached .config to linux build tree
        make ARCH=i386 

All warnings (new ones prefixed by >>):

   kernel/bpf/syscall.c: In function 'bpf_prog_load':
>> kernel/bpf/syscall.c:886:25: warning: cast to pointer from integer of 
>> different size [-Wint-to-pointer-cast]
      size = check_user_buf((void __user *)attr->prog_subtype,
                            ^

vim +886 kernel/bpf/syscall.c

   870  
   871          prog->orig_prog = NULL;
   872          prog->jited = 0;
   873  
   874          atomic_set(&prog->aux->refcnt, 1);
   875          prog->gpl_compatible = is_gpl ? 1 : 0;
   876  
   877          /* find program type: socket_filter vs tracing_filter */
   878          err = find_prog_type(type, prog);
   879          if (err < 0)
   880                  goto free_prog;
   881  
   882          /* copy eBPF program subtype from user space */
   883          if (attr->prog_subtype) {
   884                  __u32 size;
   885  
 > 886                  size = check_user_buf((void __user *)attr->prog_subtype,
   887                                        attr->prog_subtype_size,
   888                                        sizeof(prog->subtype));
   889                  if (size < 0) {
   890                          err = size;
   891                          goto free_prog;
   892                  }
   893                  /* prog->subtype is __GFP_ZERO */
   894                  if (copy_from_user(&prog->subtype,

---
0-DAY kernel test infrastructure                Open Source Technology Center
https://lists.01.org/pipermail/kbuild-all                   Intel Corporation

Attachment: .config.gz
Description: application/gzip

Reply via email to