]> www.infradead.org Git - users/dwmw2/linux.git/commitdiff
kmsan: do not pass NULL pointers as 0
authorIlya Leoshkevich <iii@linux.ibm.com>
Thu, 27 Jun 2024 14:57:47 +0000 (16:57 +0200)
committerAndrew Morton <akpm@linux-foundation.org>
Thu, 4 Jul 2024 02:30:26 +0000 (19:30 -0700)
sparse complains about passing NULL pointers as 0.  Fix all instances.

Link: https://lkml.kernel.org/r/20240627145754.27333-3-iii@linux.ibm.com
Signed-off-by: Ilya Leoshkevich <iii@linux.ibm.com>
Reported-by: kernel test robot <lkp@intel.com>
Closes: https://lore.kernel.org/oe-kbuild-all/202406272033.KejtfLkw-lkp@intel.com/
Reviewed-by: Alexander Potapenko <glider@google.com>
Cc: Dmitry Vyukov <dvyukov@google.com>
Cc: Marco Elver <elver@google.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
mm/kmsan/hooks.c
mm/kmsan/instrumentation.c

index 26d86dfdc819751e18c7bdd3408c0a098a400059..3ea50f09311fd7fa9860d44125e93f62b43316d4 100644 (file)
@@ -303,7 +303,8 @@ void kmsan_handle_urb(const struct urb *urb, bool is_out)
        if (is_out)
                kmsan_internal_check_memory(urb->transfer_buffer,
                                            urb->transfer_buffer_length,
-                                           /*user_addr*/ 0, REASON_SUBMIT_URB);
+                                           /*user_addr*/ NULL,
+                                           REASON_SUBMIT_URB);
        else
                kmsan_internal_unpoison_memory(urb->transfer_buffer,
                                               urb->transfer_buffer_length,
@@ -316,14 +317,14 @@ static void kmsan_handle_dma_page(const void *addr, size_t size,
 {
        switch (dir) {
        case DMA_BIDIRECTIONAL:
-               kmsan_internal_check_memory((void *)addr, size, /*user_addr*/ 0,
-                                           REASON_ANY);
+               kmsan_internal_check_memory((void *)addr, size,
+                                           /*user_addr*/ NULL, REASON_ANY);
                kmsan_internal_unpoison_memory((void *)addr, size,
                                               /*checked*/ false);
                break;
        case DMA_TO_DEVICE:
-               kmsan_internal_check_memory((void *)addr, size, /*user_addr*/ 0,
-                                           REASON_ANY);
+               kmsan_internal_check_memory((void *)addr, size,
+                                           /*user_addr*/ NULL, REASON_ANY);
                break;
        case DMA_FROM_DEVICE:
                kmsan_internal_unpoison_memory((void *)addr, size,
@@ -418,8 +419,8 @@ void kmsan_check_memory(const void *addr, size_t size)
 {
        if (!kmsan_enabled)
                return;
-       return kmsan_internal_check_memory((void *)addr, size, /*user_addr*/ 0,
-                                          REASON_ANY);
+       return kmsan_internal_check_memory((void *)addr, size,
+                                          /*user_addr*/ NULL, REASON_ANY);
 }
 EXPORT_SYMBOL(kmsan_check_memory);
 
index 94b49fac9d8b23402f0e68db4da3469eba43add7..02a405e55d6ca26803b6cc4d829d2cd75768d683 100644 (file)
@@ -315,8 +315,8 @@ void __msan_warning(u32 origin)
        if (!kmsan_enabled || kmsan_in_runtime())
                return;
        kmsan_enter_runtime();
-       kmsan_report(origin, /*address*/ 0, /*size*/ 0,
-                    /*off_first*/ 0, /*off_last*/ 0, /*user_addr*/ 0,
+       kmsan_report(origin, /*address*/ NULL, /*size*/ 0,
+                    /*off_first*/ 0, /*off_last*/ 0, /*user_addr*/ NULL,
                     REASON_ANY);
        kmsan_leave_runtime();
 }