Message ID | 20220321185802.824223-1-joannekoong@fb.com (mailing list archive) |
---|---|
State | Accepted |
Commit | d56c9fe6a06820d5ef8188d96bf4345c7bdba249 |
Delegated to: | BPF |
Headers | show |
Series | [bpf-next,v1] bpf: Fix warning for cast from restricted gfp_t in verifier | expand |
Hello: This patch was applied to bpf/bpf-next.git (master) by Alexei Starovoitov <ast@kernel.org>: On Mon, 21 Mar 2022 11:58:02 -0700 you wrote: > From: Joanne Koong <joannelkoong@gmail.com> > > This fixes the sparse warning reported by the kernel test robot: > > kernel/bpf/verifier.c:13499:47: sparse: warning: cast from restricted gfp_t > kernel/bpf/verifier.c:13501:47: sparse: warning: cast from restricted gfp_t > > [...] Here is the summary with links: - [bpf-next,v1] bpf: Fix warning for cast from restricted gfp_t in verifier https://git.kernel.org/bpf/bpf-next/c/d56c9fe6a068 You are awesome, thank you!
diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c index 571ccd7f04eb..d175b70067b3 100644 --- a/kernel/bpf/verifier.c +++ b/kernel/bpf/verifier.c @@ -13496,9 +13496,9 @@ static int do_misc_fixups(struct bpf_verifier_env *env) insn->imm == BPF_FUNC_sk_storage_get || insn->imm == BPF_FUNC_inode_storage_get) { if (env->prog->aux->sleepable) - insn_buf[0] = BPF_MOV64_IMM(BPF_REG_5, (__s32)GFP_KERNEL); + insn_buf[0] = BPF_MOV64_IMM(BPF_REG_5, (__force __s32)GFP_KERNEL); else - insn_buf[0] = BPF_MOV64_IMM(BPF_REG_5, (__s32)GFP_ATOMIC); + insn_buf[0] = BPF_MOV64_IMM(BPF_REG_5, (__force __s32)GFP_ATOMIC); insn_buf[1] = *insn; cnt = 2;