From patchwork Wed Dec 6 16:49:45 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Nathan Chancellor X-Patchwork-Id: 13482039 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3A117495C9; Wed, 6 Dec 2023 16:49:56 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="X+VQxK1x" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3B6A5C433C7; Wed, 6 Dec 2023 16:49:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1701881396; bh=NSUOAVeSOFQWxSdqEOoUPgeLtKumWFEG5ZtMNjOmQwg=; h=From:Subject:Date:To:Cc:From; b=X+VQxK1xzmrzWqwWzGcG/rb9BcUkRKWGvxpFySO7SPTSHFMBF6LVTTBIPT8WacvUu kTF49NDmDEQ6HaBW0DZU+M4gBDkFAfBV48JGyILbSIq2J1d/TGtK4WwwZ524+bCI5h IvOAbGNE3xosJ4nAlmIjQp2tTHDoBO0Bhfpj8rq3Bhwt2AKdmQGBjI9OxFXECM2uGR 8jbgz33ObyGucgW5UumUJa/KYC1Y2/JWrQh6KE1us8qIuva4wfcDzkLbwDuacIAbpn lV2VJAIzwVYnvR4NTsNYtlCgHOkIOvklOHnzxP2TBsEnCrutOkSiMvhGVwsgQx0o1b 1L6sHs2pa39lQ== From: Nathan Chancellor Subject: [PATCH v2 0/2] Enable -Wincompatible-function-pointer-types-strict under W=1 Date: Wed, 06 Dec 2023 09:49:45 -0700 Message-Id: <20231206-enable-wincompatible-function-pointer-types-strict-w-1-v2-0-91311b4c37b0@kernel.org> Precedence: bulk X-Mailing-List: linux-kbuild@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-B4-Tracking: v=1; b=H4sIACmmcGUC/6WOTQ6DIBCFr2JYdxqgarSr3qNxgTjqpBYIUK0x3 r3oFbp5yfeS97OxgJ4wsHu2MY8zBbImgbxkTI/KDAjUJWaSy5vgXAIa1U4ICxlt305FOqj/GB1 TEpwlE9FDXB0GCNGTjrCAgFwVZVvXbaXLnqVy57Gn7zn8bBKPFKL16/ljFof79+QsklS8Um1dF F0uu8cLvcHpav3Amn3ffz+sMbP9AAAA To: masahiroy@kernel.org Cc: ndesaulniers@google.com, morbo@google.com, justinstitt@google.com, keescook@chromium.org, samitolvanen@google.com, nicolas@fjasle.eu, linux-kbuild@vger.kernel.org, llvm@lists.linux.dev, patches@lists.linux.dev, kernel test robot , Anton Ivanov , Nathan Chancellor , richard@nod.at, johannes@sipsolutions.net, linux-um@lists.infradead.org X-Mailer: b4 0.13-dev X-Developer-Signature: v=1; a=openpgp-sha256; l=1477; i=nathan@kernel.org; h=from:subject:message-id; bh=NSUOAVeSOFQWxSdqEOoUPgeLtKumWFEG5ZtMNjOmQwg=; b=owGbwMvMwCUmm602sfCA1DTG02pJDKkFy4zE9+79nxRYHv6xenZkNP+cmLnfvLg/FK0IdfPVd Z7F15fRUcrCIMbFICumyFL9WPW4oeGcs4w3Tk2CmcPKBDKEgYtTACZiZsfwVyr1cPVloQ0heyTq JBvXep3p/h7kPHVnhHLZlbLbWydVxDAydP1v2HH+7MHdweePmx2+0jzlzprrR5g+P2Hi3ppzPY3 /MBsA X-Developer-Key: i=nathan@kernel.org; a=openpgp; fpr=2437CB76E544CB6AB3D9DFD399739260CB6CB716 -Wincompatible-function-pointer-types-strict is a warning in clang-16 and newer that is designed to catch potential kCFI failures at runtime. There is one set of warnings in drivers/counter that I have not been able to figure out a solution for so this cannot be enabled for a default build but adding the warning under W=1 will allow various CI systems to catch and report new instances so it will be easier to enable in a default build in the future. The kbuild test robot reported one instance in arch/um, which is cleared up by the first patch and has an ack from an arch/um maintainer, so this should be able to go in via the kbuild tree. --- Changes in v2: - Rebase on latest kbuild tree. - Pick up Nick's reviewed-by tag. - Include arch/um patch with Anton's ack to clear up warning reported by kbuild test robot on v1. - Link to v1: https://lore.kernel.org/r/20231002-enable-wincompatible-function-pointer-types-strict-w-1-v1-1-808ab955d42d@kernel.org --- Nathan Chancellor (2): um: net: Fix return type of uml_net_start_xmit() kbuild: Enable -Wincompatible-function-pointer-types-strict in W=1 arch/um/drivers/net_kern.c | 2 +- scripts/Makefile.extrawarn | 1 + 2 files changed, 2 insertions(+), 1 deletion(-) --- base-commit: 4b391dcb7cda8d1353d3bd123d0989550d48c0c9 change-id: 20231002-enable-wincompatible-function-pointer-types-strict-w-1-4a56b99b8c6f Best regards,