From patchwork Fri Aug 9 15:24:04 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Sam James X-Patchwork-Id: 13758888 X-Patchwork-Delegate: bpf@iogearbox.net Received: from smtp.gentoo.org (woodpecker.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 113011DFE1; Fri, 9 Aug 2024 15:24:21 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=140.211.166.183 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1723217063; cv=none; b=ChGCcVRKDSOwhUOLqpVBj9+nVXRnomxXC+RiYHnuYQD74i5Z+dBXkUii8SptFt3luIr96USovjj60zWMJ2Nrwrw4gQcu9l2iHc7t81hwT6yA39rcEiDJgmhXaXI4Tb+Z+f0eBHmpXsAYDcVyZQRwLTSH5Mxfd2QHAsO9iBF060Q= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1723217063; c=relaxed/simple; bh=+wtquJAHNEvMNhnx7GTRaejycNUfyag/XLdCrd7poF0=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version:Content-Type; b=BUZC84cK98te4MKv4G044RA+OBxtRYRYH4anE36c7BX0DX+D6yJp9OqA4xa42lCgIVPcDNORaEc5mCVJ95/PQB2N0QZkl8oe8296ZKWL5Z2x+p7R8oDEEbeMYBDXprZFEfdnD8ZMUKCJCfxP6GbWoV6yFi2P/3jjjJb2uEXrKFA= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gentoo.org; spf=pass smtp.mailfrom=gentoo.org; arc=none smtp.client-ip=140.211.166.183 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gentoo.org Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gentoo.org From: Sam James To: Andrii Nakryiko , Eduard Zingerman , Alexei Starovoitov , Daniel Borkmann , Martin KaFai Lau , Song Liu , Yonghong Song , John Fastabend , KP Singh , Stanislav Fomichev , Hao Luo , Jiri Olsa Cc: "Jose E . Marchesi" , Andrew Pinski , =?utf-8?b?S2FjcGVyIFPFgm9tacWE?= =?utf-8?b?c2tp?= , =?utf-8?q?Arsen_Arsenovi?= =?utf-8?q?=C4=87?= , Sam James , bpf@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] libbpf: workaround -Wmaybe-uninitialized false positive Date: Fri, 9 Aug 2024 16:24:04 +0100 Message-ID: <3ebbe7a4e93a5ddc3a26e2e11d329801d7c8de6b.1723217044.git.sam@gentoo.org> X-Mailer: git-send-email 2.45.2 Precedence: bulk X-Mailing-List: bpf@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Patchwork-Delegate: bpf@iogearbox.net In `elf_close`, we get this with GCC 15 -O3 (at least): ``` In function ‘elf_close’, inlined from ‘elf_close’ at elf.c:53:6, inlined from ‘elf_find_func_offset_from_file’ at elf.c:384:2: elf.c:57:9: warning: ‘elf_fd.elf’ may be used uninitialized [-Wmaybe-uninitialized] 57 | elf_end(elf_fd->elf); | ^~~~~~~~~~~~~~~~~~~~ elf.c: In function ‘elf_find_func_offset_from_file’: elf.c:377:23: note: ‘elf_fd.elf’ was declared here 377 | struct elf_fd elf_fd; | ^~~~~~ In function ‘elf_close’, inlined from ‘elf_close’ at elf.c:53:6, inlined from ‘elf_find_func_offset_from_file’ at elf.c:384:2: elf.c:58:9: warning: ‘elf_fd.fd’ may be used uninitialized [-Wmaybe-uninitialized] 58 | close(elf_fd->fd); | ^~~~~~~~~~~~~~~~~ elf.c: In function ‘elf_find_func_offset_from_file’: elf.c:377:23: note: ‘elf_fd.fd’ was declared here 377 | struct elf_fd elf_fd; | ^~~~~~ ``` In reality, our use is fine, it's just that GCC doesn't model errno here (see linked GCC bug). Suppress -Wmaybe-uninitialized accordingly. Link: https://gcc.gnu.org/PR114952 Signed-off-by: Sam James --- tools/lib/bpf/elf.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/tools/lib/bpf/elf.c b/tools/lib/bpf/elf.c index c92e02394159e..ee226bb8e1af0 100644 --- a/tools/lib/bpf/elf.c +++ b/tools/lib/bpf/elf.c @@ -369,6 +369,9 @@ long elf_find_func_offset(Elf *elf, const char *binary_path, const char *name) return ret; } +#pragma GCC diagnostic push +/* https://gcc.gnu.org/PR114952 */ +#pragma GCC diagnostic ignored "-Wmaybe-uninitialized" /* Find offset of function name in ELF object specified by path. "name" matches * symbol name or name@@LIB for library functions. */ @@ -384,6 +387,7 @@ long elf_find_func_offset_from_file(const char *binary_path, const char *name) elf_close(&elf_fd); return ret; } +#pragma GCC diagnostic pop struct symbol { const char *name;