diff options
author | Hailong Liu <liu.hailong6@zte.com.cn> | 2021-05-11 22:04:29 +0800 |
---|---|---|
committer | Andrii Nakryiko <andrii@kernel.org> | 2021-05-12 12:29:43 -0700 |
commit | 0303ce17347a02863c4ddef9777a42ff0315acb6 (patch) | |
tree | ac07054188b6d51d6d18fd17241de1e3ba512e03 /samples | |
parent | e5670fa0293b05e8e24dae7d18481aba281cb85d (diff) | |
download | linux-stable-0303ce17347a02863c4ddef9777a42ff0315acb6.tar.gz linux-stable-0303ce17347a02863c4ddef9777a42ff0315acb6.tar.bz2 linux-stable-0303ce17347a02863c4ddef9777a42ff0315acb6.zip |
samples, bpf: Suppress compiler warning
While cross compiling on ARM32 , the casting from pointer to __u64 will
cause warnings:
samples/bpf/task_fd_query_user.c: In function 'main':
samples/bpf/task_fd_query_user.c:399:23: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
399 | uprobe_file_offset = (__u64)main - (__u64)&__executable_start;
| ^
samples/bpf/task_fd_query_user.c:399:37: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
399 | uprobe_file_offset = (__u64)main - (__u64)&__executable_start;
Workaround this by using "unsigned long" to adapt to different ARCHs.
Signed-off-by: Hailong Liu <liu.hailong6@zte.com.cn>
Signed-off-by: Andrii Nakryiko <andrii@kernel.org>
Link: https://lore.kernel.org/bpf/20210511140429.89426-1-liuhailongg6@163.com
Diffstat (limited to 'samples')
-rw-r--r-- | samples/bpf/task_fd_query_user.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/samples/bpf/task_fd_query_user.c b/samples/bpf/task_fd_query_user.c index a78025b0026b..c9a0ca8351fd 100644 --- a/samples/bpf/task_fd_query_user.c +++ b/samples/bpf/task_fd_query_user.c @@ -396,7 +396,7 @@ int main(int argc, char **argv) * on different systems with different compilers. The right way is * to parse the ELF file. We took a shortcut here. */ - uprobe_file_offset = (__u64)main - (__u64)&__executable_start; + uprobe_file_offset = (unsigned long)main - (unsigned long)&__executable_start; CHECK_AND_RET(test_nondebug_fs_probe("uprobe", (char *)argv[0], uprobe_file_offset, 0x0, false, BPF_FD_TYPE_UPROBE, |