kernel/seccomp.c:1386:1: sparse: sparse: Using plain integer as NULL pointer

From: kernel test robot
Date: Tue Dec 19 2023 - 18:34:54 EST


tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
head: 55cb5f43689d7a9ea5bf35ef050f12334f197347
commit: aa0d6e70d3b34e710a6a57a53a3096cb2e0ea99f s390: autogenerate compat syscall wrappers
date: 4 years, 11 months ago
config: s390-randconfig-r111-20231116 (https://download.01.org/0day-ci/archive/20231220/202312200703.AoSwZY1b-lkp@xxxxxxxxx/config)
compiler: s390-linux-gcc (GCC) 13.2.0
reproduce: (https://download.01.org/0day-ci/archive/20231220/202312200703.AoSwZY1b-lkp@xxxxxxxxx/reproduce)

If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <lkp@xxxxxxxxx>
| Closes: https://lore.kernel.org/oe-kbuild-all/202312200703.AoSwZY1b-lkp@xxxxxxxxx/

sparse warnings: (new ones prefixed by >>)
>> kernel/seccomp.c:1386:1: sparse: sparse: Using plain integer as NULL pointer
>> kernel/seccomp.c:1386:1: sparse: sparse: Using plain integer as NULL pointer
--
>> ipc/syscall.c:110:1: sparse: sparse: Using plain integer as NULL pointer
>> ipc/syscall.c:110:1: sparse: sparse: Using plain integer as NULL pointer

vim +1386 kernel/seccomp.c

48dc92b9fc3926 Kees Cook 2014-06-25 1385
48dc92b9fc3926 Kees Cook 2014-06-25 @1386 SYSCALL_DEFINE3(seccomp, unsigned int, op, unsigned int, flags,
a5662e4d81c4d4 Tycho Andersen 2018-12-09 1387 void __user *, uargs)
48dc92b9fc3926 Kees Cook 2014-06-25 1388 {
48dc92b9fc3926 Kees Cook 2014-06-25 1389 return do_seccomp(op, flags, uargs);
48dc92b9fc3926 Kees Cook 2014-06-25 1390 }
48dc92b9fc3926 Kees Cook 2014-06-25 1391

:::::: The code at line 1386 was first introduced by commit
:::::: 48dc92b9fc3926844257316e75ba11eb5c742b2c seccomp: add "seccomp" syscall

:::::: TO: Kees Cook <keescook@xxxxxxxxxxxx>
:::::: CC: Kees Cook <keescook@xxxxxxxxxxxx>

--
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki