Nathan, > With clang's kernel control flow integrity (kCFI, CONFIG_CFI_CLANG), > indirect call targets are validated against the expected function > pointer prototype to make sure the call target is valid to help > mitigate ROP attacks. If they are not identical, there is a failure at > run time, which manifests as either a kernel panic or thread getting > killed. A proposed warning in clang aims to catch these at compile > time, which reveals: Applied to 6.2/scsi-staging, thanks! -- Martin K. Petersen Oracle Linux Engineering