security/integrity/platform_certs/keyring_handler.c:66:16: sparse: sparse: Using plain integer as NULL pointer

From: kernel test robot
Date: Fri Aug 07 2020 - 00:16:43 EST


tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
head: 86cfccb66937dd6cbf26ed619958b9e587e6a115
commit: ad723674d6758478829ee766e3f1a2a24d56236f x86/efi: move common keyring handler functions to new file
date: 9 months ago
config: x86_64-randconfig-s022-20200807 (attached as .config)
compiler: gcc-9 (Debian 9.3.0-15) 9.3.0
reproduce:
# apt-get install sparse
# sparse version: v0.6.2-117-g8c7aee71-dirty
git checkout ad723674d6758478829ee766e3f1a2a24d56236f
# save the attached .config to linux build tree
make W=1 C=1 CF='-fdiagnostic-prefix -D__CHECK_ENDIAN__' ARCH=x86_64

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@xxxxxxxxx>


sparse warnings: (new ones prefixed by >>)

>> security/integrity/platform_certs/keyring_handler.c:66:16: sparse: sparse: Using plain integer as NULL pointer
security/integrity/platform_certs/keyring_handler.c:79:16: sparse: sparse: Using plain integer as NULL pointer

vim +66 security/integrity/platform_certs/keyring_handler.c

57
58 /*
59 * Return the appropriate handler for particular signature list types found in
60 * the UEFI db and MokListRT tables.
61 */
62 __init efi_element_handler_t get_handler_for_db(const efi_guid_t *sig_type)
63 {
64 if (efi_guidcmp(*sig_type, efi_cert_x509_guid) == 0)
65 return add_to_platform_keyring;
> 66 return 0;
67 }
68

---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@xxxxxxxxxxxx

Attachment: .config.gz
Description: application/gzip