Re: [PATCH] Security: Keys: Added derived keytype
From: kbuild test robot
Date: Mon Mar 21 2016 - 22:05:31 EST
Hi Kirill,
[auto build test WARNING on v4.5-rc7]
[also build test WARNING on next-20160321]
[if your patch is applied to the wrong git tree, please drop us a note to help improving the system]
url: https://github.com/0day-ci/linux/commits/Kirill-Marinushkin/Security-Keys-Added-derived-keytype/20160322-084809
config: sparc64-allyesconfig (attached as .config)
reproduce:
wget https://git.kernel.org/cgit/linux/kernel/git/wfg/lkp-tests.git/plain/sbin/make.cross -O ~/bin/make.cross
chmod +x ~/bin/make.cross
# save the attached .config to linux build tree
make.cross ARCH=sparc64
All warnings (new ones prefixed by >>):
security/keys/derived.c: In function 'parse_options':
>> security/keys/derived.c:217:15: warning: assignment from incompatible pointer type
usalt.lenp = &payload->saltlen;
^
vim +217 security/keys/derived.c
201 switch (token) {
202
203 case OPT_SHORT_SALT: /* salt */
204 case OPT_LONG_SALT:
205 templen = args[0].to - args[0].from;
206 if (templen < 0 || templen > SALT_MAX_SIZE) {
207 pr_err(PREFIX "invalid salt length");
208 return -EINVAL;
209 }
210 payload->salt = kstrndup(args[0].from, templen, GFP_KERNEL);
211 if (!payload->salt) {
212 pr_err(PREFIX "salt alloc failed");
213 return -ENOMEM;
214 }
215 payload->saltlen = templen;
216 usalt.data = payload->salt;
> 217 usalt.lenp = &payload->saltlen;
218 break;
219
220 case OPT_SHORT_ITER: /* iterations */
221 case OPT_LONG_ITER:
222 if (kstrtou64(args[0].from, 0, &tempul)
223 || tempul == 0
224 || tempul > ITER_MAX_VAL) {
225 pr_err(PREFIX "invalid iterations number");
---
0-DAY kernel test infrastructure Open Source Technology Center
https://lists.01.org/pipermail/kbuild-all Intel Corporation
Attachment:
.config.gz
Description: Binary data