From patchwork Tue Oct 25 21:29:10 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Arnd Bergmann X-Patchwork-Id: 101598 Delivered-To: patch@linaro.org Received: by 10.140.97.247 with SMTP id m110csp86044qge; Tue, 25 Oct 2016 14:29:42 -0700 (PDT) X-Received: by 10.99.124.20 with SMTP id x20mr26061859pgc.64.1477430982693; Tue, 25 Oct 2016 14:29:42 -0700 (PDT) Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x190si3911059pfx.117.2016.10.25.14.29.42; Tue, 25 Oct 2016 14:29:42 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754028AbcJYV3l (ORCPT + 1 other); Tue, 25 Oct 2016 17:29:41 -0400 Received: from mout.kundenserver.de ([212.227.126.130]:62534 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752762AbcJYV3k (ORCPT ); Tue, 25 Oct 2016 17:29:40 -0400 Received: from wuerfel.lan. ([78.43.20.153]) by mrelayeu.kundenserver.de (mreue005) with ESMTPA (Nemesis) id 0Lu05i-1cwurh0hDK-011QAH; Tue, 25 Oct 2016 23:29:27 +0200 From: Arnd Bergmann To: Herbert Xu Cc: Arnd Bergmann , "David S. Miller" , =?utf-8?q?Horia_Geant=C4=83?= , Catalin Vasile , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] crypto: caam: fix type mismatch warning Date: Tue, 25 Oct 2016 23:29:10 +0200 Message-Id: <20161025212923.2452320-1-arnd@arndb.de> X-Mailer: git-send-email 2.9.0 X-Provags-ID: V03:K0:FV/ZaqS3vADMt3lpB3rqHlhynj6Di4E0pwL8+gYDVYUK56FiRyC KkbTYS26fC0CG66+6+PURNY/f0SPqX44nN4bfjufz4YHeyic9e8hMFbr5IimMJ8jjYs4f9r Blsx/4WYAevmtwVZ51/YYukr0pUpw45JkxYPkxeFr2XibnpnGwJppDOp+BxWFkzqJwhpHht KKuebg1EB0Cif3+cCtMww== X-UI-Out-Filterresults: notjunk:1; V01:K0:DA1edNpYJFI=:f0nWHh0wRcs4C3UXaZjA7n zL+iVIUEYLKO4+nNXt3PMoOYfvQf838q/SCBWgOUpjJhwalB5Z73/yBKuHiIoKTADvSidKuui 25HR64QKteLD31dpCUXQca2J+avF50wAQNGHWA3LBb8BCNOAWy9o3cNvTyzAxuXKI+orXqfAw a6IC/eOQDmr5+ZRMB1PdBH7/vMIQn4fcPuxbuq8UIqbyKvrdvYDSV5xl7El0JuyPQDIpYari2 66FQKHGRbggXXprJicuK4VLmMGVFkIFeqls/2/931rv+TW6PT3WnhU1kC8Hw0nkCQ5nossKNj foHh37tBH5ZzPQpo7kMo/toLMNsWlvqPOJp7KTnbUBaHd0v/c8aa58Q66o5xKAlO6ETKkAGBf JMeGAf0m7zFSBAfUeyX0OCh1mjC/+FGkXRlT+6NFwa4drID9iOOQ41nho6QOiCOvsd8LWym/7 jh6yANwE/l1eq10r0LW3t8T3VZ2JgEE6ezchytWtNojEVSu4Q4xFQMs4G1JEndlmgkUjS0JYg YqxrP2DFaRbokvl1VQxbRw5LBHHSvf2IH0kQ4nYYeLUdp+Yf6/j+VQej3n9bPZg+ydOWmIW4X nTVHiYzTD+4s3Z/n2PhjKNDAS6VcXKEmY85F2OVyb2o2vIJG2VPiEe6dfD9w/758m/r9r5s99 jFBW4r/OTxYFa5N5yARtLOxI7IFyy0O7kxn/SB+PQ4u5rFjeqlu7NF50fvF7aubMwuXY= Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Building the caam driver on arm64 produces a harmless warning: drivers/crypto/caam/caamalg.c:140:139: warning: comparison of distinct pointer types lacks a cast We can use min_t to tell the compiler which type we want it to use here. Fixes: 5ecf8ef9103c ("crypto: caam - fix sg dump") Signed-off-by: Arnd Bergmann --- This is currently the only warning reported by kernelci.org for linux-4.9 on arm, arm64 and x86. --- drivers/crypto/caam/caamalg.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) -- 2.9.0 -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html diff --git a/drivers/crypto/caam/caamalg.c b/drivers/crypto/caam/caamalg.c index 156aad167cd6..8de85dfb1b04 100644 --- a/drivers/crypto/caam/caamalg.c +++ b/drivers/crypto/caam/caamalg.c @@ -137,7 +137,7 @@ static void dbg_dump_sg(const char *level, const char *prefix_str, } buf = it_page + it->offset; - len = min(tlen, it->length); + len = min_t(size_t, tlen, it->length); print_hex_dump(level, prefix_str, prefix_type, rowsize, groupsize, buf, len, ascii); tlen -= len;