From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id AC8ABC433F5 for ; Sun, 13 Mar 2022 19:53:12 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235496AbiCMTyS (ORCPT ); Sun, 13 Mar 2022 15:54:18 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60768 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229632AbiCMTyP (ORCPT ); Sun, 13 Mar 2022 15:54:15 -0400 Received: from mga12.intel.com (mga12.intel.com [192.55.52.136]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4C5EC3A5C8 for ; Sun, 13 Mar 2022 12:53:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1647201187; x=1678737187; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=jEXrgk8GFlMyi/voag3GckUOxld7T+7LnsZHO8rLmtk=; b=PWr1BMT+MGogMYF7DwFjNSA0PoUphTzcWfDHLpOlddAYUTvipM99bTk3 TxKRC1Bo9lm138ozg4dMTZM/d7lrIzsVHd5qmXI3sl/MjP8tpiObvoQJJ 2P/L77OplldAsL1qjrhntzZ3xgKfO8pkKJsLKGJRXwTN6SYos3bZEoA05 MD/WEyGY3tbcsBJN/8+hD/muMlf35TqdzLlzw6eNJb11MR1IY58ecVJQR QYpcxY7hOWneGR5i3yYEFrIHAZ3io53aqBnsfk9DhNoTuFT7hv9KXkZCU bo7HzvTG+zdzWNQ2veW9mA5wOmAUgRk6ZZhlY40zskTOi0FEHwFoYF8zB A==; X-IronPort-AV: E=McAfee;i="6200,9189,10285"; a="235842277" X-IronPort-AV: E=Sophos;i="5.90,179,1643702400"; d="scan'208";a="235842277" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Mar 2022 12:53:07 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.90,179,1643702400"; d="scan'208";a="556102998" Received: from lkp-server02.sh.intel.com (HELO 89b41b6ae01c) ([10.239.97.151]) by orsmga008.jf.intel.com with ESMTP; 13 Mar 2022 12:53:05 -0700 Received: from kbuild by 89b41b6ae01c with local (Exim 4.92) (envelope-from ) id 1nTUH3-0009Eh-3q; Sun, 13 Mar 2022 19:53:05 +0000 Date: Mon, 14 Mar 2022 03:52:21 +0800 From: kernel test robot To: Hannes Reinecke Cc: kbuild-all@lists.01.org, linux-kernel@vger.kernel.org Subject: [PATCH] crypto,fs: fix noderef.cocci warnings Message-ID: <20220313195221.GA82451@f7536ca88abf> References: <202203140317.0on9b3HF-lkp@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <202203140317.0on9b3HF-lkp@intel.com> User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: kernel test robot crypto/hkdf.c:94:25-31: ERROR: application of sizeof to pointer sizeof when applied to a pointer typed expression gives the size of the pointer Generated by: scripts/coccinelle/misc/noderef.cocci Fixes: ea4c6fc32e5e ("crypto,fs: Separate out hkdf_extract() and hkdf_expand()") Reported-by: kernel test robot Signed-off-by: kernel test robot --- tree: https://git.kernel.org/pub/scm/linux/kernel/git/hare/scsi-devel.git tls-upcall.v4 head: d2416ecdb6b03fc2e4aa40b20cdf919322713224 commit: ea4c6fc32e5e02a1e4c841f462c3a931b8838f33 [118/156] crypto,fs: Separate out hkdf_extract() and hkdf_expand() :::::: branch date: 3 days ago :::::: commit date: 5 days ago crypto/hkdf.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/crypto/hkdf.c +++ b/crypto/hkdf.c @@ -91,7 +91,7 @@ int hkdf_expand(struct crypto_shash *hma if (err) goto out; memcpy(&okm[i], tmp, okmlen - i); - memzero_explicit(tmp, sizeof(tmp)); + memzero_explicit(tmp, sizeof(*tmp)); } else { err = crypto_shash_finup(desc, &counter, 1, &okm[i]); if (err)