Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp991276pxb; Wed, 6 Apr 2022 06:11:46 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwoERv97BpKO7dtF3GLOyLsh7TkXZNS35xU7JY86SpO/bGkhTAEjQNygU4s61FsCJRleqIP X-Received: by 2002:a62:1ad3:0:b0:4fa:686f:9938 with SMTP id a202-20020a621ad3000000b004fa686f9938mr8880123pfa.6.1649250705825; Wed, 06 Apr 2022 06:11:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649250705; cv=none; d=google.com; s=arc-20160816; b=VPMfE3gOUsZrPv+107o+Sfba6TbnF+40ABpk4vu2NxOhy/yw3TAl3RGU6a5tC19nnK f9x8VFcZWig1jJNV2tmrH0n6UiMH3JnmAZL6kOsBKpjX/xJAxHhoBcebYD2Jk4JDuCJG APceMCpnKMrZKMhD7BZ1E7t/9kFZBprrIuqYJiPqoJW+7Kw/9/5FP1RUMf4/pCQcf9as UY1rCJ5AbNe4H2AryWn4gKzceUDGApunrAF7URa9vO4TK8KAnnv3Q0o+vZNOOdOZVqet HPTTigHevf+j+JvWyivzQBAZdHURkDXxHW4ri0iVcIsfDi+yFpCZypuEgwRYRq4kMu6D d65g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=EWizIdwnPW4ZFeXEDxC5XePBKhACmzdIij3enmPV7vg=; b=S0VRV1QM0+GT8beJjqjMEpp/SS2JJ+U/hCEStfA2J+6p/OFHOimcao4hkE5n2eoWdF cnmUIoP2z/b5kp/Z23tJX611xX3maA5N2e6534V6S61wxNGG4Ibc9A7htYxglHPo8QLV BqiE5UEBW7c6cqh9DMoIX09/XvC8JUxMLJTgak39QAwZLHZBJUFr/YA2JicL7OKLAQ1q gNjOFonV6qjPpsz/ohA1rv+j37N/mhcTqspMvt4hvKhtDWyR3SVUY32tWCEupKhlXi5f jDuMO2eZU44jzyVkh17GY4cloA62H16njd2esM9Y06xvyKbu7hMR6jh4DyEvOHNJc9iT /NYw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=kC2MfqGw; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id a38-20020a056a001d2600b004fa7782f609si7883295pfx.24.2022.04.06.06.11.45 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 06 Apr 2022 06:11:45 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=kC2MfqGw; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id B7C444BBEEB; Wed, 6 Apr 2022 03:36:56 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1389257AbiDEV7I (ORCPT + 99 others); Tue, 5 Apr 2022 17:59:08 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43986 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1349078AbiDEJtE (ORCPT ); Tue, 5 Apr 2022 05:49:04 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B5F5CA9942; Tue, 5 Apr 2022 02:40:07 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 52E5461368; Tue, 5 Apr 2022 09:40:07 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 62576C385A1; Tue, 5 Apr 2022 09:40:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1649151606; bh=iBVVBtu/6C4RfiTBZEiWcq/s64qXIehKCq8+uzO99bE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=kC2MfqGw3nyi9YwBWv4srNjqvUIcF53aeIFYFHtocTYuQbIx+3OJ25phm6ksMC/4X 8OLzU5Uy/sqtFSjNTAImqnETqUAAr6o8do3wWvb7DKNSc6HL8dwVoP8+jE93aawB6t LDbBfv2/imyzF95CejdSYu9/IF61kOAVYj7Ho588= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Aashish Sharma , Mike Snitzer , Sasha Levin Subject: [PATCH 5.15 476/913] dm crypt: fix get_key_size compiler warning if !CONFIG_KEYS Date: Tue, 5 Apr 2022 09:25:38 +0200 Message-Id: <20220405070354.123432257@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220405070339.801210740@linuxfoundation.org> References: <20220405070339.801210740@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Aashish Sharma [ Upstream commit 6fc51504388c1a1a53db8faafe9fff78fccc7c87 ] Explicitly convert unsigned int in the right of the conditional expression to int to match the left side operand and the return type, fixing the following compiler warning: drivers/md/dm-crypt.c:2593:43: warning: signed and unsigned type in conditional expression [-Wsign-compare] Fixes: c538f6ec9f56 ("dm crypt: add ability to use keys from the kernel key retention service") Signed-off-by: Aashish Sharma Signed-off-by: Mike Snitzer Signed-off-by: Sasha Levin --- drivers/md/dm-crypt.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/md/dm-crypt.c b/drivers/md/dm-crypt.c index 916b7da16de2..154139bf7d22 100644 --- a/drivers/md/dm-crypt.c +++ b/drivers/md/dm-crypt.c @@ -2579,7 +2579,7 @@ static int crypt_set_keyring_key(struct crypt_config *cc, const char *key_string static int get_key_size(char **key_string) { - return (*key_string[0] == ':') ? -EINVAL : strlen(*key_string) >> 1; + return (*key_string[0] == ':') ? -EINVAL : (int)(strlen(*key_string) >> 1); } #endif /* CONFIG_KEYS */ -- 2.34.1