diff options
Diffstat (limited to 'security')
-rw-r--r-- | security/keys/key.c | 2 | ||||
-rw-r--r-- | security/keys/process_keys.c | 2 | ||||
-rw-r--r-- | security/keys/request_key.c | 2 | ||||
-rw-r--r-- | security/keys/request_key_auth.c | 2 |
4 files changed, 4 insertions, 4 deletions
diff --git a/security/keys/key.c b/security/keys/key.c index fdd5ca6d89fc..654d23baf352 100644 --- a/security/keys/key.c +++ b/security/keys/key.c | |||
@@ -820,7 +820,7 @@ key_ref_t key_create_or_update(key_ref_t keyring_ref, | |||
820 | key = key_alloc(ktype, description, current->fsuid, current->fsgid, | 820 | key = key_alloc(ktype, description, current->fsuid, current->fsgid, |
821 | current, perm, flags); | 821 | current, perm, flags); |
822 | if (IS_ERR(key)) { | 822 | if (IS_ERR(key)) { |
823 | key_ref = ERR_PTR(PTR_ERR(key)); | 823 | key_ref = ERR_CAST(key); |
824 | goto error_3; | 824 | goto error_3; |
825 | } | 825 | } |
826 | 826 | ||
diff --git a/security/keys/process_keys.c b/security/keys/process_keys.c index 2a0eb946fc7e..c886a2bb792a 100644 --- a/security/keys/process_keys.c +++ b/security/keys/process_keys.c | |||
@@ -660,7 +660,7 @@ key_ref_t lookup_user_key(struct task_struct *context, key_serial_t id, | |||
660 | 660 | ||
661 | key = key_lookup(id); | 661 | key = key_lookup(id); |
662 | if (IS_ERR(key)) { | 662 | if (IS_ERR(key)) { |
663 | key_ref = ERR_PTR(PTR_ERR(key)); | 663 | key_ref = ERR_CAST(key); |
664 | goto error; | 664 | goto error; |
665 | } | 665 | } |
666 | 666 | ||
diff --git a/security/keys/request_key.c b/security/keys/request_key.c index 6381e616c477..5ecc5057fb54 100644 --- a/security/keys/request_key.c +++ b/security/keys/request_key.c | |||
@@ -389,7 +389,7 @@ struct key *request_key_and_link(struct key_type *type, | |||
389 | if (!IS_ERR(key_ref)) { | 389 | if (!IS_ERR(key_ref)) { |
390 | key = key_ref_to_ptr(key_ref); | 390 | key = key_ref_to_ptr(key_ref); |
391 | } else if (PTR_ERR(key_ref) != -EAGAIN) { | 391 | } else if (PTR_ERR(key_ref) != -EAGAIN) { |
392 | key = ERR_PTR(PTR_ERR(key_ref)); | 392 | key = ERR_CAST(key_ref); |
393 | } else { | 393 | } else { |
394 | /* the search failed, but the keyrings were searchable, so we | 394 | /* the search failed, but the keyrings were searchable, so we |
395 | * should consult userspace if we can */ | 395 | * should consult userspace if we can */ |
diff --git a/security/keys/request_key_auth.c b/security/keys/request_key_auth.c index 510f7be73a2d..e42b5252486f 100644 --- a/security/keys/request_key_auth.c +++ b/security/keys/request_key_auth.c | |||
@@ -261,7 +261,7 @@ struct key *key_get_instantiation_authkey(key_serial_t target_id) | |||
261 | current); | 261 | current); |
262 | 262 | ||
263 | if (IS_ERR(authkey_ref)) { | 263 | if (IS_ERR(authkey_ref)) { |
264 | authkey = ERR_PTR(PTR_ERR(authkey_ref)); | 264 | authkey = ERR_CAST(authkey_ref); |
265 | goto error; | 265 | goto error; |
266 | } | 266 | } |
267 | 267 | ||