Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp5369020ybp; Tue, 8 Oct 2019 01:34:24 -0700 (PDT) X-Google-Smtp-Source: APXvYqxd0pD7ttg8Lxcgqozj3J6ve1pcj0hOTSDqRZoZ9Tajl7gol2PWNFcRc+4cI8ef4aat+l6a X-Received: by 2002:a17:907:441d:: with SMTP id om21mr28250724ejb.188.1570523664091; Tue, 08 Oct 2019 01:34:24 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1570523664; cv=pass; d=google.com; s=arc-20160816; b=l1Zmer7D6mt4sWnyqYIFMw6gvxbupOsQvlGcvOAjY7tqh0XBVuv8GgD9MmMEfWhC8S fnfIGsf4Bh9Gp5vwbSujDdNro4f3xrlDiudlNLyVHw6d/sRkahypWw0y4nHum8AbVfsN MtfEu/GG37S/5TlxUsY0zbHGsaUOR7Mgtf3g7TdO2rS8bdjfFIA4U5Gbi4OyHXiIVoor CF1Gs+dHhFTCq4v17etbtSS0NKx8DGup3muJHUSVo21T84FHwIeiMNcdymeHxjN5rAsY l+5VbbGItQfSHk6ZMJAc6Npxx8MV5oRnabJjZG5H9iKLPUKQXWZNoMuGa+MyPixW/6Wp OE3g== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :content-language:accept-language:in-reply-to:references:message-id :date:thread-index:thread-topic:subject:cc:to:from:dkim-signature; bh=KL6nCTI8avtdDO1+DUELOote4DR2Ynei3eSCXN7aks4=; b=BWEJ2hrqgPx89gZ+rGn5Kp2hju6SDEu+6ZL6tydN4wFxAPhJ+/QzQtXKtlR8YHtHHS +EO4MY+KsOFQ3YsUXk5zaswwDauW9XRnfKr/JLuX3X7RInAxnHJp9BW9dnTSbEWiGPLu OOy9uEn/D+Dpg3O8lUrcPe7Z/yvFJtY5m5kDsKNx8JjpBSFOC9qRFpaM3Lhc5SXBzpEz ThcOJMsbgbQE6ta2mh/PxRBeCZit9KTt7knaicJUDzRLRb9q3jnqODog9r85poEVoTrS XjKioWMjp7u2dVXH43bnLnNqoQdYp+0bwavGOr1oWy7q12eg2xMwbukiKa4GoWK44LJZ eZYw== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@verimatrix.com header.s=selector2 header.b=S+wuLjKL; arc=pass (i=1 spf=pass spfdomain=verimatrix.com dkim=pass dkdomain=verimatrix.com dmarc=pass fromdomain=verimatrix.com); spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=verimatrix.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h7si8351150ejx.59.2019.10.08.01.33.59; Tue, 08 Oct 2019 01:34:24 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@verimatrix.com header.s=selector2 header.b=S+wuLjKL; arc=pass (i=1 spf=pass spfdomain=verimatrix.com dkim=pass dkdomain=verimatrix.com dmarc=pass fromdomain=verimatrix.com); spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=verimatrix.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730036AbfJHIdk (ORCPT + 99 others); Tue, 8 Oct 2019 04:33:40 -0400 Received: from mail-eopbgr810050.outbound.protection.outlook.com ([40.107.81.50]:60289 "EHLO NAM01-BY2-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728866AbfJHIdk (ORCPT ); Tue, 8 Oct 2019 04:33:40 -0400 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=BSIhPu8/3/kAUG4nbBLuAmTW2ogf+/Xpd3+Nij1ZuHVeXx8NoBOxufj4/v7TrDD6AYZHWSDpDYUPI1SWacBH5D27PJCSJh9cqMguoiAHcDWAEWRA64TqNaSfVGxgDfrIjOXeCRlv2zeXSlJivzpCKiplMzkZKLCUtNJweiY3ofE18RMM7PgHHcKsDsEaUq7n3o1i0fLpq6IyElW0VEt9AlkQLjeR6XPtp9VaI02WSx0/TLMfrI6EfOgH/E+YYB7nt+zNsiuVZWG86BQh1mTxLGPTGCzZuG0Zu7uwSgQBLwqsMZJED/90EdP/e+aFy47OmhFXfTicHyLmBRZCic7bQg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=KL6nCTI8avtdDO1+DUELOote4DR2Ynei3eSCXN7aks4=; b=GiGyaT8dAkGnWbMg0ZRzU3X3/Mns5rLTOpxo5Wl1L5viy/A0fRnSxtSM66dRqWKpzOT+uur3BrhFjo1bPVeZTO9OmscLBMxPJrdB1B5B5aivn9ABn/eL5ASsnpahiSSmO2i1D2P6oa/l5XWWztHYA+O2SyGUTZ4hPk7KMYyYaihnr69c71lA8Akl5SgR5jcGZ2ihNE+1uxT3Mnm+6X/thzOuF45IMGLOPpNipTqvFiUBFeKkjzqv0BbBfn6jBde/PNCsveD+B0MHuNWfsxtVFFOq0sCxs6ICRrHxgwQeGg7V5QbZ/9kXgMQZfTg1f4R9xi0yX+PD26M+SHu0O8keRQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=verimatrix.com; dmarc=pass action=none header.from=verimatrix.com; dkim=pass header.d=verimatrix.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=verimatrix.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=KL6nCTI8avtdDO1+DUELOote4DR2Ynei3eSCXN7aks4=; b=S+wuLjKLovUVSLDDzihYssWOE7eQw4E0WaeR1eh74gAEq6Vzr2R+GJ3PxhVAS45/ndGt+SB8umtIsdr5tBf0QK1uMbPFkyOOJlOzvHHTV8nTgGZt807MgZNTjAwnYZL490jf3UUSKmOVQ8AxZ7p8w1vHAtzFw7DcRZH5Un1RYRU= Received: from MN2PR20MB2973.namprd20.prod.outlook.com (52.132.172.86) by MN2PR20MB3136.namprd20.prod.outlook.com (52.132.175.83) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2327.23; Tue, 8 Oct 2019 08:33:35 +0000 Received: from MN2PR20MB2973.namprd20.prod.outlook.com ([fe80::b986:4f02:3206:31e4]) by MN2PR20MB2973.namprd20.prod.outlook.com ([fe80::b986:4f02:3206:31e4%7]) with mapi id 15.20.2347.016; Tue, 8 Oct 2019 08:33:35 +0000 From: Pascal Van Leeuwen To: Joe Perches , Colin King , Antoine Tenart , Herbert Xu , "David S . Miller" , "linux-crypto@vger.kernel.org" CC: "kernel-janitors@vger.kernel.org" , "linux-kernel@vger.kernel.org" Subject: RE: [PATCH][next] crypto: inside-secure: fix spelling mistake "algorithmn" -> "algorithm" Thread-Topic: [PATCH][next] crypto: inside-secure: fix spelling mistake "algorithmn" -> "algorithm" Thread-Index: AQHVfbBiWkZb4mCzbk2SwbBbsORNa6dQZX5AgAAD7YCAAAB/4A== Date: Tue, 8 Oct 2019 08:33:34 +0000 Message-ID: References: <20191008081410.18857-1-colin.king@canonical.com> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=pvanleeuwen@verimatrix.com; x-originating-ip: [188.204.2.113] x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: a7f58ca6-91c5-41a5-c12c-08d74bca359a x-ms-traffictypediagnostic: MN2PR20MB3136: x-ms-exchange-purlcount: 1 x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:5797; x-forefront-prvs: 01842C458A x-forefront-antispam-report: SFV:NSPM;SFS:(10009020)(4636009)(136003)(376002)(346002)(396003)(39850400004)(366004)(189003)(199004)(13464003)(7736002)(33656002)(305945005)(76176011)(15974865002)(8936002)(99286004)(25786009)(110136005)(74316002)(316002)(7696005)(5660300002)(81166006)(2501003)(478600001)(14454004)(8676002)(54906003)(81156014)(71190400001)(52536014)(71200400001)(11346002)(446003)(66556008)(3846002)(14444005)(66476007)(256004)(6246003)(64756008)(66946007)(486006)(102836004)(9686003)(76116006)(66446008)(476003)(229853002)(66066001)(186003)(26005)(6506007)(53546011)(55016002)(6436002)(2906002)(86362001)(6116002)(4326008)(18886075002);DIR:OUT;SFP:1101;SCL:1;SRVR:MN2PR20MB3136;H:MN2PR20MB2973.namprd20.prod.outlook.com;FPR:;SPF:None;LANG:en;PTR:InfoNoRecords;MX:1;A:1; received-spf: None (protection.outlook.com: verimatrix.com does not designate permitted sender hosts) x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: kDtJdm0WhEXiZN3MnET6WYidea3oPaTinMMepnkzASULJhoj0G7mmRM/AxYSL3HIHX8Z0ZvVoDZcQNKXcMhr331ajd1TQfp99ydEeGgZB3JYT3qdr0qse70C7g5znZ7BegMnsGFIhnNBhiUrud9auaCWCsdtDyWcHrDwzl39wlwPCsr2niHvqjx48iGek0BCip/ac6JTI8HvKdu58/hT8oPGJwKnAatHlS2sc3eXsla2h3q3t2gqQaAhx87kap/ukYoos4GCDiWgTdcgHOTICxB2EkU7dERrbBZevCeHxXFrDzijgiPweakyzNaGbx9JdTz4YqO4Rk2mWtdJWLUaeMenKlBBz1naGXx/DpgK7seNSUH0CYt3UQ8GuhQ6lbCred2PO6fWXg3oL2DYl242PQ1F3T+uwx68fIBZMXOKygc= x-ms-exchange-transport-forked: True Content-Type: text/plain; charset="Windows-1252" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: verimatrix.com X-MS-Exchange-CrossTenant-Network-Message-Id: a7f58ca6-91c5-41a5-c12c-08d74bca359a X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Oct 2019 08:33:35.0066 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: dcb260f9-022d-4495-8602-eae51035a0d0 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 0ogOlx220Vl6DEhaL2NriDIZFvgz3kZ0x+NN/UGLl/WG76clpfkg47u9qfxtNmkKyP5OxmKE42UgKEtVSkru6O0wm+/5Wi4vYeioJPbydVg= X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR20MB3136 Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org > -----Original Message----- > From: Joe Perches > Sent: Tuesday, October 8, 2019 10:29 AM > To: Pascal Van Leeuwen ; Colin King ; > Antoine Tenart ; Herbert Xu ; David S . > Miller ; linux-crypto@vger.kernel.org > Cc: kernel-janitors@vger.kernel.org; linux-kernel@vger.kernel.org > Subject: Re: [PATCH][next] crypto: inside-secure: fix spelling mistake "a= lgorithmn" -> > "algorithm" >=20 > On Tue, 2019-10-08 at 08:15 +0000, Pascal Van Leeuwen wrote: > > > There is a spelling mistake in a dev_err message. Fix it. > [] > > > diff --git a/drivers/crypto/inside-secure/safexcel_cipher.c b/drivers= /crypto/inside- > [] > > > @@ -437,7 +437,7 @@ static int safexcel_aead_setkey(struct crypto_aea= d *ctfm, const u8 *key, > > > goto badkey; > > > break; > > > default: > > > - dev_err(priv->dev, "aead: unsupported hash algorithmn"); > > > + dev_err(priv->dev, "aead: unsupported hash algorithm"); > > > goto badkey; > > > } > [] > > Actually, the typing error is well spotted, but the fix is not correct. > > What actually happened here is that a \ got accidentally deleted, > > there should have been a "\n" at the end of the line ... >=20 > Other missing newlines in the same file: > --- > drivers/crypto/inside-secure/safexcel_cipher.c | 6 +++--- > 1 file changed, 3 insertions(+), 3 deletions(-) >=20 > diff --git a/drivers/crypto/inside-secure/safexcel_cipher.c b/drivers/cry= pto/inside- > secure/safexcel_cipher.c > index cecc56073337..47fec8a0a4e1 100644 > --- a/drivers/crypto/inside-secure/safexcel_cipher.c > +++ b/drivers/crypto/inside-secure/safexcel_cipher.c > @@ -695,21 +695,21 @@ static int safexcel_send_req(struct crypto_async_re= quest *base, int ring, > sreq->nr_dst =3D sreq->nr_src; > if (unlikely((totlen_src || totlen_dst) && > (sreq->nr_src <=3D 0))) { > - dev_err(priv->dev, "In-place buffer not large enough (need %d bytes)!= ", > + dev_err(priv->dev, "In-place buffer not large enough (need %d bytes)!= \n", > max(totlen_src, totlen_dst)); > return -EINVAL; > } > dma_map_sg(priv->dev, src, sreq->nr_src, DMA_BIDIRECTIONAL); > } else { > if (unlikely(totlen_src && (sreq->nr_src <=3D 0))) { > - dev_err(priv->dev, "Source buffer not large enough (need %d bytes)!", > + dev_err(priv->dev, "Source buffer not large enough (need %d bytes)!\n= ", > totlen_src); > return -EINVAL; > } > dma_map_sg(priv->dev, src, sreq->nr_src, DMA_TO_DEVICE); >=20 > if (unlikely(totlen_dst && (sreq->nr_dst <=3D 0))) { > - dev_err(priv->dev, "Dest buffer not large enough (need %d bytes)!", > + dev_err(priv->dev, "Dest buffer not large enough (need %d bytes)!\n", > totlen_dst); > dma_unmap_sg(priv->dev, src, sreq->nr_src, > DMA_TO_DEVICE); Yes, thanks! Acked-by: Pascal van Leeuwen Regards, Pascal van Leeuwen Silicon IP Architect, Multi-Protocol Engines @ Verimatrix www.insidesecure.com