Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp1804437ybg; Sat, 19 Oct 2019 02:52:56 -0700 (PDT) X-Google-Smtp-Source: APXvYqwKKz46+MuW1CY7qvGBR30wOcD0s9rwOLb09q89p1vV4TcJLgtK0LBt46WYWolk2BayCzc1 X-Received: by 2002:a17:906:364f:: with SMTP id r15mr12879032ejb.194.1571478775956; Sat, 19 Oct 2019 02:52:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571478775; cv=none; d=google.com; s=arc-20160816; b=KqUyM/+O1lqO3NybCQ71Gui8zOwjkH/uLyCdOwZ7ZMGQGPPxib/b/iyMT20U6WlgQ7 ZbojcLLICtc4KOgSSZ5KEH3HHaQYp7pqVQMKcCwe9QYUclIoBuWYDdtYOxnWoMnX5YLE d5mhNqB4jGuTUIVpNUAcUKadV9cDNtfEI3uvTIXcm/UruLVgPBFDVcnGqZB10C1FhAPC Rcbandmd/XH0vMQaY1sv0meYLg5hrWCCM2xpbTzt8YadvFNmtxwbwwO5lgwVQAkoGw6t Mlu0s831HQoBNRyas+91YLf29bnIJRnEI4h0ClwbZsPdlziEOObP77VJ2Vf1X1VWmmkI xutQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject:cc :to:from; bh=L1MAFyR6dY785OLEJcb4ymyiNzXJB2mBd8vkfcWTYPI=; b=SovNLnK9r9Byzyg2wSbHaCLZR2CNut/NwARfd6beG70N7aU6k3ROY9N6aZuSpMRKx2 NybPiuIRkh6xSAvwsaLswc6Q6ykJIxUl86UnfU+ikIOxLFBV2/VDe0CdRnGFbYLePRpW 1nGhfL1fMRGFYc2AbklKwEZaSuws9ZaJfopNSWDAIkdgDo/5JizCQsZsJ+YngymxFUci D+hVh/TqCDo8rN6/4Rboe82PGgfXA242Au1EbIUPx2/VG1/emP7jgKEDboE6uCjMAVV/ I47XYfVe1we2QuPqm1QhB2YYaOp9LS4LBhWGich7WSM4JKL1HqnenVrooqkwAKcdCbVv iy6A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f47si5836600ede.263.2019.10.19.02.52.31; Sat, 19 Oct 2019 02:52:55 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726121AbfJSAra (ORCPT + 99 others); Fri, 18 Oct 2019 20:47:30 -0400 Received: from szxga05-in.huawei.com ([45.249.212.191]:4736 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725856AbfJSAra (ORCPT ); Fri, 18 Oct 2019 20:47:30 -0400 Received: from DGGEMS404-HUB.china.huawei.com (unknown [172.30.72.59]) by Forcepoint Email with ESMTP id 57688F09124E8B64AADE; Sat, 19 Oct 2019 08:47:28 +0800 (CST) Received: from localhost.localdomain (10.67.212.132) by DGGEMS404-HUB.china.huawei.com (10.3.19.204) with Microsoft SMTP Server id 14.3.439.0; Sat, 19 Oct 2019 08:47:18 +0800 From: Tian Tao To: , , , CC: Subject: [PATCH] crypto: fix safexcel_hash warning PTR_ERR_OR_ZERO can be used Date: Sat, 19 Oct 2019 08:44:40 +0800 Message-ID: <1571445880-34025-1-git-send-email-tiantao6@huawei.com> X-Mailer: git-send-email 2.7.4 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.67.212.132] X-CFilter-Loop: Reflected Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org fix below warning reported by coccicheck. the below code is only in the crypto-dev tree currently. drivers/crypto/inside-secure/safexcel_cipher.c:2527:1-3: WARNING: PTR_ERR_OR_ZERO can be used. Fixes: 38f21b4bab11 ("crypto: inside-secure - Added support for the AES XCBC ahash") Signed-off-by: Tian Tao --- drivers/crypto/inside-secure/safexcel_hash.c | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/drivers/crypto/inside-secure/safexcel_hash.c b/drivers/crypto/inside-secure/safexcel_hash.c index 85c3a07..3c71151 100644 --- a/drivers/crypto/inside-secure/safexcel_hash.c +++ b/drivers/crypto/inside-secure/safexcel_hash.c @@ -2109,10 +2109,8 @@ static int safexcel_xcbcmac_cra_init(struct crypto_tfm *tfm) safexcel_ahash_cra_init(tfm); ctx->kaes = crypto_alloc_cipher("aes", 0, 0); - if (IS_ERR(ctx->kaes)) - return PTR_ERR(ctx->kaes); - return 0; + return PTR_ERR_OR_ZERO(ctx->kaes); } static void safexcel_xcbcmac_cra_exit(struct crypto_tfm *tfm) -- 2.7.4