Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp772460ybg; Fri, 12 Jun 2020 14:22:47 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx63JzgoM5HISseqfx05+gZe5tUKkoZqCy36yOHhz2aoBXoLxvsbaCdjU5uzXoB0vJVT78x X-Received: by 2002:a17:906:3013:: with SMTP id 19mr2536788ejz.303.1591996967263; Fri, 12 Jun 2020 14:22:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591996967; cv=none; d=google.com; s=arc-20160816; b=I55CuSSENHcijjPTOIsHul4SzH6rb1NnWsgTeTGs1txX7H9HZRwToE+NIWr4F3ozyE HIKn2XzIHQ8j+yP+t5HjLgWq0tXDbu4APCjPETwIWzXZxPjDguK8HrAbOXiQSPq1dGPd cc1cHiyFknG1ynNBzH/DjWovGzc+KdEk9Hwve0m3391OLVEBdQ45yap8krsMXRJtAZDg xowcklYYhPP2pf85YCg+RN0/p7gz5YSXAsO2UykBfOIf5/qfH7Er8PTJ7P5oY2ulpuEk wxdaEcu1gdcXvvWs1m+mGaKJGcHWNY5kBWaKRlwdgU+PVjWJeWm5aX9mzeCLdLpZ9bTC VS1Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:message-id :subject:cc:to:from:date; bh=/J4c/3RmI4Kp9ptgDj2g4Qp2aGsOs84+Bf4S/M/EP6M=; b=rYaimna684qFTnCL8QuicFD3hFlWv9pkE6/0qN4Lry7IjHqMlnebcMPfKUpIPR16BN QASIcy92tK3PCU2AGGYZ/5LZijxqg+Zvy7IWdYXPlQb/OP31vEAOy8K0EZx5QjP0BCSN svL4pTKQoUs06NEpklwSdhPkJN9Gls7eUlUeB2MoQf7NooHi4+47zXtoi78bgfacmpFR O5b4stnCNdIbzggcMQIeZLkNv/er8NoapbuiwmgCUrSPs95d9mDLWjWhhLPknFx9iQvp RgKvufFI5FkXBwPjvRrtfZaDf9vwdMcs9p2FM4G+pGR1ayYpX/zI02Vte0wZPMw4lqy4 sQSQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id zb3si4671087ejb.610.2020.06.12.14.22.09; Fri, 12 Jun 2020 14:22:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726329AbgFLVWF (ORCPT + 99 others); Fri, 12 Jun 2020 17:22:05 -0400 Received: from mail3-relais-sop.national.inria.fr ([192.134.164.104]:62953 "EHLO mail3-relais-sop.national.inria.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726290AbgFLVWF (ORCPT ); Fri, 12 Jun 2020 17:22:05 -0400 X-IronPort-AV: E=Sophos;i="5.73,504,1583190000"; d="scan'208";a="351462289" Received: from abo-173-121-68.mrs.modulonet.fr (HELO hadrien) ([85.68.121.173]) by mail3-relais-sop.national.inria.fr with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 12 Jun 2020 23:22:02 +0200 Date: Fri, 12 Jun 2020 23:22:02 +0200 (CEST) From: Julia Lawall X-X-Sender: jll@hadrien To: Keerthy cc: Tero Kristo , Herbert Xu , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, kbuild-all@lists.01.org Subject: [PATCH] crypto: sa2ul: fix odd_ptr_err.cocci warnings Message-ID: User-Agent: Alpine 2.22 (DEB 394 2020-01-19) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org From: kernel test robot PTR_ERR should normally access the value just tested by IS_ERR Generated by: scripts/coccinelle/tests/odd_ptr_err.cocci Fixes: 5b8516f3bedb ("crypto: sa2ul: Add crypto driver") CC: Keerthy Signed-off-by: kernel test robot Signed-off-by: Julia Lawall --- tree: git://git.ti.com/ti-linux-kernel/ti-linux-kernel.git ti-linux-5.4.y head: 134a1b1f8814115e2dd115b67082321bf9e63cc1 commit: 5b8516f3bedb3e1c273e7747b6e4a85c6e47907a [2369/7050] crypto: sa2ul: Add crypto driver :::::: branch date: 3 hours ago :::::: commit date: 5 months ago sa2ul.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/drivers/crypto/sa2ul.c +++ b/drivers/crypto/sa2ul.c @@ -1252,14 +1252,14 @@ static int sa_dma_init(struct sa_crypto_ dd->dma_rx2 = dma_request_chan(dd->dev, "rx2"); if (IS_ERR(dd->dma_rx2)) { dma_release_channel(dd->dma_rx1); - if (PTR_ERR(dd->dma_rx1) != -EPROBE_DEFER) + if (PTR_ERR(dd->dma_rx2) != -EPROBE_DEFER) dev_err(dd->dev, "Unable to request rx2 DMA channel\n"); return PTR_ERR(dd->dma_rx2); } dd->dma_tx = dma_request_chan(dd->dev, "tx"); if (IS_ERR(dd->dma_tx)) { - if (PTR_ERR(dd->dma_rx1) != -EPROBE_DEFER) + if (PTR_ERR(dd->dma_tx) != -EPROBE_DEFER) dev_err(dd->dev, "Unable to request tx DMA channel\n"); ret = PTR_ERR(dd->dma_tx); goto err_dma_tx;