RE: [PATCH][next] crypto: inside-secure: fix spelling mistake "algorithmn" -> "algorithm"

From: Pascal Van Leeuwen
Date: Tue Oct 08 2019 - 04:33:42 EST


> -----Original Message-----
> From: Joe Perches <joe@xxxxxxxxxxx>
> Sent: Tuesday, October 8, 2019 10:29 AM
> To: Pascal Van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>; Colin King <colin.king@xxxxxxxxxxxxx>;
> Antoine Tenart <antoine.tenart@xxxxxxxxxxx>; Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>; David S .
> Miller <davem@xxxxxxxxxxxxx>; linux-crypto@xxxxxxxxxxxxxxx
> Cc: kernel-janitors@xxxxxxxxxxxxxxx; linux-kernel@xxxxxxxxxxxxxxx
> Subject: Re: [PATCH][next] crypto: inside-secure: fix spelling mistake "algorithmn" ->
> "algorithm"
>
> On Tue, 2019-10-08 at 08:15 +0000, Pascal Van Leeuwen wrote:
> > > There is a spelling mistake in a dev_err message. Fix it.
> []
> > > diff --git a/drivers/crypto/inside-secure/safexcel_cipher.c b/drivers/crypto/inside-
> []
> > > @@ -437,7 +437,7 @@ static int safexcel_aead_setkey(struct crypto_aead *ctfm, const u8 *key,
> > > goto badkey;
> > > break;
> > > default:
> > > - dev_err(priv->dev, "aead: unsupported hash algorithmn");
> > > + dev_err(priv->dev, "aead: unsupported hash algorithm");
> > > goto badkey;
> > > }
> []
> > Actually, the typing error is well spotted, but the fix is not correct.
> > What actually happened here is that a \ got accidentally deleted,
> > there should have been a "\n" at the end of the line ...
>
> Other missing newlines in the same file:
> ---
> drivers/crypto/inside-secure/safexcel_cipher.c | 6 +++---
> 1 file changed, 3 insertions(+), 3 deletions(-)
>
> diff --git a/drivers/crypto/inside-secure/safexcel_cipher.c b/drivers/crypto/inside-
> secure/safexcel_cipher.c
> index cecc56073337..47fec8a0a4e1 100644
> --- a/drivers/crypto/inside-secure/safexcel_cipher.c
> +++ b/drivers/crypto/inside-secure/safexcel_cipher.c
> @@ -695,21 +695,21 @@ static int safexcel_send_req(struct crypto_async_request *base, int ring,
> sreq->nr_dst = sreq->nr_src;
> if (unlikely((totlen_src || totlen_dst) &&
> (sreq->nr_src <= 0))) {
> - dev_err(priv->dev, "In-place buffer not large enough (need %d bytes)!",
> + dev_err(priv->dev, "In-place buffer not large enough (need %d bytes)!\n",
> max(totlen_src, totlen_dst));
> return -EINVAL;
> }
> dma_map_sg(priv->dev, src, sreq->nr_src, DMA_BIDIRECTIONAL);
> } else {
> if (unlikely(totlen_src && (sreq->nr_src <= 0))) {
> - dev_err(priv->dev, "Source buffer not large enough (need %d bytes)!",
> + dev_err(priv->dev, "Source buffer not large enough (need %d bytes)!\n",
> totlen_src);
> return -EINVAL;
> }
> dma_map_sg(priv->dev, src, sreq->nr_src, DMA_TO_DEVICE);
>
> if (unlikely(totlen_dst && (sreq->nr_dst <= 0))) {
> - dev_err(priv->dev, "Dest buffer not large enough (need %d bytes)!",
> + dev_err(priv->dev, "Dest buffer not large enough (need %d bytes)!\n",
> totlen_dst);
> dma_unmap_sg(priv->dev, src, sreq->nr_src,
> DMA_TO_DEVICE);

Yes, thanks!

Acked-by: Pascal van Leeuwen <pvanleeuwen@xxxxxxxxxxxxxx>

Regards,
Pascal van Leeuwen
Silicon IP Architect, Multi-Protocol Engines @ Verimatrix
www.insidesecure.com