]> git.kernelconcepts.de Git - karo-tx-linux.git/commitdiff
drivers/char/dsp56k.c: drop check for negativity of unsigned parameter
authorAndrey Utkin <andrey.krieger.utkin@gmail.com>
Thu, 17 Jul 2014 12:18:53 +0000 (15:18 +0300)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Fri, 18 Jul 2014 01:38:37 +0000 (18:38 -0700)
[linux-3.16-rc5/drivers/char/dsp56k.c:386]: (style) Checking if unsigned
variable 'arg' is less than zero.

Source code is

            if (arg > 31 || arg < 0)
                return -EINVAL;

But

static long dsp56k_ioctl(struct file *file, unsigned int cmd,
             unsigned long arg)

Bugzilla: https://bugzilla.kernel.org/show_bug.cgi?id=80411
Reported-by: David Binderman <dcb314@hotmail.com>
Signed-off-by: Andrey Utkin <andrey.krieger.utkin@gmail.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
drivers/char/dsp56k.c

index 01a5ca7425d737d991f8663c70aae9e0f0222014..8bf70e8c3f790635328fbd79ae75331701c4f1a0 100644 (file)
@@ -383,7 +383,7 @@ static long dsp56k_ioctl(struct file *file, unsigned int cmd,
                        return put_user(status, &hf->status);
                }
                case DSP56K_HOST_CMD:
-                       if (arg > 31 || arg < 0)
+                       if (arg > 31)
                                return -EINVAL;
                        mutex_lock(&dsp56k_mutex);
                        dsp56k_host_interface.cvr = (u_char)((arg & DSP56K_CVR_HV_MASK) |