lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 02 Jul 2014 13:46:46 +0200
From:	Lars-Peter Clausen <lars@...afoo.de>
To:	Peter Ujfalusi <peter.ujfalusi@...com>, vinod.koul@...el.com,
	dan.j.williams@...el.com, tiwai@...e.de,
	Mark Brown <broonie@...nel.org>,
	Liam Girdwood <lgirdwood@...il.com>, joelf@...com,
	nsekhar@...com
CC:	linux-kernel@...r.kernel.org, alsa-devel@...a-project.org,
	dmaengine@...r.kernel.org
Subject: Re: [PATCH 3/4] ALSA: pcm_dmaengine: Use the available wrapper to
 get physical width

On 07/02/2014 01:29 PM, Peter Ujfalusi wrote:
> params_physical_width() is available via pcm_params.h
>
> Signed-off-by: Peter Ujfalusi <peter.ujfalusi@...com>

Acked-by: Lars-Peter Clausen <lars@...afoo.de>

Thanks.

> ---
>   sound/core/pcm_dmaengine.c | 2 +-
>   1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/sound/core/pcm_dmaengine.c b/sound/core/pcm_dmaengine.c
> index 76cbb9ec953a..d5611ec80381 100644
> --- a/sound/core/pcm_dmaengine.c
> +++ b/sound/core/pcm_dmaengine.c
> @@ -65,7 +65,7 @@ int snd_hwparams_to_dma_slave_config(const struct snd_pcm_substream *substream,
>   	enum dma_slave_buswidth buswidth;
>   	int bits;
>
> -	bits = snd_pcm_format_physical_width(params_format(params));
> +	bits = params_physical_width(params);
>   	if (bits < 8 || bits > 64)
>   		return -EINVAL;
>   	else if (bits == 8)
>

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ