lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 06 Jul 2016 18:01:27 +0900 From: Andi Shyti <andi.shyti@...sung.com> To: Mauro Carvalho Chehab <mchehab@....samsung.com> Cc: Joe Perches <joe@...ches.com>, Sean Young <sean@...s.org>, Hans Verkuil <hverkuil@...all.nl>, linux-media@...r.kernel.org, linux-kernel@...r.kernel.org, Andi Shyti <andi.shyti@...sung.com>, Andi Shyti <andi@...zian.org> Subject: [PATCH v3 15/15] [media] lirc_dev: use LIRC_CAN_REC() define to check if the device can receive The LIRC_CAN_REC() returns a boolean "flag & LIRC_CAN_REC_MASK" to check whether the device can receive data. Signed-off-by: Andi Shyti <andi.shyti@...sung.com> --- drivers/media/rc/lirc_dev.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/drivers/media/rc/lirc_dev.c b/drivers/media/rc/lirc_dev.c index 8cf5e6b..809a867 100644 --- a/drivers/media/rc/lirc_dev.c +++ b/drivers/media/rc/lirc_dev.c @@ -586,7 +586,7 @@ long lirc_dev_fop_ioctl(struct file *file, unsigned int cmd, unsigned long arg) result = put_user(ir->d.features, (__u32 __user *)arg); break; case LIRC_GET_REC_MODE: - if (!(ir->d.features & LIRC_CAN_REC_MASK)) { + if (LIRC_CAN_REC(ir->d.features)) { result = -ENOTTY; break; } @@ -596,7 +596,7 @@ long lirc_dev_fop_ioctl(struct file *file, unsigned int cmd, unsigned long arg) (__u32 __user *)arg); break; case LIRC_SET_REC_MODE: - if (!(ir->d.features & LIRC_CAN_REC_MASK)) { + if (LIRC_CAN_REC(ir->d.features)) { result = -ENOTTY; break; } -- 2.8.1
Powered by blists - more mailing lists