diff options
author | Aaro Koskinen <aaro.koskinen@iki.fi> | 2013-12-21 13:37:36 -0500 |
---|---|---|
committer | Felipe Balbi <balbi@ti.com> | 2013-12-23 11:14:33 -0500 |
commit | 80f46d5dcb0af46f325c897392baef4911f401b7 (patch) | |
tree | 2e71c4f5c92e183fa6296405d0c997aa433c5d10 /drivers/usb/phy | |
parent | 2ee8ff30849def5ac0d942439bf533826ad8e4ba (diff) |
usb: phy: tahvo: fix smatch warnings
phy-tahvo introduced the following smatch warnings:
drivers/usb/phy/phy-tahvo.c:203 tahvo_usb_set_host() warn: variable dereferenced before check 'otg' (see line 199)
drivers/usb/phy/phy-tahvo.c:235 tahvo_usb_set_peripheral() warn: variable dereferenced before check 'otg' (see line 231)
Fix by deleting bogus NULL pointer checks. The USB framework will always
call us with a valid OTG pointer.
Reported-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: Aaro Koskinen <aaro.koskinen@iki.fi>
Signed-off-by: Felipe Balbi <balbi@ti.com>
Diffstat (limited to 'drivers/usb/phy')
-rw-r--r-- | drivers/usb/phy/phy-tahvo.c | 6 |
1 files changed, 0 insertions, 6 deletions
diff --git a/drivers/usb/phy/phy-tahvo.c b/drivers/usb/phy/phy-tahvo.c index 8bb833e22d64..cc61ee44b911 100644 --- a/drivers/usb/phy/phy-tahvo.c +++ b/drivers/usb/phy/phy-tahvo.c | |||
@@ -200,9 +200,6 @@ static int tahvo_usb_set_host(struct usb_otg *otg, struct usb_bus *host) | |||
200 | 200 | ||
201 | dev_dbg(&tu->pt_dev->dev, "%s %p\n", __func__, host); | 201 | dev_dbg(&tu->pt_dev->dev, "%s %p\n", __func__, host); |
202 | 202 | ||
203 | if (otg == NULL) | ||
204 | return -ENODEV; | ||
205 | |||
206 | mutex_lock(&tu->serialize); | 203 | mutex_lock(&tu->serialize); |
207 | 204 | ||
208 | if (host == NULL) { | 205 | if (host == NULL) { |
@@ -232,9 +229,6 @@ static int tahvo_usb_set_peripheral(struct usb_otg *otg, | |||
232 | 229 | ||
233 | dev_dbg(&tu->pt_dev->dev, "%s %p\n", __func__, gadget); | 230 | dev_dbg(&tu->pt_dev->dev, "%s %p\n", __func__, gadget); |
234 | 231 | ||
235 | if (!otg) | ||
236 | return -ENODEV; | ||
237 | |||
238 | mutex_lock(&tu->serialize); | 232 | mutex_lock(&tu->serialize); |
239 | 233 | ||
240 | if (!gadget) { | 234 | if (!gadget) { |