Received: by 2002:ac0:98c7:0:0:0:0:0 with SMTP id g7-v6csp2430787imd; Sun, 28 Oct 2018 09:52:27 -0700 (PDT) X-Google-Smtp-Source: AJdET5fne0cU55KxnPBm0SSjiAwn8d9Q2ZQGeg9gSItzWtrTUBJ0cMCsSXJ7C+6qg8+L8CDwXPga X-Received: by 2002:a17:902:b197:: with SMTP id s23-v6mr10739600plr.51.1540745547699; Sun, 28 Oct 2018 09:52:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1540745547; cv=none; d=google.com; s=arc-20160816; b=iyjGH4LWSL29uibMu8vy0b2w+/h+RDSB6voaXkp1T4WhzFYrFbppLottzhxPQTLrDX VhS0brG+Fk6bBYqtxx52mASyPhqnK83VTyje6Z358s3QQnu1IAoqoh6HNobV0lxHDBn6 zz53DVTy0Y06X1LguR5xeNgIRNC2i/KPn+mb8ShaSudpPg56HbdhMFXwXv6BbjLyccoN K5Fe/SGj1gThBzWKEImqdv4p9P3khNOU1utiKIn4wVddOFD2vFcBnZp7CyoFF/a4Gwaj DEOOeqHQDkhAfw3/wsUDXr8Iw5WvLEFoDEEwESRSvTfBRiMGYGTrK66UV7742kqIGsEk gaHA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=2ucFiqWlTtX2yRErqJe3QlE9Sl6zDnHa0LdVB1TN0S8=; b=wOd1YMO/dPXbb0P+OO1TaybWMsIRjsonFr3QhUePRuQ98ASQsSbHweGfaLOtjTXIm6 mdxPSryfOoJQK+5IVRREkr7Azg2oDTRWTH7t9ffcqsFaX9azH77pvBd3dBXszHXHB5Ya y3448/uItcegNQsN2a+nLp0K76hCzKv69vAVafzsBOXwlGPRY/dTneHhoRHc/ikOl/CP DxW2V9ACcSeaps/bc4upVEsWZNSQD8s7KA4KzWJBI8Bt8ahrDaBz0N52ClE9S4hgLdW8 hKE7SpXwmjhqWo1juFN6NE66gxpZ1zMW5k7Dt2RHq4uJpx6H6BYQY3GpgvQIIkSW7X0Z knWw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=IyI5gnsP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w5-v6si18006890pgw.184.2018.10.28.09.52.12; Sun, 28 Oct 2018 09:52:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=IyI5gnsP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727801AbeJ2BZu (ORCPT + 99 others); Sun, 28 Oct 2018 21:25:50 -0400 Received: from mail.kernel.org ([198.145.29.99]:53002 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726492AbeJ2BZu (ORCPT ); Sun, 28 Oct 2018 21:25:50 -0400 Received: from archlinux (cpc91196-cmbg18-2-0-cust659.5-4.cable.virginm.net [81.96.234.148]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id CBA4420831; Sun, 28 Oct 2018 16:40:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1540744842; bh=vU9+Jx0JkAc/sb4nvuerh78nzxvVBp/YrmoMigp7JGE=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=IyI5gnsPWT4bH8zeY9/uhU96O59bLMGH8Zme4XH6Me+Y7QagldpyQASum100e0rGz d4WvnhNX3srqBDqEzaXR2/ByLOPFJinGfFWXM6fgeoZjsHAVVzXBgtC9GW5Savd4Gx psVJdO5kZrpDQDMEVsQq0fOrIJwavdXr5fpPYdZw= Date: Sun, 28 Oct 2018 16:40:38 +0000 From: Jonathan Cameron To: Matheus Tavares Cc: Lars-Peter Clausen , Michael Hennerich , Hartmut Knaack , Peter Meerwald-Stadler , Greg Kroah-Hartman , linux-iio@vger.kernel.org, devel@driverdev.osuosl.org, linux-kernel@vger.kernel.org, kernel-usp@googlegroups.com Subject: Re: [PATCH v2 1/6] staging:iio:ad2s90: Make read_raw return spi_read's error code Message-ID: <20181028164038.0c920358@archlinux> In-Reply-To: <20181027020005.3140-2-matheus.bernardino@usp.br> References: <20181027020005.3140-1-matheus.bernardino@usp.br> <20181027020005.3140-2-matheus.bernardino@usp.br> X-Mailer: Claws Mail 3.17.1 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 26 Oct 2018 23:00:00 -0300 Matheus Tavares wrote: > Previously, when spi_read returned an error code inside ad2s90_read_raw, > the code was ignored and IIO_VAL_INT was returned. This patch makes the > function return the error code returned by spi_read when it fails. > > Signed-off-by: Matheus Tavares Hi Matheus, One quick process note is that it takes people a while to get around to reviewing a series, so whilst it's tempting to very quickly send out a fix the moment someone points out something that needs fixing, it is perhaps better to wait at least a few days to see if you can pick up a few more reviews before you do a V2. A few comments on this one inline. I think it can be done 'slightly' (and I mean only slightly) nicer than the version you have. Result is the same though. Thanks, Jonathan > --- > drivers/staging/iio/resolver/ad2s90.c | 9 ++++++--- > 1 file changed, 6 insertions(+), 3 deletions(-) > > diff --git a/drivers/staging/iio/resolver/ad2s90.c b/drivers/staging/iio/resolver/ad2s90.c > index 59586947a936..11fac9f90148 100644 > --- a/drivers/staging/iio/resolver/ad2s90.c > +++ b/drivers/staging/iio/resolver/ad2s90.c > @@ -35,12 +35,15 @@ static int ad2s90_read_raw(struct iio_dev *indio_dev, > struct ad2s90_state *st = iio_priv(indio_dev); > > mutex_lock(&st->lock); > + Unconnected change. I'm not against the change in principle but please group white space tidying up in it's own patch. > ret = spi_read(st->sdev, st->rx, 2); > - if (ret) > - goto error_ret; > + if (ret < 0) { > + mutex_unlock(&st->lock); > + return ret; I'd actually prefer to keep the return path the same as before as then it is easy (if the function gets more complex in future) to be sure that all paths unlock the mutex. > + } > + > *val = (((u16)(st->rx[0])) << 4) | ((st->rx[1] & 0xF0) >> 4); > > -error_ret: > mutex_unlock(&st->lock); > > return IIO_VAL_INT; The 'standard' if slightly nasty way of doing this is: return ret ? ret : IIO_VAL_INT;