Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp7516392imu; Tue, 22 Jan 2019 07:16:23 -0800 (PST) X-Google-Smtp-Source: ALg8bN5IOLSn9DVDCjpTZDgSjKlwf19+zePBpE0iRlyzpQM1mIy4M0St79zrCpsKYtA+VLXNscPZ X-Received: by 2002:a62:2082:: with SMTP id m2mr33208805pfj.163.1548170183765; Tue, 22 Jan 2019 07:16:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548170183; cv=none; d=google.com; s=arc-20160816; b=L3ryi2DOR3xlhzUfS75B0l733MKWpmUttihh5zhHJhKWkJjHtY0iOgx6ZuUX3fW3Bh T24ZbVelOLvH1lPdwu+fHDnRsR/GwrhNo7rV1uKX2Mh8id/bGpZHpXSnvB+feaTLkm22 4r2htujiEGT4HWWLUiMBxJFA/WT7yVWtgmBeKJkGaXDbzvpHsJUJM+SQ9EMvEJixnoBU 5EXG8b/5MV3jB/1C9cW5xTQXQMIdNezqTy/YGuu74TqjcUUPsNEbhbdH0IWxvFGMttpJ noaaK0Ltz6o7xtDeyNGcxTqhdMUQE22+39F7xESjM7sa/ZQpHyB4A5X2ipOPGy7hmy7x x+Ng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=/i4OTCG5uY/eGDI7qkGU6RBzvtuNzLv5BjiV9/dRXBc=; b=B0biOwULeoV5W4uvBFqh/Xn0vuYMG/3y+c10OF4pKWoedkX4ZVGZysXFallVWKLNDy pCzBoJdUmVLASrcjeo4Y4cfH3ucpsmRBWx0fsrF2GyI1WU46jyAZLFRAurc5nl5K9O3U 90oT+SKhfm9DX+mJ25gCzmLCl7hnmB10Re6fzbiw7fJEfzAEGChxfB+lTMHctcHWquGy dYHZJ6tL6yFWp5iKes7OuLS0C46JRhMj5HaYU+hucoL/67HiDg7+erzLO0l7Vp8op+qG LMw9xyvhCb7D7iHsZYlZ33fr0KaCaxzzZp2P3fTdcdscodyRGBFUX4mkfIrxwb3SPPtb Qo9g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=LM9SBnHO; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 204si12916271pfu.273.2019.01.22.07.16.07; Tue, 22 Jan 2019 07:16:23 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=LM9SBnHO; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729176AbfAVPO2 (ORCPT + 99 others); Tue, 22 Jan 2019 10:14:28 -0500 Received: from mail.kernel.org ([198.145.29.99]:53916 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728899AbfAVPO2 (ORCPT ); Tue, 22 Jan 2019 10:14:28 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5FDFF20879; Tue, 22 Jan 2019 15:14:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1548170067; bh=WBbVCM37JzleLtnPhzTgebvOSvH57a54qOBSUfe5kuM=; h=From:To:Cc:Subject:Date:From; b=LM9SBnHOuwCjsqXunZwSZfVfPKoCYboNBArakzhvLX0RdZ415XVlQzJ3J9MzlGASZ r2YS7RqcZy0mgpxIRssW2+520tiL6cMr6wpkOUb8CcKRh8egjmxTX45b4AFTNcIDHe qAWPR5Mw7JLBEqbQdhXzqxzMt6qgOtBxU1FUsp6U= From: Greg Kroah-Hartman To: Herbert Xu , David Miller Cc: linux-kernel@vger.kernel.org, linux-crypto@vger.kernel.org, Greg Kroah-Hartman Subject: [PATCH 0/7] crypto: cleanup debugfs usage Date: Tue, 22 Jan 2019 16:14:15 +0100 Message-Id: <20190122151422.14204-1-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When calling debugfs code, there is no need to ever check the return value of the call, as no logic should ever change if a call works properly or not. Fix up a bunch of crypto-specific code to not care about the results of debugfs. Greg Kroah-Hartman (7): crypto: qat: no need to check return value of debugfs_create functions crypto: ccrree: no need to check return value of debugfs_create functions crypto: axis: no need to check return value of debugfs_create functions crypto: cavium: zip: no need to check return value of debugfs_create functions crypto: cavium: nitrox: no need to check return value of debugfs_create functions crypto: ccp: no need to check return value of debugfs_create functions crypto: caam: no need to check return value of debugfs_create functions drivers/crypto/axis/artpec6_crypto.c | 9 ---- drivers/crypto/caam/ctrl.c | 21 +++----- drivers/crypto/caam/intern.h | 1 - drivers/crypto/cavium/nitrox/nitrox_debugfs.c | 27 ++-------- drivers/crypto/cavium/nitrox/nitrox_debugfs.h | 5 +- drivers/crypto/cavium/nitrox/nitrox_main.c | 4 +- drivers/crypto/cavium/zip/zip_main.c | 52 ++++--------------- drivers/crypto/ccp/ccp-debugfs.c | 36 +++---------- drivers/crypto/ccree/cc_debugfs.c | 22 ++------ drivers/crypto/ccree/cc_debugfs.h | 8 +-- drivers/crypto/ccree/cc_driver.c | 7 +-- drivers/crypto/qat/qat_c3xxx/adf_drv.c | 5 -- drivers/crypto/qat/qat_c3xxxvf/adf_drv.c | 5 -- drivers/crypto/qat/qat_c62x/adf_drv.c | 5 -- drivers/crypto/qat/qat_c62xvf/adf_drv.c | 5 -- drivers/crypto/qat/qat_common/adf_cfg.c | 7 --- drivers/crypto/qat/qat_common/adf_transport.c | 6 --- .../qat/qat_common/adf_transport_debug.c | 15 ------ drivers/crypto/qat/qat_dh895xcc/adf_drv.c | 5 -- drivers/crypto/qat/qat_dh895xccvf/adf_drv.c | 5 -- 20 files changed, 38 insertions(+), 212 deletions(-) -- 2.20.1