Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp1572634yba; Sat, 27 Apr 2019 02:23:10 -0700 (PDT) X-Google-Smtp-Source: APXvYqzpMCx6u8oq+dS9mFySIg+ptyohxl9ctPJLDYoeelC7+mv9HbakfwJdO3Hl8pK807sxGoB3 X-Received: by 2002:a65:60d7:: with SMTP id r23mr739721pgv.223.1556356990178; Sat, 27 Apr 2019 02:23:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556356990; cv=none; d=google.com; s=arc-20160816; b=Za3EANhS1x4YLD5fCVvTA5PsVYs3xrV7tyB3VQVUtqpElLbqsB5HvFCTtjvVxpp2Ut Uq/D0RYeMjnszvGgMQ1varvyqKGVsSl9PVtV6yW4E655jO1wMqC+LjDs493EOVKkcM3S Bq5jdKlUZgfMxI7EW8fEsAtk+8EoYr+gY+Ouxm+SmyGQMHI/WBMf4A4XdYes+sjKxQtM JFPRtsETvGvWamEaHkbisoiGuSVqBDFFhkfHigLXdbGRuilGH5Jc1RG5SgHjtbUr05uC ecKZ25guhSWZItH4/uN70v09c+IXrUCPARbvaw41zSweOcyyuI6QtDsAuY3cT6T6unhR EMBg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=VK5Te1btuD+zeL5A8fU3jaFuYMKLWzvo08K3Jd0+rto=; b=nRo9Dbe9cnEQ0Pkn1O5QTAcLsDOrl0aJaf2tDHEvT5/DGDd/TY5VWnzMum+jbzGJEA rLznVtUAjU512lEXpiPPPkva9OlELRWzxD4kQUSBzmeIMF4g0BHh87AZ9tULp/dBUn40 OkjK5Gca5rreT1vJgRZonRDA/2y4boIqaoBISn8fen3yOt8rxOtWPBS07hsJvfvH3SIN lHNvqiszZEB45zp3tbrbQPACrWMLNXBMVytHazY6gm3QN9JXWbiFB9f0kVtCUNhKsFiw d7uKUf4qRPHokF7JLP/SzSkpFGpw4cBeKyY65OdKTAY+fKCUT8rf3QeWrNdWkUL/q6zx nJlQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a20si10439722pgk.90.2019.04.27.02.22.54; Sat, 27 Apr 2019 02:23:10 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726404AbfD0JUS (ORCPT + 99 others); Sat, 27 Apr 2019 05:20:18 -0400 Received: from www.osadl.org ([62.245.132.105]:46497 "EHLO www.osadl.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725871AbfD0JUS (ORCPT ); Sat, 27 Apr 2019 05:20:18 -0400 Received: from debian01.hofrr.at (178.115.242.59.static.drei.at [178.115.242.59]) by www.osadl.org (8.13.8/8.13.8/OSADL-2007092901) with ESMTP id x3R9K4GY028122; Sat, 27 Apr 2019 11:20:04 +0200 From: Nicholas Mc Guire To: Greg Kroah-Hartman Cc: Matt Sickler , devel@driverdev.osuosl.org, linux-kernel@vger.kernel.org, Nicholas Mc Guire Subject: [PATCH RFC V2] staging: kpc2000: use int for wait_for_completion_interruptible Date: Sat, 27 Apr 2019 11:14:34 +0200 Message-Id: <1556356474-8575-1-git-send-email-hofrat@osadl.org> X-Mailer: git-send-email 2.1.4 X-Spam-Status: No, score=-1.9 required=6.0 tests=BAYES_00 autolearn=ham version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on www.osadl.org Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org weit_for_completion_interruptible returns in (0 on completion and -ERESTARTSYS on interruption) - so use an int not long for API conformance and simplify the logic here a bit: need not check explicitly for == 0 as this is either -ERESTARTSYS or 0. Signed-off-by: Nicholas Mc Guire --- Problem located with experimental API conformance checking cocci script V2: kbuild reported a missing closing comment - seems that I managed send out the the initial version before compile testing/checkpatching sorry for the noise. Not sure if making such point-wise fixes makes much sense - this driver has a number of issues both style-wise and API compliance wise. Note that kpc_dma_transfer() returns int not long - currently rv (long) is being returned in most places (some places do return int) - so the return handling here is a bit inconsistent. Patch was compile-tested with: x86_64_defconfig + KPC2000=y, KPC2000_DMA=y (with a number of unrelated sparse warnings about non-declared symbols, and smatch warnings about overflowing constants as well as coccicheck warning about usless casting) Patch is against 5.1-rc6 (localversion-next is next-20190426) drivers/staging/kpc2000/kpc_dma/fileops.c | 16 +++++++++------- 1 file changed, 9 insertions(+), 7 deletions(-) diff --git a/drivers/staging/kpc2000/kpc_dma/fileops.c b/drivers/staging/kpc2000/kpc_dma/fileops.c index 5741d2b..66f0d5a 100644 --- a/drivers/staging/kpc2000/kpc_dma/fileops.c +++ b/drivers/staging/kpc2000/kpc_dma/fileops.c @@ -38,6 +38,7 @@ int kpc_dma_transfer(struct dev_private_data *priv, struct kiocb *kcb, unsigned { unsigned int i = 0; long rv = 0; + int ret = 0; struct kpc_dma_device *ldev; struct aio_cb_data *acd; DECLARE_COMPLETION_ONSTACK(done); @@ -180,16 +181,17 @@ int kpc_dma_transfer(struct dev_private_data *priv, struct kiocb *kcb, unsigned // If this is a synchronous kiocb, we need to put the calling process to sleep until the transfer is complete if (kcb == NULL || is_sync_kiocb(kcb)){ - rv = wait_for_completion_interruptible(&done); - // If the user aborted (rv == -ERESTARTSYS), we're no longer responsible for cleaning up the acd - if (rv == -ERESTARTSYS){ + ret = wait_for_completion_interruptible(&done); + /* If the user aborted (ret == -ERESTARTSYS), we're + * no longer responsible for cleaning up the acd + */ + if (ret) { acd->cpl = NULL; - } - if (rv == 0){ - rv = acd->len; + } else { + ret = acd->len; kfree(acd); } - return rv; + return ret; } return -EIOCBQUEUED; -- 2.1.4