Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp4769067ybi; Tue, 28 May 2019 02:08:50 -0700 (PDT) X-Google-Smtp-Source: APXvYqzl2JrsGasreFUjoCKB3Eq0MK2cXnpkYvDpthBPxqp7fBHsa9WIM50wR+bcpM5qBjPjfgCE X-Received: by 2002:a17:90a:ba96:: with SMTP id t22mr4300915pjr.143.1559034530327; Tue, 28 May 2019 02:08:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559034530; cv=none; d=google.com; s=arc-20160816; b=zjqknNA7rwUJzPqz/Fm+OBLRm+cOXpCfv/wldqJSo3fxNq6wWnqJMaoZ52Vlaib3+d 2D91ikEwDbxEQv0c7XkpwkpstLzggA9sCbWRcezfhH+5LSVAjjhMcYiRpwZtCDsSLg3X vA2cWsRh7LEgiVIsxL5aSnE3N31MKA3q17U3nJOd4WKyc85AXMoCw0SiodhMO5GdC0S1 8w7Vdo3MT4WE5v26wyo0BYgOqy57AVG93jyOGBGm/z47BGxDii/ppml7Kt42UcMYB1q0 HhO7KtvRyawKos9YVwseR0NsxrKHur5E2zeB9XZf8sE7Z1ycnU8nU2pN+M7hNCSeJXT5 KV3g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=uqvjuHP1JlltKsAAI+cqqXVrkqUOcJ7eWhpcU6m4g1c=; b=lV6mzYecnKmGT7vE+DdfhXEUgCj8iGJ38jZ1+fo+23ACM3AZN/8hKhooZqX+AFowls gmb7IyX0KqEoSjLh8hcG0/hYEraCsfyWvwQ7+uw55wyYWW27rZCs02NzlQm1jeWQjnOH RrBpM7AC4tKsHm01ZuE/MQgrbGUOg67O2FFAokR8PPLRZe2vbwMQxMZdi8IWUnc4LCti Xvsdv0q8RLnnUnlYVvZnUHKZLVWQemkWmN2ZIROX6WN5FQ5ZEP65Ea8px1CRE0205ZtK 4i1gnGgzCHRtvnzrYt3fSNB1OI9PPbGV8P+LgzvRnH/xBD6Xjgs9SBKO0sr08T/hBP7L 4o1w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ffwll.ch header.s=google header.b=frw58n0p; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s13si1597197plq.228.2019.05.28.02.08.34; Tue, 28 May 2019 02:08:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@ffwll.ch header.s=google header.b=frw58n0p; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727039AbfE1JDd (ORCPT + 99 others); Tue, 28 May 2019 05:03:33 -0400 Received: from mail-ed1-f68.google.com ([209.85.208.68]:47052 "EHLO mail-ed1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727014AbfE1JDb (ORCPT ); Tue, 28 May 2019 05:03:31 -0400 Received: by mail-ed1-f68.google.com with SMTP id f37so30562065edb.13 for ; Tue, 28 May 2019 02:03:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ffwll.ch; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=uqvjuHP1JlltKsAAI+cqqXVrkqUOcJ7eWhpcU6m4g1c=; b=frw58n0pRHAXNDbcXB+xAqYIkvLZxek+SzpkxuUVcIcCgtAz4ksuilklcx2AQ4saSF 4whTeD2QhLuWUQBHUNchNxxkkb8QdQNnYaTwPxS9iD+InQMnlwn6A6Hx4kcb2+t8RIKl C4tVxDn3n3c+Eq+/pdndHPl8PbLYZ9uoeajEE= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=uqvjuHP1JlltKsAAI+cqqXVrkqUOcJ7eWhpcU6m4g1c=; b=dkHH+vfGhQJUOXxiDXE3gbU7q2XoO8PYrNyOr33XcD0DT4zrX4Wwzw8FN8HqHJWWib lQoehzyV9evwn6Hf8EHMRhgaEqdgcY71MNdOpKJEFNVZCvo21B1TLEY2TWP1Cc95U6SU ObcFkYvJJLnDhQhU7TQ+z/u5o7kK+LaUWL1IHVQq6abjyi72LqdX6BmeqaTe++ZPGXej ms/0UORce871BzSeE38EkI6t/FkVesiCSkevbkQRAllqHcVaMBJOWQdUiTIs3NW+CrWa ckmq0FW7I9vxlCabHdrJQAlTINP/ljv6bm2dblswJKUQ4ezXRlei/5bJT2h2MrnAH9Yc 7a1A== X-Gm-Message-State: APjAAAU/nMc2C3HLM+R96NdDylJ9PYymJgP0T9aXPYcF7AIQ1mttp6lC WDdNc+1LAnFn2z5If/nZ/6dRuKnSG1E= X-Received: by 2002:a50:a4f7:: with SMTP id x52mr128120101edb.86.1559034209379; Tue, 28 May 2019 02:03:29 -0700 (PDT) Received: from phenom.ffwll.local ([2a02:168:569e:0:3106:d637:d723:e855]) by smtp.gmail.com with ESMTPSA id x49sm4072656edm.25.2019.05.28.02.03.28 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 28 May 2019 02:03:28 -0700 (PDT) From: Daniel Vetter To: LKML Cc: DRI Development , Intel Graphics Development , linux-fbdev@vger.kernel.org, Daniel Thompson , Bartlomiej Zolnierkiewicz , Daniel Vetter , Sam Ravnborg , Maarten Lankhorst Subject: [PATCH 12/33] fbdev/omap: sysfs files can't disappear before the device is gone Date: Tue, 28 May 2019 11:02:43 +0200 Message-Id: <20190528090304.9388-13-daniel.vetter@ffwll.ch> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190528090304.9388-1-daniel.vetter@ffwll.ch> References: <20190528090304.9388-1-daniel.vetter@ffwll.ch> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Which means lock_fb_info can never fail. Remove the error handling. Signed-off-by: Daniel Vetter Reviewed-by: Sam Ravnborg Reviewed-by: Maarten Lankhorst Cc: Daniel Vetter --- .../video/fbdev/omap2/omapfb/omapfb-sysfs.c | 21 +++++++------------ 1 file changed, 7 insertions(+), 14 deletions(-) diff --git a/drivers/video/fbdev/omap2/omapfb/omapfb-sysfs.c b/drivers/video/fbdev/omap2/omapfb/omapfb-sysfs.c index 8087a009c54f..bd0d20283372 100644 --- a/drivers/video/fbdev/omap2/omapfb/omapfb-sysfs.c +++ b/drivers/video/fbdev/omap2/omapfb/omapfb-sysfs.c @@ -60,8 +60,7 @@ static ssize_t store_rotate_type(struct device *dev, if (rot_type != OMAP_DSS_ROT_DMA && rot_type != OMAP_DSS_ROT_VRFB) return -EINVAL; - if (!lock_fb_info(fbi)) - return -ENODEV; + lock_fb_info(fbi); r = 0; if (rot_type == ofbi->rotation_type) @@ -112,8 +111,7 @@ static ssize_t store_mirror(struct device *dev, if (r) return r; - if (!lock_fb_info(fbi)) - return -ENODEV; + lock_fb_info(fbi); ofbi->mirror = mirror; @@ -149,8 +147,7 @@ static ssize_t show_overlays(struct device *dev, ssize_t l = 0; int t; - if (!lock_fb_info(fbi)) - return -ENODEV; + lock_fb_info(fbi); omapfb_lock(fbdev); for (t = 0; t < ofbi->num_overlays; t++) { @@ -208,8 +205,7 @@ static ssize_t store_overlays(struct device *dev, struct device_attribute *attr, if (buf[len - 1] == '\n') len = len - 1; - if (!lock_fb_info(fbi)) - return -ENODEV; + lock_fb_info(fbi); omapfb_lock(fbdev); if (len > 0) { @@ -340,8 +336,7 @@ static ssize_t show_overlays_rotate(struct device *dev, ssize_t l = 0; int t; - if (!lock_fb_info(fbi)) - return -ENODEV; + lock_fb_info(fbi); for (t = 0; t < ofbi->num_overlays; t++) { l += snprintf(buf + l, PAGE_SIZE - l, "%s%d", @@ -369,8 +364,7 @@ static ssize_t store_overlays_rotate(struct device *dev, if (buf[len - 1] == '\n') len = len - 1; - if (!lock_fb_info(fbi)) - return -ENODEV; + lock_fb_info(fbi); if (len > 0) { char *p = (char *)buf; @@ -453,8 +447,7 @@ static ssize_t store_size(struct device *dev, struct device_attribute *attr, size = PAGE_ALIGN(size); - if (!lock_fb_info(fbi)) - return -ENODEV; + lock_fb_info(fbi); if (display && display->driver->sync) display->driver->sync(display); -- 2.20.1