Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp10796362imu; Thu, 6 Dec 2018 06:58:47 -0800 (PST) X-Google-Smtp-Source: AFSGD/XB4gKWdETDtcMvESAZQnXZoDTkWLJRtlC75k8uF60qr5cprr3chXxfl5f03R6nr99NV/Vd X-Received: by 2002:a63:9c1a:: with SMTP id f26mr5840341pge.381.1544108327644; Thu, 06 Dec 2018 06:58:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544108327; cv=none; d=google.com; s=arc-20160816; b=XGAsDVCLMk/xjHuK5U09v5y5l54SiA/rJvon4pnjGegPIe+EJtWJ2viJqdChFSt/aC ohooa035HSZSg1Ywgev52y+yOvxSTDLqnu2Q+QGWaIgNdbnEr1rT5x3okO/AhEsrqSZL W/Sovrr2wDV8clGv/8SHNHhvbwmQnQZMR62xAx2OmFEHWGqIR2plB3bFd8lpbos1sLLx VXL18NcppKD7DZNyVP1L+/6qqvKnV5YzPTG2exsY4JsmN06yecgWkt4STm0ZURnz1PAp 39+iMN7DZwK0ojQy6p3GCNrGZ4bLUFj5n1gYDcr9Ust5KH9jwRAh1zvvj1DA/Y4H2ZoM UFnQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=5OvVR12UHLpdE4eJE5m7SMb5+OLJYolAMc/x3EFwdDg=; b=S0SBW2jxWgSY/+8RBrFoPGAk8y80YXnPXZosh+wistO3YYKTVE//u8duPGhKt8FhpK VG3upQ6TT1k8qWcungwxry9KnMQacwMsUic9WREogWdENbgkFv7KJ8wVRm6y33HbTZN7 ox6zovo2gzrZgAOKHNzodhW6O5fRjktJrZ8ds/V/FrOwj5eZyJ89GzSom+Q0QbICuUBU 6v9AAIaTHa6UL/w2Chx/XBffGj76eZW/3/B8//OvkuD8VnAYPLyYxA8QATxNBd42J8j0 0WhinNdfFy3lNhXXolqdDAHtx7+SRcQlsqHYUNLfR+bEGTptieYQhDNZNkkbJnLT40OS rqKw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=X1KvimOK; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o3si406297pgq.139.2018.12.06.06.58.31; Thu, 06 Dec 2018 06:58:47 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=X1KvimOK; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726184AbeLFO4n (ORCPT + 99 others); Thu, 6 Dec 2018 09:56:43 -0500 Received: from mail.kernel.org ([198.145.29.99]:47662 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730141AbeLFOnS (ORCPT ); Thu, 6 Dec 2018 09:43:18 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1A45E20892; Thu, 6 Dec 2018 14:43:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1544107397; bh=ZUIW6LxHPBXJjvpJtlJFdRcY3wVMHGxrQ/jy+QdcK1U=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=X1KvimOKZ15t4nEXfEOAagw0FM1F2PbWxT0Uhi7Hv2fvKkKwLe9jsVasTuxqIQKSC 4xpmU8c9usUkQlZGPeeLGoUAh3kEQdgVajIfCJhpHmuoyq8Xsy34iggqVOY9qwkQWW 7X6nVAc7Sa4V9gllCExq7V/yRn/CNz80dtlY/6Gs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Masahiro Yamada , Philipp Zabel , Dinh Nguyen Subject: [PATCH 4.14 46/55] reset: remove remaining WARN_ON() in Date: Thu, 6 Dec 2018 15:39:20 +0100 Message-Id: <20181206143004.231275920@linuxfoundation.org> X-Mailer: git-send-email 2.19.2 In-Reply-To: <20181206143001.749982936@linuxfoundation.org> References: <20181206143001.749982936@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Masahiro Yamada commit bb6c7768385b200063a14d6615cc1246c3d00760 upstream. Commit bb475230b8e5 ("reset: make optional functions really optional") gave a new meaning to _get_optional variants. The differentiation by WARN_ON() is not needed any more. We already have inconsistency about this; (devm_)reset_control_get_exclusive() has WARN_ON() check, but of_reset_control_get_exclusive() does not. Signed-off-by: Masahiro Yamada Signed-off-by: Philipp Zabel Cc: Dinh Nguyen Signed-off-by: Greg Kroah-Hartman --- include/linux/reset.h | 6 ------ 1 file changed, 6 deletions(-) --- a/include/linux/reset.h +++ b/include/linux/reset.h @@ -125,9 +125,6 @@ static inline int device_reset_optional( static inline struct reset_control * __must_check reset_control_get_exclusive(struct device *dev, const char *id) { -#ifndef CONFIG_RESET_CONTROLLER - WARN_ON(1); -#endif return __reset_control_get(dev, id, 0, false, false); } @@ -273,9 +270,6 @@ static inline struct reset_control * __must_check devm_reset_control_get_exclusive(struct device *dev, const char *id) { -#ifndef CONFIG_RESET_CONTROLLER - WARN_ON(1); -#endif return __devm_reset_control_get(dev, id, 0, false, false); }