Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp7373014yba; Thu, 2 May 2019 08:46:53 -0700 (PDT) X-Google-Smtp-Source: APXvYqxI0jn+x9AZlMUjkFAzj2+XlcL/B/4w9DhpXPEAMdb3YDhipI8k0OxUAYVvB/BCfp8nvXOt X-Received: by 2002:a63:e048:: with SMTP id n8mr4704303pgj.41.1556812013677; Thu, 02 May 2019 08:46:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556812013; cv=none; d=google.com; s=arc-20160816; b=M3e7GVJfa+jl+C+FeY4TzU7ec5e7Wn26rIzPxQ6/HpWCBBnlWcyQ5bbDLEb5PsxyTi 6broIhCjD0Zct9swcpNOYn8k6yhCS6HTQ6lEIgY9CaMRlqYvxG7fQj3LyhFCLdUKuHVO 4cQw9FgtoKmUsJbxRPt0tsPFR7yrDszKJGEg7B6SXWtd/XqeofvkNZ4XWgAP/p1gkru3 qGtJ1lgRKM+xrjp/Te5rCEkOeNOx1exRl0kxWW30mpKslCEHfgf9sXfIxr5C5pdncTM4 jCiMIAazVdRrVZRhwubrQSVg0KJ5FOqQSNXrGN4CYZAT+Npe+UtknlBKWLdU3NRiWp6x cAKQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=0ZCtV+9OZYq2zPCqv5RopTk7WzEO40MuUFzvUfEW2tE=; b=FuWMLDIcXa/xnw78uhv6VObIPFF2roopqaz8AEJLrf16lbJTg2ekHxSpVl3BEzB92h H2yKmJjoJwX3Wv7o0Vk2iJTdTW58d6RjdbHJLBhQkgMb4RMgpHCpSYYN37w9sAJg6CAy y6S1k5IARO7xYQl9z3hdrbCFt72mOhtDxvHVJmLuVg0iATk0zYTq7zcgtuPHAFbcackM EoCEVtOqobGC3QHODfM8GT42aA/GCAL2Z31VhR1d5IBvrK7Goirh6lXtI4aV8Cak9UFR idYrubVHiAP3iq+LB8vLhr+1ZHQtDxy+AmfEnKN387yXmpnzLTCLXVOQoecJ33cg0yPk qvHQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2SndJlxr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o1si46429816pld.269.2019.05.02.08.46.38; Thu, 02 May 2019 08:46:53 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2SndJlxr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727804AbfEBP0q (ORCPT + 99 others); Thu, 2 May 2019 11:26:46 -0400 Received: from mail.kernel.org ([198.145.29.99]:43426 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727793AbfEBP0m (ORCPT ); Thu, 2 May 2019 11:26:42 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 35CD720449; Thu, 2 May 2019 15:26:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1556810801; bh=9cfkjKJhKFyg+kUI5gYHuFHBzIfYZ/2LtqZ2CTwKTI4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=2SndJlxrIYn8L20HFvaGGAJ8tMQGECcrkCgxs662DGwI69CHdmR3yuNohytAFtQaV wwHekmqR8Hkb6cHFEs/IUTqfw299ZPMLEswyoS+UZNPazgZEd3HqImNvYGvBzHDGe0 d7tAlgVR61/nPUc8VlWorgpM+Haim213mvFuNe5w= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Lukas Wunner , Frank Pavlic , Stephen Boyd , Nishanth Menon , "David S. Miller" , "Sasha Levin (Microsoft)" Subject: [PATCH 4.19 34/72] net: ks8851: Reassert reset pin if chip ID check fails Date: Thu, 2 May 2019 17:20:56 +0200 Message-Id: <20190502143336.216832866@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190502143333.437607839@linuxfoundation.org> References: <20190502143333.437607839@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 761cfa979a0c177d6c2d93ef5585cd79ae49a7d5 ] Commit 73fdeb82e963 ("net: ks8851: Add optional vdd_io regulator and reset gpio") amended the ks8851 driver to briefly assert the chip's reset pin on probe. It also amended the probe routine's error path to reassert the reset pin if a subsequent initialization step fails. However the commit misplaced reassertion of the reset pin in the error path such that it is not performed if the check of the Chip ID and Enable Register (CIDER) fails. The error path is therefore slightly asymmetrical to the probe routine's body. Fix it. Signed-off-by: Lukas Wunner Cc: Frank Pavlic Cc: Stephen Boyd Cc: Nishanth Menon Signed-off-by: David S. Miller Signed-off-by: Sasha Levin (Microsoft) --- drivers/net/ethernet/micrel/ks8851.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/ethernet/micrel/ks8851.c b/drivers/net/ethernet/micrel/ks8851.c index a93f8e842c07..1633fa5c709c 100644 --- a/drivers/net/ethernet/micrel/ks8851.c +++ b/drivers/net/ethernet/micrel/ks8851.c @@ -1554,9 +1554,9 @@ static int ks8851_probe(struct spi_device *spi) free_irq(ndev->irq, ks); err_irq: +err_id: if (gpio_is_valid(gpio)) gpio_set_value(gpio, 0); -err_id: regulator_disable(ks->vdd_reg); err_reg: regulator_disable(ks->vdd_io); -- 2.19.1