Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp3390838ybp; Sun, 6 Oct 2019 10:54:00 -0700 (PDT) X-Google-Smtp-Source: APXvYqwgKHVSgcIB7cz5g/xlppOekK9+kWkABuYYKIlGNi2i1AXs9WwR9Ht4AA7f+bEi6RgcYkgT X-Received: by 2002:a17:906:1c06:: with SMTP id k6mr20276579ejg.217.1570384440133; Sun, 06 Oct 2019 10:54:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570384440; cv=none; d=google.com; s=arc-20160816; b=komCCNMSrI6PnW1uQEuZYQRVa9eQ5yxKbM6ehRKii4fgUTk5ykKOb57TYwAtnlp7ib 0t0ke1cZV/mbMM0dkRl5NJnsIu8rj1jOEsioL4s/5ePLh2ZMr0XsrVq9Wbz6rfgQT9D3 pHXkFE1UTEnzJWJz8cB0z7v+v0g2BoZrJlnkjabjJSCEmOOC9LiMOrCX3Wi91k3PgEPx 8n3/ZJXxB41x+SmBRXOw7PaZSHZKQjrN1l5bkTsHcHDCPOaMJGlybcXp9cCBT6+BCyNC C8UVjIfCMZaooY+0vONCCE5UE7WegPlnrVtssrQad40M0WTu06X65tMSalip3u62gD4n TWbw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=H+zwdb89LIhqjtMa8knBR4C+qxB/3MrohdQeEzrA3GU=; b=QLJE5X59sW3n84V+QPikAErUTDVOr2EO4Up5F9KxtKFuANUnXKXO/uI/PYADsAFeT4 E+8dD8iMB9p7HJeLb+IsL1D1RNlQKxNtdtkgHoJL+PlD/dS2vpXZeH2jk9NwH+5YkZLE Lx0+uCIHiZ6XI8aFBrmQaQ9KJD9FcNyBc5f1jInYCZuKI1nSTnjolwNE+C0frdxXUDaA IVgd2jYXS5vkPHT1UCuNV3UI/W0xe86Hx3+dALnc6DddSzdQH54WfYwebbrY2zRkzb5z zOV2dV21aAmqBELcG8VseMa2OFXOXaqwf0nY208Dn/dSwdcqYrhUA/IkXMCEWNvB0k8k l+ng== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=NrLE5YQp; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i13si6848327edv.182.2019.10.06.10.53.36; Sun, 06 Oct 2019 10:54:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=NrLE5YQp; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730501AbfJFRhs (ORCPT + 99 others); Sun, 6 Oct 2019 13:37:48 -0400 Received: from mail.kernel.org ([198.145.29.99]:36808 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730497AbfJFRhp (ORCPT ); Sun, 6 Oct 2019 13:37:45 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BFDDF2053B; Sun, 6 Oct 2019 17:37:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1570383465; bh=fmz5hC3yBNgy6dgTbMASSrGRRvVOVbS1qhdGVdbjLH0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=NrLE5YQpEokCtObOnaHoc6sd1w/NzIvk6lVFScsr5jjg74FPdYDnzVFDQBO5qeCU2 4dJuwYO++mGv4jILQxo8z0EbTstS/e44JghECJj4NkciNgFFddAiT/rmtVihkaloou XaisPdxnZ2pQ5FpkaFd5wdqTOL8o1mv563TWaVZA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Thierry Reding , Lorenzo Pieralisi , Andrew Murray , Jingoo Han , Kukjin Kim , Krzysztof Kozlowski , Sasha Levin Subject: [PATCH 5.2 113/137] PCI: exynos: Propagate errors for optional PHYs Date: Sun, 6 Oct 2019 19:21:37 +0200 Message-Id: <20191006171218.531300718@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191006171209.403038733@linuxfoundation.org> References: <20191006171209.403038733@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Thierry Reding [ Upstream commit ddd6960087d4b45759434146d681a94bbb1c54ad ] devm_of_phy_get() can fail for a number of reasons besides probe deferral. It can for example return -ENOMEM if it runs out of memory as it tries to allocate devres structures. Propagating only -EPROBE_DEFER is problematic because it results in these legitimately fatal errors being treated as "PHY not specified in DT". What we really want is to ignore the optional PHYs only if they have not been specified in DT. devm_of_phy_get() returns -ENODEV in this case, so that's the special case that we need to handle. So we propagate all errors, except -ENODEV, so that real failures will still cause the driver to fail probe. Signed-off-by: Thierry Reding Signed-off-by: Lorenzo Pieralisi Reviewed-by: Andrew Murray Cc: Jingoo Han Cc: Kukjin Kim Cc: Krzysztof Kozlowski Signed-off-by: Sasha Levin --- drivers/pci/controller/dwc/pci-exynos.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/pci/controller/dwc/pci-exynos.c b/drivers/pci/controller/dwc/pci-exynos.c index cee5f2f590e2d..14a6ba4067fbe 100644 --- a/drivers/pci/controller/dwc/pci-exynos.c +++ b/drivers/pci/controller/dwc/pci-exynos.c @@ -465,7 +465,7 @@ static int __init exynos_pcie_probe(struct platform_device *pdev) ep->phy = devm_of_phy_get(dev, np, NULL); if (IS_ERR(ep->phy)) { - if (PTR_ERR(ep->phy) == -EPROBE_DEFER) + if (PTR_ERR(ep->phy) != -ENODEV) return PTR_ERR(ep->phy); ep->phy = NULL; -- 2.20.1