Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp774651ybl; Wed, 11 Dec 2019 07:19:50 -0800 (PST) X-Google-Smtp-Source: APXvYqwvD7eNR6poJ7lrHry4O/rS6ldAmaTl/pGvREGVTbYevRDmPzR+v4/sRJHK8lR0Eus+AHdk X-Received: by 2002:a9d:6654:: with SMTP id q20mr2614850otm.284.1576077590160; Wed, 11 Dec 2019 07:19:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1576077590; cv=none; d=google.com; s=arc-20160816; b=v2nB+vkAc0HtwrTBwCJqhyYMYCS4dIgDvYPiYcP/hDThkg2NEqNBK4vgfiqw+fPMlA cS29fIWp5NlBT0uC0JyuKVnlzPU8M4bwyRwD6IRzTyJGSI+XZaHsK6JxzPnmtUSV/4pS vYNgaVuHevmVS5mbQjZaCRyRWfK5+rZW6ygTm4jqQZ+/3uKckobbha15+9ovOX+X0eAm WAtkAXNQbRD0T38KQ7eLY+TJ+Y3uIAcX5FXLRurtIIZHW58i7wCJl5WPJOz4ehdQo5Q+ DU1TyXXtnOAf6AI7nEhx5ZZgzXAXIFH62xqWkk0VahAVWflRsoQvjpy7dW3wdvt2VdPp wzJA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=+mfnqcl/BRaMBJ31XvXXSyKaJBXC8gQsTqFrN+w4PEc=; b=AstCM5WZSoO+pVjUrPaCUBhD2dA3JIBTF5CinkQNV1yttiSIl3ntVq2boRYBnh2+wH AHSZTf3fuqvGXA1goungUPeI+gsF5kG1dnMKaxUNLUMbXuB83AHX5UqFPjezA++/r1uk AlmOiXe42A1p/xf8lw3Zk9TMnbayqiC3E4Dt5z79x028ZJMYhKpmxFD/oVT5IjRZ3X/A yMWX3aSB/6TQqET0/MtHksollfqgD130H4OQgYnzEbwBkth0FxSQIik1BGGXtDx3ZsDG dr4Tx8w/UKNO2Hc6d9+SwoMIMJdKVnRMTUqxeOZwLGi0jmSsic/5JhdPTsq1SqQCJ79+ QTgA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=b0KVAoL5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w64si1338907oib.185.2019.12.11.07.19.38; Wed, 11 Dec 2019 07:19:50 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=b0KVAoL5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730107AbfLKPS6 (ORCPT + 99 others); Wed, 11 Dec 2019 10:18:58 -0500 Received: from mail.kernel.org ([198.145.29.99]:47258 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732040AbfLKPSz (ORCPT ); Wed, 11 Dec 2019 10:18:55 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1062324654; Wed, 11 Dec 2019 15:18:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1576077534; bh=cZRXYZr3dnqdd2ZANv1oCOypDbcNrsP6ksZp+LUmUVU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=b0KVAoL5cYDPuofzMR6XCplmEoxGCPrS9VW+mxaaPGae4z0DZpoIEFYRAD5T/w5co qqi8OAnppLKS5IZq8jR+l4Du7OpGuHfv5W8McKWcNjWBecPGW4VVKYKHof91bYlfJP 8RNRcozqyWOQGE1lX1DZhKH5q324KHOAkGjnRYf0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Cheng-Yi Chiang , Mark Brown , Douglas Anderson , Sasha Levin Subject: [PATCH 4.19 068/243] regulator: Fix return value of _set_load() stub Date: Wed, 11 Dec 2019 16:03:50 +0100 Message-Id: <20191211150343.689372303@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20191211150339.185439726@linuxfoundation.org> References: <20191211150339.185439726@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Mark Brown [ Upstream commit f1abf67217de91f5cd3c757ae857632ca565099a ] The stub implementation of _set_load() returns a mode value which is within the bounds of valid return codes for success (the documentation just says that failures are negative error codes) but not sensible or what the actual implementation does. Fix it to just return 0. Reported-by: Cheng-Yi Chiang Signed-off-by: Mark Brown Reviewed-by: Douglas Anderson Signed-off-by: Mark Brown Signed-off-by: Sasha Levin --- include/linux/regulator/consumer.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/include/linux/regulator/consumer.h b/include/linux/regulator/consumer.h index 25602afd48447..f3f76051e8b00 100644 --- a/include/linux/regulator/consumer.h +++ b/include/linux/regulator/consumer.h @@ -508,7 +508,7 @@ static inline int regulator_get_error_flags(struct regulator *regulator, static inline int regulator_set_load(struct regulator *regulator, int load_uA) { - return REGULATOR_MODE_NORMAL; + return 0; } static inline int regulator_allow_bypass(struct regulator *regulator, -- 2.20.1