Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp3499924ybl; Sun, 15 Dec 2019 11:10:45 -0800 (PST) X-Google-Smtp-Source: APXvYqyCbEpSKDQCKNFvt2FrRaB3J8wLTdv1UdR3b3N8PS4vVRz9/jO8nIsYDfwC/zTgJ3Mjoc8p X-Received: by 2002:a05:6830:1188:: with SMTP id u8mr28050565otq.274.1576437045234; Sun, 15 Dec 2019 11:10:45 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1576437045; cv=none; d=google.com; s=arc-20160816; b=R+J71AW1XwaEFxPoDwT3b5fBQyhTCpv6LAXfsGZKfkXmYlQbWn+bCp8BkO3icN0pZb DCmSnliv+k2NI6gm8H4LW5YcFcwIs4ud8458PLkW5hRg6naa5yyuqAo6B87EhFEFe86I dHNjZryId01oXymrzGphcP4KQdWg8ay9vfWcoEon0/ZHN2PW8Njy/ckWh/heFwTKY5nO xKluCMO0Egeuzng9WCkYjbSIAq6gByrbcDFIviw6uFc8eeVjagitN2rLa6h8x1yv63Xo ggdK+R4wSE308yKiKlXxR47H4yjwLpSn3JlANhrJ23jlV+Z+zz6JPg4mq4cuh284cIqw ZfcA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=+XofKlY2ELC3m9gzohLJ7PeF1NbOLELTBiVcgQRVqFw=; b=LFuSp9/QLp7u784FT9mzkOgfrHs96unFWLwr8NMrBNzam/vaV6a3SZSIUk4LLwmDvJ A/o1KT4DmOm1oL2PSuqswvVTqVY/9rHzbY1jNk7smMNylrO1JYKsqAeKFzLiYY/1JKbJ 2c1QsclTI1c1qPtLj9/02dmJKFVR2zo2eShQJB5Wm6EIcUsPvJoEseQCNqyLGXjm+g7h EjaedNJu7wmwjFsR+jWnFF2A1uHZdF1xoCRNfluNLJpH5P11EIPD4VupeZqy4eQt4zgV whhYmQvxav6YqblIaccStdoKWcaGmljbupbPjWEmS97wApIId8uGM1E/f5F7JLpWklBi 1EVQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=BNYMJvZ8; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g62si9563214oia.57.2019.12.15.11.10.33; Sun, 15 Dec 2019 11:10:45 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=BNYMJvZ8; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726528AbfLOTIw (ORCPT + 99 others); Sun, 15 Dec 2019 14:08:52 -0500 Received: from mail.kernel.org ([198.145.29.99]:60596 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726470AbfLOTIv (ORCPT ); Sun, 15 Dec 2019 14:08:51 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id CE77624679; Sun, 15 Dec 2019 19:08:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1576436931; bh=7X8VWHMFWfCEhaneD3PL+S0Sqx3q7ECu5a1X/J5YMdU=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=BNYMJvZ8v7gouX/+KRkXUj78be86pjgXjnCcHTPzOKIT9VeVDPUtPqBayPd1vQaiB o6eFbHaY7vxHaKXfoaQ/1uLSsMmsSccfwArJxlXeppcydmrF0pB8rIzRB2gckGduwt cLa8T/tKmMyFbojb5yT/VhTtKF1WtLlbtsiKLHp8= Date: Sun, 15 Dec 2019 20:08:49 +0100 From: Greg Kroah-Hartman To: Aditya Pakki Cc: kjlu@umn.edu, Mark Brown , "Rafael J. Wysocki" , linux-kernel@vger.kernel.org Subject: Re: [PATCH] regmap: replace multiple BUG_ON assertions with error return code Message-ID: <20191215190849.GA914378@kroah.com> References: <20191215183952.689-1-pakki001@umn.edu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191215183952.689-1-pakki001@umn.edu> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Dec 15, 2019 at 12:39:52PM -0600, Aditya Pakki wrote: > Various register operations check for the validity of cache_ops > struct and crash in case of failure. However, by returning the error > to the callers, instead of assert, these functions can avoid the crash. > > Signed-off-by: Aditya Pakki > --- > drivers/base/regmap/regcache.c | 12 ++++++++---- > 1 file changed, 8 insertions(+), 4 deletions(-) > > diff --git a/drivers/base/regmap/regcache.c b/drivers/base/regmap/regcache.c > index a93cafd7be4f..855fa25ae595 100644 > --- a/drivers/base/regmap/regcache.c > +++ b/drivers/base/regmap/regcache.c > @@ -238,7 +238,8 @@ int regcache_read(struct regmap *map, > if (map->cache_type == REGCACHE_NONE) > return -ENOSYS; > > - BUG_ON(!map->cache_ops); > + if (!map->cache_ops) > + return -EINVAL; While it is fun to make patches like this, again, if you can prove that this can never happen, just remove the check please. And if it can happen, why is -EINVAL the correct error code here? thanks, greg k-h