Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp2913352pxb; Tue, 24 Aug 2021 10:27:56 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw+NOvVczLfndUJL6I5F9wt+SMgRuXF8BBGCq6JNqbOLbMb6s5387OofR1KHScp5TOq1j0g X-Received: by 2002:a05:6638:35aa:: with SMTP id v42mr1513633jal.5.1629826076031; Tue, 24 Aug 2021 10:27:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1629826076; cv=none; d=google.com; s=arc-20160816; b=oksMM5e7nhZ5U7GgxbbYFvkb1g94Zm8vVbV0+lV+cKteL0AaOzUqJfm2JRUxOtkjy8 ECsfF76Ie3HjLHurf9TOPyseUVLuhesDqHFSNZ9dUNxYtZ0JiRtUKo95GppcMVEc3gft BKRFnMmrD+IbprK0qiX8ZRf8+EsmMfxkyhwCDn8kSjR31NQ3tuqS69rBvOFEF47EQi27 IYw6QT+oQtvFtw04LZCfFUh2DEeMdRK+6Gtpkr83iIhZTDWls4uWDtMCPJdTKlDcfLAK Za78OCngsuZhEN0hWZy3TQnX0pZjYXQkTbFNurXmADIM8U7aJtFt1cfEmXv9/tsWJxUc q4ng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=WQ3OeoY71dXD+Xp8XPDFPMzzpR9OqS0UPZ7Ttmiu+fY=; b=zPgSNEISGy2nYwJoiTalDB0ZQUXZ97BW48U8czwQ72WZ3qGS9ZQ5fpUyGzD4KG8apb 9Ssu9h8dxxPXaoAakX/oTN13V12LUOO5opLLb0VKmnbyIPks5ssruNjaUgI4W2BbLYFD w2nGTiwvKPkxsZssdHJfNQ9//7wJTp0N1T3tsTnDjZGpiu2xXKUWkcxkFqO34EqE5ldD G2V29Bc2j+SmOHeebxpVEfPQS5PvbwnuNAZUwx4R15NF4uAWQsA3IY6M6DUW0rNkiX5P RjbodDJ1sbPlYu3JB+xJbYqG4MyhbgfCuvS9v/S6hyjDPo9XlzLu8/0tGCTDbAojxEpC xA/w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=WeyeSUeh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c18si13671590ioz.59.2021.08.24.10.27.42; Tue, 24 Aug 2021 10:27:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=WeyeSUeh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239594AbhHXR1m (ORCPT + 99 others); Tue, 24 Aug 2021 13:27:42 -0400 Received: from mail.kernel.org ([198.145.29.99]:59766 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241444AbhHXRYo (ORCPT ); Tue, 24 Aug 2021 13:24:44 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id C941161B31; Tue, 24 Aug 2021 17:03:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1629824638; bh=nB0Mq1iRSdfScHCGdWhpqfZ+nxmRj40xYfH7ASj8COk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=WeyeSUehq/XjC8grR1b0PtZrChLgEtgvPbVnEE7Zr9/DSZoeW/6bK5y3yWABgcQTw HG2zxnZNqqFICHYax7S+YizFvP2aa92tX3kjIByKx8XzaAg/LBqbRkgjTrJLFNHGs/ sAGovbv+GJ4Fg2OSayuvGH16U/BBljrCoVKImfzjeYknaFaYTJENlmTSlXT5m/q/eI pMGH+6pzYa1wrOqhFLtexe06H5MpxVWTnCy8mIgvjALx+OqmbmqyO6yOu0amnEFvQG yHnhu6E1o5V5KhTGcgR+CMG3m/IDEA+qaqhb/hOdFfRqtNzlSbZEtGGzxFqJaPw8t4 oLttYBGEHebFQ== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Saravana Kannan , Andrew Lunn , Marc Zyngier , Kevin Hilman , "David S . Miller" , Sasha Levin Subject: [PATCH 4.19 69/84] net: mdio-mux: Handle -EPROBE_DEFER correctly Date: Tue, 24 Aug 2021 13:02:35 -0400 Message-Id: <20210824170250.710392-70-sashal@kernel.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210824170250.710392-1-sashal@kernel.org> References: <20210824170250.710392-1-sashal@kernel.org> MIME-Version: 1.0 X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.19.205-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.19.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.19.205-rc1 X-KernelTest-Deadline: 2021-08-26T17:02+00:00 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Saravana Kannan [ Upstream commit 7bd0cef5dac685f09ef8b0b2a7748ff42d284dc7 ] When registering mdiobus children, if we get an -EPROBE_DEFER, we shouldn't ignore it and continue registering the rest of the mdiobus children. This would permanently prevent the deferring child mdiobus from working instead of reattempting it in the future. So, if a child mdiobus needs to be reattempted in the future, defer the entire mdio-mux initialization. This fixes the issue where PHYs sitting under the mdio-mux aren't initialized correctly if the PHY's interrupt controller is not yet ready when the mdio-mux is being probed. Additional context in the link below. Fixes: 0ca2997d1452 ("netdev/of/phy: Add MDIO bus multiplexer support.") Link: https://lore.kernel.org/lkml/CAGETcx95kHrv8wA-O+-JtfH7H9biJEGJtijuPVN0V5dUKUAB3A@mail.gmail.com/#t Signed-off-by: Saravana Kannan Reviewed-by: Andrew Lunn Acked-by: Marc Zyngier Tested-by: Marc Zyngier Acked-by: Kevin Hilman Tested-by: Kevin Hilman Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/net/phy/mdio-mux.c | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/drivers/net/phy/mdio-mux.c b/drivers/net/phy/mdio-mux.c index bb7e3f12a003..c16f875ed9ea 100644 --- a/drivers/net/phy/mdio-mux.c +++ b/drivers/net/phy/mdio-mux.c @@ -178,11 +178,15 @@ int mdio_mux_init(struct device *dev, cb->mii_bus->write = mdio_mux_write; r = of_mdiobus_register(cb->mii_bus, child_bus_node); if (r) { + mdiobus_free(cb->mii_bus); + if (r == -EPROBE_DEFER) { + ret_val = r; + goto err_loop; + } + devm_kfree(dev, cb); dev_err(dev, "Error: Failed to register MDIO bus for child %pOF\n", child_bus_node); - mdiobus_free(cb->mii_bus); - devm_kfree(dev, cb); } else { cb->next = pb->children; pb->children = cb; -- 2.30.2