tmp_suning_uos_patched/arch/sh/kernel
Nick Desaulniers 8748f08a2f sh: check return code of request_irq
[ Upstream commit 0e38225c92c7964482a8bb6b3e37fde4319e965c ]

request_irq is marked __must_check, but the call in shx3_prepare_cpus
has a void return type, so it can't propagate failure to the caller.
Follow cues from hexagon and just print an error.

Fixes: c7936b9abc ("sh: smp: Hook in to the generic IPI handler for SH-X3 SMP.")
Cc: Miguel Ojeda <miguel.ojeda.sandonis@gmail.com>
Cc: Paul Mundt <lethal@linux-sh.org>
Reported-by: Guenter Roeck <linux@roeck-us.net>
Signed-off-by: Nick Desaulniers <ndesaulniers@google.com>
Tested-by: John Paul Adrian Glaubitz <glaubitz@physik.fu-berlin.de>
Reviewed-by: Miguel Ojeda <ojeda@kernel.org>
Signed-off-by: Rich Felker <dalias@libc.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2021-11-26 10:39:11 +01:00
..
cpu
syscalls
vsyscall
.gitignore
asm-offsets.c
crash_dump.c
debugtraps.S
disassemble.c
dma-coherent.c
dumpstack.c
dwarf.c
entry-common.S
ftrace.c
head_32.S
hw_breakpoint.c
idle.c
io_trapped.c
io.c
iomap.c
ioport.c
irq_32.c
irq.c
kdebugfs.c
kgdb.c
kprobes.c
machine_kexec.c
machvec.c
Makefile
module.c
nmi_debug.c
perf_callchain.c
perf_event.c
process_32.c
process.c
ptrace_32.c
ptrace.c
reboot.c
relocate_kernel.S
return_address.c
setup.c
sh_bios.c
sh_ksyms_32.c
signal_32.c
smp.c
stacktrace.c
swsusp.c
sys_sh.c
sys_sh32.c
syscalls_32.S
time.c
topology.c
traps_32.c
traps.c
unwinder.c
vmlinux.lds.S