From 78b2b83f5f09d5677d1e77096ec01b37f7175ede Mon Sep 17 00:00:00 2001 From: Michal Kubecek Date: Oct 26 2020 23:50:22 +0000 Subject: Merge branch 'users/tiwai/SLE15-SP2/for-next' into SLE15-SP2 Pull various driver fixes (git-fixes) from Takashi Iwai. --- diff --git a/patches.suse/ACPI-debug-don-t-allow-debugging-when-ACPI-is-disabl.patch b/patches.suse/ACPI-debug-don-t-allow-debugging-when-ACPI-is-disabl.patch new file mode 100644 index 0000000..eaffcc2 --- /dev/null +++ b/patches.suse/ACPI-debug-don-t-allow-debugging-when-ACPI-is-disabl.patch @@ -0,0 +1,72 @@ +From 0fada277147ffc6d694aa32162f51198d4f10d94 Mon Sep 17 00:00:00 2001 +From: Jamie Iles +Date: Mon, 12 Oct 2020 14:04:46 +0100 +Subject: [PATCH] ACPI: debug: don't allow debugging when ACPI is disabled +Git-commit: 0fada277147ffc6d694aa32162f51198d4f10d94 +Patch-mainline: v5.10-rc1 +References: git-fixes + +If ACPI is disabled then loading the acpi_dbg module will result in the +following splat when lock debugging is enabled. + + DEBUG_LOCKS_WARN_ON(lock->magic != lock) + WARNING: CPU: 0 PID: 1 at kernel/locking/mutex.c:938 __mutex_lock+0xa10/0x1290 + Kernel panic - not syncing: panic_on_warn set ... + CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.9.0-rc8+ #103 + Hardware name: linux,dummy-virt (DT) + Call trace: + dump_backtrace+0x0/0x4d8 + show_stack+0x34/0x48 + dump_stack+0x174/0x1f8 + panic+0x360/0x7a0 + __warn+0x244/0x2ec + report_bug+0x240/0x398 + bug_handler+0x50/0xc0 + call_break_hook+0x160/0x1d8 + brk_handler+0x30/0xc0 + do_debug_exception+0x184/0x340 + el1_dbg+0x48/0xb0 + el1_sync_handler+0x170/0x1c8 + el1_sync+0x80/0x100 + __mutex_lock+0xa10/0x1290 + mutex_lock_nested+0x6c/0xc0 + acpi_register_debugger+0x40/0x88 + acpi_aml_init+0xc4/0x114 + do_one_initcall+0x24c/0xb10 + kernel_init_freeable+0x690/0x728 + kernel_init+0x20/0x1e8 + ret_from_fork+0x10/0x18 + +This is because acpi_debugger.lock has not been initialized as +acpi_debugger_init() is not called when ACPI is disabled. Fail module +loading to avoid this and any subsequent problems that might arise by +trying to debug AML when ACPI is disabled. + +Fixes: 8cfb0cdf07e2 ("ACPI / debugger: Add IO interface to access debugger functionalities") +Reviewed-by: Hanjun Guo +Signed-off-by: Jamie Iles +Cc: 4.10+ # 4.10+ +Signed-off-by: Rafael J. Wysocki +Acked-by: Takashi Iwai + +--- + drivers/acpi/acpi_dbg.c | 3 +++ + 1 file changed, 3 insertions(+) + +diff --git a/drivers/acpi/acpi_dbg.c b/drivers/acpi/acpi_dbg.c +index 6041974c7627..fb7290338593 100644 +--- a/drivers/acpi/acpi_dbg.c ++++ b/drivers/acpi/acpi_dbg.c +@@ -749,6 +749,9 @@ static int __init acpi_aml_init(void) + { + int ret; + ++ if (acpi_disabled) ++ return -ENODEV; ++ + /* Initialize AML IO interface */ + mutex_init(&acpi_aml_io.lock); + init_waitqueue_head(&acpi_aml_io.wait); +-- +2.16.4 + diff --git a/patches.suse/Input-ep93xx_keypad-fix-handling-of-platform_get_irq.patch b/patches.suse/Input-ep93xx_keypad-fix-handling-of-platform_get_irq.patch new file mode 100644 index 0000000..3a82b39 --- /dev/null +++ b/patches.suse/Input-ep93xx_keypad-fix-handling-of-platform_get_irq.patch @@ -0,0 +1,39 @@ +From 7d50f6656dacf085a00beeedbc48b19a37d17881 Mon Sep 17 00:00:00 2001 +From: Krzysztof Kozlowski +Date: Tue, 15 Sep 2020 17:51:05 -0700 +Subject: [PATCH] Input: ep93xx_keypad - fix handling of platform_get_irq() error +Git-commit: 7d50f6656dacf085a00beeedbc48b19a37d17881 +Patch-mainline: v5.10-rc1 +References: git-fixes + +platform_get_irq() returns -ERRNO on error. In such case comparison +to 0 would pass the check. + +Fixes: 60214f058f44 ("Input: ep93xx_keypad - update driver to new core support") +Signed-off-by: Krzysztof Kozlowski +Link: https://lore.kernel.org/r/20200828145744.3636-1-krzk@kernel.org +Signed-off-by: Dmitry Torokhov +Acked-by: Takashi Iwai + +--- + drivers/input/keyboard/ep93xx_keypad.c | 4 ++-- + 1 file changed, 2 insertions(+), 2 deletions(-) + +diff --git a/drivers/input/keyboard/ep93xx_keypad.c b/drivers/input/keyboard/ep93xx_keypad.c +index 7c70492d9d6b..f831f01501d5 100644 +--- a/drivers/input/keyboard/ep93xx_keypad.c ++++ b/drivers/input/keyboard/ep93xx_keypad.c +@@ -250,8 +250,8 @@ static int ep93xx_keypad_probe(struct platform_device *pdev) + } + + keypad->irq = platform_get_irq(pdev, 0); +- if (!keypad->irq) { +- err = -ENXIO; ++ if (keypad->irq < 0) { ++ err = keypad->irq; + goto failed_free; + } + +-- +2.16.4 + diff --git a/patches.suse/Input-imx6ul_tsc-clean-up-some-errors-in-imx6ul_tsc_.patch b/patches.suse/Input-imx6ul_tsc-clean-up-some-errors-in-imx6ul_tsc_.patch new file mode 100644 index 0000000..af3cdd3 --- /dev/null +++ b/patches.suse/Input-imx6ul_tsc-clean-up-some-errors-in-imx6ul_tsc_.patch @@ -0,0 +1,67 @@ +From 30df23c5ecdfb8da5b0bc17ceef67eff9e1b0957 Mon Sep 17 00:00:00 2001 +From: Dan Carpenter +Date: Mon, 14 Sep 2020 10:17:01 -0700 +Subject: [PATCH] Input: imx6ul_tsc - clean up some errors in imx6ul_tsc_resume() +Git-commit: 30df23c5ecdfb8da5b0bc17ceef67eff9e1b0957 +Patch-mainline: v5.10-rc1 +References: git-fixes + +If imx6ul_tsc_init() fails then we need to clean up the clocks. + +I reversed the "if (input_dev->users) {" condition to make the code a +bit simpler. + +Fixes: 6cc527b05847 ("Input: imx6ul_tsc - propagate the errors") +Signed-off-by: Dan Carpenter +Link: https://lore.kernel.org/r/20200905124942.GC183976@mwanda +Signed-off-by: Dmitry Torokhov +Acked-by: Takashi Iwai + +--- + drivers/input/touchscreen/imx6ul_tsc.c | 27 ++++++++++++++++----------- + 1 file changed, 16 insertions(+), 11 deletions(-) + +diff --git a/drivers/input/touchscreen/imx6ul_tsc.c b/drivers/input/touchscreen/imx6ul_tsc.c +index 9ed258854349..5e6ba5c4eca2 100644 +--- a/drivers/input/touchscreen/imx6ul_tsc.c ++++ b/drivers/input/touchscreen/imx6ul_tsc.c +@@ -530,20 +530,25 @@ static int __maybe_unused imx6ul_tsc_resume(struct device *dev) + + mutex_lock(&input_dev->mutex); + +- if (input_dev->users) { +- retval = clk_prepare_enable(tsc->adc_clk); +- if (retval) +- goto out; +- +- retval = clk_prepare_enable(tsc->tsc_clk); +- if (retval) { +- clk_disable_unprepare(tsc->adc_clk); +- goto out; +- } ++ if (!input_dev->users) ++ goto out; + +- retval = imx6ul_tsc_init(tsc); ++ retval = clk_prepare_enable(tsc->adc_clk); ++ if (retval) ++ goto out; ++ ++ retval = clk_prepare_enable(tsc->tsc_clk); ++ if (retval) { ++ clk_disable_unprepare(tsc->adc_clk); ++ goto out; + } + ++ retval = imx6ul_tsc_init(tsc); ++ if (retval) { ++ clk_disable_unprepare(tsc->tsc_clk); ++ clk_disable_unprepare(tsc->adc_clk); ++ goto out; ++ } + out: + mutex_unlock(&input_dev->mutex); + return retval; +-- +2.16.4 + diff --git a/patches.suse/Input-omap4-keypad-fix-handling-of-platform_get_irq-.patch b/patches.suse/Input-omap4-keypad-fix-handling-of-platform_get_irq-.patch new file mode 100644 index 0000000..cec500a --- /dev/null +++ b/patches.suse/Input-omap4-keypad-fix-handling-of-platform_get_irq-.patch @@ -0,0 +1,41 @@ +From 4738dd1992fa13acfbbd71800c71c612f466fa44 Mon Sep 17 00:00:00 2001 +From: Krzysztof Kozlowski +Date: Tue, 15 Sep 2020 17:52:15 -0700 +Subject: [PATCH] Input: omap4-keypad - fix handling of platform_get_irq() error +Git-commit: 4738dd1992fa13acfbbd71800c71c612f466fa44 +Patch-mainline: v5.10-rc1 +References: git-fixes + +platform_get_irq() returns -ERRNO on error. In such case comparison +to 0 would pass the check. + +Fixes: f3a1ba60dbdb ("Input: omap4-keypad - use platform device helpers") +Signed-off-by: Krzysztof Kozlowski +Link: https://lore.kernel.org/r/20200828145744.3636-2-krzk@kernel.org +Signed-off-by: Dmitry Torokhov +Acked-by: Takashi Iwai + +--- + drivers/input/keyboard/omap4-keypad.c | 6 ++---- + 1 file changed, 2 insertions(+), 4 deletions(-) + +diff --git a/drivers/input/keyboard/omap4-keypad.c b/drivers/input/keyboard/omap4-keypad.c +index 94c94d7f5155..d6c924032aaa 100644 +--- a/drivers/input/keyboard/omap4-keypad.c ++++ b/drivers/input/keyboard/omap4-keypad.c +@@ -240,10 +240,8 @@ static int omap4_keypad_probe(struct platform_device *pdev) + } + + irq = platform_get_irq(pdev, 0); +- if (!irq) { +- dev_err(&pdev->dev, "no keyboard irq assigned\n"); +- return -EINVAL; +- } ++ if (irq < 0) ++ return irq; + + keypad_data = kzalloc(sizeof(struct omap4_keypad), GFP_KERNEL); + if (!keypad_data) { +-- +2.16.4 + diff --git a/patches.suse/Input-stmfts-fix-a-vs-typo.patch b/patches.suse/Input-stmfts-fix-a-vs-typo.patch new file mode 100644 index 0000000..8e3e984 --- /dev/null +++ b/patches.suse/Input-stmfts-fix-a-vs-typo.patch @@ -0,0 +1,37 @@ +From d04afe14b23651e7a8bc89727a759e982a8458e4 Mon Sep 17 00:00:00 2001 +From: YueHaibing +Date: Wed, 16 Sep 2020 10:26:09 -0700 +Subject: [PATCH] Input: stmfts - fix a & vs && typo +Git-commit: d04afe14b23651e7a8bc89727a759e982a8458e4 +Patch-mainline: v5.10-rc1 +References: git-fixes + +In stmfts_sysfs_hover_enable_write(), we should check value and +sdata->hover_enabled is all true. + +Fixes: 78bcac7b2ae1 ("Input: add support for the STMicroelectronics FingerTip touchscreen") +Signed-off-by: YueHaibing +Link: https://lore.kernel.org/r/20200916141941.16684-1-yuehaibing@huawei.com +Signed-off-by: Dmitry Torokhov +Acked-by: Takashi Iwai + +--- + drivers/input/touchscreen/stmfts.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/drivers/input/touchscreen/stmfts.c b/drivers/input/touchscreen/stmfts.c +index df946869d4cd..9a64e1dbc04a 100644 +--- a/drivers/input/touchscreen/stmfts.c ++++ b/drivers/input/touchscreen/stmfts.c +@@ -479,7 +479,7 @@ static ssize_t stmfts_sysfs_hover_enable_write(struct device *dev, + + mutex_lock(&sdata->mutex); + +- if (value & sdata->hover_enabled) ++ if (value && sdata->hover_enabled) + goto out; + + if (sdata->running) +-- +2.16.4 + diff --git a/patches.suse/Input-sun4i-ps2-fix-handling-of-platform_get_irq-err.patch b/patches.suse/Input-sun4i-ps2-fix-handling-of-platform_get_irq-err.patch new file mode 100644 index 0000000..9b616a4 --- /dev/null +++ b/patches.suse/Input-sun4i-ps2-fix-handling-of-platform_get_irq-err.patch @@ -0,0 +1,55 @@ +From cafb3abea6136e59ea534004e5773361e196bb94 Mon Sep 17 00:00:00 2001 +From: Krzysztof Kozlowski +Date: Tue, 15 Sep 2020 17:56:40 -0700 +Subject: [PATCH] Input: sun4i-ps2 - fix handling of platform_get_irq() error +Git-commit: cafb3abea6136e59ea534004e5773361e196bb94 +Patch-mainline: v5.10-rc1 +References: git-fixes + +platform_get_irq() returns -ERRNO on error. In such case comparison +to 0 would pass the check. + +Fixes: e443631d20f5 ("Input: serio - add support for Alwinner A10/A20 PS/2 controller") +Signed-off-by: Krzysztof Kozlowski +Acked-by: Chen-Yu Tsai +Link: https://lore.kernel.org/r/20200828145744.3636-4-krzk@kernel.org +Signed-off-by: Dmitry Torokhov +Acked-by: Takashi Iwai + +--- + drivers/input/serio/sun4i-ps2.c | 9 +++------ + 1 file changed, 3 insertions(+), 6 deletions(-) + +diff --git a/drivers/input/serio/sun4i-ps2.c b/drivers/input/serio/sun4i-ps2.c +index a681a2c04e39..f15ed3dcdb9b 100644 +--- a/drivers/input/serio/sun4i-ps2.c ++++ b/drivers/input/serio/sun4i-ps2.c +@@ -211,7 +211,6 @@ static int sun4i_ps2_probe(struct platform_device *pdev) + struct sun4i_ps2data *drvdata; + struct serio *serio; + struct device *dev = &pdev->dev; +- unsigned int irq; + int error; + + drvdata = kzalloc(sizeof(struct sun4i_ps2data), GFP_KERNEL); +@@ -264,14 +263,12 @@ static int sun4i_ps2_probe(struct platform_device *pdev) + writel(0, drvdata->reg_base + PS2_REG_GCTL); + + /* Get IRQ for the device */ +- irq = platform_get_irq(pdev, 0); +- if (!irq) { +- dev_err(dev, "no IRQ found\n"); +- error = -ENXIO; ++ drvdata->irq = platform_get_irq(pdev, 0); ++ if (drvdata->irq < 0) { ++ error = drvdata->irq; + goto err_disable_clk; + } + +- drvdata->irq = irq; + drvdata->serio = serio; + drvdata->dev = dev; + +-- +2.16.4 + diff --git a/patches.suse/Input-twl4030_keypad-fix-handling-of-platform_get_ir.patch b/patches.suse/Input-twl4030_keypad-fix-handling-of-platform_get_ir.patch new file mode 100644 index 0000000..9f2c2ef --- /dev/null +++ b/patches.suse/Input-twl4030_keypad-fix-handling-of-platform_get_ir.patch @@ -0,0 +1,51 @@ +From c277e1f0dc3c7d7b5b028e20dd414df241642036 Mon Sep 17 00:00:00 2001 +From: Krzysztof Kozlowski +Date: Tue, 15 Sep 2020 17:56:19 -0700 +Subject: [PATCH] Input: twl4030_keypad - fix handling of platform_get_irq() error +Git-commit: c277e1f0dc3c7d7b5b028e20dd414df241642036 +Patch-mainline: v5.10-rc1 +References: git-fixes + +platform_get_irq() returns -ERRNO on error. In such case casting to +unsigned and comparing to 0 would pass the check. + +Fixes: 7abf38d6d13c ("Input: twl4030-keypad - add device tree support") +Reported-by: kernel test robot +Signed-off-by: Krzysztof Kozlowski +Link: https://lore.kernel.org/r/20200828145744.3636-3-krzk@kernel.org +Signed-off-by: Dmitry Torokhov +Acked-by: Takashi Iwai + +--- + drivers/input/keyboard/twl4030_keypad.c | 8 +++----- + 1 file changed, 3 insertions(+), 5 deletions(-) + +diff --git a/drivers/input/keyboard/twl4030_keypad.c b/drivers/input/keyboard/twl4030_keypad.c +index af3a6824f1a4..77e0743a3cf8 100644 +--- a/drivers/input/keyboard/twl4030_keypad.c ++++ b/drivers/input/keyboard/twl4030_keypad.c +@@ -50,7 +50,7 @@ struct twl4030_keypad { + bool autorepeat; + unsigned int n_rows; + unsigned int n_cols; +- unsigned int irq; ++ int irq; + + struct device *dbg_dev; + struct input_dev *input; +@@ -376,10 +376,8 @@ static int twl4030_kp_probe(struct platform_device *pdev) + } + + kp->irq = platform_get_irq(pdev, 0); +- if (!kp->irq) { +- dev_err(&pdev->dev, "no keyboard irq assigned\n"); +- return -EINVAL; +- } ++ if (kp->irq < 0) ++ return kp->irq; + + error = matrix_keypad_build_keymap(keymap_data, NULL, + TWL4030_MAX_ROWS, +-- +2.16.4 + diff --git a/patches.suse/NTB-hw-amd-fix-an-issue-about-leak-system-resources.patch b/patches.suse/NTB-hw-amd-fix-an-issue-about-leak-system-resources.patch new file mode 100644 index 0000000..04973ee --- /dev/null +++ b/patches.suse/NTB-hw-amd-fix-an-issue-about-leak-system-resources.patch @@ -0,0 +1,36 @@ +From 44a0a3c17919db1498cebb02ecf3cf4abc1ade7b Mon Sep 17 00:00:00 2001 +From: Kaige Li +Date: Tue, 11 Aug 2020 09:59:57 +0800 +Subject: [PATCH] NTB: hw: amd: fix an issue about leak system resources +Git-commit: 44a0a3c17919db1498cebb02ecf3cf4abc1ade7b +Patch-mainline: v5.10-rc1 +References: git-fixes + +The related system resources were not released when pci_set_dma_mask(), +pci_set_consistent_dma_mask(), or pci_iomap() return error in the +amd_ntb_init_pci() function. Add pci_release_regions() to fix it. + +Fixes: a1b3695820aa ("NTB: Add support for AMD PCI-Express Non-Transparent Bridge") +Signed-off-by: Kaige Li +Signed-off-by: Jon Mason +Acked-by: Takashi Iwai + +--- + drivers/ntb/hw/amd/ntb_hw_amd.c | 1 + + 1 file changed, 1 insertion(+) + +diff --git a/drivers/ntb/hw/amd/ntb_hw_amd.c b/drivers/ntb/hw/amd/ntb_hw_amd.c +index 88e1db65be02..71428d8cbcfc 100644 +--- a/drivers/ntb/hw/amd/ntb_hw_amd.c ++++ b/drivers/ntb/hw/amd/ntb_hw_amd.c +@@ -1203,6 +1203,7 @@ static int amd_ntb_init_pci(struct amd_ntb_dev *ndev, + + err_dma_mask: + pci_clear_master(pdev); ++ pci_release_regions(pdev); + err_pci_regions: + pci_disable_device(pdev); + err_pci_enable: +-- +2.16.4 + diff --git a/patches.suse/acpi-cpufreq-Honor-_PSD-table-setting-on-new-AMD-CPU.patch b/patches.suse/acpi-cpufreq-Honor-_PSD-table-setting-on-new-AMD-CPU.patch new file mode 100644 index 0000000..cd5e02f --- /dev/null +++ b/patches.suse/acpi-cpufreq-Honor-_PSD-table-setting-on-new-AMD-CPU.patch @@ -0,0 +1,42 @@ +From 5368512abe08a28525d9b24abbfc2a72493e8dba Mon Sep 17 00:00:00 2001 +From: Wei Huang +Date: Sun, 18 Oct 2020 22:57:41 -0500 +Subject: [PATCH] acpi-cpufreq: Honor _PSD table setting on new AMD CPUs +Git-commit: 5368512abe08a28525d9b24abbfc2a72493e8dba +Patch-mainline: v5.10-rc1 +References: git-fixes + +acpi-cpufreq has a old quirk that overrides the _PSD table supplied by +BIOS on AMD CPUs. However the _PSD table of new AMD CPUs (Family 19h+) +now accurately reports the P-state dependency of CPU cores. Hence this +quirk needs to be fixed in order to support new CPUs' frequency control. + +Fixes: acd316248205 ("acpi-cpufreq: Add quirk to disable _PSD usage on all AMD CPUs") +Signed-off-by: Wei Huang +[ rjw: Subject edit ] + +Cc: 3.10+ # 3.10+ +Signed-off-by: Rafael J. Wysocki +Acked-by: Takashi Iwai + +--- + drivers/cpufreq/acpi-cpufreq.c | 3 ++- + 1 file changed, 2 insertions(+), 1 deletion(-) + +diff --git a/drivers/cpufreq/acpi-cpufreq.c b/drivers/cpufreq/acpi-cpufreq.c +index e4ff681faaaa..1e4fbb002a31 100644 +--- a/drivers/cpufreq/acpi-cpufreq.c ++++ b/drivers/cpufreq/acpi-cpufreq.c +@@ -691,7 +691,8 @@ static int acpi_cpufreq_cpu_init(struct cpufreq_policy *policy) + cpumask_copy(policy->cpus, topology_core_cpumask(cpu)); + } + +- if (check_amd_hwpstate_cpu(cpu) && !acpi_pstate_strict) { ++ if (check_amd_hwpstate_cpu(cpu) && boot_cpu_data.x86 < 0x19 && ++ !acpi_pstate_strict) { + cpumask_clear(policy->cpus); + cpumask_set_cpu(cpu, policy->cpus); + cpumask_copy(data->freqdomain_cpus, +-- +2.16.4 + diff --git a/patches.suse/ata-sata_rcar-Fix-DMA-boundary-mask.patch b/patches.suse/ata-sata_rcar-Fix-DMA-boundary-mask.patch new file mode 100644 index 0000000..5bbbe41 --- /dev/null +++ b/patches.suse/ata-sata_rcar-Fix-DMA-boundary-mask.patch @@ -0,0 +1,74 @@ +From df9c590986fdb6db9d5636d6cd93bc919c01b451 Mon Sep 17 00:00:00 2001 +From: Geert Uytterhoeven +Date: Thu, 17 Sep 2020 15:09:20 +0200 +Subject: [PATCH] ata: sata_rcar: Fix DMA boundary mask +Git-commit: df9c590986fdb6db9d5636d6cd93bc919c01b451 +Patch-mainline: v5.10-rc1 +References: git-fixes + +Before commit 9495b7e92f716ab2 ("driver core: platform: Initialize +dma_parms for platform devices"), the R-Car SATA device didn't have DMA +parameters. Hence the DMA boundary mask supplied by its driver was +silently ignored, as __scsi_init_queue() doesn't check the return value +of dma_set_seg_boundary(), and the default value of 0xffffffff was used. + +Now the device has gained DMA parameters, the driver-supplied value is +used, and the following warning is printed on Salvator-XS: + + DMA-API: sata_rcar ee300000.sata: mapping sg segment across boundary [start=0x00000000ffffe000] [end=0x00000000ffffefff] [boundary=0x000000001ffffffe] + WARNING: CPU: 5 PID: 38 at kernel/dma/debug.c:1233 debug_dma_map_sg+0x298/0x300 + +(the range of start/end values depend on whether IOMMU support is + enabled or not) + +The issue here is that SATA_RCAR_DMA_BOUNDARY doesn't have bit 0 set, so +any typical end value, which is odd, will trigger the check. + +Fix this by increasing the DMA boundary value by 1. + +This also fixes the following WRITE DMA EXT timeout issue: + + # dd if=/dev/urandom of=/mnt/de1/file1-1024M bs=1M count=1024 + ata1.00: exception Emask 0x0 SAct 0x0 SErr 0x0 action 0x6 frozen + ata1.00: failed command: WRITE DMA EXT + ata1.00: cmd 35/00:00:00:e6:0c/00:0a:00:00:00/e0 tag 0 dma 1310720 out + res 40/00:01:00:00:00/00:00:00:00:00/00 Emask 0x4 (timeout) + ata1.00: status: { DRDY } + +as seen by Shimoda-san since commit 429120f3df2dba2b ("block: fix +splitting segments on boundary masks"). + +Fixes: 8bfbeed58665dbbf ("sata_rcar: correct 'sata_rcar_sht'") +Fixes: 9495b7e92f716ab2 ("driver core: platform: Initialize dma_parms for platform devices") +Fixes: 429120f3df2dba2b ("block: fix splitting segments on boundary masks") +Signed-off-by: Geert Uytterhoeven +Tested-by: Lad Prabhakar +Tested-by: Yoshihiro Shimoda +Reviewed-by: Christoph Hellwig +Reviewed-by: Greg Kroah-Hartman +Reviewed-by: Sergei Shtylyov +Reviewed-by: Ulf Hansson +Cc: stable +Signed-off-by: Jens Axboe +Acked-by: Takashi Iwai + +--- + drivers/ata/sata_rcar.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/drivers/ata/sata_rcar.c b/drivers/ata/sata_rcar.c +index 141ac600b64c..44b0ed8f6bb8 100644 +--- a/drivers/ata/sata_rcar.c ++++ b/drivers/ata/sata_rcar.c +@@ -120,7 +120,7 @@ + /* Descriptor table word 0 bit (when DTA32M = 1) */ + #define SATA_RCAR_DTEND BIT(0) + +-#define SATA_RCAR_DMA_BOUNDARY 0x1FFFFFFEUL ++#define SATA_RCAR_DMA_BOUNDARY 0x1FFFFFFFUL + + /* Gen2 Physical Layer Control Registers */ + #define RCAR_GEN2_PHY_CTL1_REG 0x1704 +-- +2.16.4 + diff --git a/patches.suse/docs-driver-api-remove-a-duplicated-index-entry.patch b/patches.suse/docs-driver-api-remove-a-duplicated-index-entry.patch new file mode 100644 index 0000000..063315d --- /dev/null +++ b/patches.suse/docs-driver-api-remove-a-duplicated-index-entry.patch @@ -0,0 +1,52 @@ +From d16eb0edf91760cac4d8cb09d8b9ab162424f0df Mon Sep 17 00:00:00 2001 +From: Mauro Carvalho Chehab +Date: Thu, 15 Oct 2020 11:12:06 +0200 +Subject: [PATCH] docs: driver-api: remove a duplicated index entry +Git-commit: d16eb0edf91760cac4d8cb09d8b9ab162424f0df +Patch-mainline: v5.10-rc1 +References: git-fixes + +The ipmb file was added twice at index.rst. That +sounds to be because the same patch was applied twice, +via different git trees: + + commit f6ae22d64433fd8e08654adad7966299da931bb9 + Author: Mauro Carvalho Chehab + Commit: Jonathan Corbet + + docs: ipmb: place it at driver-api and convert to ReST + + commit ac499fba98c3c65078fd84fa0a62cd6f6d5837ed + Author: Mauro Carvalho Chehab + Commit: Corey Minyard + + docs: ipmb: place it at driver-api and convert to ReST + +With Sphinx 4.0.0 development tree, a new warning is produced +due to that: + + .../Documentation/driver-api/index.rst:14: WARNING: duplicated entry found in toctree: driver-api/ipmb + +The fix is trivial: just drop the duplicated line. + +Fixes: f6ae22d64433 ("docs: ipmb: place it at driver-api and convert to ReST") +Fixes: ac499fba98c3 ("docs: ipmb: place it at driver-api and convert to ReST") +Signed-off-by: Mauro Carvalho Chehab +Link: https://lore.kernel.org/r/623fb26a8409a7b002e45bdbb6f517ac08fd508a.1602753121.git.mchehab+huawei@kernel.org +Signed-off-by: Jonathan Corbet +Acked-by: Takashi Iwai + +--- + Documentation/driver-api/index.rst | 1 - + 1 file changed, 1 deletion(-) + +--- a/Documentation/driver-api/index.rst ++++ b/Documentation/driver-api/index.rst +@@ -75,7 +75,6 @@ available subsections can be seen below. + dell_rbu + edid + eisa +- ipmb + isa + isapnp + generic-counter diff --git a/patches.suse/i2c-core-Restore-acpi_walk_dep_device_list-getting-c.patch b/patches.suse/i2c-core-Restore-acpi_walk_dep_device_list-getting-c.patch new file mode 100644 index 0000000..6e7c7d9 --- /dev/null +++ b/patches.suse/i2c-core-Restore-acpi_walk_dep_device_list-getting-c.patch @@ -0,0 +1,73 @@ +From 8058d69905058ec8f467a120b5ec5bb831ea67f3 Mon Sep 17 00:00:00 2001 +From: Hans de Goede +Date: Wed, 14 Oct 2020 16:41:58 +0200 +Subject: [PATCH] i2c: core: Restore acpi_walk_dep_device_list() getting called after registering the ACPI i2c devs +Git-commit: 8058d69905058ec8f467a120b5ec5bb831ea67f3 +Patch-mainline: v5.10-rc1 +References: git-fixes + +Commit 21653a4181ff ("i2c: core: Call i2c_acpi_install_space_handler() +before i2c_acpi_register_devices()")'s intention was to only move the +acpi_install_address_space_handler() call to the point before where +the ACPI declared i2c-children of the adapter where instantiated by +i2c_acpi_register_devices(). + +But i2c_acpi_install_space_handler() had a call to +acpi_walk_dep_device_list() hidden (that is I missed it) at the end +of it, so as an unwanted side-effect now acpi_walk_dep_device_list() +was also being called before i2c_acpi_register_devices(). + +Move the acpi_walk_dep_device_list() call to the end of +i2c_acpi_register_devices(), so that it is once again called *after* +the i2c_client-s hanging of the adapter have been created. + +This fixes the Microsoft Surface Go 2 hanging at boot. + +Fixes: 21653a4181ff ("i2c: core: Call i2c_acpi_install_space_handler() before i2c_acpi_register_devices()") +Link: https://bugzilla.kernel.org/show_bug.cgi?id=209627 +Reported-by: Rainer Finke +Reported-by: Kieran Bingham +Suggested-by: Maximilian Luz +Tested-by: Kieran Bingham +Signed-off-by: Hans de Goede +Signed-off-by: Wolfram Sang +Acked-by: Takashi Iwai + +--- + drivers/i2c/i2c-core-acpi.c | 11 ++++++++++- + 1 file changed, 10 insertions(+), 1 deletion(-) + +--- a/drivers/i2c/i2c-core-acpi.c ++++ b/drivers/i2c/i2c-core-acpi.c +@@ -264,6 +264,7 @@ static acpi_status i2c_acpi_add_device(a + void i2c_acpi_register_devices(struct i2c_adapter *adap) + { + acpi_status status; ++ acpi_handle handle; + + if (!has_acpi_companion(&adap->dev)) + return; +@@ -274,6 +275,15 @@ void i2c_acpi_register_devices(struct i2 + adap, NULL); + if (ACPI_FAILURE(status)) + dev_warn(&adap->dev, "failed to enumerate I2C slaves\n"); ++ ++ if (!adap->dev.parent) ++ return; ++ ++ handle = ACPI_HANDLE(adap->dev.parent); ++ if (!handle) ++ return; ++ ++ acpi_walk_dep_device_list(handle); + } + + const struct acpi_device_id * +@@ -742,7 +752,6 @@ int i2c_acpi_install_space_handler(struc + return -ENOMEM; + } + +- acpi_walk_dep_device_list(handle); + return 0; + } + diff --git a/patches.suse/memory-fsl-corenet-cf-Fix-handling-of-platform_get_i.patch b/patches.suse/memory-fsl-corenet-cf-Fix-handling-of-platform_get_i.patch new file mode 100644 index 0000000..76feacf --- /dev/null +++ b/patches.suse/memory-fsl-corenet-cf-Fix-handling-of-platform_get_i.patch @@ -0,0 +1,40 @@ +From dd85345abca60a8916617e8d75c0f9ce334336dd Mon Sep 17 00:00:00 2001 +From: Krzysztof Kozlowski +Date: Thu, 27 Aug 2020 09:33:15 +0200 +Subject: [PATCH] memory: fsl-corenet-cf: Fix handling of platform_get_irq() error +Git-commit: dd85345abca60a8916617e8d75c0f9ce334336dd +Patch-mainline: v5.10-rc1 +References: git-fixes + +platform_get_irq() returns -ERRNO on error. In such case comparison +to 0 would pass the check. + +Fixes: 54afbec0d57f ("memory: Freescale CoreNet Coherency Fabric error reporting driver") +Signed-off-by: Krzysztof Kozlowski +Link: https://lore.kernel.org/r/20200827073315.29351-1-krzk@kernel.org +Acked-by: Takashi Iwai + +--- + drivers/memory/fsl-corenet-cf.c | 6 ++---- + 1 file changed, 2 insertions(+), 4 deletions(-) + +diff --git a/drivers/memory/fsl-corenet-cf.c b/drivers/memory/fsl-corenet-cf.c +index 0b0ed72016da..0309bd5a1800 100644 +--- a/drivers/memory/fsl-corenet-cf.c ++++ b/drivers/memory/fsl-corenet-cf.c +@@ -211,10 +211,8 @@ static int ccf_probe(struct platform_device *pdev) + dev_set_drvdata(&pdev->dev, ccf); + + irq = platform_get_irq(pdev, 0); +- if (!irq) { +- dev_err(&pdev->dev, "%s: no irq\n", __func__); +- return -ENXIO; +- } ++ if (irq < 0) ++ return irq; + + ret = devm_request_irq(&pdev->dev, irq, ccf_irq, 0, pdev->name, ccf); + if (ret) { +-- +2.16.4 + diff --git a/patches.suse/memory-omap-gpmc-Fix-a-couple-off-by-ones.patch b/patches.suse/memory-omap-gpmc-Fix-a-couple-off-by-ones.patch new file mode 100644 index 0000000..c4c0794 --- /dev/null +++ b/patches.suse/memory-omap-gpmc-Fix-a-couple-off-by-ones.patch @@ -0,0 +1,48 @@ +From 4c54228ac8fd55044195825873c50a524131fa53 Mon Sep 17 00:00:00 2001 +From: Dan Carpenter +Date: Tue, 25 Aug 2020 13:47:07 +0300 +Subject: [PATCH] memory: omap-gpmc: Fix a couple off by ones +Git-commit: 4c54228ac8fd55044195825873c50a524131fa53 +Patch-mainline: v5.10-rc1 +References: git-fixes + +These comparisons should be >= instead of > to prevent reading one +element beyond the end of the gpmc_cs[] array. + +Fixes: cdd6928c589a ("ARM: OMAP2+: Add device-tree support for NOR flash") +Fixes: f37e4580c409 ("ARM: OMAP2: Dynamic allocator for GPMC memory space") +Signed-off-by: Dan Carpenter +Acked-by: Roger Quadros +Link: https://lore.kernel.org/r/20200825104707.GB278587@mwanda +Signed-off-by: Krzysztof Kozlowski +Acked-by: Takashi Iwai + +--- + drivers/memory/omap-gpmc.c | 4 ++-- + 1 file changed, 2 insertions(+), 2 deletions(-) + +diff --git a/drivers/memory/omap-gpmc.c b/drivers/memory/omap-gpmc.c +index ce0e7e2d7cff..2cd7ddf128ec 100644 +--- a/drivers/memory/omap-gpmc.c ++++ b/drivers/memory/omap-gpmc.c +@@ -990,7 +990,7 @@ static int gpmc_cs_remap(int cs, u32 base) + int ret; + u32 old_base, size; + +- if (cs > gpmc_cs_num) { ++ if (cs >= gpmc_cs_num) { + pr_err("%s: requested chip-select is disabled\n", __func__); + return -ENODEV; + } +@@ -1025,7 +1025,7 @@ int gpmc_cs_request(int cs, unsigned long size, unsigned long *base) + struct resource *res = &gpmc->mem; + int r = -1; + +- if (cs > gpmc_cs_num) { ++ if (cs >= gpmc_cs_num) { + pr_err("%s: requested chip-select is disabled\n", __func__); + return -ENODEV; + } +-- +2.16.4 + diff --git a/patches.suse/memory-omap-gpmc-Fix-build-error-without-CONFIG_OF.patch b/patches.suse/memory-omap-gpmc-Fix-build-error-without-CONFIG_OF.patch new file mode 100644 index 0000000..b4312c0 --- /dev/null +++ b/patches.suse/memory-omap-gpmc-Fix-build-error-without-CONFIG_OF.patch @@ -0,0 +1,44 @@ +From 13d029ee51da365aa9c859db0c7395129252bde8 Mon Sep 17 00:00:00 2001 +From: YueHaibing +Date: Thu, 27 Aug 2020 20:53:16 +0800 +Subject: [PATCH] memory: omap-gpmc: Fix build error without CONFIG_OF +Git-commit: 13d029ee51da365aa9c859db0c7395129252bde8 +Patch-mainline: v5.10-rc1 +References: git-fixes + +If CONFIG_OF is n, gcc fails: + +Drivers/memory/omap-gpmc.o: In function `gpmc_omap_onenand_set_timings': omap-gpmc.c:(.text+0x2a88): undefined reference to `gpmc_read_settings_dt' + +Add gpmc_read_settings_dt() helper function, which zero the gpmc_settings +so the caller doesn't proceed with random/invalid settings. + +Fixes: a758f50f10cf ("mtd: onenand: omap2: Configure driver from DT") +Signed-off-by: YueHaibing +Acked-by: Roger Quadros +Link: https://lore.kernel.org/r/20200827125316.20780-1-yuehaibing@huawei.com +Signed-off-by: Krzysztof Kozlowski +Acked-by: Takashi Iwai + +--- + drivers/memory/omap-gpmc.c | 4 ++++ + 1 file changed, 4 insertions(+) + +diff --git a/drivers/memory/omap-gpmc.c b/drivers/memory/omap-gpmc.c +index 2cd7ddf128ec..8932c5b266e4 100644 +--- a/drivers/memory/omap-gpmc.c ++++ b/drivers/memory/omap-gpmc.c +@@ -2311,6 +2311,10 @@ static void gpmc_probe_dt_children(struct platform_device *pdev) + } + } + #else ++void gpmc_read_settings_dt(struct device_node *np, struct gpmc_settings *p) ++{ ++ memset(p, 0, sizeof(*p)); ++} + static int gpmc_probe_dt(struct platform_device *pdev) + { + return 0; +-- +2.16.4 + diff --git a/patches.suse/nfc-Ensure-presence-of-NFC_ATTR_FIRMWARE_NAME-attrib.patch b/patches.suse/nfc-Ensure-presence-of-NFC_ATTR_FIRMWARE_NAME-attrib.patch new file mode 100644 index 0000000..78f4f89 --- /dev/null +++ b/patches.suse/nfc-Ensure-presence-of-NFC_ATTR_FIRMWARE_NAME-attrib.patch @@ -0,0 +1,42 @@ +From 280e3ebdafb863b3cb50d5842f056267e15bf40c Mon Sep 17 00:00:00 2001 +From: Defang Bo +Date: Mon, 19 Oct 2020 19:38:58 +0800 +Subject: [PATCH] nfc: Ensure presence of NFC_ATTR_FIRMWARE_NAME attribute in nfc_genl_fw_download() +Git-commit: 280e3ebdafb863b3cb50d5842f056267e15bf40c +Patch-mainline: v5.10-rc1 +References: git-fixes + +Check that the NFC_ATTR_FIRMWARE_NAME attributes are provided by +the netlink client prior to accessing them.This prevents potential +unhandled NULL pointer dereference exceptions which can be triggered +by malicious user-mode programs, if they omit one or both of these +attributes. + +Similar to commit a0323b979f81 ("nfc: Ensure presence of required attributes in the activate_target handler"). + +Fixes: 9674da8759df ("NFC: Add firmware upload netlink command") +Signed-off-by: Defang Bo +Link: https://lore.kernel.org/r/1603107538-4744-1-git-send-email-bodefang@126.com +Signed-off-by: Jakub Kicinski +Acked-by: Takashi Iwai + +--- + net/nfc/netlink.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/net/nfc/netlink.c b/net/nfc/netlink.c +index e894254c17d4..8709f3d4e7c4 100644 +--- a/net/nfc/netlink.c ++++ b/net/nfc/netlink.c +@@ -1217,7 +1217,7 @@ static int nfc_genl_fw_download(struct sk_buff *skb, struct genl_info *info) + u32 idx; + char firmware_name[NFC_FIRMWARE_NAME_MAXSIZE + 1]; + +- if (!info->attrs[NFC_ATTR_DEVICE_INDEX]) ++ if (!info->attrs[NFC_ATTR_DEVICE_INDEX] || !info->attrs[NFC_ATTR_FIRMWARE_NAME]) + return -EINVAL; + + idx = nla_get_u32(info->attrs[NFC_ATTR_DEVICE_INDEX]); +-- +2.16.4 + diff --git a/patches.suse/ntb-intel-Fix-memleak-in-intel_ntb_pci_probe.patch b/patches.suse/ntb-intel-Fix-memleak-in-intel_ntb_pci_probe.patch new file mode 100644 index 0000000..cb42c51 --- /dev/null +++ b/patches.suse/ntb-intel-Fix-memleak-in-intel_ntb_pci_probe.patch @@ -0,0 +1,37 @@ +From dbb8df5c2d27610a87b0168a8acc89d73fbfde94 Mon Sep 17 00:00:00 2001 +From: Dinghao Liu +Date: Sun, 23 Aug 2020 14:55:12 +0800 +Subject: [PATCH] ntb: intel: Fix memleak in intel_ntb_pci_probe +Git-commit: dbb8df5c2d27610a87b0168a8acc89d73fbfde94 +Patch-mainline: v5.10-rc1 +References: git-fixes + +The default error branch of a series of pdev_is_gen calls +should free ndev just like what we've done in these calls. + +Fixes: 26bfe3d0b227 ("ntb: intel: Add Icelake (gen4) support for Intel NTB") +Signed-off-by: Dinghao Liu +Acked-by: Dave Jiang +Signed-off-by: Jon Mason +Acked-by: Takashi Iwai + +--- + drivers/ntb/hw/intel/ntb_hw_gen1.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/drivers/ntb/hw/intel/ntb_hw_gen1.c b/drivers/ntb/hw/intel/ntb_hw_gen1.c +index 3185efeab487..093dd20057b9 100644 +--- a/drivers/ntb/hw/intel/ntb_hw_gen1.c ++++ b/drivers/ntb/hw/intel/ntb_hw_gen1.c +@@ -1893,7 +1893,7 @@ static int intel_ntb_pci_probe(struct pci_dev *pdev, + goto err_init_dev; + } else { + rc = -EINVAL; +- goto err_ndev; ++ goto err_init_pci; + } + + ndev_reset_unsafe_flags(ndev); +-- +2.16.4 + diff --git a/patches.suse/r8169-fix-operation-under-forced-interrupt-threading.patch b/patches.suse/r8169-fix-operation-under-forced-interrupt-threading.patch new file mode 100644 index 0000000..15c2e67 --- /dev/null +++ b/patches.suse/r8169-fix-operation-under-forced-interrupt-threading.patch @@ -0,0 +1,63 @@ +From 424a646e072a887aa87283b53aa6f8b19c2a7bef Mon Sep 17 00:00:00 2001 +From: Heiner Kallweit +Date: Sun, 18 Oct 2020 18:38:59 +0200 +Subject: [PATCH] r8169: fix operation under forced interrupt threading +Git-commit: 424a646e072a887aa87283b53aa6f8b19c2a7bef +Patch-mainline: v5.10-rc1 +References: git-fixes + +For several network drivers it was reported that using +__napi_schedule_irqoff() is unsafe with forced threading. One way to +fix this is switching back to __napi_schedule, but then we lose the +benefit of the irqoff version in general. As stated by Eric it doesn't +make sense to make the minimal hard irq handlers in drivers using NAPI +a thread. Therefore ensure that the hard irq handler is never +thread-ified. + +Fixes: 9a899a35b0d6 ("r8169: switch to napi_schedule_irqoff") +Link: https://lkml.org/lkml/2020/10/18/19 +Signed-off-by: Heiner Kallweit +Link: https://lore.kernel.org/r/4d3ef84a-c812-5072-918a-22a6f6468310@gmail.com +Signed-off-by: Jakub Kicinski +Acked-by: Takashi Iwai + +--- + drivers/net/ethernet/realtek/r8169_main.c | 8 ++++---- + 1 file changed, 4 insertions(+), 4 deletions(-) + +diff --git a/drivers/net/ethernet/realtek/r8169_main.c b/drivers/net/ethernet/realtek/r8169_main.c +index 7d366b0362cb..3b6ddc706e92 100644 +--- a/drivers/net/ethernet/realtek/r8169_main.c ++++ b/drivers/net/ethernet/realtek/r8169_main.c +@@ -4694,7 +4694,7 @@ static int rtl8169_close(struct net_device *dev) + + phy_disconnect(tp->phydev); + +- pci_free_irq(pdev, 0, tp); ++ free_irq(pci_irq_vector(pdev, 0), tp); + + dma_free_coherent(&pdev->dev, R8169_RX_RING_BYTES, tp->RxDescArray, + tp->RxPhyAddr); +@@ -4745,8 +4745,8 @@ static int rtl_open(struct net_device *dev) + + rtl_request_firmware(tp); + +- retval = pci_request_irq(pdev, 0, rtl8169_interrupt, NULL, tp, +- dev->name); ++ retval = request_irq(pci_irq_vector(pdev, 0), rtl8169_interrupt, ++ IRQF_NO_THREAD | IRQF_SHARED, dev->name, tp); + if (retval < 0) + goto err_release_fw_2; + +@@ -4763,7 +4763,7 @@ static int rtl_open(struct net_device *dev) + return retval; + + err_free_irq: +- pci_free_irq(pdev, 0, tp); ++ free_irq(pci_irq_vector(pdev, 0), tp); + err_release_fw_2: + rtl_release_firmware(tp); + rtl8169_rx_clear(tp); +-- +2.16.4 + diff --git a/patches.suse/reset-sti-reset-syscfg-fix-struct-description-warnin.patch b/patches.suse/reset-sti-reset-syscfg-fix-struct-description-warnin.patch new file mode 100644 index 0000000..d88899d --- /dev/null +++ b/patches.suse/reset-sti-reset-syscfg-fix-struct-description-warnin.patch @@ -0,0 +1,48 @@ +From 68a215164e1938490c82eecccb263d30c586b84a Mon Sep 17 00:00:00 2001 +From: Alain Volmat +Date: Mon, 31 Aug 2020 22:38:04 +0200 +Subject: [PATCH] reset: sti: reset-syscfg: fix struct description warnings +Git-commit: 68a215164e1938490c82eecccb263d30c586b84a +Patch-mainline: v5.10-rc1 +References: git-fixes + +Fix formating of struct description to avoid warning highlighted +by W=1 compilation. + +Fixes: e5d76075d930 ("drivers: reset: STi SoC system configuration reset controller support") +Signed-off-by: Alain Volmat +Signed-off-by: Philipp Zabel +Acked-by: Takashi Iwai + +--- + drivers/reset/sti/reset-syscfg.c | 7 ++++--- + 1 file changed, 4 insertions(+), 3 deletions(-) + +diff --git a/drivers/reset/sti/reset-syscfg.c b/drivers/reset/sti/reset-syscfg.c +index 91215bb88f62..99b63035fe72 100644 +--- a/drivers/reset/sti/reset-syscfg.c ++++ b/drivers/reset/sti/reset-syscfg.c +@@ -17,7 +17,7 @@ + #include "reset-syscfg.h" + + /** +- * Reset channel regmap configuration ++ * struct syscfg_reset_channel - Reset channel regmap configuration + * + * @reset: regmap field for the channel's reset bit. + * @ack: regmap field for the channel's ack bit (optional). +@@ -28,8 +28,9 @@ struct syscfg_reset_channel { + }; + + /** +- * A reset controller which groups together a set of related reset bits, which +- * may be located in different system configuration registers. ++ * struct syscfg_reset_controller - A reset controller which groups together ++ * a set of related reset bits, which may be located in different system ++ * configuration registers. + * + * @rst: base reset controller structure. + * @active_low: are the resets in this controller active low, i.e. clearing +-- +2.16.4 + diff --git a/patches.suse/soc-fsl-qbman-Fix-return-value-on-success.patch b/patches.suse/soc-fsl-qbman-Fix-return-value-on-success.patch new file mode 100644 index 0000000..08d5f82 --- /dev/null +++ b/patches.suse/soc-fsl-qbman-Fix-return-value-on-success.patch @@ -0,0 +1,38 @@ +From 750cf40c0f7088f36a8a5d102e0488b1ac47faf5 Mon Sep 17 00:00:00 2001 +From: Krzysztof Kozlowski +Date: Sun, 20 Sep 2020 22:26:25 +0200 +Subject: [PATCH] soc: fsl: qbman: Fix return value on success +Git-commit: 750cf40c0f7088f36a8a5d102e0488b1ac47faf5 +Patch-mainline: v5.10-rc1 +References: git-fixes + +On error the function was meant to return -ERRNO. This also fixes +compile warning: + + drivers/soc/fsl/qbman/bman.c:640:6: warning: variable 'err' set but not used [-Wunused-but-set-variable] + +Fixes: 0505d00c8dba ("soc/fsl/qbman: Cleanup buffer pools if BMan was initialized prior to bootup") +Signed-off-by: Krzysztof Kozlowski +Signed-off-by: Li Yang +Acked-by: Takashi Iwai + +--- + drivers/soc/fsl/qbman/bman.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/drivers/soc/fsl/qbman/bman.c b/drivers/soc/fsl/qbman/bman.c +index f4fb527d8301..c5dd026fe889 100644 +--- a/drivers/soc/fsl/qbman/bman.c ++++ b/drivers/soc/fsl/qbman/bman.c +@@ -660,7 +660,7 @@ int bm_shutdown_pool(u32 bpid) + } + done: + put_affine_portal(); +- return 0; ++ return err; + } + + struct gen_pool *bm_bpalloc; +-- +2.16.4 + diff --git a/series.conf b/series.conf index bd36881..bbda922 100644 --- a/series.conf +++ b/series.conf @@ -15526,16 +15526,36 @@ patches.suse/clk-imx8mq-Fix-usdhc-parents-order.patch patches.suse/clk-qcom-gcc-sdm660-Fix-wrong-parent_map.patch patches.suse/clk-bcm2835-add-missing-release-if-devm_clk_hw_regis.patch + patches.suse/r8169-fix-operation-under-forced-interrupt-threading.patch + patches.suse/nfc-Ensure-presence-of-NFC_ATTR_FIRMWARE_NAME-attrib.patch patches.suse/ibmvnic-save-changed-mac-address-to-adapter-mac_addr.patch patches.suse/ALSA-sparc-dbri-fix-repeated-word-the.patch patches.suse/ALSA-usb-audio-Line6-Pod-Go-interface-requires-stati.patch patches.suse/ALSA-hda-Fix-the-return-value-if-cb-func-is-already-.patch + patches.suse/Input-imx6ul_tsc-clean-up-some-errors-in-imx6ul_tsc_.patch + patches.suse/Input-stmfts-fix-a-vs-typo.patch + patches.suse/Input-ep93xx_keypad-fix-handling-of-platform_get_irq.patch + patches.suse/Input-omap4-keypad-fix-handling-of-platform_get_irq-.patch + patches.suse/Input-twl4030_keypad-fix-handling-of-platform_get_ir.patch + patches.suse/Input-sun4i-ps2-fix-handling-of-platform_get_irq-err.patch + patches.suse/acpi-cpufreq-Honor-_PSD-table-setting-on-new-AMD-CPU.patch + patches.suse/ACPI-debug-don-t-allow-debugging-when-ACPI-is-disabl.patch patches.suse/ring-buffer-return-0-on-success-from-ring_buffer_resize.patch + patches.suse/docs-driver-api-remove-a-duplicated-index-entry.patch + patches.suse/memory-omap-gpmc-Fix-a-couple-off-by-ones.patch + patches.suse/memory-omap-gpmc-Fix-build-error-without-CONFIG_OF.patch + patches.suse/memory-fsl-corenet-cf-Fix-handling-of-platform_get_i.patch + patches.suse/soc-fsl-qbman-Fix-return-value-on-success.patch + patches.suse/reset-sti-reset-syscfg-fix-struct-description-warnin.patch patches.suse/powerpc-powernv-dump-Fix-race-while-processing-OPAL-.patch patches.suse/powerpc-Fix-undetected-data-corruption-with-P9N-DD2..patch patches.suse/powerpc-pseries-Avoid-using-addr_to_pfn-in-real-mode.patch + patches.suse/ata-sata_rcar-Fix-DMA-boundary-mask.patch patches.suse/nvme-rdma-fix-crash-when-connect-rejected.patch patches.suse/nvme-rdma-fix-crash-due-to-incorrect-cqe.patch + patches.suse/i2c-core-Restore-acpi_walk_dep_device_list-getting-c.patch + patches.suse/NTB-hw-amd-fix-an-issue-about-leak-system-resources.patch + patches.suse/ntb-intel-Fix-memleak-in-intel_ntb_pci_probe.patch ######################################################## # end of sorted patches