1 |
commit: 28deb8e904daee3a90ee2257efcaab7e12f29612 |
2 |
Author: Mike Pagano <mpagano <AT> gentoo <DOT> org> |
3 |
AuthorDate: Wed Dec 2 12:50:14 2020 +0000 |
4 |
Commit: Mike Pagano <mpagano <AT> gentoo <DOT> org> |
5 |
CommitDate: Wed Dec 2 12:50:14 2020 +0000 |
6 |
URL: https://gitweb.gentoo.org/proj/linux-patches.git/commit/?id=28deb8e9 |
7 |
|
8 |
Linux patch 5.4.81 |
9 |
|
10 |
Signed-off-by: Mike Pagano <mpagano <AT> gentoo.org> |
11 |
|
12 |
0000_README | 4 + |
13 |
1080_linux-5.4.81.patch | 3824 +++++++++++++++++++++++++++++++++++++++++++++++ |
14 |
2 files changed, 3828 insertions(+) |
15 |
|
16 |
diff --git a/0000_README b/0000_README |
17 |
index 429a7ad..53eba0a 100644 |
18 |
--- a/0000_README |
19 |
+++ b/0000_README |
20 |
@@ -363,6 +363,10 @@ Patch: 1079_linux-5.4.80.patch |
21 |
From: http://www.kernel.org |
22 |
Desc: Linux 5.4.80 |
23 |
|
24 |
+Patch: 1080_linux-5.4.81.patch |
25 |
+From: http://www.kernel.org |
26 |
+Desc: Linux 5.4.81 |
27 |
+ |
28 |
Patch: 1500_XATTR_USER_PREFIX.patch |
29 |
From: https://bugs.gentoo.org/show_bug.cgi?id=470644 |
30 |
Desc: Support for namespace user.pax.* on tmpfs. |
31 |
|
32 |
diff --git a/1080_linux-5.4.81.patch b/1080_linux-5.4.81.patch |
33 |
new file mode 100644 |
34 |
index 0000000..f7377e3 |
35 |
--- /dev/null |
36 |
+++ b/1080_linux-5.4.81.patch |
37 |
@@ -0,0 +1,3824 @@ |
38 |
+diff --git a/Makefile b/Makefile |
39 |
+index 7c58e4ce51385..5bbb7607fa55f 100644 |
40 |
+--- a/Makefile |
41 |
++++ b/Makefile |
42 |
+@@ -1,7 +1,7 @@ |
43 |
+ # SPDX-License-Identifier: GPL-2.0 |
44 |
+ VERSION = 5 |
45 |
+ PATCHLEVEL = 4 |
46 |
+-SUBLEVEL = 80 |
47 |
++SUBLEVEL = 81 |
48 |
+ EXTRAVERSION = |
49 |
+ NAME = Kleptomaniac Octopus |
50 |
+ |
51 |
+diff --git a/arch/arc/include/asm/pgtable.h b/arch/arc/include/asm/pgtable.h |
52 |
+index 7addd0301c51a..6bdcf9b495b83 100644 |
53 |
+--- a/arch/arc/include/asm/pgtable.h |
54 |
++++ b/arch/arc/include/asm/pgtable.h |
55 |
+@@ -135,8 +135,10 @@ |
56 |
+ |
57 |
+ #ifdef CONFIG_ARC_HAS_PAE40 |
58 |
+ #define PTE_BITS_NON_RWX_IN_PD1 (0xff00000000 | PAGE_MASK | _PAGE_CACHEABLE) |
59 |
++#define MAX_POSSIBLE_PHYSMEM_BITS 40 |
60 |
+ #else |
61 |
+ #define PTE_BITS_NON_RWX_IN_PD1 (PAGE_MASK | _PAGE_CACHEABLE) |
62 |
++#define MAX_POSSIBLE_PHYSMEM_BITS 32 |
63 |
+ #endif |
64 |
+ |
65 |
+ /************************************************************************** |
66 |
+diff --git a/arch/arm/boot/dts/dra76x.dtsi b/arch/arm/boot/dts/dra76x.dtsi |
67 |
+index 9f6fbe4c1fee1..859e4382ac4bb 100644 |
68 |
+--- a/arch/arm/boot/dts/dra76x.dtsi |
69 |
++++ b/arch/arm/boot/dts/dra76x.dtsi |
70 |
+@@ -32,8 +32,8 @@ |
71 |
+ interrupts = <GIC_SPI 67 IRQ_TYPE_LEVEL_HIGH>, |
72 |
+ <GIC_SPI 68 IRQ_TYPE_LEVEL_HIGH>; |
73 |
+ interrupt-names = "int0", "int1"; |
74 |
+- clocks = <&mcan_clk>, <&l3_iclk_div>; |
75 |
+- clock-names = "cclk", "hclk"; |
76 |
++ clocks = <&l3_iclk_div>, <&mcan_clk>; |
77 |
++ clock-names = "hclk", "cclk"; |
78 |
+ bosch,mram-cfg = <0x0 0 0 32 0 0 1 1>; |
79 |
+ }; |
80 |
+ }; |
81 |
+diff --git a/arch/arm/include/asm/pgtable-2level.h b/arch/arm/include/asm/pgtable-2level.h |
82 |
+index 51beec41d48c8..50b51ac91fcbe 100644 |
83 |
+--- a/arch/arm/include/asm/pgtable-2level.h |
84 |
++++ b/arch/arm/include/asm/pgtable-2level.h |
85 |
+@@ -75,6 +75,8 @@ |
86 |
+ #define PTE_HWTABLE_OFF (PTE_HWTABLE_PTRS * sizeof(pte_t)) |
87 |
+ #define PTE_HWTABLE_SIZE (PTRS_PER_PTE * sizeof(u32)) |
88 |
+ |
89 |
++#define MAX_POSSIBLE_PHYSMEM_BITS 32 |
90 |
++ |
91 |
+ /* |
92 |
+ * PMD_SHIFT determines the size of the area a second-level page table can map |
93 |
+ * PGDIR_SHIFT determines what a third-level page table entry can map |
94 |
+diff --git a/arch/arm/include/asm/pgtable-3level.h b/arch/arm/include/asm/pgtable-3level.h |
95 |
+index 5b18295021a03..8006a56cc2ce2 100644 |
96 |
+--- a/arch/arm/include/asm/pgtable-3level.h |
97 |
++++ b/arch/arm/include/asm/pgtable-3level.h |
98 |
+@@ -25,6 +25,8 @@ |
99 |
+ #define PTE_HWTABLE_OFF (0) |
100 |
+ #define PTE_HWTABLE_SIZE (PTRS_PER_PTE * sizeof(u64)) |
101 |
+ |
102 |
++#define MAX_POSSIBLE_PHYSMEM_BITS 40 |
103 |
++ |
104 |
+ /* |
105 |
+ * PGDIR_SHIFT determines the size a top-level page table entry can map. |
106 |
+ */ |
107 |
+diff --git a/arch/arm/mach-omap2/cpuidle44xx.c b/arch/arm/mach-omap2/cpuidle44xx.c |
108 |
+index a92d277f81a08..c8d317fafe2ea 100644 |
109 |
+--- a/arch/arm/mach-omap2/cpuidle44xx.c |
110 |
++++ b/arch/arm/mach-omap2/cpuidle44xx.c |
111 |
+@@ -175,8 +175,11 @@ static int omap_enter_idle_coupled(struct cpuidle_device *dev, |
112 |
+ if (mpuss_can_lose_context) { |
113 |
+ error = cpu_cluster_pm_enter(); |
114 |
+ if (error) { |
115 |
+- omap_set_pwrdm_state(mpu_pd, PWRDM_POWER_ON); |
116 |
+- goto cpu_cluster_pm_out; |
117 |
++ index = 0; |
118 |
++ cx = state_ptr + index; |
119 |
++ pwrdm_set_logic_retst(mpu_pd, cx->mpu_logic_state); |
120 |
++ omap_set_pwrdm_state(mpu_pd, cx->mpu_state); |
121 |
++ mpuss_can_lose_context = 0; |
122 |
+ } |
123 |
+ } |
124 |
+ } |
125 |
+@@ -184,7 +187,6 @@ static int omap_enter_idle_coupled(struct cpuidle_device *dev, |
126 |
+ omap4_enter_lowpower(dev->cpu, cx->cpu_state); |
127 |
+ cpu_done[dev->cpu] = true; |
128 |
+ |
129 |
+-cpu_cluster_pm_out: |
130 |
+ /* Wakeup CPU1 only if it is not offlined */ |
131 |
+ if (dev->cpu == 0 && cpumask_test_cpu(1, cpu_online_mask)) { |
132 |
+ |
133 |
+diff --git a/arch/arm64/boot/dts/nvidia/tegra194.dtsi b/arch/arm64/boot/dts/nvidia/tegra194.dtsi |
134 |
+index 5728255bd0c1a..78f7e6e50beb0 100644 |
135 |
+--- a/arch/arm64/boot/dts/nvidia/tegra194.dtsi |
136 |
++++ b/arch/arm64/boot/dts/nvidia/tegra194.dtsi |
137 |
+@@ -692,7 +692,7 @@ |
138 |
+ |
139 |
+ hsp_aon: hsp@c150000 { |
140 |
+ compatible = "nvidia,tegra194-hsp", "nvidia,tegra186-hsp"; |
141 |
+- reg = <0x0c150000 0xa0000>; |
142 |
++ reg = <0x0c150000 0x90000>; |
143 |
+ interrupts = <GIC_SPI 133 IRQ_TYPE_LEVEL_HIGH>, |
144 |
+ <GIC_SPI 134 IRQ_TYPE_LEVEL_HIGH>, |
145 |
+ <GIC_SPI 135 IRQ_TYPE_LEVEL_HIGH>, |
146 |
+diff --git a/arch/arm64/include/asm/pgtable.h b/arch/arm64/include/asm/pgtable.h |
147 |
+index 41dd4b1f0ccba..69dfc340e71b1 100644 |
148 |
+--- a/arch/arm64/include/asm/pgtable.h |
149 |
++++ b/arch/arm64/include/asm/pgtable.h |
150 |
+@@ -98,8 +98,6 @@ extern unsigned long empty_zero_page[PAGE_SIZE / sizeof(unsigned long)]; |
151 |
+ #define pte_valid(pte) (!!(pte_val(pte) & PTE_VALID)) |
152 |
+ #define pte_valid_not_user(pte) \ |
153 |
+ ((pte_val(pte) & (PTE_VALID | PTE_USER)) == PTE_VALID) |
154 |
+-#define pte_valid_young(pte) \ |
155 |
+- ((pte_val(pte) & (PTE_VALID | PTE_AF)) == (PTE_VALID | PTE_AF)) |
156 |
+ #define pte_valid_user(pte) \ |
157 |
+ ((pte_val(pte) & (PTE_VALID | PTE_USER)) == (PTE_VALID | PTE_USER)) |
158 |
+ |
159 |
+@@ -107,9 +105,12 @@ extern unsigned long empty_zero_page[PAGE_SIZE / sizeof(unsigned long)]; |
160 |
+ * Could the pte be present in the TLB? We must check mm_tlb_flush_pending |
161 |
+ * so that we don't erroneously return false for pages that have been |
162 |
+ * remapped as PROT_NONE but are yet to be flushed from the TLB. |
163 |
++ * Note that we can't make any assumptions based on the state of the access |
164 |
++ * flag, since ptep_clear_flush_young() elides a DSB when invalidating the |
165 |
++ * TLB. |
166 |
+ */ |
167 |
+ #define pte_accessible(mm, pte) \ |
168 |
+- (mm_tlb_flush_pending(mm) ? pte_present(pte) : pte_valid_young(pte)) |
169 |
++ (mm_tlb_flush_pending(mm) ? pte_present(pte) : pte_valid(pte)) |
170 |
+ |
171 |
+ /* |
172 |
+ * p??_access_permitted() is true for valid user mappings (subject to the |
173 |
+@@ -135,13 +136,6 @@ static inline pte_t set_pte_bit(pte_t pte, pgprot_t prot) |
174 |
+ return pte; |
175 |
+ } |
176 |
+ |
177 |
+-static inline pte_t pte_wrprotect(pte_t pte) |
178 |
+-{ |
179 |
+- pte = clear_pte_bit(pte, __pgprot(PTE_WRITE)); |
180 |
+- pte = set_pte_bit(pte, __pgprot(PTE_RDONLY)); |
181 |
+- return pte; |
182 |
+-} |
183 |
+- |
184 |
+ static inline pte_t pte_mkwrite(pte_t pte) |
185 |
+ { |
186 |
+ pte = set_pte_bit(pte, __pgprot(PTE_WRITE)); |
187 |
+@@ -167,6 +161,20 @@ static inline pte_t pte_mkdirty(pte_t pte) |
188 |
+ return pte; |
189 |
+ } |
190 |
+ |
191 |
++static inline pte_t pte_wrprotect(pte_t pte) |
192 |
++{ |
193 |
++ /* |
194 |
++ * If hardware-dirty (PTE_WRITE/DBM bit set and PTE_RDONLY |
195 |
++ * clear), set the PTE_DIRTY bit. |
196 |
++ */ |
197 |
++ if (pte_hw_dirty(pte)) |
198 |
++ pte = pte_mkdirty(pte); |
199 |
++ |
200 |
++ pte = clear_pte_bit(pte, __pgprot(PTE_WRITE)); |
201 |
++ pte = set_pte_bit(pte, __pgprot(PTE_RDONLY)); |
202 |
++ return pte; |
203 |
++} |
204 |
++ |
205 |
+ static inline pte_t pte_mkold(pte_t pte) |
206 |
+ { |
207 |
+ return clear_pte_bit(pte, __pgprot(PTE_AF)); |
208 |
+@@ -782,12 +790,6 @@ static inline void ptep_set_wrprotect(struct mm_struct *mm, unsigned long addres |
209 |
+ pte = READ_ONCE(*ptep); |
210 |
+ do { |
211 |
+ old_pte = pte; |
212 |
+- /* |
213 |
+- * If hardware-dirty (PTE_WRITE/DBM bit set and PTE_RDONLY |
214 |
+- * clear), set the PTE_DIRTY bit. |
215 |
+- */ |
216 |
+- if (pte_hw_dirty(pte)) |
217 |
+- pte = pte_mkdirty(pte); |
218 |
+ pte = pte_wrprotect(pte); |
219 |
+ pte_val(pte) = cmpxchg_relaxed(&pte_val(*ptep), |
220 |
+ pte_val(old_pte), pte_val(pte)); |
221 |
+diff --git a/arch/mips/include/asm/pgtable-32.h b/arch/mips/include/asm/pgtable-32.h |
222 |
+index ba967148b016b..2604fab8a92dc 100644 |
223 |
+--- a/arch/mips/include/asm/pgtable-32.h |
224 |
++++ b/arch/mips/include/asm/pgtable-32.h |
225 |
+@@ -155,6 +155,7 @@ static inline void pmd_clear(pmd_t *pmdp) |
226 |
+ |
227 |
+ #if defined(CONFIG_XPA) |
228 |
+ |
229 |
++#define MAX_POSSIBLE_PHYSMEM_BITS 40 |
230 |
+ #define pte_pfn(x) (((unsigned long)((x).pte_high >> _PFN_SHIFT)) | (unsigned long)((x).pte_low << _PAGE_PRESENT_SHIFT)) |
231 |
+ static inline pte_t |
232 |
+ pfn_pte(unsigned long pfn, pgprot_t prot) |
233 |
+@@ -170,6 +171,7 @@ pfn_pte(unsigned long pfn, pgprot_t prot) |
234 |
+ |
235 |
+ #elif defined(CONFIG_PHYS_ADDR_T_64BIT) && defined(CONFIG_CPU_MIPS32) |
236 |
+ |
237 |
++#define MAX_POSSIBLE_PHYSMEM_BITS 36 |
238 |
+ #define pte_pfn(x) ((unsigned long)((x).pte_high >> 6)) |
239 |
+ |
240 |
+ static inline pte_t pfn_pte(unsigned long pfn, pgprot_t prot) |
241 |
+@@ -184,6 +186,7 @@ static inline pte_t pfn_pte(unsigned long pfn, pgprot_t prot) |
242 |
+ |
243 |
+ #else |
244 |
+ |
245 |
++#define MAX_POSSIBLE_PHYSMEM_BITS 32 |
246 |
+ #ifdef CONFIG_CPU_VR41XX |
247 |
+ #define pte_pfn(x) ((unsigned long)((x).pte >> (PAGE_SHIFT + 2))) |
248 |
+ #define pfn_pte(pfn, prot) __pte(((pfn) << (PAGE_SHIFT + 2)) | pgprot_val(prot)) |
249 |
+diff --git a/arch/powerpc/include/asm/book3s/32/pgtable.h b/arch/powerpc/include/asm/book3s/32/pgtable.h |
250 |
+index 0796533d37dd5..7b6349be621a3 100644 |
251 |
+--- a/arch/powerpc/include/asm/book3s/32/pgtable.h |
252 |
++++ b/arch/powerpc/include/asm/book3s/32/pgtable.h |
253 |
+@@ -37,8 +37,10 @@ static inline bool pte_user(pte_t pte) |
254 |
+ */ |
255 |
+ #ifdef CONFIG_PTE_64BIT |
256 |
+ #define PTE_RPN_MASK (~((1ULL << PTE_RPN_SHIFT) - 1)) |
257 |
++#define MAX_POSSIBLE_PHYSMEM_BITS 36 |
258 |
+ #else |
259 |
+ #define PTE_RPN_MASK (~((1UL << PTE_RPN_SHIFT) - 1)) |
260 |
++#define MAX_POSSIBLE_PHYSMEM_BITS 32 |
261 |
+ #endif |
262 |
+ |
263 |
+ /* |
264 |
+diff --git a/arch/powerpc/include/asm/book3s/64/kup-radix.h b/arch/powerpc/include/asm/book3s/64/kup-radix.h |
265 |
+index c1e45f510591e..a29b64129a7d4 100644 |
266 |
+--- a/arch/powerpc/include/asm/book3s/64/kup-radix.h |
267 |
++++ b/arch/powerpc/include/asm/book3s/64/kup-radix.h |
268 |
+@@ -54,6 +54,8 @@ |
269 |
+ |
270 |
+ #else /* !__ASSEMBLY__ */ |
271 |
+ |
272 |
++#include <linux/jump_label.h> |
273 |
++ |
274 |
+ DECLARE_STATIC_KEY_FALSE(uaccess_flush_key); |
275 |
+ |
276 |
+ #ifdef CONFIG_PPC_KUAP |
277 |
+diff --git a/arch/powerpc/include/asm/nohash/32/pgtable.h b/arch/powerpc/include/asm/nohash/32/pgtable.h |
278 |
+index 552b96eef0c8e..3d32d7103ec8e 100644 |
279 |
+--- a/arch/powerpc/include/asm/nohash/32/pgtable.h |
280 |
++++ b/arch/powerpc/include/asm/nohash/32/pgtable.h |
281 |
+@@ -148,8 +148,10 @@ int map_kernel_page(unsigned long va, phys_addr_t pa, pgprot_t prot); |
282 |
+ */ |
283 |
+ #if defined(CONFIG_PPC32) && defined(CONFIG_PTE_64BIT) |
284 |
+ #define PTE_RPN_MASK (~((1ULL << PTE_RPN_SHIFT) - 1)) |
285 |
++#define MAX_POSSIBLE_PHYSMEM_BITS 36 |
286 |
+ #else |
287 |
+ #define PTE_RPN_MASK (~((1UL << PTE_RPN_SHIFT) - 1)) |
288 |
++#define MAX_POSSIBLE_PHYSMEM_BITS 32 |
289 |
+ #endif |
290 |
+ |
291 |
+ /* |
292 |
+diff --git a/arch/powerpc/kvm/book3s_xive_native.c b/arch/powerpc/kvm/book3s_xive_native.c |
293 |
+index 235d57d6c205e..d78d8487c1d6b 100644 |
294 |
+--- a/arch/powerpc/kvm/book3s_xive_native.c |
295 |
++++ b/arch/powerpc/kvm/book3s_xive_native.c |
296 |
+@@ -252,6 +252,13 @@ static vm_fault_t xive_native_esb_fault(struct vm_fault *vmf) |
297 |
+ } |
298 |
+ |
299 |
+ state = &sb->irq_state[src]; |
300 |
++ |
301 |
++ /* Some sanity checking */ |
302 |
++ if (!state->valid) { |
303 |
++ pr_devel("%s: source %lx invalid !\n", __func__, irq); |
304 |
++ return VM_FAULT_SIGBUS; |
305 |
++ } |
306 |
++ |
307 |
+ kvmppc_xive_select_irq(state, &hw_num, &xd); |
308 |
+ |
309 |
+ arch_spin_lock(&sb->lock); |
310 |
+diff --git a/arch/riscv/include/asm/pgtable-32.h b/arch/riscv/include/asm/pgtable-32.h |
311 |
+index b0ab66e5fdb1d..5b2e79e5bfa5b 100644 |
312 |
+--- a/arch/riscv/include/asm/pgtable-32.h |
313 |
++++ b/arch/riscv/include/asm/pgtable-32.h |
314 |
+@@ -14,4 +14,6 @@ |
315 |
+ #define PGDIR_SIZE (_AC(1, UL) << PGDIR_SHIFT) |
316 |
+ #define PGDIR_MASK (~(PGDIR_SIZE - 1)) |
317 |
+ |
318 |
++#define MAX_POSSIBLE_PHYSMEM_BITS 34 |
319 |
++ |
320 |
+ #endif /* _ASM_RISCV_PGTABLE_32_H */ |
321 |
+diff --git a/arch/x86/events/intel/cstate.c b/arch/x86/events/intel/cstate.c |
322 |
+index 4814c964692cb..0b50119ea12cc 100644 |
323 |
+--- a/arch/x86/events/intel/cstate.c |
324 |
++++ b/arch/x86/events/intel/cstate.c |
325 |
+@@ -107,14 +107,14 @@ |
326 |
+ MODULE_LICENSE("GPL"); |
327 |
+ |
328 |
+ #define DEFINE_CSTATE_FORMAT_ATTR(_var, _name, _format) \ |
329 |
+-static ssize_t __cstate_##_var##_show(struct kobject *kobj, \ |
330 |
+- struct kobj_attribute *attr, \ |
331 |
++static ssize_t __cstate_##_var##_show(struct device *dev, \ |
332 |
++ struct device_attribute *attr, \ |
333 |
+ char *page) \ |
334 |
+ { \ |
335 |
+ BUILD_BUG_ON(sizeof(_format) >= PAGE_SIZE); \ |
336 |
+ return sprintf(page, _format "\n"); \ |
337 |
+ } \ |
338 |
+-static struct kobj_attribute format_attr_##_var = \ |
339 |
++static struct device_attribute format_attr_##_var = \ |
340 |
+ __ATTR(_name, 0444, __cstate_##_var##_show, NULL) |
341 |
+ |
342 |
+ static ssize_t cstate_get_attr_cpumask(struct device *dev, |
343 |
+diff --git a/arch/x86/events/intel/uncore.c b/arch/x86/events/intel/uncore.c |
344 |
+index 86467f85c3831..a335be03aeef1 100644 |
345 |
+--- a/arch/x86/events/intel/uncore.c |
346 |
++++ b/arch/x86/events/intel/uncore.c |
347 |
+@@ -92,8 +92,8 @@ end: |
348 |
+ return map; |
349 |
+ } |
350 |
+ |
351 |
+-ssize_t uncore_event_show(struct kobject *kobj, |
352 |
+- struct kobj_attribute *attr, char *buf) |
353 |
++ssize_t uncore_event_show(struct device *dev, |
354 |
++ struct device_attribute *attr, char *buf) |
355 |
+ { |
356 |
+ struct uncore_event_desc *event = |
357 |
+ container_of(attr, struct uncore_event_desc, attr); |
358 |
+diff --git a/arch/x86/events/intel/uncore.h b/arch/x86/events/intel/uncore.h |
359 |
+index bbfdaa720b456..7b964c63e993c 100644 |
360 |
+--- a/arch/x86/events/intel/uncore.h |
361 |
++++ b/arch/x86/events/intel/uncore.h |
362 |
+@@ -144,7 +144,7 @@ struct intel_uncore_box { |
363 |
+ #define UNCORE_BOX_FLAG_CFL8_CBOX_MSR_OFFS 2 |
364 |
+ |
365 |
+ struct uncore_event_desc { |
366 |
+- struct kobj_attribute attr; |
367 |
++ struct device_attribute attr; |
368 |
+ const char *config; |
369 |
+ }; |
370 |
+ |
371 |
+@@ -165,8 +165,8 @@ struct pci2phy_map { |
372 |
+ struct pci2phy_map *__find_pci2phy_map(int segment); |
373 |
+ int uncore_pcibus_to_physid(struct pci_bus *bus); |
374 |
+ |
375 |
+-ssize_t uncore_event_show(struct kobject *kobj, |
376 |
+- struct kobj_attribute *attr, char *buf); |
377 |
++ssize_t uncore_event_show(struct device *dev, |
378 |
++ struct device_attribute *attr, char *buf); |
379 |
+ |
380 |
+ #define INTEL_UNCORE_EVENT_DESC(_name, _config) \ |
381 |
+ { \ |
382 |
+@@ -175,14 +175,14 @@ ssize_t uncore_event_show(struct kobject *kobj, |
383 |
+ } |
384 |
+ |
385 |
+ #define DEFINE_UNCORE_FORMAT_ATTR(_var, _name, _format) \ |
386 |
+-static ssize_t __uncore_##_var##_show(struct kobject *kobj, \ |
387 |
+- struct kobj_attribute *attr, \ |
388 |
++static ssize_t __uncore_##_var##_show(struct device *dev, \ |
389 |
++ struct device_attribute *attr, \ |
390 |
+ char *page) \ |
391 |
+ { \ |
392 |
+ BUILD_BUG_ON(sizeof(_format) >= PAGE_SIZE); \ |
393 |
+ return sprintf(page, _format "\n"); \ |
394 |
+ } \ |
395 |
+-static struct kobj_attribute format_attr_##_var = \ |
396 |
++static struct device_attribute format_attr_##_var = \ |
397 |
+ __ATTR(_name, 0444, __uncore_##_var##_show, NULL) |
398 |
+ |
399 |
+ static inline bool uncore_pmc_fixed(int idx) |
400 |
+diff --git a/arch/x86/events/rapl.c b/arch/x86/events/rapl.c |
401 |
+index 187c72a58e69c..9050d7b8abc5a 100644 |
402 |
+--- a/arch/x86/events/rapl.c |
403 |
++++ b/arch/x86/events/rapl.c |
404 |
+@@ -93,18 +93,6 @@ static const char *const rapl_domain_names[NR_RAPL_DOMAINS] __initconst = { |
405 |
+ * any other bit is reserved |
406 |
+ */ |
407 |
+ #define RAPL_EVENT_MASK 0xFFULL |
408 |
+- |
409 |
+-#define DEFINE_RAPL_FORMAT_ATTR(_var, _name, _format) \ |
410 |
+-static ssize_t __rapl_##_var##_show(struct kobject *kobj, \ |
411 |
+- struct kobj_attribute *attr, \ |
412 |
+- char *page) \ |
413 |
+-{ \ |
414 |
+- BUILD_BUG_ON(sizeof(_format) >= PAGE_SIZE); \ |
415 |
+- return sprintf(page, _format "\n"); \ |
416 |
+-} \ |
417 |
+-static struct kobj_attribute format_attr_##_var = \ |
418 |
+- __ATTR(_name, 0444, __rapl_##_var##_show, NULL) |
419 |
+- |
420 |
+ #define RAPL_CNTR_WIDTH 32 |
421 |
+ |
422 |
+ #define RAPL_EVENT_ATTR_STR(_name, v, str) \ |
423 |
+@@ -433,7 +421,7 @@ static struct attribute_group rapl_pmu_events_group = { |
424 |
+ .attrs = attrs_empty, |
425 |
+ }; |
426 |
+ |
427 |
+-DEFINE_RAPL_FORMAT_ATTR(event, event, "config:0-7"); |
428 |
++PMU_FORMAT_ATTR(event, "config:0-7"); |
429 |
+ static struct attribute *rapl_formats_attr[] = { |
430 |
+ &format_attr_event.attr, |
431 |
+ NULL, |
432 |
+diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h |
433 |
+index c41686641c3fb..c52b7073a5ab5 100644 |
434 |
+--- a/arch/x86/include/asm/kvm_host.h |
435 |
++++ b/arch/x86/include/asm/kvm_host.h |
436 |
+@@ -1560,6 +1560,7 @@ int kvm_test_age_hva(struct kvm *kvm, unsigned long hva); |
437 |
+ int kvm_set_spte_hva(struct kvm *kvm, unsigned long hva, pte_t pte); |
438 |
+ int kvm_cpu_has_injectable_intr(struct kvm_vcpu *v); |
439 |
+ int kvm_cpu_has_interrupt(struct kvm_vcpu *vcpu); |
440 |
++int kvm_cpu_has_extint(struct kvm_vcpu *v); |
441 |
+ int kvm_arch_interrupt_allowed(struct kvm_vcpu *vcpu); |
442 |
+ int kvm_cpu_get_interrupt(struct kvm_vcpu *v); |
443 |
+ void kvm_vcpu_reset(struct kvm_vcpu *vcpu, bool init_event); |
444 |
+diff --git a/arch/x86/kernel/cpu/bugs.c b/arch/x86/kernel/cpu/bugs.c |
445 |
+index bdc1ed7ff6692..fcc4238ee95f8 100644 |
446 |
+--- a/arch/x86/kernel/cpu/bugs.c |
447 |
++++ b/arch/x86/kernel/cpu/bugs.c |
448 |
+@@ -733,11 +733,13 @@ spectre_v2_user_select_mitigation(enum spectre_v2_mitigation_cmd v2_cmd) |
449 |
+ if (boot_cpu_has(X86_FEATURE_IBPB)) { |
450 |
+ setup_force_cpu_cap(X86_FEATURE_USE_IBPB); |
451 |
+ |
452 |
++ spectre_v2_user_ibpb = mode; |
453 |
+ switch (cmd) { |
454 |
+ case SPECTRE_V2_USER_CMD_FORCE: |
455 |
+ case SPECTRE_V2_USER_CMD_PRCTL_IBPB: |
456 |
+ case SPECTRE_V2_USER_CMD_SECCOMP_IBPB: |
457 |
+ static_branch_enable(&switch_mm_always_ibpb); |
458 |
++ spectre_v2_user_ibpb = SPECTRE_V2_USER_STRICT; |
459 |
+ break; |
460 |
+ case SPECTRE_V2_USER_CMD_PRCTL: |
461 |
+ case SPECTRE_V2_USER_CMD_AUTO: |
462 |
+@@ -751,8 +753,6 @@ spectre_v2_user_select_mitigation(enum spectre_v2_mitigation_cmd v2_cmd) |
463 |
+ pr_info("mitigation: Enabling %s Indirect Branch Prediction Barrier\n", |
464 |
+ static_key_enabled(&switch_mm_always_ibpb) ? |
465 |
+ "always-on" : "conditional"); |
466 |
+- |
467 |
+- spectre_v2_user_ibpb = mode; |
468 |
+ } |
469 |
+ |
470 |
+ /* |
471 |
+diff --git a/arch/x86/kernel/cpu/mce/core.c b/arch/x86/kernel/cpu/mce/core.c |
472 |
+index 92331de16d70e..c2a9762d278dd 100644 |
473 |
+--- a/arch/x86/kernel/cpu/mce/core.c |
474 |
++++ b/arch/x86/kernel/cpu/mce/core.c |
475 |
+@@ -1361,8 +1361,10 @@ void do_machine_check(struct pt_regs *regs, long error_code) |
476 |
+ * When there's any problem use only local no_way_out state. |
477 |
+ */ |
478 |
+ if (!lmce) { |
479 |
+- if (mce_end(order) < 0) |
480 |
+- no_way_out = worst >= MCE_PANIC_SEVERITY; |
481 |
++ if (mce_end(order) < 0) { |
482 |
++ if (!no_way_out) |
483 |
++ no_way_out = worst >= MCE_PANIC_SEVERITY; |
484 |
++ } |
485 |
+ } else { |
486 |
+ /* |
487 |
+ * If there was a fatal machine check we should have |
488 |
+diff --git a/arch/x86/kernel/cpu/resctrl/rdtgroup.c b/arch/x86/kernel/cpu/resctrl/rdtgroup.c |
489 |
+index 54b711bc06073..830ccc396e26d 100644 |
490 |
+--- a/arch/x86/kernel/cpu/resctrl/rdtgroup.c |
491 |
++++ b/arch/x86/kernel/cpu/resctrl/rdtgroup.c |
492 |
+@@ -507,6 +507,24 @@ unlock: |
493 |
+ return ret ?: nbytes; |
494 |
+ } |
495 |
+ |
496 |
++/** |
497 |
++ * rdtgroup_remove - the helper to remove resource group safely |
498 |
++ * @rdtgrp: resource group to remove |
499 |
++ * |
500 |
++ * On resource group creation via a mkdir, an extra kernfs_node reference is |
501 |
++ * taken to ensure that the rdtgroup structure remains accessible for the |
502 |
++ * rdtgroup_kn_unlock() calls where it is removed. |
503 |
++ * |
504 |
++ * Drop the extra reference here, then free the rdtgroup structure. |
505 |
++ * |
506 |
++ * Return: void |
507 |
++ */ |
508 |
++static void rdtgroup_remove(struct rdtgroup *rdtgrp) |
509 |
++{ |
510 |
++ kernfs_put(rdtgrp->kn); |
511 |
++ kfree(rdtgrp); |
512 |
++} |
513 |
++ |
514 |
+ struct task_move_callback { |
515 |
+ struct callback_head work; |
516 |
+ struct rdtgroup *rdtgrp; |
517 |
+@@ -529,7 +547,7 @@ static void move_myself(struct callback_head *head) |
518 |
+ (rdtgrp->flags & RDT_DELETED)) { |
519 |
+ current->closid = 0; |
520 |
+ current->rmid = 0; |
521 |
+- kfree(rdtgrp); |
522 |
++ rdtgroup_remove(rdtgrp); |
523 |
+ } |
524 |
+ |
525 |
+ preempt_disable(); |
526 |
+@@ -1618,7 +1636,6 @@ static int rdtgroup_mkdir_info_resdir(struct rdt_resource *r, char *name, |
527 |
+ if (IS_ERR(kn_subdir)) |
528 |
+ return PTR_ERR(kn_subdir); |
529 |
+ |
530 |
+- kernfs_get(kn_subdir); |
531 |
+ ret = rdtgroup_kn_set_ugid(kn_subdir); |
532 |
+ if (ret) |
533 |
+ return ret; |
534 |
+@@ -1641,7 +1658,6 @@ static int rdtgroup_create_info_dir(struct kernfs_node *parent_kn) |
535 |
+ kn_info = kernfs_create_dir(parent_kn, "info", parent_kn->mode, NULL); |
536 |
+ if (IS_ERR(kn_info)) |
537 |
+ return PTR_ERR(kn_info); |
538 |
+- kernfs_get(kn_info); |
539 |
+ |
540 |
+ ret = rdtgroup_add_files(kn_info, RF_TOP_INFO); |
541 |
+ if (ret) |
542 |
+@@ -1662,12 +1678,6 @@ static int rdtgroup_create_info_dir(struct kernfs_node *parent_kn) |
543 |
+ goto out_destroy; |
544 |
+ } |
545 |
+ |
546 |
+- /* |
547 |
+- * This extra ref will be put in kernfs_remove() and guarantees |
548 |
+- * that @rdtgrp->kn is always accessible. |
549 |
+- */ |
550 |
+- kernfs_get(kn_info); |
551 |
+- |
552 |
+ ret = rdtgroup_kn_set_ugid(kn_info); |
553 |
+ if (ret) |
554 |
+ goto out_destroy; |
555 |
+@@ -1696,12 +1706,6 @@ mongroup_create_dir(struct kernfs_node *parent_kn, struct rdtgroup *prgrp, |
556 |
+ if (dest_kn) |
557 |
+ *dest_kn = kn; |
558 |
+ |
559 |
+- /* |
560 |
+- * This extra ref will be put in kernfs_remove() and guarantees |
561 |
+- * that @rdtgrp->kn is always accessible. |
562 |
+- */ |
563 |
+- kernfs_get(kn); |
564 |
+- |
565 |
+ ret = rdtgroup_kn_set_ugid(kn); |
566 |
+ if (ret) |
567 |
+ goto out_destroy; |
568 |
+@@ -1928,8 +1932,7 @@ void rdtgroup_kn_unlock(struct kernfs_node *kn) |
569 |
+ rdtgrp->mode == RDT_MODE_PSEUDO_LOCKED) |
570 |
+ rdtgroup_pseudo_lock_remove(rdtgrp); |
571 |
+ kernfs_unbreak_active_protection(kn); |
572 |
+- kernfs_put(rdtgrp->kn); |
573 |
+- kfree(rdtgrp); |
574 |
++ rdtgroup_remove(rdtgrp); |
575 |
+ } else { |
576 |
+ kernfs_unbreak_active_protection(kn); |
577 |
+ } |
578 |
+@@ -1988,13 +1991,11 @@ static int rdt_get_tree(struct fs_context *fc) |
579 |
+ &kn_mongrp); |
580 |
+ if (ret < 0) |
581 |
+ goto out_info; |
582 |
+- kernfs_get(kn_mongrp); |
583 |
+ |
584 |
+ ret = mkdir_mondata_all(rdtgroup_default.kn, |
585 |
+ &rdtgroup_default, &kn_mondata); |
586 |
+ if (ret < 0) |
587 |
+ goto out_mongrp; |
588 |
+- kernfs_get(kn_mondata); |
589 |
+ rdtgroup_default.mon.mon_data_kn = kn_mondata; |
590 |
+ } |
591 |
+ |
592 |
+@@ -2223,7 +2224,7 @@ static void free_all_child_rdtgrp(struct rdtgroup *rdtgrp) |
593 |
+ if (atomic_read(&sentry->waitcount) != 0) |
594 |
+ sentry->flags = RDT_DELETED; |
595 |
+ else |
596 |
+- kfree(sentry); |
597 |
++ rdtgroup_remove(sentry); |
598 |
+ } |
599 |
+ } |
600 |
+ |
601 |
+@@ -2265,7 +2266,7 @@ static void rmdir_all_sub(void) |
602 |
+ if (atomic_read(&rdtgrp->waitcount) != 0) |
603 |
+ rdtgrp->flags = RDT_DELETED; |
604 |
+ else |
605 |
+- kfree(rdtgrp); |
606 |
++ rdtgroup_remove(rdtgrp); |
607 |
+ } |
608 |
+ /* Notify online CPUs to update per cpu storage and PQR_ASSOC MSR */ |
609 |
+ update_closid_rmid(cpu_online_mask, &rdtgroup_default); |
610 |
+@@ -2365,11 +2366,6 @@ static int mkdir_mondata_subdir(struct kernfs_node *parent_kn, |
611 |
+ if (IS_ERR(kn)) |
612 |
+ return PTR_ERR(kn); |
613 |
+ |
614 |
+- /* |
615 |
+- * This extra ref will be put in kernfs_remove() and guarantees |
616 |
+- * that kn is always accessible. |
617 |
+- */ |
618 |
+- kernfs_get(kn); |
619 |
+ ret = rdtgroup_kn_set_ugid(kn); |
620 |
+ if (ret) |
621 |
+ goto out_destroy; |
622 |
+@@ -2705,8 +2701,8 @@ static int mkdir_rdt_prepare(struct kernfs_node *parent_kn, |
623 |
+ /* |
624 |
+ * kernfs_remove() will drop the reference count on "kn" which |
625 |
+ * will free it. But we still need it to stick around for the |
626 |
+- * rdtgroup_kn_unlock(kn} call below. Take one extra reference |
627 |
+- * here, which will be dropped inside rdtgroup_kn_unlock(). |
628 |
++ * rdtgroup_kn_unlock(kn) call. Take one extra reference here, |
629 |
++ * which will be dropped by kernfs_put() in rdtgroup_remove(). |
630 |
+ */ |
631 |
+ kernfs_get(kn); |
632 |
+ |
633 |
+@@ -2747,6 +2743,7 @@ static int mkdir_rdt_prepare(struct kernfs_node *parent_kn, |
634 |
+ out_idfree: |
635 |
+ free_rmid(rdtgrp->mon.rmid); |
636 |
+ out_destroy: |
637 |
++ kernfs_put(rdtgrp->kn); |
638 |
+ kernfs_remove(rdtgrp->kn); |
639 |
+ out_free_rgrp: |
640 |
+ kfree(rdtgrp); |
641 |
+@@ -2759,7 +2756,7 @@ static void mkdir_rdt_prepare_clean(struct rdtgroup *rgrp) |
642 |
+ { |
643 |
+ kernfs_remove(rgrp->kn); |
644 |
+ free_rmid(rgrp->mon.rmid); |
645 |
+- kfree(rgrp); |
646 |
++ rdtgroup_remove(rgrp); |
647 |
+ } |
648 |
+ |
649 |
+ /* |
650 |
+@@ -2921,11 +2918,6 @@ static int rdtgroup_rmdir_mon(struct kernfs_node *kn, struct rdtgroup *rdtgrp, |
651 |
+ WARN_ON(list_empty(&prdtgrp->mon.crdtgrp_list)); |
652 |
+ list_del(&rdtgrp->mon.crdtgrp_list); |
653 |
+ |
654 |
+- /* |
655 |
+- * one extra hold on this, will drop when we kfree(rdtgrp) |
656 |
+- * in rdtgroup_kn_unlock() |
657 |
+- */ |
658 |
+- kernfs_get(kn); |
659 |
+ kernfs_remove(rdtgrp->kn); |
660 |
+ |
661 |
+ return 0; |
662 |
+@@ -2937,11 +2929,6 @@ static int rdtgroup_ctrl_remove(struct kernfs_node *kn, |
663 |
+ rdtgrp->flags = RDT_DELETED; |
664 |
+ list_del(&rdtgrp->rdtgroup_list); |
665 |
+ |
666 |
+- /* |
667 |
+- * one extra hold on this, will drop when we kfree(rdtgrp) |
668 |
+- * in rdtgroup_kn_unlock() |
669 |
+- */ |
670 |
+- kernfs_get(kn); |
671 |
+ kernfs_remove(rdtgrp->kn); |
672 |
+ return 0; |
673 |
+ } |
674 |
+diff --git a/arch/x86/kvm/irq.c b/arch/x86/kvm/irq.c |
675 |
+index e330e7d125f72..896db1aa77e7f 100644 |
676 |
+--- a/arch/x86/kvm/irq.c |
677 |
++++ b/arch/x86/kvm/irq.c |
678 |
+@@ -40,29 +40,10 @@ static int pending_userspace_extint(struct kvm_vcpu *v) |
679 |
+ * check if there is pending interrupt from |
680 |
+ * non-APIC source without intack. |
681 |
+ */ |
682 |
+-static int kvm_cpu_has_extint(struct kvm_vcpu *v) |
683 |
+-{ |
684 |
+- u8 accept = kvm_apic_accept_pic_intr(v); |
685 |
+- |
686 |
+- if (accept) { |
687 |
+- if (irqchip_split(v->kvm)) |
688 |
+- return pending_userspace_extint(v); |
689 |
+- else |
690 |
+- return v->kvm->arch.vpic->output; |
691 |
+- } else |
692 |
+- return 0; |
693 |
+-} |
694 |
+- |
695 |
+-/* |
696 |
+- * check if there is injectable interrupt: |
697 |
+- * when virtual interrupt delivery enabled, |
698 |
+- * interrupt from apic will handled by hardware, |
699 |
+- * we don't need to check it here. |
700 |
+- */ |
701 |
+-int kvm_cpu_has_injectable_intr(struct kvm_vcpu *v) |
702 |
++int kvm_cpu_has_extint(struct kvm_vcpu *v) |
703 |
+ { |
704 |
+ /* |
705 |
+- * FIXME: interrupt.injected represents an interrupt that it's |
706 |
++ * FIXME: interrupt.injected represents an interrupt whose |
707 |
+ * side-effects have already been applied (e.g. bit from IRR |
708 |
+ * already moved to ISR). Therefore, it is incorrect to rely |
709 |
+ * on interrupt.injected to know if there is a pending |
710 |
+@@ -75,6 +56,23 @@ int kvm_cpu_has_injectable_intr(struct kvm_vcpu *v) |
711 |
+ if (!lapic_in_kernel(v)) |
712 |
+ return v->arch.interrupt.injected; |
713 |
+ |
714 |
++ if (!kvm_apic_accept_pic_intr(v)) |
715 |
++ return 0; |
716 |
++ |
717 |
++ if (irqchip_split(v->kvm)) |
718 |
++ return pending_userspace_extint(v); |
719 |
++ else |
720 |
++ return v->kvm->arch.vpic->output; |
721 |
++} |
722 |
++ |
723 |
++/* |
724 |
++ * check if there is injectable interrupt: |
725 |
++ * when virtual interrupt delivery enabled, |
726 |
++ * interrupt from apic will handled by hardware, |
727 |
++ * we don't need to check it here. |
728 |
++ */ |
729 |
++int kvm_cpu_has_injectable_intr(struct kvm_vcpu *v) |
730 |
++{ |
731 |
+ if (kvm_cpu_has_extint(v)) |
732 |
+ return 1; |
733 |
+ |
734 |
+@@ -90,20 +88,6 @@ int kvm_cpu_has_injectable_intr(struct kvm_vcpu *v) |
735 |
+ */ |
736 |
+ int kvm_cpu_has_interrupt(struct kvm_vcpu *v) |
737 |
+ { |
738 |
+- /* |
739 |
+- * FIXME: interrupt.injected represents an interrupt that it's |
740 |
+- * side-effects have already been applied (e.g. bit from IRR |
741 |
+- * already moved to ISR). Therefore, it is incorrect to rely |
742 |
+- * on interrupt.injected to know if there is a pending |
743 |
+- * interrupt in the user-mode LAPIC. |
744 |
+- * This leads to nVMX/nSVM not be able to distinguish |
745 |
+- * if it should exit from L2 to L1 on EXTERNAL_INTERRUPT on |
746 |
+- * pending interrupt or should re-inject an injected |
747 |
+- * interrupt. |
748 |
+- */ |
749 |
+- if (!lapic_in_kernel(v)) |
750 |
+- return v->arch.interrupt.injected; |
751 |
+- |
752 |
+ if (kvm_cpu_has_extint(v)) |
753 |
+ return 1; |
754 |
+ |
755 |
+@@ -117,16 +101,21 @@ EXPORT_SYMBOL_GPL(kvm_cpu_has_interrupt); |
756 |
+ */ |
757 |
+ static int kvm_cpu_get_extint(struct kvm_vcpu *v) |
758 |
+ { |
759 |
+- if (kvm_cpu_has_extint(v)) { |
760 |
+- if (irqchip_split(v->kvm)) { |
761 |
+- int vector = v->arch.pending_external_vector; |
762 |
+- |
763 |
+- v->arch.pending_external_vector = -1; |
764 |
+- return vector; |
765 |
+- } else |
766 |
+- return kvm_pic_read_irq(v->kvm); /* PIC */ |
767 |
+- } else |
768 |
++ if (!kvm_cpu_has_extint(v)) { |
769 |
++ WARN_ON(!lapic_in_kernel(v)); |
770 |
+ return -1; |
771 |
++ } |
772 |
++ |
773 |
++ if (!lapic_in_kernel(v)) |
774 |
++ return v->arch.interrupt.nr; |
775 |
++ |
776 |
++ if (irqchip_split(v->kvm)) { |
777 |
++ int vector = v->arch.pending_external_vector; |
778 |
++ |
779 |
++ v->arch.pending_external_vector = -1; |
780 |
++ return vector; |
781 |
++ } else |
782 |
++ return kvm_pic_read_irq(v->kvm); /* PIC */ |
783 |
+ } |
784 |
+ |
785 |
+ /* |
786 |
+@@ -134,13 +123,7 @@ static int kvm_cpu_get_extint(struct kvm_vcpu *v) |
787 |
+ */ |
788 |
+ int kvm_cpu_get_interrupt(struct kvm_vcpu *v) |
789 |
+ { |
790 |
+- int vector; |
791 |
+- |
792 |
+- if (!lapic_in_kernel(v)) |
793 |
+- return v->arch.interrupt.nr; |
794 |
+- |
795 |
+- vector = kvm_cpu_get_extint(v); |
796 |
+- |
797 |
++ int vector = kvm_cpu_get_extint(v); |
798 |
+ if (vector != -1) |
799 |
+ return vector; /* PIC */ |
800 |
+ |
801 |
+diff --git a/arch/x86/kvm/lapic.c b/arch/x86/kvm/lapic.c |
802 |
+index 9f793c9649cdf..3f6b866c644d5 100644 |
803 |
+--- a/arch/x86/kvm/lapic.c |
804 |
++++ b/arch/x86/kvm/lapic.c |
805 |
+@@ -2330,7 +2330,7 @@ int kvm_apic_has_interrupt(struct kvm_vcpu *vcpu) |
806 |
+ struct kvm_lapic *apic = vcpu->arch.apic; |
807 |
+ u32 ppr; |
808 |
+ |
809 |
+- if (!kvm_apic_hw_enabled(apic)) |
810 |
++ if (!kvm_apic_present(vcpu)) |
811 |
+ return -1; |
812 |
+ |
813 |
+ __apic_update_ppr(apic, &ppr); |
814 |
+diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c |
815 |
+index 880a24889291c..b7f86acb8c911 100644 |
816 |
+--- a/arch/x86/kvm/x86.c |
817 |
++++ b/arch/x86/kvm/x86.c |
818 |
+@@ -3624,21 +3624,23 @@ static int kvm_vcpu_ioctl_set_lapic(struct kvm_vcpu *vcpu, |
819 |
+ |
820 |
+ static int kvm_cpu_accept_dm_intr(struct kvm_vcpu *vcpu) |
821 |
+ { |
822 |
++ /* |
823 |
++ * We can accept userspace's request for interrupt injection |
824 |
++ * as long as we have a place to store the interrupt number. |
825 |
++ * The actual injection will happen when the CPU is able to |
826 |
++ * deliver the interrupt. |
827 |
++ */ |
828 |
++ if (kvm_cpu_has_extint(vcpu)) |
829 |
++ return false; |
830 |
++ |
831 |
++ /* Acknowledging ExtINT does not happen if LINT0 is masked. */ |
832 |
+ return (!lapic_in_kernel(vcpu) || |
833 |
+ kvm_apic_accept_pic_intr(vcpu)); |
834 |
+ } |
835 |
+ |
836 |
+-/* |
837 |
+- * if userspace requested an interrupt window, check that the |
838 |
+- * interrupt window is open. |
839 |
+- * |
840 |
+- * No need to exit to userspace if we already have an interrupt queued. |
841 |
+- */ |
842 |
+ static int kvm_vcpu_ready_for_interrupt_injection(struct kvm_vcpu *vcpu) |
843 |
+ { |
844 |
+ return kvm_arch_interrupt_allowed(vcpu) && |
845 |
+- !kvm_cpu_has_interrupt(vcpu) && |
846 |
+- !kvm_event_needs_reinjection(vcpu) && |
847 |
+ kvm_cpu_accept_dm_intr(vcpu); |
848 |
+ } |
849 |
+ |
850 |
+diff --git a/arch/x86/xen/spinlock.c b/arch/x86/xen/spinlock.c |
851 |
+index 6deb49094c605..d817b7c862a62 100644 |
852 |
+--- a/arch/x86/xen/spinlock.c |
853 |
++++ b/arch/x86/xen/spinlock.c |
854 |
+@@ -93,10 +93,20 @@ void xen_init_lock_cpu(int cpu) |
855 |
+ |
856 |
+ void xen_uninit_lock_cpu(int cpu) |
857 |
+ { |
858 |
++ int irq; |
859 |
++ |
860 |
+ if (!xen_pvspin) |
861 |
+ return; |
862 |
+ |
863 |
+- unbind_from_irqhandler(per_cpu(lock_kicker_irq, cpu), NULL); |
864 |
++ /* |
865 |
++ * When booting the kernel with 'mitigations=auto,nosmt', the secondary |
866 |
++ * CPUs are not activated, and lock_kicker_irq is not initialized. |
867 |
++ */ |
868 |
++ irq = per_cpu(lock_kicker_irq, cpu); |
869 |
++ if (irq == -1) |
870 |
++ return; |
871 |
++ |
872 |
++ unbind_from_irqhandler(irq, NULL); |
873 |
+ per_cpu(lock_kicker_irq, cpu) = -1; |
874 |
+ kfree(per_cpu(irq_name, cpu)); |
875 |
+ per_cpu(irq_name, cpu) = NULL; |
876 |
+diff --git a/arch/xtensa/include/asm/uaccess.h b/arch/xtensa/include/asm/uaccess.h |
877 |
+index 3f80386f18838..5cb24a789e9e1 100644 |
878 |
+--- a/arch/xtensa/include/asm/uaccess.h |
879 |
++++ b/arch/xtensa/include/asm/uaccess.h |
880 |
+@@ -300,7 +300,7 @@ strncpy_from_user(char *dst, const char *src, long count) |
881 |
+ return -EFAULT; |
882 |
+ } |
883 |
+ #else |
884 |
+-long strncpy_from_user(char *dst, const char *src, long count); |
885 |
++long strncpy_from_user(char *dst, const char __user *src, long count); |
886 |
+ #endif |
887 |
+ |
888 |
+ /* |
889 |
+diff --git a/drivers/bus/ti-sysc.c b/drivers/bus/ti-sysc.c |
890 |
+index 770a780dfa544..3934ce3385ac3 100644 |
891 |
+--- a/drivers/bus/ti-sysc.c |
892 |
++++ b/drivers/bus/ti-sysc.c |
893 |
+@@ -192,6 +192,9 @@ static int sysc_wait_softreset(struct sysc *ddata) |
894 |
+ u32 sysc_mask, syss_done, rstval; |
895 |
+ int syss_offset, error = 0; |
896 |
+ |
897 |
++ if (ddata->cap->regbits->srst_shift < 0) |
898 |
++ return 0; |
899 |
++ |
900 |
+ syss_offset = ddata->offsets[SYSC_SYSSTATUS]; |
901 |
+ sysc_mask = BIT(ddata->cap->regbits->srst_shift); |
902 |
+ |
903 |
+diff --git a/drivers/dma/pl330.c b/drivers/dma/pl330.c |
904 |
+index cd81d10974a29..57b6555d6d042 100644 |
905 |
+--- a/drivers/dma/pl330.c |
906 |
++++ b/drivers/dma/pl330.c |
907 |
+@@ -2793,7 +2793,7 @@ pl330_prep_dma_memcpy(struct dma_chan *chan, dma_addr_t dst, |
908 |
+ * If burst size is smaller than bus width then make sure we only |
909 |
+ * transfer one at a time to avoid a burst stradling an MFIFO entry. |
910 |
+ */ |
911 |
+- if (desc->rqcfg.brst_size * 8 < pl330->pcfg.data_bus_width) |
912 |
++ if (burst * 8 < pl330->pcfg.data_bus_width) |
913 |
+ desc->rqcfg.brst_len = 1; |
914 |
+ |
915 |
+ desc->bytes_requested = len; |
916 |
+diff --git a/drivers/dma/xilinx/xilinx_dma.c b/drivers/dma/xilinx/xilinx_dma.c |
917 |
+index 43acba2a1c0ee..a6abfe702c5a3 100644 |
918 |
+--- a/drivers/dma/xilinx/xilinx_dma.c |
919 |
++++ b/drivers/dma/xilinx/xilinx_dma.c |
920 |
+@@ -454,8 +454,8 @@ struct xilinx_dma_device { |
921 |
+ #define to_dma_tx_descriptor(tx) \ |
922 |
+ container_of(tx, struct xilinx_dma_tx_descriptor, async_tx) |
923 |
+ #define xilinx_dma_poll_timeout(chan, reg, val, cond, delay_us, timeout_us) \ |
924 |
+- readl_poll_timeout(chan->xdev->regs + chan->ctrl_offset + reg, val, \ |
925 |
+- cond, delay_us, timeout_us) |
926 |
++ readl_poll_timeout_atomic(chan->xdev->regs + chan->ctrl_offset + reg, \ |
927 |
++ val, cond, delay_us, timeout_us) |
928 |
+ |
929 |
+ /* IO accessors */ |
930 |
+ static inline u32 dma_read(struct xilinx_dma_chan *chan, u32 reg) |
931 |
+diff --git a/drivers/firmware/efi/Kconfig b/drivers/firmware/efi/Kconfig |
932 |
+index 6a6b412206ec0..3222645c95b33 100644 |
933 |
+--- a/drivers/firmware/efi/Kconfig |
934 |
++++ b/drivers/firmware/efi/Kconfig |
935 |
+@@ -216,7 +216,7 @@ config EFI_DEV_PATH_PARSER |
936 |
+ |
937 |
+ config EFI_EARLYCON |
938 |
+ def_bool y |
939 |
+- depends on SERIAL_EARLYCON && !ARM && !IA64 |
940 |
++ depends on EFI && SERIAL_EARLYCON && !ARM && !IA64 |
941 |
+ select FONT_SUPPORT |
942 |
+ select ARCH_USE_MEMREMAP_PROT |
943 |
+ |
944 |
+diff --git a/drivers/hid/hid-cypress.c b/drivers/hid/hid-cypress.c |
945 |
+index a50ba4a4a1d71..b88f889b3932e 100644 |
946 |
+--- a/drivers/hid/hid-cypress.c |
947 |
++++ b/drivers/hid/hid-cypress.c |
948 |
+@@ -23,19 +23,17 @@ |
949 |
+ #define CP_2WHEEL_MOUSE_HACK 0x02 |
950 |
+ #define CP_2WHEEL_MOUSE_HACK_ON 0x04 |
951 |
+ |
952 |
++#define VA_INVAL_LOGICAL_BOUNDARY 0x08 |
953 |
++ |
954 |
+ /* |
955 |
+ * Some USB barcode readers from cypress have usage min and usage max in |
956 |
+ * the wrong order |
957 |
+ */ |
958 |
+-static __u8 *cp_report_fixup(struct hid_device *hdev, __u8 *rdesc, |
959 |
++static __u8 *cp_rdesc_fixup(struct hid_device *hdev, __u8 *rdesc, |
960 |
+ unsigned int *rsize) |
961 |
+ { |
962 |
+- unsigned long quirks = (unsigned long)hid_get_drvdata(hdev); |
963 |
+ unsigned int i; |
964 |
+ |
965 |
+- if (!(quirks & CP_RDESC_SWAPPED_MIN_MAX)) |
966 |
+- return rdesc; |
967 |
+- |
968 |
+ if (*rsize < 4) |
969 |
+ return rdesc; |
970 |
+ |
971 |
+@@ -48,6 +46,40 @@ static __u8 *cp_report_fixup(struct hid_device *hdev, __u8 *rdesc, |
972 |
+ return rdesc; |
973 |
+ } |
974 |
+ |
975 |
++static __u8 *va_logical_boundary_fixup(struct hid_device *hdev, __u8 *rdesc, |
976 |
++ unsigned int *rsize) |
977 |
++{ |
978 |
++ /* |
979 |
++ * Varmilo VA104M (with VID Cypress and device ID 07B1) incorrectly |
980 |
++ * reports Logical Minimum of its Consumer Control device as 572 |
981 |
++ * (0x02 0x3c). Fix this by setting its Logical Minimum to zero. |
982 |
++ */ |
983 |
++ if (*rsize == 25 && |
984 |
++ rdesc[0] == 0x05 && rdesc[1] == 0x0c && |
985 |
++ rdesc[2] == 0x09 && rdesc[3] == 0x01 && |
986 |
++ rdesc[6] == 0x19 && rdesc[7] == 0x00 && |
987 |
++ rdesc[11] == 0x16 && rdesc[12] == 0x3c && rdesc[13] == 0x02) { |
988 |
++ hid_info(hdev, |
989 |
++ "fixing up varmilo VA104M consumer control report descriptor\n"); |
990 |
++ rdesc[12] = 0x00; |
991 |
++ rdesc[13] = 0x00; |
992 |
++ } |
993 |
++ return rdesc; |
994 |
++} |
995 |
++ |
996 |
++static __u8 *cp_report_fixup(struct hid_device *hdev, __u8 *rdesc, |
997 |
++ unsigned int *rsize) |
998 |
++{ |
999 |
++ unsigned long quirks = (unsigned long)hid_get_drvdata(hdev); |
1000 |
++ |
1001 |
++ if (quirks & CP_RDESC_SWAPPED_MIN_MAX) |
1002 |
++ rdesc = cp_rdesc_fixup(hdev, rdesc, rsize); |
1003 |
++ if (quirks & VA_INVAL_LOGICAL_BOUNDARY) |
1004 |
++ rdesc = va_logical_boundary_fixup(hdev, rdesc, rsize); |
1005 |
++ |
1006 |
++ return rdesc; |
1007 |
++} |
1008 |
++ |
1009 |
+ static int cp_input_mapped(struct hid_device *hdev, struct hid_input *hi, |
1010 |
+ struct hid_field *field, struct hid_usage *usage, |
1011 |
+ unsigned long **bit, int *max) |
1012 |
+@@ -128,6 +160,8 @@ static const struct hid_device_id cp_devices[] = { |
1013 |
+ .driver_data = CP_RDESC_SWAPPED_MIN_MAX }, |
1014 |
+ { HID_USB_DEVICE(USB_VENDOR_ID_CYPRESS, USB_DEVICE_ID_CYPRESS_MOUSE), |
1015 |
+ .driver_data = CP_2WHEEL_MOUSE_HACK }, |
1016 |
++ { HID_USB_DEVICE(USB_VENDOR_ID_CYPRESS, USB_DEVICE_ID_CYPRESS_VARMILO_VA104M_07B1), |
1017 |
++ .driver_data = VA_INVAL_LOGICAL_BOUNDARY }, |
1018 |
+ { } |
1019 |
+ }; |
1020 |
+ MODULE_DEVICE_TABLE(hid, cp_devices); |
1021 |
+diff --git a/drivers/hid/hid-ids.h b/drivers/hid/hid-ids.h |
1022 |
+index 7363d0b488bd8..2aa810665a78c 100644 |
1023 |
+--- a/drivers/hid/hid-ids.h |
1024 |
++++ b/drivers/hid/hid-ids.h |
1025 |
+@@ -337,6 +337,8 @@ |
1026 |
+ #define USB_DEVICE_ID_CYPRESS_BARCODE_4 0xed81 |
1027 |
+ #define USB_DEVICE_ID_CYPRESS_TRUETOUCH 0xc001 |
1028 |
+ |
1029 |
++#define USB_DEVICE_ID_CYPRESS_VARMILO_VA104M_07B1 0X07b1 |
1030 |
++ |
1031 |
+ #define USB_VENDOR_ID_DATA_MODUL 0x7374 |
1032 |
+ #define USB_VENDOR_ID_DATA_MODUL_EASYMAXTOUCH 0x1201 |
1033 |
+ |
1034 |
+@@ -449,6 +451,10 @@ |
1035 |
+ #define USB_VENDOR_ID_FRUCTEL 0x25B6 |
1036 |
+ #define USB_DEVICE_ID_GAMETEL_MT_MODE 0x0002 |
1037 |
+ |
1038 |
++#define USB_VENDOR_ID_GAMEVICE 0x27F8 |
1039 |
++#define USB_DEVICE_ID_GAMEVICE_GV186 0x0BBE |
1040 |
++#define USB_DEVICE_ID_GAMEVICE_KISHI 0x0BBF |
1041 |
++ |
1042 |
+ #define USB_VENDOR_ID_GAMERON 0x0810 |
1043 |
+ #define USB_DEVICE_ID_GAMERON_DUAL_PSX_ADAPTOR 0x0001 |
1044 |
+ #define USB_DEVICE_ID_GAMERON_DUAL_PCS_ADAPTOR 0x0002 |
1045 |
+@@ -487,6 +493,7 @@ |
1046 |
+ #define USB_DEVICE_ID_PENPOWER 0x00f4 |
1047 |
+ |
1048 |
+ #define USB_VENDOR_ID_GREENASIA 0x0e8f |
1049 |
++#define USB_DEVICE_ID_GREENASIA_DUAL_SAT_ADAPTOR 0x3010 |
1050 |
+ #define USB_DEVICE_ID_GREENASIA_DUAL_USB_JOYPAD 0x3013 |
1051 |
+ |
1052 |
+ #define USB_VENDOR_ID_GRETAGMACBETH 0x0971 |
1053 |
+@@ -743,6 +750,7 @@ |
1054 |
+ #define USB_VENDOR_ID_LOGITECH 0x046d |
1055 |
+ #define USB_DEVICE_ID_LOGITECH_AUDIOHUB 0x0a0e |
1056 |
+ #define USB_DEVICE_ID_LOGITECH_T651 0xb00c |
1057 |
++#define USB_DEVICE_ID_LOGITECH_DINOVO_EDGE_KBD 0xb309 |
1058 |
+ #define USB_DEVICE_ID_LOGITECH_C007 0xc007 |
1059 |
+ #define USB_DEVICE_ID_LOGITECH_C077 0xc077 |
1060 |
+ #define USB_DEVICE_ID_LOGITECH_RECEIVER 0xc101 |
1061 |
+@@ -1292,6 +1300,7 @@ |
1062 |
+ |
1063 |
+ #define USB_VENDOR_ID_UGTIZER 0x2179 |
1064 |
+ #define USB_DEVICE_ID_UGTIZER_TABLET_GP0610 0x0053 |
1065 |
++#define USB_DEVICE_ID_UGTIZER_TABLET_GT5040 0x0077 |
1066 |
+ |
1067 |
+ #define USB_VENDOR_ID_VIEWSONIC 0x0543 |
1068 |
+ #define USB_DEVICE_ID_VIEWSONIC_PD1011 0xe621 |
1069 |
+diff --git a/drivers/hid/hid-input.c b/drivers/hid/hid-input.c |
1070 |
+index b2bff932c524f..b2da8476d0d30 100644 |
1071 |
+--- a/drivers/hid/hid-input.c |
1072 |
++++ b/drivers/hid/hid-input.c |
1073 |
+@@ -319,6 +319,9 @@ static const struct hid_device_id hid_battery_quirks[] = { |
1074 |
+ { HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_ASUSTEK, |
1075 |
+ USB_DEVICE_ID_ASUSTEK_T100CHI_KEYBOARD), |
1076 |
+ HID_BATTERY_QUIRK_IGNORE }, |
1077 |
++ { HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_LOGITECH, |
1078 |
++ USB_DEVICE_ID_LOGITECH_DINOVO_EDGE_KBD), |
1079 |
++ HID_BATTERY_QUIRK_IGNORE }, |
1080 |
+ {} |
1081 |
+ }; |
1082 |
+ |
1083 |
+diff --git a/drivers/hid/hid-ite.c b/drivers/hid/hid-ite.c |
1084 |
+index 044a93f3c1178..742c052b0110a 100644 |
1085 |
+--- a/drivers/hid/hid-ite.c |
1086 |
++++ b/drivers/hid/hid-ite.c |
1087 |
+@@ -11,6 +11,48 @@ |
1088 |
+ |
1089 |
+ #include "hid-ids.h" |
1090 |
+ |
1091 |
++#define QUIRK_TOUCHPAD_ON_OFF_REPORT BIT(0) |
1092 |
++ |
1093 |
++static __u8 *ite_report_fixup(struct hid_device *hdev, __u8 *rdesc, unsigned int *rsize) |
1094 |
++{ |
1095 |
++ unsigned long quirks = (unsigned long)hid_get_drvdata(hdev); |
1096 |
++ |
1097 |
++ if (quirks & QUIRK_TOUCHPAD_ON_OFF_REPORT) { |
1098 |
++ if (*rsize == 188 && rdesc[162] == 0x81 && rdesc[163] == 0x02) { |
1099 |
++ hid_info(hdev, "Fixing up ITE keyboard report descriptor\n"); |
1100 |
++ rdesc[163] = HID_MAIN_ITEM_RELATIVE; |
1101 |
++ } |
1102 |
++ } |
1103 |
++ |
1104 |
++ return rdesc; |
1105 |
++} |
1106 |
++ |
1107 |
++static int ite_input_mapping(struct hid_device *hdev, |
1108 |
++ struct hid_input *hi, struct hid_field *field, |
1109 |
++ struct hid_usage *usage, unsigned long **bit, |
1110 |
++ int *max) |
1111 |
++{ |
1112 |
++ |
1113 |
++ unsigned long quirks = (unsigned long)hid_get_drvdata(hdev); |
1114 |
++ |
1115 |
++ if ((quirks & QUIRK_TOUCHPAD_ON_OFF_REPORT) && |
1116 |
++ (usage->hid & HID_USAGE_PAGE) == 0x00880000) { |
1117 |
++ if (usage->hid == 0x00880078) { |
1118 |
++ /* Touchpad on, userspace expects F22 for this */ |
1119 |
++ hid_map_usage_clear(hi, usage, bit, max, EV_KEY, KEY_F22); |
1120 |
++ return 1; |
1121 |
++ } |
1122 |
++ if (usage->hid == 0x00880079) { |
1123 |
++ /* Touchpad off, userspace expects F23 for this */ |
1124 |
++ hid_map_usage_clear(hi, usage, bit, max, EV_KEY, KEY_F23); |
1125 |
++ return 1; |
1126 |
++ } |
1127 |
++ return -1; |
1128 |
++ } |
1129 |
++ |
1130 |
++ return 0; |
1131 |
++} |
1132 |
++ |
1133 |
+ static int ite_event(struct hid_device *hdev, struct hid_field *field, |
1134 |
+ struct hid_usage *usage, __s32 value) |
1135 |
+ { |
1136 |
+@@ -37,13 +79,27 @@ static int ite_event(struct hid_device *hdev, struct hid_field *field, |
1137 |
+ return 0; |
1138 |
+ } |
1139 |
+ |
1140 |
++static int ite_probe(struct hid_device *hdev, const struct hid_device_id *id) |
1141 |
++{ |
1142 |
++ int ret; |
1143 |
++ |
1144 |
++ hid_set_drvdata(hdev, (void *)id->driver_data); |
1145 |
++ |
1146 |
++ ret = hid_open_report(hdev); |
1147 |
++ if (ret) |
1148 |
++ return ret; |
1149 |
++ |
1150 |
++ return hid_hw_start(hdev, HID_CONNECT_DEFAULT); |
1151 |
++} |
1152 |
++ |
1153 |
+ static const struct hid_device_id ite_devices[] = { |
1154 |
+ { HID_USB_DEVICE(USB_VENDOR_ID_ITE, USB_DEVICE_ID_ITE8595) }, |
1155 |
+ { HID_USB_DEVICE(USB_VENDOR_ID_258A, USB_DEVICE_ID_258A_6A88) }, |
1156 |
+ /* ITE8595 USB kbd ctlr, with Synaptics touchpad connected to it. */ |
1157 |
+ { HID_DEVICE(BUS_USB, HID_GROUP_GENERIC, |
1158 |
+ USB_VENDOR_ID_SYNAPTICS, |
1159 |
+- USB_DEVICE_ID_SYNAPTICS_ACER_SWITCH5_012) }, |
1160 |
++ USB_DEVICE_ID_SYNAPTICS_ACER_SWITCH5_012), |
1161 |
++ .driver_data = QUIRK_TOUCHPAD_ON_OFF_REPORT }, |
1162 |
+ /* ITE8910 USB kbd ctlr, with Synaptics touchpad connected to it. */ |
1163 |
+ { HID_DEVICE(BUS_USB, HID_GROUP_GENERIC, |
1164 |
+ USB_VENDOR_ID_SYNAPTICS, |
1165 |
+@@ -55,6 +111,9 @@ MODULE_DEVICE_TABLE(hid, ite_devices); |
1166 |
+ static struct hid_driver ite_driver = { |
1167 |
+ .name = "itetech", |
1168 |
+ .id_table = ite_devices, |
1169 |
++ .probe = ite_probe, |
1170 |
++ .report_fixup = ite_report_fixup, |
1171 |
++ .input_mapping = ite_input_mapping, |
1172 |
+ .event = ite_event, |
1173 |
+ }; |
1174 |
+ module_hid_driver(ite_driver); |
1175 |
+diff --git a/drivers/hid/hid-logitech-hidpp.c b/drivers/hid/hid-logitech-hidpp.c |
1176 |
+index e49d36de07968..919551ed5809c 100644 |
1177 |
+--- a/drivers/hid/hid-logitech-hidpp.c |
1178 |
++++ b/drivers/hid/hid-logitech-hidpp.c |
1179 |
+@@ -3789,6 +3789,9 @@ static const struct hid_device_id hidpp_devices[] = { |
1180 |
+ { /* Keyboard MX5000 (Bluetooth-receiver in HID proxy mode) */ |
1181 |
+ LDJ_DEVICE(0xb305), |
1182 |
+ .driver_data = HIDPP_QUIRK_HIDPP_CONSUMER_VENDOR_KEYS }, |
1183 |
++ { /* Dinovo Edge (Bluetooth-receiver in HID proxy mode) */ |
1184 |
++ LDJ_DEVICE(0xb309), |
1185 |
++ .driver_data = HIDPP_QUIRK_HIDPP_CONSUMER_VENDOR_KEYS }, |
1186 |
+ { /* Keyboard MX5500 (Bluetooth-receiver in HID proxy mode) */ |
1187 |
+ LDJ_DEVICE(0xb30b), |
1188 |
+ .driver_data = HIDPP_QUIRK_HIDPP_CONSUMER_VENDOR_KEYS }, |
1189 |
+@@ -3831,6 +3834,9 @@ static const struct hid_device_id hidpp_devices[] = { |
1190 |
+ { /* MX5000 keyboard over Bluetooth */ |
1191 |
+ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_LOGITECH, 0xb305), |
1192 |
+ .driver_data = HIDPP_QUIRK_HIDPP_CONSUMER_VENDOR_KEYS }, |
1193 |
++ { /* Dinovo Edge keyboard over Bluetooth */ |
1194 |
++ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_LOGITECH, 0xb309), |
1195 |
++ .driver_data = HIDPP_QUIRK_HIDPP_CONSUMER_VENDOR_KEYS }, |
1196 |
+ { /* MX5500 keyboard over Bluetooth */ |
1197 |
+ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_LOGITECH, 0xb30b), |
1198 |
+ .driver_data = HIDPP_QUIRK_HIDPP_CONSUMER_VENDOR_KEYS }, |
1199 |
+diff --git a/drivers/hid/hid-quirks.c b/drivers/hid/hid-quirks.c |
1200 |
+index 0440e2f6e8a3c..60d188a704e5e 100644 |
1201 |
+--- a/drivers/hid/hid-quirks.c |
1202 |
++++ b/drivers/hid/hid-quirks.c |
1203 |
+@@ -83,7 +83,12 @@ static const struct hid_device_id hid_quirks[] = { |
1204 |
+ { HID_USB_DEVICE(USB_VENDOR_ID_FORMOSA, USB_DEVICE_ID_FORMOSA_IR_RECEIVER), HID_QUIRK_NO_INIT_REPORTS }, |
1205 |
+ { HID_USB_DEVICE(USB_VENDOR_ID_FREESCALE, USB_DEVICE_ID_FREESCALE_MX28), HID_QUIRK_NOGET }, |
1206 |
+ { HID_USB_DEVICE(USB_VENDOR_ID_FUTABA, USB_DEVICE_ID_LED_DISPLAY), HID_QUIRK_NO_INIT_REPORTS }, |
1207 |
++ { HID_USB_DEVICE(USB_VENDOR_ID_GREENASIA, USB_DEVICE_ID_GREENASIA_DUAL_SAT_ADAPTOR), HID_QUIRK_MULTI_INPUT }, |
1208 |
+ { HID_USB_DEVICE(USB_VENDOR_ID_GREENASIA, USB_DEVICE_ID_GREENASIA_DUAL_USB_JOYPAD), HID_QUIRK_MULTI_INPUT }, |
1209 |
++ { HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_GAMEVICE, USB_DEVICE_ID_GAMEVICE_GV186), |
1210 |
++ HID_QUIRK_INCREMENT_USAGE_ON_DUPLICATE }, |
1211 |
++ { HID_USB_DEVICE(USB_VENDOR_ID_GAMEVICE, USB_DEVICE_ID_GAMEVICE_KISHI), |
1212 |
++ HID_QUIRK_INCREMENT_USAGE_ON_DUPLICATE }, |
1213 |
+ { HID_USB_DEVICE(USB_VENDOR_ID_HAPP, USB_DEVICE_ID_UGCI_DRIVING), HID_QUIRK_BADPAD | HID_QUIRK_MULTI_INPUT }, |
1214 |
+ { HID_USB_DEVICE(USB_VENDOR_ID_HAPP, USB_DEVICE_ID_UGCI_FIGHTING), HID_QUIRK_BADPAD | HID_QUIRK_MULTI_INPUT }, |
1215 |
+ { HID_USB_DEVICE(USB_VENDOR_ID_HAPP, USB_DEVICE_ID_UGCI_FLYING), HID_QUIRK_BADPAD | HID_QUIRK_MULTI_INPUT }, |
1216 |
+diff --git a/drivers/hid/hid-sensor-hub.c b/drivers/hid/hid-sensor-hub.c |
1217 |
+index 94c7398b5c279..3dd7d32467378 100644 |
1218 |
+--- a/drivers/hid/hid-sensor-hub.c |
1219 |
++++ b/drivers/hid/hid-sensor-hub.c |
1220 |
+@@ -483,7 +483,8 @@ static int sensor_hub_raw_event(struct hid_device *hdev, |
1221 |
+ return 1; |
1222 |
+ |
1223 |
+ ptr = raw_data; |
1224 |
+- ptr++; /* Skip report id */ |
1225 |
++ if (report->id) |
1226 |
++ ptr++; /* Skip report id */ |
1227 |
+ |
1228 |
+ spin_lock_irqsave(&pdata->lock, flags); |
1229 |
+ |
1230 |
+diff --git a/drivers/hid/hid-uclogic-core.c b/drivers/hid/hid-uclogic-core.c |
1231 |
+index 86b568037cb8a..8e9c9e646cb7d 100644 |
1232 |
+--- a/drivers/hid/hid-uclogic-core.c |
1233 |
++++ b/drivers/hid/hid-uclogic-core.c |
1234 |
+@@ -385,6 +385,8 @@ static const struct hid_device_id uclogic_devices[] = { |
1235 |
+ USB_DEVICE_ID_UCLOGIC_DRAWIMAGE_G3) }, |
1236 |
+ { HID_USB_DEVICE(USB_VENDOR_ID_UGTIZER, |
1237 |
+ USB_DEVICE_ID_UGTIZER_TABLET_GP0610) }, |
1238 |
++ { HID_USB_DEVICE(USB_VENDOR_ID_UGTIZER, |
1239 |
++ USB_DEVICE_ID_UGTIZER_TABLET_GT5040) }, |
1240 |
+ { HID_USB_DEVICE(USB_VENDOR_ID_UGEE, |
1241 |
+ USB_DEVICE_ID_UGEE_TABLET_G5) }, |
1242 |
+ { HID_USB_DEVICE(USB_VENDOR_ID_UGEE, |
1243 |
+diff --git a/drivers/hid/hid-uclogic-params.c b/drivers/hid/hid-uclogic-params.c |
1244 |
+index 78a364ae2f685..e80c812f44a77 100644 |
1245 |
+--- a/drivers/hid/hid-uclogic-params.c |
1246 |
++++ b/drivers/hid/hid-uclogic-params.c |
1247 |
+@@ -997,6 +997,8 @@ int uclogic_params_init(struct uclogic_params *params, |
1248 |
+ break; |
1249 |
+ case VID_PID(USB_VENDOR_ID_UGTIZER, |
1250 |
+ USB_DEVICE_ID_UGTIZER_TABLET_GP0610): |
1251 |
++ case VID_PID(USB_VENDOR_ID_UGTIZER, |
1252 |
++ USB_DEVICE_ID_UGTIZER_TABLET_GT5040): |
1253 |
+ case VID_PID(USB_VENDOR_ID_UGEE, |
1254 |
+ USB_DEVICE_ID_UGEE_XPPEN_TABLET_G540): |
1255 |
+ case VID_PID(USB_VENDOR_ID_UGEE, |
1256 |
+diff --git a/drivers/infiniband/hw/hns/hns_roce_hw_v2.c b/drivers/infiniband/hw/hns/hns_roce_hw_v2.c |
1257 |
+index bb75328193957..e8933daab4995 100644 |
1258 |
+--- a/drivers/infiniband/hw/hns/hns_roce_hw_v2.c |
1259 |
++++ b/drivers/infiniband/hw/hns/hns_roce_hw_v2.c |
1260 |
+@@ -2423,6 +2423,7 @@ static int hns_roce_v2_mw_write_mtpt(void *mb_buf, struct hns_roce_mw *mw) |
1261 |
+ |
1262 |
+ roce_set_bit(mpt_entry->byte_8_mw_cnt_en, V2_MPT_BYTE_8_R_INV_EN_S, 1); |
1263 |
+ roce_set_bit(mpt_entry->byte_8_mw_cnt_en, V2_MPT_BYTE_8_L_INV_EN_S, 1); |
1264 |
++ roce_set_bit(mpt_entry->byte_8_mw_cnt_en, V2_MPT_BYTE_8_LW_EN_S, 1); |
1265 |
+ |
1266 |
+ roce_set_bit(mpt_entry->byte_12_mw_pa, V2_MPT_BYTE_12_PA_S, 0); |
1267 |
+ roce_set_bit(mpt_entry->byte_12_mw_pa, V2_MPT_BYTE_12_MR_MW_S, 1); |
1268 |
+@@ -4614,11 +4615,11 @@ static int hns_roce_v2_query_qp(struct ib_qp *ibqp, struct ib_qp_attr *qp_attr, |
1269 |
+ V2_QPC_BYTE_28_AT_M, |
1270 |
+ V2_QPC_BYTE_28_AT_S); |
1271 |
+ qp_attr->retry_cnt = roce_get_field(context.byte_212_lsn, |
1272 |
+- V2_QPC_BYTE_212_RETRY_CNT_M, |
1273 |
+- V2_QPC_BYTE_212_RETRY_CNT_S); |
1274 |
++ V2_QPC_BYTE_212_RETRY_NUM_INIT_M, |
1275 |
++ V2_QPC_BYTE_212_RETRY_NUM_INIT_S); |
1276 |
+ qp_attr->rnr_retry = roce_get_field(context.byte_244_rnr_rxack, |
1277 |
+- V2_QPC_BYTE_244_RNR_CNT_M, |
1278 |
+- V2_QPC_BYTE_244_RNR_CNT_S); |
1279 |
++ V2_QPC_BYTE_244_RNR_NUM_INIT_M, |
1280 |
++ V2_QPC_BYTE_244_RNR_NUM_INIT_S); |
1281 |
+ |
1282 |
+ done: |
1283 |
+ qp_attr->cur_qp_state = qp_attr->qp_state; |
1284 |
+diff --git a/drivers/infiniband/hw/mthca/mthca_cq.c b/drivers/infiniband/hw/mthca/mthca_cq.c |
1285 |
+index c3cfea243af8c..119b2573c9a08 100644 |
1286 |
+--- a/drivers/infiniband/hw/mthca/mthca_cq.c |
1287 |
++++ b/drivers/infiniband/hw/mthca/mthca_cq.c |
1288 |
+@@ -803,8 +803,10 @@ int mthca_init_cq(struct mthca_dev *dev, int nent, |
1289 |
+ } |
1290 |
+ |
1291 |
+ mailbox = mthca_alloc_mailbox(dev, GFP_KERNEL); |
1292 |
+- if (IS_ERR(mailbox)) |
1293 |
++ if (IS_ERR(mailbox)) { |
1294 |
++ err = PTR_ERR(mailbox); |
1295 |
+ goto err_out_arm; |
1296 |
++ } |
1297 |
+ |
1298 |
+ cq_context = mailbox->buf; |
1299 |
+ |
1300 |
+@@ -846,9 +848,9 @@ int mthca_init_cq(struct mthca_dev *dev, int nent, |
1301 |
+ } |
1302 |
+ |
1303 |
+ spin_lock_irq(&dev->cq_table.lock); |
1304 |
+- if (mthca_array_set(&dev->cq_table.cq, |
1305 |
+- cq->cqn & (dev->limits.num_cqs - 1), |
1306 |
+- cq)) { |
1307 |
++ err = mthca_array_set(&dev->cq_table.cq, |
1308 |
++ cq->cqn & (dev->limits.num_cqs - 1), cq); |
1309 |
++ if (err) { |
1310 |
+ spin_unlock_irq(&dev->cq_table.lock); |
1311 |
+ goto err_out_free_mr; |
1312 |
+ } |
1313 |
+diff --git a/drivers/input/serio/i8042.c b/drivers/input/serio/i8042.c |
1314 |
+index 20ff2bed3917a..5a89c1cfdaa97 100644 |
1315 |
+--- a/drivers/input/serio/i8042.c |
1316 |
++++ b/drivers/input/serio/i8042.c |
1317 |
+@@ -121,6 +121,7 @@ module_param_named(unmask_kbd_data, i8042_unmask_kbd_data, bool, 0600); |
1318 |
+ MODULE_PARM_DESC(unmask_kbd_data, "Unconditional enable (may reveal sensitive data) of normally sanitize-filtered kbd data traffic debug log [pre-condition: i8042.debug=1 enabled]"); |
1319 |
+ #endif |
1320 |
+ |
1321 |
++static bool i8042_present; |
1322 |
+ static bool i8042_bypass_aux_irq_test; |
1323 |
+ static char i8042_kbd_firmware_id[128]; |
1324 |
+ static char i8042_aux_firmware_id[128]; |
1325 |
+@@ -341,6 +342,9 @@ int i8042_command(unsigned char *param, int command) |
1326 |
+ unsigned long flags; |
1327 |
+ int retval; |
1328 |
+ |
1329 |
++ if (!i8042_present) |
1330 |
++ return -1; |
1331 |
++ |
1332 |
+ spin_lock_irqsave(&i8042_lock, flags); |
1333 |
+ retval = __i8042_command(param, command); |
1334 |
+ spin_unlock_irqrestore(&i8042_lock, flags); |
1335 |
+@@ -1609,12 +1613,15 @@ static int __init i8042_init(void) |
1336 |
+ |
1337 |
+ err = i8042_platform_init(); |
1338 |
+ if (err) |
1339 |
+- return err; |
1340 |
++ return (err == -ENODEV) ? 0 : err; |
1341 |
+ |
1342 |
+ err = i8042_controller_check(); |
1343 |
+ if (err) |
1344 |
+ goto err_platform_exit; |
1345 |
+ |
1346 |
++ /* Set this before creating the dev to allow i8042_command to work right away */ |
1347 |
++ i8042_present = true; |
1348 |
++ |
1349 |
+ pdev = platform_create_bundle(&i8042_driver, i8042_probe, NULL, 0, NULL, 0); |
1350 |
+ if (IS_ERR(pdev)) { |
1351 |
+ err = PTR_ERR(pdev); |
1352 |
+@@ -1633,6 +1640,9 @@ static int __init i8042_init(void) |
1353 |
+ |
1354 |
+ static void __exit i8042_exit(void) |
1355 |
+ { |
1356 |
++ if (!i8042_present) |
1357 |
++ return; |
1358 |
++ |
1359 |
+ platform_device_unregister(i8042_platform_device); |
1360 |
+ platform_driver_unregister(&i8042_driver); |
1361 |
+ i8042_platform_exit(); |
1362 |
+diff --git a/drivers/irqchip/irq-sni-exiu.c b/drivers/irqchip/irq-sni-exiu.c |
1363 |
+index 1d027623c7760..abd011fcecf4a 100644 |
1364 |
+--- a/drivers/irqchip/irq-sni-exiu.c |
1365 |
++++ b/drivers/irqchip/irq-sni-exiu.c |
1366 |
+@@ -136,7 +136,7 @@ static int exiu_domain_translate(struct irq_domain *domain, |
1367 |
+ if (fwspec->param_count != 2) |
1368 |
+ return -EINVAL; |
1369 |
+ *hwirq = fwspec->param[0]; |
1370 |
+- *type = fwspec->param[2] & IRQ_TYPE_SENSE_MASK; |
1371 |
++ *type = fwspec->param[1] & IRQ_TYPE_SENSE_MASK; |
1372 |
+ } |
1373 |
+ return 0; |
1374 |
+ } |
1375 |
+diff --git a/drivers/net/can/m_can/m_can.c b/drivers/net/can/m_can/m_can.c |
1376 |
+index 246fa2657d744..f9a2a9ecbac9e 100644 |
1377 |
+--- a/drivers/net/can/m_can/m_can.c |
1378 |
++++ b/drivers/net/can/m_can/m_can.c |
1379 |
+@@ -990,7 +990,7 @@ static const struct can_bittiming_const m_can_bittiming_const_31X = { |
1380 |
+ .name = KBUILD_MODNAME, |
1381 |
+ .tseg1_min = 2, /* Time segment 1 = prop_seg + phase_seg1 */ |
1382 |
+ .tseg1_max = 256, |
1383 |
+- .tseg2_min = 1, /* Time segment 2 = phase_seg2 */ |
1384 |
++ .tseg2_min = 2, /* Time segment 2 = phase_seg2 */ |
1385 |
+ .tseg2_max = 128, |
1386 |
+ .sjw_max = 128, |
1387 |
+ .brp_min = 1, |
1388 |
+@@ -1605,7 +1605,7 @@ static int m_can_open(struct net_device *dev) |
1389 |
+ INIT_WORK(&cdev->tx_work, m_can_tx_work_queue); |
1390 |
+ |
1391 |
+ err = request_threaded_irq(dev->irq, NULL, m_can_isr, |
1392 |
+- IRQF_ONESHOT | IRQF_TRIGGER_FALLING, |
1393 |
++ IRQF_ONESHOT, |
1394 |
+ dev->name, dev); |
1395 |
+ } else { |
1396 |
+ err = request_irq(dev->irq, m_can_isr, IRQF_SHARED, dev->name, |
1397 |
+diff --git a/drivers/net/can/usb/gs_usb.c b/drivers/net/can/usb/gs_usb.c |
1398 |
+index a4b4b742c80c3..0ad13d78815c5 100644 |
1399 |
+--- a/drivers/net/can/usb/gs_usb.c |
1400 |
++++ b/drivers/net/can/usb/gs_usb.c |
1401 |
+@@ -63,21 +63,27 @@ enum gs_can_identify_mode { |
1402 |
+ }; |
1403 |
+ |
1404 |
+ /* data types passed between host and device */ |
1405 |
++ |
1406 |
++/* The firmware on the original USB2CAN by Geschwister Schneider |
1407 |
++ * Technologie Entwicklungs- und Vertriebs UG exchanges all data |
1408 |
++ * between the host and the device in host byte order. This is done |
1409 |
++ * with the struct gs_host_config::byte_order member, which is sent |
1410 |
++ * first to indicate the desired byte order. |
1411 |
++ * |
1412 |
++ * The widely used open source firmware candleLight doesn't support |
1413 |
++ * this feature and exchanges the data in little endian byte order. |
1414 |
++ */ |
1415 |
+ struct gs_host_config { |
1416 |
+- u32 byte_order; |
1417 |
++ __le32 byte_order; |
1418 |
+ } __packed; |
1419 |
+-/* All data exchanged between host and device is exchanged in host byte order, |
1420 |
+- * thanks to the struct gs_host_config byte_order member, which is sent first |
1421 |
+- * to indicate the desired byte order. |
1422 |
+- */ |
1423 |
+ |
1424 |
+ struct gs_device_config { |
1425 |
+ u8 reserved1; |
1426 |
+ u8 reserved2; |
1427 |
+ u8 reserved3; |
1428 |
+ u8 icount; |
1429 |
+- u32 sw_version; |
1430 |
+- u32 hw_version; |
1431 |
++ __le32 sw_version; |
1432 |
++ __le32 hw_version; |
1433 |
+ } __packed; |
1434 |
+ |
1435 |
+ #define GS_CAN_MODE_NORMAL 0 |
1436 |
+@@ -87,26 +93,26 @@ struct gs_device_config { |
1437 |
+ #define GS_CAN_MODE_ONE_SHOT BIT(3) |
1438 |
+ |
1439 |
+ struct gs_device_mode { |
1440 |
+- u32 mode; |
1441 |
+- u32 flags; |
1442 |
++ __le32 mode; |
1443 |
++ __le32 flags; |
1444 |
+ } __packed; |
1445 |
+ |
1446 |
+ struct gs_device_state { |
1447 |
+- u32 state; |
1448 |
+- u32 rxerr; |
1449 |
+- u32 txerr; |
1450 |
++ __le32 state; |
1451 |
++ __le32 rxerr; |
1452 |
++ __le32 txerr; |
1453 |
+ } __packed; |
1454 |
+ |
1455 |
+ struct gs_device_bittiming { |
1456 |
+- u32 prop_seg; |
1457 |
+- u32 phase_seg1; |
1458 |
+- u32 phase_seg2; |
1459 |
+- u32 sjw; |
1460 |
+- u32 brp; |
1461 |
++ __le32 prop_seg; |
1462 |
++ __le32 phase_seg1; |
1463 |
++ __le32 phase_seg2; |
1464 |
++ __le32 sjw; |
1465 |
++ __le32 brp; |
1466 |
+ } __packed; |
1467 |
+ |
1468 |
+ struct gs_identify_mode { |
1469 |
+- u32 mode; |
1470 |
++ __le32 mode; |
1471 |
+ } __packed; |
1472 |
+ |
1473 |
+ #define GS_CAN_FEATURE_LISTEN_ONLY BIT(0) |
1474 |
+@@ -117,23 +123,23 @@ struct gs_identify_mode { |
1475 |
+ #define GS_CAN_FEATURE_IDENTIFY BIT(5) |
1476 |
+ |
1477 |
+ struct gs_device_bt_const { |
1478 |
+- u32 feature; |
1479 |
+- u32 fclk_can; |
1480 |
+- u32 tseg1_min; |
1481 |
+- u32 tseg1_max; |
1482 |
+- u32 tseg2_min; |
1483 |
+- u32 tseg2_max; |
1484 |
+- u32 sjw_max; |
1485 |
+- u32 brp_min; |
1486 |
+- u32 brp_max; |
1487 |
+- u32 brp_inc; |
1488 |
++ __le32 feature; |
1489 |
++ __le32 fclk_can; |
1490 |
++ __le32 tseg1_min; |
1491 |
++ __le32 tseg1_max; |
1492 |
++ __le32 tseg2_min; |
1493 |
++ __le32 tseg2_max; |
1494 |
++ __le32 sjw_max; |
1495 |
++ __le32 brp_min; |
1496 |
++ __le32 brp_max; |
1497 |
++ __le32 brp_inc; |
1498 |
+ } __packed; |
1499 |
+ |
1500 |
+ #define GS_CAN_FLAG_OVERFLOW 1 |
1501 |
+ |
1502 |
+ struct gs_host_frame { |
1503 |
+ u32 echo_id; |
1504 |
+- u32 can_id; |
1505 |
++ __le32 can_id; |
1506 |
+ |
1507 |
+ u8 can_dlc; |
1508 |
+ u8 channel; |
1509 |
+@@ -329,13 +335,13 @@ static void gs_usb_receive_bulk_callback(struct urb *urb) |
1510 |
+ if (!skb) |
1511 |
+ return; |
1512 |
+ |
1513 |
+- cf->can_id = hf->can_id; |
1514 |
++ cf->can_id = le32_to_cpu(hf->can_id); |
1515 |
+ |
1516 |
+ cf->can_dlc = get_can_dlc(hf->can_dlc); |
1517 |
+ memcpy(cf->data, hf->data, 8); |
1518 |
+ |
1519 |
+ /* ERROR frames tell us information about the controller */ |
1520 |
+- if (hf->can_id & CAN_ERR_FLAG) |
1521 |
++ if (le32_to_cpu(hf->can_id) & CAN_ERR_FLAG) |
1522 |
+ gs_update_state(dev, cf); |
1523 |
+ |
1524 |
+ netdev->stats.rx_packets++; |
1525 |
+@@ -418,11 +424,11 @@ static int gs_usb_set_bittiming(struct net_device *netdev) |
1526 |
+ if (!dbt) |
1527 |
+ return -ENOMEM; |
1528 |
+ |
1529 |
+- dbt->prop_seg = bt->prop_seg; |
1530 |
+- dbt->phase_seg1 = bt->phase_seg1; |
1531 |
+- dbt->phase_seg2 = bt->phase_seg2; |
1532 |
+- dbt->sjw = bt->sjw; |
1533 |
+- dbt->brp = bt->brp; |
1534 |
++ dbt->prop_seg = cpu_to_le32(bt->prop_seg); |
1535 |
++ dbt->phase_seg1 = cpu_to_le32(bt->phase_seg1); |
1536 |
++ dbt->phase_seg2 = cpu_to_le32(bt->phase_seg2); |
1537 |
++ dbt->sjw = cpu_to_le32(bt->sjw); |
1538 |
++ dbt->brp = cpu_to_le32(bt->brp); |
1539 |
+ |
1540 |
+ /* request bit timings */ |
1541 |
+ rc = usb_control_msg(interface_to_usbdev(intf), |
1542 |
+@@ -503,7 +509,7 @@ static netdev_tx_t gs_can_start_xmit(struct sk_buff *skb, |
1543 |
+ |
1544 |
+ cf = (struct can_frame *)skb->data; |
1545 |
+ |
1546 |
+- hf->can_id = cf->can_id; |
1547 |
++ hf->can_id = cpu_to_le32(cf->can_id); |
1548 |
+ hf->can_dlc = cf->can_dlc; |
1549 |
+ memcpy(hf->data, cf->data, cf->can_dlc); |
1550 |
+ |
1551 |
+@@ -573,6 +579,7 @@ static int gs_can_open(struct net_device *netdev) |
1552 |
+ int rc, i; |
1553 |
+ struct gs_device_mode *dm; |
1554 |
+ u32 ctrlmode; |
1555 |
++ u32 flags = 0; |
1556 |
+ |
1557 |
+ rc = open_candev(netdev); |
1558 |
+ if (rc) |
1559 |
+@@ -640,24 +647,24 @@ static int gs_can_open(struct net_device *netdev) |
1560 |
+ |
1561 |
+ /* flags */ |
1562 |
+ ctrlmode = dev->can.ctrlmode; |
1563 |
+- dm->flags = 0; |
1564 |
+ |
1565 |
+ if (ctrlmode & CAN_CTRLMODE_LOOPBACK) |
1566 |
+- dm->flags |= GS_CAN_MODE_LOOP_BACK; |
1567 |
++ flags |= GS_CAN_MODE_LOOP_BACK; |
1568 |
+ else if (ctrlmode & CAN_CTRLMODE_LISTENONLY) |
1569 |
+- dm->flags |= GS_CAN_MODE_LISTEN_ONLY; |
1570 |
++ flags |= GS_CAN_MODE_LISTEN_ONLY; |
1571 |
+ |
1572 |
+ /* Controller is not allowed to retry TX |
1573 |
+ * this mode is unavailable on atmels uc3c hardware |
1574 |
+ */ |
1575 |
+ if (ctrlmode & CAN_CTRLMODE_ONE_SHOT) |
1576 |
+- dm->flags |= GS_CAN_MODE_ONE_SHOT; |
1577 |
++ flags |= GS_CAN_MODE_ONE_SHOT; |
1578 |
+ |
1579 |
+ if (ctrlmode & CAN_CTRLMODE_3_SAMPLES) |
1580 |
+- dm->flags |= GS_CAN_MODE_TRIPLE_SAMPLE; |
1581 |
++ flags |= GS_CAN_MODE_TRIPLE_SAMPLE; |
1582 |
+ |
1583 |
+ /* finally start device */ |
1584 |
+- dm->mode = GS_CAN_MODE_START; |
1585 |
++ dm->mode = cpu_to_le32(GS_CAN_MODE_START); |
1586 |
++ dm->flags = cpu_to_le32(flags); |
1587 |
+ rc = usb_control_msg(interface_to_usbdev(dev->iface), |
1588 |
+ usb_sndctrlpipe(interface_to_usbdev(dev->iface), 0), |
1589 |
+ GS_USB_BREQ_MODE, |
1590 |
+@@ -737,9 +744,9 @@ static int gs_usb_set_identify(struct net_device *netdev, bool do_identify) |
1591 |
+ return -ENOMEM; |
1592 |
+ |
1593 |
+ if (do_identify) |
1594 |
+- imode->mode = GS_CAN_IDENTIFY_ON; |
1595 |
++ imode->mode = cpu_to_le32(GS_CAN_IDENTIFY_ON); |
1596 |
+ else |
1597 |
+- imode->mode = GS_CAN_IDENTIFY_OFF; |
1598 |
++ imode->mode = cpu_to_le32(GS_CAN_IDENTIFY_OFF); |
1599 |
+ |
1600 |
+ rc = usb_control_msg(interface_to_usbdev(dev->iface), |
1601 |
+ usb_sndctrlpipe(interface_to_usbdev(dev->iface), |
1602 |
+@@ -790,6 +797,7 @@ static struct gs_can *gs_make_candev(unsigned int channel, |
1603 |
+ struct net_device *netdev; |
1604 |
+ int rc; |
1605 |
+ struct gs_device_bt_const *bt_const; |
1606 |
++ u32 feature; |
1607 |
+ |
1608 |
+ bt_const = kmalloc(sizeof(*bt_const), GFP_KERNEL); |
1609 |
+ if (!bt_const) |
1610 |
+@@ -830,14 +838,14 @@ static struct gs_can *gs_make_candev(unsigned int channel, |
1611 |
+ |
1612 |
+ /* dev settup */ |
1613 |
+ strcpy(dev->bt_const.name, "gs_usb"); |
1614 |
+- dev->bt_const.tseg1_min = bt_const->tseg1_min; |
1615 |
+- dev->bt_const.tseg1_max = bt_const->tseg1_max; |
1616 |
+- dev->bt_const.tseg2_min = bt_const->tseg2_min; |
1617 |
+- dev->bt_const.tseg2_max = bt_const->tseg2_max; |
1618 |
+- dev->bt_const.sjw_max = bt_const->sjw_max; |
1619 |
+- dev->bt_const.brp_min = bt_const->brp_min; |
1620 |
+- dev->bt_const.brp_max = bt_const->brp_max; |
1621 |
+- dev->bt_const.brp_inc = bt_const->brp_inc; |
1622 |
++ dev->bt_const.tseg1_min = le32_to_cpu(bt_const->tseg1_min); |
1623 |
++ dev->bt_const.tseg1_max = le32_to_cpu(bt_const->tseg1_max); |
1624 |
++ dev->bt_const.tseg2_min = le32_to_cpu(bt_const->tseg2_min); |
1625 |
++ dev->bt_const.tseg2_max = le32_to_cpu(bt_const->tseg2_max); |
1626 |
++ dev->bt_const.sjw_max = le32_to_cpu(bt_const->sjw_max); |
1627 |
++ dev->bt_const.brp_min = le32_to_cpu(bt_const->brp_min); |
1628 |
++ dev->bt_const.brp_max = le32_to_cpu(bt_const->brp_max); |
1629 |
++ dev->bt_const.brp_inc = le32_to_cpu(bt_const->brp_inc); |
1630 |
+ |
1631 |
+ dev->udev = interface_to_usbdev(intf); |
1632 |
+ dev->iface = intf; |
1633 |
+@@ -854,28 +862,29 @@ static struct gs_can *gs_make_candev(unsigned int channel, |
1634 |
+ |
1635 |
+ /* can settup */ |
1636 |
+ dev->can.state = CAN_STATE_STOPPED; |
1637 |
+- dev->can.clock.freq = bt_const->fclk_can; |
1638 |
++ dev->can.clock.freq = le32_to_cpu(bt_const->fclk_can); |
1639 |
+ dev->can.bittiming_const = &dev->bt_const; |
1640 |
+ dev->can.do_set_bittiming = gs_usb_set_bittiming; |
1641 |
+ |
1642 |
+ dev->can.ctrlmode_supported = 0; |
1643 |
+ |
1644 |
+- if (bt_const->feature & GS_CAN_FEATURE_LISTEN_ONLY) |
1645 |
++ feature = le32_to_cpu(bt_const->feature); |
1646 |
++ if (feature & GS_CAN_FEATURE_LISTEN_ONLY) |
1647 |
+ dev->can.ctrlmode_supported |= CAN_CTRLMODE_LISTENONLY; |
1648 |
+ |
1649 |
+- if (bt_const->feature & GS_CAN_FEATURE_LOOP_BACK) |
1650 |
++ if (feature & GS_CAN_FEATURE_LOOP_BACK) |
1651 |
+ dev->can.ctrlmode_supported |= CAN_CTRLMODE_LOOPBACK; |
1652 |
+ |
1653 |
+- if (bt_const->feature & GS_CAN_FEATURE_TRIPLE_SAMPLE) |
1654 |
++ if (feature & GS_CAN_FEATURE_TRIPLE_SAMPLE) |
1655 |
+ dev->can.ctrlmode_supported |= CAN_CTRLMODE_3_SAMPLES; |
1656 |
+ |
1657 |
+- if (bt_const->feature & GS_CAN_FEATURE_ONE_SHOT) |
1658 |
++ if (feature & GS_CAN_FEATURE_ONE_SHOT) |
1659 |
+ dev->can.ctrlmode_supported |= CAN_CTRLMODE_ONE_SHOT; |
1660 |
+ |
1661 |
+ SET_NETDEV_DEV(netdev, &intf->dev); |
1662 |
+ |
1663 |
+- if (dconf->sw_version > 1) |
1664 |
+- if (bt_const->feature & GS_CAN_FEATURE_IDENTIFY) |
1665 |
++ if (le32_to_cpu(dconf->sw_version) > 1) |
1666 |
++ if (feature & GS_CAN_FEATURE_IDENTIFY) |
1667 |
+ netdev->ethtool_ops = &gs_usb_ethtool_ops; |
1668 |
+ |
1669 |
+ kfree(bt_const); |
1670 |
+@@ -910,7 +919,7 @@ static int gs_usb_probe(struct usb_interface *intf, |
1671 |
+ if (!hconf) |
1672 |
+ return -ENOMEM; |
1673 |
+ |
1674 |
+- hconf->byte_order = 0x0000beef; |
1675 |
++ hconf->byte_order = cpu_to_le32(0x0000beef); |
1676 |
+ |
1677 |
+ /* send host config */ |
1678 |
+ rc = usb_control_msg(interface_to_usbdev(intf), |
1679 |
+diff --git a/drivers/net/dsa/mv88e6xxx/chip.c b/drivers/net/dsa/mv88e6xxx/chip.c |
1680 |
+index 92e4d140df6fa..469b155df4885 100644 |
1681 |
+--- a/drivers/net/dsa/mv88e6xxx/chip.c |
1682 |
++++ b/drivers/net/dsa/mv88e6xxx/chip.c |
1683 |
+@@ -2143,6 +2143,8 @@ static void mv88e6xxx_hardware_reset(struct mv88e6xxx_chip *chip) |
1684 |
+ usleep_range(10000, 20000); |
1685 |
+ gpiod_set_value_cansleep(gpiod, 0); |
1686 |
+ usleep_range(10000, 20000); |
1687 |
++ |
1688 |
++ mv88e6xxx_g1_wait_eeprom_done(chip); |
1689 |
+ } |
1690 |
+ } |
1691 |
+ |
1692 |
+diff --git a/drivers/net/dsa/mv88e6xxx/global1.c b/drivers/net/dsa/mv88e6xxx/global1.c |
1693 |
+index 8a903624fdd7c..938dd146629f1 100644 |
1694 |
+--- a/drivers/net/dsa/mv88e6xxx/global1.c |
1695 |
++++ b/drivers/net/dsa/mv88e6xxx/global1.c |
1696 |
+@@ -75,6 +75,37 @@ static int mv88e6xxx_g1_wait_init_ready(struct mv88e6xxx_chip *chip) |
1697 |
+ return mv88e6xxx_g1_wait_bit(chip, MV88E6XXX_G1_STS, bit, 1); |
1698 |
+ } |
1699 |
+ |
1700 |
++void mv88e6xxx_g1_wait_eeprom_done(struct mv88e6xxx_chip *chip) |
1701 |
++{ |
1702 |
++ const unsigned long timeout = jiffies + 1 * HZ; |
1703 |
++ u16 val; |
1704 |
++ int err; |
1705 |
++ |
1706 |
++ /* Wait up to 1 second for the switch to finish reading the |
1707 |
++ * EEPROM. |
1708 |
++ */ |
1709 |
++ while (time_before(jiffies, timeout)) { |
1710 |
++ err = mv88e6xxx_g1_read(chip, MV88E6XXX_G1_STS, &val); |
1711 |
++ if (err) { |
1712 |
++ dev_err(chip->dev, "Error reading status"); |
1713 |
++ return; |
1714 |
++ } |
1715 |
++ |
1716 |
++ /* If the switch is still resetting, it may not |
1717 |
++ * respond on the bus, and so MDIO read returns |
1718 |
++ * 0xffff. Differentiate between that, and waiting for |
1719 |
++ * the EEPROM to be done by bit 0 being set. |
1720 |
++ */ |
1721 |
++ if (val != 0xffff && |
1722 |
++ val & BIT(MV88E6XXX_G1_STS_IRQ_EEPROM_DONE)) |
1723 |
++ return; |
1724 |
++ |
1725 |
++ usleep_range(1000, 2000); |
1726 |
++ } |
1727 |
++ |
1728 |
++ dev_err(chip->dev, "Timeout waiting for EEPROM done"); |
1729 |
++} |
1730 |
++ |
1731 |
+ /* Offset 0x01: Switch MAC Address Register Bytes 0 & 1 |
1732 |
+ * Offset 0x02: Switch MAC Address Register Bytes 2 & 3 |
1733 |
+ * Offset 0x03: Switch MAC Address Register Bytes 4 & 5 |
1734 |
+diff --git a/drivers/net/dsa/mv88e6xxx/global1.h b/drivers/net/dsa/mv88e6xxx/global1.h |
1735 |
+index 0ae96a1e919b6..08d66ef6aace6 100644 |
1736 |
+--- a/drivers/net/dsa/mv88e6xxx/global1.h |
1737 |
++++ b/drivers/net/dsa/mv88e6xxx/global1.h |
1738 |
+@@ -277,6 +277,7 @@ int mv88e6xxx_g1_set_switch_mac(struct mv88e6xxx_chip *chip, u8 *addr); |
1739 |
+ int mv88e6185_g1_reset(struct mv88e6xxx_chip *chip); |
1740 |
+ int mv88e6352_g1_reset(struct mv88e6xxx_chip *chip); |
1741 |
+ int mv88e6250_g1_reset(struct mv88e6xxx_chip *chip); |
1742 |
++void mv88e6xxx_g1_wait_eeprom_done(struct mv88e6xxx_chip *chip); |
1743 |
+ |
1744 |
+ int mv88e6185_g1_ppu_enable(struct mv88e6xxx_chip *chip); |
1745 |
+ int mv88e6185_g1_ppu_disable(struct mv88e6xxx_chip *chip); |
1746 |
+diff --git a/drivers/net/ethernet/amazon/ena/ena_netdev.c b/drivers/net/ethernet/amazon/ena/ena_netdev.c |
1747 |
+index 635345bced313..2e5348ec2a2e9 100644 |
1748 |
+--- a/drivers/net/ethernet/amazon/ena/ena_netdev.c |
1749 |
++++ b/drivers/net/ethernet/amazon/ena/ena_netdev.c |
1750 |
+@@ -2622,16 +2622,9 @@ static int ena_device_init(struct ena_com_dev *ena_dev, struct pci_dev *pdev, |
1751 |
+ goto err_mmio_read_less; |
1752 |
+ } |
1753 |
+ |
1754 |
+- rc = pci_set_dma_mask(pdev, DMA_BIT_MASK(dma_width)); |
1755 |
++ rc = dma_set_mask_and_coherent(dev, DMA_BIT_MASK(dma_width)); |
1756 |
+ if (rc) { |
1757 |
+- dev_err(dev, "pci_set_dma_mask failed 0x%x\n", rc); |
1758 |
+- goto err_mmio_read_less; |
1759 |
+- } |
1760 |
+- |
1761 |
+- rc = pci_set_consistent_dma_mask(pdev, DMA_BIT_MASK(dma_width)); |
1762 |
+- if (rc) { |
1763 |
+- dev_err(dev, "err_pci_set_consistent_dma_mask failed 0x%x\n", |
1764 |
+- rc); |
1765 |
++ dev_err(dev, "dma_set_mask_and_coherent failed %d\n", rc); |
1766 |
+ goto err_mmio_read_less; |
1767 |
+ } |
1768 |
+ |
1769 |
+@@ -3450,6 +3443,12 @@ static int ena_probe(struct pci_dev *pdev, const struct pci_device_id *ent) |
1770 |
+ return rc; |
1771 |
+ } |
1772 |
+ |
1773 |
++ rc = dma_set_mask_and_coherent(&pdev->dev, DMA_BIT_MASK(ENA_MAX_PHYS_ADDR_SIZE_BITS)); |
1774 |
++ if (rc) { |
1775 |
++ dev_err(&pdev->dev, "dma_set_mask_and_coherent failed %d\n", rc); |
1776 |
++ goto err_disable_device; |
1777 |
++ } |
1778 |
++ |
1779 |
+ pci_set_master(pdev); |
1780 |
+ |
1781 |
+ ena_dev = vzalloc(sizeof(*ena_dev)); |
1782 |
+diff --git a/drivers/net/ethernet/broadcom/bnxt/bnxt.c b/drivers/net/ethernet/broadcom/bnxt/bnxt.c |
1783 |
+index 6f777e9b4b936..7c8187d386756 100644 |
1784 |
+--- a/drivers/net/ethernet/broadcom/bnxt/bnxt.c |
1785 |
++++ b/drivers/net/ethernet/broadcom/bnxt/bnxt.c |
1786 |
+@@ -10826,7 +10826,8 @@ static int bnxt_init_board(struct pci_dev *pdev, struct net_device *dev) |
1787 |
+ if (dma_set_mask_and_coherent(&pdev->dev, DMA_BIT_MASK(64)) != 0 && |
1788 |
+ dma_set_mask_and_coherent(&pdev->dev, DMA_BIT_MASK(32)) != 0) { |
1789 |
+ dev_err(&pdev->dev, "System does not support DMA, aborting\n"); |
1790 |
+- goto init_err_disable; |
1791 |
++ rc = -EIO; |
1792 |
++ goto init_err_release; |
1793 |
+ } |
1794 |
+ |
1795 |
+ pci_set_master(pdev); |
1796 |
+@@ -11892,6 +11893,7 @@ static int bnxt_init_one(struct pci_dev *pdev, const struct pci_device_id *ent) |
1797 |
+ create_singlethread_workqueue("bnxt_pf_wq"); |
1798 |
+ if (!bnxt_pf_wq) { |
1799 |
+ dev_err(&pdev->dev, "Unable to create workqueue.\n"); |
1800 |
++ rc = -ENOMEM; |
1801 |
+ goto init_err_pci_clean; |
1802 |
+ } |
1803 |
+ } |
1804 |
+diff --git a/drivers/net/ethernet/chelsio/cxgb4/cxgb4_filter.c b/drivers/net/ethernet/chelsio/cxgb4/cxgb4_filter.c |
1805 |
+index 202af8dc79662..cb50b41cd3df2 100644 |
1806 |
+--- a/drivers/net/ethernet/chelsio/cxgb4/cxgb4_filter.c |
1807 |
++++ b/drivers/net/ethernet/chelsio/cxgb4/cxgb4_filter.c |
1808 |
+@@ -630,7 +630,8 @@ int set_filter_wr(struct adapter *adapter, int fidx) |
1809 |
+ FW_FILTER_WR_OVLAN_VLD_V(f->fs.val.ovlan_vld) | |
1810 |
+ FW_FILTER_WR_IVLAN_VLDM_V(f->fs.mask.ivlan_vld) | |
1811 |
+ FW_FILTER_WR_OVLAN_VLDM_V(f->fs.mask.ovlan_vld)); |
1812 |
+- fwr->smac_sel = f->smt->idx; |
1813 |
++ if (f->fs.newsmac) |
1814 |
++ fwr->smac_sel = f->smt->idx; |
1815 |
+ fwr->rx_chan_rx_rpl_iq = |
1816 |
+ htons(FW_FILTER_WR_RX_CHAN_V(0) | |
1817 |
+ FW_FILTER_WR_RX_RPL_IQ_V(adapter->sge.fw_evtq.abs_id)); |
1818 |
+diff --git a/drivers/net/ethernet/ibm/ibmvnic.c b/drivers/net/ethernet/ibm/ibmvnic.c |
1819 |
+index f357b9cbfee72..e53994ca3142c 100644 |
1820 |
+--- a/drivers/net/ethernet/ibm/ibmvnic.c |
1821 |
++++ b/drivers/net/ethernet/ibm/ibmvnic.c |
1822 |
+@@ -1994,8 +1994,11 @@ static int do_reset(struct ibmvnic_adapter *adapter, |
1823 |
+ for (i = 0; i < adapter->req_rx_queues; i++) |
1824 |
+ napi_schedule(&adapter->napi[i]); |
1825 |
+ |
1826 |
+- if (adapter->reset_reason != VNIC_RESET_FAILOVER) |
1827 |
++ if (adapter->reset_reason == VNIC_RESET_FAILOVER || |
1828 |
++ adapter->reset_reason == VNIC_RESET_MOBILITY) { |
1829 |
+ call_netdevice_notifiers(NETDEV_NOTIFY_PEERS, netdev); |
1830 |
++ call_netdevice_notifiers(NETDEV_RESEND_IGMP, netdev); |
1831 |
++ } |
1832 |
+ |
1833 |
+ rc = 0; |
1834 |
+ |
1835 |
+@@ -2065,6 +2068,9 @@ static int do_hard_reset(struct ibmvnic_adapter *adapter, |
1836 |
+ if (rc) |
1837 |
+ return IBMVNIC_OPEN_FAILED; |
1838 |
+ |
1839 |
++ call_netdevice_notifiers(NETDEV_NOTIFY_PEERS, netdev); |
1840 |
++ call_netdevice_notifiers(NETDEV_RESEND_IGMP, netdev); |
1841 |
++ |
1842 |
+ return 0; |
1843 |
+ } |
1844 |
+ |
1845 |
+@@ -2761,6 +2767,9 @@ static int reset_sub_crq_queues(struct ibmvnic_adapter *adapter) |
1846 |
+ { |
1847 |
+ int i, rc; |
1848 |
+ |
1849 |
++ if (!adapter->tx_scrq || !adapter->rx_scrq) |
1850 |
++ return -EINVAL; |
1851 |
++ |
1852 |
+ for (i = 0; i < adapter->req_tx_queues; i++) { |
1853 |
+ netdev_dbg(adapter->netdev, "Re-setting tx_scrq[%d]\n", i); |
1854 |
+ rc = reset_one_sub_crq_queue(adapter, adapter->tx_scrq[i]); |
1855 |
+@@ -4768,6 +4777,9 @@ static int ibmvnic_reset_crq(struct ibmvnic_adapter *adapter) |
1856 |
+ } while (rc == H_BUSY || H_IS_LONG_BUSY(rc)); |
1857 |
+ |
1858 |
+ /* Clean out the queue */ |
1859 |
++ if (!crq->msgs) |
1860 |
++ return -EINVAL; |
1861 |
++ |
1862 |
+ memset(crq->msgs, 0, PAGE_SIZE); |
1863 |
+ crq->cur = 0; |
1864 |
+ crq->active = false; |
1865 |
+diff --git a/drivers/net/ethernet/intel/i40e/i40e.h b/drivers/net/ethernet/intel/i40e/i40e.h |
1866 |
+index 401304d4d5536..cfe99bae8e362 100644 |
1867 |
+--- a/drivers/net/ethernet/intel/i40e/i40e.h |
1868 |
++++ b/drivers/net/ethernet/intel/i40e/i40e.h |
1869 |
+@@ -150,6 +150,7 @@ enum i40e_state_t { |
1870 |
+ __I40E_CLIENT_RESET, |
1871 |
+ __I40E_VIRTCHNL_OP_PENDING, |
1872 |
+ __I40E_RECOVERY_MODE, |
1873 |
++ __I40E_VF_RESETS_DISABLED, /* disable resets during i40e_remove */ |
1874 |
+ /* This must be last as it determines the size of the BITMAP */ |
1875 |
+ __I40E_STATE_SIZE__, |
1876 |
+ }; |
1877 |
+diff --git a/drivers/net/ethernet/intel/i40e/i40e_main.c b/drivers/net/ethernet/intel/i40e/i40e_main.c |
1878 |
+index b3c3911adfc2e..2b4327416457d 100644 |
1879 |
+--- a/drivers/net/ethernet/intel/i40e/i40e_main.c |
1880 |
++++ b/drivers/net/ethernet/intel/i40e/i40e_main.c |
1881 |
+@@ -3988,8 +3988,16 @@ static irqreturn_t i40e_intr(int irq, void *data) |
1882 |
+ } |
1883 |
+ |
1884 |
+ if (icr0 & I40E_PFINT_ICR0_VFLR_MASK) { |
1885 |
+- ena_mask &= ~I40E_PFINT_ICR0_ENA_VFLR_MASK; |
1886 |
+- set_bit(__I40E_VFLR_EVENT_PENDING, pf->state); |
1887 |
++ /* disable any further VFLR event notifications */ |
1888 |
++ if (test_bit(__I40E_VF_RESETS_DISABLED, pf->state)) { |
1889 |
++ u32 reg = rd32(hw, I40E_PFINT_ICR0_ENA); |
1890 |
++ |
1891 |
++ reg &= ~I40E_PFINT_ICR0_VFLR_MASK; |
1892 |
++ wr32(hw, I40E_PFINT_ICR0_ENA, reg); |
1893 |
++ } else { |
1894 |
++ ena_mask &= ~I40E_PFINT_ICR0_ENA_VFLR_MASK; |
1895 |
++ set_bit(__I40E_VFLR_EVENT_PENDING, pf->state); |
1896 |
++ } |
1897 |
+ } |
1898 |
+ |
1899 |
+ if (icr0 & I40E_PFINT_ICR0_GRST_MASK) { |
1900 |
+@@ -15345,6 +15353,11 @@ static void i40e_remove(struct pci_dev *pdev) |
1901 |
+ while (test_bit(__I40E_RESET_RECOVERY_PENDING, pf->state)) |
1902 |
+ usleep_range(1000, 2000); |
1903 |
+ |
1904 |
++ if (pf->flags & I40E_FLAG_SRIOV_ENABLED) { |
1905 |
++ set_bit(__I40E_VF_RESETS_DISABLED, pf->state); |
1906 |
++ i40e_free_vfs(pf); |
1907 |
++ pf->flags &= ~I40E_FLAG_SRIOV_ENABLED; |
1908 |
++ } |
1909 |
+ /* no more scheduling of any task */ |
1910 |
+ set_bit(__I40E_SUSPENDED, pf->state); |
1911 |
+ set_bit(__I40E_DOWN, pf->state); |
1912 |
+@@ -15371,11 +15384,6 @@ static void i40e_remove(struct pci_dev *pdev) |
1913 |
+ */ |
1914 |
+ i40e_notify_client_of_netdev_close(pf->vsi[pf->lan_vsi], false); |
1915 |
+ |
1916 |
+- if (pf->flags & I40E_FLAG_SRIOV_ENABLED) { |
1917 |
+- i40e_free_vfs(pf); |
1918 |
+- pf->flags &= ~I40E_FLAG_SRIOV_ENABLED; |
1919 |
+- } |
1920 |
+- |
1921 |
+ i40e_fdir_teardown(pf); |
1922 |
+ |
1923 |
+ /* If there is a switch structure or any orphans, remove them. |
1924 |
+diff --git a/drivers/net/ethernet/intel/i40e/i40e_virtchnl_pf.c b/drivers/net/ethernet/intel/i40e/i40e_virtchnl_pf.c |
1925 |
+index 38042d610f82c..09ff3f335ffa6 100644 |
1926 |
+--- a/drivers/net/ethernet/intel/i40e/i40e_virtchnl_pf.c |
1927 |
++++ b/drivers/net/ethernet/intel/i40e/i40e_virtchnl_pf.c |
1928 |
+@@ -1335,7 +1335,8 @@ static void i40e_cleanup_reset_vf(struct i40e_vf *vf) |
1929 |
+ * @vf: pointer to the VF structure |
1930 |
+ * @flr: VFLR was issued or not |
1931 |
+ * |
1932 |
+- * Returns true if the VF is reset, false otherwise. |
1933 |
++ * Returns true if the VF is in reset, resets successfully, or resets |
1934 |
++ * are disabled and false otherwise. |
1935 |
+ **/ |
1936 |
+ bool i40e_reset_vf(struct i40e_vf *vf, bool flr) |
1937 |
+ { |
1938 |
+@@ -1345,11 +1346,14 @@ bool i40e_reset_vf(struct i40e_vf *vf, bool flr) |
1939 |
+ u32 reg; |
1940 |
+ int i; |
1941 |
+ |
1942 |
++ if (test_bit(__I40E_VF_RESETS_DISABLED, pf->state)) |
1943 |
++ return true; |
1944 |
++ |
1945 |
+ /* If the VFs have been disabled, this means something else is |
1946 |
+ * resetting the VF, so we shouldn't continue. |
1947 |
+ */ |
1948 |
+ if (test_and_set_bit(__I40E_VF_DISABLE, pf->state)) |
1949 |
+- return false; |
1950 |
++ return true; |
1951 |
+ |
1952 |
+ i40e_trigger_vf_reset(vf, flr); |
1953 |
+ |
1954 |
+@@ -1513,6 +1517,15 @@ void i40e_free_vfs(struct i40e_pf *pf) |
1955 |
+ |
1956 |
+ i40e_notify_client_of_vf_enable(pf, 0); |
1957 |
+ |
1958 |
++ /* Disable IOV before freeing resources. This lets any VF drivers |
1959 |
++ * running in the host get themselves cleaned up before we yank |
1960 |
++ * the carpet out from underneath their feet. |
1961 |
++ */ |
1962 |
++ if (!pci_vfs_assigned(pf->pdev)) |
1963 |
++ pci_disable_sriov(pf->pdev); |
1964 |
++ else |
1965 |
++ dev_warn(&pf->pdev->dev, "VFs are assigned - not disabling SR-IOV\n"); |
1966 |
++ |
1967 |
+ /* Amortize wait time by stopping all VFs at the same time */ |
1968 |
+ for (i = 0; i < pf->num_alloc_vfs; i++) { |
1969 |
+ if (test_bit(I40E_VF_STATE_INIT, &pf->vf[i].vf_states)) |
1970 |
+@@ -1528,15 +1541,6 @@ void i40e_free_vfs(struct i40e_pf *pf) |
1971 |
+ i40e_vsi_wait_queues_disabled(pf->vsi[pf->vf[i].lan_vsi_idx]); |
1972 |
+ } |
1973 |
+ |
1974 |
+- /* Disable IOV before freeing resources. This lets any VF drivers |
1975 |
+- * running in the host get themselves cleaned up before we yank |
1976 |
+- * the carpet out from underneath their feet. |
1977 |
+- */ |
1978 |
+- if (!pci_vfs_assigned(pf->pdev)) |
1979 |
+- pci_disable_sriov(pf->pdev); |
1980 |
+- else |
1981 |
+- dev_warn(&pf->pdev->dev, "VFs are assigned - not disabling SR-IOV\n"); |
1982 |
+- |
1983 |
+ /* free up VF resources */ |
1984 |
+ tmp = pf->num_alloc_vfs; |
1985 |
+ pf->num_alloc_vfs = 0; |
1986 |
+diff --git a/drivers/net/wireless/intel/iwlwifi/mvm/mac80211.c b/drivers/net/wireless/intel/iwlwifi/mvm/mac80211.c |
1987 |
+index 01b26b3327b01..73b8bf0fbf16f 100644 |
1988 |
+--- a/drivers/net/wireless/intel/iwlwifi/mvm/mac80211.c |
1989 |
++++ b/drivers/net/wireless/intel/iwlwifi/mvm/mac80211.c |
1990 |
+@@ -3069,6 +3069,9 @@ static int iwl_mvm_mac_sta_state(struct ieee80211_hw *hw, |
1991 |
+ goto out_unlock; |
1992 |
+ } |
1993 |
+ |
1994 |
++ if (vif->type == NL80211_IFTYPE_STATION) |
1995 |
++ vif->bss_conf.he_support = sta->he_cap.has_he; |
1996 |
++ |
1997 |
+ if (sta->tdls && |
1998 |
+ (vif->p2p || |
1999 |
+ iwl_mvm_tdls_sta_count(mvm, NULL) == |
2000 |
+diff --git a/drivers/nfc/s3fwrn5/i2c.c b/drivers/nfc/s3fwrn5/i2c.c |
2001 |
+index e4f7fa00862de..2505abc8ef281 100644 |
2002 |
+--- a/drivers/nfc/s3fwrn5/i2c.c |
2003 |
++++ b/drivers/nfc/s3fwrn5/i2c.c |
2004 |
+@@ -26,8 +26,8 @@ struct s3fwrn5_i2c_phy { |
2005 |
+ struct i2c_client *i2c_dev; |
2006 |
+ struct nci_dev *ndev; |
2007 |
+ |
2008 |
+- unsigned int gpio_en; |
2009 |
+- unsigned int gpio_fw_wake; |
2010 |
++ int gpio_en; |
2011 |
++ int gpio_fw_wake; |
2012 |
+ |
2013 |
+ struct mutex mutex; |
2014 |
+ |
2015 |
+diff --git a/drivers/nvme/host/pci.c b/drivers/nvme/host/pci.c |
2016 |
+index f5d12bf109c78..9b1fc8633cfe1 100644 |
2017 |
+--- a/drivers/nvme/host/pci.c |
2018 |
++++ b/drivers/nvme/host/pci.c |
2019 |
+@@ -271,9 +271,21 @@ static void nvme_dbbuf_init(struct nvme_dev *dev, |
2020 |
+ nvmeq->dbbuf_cq_ei = &dev->dbbuf_eis[cq_idx(qid, dev->db_stride)]; |
2021 |
+ } |
2022 |
+ |
2023 |
++static void nvme_dbbuf_free(struct nvme_queue *nvmeq) |
2024 |
++{ |
2025 |
++ if (!nvmeq->qid) |
2026 |
++ return; |
2027 |
++ |
2028 |
++ nvmeq->dbbuf_sq_db = NULL; |
2029 |
++ nvmeq->dbbuf_cq_db = NULL; |
2030 |
++ nvmeq->dbbuf_sq_ei = NULL; |
2031 |
++ nvmeq->dbbuf_cq_ei = NULL; |
2032 |
++} |
2033 |
++ |
2034 |
+ static void nvme_dbbuf_set(struct nvme_dev *dev) |
2035 |
+ { |
2036 |
+ struct nvme_command c; |
2037 |
++ unsigned int i; |
2038 |
+ |
2039 |
+ if (!dev->dbbuf_dbs) |
2040 |
+ return; |
2041 |
+@@ -287,6 +299,9 @@ static void nvme_dbbuf_set(struct nvme_dev *dev) |
2042 |
+ dev_warn(dev->ctrl.device, "unable to set dbbuf\n"); |
2043 |
+ /* Free memory and continue on */ |
2044 |
+ nvme_dbbuf_dma_free(dev); |
2045 |
++ |
2046 |
++ for (i = 1; i <= dev->online_queues; i++) |
2047 |
++ nvme_dbbuf_free(&dev->queues[i]); |
2048 |
+ } |
2049 |
+ } |
2050 |
+ |
2051 |
+diff --git a/drivers/phy/tegra/xusb.c b/drivers/phy/tegra/xusb.c |
2052 |
+index 2ea8497af82a6..bf5d80b97597b 100644 |
2053 |
+--- a/drivers/phy/tegra/xusb.c |
2054 |
++++ b/drivers/phy/tegra/xusb.c |
2055 |
+@@ -949,6 +949,7 @@ power_down: |
2056 |
+ reset: |
2057 |
+ reset_control_assert(padctl->rst); |
2058 |
+ remove: |
2059 |
++ platform_set_drvdata(pdev, NULL); |
2060 |
+ soc->ops->remove(padctl); |
2061 |
+ return err; |
2062 |
+ } |
2063 |
+diff --git a/drivers/platform/x86/thinkpad_acpi.c b/drivers/platform/x86/thinkpad_acpi.c |
2064 |
+index abcb336a515a1..5081048f2356e 100644 |
2065 |
+--- a/drivers/platform/x86/thinkpad_acpi.c |
2066 |
++++ b/drivers/platform/x86/thinkpad_acpi.c |
2067 |
+@@ -4238,6 +4238,7 @@ static void hotkey_resume(void) |
2068 |
+ pr_err("error while attempting to reset the event firmware interface\n"); |
2069 |
+ |
2070 |
+ tpacpi_send_radiosw_update(); |
2071 |
++ tpacpi_input_send_tabletsw(); |
2072 |
+ hotkey_tablet_mode_notify_change(); |
2073 |
+ hotkey_wakeup_reason_notify_change(); |
2074 |
+ hotkey_wakeup_hotunplug_complete_notify_change(); |
2075 |
+diff --git a/drivers/platform/x86/toshiba_acpi.c b/drivers/platform/x86/toshiba_acpi.c |
2076 |
+index a1e6569427c34..71a969fc3b206 100644 |
2077 |
+--- a/drivers/platform/x86/toshiba_acpi.c |
2078 |
++++ b/drivers/platform/x86/toshiba_acpi.c |
2079 |
+@@ -1485,7 +1485,7 @@ static ssize_t video_proc_write(struct file *file, const char __user *buf, |
2080 |
+ struct toshiba_acpi_dev *dev = PDE_DATA(file_inode(file)); |
2081 |
+ char *buffer; |
2082 |
+ char *cmd; |
2083 |
+- int lcd_out, crt_out, tv_out; |
2084 |
++ int lcd_out = -1, crt_out = -1, tv_out = -1; |
2085 |
+ int remain = count; |
2086 |
+ int value; |
2087 |
+ int ret; |
2088 |
+@@ -1517,7 +1517,6 @@ static ssize_t video_proc_write(struct file *file, const char __user *buf, |
2089 |
+ |
2090 |
+ kfree(cmd); |
2091 |
+ |
2092 |
+- lcd_out = crt_out = tv_out = -1; |
2093 |
+ ret = get_video_status(dev, &video_out); |
2094 |
+ if (!ret) { |
2095 |
+ unsigned int new_video_out = video_out; |
2096 |
+diff --git a/drivers/s390/net/qeth_core.h b/drivers/s390/net/qeth_core.h |
2097 |
+index 820f2c29376c0..93b4cb156b0bc 100644 |
2098 |
+--- a/drivers/s390/net/qeth_core.h |
2099 |
++++ b/drivers/s390/net/qeth_core.h |
2100 |
+@@ -436,10 +436,13 @@ enum qeth_qdio_out_buffer_state { |
2101 |
+ QETH_QDIO_BUF_EMPTY, |
2102 |
+ /* Filled by driver; owned by hardware in order to be sent. */ |
2103 |
+ QETH_QDIO_BUF_PRIMED, |
2104 |
+- /* Identified to be pending in TPQ. */ |
2105 |
++ /* Discovered by the TX completion code: */ |
2106 |
+ QETH_QDIO_BUF_PENDING, |
2107 |
+- /* Found in completion queue. */ |
2108 |
+- QETH_QDIO_BUF_IN_CQ, |
2109 |
++ /* Finished by the TX completion code: */ |
2110 |
++ QETH_QDIO_BUF_NEED_QAOB, |
2111 |
++ /* Received QAOB notification on CQ: */ |
2112 |
++ QETH_QDIO_BUF_QAOB_OK, |
2113 |
++ QETH_QDIO_BUF_QAOB_ERROR, |
2114 |
+ /* Handled via transfer pending / completion queue. */ |
2115 |
+ QETH_QDIO_BUF_HANDLED_DELAYED, |
2116 |
+ }; |
2117 |
+diff --git a/drivers/s390/net/qeth_core_main.c b/drivers/s390/net/qeth_core_main.c |
2118 |
+index 5043f0fcf399a..fad1c46d4b0e1 100644 |
2119 |
+--- a/drivers/s390/net/qeth_core_main.c |
2120 |
++++ b/drivers/s390/net/qeth_core_main.c |
2121 |
+@@ -31,6 +31,7 @@ |
2122 |
+ |
2123 |
+ #include <net/iucv/af_iucv.h> |
2124 |
+ #include <net/dsfield.h> |
2125 |
++#include <net/sock.h> |
2126 |
+ |
2127 |
+ #include <asm/ebcdic.h> |
2128 |
+ #include <asm/chpid.h> |
2129 |
+@@ -425,18 +426,13 @@ static void qeth_cleanup_handled_pending(struct qeth_qdio_out_q *q, int bidx, |
2130 |
+ |
2131 |
+ } |
2132 |
+ } |
2133 |
+- if (forced_cleanup && (atomic_read(&(q->bufs[bidx]->state)) == |
2134 |
+- QETH_QDIO_BUF_HANDLED_DELAYED)) { |
2135 |
+- /* for recovery situations */ |
2136 |
+- qeth_init_qdio_out_buf(q, bidx); |
2137 |
+- QETH_CARD_TEXT(q->card, 2, "clprecov"); |
2138 |
+- } |
2139 |
+ } |
2140 |
+ |
2141 |
+ |
2142 |
+ static void qeth_qdio_handle_aob(struct qeth_card *card, |
2143 |
+ unsigned long phys_aob_addr) |
2144 |
+ { |
2145 |
++ enum qeth_qdio_out_buffer_state new_state = QETH_QDIO_BUF_QAOB_OK; |
2146 |
+ struct qaob *aob; |
2147 |
+ struct qeth_qdio_out_buffer *buffer; |
2148 |
+ enum iucv_tx_notify notification; |
2149 |
+@@ -448,22 +444,6 @@ static void qeth_qdio_handle_aob(struct qeth_card *card, |
2150 |
+ buffer = (struct qeth_qdio_out_buffer *) aob->user1; |
2151 |
+ QETH_CARD_TEXT_(card, 5, "%lx", aob->user1); |
2152 |
+ |
2153 |
+- if (atomic_cmpxchg(&buffer->state, QETH_QDIO_BUF_PRIMED, |
2154 |
+- QETH_QDIO_BUF_IN_CQ) == QETH_QDIO_BUF_PRIMED) { |
2155 |
+- notification = TX_NOTIFY_OK; |
2156 |
+- } else { |
2157 |
+- WARN_ON_ONCE(atomic_read(&buffer->state) != |
2158 |
+- QETH_QDIO_BUF_PENDING); |
2159 |
+- atomic_set(&buffer->state, QETH_QDIO_BUF_IN_CQ); |
2160 |
+- notification = TX_NOTIFY_DELAYED_OK; |
2161 |
+- } |
2162 |
+- |
2163 |
+- if (aob->aorc != 0) { |
2164 |
+- QETH_CARD_TEXT_(card, 2, "aorc%02X", aob->aorc); |
2165 |
+- notification = qeth_compute_cq_notification(aob->aorc, 1); |
2166 |
+- } |
2167 |
+- qeth_notify_skbs(buffer->q, buffer, notification); |
2168 |
+- |
2169 |
+ /* Free dangling allocations. The attached skbs are handled by |
2170 |
+ * qeth_cleanup_handled_pending(). |
2171 |
+ */ |
2172 |
+@@ -474,7 +454,33 @@ static void qeth_qdio_handle_aob(struct qeth_card *card, |
2173 |
+ kmem_cache_free(qeth_core_header_cache, |
2174 |
+ (void *) aob->sba[i]); |
2175 |
+ } |
2176 |
+- atomic_set(&buffer->state, QETH_QDIO_BUF_HANDLED_DELAYED); |
2177 |
++ |
2178 |
++ if (aob->aorc) { |
2179 |
++ QETH_CARD_TEXT_(card, 2, "aorc%02X", aob->aorc); |
2180 |
++ new_state = QETH_QDIO_BUF_QAOB_ERROR; |
2181 |
++ } |
2182 |
++ |
2183 |
++ switch (atomic_xchg(&buffer->state, new_state)) { |
2184 |
++ case QETH_QDIO_BUF_PRIMED: |
2185 |
++ /* Faster than TX completion code. */ |
2186 |
++ notification = qeth_compute_cq_notification(aob->aorc, 0); |
2187 |
++ qeth_notify_skbs(buffer->q, buffer, notification); |
2188 |
++ atomic_set(&buffer->state, QETH_QDIO_BUF_HANDLED_DELAYED); |
2189 |
++ break; |
2190 |
++ case QETH_QDIO_BUF_PENDING: |
2191 |
++ /* TX completion code is active and will handle the async |
2192 |
++ * completion for us. |
2193 |
++ */ |
2194 |
++ break; |
2195 |
++ case QETH_QDIO_BUF_NEED_QAOB: |
2196 |
++ /* TX completion code is already finished. */ |
2197 |
++ notification = qeth_compute_cq_notification(aob->aorc, 1); |
2198 |
++ qeth_notify_skbs(buffer->q, buffer, notification); |
2199 |
++ atomic_set(&buffer->state, QETH_QDIO_BUF_HANDLED_DELAYED); |
2200 |
++ break; |
2201 |
++ default: |
2202 |
++ WARN_ON_ONCE(1); |
2203 |
++ } |
2204 |
+ |
2205 |
+ qdio_release_aob(aob); |
2206 |
+ } |
2207 |
+@@ -1083,7 +1089,7 @@ static void qeth_notify_skbs(struct qeth_qdio_out_q *q, |
2208 |
+ skb_queue_walk(&buf->skb_list, skb) { |
2209 |
+ QETH_CARD_TEXT_(q->card, 5, "skbn%d", notification); |
2210 |
+ QETH_CARD_TEXT_(q->card, 5, "%lx", (long) skb); |
2211 |
+- if (skb->protocol == htons(ETH_P_AF_IUCV) && skb->sk) |
2212 |
++ if (skb->sk && skb->sk->sk_family == PF_IUCV) |
2213 |
+ iucv_sk(skb->sk)->sk_txnotify(skb, notification); |
2214 |
+ } |
2215 |
+ } |
2216 |
+@@ -1094,9 +1100,6 @@ static void qeth_tx_complete_buf(struct qeth_qdio_out_buffer *buf, bool error, |
2217 |
+ struct qeth_qdio_out_q *queue = buf->q; |
2218 |
+ struct sk_buff *skb; |
2219 |
+ |
2220 |
+- /* release may never happen from within CQ tasklet scope */ |
2221 |
+- WARN_ON_ONCE(atomic_read(&buf->state) == QETH_QDIO_BUF_IN_CQ); |
2222 |
+- |
2223 |
+ if (atomic_read(&buf->state) == QETH_QDIO_BUF_PENDING) |
2224 |
+ qeth_notify_skbs(queue, buf, TX_NOTIFY_GENERALERROR); |
2225 |
+ |
2226 |
+@@ -5223,9 +5226,32 @@ static void qeth_iqd_tx_complete(struct qeth_qdio_out_q *queue, |
2227 |
+ |
2228 |
+ if (atomic_cmpxchg(&buffer->state, QETH_QDIO_BUF_PRIMED, |
2229 |
+ QETH_QDIO_BUF_PENDING) == |
2230 |
+- QETH_QDIO_BUF_PRIMED) |
2231 |
++ QETH_QDIO_BUF_PRIMED) { |
2232 |
+ qeth_notify_skbs(queue, buffer, TX_NOTIFY_PENDING); |
2233 |
+ |
2234 |
++ /* Handle race with qeth_qdio_handle_aob(): */ |
2235 |
++ switch (atomic_xchg(&buffer->state, |
2236 |
++ QETH_QDIO_BUF_NEED_QAOB)) { |
2237 |
++ case QETH_QDIO_BUF_PENDING: |
2238 |
++ /* No concurrent QAOB notification. */ |
2239 |
++ break; |
2240 |
++ case QETH_QDIO_BUF_QAOB_OK: |
2241 |
++ qeth_notify_skbs(queue, buffer, |
2242 |
++ TX_NOTIFY_DELAYED_OK); |
2243 |
++ atomic_set(&buffer->state, |
2244 |
++ QETH_QDIO_BUF_HANDLED_DELAYED); |
2245 |
++ break; |
2246 |
++ case QETH_QDIO_BUF_QAOB_ERROR: |
2247 |
++ qeth_notify_skbs(queue, buffer, |
2248 |
++ TX_NOTIFY_DELAYED_GENERALERROR); |
2249 |
++ atomic_set(&buffer->state, |
2250 |
++ QETH_QDIO_BUF_HANDLED_DELAYED); |
2251 |
++ break; |
2252 |
++ default: |
2253 |
++ WARN_ON_ONCE(1); |
2254 |
++ } |
2255 |
++ } |
2256 |
++ |
2257 |
+ QETH_CARD_TEXT_(card, 5, "pel%u", bidx); |
2258 |
+ |
2259 |
+ /* prepare the queue slot for re-use: */ |
2260 |
+diff --git a/drivers/scsi/libiscsi.c b/drivers/scsi/libiscsi.c |
2261 |
+index 70b99c0e2e678..f954be3d5ee22 100644 |
2262 |
+--- a/drivers/scsi/libiscsi.c |
2263 |
++++ b/drivers/scsi/libiscsi.c |
2264 |
+@@ -533,8 +533,8 @@ static void iscsi_complete_task(struct iscsi_task *task, int state) |
2265 |
+ if (conn->task == task) |
2266 |
+ conn->task = NULL; |
2267 |
+ |
2268 |
+- if (conn->ping_task == task) |
2269 |
+- conn->ping_task = NULL; |
2270 |
++ if (READ_ONCE(conn->ping_task) == task) |
2271 |
++ WRITE_ONCE(conn->ping_task, NULL); |
2272 |
+ |
2273 |
+ /* release get from queueing */ |
2274 |
+ __iscsi_put_task(task); |
2275 |
+@@ -738,6 +738,9 @@ __iscsi_conn_send_pdu(struct iscsi_conn *conn, struct iscsi_hdr *hdr, |
2276 |
+ task->conn->session->age); |
2277 |
+ } |
2278 |
+ |
2279 |
++ if (unlikely(READ_ONCE(conn->ping_task) == INVALID_SCSI_TASK)) |
2280 |
++ WRITE_ONCE(conn->ping_task, task); |
2281 |
++ |
2282 |
+ if (!ihost->workq) { |
2283 |
+ if (iscsi_prep_mgmt_task(conn, task)) |
2284 |
+ goto free_task; |
2285 |
+@@ -941,8 +944,11 @@ static int iscsi_send_nopout(struct iscsi_conn *conn, struct iscsi_nopin *rhdr) |
2286 |
+ struct iscsi_nopout hdr; |
2287 |
+ struct iscsi_task *task; |
2288 |
+ |
2289 |
+- if (!rhdr && conn->ping_task) |
2290 |
+- return -EINVAL; |
2291 |
++ if (!rhdr) { |
2292 |
++ if (READ_ONCE(conn->ping_task)) |
2293 |
++ return -EINVAL; |
2294 |
++ WRITE_ONCE(conn->ping_task, INVALID_SCSI_TASK); |
2295 |
++ } |
2296 |
+ |
2297 |
+ memset(&hdr, 0, sizeof(struct iscsi_nopout)); |
2298 |
+ hdr.opcode = ISCSI_OP_NOOP_OUT | ISCSI_OP_IMMEDIATE; |
2299 |
+@@ -957,11 +963,12 @@ static int iscsi_send_nopout(struct iscsi_conn *conn, struct iscsi_nopin *rhdr) |
2300 |
+ |
2301 |
+ task = __iscsi_conn_send_pdu(conn, (struct iscsi_hdr *)&hdr, NULL, 0); |
2302 |
+ if (!task) { |
2303 |
++ if (!rhdr) |
2304 |
++ WRITE_ONCE(conn->ping_task, NULL); |
2305 |
+ iscsi_conn_printk(KERN_ERR, conn, "Could not send nopout\n"); |
2306 |
+ return -EIO; |
2307 |
+ } else if (!rhdr) { |
2308 |
+ /* only track our nops */ |
2309 |
+- conn->ping_task = task; |
2310 |
+ conn->last_ping = jiffies; |
2311 |
+ } |
2312 |
+ |
2313 |
+@@ -984,7 +991,7 @@ static int iscsi_nop_out_rsp(struct iscsi_task *task, |
2314 |
+ struct iscsi_conn *conn = task->conn; |
2315 |
+ int rc = 0; |
2316 |
+ |
2317 |
+- if (conn->ping_task != task) { |
2318 |
++ if (READ_ONCE(conn->ping_task) != task) { |
2319 |
+ /* |
2320 |
+ * If this is not in response to one of our |
2321 |
+ * nops then it must be from userspace. |
2322 |
+@@ -1923,7 +1930,7 @@ static void iscsi_start_tx(struct iscsi_conn *conn) |
2323 |
+ */ |
2324 |
+ static int iscsi_has_ping_timed_out(struct iscsi_conn *conn) |
2325 |
+ { |
2326 |
+- if (conn->ping_task && |
2327 |
++ if (READ_ONCE(conn->ping_task) && |
2328 |
+ time_before_eq(conn->last_recv + (conn->recv_timeout * HZ) + |
2329 |
+ (conn->ping_timeout * HZ), jiffies)) |
2330 |
+ return 1; |
2331 |
+@@ -2058,7 +2065,7 @@ enum blk_eh_timer_return iscsi_eh_cmd_timed_out(struct scsi_cmnd *sc) |
2332 |
+ * Checking the transport already or nop from a cmd timeout still |
2333 |
+ * running |
2334 |
+ */ |
2335 |
+- if (conn->ping_task) { |
2336 |
++ if (READ_ONCE(conn->ping_task)) { |
2337 |
+ task->have_checked_conn = true; |
2338 |
+ rc = BLK_EH_RESET_TIMER; |
2339 |
+ goto done; |
2340 |
+diff --git a/drivers/scsi/ufs/ufshcd.c b/drivers/scsi/ufs/ufshcd.c |
2341 |
+index 0772327f87d93..b6ce880ddd153 100644 |
2342 |
+--- a/drivers/scsi/ufs/ufshcd.c |
2343 |
++++ b/drivers/scsi/ufs/ufshcd.c |
2344 |
+@@ -8160,11 +8160,7 @@ int ufshcd_shutdown(struct ufs_hba *hba) |
2345 |
+ if (ufshcd_is_ufs_dev_poweroff(hba) && ufshcd_is_link_off(hba)) |
2346 |
+ goto out; |
2347 |
+ |
2348 |
+- if (pm_runtime_suspended(hba->dev)) { |
2349 |
+- ret = ufshcd_runtime_resume(hba); |
2350 |
+- if (ret) |
2351 |
+- goto out; |
2352 |
+- } |
2353 |
++ pm_runtime_get_sync(hba->dev); |
2354 |
+ |
2355 |
+ ret = ufshcd_suspend(hba, UFS_SHUTDOWN_PM); |
2356 |
+ out: |
2357 |
+diff --git a/drivers/spi/spi-bcm-qspi.c b/drivers/spi/spi-bcm-qspi.c |
2358 |
+index d0afe0b1599fd..8a4be34bccfd2 100644 |
2359 |
+--- a/drivers/spi/spi-bcm-qspi.c |
2360 |
++++ b/drivers/spi/spi-bcm-qspi.c |
2361 |
+@@ -1213,7 +1213,7 @@ int bcm_qspi_probe(struct platform_device *pdev, |
2362 |
+ if (!of_match_node(bcm_qspi_of_match, dev->of_node)) |
2363 |
+ return -ENODEV; |
2364 |
+ |
2365 |
+- master = spi_alloc_master(dev, sizeof(struct bcm_qspi)); |
2366 |
++ master = devm_spi_alloc_master(dev, sizeof(struct bcm_qspi)); |
2367 |
+ if (!master) { |
2368 |
+ dev_err(dev, "error allocating spi_master\n"); |
2369 |
+ return -ENOMEM; |
2370 |
+@@ -1252,21 +1252,17 @@ int bcm_qspi_probe(struct platform_device *pdev, |
2371 |
+ |
2372 |
+ if (res) { |
2373 |
+ qspi->base[MSPI] = devm_ioremap_resource(dev, res); |
2374 |
+- if (IS_ERR(qspi->base[MSPI])) { |
2375 |
+- ret = PTR_ERR(qspi->base[MSPI]); |
2376 |
+- goto qspi_resource_err; |
2377 |
+- } |
2378 |
++ if (IS_ERR(qspi->base[MSPI])) |
2379 |
++ return PTR_ERR(qspi->base[MSPI]); |
2380 |
+ } else { |
2381 |
+- goto qspi_resource_err; |
2382 |
++ return 0; |
2383 |
+ } |
2384 |
+ |
2385 |
+ res = platform_get_resource_byname(pdev, IORESOURCE_MEM, "bspi"); |
2386 |
+ if (res) { |
2387 |
+ qspi->base[BSPI] = devm_ioremap_resource(dev, res); |
2388 |
+- if (IS_ERR(qspi->base[BSPI])) { |
2389 |
+- ret = PTR_ERR(qspi->base[BSPI]); |
2390 |
+- goto qspi_resource_err; |
2391 |
+- } |
2392 |
++ if (IS_ERR(qspi->base[BSPI])) |
2393 |
++ return PTR_ERR(qspi->base[BSPI]); |
2394 |
+ qspi->bspi_mode = true; |
2395 |
+ } else { |
2396 |
+ qspi->bspi_mode = false; |
2397 |
+@@ -1277,18 +1273,14 @@ int bcm_qspi_probe(struct platform_device *pdev, |
2398 |
+ res = platform_get_resource_byname(pdev, IORESOURCE_MEM, "cs_reg"); |
2399 |
+ if (res) { |
2400 |
+ qspi->base[CHIP_SELECT] = devm_ioremap_resource(dev, res); |
2401 |
+- if (IS_ERR(qspi->base[CHIP_SELECT])) { |
2402 |
+- ret = PTR_ERR(qspi->base[CHIP_SELECT]); |
2403 |
+- goto qspi_resource_err; |
2404 |
+- } |
2405 |
++ if (IS_ERR(qspi->base[CHIP_SELECT])) |
2406 |
++ return PTR_ERR(qspi->base[CHIP_SELECT]); |
2407 |
+ } |
2408 |
+ |
2409 |
+ qspi->dev_ids = kcalloc(num_irqs, sizeof(struct bcm_qspi_dev_id), |
2410 |
+ GFP_KERNEL); |
2411 |
+- if (!qspi->dev_ids) { |
2412 |
+- ret = -ENOMEM; |
2413 |
+- goto qspi_resource_err; |
2414 |
+- } |
2415 |
++ if (!qspi->dev_ids) |
2416 |
++ return -ENOMEM; |
2417 |
+ |
2418 |
+ for (val = 0; val < num_irqs; val++) { |
2419 |
+ irq = -1; |
2420 |
+@@ -1357,7 +1349,7 @@ int bcm_qspi_probe(struct platform_device *pdev, |
2421 |
+ qspi->xfer_mode.addrlen = -1; |
2422 |
+ qspi->xfer_mode.hp = -1; |
2423 |
+ |
2424 |
+- ret = devm_spi_register_master(&pdev->dev, master); |
2425 |
++ ret = spi_register_master(master); |
2426 |
+ if (ret < 0) { |
2427 |
+ dev_err(dev, "can't register master\n"); |
2428 |
+ goto qspi_reg_err; |
2429 |
+@@ -1370,8 +1362,6 @@ qspi_reg_err: |
2430 |
+ clk_disable_unprepare(qspi->clk); |
2431 |
+ qspi_probe_err: |
2432 |
+ kfree(qspi->dev_ids); |
2433 |
+-qspi_resource_err: |
2434 |
+- spi_master_put(master); |
2435 |
+ return ret; |
2436 |
+ } |
2437 |
+ /* probe function to be called by SoC specific platform driver probe */ |
2438 |
+@@ -1381,10 +1371,10 @@ int bcm_qspi_remove(struct platform_device *pdev) |
2439 |
+ { |
2440 |
+ struct bcm_qspi *qspi = platform_get_drvdata(pdev); |
2441 |
+ |
2442 |
++ spi_unregister_master(qspi->master); |
2443 |
+ bcm_qspi_hw_uninit(qspi); |
2444 |
+ clk_disable_unprepare(qspi->clk); |
2445 |
+ kfree(qspi->dev_ids); |
2446 |
+- spi_unregister_master(qspi->master); |
2447 |
+ |
2448 |
+ return 0; |
2449 |
+ } |
2450 |
+diff --git a/drivers/spi/spi-bcm2835.c b/drivers/spi/spi-bcm2835.c |
2451 |
+index 9ae1c96f4d3d4..5bc97b22491cd 100644 |
2452 |
+--- a/drivers/spi/spi-bcm2835.c |
2453 |
++++ b/drivers/spi/spi-bcm2835.c |
2454 |
+@@ -1264,7 +1264,7 @@ static int bcm2835_spi_probe(struct platform_device *pdev) |
2455 |
+ struct bcm2835_spi *bs; |
2456 |
+ int err; |
2457 |
+ |
2458 |
+- ctlr = spi_alloc_master(&pdev->dev, ALIGN(sizeof(*bs), |
2459 |
++ ctlr = devm_spi_alloc_master(&pdev->dev, ALIGN(sizeof(*bs), |
2460 |
+ dma_get_cache_alignment())); |
2461 |
+ if (!ctlr) |
2462 |
+ return -ENOMEM; |
2463 |
+@@ -1284,23 +1284,19 @@ static int bcm2835_spi_probe(struct platform_device *pdev) |
2464 |
+ bs = spi_controller_get_devdata(ctlr); |
2465 |
+ |
2466 |
+ bs->regs = devm_platform_ioremap_resource(pdev, 0); |
2467 |
+- if (IS_ERR(bs->regs)) { |
2468 |
+- err = PTR_ERR(bs->regs); |
2469 |
+- goto out_controller_put; |
2470 |
+- } |
2471 |
++ if (IS_ERR(bs->regs)) |
2472 |
++ return PTR_ERR(bs->regs); |
2473 |
+ |
2474 |
+ bs->clk = devm_clk_get(&pdev->dev, NULL); |
2475 |
+ if (IS_ERR(bs->clk)) { |
2476 |
+ err = PTR_ERR(bs->clk); |
2477 |
+ dev_err(&pdev->dev, "could not get clk: %d\n", err); |
2478 |
+- goto out_controller_put; |
2479 |
++ return err; |
2480 |
+ } |
2481 |
+ |
2482 |
+ bs->irq = platform_get_irq(pdev, 0); |
2483 |
+- if (bs->irq <= 0) { |
2484 |
+- err = bs->irq ? bs->irq : -ENODEV; |
2485 |
+- goto out_controller_put; |
2486 |
+- } |
2487 |
++ if (bs->irq <= 0) |
2488 |
++ return bs->irq ? bs->irq : -ENODEV; |
2489 |
+ |
2490 |
+ clk_prepare_enable(bs->clk); |
2491 |
+ |
2492 |
+@@ -1330,8 +1326,6 @@ static int bcm2835_spi_probe(struct platform_device *pdev) |
2493 |
+ |
2494 |
+ out_clk_disable: |
2495 |
+ clk_disable_unprepare(bs->clk); |
2496 |
+-out_controller_put: |
2497 |
+- spi_controller_put(ctlr); |
2498 |
+ return err; |
2499 |
+ } |
2500 |
+ |
2501 |
+diff --git a/drivers/spi/spi-bcm2835aux.c b/drivers/spi/spi-bcm2835aux.c |
2502 |
+index 1e5aac1581aa4..8211107bfbe82 100644 |
2503 |
+--- a/drivers/spi/spi-bcm2835aux.c |
2504 |
++++ b/drivers/spi/spi-bcm2835aux.c |
2505 |
+@@ -529,8 +529,9 @@ static int bcm2835aux_spi_probe(struct platform_device *pdev) |
2506 |
+ |
2507 |
+ bs->clk = devm_clk_get(&pdev->dev, NULL); |
2508 |
+ if (IS_ERR(bs->clk)) { |
2509 |
++ err = PTR_ERR(bs->clk); |
2510 |
+ dev_err(&pdev->dev, "could not get clk: %d\n", err); |
2511 |
+- return PTR_ERR(bs->clk); |
2512 |
++ return err; |
2513 |
+ } |
2514 |
+ |
2515 |
+ bs->irq = platform_get_irq(pdev, 0); |
2516 |
+diff --git a/drivers/staging/ralink-gdma/Kconfig b/drivers/staging/ralink-gdma/Kconfig |
2517 |
+index 54e8029e6b1af..0017376234e28 100644 |
2518 |
+--- a/drivers/staging/ralink-gdma/Kconfig |
2519 |
++++ b/drivers/staging/ralink-gdma/Kconfig |
2520 |
+@@ -2,6 +2,7 @@ |
2521 |
+ config DMA_RALINK |
2522 |
+ tristate "RALINK DMA support" |
2523 |
+ depends on RALINK && !SOC_RT288X |
2524 |
++ depends on DMADEVICES |
2525 |
+ select DMA_ENGINE |
2526 |
+ select DMA_VIRTUAL_CHANNELS |
2527 |
+ |
2528 |
+diff --git a/drivers/target/iscsi/iscsi_target.c b/drivers/target/iscsi/iscsi_target.c |
2529 |
+index bca183369ad8b..3403667a9592f 100644 |
2530 |
+--- a/drivers/target/iscsi/iscsi_target.c |
2531 |
++++ b/drivers/target/iscsi/iscsi_target.c |
2532 |
+@@ -483,8 +483,7 @@ EXPORT_SYMBOL(iscsit_queue_rsp); |
2533 |
+ void iscsit_aborted_task(struct iscsi_conn *conn, struct iscsi_cmd *cmd) |
2534 |
+ { |
2535 |
+ spin_lock_bh(&conn->cmd_lock); |
2536 |
+- if (!list_empty(&cmd->i_conn_node) && |
2537 |
+- !(cmd->se_cmd.transport_state & CMD_T_FABRIC_STOP)) |
2538 |
++ if (!list_empty(&cmd->i_conn_node)) |
2539 |
+ list_del_init(&cmd->i_conn_node); |
2540 |
+ spin_unlock_bh(&conn->cmd_lock); |
2541 |
+ |
2542 |
+@@ -4082,12 +4081,22 @@ static void iscsit_release_commands_from_conn(struct iscsi_conn *conn) |
2543 |
+ spin_lock_bh(&conn->cmd_lock); |
2544 |
+ list_splice_init(&conn->conn_cmd_list, &tmp_list); |
2545 |
+ |
2546 |
+- list_for_each_entry(cmd, &tmp_list, i_conn_node) { |
2547 |
++ list_for_each_entry_safe(cmd, cmd_tmp, &tmp_list, i_conn_node) { |
2548 |
+ struct se_cmd *se_cmd = &cmd->se_cmd; |
2549 |
+ |
2550 |
+ if (se_cmd->se_tfo != NULL) { |
2551 |
+ spin_lock_irq(&se_cmd->t_state_lock); |
2552 |
+- se_cmd->transport_state |= CMD_T_FABRIC_STOP; |
2553 |
++ if (se_cmd->transport_state & CMD_T_ABORTED) { |
2554 |
++ /* |
2555 |
++ * LIO's abort path owns the cleanup for this, |
2556 |
++ * so put it back on the list and let |
2557 |
++ * aborted_task handle it. |
2558 |
++ */ |
2559 |
++ list_move_tail(&cmd->i_conn_node, |
2560 |
++ &conn->conn_cmd_list); |
2561 |
++ } else { |
2562 |
++ se_cmd->transport_state |= CMD_T_FABRIC_STOP; |
2563 |
++ } |
2564 |
+ spin_unlock_irq(&se_cmd->t_state_lock); |
2565 |
+ } |
2566 |
+ } |
2567 |
+diff --git a/drivers/tee/optee/call.c b/drivers/tee/optee/call.c |
2568 |
+index cf2367ba08d63..aadedec3bfe7b 100644 |
2569 |
+--- a/drivers/tee/optee/call.c |
2570 |
++++ b/drivers/tee/optee/call.c |
2571 |
+@@ -530,7 +530,8 @@ void optee_free_pages_list(void *list, size_t num_entries) |
2572 |
+ static bool is_normal_memory(pgprot_t p) |
2573 |
+ { |
2574 |
+ #if defined(CONFIG_ARM) |
2575 |
+- return (pgprot_val(p) & L_PTE_MT_MASK) == L_PTE_MT_WRITEALLOC; |
2576 |
++ return (((pgprot_val(p) & L_PTE_MT_MASK) == L_PTE_MT_WRITEALLOC) || |
2577 |
++ ((pgprot_val(p) & L_PTE_MT_MASK) == L_PTE_MT_WRITEBACK)); |
2578 |
+ #elif defined(CONFIG_ARM64) |
2579 |
+ return (pgprot_val(p) & PTE_ATTRINDX_MASK) == PTE_ATTRINDX(MT_NORMAL); |
2580 |
+ #else |
2581 |
+diff --git a/drivers/usb/core/devio.c b/drivers/usb/core/devio.c |
2582 |
+index e26a6f18f4210..35e89460b9ca8 100644 |
2583 |
+--- a/drivers/usb/core/devio.c |
2584 |
++++ b/drivers/usb/core/devio.c |
2585 |
+@@ -482,11 +482,11 @@ static void snoop_urb(struct usb_device *udev, |
2586 |
+ |
2587 |
+ if (userurb) { /* Async */ |
2588 |
+ if (when == SUBMIT) |
2589 |
+- dev_info(&udev->dev, "userurb %pK, ep%d %s-%s, " |
2590 |
++ dev_info(&udev->dev, "userurb %px, ep%d %s-%s, " |
2591 |
+ "length %u\n", |
2592 |
+ userurb, ep, t, d, length); |
2593 |
+ else |
2594 |
+- dev_info(&udev->dev, "userurb %pK, ep%d %s-%s, " |
2595 |
++ dev_info(&udev->dev, "userurb %px, ep%d %s-%s, " |
2596 |
+ "actual_length %u status %d\n", |
2597 |
+ userurb, ep, t, d, length, |
2598 |
+ timeout_or_status); |
2599 |
+@@ -1992,7 +1992,7 @@ static int proc_reapurb(struct usb_dev_state *ps, void __user *arg) |
2600 |
+ if (as) { |
2601 |
+ int retval; |
2602 |
+ |
2603 |
+- snoop(&ps->dev->dev, "reap %pK\n", as->userurb); |
2604 |
++ snoop(&ps->dev->dev, "reap %px\n", as->userurb); |
2605 |
+ retval = processcompl(as, (void __user * __user *)arg); |
2606 |
+ free_async(as); |
2607 |
+ return retval; |
2608 |
+@@ -2009,7 +2009,7 @@ static int proc_reapurbnonblock(struct usb_dev_state *ps, void __user *arg) |
2609 |
+ |
2610 |
+ as = async_getcompleted(ps); |
2611 |
+ if (as) { |
2612 |
+- snoop(&ps->dev->dev, "reap %pK\n", as->userurb); |
2613 |
++ snoop(&ps->dev->dev, "reap %px\n", as->userurb); |
2614 |
+ retval = processcompl(as, (void __user * __user *)arg); |
2615 |
+ free_async(as); |
2616 |
+ } else { |
2617 |
+@@ -2139,7 +2139,7 @@ static int proc_reapurb_compat(struct usb_dev_state *ps, void __user *arg) |
2618 |
+ if (as) { |
2619 |
+ int retval; |
2620 |
+ |
2621 |
+- snoop(&ps->dev->dev, "reap %pK\n", as->userurb); |
2622 |
++ snoop(&ps->dev->dev, "reap %px\n", as->userurb); |
2623 |
+ retval = processcompl_compat(as, (void __user * __user *)arg); |
2624 |
+ free_async(as); |
2625 |
+ return retval; |
2626 |
+@@ -2156,7 +2156,7 @@ static int proc_reapurbnonblock_compat(struct usb_dev_state *ps, void __user *ar |
2627 |
+ |
2628 |
+ as = async_getcompleted(ps); |
2629 |
+ if (as) { |
2630 |
+- snoop(&ps->dev->dev, "reap %pK\n", as->userurb); |
2631 |
++ snoop(&ps->dev->dev, "reap %px\n", as->userurb); |
2632 |
+ retval = processcompl_compat(as, (void __user * __user *)arg); |
2633 |
+ free_async(as); |
2634 |
+ } else { |
2635 |
+@@ -2621,7 +2621,7 @@ static long usbdev_do_ioctl(struct file *file, unsigned int cmd, |
2636 |
+ #endif |
2637 |
+ |
2638 |
+ case USBDEVFS_DISCARDURB: |
2639 |
+- snoop(&dev->dev, "%s: DISCARDURB %pK\n", __func__, p); |
2640 |
++ snoop(&dev->dev, "%s: DISCARDURB %px\n", __func__, p); |
2641 |
+ ret = proc_unlinkurb(ps, p); |
2642 |
+ break; |
2643 |
+ |
2644 |
+diff --git a/drivers/usb/core/quirks.c b/drivers/usb/core/quirks.c |
2645 |
+index 5ad14cdd97623..b55c3a699fc65 100644 |
2646 |
+--- a/drivers/usb/core/quirks.c |
2647 |
++++ b/drivers/usb/core/quirks.c |
2648 |
+@@ -348,6 +348,10 @@ static const struct usb_device_id usb_quirk_list[] = { |
2649 |
+ /* Guillemot Webcam Hercules Dualpix Exchange*/ |
2650 |
+ { USB_DEVICE(0x06f8, 0x3005), .driver_info = USB_QUIRK_RESET_RESUME }, |
2651 |
+ |
2652 |
++ /* Guillemot Hercules DJ Console audio card (BZ 208357) */ |
2653 |
++ { USB_DEVICE(0x06f8, 0xb000), .driver_info = |
2654 |
++ USB_QUIRK_ENDPOINT_BLACKLIST }, |
2655 |
++ |
2656 |
+ /* Midiman M-Audio Keystation 88es */ |
2657 |
+ { USB_DEVICE(0x0763, 0x0192), .driver_info = USB_QUIRK_RESET_RESUME }, |
2658 |
+ |
2659 |
+@@ -421,6 +425,10 @@ static const struct usb_device_id usb_quirk_list[] = { |
2660 |
+ { USB_DEVICE(0x1532, 0x0116), .driver_info = |
2661 |
+ USB_QUIRK_LINEAR_UFRAME_INTR_BINTERVAL }, |
2662 |
+ |
2663 |
++ /* Lenovo ThinkCenter A630Z TI024Gen3 usb-audio */ |
2664 |
++ { USB_DEVICE(0x17ef, 0xa012), .driver_info = |
2665 |
++ USB_QUIRK_DISCONNECT_SUSPEND }, |
2666 |
++ |
2667 |
+ /* BUILDWIN Photo Frame */ |
2668 |
+ { USB_DEVICE(0x1908, 0x1315), .driver_info = |
2669 |
+ USB_QUIRK_HONOR_BNUMINTERFACES }, |
2670 |
+@@ -521,6 +529,8 @@ static const struct usb_device_id usb_amd_resume_quirk_list[] = { |
2671 |
+ * Matched for devices with USB_QUIRK_ENDPOINT_BLACKLIST. |
2672 |
+ */ |
2673 |
+ static const struct usb_device_id usb_endpoint_blacklist[] = { |
2674 |
++ { USB_DEVICE_INTERFACE_NUMBER(0x06f8, 0xb000, 5), .driver_info = 0x01 }, |
2675 |
++ { USB_DEVICE_INTERFACE_NUMBER(0x06f8, 0xb000, 5), .driver_info = 0x81 }, |
2676 |
+ { USB_DEVICE_INTERFACE_NUMBER(0x0926, 0x0202, 1), .driver_info = 0x85 }, |
2677 |
+ { USB_DEVICE_INTERFACE_NUMBER(0x0926, 0x0208, 1), .driver_info = 0x85 }, |
2678 |
+ { } |
2679 |
+diff --git a/drivers/usb/gadget/function/f_midi.c b/drivers/usb/gadget/function/f_midi.c |
2680 |
+index 46af0aa07e2e3..b2b5b0689667b 100644 |
2681 |
+--- a/drivers/usb/gadget/function/f_midi.c |
2682 |
++++ b/drivers/usb/gadget/function/f_midi.c |
2683 |
+@@ -1315,7 +1315,7 @@ static struct usb_function *f_midi_alloc(struct usb_function_instance *fi) |
2684 |
+ midi->id = kstrdup(opts->id, GFP_KERNEL); |
2685 |
+ if (opts->id && !midi->id) { |
2686 |
+ status = -ENOMEM; |
2687 |
+- goto setup_fail; |
2688 |
++ goto midi_free; |
2689 |
+ } |
2690 |
+ midi->in_ports = opts->in_ports; |
2691 |
+ midi->out_ports = opts->out_ports; |
2692 |
+@@ -1327,7 +1327,7 @@ static struct usb_function *f_midi_alloc(struct usb_function_instance *fi) |
2693 |
+ |
2694 |
+ status = kfifo_alloc(&midi->in_req_fifo, midi->qlen, GFP_KERNEL); |
2695 |
+ if (status) |
2696 |
+- goto setup_fail; |
2697 |
++ goto midi_free; |
2698 |
+ |
2699 |
+ spin_lock_init(&midi->transmit_lock); |
2700 |
+ |
2701 |
+@@ -1343,9 +1343,13 @@ static struct usb_function *f_midi_alloc(struct usb_function_instance *fi) |
2702 |
+ |
2703 |
+ return &midi->func; |
2704 |
+ |
2705 |
++midi_free: |
2706 |
++ if (midi) |
2707 |
++ kfree(midi->id); |
2708 |
++ kfree(midi); |
2709 |
+ setup_fail: |
2710 |
+ mutex_unlock(&opts->lock); |
2711 |
+- kfree(midi); |
2712 |
++ |
2713 |
+ return ERR_PTR(status); |
2714 |
+ } |
2715 |
+ |
2716 |
+diff --git a/drivers/usb/gadget/legacy/inode.c b/drivers/usb/gadget/legacy/inode.c |
2717 |
+index 238f555fe494a..cabcbb47f0ac1 100644 |
2718 |
+--- a/drivers/usb/gadget/legacy/inode.c |
2719 |
++++ b/drivers/usb/gadget/legacy/inode.c |
2720 |
+@@ -2040,6 +2040,9 @@ gadgetfs_fill_super (struct super_block *sb, struct fs_context *fc) |
2721 |
+ return 0; |
2722 |
+ |
2723 |
+ Enomem: |
2724 |
++ kfree(CHIP); |
2725 |
++ CHIP = NULL; |
2726 |
++ |
2727 |
+ return -ENOMEM; |
2728 |
+ } |
2729 |
+ |
2730 |
+diff --git a/drivers/vhost/scsi.c b/drivers/vhost/scsi.c |
2731 |
+index f63f84a257256..98c484149ac7f 100644 |
2732 |
+--- a/drivers/vhost/scsi.c |
2733 |
++++ b/drivers/vhost/scsi.c |
2734 |
+@@ -320,7 +320,7 @@ static u32 vhost_scsi_tpg_get_inst_index(struct se_portal_group *se_tpg) |
2735 |
+ return 1; |
2736 |
+ } |
2737 |
+ |
2738 |
+-static void vhost_scsi_release_cmd(struct se_cmd *se_cmd) |
2739 |
++static void vhost_scsi_release_cmd_res(struct se_cmd *se_cmd) |
2740 |
+ { |
2741 |
+ struct vhost_scsi_cmd *tv_cmd = container_of(se_cmd, |
2742 |
+ struct vhost_scsi_cmd, tvc_se_cmd); |
2743 |
+@@ -340,6 +340,16 @@ static void vhost_scsi_release_cmd(struct se_cmd *se_cmd) |
2744 |
+ target_free_tag(se_sess, se_cmd); |
2745 |
+ } |
2746 |
+ |
2747 |
++static void vhost_scsi_release_cmd(struct se_cmd *se_cmd) |
2748 |
++{ |
2749 |
++ struct vhost_scsi_cmd *cmd = container_of(se_cmd, |
2750 |
++ struct vhost_scsi_cmd, tvc_se_cmd); |
2751 |
++ struct vhost_scsi *vs = cmd->tvc_vhost; |
2752 |
++ |
2753 |
++ llist_add(&cmd->tvc_completion_list, &vs->vs_completion_list); |
2754 |
++ vhost_work_queue(&vs->dev, &vs->vs_completion_work); |
2755 |
++} |
2756 |
++ |
2757 |
+ static u32 vhost_scsi_sess_get_index(struct se_session *se_sess) |
2758 |
+ { |
2759 |
+ return 0; |
2760 |
+@@ -362,28 +372,15 @@ static int vhost_scsi_get_cmd_state(struct se_cmd *se_cmd) |
2761 |
+ return 0; |
2762 |
+ } |
2763 |
+ |
2764 |
+-static void vhost_scsi_complete_cmd(struct vhost_scsi_cmd *cmd) |
2765 |
+-{ |
2766 |
+- struct vhost_scsi *vs = cmd->tvc_vhost; |
2767 |
+- |
2768 |
+- llist_add(&cmd->tvc_completion_list, &vs->vs_completion_list); |
2769 |
+- |
2770 |
+- vhost_work_queue(&vs->dev, &vs->vs_completion_work); |
2771 |
+-} |
2772 |
+- |
2773 |
+ static int vhost_scsi_queue_data_in(struct se_cmd *se_cmd) |
2774 |
+ { |
2775 |
+- struct vhost_scsi_cmd *cmd = container_of(se_cmd, |
2776 |
+- struct vhost_scsi_cmd, tvc_se_cmd); |
2777 |
+- vhost_scsi_complete_cmd(cmd); |
2778 |
++ transport_generic_free_cmd(se_cmd, 0); |
2779 |
+ return 0; |
2780 |
+ } |
2781 |
+ |
2782 |
+ static int vhost_scsi_queue_status(struct se_cmd *se_cmd) |
2783 |
+ { |
2784 |
+- struct vhost_scsi_cmd *cmd = container_of(se_cmd, |
2785 |
+- struct vhost_scsi_cmd, tvc_se_cmd); |
2786 |
+- vhost_scsi_complete_cmd(cmd); |
2787 |
++ transport_generic_free_cmd(se_cmd, 0); |
2788 |
+ return 0; |
2789 |
+ } |
2790 |
+ |
2791 |
+@@ -429,15 +426,6 @@ vhost_scsi_allocate_evt(struct vhost_scsi *vs, |
2792 |
+ return evt; |
2793 |
+ } |
2794 |
+ |
2795 |
+-static void vhost_scsi_free_cmd(struct vhost_scsi_cmd *cmd) |
2796 |
+-{ |
2797 |
+- struct se_cmd *se_cmd = &cmd->tvc_se_cmd; |
2798 |
+- |
2799 |
+- /* TODO locking against target/backend threads? */ |
2800 |
+- transport_generic_free_cmd(se_cmd, 0); |
2801 |
+- |
2802 |
+-} |
2803 |
+- |
2804 |
+ static int vhost_scsi_check_stop_free(struct se_cmd *se_cmd) |
2805 |
+ { |
2806 |
+ return target_put_sess_cmd(se_cmd); |
2807 |
+@@ -556,7 +544,7 @@ static void vhost_scsi_complete_cmd_work(struct vhost_work *work) |
2808 |
+ } else |
2809 |
+ pr_err("Faulted on virtio_scsi_cmd_resp\n"); |
2810 |
+ |
2811 |
+- vhost_scsi_free_cmd(cmd); |
2812 |
++ vhost_scsi_release_cmd_res(se_cmd); |
2813 |
+ } |
2814 |
+ |
2815 |
+ vq = -1; |
2816 |
+@@ -1088,7 +1076,7 @@ vhost_scsi_handle_vq(struct vhost_scsi *vs, struct vhost_virtqueue *vq) |
2817 |
+ &prot_iter, exp_data_len, |
2818 |
+ &data_iter))) { |
2819 |
+ vq_err(vq, "Failed to map iov to sgl\n"); |
2820 |
+- vhost_scsi_release_cmd(&cmd->tvc_se_cmd); |
2821 |
++ vhost_scsi_release_cmd_res(&cmd->tvc_se_cmd); |
2822 |
+ goto err; |
2823 |
+ } |
2824 |
+ } |
2825 |
+diff --git a/drivers/video/fbdev/hyperv_fb.c b/drivers/video/fbdev/hyperv_fb.c |
2826 |
+index 2dcb7c58b31e1..81671272aa58f 100644 |
2827 |
+--- a/drivers/video/fbdev/hyperv_fb.c |
2828 |
++++ b/drivers/video/fbdev/hyperv_fb.c |
2829 |
+@@ -703,7 +703,12 @@ static int hvfb_getmem(struct hv_device *hdev, struct fb_info *info) |
2830 |
+ goto err1; |
2831 |
+ } |
2832 |
+ |
2833 |
+- fb_virt = ioremap(par->mem->start, screen_fb_size); |
2834 |
++ /* |
2835 |
++ * Map the VRAM cacheable for performance. This is also required for |
2836 |
++ * VM Connect to display properly for ARM64 Linux VM, as the host also |
2837 |
++ * maps the VRAM cacheable. |
2838 |
++ */ |
2839 |
++ fb_virt = ioremap_cache(par->mem->start, screen_fb_size); |
2840 |
+ if (!fb_virt) |
2841 |
+ goto err2; |
2842 |
+ |
2843 |
+diff --git a/fs/btrfs/qgroup.c b/fs/btrfs/qgroup.c |
2844 |
+index 04fd02e6124dd..d9246fb8cea65 100644 |
2845 |
+--- a/fs/btrfs/qgroup.c |
2846 |
++++ b/fs/btrfs/qgroup.c |
2847 |
+@@ -488,13 +488,13 @@ next2: |
2848 |
+ break; |
2849 |
+ } |
2850 |
+ out: |
2851 |
++ btrfs_free_path(path); |
2852 |
+ fs_info->qgroup_flags |= flags; |
2853 |
+ if (!(fs_info->qgroup_flags & BTRFS_QGROUP_STATUS_FLAG_ON)) |
2854 |
+ clear_bit(BTRFS_FS_QUOTA_ENABLED, &fs_info->flags); |
2855 |
+ else if (fs_info->qgroup_flags & BTRFS_QGROUP_STATUS_FLAG_RESCAN && |
2856 |
+ ret >= 0) |
2857 |
+ ret = qgroup_rescan_init(fs_info, rescan_progress, 0); |
2858 |
+- btrfs_free_path(path); |
2859 |
+ |
2860 |
+ if (ret < 0) { |
2861 |
+ ulist_free(fs_info->qgroup_ulist); |
2862 |
+diff --git a/fs/btrfs/tree-checker.c b/fs/btrfs/tree-checker.c |
2863 |
+index 48e46323d519c..9feb8a1793efb 100644 |
2864 |
+--- a/fs/btrfs/tree-checker.c |
2865 |
++++ b/fs/btrfs/tree-checker.c |
2866 |
+@@ -913,6 +913,7 @@ static int check_root_item(struct extent_buffer *leaf, struct btrfs_key *key, |
2867 |
+ "invalid root item size, have %u expect %zu or %u", |
2868 |
+ btrfs_item_size_nr(leaf, slot), sizeof(ri), |
2869 |
+ btrfs_legacy_root_item_size()); |
2870 |
++ return -EUCLEAN; |
2871 |
+ } |
2872 |
+ |
2873 |
+ /* |
2874 |
+@@ -1268,6 +1269,7 @@ static int check_extent_data_ref(struct extent_buffer *leaf, |
2875 |
+ "invalid item size, have %u expect aligned to %zu for key type %u", |
2876 |
+ btrfs_item_size_nr(leaf, slot), |
2877 |
+ sizeof(*dref), key->type); |
2878 |
++ return -EUCLEAN; |
2879 |
+ } |
2880 |
+ if (!IS_ALIGNED(key->objectid, leaf->fs_info->sectorsize)) { |
2881 |
+ generic_err(leaf, slot, |
2882 |
+@@ -1296,6 +1298,7 @@ static int check_extent_data_ref(struct extent_buffer *leaf, |
2883 |
+ extent_err(leaf, slot, |
2884 |
+ "invalid extent data backref offset, have %llu expect aligned to %u", |
2885 |
+ offset, leaf->fs_info->sectorsize); |
2886 |
++ return -EUCLEAN; |
2887 |
+ } |
2888 |
+ } |
2889 |
+ return 0; |
2890 |
+diff --git a/fs/btrfs/volumes.c b/fs/btrfs/volumes.c |
2891 |
+index 808c5985904ed..457f8f858a3f0 100644 |
2892 |
+--- a/fs/btrfs/volumes.c |
2893 |
++++ b/fs/btrfs/volumes.c |
2894 |
+@@ -1122,7 +1122,13 @@ static noinline struct btrfs_device *device_list_add(const char *path, |
2895 |
+ if (device->bdev != path_bdev) { |
2896 |
+ bdput(path_bdev); |
2897 |
+ mutex_unlock(&fs_devices->device_list_mutex); |
2898 |
+- btrfs_warn_in_rcu(device->fs_info, |
2899 |
++ /* |
2900 |
++ * device->fs_info may not be reliable here, so |
2901 |
++ * pass in a NULL instead. This avoids a |
2902 |
++ * possible use-after-free when the fs_info and |
2903 |
++ * fs_info->sb are already torn down. |
2904 |
++ */ |
2905 |
++ btrfs_warn_in_rcu(NULL, |
2906 |
+ "duplicate device %s devid %llu generation %llu scanned by %s (%d)", |
2907 |
+ path, devid, found_transid, |
2908 |
+ current->comm, |
2909 |
+diff --git a/fs/cifs/cifsacl.c b/fs/cifs/cifsacl.c |
2910 |
+index 1619af216677c..1f55072aa3023 100644 |
2911 |
+--- a/fs/cifs/cifsacl.c |
2912 |
++++ b/fs/cifs/cifsacl.c |
2913 |
+@@ -1198,6 +1198,7 @@ cifs_acl_to_fattr(struct cifs_sb_info *cifs_sb, struct cifs_fattr *fattr, |
2914 |
+ cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); |
2915 |
+ } else if (mode_from_special_sid) { |
2916 |
+ rc = parse_sec_desc(cifs_sb, pntsd, acllen, fattr, true); |
2917 |
++ kfree(pntsd); |
2918 |
+ } else { |
2919 |
+ /* get approximated mode from ACL */ |
2920 |
+ rc = parse_sec_desc(cifs_sb, pntsd, acllen, fattr, false); |
2921 |
+diff --git a/fs/cifs/smb2ops.c b/fs/cifs/smb2ops.c |
2922 |
+index 776029a57e717..6211f8b731a97 100644 |
2923 |
+--- a/fs/cifs/smb2ops.c |
2924 |
++++ b/fs/cifs/smb2ops.c |
2925 |
+@@ -259,7 +259,7 @@ smb2_revert_current_mid(struct TCP_Server_Info *server, const unsigned int val) |
2926 |
+ } |
2927 |
+ |
2928 |
+ static struct mid_q_entry * |
2929 |
+-smb2_find_mid(struct TCP_Server_Info *server, char *buf) |
2930 |
++__smb2_find_mid(struct TCP_Server_Info *server, char *buf, bool dequeue) |
2931 |
+ { |
2932 |
+ struct mid_q_entry *mid; |
2933 |
+ struct smb2_sync_hdr *shdr = (struct smb2_sync_hdr *)buf; |
2934 |
+@@ -276,6 +276,10 @@ smb2_find_mid(struct TCP_Server_Info *server, char *buf) |
2935 |
+ (mid->mid_state == MID_REQUEST_SUBMITTED) && |
2936 |
+ (mid->command == shdr->Command)) { |
2937 |
+ kref_get(&mid->refcount); |
2938 |
++ if (dequeue) { |
2939 |
++ list_del_init(&mid->qhead); |
2940 |
++ mid->mid_flags |= MID_DELETED; |
2941 |
++ } |
2942 |
+ spin_unlock(&GlobalMid_Lock); |
2943 |
+ return mid; |
2944 |
+ } |
2945 |
+@@ -284,6 +288,18 @@ smb2_find_mid(struct TCP_Server_Info *server, char *buf) |
2946 |
+ return NULL; |
2947 |
+ } |
2948 |
+ |
2949 |
++static struct mid_q_entry * |
2950 |
++smb2_find_mid(struct TCP_Server_Info *server, char *buf) |
2951 |
++{ |
2952 |
++ return __smb2_find_mid(server, buf, false); |
2953 |
++} |
2954 |
++ |
2955 |
++static struct mid_q_entry * |
2956 |
++smb2_find_dequeue_mid(struct TCP_Server_Info *server, char *buf) |
2957 |
++{ |
2958 |
++ return __smb2_find_mid(server, buf, true); |
2959 |
++} |
2960 |
++ |
2961 |
+ static void |
2962 |
+ smb2_dump_detail(void *buf, struct TCP_Server_Info *server) |
2963 |
+ { |
2964 |
+@@ -3979,7 +3995,8 @@ init_read_bvec(struct page **pages, unsigned int npages, unsigned int data_size, |
2965 |
+ static int |
2966 |
+ handle_read_data(struct TCP_Server_Info *server, struct mid_q_entry *mid, |
2967 |
+ char *buf, unsigned int buf_len, struct page **pages, |
2968 |
+- unsigned int npages, unsigned int page_data_size) |
2969 |
++ unsigned int npages, unsigned int page_data_size, |
2970 |
++ bool is_offloaded) |
2971 |
+ { |
2972 |
+ unsigned int data_offset; |
2973 |
+ unsigned int data_len; |
2974 |
+@@ -4001,7 +4018,8 @@ handle_read_data(struct TCP_Server_Info *server, struct mid_q_entry *mid, |
2975 |
+ |
2976 |
+ if (server->ops->is_session_expired && |
2977 |
+ server->ops->is_session_expired(buf)) { |
2978 |
+- cifs_reconnect(server); |
2979 |
++ if (!is_offloaded) |
2980 |
++ cifs_reconnect(server); |
2981 |
+ wake_up(&server->response_q); |
2982 |
+ return -1; |
2983 |
+ } |
2984 |
+@@ -4026,7 +4044,10 @@ handle_read_data(struct TCP_Server_Info *server, struct mid_q_entry *mid, |
2985 |
+ cifs_dbg(FYI, "%s: server returned error %d\n", |
2986 |
+ __func__, rdata->result); |
2987 |
+ /* normal error on read response */ |
2988 |
+- dequeue_mid(mid, false); |
2989 |
++ if (is_offloaded) |
2990 |
++ mid->mid_state = MID_RESPONSE_RECEIVED; |
2991 |
++ else |
2992 |
++ dequeue_mid(mid, false); |
2993 |
+ return 0; |
2994 |
+ } |
2995 |
+ |
2996 |
+@@ -4050,7 +4071,10 @@ handle_read_data(struct TCP_Server_Info *server, struct mid_q_entry *mid, |
2997 |
+ cifs_dbg(FYI, "%s: data offset (%u) beyond end of smallbuf\n", |
2998 |
+ __func__, data_offset); |
2999 |
+ rdata->result = -EIO; |
3000 |
+- dequeue_mid(mid, rdata->result); |
3001 |
++ if (is_offloaded) |
3002 |
++ mid->mid_state = MID_RESPONSE_MALFORMED; |
3003 |
++ else |
3004 |
++ dequeue_mid(mid, rdata->result); |
3005 |
+ return 0; |
3006 |
+ } |
3007 |
+ |
3008 |
+@@ -4066,21 +4090,30 @@ handle_read_data(struct TCP_Server_Info *server, struct mid_q_entry *mid, |
3009 |
+ cifs_dbg(FYI, "%s: data offset (%u) beyond 1st page of response\n", |
3010 |
+ __func__, data_offset); |
3011 |
+ rdata->result = -EIO; |
3012 |
+- dequeue_mid(mid, rdata->result); |
3013 |
++ if (is_offloaded) |
3014 |
++ mid->mid_state = MID_RESPONSE_MALFORMED; |
3015 |
++ else |
3016 |
++ dequeue_mid(mid, rdata->result); |
3017 |
+ return 0; |
3018 |
+ } |
3019 |
+ |
3020 |
+ if (data_len > page_data_size - pad_len) { |
3021 |
+ /* data_len is corrupt -- discard frame */ |
3022 |
+ rdata->result = -EIO; |
3023 |
+- dequeue_mid(mid, rdata->result); |
3024 |
++ if (is_offloaded) |
3025 |
++ mid->mid_state = MID_RESPONSE_MALFORMED; |
3026 |
++ else |
3027 |
++ dequeue_mid(mid, rdata->result); |
3028 |
+ return 0; |
3029 |
+ } |
3030 |
+ |
3031 |
+ rdata->result = init_read_bvec(pages, npages, page_data_size, |
3032 |
+ cur_off, &bvec); |
3033 |
+ if (rdata->result != 0) { |
3034 |
+- dequeue_mid(mid, rdata->result); |
3035 |
++ if (is_offloaded) |
3036 |
++ mid->mid_state = MID_RESPONSE_MALFORMED; |
3037 |
++ else |
3038 |
++ dequeue_mid(mid, rdata->result); |
3039 |
+ return 0; |
3040 |
+ } |
3041 |
+ |
3042 |
+@@ -4095,7 +4128,10 @@ handle_read_data(struct TCP_Server_Info *server, struct mid_q_entry *mid, |
3043 |
+ /* read response payload cannot be in both buf and pages */ |
3044 |
+ WARN_ONCE(1, "buf can not contain only a part of read data"); |
3045 |
+ rdata->result = -EIO; |
3046 |
+- dequeue_mid(mid, rdata->result); |
3047 |
++ if (is_offloaded) |
3048 |
++ mid->mid_state = MID_RESPONSE_MALFORMED; |
3049 |
++ else |
3050 |
++ dequeue_mid(mid, rdata->result); |
3051 |
+ return 0; |
3052 |
+ } |
3053 |
+ |
3054 |
+@@ -4106,7 +4142,10 @@ handle_read_data(struct TCP_Server_Info *server, struct mid_q_entry *mid, |
3055 |
+ if (length < 0) |
3056 |
+ return length; |
3057 |
+ |
3058 |
+- dequeue_mid(mid, false); |
3059 |
++ if (is_offloaded) |
3060 |
++ mid->mid_state = MID_RESPONSE_RECEIVED; |
3061 |
++ else |
3062 |
++ dequeue_mid(mid, false); |
3063 |
+ return length; |
3064 |
+ } |
3065 |
+ |
3066 |
+@@ -4135,15 +4174,34 @@ static void smb2_decrypt_offload(struct work_struct *work) |
3067 |
+ } |
3068 |
+ |
3069 |
+ dw->server->lstrp = jiffies; |
3070 |
+- mid = smb2_find_mid(dw->server, dw->buf); |
3071 |
++ mid = smb2_find_dequeue_mid(dw->server, dw->buf); |
3072 |
+ if (mid == NULL) |
3073 |
+ cifs_dbg(FYI, "mid not found\n"); |
3074 |
+ else { |
3075 |
+ mid->decrypted = true; |
3076 |
+ rc = handle_read_data(dw->server, mid, dw->buf, |
3077 |
+ dw->server->vals->read_rsp_size, |
3078 |
+- dw->ppages, dw->npages, dw->len); |
3079 |
+- mid->callback(mid); |
3080 |
++ dw->ppages, dw->npages, dw->len, |
3081 |
++ true); |
3082 |
++ if (rc >= 0) { |
3083 |
++#ifdef CONFIG_CIFS_STATS2 |
3084 |
++ mid->when_received = jiffies; |
3085 |
++#endif |
3086 |
++ mid->callback(mid); |
3087 |
++ } else { |
3088 |
++ spin_lock(&GlobalMid_Lock); |
3089 |
++ if (dw->server->tcpStatus == CifsNeedReconnect) { |
3090 |
++ mid->mid_state = MID_RETRY_NEEDED; |
3091 |
++ spin_unlock(&GlobalMid_Lock); |
3092 |
++ mid->callback(mid); |
3093 |
++ } else { |
3094 |
++ mid->mid_state = MID_REQUEST_SUBMITTED; |
3095 |
++ mid->mid_flags &= ~(MID_DELETED); |
3096 |
++ list_add_tail(&mid->qhead, |
3097 |
++ &dw->server->pending_mid_q); |
3098 |
++ spin_unlock(&GlobalMid_Lock); |
3099 |
++ } |
3100 |
++ } |
3101 |
+ cifs_mid_q_entry_release(mid); |
3102 |
+ } |
3103 |
+ |
3104 |
+@@ -4246,7 +4304,7 @@ non_offloaded_decrypt: |
3105 |
+ (*mid)->decrypted = true; |
3106 |
+ rc = handle_read_data(server, *mid, buf, |
3107 |
+ server->vals->read_rsp_size, |
3108 |
+- pages, npages, len); |
3109 |
++ pages, npages, len, false); |
3110 |
+ } |
3111 |
+ |
3112 |
+ free_pages: |
3113 |
+@@ -4391,7 +4449,7 @@ smb3_handle_read_data(struct TCP_Server_Info *server, struct mid_q_entry *mid) |
3114 |
+ char *buf = server->large_buf ? server->bigbuf : server->smallbuf; |
3115 |
+ |
3116 |
+ return handle_read_data(server, mid, buf, server->pdu_size, |
3117 |
+- NULL, 0, 0); |
3118 |
++ NULL, 0, 0, false); |
3119 |
+ } |
3120 |
+ |
3121 |
+ static int |
3122 |
+diff --git a/fs/efivarfs/inode.c b/fs/efivarfs/inode.c |
3123 |
+index 96c0c86f3fffe..0297ad95eb5cc 100644 |
3124 |
+--- a/fs/efivarfs/inode.c |
3125 |
++++ b/fs/efivarfs/inode.c |
3126 |
+@@ -7,6 +7,7 @@ |
3127 |
+ #include <linux/efi.h> |
3128 |
+ #include <linux/fs.h> |
3129 |
+ #include <linux/ctype.h> |
3130 |
++#include <linux/kmemleak.h> |
3131 |
+ #include <linux/slab.h> |
3132 |
+ #include <linux/uuid.h> |
3133 |
+ |
3134 |
+@@ -103,6 +104,7 @@ static int efivarfs_create(struct inode *dir, struct dentry *dentry, |
3135 |
+ var->var.VariableName[i] = '\0'; |
3136 |
+ |
3137 |
+ inode->i_private = var; |
3138 |
++ kmemleak_ignore(var); |
3139 |
+ |
3140 |
+ err = efivar_entry_add(var, &efivarfs_list); |
3141 |
+ if (err) |
3142 |
+diff --git a/fs/efivarfs/super.c b/fs/efivarfs/super.c |
3143 |
+index edcd6769a94b4..9760a52800b42 100644 |
3144 |
+--- a/fs/efivarfs/super.c |
3145 |
++++ b/fs/efivarfs/super.c |
3146 |
+@@ -21,7 +21,6 @@ LIST_HEAD(efivarfs_list); |
3147 |
+ static void efivarfs_evict_inode(struct inode *inode) |
3148 |
+ { |
3149 |
+ clear_inode(inode); |
3150 |
+- kfree(inode->i_private); |
3151 |
+ } |
3152 |
+ |
3153 |
+ static const struct super_operations efivarfs_ops = { |
3154 |
+diff --git a/fs/proc/self.c b/fs/proc/self.c |
3155 |
+index 32af065397f80..582336862d258 100644 |
3156 |
+--- a/fs/proc/self.c |
3157 |
++++ b/fs/proc/self.c |
3158 |
+@@ -16,6 +16,13 @@ static const char *proc_self_get_link(struct dentry *dentry, |
3159 |
+ pid_t tgid = task_tgid_nr_ns(current, ns); |
3160 |
+ char *name; |
3161 |
+ |
3162 |
++ /* |
3163 |
++ * Not currently supported. Once we can inherit all of struct pid, |
3164 |
++ * we can allow this. |
3165 |
++ */ |
3166 |
++ if (current->flags & PF_KTHREAD) |
3167 |
++ return ERR_PTR(-EOPNOTSUPP); |
3168 |
++ |
3169 |
+ if (!tgid) |
3170 |
+ return ERR_PTR(-ENOENT); |
3171 |
+ /* max length of unsigned int in decimal + NULL term */ |
3172 |
+diff --git a/include/asm-generic/pgtable.h b/include/asm-generic/pgtable.h |
3173 |
+index ea39a0b54c637..15f77361eb130 100644 |
3174 |
+--- a/include/asm-generic/pgtable.h |
3175 |
++++ b/include/asm-generic/pgtable.h |
3176 |
+@@ -1159,6 +1159,19 @@ static inline bool arch_has_pfn_modify_check(void) |
3177 |
+ |
3178 |
+ #endif /* !__ASSEMBLY__ */ |
3179 |
+ |
3180 |
++#if !defined(MAX_POSSIBLE_PHYSMEM_BITS) && !defined(CONFIG_64BIT) |
3181 |
++#ifdef CONFIG_PHYS_ADDR_T_64BIT |
3182 |
++/* |
3183 |
++ * ZSMALLOC needs to know the highest PFN on 32-bit architectures |
3184 |
++ * with physical address space extension, but falls back to |
3185 |
++ * BITS_PER_LONG otherwise. |
3186 |
++ */ |
3187 |
++#error Missing MAX_POSSIBLE_PHYSMEM_BITS definition |
3188 |
++#else |
3189 |
++#define MAX_POSSIBLE_PHYSMEM_BITS 32 |
3190 |
++#endif |
3191 |
++#endif |
3192 |
++ |
3193 |
+ #ifndef has_transparent_hugepage |
3194 |
+ #ifdef CONFIG_TRANSPARENT_HUGEPAGE |
3195 |
+ #define has_transparent_hugepage() 1 |
3196 |
+diff --git a/include/linux/netfilter.h b/include/linux/netfilter.h |
3197 |
+index 77ebb61faf486..4c0e6539effdd 100644 |
3198 |
+--- a/include/linux/netfilter.h |
3199 |
++++ b/include/linux/netfilter.h |
3200 |
+@@ -316,7 +316,7 @@ NF_HOOK_LIST(uint8_t pf, unsigned int hook, struct net *net, struct sock *sk, |
3201 |
+ |
3202 |
+ INIT_LIST_HEAD(&sublist); |
3203 |
+ list_for_each_entry_safe(skb, next, head, list) { |
3204 |
+- list_del(&skb->list); |
3205 |
++ skb_list_del_init(skb); |
3206 |
+ if (nf_hook(pf, hook, net, sk, skb, in, out, okfn) == 1) |
3207 |
+ list_add_tail(&skb->list, &sublist); |
3208 |
+ } |
3209 |
+diff --git a/include/scsi/libiscsi.h b/include/scsi/libiscsi.h |
3210 |
+index c25fb86ffae95..b3bbd10eb3f07 100644 |
3211 |
+--- a/include/scsi/libiscsi.h |
3212 |
++++ b/include/scsi/libiscsi.h |
3213 |
+@@ -132,6 +132,9 @@ struct iscsi_task { |
3214 |
+ void *dd_data; /* driver/transport data */ |
3215 |
+ }; |
3216 |
+ |
3217 |
++/* invalid scsi_task pointer */ |
3218 |
++#define INVALID_SCSI_TASK (struct iscsi_task *)-1l |
3219 |
++ |
3220 |
+ static inline int iscsi_task_has_unsol_data(struct iscsi_task *task) |
3221 |
+ { |
3222 |
+ return task->unsol_r2t.data_length > task->unsol_r2t.sent; |
3223 |
+diff --git a/include/trace/events/writeback.h b/include/trace/events/writeback.h |
3224 |
+index 67434278b81dd..a8af22e469ce5 100644 |
3225 |
+--- a/include/trace/events/writeback.h |
3226 |
++++ b/include/trace/events/writeback.h |
3227 |
+@@ -192,7 +192,7 @@ TRACE_EVENT(inode_foreign_history, |
3228 |
+ ), |
3229 |
+ |
3230 |
+ TP_fast_assign( |
3231 |
+- strncpy(__entry->name, bdi_dev_name(inode_to_bdi(inode)), 32); |
3232 |
++ strscpy_pad(__entry->name, bdi_dev_name(inode_to_bdi(inode)), 32); |
3233 |
+ __entry->ino = inode->i_ino; |
3234 |
+ __entry->cgroup_ino = __trace_wbc_assign_cgroup(wbc); |
3235 |
+ __entry->history = history; |
3236 |
+@@ -221,7 +221,7 @@ TRACE_EVENT(inode_switch_wbs, |
3237 |
+ ), |
3238 |
+ |
3239 |
+ TP_fast_assign( |
3240 |
+- strncpy(__entry->name, bdi_dev_name(old_wb->bdi), 32); |
3241 |
++ strscpy_pad(__entry->name, bdi_dev_name(old_wb->bdi), 32); |
3242 |
+ __entry->ino = inode->i_ino; |
3243 |
+ __entry->old_cgroup_ino = __trace_wb_assign_cgroup(old_wb); |
3244 |
+ __entry->new_cgroup_ino = __trace_wb_assign_cgroup(new_wb); |
3245 |
+@@ -254,7 +254,7 @@ TRACE_EVENT(track_foreign_dirty, |
3246 |
+ struct address_space *mapping = page_mapping(page); |
3247 |
+ struct inode *inode = mapping ? mapping->host : NULL; |
3248 |
+ |
3249 |
+- strncpy(__entry->name, bdi_dev_name(wb->bdi), 32); |
3250 |
++ strscpy_pad(__entry->name, bdi_dev_name(wb->bdi), 32); |
3251 |
+ __entry->bdi_id = wb->bdi->id; |
3252 |
+ __entry->ino = inode ? inode->i_ino : 0; |
3253 |
+ __entry->memcg_id = wb->memcg_css->id; |
3254 |
+@@ -287,7 +287,7 @@ TRACE_EVENT(flush_foreign, |
3255 |
+ ), |
3256 |
+ |
3257 |
+ TP_fast_assign( |
3258 |
+- strncpy(__entry->name, bdi_dev_name(wb->bdi), 32); |
3259 |
++ strscpy_pad(__entry->name, bdi_dev_name(wb->bdi), 32); |
3260 |
+ __entry->cgroup_ino = __trace_wb_assign_cgroup(wb); |
3261 |
+ __entry->frn_bdi_id = frn_bdi_id; |
3262 |
+ __entry->frn_memcg_id = frn_memcg_id; |
3263 |
+diff --git a/include/uapi/linux/wireless.h b/include/uapi/linux/wireless.h |
3264 |
+index a2c006a364e0b..24f3371ad8262 100644 |
3265 |
+--- a/include/uapi/linux/wireless.h |
3266 |
++++ b/include/uapi/linux/wireless.h |
3267 |
+@@ -74,7 +74,11 @@ |
3268 |
+ #include <linux/socket.h> /* for "struct sockaddr" et al */ |
3269 |
+ #include <linux/if.h> /* for IFNAMSIZ and co... */ |
3270 |
+ |
3271 |
+-#include <stddef.h> /* for offsetof */ |
3272 |
++#ifdef __KERNEL__ |
3273 |
++# include <linux/stddef.h> /* for offsetof */ |
3274 |
++#else |
3275 |
++# include <stddef.h> /* for offsetof */ |
3276 |
++#endif |
3277 |
+ |
3278 |
+ /***************************** VERSION *****************************/ |
3279 |
+ /* |
3280 |
+diff --git a/include/uapi/sound/skl-tplg-interface.h b/include/uapi/sound/skl-tplg-interface.h |
3281 |
+index 9eee32f5e4077..a93c0decfdd53 100644 |
3282 |
+--- a/include/uapi/sound/skl-tplg-interface.h |
3283 |
++++ b/include/uapi/sound/skl-tplg-interface.h |
3284 |
+@@ -18,6 +18,8 @@ |
3285 |
+ */ |
3286 |
+ #define SKL_CONTROL_TYPE_BYTE_TLV 0x100 |
3287 |
+ #define SKL_CONTROL_TYPE_MIC_SELECT 0x102 |
3288 |
++#define SKL_CONTROL_TYPE_MULTI_IO_SELECT 0x103 |
3289 |
++#define SKL_CONTROL_TYPE_MULTI_IO_SELECT_DMIC 0x104 |
3290 |
+ |
3291 |
+ #define HDA_SST_CFG_MAX 900 /* size of copier cfg*/ |
3292 |
+ #define MAX_IN_QUEUE 8 |
3293 |
+diff --git a/net/batman-adv/log.c b/net/batman-adv/log.c |
3294 |
+index 11941cf1adcc9..87f3de3d4e4ca 100644 |
3295 |
+--- a/net/batman-adv/log.c |
3296 |
++++ b/net/batman-adv/log.c |
3297 |
+@@ -180,6 +180,7 @@ static const struct file_operations batadv_log_fops = { |
3298 |
+ .read = batadv_log_read, |
3299 |
+ .poll = batadv_log_poll, |
3300 |
+ .llseek = no_llseek, |
3301 |
++ .owner = THIS_MODULE, |
3302 |
+ }; |
3303 |
+ |
3304 |
+ /** |
3305 |
+diff --git a/net/ipv4/fib_frontend.c b/net/ipv4/fib_frontend.c |
3306 |
+index 0a8220d30c992..ed2ab03cf971c 100644 |
3307 |
+--- a/net/ipv4/fib_frontend.c |
3308 |
++++ b/net/ipv4/fib_frontend.c |
3309 |
+@@ -706,7 +706,7 @@ int fib_gw_from_via(struct fib_config *cfg, struct nlattr *nla, |
3310 |
+ cfg->fc_gw4 = *((__be32 *)via->rtvia_addr); |
3311 |
+ break; |
3312 |
+ case AF_INET6: |
3313 |
+-#ifdef CONFIG_IPV6 |
3314 |
++#if IS_ENABLED(CONFIG_IPV6) |
3315 |
+ if (alen != sizeof(struct in6_addr)) { |
3316 |
+ NL_SET_ERR_MSG(extack, "Invalid IPv6 address in RTA_VIA"); |
3317 |
+ return -EINVAL; |
3318 |
+diff --git a/sound/soc/intel/skylake/bxt-sst.c b/sound/soc/intel/skylake/bxt-sst.c |
3319 |
+index 92a82e6b5fe62..38b9d74940835 100644 |
3320 |
+--- a/sound/soc/intel/skylake/bxt-sst.c |
3321 |
++++ b/sound/soc/intel/skylake/bxt-sst.c |
3322 |
+@@ -17,7 +17,6 @@ |
3323 |
+ #include "skl.h" |
3324 |
+ |
3325 |
+ #define BXT_BASEFW_TIMEOUT 3000 |
3326 |
+-#define BXT_INIT_TIMEOUT 300 |
3327 |
+ #define BXT_ROM_INIT_TIMEOUT 70 |
3328 |
+ #define BXT_IPC_PURGE_FW 0x01004000 |
3329 |
+ |
3330 |
+@@ -38,8 +37,6 @@ |
3331 |
+ /* Delay before scheduling D0i3 entry */ |
3332 |
+ #define BXT_D0I3_DELAY 5000 |
3333 |
+ |
3334 |
+-#define BXT_FW_ROM_INIT_RETRY 3 |
3335 |
+- |
3336 |
+ static unsigned int bxt_get_errorcode(struct sst_dsp *ctx) |
3337 |
+ { |
3338 |
+ return sst_dsp_shim_read(ctx, BXT_ADSP_ERROR_CODE); |
3339 |
+diff --git a/sound/soc/intel/skylake/cnl-sst.c b/sound/soc/intel/skylake/cnl-sst.c |
3340 |
+index 4f64f097e9ae3..c6abcd5aa67b9 100644 |
3341 |
+--- a/sound/soc/intel/skylake/cnl-sst.c |
3342 |
++++ b/sound/soc/intel/skylake/cnl-sst.c |
3343 |
+@@ -57,18 +57,34 @@ static int cnl_prepare_fw(struct sst_dsp *ctx, const void *fwdata, u32 fwsize) |
3344 |
+ ctx->dsp_ops.stream_tag = stream_tag; |
3345 |
+ memcpy(ctx->dmab.area, fwdata, fwsize); |
3346 |
+ |
3347 |
++ ret = skl_dsp_core_power_up(ctx, SKL_DSP_CORE0_MASK); |
3348 |
++ if (ret < 0) { |
3349 |
++ dev_err(ctx->dev, "dsp core0 power up failed\n"); |
3350 |
++ ret = -EIO; |
3351 |
++ goto base_fw_load_failed; |
3352 |
++ } |
3353 |
++ |
3354 |
+ /* purge FW request */ |
3355 |
+ sst_dsp_shim_write(ctx, CNL_ADSP_REG_HIPCIDR, |
3356 |
+ CNL_ADSP_REG_HIPCIDR_BUSY | (CNL_IPC_PURGE | |
3357 |
+ ((stream_tag - 1) << CNL_ROM_CTRL_DMA_ID))); |
3358 |
+ |
3359 |
+- ret = cnl_dsp_enable_core(ctx, SKL_DSP_CORE0_MASK); |
3360 |
++ ret = skl_dsp_start_core(ctx, SKL_DSP_CORE0_MASK); |
3361 |
+ if (ret < 0) { |
3362 |
+- dev_err(ctx->dev, "dsp boot core failed ret: %d\n", ret); |
3363 |
++ dev_err(ctx->dev, "Start dsp core failed ret: %d\n", ret); |
3364 |
+ ret = -EIO; |
3365 |
+ goto base_fw_load_failed; |
3366 |
+ } |
3367 |
+ |
3368 |
++ ret = sst_dsp_register_poll(ctx, CNL_ADSP_REG_HIPCIDA, |
3369 |
++ CNL_ADSP_REG_HIPCIDA_DONE, |
3370 |
++ CNL_ADSP_REG_HIPCIDA_DONE, |
3371 |
++ BXT_INIT_TIMEOUT, "HIPCIDA Done"); |
3372 |
++ if (ret < 0) { |
3373 |
++ dev_err(ctx->dev, "timeout for purge request: %d\n", ret); |
3374 |
++ goto base_fw_load_failed; |
3375 |
++ } |
3376 |
++ |
3377 |
+ /* enable interrupt */ |
3378 |
+ cnl_ipc_int_enable(ctx); |
3379 |
+ cnl_ipc_op_int_enable(ctx); |
3380 |
+@@ -109,7 +125,7 @@ static int cnl_load_base_firmware(struct sst_dsp *ctx) |
3381 |
+ { |
3382 |
+ struct firmware stripped_fw; |
3383 |
+ struct skl_dev *cnl = ctx->thread_context; |
3384 |
+- int ret; |
3385 |
++ int ret, i; |
3386 |
+ |
3387 |
+ if (!ctx->fw) { |
3388 |
+ ret = request_firmware(&ctx->fw, ctx->fw_name, ctx->dev); |
3389 |
+@@ -131,12 +147,16 @@ static int cnl_load_base_firmware(struct sst_dsp *ctx) |
3390 |
+ stripped_fw.size = ctx->fw->size; |
3391 |
+ skl_dsp_strip_extended_manifest(&stripped_fw); |
3392 |
+ |
3393 |
+- ret = cnl_prepare_fw(ctx, stripped_fw.data, stripped_fw.size); |
3394 |
+- if (ret < 0) { |
3395 |
+- dev_err(ctx->dev, "prepare firmware failed: %d\n", ret); |
3396 |
+- goto cnl_load_base_firmware_failed; |
3397 |
++ for (i = 0; i < BXT_FW_ROM_INIT_RETRY; i++) { |
3398 |
++ ret = cnl_prepare_fw(ctx, stripped_fw.data, stripped_fw.size); |
3399 |
++ if (!ret) |
3400 |
++ break; |
3401 |
++ dev_dbg(ctx->dev, "prepare firmware failed: %d\n", ret); |
3402 |
+ } |
3403 |
+ |
3404 |
++ if (ret < 0) |
3405 |
++ goto cnl_load_base_firmware_failed; |
3406 |
++ |
3407 |
+ ret = sst_transfer_fw_host_dma(ctx); |
3408 |
+ if (ret < 0) { |
3409 |
+ dev_err(ctx->dev, "transfer firmware failed: %d\n", ret); |
3410 |
+@@ -158,6 +178,7 @@ static int cnl_load_base_firmware(struct sst_dsp *ctx) |
3411 |
+ return 0; |
3412 |
+ |
3413 |
+ cnl_load_base_firmware_failed: |
3414 |
++ dev_err(ctx->dev, "firmware load failed: %d\n", ret); |
3415 |
+ release_firmware(ctx->fw); |
3416 |
+ ctx->fw = NULL; |
3417 |
+ |
3418 |
+diff --git a/sound/soc/intel/skylake/skl-nhlt.c b/sound/soc/intel/skylake/skl-nhlt.c |
3419 |
+index 19f328d71f244..d9c8f5cb389e3 100644 |
3420 |
+--- a/sound/soc/intel/skylake/skl-nhlt.c |
3421 |
++++ b/sound/soc/intel/skylake/skl-nhlt.c |
3422 |
+@@ -182,7 +182,8 @@ void skl_nhlt_remove_sysfs(struct skl_dev *skl) |
3423 |
+ { |
3424 |
+ struct device *dev = &skl->pci->dev; |
3425 |
+ |
3426 |
+- sysfs_remove_file(&dev->kobj, &dev_attr_platform_id.attr); |
3427 |
++ if (skl->nhlt) |
3428 |
++ sysfs_remove_file(&dev->kobj, &dev_attr_platform_id.attr); |
3429 |
+ } |
3430 |
+ |
3431 |
+ /* |
3432 |
+diff --git a/sound/soc/intel/skylake/skl-sst-dsp.h b/sound/soc/intel/skylake/skl-sst-dsp.h |
3433 |
+index cdfec0fca5773..1df9ef422f61d 100644 |
3434 |
+--- a/sound/soc/intel/skylake/skl-sst-dsp.h |
3435 |
++++ b/sound/soc/intel/skylake/skl-sst-dsp.h |
3436 |
+@@ -67,6 +67,8 @@ struct skl_dev; |
3437 |
+ |
3438 |
+ #define SKL_FW_INIT 0x1 |
3439 |
+ #define SKL_FW_RFW_START 0xf |
3440 |
++#define BXT_FW_ROM_INIT_RETRY 3 |
3441 |
++#define BXT_INIT_TIMEOUT 300 |
3442 |
+ |
3443 |
+ #define SKL_ADSPIC_IPC 1 |
3444 |
+ #define SKL_ADSPIS_IPC 1 |
3445 |
+diff --git a/sound/soc/intel/skylake/skl-topology.c b/sound/soc/intel/skylake/skl-topology.c |
3446 |
+index 4b114ece58c61..aa5833001fde5 100644 |
3447 |
+--- a/sound/soc/intel/skylake/skl-topology.c |
3448 |
++++ b/sound/soc/intel/skylake/skl-topology.c |
3449 |
+@@ -579,6 +579,38 @@ static int skl_tplg_unload_pipe_modules(struct skl_dev *skl, |
3450 |
+ return ret; |
3451 |
+ } |
3452 |
+ |
3453 |
++static bool skl_tplg_is_multi_fmt(struct skl_dev *skl, struct skl_pipe *pipe) |
3454 |
++{ |
3455 |
++ struct skl_pipe_fmt *cur_fmt; |
3456 |
++ struct skl_pipe_fmt *next_fmt; |
3457 |
++ int i; |
3458 |
++ |
3459 |
++ if (pipe->nr_cfgs <= 1) |
3460 |
++ return false; |
3461 |
++ |
3462 |
++ if (pipe->conn_type != SKL_PIPE_CONN_TYPE_FE) |
3463 |
++ return true; |
3464 |
++ |
3465 |
++ for (i = 0; i < pipe->nr_cfgs - 1; i++) { |
3466 |
++ if (pipe->direction == SNDRV_PCM_STREAM_PLAYBACK) { |
3467 |
++ cur_fmt = &pipe->configs[i].out_fmt; |
3468 |
++ next_fmt = &pipe->configs[i + 1].out_fmt; |
3469 |
++ } else { |
3470 |
++ cur_fmt = &pipe->configs[i].in_fmt; |
3471 |
++ next_fmt = &pipe->configs[i + 1].in_fmt; |
3472 |
++ } |
3473 |
++ |
3474 |
++ if (!CHECK_HW_PARAMS(cur_fmt->channels, cur_fmt->freq, |
3475 |
++ cur_fmt->bps, |
3476 |
++ next_fmt->channels, |
3477 |
++ next_fmt->freq, |
3478 |
++ next_fmt->bps)) |
3479 |
++ return true; |
3480 |
++ } |
3481 |
++ |
3482 |
++ return false; |
3483 |
++} |
3484 |
++ |
3485 |
+ /* |
3486 |
+ * Here, we select pipe format based on the pipe type and pipe |
3487 |
+ * direction to determine the current config index for the pipeline. |
3488 |
+@@ -601,6 +633,14 @@ skl_tplg_get_pipe_config(struct skl_dev *skl, struct skl_module_cfg *mconfig) |
3489 |
+ return 0; |
3490 |
+ } |
3491 |
+ |
3492 |
++ if (skl_tplg_is_multi_fmt(skl, pipe)) { |
3493 |
++ pipe->cur_config_idx = pipe->pipe_config_idx; |
3494 |
++ pipe->memory_pages = pconfig->mem_pages; |
3495 |
++ dev_dbg(skl->dev, "found pipe config idx:%d\n", |
3496 |
++ pipe->cur_config_idx); |
3497 |
++ return 0; |
3498 |
++ } |
3499 |
++ |
3500 |
+ if (pipe->conn_type == SKL_PIPE_CONN_TYPE_NONE) { |
3501 |
+ dev_dbg(skl->dev, "No conn_type detected, take 0th config\n"); |
3502 |
+ pipe->cur_config_idx = 0; |
3503 |
+@@ -1315,6 +1355,68 @@ static int skl_tplg_pga_event(struct snd_soc_dapm_widget *w, |
3504 |
+ return 0; |
3505 |
+ } |
3506 |
+ |
3507 |
++static int skl_tplg_multi_config_set_get(struct snd_kcontrol *kcontrol, |
3508 |
++ struct snd_ctl_elem_value *ucontrol, |
3509 |
++ bool is_set) |
3510 |
++{ |
3511 |
++ struct snd_soc_component *component = |
3512 |
++ snd_soc_kcontrol_component(kcontrol); |
3513 |
++ struct hdac_bus *bus = snd_soc_component_get_drvdata(component); |
3514 |
++ struct skl_dev *skl = bus_to_skl(bus); |
3515 |
++ struct skl_pipeline *ppl; |
3516 |
++ struct skl_pipe *pipe = NULL; |
3517 |
++ struct soc_enum *ec = (struct soc_enum *)kcontrol->private_value; |
3518 |
++ u32 *pipe_id; |
3519 |
++ |
3520 |
++ if (!ec) |
3521 |
++ return -EINVAL; |
3522 |
++ |
3523 |
++ if (is_set && ucontrol->value.enumerated.item[0] > ec->items) |
3524 |
++ return -EINVAL; |
3525 |
++ |
3526 |
++ pipe_id = ec->dobj.private; |
3527 |
++ |
3528 |
++ list_for_each_entry(ppl, &skl->ppl_list, node) { |
3529 |
++ if (ppl->pipe->ppl_id == *pipe_id) { |
3530 |
++ pipe = ppl->pipe; |
3531 |
++ break; |
3532 |
++ } |
3533 |
++ } |
3534 |
++ if (!pipe) |
3535 |
++ return -EIO; |
3536 |
++ |
3537 |
++ if (is_set) |
3538 |
++ pipe->pipe_config_idx = ucontrol->value.enumerated.item[0]; |
3539 |
++ else |
3540 |
++ ucontrol->value.enumerated.item[0] = pipe->pipe_config_idx; |
3541 |
++ |
3542 |
++ return 0; |
3543 |
++} |
3544 |
++ |
3545 |
++static int skl_tplg_multi_config_get(struct snd_kcontrol *kcontrol, |
3546 |
++ struct snd_ctl_elem_value *ucontrol) |
3547 |
++{ |
3548 |
++ return skl_tplg_multi_config_set_get(kcontrol, ucontrol, false); |
3549 |
++} |
3550 |
++ |
3551 |
++static int skl_tplg_multi_config_set(struct snd_kcontrol *kcontrol, |
3552 |
++ struct snd_ctl_elem_value *ucontrol) |
3553 |
++{ |
3554 |
++ return skl_tplg_multi_config_set_get(kcontrol, ucontrol, true); |
3555 |
++} |
3556 |
++ |
3557 |
++static int skl_tplg_multi_config_get_dmic(struct snd_kcontrol *kcontrol, |
3558 |
++ struct snd_ctl_elem_value *ucontrol) |
3559 |
++{ |
3560 |
++ return skl_tplg_multi_config_set_get(kcontrol, ucontrol, false); |
3561 |
++} |
3562 |
++ |
3563 |
++static int skl_tplg_multi_config_set_dmic(struct snd_kcontrol *kcontrol, |
3564 |
++ struct snd_ctl_elem_value *ucontrol) |
3565 |
++{ |
3566 |
++ return skl_tplg_multi_config_set_get(kcontrol, ucontrol, true); |
3567 |
++} |
3568 |
++ |
3569 |
+ static int skl_tplg_tlv_control_get(struct snd_kcontrol *kcontrol, |
3570 |
+ unsigned int __user *data, unsigned int size) |
3571 |
+ { |
3572 |
+@@ -1854,6 +1956,16 @@ static const struct snd_soc_tplg_kcontrol_ops skl_tplg_kcontrol_ops[] = { |
3573 |
+ .get = skl_tplg_mic_control_get, |
3574 |
+ .put = skl_tplg_mic_control_set, |
3575 |
+ }, |
3576 |
++ { |
3577 |
++ .id = SKL_CONTROL_TYPE_MULTI_IO_SELECT, |
3578 |
++ .get = skl_tplg_multi_config_get, |
3579 |
++ .put = skl_tplg_multi_config_set, |
3580 |
++ }, |
3581 |
++ { |
3582 |
++ .id = SKL_CONTROL_TYPE_MULTI_IO_SELECT_DMIC, |
3583 |
++ .get = skl_tplg_multi_config_get_dmic, |
3584 |
++ .put = skl_tplg_multi_config_set_dmic, |
3585 |
++ } |
3586 |
+ }; |
3587 |
+ |
3588 |
+ static int skl_tplg_fill_pipe_cfg(struct device *dev, |
3589 |
+@@ -3014,12 +3126,21 @@ static int skl_tplg_control_load(struct snd_soc_component *cmpnt, |
3590 |
+ case SND_SOC_TPLG_CTL_ENUM: |
3591 |
+ tplg_ec = container_of(hdr, |
3592 |
+ struct snd_soc_tplg_enum_control, hdr); |
3593 |
+- if (kctl->access & SNDRV_CTL_ELEM_ACCESS_READWRITE) { |
3594 |
++ if (kctl->access & SNDRV_CTL_ELEM_ACCESS_READ) { |
3595 |
+ se = (struct soc_enum *)kctl->private_value; |
3596 |
+ if (tplg_ec->priv.size) |
3597 |
+- return skl_init_enum_data(bus->dev, se, |
3598 |
+- tplg_ec); |
3599 |
++ skl_init_enum_data(bus->dev, se, tplg_ec); |
3600 |
+ } |
3601 |
++ |
3602 |
++ /* |
3603 |
++ * now that the control initializations are done, remove |
3604 |
++ * write permission for the DMIC configuration enums to |
3605 |
++ * avoid conflicts between NHLT settings and user interaction |
3606 |
++ */ |
3607 |
++ |
3608 |
++ if (hdr->ops.get == SKL_CONTROL_TYPE_MULTI_IO_SELECT_DMIC) |
3609 |
++ kctl->access = SNDRV_CTL_ELEM_ACCESS_READ; |
3610 |
++ |
3611 |
+ break; |
3612 |
+ |
3613 |
+ default: |
3614 |
+@@ -3489,6 +3610,37 @@ static int skl_manifest_load(struct snd_soc_component *cmpnt, int index, |
3615 |
+ return 0; |
3616 |
+ } |
3617 |
+ |
3618 |
++static void skl_tplg_complete(struct snd_soc_component *component) |
3619 |
++{ |
3620 |
++ struct snd_soc_dobj *dobj; |
3621 |
++ struct snd_soc_acpi_mach *mach = |
3622 |
++ dev_get_platdata(component->card->dev); |
3623 |
++ int i; |
3624 |
++ |
3625 |
++ list_for_each_entry(dobj, &component->dobj_list, list) { |
3626 |
++ struct snd_kcontrol *kcontrol = dobj->control.kcontrol; |
3627 |
++ struct soc_enum *se = |
3628 |
++ (struct soc_enum *)kcontrol->private_value; |
3629 |
++ char **texts = dobj->control.dtexts; |
3630 |
++ char chan_text[4]; |
3631 |
++ |
3632 |
++ if (dobj->type != SND_SOC_DOBJ_ENUM || |
3633 |
++ dobj->control.kcontrol->put != |
3634 |
++ skl_tplg_multi_config_set_dmic) |
3635 |
++ continue; |
3636 |
++ sprintf(chan_text, "c%d", mach->mach_params.dmic_num); |
3637 |
++ |
3638 |
++ for (i = 0; i < se->items; i++) { |
3639 |
++ struct snd_ctl_elem_value val; |
3640 |
++ |
3641 |
++ if (strstr(texts[i], chan_text)) { |
3642 |
++ val.value.enumerated.item[0] = i; |
3643 |
++ kcontrol->put(kcontrol, &val); |
3644 |
++ } |
3645 |
++ } |
3646 |
++ } |
3647 |
++} |
3648 |
++ |
3649 |
+ static struct snd_soc_tplg_ops skl_tplg_ops = { |
3650 |
+ .widget_load = skl_tplg_widget_load, |
3651 |
+ .control_load = skl_tplg_control_load, |
3652 |
+@@ -3498,6 +3650,7 @@ static struct snd_soc_tplg_ops skl_tplg_ops = { |
3653 |
+ .io_ops_count = ARRAY_SIZE(skl_tplg_kcontrol_ops), |
3654 |
+ .manifest = skl_manifest_load, |
3655 |
+ .dai_load = skl_dai_load, |
3656 |
++ .complete = skl_tplg_complete, |
3657 |
+ }; |
3658 |
+ |
3659 |
+ /* |
3660 |
+diff --git a/sound/soc/intel/skylake/skl-topology.h b/sound/soc/intel/skylake/skl-topology.h |
3661 |
+index e967800dbb623..06576147cc290 100644 |
3662 |
+--- a/sound/soc/intel/skylake/skl-topology.h |
3663 |
++++ b/sound/soc/intel/skylake/skl-topology.h |
3664 |
+@@ -306,6 +306,7 @@ struct skl_pipe { |
3665 |
+ struct skl_path_config configs[SKL_MAX_PATH_CONFIGS]; |
3666 |
+ struct list_head w_list; |
3667 |
+ bool passthru; |
3668 |
++ u32 pipe_config_idx; |
3669 |
+ }; |
3670 |
+ |
3671 |
+ enum skl_module_state { |
3672 |
+diff --git a/sound/soc/intel/skylake/skl.c b/sound/soc/intel/skylake/skl.c |
3673 |
+index 141dbbf975acd..2e5fbd2209235 100644 |
3674 |
+--- a/sound/soc/intel/skylake/skl.c |
3675 |
++++ b/sound/soc/intel/skylake/skl.c |
3676 |
+@@ -129,6 +129,7 @@ static int skl_init_chip(struct hdac_bus *bus, bool full_reset) |
3677 |
+ struct hdac_ext_link *hlink; |
3678 |
+ int ret; |
3679 |
+ |
3680 |
++ snd_hdac_set_codec_wakeup(bus, true); |
3681 |
+ skl_enable_miscbdcge(bus->dev, false); |
3682 |
+ ret = snd_hdac_bus_init_chip(bus, full_reset); |
3683 |
+ |
3684 |
+@@ -137,6 +138,7 @@ static int skl_init_chip(struct hdac_bus *bus, bool full_reset) |
3685 |
+ writel(0, hlink->ml_addr + AZX_REG_ML_LOSIDV); |
3686 |
+ |
3687 |
+ skl_enable_miscbdcge(bus->dev, true); |
3688 |
++ snd_hdac_set_codec_wakeup(bus, false); |
3689 |
+ |
3690 |
+ return ret; |
3691 |
+ } |
3692 |
+@@ -480,13 +482,8 @@ static struct skl_ssp_clk skl_ssp_clks[] = { |
3693 |
+ static struct snd_soc_acpi_mach *skl_find_hda_machine(struct skl_dev *skl, |
3694 |
+ struct snd_soc_acpi_mach *machines) |
3695 |
+ { |
3696 |
+- struct hdac_bus *bus = skl_to_bus(skl); |
3697 |
+ struct snd_soc_acpi_mach *mach; |
3698 |
+ |
3699 |
+- /* check if we have any codecs detected on bus */ |
3700 |
+- if (bus->codec_mask == 0) |
3701 |
+- return NULL; |
3702 |
+- |
3703 |
+ /* point to common table */ |
3704 |
+ mach = snd_soc_acpi_intel_hda_machines; |
3705 |
+ |
3706 |
+@@ -635,6 +632,9 @@ static int skl_clock_device_register(struct skl_dev *skl) |
3707 |
+ struct platform_device_info pdevinfo = {NULL}; |
3708 |
+ struct skl_clk_pdata *clk_pdata; |
3709 |
+ |
3710 |
++ if (!skl->nhlt) |
3711 |
++ return 0; |
3712 |
++ |
3713 |
+ clk_pdata = devm_kzalloc(&skl->pci->dev, sizeof(*clk_pdata), |
3714 |
+ GFP_KERNEL); |
3715 |
+ if (!clk_pdata) |
3716 |
+@@ -807,6 +807,9 @@ static void skl_probe_work(struct work_struct *work) |
3717 |
+ return; |
3718 |
+ } |
3719 |
+ |
3720 |
++ skl_init_pci(skl); |
3721 |
++ skl_dum_set(bus); |
3722 |
++ |
3723 |
+ err = skl_init_chip(bus, true); |
3724 |
+ if (err < 0) { |
3725 |
+ dev_err(bus->dev, "Init chip failed with err: %d\n", err); |
3726 |
+@@ -922,8 +925,6 @@ static int skl_first_init(struct hdac_bus *bus) |
3727 |
+ return -ENXIO; |
3728 |
+ } |
3729 |
+ |
3730 |
+- snd_hdac_bus_reset_link(bus, true); |
3731 |
+- |
3732 |
+ snd_hdac_bus_parse_capabilities(bus); |
3733 |
+ |
3734 |
+ /* check if PPCAP exists */ |
3735 |
+@@ -971,11 +972,7 @@ static int skl_first_init(struct hdac_bus *bus) |
3736 |
+ if (err < 0) |
3737 |
+ return err; |
3738 |
+ |
3739 |
+- /* initialize chip */ |
3740 |
+- skl_init_pci(skl); |
3741 |
+- skl_dum_set(bus); |
3742 |
+- |
3743 |
+- return skl_init_chip(bus, true); |
3744 |
++ return 0; |
3745 |
+ } |
3746 |
+ |
3747 |
+ static int skl_probe(struct pci_dev *pci, |
3748 |
+@@ -1080,8 +1077,6 @@ static int skl_probe(struct pci_dev *pci, |
3749 |
+ if (bus->mlcap) |
3750 |
+ snd_hdac_ext_bus_get_ml_capabilities(bus); |
3751 |
+ |
3752 |
+- snd_hdac_bus_stop_chip(bus); |
3753 |
+- |
3754 |
+ /* create device for soc dmic */ |
3755 |
+ err = skl_dmic_device_register(skl); |
3756 |
+ if (err < 0) { |
3757 |
+@@ -1098,7 +1093,8 @@ out_dsp_free: |
3758 |
+ out_clk_free: |
3759 |
+ skl_clock_device_unregister(skl); |
3760 |
+ out_nhlt_free: |
3761 |
+- intel_nhlt_free(skl->nhlt); |
3762 |
++ if (skl->nhlt) |
3763 |
++ intel_nhlt_free(skl->nhlt); |
3764 |
+ out_free: |
3765 |
+ skl_free(bus); |
3766 |
+ |
3767 |
+@@ -1147,7 +1143,8 @@ static void skl_remove(struct pci_dev *pci) |
3768 |
+ skl_dmic_device_unregister(skl); |
3769 |
+ skl_clock_device_unregister(skl); |
3770 |
+ skl_nhlt_remove_sysfs(skl); |
3771 |
+- intel_nhlt_free(skl->nhlt); |
3772 |
++ if (skl->nhlt) |
3773 |
++ intel_nhlt_free(skl->nhlt); |
3774 |
+ skl_free(bus); |
3775 |
+ dev_set_drvdata(&pci->dev, NULL); |
3776 |
+ } |
3777 |
+diff --git a/tools/perf/util/dwarf-aux.c b/tools/perf/util/dwarf-aux.c |
3778 |
+index 5544bfbd0f6c0..ab34ef2c661f8 100644 |
3779 |
+--- a/tools/perf/util/dwarf-aux.c |
3780 |
++++ b/tools/perf/util/dwarf-aux.c |
3781 |
+@@ -319,6 +319,7 @@ bool die_is_func_def(Dwarf_Die *dw_die) |
3782 |
+ int die_entrypc(Dwarf_Die *dw_die, Dwarf_Addr *addr) |
3783 |
+ { |
3784 |
+ Dwarf_Addr base, end; |
3785 |
++ Dwarf_Attribute attr; |
3786 |
+ |
3787 |
+ if (!addr) |
3788 |
+ return -EINVAL; |
3789 |
+@@ -326,6 +327,13 @@ int die_entrypc(Dwarf_Die *dw_die, Dwarf_Addr *addr) |
3790 |
+ if (dwarf_entrypc(dw_die, addr) == 0) |
3791 |
+ return 0; |
3792 |
+ |
3793 |
++ /* |
3794 |
++ * Since the dwarf_ranges() will return 0 if there is no |
3795 |
++ * DW_AT_ranges attribute, we should check it first. |
3796 |
++ */ |
3797 |
++ if (!dwarf_attr(dw_die, DW_AT_ranges, &attr)) |
3798 |
++ return -ENOENT; |
3799 |
++ |
3800 |
+ return dwarf_ranges(dw_die, 0, &base, addr, &end) < 0 ? -ENOENT : 0; |
3801 |
+ } |
3802 |
+ |
3803 |
+diff --git a/tools/perf/util/stat-display.c b/tools/perf/util/stat-display.c |
3804 |
+index 373e399e57d28..93147cc40162f 100644 |
3805 |
+--- a/tools/perf/util/stat-display.c |
3806 |
++++ b/tools/perf/util/stat-display.c |
3807 |
+@@ -316,13 +316,10 @@ static int first_shadow_cpu(struct perf_stat_config *config, |
3808 |
+ struct evlist *evlist = evsel->evlist; |
3809 |
+ int i; |
3810 |
+ |
3811 |
+- if (!config->aggr_get_id) |
3812 |
+- return 0; |
3813 |
+- |
3814 |
+ if (config->aggr_mode == AGGR_NONE) |
3815 |
+ return id; |
3816 |
+ |
3817 |
+- if (config->aggr_mode == AGGR_GLOBAL) |
3818 |
++ if (!config->aggr_get_id) |
3819 |
+ return 0; |
3820 |
+ |
3821 |
+ for (i = 0; i < perf_evsel__nr_cpus(evsel); i++) { |
3822 |
+diff --git a/virt/kvm/arm/vgic/vgic-mmio-v3.c b/virt/kvm/arm/vgic/vgic-mmio-v3.c |
3823 |
+index 4c5909e38f78a..b1e639ea22e9a 100644 |
3824 |
+--- a/virt/kvm/arm/vgic/vgic-mmio-v3.c |
3825 |
++++ b/virt/kvm/arm/vgic/vgic-mmio-v3.c |
3826 |
+@@ -223,6 +223,23 @@ static unsigned long vgic_mmio_read_v3r_typer(struct kvm_vcpu *vcpu, |
3827 |
+ return extract_bytes(value, addr & 7, len); |
3828 |
+ } |
3829 |
+ |
3830 |
++static unsigned long vgic_uaccess_read_v3r_typer(struct kvm_vcpu *vcpu, |
3831 |
++ gpa_t addr, unsigned int len) |
3832 |
++{ |
3833 |
++ unsigned long mpidr = kvm_vcpu_get_mpidr_aff(vcpu); |
3834 |
++ int target_vcpu_id = vcpu->vcpu_id; |
3835 |
++ u64 value; |
3836 |
++ |
3837 |
++ value = (u64)(mpidr & GENMASK(23, 0)) << 32; |
3838 |
++ value |= ((target_vcpu_id & 0xffff) << 8); |
3839 |
++ |
3840 |
++ if (vgic_has_its(vcpu->kvm)) |
3841 |
++ value |= GICR_TYPER_PLPIS; |
3842 |
++ |
3843 |
++ /* reporting of the Last bit is not supported for userspace */ |
3844 |
++ return extract_bytes(value, addr & 7, len); |
3845 |
++} |
3846 |
++ |
3847 |
+ static unsigned long vgic_mmio_read_v3r_iidr(struct kvm_vcpu *vcpu, |
3848 |
+ gpa_t addr, unsigned int len) |
3849 |
+ { |
3850 |
+@@ -528,8 +545,9 @@ static const struct vgic_register_region vgic_v3_rd_registers[] = { |
3851 |
+ REGISTER_DESC_WITH_LENGTH(GICR_IIDR, |
3852 |
+ vgic_mmio_read_v3r_iidr, vgic_mmio_write_wi, 4, |
3853 |
+ VGIC_ACCESS_32bit), |
3854 |
+- REGISTER_DESC_WITH_LENGTH(GICR_TYPER, |
3855 |
+- vgic_mmio_read_v3r_typer, vgic_mmio_write_wi, 8, |
3856 |
++ REGISTER_DESC_WITH_LENGTH_UACCESS(GICR_TYPER, |
3857 |
++ vgic_mmio_read_v3r_typer, vgic_mmio_write_wi, |
3858 |
++ vgic_uaccess_read_v3r_typer, vgic_mmio_uaccess_write_wi, 8, |
3859 |
+ VGIC_ACCESS_64bit | VGIC_ACCESS_32bit), |
3860 |
+ REGISTER_DESC_WITH_LENGTH(GICR_WAKER, |
3861 |
+ vgic_mmio_read_raz, vgic_mmio_write_wi, 4, |