]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commitdiff
5.15-stable patches
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 2 Dec 2024 13:55:07 +0000 (14:55 +0100)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 2 Dec 2024 13:55:07 +0000 (14:55 +0100)
added patches:
asoc-intel-sst-fix-used-of-uninitialized-ctx-to-log-an-error.patch
soc-qcom-socinfo-fix-revision-check-in-qcom_socinfo_probe.patch

queue-5.15/asoc-intel-sst-fix-used-of-uninitialized-ctx-to-log-an-error.patch [new file with mode: 0644]
queue-5.15/series
queue-5.15/soc-qcom-socinfo-fix-revision-check-in-qcom_socinfo_probe.patch [new file with mode: 0644]

diff --git a/queue-5.15/asoc-intel-sst-fix-used-of-uninitialized-ctx-to-log-an-error.patch b/queue-5.15/asoc-intel-sst-fix-used-of-uninitialized-ctx-to-log-an-error.patch
new file mode 100644 (file)
index 0000000..4b0d883
--- /dev/null
@@ -0,0 +1,34 @@
+From c1895ba181e560144601fafe46aeedbafdf4dbc4 Mon Sep 17 00:00:00 2001
+From: Hans de Goede <hdegoede@redhat.com>
+Date: Sat, 26 Oct 2024 16:36:15 +0200
+Subject: ASoC: Intel: sst: Fix used of uninitialized ctx to log an error
+
+From: Hans de Goede <hdegoede@redhat.com>
+
+commit c1895ba181e560144601fafe46aeedbafdf4dbc4 upstream.
+
+Fix the new "LPE0F28" code path using the uninitialized ctx variable
+to log an error.
+
+Fixes: 6668610b4d8c ("ASoC: Intel: sst: Support LPE0F28 ACPI HID")
+Reported-by: kernel test robot <lkp@intel.com>
+Closes: https://lore.kernel.org/oe-kbuild-all/202410261106.EBx49ssy-lkp@intel.com/
+Signed-off-by: Hans de Goede <hdegoede@redhat.com>
+Link: https://patch.msgid.link/20241026143615.171821-1-hdegoede@redhat.com
+Signed-off-by: Mark Brown <broonie@kernel.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ sound/soc/intel/atom/sst/sst_acpi.c |    2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+--- a/sound/soc/intel/atom/sst/sst_acpi.c
++++ b/sound/soc/intel/atom/sst/sst_acpi.c
+@@ -309,7 +309,7 @@ static int sst_acpi_probe(struct platfor
+               rsrc = platform_get_resource(pdev, IORESOURCE_MEM,
+                                            pdata->res_info->acpi_lpe_res_index);
+               if (!rsrc) {
+-                      dev_err(ctx->dev, "Invalid SHIM base\n");
++                      dev_err(dev, "Invalid SHIM base\n");
+                       return -EIO;
+               }
+               rsrc->start -= pdata->res_info->shim_offset;
index 55eff6f6a6bc5b4e6eca2ceb5b017b204f030040..c4a38eb20c74af2590e7668b298068aa21833994 100644 (file)
@@ -288,3 +288,5 @@ xen-fix-the-issue-of-resource-not-being-properly-released-in-xenbus_dev_probe.pa
 alsa-usb-audio-fix-out-of-bounds-reads-when-finding-clock-sources.patch
 usb-ehci-spear-fix-call-balance-of-sehci-clk-handling-routines.patch
 revert-drivers-clk-zynqmp-update-divider-round-rate-logic.patch
+asoc-intel-sst-fix-used-of-uninitialized-ctx-to-log-an-error.patch
+soc-qcom-socinfo-fix-revision-check-in-qcom_socinfo_probe.patch
diff --git a/queue-5.15/soc-qcom-socinfo-fix-revision-check-in-qcom_socinfo_probe.patch b/queue-5.15/soc-qcom-socinfo-fix-revision-check-in-qcom_socinfo_probe.patch
new file mode 100644 (file)
index 0000000..9d4949e
--- /dev/null
@@ -0,0 +1,42 @@
+From 128fdbf36cddc2a901c4889ba1c89fa9f2643f2c Mon Sep 17 00:00:00 2001
+From: Manikanta Mylavarapu <quic_mmanikan@quicinc.com>
+Date: Wed, 16 Oct 2024 20:18:52 +0530
+Subject: soc: qcom: socinfo: fix revision check in qcom_socinfo_probe()
+
+From: Manikanta Mylavarapu <quic_mmanikan@quicinc.com>
+
+commit 128fdbf36cddc2a901c4889ba1c89fa9f2643f2c upstream.
+
+In success case, the revision holds a non-null pointer. The current
+logic incorrectly returns an error for a non-null pointer, whereas
+it should return an error for a null pointer.
+
+The socinfo driver for IPQ9574 and IPQ5332 is currently broken,
+resulting in the following error message
+qcom-socinfo qcom-socinfo: probe with driver qcom-socinfo failed with
+error -12
+
+Add a null check for the revision to ensure it returns an error only in
+failure case (null pointer).
+
+Fixes: e694d2b5c58b ("soc: qcom: Add check devm_kasprintf() returned value")
+Signed-off-by: Manikanta Mylavarapu <quic_mmanikan@quicinc.com>
+Reviewed-by: Konrad Dybcio <konrad.dybcio@oss.qualcomm.com>
+Link: https://lore.kernel.org/r/20241016144852.2888679-1-quic_mmanikan@quicinc.com
+Signed-off-by: Bjorn Andersson <andersson@kernel.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/soc/qcom/socinfo.c |    2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+--- a/drivers/soc/qcom/socinfo.c
++++ b/drivers/soc/qcom/socinfo.c
+@@ -614,7 +614,7 @@ static int qcom_socinfo_probe(struct pla
+       qs->attr.revision = devm_kasprintf(&pdev->dev, GFP_KERNEL, "%u.%u",
+                                          SOCINFO_MAJOR(le32_to_cpu(info->ver)),
+                                          SOCINFO_MINOR(le32_to_cpu(info->ver)));
+-      if (!qs->attr.soc_id || qs->attr.revision)
++      if (!qs->attr.soc_id || !qs->attr.revision)
+               return -ENOMEM;
+       if (offsetof(struct socinfo, serial_num) <= item_size) {