From 1ff4c455403db0d6f1c12992eeccfe9721e52225 Mon Sep 17 00:00:00 2001 From: Greg Kroah-Hartman Date: Thu, 4 Feb 2021 16:17:12 +0100 Subject: [PATCH] 4.19-stable patches added patches: acpi-thermal-do-not-call-acpi_thermal_check-directly.patch ibmvnic-ensure-that-crq-entry-read-are-correctly-ordered.patch net-dsa-bcm_sf2-put-device-node-before-return.patch --- ...not-call-acpi_thermal_check-directly.patch | 176 ++++++++++++++++++ ...crq-entry-read-are-correctly-ordered.patch | 38 ++++ ...cm_sf2-put-device-node-before-return.patch | 44 +++++ 3 files changed, 258 insertions(+) create mode 100644 queue-4.19/acpi-thermal-do-not-call-acpi_thermal_check-directly.patch create mode 100644 queue-4.19/ibmvnic-ensure-that-crq-entry-read-are-correctly-ordered.patch create mode 100644 queue-4.19/net-dsa-bcm_sf2-put-device-node-before-return.patch diff --git a/queue-4.19/acpi-thermal-do-not-call-acpi_thermal_check-directly.patch b/queue-4.19/acpi-thermal-do-not-call-acpi_thermal_check-directly.patch new file mode 100644 index 00000000000..ea9695b248d --- /dev/null +++ b/queue-4.19/acpi-thermal-do-not-call-acpi_thermal_check-directly.patch @@ -0,0 +1,176 @@ +From 81b704d3e4674e09781d331df73d76675d5ad8cb Mon Sep 17 00:00:00 2001 +From: "Rafael J. Wysocki" +Date: Thu, 14 Jan 2021 19:34:22 +0100 +Subject: ACPI: thermal: Do not call acpi_thermal_check() directly + +From: Rafael J. Wysocki + +commit 81b704d3e4674e09781d331df73d76675d5ad8cb upstream. + +Calling acpi_thermal_check() from acpi_thermal_notify() directly +is problematic if _TMP triggers Notify () on the thermal zone for +which it has been evaluated (which happens on some systems), because +it causes a new acpi_thermal_notify() invocation to be queued up +every time and if that takes place too often, an indefinite number of +pending work items may accumulate in kacpi_notify_wq over time. + +Besides, it is not really useful to queue up a new invocation of +acpi_thermal_check() if one of them is pending already. + +For these reasons, rework acpi_thermal_notify() to queue up a thermal +check instead of calling acpi_thermal_check() directly and only allow +one thermal check to be pending at a time. Moreover, only allow one +acpi_thermal_check_fn() instance at a time to run +thermal_zone_device_update() for one thermal zone and make it return +early if it sees other instances running for the same thermal zone. + +While at it, fold acpi_thermal_check() into acpi_thermal_check_fn(), +as it is only called from there after the other changes made here. + +[This issue appears to have been exposed by commit 6d25be5782e4 + ("sched/core, workqueues: Distangle worker accounting from rq + lock"), but it is unclear why it was not visible earlier.] + +BugLink: https://bugzilla.kernel.org/show_bug.cgi?id=208877 +Reported-by: Stephen Berman +Diagnosed-by: Sebastian Andrzej Siewior +Signed-off-by: Rafael J. Wysocki +Reviewed-by: Sebastian Andrzej Siewior +Tested-by: Stephen Berman +Cc: All applicable +[bigeasy: Backported to v5.4.y] +Signed-off-by: Sebastian Andrzej Siewior +Signed-off-by: Greg Kroah-Hartman + +--- + drivers/acpi/thermal.c | 55 +++++++++++++++++++++++++++++++++---------------- + 1 file changed, 38 insertions(+), 17 deletions(-) + +--- a/drivers/acpi/thermal.c ++++ b/drivers/acpi/thermal.c +@@ -188,6 +188,8 @@ struct acpi_thermal { + int tz_enabled; + int kelvin_offset; + struct work_struct thermal_check_work; ++ struct mutex thermal_check_lock; ++ refcount_t thermal_check_count; + }; + + /* -------------------------------------------------------------------------- +@@ -513,17 +515,6 @@ static int acpi_thermal_get_trip_points( + return 0; + } + +-static void acpi_thermal_check(void *data) +-{ +- struct acpi_thermal *tz = data; +- +- if (!tz->tz_enabled) +- return; +- +- thermal_zone_device_update(tz->thermal_zone, +- THERMAL_EVENT_UNSPECIFIED); +-} +- + /* sys I/F for generic thermal sysfs support */ + + static int thermal_get_temp(struct thermal_zone_device *thermal, int *temp) +@@ -557,6 +548,8 @@ static int thermal_get_mode(struct therm + return 0; + } + ++static void acpi_thermal_check_fn(struct work_struct *work); ++ + static int thermal_set_mode(struct thermal_zone_device *thermal, + enum thermal_device_mode mode) + { +@@ -582,7 +575,7 @@ static int thermal_set_mode(struct therm + ACPI_DEBUG_PRINT((ACPI_DB_INFO, + "%s kernel ACPI thermal control\n", + tz->tz_enabled ? "Enable" : "Disable")); +- acpi_thermal_check(tz); ++ acpi_thermal_check_fn(&tz->thermal_check_work); + } + return 0; + } +@@ -951,6 +944,12 @@ static void acpi_thermal_unregister_ther + Driver Interface + -------------------------------------------------------------------------- */ + ++static void acpi_queue_thermal_check(struct acpi_thermal *tz) ++{ ++ if (!work_pending(&tz->thermal_check_work)) ++ queue_work(acpi_thermal_pm_queue, &tz->thermal_check_work); ++} ++ + static void acpi_thermal_notify(struct acpi_device *device, u32 event) + { + struct acpi_thermal *tz = acpi_driver_data(device); +@@ -961,17 +960,17 @@ static void acpi_thermal_notify(struct a + + switch (event) { + case ACPI_THERMAL_NOTIFY_TEMPERATURE: +- acpi_thermal_check(tz); ++ acpi_queue_thermal_check(tz); + break; + case ACPI_THERMAL_NOTIFY_THRESHOLDS: + acpi_thermal_trips_update(tz, ACPI_TRIPS_REFRESH_THRESHOLDS); +- acpi_thermal_check(tz); ++ acpi_queue_thermal_check(tz); + acpi_bus_generate_netlink_event(device->pnp.device_class, + dev_name(&device->dev), event, 0); + break; + case ACPI_THERMAL_NOTIFY_DEVICES: + acpi_thermal_trips_update(tz, ACPI_TRIPS_REFRESH_DEVICES); +- acpi_thermal_check(tz); ++ acpi_queue_thermal_check(tz); + acpi_bus_generate_netlink_event(device->pnp.device_class, + dev_name(&device->dev), event, 0); + break; +@@ -1071,7 +1070,27 @@ static void acpi_thermal_check_fn(struct + { + struct acpi_thermal *tz = container_of(work, struct acpi_thermal, + thermal_check_work); +- acpi_thermal_check(tz); ++ ++ if (!tz->tz_enabled) ++ return; ++ /* ++ * In general, it is not sufficient to check the pending bit, because ++ * subsequent instances of this function may be queued after one of them ++ * has started running (e.g. if _TMP sleeps). Avoid bailing out if just ++ * one of them is running, though, because it may have done the actual ++ * check some time ago, so allow at least one of them to block on the ++ * mutex while another one is running the update. ++ */ ++ if (!refcount_dec_not_one(&tz->thermal_check_count)) ++ return; ++ ++ mutex_lock(&tz->thermal_check_lock); ++ ++ thermal_zone_device_update(tz->thermal_zone, THERMAL_EVENT_UNSPECIFIED); ++ ++ refcount_inc(&tz->thermal_check_count); ++ ++ mutex_unlock(&tz->thermal_check_lock); + } + + static int acpi_thermal_add(struct acpi_device *device) +@@ -1103,6 +1122,8 @@ static int acpi_thermal_add(struct acpi_ + if (result) + goto free_memory; + ++ refcount_set(&tz->thermal_check_count, 3); ++ mutex_init(&tz->thermal_check_lock); + INIT_WORK(&tz->thermal_check_work, acpi_thermal_check_fn); + + pr_info(PREFIX "%s [%s] (%ld C)\n", acpi_device_name(device), +@@ -1168,7 +1189,7 @@ static int acpi_thermal_resume(struct de + tz->state.active |= tz->trips.active[i].flags.enabled; + } + +- queue_work(acpi_thermal_pm_queue, &tz->thermal_check_work); ++ acpi_queue_thermal_check(tz); + + return AE_OK; + } diff --git a/queue-4.19/ibmvnic-ensure-that-crq-entry-read-are-correctly-ordered.patch b/queue-4.19/ibmvnic-ensure-that-crq-entry-read-are-correctly-ordered.patch new file mode 100644 index 00000000000..ced59a7502c --- /dev/null +++ b/queue-4.19/ibmvnic-ensure-that-crq-entry-read-are-correctly-ordered.patch @@ -0,0 +1,38 @@ +From e41aec79e62fa50f940cf222d1e9577f14e149dc Mon Sep 17 00:00:00 2001 +From: Lijun Pan +Date: Wed, 27 Jan 2021 19:34:42 -0600 +Subject: ibmvnic: Ensure that CRQ entry read are correctly ordered + +From: Lijun Pan + +commit e41aec79e62fa50f940cf222d1e9577f14e149dc upstream. + +Ensure that received Command-Response Queue (CRQ) entries are +properly read in order by the driver. dma_rmb barrier has +been added before accessing the CRQ descriptor to ensure +the entire descriptor is read before processing. + +Fixes: 032c5e82847a ("Driver for IBM System i/p VNIC protocol") +Signed-off-by: Lijun Pan +Link: https://lore.kernel.org/r/20210128013442.88319-1-ljp@linux.ibm.com +Signed-off-by: Jakub Kicinski +Signed-off-by: Greg Kroah-Hartman +--- + drivers/net/ethernet/ibm/ibmvnic.c | 6 ++++++ + 1 file changed, 6 insertions(+) + +--- a/drivers/net/ethernet/ibm/ibmvnic.c ++++ b/drivers/net/ethernet/ibm/ibmvnic.c +@@ -4434,6 +4434,12 @@ static void ibmvnic_tasklet(void *data) + while (!done) { + /* Pull all the valid messages off the CRQ */ + while ((crq = ibmvnic_next_crq(adapter)) != NULL) { ++ /* This barrier makes sure ibmvnic_next_crq()'s ++ * crq->generic.first & IBMVNIC_CRQ_CMD_RSP is loaded ++ * before ibmvnic_handle_crq()'s ++ * switch(gen_crq->first) and switch(gen_crq->cmd). ++ */ ++ dma_rmb(); + ibmvnic_handle_crq(crq, adapter); + crq->generic.first = 0; + } diff --git a/queue-4.19/net-dsa-bcm_sf2-put-device-node-before-return.patch b/queue-4.19/net-dsa-bcm_sf2-put-device-node-before-return.patch new file mode 100644 index 00000000000..51eca457807 --- /dev/null +++ b/queue-4.19/net-dsa-bcm_sf2-put-device-node-before-return.patch @@ -0,0 +1,44 @@ +From cf3c46631e1637582f517a574c77cd6c05793817 Mon Sep 17 00:00:00 2001 +From: Pan Bian +Date: Thu, 21 Jan 2021 04:33:43 -0800 +Subject: net: dsa: bcm_sf2: put device node before return + +From: Pan Bian + +commit cf3c46631e1637582f517a574c77cd6c05793817 upstream. + +Put the device node dn before return error code on failure path. + +Fixes: 461cd1b03e32 ("net: dsa: bcm_sf2: Register our slave MDIO bus") +Signed-off-by: Pan Bian +Link: https://lore.kernel.org/r/20210121123343.26330-1-bianpan2016@163.com +Signed-off-by: Jakub Kicinski +Signed-off-by: Greg Kroah-Hartman +--- + drivers/net/dsa/bcm_sf2.c | 8 ++++++-- + 1 file changed, 6 insertions(+), 2 deletions(-) + +--- a/drivers/net/dsa/bcm_sf2.c ++++ b/drivers/net/dsa/bcm_sf2.c +@@ -423,15 +423,19 @@ static int bcm_sf2_mdio_register(struct + /* Find our integrated MDIO bus node */ + dn = of_find_compatible_node(NULL, NULL, "brcm,unimac-mdio"); + priv->master_mii_bus = of_mdio_find_bus(dn); +- if (!priv->master_mii_bus) ++ if (!priv->master_mii_bus) { ++ of_node_put(dn); + return -EPROBE_DEFER; ++ } + + get_device(&priv->master_mii_bus->dev); + priv->master_mii_dn = dn; + + priv->slave_mii_bus = devm_mdiobus_alloc(ds->dev); +- if (!priv->slave_mii_bus) ++ if (!priv->slave_mii_bus) { ++ of_node_put(dn); + return -ENOMEM; ++ } + + priv->slave_mii_bus->priv = priv; + priv->slave_mii_bus->name = "sf2 slave mii"; -- 2.47.3