]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commitdiff
6.6-stable patches
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 2 Dec 2024 13:55:58 +0000 (14:55 +0100)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 2 Dec 2024 13:55:58 +0000 (14:55 +0100)
added patches:
asoc-intel-sst-fix-used-of-uninitialized-ctx-to-log-an-error.patch
soc-qcom-socinfo-fix-revision-check-in-qcom_socinfo_probe.patch

queue-6.6/asoc-intel-sst-fix-used-of-uninitialized-ctx-to-log-an-error.patch [new file with mode: 0644]
queue-6.6/series
queue-6.6/soc-qcom-socinfo-fix-revision-check-in-qcom_socinfo_probe.patch [new file with mode: 0644]

diff --git a/queue-6.6/asoc-intel-sst-fix-used-of-uninitialized-ctx-to-log-an-error.patch b/queue-6.6/asoc-intel-sst-fix-used-of-uninitialized-ctx-to-log-an-error.patch
new file mode 100644 (file)
index 0000000..d864b59
--- /dev/null
@@ -0,0 +1,34 @@
+From c1895ba181e560144601fafe46aeedbafdf4dbc4 Mon Sep 17 00:00:00 2001
+From: Hans de Goede <hdegoede@redhat.com>
+Date: Sat, 26 Oct 2024 16:36:15 +0200
+Subject: ASoC: Intel: sst: Fix used of uninitialized ctx to log an error
+
+From: Hans de Goede <hdegoede@redhat.com>
+
+commit c1895ba181e560144601fafe46aeedbafdf4dbc4 upstream.
+
+Fix the new "LPE0F28" code path using the uninitialized ctx variable
+to log an error.
+
+Fixes: 6668610b4d8c ("ASoC: Intel: sst: Support LPE0F28 ACPI HID")
+Reported-by: kernel test robot <lkp@intel.com>
+Closes: https://lore.kernel.org/oe-kbuild-all/202410261106.EBx49ssy-lkp@intel.com/
+Signed-off-by: Hans de Goede <hdegoede@redhat.com>
+Link: https://patch.msgid.link/20241026143615.171821-1-hdegoede@redhat.com
+Signed-off-by: Mark Brown <broonie@kernel.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ sound/soc/intel/atom/sst/sst_acpi.c |    2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+--- a/sound/soc/intel/atom/sst/sst_acpi.c
++++ b/sound/soc/intel/atom/sst/sst_acpi.c
+@@ -308,7 +308,7 @@ static int sst_acpi_probe(struct platfor
+               rsrc = platform_get_resource(pdev, IORESOURCE_MEM,
+                                            pdata->res_info->acpi_lpe_res_index);
+               if (!rsrc) {
+-                      dev_err(ctx->dev, "Invalid SHIM base\n");
++                      dev_err(dev, "Invalid SHIM base\n");
+                       return -EIO;
+               }
+               rsrc->start -= pdata->res_info->shim_offset;
index dbf04351bc774f0deab887ab8294a5ec1bf15cda..1dfe93dbe7dd911c90702c50c5b2f774e305f85d 100644 (file)
@@ -473,3 +473,5 @@ btrfs-do-not-bug_on-when-freeing-tree-block-after-error.patch
 alsa-usb-audio-fix-potential-out-of-bound-accesses-for-extigy-and-mbox-devices.patch
 revert-arm64-dts-mediatek-mt8195-cherry-mark-usb-3.0-on-xhci1-as-disabled.patch
 arm64-dts-mediatek-mt8195-cherry-mark-usb-3.0-on-xhci1-as-disabled.patch
+asoc-intel-sst-fix-used-of-uninitialized-ctx-to-log-an-error.patch
+soc-qcom-socinfo-fix-revision-check-in-qcom_socinfo_probe.patch
diff --git a/queue-6.6/soc-qcom-socinfo-fix-revision-check-in-qcom_socinfo_probe.patch b/queue-6.6/soc-qcom-socinfo-fix-revision-check-in-qcom_socinfo_probe.patch
new file mode 100644 (file)
index 0000000..16c3b30
--- /dev/null
@@ -0,0 +1,42 @@
+From 128fdbf36cddc2a901c4889ba1c89fa9f2643f2c Mon Sep 17 00:00:00 2001
+From: Manikanta Mylavarapu <quic_mmanikan@quicinc.com>
+Date: Wed, 16 Oct 2024 20:18:52 +0530
+Subject: soc: qcom: socinfo: fix revision check in qcom_socinfo_probe()
+
+From: Manikanta Mylavarapu <quic_mmanikan@quicinc.com>
+
+commit 128fdbf36cddc2a901c4889ba1c89fa9f2643f2c upstream.
+
+In success case, the revision holds a non-null pointer. The current
+logic incorrectly returns an error for a non-null pointer, whereas
+it should return an error for a null pointer.
+
+The socinfo driver for IPQ9574 and IPQ5332 is currently broken,
+resulting in the following error message
+qcom-socinfo qcom-socinfo: probe with driver qcom-socinfo failed with
+error -12
+
+Add a null check for the revision to ensure it returns an error only in
+failure case (null pointer).
+
+Fixes: e694d2b5c58b ("soc: qcom: Add check devm_kasprintf() returned value")
+Signed-off-by: Manikanta Mylavarapu <quic_mmanikan@quicinc.com>
+Reviewed-by: Konrad Dybcio <konrad.dybcio@oss.qualcomm.com>
+Link: https://lore.kernel.org/r/20241016144852.2888679-1-quic_mmanikan@quicinc.com
+Signed-off-by: Bjorn Andersson <andersson@kernel.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/soc/qcom/socinfo.c |    2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+--- a/drivers/soc/qcom/socinfo.c
++++ b/drivers/soc/qcom/socinfo.c
+@@ -757,7 +757,7 @@ static int qcom_socinfo_probe(struct pla
+       qs->attr.revision = devm_kasprintf(&pdev->dev, GFP_KERNEL, "%u.%u",
+                                          SOCINFO_MAJOR(le32_to_cpu(info->ver)),
+                                          SOCINFO_MINOR(le32_to_cpu(info->ver)));
+-      if (!qs->attr.soc_id || qs->attr.revision)
++      if (!qs->attr.soc_id || !qs->attr.revision)
+               return -ENOMEM;
+       if (offsetof(struct socinfo, serial_num) <= item_size) {