]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commitdiff
6.12-stable patches
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 5 Jan 2026 09:41:48 +0000 (10:41 +0100)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 5 Jan 2026 09:41:48 +0000 (10:41 +0100)
added patches:
asoc-codecs-lpass-tx-macro-fix-sm6115-support.patch
asoc-codecs-wcd939x-fix-regmap-leak-on-probe-failure.patch
asoc-qcom-q6adm-the-the-copp-device-only-during-last-instance.patch
asoc-qcom-q6apm-dai-set-flags-to-reflect-correct-operation-of-appl_ptr.patch
asoc-qcom-q6asm-dai-perform-correct-state-check-before-closing.patch
asoc-qcom-qdsp6-q6asm-dai-set-10-ms-period-and-buffer-alignment.patch
asoc-stm32-sai-fix-clk-prepare-imbalance-on-probe-failure.patch
asoc-stm32-sai-fix-device-leak-on-probe.patch
asoc-stm32-sai-fix-of-node-leak-on-probe.patch
hid-logitech-dj-remove-duplicate-error-logging.patch
iommu-amd-fix-pci_segment-memleak-in-alloc_pci_segment.patch
iommu-amd-propagate-the-error-code-returned-by-__modify_irte_ga-in-modify_irte_ga.patch
iommu-apple-dart-fix-device-leak-on-of_xlate.patch
iommu-disable-sva-when-config_x86-is-set.patch
iommu-exynos-fix-device-leak-on-of_xlate.patch
iommu-ipmmu-vmsa-fix-device-leak-on-of_xlate.patch
iommu-mediatek-fix-device-leak-on-of_xlate.patch
iommu-mediatek-v1-fix-device-leak-on-probe_device.patch
iommu-mediatek-v1-fix-device-leaks-on-probe.patch
iommu-omap-fix-device-leaks-on-probe_device.patch
iommu-qcom-fix-device-leak-on-of_xlate.patch
iommu-sun50i-fix-device-leak-on-of_xlate.patch
iommu-tegra-fix-device-leak-on-probe_device.patch
ntfs-do-not-overwrite-uptodate-pages.patch

25 files changed:
queue-6.12/asoc-codecs-lpass-tx-macro-fix-sm6115-support.patch [new file with mode: 0644]
queue-6.12/asoc-codecs-wcd939x-fix-regmap-leak-on-probe-failure.patch [new file with mode: 0644]
queue-6.12/asoc-qcom-q6adm-the-the-copp-device-only-during-last-instance.patch [new file with mode: 0644]
queue-6.12/asoc-qcom-q6apm-dai-set-flags-to-reflect-correct-operation-of-appl_ptr.patch [new file with mode: 0644]
queue-6.12/asoc-qcom-q6asm-dai-perform-correct-state-check-before-closing.patch [new file with mode: 0644]
queue-6.12/asoc-qcom-qdsp6-q6asm-dai-set-10-ms-period-and-buffer-alignment.patch [new file with mode: 0644]
queue-6.12/asoc-stm32-sai-fix-clk-prepare-imbalance-on-probe-failure.patch [new file with mode: 0644]
queue-6.12/asoc-stm32-sai-fix-device-leak-on-probe.patch [new file with mode: 0644]
queue-6.12/asoc-stm32-sai-fix-of-node-leak-on-probe.patch [new file with mode: 0644]
queue-6.12/hid-logitech-dj-remove-duplicate-error-logging.patch [new file with mode: 0644]
queue-6.12/iommu-amd-fix-pci_segment-memleak-in-alloc_pci_segment.patch [new file with mode: 0644]
queue-6.12/iommu-amd-propagate-the-error-code-returned-by-__modify_irte_ga-in-modify_irte_ga.patch [new file with mode: 0644]
queue-6.12/iommu-apple-dart-fix-device-leak-on-of_xlate.patch [new file with mode: 0644]
queue-6.12/iommu-disable-sva-when-config_x86-is-set.patch [new file with mode: 0644]
queue-6.12/iommu-exynos-fix-device-leak-on-of_xlate.patch [new file with mode: 0644]
queue-6.12/iommu-ipmmu-vmsa-fix-device-leak-on-of_xlate.patch [new file with mode: 0644]
queue-6.12/iommu-mediatek-fix-device-leak-on-of_xlate.patch [new file with mode: 0644]
queue-6.12/iommu-mediatek-v1-fix-device-leak-on-probe_device.patch [new file with mode: 0644]
queue-6.12/iommu-mediatek-v1-fix-device-leaks-on-probe.patch [new file with mode: 0644]
queue-6.12/iommu-omap-fix-device-leaks-on-probe_device.patch [new file with mode: 0644]
queue-6.12/iommu-qcom-fix-device-leak-on-of_xlate.patch [new file with mode: 0644]
queue-6.12/iommu-sun50i-fix-device-leak-on-of_xlate.patch [new file with mode: 0644]
queue-6.12/iommu-tegra-fix-device-leak-on-probe_device.patch [new file with mode: 0644]
queue-6.12/ntfs-do-not-overwrite-uptodate-pages.patch [new file with mode: 0644]
queue-6.12/series

diff --git a/queue-6.12/asoc-codecs-lpass-tx-macro-fix-sm6115-support.patch b/queue-6.12/asoc-codecs-lpass-tx-macro-fix-sm6115-support.patch
new file mode 100644 (file)
index 0000000..77a2f75
--- /dev/null
@@ -0,0 +1,36 @@
+From 7c63b5a8ed972a2c8c03d984f6a43349007cea93 Mon Sep 17 00:00:00 2001
+From: Srinivas Kandagatla <srinivas.kandagatla@oss.qualcomm.com>
+Date: Fri, 31 Oct 2025 12:06:58 +0000
+Subject: ASoC: codecs: lpass-tx-macro: fix SM6115 support
+
+From: Srinivas Kandagatla <srinivas.kandagatla@oss.qualcomm.com>
+
+commit 7c63b5a8ed972a2c8c03d984f6a43349007cea93 upstream.
+
+SM6115 does have soundwire controller in tx. For some reason
+we ended up with this incorrect patch.
+
+Fix this by adding the flag to reflect this in SoC data.
+
+Fixes: 510c46884299 ("ASoC: codecs: lpass-tx-macro: Add SM6115 support")
+Cc: Stable@vger.kernel.org
+Signed-off-by: Srinivas Kandagatla <srinivas.kandagatla@oss.qualcomm.com>
+Link: https://patch.msgid.link/20251031120703.590201-2-srinivas.kandagatla@oss.qualcomm.com
+Signed-off-by: Mark Brown <broonie@kernel.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ sound/soc/codecs/lpass-tx-macro.c |    3 ++-
+ 1 file changed, 2 insertions(+), 1 deletion(-)
+
+--- a/sound/soc/codecs/lpass-tx-macro.c
++++ b/sound/soc/codecs/lpass-tx-macro.c
+@@ -2474,7 +2474,8 @@ static const struct tx_macro_data lpass_
+ };
+ static const struct tx_macro_data lpass_ver_10_sm6115 = {
+-      .flags                  = LPASS_MACRO_FLAG_HAS_NPL_CLOCK,
++      .flags                  = LPASS_MACRO_FLAG_HAS_NPL_CLOCK |
++                                LPASS_MACRO_FLAG_RESET_SWR,
+       .ver                    = LPASS_VER_10_0_0,
+       .extra_widgets          = tx_macro_dapm_widgets_v9_2,
+       .extra_widgets_num      = ARRAY_SIZE(tx_macro_dapm_widgets_v9_2),
diff --git a/queue-6.12/asoc-codecs-wcd939x-fix-regmap-leak-on-probe-failure.patch b/queue-6.12/asoc-codecs-wcd939x-fix-regmap-leak-on-probe-failure.patch
new file mode 100644 (file)
index 0000000..17fba38
--- /dev/null
@@ -0,0 +1,47 @@
+From 86dc090f737953f16f8dc60c546ae7854690d4f6 Mon Sep 17 00:00:00 2001
+From: Johan Hovold <johan@kernel.org>
+Date: Thu, 27 Nov 2025 14:50:57 +0100
+Subject: ASoC: codecs: wcd939x: fix regmap leak on probe failure
+
+From: Johan Hovold <johan@kernel.org>
+
+commit 86dc090f737953f16f8dc60c546ae7854690d4f6 upstream.
+
+The soundwire regmap that may be allocated during probe is not freed on
+late probe failures.
+
+Add the missing error handling.
+
+Fixes: be2af391cea0 ("ASoC: codecs: Add WCD939x Soundwire devices driver")
+Cc: stable@vger.kernel.org     # 6.9
+Cc: Neil Armstrong <neil.armstrong@linaro.org>
+Signed-off-by: Johan Hovold <johan@kernel.org>
+Link: https://patch.msgid.link/20251127135057.2216-1-johan@kernel.org
+Signed-off-by: Mark Brown <broonie@kernel.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ sound/soc/codecs/wcd939x-sdw.c |    8 +++++++-
+ 1 file changed, 7 insertions(+), 1 deletion(-)
+
+--- a/sound/soc/codecs/wcd939x-sdw.c
++++ b/sound/soc/codecs/wcd939x-sdw.c
+@@ -1480,12 +1480,18 @@ static int wcd9390_probe(struct sdw_slav
+       ret = component_add(dev, &wcd939x_sdw_component_ops);
+       if (ret)
+-              return ret;
++              goto err_free_regmap;
+       /* Set suspended until aggregate device is bind */
+       pm_runtime_set_suspended(dev);
+       return 0;
++
++err_free_regmap:
++      if (wcd->regmap)
++              regmap_exit(wcd->regmap);
++
++      return ret;
+ }
+ static int wcd9390_remove(struct sdw_slave *pdev)
diff --git a/queue-6.12/asoc-qcom-q6adm-the-the-copp-device-only-during-last-instance.patch b/queue-6.12/asoc-qcom-q6adm-the-the-copp-device-only-during-last-instance.patch
new file mode 100644 (file)
index 0000000..2797032
--- /dev/null
@@ -0,0 +1,223 @@
+From 74cc4f3ea4e99262ba0d619c6a4ee33e2cd47f65 Mon Sep 17 00:00:00 2001
+From: Srinivas Kandagatla <srinivas.kandagatla@oss.qualcomm.com>
+Date: Thu, 23 Oct 2025 11:24:26 +0100
+Subject: ASoC: qcom: q6adm: the the copp device only during last instance
+
+From: Srinivas Kandagatla <srinivas.kandagatla@oss.qualcomm.com>
+
+commit 74cc4f3ea4e99262ba0d619c6a4ee33e2cd47f65 upstream.
+
+A matching Common object post processing instance is normally resused
+across multiple streams. However currently we close this on DSP
+even though there is a refcount on this copp object, this can result in
+below error.
+
+q6routing ab00000.remoteproc:glink-edge:apr:service@8:routing: Found Matching Copp 0x0
+qcom-q6adm aprsvc:service:4:8: cmd = 0x10325 return error = 0x2
+q6routing ab00000.remoteproc:glink-edge:apr:service@8:routing: DSP returned error[2]
+q6routing ab00000.remoteproc:glink-edge:apr:service@8:routing: Found Matching Copp 0x0
+qcom-q6adm aprsvc:service:4:8: cmd = 0x10325 return error = 0x2
+q6routing ab00000.remoteproc:glink-edge:apr:service@8:routing: DSP returned error[2]
+qcom-q6adm aprsvc:service:4:8: cmd = 0x10327 return error = 0x2
+qcom-q6adm aprsvc:service:4:8: DSP returned error[2]
+qcom-q6adm aprsvc:service:4:8: Failed to close copp -22
+qcom-q6adm aprsvc:service:4:8: cmd = 0x10327 return error = 0x2
+qcom-q6adm aprsvc:service:4:8: DSP returned error[2]
+qcom-q6adm aprsvc:service:4:8: Failed to close copp -22
+
+Fix this by addressing moving the adm_close to copp_kref destructor
+callback.
+
+Fixes: 7b20b2be51e1 ("ASoC: qdsp6: q6adm: Add q6adm driver")
+Cc: Stable@vger.kernel.org
+Reported-by: Martino Facchin <m.facchin@arduino.cc>
+Signed-off-by: Srinivas Kandagatla <srinivas.kandagatla@oss.qualcomm.com>
+Tested-by: Alexey Klimov <alexey.klimov@linaro.org> # RB5, RB3
+Link: https://patch.msgid.link/20251023102444.88158-3-srinivas.kandagatla@oss.qualcomm.com
+Signed-off-by: Mark Brown <broonie@kernel.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ sound/soc/qcom/qdsp6/q6adm.c |  146 ++++++++++++++++++++-----------------------
+ 1 file changed, 71 insertions(+), 75 deletions(-)
+
+--- a/sound/soc/qcom/qdsp6/q6adm.c
++++ b/sound/soc/qcom/qdsp6/q6adm.c
+@@ -109,11 +109,75 @@ static struct q6copp *q6adm_find_copp(st
+ }
++static int q6adm_apr_send_copp_pkt(struct q6adm *adm, struct q6copp *copp,
++                                 struct apr_pkt *pkt, uint32_t rsp_opcode)
++{
++      struct device *dev = adm->dev;
++      uint32_t opcode = pkt->hdr.opcode;
++      int ret;
++
++      mutex_lock(&adm->lock);
++      copp->result.opcode = 0;
++      copp->result.status = 0;
++      ret = apr_send_pkt(adm->apr, pkt);
++      if (ret < 0) {
++              dev_err(dev, "Failed to send APR packet\n");
++              ret = -EINVAL;
++              goto err;
++      }
++
++      /* Wait for the callback with copp id */
++      if (rsp_opcode)
++              ret = wait_event_timeout(copp->wait,
++                                       (copp->result.opcode == opcode) ||
++                                       (copp->result.opcode == rsp_opcode),
++                                       msecs_to_jiffies(TIMEOUT_MS));
++      else
++              ret = wait_event_timeout(copp->wait,
++                                       (copp->result.opcode == opcode),
++                                       msecs_to_jiffies(TIMEOUT_MS));
++
++      if (!ret) {
++              dev_err(dev, "ADM copp cmd timedout\n");
++              ret = -ETIMEDOUT;
++      } else if (copp->result.status > 0) {
++              dev_err(dev, "DSP returned error[%d]\n",
++                      copp->result.status);
++              ret = -EINVAL;
++      }
++
++err:
++      mutex_unlock(&adm->lock);
++      return ret;
++}
++
++static int q6adm_device_close(struct q6adm *adm, struct q6copp *copp,
++                            int port_id, int copp_idx)
++{
++      struct apr_pkt close;
++
++      close.hdr.hdr_field = APR_HDR_FIELD(APR_MSG_TYPE_SEQ_CMD,
++                                      APR_HDR_LEN(APR_HDR_SIZE),
++                                      APR_PKT_VER);
++      close.hdr.pkt_size = sizeof(close);
++      close.hdr.src_port = port_id;
++      close.hdr.dest_port = copp->id;
++      close.hdr.token = port_id << 16 | copp_idx;
++      close.hdr.opcode = ADM_CMD_DEVICE_CLOSE_V5;
++
++      return q6adm_apr_send_copp_pkt(adm, copp, &close, 0);
++}
++
+ static void q6adm_free_copp(struct kref *ref)
+ {
+       struct q6copp *c = container_of(ref, struct q6copp, refcount);
+       struct q6adm *adm = c->adm;
+       unsigned long flags;
++      int ret;
++
++      ret = q6adm_device_close(adm, c, c->afe_port, c->copp_idx);
++      if (ret < 0)
++              dev_err(adm->dev, "Failed to close copp %d\n", ret);
+       spin_lock_irqsave(&adm->copps_list_lock, flags);
+       clear_bit(c->copp_idx, &adm->copp_bitmap[c->afe_port]);
+@@ -155,13 +219,13 @@ static int q6adm_callback(struct apr_dev
+               switch (result->opcode) {
+               case ADM_CMD_DEVICE_OPEN_V5:
+               case ADM_CMD_DEVICE_CLOSE_V5:
+-                      copp = q6adm_find_copp(adm, port_idx, copp_idx);
+-                      if (!copp)
+-                              return 0;
+-
+-                      copp->result = *result;
+-                      wake_up(&copp->wait);
+-                      kref_put(&copp->refcount, q6adm_free_copp);
++                      list_for_each_entry(copp, &adm->copps_list, node) {
++                              if ((port_idx == copp->afe_port) && (copp_idx == copp->copp_idx)) {
++                                      copp->result = *result;
++                                      wake_up(&copp->wait);
++                                      break;
++                              }
++                      }
+                       break;
+               case ADM_CMD_MATRIX_MAP_ROUTINGS_V5:
+                       adm->result = *result;
+@@ -234,65 +298,6 @@ static struct q6copp *q6adm_alloc_copp(s
+       return c;
+ }
+-static int q6adm_apr_send_copp_pkt(struct q6adm *adm, struct q6copp *copp,
+-                                 struct apr_pkt *pkt, uint32_t rsp_opcode)
+-{
+-      struct device *dev = adm->dev;
+-      uint32_t opcode = pkt->hdr.opcode;
+-      int ret;
+-
+-      mutex_lock(&adm->lock);
+-      copp->result.opcode = 0;
+-      copp->result.status = 0;
+-      ret = apr_send_pkt(adm->apr, pkt);
+-      if (ret < 0) {
+-              dev_err(dev, "Failed to send APR packet\n");
+-              ret = -EINVAL;
+-              goto err;
+-      }
+-
+-      /* Wait for the callback with copp id */
+-      if (rsp_opcode)
+-              ret = wait_event_timeout(copp->wait,
+-                                       (copp->result.opcode == opcode) ||
+-                                       (copp->result.opcode == rsp_opcode),
+-                                       msecs_to_jiffies(TIMEOUT_MS));
+-      else
+-              ret = wait_event_timeout(copp->wait,
+-                                       (copp->result.opcode == opcode),
+-                                       msecs_to_jiffies(TIMEOUT_MS));
+-
+-      if (!ret) {
+-              dev_err(dev, "ADM copp cmd timedout\n");
+-              ret = -ETIMEDOUT;
+-      } else if (copp->result.status > 0) {
+-              dev_err(dev, "DSP returned error[%d]\n",
+-                      copp->result.status);
+-              ret = -EINVAL;
+-      }
+-
+-err:
+-      mutex_unlock(&adm->lock);
+-      return ret;
+-}
+-
+-static int q6adm_device_close(struct q6adm *adm, struct q6copp *copp,
+-                            int port_id, int copp_idx)
+-{
+-      struct apr_pkt close;
+-
+-      close.hdr.hdr_field = APR_HDR_FIELD(APR_MSG_TYPE_SEQ_CMD,
+-                                      APR_HDR_LEN(APR_HDR_SIZE),
+-                                      APR_PKT_VER);
+-      close.hdr.pkt_size = sizeof(close);
+-      close.hdr.src_port = port_id;
+-      close.hdr.dest_port = copp->id;
+-      close.hdr.token = port_id << 16 | copp_idx;
+-      close.hdr.opcode = ADM_CMD_DEVICE_CLOSE_V5;
+-
+-      return q6adm_apr_send_copp_pkt(adm, copp, &close, 0);
+-}
+-
+ static struct q6copp *q6adm_find_matching_copp(struct q6adm *adm,
+                                              int port_id, int topology,
+                                              int mode, int rate,
+@@ -567,15 +572,6 @@ EXPORT_SYMBOL_GPL(q6adm_matrix_map);
+  */
+ int q6adm_close(struct device *dev, struct q6copp *copp)
+ {
+-      struct q6adm *adm = dev_get_drvdata(dev->parent);
+-      int ret = 0;
+-
+-      ret = q6adm_device_close(adm, copp, copp->afe_port, copp->copp_idx);
+-      if (ret < 0) {
+-              dev_err(adm->dev, "Failed to close copp %d\n", ret);
+-              return ret;
+-      }
+-
+       kref_put(&copp->refcount, q6adm_free_copp);
+       return 0;
diff --git a/queue-6.12/asoc-qcom-q6apm-dai-set-flags-to-reflect-correct-operation-of-appl_ptr.patch b/queue-6.12/asoc-qcom-q6apm-dai-set-flags-to-reflect-correct-operation-of-appl_ptr.patch
new file mode 100644 (file)
index 0000000..ba37dde
--- /dev/null
@@ -0,0 +1,45 @@
+From 950a4e5788fc7dc6e8e93614a7d4d0449c39fb8d Mon Sep 17 00:00:00 2001
+From: Srinivas Kandagatla <srinivas.kandagatla@oss.qualcomm.com>
+Date: Thu, 23 Oct 2025 11:24:25 +0100
+Subject: ASoC: qcom: q6apm-dai: set flags to reflect correct operation of appl_ptr
+
+From: Srinivas Kandagatla <srinivas.kandagatla@oss.qualcomm.com>
+
+commit 950a4e5788fc7dc6e8e93614a7d4d0449c39fb8d upstream.
+
+Driver does not expect the appl_ptr to move backward and requires
+explict sync. Make sure that the userspace does not do appl_ptr rewinds
+by specifying the correct flags in pcm_info.
+
+Without this patch, the result could be a forever loop as current logic assumes
+that appl_ptr can only move forward.
+
+Fixes: 3d4a4411aa8b ("ASoC: q6apm-dai: schedule all available frames to avoid dsp under-runs")
+Cc: Stable@vger.kernel.org
+Signed-off-by: Srinivas Kandagatla <srinivas.kandagatla@oss.qualcomm.com>
+Tested-by: Alexey Klimov <alexey.klimov@linaro.org> # RB5, RB3
+Link: https://patch.msgid.link/20251023102444.88158-2-srinivas.kandagatla@oss.qualcomm.com
+Signed-off-by: Mark Brown <broonie@kernel.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ sound/soc/qcom/qdsp6/q6apm-dai.c |    2 ++
+ 1 file changed, 2 insertions(+)
+
+--- a/sound/soc/qcom/qdsp6/q6apm-dai.c
++++ b/sound/soc/qcom/qdsp6/q6apm-dai.c
+@@ -85,6 +85,7 @@ static const struct snd_pcm_hardware q6a
+       .info =                 (SNDRV_PCM_INFO_MMAP | SNDRV_PCM_INFO_BLOCK_TRANSFER |
+                                SNDRV_PCM_INFO_MMAP_VALID | SNDRV_PCM_INFO_INTERLEAVED |
+                                SNDRV_PCM_INFO_PAUSE | SNDRV_PCM_INFO_RESUME |
++                               SNDRV_PCM_INFO_NO_REWINDS | SNDRV_PCM_INFO_SYNC_APPLPTR |
+                                SNDRV_PCM_INFO_BATCH),
+       .formats =              (SNDRV_PCM_FMTBIT_S16_LE | SNDRV_PCM_FMTBIT_S24_LE),
+       .rates =                SNDRV_PCM_RATE_8000_48000,
+@@ -104,6 +105,7 @@ static const struct snd_pcm_hardware q6a
+       .info =                 (SNDRV_PCM_INFO_MMAP | SNDRV_PCM_INFO_BLOCK_TRANSFER |
+                                SNDRV_PCM_INFO_MMAP_VALID | SNDRV_PCM_INFO_INTERLEAVED |
+                                SNDRV_PCM_INFO_PAUSE | SNDRV_PCM_INFO_RESUME |
++                               SNDRV_PCM_INFO_NO_REWINDS | SNDRV_PCM_INFO_SYNC_APPLPTR |
+                                SNDRV_PCM_INFO_BATCH),
+       .formats =              (SNDRV_PCM_FMTBIT_S16_LE | SNDRV_PCM_FMTBIT_S24_LE),
+       .rates =                SNDRV_PCM_RATE_8000_192000,
diff --git a/queue-6.12/asoc-qcom-q6asm-dai-perform-correct-state-check-before-closing.patch b/queue-6.12/asoc-qcom-q6asm-dai-perform-correct-state-check-before-closing.patch
new file mode 100644 (file)
index 0000000..68bde54
--- /dev/null
@@ -0,0 +1,45 @@
+From bfbb12dfa144d45575bcfe139a71360b3ce80237 Mon Sep 17 00:00:00 2001
+From: Srinivas Kandagatla <srinivas.kandagatla@oss.qualcomm.com>
+Date: Thu, 23 Oct 2025 11:24:28 +0100
+Subject: ASoC: qcom: q6asm-dai: perform correct state check before closing
+
+From: Srinivas Kandagatla <srinivas.kandagatla@oss.qualcomm.com>
+
+commit bfbb12dfa144d45575bcfe139a71360b3ce80237 upstream.
+
+Do not stop a q6asm stream if its not started, this can result in
+unnecessary dsp command which will timeout anyway something like below:
+
+q6asm-dai ab00000.remoteproc:glink-edge:apr:service@7:dais: CMD 10bcd timeout
+
+Fix this by correctly checking the state.
+
+Fixes: 2a9e92d371db ("ASoC: qdsp6: q6asm: Add q6asm dai driver")
+Cc: Stable@vger.kernel.org
+Signed-off-by: Srinivas Kandagatla <srinivas.kandagatla@oss.qualcomm.com>
+Tested-by: Alexey Klimov <alexey.klimov@linaro.org> # RB5, RB3
+Link: https://patch.msgid.link/20251023102444.88158-5-srinivas.kandagatla@oss.qualcomm.com
+Signed-off-by: Mark Brown <broonie@kernel.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ sound/soc/qcom/qdsp6/q6asm-dai.c |    3 ++-
+ 1 file changed, 2 insertions(+), 1 deletion(-)
+
+--- a/sound/soc/qcom/qdsp6/q6asm-dai.c
++++ b/sound/soc/qcom/qdsp6/q6asm-dai.c
+@@ -232,13 +232,14 @@ static int q6asm_dai_prepare(struct snd_
+       prtd->pcm_count = snd_pcm_lib_period_bytes(substream);
+       prtd->pcm_irq_pos = 0;
+       /* rate and channels are sent to audio driver */
+-      if (prtd->state) {
++      if (prtd->state == Q6ASM_STREAM_RUNNING) {
+               /* clear the previous setup if any  */
+               q6asm_cmd(prtd->audio_client, prtd->stream_id, CMD_CLOSE);
+               q6asm_unmap_memory_regions(substream->stream,
+                                          prtd->audio_client);
+               q6routing_stream_close(soc_prtd->dai_link->id,
+                                        substream->stream);
++              prtd->state = Q6ASM_STREAM_STOPPED;
+       }
+       ret = q6asm_map_memory_regions(substream->stream, prtd->audio_client,
diff --git a/queue-6.12/asoc-qcom-qdsp6-q6asm-dai-set-10-ms-period-and-buffer-alignment.patch b/queue-6.12/asoc-qcom-qdsp6-q6asm-dai-set-10-ms-period-and-buffer-alignment.patch
new file mode 100644 (file)
index 0000000..d632872
--- /dev/null
@@ -0,0 +1,46 @@
+From 81c53b52de21b8d5a3de55ebd06b6bf188bf7efd Mon Sep 17 00:00:00 2001
+From: Srinivas Kandagatla <srinivas.kandagatla@oss.qualcomm.com>
+Date: Thu, 23 Oct 2025 11:24:27 +0100
+Subject: ASoC: qcom: qdsp6: q6asm-dai: set 10 ms period and buffer alignment.
+
+From: Srinivas Kandagatla <srinivas.kandagatla@oss.qualcomm.com>
+
+commit 81c53b52de21b8d5a3de55ebd06b6bf188bf7efd upstream.
+
+DSP expects the periods to be aligned to fragment sizes, currently
+setting up to hw constriants on periods bytes is not going to work
+correctly as we can endup with periods sizes aligned to 32 bytes however
+not aligned to fragment size.
+
+Update the constriants to use fragment size, and also set at step of
+10ms for period size to accommodate DSP requirements of 10ms latency.
+
+Fixes: 2a9e92d371db ("ASoC: qdsp6: q6asm: Add q6asm dai driver")
+Cc: Stable@vger.kernel.org
+Signed-off-by: Srinivas Kandagatla <srinivas.kandagatla@oss.qualcomm.com>
+Tested-by: Alexey Klimov <alexey.klimov@linaro.org> # RB5, RB3
+Link: https://patch.msgid.link/20251023102444.88158-4-srinivas.kandagatla@oss.qualcomm.com
+Signed-off-by: Mark Brown <broonie@kernel.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ sound/soc/qcom/qdsp6/q6asm-dai.c |    4 ++--
+ 1 file changed, 2 insertions(+), 2 deletions(-)
+
+--- a/sound/soc/qcom/qdsp6/q6asm-dai.c
++++ b/sound/soc/qcom/qdsp6/q6asm-dai.c
+@@ -403,13 +403,13 @@ static int q6asm_dai_open(struct snd_soc
+       }
+       ret = snd_pcm_hw_constraint_step(runtime, 0,
+-              SNDRV_PCM_HW_PARAM_PERIOD_BYTES, 32);
++              SNDRV_PCM_HW_PARAM_PERIOD_SIZE, 480);
+       if (ret < 0) {
+               dev_err(dev, "constraint for period bytes step ret = %d\n",
+                                                               ret);
+       }
+       ret = snd_pcm_hw_constraint_step(runtime, 0,
+-              SNDRV_PCM_HW_PARAM_BUFFER_BYTES, 32);
++              SNDRV_PCM_HW_PARAM_BUFFER_SIZE, 480);
+       if (ret < 0) {
+               dev_err(dev, "constraint for buffer bytes step ret = %d\n",
+                                                               ret);
diff --git a/queue-6.12/asoc-stm32-sai-fix-clk-prepare-imbalance-on-probe-failure.patch b/queue-6.12/asoc-stm32-sai-fix-clk-prepare-imbalance-on-probe-failure.patch
new file mode 100644 (file)
index 0000000..57a0fe7
--- /dev/null
@@ -0,0 +1,89 @@
+From 312ec2f0d9d1a5656f76d770bbf1d967e9289aa7 Mon Sep 17 00:00:00 2001
+From: Johan Hovold <johan@kernel.org>
+Date: Mon, 24 Nov 2025 11:49:06 +0100
+Subject: ASoC: stm32: sai: fix clk prepare imbalance on probe failure
+
+From: Johan Hovold <johan@kernel.org>
+
+commit 312ec2f0d9d1a5656f76d770bbf1d967e9289aa7 upstream.
+
+Make sure to unprepare the parent clock also on probe failures (e.g.
+probe deferral).
+
+Fixes: a14bf98c045b ("ASoC: stm32: sai: fix possible circular locking")
+Cc: stable@vger.kernel.org     # 5.5
+Cc: Olivier Moysan <olivier.moysan@st.com>
+Signed-off-by: Johan Hovold <johan@kernel.org>
+Reviewed-by: olivier moysan <olivier.moysan@foss.st.com>
+Link: https://patch.msgid.link/20251124104908.15754-3-johan@kernel.org
+Signed-off-by: Mark Brown <broonie@kernel.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ sound/soc/stm/stm32_sai_sub.c |   28 +++++++++++++++++++++-------
+ 1 file changed, 21 insertions(+), 7 deletions(-)
+
+--- a/sound/soc/stm/stm32_sai_sub.c
++++ b/sound/soc/stm/stm32_sai_sub.c
+@@ -1501,14 +1501,21 @@ static int stm32_sai_sub_parse_of(struct
+       if (of_property_present(np, "#clock-cells")) {
+               ret = stm32_sai_add_mclk_provider(sai);
+               if (ret < 0)
+-                      return ret;
++                      goto err_unprepare_pclk;
+       } else {
+               sai->sai_mclk = devm_clk_get_optional(&pdev->dev, "MCLK");
+-              if (IS_ERR(sai->sai_mclk))
+-                      return PTR_ERR(sai->sai_mclk);
++              if (IS_ERR(sai->sai_mclk)) {
++                      ret = PTR_ERR(sai->sai_mclk);
++                      goto err_unprepare_pclk;
++              }
+       }
+       return 0;
++
++err_unprepare_pclk:
++      clk_unprepare(sai->pdata->pclk);
++
++      return ret;
+ }
+ static int stm32_sai_sub_probe(struct platform_device *pdev)
+@@ -1548,26 +1555,33 @@ static int stm32_sai_sub_probe(struct pl
+                              IRQF_SHARED, dev_name(&pdev->dev), sai);
+       if (ret) {
+               dev_err(&pdev->dev, "IRQ request returned %d\n", ret);
+-              return ret;
++              goto err_unprepare_pclk;
+       }
+       if (STM_SAI_PROTOCOL_IS_SPDIF(sai))
+               conf = &stm32_sai_pcm_config_spdif;
+       ret = snd_dmaengine_pcm_register(&pdev->dev, conf, 0);
+-      if (ret)
+-              return dev_err_probe(&pdev->dev, ret, "Could not register pcm dma\n");
++      if (ret) {
++              ret = dev_err_probe(&pdev->dev, ret, "Could not register pcm dma\n");
++              goto err_unprepare_pclk;
++      }
+       ret = snd_soc_register_component(&pdev->dev, &stm32_component,
+                                        &sai->cpu_dai_drv, 1);
+       if (ret) {
+               snd_dmaengine_pcm_unregister(&pdev->dev);
+-              return ret;
++              goto err_unprepare_pclk;
+       }
+       pm_runtime_enable(&pdev->dev);
+       return 0;
++
++err_unprepare_pclk:
++      clk_unprepare(sai->pdata->pclk);
++
++      return ret;
+ }
+ static void stm32_sai_sub_remove(struct platform_device *pdev)
diff --git a/queue-6.12/asoc-stm32-sai-fix-device-leak-on-probe.patch b/queue-6.12/asoc-stm32-sai-fix-device-leak-on-probe.patch
new file mode 100644 (file)
index 0000000..973359d
--- /dev/null
@@ -0,0 +1,48 @@
+From e26ff429eaf10c4ef1bc3dabd9bf27eb54b7e1f4 Mon Sep 17 00:00:00 2001
+From: Johan Hovold <johan@kernel.org>
+Date: Mon, 24 Nov 2025 11:49:05 +0100
+Subject: ASoC: stm32: sai: fix device leak on probe
+
+From: Johan Hovold <johan@kernel.org>
+
+commit e26ff429eaf10c4ef1bc3dabd9bf27eb54b7e1f4 upstream.
+
+Make sure to drop the reference taken when looking up the sync provider
+device and its driver data during DAI probe on probe failures and on
+unbind.
+
+Note that holding a reference to a device does not prevent its driver
+data from going away so there is no point in keeping the reference.
+
+Fixes: 7dd0d835582f ("ASoC: stm32: sai: simplify sync modes management")
+Fixes: 1c3816a19487 ("ASoC: stm32: sai: add missing put_device()")
+Cc: stable@vger.kernel.org     # 4.16: 1c3816a19487
+Cc: olivier moysan <olivier.moysan@st.com>
+Cc: Wen Yang <yellowriver2010@hotmail.com>
+Signed-off-by: Johan Hovold <johan@kernel.org>
+Reviewed-by: olivier moysan <olivier.moysan@foss.st.com>
+Link: https://patch.msgid.link/20251124104908.15754-2-johan@kernel.org
+Signed-off-by: Mark Brown <broonie@kernel.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ sound/soc/stm/stm32_sai.c |    2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+--- a/sound/soc/stm/stm32_sai.c
++++ b/sound/soc/stm/stm32_sai.c
+@@ -127,6 +127,7 @@ static int stm32_sai_set_sync(struct stm
+       }
+       sai_provider = platform_get_drvdata(pdev);
++      put_device(&pdev->dev);
+       if (!sai_provider) {
+               dev_err(&sai_client->pdev->dev,
+                       "SAI sync provider data not found\n");
+@@ -143,7 +144,6 @@ static int stm32_sai_set_sync(struct stm
+       ret = stm32_sai_sync_conf_provider(sai_provider, synco);
+ error:
+-      put_device(&pdev->dev);
+       of_node_put(np_provider);
+       return ret;
+ }
diff --git a/queue-6.12/asoc-stm32-sai-fix-of-node-leak-on-probe.patch b/queue-6.12/asoc-stm32-sai-fix-of-node-leak-on-probe.patch
new file mode 100644 (file)
index 0000000..aa72b5a
--- /dev/null
@@ -0,0 +1,145 @@
+From 23261f0de09427367e99f39f588e31e2856a690e Mon Sep 17 00:00:00 2001
+From: Johan Hovold <johan@kernel.org>
+Date: Mon, 24 Nov 2025 11:49:07 +0100
+Subject: ASoC: stm32: sai: fix OF node leak on probe
+
+From: Johan Hovold <johan@kernel.org>
+
+commit 23261f0de09427367e99f39f588e31e2856a690e upstream.
+
+The reference taken to the sync provider OF node when probing the
+platform device is currently only dropped if the set_sync() callback
+fails during DAI probe.
+
+Make sure to drop the reference on platform probe failures (e.g. probe
+deferral) and on driver unbind.
+
+This also avoids a potential use-after-free in case the DAI is ever
+reprobed without first rebinding the platform driver.
+
+Fixes: 5914d285f6b7 ("ASoC: stm32: sai: Add synchronization support")
+Fixes: d4180b4c02e7 ("ASoC: stm32: sai: fix set_sync service")
+Cc: Olivier Moysan <olivier.moysan@st.com>
+Cc: stable@vger.kernel.org      # 4.16: d4180b4c02e7
+Signed-off-by: Johan Hovold <johan@kernel.org>
+Reviewed-by: olivier moysan <olivier.moysan@foss.st.com>
+Link: https://patch.msgid.link/20251124104908.15754-4-johan@kernel.org
+Signed-off-by: Mark Brown <broonie@kernel.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ sound/soc/stm/stm32_sai.c     |   12 +++---------
+ sound/soc/stm/stm32_sai_sub.c |   23 ++++++++++++++++-------
+ 2 files changed, 19 insertions(+), 16 deletions(-)
+
+--- a/sound/soc/stm/stm32_sai.c
++++ b/sound/soc/stm/stm32_sai.c
+@@ -122,7 +122,6 @@ static int stm32_sai_set_sync(struct stm
+       if (!pdev) {
+               dev_err(&sai_client->pdev->dev,
+                       "Device not found for node %pOFn\n", np_provider);
+-              of_node_put(np_provider);
+               return -ENODEV;
+       }
+@@ -131,21 +130,16 @@ static int stm32_sai_set_sync(struct stm
+       if (!sai_provider) {
+               dev_err(&sai_client->pdev->dev,
+                       "SAI sync provider data not found\n");
+-              ret = -EINVAL;
+-              goto error;
++              return -EINVAL;
+       }
+       /* Configure sync client */
+       ret = stm32_sai_sync_conf_client(sai_client, synci);
+       if (ret < 0)
+-              goto error;
++              return ret;
+       /* Configure sync provider */
+-      ret = stm32_sai_sync_conf_provider(sai_provider, synco);
+-
+-error:
+-      of_node_put(np_provider);
+-      return ret;
++      return stm32_sai_sync_conf_provider(sai_provider, synco);
+ }
+ static int stm32_sai_probe(struct platform_device *pdev)
+--- a/sound/soc/stm/stm32_sai_sub.c
++++ b/sound/soc/stm/stm32_sai_sub.c
+@@ -1453,7 +1453,8 @@ static int stm32_sai_sub_parse_of(struct
+                               dev_err(&pdev->dev,
+                                       "External synchro not supported\n");
+                               of_node_put(args.np);
+-                              return -EINVAL;
++                              ret = -EINVAL;
++                              goto err_put_sync_provider;
+                       }
+                       sai->sync = SAI_SYNC_EXTERNAL;
+@@ -1462,7 +1463,8 @@ static int stm32_sai_sub_parse_of(struct
+                           (sai->synci > (SAI_GCR_SYNCIN_MAX + 1))) {
+                               dev_err(&pdev->dev, "Wrong SAI index\n");
+                               of_node_put(args.np);
+-                              return -EINVAL;
++                              ret = -EINVAL;
++                              goto err_put_sync_provider;
+                       }
+                       if (of_property_match_string(args.np, "compatible",
+@@ -1476,7 +1478,8 @@ static int stm32_sai_sub_parse_of(struct
+                       if (!sai->synco) {
+                               dev_err(&pdev->dev, "Unknown SAI sub-block\n");
+                               of_node_put(args.np);
+-                              return -EINVAL;
++                              ret = -EINVAL;
++                              goto err_put_sync_provider;
+                       }
+               }
+@@ -1486,13 +1489,15 @@ static int stm32_sai_sub_parse_of(struct
+       of_node_put(args.np);
+       sai->sai_ck = devm_clk_get(&pdev->dev, "sai_ck");
+-      if (IS_ERR(sai->sai_ck))
+-              return dev_err_probe(&pdev->dev, PTR_ERR(sai->sai_ck),
+-                                   "Missing kernel clock sai_ck\n");
++      if (IS_ERR(sai->sai_ck)) {
++              ret = dev_err_probe(&pdev->dev, PTR_ERR(sai->sai_ck),
++                                  "Missing kernel clock sai_ck\n");
++              goto err_put_sync_provider;
++      }
+       ret = clk_prepare(sai->pdata->pclk);
+       if (ret < 0)
+-              return ret;
++              goto err_put_sync_provider;
+       if (STM_SAI_IS_F4(sai->pdata))
+               return 0;
+@@ -1514,6 +1519,8 @@ static int stm32_sai_sub_parse_of(struct
+ err_unprepare_pclk:
+       clk_unprepare(sai->pdata->pclk);
++err_put_sync_provider:
++      of_node_put(sai->np_sync_provider);
+       return ret;
+ }
+@@ -1580,6 +1587,7 @@ static int stm32_sai_sub_probe(struct pl
+ err_unprepare_pclk:
+       clk_unprepare(sai->pdata->pclk);
++      of_node_put(sai->np_sync_provider);
+       return ret;
+ }
+@@ -1592,6 +1600,7 @@ static void stm32_sai_sub_remove(struct
+       snd_dmaengine_pcm_unregister(&pdev->dev);
+       snd_soc_unregister_component(&pdev->dev);
+       pm_runtime_disable(&pdev->dev);
++      of_node_put(sai->np_sync_provider);
+ }
+ #ifdef CONFIG_PM_SLEEP
diff --git a/queue-6.12/hid-logitech-dj-remove-duplicate-error-logging.patch b/queue-6.12/hid-logitech-dj-remove-duplicate-error-logging.patch
new file mode 100644 (file)
index 0000000..b749316
--- /dev/null
@@ -0,0 +1,163 @@
+From ca389a55d8b2d86a817433bf82e0602b68c4d541 Mon Sep 17 00:00:00 2001
+From: Hans de Goede <johannes.goede@oss.qualcomm.com>
+Date: Sat, 8 Nov 2025 22:03:18 +0100
+Subject: HID: logitech-dj: Remove duplicate error logging
+
+From: Hans de Goede <johannes.goede@oss.qualcomm.com>
+
+commit ca389a55d8b2d86a817433bf82e0602b68c4d541 upstream.
+
+logi_dj_recv_query_paired_devices() and logi_dj_recv_switch_to_dj_mode()
+both have 2 callers which all log an error if the function fails. Move
+the error logging to inside these 2 functions to remove the duplicated
+error logging in the callers.
+
+While at it also move the logi_dj_recv_send_report() call error handling
+in logi_dj_recv_switch_to_dj_mode() to directly after the call. That call
+only fails if the report cannot be found and in that case it does nothing,
+so the msleep() is not necessary on failures.
+
+Fixes: 6f20d3261265 ("HID: logitech-dj: Fix error handling in logi_dj_recv_switch_to_dj_mode()")
+Cc: stable@vger.kernel.org
+Signed-off-by: Hans de Goede <johannes.goede@oss.qualcomm.com>
+Signed-off-by: Jiri Kosina <jkosina@suse.com>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/hid/hid-logitech-dj.c |   56 +++++++++++++++++-------------------------
+ 1 file changed, 23 insertions(+), 33 deletions(-)
+
+--- a/drivers/hid/hid-logitech-dj.c
++++ b/drivers/hid/hid-logitech-dj.c
+@@ -805,7 +805,6 @@ static void delayedwork_callback(struct
+       struct dj_workitem workitem;
+       unsigned long flags;
+       int count;
+-      int retval;
+       dbg_hid("%s\n", __func__);
+@@ -842,11 +841,7 @@ static void delayedwork_callback(struct
+               logi_dj_recv_destroy_djhid_device(djrcv_dev, &workitem);
+               break;
+       case WORKITEM_TYPE_UNKNOWN:
+-              retval = logi_dj_recv_query_paired_devices(djrcv_dev);
+-              if (retval) {
+-                      hid_err(djrcv_dev->hidpp, "%s: logi_dj_recv_query_paired_devices error: %d\n",
+-                              __func__, retval);
+-              }
++              logi_dj_recv_query_paired_devices(djrcv_dev);
+               break;
+       case WORKITEM_TYPE_EMPTY:
+               dbg_hid("%s: device list is empty\n", __func__);
+@@ -1239,8 +1234,10 @@ static int logi_dj_recv_query_paired_dev
+       djrcv_dev->last_query = jiffies;
+-      if (djrcv_dev->type != recvr_type_dj)
+-              return logi_dj_recv_query_hidpp_devices(djrcv_dev);
++      if (djrcv_dev->type != recvr_type_dj) {
++              retval = logi_dj_recv_query_hidpp_devices(djrcv_dev);
++              goto out;
++      }
+       dj_report = kzalloc(sizeof(struct dj_report), GFP_KERNEL);
+       if (!dj_report)
+@@ -1250,6 +1247,10 @@ static int logi_dj_recv_query_paired_dev
+       dj_report->report_type = REPORT_TYPE_CMD_GET_PAIRED_DEVICES;
+       retval = logi_dj_recv_send_report(djrcv_dev, dj_report);
+       kfree(dj_report);
++out:
++      if (retval < 0)
++              hid_err(djrcv_dev->hidpp, "%s error:%d\n", __func__, retval);
++
+       return retval;
+ }
+@@ -1275,6 +1276,8 @@ static int logi_dj_recv_switch_to_dj_mod
+                                                               (u8)timeout;
+               retval = logi_dj_recv_send_report(djrcv_dev, dj_report);
++              if (retval)
++                      goto out;
+               /*
+                * Ugly sleep to work around a USB 3.0 bug when the receiver is
+@@ -1283,11 +1286,6 @@ static int logi_dj_recv_switch_to_dj_mod
+                * 50 msec should gives enough time to the receiver to be ready.
+                */
+               msleep(50);
+-
+-              if (retval) {
+-                      kfree(dj_report);
+-                      return retval;
+-              }
+       }
+       /*
+@@ -1313,7 +1311,12 @@ static int logi_dj_recv_switch_to_dj_mod
+                       HIDPP_REPORT_SHORT_LENGTH, HID_OUTPUT_REPORT,
+                       HID_REQ_SET_REPORT);
++out:
+       kfree(dj_report);
++
++      if (retval < 0)
++              hid_err(hdev, "%s error:%d\n", __func__, retval);
++
+       return retval;
+ }
+@@ -1835,11 +1838,8 @@ static int logi_dj_probe(struct hid_devi
+       if (has_hidpp) {
+               retval = logi_dj_recv_switch_to_dj_mode(djrcv_dev, 0);
+-              if (retval < 0) {
+-                      hid_err(hdev, "%s: logi_dj_recv_switch_to_dj_mode returned error:%d\n",
+-                              __func__, retval);
++              if (retval < 0)
+                       goto switch_to_dj_mode_fail;
+-              }
+       }
+       /* This is enabling the polling urb on the IN endpoint */
+@@ -1857,15 +1857,11 @@ static int logi_dj_probe(struct hid_devi
+               spin_lock_irqsave(&djrcv_dev->lock, flags);
+               djrcv_dev->ready = true;
+               spin_unlock_irqrestore(&djrcv_dev->lock, flags);
+-              retval = logi_dj_recv_query_paired_devices(djrcv_dev);
+-              if (retval < 0) {
+-                      hid_err(hdev, "%s: logi_dj_recv_query_paired_devices error:%d\n",
+-                              __func__, retval);
+-                      /*
+-                       * This can happen with a KVM, let the probe succeed,
+-                       * logi_dj_recv_queue_unknown_work will retry later.
+-                       */
+-              }
++              /*
++               * This can fail with a KVM. Ignore errors to let the probe
++               * succeed, logi_dj_recv_queue_unknown_work will retry later.
++               */
++              logi_dj_recv_query_paired_devices(djrcv_dev);
+       }
+       return 0;
+@@ -1882,18 +1878,12 @@ hid_hw_start_fail:
+ #ifdef CONFIG_PM
+ static int logi_dj_reset_resume(struct hid_device *hdev)
+ {
+-      int retval;
+       struct dj_receiver_dev *djrcv_dev = hid_get_drvdata(hdev);
+       if (!djrcv_dev || djrcv_dev->hidpp != hdev)
+               return 0;
+-      retval = logi_dj_recv_switch_to_dj_mode(djrcv_dev, 0);
+-      if (retval < 0) {
+-              hid_err(hdev, "%s: logi_dj_recv_switch_to_dj_mode returned error:%d\n",
+-                      __func__, retval);
+-      }
+-
++      logi_dj_recv_switch_to_dj_mode(djrcv_dev, 0);
+       return 0;
+ }
+ #endif
diff --git a/queue-6.12/iommu-amd-fix-pci_segment-memleak-in-alloc_pci_segment.patch b/queue-6.12/iommu-amd-fix-pci_segment-memleak-in-alloc_pci_segment.patch
new file mode 100644 (file)
index 0000000..7f6a124
--- /dev/null
@@ -0,0 +1,51 @@
+From 75ba146c2674ba49ed8a222c67f9abfb4a4f2a4f Mon Sep 17 00:00:00 2001
+From: Jinhui Guo <guojinhui.liam@bytedance.com>
+Date: Tue, 28 Oct 2025 00:50:17 +0800
+Subject: iommu/amd: Fix pci_segment memleak in alloc_pci_segment()
+
+From: Jinhui Guo <guojinhui.liam@bytedance.com>
+
+commit 75ba146c2674ba49ed8a222c67f9abfb4a4f2a4f upstream.
+
+Fix a memory leak of struct amd_iommu_pci_segment in alloc_pci_segment()
+when system memory (or contiguous memory) is insufficient.
+
+Fixes: 04230c119930 ("iommu/amd: Introduce per PCI segment device table")
+Fixes: eda797a27795 ("iommu/amd: Introduce per PCI segment rlookup table")
+Fixes: 99fc4ac3d297 ("iommu/amd: Introduce per PCI segment alias_table")
+Cc: stable@vger.kernel.org
+Signed-off-by: Jinhui Guo <guojinhui.liam@bytedance.com>
+Signed-off-by: Joerg Roedel <joerg.roedel@amd.com>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/iommu/amd/init.c |   15 ++++++++++++---
+ 1 file changed, 12 insertions(+), 3 deletions(-)
+
+--- a/drivers/iommu/amd/init.c
++++ b/drivers/iommu/amd/init.c
+@@ -1602,13 +1602,22 @@ static struct amd_iommu_pci_seg *__init
+       list_add_tail(&pci_seg->list, &amd_iommu_pci_seg_list);
+       if (alloc_dev_table(pci_seg))
+-              return NULL;
++              goto err_free_pci_seg;
+       if (alloc_alias_table(pci_seg))
+-              return NULL;
++              goto err_free_dev_table;
+       if (alloc_rlookup_table(pci_seg))
+-              return NULL;
++              goto err_free_alias_table;
+       return pci_seg;
++
++err_free_alias_table:
++      free_alias_table(pci_seg);
++err_free_dev_table:
++      free_dev_table(pci_seg);
++err_free_pci_seg:
++      list_del(&pci_seg->list);
++      kfree(pci_seg);
++      return NULL;
+ }
+ static struct amd_iommu_pci_seg *__init get_pci_segment(u16 id,
diff --git a/queue-6.12/iommu-amd-propagate-the-error-code-returned-by-__modify_irte_ga-in-modify_irte_ga.patch b/queue-6.12/iommu-amd-propagate-the-error-code-returned-by-__modify_irte_ga-in-modify_irte_ga.patch
new file mode 100644 (file)
index 0000000..900e6f4
--- /dev/null
@@ -0,0 +1,35 @@
+From 2381a1b40be4b286062fb3cf67dd7f005692aa2a Mon Sep 17 00:00:00 2001
+From: Jinhui Guo <guojinhui.liam@bytedance.com>
+Date: Thu, 20 Nov 2025 23:47:25 +0800
+Subject: iommu/amd: Propagate the error code returned by __modify_irte_ga() in modify_irte_ga()
+
+From: Jinhui Guo <guojinhui.liam@bytedance.com>
+
+commit 2381a1b40be4b286062fb3cf67dd7f005692aa2a upstream.
+
+The return type of __modify_irte_ga() is int, but modify_irte_ga()
+treats it as a bool. Casting the int to bool discards the error code.
+
+To fix the issue, change the type of ret to int in modify_irte_ga().
+
+Fixes: 57cdb720eaa5 ("iommu/amd: Do not flush IRTE when only updating isRun and destination fields")
+Cc: stable@vger.kernel.org
+Signed-off-by: Jinhui Guo <guojinhui.liam@bytedance.com>
+Reviewed-by: Vasant Hegde <vasant.hegde@amd.com>
+Signed-off-by: Joerg Roedel <joerg.roedel@amd.com>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/iommu/amd/iommu.c |    2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+--- a/drivers/iommu/amd/iommu.c
++++ b/drivers/iommu/amd/iommu.c
+@@ -3172,7 +3172,7 @@ static int __modify_irte_ga(struct amd_i
+ static int modify_irte_ga(struct amd_iommu *iommu, u16 devid, int index,
+                         struct irte_ga *irte)
+ {
+-      bool ret;
++      int ret;
+       ret = __modify_irte_ga(iommu, devid, index, irte);
+       if (ret)
diff --git a/queue-6.12/iommu-apple-dart-fix-device-leak-on-of_xlate.patch b/queue-6.12/iommu-apple-dart-fix-device-leak-on-of_xlate.patch
new file mode 100644 (file)
index 0000000..4ae7c84
--- /dev/null
@@ -0,0 +1,34 @@
+From a6eaa872c52a181ae9a290fd4e40c9df91166d7a Mon Sep 17 00:00:00 2001
+From: Johan Hovold <johan@kernel.org>
+Date: Mon, 20 Oct 2025 06:53:05 +0200
+Subject: iommu/apple-dart: fix device leak on of_xlate()
+
+From: Johan Hovold <johan@kernel.org>
+
+commit a6eaa872c52a181ae9a290fd4e40c9df91166d7a upstream.
+
+Make sure to drop the reference taken to the iommu platform device when
+looking up its driver data during of_xlate().
+
+Fixes: 46d1fb072e76 ("iommu/dart: Add DART iommu driver")
+Cc: stable@vger.kernel.org     # 5.15
+Cc: Sven Peter <sven@kernel.org>
+Acked-by: Robin Murphy <robin.murphy@arm.com>
+Signed-off-by: Johan Hovold <johan@kernel.org>
+Signed-off-by: Joerg Roedel <joerg.roedel@amd.com>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/iommu/apple-dart.c |    2 ++
+ 1 file changed, 2 insertions(+)
+
+--- a/drivers/iommu/apple-dart.c
++++ b/drivers/iommu/apple-dart.c
+@@ -790,6 +790,8 @@ static int apple_dart_of_xlate(struct de
+       struct apple_dart *cfg_dart;
+       int i, sid;
++      put_device(&iommu_pdev->dev);
++
+       if (args->args_count != 1)
+               return -EINVAL;
+       sid = args->args[0];
diff --git a/queue-6.12/iommu-disable-sva-when-config_x86-is-set.patch b/queue-6.12/iommu-disable-sva-when-config_x86-is-set.patch
new file mode 100644 (file)
index 0000000..3a5792e
--- /dev/null
@@ -0,0 +1,106 @@
+From 72f98ef9a4be30d2a60136dd6faee376f780d06c Mon Sep 17 00:00:00 2001
+From: Lu Baolu <baolu.lu@linux.intel.com>
+Date: Wed, 22 Oct 2025 16:26:27 +0800
+Subject: iommu: disable SVA when CONFIG_X86 is set
+
+From: Lu Baolu <baolu.lu@linux.intel.com>
+
+commit 72f98ef9a4be30d2a60136dd6faee376f780d06c upstream.
+
+Patch series "Fix stale IOTLB entries for kernel address space", v7.
+
+This proposes a fix for a security vulnerability related to IOMMU Shared
+Virtual Addressing (SVA).  In an SVA context, an IOMMU can cache kernel
+page table entries.  When a kernel page table page is freed and
+reallocated for another purpose, the IOMMU might still hold stale,
+incorrect entries.  This can be exploited to cause a use-after-free or
+write-after-free condition, potentially leading to privilege escalation or
+data corruption.
+
+This solution introduces a deferred freeing mechanism for kernel page
+table pages, which provides a safe window to notify the IOMMU to
+invalidate its caches before the page is reused.
+
+
+This patch (of 8):
+
+In the IOMMU Shared Virtual Addressing (SVA) context, the IOMMU hardware
+shares and walks the CPU's page tables.  The x86 architecture maps the
+kernel's virtual address space into the upper portion of every process's
+page table.  Consequently, in an SVA context, the IOMMU hardware can walk
+and cache kernel page table entries.
+
+The Linux kernel currently lacks a notification mechanism for kernel page
+table changes, specifically when page table pages are freed and reused.
+The IOMMU driver is only notified of changes to user virtual address
+mappings.  This can cause the IOMMU's internal caches to retain stale
+entries for kernel VA.
+
+Use-After-Free (UAF) and Write-After-Free (WAF) conditions arise when
+kernel page table pages are freed and later reallocated.  The IOMMU could
+misinterpret the new data as valid page table entries.  The IOMMU might
+then walk into attacker-controlled memory, leading to arbitrary physical
+memory DMA access or privilege escalation.  This is also a
+Write-After-Free issue, as the IOMMU will potentially continue to write
+Accessed and Dirty bits to the freed memory while attempting to walk the
+stale page tables.
+
+Currently, SVA contexts are unprivileged and cannot access kernel
+mappings.  However, the IOMMU will still walk kernel-only page tables all
+the way down to the leaf entries, where it realizes the mapping is for the
+kernel and errors out.  This means the IOMMU still caches these
+intermediate page table entries, making the described vulnerability a real
+concern.
+
+Disable SVA on x86 architecture until the IOMMU can receive notification
+to flush the paging cache before freeing the CPU kernel page table pages.
+
+Link: https://lkml.kernel.org/r/20251022082635.2462433-1-baolu.lu@linux.intel.com
+Link: https://lkml.kernel.org/r/20251022082635.2462433-2-baolu.lu@linux.intel.com
+Fixes: 26b25a2b98e4 ("iommu: Bind process address spaces to devices")
+Signed-off-by: Lu Baolu <baolu.lu@linux.intel.com>
+Suggested-by: Jason Gunthorpe <jgg@nvidia.com>
+Reviewed-by: Jason Gunthorpe <jgg@nvidia.com>
+Cc: Alistair Popple <apopple@nvidia.com>
+Cc: Andy Lutomirski <luto@kernel.org>
+Cc: Borislav Betkov <bp@alien8.de>
+Cc: Dave Hansen <dave.hansen@intel.com>
+Cc: David Hildenbrand <david@redhat.com>
+Cc: Ingo Molnar <mingo@redhat.com>
+Cc: Jann Horn <jannh@google.com>
+Cc: Jean-Philippe Brucker <jean-philippe@linaro.org>
+Cc: Joerg Roedel <joro@8bytes.org>
+Cc: Kevin Tian <kevin.tian@intel.com>
+Cc: Liam Howlett <liam.howlett@oracle.com>
+Cc: Lorenzo Stoakes <lorenzo.stoakes@oracle.com>
+Cc: Matthew Wilcox (Oracle) <willy@infradead.org>
+Cc: Michal Hocko <mhocko@kernel.org>
+Cc: Mike Rapoport <rppt@kernel.org>
+Cc: Peter Zijlstra <peterz@infradead.org>
+Cc: Robin Murohy <robin.murphy@arm.com>
+Cc: Thomas Gleinxer <tglx@linutronix.de>
+Cc: "Uladzislau Rezki (Sony)" <urezki@gmail.com>
+Cc: Vasant Hegde <vasant.hegde@amd.com>
+Cc: Vinicius Costa Gomes <vinicius.gomes@intel.com>
+Cc: Vlastimil Babka <vbabka@suse.cz>
+Cc: Will Deacon <will@kernel.org>
+Cc: Yi Lai <yi1.lai@intel.com>
+Cc: <stable@vger.kernel.org>
+Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/iommu/iommu-sva.c |    3 +++
+ 1 file changed, 3 insertions(+)
+
+--- a/drivers/iommu/iommu-sva.c
++++ b/drivers/iommu/iommu-sva.c
+@@ -80,6 +80,9 @@ struct iommu_sva *iommu_sva_bind_device(
+       if (!group)
+               return ERR_PTR(-ENODEV);
++      if (IS_ENABLED(CONFIG_X86))
++              return ERR_PTR(-EOPNOTSUPP);
++
+       mutex_lock(&iommu_sva_lock);
+       /* Allocate mm->pasid if necessary. */
diff --git a/queue-6.12/iommu-exynos-fix-device-leak-on-of_xlate.patch b/queue-6.12/iommu-exynos-fix-device-leak-on-of_xlate.patch
new file mode 100644 (file)
index 0000000..faa6e2b
--- /dev/null
@@ -0,0 +1,51 @@
+From 05913cc43cb122f9afecdbe775115c058b906e1b Mon Sep 17 00:00:00 2001
+From: Johan Hovold <johan@kernel.org>
+Date: Mon, 20 Oct 2025 06:53:07 +0200
+Subject: iommu/exynos: fix device leak on of_xlate()
+
+From: Johan Hovold <johan@kernel.org>
+
+commit 05913cc43cb122f9afecdbe775115c058b906e1b upstream.
+
+Make sure to drop the reference taken to the iommu platform device when
+looking up its driver data during of_xlate().
+
+Note that commit 1a26044954a6 ("iommu/exynos: add missing put_device()
+call in exynos_iommu_of_xlate()") fixed the leak in a couple of error
+paths, but the reference is still leaking on success.
+
+Fixes: aa759fd376fb ("iommu/exynos: Add callback for initializing devices from device tree")
+Cc: stable@vger.kernel.org     # 4.2: 1a26044954a6
+Cc: Yu Kuai <yukuai3@huawei.com>
+Acked-by: Robin Murphy <robin.murphy@arm.com>
+Acked-by: Marek Szyprowski <m.szyprowski@samsung.com>
+Signed-off-by: Johan Hovold <johan@kernel.org>
+Signed-off-by: Joerg Roedel <joerg.roedel@amd.com>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/iommu/exynos-iommu.c |    9 +++------
+ 1 file changed, 3 insertions(+), 6 deletions(-)
+
+--- a/drivers/iommu/exynos-iommu.c
++++ b/drivers/iommu/exynos-iommu.c
+@@ -1443,17 +1443,14 @@ static int exynos_iommu_of_xlate(struct
+               return -ENODEV;
+       data = platform_get_drvdata(sysmmu);
+-      if (!data) {
+-              put_device(&sysmmu->dev);
++      put_device(&sysmmu->dev);
++      if (!data)
+               return -ENODEV;
+-      }
+       if (!owner) {
+               owner = kzalloc(sizeof(*owner), GFP_KERNEL);
+-              if (!owner) {
+-                      put_device(&sysmmu->dev);
++              if (!owner)
+                       return -ENOMEM;
+-              }
+               INIT_LIST_HEAD(&owner->controllers);
+               mutex_init(&owner->rpm_lock);
diff --git a/queue-6.12/iommu-ipmmu-vmsa-fix-device-leak-on-of_xlate.patch b/queue-6.12/iommu-ipmmu-vmsa-fix-device-leak-on-of_xlate.patch
new file mode 100644 (file)
index 0000000..e816561
--- /dev/null
@@ -0,0 +1,34 @@
+From 80aa518452c4aceb9459f9a8e3184db657d1b441 Mon Sep 17 00:00:00 2001
+From: Johan Hovold <johan@kernel.org>
+Date: Mon, 20 Oct 2025 06:53:08 +0200
+Subject: iommu/ipmmu-vmsa: fix device leak on of_xlate()
+
+From: Johan Hovold <johan@kernel.org>
+
+commit 80aa518452c4aceb9459f9a8e3184db657d1b441 upstream.
+
+Make sure to drop the reference taken to the iommu platform device when
+looking up its driver data during of_xlate().
+
+Fixes: 7b2d59611fef ("iommu/ipmmu-vmsa: Replace local utlb code with fwspec ids")
+Cc: stable@vger.kernel.org     # 4.14
+Cc: Magnus Damm <damm+renesas@opensource.se>
+Acked-by: Robin Murphy <robin.murphy@arm.com>
+Signed-off-by: Johan Hovold <johan@kernel.org>
+Signed-off-by: Joerg Roedel <joerg.roedel@amd.com>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/iommu/ipmmu-vmsa.c |    2 ++
+ 1 file changed, 2 insertions(+)
+
+--- a/drivers/iommu/ipmmu-vmsa.c
++++ b/drivers/iommu/ipmmu-vmsa.c
+@@ -719,6 +719,8 @@ static int ipmmu_init_platform_device(st
+       dev_iommu_priv_set(dev, platform_get_drvdata(ipmmu_pdev));
++      put_device(&ipmmu_pdev->dev);
++
+       return 0;
+ }
diff --git a/queue-6.12/iommu-mediatek-fix-device-leak-on-of_xlate.patch b/queue-6.12/iommu-mediatek-fix-device-leak-on-of_xlate.patch
new file mode 100644 (file)
index 0000000..a2a35bd
--- /dev/null
@@ -0,0 +1,35 @@
+From b3f1ee18280363ef17f82b564fc379ceba9ec86f Mon Sep 17 00:00:00 2001
+From: Johan Hovold <johan@kernel.org>
+Date: Mon, 20 Oct 2025 06:53:09 +0200
+Subject: iommu/mediatek: fix device leak on of_xlate()
+
+From: Johan Hovold <johan@kernel.org>
+
+commit b3f1ee18280363ef17f82b564fc379ceba9ec86f upstream.
+
+Make sure to drop the reference taken to the iommu platform device when
+looking up its driver data during of_xlate().
+
+Fixes: 0df4fabe208d ("iommu/mediatek: Add mt8173 IOMMU driver")
+Cc: stable@vger.kernel.org     # 4.6
+Acked-by: Robin Murphy <robin.murphy@arm.com>
+Reviewed-by: Yong Wu <yong.wu@mediatek.com>
+Signed-off-by: Johan Hovold <johan@kernel.org>
+Reviewed-by: AngeloGioacchino Del Regno <angelogioacchino.delregno@collabora.com>
+Signed-off-by: Joerg Roedel <joerg.roedel@amd.com>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/iommu/mtk_iommu.c |    2 ++
+ 1 file changed, 2 insertions(+)
+
+--- a/drivers/iommu/mtk_iommu.c
++++ b/drivers/iommu/mtk_iommu.c
+@@ -975,6 +975,8 @@ static int mtk_iommu_of_xlate(struct dev
+                       return -EINVAL;
+               dev_iommu_priv_set(dev, platform_get_drvdata(m4updev));
++
++              put_device(&m4updev->dev);
+       }
+       return iommu_fwspec_add_ids(dev, args->args, 1);
diff --git a/queue-6.12/iommu-mediatek-v1-fix-device-leak-on-probe_device.patch b/queue-6.12/iommu-mediatek-v1-fix-device-leak-on-probe_device.patch
new file mode 100644 (file)
index 0000000..c3fbd4e
--- /dev/null
@@ -0,0 +1,36 @@
+From c77ad28bfee0df9cbc719eb5adc9864462cfb65b Mon Sep 17 00:00:00 2001
+From: Johan Hovold <johan@kernel.org>
+Date: Mon, 20 Oct 2025 06:53:12 +0200
+Subject: iommu/mediatek-v1: fix device leak on probe_device()
+
+From: Johan Hovold <johan@kernel.org>
+
+commit c77ad28bfee0df9cbc719eb5adc9864462cfb65b upstream.
+
+Make sure to drop the reference taken to the iommu platform device when
+looking up its driver data during probe_device().
+
+Fixes: b17336c55d89 ("iommu/mediatek: add support for mtk iommu generation one HW")
+Cc: stable@vger.kernel.org     # 4.8
+Cc: Honghui Zhang <honghui.zhang@mediatek.com>
+Acked-by: Robin Murphy <robin.murphy@arm.com>
+Reviewed-by: Yong Wu <yong.wu@mediatek.com>
+Signed-off-by: Johan Hovold <johan@kernel.org>
+Reviewed-by: AngeloGioacchino Del Regno <angelogioacchino.delregno@collabora.com>
+Signed-off-by: Joerg Roedel <joerg.roedel@amd.com>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/iommu/mtk_iommu_v1.c |    2 ++
+ 1 file changed, 2 insertions(+)
+
+--- a/drivers/iommu/mtk_iommu_v1.c
++++ b/drivers/iommu/mtk_iommu_v1.c
+@@ -423,6 +423,8 @@ static int mtk_iommu_v1_create_mapping(s
+                       return -EINVAL;
+               dev_iommu_priv_set(dev, platform_get_drvdata(m4updev));
++
++              put_device(&m4updev->dev);
+       }
+       ret = iommu_fwspec_add_ids(dev, args->args, 1);
diff --git a/queue-6.12/iommu-mediatek-v1-fix-device-leaks-on-probe.patch b/queue-6.12/iommu-mediatek-v1-fix-device-leaks-on-probe.patch
new file mode 100644 (file)
index 0000000..c78bac2
--- /dev/null
@@ -0,0 +1,93 @@
+From 46207625c9f33da0e43bb4ae1e91f0791b6ed633 Mon Sep 17 00:00:00 2001
+From: Johan Hovold <johan@kernel.org>
+Date: Mon, 20 Oct 2025 06:53:13 +0200
+Subject: iommu/mediatek-v1: fix device leaks on probe()
+
+From: Johan Hovold <johan@kernel.org>
+
+commit 46207625c9f33da0e43bb4ae1e91f0791b6ed633 upstream.
+
+Make sure to drop the references taken to the larb devices during
+probe on probe failure (e.g. probe deferral) and on driver unbind.
+
+Fixes: b17336c55d89 ("iommu/mediatek: add support for mtk iommu generation one HW")
+Cc: stable@vger.kernel.org     # 4.8
+Cc: Honghui Zhang <honghui.zhang@mediatek.com>
+Acked-by: Robin Murphy <robin.murphy@arm.com>
+Signed-off-by: Johan Hovold <johan@kernel.org>
+Reviewed-by: AngeloGioacchino Del Regno <angelogioacchino.delregno@collabora.com>
+Signed-off-by: Joerg Roedel <joerg.roedel@amd.com>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/iommu/mtk_iommu_v1.c |   23 ++++++++++++++++++-----
+ 1 file changed, 18 insertions(+), 5 deletions(-)
+
+--- a/drivers/iommu/mtk_iommu_v1.c
++++ b/drivers/iommu/mtk_iommu_v1.c
+@@ -647,8 +647,10 @@ static int mtk_iommu_v1_probe(struct pla
+               struct platform_device *plarbdev;
+               larbnode = of_parse_phandle(dev->of_node, "mediatek,larbs", i);
+-              if (!larbnode)
+-                      return -EINVAL;
++              if (!larbnode) {
++                      ret = -EINVAL;
++                      goto out_put_larbs;
++              }
+               if (!of_device_is_available(larbnode)) {
+                       of_node_put(larbnode);
+@@ -658,11 +660,14 @@ static int mtk_iommu_v1_probe(struct pla
+               plarbdev = of_find_device_by_node(larbnode);
+               if (!plarbdev) {
+                       of_node_put(larbnode);
+-                      return -ENODEV;
++                      ret = -ENODEV;
++                      goto out_put_larbs;
+               }
+               if (!plarbdev->dev.driver) {
+                       of_node_put(larbnode);
+-                      return -EPROBE_DEFER;
++                      put_device(&plarbdev->dev);
++                      ret = -EPROBE_DEFER;
++                      goto out_put_larbs;
+               }
+               data->larb_imu[i].dev = &plarbdev->dev;
+@@ -674,7 +679,7 @@ static int mtk_iommu_v1_probe(struct pla
+       ret = mtk_iommu_v1_hw_init(data);
+       if (ret)
+-              return ret;
++              goto out_put_larbs;
+       ret = iommu_device_sysfs_add(&data->iommu, &pdev->dev, NULL,
+                                    dev_name(&pdev->dev));
+@@ -696,12 +701,17 @@ out_sysfs_remove:
+       iommu_device_sysfs_remove(&data->iommu);
+ out_clk_unprepare:
+       clk_disable_unprepare(data->bclk);
++out_put_larbs:
++      for (i = 0; i < MTK_LARB_NR_MAX; i++)
++              put_device(data->larb_imu[i].dev);
++
+       return ret;
+ }
+ static void mtk_iommu_v1_remove(struct platform_device *pdev)
+ {
+       struct mtk_iommu_v1_data *data = platform_get_drvdata(pdev);
++      int i;
+       iommu_device_sysfs_remove(&data->iommu);
+       iommu_device_unregister(&data->iommu);
+@@ -709,6 +719,9 @@ static void mtk_iommu_v1_remove(struct p
+       clk_disable_unprepare(data->bclk);
+       devm_free_irq(&pdev->dev, data->irq, data);
+       component_master_del(&pdev->dev, &mtk_iommu_v1_com_ops);
++
++      for (i = 0; i < MTK_LARB_NR_MAX; i++)
++              put_device(data->larb_imu[i].dev);
+ }
+ static int __maybe_unused mtk_iommu_v1_suspend(struct device *dev)
diff --git a/queue-6.12/iommu-omap-fix-device-leaks-on-probe_device.patch b/queue-6.12/iommu-omap-fix-device-leaks-on-probe_device.patch
new file mode 100644 (file)
index 0000000..023b076
--- /dev/null
@@ -0,0 +1,66 @@
+From b5870691065e6bbe6ba0650c0412636c6a239c5a Mon Sep 17 00:00:00 2001
+From: Johan Hovold <johan@kernel.org>
+Date: Mon, 20 Oct 2025 06:53:15 +0200
+Subject: iommu/omap: fix device leaks on probe_device()
+
+From: Johan Hovold <johan@kernel.org>
+
+commit b5870691065e6bbe6ba0650c0412636c6a239c5a upstream.
+
+Make sure to drop the references taken to the iommu platform devices
+when looking up their driver data during probe_device().
+
+Note that the arch data device pointer added by commit 604629bcb505
+("iommu/omap: add support for late attachment of iommu devices") has
+never been used. Remove it to underline that the references are not
+needed.
+
+Fixes: 9d5018deec86 ("iommu/omap: Add support to program multiple iommus")
+Fixes: 7d6827748d54 ("iommu/omap: Fix iommu archdata name for DT-based devices")
+Cc: stable@vger.kernel.org     # 3.18
+Cc: Suman Anna <s-anna@ti.com>
+Acked-by: Robin Murphy <robin.murphy@arm.com>
+Signed-off-by: Johan Hovold <johan@kernel.org>
+Signed-off-by: Joerg Roedel <joerg.roedel@amd.com>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/iommu/omap-iommu.c |    2 +-
+ drivers/iommu/omap-iommu.h |    2 --
+ 2 files changed, 1 insertion(+), 3 deletions(-)
+
+--- a/drivers/iommu/omap-iommu.c
++++ b/drivers/iommu/omap-iommu.c
+@@ -1688,6 +1688,7 @@ static struct iommu_device *omap_iommu_p
+               }
+               oiommu = platform_get_drvdata(pdev);
++              put_device(&pdev->dev);
+               if (!oiommu) {
+                       of_node_put(np);
+                       kfree(arch_data);
+@@ -1695,7 +1696,6 @@ static struct iommu_device *omap_iommu_p
+               }
+               tmp->iommu_dev = oiommu;
+-              tmp->dev = &pdev->dev;
+               of_node_put(np);
+       }
+--- a/drivers/iommu/omap-iommu.h
++++ b/drivers/iommu/omap-iommu.h
+@@ -88,7 +88,6 @@ struct omap_iommu {
+ /**
+  * struct omap_iommu_arch_data - omap iommu private data
+  * @iommu_dev: handle of the OMAP iommu device
+- * @dev: handle of the iommu device
+  *
+  * This is an omap iommu private data object, which binds an iommu user
+  * to its iommu device. This object should be placed at the iommu user's
+@@ -97,7 +96,6 @@ struct omap_iommu {
+  */
+ struct omap_iommu_arch_data {
+       struct omap_iommu *iommu_dev;
+-      struct device *dev;
+ };
+ struct cr_regs {
diff --git a/queue-6.12/iommu-qcom-fix-device-leak-on-of_xlate.patch b/queue-6.12/iommu-qcom-fix-device-leak-on-of_xlate.patch
new file mode 100644 (file)
index 0000000..71a3b10
--- /dev/null
@@ -0,0 +1,60 @@
+From 6a3908ce56e6879920b44ef136252b2f0c954194 Mon Sep 17 00:00:00 2001
+From: Johan Hovold <johan@kernel.org>
+Date: Mon, 20 Oct 2025 06:53:06 +0200
+Subject: iommu/qcom: fix device leak on of_xlate()
+
+From: Johan Hovold <johan@kernel.org>
+
+commit 6a3908ce56e6879920b44ef136252b2f0c954194 upstream.
+
+Make sure to drop the reference taken to the iommu platform device when
+looking up its driver data during of_xlate().
+
+Note that commit e2eae09939a8 ("iommu/qcom: add missing put_device()
+call in qcom_iommu_of_xlate()") fixed the leak in a couple of error
+paths, but the reference is still leaking on success and late failures.
+
+Fixes: 0ae349a0f33f ("iommu/qcom: Add qcom_iommu")
+Cc: stable@vger.kernel.org     # 4.14: e2eae09939a8
+Cc: Rob Clark <robin.clark@oss.qualcomm.com>
+Cc: Yu Kuai <yukuai3@huawei.com>
+Acked-by: Robin Murphy <robin.murphy@arm.com>
+Signed-off-by: Johan Hovold <johan@kernel.org>
+Signed-off-by: Joerg Roedel <joerg.roedel@amd.com>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/iommu/arm/arm-smmu/qcom_iommu.c |   10 ++++------
+ 1 file changed, 4 insertions(+), 6 deletions(-)
+
+--- a/drivers/iommu/arm/arm-smmu/qcom_iommu.c
++++ b/drivers/iommu/arm/arm-smmu/qcom_iommu.c
+@@ -566,14 +566,14 @@ static int qcom_iommu_of_xlate(struct de
+       qcom_iommu = platform_get_drvdata(iommu_pdev);
++      put_device(&iommu_pdev->dev);
++
+       /* make sure the asid specified in dt is valid, so we don't have
+        * to sanity check this elsewhere:
+        */
+       if (WARN_ON(asid > qcom_iommu->max_asid) ||
+-          WARN_ON(qcom_iommu->ctxs[asid] == NULL)) {
+-              put_device(&iommu_pdev->dev);
++          WARN_ON(qcom_iommu->ctxs[asid] == NULL))
+               return -EINVAL;
+-      }
+       if (!dev_iommu_priv_get(dev)) {
+               dev_iommu_priv_set(dev, qcom_iommu);
+@@ -582,10 +582,8 @@ static int qcom_iommu_of_xlate(struct de
+                * multiple different iommu devices.  Multiple context
+                * banks are ok, but multiple devices are not:
+                */
+-              if (WARN_ON(qcom_iommu != dev_iommu_priv_get(dev))) {
+-                      put_device(&iommu_pdev->dev);
++              if (WARN_ON(qcom_iommu != dev_iommu_priv_get(dev)))
+                       return -EINVAL;
+-              }
+       }
+       return iommu_fwspec_add_ids(dev, &asid, 1);
diff --git a/queue-6.12/iommu-sun50i-fix-device-leak-on-of_xlate.patch b/queue-6.12/iommu-sun50i-fix-device-leak-on-of_xlate.patch
new file mode 100644 (file)
index 0000000..d86e569
--- /dev/null
@@ -0,0 +1,34 @@
+From f916109bf53864605d10bf6f4215afa023a80406 Mon Sep 17 00:00:00 2001
+From: Johan Hovold <johan@kernel.org>
+Date: Mon, 20 Oct 2025 06:53:17 +0200
+Subject: iommu/sun50i: fix device leak on of_xlate()
+
+From: Johan Hovold <johan@kernel.org>
+
+commit f916109bf53864605d10bf6f4215afa023a80406 upstream.
+
+Make sure to drop the reference taken to the iommu platform device when
+looking up its driver data during of_xlate().
+
+Fixes: 4100b8c229b3 ("iommu: Add Allwinner H6 IOMMU driver")
+Cc: stable@vger.kernel.org     # 5.8
+Cc: Maxime Ripard <mripard@kernel.org>
+Acked-by: Robin Murphy <robin.murphy@arm.com>
+Signed-off-by: Johan Hovold <johan@kernel.org>
+Signed-off-by: Joerg Roedel <joerg.roedel@amd.com>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/iommu/sun50i-iommu.c |    2 ++
+ 1 file changed, 2 insertions(+)
+
+--- a/drivers/iommu/sun50i-iommu.c
++++ b/drivers/iommu/sun50i-iommu.c
+@@ -837,6 +837,8 @@ static int sun50i_iommu_of_xlate(struct
+       dev_iommu_priv_set(dev, platform_get_drvdata(iommu_pdev));
++      put_device(&iommu_pdev->dev);
++
+       return iommu_fwspec_add_ids(dev, &id, 1);
+ }
diff --git a/queue-6.12/iommu-tegra-fix-device-leak-on-probe_device.patch b/queue-6.12/iommu-tegra-fix-device-leak-on-probe_device.patch
new file mode 100644 (file)
index 0000000..f9d4977
--- /dev/null
@@ -0,0 +1,43 @@
+From c08934a61201db8f1d1c66fcc63fb2eb526b656d Mon Sep 17 00:00:00 2001
+From: Johan Hovold <johan@kernel.org>
+Date: Mon, 20 Oct 2025 06:53:18 +0200
+Subject: iommu/tegra: fix device leak on probe_device()
+
+From: Johan Hovold <johan@kernel.org>
+
+commit c08934a61201db8f1d1c66fcc63fb2eb526b656d upstream.
+
+Make sure to drop the reference taken to the iommu platform device when
+looking up its driver data during probe_device().
+
+Note that commit 9826e393e4a8 ("iommu/tegra-smmu: Fix missing
+put_device() call in tegra_smmu_find") fixed the leak in an error path,
+but the reference is still leaking on success.
+
+Fixes: 891846516317 ("memory: Add NVIDIA Tegra memory controller support")
+Cc: stable@vger.kernel.org     # 3.19: 9826e393e4a8
+Cc: Miaoqian Lin <linmq006@gmail.com>
+Acked-by: Robin Murphy <robin.murphy@arm.com>
+Acked-by: Thierry Reding <treding@nvidia.com>
+Signed-off-by: Johan Hovold <johan@kernel.org>
+Signed-off-by: Joerg Roedel <joerg.roedel@amd.com>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/iommu/tegra-smmu.c |    5 ++---
+ 1 file changed, 2 insertions(+), 3 deletions(-)
+
+--- a/drivers/iommu/tegra-smmu.c
++++ b/drivers/iommu/tegra-smmu.c
+@@ -823,10 +823,9 @@ static struct tegra_smmu *tegra_smmu_fin
+               return NULL;
+       mc = platform_get_drvdata(pdev);
+-      if (!mc) {
+-              put_device(&pdev->dev);
++      put_device(&pdev->dev);
++      if (!mc)
+               return NULL;
+-      }
+       return mc->smmu;
+ }
diff --git a/queue-6.12/ntfs-do-not-overwrite-uptodate-pages.patch b/queue-6.12/ntfs-do-not-overwrite-uptodate-pages.patch
new file mode 100644 (file)
index 0000000..6ab5bf5
--- /dev/null
@@ -0,0 +1,96 @@
+From 68f6bd128e75a032432eda9d16676ed2969a1096 Mon Sep 17 00:00:00 2001
+From: "Matthew Wilcox (Oracle)" <willy@infradead.org>
+Date: Fri, 18 Jul 2025 20:53:58 +0100
+Subject: ntfs: Do not overwrite uptodate pages
+
+From: Matthew Wilcox (Oracle) <willy@infradead.org>
+
+commit 68f6bd128e75a032432eda9d16676ed2969a1096 upstream.
+
+When reading a compressed file, we may read several pages in addition to
+the one requested.  The current code will overwrite pages in the page
+cache with the data from disc which can definitely result in changes
+that have been made being lost.
+
+For example if we have four consecutie pages ABCD in the file compressed
+into a single extent, on first access, we'll bring in ABCD.  Then we
+write to page B.  Memory pressure results in the eviction of ACD.
+When we attempt to write to page C, we will overwrite the data in page
+B with the data currently on disk.
+
+I haven't investigated the decompression code to check whether it's
+OK to overwrite a clean page or whether it might be possible to see
+corrupt data.  Out of an abundance of caution, decline to overwrite
+uptodate pages, not just dirty pages.
+
+Fixes: 4342306f0f0d (fs/ntfs3: Add file operations and implementation)
+Signed-off-by: Matthew Wilcox (Oracle) <willy@infradead.org>
+Cc: stable@vger.kernel.org
+Signed-off-by: Konstantin Komarov <almaz.alexandrovich@paragon-software.com>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ fs/ntfs3/frecord.c |   35 +++++++++++++++++++++++++++++------
+ 1 file changed, 29 insertions(+), 6 deletions(-)
+
+--- a/fs/ntfs3/frecord.c
++++ b/fs/ntfs3/frecord.c
+@@ -2077,6 +2077,29 @@ out:
+       return err;
+ }
++static struct page *ntfs_lock_new_page(struct address_space *mapping,
++              pgoff_t index, gfp_t gfp)
++{
++      struct folio *folio = __filemap_get_folio(mapping, index,
++                      FGP_LOCK | FGP_ACCESSED | FGP_CREAT, gfp);
++      struct page *page;
++
++      if (IS_ERR(folio))
++              return ERR_CAST(folio);
++
++      if (!folio_test_uptodate(folio))
++              return folio_file_page(folio, index);
++
++      /* Use a temporary page to avoid data corruption */
++      folio_unlock(folio);
++      folio_put(folio);
++      page = alloc_page(gfp);
++      if (!page)
++              return ERR_PTR(-ENOMEM);
++      __SetPageLocked(page);
++      return page;
++}
++
+ /*
+  * ni_readpage_cmpr
+  *
+@@ -2131,9 +2154,9 @@ int ni_readpage_cmpr(struct ntfs_inode *
+               if (i == idx)
+                       continue;
+-              pg = find_or_create_page(mapping, index, gfp_mask);
+-              if (!pg) {
+-                      err = -ENOMEM;
++              pg = ntfs_lock_new_page(mapping, index, gfp_mask);
++              if (IS_ERR(pg)) {
++                      err = PTR_ERR(pg);
+                       goto out1;
+               }
+               pages[i] = pg;
+@@ -2232,13 +2255,13 @@ int ni_decompress_file(struct ntfs_inode
+               for (i = 0; i < pages_per_frame; i++, index++) {
+                       struct page *pg;
+-                      pg = find_or_create_page(mapping, index, gfp_mask);
+-                      if (!pg) {
++                      pg = ntfs_lock_new_page(mapping, index, gfp_mask);
++                      if (IS_ERR(pg)) {
+                               while (i--) {
+                                       unlock_page(pages[i]);
+                                       put_page(pages[i]);
+                               }
+-                              err = -ENOMEM;
++                              err = PTR_ERR(pg);
+                               goto out;
+                       }
+                       pages[i] = pg;
index 257aa28d2bdc795deca93c13550183223d8b5e5c..426bb2f0fedcb3102bff6ce166944c5f18b50026 100644 (file)
@@ -341,3 +341,27 @@ rdma-rtrs-fix-clt_path-max_pages_per_mr-calculation.patch
 rdma-bnxt_re-fix-dma_free_coherent-pointer.patch
 blk-mq-skip-cpu-offline-notify-on-unmapped-hctx.patch
 selftests-ftrace-traceonoff_triggers-strip-off-names.patch
+ntfs-do-not-overwrite-uptodate-pages.patch
+asoc-codecs-wcd939x-fix-regmap-leak-on-probe-failure.patch
+asoc-stm32-sai-fix-device-leak-on-probe.patch
+asoc-stm32-sai-fix-clk-prepare-imbalance-on-probe-failure.patch
+asoc-stm32-sai-fix-of-node-leak-on-probe.patch
+asoc-codecs-lpass-tx-macro-fix-sm6115-support.patch
+asoc-qcom-q6apm-dai-set-flags-to-reflect-correct-operation-of-appl_ptr.patch
+asoc-qcom-q6asm-dai-perform-correct-state-check-before-closing.patch
+asoc-qcom-q6adm-the-the-copp-device-only-during-last-instance.patch
+asoc-qcom-qdsp6-q6asm-dai-set-10-ms-period-and-buffer-alignment.patch
+iommu-amd-fix-pci_segment-memleak-in-alloc_pci_segment.patch
+iommu-amd-propagate-the-error-code-returned-by-__modify_irte_ga-in-modify_irte_ga.patch
+iommu-apple-dart-fix-device-leak-on-of_xlate.patch
+iommu-exynos-fix-device-leak-on-of_xlate.patch
+iommu-ipmmu-vmsa-fix-device-leak-on-of_xlate.patch
+iommu-mediatek-v1-fix-device-leak-on-probe_device.patch
+iommu-mediatek-v1-fix-device-leaks-on-probe.patch
+iommu-mediatek-fix-device-leak-on-of_xlate.patch
+iommu-omap-fix-device-leaks-on-probe_device.patch
+iommu-qcom-fix-device-leak-on-of_xlate.patch
+iommu-sun50i-fix-device-leak-on-of_xlate.patch
+iommu-tegra-fix-device-leak-on-probe_device.patch
+iommu-disable-sva-when-config_x86-is-set.patch
+hid-logitech-dj-remove-duplicate-error-logging.patch