]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commitdiff
Fixes for 5.10
authorSasha Levin <sashal@kernel.org>
Thu, 19 Sep 2024 19:36:30 +0000 (15:36 -0400)
committerSasha Levin <sashal@kernel.org>
Thu, 19 Sep 2024 19:36:30 +0000 (15:36 -0400)
Signed-off-by: Sasha Levin <sashal@kernel.org>
31 files changed:
queue-5.10/alsa-hda-realtek-fixed-alc256-headphone-no-sound.patch [new file with mode: 0644]
queue-5.10/alsa-hda-realtek-fixed-alc256-headphone-no-sound.patch-24351 [new file with mode: 0644]
queue-5.10/alsa-hda-realtek-fixed-alc285-headphone-no-sound.patch [new file with mode: 0644]
queue-5.10/alsa-hda-realtek-fixed-alc285-headphone-no-sound.patch-13980 [new file with mode: 0644]
queue-5.10/asoc-allow-module-autoloading-for-table-db1200_pids.patch [new file with mode: 0644]
queue-5.10/asoc-allow-module-autoloading-for-table-db1200_pids.patch-27638 [new file with mode: 0644]
queue-5.10/asoc-intel-fix-module-autoloading.patch [new file with mode: 0644]
queue-5.10/asoc-intel-fix-module-autoloading.patch-32164 [new file with mode: 0644]
queue-5.10/asoc-tda7419-fix-module-autoloading.patch [new file with mode: 0644]
queue-5.10/asoc-tda7419-fix-module-autoloading.patch-14104 [new file with mode: 0644]
queue-5.10/drm-komeda-fix-an-issue-related-to-normalized-zpos.patch [new file with mode: 0644]
queue-5.10/drm-komeda-fix-an-issue-related-to-normalized-zpos.patch-23503 [new file with mode: 0644]
queue-5.10/microblaze-don-t-treat-zero-reserved-memory-regions-.patch [new file with mode: 0644]
queue-5.10/microblaze-don-t-treat-zero-reserved-memory-regions-.patch-19083 [new file with mode: 0644]
queue-5.10/net-ftgmac100-ensure-tx-descriptor-updates-are-visib.patch [new file with mode: 0644]
queue-5.10/net-ftgmac100-ensure-tx-descriptor-updates-are-visib.patch-13387 [new file with mode: 0644]
queue-5.10/ocfs2-add-bounds-checking-to-ocfs2_xattr_find_entry.patch [new file with mode: 0644]
queue-5.10/ocfs2-add-bounds-checking-to-ocfs2_xattr_find_entry.patch-28208 [new file with mode: 0644]
queue-5.10/ocfs2-strict-bound-check-before-memcmp-in-ocfs2_xatt.patch [new file with mode: 0644]
queue-5.10/ocfs2-strict-bound-check-before-memcmp-in-ocfs2_xatt.patch-28181 [new file with mode: 0644]
queue-5.10/pinctrl-at91-make-it-work-with-current-gpiolib.patch [new file with mode: 0644]
queue-5.10/pinctrl-at91-make-it-work-with-current-gpiolib.patch-30991 [new file with mode: 0644]
queue-5.10/series
queue-5.10/spi-bcm63xx-enable-module-autoloading.patch [new file with mode: 0644]
queue-5.10/spi-bcm63xx-enable-module-autoloading.patch-29644 [new file with mode: 0644]
queue-5.10/wifi-iwlwifi-lower-message-level-for-fw-buffer-desti.patch [new file with mode: 0644]
queue-5.10/wifi-iwlwifi-lower-message-level-for-fw-buffer-desti.patch-16348 [new file with mode: 0644]
queue-5.10/wifi-iwlwifi-mvm-don-t-wait-for-tx-queues-if-firmwar.patch [new file with mode: 0644]
queue-5.10/wifi-iwlwifi-mvm-don-t-wait-for-tx-queues-if-firmwar.patch-5713 [new file with mode: 0644]
queue-5.10/x86-hyperv-set-x86_feature_tsc_known_freq-when-hyper.patch [new file with mode: 0644]
queue-5.10/x86-hyperv-set-x86_feature_tsc_known_freq-when-hyper.patch-3718 [new file with mode: 0644]

diff --git a/queue-5.10/alsa-hda-realtek-fixed-alc256-headphone-no-sound.patch b/queue-5.10/alsa-hda-realtek-fixed-alc256-headphone-no-sound.patch
new file mode 100644 (file)
index 0000000..1d61dcc
--- /dev/null
@@ -0,0 +1,126 @@
+From 1ef5fd785861af50b808ec285dd11496ced1d3c4 Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Thu, 22 Aug 2024 10:54:19 +0800
+Subject: ALSA: hda/realtek - Fixed ALC256 headphone no sound
+
+From: Kailang Yang <kailang@realtek.com>
+
+[ Upstream commit 9b82ff1362f50914c8292902e07be98a9f59d33d ]
+
+Dell platform, plug headphone or headset, it had a chance to get no
+sound from headphone.
+Replace depop procedure will solve this issue.
+
+Signed-off-by: Kailang Yang <kailang@realtek.com>
+Link: https://lore.kernel.org/bb8e2de30d294dc287944efa0667685a@realtek.com
+Signed-off-by: Takashi Iwai <tiwai@suse.de>
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ sound/pci/hda/patch_realtek.c | 50 ++++++++++++++++++++++++++---------
+ 1 file changed, 37 insertions(+), 13 deletions(-)
+
+diff --git a/sound/pci/hda/patch_realtek.c b/sound/pci/hda/patch_realtek.c
+index c104a33b3e8fa..a952888b5b8af 100644
+--- a/sound/pci/hda/patch_realtek.c
++++ b/sound/pci/hda/patch_realtek.c
+@@ -4846,6 +4846,30 @@ static void alc269_fixup_hp_line1_mic1_led(struct hda_codec *codec,
+       }
+ }
++static void alc_hp_mute_disable(struct hda_codec *codec, unsigned int delay)
++{
++      if (delay <= 0)
++              delay = 75;
++      snd_hda_codec_write(codec, 0x21, 0,
++                  AC_VERB_SET_AMP_GAIN_MUTE, AMP_OUT_MUTE);
++      msleep(delay);
++      snd_hda_codec_write(codec, 0x21, 0,
++                  AC_VERB_SET_PIN_WIDGET_CONTROL, 0x0);
++      msleep(delay);
++}
++
++static void alc_hp_enable_unmute(struct hda_codec *codec, unsigned int delay)
++{
++      if (delay <= 0)
++              delay = 75;
++      snd_hda_codec_write(codec, 0x21, 0,
++                  AC_VERB_SET_PIN_WIDGET_CONTROL, PIN_OUT);
++      msleep(delay);
++      snd_hda_codec_write(codec, 0x21, 0,
++                  AC_VERB_SET_AMP_GAIN_MUTE, AMP_OUT_UNMUTE);
++      msleep(delay);
++}
++
+ static const struct coef_fw alc225_pre_hsmode[] = {
+       UPDATE_COEF(0x4a, 1<<8, 0),
+       UPDATE_COEFEX(0x57, 0x05, 1<<14, 0),
+@@ -4947,6 +4971,7 @@ static void alc_headset_mode_unplugged(struct hda_codec *codec)
+       case 0x10ec0236:
+       case 0x10ec0256:
+       case 0x19e58326:
++              alc_hp_mute_disable(codec, 75);
+               alc_process_coef_fw(codec, coef0256);
+               break;
+       case 0x10ec0234:
+@@ -5218,6 +5243,7 @@ static void alc_headset_mode_default(struct hda_codec *codec)
+               alc_write_coef_idx(codec, 0x45, 0xc089);
+               msleep(50);
+               alc_process_coef_fw(codec, coef0256);
++              alc_hp_enable_unmute(codec, 75);
+               break;
+       case 0x10ec0234:
+       case 0x10ec0274:
+@@ -5315,6 +5341,7 @@ static void alc_headset_mode_ctia(struct hda_codec *codec)
+       case 0x10ec0256:
+       case 0x19e58326:
+               alc_process_coef_fw(codec, coef0256);
++              alc_hp_enable_unmute(codec, 75);
+               break;
+       case 0x10ec0234:
+       case 0x10ec0274:
+@@ -5430,6 +5457,7 @@ static void alc_headset_mode_omtp(struct hda_codec *codec)
+       case 0x10ec0256:
+       case 0x19e58326:
+               alc_process_coef_fw(codec, coef0256);
++              alc_hp_enable_unmute(codec, 75);
+               break;
+       case 0x10ec0234:
+       case 0x10ec0274:
+@@ -5535,25 +5563,21 @@ static void alc_determine_headset_type(struct hda_codec *codec)
+               alc_write_coef_idx(codec, 0x06, 0x6104);
+               alc_write_coefex_idx(codec, 0x57, 0x3, 0x09a3);
+-              snd_hda_codec_write(codec, 0x21, 0,
+-                          AC_VERB_SET_AMP_GAIN_MUTE, AMP_OUT_MUTE);
+-              msleep(80);
+-              snd_hda_codec_write(codec, 0x21, 0,
+-                          AC_VERB_SET_PIN_WIDGET_CONTROL, 0x0);
+-
+               alc_process_coef_fw(codec, coef0255);
+               msleep(300);
+               val = alc_read_coef_idx(codec, 0x46);
+               is_ctia = (val & 0x0070) == 0x0070;
+-
++              if (!is_ctia) {
++                      alc_write_coef_idx(codec, 0x45, 0xe089);
++                      msleep(100);
++                      val = alc_read_coef_idx(codec, 0x46);
++                      if ((val & 0x0070) == 0x0070)
++                              is_ctia = false;
++                      else
++                              is_ctia = true;
++              }
+               alc_write_coefex_idx(codec, 0x57, 0x3, 0x0da3);
+               alc_update_coefex_idx(codec, 0x57, 0x5, 1<<14, 0);
+-
+-              snd_hda_codec_write(codec, 0x21, 0,
+-                          AC_VERB_SET_PIN_WIDGET_CONTROL, PIN_OUT);
+-              msleep(80);
+-              snd_hda_codec_write(codec, 0x21, 0,
+-                          AC_VERB_SET_AMP_GAIN_MUTE, AMP_OUT_UNMUTE);
+               break;
+       case 0x10ec0234:
+       case 0x10ec0274:
+-- 
+2.43.0
+
diff --git a/queue-5.10/alsa-hda-realtek-fixed-alc256-headphone-no-sound.patch-24351 b/queue-5.10/alsa-hda-realtek-fixed-alc256-headphone-no-sound.patch-24351
new file mode 100644 (file)
index 0000000..1d61dcc
--- /dev/null
@@ -0,0 +1,126 @@
+From 1ef5fd785861af50b808ec285dd11496ced1d3c4 Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Thu, 22 Aug 2024 10:54:19 +0800
+Subject: ALSA: hda/realtek - Fixed ALC256 headphone no sound
+
+From: Kailang Yang <kailang@realtek.com>
+
+[ Upstream commit 9b82ff1362f50914c8292902e07be98a9f59d33d ]
+
+Dell platform, plug headphone or headset, it had a chance to get no
+sound from headphone.
+Replace depop procedure will solve this issue.
+
+Signed-off-by: Kailang Yang <kailang@realtek.com>
+Link: https://lore.kernel.org/bb8e2de30d294dc287944efa0667685a@realtek.com
+Signed-off-by: Takashi Iwai <tiwai@suse.de>
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ sound/pci/hda/patch_realtek.c | 50 ++++++++++++++++++++++++++---------
+ 1 file changed, 37 insertions(+), 13 deletions(-)
+
+diff --git a/sound/pci/hda/patch_realtek.c b/sound/pci/hda/patch_realtek.c
+index c104a33b3e8fa..a952888b5b8af 100644
+--- a/sound/pci/hda/patch_realtek.c
++++ b/sound/pci/hda/patch_realtek.c
+@@ -4846,6 +4846,30 @@ static void alc269_fixup_hp_line1_mic1_led(struct hda_codec *codec,
+       }
+ }
++static void alc_hp_mute_disable(struct hda_codec *codec, unsigned int delay)
++{
++      if (delay <= 0)
++              delay = 75;
++      snd_hda_codec_write(codec, 0x21, 0,
++                  AC_VERB_SET_AMP_GAIN_MUTE, AMP_OUT_MUTE);
++      msleep(delay);
++      snd_hda_codec_write(codec, 0x21, 0,
++                  AC_VERB_SET_PIN_WIDGET_CONTROL, 0x0);
++      msleep(delay);
++}
++
++static void alc_hp_enable_unmute(struct hda_codec *codec, unsigned int delay)
++{
++      if (delay <= 0)
++              delay = 75;
++      snd_hda_codec_write(codec, 0x21, 0,
++                  AC_VERB_SET_PIN_WIDGET_CONTROL, PIN_OUT);
++      msleep(delay);
++      snd_hda_codec_write(codec, 0x21, 0,
++                  AC_VERB_SET_AMP_GAIN_MUTE, AMP_OUT_UNMUTE);
++      msleep(delay);
++}
++
+ static const struct coef_fw alc225_pre_hsmode[] = {
+       UPDATE_COEF(0x4a, 1<<8, 0),
+       UPDATE_COEFEX(0x57, 0x05, 1<<14, 0),
+@@ -4947,6 +4971,7 @@ static void alc_headset_mode_unplugged(struct hda_codec *codec)
+       case 0x10ec0236:
+       case 0x10ec0256:
+       case 0x19e58326:
++              alc_hp_mute_disable(codec, 75);
+               alc_process_coef_fw(codec, coef0256);
+               break;
+       case 0x10ec0234:
+@@ -5218,6 +5243,7 @@ static void alc_headset_mode_default(struct hda_codec *codec)
+               alc_write_coef_idx(codec, 0x45, 0xc089);
+               msleep(50);
+               alc_process_coef_fw(codec, coef0256);
++              alc_hp_enable_unmute(codec, 75);
+               break;
+       case 0x10ec0234:
+       case 0x10ec0274:
+@@ -5315,6 +5341,7 @@ static void alc_headset_mode_ctia(struct hda_codec *codec)
+       case 0x10ec0256:
+       case 0x19e58326:
+               alc_process_coef_fw(codec, coef0256);
++              alc_hp_enable_unmute(codec, 75);
+               break;
+       case 0x10ec0234:
+       case 0x10ec0274:
+@@ -5430,6 +5457,7 @@ static void alc_headset_mode_omtp(struct hda_codec *codec)
+       case 0x10ec0256:
+       case 0x19e58326:
+               alc_process_coef_fw(codec, coef0256);
++              alc_hp_enable_unmute(codec, 75);
+               break;
+       case 0x10ec0234:
+       case 0x10ec0274:
+@@ -5535,25 +5563,21 @@ static void alc_determine_headset_type(struct hda_codec *codec)
+               alc_write_coef_idx(codec, 0x06, 0x6104);
+               alc_write_coefex_idx(codec, 0x57, 0x3, 0x09a3);
+-              snd_hda_codec_write(codec, 0x21, 0,
+-                          AC_VERB_SET_AMP_GAIN_MUTE, AMP_OUT_MUTE);
+-              msleep(80);
+-              snd_hda_codec_write(codec, 0x21, 0,
+-                          AC_VERB_SET_PIN_WIDGET_CONTROL, 0x0);
+-
+               alc_process_coef_fw(codec, coef0255);
+               msleep(300);
+               val = alc_read_coef_idx(codec, 0x46);
+               is_ctia = (val & 0x0070) == 0x0070;
+-
++              if (!is_ctia) {
++                      alc_write_coef_idx(codec, 0x45, 0xe089);
++                      msleep(100);
++                      val = alc_read_coef_idx(codec, 0x46);
++                      if ((val & 0x0070) == 0x0070)
++                              is_ctia = false;
++                      else
++                              is_ctia = true;
++              }
+               alc_write_coefex_idx(codec, 0x57, 0x3, 0x0da3);
+               alc_update_coefex_idx(codec, 0x57, 0x5, 1<<14, 0);
+-
+-              snd_hda_codec_write(codec, 0x21, 0,
+-                          AC_VERB_SET_PIN_WIDGET_CONTROL, PIN_OUT);
+-              msleep(80);
+-              snd_hda_codec_write(codec, 0x21, 0,
+-                          AC_VERB_SET_AMP_GAIN_MUTE, AMP_OUT_UNMUTE);
+               break;
+       case 0x10ec0234:
+       case 0x10ec0274:
+-- 
+2.43.0
+
diff --git a/queue-5.10/alsa-hda-realtek-fixed-alc285-headphone-no-sound.patch b/queue-5.10/alsa-hda-realtek-fixed-alc285-headphone-no-sound.patch
new file mode 100644 (file)
index 0000000..5999d59
--- /dev/null
@@ -0,0 +1,100 @@
+From 00696b7b95faa452a2344a31264a3979df4766ff Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Thu, 22 Aug 2024 16:46:56 +0800
+Subject: ALSA: hda/realtek - FIxed ALC285 headphone no sound
+
+From: Kailang Yang <kailang@realtek.com>
+
+[ Upstream commit 1fa7b099d60ad64f559bd3b8e3f0d94b2e015514 ]
+
+Dell platform with ALC215 ALC285 ALC289 ALC225 ALC295 ALC299, plug
+headphone or headset.
+It had a chance to get no sound from headphone.
+Replace depop procedure will solve this issue.
+
+Signed-off-by: Kailang Yang <kailang@realtek.com>
+Link: https://lore.kernel.org/d0de1b03fd174520945dde216d765223@realtek.com
+Signed-off-by: Takashi Iwai <tiwai@suse.de>
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ sound/pci/hda/patch_realtek.c | 26 ++++++++++++++------------
+ 1 file changed, 14 insertions(+), 12 deletions(-)
+
+diff --git a/sound/pci/hda/patch_realtek.c b/sound/pci/hda/patch_realtek.c
+index a952888b5b8af..d6ebde90f0825 100644
+--- a/sound/pci/hda/patch_realtek.c
++++ b/sound/pci/hda/patch_realtek.c
+@@ -5006,6 +5006,7 @@ static void alc_headset_mode_unplugged(struct hda_codec *codec)
+       case 0x10ec0295:
+       case 0x10ec0289:
+       case 0x10ec0299:
++              alc_hp_mute_disable(codec, 75);
+               alc_process_coef_fw(codec, alc225_pre_hsmode);
+               alc_process_coef_fw(codec, coef0225);
+               break;
+@@ -5231,6 +5232,7 @@ static void alc_headset_mode_default(struct hda_codec *codec)
+       case 0x10ec0299:
+               alc_process_coef_fw(codec, alc225_pre_hsmode);
+               alc_process_coef_fw(codec, coef0225);
++              alc_hp_enable_unmute(codec, 75);
+               break;
+       case 0x10ec0255:
+               alc_process_coef_fw(codec, coef0255);
+@@ -5390,6 +5392,7 @@ static void alc_headset_mode_ctia(struct hda_codec *codec)
+                       alc_process_coef_fw(codec, coef0225_2);
+               else
+                       alc_process_coef_fw(codec, coef0225_1);
++              alc_hp_enable_unmute(codec, 75);
+               break;
+       case 0x10ec0867:
+               alc_update_coefex_idx(codec, 0x57, 0x5, 1<<14, 0);
+@@ -5495,6 +5498,7 @@ static void alc_headset_mode_omtp(struct hda_codec *codec)
+       case 0x10ec0289:
+       case 0x10ec0299:
+               alc_process_coef_fw(codec, coef0225);
++              alc_hp_enable_unmute(codec, 75);
+               break;
+       }
+       codec_dbg(codec, "Headset jack set to Nokia-style headset mode.\n");
+@@ -5654,12 +5658,6 @@ static void alc_determine_headset_type(struct hda_codec *codec)
+       case 0x10ec0295:
+       case 0x10ec0289:
+       case 0x10ec0299:
+-              snd_hda_codec_write(codec, 0x21, 0,
+-                          AC_VERB_SET_AMP_GAIN_MUTE, AMP_OUT_MUTE);
+-              msleep(80);
+-              snd_hda_codec_write(codec, 0x21, 0,
+-                          AC_VERB_SET_PIN_WIDGET_CONTROL, 0x0);
+-
+               alc_process_coef_fw(codec, alc225_pre_hsmode);
+               alc_update_coef_idx(codec, 0x67, 0xf000, 0x1000);
+               val = alc_read_coef_idx(codec, 0x45);
+@@ -5676,15 +5674,19 @@ static void alc_determine_headset_type(struct hda_codec *codec)
+                       val = alc_read_coef_idx(codec, 0x46);
+                       is_ctia = (val & 0x00f0) == 0x00f0;
+               }
++              if (!is_ctia) {
++                      alc_update_coef_idx(codec, 0x45, 0x3f<<10, 0x38<<10);
++                      alc_update_coef_idx(codec, 0x49, 3<<8, 1<<8);
++                      msleep(100);
++                      val = alc_read_coef_idx(codec, 0x46);
++                      if ((val & 0x00f0) == 0x00f0)
++                              is_ctia = false;
++                      else
++                              is_ctia = true;
++              }
+               alc_update_coef_idx(codec, 0x4a, 7<<6, 7<<6);
+               alc_update_coef_idx(codec, 0x4a, 3<<4, 3<<4);
+               alc_update_coef_idx(codec, 0x67, 0xf000, 0x3000);
+-
+-              snd_hda_codec_write(codec, 0x21, 0,
+-                          AC_VERB_SET_PIN_WIDGET_CONTROL, PIN_OUT);
+-              msleep(80);
+-              snd_hda_codec_write(codec, 0x21, 0,
+-                          AC_VERB_SET_AMP_GAIN_MUTE, AMP_OUT_UNMUTE);
+               break;
+       case 0x10ec0867:
+               is_ctia = true;
+-- 
+2.43.0
+
diff --git a/queue-5.10/alsa-hda-realtek-fixed-alc285-headphone-no-sound.patch-13980 b/queue-5.10/alsa-hda-realtek-fixed-alc285-headphone-no-sound.patch-13980
new file mode 100644 (file)
index 0000000..5999d59
--- /dev/null
@@ -0,0 +1,100 @@
+From 00696b7b95faa452a2344a31264a3979df4766ff Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Thu, 22 Aug 2024 16:46:56 +0800
+Subject: ALSA: hda/realtek - FIxed ALC285 headphone no sound
+
+From: Kailang Yang <kailang@realtek.com>
+
+[ Upstream commit 1fa7b099d60ad64f559bd3b8e3f0d94b2e015514 ]
+
+Dell platform with ALC215 ALC285 ALC289 ALC225 ALC295 ALC299, plug
+headphone or headset.
+It had a chance to get no sound from headphone.
+Replace depop procedure will solve this issue.
+
+Signed-off-by: Kailang Yang <kailang@realtek.com>
+Link: https://lore.kernel.org/d0de1b03fd174520945dde216d765223@realtek.com
+Signed-off-by: Takashi Iwai <tiwai@suse.de>
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ sound/pci/hda/patch_realtek.c | 26 ++++++++++++++------------
+ 1 file changed, 14 insertions(+), 12 deletions(-)
+
+diff --git a/sound/pci/hda/patch_realtek.c b/sound/pci/hda/patch_realtek.c
+index a952888b5b8af..d6ebde90f0825 100644
+--- a/sound/pci/hda/patch_realtek.c
++++ b/sound/pci/hda/patch_realtek.c
+@@ -5006,6 +5006,7 @@ static void alc_headset_mode_unplugged(struct hda_codec *codec)
+       case 0x10ec0295:
+       case 0x10ec0289:
+       case 0x10ec0299:
++              alc_hp_mute_disable(codec, 75);
+               alc_process_coef_fw(codec, alc225_pre_hsmode);
+               alc_process_coef_fw(codec, coef0225);
+               break;
+@@ -5231,6 +5232,7 @@ static void alc_headset_mode_default(struct hda_codec *codec)
+       case 0x10ec0299:
+               alc_process_coef_fw(codec, alc225_pre_hsmode);
+               alc_process_coef_fw(codec, coef0225);
++              alc_hp_enable_unmute(codec, 75);
+               break;
+       case 0x10ec0255:
+               alc_process_coef_fw(codec, coef0255);
+@@ -5390,6 +5392,7 @@ static void alc_headset_mode_ctia(struct hda_codec *codec)
+                       alc_process_coef_fw(codec, coef0225_2);
+               else
+                       alc_process_coef_fw(codec, coef0225_1);
++              alc_hp_enable_unmute(codec, 75);
+               break;
+       case 0x10ec0867:
+               alc_update_coefex_idx(codec, 0x57, 0x5, 1<<14, 0);
+@@ -5495,6 +5498,7 @@ static void alc_headset_mode_omtp(struct hda_codec *codec)
+       case 0x10ec0289:
+       case 0x10ec0299:
+               alc_process_coef_fw(codec, coef0225);
++              alc_hp_enable_unmute(codec, 75);
+               break;
+       }
+       codec_dbg(codec, "Headset jack set to Nokia-style headset mode.\n");
+@@ -5654,12 +5658,6 @@ static void alc_determine_headset_type(struct hda_codec *codec)
+       case 0x10ec0295:
+       case 0x10ec0289:
+       case 0x10ec0299:
+-              snd_hda_codec_write(codec, 0x21, 0,
+-                          AC_VERB_SET_AMP_GAIN_MUTE, AMP_OUT_MUTE);
+-              msleep(80);
+-              snd_hda_codec_write(codec, 0x21, 0,
+-                          AC_VERB_SET_PIN_WIDGET_CONTROL, 0x0);
+-
+               alc_process_coef_fw(codec, alc225_pre_hsmode);
+               alc_update_coef_idx(codec, 0x67, 0xf000, 0x1000);
+               val = alc_read_coef_idx(codec, 0x45);
+@@ -5676,15 +5674,19 @@ static void alc_determine_headset_type(struct hda_codec *codec)
+                       val = alc_read_coef_idx(codec, 0x46);
+                       is_ctia = (val & 0x00f0) == 0x00f0;
+               }
++              if (!is_ctia) {
++                      alc_update_coef_idx(codec, 0x45, 0x3f<<10, 0x38<<10);
++                      alc_update_coef_idx(codec, 0x49, 3<<8, 1<<8);
++                      msleep(100);
++                      val = alc_read_coef_idx(codec, 0x46);
++                      if ((val & 0x00f0) == 0x00f0)
++                              is_ctia = false;
++                      else
++                              is_ctia = true;
++              }
+               alc_update_coef_idx(codec, 0x4a, 7<<6, 7<<6);
+               alc_update_coef_idx(codec, 0x4a, 3<<4, 3<<4);
+               alc_update_coef_idx(codec, 0x67, 0xf000, 0x3000);
+-
+-              snd_hda_codec_write(codec, 0x21, 0,
+-                          AC_VERB_SET_PIN_WIDGET_CONTROL, PIN_OUT);
+-              msleep(80);
+-              snd_hda_codec_write(codec, 0x21, 0,
+-                          AC_VERB_SET_AMP_GAIN_MUTE, AMP_OUT_UNMUTE);
+               break;
+       case 0x10ec0867:
+               is_ctia = true;
+-- 
+2.43.0
+
diff --git a/queue-5.10/asoc-allow-module-autoloading-for-table-db1200_pids.patch b/queue-5.10/asoc-allow-module-autoloading-for-table-db1200_pids.patch
new file mode 100644 (file)
index 0000000..8a4790d
--- /dev/null
@@ -0,0 +1,35 @@
+From 3ee8d82dfc52689687829e36432a62e8075e294c Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Wed, 21 Aug 2024 14:19:54 +0800
+Subject: ASoC: allow module autoloading for table db1200_pids
+
+From: Hongbo Li <lihongbo22@huawei.com>
+
+[ Upstream commit 0e9fdab1e8df490354562187cdbb8dec643eae2c ]
+
+Add MODULE_DEVICE_TABLE(), so modules could be properly
+autoloaded based on the alias from platform_device_id table.
+
+Signed-off-by: Hongbo Li <lihongbo22@huawei.com>
+Link: https://patch.msgid.link/20240821061955.2273782-2-lihongbo22@huawei.com
+Signed-off-by: Mark Brown <broonie@kernel.org>
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ sound/soc/au1x/db1200.c | 1 +
+ 1 file changed, 1 insertion(+)
+
+diff --git a/sound/soc/au1x/db1200.c b/sound/soc/au1x/db1200.c
+index 5f8baad37a401..48243164b7ac8 100644
+--- a/sound/soc/au1x/db1200.c
++++ b/sound/soc/au1x/db1200.c
+@@ -44,6 +44,7 @@ static const struct platform_device_id db1200_pids[] = {
+       },
+       {},
+ };
++MODULE_DEVICE_TABLE(platform, db1200_pids);
+ /*-------------------------  AC97 PART  ---------------------------*/
+-- 
+2.43.0
+
diff --git a/queue-5.10/asoc-allow-module-autoloading-for-table-db1200_pids.patch-27638 b/queue-5.10/asoc-allow-module-autoloading-for-table-db1200_pids.patch-27638
new file mode 100644 (file)
index 0000000..8a4790d
--- /dev/null
@@ -0,0 +1,35 @@
+From 3ee8d82dfc52689687829e36432a62e8075e294c Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Wed, 21 Aug 2024 14:19:54 +0800
+Subject: ASoC: allow module autoloading for table db1200_pids
+
+From: Hongbo Li <lihongbo22@huawei.com>
+
+[ Upstream commit 0e9fdab1e8df490354562187cdbb8dec643eae2c ]
+
+Add MODULE_DEVICE_TABLE(), so modules could be properly
+autoloaded based on the alias from platform_device_id table.
+
+Signed-off-by: Hongbo Li <lihongbo22@huawei.com>
+Link: https://patch.msgid.link/20240821061955.2273782-2-lihongbo22@huawei.com
+Signed-off-by: Mark Brown <broonie@kernel.org>
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ sound/soc/au1x/db1200.c | 1 +
+ 1 file changed, 1 insertion(+)
+
+diff --git a/sound/soc/au1x/db1200.c b/sound/soc/au1x/db1200.c
+index 5f8baad37a401..48243164b7ac8 100644
+--- a/sound/soc/au1x/db1200.c
++++ b/sound/soc/au1x/db1200.c
+@@ -44,6 +44,7 @@ static const struct platform_device_id db1200_pids[] = {
+       },
+       {},
+ };
++MODULE_DEVICE_TABLE(platform, db1200_pids);
+ /*-------------------------  AC97 PART  ---------------------------*/
+-- 
+2.43.0
+
diff --git a/queue-5.10/asoc-intel-fix-module-autoloading.patch b/queue-5.10/asoc-intel-fix-module-autoloading.patch
new file mode 100644 (file)
index 0000000..7ba51e5
--- /dev/null
@@ -0,0 +1,35 @@
+From 547047da624b64b2c0ff4fb3017f16b7c5c52909 Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Mon, 26 Aug 2024 08:49:21 +0000
+Subject: ASoC: intel: fix module autoloading
+
+From: Liao Chen <liaochen4@huawei.com>
+
+[ Upstream commit ae61a3391088d29aa8605c9f2db84295ab993a49 ]
+
+Add MODULE_DEVICE_TABLE(), so modules could be properly autoloaded
+based on the alias from of_device_id table.
+
+Signed-off-by: Liao Chen <liaochen4@huawei.com>
+Link: https://patch.msgid.link/20240826084924.368387-2-liaochen4@huawei.com
+Signed-off-by: Mark Brown <broonie@kernel.org>
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ sound/soc/intel/keembay/kmb_platform.c | 1 +
+ 1 file changed, 1 insertion(+)
+
+diff --git a/sound/soc/intel/keembay/kmb_platform.c b/sound/soc/intel/keembay/kmb_platform.c
+index 291a686568c26..c7b754034d24f 100644
+--- a/sound/soc/intel/keembay/kmb_platform.c
++++ b/sound/soc/intel/keembay/kmb_platform.c
+@@ -634,6 +634,7 @@ static const struct of_device_id kmb_plat_of_match[] = {
+       { .compatible = "intel,keembay-tdm", .data = &intel_kmb_tdm_dai},
+       {}
+ };
++MODULE_DEVICE_TABLE(of, kmb_plat_of_match);
+ static int kmb_plat_dai_probe(struct platform_device *pdev)
+ {
+-- 
+2.43.0
+
diff --git a/queue-5.10/asoc-intel-fix-module-autoloading.patch-32164 b/queue-5.10/asoc-intel-fix-module-autoloading.patch-32164
new file mode 100644 (file)
index 0000000..7ba51e5
--- /dev/null
@@ -0,0 +1,35 @@
+From 547047da624b64b2c0ff4fb3017f16b7c5c52909 Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Mon, 26 Aug 2024 08:49:21 +0000
+Subject: ASoC: intel: fix module autoloading
+
+From: Liao Chen <liaochen4@huawei.com>
+
+[ Upstream commit ae61a3391088d29aa8605c9f2db84295ab993a49 ]
+
+Add MODULE_DEVICE_TABLE(), so modules could be properly autoloaded
+based on the alias from of_device_id table.
+
+Signed-off-by: Liao Chen <liaochen4@huawei.com>
+Link: https://patch.msgid.link/20240826084924.368387-2-liaochen4@huawei.com
+Signed-off-by: Mark Brown <broonie@kernel.org>
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ sound/soc/intel/keembay/kmb_platform.c | 1 +
+ 1 file changed, 1 insertion(+)
+
+diff --git a/sound/soc/intel/keembay/kmb_platform.c b/sound/soc/intel/keembay/kmb_platform.c
+index 291a686568c26..c7b754034d24f 100644
+--- a/sound/soc/intel/keembay/kmb_platform.c
++++ b/sound/soc/intel/keembay/kmb_platform.c
+@@ -634,6 +634,7 @@ static const struct of_device_id kmb_plat_of_match[] = {
+       { .compatible = "intel,keembay-tdm", .data = &intel_kmb_tdm_dai},
+       {}
+ };
++MODULE_DEVICE_TABLE(of, kmb_plat_of_match);
+ static int kmb_plat_dai_probe(struct platform_device *pdev)
+ {
+-- 
+2.43.0
+
diff --git a/queue-5.10/asoc-tda7419-fix-module-autoloading.patch b/queue-5.10/asoc-tda7419-fix-module-autoloading.patch
new file mode 100644 (file)
index 0000000..5256048
--- /dev/null
@@ -0,0 +1,35 @@
+From fa0b2bc58c20b8dbdcb492ad472e2fdf0984ae30 Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Mon, 26 Aug 2024 08:49:23 +0000
+Subject: ASoC: tda7419: fix module autoloading
+
+From: Liao Chen <liaochen4@huawei.com>
+
+[ Upstream commit 934b44589da9aa300201a00fe139c5c54f421563 ]
+
+Add MODULE_DEVICE_TABLE(), so modules could be properly autoloaded
+based on the alias from of_device_id table.
+
+Signed-off-by: Liao Chen <liaochen4@huawei.com>
+Link: https://patch.msgid.link/20240826084924.368387-4-liaochen4@huawei.com
+Signed-off-by: Mark Brown <broonie@kernel.org>
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ sound/soc/codecs/tda7419.c | 1 +
+ 1 file changed, 1 insertion(+)
+
+diff --git a/sound/soc/codecs/tda7419.c b/sound/soc/codecs/tda7419.c
+index 83d220054c96f..9183db51547d3 100644
+--- a/sound/soc/codecs/tda7419.c
++++ b/sound/soc/codecs/tda7419.c
+@@ -624,6 +624,7 @@ static const struct of_device_id tda7419_of_match[] = {
+       { .compatible = "st,tda7419" },
+       { },
+ };
++MODULE_DEVICE_TABLE(of, tda7419_of_match);
+ static struct i2c_driver tda7419_driver = {
+       .driver = {
+-- 
+2.43.0
+
diff --git a/queue-5.10/asoc-tda7419-fix-module-autoloading.patch-14104 b/queue-5.10/asoc-tda7419-fix-module-autoloading.patch-14104
new file mode 100644 (file)
index 0000000..5256048
--- /dev/null
@@ -0,0 +1,35 @@
+From fa0b2bc58c20b8dbdcb492ad472e2fdf0984ae30 Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Mon, 26 Aug 2024 08:49:23 +0000
+Subject: ASoC: tda7419: fix module autoloading
+
+From: Liao Chen <liaochen4@huawei.com>
+
+[ Upstream commit 934b44589da9aa300201a00fe139c5c54f421563 ]
+
+Add MODULE_DEVICE_TABLE(), so modules could be properly autoloaded
+based on the alias from of_device_id table.
+
+Signed-off-by: Liao Chen <liaochen4@huawei.com>
+Link: https://patch.msgid.link/20240826084924.368387-4-liaochen4@huawei.com
+Signed-off-by: Mark Brown <broonie@kernel.org>
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ sound/soc/codecs/tda7419.c | 1 +
+ 1 file changed, 1 insertion(+)
+
+diff --git a/sound/soc/codecs/tda7419.c b/sound/soc/codecs/tda7419.c
+index 83d220054c96f..9183db51547d3 100644
+--- a/sound/soc/codecs/tda7419.c
++++ b/sound/soc/codecs/tda7419.c
+@@ -624,6 +624,7 @@ static const struct of_device_id tda7419_of_match[] = {
+       { .compatible = "st,tda7419" },
+       { },
+ };
++MODULE_DEVICE_TABLE(of, tda7419_of_match);
+ static struct i2c_driver tda7419_driver = {
+       .driver = {
+-- 
+2.43.0
+
diff --git a/queue-5.10/drm-komeda-fix-an-issue-related-to-normalized-zpos.patch b/queue-5.10/drm-komeda-fix-an-issue-related-to-normalized-zpos.patch
new file mode 100644 (file)
index 0000000..9970477
--- /dev/null
@@ -0,0 +1,79 @@
+From e3367418baa65f6f82bf654d22d4f1a14ea0c943 Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Mon, 26 Aug 2024 10:45:17 +0800
+Subject: drm: komeda: Fix an issue related to normalized zpos
+
+From: hongchi.peng <hongchi.peng@siengine.com>
+
+[ Upstream commit 258905cb9a6414be5c9ca4aa20ef855f8dc894d4 ]
+
+We use komeda_crtc_normalize_zpos to normalize zpos of affected planes
+to their blending zorder in CU. If there's only one slave plane in
+affected planes and its layer_split property is enabled, order++ for
+its split layer, so that when calculating the normalized_zpos
+of master planes, the split layer of the slave plane is included, but
+the max_slave_zorder does not include the split layer and keep zero
+because there's only one slave plane in affacted planes, although we
+actually use two slave layers in this commit.
+
+In most cases, this bug does not result in a commit failure, but assume
+the following situation:
+    slave_layer 0: zpos = 0, layer split enabled, normalized_zpos =
+    0;(use slave_layer 2 as its split layer)
+    master_layer 0: zpos = 2, layer_split enabled, normalized_zpos =
+    2;(use master_layer 2 as its split layer)
+    master_layer 1: zpos = 4, normalized_zpos = 4;
+    master_layer 3: zpos = 5, normalized_zpos = 5;
+    kcrtc_st->max_slave_zorder = 0;
+When we use master_layer 3 as a input of CU in function
+komeda_compiz_set_input and check it with function
+komeda_component_check_input, the parameter idx is equal to
+normailzed_zpos minus max_slave_zorder, the value of idx is 5
+and is euqal to CU's max_active_inputs, so that
+komeda_component_check_input returns a -EINVAL value.
+
+To fix the bug described above, when calculating the max_slave_zorder
+with the layer_split enabled, count the split layer in this calculation
+directly.
+
+Signed-off-by: hongchi.peng <hongchi.peng@siengine.com>
+Acked-by: Liviu Dudau <liviu.dudau@arm.com>
+Signed-off-by: Liviu Dudau <liviu.dudau@arm.com>
+Link: https://patchwork.freedesktop.org/patch/msgid/20240826024517.3739-1-hongchi.peng@siengine.com
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ drivers/gpu/drm/arm/display/komeda/komeda_kms.c | 10 +++++++---
+ 1 file changed, 7 insertions(+), 3 deletions(-)
+
+diff --git a/drivers/gpu/drm/arm/display/komeda/komeda_kms.c b/drivers/gpu/drm/arm/display/komeda/komeda_kms.c
+index 1f6682032ca49..ac8b7fb20d8fc 100644
+--- a/drivers/gpu/drm/arm/display/komeda/komeda_kms.c
++++ b/drivers/gpu/drm/arm/display/komeda/komeda_kms.c
+@@ -142,6 +142,7 @@ static int komeda_crtc_normalize_zpos(struct drm_crtc *crtc,
+       struct drm_plane *plane;
+       struct list_head zorder_list;
+       int order = 0, err;
++      u32 slave_zpos = 0;
+       DRM_DEBUG_ATOMIC("[CRTC:%d:%s] calculating normalized zpos values\n",
+                        crtc->base.id, crtc->name);
+@@ -181,10 +182,13 @@ static int komeda_crtc_normalize_zpos(struct drm_crtc *crtc,
+                                plane_st->zpos, plane_st->normalized_zpos);
+               /* calculate max slave zorder */
+-              if (has_bit(drm_plane_index(plane), kcrtc->slave_planes))
++              if (has_bit(drm_plane_index(plane), kcrtc->slave_planes)) {
++                      slave_zpos = plane_st->normalized_zpos;
++                      if (to_kplane_st(plane_st)->layer_split)
++                              slave_zpos++;
+                       kcrtc_st->max_slave_zorder =
+-                              max(plane_st->normalized_zpos,
+-                                  kcrtc_st->max_slave_zorder);
++                              max(slave_zpos, kcrtc_st->max_slave_zorder);
++              }
+       }
+       crtc_st->zpos_changed = true;
+-- 
+2.43.0
+
diff --git a/queue-5.10/drm-komeda-fix-an-issue-related-to-normalized-zpos.patch-23503 b/queue-5.10/drm-komeda-fix-an-issue-related-to-normalized-zpos.patch-23503
new file mode 100644 (file)
index 0000000..9970477
--- /dev/null
@@ -0,0 +1,79 @@
+From e3367418baa65f6f82bf654d22d4f1a14ea0c943 Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Mon, 26 Aug 2024 10:45:17 +0800
+Subject: drm: komeda: Fix an issue related to normalized zpos
+
+From: hongchi.peng <hongchi.peng@siengine.com>
+
+[ Upstream commit 258905cb9a6414be5c9ca4aa20ef855f8dc894d4 ]
+
+We use komeda_crtc_normalize_zpos to normalize zpos of affected planes
+to their blending zorder in CU. If there's only one slave plane in
+affected planes and its layer_split property is enabled, order++ for
+its split layer, so that when calculating the normalized_zpos
+of master planes, the split layer of the slave plane is included, but
+the max_slave_zorder does not include the split layer and keep zero
+because there's only one slave plane in affacted planes, although we
+actually use two slave layers in this commit.
+
+In most cases, this bug does not result in a commit failure, but assume
+the following situation:
+    slave_layer 0: zpos = 0, layer split enabled, normalized_zpos =
+    0;(use slave_layer 2 as its split layer)
+    master_layer 0: zpos = 2, layer_split enabled, normalized_zpos =
+    2;(use master_layer 2 as its split layer)
+    master_layer 1: zpos = 4, normalized_zpos = 4;
+    master_layer 3: zpos = 5, normalized_zpos = 5;
+    kcrtc_st->max_slave_zorder = 0;
+When we use master_layer 3 as a input of CU in function
+komeda_compiz_set_input and check it with function
+komeda_component_check_input, the parameter idx is equal to
+normailzed_zpos minus max_slave_zorder, the value of idx is 5
+and is euqal to CU's max_active_inputs, so that
+komeda_component_check_input returns a -EINVAL value.
+
+To fix the bug described above, when calculating the max_slave_zorder
+with the layer_split enabled, count the split layer in this calculation
+directly.
+
+Signed-off-by: hongchi.peng <hongchi.peng@siengine.com>
+Acked-by: Liviu Dudau <liviu.dudau@arm.com>
+Signed-off-by: Liviu Dudau <liviu.dudau@arm.com>
+Link: https://patchwork.freedesktop.org/patch/msgid/20240826024517.3739-1-hongchi.peng@siengine.com
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ drivers/gpu/drm/arm/display/komeda/komeda_kms.c | 10 +++++++---
+ 1 file changed, 7 insertions(+), 3 deletions(-)
+
+diff --git a/drivers/gpu/drm/arm/display/komeda/komeda_kms.c b/drivers/gpu/drm/arm/display/komeda/komeda_kms.c
+index 1f6682032ca49..ac8b7fb20d8fc 100644
+--- a/drivers/gpu/drm/arm/display/komeda/komeda_kms.c
++++ b/drivers/gpu/drm/arm/display/komeda/komeda_kms.c
+@@ -142,6 +142,7 @@ static int komeda_crtc_normalize_zpos(struct drm_crtc *crtc,
+       struct drm_plane *plane;
+       struct list_head zorder_list;
+       int order = 0, err;
++      u32 slave_zpos = 0;
+       DRM_DEBUG_ATOMIC("[CRTC:%d:%s] calculating normalized zpos values\n",
+                        crtc->base.id, crtc->name);
+@@ -181,10 +182,13 @@ static int komeda_crtc_normalize_zpos(struct drm_crtc *crtc,
+                                plane_st->zpos, plane_st->normalized_zpos);
+               /* calculate max slave zorder */
+-              if (has_bit(drm_plane_index(plane), kcrtc->slave_planes))
++              if (has_bit(drm_plane_index(plane), kcrtc->slave_planes)) {
++                      slave_zpos = plane_st->normalized_zpos;
++                      if (to_kplane_st(plane_st)->layer_split)
++                              slave_zpos++;
+                       kcrtc_st->max_slave_zorder =
+-                              max(plane_st->normalized_zpos,
+-                                  kcrtc_st->max_slave_zorder);
++                              max(slave_zpos, kcrtc_st->max_slave_zorder);
++              }
+       }
+       crtc_st->zpos_changed = true;
+-- 
+2.43.0
+
diff --git a/queue-5.10/microblaze-don-t-treat-zero-reserved-memory-regions-.patch b/queue-5.10/microblaze-don-t-treat-zero-reserved-memory-regions-.patch
new file mode 100644 (file)
index 0000000..4e25bf4
--- /dev/null
@@ -0,0 +1,51 @@
+From 9eae19c143c8a52eaaab404f921b3300313167fa Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Mon, 29 Jul 2024 08:33:27 +0300
+Subject: microblaze: don't treat zero reserved memory regions as error
+
+From: Mike Rapoport <rppt@kernel.org>
+
+[ Upstream commit 0075df288dd8a7abfe03b3766176c393063591dd ]
+
+Before commit 721f4a6526da ("mm/memblock: remove empty dummy entry") the
+check for non-zero of memblock.reserved.cnt in mmu_init() would always
+be true either because  memblock.reserved.cnt is initialized to 1 or
+because there were memory reservations earlier.
+
+The removal of dummy empty entry in memblock caused this check to fail
+because now memblock.reserved.cnt is initialized to 0.
+
+Remove the check for non-zero of memblock.reserved.cnt because it's
+perfectly fine to have an empty memblock.reserved array that early in
+boot.
+
+Reported-by: Guenter Roeck <linux@roeck-us.net>
+Signed-off-by: Mike Rapoport <rppt@kernel.org>
+Reviewed-by: Wei Yang <richard.weiyang@gmail.com>
+Tested-by: Guenter Roeck <linux@roeck-us.net>
+Link: https://lore.kernel.org/r/20240729053327.4091459-1-rppt@kernel.org
+Signed-off-by: Guenter Roeck <linux@roeck-us.net>
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ arch/microblaze/mm/init.c | 5 -----
+ 1 file changed, 5 deletions(-)
+
+diff --git a/arch/microblaze/mm/init.c b/arch/microblaze/mm/init.c
+index 45da639bd22ca..a2cd139c5eb41 100644
+--- a/arch/microblaze/mm/init.c
++++ b/arch/microblaze/mm/init.c
+@@ -245,11 +245,6 @@ asmlinkage void __init mmu_init(void)
+ {
+       unsigned int kstart, ksize;
+-      if (!memblock.reserved.cnt) {
+-              pr_emerg("Error memory count\n");
+-              machine_restart(NULL);
+-      }
+-
+       if ((u32) memblock.memory.regions[0].size < 0x400000) {
+               pr_emerg("Memory must be greater than 4MB\n");
+               machine_restart(NULL);
+-- 
+2.43.0
+
diff --git a/queue-5.10/microblaze-don-t-treat-zero-reserved-memory-regions-.patch-19083 b/queue-5.10/microblaze-don-t-treat-zero-reserved-memory-regions-.patch-19083
new file mode 100644 (file)
index 0000000..4e25bf4
--- /dev/null
@@ -0,0 +1,51 @@
+From 9eae19c143c8a52eaaab404f921b3300313167fa Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Mon, 29 Jul 2024 08:33:27 +0300
+Subject: microblaze: don't treat zero reserved memory regions as error
+
+From: Mike Rapoport <rppt@kernel.org>
+
+[ Upstream commit 0075df288dd8a7abfe03b3766176c393063591dd ]
+
+Before commit 721f4a6526da ("mm/memblock: remove empty dummy entry") the
+check for non-zero of memblock.reserved.cnt in mmu_init() would always
+be true either because  memblock.reserved.cnt is initialized to 1 or
+because there were memory reservations earlier.
+
+The removal of dummy empty entry in memblock caused this check to fail
+because now memblock.reserved.cnt is initialized to 0.
+
+Remove the check for non-zero of memblock.reserved.cnt because it's
+perfectly fine to have an empty memblock.reserved array that early in
+boot.
+
+Reported-by: Guenter Roeck <linux@roeck-us.net>
+Signed-off-by: Mike Rapoport <rppt@kernel.org>
+Reviewed-by: Wei Yang <richard.weiyang@gmail.com>
+Tested-by: Guenter Roeck <linux@roeck-us.net>
+Link: https://lore.kernel.org/r/20240729053327.4091459-1-rppt@kernel.org
+Signed-off-by: Guenter Roeck <linux@roeck-us.net>
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ arch/microblaze/mm/init.c | 5 -----
+ 1 file changed, 5 deletions(-)
+
+diff --git a/arch/microblaze/mm/init.c b/arch/microblaze/mm/init.c
+index 45da639bd22ca..a2cd139c5eb41 100644
+--- a/arch/microblaze/mm/init.c
++++ b/arch/microblaze/mm/init.c
+@@ -245,11 +245,6 @@ asmlinkage void __init mmu_init(void)
+ {
+       unsigned int kstart, ksize;
+-      if (!memblock.reserved.cnt) {
+-              pr_emerg("Error memory count\n");
+-              machine_restart(NULL);
+-      }
+-
+       if ((u32) memblock.memory.regions[0].size < 0x400000) {
+               pr_emerg("Memory must be greater than 4MB\n");
+               machine_restart(NULL);
+-- 
+2.43.0
+
diff --git a/queue-5.10/net-ftgmac100-ensure-tx-descriptor-updates-are-visib.patch b/queue-5.10/net-ftgmac100-ensure-tx-descriptor-updates-are-visib.patch
new file mode 100644 (file)
index 0000000..0fa3e79
--- /dev/null
@@ -0,0 +1,109 @@
+From 4c78ac6e2ab19257735065e1c9e1c539f0958e38 Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Thu, 22 Aug 2024 15:30:06 +0800
+Subject: net: ftgmac100: Ensure tx descriptor updates are visible
+
+From: Jacky Chou <jacky_chou@aspeedtech.com>
+
+[ Upstream commit 4186c8d9e6af57bab0687b299df10ebd47534a0a ]
+
+The driver must ensure TX descriptor updates are visible
+before updating TX pointer and TX clear pointer.
+
+This resolves TX hangs observed on AST2600 when running
+iperf3.
+
+Signed-off-by: Jacky Chou <jacky_chou@aspeedtech.com>
+Signed-off-by: David S. Miller <davem@davemloft.net>
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ drivers/net/ethernet/faraday/ftgmac100.c | 26 ++++++++++++++++--------
+ 1 file changed, 18 insertions(+), 8 deletions(-)
+
+diff --git a/drivers/net/ethernet/faraday/ftgmac100.c b/drivers/net/ethernet/faraday/ftgmac100.c
+index 969af4dd64055..bc9a7f2d23504 100644
+--- a/drivers/net/ethernet/faraday/ftgmac100.c
++++ b/drivers/net/ethernet/faraday/ftgmac100.c
+@@ -569,7 +569,7 @@ static bool ftgmac100_rx_packet(struct ftgmac100 *priv, int *processed)
+       (*processed)++;
+       return true;
+- drop:
++drop:
+       /* Clean rxdes0 (which resets own bit) */
+       rxdes->rxdes0 = cpu_to_le32(status & priv->rxdes0_edorr_mask);
+       priv->rx_pointer = ftgmac100_next_rx_pointer(priv, pointer);
+@@ -653,6 +653,11 @@ static bool ftgmac100_tx_complete_packet(struct ftgmac100 *priv)
+       ftgmac100_free_tx_packet(priv, pointer, skb, txdes, ctl_stat);
+       txdes->txdes0 = cpu_to_le32(ctl_stat & priv->txdes0_edotr_mask);
++      /* Ensure the descriptor config is visible before setting the tx
++       * pointer.
++       */
++      smp_wmb();
++
+       priv->tx_clean_pointer = ftgmac100_next_tx_pointer(priv, pointer);
+       return true;
+@@ -806,6 +811,11 @@ static netdev_tx_t ftgmac100_hard_start_xmit(struct sk_buff *skb,
+       dma_wmb();
+       first->txdes0 = cpu_to_le32(f_ctl_stat);
++      /* Ensure the descriptor config is visible before setting the tx
++       * pointer.
++       */
++      smp_wmb();
++
+       /* Update next TX pointer */
+       priv->tx_pointer = pointer;
+@@ -826,7 +836,7 @@ static netdev_tx_t ftgmac100_hard_start_xmit(struct sk_buff *skb,
+       return NETDEV_TX_OK;
+- dma_err:
++dma_err:
+       if (net_ratelimit())
+               netdev_err(netdev, "map tx fragment failed\n");
+@@ -848,7 +858,7 @@ static netdev_tx_t ftgmac100_hard_start_xmit(struct sk_buff *skb,
+        * last fragment, so we know ftgmac100_free_tx_packet()
+        * hasn't freed the skb yet.
+        */
+- drop:
++drop:
+       /* Drop the packet */
+       dev_kfree_skb_any(skb);
+       netdev->stats.tx_dropped++;
+@@ -1419,7 +1429,7 @@ static void ftgmac100_reset_task(struct work_struct *work)
+       ftgmac100_init_all(priv, true);
+       netdev_dbg(netdev, "Reset done !\n");
+- bail:
++bail:
+       if (priv->mii_bus)
+               mutex_unlock(&priv->mii_bus->mdio_lock);
+       if (netdev->phydev)
+@@ -1490,15 +1500,15 @@ static int ftgmac100_open(struct net_device *netdev)
+       return 0;
+- err_ncsi:
++err_ncsi:
+       napi_disable(&priv->napi);
+       netif_stop_queue(netdev);
+- err_alloc:
++err_alloc:
+       ftgmac100_free_buffers(priv);
+       free_irq(netdev->irq, netdev);
+- err_irq:
++err_irq:
+       netif_napi_del(&priv->napi);
+- err_hw:
++err_hw:
+       iowrite32(0, priv->base + FTGMAC100_OFFSET_IER);
+       ftgmac100_free_rings(priv);
+       return err;
+-- 
+2.43.0
+
diff --git a/queue-5.10/net-ftgmac100-ensure-tx-descriptor-updates-are-visib.patch-13387 b/queue-5.10/net-ftgmac100-ensure-tx-descriptor-updates-are-visib.patch-13387
new file mode 100644 (file)
index 0000000..0fa3e79
--- /dev/null
@@ -0,0 +1,109 @@
+From 4c78ac6e2ab19257735065e1c9e1c539f0958e38 Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Thu, 22 Aug 2024 15:30:06 +0800
+Subject: net: ftgmac100: Ensure tx descriptor updates are visible
+
+From: Jacky Chou <jacky_chou@aspeedtech.com>
+
+[ Upstream commit 4186c8d9e6af57bab0687b299df10ebd47534a0a ]
+
+The driver must ensure TX descriptor updates are visible
+before updating TX pointer and TX clear pointer.
+
+This resolves TX hangs observed on AST2600 when running
+iperf3.
+
+Signed-off-by: Jacky Chou <jacky_chou@aspeedtech.com>
+Signed-off-by: David S. Miller <davem@davemloft.net>
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ drivers/net/ethernet/faraday/ftgmac100.c | 26 ++++++++++++++++--------
+ 1 file changed, 18 insertions(+), 8 deletions(-)
+
+diff --git a/drivers/net/ethernet/faraday/ftgmac100.c b/drivers/net/ethernet/faraday/ftgmac100.c
+index 969af4dd64055..bc9a7f2d23504 100644
+--- a/drivers/net/ethernet/faraday/ftgmac100.c
++++ b/drivers/net/ethernet/faraday/ftgmac100.c
+@@ -569,7 +569,7 @@ static bool ftgmac100_rx_packet(struct ftgmac100 *priv, int *processed)
+       (*processed)++;
+       return true;
+- drop:
++drop:
+       /* Clean rxdes0 (which resets own bit) */
+       rxdes->rxdes0 = cpu_to_le32(status & priv->rxdes0_edorr_mask);
+       priv->rx_pointer = ftgmac100_next_rx_pointer(priv, pointer);
+@@ -653,6 +653,11 @@ static bool ftgmac100_tx_complete_packet(struct ftgmac100 *priv)
+       ftgmac100_free_tx_packet(priv, pointer, skb, txdes, ctl_stat);
+       txdes->txdes0 = cpu_to_le32(ctl_stat & priv->txdes0_edotr_mask);
++      /* Ensure the descriptor config is visible before setting the tx
++       * pointer.
++       */
++      smp_wmb();
++
+       priv->tx_clean_pointer = ftgmac100_next_tx_pointer(priv, pointer);
+       return true;
+@@ -806,6 +811,11 @@ static netdev_tx_t ftgmac100_hard_start_xmit(struct sk_buff *skb,
+       dma_wmb();
+       first->txdes0 = cpu_to_le32(f_ctl_stat);
++      /* Ensure the descriptor config is visible before setting the tx
++       * pointer.
++       */
++      smp_wmb();
++
+       /* Update next TX pointer */
+       priv->tx_pointer = pointer;
+@@ -826,7 +836,7 @@ static netdev_tx_t ftgmac100_hard_start_xmit(struct sk_buff *skb,
+       return NETDEV_TX_OK;
+- dma_err:
++dma_err:
+       if (net_ratelimit())
+               netdev_err(netdev, "map tx fragment failed\n");
+@@ -848,7 +858,7 @@ static netdev_tx_t ftgmac100_hard_start_xmit(struct sk_buff *skb,
+        * last fragment, so we know ftgmac100_free_tx_packet()
+        * hasn't freed the skb yet.
+        */
+- drop:
++drop:
+       /* Drop the packet */
+       dev_kfree_skb_any(skb);
+       netdev->stats.tx_dropped++;
+@@ -1419,7 +1429,7 @@ static void ftgmac100_reset_task(struct work_struct *work)
+       ftgmac100_init_all(priv, true);
+       netdev_dbg(netdev, "Reset done !\n");
+- bail:
++bail:
+       if (priv->mii_bus)
+               mutex_unlock(&priv->mii_bus->mdio_lock);
+       if (netdev->phydev)
+@@ -1490,15 +1500,15 @@ static int ftgmac100_open(struct net_device *netdev)
+       return 0;
+- err_ncsi:
++err_ncsi:
+       napi_disable(&priv->napi);
+       netif_stop_queue(netdev);
+- err_alloc:
++err_alloc:
+       ftgmac100_free_buffers(priv);
+       free_irq(netdev->irq, netdev);
+- err_irq:
++err_irq:
+       netif_napi_del(&priv->napi);
+- err_hw:
++err_hw:
+       iowrite32(0, priv->base + FTGMAC100_OFFSET_IER);
+       ftgmac100_free_rings(priv);
+       return err;
+-- 
+2.43.0
+
diff --git a/queue-5.10/ocfs2-add-bounds-checking-to-ocfs2_xattr_find_entry.patch b/queue-5.10/ocfs2-add-bounds-checking-to-ocfs2_xattr_find_entry.patch
new file mode 100644 (file)
index 0000000..de1a529
--- /dev/null
@@ -0,0 +1,85 @@
+From 6199d3a3e8daeebcf3c7aa5ebb4bbc48ebbe4df9 Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Mon, 20 May 2024 10:40:23 +0800
+Subject: ocfs2: add bounds checking to ocfs2_xattr_find_entry()
+
+From: Ferry Meng <mengferry@linux.alibaba.com>
+
+[ Upstream commit 9e3041fecdc8f78a5900c3aa51d3d756e73264d6 ]
+
+Add a paranoia check to make sure it doesn't stray beyond valid memory
+region containing ocfs2 xattr entries when scanning for a match.  It will
+prevent out-of-bound access in case of crafted images.
+
+Link: https://lkml.kernel.org/r/20240520024024.1976129-1-joseph.qi@linux.alibaba.com
+Signed-off-by: Ferry Meng <mengferry@linux.alibaba.com>
+Signed-off-by: Joseph Qi <joseph.qi@linux.alibaba.com>
+Reported-by: lei lu <llfamsec@gmail.com>
+Reviewed-by: Joseph Qi <joseph.qi@linux.alibaba.com>
+Cc: Mark Fasheh <mark@fasheh.com>
+Cc: Joel Becker <jlbec@evilplan.org>
+Cc: Junxiao Bi <junxiao.bi@oracle.com>
+Cc: Changwei Ge <gechangwei@live.cn>
+Cc: Gang He <ghe@suse.com>
+Cc: Jun Piao <piaojun@huawei.com>
+Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
+Stable-dep-of: af77c4fc1871 ("ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()")
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ fs/ocfs2/xattr.c | 12 ++++++++----
+ 1 file changed, 8 insertions(+), 4 deletions(-)
+
+diff --git a/fs/ocfs2/xattr.c b/fs/ocfs2/xattr.c
+index 10df2e1dfef72..31b389d0a09a0 100644
+--- a/fs/ocfs2/xattr.c
++++ b/fs/ocfs2/xattr.c
+@@ -1068,7 +1068,7 @@ ssize_t ocfs2_listxattr(struct dentry *dentry,
+       return i_ret + b_ret;
+ }
+-static int ocfs2_xattr_find_entry(int name_index,
++static int ocfs2_xattr_find_entry(struct inode *inode, int name_index,
+                                 const char *name,
+                                 struct ocfs2_xattr_search *xs)
+ {
+@@ -1082,6 +1082,10 @@ static int ocfs2_xattr_find_entry(int name_index,
+       name_len = strlen(name);
+       entry = xs->here;
+       for (i = 0; i < le16_to_cpu(xs->header->xh_count); i++) {
++              if ((void *)entry >= xs->end) {
++                      ocfs2_error(inode->i_sb, "corrupted xattr entries");
++                      return -EFSCORRUPTED;
++              }
+               cmp = name_index - ocfs2_xattr_get_type(entry);
+               if (!cmp)
+                       cmp = name_len - entry->xe_name_len;
+@@ -1172,7 +1176,7 @@ static int ocfs2_xattr_ibody_get(struct inode *inode,
+       xs->base = (void *)xs->header;
+       xs->here = xs->header->xh_entries;
+-      ret = ocfs2_xattr_find_entry(name_index, name, xs);
++      ret = ocfs2_xattr_find_entry(inode, name_index, name, xs);
+       if (ret)
+               return ret;
+       size = le64_to_cpu(xs->here->xe_value_size);
+@@ -2704,7 +2708,7 @@ static int ocfs2_xattr_ibody_find(struct inode *inode,
+       /* Find the named attribute. */
+       if (oi->ip_dyn_features & OCFS2_INLINE_XATTR_FL) {
+-              ret = ocfs2_xattr_find_entry(name_index, name, xs);
++              ret = ocfs2_xattr_find_entry(inode, name_index, name, xs);
+               if (ret && ret != -ENODATA)
+                       return ret;
+               xs->not_found = ret;
+@@ -2839,7 +2843,7 @@ static int ocfs2_xattr_block_find(struct inode *inode,
+               xs->end = (void *)(blk_bh->b_data) + blk_bh->b_size;
+               xs->here = xs->header->xh_entries;
+-              ret = ocfs2_xattr_find_entry(name_index, name, xs);
++              ret = ocfs2_xattr_find_entry(inode, name_index, name, xs);
+       } else
+               ret = ocfs2_xattr_index_block_find(inode, blk_bh,
+                                                  name_index,
+-- 
+2.43.0
+
diff --git a/queue-5.10/ocfs2-add-bounds-checking-to-ocfs2_xattr_find_entry.patch-28208 b/queue-5.10/ocfs2-add-bounds-checking-to-ocfs2_xattr_find_entry.patch-28208
new file mode 100644 (file)
index 0000000..de1a529
--- /dev/null
@@ -0,0 +1,85 @@
+From 6199d3a3e8daeebcf3c7aa5ebb4bbc48ebbe4df9 Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Mon, 20 May 2024 10:40:23 +0800
+Subject: ocfs2: add bounds checking to ocfs2_xattr_find_entry()
+
+From: Ferry Meng <mengferry@linux.alibaba.com>
+
+[ Upstream commit 9e3041fecdc8f78a5900c3aa51d3d756e73264d6 ]
+
+Add a paranoia check to make sure it doesn't stray beyond valid memory
+region containing ocfs2 xattr entries when scanning for a match.  It will
+prevent out-of-bound access in case of crafted images.
+
+Link: https://lkml.kernel.org/r/20240520024024.1976129-1-joseph.qi@linux.alibaba.com
+Signed-off-by: Ferry Meng <mengferry@linux.alibaba.com>
+Signed-off-by: Joseph Qi <joseph.qi@linux.alibaba.com>
+Reported-by: lei lu <llfamsec@gmail.com>
+Reviewed-by: Joseph Qi <joseph.qi@linux.alibaba.com>
+Cc: Mark Fasheh <mark@fasheh.com>
+Cc: Joel Becker <jlbec@evilplan.org>
+Cc: Junxiao Bi <junxiao.bi@oracle.com>
+Cc: Changwei Ge <gechangwei@live.cn>
+Cc: Gang He <ghe@suse.com>
+Cc: Jun Piao <piaojun@huawei.com>
+Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
+Stable-dep-of: af77c4fc1871 ("ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()")
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ fs/ocfs2/xattr.c | 12 ++++++++----
+ 1 file changed, 8 insertions(+), 4 deletions(-)
+
+diff --git a/fs/ocfs2/xattr.c b/fs/ocfs2/xattr.c
+index 10df2e1dfef72..31b389d0a09a0 100644
+--- a/fs/ocfs2/xattr.c
++++ b/fs/ocfs2/xattr.c
+@@ -1068,7 +1068,7 @@ ssize_t ocfs2_listxattr(struct dentry *dentry,
+       return i_ret + b_ret;
+ }
+-static int ocfs2_xattr_find_entry(int name_index,
++static int ocfs2_xattr_find_entry(struct inode *inode, int name_index,
+                                 const char *name,
+                                 struct ocfs2_xattr_search *xs)
+ {
+@@ -1082,6 +1082,10 @@ static int ocfs2_xattr_find_entry(int name_index,
+       name_len = strlen(name);
+       entry = xs->here;
+       for (i = 0; i < le16_to_cpu(xs->header->xh_count); i++) {
++              if ((void *)entry >= xs->end) {
++                      ocfs2_error(inode->i_sb, "corrupted xattr entries");
++                      return -EFSCORRUPTED;
++              }
+               cmp = name_index - ocfs2_xattr_get_type(entry);
+               if (!cmp)
+                       cmp = name_len - entry->xe_name_len;
+@@ -1172,7 +1176,7 @@ static int ocfs2_xattr_ibody_get(struct inode *inode,
+       xs->base = (void *)xs->header;
+       xs->here = xs->header->xh_entries;
+-      ret = ocfs2_xattr_find_entry(name_index, name, xs);
++      ret = ocfs2_xattr_find_entry(inode, name_index, name, xs);
+       if (ret)
+               return ret;
+       size = le64_to_cpu(xs->here->xe_value_size);
+@@ -2704,7 +2708,7 @@ static int ocfs2_xattr_ibody_find(struct inode *inode,
+       /* Find the named attribute. */
+       if (oi->ip_dyn_features & OCFS2_INLINE_XATTR_FL) {
+-              ret = ocfs2_xattr_find_entry(name_index, name, xs);
++              ret = ocfs2_xattr_find_entry(inode, name_index, name, xs);
+               if (ret && ret != -ENODATA)
+                       return ret;
+               xs->not_found = ret;
+@@ -2839,7 +2843,7 @@ static int ocfs2_xattr_block_find(struct inode *inode,
+               xs->end = (void *)(blk_bh->b_data) + blk_bh->b_size;
+               xs->here = xs->header->xh_entries;
+-              ret = ocfs2_xattr_find_entry(name_index, name, xs);
++              ret = ocfs2_xattr_find_entry(inode, name_index, name, xs);
+       } else
+               ret = ocfs2_xattr_index_block_find(inode, blk_bh,
+                                                  name_index,
+-- 
+2.43.0
+
diff --git a/queue-5.10/ocfs2-strict-bound-check-before-memcmp-in-ocfs2_xatt.patch b/queue-5.10/ocfs2-strict-bound-check-before-memcmp-in-ocfs2_xatt.patch
new file mode 100644 (file)
index 0000000..8e69470
--- /dev/null
@@ -0,0 +1,67 @@
+From 0fe0c0117812b3a6c9f07815c1a37ed52740d97b Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Mon, 20 May 2024 10:40:24 +0800
+Subject: ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()
+
+From: Ferry Meng <mengferry@linux.alibaba.com>
+
+[ Upstream commit af77c4fc1871847b528d58b7fdafb4aa1f6a9262 ]
+
+xattr in ocfs2 maybe 'non-indexed', which saved with additional space
+requested.  It's better to check if the memory is out of bound before
+memcmp, although this possibility mainly comes from crafted poisonous
+images.
+
+Link: https://lkml.kernel.org/r/20240520024024.1976129-2-joseph.qi@linux.alibaba.com
+Signed-off-by: Ferry Meng <mengferry@linux.alibaba.com>
+Signed-off-by: Joseph Qi <joseph.qi@linux.alibaba.com>
+Reported-by: lei lu <llfamsec@gmail.com>
+Reviewed-by: Joseph Qi <joseph.qi@linux.alibaba.com>
+Cc: Changwei Ge <gechangwei@live.cn>
+Cc: Gang He <ghe@suse.com>
+Cc: Joel Becker <jlbec@evilplan.org>
+Cc: Jun Piao <piaojun@huawei.com>
+Cc: Junxiao Bi <junxiao.bi@oracle.com>
+Cc: Mark Fasheh <mark@fasheh.com>
+Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ fs/ocfs2/xattr.c | 15 ++++++++++-----
+ 1 file changed, 10 insertions(+), 5 deletions(-)
+
+diff --git a/fs/ocfs2/xattr.c b/fs/ocfs2/xattr.c
+index 31b389d0a09a0..977a739d5448f 100644
+--- a/fs/ocfs2/xattr.c
++++ b/fs/ocfs2/xattr.c
+@@ -1074,7 +1074,7 @@ static int ocfs2_xattr_find_entry(struct inode *inode, int name_index,
+ {
+       struct ocfs2_xattr_entry *entry;
+       size_t name_len;
+-      int i, cmp = 1;
++      int i, name_offset, cmp = 1;
+       if (name == NULL)
+               return -EINVAL;
+@@ -1089,10 +1089,15 @@ static int ocfs2_xattr_find_entry(struct inode *inode, int name_index,
+               cmp = name_index - ocfs2_xattr_get_type(entry);
+               if (!cmp)
+                       cmp = name_len - entry->xe_name_len;
+-              if (!cmp)
+-                      cmp = memcmp(name, (xs->base +
+-                                   le16_to_cpu(entry->xe_name_offset)),
+-                                   name_len);
++              if (!cmp) {
++                      name_offset = le16_to_cpu(entry->xe_name_offset);
++                      if ((xs->base + name_offset + name_len) > xs->end) {
++                              ocfs2_error(inode->i_sb,
++                                          "corrupted xattr entries");
++                              return -EFSCORRUPTED;
++                      }
++                      cmp = memcmp(name, (xs->base + name_offset), name_len);
++              }
+               if (cmp == 0)
+                       break;
+               entry += 1;
+-- 
+2.43.0
+
diff --git a/queue-5.10/ocfs2-strict-bound-check-before-memcmp-in-ocfs2_xatt.patch-28181 b/queue-5.10/ocfs2-strict-bound-check-before-memcmp-in-ocfs2_xatt.patch-28181
new file mode 100644 (file)
index 0000000..8e69470
--- /dev/null
@@ -0,0 +1,67 @@
+From 0fe0c0117812b3a6c9f07815c1a37ed52740d97b Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Mon, 20 May 2024 10:40:24 +0800
+Subject: ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()
+
+From: Ferry Meng <mengferry@linux.alibaba.com>
+
+[ Upstream commit af77c4fc1871847b528d58b7fdafb4aa1f6a9262 ]
+
+xattr in ocfs2 maybe 'non-indexed', which saved with additional space
+requested.  It's better to check if the memory is out of bound before
+memcmp, although this possibility mainly comes from crafted poisonous
+images.
+
+Link: https://lkml.kernel.org/r/20240520024024.1976129-2-joseph.qi@linux.alibaba.com
+Signed-off-by: Ferry Meng <mengferry@linux.alibaba.com>
+Signed-off-by: Joseph Qi <joseph.qi@linux.alibaba.com>
+Reported-by: lei lu <llfamsec@gmail.com>
+Reviewed-by: Joseph Qi <joseph.qi@linux.alibaba.com>
+Cc: Changwei Ge <gechangwei@live.cn>
+Cc: Gang He <ghe@suse.com>
+Cc: Joel Becker <jlbec@evilplan.org>
+Cc: Jun Piao <piaojun@huawei.com>
+Cc: Junxiao Bi <junxiao.bi@oracle.com>
+Cc: Mark Fasheh <mark@fasheh.com>
+Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ fs/ocfs2/xattr.c | 15 ++++++++++-----
+ 1 file changed, 10 insertions(+), 5 deletions(-)
+
+diff --git a/fs/ocfs2/xattr.c b/fs/ocfs2/xattr.c
+index 31b389d0a09a0..977a739d5448f 100644
+--- a/fs/ocfs2/xattr.c
++++ b/fs/ocfs2/xattr.c
+@@ -1074,7 +1074,7 @@ static int ocfs2_xattr_find_entry(struct inode *inode, int name_index,
+ {
+       struct ocfs2_xattr_entry *entry;
+       size_t name_len;
+-      int i, cmp = 1;
++      int i, name_offset, cmp = 1;
+       if (name == NULL)
+               return -EINVAL;
+@@ -1089,10 +1089,15 @@ static int ocfs2_xattr_find_entry(struct inode *inode, int name_index,
+               cmp = name_index - ocfs2_xattr_get_type(entry);
+               if (!cmp)
+                       cmp = name_len - entry->xe_name_len;
+-              if (!cmp)
+-                      cmp = memcmp(name, (xs->base +
+-                                   le16_to_cpu(entry->xe_name_offset)),
+-                                   name_len);
++              if (!cmp) {
++                      name_offset = le16_to_cpu(entry->xe_name_offset);
++                      if ((xs->base + name_offset + name_len) > xs->end) {
++                              ocfs2_error(inode->i_sb,
++                                          "corrupted xattr entries");
++                              return -EFSCORRUPTED;
++                      }
++                      cmp = memcmp(name, (xs->base + name_offset), name_len);
++              }
+               if (cmp == 0)
+                       break;
+               entry += 1;
+-- 
+2.43.0
+
diff --git a/queue-5.10/pinctrl-at91-make-it-work-with-current-gpiolib.patch b/queue-5.10/pinctrl-at91-make-it-work-with-current-gpiolib.patch
new file mode 100644 (file)
index 0000000..399cdb5
--- /dev/null
@@ -0,0 +1,51 @@
+From c7020fdc4d529b816eb8469cccc7c62d7cf2f9d3 Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Wed, 31 Jul 2024 01:16:26 +0200
+Subject: pinctrl: at91: make it work with current gpiolib
+
+From: Thomas Blocher <thomas.blocher@ek-dev.de>
+
+[ Upstream commit 752f387faaae0ae2e84d3f496922524785e77d60 ]
+
+pinctrl-at91 currently does not support the gpio-groups devicetree
+property and has no pin-range.
+Because of this at91 gpios stopped working since patch
+commit 2ab73c6d8323fa1e ("gpio: Support GPIO controllers without pin-ranges")
+This was discussed in the patches
+commit fc328a7d1fcce263 ("gpio: Revert regression in sysfs-gpio (gpiolib.c)")
+commit 56e337f2cf132632 ("Revert "gpio: Revert regression in sysfs-gpio (gpiolib.c)"")
+
+As a workaround manually set pin-range via gpiochip_add_pin_range() until
+a) pinctrl-at91 is reworked to support devicetree gpio-groups
+b) another solution as mentioned in
+commit 56e337f2cf132632 ("Revert "gpio: Revert regression in sysfs-gpio (gpiolib.c)"")
+is found
+
+Signed-off-by: Thomas Blocher <thomas.blocher@ek-dev.de>
+Link: https://lore.kernel.org/5b992862-355d-f0de-cd3d-ff99e67a4ff1@ek-dev.de
+Signed-off-by: Linus Walleij <linus.walleij@linaro.org>
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ drivers/pinctrl/pinctrl-at91.c | 5 ++++-
+ 1 file changed, 4 insertions(+), 1 deletion(-)
+
+diff --git a/drivers/pinctrl/pinctrl-at91.c b/drivers/pinctrl/pinctrl-at91.c
+index 52ecd47c18e2d..bb9348f14b1ba 100644
+--- a/drivers/pinctrl/pinctrl-at91.c
++++ b/drivers/pinctrl/pinctrl-at91.c
+@@ -1401,8 +1401,11 @@ static int at91_pinctrl_probe(struct platform_device *pdev)
+       /* We will handle a range of GPIO pins */
+       for (i = 0; i < gpio_banks; i++)
+-              if (gpio_chips[i])
++              if (gpio_chips[i]) {
+                       pinctrl_add_gpio_range(info->pctl, &gpio_chips[i]->range);
++                      gpiochip_add_pin_range(&gpio_chips[i]->chip, dev_name(info->pctl->dev), 0,
++                              gpio_chips[i]->range.pin_base, gpio_chips[i]->range.npins);
++              }
+       dev_info(&pdev->dev, "initialized AT91 pinctrl driver\n");
+-- 
+2.43.0
+
diff --git a/queue-5.10/pinctrl-at91-make-it-work-with-current-gpiolib.patch-30991 b/queue-5.10/pinctrl-at91-make-it-work-with-current-gpiolib.patch-30991
new file mode 100644 (file)
index 0000000..399cdb5
--- /dev/null
@@ -0,0 +1,51 @@
+From c7020fdc4d529b816eb8469cccc7c62d7cf2f9d3 Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Wed, 31 Jul 2024 01:16:26 +0200
+Subject: pinctrl: at91: make it work with current gpiolib
+
+From: Thomas Blocher <thomas.blocher@ek-dev.de>
+
+[ Upstream commit 752f387faaae0ae2e84d3f496922524785e77d60 ]
+
+pinctrl-at91 currently does not support the gpio-groups devicetree
+property and has no pin-range.
+Because of this at91 gpios stopped working since patch
+commit 2ab73c6d8323fa1e ("gpio: Support GPIO controllers without pin-ranges")
+This was discussed in the patches
+commit fc328a7d1fcce263 ("gpio: Revert regression in sysfs-gpio (gpiolib.c)")
+commit 56e337f2cf132632 ("Revert "gpio: Revert regression in sysfs-gpio (gpiolib.c)"")
+
+As a workaround manually set pin-range via gpiochip_add_pin_range() until
+a) pinctrl-at91 is reworked to support devicetree gpio-groups
+b) another solution as mentioned in
+commit 56e337f2cf132632 ("Revert "gpio: Revert regression in sysfs-gpio (gpiolib.c)"")
+is found
+
+Signed-off-by: Thomas Blocher <thomas.blocher@ek-dev.de>
+Link: https://lore.kernel.org/5b992862-355d-f0de-cd3d-ff99e67a4ff1@ek-dev.de
+Signed-off-by: Linus Walleij <linus.walleij@linaro.org>
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ drivers/pinctrl/pinctrl-at91.c | 5 ++++-
+ 1 file changed, 4 insertions(+), 1 deletion(-)
+
+diff --git a/drivers/pinctrl/pinctrl-at91.c b/drivers/pinctrl/pinctrl-at91.c
+index 52ecd47c18e2d..bb9348f14b1ba 100644
+--- a/drivers/pinctrl/pinctrl-at91.c
++++ b/drivers/pinctrl/pinctrl-at91.c
+@@ -1401,8 +1401,11 @@ static int at91_pinctrl_probe(struct platform_device *pdev)
+       /* We will handle a range of GPIO pins */
+       for (i = 0; i < gpio_banks; i++)
+-              if (gpio_chips[i])
++              if (gpio_chips[i]) {
+                       pinctrl_add_gpio_range(info->pctl, &gpio_chips[i]->range);
++                      gpiochip_add_pin_range(&gpio_chips[i]->chip, dev_name(info->pctl->dev), 0,
++                              gpio_chips[i]->range.pin_base, gpio_chips[i]->range.npins);
++              }
+       dev_info(&pdev->dev, "initialized AT91 pinctrl driver\n");
+-- 
+2.43.0
+
index fdaa0d5ae37c85b8a8f7a295adff12ad021e372f..2a92cd74142fce4a25a894f51b7821a8319ab776 100644 (file)
@@ -26,3 +26,33 @@ spi-nxp-fspi-fix-the-kasan-report-out-of-bounds-bug.patch
 soundwire-stream-revert-soundwire-stream-fix-programming-slave-ports-for-non-continous-port-maps.patch
 asoc-meson-axg-card-fix-use-after-free.patch
 dma-buf-heaps-fix-off-by-one-in-cma-heap-fault-handler.patch
+asoc-allow-module-autoloading-for-table-db1200_pids.patch
+alsa-hda-realtek-fixed-alc256-headphone-no-sound.patch
+alsa-hda-realtek-fixed-alc285-headphone-no-sound.patch
+pinctrl-at91-make-it-work-with-current-gpiolib.patch
+microblaze-don-t-treat-zero-reserved-memory-regions-.patch
+net-ftgmac100-ensure-tx-descriptor-updates-are-visib.patch
+wifi-iwlwifi-lower-message-level-for-fw-buffer-desti.patch
+wifi-iwlwifi-mvm-don-t-wait-for-tx-queues-if-firmwar.patch
+asoc-intel-fix-module-autoloading.patch
+asoc-tda7419-fix-module-autoloading.patch
+drm-komeda-fix-an-issue-related-to-normalized-zpos.patch
+spi-bcm63xx-enable-module-autoloading.patch
+x86-hyperv-set-x86_feature_tsc_known_freq-when-hyper.patch
+ocfs2-add-bounds-checking-to-ocfs2_xattr_find_entry.patch
+ocfs2-strict-bound-check-before-memcmp-in-ocfs2_xatt.patch
+asoc-allow-module-autoloading-for-table-db1200_pids.patch-27638
+alsa-hda-realtek-fixed-alc256-headphone-no-sound.patch-24351
+alsa-hda-realtek-fixed-alc285-headphone-no-sound.patch-13980
+pinctrl-at91-make-it-work-with-current-gpiolib.patch-30991
+microblaze-don-t-treat-zero-reserved-memory-regions-.patch-19083
+net-ftgmac100-ensure-tx-descriptor-updates-are-visib.patch-13387
+wifi-iwlwifi-lower-message-level-for-fw-buffer-desti.patch-16348
+wifi-iwlwifi-mvm-don-t-wait-for-tx-queues-if-firmwar.patch-5713
+asoc-intel-fix-module-autoloading.patch-32164
+asoc-tda7419-fix-module-autoloading.patch-14104
+drm-komeda-fix-an-issue-related-to-normalized-zpos.patch-23503
+spi-bcm63xx-enable-module-autoloading.patch-29644
+x86-hyperv-set-x86_feature_tsc_known_freq-when-hyper.patch-3718
+ocfs2-add-bounds-checking-to-ocfs2_xattr_find_entry.patch-28208
+ocfs2-strict-bound-check-before-memcmp-in-ocfs2_xatt.patch-28181
diff --git a/queue-5.10/spi-bcm63xx-enable-module-autoloading.patch b/queue-5.10/spi-bcm63xx-enable-module-autoloading.patch
new file mode 100644 (file)
index 0000000..7760669
--- /dev/null
@@ -0,0 +1,35 @@
+From ce07a4b5be5fa19cd32769c6d20eab43c55c19b9 Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Sat, 31 Aug 2024 09:42:31 +0000
+Subject: spi: bcm63xx: Enable module autoloading
+
+From: Liao Chen <liaochen4@huawei.com>
+
+[ Upstream commit 709df70a20e990d262c473ad9899314039e8ec82 ]
+
+Add MODULE_DEVICE_TABLE(), so modules could be properly autoloaded based
+on the alias from of_device_id table.
+
+Signed-off-by: Liao Chen <liaochen4@huawei.com>
+Link: https://patch.msgid.link/20240831094231.795024-1-liaochen4@huawei.com
+Signed-off-by: Mark Brown <broonie@kernel.org>
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ drivers/spi/spi-bcm63xx.c | 1 +
+ 1 file changed, 1 insertion(+)
+
+diff --git a/drivers/spi/spi-bcm63xx.c b/drivers/spi/spi-bcm63xx.c
+index d36384fef0d71..5f7eb0e613cda 100644
+--- a/drivers/spi/spi-bcm63xx.c
++++ b/drivers/spi/spi-bcm63xx.c
+@@ -482,6 +482,7 @@ static const struct of_device_id bcm63xx_spi_of_match[] = {
+       { .compatible = "brcm,bcm6358-spi", .data = &bcm6358_spi_reg_offsets },
+       { },
+ };
++MODULE_DEVICE_TABLE(of, bcm63xx_spi_of_match);
+ static int bcm63xx_spi_probe(struct platform_device *pdev)
+ {
+-- 
+2.43.0
+
diff --git a/queue-5.10/spi-bcm63xx-enable-module-autoloading.patch-29644 b/queue-5.10/spi-bcm63xx-enable-module-autoloading.patch-29644
new file mode 100644 (file)
index 0000000..7760669
--- /dev/null
@@ -0,0 +1,35 @@
+From ce07a4b5be5fa19cd32769c6d20eab43c55c19b9 Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Sat, 31 Aug 2024 09:42:31 +0000
+Subject: spi: bcm63xx: Enable module autoloading
+
+From: Liao Chen <liaochen4@huawei.com>
+
+[ Upstream commit 709df70a20e990d262c473ad9899314039e8ec82 ]
+
+Add MODULE_DEVICE_TABLE(), so modules could be properly autoloaded based
+on the alias from of_device_id table.
+
+Signed-off-by: Liao Chen <liaochen4@huawei.com>
+Link: https://patch.msgid.link/20240831094231.795024-1-liaochen4@huawei.com
+Signed-off-by: Mark Brown <broonie@kernel.org>
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ drivers/spi/spi-bcm63xx.c | 1 +
+ 1 file changed, 1 insertion(+)
+
+diff --git a/drivers/spi/spi-bcm63xx.c b/drivers/spi/spi-bcm63xx.c
+index d36384fef0d71..5f7eb0e613cda 100644
+--- a/drivers/spi/spi-bcm63xx.c
++++ b/drivers/spi/spi-bcm63xx.c
+@@ -482,6 +482,7 @@ static const struct of_device_id bcm63xx_spi_of_match[] = {
+       { .compatible = "brcm,bcm6358-spi", .data = &bcm6358_spi_reg_offsets },
+       { },
+ };
++MODULE_DEVICE_TABLE(of, bcm63xx_spi_of_match);
+ static int bcm63xx_spi_probe(struct platform_device *pdev)
+ {
+-- 
+2.43.0
+
diff --git a/queue-5.10/wifi-iwlwifi-lower-message-level-for-fw-buffer-desti.patch b/queue-5.10/wifi-iwlwifi-lower-message-level-for-fw-buffer-desti.patch
new file mode 100644 (file)
index 0000000..02117e8
--- /dev/null
@@ -0,0 +1,41 @@
+From 10726d2833723a4636ead003eb14898db2fb7ba9 Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Sun, 25 Aug 2024 19:17:13 +0300
+Subject: wifi: iwlwifi: lower message level for FW buffer destination
+
+From: Benjamin Berg <benjamin.berg@intel.com>
+
+[ Upstream commit f8a129c1e10256c785164ed5efa5d17d45fbd81b ]
+
+An invalid buffer destination is not a problem for the driver and it
+does not make sense to report it with the KERN_ERR message level. As
+such, change the message to use IWL_DEBUG_FW.
+
+Reported-by: Len Brown <lenb@kernel.org>
+Closes: https://lore.kernel.org/r/CAJvTdKkcxJss=DM2sxgv_MR5BeZ4_OC-3ad6tA40TYH2yqHCWw@mail.gmail.com
+Signed-off-by: Benjamin Berg <benjamin.berg@intel.com>
+Signed-off-by: Miri Korenblit <miriam.rachel.korenblit@intel.com>
+Link: https://patch.msgid.link/20240825191257.20abf78f05bc.Ifbcecc2ae9fb40b9698302507dcba8b922c8d856@changeid
+Signed-off-by: Johannes Berg <johannes.berg@intel.com>
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c | 3 ++-
+ 1 file changed, 2 insertions(+), 1 deletion(-)
+
+diff --git a/drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c b/drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c
+index 56f63f5f5dd34..2afa5c91bc76b 100644
+--- a/drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c
++++ b/drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c
+@@ -111,7 +111,8 @@ iwl_pcie_ctxt_info_dbg_enable(struct iwl_trans *trans,
+               }
+               break;
+       default:
+-              IWL_ERR(trans, "WRT: Invalid buffer destination\n");
++              IWL_DEBUG_FW(trans, "WRT: Invalid buffer destination (%d)\n",
++                           le32_to_cpu(fw_mon_cfg->buf_location));
+       }
+ out:
+       if (dbg_flags)
+-- 
+2.43.0
+
diff --git a/queue-5.10/wifi-iwlwifi-lower-message-level-for-fw-buffer-desti.patch-16348 b/queue-5.10/wifi-iwlwifi-lower-message-level-for-fw-buffer-desti.patch-16348
new file mode 100644 (file)
index 0000000..02117e8
--- /dev/null
@@ -0,0 +1,41 @@
+From 10726d2833723a4636ead003eb14898db2fb7ba9 Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Sun, 25 Aug 2024 19:17:13 +0300
+Subject: wifi: iwlwifi: lower message level for FW buffer destination
+
+From: Benjamin Berg <benjamin.berg@intel.com>
+
+[ Upstream commit f8a129c1e10256c785164ed5efa5d17d45fbd81b ]
+
+An invalid buffer destination is not a problem for the driver and it
+does not make sense to report it with the KERN_ERR message level. As
+such, change the message to use IWL_DEBUG_FW.
+
+Reported-by: Len Brown <lenb@kernel.org>
+Closes: https://lore.kernel.org/r/CAJvTdKkcxJss=DM2sxgv_MR5BeZ4_OC-3ad6tA40TYH2yqHCWw@mail.gmail.com
+Signed-off-by: Benjamin Berg <benjamin.berg@intel.com>
+Signed-off-by: Miri Korenblit <miriam.rachel.korenblit@intel.com>
+Link: https://patch.msgid.link/20240825191257.20abf78f05bc.Ifbcecc2ae9fb40b9698302507dcba8b922c8d856@changeid
+Signed-off-by: Johannes Berg <johannes.berg@intel.com>
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c | 3 ++-
+ 1 file changed, 2 insertions(+), 1 deletion(-)
+
+diff --git a/drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c b/drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c
+index 56f63f5f5dd34..2afa5c91bc76b 100644
+--- a/drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c
++++ b/drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c
+@@ -111,7 +111,8 @@ iwl_pcie_ctxt_info_dbg_enable(struct iwl_trans *trans,
+               }
+               break;
+       default:
+-              IWL_ERR(trans, "WRT: Invalid buffer destination\n");
++              IWL_DEBUG_FW(trans, "WRT: Invalid buffer destination (%d)\n",
++                           le32_to_cpu(fw_mon_cfg->buf_location));
+       }
+ out:
+       if (dbg_flags)
+-- 
+2.43.0
+
diff --git a/queue-5.10/wifi-iwlwifi-mvm-don-t-wait-for-tx-queues-if-firmwar.patch b/queue-5.10/wifi-iwlwifi-mvm-don-t-wait-for-tx-queues-if-firmwar.patch
new file mode 100644 (file)
index 0000000..6758460
--- /dev/null
@@ -0,0 +1,60 @@
+From d017cf712ca3e878dcc85778061179a96dfedc08 Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Sun, 25 Aug 2024 19:17:04 +0300
+Subject: wifi: iwlwifi: mvm: don't wait for tx queues if firmware is dead
+
+From: Emmanuel Grumbach <emmanuel.grumbach@intel.com>
+
+[ Upstream commit 3a84454f5204718ca5b4ad2c1f0bf2031e2403d1 ]
+
+There is a WARNING in iwl_trans_wait_tx_queues_empty() (that was
+recently converted from just a message), that can be hit if we
+wait for TX queues to become empty after firmware died. Clearly,
+we can't expect anything from the firmware after it's declared dead.
+
+Don't call iwl_trans_wait_tx_queues_empty() in this case. While it could
+be a good idea to stop the flow earlier, the flush functions do some
+maintenance work that is not related to the firmware, so keep that part
+of the code running even when the firmware is not running.
+
+Signed-off-by: Emmanuel Grumbach <emmanuel.grumbach@intel.com>
+Signed-off-by: Miri Korenblit <miriam.rachel.korenblit@intel.com>
+Link: https://patch.msgid.link/20240825191257.a7cbd794cee9.I44a739fbd4ffcc46b83844dd1c7b2eb0c7b270f6@changeid
+[edit commit message]
+Signed-off-by: Johannes Berg <johannes.berg@intel.com>
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ drivers/net/wireless/intel/iwlwifi/mvm/mac80211.c | 9 ++++++++-
+ 1 file changed, 8 insertions(+), 1 deletion(-)
+
+diff --git a/drivers/net/wireless/intel/iwlwifi/mvm/mac80211.c b/drivers/net/wireless/intel/iwlwifi/mvm/mac80211.c
+index 08008b0c0637c..fa784d8352901 100644
+--- a/drivers/net/wireless/intel/iwlwifi/mvm/mac80211.c
++++ b/drivers/net/wireless/intel/iwlwifi/mvm/mac80211.c
+@@ -4747,6 +4747,10 @@ static void iwl_mvm_flush_no_vif(struct iwl_mvm *mvm, u32 queues, bool drop)
+       int i;
+       if (!iwl_mvm_has_new_tx_api(mvm)) {
++              /* we can't ask the firmware anything if it is dead */
++              if (test_bit(IWL_MVM_STATUS_HW_RESTART_REQUESTED,
++                           &mvm->status))
++                      return;
+               if (drop) {
+                       mutex_lock(&mvm->mutex);
+                       iwl_mvm_flush_tx_path(mvm,
+@@ -4828,8 +4832,11 @@ static void iwl_mvm_mac_flush(struct ieee80211_hw *hw,
+       /* this can take a while, and we may need/want other operations
+        * to succeed while doing this, so do it without the mutex held
++       * If the firmware is dead, this can't work...
+        */
+-      if (!drop && !iwl_mvm_has_new_tx_api(mvm))
++      if (!drop && !iwl_mvm_has_new_tx_api(mvm) &&
++          !test_bit(IWL_MVM_STATUS_HW_RESTART_REQUESTED,
++                    &mvm->status))
+               iwl_trans_wait_tx_queues_empty(mvm->trans, msk);
+ }
+-- 
+2.43.0
+
diff --git a/queue-5.10/wifi-iwlwifi-mvm-don-t-wait-for-tx-queues-if-firmwar.patch-5713 b/queue-5.10/wifi-iwlwifi-mvm-don-t-wait-for-tx-queues-if-firmwar.patch-5713
new file mode 100644 (file)
index 0000000..6758460
--- /dev/null
@@ -0,0 +1,60 @@
+From d017cf712ca3e878dcc85778061179a96dfedc08 Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Sun, 25 Aug 2024 19:17:04 +0300
+Subject: wifi: iwlwifi: mvm: don't wait for tx queues if firmware is dead
+
+From: Emmanuel Grumbach <emmanuel.grumbach@intel.com>
+
+[ Upstream commit 3a84454f5204718ca5b4ad2c1f0bf2031e2403d1 ]
+
+There is a WARNING in iwl_trans_wait_tx_queues_empty() (that was
+recently converted from just a message), that can be hit if we
+wait for TX queues to become empty after firmware died. Clearly,
+we can't expect anything from the firmware after it's declared dead.
+
+Don't call iwl_trans_wait_tx_queues_empty() in this case. While it could
+be a good idea to stop the flow earlier, the flush functions do some
+maintenance work that is not related to the firmware, so keep that part
+of the code running even when the firmware is not running.
+
+Signed-off-by: Emmanuel Grumbach <emmanuel.grumbach@intel.com>
+Signed-off-by: Miri Korenblit <miriam.rachel.korenblit@intel.com>
+Link: https://patch.msgid.link/20240825191257.a7cbd794cee9.I44a739fbd4ffcc46b83844dd1c7b2eb0c7b270f6@changeid
+[edit commit message]
+Signed-off-by: Johannes Berg <johannes.berg@intel.com>
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ drivers/net/wireless/intel/iwlwifi/mvm/mac80211.c | 9 ++++++++-
+ 1 file changed, 8 insertions(+), 1 deletion(-)
+
+diff --git a/drivers/net/wireless/intel/iwlwifi/mvm/mac80211.c b/drivers/net/wireless/intel/iwlwifi/mvm/mac80211.c
+index 08008b0c0637c..fa784d8352901 100644
+--- a/drivers/net/wireless/intel/iwlwifi/mvm/mac80211.c
++++ b/drivers/net/wireless/intel/iwlwifi/mvm/mac80211.c
+@@ -4747,6 +4747,10 @@ static void iwl_mvm_flush_no_vif(struct iwl_mvm *mvm, u32 queues, bool drop)
+       int i;
+       if (!iwl_mvm_has_new_tx_api(mvm)) {
++              /* we can't ask the firmware anything if it is dead */
++              if (test_bit(IWL_MVM_STATUS_HW_RESTART_REQUESTED,
++                           &mvm->status))
++                      return;
+               if (drop) {
+                       mutex_lock(&mvm->mutex);
+                       iwl_mvm_flush_tx_path(mvm,
+@@ -4828,8 +4832,11 @@ static void iwl_mvm_mac_flush(struct ieee80211_hw *hw,
+       /* this can take a while, and we may need/want other operations
+        * to succeed while doing this, so do it without the mutex held
++       * If the firmware is dead, this can't work...
+        */
+-      if (!drop && !iwl_mvm_has_new_tx_api(mvm))
++      if (!drop && !iwl_mvm_has_new_tx_api(mvm) &&
++          !test_bit(IWL_MVM_STATUS_HW_RESTART_REQUESTED,
++                    &mvm->status))
+               iwl_trans_wait_tx_queues_empty(mvm->trans, msk);
+ }
+-- 
+2.43.0
+
diff --git a/queue-5.10/x86-hyperv-set-x86_feature_tsc_known_freq-when-hyper.patch b/queue-5.10/x86-hyperv-set-x86_feature_tsc_known_freq-when-hyper.patch
new file mode 100644 (file)
index 0000000..030ebe3
--- /dev/null
@@ -0,0 +1,49 @@
+From 3f7801157dc5c07dd696df8e971559c82690a9b8 Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Wed, 5 Jun 2024 19:55:59 -0700
+Subject: x86/hyperv: Set X86_FEATURE_TSC_KNOWN_FREQ when Hyper-V provides
+ frequency
+
+From: Michael Kelley <mhklinux@outlook.com>
+
+[ Upstream commit 8fcc514809de41153b43ccbe1a0cdf7f72b78e7e ]
+
+A Linux guest on Hyper-V gets the TSC frequency from a synthetic MSR, if
+available. In this case, set X86_FEATURE_TSC_KNOWN_FREQ so that Linux
+doesn't unnecessarily do refined TSC calibration when setting up the TSC
+clocksource.
+
+With this change, a message such as this is no longer output during boot
+when the TSC is used as the clocksource:
+
+[    1.115141] tsc: Refined TSC clocksource calibration: 2918.408 MHz
+
+Furthermore, the guest and host will have exactly the same view of the
+TSC frequency, which is important for features such as the TSC deadline
+timer that are emulated by the Hyper-V host.
+
+Signed-off-by: Michael Kelley <mhklinux@outlook.com>
+Reviewed-by: Roman Kisel <romank@linux.microsoft.com>
+Link: https://lore.kernel.org/r/20240606025559.1631-1-mhklinux@outlook.com
+Signed-off-by: Wei Liu <wei.liu@kernel.org>
+Message-ID: <20240606025559.1631-1-mhklinux@outlook.com>
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ arch/x86/kernel/cpu/mshyperv.c | 1 +
+ 1 file changed, 1 insertion(+)
+
+diff --git a/arch/x86/kernel/cpu/mshyperv.c b/arch/x86/kernel/cpu/mshyperv.c
+index 021cd067733e3..a91aad434d03d 100644
+--- a/arch/x86/kernel/cpu/mshyperv.c
++++ b/arch/x86/kernel/cpu/mshyperv.c
+@@ -275,6 +275,7 @@ static void __init ms_hyperv_init_platform(void)
+           ms_hyperv.misc_features & HV_FEATURE_FREQUENCY_MSRS_AVAILABLE) {
+               x86_platform.calibrate_tsc = hv_get_tsc_khz;
+               x86_platform.calibrate_cpu = hv_get_tsc_khz;
++              setup_force_cpu_cap(X86_FEATURE_TSC_KNOWN_FREQ);
+       }
+       if (ms_hyperv.hints & HV_X64_ENLIGHTENED_VMCS_RECOMMENDED) {
+-- 
+2.43.0
+
diff --git a/queue-5.10/x86-hyperv-set-x86_feature_tsc_known_freq-when-hyper.patch-3718 b/queue-5.10/x86-hyperv-set-x86_feature_tsc_known_freq-when-hyper.patch-3718
new file mode 100644 (file)
index 0000000..030ebe3
--- /dev/null
@@ -0,0 +1,49 @@
+From 3f7801157dc5c07dd696df8e971559c82690a9b8 Mon Sep 17 00:00:00 2001
+From: Sasha Levin <sashal@kernel.org>
+Date: Wed, 5 Jun 2024 19:55:59 -0700
+Subject: x86/hyperv: Set X86_FEATURE_TSC_KNOWN_FREQ when Hyper-V provides
+ frequency
+
+From: Michael Kelley <mhklinux@outlook.com>
+
+[ Upstream commit 8fcc514809de41153b43ccbe1a0cdf7f72b78e7e ]
+
+A Linux guest on Hyper-V gets the TSC frequency from a synthetic MSR, if
+available. In this case, set X86_FEATURE_TSC_KNOWN_FREQ so that Linux
+doesn't unnecessarily do refined TSC calibration when setting up the TSC
+clocksource.
+
+With this change, a message such as this is no longer output during boot
+when the TSC is used as the clocksource:
+
+[    1.115141] tsc: Refined TSC clocksource calibration: 2918.408 MHz
+
+Furthermore, the guest and host will have exactly the same view of the
+TSC frequency, which is important for features such as the TSC deadline
+timer that are emulated by the Hyper-V host.
+
+Signed-off-by: Michael Kelley <mhklinux@outlook.com>
+Reviewed-by: Roman Kisel <romank@linux.microsoft.com>
+Link: https://lore.kernel.org/r/20240606025559.1631-1-mhklinux@outlook.com
+Signed-off-by: Wei Liu <wei.liu@kernel.org>
+Message-ID: <20240606025559.1631-1-mhklinux@outlook.com>
+Signed-off-by: Sasha Levin <sashal@kernel.org>
+---
+ arch/x86/kernel/cpu/mshyperv.c | 1 +
+ 1 file changed, 1 insertion(+)
+
+diff --git a/arch/x86/kernel/cpu/mshyperv.c b/arch/x86/kernel/cpu/mshyperv.c
+index 021cd067733e3..a91aad434d03d 100644
+--- a/arch/x86/kernel/cpu/mshyperv.c
++++ b/arch/x86/kernel/cpu/mshyperv.c
+@@ -275,6 +275,7 @@ static void __init ms_hyperv_init_platform(void)
+           ms_hyperv.misc_features & HV_FEATURE_FREQUENCY_MSRS_AVAILABLE) {
+               x86_platform.calibrate_tsc = hv_get_tsc_khz;
+               x86_platform.calibrate_cpu = hv_get_tsc_khz;
++              setup_force_cpu_cap(X86_FEATURE_TSC_KNOWN_FREQ);
+       }
+       if (ms_hyperv.hints & HV_X64_ENLIGHTENED_VMCS_RECOMMENDED) {
+-- 
+2.43.0
+