aboutsummaryrefslogtreecommitdiffstats
path: root/drivers
AgeCommit message (Collapse)Author
2020-05-28Merge branch 'standard/base' into standard/intel/basestandard/intel/baseBruce Ashfield
2020-05-28Merge tag 'v4.4.225' into standard/basestandard/tiny/common-pcstandard/tiny/basestandard/qemuppcstandard/qemuarm64standard/edgerouterstandard/beaglebonestandard/baseBruce Ashfield
This is the 4.4.225 stable release # gpg: Signature made Wed 27 May 2020 10:40:37 AM EDT # gpg: using RSA key 647F28654894E3BD457199BE38DBBDC86092693E # gpg: Can't check signature: No public key
2020-05-28Merge branch 'standard/base' into standard/intel/baseBruce Ashfield
2020-05-28Merge tag 'v4.4.224' into standard/baseBruce Ashfield
This is the 4.4.224 stable release # gpg: Signature made Wed 20 May 2020 02:14:07 AM EDT # gpg: using RSA key 647F28654894E3BD457199BE38DBBDC86092693E # gpg: Can't check signature: No public key
2020-05-28Merge branch 'standard/base' into standard/intel/baseBruce Ashfield
2020-05-28Merge tag 'v4.4.223' into standard/baseBruce Ashfield
This is the 4.4.223 stable release # gpg: Signature made Sun 10 May 2020 04:26:50 AM EDT # gpg: using RSA key 647F28654894E3BD457199BE38DBBDC86092693E # gpg: Can't check signature: No public key
2020-05-28Merge branch 'standard/base' into standard/intel/baseBruce Ashfield
2020-05-28Merge tag 'v4.4.222' into standard/baseBruce Ashfield
This is the 4.4.222 stable release # gpg: Signature made Tue 05 May 2020 01:13:29 PM EDT # gpg: using RSA key 647F28654894E3BD457199BE38DBBDC86092693E # gpg: Can't check signature: No public key
2020-05-28Merge branch 'standard/base' into standard/intel/baseBruce Ashfield
2020-05-28Merge tag 'v4.4.221' into standard/baseBruce Ashfield
This is the 4.4.221 stable release # gpg: Signature made Sat 02 May 2020 11:22:00 AM EDT # gpg: using RSA key 647F28654894E3BD457199BE38DBBDC86092693E # gpg: Can't check signature: No public key
2020-05-28Merge branch 'standard/base' into standard/intel/baseBruce Ashfield
2020-05-28Merge tag 'v4.4.220' into standard/baseBruce Ashfield
This is the 4.4.220 stable release # gpg: Signature made Fri 24 Apr 2020 01:57:28 AM EDT # gpg: using RSA key 647F28654894E3BD457199BE38DBBDC86092693E # gpg: Can't check signature: No public key
2020-05-28Merge branch 'standard/base' into standard/intel/baseBruce Ashfield
2020-05-28Merge tag 'v4.4.219' into standard/baseBruce Ashfield
This is the 4.4.219 stable release # gpg: Signature made Mon 13 Apr 2020 04:31:37 AM EDT # gpg: using RSA key 647F28654894E3BD457199BE38DBBDC86092693E # gpg: Can't check signature: No public key
2020-05-28Merge branch 'standard/base' into standard/intel/baseBruce Ashfield
2020-05-28Merge tag 'v4.4.218' into standard/baseBruce Ashfield
This is the 4.4.218 stable release # gpg: Signature made Thu 02 Apr 2020 01:16:56 PM EDT # gpg: using RSA key 647F28654894E3BD457199BE38DBBDC86092693E # gpg: Can't check signature: No public key
2020-05-28Merge branch 'standard/base' into standard/intel/baseBruce Ashfield
2020-05-28Merge tag 'v4.4.217' into standard/baseBruce Ashfield
This is the 4.4.217 stable release # gpg: Signature made Fri 20 Mar 2020 04:06:37 AM EDT # gpg: using RSA key 647F28654894E3BD457199BE38DBBDC86092693E # gpg: Can't check signature: No public key
2020-05-28Merge branch 'standard/base' into standard/intel/baseBruce Ashfield
2020-05-28Merge tag 'v4.4.216' into standard/baseBruce Ashfield
This is the 4.4.216 stable release # gpg: Signature made Wed 11 Mar 2020 02:51:20 AM EDT # gpg: using RSA key 647F28654894E3BD457199BE38DBBDC86092693E # gpg: Can't check signature: No public key
2020-05-28Merge branch 'standard/base' into standard/intel/baseBruce Ashfield
2020-05-28Merge tag 'v4.4.215' into standard/baseBruce Ashfield
This is the 4.4.215 stable release # gpg: Signature made Fri 28 Feb 2020 09:40:32 AM EST # gpg: using RSA key 647F28654894E3BD457199BE38DBBDC86092693E # gpg: Can't check signature: No public key
2020-05-28Merge branch 'standard/base' into standard/intel/baseBruce Ashfield
2020-05-28Merge tag 'v4.4.214' into standard/baseBruce Ashfield
This is the 4.4.214 stable release # gpg: Signature made Fri 14 Feb 2020 04:30:03 PM EST # gpg: using RSA key 647F28654894E3BD457199BE38DBBDC86092693E # gpg: Can't check signature: No public key
2020-05-28Merge branch 'standard/base' into standard/intel/baseBruce Ashfield
2020-05-28Merge tag 'v4.4.213' into standard/baseBruce Ashfield
This is the 4.4.213 stable release # gpg: Signature made Wed 05 Feb 2020 08:03:53 AM EST # gpg: using RSA key 647F28654894E3BD457199BE38DBBDC86092693E # gpg: Can't check signature: No public key
2020-05-28Merge branch 'standard/base' into standard/intel/baseBruce Ashfield
2020-05-28Merge tag 'v4.4.212' into standard/baseBruce Ashfield
This is the 4.4.212 stable release # gpg: Signature made Wed 29 Jan 2020 04:22:58 AM EST # gpg: using RSA key 647F28654894E3BD457199BE38DBBDC86092693E # gpg: Can't check signature: No public key
2020-05-28Merge branch 'standard/base' into standard/intel/baseBruce Ashfield
2020-05-28Merge tag 'v4.4.211' into standard/baseBruce Ashfield
This is the 4.4.211 stable release # gpg: Signature made Thu 23 Jan 2020 02:18:43 AM EST # gpg: using RSA key 647F28654894E3BD457199BE38DBBDC86092693E # gpg: Can't check signature: No public key
2020-05-28Merge branch 'standard/base' into standard/intel/baseBruce Ashfield
2020-05-28Merge tag 'v4.4.210' into standard/baseBruce Ashfield
This is the 4.4.210 stable release # gpg: Signature made Tue 14 Jan 2020 02:03:09 PM EST # gpg: using RSA key 647F28654894E3BD457199BE38DBBDC86092693E # gpg: Can't check signature: No public key
2020-05-28Merge branch 'standard/base' into standard/intel/baseBruce Ashfield
2020-05-28Merge tag 'v4.4.209' into standard/baseBruce Ashfield
This is the 4.4.209 stable release # gpg: Signature made Sun 12 Jan 2020 05:23:03 AM EST # gpg: using RSA key 647F28654894E3BD457199BE38DBBDC86092693E # gpg: Can't check signature: No public key
2020-05-28Merge tag 'v4.4.208' into standard/baseBruce Ashfield
This is the 4.4.208 stable release # gpg: Signature made Sat 04 Jan 2020 07:37:43 AM EST # gpg: using RSA key 647F28654894E3BD457199BE38DBBDC86092693E # gpg: Can't check signature: No public key
2020-05-28Merge branch 'standard/base' into standard/intel/baseBruce Ashfield
2020-05-28Merge tag 'v4.4.207' into standard/baseBruce Ashfield
This is the 4.4.207 stable release # gpg: Signature made Sat 21 Dec 2019 04:37:10 AM EST # gpg: using RSA key 647F28654894E3BD457199BE38DBBDC86092693E # gpg: Can't check signature: No public key
2020-05-28Merge branch 'standard/base' into standard/intel/baseBruce Ashfield
2020-05-28Merge tag 'v4.4.206' into standard/baseBruce Ashfield
This is the 4.4.206 stable release # gpg: Signature made Thu 05 Dec 2019 09:32:59 AM EST # gpg: using RSA key 647F28654894E3BD457199BE38DBBDC86092693E # gpg: Can't check signature: No public key
2020-05-28Merge branch 'standard/base' into standard/intel/baseBruce Ashfield
2020-05-28Merge tag 'v4.4.204' into standard/baseBruce Ashfield
This is the 4.4.204 stable release # gpg: Signature made Thu 28 Nov 2019 12:27:06 PM EST # gpg: using RSA key 647F28654894E3BD457199BE38DBBDC86092693E # gpg: Can't check signature: No public key
2020-05-28Merge branch 'standard/base' into standard/intel/baseBruce Ashfield
2020-05-28Merge tag 'v4.4.203' into standard/baseBruce Ashfield
This is the 4.4.203 stable release # gpg: Signature made Mon 25 Nov 2019 09:55:01 AM EST # gpg: using RSA key 647F28654894E3BD457199BE38DBBDC86092693E # gpg: Can't check signature: No public key
2020-05-27iio: sca3000: Remove an erroneous 'get_device()'Christophe JAILLET
[ Upstream commit 928edefbc18cd8433f7df235c6e09a9306e7d580 ] This looks really unusual to have a 'get_device()' hidden in a 'dev_err()' call. Remove it. While at it add a missing \n at the end of the message. Fixes: 574fb258d636 ("Staging: IIO: VTI sca3000 series accelerometer driver (spi)") Signed-off-by: Christophe JAILLET <christophe.jaillet@wanadoo.fr> Cc: <Stable@vger.kernel.org> Signed-off-by: Jonathan Cameron <Jonathan.Cameron@huawei.com> Signed-off-by: Sasha Levin <sashal@kernel.org>
2020-05-27mei: release me_cl object referenceAlexander Usyskin
commit fc9c03ce30f79b71807961bfcb42be191af79873 upstream. Allow me_cl object to be freed by releasing the reference that was acquired by one of the search functions: __mei_me_cl_by_uuid_id() or __mei_me_cl_by_uuid() Cc: <stable@vger.kernel.org> Reported-by: 亿一 <teroincn@gmail.com> Signed-off-by: Alexander Usyskin <alexander.usyskin@intel.com> Signed-off-by: Tomas Winkler <tomas.winkler@intel.com> Link: https://lore.kernel.org/r/20200512223140.32186-1-tomas.winkler@intel.com Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2020-05-27staging: iio: ad2s1210: Fix SPI readingDragos Bogdan
commit 5e4f99a6b788047b0b8a7496c2e0c8f372f6edf2 upstream. If the serial interface is used, the 8-bit address should be latched using the rising edge of the WR/FSYNC signal. This basically means that a CS change is required between the first byte sent, and the second one. This change splits the single-transfer transfer of 2 bytes into 2 transfers with a single byte, and CS change in-between. Note fixes tag is not accurate, but reflects a point beyond which there are too many refactors to make backporting straight forward. Fixes: b19e9ad5e2cb ("staging:iio:resolver:ad2s1210 general driver cleanup.") Signed-off-by: Dragos Bogdan <dragos.bogdan@analog.com> Signed-off-by: Alexandru Ardelean <alexandru.ardelean@analog.com> Cc: <Stable@vger.kernel.org> Signed-off-by: Jonathan Cameron <Jonathan.Cameron@huawei.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2020-05-27libnvdimm/btt: Remove unnecessary code in btt_freelist_initVishal Verma
[ Upstream commit 2f8c9011151337d0bc106693f272f9bddbccfab2 ] We call btt_log_read() twice, once to get the 'old' log entry, and again to get the 'new' entry. However, we have no use for the 'old' entry, so remove it. Cc: Dan Williams <dan.j.williams@intel.com> Signed-off-by: Vishal Verma <vishal.l.verma@intel.com> Signed-off-by: Dan Williams <dan.j.williams@intel.com> Signed-off-by: Sasha Levin <sashal@kernel.org>
2020-05-27platform/x86: alienware-wmi: fix kfree on potentially uninitialized pointerColin Ian King
commit 98e2630284ab741804bd0713e932e725466f2f84 upstream. Currently the kfree of output.pointer can be potentially freeing an uninitalized pointer in the case where out_data is NULL. Fix this by reworking the case where out_data is not-null to perform the ACPI status check and also the kfree of outpoint.pointer in one block and hence ensuring the pointer is only freed when it has been used. Also replace the if (ptr != NULL) idiom with just if (ptr). Fixes: ff0e9f26288d ("platform/x86: alienware-wmi: Correct a memory leak") Signed-off-by: Colin Ian King <colin.king@canonical.com> Signed-off-by: Darren Hart (VMware) <dvhart@infradead.org> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2020-05-27i2c: dev: Fix the race between the release of i2c_dev and cdevKevin Hao
commit 1413ef638abae4ab5621901cf4d8ef08a4a48ba6 upstream. The struct cdev is embedded in the struct i2c_dev. In the current code, we would free the i2c_dev struct directly in put_i2c_dev(), but the cdev is manged by a kobject, and the release of it is not predictable. So it is very possible that the i2c_dev is freed before the cdev is entirely released. We can easily get the following call trace with CONFIG_DEBUG_KOBJECT_RELEASE and CONFIG_DEBUG_OBJECTS_TIMERS enabled. ODEBUG: free active (active state 0) object type: timer_list hint: delayed_work_timer_fn+0x0/0x38 WARNING: CPU: 19 PID: 1 at lib/debugobjects.c:325 debug_print_object+0xb0/0xf0 Modules linked in: CPU: 19 PID: 1 Comm: swapper/0 Tainted: G W 5.2.20-yocto-standard+ #120 Hardware name: Marvell OcteonTX CN96XX board (DT) pstate: 80c00089 (Nzcv daIf +PAN +UAO) pc : debug_print_object+0xb0/0xf0 lr : debug_print_object+0xb0/0xf0 sp : ffff00001292f7d0 x29: ffff00001292f7d0 x28: ffff800b82151788 x27: 0000000000000001 x26: ffff800b892c0000 x25: ffff0000124a2558 x24: 0000000000000000 x23: ffff00001107a1d8 x22: ffff0000116b5088 x21: ffff800bdc6afca8 x20: ffff000012471ae8 x19: ffff00001168f2c8 x18: 0000000000000010 x17: 00000000fd6f304b x16: 00000000ee79de43 x15: ffff800bc0e80568 x14: 79616c6564203a74 x13: 6e6968207473696c x12: 5f72656d6974203a x11: ffff0000113f0018 x10: 0000000000000000 x9 : 000000000000001f x8 : 0000000000000000 x7 : ffff0000101294cc x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000001 x3 : 00000000ffffffff x2 : 0000000000000000 x1 : 387fc15c8ec0f200 x0 : 0000000000000000 Call trace: debug_print_object+0xb0/0xf0 __debug_check_no_obj_freed+0x19c/0x228 debug_check_no_obj_freed+0x1c/0x28 kfree+0x250/0x440 put_i2c_dev+0x68/0x78 i2cdev_detach_adapter+0x60/0xc8 i2cdev_notifier_call+0x3c/0x70 notifier_call_chain+0x8c/0xe8 blocking_notifier_call_chain+0x64/0x88 device_del+0x74/0x380 device_unregister+0x54/0x78 i2c_del_adapter+0x278/0x2d0 unittest_i2c_bus_remove+0x3c/0x80 platform_drv_remove+0x30/0x50 device_release_driver_internal+0xf4/0x1c0 driver_detach+0x58/0xa0 bus_remove_driver+0x84/0xd8 driver_unregister+0x34/0x60 platform_driver_unregister+0x20/0x30 of_unittest_overlay+0x8d4/0xbe0 of_unittest+0xae8/0xb3c do_one_initcall+0xac/0x450 do_initcall_level+0x208/0x224 kernel_init_freeable+0x2d8/0x36c kernel_init+0x18/0x108 ret_from_fork+0x10/0x1c irq event stamp: 3934661 hardirqs last enabled at (3934661): [<ffff00001009fa04>] debug_exception_exit+0x4c/0x58 hardirqs last disabled at (3934660): [<ffff00001009fb14>] debug_exception_enter+0xa4/0xe0 softirqs last enabled at (3934654): [<ffff000010081d94>] __do_softirq+0x46c/0x628 softirqs last disabled at (3934649): [<ffff0000100b4a1c>] irq_exit+0x104/0x118 This is a common issue when using cdev embedded in a struct. Fortunately, we already have a mechanism to solve this kind of issue. Please see commit 233ed09d7fda ("chardev: add helper function to register char devs with a struct device") for more detail. In this patch, we choose to embed the struct device into the i2c_dev, and use the API provided by the commit 233ed09d7fda to make sure that the release of i2c_dev and cdev are in sequence. Signed-off-by: Kevin Hao <haokexin@gmail.com> Signed-off-by: Wolfram Sang <wsa@the-dreams.de> Signed-off-by: Ben Hutchings <ben.hutchings@codethink.co.uk> Signed-off-by: Sasha Levin <sashal@kernel.org>
2020-05-27i2c-dev: don't get i2c adapter via i2c_devviresh kumar
commit 5136ed4fcb05cd4981cc6034a11e66370ed84789 upstream. There is no code protecting i2c_dev to be freed after it is returned from i2c_dev_get_by_minor() and using it to access the value which we already have (minor) isn't safe really. Avoid using it and get the adapter directly from 'minor'. Signed-off-by: Viresh Kumar <viresh.kumar@linaro.org> Reviewed-by: Jean Delvare <jdelvare@suse.de> Tested-by: Jean Delvare <jdelvare@suse.de> Signed-off-by: Wolfram Sang <wsa@the-dreams.de> Signed-off-by: Ben Hutchings <ben.hutchings@codethink.co.uk> Signed-off-by: Sasha Levin <sashal@kernel.org>