Commit Graph

1002781 Commits

Author SHA1 Message Date
Elliot Berman
58567cd013 build.config.msm.gki: Add other symbol lists
Due to limitation of ABI checker, ABI differences can be reported if
symbol list of the reference ABI snapshot does not match. Add the
missing the other symbol lists.

The benefit lost by adding other symbol lists is that build_abi.sh would
not report missing symbols from abi_gki_aarch64_qcom symbol list since
symbol may be added by another contributor, but not into
abi_gki_aarch64_qcom list. This benefit can be re-acquired by pre-merge
checks.

Change-Id: Ie66bde15e7e8b085936faaecc06f0df91a42074d
Signed-off-by: Elliot Berman <eberman@codeaurora.org>
2021-10-07 11:36:14 -07:00
qctecmdr
df948c0d82 Merge "cnss_utils: ipc_qmi: Include sched.h header file" 2021-10-06 20:47:11 -07:00
qctecmdr
b533e45c93 Merge "Revert "soc: qcom: ramdump: Fix data passed to devcoredump"" 2021-10-06 20:47:11 -07:00
qctecmdr
e444d2a62d Merge "spi: spi-msm-geni: Avoid potential NULL pointer access" 2021-10-06 20:47:10 -07:00
qctecmdr
8ae4c52d74 Merge "drivers: dcvs: pmu_lib: fix return value in setup_events" 2021-10-06 20:47:10 -07:00
qctecmdr
66c8abecc3 Merge "defconfig: neo: enable pinctrl Neo" 2021-10-06 20:47:09 -07:00
qctecmdr
52ccb9c277 Merge "cpuidle: governors: qcom: Convey device's next_wakeup info to genpd" 2021-10-06 20:47:09 -07:00
qctecmdr
7833913c0b Merge "msm: pci: print RPMSG return type on failure" 2021-10-06 20:47:08 -07:00
Elliot Berman
304feaaf98 Revert "dma: qcom: bam_dma: Add IPC log support for upstream bam"
This reverts commit 3d0e736e2b.

Change-Id: I3a0d1eba68983cff0f4a1e2453e3c6809dec954c
2021-10-06 17:57:27 -07:00
qctecmdr
22bd63d9af Merge "serial: msm-geni-serial: avoid potential NULL pointer access" 2021-10-06 15:52:15 -07:00
qctecmdr
e6f5392f8b Merge "input: touchscreen: nt36xxx: update novatek i2c touch driver" 2021-10-06 15:52:14 -07:00
qctecmdr
04fa7d9aa1 Merge "soc: qcom: socinfo: Add cape & cape-v2 soc-id in socinfo list" 2021-10-06 15:52:14 -07:00
qctecmdr
e560f2ec60 Merge "cnss2: Fix a few switch statement fallthrough issues" 2021-10-06 15:52:13 -07:00
qctecmdr
4959b3c2c5 Merge "cnss_prealloc: Use proper printk format specifier" 2021-10-06 15:52:13 -07:00
qctecmdr
d2b0ab4358 Merge "Merge keystone/android12-5.10-keystone-qcom-release.43+ (fe20a64) into msm-5.10" 2021-10-06 13:25:16 -07:00
Anil Veshala
965c161f6d spi: spi-msm-geni: Avoid potential NULL pointer access
In QUPv3 common driver as part of geni_se_resources_init when bus
bandwidth voting is failed, we are dereferencing ctrl_dev which
can be NULL. Currently in spi-msm-geni driver we are initializing
ctrl_dev after calling geni_se_resource_init.

Fixed this by initializing ctrl_dev before calling geni_se_resource_init.

Change-Id: I68109c914e3f29eaac87f152c8732ea4f018502d
Signed-off-by: Anil Veshala <aveshala@codeaurora.org>
2021-10-06 18:48:16 +05:30
BIVASH KUMAR SINGH
4facf42091 input: touchscreen: nt36xxx: update novatek i2c touch driver
This change adds support to migrate from older fb_notifier
callback to a new notification framework defined by
panel_event_notifier driver and replaces file_operations with
proc_ops.

Change-Id: I71f5f5eccabc373c45aa848f2f2503bbb3e6a38c
Signed-off-by: BIVASH KUMAR SINGH <bkumarsi@codeaurora.org>
2021-10-06 17:12:10 +05:30
Ravikanth Tuniki
61d8b2c86f input: touchscreen: nt36xxx: Add Chip id and firmware
Add novatek chip id and firmware during boot up to
enable touch.

Change-Id: I382ae51c7bb4bf270c2e01b484281fcc24270062
Signed-off-by: Ravikanth Tuniki <rtunik@codeaurora.org>
2021-10-06 04:33:42 -07:00
BIVASH KUMAR SINGH
58c47c4973 input: touchscreen: nt36xxx: Fix Propagation
This change propagates the missing fixes in novatek tcm touch
driver from msm-4.19 to msm-5.10.

Change-Id: Ie404c8412f7efa847b8e14965bcaf45568225502
Signed-off-by: Ravikanth Tuniki <rtunik@codeaurora.org>
Signed-off-by: BIVASH KUMAR SINGH <bkumarsi@codeaurora.org>
2021-10-06 04:33:18 -07:00
Auditya Bhattaram
97f4fb3efe soc: qcom: socinfo: Add cape & cape-v2 soc-id in socinfo list
Add CAPE & CAPE-V2 msm-id's to the list of soc-ids supported.

Change-Id: I740ad5a2504b2d2afcb16a59005b2af406d2c038
Signed-off-by: Auditya Bhattaram <audityab@codeaurora.org>
2021-10-06 03:32:48 -07:00
Anvesh Salveru
d4752f0b0f serial: msm-geni-serial: avoid potential NULL pointer access
In QUPv3 common driver as part of geni_se_resources_init when bus
bandwidth voting is failed, we are dereferencing ctrl_dev which
can be NULL. Currently in msm_geni_serial driver we are initializing
ctrl_dev after calling geni_se_resource_init.

Fixed this by initializing ctrl_dev before calling geni_se_resource_init.

Change-Id: I744446d60e5b757e81c93cc1492d0ebc6cb507e2
Signed-off-by: Anvesh Salveru <asalveru@codeaurora.org>
2021-10-06 07:37:59 +05:30
Amir Vajid
f1852bb25a drivers: dcvs: pmu_lib: fix return value in setup_events
When set_event() returns an error in setup_events(), the
error should only be returned for the case of -EPROBE_DEFER.
Set ret to 0 for all other errors to ensure a stale error
value isn't returned from setup_events().

Change-Id: I7a6a8e160e50f98c2a415341d39e8e9e71e61342
Signed-off-by: Amir Vajid <avajid@codeaurora.org>
2021-10-05 14:39:41 -07:00
Vivek Pernamitta
27aeea8b3a msm: pci: print RPMSG return type on failure
Adding debug logs to print return type on RPMSG failure.

Change-Id: Id7d4b7ac5dc84646e074acb7d3b313347dc01d7a
Signed-off-by: Vivek Pernamitta <vpernami@codeaurora.org>
2021-10-06 01:31:03 +05:30
qctecmdr
1ffab74be9 Merge "msm: kgsl: Verify secure access before importing buffers" 2021-10-05 13:00:48 -07:00
qctecmdr
f31524dcb3 Merge "msm: kgsl: Fix HWSCHED_MAX_DISPATCH_NUMIBS" 2021-10-05 13:00:48 -07:00
qctecmdr
97039f0add Merge "pinctrl: qcom: Add tlmm support for neo platform" 2021-10-05 10:54:06 -07:00
qctecmdr
87b18909da Merge "msm: kgsl: Allow concurrent requests for oob_perfcntr" 2021-10-05 08:51:33 -07:00
Sivasri Kumar, Vanka
c4f12f5e3f Merge keystone/android12-5.10-keystone-qcom-release.43+ (fe20a64) into msm-5.10
* refs/heads/tmp-fe20a64:
  FROMGIT: scs: Release kasan vmalloc poison in scs_free process
  UPSTREAM: arm64: Kconfig: select KASAN_VMALLOC if KANSAN_GENERIC is enabled
  UPSTREAM: arm64: kaslr: support randomized module area with KASAN_VMALLOC
  UPSTREAM: arm64: Kconfig: support CONFIG_KASAN_VMALLOC
  UPSTREAM: arm64: kasan: abstract _text and _end to KERNEL_START/END
  UPSTREAM: arm64: kasan: don't populate vmalloc area for CONFIG_KASAN_VMALLOC
  ANDROID: GKI: rockchip: Enable symbols for rk808-regulator
  ANDROID: GKI: rockchip: Enable symbols for hid
  FROMGIT: arm64: kasan: mte: move GCR_EL1 switch to task switch when KASAN disabled
  UPSTREAM: arm64: add MTE supported check to thread switching and syscall entry/exit
  UPSTREAM: arm64: kasan: mte: use a constant kernel GCR_EL1 value
  ANDROID: GKI: fix mode of android/abi_gki_aarch64.xml file
  ANDROID: ABI: update allowed list for galaxy

Change-Id: Ia4a6d500e36d7ab9835aa8e3197efb1436487cff
Signed-off-by: Sivasri Kumar, Vanka <svanka@codeaurora.org>
2021-10-05 16:31:23 +05:30
Amrit Anand
eb462a554d defconfig: neo: enable pinctrl Neo
Enable Neo pinctrl driver for the functioning of
Top Level Mode Multiplexer block (TLMM) on Neo platform.

Change-Id: I29fb4b519aa7ee14e0044ae9bb72725a240644e2
Signed-off-by: Amrit Anand <amrianan@codeaurora.org>
2021-10-04 21:30:12 -07:00
Mayank Grover
9a6368e8a3 pinctrl: qcom: Add tlmm support for neo platform
Add support for pin configuration for neo platform.

Change-Id: Ieed31bc4e7681310de08968fc6231054b2024c9b
Signed-off-by: Mayank Grover <groverm@codeaurora.org>
Signed-off-by: Amrit Anand <amrianan@codeaurora.org>
2021-10-04 21:29:56 -07:00
Yue Ma
cc3bc4b888 cnss2: Fix a few switch statement fallthrough issues
Make sure all switch statements can break to avoid fallthrough bugs.

Change-Id: I1a4bc821ea2fe77bf84377d1fae172343ef63742
Signed-off-by: Yue Ma <yuem@codeaurora.org>
2021-10-04 18:36:15 -07:00
Android Build Coastguard Worker
fe20a6440b Snap for 7792048 from 2ffef25a67 to android12-5.10-keystone-qcom-release
Change-Id: Ic4f4a7cb49f7e40a09706c1383ae680b33a5c09d
2021-10-05 00:00:28 +00:00
qctecmdr
2e20886dde Merge "msm: ipa3: add v2x ethernet support" 2021-10-04 14:56:26 -07:00
qctecmdr
90257e45ff Merge "build.config : Add build configs for sxr and Neo" 2021-10-04 12:54:06 -07:00
qctecmdr
3c7de42bb6 Merge "serial: msm_geni_serial: fix the bugs introduced while enhancing logs" 2021-10-04 10:37:36 -07:00
Daniel Norman
2ffef25a67 Merge keystone/mirror-android12-5.10 into keystone/android12-5.10-keystone-qcom-dev
* keystone/mirror-android12-5.10:
  ANDROID: GKI: rockchip: Enable symbols for hid
  ANDROID: GKI: rockchip: Enable symbols for rk808-regulator
  UPSTREAM: arm64: kasan: don't populate vmalloc area for CONFIG_KASAN_VMALLOC
  UPSTREAM: arm64: kasan: abstract _text and _end to KERNEL_START/END
  UPSTREAM: arm64: Kconfig: support CONFIG_KASAN_VMALLOC
  UPSTREAM: arm64: kaslr: support randomized module area with KASAN_VMALLOC
  UPSTREAM: arm64: Kconfig: select KASAN_VMALLOC if KANSAN_GENERIC is enabled
  FROMGIT: scs: Release kasan vmalloc poison in scs_free process
Signed-off-by: Daniel Norman <danielnorman@google.com>
Bug: 194515348
Bug: 201711661
Change-Id: I951e438e146a181adcef4a08e70c551a670ec78b
2021-10-04 09:24:48 -07:00
Yee Lee
d788d16fed FROMGIT: scs: Release kasan vmalloc poison in scs_free process
Since scs allocation is moved to vmalloc region, the
shadow stack is protected by kasan_posion_vmalloc.
However, the vfree_atomic operation needs to access
its context for scs_free process and causes kasan error
as the dump info below.

This patch Adds kasan_unpoison_vmalloc() before vfree_atomic,
which aligns to the prior flow as using kmem_cache.
The vmalloc region will go back posioned in the following
vumap() operations.

 ==================================================================
 BUG: KASAN: vmalloc-out-of-bounds in llist_add_batch+0x60/0xd4
 Write of size 8 at addr ffff8000100b9000 by task kthreadd/2

 CPU: 0 PID: 2 Comm: kthreadd Not tainted 5.15.0-rc2-11681-g92477dd1faa6-dirty #1
 Hardware name: linux,dummy-virt (DT)
 Call trace:
  dump_backtrace+0x0/0x43c
  show_stack+0x1c/0x2c
  dump_stack_lvl+0x68/0x84
  print_address_description+0x80/0x394
  kasan_report+0x180/0x1dc
  __asan_report_store8_noabort+0x48/0x58
  llist_add_batch+0x60/0xd4
  vfree_atomic+0x60/0xe0
  scs_free+0x1dc/0x1fc
  scs_release+0xa4/0xd4
  free_task+0x30/0xe4
  __put_task_struct+0x1ec/0x2e0
  delayed_put_task_struct+0x5c/0xa0
  rcu_do_batch+0x62c/0x8a0
  rcu_core+0x60c/0xc14
  rcu_core_si+0x14/0x24
  __do_softirq+0x19c/0x68c
  irq_exit+0x118/0x2dc
  handle_domain_irq+0xcc/0x134
  gic_handle_irq+0x7c/0x1bc
  call_on_irq_stack+0x40/0x70
  do_interrupt_handler+0x78/0x9c
  el1_interrupt+0x34/0x60
  el1h_64_irq_handler+0x1c/0x2c
  el1h_64_irq+0x78/0x7c
  _raw_spin_unlock_irqrestore+0x40/0xcc
  sched_fork+0x4f0/0xb00
  copy_process+0xacc/0x3648
  kernel_clone+0x168/0x534
  kernel_thread+0x13c/0x1b0
  kthreadd+0x2bc/0x400
  ret_from_fork+0x10/0x20

 Memory state around the buggy address:
  ffff8000100b8f00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
  ffff8000100b8f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
 >ffff8000100b9000: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
                    ^
  ffff8000100b9080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
  ffff8000100b9100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
 ==================================================================

Bug: 201711661
(cherry picked from commit 528a4ab45300fa6283556d9b48e26b45a8aa15c4
https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git/ for-next/scs)
Change-Id: I0980e9df3fdff37ebfb9f873174d60f30c00230a
Suggested-by: Kuan-Ying Lee <kuan-ying.lee@mediatek.com>
Acked-by: Will Deacon <will@kernel.org>
Tested-by: Will Deacon <will@kernel.org>
Reviewed-by: Sami Tolvanen <samitolvanen@google.com>
Signed-off-by: Yee Lee <yee.lee@mediatek.com>
Fixes: a2abe7cbd8fe ("scs: switch to vmapped shadow stacks")
Link: https://lore.kernel.org/r/20210930081619.30091-1-yee.lee@mediatek.com
Signed-off-by: Will Deacon <will@kernel.org>
2021-10-04 15:44:53 +00:00
Lecopzer Chen
2659f14d93 UPSTREAM: arm64: Kconfig: select KASAN_VMALLOC if KANSAN_GENERIC is enabled
Before this patch, someone who wants to use VMAP_STACK when
KASAN_GENERIC enabled must explicitly select KASAN_VMALLOC.

>From Will's suggestion [1]:
  > I would _really_ like to move to VMAP stack unconditionally, and
  > that would effectively force KASAN_VMALLOC to be set if KASAN is in use

Because VMAP_STACK now depends on either HW_TAGS or KASAN_VMALLOC if
KASAN enabled, in order to make VMAP_STACK selected unconditionally,
we bind KANSAN_GENERIC and KASAN_VMALLOC together.

Note that SW_TAGS supports neither VMAP_STACK nor KASAN_VMALLOC now,
so this is the first step to make VMAP_STACK selected unconditionally.

Bind KANSAN_GENERIC and KASAN_VMALLOC together is supposed to cost more
memory at runtime, thus the alternative is using SW_TAGS KASAN instead.

[1]: https://lore.kernel.org/lkml/20210204150100.GE20815@willie-the-truck/

Suggested-by: Will Deacon <will@kernel.org>
Signed-off-by: Lecopzer Chen <lecopzer.chen@mediatek.com>
Link: https://lore.kernel.org/r/20210324040522.15548-6-lecopzer.chen@mediatek.com
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>

Bug: 201711661
(cherry picked from commit acc3042d62cb92c3776767f09f665511c903ef2d)
Signed-off-by: Yee Lee <yee.lee@mediatek.com>
Change-Id: Ic7884e3acafa02361c8a250028ceebdb1780a49e
2021-10-04 15:44:41 +00:00
Lecopzer Chen
23232f84c8 UPSTREAM: arm64: kaslr: support randomized module area with KASAN_VMALLOC
After KASAN_VMALLOC works in arm64, we can randomize module region
into vmalloc area now.

Test:
	VMALLOC area ffffffc010000000 fffffffdf0000000

	before the patch:
		module_alloc_base/end ffffffc008b80000 ffffffc010000000
	after the patch:
		module_alloc_base/end ffffffdcf4bed000 ffffffc010000000

	And the function that insmod some modules is fine.

Suggested-by: Ard Biesheuvel <ardb@kernel.org>
Signed-off-by: Lecopzer Chen <lecopzer.chen@mediatek.com>
Link: https://lore.kernel.org/r/20210324040522.15548-5-lecopzer.chen@mediatek.com
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>

Bug: 201711661
(cherry picked from commit 31d02e7ab00873befd2cfb6e44581490d947c38b)
Signed-off-by: Yee Lee <yee.lee@mediatek.com>
Change-Id: I513f205113752b396245e9e8d64b973fcd7ffcb1
2021-10-04 15:44:35 +00:00
Lecopzer Chen
ef61240f62 UPSTREAM: arm64: Kconfig: support CONFIG_KASAN_VMALLOC
We can backed shadow memory in vmalloc area after vmalloc area
isn't populated at kasan_init(), thus make KASAN_VMALLOC selectable.

Signed-off-by: Lecopzer Chen <lecopzer.chen@mediatek.com>
Acked-by: Andrey Konovalov <andreyknvl@gmail.com>
Tested-by: Andrey Konovalov <andreyknvl@gmail.com>
Tested-by: Ard Biesheuvel <ardb@kernel.org>
Link: https://lore.kernel.org/r/20210324040522.15548-4-lecopzer.chen@mediatek.com
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>

Bug: 201711661
(cherry picked from commit 71b613fc0c69080262f4ebe810c3d909d7ff8132)
Signed-off-by: Yee Lee <yee.lee@mediatek.com>
Change-Id: I48d473cadd54ec2c8d3f92fa3d88ff456b70afdc
2021-10-04 15:44:28 +00:00
Lecopzer Chen
d0f4b61ae6 UPSTREAM: arm64: kasan: abstract _text and _end to KERNEL_START/END
Arm64 provides defined macro for KERNEL_START and KERNEL_END,
thus replace them by the abstration instead of using _text and _end.

Signed-off-by: Lecopzer Chen <lecopzer.chen@mediatek.com>
Acked-by: Andrey Konovalov <andreyknvl@gmail.com>
Tested-by: Andrey Konovalov <andreyknvl@gmail.com>
Tested-by: Ard Biesheuvel <ardb@kernel.org>
Link: https://lore.kernel.org/r/20210324040522.15548-3-lecopzer.chen@mediatek.com
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>

Bug: 201711661
(cherry picked from commit 7d7b88ff5f8fd79a72baacc521407a3101f0ffae)
Signed-off-by: Yee Lee <yee.lee@mediatek.com>
Change-Id: I806cb3d57e2064c272f3c87f0eb212ceea80c424
2021-10-04 15:44:20 +00:00
Lecopzer Chen
4d91b1f6ee UPSTREAM: arm64: kasan: don't populate vmalloc area for CONFIG_KASAN_VMALLOC
Linux support KAsan for VMALLOC since commit 3c5c3cfb9e
("kasan: support backing vmalloc space with real shadow memory")

Like how the MODULES_VADDR does now, just not to early populate
the VMALLOC_START between VMALLOC_END.

Before:

MODULE_VADDR: no mapping, no zero shadow at init
VMALLOC_VADDR: backed with zero shadow at init

After:

MODULE_VADDR: no mapping, no zero shadow at init
VMALLOC_VADDR: no mapping, no zero shadow at init

Thus the mapping will get allocated on demand by the core function
of KASAN_VMALLOC.

  -----------  vmalloc_shadow_start
 |           |
 |           |
 |           | <= non-mapping
 |           |
 |           |
 |-----------|
 |///////////|<- kimage shadow with page table mapping.
 |-----------|
 |           |
 |           | <= non-mapping
 |           |
 ------------- vmalloc_shadow_end
 |00000000000|
 |00000000000| <= Zero shadow
 |00000000000|
 ------------- KASAN_SHADOW_END

Signed-off-by: Lecopzer Chen <lecopzer.chen@mediatek.com>
Acked-by: Andrey Konovalov <andreyknvl@gmail.com>
Tested-by: Andrey Konovalov <andreyknvl@gmail.com>
Tested-by: Ard Biesheuvel <ardb@kernel.org>
Link: https://lore.kernel.org/r/20210324040522.15548-2-lecopzer.chen@mediatek.com
[catalin.marinas@arm.com: add a build check on VMALLOC_START != MODULES_END]
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>

Bug: 201711661
(cherry picked from commit 9a0732efa77418fc85b1bdc5ddee619e62f59545)
Signed-off-by: Yee Lee <yee.lee@mediatek.com>
Change-Id: I82c4b624685cc9e083d720904787df2326cb9cc0
2021-10-04 15:44:10 +00:00
Sivasri Kumar, Vanka
5c2a5aca02 Merge keystone/android12-5.10-keystone-qcom-release.43+ (030acd3) into msm-5.10
* refs/heads/tmp-030acd3:
  ANDROID: GKI: rockchip: Convert symbol to order by module
  ANDROID: GKI: Add a symbol to symbol list
  FROMLIST: arm64: mm: update max_pfn after memory hotplug
  ANDROID: GKI: Update symbols to symbol list
  UPSTREAM: erofs: fix 1 lcluster-sized pcluster for big pcluster
  UPSTREAM: erofs: enable big pcluster feature
  UPSTREAM: erofs: support decompress big pcluster for lz4 backend
  UPSTREAM: erofs: support parsing big pcluster compact indexes
  UPSTREAM: erofs: support parsing big pcluster compress indexes
  UPSTREAM: erofs: adjust per-CPU buffers according to max_pclusterblks
  UPSTREAM: erofs: add big physical cluster definition
  UPSTREAM: erofs: fix up inplace I/O pointer for big pcluster
  UPSTREAM: erofs: introduce physical cluster slab pools
  UPSTREAM: erofs: introduce multipage per-CPU buffers
  UPSTREAM: erofs: remove a void EROFS_VERSION macro set in Makefile
  UPSTREAM: erofs: reserve physical_clusterbits[]
  UPSTREAM: erofs: Clean up spelling mistakes found in fs/erofs
  UPSTREAM: erofs: add on-disk compression configurations
  UPSTREAM: erofs: introduce on-disk lz4 fs configurations
  UPSTREAM: erofs: introduce erofs_sb_has_xxx() helpers
  UPSTREAM: erofs: don't use erofs_map_blocks() any more
  UPSTREAM: erofs: complete a missing case for inplace I/O
  BACKPORT: UPSTREAM: mm: fs: invalidate bh_lrus for only cold path
  FROMLIST: dma-buf: support users to change dma_buf.name
  ANDROID: GKI: Update symbol list for vivo
  BACKPORT: ASoC: soc-pcm: Get all BEs along DAPM path

Change-Id: I69fd05e026b660b07d9c68b0b2a526fe6aa5e57f
Signed-off-by: Sivasri Kumar, Vanka <svanka@codeaurora.org>
2021-10-04 19:36:42 +05:30
Kever Yang
935b5c3bdd ANDROID: GKI: rockchip: Enable symbols for rk808-regulator
Functions changes summary: 0 Removed, 0 Changed (1546 filtered out), 2 Added functions
Variables changes summary: 0 Removed, 0 Changed (11 filtered out), 0 Added variables

2 Added functions:

  [A] 'function gpio_desc* devm_gpiod_get_index_optional(device*, const char*, unsigned int, gpiod_flags)'
  [A] 'function int gpiod_is_active_low(const gpio_desc*)'

Bug: 194515348
Signed-off-by: Kever Yang <kever.yang@rock-chips.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@google.com>
Change-Id: Ie06fa99d6616cb389bccc1d9167f084c7cafbe89
2021-10-04 15:48:04 +02:00
Kever Yang
9a8a15b8bd ANDROID: GKI: rockchip: Enable symbols for hid
Functions changes summary: 0 Removed, 0 Changed (1546 filtered out), 1 Added functions
Variables changes summary: 0 Removed, 0 Changed (11 filtered out), 0 Added variables

1 Added function:

  [A] 'function hid_report* hid_validate_values(hid_device*, unsigned int, unsigned int, unsigned int, unsigned int)'

Leaf changes summary: 11 artifacts changed
Changed leaf types summary: 0 leaf type changed

Bug: 194515348
Signed-off-by: Kever Yang <kever.yang@rock-chips.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@google.com>
Change-Id: I941c191d5c0fb5a01a6b9269f0afa7ea77db327a
2021-10-04 13:38:23 +02:00
Anvesh Salveru
010da590ad serial: msm_geni_serial: fix the bugs introduced while enhancing logs
As part of log enhancements there were some unnecessary code changes
made and few parts of the code is deleted.

Adding back the deleted code and fixed few logical errors.

Change-Id: Ie4af0211347c110ffeaa6547b1304ae802b8bb0a
Signed-off-by: Anvesh Salveru <asalveru@codeaurora.org>
2021-10-04 16:03:01 +05:30
qctecmdr
f6d6de490d Merge "soc: qcom: rpmh: Correct rpm_msg pointer offset and add list_del" 2021-10-04 02:32:17 -07:00
qctecmdr
66cd189331 Merge "soc: qcom: sys_pm_vx: Modify drv names settings on Waipio" 2021-10-04 02:32:16 -07:00
Wesley Cheng
2cae38934b coresight-tmc-usb: Reduce USB buffer size to 64kB
As a temporary workaround, reduce the USB buffer size to 64kB, which
translates to one TRB per request versus two TRBs if 128kB is used.
There is a chance that during high bandwidth use cases over QDSS, there
is a possible situation where a premature completion interrupt is
received when using chained transfers.  This results to an SMMU fault,
as the USB controller is still accessing the TRB although we have
received the completion.

This should not affect overall QDSS bandwidth as the same number of
TRBs are allowed to be queued.  The only difference is that it will
result in an interrupt for every transfer complete versus every other.

Change-Id: If45ba566768fdab6125adefba90ee883456b993a
Signed-off-by: Wesley Cheng <wcheng@codeaurora.org>
2021-10-04 01:15:13 -07:00
Maulik Shah
51337f4058 soc: qcom: rpmh: Correct rpm_msg pointer offset and add list_del
rpm_msgs address is calculated from memory allocated during write_batch.
Correct the offset from where rpm_msgs actually starts and assign req
pointer to point to correct address.

Also add list_del before freeing memory in rpmh_invalidate.

Change-Id: Id3ea4cb50f6def9556fc92cecaf0165af552c6f8
Signed-off-by: Maulik Shah <mkshah@codeaurora.org>
2021-10-04 12:04:56 +05:30