This is an automatic generated email to let you know that the following patch were queued:
Subject: media: cec-pin: fix broken tx_ignore_nack_until_eom error injection
Author: Hans Verkuil <hverkuil(a)xs4all.nl>
Date: Wed Nov 14 03:37:53 2018 -0500
If the tx_ignore_nack_until_eom error injection was activated,
then tx_nacked was never set instead of setting it when the last
byte of the message was transmitted.
As a result the transmit was marked as OK, when it should have
been NACKed.
Modify the condition so that it always sets tx_nacked when the
last byte of the message was transmitted.
Signed-off-by: Hans Verkuil <hans.verkuil(a)cisco.com>
Cc: <stable(a)vger.kernel.org> # for v4.17 and up
Signed-off-by: Hans Verkuil <hansverk(a)cisco.com>
Signed-off-by: Mauro Carvalho Chehab <mchehab+samsung(a)kernel.org>
drivers/media/cec/cec-pin.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
---
diff --git a/drivers/media/cec/cec-pin.c b/drivers/media/cec/cec-pin.c
index 635db8e70ead..8f987bc0dd88 100644
--- a/drivers/media/cec/cec-pin.c
+++ b/drivers/media/cec/cec-pin.c
@@ -601,8 +601,9 @@ static void cec_pin_tx_states(struct cec_pin *pin, ktime_t ts)
break;
/* Was the message ACKed? */
ack = cec_msg_is_broadcast(&pin->tx_msg) ? v : !v;
- if (!ack && !pin->tx_ignore_nack_until_eom &&
- pin->tx_bit / 10 < pin->tx_msg.len && !pin->tx_post_eom) {
+ if (!ack && (!pin->tx_ignore_nack_until_eom ||
+ pin->tx_bit / 10 == pin->tx_msg.len - 1) &&
+ !pin->tx_post_eom) {
/*
* Note: the CEC spec is ambiguous regarding
* what action to take when a NACK appears
tl;dr automatic bisection reports are enabled for mainline and stable
In case you're not already familiar with it, the kernelci.org project
is a community effort to build and test upstream kernel trees on a
variety of hardware platforms. Reports are mostly sent to the
kernel-build-reports mailing list[1] and all the results can be seen
on https://kernelci.org.
When a boot test regression is detected on mainline or stable
branches, a bisection is automatically run. Starting from today, an
email report will be automatically sent to a list of recipients based
on the commit the bisection has found (author, trailers, maintainers
and lists associated with the code changed by the commit). Until
now, the results were manually curated and only reported more widely
when they seemed valid. Some automated checks are now used, they
have been showing good results for a while with no false positives.
There shouldn't be many bisection reports yet, typically one or two
every month. As we'll start bisecting other trees such as linux-next
and other test results than just plain boots, the volume may start
increasing gradually over the coming months.
Please let us know if you would like the report format to be changed
when you get one, or if you have any suggestions at all.
Hope this helps!
Guillaume
[1] https://lists.linaro.org/mailman/listinfo/kernel-build-reports
This is the start of the stable review cycle for the 4.14.83 release.
There are 21 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Fri Nov 23 18:34:13 UTC 2018.
Anything received after that time might be too late.
The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.14.83-rc…
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.14.y
and the diffstat can be found below.
thanks,
greg k-h
-------------
Pseudo-Shortlog of commits:
Greg Kroah-Hartman <gregkh(a)linuxfoundation.org>
Linux 4.14.83-rc1
Chris Paterson <chris.paterson2(a)renesas.com>
ARM: dts: r8a7793: Correct critical CPU temperature
Chris Paterson <chris.paterson2(a)renesas.com>
ARM: dts: r8a7791: Correct critical CPU temperature
Greg Kroah-Hartman <gregkh(a)linuxfoundation.org>
Revert "x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation"
Eric Dumazet <edumazet(a)google.com>
inet: frags: better deal with smp races
Frieder Schrempf <frieder.schrempf(a)kontron.de>
usbnet: smsc95xx: disable carrier check while suspending
Stefan Wahren <stefan.wahren(a)i2se.com>
net: smsc95xx: Fix MTU range
Shalom Toledo <shalomt(a)mellanox.com>
mlxsw: spectrum: Fix IP2ME CPU policer configuration
Xin Long <lucien.xin(a)gmail.com>
sctp: not increase stream's incnt before sending addstrm_in request
Martin Schiller <ms(a)dev.tdt.de>
net: phy: mdio-gpio: Fix working over slow can_sleep GPIOs
Xin Long <lucien.xin(a)gmail.com>
sctp: fix strchange_flags name for Stream Change Event
Tristram Ha <Tristram.Ha(a)microchip.com>
net: dsa: microchip: initialize mutex before use
Subash Abhinov Kasiviswanathan <subashab(a)codeaurora.org>
net: qualcomm: rmnet: Fix incorrect assignment of real_dev
Florian Fainelli <f.fainelli(a)gmail.com>
net: systemport: Protect stop from timeout
Matthew Cover <werekraken(a)gmail.com>
tuntap: fix multiqueue rx
Siva Reddy Kallam <siva.kallam(a)broadcom.com>
tg3: Add PHY reset for 5717/5719/5720 in change ring and flow control paths
Xin Long <lucien.xin(a)gmail.com>
sctp: not allow to set asoc prsctp_enable by sockopt
Eric Dumazet <edumazet(a)google.com>
net-gro: reset skb->pkt_type in napi_reuse_skb()
David Ahern <dsahern(a)gmail.com>
ipv6: Fix PMTU updates for UDP/raw sockets in presence of VRF
Sabrina Dubroca <sd(a)queasysnail.net>
ip_tunnel: don't force DF when MTU is locked
Michał Mirosław <mirq-linux(a)rere.qmqm.pl>
ibmvnic: fix accelerated VLAN handling
배석진 <soukjin.bae(a)samsung.com>
flow_dissector: do not dissect l4 ports for fragments
-------------
Diffstat:
Makefile | 4 +-
arch/arm/boot/dts/r8a7791.dtsi | 2 +-
arch/arm/boot/dts/r8a7793.dtsi | 2 +-
arch/x86/kernel/cpu/bugs.c | 57 +++----------------------
drivers/net/dsa/microchip/ksz_common.c | 10 ++---
drivers/net/ethernet/broadcom/bcmsysport.c | 15 +++----
drivers/net/ethernet/broadcom/tg3.c | 18 +++++++-
drivers/net/ethernet/ibm/ibmvnic.c | 2 +-
drivers/net/ethernet/mellanox/mlxsw/spectrum.c | 1 -
drivers/net/ethernet/qualcomm/rmnet/rmnet_vnd.c | 6 +--
drivers/net/phy/mdio-gpio.c | 10 ++---
drivers/net/tun.c | 6 ++-
drivers/net/usb/smsc95xx.c | 9 ++++
include/uapi/linux/sctp.h | 2 +
kernel/cpu.c | 11 +----
net/core/dev.c | 4 ++
net/core/flow_dissector.c | 4 +-
net/ipv4/inet_fragment.c | 28 ++++++------
net/ipv4/ip_tunnel_core.c | 2 +-
net/ipv6/route.c | 7 ++-
net/sctp/socket.c | 26 +++--------
net/sctp/stream.c | 1 -
22 files changed, 96 insertions(+), 131 deletions(-)
This is the start of the stable review cycle for the 4.9.139 release.
There are 59 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.
Responses should be made by Fri Nov 23 18:34:55 UTC 2018.
Anything received after that time might be too late.
The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.139-rc…
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-4.9.y
and the diffstat can be found below.
thanks,
greg k-h
-------------
Pseudo-Shortlog of commits:
Greg Kroah-Hartman <gregkh(a)linuxfoundation.org>
Linux 4.9.139-rc1
Russell King <rmk+kernel(a)armlinux.org.uk>
ARM: spectre-v1: mitigate user accesses
Russell King <rmk+kernel(a)armlinux.org.uk>
ARM: spectre-v1: use get_user() for __get_user()
Russell King <rmk+kernel(a)armlinux.org.uk>
ARM: use __inttype() in get_user()
Russell King <rmk+kernel(a)armlinux.org.uk>
ARM: oabi-compat: copy semops using __copy_from_user()
Russell King <rmk+kernel(a)armlinux.org.uk>
ARM: vfp: use __copy_from_user() when restoring VFP state
Russell King <rmk+kernel(a)armlinux.org.uk>
ARM: signal: copy registers using __copy_from_user()
Russell King <rmk+kernel(a)armlinux.org.uk>
ARM: spectre-v1: fix syscall entry
Russell King <rmk+kernel(a)armlinux.org.uk>
ARM: spectre-v1: add array_index_mask_nospec() implementation
Russell King <rmk+kernel(a)armlinux.org.uk>
ARM: spectre-v1: add speculation barrier (csdb) macros
Russell King <rmk+kernel(a)armlinux.org.uk>
ARM: KVM: report support for SMCCC_ARCH_WORKAROUND_1
Russell King <rmk+kernel(a)armlinux.org.uk>
ARM: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling
Russell King <rmk+kernel(a)armlinux.org.uk>
ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15
Marc Zyngier <marc.zyngier(a)arm.com>
ARM: KVM: invalidate icache on guest exit for Cortex-A15
Marc Zyngier <marc.zyngier(a)arm.com>
ARM: KVM: invalidate BTB on guest exit for Cortex-A12/A17
Russell King <rmk+kernel(a)armlinux.org.uk>
ARM: spectre-v2: warn about incorrect context switching functions
Russell King <rmk+kernel(a)armlinux.org.uk>
ARM: spectre-v2: add firmware based hardening
Russell King <rmk+kernel(a)armlinux.org.uk>
ARM: spectre-v2: harden user aborts in kernel space
Russell King <rmk+kernel(a)armlinux.org.uk>
ARM: spectre-v2: add Cortex A8 and A15 validation of the IBE bit
Russell King <rmk+kernel(a)armlinux.org.uk>
ARM: spectre-v2: harden branch predictor on context switches
Russell King <rmk+kernel(a)armlinux.org.uk>
ARM: spectre: add Kconfig symbol for CPUs vulnerable to Spectre
Russell King <rmk+kernel(a)armlinux.org.uk>
ARM: bugs: add support for per-processor bug checking
Russell King <rmk+kernel(a)armlinux.org.uk>
ARM: bugs: hook processor bug checking into SMP and suspend paths
Russell King <rmk+kernel(a)armlinux.org.uk>
ARM: bugs: prepare processor bug infrastructure
Russell King <rmk+kernel(a)armlinux.org.uk>
ARM: add more CPU part numbers for Cortex and Brahma B15 CPUs
Mark Rutland <mark.rutland(a)arm.com>
arm64: uaccess: suppress spurious clang warning
Arnd Bergmann <arnd(a)arndb.de>
Kbuild: use -fshort-wchar globally
Matthias Kaehlcke <mka(a)chromium.org>
x86/build: Use cc-option to validate stack alignment parameter
Matthias Kaehlcke <mka(a)chromium.org>
x86/build: Fix stack alignment for CLang
Ard Biesheuvel <ard.biesheuvel(a)linaro.org>
efi/libstub/arm64: Set -fpie when building the EFI stub
Ard Biesheuvel <ard.biesheuvel(a)linaro.org>
efi/libstub: Preserve .debug sections after absolute relocation check
Ard Biesheuvel <ard.biesheuvel(a)linaro.org>
efi/libstub/arm64: Force 'hidden' visibility for section markers
Ard Biesheuvel <ard.biesheuvel(a)linaro.org>
efi/libstub/arm64: Use hidden attribute for struct screen_info reference
Michael Davidson <md(a)google.com>
x86/boot: #undef memcpy() et al in string.c
Ard Biesheuvel <ard.biesheuvel(a)linaro.org>
crypto: arm64/sha - avoid non-standard inline asm tricks
Matthias Kaehlcke <mka(a)chromium.org>
kbuild: clang: Disable 'address-of-packed-member' warning
Matthias Kaehlcke <mka(a)chromium.org>
x86/build: Specify stack alignment for clang
Matthias Kaehlcke <mka(a)chromium.org>
x86/build: Use __cc-option for boot code compiler options
Matthias Kaehlcke <mka(a)chromium.org>
kbuild: Add __cc-option macro
Michael Davidson <md(a)google.com>
crypto, x86: aesni - fix token pasting for clang
Matthias Kaehlcke <mka(a)chromium.org>
x86/kbuild: Use cc-option to enable -falign-{jumps/loops}
Arnd Bergmann <arnd(a)arndb.de>
modules: mark __inittest/__exittest as __maybe_unused
Vinícius Tinti <viniciustinti(a)gmail.com>
kbuild: Add support to generate LLVM assembly files
Behan Webster <behanw(a)converseincode.com>
kbuild: use -Oz instead of -Os when using clang
Mark Charlebois <charlebm(a)gmail.com>
kbuild, LLVMLinux: Add -Werror to cc-option to support clang
Masahiro Yamada <yamada.masahiro(a)socionext.com>
kbuild: drop -Wno-unknown-warning-option from clang options
Jeroen Hofstee <jeroen(a)myspectrum.nl>
kbuild: fix asm-offset generation to work with clang
Masahiro Yamada <yamada.masahiro(a)socionext.com>
kbuild: consolidate redundant sed script ASM offset generation
Matthias Kaehlcke <mka(a)chromium.org>
kbuild: Consolidate header generation from ASM offset information
Michael Davidson <md(a)google.com>
kbuild: clang: add -no-integrated-as to KBUILD_[AC]FLAGS
Behan Webster <behanw(a)converseincode.com>
kbuild: Add better clang cross build support
David Ahern <dsahern(a)gmail.com>
ipv6: Fix PMTU updates for UDP/raw sockets in presence of VRF
Eric Dumazet <edumazet(a)google.com>
inet: frags: better deal with smp races
Frieder Schrempf <frieder.schrempf(a)kontron.de>
usbnet: smsc95xx: disable carrier check while suspending
Siva Reddy Kallam <siva.kallam(a)broadcom.com>
tg3: Add PHY reset for 5717/5719/5720 in change ring and flow control paths
Xin Long <lucien.xin(a)gmail.com>
sctp: not allow to set asoc prsctp_enable by sockopt
Eric Dumazet <edumazet(a)google.com>
net-gro: reset skb->pkt_type in napi_reuse_skb()
Sabrina Dubroca <sd(a)queasysnail.net>
ip_tunnel: don't force DF when MTU is locked
Michał Mirosław <mirq-linux(a)rere.qmqm.pl>
ibmvnic: fix accelerated VLAN handling
배석진 <soukjin.bae(a)samsung.com>
flow_dissector: do not dissect l4 ports for fragments
-------------
Diffstat:
.gitignore | 1 +
Kbuild | 25 -----
Makefile | 29 +++--
arch/arm/include/asm/assembler.h | 12 +++
arch/arm/include/asm/barrier.h | 32 ++++++
arch/arm/include/asm/bugs.h | 6 +-
arch/arm/include/asm/cp15.h | 3 +
arch/arm/include/asm/cputype.h | 8 ++
arch/arm/include/asm/kvm_asm.h | 2 -
arch/arm/include/asm/kvm_host.h | 14 ++-
arch/arm/include/asm/kvm_mmu.h | 23 +++-
arch/arm/include/asm/proc-fns.h | 4 +
arch/arm/include/asm/system_misc.h | 15 +++
arch/arm/include/asm/thread_info.h | 4 +-
arch/arm/include/asm/uaccess.h | 26 +++--
arch/arm/kernel/Makefile | 1 +
arch/arm/kernel/bugs.c | 18 ++++
arch/arm/kernel/entry-common.S | 18 ++--
arch/arm/kernel/entry-header.S | 25 +++++
arch/arm/kernel/signal.c | 55 +++++-----
arch/arm/kernel/smp.c | 4 +
arch/arm/kernel/suspend.c | 2 +
arch/arm/kernel/sys_oabi-compat.c | 8 +-
arch/arm/kvm/hyp/hyp-entry.S | 112 ++++++++++++++++++-
arch/arm/lib/copy_from_user.S | 9 ++
arch/arm/mm/Kconfig | 23 ++++
arch/arm/mm/Makefile | 2 +-
arch/arm/mm/fault.c | 3 +
arch/arm/mm/proc-macros.S | 3 +-
arch/arm/mm/proc-v7-2level.S | 6 --
arch/arm/mm/proc-v7-bugs.c | 174 ++++++++++++++++++++++++++++++
arch/arm/mm/proc-v7.S | 154 ++++++++++++++++++++------
arch/arm/vfp/vfpmodule.c | 17 ++-
arch/arm64/crypto/sha1-ce-core.S | 6 +-
arch/arm64/crypto/sha1-ce-glue.c | 11 +-
arch/arm64/crypto/sha2-ce-core.S | 6 +-
arch/arm64/crypto/sha2-ce-glue.c | 13 +--
arch/arm64/include/asm/efi.h | 3 +
arch/arm64/include/asm/uaccess.h | 4 +-
arch/ia64/kernel/Makefile | 26 +----
arch/x86/Makefile | 39 +++++--
arch/x86/boot/string.c | 9 ++
arch/x86/crypto/aes_ctrby8_avx-x86_64.S | 7 +-
drivers/firmware/efi/libstub/Makefile | 26 +++--
drivers/firmware/efi/libstub/arm64-stub.c | 10 +-
drivers/net/ethernet/broadcom/tg3.c | 18 +++-
drivers/net/ethernet/ibm/ibmvnic.c | 2 +-
drivers/net/usb/smsc95xx.c | 7 ++
drivers/xen/Makefile | 3 -
include/linux/kbuild.h | 6 +-
include/linux/module.h | 4 +-
net/core/dev.c | 4 +
net/core/flow_dissector.c | 4 +-
net/ipv4/inet_fragment.c | 28 ++---
net/ipv4/ip_tunnel_core.c | 2 +-
net/ipv6/route.c | 7 +-
net/sctp/socket.c | 26 +----
scripts/Kbuild.include | 18 +++-
scripts/Makefile.build | 8 ++
scripts/Makefile.extrawarn | 1 -
scripts/Makefile.host | 6 --
scripts/Makefile.lib | 31 ++++++
scripts/mod/Makefile | 28 +----
63 files changed, 903 insertions(+), 298 deletions(-)
I'm announcing the release of the 4.14.83 kernel.
All users of the 4.14 kernel series must upgrade.
The updated 4.14.y git tree can be found at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.14.y
and can be browsed at the normal kernel.org git web browser:
http://git.kernel.org/?p=linux/kernel/git/stable/linux-stable.git;a=summary
thanks,
greg k-h
------------
Makefile | 2
arch/arm/boot/dts/r8a7791.dtsi | 2
arch/arm/boot/dts/r8a7793.dtsi | 2
arch/x86/kernel/cpu/bugs.c | 57 ++----------------------
drivers/net/dsa/microchip/ksz_common.c | 10 ++--
drivers/net/ethernet/broadcom/bcmsysport.c | 15 ++----
drivers/net/ethernet/broadcom/tg3.c | 18 ++++++-
drivers/net/ethernet/ibm/ibmvnic.c | 2
drivers/net/ethernet/mellanox/mlxsw/spectrum.c | 1
drivers/net/ethernet/qualcomm/rmnet/rmnet_vnd.c | 6 +-
drivers/net/phy/mdio-gpio.c | 10 ++--
drivers/net/tun.c | 6 ++
drivers/net/usb/smsc95xx.c | 9 +++
include/uapi/linux/sctp.h | 2
kernel/cpu.c | 11 ----
net/core/dev.c | 4 +
net/core/flow_dissector.c | 4 -
net/ipv4/inet_fragment.c | 28 ++++++-----
net/ipv4/ip_tunnel_core.c | 2
net/ipv6/route.c | 7 ++
net/sctp/socket.c | 26 ++--------
net/sctp/stream.c | 1
22 files changed, 95 insertions(+), 130 deletions(-)
Chris Paterson (2):
ARM: dts: r8a7791: Correct critical CPU temperature
ARM: dts: r8a7793: Correct critical CPU temperature
David Ahern (1):
ipv6: Fix PMTU updates for UDP/raw sockets in presence of VRF
Eric Dumazet (2):
net-gro: reset skb->pkt_type in napi_reuse_skb()
inet: frags: better deal with smp races
Florian Fainelli (1):
net: systemport: Protect stop from timeout
Frieder Schrempf (1):
usbnet: smsc95xx: disable carrier check while suspending
Greg Kroah-Hartman (2):
Revert "x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation"
Linux 4.14.83
Martin Schiller (1):
net: phy: mdio-gpio: Fix working over slow can_sleep GPIOs
Matthew Cover (1):
tuntap: fix multiqueue rx
Michał Mirosław (1):
ibmvnic: fix accelerated VLAN handling
Sabrina Dubroca (1):
ip_tunnel: don't force DF when MTU is locked
Shalom Toledo (1):
mlxsw: spectrum: Fix IP2ME CPU policer configuration
Siva Reddy Kallam (1):
tg3: Add PHY reset for 5717/5719/5720 in change ring and flow control paths
Stefan Wahren (1):
net: smsc95xx: Fix MTU range
Subash Abhinov Kasiviswanathan (1):
net: qualcomm: rmnet: Fix incorrect assignment of real_dev
Tristram Ha (1):
net: dsa: microchip: initialize mutex before use
Xin Long (3):
sctp: not allow to set asoc prsctp_enable by sockopt
sctp: fix strchange_flags name for Stream Change Event
sctp: not increase stream's incnt before sending addstrm_in request
배석진 (1):
flow_dissector: do not dissect l4 ports for fragments
From: Jerome Brunet <jbrunet(a)baylibre.com>
[ Upstream commit e39f9dd8206ad66992ac0e6218ef1ba746f2cce9 ]
If a bias is enabled on a pin of an Amlogic SoC, calling .pin_config_set()
with PIN_CONFIG_BIAS_DISABLE will not disable the bias. Instead it will
force a pull-down bias on the pin.
Instead of the pull type register bank, the driver should access the pull
enable register bank.
Fixes: 6ac730951104 ("pinctrl: add driver for Amlogic Meson SoCs")
Signed-off-by: Jerome Brunet <jbrunet(a)baylibre.com>
Acked-by: Neil Armstrong <narmstrong(a)baylibre.com>
Signed-off-by: Linus Walleij <linus.walleij(a)linaro.org>
Signed-off-by: Sasha Levin <sashal(a)kernel.org>
---
drivers/pinctrl/meson/pinctrl-meson.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/pinctrl/meson/pinctrl-meson.c b/drivers/pinctrl/meson/pinctrl-meson.c
index 9443c9d408c6..df61a71420b1 100644
--- a/drivers/pinctrl/meson/pinctrl-meson.c
+++ b/drivers/pinctrl/meson/pinctrl-meson.c
@@ -275,7 +275,7 @@ static int meson_pinconf_set(struct pinctrl_dev *pcdev, unsigned int pin,
dev_dbg(pc->dev, "pin %u: disable bias\n", pin);
meson_calc_reg_and_bit(bank, pin, REG_PULL, ®, &bit);
- ret = regmap_update_bits(pc->reg_pull, reg,
+ ret = regmap_update_bits(pc->reg_pullen, reg,
BIT(bit), 0);
if (ret)
return ret;
--
2.17.1