Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp5449798imm; Tue, 16 Oct 2018 10:23:34 -0700 (PDT) X-Google-Smtp-Source: ACcGV63FJlc/tyPQxWTDTQWKadooH++dUc1HKzcmLl2E/KQzmltNJ5SczMk+Pmx9UbL8+2QvAc62 X-Received: by 2002:a17:902:50e3:: with SMTP id c32-v6mr9605038plj.215.1539710614090; Tue, 16 Oct 2018 10:23:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539710614; cv=none; d=google.com; s=arc-20160816; b=McW0BqSoWq/QXj9qkp/JQBtKOyE+eXvM4sD+NkFoMx7rPoN0mxgqWL5PaZWY0himfY +dZ2xiGWD30Js7z+mW0LQeQKdP6SPPs9WaHC6oAGcCfI56Zcmi5DeY/IIvSPbEnKIm6H xik/5kHKhkhsYo+RswQ2xchsaJrS1wcuHgtYSvfQmFjflDyIbYnJpCCqJuZLY1KT2hYS xn3shWmKsh3+fXCMl0Pi8iGHti+uHIrzbn95Xi7CSBhDBg8lsr/Yt/gEnYXpAppMOL24 H4UXmCLUPx8DR3E7hlrrbgybKjkjVWRcdTEK5qm0nEom9ZHBU+MUbzNfT9qGuffFejTg XwaA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=yNnSmsv6JJUouft26PF5AVfuBI/bdt4dnWfEb72UdHs=; b=dZaxDrNRUHN2Dn7DXDgFmyRk6EhmIZ3T2505d4e649zzGja5dC/GBd5E0ydVtt/Nkc ltQRtwCo7GsYbi5kCXMOVryE1HzeNtnl+ZEurHhwhaXg/BNUaCZbXhOhLrgZDmpuQUTf Y9USHkPUyC8n8AaMrHhW4gcbEPw2pruop9Wvq0IiMTy/b9PyqTHtpudHHqWJqCYjS39l uWDs8bYLay5kBEjixBUWfQC6rt5hqoYr1C1qKRO4NdfSA2aNP8S+z7BXAY05h7AjoBAb t7V0LQ6k9hw0xVV03DiP8HddPClt/2j7eS5ECIpz3e8Z207Vz6CEJCFhndp5tEKw8SF0 86Bg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=GgMdLXBR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 33-v6si11176018plu.316.2018.10.16.10.23.18; Tue, 16 Oct 2018 10:23:34 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=GgMdLXBR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731187AbeJQBOI (ORCPT + 99 others); Tue, 16 Oct 2018 21:14:08 -0400 Received: from mail.kernel.org ([198.145.29.99]:60548 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729116AbeJQBOH (ORCPT ); Tue, 16 Oct 2018 21:14:07 -0400 Received: from localhost (ip-213-127-77-176.ip.prioritytelecom.net [213.127.77.176]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 20E4020658; Tue, 16 Oct 2018 17:22:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1539710562; bh=Bh+pLY+LrvEXlMWsbOutM/GdhjDwNAJgdfVCwZMzb+Q=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=GgMdLXBRrEuf3ajXTuDoMpTkWIwFS8YjfDXREw4vKoqY4MjjJuh/JtLY64FzVNuzO XYrnRjstYmhvQ0oATItCVrcowmzbNY+VB5Ha165M8BCdaSrTaGFr8kWXWSl+JP1Vx/ 8IdR1afOm+uyNGsGVhMtuQiskAYcHzislFK/KGwY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Danny Smith , Lars-Peter Clausen , Mark Brown , Sasha Levin Subject: [PATCH 4.9 02/71] ASoC: sigmadsp: safeload should not have lower byte limit Date: Tue, 16 Oct 2018 19:08:59 +0200 Message-Id: <20181016170539.445051323@linuxfoundation.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181016170539.315587743@linuxfoundation.org> References: <20181016170539.315587743@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Danny Smith [ Upstream commit 5ea752c6efdf5aa8a57aed816d453a8f479f1b0a ] Fixed range in safeload conditional to allow safeload to up to 20 bytes, without a lower limit. Signed-off-by: Danny Smith Acked-by: Lars-Peter Clausen Signed-off-by: Mark Brown Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- sound/soc/codecs/sigmadsp.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) --- a/sound/soc/codecs/sigmadsp.c +++ b/sound/soc/codecs/sigmadsp.c @@ -117,8 +117,7 @@ static int sigmadsp_ctrl_write(struct si struct sigmadsp_control *ctrl, void *data) { /* safeload loads up to 20 bytes in a atomic operation */ - if (ctrl->num_bytes > 4 && ctrl->num_bytes <= 20 && sigmadsp->ops && - sigmadsp->ops->safeload) + if (ctrl->num_bytes <= 20 && sigmadsp->ops && sigmadsp->ops->safeload) return sigmadsp->ops->safeload(sigmadsp, ctrl->addr, data, ctrl->num_bytes); else