Received: by 2002:ac0:950c:0:0:0:0:0 with SMTP id f12csp2275987imc; Tue, 12 Mar 2019 10:23:50 -0700 (PDT) X-Google-Smtp-Source: APXvYqxRqHAvLzfSEIdso96kWg2HXp8odUozzlKopytgMO3kx2jOwnGIu77YBiHP5dVlH8a5yCtZ X-Received: by 2002:a17:902:a981:: with SMTP id bh1mr41494565plb.88.1552411430880; Tue, 12 Mar 2019 10:23:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552411430; cv=none; d=google.com; s=arc-20160816; b=IpzJ+Tw7MdXj0qAxHcYk+9DMoWudRkByhJsY9a3TRJXkeE6eFkOdQW4yGhyD8gXosL pr1b94p8K1+44lOlah0XUuygbwzQ1IZmHVfGgJdgW43XLH1hN8d3FZ/BDcqd7R3dxxww mqcGIie65QwU7CBjdDQSFMg0zRIlVhtW3akBcmzqvBJstKwyPqd+k+daPz7n7vY6ICDG zAP1qW0506etf3RPGzUVz08KtUH3n0N4seIq/qilap6IfjeOCs3t3EvBt/wTdLWgs4kY qmKc383y7Ti6351Lt8OBVaRQ5JSDP+Nqt4wjwCg0zoPWxBwENmHpkK+JQsyqGbWuDhBs QtHA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=cXeV/6k9I7QMvMFkSQ19VmHASEQCpi2oR5UkONPAG10=; b=aNN/i/UtUkIYkFCtAyQJII1UKvYPUPxsfJjDgvktKMn5m79CwLYEqM0oLvq0+IocpP olvrAcubcwkrTVNf1v4XooF5jprXvY4WtW10TefoCNy5Y6L2Tzh2f8zeRKgTm1xK/TZt ALgQ2Ja6Rri7zIcX3xweAJNz4//pTt+I3zTug55r2YwZG8KKPXSavwuqZxvTcDbGyvBZ zkVdyiBCWSAZ/yM5tdBgdG3Vexj98whS4K0b8HLeJQxYHC+m7eejswUCr5ZR0MvgFVR3 ScacHYffbD+KjS1IG+W4HLASQhOjdsjwCZ809cczgMzrHtVG4RhUBYPun0JrZ3u06Mdz ZWdw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=AJfiAioG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b2si8113455pfi.286.2019.03.12.10.23.34; Tue, 12 Mar 2019 10:23:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=AJfiAioG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730001AbfCLRV5 (ORCPT + 99 others); Tue, 12 Mar 2019 13:21:57 -0400 Received: from mail.kernel.org ([198.145.29.99]:35438 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729962AbfCLRSL (ORCPT ); Tue, 12 Mar 2019 13:18:11 -0400 Received: from localhost (unknown [104.133.8.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 25CFC21741; Tue, 12 Mar 2019 17:18:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1552411090; bh=x6xC6Ww0FqmIaAXz+lnJFqxQPiOH/hOzoIyF8Qj9pBc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=AJfiAioGPXTgkc6icZtN6n/va/9b8ffAsmneMVeobpxtHJDM28Bzk2orhAlF7q5UD Sj+AXebVAvANIOXkpDFpi830TzSLOFUd1Ui3nSXLBV0tf6i1YvcflkPAlz9BuOVGts uB+OegkEwPn2iHafPGww8wCN5Kf7aKb1y0R0H6y8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Lubomir Rintel , Pavel Machek , Marc Zyngier , Sasha Levin Subject: [PATCH 4.9 69/96] irqchip/mmp: Only touch the PJ4 IRQ & FIQ bits on enable/disable Date: Tue, 12 Mar 2019 10:10:27 -0700 Message-Id: <20190312171039.812847087@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190312171034.530434962@linuxfoundation.org> References: <20190312171034.530434962@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 2380a22b60ce6f995eac806e69c66e397b59d045 ] Resetting bit 4 disables the interrupt delivery to the "secure processor" core. This breaks the keyboard on a OLPC XO 1.75 laptop, where the firmware running on the "secure processor" bit-bangs the PS/2 protocol over the GPIO lines. It is not clear what the rest of the bits are and Marvell was unhelpful when asked for documentation. Aside from the SP bit, there are probably priority bits. Leaving the unknown bits as the firmware set them up seems to be a wiser course of action compared to just turning them off. Signed-off-by: Lubomir Rintel Acked-by: Pavel Machek [maz: fixed-up subject and commit message] Signed-off-by: Marc Zyngier Signed-off-by: Sasha Levin --- drivers/irqchip/irq-mmp.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/drivers/irqchip/irq-mmp.c b/drivers/irqchip/irq-mmp.c index 013fc9659a84..2fe2bcb63a71 100644 --- a/drivers/irqchip/irq-mmp.c +++ b/drivers/irqchip/irq-mmp.c @@ -34,6 +34,9 @@ #define SEL_INT_PENDING (1 << 6) #define SEL_INT_NUM_MASK 0x3f +#define MMP2_ICU_INT_ROUTE_PJ4_IRQ (1 << 5) +#define MMP2_ICU_INT_ROUTE_PJ4_FIQ (1 << 6) + struct icu_chip_data { int nr_irqs; unsigned int virq_base; @@ -190,7 +193,8 @@ static struct mmp_intc_conf mmp_conf = { static struct mmp_intc_conf mmp2_conf = { .conf_enable = 0x20, .conf_disable = 0x0, - .conf_mask = 0x7f, + .conf_mask = MMP2_ICU_INT_ROUTE_PJ4_IRQ | + MMP2_ICU_INT_ROUTE_PJ4_FIQ, }; static void __exception_irq_entry mmp_handle_irq(struct pt_regs *regs) -- 2.19.1