Received: by 2002:ac0:950c:0:0:0:0:0 with SMTP id f12csp2288468imc; Tue, 12 Mar 2019 10:39:02 -0700 (PDT) X-Google-Smtp-Source: APXvYqyPMEm8KkdFIEnzbyFnqzOpJp5qAfUT5gNOr5yIVzsKDgiyAvnkY93Pi/ks1y5sqUlPII/Y X-Received: by 2002:a63:4563:: with SMTP id u35mr11668015pgk.417.1552412342754; Tue, 12 Mar 2019 10:39:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552412342; cv=none; d=google.com; s=arc-20160816; b=VCd/JkGUoRLG7M3qo2KQzXFs/5c5aMnY20Tqw5p2GsTHJNGG7yIEJv5cg5bipv1IXS EqE0ye9Lh9P+R5Rb0wm6kdOfplWI5KMRvTVL//lcTEUoi/U4GMLvFDMz1nfzD7CKknLv RFXne8Ds6bSJHRSLGc5czpAGljZp5OUO7Pgu0YNYkCqPBPi+9TJ38cv0jwy2BM23fGj3 DrJCgyoGcZPPkyCLGEm4HJx4CrsPElcX3PyRDLGot2e9KxiYMMGmtqvblfoE4fBWL3+6 dWVnT4hhyppDABoSv5S/zr1T6LWODgC3nzYTPKvklZpVDc3xbbwOouQQ+uBZaVKLwyu8 MVPA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=pFWbA20o0I3/KXVMVo7VY5BIlugnvq+9QTYg9skPdzo=; b=sO7GQ7hUqDdNLJpoxQyGZuForoic79x2aNbx3O7bj9DtVYKAMaZkiMCPNoKh2VMjDB 5onScBahQelbTrCTzs45CjUflEtHxBlW7gGUSF3PAWlFSkuEZ/1u3FQMQ5zltV9SHU9t G3zZNp+S8OOvUaJgJ7nAwxPykDorPaZHfTh8mCsdonW/hfwVjYLuXdwjwW/7k3BpH9XM k0jnRsRQqcvClH2Vi4goAapr7MMAUpWuHda4I5+D5+xidAw0UliAHwzZIf9/451/SB39 XFr8xMySosy03Gm8N9RTaNd79OQpv9yP7CEdK9xy/Wavh+9/seBNu6g7icFNn++2156p 08Rg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=BSeC02bv; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 23si7783609pgc.220.2019.03.12.10.38.47; Tue, 12 Mar 2019 10:39:02 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=BSeC02bv; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729891AbfCLRhz (ORCPT + 99 others); Tue, 12 Mar 2019 13:37:55 -0400 Received: from mail.kernel.org ([198.145.29.99]:59504 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729314AbfCLRQt (ORCPT ); Tue, 12 Mar 2019 13:16:49 -0400 Received: from localhost (unknown [104.133.8.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 538FD217F5; Tue, 12 Mar 2019 17:16:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1552411008; bh=rvZ8NTnBxGfBOTP+Ip69K2CoE7dvBrworfVkCUFboaE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=BSeC02bvmGj+ttdxZD2j1h9PSj3MkdgrOqFMaLEjcn2L8j/ZfKrkMN8WmQKtsGBFY nS+FMvfCchNkc0ql/rVlufkyLaVrZ8PubFmhnE2z5oe8jC1lPmBkcz5xoAm7wrrlkl gE0kkzK2J10LyjS8LIONC0/SAzoq4DgZyOFq8auI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Lubomir Rintel , Pavel Machek , Marc Zyngier , Sasha Levin Subject: [PATCH 4.14 095/135] irqchip/mmp: Only touch the PJ4 IRQ & FIQ bits on enable/disable Date: Tue, 12 Mar 2019 10:09:02 -0700 Message-Id: <20190312170349.943218505@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190312170341.127810985@linuxfoundation.org> References: <20190312170341.127810985@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 2380a22b60ce6f995eac806e69c66e397b59d045 ] Resetting bit 4 disables the interrupt delivery to the "secure processor" core. This breaks the keyboard on a OLPC XO 1.75 laptop, where the firmware running on the "secure processor" bit-bangs the PS/2 protocol over the GPIO lines. It is not clear what the rest of the bits are and Marvell was unhelpful when asked for documentation. Aside from the SP bit, there are probably priority bits. Leaving the unknown bits as the firmware set them up seems to be a wiser course of action compared to just turning them off. Signed-off-by: Lubomir Rintel Acked-by: Pavel Machek [maz: fixed-up subject and commit message] Signed-off-by: Marc Zyngier Signed-off-by: Sasha Levin --- drivers/irqchip/irq-mmp.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/drivers/irqchip/irq-mmp.c b/drivers/irqchip/irq-mmp.c index 25f32e1d7764..3496b61a312a 100644 --- a/drivers/irqchip/irq-mmp.c +++ b/drivers/irqchip/irq-mmp.c @@ -34,6 +34,9 @@ #define SEL_INT_PENDING (1 << 6) #define SEL_INT_NUM_MASK 0x3f +#define MMP2_ICU_INT_ROUTE_PJ4_IRQ (1 << 5) +#define MMP2_ICU_INT_ROUTE_PJ4_FIQ (1 << 6) + struct icu_chip_data { int nr_irqs; unsigned int virq_base; @@ -190,7 +193,8 @@ static const struct mmp_intc_conf mmp_conf = { static const struct mmp_intc_conf mmp2_conf = { .conf_enable = 0x20, .conf_disable = 0x0, - .conf_mask = 0x7f, + .conf_mask = MMP2_ICU_INT_ROUTE_PJ4_IRQ | + MMP2_ICU_INT_ROUTE_PJ4_FIQ, }; static void __exception_irq_entry mmp_handle_irq(struct pt_regs *regs) -- 2.19.1