Received: by 2002:ac0:950c:0:0:0:0:0 with SMTP id f12csp2291515imc; Tue, 12 Mar 2019 10:43:01 -0700 (PDT) X-Google-Smtp-Source: APXvYqzq8bLNSLQ0a6AyTtaTvcUSCrh06T0n70+yBAf2Pi2jAKykUsm1Gs6b9YyMC/mjeFUWgKVx X-Received: by 2002:a63:da58:: with SMTP id l24mr971500pgj.167.1552412581652; Tue, 12 Mar 2019 10:43:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552412581; cv=none; d=google.com; s=arc-20160816; b=er2NGWDIsDQxMR11WZjHKJJsdiuO9zqzRApgA9V+ancayznFJTnAx+Etbj/SJtd9CP 1Ch8nkU2wDhi1JflCPWlOnY7CWGWhtCCzU1GLGYlhq9GBAfUovBn9ud+Iik42C4ultVK aQrhic0FXaWmqT0ulFOMiMysCs8X1iqNMqO0m7RlcKBZV9OuZfS0oQNGqEdtFnSrvIFf 4mjCI+Sqn5AZUN0suuhnUSVLwqVpWcU85z68d7h5Bmmt0QRtboQu835YD94ohqLRwmFW 4IFJbFUAQr9oWcwRv5ydgHcUaCY4bx1SbFYua0yBKq90+VOlEvcT23Nr1OdYIzq/jy5b I0fg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=iben8lpa936TiM3ErecbodEIvGT6BcjNtJl4fmwknHc=; b=O5BhUM5tVleBDVjvmfimSxQWUrViCDtsxH2e2sz6XlfvKCFsvz2Mjtjr/3tZcTBBO9 a5TCE31iLHxdN5/TXUCxw7nUcHuNOmHExm1PU5t61h3G05VCLxsHd3XPx7i39XCCWtP1 KDg8KCgXWoX5rFD2nPf1ZGem9zVlbiVOwr8gBNvlyE9yxzXUbwV+mtSeYPooioYPMhff +hKD0dJ/0MGsTb8MnUqsETKiG7K5nZa1kfbbWCSWz+HZQB4g36hk+5FNMU6seZh5jabD gJyISHvbdAQC7gql/QLBtHygVrqlIfFKKP2YFmQRkOxWCAklXUIvzxFFJt9oyg2Hbq/9 /q5w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=1tRCgoKX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m2si8229998pfj.111.2019.03.12.10.42.45; Tue, 12 Mar 2019 10:43:01 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=1tRCgoKX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729236AbfCLRkY (ORCPT + 99 others); Tue, 12 Mar 2019 13:40:24 -0400 Received: from mail.kernel.org ([198.145.29.99]:57928 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729041AbfCLRQO (ORCPT ); Tue, 12 Mar 2019 13:16:14 -0400 Received: from localhost (unknown [104.133.8.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 25F8421872; Tue, 12 Mar 2019 17:16:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1552410974; bh=nDUANVlIVUL9qshPwbYfXD4SfCj7+wMp9DRlzD4jImU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=1tRCgoKXomDq4B4aoyrdITogoudOFqzgra1HGCRLPIT225K/6gkQ1zcTgYFinE+MT e/h6XUe2cEYviLH/HjYuXF342h4/NJEXhP8fEv262FFrG9TpqBMuTQNiI2v28DC2Ei qYajfhGmc5NNB2qgCr+Tdpw/g0RedaGu5s1mIU8s= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Andrew Lunn , Stefan Agner , Linus Walleij , Sasha Levin Subject: [PATCH 4.14 064/135] gpio: vf610: Mask all GPIO interrupts Date: Tue, 12 Mar 2019 10:08:31 -0700 Message-Id: <20190312170347.204894390@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190312170341.127810985@linuxfoundation.org> References: <20190312170341.127810985@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 7ae710f9f8b2cf95297e7bbfe1c09789a7dc43d4 ] On SoC reset all GPIO interrupts are disable. However, if kexec is used to boot into a new kernel, the SoC does not experience a reset. Hence GPIO interrupts can be left enabled from the previous kernel. It is then possible for the interrupt to fire before an interrupt handler is registered, resulting in the kernel complaining of an "unexpected IRQ trap", the interrupt is never cleared, and so fires again, resulting in an interrupt storm. Disable all GPIO interrupts before registering the GPIO IRQ chip. Fixes: 7f2691a19627 ("gpio: vf610: add gpiolib/IRQ chip driver for Vybrid") Signed-off-by: Andrew Lunn Acked-by: Stefan Agner Signed-off-by: Linus Walleij Signed-off-by: Sasha Levin --- drivers/gpio/gpio-vf610.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/drivers/gpio/gpio-vf610.c b/drivers/gpio/gpio-vf610.c index cbe9e06861de..1309b444720e 100644 --- a/drivers/gpio/gpio-vf610.c +++ b/drivers/gpio/gpio-vf610.c @@ -261,6 +261,7 @@ static int vf610_gpio_probe(struct platform_device *pdev) struct vf610_gpio_port *port; struct resource *iores; struct gpio_chip *gc; + int i; int ret; port = devm_kzalloc(&pdev->dev, sizeof(*port), GFP_KERNEL); @@ -300,6 +301,10 @@ static int vf610_gpio_probe(struct platform_device *pdev) if (ret < 0) return ret; + /* Mask all GPIO interrupts */ + for (i = 0; i < gc->ngpio; i++) + vf610_gpio_writel(0, port->base + PORT_PCR(i)); + /* Clear the interrupt status register for all GPIO's */ vf610_gpio_writel(~0, port->base + PORT_ISFR); -- 2.19.1