Received: by 2002:ac0:950c:0:0:0:0:0 with SMTP id f12csp2315260imc; Tue, 12 Mar 2019 11:12:19 -0700 (PDT) X-Google-Smtp-Source: APXvYqzDQvpLLPVm7bt0a34zwBkV+MTBMrs1bIXKYpwQw18vZqFAqV7q4Njn3Ev7me5uV9F4gB1N X-Received: by 2002:a63:5721:: with SMTP id l33mr10734739pgb.300.1552414339215; Tue, 12 Mar 2019 11:12:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552414339; cv=none; d=google.com; s=arc-20160816; b=SRGevKYAibAIJpMv/LVrBl8xTnv+UfB9UbN+i/5zd5JCCaqwrem/7rVxp01F8gHvJH u7Unug6V2NObaBvhpDlP/DP4T2xzLszAflRZXg2gYBJUPPQW2JeZyOulK6ogqMaX6EYz Ig9yfIYqSkk7SnUDvSWUa7unvXftAHJo+QkVPG7CmX3MCc+vsOxwtTE0eFBSbEAOg5yI txaVdwn9l7Uujzt2frtX4ddmvAdR1xwI9lVT2zI2+waLOodzC9KbcF8BQ5av+YcpDboG ISCqDvA4gKunZQ7h4AX4JwU1bYokI2SfvACnE231X/2IWOtYew/h7BvzI62px++ma4Rt 3Kbg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=6NXqFXyYAY8ZkYsjBS676L+zfCgpgNChajS928DxILg=; b=BDCvnfjgiPs75miGAuTYuDGDTf9r5zNlY3k9k7zGN1dghyFeaPetFQ5frfTpa8J8+8 nTMQRBEBgKAgPbTFRNYbxrjIiGm6fnrf3BQBajrQdR7rR9TabX9MrsetjG3WbOXybDLj oC4ERrndcVqHfaAsUPGRlDFhCGYNxdXg4dTTmW+BHn/B50Cn4pAR//md87275agPil3m jLRX+AhyNY7IYW+o+hCpq3WhZwI1GWtm/wJq8Kgx9x2hrzpEb6IEYQaj5iXGFDXmKxTj TP0XlpobeOWf6n9UBCHTFKahvlAw1QWK6zZbJ7aIeMgBOIvrlDsaBRL2l9Xn4R751eoE whww== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Iu6z86sz; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v3si8560499plo.147.2019.03.12.11.12.03; Tue, 12 Mar 2019 11:12:19 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Iu6z86sz; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728221AbfCLSIZ (ORCPT + 99 others); Tue, 12 Mar 2019 14:08:25 -0400 Received: from mail.kernel.org ([198.145.29.99]:46810 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727345AbfCLRMO (ORCPT ); Tue, 12 Mar 2019 13:12:14 -0400 Received: from localhost (unknown [104.133.8.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E515C2087C; Tue, 12 Mar 2019 17:12:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1552410734; bh=bwamKd7iJugdJM08yF7xZRy1HWxJ7NbPKVtw5jZbJSs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Iu6z86szABI+u7in2zncxEuA/oDtxVjdSiBI8kfkX1bjzQnFBc795bGiZfF4Rux6h bV4Bt9g1UYWl+2qN8xc3csQDDR/Z97b9VHtqbRCaw4XwS9qh4+z5vIRizwjwd/Qo6j wiTv/xcWs1+rtDsPv29nVeCp6925figD49oV/2U0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Andrew Lunn , Stefan Agner , Linus Walleij , Sasha Levin Subject: [PATCH 4.20 037/171] gpio: vf610: Mask all GPIO interrupts Date: Tue, 12 Mar 2019 10:06:57 -0700 Message-Id: <20190312170351.268280430@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190312170347.868927101@linuxfoundation.org> References: <20190312170347.868927101@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.20-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 7ae710f9f8b2cf95297e7bbfe1c09789a7dc43d4 ] On SoC reset all GPIO interrupts are disable. However, if kexec is used to boot into a new kernel, the SoC does not experience a reset. Hence GPIO interrupts can be left enabled from the previous kernel. It is then possible for the interrupt to fire before an interrupt handler is registered, resulting in the kernel complaining of an "unexpected IRQ trap", the interrupt is never cleared, and so fires again, resulting in an interrupt storm. Disable all GPIO interrupts before registering the GPIO IRQ chip. Fixes: 7f2691a19627 ("gpio: vf610: add gpiolib/IRQ chip driver for Vybrid") Signed-off-by: Andrew Lunn Acked-by: Stefan Agner Signed-off-by: Linus Walleij Signed-off-by: Sasha Levin --- drivers/gpio/gpio-vf610.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/drivers/gpio/gpio-vf610.c b/drivers/gpio/gpio-vf610.c index 5960396c8d9a..222170a1715f 100644 --- a/drivers/gpio/gpio-vf610.c +++ b/drivers/gpio/gpio-vf610.c @@ -250,6 +250,7 @@ static int vf610_gpio_probe(struct platform_device *pdev) struct vf610_gpio_port *port; struct resource *iores; struct gpio_chip *gc; + int i; int ret; port = devm_kzalloc(&pdev->dev, sizeof(*port), GFP_KERNEL); @@ -289,6 +290,10 @@ static int vf610_gpio_probe(struct platform_device *pdev) if (ret < 0) return ret; + /* Mask all GPIO interrupts */ + for (i = 0; i < gc->ngpio; i++) + vf610_gpio_writel(0, port->base + PORT_PCR(i)); + /* Clear the interrupt status register for all GPIO's */ vf610_gpio_writel(~0, port->base + PORT_ISFR); -- 2.19.1