Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp665632img; Fri, 22 Mar 2019 06:11:56 -0700 (PDT) X-Google-Smtp-Source: APXvYqyYJZ0nH610Bvul3/Jx+g2RE5sku/XinBEiEXtBny8jTWN7OPWD/HPaxLUQ11Gin0q+Ic1U X-Received: by 2002:a65:49c4:: with SMTP id t4mr8861706pgs.421.1553260316619; Fri, 22 Mar 2019 06:11:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553260316; cv=none; d=google.com; s=arc-20160816; b=SVxG0Lu9IG1iTLkx0ssdCCDJr69N45G2gmm3nEesVQ/vF6MTMX74CGbkh+gKjrdv2I Ejud1sTAPNzIgvVyrOTuMMc0bWLrDZKUWS21qSGkvczAK+BmE6MkaPqoM3nY4rU8XTX6 gp01GGI0jGKBYgKsvkXZnbfgj7kVM32irIq/kzVb0dYrXB1xMafKnHr2coYDfJCREhw8 /aLvJy+AvH0YVKV1WJv5ebATj+1OQ7pjUQMmjYnNf7L1mQSPKdedyALeXvhUFbseA9oN K0DF1/X24EvtpMN63erAJFQPqLXRhzSC3vag5+yOZ0YsDAmBVRZn8Ftx6a44S4Q9Zwfr hXNA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=1b7+YKFN/bTftm7wQKBnRwBJD8WlLDASHwSk4it9yXY=; b=gu7t9mJLtD8kZ7X/9CIuPwt1dZ1WQ+7r0Q4n+0FOpsusZNopwlcTZdhUZ3RF7rfavF 3yZEg9SYMd5MNyhRp0T4FL5qYFoQ//3nSXbPV95fatlVmQ/0lLMajieG89P6rGSzqVBl 0noAGphYd+LGjiXelo2CJrzSsZUsK80Hqd4K/XrT6Aeh0LOzPrcj1R7sWu6pPPiarcBN 0/dOTI3zD/oTQlMn+2StP26HZt8oveQ584oNRTUcZrTwf9Ie1ypXQwghh+OJL6aBSMm6 of2Kut+DMwE626NnJpVkkU46nQUymB3x8G4mL6rg4Vobd7ZIJ5W618oFMtJ8HgnUpTQw J0uQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ueGxXKrs; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t9si6803833plo.216.2019.03.22.06.11.41; Fri, 22 Mar 2019 06:11:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ueGxXKrs; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728288AbfCVLdL (ORCPT + 99 others); Fri, 22 Mar 2019 07:33:11 -0400 Received: from mail.kernel.org ([198.145.29.99]:33524 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730237AbfCVLdJ (ORCPT ); Fri, 22 Mar 2019 07:33:09 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E12B020449; Fri, 22 Mar 2019 11:33:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1553254388; bh=dvxT1ZJo3SeR6+qNixqlYdeRORes1t2223B6b+Z4wrM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ueGxXKrswvHb5OJIooZn/Uw1pRS6H2pvMMmnXnmwASIXouj54cawnSo6OF1UGjecl 2I4TDO4lS5I57ADHlstPz7oN92BKamuFScJ0Xr+LWqgnFSWk5yfI1ldV/2zhEc17C+ 6NzX/KIRhlVD1ZUNdbsEhQxuHf+t/D/vgVCwxvgg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Lubomir Rintel , Pavel Machek , Marc Zyngier , Sasha Levin Subject: [PATCH 4.4 106/230] irqchip/mmp: Only touch the PJ4 IRQ & FIQ bits on enable/disable Date: Fri, 22 Mar 2019 12:14:04 +0100 Message-Id: <20190322111244.032430406@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190322111236.796964179@linuxfoundation.org> References: <20190322111236.796964179@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 2380a22b60ce6f995eac806e69c66e397b59d045 ] Resetting bit 4 disables the interrupt delivery to the "secure processor" core. This breaks the keyboard on a OLPC XO 1.75 laptop, where the firmware running on the "secure processor" bit-bangs the PS/2 protocol over the GPIO lines. It is not clear what the rest of the bits are and Marvell was unhelpful when asked for documentation. Aside from the SP bit, there are probably priority bits. Leaving the unknown bits as the firmware set them up seems to be a wiser course of action compared to just turning them off. Signed-off-by: Lubomir Rintel Acked-by: Pavel Machek [maz: fixed-up subject and commit message] Signed-off-by: Marc Zyngier Signed-off-by: Sasha Levin --- drivers/irqchip/irq-mmp.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/drivers/irqchip/irq-mmp.c b/drivers/irqchip/irq-mmp.c index 013fc9659a84..2fe2bcb63a71 100644 --- a/drivers/irqchip/irq-mmp.c +++ b/drivers/irqchip/irq-mmp.c @@ -34,6 +34,9 @@ #define SEL_INT_PENDING (1 << 6) #define SEL_INT_NUM_MASK 0x3f +#define MMP2_ICU_INT_ROUTE_PJ4_IRQ (1 << 5) +#define MMP2_ICU_INT_ROUTE_PJ4_FIQ (1 << 6) + struct icu_chip_data { int nr_irqs; unsigned int virq_base; @@ -190,7 +193,8 @@ static struct mmp_intc_conf mmp_conf = { static struct mmp_intc_conf mmp2_conf = { .conf_enable = 0x20, .conf_disable = 0x0, - .conf_mask = 0x7f, + .conf_mask = MMP2_ICU_INT_ROUTE_PJ4_IRQ | + MMP2_ICU_INT_ROUTE_PJ4_FIQ, }; static void __exception_irq_entry mmp_handle_irq(struct pt_regs *regs) -- 2.19.1