Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp8542ybl; Tue, 7 Jan 2020 13:04:03 -0800 (PST) X-Google-Smtp-Source: APXvYqxMURJ+XbMw8/MZy2bUiGfOGaOmS6xxOILChfCvU/zs1zHxUY2AJvQ70GYJrJnrvCD28HiI X-Received: by 2002:a05:6830:20cf:: with SMTP id z15mr1645556otq.277.1578431043125; Tue, 07 Jan 2020 13:04:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578431043; cv=none; d=google.com; s=arc-20160816; b=BcbrImKhyYqBjD6L81nZ68pu7s8mz/k0qThCT/7F4RM86bt7ta0KUvFGSUBkCXti46 VX8OEvLUgogDZPAKYrAvfBv0PEKeswFwquYHMDeqG129IJsa6cUKOmhAvINhTEJ109kR WB9Ywrj8nsLHiJ1rx/Bu5VxYISICv8xPzlYeN0skOdVCVNGnb5e705TtOy3hef+36921 XLh4rL2TCNYL4rHsCMJem/iPVONtipMLOMRr/fPOUdbPNhC/UDrkOeNV0tthCd8tn7zj r5kJB4WDsqdYgAx6I+CdzmTMsdTyxdPAZRf4gGrajXrIxPsRWdxak935fsbK8twqTnBi DAMw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=nWeURZOUB2ntE2Efzxa5TKuYsgzQcmyLC3/r7vX9aWE=; b=bOUfw3oiGyWuohY/qHSOo8/dSfRH6bjBOJW66d4VgjUuMAHfG3uUeSBa164F336I5H rk4YBPwJ1Myu0frboScU8Te2OCFczsK7RmzK1FJ99SuPq7uxdIFpoP2E9WTqGFqCeZo1 wPxnNbGXYwqs9MnrerKgtuemGkDlt8KA6dBHTo/lYaa50Cb5GiSFbgZR0RbB93YpZNKy kX8KOt53Omw1KbZ4vzkxsAMCZd7UbWm5OGzKqAGsM/RdHjYSEuQga5Jl/XIN6c6Eh0/H XCfdOefbl5P1s+lEN3Caq23IqTNJ39gttXB08ewelIjpCmiAMEPqK4nmX1Q/kbfuBq+/ D/uQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="e/cxCn7u"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a29si553786otd.268.2020.01.07.13.03.50; Tue, 07 Jan 2020 13:04:03 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="e/cxCn7u"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728628AbgAGVBl (ORCPT + 99 others); Tue, 7 Jan 2020 16:01:41 -0500 Received: from mail.kernel.org ([198.145.29.99]:39454 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727027AbgAGVBj (ORCPT ); Tue, 7 Jan 2020 16:01:39 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9D13E20678; Tue, 7 Jan 2020 21:01:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1578430899; bh=8GcbSDgy6eK9FBFp8P48mgRgmME/4nkm7gYC2ckulrQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=e/cxCn7u5QfzYowdGKP+f2u7J6HKv8EdDzbhW46tBc0IgZAU/cZ4aEyhIo9+ANlnq fMgXck2JePPF2r1aR2cbVQ0Ek3/MjeZFgHmrnFdLV4e3aPqFK2fxaMJwvcQlZtlDhE /ddoXKmFKU1PKJWy7yleyaNw8rhBuGuH50I2ZU9M= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Yunfeng Ye , "Rafael J. Wysocki" Subject: [PATCH 5.4 142/191] ACPI: sysfs: Change ACPI_MASKABLE_GPE_MAX to 0x100 Date: Tue, 7 Jan 2020 21:54:22 +0100 Message-Id: <20200107205340.576727851@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20200107205332.984228665@linuxfoundation.org> References: <20200107205332.984228665@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Yunfeng Ye commit a7583e72a5f22470d3e6fd3b6ba912892242339f upstream. The commit 0f27cff8597d ("ACPI: sysfs: Make ACPI GPE mask kernel parameter cover all GPEs") says: "Use a bitmap of size 0xFF instead of a u64 for the GPE mask so 256 GPEs can be masked" But the masking of GPE 0xFF it not supported and the check condition "gpe > ACPI_MASKABLE_GPE_MAX" is not valid because the type of gpe is u8. So modify the macro ACPI_MASKABLE_GPE_MAX to 0x100, and drop the "gpe > ACPI_MASKABLE_GPE_MAX" check. In addition, update the docs "Format" for acpi_mask_gpe parameter. Fixes: 0f27cff8597d ("ACPI: sysfs: Make ACPI GPE mask kernel parameter cover all GPEs") Signed-off-by: Yunfeng Ye [ rjw: Use u16 as gpe data type in acpi_gpe_apply_masked_gpes() ] Signed-off-by: Rafael J. Wysocki Signed-off-by: Greg Kroah-Hartman --- Documentation/admin-guide/kernel-parameters.txt | 2 +- drivers/acpi/sysfs.c | 6 +++--- 2 files changed, 4 insertions(+), 4 deletions(-) --- a/Documentation/admin-guide/kernel-parameters.txt +++ b/Documentation/admin-guide/kernel-parameters.txt @@ -113,7 +113,7 @@ the GPE dispatcher. This facility can be used to prevent such uncontrolled GPE floodings. - Format: + Format: acpi_no_auto_serialize [HW,ACPI] Disable auto-serialization of AML methods --- a/drivers/acpi/sysfs.c +++ b/drivers/acpi/sysfs.c @@ -819,14 +819,14 @@ end: * interface: * echo unmask > /sys/firmware/acpi/interrupts/gpe00 */ -#define ACPI_MASKABLE_GPE_MAX 0xFF +#define ACPI_MASKABLE_GPE_MAX 0x100 static DECLARE_BITMAP(acpi_masked_gpes_map, ACPI_MASKABLE_GPE_MAX) __initdata; static int __init acpi_gpe_set_masked_gpes(char *val) { u8 gpe; - if (kstrtou8(val, 0, &gpe) || gpe > ACPI_MASKABLE_GPE_MAX) + if (kstrtou8(val, 0, &gpe)) return -EINVAL; set_bit(gpe, acpi_masked_gpes_map); @@ -838,7 +838,7 @@ void __init acpi_gpe_apply_masked_gpes(v { acpi_handle handle; acpi_status status; - u8 gpe; + u16 gpe; for_each_set_bit(gpe, acpi_masked_gpes_map, ACPI_MASKABLE_GPE_MAX) { status = acpi_get_gpe_device(gpe, &handle);