Received: by 2002:a05:6512:3d0e:0:0:0:0 with SMTP id d14csp39328lfv; Tue, 12 Apr 2022 16:22:21 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwRsy/bP2a6lazcUq9Cq/Qennts4LcJ4DmkX32fchHs1VOOxvQsnqY1F4e0Q1j6ww1T6NH7 X-Received: by 2002:a17:902:a705:b0:156:9cc5:1d6f with SMTP id w5-20020a170902a70500b001569cc51d6fmr39554671plq.66.1649805740895; Tue, 12 Apr 2022 16:22:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649805740; cv=none; d=google.com; s=arc-20160816; b=ZAPmx0o4aS2o3Ypn2EtfxWYRk3UQMvznxrnTu0OFev8W9DJGtJsODFRl3wprt1CDdX fT6yVbwReVfGN7ykW0Dcxom7olhWQcf6bXT8FVjlCl55blLFdBFptesVOlm9wXc5Gtdf uIqD113cX+CVrVB2y3f0rm+2FrXEOd9Q7LR4cpq6JB1rz/N99ilKVjy3ZiqusMJYsnkr +4PqZgeuZ7IX5vQMOiHVIiH3WZc4ri/dwCcfA3oYpZIE2wmfBBKdD1Zwla/j16WZMuGr lXNKL+gT1cVsZ515nMo1pq6xb6p3nLLeLBoO75WrdUKDo+vI01l7nDL23GrIa4YxHEzP Tgkw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=yusjjws4w+kGjG4R5GQyOeULu60pgcB2u5PIwco52Rc=; b=bBBR1ZhHWCNyhEe8hmxlLzwqMRFl0VHNjTqSV6tE9AeW8tbjo8t/M7ncR2rJQj8ELB qaUJQZwQoPsyFzjow6YBM74rn3/XhuuP/Hl6LAKC+M+oHFWiINgt26MMeUreRKXQQHqS zFsM8/hK3xJH9gm95fhh7hxURjMQrir849X2yeWt/ygiX/u762xMJnbM7v8uFiKxkTQV C9vUHY6m6ow7o6EOXvnX787k0njKYh6NRZifSYBGvZ9511S9176mDmHen28eGG6UJ/0s LIrnXAkF/ys5g6o84YzIorLvGYQ5noHM90r5/ziQz7dmWaC1BMPyxnJP533+5rsHfJAy PQtw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=MUziD5Pr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id s10-20020a63af4a000000b0039924bcb6a9si4165624pgo.172.2022.04.12.16.22.20 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Apr 2022 16:22:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=MUziD5Pr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 7EBDD19D608; Tue, 12 Apr 2022 14:14:46 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235389AbiDLHAZ (ORCPT + 99 others); Tue, 12 Apr 2022 03:00:25 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48746 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1351481AbiDLGxm (ORCPT ); Tue, 12 Apr 2022 02:53:42 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 329F61834F; Mon, 11 Apr 2022 23:41:19 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id C5B8E60A69; Tue, 12 Apr 2022 06:41:18 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id C7896C385A1; Tue, 12 Apr 2022 06:41:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1649745678; bh=j+rku0b+Icgd7VM9KfTkDjJB1stnzRIZQZl4d330c/w=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=MUziD5Pru4zBQ9UXaE0+2ll7IrWCIo2mH0IrbM1XMZPJB5HgQn1Q35L8Xu47GXz7c Fg739DXUKQRyY14Ue++mAHrMSZ7iI850I9/51kcvU8jT5GDshW5ZGPhJP1SQBw5+RE CCv6oMlaOxbJ0CEPq+9I3RkhWsnwsMbvwadZhQwM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Lukas Bulwahn , Johannes Berg , Richard Weinberger , Sasha Levin Subject: [PATCH 5.15 001/277] lib/logic_iomem: correct fallback config references Date: Tue, 12 Apr 2022 08:26:44 +0200 Message-Id: <20220412062942.069577288@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220412062942.022903016@linuxfoundation.org> References: <20220412062942.022903016@linuxfoundation.org> User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johannes Berg [ Upstream commit 2a6852cb8ff0c8c1363cac648d68489343813212 ] Due to some renaming, we ended up with the "indirect iomem" naming in Kconfig, following INDIRECT_PIO. However, clearly I missed following through on that in the ifdefs, but so far INDIRECT_IOMEM_FALLBACK isn't used by any architecture. Reported-by: Lukas Bulwahn Fixes: ca2e334232b6 ("lib: add iomem emulation (logic_iomem)") Signed-off-by: Johannes Berg Signed-off-by: Richard Weinberger Signed-off-by: Sasha Levin --- lib/logic_iomem.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/lib/logic_iomem.c b/lib/logic_iomem.c index 549b22d4bcde..e7ea9b28d8db 100644 --- a/lib/logic_iomem.c +++ b/lib/logic_iomem.c @@ -68,7 +68,7 @@ int logic_iomem_add_region(struct resource *resource, } EXPORT_SYMBOL(logic_iomem_add_region); -#ifndef CONFIG_LOGIC_IOMEM_FALLBACK +#ifndef CONFIG_INDIRECT_IOMEM_FALLBACK static void __iomem *real_ioremap(phys_addr_t offset, size_t size) { WARN(1, "invalid ioremap(0x%llx, 0x%zx)\n", @@ -81,7 +81,7 @@ static void real_iounmap(void __iomem *addr) WARN(1, "invalid iounmap for addr 0x%llx\n", (unsigned long long)(uintptr_t __force)addr); } -#endif /* CONFIG_LOGIC_IOMEM_FALLBACK */ +#endif /* CONFIG_INDIRECT_IOMEM_FALLBACK */ void __iomem *ioremap(phys_addr_t offset, size_t size) { @@ -168,7 +168,7 @@ void iounmap(void __iomem *addr) } EXPORT_SYMBOL(iounmap); -#ifndef CONFIG_LOGIC_IOMEM_FALLBACK +#ifndef CONFIG_INDIRECT_IOMEM_FALLBACK #define MAKE_FALLBACK(op, sz) \ static u##sz real_raw_read ## op(const volatile void __iomem *addr) \ { \ @@ -213,7 +213,7 @@ static void real_memcpy_toio(volatile void __iomem *addr, const void *buffer, WARN(1, "Invalid memcpy_toio at address 0x%llx\n", (unsigned long long)(uintptr_t __force)addr); } -#endif /* CONFIG_LOGIC_IOMEM_FALLBACK */ +#endif /* CONFIG_INDIRECT_IOMEM_FALLBACK */ #define MAKE_OP(op, sz) \ u##sz __raw_read ## op(const volatile void __iomem *addr) \ -- 2.35.1