diff options
author | Sasha Levin <sashal@kernel.org> | 2024-04-21 13:10:13 -0400 |
---|---|---|
committer | Sasha Levin <sashal@kernel.org> | 2024-04-21 13:10:13 -0400 |
commit | 746499b58c6e463cd3d44e1e511e31b35726ebde (patch) | |
tree | f69f2722dea913a34ee6c43528622aa4a8488173 | |
parent | 1856f85c6774806f0af0fbe03870f4dd6c4a09e7 (diff) | |
download | stable-queue-746499b58c6e463cd3d44e1e511e31b35726ebde.tar.gz |
Fixes for 5.15
Signed-off-by: Sasha Levin <sashal@kernel.org>
8 files changed, 470 insertions, 0 deletions
diff --git a/queue-5.15/drm-nv04-fix-out-of-bounds-access.patch b/queue-5.15/drm-nv04-fix-out-of-bounds-access.patch new file mode 100644 index 0000000000..4c146c0a4a --- /dev/null +++ b/queue-5.15/drm-nv04-fix-out-of-bounds-access.patch @@ -0,0 +1,86 @@ +From efa122020ff335b1f2bdcbdb97c566070d114e05 Mon Sep 17 00:00:00 2001 +From: Sasha Levin <sashal@kernel.org> +Date: Thu, 11 Apr 2024 14:08:52 +0300 +Subject: drm: nv04: Fix out of bounds access + +From: Mikhail Kobuk <m.kobuk@ispras.ru> + +[ Upstream commit cf92bb778eda7830e79452c6917efa8474a30c1e ] + +When Output Resource (dcb->or) value is assigned in +fabricate_dcb_output(), there may be out of bounds access to +dac_users array in case dcb->or is zero because ffs(dcb->or) is +used as index there. +The 'or' argument of fabricate_dcb_output() must be interpreted as a +number of bit to set, not value. + +Utilize macros from 'enum nouveau_or' in calls instead of hardcoding. + +Found by Linux Verification Center (linuxtesting.org) with SVACE. + +Fixes: 2e5702aff395 ("drm/nouveau: fabricate DCB encoder table for iMac G4") +Fixes: 670820c0e6a9 ("drm/nouveau: Workaround incorrect DCB entry on a GeForce3 Ti 200.") +Signed-off-by: Mikhail Kobuk <m.kobuk@ispras.ru> +Signed-off-by: Danilo Krummrich <dakr@redhat.com> +Link: https://patchwork.freedesktop.org/patch/msgid/20240411110854.16701-1-m.kobuk@ispras.ru +Signed-off-by: Sasha Levin <sashal@kernel.org> +--- + drivers/gpu/drm/nouveau/nouveau_bios.c | 13 +++++++------ + 1 file changed, 7 insertions(+), 6 deletions(-) + +diff --git a/drivers/gpu/drm/nouveau/nouveau_bios.c b/drivers/gpu/drm/nouveau/nouveau_bios.c +index e8c445eb11004..f63ceb8d3e4ef 100644 +--- a/drivers/gpu/drm/nouveau/nouveau_bios.c ++++ b/drivers/gpu/drm/nouveau/nouveau_bios.c +@@ -23,6 +23,7 @@ + */ + + #include "nouveau_drv.h" ++#include "nouveau_bios.h" + #include "nouveau_reg.h" + #include "dispnv04/hw.h" + #include "nouveau_encoder.h" +@@ -1675,7 +1676,7 @@ apply_dcb_encoder_quirks(struct drm_device *dev, int idx, u32 *conn, u32 *conf) + */ + if (nv_match_device(dev, 0x0201, 0x1462, 0x8851)) { + if (*conn == 0xf2005014 && *conf == 0xffffffff) { +- fabricate_dcb_output(dcb, DCB_OUTPUT_TMDS, 1, 1, 1); ++ fabricate_dcb_output(dcb, DCB_OUTPUT_TMDS, 1, 1, DCB_OUTPUT_B); + return false; + } + } +@@ -1761,26 +1762,26 @@ fabricate_dcb_encoder_table(struct drm_device *dev, struct nvbios *bios) + #ifdef __powerpc__ + /* Apple iMac G4 NV17 */ + if (of_machine_is_compatible("PowerMac4,5")) { +- fabricate_dcb_output(dcb, DCB_OUTPUT_TMDS, 0, all_heads, 1); +- fabricate_dcb_output(dcb, DCB_OUTPUT_ANALOG, 1, all_heads, 2); ++ fabricate_dcb_output(dcb, DCB_OUTPUT_TMDS, 0, all_heads, DCB_OUTPUT_B); ++ fabricate_dcb_output(dcb, DCB_OUTPUT_ANALOG, 1, all_heads, DCB_OUTPUT_C); + return; + } + #endif + + /* Make up some sane defaults */ + fabricate_dcb_output(dcb, DCB_OUTPUT_ANALOG, +- bios->legacy.i2c_indices.crt, 1, 1); ++ bios->legacy.i2c_indices.crt, 1, DCB_OUTPUT_B); + + if (nv04_tv_identify(dev, bios->legacy.i2c_indices.tv) >= 0) + fabricate_dcb_output(dcb, DCB_OUTPUT_TV, + bios->legacy.i2c_indices.tv, +- all_heads, 0); ++ all_heads, DCB_OUTPUT_A); + + else if (bios->tmds.output0_script_ptr || + bios->tmds.output1_script_ptr) + fabricate_dcb_output(dcb, DCB_OUTPUT_TMDS, + bios->legacy.i2c_indices.panel, +- all_heads, 1); ++ all_heads, DCB_OUTPUT_B); + } + + static int +-- +2.43.0 + diff --git a/queue-5.15/drm-panel-visionox-rm69299-don-t-unregister-dsi-devi.patch b/queue-5.15/drm-panel-visionox-rm69299-don-t-unregister-dsi-devi.patch new file mode 100644 index 0000000000..163dbd8d58 --- /dev/null +++ b/queue-5.15/drm-panel-visionox-rm69299-don-t-unregister-dsi-devi.patch @@ -0,0 +1,38 @@ +From 5ce091d7849417d563ac87bc71bfb3665c0626db Mon Sep 17 00:00:00 2001 +From: Sasha Levin <sashal@kernel.org> +Date: Thu, 4 Apr 2024 13:07:59 +0300 +Subject: drm/panel: visionox-rm69299: don't unregister DSI device + +From: Dmitry Baryshkov <dmitry.baryshkov@linaro.org> + +[ Upstream commit 9e4d3f4f34455abbaa9930bf6b7575a5cd081496 ] + +The DSI device for the panel was registered by the DSI host, so it is an +error to unregister it from the panel driver. Drop the call to +mipi_dsi_device_unregister(). + +Fixes: c7f66d32dd43 ("drm/panel: add support for rm69299 visionox panel") +Reviewed-by: Jessica Zhang <quic_jesszhan@quicinc.com> +Signed-off-by: Dmitry Baryshkov <dmitry.baryshkov@linaro.org> +Link: https://patchwork.freedesktop.org/patch/msgid/20240404-drop-panel-unregister-v1-1-9f56953c5fb9@linaro.org +Signed-off-by: Sasha Levin <sashal@kernel.org> +--- + drivers/gpu/drm/panel/panel-visionox-rm69299.c | 2 -- + 1 file changed, 2 deletions(-) + +diff --git a/drivers/gpu/drm/panel/panel-visionox-rm69299.c b/drivers/gpu/drm/panel/panel-visionox-rm69299.c +index eb43503ec97b3..6134432e4918d 100644 +--- a/drivers/gpu/drm/panel/panel-visionox-rm69299.c ++++ b/drivers/gpu/drm/panel/panel-visionox-rm69299.c +@@ -261,8 +261,6 @@ static int visionox_rm69299_remove(struct mipi_dsi_device *dsi) + struct visionox_rm69299 *ctx = mipi_dsi_get_drvdata(dsi); + + mipi_dsi_detach(ctx->dsi); +- mipi_dsi_device_unregister(ctx->dsi); +- + drm_panel_remove(&ctx->panel); + return 0; + } +-- +2.43.0 + diff --git a/queue-5.15/rdma-cm-print-the-old-state-when-cm_destroy_id-gets-.patch b/queue-5.15/rdma-cm-print-the-old-state-when-cm_destroy_id-gets-.patch new file mode 100644 index 0000000000..27e7fa2818 --- /dev/null +++ b/queue-5.15/rdma-cm-print-the-old-state-when-cm_destroy_id-gets-.patch @@ -0,0 +1,67 @@ +From cb394057ca27d04edfa951361e352effc56ea73e Mon Sep 17 00:00:00 2001 +From: Sasha Levin <sashal@kernel.org> +Date: Fri, 22 Mar 2024 13:20:49 +0200 +Subject: RDMA/cm: Print the old state when cm_destroy_id gets timeout + +From: Mark Zhang <markzhang@nvidia.com> + +[ Upstream commit b68e1acb5834ed1a2ad42d9d002815a8bae7c0b6 ] + +The old state is helpful for debugging, as the current state is always +IB_CM_IDLE when timeout happens. + +Fixes: 96d9cbe2f2ff ("RDMA/cm: add timeout to cm_destroy_id wait") +Signed-off-by: Mark Zhang <markzhang@nvidia.com> +Link: https://lore.kernel.org/r/20240322112049.2022994-1-markzhang@nvidia.com +Signed-off-by: Leon Romanovsky <leon@kernel.org> +Signed-off-by: Sasha Levin <sashal@kernel.org> +--- + drivers/infiniband/core/cm.c | 11 +++++++---- + 1 file changed, 7 insertions(+), 4 deletions(-) + +diff --git a/drivers/infiniband/core/cm.c b/drivers/infiniband/core/cm.c +index 504e1adf1997a..c8a7fe5fbc233 100644 +--- a/drivers/infiniband/core/cm.c ++++ b/drivers/infiniband/core/cm.c +@@ -1033,23 +1033,26 @@ static void cm_reset_to_idle(struct cm_id_private *cm_id_priv) + } + } + +-static noinline void cm_destroy_id_wait_timeout(struct ib_cm_id *cm_id) ++static noinline void cm_destroy_id_wait_timeout(struct ib_cm_id *cm_id, ++ enum ib_cm_state old_state) + { + struct cm_id_private *cm_id_priv; + + cm_id_priv = container_of(cm_id, struct cm_id_private, id); +- pr_err("%s: cm_id=%p timed out. state=%d refcnt=%d\n", __func__, +- cm_id, cm_id->state, refcount_read(&cm_id_priv->refcount)); ++ pr_err("%s: cm_id=%p timed out. state %d -> %d, refcnt=%d\n", __func__, ++ cm_id, old_state, cm_id->state, refcount_read(&cm_id_priv->refcount)); + } + + static void cm_destroy_id(struct ib_cm_id *cm_id, int err) + { + struct cm_id_private *cm_id_priv; ++ enum ib_cm_state old_state; + struct cm_work *work; + int ret; + + cm_id_priv = container_of(cm_id, struct cm_id_private, id); + spin_lock_irq(&cm_id_priv->lock); ++ old_state = cm_id->state; + retest: + switch (cm_id->state) { + case IB_CM_LISTEN: +@@ -1158,7 +1161,7 @@ static void cm_destroy_id(struct ib_cm_id *cm_id, int err) + msecs_to_jiffies( + CM_DESTROY_ID_WAIT_TIMEOUT)); + if (!ret) /* timeout happened */ +- cm_destroy_id_wait_timeout(cm_id); ++ cm_destroy_id_wait_timeout(cm_id, old_state); + } while (!ret); + + while ((work = cm_dequeue_work(cm_id_priv)) != NULL) +-- +2.43.0 + diff --git a/queue-5.15/rdma-mlx5-fix-port-number-for-counter-query-in-multi.patch b/queue-5.15/rdma-mlx5-fix-port-number-for-counter-query-in-multi.patch new file mode 100644 index 0000000000..cf6e84cd35 --- /dev/null +++ b/queue-5.15/rdma-mlx5-fix-port-number-for-counter-query-in-multi.patch @@ -0,0 +1,41 @@ +From 3862149ef5da97e649e1b4ea3cfcb078a0c9901d Mon Sep 17 00:00:00 2001 +From: Sasha Levin <sashal@kernel.org> +Date: Wed, 3 Apr 2024 12:03:46 +0300 +Subject: RDMA/mlx5: Fix port number for counter query in multi-port + configuration + +From: Michael Guralnik <michaelgur@nvidia.com> + +[ Upstream commit be121ffb384f53e966ee7299ffccc6eeb61bc73d ] + +Set the correct port when querying PPCNT in multi-port configuration. +Distinguish between cases where switchdev mode was enabled to multi-port +configuration and don't overwrite the queried port to 1 in multi-port +case. + +Fixes: 74b30b3ad5ce ("RDMA/mlx5: Set local port to one when accessing counters") +Signed-off-by: Michael Guralnik <michaelgur@nvidia.com> +Link: https://lore.kernel.org/r/9bfcc8ade958b760a51408c3ad654a01b11f7d76.1712134988.git.leon@kernel.org +Signed-off-by: Leon Romanovsky <leon@kernel.org> +Signed-off-by: Sasha Levin <sashal@kernel.org> +--- + drivers/infiniband/hw/mlx5/mad.c | 3 ++- + 1 file changed, 2 insertions(+), 1 deletion(-) + +diff --git a/drivers/infiniband/hw/mlx5/mad.c b/drivers/infiniband/hw/mlx5/mad.c +index f6f2df855c2ed..1082841807759 100644 +--- a/drivers/infiniband/hw/mlx5/mad.c ++++ b/drivers/infiniband/hw/mlx5/mad.c +@@ -166,7 +166,8 @@ static int process_pma_cmd(struct mlx5_ib_dev *dev, u32 port_num, + mdev = dev->mdev; + mdev_port_num = 1; + } +- if (MLX5_CAP_GEN(dev->mdev, num_ports) == 1) { ++ if (MLX5_CAP_GEN(dev->mdev, num_ports) == 1 && ++ !mlx5_core_mp_enabled(mdev)) { + /* set local port to one for Function-Per-Port HCA. */ + mdev = dev->mdev; + mdev_port_num = 1; +-- +2.43.0 + diff --git a/queue-5.15/rdma-rxe-fix-the-problem-mutex_destroy-missing.patch b/queue-5.15/rdma-rxe-fix-the-problem-mutex_destroy-missing.patch new file mode 100644 index 0000000000..53493ee4d3 --- /dev/null +++ b/queue-5.15/rdma-rxe-fix-the-problem-mutex_destroy-missing.patch @@ -0,0 +1,38 @@ +From 44e2d974dac2d3cf845c1b2b0444cf4bd4f07a46 Mon Sep 17 00:00:00 2001 +From: Sasha Levin <sashal@kernel.org> +Date: Thu, 14 Mar 2024 07:51:40 +0100 +Subject: RDMA/rxe: Fix the problem "mutex_destroy missing" + +From: Yanjun.Zhu <yanjun.zhu@linux.dev> + +[ Upstream commit 481047d7e8391d3842ae59025806531cdad710d9 ] + +When a mutex lock is not used any more, the function mutex_destroy +should be called to mark the mutex lock uninitialized. + +Fixes: 8700e3e7c485 ("Soft RoCE driver") +Signed-off-by: Yanjun.Zhu <yanjun.zhu@linux.dev> +Link: https://lore.kernel.org/r/20240314065140.27468-1-yanjun.zhu@linux.dev +Reviewed-by: Daisuke Matsuda <matsuda-daisuke@fujitsu.com> +Signed-off-by: Leon Romanovsky <leon@kernel.org> +Signed-off-by: Sasha Levin <sashal@kernel.org> +--- + drivers/infiniband/sw/rxe/rxe.c | 2 ++ + 1 file changed, 2 insertions(+) + +diff --git a/drivers/infiniband/sw/rxe/rxe.c b/drivers/infiniband/sw/rxe/rxe.c +index 8e0f9c489cab2..f6ef782ce75c1 100644 +--- a/drivers/infiniband/sw/rxe/rxe.c ++++ b/drivers/infiniband/sw/rxe/rxe.c +@@ -35,6 +35,8 @@ void rxe_dealloc(struct ib_device *ib_dev) + + if (rxe->tfm) + crypto_free_shash(rxe->tfm); ++ ++ mutex_destroy(&rxe->usdev_lock); + } + + /* initialize rxe device parameters */ +-- +2.43.0 + diff --git a/queue-5.15/s390-cio-fix-race-condition-during-online-processing.patch b/queue-5.15/s390-cio-fix-race-condition-during-online-processing.patch new file mode 100644 index 0000000000..3db3a7c08b --- /dev/null +++ b/queue-5.15/s390-cio-fix-race-condition-during-online-processing.patch @@ -0,0 +1,72 @@ +From 6fd0930d4033ef2817c401a1dac4a42e846c290c Mon Sep 17 00:00:00 2001 +From: Sasha Levin <sashal@kernel.org> +Date: Wed, 10 Apr 2024 11:46:19 +0200 +Subject: s390/cio: fix race condition during online processing + +From: Peter Oberparleiter <oberpar@linux.ibm.com> + +[ Upstream commit 2d8527f2f911fab84aec04df4788c0c23af3df48 ] + +A race condition exists in ccw_device_set_online() that can cause the +online process to fail, leaving the affected device in an inconsistent +state. As a result, subsequent attempts to set that device online fail +with return code ENODEV. + +The problem occurs when a path verification request arrives after +a wait for final device state completed, but before the result state +is evaluated. + +Fix this by ensuring that the CCW-device lock is held between +determining final state and checking result state. + +Note that since: + +commit 2297791c92d0 ("s390/cio: dont unregister subchannel from child-drivers") + +path verification requests are much more likely to occur during boot, +resulting in an increased chance of this race condition occurring. + +Fixes: 2297791c92d0 ("s390/cio: dont unregister subchannel from child-drivers") +Reviewed-by: Alexandra Winter <wintera@linux.ibm.com> +Reviewed-by: Vineeth Vijayan <vneethv@linux.ibm.com> +Signed-off-by: Peter Oberparleiter <oberpar@linux.ibm.com> +Signed-off-by: Alexander Gordeev <agordeev@linux.ibm.com> +Signed-off-by: Sasha Levin <sashal@kernel.org> +--- + drivers/s390/cio/device.c | 13 ++++++++----- + 1 file changed, 8 insertions(+), 5 deletions(-) + +diff --git a/drivers/s390/cio/device.c b/drivers/s390/cio/device.c +index a111154a90465..c16f18cfeed72 100644 +--- a/drivers/s390/cio/device.c ++++ b/drivers/s390/cio/device.c +@@ -360,10 +360,8 @@ int ccw_device_set_online(struct ccw_device *cdev) + + spin_lock_irq(cdev->ccwlock); + ret = ccw_device_online(cdev); +- spin_unlock_irq(cdev->ccwlock); +- if (ret == 0) +- wait_event(cdev->private->wait_q, dev_fsm_final_state(cdev)); +- else { ++ if (ret) { ++ spin_unlock_irq(cdev->ccwlock); + CIO_MSG_EVENT(0, "ccw_device_online returned %d, " + "device 0.%x.%04x\n", + ret, cdev->private->dev_id.ssid, +@@ -372,7 +370,12 @@ int ccw_device_set_online(struct ccw_device *cdev) + put_device(&cdev->dev); + return ret; + } +- spin_lock_irq(cdev->ccwlock); ++ /* Wait until a final state is reached */ ++ while (!dev_fsm_final_state(cdev)) { ++ spin_unlock_irq(cdev->ccwlock); ++ wait_event(cdev->private->wait_q, dev_fsm_final_state(cdev)); ++ spin_lock_irq(cdev->ccwlock); ++ } + /* Check if online processing was successful */ + if ((cdev->private->state != DEV_STATE_ONLINE) && + (cdev->private->state != DEV_STATE_W4SENSE)) { +-- +2.43.0 + diff --git a/queue-5.15/s390-qdio-handle-deferred-cc1.patch b/queue-5.15/s390-qdio-handle-deferred-cc1.patch new file mode 100644 index 0000000000..ecaba87081 --- /dev/null +++ b/queue-5.15/s390-qdio-handle-deferred-cc1.patch @@ -0,0 +1,121 @@ +From a6ad3ff02f142d7e0305ebec2a6d1547d6ae8496 Mon Sep 17 00:00:00 2001 +From: Sasha Levin <sashal@kernel.org> +Date: Wed, 10 Apr 2024 11:46:18 +0200 +Subject: s390/qdio: handle deferred cc1 + +From: Peter Oberparleiter <oberpar@linux.ibm.com> + +[ Upstream commit 607638faf2ff1cede37458111496e7cc6c977f6f ] + +A deferred condition code 1 response indicates that I/O was not started +and should be retried. The current QDIO implementation handles a cc1 +response as I/O error, resulting in a failed QDIO setup. This can happen +for example when a path verification request arrives at the same time +as QDIO setup I/O is started. + +Fix this by retrying the QDIO setup I/O when a cc1 response is received. + +Note that since + +commit 2297791c92d0 ("s390/cio: dont unregister subchannel from child-drivers") +commit 5ef1dc40ffa6 ("s390/cio: fix invalid -EBUSY on ccw_device_start") + +deferred cc1 responses are much more likely to occur. See the commit +message of the latter for more background information. + +Fixes: 2297791c92d0 ("s390/cio: dont unregister subchannel from child-drivers") +Reviewed-by: Alexandra Winter <wintera@linux.ibm.com> +Signed-off-by: Peter Oberparleiter <oberpar@linux.ibm.com> +Signed-off-by: Alexander Gordeev <agordeev@linux.ibm.com> +Signed-off-by: Sasha Levin <sashal@kernel.org> +--- + drivers/s390/cio/qdio_main.c | 28 +++++++++++++++++++++++----- + 1 file changed, 23 insertions(+), 5 deletions(-) + +diff --git a/drivers/s390/cio/qdio_main.c b/drivers/s390/cio/qdio_main.c +index 45e810c6ea3ba..6c186bbd84417 100644 +--- a/drivers/s390/cio/qdio_main.c ++++ b/drivers/s390/cio/qdio_main.c +@@ -679,8 +679,8 @@ static void qdio_handle_activate_check(struct qdio_irq *irq_ptr, + lgr_info_log(); + } + +-static void qdio_establish_handle_irq(struct qdio_irq *irq_ptr, int cstat, +- int dstat) ++static int qdio_establish_handle_irq(struct qdio_irq *irq_ptr, int cstat, ++ int dstat, int dcc) + { + DBF_DEV_EVENT(DBF_INFO, irq_ptr, "qest irq"); + +@@ -688,15 +688,18 @@ static void qdio_establish_handle_irq(struct qdio_irq *irq_ptr, int cstat, + goto error; + if (dstat & ~(DEV_STAT_DEV_END | DEV_STAT_CHN_END)) + goto error; ++ if (dcc == 1) ++ return -EAGAIN; + if (!(dstat & DEV_STAT_DEV_END)) + goto error; + qdio_set_state(irq_ptr, QDIO_IRQ_STATE_ESTABLISHED); +- return; ++ return 0; + + error: + DBF_ERROR("%4x EQ:error", irq_ptr->schid.sch_no); + DBF_ERROR("ds: %2x cs:%2x", dstat, cstat); + qdio_set_state(irq_ptr, QDIO_IRQ_STATE_ERR); ++ return -EIO; + } + + /* qdio interrupt handler */ +@@ -705,7 +708,7 @@ void qdio_int_handler(struct ccw_device *cdev, unsigned long intparm, + { + struct qdio_irq *irq_ptr = cdev->private->qdio_data; + struct subchannel_id schid; +- int cstat, dstat; ++ int cstat, dstat, rc, dcc; + + if (!intparm || !irq_ptr) { + ccw_device_get_schid(cdev, &schid); +@@ -725,10 +728,12 @@ void qdio_int_handler(struct ccw_device *cdev, unsigned long intparm, + qdio_irq_check_sense(irq_ptr, irb); + cstat = irb->scsw.cmd.cstat; + dstat = irb->scsw.cmd.dstat; ++ dcc = scsw_cmd_is_valid_cc(&irb->scsw) ? irb->scsw.cmd.cc : 0; ++ rc = 0; + + switch (irq_ptr->state) { + case QDIO_IRQ_STATE_INACTIVE: +- qdio_establish_handle_irq(irq_ptr, cstat, dstat); ++ rc = qdio_establish_handle_irq(irq_ptr, cstat, dstat, dcc); + break; + case QDIO_IRQ_STATE_CLEANUP: + qdio_set_state(irq_ptr, QDIO_IRQ_STATE_INACTIVE); +@@ -742,12 +747,25 @@ void qdio_int_handler(struct ccw_device *cdev, unsigned long intparm, + if (cstat || dstat) + qdio_handle_activate_check(irq_ptr, intparm, cstat, + dstat); ++ else if (dcc == 1) ++ rc = -EAGAIN; + break; + case QDIO_IRQ_STATE_STOPPED: + break; + default: + WARN_ON_ONCE(1); + } ++ ++ if (rc == -EAGAIN) { ++ DBF_DEV_EVENT(DBF_INFO, irq_ptr, "qint retry"); ++ rc = ccw_device_start(cdev, irq_ptr->ccw, intparm, 0, 0); ++ if (!rc) ++ return; ++ DBF_ERROR("%4x RETRY ERR", irq_ptr->schid.sch_no); ++ DBF_ERROR("rc:%4x", rc); ++ qdio_set_state(irq_ptr, QDIO_IRQ_STATE_ERR); ++ } ++ + wake_up(&cdev->private->wait_q); + } + +-- +2.43.0 + diff --git a/queue-5.15/series b/queue-5.15/series index 6652ca33f8..f2e28e91e0 100644 --- a/queue-5.15/series +++ b/queue-5.15/series @@ -24,3 +24,10 @@ af_unix-don-t-peek-oob-data-without-msg_oob.patch tun-limit-printing-rate-when-illegal-packet-received.patch net-dsa-mt7530-fix-mirroring-frames-received-on-loca.patch net-ethernet-ti-am65-cpsw-nuss-cleanup-dma-channels-.patch +rdma-rxe-fix-the-problem-mutex_destroy-missing.patch +rdma-cm-print-the-old-state-when-cm_destroy_id-gets-.patch +rdma-mlx5-fix-port-number-for-counter-query-in-multi.patch +s390-qdio-handle-deferred-cc1.patch +s390-cio-fix-race-condition-during-online-processing.patch +drm-nv04-fix-out-of-bounds-access.patch +drm-panel-visionox-rm69299-don-t-unregister-dsi-devi.patch |