123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160 |
- From fc4c40ca1f332f2285c74eed80c8cfc94264dde0 Mon Sep 17 00:00:00 2001
- From: Nicolas Chauvet <[email protected]>
- Date: Wed, 27 Mar 2024 18:01:43 +0100
- Subject: [PATCH] Add redhat patches
- ---
- arch/s390/include/asm/ipl.h | 1 +
- arch/s390/kernel/ipl.c | 5 +
- arch/s390/kernel/setup.c | 4 +
- arch/x86/kernel/setup.c | 22 +-
- drivers/acpi/apei/hest.c | 8 +
- drivers/acpi/irq.c | 17 +-
- drivers/acpi/scan.c | 9 +
- drivers/ata/libahci.c | 18 +
- drivers/char/ipmi/ipmi_dmi.c | 15 +
- drivers/char/ipmi/ipmi_msghandler.c | 16 +-
- drivers/firmware/efi/Makefile | 1 +
- drivers/firmware/efi/efi.c | 124 ++++--
- drivers/firmware/efi/secureboot.c | 38 ++
- drivers/firmware/sysfb.c | 18 +-
- drivers/hid/hid-rmi.c | 66 ----
- .../coresight/coresight-etm4x-core.c | 19 +
- drivers/input/rmi4/rmi_driver.c | 124 +++---
- drivers/iommu/iommu.c | 22 ++
- drivers/pci/quirks.c | 24 ++
- drivers/scsi/sd.c | 10 +
- include/linux/efi.h | 22 +-
- include/linux/lsm_hook_defs.h | 2 +
- include/linux/module.h | 1 +
- include/linux/rh_kabi.h | 172 +++++++++
- include/linux/rmi.h | 1 +
- include/linux/security.h | 5 +
- kernel/module/main.c | 2 +
- kernel/module/signing.c | 9 +-
- scripts/tags.sh | 2 +
- security/integrity/platform_certs/load_uefi.c | 6 +-
- security/lockdown/Kconfig | 13 +
- security/lockdown/lockdown.c | 1 +
- security/security.c | 12 +
- sound/pci/hda/cs35l41_hda.c | 106 +++++-
- sound/pci/hda/cs35l41_hda.h | 8 +-
- sound/pci/hda/cs35l41_hda_property.c | 355 ++++++++++++++++--
- sound/pci/hda/hda_component.h | 4 +
- sound/pci/hda/patch_realtek.c | 34 +-
- 38 files changed, 1082 insertions(+), 234 deletions(-)
- create mode 100644 drivers/firmware/efi/secureboot.c
- create mode 100644 include/linux/rh_kabi.h
- diff --git a/arch/s390/include/asm/ipl.h b/arch/s390/include/asm/ipl.h
- index b0d00032479d..afb9544fb007 100644
- --- a/arch/s390/include/asm/ipl.h
- +++ b/arch/s390/include/asm/ipl.h
- @@ -139,6 +139,7 @@ int ipl_report_add_component(struct ipl_report *report, struct kexec_buf *kbuf,
- unsigned char flags, unsigned short cert);
- int ipl_report_add_certificate(struct ipl_report *report, void *key,
- unsigned long addr, unsigned long len);
- +bool ipl_get_secureboot(void);
-
- /*
- * DIAG 308 support
- diff --git a/arch/s390/kernel/ipl.c b/arch/s390/kernel/ipl.c
- index a3d3cb39b021..c02de966da1a 100644
- --- a/arch/s390/kernel/ipl.c
- +++ b/arch/s390/kernel/ipl.c
- @@ -2520,3 +2520,8 @@ int ipl_report_free(struct ipl_report *report)
- }
-
- #endif
- +
- +bool ipl_get_secureboot(void)
- +{
- + return !!ipl_secure_flag;
- +}
- diff --git a/arch/s390/kernel/setup.c b/arch/s390/kernel/setup.c
- index d48c7afe97e6..09fd497b28ba 100644
- --- a/arch/s390/kernel/setup.c
- +++ b/arch/s390/kernel/setup.c
- @@ -49,6 +49,7 @@
- #include <linux/memory.h>
- #include <linux/compat.h>
- #include <linux/start_kernel.h>
- +#include <linux/security.h>
- #include <linux/hugetlb.h>
- #include <linux/kmemleak.h>
-
- @@ -914,6 +915,9 @@ void __init setup_arch(char **cmdline_p)
-
- log_component_list();
-
- + if (ipl_get_secureboot())
- + security_lock_kernel_down("Secure IPL mode", LOCKDOWN_INTEGRITY_MAX);
- +
- /* Have one command line that is parsed and saved in /proc/cmdline */
- /* boot_command_line has been already set up in early.c */
- *cmdline_p = boot_command_line;
- diff --git a/arch/x86/kernel/setup.c b/arch/x86/kernel/setup.c
- index eb129277dcdd..da9c49b8a640 100644
- --- a/arch/x86/kernel/setup.c
- +++ b/arch/x86/kernel/setup.c
- @@ -20,6 +20,7 @@
- #include <linux/root_dev.h>
- #include <linux/hugetlb.h>
- #include <linux/tboot.h>
- +#include <linux/security.h>
- #include <linux/usb/xhci-dbgp.h>
- #include <linux/static_call.h>
- #include <linux/swiotlb.h>
- @@ -1028,6 +1029,13 @@ void __init setup_arch(char **cmdline_p)
- if (efi_enabled(EFI_BOOT))
- efi_init();
-
- + efi_set_secure_boot(boot_params.secure_boot);
- +
- +#ifdef CONFIG_LOCK_DOWN_IN_EFI_SECURE_BOOT
- + if (efi_enabled(EFI_SECURE_BOOT))
- + security_lock_kernel_down("EFI Secure Boot mode", LOCKDOWN_INTEGRITY_MAX);
- +#endif
- +
- reserve_ibft_region();
- x86_init.resources.dmi_setup();
-
- @@ -1190,19 +1198,7 @@ void __init setup_arch(char **cmdline_p)
- /* Allocate bigger log buffer */
- setup_log_buf(1);
-
- - if (efi_enabled(EFI_BOOT)) {
- - switch (boot_params.secure_boot) {
- - case efi_secureboot_mode_disabled:
- - pr_info("Secure boot disabled\n");
- - break;
- - case efi_secureboot_mode_enabled:
- - pr_info("Secure boot enabled\n");
- - break;
- - default:
- - pr_info("Secure boot could not be determined\n");
- - break;
- - }
- - }
- + efi_set_secure_boot(boot_params.secure_boot);
-
- reserve_initrd();
-
- diff --git a/drivers/acpi/apei/hest.c b/drivers/acpi/apei/hest.c
- index 6aef1ee5e1bd..8f146b1b4972 100644
- --- a/drivers/acpi/apei/hest.c
- +++ b/drivers/acpi/apei/hest.c
- @@ -96,6 +96,14 @@ static int apei_hest_parse(apei_hest_func_t func, void *data)
- if (hest_disable || !hest_tab)
- return -EINVAL;
-
- +#ifdef CONFIG_ARM64
- + /* Ignore broken firmware */
- + if (!strncmp(hest_tab->header.oem_id, "HPE ", 6) &&
- + !strncmp(hest_tab->header.oem_table_id, "ProLiant", 8) &&
- + MIDR_IMPLEMENTOR(read_cpuid_id()) == ARM_CPU_IMP_APM)
- + return -EINVAL;
- +#endif
- +
- hest_hdr = (struct acpi_hest_header *)(hest_tab + 1);
- for (i = 0; i < hest_tab->error_source_count; i++) {
- len = hest_esrc_len(hest_hdr);
- diff --git a/drivers/acpi/irq.c b/drivers/acpi/irq.c
- index 1687483ff319..390b67f19181 100644
- --- a/drivers/acpi/irq.c
- +++ b/drivers/acpi/irq.c
- @@ -143,6 +143,7 @@ struct acpi_irq_parse_one_ctx {
- unsigned int index;
- unsigned long *res_flags;
- struct irq_fwspec *fwspec;
- + bool skip_producer_check;
- };
-
- /**
- @@ -216,7 +217,8 @@ static acpi_status acpi_irq_parse_one_cb(struct acpi_resource *ares,
- return AE_CTRL_TERMINATE;
- case ACPI_RESOURCE_TYPE_EXTENDED_IRQ:
- eirq = &ares->data.extended_irq;
- - if (eirq->producer_consumer == ACPI_PRODUCER)
- + if (!ctx->skip_producer_check &&
- + eirq->producer_consumer == ACPI_PRODUCER)
- return AE_OK;
- if (ctx->index >= eirq->interrupt_count) {
- ctx->index -= eirq->interrupt_count;
- @@ -252,8 +254,19 @@ static acpi_status acpi_irq_parse_one_cb(struct acpi_resource *ares,
- static int acpi_irq_parse_one(acpi_handle handle, unsigned int index,
- struct irq_fwspec *fwspec, unsigned long *flags)
- {
- - struct acpi_irq_parse_one_ctx ctx = { -EINVAL, index, flags, fwspec };
- + struct acpi_irq_parse_one_ctx ctx = { -EINVAL, index, flags, fwspec, false };
-
- + /*
- + * Firmware on arm64-based HPE m400 platform incorrectly marks
- + * its UART interrupt as ACPI_PRODUCER rather than ACPI_CONSUMER.
- + * Don't do the producer/consumer check for that device.
- + */
- + if (IS_ENABLED(CONFIG_ARM64)) {
- + struct acpi_device *adev = acpi_get_acpi_dev(handle);
- +
- + if (adev && !strcmp(acpi_device_hid(adev), "APMC0D08"))
- + ctx.skip_producer_check = true;
- + }
- acpi_walk_resources(handle, METHOD_NAME__CRS, acpi_irq_parse_one_cb, &ctx);
- return ctx.rc;
- }
- diff --git a/drivers/acpi/scan.c b/drivers/acpi/scan.c
- index c0c5c5c58ae1..5fb3fde53f5a 100644
- --- a/drivers/acpi/scan.c
- +++ b/drivers/acpi/scan.c
- @@ -1753,6 +1753,15 @@ static bool acpi_device_enumeration_by_parent(struct acpi_device *device)
- if (!acpi_match_device_ids(device, ignore_serial_bus_ids))
- return false;
-
- + /*
- + * Firmware on some arm64 X-Gene platforms will make the UART
- + * device appear as both a UART and a slave of that UART. Just
- + * bail out here for X-Gene UARTs.
- + */
- + if (IS_ENABLED(CONFIG_ARM64) &&
- + !strcmp(acpi_device_hid(device), "APMC0D08"))
- + return false;
- +
- INIT_LIST_HEAD(&resource_list);
- acpi_dev_get_resources(device, &resource_list,
- acpi_check_serial_bus_slave,
- diff --git a/drivers/ata/libahci.c b/drivers/ata/libahci.c
- index f1263364fa97..24ac410f4366 100644
- --- a/drivers/ata/libahci.c
- +++ b/drivers/ata/libahci.c
- @@ -729,6 +729,24 @@ int ahci_stop_engine(struct ata_port *ap)
- tmp &= ~PORT_CMD_START;
- writel(tmp, port_mmio + PORT_CMD);
-
- +#ifdef CONFIG_ARM64
- + /* Rev Ax of Cavium CN99XX needs a hack for port stop */
- + if (dev_is_pci(ap->host->dev) &&
- + to_pci_dev(ap->host->dev)->vendor == 0x14e4 &&
- + to_pci_dev(ap->host->dev)->device == 0x9027 &&
- + midr_is_cpu_model_range(read_cpuid_id(),
- + MIDR_CPU_MODEL(ARM_CPU_IMP_BRCM, BRCM_CPU_PART_VULCAN),
- + MIDR_CPU_VAR_REV(0, 0),
- + MIDR_CPU_VAR_REV(0, MIDR_REVISION_MASK))) {
- + tmp = readl(hpriv->mmio + 0x8000);
- + udelay(100);
- + writel(tmp | (1 << 26), hpriv->mmio + 0x8000);
- + udelay(100);
- + writel(tmp & ~(1 << 26), hpriv->mmio + 0x8000);
- + dev_warn(ap->host->dev, "CN99XX SATA reset workaround applied\n");
- + }
- +#endif
- +
- /* wait for engine to stop. This could be as long as 500 msec */
- tmp = ata_wait_register(ap, port_mmio + PORT_CMD,
- PORT_CMD_LIST_ON, PORT_CMD_LIST_ON, 1, 500);
- diff --git a/drivers/char/ipmi/ipmi_dmi.c b/drivers/char/ipmi/ipmi_dmi.c
- index bbf7029e224b..cf7faa970dd6 100644
- --- a/drivers/char/ipmi/ipmi_dmi.c
- +++ b/drivers/char/ipmi/ipmi_dmi.c
- @@ -215,6 +215,21 @@ static int __init scan_for_dmi_ipmi(void)
- {
- const struct dmi_device *dev = NULL;
-
- +#ifdef CONFIG_ARM64
- + /* RHEL-only
- + * If this is ARM-based HPE m400, return now, because that platform
- + * reports the host-side ipmi address as intel port-io space, which
- + * does not exist in the ARM architecture.
- + */
- + const char *dmistr = dmi_get_system_info(DMI_PRODUCT_NAME);
- +
- + if (dmistr && (strcmp("ProLiant m400 Server", dmistr) == 0)) {
- + pr_debug("%s does not support host ipmi\n", dmistr);
- + return 0;
- + }
- + /* END RHEL-only */
- +#endif
- +
- while ((dev = dmi_find_device(DMI_DEV_TYPE_IPMI, NULL, dev)))
- dmi_decode_ipmi((const struct dmi_header *) dev->device_data);
-
- diff --git a/drivers/char/ipmi/ipmi_msghandler.c b/drivers/char/ipmi/ipmi_msghandler.c
- index 186f1fee7534..93e3a76596ff 100644
- --- a/drivers/char/ipmi/ipmi_msghandler.c
- +++ b/drivers/char/ipmi/ipmi_msghandler.c
- @@ -35,6 +35,7 @@
- #include <linux/uuid.h>
- #include <linux/nospec.h>
- #include <linux/vmalloc.h>
- +#include <linux/dmi.h>
- #include <linux/delay.h>
-
- #define IPMI_DRIVER_VERSION "39.2"
- @@ -5516,8 +5517,21 @@ static int __init ipmi_init_msghandler_mod(void)
- {
- int rv;
-
- - pr_info("version " IPMI_DRIVER_VERSION "\n");
- +#ifdef CONFIG_ARM64
- + /* RHEL-only
- + * If this is ARM-based HPE m400, return now, because that platform
- + * reports the host-side ipmi address as intel port-io space, which
- + * does not exist in the ARM architecture.
- + */
- + const char *dmistr = dmi_get_system_info(DMI_PRODUCT_NAME);
-
- + if (dmistr && (strcmp("ProLiant m400 Server", dmistr) == 0)) {
- + pr_debug("%s does not support host ipmi\n", dmistr);
- + return -ENOSYS;
- + }
- + /* END RHEL-only */
- +#endif
- + pr_info("version " IPMI_DRIVER_VERSION "\n");
- mutex_lock(&ipmi_interfaces_mutex);
- rv = ipmi_register_driver();
- mutex_unlock(&ipmi_interfaces_mutex);
- diff --git a/drivers/firmware/efi/Makefile b/drivers/firmware/efi/Makefile
- index e489fefd23da..f2dfae764fb5 100644
- --- a/drivers/firmware/efi/Makefile
- +++ b/drivers/firmware/efi/Makefile
- @@ -25,6 +25,7 @@ subdir-$(CONFIG_EFI_STUB) += libstub
- obj-$(CONFIG_EFI_BOOTLOADER_CONTROL) += efibc.o
- obj-$(CONFIG_EFI_TEST) += test/
- obj-$(CONFIG_EFI_DEV_PATH_PARSER) += dev-path-parser.o
- +obj-$(CONFIG_EFI) += secureboot.o
- obj-$(CONFIG_APPLE_PROPERTIES) += apple-properties.o
- obj-$(CONFIG_EFI_RCI2_TABLE) += rci2-table.o
- obj-$(CONFIG_EFI_EMBEDDED_FIRMWARE) += embedded-firmware.o
- diff --git a/drivers/firmware/efi/efi.c b/drivers/firmware/efi/efi.c
- index 2c1095dcc2f2..7ea6012e3ef4 100644
- --- a/drivers/firmware/efi/efi.c
- +++ b/drivers/firmware/efi/efi.c
- @@ -32,6 +32,7 @@
- #include <linux/ucs2_string.h>
- #include <linux/memblock.h>
- #include <linux/security.h>
- +#include <linux/bsearch.h>
-
- #include <asm/early_ioremap.h>
-
- @@ -985,40 +986,101 @@ int efi_mem_type(unsigned long phys_addr)
- }
- #endif
-
- +struct efi_error_code {
- + efi_status_t status;
- + int errno;
- + const char *description;
- +};
- +
- +static const struct efi_error_code efi_error_codes[] = {
- + { EFI_SUCCESS, 0, "Success"},
- +#if 0
- + { EFI_LOAD_ERROR, -EPICK_AN_ERRNO, "Load Error"},
- +#endif
- + { EFI_INVALID_PARAMETER, -EINVAL, "Invalid Parameter"},
- + { EFI_UNSUPPORTED, -ENOSYS, "Unsupported"},
- + { EFI_BAD_BUFFER_SIZE, -ENOSPC, "Bad Buffer Size"},
- + { EFI_BUFFER_TOO_SMALL, -ENOSPC, "Buffer Too Small"},
- + { EFI_NOT_READY, -EAGAIN, "Not Ready"},
- + { EFI_DEVICE_ERROR, -EIO, "Device Error"},
- + { EFI_WRITE_PROTECTED, -EROFS, "Write Protected"},
- + { EFI_OUT_OF_RESOURCES, -ENOMEM, "Out of Resources"},
- +#if 0
- + { EFI_VOLUME_CORRUPTED, -EPICK_AN_ERRNO, "Volume Corrupt"},
- + { EFI_VOLUME_FULL, -EPICK_AN_ERRNO, "Volume Full"},
- + { EFI_NO_MEDIA, -EPICK_AN_ERRNO, "No Media"},
- + { EFI_MEDIA_CHANGED, -EPICK_AN_ERRNO, "Media changed"},
- +#endif
- + { EFI_NOT_FOUND, -ENOENT, "Not Found"},
- +#if 0
- + { EFI_ACCESS_DENIED, -EPICK_AN_ERRNO, "Access Denied"},
- + { EFI_NO_RESPONSE, -EPICK_AN_ERRNO, "No Response"},
- + { EFI_NO_MAPPING, -EPICK_AN_ERRNO, "No mapping"},
- + { EFI_TIMEOUT, -EPICK_AN_ERRNO, "Time out"},
- + { EFI_NOT_STARTED, -EPICK_AN_ERRNO, "Not started"},
- + { EFI_ALREADY_STARTED, -EPICK_AN_ERRNO, "Already started"},
- +#endif
- + { EFI_ABORTED, -EINTR, "Aborted"},
- +#if 0
- + { EFI_ICMP_ERROR, -EPICK_AN_ERRNO, "ICMP Error"},
- + { EFI_TFTP_ERROR, -EPICK_AN_ERRNO, "TFTP Error"},
- + { EFI_PROTOCOL_ERROR, -EPICK_AN_ERRNO, "Protocol Error"},
- + { EFI_INCOMPATIBLE_VERSION, -EPICK_AN_ERRNO, "Incompatible Version"},
- +#endif
- + { EFI_SECURITY_VIOLATION, -EACCES, "Security Policy Violation"},
- +#if 0
- + { EFI_CRC_ERROR, -EPICK_AN_ERRNO, "CRC Error"},
- + { EFI_END_OF_MEDIA, -EPICK_AN_ERRNO, "End of Media"},
- + { EFI_END_OF_FILE, -EPICK_AN_ERRNO, "End of File"},
- + { EFI_INVALID_LANGUAGE, -EPICK_AN_ERRNO, "Invalid Languages"},
- + { EFI_COMPROMISED_DATA, -EPICK_AN_ERRNO, "Compromised Data"},
- +
- + // warnings
- + { EFI_WARN_UNKOWN_GLYPH, -EPICK_AN_ERRNO, "Warning Unknown Glyph"},
- + { EFI_WARN_DELETE_FAILURE, -EPICK_AN_ERRNO, "Warning Delete Failure"},
- + { EFI_WARN_WRITE_FAILURE, -EPICK_AN_ERRNO, "Warning Write Failure"},
- + { EFI_WARN_BUFFER_TOO_SMALL, -EPICK_AN_ERRNO, "Warning Buffer Too Small"},
- +#endif
- +};
- +
- +static int
- +efi_status_cmp_bsearch(const void *key, const void *item)
- +{
- + u64 status = (u64)(uintptr_t)key;
- + struct efi_error_code *code = (struct efi_error_code *)item;
- +
- + if (status < code->status)
- + return -1;
- + if (status > code->status)
- + return 1;
- + return 0;
- +}
- +
- int efi_status_to_err(efi_status_t status)
- {
- - int err;
- -
- - switch (status) {
- - case EFI_SUCCESS:
- - err = 0;
- - break;
- - case EFI_INVALID_PARAMETER:
- - err = -EINVAL;
- - break;
- - case EFI_OUT_OF_RESOURCES:
- - err = -ENOSPC;
- - break;
- - case EFI_DEVICE_ERROR:
- - err = -EIO;
- - break;
- - case EFI_WRITE_PROTECTED:
- - err = -EROFS;
- - break;
- - case EFI_SECURITY_VIOLATION:
- - err = -EACCES;
- - break;
- - case EFI_NOT_FOUND:
- - err = -ENOENT;
- - break;
- - case EFI_ABORTED:
- - err = -EINTR;
- - break;
- - default:
- - err = -EINVAL;
- - }
- + struct efi_error_code *found;
- + size_t num = sizeof(efi_error_codes) / sizeof(struct efi_error_code);
-
- - return err;
- + found = bsearch((void *)(uintptr_t)status, efi_error_codes,
- + sizeof(struct efi_error_code), num,
- + efi_status_cmp_bsearch);
- + if (!found)
- + return -EINVAL;
- + return found->errno;
- +}
- +
- +const char *
- +efi_status_to_str(efi_status_t status)
- +{
- + struct efi_error_code *found;
- + size_t num = sizeof(efi_error_codes) / sizeof(struct efi_error_code);
- +
- + found = bsearch((void *)(uintptr_t)status, efi_error_codes,
- + sizeof(struct efi_error_code), num,
- + efi_status_cmp_bsearch);
- + if (!found)
- + return "Unknown error code";
- + return found->description;
- }
- EXPORT_SYMBOL_GPL(efi_status_to_err);
-
- diff --git a/drivers/firmware/efi/secureboot.c b/drivers/firmware/efi/secureboot.c
- new file mode 100644
- index 000000000000..de0a3714a5d4
- --- /dev/null
- +++ b/drivers/firmware/efi/secureboot.c
- @@ -0,0 +1,38 @@
- +/* Core kernel secure boot support.
- + *
- + * Copyright (C) 2017 Red Hat, Inc. All Rights Reserved.
- + * Written by David Howells ([email protected])
- + *
- + * This program is free software; you can redistribute it and/or
- + * modify it under the terms of the GNU General Public Licence
- + * as published by the Free Software Foundation; either version
- + * 2 of the Licence, or (at your option) any later version.
- + */
- +
- +#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
- +
- +#include <linux/efi.h>
- +#include <linux/kernel.h>
- +#include <linux/printk.h>
- +
- +/*
- + * Decide what to do when UEFI secure boot mode is enabled.
- + */
- +void __init efi_set_secure_boot(enum efi_secureboot_mode mode)
- +{
- + if (efi_enabled(EFI_BOOT)) {
- + switch (mode) {
- + case efi_secureboot_mode_disabled:
- + pr_info("Secure boot disabled\n");
- + break;
- + case efi_secureboot_mode_enabled:
- + set_bit(EFI_SECURE_BOOT, &efi.flags);
- + pr_info("Secure boot enabled\n");
- + break;
- + default:
- + pr_warn("Secure boot could not be determined (mode %u)\n",
- + mode);
- + break;
- + }
- + }
- +}
- diff --git a/drivers/firmware/sysfb.c b/drivers/firmware/sysfb.c
- index defd7a36cb08..09146688cb35 100644
- --- a/drivers/firmware/sysfb.c
- +++ b/drivers/firmware/sysfb.c
- @@ -34,6 +34,22 @@
- #include <linux/screen_info.h>
- #include <linux/sysfb.h>
-
- +static int skip_simpledrm;
- +
- +static int __init simpledrm_disable(char *opt)
- +{
- + if (!opt)
- + return -EINVAL;
- +
- + get_option(&opt, &skip_simpledrm);
- +
- + if (skip_simpledrm)
- + pr_info("The simpledrm driver will not be probed\n");
- +
- + return 0;
- +}
- +early_param("nvidia-drm.modeset", simpledrm_disable);
- +
- static struct platform_device *pd;
- static DEFINE_MUTEX(disable_lock);
- static bool disabled;
- @@ -87,7 +103,7 @@ static __init int sysfb_init(void)
-
- /* try to create a simple-framebuffer device */
- compatible = sysfb_parse_mode(si, &mode);
- - if (compatible) {
- + if (compatible && !skip_simpledrm) {
- pd = sysfb_create_simplefb(si, &mode);
- if (!IS_ERR(pd))
- goto unlock_mutex;
- diff --git a/drivers/hid/hid-rmi.c b/drivers/hid/hid-rmi.c
- index 84e7ba5314d3..efc96776f761 100644
- --- a/drivers/hid/hid-rmi.c
- +++ b/drivers/hid/hid-rmi.c
- @@ -321,21 +321,12 @@ static int rmi_input_event(struct hid_device *hdev, u8 *data, int size)
- {
- struct rmi_data *hdata = hid_get_drvdata(hdev);
- struct rmi_device *rmi_dev = hdata->xport.rmi_dev;
- - unsigned long flags;
-
- if (!(test_bit(RMI_STARTED, &hdata->flags)))
- return 0;
-
- - pm_wakeup_event(hdev->dev.parent, 0);
- -
- - local_irq_save(flags);
- -
- rmi_set_attn_data(rmi_dev, data[1], &data[2], size - 2);
-
- - generic_handle_irq(hdata->rmi_irq);
- -
- - local_irq_restore(flags);
- -
- return 1;
- }
-
- @@ -591,56 +582,6 @@ static const struct rmi_transport_ops hid_rmi_ops = {
- .reset = rmi_hid_reset,
- };
-
- -static void rmi_irq_teardown(void *data)
- -{
- - struct rmi_data *hdata = data;
- - struct irq_domain *domain = hdata->domain;
- -
- - if (!domain)
- - return;
- -
- - irq_dispose_mapping(irq_find_mapping(domain, 0));
- -
- - irq_domain_remove(domain);
- - hdata->domain = NULL;
- - hdata->rmi_irq = 0;
- -}
- -
- -static int rmi_irq_map(struct irq_domain *h, unsigned int virq,
- - irq_hw_number_t hw_irq_num)
- -{
- - irq_set_chip_and_handler(virq, &dummy_irq_chip, handle_simple_irq);
- -
- - return 0;
- -}
- -
- -static const struct irq_domain_ops rmi_irq_ops = {
- - .map = rmi_irq_map,
- -};
- -
- -static int rmi_setup_irq_domain(struct hid_device *hdev)
- -{
- - struct rmi_data *hdata = hid_get_drvdata(hdev);
- - int ret;
- -
- - hdata->domain = irq_domain_create_linear(hdev->dev.fwnode, 1,
- - &rmi_irq_ops, hdata);
- - if (!hdata->domain)
- - return -ENOMEM;
- -
- - ret = devm_add_action_or_reset(&hdev->dev, &rmi_irq_teardown, hdata);
- - if (ret)
- - return ret;
- -
- - hdata->rmi_irq = irq_create_mapping(hdata->domain, 0);
- - if (hdata->rmi_irq <= 0) {
- - hid_err(hdev, "Can't allocate an IRQ\n");
- - return hdata->rmi_irq < 0 ? hdata->rmi_irq : -ENXIO;
- - }
- -
- - return 0;
- -}
- -
- static int rmi_probe(struct hid_device *hdev, const struct hid_device_id *id)
- {
- struct rmi_data *data = NULL;
- @@ -713,18 +654,11 @@ static int rmi_probe(struct hid_device *hdev, const struct hid_device_id *id)
-
- mutex_init(&data->page_mutex);
-
- - ret = rmi_setup_irq_domain(hdev);
- - if (ret) {
- - hid_err(hdev, "failed to allocate IRQ domain\n");
- - return ret;
- - }
- -
- if (data->device_flags & RMI_DEVICE_HAS_PHYS_BUTTONS)
- rmi_hid_pdata.gpio_data.disable = true;
-
- data->xport.dev = hdev->dev.parent;
- data->xport.pdata = rmi_hid_pdata;
- - data->xport.pdata.irq = data->rmi_irq;
- data->xport.proto_name = "hid";
- data->xport.ops = &hid_rmi_ops;
-
- diff --git a/drivers/hwtracing/coresight/coresight-etm4x-core.c b/drivers/hwtracing/coresight/coresight-etm4x-core.c
- index 840e4cccf8c4..a214d6c51f69 100644
- --- a/drivers/hwtracing/coresight/coresight-etm4x-core.c
- +++ b/drivers/hwtracing/coresight/coresight-etm4x-core.c
- @@ -10,6 +10,7 @@
- #include <linux/init.h>
- #include <linux/types.h>
- #include <linux/device.h>
- +#include <linux/dmi.h>
- #include <linux/io.h>
- #include <linux/err.h>
- #include <linux/fs.h>
- @@ -2308,6 +2309,16 @@ static const struct amba_id etm4_ids[] = {
- {},
- };
-
- +static const struct dmi_system_id broken_coresight[] = {
- + {
- + .matches = {
- + DMI_MATCH(DMI_SYS_VENDOR, "HPE"),
- + DMI_MATCH(DMI_PRODUCT_NAME, "Apollo 70"),
- + },
- + },
- + { } /* terminating entry */
- +};
- +
- MODULE_DEVICE_TABLE(amba, etm4_ids);
-
- static struct amba_driver etm4x_amba_driver = {
- @@ -2377,6 +2388,11 @@ static int __init etm4x_init(void)
- {
- int ret;
-
- + if (dmi_check_system(broken_coresight)) {
- + pr_info("ETM4 disabled due to firmware bug\n");
- + return 0;
- + }
- +
- ret = etm4_pm_setup();
-
- /* etm4_pm_setup() does its own cleanup - exit on error */
- @@ -2403,6 +2419,9 @@ static int __init etm4x_init(void)
-
- static void __exit etm4x_exit(void)
- {
- + if (dmi_check_system(broken_coresight))
- + return;
- +
- amba_driver_unregister(&etm4x_amba_driver);
- platform_driver_unregister(&etm4_platform_driver);
- etm4_pm_clear();
- diff --git a/drivers/input/rmi4/rmi_driver.c b/drivers/input/rmi4/rmi_driver.c
- index ef9ea295f9e0..0103334e8f32 100644
- --- a/drivers/input/rmi4/rmi_driver.c
- +++ b/drivers/input/rmi4/rmi_driver.c
- @@ -182,34 +182,47 @@ void rmi_set_attn_data(struct rmi_device *rmi_dev, unsigned long irq_status,
- attn_data.data = fifo_data;
-
- kfifo_put(&drvdata->attn_fifo, attn_data);
- +
- + schedule_work(&drvdata->attn_work);
- }
- EXPORT_SYMBOL_GPL(rmi_set_attn_data);
-
- -static irqreturn_t rmi_irq_fn(int irq, void *dev_id)
- +static void attn_callback(struct work_struct *work)
- {
- - struct rmi_device *rmi_dev = dev_id;
- - struct rmi_driver_data *drvdata = dev_get_drvdata(&rmi_dev->dev);
- + struct rmi_driver_data *drvdata = container_of(work,
- + struct rmi_driver_data,
- + attn_work);
- struct rmi4_attn_data attn_data = {0};
- int ret, count;
-
- count = kfifo_get(&drvdata->attn_fifo, &attn_data);
- - if (count) {
- - *(drvdata->irq_status) = attn_data.irq_status;
- - drvdata->attn_data = attn_data;
- - }
- + if (!count)
- + return;
-
- - ret = rmi_process_interrupt_requests(rmi_dev);
- + *(drvdata->irq_status) = attn_data.irq_status;
- + drvdata->attn_data = attn_data;
- +
- + ret = rmi_process_interrupt_requests(drvdata->rmi_dev);
- if (ret)
- - rmi_dbg(RMI_DEBUG_CORE, &rmi_dev->dev,
- + rmi_dbg(RMI_DEBUG_CORE, &drvdata->rmi_dev->dev,
- "Failed to process interrupt request: %d\n", ret);
-
- - if (count) {
- - kfree(attn_data.data);
- - drvdata->attn_data.data = NULL;
- - }
- + kfree(attn_data.data);
- + drvdata->attn_data.data = NULL;
-
- if (!kfifo_is_empty(&drvdata->attn_fifo))
- - return rmi_irq_fn(irq, dev_id);
- + schedule_work(&drvdata->attn_work);
- +}
- +
- +static irqreturn_t rmi_irq_fn(int irq, void *dev_id)
- +{
- + struct rmi_device *rmi_dev = dev_id;
- + int ret;
- +
- + ret = rmi_process_interrupt_requests(rmi_dev);
- + if (ret)
- + rmi_dbg(RMI_DEBUG_CORE, &rmi_dev->dev,
- + "Failed to process interrupt request: %d\n", ret);
-
- return IRQ_HANDLED;
- }
- @@ -217,7 +230,6 @@ static irqreturn_t rmi_irq_fn(int irq, void *dev_id)
- static int rmi_irq_init(struct rmi_device *rmi_dev)
- {
- struct rmi_device_platform_data *pdata = rmi_get_platform_data(rmi_dev);
- - struct rmi_driver_data *data = dev_get_drvdata(&rmi_dev->dev);
- int irq_flags = irq_get_trigger_type(pdata->irq);
- int ret;
-
- @@ -235,8 +247,6 @@ static int rmi_irq_init(struct rmi_device *rmi_dev)
- return ret;
- }
-
- - data->enabled = true;
- -
- return 0;
- }
-
- @@ -886,23 +896,27 @@ void rmi_enable_irq(struct rmi_device *rmi_dev, bool clear_wake)
- if (data->enabled)
- goto out;
-
- - enable_irq(irq);
- - data->enabled = true;
- - if (clear_wake && device_may_wakeup(rmi_dev->xport->dev)) {
- - retval = disable_irq_wake(irq);
- - if (retval)
- - dev_warn(&rmi_dev->dev,
- - "Failed to disable irq for wake: %d\n",
- - retval);
- - }
- + if (irq) {
- + enable_irq(irq);
- + data->enabled = true;
- + if (clear_wake && device_may_wakeup(rmi_dev->xport->dev)) {
- + retval = disable_irq_wake(irq);
- + if (retval)
- + dev_warn(&rmi_dev->dev,
- + "Failed to disable irq for wake: %d\n",
- + retval);
- + }
-
- - /*
- - * Call rmi_process_interrupt_requests() after enabling irq,
- - * otherwise we may lose interrupt on edge-triggered systems.
- - */
- - irq_flags = irq_get_trigger_type(pdata->irq);
- - if (irq_flags & IRQ_TYPE_EDGE_BOTH)
- - rmi_process_interrupt_requests(rmi_dev);
- + /*
- + * Call rmi_process_interrupt_requests() after enabling irq,
- + * otherwise we may lose interrupt on edge-triggered systems.
- + */
- + irq_flags = irq_get_trigger_type(pdata->irq);
- + if (irq_flags & IRQ_TYPE_EDGE_BOTH)
- + rmi_process_interrupt_requests(rmi_dev);
- + } else {
- + data->enabled = true;
- + }
-
- out:
- mutex_unlock(&data->enabled_mutex);
- @@ -922,20 +936,22 @@ void rmi_disable_irq(struct rmi_device *rmi_dev, bool enable_wake)
- goto out;
-
- data->enabled = false;
- - disable_irq(irq);
- - if (enable_wake && device_may_wakeup(rmi_dev->xport->dev)) {
- - retval = enable_irq_wake(irq);
- - if (retval)
- - dev_warn(&rmi_dev->dev,
- - "Failed to enable irq for wake: %d\n",
- - retval);
- - }
- -
- - /* make sure the fifo is clean */
- - while (!kfifo_is_empty(&data->attn_fifo)) {
- - count = kfifo_get(&data->attn_fifo, &attn_data);
- - if (count)
- - kfree(attn_data.data);
- + if (irq) {
- + disable_irq(irq);
- + if (enable_wake && device_may_wakeup(rmi_dev->xport->dev)) {
- + retval = enable_irq_wake(irq);
- + if (retval)
- + dev_warn(&rmi_dev->dev,
- + "Failed to enable irq for wake: %d\n",
- + retval);
- + }
- + } else {
- + /* make sure the fifo is clean */
- + while (!kfifo_is_empty(&data->attn_fifo)) {
- + count = kfifo_get(&data->attn_fifo, &attn_data);
- + if (count)
- + kfree(attn_data.data);
- + }
- }
-
- out:
- @@ -978,6 +994,8 @@ static int rmi_driver_remove(struct device *dev)
-
- rmi_disable_irq(rmi_dev, false);
-
- + cancel_work_sync(&data->attn_work);
- +
- rmi_f34_remove_sysfs(rmi_dev);
- rmi_free_function_list(rmi_dev);
-
- @@ -1223,9 +1241,15 @@ static int rmi_driver_probe(struct device *dev)
- }
- }
-
- - retval = rmi_irq_init(rmi_dev);
- - if (retval < 0)
- - goto err_destroy_functions;
- + if (pdata->irq) {
- + retval = rmi_irq_init(rmi_dev);
- + if (retval < 0)
- + goto err_destroy_functions;
- + }
- +
- + data->enabled = true;
- +
- + INIT_WORK(&data->attn_work, attn_callback);
-
- if (data->f01_container->dev.driver) {
- /* Driver already bound, so enable ATTN now. */
- diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c
- index 3f1029c0825e..c64bb71e8deb 100644
- --- a/drivers/iommu/iommu.c
- +++ b/drivers/iommu/iommu.c
- @@ -8,6 +8,7 @@
-
- #include <linux/amba/bus.h>
- #include <linux/device.h>
- +#include <linux/dmi.h>
- #include <linux/kernel.h>
- #include <linux/bits.h>
- #include <linux/bug.h>
- @@ -2931,6 +2932,27 @@ int iommu_dev_disable_feature(struct device *dev, enum iommu_dev_features feat)
- }
- EXPORT_SYMBOL_GPL(iommu_dev_disable_feature);
-
- +#ifdef CONFIG_ARM64
- +static int __init iommu_quirks(void)
- +{
- + const char *vendor, *name;
- +
- + vendor = dmi_get_system_info(DMI_SYS_VENDOR);
- + name = dmi_get_system_info(DMI_PRODUCT_NAME);
- +
- + if (vendor &&
- + (strncmp(vendor, "GIGABYTE", 8) == 0 && name &&
- + (strncmp(name, "R120", 4) == 0 ||
- + strncmp(name, "R270", 4) == 0))) {
- + pr_warn("Gigabyte %s detected, force iommu passthrough mode", name);
- + iommu_def_domain_type = IOMMU_DOMAIN_IDENTITY;
- + }
- +
- + return 0;
- +}
- +arch_initcall(iommu_quirks);
- +#endif
- +
- /**
- * iommu_setup_default_domain - Set the default_domain for the group
- * @group: Group to change
- diff --git a/drivers/pci/quirks.c b/drivers/pci/quirks.c
- index 54061b65a2b7..a047c060fb78 100644
- --- a/drivers/pci/quirks.c
- +++ b/drivers/pci/quirks.c
- @@ -4445,6 +4445,30 @@ DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_BROADCOM, 0x9000,
- DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_BROADCOM, 0x9084,
- quirk_bridge_cavm_thrx2_pcie_root);
-
- +/*
- + * PCI BAR 5 is not setup correctly for the on-board AHCI controller
- + * on Broadcom's Vulcan processor. Added a quirk to fix BAR 5 by
- + * using BAR 4's resources which are populated correctly and NOT
- + * actually used by the AHCI controller.
- + */
- +static void quirk_fix_vulcan_ahci_bars(struct pci_dev *dev)
- +{
- + struct resource *r = &dev->resource[4];
- +
- + if (!(r->flags & IORESOURCE_MEM) || (r->start == 0))
- + return;
- +
- + /* Set BAR5 resource to BAR4 */
- + dev->resource[5] = *r;
- +
- + /* Update BAR5 in pci config space */
- + pci_write_config_dword(dev, PCI_BASE_ADDRESS_5, r->start);
- +
- + /* Clear BAR4's resource */
- + memset(r, 0, sizeof(*r));
- +}
- +DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_BROADCOM, 0x9027, quirk_fix_vulcan_ahci_bars);
- +
- /*
- * Intersil/Techwell TW686[4589]-based video capture cards have an empty (zero)
- * class code. Fix it.
- diff --git a/drivers/scsi/sd.c b/drivers/scsi/sd.c
- index 2c627deedc1f..7fbfe4fb790a 100644
- --- a/drivers/scsi/sd.c
- +++ b/drivers/scsi/sd.c
- @@ -118,6 +118,14 @@ static const char *sd_cache_types[] = {
- "write back, no read (daft)"
- };
-
- +static const char *sd_probe_types[] = { "async", "sync" };
- +
- +static char sd_probe_type[6] = "async";
- +module_param_string(probe, sd_probe_type, sizeof(sd_probe_type),
- + S_IRUGO|S_IWUSR);
- +MODULE_PARM_DESC(probe, "async or sync. Setting to 'sync' disables asynchronous "
- + "device number assignments (sda, sdb, ...).");
- +
- static void sd_set_flush_flag(struct scsi_disk *sdkp)
- {
- bool wc = false, fua = false;
- @@ -4090,6 +4098,8 @@ static int __init init_sd(void)
- goto err_out_class;
- }
-
- + if (!strcmp(sd_probe_type, "sync"))
- + sd_template.gendrv.probe_type = PROBE_FORCE_SYNCHRONOUS;
- err = scsi_register_driver(&sd_template.gendrv);
- if (err)
- goto err_out_driver;
- diff --git a/include/linux/efi.h b/include/linux/efi.h
- index 80b21d1c6eaf..b66c0683f2fc 100644
- --- a/include/linux/efi.h
- +++ b/include/linux/efi.h
- @@ -44,6 +44,8 @@ struct screen_info;
- #define EFI_ABORTED (21 | (1UL << (BITS_PER_LONG-1)))
- #define EFI_SECURITY_VIOLATION (26 | (1UL << (BITS_PER_LONG-1)))
-
- +#define EFI_IS_ERROR(x) ((x) & (1UL << (BITS_PER_LONG-1)))
- +
- typedef unsigned long efi_status_t;
- typedef u8 efi_bool_t;
- typedef u16 efi_char16_t; /* UNICODE character */
- @@ -871,6 +873,14 @@ extern int __init efi_setup_pcdp_console(char *);
- #define EFI_MEM_ATTR 10 /* Did firmware publish an EFI_MEMORY_ATTRIBUTES table? */
- #define EFI_MEM_NO_SOFT_RESERVE 11 /* Is the kernel configured to ignore soft reservations? */
- #define EFI_PRESERVE_BS_REGIONS 12 /* Are EFI boot-services memory segments available? */
- +#define EFI_SECURE_BOOT 13 /* Are we in Secure Boot mode? */
- +
- +enum efi_secureboot_mode {
- + efi_secureboot_mode_unset,
- + efi_secureboot_mode_unknown,
- + efi_secureboot_mode_disabled,
- + efi_secureboot_mode_enabled,
- +};
-
- #ifdef CONFIG_EFI
- /*
- @@ -882,6 +892,8 @@ static inline bool efi_enabled(int feature)
- }
- extern void efi_reboot(enum reboot_mode reboot_mode, const char *__unused);
-
- +extern void __init efi_set_secure_boot(enum efi_secureboot_mode mode);
- +
- bool __pure __efi_soft_reserve_enabled(void);
-
- static inline bool __pure efi_soft_reserve_enabled(void)
- @@ -903,6 +915,8 @@ static inline bool efi_enabled(int feature)
- static inline void
- efi_reboot(enum reboot_mode reboot_mode, const char *__unused) {}
-
- +static inline void efi_set_secure_boot(enum efi_secureboot_mode mode) {}
- +
- static inline bool efi_soft_reserve_enabled(void)
- {
- return false;
- @@ -917,6 +931,7 @@ static inline void efi_find_mirror(void) {}
- #endif
-
- extern int efi_status_to_err(efi_status_t status);
- +extern const char *efi_status_to_str(efi_status_t status);
-
- /*
- * Variable Attributes
- @@ -1133,13 +1148,6 @@ static inline bool efi_runtime_disabled(void) { return true; }
- extern void efi_call_virt_check_flags(unsigned long flags, const void *caller);
- extern unsigned long efi_call_virt_save_flags(void);
-
- -enum efi_secureboot_mode {
- - efi_secureboot_mode_unset,
- - efi_secureboot_mode_unknown,
- - efi_secureboot_mode_disabled,
- - efi_secureboot_mode_enabled,
- -};
- -
- static inline
- enum efi_secureboot_mode efi_get_secureboot_mode(efi_get_variable_t *get_var)
- {
- diff --git a/include/linux/lsm_hook_defs.h b/include/linux/lsm_hook_defs.h
- index 2923754c13bc..c374e00db283 100644
- --- a/include/linux/lsm_hook_defs.h
- +++ b/include/linux/lsm_hook_defs.h
- @@ -407,6 +407,8 @@ LSM_HOOK(void, LSM_RET_VOID, bpf_prog_free_security, struct bpf_prog_aux *aux)
- #endif /* CONFIG_BPF_SYSCALL */
-
- LSM_HOOK(int, 0, locked_down, enum lockdown_reason what)
- +LSM_HOOK(int, 0, lock_kernel_down, const char *where, enum lockdown_reason level)
- +
-
- #ifdef CONFIG_PERF_EVENTS
- LSM_HOOK(int, 0, perf_event_open, struct perf_event_attr *attr, int type)
- diff --git a/include/linux/module.h b/include/linux/module.h
- index a98e188cf37b..2eef4246c2c9 100644
- --- a/include/linux/module.h
- +++ b/include/linux/module.h
- @@ -418,6 +418,7 @@ struct module {
- struct module_attribute *modinfo_attrs;
- const char *version;
- const char *srcversion;
- + const char *rhelversion;
- struct kobject *holders_dir;
-
- /* Exported symbols */
- diff --git a/include/linux/rh_kabi.h b/include/linux/rh_kabi.h
- new file mode 100644
- index 000000000000..e0d3353802bb
- --- /dev/null
- +++ b/include/linux/rh_kabi.h
- @@ -0,0 +1,172 @@
- +/*
- + * rh_kabi.h - Red Hat kABI abstraction header
- + *
- + * Copyright (c) 2014 Don Zickus
- + * Copyright (c) 2015-2017 Jiri Benc
- + * Copyright (c) 2015 Sabrina Dubroca, Hannes Frederic Sowa
- + * Copyright (c) 2016-2018 Prarit Bhargava
- + * Copyright (c) 2017 Paolo Abeni, Larry Woodman
- + *
- + * This file is released under the GPLv2.
- + * See the file COPYING for more details.
- + *
- + * These kabi macros hide the changes from the kabi checker and from the
- + * process that computes the exported symbols' checksums.
- + * They have 2 variants: one (defined under __GENKSYMS__) used when
- + * generating the checksums, and the other used when building the kernel's
- + * binaries.
- + *
- + * The use of these macros does not guarantee that the usage and modification
- + * of code is correct. As with all Red Hat only changes, an engineer must
- + * explain why the use of the macro is valid in the patch containing the
- + * changes.
- + *
- + */
- +
- +#ifndef _LINUX_RH_KABI_H
- +#define _LINUX_RH_KABI_H
- +
- +#include <linux/compiler.h>
- +#include <linux/stringify.h>
- +
- +/*
- + * RH_KABI_CONST
- + * Adds a new const modifier to a function parameter preserving the old
- + * checksum.
- + *
- + * RH_KABI_DEPRECATE
- + * Mark the element as deprecated and make it unusable by modules while
- + * preserving kABI checksums.
- + *
- + * RH_KABI_DEPRECATE_FN
- + * Mark the function pointer as deprecated and make it unusable by modules
- + * while preserving kABI checksums.
- + *
- + * RH_KABI_EXTEND
- + * Simple macro for adding a new element to a struct.
- + *
- + * Warning: only use if a hole exists for _all_ arches. Use pahole to verify.
- + *
- + * RH_KABI_FILL_HOLE
- + * Simple macro for filling a hole in a struct.
- + *
- + * RH_KABI_RENAME
- + * Simple macro for renaming an element without changing its type. This
- + * macro can be used in bitfields, for example.
- + *
- + * NOTE: does not include the final ';'
- + *
- + * RH_KABI_REPLACE
- + * Simple replacement of _orig with a union of _orig and _new.
- + *
- + * The RH_KABI_REPLACE* macros attempt to add the ability to use the '_new'
- + * element while preserving size alignment with the '_orig' element.
- + *
- + * The #ifdef __GENKSYMS__ preserves the kABI agreement, while the anonymous
- + * union structure preserves the size alignment (assuming the '_new' element
- + * is not bigger than the '_orig' element).
- + *
- + * RH_KABI_REPLACE_UNSAFE
- + * Unsafe version of RH_KABI_REPLACE. Only use for typedefs.
- + *
- + * RH_KABI_FORCE_CHANGE
- + * Force change of the symbol checksum. The argument of the macro is a
- + * version for cases we need to do this more than once.
- + *
- + * This macro does the opposite: it changes the symbol checksum without
- + * actually changing anything about the exported symbol. It is useful for
- + * symbols that are not whitelisted, we're changing them in an
- + * incompatible way and want to prevent 3rd party modules to silently
- + * corrupt memory. Instead, by changing the symbol checksum, such modules
- + * won't be loaded by the kernel. This macro should only be used as a
- + * last resort when all other KABI workarounds have failed.
- + *
- + * NOTE
- + * Don't use ';' after these macros as it messes up the kABI checker by
- + * changing what the resulting token string looks like. Instead let this
- + * macro add the ';' so it can be properly hidden from the kABI checker
- + * (mainly for RH_KABI_EXTEND, but applied to all macros for uniformity).
- + *
- + */
- +#ifdef __GENKSYMS__
- +
- +# define RH_KABI_CONST
- +# define RH_KABI_EXTEND(_new)
- +# define RH_KABI_FILL_HOLE(_new)
- +# define RH_KABI_FORCE_CHANGE(ver) __attribute__((rh_kabi_change ## ver))
- +# define RH_KABI_RENAME(_orig, _new) _orig
- +
- +# define _RH_KABI_DEPRECATE(_type, _orig) _type _orig
- +# define _RH_KABI_DEPRECATE_FN(_type, _orig, _args...) _type (*_orig)(_args)
- +# define _RH_KABI_REPLACE(_orig, _new) _orig
- +# define _RH_KABI_REPLACE_UNSAFE(_orig, _new) _orig
- +
- +#else
- +
- +# define RH_KABI_ALIGN_WARNING ". Disable CONFIG_RH_KABI_SIZE_ALIGN_CHECKS if debugging."
- +
- +# define RH_KABI_CONST const
- +# define RH_KABI_EXTEND(_new) _new;
- +# define RH_KABI_FILL_HOLE(_new) _new;
- +# define RH_KABI_FORCE_CHANGE(ver)
- +# define RH_KABI_RENAME(_orig, _new) _new
- +
- +
- +#if IS_BUILTIN(CONFIG_RH_KABI_SIZE_ALIGN_CHECKS)
- +# define __RH_KABI_CHECK_SIZE_ALIGN(_orig, _new) \
- + union { \
- + _Static_assert(sizeof(struct{_new;}) <= sizeof(struct{_orig;}), \
- + __FILE__ ":" __stringify(__LINE__) ": " __stringify(_new) " is larger than " __stringify(_orig) RH_KABI_ALIGN_WARNING); \
- + _Static_assert(__alignof__(struct{_new;}) <= __alignof__(struct{_orig;}), \
- + __FILE__ ":" __stringify(__LINE__) ": " __stringify(_orig) " is not aligned the same as " __stringify(_new) RH_KABI_ALIGN_WARNING); \
- + }
- +#else
- +# define __RH_KABI_CHECK_SIZE_ALIGN(_orig, _new)
- +#endif
- +
- +# define _RH_KABI_DEPRECATE(_type, _orig) _type rh_reserved_##_orig
- +# define _RH_KABI_DEPRECATE_FN(_type, _orig, _args...) \
- + _type (* rh_reserved_##_orig)(_args)
- +# define _RH_KABI_REPLACE(_orig, _new) \
- + union { \
- + _new; \
- + struct { \
- + _orig; \
- + } __UNIQUE_ID(rh_kabi_hide); \
- + __RH_KABI_CHECK_SIZE_ALIGN(_orig, _new); \
- + }
- +# define _RH_KABI_REPLACE_UNSAFE(_orig, _new) _new
- +
- +#endif /* __GENKSYMS__ */
- +
- +/* semicolon added wrappers for the RH_KABI_REPLACE macros */
- +# define RH_KABI_DEPRECATE(_type, _orig) _RH_KABI_DEPRECATE(_type, _orig);
- +# define RH_KABI_DEPRECATE_FN(_type, _orig, _args...) \
- + _RH_KABI_DEPRECATE_FN(_type, _orig, _args);
- +# define RH_KABI_REPLACE(_orig, _new) _RH_KABI_REPLACE(_orig, _new);
- +# define RH_KABI_REPLACE_UNSAFE(_orig, _new) _RH_KABI_REPLACE_UNSAFE(_orig, _new);
- +/*
- + * Macro for breaking up a random element into two smaller chunks using an
- + * anonymous struct inside an anonymous union.
- + */
- +# define RH_KABI_REPLACE2(orig, _new1, _new2) RH_KABI_REPLACE(orig, struct{ _new1; _new2;})
- +
- +# define RH_KABI_RESERVE(n) _RH_KABI_RESERVE(n);
- +/*
- + * Simple wrappers to replace standard Red Hat reserved elements.
- + */
- +# define RH_KABI_USE(n, _new) RH_KABI_REPLACE(_RH_KABI_RESERVE(n), _new)
- +/*
- + * Macros for breaking up a reserved element into two smaller chunks using
- + * an anonymous struct inside an anonymous union.
- + */
- +# define RH_KABI_USE2(n, _new1, _new2) RH_KABI_REPLACE(_RH_KABI_RESERVE(n), struct{ _new1; _new2; })
- +
- +/*
- + * We tried to standardize on Red Hat reserved names. These wrappers
- + * leverage those common names making it easier to read and find in the
- + * code.
- + */
- +# define _RH_KABI_RESERVE(n) unsigned long rh_reserved##n
- +
- +#endif /* _LINUX_RH_KABI_H */
- diff --git a/include/linux/rmi.h b/include/linux/rmi.h
- index ab7eea01ab42..fff7c5f737fc 100644
- --- a/include/linux/rmi.h
- +++ b/include/linux/rmi.h
- @@ -364,6 +364,7 @@ struct rmi_driver_data {
-
- struct rmi4_attn_data attn_data;
- DECLARE_KFIFO(attn_fifo, struct rmi4_attn_data, 16);
- + struct work_struct attn_work;
- };
-
- int rmi_register_transport_device(struct rmi_transport_dev *xport);
- diff --git a/include/linux/security.h b/include/linux/security.h
- index 4bd0f6fc553e..3214365929b5 100644
- --- a/include/linux/security.h
- +++ b/include/linux/security.h
- @@ -486,6 +486,7 @@ int security_inode_notifysecctx(struct inode *inode, void *ctx, u32 ctxlen);
- int security_inode_setsecctx(struct dentry *dentry, void *ctx, u32 ctxlen);
- int security_inode_getsecctx(struct inode *inode, void **ctx, u32 *ctxlen);
- int security_locked_down(enum lockdown_reason what);
- +int security_lock_kernel_down(const char *where, enum lockdown_reason level);
- #else /* CONFIG_SECURITY */
-
- static inline int call_blocking_lsm_notifier(enum lsm_event event, void *data)
- @@ -1404,6 +1405,10 @@ static inline int security_locked_down(enum lockdown_reason what)
- {
- return 0;
- }
- +static inline int security_lock_kernel_down(const char *where, enum lockdown_reason level)
- +{
- + return 0;
- +}
- #endif /* CONFIG_SECURITY */
-
- #if defined(CONFIG_SECURITY) && defined(CONFIG_WATCH_QUEUE)
- diff --git a/kernel/module/main.c b/kernel/module/main.c
- index b00e31721a73..0f691787fffd 100644
- --- a/kernel/module/main.c
- +++ b/kernel/module/main.c
- @@ -528,6 +528,7 @@ static struct module_attribute modinfo_##field = { \
-
- MODINFO_ATTR(version);
- MODINFO_ATTR(srcversion);
- +MODINFO_ATTR(rhelversion);
-
- static struct {
- char name[MODULE_NAME_LEN + 1];
- @@ -980,6 +981,7 @@ struct module_attribute *modinfo_attrs[] = {
- &module_uevent,
- &modinfo_version,
- &modinfo_srcversion,
- + &modinfo_rhelversion,
- &modinfo_initstate,
- &modinfo_coresize,
- #ifdef CONFIG_ARCH_WANTS_MODULES_DATA_IN_VMALLOC
- diff --git a/kernel/module/signing.c b/kernel/module/signing.c
- index a2ff4242e623..f0d2be1ee4f1 100644
- --- a/kernel/module/signing.c
- +++ b/kernel/module/signing.c
- @@ -61,10 +61,17 @@ int mod_verify_sig(const void *mod, struct load_info *info)
- modlen -= sig_len + sizeof(ms);
- info->len = modlen;
-
- - return verify_pkcs7_signature(mod, modlen, mod + modlen, sig_len,
- + ret = verify_pkcs7_signature(mod, modlen, mod + modlen, sig_len,
- VERIFY_USE_SECONDARY_KEYRING,
- VERIFYING_MODULE_SIGNATURE,
- NULL, NULL);
- + if (ret == -ENOKEY && IS_ENABLED(CONFIG_INTEGRITY_PLATFORM_KEYRING)) {
- + ret = verify_pkcs7_signature(mod, modlen, mod + modlen, sig_len,
- + VERIFY_USE_PLATFORM_KEYRING,
- + VERIFYING_MODULE_SIGNATURE,
- + NULL, NULL);
- + }
- + return ret;
- }
-
- int module_sig_check(struct load_info *info, int flags)
- diff --git a/scripts/tags.sh b/scripts/tags.sh
- index a70d43723146..56d06b04f752 100755
- --- a/scripts/tags.sh
- +++ b/scripts/tags.sh
- @@ -16,6 +16,8 @@ fi
- ignore="$(echo "$RCS_FIND_IGNORE" | sed 's|\\||g' )"
- # tags and cscope files should also ignore MODVERSION *.mod.c files
- ignore="$ignore ( -name *.mod.c ) -prune -o"
- +# RHEL tags and cscope should also ignore redhat/rpm
- +ignore="$ignore ( -path redhat/rpm ) -prune -o"
-
- # ignore arbitrary directories
- if [ -n "${IGNORE_DIRS}" ]; then
- diff --git a/security/integrity/platform_certs/load_uefi.c b/security/integrity/platform_certs/load_uefi.c
- index d1fdd113450a..182e8090cfe8 100644
- --- a/security/integrity/platform_certs/load_uefi.c
- +++ b/security/integrity/platform_certs/load_uefi.c
- @@ -74,7 +74,8 @@ static __init void *get_cert_list(efi_char16_t *name, efi_guid_t *guid,
- return NULL;
-
- if (*status != EFI_BUFFER_TOO_SMALL) {
- - pr_err("Couldn't get size: 0x%lx\n", *status);
- + pr_err("Couldn't get size: %s (0x%lx)\n",
- + efi_status_to_str(*status), *status);
- return NULL;
- }
-
- @@ -85,7 +86,8 @@ static __init void *get_cert_list(efi_char16_t *name, efi_guid_t *guid,
- *status = efi.get_variable(name, guid, NULL, &lsize, db);
- if (*status != EFI_SUCCESS) {
- kfree(db);
- - pr_err("Error reading db var: 0x%lx\n", *status);
- + pr_err("Error reading db var: %s (0x%lx)\n",
- + efi_status_to_str(*status), *status);
- return NULL;
- }
-
- diff --git a/security/lockdown/Kconfig b/security/lockdown/Kconfig
- index e84ddf484010..d0501353a4b9 100644
- --- a/security/lockdown/Kconfig
- +++ b/security/lockdown/Kconfig
- @@ -16,6 +16,19 @@ config SECURITY_LOCKDOWN_LSM_EARLY
- subsystem is fully initialised. If enabled, lockdown will
- unconditionally be called before any other LSMs.
-
- +config LOCK_DOWN_IN_EFI_SECURE_BOOT
- + bool "Lock down the kernel in EFI Secure Boot mode"
- + default n
- + depends on EFI && SECURITY_LOCKDOWN_LSM_EARLY
- + help
- + UEFI Secure Boot provides a mechanism for ensuring that the firmware
- + will only load signed bootloaders and kernels. Secure boot mode may
- + be determined from EFI variables provided by the system firmware if
- + not indicated by the boot parameters.
- +
- + Enabling this option results in kernel lockdown being triggered if
- + EFI Secure Boot is set.
- +
- choice
- prompt "Kernel default lockdown mode"
- default LOCK_DOWN_KERNEL_FORCE_NONE
- diff --git a/security/lockdown/lockdown.c b/security/lockdown/lockdown.c
- index 68d19632aeb7..ef348935b6ff 100644
- --- a/security/lockdown/lockdown.c
- +++ b/security/lockdown/lockdown.c
- @@ -73,6 +73,7 @@ static int lockdown_is_locked_down(enum lockdown_reason what)
-
- static struct security_hook_list lockdown_hooks[] __ro_after_init = {
- LSM_HOOK_INIT(locked_down, lockdown_is_locked_down),
- + LSM_HOOK_INIT(lock_kernel_down, lock_kernel_down),
- };
-
- static int __init lockdown_lsm_init(void)
- diff --git a/security/security.c b/security/security.c
- index b6144833c7a8..48c70c78a1bd 100644
- --- a/security/security.c
- +++ b/security/security.c
- @@ -5285,6 +5285,18 @@ int security_locked_down(enum lockdown_reason what)
- }
- EXPORT_SYMBOL(security_locked_down);
-
- +/**
- + * security_lock_kernel_down() - Put the kernel into lock-down mode.
- + *
- + * @where: Where the lock-down is originating from (e.g. command line option)
- + * @level: The lock-down level (can only increase)
- + */
- +int security_lock_kernel_down(const char *where, enum lockdown_reason level)
- +{
- + return call_int_hook(lock_kernel_down, 0, where, level);
- +}
- +EXPORT_SYMBOL(security_lock_kernel_down);
- +
- #ifdef CONFIG_PERF_EVENTS
- /**
- * security_perf_event_open() - Check if a perf event open is allowed
- diff --git a/sound/pci/hda/cs35l41_hda.c b/sound/pci/hda/cs35l41_hda.c
- index b437beae9b51..b641e5e88a39 100644
- --- a/sound/pci/hda/cs35l41_hda.c
- +++ b/sound/pci/hda/cs35l41_hda.c
- @@ -33,6 +33,9 @@
- #define CAL_AMBIENT_DSP_CTL_NAME "CAL_AMBIENT"
- #define CAL_DSP_CTL_TYPE 5
- #define CAL_DSP_CTL_ALG 205
- +#define CS35L41_UUID "50d90cdc-3de4-4f18-b528-c7fe3b71f40d"
- +#define CS35L41_DSM_GET_MUTE 5
- +#define CS35L41_NOTIFY_EVENT 0x91
-
- static bool firmware_autostart = 1;
- module_param(firmware_autostart, bool, 0444);
- @@ -563,6 +566,31 @@ static void cs35l41_hda_play_start(struct device *dev)
-
- }
-
- +static void cs35l41_mute(struct device *dev, bool mute)
- +{
- + struct cs35l41_hda *cs35l41 = dev_get_drvdata(dev);
- + struct regmap *reg = cs35l41->regmap;
- +
- + dev_dbg(dev, "Mute(%d:%d) Playback Started: %d\n", mute, cs35l41->mute_override,
- + cs35l41->playback_started);
- +
- + if (cs35l41->playback_started) {
- + if (mute || cs35l41->mute_override) {
- + dev_dbg(dev, "Muting\n");
- + regmap_multi_reg_write(reg, cs35l41_hda_mute, ARRAY_SIZE(cs35l41_hda_mute));
- + } else {
- + dev_dbg(dev, "Unmuting\n");
- + if (cs35l41->firmware_running) {
- + regmap_multi_reg_write(reg, cs35l41_hda_unmute_dsp,
- + ARRAY_SIZE(cs35l41_hda_unmute_dsp));
- + } else {
- + regmap_multi_reg_write(reg, cs35l41_hda_unmute,
- + ARRAY_SIZE(cs35l41_hda_unmute));
- + }
- + }
- + }
- +}
- +
- static void cs35l41_hda_play_done(struct device *dev)
- {
- struct cs35l41_hda *cs35l41 = dev_get_drvdata(dev);
- @@ -572,13 +600,7 @@ static void cs35l41_hda_play_done(struct device *dev)
-
- cs35l41_global_enable(dev, reg, cs35l41->hw_cfg.bst_type, 1,
- cs35l41->firmware_running);
- - if (cs35l41->firmware_running) {
- - regmap_multi_reg_write(reg, cs35l41_hda_unmute_dsp,
- - ARRAY_SIZE(cs35l41_hda_unmute_dsp));
- - } else {
- - regmap_multi_reg_write(reg, cs35l41_hda_unmute,
- - ARRAY_SIZE(cs35l41_hda_unmute));
- - }
- + cs35l41_mute(dev, false);
- }
-
- static void cs35l41_hda_pause_start(struct device *dev)
- @@ -588,7 +610,7 @@ static void cs35l41_hda_pause_start(struct device *dev)
-
- dev_dbg(dev, "Pause (Start)\n");
-
- - regmap_multi_reg_write(reg, cs35l41_hda_mute, ARRAY_SIZE(cs35l41_hda_mute));
- + cs35l41_mute(dev, true);
- cs35l41_global_enable(dev, reg, cs35l41->hw_cfg.bst_type, 0,
- cs35l41->firmware_running);
- }
- @@ -1116,6 +1138,53 @@ static int cs35l41_create_controls(struct cs35l41_hda *cs35l41)
- return 0;
- }
-
- +static bool cs35l41_dsm_supported(acpi_handle handle, unsigned int commands)
- +{
- + guid_t guid;
- +
- + guid_parse(CS35L41_UUID, &guid);
- +
- + return acpi_check_dsm(handle, &guid, 0, BIT(commands));
- +}
- +
- +static int cs35l41_get_acpi_mute_state(struct cs35l41_hda *cs35l41, acpi_handle handle)
- +{
- + guid_t guid;
- + union acpi_object *ret;
- + int mute = -ENODEV;
- +
- + guid_parse(CS35L41_UUID, &guid);
- +
- + if (cs35l41_dsm_supported(handle, CS35L41_DSM_GET_MUTE)) {
- + ret = acpi_evaluate_dsm(handle, &guid, 0, CS35L41_DSM_GET_MUTE, NULL);
- + mute = *ret->buffer.pointer;
- + dev_dbg(cs35l41->dev, "CS35L41_DSM_GET_MUTE: %d\n", mute);
- + }
- +
- + dev_dbg(cs35l41->dev, "%s: %d\n", __func__, mute);
- +
- + return mute;
- +}
- +
- +static void cs35l41_acpi_device_notify(acpi_handle handle, u32 event, struct device *dev)
- +{
- + struct cs35l41_hda *cs35l41 = dev_get_drvdata(dev);
- + int mute;
- +
- + if (event != CS35L41_NOTIFY_EVENT)
- + return;
- +
- + mute = cs35l41_get_acpi_mute_state(cs35l41, handle);
- + if (mute < 0) {
- + dev_warn(cs35l41->dev, "Unable to retrieve mute state: %d\n", mute);
- + return;
- + }
- +
- + dev_dbg(cs35l41->dev, "Requesting mute value: %d\n", mute);
- + cs35l41->mute_override = (mute > 0);
- + cs35l41_mute(cs35l41->dev, cs35l41->mute_override);
- +}
- +
- static int cs35l41_hda_bind(struct device *dev, struct device *master, void *master_data)
- {
- struct cs35l41_hda *cs35l41 = dev_get_drvdata(dev);
- @@ -1157,6 +1226,14 @@ static int cs35l41_hda_bind(struct device *dev, struct device *master, void *mas
- comps->playback_hook = cs35l41_hda_playback_hook;
- comps->pre_playback_hook = cs35l41_hda_pre_playback_hook;
- comps->post_playback_hook = cs35l41_hda_post_playback_hook;
- + comps->acpi_notify = cs35l41_acpi_device_notify;
- + comps->adev = cs35l41->dacpi;
- +
- + comps->acpi_notifications_supported = cs35l41_dsm_supported(acpi_device_handle(comps->adev),
- + CS35L41_DSM_GET_MUTE);
- +
- + cs35l41->mute_override = cs35l41_get_acpi_mute_state(cs35l41,
- + acpi_device_handle(cs35l41->dacpi)) > 0;
-
- mutex_unlock(&cs35l41->fw_mutex);
-
- @@ -1430,8 +1507,8 @@ static int cs35l41_hda_read_acpi(struct cs35l41_hda *cs35l41, const char *hid, i
- return -ENODEV;
- }
-
- + cs35l41->dacpi = adev;
- physdev = get_device(acpi_get_first_physical_node(adev));
- - acpi_dev_put(adev);
-
- sub = acpi_get_subsystem_id(ACPI_HANDLE(physdev));
- if (IS_ERR(sub))
- @@ -1541,6 +1618,7 @@ static int cs35l41_hda_read_acpi(struct cs35l41_hda *cs35l41, const char *hid, i
- hw_cfg->valid = false;
- hw_cfg->gpio1.valid = false;
- hw_cfg->gpio2.valid = false;
- + acpi_dev_put(cs35l41->dacpi);
- put_physdev:
- put_device(physdev);
-
- @@ -1644,10 +1722,7 @@ int cs35l41_hda_probe(struct device *dev, const char *device_name, int id, int i
- if (ret)
- goto err;
-
- - ret = regmap_multi_reg_write(cs35l41->regmap, cs35l41_hda_mute,
- - ARRAY_SIZE(cs35l41_hda_mute));
- - if (ret)
- - goto err;
- + cs35l41_mute(cs35l41->dev, true);
-
- INIT_WORK(&cs35l41->fw_load_work, cs35l41_fw_load_work);
- mutex_init(&cs35l41->fw_mutex);
- @@ -1684,6 +1759,8 @@ int cs35l41_hda_probe(struct device *dev, const char *device_name, int id, int i
- if (cs35l41_safe_reset(cs35l41->regmap, cs35l41->hw_cfg.bst_type))
- gpiod_set_value_cansleep(cs35l41->reset_gpio, 0);
- gpiod_put(cs35l41->reset_gpio);
- + gpiod_put(cs35l41->cs_gpio);
- + acpi_dev_put(cs35l41->dacpi);
- kfree(cs35l41->acpi_subsystem_id);
-
- return ret;
- @@ -1703,11 +1780,14 @@ void cs35l41_hda_remove(struct device *dev)
-
- component_del(cs35l41->dev, &cs35l41_hda_comp_ops);
-
- + acpi_dev_put(cs35l41->dacpi);
- +
- pm_runtime_put_noidle(cs35l41->dev);
-
- if (cs35l41_safe_reset(cs35l41->regmap, cs35l41->hw_cfg.bst_type))
- gpiod_set_value_cansleep(cs35l41->reset_gpio, 0);
- gpiod_put(cs35l41->reset_gpio);
- + gpiod_put(cs35l41->cs_gpio);
- kfree(cs35l41->acpi_subsystem_id);
- }
- EXPORT_SYMBOL_NS_GPL(cs35l41_hda_remove, SND_HDA_SCODEC_CS35L41);
- diff --git a/sound/pci/hda/cs35l41_hda.h b/sound/pci/hda/cs35l41_hda.h
- index b93bf762976e..3d925d677213 100644
- --- a/sound/pci/hda/cs35l41_hda.h
- +++ b/sound/pci/hda/cs35l41_hda.h
- @@ -10,6 +10,7 @@
- #ifndef __CS35L41_HDA_H__
- #define __CS35L41_HDA_H__
-
- +#include <linux/acpi.h>
- #include <linux/efi.h>
- #include <linux/regulator/consumer.h>
- #include <linux/gpio/consumer.h>
- @@ -34,8 +35,8 @@ struct cs35l41_amp_efi_data {
- } __packed;
-
- enum cs35l41_hda_spk_pos {
- - CS35l41_LEFT,
- - CS35l41_RIGHT,
- + CS35L41_LEFT,
- + CS35L41_RIGHT,
- };
-
- enum cs35l41_hda_gpio_function {
- @@ -49,6 +50,7 @@ struct cs35l41_hda {
- struct device *dev;
- struct regmap *regmap;
- struct gpio_desc *reset_gpio;
- + struct gpio_desc *cs_gpio;
- struct cs35l41_hw_cfg hw_cfg;
- struct hda_codec *codec;
-
- @@ -70,6 +72,8 @@ struct cs35l41_hda {
- bool halo_initialized;
- bool playback_started;
- struct cs_dsp cs_dsp;
- + struct acpi_device *dacpi;
- + bool mute_override;
- };
-
- enum halo_state {
- diff --git a/sound/pci/hda/cs35l41_hda_property.c b/sound/pci/hda/cs35l41_hda_property.c
- index b62a4e6968e2..c9eb70290973 100644
- --- a/sound/pci/hda/cs35l41_hda_property.c
- +++ b/sound/pci/hda/cs35l41_hda_property.c
- @@ -6,9 +6,300 @@
- //
- // Author: Stefan Binding <[email protected]>
-
- +#include <linux/acpi.h>
- #include <linux/gpio/consumer.h>
- #include <linux/string.h>
- #include "cs35l41_hda_property.h"
- +#include <linux/spi/spi.h>
- +
- +#define MAX_AMPS 4
- +
- +struct cs35l41_config {
- + const char *ssid;
- + enum {
- + SPI,
- + I2C
- + } bus;
- + int num_amps;
- + enum {
- + INTERNAL,
- + EXTERNAL
- + } boost_type;
- + u8 channel[MAX_AMPS];
- + int reset_gpio_index; /* -1 if no reset gpio */
- + int spkid_gpio_index; /* -1 if no spkid gpio */
- + int cs_gpio_index; /* -1 if no cs gpio, or cs-gpios already exists, max num amps == 2 */
- + int boost_ind_nanohenry; /* Required if boost_type == Internal */
- + int boost_peak_milliamp; /* Required if boost_type == Internal */
- + int boost_cap_microfarad; /* Required if boost_type == Internal */
- +};
- +
- +static const struct cs35l41_config cs35l41_config_table[] = {
- +/*
- + * Device 103C89C6 does have _DSD, however it is setup to use the wrong boost type.
- + * We can override the _DSD to correct the boost type here.
- + * Since this laptop has valid ACPI, we do not need to handle cs-gpios, since that already exists
- + * in the ACPI. The Reset GPIO is also valid, so we can use the Reset defined in _DSD.
- + */
- + { "103C89C6", SPI, 2, INTERNAL, { CS35L41_RIGHT, CS35L41_LEFT, 0, 0 }, -1, -1, -1, 1000, 4500, 24 },
- + { "104312AF", SPI, 2, INTERNAL, { CS35L41_LEFT, CS35L41_RIGHT, 0, 0 }, 1, 2, 0, 1000, 4500, 24 },
- + { "10431433", I2C, 2, INTERNAL, { CS35L41_LEFT, CS35L41_RIGHT, 0, 0 }, 0, 1, -1, 1000, 4500, 24 },
- + { "10431463", I2C, 2, INTERNAL, { CS35L41_LEFT, CS35L41_RIGHT, 0, 0 }, 0, 1, -1, 1000, 4500, 24 },
- + { "10431473", SPI, 2, INTERNAL, { CS35L41_LEFT, CS35L41_RIGHT, 0, 0 }, 1, -1, 0, 1000, 4500, 24 },
- + { "10431483", SPI, 2, INTERNAL, { CS35L41_LEFT, CS35L41_RIGHT, 0, 0 }, 1, -1, 0, 1000, 4500, 24 },
- + { "10431493", SPI, 2, INTERNAL, { CS35L41_LEFT, CS35L41_RIGHT, 0, 0 }, 1, 2, 0, 1000, 4500, 24 },
- + { "104314D3", SPI, 2, INTERNAL, { CS35L41_LEFT, CS35L41_RIGHT, 0, 0 }, 1, 2, 0, 1000, 4500, 24 },
- + { "104314E3", I2C, 2, INTERNAL, { CS35L41_LEFT, CS35L41_RIGHT, 0, 0 }, 0, 1, -1, 1000, 4500, 24 },
- + { "10431503", I2C, 2, INTERNAL, { CS35L41_LEFT, CS35L41_RIGHT, 0, 0 }, 0, 1, -1, 1000, 4500, 24 },
- + { "10431533", I2C, 2, INTERNAL, { CS35L41_LEFT, CS35L41_RIGHT, 0, 0 }, 0, 1, -1, 1000, 4500, 24 },
- + { "10431573", SPI, 2, INTERNAL, { CS35L41_LEFT, CS35L41_RIGHT, 0, 0 }, 1, 2, 0, 1000, 4500, 24 },
- + { "10431663", SPI, 2, INTERNAL, { CS35L41_LEFT, CS35L41_RIGHT, 0, 0 }, 1, -1, 0, 1000, 4500, 24 },
- + { "104316D3", SPI, 2, EXTERNAL, { CS35L41_LEFT, CS35L41_RIGHT, 0, 0 }, 1, 2, 0, 0, 0, 0 },
- + { "104316F3", SPI, 2, EXTERNAL, { CS35L41_LEFT, CS35L41_RIGHT, 0, 0 }, 1, 2, 0, 0, 0, 0 },
- + { "104317F3", I2C, 2, INTERNAL, { CS35L41_LEFT, CS35L41_RIGHT, 0, 0 }, 0, 1, -1, 1000, 4500, 24 },
- + { "10431863", SPI, 2, INTERNAL, { CS35L41_LEFT, CS35L41_RIGHT, 0, 0 }, 1, 2, 0, 1000, 4500, 24 },
- + { "104318D3", I2C, 2, EXTERNAL, { CS35L41_LEFT, CS35L41_RIGHT, 0, 0 }, 0, 1, -1, 0, 0, 0 },
- + { "10431C9F", SPI, 2, INTERNAL, { CS35L41_LEFT, CS35L41_RIGHT, 0, 0 }, 1, 2, 0, 1000, 4500, 24 },
- + { "10431CAF", SPI, 2, INTERNAL, { CS35L41_LEFT, CS35L41_RIGHT, 0, 0 }, 1, 2, 0, 1000, 4500, 24 },
- + { "10431CCF", SPI, 2, INTERNAL, { CS35L41_LEFT, CS35L41_RIGHT, 0, 0 }, 1, 2, 0, 1000, 4500, 24 },
- + { "10431CDF", SPI, 2, INTERNAL, { CS35L41_LEFT, CS35L41_RIGHT, 0, 0 }, 1, 2, 0, 1000, 4500, 24 },
- + { "10431CEF", SPI, 2, INTERNAL, { CS35L41_LEFT, CS35L41_RIGHT, 0, 0 }, 1, 2, 0, 1000, 4500, 24 },
- + { "10431D1F", I2C, 2, INTERNAL, { CS35L41_LEFT, CS35L41_RIGHT, 0, 0 }, 0, 1, -1, 1000, 4500, 24 },
- + { "10431DA2", SPI, 2, EXTERNAL, { CS35L41_LEFT, CS35L41_RIGHT, 0, 0 }, 1, 2, 0, 0, 0, 0 },
- + { "10431E02", SPI, 2, EXTERNAL, { CS35L41_LEFT, CS35L41_RIGHT, 0, 0 }, 1, 2, 0, 0, 0, 0 },
- + { "10431EE2", I2C, 2, EXTERNAL, { CS35L41_LEFT, CS35L41_RIGHT, 0, 0 }, 0, -1, -1, 0, 0, 0 },
- + { "10431F12", I2C, 2, INTERNAL, { CS35L41_LEFT, CS35L41_RIGHT, 0, 0 }, 0, 1, -1, 1000, 4500, 24 },
- + { "10431F1F", SPI, 2, EXTERNAL, { CS35L41_LEFT, CS35L41_RIGHT, 0, 0 }, 1, -1, 0, 0, 0, 0 },
- + { "10431F62", SPI, 2, EXTERNAL, { CS35L41_LEFT, CS35L41_RIGHT, 0, 0 }, 1, 2, 0, 0, 0, 0 },
- + {}
- +};
- +
- +static int cs35l41_add_gpios(struct cs35l41_hda *cs35l41, struct device *physdev, int reset_gpio,
- + int spkid_gpio, int cs_gpio_index, int num_amps)
- +{
- + struct acpi_gpio_mapping *gpio_mapping;
- + struct acpi_gpio_params *reset_gpio_params;
- + struct acpi_gpio_params *spkid_gpio_params;
- + struct acpi_gpio_params *cs_gpio_params;
- + unsigned int num_entries = 0;
- + unsigned int reset_index, spkid_index, csgpio_index;
- + int i;
- +
- + /*
- + * GPIO Mapping only needs to be done once, since it would be available for subsequent amps
- + */
- + if (cs35l41->dacpi->driver_gpios)
- + return 0;
- +
- + if (reset_gpio >= 0) {
- + reset_index = num_entries;
- + num_entries++;
- + }
- +
- + if (spkid_gpio >= 0) {
- + spkid_index = num_entries;
- + num_entries++;
- + }
- +
- + if ((cs_gpio_index >= 0) && (num_amps == 2)) {
- + csgpio_index = num_entries;
- + num_entries++;
- + }
- +
- + if (!num_entries)
- + return 0;
- +
- + /* must include termination entry */
- + num_entries++;
- +
- + gpio_mapping = devm_kcalloc(physdev, num_entries, sizeof(struct acpi_gpio_mapping),
- + GFP_KERNEL);
- +
- + if (!gpio_mapping)
- + goto err;
- +
- + if (reset_gpio >= 0) {
- + gpio_mapping[reset_index].name = "reset-gpios";
- + reset_gpio_params = devm_kcalloc(physdev, num_amps, sizeof(struct acpi_gpio_params),
- + GFP_KERNEL);
- + if (!reset_gpio_params)
- + goto err;
- +
- + for (i = 0; i < num_amps; i++)
- + reset_gpio_params[i].crs_entry_index = reset_gpio;
- +
- + gpio_mapping[reset_index].data = reset_gpio_params;
- + gpio_mapping[reset_index].size = num_amps;
- + }
- +
- + if (spkid_gpio >= 0) {
- + gpio_mapping[spkid_index].name = "spk-id-gpios";
- + spkid_gpio_params = devm_kcalloc(physdev, num_amps, sizeof(struct acpi_gpio_params),
- + GFP_KERNEL);
- + if (!spkid_gpio_params)
- + goto err;
- +
- + for (i = 0; i < num_amps; i++)
- + spkid_gpio_params[i].crs_entry_index = spkid_gpio;
- +
- + gpio_mapping[spkid_index].data = spkid_gpio_params;
- + gpio_mapping[spkid_index].size = num_amps;
- + }
- +
- + if ((cs_gpio_index >= 0) && (num_amps == 2)) {
- + gpio_mapping[csgpio_index].name = "cs-gpios";
- + /* only one GPIO CS is supported without using _DSD, obtained using index 0 */
- + cs_gpio_params = devm_kzalloc(physdev, sizeof(struct acpi_gpio_params), GFP_KERNEL);
- + if (!cs_gpio_params)
- + goto err;
- +
- + cs_gpio_params->crs_entry_index = cs_gpio_index;
- +
- + gpio_mapping[csgpio_index].data = cs_gpio_params;
- + gpio_mapping[csgpio_index].size = 1;
- + }
- +
- + return devm_acpi_dev_add_driver_gpios(physdev, gpio_mapping);
- +err:
- + devm_kfree(physdev, gpio_mapping);
- + devm_kfree(physdev, reset_gpio_params);
- + devm_kfree(physdev, spkid_gpio_params);
- + devm_kfree(physdev, cs_gpio_params);
- + return -ENOMEM;
- +}
- +
- +static int generic_dsd_config(struct cs35l41_hda *cs35l41, struct device *physdev, int id,
- + const char *hid)
- +{
- + struct cs35l41_hw_cfg *hw_cfg = &cs35l41->hw_cfg;
- + const struct cs35l41_config *cfg;
- + struct gpio_desc *cs_gpiod;
- + struct spi_device *spi;
- + bool dsd_found;
- + int ret;
- +
- + for (cfg = cs35l41_config_table; cfg->ssid; cfg++) {
- + if (!strcasecmp(cfg->ssid, cs35l41->acpi_subsystem_id))
- + break;
- + }
- +
- + if (!cfg->ssid)
- + return -ENOENT;
- +
- + if (!cs35l41->dacpi || cs35l41->dacpi != ACPI_COMPANION(physdev)) {
- + dev_err(cs35l41->dev, "ACPI Device does not match, cannot override _DSD.\n");
- + return -ENODEV;
- + }
- +
- + dev_info(cs35l41->dev, "Adding DSD properties for %s\n", cs35l41->acpi_subsystem_id);
- +
- + dsd_found = acpi_dev_has_props(cs35l41->dacpi);
- +
- + if (!dsd_found) {
- + ret = cs35l41_add_gpios(cs35l41, physdev, cfg->reset_gpio_index,
- + cfg->spkid_gpio_index, cfg->cs_gpio_index,
- + cfg->num_amps);
- + if (ret) {
- + dev_err(cs35l41->dev, "Error adding GPIO mapping: %d\n", ret);
- + return ret;
- + }
- + } else if (cfg->reset_gpio_index >= 0 || cfg->spkid_gpio_index >= 0) {
- + dev_warn(cs35l41->dev, "Cannot add Reset/Speaker ID/SPI CS GPIO Mapping, "
- + "_DSD already exists.\n");
- + }
- +
- + if (cfg->bus == SPI) {
- + cs35l41->index = id;
- + /*
- + * Manually set the Chip Select for the second amp <cs_gpio_index> in the node.
- + * This is only supported for systems with 2 amps, since we cannot expand the
- + * default number of chip selects without using cs-gpios
- + * The CS GPIO must be set high prior to communicating with the first amp (which
- + * uses a native chip select), to ensure the second amp does not clash with the
- + * first.
- + */
- + if (cfg->cs_gpio_index >= 0) {
- + spi = to_spi_device(cs35l41->dev);
- +
- + if (cfg->num_amps != 2) {
- + dev_warn(cs35l41->dev,
- + "Cannot update SPI CS, Number of Amps (%d) != 2\n",
- + cfg->num_amps);
- + } else if (dsd_found) {
- + dev_warn(cs35l41->dev,
- + "Cannot update SPI CS, _DSD already exists.\n");
- + } else {
- + /*
- + * This is obtained using driver_gpios, since only one GPIO for CS
- + * exists, this can be obtained using index 0.
- + */
- + cs_gpiod = gpiod_get_index(physdev, "cs", 0, GPIOD_OUT_LOW);
- + if (IS_ERR(cs_gpiod)) {
- + dev_err(cs35l41->dev,
- + "Unable to get Chip Select GPIO descriptor\n");
- + return PTR_ERR(cs_gpiod);
- + }
- + if (id == 1) {
- + spi_set_csgpiod(spi, 0, cs_gpiod);
- + cs35l41->cs_gpio = cs_gpiod;
- + } else {
- + gpiod_set_value_cansleep(cs_gpiod, true);
- + gpiod_put(cs_gpiod);
- + }
- + spi_setup(spi);
- + }
- + }
- + } else {
- + if (cfg->num_amps > 2)
- + /*
- + * i2c addresses for 3/4 amps are used in order: 0x40, 0x41, 0x42, 0x43,
- + * subtracting 0x40 would give zero-based index
- + */
- + cs35l41->index = id - 0x40;
- + else
- + /* i2c addr 0x40 for first amp (always), 0x41/0x42 for 2nd amp */
- + cs35l41->index = id == 0x40 ? 0 : 1;
- + }
- +
- + if (cfg->num_amps == 3)
- + /* 3 amps means a center channel, so no duplicate channels */
- + cs35l41->channel_index = 0;
- + else
- + /*
- + * if 4 amps, there are duplicate channels, so they need different indexes
- + * if 2 amps, no duplicate channels, channel_index would be 0
- + */
- + cs35l41->channel_index = cs35l41->index / 2;
- +
- + cs35l41->reset_gpio = fwnode_gpiod_get_index(acpi_fwnode_handle(cs35l41->dacpi), "reset",
- + cs35l41->index, GPIOD_OUT_LOW,
- + "cs35l41-reset");
- + cs35l41->speaker_id = cs35l41_get_speaker_id(physdev, cs35l41->index, cfg->num_amps, -1);
- +
- + hw_cfg->spk_pos = cfg->channel[cs35l41->index];
- +
- + if (cfg->boost_type == INTERNAL) {
- + hw_cfg->bst_type = CS35L41_INT_BOOST;
- + hw_cfg->bst_ind = cfg->boost_ind_nanohenry;
- + hw_cfg->bst_ipk = cfg->boost_peak_milliamp;
- + hw_cfg->bst_cap = cfg->boost_cap_microfarad;
- + hw_cfg->gpio1.func = CS35L41_NOT_USED;
- + hw_cfg->gpio1.valid = true;
- + } else {
- + hw_cfg->bst_type = CS35L41_EXT_BOOST;
- + hw_cfg->bst_ind = -1;
- + hw_cfg->bst_ipk = -1;
- + hw_cfg->bst_cap = -1;
- + hw_cfg->gpio1.func = CS35l41_VSPK_SWITCH;
- + hw_cfg->gpio1.valid = true;
- + }
- +
- + hw_cfg->gpio2.func = CS35L41_INTERRUPT;
- + hw_cfg->gpio2.valid = true;
- + hw_cfg->valid = true;
- +
- + return 0;
- +}
-
- /*
- * Device CLSA010(0/1) doesn't have _DSD so a gpiod_get by the label reset won't work.
- @@ -43,37 +334,6 @@ static int lenovo_legion_no_acpi(struct cs35l41_hda *cs35l41, struct device *phy
- return 0;
- }
-
- -/*
- - * Device 103C89C6 does have _DSD, however it is setup to use the wrong boost type.
- - * We can override the _DSD to correct the boost type here.
- - * Since this laptop has valid ACPI, we do not need to handle cs-gpios, since that already exists
- - * in the ACPI.
- - */
- -static int hp_vision_acpi_fix(struct cs35l41_hda *cs35l41, struct device *physdev, int id,
- - const char *hid)
- -{
- - struct cs35l41_hw_cfg *hw_cfg = &cs35l41->hw_cfg;
- -
- - dev_info(cs35l41->dev, "Adding DSD properties for %s\n", cs35l41->acpi_subsystem_id);
- -
- - cs35l41->index = id;
- - cs35l41->channel_index = 0;
- - cs35l41->reset_gpio = gpiod_get_index(physdev, NULL, 1, GPIOD_OUT_HIGH);
- - cs35l41->speaker_id = -ENOENT;
- - hw_cfg->spk_pos = cs35l41->index ? 1 : 0; // right:left
- - hw_cfg->gpio1.func = CS35L41_NOT_USED;
- - hw_cfg->gpio1.valid = true;
- - hw_cfg->gpio2.func = CS35L41_INTERRUPT;
- - hw_cfg->gpio2.valid = true;
- - hw_cfg->bst_type = CS35L41_INT_BOOST;
- - hw_cfg->bst_ind = 1000;
- - hw_cfg->bst_ipk = 4500;
- - hw_cfg->bst_cap = 24;
- - hw_cfg->valid = true;
- -
- - return 0;
- -}
- -
- struct cs35l41_prop_model {
- const char *hid;
- const char *ssid;
- @@ -84,7 +344,36 @@ struct cs35l41_prop_model {
- static const struct cs35l41_prop_model cs35l41_prop_model_table[] = {
- { "CLSA0100", NULL, lenovo_legion_no_acpi },
- { "CLSA0101", NULL, lenovo_legion_no_acpi },
- - { "CSC3551", "103C89C6", hp_vision_acpi_fix },
- + { "CSC3551", "103C89C6", generic_dsd_config },
- + { "CSC3551", "104312AF", generic_dsd_config },
- + { "CSC3551", "10431433", generic_dsd_config },
- + { "CSC3551", "10431463", generic_dsd_config },
- + { "CSC3551", "10431473", generic_dsd_config },
- + { "CSC3551", "10431483", generic_dsd_config },
- + { "CSC3551", "10431493", generic_dsd_config },
- + { "CSC3551", "104314D3", generic_dsd_config },
- + { "CSC3551", "104314E3", generic_dsd_config },
- + { "CSC3551", "10431503", generic_dsd_config },
- + { "CSC3551", "10431533", generic_dsd_config },
- + { "CSC3551", "10431573", generic_dsd_config },
- + { "CSC3551", "10431663", generic_dsd_config },
- + { "CSC3551", "104316D3", generic_dsd_config },
- + { "CSC3551", "104316F3", generic_dsd_config },
- + { "CSC3551", "104317F3", generic_dsd_config },
- + { "CSC3551", "10431863", generic_dsd_config },
- + { "CSC3551", "104318D3", generic_dsd_config },
- + { "CSC3551", "10431C9F", generic_dsd_config },
- + { "CSC3551", "10431CAF", generic_dsd_config },
- + { "CSC3551", "10431CCF", generic_dsd_config },
- + { "CSC3551", "10431CDF", generic_dsd_config },
- + { "CSC3551", "10431CEF", generic_dsd_config },
- + { "CSC3551", "10431D1F", generic_dsd_config },
- + { "CSC3551", "10431DA2", generic_dsd_config },
- + { "CSC3551", "10431E02", generic_dsd_config },
- + { "CSC3551", "10431EE2", generic_dsd_config },
- + { "CSC3551", "10431F12", generic_dsd_config },
- + { "CSC3551", "10431F1F", generic_dsd_config },
- + { "CSC3551", "10431F62", generic_dsd_config },
- {}
- };
-
- @@ -97,7 +386,7 @@ int cs35l41_add_dsd_properties(struct cs35l41_hda *cs35l41, struct device *physd
- if (!strcmp(model->hid, hid) &&
- (!model->ssid ||
- (cs35l41->acpi_subsystem_id &&
- - !strcmp(model->ssid, cs35l41->acpi_subsystem_id))))
- + !strcasecmp(model->ssid, cs35l41->acpi_subsystem_id))))
- return model->add_prop(cs35l41, physdev, id, hid);
- }
-
- diff --git a/sound/pci/hda/hda_component.h b/sound/pci/hda/hda_component.h
- index f170aec967c1..bbd6f0ed16c1 100644
- --- a/sound/pci/hda/hda_component.h
- +++ b/sound/pci/hda/hda_component.h
- @@ -6,6 +6,7 @@
- * Cirrus Logic International Semiconductor Ltd.
- */
-
- +#include <linux/acpi.h>
- #include <linux/component.h>
-
- #define HDA_MAX_COMPONENTS 4
- @@ -15,6 +16,9 @@ struct hda_component {
- struct device *dev;
- char name[HDA_MAX_NAME_SIZE];
- struct hda_codec *codec;
- + struct acpi_device *adev;
- + bool acpi_notifications_supported;
- + void (*acpi_notify)(acpi_handle handle, u32 event, struct device *dev);
- void (*pre_playback_hook)(struct device *dev, int action);
- void (*playback_hook)(struct device *dev, int action);
- void (*post_playback_hook)(struct device *dev, int action);
- diff --git a/sound/pci/hda/patch_realtek.c b/sound/pci/hda/patch_realtek.c
- index 07e1547fff2e..beea19839508 100644
- --- a/sound/pci/hda/patch_realtek.c
- +++ b/sound/pci/hda/patch_realtek.c
- @@ -10042,23 +10042,29 @@ static const struct snd_pci_quirk alc269_fixup_tbl[] = {
- SND_PCI_QUIRK(0x1043, 0x1313, "Asus K42JZ", ALC269VB_FIXUP_ASUS_MIC_NO_PRESENCE),
- SND_PCI_QUIRK(0x1043, 0x13b0, "ASUS Z550SA", ALC256_FIXUP_ASUS_MIC),
- SND_PCI_QUIRK(0x1043, 0x1427, "Asus Zenbook UX31E", ALC269VB_FIXUP_ASUS_ZENBOOK),
- - SND_PCI_QUIRK(0x1043, 0x1433, "ASUS GX650P", ALC285_FIXUP_ASUS_I2C_HEADSET_MIC),
- - SND_PCI_QUIRK(0x1043, 0x1463, "Asus GA402X", ALC285_FIXUP_ASUS_I2C_HEADSET_MIC),
- - SND_PCI_QUIRK(0x1043, 0x1473, "ASUS GU604V", ALC285_FIXUP_ASUS_HEADSET_MIC),
- - SND_PCI_QUIRK(0x1043, 0x1483, "ASUS GU603V", ALC285_FIXUP_ASUS_HEADSET_MIC),
- - SND_PCI_QUIRK(0x1043, 0x1493, "ASUS GV601V", ALC285_FIXUP_ASUS_HEADSET_MIC),
- + SND_PCI_QUIRK(0x1043, 0x1433, "ASUS GX650PY/PZ/PV/PU/PYV/PZV/PIV/PVV", ALC285_FIXUP_ASUS_I2C_HEADSET_MIC),
- + SND_PCI_QUIRK(0x1043, 0x1463, "Asus GA402X/GA402N", ALC285_FIXUP_ASUS_I2C_HEADSET_MIC),
- + SND_PCI_QUIRK(0x1043, 0x1473, "ASUS GU604VI/VC/VE/VG/VJ/VQ/VU/VV/VY/VZ", ALC285_FIXUP_ASUS_HEADSET_MIC),
- + SND_PCI_QUIRK(0x1043, 0x1483, "ASUS GU603VQ/VU/VV/VJ/VI", ALC285_FIXUP_ASUS_HEADSET_MIC),
- + SND_PCI_QUIRK(0x1043, 0x1493, "ASUS GV601VV/VU/VJ/VQ/VI", ALC285_FIXUP_ASUS_HEADSET_MIC),
- + SND_PCI_QUIRK(0x1043, 0x14d3, "ASUS G614JY/JZ/JG", ALC245_FIXUP_CS35L41_SPI_2),
- + SND_PCI_QUIRK(0x1043, 0x14e3, "ASUS G513PI/PU/PV", ALC287_FIXUP_CS35L41_I2C_2),
- + SND_PCI_QUIRK(0x1043, 0x1503, "ASUS G733PY/PZ/PZV/PYV", ALC287_FIXUP_CS35L41_I2C_2),
- SND_PCI_QUIRK(0x1043, 0x1517, "Asus Zenbook UX31A", ALC269VB_FIXUP_ASUS_ZENBOOK_UX31A),
- - SND_PCI_QUIRK(0x1043, 0x1533, "ASUS GV302XA", ALC287_FIXUP_CS35L41_I2C_2),
- - SND_PCI_QUIRK(0x1043, 0x1573, "ASUS GZ301V", ALC285_FIXUP_ASUS_HEADSET_MIC),
- + SND_PCI_QUIRK(0x1043, 0x1533, "ASUS GV302XA/XJ/XQ/XU/XV/XI", ALC287_FIXUP_CS35L41_I2C_2),
- + SND_PCI_QUIRK(0x1043, 0x1573, "ASUS GZ301VV/VQ/VU/VJ/VA/VC/VE/VVC/VQC/VUC/VJC/VEC/VCC", ALC285_FIXUP_ASUS_HEADSET_MIC),
- SND_PCI_QUIRK(0x1043, 0x1662, "ASUS GV301QH", ALC294_FIXUP_ASUS_DUAL_SPK),
- - SND_PCI_QUIRK(0x1043, 0x1663, "ASUS GU603ZV", ALC285_FIXUP_ASUS_HEADSET_MIC),
- + SND_PCI_QUIRK(0x1043, 0x1663, "ASUS GU603ZI/ZJ/ZQ/ZU/ZV", ALC285_FIXUP_ASUS_HEADSET_MIC),
- SND_PCI_QUIRK(0x1043, 0x1683, "ASUS UM3402YAR", ALC287_FIXUP_CS35L41_I2C_2),
- SND_PCI_QUIRK(0x1043, 0x16a3, "ASUS UX3402VA", ALC245_FIXUP_CS35L41_SPI_2),
- SND_PCI_QUIRK(0x1043, 0x16b2, "ASUS GU603", ALC289_FIXUP_ASUS_GA401),
- + SND_PCI_QUIRK(0x1043, 0x16d3, "ASUS UX5304VA", ALC245_FIXUP_CS35L41_SPI_2),
- SND_PCI_QUIRK(0x1043, 0x16e3, "ASUS UX50", ALC269_FIXUP_STEREO_DMIC),
- + SND_PCI_QUIRK(0x1043, 0x16f3, "ASUS UX7602VI/BZ", ALC245_FIXUP_CS35L41_SPI_2),
- SND_PCI_QUIRK(0x1043, 0x1740, "ASUS UX430UA", ALC295_FIXUP_ASUS_DACS),
- SND_PCI_QUIRK(0x1043, 0x17d1, "ASUS UX431FL", ALC294_FIXUP_ASUS_DUAL_SPK),
- - SND_PCI_QUIRK(0x1043, 0x17f3, "ROG Ally RC71L_RC71L", ALC294_FIXUP_ASUS_ALLY),
- + SND_PCI_QUIRK(0x1043, 0x17f3, "ROG Ally NR2301L/X", ALC294_FIXUP_ASUS_ALLY),
- + SND_PCI_QUIRK(0x1043, 0x1863, "ASUS UX6404VI/VV", ALC245_FIXUP_CS35L41_SPI_2),
- SND_PCI_QUIRK(0x1043, 0x1881, "ASUS Zephyrus S/M", ALC294_FIXUP_ASUS_GX502_PINS),
- SND_PCI_QUIRK(0x1043, 0x18b1, "Asus MJ401TA", ALC256_FIXUP_ASUS_HEADSET_MIC),
- SND_PCI_QUIRK(0x1043, 0x18d3, "ASUS UM3504DA", ALC294_FIXUP_CS35L41_I2C_2),
- @@ -10083,10 +10089,13 @@ static const struct snd_pci_quirk alc269_fixup_tbl[] = {
- SND_PCI_QUIRK(0x1043, 0x1c43, "ASUS UX8406MA", ALC245_FIXUP_CS35L41_SPI_2),
- SND_PCI_QUIRK(0x1043, 0x1c62, "ASUS GU603", ALC289_FIXUP_ASUS_GA401),
- SND_PCI_QUIRK(0x1043, 0x1c92, "ASUS ROG Strix G15", ALC285_FIXUP_ASUS_G533Z_PINS),
- - SND_PCI_QUIRK(0x1043, 0x1c9f, "ASUS G614JI", ALC285_FIXUP_ASUS_HEADSET_MIC),
- - SND_PCI_QUIRK(0x1043, 0x1caf, "ASUS G634JYR/JZR", ALC285_FIXUP_ASUS_SPI_REAR_SPEAKERS),
- + SND_PCI_QUIRK(0x1043, 0x1c9f, "ASUS G614JU/JV/JI", ALC285_FIXUP_ASUS_HEADSET_MIC),
- + SND_PCI_QUIRK(0x1043, 0x1caf, "ASUS G634JY/JZ/JI/JG", ALC285_FIXUP_ASUS_SPI_REAR_SPEAKERS),
- SND_PCI_QUIRK(0x1043, 0x1ccd, "ASUS X555UB", ALC256_FIXUP_ASUS_MIC),
- - SND_PCI_QUIRK(0x1043, 0x1d1f, "ASUS ROG Strix G17 2023 (G713PV)", ALC287_FIXUP_CS35L41_I2C_2),
- + SND_PCI_QUIRK(0x1043, 0x1ccf, "ASUS G814JU/JV/JI", ALC245_FIXUP_CS35L41_SPI_2),
- + SND_PCI_QUIRK(0x1043, 0x1cdf, "ASUS G814JY/JZ/JG", ALC245_FIXUP_CS35L41_SPI_2),
- + SND_PCI_QUIRK(0x1043, 0x1cef, "ASUS G834JY/JZ/JI/JG", ALC285_FIXUP_ASUS_HEADSET_MIC),
- + SND_PCI_QUIRK(0x1043, 0x1d1f, "ASUS G713PI/PU/PV/PVN", ALC287_FIXUP_CS35L41_I2C_2),
- SND_PCI_QUIRK(0x1043, 0x1d42, "ASUS Zephyrus G14 2022", ALC289_FIXUP_ASUS_GA401),
- SND_PCI_QUIRK(0x1043, 0x1d4e, "ASUS TM420", ALC256_FIXUP_ASUS_HPE),
- SND_PCI_QUIRK(0x1043, 0x1da2, "ASUS UP6502ZA/ZD", ALC245_FIXUP_CS35L41_SPI_2),
- @@ -10100,6 +10109,7 @@ static const struct snd_pci_quirk alc269_fixup_tbl[] = {
- SND_PCI_QUIRK(0x1043, 0x1c52, "ASUS Zephyrus G15 2022", ALC289_FIXUP_ASUS_GA401),
- SND_PCI_QUIRK(0x1043, 0x1f11, "ASUS Zephyrus G14", ALC289_FIXUP_ASUS_GA401),
- SND_PCI_QUIRK(0x1043, 0x1f12, "ASUS UM5302", ALC287_FIXUP_CS35L41_I2C_2),
- + SND_PCI_QUIRK(0x1043, 0x1f1f, "ASUS H7604JI/JV/J3D", ALC245_FIXUP_CS35L41_SPI_2),
- SND_PCI_QUIRK(0x1043, 0x1f62, "ASUS UX7602ZM", ALC245_FIXUP_CS35L41_SPI_2),
- SND_PCI_QUIRK(0x1043, 0x1f92, "ASUS ROG Flow X16", ALC289_FIXUP_ASUS_GA401),
- SND_PCI_QUIRK(0x1043, 0x3030, "ASUS ZN270IE", ALC256_FIXUP_ASUS_AIO_GPIO2),
- --
- 2.46.2
|