|
[PATCH 20/25] gpio-exar/8250-exar: Do not even instantiate a GPIO device for Commtech cards
From: Jan Kiszka <jan.kiszka@...> commit a39f2fe7165647c2cd7bdbebb3d04061035e520f upstream. Commtech adapters need the MPIOs for internal purposes, and the gpio-exar driver already refused to pick the
From: Jan Kiszka <jan.kiszka@...> commit a39f2fe7165647c2cd7bdbebb3d04061035e520f upstream. Commtech adapters need the MPIOs for internal purposes, and the gpio-exar driver already refused to pick the
|
By
Jan Kiszka
·
|
|
[PATCH 21/25] gpio: exar: Fix iomap request
From: Jan Kiszka <jan.kiszka@...> commit 8847f5f9ef554269d2a06100b311d363b9727da6 upstream. The UART driver already maps the resource for us. Trying to do this here only fails and leaves us with a non
From: Jan Kiszka <jan.kiszka@...> commit 8847f5f9ef554269d2a06100b311d363b9727da6 upstream. The UART driver already maps the resource for us. Trying to do this here only fails and leaves us with a non
|
By
Jan Kiszka
·
|
|
[PATCH 22/25] gpio-exar/8250-exar: Rearrange gpiochip parenthood
From: Jan Kiszka <jan.kiszka@...> commit 4076cf08ac7673aca7d4dd9ddf18045d08dbc292 upstream. Set the parent of the exar gpiochip to its platform device, like other gpiochips are doing it. In order to k
From: Jan Kiszka <jan.kiszka@...> commit 4076cf08ac7673aca7d4dd9ddf18045d08dbc292 upstream. Set the parent of the exar gpiochip to its platform device, like other gpiochips are doing it. In order to k
|
By
Jan Kiszka
·
|
|
[PATCH 23/25] serial: exar: Factor out platform hooks
From: Jan Kiszka <jan.kiszka@...> commit 0d963ebf57d4c6374b3a33050a18af23c1e2ede1 upstream. This prepares the addition of IOT2040 platform support by preparing the needed setup and rs485_config hooks.
From: Jan Kiszka <jan.kiszka@...> commit 0d963ebf57d4c6374b3a33050a18af23c1e2ede1 upstream. This prepares the addition of IOT2040 platform support by preparing the needed setup and rs485_config hooks.
|
By
Jan Kiszka
·
|
|
[PATCH 24/25] gpio-exar/8250-exar: Make set of exported GPIOs configurable
From: Jan Kiszka <jan.kiszka@...> commit 380b1e2f3a2f32bfe9c0aa85a68629eb99b043c0 upstream. On the SIMATIC, IOT2040 only a single pin is exportable as GPIO, the rest is required to operate the UART. T
From: Jan Kiszka <jan.kiszka@...> commit 380b1e2f3a2f32bfe9c0aa85a68629eb99b043c0 upstream. On the SIMATIC, IOT2040 only a single pin is exportable as GPIO, the rest is required to operate the UART. T
|
By
Jan Kiszka
·
|
|
[PATCH 25/25] serial: exar: Add support for IOT2040 device
From: Jan Kiszka <jan.kiszka@...> commit 413058df4331ce29f9934a5870d582c7e71fe15f upstream. This implements the setup of RS232 and the switch-over to RS485 or RS422 for the Siemens IOT2040. That uses
From: Jan Kiszka <jan.kiszka@...> commit 413058df4331ce29f9934a5870d582c7e71fe15f upstream. This implements the setup of RS232 and the switch-over to RS485 or RS422 for the Siemens IOT2040. That uses
|
By
Jan Kiszka
·
|
|
[PATCH 01/14] efi: Move efi_status_to_err() to drivers/firmware/efi/
From: Matt Fleming <matt@...> commit 806b0351c9ff9890c1ef0ba2c46237baef49ac79 upstream. Move efi_status_to_err() to the architecture independent code as it's generally useful in all bits of EFI code w
From: Matt Fleming <matt@...> commit 806b0351c9ff9890c1ef0ba2c46237baef49ac79 upstream. Move efi_status_to_err() to the architecture independent code as it's generally useful in all bits of EFI code w
|
By
Jan Kiszka
·
|
|
[PATCH 02/14] efi: Add 'capsule' update support
From: Matt Fleming <matt@...> commit f0133f3c5b8bb34ec4dec50c27e7a655aeee8935 upstream. The EFI capsule mechanism allows data blobs to be passed to the EFI firmware. A common use case is performing fi
From: Matt Fleming <matt@...> commit f0133f3c5b8bb34ec4dec50c27e7a655aeee8935 upstream. The EFI capsule mechanism allows data blobs to be passed to the EFI firmware. A common use case is performing fi
|
By
Jan Kiszka
·
|
|
[PATCH 03/14] x86/efi: Force EFI reboot to process pending capsules
From: Matt Fleming <matt@...> commit 87615a34d561ef59bd0cffc73256a21220dfdffd upstream. If an EFI capsule has been sent to the firmware we must match the type of EFI reset against that required by the
From: Matt Fleming <matt@...> commit 87615a34d561ef59bd0cffc73256a21220dfdffd upstream. If an EFI capsule has been sent to the firmware we must match the type of EFI reset against that required by the
|
By
Jan Kiszka
·
|
|
[PATCH 04/14] efi: Add misc char driver interface to update EFI firmware
From: Kweh, Hock Leong <hock.leong.kweh@...> commit 65117f1aa1b2d145fd5ca376bde642794d0aae1b upstream. This patch introduces a kernel module to expose a capsule loader interface (misc char device file
From: Kweh, Hock Leong <hock.leong.kweh@...> commit 65117f1aa1b2d145fd5ca376bde642794d0aae1b upstream. This patch introduces a kernel module to expose a capsule loader interface (misc char device file
|
By
Jan Kiszka
·
|
|
[PATCH 05/14] efi/capsule: Move 'capsule' to the stack in efi_capsule_supported()
From: Matt Fleming <matt@...> commit fb7a84cac03541f4da18dfa25b3f4767d4efc6fc upstream. Dan Carpenter reports that passing the address of the pointer to the kmalloc()'d memory for 'capsule' is dangero
From: Matt Fleming <matt@...> commit fb7a84cac03541f4da18dfa25b3f4767d4efc6fc upstream. Dan Carpenter reports that passing the address of the pointer to the kmalloc()'d memory for 'capsule' is dangero
|
By
Jan Kiszka
·
|
|
[PATCH 06/14] efi/capsule: Allocate whole capsule into virtual memory
From: Austin Christ <austinwc@...> commit 6862e6ad95e984991a6ceec592cf67831658f928 upstream. According to UEFI 2.6 section 7.5.3, the capsule should be in contiguous virtual memory and firmware may co
From: Austin Christ <austinwc@...> commit 6862e6ad95e984991a6ceec592cf67831658f928 upstream. According to UEFI 2.6 section 7.5.3, the capsule should be in contiguous virtual memory and firmware may co
|
By
Jan Kiszka
·
|
|
[PATCH 07/14] efi/capsule: Fix return code on failing kmap/vmap
From: Jan Kiszka <jan.kiszka@...> commit fb153dc53f0eb8e8ad6a69f773e44c2d12daa5d0 upstream. If kmap or vmap fail, it means we ran out of memory. There are no user-provided addressed involved that woul
From: Jan Kiszka <jan.kiszka@...> commit fb153dc53f0eb8e8ad6a69f773e44c2d12daa5d0 upstream. If kmap or vmap fail, it means we ran out of memory. There are no user-provided addressed involved that woul
|
By
Jan Kiszka
·
|
|
[PATCH 08/14] efi/capsule: Remove pr_debug() on ENOMEM or EFAULT
From: Jan Kiszka <jan.kiszka@...> commit 7367633f0bfd783ae5838141f3af88bba6c45eb9 upstream. Both cases are not worth a debug log message - the error code is telling enough. Signed-off-by: Jan Kiszka <
From: Jan Kiszka <jan.kiszka@...> commit 7367633f0bfd783ae5838141f3af88bba6c45eb9 upstream. Both cases are not worth a debug log message - the error code is telling enough. Signed-off-by: Jan Kiszka <
|
By
Jan Kiszka
·
|
|
[PATCH 09/14] efi/capsule: Clean up pr_err/_info() messages
From: Jan Kiszka <jan.kiszka@...> commit 5dce14b9d1a29cf76331f0fe8eb7efd63e0fcb9a upstream. Avoid __func__, improve the information provided by some of the messages. Signed-off-by: Jan Kiszka <jan.kis
From: Jan Kiszka <jan.kiszka@...> commit 5dce14b9d1a29cf76331f0fe8eb7efd63e0fcb9a upstream. Avoid __func__, improve the information provided by some of the messages. Signed-off-by: Jan Kiszka <jan.kis
|
By
Jan Kiszka
·
|
|
[PATCH 10/14] efi/capsule: Adjust return type of efi_capsule_setup_info()
From: Jan Kiszka <jan.kiszka@...> commit 41b0c376951417d1b37448957b30f766b10d3090 upstream. We actually expect int at the caller and never return any size information. Signed-off-by: Jan Kiszka <jan.k
From: Jan Kiszka <jan.kiszka@...> commit 41b0c376951417d1b37448957b30f766b10d3090 upstream. We actually expect int at the caller and never return any size information. Signed-off-by: Jan Kiszka <jan.k
|
By
Jan Kiszka
·
|
|
[PATCH 11/14] efi/capsule-loader: Use a cached copy of the capsule header
From: Ard Biesheuvel <ard.biesheuvel@...> commit 82c3768b8d68c40ecde92338899c838b7c674ffb upstream. Instead of kmapping the capsule data twice, copy the capsule header into the capsule info struct we
From: Ard Biesheuvel <ard.biesheuvel@...> commit 82c3768b8d68c40ecde92338899c838b7c674ffb upstream. Instead of kmapping the capsule data twice, copy the capsule header into the capsule info struct we
|
By
Jan Kiszka
·
|
|
[PATCH 12/14] efi/capsule-loader: Redirect calls to efi_capsule_setup_info() via weak alias
From: Ard Biesheuvel <ard.biesheuvel@...> commit 3fabd628d5ea24b02ddb1230ffca1df0f779f84e upstream. To allow platform specific code to hook into the capsule loading routines, indirect calls to efi_cap
From: Ard Biesheuvel <ard.biesheuvel@...> commit 3fabd628d5ea24b02ddb1230ffca1df0f779f84e upstream. To allow platform specific code to hook into the capsule loading routines, indirect calls to efi_cap
|
By
Jan Kiszka
·
|
|
[PATCH 13/14] efi/capsule-loader: Use page addresses rather than struct page pointers
From: Ard Biesheuvel <ard.biesheuvel@...> commit 2a457fb31df62c6b482f78e4f74aaed99271f44d upstream. To give some leeway to code that handles non-standard capsule headers, let's keep an array of page a
From: Ard Biesheuvel <ard.biesheuvel@...> commit 2a457fb31df62c6b482f78e4f74aaed99271f44d upstream. To give some leeway to code that handles non-standard capsule headers, let's keep an array of page a
|
By
Jan Kiszka
·
|
|
[PATCH 14/14] efi/capsule: Add support for Quark security header
From: Jan Kiszka <jan.kiszka@...> commit 2959c95d510cc45b246ba727eb8fdf8b601c6eec upstream. The firmware for Quark X102x prepends a security header to the capsule which is needed to support the mandat
From: Jan Kiszka <jan.kiszka@...> commit 2959c95d510cc45b246ba727eb8fdf8b601c6eec upstream. The firmware for Quark X102x prepends a security header to the capsule which is needed to support the mandat
|
By
Jan Kiszka
·
|