From patchwork Sat Sep 23 19:41:52 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?b?TWljaGHFgiBNaXJvc8WCYXc=?= X-Patchwork-Id: 1838631 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=rere.qmqm.pl header.i=@rere.qmqm.pl header.a=rsa-sha256 header.s=1 header.b=qHzeJWgh; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org (client-ip=2620:137:e000::1:20; helo=out1.vger.email; envelope-from=linux-tegra-owner@vger.kernel.org; receiver=patchwork.ozlabs.org) Received: from out1.vger.email (out1.vger.email [IPv6:2620:137:e000::1:20]) by legolas.ozlabs.org (Postfix) with ESMTP id 4RtKTr3JVwz1ypP for ; Sun, 24 Sep 2023 05:49:36 +1000 (AEST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229666AbjIWTtf (ORCPT ); Sat, 23 Sep 2023 15:49:35 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53544 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229590AbjIWTte (ORCPT ); Sat, 23 Sep 2023 15:49:34 -0400 Received: from rere.qmqm.pl (rere.qmqm.pl [91.227.64.183]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BDFD319A; Sat, 23 Sep 2023 12:49:27 -0700 (PDT) Received: from remote.user (localhost [127.0.0.1]) by rere.qmqm.pl (Postfix) with ESMTPSA id 4RtKJx541CzR; Sat, 23 Sep 2023 21:41:53 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=rere.qmqm.pl; s=1; t=1695498115; bh=wp7EybNqxZPuaJseGNWMLajq/4TvZRIK+t8tPGl8NZA=; h=Date:Subject:From:To:Cc:From; b=qHzeJWgh89lusdHb6R07h2qNXYUd9Iuyp66mt4Cj0StxChiPqC8Qy9fWpFV2F5Fgk G4GvlYrDbAaLyPq5J8gSVp/KybCxPRin8N49PROEFNY31RvN+H5MOMUXldP0bWx2vo Px04kK3LJgU9vRDbBA8u8lm5KfFGlhYnzaEYnaTNpOQnOSrKerwmucLLciqwDRttXy o7g4Fmnawa5/kRbCNb+3SIz0wZowYAkcF7Lq8YEPvUKXrA+94OCQ+RN5YPJJjHmQZ4 aW3SupWSgqL+8NB1YAEWpqpa5G3yS1PJDuPHaBN5nW+3w6tpK4ZWsjH2EWuSp2GCTl /o3aJ/KDB/bzA== X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.8 at mail Date: Sat, 23 Sep 2023 21:41:52 +0200 Message-Id: Subject: [PATCH 0/3] usb: chipidea: Tegra USB DMA fix + cleanups MIME-Version: 1.0 From: =?utf-8?b?TWljaGHFgiBNaXJvc8WCYXc=?= To: Dmitry Osipenko , Greg Kroah-Hartman , Jonathan Hunter , Peter Chen , Peter Geis , Thierry Reding Cc: linux-tegra@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, linux-usb@vger.kernel.org X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,SPF_HELO_PASS,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-tegra@vger.kernel.org This series contains a fix for a DMA buffer overflow in Tegra USB driver followed by a cleanup of the DMA bounce buffer code and another cleanup to make probe() consistently use dev_err_probe() for error printk()s. Michał Mirosław (3): usb: chipidea: Fix DMA overwrite for Tegra usb: chipidea: Simplify Tegra DMA alignment code usb: chipidea: tegra: Consistently use dev_err_probe() drivers/usb/chipidea/ci_hdrc_tegra.c | 16 ++++------ drivers/usb/chipidea/host.c | 48 ++++++++++++---------------- 2 files changed, 27 insertions(+), 37 deletions(-)