<feed xmlns='http://www.w3.org/2005/Atom'>
<title>user/sven/linux.git/kernel, branch v4.14.7</title>
<subtitle>Linux Kernel
</subtitle>
<id>https://git.stealer.net/cgit.cgi/user/sven/linux.git/atom?h=v4.14.7</id>
<link rel='self' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/atom?h=v4.14.7'/>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/'/>
<updated>2017-12-17T14:08:00Z</updated>
<entry>
<title>audit: ensure that 'audit=1' actually enables audit for PID 1</title>
<updated>2017-12-17T14:08:00Z</updated>
<author>
<name>Paul Moore</name>
<email>paul@paul-moore.com</email>
</author>
<published>2017-09-01T13:44:34Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=0ad0bb60166d8e4fbacaaaaaeb10a24de5e99aff'/>
<id>urn:sha1:0ad0bb60166d8e4fbacaaaaaeb10a24de5e99aff</id>
<content type='text'>
[ Upstream commit 173743dd99a49c956b124a74c8aacb0384739a4c ]

Prior to this patch we enabled audit in audit_init(), which is too
late for PID 1 as the standard initcalls are run after the PID 1 task
is forked.  This means that we never allocate an audit_context (see
audit_alloc()) for PID 1 and therefore miss a lot of audit events
generated by PID 1.

This patch enables audit as early as possible to help ensure that when
PID 1 is forked it can allocate an audit_context if required.

Reviewed-by: Richard Guy Briggs &lt;rgb@redhat.com&gt;
Signed-off-by: Paul Moore &lt;paul@paul-moore.com&gt;
Signed-off-by: Sasha Levin &lt;alexander.levin@verizon.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>audit: Allow auditd to set pid to 0 to end auditing</title>
<updated>2017-12-17T14:08:00Z</updated>
<author>
<name>Steve Grubb</name>
<email>sgrubb@redhat.com</email>
</author>
<published>2017-10-17T22:29:22Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=4086f7cf0c3e2fe275a2a18dc25749df348c0cdb'/>
<id>urn:sha1:4086f7cf0c3e2fe275a2a18dc25749df348c0cdb</id>
<content type='text'>
[ Upstream commit 33e8a907804428109ce1d12301c3365d619cc4df ]

The API to end auditing has historically been for auditd to set the
pid to 0. This patch restores that functionality.

See: https://github.com/linux-audit/audit-kernel/issues/69

Reviewed-by: Richard Guy Briggs &lt;rgb@redhat.com&gt;
Signed-off-by: Steve Grubb &lt;sgrubb@redhat.com&gt;
Signed-off-by: Paul Moore &lt;paul@paul-moore.com&gt;
Signed-off-by: Sasha Levin &lt;alexander.levin@verizon.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>jump_label: Invoke jump_label_test() via early_initcall()</title>
<updated>2017-12-14T08:53:13Z</updated>
<author>
<name>Jason Baron</name>
<email>jbaron@akamai.com</email>
</author>
<published>2017-11-13T21:48:47Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=2de359062feea90c1e8baa2fa9771ba98d1fadfa'/>
<id>urn:sha1:2de359062feea90c1e8baa2fa9771ba98d1fadfa</id>
<content type='text'>
[ Upstream commit 92ee46efeb505ead3ab06d3c5ce695637ed5f152 ]

Fengguang Wu reported that running the rcuperf test during boot can cause
the jump_label_test() to hit a WARN_ON(). The issue is that the core jump
label code relies on kernel_text_address() to detect when it can no longer
update branches that may be contained in __init sections. The
kernel_text_address() in turn assumes that if the system_state variable is
greter than or equal to SYSTEM_RUNNING then __init sections are no longer
valid (since the assumption is that they have been freed). However, when
rcuperf is setup to run in early boot it can call kernel_power_off() which
sets the system_state to SYSTEM_POWER_OFF.

Since rcuperf initialization is invoked via a module_init(), we can make
the dependency of jump_label_test() needing to complete before rcuperf
explicit by calling it via early_initcall().

Reported-by: Fengguang Wu &lt;fengguang.wu@intel.com&gt;
Signed-off-by: Jason Baron &lt;jbaron@akamai.com&gt;
Acked-by: Paul E. McKenney &lt;paulmck@linux.vnet.ibm.com&gt;
Cc: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
Cc: Peter Zijlstra &lt;peterz@infradead.org&gt;
Cc: Steven Rostedt &lt;rostedt@goodmis.org&gt;
Cc: Thomas Gleixner &lt;tglx@linutronix.de&gt;
Link: http://lkml.kernel.org/r/1510609727-2238-1-git-send-email-jbaron@akamai.com
Signed-off-by: Ingo Molnar &lt;mingo@kernel.org&gt;
Signed-off-by: Sasha Levin &lt;alexander.levin@verizon.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>bpf: fix lockdep splat</title>
<updated>2017-12-14T08:53:11Z</updated>
<author>
<name>Eric Dumazet</name>
<email>edumazet@google.com</email>
</author>
<published>2017-11-15T01:15:50Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=b316280c81337971e5cbf239400186425de7bae9'/>
<id>urn:sha1:b316280c81337971e5cbf239400186425de7bae9</id>
<content type='text'>
[ Upstream commit 89ad2fa3f043a1e8daae193bcb5fe34d5f8caf28 ]

pcpu_freelist_pop() needs the same lockdep awareness than
pcpu_freelist_populate() to avoid a false positive.

 [ INFO: SOFTIRQ-safe -&gt; SOFTIRQ-unsafe lock order detected ]

 switchto-defaul/12508 [HC0[0]:SC0[6]:HE0:SE0] is trying to acquire:
  (&amp;htab-&gt;buckets[i].lock){......}, at: [&lt;ffffffff9dc099cb&gt;] __htab_percpu_map_update_elem+0x1cb/0x300

 and this task is already holding:
  (dev_queue-&gt;dev-&gt;qdisc_class ?: &amp;qdisc_tx_lock#2){+.-...}, at: [&lt;ffffffff9e135848&gt;] __dev_queue_xmit+0
x868/0x1240
 which would create a new lock dependency:
  (dev_queue-&gt;dev-&gt;qdisc_class ?: &amp;qdisc_tx_lock#2){+.-...} -&gt; (&amp;htab-&gt;buckets[i].lock){......}

 but this new dependency connects a SOFTIRQ-irq-safe lock:
  (dev_queue-&gt;dev-&gt;qdisc_class ?: &amp;qdisc_tx_lock#2){+.-...}
 ... which became SOFTIRQ-irq-safe at:
   [&lt;ffffffff9db5931b&gt;] __lock_acquire+0x42b/0x1f10
   [&lt;ffffffff9db5b32c&gt;] lock_acquire+0xbc/0x1b0
   [&lt;ffffffff9da05e38&gt;] _raw_spin_lock+0x38/0x50
   [&lt;ffffffff9e135848&gt;] __dev_queue_xmit+0x868/0x1240
   [&lt;ffffffff9e136240&gt;] dev_queue_xmit+0x10/0x20
   [&lt;ffffffff9e1965d9&gt;] ip_finish_output2+0x439/0x590
   [&lt;ffffffff9e197410&gt;] ip_finish_output+0x150/0x2f0
   [&lt;ffffffff9e19886d&gt;] ip_output+0x7d/0x260
   [&lt;ffffffff9e19789e&gt;] ip_local_out+0x5e/0xe0
   [&lt;ffffffff9e197b25&gt;] ip_queue_xmit+0x205/0x620
   [&lt;ffffffff9e1b8398&gt;] tcp_transmit_skb+0x5a8/0xcb0
   [&lt;ffffffff9e1ba152&gt;] tcp_write_xmit+0x242/0x1070
   [&lt;ffffffff9e1baffc&gt;] __tcp_push_pending_frames+0x3c/0xf0
   [&lt;ffffffff9e1b3472&gt;] tcp_rcv_established+0x312/0x700
   [&lt;ffffffff9e1c1acc&gt;] tcp_v4_do_rcv+0x11c/0x200
   [&lt;ffffffff9e1c3dc2&gt;] tcp_v4_rcv+0xaa2/0xc30
   [&lt;ffffffff9e191107&gt;] ip_local_deliver_finish+0xa7/0x240
   [&lt;ffffffff9e191a36&gt;] ip_local_deliver+0x66/0x200
   [&lt;ffffffff9e19137d&gt;] ip_rcv_finish+0xdd/0x560
   [&lt;ffffffff9e191e65&gt;] ip_rcv+0x295/0x510
   [&lt;ffffffff9e12ff88&gt;] __netif_receive_skb_core+0x988/0x1020
   [&lt;ffffffff9e130641&gt;] __netif_receive_skb+0x21/0x70
   [&lt;ffffffff9e1306ff&gt;] process_backlog+0x6f/0x230
   [&lt;ffffffff9e132129&gt;] net_rx_action+0x229/0x420
   [&lt;ffffffff9da07ee8&gt;] __do_softirq+0xd8/0x43d
   [&lt;ffffffff9e282bcc&gt;] do_softirq_own_stack+0x1c/0x30
   [&lt;ffffffff9dafc2f5&gt;] do_softirq+0x55/0x60
   [&lt;ffffffff9dafc3a8&gt;] __local_bh_enable_ip+0xa8/0xb0
   [&lt;ffffffff9db4c727&gt;] cpu_startup_entry+0x1c7/0x500
   [&lt;ffffffff9daab333&gt;] start_secondary+0x113/0x140

 to a SOFTIRQ-irq-unsafe lock:
  (&amp;head-&gt;lock){+.+...}
 ... which became SOFTIRQ-irq-unsafe at:
 ...  [&lt;ffffffff9db5971f&gt;] __lock_acquire+0x82f/0x1f10
   [&lt;ffffffff9db5b32c&gt;] lock_acquire+0xbc/0x1b0
   [&lt;ffffffff9da05e38&gt;] _raw_spin_lock+0x38/0x50
   [&lt;ffffffff9dc0b7fa&gt;] pcpu_freelist_pop+0x7a/0xb0
   [&lt;ffffffff9dc08b2c&gt;] htab_map_alloc+0x50c/0x5f0
   [&lt;ffffffff9dc00dc5&gt;] SyS_bpf+0x265/0x1200
   [&lt;ffffffff9e28195f&gt;] entry_SYSCALL_64_fastpath+0x12/0x17

 other info that might help us debug this:

 Chain exists of:
   dev_queue-&gt;dev-&gt;qdisc_class ?: &amp;qdisc_tx_lock#2 --&gt; &amp;htab-&gt;buckets[i].lock --&gt; &amp;head-&gt;lock

  Possible interrupt unsafe locking scenario:

        CPU0                    CPU1
        ----                    ----
   lock(&amp;head-&gt;lock);
                                local_irq_disable();
                                lock(dev_queue-&gt;dev-&gt;qdisc_class ?: &amp;qdisc_tx_lock#2);
                                lock(&amp;htab-&gt;buckets[i].lock);
   &lt;Interrupt&gt;
     lock(dev_queue-&gt;dev-&gt;qdisc_class ?: &amp;qdisc_tx_lock#2);

  *** DEADLOCK ***

Fixes: e19494edab82 ("bpf: introduce percpu_freelist")
Signed-off-by: Eric Dumazet &lt;edumazet@google.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Sasha Levin &lt;alexander.levin@verizon.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>pipe: match pipe_max_size data type with procfs</title>
<updated>2017-12-14T08:53:08Z</updated>
<author>
<name>Joe Lawrence</name>
<email>joe.lawrence@redhat.com</email>
</author>
<published>2017-11-17T23:29:17Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=30c2f774e13547f0dbb68cf779911d4d8920f0bc'/>
<id>urn:sha1:30c2f774e13547f0dbb68cf779911d4d8920f0bc</id>
<content type='text'>
[ Upstream commit 98159d977f71c3b3dee898d1c34e56f520b094e7 ]

Patch series "A few round_pipe_size() and pipe-max-size fixups", v3.

While backporting Michael's "pipe: fix limit handling" patchset to a
distro-kernel, Mikulas noticed that current upstream pipe limit handling
contains a few problems:

  1 - procfs signed wrap: echo'ing a large number into
      /proc/sys/fs/pipe-max-size and then cat'ing it back out shows a
      negative value.

  2 - round_pipe_size() nr_pages overflow on 32bit:  this would
      subsequently try roundup_pow_of_two(0), which is undefined.

  3 - visible non-rounded pipe-max-size value: there is no mutual
      exclusion or protection between the time pipe_max_size is assigned
      a raw value from proc_dointvec_minmax() and when it is rounded.

  4 - unsigned long -&gt; unsigned int conversion makes for potential odd
      return errors from do_proc_douintvec_minmax_conv() and
      do_proc_dopipe_max_size_conv().

This version underwent the same testing as v1:
https://marc.info/?l=linux-kernel&amp;m=150643571406022&amp;w=2

This patch (of 4):

pipe_max_size is defined as an unsigned int:

  unsigned int pipe_max_size = 1048576;

but its procfs/sysctl representation is an integer:

  static struct ctl_table fs_table[] = {
          ...
          {
                  .procname       = "pipe-max-size",
                  .data           = &amp;pipe_max_size,
                  .maxlen         = sizeof(int),
                  .mode           = 0644,
                  .proc_handler   = &amp;pipe_proc_fn,
                  .extra1         = &amp;pipe_min_size,
          },
          ...

that is signed:

  int pipe_proc_fn(struct ctl_table *table, int write, void __user *buf,
                   size_t *lenp, loff_t *ppos)
  {
          ...
          ret = proc_dointvec_minmax(table, write, buf, lenp, ppos)

This leads to signed results via procfs for large values of pipe_max_size:

  % echo 2147483647 &gt;/proc/sys/fs/pipe-max-size
  % cat /proc/sys/fs/pipe-max-size
  -2147483648

Use unsigned operations on this variable to avoid such negative values.

Link: http://lkml.kernel.org/r/1507658689-11669-2-git-send-email-joe.lawrence@redhat.com
Signed-off-by: Joe Lawrence &lt;joe.lawrence@redhat.com&gt;
Reported-by: Mikulas Patocka &lt;mpatocka@redhat.com&gt;
Reviewed-by: Mikulas Patocka &lt;mpatocka@redhat.com&gt;
Cc: Michael Kerrisk &lt;mtk.manpages@gmail.com&gt;
Cc: Randy Dunlap &lt;rdunlap@infradead.org&gt;
Cc: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
Cc: Jens Axboe &lt;axboe@kernel.dk&gt;
Cc: Josh Poimboeuf &lt;jpoimboe@redhat.com&gt;
Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
Signed-off-by: Sasha Levin &lt;alexander.levin@verizon.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>kdb: Fix handling of kallsyms_symbol_next() return value</title>
<updated>2017-12-14T08:52:58Z</updated>
<author>
<name>Daniel Thompson</name>
<email>daniel.thompson@linaro.org</email>
</author>
<published>2015-03-02T14:13:36Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=425704be0968368005eabbf5c68182a4d4b23c8b'/>
<id>urn:sha1:425704be0968368005eabbf5c68182a4d4b23c8b</id>
<content type='text'>
commit c07d35338081d107e57cf37572d8cc931a8e32e2 upstream.

kallsyms_symbol_next() returns a boolean (true on success). Currently
kdb_read() tests the return value with an inequality that
unconditionally evaluates to true.

This is fixed in the obvious way and, since the conditional branch is
supposed to be unreachable, we also add a WARN_ON().

Reported-by: Dan Carpenter &lt;dan.carpenter@oracle.com&gt;
Signed-off-by: Daniel Thompson &lt;daniel.thompson@linaro.org&gt;
Signed-off-by: Jason Wessel &lt;jason.wessel@windriver.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
</entry>
<entry>
<title>smp/hotplug: Move step CPUHP_AP_SMPCFD_DYING to the correct place</title>
<updated>2017-12-14T08:52:56Z</updated>
<author>
<name>Lai Jiangshan</name>
<email>jiangshanlai@gmail.com</email>
</author>
<published>2017-11-28T13:19:53Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=b68df97ec8d0fd2074c130a64c831b8b760f1228'/>
<id>urn:sha1:b68df97ec8d0fd2074c130a64c831b8b760f1228</id>
<content type='text'>
commit 46febd37f9c758b05cd25feae8512f22584742fe upstream.

Commit 31487f8328f2 ("smp/cfd: Convert core to hotplug state machine")
accidently put this step on the wrong place. The step should be at the
cpuhp_ap_states[] rather than the cpuhp_bp_states[].

grep smpcfd /sys/devices/system/cpu/hotplug/states
 40: smpcfd:prepare
129: smpcfd:dying

"smpcfd:dying" was missing before.
So was the invocation of the function smpcfd_dying_cpu().

Fixes: 31487f8328f2 ("smp/cfd: Convert core to hotplug state machine")
Signed-off-by: Lai Jiangshan &lt;jiangshanlai@gmail.com&gt;
Signed-off-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;
Cc: Peter Zijlstra &lt;peterz@infradead.org&gt;
Cc: Richard Weinberger &lt;richard@nod.at&gt;
Cc: Sebastian Andrzej Siewior &lt;bigeasy@linutronix.de&gt;
Cc: Boris Ostrovsky &lt;boris.ostrovsky@oracle.com&gt;
Link: https://lkml.kernel.org/r/20171128131954.81229-1-jiangshanlai@gmail.com
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
</entry>
<entry>
<title>kprobes: Use synchronize_rcu_tasks() for optprobe with CONFIG_PREEMPT=y</title>
<updated>2017-12-10T12:40:40Z</updated>
<author>
<name>Masami Hiramatsu</name>
<email>mhiramat@kernel.org</email>
</author>
<published>2017-10-19T23:43:39Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=5715de464ac8ef97fdc0daacd41ac35dcd412e2f'/>
<id>urn:sha1:5715de464ac8ef97fdc0daacd41ac35dcd412e2f</id>
<content type='text'>
[ Upstream commit a30b85df7d599f626973e9cd3056fe755bd778e0 ]

We want to wait for all potentially preempted kprobes trampoline
execution to have completed. This guarantees that any freed
trampoline memory is not in use by any task in the system anymore.
synchronize_rcu_tasks() gives such a guarantee, so use it.

Also, this guarantees to wait for all potentially preempted tasks
on the instructions which will be replaced with a jump.

Since this becomes a problem only when CONFIG_PREEMPT=y, enable
CONFIG_TASKS_RCU=y for synchronize_rcu_tasks() in that case.

Signed-off-by: Masami Hiramatsu &lt;mhiramat@kernel.org&gt;
Acked-by: Paul E. McKenney &lt;paulmck@linux.vnet.ibm.com&gt;
Cc: Ananth N Mavinakayanahalli &lt;ananth@linux.vnet.ibm.com&gt;
Cc: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
Cc: Naveen N . Rao &lt;naveen.n.rao@linux.vnet.ibm.com&gt;
Cc: Paul E . McKenney &lt;paulmck@linux.vnet.ibm.com&gt;
Cc: Peter Zijlstra &lt;peterz@infradead.org&gt;
Cc: Steven Rostedt &lt;rostedt@goodmis.org&gt;
Cc: Thomas Gleixner &lt;tglx@linutronix.de&gt;
Link: http://lkml.kernel.org/r/150845661962.5443.17724352636247312231.stgit@devbox
Signed-off-by: Ingo Molnar &lt;mingo@kernel.org&gt;
Signed-off-by: Sasha Levin &lt;alexander.levin@verizon.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>perf/core: Fix __perf_read_group_add() locking</title>
<updated>2017-12-10T12:40:40Z</updated>
<author>
<name>Peter Zijlstra</name>
<email>peterz@infradead.org</email>
</author>
<published>2017-09-05T11:38:24Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=4ee9572b109de66357a73e27effed5266a449183'/>
<id>urn:sha1:4ee9572b109de66357a73e27effed5266a449183</id>
<content type='text'>
[ Upstream commit a9cd8194e1e6bd09619954721dfaf0f94fe2003e ]

Event timestamps are serialized using ctx-&gt;lock, make sure to hold it
over reading all values.

Signed-off-by: Peter Zijlstra (Intel) &lt;peterz@infradead.org&gt;
Cc: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
Cc: Peter Zijlstra &lt;peterz@infradead.org&gt;
Cc: Thomas Gleixner &lt;tglx@linutronix.de&gt;
Signed-off-by: Ingo Molnar &lt;mingo@kernel.org&gt;
Signed-off-by: Sasha Levin &lt;alexander.levin@verizon.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>genirq: Track whether the trigger type has been set</title>
<updated>2017-11-30T08:40:52Z</updated>
<author>
<name>Marc Zyngier</name>
<email>marc.zyngier@arm.com</email>
</author>
<published>2017-11-09T14:17:59Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=c01dd3addb99763551f2717d1c7c6d20bd9491de'/>
<id>urn:sha1:c01dd3addb99763551f2717d1c7c6d20bd9491de</id>
<content type='text'>
commit 4f8413a3a799c958f7a10a6310a451e6b8aef5ad upstream.

When requesting a shared interrupt, we assume that the firmware
support code (DT or ACPI) has called irqd_set_trigger_type
already, so that we can retrieve it and check that the requester
is being reasonnable.

Unfortunately, we still have non-DT, non-ACPI systems around,
and these guys won't call irqd_set_trigger_type before requesting
the interrupt. The consequence is that we fail the request that
would have worked before.

We can either chase all these use cases (boring), or address it
in core code (easier). Let's have a per-irq_desc flag that
indicates whether irqd_set_trigger_type has been called, and
let's just check it when checking for a shared interrupt.
If it hasn't been set, just take whatever the interrupt
requester asks.

Fixes: 382bd4de6182 ("genirq: Use irqd_get_trigger_type to compare the trigger type for shared IRQs")
Reported-and-tested-by: Petr Cvek &lt;petrcvekcz@gmail.com&gt;
Signed-off-by: Marc Zyngier &lt;marc.zyngier@arm.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
</entry>
</feed>
