aboutsummaryrefslogtreecommitdiff
path: root/tools/perf/util/scripting-engines/trace-event-python.c
diff options
context:
space:
mode:
authorPeter Griffin <peter.griffin@linaro.org>2024-10-31 15:00:23 +0000
committerMartin K. Petersen <martin.petersen@oracle.com>2024-11-02 21:13:00 -0400
commitc662cedea14efdcf373d8d886ec18019d50e0772 (patch)
tree5c554b235f7d6cfdcec92a38ee421293d14ecb54 /tools/perf/util/scripting-engines/trace-event-python.c
parent516ceaaf539de83de3af04c46198f39180cc44a1 (diff)
downloadlinux-c662cedea14efdcf373d8d886ec18019d50e0772.tar.gz
linux-c662cedea14efdcf373d8d886ec18019d50e0772.tar.bz2
linux-c662cedea14efdcf373d8d886ec18019d50e0772.zip
scsi: ufs: exynos: Add check inside exynos_ufs_config_smu()
Move the EXYNOS_UFS_OPT_UFSPR_SECURE check inside exynos_ufs_config_smu(). This way all call sites will benefit from the check. This fixes a bug currently in the exynos_ufs_resume() path on gs101 as it calls exynos_ufs_config_smu() and we end up accessing registers that can only be accessed from secure world which results in a serror. Fixes: d11e0a318df8 ("scsi: ufs: exynos: Add support for Tensor gs101 SoC") Signed-off-by: Peter Griffin <peter.griffin@linaro.org> Link: https://lore.kernel.org/r/20241031150033.3440894-5-peter.griffin@linaro.org Cc: stable@vger.kernel.org Reviewed-by: Tudor Ambarus <tudor.ambarus@linaro.org> Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
Diffstat (limited to 'tools/perf/util/scripting-engines/trace-event-python.c')
0 files changed, 0 insertions, 0 deletions