[PATCH] staging: rtl8723bs: os_dep: Cleanup pointer casting code style

2020-05-01 Thread Yu Jian Wu
Cleanup by adding a space between type and pointer, in accordance with checkpatch.pl message "(foo*)" should be "(foo *)". Signed-off-by: Yu Jian Wu --- .../staging/rtl8723bs/os_dep/ioctl_cfg80211.c| 16 drivers/staging/rtl8723bs/os_dep/recv_linux.c| 2 +- 2 files chang

Re: [PATCH v9 1/2] dt-bindings: drm/bridge: anx7625: MIPI to DP transmitter binding

2020-05-01 Thread Rob Herring
On Thu, 30 Apr 2020 17:34:11 +0800, Xin Ji wrote: > The ANX7625 is an ultra-low power 4K Mobile HD Transmitter designed > for portable device. It converts MIPI to DisplayPort 1.3 4K. > > You can add support to your board with binding. > > Example: > anx7625_bridge: encoder@58 { >

[PATCH] media: atomisp: use add_qos_request instead of update

2020-05-01 Thread Mauro Carvalho Chehab
It doesn't make senst to update a request that was not created. So, instead of using cpu_latency_qos_update_request(), let's use, instead cpu_latency_qos_add_request() at device probing code. This should fix this issue: [9.691775] cpu_latency_qos_update_request called for unknown object [

Re: [PATCH] staging: wilc1000: Increase the size of wid_list array

2020-05-01 Thread Ajay.Kathat
On 01/05/20 10:32 pm, Oscar Carter wrote: > EXTERNAL EMAIL: Do not click links or open attachments unless you know the > content is safe > > Increase by one the size of wid_list array as index variable can reach a > value of 5. If this happens, an out-of-bounds access is performed. > > Address

[PATCH] staging: wilc1000: Increase the size of wid_list array

2020-05-01 Thread Oscar Carter
Increase by one the size of wid_list array as index variable can reach a value of 5. If this happens, an out-of-bounds access is performed. Addresses-Coverity-ID: 1451981 ("Out-of-bounds access") Fixes: c5c77ba18ea66 ("staging: wilc1000: Add SDIO/SPI 802.11 driver") Signed-off-by: Oscar Carter --

[PATCH] staging: gasket: Check the return value of gasket_get_bar_index()

2020-05-01 Thread Oscar Carter
Check the return value of gasket_get_bar_index function as it can return a negative one (-EINVAL). If this happens, a negative index is used in the "gasket_dev->bar_data" array. Addresses-Coverity-ID: 1438542 ("Negative array index read") Fixes: 9a69f5087ccc2 ("drivers/staging: Gasket driver frame

[PATCH] staging: vt6656: Return on isr0 when zero.

2020-05-01 Thread Malcolm Priestley
When isr0 is zero there is nothing more todo so return and pull following code in. Signed-off-by: Malcolm Priestley --- drivers/staging/vt6656/usbpipe.c | 47 1 file changed, 23 insertions(+), 24 deletions(-) diff --git a/drivers/staging/vt6656/usbpipe.c b/drive