From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932902AbcALBmH (ORCPT ); Mon, 11 Jan 2016 20:42:07 -0500 Received: from mail-cys01nam02on0084.outbound.protection.outlook.com ([104.47.37.84]:40465 "EHLO NAM02-CY1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1761752AbcALBl7 (ORCPT ); Mon, 11 Jan 2016 20:41:59 -0500 Authentication-Results: spf=pass (sender IP is 149.199.60.100) smtp.mailfrom=xilinx.com; hurleysoftware.com; dkim=none (message not signed) header.d=none;hurleysoftware.com; dmarc=bestguesspass action=none header.from=xilinx.com; From: Soren Brinkmann To: Greg Kroah-Hartman , Jiri Slaby CC: Michal Simek , , , , "Peter Hurley" , Soren Brinkmann Subject: [PATCH LINUX 0/6] Second part of xuartps fixes Date: Mon, 11 Jan 2016 17:41:35 -0800 Message-ID: <1452562901-17848-1-git-send-email-soren.brinkmann@xilinx.com> X-Mailer: git-send-email 2.7.0.3.g497ea1e MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8bit X-RCIS-Action: ALLOW X-TM-AS-Product-Ver: IMSS-7.1.0.1224-8.0.0.1202-22058.006 X-TM-AS-User-Approved-Sender: Yes;Yes X-EOPAttributedMessage: 0 X-Forefront-Antispam-Report: CIP:149.199.60.100;CTRY:US;IPV:NLI;EFV:NLI;SFV:NSPM;SFS:(10009020)(6009001)(2980300002)(438002)(199003)(164054003)(189002)(87936001)(15975445007)(5001960100002)(86362001)(106466001)(1220700001)(81156007)(63266004)(2906002)(50466002)(5820100001)(107886002)(1096002)(50986999)(4001430100002)(92566002)(36386004)(23676002)(50226001)(5001770100001)(11100500001)(229853001)(33646002)(586003)(57986006)(76506005)(189998001)(6806005)(19580395003)(5008740100001)(77096005)(36756003)(47776003)(4326007)(107986001)(217873001)(5001870100001);DIR:OUT;SFP:1101;SCL:1;SRVR:CY1NAM02HT043;H:xsj-pvapsmtpgw02;FPR:;SPF:Pass;PTR:xapps1.xilinx.com,unknown-60-100.xilinx.com;A:1;MX:1;LANG:en; X-MS-Office365-Filtering-Correlation-Id: e623ca1a-068f-4b2a-67d2-08d31af18f1a X-Exchange-Antispam-Report-Test: UriScan:;BCL:0;PCL:0;RULEID:(8251501002);SRVR:CY1NAM02HT043;UriScan:; X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(601004)(2401047)(5005006)(8121501046)(13018025)(520078)(13015025)(13017025)(10201501046)(3002001);SRVR:CY1NAM02HT043;BCL:0;PCL:0;RULEID:;SRVR:CY1NAM02HT043; X-Forefront-PRVS: 081904387B X-OriginatorOrg: xilinx.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Jan 2016 01:41:57.5622 (UTC) X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.60.100];Helo=[xsj-pvapsmtpgw02] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY1NAM02HT043 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, this is the second part of fixes for xuartps that evolved from this series: https://lkml.org/lkml/2015/12/26/26. This series, obviously, depends on the patches mentioned above. It includes several minor improvements and refactoring and the refactoring of the IRQ management, which prevents lock ups that could happen when RX-related IRQs fired while the receiver was disabled. Thanks, Sören Sören Brinkmann (6): tty: xuartps: Move request_irq to after setting up the HW tty: xuartps: Refactor IRQ handling tty: xuartps: Cleanup: Reformat if-else tty: xuartps: Improve sysrq handling tty: xuartps: Remove '_OFFSET' suffix from #defines tty: xuartps: Consolidate TX handling drivers/tty/serial/xilinx_uartps.c | 460 +++++++++++++++++-------------------- 1 file changed, 216 insertions(+), 244 deletions(-) -- 2.7.0.3.g497ea1e