Skip to content
Snippets Groups Projects
Select Git revision
  • 3dc6b5f2a4d5d1482c2c56567a2ed5d73b4f4f9a
  • linux-5.15.29-guf default protected
  • integrate/gitlab-ci/change-poky-entry-group-id/into/linux-5.15.29-guf
  • integrate/gitlab-ci/optional-sleep/into/linux-5.15.29-guf
  • linux-5.15.185-seco protected
  • linux-5.15.182-seco protected
  • integrate/gitlab-ci/CI-report-image-diff-rewrite/into/linux-5.15.29-guf
  • integrate/gitlab-ci/extend-image-diff-job-to-manifest-mrs/into/linux-5.15.29-guf
  • integrate/gitlab-ci/kirkstone-spdx/into/linux-5.15.29-guf
  • integrate/gitlab-ci/test-gitbot-service-account/into/linux-5.15.29-guf
  • integrate/gitlab-ci/cleaos-552-build-cleaos-on-hamburgs-ci-servers-test/into/linux-5.15.29-guf
  • integrate/gitlab-ci/changelog-generator-all-projects/into/linux-5.15.29-guf
  • linux-5.15.29-guf-nallino-disable-cpuidle
  • linux-5.15.29-guf-sel6-8-and-lcd-ena
  • linux-5.10.104-guf protected
  • linux-5.15.29-guf-fix-rs485-for-mx6ull
  • linux-5.15.142-guf
  • santino_derive_dsp_clk_from_pll2
  • linux-5.15.29-guf-hwmon-lm85
  • add_bootlogo_5.15.29-guf
  • temp_emv_nallino
  • v5.15.29 protected
  • v5.10.106 protected
  • v5.4.185 protected
  • v5.15.28 protected
  • v5.10.105 protected
  • v5.4.184 protected
  • v5.15.27 protected
  • v5.10.104 protected
  • v5.4.183 protected
  • v5.15.26 protected
  • v5.10.103 protected
  • v5.4.182 protected
  • v5.15.25 protected
  • v5.10.102 protected
  • v5.4.181 protected
  • v5.15.24 protected
  • v5.10.101 protected
  • v5.4.180 protected
  • v5.15.23 protected
  • v5.10.100 protected
41 results

linux-guf

  • Open with
  • Download source code
  • Your workspaces

      A workspace is a virtual sandbox environment for your code in GitLab.

      No agents available to create workspaces. Please consult Workspaces documentation for troubleshooting.

  • user avatar
    Stefan Roese authored and Greg Kroah-Hartman committed
    commit 83dbf898 upstream.
    
    Masking all unused MSI-X entries is done to ensure that a crash kernel
    starts from a clean slate, which correponds to the reset state of the
    device as defined in the PCI-E specificion 3.0 and later:
    
     Vector Control for MSI-X Table Entries
     --------------------------------------
    
     "00: Mask bit:  When this bit is set, the function is prohibited from
                     sending a message using this MSI-X Table entry.
                     ...
                     This bit’s state after reset is 1 (entry is masked)."
    
    A Marvell NVME device fails to deliver MSI interrupts after trying to
    enable MSI-X interrupts due to that masking. It seems to take the MSI-X
    mask bits into account even when MSI-X is disabled.
    
    While not specification compliant, this can be cured by moving the masking
    into the success path, so that the MSI-X table entries stay in device reset
    state when the MSI-X setup fails.
    
    [ tglx: Move it into the success path, add comment and amend changelog ]
    
    Fixes: aa8092c1 ("PCI/MSI: Mask all unused MSI-X entries")
    Signed-off-by: default avatarStefan Roese <sr@denx.de>
    Signed-off-by: default avatarThomas Gleixner <tglx@linutronix.de>
    Cc: linux-pci@vger.kernel.org
    Cc: Bjorn Helgaas <bhelgaas@google.com>
    Cc: Michal Simek <michal.simek@xilinx.com>
    Cc: Marek Vasut <marex@denx.de>
    Cc: stable@vger.kernel.org
    Link: https://lore.kernel.org/r/20211210161025.3287927-1-sr@denx.de
    
    
    Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
    3dc6b5f2
    History
    Name Last commit Last update