-by: James Puthukattukaran
---
drivers/char/mem.c | 27 +++
1 file changed, 27 insertions(+)
diff --git a/drivers/char/mem.c b/drivers/char/mem.c
index ffeb60d..beaa374 100644
--- a/drivers/char/mem.c
+++ b/drivers/char/mem.c
@@ -355,10 +355,30 @@ static inline int
-by: James Puthukattukaran
---
drivers/char/mem.c | 27 +++
1 file changed, 27 insertions(+)
diff --git a/drivers/char/mem.c b/drivers/char/mem.c
index ffeb60d..beaa374 100644
--- a/drivers/char/mem.c
+++ b/drivers/char/mem.c
@@ -355,10 +355,30 @@ static inline int
ess 0xd000 -t pmem -l 32
0(0 ) : 20 00 00 01 40 08 00 04 f1 00 00 14 0a 00 ff 07
10 (16 ) : 65 f6 70 02 c0 05 00 00 a0 04 00 00 0b 00 00 00
James Puthukattukaran(1):
drivers/char/mem.c: Disable encryption bit in page tables for MMIO
access
drivers/char/mem.c |
ess 0xd000 -t pmem -l 32
0(0 ) : 20 00 00 01 40 08 00 04 f1 00 00 14 0a 00 ff 07
10 (16 ) : 65 f6 70 02 c0 05 00 00 a0 04 00 00 0b 00 00 00
James Puthukattukaran(1):
drivers/char/mem.c: Disable encryption bit in page tables for MMIO
access
drivers/char/mem.c |
nfig space access to become available by reading vendor id
3. Do a config write to the end point (errata workaround)
4. Enable ACS source validation (if it was enabled to begin with)
Signed-off-by: James Puthukattukaran <james.puthukattuka...@oracle.com>
Signed-off-by: Yinghai Lu <ying...@k
nfig space access to become available by reading vendor id
3. Do a config write to the end point (errata workaround)
4. Enable ACS source validation (if it was enabled to begin with)
Signed-off-by: James Puthukattukaran
Signed-off-by: Yinghai Lu
--
-v2: move workaround to pci_bus_read_dev_vendor
On 10/11/2017 03:27 PM, Bjorn Helgaas wrote:
On Tue, Sep 26, 2017 at 04:03:13PM -0400, Sinan Kaya wrote:
On 9/26/2017 3:52 PM, James Puthukattukaran wrote:
I think you want to do the part above as part of a quirk that runs before
the probe.
I don't think there's a way to run this early
On 10/11/2017 03:27 PM, Bjorn Helgaas wrote:
On Tue, Sep 26, 2017 at 04:03:13PM -0400, Sinan Kaya wrote:
On 9/26/2017 3:52 PM, James Puthukattukaran wrote:
I think you want to do the part above as part of a quirk that runs before
the probe.
I don't think there's a way to run this early
On 09/19/2017 07:36 PM, Sinan Kaya wrote:
On 9/18/2017 4:05 PM, James Puthukattukaran wrote:
Subject: [PATCH v7] PCI: Workaround wrong flags completions for IDT switch
From: James Puthukattukaran <james.puthukattuka...@oracle.com>
The IDT switch incorrectly flags an ACS source vio
On 09/19/2017 07:36 PM, Sinan Kaya wrote:
On 9/18/2017 4:05 PM, James Puthukattukaran wrote:
Subject: [PATCH v7] PCI: Workaround wrong flags completions for IDT switch
From: James Puthukattukaran
The IDT switch incorrectly flags an ACS source violation on a read config
request to an end point
Subject: [PATCH v7] PCI: Workaround wrong flags completions for IDT switch
From: James Puthukattukaran <james.puthukattuka...@oracle.com>
The IDT switch incorrectly flags an ACS source violation on a read config
request to an end point device on the completion (IDT 89H32H8G3-YC,
errata #36
Subject: [PATCH v7] PCI: Workaround wrong flags completions for IDT switch
From: James Puthukattukaran
The IDT switch incorrectly flags an ACS source violation on a read config
request to an end point device on the completion (IDT 89H32H8G3-YC,
errata #36) even though the PCI Express spec
From: James Puthukattukaran <james.puthukattuka...@oracle.com>
The IDT switch incorrectly flags an ACS source violation on a read config
request to an end point device on the completion (IDT 89H32H8G3-YC,
errata #36) even though the PCI Express spec states that completions are
never af
From: James Puthukattukaran
The IDT switch incorrectly flags an ACS source violation on a read config
request to an end point device on the completion (IDT 89H32H8G3-YC,
errata #36) even though the PCI Express spec states that completions are
never affected by ACS source violation (PCI Spec 3.1
On 07/03/2017 09:56 PM, Ethan Zhao wrote:
James,
On Tue, Jul 4, 2017 at 2:17 AM, james puthukattukaran
<james.puthukattuka...@oracle.com> wrote:
Ethan -
On 7/2/2017 9:55 PM, Ethan Zhao wrote:
James,
On Wed, Jun 28, 2017 at 5:42 AM, James Puthukattukaran
<james.puthukattuka...@o
On 07/03/2017 09:56 PM, Ethan Zhao wrote:
James,
On Tue, Jul 4, 2017 at 2:17 AM, james puthukattukaran
wrote:
Ethan -
On 7/2/2017 9:55 PM, Ethan Zhao wrote:
James,
On Wed, Jun 28, 2017 at 5:42 AM, James Puthukattukaran
wrote:
From: James Puthukattukaran
The IDT switch incorrectly
Ethan -
On 7/2/2017 9:55 PM, Ethan Zhao wrote:
James,
On Wed, Jun 28, 2017 at 5:42 AM, James Puthukattukaran
<james.puthukattuka...@oracle.com> wrote:
From: James Puthukattukaran <james.puthukattuka...@oracle.com>
The IDT switch incorrectly flags an ACS source violation on a
Ethan -
On 7/2/2017 9:55 PM, Ethan Zhao wrote:
James,
On Wed, Jun 28, 2017 at 5:42 AM, James Puthukattukaran
wrote:
From: James Puthukattukaran
The IDT switch incorrectly flags an ACS source violation on a read config
request to an end point device on the completion (IDT 89H32H8G3-YC
From: James Puthukattukaran <james.puthukattuka...@oracle.com>
The IDT switch incorrectly flags an ACS source violation on a read config
request to an end point device on the completion (IDT 89H32H8G3-YC,
errata #36) even though the PCI Express spec states that completions are
never af
From: James Puthukattukaran
The IDT switch incorrectly flags an ACS source violation on a read config
request to an end point device on the completion (IDT 89H32H8G3-YC,
errata #36) even though the PCI Express spec states that completions are
never affected by ACS source violation (PCI Spec 3.1
On 06/14/2017 07:32 AM, Bjorn Helgaas wrote:
On Tue, Jun 13, 2017 at 07:19:57PM -0400, James Puthukattukaran wrote:
On Jun 13, 2017, at 6:14 PM, Bjorn Helgaas <helg...@kernel.org> wrote:
On Tue, Jun 13, 2017 at 02:30:55PM -0400, james puthukattukaran wrote:
On 6/13/2017 1:00 PM, Ying
On 06/14/2017 07:32 AM, Bjorn Helgaas wrote:
On Tue, Jun 13, 2017 at 07:19:57PM -0400, James Puthukattukaran wrote:
On Jun 13, 2017, at 6:14 PM, Bjorn Helgaas wrote:
On Tue, Jun 13, 2017 at 02:30:55PM -0400, james puthukattukaran wrote:
On 6/13/2017 1:00 PM, Yinghai Lu wrote:
On Mon, Jun 12
> On Jun 13, 2017, at 6:14 PM, Bjorn Helgaas <helg...@kernel.org> wrote:
>
>> On Tue, Jun 13, 2017 at 02:30:55PM -0400, james puthukattukaran wrote:
>>> On 6/13/2017 1:00 PM, Yinghai Lu wrote:
>>>> On Mon, Jun 12, 2017 at 2:48 PM, Bjorn Helgaas <helg.
> On Jun 13, 2017, at 6:14 PM, Bjorn Helgaas wrote:
>
>> On Tue, Jun 13, 2017 at 02:30:55PM -0400, james puthukattukaran wrote:
>>> On 6/13/2017 1:00 PM, Yinghai Lu wrote:
>>>> On Mon, Jun 12, 2017 at 2:48 PM, Bjorn Helgaas wrote:
>>>>> On F
On 6/13/2017 1:00 PM, Yinghai Lu wrote:
On Mon, Jun 12, 2017 at 2:48 PM, Bjorn Helgaas <helg...@kernel.org> wrote:
On Fri, Jun 09, 2017 at 04:16:17PM -0700, Yinghai Lu wrote:
From: James Puthukattukaran <james.puthukattuka...@oracle.com>
The IDT switch incorrectly flags a
On 6/13/2017 1:00 PM, Yinghai Lu wrote:
On Mon, Jun 12, 2017 at 2:48 PM, Bjorn Helgaas wrote:
On Fri, Jun 09, 2017 at 04:16:17PM -0700, Yinghai Lu wrote:
From: James Puthukattukaran
The IDT switch incorrectly flags an ACS source violation on a read config
request to an end point device
So, the issue is that you could get the following sequence -
write command
print out in ISR for pending interrupt
ctrl_dbg message for write command
and this makes it look like the write command occurred after the pending
interrupt message?
On 02/23/2017 03:28 PM, Yinghai Lu wrote:
Bjorn
So, the issue is that you could get the following sequence -
write command
print out in ISR for pending interrupt
ctrl_dbg message for write command
and this makes it look like the write command occurred after the pending
interrupt message?
On 02/23/2017 03:28 PM, Yinghai Lu wrote:
Bjorn
I have a 4 socket AMD Operton system. The 2.6.18 kernel I have crashes
when there is no memory in node0.
--James
diff -uNr linux-2.6.18-orig/arch/x86_64/kernel/aperture.c
linux-2.6.18-new/arch/x86_64/kernel/aperture.c
--- linux-2.6.18-orig/arch/x86_64/kernel/aperture.c 2006-09-19
I have a 4 socket AMD Operton system. The 2.6.18 kernel I have crashes
when there is no memory in node0.
--James
diff -uNr linux-2.6.18-orig/arch/x86_64/kernel/aperture.c
linux-2.6.18-new/arch/x86_64/kernel/aperture.c
--- linux-2.6.18-orig/arch/x86_64/kernel/aperture.c 2006-09-19
30 matches
Mail list logo