1. 28 9月, 2018 6 次提交
  2. 31 8月, 2018 7 次提交
  3. 02 8月, 2018 5 次提交
  4. 26 7月, 2018 5 次提交
  5. 29 5月, 2018 1 次提交
  6. 26 4月, 2018 2 次提交
  7. 27 3月, 2018 1 次提交
  8. 21 12月, 2017 2 次提交
  9. 28 11月, 2017 1 次提交
  10. 25 11月, 2017 2 次提交
    • S
      iwlwifi: fix access to prph when transport is stopped · 0232d2cd
      Sara Sharon 提交于
      When getting HW rfkill we get stop_device being called from
      two paths.
      One path is the IRQ calling stop device, and updating op
      mode and stack.
      As a result, cfg80211 is running rfkill sync work that shuts
      down all devices (second path).
      In the second path, we eventually get to iwl_mvm_stop_device
      which calls iwl_fw_dump_conf_clear->iwl_fw_dbg_stop_recording,
      that access periphery registers.
      The device may be stopped at this point from the first path,
      which will result with a failure to access those registers.
      Simply checking for the trans status is insufficient, since
      the race will still exist, only minimized.
      Instead, move the stop from iwl_fw_dump_conf_clear (which is
      getting called only from stop path) to the transport stop
      device function, where the access is always safe.
      This has the added value, of actually stopping dbgc before
      stopping device even when the stop is initiated from the
      transport.
      
      Fixes: 1efc3843 ("iwlwifi: stop dbgc recording before stopping DMA")
      Signed-off-by: NSara Sharon <sara.sharon@intel.com>
      Signed-off-by: NLuca Coelho <luciano.coelho@intel.com>
      0232d2cd
    • S
      iwlwifi: pcie: fix erroneous "Read failed message" · f3402d6d
      Sara Sharon 提交于
      Current pci dumping code code is always falling to the error
      path, resulting with a constant "Read failed" message, also
      for the successful reads.
      
      Fixes: a5c932e41fdd ("iwlwifi: pcie: dump registers when HW becomes inaccessible")
      Signed-off-by: NSara Sharon <sara.sharon@intel.com>
      Signed-off-by: NLuca Coelho <luciano.coelho@intel.com>
      f3402d6d
  11. 03 11月, 2017 1 次提交
  12. 25 10月, 2017 1 次提交
    • M
      locking/atomics: COCCINELLE/treewide: Convert trivial ACCESS_ONCE() patterns... · 6aa7de05
      Mark Rutland 提交于
      locking/atomics: COCCINELLE/treewide: Convert trivial ACCESS_ONCE() patterns to READ_ONCE()/WRITE_ONCE()
      
      Please do not apply this to mainline directly, instead please re-run the
      coccinelle script shown below and apply its output.
      
      For several reasons, it is desirable to use {READ,WRITE}_ONCE() in
      preference to ACCESS_ONCE(), and new code is expected to use one of the
      former. So far, there's been no reason to change most existing uses of
      ACCESS_ONCE(), as these aren't harmful, and changing them results in
      churn.
      
      However, for some features, the read/write distinction is critical to
      correct operation. To distinguish these cases, separate read/write
      accessors must be used. This patch migrates (most) remaining
      ACCESS_ONCE() instances to {READ,WRITE}_ONCE(), using the following
      coccinelle script:
      
      ----
      // Convert trivial ACCESS_ONCE() uses to equivalent READ_ONCE() and
      // WRITE_ONCE()
      
      // $ make coccicheck COCCI=/home/mark/once.cocci SPFLAGS="--include-headers" MODE=patch
      
      virtual patch
      
      @ depends on patch @
      expression E1, E2;
      @@
      
      - ACCESS_ONCE(E1) = E2
      + WRITE_ONCE(E1, E2)
      
      @ depends on patch @
      expression E;
      @@
      
      - ACCESS_ONCE(E)
      + READ_ONCE(E)
      ----
      Signed-off-by: NMark Rutland <mark.rutland@arm.com>
      Signed-off-by: NPaul E. McKenney <paulmck@linux.vnet.ibm.com>
      Cc: Linus Torvalds <torvalds@linux-foundation.org>
      Cc: Peter Zijlstra <peterz@infradead.org>
      Cc: Thomas Gleixner <tglx@linutronix.de>
      Cc: davem@davemloft.net
      Cc: linux-arch@vger.kernel.org
      Cc: mpe@ellerman.id.au
      Cc: shuah@kernel.org
      Cc: snitzer@redhat.com
      Cc: thor.thayer@linux.intel.com
      Cc: tj@kernel.org
      Cc: viro@zeniv.linux.org.uk
      Cc: will.deacon@arm.com
      Link: http://lkml.kernel.org/r/1508792849-3115-19-git-send-email-paulmck@linux.vnet.ibm.comSigned-off-by: NIngo Molnar <mingo@kernel.org>
      6aa7de05
  13. 06 10月, 2017 1 次提交
    • R
      iwlwifi: pcie: dump registers when HW becomes inaccessible · a6d24fad
      Rajat Jain 提交于
      We conclude the HW became inaccessible when we timeout waiting for
      a bit to be set in a memory mapped register (CSR_GP_CNTRL). This
      conclusion may not be true because the bit may not get set due to:
      - a firmware issue
      - a driver issue
      - a PCI bus issue
      - a platform issue
      There are a lot of such reports with really no good debug information
      beyond this message to help us.
      
      Add some debug information and attempt to dump the different register
      spaces at such a failure:
      
      * Dump some configuration space of device - this will tell us if
      something very basic is broken in the PCIe bus (so that configuration
      accesses are failing). If this works, the PCIe bus seems OK. If this
      does not work, it is definitely an PCIe issue.
      
      * Dump some memory mapped registers - if we're reading some sane'ish
      values, this will tell us that the PCIe bus is OK, but may be a firmware
      / driver issue. If this does not work, it may be a PCI configuration
      issue or a driver/firmware issue.
      
      * Dump parent and device's AER registers, will give us some straws to
      chew on.
      
      This is the sample output:
      [   13.082651] ------------[ cut here ]------------
      [   13.086791] iwlwifi 0000:01:00.0: iwlwifi transaction failed, dumping registers
      [   13.086793] iwlwifi 0000:01:00.0: iwlwifi device config registers:
      [   13.086893] iwlwifi 0000:01:00.0: 00000000: 095a8086 00100406 02800059 00000000 00000004 00000000 00000000 00000000
      [   13.086895] iwlwifi 0000:01:00.0: 00000020: 00000000 00000000 00000000 50108086 00000000 000000c8 00000000 00000100
      [   13.086901] iwlwifi 0000:01:00.0: iwlwifi device memory mapped registers:
      [   13.086989] iwlwifi 0000:01:00.0: 00000000: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff
      [   13.086991] iwlwifi 0000:01:00.0: 00000020: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff
      [   13.086999] iwlwifi 0000:01:00.0: iwlwifi device AER capability structure:
      [   13.087033] iwlwifi 0000:01:00.0: 00000000: 14010001 00100000 00000000 00462031 00002000 00002000 00000014 40000001
      [   13.087034] iwlwifi 0000:01:00.0: 00000020: 0000000f d140000c 00000000
      [   13.087036] iwlwifi 0000:01:00.0: iwlwifi parent port (0000:00:1c.0) config registers:
      [   13.087074] iwlwifi 0000:00:1c.0: 00000000: 9d108086 00100506 060400f1 00810010 00000000 00000000 00010100 200000f0
      [   13.087075] iwlwifi 0000:00:1c.0: 00000020: d140d140 0001fff1 00000000 00000000 00000000 00000040 00000000 0006010b
      [   13.087087] ------------[ cut here ]------------
      [   13.087095] WARNING: CPU: 0 PID: 1759 at drivers/net/wireless/iwl7000/iwlwifi/pcie/trans.c:2082 iwl_trans_pcie_reclaim+0x1ee4/0x2b9a [iwlwifi]()
      [   13.087096] Timeout waiting for hardware access (CSR_GP_CNTRL 0xffffffff)
      Signed-off-by: NRajat Jain <rajatja@google.com>
      Signed-off-by: NLuca Coelho <luciano.coelho@intel.com>
      a6d24fad
  14. 24 8月, 2017 1 次提交
    • L
      iwlwifi: pcie: move rx workqueue initialization to iwl_trans_pcie_alloc() · 10a54d81
      Luca Coelho 提交于
      Work queues cannot be allocated when a mutex is held because the mutex
      may be in use and that would make it sleep.  Doing so generates the
      following splat with 4.13+:
      
      [   19.513298] ======================================================
      [   19.513429] WARNING: possible circular locking dependency detected
      [   19.513557] 4.13.0-rc5+ #6 Not tainted
      [   19.513638] ------------------------------------------------------
      [   19.513767] cpuhp/0/12 is trying to acquire lock:
      [   19.513867]  (&tz->lock){+.+.+.}, at: [<ffffffff924afebb>] thermal_zone_get_temp+0x5b/0xb0
      [   19.514047]
      [   19.514047] but task is already holding lock:
      [   19.514166]  (cpuhp_state){+.+.+.}, at: [<ffffffff91cc4baa>] cpuhp_thread_fun+0x3a/0x210
      [   19.514338]
      [   19.514338] which lock already depends on the new lock.
      
      This lock dependency already existed with previous kernel versions,
      but it was not detected until commit 49dfe2a6 ("cpuhotplug: Link
      lock stacks for hotplug callbacks") was introduced.
      Reported-by: NDavid Weinehall <david.weinehall@intel.com>
      Reported-by: NJiri Kosina <jikos@kernel.org>
      Signed-off-by: NLuca Coelho <luciano.coelho@intel.com>
      Signed-off-by: NKalle Valo <kvalo@codeaurora.org>
      10a54d81
  15. 18 8月, 2017 2 次提交
  16. 10 8月, 2017 1 次提交
  17. 09 8月, 2017 1 次提交