Message ID | 20220513215421.30945-1-michael.reed@canonical.com |
---|---|
Headers | show
Return-Path: <kernel-team-bounces@lists.ubuntu.com> X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: bilbo.ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=canonical.com header.i=@canonical.com header.a=rsa-sha256 header.s=20210705 header.b=sBWgBMnn; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=<UNKNOWN>) Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by bilbo.ozlabs.org (Postfix) with ESMTPS id 4L0N3G1k2bz9sBF for <incoming@patchwork.ozlabs.org>; Sat, 14 May 2022 08:04:26 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from <kernel-team-bounces@lists.ubuntu.com>) id 1npdF1-0000CE-29; Fri, 13 May 2022 21:54:31 +0000 Received: from smtp-relay-internal-1.internal ([10.131.114.114] helo=smtp-relay-internal-1.canonical.com) by huckleberry.canonical.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from <michael.reed@canonical.com>) id 1npdEy-0000C6-Uv for kernel-team@lists.ubuntu.com; Fri, 13 May 2022 21:54:28 +0000 Received: from mail-oi1-f198.google.com (mail-oi1-f198.google.com [209.85.167.198]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-1.canonical.com (Postfix) with ESMTPS id BFA153F949 for <kernel-team@lists.ubuntu.com>; Fri, 13 May 2022 21:54:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1652478868; bh=R+l4d1tcjt1UCK7k+v9JtFUgCu2F96dUPx5FEenexXw=; h=From:To:Subject:Date:Message-Id:MIME-Version; b=sBWgBMnnkbL1BlIe3yJ/5bMoHIsHJYQfDyTQ1v220d0xT66JqlFgSdu0iqUnq4X3l Ot2m9sbIRcUwz1Mg3tZR8gAJ4yWHeshLa/lyhC+mAWvog/luwkjL5ah2mIfjIGZQYM 5gZAcU351aISSr/UEl1apFgzdGWNSc/Nc3RuSC7V64Bx8eSMIYL51LmUi/cgf/Bd8Q b3mduRPVzDaiK6RMsOnwqx3bY8cxAWul3cgBUvRUfl8zVY7MHg+IpLnvXwA772H6LJ gmnzWaSveijH02u5wn3uf7P0sL/j51s37ZWoGxu+Cx5nTR0vih8ZlsWVOJM0n2L022 Nj0sdOQhORzJQ== Received: by mail-oi1-f198.google.com with SMTP id s41-20020a05680820a900b003266b4fcd6eso3347343oiw.4 for <kernel-team@lists.ubuntu.com>; Fri, 13 May 2022 14:54:28 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:subject:date:message-id:mime-version :content-transfer-encoding; bh=R+l4d1tcjt1UCK7k+v9JtFUgCu2F96dUPx5FEenexXw=; b=O3ynLOqXQ1CTCr8xT4RygHBGhMn++pMkkF2qkJiv7/Jn7fWTQIHrq2cXoHijpCxZpX 7TL6IxeshKaSsLYxpnjcmC2vivu34b22iYDbA8wbrCVWIuVqUV9H408qXxKGRiJJvtUy N4/HxrFoPOn4OrehZbEa6Wo8zgWOb7cOdbgftCXo8U61QOewFl1XlHYFMe4DQJXW0ugL WAQWw5XGH7hvEEm/n0mUneqVVyMPai6ZqqxqVL3XskrMJZjWdHj3GBtSjIszqqdjGhVT BuodpGcpMOmvvkbeQ7rtpc07CA4L4jFGpAAwoJf0Olbyqe0L0JSSv2eDwzeG5dZRdrsI lCIQ== X-Gm-Message-State: AOAM530CJro7sTIWTiA9JtmamMxRP73JkYAMyqFhAv8oDhuj0h83kS9j GsO+krWDOu4aTfcUAjC+eDfL3xADMltN5S+I5CrmnoxSn3VBcb4vcSaFYlZPF/eIDwQFTlMCAU2 dbLyk/4kMHhJZ3fMaUs/L4MXCym4EXSTJ/D68PUh43A== X-Received: by 2002:a05:6808:10d6:b0:326:d4b2:83b with SMTP id s22-20020a05680810d600b00326d4b2083bmr8477457ois.92.1652478867502; Fri, 13 May 2022 14:54:27 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw8YwVtDhkoiI6Qqp3gB3wXNOqxNdjdWeTaZJBX/T938uIE2kEOBKbY59vteR67PlduKItcxg== X-Received: by 2002:a05:6808:10d6:b0:326:d4b2:83b with SMTP id s22-20020a05680810d600b00326d4b2083bmr8477449ois.92.1652478867151; Fri, 13 May 2022 14:54:27 -0700 (PDT) Received: from localhost (104-54-219-103.lightspeed.austtx.sbcglobal.net. [104.54.219.103]) by smtp.gmail.com with ESMTPSA id x60-20020a9d37c2000000b0060626a8e5a4sm1437620otb.74.2022.05.13.14.54.26 for <kernel-team@lists.ubuntu.com> (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 13 May 2022 14:54:26 -0700 (PDT) From: Michael Reed <michael.reed@canonical.com> To: kernel-team@lists.ubuntu.com Subject: [SRU][J][PATCH 0/3] DPC Fixes for Failure Cases of DownPort Containment events Date: Fri, 13 May 2022 16:54:18 -0500 Message-Id: <20220513215421.30945-1-michael.reed@canonical.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions <kernel-team.lists.ubuntu.com> List-Unsubscribe: <https://lists.ubuntu.com/mailman/options/kernel-team>, <mailto:kernel-team-request@lists.ubuntu.com?subject=unsubscribe> List-Archive: <https://lists.ubuntu.com/archives/kernel-team> List-Post: <mailto:kernel-team@lists.ubuntu.com> List-Help: <mailto:kernel-team-request@lists.ubuntu.com?subject=help> List-Subscribe: <https://lists.ubuntu.com/mailman/listinfo/kernel-team>, <mailto:kernel-team-request@lists.ubuntu.com?subject=subscribe> Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" <kernel-team-bounces@lists.ubuntu.com> |
Series |
DPC Fixes for Failure Cases of DownPort Containment events
|
expand
|
From: Michael Reed <Michael.Reed@canonical.com> BugLink: https://bugs.launchpad.net/bugs/1965241 SRU Justification: [Impact] Recovery from DownPort Containment events fail and the NVMe endpoint is not accessible in some scenarios. [Fix] These are some of the DPC fixes which help in handling some of the failure cases of DownPort Containment events. Upstream kernel patches to be included into Ubuntu 22.04 and into Ubuntu 20.04.5: Already in Jammy as of Ubuntu-5.15.0-1.1 PCI/portdrv: Enable Bandwidth Notification only if port supports it https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.17-rc6&id=00823dcbdd415c868390feaca16f0265101efab4 PCI: pciehp: Ignore Link Down/Up caused by error-induced Hot Reset https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.17-rc6&id=ea401499e943c307e6d44af6c2b4e068643e7884 3134689f98 PCI/portdrv: Rename pm_iter() to pcie_port_device_iter() [Test Case] 1. Disable the memory space of NVMe end point device 2. Issue IO to the device 3. Observe dmesg. dmesg shows that EDR event is generated, link is contained and NVMe device is recovered. 2. Observe the dmesg [Other Info] https://code.launchpad.net/~mreed8855/ubuntu/+source/linux/+git/jammy/+ref/test_dpc_1965241 Lukas Wunner (2): PCI/portdrv: Rename pm_iter() to pcie_port_device_iter() PCI: pciehp: Ignore Link Down/Up caused by error-induced Hot Reset Michael Reed (1): Enable config option CONFIG_PCIE_EDR .../config/amd64/config.common.amd64 | 7 +- debian.master/config/annotations | 2 +- .../config/arm64/config.common.arm64 | 5 + .../config/armhf/config.common.armhf | 5 + debian.master/config/config.common.ubuntu | 5 - .../config/ppc64el/config.common.ppc64el | 5 + .../config/s390x/config.common.s390x | 5 + debian/canonical-certs.pem | 246 + debian/canonical-revoked-certs.pem | 86 + debian/changelog | 17464 ++++++++++++++++ debian/control | 584 + debian/copyright | 29 + debian/scripts/fix-filenames.c | 0 debian/scripts/sub-flavour | 0 drivers/pci/hotplug/pciehp.h | 2 + drivers/pci/hotplug/pciehp_core.c | 2 + drivers/pci/hotplug/pciehp_hpc.c | 26 + drivers/pci/pcie/portdrv.h | 3 + drivers/pci/pcie/portdrv_core.c | 20 +- drivers/pci/pcie/portdrv_pci.c | 3 + scripts/ubuntu-retpoline-extract-one | 270 + 21 files changed, 18752 insertions(+), 17 deletions(-) create mode 100644 debian/canonical-certs.pem create mode 100644 debian/canonical-revoked-certs.pem create mode 100644 debian/changelog create mode 100644 debian/control create mode 100644 debian/copyright mode change 100644 => 100755 debian/scripts/fix-filenames.c mode change 100644 => 100755 debian/scripts/sub-flavour create mode 100755 scripts/ubuntu-retpoline-extract-one