Received: by 10.223.176.5 with SMTP id f5csp1009652wra; Tue, 30 Jan 2018 23:32:49 -0800 (PST) X-Google-Smtp-Source: AH8x225egtBZP5/jBVfOaEBk+rXfeHM97fNj0TmjbtQxxoYNhCyE8CViZyfHwEpt6Pe+Eo/VosC4 X-Received: by 10.98.0.194 with SMTP id 185mr15351288pfa.63.1517383969842; Tue, 30 Jan 2018 23:32:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517383969; cv=none; d=google.com; s=arc-20160816; b=Ir3nVISEwx7/cGoCT+GNOmIBk4uHig77QKCMyfRVYbLXo+D9pPIZxA6J/eNPK6q3eu CMJs0u5Itcw4iOMwng+tiRMkpurUP+AaefGf+OM/LS8FYiZI+uO1WtaaqX/zp/SnmB1X 9fEkWyQURmiwtCh6aFtcsSQ0a9T15Y3A2ArufbYgO8kZv0eaupFkuj8vOyEbPBXWI8Xa 9ONvxyBTesuY3jXLOYM5NNfF5IhgKXRcHORQslJY7uhx57CubKHQc/1nGg4rCz2jkVSv DOUeGP103sEcNkwU97ZI1UX8LKDQ/+H4gjemJHeeZBhlDKmYSsGLTSs2fLUPsvdc7b/F 2zUw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=F9NXXh8JLhgDk49iSRo34K1VAWG6di9u1lRW8TXR14Q=; b=EK/UnHNosFWttxp3MLUtAEbVi4IbXrBDASz/BnZDZ96FE1A4qQQsW3TAtnSqcJrgvk 3Qa7l127XIdUaIduEBnTh2wYe9ShcPH6AIv/vJIndDDzBl+a8VNXoSxTC3cOrQ2NnaBi kTjKMi762gF3m7wNMXhR094+eEcCHJKuNTfk/znuIsMM4TlwzZMmAxGsY3BwpajpcZzg k6mW569llY/b/9ielQ9Uje+7dwikQKRWLhMoGE1F2NhNA07GfbxJTDUzIVGDPIeTJzCn N3r14LRyz1xfhQ7p+HjFe6qrJp5rlClxATB72Hk1B9yQ8UxAys5BH7qwvrZWMVz2NM7v C4uw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j12si10485182pga.150.2018.01.30.23.32.34; Tue, 30 Jan 2018 23:32:49 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753257AbeAaHbQ (ORCPT + 99 others); Wed, 31 Jan 2018 02:31:16 -0500 Received: from mx2.suse.de ([195.135.220.15]:44680 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752664AbeAaHbO (ORCPT ); Wed, 31 Jan 2018 02:31:14 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id E6D97AC64; Wed, 31 Jan 2018 07:31:12 +0000 (UTC) Date: Wed, 31 Jan 2018 16:31:05 +0900 From: Benjamin Poirier To: Alexander Duyck Cc: Jeff Kirsher , Netdev , intel-wired-lan , linux-kernel@vger.kernel.org Subject: Re: [Intel-wired-lan] [RFC PATCH] e1000e: Remove Other from EIAC. Message-ID: <20180131073105.7tqyzylc76wjyoav@f1.synalogic.ca> References: <20180118065054.29844-1-bpoirier@suse.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20170912 (1.9.0) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2018/01/30 11:46, Alexander Duyck wrote: > On Wed, Jan 17, 2018 at 10:50 PM, Benjamin Poirier wrote: > > It was reported that emulated e1000e devices in vmware esxi 6.5 Build > > 7526125 do not link up after commit 4aea7a5c5e94 ("e1000e: Avoid receiver > > overrun interrupt bursts", v4.15-rc1). Some tracing shows that after > > e1000e_trigger_lsc() is called, ICR reads out as 0x0 in e1000_msix_other() > > on emulated e1000e devices. In comparison, on real e1000e 82574 hardware, > > icr=0x80000004 (_INT_ASSERTED | _OTHER) in the same situation. > > > > Some experimentation showed that this flaw in vmware e1000e emulation can > > be worked around by not setting Other in EIAC. This is how it was before > > 16ecba59bc33 ("e1000e: Do not read ICR in Other interrupt", v4.5-rc1). > > > > Fixes: 4aea7a5c5e94 ("e1000e: Avoid receiver overrun interrupt bursts") > > Signed-off-by: Benjamin Poirier > > --- > > Hi Benjamin, > > How would you feel about resubmitting this patch for net? > > We have some issues that have come up and it would be useful to have > this fixed in the kernel sooner rather than later. I would be okay > with us applying it for now while we work on coming up with a more > complete solution. Ok, I've resent it in its original form. Once it's in mainline I'll rebase the cleanups.