Received: by 2002:a05:6a10:c604:0:0:0:0 with SMTP id y4csp3772284pxt; Tue, 10 Aug 2021 10:59:02 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyGLEZMV4EmnGd97jMEnvD0DV+kWCqWmeXimxsoeJ5zDGnsMoRB+7s/TVDSdgnDd2JwmnZ/ X-Received: by 2002:a17:906:f854:: with SMTP id ks20mr11109174ejb.421.1628618341838; Tue, 10 Aug 2021 10:59:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1628618341; cv=none; d=google.com; s=arc-20160816; b=G/B/AiXzW8xQjgKlLEQxR6iLy9Pj61kPoYg4K/SzrfYo/HDBPaTMVj4Ywd3ECTPogz g0YQT53h63gvCWCufxaOOisuEkg2LnwEFsyR3W8fWv+Ujw4KLPPAqY4mdoTm7tkeA5W/ XEaIE1aeqIh2P1zVOMsQ/sVT9fK5WNZWryA5A4CqXUguVn0az1QkWvD69VTj1ByRvXNc saaN6BqP60LGpXa2Zcpy0NaEBjLyviUClA5GIccacR0dgHIud2tVbDsVBgwueu9L7Gtr azJcBpIFa8Gm2dxEYOEMbmWO1amj/IDoLTjGyR5gQYV+j9BKWYivXjo7i5qD+kFicayo znUw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=NUC8INbyg6zcI8QFYXmka25E06y/tJVELrR9dhS8qts=; b=lobmCyNL2LF67ByYX5iqwqhm8jpumgVXDgdBVw7ZwCdnM4aB+wkYfbZgICcaigXy4y 2aOwqRtYlwgNGC5AvDVSRyqyUr7rsF/P1JQZiX95MXrm8xMLySDibnZw8TyxvrYuIF0b Razl0ggPolztbHyApMMi/523/+0Bp/xZIE6cuuZA/rX5t4RV2iqL6yid+lly5rGXnf6F WRZRlwoeg2MFkqT8oADmAqiH0v/ai18VOAqL5L32t1j6p+ZXD6wKsXXSblgVlV/oWfvl AJoi3v9OkYu9W4t5HYy794bBCbGooiIYqbVRTdfaBflwcoO3fP9AKfwVhqMqTlAGVZIR l3mQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=xy4lIt9O; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v2si22944969edc.86.2021.08.10.10.58.36; Tue, 10 Aug 2021 10:59:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=xy4lIt9O; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237319AbhHJRyb (ORCPT + 99 others); Tue, 10 Aug 2021 13:54:31 -0400 Received: from mail.kernel.org ([198.145.29.99]:38632 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234009AbhHJRur (ORCPT ); Tue, 10 Aug 2021 13:50:47 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 2E7826128A; Tue, 10 Aug 2021 17:42:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1628617369; bh=pxdcajNLaLvmQ73OywZF1/YpJ+HyWkP/NPbM+75Dqjg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=xy4lIt9Oz4RfpXMWEWysv/Dh7qVB2rTXMYh+eiPN0oWGConxcJqjmR2xJFo3A9Wce 7pozOzyWLsgkmmm/mfXmMwo2B9oUIkFMD6M/XQ4GnzgZ2QIX119/Ppw9/Ej6AjRtzG pvI3WCOCztPIB60qz1copZLjHE/l5pbg4SDMyT08= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Vinod Koul , Sasha Levin , Dave Jiang Subject: [PATCH 5.13 007/175] dmaengine: idxd: fix setup sequence for MSIXPERM table Date: Tue, 10 Aug 2021 19:28:35 +0200 Message-Id: <20210810173001.183325233@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210810173000.928681411@linuxfoundation.org> References: <20210810173000.928681411@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dave Jiang [ Upstream commit d5c10e0fc8645342fe5c9796b00c84ab078cd713 ] The MSIX permission table should be programmed BEFORE request_irq() happens. This prevents any possibility of an interrupt happening before the MSIX perm table is setup, however slight. Fixes: 6df0e6c57dfc ("dmaengine: idxd: clear MSIX permission entry on shutdown") Sign-off-by: Dave Jiang Link: https://lore.kernel.org/r/162456741222.1138073.1298447364671237896.stgit@djiang5-desk3.ch.intel.com Signed-off-by: Vinod Koul Signed-off-by: Sasha Levin --- drivers/dma/idxd/init.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/drivers/dma/idxd/init.c b/drivers/dma/idxd/init.c index 442d55c11a5f..4bc80eb6b9e7 100644 --- a/drivers/dma/idxd/init.c +++ b/drivers/dma/idxd/init.c @@ -102,6 +102,8 @@ static int idxd_setup_interrupts(struct idxd_device *idxd) spin_lock_init(&idxd->irq_entries[i].list_lock); } + idxd_msix_perm_setup(idxd); + irq_entry = &idxd->irq_entries[0]; rc = request_threaded_irq(irq_entry->vector, NULL, idxd_misc_thread, 0, "idxd-misc", irq_entry); @@ -148,7 +150,6 @@ static int idxd_setup_interrupts(struct idxd_device *idxd) } idxd_unmask_error_interrupts(idxd); - idxd_msix_perm_setup(idxd); return 0; err_wq_irqs: @@ -162,6 +163,7 @@ static int idxd_setup_interrupts(struct idxd_device *idxd) err_misc_irq: /* Disable error interrupt generation */ idxd_mask_error_interrupts(idxd); + idxd_msix_perm_clear(idxd); err_irq_entries: pci_free_irq_vectors(pdev); dev_err(dev, "No usable interrupts\n"); -- 2.30.2