lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20230127201001.GA1412182@bhelgaas> Date: Fri, 27 Jan 2023 14:10:01 -0600 From: Bjorn Helgaas <helgaas@...nel.org> To: Vidya Sagar <vidyas@...dia.com> Cc: bhelgaas@...gle.com, sathyanarayanan.kuppuswamy@...ux.intel.com, rafael.j.wysocki@...el.com, kai.heng.feng@...onical.com, linux-pci@...r.kernel.org, linux-kernel@...r.kernel.org, treding@...dia.com, jonathanh@...dia.com, kthota@...dia.com, mmaddireddy@...dia.com, sagar.tv@...il.com Subject: Re: [PATCH V1] PCI/ASPM: Update saved buffers with latest ASPM configuration On Wed, Jan 25, 2023 at 07:08:30PM +0530, Vidya Sagar wrote: > Many PCIe device drivers save the configuration state of their respective > devices during probe and restore the same when their 'slot_reset' hook > is called through PCIe Error Recovery System. > If the system has a change in ASPM policy after the driver's probe is > called and before error event occurred, 'slot_reset' hook restores the > PCIe configuration state to what it was at the time of probe but not with > what it was just before the occurrence of the error event. > This effectively leads to a mismatch in the ASPM configuration between > the device and its upstream parent device. > This patch addresses that issue by updating the saved configuration state > of the device with the latest info whenever there is a change w.r.t ASPM > policy. Please use blank lines between paragraphs. Inferring "new paragraph" from "last line was shorter than usual" is error-prone and hard to read. Omit "this patch" (that part is obvious) and use imperative mood: https://chris.beams.io/posts/git-commit/ https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/Documentation/process/submitting-patches.rst?id=v6.0#n94
Powered by blists - more mailing lists