The source for the Linux kernel used in Windows Subsystem for Linux 2 (WSL2)
Перейти к файлу
Mika Westerberg 71475936e6 i2c: ismt: Provide a DMA buffer for Interrupt Cause Logging
[ Upstream commit 17a0f3acdc ]

Before sending a MSI the hardware writes information pertinent to the
interrupt cause to a memory location pointed by SMTICL register. This
memory holds three double words where the least significant bit tells
whether the interrupt cause of master/target/error is valid. The driver
does not use this but we need to set it up because otherwise it will
perform DMA write to the default address (0) and this will cause an
IOMMU fault such as below:

  DMAR: DRHD: handling fault status reg 2
  DMAR: [DMA Write] Request device [00:12.0] PASID ffffffff fault addr 0
        [fault reason 05] PTE Write access is not set

To prevent this from happening, provide a proper DMA buffer for this
that then gets mapped by the IOMMU accordingly.

Signed-off-by: Mika Westerberg <mika.westerberg@linux.intel.com>
Reviewed-by: From: Andy Shevchenko <andriy.shevchenko@linux.intel.com>
Signed-off-by: Wolfram Sang <wsa@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2022-06-06 08:43:36 +02:00
Documentation random: fix sysctl documentation nits 2022-05-30 09:29:12 +02:00
LICENSES
arch KVM: arm64: Don't hypercall before EL2 init 2022-06-06 08:43:36 +02:00
block iocost: don't reset the inuse weight of under-weighted debtors 2022-05-09 09:14:31 +02:00
certs
crypto random: replace custom notifier chain with standard one 2022-05-30 09:29:10 +02:00
drivers i2c: ismt: Provide a DMA buffer for Interrupt Cause Logging 2022-06-06 08:43:36 +02:00
fs afs: Fix afs_getattr() to refetch file status if callback break occurred 2022-05-25 09:57:37 +02:00
include random: move randomize_page() into mm where it belongs 2022-05-30 09:29:17 +02:00
init random: handle latent entropy and command line from random_init() 2022-05-30 09:29:16 +02:00
ipc ipc/sem: do not sleep with a spin lock held 2022-02-08 18:34:03 +01:00
kernel timekeeping: Add raw clock fallback for random_get_entropy() 2022-05-30 09:29:13 +02:00
lib percpu_ref_init(): clean ->percpu_count_ref on failure 2022-06-06 08:43:36 +02:00
mm random: move randomize_page() into mm where it belongs 2022-05-30 09:29:17 +02:00
net net: af_key: check encryption module availability consistency 2022-06-06 08:43:36 +02:00
samples x86: Prepare inline-asm for straight-line-speculation 2022-05-15 20:18:50 +02:00
scripts x86: Add straight-line-speculation mitigation 2022-05-15 20:18:51 +02:00
security lockdown: also lock down previous kgdb use 2022-05-25 09:57:37 +02:00
sound ALSA: usb-audio: Don't get sample rate for MCT Trigger 5 USB-to-HDMI 2022-06-06 08:43:36 +02:00
tools selftests: add ping test with ping_group_range tuned 2022-05-25 09:57:35 +02:00
usr usr/include/Makefile: add linux/nfc.h to the compile-test coverage 2022-02-01 17:27:15 +01:00
virt KVM: avoid NULL pointer dereference in kvm_dirty_ring_push 2022-04-13 20:59:26 +02:00
.clang-format
.cocciconfig
.get_maintainer.ignore
.gitattributes
.gitignore
.mailmap mailmap: add Andrej Shadura 2021-10-18 20:22:03 -10:00
COPYING
CREDITS MAINTAINERS: Move Daniel Drake to credits 2021-09-21 08:34:58 +03:00
Kbuild
Kconfig
MAINTAINERS MAINTAINERS: add git tree for random.c 2022-05-30 09:28:59 +02:00
Makefile Linux 5.15.44 2022-05-30 09:29:18 +02:00
README

README

Linux kernel
============

There are several guides for kernel developers and users. These guides can
be rendered in a number of formats, like HTML and PDF. Please read
Documentation/admin-guide/README.rst first.

In order to build the documentation, use ``make htmldocs`` or
``make pdfdocs``.  The formatted documentation can also be read online at:

    https://www.kernel.org/doc/html/latest/

There are various text files in the Documentation/ subdirectory,
several of them using the Restructured Text markup notation.

Please read the Documentation/process/changes.rst file, as it contains the
requirements for building and running the kernel, and information about
the problems which may result by upgrading your kernel.