Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp1090745imm; Fri, 11 May 2018 10:56:07 -0700 (PDT) X-Google-Smtp-Source: AB8JxZq4TFo/9e8Vfevsy6glxrmVFzuf4dv+3CEHL+IuK3Z9H5bqF3MR/7RBpV6mQ7cUOaPGkLMD X-Received: by 2002:a65:508d:: with SMTP id r13-v6mr41832pgp.134.1526061367863; Fri, 11 May 2018 10:56:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526061367; cv=none; d=google.com; s=arc-20160816; b=jDQ7ARrt0Y8f+B4INEXiyfYvcqS6E/P6obPPMF/nxUGtm6yDxWN93gJZOGv/2MN4qA kklm9r7qHhe9RTsCypIodl8CWEPoEfg/JbBqrDOK5TvU00keUOeKm4PCtI/EKy4G7vJh yajIPsSdSCgpO2XXeCqrhw+0aPwWH2T1k9czeed5j++lUFrWLPtqrW+ui6mfF6l4RSG4 mPN4vpEkamiD2QFifdDMXaabd+/JBVIM2L8ci1SZuUS7ph1tok6fmgw+pZqZa72T54e+ v/Ji9/SoxJi41terlQeDoI5Y7HsKYLTqS29sFOnQf+lpQ+d3oYbogoU0dX6ctsQZP2wS W3bQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature:arc-authentication-results; bh=CaL2KmuRADVbjtByVrpveC6jd22sa85n+OV5rRB1hWw=; b=0VkOtAsCJsEr7JRt93xsywQdORfUmB/AwLQK0/QQxKpjb52QNPuGz6FqAZYj0u6lio yo5y9zHlNNA2D/IyPYZajM3flyKRZeSb4z83W86vUSUyKU04n2Z+WgJcxKbJpmFcnSgK 2TOEEbz1JB06koIUTenZE0Mbyxg/L95pOL+nnKm6fdez5dh1pheSbgDlHvX/3/sxTi/Q 3+E8l3uhvbyG5viskPVHYO/o2UUBApguSzYhl4wKG8JNrbjy/ITO8ZlUyxtftdz4eaDo EK4Ze3zhpnXVfhNo7pHj5EquuhxK3hrug6I3ScS4rB3wuh6YJ7msimkFxsaPPAlDFdvQ tVYA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kwcSEI1b; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w63-v6si2898464pgd.32.2018.05.11.10.55.52; Fri, 11 May 2018 10:56:07 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kwcSEI1b; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751430AbeEKRzl (ORCPT + 99 others); Fri, 11 May 2018 13:55:41 -0400 Received: from mail.kernel.org ([198.145.29.99]:40650 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750711AbeEKRzj (ORCPT ); Fri, 11 May 2018 13:55:39 -0400 Received: from localhost (unknown [69.55.156.246]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 262CA2177F; Fri, 11 May 2018 17:55:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1526061339; bh=VR4Ou8m0lEDqE3PJHNMHdE92sIzPp0zmL3PBKcyybNQ=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=kwcSEI1bwbaGMcQx4E1EETc/UQy1XQOvTYbH0K6x50ulgTansP69ShSOoB/Pzysqo 78YPXGgWTElevq5l1Nbp73h4/7N/d47mAq+FGZ9TamCfybjzM84A3U8s1R3CAFP0V7 Xgrj6L1fTfYZTHZSqvIy87R0W029TX0zBe3AiZiw= Date: Fri, 11 May 2018 12:55:38 -0500 From: Bjorn Helgaas To: Keith Busch Cc: Jesse Vincent , Sagi Grimberg , linux-pci@vger.kernel.org, Andrew Lutomirski , linux-kernel@vger.kernel.org, linux-nvme@lists.infradead.org, Jens Axboe , Bjorn Helgaas , Christoph Hellwig Subject: Re: Another NVMe failure, this time with AER info Message-ID: <20180511175538.GH190385@bhelgaas-glaptop.roam.corp.google.com> References: <20180511165752.GG190385@bhelgaas-glaptop.roam.corp.google.com> <20180511172610.GB7344@localhost.localdomain> <20180511174241.GC7344@localhost.localdomain> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180511174241.GC7344@localhost.localdomain> User-Agent: Mutt/1.9.2 (2017-12-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, May 11, 2018 at 11:42:42AM -0600, Keith Busch wrote: > On Fri, May 11, 2018 at 11:26:11AM -0600, Keith Busch wrote: > > I trust you know the offsets here, but it's hard to tell what this > > is doing with hard-coded addresses. Just to be safe and for clarity, > > I recommend the 'CAP_*+' with a mask. > > > > For example, disabling ASPM L1.2 can look like: > > > > # setpci -s CAP_PM+8.l=0:4 > > My mistake above: CAP_PM is a different capability, not the intended > one. It looks like setpci doesn't even have a convenient symbol for the > L1 PM extended capability, so the hard-coded offsets are the only way > for this setting. Sorry about the mistake. No problem, would be a nice janitor job to add more of those symbolic offsets to setpci. I recently added more cap ID decoding to lspci, but didn't think about updating these things for setpci. Using the symbols would definitely make this easier and better!