Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp1238431ybi; Thu, 30 May 2019 14:01:28 -0700 (PDT) X-Google-Smtp-Source: APXvYqw/7sm3a27gPJg9queQwAYoNkQyiyk+jMOZsCy6CI9X1If2gPUjv4GCmsjR/to40RQQ99Gm X-Received: by 2002:a65:4649:: with SMTP id k9mr5615302pgr.239.1559250088175; Thu, 30 May 2019 14:01:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559250088; cv=none; d=google.com; s=arc-20160816; b=LXXnO9RJo8KVKaDjeSXIyM3uqUWODxqWmHnDcxS7kDdw8Cm3zvJcSHRz1t6DuzeEQ4 PEr49NCM2fizcKwDYBvNS9ddvb1nhhEROuorMc/GV7yS2FSbpyo4yfIz2lg2IeVlN9LE kZiUSPmZZG3w/YtyQf5SsTTIvMKPVM+COoe5R+kigyMt8b1BhyaCc0kqiw7y8AQV+L5J YyxnlxUfHdKqNKqTgAXwIUUlTYuXGh0tqBeHEPuSLHYsl0zBssdm8K8rWPbft+oUI+Ac XcNsRRl9mMh8XGa86nmMnp0F98Q1YjeDJUPqFWeWp5qY72rKgGPtIOWXNaSy1sylz0gG GeLw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=17Fb7olTzfMpqxtpmQcYIY64VVhbI2hfJMssij+BSwo=; b=snTZvv+HX9nu6nzc6ZDyhsxJTfBQSS+Oz/lptLFxoUFjZ2OyutPaJmAImZi40xT7Jo rFg8IcESyU4NNmbeP+juwF6mim/gv45rBn4K43tLOK2J0oy1YM2GnNb9ZwE5BP7GdsMy EKqcrsgDjseSs4tYI/pxmVROmJ0Kmkza99QlxkFDYSUxhiy2AnEXog2CncpE27It6piK +9AOrr+X0Ir7lIN56TRxOcQ2CHRKbipcloKg2ggYo9zqBE2P8d92ETuBiVHkNGgyQJkf qkIsXzANm4aDb2/+yGKPdjyhJaUo+CdKgBvrfjcKC+HJgce0407OF0ZHdKZz/0NDglg+ l+qQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kj+YxR0P; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o6si4011311pgh.163.2019.05.30.14.01.10; Thu, 30 May 2019 14:01:28 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kj+YxR0P; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726538AbfE3U61 (ORCPT + 99 others); Thu, 30 May 2019 16:58:27 -0400 Received: from mail.kernel.org ([198.145.29.99]:36060 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726125AbfE3U60 (ORCPT ); Thu, 30 May 2019 16:58:26 -0400 Received: from localhost (unknown [69.71.4.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B06D526197; Thu, 30 May 2019 20:58:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1559249906; bh=RzysyGPyd/1YfGrfUAerdAkUBe+i+zzpSKAftG8O6q4=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=kj+YxR0PJOduRngkGNK3NVnrXL+3fjj0Twq+mHpZ8YnphK3kahYWsfVtl2Ac2Ozi3 9ywGdtXK4eqjk3jhGVVwxONwO+OMq1nms6trKDSwUXataFp0iQ6kkV1ErsXM9OkjnI QrRU0Kh+8BQvHzqdY8mbuZEbwnl7ILpxn20AWMNY= Date: Thu, 30 May 2019 15:58:23 -0500 From: Bjorn Helgaas To: Himanshu Madhani Cc: Andrew Vasquez , Girish Basrur , Giridhar Malavali , Myron Stowe , Linux Kernel Mailing List , Quinn Tran , Linux PCI Subject: Re: [EXT] VPD access Blocked by commit 0d5370d1d85251e5893ab7c90a429464de2e140b Message-ID: <20190530205823.GA45696@google.com> References: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, May 30, 2019 at 07:33:01PM +0000, Himanshu Madhani wrote: > We are able to successfully read VPD config data using lspci and cat > command Yes, you mentioned that in the very first email. I was hoping you would include the actual data, e.g., "cat vpd | xxd". That would help us figure out why you don't see the panic any more. I suspect either: - new QLogic firmware fixed the structure of the VPD data so Linux no longer attempts to read past the end of the implemented region, or, - we still read past the end of the implemented VPD region, but the device doesn't report an error or the platform deals with the error without causing a panic. > We also verified this same configuration on a SuperMicro X10SRA-F > server (which i had sent in earlier email)’ and were able to verify > that the VPD read was good and there were no errors on PCIe trace. Since you saw no PCIe errors here, this suggests that new firmware has changed the format of the VPD data. > Given this information, Please consider reverting the patch until we > further debug the issue and resolve as it is affecting general > availability of our adapter. 1) The way Linux works is that you would post a patch that does the revert you'd like to see done. 2) It's unlikely that a simple revert of 0d5370d1d852 ("PCI: Prevent VPD access for QLogic ISP2722") is the right answer because that would make Ethan's machine panic again. It's possible that a QLogic firmware update would avoid the panic, but we can't simply revert the patch and force users to do that update. If a QLogic firmware update indeed fixed the VPD format, I suggest that you ask the folks responsible for the firmware to identify the specific version where that was fixed and how the OS can figure that out. Then you could make a new quirk specific to this device that allows VPD reads if the adapter has new enough firmware. If it finds older firmware, it could even print a message suggesting that users could update the firmware if they need to read VPD data. Bjorn