Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp4692388ybi; Mon, 3 Jun 2019 15:42:00 -0700 (PDT) X-Google-Smtp-Source: APXvYqy7oSh6focEo+e/Adav+CDe4w2c/s+U4Cxas+UGolOIGgliYtQhQHQXqPsTCpwg90h+sMcU X-Received: by 2002:a17:902:9a4c:: with SMTP id x12mr30971636plv.298.1559601720339; Mon, 03 Jun 2019 15:42:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559601720; cv=none; d=google.com; s=arc-20160816; b=0L+xeRbnNL3bEAmid3WqNydaC/zn5Yq7qdKz8Mw+3pARgTcbErG6w5zpr/T777koLW dRIB6phkgSHvi5onxOuxO6w5hKqXyspB7JfoBSVMuWxzbIVcj0WSValtSkTZoO7wqy8+ DthQv4pq69HawoBWFHu+jL0s4vV1uRDC5wBwZ5WdTLowmLelEhbUkLFEp1hH/GNle3mA JS09ByiZyR9m+LuTcNyiRjlkQfCDCqDN6SQqSnRbCQpcggCGqVGYvPnKXS4zPrLivvxZ SU/D0o62wa3Yix0NfLR5MbRtHw3IZAum6ZP1h6JSL2sBqc2p4cqlRbW8JE6YIjkdXPqE Xfaw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=RdDjGDi0aRv3x5bgWDXUCqt4WbcYmLPcmNbzZwFA+9M=; b=SrwMTe3quXzyNyI9vtT4CyNam8ogBe+2XBXtuVAH5MnWDerx2GJw6gO7+5TLuSmo+F I5n4e6X0JOIWsz6DYI683vZ1UcXl9enkgQGNzGB+tQtj9Vlrsf1B1FVuQCIVQjGoxSyP +iNNEtq/3Rfyh9CS3VAlbXHylW4hQsmBQCtefF+0FQ3ZbrMpGBT0DOpl8c4WjA6Yj/cG hd7DlJKfgXboZHCFVt3q+Zjovgyl4cu3wHchBaOuHIc+j6U91uCSWLLOQIffsxEgJqXd kcE3PH/OK7WMVLJb0JSvM/LEAOqMJqNg0u+eyykrILXf8+jApGaTcMqT84BCN6g73xgt q+LQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="rVmbs/zs"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i1si22467810pld.344.2019.06.03.15.41.44; Mon, 03 Jun 2019 15:42:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="rVmbs/zs"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726583AbfFCWke (ORCPT + 99 others); Mon, 3 Jun 2019 18:40:34 -0400 Received: from mail.kernel.org ([198.145.29.99]:40770 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726163AbfFCWke (ORCPT ); Mon, 3 Jun 2019 18:40:34 -0400 Received: from localhost (unknown [69.71.4.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D1DBE26A32; Mon, 3 Jun 2019 22:40:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1559601633; bh=4VVHVVBJYOrtfjQmkmfX4km6vna4lr6Ms9TIAd0Y6EU=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=rVmbs/zsxjB0l+JVVvUWDeQ857KCgbfN2xMCzG5JWVRitgEAEdAaKwqbzVCPyJTRG k/KjK7RbzDxuGCQ3fGSg2oBsyQ8OAmaC29aasEdfWAJrvc8YudmpTNIQ9I0iLFYmaf ZnZBErOfUIqgTR/54n8QWeEJV0eUGdRWiuKo8m00= Date: Mon, 3 Jun 2019 17:40:29 -0500 From: Bjorn Helgaas To: Himanshu Madhani Cc: Andrew Vasquez , Girish Basrur , Giridhar Malavali , Myron Stowe , Linux Kernel Mailing List , Quinn Tran , Linux PCI Subject: Re: [EXT] VPD access Blocked by commit 0d5370d1d85251e5893ab7c90a429464de2e140b Message-ID: <20190603224029.GC58810@google.com> References: <20190530205823.GA45696@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jun 03, 2019 at 09:30:50PM +0000, Himanshu Madhani wrote: > On May 30, 2019, at 1:58 PM, Bjorn Helgaas wrote: >> On Thu, May 30, 2019 at 07:33:01PM +0000, Himanshu Madhani wrote: >>> We are able to successfully read VPD config data using lspci and cat >>> command > Missed the request for xxd output. I got access back today for the system > and captured it for you > > # cat /sys/class/pci_bus/0000\:13/device/0000\:13\:00.0/vpd | xxd > 00000000: 822d 0051 4c6f 6769 6320 3332 4762 2032 .-.QLogic 32Gb 2 > 00000010: 2d70 6f72 7420 4643 2074 6f20 5043 4965 -port FC to PCIe > 00000020: 2047 656e 3320 7838 2041 6461 7074 6572 Gen3 x8 Adapter > 00000030: 9039 0050 4e07 514c 4532 3734 3253 4e0d .9.PN.QLE2742SN. > 00000040: 4146 4431 3533 3359 3032 3939 3945 430f AFD1533Y02999EC. > 00000050: 424b 3332 3130 3430 372d 3035 2030 3356 BK3210407-05 03V > 00000060: 3906 3031 3031 3839 5256 01a0 78 9.010189RV..x > > PCIe trace also confirmed there are no READ errors. > (if you need i can attach .pex file for review) Thank you! It would be really excellent to have a report at https://bugzilla.kernel.org with these details (hex VPD dump, .pex file, QLogic firmware version info) attached. Your patch commit log could then include the bugzilla URL. If we had this sort of information for Ethan's original patch, we would have a good start at making a smarter quirk. But we don't, so I think all we can assume at this point is that all QLogic firmware older than your current version is broken and we shouldn't try reading VPD. >> If a QLogic firmware update indeed fixed the VPD format, I suggest >> that you ask the folks responsible for the firmware to identify the >> specific version where that was fixed and how the OS can figure that >> out. > Still waiting on this data. Don't hold your breath :) > Since major OEMs are having issues using adapter to extract VPD data, We > would like to get them relief first and then approach this issue with more > detailed fix if needed. I don't think it's a good idea to simply revert 0d5370d1d852. That would mean any users that have the same QLogic firmware version Ethan had would start seeing panics. But I think you could certainly make a quirk that allows VPD access for the firmware version you have on your card (or newer), leaving the original "no VPD at all" behavior for older versions. Bjorn