Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp5954342ybi; Wed, 12 Jun 2019 11:18:24 -0700 (PDT) X-Google-Smtp-Source: APXvYqzJSX1FhlPOnKjCsvAXq7FEHXuQL1kMw20BWaG9kcu6HnbRhoqksD8F0CkP/s7X4hhxgam7 X-Received: by 2002:a17:90a:a415:: with SMTP id y21mr516287pjp.75.1560363504621; Wed, 12 Jun 2019 11:18:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560363504; cv=none; d=google.com; s=arc-20160816; b=VTrg97OJbF1ykI9zdwIq9XYl7H+0oEs9IhsMU0G+yJWeKB0BlBA3ON3OyWE1nBTzs7 yP7C39uRey7+/ez9qPo+kpXUZvicHGD4BGLCl25BS6NemfuHCT616SW2kcQ2bgFm+KuY eztAn9iPG9ypc6mS868Qm/l9A4fs59nriV55ZECskN+hwZKygAZZ3GiZHjRsh0zFZzye MBAx3WvhRrYGUJlTCtj3uliC5bL4uQnSJEu6E6g+kvlkzN6fVTpUo+/SmF9ZrN1sFmSe +UcFFMbv0eLCyn0aoWmJQE2shR5LG3xbPhdlUkeohfKdvahk3yLPgAFWUFxq7WepcRri TU9A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=6scVyi5/6EmIRcgto0Na/VJ5N5CVM846bcUE48dWg2I=; b=tBaEsBFh61t7iIibs+mbHQkCcci2V94ePwNIZM0z4hhtx/wj5Fn8QD5PzMHshkdtRm Sk0GADzCw1m8A31/LVR/ZqniFa6EFkbXDR6tlXNBCAdESStt7p5i9I1mLuvoVXOfGzvQ sxEkkEhezqJVnpYQCkDVqdbWSnkhFO5J1cawcLANSoVX3PNN4U/tXL3EaFYsFoOTtwIn 6TH1KaEDajPK1SNvqkj6mHMJ0CVVk2Vy7XgNjoHoyxRZuhFYb++THbxwRY2LruYk5FIR 4V4yoXO8YwRSWpjXf2+Q+0R8MkA27dAp0Hqia7BxxdjjUvGhBwdW4FT3L3SbyXv8MWy2 yWug== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="X+yPOCD/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e9si412729pgb.142.2019.06.12.11.18.09; Wed, 12 Jun 2019 11:18:24 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="X+yPOCD/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726608AbfFLSQD (ORCPT + 99 others); Wed, 12 Jun 2019 14:16:03 -0400 Received: from mail-lf1-f66.google.com ([209.85.167.66]:40291 "EHLO mail-lf1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725829AbfFLSQD (ORCPT ); Wed, 12 Jun 2019 14:16:03 -0400 Received: by mail-lf1-f66.google.com with SMTP id a9so12924718lff.7; Wed, 12 Jun 2019 11:16:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=6scVyi5/6EmIRcgto0Na/VJ5N5CVM846bcUE48dWg2I=; b=X+yPOCD/NxBOb31MI5Q3P4/b32BW9lIusVp4m0mIi4jhsSXQkHopcDMp5tW3PY/NfJ 27SsUjR+8B+aqQ2DA6ibqwfNLv7KRDaJFzOGPD+99aHZJ8PHwHXGoE0yNdFVb1IWMGSa zTNi5BnUIIu8tH5uMGn7Vd5Z1S9tng53JHb4mRH0O0J7FHW4qu8s+VDiEOIh1CiEN0X0 cSLevUxO3T0L41ZQJa5DmfL10XPWMldOpmGCpB2QoqPE0r2Vn4/DiTXTpz21iE7e/yKc +pmH9a3i2uOmegoW/eNaQRaGEAeRctMccTz9s8HAtmNLGzVXZd0a4irYr/2L0uYD/0kE 2UAg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=6scVyi5/6EmIRcgto0Na/VJ5N5CVM846bcUE48dWg2I=; b=GoIhUrPA4Q5YbdUqopYFroEQRyT5fJJnuf8cuvBKRL/e9rjcpiriH8HcNEQRRONfM8 lnORPpj+zCZqcZDeofSFk0ZB/2osFubj0iJejjPo1/KMlworxd5v2tJM/mE2lk/aOseG 9AQStVBd6EUP04TAmOnEC0i9Zs52PW4W7FoFfnWjNv7AgX3kIDktnBR4VvaTlSfZT0uV 7JS1ffXBhz02QeJqdImdTK0SpiY34ogfUED6z2R92GPJzI67NNK2nAOQYWFUBo+pNfLb rAuW1NVxN9OmUQ53/NoFbla31zKbclbuB0AFOuQJnNye797clH0oF7Be9cFnI0o003zy BgFw== X-Gm-Message-State: APjAAAUX3f97WeayZjSs6FU4jseLappGCZgRm82zFw9MNJdeD2u3hsvZ PhKgIrNp8IH1PG327FybXvSCAd+TunU8/I0ALV4= X-Received: by 2002:a19:6703:: with SMTP id b3mr42781218lfc.153.1560363361070; Wed, 12 Jun 2019 11:16:01 -0700 (PDT) MIME-Version: 1.0 References: <20190612170647.43220-1-sathyanarayanan.kuppuswamy@linux.intel.com> In-Reply-To: <20190612170647.43220-1-sathyanarayanan.kuppuswamy@linux.intel.com> From: Myron Stowe Date: Wed, 12 Jun 2019 12:15:49 -0600 Message-ID: Subject: Re: [PATCH v2 1/1] PCI/IOV: Fix incorrect cfg_size for VF > 0 To: sathyanarayanan.kuppuswamy@linux.intel.com Cc: Bjorn Helgaas , linux-pci , LKML , ashok.raj@intel.com, Keith Busch , mike.campin@intel.com Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This looks to basically be a duplicate of what Alex Williamson posted 8 days ago: https://lore.kernel.org/linux-pci/20190604143617.0a226555@x1.home/ Alex says Hao Zheng had a similar patch as well. On Wed, Jun 12, 2019 at 12:08 PM wrote: > > From: Kuppuswamy Sathyanarayanan > > Commit 975bb8b4dc93 ("PCI/IOV: Use VF0 cached config space size for > other VFs") calculates and caches the cfg_size for VF0 device before > initializing the pcie_cap of the device which results in using incorrect > cfg_size for all VF devices > 0. So set pcie_cap of the device before > calculating the cfg_size of VF0 device. > > Fixes: 975bb8b4dc93 ("PCI/IOV: Use VF0 cached config space size for > other VFs") > Cc: Ashok Raj > Suggested-by: Mike Campin > Signed-off-by: Kuppuswamy Sathyanarayanan > --- > > Changes since v1: > * Fixed a typo in commit message. > > drivers/pci/iov.c | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/drivers/pci/iov.c b/drivers/pci/iov.c > index 3aa115ed3a65..2869011c0e35 100644 > --- a/drivers/pci/iov.c > +++ b/drivers/pci/iov.c > @@ -160,6 +160,7 @@ int pci_iov_add_virtfn(struct pci_dev *dev, int id) > virtfn->device = iov->vf_device; > virtfn->is_virtfn = 1; > virtfn->physfn = pci_dev_get(dev); > + virtfn->pcie_cap = pci_find_capability(virtfn, PCI_CAP_ID_EXP); > > if (id == 0) > pci_read_vf_config_common(virtfn); > -- > 2.21.0 >