Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp1041290pxb; Tue, 14 Sep 2021 14:57:25 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxgp3RrLmvmNzST3TdvKhc2Od8xdcAO6+Q9VYCGhOu7yq3OcC/0kB8xqWwhpy5vgR6KRhBX X-Received: by 2002:a05:6638:1926:: with SMTP id p38mr16492662jal.18.1631656645357; Tue, 14 Sep 2021 14:57:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1631656645; cv=none; d=google.com; s=arc-20160816; b=i8HgdzKSoNyoxjaqjvm1kpIVVMHR3KRYRs87Evk1QwHkxq5F3ZWhRKHsBm0K2d/VPz ZTd1AZz8VlBO/wVruMXjDZek5JtDokterrxjnnQx8J+j8UM86RVUc2gBm12uC8/8Dh3x sOtl9gS9iCfRzzz+9RjojMI+O9oJ8rI7TNU0l0bumYp1Cy7bQLlDf0GDpRbKbKXBWV0S nl6db3Aq8jEmgg/ZwqazN6PjuvAFeT+cYHjlCg/EBpWQztoWaES+7TJ8d6DKIT8UNBWt 9i90/MeZn5qthPDKxSv9jjZXV/CclMKS+gVXKy2/Shw/0RfYE705WscUebs0zQWQrD1H P1Bw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :message-id:subject:cc:to:from:date:dkim-signature; bh=9bkETEXfaljtvtgCBGugWMZT1mc3A2NmZ4e5Q/ATmsA=; b=Aab3bz78rUyi6AeJohDSHNvpLtu4/mW7SD3dtxtFln3SkjkVac+BfUk6565pmgCbTw e0xJehsNpcppfJ2WRIW+5yFWapXKGHq35bk8NRQxbwMNotyVIPeAs/o/9wKB+Pl8THIB kRKDGoolzA4hLyD65uaS+cmMn5yFBIEhPTtUFYB3I05pXVMB5AXSL3QSc/IX7xlzAKXZ 0vVuOrDMfj5HxWT+o2tXOBiDJh2v2OS3jUf/kd2hKy9BF1bXSfq/sKe4sPWCJhOqFw9T hFwVMvD/aUxVsmIN+TZ7zeTBFLhLS5lC81tTNUpEqj9cW8JYLn0vI1ntySSt2aBz6xkQ oxmQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=RlXKjTqx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v1si10197446ile.137.2021.09.14.14.57.13; Tue, 14 Sep 2021 14:57:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=RlXKjTqx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234837AbhINV5F (ORCPT + 99 others); Tue, 14 Sep 2021 17:57:05 -0400 Received: from mail.kernel.org ([198.145.29.99]:48392 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233952AbhINV5C (ORCPT ); Tue, 14 Sep 2021 17:57:02 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id AE61D60F21; Tue, 14 Sep 2021 21:55:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1631656545; bh=argaTgBr5VKnygg+HIx3am0H+3IxuMXP+1Nj76eAUGo=; h=Date:From:To:Cc:Subject:In-Reply-To:From; b=RlXKjTqxbkMplldZoMu9gQ0gubJdn1CpeCHUDoqAq4ByneDA08RB8JjMEKU6vDHjp +l68uERXQBD4coEGnknGy08Zp3ELWcKZHNWmsUMJIjRaTqaX19jw0BbKxkYsdlCkSA p+uTJvgDqLZHX1y8OAT5S7CYufk05LbOuCnHPyX7Kax8b/1bz1PxHk4Oim0zqHCx/4 n8SrnuAQexoW9ufF6W7Oo5LplxJR/szSNdfB6LFrtFMe9LHN4lepjwAu38q6ZLhWih WZZUv7BVlcRzNeYjg4bV0Nb1T2JpaA/FBJymWpK/Dr3+ekr89ZDLeFBko3c+dlWTi5 i8j65az7PxaQA== Date: Tue, 14 Sep 2021 16:55:43 -0500 From: Bjorn Helgaas To: Heiner Kallweit Cc: Dave Jones , Linus Torvalds , linux-kernel@vger.kernel.org, linux-pci@vger.kernel.org Subject: Re: Linux 5.15-rc1 Message-ID: <20210914215543.GA1437800@bjorn-Precision-5520> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <54bd54b9-3774-92a5-4193-5ccccd235572@gmail.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Sep 14, 2021 at 07:07:40PM +0200, Heiner Kallweit wrote: > On 14.09.2021 13:26, Bjorn Helgaas wrote: > > On Tue, Sep 14, 2021 at 08:21:46AM +0200, Heiner Kallweit wrote: > >> On 14.09.2021 01:46, Bjorn Helgaas wrote: > > > >>> +DECLARE_PCI_FIXUP_FINAL(PCI_VENDOR_ID_ATTANSIC, PCI_ANY_ID, quirk_blacklist_vpd); > >>> /* > >> > >> Leaving the quirks in FIXUP_HEADER stage would have the advantage that for > >> blacklisted devices the vpd sysfs attribute isn't visibale. The needed > >> changes to the patch are minimal. > > > > What do you have in mind? The only thing I can think of would be to > > add a "pci_dev.no_vpd" bit. "vpd.cap == 0" means the device has no > > VPD, and "vpd.len == 0" means we haven't determined the size yet. All > > devices start off with vpd.cap == 0 and vpd.len == 0, so a > > FIXUP_HEADER quirk would have to set a sentinel value or some other > > bit. > > Why not leave vpd.len == PCI_VPD_SZ_INVALID as sentinel? Sentinel values aren't really my favorite thing, but it certainly does have the advantage of hiding the sysfs attribute. > And one more question: Why do you move the "if (!vpd->cap)" check from > pci_vpd_read() to pci_read_vpd()? At a first glance I see no benefit. I'm pretty sure I *had* a reason, but I can't remember right now :( Moving it sure does uglify pci_read_vpd() and pci_write_vpd(), though. What do you think of the following? (This is a diff from v5.15-rc1.) diff --git a/drivers/pci/vpd.c b/drivers/pci/vpd.c index 25557b272a4f..4be24890132e 100644 --- a/drivers/pci/vpd.c +++ b/drivers/pci/vpd.c @@ -99,6 +99,24 @@ static size_t pci_vpd_size(struct pci_dev *dev) return off ?: PCI_VPD_SZ_INVALID; } +static bool pci_vpd_available(struct pci_dev *dev) +{ + struct pci_vpd *vpd = &dev->vpd; + + if (!vpd->cap) + return false; + + if (vpd->len == 0) { + vpd->len = pci_vpd_size(dev); + if (vpd->len == PCI_VPD_SZ_INVALID) { + vpd->cap = 0; + return false; + } + } + + return true; +} + /* * Wait for last operation to complete. * This code has to spin since there is no other notification from the PCI @@ -145,7 +163,7 @@ static ssize_t pci_vpd_read(struct pci_dev *dev, loff_t pos, size_t count, loff_t end = pos + count; u8 *buf = arg; - if (!vpd->cap) + if (!pci_vpd_available(dev)) return -ENODEV; if (pos < 0) @@ -206,7 +224,7 @@ static ssize_t pci_vpd_write(struct pci_dev *dev, loff_t pos, size_t count, loff_t end = pos + count; int ret = 0; - if (!vpd->cap) + if (!pci_vpd_available(dev)) return -ENODEV; if (pos < 0 || (pos & 3) || (count & 3)) @@ -242,14 +260,11 @@ static ssize_t pci_vpd_write(struct pci_dev *dev, loff_t pos, size_t count, void pci_vpd_init(struct pci_dev *dev) { + if (dev->vpd.len == PCI_VPD_SZ_INVALID) + return; + dev->vpd.cap = pci_find_capability(dev, PCI_CAP_ID_VPD); mutex_init(&dev->vpd.lock); - - if (!dev->vpd.len) - dev->vpd.len = pci_vpd_size(dev); - - if (dev->vpd.len == PCI_VPD_SZ_INVALID) - dev->vpd.cap = 0; } static ssize_t vpd_read(struct file *filp, struct kobject *kobj, @@ -294,13 +309,14 @@ const struct attribute_group pci_dev_vpd_attr_group = { void *pci_vpd_alloc(struct pci_dev *dev, unsigned int *size) { - unsigned int len = dev->vpd.len; + unsigned int len; void *buf; int cnt; - if (!dev->vpd.cap) + if (!pci_vpd_available(dev)) return ERR_PTR(-ENODEV); + len = dev->vpd.len; buf = kmalloc(len, GFP_KERNEL); if (!buf) return ERR_PTR(-ENOMEM);