Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp6342819imm; Mon, 23 Jul 2018 16:23:39 -0700 (PDT) X-Google-Smtp-Source: AAOMgpd8LvZJggWkbk+m6nuJ7yS0oJWxevsz/tinhpMTCg7kcS8MKUKzpfYT/NZN5ma2oi3TOeUO X-Received: by 2002:a17:902:988c:: with SMTP id s12-v6mr14683054plp.199.1532388219303; Mon, 23 Jul 2018 16:23:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1532388219; cv=none; d=google.com; s=arc-20160816; b=NWy2vm8fXPVYv+PzJPsFF5LFE/ASWUrXQmvLa26vRUsE997nRqCTeiEM8PgwbvtgMS DiKHcZApMQJKeSwV+BnBkP59nnsLwNvQlkbMeEj4sMQskc1Y3ayljPGU3yZRynS4G/uu M5tjLBhsHM552bw+J0NA7ncCOMpNZFLCHCV1hFgmeviumh0QrgiFeyWlYaPv2Ve2VbSx gk9JqoPXchS/Y27pPWAXL7Ny+gpKmqMxIbdeE2rBzrgOGLH1j+gDk036jHd28FIy6IkT pvfZHfO1aVG19hpmxXBbQaocPXgfteNxo6JEC/frcbNUERVolflX7ddWxl4CRC9awCxn U8ig== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :arc-authentication-results; bh=DBNq93DBtEnmnZwwVup+K2OIV5G17DeYFqvKEjJRFIQ=; b=aUA7c9dx3I8CC+Tb1hTfE0wvuR5K4Pft02fg3xFAyiSFTsDk9FuS698JEgHSPZf/DL 4GKDz8504GFt8/1s9uYknZO3/lluM1Rf6bCRuD8okWM24YJOo75lEYIq3KYclGBe5ED3 gwL36rfkoLj+dCeja6OuwhWpYNZKtpZ61LtUI0isPXgQmJJThuGu/xNfRSn+mTpSDkJW 3pPD7SFzM6Uar3o67Pz41nSMCu/Wme9RH73TBHWOyFQ60vdyYmN9hJMUmzlscn/2dtke I/7Ct07SXAFTMvCYrykivkhfGOMRkp6RbUI9xg0fd9XVtS1ylaV1xX/M9Kn2U6CaC6b2 bQRQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f3-v6si8293137pld.366.2018.07.23.16.23.24; Mon, 23 Jul 2018 16:23:39 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388238AbeGXA0A (ORCPT + 99 others); Mon, 23 Jul 2018 20:26:00 -0400 Received: from mail.bootlin.com ([62.4.15.54]:40428 "EHLO mail.bootlin.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388013AbeGXA0A (ORCPT ); Mon, 23 Jul 2018 20:26:00 -0400 Received: by mail.bootlin.com (Postfix, from userid 110) id D14C720733; Tue, 24 Jul 2018 01:22:26 +0200 (CEST) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on mail.bootlin.com X-Spam-Level: X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED,SHORTCIRCUIT, URIBL_BLOCKED shortcircuit=ham autolearn=disabled version=3.4.0 Received: from bbrezillon (91-160-177-164.subs.proxad.net [91.160.177.164]) by mail.bootlin.com (Postfix) with ESMTPSA id 627DE2069C; Tue, 24 Jul 2018 01:22:26 +0200 (CEST) Date: Tue, 24 Jul 2018 01:22:26 +0200 From: Boris Brezillon To: NeilBrown Cc: Brian Norris , Zhiqiang Hou , linux-mtd@lists.infradead.org, Linux Kernel , David Woodhouse , Boris BREZILLON , Marek Vasut , Richard Weinberger , Cyrille Pitchen Subject: Re: [PATCHv3 2/2] mtd: m25p80: restore the status of SPI flash when exiting Message-ID: <20180724012226.307f578d@bbrezillon> In-Reply-To: <87in55po3a.fsf@notabene.neil.brown.name> References: <20171206025342.7266-1-Zhiqiang.Hou@nxp.com> <20171206025342.7266-3-Zhiqiang.Hou@nxp.com> <20180723181350.GA58212@ban.mtv.corp.google.com> <20180723221002.736e0830@bbrezillon> <87in55po3a.fsf@notabene.neil.brown.name> X-Mailer: Claws Mail 3.15.0-dirty (GTK+ 2.24.31; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 24 Jul 2018 08:46:33 +1000 NeilBrown wrote: > On Mon, Jul 23 2018, Brian Norris wrote: > > > Hi Boris, > > > > On Mon, Jul 23, 2018 at 1:10 PM, Boris Brezillon > > wrote: > >> On Mon, 23 Jul 2018 11:13:50 -0700 > >> Brian Norris wrote: > >>> I noticed this got merged, but I wanted to put my 2 cents in here: > >> > >> I wish you had replied to this thread when it was posted (more than > >> 6 months ago). Reverting the patch now implies making some people > >> unhappy because they'll have to resort to their old out-of-tree > >> hacks :-(. > > > > I'd say I'm sorry for not following things closely these days, but I'm > > not really that sorry. There are plenty of other capable hands. And if > > y'all shoot yourselves in the foot, so be it. This patch isn't going > > to blow things up, but now that I did finally notice it (because it > > happened to show up in a list of backports I was looking at), I > > thought better late than never to remind you. > > > > For way of notification: Marek already noticed that we've started down > > a slippery slope months ago: > > > > https://lkml.org/lkml/2018/4/8/141 > > Re: [PATCH] mtd: spi-nor: clear Extended Address Reg on switch to > > 3-byte addressing. > > > > I'm not quite sure why that wasn't taken to its logical conclusion -- > > that the hack should be reverted. > > > > This problem has been noted many times already, and we've always > > stayed on the side of *avoiding* this hack. A few references from a > > search of my email: > > > > http://lists.infradead.org/pipermail/linux-mtd/2013-March/046343.html > > [PATCH 1/3] mtd: m25p80: utilize dedicated 4-byte addressing commands > > > > http://lists.infradead.org/pipermail/barebox/2014-September/020682.html > > [RFC] MTD m25p80 3-byte addressing and boot problem > > > > http://lists.infradead.org/pipermail/linux-mtd/2015-February/057683.html > > [PATCH 2/2] m25p80: if supported put chip to deep power down if not used > > > >>> On Wed, Dec 06, 2017 at 10:53:42AM +0800, Zhiqiang Hou wrote: > >>> > From: Hou Zhiqiang > >>> > > >>> > Restore the status to be compatible with legacy devices. > >>> > Take Freescale eSPI boot for example, it copies (in 3 Byte > >>> > addressing mode) the RCW and bootloader images from SPI flash > >>> > without firing a reset signal previously, so the reboot command > >>> > will fail without reseting the addressing mode of SPI flash. > >>> > This patch implement .shutdown function to restore the status > >>> > in reboot process, and add the same operation to the .remove > >>> > function. > >>> > >>> We have previously rejected this patch multiple times, because the above > >>> comment demonstrates a broken product. > >> > >> If we were to only support working HW parts, I fear Linux would not > >> support a lot of HW (that's even more true when it comes to flashes :P). > > > > You stopped allowing UBI to attach to MLC NAND recently, no? That > > sounds like almost the same boat -- you've probably killed quite a few > > shitty products, if they were to use mainline directly. > > > > Anyway, that's derailing the issue. Supporting broken hardware isn't > > something you try to do by applying the same hack to all systems. You > > normally try to apply your hack as narrowly as possible. You seem to > > imply that below. So maybe that's a solution to move forward with. But > > I'd personally be just as happy to see the patch reverted. > > > >>> You cannot guarantee that all > >>> reboots will invoke the .shutdown() method -- what about crashes? What > >>> about watchdog resets? IIUC, those will hit the same broken behavior, > >>> and have unexepcted behavior in your bootloader. > >> > >> Yes, there are corner cases that are not addressed with this approach, > > > > Is a system crash really a corner case? :D > > > >> but it still seems to improve things. Of course, that means the > >> user should try to re-route all HW reset sources to SW ones (RESET input > >> pin muxed to the GPIO controller, watchdog generating an interrupt > >> instead of directly asserting the RESET output pin), which is not always > >> possible, but even when it's not, isn't it better to have a setup that > >> works fine 99% of the time instead of 50% of the time? > > > > Perhaps, but not at the expense of future development. And > > realistically, no one is doing that if they have this hack. Most > > people won't even know that this hack is protecting them at all (so > > again, they won't try to mitigate the problem any further). > > > >>> I suppose one could argue for doing this in remove(), but AIUI you're > >>> just papering over system bugs by introducing the shutdown() function > >>> here. Thus, I'd prefer we drop the shutdown() method to avoid misleading > >>> other users of this driver. > >> > >> I understand your point. But if the problem is about making sure people > >> designing new boards get that right, why not complaining at probe time > >> when things are wrong? > >> > >> I mean, spi_nor_restore() seems to only do something on very specific > >> NORs (those on which a SW RESET does not resets the addressing > >> mode). > > > > The point isn't that SW RESET doesn't reset the addressing mode -- it > > does on any flash I've seen. The point is that most systems are built > > around a stateless assumption in these flash. IIRC, there wasn't even > > a SW RESET command at all until these "huge" flash came around and > > stateful addressing modes came about. So boot ROMs and bootloaders > > would have to be updated to start figuring out when/how to do this SW > > RESET. And once two vendors start doing it differently (I'm not sure: > > have they done this already? I think so) it's no longer something a > > boot ROM will get right. > > > > The only way to get this stuff right is to have a hardware reset, or > > else to avoid all of the stateful modes in software. > > > >> So, how about adding a flag that says "my board has the NOR HW > >> RESET pin wired" (there would be a DT props to set that flag). Then you > >> add a WARN_ON() when this flag is not set and a NOR chip impacted by > >> this bug is detected. > > > > I'd kinda prefer the reverse. There really isn't a need to document > > anything for a working system (software usually can't control this > > RESET pin). The burden should be on the b0rked system to document > > where it needs unsound hacks to survive. > > > >> This way you make sure people are informed that > >> they're doing something wrong, and for those who can't change their HW > >> (because it's already widely deployed), you have a fix that improve > >> things. > > > > Or even better: put this hack behind a DT flag, so that one has to > > admit that their board design is broken before it will even do > > anything. Proposal: "linux,badly-designed-flash-reset". > > > > But, I'd prefer just (partially?) reverting this, and let the authors > > submit something that works. We're not obligated to keep bad hacks in > > the kernel. > > > > Brian > > One possibility that occurred to me when I was exploring this issue is > to revert to 3-byte mode whenever 4-byte was not actively in use. > So any access beyond 16Meg is: > switch-to-4-byte ; perform IO ; switch to 3-byte > or similar. On my hardware it would be more efficient to > use the 4-byte opcode to perform the IO, then reset the cached > 4th address byte that the NOR chip transparently remembered. > > This adds a little overhead, but should be fairly robust. > It doesn't help if something goes terribly wrong while IO is happening, > but I don't think any other software solution does either. > > How would you see that approach? I think the problem stands: people that have proper HW mitigation for this problem (NOR chip is reset when the Processor is reset) don't want to pay the overhead. So, even if we go for this approach, we probably want to only do that for broken HW.