Received: by 2002:ac0:aed5:0:0:0:0:0 with SMTP id t21csp4810338imb; Thu, 7 Mar 2019 00:45:29 -0800 (PST) X-Google-Smtp-Source: APXvYqwZ2zQ44ZbhpVwcr96rXI8pw7KbgKfZ6akghk9cQIO9q/J4Slu/OLIdIc6Yyowa+/9eq0Pm X-Received: by 2002:a17:902:142:: with SMTP id 60mr7094049plb.191.1551948329104; Thu, 07 Mar 2019 00:45:29 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1551948329; cv=none; d=google.com; s=arc-20160816; b=KU8cvMakddBXDOJC5ZOc++vGXVBBU7e9ZGV7B2GFSRbtdSxscgEZLWxXh9f0E6vIG1 NFsHT168HAX2o/8io775rUT6vF/GoshoHV/WJrNq65D/Qms1TRkTHye4rQaaztrWrr4d wJ+fEEBJSOPNmkanu5/Ve1R25uoFFs29c0TfN3txQS8UFTGQSFqrshlHYSqQYlK5mCPz 3fvffYJ3hxzqzwr+5VJra1T/U/ZYt5C7jiJYz4wyyQeLG1C0LLBXeZQ1oVDKYQxk0sTy O6tyRrITIqh0gq3V/1FC3lkECibBab6ZlKeNFPks+s2EBvFdXOoFOh+ipfShYSFQ6dIE 10fg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=ISk6yEfzf2Vm5x6ZLVWuvfJzqGhJ2SXhjY8qCmH82oI=; b=TniQAK0mj53Cp8bLhMtKQv6IH0F64/nE0Kgd6huXmdhVtiYUAFZRJPGwuCoG1Dl+yy kWQ6qXG3zp2Qg04SGsG3xX9CwUwPxsJeCQPSPL7MQoaxidnanZh5a8GJvWnoaxnNerL2 7UKVWkpqQuJyUvWfZEMXEmLP5tP/F/4CKKqmdpQ2FYfLvyuy9C78t/A1jeSW3HuzYdeH jTy89bn8OrmLVUXp6grEzYBvwb+tw5Tv9AzMpp1ABxwhXGOEyGuYCD4RaduDsythYevr L1X+e2dN8rdCdF8Dp8FUH/43IWlWXkG9tm5r0T5ArLQfu8JxV8gFGKpZmf3GTMhCaVTZ rlQg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x61si3675884plb.197.2019.03.07.00.45.13; Thu, 07 Mar 2019 00:45:29 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726469AbfCGIoF (ORCPT + 99 others); Thu, 7 Mar 2019 03:44:05 -0500 Received: from vegas.theobroma-systems.com ([144.76.126.164]:35428 "EHLO mail.theobroma-systems.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726138AbfCGIoF (ORCPT ); Thu, 7 Mar 2019 03:44:05 -0500 Received: from ip092042140082.rev.nessus.at ([92.42.140.82]:54492 helo=purcell.lan) by mail.theobroma-systems.com with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA1:256) (Exim 4.80) (envelope-from ) id 1h1oct-00083e-0q; Thu, 07 Mar 2019 09:43:39 +0100 From: Christoph Muellner To: robh+dt@kernel.org, mark.rutland@arm.com, heiko@sntech.de, shawn.lin@rock-chips.com, ulf.hansson@linaro.org, adrian.hunter@intel.com Cc: Christoph Muellner , Philipp Tomsich , Michal Simek , Douglas Anderson , Enric Balletbo i Serra , Viresh Kumar , Tomasz Figa , Tony Xie , Shunqian Zheng , Randy Li , Vicente Bergas , Ezequiel Garcia , Klaus Goger , Lin Huang , linux-mmc@vger.kernel.org, devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-rockchip@lists.infradead.org Subject: [PATCH v2 3/3] arm64: dts: rockchip: Disable DCMDs on RK3399's eMMC controller. Date: Thu, 7 Mar 2019 09:43:28 +0100 Message-Id: <20190307084329.25416-3-christoph.muellner@theobroma-systems.com> X-Mailer: git-send-email 2.11.0 In-Reply-To: <20190307084329.25416-1-christoph.muellner@theobroma-systems.com> References: <20190307084329.25416-1-christoph.muellner@theobroma-systems.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When using direct commands (DCMDs) on an RK3399, we get spurious CQE completion interrupts for the DCMD transaction slot (#31): [ 931.196520] ------------[ cut here ]------------ [ 931.201702] mmc1: cqhci: spurious TCN for tag 31 [ 931.206906] WARNING: CPU: 0 PID: 1433 at /usr/src/kernel/drivers/mmc/host/cqhci.c:725 cqhci_irq+0x2e4/0x490 [ 931.206909] Modules linked in: [ 931.206918] CPU: 0 PID: 1433 Comm: irq/29-mmc1 Not tainted 4.19.8-rt6-funkadelic #1 [ 931.206920] Hardware name: Theobroma Systems RK3399-Q7 SoM (DT) [ 931.206924] pstate: 40000005 (nZcv daif -PAN -UAO) [ 931.206927] pc : cqhci_irq+0x2e4/0x490 [ 931.206931] lr : cqhci_irq+0x2e4/0x490 [ 931.206933] sp : ffff00000e54bc80 [ 931.206934] x29: ffff00000e54bc80 x28: 0000000000000000 [ 931.206939] x27: 0000000000000001 x26: ffff000008f217e8 [ 931.206944] x25: ffff8000f02ef030 x24: ffff0000091417b0 [ 931.206948] x23: ffff0000090aa000 x22: ffff8000f008b000 [ 931.206953] x21: 0000000000000002 x20: 000000000000001f [ 931.206957] x19: ffff8000f02ef018 x18: ffffffffffffffff [ 931.206961] x17: 0000000000000000 x16: 0000000000000000 [ 931.206966] x15: ffff0000090aa6c8 x14: 0720072007200720 [ 931.206970] x13: 0720072007200720 x12: 0720072007200720 [ 931.206975] x11: 0720072007200720 x10: 0720072007200720 [ 931.206980] x9 : 0720072007200720 x8 : 0720072007200720 [ 931.206984] x7 : 0720073107330720 x6 : 00000000000005a0 [ 931.206988] x5 : ffff00000860d4b0 x4 : 0000000000000000 [ 931.206993] x3 : 0000000000000001 x2 : 0000000000000001 [ 931.206997] x1 : 1bde3a91b0d4d900 x0 : 0000000000000000 [ 931.207001] Call trace: [ 931.207005] cqhci_irq+0x2e4/0x490 [ 931.207009] sdhci_arasan_cqhci_irq+0x5c/0x90 [ 931.207013] sdhci_irq+0x98/0x930 [ 931.207019] irq_forced_thread_fn+0x2c/0xa0 [ 931.207023] irq_thread+0x114/0x1c0 [ 931.207027] kthread+0x128/0x130 [ 931.207032] ret_from_fork+0x10/0x20 [ 931.207035] ---[ end trace 0000000000000002 ]--- The driver shows this message only for the first spurious interrupt by using WARN_ONCE(). Changing this to WARN() shows, that this is happening quite frequently (up to once a second). Since the eMMC 5.1 specification, where CQE and CQHCI are specified, does not mention that spurious TCN interrupts for DCMDs can be simply ignored, we must assume that using this feature is not working reliably. The current implementation uses DCMD for REQ_OP_FLUSH only, and I could not see any performance/power impact when disabling this optional feature for RK3399. Therefore this patch disables DCMDs for RK3399. Signed-off-by: Christoph Muellner Signed-off-by: Philipp Tomsich --- arch/arm64/boot/dts/rockchip/rk3399.dtsi | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/arm64/boot/dts/rockchip/rk3399.dtsi b/arch/arm64/boot/dts/rockchip/rk3399.dtsi index 6cc1c9fa4ea6..1bbf0da4e01d 100644 --- a/arch/arm64/boot/dts/rockchip/rk3399.dtsi +++ b/arch/arm64/boot/dts/rockchip/rk3399.dtsi @@ -333,6 +333,7 @@ phys = <&emmc_phy>; phy-names = "phy_arasan"; power-domains = <&power RK3399_PD_EMMC>; + disable-cqe-dcmd; status = "disabled"; }; -- 2.11.0