Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp5261325img; Wed, 27 Mar 2019 05:22:46 -0700 (PDT) X-Google-Smtp-Source: APXvYqyTRrZLaozNjvqaxtn5kyibRTvjKhqNUnrPM1uaJWh51CnP6IgYBvTEXfaORoF7S/tV/GJ2 X-Received: by 2002:aa7:8b93:: with SMTP id r19mr34298714pfd.163.1553689366320; Wed, 27 Mar 2019 05:22:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553689366; cv=none; d=google.com; s=arc-20160816; b=MgGh2VIpRyIUvQPWiEfJVwgy5KBUzeNZioJ/7s99Kt0WWsZGQQoJTyE5jP4kfNrPel 1vbpRHALMnUAlJNBEGGVDUHlbBO9gjtzUgndpLbBIxZYE3bGbt90WG/d9YMa43WEyqqR 27+IDJ/KxFxx6bLip9XtrORcxDdgNEUXUvEPozUHPqingPhY5mk77HEgZ33/PvN0BIQ8 jdus/VTYj5z60aL0K1pQ4gZ1WadD7iLeX9avW1DE9ClDyHeKwcNJclQPNc5lgYBjSQEW OUFaucIywA252TzABDPeVAPcxAxCiJHGNUGmzwHRRHXcDRMKeKhRFf/k5/Absb4NvQ8H IHWg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=9rDtLS9i4vuvJelxlcs2uzFF/YCubRX4F3q8SsUyIEo=; b=t2YWfu4CdhCnshThL0NXJ4QiFBymBJCt0nezNTVbClYCKXZ0Vaf6Ai5pGjBw8hvSsY cRCqxjYxqWwh15OP1PzKucC+ZN2PI06NysOJKxicEFOFE4Zn3Op8y/WUtkkp/JCiGXBO MVWFo46YoQQP3SR2yzusIw0miaD1L83N68yTaMFnw7RgqPnxm61h0D2GJvTP1D6yAkF5 4aYHbVvjraBvBiTbqMi4GZFmDSBLiSmw562N0Ker+Hn0QzVVTewmfFjM2r59byvGrTT3 oPhk4BE0u6dpWBZ0rQC1PZO9zSCLuA39PhX8aMmWSVkVC4TSLTh+iHUMO46JTiS1319v evxg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d3si13259021pgh.238.2019.03.27.05.22.30; Wed, 27 Mar 2019 05:22:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728385AbfC0MVz convert rfc822-to-8bit (ORCPT + 99 others); Wed, 27 Mar 2019 08:21:55 -0400 Received: from gloria.sntech.de ([185.11.138.130]:46466 "EHLO gloria.sntech.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726233AbfC0MVz (ORCPT ); Wed, 27 Mar 2019 08:21:55 -0400 Received: from we0652.dip.tu-dresden.de ([141.76.178.140] helo=phil.localnet) by gloria.sntech.de with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from ) id 1h97Yi-0003Ud-Bl; Wed, 27 Mar 2019 13:21:32 +0100 From: Heiko Stuebner To: Ulf Hansson , Klaus Goger Cc: Christoph Muellner , Rob Herring , Mark Rutland , Shawn Lin , Adrian Hunter , Philipp Tomsich , Michal Simek , Matthias Brugger , Viresh Kumar , Douglas Anderson , Jeffy Chen , Lin Huang , Randy Li , Tony Xie , "linux-mmc@vger.kernel.org" , DTML , Linux Kernel Mailing List , Linux ARM , "open list:ARM/Rockchip SoC..." Subject: Re: [PATCH v3 3/3] arm64: dts: rockchip: Disable DCMDs on RK3399's eMMC controller. Date: Wed, 27 Mar 2019 13:21:31 +0100 Message-ID: <1591627.dSi6EvuFCI@phil> In-Reply-To: References: <20190322113808.16858-1-christoph.muellner@theobroma-systems.com> <20190322113808.16858-3-christoph.muellner@theobroma-systems.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8BIT Content-Type: text/plain; charset="iso-8859-1" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Am Montag, 25. M?rz 2019, 14:27:26 CET schrieb Ulf Hansson: > On Fri, 22 Mar 2019 at 12:39, Christoph Muellner > wrote: > > > > When using direct commands (DCMDs) on an RK3399, we get spurious > > CQE completion interrupts for the DCMD transaction slot (#31): > > > > [ 931.196520] ------------[ cut here ]------------ > > [ 931.201702] mmc1: cqhci: spurious TCN for tag 31 > > [ 931.206906] WARNING: CPU: 0 PID: 1433 at /usr/src/kernel/drivers/mmc/host/cqhci.c:725 cqhci_irq+0x2e4/0x490 > > [ 931.206909] Modules linked in: > > [ 931.206918] CPU: 0 PID: 1433 Comm: irq/29-mmc1 Not tainted 4.19.8-rt6-funkadelic #1 > > [ 931.206920] Hardware name: Theobroma Systems RK3399-Q7 SoM (DT) > > [ 931.206924] pstate: 40000005 (nZcv daif -PAN -UAO) > > [ 931.206927] pc : cqhci_irq+0x2e4/0x490 > > [ 931.206931] lr : cqhci_irq+0x2e4/0x490 > > [ 931.206933] sp : ffff00000e54bc80 > > [ 931.206934] x29: ffff00000e54bc80 x28: 0000000000000000 > > [ 931.206939] x27: 0000000000000001 x26: ffff000008f217e8 > > [ 931.206944] x25: ffff8000f02ef030 x24: ffff0000091417b0 > > [ 931.206948] x23: ffff0000090aa000 x22: ffff8000f008b000 > > [ 931.206953] x21: 0000000000000002 x20: 000000000000001f > > [ 931.206957] x19: ffff8000f02ef018 x18: ffffffffffffffff > > [ 931.206961] x17: 0000000000000000 x16: 0000000000000000 > > [ 931.206966] x15: ffff0000090aa6c8 x14: 0720072007200720 > > [ 931.206970] x13: 0720072007200720 x12: 0720072007200720 > > [ 931.206975] x11: 0720072007200720 x10: 0720072007200720 > > [ 931.206980] x9 : 0720072007200720 x8 : 0720072007200720 > > [ 931.206984] x7 : 0720073107330720 x6 : 00000000000005a0 > > [ 931.206988] x5 : ffff00000860d4b0 x4 : 0000000000000000 > > [ 931.206993] x3 : 0000000000000001 x2 : 0000000000000001 > > [ 931.206997] x1 : 1bde3a91b0d4d900 x0 : 0000000000000000 > > [ 931.207001] Call trace: > > [ 931.207005] cqhci_irq+0x2e4/0x490 > > [ 931.207009] sdhci_arasan_cqhci_irq+0x5c/0x90 > > [ 931.207013] sdhci_irq+0x98/0x930 > > [ 931.207019] irq_forced_thread_fn+0x2c/0xa0 > > [ 931.207023] irq_thread+0x114/0x1c0 > > [ 931.207027] kthread+0x128/0x130 > > [ 931.207032] ret_from_fork+0x10/0x20 > > [ 931.207035] ---[ end trace 0000000000000002 ]--- > > > > The driver shows this message only for the first spurious interrupt > > by using WARN_ONCE(). Changing this to WARN() shows, that this is > > happening quite frequently (up to once a second). > > > > Since the eMMC 5.1 specification, where CQE and CQHCI are specified, > > does not mention that spurious TCN interrupts for DCMDs can be simply > > ignored, we must assume that using this feature is not working reliably. > > > > The current implementation uses DCMD for REQ_OP_FLUSH only, and > > I could not see any performance/power impact when disabling > > this optional feature for RK3399. > > > > Therefore this patch disables DCMDs for RK3399. > > > > Signed-off-by: Christoph Muellner > > Signed-off-by: Philipp Tomsich > > FYI, I leave this for arm-soc to pick up. I've duplicated your fixes+stable tags and applied for 5.2 Thanks Heiko