Received: by 2002:a17:90a:88:0:0:0:0 with SMTP id a8csp37953pja; Fri, 22 Nov 2019 03:09:08 -0800 (PST) X-Google-Smtp-Source: APXvYqyov6k3ubCWvp5FgudbQpy87tdvrAAkdiYIQNO3aDH3AnP7erAf6V09IHHYp9GLZ14r7HJN X-Received: by 2002:aa7:c2c7:: with SMTP id m7mr339673edp.295.1574420947793; Fri, 22 Nov 2019 03:09:07 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574420947; cv=none; d=google.com; s=arc-20160816; b=aPeaWM9LoztmoTXNCbcH3ywvU+4R/8iAwqkWXEWlLh4mrH9YluLHYxUQnM6b3i6JI4 hSB7IgIW3O/vbbh0y1Yg6GcF9W606fc1IIBA48HGJuHB51U4VeaOhl2YccDKgmg7SU8m 9PqQwG/Hld9vs4K0bNSMZhkNRrQ4AMVa6o90Owvzlf+7RP5bQXwSP71DWZL8dUCG+UVe p6w/hWpM7+G3zcsm1TjwFNifGYoaw+N6J+u9lcGhUsN1RYmdvz6joQkpqAjjJFxqviv1 m+v8frBgrQSevjvuYhDFWu3guiphdYtTL2GhfXvf79ELIbvR7pvBGW8Tm0eyj+4rC/1T LsNA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=E7MM1pKNvkcdFTyNC7+08f+VVzLevcOvSmAqVhX07K0=; b=g2QgEKuB/TgFzERxCFmHtxvS3ME42YySFX2/XJuQ/4BoYPc4szLT1DGkNlADyQw0VK tNRcLM7fFy47+6oxv4UI1SgfehLWH+wS80FQUZIYYLSen4QsmfGAt4jrw8fm93v7/JtL czphhQHQdabhpTyf35ZEabKiK7VBMyzC1lEQBrWTa+DUMquLokVZJSVocRGqLtYOKD4K kvlWaXhNoG83Dfdv5+zI8lK5UMb0baQhx+J7q5uINqjc0siYgX8LUC1Xk/U+GVTxkhEG 5xkg/Q5DLB9YY0ZUzG4rwBk2DDWNuv1/U3ewbsAJ0VdlJvI63VXxkh1oiUgDXq5SgJqJ KqFQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="ZUB/Nm68"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n3si4345609edq.254.2019.11.22.03.08.43; Fri, 22 Nov 2019 03:09:07 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="ZUB/Nm68"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731872AbfKVLG3 (ORCPT + 99 others); Fri, 22 Nov 2019 06:06:29 -0500 Received: from mail.kernel.org ([198.145.29.99]:34774 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731865AbfKVLG2 (ORCPT ); Fri, 22 Nov 2019 06:06:28 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 917AF2075E; Fri, 22 Nov 2019 11:06:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1574420788; bh=PoHu/DhS+f5VCbwNRPxqlH6ZIVZ4cG59h9sqHS6KGpY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ZUB/Nm68KOLfk2JGB1OTrs8eDwssgaiG5BMTaqdXFxsFIWF98x5xyAwVXrKTwVWKe 5YRuXXwK43zpKRvZOglcboPIRBMbkMwhBSBSCisFtDClejIQTbP2fEp2oirvU+Wcvj vGjRz9O8iY9MbOjF9kC7lBt48FjVp/+5I4yP/2tw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Takeshi Saito , Wolfram Sang , Simon Horman , Yoshihiro Shimoda , Ulf Hansson , Sasha Levin Subject: [PATCH 4.19 219/220] mmc: tmio: fix SCC error handling to avoid false positive CRC error Date: Fri, 22 Nov 2019 11:29:44 +0100 Message-Id: <20191122100929.359156615@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191122100912.732983531@linuxfoundation.org> References: <20191122100912.732983531@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Takeshi Saito [ Upstream commit 51b72656bb39fdcb8f3174f4007bcc83ad1d275f ] If an SCC error occurs during a read/write command execution, a false positive CRC error message is output. mmcblk0: response CRC error sending r/w cmd command, card status 0x900 check_scc_error() checks SCC_RVSREQ.RVSERR bit. RVSERR detects a correction error in the next (up or down) delay tap position. However, since the command is successful, only retuning needs to be executed. This has been confirmed by HW engineers. Thus, on SCC error, set retuning flag instead of setting an error code. Fixes: b85fb0a1c8ae ("mmc: tmio: Fix SCC error detection") Signed-off-by: Takeshi Saito [wsa: updated comment and commit message, removed some braces] Signed-off-by: Wolfram Sang Reviewed-by: Simon Horman Reviewed-by: Yoshihiro Shimoda Cc: stable@vger.kernel.org Signed-off-by: Ulf Hansson Signed-off-by: Sasha Levin --- drivers/mmc/host/tmio_mmc_core.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/drivers/mmc/host/tmio_mmc_core.c b/drivers/mmc/host/tmio_mmc_core.c index 94c43c3d3ae58..35630ccbe9e5d 100644 --- a/drivers/mmc/host/tmio_mmc_core.c +++ b/drivers/mmc/host/tmio_mmc_core.c @@ -926,8 +926,9 @@ static void tmio_mmc_finish_request(struct tmio_mmc_host *host) if (mrq->cmd->error || (mrq->data && mrq->data->error)) tmio_mmc_abort_dma(host); + /* SCC error means retune, but executed command was still successful */ if (host->check_scc_error && host->check_scc_error(host)) - mrq->cmd->error = -EILSEQ; + mmc_retune_needed(host->mmc); /* If SET_BLOCK_COUNT, continue with main command */ if (host->mrq && !mrq->cmd->error) { -- 2.20.1