Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp4407919pxu; Mon, 21 Dec 2020 11:39:43 -0800 (PST) X-Google-Smtp-Source: ABdhPJz4+IIT1nLkuizOLvmlmDiRPpwPlSTR+5Se+yri0KLmMU4h7ss2dPo535RfbETBCBonLkPi X-Received: by 2002:a17:906:ceca:: with SMTP id si10mr16627437ejb.547.1608579583624; Mon, 21 Dec 2020 11:39:43 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1608579583; cv=none; d=google.com; s=arc-20160816; b=HcKM9ReclCDWzEg5341aWGFcIgD4uJqUbVY77Ey1smDUapLpKZSFRAVQg0BI1+Whuw hEpG1KznAymgtPL66xc2YJ6TxXZyUvUXXLkjEKvTiGMKt+sq2AcPVPBsaJGrUW07rShX RMqvaRTKg0rTraiOFEd65KhTytM5pVHnrQ7JsJ0ZDTpPwV9z358Qgs4Soe2/b2uxPHOJ zFJ039akyPIMtUaJA8prZnEFJ0BoPdlwUruCUCgCwUUE6XFGIrdkJvexlTCftzwnIfP3 IWWj3KATf0eC8Q1fBJaxJLTxnaQadbo00ZrVX8OlAA3FFAGXizUWNp4hkU7p5hJXaa+d WY7g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:dkim-signature:date; bh=7nQgAPstN1yjwHJ2821aCvO2G3ocs26gjfwQOd580Js=; b=HbnsU07srlwaMorc7a23SXJaZsG+IXgGXCKXgtesaKTM54JbxZamgP560Yv/Kqkx0P tJ3W6kvvMU+LUFA2YTuXLNUQJvxq9OgLXBtzHiCbYOniVoK0jvFthb+hHJuOlemSbcBo mpyRXp6vZOtTCo/MRCYbDGzG02v0C1/5N5cDL2z5ljJ2vBs1Mja4Z0gWnk1ESiRV97Vi RUUMoQNDrhlaXlEcOgLQGTeooPaJdKRKxiVWcSWf4gKFgERL6pajIYjxoa6Lw7lDfPps DUBXM27aiGxTMbMRfl526OELqhekTzbjqyYm9pM9vjP9qnW5zLI3o8fqrFXZj7Vd07oD Nw3Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=UJECePVy; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q16si10817573edc.229.2020.12.21.11.39.21; Mon, 21 Dec 2020 11:39:43 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=UJECePVy; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726931AbgLUTg3 (ORCPT + 99 others); Mon, 21 Dec 2020 14:36:29 -0500 Received: from mail.kernel.org ([198.145.29.99]:59338 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726156AbgLUTg3 (ORCPT ); Mon, 21 Dec 2020 14:36:29 -0500 Date: Mon, 21 Dec 2020 11:35:46 -0800 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1608579348; bh=2lqgR00qc9wFs3OvQRFyNxaQ1yrUzpoIxKyixIV+lOg=; h=From:To:Cc:Subject:References:In-Reply-To:From; b=UJECePVyuuV27UbPmCG/5VNZMeQ9BS5BQ6F4N7OBfyYihowf2buhmsMWU28UJNLra xUwSxcrNdEXBMk98h3DXLICiXGxMK2rQo+iR89hh0Lw5ZdYQOhq+UDSjRYAZYOUThu OB3QZeDOD0j1lLXEjRN/mhJ+gFcz9S9f6v+coUA3AJmWncTWTvZ7pzlIxvfH3gVZep lEL06kkO9hflcRKQ7QNT1Rd8FEpk+qaSwz09yBfC++jRMWZTJ64TvHIEdgRIuXu8NG vPKWPm6/9sFKSUtSY8tyfKd8P+UFfu2kolhYj2lMSGvwRtDOymL3qQ0H1W91phgkLP nbDrJeaIy9T4A== From: Jaegeuk Kim To: Avri Altman Cc: "linux-kernel@vger.kernel.org" , "linux-scsi@vger.kernel.org" , "kernel-team@android.com" , "cang@codeaurora.org" , "alim.akhtar@samsung.com" , "bvanassche@acm.org" , "martin.petersen@oracle.com" , "stanley.chu@mediatek.com" Subject: Re: [PATCH] scsi: ufs: fix livelock of ufshcd_clear_ua_wluns Message-ID: References: <20201218033131.2624065-1-jaegeuk@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 12/21, Avri Altman wrote: > > > > > > On 12/21, Avri Altman wrote: > > > > > > When gate_work/ungate_work gets an error during hibern8_enter or > > > > exit, > > > > > > ufshcd_err_handler() > > > > > > ufshcd_scsi_block_requests() > > > > > > ufshcd_reset_and_restore() > > > > > > ufshcd_clear_ua_wluns() -> stuck > > > > > > ufshcd_scsi_unblock_requests() > > > > > > > > > > > > In order to avoid it, ufshcd_clear_ua_wluns() can be called per > > recovery > > > > > > flows > > > > > > such as suspend/resume, link_recovery, and error_handler. > > > > > Not sure that suspend/resume are UAC events? > > > > > > > > Could you elaborate a bit? The goal is to clear UAC after UFS reset > > happens. > > > So why calling it on every suspend and resume? > > > > 1. If UAC was cleared, there's no impact. > But the command is still sent. No, ufshcd_clear_ua_wluns() will return by hba->wlun_dev_clr_ua. > > > 2. ufshcd_link_recovery() can reset UFS directly by ufs_mtk_resume(). > > 3. ufshcd_suspend can call ufshcd_host_reset_and_restore() as well. > Seems excessive IMO. > Why not selectively send when indeed required, e.g. on reset? I think hba->wlun_dev_clr_ua is the indicator whether there was a reset or not.