Received: by 2002:a05:7412:251c:b0:e2:908c:2ebd with SMTP id w28csp1751182rda; Tue, 24 Oct 2023 02:00:32 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGc3IIeTMV2OWkZ7E3Fjg1l4WFDLpmALoBAnh7GFMBlkRaaEiWXa80rYeuz7AouAjwzPk9x X-Received: by 2002:a9d:61c2:0:b0:6c4:7eff:f055 with SMTP id h2-20020a9d61c2000000b006c47efff055mr11158141otk.29.1698138032382; Tue, 24 Oct 2023 02:00:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698138032; cv=none; d=google.com; s=arc-20160816; b=cV9i1v41gCJ8Wp7PDvuwJv1SrnEF7tRxFW8JldjEwuym8S7QjWQ2g0VVk6LyTKueuX ztEjPA4O8qE8GxIeA2/8YDaJHeBn9RGiYiotCEcApiHW7JOP+0zPUXvj+B+q05LAiIqr o39KNDJrjRWF9Tt2ezrrZoKSXGraDSkVNqyd6zReVhpLsk9y9QXoOwR9sL5Y0XpBhgrx GExw2ruHel/Q7ZnJKMWsuOQ7o3/E42hZEUwpToTpDkW4Mh/bJzf5nIM0mzUljEjmFSev z2f19F4BJEla04WBQMhQeT86hwD68G50aUUMHcZ9l0Yx05dp473XjjnR/zeBETJgkvqB ZRdg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:message-id:references :in-reply-to:subject:cc:to:from:date:mime-version:dkim-signature; bh=ZqGqaIFtGkF5J02xsc7tMyJ4K90Kq7KYiL/pwEQrR8A=; fh=IzVS0IpW3ThbB5/536N62aFXaSB/IdKSnHlyzl07SWk=; b=rcGym5ROBWGaTO3GBXZDNWw0BPqM6m1mynZirfxpDC73bQDLpQ30vcosZNBUgQHpAI Tmn21t0pHS79FaefrvZERAev7BP5OzPnzOluwtU1LdSse8VDZW7zhDHo/efZZi41pCgS vX/laRyG3wuUDpfuvBz28OPOqwW4OnNDIxjF7bIatEGpWkiQ+odqBffIxT1ab878RyMg gNMkkqflq226IQB2V9GelUQ099mmHFD0mwqXTdb21+Es4oruJspVsq/KDUY8baRTQPOv tj/Ix22n/52LHIFqR/rA7lR3JiuCjjwVvJhceYTo4sD/GHFBCNqEBQPMpiiRDTosJxby CD8A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@walle.cc header.s=mail2022082101 header.b=P19fH+nc; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=walle.cc Return-Path: Received: from groat.vger.email (groat.vger.email. [2620:137:e000::3:5]) by mx.google.com with ESMTPS id b30-20020a63715e000000b005778df5647dsi8133737pgn.401.2023.10.24.02.00.31 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 24 Oct 2023 02:00:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) client-ip=2620:137:e000::3:5; Authentication-Results: mx.google.com; dkim=pass header.i=@walle.cc header.s=mail2022082101 header.b=P19fH+nc; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=walle.cc Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id 5EA3C80774A4; Tue, 24 Oct 2023 02:00:14 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234026AbjJXI75 (ORCPT + 99 others); Tue, 24 Oct 2023 04:59:57 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41868 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234015AbjJXI7z (ORCPT ); Tue, 24 Oct 2023 04:59:55 -0400 Received: from mail.3ffe.de (0001.3ffe.de [IPv6:2a01:4f8:c0c:9d57::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B7B4712E for ; Tue, 24 Oct 2023 01:59:52 -0700 (PDT) Received: from 3ffe.de (0001.3ffe.de [IPv6:2a01:4f8:c0c:9d57::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mail.3ffe.de (Postfix) with ESMTPSA id 2992E133; Tue, 24 Oct 2023 10:59:50 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=walle.cc; s=mail2022082101; t=1698137990; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=ZqGqaIFtGkF5J02xsc7tMyJ4K90Kq7KYiL/pwEQrR8A=; b=P19fH+nc6zNGHO+8hat2XBGJCy1s0Bc3pRhGCdjL/AjBOS2bGL69m6+p1IO749fclu25CL cDtYBYZLAZvHnJX8S/6iV8aTjboMOiC1lRzzVSdGfrVxDw4+rkgpNe0yDrANYH5FpfPpkA ifUlCGqFJEOm9SW6y/bGZX3/8A2nf8l8JJ9zo8ORlxAnHJx4Om1+yBD0ZQ5AjB6Zdyfi6E I6XHCX8CvhHzS5tu/DNtPa4zK0GKHCvKRJH7aSGRblMmYVxaZ7buV7/ZoPN0DByGplndGq AqZvLZqUXU2YFZcooc+zrkZUCwtGtbXojoxBLago26fh4NrBjIcU6sdqNiJJ7g== MIME-Version: 1.0 Date: Tue, 24 Oct 2023 10:59:50 +0200 From: Michael Walle To: AceLan Kao Cc: Tudor Ambarus , Pratyush Yadav , Miquel Raynal , Richard Weinberger , Vignesh Raghavendra , linux-mtd@lists.infradead.org, linux-kernel@vger.kernel.org, mika.westerberg@linux.intel.com Subject: Re: [PATCH v2] mtd: spi-nor: Improve reporting for software reset failures In-Reply-To: <20231024074332.462741-1-acelan.kao@canonical.com> References: <20231024074332.462741-1-acelan.kao@canonical.com> Message-ID: <4c11d06931f9b4e29c0e8feafc18e763@walle.cc> X-Sender: michael@walle.cc Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-0.8 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Tue, 24 Oct 2023 02:00:14 -0700 (PDT) [+Mika] > From: "Chia-Lin Kao (AceLan)" > > When the software reset command isn't supported, we now report it as an > informational message(dev_info) instead of a warning(dev_warn). > This adjustment helps avoid unnecessary alarm and confusion regarding > software reset capabilities. > > v2. only lower the priority for the not supported failure > > Signed-off-by: Chia-Lin Kao (AceLan) > --- > drivers/mtd/spi-nor/core.c | 10 ++++++++-- > 1 file changed, 8 insertions(+), 2 deletions(-) > > diff --git a/drivers/mtd/spi-nor/core.c b/drivers/mtd/spi-nor/core.c > index 1b0c6770c14e..76920dbc568b 100644 > --- a/drivers/mtd/spi-nor/core.c > +++ b/drivers/mtd/spi-nor/core.c > @@ -3252,7 +3252,10 @@ static void spi_nor_soft_reset(struct spi_nor > *nor) > > ret = spi_mem_exec_op(nor->spimem, &op); > if (ret) { > - dev_warn(nor->dev, "Software reset failed: %d\n", ret); > + if (ret == -ENOTSUPP) It bothers me that we use ENOTSUPP here. We should really use EOPNOTSUPP. The core uses EOPNOTSUPP everywhere except for the intel things. Please have a look at changing that to EOPNOTSUPP. See also: https://lore.kernel.org/linux-mtd/85f9c462-c155-dc17-dc97-3254acfa55d2@microchip.com/ > + dev_info(nor->dev, "Software reset enable command doesn't support: > %d\n", ret); I'm not sure this is helpful. It's only the intel SPI controller which does magic things (instead of just issuing our commands). Mika, do you know wether your controller will do a reset on it's own? I presume so, because AFAIR you have some kind of high level controller which also does SFDP parsing and read opcode handling on their own. > + else > + dev_warn(nor->dev, "Software reset failed: %d\n", ret); > return; > } > > @@ -3262,7 +3265,10 @@ static void spi_nor_soft_reset(struct spi_nor > *nor) > > ret = spi_mem_exec_op(nor->spimem, &op); > if (ret) { > - dev_warn(nor->dev, "Software reset failed: %d\n", ret); > + if (ret == -ENOTSUPP) > + dev_info(nor->dev, "Software reset command doesn't support: %d\n", > ret); I'd leave that as is, because how are the chances that the first one is supported and the second command, isn't? When working with the intel controller, we'll return early after the first spi_mem_exec_op(). -michael > + else > + dev_warn(nor->dev, "Software reset failed: %d\n", ret); > return; > }