Received: by 2002:a05:7412:b995:b0:f9:9502:5bb8 with SMTP id it21csp3199211rdb; Tue, 26 Dec 2023 22:13:49 -0800 (PST) X-Google-Smtp-Source: AGHT+IEpnuZ7yVzNdt/VpOxc9iiwmmrs/uEHGPwqzRtB0UJ8nI6oOsGO+G/y7bxJID4AO9zbODdN X-Received: by 2002:a17:907:2d87:b0:a26:9cd6:6a1b with SMTP id gt7-20020a1709072d8700b00a269cd66a1bmr4280002ejc.40.1703657629174; Tue, 26 Dec 2023 22:13:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1703657629; cv=none; d=google.com; s=arc-20160816; b=srey8s99JLZN/IkTt1/W0rmWJkk3l7p4wSzrPla7Zj+sX6RS+kb6ABVpx9uHy4A9E0 RmePe/3eNwQyt5VFffv2NJF+o316Nufx9y04IvZP7JJfJdQTwA3DPCrrvpgYRF4RW1zN 47GDTM4JG1DXfvLXLtqoJb0C3TRPhScH5DsBlZkwZhDHE9ih5CvjYNkDnciIkQ0uqc1g M9eKWo7cGxPFY/DKiKzWI1g0KJgBCRgMg34KcncW8syS5rgGCafHchrpmVOalQPx7zq/ hMcNb0Z/R0R1EIH0wAbXgsJdMl8sjk1ZT9elhZrqP7pTfKXheKIX84lA+GcN1BAIquyt iv4Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:list-unsubscribe:list-subscribe:list-id:precedence :references:message-id:subject:cc:to:from:date:dkim-signature; bh=Tyl2VqDjt3D5lNxBYeQ7B/zo4QFRwhTdyFySDm3QktU=; fh=UMGRLhNHoojhisMeDDlVUXY29HzeMT96/NrbQoq/sWI=; b=cvY3kHEAaR+PUtiUjbfylW0t/x5OxLJm5sYWKsUJbEmBWY6LuE/0ZjYiEtKjMe7EkP QIaFdkLlQdkHVx5RIaJtxRvDZuZc3nGlAFbK0SIyWcceGXBlFpck/jkBL9gPJTObfQlv V9qsaE+48KJ6zwipSR9nKLMwHrwt6ptQVJ6/KHk0hXUCuMw/XwQUPWrhgGLvfBctOKM/ Qzd1xgss5RaMWIoR6Rt+UPF/0MChQJIHxxtqkPJmLsjpORXRHxoLSou6RGiZb9DiMART rXm2CTV+YpTg1wtpjzilQv73td1rvY1twe0aCLsNSOvdP+drHs8QuyQ6MJcQFwC4nKqB QWTw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Nce85qwp; spf=pass (google.com: domain of linux-kernel+bounces-11850-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-11850-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id a10-20020a170906368a00b00a2362fdcd72si5477577ejc.708.2023.12.26.22.13.49 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 26 Dec 2023 22:13:49 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-11850-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Nce85qwp; spf=pass (google.com: domain of linux-kernel+bounces-11850-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-11850-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id E91BD1F22CE6 for ; Wed, 27 Dec 2023 06:13:48 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 1BB4D5687; Wed, 27 Dec 2023 06:13:30 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="Nce85qwp" X-Original-To: linux-kernel@vger.kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 44EC65C9C; Wed, 27 Dec 2023 06:13:28 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 03545C433C7; Wed, 27 Dec 2023 06:13:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1703657608; bh=Z0HbVb39Y0GB2FLNaCZrOecrN2XrOMtaehWwhJhRtMU=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Nce85qwpQaLfStbrawAERY3lGpL3rAELIEEpHODCWbcxS+D6YjB4p/mUoaSOkVGhQ jy8D3k2+pLkOMRPp1IuVlRl8fESpdS9IGPr8a6a7w1N3JkKWUuHz6N4uLf1sa9oT1z CdIQY1lOqYXJGNzpLKesLSJVXlOX5fKvPofPLs/El6iwZBpj8TCSIuV301TfxlKbdv R9Q6MI1nbg+iLIGfGdiEUv6C8qp68prE49Q11z2PNv4sSCHatToBlcU23nwodqbeTW Cu5Y+GZD3rWhdHLwmTLulCbE/ZaBQigCYiLzNFUeVfKi570cc63Ng+AGDjjXzGjfA6 7OtB08tZVBdBw== Date: Wed, 27 Dec 2023 11:43:17 +0530 From: Manivannan Sadhasivam To: Andrew Halaney Cc: Andy Gross , Bjorn Andersson , Konrad Dybcio , "James E.J. Bottomley" , "Martin K. Petersen" , Yaniv Gardi , Dov Levenglick , Hannes Reinecke , Subhash Jadavani , Gilad Broner , Venkat Gopalakrishnan , Janek Kotas , Alim Akhtar , Avri Altman , Bart Van Assche , Anjana Hari , Dolev Raviv , Can Guo , Will Deacon , linux-arm-msm@vger.kernel.org, linux-scsi@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH RFC v2 08/11] scsi: ufs: core: Perform read back after disabling interrupts Message-ID: <20231227061317.GF2814@thinkpad> References: <20231221-ufs-reset-ensure-effect-before-delay-v2-0-75af2a9bae51@redhat.com> <20231221-ufs-reset-ensure-effect-before-delay-v2-8-75af2a9bae51@redhat.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20231221-ufs-reset-ensure-effect-before-delay-v2-8-75af2a9bae51@redhat.com> On Thu, Dec 21, 2023 at 12:25:25PM -0600, Andrew Halaney wrote: > Currently, interrupts are cleared and disabled prior to registering the > interrupt. An mb() is used to complete the clear/disable writes before > the interrupt is registered. > > mb() ensure that the write completes, but completion doesn't mean that > it isn't stored in a buffer somewhere. The recommendation for > ensuring these bits have taken effect on the device is to perform a read > back to force it to make it all the way to the device. This is > documented in device-io.rst and a talk by Will Deacon on this can > be seen over here: > > https://youtu.be/i6DayghhA8Q?si=MiyxB5cKJXSaoc01&t=1678 > > Let's do that to ensure these bits hit the device. Because the mb()'s > purpose wasn't to add extra ordering (on top of the ordering guaranteed > by writel()/readl()), it can safely be removed. > > Fixes: 199ef13cac7d ("scsi: ufs: avoid spurious UFS host controller interrupts") > Signed-off-by: Andrew Halaney Same comment as patch 07/11. Reviewed-by: Manivannan Sadhasivam - Mani > --- > drivers/ufs/core/ufshcd.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/drivers/ufs/core/ufshcd.c b/drivers/ufs/core/ufshcd.c > index 7bfb556e5b8e..bb603769b029 100644 > --- a/drivers/ufs/core/ufshcd.c > +++ b/drivers/ufs/core/ufshcd.c > @@ -10568,7 +10568,7 @@ int ufshcd_init(struct ufs_hba *hba, void __iomem *mmio_base, unsigned int irq) > * Make sure that UFS interrupts are disabled and any pending interrupt > * status is cleared before registering UFS interrupt handler. > */ > - mb(); > + ufshcd_readl(hba, REG_INTERRUPT_ENABLE); > > /* IRQ registration */ > err = devm_request_irq(dev, irq, ufshcd_intr, IRQF_SHARED, UFSHCD, hba); > > -- > 2.43.0 > -- மணிவண்ணன் சதாசிவம்