From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.1 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3E409C04AAF for ; Mon, 20 May 2019 18:41:36 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 15CB9214DA for ; Mon, 20 May 2019 18:41:36 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=chromium.org header.i=@chromium.org header.b="a5ju2t/4" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726049AbfETSlf (ORCPT ); Mon, 20 May 2019 14:41:35 -0400 Received: from mail-vs1-f67.google.com ([209.85.217.67]:38470 "EHLO mail-vs1-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725971AbfETSlf (ORCPT ); Mon, 20 May 2019 14:41:35 -0400 Received: by mail-vs1-f67.google.com with SMTP id x184so8521193vsb.5 for ; Mon, 20 May 2019 11:41:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=eXzq25JjkHKfqM12yrowm3Yo57M4GMY0BfDmn8niRoc=; b=a5ju2t/4nHOU5nEcrI65+QzWOU6crA5EBdKI3G/l/upgB/reaEtlAi/v4+LbS8hPso 8pDE5IpJCVggowauiA0vT/v4VrL6nsfI9HiXEH+UJlT8lbmzsXva69SSqkHcjwym+5wk yqWoQuKYtV8KdIzEPlkCkqCTtbE/U/mBOqTk4= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=eXzq25JjkHKfqM12yrowm3Yo57M4GMY0BfDmn8niRoc=; b=MUryDAcYWnWoR/VmjMxf0Hcb8ImIEjtYhJ605gHQz1EZjGx2SbFib20kWlGr5mm7iT YOuKTrEi3wob78fC710i7NCYgIEucGZ8xVM7aXdVWPQ3iLd0K8FswRbhg0EByD3OoCyf FOESqjE+JfH0bmP279UyGZWqhpznesbzNSjzPO+/zdHuJjGBZ3doln66CxnoFQef85Zw nCzcllGaTbpVwMfRx30dAIKAWf9CuG+Rop6a63ZfrrmcTjuA1wzLCSt9CdhrArJkHEcq 6bCfJFFBGTmMFsjD6vjtS675okplETZe+8B9U/ddTCWKOp+IpdNkgvQanZwgSizdFyz0 AGPA== X-Gm-Message-State: APjAAAV7tbmyqCPpwZK68rnKcFe5VtSLc46Oilt4VeaGNZwYVtk4Pyzu 4SdBBDFPg2BiBRE5Z4+wEfN3XffYBUQ= X-Google-Smtp-Source: APXvYqwRc4hPb3xxWO2ZPxLGQfZ2wKfGMNkQ9WUiOPNGPvbeDW+BMv30A+/kHxKblR8alBekmd9Zfw== X-Received: by 2002:a05:6102:247:: with SMTP id a7mr11237073vsq.229.1558377693233; Mon, 20 May 2019 11:41:33 -0700 (PDT) Received: from mail-vk1-f178.google.com (mail-vk1-f178.google.com. [209.85.221.178]) by smtp.gmail.com with ESMTPSA id o11sm9153790vkf.13.2019.05.20.11.41.31 for (version=TLS1_3 cipher=AEAD-AES128-GCM-SHA256 bits=128/128); Mon, 20 May 2019 11:41:32 -0700 (PDT) Received: by mail-vk1-f178.google.com with SMTP id l73so4123075vkl.8 for ; Mon, 20 May 2019 11:41:31 -0700 (PDT) X-Received: by 2002:a1f:1e48:: with SMTP id e69mr8852626vke.16.1558377691267; Mon, 20 May 2019 11:41:31 -0700 (PDT) MIME-Version: 1.0 References: <20190429204040.18725-1-dianders@chromium.org> In-Reply-To: <20190429204040.18725-1-dianders@chromium.org> From: Doug Anderson Date: Mon, 20 May 2019 11:41:19 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v2] mmc: dw_mmc: Disable SDIO interrupts while suspended to fix suspend/resume To: Ulf Hansson Cc: Kalle Valo , =?UTF-8?Q?Heiko_St=C3=BCbner?= , "open list:ARM/Rockchip SoC..." , Guenter Roeck , Brian Norris , linux-wireless , Sonny Rao , Emil Renner Berthing , Matthias Kaehlcke , Ryan Case , stable@vger.kernel.org, Linux MMC List , LKML , Jaehoon Chung , Shawn Lin Content-Type: text/plain; charset="UTF-8" Sender: stable-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org Hi, On Mon, Apr 29, 2019 at 1:41 PM Douglas Anderson wrote: > > Processing SDIO interrupts while dw_mmc is suspended (or partly > suspended) seems like a bad idea. We really don't want to be > processing them until we've gotten ourselves fully powered up. > > You might be wondering how it's even possible to become suspended when > an SDIO interrupt is active. As can be seen in > dw_mci_enable_sdio_irq(), we explicitly keep dw_mmc out of runtime > suspend when the SDIO interrupt is enabled. ...but even though we > stop normal runtime suspend transitions when SDIO interrupts are > enabled, the dw_mci_runtime_suspend() can still get called for a full > system suspend. > > Let's handle all this by explicitly masking SDIO interrupts in the > suspend call and unmasking them later in the resume call. To do this > cleanly I'll keep track of whether the client requested that SDIO > interrupts be enabled so that we can reliably restore them regardless > of whether we're masking them for one reason or another. > > It should be noted that if dw_mci_enable_sdio_irq() is never called > (for instance, if we don't have an SDIO card plugged in) that > "client_sdio_enb" will always be false. In those cases this patch > adds a tiny bit of overhead to suspend/resume (a spinlock and a > read/write of INTMASK) but other than that is a no-op. The > SDMMC_INT_SDIO bit should always be clear and clearing it again won't > hurt. > > Without this fix it can be seen that rk3288-veyron Chromebooks with > Marvell WiFi would sometimes fail to resume WiFi even after picking my > recent mwifiex patch [1]. Specifically you'd see messages like this: > mwifiex_sdio mmc1:0001:1: Firmware wakeup failed > mwifiex_sdio mmc1:0001:1: PREP_CMD: FW in reset state > > ...and tracing through the resume code in the failing cases showed > that we were processing a SDIO interrupt really early in the resume > call. > > NOTE: downstream in Chrome OS 3.14 and 3.18 kernels (both of which > support the Marvell SDIO WiFi card) we had a patch ("CHROMIUM: sdio: > Defer SDIO interrupt handling until after resume") [2]. Presumably > this is the same problem that was solved by that patch. > > [1] https://lkml.kernel.org/r/20190404040106.40519-1-dianders@chromium.org > [2] https://crrev.com/c/230765 > > Cc: # 4.14.x > Signed-off-by: Douglas Anderson > --- > I didn't put any "Fixes" tag here, but presumably this could be > backported to whichever kernels folks found it useful for. I have at > least confirmed that kernels v4.14 and v4.19 (as well as v5.1-rc2) > show the problem. It is very easy to pick this to v4.19 and it > definitely fixes the problem there. > > I haven't spent the time to pick this to 4.14 myself, but presumably > it wouldn't be too hard to backport this as far as v4.13 since that > contains commit 32dba73772f8 ("mmc: dw_mmc: Convert to use > MMC_CAP2_SDIO_IRQ_NOTHREAD for SDIO IRQs"). Prior to that it might > make sense for anyone experiencing this problem to just pick the old > CHROMIUM patch to fix them. > > Changes in v2: > - Suggested 4.14+ in the stable tag (Sasha-bot) > - Extra note that this is a noop on non-SDIO (Shawn / Emil) > - Make boolean logic cleaner as per https://crrev.com/c/1586207/1 > - Hopefully clear comments as per https://crrev.com/c/1586207/1 > > drivers/mmc/host/dw_mmc.c | 27 +++++++++++++++++++++++---- > drivers/mmc/host/dw_mmc.h | 3 +++ > 2 files changed, 26 insertions(+), 4 deletions(-) Ulf: are you the right person to land this? With 5.2-rc1 out it might be a good time for it? To refresh your memory about this patch: * Patch v1 was posted back on April 10th [1] so we're at about 1.5 months of time for people to comment about it now. Should be more than enough. * Shawn Lin saw it and didn't hate it. He had some confusion about how it worked and I've hopefully alleviated via extra comments / text. * Emil Renner Berthing thought it caused a regression for him but then tested further and was convinced that it didn't. This is extra confirmation that someone other than me did try the patch and found it to not break things. ;-) * It has been reviewed by Guenter Roeck (in v2) [1] https://lkml.kernel.org/r/20190410221237.160856-1-dianders@chromium.org -Doug