From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id A86CCC43334 for ; Fri, 15 Jul 2022 08:50:01 +0000 (UTC) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 2E681802C2; Fri, 15 Jul 2022 10:49:59 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=kernel.org Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (2048-bit key; unprotected) header.d=kernel.org header.i=@kernel.org header.b="NYNTJSI4"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id CEFEB802C2; Fri, 15 Jul 2022 10:49:56 +0200 (CEST) Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 3EB1481874 for ; Fri, 15 Jul 2022 10:49:54 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=kernel.org Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=kabel@kernel.org Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id E2056B82A27; Fri, 15 Jul 2022 08:49:53 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3845CC34115; Fri, 15 Jul 2022 08:49:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1657874992; bh=9orEDuozwfmZ1WSiP4b/xCb3Y9H1QzUw85V9r0ByKgA=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=NYNTJSI48LUcL5zpXLEDkLhYzv6NwFm0ff55kCm2vQT7SzFr2Ocj6IDUf48estHDG 42yV4FY4n9BO51Q61O72UKR+ioQOm+/rvL4wUrQbIa29cfEhdIISFwEbv20yxnM7rd oiN/QFWFzALpFjQFIR0IfHwrMz0thKTJfXzNkCimE8WOhNZUXYaP6aaa7GGy3ZLkim F07FWpKFeVmzPw48futI+HU4XEoJrDHyEDi+UIwbhpNQdMVFc9OQKVynIrFO4N/NDS ny2Aho32hr2sLFf0ODgZCi0g/T4qZ04VjTj6XfSsIGGfSbLSMy3/YmRTpdZ1qKLTC+ T1/NLQC94IBJA== Date: Fri, 15 Jul 2022 10:49:47 +0200 From: Marek =?UTF-8?B?QmVow7pu?= To: Marek Vasut Cc: u-boot@lists.denx.de, Jaehoon Chung , Kirill Kapranov , Pantelis Antoniou , Ye Li Subject: Re: [PATCH] mmc: Do not send status of send_status is false Message-ID: <20220715104947.43ffa225@dellmb> In-Reply-To: <20220714235824.421904-1-marex@denx.de> References: <20220714235824.421904-1-marex@denx.de> X-Mailer: Claws Mail 3.19.0 (GTK+ 2.24.33; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.39 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.6 at phobos.denx.de X-Virus-Status: Clean On Fri, 15 Jul 2022 01:58:24 +0200 Marek Vasut wrote: > Commit 44645f87de5 ("mmc: Fix mmc_switch excessive timeout") introduced > a side effect where CMD13 SEND_STATUS is issued in case mmc_wait_dat0() > does not return -ENOSYS and $send_status is not set. This happens on all > hardware which does implement .mmc_wait_dat0 callback, e.g. i.MX8M . >=20 > This leads to lengthy timeout before booting OS in case of eMMC in one > of the HS200/HS400 modes, since the card cannot respond to CMD13 while > downgrading from HS200/HS400 to regular HS mode. >=20 > Fix this by adding the missing conditional. >=20 > Fixes: 44645f87de5 ("mmc: Fix mmc_switch excessive timeout") > Signed-off-by: Marek Vasut > Cc: Jaehoon Chung > Cc: Kirill Kapranov > Cc: Marek Beh=C3=BAn > Cc: Pantelis Antoniou > Cc: Ye Li Does the lenghty timeout occur even on xenon with the patch https://source.denx.de/u-boot/u-boot/-/commit/0f3466f52fbacce67e147b9234e63= 23edff26a6d ? Marek