[PATCH] nvme: Enable FUA

Jon Lin jon.lin at rock-chips.com
Mon Sep 27 15:25:24 CEST 2021


On 2021/9/27 20:28, Stefan Agner wrote:
> On 2021-09-26 11:12, Jon Lin wrote:
>> Most NVME devcies maintain data in internal cache for an uncertain
>> times, and u-boot has no method to force NVME to flush cache.
>> So this patch adds FUA to avoid data loss caused by power off after data
>> programming.
> Maybe worth mentioning that FUA stands for Force Unit Access and makes
> sure that data has been written to non-volatile storage before command
> completion.
>
> It seems to me that volatile cache needs to be explicitly enabled by the
> Volatile Write Cache feature. But I guess it could be already enabled by
> earlier firmware/on reboot? Setting the FUA bit will make certain that
> data land on non-volatile storage in any case. So:
>
> Reviewed-by: Stefan Agner <stefan at agner.ch>
>
> Out of curiosity, has this been a problem in a real world situation?

We are trying to interact with the host computer in the device u-boot 
stage, involving nvme

upgrade and device reset. When the two progress are continuous, there 
are corresponding problems.

> --
> Stefan
>
>> Signed-off-by: Jon Lin <jon.lin at rock-chips.com>
>> ---
>>
>>   drivers/nvme/nvme.c | 3 +++
>>   1 file changed, 3 insertions(+)
>>
>> diff --git a/drivers/nvme/nvme.c b/drivers/nvme/nvme.c
>> index f6465ea7f4..5d05cb6e9e 100644
>> --- a/drivers/nvme/nvme.c
>> +++ b/drivers/nvme/nvme.c
>> @@ -761,6 +761,9 @@ static ulong nvme_blk_rw(struct udevice *udev,
>> lbaint_t blknr,
>>   	c.rw.appmask = 0;
>>   	c.rw.metadata = 0;
>>   
>> +	/* Always enable FUA for data integrity */
>> +	c.rw.control |= NVME_RW_FUA;
>> +
>>   	while (total_lbas) {
>>   		if (total_lbas < lbas) {
>>   			lbas = (u16)total_lbas;
>
>




More information about the U-Boot mailing list