Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751394AbdGMLhK (ORCPT ); Thu, 13 Jul 2017 07:37:10 -0400 Received: from mail.kernel.org ([198.145.29.99]:52632 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751050AbdGMLhJ (ORCPT ); Thu, 13 Jul 2017 07:37:09 -0400 DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 2927222B4D Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=helgaas@kernel.org Date: Thu, 13 Jul 2017 06:37:06 -0500 From: Bjorn Helgaas To: Greg Kroah-Hartman Cc: Marc Zyngier , Bjorn Helgaas , Mathias Nyman , linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org, linux-usb@vger.kernel.org, Ard Biesheuvel Subject: Re: [PATCH 0/2] Workaround for uPD72020x USB3 chips Message-ID: <20170713113706.GK4486@bhelgaas-glaptop.roam.corp.google.com> References: <20170710155230.8622-1-marc.zyngier@arm.com> <20170713031234.GD4486@bhelgaas-glaptop.roam.corp.google.com> <20170713082640.GA6367@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20170713082640.GA6367@kroah.com> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3135 Lines: 63 On Thu, Jul 13, 2017 at 10:26:40AM +0200, Greg Kroah-Hartman wrote: > On Wed, Jul 12, 2017 at 10:12:34PM -0500, Bjorn Helgaas wrote: > > On Mon, Jul 10, 2017 at 04:52:28PM +0100, Marc Zyngier wrote: > > > Ard and myself have just spent quite some time lately trying to pin > > > down an issue in the DMA code which was taking the form of a PCIe USB3 > > > controller issuing a DMA access at some bizarre address, and being > > > caught red-handed by the IOMMU. > > > > > > After much head scratching and most of a week-end spent on tracing the > > > damn thing, I'm now convinced that the DMA code is fine, the XHCI > > > driver is correct, but that the HW (a Renesas uPD720202 chip) is a > > > nasty piece of work. > > > > > > The issue is as follow: > > > > > > - EFI initializes the controller using physical addresses above the > > > 4GB limit (this is on an arm64 box where the memory starts at > > > 0x80_00000000...). > > > > > > - The kernel takes over, sends a XHCI reset to the controller, and > > > because we have an IOMMU sitting between the controller and memory, > > > provides *virtual* addresses. Trying to make things a bit faster for > > > our controller, it issues IOVAs in the low 4GB range). > > > > > > - Low and behold, the controller is now issuing transactions with a > > > 0x80 prefix in front of our IOVA. Yes, the same prefix that was > > > programmed during the EFI configuration. IOMMU fault, not happy. > > > > > > If the kernel is hacked to only generate IOVAs that are more than > > > 32bit wide, the HW behaves correctly. The only way I can explain this > > > behaviour is that the HW latches the top 32bit of the ERST (it is > > > always the ERST IOVA that appears in my traces) in some internal > > > register, and that the XHCI reset fails to clear it. Writing zero in > > > the top bits is not enough to clear it either. > > > > > > So far, the only solution we have for this lovely piece of kit is to > > > force a PCI reset at probe time, which puts it right. The patches are > > > pretty ugly, but that's the best I could come up with so far. > > > > > > Tested on a pair of AMD Opteron 1100 boxes with Renesas uPD720201 and > > > uPD720202 controllers. > > > > > > Marc Zyngier (2): > > > PCI: Implement pci_reset_function_locked > > > usb: host: pci_quirks: Force hard reset of Renesas uPD72020x USB > > > controller > > > > > > drivers/pci/pci.c | 35 +++++++++++++++++++++++++++++++++++ > > > drivers/usb/host/pci-quirks.c | 20 ++++++++++++++++++++ > > > drivers/usb/host/pci-quirks.h | 1 + > > > drivers/usb/host/xhci-pci.c | 7 +++++++ > > > include/linux/pci.h | 1 + > > > 5 files changed, 64 insertions(+) > > > > I provisionally applied this to pci/virtualization. I'd like to have an > > XHCI ack before going further, though. > > The xhci maintainer is on vacation, let's wait a week for him to get > back to get this. Given the long time that this has been broken on this > hardware, I think we can wait another week just fine :) I'll be on vacation myself until the beginning of August, so no problem with that.