Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp558064img; Mon, 18 Mar 2019 09:05:25 -0700 (PDT) X-Google-Smtp-Source: APXvYqzACTlHReRegniMAFOgNuQcFgd9wKjKK+4Yd2T+M2s50D5FcsYLvcj5e4TdMNmvOmenkMZJ X-Received: by 2002:a62:4553:: with SMTP id s80mr19591694pfa.141.1552925125016; Mon, 18 Mar 2019 09:05:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552925125; cv=none; d=google.com; s=arc-20160816; b=WXoc5Oya66xhZd5dsvY/E2Jo+iFwr9yU/ThKM0QxqjTOeZRXjtQMVojrVyZe6ZwNwh pDKOwSoxhcf559f6atcICTQMr7uCB/paJ9sOQxs6Obxgn58/Zc7IHJDZJ028wvIFATDz Rp5mMccPu4nOro7GO4zAZb6MbeUhKZ3WBN3VILOBGLHS7fjXPDU1i2PtgTj8gwfm/ynD iOULKUZauzObaXPs0mckSMeUWSAvfdmq5oVOu70Nc+U3YARjWyaP+vHgd1KdD+k0X5aK Bk6g1AJKDr+bnTZmcNRdAJUF+Xts/XcGQqzLLlI395hLUgRECQXIAdn0tOBNmATyLTG5 NDmA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=ANFUy4AXdWyEdc/sxqKOgO0c3hszhvvovgu/8fDwblE=; b=Gdmgvk0jB9wxk5F2/9iy5uTejBdxbz7GtHOisX7RfiwE20Zm/7kKn0GZIikYrljaHc /cOcAqnHHsG73bWHCnU/zjWce3xZ6TvvCWnpIvsuqAn0A72Rk1WDEwcljKBPbTwVfdiK V3L58113iNcQUDK4ZfNK0ohTe2PDbq3tQp6p0EzgVt5N9w2FQ1pylToVl/8hJuDBGM1k FyyKc9DFpgSOdGBCy91ehzRfB7KPjWKLsE2SlenJs3souIrhtlI7TXTWRrFt/NNUUvsY e8OommwCXrPxFgbc7tBMWLrfha+5ErARaGG6/JChok5funHe2LDkwpN96A6frmnZzy3Q oPJQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n15si9128818pgv.398.2019.03.18.09.05.09; Mon, 18 Mar 2019 09:05:24 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727524AbfCRQEI (ORCPT + 99 others); Mon, 18 Mar 2019 12:04:08 -0400 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:36852 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726719AbfCRQEH (ORCPT ); Mon, 18 Mar 2019 12:04:07 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 2E51F1650; Mon, 18 Mar 2019 09:04:07 -0700 (PDT) Received: from [10.1.196.75] (e110467-lin.cambridge.arm.com [10.1.196.75]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 5FC8F3F59C; Mon, 18 Mar 2019 09:04:05 -0700 (PDT) Subject: Re: [PATCH] arm64/io: Don't use WZR in writel To: Marc Gonzalez , Marc Zyngier , Will Deacon Cc: Bjorn Andersson , AngeloGioacchino Del Regno , Jens Axboe , Catalin Marinas , LKML , Linux ARM , MSM , Jeffrey Hugo References: <68b71c15f32341468a868f6418e4fcb375bc49ba.camel@gmail.com> <20190211105755.GB30880@fuggles.cambridge.arm.com> <38d8965a-cd41-17cf-1b95-8dd58c079be4@arm.com> <874c702b8af760aa8fae38d478c79e3ecba00515.camel@gmail.com> <235d20ef-3054-69d9-975d-25aebf32aad3@arm.com> <20190223181254.GC572@tuxbook-pro> <86zhqm8i6d.wl-marc.zyngier@arm.com> <20190224035356.GD572@tuxbook-pro> <33d765b5-1807-fa6c-1ceb-99f09f7c8d5a@free.fr> From: Robin Murphy Message-ID: <8eb4f446-6152-ffb6-9529-77fb0bcc307f@arm.com> Date: Mon, 18 Mar 2019 16:04:03 +0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.5.1 MIME-Version: 1.0 In-Reply-To: <33d765b5-1807-fa6c-1ceb-99f09f7c8d5a@free.fr> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-GB Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 12/03/2019 12:36, Marc Gonzalez wrote: > On 24/02/2019 04:53, Bjorn Andersson wrote: > >> On Sat 23 Feb 10:37 PST 2019, Marc Zyngier wrote: >> >>> On Sat, 23 Feb 2019 18:12:54 +0000, Bjorn Andersson wrote: >>>> >>>> On Mon 11 Feb 06:59 PST 2019, Marc Zyngier wrote: >>>> >>>>> On 11/02/2019 14:29, AngeloGioacchino Del Regno wrote: >>>>> >>>>>> Also, just one more thing: yes this thing is going ARM64-wide and >>>>>> - from my findings - it's targeting certain Qualcomm SoCs, but... >>>>>> I'm not sure that only QC is affected by that, others may as well >>>>>> have the same stupid bug. >>>>> >>>>> At the moment, only QC SoCs seem to be affected, probably because >>>>> everyone else has debugged their hypervisor (or most likely doesn't >>>>> bother with shipping one). >>>>> >>>>> In all honesty, we need some information from QC here: which SoCs are >>>>> affected, what is the exact nature of the bug, can it be triggered from >>>>> EL0. Randomly papering over symptoms is not something I really like >>>>> doing, and is likely to generate problems on unaffected systems. >>>> >>>> The bug at hand is that the XZR is not deemed a valid source in the >>>> virtualization of the SMMU registers. It was identified and fixed for >>>> all platforms that are shipping kernels based on v4.9 or later. >>> >>> When you say "fixed": Do you mean fixed in the firmware? Or by adding >>> a workaround in the shipped kernel? >> >> I mean that it's fixed in the firmware. >> >>> If the former, is this part of an official QC statement, with an >>> associated erratum number? >> >> I don't know, will get back to you on this one. >> >>> Is this really limited to the SMMU accesses? >> >> Yes. >> >>>> As such Angelo's list of affected platforms covers the high-profile >>>> ones. In particular MSM8996 and MSM8998 is getting pretty good support >>>> upstream, if we can figure out a way around this issue. >>> >>> We'd need an exhaustive list of the affected SoCs, and work out if we >>> can limit the hack to the SMMU driver (cc'ing Robin, who's the one >>> who'd know about it). >> >> I will try to compose a list. > > FWIW, I have just been bitten by this issue. I needed to enable an SMMU to > filter PCIe EP accesses to system RAM (or something). I'm using an APQ8098 > MEDIABOX dev board. My system hangs in arm_smmu_device_reset() doing: > > /* Invalidate the TLB, just in case */ > writel_relaxed(0, gr0_base + ARM_SMMU_GR0_TLBIALLH); > writel_relaxed(0, gr0_base + ARM_SMMU_GR0_TLBIALLNSNH); > > > With the 'Z' constraint, gcc generates: > > str wzr, [x0] > > without the 'Z' constraint, gcc generates: > > mov w1, 0 > str w1, [x0] > > > I can work around the problem using the following patch: > > diff --git a/drivers/iommu/arm-smmu.c b/drivers/iommu/arm-smmu.c > index 045d93884164..93117519aed8 100644 > --- a/drivers/iommu/arm-smmu.c > +++ b/drivers/iommu/arm-smmu.c > @@ -59,6 +59,11 @@ > > #include "arm-smmu-regs.h" > > +static inline void qcom_writel(u32 val, volatile void __iomem *addr) > +{ > + asm volatile("str %w0, [%1]" : : "r" (val), "r" (addr)); > +} > + > #define ARM_MMU500_ACTLR_CPRE (1 << 1) > > #define ARM_MMU500_ACR_CACHE_LOCK (1 << 26) > @@ -422,7 +427,7 @@ static void __arm_smmu_tlb_sync(struct arm_smmu_device *smmu, > { > unsigned int spin_cnt, delay; > > - writel_relaxed(0, sync); > + qcom_writel(0, sync); > for (delay = 1; delay < TLB_LOOP_TIMEOUT; delay *= 2) { > for (spin_cnt = TLB_SPIN_COUNT; spin_cnt > 0; spin_cnt--) { > if (!(readl_relaxed(status) & sTLBGSTATUS_GSACTIVE)) > @@ -1760,8 +1765,8 @@ static void arm_smmu_device_reset(struct arm_smmu_device *smmu) > } > > /* Invalidate the TLB, just in case */ > - writel_relaxed(0, gr0_base + ARM_SMMU_GR0_TLBIALLH); > - writel_relaxed(0, gr0_base + ARM_SMMU_GR0_TLBIALLNSNH); > + qcom_writel(0, gr0_base + ARM_SMMU_GR0_TLBIALLH); > + qcom_writel(0, gr0_base + ARM_SMMU_GR0_TLBIALLNSNH); > > reg = readl_relaxed(ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sCR0); > > > > > Can a quirk be used to work around the issue? > Or can we just "pessimize" the 3 writes for everybody? > (Might be cheaper than a test anyway) If it really is just the SMMU driver which is affected, we can work around it for free (not counting the 'cost' of slightly-weird-looking code, of course). If the diff below works as expected, I'll write it up properly. Robin. ----->8----- diff --git a/drivers/iommu/arm-smmu.c b/drivers/iommu/arm-smmu.c index 045d93884164..7ff29e33298f 100644 --- a/drivers/iommu/arm-smmu.c +++ b/drivers/iommu/arm-smmu.c @@ -422,7 +422,7 @@ static void __arm_smmu_tlb_sync(struct arm_smmu_device *smmu, { unsigned int spin_cnt, delay; - writel_relaxed(0, sync); + writel_relaxed((unsigned long)sync, sync); for (delay = 1; delay < TLB_LOOP_TIMEOUT; delay *= 2) { for (spin_cnt = TLB_SPIN_COUNT; spin_cnt > 0; spin_cnt--) { if (!(readl_relaxed(status) & sTLBGSTATUS_GSACTIVE)) @@ -681,7 +681,12 @@ static void arm_smmu_write_context_bank(struct arm_smmu_device *smmu, int idx) /* Unassigned context banks only need disabling */ if (!cfg) { - writel_relaxed(0, cb_base + ARM_SMMU_CB_SCTLR); + /* + * For Qualcomm reasons, we want to guarantee that we write a + * zero from a register which is not WZR. Fortunately, the cfg + * logic here plays right into our hands... + */ + writel_relaxed((unsigned long)cfg, cb_base + ARM_SMMU_CB_SCTLR); return; } @@ -1760,8 +1765,8 @@ static void arm_smmu_device_reset(struct arm_smmu_device *smmu) } /* Invalidate the TLB, just in case */ - writel_relaxed(0, gr0_base + ARM_SMMU_GR0_TLBIALLH); - writel_relaxed(0, gr0_base + ARM_SMMU_GR0_TLBIALLNSNH); + writel_relaxed(reg, gr0_base + ARM_SMMU_GR0_TLBIALLH); + writel_relaxed(reg, gr0_base + ARM_SMMU_GR0_TLBIALLNSNH); reg = readl_relaxed(ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sCR0);