Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp879597ybl; Fri, 24 Jan 2020 11:12:36 -0800 (PST) X-Google-Smtp-Source: APXvYqzWlrMf0zHqCpvG+6MQRrscKdqg7oUQ+ASmzg0N3YVCFcWii3jAb/Z7iQFokkD0W6p/CNti X-Received: by 2002:a9d:1b26:: with SMTP id l35mr3821570otl.307.1579893155409; Fri, 24 Jan 2020 11:12:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579893155; cv=none; d=google.com; s=arc-20160816; b=doD1Nr5ODvQiGUXhrrYdpZCu+ZJl53N/GRNnqGT5fWRXkf9dX1tTPs2jd955ZdYTqW iu6OJPc0zNSo9j4is0gURiQpPEXAMrSnPKzNAnt57CfdjXnprb8McXhnwaWEfG2uq0v5 CLJWy+Ib8UCNgJongtiGDSkHAuIbjDpgG45I+JRF7YyWBhEOyfW14R4mZJpLnRnbFPY3 aeZGMOhbtMQzl5s9dY2e1ghu3Ri3b6f4XZLG6tFq1iSdM4dI/mmmzr6ETRcrRVuR9OhP LEePtxxGhVDUJEyf/IZ95viVZhVls3/Q+eEh77rvpQOzGDJ30LmeSCCcBfjhRBt8NtuW 8OKw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=zBdToQxNn3mReDklNgsIKLIWl2BO7woiXp9ChQOrG1Q=; b=l/RLN9OSVWwqrgm5ilKsyaHniS7CG1fBoyzgj+bblTomSp/84cypJcJvsIe6uVVOuM 3/KA60jE1ALyyKK7rjYFkHyZChYvejshH/JBaVqJwS1cYNVIgqVpBipqHW0TKe0HLhat TQi1tqLuG6aEcB30mx3Kus4S6HmvmGfYdwjJiCJEuVXGtLY9lC1BPTvZvZASdk1W+Uma 688Ji24mQlZo7K7UnLb157VzsWOLbW9Z/o9vszPtXOD2MDcqtZ7Lctirn5gr6HJOdb1h 65kPbPiCWiLSG3VIIPR9nfZ4tF577fVuZD6NYZIFg01oPv0/9qPuSTa8IbOmHE33GH9F qe+A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ilZWFYbN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e73si208675oib.145.2020.01.24.11.12.23; Fri, 24 Jan 2020 11:12:35 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ilZWFYbN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2404543AbgAXLdI (ORCPT + 99 others); Fri, 24 Jan 2020 06:33:08 -0500 Received: from mail.kernel.org ([198.145.29.99]:52416 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2391908AbgAXLdF (ORCPT ); Fri, 24 Jan 2020 06:33:05 -0500 Received: from localhost (ip-213-127-102-57.ip.prioritytelecom.net [213.127.102.57]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6EDEE20704; Fri, 24 Jan 2020 11:33:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1579865585; bh=QxKbSpHZntZauEiARxlmuXAbUDqksp+NtwrnoUJp3qQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ilZWFYbNQdw7cfcpAbFStHlWFvqFuF2hn7eJEIzfy/3D2g6PPidKpGCxD7wQz6l4G vS3A/e8pgc8Rrf5qfGZZdwwOGX4bpLEdwieWgFBhPZTmycxYFkWHaottKVpySc/4Kw fhFJVPZOBHign6Ib3tjiMpvBCohxV1rb6Sp6eemA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ard Biesheuvel , Sagi Grimberg , Sasha Levin Subject: [PATCH 4.19 586/639] nvme: retain split access workaround for capability reads Date: Fri, 24 Jan 2020 10:32:36 +0100 Message-Id: <20200124093202.878097814@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200124093047.008739095@linuxfoundation.org> References: <20200124093047.008739095@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ard Biesheuvel [ Upstream commit 3a8ecc935efabdad106b5e06d07b150c394b4465 ] Commit 7fd8930f26be4 "nvme: add a common helper to read Identify Controller data" has re-introduced an issue that we have attempted to work around in the past, in commit a310acd7a7ea ("NVMe: use split lo_hi_{read,write}q"). The problem is that some PCIe NVMe controllers do not implement 64-bit outbound accesses correctly, which is why the commit above switched to using lo_hi_[read|write]q for all 64-bit BAR accesses occuring in the code. In the mean time, the NVMe subsystem has been refactored, and now calls into the PCIe support layer for NVMe via a .reg_read64() method, which fails to use lo_hi_readq(), and thus reintroduces the problem that the workaround above aimed to address. Given that, at the moment, .reg_read64() is only used to read the capability register [which is known to tolerate split reads], let's switch .reg_read64() to lo_hi_readq() as well. This fixes a boot issue on some ARM boxes with NVMe behind a Synopsys DesignWare PCIe host controller. Fixes: 7fd8930f26be4 ("nvme: add a common helper to read Identify Controller data") Signed-off-by: Ard Biesheuvel Signed-off-by: Sagi Grimberg Signed-off-by: Sasha Levin --- drivers/nvme/host/pci.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/nvme/host/pci.c b/drivers/nvme/host/pci.c index 124f41157173e..3c68a5b35ec1b 100644 --- a/drivers/nvme/host/pci.c +++ b/drivers/nvme/host/pci.c @@ -2396,7 +2396,7 @@ static int nvme_pci_reg_write32(struct nvme_ctrl *ctrl, u32 off, u32 val) static int nvme_pci_reg_read64(struct nvme_ctrl *ctrl, u32 off, u64 *val) { - *val = readq(to_nvme_dev(ctrl)->bar + off); + *val = lo_hi_readq(to_nvme_dev(ctrl)->bar + off); return 0; } -- 2.20.1