Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp3557127pxv; Mon, 28 Jun 2021 07:20:42 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwTjAoEk+DIE+DbmAJTZzw/mnvVXgsHbUCrn4n2nYhqy4PXuAuP89hBFZGfOZcs8N0zSjKn X-Received: by 2002:a6b:f81a:: with SMTP id o26mr13485303ioh.68.1624890042111; Mon, 28 Jun 2021 07:20:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624890042; cv=none; d=google.com; s=arc-20160816; b=srKvDp6+1TeQ7SqXDvHqCuobiy/oSFiTzwSjoCCzjV6nKY3q1wxYPirAH3wCX62Yk7 2UHxJZm5lxC1Nt/Y867lq37EKHMgQCWSrIIS6eiRXQZ73k9/j4pwWt31Me5AW70vomrJ DxVhY1W+IWcbfU4jwexCm3gcxytm/dqNIpV/8GSllqxU2cXGkevMBmzWqczHnVFlbRMS Ne0IGhU0Te4qqp+a9UCY18GtRP9l057p9vGB2G3V/1Qw3icE4TIBXeargTl8uDhl/oyi SpKwrVZVUBWVd5OqL7hG82SL2i6xKm0koyt0C7oJdOiWQH6lPTy1ZVA3RlepOMcZNJsl F+Vw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=5hK4zt93GDPwoKasQQsXewnjTXOwSgAx5zcibnHZ+mE=; b=nFz8K37NyFbcHLIJeglpEwPvvTvCm6RmH12SotQKM3CJRXn9K9Sc0lonvtWr0VV2RF NWxe8qMrEiRXMx36Nw5qOoCfLLi+Q+YZ0Z7SHrRB4n0QzOVZUPhHEZdB1DHfjl5vJebQ 1k7tHofPHv/IKZqZMkO24fUua4XmFn4/N/Xnq4G+rk9pvXW1zyXsJVelfLsMWyeiuI8A 5DK6eZKrYl2JaJHBIqWMNTfS5ZJj8v0jopIE3j0Sl7tHSL1Y5TFhAMImhb8JRCfK1LPS +yz6sU7qEf7Y38aGCdKb6fUHGO8rv8m7X1lIN0CjVvuIQwlhWXs/iN1bmVfAjoBDUIi5 gNcA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=pRfmKTmo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m14si8462534jaj.123.2021.06.28.07.20.29; Mon, 28 Jun 2021 07:20:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=pRfmKTmo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233050AbhF1OVj (ORCPT + 99 others); Mon, 28 Jun 2021 10:21:39 -0400 Received: from mail.kernel.org ([198.145.29.99]:54242 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232642AbhF1OVE (ORCPT ); Mon, 28 Jun 2021 10:21:04 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 5CBFE61C79; Mon, 28 Jun 2021 14:18:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1624889919; bh=96ZOV61yS2P117tvuAFxNUKqWS378+Ydh4mqCt9U1uA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=pRfmKTmop7dbBoGZO0tWuzQ9moA79reLOUo7WUXK81ugfPGM9B+bhZZ3DnEU4h1OO JoNe7BXtgiMYdKW6JK8V7q4MGNeSe0WpfA32fQv3p6o50OSQvBdWsAwGZ2bbR2mKYw FTGiWqf0W3lMoDU9XAVh4REr9KPloXnevjiCLWMDxRuC108BSXkqrfxXNdf2sKHDqH ixUVivtK08yT6q0R+lA3dkZiEtWojopcoDr/kdbSekXoAc+zqyeoUqReD/3pAfRYGk QFGvdVjFvRGcO7VJx7wu+O2fm6bRaDi5GPmZupxrvFw6/gancj8DJpJGxrGMRJAIho jhi4b0c4fF9kg== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Neil Armstrong , Marek Szyprowski , Mark Rutland , Ulf Hansson , Greg Kroah-Hartman Subject: [PATCH 5.12 009/110] mmc: meson-gx: use memcpy_to/fromio for dram-access-quirk Date: Mon, 28 Jun 2021 10:16:47 -0400 Message-Id: <20210628141828.31757-10-sashal@kernel.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210628141828.31757-1-sashal@kernel.org> References: <20210628141828.31757-1-sashal@kernel.org> MIME-Version: 1.0 X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.12.14-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-5.12.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 5.12.14-rc1 X-KernelTest-Deadline: 2021-06-30T14:18+00:00 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Neil Armstrong commit 103a5348c22c3fca8b96c735a9e353b8a0801842 upstream. It has been reported that usage of memcpy() to/from an iomem mapping is invalid, and a recent arm64 memcpy update [1] triggers a memory abort when dram-access-quirk is used on the G12A/G12B platforms. This adds a local sg_copy_to_buffer which makes usage of io versions of memcpy when dram-access-quirk is enabled. [1] 285133040e6c ("arm64: Import latest memcpy()/memmove() implementation") Fixes: acdc8e71d9bb ("mmc: meson-gx: add dram-access-quirk") Reported-by: Marek Szyprowski Suggested-by: Mark Rutland Signed-off-by: Neil Armstrong Tested-by: Marek Szyprowski Link: https://lore.kernel.org/r/20210609150230.9291-1-narmstrong@baylibre.com Cc: stable@vger.kernel.org Signed-off-by: Ulf Hansson Signed-off-by: Greg Kroah-Hartman --- drivers/mmc/host/meson-gx-mmc.c | 50 +++++++++++++++++++++++++++++---- 1 file changed, 45 insertions(+), 5 deletions(-) diff --git a/drivers/mmc/host/meson-gx-mmc.c b/drivers/mmc/host/meson-gx-mmc.c index 016a6106151a..3f28eb4d17fe 100644 --- a/drivers/mmc/host/meson-gx-mmc.c +++ b/drivers/mmc/host/meson-gx-mmc.c @@ -165,6 +165,7 @@ struct meson_host { unsigned int bounce_buf_size; void *bounce_buf; + void __iomem *bounce_iomem_buf; dma_addr_t bounce_dma_addr; struct sd_emmc_desc *descs; dma_addr_t descs_dma_addr; @@ -745,6 +746,47 @@ static void meson_mmc_desc_chain_transfer(struct mmc_host *mmc, u32 cmd_cfg) writel(start, host->regs + SD_EMMC_START); } +/* local sg copy to buffer version with _to/fromio usage for dram_access_quirk */ +static void meson_mmc_copy_buffer(struct meson_host *host, struct mmc_data *data, + size_t buflen, bool to_buffer) +{ + unsigned int sg_flags = SG_MITER_ATOMIC; + struct scatterlist *sgl = data->sg; + unsigned int nents = data->sg_len; + struct sg_mapping_iter miter; + unsigned int offset = 0; + + if (to_buffer) + sg_flags |= SG_MITER_FROM_SG; + else + sg_flags |= SG_MITER_TO_SG; + + sg_miter_start(&miter, sgl, nents, sg_flags); + + while ((offset < buflen) && sg_miter_next(&miter)) { + unsigned int len; + + len = min(miter.length, buflen - offset); + + /* When dram_access_quirk, the bounce buffer is a iomem mapping */ + if (host->dram_access_quirk) { + if (to_buffer) + memcpy_toio(host->bounce_iomem_buf + offset, miter.addr, len); + else + memcpy_fromio(miter.addr, host->bounce_iomem_buf + offset, len); + } else { + if (to_buffer) + memcpy(host->bounce_buf + offset, miter.addr, len); + else + memcpy(miter.addr, host->bounce_buf + offset, len); + } + + offset += len; + } + + sg_miter_stop(&miter); +} + static void meson_mmc_start_cmd(struct mmc_host *mmc, struct mmc_command *cmd) { struct meson_host *host = mmc_priv(mmc); @@ -788,8 +830,7 @@ static void meson_mmc_start_cmd(struct mmc_host *mmc, struct mmc_command *cmd) if (data->flags & MMC_DATA_WRITE) { cmd_cfg |= CMD_CFG_DATA_WR; WARN_ON(xfer_bytes > host->bounce_buf_size); - sg_copy_to_buffer(data->sg, data->sg_len, - host->bounce_buf, xfer_bytes); + meson_mmc_copy_buffer(host, data, xfer_bytes, true); dma_wmb(); } @@ -958,8 +999,7 @@ static irqreturn_t meson_mmc_irq_thread(int irq, void *dev_id) if (meson_mmc_bounce_buf_read(data)) { xfer_bytes = data->blksz * data->blocks; WARN_ON(xfer_bytes > host->bounce_buf_size); - sg_copy_from_buffer(data->sg, data->sg_len, - host->bounce_buf, xfer_bytes); + meson_mmc_copy_buffer(host, data, xfer_bytes, false); } next_cmd = meson_mmc_get_next_command(cmd); @@ -1179,7 +1219,7 @@ static int meson_mmc_probe(struct platform_device *pdev) * instead of the DDR memory */ host->bounce_buf_size = SD_EMMC_SRAM_DATA_BUF_LEN; - host->bounce_buf = host->regs + SD_EMMC_SRAM_DATA_BUF_OFF; + host->bounce_iomem_buf = host->regs + SD_EMMC_SRAM_DATA_BUF_OFF; host->bounce_dma_addr = res->start + SD_EMMC_SRAM_DATA_BUF_OFF; } else { /* data bounce buffer */ -- 2.30.2