Received: by 2002:a05:6359:6284:b0:131:369:b2a3 with SMTP id se4csp3459254rwb; Mon, 7 Aug 2023 14:02:53 -0700 (PDT) X-Google-Smtp-Source: AGHT+IG3NBvcTZew3TaA+3q1sl+pPHedBhObj8ZZULiZS6H65WzKA+kbIsUw/ShqyTtdUHF1ohVO X-Received: by 2002:a05:6a20:970e:b0:121:e573:3680 with SMTP id hr14-20020a056a20970e00b00121e5733680mr9757644pzc.62.1691442173462; Mon, 07 Aug 2023 14:02:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1691442173; cv=none; d=google.com; s=arc-20160816; b=JmiKHS/6dSvyIWeVNdgBR6gkzPraSaovrpDsRk4qKemBc/XVpyUsE8Ch9Ezqmj2+JV h59RNnl7RzNPUxKxMQDBVDCW/n8BK6fffUgW0BC8yPhS51d9xLGoQboby+2Qck+7UP7b koHWbiBDnAgE+RRiPXv+lznpXwYcw+juGZhRYehkZ0aVwG5yQ7jpO21+K3coyzteiaXV +KI/1TU2PrWjimhO879jne5vy3maG+0YPgslv4zJoqreO7dYy6QRasYfusz3ad08uCv1 V+ZNkzE9MD/CC2RfICKFj3ThQ1+7MKgJX/Y2O8PmM+I1j+H99UCEVQ60x6DFUu6Jt95i 5YuQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=nuUNTX4RVEorpLuzzp4nacjdb2ODxpveevNyZi5yfiE=; fh=DQXJEKMIu51mcucRBn/4cqslnpdXIby/xtppkaJ9Zw8=; b=aSfavNgBxwPta0DUsWfr3YcINDUEVnz5iJSOoGxCJslCzbFLj4FJRqQ7ie7T4jpGBD gQ6QPArl8C6eyee4DWmYC7fu6hj8Eke1LTtmLysLgxkDNBwfhnNRKN1oIaCbwfe13EEW X4ozkxPAZ5bux2OV/ibeht1hb6CM6lyGPQypA80fNmEOxuRyIYbzJYzd2yA6WdvBMmUD bKoNV/Tvm1HW/1FgweYbV0kz7WDGAMXIZXzjFy8nhSCBaiM4cBF77N8pthnkkrDEywhj SvyiE3dHcSg0wuFf3FhBZnGSHiwTy4jwuIx/ZGtTZH8IXMWoh9ADU3tGB6e6z/v2cbZg INMQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id b7-20020a633407000000b00551bb2b99besi5808120pga.85.2023.08.07.14.02.41; Mon, 07 Aug 2023 14:02:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229906AbjHGUOj (ORCPT + 99 others); Mon, 7 Aug 2023 16:14:39 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55230 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229696AbjHGUOh (ORCPT ); Mon, 7 Aug 2023 16:14:37 -0400 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 68D1510CF; Mon, 7 Aug 2023 13:14:35 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id DE9021FB; Mon, 7 Aug 2023 13:15:17 -0700 (PDT) Received: from [192.168.1.102] (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 702233F6C4; Mon, 7 Aug 2023 13:14:32 -0700 (PDT) Message-ID: <919ab857-30cf-00a5-1a40-fb180678792e@arm.com> Date: Mon, 7 Aug 2023 21:14:24 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:102.0) Gecko/20100101 Thunderbird/102.13.0 Subject: Re: [PATCH v3 5.15 4/6] iommu/arm-smmu-v3: Document MMU-700 erratum 2812531 Content-Language: en-GB To: Easwar Hariharan , stable@vger.kernel.org Cc: easwar.hariharan@microsoft.com, Nicolin Chen , Will Deacon , Catalin Marinas , Jonathan Corbet , Joerg Roedel , Sasha Levin , Yicong Yang , Tomas Krcka , "moderated list:ARM64 PORT (AARCH64 ARCHITECTURE)" , "open list:DOCUMENTATION" , open list , "open list:IOMMU DRIVERS" , "open list:IOMMU DRIVERS" References: <20230802170227.1590187-1-eahariha@linux.microsoft.com> <20230802170227.1590187-5-eahariha@linux.microsoft.com> From: Robin Murphy In-Reply-To: <20230802170227.1590187-5-eahariha@linux.microsoft.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-3.7 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2023-08-02 18:02, Easwar Hariharan wrote: > From: Robin Murphy > > commit 309a15cb16bb075da1c99d46fb457db6a1a2669e upstream > > To work around MMU-700 erratum 2812531 we need to ensure that certain > sequences of commands cannot be issued without an intervening sync. In > practice this falls out of our current command-batching machinery > anyway - each batch only contains a single type of invalidation command, > and ends with a sync. The only exception is when a batch is sufficiently > large to need issuing across multiple command queue slots, wherein the > earlier slots will not contain a sync and thus may in theory interleave > with another batch being issued in parallel to create an affected > sequence across the slot boundary. > > Since MMU-700 supports range invalidate commands and thus we will prefer > to use them (which also happens to avoid conditions for other errata), > I'm not entirely sure it's even possible for a single high-level > invalidate call to generate a batch of more than 63 commands, Out of interest, have you observed a case where this actually happens? > but for > the sake of robustness and documentation, wire up an option to enforce > that a sync is always inserted for every slot issued. > > The other aspect is that the relative order of DVM commands cannot be > controlled, so DVM cannot be used. Again that is already the status quo, > but since we have at least defined ARM_SMMU_FEAT_BTM, we can explicitly > disable it for documentation purposes even if it's not wired up anywhere > yet. Note that there seems to be a slight issue with this patch that I missed, under discussion here: https://lore.kernel.org/linux-iommu/27c895b8-1fb0-be88-8bc3-878d754684c8@huawei.com/T/#t Thanks, Robin. > Signed-off-by: Robin Murphy > Reviewed-by: Nicolin Chen > Link: https://lore.kernel.org/r/330221cdfd0003cd51b6c04e7ff3566741ad8374.1683731256.git.robin.murphy@arm.com > Signed-off-by: Will Deacon > Signed-off-by: Easwar Hariharan > --- > Documentation/arm64/silicon-errata.rst | 2 ++ > drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c | 12 ++++++++++++ > drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.h | 1 + > 3 files changed, 15 insertions(+) > > diff --git a/Documentation/arm64/silicon-errata.rst b/Documentation/arm64/silicon-errata.rst > index 55e1e074dec1..322df8abbc0e 100644 > --- a/Documentation/arm64/silicon-errata.rst > +++ b/Documentation/arm64/silicon-errata.rst > @@ -124,6 +124,8 @@ stable kernels. > +----------------+-----------------+-----------------+-----------------------------+ > | ARM | MMU-600 | #1076982 | N/A | > +----------------+-----------------+-----------------+-----------------------------+ > +| ARM | MMU-700 | #2812531 | N/A | > ++----------------+-----------------+-----------------+-----------------------------+ > +----------------+-----------------+-----------------+-----------------------------+ > | Broadcom | Brahma-B53 | N/A | ARM64_ERRATUM_845719 | > +----------------+-----------------+-----------------+-----------------------------+ > diff --git a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c > index 782d040a829c..6a551a48d271 100644 > --- a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c > +++ b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c > @@ -897,6 +897,12 @@ static void arm_smmu_cmdq_batch_add(struct arm_smmu_device *smmu, > struct arm_smmu_cmdq_batch *cmds, > struct arm_smmu_cmdq_ent *cmd) > { > + if (cmds->num == CMDQ_BATCH_ENTRIES - 1 && > + (smmu->options & ARM_SMMU_OPT_CMDQ_FORCE_SYNC)) { > + arm_smmu_cmdq_issue_cmdlist(smmu, cmds->cmds, cmds->num, true); > + cmds->num = 0; > + } > + > if (cmds->num == CMDQ_BATCH_ENTRIES) { > arm_smmu_cmdq_issue_cmdlist(smmu, cmds->cmds, cmds->num, false); > cmds->num = 0; > @@ -3461,6 +3467,7 @@ static int arm_smmu_device_reset(struct arm_smmu_device *smmu, bool bypass) > > #define IIDR_IMPLEMENTER_ARM 0x43b > #define IIDR_PRODUCTID_ARM_MMU_600 0x483 > +#define IIDR_PRODUCTID_ARM_MMU_700 0x487 > > static void arm_smmu_device_iidr_probe(struct arm_smmu_device *smmu) > { > @@ -3481,6 +3488,11 @@ static void arm_smmu_device_iidr_probe(struct arm_smmu_device *smmu) > if (variant == 0 && revision <= 2) > smmu->features &= ~ARM_SMMU_FEAT_SEV; > break; > + case IIDR_PRODUCTID_ARM_MMU_700: > + /* Arm erratum 2812531 */ > + smmu->features &= ~ARM_SMMU_FEAT_BTM; > + smmu->options |= ARM_SMMU_OPT_CMDQ_FORCE_SYNC; > + break; > } > break; > } > diff --git a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.h b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.h > index 5964e02c4e57..abaecdf8d5d2 100644 > --- a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.h > +++ b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.h > @@ -651,6 +651,7 @@ struct arm_smmu_device { > #define ARM_SMMU_OPT_SKIP_PREFETCH (1 << 0) > #define ARM_SMMU_OPT_PAGE0_REGS_ONLY (1 << 1) > #define ARM_SMMU_OPT_MSIPOLL (1 << 2) > +#define ARM_SMMU_OPT_CMDQ_FORCE_SYNC (1 << 3) > u32 options; > > struct arm_smmu_cmdq cmdq;