On 2020-05-07 11:14 am, Sai Prakash Ranjan wrote:
Hi Will, Robin
On 2020-04-22 01:50, Sai Prakash Ranjan wrote:
Add stall implementation hook to enable stalling
faults on QCOM platforms which supports it without
causing any kind of hardware mishaps. Without this
on QCOM platforms, GPU faults can cause unrelated
GPU memory accesses to return zeroes. This has the
unfortunate result of command-stream reads from CP
getting invalid data, causing a cascade of fail.
I think this came up before, but something about this rationale
doesn't add up - we're not *using* stalls at all, we're still
terminating faulting transactions unconditionally; we're just using
CFCFG to terminate them with a slight delay, rather than immediately.
It's really not clear how or why that makes a difference. Is it a GPU
bug? Or an SMMU bug? Is this reliable (or even a documented workaround
for something), or might things start blowing up again if any other
behaviour subtly changes? I'm not dead set against adding this, but
I'd *really* like to have a lot more confidence in it.
Suggested-by: Rob Clark <robdclark@xxxxxxxxx>
Signed-off-by: Sai Prakash Ranjan <saiprakash.ranjan@xxxxxxxxxxxxxx>
---
This has been attempted previously by Rob Clark in 2017, 2018.
Hopefully we can get something concluded in 2020.
Â* https://patchwork.kernel.org/patch/9953803/
Â* https://patchwork.kernel.org/patch/10618713/
---
Âdrivers/iommu/arm-smmu-qcom.c | 1 +
Âdrivers/iommu/arm-smmu.cÂÂÂÂÂ | 7 +++++++
Âdrivers/iommu/arm-smmu.hÂÂÂÂÂ | 1 +
Â3 files changed, 9 insertions(+)
diff --git a/drivers/iommu/arm-smmu-qcom.c b/drivers/iommu/arm-smmu-qcom.c
index 24c071c1d8b0..a13b229389d4 100644
--- a/drivers/iommu/arm-smmu-qcom.c
+++ b/drivers/iommu/arm-smmu-qcom.c
@@ -32,6 +32,7 @@ static int qcom_sdm845_smmu500_reset(struct
arm_smmu_device *smmu)
Âstatic const struct arm_smmu_impl qcom_smmu_impl = {
ÂÂÂÂ .reset = qcom_sdm845_smmu500_reset,
+ÂÂÂ .stall = true,
Â};
Âstruct arm_smmu_device *qcom_smmu_impl_init(struct arm_smmu_device *smmu)
diff --git a/drivers/iommu/arm-smmu.c b/drivers/iommu/arm-smmu.c
index e622f4e33379..16b03fca9966 100644
--- a/drivers/iommu/arm-smmu.c
+++ b/drivers/iommu/arm-smmu.c
@@ -488,6 +488,11 @@ static irqreturn_t arm_smmu_context_fault(int
irq, void *dev)
ÂÂÂÂÂÂÂÂÂÂÂÂÂÂÂÂ fsr, iova, fsynr, cbfrsynra, idx);
ÂÂÂÂ arm_smmu_cb_write(smmu, idx, ARM_SMMU_CB_FSR, fsr);
+
+ÂÂÂ if (smmu->impl && smmu->impl->stall && (fsr & ARM_SMMU_FSR_SS))
+ÂÂÂÂÂÂÂ arm_smmu_cb_write(smmu, idx, ARM_SMMU_CB_RESUME,
+ÂÂÂÂÂÂÂÂÂÂÂÂÂÂÂÂÂ ARM_SMMU_RESUME_TERMINATE);
Shouldn't this be *before* the write to FSR, in case the outstanding
fault causes that to be immediately reasserted before we write
CB_RESUME and we end up immediately taking the IRQ a second time?
(The overall enablement being in impl is sound, but you still don't
get to play "works on my machine" in the architectural code :P)