From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 55B8D2377D; Thu, 18 Jan 2024 10:59:26 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705575566; cv=none; b=DQTz6f3iNFD4mY8evAxeq+ntUBPkwnnZBGpvM+DQcsg/U032Ixe7n0BQAj+xkffE/mhyeg6o2FN/lNktmsOl3MpJFv7GasW7GBrvEFfDOIX3So1nBsgI7ijra4rnXRFHE92BtPbHbjoew4VRRydNw/un1vy/1pza3AxgR0jQ9og= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705575566; c=relaxed/simple; bh=jPVWix6dJNZGrfrBfOhAroqBmKBTKzG76p9chJl4Koo=; h=Received:DKIM-Signature:From:To:Cc:Subject:Date:Message-ID: X-Mailer:In-Reply-To:References:User-Agent:X-stable: X-Patchwork-Hint:MIME-Version:Content-Transfer-Encoding; b=ucEikHv51bL/5SKw6Se0yND14mfiCWr8dFh7TbroeA9rEtjXOgsu9Ax3jI9rz0DWUR60CNlwgWwrTRq32RAWMdMzVScTlfVEbVecoVXyUtndkxOVE7mng091+/RScxRsfgGLCi5Dv+dmpvmTZSD6IrlEZop/EKQNPvfgDe3QL0o= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=XJeKEJBR; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="XJeKEJBR" Received: by smtp.kernel.org (Postfix) with ESMTPSA id CF7CDC433F1; Thu, 18 Jan 2024 10:59:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1705575566; bh=jPVWix6dJNZGrfrBfOhAroqBmKBTKzG76p9chJl4Koo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=XJeKEJBR05c3al5gOJvxEvCT6fGd/3Wun2H4p+ma18y6tFZ6ay30d1PmzmpRiSGxF HweBRrq7xw6J6TxVORnuVU9MMignMtonoDSky8sjx8cY6SYeoaR8jn/g89MefpVF7l 1qvi1Ed5tKa2L0GIPusudj4999LlbLYeWGEUYCW4= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, Dave Airlie , Danilo Krummrich , Sasha Levin Subject: [PATCH 6.1 027/100] nouveau/tu102: flush all pdbs on vmm flush Date: Thu, 18 Jan 2024 11:48:35 +0100 Message-ID: <20240118104312.094901334@linuxfoundation.org> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20240118104310.892180084@linuxfoundation.org> References: <20240118104310.892180084@linuxfoundation.org> User-Agent: quilt/0.67 X-stable: review X-Patchwork-Hint: ignore Precedence: bulk X-Mailing-List: patches@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit 6.1-stable review patch. If anyone has any objections, please let me know. ------------------ From: Dave Airlie [ Upstream commit cb9c919364653eeafb49e7ff5cd32f1ad64063ac ] This is a hack around a bug exposed with the GSP code, I'm not sure what is happening exactly, but it appears some of our flushes don't result in proper tlb invalidation for out BAR2 and we get a BAR2 fault from GSP and it all dies. Signed-off-by: Dave Airlie Signed-off-by: Danilo Krummrich Link: https://patchwork.freedesktop.org/patch/msgid/20231130010852.4034774-1-airlied@gmail.com Signed-off-by: Sasha Levin --- drivers/gpu/drm/nouveau/nvkm/subdev/mmu/vmmtu102.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/gpu/drm/nouveau/nvkm/subdev/mmu/vmmtu102.c b/drivers/gpu/drm/nouveau/nvkm/subdev/mmu/vmmtu102.c index 6cb5eefa45e9..5a08458fe1b7 100644 --- a/drivers/gpu/drm/nouveau/nvkm/subdev/mmu/vmmtu102.c +++ b/drivers/gpu/drm/nouveau/nvkm/subdev/mmu/vmmtu102.c @@ -31,7 +31,7 @@ tu102_vmm_flush(struct nvkm_vmm *vmm, int depth) type |= 0x00000001; /* PAGE_ALL */ if (atomic_read(&vmm->engref[NVKM_SUBDEV_BAR])) - type |= 0x00000004; /* HUB_ONLY */ + type |= 0x00000006; /* HUB_ONLY | ALL PDB (hack) */ mutex_lock(&vmm->mmu->mutex); -- 2.43.0