* [PATCH v2 1/4] wifi: ath12k: fix dest ring-buffer corruption [not found] <20250604144509.28374-1-johan+linaro@kernel.org> @ 2025-06-04 14:45 ` Johan Hovold 2025-06-05 8:41 ` Baochen Qiang 2025-06-04 14:45 ` [PATCH v2 3/4] wifi: ath12k: fix source " Johan Hovold 2025-06-04 14:45 ` [PATCH v2 4/4] wifi: ath12k: fix dest ring-buffer corruption when ring is full Johan Hovold 2 siblings, 1 reply; 12+ messages in thread From: Johan Hovold @ 2025-06-04 14:45 UTC (permalink / raw) To: Jeff Johnson Cc: Miaoqing Pan, Remi Pommarel, Baochen Qiang, linux-wireless, ath12k, linux-kernel, Johan Hovold, stable Add the missing memory barrier to make sure that destination ring descriptors are read after the head pointers to avoid using stale data on weakly ordered architectures like aarch64. The barrier is added to the ath12k_hal_srng_access_begin() helper for symmetry with follow-on fixes for source ring buffer corruption which will add barriers to ath12k_hal_srng_access_end(). Note that this may fix the empty descriptor issue recently worked around by commit 51ad34a47e9f ("wifi: ath12k: Add drop descriptor handling for monitor ring"). Tested-on: WCN7850 hw2.0 WLAN.HMT.1.0.c5-00481-QCAHMTSWPL_V1.0_V2.0_SILICONZ-3 Fixes: d889913205cf ("wifi: ath12k: driver for Qualcomm Wi-Fi 7 devices") Cc: stable@vger.kernel.org # 6.3 Signed-off-by: Johan Hovold <johan+linaro@kernel.org> --- drivers/net/wireless/ath/ath12k/ce.c | 3 --- drivers/net/wireless/ath/ath12k/hal.c | 17 ++++++++++++++--- 2 files changed, 14 insertions(+), 6 deletions(-) diff --git a/drivers/net/wireless/ath/ath12k/ce.c b/drivers/net/wireless/ath/ath12k/ce.c index 740586fe49d1..b66d23d6b2bd 100644 --- a/drivers/net/wireless/ath/ath12k/ce.c +++ b/drivers/net/wireless/ath/ath12k/ce.c @@ -343,9 +343,6 @@ static int ath12k_ce_completed_recv_next(struct ath12k_ce_pipe *pipe, goto err; } - /* Make sure descriptor is read after the head pointer. */ - dma_rmb(); - *nbytes = ath12k_hal_ce_dst_status_get_length(desc); *skb = pipe->dest_ring->skb[sw_index]; diff --git a/drivers/net/wireless/ath/ath12k/hal.c b/drivers/net/wireless/ath/ath12k/hal.c index 91d5126ca149..9eea13ed5565 100644 --- a/drivers/net/wireless/ath/ath12k/hal.c +++ b/drivers/net/wireless/ath/ath12k/hal.c @@ -2126,13 +2126,24 @@ void *ath12k_hal_srng_src_get_next_reaped(struct ath12k_base *ab, void ath12k_hal_srng_access_begin(struct ath12k_base *ab, struct hal_srng *srng) { + u32 hp; + lockdep_assert_held(&srng->lock); - if (srng->ring_dir == HAL_SRNG_DIR_SRC) + if (srng->ring_dir == HAL_SRNG_DIR_SRC) { srng->u.src_ring.cached_tp = *(volatile u32 *)srng->u.src_ring.tp_addr; - else - srng->u.dst_ring.cached_hp = READ_ONCE(*srng->u.dst_ring.hp_addr); + } else { + hp = READ_ONCE(*srng->u.dst_ring.hp_addr); + + if (hp != srng->u.dst_ring.cached_hp) { + srng->u.dst_ring.cached_hp = hp; + /* Make sure descriptor is read after the head + * pointer. + */ + dma_rmb(); + } + } } /* Update cached ring head/tail pointers to HW. ath12k_hal_srng_access_begin() -- 2.49.0 ^ permalink raw reply related [flat|nested] 12+ messages in thread
* Re: [PATCH v2 1/4] wifi: ath12k: fix dest ring-buffer corruption 2025-06-04 14:45 ` [PATCH v2 1/4] wifi: ath12k: fix dest ring-buffer corruption Johan Hovold @ 2025-06-05 8:41 ` Baochen Qiang 2025-06-05 10:00 ` Johan Hovold 0 siblings, 1 reply; 12+ messages in thread From: Baochen Qiang @ 2025-06-05 8:41 UTC (permalink / raw) To: Johan Hovold, Jeff Johnson Cc: Miaoqing Pan, Remi Pommarel, linux-wireless, ath12k, linux-kernel, stable On 6/4/2025 10:45 PM, Johan Hovold wrote: > Add the missing memory barrier to make sure that destination ring > descriptors are read after the head pointers to avoid using stale data > on weakly ordered architectures like aarch64. > > The barrier is added to the ath12k_hal_srng_access_begin() helper for > symmetry with follow-on fixes for source ring buffer corruption which > will add barriers to ath12k_hal_srng_access_end(). > > Note that this may fix the empty descriptor issue recently worked around > by commit 51ad34a47e9f ("wifi: ath12k: Add drop descriptor handling for > monitor ring"). why? I would expect drunk cookies are valid in case of HAL_MON_DEST_INFO0_EMPTY_DESC, rather than anything caused by reordering. > > Tested-on: WCN7850 hw2.0 WLAN.HMT.1.0.c5-00481-QCAHMTSWPL_V1.0_V2.0_SILICONZ-3 > > Fixes: d889913205cf ("wifi: ath12k: driver for Qualcomm Wi-Fi 7 devices") > Cc: stable@vger.kernel.org # 6.3 > Signed-off-by: Johan Hovold <johan+linaro@kernel.org> > --- > drivers/net/wireless/ath/ath12k/ce.c | 3 --- > drivers/net/wireless/ath/ath12k/hal.c | 17 ++++++++++++++--- > 2 files changed, 14 insertions(+), 6 deletions(-) > > diff --git a/drivers/net/wireless/ath/ath12k/ce.c b/drivers/net/wireless/ath/ath12k/ce.c > index 740586fe49d1..b66d23d6b2bd 100644 > --- a/drivers/net/wireless/ath/ath12k/ce.c > +++ b/drivers/net/wireless/ath/ath12k/ce.c > @@ -343,9 +343,6 @@ static int ath12k_ce_completed_recv_next(struct ath12k_ce_pipe *pipe, > goto err; > } > > - /* Make sure descriptor is read after the head pointer. */ > - dma_rmb(); > - > *nbytes = ath12k_hal_ce_dst_status_get_length(desc); > > *skb = pipe->dest_ring->skb[sw_index]; > diff --git a/drivers/net/wireless/ath/ath12k/hal.c b/drivers/net/wireless/ath/ath12k/hal.c > index 91d5126ca149..9eea13ed5565 100644 > --- a/drivers/net/wireless/ath/ath12k/hal.c > +++ b/drivers/net/wireless/ath/ath12k/hal.c > @@ -2126,13 +2126,24 @@ void *ath12k_hal_srng_src_get_next_reaped(struct ath12k_base *ab, > > void ath12k_hal_srng_access_begin(struct ath12k_base *ab, struct hal_srng *srng) > { > + u32 hp; > + > lockdep_assert_held(&srng->lock); > > - if (srng->ring_dir == HAL_SRNG_DIR_SRC) > + if (srng->ring_dir == HAL_SRNG_DIR_SRC) { > srng->u.src_ring.cached_tp = > *(volatile u32 *)srng->u.src_ring.tp_addr; > - else > - srng->u.dst_ring.cached_hp = READ_ONCE(*srng->u.dst_ring.hp_addr); > + } else { > + hp = READ_ONCE(*srng->u.dst_ring.hp_addr); > + > + if (hp != srng->u.dst_ring.cached_hp) { This consumes additional CPU cycles in hot path, which is a concern to me. Based on that, I prefer the v1 implementation. > + srng->u.dst_ring.cached_hp = hp; > + /* Make sure descriptor is read after the head > + * pointer. > + */ > + dma_rmb(); > + } > + } > } > > /* Update cached ring head/tail pointers to HW. ath12k_hal_srng_access_begin() ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [PATCH v2 1/4] wifi: ath12k: fix dest ring-buffer corruption 2025-06-05 8:41 ` Baochen Qiang @ 2025-06-05 10:00 ` Johan Hovold 2025-06-05 10:49 ` Baochen Qiang 0 siblings, 1 reply; 12+ messages in thread From: Johan Hovold @ 2025-06-05 10:00 UTC (permalink / raw) To: Baochen Qiang Cc: Johan Hovold, Jeff Johnson, Miaoqing Pan, Remi Pommarel, linux-wireless, ath12k, linux-kernel, stable On Thu, Jun 05, 2025 at 04:41:32PM +0800, Baochen Qiang wrote: > On 6/4/2025 10:45 PM, Johan Hovold wrote: > > Add the missing memory barrier to make sure that destination ring > > descriptors are read after the head pointers to avoid using stale data > > on weakly ordered architectures like aarch64. > > > > The barrier is added to the ath12k_hal_srng_access_begin() helper for > > symmetry with follow-on fixes for source ring buffer corruption which > > will add barriers to ath12k_hal_srng_access_end(). > > > > Note that this may fix the empty descriptor issue recently worked around > > by commit 51ad34a47e9f ("wifi: ath12k: Add drop descriptor handling for > > monitor ring"). > > why? I would expect drunk cookies are valid in case of HAL_MON_DEST_INFO0_EMPTY_DESC, > rather than anything caused by reordering. Based on a quick look it seemed like this could possibly fall in the same category as some of the other workarounds I've spotted while looking into these ordering issues (e.g. f9fff67d2d7c ("wifi: ath11k: Fix SKB corruption in REO destination ring")). If you say this one is clearly unrelated, I'll drop the comment. > > @@ -343,9 +343,6 @@ static int ath12k_ce_completed_recv_next(struct ath12k_ce_pipe *pipe, > > goto err; > > } > > > > - /* Make sure descriptor is read after the head pointer. */ > > - dma_rmb(); > > - > > *nbytes = ath12k_hal_ce_dst_status_get_length(desc); > > > > *skb = pipe->dest_ring->skb[sw_index]; > > diff --git a/drivers/net/wireless/ath/ath12k/hal.c b/drivers/net/wireless/ath/ath12k/hal.c > > index 91d5126ca149..9eea13ed5565 100644 > > --- a/drivers/net/wireless/ath/ath12k/hal.c > > +++ b/drivers/net/wireless/ath/ath12k/hal.c > > @@ -2126,13 +2126,24 @@ void *ath12k_hal_srng_src_get_next_reaped(struct ath12k_base *ab, > > > > void ath12k_hal_srng_access_begin(struct ath12k_base *ab, struct hal_srng *srng) > > { > > + u32 hp; > > + > > lockdep_assert_held(&srng->lock); > > > > - if (srng->ring_dir == HAL_SRNG_DIR_SRC) > > + if (srng->ring_dir == HAL_SRNG_DIR_SRC) { > > srng->u.src_ring.cached_tp = > > *(volatile u32 *)srng->u.src_ring.tp_addr; > > - else > > - srng->u.dst_ring.cached_hp = READ_ONCE(*srng->u.dst_ring.hp_addr); > > + } else { > > + hp = READ_ONCE(*srng->u.dst_ring.hp_addr); > > + > > + if (hp != srng->u.dst_ring.cached_hp) { > > This consumes additional CPU cycles in hot path, which is a concern to me. > > Based on that, I prefer the v1 implementation. The conditional avoids a memory barrier in case the ring is empty, so for all callers but ath12k_ce_completed_recv_next() it's an improvement over v1 in that sense. I could make the barrier unconditional, which will only add one barrier to ath12k_ce_completed_recv_next() in case the ring is empty compared to v1. Perhaps that's a good compromise if you worry about the extra comparison? I very much want to avoid having both explicit barriers in the caller and barriers in the hal end() helper. I think it should be either or. > > + srng->u.dst_ring.cached_hp = hp; > > + /* Make sure descriptor is read after the head > > + * pointer. > > + */ > > + dma_rmb(); > > + } > > + } Johan ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [PATCH v2 1/4] wifi: ath12k: fix dest ring-buffer corruption 2025-06-05 10:00 ` Johan Hovold @ 2025-06-05 10:49 ` Baochen Qiang 2025-06-16 9:29 ` Praneesh P 0 siblings, 1 reply; 12+ messages in thread From: Baochen Qiang @ 2025-06-05 10:49 UTC (permalink / raw) To: Johan Hovold, P Praneesh Cc: Johan Hovold, Jeff Johnson, Miaoqing Pan, Remi Pommarel, linux-wireless, ath12k, linux-kernel, stable On 6/5/2025 6:00 PM, Johan Hovold wrote: > On Thu, Jun 05, 2025 at 04:41:32PM +0800, Baochen Qiang wrote: >> On 6/4/2025 10:45 PM, Johan Hovold wrote: >>> Add the missing memory barrier to make sure that destination ring >>> descriptors are read after the head pointers to avoid using stale data >>> on weakly ordered architectures like aarch64. >>> >>> The barrier is added to the ath12k_hal_srng_access_begin() helper for >>> symmetry with follow-on fixes for source ring buffer corruption which >>> will add barriers to ath12k_hal_srng_access_end(). >>> >>> Note that this may fix the empty descriptor issue recently worked around >>> by commit 51ad34a47e9f ("wifi: ath12k: Add drop descriptor handling for >>> monitor ring"). >> >> why? I would expect drunk cookies are valid in case of HAL_MON_DEST_INFO0_EMPTY_DESC, >> rather than anything caused by reordering. > > Based on a quick look it seemed like this could possibly fall in the > same category as some of the other workarounds I've spotted while > looking into these ordering issues (e.g. f9fff67d2d7c ("wifi: ath11k: > Fix SKB corruption in REO destination ring")). > > If you say this one is clearly unrelated, I'll drop the comment. Praneesh, could you comment here since you made that change? > >>> @@ -343,9 +343,6 @@ static int ath12k_ce_completed_recv_next(struct ath12k_ce_pipe *pipe, >>> goto err; >>> } >>> >>> - /* Make sure descriptor is read after the head pointer. */ >>> - dma_rmb(); >>> - >>> *nbytes = ath12k_hal_ce_dst_status_get_length(desc); >>> >>> *skb = pipe->dest_ring->skb[sw_index]; >>> diff --git a/drivers/net/wireless/ath/ath12k/hal.c b/drivers/net/wireless/ath/ath12k/hal.c >>> index 91d5126ca149..9eea13ed5565 100644 >>> --- a/drivers/net/wireless/ath/ath12k/hal.c >>> +++ b/drivers/net/wireless/ath/ath12k/hal.c >>> @@ -2126,13 +2126,24 @@ void *ath12k_hal_srng_src_get_next_reaped(struct ath12k_base *ab, >>> >>> void ath12k_hal_srng_access_begin(struct ath12k_base *ab, struct hal_srng *srng) >>> { >>> + u32 hp; >>> + >>> lockdep_assert_held(&srng->lock); >>> >>> - if (srng->ring_dir == HAL_SRNG_DIR_SRC) >>> + if (srng->ring_dir == HAL_SRNG_DIR_SRC) { >>> srng->u.src_ring.cached_tp = >>> *(volatile u32 *)srng->u.src_ring.tp_addr; >>> - else >>> - srng->u.dst_ring.cached_hp = READ_ONCE(*srng->u.dst_ring.hp_addr); >>> + } else { >>> + hp = READ_ONCE(*srng->u.dst_ring.hp_addr); >>> + >>> + if (hp != srng->u.dst_ring.cached_hp) { >> >> This consumes additional CPU cycles in hot path, which is a concern to me. >> >> Based on that, I prefer the v1 implementation. > > The conditional avoids a memory barrier in case the ring is empty, so > for all callers but ath12k_ce_completed_recv_next() it's an improvement > over v1 in that sense. > > I could make the barrier unconditional, which will only add one barrier > to ath12k_ce_completed_recv_next() in case the ring is empty compared to > v1. Perhaps that's a good compromise if you worry about the extra > comparison? I guess the unconditional barrier also has impact on performance? If so I am not sure which one is better then ... Let's just keep it as is and see what others think. > > I very much want to avoid having both explicit barriers in the caller > and barriers in the hal end() helper. I think it should be either or. > >>> + srng->u.dst_ring.cached_hp = hp; >>> + /* Make sure descriptor is read after the head >>> + * pointer. >>> + */ >>> + dma_rmb(); >>> + } >>> + } > > Johan ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [PATCH v2 1/4] wifi: ath12k: fix dest ring-buffer corruption 2025-06-05 10:49 ` Baochen Qiang @ 2025-06-16 9:29 ` Praneesh P 2025-06-16 10:59 ` Baochen Qiang 2025-06-17 8:46 ` Johan Hovold 0 siblings, 2 replies; 12+ messages in thread From: Praneesh P @ 2025-06-16 9:29 UTC (permalink / raw) To: Baochen Qiang, Johan Hovold, P Praneesh Cc: Johan Hovold, Jeff Johnson, Miaoqing Pan, Remi Pommarel, linux-wireless, ath12k, linux-kernel, stable On 6/5/2025 4:19 PM, Baochen Qiang wrote: > > On 6/5/2025 6:00 PM, Johan Hovold wrote: >> On Thu, Jun 05, 2025 at 04:41:32PM +0800, Baochen Qiang wrote: >>> On 6/4/2025 10:45 PM, Johan Hovold wrote: >>>> Add the missing memory barrier to make sure that destination ring >>>> descriptors are read after the head pointers to avoid using stale data >>>> on weakly ordered architectures like aarch64. >>>> >>>> The barrier is added to the ath12k_hal_srng_access_begin() helper for >>>> symmetry with follow-on fixes for source ring buffer corruption which >>>> will add barriers to ath12k_hal_srng_access_end(). >>>> >>>> Note that this may fix the empty descriptor issue recently worked around >>>> by commit 51ad34a47e9f ("wifi: ath12k: Add drop descriptor handling for >>>> monitor ring"). >>> why? I would expect drunk cookies are valid in case of HAL_MON_DEST_INFO0_EMPTY_DESC, >>> rather than anything caused by reordering. >> Based on a quick look it seemed like this could possibly fall in the >> same category as some of the other workarounds I've spotted while >> looking into these ordering issues (e.g. f9fff67d2d7c ("wifi: ath11k: >> Fix SKB corruption in REO destination ring")). >> >> If you say this one is clearly unrelated, I'll drop the comment. > Praneesh, could you comment here since you made that change? Empty/Drop descriptor is intentionally issued by the hardware during backpressure scenario and is unrelated to the issue discussed in this patch series. >>>> @@ -343,9 +343,6 @@ static int ath12k_ce_completed_recv_next(struct ath12k_ce_pipe *pipe, >>>> goto err; >>>> } >>>> >>>> - /* Make sure descriptor is read after the head pointer. */ >>>> - dma_rmb(); >>>> - >>>> *nbytes = ath12k_hal_ce_dst_status_get_length(desc); >>>> >>>> *skb = pipe->dest_ring->skb[sw_index]; >>>> diff --git a/drivers/net/wireless/ath/ath12k/hal.c b/drivers/net/wireless/ath/ath12k/hal.c >>>> index 91d5126ca149..9eea13ed5565 100644 >>>> --- a/drivers/net/wireless/ath/ath12k/hal.c >>>> +++ b/drivers/net/wireless/ath/ath12k/hal.c >>>> @@ -2126,13 +2126,24 @@ void *ath12k_hal_srng_src_get_next_reaped(struct ath12k_base *ab, >>>> >>>> void ath12k_hal_srng_access_begin(struct ath12k_base *ab, struct hal_srng *srng) >>>> { >>>> + u32 hp; >>>> + >>>> lockdep_assert_held(&srng->lock); >>>> >>>> - if (srng->ring_dir == HAL_SRNG_DIR_SRC) >>>> + if (srng->ring_dir == HAL_SRNG_DIR_SRC) { >>>> srng->u.src_ring.cached_tp = >>>> *(volatile u32 *)srng->u.src_ring.tp_addr; >>>> - else >>>> - srng->u.dst_ring.cached_hp = READ_ONCE(*srng->u.dst_ring.hp_addr); >>>> + } else { >>>> + hp = READ_ONCE(*srng->u.dst_ring.hp_addr); >>>> + >>>> + if (hp != srng->u.dst_ring.cached_hp) { >>> This consumes additional CPU cycles in hot path, which is a concern to me. >>> >>> Based on that, I prefer the v1 implementation. >> The conditional avoids a memory barrier in case the ring is empty, so >> for all callers but ath12k_ce_completed_recv_next() it's an improvement >> over v1 in that sense. >> >> I could make the barrier unconditional, which will only add one barrier >> to ath12k_ce_completed_recv_next() in case the ring is empty compared to >> v1. Perhaps that's a good compromise if you worry about the extra >> comparison? > I guess the unconditional barrier also has impact on performance? If so I am not sure > which one is better then ... > > Let's just keep it as is and see what others think. > >> I very much want to avoid having both explicit barriers in the caller >> and barriers in the hal end() helper. I think it should be either or. >> >>>> + srng->u.dst_ring.cached_hp = hp; >>>> + /* Make sure descriptor is read after the head >>>> + * pointer. >>>> + */ >>>> + dma_rmb(); >>>> + } >>>> + } >> Johan > ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [PATCH v2 1/4] wifi: ath12k: fix dest ring-buffer corruption 2025-06-16 9:29 ` Praneesh P @ 2025-06-16 10:59 ` Baochen Qiang 2025-06-17 8:46 ` Johan Hovold 1 sibling, 0 replies; 12+ messages in thread From: Baochen Qiang @ 2025-06-16 10:59 UTC (permalink / raw) To: Praneesh P, Johan Hovold, P Praneesh Cc: Johan Hovold, Jeff Johnson, Miaoqing Pan, Remi Pommarel, linux-wireless, ath12k, linux-kernel, stable On 6/16/2025 5:29 PM, Praneesh P wrote: > > On 6/5/2025 4:19 PM, Baochen Qiang wrote: >> >> On 6/5/2025 6:00 PM, Johan Hovold wrote: >>> On Thu, Jun 05, 2025 at 04:41:32PM +0800, Baochen Qiang wrote: >>>> On 6/4/2025 10:45 PM, Johan Hovold wrote: >>>>> Add the missing memory barrier to make sure that destination ring >>>>> descriptors are read after the head pointers to avoid using stale data >>>>> on weakly ordered architectures like aarch64. >>>>> >>>>> The barrier is added to the ath12k_hal_srng_access_begin() helper for >>>>> symmetry with follow-on fixes for source ring buffer corruption which >>>>> will add barriers to ath12k_hal_srng_access_end(). >>>>> >>>>> Note that this may fix the empty descriptor issue recently worked around >>>>> by commit 51ad34a47e9f ("wifi: ath12k: Add drop descriptor handling for >>>>> monitor ring"). >>>> why? I would expect drunk cookies are valid in case of HAL_MON_DEST_INFO0_EMPTY_DESC, >>>> rather than anything caused by reordering. >>> Based on a quick look it seemed like this could possibly fall in the >>> same category as some of the other workarounds I've spotted while >>> looking into these ordering issues (e.g. f9fff67d2d7c ("wifi: ath11k: >>> Fix SKB corruption in REO destination ring")). >>> >>> If you say this one is clearly unrelated, I'll drop the comment. >> Praneesh, could you comment here since you made that change? > Empty/Drop descriptor is intentionally issued by the hardware during backpressure scenario > and is unrelated to the issue discussed in this patch series. Thanks Praneesh. Johan, according to that, please drop the comment. >>>>> @@ -343,9 +343,6 @@ static int ath12k_ce_completed_recv_next(struct ath12k_ce_pipe >>>>> *pipe, >>>>> goto err; >>>>> } >>>>> - /* Make sure descriptor is read after the head pointer. */ >>>>> - dma_rmb(); >>>>> - >>>>> *nbytes = ath12k_hal_ce_dst_status_get_length(desc); >>>>> *skb = pipe->dest_ring->skb[sw_index]; >>>>> diff --git a/drivers/net/wireless/ath/ath12k/hal.c b/drivers/net/wireless/ath/ath12k/ >>>>> hal.c >>>>> index 91d5126ca149..9eea13ed5565 100644 >>>>> --- a/drivers/net/wireless/ath/ath12k/hal.c >>>>> +++ b/drivers/net/wireless/ath/ath12k/hal.c >>>>> @@ -2126,13 +2126,24 @@ void *ath12k_hal_srng_src_get_next_reaped(struct ath12k_base >>>>> *ab, >>>>> void ath12k_hal_srng_access_begin(struct ath12k_base *ab, struct hal_srng *srng) >>>>> { >>>>> + u32 hp; >>>>> + >>>>> lockdep_assert_held(&srng->lock); >>>>> - if (srng->ring_dir == HAL_SRNG_DIR_SRC) >>>>> + if (srng->ring_dir == HAL_SRNG_DIR_SRC) { >>>>> srng->u.src_ring.cached_tp = >>>>> *(volatile u32 *)srng->u.src_ring.tp_addr; >>>>> - else >>>>> - srng->u.dst_ring.cached_hp = READ_ONCE(*srng->u.dst_ring.hp_addr); >>>>> + } else { >>>>> + hp = READ_ONCE(*srng->u.dst_ring.hp_addr); >>>>> + >>>>> + if (hp != srng->u.dst_ring.cached_hp) { >>>> This consumes additional CPU cycles in hot path, which is a concern to me. >>>> >>>> Based on that, I prefer the v1 implementation. >>> The conditional avoids a memory barrier in case the ring is empty, so >>> for all callers but ath12k_ce_completed_recv_next() it's an improvement >>> over v1 in that sense. >>> >>> I could make the barrier unconditional, which will only add one barrier >>> to ath12k_ce_completed_recv_next() in case the ring is empty compared to >>> v1. Perhaps that's a good compromise if you worry about the extra >>> comparison? >> I guess the unconditional barrier also has impact on performance? If so I am not sure >> which one is better then ... >> >> Let's just keep it as is and see what others think. >> >>> I very much want to avoid having both explicit barriers in the caller >>> and barriers in the hal end() helper. I think it should be either or. >>> >>>>> + srng->u.dst_ring.cached_hp = hp; >>>>> + /* Make sure descriptor is read after the head >>>>> + * pointer. >>>>> + */ >>>>> + dma_rmb(); >>>>> + } >>>>> + } >>> Johan >> ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [PATCH v2 1/4] wifi: ath12k: fix dest ring-buffer corruption 2025-06-16 9:29 ` Praneesh P 2025-06-16 10:59 ` Baochen Qiang @ 2025-06-17 8:46 ` Johan Hovold 1 sibling, 0 replies; 12+ messages in thread From: Johan Hovold @ 2025-06-17 8:46 UTC (permalink / raw) To: Praneesh P Cc: Baochen Qiang, P Praneesh, Johan Hovold, Jeff Johnson, Miaoqing Pan, Remi Pommarel, linux-wireless, ath12k, linux-kernel, stable On Mon, Jun 16, 2025 at 02:59:24PM +0530, Praneesh P wrote: > On 6/5/2025 4:19 PM, Baochen Qiang wrote: > > On 6/5/2025 6:00 PM, Johan Hovold wrote: > >> On Thu, Jun 05, 2025 at 04:41:32PM +0800, Baochen Qiang wrote: > >>> On 6/4/2025 10:45 PM, Johan Hovold wrote: > >>>> Add the missing memory barrier to make sure that destination ring > >>>> descriptors are read after the head pointers to avoid using stale data > >>>> on weakly ordered architectures like aarch64. > >>>> > >>>> The barrier is added to the ath12k_hal_srng_access_begin() helper for > >>>> symmetry with follow-on fixes for source ring buffer corruption which > >>>> will add barriers to ath12k_hal_srng_access_end(). > >>>> > >>>> Note that this may fix the empty descriptor issue recently worked around > >>>> by commit 51ad34a47e9f ("wifi: ath12k: Add drop descriptor handling for > >>>> monitor ring"). > >>> why? I would expect drunk cookies are valid in case of HAL_MON_DEST_INFO0_EMPTY_DESC, > >>> rather than anything caused by reordering. > >> Based on a quick look it seemed like this could possibly fall in the > >> same category as some of the other workarounds I've spotted while > >> looking into these ordering issues (e.g. f9fff67d2d7c ("wifi: ath11k: > >> Fix SKB corruption in REO destination ring")). > >> > >> If you say this one is clearly unrelated, I'll drop the comment. > > Praneesh, could you comment here since you made that change? > Empty/Drop descriptor is intentionally issued by the hardware during > backpressure scenario > and is unrelated to the issue discussed in this patch series. Thanks for confirming. I've dropped this comment in v3: https://lore.kernel.org/lkml/20250617084402.14475-1-johan+linaro@kernel.org/ Johan ^ permalink raw reply [flat|nested] 12+ messages in thread
* [PATCH v2 3/4] wifi: ath12k: fix source ring-buffer corruption [not found] <20250604144509.28374-1-johan+linaro@kernel.org> 2025-06-04 14:45 ` [PATCH v2 1/4] wifi: ath12k: fix dest ring-buffer corruption Johan Hovold @ 2025-06-04 14:45 ` Johan Hovold 2025-06-04 14:45 ` [PATCH v2 4/4] wifi: ath12k: fix dest ring-buffer corruption when ring is full Johan Hovold 2 siblings, 0 replies; 12+ messages in thread From: Johan Hovold @ 2025-06-04 14:45 UTC (permalink / raw) To: Jeff Johnson Cc: Miaoqing Pan, Remi Pommarel, Baochen Qiang, linux-wireless, ath12k, linux-kernel, Johan Hovold, stable Add the missing memory barrier to make sure that LMAC source ring descriptors are written before updating the head pointer to avoid passing stale data to the firmware on weakly ordered architectures like aarch64. Note that non-LMAC rings use MMIO write accessors which have the required write memory barrier. Tested-on: WCN7850 hw2.0 WLAN.HMT.1.0.c5-00481-QCAHMTSWPL_V1.0_V2.0_SILICONZ-3 Fixes: d889913205cf ("wifi: ath12k: driver for Qualcomm Wi-Fi 7 devices") Cc: stable@vger.kernel.org # 6.3 Signed-off-by: Johan Hovold <johan+linaro@kernel.org> --- drivers/net/wireless/ath/ath12k/hal.c | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/drivers/net/wireless/ath/ath12k/hal.c b/drivers/net/wireless/ath/ath12k/hal.c index 8615578bb802..1e2d13cc2d19 100644 --- a/drivers/net/wireless/ath/ath12k/hal.c +++ b/drivers/net/wireless/ath/ath12k/hal.c @@ -2161,7 +2161,11 @@ void ath12k_hal_srng_access_end(struct ath12k_base *ab, struct hal_srng *srng) if (srng->ring_dir == HAL_SRNG_DIR_SRC) { srng->u.src_ring.last_tp = *(volatile u32 *)srng->u.src_ring.tp_addr; - *srng->u.src_ring.hp_addr = srng->u.src_ring.hp; + /* Make sure descriptor is written before updating the + * head pointer. + */ + dma_wmb(); + WRITE_ONCE(*srng->u.src_ring.hp_addr, srng->u.src_ring.hp); } else { srng->u.dst_ring.last_hp = *srng->u.dst_ring.hp_addr; *srng->u.dst_ring.tp_addr = srng->u.dst_ring.tp; @@ -2170,6 +2174,10 @@ void ath12k_hal_srng_access_end(struct ath12k_base *ab, struct hal_srng *srng) if (srng->ring_dir == HAL_SRNG_DIR_SRC) { srng->u.src_ring.last_tp = *(volatile u32 *)srng->u.src_ring.tp_addr; + /* Assume implementation use an MMIO write accessor + * which has the required wmb() so that the descriptor + * is written before the updating the head pointer. + */ ath12k_hif_write32(ab, (unsigned long)srng->u.src_ring.hp_addr - (unsigned long)ab->mem, -- 2.49.0 ^ permalink raw reply related [flat|nested] 12+ messages in thread
* [PATCH v2 4/4] wifi: ath12k: fix dest ring-buffer corruption when ring is full [not found] <20250604144509.28374-1-johan+linaro@kernel.org> 2025-06-04 14:45 ` [PATCH v2 1/4] wifi: ath12k: fix dest ring-buffer corruption Johan Hovold 2025-06-04 14:45 ` [PATCH v2 3/4] wifi: ath12k: fix source " Johan Hovold @ 2025-06-04 14:45 ` Johan Hovold 2025-06-06 7:27 ` Miaoqing Pan 2 siblings, 1 reply; 12+ messages in thread From: Johan Hovold @ 2025-06-04 14:45 UTC (permalink / raw) To: Jeff Johnson Cc: Miaoqing Pan, Remi Pommarel, Baochen Qiang, linux-wireless, ath12k, linux-kernel, Johan Hovold, stable Add the missing memory barriers to make sure that destination ring descriptors are read before updating the tail pointer (and passing ownership to the device) to avoid memory corruption on weakly ordered architectures like aarch64 when the ring is full. Tested-on: WCN7850 hw2.0 WLAN.HMT.1.0.c5-00481-QCAHMTSWPL_V1.0_V2.0_SILICONZ-3 Fixes: d889913205cf ("wifi: ath12k: driver for Qualcomm Wi-Fi 7 devices") Cc: stable@vger.kernel.org # 6.3 Signed-off-by: Johan Hovold <johan+linaro@kernel.org> --- drivers/net/wireless/ath/ath12k/hal.c | 11 +++++++++-- 1 file changed, 9 insertions(+), 2 deletions(-) diff --git a/drivers/net/wireless/ath/ath12k/hal.c b/drivers/net/wireless/ath/ath12k/hal.c index 1e2d13cc2d19..4da354e86a75 100644 --- a/drivers/net/wireless/ath/ath12k/hal.c +++ b/drivers/net/wireless/ath/ath12k/hal.c @@ -2153,7 +2153,6 @@ void ath12k_hal_srng_access_end(struct ath12k_base *ab, struct hal_srng *srng) { lockdep_assert_held(&srng->lock); - /* TODO: See if we need a write memory barrier here */ if (srng->flags & HAL_SRNG_FLAGS_LMAC_RING) { /* For LMAC rings, ring pointer updates are done through FW and * hence written to a shared memory location that is read by FW @@ -2168,7 +2167,11 @@ void ath12k_hal_srng_access_end(struct ath12k_base *ab, struct hal_srng *srng) WRITE_ONCE(*srng->u.src_ring.hp_addr, srng->u.src_ring.hp); } else { srng->u.dst_ring.last_hp = *srng->u.dst_ring.hp_addr; - *srng->u.dst_ring.tp_addr = srng->u.dst_ring.tp; + /* Make sure descriptor is read before updating the + * tail pointer. + */ + dma_mb(); + WRITE_ONCE(*srng->u.dst_ring.tp_addr, srng->u.dst_ring.tp); } } else { if (srng->ring_dir == HAL_SRNG_DIR_SRC) { @@ -2184,6 +2187,10 @@ void ath12k_hal_srng_access_end(struct ath12k_base *ab, struct hal_srng *srng) srng->u.src_ring.hp); } else { srng->u.dst_ring.last_hp = *srng->u.dst_ring.hp_addr; + /* Make sure descriptor is read before updating the + * tail pointer. + */ + mb(); ath12k_hif_write32(ab, (unsigned long)srng->u.dst_ring.tp_addr - (unsigned long)ab->mem, -- 2.49.0 ^ permalink raw reply related [flat|nested] 12+ messages in thread
* Re: [PATCH v2 4/4] wifi: ath12k: fix dest ring-buffer corruption when ring is full 2025-06-04 14:45 ` [PATCH v2 4/4] wifi: ath12k: fix dest ring-buffer corruption when ring is full Johan Hovold @ 2025-06-06 7:27 ` Miaoqing Pan 2025-06-06 9:19 ` Johan Hovold 0 siblings, 1 reply; 12+ messages in thread From: Miaoqing Pan @ 2025-06-06 7:27 UTC (permalink / raw) To: Johan Hovold, Jeff Johnson Cc: Remi Pommarel, Baochen Qiang, linux-wireless, ath12k, linux-kernel, stable On 6/4/2025 10:45 PM, Johan Hovold wrote: > Add the missing memory barriers to make sure that destination ring > descriptors are read before updating the tail pointer (and passing > ownership to the device) to avoid memory corruption on weakly ordered > architectures like aarch64 when the ring is full. > > Tested-on: WCN7850 hw2.0 WLAN.HMT.1.0.c5-00481-QCAHMTSWPL_V1.0_V2.0_SILICONZ-3 > > Fixes: d889913205cf ("wifi: ath12k: driver for Qualcomm Wi-Fi 7 devices") > Cc: stable@vger.kernel.org # 6.3 > Signed-off-by: Johan Hovold <johan+linaro@kernel.org> > --- > drivers/net/wireless/ath/ath12k/hal.c | 11 +++++++++-- > 1 file changed, 9 insertions(+), 2 deletions(-) > > diff --git a/drivers/net/wireless/ath/ath12k/hal.c b/drivers/net/wireless/ath/ath12k/hal.c > index 1e2d13cc2d19..4da354e86a75 100644 > --- a/drivers/net/wireless/ath/ath12k/hal.c > +++ b/drivers/net/wireless/ath/ath12k/hal.c > @@ -2153,7 +2153,6 @@ void ath12k_hal_srng_access_end(struct ath12k_base *ab, struct hal_srng *srng) > { > lockdep_assert_held(&srng->lock); > > - /* TODO: See if we need a write memory barrier here */ > if (srng->flags & HAL_SRNG_FLAGS_LMAC_RING) { > /* For LMAC rings, ring pointer updates are done through FW and > * hence written to a shared memory location that is read by FW > @@ -2168,7 +2167,11 @@ void ath12k_hal_srng_access_end(struct ath12k_base *ab, struct hal_srng *srng) > WRITE_ONCE(*srng->u.src_ring.hp_addr, srng->u.src_ring.hp); > } else { > srng->u.dst_ring.last_hp = *srng->u.dst_ring.hp_addr; > - *srng->u.dst_ring.tp_addr = srng->u.dst_ring.tp; > + /* Make sure descriptor is read before updating the > + * tail pointer. > + */ > + dma_mb(); > + WRITE_ONCE(*srng->u.dst_ring.tp_addr, srng->u.dst_ring.tp); > } > } else { > if (srng->ring_dir == HAL_SRNG_DIR_SRC) { > @@ -2184,6 +2187,10 @@ void ath12k_hal_srng_access_end(struct ath12k_base *ab, struct hal_srng *srng) > srng->u.src_ring.hp); > } else { > srng->u.dst_ring.last_hp = *srng->u.dst_ring.hp_addr; > + /* Make sure descriptor is read before updating the > + * tail pointer. > + */ > + mb(); Is rmb() sufficient, since MMIO write already includes wmb()? > ath12k_hif_write32(ab, > (unsigned long)srng->u.dst_ring.tp_addr - > (unsigned long)ab->mem, ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [PATCH v2 4/4] wifi: ath12k: fix dest ring-buffer corruption when ring is full 2025-06-06 7:27 ` Miaoqing Pan @ 2025-06-06 9:19 ` Johan Hovold 2025-06-06 9:37 ` Johan Hovold 0 siblings, 1 reply; 12+ messages in thread From: Johan Hovold @ 2025-06-06 9:19 UTC (permalink / raw) To: Miaoqing Pan Cc: Johan Hovold, Jeff Johnson, Remi Pommarel, Baochen Qiang, linux-wireless, ath12k, linux-kernel, stable On Fri, Jun 06, 2025 at 03:27:04PM +0800, Miaoqing Pan wrote: > On 6/4/2025 10:45 PM, Johan Hovold wrote: > > Add the missing memory barriers to make sure that destination ring > > descriptors are read before updating the tail pointer (and passing > > ownership to the device) to avoid memory corruption on weakly ordered > > architectures like aarch64 when the ring is full. > > @@ -2184,6 +2187,10 @@ void ath12k_hal_srng_access_end(struct ath12k_base *ab, struct hal_srng *srng) > > srng->u.src_ring.hp); > > } else { > > srng->u.dst_ring.last_hp = *srng->u.dst_ring.hp_addr; > > + /* Make sure descriptor is read before updating the > > + * tail pointer. > > + */ > > + mb(); > > Is rmb() sufficient, since MMIO write already includes wmb()? No, rmb() only orders reads against later reads. [ The wmb() itself orders reads against later writes on aarch64, but that's not generally guaranteed and hence should not be relied on in driver code. ] > > ath12k_hif_write32(ab, > > (unsigned long)srng->u.dst_ring.tp_addr - > > (unsigned long)ab->mem, Johan ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [PATCH v2 4/4] wifi: ath12k: fix dest ring-buffer corruption when ring is full 2025-06-06 9:19 ` Johan Hovold @ 2025-06-06 9:37 ` Johan Hovold 0 siblings, 0 replies; 12+ messages in thread From: Johan Hovold @ 2025-06-06 9:37 UTC (permalink / raw) To: Miaoqing Pan Cc: Johan Hovold, Jeff Johnson, Remi Pommarel, Baochen Qiang, linux-wireless, ath12k, linux-kernel, stable On Fri, Jun 06, 2025 at 11:19:16AM +0200, Johan Hovold wrote: > On Fri, Jun 06, 2025 at 03:27:04PM +0800, Miaoqing Pan wrote: > > On 6/4/2025 10:45 PM, Johan Hovold wrote: > > > Add the missing memory barriers to make sure that destination ring > > > descriptors are read before updating the tail pointer (and passing > > > ownership to the device) to avoid memory corruption on weakly ordered > > > architectures like aarch64 when the ring is full. > > > > @@ -2184,6 +2187,10 @@ void ath12k_hal_srng_access_end(struct ath12k_base *ab, struct hal_srng *srng) > > > srng->u.src_ring.hp); > > > } else { > > > srng->u.dst_ring.last_hp = *srng->u.dst_ring.hp_addr; > > > + /* Make sure descriptor is read before updating the > > > + * tail pointer. > > > + */ > > > + mb(); > > > > Is rmb() sufficient, since MMIO write already includes wmb()? > > No, rmb() only orders reads against later reads. > > [ The wmb() itself orders reads against later writes on aarch64, but > that's not generally guaranteed and hence should not be relied on in > driver code. ] Sorry, I meant to say: an rmb() would order reads against later writes on aarch64 (but that's not generally guaranteed and hence should not be relied on in driver code). Johan ^ permalink raw reply [flat|nested] 12+ messages in thread
end of thread, other threads:[~2025-06-17 8:46 UTC | newest]
Thread overview: 12+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <20250604144509.28374-1-johan+linaro@kernel.org>
2025-06-04 14:45 ` [PATCH v2 1/4] wifi: ath12k: fix dest ring-buffer corruption Johan Hovold
2025-06-05 8:41 ` Baochen Qiang
2025-06-05 10:00 ` Johan Hovold
2025-06-05 10:49 ` Baochen Qiang
2025-06-16 9:29 ` Praneesh P
2025-06-16 10:59 ` Baochen Qiang
2025-06-17 8:46 ` Johan Hovold
2025-06-04 14:45 ` [PATCH v2 3/4] wifi: ath12k: fix source " Johan Hovold
2025-06-04 14:45 ` [PATCH v2 4/4] wifi: ath12k: fix dest ring-buffer corruption when ring is full Johan Hovold
2025-06-06 7:27 ` Miaoqing Pan
2025-06-06 9:19 ` Johan Hovold
2025-06-06 9:37 ` Johan Hovold
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox