Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933518AbdDGP5U (ORCPT ); Fri, 7 Apr 2017 11:57:20 -0400 Received: from foss.arm.com ([217.140.101.70]:57238 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755311AbdDGP5L (ORCPT ); Fri, 7 Apr 2017 11:57:11 -0400 Message-ID: <58E7B6BD.3000401@arm.com> Date: Fri, 07 Apr 2017 16:56:45 +0100 From: James Morse User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Icedove/31.6.0 MIME-Version: 1.0 To: Xie XiuQi CC: christoffer.dall@linaro.org, marc.zyngier@arm.com, catalin.marinas@arm.com, will.deacon@arm.com, fu.wei@linaro.org, rostedt@goodmis.org, hanjun.guo@linaro.org, shiju.jose@huawei.com, linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, linux-acpi@vger.kernel.org, gengdongjiu@huawei.com, zhengqiang10@huawei.com, wuquanming@huawei.com, wangxiongfeng2@huawei.com, Wang Xiongfeng Subject: Re: [PATCH v3 8/8] arm64: exception: check shared writable page in SEI handler References: <1490869877-118713-1-git-send-email-xiexiuqi@huawei.com> <1490869877-118713-9-git-send-email-xiexiuqi@huawei.com> In-Reply-To: <1490869877-118713-9-git-send-email-xiexiuqi@huawei.com> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1795 Lines: 41 Hi Xie XiuQi, On 30/03/17 11:31, Xie XiuQi wrote: > From: Wang Xiongfeng > > Since SEI is asynchronous, the error data has been consumed. So we must > suppose that all the memory data current process can write are > contaminated. If the process doesn't have shared writable pages, the > process will be killed, and the system will continue running normally. > Otherwise, the system must be terminated, because the error has been > propagated to other processes running on other cores, and recursively > the error may be propagated to several another processes. This is pretty complicated. We can't guarantee that another CPU hasn't modified the page tables while we do this, (so its racy). We can't guarantee that the corrupt data hasn't been sent over the network or written to disk in the mean time (so its not enough). The scenario you have is a write of corrupt data to memory where another CPU reading it doesn't know the value is corrupt. The hardware gives us quite a lot of help containing errors. The RAS specification (DDI 0587A) describes your scenario as error propagation in '2.1.2 Architectural error propagation', and then classifies it in '2.1.3 Architecturally infected, containable and uncontainable' as uncontained because the value is no longer in the general-purpose registers. For uncontained errors we should panic(). We shouldn't need to try to track errors after we get a notification as the hardware has done this for us. Firmware-first does complicate this if events like this are not delivered using a synchronous external abort, as Linux may have PSTATE.A masked preventing SError Interrupts from being taken. It looks like PSTATE.A is masked much more often than is necessary. I will look into cleaning this up. Thanks, James