Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3063895imu; Mon, 19 Nov 2018 10:05:19 -0800 (PST) X-Google-Smtp-Source: AJdET5f78ew2M5Qixsl1PFcVHrra5DoNu7lwmdYGHedO2TlEWDpGSI5nzB560XaM8aqkc/LB//xO X-Received: by 2002:a63:504d:: with SMTP id q13mr21285743pgl.319.1542650719122; Mon, 19 Nov 2018 10:05:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542650719; cv=none; d=google.com; s=arc-20160816; b=FRMyHK6Q9rgr8FWxi2bSV8JH8CY9i1ZN986vQiLaOkT6iA80qUU776225oZqq8qgmR HTUzjZ82o/mqGarGSqV5Mz38KuPP7d1zRy4tMG/zIIcfB1e61y3leAP4UoiKzcCtxzi1 xkKAiSAFWkr+M8H99+OuOyM8+ahMPl5/xL6PrXWEYvW6MiwQWtvRdeR8OxmEOMZGEoAx 2ZXGSNJKIqRCx7mMneQrAahz8OjQ9qDsLkQHj4AVvB0mNwBMQncY8xyK+X5hctgl8Fu3 slixs1PfbKqmChMIPS3gOLknes2WtY1x3DJPr5ftHBDzCSDnCOR4dOmY7TQKtL0ytRoe baVg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=yO8W1j2hND45J2KnsSOj/XaNx74JJmC2RT8IdXJSoHQ=; b=u13f2j2ge2NWENLI7JeOMDUvtjxpIisELZdVRRTAzqNVPYDkQgzj6OBHhIQB14BA4I 8Sj/LZojlBPTwsapolcbAVRsjDn0a/lO32FcYT8MbQlzZTYUU0SBzQe7zGyltGnVJpAt F0wjc+aFb7Dv4oIfhhZfR1vtUWfmTh3zqSq7/uA7Bu/KRtxBflQJDCbhG1X4d6xHJmx8 2Bd1y+zvXWMtKcfaLageQXrE6nLJT4TIuLpD8rdsjOeeQTJcrJQlTFgyHnx6UHM7zYaY bEL6u95etr+m7GneyNpgcb8UEJmk/ykPLvShYznToNfo1g4faTTK6nCkw5tgMryw7KBf ql7g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=nRvrgPQS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f2-v6si45536192pfb.246.2018.11.19.10.04.51; Mon, 19 Nov 2018 10:05:19 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=nRvrgPQS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731290AbeKTC6M (ORCPT + 99 others); Mon, 19 Nov 2018 21:58:12 -0500 Received: from mail.kernel.org ([198.145.29.99]:57102 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730491AbeKTC6L (ORCPT ); Mon, 19 Nov 2018 21:58:11 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8260C2086A; Mon, 19 Nov 2018 16:34:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1542645242; bh=ejxoV0wPQfnhrdNHuJrizZZuTIp6MXZa2wSMFnduVLo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=nRvrgPQSZUXumXwdo97UAjRajik05fDDKJV+UzdBVWdHd2uESt5wkWbBWJXpAEnYQ FRYf5DZLOcgkBKb/uB3pUV2afTj9iBSuKZGh4GQRN8p+Yd3xhit8gk15xnr30QNlIw fNa8dQVoy6GRD1hkbRirtRUHOlPK2wthkhRGZ22I= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Omar Avelar , Vishal Verma , Borislav Petkov , Arnd Bergmann , Dan Williams , Dave Jiang , elliott@hpe.com, "H. Peter Anvin" , Ingo Molnar , Len Brown , linux-acpi@vger.kernel.org, linux-edac , linux-nvdimm@lists.01.org, Qiuxu Zhuo , "Rafael J. Wysocki" , Ross Zwisler , Thomas Gleixner , Tony Luck , x86-ml , Yazen Ghannam Subject: [PATCH 4.19 090/205] acpi/nfit, x86/mce: Handle only uncorrectable machine checks Date: Mon, 19 Nov 2018 17:26:37 +0100 Message-Id: <20181119162632.099116739@linuxfoundation.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181119162616.586062722@linuxfoundation.org> References: <20181119162616.586062722@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ From: Vishal Verma commit 5d96c9342c23ee1d084802dcf064caa67ecaa45b upstream. The MCE handler for nfit devices is called for memory errors on a Non-Volatile DIMM and adds the error location to a 'badblocks' list. This list is used by the various NVDIMM drivers to avoid consuming known poison locations during IO. The MCE handler gets called for both corrected and uncorrectable errors. Until now, both kinds of errors have been added to the badblocks list. However, corrected memory errors indicate that the problem has already been fixed by hardware, and the resulting interrupt is merely a notification to Linux. As far as future accesses to that location are concerned, it is perfectly fine to use, and thus doesn't need to be included in the above badblocks list. Add a check in the nfit MCE handler to filter out corrected mce events, and only process uncorrectable errors. Fixes: 6839a6d96f4e ("nfit: do an ARS scrub on hitting a latent media error") Reported-by: Omar Avelar Signed-off-by: Vishal Verma Signed-off-by: Borislav Petkov CC: Arnd Bergmann CC: Dan Williams CC: Dave Jiang CC: elliott@hpe.com CC: "H. Peter Anvin" CC: Ingo Molnar CC: Len Brown CC: linux-acpi@vger.kernel.org CC: linux-edac CC: linux-nvdimm@lists.01.org CC: Qiuxu Zhuo CC: "Rafael J. Wysocki" CC: Ross Zwisler CC: stable CC: Thomas Gleixner CC: Tony Luck CC: x86-ml CC: Yazen Ghannam Link: http://lkml.kernel.org/r/20181026003729.8420-1-vishal.l.verma@intel.com Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm/mce.h | 1 + arch/x86/kernel/cpu/mcheck/mce.c | 3 ++- drivers/acpi/nfit/mce.c | 4 ++-- 3 files changed, 5 insertions(+), 3 deletions(-) --- a/arch/x86/include/asm/mce.h +++ b/arch/x86/include/asm/mce.h @@ -216,6 +216,7 @@ static inline int umc_normaddr_to_sysadd int mce_available(struct cpuinfo_x86 *c); bool mce_is_memory_error(struct mce *m); +bool mce_is_correctable(struct mce *m); DECLARE_PER_CPU(unsigned, mce_exception_count); DECLARE_PER_CPU(unsigned, mce_poll_count); --- a/arch/x86/kernel/cpu/mcheck/mce.c +++ b/arch/x86/kernel/cpu/mcheck/mce.c @@ -534,7 +534,7 @@ bool mce_is_memory_error(struct mce *m) } EXPORT_SYMBOL_GPL(mce_is_memory_error); -static bool mce_is_correctable(struct mce *m) +bool mce_is_correctable(struct mce *m) { if (m->cpuvendor == X86_VENDOR_AMD && m->status & MCI_STATUS_DEFERRED) return false; @@ -544,6 +544,7 @@ static bool mce_is_correctable(struct mc return true; } +EXPORT_SYMBOL_GPL(mce_is_correctable); static bool cec_add_mce(struct mce *m) { --- a/drivers/acpi/nfit/mce.c +++ b/drivers/acpi/nfit/mce.c @@ -25,8 +25,8 @@ static int nfit_handle_mce(struct notifi struct acpi_nfit_desc *acpi_desc; struct nfit_spa *nfit_spa; - /* We only care about memory errors */ - if (!mce_is_memory_error(mce)) + /* We only care about uncorrectable memory errors */ + if (!mce_is_memory_error(mce) || mce_is_correctable(mce)) return NOTIFY_DONE; /*