Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp186613pxk; Wed, 16 Sep 2020 01:30:24 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxLcHn0xR7ehAHZ/4N5y4GuuHYW4vCA8QSWPsTQBHGhFg6tMXE9nF26zTxaxL3aCd2auhi6 X-Received: by 2002:a17:906:6884:: with SMTP id n4mr25011812ejr.50.1600245024625; Wed, 16 Sep 2020 01:30:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1600245024; cv=none; d=google.com; s=arc-20160816; b=Q2P7JHh7ogWN04f6Pa4lFfYtAUR8qlCKe3GTa5QrKw8hLAicH+fJduwbtxtwRRL74u x0reCB9rDutOZ5jsaou7qm5E0zG6t0z61m1VlnaT4viknKA3CPEE4kP/3uQ46F3fpSNS mi7aal5w2NQFbxVCTrVjcBAUKe6+iAKsnvQtVz/y4LSn6Ef7wV/6qmJQzxZJu2Wl9gs0 yKMM2Z40kpNDAuVVqVxnrCC4RjpJBLtN4lUpWp9mHq3Y6B3NalJV9th/5erYW6adbQZ+ lzVx7gKliCX77fEwoGhbquJ96X7BOHtpm9XZwcbOUvcz5z51cAmUw5017Gtzsb/nbg2Y lHng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :content-language:accept-language:references:message-id:date :thread-index:thread-topic:subject:cc:to:from; bh=YKBEKWGoxqbbic18gkkooDi8lB8UO36FoYmke8WmYC4=; b=cXLadmwgNjNdsLOCu77GsIK2D1i+HPlDTUl2+fk7c4j5ev4RrKgsg1SsqcZhTXfJ9T DwfmQed2HlEkl0sNyn/8oAnr7ZKdNfcY6fTFxR/GKY9qA4ZVuXVHgSH7WLVznFQrpUzq KwIPvIkcGZDV3bg0K0USCUfhrrY41gaP89hLDBJ1q4kNzdJ9HDYG8j1QpuvJnLUW68s+ JXab19iJU5rnnwR34d9yvVSFV+6eO9oTKmMuJfXfyftLR8rSZpVTIwWo563S9hdbgRoT Ncszvc8UhrEyCr9+jxDEte5smSo/55EfJCB0dMxzX7n/VmWfoIcCYivkAr25S88PG7nl YYWw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v10si11185793eds.459.2020.09.16.01.30.01; Wed, 16 Sep 2020 01:30:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726631AbgIPI1d convert rfc822-to-8bit (ORCPT + 99 others); Wed, 16 Sep 2020 04:27:33 -0400 Received: from smtp.h3c.com ([60.191.123.56]:58013 "EHLO h3cspam01-ex.h3c.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726568AbgIPI1S (ORCPT ); Wed, 16 Sep 2020 04:27:18 -0400 Received: from DAG2EX01-BASE.srv.huawei-3com.com ([10.8.0.64]) by h3cspam01-ex.h3c.com with ESMTPS id 08G8QFQA097631 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=FAIL); Wed, 16 Sep 2020 16:26:15 +0800 (GMT-8) (envelope-from tian.xianting@h3c.com) Received: from DAG2EX03-BASE.srv.huawei-3com.com (10.8.0.66) by DAG2EX01-BASE.srv.huawei-3com.com (10.8.0.64) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Wed, 16 Sep 2020 16:26:18 +0800 Received: from DAG2EX03-BASE.srv.huawei-3com.com ([fe80::5d18:e01c:bbbd:c074]) by DAG2EX03-BASE.srv.huawei-3com.com ([fe80::5d18:e01c:bbbd:c074%7]) with mapi id 15.01.1713.004; Wed, 16 Sep 2020 16:26:18 +0800 From: Tianxianting To: "minyard@acm.org" CC: "arnd@arndb.de" , "gregkh@linuxfoundation.org" , "openipmi-developer@lists.sourceforge.net" , "linux-kernel@vger.kernel.org" Subject: RE: [PATCH] [v2] ipmi: retry to get device id when error Thread-Topic: [PATCH] [v2] ipmi: retry to get device id when error Thread-Index: AQHWim/ckayNXmMPfkaknRpd9ndbxKlnv4SAgAGgMND//+T7AIAAjHIggAEfhNA= Date: Wed, 16 Sep 2020 08:26:18 +0000 Message-ID: <9ff00fb4187e42a0bd47e61fdd238292@h3c.com> References: <20200914081313.31450-1-tian.xianting@h3c.com> <20200914153937.GL15602@minyard.net> <226f9cfc421c49278cad9572bb33ac3a@h3c.com> <20200915145230.GB3674@minyard.net> Accept-Language: en-US Content-Language: zh-CN X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.99.141.128] x-sender-location: DAG2 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 8BIT MIME-Version: 1.0 X-DNSRBL: X-MAIL: h3cspam01-ex.h3c.com 08G8QFQA097631 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Corey, Would you please review this patch: add the same retry in try_get_dev_id() https://lkml.org/lkml/2020/9/16/244 Thanks a lot. -----Original Message----- From: tianxianting (RD) Sent: Tuesday, September 15, 2020 11:20 PM To: 'minyard@acm.org' Cc: arnd@arndb.de; gregkh@linuxfoundation.org; openipmi-developer@lists.sourceforge.net; linux-kernel@vger.kernel.org Subject: RE: [PATCH] [v2] ipmi: retry to get device id when error I get it now, thank you Corey :) I will send the patch for you review tomorrow. -----Original Message----- From: Corey Minyard [mailto:tcminyard@gmail.com] On Behalf Of Corey Minyard Sent: Tuesday, September 15, 2020 10:53 PM To: tianxianting (RD) Cc: arnd@arndb.de; gregkh@linuxfoundation.org; openipmi-developer@lists.sourceforge.net; linux-kernel@vger.kernel.org Subject: Re: [PATCH] [v2] ipmi: retry to get device id when error On Tue, Sep 15, 2020 at 09:40:02AM +0000, Tianxianting wrote: > Hi Corey, > Thanks for your comments, > Please review these two patches, which are based on your guide. > 1, [PATCH] ipmi: print current state when error > https://lkml.org/lkml/2020/9/15/183 > 2, [PATCH] [v3] ipmi: retry to get device id when error > https://lkml.org/lkml/2020/9/15/156 Patches are applied and in my next tree. > > As you said "You are having the same issue in the ipmi_si code. It's choosing defaults, but that's not ideal. You probably need to handle this there, too, in a separate patch." > I am not sure whether I grasped what you said, The print ' device id > demangle failed: -22' in commit message, is just triggered by bmc_device_id_handler->ipmi_demangle_device_id, this is the issue we met and is solving. > I found try_get_dev_id(in drivers/char/ipmi/ipmi_si_intf.c) also called ipmi_demangle_device_id(), do you mean if this ipmi_demangle_device_id() returned error, we also need to retry? Yes, I think so, retrying in try_get_dev_id() would be a good idea, I think. You are probably getting sub-optimal performance if you don't do this. Thanks, -corey > > Thanks a lot. > > -----Original Message----- > From: Corey Minyard [mailto:tcminyard@gmail.com] On Behalf Of Corey > Minyard > Sent: Monday, September 14, 2020 11:40 PM > To: tianxianting (RD) > Cc: arnd@arndb.de; gregkh@linuxfoundation.org; > openipmi-developer@lists.sourceforge.net; linux-kernel@vger.kernel.org > Subject: Re: [PATCH] [v2] ipmi: retry to get device id when error > > On Mon, Sep 14, 2020 at 04:13:13PM +0800, Xianting Tian wrote: > > We can't get bmc's device id with low probability when loading ipmi > > driver, it caused bmc device register failed. When this issue > > happened, we got below kernel printks: > > This patch is moving in the right direction. For the final patch(es), I can clean up the english grammar issues, since that's not your native language. A few comments: > > > [Wed Sep 9 19:52:03 2020] ipmi_si IPI0001:00: IPMI message handler: > > device id demangle failed: -22 > > You are having the same issue in the ipmi_si code. It's choosing defaults, but that's not ideal. You probably need to handle this there, too, in a separate patch. > > Can you create a separate patch to add a dev_warn() to the BT code when it returns IPMI_NOT_IN_MY_STATE_ERR, like I asked previously? And print the current state when it happens. That way we know where this issue is coming from and possibly fix the state machine. I'm thinking that the BMC is just not responding, but I'd like to be sure. > > Other comments inline... > > > [Wed Sep 9 19:52:03 2020] IPMI BT: using default values > > [Wed Sep 9 19:52:03 2020] IPMI BT: req2rsp=5 secs retries=2 > > [Wed Sep 9 19:52:03 2020] ipmi_si IPI0001:00: Unable to get the device id: -5 > > [Wed Sep 9 19:52:04 2020] ipmi_si IPI0001:00: Unable to register > > device: error -5 > > > > When this issue happened, we want to manually unload the driver and > > try to load it again, but it can't be unloaded by 'rmmod' as it is already 'in use'. > > > > We add below 'printk' in handle_one_recv_msg(), when this issue > > happened, the msg we received is "Recv: 1c 01 d5", which means the > > data_len is 1, data[0] is 0xd5(completion code), which means "bmc cannot execute command. > > Command, or request parameter(s), not supported in present state". > > Debug code: > > static int handle_one_recv_msg(struct ipmi_smi *intf, > > struct ipmi_smi_msg *msg) { > > printk("Recv: %*ph\n", msg->rsp_size, msg->rsp); > > ... ... > > } > > Then in ipmi_demangle_device_id(), it returned '-EINVAL' as 'data_len < 7' > > and 'data[0] != 0'. > > > > We used this patch to retry to get device id when error happen, we > > reproduced this issue again and the retry succeed on the first > > retry, we finally got the correct msg and then all is ok: > > Recv: 1c 01 00 01 81 05 84 02 af db 07 00 01 00 b9 00 10 00 > > > > So use retry machanism in this patch to give bmc more opportunity to > > correctly response kernel when we received specific completion code. > > > > Signed-off-by: Xianting Tian > > --- > > drivers/char/ipmi/ipmi_msghandler.c | 29 +++++++++++++++++++++++++---- > > include/uapi/linux/ipmi_msgdefs.h | 2 ++ > > 2 files changed, 27 insertions(+), 4 deletions(-) > > > > diff --git a/drivers/char/ipmi/ipmi_msghandler.c > > b/drivers/char/ipmi/ipmi_msghandler.c > > index 737c0b6b2..07d5be2cd 100644 > > --- a/drivers/char/ipmi/ipmi_msghandler.c > > +++ b/drivers/char/ipmi/ipmi_msghandler.c > > @@ -34,6 +34,7 @@ > > #include > > #include > > #include > > +#include > > > > #define IPMI_DRIVER_VERSION "39.2" > > > > @@ -60,6 +61,9 @@ enum ipmi_panic_event_op { #else #define > > IPMI_PANIC_DEFAULT IPMI_SEND_PANIC_EVENT_NONE #endif > > + > > +#define GET_DEVICE_ID_MAX_RETRY 5 > > + > > static enum ipmi_panic_event_op ipmi_send_panic_event = > > IPMI_PANIC_DEFAULT; > > > > static int panic_op_write_handler(const char *val, @@ -317,6 +321,7 > > @@ struct bmc_device { > > int dyn_guid_set; > > struct kref usecount; > > struct work_struct remove_work; > > + char cc; /* completion code */ > > }; > > #define to_bmc_device(x) container_of((x), struct bmc_device, > > pdev.dev) > > > > @@ -2381,6 +2386,8 @@ static void bmc_device_id_handler(struct ipmi_smi *intf, > > msg->msg.data, msg->msg.data_len, &intf->bmc->fetch_id); > > if (rv) { > > dev_warn(intf->si_dev, "device id demangle failed: %d\n", rv); > > + /* record completion code when error */ > > + intf->bmc->cc = msg->msg.data[0]; > > intf->bmc->dyn_id_set = 0; > > } else { > > /* > > @@ -2426,19 +2433,34 @@ send_get_device_id_cmd(struct ipmi_smi > > *intf) static int __get_device_id(struct ipmi_smi *intf, struct > > bmc_device > > *bmc) { > > int rv; > > - > > - bmc->dyn_id_set = 2; > > + unsigned int retry_count = 0; > > You need to initialize bmc->cc to 0 here. > > > > > intf->null_user_handler = bmc_device_id_handler; > > > > +retry: > > + bmc->dyn_id_set = 2; > > + > > rv = send_get_device_id_cmd(intf); > > if (rv) > > return rv; > > > > wait_event(intf->waitq, bmc->dyn_id_set != 2); > > > > - if (!bmc->dyn_id_set) > > + if (!bmc->dyn_id_set) { > > + if ((bmc->cc == IPMI_NOT_IN_MY_STATE_ERR > > + || bmc->cc == IPMI_NOT_IN_MY_STATE_ERR_1 > > + || bmc->cc == IPMI_NOT_IN_MY_STATE_ERR_2) > > + && ++retry_count <= GET_DEVICE_ID_MAX_RETRY) { > > + msleep(500); > > + dev_warn(intf->si_dev, > > + "retry to get bmc device id as completion code 0x%x\n", > > + bmc->cc); > > + bmc->cc = 0; > > + goto retry; > > + } > > + > > rv = -EIO; /* Something went wrong in the fetch. */ > > + } > > > > /* dyn_id_set makes the id data available. */ > > smp_rmb(); > > @@ -3245,7 +3267,6 @@ channel_handler(struct ipmi_smi *intf, struct ipmi_recv_msg *msg) > > /* It's the one we want */ > > if (msg->msg.data[0] != 0) { > > /* Got an error from the channel, just go on. */ > > - > > if (msg->msg.data[0] == IPMI_INVALID_COMMAND_ERR) { > > /* > > * If the MC does not support this diff --git > > a/include/uapi/linux/ipmi_msgdefs.h > > b/include/uapi/linux/ipmi_msgdefs.h > > index c2b23a9fd..46a0df434 100644 > > --- a/include/uapi/linux/ipmi_msgdefs.h > > +++ b/include/uapi/linux/ipmi_msgdefs.h > > @@ -70,6 +70,8 @@ > > #define IPMI_REQ_LEN_INVALID_ERR 0xc7 > > #define IPMI_REQ_LEN_EXCEEDED_ERR 0xc8 > > #define IPMI_NOT_IN_MY_STATE_ERR 0xd5 /* IPMI 2.0 */ > > +#define IPMI_NOT_IN_MY_STATE_ERR_1 0xd1 > > For the above name, can you use IPMI_DEVICE_IN_FW_UPDATE_ERR to match the spec? > > > +#define IPMI_NOT_IN_MY_STATE_ERR_2 0xd2 > > For the above name, can you use IPMI_DEVICE_IN_INIT_ERR to match the spec? > > Thanks, > > -corey > > > #define IPMI_LOST_ARBITRATION_ERR 0x81 > > #define IPMI_BUS_ERR 0x82 > > #define IPMI_NAK_ON_WRITE_ERR 0x83 > > -- > > 2.17.1 > >