Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp5063238pxj; Wed, 9 Jun 2021 08:20:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzqGaNALeneKr5dLrKz4u3r00g6xaWDTkkfsX6mHyD6s4x6FGSZV4rSsocCXXHYQM2zpaHb X-Received: by 2002:a17:906:3ce:: with SMTP id c14mr420388eja.426.1623252022006; Wed, 09 Jun 2021 08:20:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623252022; cv=none; d=google.com; s=arc-20160816; b=LDJ6WU7ryK5DRxox7pd6K0Ew8noN1rxjytsi8YXLXXzdSZX69YodyHXZyj9kVmQ5LT XOanZ5HACUREScC824b2oexCgV8QGXIc2t0aOsocnUmSmjzKFyImsW00vaouD007mM7l hDcvzi0NLz4ypCTFprFcMzOhTeRDLHzcWQEZfxhIt2bgZnn6X+tq7A01CJtMjyFufrWI dASerjq6ddqNxCrIPryqOMB6mqbFqzITWtFNv3DTBgE1B2jrAM8PiSLzub4ugERG4p/O a0R/e50MlIiTHRi+XOli+SqFtBM89L2woFuhS1ypYLkbO998br/zxDdtfDBWPzq9J+S6 nRoQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version; bh=5wNfcwQ4q6mSgQUiBQC9ZHhM+heDyjoYvZ01H+MstbQ=; b=L3NzHvX6sMftea2Zw7I/o07SRIr4CKM1sXx7I5sCqKSV+vbpK+RJLP7u/q9ShaJU5k +8OVBoKn2+01CKbiqIH8S2MXrFDRSYsnxr38uOZNMvJs+AEbp/bkFA4bvrRVkbpJid4h 0fH/U2Fely129eZ4EDlo/WP0lAGbOjrz2oO3QgyH5AtK0RoFT2ZGhVikK3SfRRVNqUyX GtUcd1vFVaSOOvn79RascBg8AhrwOG/3X4lO2VUf8b0xSkGn4bMpBKJPMXReo6hmjRDB g11+/UYyp1SDF5aSv2DLHdd2vovXYIYbpmYwuaa6Yp3gx1X4zz2qVhq00LWxmAh1zsNW lgVw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p20si74377ejn.446.2021.06.09.08.19.57; Wed, 09 Jun 2021 08:20:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236200AbhFINZK (ORCPT + 99 others); Wed, 9 Jun 2021 09:25:10 -0400 Received: from mail-ot1-f41.google.com ([209.85.210.41]:38450 "EHLO mail-ot1-f41.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236038AbhFINZF (ORCPT ); Wed, 9 Jun 2021 09:25:05 -0400 Received: by mail-ot1-f41.google.com with SMTP id j11-20020a9d738b0000b02903ea3c02ded8so10277276otk.5; Wed, 09 Jun 2021 06:22:55 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=5wNfcwQ4q6mSgQUiBQC9ZHhM+heDyjoYvZ01H+MstbQ=; b=m8ISMGgx9vCD/lCKVoBBZ7V+ZfeJt5iWddrSKjpWdLRr0Ltj6Qo84gLl4yjHN80k4f epLi7DhtVa8n1j8LfC9sxKDghA85NhQS6eXCyRyFnhRssucKAZAEwwDWDm/8oylOdvLZ RB2dXxw+6L8cCSeSGeZ215i5r6yIDANvhelSTWFCuuOcpcoSSZyaAmwUil2PlIgi8aJA c7i5cItODRsnGh7F55rMyi76HLap73NB3gkqGMUB6SFfilpVsOSKCJGiZotsOd0dqgov i7aDaPan30dvngJd4Mmzb95Od5xy1nnAObd2Ie/eAA10rB7yfDvQkaf6hqhAkuKgrNU1 KY1Q== X-Gm-Message-State: AOAM531IeuI5SJkaMj0RWy/c1qjoKsK/bhaTqcxQpGbROm19w+tdE/lv /HbhJxCLI62iTTONsWUAORatSpCUfsoFxZ/sQsw= X-Received: by 2002:a05:6830:1bf7:: with SMTP id k23mr4143410otb.206.1623244974564; Wed, 09 Jun 2021 06:22:54 -0700 (PDT) MIME-Version: 1.0 References: <1623218580-41912-1-git-send-email-tanxiaofei@huawei.com> In-Reply-To: <1623218580-41912-1-git-send-email-tanxiaofei@huawei.com> From: "Rafael J. Wysocki" Date: Wed, 9 Jun 2021 15:22:43 +0200 Message-ID: Subject: Re: [PATCH v6] ACPI / APEI: fix the regression of synchronous external aborts occur in user-mode To: Xiaofei Tan Cc: James Morse , "Rafael J. Wysocki" , "Rafael J. Wysocki" , Len Brown , Tony Luck , Borislav Petkov , Andrew Morton , Joerg Roedel , Peter Zijlstra , ACPI Devel Maling List , Linux Kernel Mailing List , linuxarm@openeuler.org Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jun 9, 2021 at 8:06 AM Xiaofei Tan wrote: > > Before commit 8fcc4ae6faf8 ("arm64: acpi: Make apei_claim_sea() > synchronise with APEI's irq work"), do_sea() would unconditionally > signal the affected task from the arch code. Since that change, > the GHES driver sends the signals. Since this fixes a regression apparently introduced by the above commit, please add a Fixes tag pointing to that commit to it. > This exposes a problem as errors the GHES driver doesn't understand > or doesn't handle effectively are silently ignored. It will cause > the errors get taken again, and circulate endlessly. User-space task > get stuck in this loop. > > Existing firmware on Kunpeng9xx systems reports cache errors with the > 'ARM Processor Error' CPER records. > > Do memory failure handling for ARM Processor Error Section just like > for Memory Error Section. So why is this the right thing to do? I guess it doesn't address the problem entirely, but only in this particular case, so what if the firmware on some other platform reports errors with a new type unknown to the GHES driver? Will the problem show up again? > Signed-off-by: Xiaofei Tan > Reviewed-by: James Morse > > --- > Changes since v5: > - Do some changes following James's suggestions: 1) optimize commit log > 2) use err_info->length instead of err_info++' 3) some coding style > advice. > > Changes since v4: > - 1. Change the patch name from " ACPI / APEI: do memory failure on the > physical address reported by ARM processor error section" to this > more proper one. > - 2. Add a comment in the code to tell why not filter out corrected > error in an uncorrected section. > > Changes since v3: > - Print unhandled error following James Morse's advice. > > Changes since v2: > - Updated commit log > --- > drivers/acpi/apei/ghes.c | 81 ++++++++++++++++++++++++++++++++++++++---------- > 1 file changed, 64 insertions(+), 17 deletions(-) > > diff --git a/drivers/acpi/apei/ghes.c b/drivers/acpi/apei/ghes.c > index fce7ade..0c8330e 100644 > --- a/drivers/acpi/apei/ghes.c > +++ b/drivers/acpi/apei/ghes.c > @@ -441,28 +441,35 @@ static void ghes_kick_task_work(struct callback_head *head) > gen_pool_free(ghes_estatus_pool, (unsigned long)estatus_node, node_len); > } > > -static bool ghes_handle_memory_failure(struct acpi_hest_generic_data *gdata, > - int sev) > +static bool ghes_do_memory_failure(u64 physical_addr, int flags) > { > unsigned long pfn; > - int flags = -1; > - int sec_sev = ghes_severity(gdata->error_severity); > - struct cper_sec_mem_err *mem_err = acpi_hest_get_payload(gdata); > > if (!IS_ENABLED(CONFIG_ACPI_APEI_MEMORY_FAILURE)) > return false; > > - if (!(mem_err->validation_bits & CPER_MEM_VALID_PA)) > - return false; > - > - pfn = mem_err->physical_addr >> PAGE_SHIFT; > + pfn = PHYS_PFN(physical_addr); > if (!pfn_valid(pfn)) { > pr_warn_ratelimited(FW_WARN GHES_PFX > "Invalid address in generic error data: %#llx\n", > - mem_err->physical_addr); > + physical_addr); > return false; > } > > + memory_failure_queue(pfn, flags); > + return true; > +} > + > +static bool ghes_handle_memory_failure(struct acpi_hest_generic_data *gdata, > + int sev) > +{ > + int flags = -1; > + int sec_sev = ghes_severity(gdata->error_severity); > + struct cper_sec_mem_err *mem_err = acpi_hest_get_payload(gdata); > + > + if (!(mem_err->validation_bits & CPER_MEM_VALID_PA)) > + return false; > + > /* iff following two events can be handled properly by now */ > if (sec_sev == GHES_SEV_CORRECTED && > (gdata->flags & CPER_SEC_ERROR_THRESHOLD_EXCEEDED)) > @@ -470,14 +477,56 @@ static bool ghes_handle_memory_failure(struct acpi_hest_generic_data *gdata, > if (sev == GHES_SEV_RECOVERABLE && sec_sev == GHES_SEV_RECOVERABLE) > flags = 0; > > - if (flags != -1) { > - memory_failure_queue(pfn, flags); > - return true; > - } > + if (flags != -1) > + return ghes_do_memory_failure(mem_err->physical_addr, flags); > > return false; > } > > +static bool ghes_handle_arm_hw_error(struct acpi_hest_generic_data *gdata, int sev) > +{ > + struct cper_sec_proc_arm *err = acpi_hest_get_payload(gdata); > + bool queued = false; > + int sec_sev, i; > + char *p; > + > + log_arm_hw_error(err); > + > + sec_sev = ghes_severity(gdata->error_severity); > + if (sev != GHES_SEV_RECOVERABLE || sec_sev != GHES_SEV_RECOVERABLE) > + return false; > + > + p = (char *)(err + 1); > + for (i = 0; i < err->err_info_num; i++) { > + struct cper_arm_err_info *err_info = (struct cper_arm_err_info *)p; > + bool is_cache = (err_info->type == CPER_ARM_CACHE_ERROR); > + bool has_pa = (err_info->validation_bits & CPER_ARM_INFO_VALID_PHYSICAL_ADDR); > + const char *error_type = "unknown error"; > + > + /* > + * The field (err_info->error_info & BIT(26)) is fixed to set to > + * 1 in some old firmware of HiSilicon Kunpeng920. We assume that > + * firmware won't mix corrected errors in an uncorrected section, > + * and don't filter out 'corrected' error here. > + */ > + if (is_cache && has_pa) { > + queued = ghes_do_memory_failure(err_info->physical_fault_addr, 0); > + p += err_info->length; > + continue; > + } > + > + if (err_info->type < ARRAY_SIZE(cper_proc_error_type_strs)) > + error_type = cper_proc_error_type_strs[err_info->type]; > + > + pr_warn_ratelimited(FW_WARN GHES_PFX > + "Unhandled processor error type: %s\n", > + error_type); > + p += err_info->length; > + } > + > + return queued; > +} > + > /* > * PCIe AER errors need to be sent to the AER driver for reporting and > * recovery. The GHES severities map to the following AER severities and > @@ -605,9 +654,7 @@ static bool ghes_do_proc(struct ghes *ghes, > ghes_handle_aer(gdata); > } > else if (guid_equal(sec_type, &CPER_SEC_PROC_ARM)) { > - struct cper_sec_proc_arm *err = acpi_hest_get_payload(gdata); > - > - log_arm_hw_error(err); > + queued = ghes_handle_arm_hw_error(gdata, sev); > } else { > void *err = acpi_hest_get_payload(gdata); > > -- > 2.8.1 >