Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp1699506pxb; Thu, 16 Sep 2021 13:19:14 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzl/2JA60vB8szT7MnInDhIlpj7mMv+ysqjO/CkJD5zLdPGPesimyLA0DZoBEoc0Ahs3/gm X-Received: by 2002:a05:6402:1006:: with SMTP id c6mr8442528edu.301.1631823554370; Thu, 16 Sep 2021 13:19:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1631823554; cv=none; d=google.com; s=arc-20160816; b=QGK/EOm9uB5tJtVtxmSl2B3PSFhcirtQrVUvWiurmf0gYOkHlUBsQfaKjnCIhvgrN6 kJNAt7/BzfbwGsHE5eNVOUxk8rIhfLBpRLl7CgZBv0EaMtyMWuR8Mj35Z7AnFpkkVaxO ahKSuvPZeo0v3MO9wojM9kGQ8JFKL/+RlJZdePuUZwTOYpD2nQb2a1J67EpLJbmcR6Ld QEemMm0gAR0vTopqktPIn0hfkEfRnHpq9T9730TVa2mUphhff/6sbKSVkO2easrrYsO5 IEXMMLqKwh/M6kpuf0HeoamYRQEygsk1XZgM7NWrxvdivfG7Q7xV9LmKNnJ55xUqzImc v9wQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=XTxOG5adtvketI8aez/XscaI1qByi80jrpXr94NFUgo=; b=AlcWWn3hnVIBh86lk/mQ91N9MmHArwVXAvbVM87/Z2WAkzKlcJgK4cFO4XaM9fdI5K YS9kI5tSS+kZRA4TKBFSX5/ww3EE8SnmpPUAOjzCbVgJkQTGCkwIhZQ9+kyaedLyv6C+ sSaX4NxrK7QtR/dd8rKye1imfSGeTUj9LOBxB8T+nuADCLrIclOABs9/zuNWSrnj6BlG tLPJek1pBWwcB9tDqa/ZfyDa0mvIsvuzk8x5dy1sK9pOrmfXTdNxDwa/evXlLzzL2mhA m+jxKynIBvBeV0kSYkVGXyPCQQlEWaNT8OHuapAHO0NcsMc668rM62Gxwklm82SYgve6 BrPQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f12si5209718edx.586.2021.09.16.13.18.50; Thu, 16 Sep 2021 13:19:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240664AbhIPQTG (ORCPT + 99 others); Thu, 16 Sep 2021 12:19:06 -0400 Received: from foss.arm.com ([217.140.110.172]:39772 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235405AbhIPQJz (ORCPT ); Thu, 16 Sep 2021 12:09:55 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id D9DCE101E; Thu, 16 Sep 2021 09:08:33 -0700 (PDT) Received: from lpieralisi (e121166-lin.cambridge.arm.com [10.1.196.255]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 1D5453F5A1; Thu, 16 Sep 2021 09:08:32 -0700 (PDT) Date: Thu, 16 Sep 2021 17:08:27 +0100 From: Lorenzo Pieralisi To: Ard Biesheuvel Cc: Jia He , Will Deacon , Len Brown , Robert Moore , Erik Kaneda , Linux ARM , Linux Kernel Mailing List , ACPI Devel Maling List , "open list:ACPI COMPONENT ARCHITECTURE (ACPICA)" , Hanjun Guo , Catalin Marinas , "Rafael J . Wysocki" , Harb Abdulhamid Subject: Re: [PATCH v2] Revert "ACPI: Add memory semantics to acpi_os_map_memory()" Message-ID: <20210916160827.GA4525@lpieralisi> References: <20210910122820.26886-1-justin.he@arm.com> <20210910143223.6705-1-justin.he@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.4 (2018-02-28) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Sep 10, 2021 at 07:28:49PM +0200, Ard Biesheuvel wrote: > On Fri, 10 Sept 2021 at 16:32, Jia He wrote: > > > > This reverts commit 437b38c51162f8b87beb28a833c4d5dc85fa864e. > > > > After this commit, a boot panic is alway hit on an Ampere EMAG server > > with call trace as follows: > > Internal error: synchronous external abort: 96000410 [#1] SMP > > Modules linked in: > > CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.14.0+ #462 > > Hardware name: MiTAC RAPTOR EV-883832-X3-0001/RAPTOR, BIOS 0.14 02/22/2019 > > pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) > > [...snip...] > > Call trace: > > acpi_ex_system_memory_space_handler+0x26c/0x2c8 > > acpi_ev_address_space_dispatch+0x228/0x2c4 > > acpi_ex_access_region+0x114/0x268 > > acpi_ex_field_datum_io+0x128/0x1b8 > > acpi_ex_extract_from_field+0x14c/0x2ac > > acpi_ex_read_data_from_field+0x190/0x1b8 > > acpi_ex_resolve_node_to_value+0x1ec/0x288 > > acpi_ex_resolve_to_value+0x250/0x274 > > acpi_ds_evaluate_name_path+0xac/0x124 > > acpi_ds_exec_end_op+0x90/0x410 > > acpi_ps_parse_loop+0x4ac/0x5d8 > > acpi_ps_parse_aml+0xe0/0x2c8 > > acpi_ps_execute_method+0x19c/0x1ac > > acpi_ns_evaluate+0x1f8/0x26c > > acpi_ns_init_one_device+0x104/0x140 > > acpi_ns_walk_namespace+0x158/0x1d0 > > acpi_ns_initialize_devices+0x194/0x218 > > acpi_initialize_objects+0x48/0x50 > > acpi_init+0xe0/0x498 > > > > As mentioned by Lorenzo: > > "We are forcing memory semantics mappings to PROT_NORMAL_NC, which > > eMAG does not like at all and I'd need to understand why. It looks > > like the issue happen in SystemMemory Opregion handler." > > > > Hence just revert it before everything is clear. > > > > Can we try to find the root cause first? -rc1 is not even out yet, and > reverting it now means we can not resubmit it until the next merge > window. I am waiting to debug this on an eMAG but I noticed something that I wanted to bring up. SystemMemory Operation region handler - ie acpi_ex_system_memory_space_handler() maps the Operation Region (that AFAICS is MMIO, it is _not_ memory) with acpi_os_map_memory() and I believe that's what is causing this bug. On the other hand, acpi_os_map_generic_address(), to handle spaceid ACPI_ADR_SPACE_SYSTEM_MEMORY, uses acpi_os_map_iomem() that is more in line with my expectations. Question is: is the mapping in acpi_ex_system_memory_space_handler() wrong (and should be patched with acpi_os_map_iomem() ?) On x86 this should not change a thing, on ARM it would. I don't think it is right to map SystemMemory Operation regions with memory semantics but on the other hand, other than the EFI memory map, there is nothing we can do to determine what a SystemMemory Operation region address space actually represents. Thoughts ? Before embarking on patching acpi_ex_system_memory_space_handler() I want to make sure my understanding of the SystemMemory space is correct, comments welcome. I will pinpoint the trigger for this bug shortly and before doing anything else. Thanks, Lorenzo