Received: by 2002:a05:6520:4d:b0:139:a872:a4c9 with SMTP id i13csp2560909lkm; Mon, 20 Sep 2021 18:45:18 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzt5EO27vf2WzgdZN1Oz3mXMeQul3z0tctvgvOAoFQr20g4L9PzT9jgeC/wUR9tVFWgdNLC X-Received: by 2002:a5e:a916:: with SMTP id c22mr13161894iod.211.1632188717717; Mon, 20 Sep 2021 18:45:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1632188717; cv=none; d=google.com; s=arc-20160816; b=VHc/FkIOgFRABf5dhCnvY4W4p65hD3v7+DApDY2HjHjE31l2/fWrdm7dio7EtLqP4f RNdMhUlxa29rGeLMyLKsmflabfYlxqkl7WSoq2SFtSKMeNh6iZmSuIz4dLcrsFGWquk6 i21t5Vnp5dQTaOBWvsZSCRSgUJbwdl06HS+F0DKWoH9BpswmMR98Ni9/6hRbUKqSKDes tASJlYzvfnFL1pBDwkJXK3aBa7mCEg3qU3waMCM+Rb8MTOUdjYdBkrzWdUQQt9Zfx+bw 6ftUSwyVokktbhVw4w0bUPJhqq7S7VoRWBiqH8xlSqMfi8QmrwbbrYWGGAmdFWJsffr7 JIgA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=xXUIfRQxYXbac725cheJRb1xQv4dqyHYJJMtBoNm4FQ=; b=oqjDF1an8+hU6JpdQlrUrjzkbLuFWF0kSJob8kE8j7NC2uFf5zR5m9S7Fj7QKNj6IN X9ZZGMceqjp5E+GqIzZCmvP0LW2NSIBFqn0kkvGf0/3gDh60cSE09c/QpbYWSB36CsGQ jWhBcu84GE8Jgv4bcrsdS9i5JJZ1aA5FL+nCFZhm5skrYhOAPus8K52L/orkmROyxaZW 843ONvnsBSX+Thh7oN4RL0ySaxba90Lk1GnZsREVHy+miXPfXEWDkriXdMO5mUT7rATG 6EFxm/Fvli2NB09tLNDiR2r8FwyKp4K247vhMwJH6aZ8XtupMquLTKrV0+nbGZGysmxg VDag== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s11si15519548ild.14.2021.09.20.18.45.06; Mon, 20 Sep 2021 18:45:17 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344754AbhITRFe (ORCPT + 99 others); Mon, 20 Sep 2021 13:05:34 -0400 Received: from foss.arm.com ([217.140.110.172]:50556 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345401AbhITRCa (ORCPT ); Mon, 20 Sep 2021 13:02:30 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 8445D113E; Mon, 20 Sep 2021 10:01:02 -0700 (PDT) Received: from lpieralisi (e121166-lin.cambridge.arm.com [10.1.196.255]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id A17BC3F59C; Mon, 20 Sep 2021 10:01:00 -0700 (PDT) Date: Mon, 20 Sep 2021 18:00:55 +0100 From: Lorenzo Pieralisi To: Ard Biesheuvel , rafael.j.wysocki@intel.com, rjw@rjwysocki.net Cc: Jia He , Will Deacon , Len Brown , Robert Moore , Erik Kaneda , Linux ARM , Linux Kernel Mailing List , ACPI Devel Maling List , "open list:ACPI COMPONENT ARCHITECTURE (ACPICA)" , Hanjun Guo , Catalin Marinas , Harb Abdulhamid Subject: Re: [PATCH v2] Revert "ACPI: Add memory semantics to acpi_os_map_memory()" Message-ID: <20210920170055.GA13861@lpieralisi> References: <20210910122820.26886-1-justin.he@arm.com> <20210910143223.6705-1-justin.he@arm.com> <20210916160827.GA4525@lpieralisi> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210916160827.GA4525@lpieralisi> User-Agent: Mutt/1.9.4 (2018-02-28) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Sep 16, 2021 at 05:08:27PM +0100, Lorenzo Pieralisi wrote: > On Fri, Sep 10, 2021 at 07:28:49PM +0200, Ard Biesheuvel wrote: > > On Fri, 10 Sept 2021 at 16:32, Jia He wrote: > > > > > > This reverts commit 437b38c51162f8b87beb28a833c4d5dc85fa864e. > > > > > > After this commit, a boot panic is alway hit on an Ampere EMAG server > > > with call trace as follows: > > > Internal error: synchronous external abort: 96000410 [#1] SMP > > > Modules linked in: > > > CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.14.0+ #462 > > > Hardware name: MiTAC RAPTOR EV-883832-X3-0001/RAPTOR, BIOS 0.14 02/22/2019 > > > pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) > > > [...snip...] > > > Call trace: > > > acpi_ex_system_memory_space_handler+0x26c/0x2c8 > > > acpi_ev_address_space_dispatch+0x228/0x2c4 > > > acpi_ex_access_region+0x114/0x268 > > > acpi_ex_field_datum_io+0x128/0x1b8 > > > acpi_ex_extract_from_field+0x14c/0x2ac > > > acpi_ex_read_data_from_field+0x190/0x1b8 > > > acpi_ex_resolve_node_to_value+0x1ec/0x288 > > > acpi_ex_resolve_to_value+0x250/0x274 > > > acpi_ds_evaluate_name_path+0xac/0x124 > > > acpi_ds_exec_end_op+0x90/0x410 > > > acpi_ps_parse_loop+0x4ac/0x5d8 > > > acpi_ps_parse_aml+0xe0/0x2c8 > > > acpi_ps_execute_method+0x19c/0x1ac > > > acpi_ns_evaluate+0x1f8/0x26c > > > acpi_ns_init_one_device+0x104/0x140 > > > acpi_ns_walk_namespace+0x158/0x1d0 > > > acpi_ns_initialize_devices+0x194/0x218 > > > acpi_initialize_objects+0x48/0x50 > > > acpi_init+0xe0/0x498 > > > > > > As mentioned by Lorenzo: > > > "We are forcing memory semantics mappings to PROT_NORMAL_NC, which > > > eMAG does not like at all and I'd need to understand why. It looks > > > like the issue happen in SystemMemory Opregion handler." > > > > > > Hence just revert it before everything is clear. > > > > > > > Can we try to find the root cause first? -rc1 is not even out yet, and > > reverting it now means we can not resubmit it until the next merge > > window. > > I am waiting to debug this on an eMAG but I noticed something that > I wanted to bring up. > > SystemMemory Operation region handler - ie > > acpi_ex_system_memory_space_handler() > > maps the Operation Region (that AFAICS is MMIO, it is _not_ memory) > with acpi_os_map_memory() and I believe that's what is causing this > bug. > > On the other hand, acpi_os_map_generic_address(), to handle spaceid > ACPI_ADR_SPACE_SYSTEM_MEMORY, uses acpi_os_map_iomem() that is more > in line with my expectations. Hi Rafael, I wanted to ask please if you have any insights on why (1) acpi_ex_system_memory_space_handler() (2) acpi_os_map_generic_address() Use two different calls to map memory for the _same_ address space ID (SystemMemory). (3) acpi_os_map_memory() vs (4) acpi_os_map_iomem() I am struggling to understand why (1) uses (3) ("memory semantics") when (2) uses (4) - it is actually unclear how the distinction between the two mapping APIs is to be drawn and on what basis one should choose which one to use. I am still waiting to grab some HW to debug this report but the issue here is that we are mapping an OpRegion SystemMemory with (3) in the memory space handler and given the patch we are reverting we end up mapping the operation region with normal non-cacheable memory attributes that probably the physical address range behind the OpRegion does not support. Thanks a lot, Lorenzo > > Question is: is the mapping in acpi_ex_system_memory_space_handler() > wrong (and should be patched with acpi_os_map_iomem() ?) > > On x86 this should not change a thing, on ARM it would. > > I don't think it is right to map SystemMemory Operation regions with > memory semantics but on the other hand, other than the EFI memory map, > there is nothing we can do to determine what a SystemMemory Operation > region address space actually represents. > > Thoughts ? Before embarking on patching > > acpi_ex_system_memory_space_handler() > > I want to make sure my understanding of the SystemMemory space is > correct, comments welcome. > > I will pinpoint the trigger for this bug shortly and before doing > anything else. > > Thanks, > Lorenzo