Received: by 2002:a05:6602:18e:0:0:0:0 with SMTP id m14csp2403978ioo; Sat, 28 May 2022 12:32:54 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwNcMnXqdBmcnl+aWl5x9FYV62XyjIacU5S5eSdTHEdxkcBZSv2iRVnvY+TTPWD5vjoUVsu X-Received: by 2002:a17:902:9349:b0:158:a6f7:e280 with SMTP id g9-20020a170902934900b00158a6f7e280mr48643410plp.155.1653766374383; Sat, 28 May 2022 12:32:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1653766374; cv=none; d=google.com; s=arc-20160816; b=c9skZAbCMXnKgjVJu2oK8JKF4srd3OQtfewHpD0EKmfhG3Fd+4ZfhMTN/o0i/i8wOe L9gOyIyU5xNLkgQN4+yzwPCeal/OntN45TfFlb5dwz8Px9810owuDpTHDPHGkGVzOB/6 X4DN2/CcvoAlDAma35D2RTZ5qTX5V8FRG5UVBULefjLjbRzP7j56mlpM+ro8V3HGnc9z 0aM7ZRuB+kC6teKgG+StLwcaoB+OHdOrU19OijX4vHHPLljXIpYZ01Hi62uZSHRc0kxw X+94FCIMGMeudDtQyD0LGaauYc9NCB0FCdiUeHfEHAa1+4fKfAud923ccXTL2oIPAA0X pQCA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:subject:user-agent:mime-version:date:message-id; bh=2n35wdH57aFNx5njsNbsDDdqT7ms2H8dTaJnVoJDTns=; b=GI0pPpiR9XlAyrfR4PCOTGsEKxIARtIAKonjoZftLt42LAvvZYdL9vNAQsxc8oHSD2 2IA4J9QFQW5U4uOIl2S9RQnIGB8o2a5nwGjdkSIbdgxVW36uOR06OQ8lkIJwnnQhsZBk iXy9unRsE0Bx4IA1s+VWGp43Jnn8qAb5N6EQnfKKfCIFwPSV58mk//LqoDXW9qar8hZa UwB3zPNHKEgg+Rx9s+KC7lMwwgZTgpXzGqvakCxpy/pg31WOvyelYOg0o0RYn3wrX+Wu fCDILsiicNp3Itf6Zcw0oFAmaY8N5wbNOeDBXoFlhcer++JWRF8DneAyUU+M4pzbAKtA Jz0A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id a12-20020aa795ac000000b005182bb020a3si8843275pfk.174.2022.05.28.12.32.54 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 28 May 2022 12:32:54 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 1BF4A590B1; Sat, 28 May 2022 12:00:23 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233120AbiE0Bko (ORCPT + 99 others); Thu, 26 May 2022 21:40:44 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43098 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232035AbiE0Bkn (ORCPT ); Thu, 26 May 2022 21:40:43 -0400 Received: from szxga01-in.huawei.com (szxga01-in.huawei.com [45.249.212.187]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D2E03DFF77 for ; Thu, 26 May 2022 18:40:40 -0700 (PDT) Received: from kwepemi500017.china.huawei.com (unknown [172.30.72.54]) by szxga01-in.huawei.com (SkyGuard) with ESMTP id 4L8SBx4QsyzgYPc; Fri, 27 May 2022 09:39:05 +0800 (CST) Received: from kwepemm600017.china.huawei.com (7.193.23.234) by kwepemi500017.china.huawei.com (7.221.188.110) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Fri, 27 May 2022 09:40:38 +0800 Received: from [10.174.179.234] (10.174.179.234) by kwepemm600017.china.huawei.com (7.193.23.234) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Fri, 27 May 2022 09:40:36 +0800 Message-ID: Date: Fri, 27 May 2022 09:40:36 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.8.0 Subject: Re: [PATCH -next v4 3/7] arm64: add support for machine check error safe To: Mark Rutland CC: James Morse , Andrew Morton , Thomas Gleixner , "Ingo Molnar" , Borislav Petkov , Robin Murphy , Dave Hansen , "Catalin Marinas" , Will Deacon , "Alexander Viro" , Michael Ellerman , Benjamin Herrenschmidt , Paul Mackerras , , "H . Peter Anvin" , , , , , Kefeng Wang , Xie XiuQi , Guohanjun References: <20220420030418.3189040-1-tongtiangen@huawei.com> <20220420030418.3189040-4-tongtiangen@huawei.com> <46e5954c-a9a8-f4a8-07cc-de42e2753051@huawei.com> <87bdb1c6-5803-d9c0-9208-432027ae1d8b@huawei.com> From: Tong Tiangen In-Reply-To: Content-Type: text/plain; charset="UTF-8"; format=flowed Content-Transfer-Encoding: 8bit X-Originating-IP: [10.174.179.234] X-ClientProxiedBy: dggems705-chm.china.huawei.com (10.3.19.182) To kwepemm600017.china.huawei.com (7.193.23.234) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,NICE_REPLY_A, RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 在 2022/5/26 17:50, Mark Rutland 写道: > On Thu, May 26, 2022 at 11:36:41AM +0800, Tong Tiangen wrote: >> >> >> 在 2022/5/25 16:30, Mark Rutland 写道: >>> On Thu, May 19, 2022 at 02:29:54PM +0800, Tong Tiangen wrote: >>>> >>>> >>>> 在 2022/5/13 23:26, Mark Rutland 写道: >>>>> On Wed, Apr 20, 2022 at 03:04:14AM +0000, Tong Tiangen wrote: >>>>>> During the processing of arm64 kernel hardware memory errors(do_sea()), if >>>>>> the errors is consumed in the kernel, the current processing is panic. >>>>>> However, it is not optimal. >>>>>> >>>>>> Take uaccess for example, if the uaccess operation fails due to memory >>>>>> error, only the user process will be affected, kill the user process >>>>>> and isolate the user page with hardware memory errors is a better choice. >>>>> >>>>> Conceptually, I'm fine with the idea of constraining what we do for a >>>>> true uaccess, but I don't like the implementation of this at all, and I >>>>> think we first need to clean up the arm64 extable usage to clearly >>>>> distinguish a uaccess from another access. >>>> >>>> OK,using EX_TYPE_UACCESS and this extable type could be recover, this is >>>> more reasonable. >>> >>> Great. >>> >>>> For EX_TYPE_UACCESS_ERR_ZERO, today we use it for kernel accesses in a >>>> couple of cases, such as >>>> get_user/futex/__user_cache_maint()/__user_swpX_asm(), >>> >>> Those are all user accesses. >>> >>> However, __get_kernel_nofault() and __put_kernel_nofault() use >>> EX_TYPE_UACCESS_ERR_ZERO by way of __{get,put}_mem_asm(), so we'd need to >>> refactor that code to split the user/kernel cases higher up the callchain. >>> >>>> your suggestion is: >>>> get_user continues to use EX_TYPE_UACCESS_ERR_ZERO and the other cases use >>>> new type EX_TYPE_FIXUP_ERR_ZERO? >>> >>> Yes, that's the rough shape. We could make the latter EX_TYPE_KACCESS_ERR_ZERO >>> to be clearly analogous to EX_TYPE_UACCESS_ERR_ZERO, and with that I susepct we >>> could remove EX_TYPE_FIXUP. >>> >>> Thanks, >>> Mark. >> According to your suggestion, i think the definition is like this: >> >> #define EX_TYPE_NONE 0 >> #define EX_TYPE_FIXUP 1 --> delete >> #define EX_TYPE_BPF 2 >> #define EX_TYPE_UACCESS_ERR_ZERO 3 >> #define EX_TYPE_LOAD_UNALIGNED_ZEROPAD 4 >> #define EX_TYPE_UACCESS xx --> add >> #define EX_TYPE_KACCESS_ERR_ZERO xx --> add >> [The value defined by the macro here is temporary] > > Almost; you don't need to add EX_TYPE_UACCESS here, as you can use > EX_TYPE_UACCESS_ERR_ZERO for that. > > We already have: > > | #define _ASM_EXTABLE_UACCESS_ERR(insn, fixup, err) \ > | _ASM_EXTABLE_UACCESS_ERR_ZERO(insn, fixup, err, wzr) > > ... and we can add: > > | #define _ASM_EXTABLE_UACCESS(insn, fixup) \ > | _ASM_EXTABLE_UACCESS_ERR_ZERO(insn, fixup, wzr, wzr) > > > ... and maybe we should use 'xzr' rather than 'wzr' for clarity. > >> There are two points to modify: >> >> 1、_get_kernel_nofault() and __put_kernel_nofault() using >> EX_TYPE_KACCESS_ERR_ZERO, Other positions using EX_TYPE_UACCESS_ERR_ZERO >> keep unchanged. > > That sounds right to me. This will require refactoring __raw_{get,put}_mem() > and __{get,put}_mem_asm(). > >> 2、delete EX_TYPE_FIXUP. >> >> There is no doubt about others. As for EX_TYPE_FIXUP, I think it needs to be >> retained, _cond_extable(EX_TYPE_FIXUP) is still in use in assembler.h. > > We use _cond_extable for cache maintenance uaccesses, so those should be moved > over to to EX_TYPE_UACCESS_ERR_ZERO. We can rename _cond_extable to > _cond_uaccess_extable for clarity. > > That will require restructuring asm-extable.h a bit. If that turns out to be > painful I'm happy to take a look. > > Thanks, > Mark. OK, I'll do it these days, thanks a lot. > .