Received: by 2002:a05:7412:b101:b0:e2:908c:2ebd with SMTP id az1csp2835063rdb; Wed, 15 Nov 2023 11:55:09 -0800 (PST) X-Google-Smtp-Source: AGHT+IFjuqtnSttHaIky2Ek7A8nEamjoL+Ml3Keq9ZlQ6FKD9Z+jjwyAbNzJLbQZX47ltkWvxuYE X-Received: by 2002:a17:90b:224f:b0:281:554d:b318 with SMTP id hk15-20020a17090b224f00b00281554db318mr10889648pjb.39.1700078109397; Wed, 15 Nov 2023 11:55:09 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700078109; cv=none; d=google.com; s=arc-20160816; b=nYzFE4uOsMXxX00MDMTuvJGQLOcRXr2qGcpXMfe6NVpp/m5wcU0wOqrFGAlNs+5sbm 1fDdbQEZBUCaQo3wB+g4mOjNz4hv6AByFJfxi2BPpPnhYJYOIM/++Rd0kfaTNDeyjwRL tTPXO75G4I5NH2rySJB5nWYs+Zae3BoOz7sgaq33dQp09lVUVusNwKUhd3AlJu0MzT0a rpmsHZbBlIRoTDu5S7c5OUg2Gn7mYKjzVHNP3jmy60G961fwjgmLq6j9XdZZjDdSzEIU id+l0savCw4wmZKx0y1YnlVdnzCWVpZKRNHaa6lBYE9r1OQfkFbeJs2MmLsEobUrzjRY AYrA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=bHBfHrQCLAkCe+cBTq0ThjzEmkzosdO78F+9c3Zv1y0=; fh=S7iaUXeayMPNyPzmDJBX6zQJxeHISzeeDLUOtGlzdSo=; b=Al4BZH50+FzrZ/11X0x7yEbN2SLqpkzi5cE7X98WZwnzTATui32aD9a4mLltcMppM3 z2GrXQRrLp6FWaygoRklg6S0FsvTPQfrBL1FnFrIlW5mfOLjXAu8apxwBsjYcostpy39 x7OwKYH+LuS5n73pLXsf53guVDu4XtGDO5576Nv3DkhxVDT6AWhQVujAyRHh1uNRq8L1 r5+LikCZ4GxIZTXwnCzT9nt9kq2XsMYkRTxbNRHpM072RyCnyyelbfqien7pFgRQNgZE h5Ikhij3F6p6ZMDcs9ydfGeA9UkVd0JU1hhjZI4jH/gQXISOnZtk3v2mudCCmYbAXlwj SCmw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="g/9EAips"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from snail.vger.email (snail.vger.email. [2620:137:e000::3:7]) by mx.google.com with ESMTPS id q13-20020a17090ad38d00b00282ec3a397esi373516pju.82.2023.11.15.11.55.08 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Nov 2023 11:55:09 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) client-ip=2620:137:e000::3:7; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="g/9EAips"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id 15EA480DEA56; Wed, 15 Nov 2023 11:55:08 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1343515AbjKOTzH (ORCPT + 99 others); Wed, 15 Nov 2023 14:55:07 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51924 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235576AbjKOTzF (ORCPT ); Wed, 15 Nov 2023 14:55:05 -0500 Received: from mgamail.intel.com (mgamail.intel.com [192.55.52.43]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E9BCB1AB; Wed, 15 Nov 2023 11:55:01 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1700078101; x=1731614101; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=LW9FFyvXyEXGBuKqTjhKjTk25cxpgH4sSafAbcbh/OQ=; b=g/9EAipss7qLUoiaSbyqIIPQYORqQ7x4UQpqRMMRCOkCYLoAyCiPvRM6 F28khbq5uhVjwNAd21ohNqbqLEErd6LV01KCRivlCC5BTCe1XhSt6R0/M wNo5mM+fZ6iS0+zwxX/qyWo9gyam8QFaX4+gVUj6hJrWBOoJD0Ed9sCOT /+PX1mklTVTU7mEp7LZ8548+lpgNq0nbrrMSVymNulnFIYdhl8AjfJBGo ksPOOaIDweQXEzJNUSnelQf8Ptfzy6kF8HeYZuxE5JffZzVTJ8adA5FJc nfC/vlH92K2stMsflwPMeuLhKD8/butOcyHBjCfoHeT427Z/3U6LoUPqP A==; X-IronPort-AV: E=McAfee;i="6600,9927,10895"; a="477165984" X-IronPort-AV: E=Sophos;i="6.03,305,1694761200"; d="scan'208";a="477165984" Received: from fmsmga007.fm.intel.com ([10.253.24.52]) by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 15 Nov 2023 11:54:57 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10895"; a="768693278" X-IronPort-AV: E=Sophos;i="6.03,305,1694761200"; d="scan'208";a="768693278" Received: from agluck-desk3.sc.intel.com ([172.25.222.74]) by fmsmga007-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 15 Nov 2023 11:54:57 -0800 From: Tony Luck To: Borislav Petkov Cc: Yazen Ghannam , Smita.KoralahalliChannabasappa@amd.com, dave.hansen@linux.intel.com, x86@kernel.org, linux-edac@vger.kernel.org, linux-kernel@vger.kernel.org, patches@lists.linux.dev, Tony Luck Subject: [PATCH v10 0/3] Handle corrected machine check interrupt storms Date: Wed, 15 Nov 2023 11:54:47 -0800 Message-ID: <20231115195450.12963-1-tony.luck@intel.com> X-Mailer: git-send-email 2.41.0 In-Reply-To: <20231004183623.17067-1-tony.luck@intel.com> References: <20231004183623.17067-1-tony.luck@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.5 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Wed, 15 Nov 2023 11:55:08 -0800 (PST) Linux CMCI storm mitigation is a big hammer that just disables the CMCI interrupt globally and switches to polling all banks. There are two problems with this: 1) It really is a big hammer. It means that errors reported in other banks from different functional units are all subject to the same polling delay before being processed. 2) Intel systems signal some uncorrected errors using CMCI (e.g. memory controller patrol scrub on Icelake Xeon and newer). Delaying processing these error reports negates some of the benefit of the patrol scrubber providing early notice of errors before they are consumed and cause a machine check. This series throws away the old storm implementation and replaces it with one that keeps track of the weather on each separate machine check bank. When a storm is detected from a bank. On Intel the storm is mitigated by setting a very high threshold for corrected errors to signal CMCI. This threshold does not affect signaling CMCI for uncorrected errors. Signed-off-by: Tony Luck --- Changes since v9 (based on Boris reviews) #1 Better commit comment on flow. Added detail that both timer poll and CMCI feed results of scanning each bank into the history calculation. Also added comment in code where mce_trac_storm() is called. #2 Set a flag for banks that don't support CMCI so they can be excluded from history processing #3 Skip history processing if CMCI globally disabled with boot argument mce=cmci_disable #4 Move struct mca_storm_desc definition to internal.h (I had argued against the need for this, but the new "poll_mode" flag added in change #2 needs to be set in intel.c). #5 Add #define NUM_HISTORY_BITS instead of hard-coded "64". #6 Rebase to v6.7-rc1 Tony Luck (3): x86/mce: Remove old CMCI storm mitigation code x86/mce: Add per-bank CMCI storm mitigation x86/mce: Handle Intel threshold interrupt storms arch/x86/kernel/cpu/mce/internal.h | 66 +++++- arch/x86/kernel/cpu/mce/core.c | 53 +++-- arch/x86/kernel/cpu/mce/intel.c | 304 ++++++++++++---------------- arch/x86/kernel/cpu/mce/threshold.c | 115 +++++++++++ 4 files changed, 332 insertions(+), 206 deletions(-) base-commit: b85ea95d086471afb4ad062012a4d73cd328fa86 -- 2.41.0